zk_teacher_release_v1.0_2026-02-26_17-33-14.apk

27.67 MB

Analyzed: 2026-02-26 09:39 UTC

APK Security & Privacy Score

Security scoring uses multi-engine scan signals and APK indicators. Privacy scoring uses requested permissions and network endpoint patterns.

Security Scan-weighted
100/100
Threat scan clean Modern target SDK
Privacy Permissions & network
84/100
AllowBackup enabled
91/100
Excellent
Overall trust

Facts

Threat scan 0/76 flagged, 0 suspicious
Permissions 10 requested
Network strings 1 URLs (0 HTTP, 1 HTTPS)
Target SDK 36
Certificate Valid until 2124-12-15 (99 years, suspicious)

Warnings

AllowBackup is enabled.
Package Name cn.wx.zkteacher
Version Code 1
Version Name 1.0
Application Name cn.wx.zkteacher.WXApp
Debuggable No
Allow Backup Yes
Min SDK Android 24 (Nougat)
Target SDK Android 36 (Unknown)
Supported ABIs
armeabi-v7a

Certificate & Signer

Valid From 2026-01-08 02:42:44
Valid To 2124-12-15 02:42:44
Serial Number 1
Thumbprint d093170f0849f9fecb4be7ec6a75f1f52fbc23fc
Issuer: C china
Issuer: CN wenxiang
Issuer: DN C:china, CN:wenxiang, L:beijing, O:wenxiang, ST:beijing, OU:wenxiang
Issuer: L beijing
Issuer: O wenxiang
Issuer: OU wenxiang
Issuer: ST beijing
Subject: C china
Subject: CN wenxiang
Subject: DN C:china, CN:wenxiang, L:beijing, O:wenxiang, ST:beijing, OU:wenxiang
Subject: L beijing
Subject: O wenxiang
Subject: OU wenxiang
Subject: ST beijing

Security Scan

0 /76
✓ Clean
Scanned by 76 security vendors
Last scan: 2026-02-26 09:39 UTC
Malicious
0
Suspicious
0
Harmless
0
Undetected
64
Timeout
1
Failure
2

