fasthdtv.apk
This report is generated from a file or URL submitted to this webservice on May 19th 2024 06:22:37 (UTC)
Report generated by
Falcon Sandbox v8.10 © Hybrid Analysis
Incident Response
Risk Assessment
- Remote Access
- Contains a remote desktop related string
- Fingerprint
-
Has the ability to get the wifi MAC address (may be used to fingerprint device)
Has the ability to identify network operator related data
Has the ability to read the device ID (e.g. IMEI or ESN)
Indicators
Not all malicious and suspicious indicators are displayed. Get your own cloud service or the full version to view all details.
-
Malicious Indicators 3
-
General
-
Has the ability to read the device ID (e.g. IMEI or ESN)
- details
-
Found invoke in "com.gemini.play.MGplayer.smali" to "android.telephony.TelephonyManager.getSimSerialNumber"
Found invoke in "com.gemini.play.MGplayer.smali" to "android.telephony.TelephonyManager.getDeviceId"
Found invoke in "com.gemini.play.PhoneInfo.smali" to "android.telephony.TelephonyManager.getSubscriberId"
Found invoke in "com.gemini.play.PhoneInfo.smali" to "android.telephony.TelephonyManager.getLine1Number"
Found invoke in "com.gemini.play.PhoneInfo.smali" to "android.telephony.TelephonyManager.getDeviceId"
Found invoke in "com.gemini.play.PhoneInfo.smali" to "android.telephony.TelephonyManager.getSimSerialNumber" - source
- Static Parser
- relevance
- 3/10
-
Has the ability to read the device ID (e.g. IMEI or ESN)
-
Installation/Persistance
-
Has the ability to execute code after reboot
- details
- Permission request for "android.permission.RECEIVE_BOOT_COMPLETED"
- source
- Static Parser
- relevance
- 10/10
-
Has the ability to execute code after reboot
-
Unusual Characteristics
-
Found a reference to the private ITelephony interface (may be used to block phone calls)
- details
- "getITelephony" (Indicator: "getitelephony"; File: "MobileDataManager.smali")
- source
- File/Memory
- relevance
- 3/10
-
Found a reference to the private ITelephony interface (may be used to block phone calls)
-
Suspicious Indicators 14
-
Cryptographic Related
-
Found a cryptographic related string
- details
-
"RC4" (Indicator: "rc4"; File: "NTLMEngineImpl.smali")
"DES" (Indicator: "des"; File: "NTLMEngineImpl.smali") - source
- File/Memory
- relevance
- 10/10
-
Found a cryptographic related string
-
Environment Awareness
-
Possibly tries to implement anti-virtualization techniques
- details
- "SHA1-Digest: Rw9CkTMJtNMzBVbOxhBcz8/ZKHs=" (Indicator: "vbox")
- source
- File/Memory
- relevance
- 4/10
-
Possibly tries to implement anti-virtualization techniques
-
General
-
Found a potential E-Mail address in binary/memory
- details
- Pattern match: "o@kd.q"
- source
- File/Memory
- relevance
- 3/10
-
Has the ability to invoke native commands
- details
-
Found invoke in "net.lingala.zip4j.util.Zip4jUtil.smali" to "java.lang.Runtime.exec"
Found invoke in "com.gemini.play.MGplayer.smali" to "java.lang.Runtime.exec"
Found invoke in "com.gemini.play.MGplayer$2.smali" to "java.lang.Runtime.exec"
Found invoke in "com.gemini.custom.MACUtils.smali" to "java.lang.Runtime.exec"
Found invoke in "com.memo.cable.ShellUtils.smali" to "java.lang.Runtime.exec"
Found invoke in "org.videolan.vlc.util.Logcat.smali" to "java.lang.Runtime.exec" - source
- Static Parser
- relevance
- 3/10
-
Uses java reflection classes
- details
-
Found invoke in "com.gemini.play.WifiAP.smali" to "java.lang.reflect.Method.invoke"
