× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: c883728eb4828a342ee0be37f87635607ff4530481380e417139380ed3caf2d9
File name: file
Detection ratio: 0 / 62
Analysis date: 2017-09-22 05:18:31 UTC ( 1 year, 6 months ago ) View latest
Antivirus Result Update
Ad-Aware 20170922
AegisLab 20170922
AhnLab-V3 20170922
Alibaba 20170911
ALYac 20170922
Antiy-AVL 20170922
Arcabit 20170922
Avast 20170922
Avast-Mobile 20170921
AVG 20170922
Avira (no cloud) 20170921
AVware 20170922
Baidu 20170922
BitDefender 20170922
CAT-QuickHeal 20170921
ClamAV 20170922
CMC 20170920
Comodo 20170922
CrowdStrike Falcon (ML) 20170804
Cylance 20170922
Cyren 20170922
DrWeb 20170922
Emsisoft 20170922
Endgame 20170821
ESET-NOD32 20170922
F-Prot 20170922
F-Secure 20170922
Fortinet 20170922
GData 20170922
Ikarus 20170921
Sophos ML 20170914
Jiangmin 20170922
K7AntiVirus 20170921
K7GW 20170922
Kaspersky 20170921
Kingsoft 20170922
Malwarebytes 20170922
MAX 20170922
McAfee 20170922
McAfee-GW-Edition 20170921
Microsoft 20170922
eScan 20170922
NANO-Antivirus 20170922
nProtect 20170922
Palo Alto Networks (Known Signatures) 20170922
Panda 20170921
Qihoo-360 20170922
Rising 20170922
SentinelOne (Static ML) 20170806
Sophos AV 20170922
SUPERAntiSpyware 20170922
Symantec 20170922
Symantec Mobile Insight 20170922
Tencent 20170922
TheHacker 20170921
TotalDefense 20170921
TrendMicro 20170922
TrendMicro-HouseCall 20170922
Trustlook 20170922
VBA32 20170921
VIPRE 20170922
ViRobot 20170922
Webroot 20170922
WhiteArmor 20170829
Yandex 20170908
Zillya 20170921
ZoneAlarm by Check Point 20170922
Zoner 20170922
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.CrazyRunGame1.Templeqqq. The internal version number of the application is 12. The displayed version string of the application is 2.1. The minimum Android API level for the application to run (MinSDKVersion) is 9. The target Android API level for the application to run (TargetSDKVersion) is 17.
Required permissions
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.VIBRATE (control vibrator)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.INTERNET (full Internet access)
Activities
com.unity3d.player.UnityPlayerProxyActivity
com.unity3d.player.UnityPlayerActivity
com.unity3d.player.UnityPlayerNativeActivity
com.unity3d.player.VideoPlayer
com.joymeng.PaymentSdkV2.activity.ExchangeActivity
com.joymeng.PaymentSdkV2.activity.FreeKeyActivity
com.sprinkle.ads.AdActivity
com.letang.shellad.ui.MoreGameActivity
com.inmobi.androidsdk.IMBrowserActivity
com.chartboost.sdk.CBImpressionActivity
com.playhaven.android.view.FullScreen
com.google.android.gms.ads.AdActivity
com.ltad.Tools.DialogUtil
com.unity3d.ads.android.view.UnityAdsFullscreenActivity
com.facebook.ads.InterstitialAdActivity
Receivers
com.inmobi.commons.analytics.androidsdk.IMAdTrackerReceiver
com.playhaven.android.push.PushReceiver
Activity-related intent filters
com.playhaven.android.view.FullScreen
actions: android.intent.action.VIEW
categories: android.intent.category.DEFAULT
com.unity3d.player.UnityPlayerActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
Receiver-related intent filters
com.playhaven.android.push.PushReceiver
actions: android.intent.action.VIEW
categories: com.playhaven.android
com.inmobi.commons.analytics.androidsdk.IMAdTrackerReceiver
actions: com.android.vending.INSTALL_REFERRER
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Interesting properties
The studied file contains at least one Portable Executable.
The file under inspection contains at least one ELF file.
Contained files
Compression metadata
Contained files
145
Uncompressed size
36289818
Highest datetime
2017-02-15 10:39:02
Lowest datetime
2017-02-15 10:38:02
Contained files by extension
png
13
dll
10
so
3
xml
2
txt
2
dex
1
MF
1
RSA
1
SF
1
PNG
1
Contained files by type
unknown
115
PNG
14
Portable Executable
10
ELF
3
XML
2
DEX
1
File identification
MD5 2899432d28c8dc14feee8a1d55173f26
SHA1 5153e4bacdf5fac247e82533d2f7248eb8541faa
SHA256 c883728eb4828a342ee0be37f87635607ff4530481380e417139380ed3caf2d9
ssdeep
393216:1/VTNR2u+Om1EFczIcKcH1ls/TNE0DH+5Nv/pZWuGT4dACLZn0:BRWOm1pzr2xXH+5hxZWT0dACLZn0

File size 14.6 MB ( 15338319 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (91.3%)
ZIP compressed archive (6.9%)
PrintFox/Pagefox bitmap (var. P) (1.7%)
Tags
apk contains-pe android contains-elf

VirusTotal metadata
First submission 2017-02-15 14:32:16 UTC ( 2 years, 1 month ago )
Last submission 2018-10-12 08:41:30 UTC ( 5 months, 2 weeks ago )
File names com.CrazyRunGame1.Templeqqq.apk
base.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Opened files
APP_ASSETS/bin/Data/settings.xml
APP_ASSETS/gpStatement.txt
Accessed files
/data/app/com.CrazyRunGame1.Templeqqq-1.apk/assets/bin/Data/settings.xml