________.apk

52.07 MB

Analyzed: 2026-03-22 10:43 UTC

APK Security & Privacy Score

Security scoring uses multi-engine scan signals and APK indicators. Privacy scoring uses requested permissions and network endpoint patterns.

Security Scan-weighted
55/100
Threat scan flagged
Privacy Permissions & network
41/100
High-risk permissions
47/100
High Risk
Overall trust

Facts

Threat scan 5/76 flagged, 0 suspicious
Permissions 31 requested
Network strings No URL strings detected
Target SDK Unknown
Certificate Valid until 2039-11-29 (14 years, suspicious)

Warnings

Threat scan flagged: 5/76 scanners marked this file as malicious.
High-risk permissions detected: android.permission.REQUEST_INSTALL_PACKAGES, android.permission.SYSTEM_ALERT_WINDOW, android.permission.WRITE_SETTINGS
Requests 31 permissions (review carefully).

Analysis Coverage

This report is partial. Some core metadata could not be extracted.
version
Package Name com.amap.api.v2.apikey
Version Code
Version Name
Debuggable No
Allow Backup No
Min SDK Unknown
Target SDK Unknown
Supported ABIs
arm64-v8a armeabi-v7a

Certificate & Signer

Valid From 2026-03-22 10:23:00
Valid To 2039-11-29 10:23:00
Serial Number 76cbb377244f4d8f
Thumbprint 09975d4acfbde3eda1019cf46f3ddfde69d4848b
Issuer: C 58GnJHh4f6GeJ
Issuer: DN C:58GnJHh4f6GeJ, L:L0BZhYFV7FgNn, O:eEzGV8DOX8zh0, ST:8fzyfm6no7pqb, OU:HC2gwOaR2rSg2
Issuer: L L0BZhYFV7FgNn
Issuer: O eEzGV8DOX8zh0
Issuer: OU HC2gwOaR2rSg2
Issuer: ST 8fzyfm6no7pqb
Subject: C 58GnJHh4f6GeJ
Subject: DN C:58GnJHh4f6GeJ, L:L0BZhYFV7FgNn, O:eEzGV8DOX8zh0, ST:8fzyfm6no7pqb, OU:HC2gwOaR2rSg2
Subject: L L0BZhYFV7FgNn
Subject: O eEzGV8DOX8zh0
Subject: OU HC2gwOaR2rSg2
Subject: ST 8fzyfm6no7pqb

Security Scan

5 /76
⚠️ Threats Detected
Detected by 5 vendors: AhnLab-V3 (PUP/Android.Agent.1313362), BitDefenderFalx (Android.Riskware.PackMal.WW), CAT-QuickHeal (AndroidELF.Evo.A3e41)
Scanned by 76 security vendors
Last scan: 2026-03-22 10:43 UTC
Malicious
5
Suspicious
0
Harmless
0
Undetected
62
Timeout
0
Failure
0

