Hero of Legend icon

hero-of-legends.apk

Hero of Legend

16.46 MB

Analyzed: 2026-03-05 22:30 UTC

APK Security & Privacy Score

Security scoring uses multi-engine scan signals and APK indicators. Privacy scoring uses requested permissions and network endpoint patterns.

Security Scan-weighted
93/100
Threat scan clean Outdated target SDK
Privacy Permissions & network
81/100
HTTP URLs found AllowBackup enabled Possible tracking
87/100
Good
Overall trust

Facts

Threat scan 0/76 flagged, 0 suspicious
Permissions 10 requested
Network strings 51 URLs (26 HTTP, 25 HTTPS)
Target SDK 14
Certificate Valid until 2092-12-11 (67 years, suspicious)

Warnings

Found 26 HTTP URL strings (unencrypted).
AllowBackup is enabled.
Possible analytics/tracking domains found: googleads.g.doubleclick.net
Package Name com.puddingstudio.cardgame
Version Code 11
Version Name 2.0
Debuggable No
Allow Backup Yes
Min SDK Android 7 (Eclair)
Target SDK Android 14 (Ice Cream Sandwich)
Supported ABIs
armeabi armeabi-v7a

Certificate & Signer

Valid From 2010-10-23 12:35:39
Valid To 2092-12-11 12:35:39
Serial Number 4cc2d69b
Thumbprint 9dbf6ce1def6bca7ff7801360dc8c07b481eb691
Issuer: C CN
Issuer: CN FruitsMobile
Issuer: DN C:CN, CN:FruitsMobile, L:Beijing, O:FruitsMobile, ST:Beijing, OU:FruitsMobile
Issuer: L Beijing
Issuer: O FruitsMobile
Issuer: OU FruitsMobile
Issuer: ST Beijing
Subject: C CN
Subject: CN FruitsMobile
Subject: DN C:CN, CN:FruitsMobile, L:Beijing, O:FruitsMobile, ST:Beijing, OU:FruitsMobile
Subject: L Beijing
Subject: O FruitsMobile
Subject: OU FruitsMobile
Subject: ST Beijing

Security Scan

0 /76
✓ Clean
Scanned by 76 security vendors
Last scan: 2025-02-20 05:09 UTC
Malicious
0
Suspicious
0
Harmless
0
Undetected
68
Timeout
0
Failure
0

