× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: aeff70246de5dcba38b335b242ebf2b94eb1351b40ed1899b7465f758968a1e9
File name: legion-of-heroes-1.7.07.apk
Detection ratio: 0 / 57
Analysis date: 2016-06-10 09:07:42 UTC ( 2 years, 10 months ago ) View latest
Antivirus Result Update
Ad-Aware 20160610
AegisLab 20160610
AhnLab-V3 20160610
Alibaba 20160608
ALYac 20160610
Antiy-AVL 20160610
Arcabit 20160610
Avast 20160610
AVG 20160609
Avira (no cloud) 20160610
AVware 20160610
Baidu 20160608
Baidu-International 20160606
BitDefender 20160610
Bkav 20160610
CAT-QuickHeal 20160610
ClamAV 20160610
CMC 20160607
Comodo 20160610
Cyren 20160610
DrWeb 20160610
Emsisoft 20160610
ESET-NOD32 20160610
F-Prot 20160610
F-Secure 20160610
Fortinet 20160610
GData 20160610
Ikarus 20160610
Jiangmin 20160610
K7AntiVirus 20160610
K7GW 20160610
Kaspersky 20160610
Kingsoft 20160610
Malwarebytes 20160610
McAfee 20160610
McAfee-GW-Edition 20160610
Microsoft 20160610
eScan 20160610
NANO-Antivirus 20160610
nProtect 20160610
Panda 20160609
Qihoo-360 20160610
Rising 20160610
Sophos AV 20160610
SUPERAntiSpyware 20160610
Symantec 20160610
Tencent 20160610
TheHacker 20160610
TotalDefense 20160610
TrendMicro 20160610
TrendMicro-HouseCall 20160610
VBA32 20160609
VIPRE 20160610
ViRobot 20160610
Yandex 20160609
Zillya 20160609
Zoner 20160610
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.nexonm.loh.usios. The internal version number of the application is 1707. The displayed version string of the application is 1.7.07. The minimum Android API level for the application to run (MinSDKVersion) is 14. The target Android API level for the application to run (TargetSDKVersion) is 19.
Required permissions
com.nexonm.loh.usios.permission.C2D_MESSAGE (C2DM permission.)
android.permission.INTERNET (full Internet access)
android.permission.VIBRATE (control vibrator)
com.google.android.c2dm.permission.RECEIVE (Unknown permission from android reference)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.ACCESS_COARSE_LOCATION (coarse (network-based) location)
android.permission.WAKE_LOCK (prevent phone from sleeping)
android.permission.GET_TASKS (retrieve running applications)
android.permission.WRITE_SETTINGS (modify global system settings)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.READ_PHONE_STATE (read phone state and identity)
android.permission.KILL_BACKGROUND_PROCESS (Unknown permission from android reference)
android.permission.RESTART_PACKAGES (kill background processes)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
com.android.vending.BILLING (Unknown permission from android reference)
android.permission.GET_ACCOUNTS (discover known accounts)
Activities
com.nexonm.loh.usios.AndroidAPI
com.nexonm.loh.usios.MyAlert
com.prime31.GoogleIABProxyActivity
com.tapjoy.TJAdUnitActivity
com.tapjoy.mraid.view.ActionHandler
com.tapjoy.mraid.view.Browser
com.google.example.games.pluginsupport.SignInHelperActivity
com.google.example.games.pluginsupport.SelectOpponentsHelperActivity
com.google.example.games.pluginsupport.InvitationInboxHelperActivity
com.facebook.FacebookActivity
Services
com.nexonm.loh.usios.GCMIntentService
Receivers
com.google.android.gcm.GCMBroadcastReceiver
com.tapjoy.InstallReferrerReceiver
com.moblieapptracker.Tracker
com.nexonm.loh.usios.MatReceiver
Activity-related intent filters
com.nexonm.loh.usios.AndroidAPI
actions: android.intent.action.MAIN, android.intent.action.VIEW
categories: android.intent.category.LAUNCHER, android.intent.category.DEFAULT
Receiver-related intent filters
com.nexonm.loh.usios.MatReceiver
actions: com.android.vending.INSTALL_REFERRER
com.google.android.gcm.GCMBroadcastReceiver
actions: com.google.android.c2dm.intent.RECEIVE, com.google.android.c2dm.intent.REGISTRATION
categories: com.nexonm.loh.usios
com.moblieapptracker.Tracker
actions: com.android.vending.INSTALL_REFERRER
com.tapjoy.InstallReferrerReceiver
actions: com.android.vending.INSTALL_REFERRER
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Interesting properties
The studied file contains at least one Portable Executable.
Contained files
Compression metadata
Contained files
1178
Uncompressed size
105666552
Highest datetime
2016-05-18 18:39:16
Lowest datetime
2016-01-19 16:51:12
Contained files by extension
png
92
dll
19
xml
6
dex
1
js
1
Contained files by type
unknown
882
PNG
92
Portable Executable
19
XML
6
DEX
1
File identification
MD5 df0960f1e845dd3fe051dbd717d52964
SHA1 594a8c36080b1106527bb04e1e34d9dd80ae87c9
SHA256 aeff70246de5dcba38b335b242ebf2b94eb1351b40ed1899b7465f758968a1e9
ssdeep
786432:+JZPlT9naQVlm7kvzz8nvxa+Hh/4JRXb2DJvQByLma9Rav9fYBZM0Zp+ni6Dbdw+:IDnfm7U4vT/ORXkxQByrRaFfYBm0Zp+5

File size 46.6 MB ( 48859705 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Java Archive (54.7%)
foobar2000 component (30.1%)
ZIP compressed archive (15.0%)
Tags
apk contains-pe android

VirusTotal metadata
First submission 2016-05-19 05:21:08 UTC ( 2 years, 11 months ago )
Last submission 2016-10-12 03:17:05 UTC ( 2 years, 6 months ago )
File names legion-of-heroes-1.7.07.apk
legion-of-heroes.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!