Is "Royal Card Clash - Strategically play cards to defeat the royals!" on Chrome Web Store Safe to Install?

[email protected] · chrome · v1.0.5

Royal Card Clash is an engaging and strategic card game that brings a fresh twist to classic card games like Solitaire. Now available as an offline-capable Chrome extension, you can enjoy this game anywhere, anytime, without needing an internet connection and completely free. In Royal Card Clash, you face off against a deck of cards, with the goal of defeating the royal cards (Jacks, Queens, and Kings) using numbered cards. The gameplay is simple to learn but challenging to master. Here’s how you play: - Each turn, you have the opportunity to play three cards in three different lanes. - Numbered cards serve as your attack cards, and you must strategically choose which cards to play and when. - Cards of each suit can damage the royal cards, but only a card of the same suit can eliminate a royal card. - You must think carefully to manage your deck efficiently and defeat all the royal cards before your deck runs out. Key Features: - Easy to Learn, Hard to Master: Simple rules that lead to deep decision-making. - Various Difficulty Levels: Unlock and challenge yourself with different levels of difficulty. - Relaxing Soundtrack: Enjoy a catchy and soothing chiptune soundscape while you play. - Performance Statistics and Leaderboards: Track your progress and compete with other players. - Offline Capability: Play the game anytime, anywhere, without an internet connection. - Free to Play: Download and enjoy the game completely free, with optional in-app purchases. Whether you're a fan of card games or just looking for a new challenge, Royal Card Clash is the perfect game to test your strategic skills and provide hours of entertaining gameplay. So, do you have what it takes to reign supreme in Royal Card Clash? 🃏💡 We provide a "Play More Games" button in the extension and open our official website when you first install it, where you can experience more free games.

Risk Assessment

Analyzed
57.3
out of 100
MEDIUM

446 security findings detected across all analyzers

Severity Breakdown

0
Critical
25
High
421
Medium
0
Low
0
Info

Finding Categories

25
Malware Signatures
2
Network
416
IoC Indicators

YARA Rules Matched

13 rules(25 hits)
UntrustedContentShouldNotBeIncluded postinstall obfuscation NoUseWeakRandom postinstall crypto operations NoUseEval postinstall file manipulation postinstall system command OriginsNotVerified postinstall network communication postinstall file download LocalStorageShouldNotBeUsed DebuggerStatementsShouldNotBeUsed AlertStatementsShouldNotBeUsed

About This Extension

Royal Card Clash is an engaging and strategic card game that brings a fresh twist to classic card games like Solitaire. Now available as an offline-capable Chrome extension, you can enjoy this game anywhere, anytime, without needing an internet connection and completely free. In Royal Card Clash, you face off against a deck of cards, with the goal of defeating the royal cards (Jacks, Queens, and Kings) using numbered cards. The gameplay is simple to learn but challenging to master. Here’s how you play: - Each turn, you have the opportunity to play three cards in three different lanes. - Numbered cards serve as your attack cards, and you must strategically choose which cards to play and when. - Cards of each suit can damage the royal cards, but only a card of the same suit can eliminate a royal card. - You must think carefully to manage your deck efficiently and defeat all the royal cards before your deck runs out. Key Features: - Easy to Learn, Hard to Master: Simple rules that lead to deep decision-making. - Various Difficulty Levels: Unlock and challenge yourself with different levels of difficulty. - Relaxing Soundtrack: Enjoy a catchy and soothing chiptune soundscape while you play. - Performance Statistics and Leaderboards: Track your progress and compete with other players. - Offline Capability: Play the game anytime, anywhere, without an internet connection. - Free to Play: Download and enjoy the game completely free, with optional in-app purchases. Whether you're a fan of card games or just looking for a new challenge, Royal Card Clash is the perfect game to test your strategic skills and provide hours of entertaining gameplay. So, do you have what it takes to reign supreme in Royal Card Clash? 🃏💡 We provide a "Play More Games" button in the extension and open our official website when you first install it, where you can experience more free games.

Detailed Findings

27 total

YARA Rule Matches

13 rules

Indicators of Compromise

Network indicators, suspicious strings, and potential IoCs extracted during analysis

URLs
32
IP Addresses
12
Domains
367
Strings
416

All Indicators · 416

Domain
detected Domain: long.zero

XIOC detected Domain: long.zero

extracted_from_files

Domain
detected Domain: go.id

XIOC detected Domain: go.id

extracted_from_files

Domain
detected Domain: qf.open

XIOC detected Domain: qf.open

extracted_from_files

IP
detected IP: 6::

XIOC detected IP: 6::