Scan Providers

76 vendors
ALYac undetected
No result reported
Engine 2.0.0.10
APEX type-unsupported
No result reported
Engine 6.625
AVG undetected
No result reported
Engine 23.9.8494.0
Acronis undetected
No result reported
Engine 1.2.0.121
AhnLab-V3 undetected
No result reported
Engine 3.27.0.10558
Alibaba undetected
No result reported
Engine 0.3.0.5
Antiy-AVL undetected
No result reported
Engine 3.0
Arcabit undetected
No result reported
Engine 2022.0.0.18
Avast undetected
No result reported
Engine 23.9.8494.0
Avast-Mobile undetected
No result reported
Engine 250219-00
Avira undetected
No result reported
Engine 8.3.3.20
Baidu undetected
No result reported
Engine 1.0.0.2
BitDefender undetected
No result reported
Engine 7.2
BitDefenderFalx undetected
No result reported
Engine 2.0.936
Bkav undetected
No result reported
Engine 2.0.0.1
CAT-QuickHeal undetected
No result reported
Engine 22.00
CMC undetected
No result reported
Engine 2.4.2022.1
CTX undetected
No result reported
Engine 2024.8.29.1
ClamAV undetected
No result reported
Engine 1.4.2.0
CrowdStrike undetected
No result reported
Engine 1.0
Cylance type-unsupported
No result reported
Engine 3.0.0.0
Cynet undetected
No result reported
Engine 4.0.3.4
DeepInstinct type-unsupported
No result reported
Engine 5.0.0.8
DrWeb undetected
No result reported
Engine 7.0.65.5230
ESET-NOD32 undetected
No result reported
Engine 30747
Elastic undetected
No result reported
Engine 4.0.187
Emsisoft undetected
No result reported
Engine 2024.8.0.61147
F-Secure undetected
No result reported
Engine 18.10.1547.307
FireEye undetected
No result reported
Engine 35.47.0.0
Fortinet undetected
No result reported
Engine 7.0.30.0
GData undetected
No result reported
Engine A:25.39834B:27.39334
Google undetected
No result reported
Engine 1740027643
Gridinsoft undetected
No result reported
Engine 1.0.209.174
Ikarus undetected
No result reported
Engine 6.3.30.0
Jiangmin undetected
No result reported
Engine 16.0.100
K7AntiVirus undetected
No result reported
Engine 12.219.54871
K7GW undetected
No result reported
Engine 12.219.54872
Kaspersky undetected
No result reported
Engine 22.0.1.28
Kingsoft undetected
No result reported
Engine None
Lionic undetected
No result reported
Engine 8.16
Malwarebytes undetected
No result reported
Engine 4.5.5.54
MaxSecure undetected
No result reported
Engine 1.0.0.1
McAfee undetected
No result reported
Engine 6.0.6.653
McAfeeD type-unsupported
No result reported
Engine 1.2.0.7977
MicroWorld-eScan undetected
No result reported
Engine 14.0.409.0
Microsoft undetected
No result reported
Engine 1.1.24090.11
NANO-Antivirus undetected
No result reported
Engine 1.0.170.26436
Paloalto type-unsupported
No result reported
Engine 0.9.0.1003
Panda undetected
No result reported
Engine 4.6.4.2
Rising undetected
No result reported
Engine 25.0.0.28
SUPERAntiSpyware undetected
No result reported
Engine 5.6.0.1032
Sangfor undetected
No result reported
Engine 2.22.3.0
SentinelOne type-unsupported
No result reported
Engine 25.1.1.1
Skyhigh undetected
No result reported
Engine v2021.2.0+4045
Sophos undetected
No result reported
Engine 2.5.5.0
Symantec undetected
No result reported
Engine 1.22.0.0
SymantecMobileInsight undetected
No result reported
Engine 2.0
TACHYON undetected
No result reported
Engine 2025-02-20.01
Tencent undetected
No result reported
Engine 1.0.0.1
Trapmine type-unsupported
No result reported
Engine 4.0.4.0
TrendMicro undetected
No result reported
Engine 11.0.0.1006
TrendMicro-HouseCall undetected
No result reported
Engine 10.0.0.1040
Trustlook undetected
No result reported
Engine 1.0
VBA32 undetected
No result reported
Engine 5.3.1
VIPRE undetected
No result reported
Engine 6.0.0.35
Varist undetected
No result reported
Engine 6.6.1.3
ViRobot undetected
No result reported
Engine 2014.3.20.0
VirIT undetected
No result reported
Engine 9.5.895
Webroot undetected
No result reported
Engine 1.9.0.8
Xcitium undetected
No result reported
Engine 37490
Yandex undetected
No result reported
Engine 5.5.2.24
Zillya undetected
No result reported
Engine 2.0.0.5303
Zoner undetected
No result reported
Engine 2.2.2.0
alibabacloud undetected
No result reported
Engine 2.2.0
huorong undetected
No result reported
Engine 7da4038:7da4038:0dff63e:0dff63e
tehtris type-unsupported
No result reported
Engine v0.1.4

File Signatures

SHA-256 3d7d0369c4945f9c05f2f5569d7c400990352afd1fe4737dec554608aaf1ada9
MD5 8adbf0c49fbc4088695694dabd56a6fe
SHA-1 cea55ef17bd9f0c04a760e5e16e2122fc923be74
SSDEEP 393216:rI/9+tH5dDCkWTpbe/xfHpptI8CIbo/fmfkcfDwj6rrjB/g8xIPRC:rS815EkWsbpt/zo/fmfkODweVY8xIP4
TLSH T1EB072392B2F81585F9B37735B87693E11675BC919630C28E330C72891F7AE808F51BA7
VHASH f174f3862ce92c6e895f7fb611d3b19f
PERMHASH 71b3884cfb7dc4019c6fd852403bbf27d031460eae745242f6864ace43d814ea

File Intelligence

Type Description Android Human-friendly file type name based on multiple detection methods.
Type Extension apk Most likely file extension inferred from the content.
Type Tag android Primary type tag assigned by the classifier.
Type Tags executable, mobile, android, apk Additional type tags that describe the file content.
Magic Zip archive data, at least v2.0 to extract, compression method=deflate File signature result from magic bytes inspection.
Magika APK File type predicted by Magika (ML-based file type detection).
TrID Android Package (60.6%), Java Archive (30.3%), ZIP compressed archive (8.9%) TrID file type guesses with probabilities.
dhash 000000000e0e0500 Perceptual hash used to compare visual similarity of files.
raw md5 c34c86460a986027d6be1cbf7a52e4cf Raw MD5 hash of the file contents.
extensions png (247), ogg (47), xml (36), ExportJson (33), dat (28), fnt (25), pack (19), so (6), json (5), jpg (3), rl (2), arsc (1), dex (1), html (1), js (1), MF (1), RSA (1), SF (1) File extensions found inside the APK and how many of each.
file types PNG (247), unknown (134), OGG (47), XML (36), ELF (6), JPG (3), DEX (1) Detected embedded file types and their counts.
highest datetime 2015-01-07 16:32:28 UTC Latest timestamp found among files inside the archive.
lowest datetime 2014-08-15 14:43:48 UTC Earliest timestamp found among files inside the archive.
num children 474 Number of files contained within the archive.
type APK Container type detected for the analyzed file.
uncompressed size 23 MB Estimated total size of all files after extraction.

