Samsung Keyboard icon

SamsungKeyboard-v0.1.apk

Samsung Keyboard

19.67 MB

Analyzed: 2026-03-13 20:06 UTC

APK Security & Privacy Score

Security scoring uses multi-engine scan signals and APK indicators. Privacy scoring uses requested permissions and network endpoint patterns.

Security Scan-weighted
87/100
Threat scan clean Outdated target SDK
Privacy Permissions & network
57/100
High-risk permissions HTTP URLs found Possible tracking
69/100
Caution
Overall trust

Facts

Threat scan 0/76 flagged, 0 suspicious
Permissions 51 requested
Network strings 61 URLs (8 HTTP, 53 HTTPS)
Target SDK 28
Certificate Valid until 2044-02-02 (18 years, suspicious)

Warnings

Found 8 HTTP URL strings (unencrypted).
High-risk permissions detected: android.permission.REQUEST_INSTALL_PACKAGES, android.permission.SYSTEM_ALERT_WINDOW, android.permission.WRITE_SETTINGS
Requests 51 permissions (review carefully).
Possible analytics/tracking domains found: googleads.g.doubleclick.net, ssl.google-analytics.com, www.google-analytics.com
Package Name com.sec.android.inputmethod
Version Code 316022000
Version Name 3.1.60.22
Application Name com.sec.android.inputmethod.SamsungKeypadApplication
Debuggable No
Allow Backup No
Min SDK Android 24 (Nougat)
Target SDK Android 28 (Pie)
Supported ABIs
armeabi-v7a

Certificate & Signer

Valid From 2019-02-08 02:44:09
Valid To 2044-02-02 02:44:09
Serial Number 4d197885
Thumbprint e3e40878d57869c04d0516a794115e9dc3ad5172
Issuer: C 15510
Issuer: CN Tedy Ramdani
Issuer: DN C:15510, CN:Tedy Ramdani, L:Teluknaga Tangerang, ST:Banten
Issuer: L Teluknaga Tangerang
Issuer: ST Banten
Subject: C 15510
Subject: CN Tedy Ramdani
Subject: DN C:15510, CN:Tedy Ramdani, L:Teluknaga Tangerang, ST:Banten
Subject: L Teluknaga Tangerang
Subject: ST Banten

Security Scan

0 /76
✓ Clean
Scanned by 76 security vendors
Last scan: 2025-04-15 13:25 UTC
Malicious
0
Suspicious
0
Harmless
0
Undetected
66
Timeout
0
Failure
1

