io.appium.uiautomator2.server.apk

17.08 MB

Analyzed: 2026-03-11 01:58 UTC

APK Security & Privacy Score

Security scoring uses multi-engine scan signals and APK indicators. Privacy scoring uses requested permissions and network endpoint patterns.

Security Scan-weighted
84/100
Threat scan flagged Debuggable build Modern target SDK
Privacy Permissions & network
93/100
High-risk permissions HTTP URLs found AllowBackup enabled Low data access
88/100
Good
Overall trust

Facts

Threat scan 1/76 flagged, 0 suspicious
Permissions 9 requested
Network strings 81 URLs (81 HTTP, 0 HTTPS)
Target SDK 34
Certificate Valid until 2035-07-17 (9 years, suspicious)

Warnings

Threat scan flagged: 1/76 scanners marked this file as malicious.
Found 81 HTTP URL strings (unencrypted).
High-risk permissions detected: android.permission.QUERY_ALL_PACKAGES
AllowBackup is enabled.
Package Name io.appium.uiautomator2.server
Version Code 253
Version Name 9.11.1
Debuggable Yes
Allow Backup Yes
Min SDK Android 26 (Oreo)
Target SDK Android 34 (Android 14)
Supported ABIs
Universal

Certificate & Signer

Valid From 2008-02-29 01:33:46
Valid To 2035-07-17 01:33:46
Serial Number 936eacbe07f201df
Thumbprint 61ed377e85d386a8dfee6b864bd85b0bfaa5af81
Issuer: C US
Issuer: CN Android
Issuer: DN C:US, CN:Android, L:Mountain View, O:Android, ST:California, OU:Android, email:android@android.com
Issuer: L Mountain View
Issuer: O Android
Issuer: OU Android
Issuer: ST California
Issuer: email android@android.com
Subject: C US
Subject: CN Android
Subject: DN C:US, CN:Android, L:Mountain View, O:Android, ST:California, OU:Android, email:android@android.com
Subject: L Mountain View
Subject: O Android
Subject: OU Android
Subject: ST California
Subject: email android@android.com

Security Scan

1 /76
⚠️ Threats Detected
Detected by 1 vendor: Avast-Mobile (APK:RepMalware [PUP])
Scanned by 76 security vendors
Last scan: 2026-03-11 01:58 UTC
Malicious
1
Suspicious
0
Harmless
0
Undetected
58
Timeout
5
Failure
2

