学安通职工端 icon

teacher.apk

学安通职工端

35.08 MB

Analyzed: 2026-03-06 07:26 UTC

APK Security & Privacy Score

Security scoring uses multi-engine scan signals and APK indicators. Privacy scoring uses requested permissions and network endpoint patterns.

Security Scan-weighted
93/100
Threat scan clean Modern target SDK
Privacy Permissions & network
49/100
High-risk permissions
64/100
Caution
Overall trust

Facts

Threat scan 0/75 flagged, 0 suspicious
Permissions 35 requested
Network strings 7 URLs (0 HTTP, 7 HTTPS)
Target SDK 35
Certificate Valid until 2125-07-12 (99 years, suspicious)

Warnings

High-risk permissions detected: android.permission.REQUEST_INSTALL_PACKAGES, android.permission.WRITE_SETTINGS
Requests 35 permissions (review carefully).
Package Name com.xueanzhigong.app
Version Code 111
Version Name 1.1.1
Application Name io.dcloud.application.DCloudApplication
Debuggable No
Allow Backup No
Min SDK Android 21 (Lollipop)
Target SDK Android 35 (Android 15)
Supported ABIs
arm64-v8a armeabi-v7a x86

Certificate & Signer

Valid From 2025-08-05 09:32:54
Valid To 2125-07-12 09:32:54
Serial Number 8988852ac7cd55cd
Thumbprint f1525ca8521a7ca6c670026ea121c34baa37978c
Issuer: C Unknown
Issuer: CN Unknown
Issuer: DN C:Unknown, CN:Unknown, L:Unknown, O:Unknown, ST:Unknown, OU:Unknown
Issuer: L Unknown
Issuer: O Unknown
Issuer: OU Unknown
Issuer: ST Unknown
Subject: C Unknown
Subject: CN Unknown
Subject: DN C:Unknown, CN:Unknown, L:Unknown, O:Unknown, ST:Unknown, OU:Unknown
Subject: L Unknown
Subject: O Unknown
Subject: OU Unknown
Subject: ST Unknown

Security Scan

0 /75
✓ Clean
Scanned by 75 security vendors
Last scan: 2026-03-06 07:25 UTC
Malicious
0
Suspicious
0
Harmless
0
Undetected
61
Timeout
4
Failure
1

