Detail of (org.Armongovia2G)

certificate rejected

Added Reason Hash Application Reference
February 14, 2018 - 10:16 linked to malicious app(s) 13:B6:71:39:8A:4F:DA:2F:AD:A2:63:D9:36:21:16:19:39:71:0B:53:9F:05:04:7E:13:BB:49:53:17:2F:54:BD com.iSkatingMadnessP

Apk record

Generated on: April 26, 2018 - 16:30

getjar

org.Armongovia2G ( 0 conflicts )
package report
label report
1
1.0

signature details
13:B6:71:39:8A:4F:DA:2F:AD:A2:63:D9:36:21:16:19:39:71:0B:53:9F:05:04:7E:13:BB:49:53:17:2F:54:BD
D7:82:EC:4C:EE:30:E1:4C:C8:A8:8D:A8:1A:D4:38:42:B7:B6:E0:5F:83:13:95:87:FA:13:B5:FE:BA:A0:00:25

check on

Virus check

Request a check

25 Used permissions

Name
android.permission.ACCESS_NETWORK_STATE
android.permission.READ_PHONE_STATE
android.permission.ACCESS_COARSE_LOCATION
android.permission.ACCESS_FINE_LOCATION
android.permission.ACCESS_LOCATION_EXTRA_COMMANDS
android.permission.WAKE_LOCK
android.permission.RECEIVE_BOOT_COMPLETED
android.permission.INTERNET
android.permission.ACCESS_WIFI_STATE
com.android.browser.permission.WRITE_HISTORY_BOOKMARKS
com.android.browser.permission.READ_HISTORY_BOOKMARKS
com.android.launcher.permission.INSTALL_SHORTCUT
com.android.launcher.permission.UNINSTALL_SHORTCUT
com.android.launcher.permission.READ_SETTINGS
com.htc.launcher.permission.READ_SETTINGS
com.motorola.launcher.permission.READ_SETTINGS
com.motorola.dlauncher.permission.READ_SETTINGS
com.fede.launcher.permission.READ_SETTINGS
com.lge.launcher.permission.READ_SETTINGS
org.adw.launcher.permission.READ_SETTINGS
com.motorola.launcher.permission.INSTALL_SHORTCUT
com.motorola.dlauncher.permission.INSTALL_SHORTCUT
com.lge.launcher.permission.INSTALL_SHORTCUT
android.permission.VIBRATE
android.permission.WRITE_EXTERNAL_STORAGE

Extracted data

Native libraries 3

NameFingerprint
libgdx.so 5a7c163ab2a87a740a9e3dd47eaf837703b963f676402033ac93fea8c738f5a0 details
libgdx.so 8ee3f71088adf422a5213a0ff232f347c2e1553bf8625498034550c32a47d874 details
libandroidgl20.so edb91b744008a69bac7bc4beb946b3c0a30a6be82e1444234c413ec65a8029cc details

Exposed surfaces 0

Analyzed on : never

Surface typeSurface NamePermissionMetadata
undisclosed

Extracted data from manifest manifest details

Generated on: April 26, 2018 - 17:02

Used permissions 25

Name
android.permission.ACCESS_NETWORK_STATE
android.permission.READ_PHONE_STATE
android.permission.ACCESS_COARSE_LOCATION
android.permission.ACCESS_FINE_LOCATION
android.permission.ACCESS_LOCATION_EXTRA_COMMANDS
android.permission.WAKE_LOCK
android.permission.RECEIVE_BOOT_COMPLETED
android.permission.INTERNET
android.permission.ACCESS_WIFI_STATE
com.android.browser.permission.WRITE_HISTORY_BOOKMARKS
com.android.browser.permission.READ_HISTORY_BOOKMARKS
com.android.launcher.permission.INSTALL_SHORTCUT
com.android.launcher.permission.UNINSTALL_SHORTCUT
com.android.launcher.permission.READ_SETTINGS
com.htc.launcher.permission.READ_SETTINGS
com.motorola.launcher.permission.READ_SETTINGS
com.motorola.dlauncher.permission.READ_SETTINGS
com.fede.launcher.permission.READ_SETTINGS
com.lge.launcher.permission.READ_SETTINGS
org.adw.launcher.permission.READ_SETTINGS
com.motorola.launcher.permission.INSTALL_SHORTCUT
com.motorola.dlauncher.permission.INSTALL_SHORTCUT
com.lge.launcher.permission.INSTALL_SHORTCUT
android.permission.VIBRATE
android.permission.WRITE_EXTERNAL_STORAGE

Custom permissions 0

NameLevelGroup

Custom permission groups 0

Name

Services 2

Name
com.apperhand.device.android.AndroidSDKProvider
com.airpush.android.PushService

Receivers 6

Name
org.ArmyPhysicsAdventureG.BootReceiver
com.Leadbolt.AdNotification
com.airpush.android.UserDetailsReceiver
com.airpush.android.MessageReceiver
com.airpush.android.DeliveryReceiver
org.ArmyPhysicsAdventureG.BootReceiver

Providers 0

Name

Activities 2

Name
org.ArmyPhysicsAdventureG.Mouse
com.airpush.android.PushAds

Version: 2019-06-20 20:24:52

Reports

get a comprensive and general report regarding this app

Behavioral Report: get the observed behavior of this app

Network Report: see where this apps (try to) connect to

Permission Report: see what this apps tries to access on your phone

Signing Report: see how this apps is signed

Analysis

shared User Id: this apk does not have sharedUserId

Network: in-depth network analysis
not generated

Virtualization: in-depth virtualization capability analysis
not generated