× Cookie が無効になっています。 このサイトを正しく動作させるには、Cookie を有効にする必要があります
SHA256: 8ba078ecdba7d223063b19adf6a56759eb3bbdabeca30ccb5725163ca4da0ffb
ファイル名: clash-royale.apk
検出率: 0 / 58
分析日時: 2019-01-12 08:42:23 UTC (4 ヶ月, 1 週間前) 最新を表示
ウイルス対策ソフト 結果 更新日
Acronis 20190111
Ad-Aware 20190112
AhnLab-V3 20190111
Alibaba 20180921
ALYac 20190112
Antiy-AVL 20190111
Arcabit 20190112
Avast 20190112
Avast-Mobile 20190111
AVG 20190112
Avira (no cloud) 20190112
Babable 20180918
Baidu 20190111
Bkav 20190108
CAT-QuickHeal 20190111
ClamAV 20190112
CMC 20190111
Comodo 20190112
CrowdStrike Falcon (ML) 20180202
Cybereason 20180308
Cylance 20190112
Cyren 20190112
DrWeb 20190112
eGambit 20190112
Emsisoft 20190112
Endgame 20181108
ESET-NOD32 20190112
F-Prot 20190112
F-Secure 20190111
Fortinet 20190112
GData 20190112
Ikarus 20190112
Sophos ML 20181128
Jiangmin 20190112
K7AntiVirus 20190112
K7GW 20190112
Kaspersky 20190112
Kingsoft 20190112
Malwarebytes 20190112
MAX 20190112
McAfee 20190112
McAfee-GW-Edition 20190112
Microsoft 20190112
eScan 20190112
NANO-Antivirus 20190112
Palo Alto Networks (Known Signatures) 20190112
Panda 20190111
Qihoo-360 20190112
Rising 20190112
SentinelOne (Static ML) 20181223
Sophos AV 20190112
SUPERAntiSpyware 20190109
Symantec 20190112
TACHYON 20190112
Tencent 20190112
TheHacker 20190106
TotalDefense 20190111
Trapmine 20190103
TrendMicro 20190112
TrendMicro-HouseCall 20190112
Trustlook 20190112
VBA32 20190111
VIPRE 20190112
ViRobot 20190111
Webroot 20190112
Yandex 20190111
Zillya 20190111
ZoneAlarm by Check Point 20190112
Zoner 20190112
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.supercell.clashroyale. The internal version number of the application is 341. The displayed version string of the application is 2.5.5. The minimum Android API level for the application to run (MinSDKVersion) is 16. The target Android API level for the application to run (TargetSDKVersion) is 28.
Required permissions
android.permission.VIBRATE (control vibrator)
android.permission.READ_EXTERNAL_STORAGE (read from external storage)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
com.supercell.clashroyale.permission.C2D_MESSAGE (C2DM permission.)
android.permission.ACCESS_NETWORK_STATE (view network status)
com.google.android.c2dm.permission.RECEIVE (Unknown permission from android reference)
android.permission.WAKE_LOCK (prevent phone from sleeping)
android.permission.CHANGE_WIFI_STATE (change Wi-Fi status)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.INTERNET (full Internet access)
android.permission.FOREGROUND_SERVICE (Unknown permission from android reference)
com.farsitel.bazaar.permission.PAY_THROUGH_BAZAAR (Unknown permission from android reference)
com.android.vending.BILLING (Unknown permission from android reference)
Activities
com.supercell.clashroyale.GameApp
com.facebook.FacebookActivity
com.facebook.CustomTabMainActivity
com.google.android.gms.common.api.GoogleApiActivity
com.helpshift.support.activities.ParentActivity
com.helpshift.support.HSReview
Services
com.supercell.clashroyale.GCMIntentService
Receivers
com.supercell.clashroyale.TimeAlarm
com.google.android.gcm.GCMBroadcastReceiver
com.mobileapptracker.Tracker
Providers
com.facebook.internal.FacebookInitProvider
com.helpshift.support.providers.HelpshiftFileProvider
Activity-related intent filters
com.supercell.clashroyale.GameApp
actions: android.intent.action.MAIN, android.intent.action.VIEW
categories: android.intent.category.LAUNCHER, android.intent.category.DEFAULT, android.intent.category.BROWSABLE
Receiver-related intent filters
com.mobileapptracker.Tracker
actions: com.android.vending.INSTALL_REFERRER
com.google.android.gcm.GCMBroadcastReceiver
actions: com.google.android.c2dm.intent.RECEIVE, com.google.android.c2dm.intent.REGISTRATION
categories: com.supercell.clashroyale
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Contained files
Compression metadata
Contained files
1917
Uncompressed size
88807892
Highest datetime
1980-00-00 00:00:00
Lowest datetime
1980-00-00 00:00:00
Contained files by extension
wav
594
sc
183
csv
124
ktx
29
png
22
ogg
16
scw
6
ttf
4
xml
1
MF
1
RSA
1
fnt
1
SF
1
Contained files by type
unknown
960
PNG
22
OGG
16
XML
1
JSON
1
File identification
MD5 10c6af6c99cc2cb778041ea59112ce5f
SHA1 1fde79a080d9297a3dc45d766f6a42245b8a2c97
SHA256 8ba078ecdba7d223063b19adf6a56759eb3bbdabeca30ccb5725163ca4da0ffb
ssdeep
3145728:5oqT1dz5Wep6OjLz6TsaPsbnnGHLSq3uTjGLRqT:5oS55wOLz6TwbnzqeTCLRa

File size 101.8 MB ( 106751420 bytes )
File type Android
Magic literal
Zip archive data

TrID Android Package (46.6%)
SPSS Extension (26.6%)
Java Archive (12.8%)
Sweet Home 3D design (generic) (9.3%)
ZIP compressed archive (3.5%)
Tags
apk android

VirusTotal metadata
First submission 2019-01-07 17:24:24 UTC (4 ヶ月, 1 週間前)
Last submission 2019-02-02 08:26:44 UTC (3 ヶ月, 2 週間前)
ファイル名 clash-royale-2-5-5.apk
clash-royale.apk
コメントはありません. この項目について、VirusTotal コミュニティのメンバーはまだ誰もコメントしていません。是非、コメントしてください。

コメントを投稿してください...

?
コメントを投稿

サインインしていません。登録ユーザーのみがコメントを投稿できます。サインインして意見をお聞かせください。

投票はありません. この項目に対してまだ誰も投票していません。是非、投票してください。