Found invoke in "com.google.android.exoplayer.audio.AudioTrack.smali" to "java.lang.reflect.Method.invoke"
Found invoke in "com.google.android.exoplayer.util.Util.smali" to "java.lang.reflect.Method.invoke"
Found invoke in "com.memo.TestXlog.smali" to "java.lang.reflect.Method.invoke"
Found invoke in "com.memo.connection.MobileDataManager.smali" to "java.lang.reflect.Method.invoke"
Found invoke in "com.memo.connection.MobileDataManager.smali" to "java.lang.reflect.Field.get"
Found invoke in "com.memo.connection.MemoWifiManager.smali" to "java.lang.reflect.Method.invoke"
Found invoke in "com.memo.connection.MemoWifiManager.smali" to "java.lang.reflect.Field.get"
Found invoke in "com.memo.connection.WifiHotspotManager.smali" to "java.lang.reflect.Method.invoke" - source
- Static Parser
- relevance
- 3/10
-
Found a potential E-Mail address in binary/memory
-
Installation/Persistance
-
Has the ability to access external storage
- details
-
Found invoke in "com.gemini.play.MGplayer.smali" to "android.os.Environment.getExternalStorageDirectory"
Found invoke in "com.gemini.play.MGplayer.smali" to "android.os.Environment.getExternalStorageState"
Found invoke in "com.gemini.custom.quanxing.smali" to "android.os.Environment.getExternalStorageDirectory" - source
- Static Parser
- relevance
- 3/10
-
Has the ability to access external storage
-
Network Related
-
Found potential IP address in binary/memory
- details
-
Heuristic match: "2.6.1.4.2ZL>"
Heuristic match: "http://127.0.0.1:"
Heuristic match: "#EXTM3U\n#EXT-X-ALLOW-CACHE:YES\n#EXT-X-TARGETDURATION:72000\n#EXT-X-MEDIA-SEQUENCE:110236\n#EXTINF:1,\nhttp://127.0.0.1:"
Heuristic match: "#EXTM3U\n#EXT-X-TARGETDURATION:3600\n#EXT-X-VERSION:2\n#EXT-X-DISCONTINUITY\n#EXTINF:3600,\nhttp://127.0.0.1:"
Heuristic match: "#EXTM3U\n#EXT-X-ALLOW-CACHE:YES\n#EXT-X-TARGETDURATION:72000\n#EXT-X-MEDIA-SEQUENCE:1\n#EXTINF:70000,\nhttp://127.0.0.1:"
Heuristic match: "http://127.0.0.1:23456/playlist.m3u8"
Heuristic match: "#EXTM3U\n#EXT-X-TARGETDURATION:1\n#EXT-X-VERSION:2\n#EXT-X-DISCONTINUITY\n#EXTINF:10,\nhttp://127.0.0.1:"
Heuristic match: "rtmp://22.59.49.10/live/livestream"
Heuristic match: "http://127.0.0.1:8084"
Heuristic match: "http://174.127.103.148:9000/exit.asp"
Heuristic match: "http://211.23.22.16:8080/forcetech/login?mac="
Heuristic match: "http://211.23.22.16:8080/forcetech/member"
Heuristic match: "http://211.23.22.16:8080/forcetech/p2plink"
Heuristic match: "http://211.23.22.16:8080/forcetech/myproduct"
"255.255.255.255"
Heuristic match: "udpsocket send 255.255.255.255"
"239.255.255.250"
"127.0.0.1"
"127.0.0.255" - source
- File/Memory
- relevance
- 3/10
-
Has the ability to open an internet connection
- details
-
Found invoke in "com.gemini.play.Ghttp.smali" to "java.net.URL.openConnection"
Found invoke in "com.gemini.play.VODplayer.smali" to "java.net.URL.openConnection"
Found invoke in "com.gemini.play.MGplayer.smali" to "java.net.URL.openConnection"
Found invoke in "com.gemini.play.GHttps.smali" to "java.net.URL.openConnection"
Found invoke in "com.gemini.play.MyHomeBar2.smali" to "java.net.URL.openConnection" - source
- Static Parser
- relevance
- 3/10
-
Found potential IP address in binary/memory
-
Unusual Characteristics
-
Has the ability to get the wifi MAC address (may be used to fingerprint device)
- details
-
Found invoke in "com.gemini.play.MGplayer.smali" to "android.net.wifi.WifiInfo.getMacAddress"
