× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 63bfed79163b2d4759a6c5191119e80d57d00ad4000c3db755be5235ab4d2962
File name: 63BFED79163B2D4759A6C5191119E80D57D00AD4000C3DB755BE5235AB4D2962
Detection ratio: 0 / 62
Analysis date: 2018-12-19 05:17:57 UTC ( 3 months ago ) View latest
Antivirus Result Update
Acronis 20180726
Ad-Aware 20181219
AegisLab 20181219
AhnLab-V3 20181219
Alibaba 20180921
ALYac 20181218
Antiy-AVL 20181218
Arcabit 20181219
Avast 20181219
Avast-Mobile 20181218
AVG 20181219
Avira (no cloud) 20181219
AVware 20180925
Babable 20180918
Baidu 20181207
BitDefender 20181219
Bkav 20181217
CAT-QuickHeal 20181218
ClamAV 20181219
CMC 20181218
Comodo 20181219
CrowdStrike Falcon (ML) 20181022
Cybereason 20180225
Cylance 20181219
Cyren 20181219
DrWeb 20181219
eGambit 20181219
Emsisoft 20181219
Endgame 20181108
ESET-NOD32 20181219
F-Prot 20181219
F-Secure 20181219
Fortinet 20181219
GData 20181219
Ikarus 20181219
Sophos ML 20181128
Jiangmin 20181219
K7AntiVirus 20181218
K7GW 20181218
Kaspersky 20181219
Kingsoft 20181219
Malwarebytes 20181219
MAX 20181219
McAfee 20181219
McAfee-GW-Edition 20181218
Microsoft 20181218
eScan 20181219
NANO-Antivirus 20181219
Palo Alto Networks (Known Signatures) 20181219
Panda 20181218
Qihoo-360 20181219
Rising 20181219
SentinelOne (Static ML) 20181011
Sophos AV 20181219
SUPERAntiSpyware 20181212
Symantec 20181219
Symantec Mobile Insight 20181215
TACHYON 20181219
Tencent 20181219
TheHacker 20181216
TotalDefense 20181218
Trapmine 20181205
TrendMicro 20181219
TrendMicro-HouseCall 20181219
Trustlook 20181219
VBA32 20181218
VIPRE 20181219
ViRobot 20181218
Webroot 20181219
Yandex 20181218
Zillya 20181217
ZoneAlarm by Check Point 20181219
Zoner 20181219
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.escape.room.door.word.prison.puzzle.adventure. The internal version number of the application is 119. The displayed version string of the application is 1.1.9. The minimum Android API level for the application to run (MinSDKVersion) is 16. The target Android API level for the application to run (TargetSDKVersion) is 26.
Required permissions
android.permission.RECEIVE_BOOT_COMPLETED (automatically start at boot)
android.permission.SYSTEM_ALERT_WINDOW (display system-level alerts)
com.google.android.c2dm.permission.RECEIVE (Unknown permission from android reference)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.WAKE_LOCK (prevent phone from sleeping)
android.permission.INTERNET (full Internet access)
com.escape.room.door.word.prison.puzzle.adventure.permission.C2D_MESSAGE (C2DM permission.)
com.android.vending.BILLING (Unknown permission from android reference)
Activities
com.escape.room.door.word.prison.puzzle.adventure.UnityPlayerActivity
com.facebook.FacebookActivity
com.facebook.CustomTabActivity
com.google.android.gms.ads.AdActivity
com.google.android.gms.auth.api.signin.internal.SignInHubActivity
com.google.android.gms.appinvite.PreviewActivity
com.google.android.gms.common.api.GoogleApiActivity
com.facebook.CustomTabMainActivity
com.facebook.ads.AudienceNetworkActivity
com.facebook.ads.internal.ipc.RemoteANActivity
com.android.billingclient.api.ProxyBillingActivity
com.facebook.ads.InterstitialAdActivity
com.fw.basemodules.animal.ButterflyNoPadding
com.fw.basemodules.animal.Swallow
com.fw.basemodules.animal.SwallowLargeCard
com.fw.basemodules.animal.SwallowLargeCardOrange
com.fw.basemodules.animal.SwallowLargeCardGreen
com.fw.basemodules.animal.BeeAC
com.fw.basemodules.animal.BeeAP
com.mopub.mobileads.MoPubActivity
com.mopub.mobileads.MraidActivity
com.mopub.common.MoPubBrowser
com.mopub.mobileads.MraidVideoPlayerActivity
com.mopub.mobileads.RewardedMraidActivity
com.fw.basemodules.ad.mopub.base.common.MoPubBrowser
com.fw.basemodules.ad.mopub.base.mobileads.MraidVideoPlayerActivity
com.fw.basemodules.animal.BeeTF
com.fw.basemodules.animal.BeeTFVD
com.fw.basemodules.wp.INAV
com.fw.basemodules.wp.UFS
com.fw.basemodules.wp.nfp.MIAA
com.fw.basemodules.wp.nfp.FNAV
com.fw.basemodules.animal.LionIRD
com.fw.basemodules.login.activity.LoginActivity
com.unity3d.ads.adunit.AdUnitActivity
com.unity3d.ads.adunit.AdUnitTransparentActivity
com.unity3d.ads.adunit.AdUnitTransparentSoftwareActivity
com.unity3d.ads.adunit.AdUnitSoftwareActivity
Services
com.escape.room.door.word.prison.puzzle.adventure.service.SyncService
com.escape.room.door.word.prison.puzzle.adventure.service.SyncServiceJbS
com.google.android.gms.auth.api.signin.RevocationBoundService
com.google.android.gms.measurement.AppMeasurementService
com.google.android.gms.measurement.AppMeasurementJobService
com.facebook.ads.internal.ipc.AdsProcessPriorityService
