× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 230bf225889b5cb7202c674b65f43e405832def1d4c86addc9be090d395603f1
File name: FACEE1868CCD7DF05FD5FB2D76FC57C6
Detection ratio: 0 / 61
Analysis date: 2019-01-18 09:23:21 UTC ( 2 months, 1 week ago ) View latest
Antivirus Result Update
Acronis 20190117
Ad-Aware 20190118
AegisLab 20190118
AhnLab-V3 20190118
Alibaba 20180921
ALYac 20190118
Antiy-AVL 20190118
Arcabit 20190118
Avast 20190118
Avast-Mobile 20190118
AVG 20190118
Avira (no cloud) 20190118
AVware 20180925
Babable 20180918
Baidu 20190118
BitDefender 20190118
Bkav 20190117
CAT-QuickHeal 20190117
ClamAV 20190118
CMC 20190117
Comodo 20190118
CrowdStrike Falcon (ML) 20181023
Cybereason 20190109
Cylance 20190118
Cyren 20190118
DrWeb 20190118
eGambit 20190118
Emsisoft 20190118
Endgame 20181108
ESET-NOD32 20190118
F-Prot 20190118
F-Secure 20190118
Fortinet 20190118
GData 20190118
Ikarus 20190118
Sophos ML 20181128
Jiangmin 20190118
K7AntiVirus 20190118
K7GW 20190118
Kaspersky 20190118
Kingsoft 20190118
Malwarebytes 20190118
MAX 20190118
McAfee 20190118
McAfee-GW-Edition 20190118
Microsoft 20190118
eScan 20190118
NANO-Antivirus 20190118
Palo Alto Networks (Known Signatures) 20190118
Panda 20190117
Qihoo-360 20190118
Rising 20190118
SentinelOne (Static ML) 20181223
Sophos AV 20190117
SUPERAntiSpyware 20190116
Symantec 20190118
TACHYON 20190118
Tencent 20190118
TheHacker 20190115
TotalDefense 20190118
Trapmine 20190103
TrendMicro 20190118
TrendMicro-HouseCall 20190118
Trustlook 20190118
VBA32 20190117
VIPRE 20190118
ViRobot 20190118
Webroot 20190118
Yandex 20190118
Zillya 20190117
ZoneAlarm by Check Point 20190118
Zoner 20190118
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.aniplex.fategrandorder.en. The internal version number of the application is 56. The displayed version string of the application is 1.24.0. The minimum Android API level for the application to run (MinSDKVersion) is 15. The target Android API level for the application to run (TargetSDKVersion) is 26.
Required permissions
android.permission.VIBRATE (control vibrator)
android.permission.RECEIVE_BOOT_COMPLETED (automatically start at boot)
com.google.android.c2dm.permission.RECEIVE (Unknown permission from android reference)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.DEVICE_POWER (turn phone on or off)
android.permission.WAKE_LOCK (prevent phone from sleeping)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.INTERNET (full Internet access)
com.google.android.finsky.permission.BIND_GET_INSTALL_REFERRER_SERVICE (Unknown permission from android reference)
com.aniplex.fategrandorder.en.permission.RECEIVE (Unknown permission from android reference)
com.android.vending.BILLING (Unknown permission from android reference)
com.aniplex.fategrandorder.en.permission.C2D_MESSAGE (C2DM permission.)
Activities
jp.delightworks.Fgo.player.AndroidPlugin
com.unity3d.player.UnityPlayerNativeActivity
com.onevcat.uniwebview.UniWebViewCustomViewActivity
jp.delightworks.unityplugin.webview.WebViewActivity
com.unity3d.player.VideoPlayer
com.google.android.gms.common.api.GoogleApiActivity
Services
com.metaps.analytics.PushNotificationListenerService
com.appsflyer.InstanceIDListener
Receivers
com.appsflyer.MultipleInstallBroadcastReceiver
com.metaps.analytics.AnalyticsReceiver
com.metaps.analytics.GcmReceiver
com.metaps.analytics.ReadReceiver
com.google.android.gms.gcm.GcmReceiver
com.hippogames.simpleandroidnotifications.Controller
Service-related intent filters
com.appsflyer.InstanceIDListener
actions: com.google.android.gms.iid.InstanceID
Activity-related intent filters
jp.delightworks.Fgo.player.AndroidPlugin
actions: android.intent.action.MAIN, android.intent.action.VIEW
categories: android.intent.category.LAUNCHER, android.intent.category.LEANBACK_LAUNCHER, android.intent.category.DEFAULT, android.intent.category.BROWSABLE
Receiver-related intent filters
com.appsflyer.MultipleInstallBroadcastReceiver
actions: com.android.vending.INSTALL_REFERRER
com.google.android.gms.gcm.GcmReceiver
actions: com.google.android.c2dm.intent.RECEIVE
com.metaps.analytics.AnalyticsReceiver
actions: com.android.vending.INSTALL_REFERRER
com.metaps.analytics.GcmReceiver
actions: com.google.android.c2dm.intent.RECEIVE
categories: com.aniplex.fategrandorder.en
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Interesting properties
The studied file contains at least one Portable Executable.
Contained files
Compression metadata
Contained files
1517
Uncompressed size
44688036
Highest datetime
2018-12-11 18:48:02
Lowest datetime
2018-12-11 18:41:38
Contained files by extension
dll
13
mdb
1
SF
1
MF
1
RSA
1
Contained files by type
unknown
987
Portable Executable
13
File identification
MD5 facee1868ccd7df05fd5fb2d76fc57c6
SHA1 ef91d6dcf0cb5b3441962c64013a82c390742897
SHA256 230bf225889b5cb7202c674b65f43e405832def1d4c86addc9be090d395603f1
ssdeep
1572864:+SxSt8yVZEl+Mg2Ug/ZR9soB6fuNf6bLwhk:c8GMg2UGD6fM6F

File size 53.2 MB ( 55781038 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Java Archive (54.7%)
Mozilla Archive Format (gen) (26.4%)
ZIP compressed archive (15.0%)
PrintFox/Pagefox bitmap (var. P) (3.7%)
Tags
apk contains-pe android

VirusTotal metadata
First submission 2018-12-22 01:46:06 UTC ( 3 months ago )
Last submission 2019-02-14 08:42:38 UTC ( 1 month, 1 week ago )
File names FACEE1868CCD7DF05FD5FB2D76FC57C6
base.apk
fate-grand-order-english.apk
wfqT-dQkj6xQutvyuXty20181226-11376-10s5g4l
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!