extracted_from_files

IP
detected IP: ::e

XIOC detected IP: ::e

extracted_from_files

IP
detected IP: 127.0.0.1

XIOC detected IP: 127.0.0.1

extracted_from_files

IP
detected IP: 9.9.1.0

XIOC detected IP: 9.9.1.0

extracted_from_files

Domain
detected Domain: pubads.g.doubleclick.net

XIOC detected Domain: pubads.g.doubleclick.net

extracted_from_files

Domain
detected Domain: zloirock.ru

XIOC detected Domain: zloirock.ru

extracted_from_files

Domain
detected Domain: prebid.adnxs.com

XIOC detected Domain: prebid.adnxs.com

extracted_from_files

IP
detected IP: ::f

XIOC detected IP: ::f

extracted_from_files

IP
detected IP: ::8

XIOC detected IP: ::8

extracted_from_files

IP
detected IP: ::7

XIOC detected IP: ::7

extracted_from_files

IP
detected IP: ::a

XIOC detected IP: ::a

extracted_from_files

Domain
detected Domain: game-cdn.poki.com

XIOC detected Domain: game-cdn.poki.com

extracted_from_files

Domain
detected Domain: geo.poki.io

XIOC detected Domain: geo.poki.io

extracted_from_files

Domain
detected Domain: t.poki.io

XIOC detected Domain: t.poki.io

extracted_from_files

Domain
detected Domain: www.w3.org

XIOC detected Domain: www.w3.org

extracted_from_files

Domain
detected Domain: securepubads.g.doubleclick.net

XIOC detected Domain: securepubads.g.doubleclick.net

extracted_from_files

Domain
detected Domain: a.poki.com

XIOC detected Domain: a.poki.com

extracted_from_files

Domain
detected Domain: poki-gdn.com

XIOC detected Domain: poki-gdn.com

extracted_from_files

Domain
detected Domain: www.tiktok.com

XIOC detected Domain: www.tiktok.com

extracted_from_files

Domain
detected Domain: gearheadgames.com

XIOC detected Domain: gearheadgames.com

extracted_from_files

Domain
detected Domain: play.google.com

XIOC detected Domain: play.google.com

extracted_from_files

Domain
detected Domain: apps.apple.com

XIOC detected Domain: apps.apple.com

extracted_from_files

Domain
detected Domain: www.jujuadams.com

XIOC detected Domain: www.jujuadams.com

extracted_from_files

Domain
detected Domain: poki-d.openx.net

XIOC detected Domain: poki-d.openx.net

extracted_from_files

Domain
detected Domain: devs-api.poki.com

XIOC detected Domain: devs-api.poki.com

extracted_from_files

Domain
detected Domain: posrange.xyz

XIOC detected Domain: posrange.xyz

extracted_from_files

Domain
detected Domain: dir.xyz

XIOC detected Domain: dir.xyz

extracted_from_files

Domain
detected Domain: fmsware.com

XIOC detected Domain: fmsware.com

extracted_from_files

Domain
detected Domain: help.yoyogames.com

XIOC detected Domain: help.yoyogames.com

extracted_from_files

Domain
detected Domain: github.com

XIOC detected Domain: github.com

extracted_from_files

Domain
detected Domain: www.java2s.com

XIOC detected Domain: www.java2s.com

extracted_from_files

Domain
detected Domain: twitter.com

XIOC detected Domain: twitter.com

extracted_from_files

Domain
detected Domain: v262.id

XIOC detected Domain: v262.id

extracted_from_files

Domain
detected Domain: v241.id

XIOC detected Domain: v241.id

extracted_from_files

Domain
detected Domain: pbuiltin.game

XIOC detected Domain: pbuiltin.game

extracted_from_files

Domain
detected Domain: array.prototype.slice.call

XIOC detected Domain: array.prototype.slice.call

extracted_from_files

Domain
detected Domain: k.xxx

XIOC detected Domain: k.xxx

extracted_from_files

Domain
detected Domain: k.xyz

XIOC detected Domain: k.xyz

extracted_from_files

Domain
detected Domain: c.xxx

XIOC detected Domain: c.xxx

extracted_from_files

Domain
detected Domain: p3.data

XIOC detected Domain: p3.data

extracted_from_files

Domain
detected Domain: v445.id

XIOC detected Domain: v445.id

extracted_from_files

Domain
detected Domain: v442.id

XIOC detected Domain: v442.id

extracted_from_files

Domain
detected Domain: inst.id

XIOC detected Domain: inst.id

extracted_from_files

Domain
detected Domain: v427.id

XIOC detected Domain: v427.id

extracted_from_files

Domain
detected Domain: v289.id

XIOC detected Domain: v289.id

extracted_from_files

Domain
detected Domain: v286.id

XIOC detected Domain: v286.id

extracted_from_files

Domain
detected Domain: slot.data

XIOC detected Domain: slot.data

extracted_from_files

Domain
detected Domain: p3.skin.name

XIOC detected Domain: p3.skin.name

extracted_from_files

Domain
detected Domain: p3.skin

XIOC detected Domain: p3.skin

extracted_from_files

Domain
detected Domain: k4.name

XIOC detected Domain: k4.name

extracted_from_files

Domain
detected Domain: p4.name

XIOC detected Domain: p4.name

extracted_from_files

Domain
detected Domain: 44.data

XIOC detected Domain: 44.data

extracted_from_files

Domain
detected Domain: 44.data.name

XIOC detected Domain: 44.data.name

extracted_from_files

Domain
detected Domain: bone.data

XIOC detected Domain: bone.data

extracted_from_files

Domain
detected Domain: r7.top

XIOC detected Domain: r7.top

extracted_from_files

Domain
detected Domain: t7.top

XIOC detected Domain: t7.top

extracted_from_files

Domain
detected Domain: 17.top

XIOC detected Domain: 17.top

extracted_from_files

Domain
detected Domain: l5.name

XIOC detected Domain: l5.name

extracted_from_files

Domain
detected Domain: y5.name

XIOC detected Domain: y5.name

extracted_from_files

Domain
detected Domain: attachment.name

XIOC detected Domain: attachment.name

extracted_from_files

Domain
detected Domain: slot.attachment.name

XIOC detected Domain: slot.attachment.name

extracted_from_files

Domain
detected Domain: g8.name

XIOC detected Domain: g8.name

extracted_from_files

Domain
detected Domain: f8.data

XIOC detected Domain: f8.data

extracted_from_files

Domain
detected Domain: b8.events

XIOC detected Domain: b8.events

extracted_from_files

Domain
detected Domain: bone.parent.data.name

XIOC detected Domain: bone.parent.data.name

extracted_from_files

Domain
detected Domain: bone.parent.data

XIOC detected Domain: bone.parent.data

extracted_from_files

Domain
detected Domain: bone.data.parent.name

XIOC detected Domain: bone.data.parent.name

extracted_from_files

Domain
detected Domain: e.target

XIOC detected Domain: e.target

extracted_from_files

Domain
detected Domain: y9.name

XIOC detected Domain: y9.name

extracted_from_files

Domain
detected Domain: this.name

XIOC detected Domain: this.name

extracted_from_files

Domain
detected Domain: k8.attachment.name

XIOC detected Domain: k8.attachment.name

extracted_from_files

Domain
detected Domain: l8.name

XIOC detected Domain: l8.name

extracted_from_files

Domain
detected Domain: k8.data

XIOC detected Domain: k8.data

extracted_from_files

Domain
detected Domain: k8.data.name

XIOC detected Domain: k8.data.name

extracted_from_files

Domain
detected Domain: this.id

XIOC detected Domain: this.id

extracted_from_files

Domain
detected Domain: xg.top

XIOC detected Domain: xg.top

extracted_from_files

Domain
detected Domain: te.id

XIOC detected Domain: te.id

extracted_from_files

Domain
detected Domain: k8.name

XIOC detected Domain: k8.name

extracted_from_files

Domain
detected Domain: sb.save

XIOC detected Domain: sb.save

extracted_from_files

Domain
detected Domain: ga.name

XIOC detected Domain: ga.name

extracted_from_files

Domain
detected Domain: data.name

XIOC detected Domain: data.name

extracted_from_files

Domain
detected Domain: hasownproperty.call

XIOC detected Domain: hasownproperty.call

extracted_from_files

Domain
detected Domain: font.data

XIOC detected Domain: font.data

extracted_from_files

Domain
detected Domain: ni.open

XIOC detected Domain: ni.open

extracted_from_files

Domain
detected Domain: gi.style

XIOC detected Domain: gi.style

extracted_from_files

Domain
detected Domain: this.data

XIOC detected Domain: this.data

extracted_from_files

Domain
detected Domain: font.prototype.data

XIOC detected Domain: font.prototype.data

extracted_from_files

Domain
detected Domain: window.int

XIOC detected Domain: window.int

extracted_from_files

Domain
detected Domain: n.id

XIOC detected Domain: n.id

extracted_from_files

Domain
detected Domain: nn.style

XIOC detected Domain: nn.style

extracted_from_files

Domain
detected Domain: mn.style.top

XIOC detected Domain: mn.style.top

extracted_from_files

Domain
detected Domain: window.open

XIOC detected Domain: window.open

extracted_from_files

Domain
detected Domain: gn.style.top

XIOC detected Domain: gn.style.top

extracted_from_files

Domain
detected Domain: ok.data

XIOC detected Domain: ok.data

extracted_from_files

Domain
detected Domain: fd.id

XIOC detected Domain: fd.id

extracted_from_files

Domain
detected Domain: 4a.events

XIOC detected Domain: 4a.events

extracted_from_files

Domain
detected Domain: login.style.top

XIOC detected Domain: login.style.top

extracted_from_files

Domain
detected Domain: zw.id

XIOC detected Domain: zw.id

extracted_from_files

Domain
detected Domain: x5.caller.name

XIOC detected Domain: x5.caller.name

extracted_from_files

Domain
detected Domain: vv.constructor.name

XIOC detected Domain: vv.constructor.name

extracted_from_files

IP
detected IP: 2::