Found invoke in "com.gemini.papapa.ValidateActivity$PluginInterface.smali" to "android.net.wifi.WifiInfo.getMacAddress"
Found invoke in "com.memo.connection.WifiAdmin.smali" to "android.net.wifi.WifiInfo.getMacAddress" - source
- Static Parser
- relevance
- 10/10
-
Has the ability to get the wifi MAC address (may be used to fingerprint device)
-
Hiding 5 Suspicious Indicators
- All indicators are available only in the private webservice or standalone version
-
Informative 4
-
External Systems
-
Sample was identified as clean by Antivirus engines
- details
- 0/62 Antivirus vendors marked sample as malicious (0% detection rate)
- source
- External System
- relevance
- 10/10
-
Sample was identified as clean by Antivirus engines
-
General
-
Tests the internet connectivity
- details
-
Found invoke in "com.gemini.play.MGplayer.smali" to "android.net.ConnectivityManager.getActiveNetworkInfo"
Found invoke in "com.gemini.play.MGplayer.smali" to "android.net.ConnectivityManager.getAllNetworkInfo"
Found invoke in "com.gemini.play.MGplayer.smali" to "android.net.NetworkInfo.getState"
Found invoke in "com.gemini.play.MGplayer.smali" to "android.net.wifi.WifiManager.getConnectionInfo"
Found invoke in "com.gemini.papapa.ValidateActivity$PluginInterface.smali" to "android.net.wifi.WifiManager.getConnectionInfo"
Found invoke in "com.memo.connection.MemoWifiManager.smali" to "android.net.wifi.WifiManager.getConnectionInfo"
Found invoke in "com.memo.connection.MemoWifiManager.smali" to "android.net.wifi.WifiManager.isWifiEnabled"
Found invoke in "com.memo.connection.MemoWifiManager.smali" to "android.net.NetworkInfo.isConnectedOrConnecting"
Found invoke in "com.memo.connection.MemoWifiManager.smali" to "android.net.NetworkInfo.isConnected"
Found invoke in "com.memo.connection.MemoWifiManager.smali" to "android.net.ConnectivityManager.getActiveNetworkInfo"
Found invoke in "com.memo.connection.WifiAdmin.smali" to "android.net.wifi.WifiManager.getConnectionInfo"
Found invoke in "com.memo.connection.WifiAdmin.smali" to "android.net.wifi.WifiManager.isWifiEnabled" - source
- Static Parser
- relevance
- 3/10
-
Tests the internet connectivity
-
Installation/Persistance
-
Dropped files
- details
-
"ABC123.RSA" has type "data"
"ABC123.SF" has type "ASCII text with CRLF line terminators"
"AndroidManifest.xml" has type "Android binary XML"
"MANIFEST.MF" has type "ASCII text with CRLF line terminators"
"libOMX.11.so" has type "ELF 32-bit LSB shared object ARM EABI5 version 1 (SYSV) dynamically linked stripped"
"libOMX.14.so" has type "ELF 32-bit LSB shared object ARM EABI5 version 1 (SYSV) dynamically linked stripped"
"libOMX.18.so" has type "ELF 32-bit LSB shared object ARM EABI5 version 1 (SYSV) dynamically linked stripped"
"libOMX.9.so" has type "ELF 32-bit LSB shared object ARM EABI5 version 1 (SYSV) dynamically linked stripped"
"libanw.10.so" has type "ELF 32-bit LSB shared object ARM EABI5 version 1 (SYSV) dynamically linked interpreter /system/bin/linker stripped"
"libanw.13.so" has type "ELF 32-bit LSB shared object ARM EABI5 version 1 (SYSV) dynamically linked interpreter /system/bin/linker stripped"
"libanw.14.so" has type "ELF 32-bit LSB shared object ARM EABI5 version 1 (SYSV) dynamically linked interpreter /system/bin/linker stripped"
"libanw.18.so" has type "ELF 32-bit LSB shared object ARM EABI5 version 1 (SYSV) dynamically linked interpreter /system/bin/linker stripped"
"libanw.21.so" has type "ELF 32-bit LSB shared object ARM EABI5 version 1 (SYSV) dynamically linked interpreter /system/bin/linker stripped"
