yuzu-emulator-d590cfb9d.apk

34.14 MB

Analyzed: 2026-04-06 08:14 UTC

APK Security & Privacy Score

Security scoring uses multi-engine scan signals and APK indicators. Privacy scoring uses requested permissions and network endpoint patterns.

Security Scan-weighted
100/100
Threat scan clean Modern target SDK
Privacy Permissions & network
98/100
AllowBackup enabled Low data access
99/100
Excellent
Overall trust

Facts

Threat scan 0/76 flagged, 0 suspicious
Permissions 6 requested
Network strings 16 URLs (0 HTTP, 16 HTTPS)
Target SDK 34
Certificate Valid until 2053-04-29 (27 years, suspicious)

Warnings

AllowBackup is enabled.
Package Name org.yuzu.yuzu_emu
Version Code 25082497
Version Name d590cfb9d
App Category 0
Application Name org.yuzu.yuzu_emu.YuzuApplication
Debuggable No
Allow Backup Yes
Min SDK Android 30 (Android 11)
Target SDK Android 34 (Android 14)
Supported ABIs
arm64-v8a

Certificate & Signer

Valid From 2023-04-29 07:09:57
Valid To 2053-04-29 07:09:57
Serial Number a31599aa47c0e0bc216abaf63c6a8add45cda7ca
Thumbprint 070af3f3e2d714810f17d0682c69abc7290e4c13
Issuer: C US
Issuer: CN Android
Issuer: DN C:US, CN:Android, L:Mountain View, O:Google Inc., ST:California, OU:Android
Issuer: L Mountain View
Issuer: O Google Inc.
Issuer: OU Android
Issuer: ST California
Subject: C US
Subject: CN Android
Subject: DN C:US, CN:Android, L:Mountain View, O:Google Inc., ST:California, OU:Android
Subject: L Mountain View
Subject: O Google Inc.
Subject: OU Android
Subject: ST California

Security Scan

0 /76
✓ Clean
Scanned by 76 security vendors
Last scan: 2026-03-25 11:29 UTC
Malicious
0
Suspicious
0
Harmless
0
Undetected
67
Timeout
0
Failure
0