XIOC detected IP: 2::

extracted_from_files

IP
detected IP: ::c

XIOC detected IP: ::c

extracted_from_files

IP
detected IP: b::c

XIOC detected IP: b::c

extracted_from_files

Domain
detected Domain: hf.top

XIOC detected Domain: hf.top

extracted_from_files

Domain
detected Domain: ie.top

XIOC detected Domain: ie.top

extracted_from_files

Domain
detected Domain: rect.top

XIOC detected Domain: rect.top

extracted_from_files

Domain
detected Domain: 2c.name

XIOC detected Domain: 2c.name

extracted_from_files

Domain
detected Domain: eb.id

XIOC detected Domain: eb.id

extracted_from_files

Domain
detected Domain: wb.name

XIOC detected Domain: wb.name

extracted_from_files

Domain
detected Domain: 58.id

XIOC detected Domain: 58.id

extracted_from_files

Domain
detected Domain: ul.id

XIOC detected Domain: ul.id

extracted_from_files

Domain
detected Domain: ai.id

XIOC detected Domain: ai.id

extracted_from_files

Domain
detected Domain: xh.top

XIOC detected Domain: xh.top

extracted_from_files

Domain
detected Domain: rh.top

XIOC detected Domain: rh.top

extracted_from_files

Domain
detected Domain: 8h.top

XIOC detected Domain: 8h.top

extracted_from_files

Domain
detected Domain: ix.id

XIOC detected Domain: ix.id

extracted_from_files

Domain
detected Domain: uh.top

XIOC detected Domain: uh.top

extracted_from_files

Domain
detected Domain: sequence.name

XIOC detected Domain: sequence.name

extracted_from_files

Domain
detected Domain: zu.call

XIOC detected Domain: zu.call

extracted_from_files

Domain
detected Domain: tn.sy

XIOC detected Domain: tn.sy

extracted_from_files

Domain
detected Domain: tn.sx

XIOC detected Domain: tn.sx

extracted_from_files

Domain
detected Domain: 8n.name

XIOC detected Domain: 8n.name

extracted_from_files

Domain
detected Domain: vg.id

XIOC detected Domain: vg.id

extracted_from_files

Domain
detected Domain: pu.name

XIOC detected Domain: pu.name

extracted_from_files

Domain
detected Domain: resource.name

XIOC detected Domain: resource.name

extracted_from_files

Domain
detected Domain: e.data

XIOC detected Domain: e.data

extracted_from_files

Domain
detected Domain: e.id

XIOC detected Domain: e.id

extracted_from_files

Domain
detected Domain: 6i.top

XIOC detected Domain: 6i.top

extracted_from_files

Domain
detected Domain: 45.top

XIOC detected Domain: 45.top

extracted_from_files

Domain
detected Domain: os.id

XIOC detected Domain: os.id

extracted_from_files

Domain
detected Domain: x01.sx

XIOC detected Domain: x01.sx

extracted_from_files

Domain
detected Domain: q01.id

XIOC detected Domain: q01.id

extracted_from_files

Domain
detected Domain: p01.id

XIOC detected Domain: p01.id

extracted_from_files

Domain
detected Domain: wn.id

XIOC detected Domain: wn.id

extracted_from_files

Domain
detected Domain: ox.id

XIOC detected Domain: ox.id

extracted_from_files

Domain
detected Domain: qq.id

XIOC detected Domain: qq.id

extracted_from_files

Domain
detected Domain: emitter.name

XIOC detected Domain: emitter.name

extracted_from_files

Domain
detected Domain: q41.prototype.play

XIOC detected Domain: q41.prototype.play

extracted_from_files

Domain
detected Domain: pbuiltin.audio

XIOC detected Domain: pbuiltin.audio

extracted_from_files

Domain
detected Domain: splice.call

XIOC detected Domain: splice.call

extracted_from_files

Domain
detected Domain: pbuiltin.health

XIOC detected Domain: pbuiltin.health

extracted_from_files

Domain
detected Domain: j4.id

XIOC detected Domain: j4.id

extracted_from_files

Domain
detected Domain: ho.id

XIOC detected Domain: ho.id

extracted_from_files

Domain
detected Domain: x01.sy

XIOC detected Domain: x01.sy

extracted_from_files

Domain
detected Domain: xb1.map

XIOC detected Domain: xb1.map

extracted_from_files

Domain
detected Domain: slot.name

XIOC detected Domain: slot.name

extracted_from_files

Domain
detected Domain: bone.name

XIOC detected Domain: bone.name

extracted_from_files

Domain
detected Domain: bone.parent.name

XIOC detected Domain: bone.parent.name

extracted_from_files

Domain
detected Domain: fa1.top

XIOC detected Domain: fa1.top

extracted_from_files

Domain
detected Domain: h61.play

XIOC detected Domain: h61.play

extracted_from_files

Domain
detected Domain: x41.open

XIOC detected Domain: x41.open

extracted_from_files

Domain
detected Domain: fn.style.top

XIOC detected Domain: fn.style.top

extracted_from_files

Domain
detected Domain: th.events

XIOC detected Domain: th.events

extracted_from_files

Domain
detected Domain: lm.save

XIOC detected Domain: lm.save

extracted_from_files

Domain
detected Domain: data.data

XIOC detected Domain: data.data

extracted_from_files

Domain
detected Domain: um.name

XIOC detected Domain: um.name

extracted_from_files

Domain
detected Domain: jb1.map

XIOC detected Domain: jb1.map

extracted_from_files

Domain
detected Domain: kb1.map

XIOC detected Domain: kb1.map

extracted_from_files

Domain
detected Domain: fy.name

XIOC detected Domain: fy.name

extracted_from_files

Domain
detected Domain: ul.name

XIOC detected Domain: ul.name

extracted_from_files

Domain
detected Domain: wh1.name

XIOC detected Domain: wh1.name

extracted_from_files

Domain
detected Domain: j5.name

XIOC detected Domain: j5.name

extracted_from_files

Domain
detected Domain: performance.now

XIOC detected Domain: performance.now

extracted_from_files

Domain
detected Domain: ug1.call

XIOC detected Domain: ug1.call

extracted_from_files

Domain
detected Domain: tg1.call

XIOC detected Domain: tg1.call

extracted_from_files

Domain
detected Domain: sa1.data

XIOC detected Domain: sa1.data

extracted_from_files

Domain
detected Domain: pz1.data

XIOC detected Domain: pz1.data

extracted_from_files

Domain
detected Domain: hq1.id

XIOC detected Domain: hq1.id

extracted_from_files

Domain
detected Domain: jo1.id

XIOC detected Domain: jo1.id

extracted_from_files

Domain
detected Domain: 2j1.call

XIOC detected Domain: 2j1.call

extracted_from_files

Domain
detected Domain: 1j1.call

XIOC detected Domain: 1j1.call

extracted_from_files

Domain
detected Domain: this.parent.call

XIOC detected Domain: this.parent.call

extracted_from_files

Domain
detected Domain: r81.call

XIOC detected Domain: r81.call

extracted_from_files

Domain
detected Domain: xd1.id

XIOC detected Domain: xd1.id

extracted_from_files

Domain
detected Domain: vd1.id

XIOC detected Domain: vd1.id

extracted_from_files

Domain
detected Domain: na1.data

XIOC detected Domain: na1.data

extracted_from_files

Domain
detected Domain: ha1.data

XIOC detected Domain: ha1.data

extracted_from_files

Domain
detected Domain: buffer.data

XIOC detected Domain: buffer.data

extracted_from_files

Domain
detected Domain: ta1.data

XIOC detected Domain: ta1.data

extracted_from_files

Domain
detected Domain: zu.name

XIOC detected Domain: zu.name

extracted_from_files

Domain
detected Domain: cz.name

XIOC detected Domain: cz.name

extracted_from_files

Domain
detected Domain: body.name

XIOC detected Domain: body.name

extracted_from_files

Domain
detected Domain: vy.name

XIOC detected Domain: vy.name

extracted_from_files

Domain
detected Domain: pk.name

XIOC detected Domain: pk.name

extracted_from_files

Domain
detected Domain: cu1.target

XIOC detected Domain: cu1.target

extracted_from_files

Domain
detected Domain: this.target

XIOC detected Domain: this.target

extracted_from_files

Domain
detected Domain: om1.map

XIOC detected Domain: om1.map

extracted_from_files

Domain
detected Domain: 8n1.map

XIOC detected Domain: 8n1.map

extracted_from_files

Domain
detected Domain: 1n1.click

XIOC detected Domain: 1n1.click

extracted_from_files

Domain
detected Domain: 1n1.download

XIOC detected Domain: 1n1.download

extracted_from_files

Domain
detected Domain: om1.download

XIOC detected Domain: om1.download

extracted_from_files

Domain
detected Domain: tb.data

XIOC detected Domain: tb.data

extracted_from_files

Domain
detected Domain: bytearray.org

XIOC detected Domain: bytearray.org

extracted_from_files

Domain
detected Domain: rz.zero

XIOC detected Domain: rz.zero

extracted_from_files

Domain
detected Domain: rz.one

XIOC detected Domain: rz.one

extracted_from_files

Domain
detected Domain: rz.red

XIOC detected Domain: rz.red

extracted_from_files

Domain
detected Domain: rz.int

XIOC detected Domain: rz.int

extracted_from_files

Domain
detected Domain: rz.link

XIOC detected Domain: rz.link

extracted_from_files

Domain
detected Domain: lcolor.xyz

XIOC detected Domain: lcolor.xyz

extracted_from_files

Domain
detected Domain: vertex.xyz

XIOC detected Domain: vertex.xyz

extracted_from_files

Domain
detected Domain: bone.data.name

XIOC detected Domain: bone.data.name

extracted_from_files

Domain
detected Domain: 85.red

XIOC detected Domain: 85.red

extracted_from_files

Domain
detected Domain: s82.name

XIOC detected Domain: s82.name

extracted_from_files

Domain
detected Domain: q81.call

XIOC detected Domain: q81.call

extracted_from_files

Domain
detected Domain: long.one

XIOC detected Domain: long.one

extracted_from_files

Domain
detected Domain: kl3.data

XIOC detected Domain: kl3.data

extracted_from_files

Domain
detected Domain: parent.ax

XIOC detected Domain: parent.ax

extracted_from_files

Domain
detected Domain: data.target.name

XIOC detected Domain: data.target.name

extracted_from_files

Domain
detected Domain: this.ax

XIOC detected Domain: this.ax

extracted_from_files

Domain
detected Domain: from.name

XIOC detected Domain: from.name

extracted_from_files

Domain
detected Domain: qc2.data

XIOC detected Domain: qc2.data

extracted_from_files

Domain
detected Domain: this.events

XIOC detected Domain: this.events

extracted_from_files

Domain
detected Domain: attachment.id

XIOC detected Domain: attachment.id

extracted_from_files

Domain
detected Domain: wa2.search

XIOC detected Domain: wa2.search

extracted_from_files

Domain
detected Domain: qc2.target

XIOC detected Domain: qc2.target

extracted_from_files

Domain
detected Domain: this.skin

XIOC detected Domain: this.skin

extracted_from_files

Domain
detected Domain: target.ax

XIOC detected Domain: target.ax

extracted_from_files

Domain
detected Domain: fe1.ax

XIOC detected Domain: fe1.ax

extracted_from_files

IP
detected IP: ::

XIOC detected IP: ::

