× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: bcf0d1d07d796b2a34d0e1c43d6f6587d0eaf54a2406b2aed91e50353cd196dc
File name: 5993237a5453820146a1add2e1ed0089
Detection ratio: 0 / 61
Analysis date: 2018-09-03 05:16:54 UTC ( 6 months, 3 weeks ago ) View latest
Antivirus Result Update
Ad-Aware 20180903
AegisLab 20180903
AhnLab-V3 20180902
Alibaba 20180713
ALYac 20180903
Antiy-AVL 20180903
Arcabit 20180903
Avast 20180903
Avast-Mobile 20180903
AVG 20180903
Avira (no cloud) 20180902
AVware 20180823
Babable 20180902
Baidu 20180903
BitDefender 20180903
Bkav 20180831
CAT-QuickHeal 20180902
ClamAV 20180903
CMC 20180902
Comodo 20180903
CrowdStrike Falcon (ML) 20180723
Cybereason 20180225
Cylance 20180903
Cyren 20180903
DrWeb 20180903
eGambit 20180903
Emsisoft 20180903
Endgame 20180730
ESET-NOD32 20180903
F-Prot 20180903
F-Secure 20180903
Fortinet 20180903
GData 20180903
Sophos ML 20180717
Jiangmin 20180903
K7AntiVirus 20180902
K7GW 20180902
Kaspersky 20180903
Kingsoft 20180903
Malwarebytes 20180903
MAX 20180903
McAfee 20180903
McAfee-GW-Edition 20180903
Microsoft 20180903
eScan 20180903
NANO-Antivirus 20180903
Palo Alto Networks (Known Signatures) 20180903
Panda 20180902
Qihoo-360 20180903
Rising 20180903
SentinelOne (Static ML) 20180830
Sophos AV 20180903
SUPERAntiSpyware 20180902
Symantec 20180902
Symantec Mobile Insight 20180831
TACHYON 20180903
Tencent 20180903
TheHacker 20180902
TotalDefense 20180902
TrendMicro 20180903
TrendMicro-HouseCall 20180903
Trustlook 20180903
VBA32 20180831
VIPRE 20180903
ViRobot 20180902
Webroot 20180903
Yandex 20180831
Zillya 20180831
ZoneAlarm by Check Point 20180903
Zoner 20180903
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.puzzlegame.puzzledom. The internal version number of the application is 103. The displayed version string of the application is 7.3.51. The minimum Android API level for the application to run (MinSDKVersion) is 16. The target Android API level for the application to run (TargetSDKVersion) is 27.
Required permissions
android.permission.CHANGE_NETWORK_STATE (change network connectivity)
android.permission.VIBRATE (control vibrator)
android.permission.READ_EXTERNAL_STORAGE (read from external storage)
android.permission.RECEIVE_BOOT_COMPLETED (automatically start at boot)
com.google.android.c2dm.permission.RECEIVE (Unknown permission from android reference)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.WAKE_LOCK (prevent phone from sleeping)
com.puzzlegame.puzzledom.permission.C2D_MESSAGE (C2DM permission.)
