× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 9ea9e9f0f915b47d2753a729b3387675cec25e90f0b7aa8185b16cd8a478059f
File name: pes-club-manager-1.1.16.apk
Detection ratio: 0 / 60
Analysis date: 2017-05-10 14:02:45 UTC ( 1 year, 9 months ago ) View latest
Antivirus Result Update
Ad-Aware 20170510
AegisLab 20170510
AhnLab-V3 20170510
Alibaba 20170510
Antiy-AVL 20170510
Arcabit 20170510
Avast 20170510
AVG 20170510
Avira (no cloud) 20170510
AVware 20170508
Baidu 20170503
BitDefender 20170510
Bkav 20170510
CAT-QuickHeal 20170510
ClamAV 20170510
CMC 20170510
Comodo 20170510
CrowdStrike Falcon (ML) 20170130
Cyren 20170510
DrWeb 20170510
Emsisoft 20170510
Endgame 20170503
ESET-NOD32 20170510
F-Prot 20170510
F-Secure 20170510
Fortinet 20170510
GData 20170510
Ikarus 20170510
Sophos ML 20170413
Jiangmin 20170510
K7AntiVirus 20170510
K7GW 20170510
Kaspersky 20170510
Kingsoft 20170510
Malwarebytes 20170510
McAfee 20170510
McAfee-GW-Edition 20170510
Microsoft 20170510
eScan 20170510
NANO-Antivirus 20170510
nProtect 20170510
Palo Alto Networks (Known Signatures) 20170510
Panda 20170510
Qihoo-360 20170510
Rising 20170510
SentinelOne (Static ML) 20170330
Sophos AV 20170510
SUPERAntiSpyware 20170510
Symantec 20170510
Symantec Mobile Insight 20170510
Tencent 20170510
TheHacker 20170508
TotalDefense 20170510
TrendMicro 20170510
TrendMicro-HouseCall 20170510
Trustlook 20170510
VBA32 20170510
VIPRE 20170510
ViRobot 20170510
Webroot 20170510
WhiteArmor 20170502
Yandex 20170510
Zillya 20170505
ZoneAlarm by Check Point 20170510
Zoner 20170510
The file being studied is Android related! APK Android file more specifically. The application's main package name is jp.konami.pesm. The internal version number of the application is 1001016. The displayed version string of the application is 1.1.16. The minimum Android API level for the application to run (MinSDKVersion) is 9. The target Android API level for the application to run (TargetSDKVersion) is 21.
Required permissions
android.permission.VIBRATE (control vibrator)
android.permission.READ_EXTERNAL_STORAGE (read from external storage)
jp.konami.pesm.permission.C2D_MESSAGE (C2DM permission.)
com.google.android.c2dm.permission.RECEIVE (Unknown permission from android reference)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.SET_ORIENTATION (change screen orientation)
android.permission.WAKE_LOCK (prevent phone from sleeping)
android.permission.INTERNET (full Internet access)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
com.android.vending.BILLING (Unknown permission from android reference)
android.permission.GET_ACCOUNTS (discover known accounts)
Activities
jp.konami.pesm.Main
com.ideaworks3d.marmalade.s3eAndroidGooglePlayBilling.PurchaseProxy
jp.applilink.sdk.common.ApplilinkWebViewActivity
jp.applilink.sdk.common.ApplilinkVideoViewActivity
Services
jp.konami.pesm.GCMExtendListenerService
jp.konami.pesm.GCMExtendInstanceIDListenerService
jp.konami.pesm.GCMExtendRegistrationIntentService
Receivers
com.google.android.gms.gcm.GcmReceiver
jp.konami.pesm.GCMExtendReceiver
jp.appAdForce.android.InstallReceiver
com.CustomReceiver.CustomReceiver
Providers
com.ideaworks3d.marmalade.VFSProvider
Service-related intent filters
jp.konami.pesm.GCMExtendListenerService
actions: com.google.android.c2dm.intent.RECEIVE
jp.konami.pesm.GCMExtendInstanceIDListenerService
actions: com.google.android.gms.iid.InstanceID
Activity-related intent filters
jp.konami.pesm.Main
actions: android.intent.action.MAIN, android.intent.action.VIEW
categories: android.intent.category.LAUNCHER, android.intent.category.DEFAULT, android.intent.category.BROWSABLE
Receiver-related intent filters
com.google.android.gms.gcm.GcmReceiver
actions: com.google.android.c2dm.intent.RECEIVE, com.google.android.c2dm.intent.REGISTRATION
categories: jp.konami.pesm
jp.appAdForce.android.InstallReceiver
actions: com.android.vending.INSTALL_REFERRER
com.CustomReceiver.CustomReceiver
actions: com.android.vending.INSTALL_REFERRER
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Interesting properties
The file under inspection contains at least one ELF file.
Contained files
Compression metadata
Contained files
242
Uncompressed size
35043324
Highest datetime
2017-03-13 13:57:52
Lowest datetime
2017-02-21 12:08:32
Contained files by extension
png
143
bin
38
m4a
15
so
13
xml
10
ttf
4
dz
3
dat
2
MF
1
RSA
1
SF
1
dex
1
s3e
1
Contained files by type
PNG
143
unknown
75
ELF
13
XML
10
DEX
1
File identification
MD5 20caabb96cb8c196b2828e815afb8ce5
SHA1 7834dba08bf2bb9c900d0e9a6ee8ee64816e1bf7
SHA256 9ea9e9f0f915b47d2753a729b3387675cec25e90f0b7aa8185b16cd8a478059f
ssdeep
393216:/3m/pT8zLlcZMEIeZJOV2bF/GeNG2kPHkFlif0lKeIrZ/NBfjxJmT5hWE7M+T:/32kLaZMEIeZJOpes0lNw7LxJ85uu

File size 22.0 MB ( 23025023 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (72.9%)
Java Archive (20.1%)
ZIP compressed archive (5.5%)
PrintFox/Pagefox bitmap (var. P) (1.3%)
Tags
apk android contains-elf dyn-calls via-tor

VirusTotal metadata
First submission 2017-03-23 06:19:09 UTC ( 1 year, 11 months ago )
Last submission 2018-10-14 23:02:41 UTC ( 4 months, 1 week ago )
File names pes-club-manager-1.1.16.apk
20CAABB96CB8C196B2828E815AFB8CE5
pes-collection-1-1-16.apk
jp.konami.pesm.apk
pes-manager.apk
jp.konami.pesm.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Opened files
/data/data/jp.konami.pesm/files/makeramdirectory.txt
/data/data/jp.konami.pesm/files
/mnt/sdcard
/data/data/jp.konami.pesm/cache
/mnt/sdcard/Android/data/jp.konami.pesm/cache
Dynamically called methods
android.content.Context.getExternalCacheDir
android.content.pm.PackageManager.hasSystemFeature 1 argument.
u'android.hardware.touchscreen.multitouch'
Accessed URIs
content://zzzz3674f9fabdbae4bb514efaed8aa7842f.VFSProvider