这个是下江小春 - [穿着落肩水手服] - 渊博的瑟瑟少女 icon

base.apk

这个是下江小春 - [穿着落肩水手服] - 渊博的瑟瑟少女

725.18 KB

Analyzed: 2026-03-06 12:00 UTC

APK Security & Privacy Score

Security scoring uses multi-engine scan signals and APK indicators. Privacy scoring uses requested permissions and network endpoint patterns.

Security Scan-weighted
60/100
Threat scan flagged Debuggable build
Privacy Permissions & network
98/100
AllowBackup enabled Low data access
74/100
Caution
Overall trust

Facts

Threat scan 5/75 flagged, 0 suspicious
Permissions 1 requested
Network strings No URL strings detected
Target SDK 30
Certificate Valid until 2124-07-07 (98 years, suspicious)

Warnings

Threat scan flagged: 5/75 scanners marked this file as malicious.
AllowBackup is enabled.
Package Name com.randonautica.xjxc
Version Code 2026011403
Version Name 2026011403
Debuggable Yes
Allow Backup Yes
Min SDK Android 19 (KitKat)
Target SDK Android 30 (Android 11)
Supported ABIs
Universal

Certificate & Signer

Valid From 2024-07-08 14:22:22
Valid To 2124-07-07 14:22:22
Serial Number ff0020240708222222
Thumbprint 52d09493e57402637634e2db79ce1ada2a96ffe1
Issuer: CN testkey-signature-ECC
Issuer: DN CN:testkey-signature-ECC, O:0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz Testkey, OU:Testkey
Issuer: O 0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz Testkey
Issuer: OU Testkey
Subject: CN testkey-signature-ECC
Subject: DN CN:testkey-signature-ECC, O:0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz Testkey, OU:Testkey
Subject: O 0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz Testkey
Subject: OU Testkey

Security Scan

5 /75
⚠️ Threats Detected
Detected by 5 vendors: AhnLab-V3 (Trojan/Android.Boogr.1267788), DrWeb (Android.Siggen.Susp.44999), K7GW (Trojan ( 0001140e1 ))
Scanned by 75 security vendors
Last scan: 2026-03-06 11:59 UTC
Malicious
5
Suspicious
0
Harmless
0
Undetected
54
Timeout
2
Failure
5

Scan Providers

75 vendors
ALYac undetected
No result reported
Engine 2.0.0.10
APEX type-unsupported
No result reported
Engine 6.755
AVG undetected
No result reported
Engine 23.9.8494.0
Acronis undetected
No result reported
Engine 1.2.0.121
AhnLab-V3 malicious
Trojan/Android.Boogr.1267788
Engine 3.29.1.10604
Alibaba undetected
No result reported
Engine 0.3.0.5
Antiy-AVL undetected
No result reported
Engine 3.0
Arcabit undetected
No result reported
Engine 2025.0.0.23
Avast undetected
No result reported
Engine 23.9.8494.0
Avast-Mobile undetected
No result reported
Engine 260306-02
Avira undetected
No result reported
Engine 8.3.3.24
Baidu undetected
No result reported
Engine 1.0.0.2
BitDefender undetected
No result reported
Engine 7.2
BitDefenderFalx undetected
No result reported
Engine 2.0.936
Bkav undetected
No result reported
Engine 2.0.0.1
CAT-QuickHeal undetected
No result reported
Engine 22.00
CMC undetected
No result reported
Engine 2.4.2022.1
CTX undetected
No result reported
Engine 2024.8.29.1
ClamAV failure
No result reported
Engine 1.5.2.0
CrowdStrike undetected
No result reported
Engine 1.0
Cylance type-unsupported
No result reported
Engine 3.0.0.0
Cynet undetected
No result reported
Engine 4.0.3.4
DeepInstinct type-unsupported
No result reported
Engine 5.0.0.8
DrWeb malicious
Android.Siggen.Susp.44999
Engine 7.0.75.2070
ESET-NOD32 undetected
No result reported
Engine 18.2.18.0
Elastic type-unsupported
No result reported
Engine 4.0.251
Emsisoft undetected
No result reported
Engine 2024.8.0.61147
F-Secure undetected
No result reported
Engine 18.10.1547.307
GData undetected
No result reported
Engine GD:27.43759AVA:64.30785
Google undetected
No result reported
Engine 1772796652
Gridinsoft undetected
No result reported
Engine 1.0.240.174
Ikarus undetected
No result reported
Engine 6.4.16.0
Jiangmin undetected
No result reported
Engine 16.0.100
K7AntiVirus undetected
No result reported
Engine 14.39.58794
K7GW malicious
Trojan ( 0001140e1 )
Engine 14.39.58796
Kaspersky malicious
HEUR:Trojan.AndroidOS.Boogr.gsh
Engine 22.0.1.28
Kingsoft undetected
No result reported
Engine None
Lionic undetected
No result reported
Engine 8.16
Malwarebytes undetected
No result reported
Engine 3.1.0.211
MaxSecure failure
No result reported
Engine 1.0.0.1
McAfeeD undetected
No result reported
Engine 1.2.0.14023
MicroWorld-eScan undetected
No result reported
Engine 14.0.409.0
Microsoft undetected
No result reported
Engine 1.1.26010.1
NANO-Antivirus undetected
No result reported
Engine 1.0.170.26895
Paloalto type-unsupported
No result reported
Engine 0.9.0.1003
Panda undetected
No result reported
Engine 4.6.4.2
Rising malicious
Trojan.Boogr/Android!8.DCA0 (CLOUD)
Engine 25.0.0.28
SUPERAntiSpyware undetected
No result reported
Engine 5.6.0.1032
Sangfor undetected
No result reported
Engine 2.22.3.0
SentinelOne type-unsupported
No result reported
Engine 7.5.3.1
Skyhigh timeout
No result reported
Sophos undetected
No result reported
Engine 3.3.1.0
Symantec timeout
No result reported
Engine 1.22.0.0
SymantecMobileInsight undetected
No result reported
Engine 2.0
TACHYON undetected
No result reported
Engine 2026-03-06.02
Tencent undetected
No result reported
Engine 1.0.0.1
Trapmine type-unsupported
No result reported
Engine 4.0.10.0
TrellixENS failure
No result reported
Engine 6.0.6.653
TrendMicro failure
No result reported
Engine 24.550.0.1002
TrendMicro-HouseCall undetected
No result reported
Engine 24.550.0.1002
Trustlook undetected
No result reported
Engine 1.0
VBA32 undetected
No result reported
Engine 5.5.1
VIPRE undetected
No result reported
Engine 6.0.0.35
Varist undetected
No result reported
Engine 6.6.1.3
ViRobot undetected
No result reported
Engine 2014.3.20.0
VirIT undetected
No result reported
Engine 9.5.1159
Webroot undetected
No result reported
Engine 1.9.0.8
Xcitium undetected
No result reported
Engine 38463
Yandex undetected
No result reported
Engine 5.5.2.24
Zillya failure
No result reported
Engine 2.0.0.5557
ZoneAlarm undetected
No result reported
Engine 6.23-113518667
Zoner undetected
No result reported
Engine 2.2.2.0
alibabacloud type-unsupported
No result reported
Engine 2.2.0
huorong undetected
No result reported
Engine b6f6803:b6f6803:7fe1b97:7fe1b97
tehtris type-unsupported
No result reported
Engine v0.1.4