android.permission.CHANGE_WIFI_STATE (change Wi-Fi status)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.INTERNET (full Internet access)
com.google.android.finsky.permission.BIND_GET_INSTALL_REFERRER_SERVICE (Unknown permission from android reference)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
com.android.vending.BILLING (Unknown permission from android reference)
android.permission.GET_ACCOUNTS (discover known accounts)
android.permission.DOWNLOAD_WITHOUT_NOTIFICATION (Unknown permission from android reference)
Activities
org.cocos2dx.cpp.AppActivity
com.facebook.FacebookActivity
com.facebook.CustomTabActivity
com.windforce.promotion.PromotionActivity
com.windforce.promotion.VideoActivity
com.windforce.appwall.AppWallActivity
com.windforce.appwall.ExitActivity
com.applovin.adview.AppLovinInterstitialActivity
com.applovin.adview.AppLovinConfirmationActivity
com.mopub.mobileads.RewardedMraidActivity
com.mopub.mobileads.MoPubActivity
com.mopub.mobileads.MraidActivity
com.mopub.common.MoPubBrowser
com.mopub.mobileads.MraidVideoPlayerActivity
com.mopub.common.privacy.ConsentDialogActivity
com.google.android.gms.ads.AdActivity
com.facebook.ads.InterstitialAdActivity
com.ironsource.sdk.controller.ControllerActivity
com.ironsource.sdk.controller.InterstitialActivity
com.ironsource.sdk.controller.OpenUrlActivity
com.adcolony.sdk.AdColonyInterstitialActivity
com.adcolony.sdk.AdColonyAdViewActivity
com.windforce.adplugin.LoadResActivity
com.google.firebase.auth.internal.FederatedSignInActivity
com.google.android.gms.common.api.GoogleApiActivity
com.facebook.ads.AudienceNetworkActivity
com.facebook.CustomTabMainActivity
com.vungle.warren.ui.VungleActivity
com.unity3d.ads.adunit.AdUnitActivity
com.unity3d.ads.adunit.AdUnitTransparentActivity
com.unity3d.ads.adunit.AdUnitTransparentSoftwareActivity
com.unity3d.ads.adunit.AdUnitSoftwareActivity
com.tapjoy.TJAdUnitActivity
com.tapjoy.TJContentActivity
com.tapjoy.mraid.view.ActionHandler
com.tapjoy.mraid.view.Browser
Services
org.cocos2dx.cpp.ServerPushService
org.cocos2dx.cpp.GiftPushService
org.cocos2dx.cpp.ThreeDayService
org.cocos2dx.cpp.SevenDayService
com.google.android.gms.analytics.AnalyticsService
com.google.android.gms.analytics.AnalyticsJobService
com.google.firebase.components.ComponentDiscoveryService
com.google.android.gms.measurement.AppMeasurementService
com.google.android.gms.measurement.AppMeasurementJobService
com.google.firebase.iid.FirebaseInstanceIdService
com.evernote.android.job.v21.PlatformJobService
com.evernote.android.job.v14.PlatformAlarmService
com.evernote.android.job.v14.PlatformAlarmServiceExact
com.evernote.android.job.gcm.PlatformGcmService
com.evernote.android.job.JobRescheduleService
Receivers
com.tenjin.android.TenjinReferrerReceiver
com.windforce.adplugin.NetWorkStateReceiver
com.google.android.gms.analytics.AnalyticsReceiver
com.google.android.gms.measurement.AppMeasurementReceiver
com.google.android.gms.measurement.AppMeasurementInstallReferrerReceiver
com.google.firebase.iid.FirebaseInstanceIdReceiver
com.evernote.android.job.v14.PlatformAlarmReceiver
com.evernote.android.job.JobBootReceiver
com.facebook.CurrentAccessTokenExpirationBroadcastReceiver
com.tapjoy.InstallReferrerReceiver
com.tapjoy.TapjoyReceiver
Providers
com.facebook.FacebookContentProvider
android.support.v4.content.FileProvider
com.crashlytics.android.CrashlyticsInitProvider
com.google.firebase.provider.FirebaseInitProvider
com.facebook.marketing.internal.MarketingInitProvider
com.facebook.internal.FacebookInitProvider
