× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 61a37d87f48eb64acd652f8061dca6b40078855613d8bc4193bf63a060f4c815
File name: 骰子游戏.apk
Detection ratio: 0 / 54
Analysis date: 2016-02-22 11:33:39 UTC ( 3 years, 1 month ago ) View latest
Antivirus Result Update
Ad-Aware 20160222
AegisLab 20160222
Yandex 20160221
AhnLab-V3 20160222
Alibaba 20160222
ALYac 20160222
Antiy-AVL 20160222
Arcabit 20160222
Avast 20160222
AVG 20160222
Avira (no cloud) 20160222
AVware 20160222
Baidu-International 20160221
BitDefender 20160222
Bkav 20160220
ByteHero 20160222
CAT-QuickHeal 20160222
ClamAV 20160222
CMC 20160222
Comodo 20160222
Cyren 20160222
DrWeb 20160222
Emsisoft 20160222
ESET-NOD32 20160222
F-Prot 20160221
F-Secure 20160222
Fortinet 20160222
GData 20160222
Ikarus 20160222
Jiangmin 20160222
K7AntiVirus 20160222
K7GW 20160222
Kaspersky 20160222
Malwarebytes 20160222
McAfee 20160222
McAfee-GW-Edition 20160222
Microsoft 20160222
eScan 20160222
NANO-Antivirus 20160222
nProtect 20160222
Panda 20160221
Qihoo-360 20160222
Rising 20160222
Sophos AV 20160222
SUPERAntiSpyware 20160222
Symantec 20160221
Tencent 20160222
TheHacker 20160217
TotalDefense 20160222
TrendMicro-HouseCall 20160222
VBA32 20160222
VIPRE 20160222
ViRobot 20160222
Zoner 20160222
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.mola.playspace.android.parchis. The internal version number of the application is 110090. The displayed version string of the application is 2.8.27. The minimum Android API level for the application to run (MinSDKVersion) is 10. The target Android API level for the application to run (TargetSDKVersion) is 19.
Required permissions
android.permission.VIBRATE (control vibrator)
android.permission.RECEIVE_BOOT_COMPLETED (automatically start at boot)
android.permission.READ_PHONE_STATE (read phone state and identity)
android.permission.SEND_SMS (send SMS messages)
com.mola.playspace.android.parchis.permission.C2D_MESSAGE (C2DM permission.)
com.google.android.c2dm.permission.RECEIVE (Unknown permission from android reference)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.WAKE_LOCK (prevent phone from sleeping)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.INTERNET (full Internet access)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
com.android.vending.BILLING (Unknown permission from android reference)
android.permission.GET_ACCOUNTS (discover known accounts)
android.permission.RECEIVE_SMS (receive SMS)
Activities
com.mola.playspace.android.parchis.MainActivity
com.facebook.LoginActivity
com.google.android.gms.ads.AdActivity
com.jirbo.adcolony.AdColonyOverlay
com.jirbo.adcolony.AdColonyFullscreen
com.jirbo.adcolony.AdColonyBrowser
com.appoxee.activities.Inbox
com.appoxee.activities.Feedback
com.appoxee.activities.InboxMessage
com.tokenads.view.OfferWallActivity
com.tokenads.view.OfferDescriptionActivity
com.tokenads.view.OfferIncentiveAppDescrptionPopupActivity
com.tokenads.view.OfferPopupActivity
com.tokenads.view.OfferActivity
com.tokenads.view.SponsoredByDialogActivity
com.tokenads.view.OfferNonIncentiveAppDescrptionPopupActivity
com.fortumo.android.FortumoActivity
com.trialpay.android.OfferwallActivity
Services
com.appjolt.winback.WinbackService
com.appoxee.gcm.GCMIntentService
com.fortumo.android.FortumoService
com.fortumo.android.StatusUpdateService
Receivers
com.appjolt.winback.WinbackBootReceiver
com.appoxee.gcm.GCMBroadcastReceiver
com.kochava.android.tracker.ReferralCapture
com.fortumo.android.BillingSMSReceiver
com.amazon.inapp.purchasing.ResponseReceiver
Activity-related intent filters
com.mola.playspace.android.parchis.MainActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
Receiver-related intent filters
com.fortumo.android.BillingSMSReceiver
actions: android.provider.Telephony.SMS_RECEIVED
com.kochava.android.tracker.ReferralCapture
actions: com.android.vending.INSTALL_REFERRER
com.appoxee.gcm.GCMBroadcastReceiver
actions: com.google.android.c2dm.intent.RECEIVE, com.google.android.c2dm.intent.REGISTRATION
categories: com.mola.playspace.android.parchis
com.amazon.inapp.purchasing.ResponseReceiver
actions: com.amazon.inapp.purchasing.NOTIFY
com.appjolt.winback.WinbackBootReceiver
actions: android.intent.action.BOOT_COMPLETED
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Interesting properties
The file under inspection contains at least one ELF file.
Contained files
Compression metadata
Contained files
949
Uncompressed size
46002550
Highest datetime
2015-03-31 18:11:28
Lowest datetime
2015-03-12 18:01:36
Contained files by extension
png
499
xml
89
mp3
19
txt
15
ttf
6
so
6
sql
6
jar
2
rl
2
wav
2
XML
1
dex
1
MF
1
RSA
1
fnt
1
SF
1
Contained files by type
PNG
499
unknown
338
XML
88
MP3
15
ELF
6
ZIP
2
DEX
1
File identification
MD5 9b1df7a14070ec7c04e9854f6cf7ed24
SHA1 c68d40f8d8474c5660b52121f02ac6a672844463
SHA256 61a37d87f48eb64acd652f8061dca6b40078855613d8bc4193bf63a060f4c815
ssdeep
786432:sQaqcnOUtwL8pTKlj55V3Qv3Kjq2ikdfSVq9CySc0QiQd:sQHAAUmLAv3KuodfYq9Cyn0QiQ

File size 38.1 MB ( 39971891 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (63.6%)
Java Archive (17.5%)
Flare3D model (13.9%)
ZIP compressed archive (4.8%)
Tags
apk android contains-elf software-collection

VirusTotal metadata
First submission 2015-04-02 09:48:26 UTC ( 3 years, 11 months ago )
Last submission 2016-06-16 11:10:24 UTC ( 2 years, 9 months ago )
File names parcheesi-playspace.apk
骰子游戏.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!