com.facebook.ads.internal.ipc.AdsMessengerService
com.fw.basemodules.ptoes.MgBSS
com.fw.basemodules.ptoes.MgBSSJbS
com.fw.basemodules.ptoes.LiSS
com.fw.basemodules.ptoes.LiSSJbS
com.fw.basemodules.ptoes.NaLs
com.fw.basemodules.ptoes.NaLsJbS
com.fw.basemodules.extension.np.bubbleview.view.BubblesService
com.fw.basemodules.ad.tp.MPRS
com.fw.basemodules.ad.tp.MPRSJbS
com.google.firebase.messaging.FirebaseMessagingService
com.google.firebase.iid.FirebaseInstanceIdService
com.firebase.jobdispatcher.GooglePlayReceiver
Receivers
com.escape.room.door.word.prison.puzzle.adventure.receiver.ReferrerTrackingReceiver
com.escape.room.door.word.prison.puzzle.adventure.notification.NotificationBroadcastReceiver
com.google.android.gms.measurement.AppMeasurementReceiver
com.google.android.gms.measurement.AppMeasurementInstallReferrerReceiver
com.fw.basemodules.ptoer.CuEBR
com.fw.basemodules.ptoer.HRAR
com.fw.basemodules.ptoer.FeIR
com.fw.basemodules.ptoer.HeULR
com.fw.basemodules.ptoer.CoAIR
com.fw.basemodules.wuu.BeAER
com.fw.basemodules.ptoer.ZnNBR
com.fw.basemodules.ptoer.CoUR
com.google.firebase.iid.FirebaseInstanceIdReceiver
Providers
com.facebook.internal.FacebookInitProvider
com.fw.basemodules.wda.WdaProvider
com.crashlytics.android.CrashlyticsInitProvider
com.google.firebase.provider.FirebaseInitProvider
Service-related intent filters
com.google.firebase.messaging.FirebaseMessagingService
actions: com.google.firebase.MESSAGING_EVENT
com.firebase.jobdispatcher.GooglePlayReceiver
actions: com.google.android.gms.gcm.ACTION_TASK_READY
com.google.firebase.iid.FirebaseInstanceIdService
actions: com.google.firebase.INSTANCE_ID_EVENT
Activity-related intent filters
com.escape.room.door.word.prison.puzzle.adventure.UnityPlayerActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER, android.intent.category.LEANBACK_LAUNCHER
com.google.android.gms.appinvite.PreviewActivity
actions: com.google.android.gms.appinvite.ACTION_PREVIEW
categories: android.intent.category.DEFAULT
com.facebook.CustomTabActivity
actions: android.intent.action.VIEW
categories: android.intent.category.DEFAULT, android.intent.category.BROWSABLE
Receiver-related intent filters
com.fw.basemodules.ptoer.HeULR
actions: android.intent.action.USER_PRESENT
com.fw.basemodules.ptoer.ZnNBR
actions: com.fw.wp.action.ntfclk
com.escape.room.door.word.prison.puzzle.adventure.notification.NotificationBroadcastReceiver
actions: notification_cancelled
com.fw.basemodules.ptoer.CoUR
actions: android.intent.action.PACKAGE_REMOVED, android.intent.action.PACKAGE_ADDED
com.google.firebase.iid.FirebaseInstanceIdReceiver
actions: com.google.android.c2dm.intent.RECEIVE
categories: com.escape.room.door.word.prison.puzzle.adventure
com.fw.basemodules.ptoer.CoAIR
actions: android.intent.action.PACKAGE_ADDED
com.google.android.gms.measurement.AppMeasurementInstallReferrerReceiver
actions: com.android.vending.INSTALL_REFERRER
com.escape.room.door.word.prison.puzzle.adventure.receiver.ReferrerTrackingReceiver
actions: com.android.vending.INSTALL_REFERRER
com.fw.basemodules.ptoer.FeIR
actions: android.intent.action.PACKAGE_ADDED
com.fw.basemodules.wuu.BeAER
actions: com.wuu.ae, android.intent.action.ACTION_POWER_CONNECTED, android.intent.action.ACTION_POWER_DISCONNECTED
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Interesting properties
The studied file contains at least one Portable Executable.
The file under inspection contains at least one ELF file.
Contained files
Compression metadata
Contained files
1866
Uncompressed size
105627618
Highest datetime
2018-11-16 15:39:08
Lowest datetime
2018-11-16 15:39:04
Contained files by extension
xml
79
dll
72
png
47
ttf
8
so
4
dex
2
MF
1
gz
1
RSA
1
SF
1
Contained files by type
unknown
800
XML
75
Portable Executable
72
PNG
47
ELF
4
DEX
2
File identification
MD5 9092db5af6ea58df938615270eb0bb4c
SHA1 f7e82563fb36cc170c79c186daa74cdd62baf501
SHA256 63bfed79163b2d4759a6c5191119e80d57d00ad4000c3db755be5235ab4d2962
ssdeep
393216:mYLwJ+BUW3X04UZMOdW5yt8EMi+OUqd9tC+3jlxDLXER5EgE1JFDFjIY6Tfd0MT5:nBvGZMOdsrAUg9IGhxwE1jVMT6MvN5Z

File size 30.8 MB ( 32313563 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (72.9%)
Java Archive (20.1%)
ZIP compressed archive (5.5%)
PrintFox/Pagefox bitmap (var. P) (1.3%)
Tags
apk contains-pe android contains-elf

VirusTotal metadata
First submission 2018-11-16 07:59:08 UTC ( 4 months ago )
Last submission 2018-12-27 10:03:12 UTC ( 2 months, 3 weeks ago )
File names escape-room-mystery-word.apk
9092db5af6ea58df938615270eb0bb4c.apk
EscapeRoom_Android_10001.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!