× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 4cbedd4c33a221e62f6b9ee794918231449a4f8ed60e8a1a3896f0a1fe10f4ba
File name: 223e133122f69e3fe170a34910fea816
Detection ratio: 0 / 60
Analysis date: 2019-01-06 08:36:02 UTC ( 2 months, 2 weeks ago ) View latest
Antivirus Result Update
Acronis 20181227
Ad-Aware 20190106
AegisLab 20190106
AhnLab-V3 20190105
Alibaba 20180921
ALYac 20190106
Antiy-AVL 20190106
Arcabit 20190106
Avast 20190106
Avast-Mobile 20190105
AVG 20190106
Avira (no cloud) 20190106
Babable 20180918
Baidu 20190104
BitDefender 20190106
Bkav 20190104
CAT-QuickHeal 20190105
ClamAV 20190106
CMC 20190105
Comodo 20190106
CrowdStrike Falcon (ML) 20181022
Cybereason 20180225
Cylance 20190106
Cyren 20190106
DrWeb 20190106
eGambit 20190106
Emsisoft 20190106
Endgame 20181108
ESET-NOD32 20190105
F-Prot 20190106
F-Secure 20190106
Fortinet 20190106
GData 20190106
Ikarus 20190105
Sophos ML 20181128
Jiangmin 20190106
K7AntiVirus 20190106
K7GW 20190105
Kaspersky 20190106
Kingsoft 20190106
Malwarebytes 20190106
MAX 20190106
McAfee 20190106
McAfee-GW-Edition 20190106
Microsoft 20190106
eScan 20190106
NANO-Antivirus 20190106
Palo Alto Networks (Known Signatures) 20190106
Panda 20190105
Qihoo-360 20190106
Rising 20190106
SentinelOne (Static ML) 20181223
Sophos AV 20190106
SUPERAntiSpyware 20190102
Symantec 20190105
TACHYON 20190106
Tencent 20190106
TheHacker 20190104
TotalDefense 20190105
Trapmine 20190103
TrendMicro 20190106
TrendMicro-HouseCall 20190106
Trustlook 20190106
VBA32 20190104
VIPRE 20190106
ViRobot 20190106
Webroot 20190106
Yandex 20181229
Zillya 20190105
ZoneAlarm by Check Point 20190106
Zoner 20190106
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.supercell.clashroyale. The internal version number of the application is 339. The displayed version string of the application is 2.5.4. The minimum Android API level for the application to run (MinSDKVersion) is 16. The target Android API level for the application to run (TargetSDKVersion) is 28.
Required permissions
android.permission.VIBRATE (control vibrator)
android.permission.READ_EXTERNAL_STORAGE (read from external storage)
com.supercell.clashroyale.permission.C2D_MESSAGE (C2DM permission.)
android.permission.ACCESS_NETWORK_STATE (view network status)
com.google.android.c2dm.permission.RECEIVE (Unknown permission from android reference)
android.permission.WAKE_LOCK (prevent phone from sleeping)
android.permission.CHANGE_WIFI_STATE (change Wi-Fi status)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.INTERNET (full Internet access)
android.permission.FOREGROUND_SERVICE (Unknown permission from android reference)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
com.android.vending.BILLING (Unknown permission from android reference)
Activities
com.supercell.clashroyale.GameApp
com.google.android.gms.common.api.GoogleApiActivity
com.facebook.FacebookActivity
com.facebook.CustomTabMainActivity
com.helpshift.support.activities.ParentActivity
com.helpshift.support.HSReview
Services
com.supercell.clashroyale.GCMIntentService
Receivers
com.supercell.clashroyale.TimeAlarm
com.google.android.gcm.GCMBroadcastReceiver
com.mobileapptracker.Tracker
Providers
com.facebook.internal.FacebookInitProvider
com.helpshift.support.providers.HelpshiftFileProvider
Activity-related intent filters
com.supercell.clashroyale.GameApp
actions: android.intent.action.MAIN, android.intent.action.VIEW
categories: android.intent.category.LAUNCHER, android.intent.category.DEFAULT, android.intent.category.BROWSABLE
Receiver-related intent filters
com.mobileapptracker.Tracker
actions: com.android.vending.INSTALL_REFERRER
com.google.android.gcm.GCMBroadcastReceiver
actions: com.google.android.c2dm.intent.RECEIVE, com.google.android.c2dm.intent.REGISTRATION
categories: com.supercell.clashroyale
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Contained files
Compression metadata
Contained files
1520
Uncompressed size
88725245
Highest datetime
1980-00-00 00:00:00
Lowest datetime
1980-00-00 00:00:00
Contained files by extension
wav
594
sc
183
csv
124
ktx
29
png
22
ogg
16
scw
6
ttf
4
xml
1
MF
1
RSA
1
fnt
1
SF
1
Contained files by type
unknown
960
PNG
22
OGG
16
XML
1
JSON
1
File identification
MD5 223e133122f69e3fe170a34910fea816
SHA1 aa819ae540fa7d16ae380d6641285f49f9ecec5a
SHA256 4cbedd4c33a221e62f6b9ee794918231449a4f8ed60e8a1a3896f0a1fe10f4ba
ssdeep
1572864:cUC8ewquy1d4lEgaL45k95XcyuLswVgdhLz6NJsiqoebZXhBGiDCHLHesf3tuc9v:cUHZqT1dz5Wep6OjLz6TsiqVbnnGHLBZ

File size 94.1 MB ( 98632952 bytes )
File type Android
Magic literal
Zip archive data

TrID Android Package (46.6%)
SPSS Extension (26.6%)
Java Archive (12.8%)
Sweet Home 3D design (generic) (9.3%)
ZIP compressed archive (3.5%)
Tags
apk android

VirusTotal metadata
First submission 2018-12-21 08:27:45 UTC ( 3 months ago )
Last submission 2019-01-19 01:01:25 UTC ( 2 months ago )
File names Clash Royale-2.5.4.apk
clash-royale.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!