Scan Providers

76 vendors
ALYac undetected
No result reported
Engine 2.0.0.10
APEX type-unsupported
No result reported
Engine 6.762
AVG undetected
No result reported
Engine 23.9.8494.0
Acronis undetected
No result reported
Engine 1.2.0.121
AhnLab-V3 undetected
No result reported
Engine 3.29.3.10609
Alibaba undetected
No result reported
Engine 0.3.0.5
Antiy-AVL undetected
No result reported
Engine 3.0
Arcabit undetected
No result reported
Engine 2025.0.0.23
Avast undetected
No result reported
Engine 23.9.8494.0
Avast-Mobile undetected
No result reported
Engine 260325-02
Avira undetected
No result reported
Engine 8.3.3.24
Baidu undetected
No result reported
Engine 1.0.0.2
BitDefender undetected
No result reported
Engine 7.2
BitDefenderFalx undetected
No result reported
Engine 2.0.936
Bkav undetected
No result reported
Engine 2.0.0.1
CAT-QuickHeal undetected
No result reported
Engine 22.00
CMC undetected
No result reported
Engine 2.4.2022.1
CTX undetected
No result reported
Engine 2024.8.29.1
ClamAV undetected
No result reported
Engine 1.5.2.0
CrowdStrike undetected
No result reported
Engine 1.0
Cylance type-unsupported
No result reported
Engine 3.0.0.0
Cynet type-unsupported
No result reported
Engine 4.0.3.4
DeepInstinct type-unsupported
No result reported
Engine 5.0.0.8
DrWeb undetected
No result reported
Engine 7.0.75.2070
ESET-NOD32 undetected
No result reported
Engine 18.2.18.0
Elastic undetected
No result reported
Engine 4.0.254
Emsisoft undetected
No result reported
Engine 2024.8.0.61147
F-Secure undetected
No result reported
Engine 18.10.1547.307
Fortinet undetected
No result reported
Engine 7.0.30.0
GData undetected
No result reported
Engine GD:27.43983AVA:64.30903
Google undetected
No result reported
Engine 1774434678
Gridinsoft undetected
No result reported
Engine 1.0.242.174
Ikarus undetected
No result reported
Engine 6.4.16.0
Jiangmin undetected
No result reported
Engine 16.0.100
K7AntiVirus undetected
No result reported
Engine 14.43.58989
K7GW undetected
No result reported
Engine 14.43.58989
Kaspersky undetected
No result reported
Engine 22.0.1.28
Kingsoft undetected
No result reported
Engine None
Lionic undetected
No result reported
Engine 8.16
Malwarebytes undetected
No result reported
Engine 3.1.0.214
MaxSecure undetected
No result reported
Engine 1.0.0.1
McAfeeD undetected
No result reported
Engine 1.2.0.14148
MicroWorld-eScan undetected
No result reported
Engine 14.0.409.0
Microsoft undetected
No result reported
Engine 1.1.26020.3
NANO-Antivirus undetected
No result reported
Engine 1.0.170.26895
Paloalto type-unsupported
No result reported
Engine 0.9.0.1003
Panda undetected
No result reported
Engine 4.6.4.2
Rising undetected
No result reported
Engine 25.0.0.28
SUPERAntiSpyware undetected
No result reported
Engine 5.6.0.1032
Sangfor undetected
No result reported
Engine 2.22.3.0
SentinelOne type-unsupported
No result reported
Engine 7.6.2.19
Skyhigh undetected
No result reported
Engine v2021.2.0+4045
Sophos undetected
No result reported
Engine 3.3.1.0
Symantec undetected
No result reported
Engine 1.22.0.0
SymantecMobileInsight undetected
No result reported
Engine 2.0
TACHYON undetected
No result reported
Engine 2026-03-25.02
Tencent undetected
No result reported
Engine 1.0.0.1
Trapmine type-unsupported
No result reported
Engine 4.0.10.0
TrellixENS undetected
No result reported
Engine 6.0.6.653
TrendMicro undetected
No result reported
Engine 24.550.0.1002
TrendMicro-HouseCall undetected
No result reported
Engine 24.550.0.1002
Trustlook undetected
No result reported
Engine 1.0
VBA32 undetected
No result reported
Engine 5.5.1
VIPRE undetected
No result reported
Engine 6.0.0.35
Varist undetected
No result reported
Engine 6.6.1.3
ViRobot undetected
No result reported
Engine 2014.3.20.0
VirIT undetected
No result reported
Engine 9.5.1172
Webroot undetected
No result reported
Engine 1.9.0.8
Xcitium undetected
No result reported
Engine 38512
Yandex undetected
No result reported
Engine 5.5.2.24
Zillya undetected
No result reported
Engine 2.0.0.5570
ZoneAlarm undetected
No result reported
Engine 6.23-113519149
Zoner undetected
No result reported
Engine 2.2.2.0
alibabacloud type-unsupported
No result reported
Engine 2.2.0
huorong undetected
No result reported
Engine f694b80:f694b80:019da89:019da89
tehtris type-unsupported
No result reported
Engine v0.1.4

File Signatures

SHA-256 1083e78316fc4de8591ca1eb8407d2e852e5b7dd2cb174b0bfdc5a4113da4fb9
MD5 d8308e135240d5d250f35a921e7ab8ff
SHA-1 85c3c106af4971c6b6722418a0e6aa790ba07c97
SSDEEP 786432:Q7QpimfSbXe9ezUEMbWybnACySDNYKLqoyUtNFe2rESoo+5:7p1SDvmb/bnAkLxbnR/+5
TLSH T102773359F759D62FC87730774DA5527102874C128A439763AA6C3B0C28BBAD88F4EFD8
VHASH 32294940518ec890909b04192031a92d
PERMHASH 8ebfa5c78832c1b624a0542ca5aed4a16d17d64e29f04c3f6c73d9ad2c557919

File Intelligence

Type Description Android Human-friendly file type name based on multiple detection methods.
Type Extension apk Most likely file extension inferred from the content.
Type Tag android Primary type tag assigned by the classifier.
Type Tags executable, mobile, android, apk Additional type tags that describe the file content.
Magic Zip archive data, at least v0.0 to extract, compression method=deflate File signature result from magic bytes inspection.
Magika APK File type predicted by Magika (ML-based file type detection).
TrID Android Package (36.9%), VYM Mind Map (17.1%), Pocket Code/Catroid Catrobat Project (15%), Sweet Home 3D Design (generic) (14.3%), Mozilla Firefox browser extension (10.9%) TrID file type guesses with probabilities.
dhash 0000001e1e090c10 Perceptual hash used to compare visual similarity of files.
raw md5 59db00546c4658af83de825cd26e96a2 Raw MD5 hash of the file contents.
extensions xml (697), png (206), version (66), so (13), kotlin_builtins (7), bin (1), CoroutineExceptionHandler (1), dex (1), gz (1), jpg (1), json (1), MainDispatcherFactory (1), prof (1), profm (1), properties (1) File extensions found inside the APK and how many of each.
file types XML (697), PNG (206), unknown (82), ELF (13), Java Bytecode (1), JPG (1) Detected embedded file types and their counts.
highest datetime 1981-01-01 01:01:02 UTC Latest timestamp found among files inside the archive.
lowest datetime 1981-01-01 01:01:02 UTC Earliest timestamp found among files inside the archive.
num children 1122 Number of files contained within the archive.
type APK Container type detected for the analyzed file.
uncompressed size 91 MB Estimated total size of all files after extraction.

