× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: fce5d67df935d3f24c7801682e3769e492a8b6aca48aae1946ce7e139056b537
File name: com.wAngryBirdsRio_1332280933.apk
Detection ratio: 2 / 44
Analysis date: 2012-11-14 21:55:48 UTC ( 5 years ago ) View latest
Antivirus Result Update
F-Secure Application:Android/FakeApp 20121114
VIPRE Trojan.AndroidOS.FakeFlash.a (v) 20121114
Yandex 20121114
AhnLab-V3 20121114
AntiVir 20121114
Antiy-AVL 20121113
Avast 20121114
AVG 20121114
BitDefender 20121114
ByteHero 20121113
CAT-QuickHeal 20121114
ClamAV 20121114
Commtouch 20121114
Comodo 20121114
DrWeb 20121114
Emsisoft 20121114
eSafe 20121112
ESET-NOD32 20121114
F-Prot 20121114
Fortinet 20121114
GData 20121114
Ikarus 20121114
Jiangmin 20121114
K7AntiVirus 20121114
Kaspersky 20121114
Kingsoft 20121112
McAfee 20121114
McAfee-GW-Edition 20121114
Microsoft 20121114
eScan 20121114
Norman 20121114
nProtect 20121114
Panda 20121114
PCTools 20121114
Rising 20121114
Sophos AV 20121114
SUPERAntiSpyware 20121114
Symantec 20121114
TheHacker 20121113
TotalDefense 20121114
TrendMicro 20121114
TrendMicro-HouseCall 20121114
VBA32 20121114
ViRobot 20121114
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.wAngryBirdsRio. The internal version number of the application is 1332280933. The displayed version string of the application is 0.33.13322.80933. The minimum Android API level for the application to run (MinSDKVersion) is 7.
Required permissions
com.wAngryBirdsRio.permission.C2D_MESSAGE (C2DM permission.)
android.webkit.permission.PLUGIN (Unknown permission from android reference)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.INTERNET (full Internet access)
com.google.android.c2dm.permission.RECEIVE (Unknown permission from android reference)
Activities
com.wAngryBirdsRio.MainNavigationActivity
com.wAngryBirdsRio.MessageViewer
Services
com.wAngryBirdsRio.Server.C2DMClientReceiver
Receivers
com.google.android.c2dm.C2DMBroadcastReceiver
Activity-related intent filters
com.wAngryBirdsRio.MainNavigationActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER, android.intent.category.DEFAULT
Receiver-related intent filters
com.google.android.c2dm.C2DMBroadcastReceiver
actions: com.google.android.c2dm.intent.RECEIVE, com.google.android.c2dm.intent.REGISTRATION
categories: com.wAngryBirdsRio
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Contained files
Compression metadata
Contained files
46
Uncompressed size
190709
Highest datetime
2012-03-20 18:02:24
Lowest datetime
2012-03-20 18:02:20
Contained files by extension
png
19
xml
18
dex
1
MF
1
RSA
1
js
1
SF
1
Contained files by type
PNG
19
XML
18
unknown
4
HTML
3
DEX
1
JavaScript
1
File identification
MD5 5b9e82f7b7a73f815ccc301bd2ab77a4
SHA1 76ec57b773d22705c75844d32afd96b752bba775
SHA256 fce5d67df935d3f24c7801682e3769e492a8b6aca48aae1946ce7e139056b537
ssdeep
1536:AUInxD6QliSa1KJEqc8SECMGukFrXA9AGNXVmrI//zCRlbcySOV9lWfec0M:AUOxpLCgEqc8S7X3NqzKZiftH

File size 115.6 KB ( 118404 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (73.9%)
Java Archive (20.4%)
ZIP compressed archive (5.6%)
Tags
apk android

VirusTotal metadata
First submission 2012-11-14 21:55:48 UTC ( 5 years ago )
Last submission 2015-03-04 02:33:11 UTC ( 2 years, 8 months ago )
File names com.wAngryBirdsRio_1332280933.apk
com.wAngryBirdsRio_1332280933.apk
5b9e82f7b7a73f815ccc301bd2ab77a4.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!