× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: c7160bba07096d5db0082218299085e393eb9093e518f86a84c73462b694aac4
File name: 682864_aa1142_com.animoca.google.doraemonpuzzle-34.apk
Detection ratio: 0 / 62
Analysis date: 2017-07-19 14:23:08 UTC ( 1 year, 10 months ago ) View latest
Antivirus Result Update
Ad-Aware 20170719
AegisLab 20170719
AhnLab-V3 20170719
Alibaba 20170719
ALYac 20170719
Antiy-AVL 20170719
Arcabit 20170719
Avast 20170719
AVG 20170719
Avira (no cloud) 20170719
AVware 20170719
Baidu 20170719
BitDefender 20170719
Bkav 20170719
CAT-QuickHeal 20170719
ClamAV 20170719
CMC 20170719
Comodo 20170719
CrowdStrike Falcon (ML) 20170710
Cylance 20170719
Cyren 20170719
DrWeb 20170719
Emsisoft 20170719
Endgame 20170713
ESET-NOD32 20170719
F-Prot 20170719
F-Secure 20170719
Fortinet 20170719
GData 20170719
Ikarus 20170719
Sophos ML 20170607
Jiangmin 20170719
K7AntiVirus 20170719
K7GW 20170719
Kaspersky 20170719
Kingsoft 20170719
Malwarebytes 20170719
MAX 20170719
McAfee 20170719
McAfee-GW-Edition 20170719
Microsoft 20170719
eScan 20170719
NANO-Antivirus 20170719
nProtect 20170719
Palo Alto Networks (Known Signatures) 20170719
Panda 20170719
Qihoo-360 20170719
Rising 20170719
SentinelOne (Static ML) 20170718
Sophos AV 20170719
SUPERAntiSpyware 20170719
Symantec 20170719
Symantec Mobile Insight 20170719
Tencent 20170719
TheHacker 20170719
TotalDefense 20170719
TrendMicro 20170719
TrendMicro-HouseCall 20170719
Trustlook 20170719
VBA32 20170719
VIPRE 20170719
ViRobot 20170719
Webroot 20170719
WhiteArmor 20170713
Yandex 20170719
Zillya 20170719
ZoneAlarm by Check Point 20170719
Zoner 20170719
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.animoca.google.doraemonpuzzle. The internal version number of the application is 34. The displayed version string of the application is 1.3.1. The minimum Android API level for the application to run (MinSDKVersion) is 9. The target Android API level for the application to run (TargetSDKVersion) is 23.
Required permissions
android.permission.VIBRATE (control vibrator)
android.permission.USE_CREDENTIALS (use the authentication credentials of an account)
com.google.android.c2dm.permission.RECEIVE (Unknown permission from android reference)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.WAKE_LOCK (prevent phone from sleeping)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.INTERNET (full Internet access)
com.animoca.google.doraemonpuzzle.permission.C2D_MESSAGE (C2DM permission.)
com.android.vending.CHECK_LICENSE (Unknown permission from android reference)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
com.android.vending.BILLING (Unknown permission from android reference)
Activities
com.dreamcortex.DCPortableGameClient.DCPortableGameClient
com.dreamcortex.DCPortableGameClient.utility.WebViewActivity
muneris.android.core.ui.MunerisActivity
com.flurry.android.FlurryFullscreenTakeoverActivity
com.tapjoy.TJCOffersWebView
com.tapjoy.TapjoyFullScreenAdWebView
com.tapjoy.TapjoyDailyRewardAdWebView
com.tapjoy.TapjoyVideoView
com.tapjoy.TJAdUnitView
com.tapjoy.mraid.view.ActionHandler
com.tapjoy.mraid.view.Browser
com.inmobi.androidsdk.IMBrowserActivity
com.google.android.gms.ads.AdActivity
com.jirbo.adcolony.AdColonyOverlay
com.jirbo.adcolony.AdColonyFullscreen
com.jirbo.adcolony.AdColonyBrowser
com.facebook.LoginActivity
com.facebook.ads.InterstitialAdActivity
com.sponsorpay.publisher.ofw.SPOfferWallActivity
com.sponsorpay.publisher.mbe.SPBrandEngageActivity
com.supersonicads.sdk.controller.ControllerActivity
com.supersonicads.sdk.controller.InterstitialActivity
com.supersonicads.sdk.controller.OpenUrlActivity
org.scribe.ACTIVITY_ENTRY_NAME
Services
com.inmobi.commons.internal.ActivityRecognitionManager
com.google.analytics.tracking.android.CampaignTrackingService
org.OpenUDID.OpenUDID_service
muneris.android.cppwrapper.MunerisPushNotificationServices
Receivers
com.dreamcortex.DCPortableGameClient.utility.NotificationBroadcastReceiver
muneris.android.installationtracking.google.Receiver
muneris.android.cppwrapper.MunerisPushNotificationBroadcastReceiver
Providers
com.animoca.google.doraemonpuzzle.SharePhotoProvider
Service-related intent filters
org.OpenUDID.OpenUDID_service
actions: org.OpenUDID.GETUDID
Activity-related intent filters
com.dreamcortex.DCPortableGameClient.DCPortableGameClient
actions: android.intent.action.MAIN, android.intent.action.VIEW
categories: android.intent.category.LAUNCHER, android.intent.category.DEFAULT, android.intent.category.BROWSABLE
Receiver-related intent filters
muneris.android.installationtracking.google.Receiver
actions: com.android.vending.INSTALL_REFERRER
muneris.android.cppwrapper.MunerisPushNotificationBroadcastReceiver
actions: com.google.android.c2dm.intent.RECEIVE, com.google.android.c2dm.intent.REGISTRATION
categories: com.animoca.google.doraemonpuzzle
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Contained files
Compression metadata
Contained files
3112
Uncompressed size
11649168
Highest datetime
2016-09-02 16:04:06
Lowest datetime
2016-09-02 16:03:12
Contained files by extension
ccb
58
ogg
5
m4a
5
jpg
2
ttf
2
xml
1
crt
1
Contained files by type
unknown
991
OGG
5
XML
2
JPG
2
Execution parents
File identification
MD5 bb61175dffce1efd323029cd0c09f812
SHA1 cf86acb45f32c5ef51ecb35f72d3b007997240fb
SHA256 c7160bba07096d5db0082218299085e393eb9093e518f86a84c73462b694aac4
ssdeep
786432:ysIBtQF7l1pbKFAOY/qh8RSv++grFNbkre+k+9Rwx1xXwCEMfMJ:ysInQF7nBKFlY/doejwef+9RuW7MfW

File size 42.8 MB ( 44852725 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (63.6%)
Java Archive (17.5%)
Sweet Home 3D design (generic) (12.7%)
ZIP compressed archive (4.8%)
PrintFox/Pagefox bitmap (var. P) (1.2%)
Tags
apk android

VirusTotal metadata
First submission 2016-09-03 07:03:39 UTC ( 2 years, 8 months ago )
Last submission 2019-03-30 03:34:33 UTC ( 1 month, 3 weeks ago )
File names com.animoca.google.doraemonpuzzle.apk
doraemon-gadget-rush.apk
682864_aa1142_com.animoca.google.doraemonpuzzle-34.apk
base.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!