Sandbox

Sandbox Verdicts

Zenbox
Harmless 96% confidence CLEAN
Zenbox android
Harmless 96% confidence CLEAN

Deep Manifest Analysis

Activity Intents (2)

org.yuzu.yuzu_emu.activities.EmulationActivity
Actions
android.nfc.action.TECH_DISCOVERED android.nfc.action.TECH_DISCOVERED
View Activity Action: Display the data to the user. android.intent.action.VIEW
Categories
android.intent.category.DEFAULT
org.yuzu.yuzu_emu.ui.main.MainActivity
Actions
Main Activity Action: Start as a main entry point, does not expect to android.intent.action.MAIN
Categories
android.intent.category.LAUNCHER android.intent.category.LEANBACK_LAUNCHER

Receiver Intents (1)

Profile installer Installs performance profiles to speed up app startup and hot paths. androidx.profileinstaller.ProfileInstallReceiver
Actions
Install performance profile Installs a profile that helps optimize app performance. androidx.profileinstaller.action.INSTALL_PROFILE
Skip profile install Skips profile installation for this build. androidx.profileinstaller.action.SKIP_FILE
Save performance profile Saves a profile generated during app usage. androidx.profileinstaller.action.SAVE_PROFILE
Benchmark operation Runs a profile installer benchmark operation. androidx.profileinstaller.action.BENCHMARK_OPERATION

Native Libraries (13)

libVkLayer_khronos_validation libVkLayer_khronos_validation.so
libavcodec libavcodec.so
libavdevice libavdevice.so
libavfilter libavfilter.so
libavformat libavformat.so
libavutil libavutil.so
libfile_redirect_hook libfile_redirect_hook.so
libgsl_alloc_hook libgsl_alloc_hook.so
libhook_impl libhook_impl.so
libmain_hook libmain_hook.so
libswresample libswresample.so
libswscale libswscale.so
libyuzu-android libyuzu-android.so

Requested Permissions (6)

have full network access Allows the app to create network sockets and use custom network protocols. The browser and other applications provide means to send data to the internet, so this permission is not required to send data to the internet. android.permission.INTERNET
Foreground service Allows the app to run a foreground service. android.permission.FOREGROUND_SERVICE
android.permission.FOREGROUND_SERVICE_SPECIAL_USE Custom app or vendor permission (not publicly documented). android.permission.FOREGROUND_SERVICE_SPECIAL_USE
control Near Field Communication Allows the app to communicate with Near Field Communication (NFC) tags, cards, and readers. android.permission.NFC
android.permission.POST_NOTIFICATIONS Custom app or vendor permission (not publicly documented). android.permission.POST_NOTIFICATIONS
Dynamic receiver access Internal app permission used to protect dynamic broadcast receivers. org.yuzu.yuzu_emu.DYNAMIC_RECEIVER_NOT_EXPORTED_PERMISSION

Uses Features (4)

Gamepad Feature for {@link #getSystemAvailableFeatures} and {@link #hasSystemFeature}: android.hardware.gamepad
Touchscreen Feature for {@link #getSystemAvailableFeatures} and android.hardware.touchscreen
Vulkan Hardware Version Feature for {@link #getSystemAvailableFeatures} and android.hardware.vulkan.version
Leanback Feature for {@link #getSystemAvailableFeatures} and android.software.leanback

Activities (3)

org.yuzu.yuzu_emu.ui.main.MainActivity
org.yuzu.yuzu_emu.features.settings.ui.SettingsActivity
org.yuzu.yuzu_emu.activities.EmulationActivity

Services (1)

org.yuzu.yuzu_emu.utils.ForegroundService

Broadcast Receivers (1)

Profile installer Installs performance profiles to speed up app startup and hot paths. androidx.profileinstaller.ProfileInstallReceiver

Content Providers (2)

org.yuzu.yuzu_emu.features.DocumentProvider
androidx.startup.InitializationProvider

Submission Details

Submitted At 2026-04-06
First Submission 2026-04-06
Last Submission 2026-04-06
Stored Until 2026-05-06

Other Versions

org.yuzu.yuzu_emu.YuzuApplication org.yuzu.yuzu_emu 6273e1f2b (23407296) yuzu-Emulator-6273e1f2b.apk Analyzed 2026-04-06 08:00 UTC
View report