"libc++_shared.so" has type "ELF 32-bit LSB shared object ARM EABI5 version 1 (SYSV) dynamically linked interpreter /system/bin/linker BuildID[sha1]=d4a6ff70a90306d2373a2898e31ce535bcba00d8 stripped"
"libcompat.7.so" has type "ELF 32-bit LSB shared object ARM EABI5 version 1 (SYSV) dynamically linked interpreter /system/bin/linker stripped"
"libcustom3.so" has type "ELF 32-bit LSB shared object ARM EABI5 version 1 (SYSV) dynamically linked stripped"
"libffmpeg.so" has type "ELF 32-bit LSB shared object ARM EABI5 version 1 (SYSV) dynamically linked interpreter /system/bin/linker stripped"
"libforcetv.so" has type "ELF 32-bit LSB shared object ARM EABI5 version 1 (SYSV) dynamically linked stripped"
"libgemini.so" has type "ELF 32-bit LSB shared object ARM EABI5 version 1 (SYSV) dynamically linked stripped"
"libghttp.so" has type "ELF 32-bit LSB shared object ARM EABI5 version 1 (SYSV) dynamically linked stripped" - source
- Binary File
- relevance
- 3/10
-
Dropped files
-
Network Related
-
Found potential URL in binary/memory
- details
-
Heuristic match: "~Ch#&7.uA"
Heuristic match: "8VL9kZ.Gg"
Pattern match: "http://ns.adobe.com/xap/1.0/"
Pattern match: "http://www.w3.org/1999/02/22-rdf-syntax-ns#"
Pattern match: "ns.adobe.com/xap/1.0/"
Pattern match: "http://www.apple.com/DTDs/PropertyList-1.0.dtd"
Pattern match: "http://www.gettyimages.com8BIM"
Pattern match: "http://www.gettyimages.com"
Pattern match: "http://www.iec.ch"
Pattern match: "http://127.0.0.1"
Pattern match: "http://www.gemini-iptv.com/debug/debug.php"
Heuristic match: "ihdtv.top"
Pattern match: "http://127.0.0.1:23456/playlist.m3u8"
Pattern match: "http://goat.iaarc.com/link_server/goat_paid/magic"
Pattern match: "http://goat.iaarc.com/link_server/goat_paid/magic.php"
Pattern match: "http://goat.iaarc.com/link_server/goat_paid/lb"
Pattern match: "http://goat.iaarc.com/link_server/goat_paid/lb_key_server"
Pattern match: "http://goat.iaarc.com/link_server/goat_paid/myeytv"
Pattern match: "http://goat.iaarc.com/link_server/goat_paid/myeytv.php"
Pattern match: "http://goat.iaarc.com/link_server/goat_paid/iwhole"
Pattern match: "http://goat.iaarc.com/link_server/goat_paid/iwhole.php"
Pattern match: "http://goat.iaarc.com/link_server/goat_paid/ym"
Pattern match: "http://goat.iaarc.com/link_server/goat_paid/ym_key_server"
Pattern match: "http://goat.iaarc.com/link_server/goat_paid/tb103"
Pattern match: "http://goat.iaarc.com/link_server/goat_paid/tb103_key"
Pattern match: "http://127.0.0.1:8084"
Pattern match: "http://temp.stacbak.net:18006/gemini-iptv/"
Pattern match: "http://moonhd.8866.org:18006/gemini-iptv/"
Pattern match: "http://zeus.eatuo.com:9800/qxiptv.asp"
Pattern match: "http://haohd.qwaszxpro.com:19800/qxiptv_16.asp"
Pattern match: "http://android.webok.net:19800/qxiptv_16.asp"
Pattern match: "http://an.iptvcs2.com/sofs.php"
Pattern match: "http://an.gohdtv.info/sofs.php"
Pattern match: "https://auth.tvgood.taipei/v1/auth"
Pattern match: "http://174.127.103.148:9000/exit.asp"
Pattern match: "http://android.webok.net:9000/epg/icon.zip"
Pattern match: "http://deng506.jthgffgweb.com:18006/gemini-iptv/"
Pattern match: "http://hezidenglu.vipiwj21q9b3.com:18006/gemini-iptv/"
Pattern match: "http://utjgf.jthgffgweb.com:81/gemini-iptv/"
Pattern match: "http://jtrdfv5.vipiwj21q9b3.com:81/gemini-iptv/"
Pattern match: "http://211.23.22.16:8080/forcetech/login?mac="
