× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 0ebb105f02d1d8456d384af8f396bbed9eb39b7e2be0b3501e392986e483e2d8
File name: Fate Grand Order English_v1.23.0_apkpure.com.apk
Detection ratio: 0 / 59
Analysis date: 2018-12-19 18:45:12 UTC ( 3 months ago ) View latest
Antivirus Result Update
Acronis 20180726
Ad-Aware 20181219
AegisLab 20181219
AhnLab-V3 20181219
Alibaba 20180921
ALYac 20181219
Antiy-AVL 20181219
Arcabit 20181219
Avast 20181219
Avast-Mobile 20181219
AVG 20181219
Avira (no cloud) 20181219
Babable 20180918
Baidu 20181207
BitDefender 20181219
Bkav 20181219
CAT-QuickHeal 20181219
ClamAV 20181219
CMC 20181218
Comodo 20181219
CrowdStrike Falcon (ML) 20180202
Cybereason 20180308
Cylance 20181219
Cyren 20181219
DrWeb 20181219
eGambit 20181219
Emsisoft 20181219
Endgame 20181108
ESET-NOD32 20181219
F-Prot 20181219
F-Secure 20181219
Fortinet 20181219
GData 20181219
Ikarus 20181219
Sophos ML 20181128
Jiangmin 20181219
K7AntiVirus 20181219
K7GW 20181219
Kaspersky 20181219
Kingsoft 20181219
Malwarebytes 20181219
MAX 20181219
McAfee 20181219
McAfee-GW-Edition 20181219
Microsoft 20181219
eScan 20181219
NANO-Antivirus 20181219
Palo Alto Networks (Known Signatures) 20181219
Panda 20181219
Qihoo-360 20181219
Rising 20181219
SentinelOne (Static ML) 20181011
Sophos AV 20181219
SUPERAntiSpyware 20181212
Symantec 20181219
Symantec Mobile Insight 20181215
TACHYON 20181219
Tencent 20181219
TheHacker 20181216
Trapmine 20181205
TrendMicro 20181219
TrendMicro-HouseCall 20181219
Trustlook 20181219
VBA32 20181219
ViRobot 20181219
Webroot 20181219
Yandex 20181219
Zillya 20181219
ZoneAlarm by Check Point 20181219
Zoner 20181219
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.aniplex.fategrandorder.en. The internal version number of the application is 55. The displayed version string of the application is 1.23.0. The minimum Android API level for the application to run (MinSDKVersion) is 15. The target Android API level for the application to run (TargetSDKVersion) is 26.
Required permissions
android.permission.VIBRATE (control vibrator)
android.permission.RECEIVE_BOOT_COMPLETED (automatically start at boot)
com.google.android.c2dm.permission.RECEIVE (Unknown permission from android reference)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.DEVICE_POWER (turn phone on or off)
android.permission.WAKE_LOCK (prevent phone from sleeping)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.INTERNET (full Internet access)
com.google.android.finsky.permission.BIND_GET_INSTALL_REFERRER_SERVICE (Unknown permission from android reference)
com.aniplex.fategrandorder.en.permission.RECEIVE (Unknown permission from android reference)
com.android.vending.BILLING (Unknown permission from android reference)
com.aniplex.fategrandorder.en.permission.C2D_MESSAGE (C2DM permission.)
Activities
jp.delightworks.Fgo.player.AndroidPlugin
com.unity3d.player.UnityPlayerNativeActivity
com.onevcat.uniwebview.UniWebViewCustomViewActivity
jp.delightworks.unityplugin.webview.WebViewActivity
com.unity3d.player.VideoPlayer
com.google.android.gms.common.api.GoogleApiActivity
Services
com.metaps.analytics.PushNotificationListenerService
com.appsflyer.InstanceIDListener
Receivers
com.appsflyer.MultipleInstallBroadcastReceiver
com.metaps.analytics.AnalyticsReceiver
com.metaps.analytics.GcmReceiver
com.metaps.analytics.ReadReceiver
com.google.android.gms.gcm.GcmReceiver
com.hippogames.simpleandroidnotifications.Controller
Service-related intent filters
com.appsflyer.InstanceIDListener
actions: com.google.android.gms.iid.InstanceID
Activity-related intent filters
jp.delightworks.Fgo.player.AndroidPlugin
actions: android.intent.action.MAIN, android.intent.action.VIEW
categories: android.intent.category.LAUNCHER, android.intent.category.LEANBACK_LAUNCHER, android.intent.category.DEFAULT, android.intent.category.BROWSABLE
Receiver-related intent filters
com.appsflyer.MultipleInstallBroadcastReceiver
actions: com.android.vending.INSTALL_REFERRER
com.google.android.gms.gcm.GcmReceiver
actions: com.google.android.c2dm.intent.RECEIVE
com.metaps.analytics.AnalyticsReceiver
actions: com.android.vending.INSTALL_REFERRER
com.metaps.analytics.GcmReceiver
actions: com.google.android.c2dm.intent.RECEIVE
categories: com.aniplex.fategrandorder.en
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Interesting properties
The studied file contains at least one Portable Executable.
Contained files
Compression metadata
Contained files
1517
Uncompressed size
44677696
Highest datetime
2018-11-13 14:19:52
Lowest datetime
2018-11-13 14:13:50
Contained files by extension
dll
13
mdb
1
SF
1
MF
1
RSA
1
Contained files by type
unknown
987
Portable Executable
13
File identification
MD5 f932300f3e5d10dc18f9ce6fdc884ba3
SHA1 81f62f10818523ac8e37e207d4289346124cae95
SHA256 0ebb105f02d1d8456d384af8f396bbed9eb39b7e2be0b3501e392986e483e2d8
ssdeep
1572864:1ul2dmHG7YO/M8DnhVUg/ZR6h0Mc6h6fuNfoAJL2Bjb:jM8DfUGyRH6fMRJL21

File size 53.2 MB ( 55774066 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Java Archive (54.7%)
Mozilla Archive Format (gen) (26.4%)
ZIP compressed archive (15.0%)
PrintFox/Pagefox bitmap (var. P) (3.7%)
Tags
apk contains-pe android

VirusTotal metadata
First submission 2018-11-21 09:42:38 UTC ( 4 months ago )
Last submission 2019-02-14 08:42:59 UTC ( 1 month, 1 week ago )
File names fate-grand-order-english.apk
Fate Grand Order English_v1.23.0_apkpure.com.apk
fate-grand-order-1-23-0.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!