extracted_from_files

Domain
detected Domain: bone.ax

XIOC detected Domain: bone.ax

extracted_from_files

Domain
detected Domain: 3p-bone.ax

XIOC detected Domain: 3p-bone.ax

extracted_from_files

Domain
detected Domain: 0e2.name

XIOC detected Domain: 0e2.name

extracted_from_files

Domain
detected Domain: qc2.name

XIOC detected Domain: qc2.name

extracted_from_files

Domain
detected Domain: event.name

XIOC detected Domain: event.name

extracted_from_files

Domain
detected Domain: skin.name

XIOC detected Domain: skin.name

extracted_from_files

Domain
detected Domain: qc2.data.name

XIOC detected Domain: qc2.data.name

extracted_from_files

Domain
detected Domain: ikconstraint.data.name

XIOC detected Domain: ikconstraint.data.name

extracted_from_files

Domain
detected Domain: slot.data.name

XIOC detected Domain: slot.data.name

extracted_from_files

Domain
detected Domain: bm2.name

XIOC detected Domain: bm2.name

extracted_from_files

Domain
detected Domain: am2.name

XIOC detected Domain: am2.name

extracted_from_files

Domain
detected Domain: 7m2.name

XIOC detected Domain: 7m2.name

extracted_from_files

Domain
detected Domain: event.data

XIOC detected Domain: event.data

extracted_from_files

Domain
detected Domain: 0e2.events

XIOC detected Domain: 0e2.events

extracted_from_files

Domain
detected Domain: lj2.skin

XIOC detected Domain: lj2.skin

extracted_from_files

Domain
detected Domain: data.target

XIOC detected Domain: data.target

extracted_from_files

Domain
detected Domain: 3p.call

XIOC detected Domain: 3p.call

extracted_from_files

Domain
detected Domain: gm2.name

XIOC detected Domain: gm2.name

extracted_from_files

Domain
detected Domain: map.events

XIOC detected Domain: map.events

extracted_from_files

Domain
detected Domain: mm2.name

XIOC detected Domain: mm2.name

extracted_from_files

Domain
detected Domain: m6.events

XIOC detected Domain: m6.events

extracted_from_files

Domain
detected Domain: dm2.name

XIOC detected Domain: dm2.name

extracted_from_files

Domain
detected Domain: bm2.target

XIOC detected Domain: bm2.target

extracted_from_files

Domain
detected Domain: fr.open

XIOC detected Domain: fr.open

extracted_from_files

Domain
detected Domain: ei2.name

XIOC detected Domain: ei2.name

extracted_from_files

Domain
detected Domain: fi2.call

XIOC detected Domain: fi2.call

extracted_from_files

Domain
detected Domain: cu1.name

XIOC detected Domain: cu1.name

extracted_from_files

Domain
detected Domain: pbuiltin.room

XIOC detected Domain: pbuiltin.room

extracted_from_files

Domain
detected Domain: yf2.options.md

XIOC detected Domain: yf2.options.md

extracted_from_files

Domain
detected Domain: pbuiltin.delta

XIOC detected Domain: pbuiltin.delta

extracted_from_files

Domain
detected Domain: nq2.name

XIOC detected Domain: nq2.name

extracted_from_files

Domain
detected Domain: this.show

XIOC detected Domain: this.show

extracted_from_files

Domain
detected Domain: this.delta

XIOC detected Domain: this.delta

extracted_from_files

Domain
detected Domain: this.game

XIOC detected Domain: this.game

extracted_from_files

Domain
detected Domain: this.health

XIOC detected Domain: this.health

extracted_from_files

Domain
detected Domain: this.room

XIOC detected Domain: this.room

extracted_from_files

Domain
detected Domain: gn2.data

XIOC detected Domain: gn2.data

extracted_from_files

Domain
detected Domain: hy2.open

XIOC detected Domain: hy2.open

extracted_from_files

Domain
detected Domain: 4u.download

XIOC detected Domain: 4u.download

extracted_from_files

Domain
detected Domain: px2.data

XIOC detected Domain: px2.data

extracted_from_files

Domain
detected Domain: ox2.data

XIOC detected Domain: ox2.data

extracted_from_files

Domain
detected Domain: gx2.data

XIOC detected Domain: gx2.data

extracted_from_files

Domain
detected Domain: 8w2.save

XIOC detected Domain: 8w2.save

extracted_from_files

Domain
detected Domain: oq2.name

XIOC detected Domain: oq2.name

extracted_from_files

Domain
detected Domain: top.chrome

XIOC detected Domain: top.chrome

extracted_from_files

Domain
detected Domain: u82.style.top

XIOC detected Domain: u82.style.top

extracted_from_files

Domain
detected Domain: b03.top

XIOC detected Domain: b03.top

extracted_from_files

Domain
detected Domain: a03.top

XIOC detected Domain: a03.top

extracted_from_files

Domain
detected Domain: py2.top

XIOC detected Domain: py2.top

extracted_from_files

Domain
detected Domain: 2.top

XIOC detected Domain: 2.top

extracted_from_files

Domain
detected Domain: this.in

XIOC detected Domain: this.in

extracted_from_files

Domain
detected Domain: f8.target

XIOC detected Domain: f8.target

extracted_from_files

Domain
detected Domain: window.chrome.app

XIOC detected Domain: window.chrome.app

extracted_from_files

Domain
detected Domain: window.chrome

XIOC detected Domain: window.chrome

extracted_from_files

Domain
detected Domain: canvas.style

XIOC detected Domain: canvas.style

extracted_from_files

Domain
detected Domain: canvas.style.top

XIOC detected Domain: canvas.style.top

extracted_from_files

Domain
detected Domain: u82.style

XIOC detected Domain: u82.style

extracted_from_files

Domain
detected Domain: top.chrome.app

XIOC detected Domain: top.chrome.app

extracted_from_files

Domain
detected Domain: o83.name

XIOC detected Domain: o83.name

extracted_from_files

Domain
detected Domain: qq.name

XIOC detected Domain: qq.name

extracted_from_files

Domain
detected Domain: 473.id

XIOC detected Domain: 473.id

extracted_from_files

Domain
detected Domain: d63.name

XIOC detected Domain: d63.name

extracted_from_files

Domain
detected Domain: f63.name

XIOC detected Domain: f63.name

extracted_from_files

Domain
detected Domain: lz1.name

XIOC detected Domain: lz1.name

extracted_from_files

Domain
detected Domain: this.top

XIOC detected Domain: this.top

extracted_from_files

Domain
detected Domain: 6f3.call

XIOC detected Domain: 6f3.call

extracted_from_files

Domain
detected Domain: ze3.call

XIOC detected Domain: ze3.call

extracted_from_files

Domain
detected Domain: c3.id

XIOC detected Domain: c3.id

extracted_from_files

Domain
detected Domain: va.save

XIOC detected Domain: va.save

extracted_from_files

Domain
detected Domain: h4.id

XIOC detected Domain: h4.id

extracted_from_files

Domain
detected Domain: ew2.top

XIOC detected Domain: ew2.top

extracted_from_files

Domain
detected Domain: o83.id

XIOC detected Domain: o83.id

extracted_from_files

Domain
detected Domain: sr.id

XIOC detected Domain: sr.id

extracted_from_files

Domain
detected Domain: re3.id

XIOC detected Domain: re3.id

extracted_from_files

Domain
detected Domain: bg3.call

XIOC detected Domain: bg3.call

extracted_from_files

Domain
detected Domain: fj2.post

XIOC detected Domain: fj2.post

extracted_from_files

Domain
detected Domain: ei2.events

XIOC detected Domain: ei2.events

extracted_from_files

Domain
detected Domain: 8g3.call

XIOC detected Domain: 8g3.call

extracted_from_files

Domain
detected Domain: mf3.post

XIOC detected Domain: mf3.post

extracted_from_files

Domain
detected Domain: uk3.top

XIOC detected Domain: uk3.top

extracted_from_files

Domain
detected Domain: ej3.top

XIOC detected Domain: ej3.top

extracted_from_files

Domain
detected Domain: hj3.top

XIOC detected Domain: hj3.top

extracted_from_files

Domain
detected Domain: j6.top

XIOC detected Domain: j6.top

extracted_from_files

Domain
detected Domain: ui.top

XIOC detected Domain: ui.top

extracted_from_files

Domain
detected Domain: this.play

XIOC detected Domain: this.play

extracted_from_files

Domain
detected Domain: qi3.play

XIOC detected Domain: qi3.play

extracted_from_files

Domain
detected Domain: 3r3.name

XIOC detected Domain: 3r3.name

extracted_from_files

Domain
detected Domain: io3.play

XIOC detected Domain: io3.play

extracted_from_files

Domain
detected Domain: jo3.play

XIOC detected Domain: jo3.play

extracted_from_files

Hash
detected SHA256 Hash: 88DC79403F68E81B6674C927ED362EF3CF69046F587ED009FDC6AD85D85E97F2

XIOC detected SHA256 Hash: 88DC79403F68E81B6674C927ED362EF3CF69046F587ED009FDC6AD85D85E97F2

extracted_from_files

Hash
detected SHA256 Hash: 1DB3FD414039D3E5815A5721925DD2E0A3A9F2549603C6CAB7C49B84966A1AF3

XIOC detected SHA256 Hash: 1DB3FD414039D3E5815A5721925DD2E0A3A9F2549603C6CAB7C49B84966A1AF3

