× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: d94fd6e406266ebc89402904dbee9befdc62ae68e43b9fb83625c5d8b247417d
File name: fate-grand-order-1-25-0.apk
Detection ratio: 0 / 60
Analysis date: 2019-02-12 11:24:42 UTC ( 1 month, 1 week ago ) View latest
Antivirus Result Update
Acronis 20190208
Ad-Aware 20190212
AegisLab 20190212
AhnLab-V3 20190212
Alibaba 20180921
ALYac 20190212
Antiy-AVL 20190212
Arcabit 20190211
Avast 20190212
Avast-Mobile 20190212
AVG 20190212
Avira (no cloud) 20190212
Babable 20180918
Baidu 20190202
BitDefender 20190212
Bkav 20190201
CAT-QuickHeal 20190212
ClamAV 20190212
CMC 20190212
Comodo 20190212
CrowdStrike Falcon (ML) 20180202
Cybereason 20180308
Cylance 20190212
Cyren 20190212
DrWeb 20190212
eGambit 20190212
Emsisoft 20190212
Endgame 20181108
ESET-NOD32 20190212
F-Prot 20190212
F-Secure 20190212
Fortinet 20190212
GData 20190212
Ikarus 20190212
Sophos ML 20181128
Jiangmin 20190212
K7AntiVirus 20190212
K7GW 20190212
Kaspersky 20190212
Kingsoft 20190212
Malwarebytes 20190212
MAX 20190212
McAfee 20190212
McAfee-GW-Edition 20190212
Microsoft 20190212
eScan 20190212
NANO-Antivirus 20190212
Palo Alto Networks (Known Signatures) 20190212
Panda 20190211
Qihoo-360 20190212
Rising 20190212
SentinelOne (Static ML) 20190203
Sophos AV 20190212
SUPERAntiSpyware 20190206
Symantec 20190212
Symantec Mobile Insight 20190207
TACHYON 20190212
Tencent 20190212
TheHacker 20190203
Trapmine 20190123
TrendMicro 20190213
TrendMicro-HouseCall 20190213
Trustlook 20190212
VBA32 20190212
VIPRE 20190212
ViRobot 20190212
Webroot 20190212
Yandex 20190212
Zillya 20190211
ZoneAlarm by Check Point 20190212
Zoner 20190212
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.aniplex.fategrandorder.en. The internal version number of the application is 57. The displayed version string of the application is 1.25.0. The minimum Android API level for the application to run (MinSDKVersion) is 15. The target Android API level for the application to run (TargetSDKVersion) is 26.
Required permissions
android.permission.VIBRATE (control vibrator)
android.permission.RECEIVE_BOOT_COMPLETED (automatically start at boot)
com.google.android.c2dm.permission.RECEIVE (Unknown permission from android reference)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.DEVICE_POWER (turn phone on or off)
android.permission.WAKE_LOCK (prevent phone from sleeping)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.INTERNET (full Internet access)
com.google.android.finsky.permission.BIND_GET_INSTALL_REFERRER_SERVICE (Unknown permission from android reference)
com.aniplex.fategrandorder.en.permission.RECEIVE (Unknown permission from android reference)
com.android.vending.BILLING (Unknown permission from android reference)
com.aniplex.fategrandorder.en.permission.C2D_MESSAGE (C2DM permission.)
Activities
jp.delightworks.Fgo.player.AndroidPlugin
com.unity3d.player.UnityPlayerNativeActivity
com.onevcat.uniwebview.UniWebViewCustomViewActivity
jp.delightworks.unityplugin.webview.WebViewActivity
com.unity3d.player.VideoPlayer
com.google.android.gms.common.api.GoogleApiActivity
Services
com.metaps.analytics.PushNotificationListenerService
com.appsflyer.InstanceIDListener
Receivers
com.appsflyer.MultipleInstallBroadcastReceiver
com.metaps.analytics.AnalyticsReceiver
com.metaps.analytics.GcmReceiver
com.metaps.analytics.ReadReceiver
com.google.android.gms.gcm.GcmReceiver
com.hippogames.simpleandroidnotifications.Controller
Service-related intent filters
com.appsflyer.InstanceIDListener
actions: com.google.android.gms.iid.InstanceID
Activity-related intent filters
jp.delightworks.Fgo.player.AndroidPlugin
actions: android.intent.action.MAIN, android.intent.action.VIEW
categories: android.intent.category.LAUNCHER, android.intent.category.LEANBACK_LAUNCHER, android.intent.category.DEFAULT, android.intent.category.BROWSABLE
Receiver-related intent filters
com.appsflyer.MultipleInstallBroadcastReceiver
actions: com.android.vending.INSTALL_REFERRER
com.google.android.gms.gcm.GcmReceiver
actions: com.google.android.c2dm.intent.RECEIVE
com.metaps.analytics.AnalyticsReceiver
actions: com.android.vending.INSTALL_REFERRER
com.metaps.analytics.GcmReceiver
actions: com.google.android.c2dm.intent.RECEIVE
categories: com.aniplex.fategrandorder.en
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Interesting properties
The studied file contains at least one Portable Executable.
Contained files
Compression metadata
Contained files
1517
Uncompressed size
44688432
Highest datetime
2019-01-24 19:28:28
Lowest datetime
2019-01-24 19:23:18
Contained files by extension
dll
13
mdb
1
SF
1
MF
1
RSA
1
Contained files by type
unknown
987
Portable Executable
13
File identification
MD5 162b2fe945fafffcb003bab0d20f42dd
SHA1 af053e56a07d7bf1143d6430ca8bf1c61a75f787
SHA256 d94fd6e406266ebc89402904dbee9befdc62ae68e43b9fb83625c5d8b247417d
ssdeep
1572864:NVfu6u6BjmKbHMY10Ug/ZR28DO6fuNfskAlWr:NqIMM0UGQ6fMnAkr

File size 53.2 MB ( 55786018 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Java Archive (54.7%)
Mozilla Archive Format (gen) (26.4%)
ZIP compressed archive (15.0%)
PrintFox/Pagefox bitmap (var. P) (3.7%)
Tags
apk contains-pe android

VirusTotal metadata
First submission 2019-02-07 07:58:33 UTC ( 1 month, 1 week ago )
Last submission 2019-02-14 08:42:23 UTC ( 1 month ago )
File names fate-grand-order-english.apk
Fate Grand Order English_v1.25.0_apkpure.com.apk
fate-grand-order-1-25-0.apk
Fate Grand Order English_v1.25.0.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!