Scan Providers

76 vendors
ALYac undetected
No result reported
Engine 2.0.0.10
APEX type-unsupported
No result reported
Engine 6.761
AVG undetected
No result reported
Engine 23.9.8494.0
Acronis undetected
No result reported
Engine 1.2.0.121
AhnLab-V3 malicious
PUP/Android.Agent.1313362
Engine 3.29.3.10609
Alibaba undetected
No result reported
Engine 0.3.0.5
Antiy-AVL undetected
No result reported
Engine 3.0
Arcabit undetected
No result reported
Engine 2025.0.0.23
Avast undetected
No result reported
Engine 23.9.8494.0
Avast-Mobile undetected
No result reported
Engine 260321-02
Avira undetected
No result reported
Engine 8.3.3.24
Baidu undetected
No result reported
Engine 1.0.0.2
BitDefender undetected
No result reported
Engine 7.2
BitDefenderFalx malicious
Android.Riskware.PackMal.WW
Engine 2.0.936
Bkav undetected
No result reported
Engine 2.0.0.1
CAT-QuickHeal malicious
AndroidELF.Evo.A3e41
Engine 22.00
CMC undetected
No result reported
Engine 2.4.2022.1
CTX undetected
No result reported
Engine 2024.8.29.1
ClamAV undetected
No result reported
Engine 1.5.2.0
CrowdStrike undetected
No result reported
Engine 1.0
Cylance type-unsupported
No result reported
Engine 3.0.0.0
Cynet type-unsupported
No result reported
Engine 4.0.3.4
DeepInstinct type-unsupported
No result reported
Engine 5.0.0.8
DrWeb undetected
No result reported
Engine 7.0.75.2070
ESET-NOD32 undetected
No result reported
Engine 18.2.18.0
Elastic undetected
No result reported
Engine 4.0.252
Emsisoft undetected
No result reported
Engine 2024.8.0.61147
F-Secure undetected
No result reported
Engine 18.10.1547.307
Fortinet undetected
No result reported
Engine 7.0.30.0
GData undetected
No result reported
Engine GD:27.43946AVA:64.30883
Google malicious
Detected
Engine 1774166440
Gridinsoft undetected
No result reported
Engine 1.0.241.174
Ikarus malicious
AndroidOS.Evo
Engine 6.4.16.0
Jiangmin undetected
No result reported
Engine 16.0.100
K7AntiVirus undetected
No result reported
Engine 14.42.58954
K7GW undetected
No result reported
Engine 14.42.58955
Kaspersky undetected
No result reported
Engine 22.0.1.28
Kingsoft undetected
No result reported
Engine None
Lionic undetected
No result reported
Engine 8.16
Malwarebytes undetected
No result reported
Engine 3.1.0.214
MaxSecure undetected
No result reported
Engine 1.0.0.1
McAfeeD undetected
No result reported
Engine 1.2.0.14148
MicroWorld-eScan undetected
No result reported
Engine 14.0.409.0
Microsoft undetected
No result reported
Engine 1.1.26010.1
NANO-Antivirus undetected
No result reported
Engine 1.0.170.26895
Paloalto type-unsupported
No result reported
Engine 0.9.0.1003
Panda undetected
No result reported
Engine 4.6.4.2
Rising undetected
No result reported
Engine 25.0.0.28
SUPERAntiSpyware undetected
No result reported
Engine 5.6.0.1032
Sangfor undetected
No result reported
Engine 2.22.3.0
SentinelOne type-unsupported
No result reported
Engine 7.5.3.1
Skyhigh undetected
No result reported
Engine v2021.2.0+4045
Sophos undetected
No result reported
Engine 3.3.1.0
Symantec undetected
No result reported
Engine 1.22.0.0
SymantecMobileInsight undetected
No result reported
Engine 2.0
TACHYON undetected
No result reported
Engine 2026-03-22.02
Tencent undetected
No result reported
Engine 1.0.0.1
Trapmine type-unsupported
No result reported
Engine 4.0.10.0
TrellixENS undetected
No result reported
Engine 6.0.6.653
TrendMicro undetected
No result reported
Engine 24.550.0.1002
TrendMicro-HouseCall undetected
No result reported
Engine 24.550.0.1002
Trustlook undetected
No result reported
Engine 1.0
VBA32 undetected
No result reported
Engine 5.5.1
VIPRE undetected
No result reported
Engine 6.0.0.35
Varist undetected
No result reported
Engine 6.6.1.3
ViRobot undetected
No result reported
Engine 2014.3.20.0
VirIT undetected
No result reported
Engine 9.5.1170
Webroot undetected
No result reported
Engine 1.9.0.8
Xcitium undetected
No result reported
Engine 38499
Yandex undetected
No result reported
Engine 5.5.2.24
Zillya undetected
No result reported
Engine 2.0.0.5567
ZoneAlarm undetected
No result reported
Engine 6.23-113519110
Zoner undetected
No result reported
Engine 2.2.2.0
alibabacloud type-unsupported
No result reported
Engine 2.2.0
huorong undetected
No result reported
Engine dbd7303:dbd7303:38b5ae0:38b5ae0
tehtris type-unsupported
No result reported

