× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 666f9bc2bf5a9c656d6255d6590e25415e4229962760551bb5ef8662a3190951
File name: 695.apk
Detection ratio: 0 / 61
Analysis date: 2018-12-03 03:50:16 UTC ( 3 months, 3 weeks ago ) View latest
Antivirus Result Update
Ad-Aware 20181203
AegisLab 20181203
AhnLab-V3 20181203
Alibaba 20180921
ALYac 20181203
Antiy-AVL 20181202
Arcabit 20181203
Avast 20181203
Avast-Mobile 20181202
AVG 20181203
Avira (no cloud) 20181202
Babable 20180918
Baidu 20181130
BitDefender 20181203
Bkav 20181129
CAT-QuickHeal 20181202
ClamAV 20181203
CMC 20181202
Comodo 20181203
CrowdStrike Falcon (ML) 20181022
Cybereason 20180225
Cylance 20181203
Cyren 20181203
DrWeb 20181203
eGambit 20181203
Emsisoft 20181203
Endgame 20181108
ESET-NOD32 20181202
F-Prot 20181203
F-Secure 20181202
Fortinet 20181203
GData 20181203
Ikarus 20181202
Sophos ML 20181128
Jiangmin 20181203
K7AntiVirus 20181203
K7GW 20181202
Kaspersky 20181203
Kingsoft 20181203
Malwarebytes 20181203
MAX 20181203
McAfee 20181203
McAfee-GW-Edition 20181203
Microsoft 20181203
eScan 20181203
NANO-Antivirus 20181203
Palo Alto Networks (Known Signatures) 20181203
Panda 20181202
Qihoo-360 20181203
Rising 20181203
SentinelOne (Static ML) 20181011
Sophos AV 20181202
SUPERAntiSpyware 20181128
Symantec 20181203
Symantec Mobile Insight 20181121
TACHYON 20181203
Tencent 20181203
TheHacker 20181202
TotalDefense 20181202
Trapmine 20181128
TrendMicro 20181203
TrendMicro-HouseCall 20181203
Trustlook 20181203
VBA32 20181130
ViRobot 20181202
Webroot 20181203
Yandex 20181130
Zillya 20181130
ZoneAlarm by Check Point 20181203
Zoner 20181203
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.escape.room.door.word.prison.puzzle.adventure. The internal version number of the application is 125. The displayed version string of the application is 1.2.5. The minimum Android API level for the application to run (MinSDKVersion) is 16. The target Android API level for the application to run (TargetSDKVersion) is 26.
Required permissions
android.permission.RECEIVE_BOOT_COMPLETED (automatically start at boot)
android.permission.SYSTEM_ALERT_WINDOW (display system-level alerts)
com.google.android.c2dm.permission.RECEIVE (Unknown permission from android reference)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.WAKE_LOCK (prevent phone from sleeping)
android.permission.INTERNET (full Internet access)
com.escape.room.door.word.prison.puzzle.adventure.permission.C2D_MESSAGE (C2DM permission.)
com.android.vending.BILLING (Unknown permission from android reference)
Activities
com.escape.room.door.word.prison.puzzle.adventure.UnityPlayerActivity
com.facebook.FacebookActivity
com.facebook.CustomTabActivity
com.google.android.gms.ads.AdActivity
com.google.android.gms.auth.api.signin.internal.SignInHubActivity
com.google.android.gms.appinvite.PreviewActivity
com.google.android.gms.common.api.GoogleApiActivity
com.facebook.CustomTabMainActivity
com.facebook.ads.AudienceNetworkActivity
com.facebook.ads.internal.ipc.RemoteANActivity
com.android.billingclient.api.ProxyBillingActivity
com.facebook.ads.InterstitialAdActivity
com.fw.basemodules.animal.ButterflyNoPadding
com.fw.basemodules.animal.Swallow
com.fw.basemodules.animal.SwallowLargeCard
com.fw.basemodules.animal.SwallowLargeCardOrange
com.fw.basemodules.animal.SwallowLargeCardGreen
com.fw.basemodules.animal.BeeAC
com.fw.basemodules.animal.BeeAP
com.mopub.mobileads.MoPubActivity
com.mopub.mobileads.MraidActivity
com.mopub.common.MoPubBrowser
com.mopub.mobileads.MraidVideoPlayerActivity
com.mopub.mobileads.RewardedMraidActivity
com.fw.basemodules.ad.mopub.base.common.MoPubBrowser
com.fw.basemodules.ad.mopub.base.mobileads.MraidVideoPlayerActivity
com.fw.basemodules.animal.BeeTF
com.fw.basemodules.animal.BeeTFVD
com.fw.basemodules.wp.INAV
com.fw.basemodules.wp.UFS
com.fw.basemodules.wp.nfp.MIAA
com.fw.basemodules.wp.nfp.FNAV
com.fw.basemodules.animal.LionIRD
com.fw.basemodules.login.activity.LoginActivity
Services
com.escape.room.door.word.prison.puzzle.adventure.service.SyncService
com.escape.room.door.word.prison.puzzle.adventure.service.SyncServiceJbS
com.google.android.gms.auth.api.signin.RevocationBoundService
com.google.android.gms.measurement.AppMeasurementService
com.google.android.gms.measurement.AppMeasurementJobService
com.facebook.ads.internal.ipc.AdsProcessPriorityService
com.facebook.ads.internal.ipc.AdsMessengerService
com.fw.basemodules.ptoes.MgBSS
com.fw.basemodules.ptoes.MgBSSJbS
com.fw.basemodules.ptoes.LiSS
