× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: b18ed14033c91b5a3bd54bb5578545798c8438008409deb1cf937dc82008adf1
File name: b18ed14033c91b5a3bd54bb5578545798c8438008409deb1cf937dc82008adf1....
Detection ratio: 0 / 61
Analysis date: 2017-06-15 17:12:46 UTC ( 1 year, 10 months ago ) View latest
Antivirus Result Update
Ad-Aware 20170615
AegisLab 20170615
AhnLab-V3 20170615
Alibaba 20170615
ALYac 20170615
Antiy-AVL 20170615
Arcabit 20170615
Avast 20170615
AVG 20170615
Avira (no cloud) 20170615
AVware 20170615
Baidu 20170615
BitDefender 20170615
Bkav 20170615
CAT-QuickHeal 20170615
ClamAV 20170615
CMC 20170615
Comodo 20170615
CrowdStrike Falcon (ML) 20170420
Cyren 20170615
DrWeb 20170615
Emsisoft 20170615
Endgame 20170614
ESET-NOD32 20170615
F-Prot 20170615
F-Secure 20170615
Fortinet 20170615
GData 20170615
Ikarus 20170615
Sophos ML 20170607
Jiangmin 20170615
K7AntiVirus 20170615
K7GW 20170615
Kaspersky 20170615
Kingsoft 20170615
Malwarebytes 20170615
McAfee 20170615
McAfee-GW-Edition 20170615
Microsoft 20170615
eScan 20170615
NANO-Antivirus 20170615
nProtect 20170615
Palo Alto Networks (Known Signatures) 20170615
Panda 20170615
Qihoo-360 20170615
Rising 20170615
SentinelOne (Static ML) 20170516
Sophos AV 20170615
SUPERAntiSpyware 20170615
Symantec 20170615
Symantec Mobile Insight 20170614
Tencent 20170615
TheHacker 20170615
TotalDefense 20170615
TrendMicro 20170615
TrendMicro-HouseCall 20170615
Trustlook 20170615
VBA32 20170615
VIPRE 20170615
ViRobot 20170615
Webroot 20170615
WhiteArmor 20170614
Yandex 20170615
Zillya 20170614
ZoneAlarm by Check Point 20170615
Zoner 20170615
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.nexonm.loh.usios. The internal version number of the application is 1810. The displayed version string of the application is 1.8.10. The minimum Android API level for the application to run (MinSDKVersion) is 14. The target Android API level for the application to run (TargetSDKVersion) is 24.
Required permissions
com.nexonm.loh.usios.permission.C2D_MESSAGE (C2DM permission.)
android.permission.INTERNET (full Internet access)
android.permission.USE_CREDENTIALS (use the authentication credentials of an account)
android.permission.VIBRATE (control vibrator)
com.google.android.c2dm.permission.RECEIVE (Unknown permission from android reference)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.WAKE_LOCK (prevent phone from sleeping)
android.permission.GET_TASKS (retrieve running applications)
android.permission.WRITE_SETTINGS (modify global system settings)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.READ_PHONE_STATE (read phone state and identity)
android.permission.KILL_BACKGROUND_PROCESS (Unknown permission from android reference)
android.permission.RESTART_PACKAGES (kill background processes)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
com.android.vending.BILLING (Unknown permission from android reference)
android.permission.GET_ACCOUNTS (discover known accounts)
Activities
com.nexonm.loh.usios.AndroidAPI
com.nexonm.loh.usios.MyAlert
com.tapjoy.TJAdUnitActivity
com.tapjoy.TJContentActivity
com.tapjoy.mraid.view.ActionHandler
com.tapjoy.mraid.view.Browser
com.facebook.LoginActivity
com.nexon.android.ui.NPLoginActivity
kr.co.nexon.toy.android.ui.auth.NXToyLoginSelectActivity
kr.co.nexon.toy.android.ui.auth.NXToyTermsActivity
kr.co.nexon.toy.android.ui.auth.NXToyTermViewActivity
com.nexon.android.ui.NXJoinUserAuthWebActivity
com.nexon.android.ui.NXJoinWebActivity
com.nexon.android.ui.NXJoinSelectActivity
com.nexon.android.ui.NXUserAuthWebActivity
kr.co.nexon.toy.android.ui.etc.NXToyShareActivity
kr.co.nexon.toy.android.ui.banner.NXToyFullBannerActivity
com.nexon.android.ui.NXSearchIDPWActivity
com.nexon.android.ui.NPGetNexonSNActivity
kr.co.nexon.toy.android.ui.banner.NXToyEndingBannerActivity
kr.co.nexon.toy.android.ui.board.NXToyNoticeActivity
kr.co.nexon.toy.android.ui.etc.NXToyCouponActivity
kr.co.nexon.toy.android.ui.baseplate.NXToyCustomerServiceActivity
kr.co.nexon.toy.android.ui.baseplate.NXToyHelpCenterActivity
kr.co.nexon.toy.android.ui.baseplate.NXToyPlateActivity
kr.co.nexon.toy.android.ui.board.NXToyWebActivity
kr.co.nexon.toy.android.ui.board.NXToyCSActivity