File Signatures

SHA-256 06647d57fd06ec3021e37d805afe4ca646cd88daa70b92c0f134dd55deb22118
MD5 b4cf633b5784b5b4d623c253a89a0eaa
SHA-1 dfb051e8b78e1537211a09e2a58e5588701d72ad
SSDEEP 786432:O7diuAwANosm8Rk2mivgb2FWlal4CnVnB9eqRyNklJn25chqr9qx/SVZKcrp2Xng:LKIk2vCP63VnFnn2oqrM/Crp2Xg
TLSH T175C71225BFDA892AF5B28D34CAE53253741ABD673D00C4A9344E720D1B33AC65DE0B5E
VHASH 3d5b38ae7c9992883063fd5d4265fd5d

File Intelligence

Type Description Android Human-friendly file type name based on multiple detection methods.
Type Extension apk Most likely file extension inferred from the content.
Type Tag android Primary type tag assigned by the classifier.
Type Tags executable, mobile, android, apk Additional type tags that describe the file content.
Magic Zip archive data, at least v0.0 to extract, compression method=deflate File signature result from magic bytes inspection.
Magika APK File type predicted by Magika (ML-based file type detection).
TrID Android Package (65%), Sweet Home 3D Design (generic) (25.3%), ZIP compressed archive (9.6%) TrID file type guesses with probabilities.
dhash 0000001e0e1d1410 Perceptual hash used to compare visual similarity of files.
raw md5 7b3ae24247d29ebc613377ece0dbd043 Raw MD5 hash of the file contents.
extensions xml (462), png (456), gif (33), version (17), so (10), kotlin_module (4), mp3 (3), webp (3), java (2), kotlin_builtins (2), bks (1), html (1), jks (1), json (1), properties (1), txt (1), wav (1) File extensions found inside the APK and how many of each.
file types XML (462), PNG (456), unknown (36), GIF (33), ELF (10), MP3 (3) Detected embedded file types and their counts.
highest datetime 1981-01-01 01:01:02 UTC Latest timestamp found among files inside the archive.
lowest datetime 1981-01-01 01:01:02 UTC Earliest timestamp found among files inside the archive.
num children 2684 Number of files contained within the archive.
type APK Container type detected for the analyzed file.
uncompressed size 11 MB Estimated total size of all files after extraction.

Deep Manifest Analysis

Native Libraries (14)

libBugly-ext libBugly-ext.so
libRSSupport libRSSupport.so
libbmob libbmob.so
libjwqillqepu libjwqillqepu.so
libnama libnama.so
libne_audio libne_audio.so
libnrtc_mp4v2 libnrtc_mp4v2.so
libnrtc_sdk libnrtc_sdk.so
libqRRwNjmNbFuKLAg libqRRwNjmNbFuKLAg.so
librsjni librsjni.so
librsjni_androidx librsjni_androidx.so
librts_network librts_network.so
libtraceroute libtraceroute.so
libyxbase libyxbase.so

Requested Permissions (31)