Scan Providers

76 vendors
ALYac undetected
No result reported
Engine 2.0.0.10
APEX type-unsupported
No result reported
Engine 6.644
AVG undetected
No result reported
Engine 23.9.8494.0
Acronis undetected
No result reported
Engine 1.2.0.121
AhnLab-V3 undetected
No result reported
Engine 3.27.2.10550
Alibaba undetected
No result reported
Engine 0.3.0.5
Antiy-AVL undetected
No result reported
Engine 3.0
Arcabit undetected
No result reported
Engine 2022.0.0.18
Avast undetected
No result reported
Engine 23.9.8494.0
Avast-Mobile undetected
No result reported
Engine 250415-02
Avira undetected
No result reported
Engine 8.3.3.20
Baidu undetected
No result reported
Engine 1.0.0.2
BitDefender undetected
No result reported
Engine 7.2
BitDefenderFalx undetected
No result reported
Engine 2.0.936
Bkav failure
No result reported
Engine 2.0.0.1
CAT-QuickHeal undetected
No result reported
Engine 22.00
CMC undetected
No result reported
Engine 2.4.2022.1
CTX undetected
No result reported
Engine 2024.8.29.1
ClamAV undetected
No result reported
Engine 1.4.2.0
CrowdStrike undetected
No result reported
Engine 1.0
Cylance type-unsupported
No result reported
Engine 3.0.0.0
Cynet undetected
No result reported
Engine 4.0.3.4
DeepInstinct type-unsupported
No result reported
Engine 5.0.0.8
DrWeb undetected
No result reported
Engine 7.0.67.2170
ESET-NOD32 undetected
No result reported
Engine 31039
Elastic undetected
No result reported
Engine 4.0.200
Emsisoft undetected
No result reported
Engine 2024.8.0.61147
F-Secure undetected
No result reported
Engine 18.10.1547.307
Fortinet undetected
No result reported
Engine 7.0.30.0
GData undetected
No result reported
Engine GD:27.39979AVA:64.29018
Google undetected
No result reported
Engine 1744716640
Gridinsoft undetected
No result reported
Engine 1.0.213.174
Ikarus undetected
No result reported
Engine 6.3.30.0
Jiangmin undetected
No result reported
Engine 16.0.100
K7AntiVirus undetected
No result reported
Engine 12.229.55445
K7GW undetected
No result reported
Engine 12.230.55448
Kaspersky undetected
No result reported
Engine 22.0.1.28
Kingsoft undetected
No result reported
Engine None
Lionic undetected
No result reported
Engine 8.16
Malwarebytes undetected
No result reported
Engine 4.5.5.54
MaxSecure undetected
No result reported
Engine 1.0.0.1
McAfee undetected
No result reported
Engine 6.0.6.653
McAfeeD type-unsupported
No result reported
Engine 1.2.0.7977
MicroWorld-eScan undetected
No result reported
Engine 14.0.409.0
Microsoft undetected
No result reported
Engine 1.1.25030.1
NANO-Antivirus undetected
No result reported
Engine 1.0.170.26531
Paloalto type-unsupported
No result reported
Engine 0.9.0.1003
Panda undetected
No result reported
Engine 4.6.4.2
Rising undetected
No result reported
Engine 25.0.0.28
SUPERAntiSpyware undetected
No result reported
Engine 5.6.0.1032
Sangfor undetected
No result reported
Engine 2.22.3.0
SentinelOne type-unsupported
No result reported
Engine 25.1.1.1
Skyhigh undetected
No result reported
Engine v2021.2.0+4045
Sophos undetected
No result reported
Engine 3.0.3.0
Symantec undetected
No result reported
Engine 1.22.0.0
SymantecMobileInsight undetected
No result reported
Engine 2.0
TACHYON undetected
No result reported
Engine 2025-04-15.02
Tencent undetected
No result reported
Engine 1.0.0.1
Trapmine type-unsupported
No result reported
Engine 4.0.4.0
TrendMicro undetected
No result reported
Engine 24.550.0.1002
TrendMicro-HouseCall undetected
No result reported
Engine 24.550.0.1002
Trustlook undetected
No result reported
Engine 1.0
VBA32 undetected
No result reported
Engine 5.3.2
VIPRE undetected
No result reported
Engine 6.0.0.35
Varist undetected
No result reported
Engine 6.6.1.3
ViRobot undetected
No result reported
Engine 2014.3.20.0
VirIT undetected
No result reported
Engine 9.5.935
Webroot undetected
No result reported
Engine 1.9.0.8
Xcitium undetected
No result reported
Engine 37644
Yandex undetected
No result reported
Engine 5.5.2.24
Zillya undetected
No result reported
Engine 2.0.0.5337
ZoneAlarm undetected
No result reported
Engine 6.16-103869903
Zoner undetected
No result reported
Engine 2.2.2.0
alibabacloud type-unsupported
No result reported
Engine 2.2.0
huorong undetected
No result reported
Engine 25167d5:25167d5:c9935ba:c9935ba
tehtris type-unsupported
No result reported

File Signatures

SHA-256 663ae8d25577c7dbb7d05faf1127f8513e5d66dc70a68c84437b6c68d573f2e6
MD5 6d62383cbf60a86a156da3d501e0b8e1
SHA-1 9843bde4b5282c26cf0b1dad924ad3568c077407
SSDEEP 196608:wRTpoyYsj+dj2z4GmlflTuRDa58GhiBpmSQAypsg6p:Pdiz4G0uRDauOFSgG
TLSH T17C279D02E6578E61C5FD873554B917226B228F10CB87D3971919F2BC6CF36E18B887CA
VHASH 20915828650c3e6c93545740662ad878
PERMHASH f3d932e6ce6812237b99872ae04a458b98324eef8e8694a16b0638176de74fa0