com.fw.basemodules.ptoes.LiSSJbS
com.fw.basemodules.ptoes.NaLs
com.fw.basemodules.ptoes.NaLsJbS
com.fw.basemodules.extension.np.bubbleview.view.BubblesService
com.fw.basemodules.ad.tp.MPRS
com.fw.basemodules.ad.tp.MPRSJbS
com.google.firebase.messaging.FirebaseMessagingService
com.google.firebase.iid.FirebaseInstanceIdService
com.firebase.jobdispatcher.GooglePlayReceiver
Receivers
com.escape.room.door.word.prison.puzzle.adventure.receiver.ReferrerTrackingReceiver
com.escape.room.door.word.prison.puzzle.adventure.notification.NotificationBroadcastReceiver
com.escape.room.door.word.prison.puzzle.adventure.notification.AlarmReceiver
com.google.android.gms.measurement.AppMeasurementReceiver
com.google.android.gms.measurement.AppMeasurementInstallReferrerReceiver
com.fw.basemodules.ptoer.CuEBR
com.fw.basemodules.ptoer.HRAR
com.fw.basemodules.ptoer.FeIR
com.fw.basemodules.ptoer.HeULR
com.fw.basemodules.ptoer.CoAIR
com.fw.basemodules.wuu.BeAER
com.fw.basemodules.ptoer.ZnNBR
com.fw.basemodules.ptoer.CoUR
com.google.firebase.iid.FirebaseInstanceIdReceiver
Providers
com.facebook.internal.FacebookInitProvider
com.fw.basemodules.wda.WdaProvider
com.crashlytics.android.CrashlyticsInitProvider
com.google.firebase.provider.FirebaseInitProvider
Service-related intent filters
com.google.firebase.messaging.FirebaseMessagingService
actions: com.google.firebase.MESSAGING_EVENT
com.firebase.jobdispatcher.GooglePlayReceiver
actions: com.google.android.gms.gcm.ACTION_TASK_READY
com.google.firebase.iid.FirebaseInstanceIdService
actions: com.google.firebase.INSTANCE_ID_EVENT
Activity-related intent filters
com.escape.room.door.word.prison.puzzle.adventure.UnityPlayerActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER, android.intent.category.LEANBACK_LAUNCHER
com.google.android.gms.appinvite.PreviewActivity
actions: com.google.android.gms.appinvite.ACTION_PREVIEW
categories: android.intent.category.DEFAULT
com.facebook.CustomTabActivity
actions: android.intent.action.VIEW
categories: android.intent.category.DEFAULT, android.intent.category.BROWSABLE
Receiver-related intent filters
com.fw.basemodules.ptoer.HeULR
actions: android.intent.action.USER_PRESENT
com.fw.basemodules.ptoer.ZnNBR
actions: com.fw.wp.action.ntfclk
com.fw.basemodules.ptoer.CoAIR
actions: android.intent.action.PACKAGE_ADDED
com.fw.basemodules.ptoer.CoUR
actions: android.intent.action.PACKAGE_REMOVED, android.intent.action.PACKAGE_ADDED
com.google.firebase.iid.FirebaseInstanceIdReceiver
actions: com.google.android.c2dm.intent.RECEIVE
categories: com.escape.room.door.word.prison.puzzle.adventure
com.escape.room.door.word.prison.puzzle.adventure.notification.NotificationBroadcastReceiver
actions: notification_cancelled
com.google.android.gms.measurement.AppMeasurementInstallReferrerReceiver
actions: com.android.vending.INSTALL_REFERRER
com.escape.room.door.word.prison.puzzle.adventure.receiver.ReferrerTrackingReceiver
actions: com.android.vending.INSTALL_REFERRER
com.fw.basemodules.ptoer.FeIR
actions: android.intent.action.PACKAGE_ADDED
com.fw.basemodules.wuu.BeAER
actions: com.wuu.ae, android.intent.action.ACTION_POWER_CONNECTED, android.intent.action.ACTION_POWER_DISCONNECTED
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Interesting properties
The studied file contains at least one Portable Executable.
The file under inspection contains at least one ELF file.
Contained files
Compression metadata
Contained files
1893
Uncompressed size
119452100
Highest datetime
1980-00-00 00:00:00
Lowest datetime
1980-00-00 00:00:00
Contained files by extension
xml
85
dll
72
png
9
ttf
8
so
4
dex
2
MF
1
gz
1
RSA
1
SF
1
Contained files by type
unknown
830
XML
83
Portable Executable
72
PNG
9
ELF
4
DEX
2
File identification
MD5 d7f3746c1d91026892127497d7985dc8
SHA1 68a3ef7d72d4ee5b3b2d0832702ac6c66f9c10ba
SHA256 666f9bc2bf5a9c656d6255d6590e25415e4229962760551bb5ef8662a3190951
ssdeep
786432:2PelrJnwM7vlbY98VUazxIP13M/EfMWkyLbKvXEa23fFy:2grtbDlc9yId3M/EfMWTbKP2PU

File size 31.3 MB ( 32870603 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (72.9%)
Java Archive (20.1%)
ZIP compressed archive (5.5%)
PrintFox/Pagefox bitmap (var. P) (1.3%)
Tags
apk contains-pe android contains-elf

VirusTotal metadata
First submission 2018-12-03 03:50:16 UTC ( 3 months, 3 weeks ago )
Last submission 2019-01-03 03:33:12 UTC ( 2 months, 2 weeks ago )
File names Escape%20Room%20Mystery%20Word.apk
escape-room-mystery-word.apk
695.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!