extracted_from_files

Hash
detected SHA1 Hash: a9993e364706816aba3e25717850c26c9cd0d89d

XIOC detected SHA1 Hash: a9993e364706816aba3e25717850c26c9cd0d89d

extracted_from_files

Domain
detected Domain: hg2.top

XIOC detected Domain: hg2.top

extracted_from_files

Domain
detected Domain: document.body.style

XIOC detected Domain: document.body.style

extracted_from_files

Domain
detected Domain: lt3.id

XIOC detected Domain: lt3.id

extracted_from_files

Domain
detected Domain: cf.host

XIOC detected Domain: cf.host

extracted_from_files

Domain
detected Domain: cf.search

XIOC detected Domain: cf.search

extracted_from_files

Domain
detected Domain: load.style.top

XIOC detected Domain: load.style.top

extracted_from_files

Domain
detected Domain: pq1.name

XIOC detected Domain: pq1.name

extracted_from_files

Domain
detected Domain: sq1.name

XIOC detected Domain: sq1.name

extracted_from_files

Domain
detected Domain: i.nu

XIOC detected Domain: i.nu

extracted_from_files

Domain
detected Domain: p.tz

XIOC detected Domain: p.tz

extracted_from_files

Domain
detected Domain: a.md

XIOC detected Domain: a.md

extracted_from_files

Domain
detected Domain: s.mt

XIOC detected Domain: s.mt

extracted_from_files

Domain
detected Domain: ml.sn

XIOC detected Domain: ml.sn

extracted_from_files

Domain
detected Domain: tc.mu

XIOC detected Domain: tc.mu

extracted_from_files

Domain
detected Domain: bu3.id

XIOC detected Domain: bu3.id

extracted_from_files

Domain
detected Domain: 0.kn

XIOC detected Domain: 0.kn

extracted_from_files

Domain
detected Domain: u4.mm

XIOC detected Domain: u4.mm

extracted_from_files

Domain
detected Domain: 3.fm

XIOC detected Domain: 3.fm

extracted_from_files

Domain
detected Domain: ȭ.cc

XIOC detected Domain: ȭ.cc

extracted_from_files

Domain
detected Domain: xh.sj

XIOC detected Domain: xh.sj

extracted_from_files

Domain
detected Domain: 1.pa

XIOC detected Domain: 1.pa

extracted_from_files

Domain
detected Domain: bźxs.gn

XIOC detected Domain: bźxs.gn

extracted_from_files

Domain
detected Domain: wc.td

XIOC detected Domain: wc.td

extracted_from_files

Domain
detected Domain: p.cn

XIOC detected Domain: p.cn

extracted_from_files

Domain
detected Domain: j0.su

XIOC detected Domain: j0.su

extracted_from_files

Domain
detected Domain: r.gi

XIOC detected Domain: r.gi

extracted_from_files

Domain
detected Domain: 5.tm

XIOC detected Domain: 5.tm

extracted_from_files

Domain
detected Domain: lj.ye

XIOC detected Domain: lj.ye

extracted_from_files

Domain
detected Domain: od.gr

XIOC detected Domain: od.gr

extracted_from_files

Domain
detected Domain: e3.data

XIOC detected Domain: e3.data

extracted_from_files

Domain
detected Domain: games3.startgamer.ru

XIOC detected Domain: games3.startgamer.ru

extracted_from_files

Domain
detected Domain: yf7.ye

XIOC detected Domain: yf7.ye

extracted_from_files

Domain
detected Domain: g.na

XIOC detected Domain: g.na

extracted_from_files

Domain
detected Domain: x.sm

XIOC detected Domain: x.sm

extracted_from_files

Domain
detected Domain: y.tw

XIOC detected Domain: y.tw

extracted_from_files

Domain
detected Domain: ѹ.nu

XIOC detected Domain: ѹ.nu

extracted_from_files

Domain
detected Domain: z.sv

XIOC detected Domain: z.sv

extracted_from_files

Domain
detected Domain: www.inkscape.org

XIOC detected Domain: www.inkscape.org

extracted_from_files

Domain
detected Domain: this.feedback

XIOC detected Domain: this.feedback

extracted_from_files

Domain
detected Domain: parameters.feedback

XIOC detected Domain: parameters.feedback

extracted_from_files

Domain
detected Domain: frame.map

XIOC detected Domain: frame.map

extracted_from_files

Domain
detected Domain: input.map

XIOC detected Domain: input.map

extracted_from_files

Domain
detected Domain: q3.name

XIOC detected Domain: q3.name

extracted_from_files

Domain
detected Domain: audiofile.play

XIOC detected Domain: audiofile.play

extracted_from_files

Domain
detected Domain: support.cloudflare.com

XIOC detected Domain: support.cloudflare.com

extracted_from_files

Domain
detected Domain: ctx.canvas.style.top

XIOC detected Domain: ctx.canvas.style.top

extracted_from_files

Domain
detected Domain: yal.cc

XIOC detected Domain: yal.cc

extracted_from_files

Domain
detected Domain: j8.sj

XIOC detected Domain: j8.sj

extracted_from_files

Domain
detected Domain: 3ukt.gt

XIOC detected Domain: 3ukt.gt

extracted_from_files

Domain
detected Domain: g.ge

XIOC detected Domain: g.ge

extracted_from_files

Domain
detected Domain: chrome.runtime.id

XIOC detected Domain: chrome.runtime.id

extracted_from_files

Domain
detected Domain: royal-card-clash.codeplaymaster.com

XIOC detected Domain: royal-card-clash.codeplaymaster.com

extracted_from_files

Domain
detected Domain: offlinegames.fun

XIOC detected Domain: offlinegames.fun

extracted_from_files

Domain