access extra location provider commands Allows the app to access extra location provider commands. This may allow the app to interfere with the operation of the GPS or other location sources. android.permission.ACCESS_LOCATION_EXTRA_COMMANDS
view network connections Allows the app to view information about network connections such as which networks exist and are connected. android.permission.ACCESS_NETWORK_STATE
view Wi-Fi connections Allows the app to view information about Wi-Fi networking, such as whether Wi-Fi is enabled and name of connected Wi-Fi devices. android.permission.ACCESS_WIFI_STATE
android.permission.ANSWER_PHONE_CALLS Custom app or vendor permission (not publicly documented). android.permission.ANSWER_PHONE_CALLS
android.permission.BIND_JOB_SERVICE Custom app or vendor permission (not publicly documented). android.permission.BIND_JOB_SERVICE
directly call phone numbers Allows the app to call phone numbers without your intervention. This may result in unexpected charges or calls. Note that this doesn\'t allow the app to call emergency numbers. Malicious apps may cost you money by making calls without your confirmation, or dial carrier codes which cause incoming calls to be automatically forwarded to another number. android.permission.CALL_PHONE
take pictures and videos This app can take pictures and record videos using the camera while the app is in use. android.permission.CAMERA
Change Configuration android.permission.CHANGE_CONFIGURATION
connect and disconnect from Wi-Fi Allows the app to connect to and disconnect from Wi-Fi access points and to make changes to device configuration for Wi-Fi networks. android.permission.CHANGE_WIFI_STATE
disable your screen lock Allows the app to disable the keylock and any associated password security. For example, the phone disables the keylock when receiving an incoming phone call, then re-enables the keylock when the call is finished. android.permission.DISABLE_KEYGUARD
Flashlight android.permission.FLASHLIGHT
Foreground service Allows the app to run a foreground service. android.permission.FOREGROUND_SERVICE
retrieve running apps Allows the app to retrieve information about currently and recently running tasks. This may allow the app to discover information about which applications are used on the device. android.permission.GET_TASKS
have full network access Allows the app to create network sockets and use custom network protocols. The browser and other applications provide means to send data to the internet, so this permission is not required to send data to the internet. android.permission.INTERNET
close other apps Allows the app to end background processes of other apps. This may cause other apps to stop running. android.permission.KILL_BACKGROUND_PROCESSES
change your audio settings Allows the app to modify global audio settings such as volume and which speaker is used for output. android.permission.MODIFY_AUDIO_SETTINGS
Mount Unmount Filesystems android.permission.MOUNT_UNMOUNT_FILESYSTEMS
reroute outgoing calls Allows the app to see the number being dialed during an outgoing call with the option to redirect the call to a different number or abort the call altogether. android.permission.PROCESS_OUTGOING_CALLS
App badge update Allows the app to update the launcher icon badge count on Android launchers. android.permission.READ_APP_BADGE
read call log This app can read your call history. android.permission.READ_CALL_LOG
read the contents of your shared storage Allows the app to read the contents of your shared storage. android.permission.READ_EXTERNAL_STORAGE
read phone status and identity Allows the app to access the phone features of the device. This permission allows the app to determine the phone number and device IDs, whether a call is active, and the remote number connected by a call. android.permission.READ_PHONE_STATE
Read Privileged Phone State android.permission.READ_PRIVILEGED_PHONE_STATE
record audio android.permission.RECORD_AUDIO
android.permission.REQUEST_INSTALL_PACKAGES Custom app or vendor permission (not publicly documented). android.permission.REQUEST_INSTALL_PACKAGES
This app can appear on top of other apps This app can appear on top of other apps or other parts of the screen. This may interfere with normal app usage and change the way that other apps appear. android.permission.SYSTEM_ALERT_WINDOW
control vibration Allows the app to control the vibrator. android.permission.VIBRATE
keep car screen turned on Allows the app to keep the car screen turned on. android.permission.WAKE_LOCK
write call log Allows the app to modify your tablet\'s call log, including data about incoming and outgoing calls. Malicious apps may use this to erase or modify your call log. android.permission.WRITE_CALL_LOG
modify or delete the contents of your shared storage Allows the app to write the contents of your shared storage. android.permission.WRITE_EXTERNAL_STORAGE
modify system settings Allows the app to modify the system\'s settings data. Malicious apps may corrupt your system\'s configuration. android.permission.WRITE_SETTINGS

Submission Details

Submitted At 2026-03-22
First Submission 2026-03-22
Last Submission 2026-03-22
Stored Until 2026-04-21