Pattern match: "http://211.23.22.16:8080/forcetech/member"
Pattern match: "http://211.23.22.16:8080/forcetech/p2plink"
Pattern match: "http://211.23.22.16:8080/forcetech/myproduct"
Heuristic match: "so.iptvcs2.com"
Heuristic match: "so2.iptvcs2.com"
Heuristic match: "so.gohdtv.info"
Pattern match: "https://auth.tvgood.taipei/v2/auth"
Pattern match: "http://api.memohi.com/tubicast_chipidcheck?chipid=%s&p3=%s&vercode=%s&channel_id=%s&b2=%s"
Heuristic match: "libstlport_shared.so"
Heuristic match: "libffmpeg.so"
Heuristic match: "libvvo.9.so"
Heuristic match: "libvao.0.so"
Heuristic match: "libvplayer.so"
Heuristic match: "libOMX.18.so"
Heuristic match: "libOMX.14.so"
Heuristic match: "libOMX.11.so"
Heuristic match: "libOMX.9.so"
Heuristic match: "libvscanner.so"
Heuristic match: "BOOTID.UPNP.ORG"
Pattern match: "http://\\d{1,3}\\.\\d{1,3}\\.\\d{1,3}\\.\\d{1,3}:\\d+"
Pattern match: "http://schemas.xmlsoap.org/soap/envelope/"
Pattern match: "http://schemas.xmlsoap.org/soap/encoding/"
Heuristic match: "libvlcjni.so"
Pattern match: "http://example.com/"
Heuristic match: "Name: res/drawable-xhdpi-v4/abc_list_selector_disabled_holo_light.9.pn"
Heuristic match: "Name: res/drawable-hdpi-v4/abc_text_select_handle_middle_mtrl_light.pn"
Heuristic match: "Name: res/drawable-xhdpi-v4/abc_text_select_handle_right_mtrl_light.pn"
Heuristic match: "Name: res/drawable-xxxhdpi-v4/abc_text_select_handle_left_mtrl_dark.pn"
Heuristic match: "Name: res/drawable-xhdpi-v4/abc_text_select_handle_middle_mtrl_dark.pn"
Heuristic match: "Name: res/drawable-mdpi-v4/abc_text_select_handle_middle_mtrl_light.pn"
Heuristic match: "Name: res/drawable-mdpi-v4/abc_scrubber_control_to_pressed_mtrl_005.pn"
Heuristic match: "Name: res/drawable-ldrtl-xxxhdpi-v17/abc_ic_menu_copy_mtrl_am_alpha.pn"
Heuristic match: "Name: res/drawable-hdpi-v4/abc_scrubber_control_to_pressed_mtrl_000.pn"
Heuristic match: "Name: res/drawable-xxhdpi-v4/abc_text_select_handle_left_mtrl_light.pn"
Heuristic match: "Name: res/drawable-xxhdpi-v4/abc_list_selector_disabled_holo_dark.9.pn"
Heuristic match: "Name: res/drawable-xxhdpi-v4/abc_text_select_handle_right_mtrl_dark.pn"
Heuristic match: "Name: res/drawable-hdpi-v4/abc_scrubber_control_to_pressed_mtrl_005.pn"
Heuristic match: "Name: res/drawable-mdpi-v4/abc_scrubber_control_to_pressed_mtrl_000.pn" - source
- File/Memory
- relevance
- 10/10
-
Found potential URL in binary/memory
File Details
fasthdtv.apk
- Filename
- fasthdtv.apk
- Size
- 26MiB (27337481 bytes)
- Type
- android
- Description
- Zip archive data, at least v2.0 to extract
- Architecture
- SHA256
- c5203b6f1176b0e6cae4759496699d0b6bc96efedb046a17fc6dd372b9e41e6a
- MD5
- 8270cffd28aed18261be5681fcdc255f
- SHA1
- f880a6d990fce4cf80121d130addd4aed540c352
Version Info
- Minimum SDK
- 16 (Jelly Bean)
- Target SDK
- 23 (Marshmallow)
- Version Code
- 122
- Version Name
- 12.2
- Package Name
- com.gemini.papapa
- Entrypoint
- com.gemini.papapacom.gemini.papapa.ValidateActivity
Classification (TrID)
- 66.4% (.APK) Android Package
- 18.3% (.JAR) Java Archive
- 10.1% (.WIDGET) Konfabulator widget
- 5.0% (.ZIP) ZIP compressed archive
File Permissions
Permission | Description |
---|---|
android.permission.DISABLE_KEYGUARD | Allows applications to disable the keyguard if it is not secure. |
android.permission.READ_LOGS | Allows an application to read the low-level system log files. |
android.permission.INTERNET | Allows applications to open network sockets. |