detected Domain: nsuov.mw

XIOC detected Domain: nsuov.mw

extracted_from_files

Domain
detected Domain: b.is

XIOC detected Domain: b.is

extracted_from_files

URL
detected Domain: purl.org

XIOC detected Domain: purl.org

extracted_from_files

Domain
detected Domain: ns.adobe.com

XIOC detected Domain: ns.adobe.com

extracted_from_files

Domain
detected Domain: codeplaymaster.com

XIOC detected Domain: codeplaymaster.com

extracted_from_files

Domain
detected Domain: readme.md

XIOC detected Domain: readme.md

extracted_from_files

Domain
detected Domain: clients2.google.com

XIOC detected Domain: clients2.google.com

extracted_from_files

Domain
detected Domain: link.target

XIOC detected Domain: link.target

extracted_from_files

Domain
detected Domain: event.target

XIOC detected Domain: event.target

extracted_from_files

Domain
detected Domain: chrome.google.com

XIOC detected Domain: chrome.google.com

extracted_from_files

Domain
detected Domain: game-extension-api.offlinegames.fun

XIOC detected Domain: game-extension-api.offlinegames.fun

extracted_from_files

URL
detected URL: https://gearheadgames.com/

XIOC detected URL: https://gearheadgames.com/

extracted_from_files

URL
detected URL: https://play.google.com/store/apps/details?id=com.nicolaigd.retrohighway

XIOC detected URL: https://play.google.com/store/apps/details?id=com.nicolaigd.retrohighway

extracted_from_files

URL
detected URL: https://apps.apple.com/app/retro-highway/id1163605498

XIOC detected URL: https://apps.apple.com/app/retro-highway/id1163605498

extracted_from_files

URL
detected URL: https://www.jujuadams.com/Scribble/

XIOC detected URL: https://www.jujuadams.com/Scribble/

extracted_from_files

URL
detected URL: https://prebid.adnxs.com/pbc/v1/cache',_0x4b43('0x7dc'),_0x4b43('0x7a0'),_0x4b43('0x918'),_0x4b43('0x188'),'0x34',_0x4b43('0x116'),_0x4b43('0x13'),_0x4b43('0x316'),_0x4b43('0x635'),_0x4b43('0x685'),_0x4b43('0x506'),_0x4b43('0x289'),'getElementById',_0x4b43('0x7fa'),_0x4b43('0x85a'),_0x4b43('0x272'),_0x4b43('0x218'),_0x4b43('0x277'),'requestAnimationFrame',_0x4b43('0xb'),_0x4b43('0x271'),_0x4b43('0x938'),_0x4b43('0x948'),_0x4b43('0x32c'),'0x294',_0x4b43('0x3ae'),'0x3a6',_0x4b43('0x898'),'0x2a1',_0x4b43('0x58a'),_0x4b43('0x6a'),_0x4b43('0x102'),_0x4b43('0x22b'),_0x4b43('0x5d0'),'0x84','0xb0','mode',_0x4b43('0x2c9'),_0x4b43('0xc7'),_0x4b43('0x91c'),_0x4b43('0x6cf'),_0x4b43('0x63e'),_0x4b43('0x954'),'random',_0x4b43('0x3ec'),_0x4b43('0x8b5'),_0x4b43('0x445'),_0x4b43('0xf8'),_0x4b43('0x772'),_0x4b43('0x4'),_0x4b43('0x1ce'),_0x4b43('0x88'),_0x4b43('0x205'),_0x4b43('0x2e2'),_0x4b43('0x717'),'0x226',_0x4b43('0x60a'),_0x4b43('0xe7'),_0x4b43('0x417'),'0x2c',_0x4b43('0x426'),_0x4b43('0x454'),_0x4b43('0x5f0'),_0x4b43('0x428'),_0x4b43('0x675'),'protocol',_0x4b43('0x5bb'),_0x4b43('0x6c8'),_0x4b43('0x30e'),'callers','WebSocket',_0x4b43('0x737'),_0x4b43('0x4e7'),_0x4b43('0x70d'),_0x4b43('0x5d2'),'timing',_0x4b43('0x35a'),_0x4b43('0x25d'),_0x4b43('0xd4'),_0x4b43('0x736'),_0x4b43('0x3c6'),_0x4b43('0x787'),_0x4b43('0x807'),_0x4b43('0x965'),_0x4b43('0x4d7'),'0x28b',_0x4b43('0x7bf'),_0x4b43('0x754'),'0x199',_0x4b43('0x324'),'pokiSdkContainer','0x17f','adContainer',_0x4b43('0x3ce'),_0x4b43('0x303'),_0x4b43('0x411'),_0x4b43('0x2e1'),_0x4b43('0x3f9'),_0x4b43('0x76b'),_0x4b43('0x54c'),_0x4b43('0x432'),_0x4b43('0x134'),_0x4b43('0x1e7'),_0x4b43('0x389'),_0x4b43('0x5a2'),_0x4b43('0x473'),_0x4b43('0x459'),_0x4b43('0xe8'),_0x4b43('0x705'),_0x4b43('0x769'),_0x4b43('0x174'),'0xee',_0x4b43('0xfb'),_0x4b43('0x1cc'),_0x4b43('0x912'),_0x4b43('0x53a'),_0x4b43('0x67f'),'bd6bdd9e-33a9-11ea-a08a-acde48001122',_0x4b43('0x2bd'),_0x4b43('0x75b'),_0x4b43('0x3fb'),_0x4b43('0x3e1'),_0x4b43('0x329'),'0x346',_0x4b43('0x846'),_0x4b43('0x831'),'0xe9',_0x4b43('0x1f2'),'0x39a',_0x4b43('0x553'),_0x4b43('0x42b'),_0x4b43('0x17c'),_0x4b43('0x448'),_0x4b43('0x51d'),'2c7t4m1o5e3u6n0d',_0x4b43('0x6e8'),_0x4b43('0x622'),'wrapper',_0x4b43('0x87c'),_0x4b43('0x14b'),'isView','0x41',_0x4b43('0x8dc'),_0x4b43('0x640'),_0x4b43('0x980'),'0xfb',_0x4b43('0x7b0'),_0x4b43('0x896'),'0xf1',_0x4b43('0x25a'),'0x234',_0x4b43('0x35'),_0x4b43('0x4fb'),_0x4b43('0x370'),'0x2ce',_0x4b43('0x49f'),_0x4b43('0x16d'),_0x4b43('0xc3'),_0x4b43('0x2da'),_0x4b43('0x86f'),_0x4b43('0x34f'),_0x4b43('0x936'),'getCreativeAdId',_0x4b43('0x442'),'video/ogg',_0x4b43('0x8e0'),_0x4b43('0x899'),'0m2n1e4.3t',_0x4b43('0x796'),'0x30b','0x3b1',_0x4b43('0x5a'),_0x4b43('0x843'),_0x4b43('0x7e5'),_0x4b43('0x68f'),_0x4b43('0x838'),'0x15f',_0x4b43('0x2f1'),_0x4b43('0x642'),_0x4b43('0x28'),_0x4b43('0x4aa'),_0x4b43('0x262'),_0x4b43('0x265'),'width',_0x4b43('0x70e'),_0x4b43('0x659'),'18608',_0x4b43('0x971'),_0x4b43('0x37e'),_0x4b43('0x859'),_0x4b43('0x21a'),_0x4b43('0x415'),_0x4b43('0x22f'),_0x4b43('0x20e'),_0x4b43('0x515'),'0x14d',_0x4b43('0x45c'),_0x4b43('0x4f1'),_0x4b43('0x443'),_0x4b43('0x52'),_0x4b43('0x716'),'No

