Friday Night Funkin': Psych Engine icon

gen_signed_Copy_.apk

Friday Night Funkin': Psych Engine

51.31 MB

Analyzed: 2026-04-26 00:49 UTC

APK Security & Privacy Score

Security scoring uses multi-engine scan signals and APK indicators. Privacy scoring uses requested permissions and network endpoint patterns.

Security Scan-weighted
77/100
Threat scan flagged Debuggable build Outdated target SDK
Privacy Permissions & network
88/100
AllowBackup enabled
82/100
Good
Overall trust

Facts

Threat scan 2/75 flagged, 0 suspicious
Permissions 6 requested
Network strings No URL strings detected
Target SDK 28
Certificate Valid until 2035-07-17 (9 years, suspicious)

Warnings

Threat scan flagged: 2/75 scanners marked this file as malicious.
AllowBackup is enabled.
Package Name com.shadowmario.psychengine
Version Code 1
Version Name 0.2.8
Debuggable Yes
Allow Backup Yes
Min SDK Android 16 (Jelly Bean)
Target SDK Android 28 (Pie)
Supported ABIs
arm64-v8a armeabi-v7a

Certificate & Signer

Valid From 2008-02-29 01:33:46
Valid To 2035-07-17 01:33:46
Serial Number 936eacbe07f201df
Thumbprint 61ed377e85d386a8dfee6b864bd85b0bfaa5af81
Issuer: C US
Issuer: CN Android
Issuer: DN C:US, CN:Android, L:Mountain View, O:Android, ST:California, OU:Android, email:android@android.com
Issuer: L Mountain View
Issuer: O Android
Issuer: OU Android
Issuer: ST California
Issuer: email android@android.com
Subject: C US
Subject: CN Android
Subject: DN C:US, CN:Android, L:Mountain View, O:Android, ST:California, OU:Android, email:android@android.com
Subject: L Mountain View
Subject: O Android
Subject: OU Android
Subject: ST California
Subject: email android@android.com

Security Scan

2 /75
⚠️ Threats Detected
Detected by 2 vendors: BitDefenderFalx (Android.Riskware.TestKey.rA), K7GW (Trojan ( 0001140e1 ))
Scanned by 75 security vendors
Last scan: 2026-04-26 00:49 UTC
Malicious
2
Suspicious
0
Harmless
0
Undetected
64
Timeout
0
Failure
0

Scan Providers

75 vendors
ALYac undetected
No result reported
Engine 2.0.0.10
APEX type-unsupported
No result reported
Engine 6.773
AVG undetected
No result reported
Engine 23.9.8494.0
Acronis undetected
No result reported
Engine 1.2.0.121
AhnLab-V3 undetected
No result reported
Engine 3.30.0.10666
Alibaba undetected
No result reported
Engine 0.3.0.5
Antiy-AVL undetected
No result reported
Engine 3.0
Arcabit undetected
No result reported
Engine 2025.0.0.23
Avast undetected
No result reported
Engine 23.9.8494.0
Avast-Mobile undetected
No result reported
Engine 260425-02
Avira undetected
No result reported
Engine 8.3.3.24
BitDefender undetected
No result reported
Engine 7.2
BitDefenderFalx malicious
Android.Riskware.TestKey.rA
Engine 2.0.936
Bkav undetected
No result reported
Engine 2.0.0.1
CAT-QuickHeal undetected
No result reported
Engine 22.00
CMC undetected
No result reported
Engine 2.4.2022.1
CTX undetected
No result reported
Engine 2024.8.29.1
ClamAV undetected
No result reported
Engine 1.5.2.0
CrowdStrike undetected
No result reported
Engine 1.0
Cylance type-unsupported
No result reported
Engine 3.0.0.0
Cynet type-unsupported
No result reported
Engine 4.0.3.4
DeepInstinct type-unsupported
No result reported
Engine 5.0.0.8
DrWeb undetected
No result reported
Engine 7.0.75.2070
ESET-NOD32 undetected
No result reported
Engine 18.2.18.0
Elastic undetected
No result reported
Engine 4.0.257
Emsisoft undetected
No result reported
Engine 2024.8.0.61147
F-Secure undetected
No result reported
Engine 18.10.1547.307
Fortinet undetected
No result reported
Engine 7.0.30.0
GData undetected
No result reported
Engine GD:27.44322AVA:64.31116
Google undetected
No result reported
Engine 1777158054
Gridinsoft undetected
No result reported
Engine 1.0.244.174
Ikarus undetected
No result reported
Engine 6.4.16.0
Jiangmin undetected
No result reported
Engine 16.0.100
K7AntiVirus undetected
No result reported
Engine 14.48.59312
K7GW malicious
Trojan ( 0001140e1 )
Engine 14.48.59312
Kaspersky undetected
No result reported
Engine 22.0.1.28
Kingsoft undetected
No result reported
Engine None
Lionic undetected
No result reported
Engine 8.16
Malwarebytes undetected
No result reported
Engine 3.1.0.231
MaxSecure undetected
No result reported
Engine 1.0.0.1
McAfeeD undetected
No result reported
Engine 1.2.0.14532
MicroWorld-eScan undetected
No result reported
Engine 14.0.409.0
Microsoft undetected
No result reported
Engine 1.1.26030.3008
NANO-Antivirus undetected
No result reported
Engine 1.0.170.26895
Paloalto type-unsupported
No result reported
Engine 0.9.0.1003
Panda undetected
No result reported
Engine 4.6.4.2
Rising undetected
No result reported
Engine 25.0.0.28
SUPERAntiSpyware undetected
No result reported
Engine 5.6.0.1032
Sangfor undetected
No result reported
Engine 2.22.3.0
SentinelOne type-unsupported
No result reported
Engine 7.6.2.19
Skyhigh undetected
No result reported
Engine v2021.2.0+4045
Sophos undetected
No result reported
Engine 3.4.1.0
Symantec undetected
No result reported
Engine 1.22.0.0
SymantecMobileInsight undetected
No result reported
Engine 2.0
TACHYON undetected
No result reported
Engine 2026-04-23.02
Tencent undetected
No result reported
Engine 1.0.0.1
Trapmine type-unsupported
No result reported
Engine 4.0.11.0
TrellixENS undetected
No result reported
Engine 6.0.6.653
TrendMicro undetected
No result reported
Engine 24.550.0.1002
TrendMicro-HouseCall undetected
No result reported
Engine 24.550.0.1002
Trustlook undetected
No result reported
Engine 1.0
VBA32 undetected
No result reported
Engine 5.6.0
VIPRE undetected
No result reported
Engine 6.0.0.35
Varist undetected
No result reported
Engine 6.6.1.3
ViRobot undetected
No result reported
Engine 2014.3.20.0
VirIT undetected
No result reported
Engine 9.5.1194
Webroot undetected
No result reported
Engine 1.9.0.8
Xcitium undetected
No result reported
Engine 38596
Yandex undetected
No result reported
Engine 5.5.2.24
Zillya undetected
No result reported
Engine 2.0.0.5588
ZoneAlarm undetected
No result reported
Engine 6.24-114820515
Zoner undetected
No result reported
Engine 2.2.2.0
alibabacloud type-unsupported
No result reported
Engine 2.2.0
huorong undetected
No result reported
Engine dbb7acd:dbb7acd:a9d2355:a9d2355
tehtris type-unsupported
No result reported

