JENDIE TRACKING icon

app-debug.apk

JENDIE TRACKING

5.48 MB

Analyzed: 2026-02-13 07:15 UTC

APK Security & Privacy Score

Security scoring uses multi-engine scan signals and APK indicators. Privacy scoring uses requested permissions and network endpoint patterns.

Security Scan-weighted
96/100
Threat scan clean Debuggable build
Privacy Permissions & network
98/100
AllowBackup enabled Low data access
97/100
Excellent
Overall trust

Facts

Threat scan 0/76 flagged, 0 suspicious
Permissions 4 requested
Network strings 1 URLs (0 HTTP, 1 HTTPS)
Target SDK 33
Certificate Valid until 2052-04-20 (26 years, suspicious)

Warnings

AllowBackup is enabled.
Package Name com.example.jendie2
Version Code 1
Version Name 1.0
Debuggable Yes
Allow Backup Yes
Min SDK Android 24 (Nougat)
Target SDK Android 33 (Android 13)
Supported ABIs
Universal

Certificate & Signer

Valid From 2022-04-28 08:50:27
Valid To 2052-04-20 08:50:27
Serial Number 1
Thumbprint 22b53846b6e50434963f721fd3359840de261a5b
Issuer: C US
Issuer: CN Android Debug
Issuer: DN C:US, CN:Android Debug, O:Android
Issuer: O Android
Subject: C US
Subject: CN Android Debug
Subject: DN C:US, CN:Android Debug, O:Android
Subject: O Android

Security Scan

0 /76
✓ Clean
Scanned by 76 security vendors
Last scan: 2026-02-13 07:15 UTC
Malicious
0
Suspicious
0
Harmless
0
Undetected
66
Timeout
0
Failure
1

Scan Providers

76 vendors
ALYac undetected
No result reported
Engine 2.0.0.10
APEX type-unsupported
No result reported
Engine 6.746
AVG undetected
No result reported
Engine 23.9.8494.0
Acronis undetected
No result reported
Engine 1.2.0.121
AhnLab-V3 undetected
No result reported
Engine 3.29.1.10604
Alibaba undetected
No result reported
Engine 0.3.0.5
Antiy-AVL undetected
No result reported
Engine 3.0
Arcabit undetected
No result reported
Engine 2025.0.0.23
Avast undetected
No result reported
Engine 23.9.8494.0
Avast-Mobile undetected
No result reported
Engine 260212-04
Avira undetected
No result reported
Engine 8.3.3.24
Baidu undetected
No result reported
Engine 1.0.0.2
BitDefender undetected
No result reported
Engine 7.2
BitDefenderFalx undetected
No result reported
Engine 2.0.936
Bkav failure
No result reported
Engine 2.0.0.1
CAT-QuickHeal undetected
No result reported
Engine 22.00
CMC undetected
No result reported
Engine 2.4.2022.1
CTX undetected
No result reported
Engine 2024.8.29.1
ClamAV undetected
No result reported
Engine 1.5.1.0
CrowdStrike undetected
No result reported
Engine 1.0
Cylance type-unsupported
No result reported
Engine 3.0.0.0
Cynet undetected
No result reported
Engine 4.0.3.4
DeepInstinct type-unsupported
No result reported
Engine 5.0.0.8
DrWeb undetected
No result reported
Engine 7.0.74.11120
ESET-NOD32 undetected
No result reported
Engine 18.2.18.0
Elastic type-unsupported
No result reported
Engine 4.0.248
Emsisoft undetected
No result reported
Engine 2024.8.0.61147
F-Secure undetected
No result reported
Engine 18.10.1547.307
Fortinet undetected
No result reported
Engine 7.0.30.0
GData undetected
No result reported
Engine GD:27.43523AVA:64.30651
Google undetected
No result reported
Engine 1770962477
Gridinsoft undetected
No result reported
Engine 1.0.237.174
Ikarus undetected
No result reported
Engine 6.4.16.0
Jiangmin undetected
No result reported
Engine 16.0.100
K7AntiVirus undetected
No result reported
Engine 14.35.58576
K7GW undetected
No result reported
Engine 14.35.58576
Kaspersky undetected
No result reported
Engine 22.0.1.28
Kingsoft undetected
No result reported
Engine None
Lionic undetected
No result reported
Engine 8.16
Malwarebytes undetected
No result reported
Engine 3.1.0.209
MaxSecure undetected
No result reported
Engine 1.0.0.1
McAfeeD undetected
No result reported
Engine 1.2.0.13781
MicroWorld-eScan undetected
No result reported
Engine 14.0.409.0
Microsoft undetected
No result reported
Engine 1.1.26010.1
NANO-Antivirus undetected
No result reported
Engine 1.0.170.26895
Paloalto type-unsupported
No result reported
Engine 0.9.0.1003
Panda undetected
No result reported
Engine 4.6.4.2
Rising undetected
No result reported
Engine 25.0.0.28
SUPERAntiSpyware undetected
No result reported
Engine 5.6.0.1032
Sangfor undetected
No result reported
Engine 2.22.3.0
SentinelOne type-unsupported
No result reported
Engine 7.5.3.1
Skyhigh undetected
No result reported
Engine v2021.2.0+4045
Sophos undetected
No result reported
Engine 3.3.1.0
Symantec undetected
No result reported
Engine 1.22.0.0
SymantecMobileInsight undetected
No result reported
Engine 2.0
TACHYON undetected
No result reported
Engine 2026-02-13.01
Tencent undetected
No result reported
Engine 1.0.0.1
Trapmine type-unsupported
No result reported
Engine 4.0.9.0
TrellixENS undetected
No result reported
Engine 6.0.6.653
TrendMicro undetected
No result reported
Engine 24.550.0.1002
TrendMicro-HouseCall undetected
No result reported
Engine 24.550.0.1002
Trustlook undetected
No result reported
Engine 1.0
VBA32 undetected
No result reported
Engine 5.5.0
VIPRE undetected
No result reported
Engine 6.0.0.35
Varist undetected
No result reported
Engine 6.6.1.3
ViRobot undetected
No result reported
Engine 2014.3.20.0
VirIT undetected
No result reported
Engine 9.5.1144
Webroot undetected
No result reported
Engine 1.9.0.8
Xcitium undetected
No result reported
Engine 38408
Yandex undetected
No result reported
Engine 5.5.2.24
Zillya undetected
No result reported
Engine 2.0.0.5543
ZoneAlarm undetected
No result reported
Engine 6.23-113518133
Zoner undetected
No result reported
Engine 2.2.2.0
alibabacloud type-unsupported
No result reported
Engine 2.2.0
huorong undetected
No result reported
Engine cef0c93:cef0c93:4698f47:4698f47
tehtris type-unsupported
No result reported