android.permission.KILL_BACKGROUND_PROCESSES | Allows an application to call killBackgroundProcesses(String). |
android.permission.READ_CONTACTS | Allows an application to read the user's contacts data. |
android.permission.WRITE_CONTACTS | Allows an application to write the user's contacts data. |
android.permission.VIBRATE | Allows access to the vibrator. |
android.permission.WRITE_EXTERNAL_STORAGE | Allows an application to write to external storage. |
android.permission.ACCESS_WIFI_STATE | Allows applications to access information about Wi-Fi networks. |
android.permission.ACCESS_NETWORK_STATE | Allows applications to access information about networks. |
android.permission.RECEIVE_BOOT_COMPLETED | Allows an application to receive the ACTION_BOOT_COMPLETED that is broadcast after the system finishes booting. |
android.permission.WAKE_LOCK | Allows using PowerManager WakeLocks to keep processor from sleeping or screen from dimming. |
android.permission.READ_PHONE_STATE | Allows read only access to phone state. |
android.permission.CHANGE_WIFI_STATE | Allows applications to change Wi-Fi connectivity state. |
android.permission.SYSTEM_ALERT_WINDOW | Allows an app to create windows using the type TYPE_SYSTEM_ALERT, shown on top of all other apps. |
android.permission.CHANGE_WIFI_MULTICAST_STATE | Allows applications to enter Wi-Fi Multicast mode. |
android.permission.CHANGE_CONFIGURATION | Allows an application to modify the current configuration, such as locale. |
android.permission.RECEIVE_USER_PRESENT | - |
android.permission.READ_EXTERNAL_STORAGE | Allows an application to read from external storage. |
File Activities
Activity | Description |
---|---|
com.gemini.papapacom.gemini.papapa.ValidateActivity | Entrypoint |
com.gemini.papapacom.gemini.play.AboutActivity | - |
com.gemini.papapacom.gemini.play.LauncherActivity | - |
com.gemini.papapacom.gemini.play.Launcher2Activity | - |
com.gemini.papapacom.gemini.play.LivePlayerActivity | - |
com.gemini.papapacom.gemini.play.BackPlayerActivity | - |
com.gemini.papapacom.gemini.play.BackPlayerVideoActivity | - |
com.gemini.papapacom.gemini.play.BackPlayer2Activity | - |
com.gemini.papapacom.gemini.play.VodPlayerListActivity | - |
com.gemini.papapacom.gemini.play.VodPlayerInfoActivity | - |
com.gemini.papapacom.gemini.play.VodPlayerVideoActivity | - |
com.gemini.papapacom.gemini.play.AppsActivity | - |
com.gemini.papapacom.gemini.play.ControlPlayerActivity | - |
com.gemini.papapacom.gemini.papapa.LoginActivity | - |
com.gemini.papapacom.gemini.play.SetWebview | - |
com.gemini.papapaio.vov.vitamio.activity.InitActivity | - |
File Certificates
Owner | Issuer | Validity | Hashes (MD5, SHA1) |
---|---|---|---|
CN=abc123 | CN=abc123 Serial: 927201f |
07/04/2012 09:46:07 11/05/3011 09:46:07 |
8A:57:ED:B0:2B:FF:47:73:76:77:64:8C:33:C6:AD:38 4E:29:31:5E:CD:BE:78:56:83:81:09:0B:0D:06:FE:46:8B:1F:90:5D |
Extracted Strings
Extracted Files
Displaying 20 extracted file(s). The remaining 25 file(s) are available in the full version and XML/JSON reports.
-
Informative 20
-
-
ABC123.RSA
- Size
- 1.1KiB (1091 bytes)
- Type
- data
- MD5
- 74134b77be12ded8a383097a99c187f1
- SHA1
- 73a0c0ea502c47d0a2b563e41d1dfef87fa5c8eb
- SHA256
- 6602cd5753e24c590d9debfabf4c4bb57daa3dc9940940fb5f0f911d03dd9065
-
ABC123.SF
- Size
- 63KiB (64061 bytes)
- Type
- text
- Description
- ASCII text, with CRLF line terminators
- MD5
- 6079075553d36d1d1c5ba816ee29894a
- SHA1
- bccbc521119a1df5b2cfd5c304ce4787a1f3845e
- SHA256