File Signatures

SHA-256 7ee75f52943503c888b94144ac98d3b860e38dc786a33c6a1d3817964643e6f3
MD5 8e9091d26a8f64775900d9cc3f880592
SHA-1 1abed095137e767871540d8ca542be471c3ec59e
SSDEEP 1572864:VdIPzvBTvMbpEzh/NBpflVNJzsxH8Gh+jcjXo/W:2Z7zh/rp9pIZ8fjckO
TLSH T1DEC7330886B5EFCCF33384348E9945859D22F475EA03D0FB72ACA5EC47B4B848A5F659
VHASH 43323211f37627e1cbf6f81d364867f2
PERMHASH bc19bfdfa44ed52c779b1e1ec6e70284d7a29a570b49499793214080ed85b092

File Intelligence

Type Description Android Human-friendly file type name based on multiple detection methods.
Type Extension apk Most likely file extension inferred from the content.
Type Tag android Primary type tag assigned by the classifier.
Type Tags executable, mobile, android, apk Additional type tags that describe the file content.
Magic Java archive data (JAR) File signature result from magic bytes inspection.
Magika APK File type predicted by Magika (ML-based file type detection).
TrID Android Package (60.6%), Java Archive (30.3%), ZIP compressed archive (8.9%) TrID file type guesses with probabilities.
dhash 000000000d0d0408 Perceptual hash used to compare visual similarity of files.
raw md5 d9addd00eba9c5c90f763656a3462a0f Raw MD5 hash of the file contents.
extensions json (144), png (36), txt (33), so (8), xml (5), ttf (3), ogg (2), arsc (1), dex (1), MF (1), otf (1), RSA (1), SF (1) File extensions found inside the APK and how many of each.
file types unknown (101), JSON (85), PNG (36), ELF (8), XML (4), OGG (2), DEX (1) Detected embedded file types and their counts.
highest datetime 2008-02-28 22:33:46 UTC Latest timestamp found among files inside the archive.
lowest datetime 2008-02-28 22:33:46 UTC Earliest timestamp found among files inside the archive.
num children 237 Number of files contained within the archive.
type APK Container type detected for the analyzed file.
uncompressed size 131 MB Estimated total size of all files after extraction.

Sandbox

Sandbox Verdicts

Zenbox android
Harmless 95% confidence CLEAN

Deep Manifest Analysis

Activity Intents (1)

com.shadowmario.psychengine.MainActivity
Actions
Main Activity Action: Start as a main entry point, does not expect to android.intent.action.MAIN
Categories
android.intent.category.LAUNCHER tv.ouya.intent.category.GAME

Native Libraries (4)

libApplicationMain libApplicationMain.so
C++ Standard Library Android NDK C++ runtime used by native code. libc++_shared.so
liblime liblime.so
libvlc libvlc.so

Requested Permissions (6)

read the contents of your shared storage Allows the app to read the contents of your shared storage. android.permission.READ_EXTERNAL_STORAGE
modify or delete the contents of your shared storage Allows the app to write the contents of your shared storage. android.permission.WRITE_EXTERNAL_STORAGE
control vibration Allows the app to control the vibrator. android.permission.VIBRATE
keep car screen turned on Allows the app to keep the car screen turned on. android.permission.WAKE_LOCK
disable your screen lock Allows the app to disable the keylock and any associated password security. For example, the phone disables the keylock when receiving an incoming phone call, then re-enables the keylock when the call is finished. android.permission.DISABLE_KEYGUARD
read phone status and identity Allows the app to access the phone features of the device. This permission allows the app to determine the phone number and device IDs, whether a call is active, and the remote number connected by a call. android.permission.READ_PHONE_STATE

Uses Features (1)

Touchscreen Feature for {@link #getSystemAvailableFeatures} and android.hardware.touchscreen

Activities (1)

com.shadowmario.psychengine.MainActivity

Submission Details

Submitted At 2026-04-26
First Submission 2026-04-26
Last Submission 2026-04-26
Stored Until 2026-05-26