Service-related intent filters
org.cocos2dx.cpp.ThreeDayService
actions: com.dbjtech.waiqin.destroy, android.intent.action.BOOT_COMPLETED, android.intent.action.USER_PRESENT, org.cocos2dx.cpp.PushAction
org.cocos2dx.cpp.ServerPushService
actions: com.dbjtech.waiqin.destroy, android.intent.action.BOOT_COMPLETED, android.intent.action.USER_PRESENT, org.cocos2dx.cpp.PushAction
com.evernote.android.job.gcm.PlatformGcmService
actions: com.google.android.gms.gcm.ACTION_TASK_READY
org.cocos2dx.cpp.SevenDayService
actions: com.dbjtech.waiqin.destroy, android.intent.action.BOOT_COMPLETED, android.intent.action.USER_PRESENT, org.cocos2dx.cpp.PushAction
com.google.firebase.iid.FirebaseInstanceIdService
actions: com.google.firebase.INSTANCE_ID_EVENT
org.cocos2dx.cpp.GiftPushService
actions: com.dbjtech.waiqin.destroy, android.intent.action.BOOT_COMPLETED, android.intent.action.USER_PRESENT, org.cocos2dx.cpp.PushAction
Activity-related intent filters
com.facebook.CustomTabActivity
actions: android.intent.action.VIEW
categories: android.intent.category.DEFAULT, android.intent.category.BROWSABLE
org.cocos2dx.cpp.AppActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
Receiver-related intent filters
com.evernote.android.job.JobBootReceiver
actions: android.intent.action.BOOT_COMPLETED, android.intent.action.QUICKBOOT_POWERON, com.htc.intent.action.QUICKBOOT_POWERON, android.intent.action.MY_PACKAGE_REPLACED
com.evernote.android.job.v14.PlatformAlarmReceiver
actions: com.evernote.android.job.v14.RUN_JOB, net.vrallev.android.job.v14.RUN_JOB
com.google.firebase.iid.FirebaseInstanceIdReceiver
actions: com.google.android.c2dm.intent.RECEIVE
categories: com.puzzlegame.puzzledom
com.facebook.CurrentAccessTokenExpirationBroadcastReceiver
actions: com.facebook.sdk.ACTION_CURRENT_ACCESS_TOKEN_CHANGED
com.tenjin.android.TenjinReferrerReceiver
actions: com.android.vending.INSTALL_REFERRER
com.google.android.gms.measurement.AppMeasurementInstallReferrerReceiver
actions: com.android.vending.INSTALL_REFERRER
com.windforce.adplugin.NetWorkStateReceiver
actions: android.net.conn.CONNECTIVITY_CHANGE
categories: android.intent.category.DEFAULT
com.tapjoy.InstallReferrerReceiver
actions: com.android.vending.INSTALL_REFERRER
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Interesting properties
The studied file contains at least one Portable Executable.
The file under inspection contains at least one ELF file.
Contained files
Compression metadata
Contained files
1623
Uncompressed size
45112162
Highest datetime
1980-00-00 00:00:00
Lowest datetime
1980-00-00 00:00:00
Contained files by extension
png
402
ogg
113
csb
105
xml
66
csv
62
so
4
dex
2
ttf
2
MF
1
gz
1
jpg
1
RSA
1
SF
1
js
1
Contained files by type
PNG
402
unknown
383
OGG
113
XML
93
ELF
4
DEX
2
JPG
1
HTML
1
Portable Executable
1
File identification
MD5 5993237a5453820146a1add2e1ed0089
SHA1 82bab336fde1ef009296e8a9d66878dd6a70672a
SHA256 bcf0d1d07d796b2a34d0e1c43d6f6587d0eaf54a2406b2aed91e50353cd196dc
ssdeep
393216:py9w4ecRIsMXlL072sNvXQyd6S3zoz0kWaYh3595AT2r01YXQ0VU6AZhVD:Ua57o1vgs6soz0ksh359CT2rXclD

File size 26.4 MB ( 27670809 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (60.3%)
Java Archive (16.6%)
Mozilla Firefox browser extension (9.1%)
Mozilla Archive Format (gen) (8.0%)
ZIP compressed archive (4.5%)
Tags
apk contains-pe android contains-elf

VirusTotal metadata
First submission 2018-09-03 05:16:54 UTC ( 6 months, 3 weeks ago )
Last submission 2018-10-06 13:02:05 UTC ( 5 months, 2 weeks ago )
File names puzzledom.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!