________..apk
������������ ������������������������������
9.45 MB
Analyzed: 2026-04-03 14:30 UTC
APK Security & Privacy Score
Security scoring uses multi-engine scan signals and APK indicators. Privacy scoring uses requested permissions and network endpoint patterns.
Security
Scan-weighted
91/100
Threat scan flagged
Modern target SDK
Privacy
Permissions & network
91/100
HTTP URLs found
AllowBackup enabled
Low data access
91/100
Excellent
Overall trust
Facts
Threat scan
1/76 flagged, 0 suspicious
Permissions
7 requested
Network strings
18 URLs (1 HTTP, 17 HTTPS)
Target SDK
36
Certificate
Valid until 2035-07-17 (9 years, suspicious)
Warnings
Threat scan flagged: 1/76 scanners marked this file as malicious.
Found 1 HTTP URL strings (unencrypted).
AllowBackup is enabled.
Package Name
co.median.android.jbwolzj
Version Code
3
Version Name
1.0.0
Application Name
co.median.android.GoNativeApplication
Debuggable
No
Allow Backup
Yes
Min SDK
Android 23 (Marshmallow)
Target SDK
Android 36 (Unknown)
Supported ABIs
Universal
Certificate & Signer
Valid From
Valid To
Serial Number
Thumbprint
Issuer: C
Issuer: CN
Issuer: DN
Issuer: L
Issuer: O
Issuer: OU
Issuer: ST
Issuer: email
Subject: C
Subject: CN
Subject: DN
Subject: L
Subject: O
Subject: OU
Subject: ST
Subject: email
Security Scan
1
⚠️ Threats Detected
Detected by
1 vendor:
BitDefenderFalx
(Android.Riskware.TestKey.rA)
Malicious
1
Suspicious
0
Harmless
0
Undetected
62
Timeout
4
Failure
1
Scan Providers
ALYac
APEX
AVG
Acronis
AhnLab-V3
Alibaba
Antiy-AVL
Arcabit
Avast
Avast-Mobile
Avira
Baidu
BitDefender
BitDefenderFalx
Android.Riskware.TestKey.rA
Bkav
CAT-QuickHeal
CMC
CTX
ClamAV
CrowdStrike
Cylance
Cynet
DeepInstinct
DrWeb
ESET-NOD32
Elastic
Emsisoft
F-Secure
Fortinet
GData
Google
Gridinsoft
Ikarus
Jiangmin
K7AntiVirus
K7GW
Kaspersky
Kingsoft
Lionic
Malwarebytes
MaxSecure
McAfeeD
MicroWorld-eScan
Microsoft
NANO-Antivirus
Paloalto
Panda
Rising
SUPERAntiSpyware
Sangfor
SentinelOne
Skyhigh
Sophos
Symantec
SymantecMobileInsight
TACHYON
Tencent
Trapmine
TrellixENS
TrendMicro
TrendMicro-HouseCall
Trustlook
VBA32
VIPRE
Varist
ViRobot
VirIT
Webroot
Xcitium
Yandex
Zillya
ZoneAlarm
Zoner
alibabacloud
huorong
tehtris
File Signatures
SHA-256
6fb6569ccc4ffbc3afea3458de91318d68f187ca147ae5a345b8096ca675452f
MD5
6b8306dd4740725e8b007a62afb8d41a
SHA-1
c76e4a186a509cdbf787787c09268d5c10babb32
SSDEEP
196608:mQt6HNWCnDOVof7usBbchIiva0sQc7sCvva72emx:mn0VofnBwr1snsCnV
TLSH
T167A6129EF75AA92FC87710720C6A5232514B4D02978797A7796C334C78BB6E80F4DBC8
VHASH
a4e5d4451dbec51e4963d14afcba1c6b
PERMHASH
e1adaaff8aa32906532864239496d9d76c74fc1f3a35eaf826c7fbd60d656341
File Intelligence
Type Description
Human-friendly file type name based on multiple detection methods.
Type Extension
Most likely file extension inferred from the content.
Type Tag
Primary type tag assigned by the classifier.
Type Tags
Additional type tags that describe the file content.
Magic
File signature result from magic bytes inspection.
TrID
TrID file type guesses with probabilities.
dhash
Perceptual hash used to compare visual similarity of files.
raw md5
Raw MD5 hash of the file contents.
extensions
File extensions found inside the APK and how many of each.
file types
Detected embedded file types and their counts.
highest datetime
Latest timestamp found among files inside the archive.
lowest datetime
Earliest timestamp found among files inside the archive.
num children
Number of files contained within the archive.
type
Container type detected for the analyzed file.
uncompressed size
Estimated total size of all files after extraction.
Sandbox
Sandbox Verdicts
Zenbox android
Harmless
92% confidence
CLEAN
Deep Manifest Analysis
Activity Intents (1)
co.median.android.LaunchActivity
Receiver Intents (2)
Profile installer
androidx.profileinstaller.ProfileInstallReceiver
co.median.android.AppUpgradeReceiver
Requested Permissions (7)
have full network access
android.permission.INTERNET
view network connections
android.permission.ACCESS_NETWORK_STATE
read phone status and identity
android.permission.READ_PHONE_STATE
control vibration
android.permission.VIBRATE
Cloud messaging receive
com.google.android.c2dm.permission.RECEIVE
Cloud messaging
co.median.android.jbwolzj.permission.C2D_MESSAGE
Dynamic receiver access
co.median.android.jbwolzj.DYNAMIC_RECEIVER_NOT_EXPORTED_PERMISSION
Activities (4)
co.median.android.LaunchActivity
co.median.android.MainActivity
co.median.android.AppLinksActivity
com.google.android.gms.common.api.GoogleApiActivity
Services (1)
co.median.android.DownloadService
Broadcast Receivers (2)
co.median.android.AppUpgradeReceiver
co.median.android.AppUpgradeReceiver
Profile installer
androidx.profileinstaller.ProfileInstallReceiver
Content Providers (2)
androidx.core.content.FileProvider
androidx.startup.InitializationProvider
URL Endpoints (18)
http://www.google.com
https://crbug.com/388824130
https://events.gonative.io/api/events/new
https://gonative.io/unlicensed
https://plus.google.com/
https://www.googleapis.com/auth/appstate
https://www.googleapis.com/auth/datastoremobile
https://www.googleapis.com/auth/drive
https://www.googleapis.com/auth/drive.appdata
https://www.googleapis.com/auth/drive.apps
https://www.googleapis.com/auth/drive.file
https://www.googleapis.com/auth/games
https://www.googleapis.com/auth/games.firstparty
https://www.googleapis.com/auth/games_lite
https://www.googleapis.com/auth/plus.login
https://www.googleapis.com/auth/plus.me
https://www.googleapis.com/auth/userinfo.email
https://www.googleapis.com/auth/userinfo.profile
Submission Details
Submitted At
First Submission
Last Submission
Stored Until