桃芯 icon

47e44b2cd262dc8939983faffa595f47.apk

桃芯

25.27 MB

Analyzed: 2026-03-08 11:23 UTC

APK Security & Privacy Score

Security scoring uses multi-engine scan signals and APK indicators. Privacy scoring uses requested permissions and network endpoint patterns.

Security Scan-weighted
17/100
Threat scan flagged
Privacy Permissions & network
45/100
High-risk permissions
25/100
High Risk
Overall trust

Facts

Threat scan 22/76 flagged, 0 suspicious
Permissions 11 requested
Network strings No URL strings detected
Target SDK 31
Certificate Valid until 2036-03-07 (10 years, suspicious)

Warnings

Threat scan flagged: 22/76 scanners marked this file as malicious.
High-risk permissions detected: android.permission.SYSTEM_ALERT_WINDOW, android.permission.QUERY_ALL_PACKAGES
Package Name T0e9UH53e.Rg5d1B5z.WBaTy0mP3u7WsC
Version Code 1929
Version Name 08.19.29
Application Name i.app.applicationMain
Debuggable No
Allow Backup No
Min SDK Android 22 (Lollipop)
Target SDK Android 31 (Android 12)
Supported ABIs
arm64-v8a armeabi-v7a x86 x86_64

Certificate & Signer

Valid From 2026-03-08 11:22:17
Valid To 2036-03-07 11:22:17
Serial Number d18c939fd0262d94
Thumbprint 45f42357c19177a5d0ee118f2d6560a1ed72243d
Issuer: C BR
Issuer: CN yNuH1772968936769
Issuer: DN C:BR, CN:yNuH1772968936769, L:zWV9DdMGCfr1HTN0, O:VK661772968936769, ST:jkwOwXK9SPVI0u2R, OU:ARLXO1772968936769
Issuer: L zWV9DdMGCfr1HTN0
Issuer: O VK661772968936769
Issuer: OU ARLXO1772968936769
Issuer: ST jkwOwXK9SPVI0u2R
Subject: C BR
Subject: CN yNuH1772968936769
Subject: DN C:BR, CN:yNuH1772968936769, L:zWV9DdMGCfr1HTN0, O:VK661772968936769, ST:jkwOwXK9SPVI0u2R, OU:ARLXO1772968936769
Subject: L zWV9DdMGCfr1HTN0
Subject: O VK661772968936769
Subject: OU ARLXO1772968936769
Subject: ST jkwOwXK9SPVI0u2R

Security Scan

22 /76
⚠️ Threats Detected
Detected by 22 vendors: AhnLab-V3 (Trojan/Android.Infostealer.1243715), Avast-Mobile (Android:Evo-gen [Trj]), Avira (ANDROID/Stealer.FTVO.Gen)
Scanned by 76 security vendors
Last scan: 2026-03-08 19:20 UTC
Malicious
22
Suspicious
0
Harmless
0
Undetected
41
Timeout
4
Failure
0