XIOC detected URL: https://prebid.adnxs.com/pbc/v1/cache',_0x4b43('0x7dc'),_0x4b43('0x7a0'),_0x4b43('0x918'),_0x4b43('0x188'),'0x34',_0x4b43('0x116'),_0x4b43('0x13'),_0x4b43('0x316'),_0x4b43('0x635'),_0x4b43('0x685'),_0x4b43('0x506'),_0x4b43('0x289'),'getElementById',_0x4b43('0x7fa'),_0x4b43('0x85a'),_0x4b43('0x272'),_0x4b43('0x218'),_0x4b43('0x277'),'requestAnimationFrame',_0x4b43('0xb'),_0x4b43('0x271'),_0x4b43('0x938'),_0x4b43('0x948'),_0x4b43('0x32c'),'0x294',_0x4b43('0x3ae'),'0x3a6',_0x4b43('0x898'),'0x2a1',_0x4b43('0x58a'),_0x4b43('0x6a'),_0x4b43('0x102'),_0x4b43('0x22b'),_0x4b43('0x5d0'),'0x84','0xb0','mode',_0x4b43('0x2c9'),_0x4b43('0xc7'),_0x4b43('0x91c'),_0x4b43('0x6cf'),_0x4b43('0x63e'),_0x4b43('0x954'),'random',_0x4b43('0x3ec'),_0x4b43('0x8b5'),_0x4b43('0x445'),_0x4b43('0xf8'),_0x4b43('0x772'),_0x4b43('0x4'),_0x4b43('0x1ce'),_0x4b43('0x88'),_0x4b43('0x205'),_0x4b43('0x2e2'),_0x4b43('0x717'),'0x226',_0x4b43('0x60a'),_0x4b43('0xe7'),_0x4b43('0x417'),'0x2c',_0x4b43('0x426'),_0x4b43('0x454'),_0x4b43('0x5f0'),_0x4b43('0x428'),_0x4b43('0x675'),'protocol',_0x4b43('0x5bb'),_0x4b43('0x6c8'),_0x4b43('0x30e'),'callers','WebSocket',_0x4b43('0x737'),_0x4b43('0x4e7'),_0x4b43('0x70d'),_0x4b43('0x5d2'),'timing',_0x4b43('0x35a'),_0x4b43('0x25d'),_0x4b43('0xd4'),_0x4b43('0x736'),_0x4b43('0x3c6'),_0x4b43('0x787'),_0x4b43('0x807'),_0x4b43('0x965'),_0x4b43('0x4d7'),'0x28b',_0x4b43('0x7bf'),_0x4b43('0x754'),'0x199',_0x4b43('0x324'),'pokiSdkContainer','0x17f','adContainer',_0x4b43('0x3ce'),_0x4b43('0x303'),_0x4b43('0x411'),_0x4b43('0x2e1'),_0x4b43('0x3f9'),_0x4b43('0x76b'),_0x4b43('0x54c'),_0x4b43('0x432'),_0x4b43('0x134'),_0x4b43('0x1e7'),_0x4b43('0x389'),_0x4b43('0x5a2'),_0x4b43('0x473'),_0x4b43('0x459'),_0x4b43('0xe8'),_0x4b43('0x705'),_0x4b43('0x769'),_0x4b43('0x174'),'0xee',_0x4b43('0xfb'),_0x4b43('0x1cc'),_0x4b43('0x912'),_0x4b43('0x53a'),_0x4b43('0x67f'),'bd6bdd9e-33a9-11ea-a08a-acde48001122',_0x4b43('0x2bd'),_0x4b43('0x75b'),_0x4b43('0x3fb'),_0x4b43('0x3e1'),_0x4b43('0x329'),'0x346',_0x4b43('0x846'),_0x4b43('0x831'),'0xe9',_0x4b43('0x1f2'),'0x39a',_0x4b43('0x553'),_0x4b43('0x42b'),_0x4b43('0x17c'),_0x4b43('0x448'),_0x4b43('0x51d'),'2c7t4m1o5e3u6n0d',_0x4b43('0x6e8'),_0x4b43('0x622'),'wrapper',_0x4b43('0x87c'),_0x4b43('0x14b'),'isView','0x41',_0x4b43('0x8dc'),_0x4b43('0x640'),_0x4b43('0x980'),'0xfb',_0x4b43('0x7b0'),_0x4b43('0x896'),'0xf1',_0x4b43('0x25a'),'0x234',_0x4b43('0x35'),_0x4b43('0x4fb'),_0x4b43('0x370'),'0x2ce',_0x4b43('0x49f'),_0x4b43('0x16d'),_0x4b43('0xc3'),_0x4b43('0x2da'),_0x4b43('0x86f'),_0x4b43('0x34f'),_0x4b43('0x936'),'getCreativeAdId',_0x4b43('0x442'),'video/ogg',_0x4b43('0x8e0'),_0x4b43('0x899'),'0m2n1e4.3t',_0x4b43('0x796'),'0x30b','0x3b1',_0x4b43('0x5a'),_0x4b43('0x843'),_0x4b43('0x7e5'),_0x4b43('0x68f'),_0x4b43('0x838'),'0x15f',_0x4b43('0x2f1'),_0x4b43('0x642'),_0x4b43('0x28'),_0x4b43('0x4aa'),_0x4b43('0x262'),_0x4b43('0x265'),'width',_0x4b43('0x70e'),_0x4b43('0x659'),'18608',_0x4b43('0x971'),_0x4b43('0x37e'),_0x4b43('0x859'),_0x4b43('0x21a'),_0x4b43('0x415'),_0x4b43('0x22f'),_0x4b43('0x20e'),_0x4b43('0x515'),'0x14d',_0x4b43('0x45c'),_0x4b43('0x4f1'),_0x4b43('0x443'),_0x4b43('0x52'),_0x4b43('0x716'),'No

extracted_from_files

URL
detected URL: https://a.poki.com/fonts/proxima-nova-bold-latin.woff2)