Scan Providers

76 vendors
ALYac undetected
No result reported
Engine 2.0.0.10
APEX type-unsupported
No result reported
Engine 6.752
AVG undetected
No result reported
Engine 23.9.8494.0
Acronis undetected
No result reported
Engine 1.2.0.121
AhnLab-V3 undetected
No result reported
Engine 3.29.1.10604
Alibaba undetected
No result reported
Engine 0.3.0.5
Antiy-AVL undetected
No result reported
Engine 3.0
Arcabit undetected
No result reported
Engine 2025.0.0.23
Avast undetected
No result reported
Engine 23.9.8494.0
Avast-Mobile undetected
No result reported
Engine 260225-02
Avira undetected
No result reported
Engine 8.3.3.24
Baidu undetected
No result reported
Engine 1.0.0.2
BitDefender undetected
No result reported
Engine 7.2
BitDefenderFalx undetected
No result reported
Engine 2.0.936
Bkav undetected
No result reported
Engine 2.0.0.1
CAT-QuickHeal undetected
No result reported
Engine 22.00
CMC undetected
No result reported
Engine 2.4.2022.1
CTX undetected
No result reported
Engine 2024.8.29.1
ClamAV timeout
No result reported
Engine 1.5.1.0
CrowdStrike undetected
No result reported
Engine 1.0
Cylance type-unsupported
No result reported
Engine 3.0.0.0
Cynet type-unsupported
No result reported
Engine 4.0.3.4
DeepInstinct type-unsupported
No result reported
Engine 5.0.0.8
DrWeb undetected
No result reported
Engine 7.0.75.2070
ESET-NOD32 undetected
No result reported
Engine 18.2.18.0
Elastic undetected
No result reported
Engine 4.0.250
Emsisoft undetected
No result reported
Engine 2024.8.0.61147
F-Secure undetected
No result reported
Engine 18.10.1547.307
Fortinet undetected
No result reported
Engine 7.0.30.0
GData undetected
No result reported
Engine GD:27.43663AVA:64.30730
Google undetected
No result reported
Engine 1772096438
Gridinsoft undetected
No result reported
Engine 1.0.239.174
Ikarus undetected
No result reported
Engine 6.4.16.0
Jiangmin undetected
No result reported
Engine 16.0.100
K7AntiVirus undetected
No result reported
Engine 14.38.58708
K7GW undetected
No result reported
Engine 14.38.58709
Kaspersky undetected
No result reported
Engine 22.0.1.28
Kingsoft undetected
No result reported
Engine None
Lionic undetected
No result reported
Engine 8.16
Malwarebytes undetected
No result reported
Engine 3.1.0.211
MaxSecure undetected
No result reported
Engine 1.0.0.1
McAfeeD undetected
No result reported
Engine 1.2.0.14023
MicroWorld-eScan undetected
No result reported
Engine 14.0.409.0
Microsoft undetected
No result reported
Engine 1.1.26010.1
NANO-Antivirus undetected
No result reported
Engine 1.0.170.26895
Paloalto type-unsupported
No result reported
Engine 0.9.0.1003
Panda undetected
No result reported
Engine 4.6.4.2
Rising undetected
No result reported
Engine 25.0.0.28
SUPERAntiSpyware undetected
No result reported
Engine 5.6.0.1032
Sangfor undetected
No result reported
Engine 2.22.3.0
SentinelOne type-unsupported
No result reported
Engine 7.5.3.1
Skyhigh failure
No result reported
Sophos undetected
No result reported
Engine 3.3.1.0
Symantec undetected
No result reported
Engine 1.22.0.0
SymantecMobileInsight undetected
No result reported
Engine 2.0
TACHYON undetected
No result reported
Engine 2026-02-26.02
Tencent undetected
No result reported
Engine 1.0.0.1
Trapmine type-unsupported
No result reported
Engine 4.0.10.0
TrellixENS failure
No result reported
Engine 6.0.6.653
TrendMicro undetected
No result reported
Engine 24.550.0.1002
TrendMicro-HouseCall undetected
No result reported
Engine 24.550.0.1002
Trustlook undetected
No result reported
Engine 1.0
VBA32 undetected
No result reported
Engine 5.5.1
VIPRE undetected
No result reported
Engine 6.0.0.35
Varist undetected
No result reported
Engine 6.6.1.3
ViRobot undetected
No result reported
Engine 2014.3.20.0
VirIT undetected
No result reported
Engine 9.5.1153
Webroot undetected
No result reported
Engine 1.9.0.8
Xcitium undetected
No result reported
Engine 38443
Yandex undetected
No result reported
Engine 5.5.2.24
Zillya undetected
No result reported
Engine 2.0.0.5552
ZoneAlarm undetected
No result reported
Engine 6.23-113518480
Zoner undetected
No result reported
Engine 2.2.2.0
alibabacloud type-unsupported
No result reported
Engine 2.2.0
huorong undetected
No result reported
Engine 2c65c7a:2c65c7a:f6b357d:f6b357d
tehtris type-unsupported
No result reported

File Signatures

SHA-256 0d67dbb6b6fdbec13f7b0acf27a1be04524bc29672e704789f6eada918284c41
MD5 e69744ce1234fcd3769898573b276031
SHA-1 4e528d1092b88291c375612521eac11757b29fe2
SSDEEP 393216:sSKNE1zrYI1u405uuum3n/qiD+9rw0F+VW+apkpXZCXlwTmKWDPAr9EiubfGG:eE1nYI1uluuNCii9rwqWZelwCbiETTR
TLSH T13957F152F315882FE9FB24357CA20AE17F028CD776319B924A46BB5D67BB3442D027E4
VHASH 537223c4a332ea64c415ba584ec2b737
PERMHASH b3315ac8f16149f663909ea55c13318115ccd6cae6e69df0fd83c16925c3afc1

File Intelligence

Type Description Android Human-friendly file type name based on multiple detection methods.
Type Extension apk Most likely file extension inferred from the content.
Type Tag android Primary type tag assigned by the classifier.
Type Tags executable, mobile, android, apk Additional type tags that describe the file content.
Magic Zip archive data, at least v0.0 to extract, compression method=deflate File signature result from magic bytes inspection.
Magika APK File type predicted by Magika (ML-based file type detection).
TrID Android Package (50%), VYM Mind Map (23.1%), Sweet Home 3D Design (generic) (19.4%), ZIP compressed archive (7.4%) TrID file type guesses with probabilities.
dhash 00003c1e1e0d0410 Perceptual hash used to compare visual similarity of files.
raw md5 0348c132bc689b5b4bed22f1efe646a5 Raw MD5 hash of the file contents.
extensions xml (673), png (213), version (76), kotlin_builtins (7), webp (5), so (4), dex (3), caffemodel (2), prototxt (2), AutoDiscoverable (1), bin (1), CoroutineExceptionHandler (1), gz (1), json (1), MainDispatcherFactory (1), MessageBodyReader (1), MessageBodyWriter (1), mp3 (1), prof (1), profm (1), properties (1), Providers (1), textproto (1) File extensions found inside the APK and how many of each.
file types XML (673), PNG (213), unknown (108), ELF (4), Java Bytecode (1), MP3 (1) Detected embedded file types and their counts.
highest datetime 1981-01-01 01:01:02 UTC Latest timestamp found among files inside the archive.
lowest datetime 1981-01-01 01:01:02 UTC Earliest timestamp found among files inside the archive.
num children 1042 Number of files contained within the archive.
type APK Container type detected for the analyzed file.
uncompressed size 44 MB Estimated total size of all files after extraction.