Scan Providers

76 vendors
ALYac undetected
No result reported
Engine 2.0.0.10
APEX type-unsupported
No result reported
Engine 6.756
AVG timeout
No result reported
Engine 23.9.8494.0
Acronis undetected
No result reported
Engine 1.2.0.121
AhnLab-V3 malicious
Trojan/Android.Infostealer.1243715
Engine 3.29.1.10604
Alibaba undetected
No result reported
Engine 0.3.0.5
Antiy-AVL undetected
No result reported
Engine 3.0
Arcabit undetected
No result reported
Engine 2025.0.0.23
Avast timeout
No result reported
Engine 23.9.8494.0
Avast-Mobile malicious
Android:Evo-gen [Trj]
Engine 260308-00
Avira malicious
ANDROID/Stealer.FTVO.Gen
Engine 8.3.3.24
Baidu undetected
No result reported
Engine 1.0.0.2
BitDefender undetected
No result reported
Engine 7.2
BitDefenderFalx malicious
Android.Trojan.SmsSpy.AQT
Engine 2.0.936
Bkav undetected
No result reported
Engine 2.0.0.1
CAT-QuickHeal undetected
No result reported
Engine 22.00
CMC undetected
No result reported
Engine 2.4.2022.1
CTX malicious
apk.trojan.ftvo
Engine 2024.8.29.1
ClamAV undetected
No result reported
Engine 1.5.2.0
CrowdStrike undetected
No result reported
Engine 1.0
Cylance type-unsupported
No result reported
Engine 3.0.0.0
Cynet type-unsupported
No result reported
Engine 4.0.3.4
DeepInstinct type-unsupported
No result reported
Engine 5.0.0.8
DrWeb malicious
Android.Spy.1391.origin
Engine 7.0.75.2070
ESET-NOD32 malicious
Android/Spy.Agent.DUU trojan
Engine 18.2.18.0
Elastic undetected
No result reported
Engine 4.0.251
Emsisoft undetected
No result reported
Engine 2024.8.0.61147
F-Secure malicious
Malware.ANDROID/Stealer.FTVO.Gen
Engine 18.10.1547.307
Fortinet malicious
Android/Agent.JDU!tr
Engine 7.0.30.0
GData undetected
No result reported
Engine GD:27.43784AVA:64.30799
Google malicious
Detected
Engine 1772989259
Gridinsoft undetected
No result reported
Engine 1.0.240.174
Ikarus malicious
Trojan-Spy.AndroidOS.Agent
Engine 6.4.16.0
Jiangmin undetected
No result reported
Engine 16.0.100
K7AntiVirus undetected
No result reported
Engine 14.39.58816
K7GW malicious
Trojan ( 005c18a51 )
Engine 14.39.58815
Kaspersky malicious
HEUR:Trojan-Spy.AndroidOS.FakeApp.db
Engine 22.0.1.28
Kingsoft timeout
No result reported
Lionic undetected
No result reported
Engine 8.16
Malwarebytes undetected
No result reported
Engine 3.1.0.211
MaxSecure undetected
No result reported
Engine 1.0.0.1
McAfeeD undetected
No result reported
Engine 1.2.0.14023
MicroWorld-eScan undetected
No result reported
Engine 14.0.409.0
Microsoft undetected
No result reported
Engine 1.1.26010.1
NANO-Antivirus undetected
No result reported
Engine 1.0.170.26895
Paloalto type-unsupported
No result reported
Engine 0.9.0.1003
Panda undetected
No result reported
Engine 4.6.4.2
Rising malicious
Spyware.Agent/Android!8.3BE (CLOUD)
Engine 25.0.0.28
SUPERAntiSpyware undetected
No result reported
Engine 5.6.0.1032
Sangfor undetected
No result reported
Engine 2.22.3.0
SentinelOne type-unsupported
No result reported
Engine 7.5.3.1
Skyhigh undetected
No result reported
Engine v2021.2.0+4045
Sophos malicious
Andr/Xgen4-EF
Engine 3.3.1.0
Symantec malicious
Trojan.Gen.NPE
Engine 1.22.0.0
SymantecMobileInsight malicious
AdLibrary:Generisk
Engine 2.0
TACHYON undetected
No result reported
Engine 2026-03-08.02
Tencent malicious
Android.Trojan-Spy.Fakeapp.Bdhl
Engine 1.0.0.1
Trapmine type-unsupported
No result reported
Engine 4.0.10.0
TrellixENS malicious
Artemis!DC365F6F5F30
Engine 6.0.6.653
TrendMicro timeout
No result reported
Engine 24.550.0.1002
TrendMicro-HouseCall undetected
No result reported
Engine 24.550.0.1002
Trustlook malicious
Android.Malware.Spyware
Engine 1.0
VBA32 undetected
No result reported
Engine 5.5.1
VIPRE undetected
No result reported
Engine 6.0.0.35
Varist malicious
ABTrojan.NUIY-
Engine 6.6.1.3
ViRobot undetected
No result reported
Engine 2014.3.20.0
VirIT undetected
No result reported
Engine 9.5.1160
Webroot undetected
No result reported
Engine 1.9.0.8
Xcitium undetected
No result reported
Engine 38466
Yandex undetected
No result reported
Engine 5.5.2.24
Zillya undetected
No result reported
Engine 2.0.0.5558
ZoneAlarm malicious
Andr/Xgen4-EF
Engine 6.23-113518727
Zoner undetected
No result reported
Engine 2.2.2.0
alibabacloud type-unsupported
No result reported
Engine 2.2.0
huorong undetected
No result reported
Engine 3c8d178:3c8d178:bdb206c:bdb206c
tehtris type-unsupported
No result reported
Engine v0.1.4

File Signatures

SHA-256 0cced7a29c3e4cc50e4ba36fcdc371162d3acc9fc61e30c555f29a6d749cedbf
MD5 acfa0c40a52b50681408cb1ba3e05476
SHA-1 0da39e35b615ff8a554bde5b9744e9298ab25d3b
SSDEEP 786432:uajEZHNGbw18KS9OJM0ZfoPKxZxyGiw1ln:uajE+5F9yM0ZQPOAUbn
TLSH T15647235AE7884E19C7F7433F527A82A111C78D3CC783DA63852079B8A8339D44D67AF9
VHASH ad670e4d9f735981037999bc0a2803be
PERMHASH 64eb0da7ee056393d3a9b65bef033a2e33814f3ee5fa8af54724cde4dd8f08d3

File Intelligence

Type Description Android Human-friendly file type name based on multiple detection methods.
Type Extension apk Most likely file extension inferred from the content.
Type Tag android Primary type tag assigned by the classifier.
Type Tags executable, mobile, android, apk Additional type tags that describe the file content.
Magic Zip archive data, at least v2.0 to extract, compression method=deflate File signature result from magic bytes inspection.
Magika APK File type predicted by Magika (ML-based file type detection).
TrID ZIP compressed archive (100%) TrID file type guesses with probabilities.
dhash 000000080e0d0400 Perceptual hash used to compare visual similarity of files.
raw md5 8456da48134e010cb3c603279f60df74 Raw MD5 hash of the file contents.
extensions xml (470), dex (14), so (12), arsc (1) File extensions found inside the APK and how many of each.
file types XML (672), PNG (241), JPG (58), DEX (14), ELF (12), unknown (2), JSON (1) Detected embedded file types and their counts.
highest datetime 2026-03-08 19:19:34 UTC Latest timestamp found among files inside the archive.
lowest datetime 2026-03-08 19:19:34 UTC Earliest timestamp found among files inside the archive.
num children 1097 Number of files contained within the archive.
type ZIP Container type detected for the analyzed file.
uncompressed size 33 MB Estimated total size of all files after extraction.

