× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: fd94669b19afac916b33fd852c446067025725e9a602ac6d0cb1b3122ae3d59c
File name: qr-code-reader-1-7-5.apk
Detection ratio: 0 / 58
Analysis date: 2017-02-27 10:19:58 UTC ( 1 year, 11 months ago ) View latest
Antivirus Result Update
Ad-Aware 20170227
AegisLab 20170227
AhnLab-V3 20170226
Alibaba 20170227
ALYac 20170227
Antiy-AVL 20170227
Arcabit 20170227
Avast 20170227
AVG 20170227
Avira (no cloud) 20170227
AVware 20170227
Baidu 20170227
BitDefender 20170227
Bkav 20170225
CAT-QuickHeal 20170227
ClamAV 20170227
CMC 20170227
Comodo 20170227
CrowdStrike Falcon (ML) 20170130
Cyren 20170227
DrWeb 20170227
Emsisoft 20170227
Endgame 20170222
ESET-NOD32 20170227
F-Prot 20170227
F-Secure 20170227
Fortinet 20170227
GData 20170227
Ikarus 20170227
Sophos ML 20170203
Jiangmin 20170227
K7AntiVirus 20170227
K7GW 20170227
Kaspersky 20170227
Kingsoft 20170227
Malwarebytes 20170227
McAfee 20170225
McAfee-GW-Edition 20170227
Microsoft 20170227
eScan 20170227
NANO-Antivirus 20170227
nProtect 20170227
Panda 20170226
Qihoo-360 20170227
Rising 20170227
Sophos AV 20170227
SUPERAntiSpyware 20170227
Symantec 20170226
Tencent 20170227
TheHacker 20170223
TrendMicro 20170227
TrendMicro-HouseCall 20170227
Trustlook 20170227
VBA32 20170224
VIPRE 20170227
ViRobot 20170227
Webroot 20170227
WhiteArmor 20170222
Yandex 20170225
Zillya 20170224
Zoner 20170227
The file being studied is Android related! APK Android file more specifically. The application's main package name is tw.mobileapp.qrcode.banner. The internal version number of the application is 175. The displayed version string of the application is 1.7.5. The minimum Android API level for the application to run (MinSDKVersion) is 14. The target Android API level for the application to run (TargetSDKVersion) is 23.
Required permissions
android.permission.READ_EXTERNAL_STORAGE (read from external storage)
android.permission.INTERNET (full Internet access)
android.permission.CHANGE_WIFI_STATE (change Wi-Fi status)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.CAMERA (take pictures and videos)
Activities
tw.mobileapp.qrcode.banner.CaptureActivity
tw.mobileapp.qrcode.banner.CaptureDecodeActivity
tw.mobileapp.qrcode.banner.QRIntroduction
tw.mobileapp.qrcode.banner.HistoryView
com.google.android.gms.ads.AdActivity
com.google.android.gms.ads.purchase.InAppPurchaseActivity
com.google.android.gms.common.api.GoogleApiActivity
Activity-related intent filters
tw.mobileapp.qrcode.banner.CaptureActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Contained files
Compression metadata
Contained files
228
Uncompressed size
5412217
Highest datetime
1980-00-00 00:00:00
Lowest datetime
1980-00-00 00:00:00
Contained files by extension
png
196
xml
26
dex
1
MF
1
RSA
1
SF
1
Contained files by type
PNG
196
XML
25
unknown
6
DEX
1
File identification
MD5 80f031f1bc519704c74049e2ff8be8f7
SHA1 fd7600d3961c123b5f988c7c325299bca0e39843
SHA256 fd94669b19afac916b33fd852c446067025725e9a602ac6d0cb1b3122ae3d59c
ssdeep
49152:3QZf5QC33z65p0JvNOIOzHB8wEVWjt76egQpYVBdR8lP:AZhQCT65p0BNSHW4t7FgXfdOlP

File size 2.0 MB ( 2095739 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (73.9%)
Java Archive (20.4%)
ZIP compressed archive (5.6%)
Tags
apk android via-tor dyn-class

VirusTotal metadata
First submission 2016-11-15 01:08:19 UTC ( 2 years, 3 months ago )
Last submission 2018-01-15 03:07:30 UTC ( 1 year, 1 month ago )
File names QR_Code_Reader_v1.7.5_apkpure.com.apk
FKspZJ56LtDbBkLPsL1d20161126-31803-1gv4ynz
qr-code-reader.apk
qr-code-reader-1-7-5.apk
tw.mobileapp.qrcode.banner-1.apk
80f031f1bc519704c74049e2ff8be8f7
qr-code-reader.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Permissions checked
android.permission.ACCESS_NETWORK_STATE:tw.mobileapp.qrcode.banner
android.permission.INTERNET:tw.mobileapp.qrcode.banner
Started receivers
android.intent.action.USER_PRESENT
android.intent.action.SCREEN_OFF
android.intent.action.BATTERY_CHANGED
Opened files
https:/googleads.g.doubleclick.net/mads/static/mad/sdk/native/sdk-core-v40.html
/data/data/tw.mobileapp.qrcode.banner/cache/1460683162801.jar
/data/data/tw.mobileapp.qrcode.banner/cache
/data/data/tw.mobileapp.qrcode.banner/cache/1460683162801.dex
/data/data/tw.mobileapp.qrcode.banner/databases/com.google.android.gms.ads.db
Accessed files
/data/data/tw.mobileapp.qrcode.banner/cache/1460683162801.jar
/data/data/tw.mobileapp.qrcode.banner/cache/1460683162801.tmp
/data/data/tw.mobileapp.qrcode.banner/cache/1460683162801.dex
Interesting calls
Calls APIs that provide access to information about the telephony services on the device. Applications can use such methods to determine telephony services and states, as well as to access some types of subscriber information.
Dynamically loaded classes
com.google.android.ads.zxxz.h
com.google.android.ads.zxxz.m
com.google.android.ads.zxxz.g
com.google.android.ads.zxxz.c
com.google.android.ads.zxxz.d
com.google.android.ads.zxxz.l
com.google.android.ads.zxxz.o
com.google.android.ads.zxxz.b
com.google.android.ads.zxxz.a
Accessed URIs
geo:0,0?q=donuts
http://www.google.com
market://details?id=com.google.android.gms.ads
https://googleads.g.doubleclick.net/mads/static/mad/sdk/native/sdk-core-v40.html