Scan Providers

75 vendors
ALYac undetected
No result reported
Engine 2.0.0.10
APEX type-unsupported
No result reported
Engine 6.755
AVG undetected
No result reported
Engine 23.9.8494.0
Acronis undetected
No result reported
Engine 1.2.0.121
AhnLab-V3 undetected
No result reported
Engine 3.29.1.10604
Alibaba undetected
No result reported
Engine 0.3.0.5
Antiy-AVL undetected
No result reported
Engine 3.0
Arcabit undetected
No result reported
Engine 2025.0.0.23
Avast undetected
No result reported
Engine 23.9.8494.0
Avast-Mobile undetected
No result reported
Engine 260305-00
Avira undetected
No result reported
Engine 8.3.3.24
Baidu undetected
No result reported
Engine 1.0.0.2
BitDefender undetected
No result reported
Engine 7.2
BitDefenderFalx undetected
No result reported
Engine 2.0.936
Bkav undetected
No result reported
Engine 2.0.0.1
CAT-QuickHeal undetected
No result reported
Engine 22.00
CMC undetected
No result reported
Engine 2.4.2022.1
CTX undetected
No result reported
Engine 2024.8.29.1
ClamAV timeout
No result reported
Engine 1.5.2.0
CrowdStrike undetected
No result reported
Engine 1.0
Cylance type-unsupported
No result reported
Engine 3.0.0.0
Cynet type-unsupported
No result reported
Engine 4.0.3.4
DeepInstinct type-unsupported
No result reported
Engine 5.0.0.8
DrWeb undetected
No result reported
Engine 7.0.75.2070
ESET-NOD32 undetected
No result reported
Engine 18.2.18.0
Elastic undetected
No result reported
Engine 4.0.251
Emsisoft undetected
No result reported
Engine 2024.8.0.61147
F-Secure undetected
No result reported
Engine 18.10.1547.307
GData undetected
No result reported
Engine GD:27.43754AVA:64.30782
Google undetected
No result reported
Engine 1772776844
Gridinsoft undetected
No result reported
Engine 1.0.240.174
Ikarus undetected
No result reported
Engine 6.4.16.0
Jiangmin undetected
No result reported
Engine 16.0.100
K7AntiVirus undetected
No result reported
Engine 14.39.58791
K7GW undetected
No result reported
Engine 14.39.58791
Kaspersky undetected
No result reported
Engine 22.0.1.28
Kingsoft undetected
No result reported
Engine None
Lionic undetected
No result reported
Engine 8.16
Malwarebytes undetected
No result reported
Engine 3.1.0.211
MaxSecure timeout
No result reported
Engine 1.0.0.1
McAfeeD undetected
No result reported
Engine 1.2.0.14023
MicroWorld-eScan undetected
No result reported
Engine 14.0.409.0
Microsoft undetected
No result reported
Engine 1.1.26010.1
NANO-Antivirus undetected
No result reported
Engine 1.0.170.26895
Paloalto type-unsupported
No result reported
Engine 0.9.0.1003
Panda undetected
No result reported
Engine 4.6.4.2
Rising undetected
No result reported
Engine 25.0.0.28
SUPERAntiSpyware undetected
No result reported
Engine 5.6.0.1032
Sangfor undetected
No result reported
Engine 2.22.3.0
SentinelOne type-unsupported
No result reported
Engine 7.5.3.1
Skyhigh undetected
No result reported
Engine v2021.2.0+4045
Sophos undetected
No result reported
Engine 3.3.1.0
Symantec failure
No result reported
Engine 1.22.0.0
SymantecMobileInsight undetected
No result reported
Engine 2.0
TACHYON undetected
No result reported
Engine 2026-03-06.02
Tencent undetected
No result reported
Engine 1.0.0.1
Trapmine type-unsupported
No result reported
Engine 4.0.10.0
TrellixENS undetected
No result reported
Engine 6.0.6.653
TrendMicro timeout
No result reported
Engine 24.550.0.1002
TrendMicro-HouseCall timeout
No result reported
Engine 24.550.0.1002
Trustlook undetected
No result reported
Engine 1.0
VBA32 undetected
No result reported
Engine 5.5.1
VIPRE undetected
No result reported
Engine 6.0.0.35
Varist undetected
No result reported
Engine 6.6.1.3
ViRobot undetected
No result reported
Engine 2014.3.20.0
VirIT undetected
No result reported
Engine 9.5.1159
Webroot undetected
No result reported
Engine 1.9.0.8
Xcitium undetected
No result reported
Engine 38462
Yandex undetected
No result reported
Engine 5.5.2.24
Zillya undetected
No result reported
Engine 2.0.0.5557
ZoneAlarm undetected
No result reported
Engine 6.23-113518667
Zoner undetected
No result reported
Engine 2.2.2.0
alibabacloud type-unsupported
No result reported
Engine 2.2.0
huorong undetected
No result reported
Engine b6f6803:b6f6803:7fe1b97:7fe1b97
tehtris type-unsupported
No result reported
Engine v0.1.4

File Signatures

SHA-256 f38e927e9f5f1533610958d289dfdb66455a441789f08aae76f0ba1980333769
MD5 dbc6c4efea318bf1784f06da4134a842
SHA-1 272bd459fb550412af5f86ab017aedcc35dd92fc
SSDEEP 786432:5Va/NwhZWJyGa4O+w6JaWdSwkAcIXGLiNtKLrh3bWhEE3Rt7dqKjOVX26MjGIlwQ:5MvXTV8wbxXeL1QEIRNMLsGow/Lc
TLSH T17387339BE329697BF8720830621706B22E225D421415DF4B36CE763E2B77B955E38FD0
VHASH 933ee9fd796497872c1605e5af7a9e48
PERMHASH 1990a238e861de6c32617b0e3dd6c928610ff3a794eaa3d92d3f82bac8e69b6f

File Intelligence

Type Description Android Human-friendly file type name based on multiple detection methods.
Type Extension apk Most likely file extension inferred from the content.
Type Tag android Primary type tag assigned by the classifier.
Type Tags executable, mobile, android, apk Additional type tags that describe the file content.
Magic Zip archive data, at least v0.0 to extract, compression method=deflate File signature result from magic bytes inspection.
Magika APK File type predicted by Magika (ML-based file type detection).
TrID Android Package (49%), Java Archive (24.5%), Sweet Home 3D Design (generic) (19%), ZIP compressed archive (7.2%) TrID file type guesses with probabilities.
dhash 0000001e1e0c0908 Perceptual hash used to compare visual similarity of files.
raw md5 5d114569317282f8bc28dcc6677a8ac4 Raw MD5 hash of the file contents.
extensions png (486), xml (353), so (54), version (38), js (20), kotlin_builtins (7), json (6), html (4), jpg (4), dex (3), gif (3), ttf (3), gz (2), AutoDiscoverable (1), bin (1), BuiltInsLoader (1), CoroutineExceptionHandler (1), css (1), ExternalOverridabilityCondition (1), jpeg (1), MainDispatcherFactory (1), MessageBodyReader (1), MessageBodyWriter (1), ogg (1), prof (1), profm (1), properties (1), Providers (1), textproto (1), txt (1) File extensions found inside the APK and how many of each.
file types PNG (486), XML (353), unknown (88), ELF (54), JPG (5), HTML (4), GIF (3), DEX (2), JSON (2), Java Bytecode (1), JavaScript (1), OGG (1) Detected embedded file types and their counts.
highest datetime 1981-01-01 01:01:02 UTC Latest timestamp found among files inside the archive.
lowest datetime 1981-01-01 01:01:02 UTC Earliest timestamp found among files inside the archive.
num children 1017 Number of files contained within the archive.
type APK Container type detected for the analyzed file.
uncompressed size 81 MB Estimated total size of all files after extraction.