Scan Providers

76 vendors
ALYac undetected
No result reported
Engine 2.0.0.10
APEX type-unsupported
No result reported
Engine 6.757
AVG undetected
No result reported
Engine 23.9.8494.0
Acronis undetected
No result reported
Engine 1.2.0.121
AhnLab-V3 undetected
No result reported
Engine 3.29.1.10604
Alibaba undetected
No result reported
Engine 0.3.0.5
Antiy-AVL undetected
No result reported
Engine 3.0
Arcabit undetected
No result reported
Engine 2025.0.0.23
Avast undetected
No result reported
Engine 23.9.8494.0
Avast-Mobile malicious
APK:RepMalware [PUP]
Engine 260310-02
Avira undetected
No result reported
Engine 8.3.3.24
Baidu timeout
No result reported
Engine 1.0.0.2
BitDefender undetected
No result reported
Engine 7.2
BitDefenderFalx undetected
No result reported
Engine 2.0.936
Bkav failure
No result reported
Engine 2.0.0.1
CAT-QuickHeal undetected
No result reported
Engine 22.00
CMC undetected
No result reported
Engine 2.4.2022.1
CTX undetected
No result reported
Engine 2024.8.29.1
ClamAV timeout
No result reported
Engine 1.5.2.0
CrowdStrike undetected
No result reported
Engine 1.0
Cylance type-unsupported
No result reported
Engine 3.0.0.0
Cynet type-unsupported
No result reported
Engine 4.0.3.4
DeepInstinct type-unsupported
No result reported
Engine 5.0.0.8
DrWeb undetected
No result reported
Engine 7.0.75.2070
ESET-NOD32 undetected
No result reported
Engine 18.2.18.0
Elastic type-unsupported
No result reported
Engine 4.0.251
Emsisoft undetected
No result reported
Engine 2024.8.0.61147
F-Secure undetected
No result reported
Engine 18.10.1547.307
Fortinet undetected
No result reported
Engine 7.0.30.0
GData undetected
No result reported
Engine GD:27.43811AVA:64.30814
Google undetected
No result reported
Engine 1773183667
Gridinsoft undetected
No result reported
Engine 1.0.241.174
Ikarus undetected
No result reported
Engine 6.4.16.0
Jiangmin undetected
No result reported
Engine 16.0.100
K7AntiVirus undetected
No result reported
Engine 14.40.58840
K7GW undetected
No result reported
Engine 14.40.58840
Kaspersky undetected
No result reported
Engine 22.0.1.28
Kingsoft undetected
No result reported
Engine None
Lionic undetected
No result reported
Engine 8.16
Malwarebytes undetected
No result reported
Engine 3.1.0.211
MaxSecure undetected
No result reported
Engine 1.0.0.1
McAfeeD undetected
No result reported
Engine 1.2.0.14023
MicroWorld-eScan undetected
No result reported
Engine 14.0.409.0
Microsoft undetected
No result reported
Engine 1.1.26010.1
NANO-Antivirus undetected
No result reported
Engine 1.0.170.26895
Paloalto type-unsupported
No result reported
Engine 0.9.0.1003
Panda undetected
No result reported
Engine 4.6.4.2
Rising undetected
No result reported
Engine 25.0.0.28
SUPERAntiSpyware undetected
No result reported
Engine 5.6.0.1032
Sangfor undetected
No result reported
Engine 2.22.3.0
SentinelOne type-unsupported
No result reported
Engine 7.5.3.1
Skyhigh timeout
No result reported
Sophos undetected
No result reported
Engine 3.3.1.0
Symantec failure
No result reported
Engine 1.22.0.0
SymantecMobileInsight undetected
No result reported
Engine 2.0
TACHYON undetected
No result reported
Engine 2026-03-11.01
Tencent undetected
No result reported
Engine 1.0.0.1
Trapmine type-unsupported
No result reported
Engine 4.0.10.0
TrellixENS timeout
No result reported
Engine 6.0.6.653
TrendMicro undetected
No result reported
Engine 24.550.0.1002
TrendMicro-HouseCall undetected
No result reported
Engine 24.550.0.1002
Trustlook undetected
No result reported
Engine 1.0
VBA32 undetected
No result reported
Engine 5.5.1
VIPRE undetected
No result reported
Engine 6.0.0.35
Varist undetected
No result reported
Engine 6.6.1.3
ViRobot undetected
No result reported
Engine 2014.3.20.0
VirIT undetected
No result reported
Engine 9.5.1162
Webroot undetected
No result reported
Engine 1.9.0.8
Xcitium undetected
No result reported
Engine 38473
Yandex undetected
No result reported
Engine 5.5.2.24
Zillya timeout
No result reported
Engine 2.0.0.5560
ZoneAlarm undetected
No result reported
Engine 6.23-113518772
Zoner undetected
No result reported
Engine 2.2.2.0
alibabacloud type-unsupported
No result reported
Engine 2.2.0
huorong undetected
No result reported
Engine 5e7248a:5e7248a:113f75a:113f75a
tehtris type-unsupported
No result reported

File Signatures

SHA-256 b7991b410f8e43cc8fc6319795d3f211c12ddb3afb692fefbfc49e7f86a529e9
MD5 e269027d2c8baa3b012cc23ba01cdf31
SHA-1 fe0ce02b56741c0420d8285f69388128a7aa8f4f
SSDEEP 393216:q+ljh+go00cqFM0uGk613yujDC7q2utx7ffC0h:qlgx0LuG7PjDUPuffr
TLSH T1AA0712A7F4BE209CCC6F70FB0D9C913AE906AFF84D6E57191145AA857C0325837B4B89
VHASH a14ded866445d66223643b37b2219c5e
PERMHASH 0f837910f3207bf46e329b7c20465e19bd8134bb6e77b412e65a2a711c9dd0c2

File Intelligence

Type Description Android Human-friendly file type name based on multiple detection methods.
Type Extension apk Most likely file extension inferred from the content.
Type Tag android Primary type tag assigned by the classifier.
Type Tags executable, mobile, android, apk Additional type tags that describe the file content.
Magic Zip archive data, at least v0.0 to extract, compression method=deflate File signature result from magic bytes inspection.
Magika APK File type predicted by Magika (ML-based file type detection).
TrID Java Archive (77.1%), ZIP compressed archive (22.8%) TrID file type guesses with probabilities.
dhash 0000181e1f1e1400 Perceptual hash used to compare visual similarity of files.
raw md5 4c6fee6dc84a113a715a6e1abe445c94 Raw MD5 hash of the file contents.
extensions res (940), brk (16), dex (16), dict (5), lst (3), version (3), properties (2), arsc (1), bin (1), BlockHoundIntegration (1), cfu (1), DatatypeFactory (1), DocumentBuilderFactory (1), DOMImplementationSourceList (1), driver (1), icu (1), SAXParserFactory (1), SchemaFactory (1), textproto (1), txt (1), xml (1), XMLEventFactory (1) File extensions found inside the APK and how many of each.
file types unknown (998), Java Bytecode (1), XML (1) Detected embedded file types and their counts.
highest datetime 1981-01-01 01:01:02 UTC Latest timestamp found among files inside the archive.
lowest datetime 1981-01-01 01:01:02 UTC Earliest timestamp found among files inside the archive.
num children 3838 Number of files contained within the archive.
type APK Container type detected for the analyzed file.
uncompressed size 23 MB Estimated total size of all files after extraction.