Sandbox

Sandbox Verdicts

Zenbox android
Harmless 87% confidence CLEAN

Deep Manifest Analysis

Activity Intents (1)

T0e9UH53e.Rg5d1B5z.WBaTy0mP3u7WsC.main
Actions
Main Activity Action: Start as a main entry point, does not expect to android.intent.action.MAIN
Categories
android.intent.category.LAUNCHER

Native Libraries (3)

libfrvjrrfguigrf.vrhfgrf libfrvjrrfguigrf.vrhfgrf.so
libpl_droidsonroids_gif libpl_droidsonroids_gif.so
libvrfjhvurf.vrjhgfff libvrfjhvurf.vrjhgfff.so

Requested Permissions (11)

read phone status and identity Allows the app to access the phone features of the device. This permission allows the app to determine the phone number and device IDs, whether a call is active, and the remote number connected by a call. android.permission.READ_PHONE_STATE
have full network access Allows the app to create network sockets and use custom network protocols. The browser and other applications provide means to send data to the internet, so this permission is not required to send data to the internet. android.permission.INTERNET
view network connections Allows the app to view information about network connections such as which networks exist and are connected. android.permission.ACCESS_NETWORK_STATE
access precise location only in the foreground This app can get your precise location from location services while the app is in use. Location services for your device must be turned on for the app to get location. This may increase battery usage. android.permission.ACCESS_FINE_LOCATION
read the contents of your shared storage Allows the app to read the contents of your shared storage. android.permission.READ_EXTERNAL_STORAGE
read call log This app can read your call history. android.permission.READ_CALL_LOG
read your contacts Allows the app to read data about your contacts stored on your tablet. Apps will also have access to the accounts on your tablet that have created contacts. This may include accounts created by apps you have installed. This permission allows apps to save your contact data, and malicious apps may share contact data without your knowledge. android.permission.READ_CONTACTS
read your text messages (SMS or MMS) This app can read all SMS (text) messages stored on your tablet. android.permission.READ_SMS
android.permission.QUERY_ALL_PACKAGES Custom app or vendor permission (not publicly documented). android.permission.QUERY_ALL_PACKAGES
This app can appear on top of other apps This app can appear on top of other apps or other parts of the screen. This may interfere with normal app usage and change the way that other apps appear. android.permission.SYSTEM_ALERT_WINDOW
android.permission.ACCESS_NOTIFICATION_POLICY Custom app or vendor permission (not publicly documented). android.permission.ACCESS_NOTIFICATION_POLICY

Activities (15)

T0e9UH53e.Rg5d1B5z.WBaTy0mP3u7WsC.main
T0e9UH53e.Rg5d1B5z.WBaTy0mP3u7WsC.L00pi73M
T0e9UH53e.Rg5d1B5z.WBaTy0mP3u7WsC.t0GOb56X
T0e9UH53e.Rg5d1B5z.WBaTy0mP3u7WsC.T03E2F6t
T0e9UH53e.Rg5d1B5z.WBaTy0mP3u7WsC.S590E1ZV
T0e9UH53e.Rg5d1B5z.WBaTy0mP3u7WsC.L101A5JZ
T0e9UH53e.Rg5d1B5z.WBaTy0mP3u7WsC.N772E7pX
T0e9UH53e.Rg5d1B5z.WBaTy0mP3u7WsC.ibC1U6Qx
T0e9UH53e.Rg5d1B5z.WBaTy0mP3u7WsC.VM2Zf0Vj
T0e9UH53e.Rg5d1B5z.WBaTy0mP3u7WsC.kj6908zZ
T0e9UH53e.Rg5d1B5z.WBaTy0mP3u7WsC.Yt19dxlY
T0e9UH53e.Rg5d1B5z.WBaTy0mP3u7WsC.gnR63SuM
T0e9UH53e.Rg5d1B5z.WBaTy0mP3u7WsC.vm77X15c
T0e9UH53e.Rg5d1B5z.WBaTy0mP3u7WsC.rSb335vi
T0e9UH53e.Rg5d1B5z.WBaTy0mP3u7WsC.j875lBmj

Content Providers (2)

i.app.FileProvider
androidx.startup.InitializationProvider

Submission Details

Submitted At 2026-03-08
First Submission 2026-03-08
Last Submission 2026-03-08
Stored Until 2026-04-07