- a64fcd20eb3190ecd73dd812e06c9849f1aac287af94891a0041a477b035ff85
-
AndroidManifest.xml
- Size
- 11KiB (11600 bytes)
- Type
- unknown
- Description
- Android binary XML
- MD5
- 2ccff1f777790560a0afd87acd8806a9
- SHA1
- 000399af5ee0f265fb58220b091d533c84a2d31d
- SHA256
- d69141352b1207d293b6f9b6de83215b17b1e0d9f964df79b3af2457e452bdc9
-
MANIFEST.MF
- Size
- 62KiB (63940 bytes)
- Type
- text
- Description
- ASCII text, with CRLF line terminators
- MD5
- 6560caac3a6d74ba9c1e03b288391ce9
- SHA1
- e5868f712af2914ba0d5624f00da72cc8c8a950f
- SHA256
- db5373995351dec3f9fcb9b05c2e858e5fc04ce5533a324f5af69706498cb555
-
libOMX.11.so
- Size
- 69KiB (70740 bytes)
- Type
- elf executable
- Description
- ELF 32-bit LSB shared object, ARM, EABI5 version 1 (SYSV), dynamically linked, stripped
- MD5
- 608cb3daf8cedc14b82c859bd2daccf9
- SHA1
- 8c2cda56b3aa79904b0f19cc4b2fd589f3a9a04e
- SHA256
- dd91a470ecd9749bfec2c59c72a2725b26558b5ff3e96715f924337da74cf134
-
libOMX.14.so
- Size
- 69KiB (70740 bytes)
- Type
- elf executable
- Description
- ELF 32-bit LSB shared object, ARM, EABI5 version 1 (SYSV), dynamically linked, stripped
- MD5
- a9207595fe44b1911a600f9d0954f94b
- SHA1
- 01ddb0797c83a891b95b6bdc1abf845a74baa9a6
- SHA256
- df0d1798475d8aa863217405f300555a543609d728bf4e88e152092575863522
-
libOMX.18.so
- Size
- 69KiB (70740 bytes)
- Type
- elf executable
- Description
- ELF 32-bit LSB shared object, ARM, EABI5 version 1 (SYSV), dynamically linked, stripped
- MD5
- 0d84675c8ddaebeaa4e079cb6be28b1f
- SHA1
- f7bf65ad961d362de4c90c6ae151c2a2c272ac56
- SHA256
- 40ee3901092aae4c7437c9ba22bf290738a2b4998700f10f7a5dec3ae94bcbe8
-
libOMX.9.so
- Size
- 69KiB (70740 bytes)
- Type
- elf executable
- Description
- ELF 32-bit LSB shared object, ARM, EABI5 version 1 (SYSV), dynamically linked, stripped
- MD5
- 8a81c6956afa4bf16318165e3c7e7935
- SHA1
- 5b571668f0b67e6a90a898c744b6551df4d7faff
- SHA256
- 1838e2fe88f63fde06d22be4dadeeaca77f13fd8f1fce9172f5b8b05cdf7f0ff
-
libanw.10.so
- Size
- 9.1KiB (9368 bytes)
- Type
- elf executable
- Description
- ELF 32-bit LSB shared object, ARM, EABI5 version 1 (SYSV), dynamically linked, interpreter /system/bin/linker, stripped
- MD5
- b343856d21dbda339abf6f93dfdaffdd
- SHA1
- ee67f815fd4cb43456ec0580a458a627f50ba212
- SHA256
- aca1bc0463452f0b188aa38b3712406bdfe3b414dfdcae78aa1422599e0ec951
-
libanw.13.so
- Size
- 9.1KiB (9368 bytes)
- Type
- elf executable
- Description
- ELF 32-bit LSB shared object, ARM, EABI5 version 1 (SYSV), dynamically linked, interpreter /system/bin/linker, stripped
- MD5
- f9261a13237e5e257c55139afa8fabde
- SHA1
- 1b42aa9224a36f7333c3d4aa035cd423b0db4b38
- SHA256
- ba42c44a9c6026add0eb273cdd005fa2478cf0fe292084dab4e60521962ba234
-
libanw.14.so
- Size
- 9.1KiB (9368 bytes)
- Type
- elf executable
- Description
- ELF 32-bit LSB shared object, ARM, EABI5 version 1 (SYSV), dynamically linked, interpreter /system/bin/linker, stripped
- MD5
- 2eb297733713ee56977a82689693261f
- SHA1
- 8ef524525abbd0d12529427349a1d9ea6026898a
- SHA256
- cd0eb1eba393b9350c3c5e231907292fb01da057640bd4e6d6730a6cb9c7c49e
-
libanw.18.so
- Size
- 9.1KiB (9368 bytes)
- Type
- elf executable
- Description
- ELF 32-bit LSB shared object, ARM, EABI5 version 1 (SYSV), dynamically linked, interpreter /system/bin/linker, stripped
- MD5
- 8199f8ed1f34830218a436f92e394c6b
- SHA1
- cc0b1158734aa1337b0c83ed0dbe818af7a49ffb
- SHA256
- 80d32be688da99d14b746939023b6c5c6f9c9e502cb35f01f7d1221a36de5bf1
-