Deep Manifest Analysis

Activity Intents (1)

io.dcloud.PandoraEntry
Actions
Main Activity Action: Start as a main entry point, does not expect to android.intent.action.MAIN
View Activity Action: Display the data to the user. android.intent.action.VIEW
Categories
android.intent.category.LAUNCHER android.intent.category.DEFAULT android.intent.category.BROWSABLE

Receiver Intents (1)

Profile installer Installs performance profiles to speed up app startup and hot paths. androidx.profileinstaller.ProfileInstallReceiver
Actions
Install performance profile Installs a profile that helps optimize app performance. androidx.profileinstaller.action.INSTALL_PROFILE
Skip profile install Skips profile installation for this build. androidx.profileinstaller.action.SKIP_FILE
Save performance profile Saves a profile generated during app usage. androidx.profileinstaller.action.SAVE_PROFILE
Benchmark operation Runs a profile installer benchmark operation. androidx.profileinstaller.action.BENCHMARK_OPERATION

Native Libraries (18)

lib39285EFA lib39285EFA.so
Breakpad Crash Reporter Crash reporting library that captures diagnostic minidumps. libbreakpad-core.so
C++ Standard Library Android NDK C++ runtime used by native code. libc++_shared.so
libdcblur libdcblur.so
libfreetype libfreetype.so
libgcanvas libgcanvas.so
libgifimage libgifimage.so
libimagepipeline libimagepipeline.so
liblamemp3 liblamemp3.so
libnative-filters libnative-filters.so
libnative-imagetranscoder libnative-imagetranscoder.so
libpl_droidsonroids_gif libpl_droidsonroids_gif.so
libstatic-webp libstatic-webp.so
libuts-runtime libuts-runtime.so
libweexcore libweexcore.so
libweexjsb libweexjsb.so
libweexjss libweexjss.so
libweexjst libweexjst.so

Requested Permissions (38)

