com.prime31.UnityPlayerProxyActivity
android.intent.action.MAIN
Overview
overview
7Static
static
7Road-Warri..._5.apk
android-9-x86
1Assembly-C...ss.dll
windows7-x64
1Assembly-C...ss.dll
windows10-2004-x64
1Assembly-CSharp.dll
windows7-x64
1Assembly-CSharp.dll
windows10-2004-x64
1P31RestKit.dll
windows7-x64
1P31RestKit.dll
windows10-2004-x64
1Photon3Unity3D.dll
windows7-x64
1Photon3Unity3D.dll
windows10-2004-x64
1System.Core.dll
windows7-x64
1System.Core.dll
windows10-2004-x64
1System.dll
windows7-x64
1System.dll
windows10-2004-x64
1UnityEngine.dll
windows7-x64
1UnityEngine.dll
windows10-2004-x64
1achievements.js
windows7-x64
1achievements.js
windows10-2004-x64
1closebutton.html
windows7-x64
1closebutton.html
windows10-2004-x64
1compare_ac...nts.js
windows7-x64
1compare_ac...nts.js
windows10-2004-x64
1dashboard.js
windows7-x64
1dashboard.js
windows10-2004-x64
1date-format.js
windows7-x64
1date-format.js
windows10-2004-x64
1email.js
windows7-x64
1email.js
windows10-2004-x64
1forgot_password.js
windows7-x64
1forgot_password.js
windows10-2004-x64
1found_device.js
windows7-x64
1found_device.js
windows10-2004-x64
1friend_requests.js
windows7-x64
1Static task
static1
Behavioral task
behavioral1
Sample
Road-Warrior-v1-4-81_5.apk
Resource
android-x86-arm-20230621-en
Behavioral task
behavioral2
Sample
Assembly-CSharp-firstpass.dll
Resource
win7-20230703-en
Behavioral task
behavioral3
Sample
Assembly-CSharp-firstpass.dll
Resource
win10v2004-20230703-en
Behavioral task
behavioral4
Sample
Assembly-CSharp.dll
Resource
win7-20230703-en
Behavioral task
behavioral5
Sample
Assembly-CSharp.dll
Resource
win10v2004-20230703-en
Behavioral task
behavioral6
Sample
P31RestKit.dll
Resource
win7-20230703-en
Behavioral task
behavioral7
Sample
P31RestKit.dll
Resource
win10v2004-20230703-en
Behavioral task
behavioral8
Sample
Photon3Unity3D.dll
Resource
win7-20230703-en
Behavioral task
behavioral9
Sample
Photon3Unity3D.dll
Resource
win10v2004-20230703-en
Behavioral task
behavioral10
Sample
System.Core.dll
Resource
win7-20230703-en
Behavioral task
behavioral11
Sample
System.Core.dll
Resource
win10v2004-20230703-en
Behavioral task
behavioral12
Sample
System.dll
Resource
win7-20230703-en
Behavioral task
behavioral13
Sample
System.dll
Resource
win10v2004-20230703-en
Behavioral task
behavioral14
Sample
UnityEngine.dll
Resource
win7-20230703-en
Behavioral task
behavioral15
Sample
UnityEngine.dll
Resource
win10v2004-20230703-en
Behavioral task
behavioral16
Sample
achievements.js
Resource
win7-20230703-en
Behavioral task
behavioral17
Sample
achievements.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral18
Sample
closebutton.html
Resource
win7-20230703-en
Behavioral task
behavioral19
Sample
closebutton.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral20
Sample
compare_achievements.js
Resource
win7-20230703-en
Behavioral task
behavioral21
Sample
compare_achievements.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral22
Sample
dashboard.js
Resource
win7-20230703-en
Behavioral task
behavioral23
Sample
dashboard.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral24
Sample
date-format.js
Resource
win7-20230703-en
Behavioral task
behavioral25
Sample
date-format.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral26
Sample
email.js
Resource
win7-20230703-en
Behavioral task
behavioral27
Sample
email.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral28
Sample
forgot_password.js
Resource
win7-20230703-en
Behavioral task
behavioral29
Sample
forgot_password.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral30
Sample
found_device.js
Resource
win7-20230703-en
Behavioral task
behavioral31
Sample
found_device.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral32
Sample
friend_requests.js
Resource
win7-20230703-en
Target
Road-Warrior-v1-4-81_5.apk
Size
44.6MB
MD5
c49a0d6ad4ac3ad7761faec664bca2b9
SHA1
a679a6072a4ee9049827e37ebe52f3b7a22eace6
SHA256
fa30cc80ae3a9345d3cb720df9fbb15963ea06d9686963a7a1130d62828ed3dd
SHA512
22884fd0a63845478854d24989fac7bc82713c811ed29a6df41df9494e854eaffa469848ef42fdd8dba53edc4f8fe45139ea5d25a8d36087c75af668aba26cca
SSDEEP
786432:vHC28RRZA2OCo9cuDe6cHc7PI6FHmJvxtudy+iO7Bualdu88coL3tRRqirjxq9:vHC2YRZAHEger87wEavf0yU7Bua3u882
description | ioc |
---|---|
Allows an application to write to external storage. | android.permission.WRITE_EXTERNAL_STORAGE |
Allows an application to read the user's contacts data. | android.permission.READ_CONTACTS |
Allows access to the list of accounts in the Accounts Service. | android.permission.GET_ACCOUNTS |
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. | android.permission.READ_PHONE_STATE |
Allows an app to access precise location. | android.permission.ACCESS_FINE_LOCATION |
Allows an app to access approximate location. | android.permission.ACCESS_COARSE_LOCATION |
Checks for missing Authenticode signature.
resource |
---|
unpack001/Assembly-CSharp-firstpass.dll |
unpack001/Assembly-CSharp.dll |
unpack001/P31RestKit.dll |
unpack001/Photon3Unity3D.dll |
unpack001/System.Core.dll |
unpack001/System.dll |
unpack001/UnityEngine.dll |
unpack001/mscorlib.dll |
android.intent.action.MAIN
android.permission.INTERNET
android.permission.WRITE_EXTERNAL_STORAGE
com.android.vending.BILLING
android.permission.READ_CONTACTS
android.permission.WAKE_LOCK
android.permission.GET_TASKS
android.permission.GET_ACCOUNTS
android.permission.USE_CREDENTIALS
android.permission.ACCESS_NETWORK_STATE
android.permission.ACCESS_WIFI_STATE
android.permission.READ_PHONE_STATE
android.permission.ACCESS_FINE_LOCATION
android.permission.ACCESS_COARSE_LOCATION
com.mobjoy.roadwarrior.permission.C2D_MESSAGE
com.google.android.c2dm.permission.RECEIVE
com.android.vending.INSTALL_REFERRER
com.android.vending.INSTALL_REFERRER
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
_CorDllMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
_CorDllMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
_CorDllMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
_CorDllMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
_CorDllMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
_CorDllMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
_CorDllMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
_CorDllMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
android.permission.INTERNET
android.permission.WRITE_EXTERNAL_STORAGE
com.android.vending.BILLING
android.permission.READ_CONTACTS
android.permission.WAKE_LOCK
android.permission.GET_TASKS
android.permission.GET_ACCOUNTS
android.permission.USE_CREDENTIALS
android.permission.ACCESS_NETWORK_STATE
android.permission.ACCESS_WIFI_STATE
android.permission.READ_PHONE_STATE
android.permission.ACCESS_FINE_LOCATION
android.permission.ACCESS_COARSE_LOCATION
com.mobjoy.roadwarrior.permission.C2D_MESSAGE
com.google.android.c2dm.permission.RECEIVE