libanw.21.so
- Size
- 9.1KiB (9368 bytes)
- Type
- elf executable
- Description
- ELF 32-bit LSB shared object, ARM, EABI5 version 1 (SYSV), dynamically linked, interpreter /system/bin/linker, stripped
- MD5
- fa04c524afa8fb673a99821155a33b11
- SHA1
- 3aea729e631050af3a3d3ab29b1f4aa40151b092
- SHA256
- b6537410be4601dadc16613d758f2f0bda20a30898b5ce358f108ed94c9c7ac6
-
libc++_shared.so
- Size
- 653KiB (669136 bytes)
- Type
- elf executable
- Description
- ELF 32-bit LSB shared object, ARM, EABI5 version 1 (SYSV), dynamically linked, interpreter /system/bin/linker, BuildID[sha1]=d4a6ff70a90306d2373a2898e31ce535bcba00d8, stripped
- MD5
- cbac4221ad2fe7a818e8256774629dcc
- SHA1
- aee1d2743301b9e23526efe19a43827320dd26a3
- SHA256
- a356ab3e2fb482c062a56987e940dfc7439074b45a70e1ed8525fe5a9ef5f489
-
libcompat.7.so
- Size
- 5.1KiB (5188 bytes)
- Type
- elf executable
- Description
- ELF 32-bit LSB shared object, ARM, EABI5 version 1 (SYSV), dynamically linked, interpreter /system/bin/linker, stripped
- MD5
- 50ce96cf077b0bd1e9a726647c0a1fce
- SHA1
- 4509489c1d8b2a6034ecd8c0debeef08f224b17f
- SHA256
- 3ecfdbe23d7624bfd80aaa35945643f4df74b809967a3a10b65daae69392c6bb
-
libcustom3.so
- Size
- 81KiB (83188 bytes)
- Type
- elf executable
- Description
- ELF 32-bit LSB shared object, ARM, EABI5 version 1 (SYSV), dynamically linked, stripped
- MD5
- fc77f0c8419c44b1ba78231e6e728736
- SHA1
- 774cc3ab54ee0365e1b25ddcff3a55cbc9d655a5
- SHA256
- 52cb28f47d2323bc2af1d15371cda21f599438ee26f7d464a203276c14c8a057
-
libffmpeg.so
- Size
- 6.1MiB (6344892 bytes)
- Type
- elf executable
- Description
- ELF 32-bit LSB shared object, ARM, EABI5 version 1 (SYSV), dynamically linked, interpreter /system/bin/linker, stripped
- MD5
- c4290ae48117894caf1d01032a7ece4f
- SHA1
- 972ea9ae09897d00d4ababc86502711ef8931291
- SHA256
- c051be06b8b172524bc24606b74d7ecec97a8e375ac20081b13fec71755a8c8c
-
libforcetv.so
- Size
- 806KiB (824872 bytes)
- Type
- elf executable
- Description
- ELF 32-bit LSB shared object, ARM, EABI5 version 1 (SYSV), dynamically linked, stripped
- MD5
- 2919308228489b28a52156603401d971
- SHA1
- b2ccbd2b65dda615c7ca362c481ab0af40f91f43
- SHA256
- 570c5219d2a22bb1794326cebedf37f84de2784eb5b9c1a831ede7661ecbc367
-
libgemini.so
- Size
- 33KiB (33916 bytes)
- Type
- elf executable
- Description
- ELF 32-bit LSB shared object, ARM, EABI5 version 1 (SYSV), dynamically linked, stripped
- MD5
- ccd8dc406185a226001519b821d63df3
- SHA1
- e527ae55f0dde3cb12725a578ccd5466311ddf75
- SHA256
- 44626f156bdbb34612192aeca25036b1c00106b2d5790e3b9ea5a959a1d676e1
-
libghttp.so
- Size
- 33KiB (34164 bytes)
- Type
- elf executable
- Description
- ELF 32-bit LSB shared object, ARM, EABI5 version 1 (SYSV), dynamically linked, stripped
- MD5
- 082de4006f67e6b5a555abb85c9665a2
- SHA1
- 0d7878d4981acb1d437e1315d187483b828c8902
- SHA256
- d7bdfee3077fd238bd19af03be2c98547db4d21baf0ee8da442e5fcfb964c437
-
Notifications
-
Runtime
- Not all IP/URL string resources were checked online
- Not all sources for indicator ID "binary-0" are available in the report
- Not all sources for indicator ID "static-41" are available in the report
- Not all sources for indicator ID "static-45" are available in the report
- Not all sources for indicator ID "static-46" are available in the report
- Not all sources for indicator ID "static-47" are available in the report
- Not all strings are visible in the report, because the maximum number of strings was reached (5000)