modify or delete the contents of your shared storage Allows the app to write the contents of your shared storage. android.permission.WRITE_EXTERNAL_STORAGE
read phone status and identity Allows the app to access the phone features of the device. This permission allows the app to determine the phone number and device IDs, whether a call is active, and the remote number connected by a call. android.permission.READ_PHONE_STATE
read the contents of your shared storage Allows the app to read the contents of your shared storage. android.permission.READ_EXTERNAL_STORAGE
android.permission.READ_MEDIA_IMAGES Custom app or vendor permission (not publicly documented). android.permission.READ_MEDIA_IMAGES
android.permission.READ_MEDIA_VIDEO Custom app or vendor permission (not publicly documented). android.permission.READ_MEDIA_VIDEO
android.permission.READ_MEDIA_VISUAL_USER_SELECTED Custom app or vendor permission (not publicly documented). android.permission.READ_MEDIA_VISUAL_USER_SELECTED
have full network access Allows the app to create network sockets and use custom network protocols. The browser and other applications provide means to send data to the internet, so this permission is not required to send data to the internet. android.permission.INTERNET
view network connections Allows the app to view information about network connections such as which networks exist and are connected. android.permission.ACCESS_NETWORK_STATE
App badge update Allows the app to update the launcher icon badge count on Huawei launchers. com.huawei.android.launcher.permission.CHANGE_BADGE
App badge update Allows the app to update the launcher icon badge count on launcher launchers. com.vivo.notification.permission.BADGE_ICON
com.asus.msa.SupplementaryDID.ACCESS
take pictures and videos This app can take pictures and record videos using the camera while the app is in use. android.permission.CAMERA
Dynamic receiver access Internal app permission used to protect dynamic broadcast receivers. com.xueanzhigong.app.DYNAMIC_RECEIVER_NOT_EXPORTED_PERMISSION
view Wi-Fi connections Allows the app to view information about Wi-Fi networking, such as whether Wi-Fi is enabled and name of connected Wi-Fi devices. android.permission.ACCESS_WIFI_STATE
Install Packages android.permission.INSTALL_PACKAGES
android.permission.REQUEST_INSTALL_PACKAGES Custom app or vendor permission (not publicly documented). android.permission.REQUEST_INSTALL_PACKAGES
android.permission.REQUEST_INSTALL_PACKAGES Custom app or vendor permission (not publicly documented). android.permission.REQUEST_INSTALL_PACKAGES
access approximate location only in the foreground This app can get your approximate location from location services while the app is in use. Location services for your device must be turned on for the app to get location. android.permission.ACCESS_COARSE_LOCATION
access approximate location only in the foreground This app can get your approximate location from location services while the app is in use. Location services for your device must be turned on for the app to get location. android.permission.ACCESS_COARSE_LOCATION
access precise location only in the foreground This app can get your precise location from location services while the app is in use. Location services for your device must be turned on for the app to get location. This may increase battery usage. android.permission.ACCESS_FINE_LOCATION
access precise location only in the foreground This app can get your precise location from location services while the app is in use. Location services for your device must be turned on for the app to get location. This may increase battery usage. android.permission.ACCESS_FINE_LOCATION
directly call phone numbers Allows the app to call phone numbers without your intervention. This may result in unexpected charges or calls. Note that this doesn\'t allow the app to call emergency numbers. Malicious apps may cost you money by making calls without your confirmation, or dial carrier codes which cause incoming calls to be automatically forwarded to another number. android.permission.CALL_PHONE
change network connectivity Allows the app to change the state of network connectivity. android.permission.CHANGE_NETWORK_STATE
connect and disconnect from Wi-Fi Allows the app to connect to and disconnect from Wi-Fi access points and to make changes to device configuration for Wi-Fi networks. android.permission.CHANGE_WIFI_STATE
Flashlight android.permission.FLASHLIGHT
find accounts on the device Allows the app to get the list of accounts known by the tablet. This may include any accounts created by applications you have installed. android.permission.GET_ACCOUNTS
change your audio settings Allows the app to modify global audio settings such as volume and which speaker is used for output. android.permission.MODIFY_AUDIO_SETTINGS
Mount Unmount Filesystems android.permission.MOUNT_UNMOUNT_FILESYSTEMS
Read Logs android.permission.READ_LOGS
record audio android.permission.RECORD_AUDIO
android.permission.USE_FINGERPRINT Custom app or vendor permission (not publicly documented). android.permission.USE_FINGERPRINT
control vibration Allows the app to control the vibrator. android.permission.VIBRATE
keep car screen turned on Allows the app to keep the car screen turned on. android.permission.WAKE_LOCK
modify system settings Allows the app to modify the system\'s settings data. Malicious apps may corrupt your system\'s configuration. android.permission.WRITE_SETTINGS
access Bluetooth settings Allows the app to configure the local Bluetooth tablet, and to discover and pair with remote devices. android.permission.BLUETOOTH_ADMIN
pair with Bluetooth devices Allows the app to view the configuration of Bluetooth on the tablet, and to make and accept connections with paired devices. android.permission.BLUETOOTH
android.permission.BLUETOOTH_SCAN Custom app or vendor permission (not publicly documented). android.permission.BLUETOOTH_SCAN
android.permission.BLUETOOTH_CONNECT Custom app or vendor permission (not publicly documented). android.permission.BLUETOOTH_CONNECT

Uses Features (2)

Camera Feature for {@link #getSystemAvailableFeatures} and android.hardware.camera
Camera Autofocus Feature for {@link #getSystemAvailableFeatures} and android.hardware.camera.autofocus

Activities (11)

io.dcloud.PandoraEntry
io.dcloud.PandoraEntryActivity
io.dcloud.feature.nativeObj.photoview.PhotoActivity
io.dcloud.WebAppActivity
io.dcloud.ProcessMediator
io.dcloud.WebviewActivity
com.dmcbig.mediapicker.PickerActivity
com.dmcbig.mediapicker.PreviewActivity
io.dcloud.feature.gallery.imageedit.IMGEditActivity
io.dcloud.sdk.activity.WebViewActivity
uts.sdk.modules.DCloudUniMedia.SystemPickerActivity

Services (1)

io.dcloud.sdk.base.service.DownloadService

Broadcast Receivers (2)

com.taobao.weex.WXGlobalEventReceiver com.taobao.weex.WXGlobalEventReceiver
Profile installer Installs performance profiles to speed up app startup and hot paths. androidx.profileinstaller.ProfileInstallReceiver

Content Providers (3)

io.dcloud.common.util.DCloud_FileProvider
io.dcloud.sdk.base.service.provider.DCloudAdFileProvider
androidx.startup.InitializationProvider

Submission Details

Submitted At 2026-03-06
First Submission 2026-03-06
Last Submission 2026-03-06
Stored Until 2026-04-05