Deep Manifest Analysis

Activity Intents (3)

androidx.test.core.app.InstrumentationActivityInvoker$BootstrapActivity
Categories
android.intent.category.LAUNCHER
androidx.test.core.app.InstrumentationActivityInvoker$EmptyActivity
Categories
android.intent.category.LAUNCHER
androidx.test.core.app.InstrumentationActivityInvoker$EmptyFloatingActivity
Categories
android.intent.category.LAUNCHER

Receiver Intents (1)

io.appium.uiautomator2.server.ServerInstrumentation$PowerConnectionReceiver
Actions
android.intent.action.ACTION_POWER_DISCONNECTED android.intent.action.ACTION_POWER_DISCONNECTED

Requested Permissions (9)

view network connections Allows the app to view information about network connections such as which networks exist and are connected. android.permission.ACCESS_NETWORK_STATE
have full network access Allows the app to create network sockets and use custom network protocols. The browser and other applications provide means to send data to the internet, so this permission is not required to send data to the internet. android.permission.INTERNET
keep car screen turned on Allows the app to keep the car screen turned on. android.permission.WAKE_LOCK
connect and disconnect from Wi-Fi Allows the app to connect to and disconnect from Wi-Fi access points and to make changes to device configuration for Wi-Fi networks. android.permission.CHANGE_WIFI_STATE
view Wi-Fi connections Allows the app to view information about Wi-Fi networking, such as whether Wi-Fi is enabled and name of connected Wi-Fi devices. android.permission.ACCESS_WIFI_STATE
android.permission.BLUETOOTH_SCAN Custom app or vendor permission (not publicly documented). android.permission.BLUETOOTH_SCAN
pair with Bluetooth devices Allows the app to view the configuration of Bluetooth on the tablet, and to make and accept connections with paired devices. android.permission.BLUETOOTH
android.permission.QUERY_ALL_PACKAGES Custom app or vendor permission (not publicly documented). android.permission.QUERY_ALL_PACKAGES
reorder running apps Allows the app to move tasks to the foreground and background. The app may do this without your input. android.permission.REORDER_TASKS

Activities (3)

androidx.test.core.app.InstrumentationActivityInvoker$BootstrapActivity
androidx.test.core.app.InstrumentationActivityInvoker$EmptyActivity
androidx.test.core.app.InstrumentationActivityInvoker$EmptyFloatingActivity

Broadcast Receivers (1)

io.appium.uiautomator2.server.ServerInstrumentation$PowerConnectionReceiver io.appium.uiautomator2.server.ServerInstrumentation$PowerConnectionReceiver

URL Endpoints (97)

http://apache.org/xml/features/ http://apache.org/xml/features/allow-java-encodings http://apache.org/xml/features/continue-after-fatal-error http://apache.org/xml/features/create-cdata-nodes http://apache.org/xml/features/disallow-doctype-decl http://apache.org/xml/features/dom/create-entity-ref-nodes http://apache.org/xml/features/dom/defer-node-expansion http://apache.org/xml/features/dom/include-ignorable-whitespace http://apache.org/xml/features/generate-synthetic-annotations http://apache.org/xml/features/honour-all-schemaLocations http://apache.org/xml/features/include-comments http://apache.org/xml/features/internal/parser-settings http://apache.org/xml/features/internal/strings-interned http://apache.org/xml/features/internal/tolerate-duplicates http://apache.org/xml/features/internal/validation/schema/use-grammar-pool-only http://apache.org/xml/features/namespace-growth http://apache.org/xml/features/nonvalidating/load-dtd-grammar http://apache.org/xml/features/nonvalidating/load-external-dtd http://apache.org/xml/features/scanner/notify-builtin-refs http://apache.org/xml/features/scanner/notify-char-refs

Submission Details

Submitted At 2026-03-11
First Submission 2026-03-11
Last Submission 2026-03-11
Stored Until 2026-04-10