Sandbox

Sandbox Verdicts

Zenbox android
Harmless 84% confidence CLEAN

Deep Manifest Analysis

Activity Intents (1)

com.puddingstudio.cardgame.MainActivity
Actions
Main Activity Action: Start as a main entry point, does not expect to android.intent.action.MAIN
Categories
android.intent.category.LAUNCHER

Receiver Intents (2)

com.puddingstudio.cardgame.GcmBroadcastReceiver
Actions
com.google.android.c2dm.intent.RECEIVE com.google.android.c2dm.intent.RECEIVE
com.google.android.c2dm.intent.REGISTRATION com.google.android.c2dm.intent.REGISTRATION
com.sponsorpay.advertiser.InstallReferrerReceiver
Actions
com.android.vending.INSTALL_REFERRER com.android.vending.INSTALL_REFERRER

Native Libraries (3)

libandroidgl20 libandroidgl20.so
libgdx-freetype libgdx-freetype.so
libgdx libgdx.so

Requested Permissions (10)

com.android.vending.BILLING
view Wi-Fi connections Allows the app to view information about Wi-Fi networking, such as whether Wi-Fi is enabled and name of connected Wi-Fi devices. android.permission.ACCESS_WIFI_STATE
modify or delete the contents of your shared storage Allows the app to write the contents of your shared storage. android.permission.WRITE_EXTERNAL_STORAGE
view network connections Allows the app to view information about network connections such as which networks exist and are connected. android.permission.ACCESS_NETWORK_STATE
read phone status and identity Allows the app to access the phone features of the device. This permission allows the app to determine the phone number and device IDs, whether a call is active, and the remote number connected by a call. android.permission.READ_PHONE_STATE
Cloud messaging receive Allows the app to receive push messages via Google/Firebase Cloud Messaging. com.google.android.c2dm.permission.RECEIVE
have full network access Allows the app to create network sockets and use custom network protocols. The browser and other applications provide means to send data to the internet, so this permission is not required to send data to the internet. android.permission.INTERNET
find accounts on the device Allows the app to get the list of accounts known by the tablet. This may include any accounts created by applications you have installed. android.permission.GET_ACCOUNTS
keep car screen turned on Allows the app to keep the car screen turned on. android.permission.WAKE_LOCK
Cloud messaging Allows the app to receive push messages (legacy C2DM/FCM). com.puddingstudio.cardgame.permission.C2D_MESSAGE

Activities (10)

com.puddingstudio.cardgame.MainActivity
com.facebook.LoginActivity
com.doodlemobile.gamecenter.moregames.MoreGamesActivity
com.google.android.gms.ads.AdActivity
com.tapjoy.TJCOffersWebView
com.tapjoy.TapjoyFullScreenAdWebView
com.tapjoy.TapjoyVideoView
com.tapjoy.TJAdUnitView
com.tapjoy.mraid.view.ActionHandler
com.tapjoy.mraid.view.Browser

Services (1)

com.puddingstudio.cardgame.GcmIntentService

Broadcast Receivers (3)

com.sponsorpay.advertiser.InstallReferrerReceiver com.sponsorpay.advertiser.InstallReferrerReceiver
com.puddingstudio.cardgame.GcmBroadcastReceiver com.puddingstudio.cardgame.GcmBroadcastReceiver
com.puddingstudio.cardgame.AlarmReceiver com.puddingstudio.cardgame.AlarmReceiver

URL Endpoints (53)

http://192.168.1.241:8080/feature_server/featurescreen http://192.168.1.241:8080/featureserver/receiveuesraction http://content-js.tapjoy.com http://d2mhb2lq46cvu6.cloudfront.net/cardgame/ http://data.flurry.com/aap.do http://data2.doodlemobile.com:8080/dmdata_zmm/ReceiveServlet http://developer.android.com/google/play-services/setup.html http://developers.facebook.com/docs/reference/rest/ http://developers.google.com/games/services/android/troubleshooting http://f.doodlemobile.com:8080/feature_server_v3/recommands http://f2.doodlemobile.com/feature_server/fullScreen/get.php http://f2.doodlemobile.com/feature_server/geo-ip/test.php http://featured.perfectionholic.com:8080/feature_appserver/recommands http://featured.perfectionholic.com:8080/moregames/index.html http://featured.perfectionholic.com:8080/moregames/index_app.html http://gcm.perfectionholic.com/gcm http://gcm.perfectionholic.com/gcm/register http://googleads.g.doubleclick.net http://googleads.g.doubleclick.net/mads/static/sdk/native/sdk-core-v40.js http://media.admob.com/mraid/v1/mraid_app_banner.js

Submission Details

Submitted At 2026-03-05
First Submission 2026-03-05
Last Submission 2026-03-05
Stored Until 2026-04-04