kr.co.nexon.toy.android.ui.board.NXToyFAQActivity
kr.co.nexon.toy.android.ui.baseplate.NXToyTermsListActivity
com.prime31.GoogleIABProxyActivity
com.google.games.bridge.NativeBridgeActivity
com.facebook.FacebookActivity
Services
com.nexonm.loh.usios.GCMIntentService
Receivers
com.google.android.gcm.GCMBroadcastReceiver
com.tapjoy.InstallReferrerReceiver
com.moblieapptracker.Tracker
com.nexonm.loh.usios.MatReceiver
Activity-related intent filters
kr.co.nexon.toy.android.ui.baseplate.NXToyPlateActivity
actions: android.intent.action.VIEW
kr.co.nexon.toy.android.ui.banner.NXToyEndingBannerActivity
actions: android.intent.action.VIEW
kr.co.nexon.toy.android.ui.auth.NXToyLoginSelectActivity
actions: android.intent.action.VIEW
com.nexon.android.ui.NXUserAuthWebActivity
actions: android.intent.action.VIEW
kr.co.nexon.toy.android.ui.board.NXToyCSActivity
actions: android.intent.action.VIEW
kr.co.nexon.toy.android.ui.board.NXToyWebActivity
actions: android.intent.action.VIEW
kr.co.nexon.toy.android.ui.board.NXToyFAQActivity
actions: android.intent.action.VIEW
kr.co.nexon.toy.android.ui.auth.NXToyTermsActivity
actions: android.intent.action.VIEW
kr.co.nexon.toy.android.ui.etc.NXToyShareActivity
actions: android.intent.action.VIEW
com.nexon.android.ui.NXJoinWebActivity
actions: android.intent.action.VIEW
kr.co.nexon.toy.android.ui.baseplate.NXToyCustomerServiceActivity
actions: android.intent.action.VIEW
com.nexon.android.ui.NXSearchIDPWActivity
actions: android.intent.action.VIEW
kr.co.nexon.toy.android.ui.board.NXToyNoticeActivity
actions: android.intent.action.VIEW
kr.co.nexon.toy.android.ui.baseplate.NXToyTermsListActivity
actions: android.intent.action.VIEW
com.nexon.android.ui.NPGetNexonSNActivity
actions: android.intent.action.VIEW
com.nexon.android.ui.NPLoginActivity
actions: android.intent.action.VIEW
com.nexon.android.ui.NXJoinUserAuthWebActivity
actions: android.intent.action.VIEW
kr.co.nexon.toy.android.ui.etc.NXToyCouponActivity
actions: android.intent.action.VIEW
kr.co.nexon.toy.android.ui.auth.NXToyTermViewActivity
actions: android.intent.action.VIEW
com.nexon.android.ui.NXJoinSelectActivity
actions: android.intent.action.VIEW
kr.co.nexon.toy.android.ui.baseplate.NXToyHelpCenterActivity
actions: android.intent.action.VIEW
com.nexonm.loh.usios.AndroidAPI
actions: android.intent.action.MAIN, android.intent.action.VIEW
categories: android.intent.category.LAUNCHER, android.intent.category.DEFAULT
kr.co.nexon.toy.android.ui.banner.NXToyFullBannerActivity
actions: android.intent.action.VIEW
Receiver-related intent filters
com.nexonm.loh.usios.MatReceiver
actions: com.android.vending.INSTALL_REFERRER
com.google.android.gcm.GCMBroadcastReceiver
actions: com.google.android.c2dm.intent.RECEIVE, com.google.android.c2dm.intent.REGISTRATION
categories: com.nexonm.loh.usios
com.moblieapptracker.Tracker
actions: com.android.vending.INSTALL_REFERRER
com.tapjoy.InstallReferrerReceiver
actions: com.android.vending.INSTALL_REFERRER
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Interesting properties
The studied file contains at least one Portable Executable.
Contained files
Compression metadata
Contained files
1850
Uncompressed size
117245313
Highest datetime
2017-06-14 11:19:14
Lowest datetime
2017-06-14 11:18:12
Contained files by extension
dll
20
Contained files by type
unknown
980
Portable Executable
20
File identification
MD5 c8f5c8eeb317514af95267d7bae60642
SHA1 cfdaed160d01bf261adb9b2831704f535f1e6f8b
SHA256 b18ed14033c91b5a3bd54bb5578545798c8438008409deb1cf937dc82008adf1
ssdeep
1572864:M2v1KGXiFrTLxP4mALbnnxbOUIQF4x3ep+6DBtC0xdLiBj4gPFW:M2ttS9TLxQmonnxbOLQFcK+SBtC0xtMa

File size 59.2 MB ( 62083404 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Java Archive (38.1%)
Sweet Home 3D design (generic) (27.6%)
foobar2000 component (21.0%)
ZIP compressed archive (10.5%)
PrintFox/Pagefox bitmap (var. P) (2.6%)
Tags
apk contains-pe android

VirusTotal metadata
First submission 2017-06-15 17:12:46 UTC ( 1 year, 10 months ago )
Last submission 2017-07-06 16:59:50 UTC ( 1 year, 9 months ago )
File names legion-of-heroes.apk
b18ed14033c91b5a3bd54bb5578545798c8438008409deb1cf937dc82008adf1.file
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!