File Signatures

SHA-256 89ea841ddda7793fd5f1589c193573c77600e3b88fcfc0e348da4e46e1031981
MD5 151e598960dfc9b943489e305912224f
SHA-1 9691872bb19426c34068ae45192ba0be6afe8ade
SSDEEP 98304:+kL57i0rTG0/A6M69IJQ9Ox6NWVfDCLalgNSJgELb0Uqm4egOxzt/ol8KGcKsyyH:+k80x9OZEAVL7ESJL0Uqmq4zt2H5F
TLSH T14846F157F758A92FC83750B24ABE523152874C468E83DB436D58730C29BB9D42F9AFC8
VHASH fed321e677ce2b67eece37e5e5469ed1
PERMHASH 5db02cb9903fbe7ee1c2c1e074c2407c2acd8ed45c789dfaf285789d8acf7315

File Intelligence

Type Description Android Human-friendly file type name based on multiple detection methods.
Type Extension apk Most likely file extension inferred from the content.
Type Tag android Primary type tag assigned by the classifier.
Type Tags executable, mobile, android, apk Additional type tags that describe the file content.
Magic Zip archive data, at least v0.0 to extract, compression method=deflate File signature result from magic bytes inspection.
Magika APK File type predicted by Magika (ML-based file type detection).
TrID Android Package (65%), Sweet Home 3D Design (generic) (25.3%), ZIP compressed archive (9.6%) TrID file type guesses with probabilities.
dhash 0000000c0e0f0400 Perceptual hash used to compare visual similarity of files.
raw md5 8883b6d0e41361216f0f27adea7cb5ae Raw MD5 hash of the file contents.
extensions xml (585), png (185), version (54), kotlin_builtins (7), dex (5), arsc (1), bin (1), CoroutineExceptionHandler (1), MainDispatcherFactory (1), properties (1) File extensions found inside the APK and how many of each.
file types XML (585), PNG (185), unknown (70), Java Bytecode (1) Detected embedded file types and their counts.
highest datetime 1981-01-01 01:01:02 UTC Latest timestamp found among files inside the archive.
lowest datetime 1981-01-01 01:01:02 UTC Earliest timestamp found among files inside the archive.
num children 841 Number of files contained within the archive.
type APK Container type detected for the analyzed file.
uncompressed size 12 MB Estimated total size of all files after extraction.

Deep Manifest Analysis

Activity Intents (1)

com.example.jendie2.MainActivity
Actions
Main Activity Action: Start as a main entry point, does not expect to android.intent.action.MAIN
View Activity Action: Display the data to the user. android.intent.action.VIEW
Categories
android.intent.category.LAUNCHER android.intent.category.DEFAULT android.intent.category.BROWSABLE

Requested Permissions (4)

have full network access Allows the app to create network sockets and use custom network protocols. The browser and other applications provide means to send data to the internet, so this permission is not required to send data to the internet. android.permission.INTERNET
view network connections Allows the app to view information about network connections such as which networks exist and are connected. android.permission.ACCESS_NETWORK_STATE
view Wi-Fi connections Allows the app to view information about Wi-Fi networking, such as whether Wi-Fi is enabled and name of connected Wi-Fi devices. android.permission.ACCESS_WIFI_STATE
Dynamic receiver access Internal app permission used to protect dynamic broadcast receivers. com.example.jendie2.DYNAMIC_RECEIVER_NOT_EXPORTED_PERMISSION

Uses Features (2)

Touchscreen Feature for {@link #getSystemAvailableFeatures} and android.hardware.touchscreen
Wifi Feature for {@link #getSystemAvailableFeatures} and android.hardware.wifi

Activities (1)

com.example.jendie2.MainActivity

Content Providers (1)

androidx.startup.InitializationProvider

Submission Details

Submitted At 2026-02-13
First Submission 2026-02-13
Last Submission 2026-02-13
Stored Until 2026-03-15