XIOC detected URL: https://a.poki.com/fonts/proxima-nova-bold-latin.woff2)

extracted_from_files

Other
detected Email: [email protected]

XIOC detected Email: [email protected]

extracted_from_files

URL
detected URL: https://github.com/antimatter15/jsgif)

XIOC detected URL: https://github.com/antimatter15/jsgif)

extracted_from_files

URL
detected URL: http://www.java2s.com/Code/Java/2D-Graphics-GUI/AnimatedGifEncoder.htm

XIOC detected URL: http://www.java2s.com/Code/Java/2D-Graphics-GUI/AnimatedGifEncoder.htm

extracted_from_files

URL
detected URL: http://

XIOC detected URL: http://

extracted_from_files

URL
detected URL: https://gearheadgames.com/royalcardclash/privacypolicy.html

XIOC detected URL: https://gearheadgames.com/royalcardclash/privacypolicy.html

extracted_from_files

URL
detected URL: https://twitter.com/gearhead_games

XIOC detected URL: https://twitter.com/gearhead_games

extracted_from_files

URL
detected URL: https://www.tiktok.com/@gearhead_games

XIOC detected URL: https://www.tiktok.com/@gearhead_games

extracted_from_files

URL
detected URL: https://games3.startgamer.ru/10/royal_card_clash/royalcardclash/save.dat

XIOC detected URL: https://games3.startgamer.ru/10/royal_card_clash/royalcardclash/save.dat

extracted_from_files

URL
detected URL: https://

XIOC detected URL: https://

extracted_from_files

URL
detected URL: https://help.yoyogames.com/hc/en-us/articles/360011372851

XIOC detected URL: https://help.yoyogames.com/hc/en-us/articles/360011372851

extracted_from_files

URL
detected URL: https://github.com/imaya/zlib.js

XIOC detected URL: https://github.com/imaya/zlib.js

extracted_from_files

URL
detected URL: https://github.com/antimatter15/jsgif/)

XIOC detected URL: https://github.com/antimatter15/jsgif/)

extracted_from_files

URL
detected URL: http://ns.adobe.com/photoshop/1.0/

XIOC detected URL: http://ns.adobe.com/photoshop/1.0/

extracted_from_files

URL
detected URL: http://purl.org/dc/elements/1.1/

XIOC detected URL: http://purl.org/dc/elements/1.1/

extracted_from_files

URL
detected URL: http://ns.adobe.com/tiff/1.0/

XIOC detected URL: http://ns.adobe.com/tiff/1.0/

extracted_from_files

URL
detected URL: http://ns.adobe.com/xap/1.0/

XIOC detected URL: http://ns.adobe.com/xap/1.0/

extracted_from_files

URL
detected URL: http://www.w3.org/1999/02/22-rdf-syntax-ns#

XIOC detected URL: http://www.w3.org/1999/02/22-rdf-syntax-ns#

extracted_from_files

URL
detected URL: https://support.cloudflare.com/hc/en-us/articles/229373388-Cache-Content-by-Device-Type-Mobile-Tablet-Desktop-

XIOC detected URL: https://support.cloudflare.com/hc/en-us/articles/229373388-Cache-Content-by-Device-Type-Mobile-Tablet-Desktop-

extracted_from_files

URL
detected URL: https://yal.cc/gamemaker-html5-loading-bar-extended/

XIOC detected URL: https://yal.cc/gamemaker-html5-loading-bar-extended/

extracted_from_files

URL
detected URL: https://*.codeplaymaster.com/*

XIOC detected URL: https://*.codeplaymaster.com/*

extracted_from_files

URL
detected URL: https://clients2.google.com/service/update2/crx

XIOC detected URL: https://clients2.google.com/service/update2/crx

extracted_from_files

URL
detected URL: https://chrome.google.com/webstore/detail/$

XIOC detected URL: https://chrome.google.com/webstore/detail/$

extracted_from_files

URL
detected URL: https://game-extension-api.offlinegames.fun/recommend/');

XIOC detected URL: https://game-extension-api.offlinegames.fun/recommend/');

extracted_from_files

URL
detected URL: https://offlinegames.fun

XIOC detected URL: https://offlinegames.fun

extracted_from_files

URL
detected URL: http://ns.adobe.com/xap/1.0/sType/ResourceEvent#

XIOC detected URL: http://ns.adobe.com/xap/1.0/sType/ResourceEvent#

extracted_from_files

URL
detected URL: http://ns.adobe.com/xap/1.0/mm/

XIOC detected URL: http://ns.adobe.com/xap/1.0/mm/

extracted_from_files

Hash
detected MD5 Hash: 900150983cd24fb0d6963f7d28e17f72

XIOC detected MD5 Hash: 900150983cd24fb0d6963f7d28e17f72

extracted_from_files

Hash
detected SHA256 Hash: C0CC3D2802E5F2463BFA0046C41D2F65A6335BAAEEFBBA6C7DBD5681D5CA7C46

XIOC detected SHA256 Hash: C0CC3D2802E5F2463BFA0046C41D2F65A6335BAAEEFBBA6C7DBD5681D5CA7C46

extracted_from_files

Domain
detected Domain: object.prototype.hasownproperty.call

XIOC detected Domain: object.prototype.hasownproperty.call

extracted_from_files

Domain
detected Domain: 55.call

XIOC detected Domain: 55.call

extracted_from_files

Domain
detected Domain: date.now

XIOC detected Domain: date.now

extracted_from_files

Domain
detected Domain: rz.cw

XIOC detected Domain: rz.cw

extracted_from_files

Security Analysis Summary

Security Analysis Overview

Royal Card Clash - Strategically play cards to defeat the royals! is a Chrome Web Store extension published by [email protected]. Version 1.0.5 has been analyzed by the Risky Plugins security platform, receiving a risk score of 57.3/100 (MEDIUM risk) based on 446 security findings.

Risk Assessment

This extension presents moderate security risk. Several findings were detected that may warrant attention. Users should carefully review the permissions and findings before installation.

Findings Breakdown

  • High: 25 finding(s)
  • Medium: 421 finding(s)

What Was Analyzed

The security assessment covers multiple analysis categories:

  • Malware Detection: YARA rule matching against 2,400+ malware signatures
  • Secret Detection: Scanning for exposed API keys, tokens, and credentials
  • Static Analysis: Code-level security analysis for common vulnerability patterns
  • Network Analysis: Detection of suspicious network communications and endpoints
  • Obfuscation Detection: Identification of code obfuscation techniques

Developer Information

Royal Card Clash - Strategically play cards to defeat the royals! is published by [email protected] on the Chrome Web Store marketplace. The extension has approximately 300 users.

Recommendation

Exercise caution with this extension. Review the detailed findings and ensure the requested permissions align with the extension's stated functionality before installation.

Frequently Asked Questions