Deep Manifest Analysis

Activity Intents (1)

cn.wx.zkteacher.ui.start.StartActivity
Actions
Main Activity Action: Start as a main entry point, does not expect to android.intent.action.MAIN
Categories
android.intent.category.LAUNCHER

Receiver Intents (1)

Profile installer Installs performance profiles to speed up app startup and hot paths. androidx.profileinstaller.ProfileInstallReceiver
Actions
Install performance profile Installs a profile that helps optimize app performance. androidx.profileinstaller.action.INSTALL_PROFILE
Skip profile install Skips profile installation for this build. androidx.profileinstaller.action.SKIP_FILE
Save performance profile Saves a profile generated during app usage. androidx.profileinstaller.action.SAVE_PROFILE
Benchmark operation Runs a profile installer benchmark operation. androidx.profileinstaller.action.BENCHMARK_OPERATION

Native Libraries (4)

libandroidx.graphics.path libandroidx.graphics.path.so
libimage_processing_util_jni libimage_processing_util_jni.so
libopencv_java4 libopencv_java4.so
libsurface_util_jni libsurface_util_jni.so

Requested Permissions (10)

view network connections Allows the app to view information about network connections such as which networks exist and are connected. android.permission.ACCESS_NETWORK_STATE
have full network access Allows the app to create network sockets and use custom network protocols. The browser and other applications provide means to send data to the internet, so this permission is not required to send data to the internet. android.permission.INTERNET
take pictures and videos This app can take pictures and record videos using the camera while the app is in use. android.permission.CAMERA
android.permission.READ_MEDIA_IMAGES Custom app or vendor permission (not publicly documented). android.permission.READ_MEDIA_IMAGES
android.permission.READ_MEDIA_AUDIO Custom app or vendor permission (not publicly documented). android.permission.READ_MEDIA_AUDIO
android.permission.READ_MEDIA_VIDEO Custom app or vendor permission (not publicly documented). android.permission.READ_MEDIA_VIDEO
android.permission.READ_MEDIA_VISUAL_USER_SELECTED Custom app or vendor permission (not publicly documented). android.permission.READ_MEDIA_VISUAL_USER_SELECTED
control vibration Allows the app to control the vibrator. android.permission.VIBRATE
Flashlight android.permission.FLASHLIGHT
Dynamic receiver access Internal app permission used to protect dynamic broadcast receivers. cn.wx.zkteacher.DYNAMIC_RECEIVER_NOT_EXPORTED_PERMISSION

Uses Features (1)

Camera Feature for {@link #getSystemAvailableFeatures} and android.hardware.camera

Activities (11)

cn.wx.zkteacher.ui.start.StartActivity
cn.wx.zkteacher.ui.login.LoginActivity
cn.wx.zkteacher.ui.login.ForgetPwdActivity
cn.wx.zkteacher.ui.login.SyhActivity
cn.wx.zkteacher.ui.login.ZhuCeActivity
cn.wx.zkteacher.ui.login.UserRuleActivity
cn.wx.zkteacher.ui.main.MainActivity
cn.wx.zkteacher.ui.main.saoyisao.SaoYiSaoActivity
cn.wx.zkteacher.ui.course.CourseDetailActivity
pub.devrel.easypermissions.AppSettingsDialogHolderActivity
com.lxj.xpopup.util.XPermission$PermissionActivity

Services (1)

androidx.camera.core.impl.MetadataHolderService

Broadcast Receivers (1)

Profile installer Installs performance profiles to speed up app startup and hot paths. androidx.profileinstaller.ProfileInstallReceiver

Content Providers (1)

androidx.startup.InitializationProvider

Submission Details

Submitted At 2026-02-26
First Submission 2026-02-26
Last Submission 2026-02-26
Stored Until 2026-03-28

Other Versions

cn.wx.zkteacher.WXApp cn.wx.zkteacher 1.0 (1) zk_teacher_release_v1.0_2026-02-26_17-33-14_sign.apk Analyzed 2026-02-27 07:09 UTC
View report