File Signatures

SHA-256 46b7ba23481d573165d09c8271f01c854e60d8f727377ae484610c9112f0b292
MD5 ca89ac45bd9d595402611bf17115788b
SHA-1 552bbc40863dedb73710f730458fba100499ad30
SSDEEP 12288:rCQsWBvkPD5Hm5vazDcFot0QvZ/lwu/bUtHGXneQt0aGqm6nrR94KuW9RhWpRIWl:xs+vk7xmFotJ0u/bUi0BErR9LDDaRF/N
TLSH T114F4EF35F2C3E322EB8B227C92BE7D77236489D141C451A3721B9C4A6749F7898076BD
VHASH 67ee80349b851a6b2840bb71be95b069
PERMHASH def81cabdf574f9ff22a7227d5ad2190ac1e92c190a82ac768e42d4350f03c6a

File Intelligence

Type Description Android Human-friendly file type name based on multiple detection methods.
Type Extension apk Most likely file extension inferred from the content.
Type Tag android Primary type tag assigned by the classifier.
Type Tags executable, mobile, android, apk Additional type tags that describe the file content.
Magic Zip archive data, at least v1.0 to extract, compression method=deflate File signature result from magic bytes inspection.
Magika APK File type predicted by Magika (ML-based file type detection).
TrID Android Package (60.6%), Java Archive (30.3%), ZIP compressed archive (8.9%) TrID file type guesses with probabilities.
dhash 0000000e0e0d0d08 Perceptual hash used to compare visual similarity of files.
raw md5 80c61adc4c81030a328de2d7c3a05c8b Raw MD5 hash of the file contents.
extensions version (4), xml (2), arsc (1), dex (1), jpg (1), MF (1), mp3 (1), png (1), properties (1), RSA (1), SF (1) File extensions found inside the APK and how many of each.
file types unknown (10), XML (2), DEX (1), JPG (1), OGG (1), PNG (1) Detected embedded file types and their counts.
highest datetime 2079-11-30 00:00:00 UTC Latest timestamp found among files inside the archive.
lowest datetime 2022-12-14 15:40:14 UTC Earliest timestamp found among files inside the archive.
num children 16 Number of files contained within the archive.
type APK Container type detected for the analyzed file.
uncompressed size 727 KB Estimated total size of all files after extraction.

Deep Manifest Analysis

Activity Intents (1)

com.randonautica.xjxc.Main
Actions
Main Activity Action: Start as a main entry point, does not expect to android.intent.action.MAIN
Categories
android.intent.category.DEFAULT android.intent.category.LAUNCHER

Requested Permissions (1)

disable your screen lock Allows the app to disable the keylock and any associated password security. For example, the phone disables the keylock when receiving an incoming phone call, then re-enables the keylock when the call is finished. android.permission.DISABLE_KEYGUARD

Activities (1)

com.randonautica.xjxc.Main

Services (1)

com.randonautica.xjxc.MusicService

Submission Details

Submitted At 2026-03-06
First Submission 2026-03-06
Last Submission 2026-03-06
Stored Until 2026-04-05