File Intelligence

Type Description Android Human-friendly file type name based on multiple detection methods.
Type Extension apk Most likely file extension inferred from the content.
Type Tag android Primary type tag assigned by the classifier.
Type Tags executable, mobile, android, apk Additional type tags that describe the file content.
Magic Zip archive data, at least v2.0 to extract, compression method=deflate File signature result from magic bytes inspection.
Magika APK File type predicted by Magika (ML-based file type detection).
TrID Android Package (33.5%), Java Archive (16.7%), Minecraft LiteLoader Mod (13%), Sweet Home 3D Design (generic) (13%), Mozilla Firefox browser extension (9.9%) TrID file type guesses with probabilities.
dhash 00003c1c1d1e0200 Perceptual hash used to compare visual similarity of files.
raw md5 ac994fc76a8bfe7861408e72531226f6 Raw MD5 hash of the file contents.
extensions xml (527), kotlin_metadata (258), png (204), kotlin_builtins (7), dex (2), so (2) File extensions found inside the APK and how many of each.
file types XML (527), unknown (267), PNG (204), ELF (2) Detected embedded file types and their counts.
highest datetime 2023-04-20 12:09:46 UTC Latest timestamp found among files inside the archive.
lowest datetime 2023-04-20 12:09:44 UTC Earliest timestamp found among files inside the archive.
num children 2545 Number of files contained within the archive.
type APK Container type detected for the analyzed file.
uncompressed size 12 MB Estimated total size of all files after extraction.

Deep Manifest Analysis

Activity Intents (3)

com.sec.android.inputmethod.ErgoTestActivity
Actions
Main Activity Action: Start as a main entry point, does not expect to android.intent.action.MAIN
com.sec.android.inputmethod.implement.setting.AboutSamsungKeyboard
Actions
Main Activity Action: Start as a main entry point, does not expect to android.intent.action.MAIN
Categories
com.android.settings.suggested.category.SEC_NEW_UPDATE
com.sec.android.inputmethod.implement.setting.LanguagesSettings
Actions
Main Activity Action: Start as a main entry point, does not expect to android.intent.action.MAIN
com.sec.android.inputmethod.implement.setting.AC_LANGUAGES_SETTINGS com.sec.android.inputmethod.implement.setting.AC_LANGUAGES_SETTINGS
Categories
android.intent.category.DEFAULT

Service Intents (3)

com.nuance.connect.service.ConnectClient
Actions
com.nuance.connect.service.ConnectClient com.nuance.connect.service.ConnectClient
com.sec.android.inputmethod.SamsungKeypad
Actions
android.view.InputMethod android.view.InputMethod
com.sec.android.inputmethod.base.spellcheckservice.SamsungIMESpellCheckerService
Actions
android.service.textservice.SpellCheckerService android.service.textservice.SpellCheckerService

Receiver Intents (6)

com.sec.android.inputmethod.CscUpdateReceiver
Actions
com.sec.android.inputmethod.UpdatePreferences com.sec.android.inputmethod.UpdatePreferences
com.sec.android.inputmethod.KnoxCustomKeypadReceiver
Actions
com.samsung.android.knox.intent.action.SET_KEYBOARD_MODE_INTERNAL com.samsung.android.knox.intent.action.SET_KEYBOARD_MODE_INTERNAL
com.sec.android.inputmethod.LoggingReceiver
Actions
com.samsung.android.providers.context.WEEKLY_BROADCAST com.samsung.android.providers.context.WEEKLY_BROADCAST
com.sec.android.inputmethod.SuggestionPickReceiver
Actions
android.text.style.SUGGESTION_PICKED android.text.style.SUGGESTION_PICKED
com.sec.android.inputmethod.base.updatemanager.GalaxyAppsUpdateReceiver
Actions
com.sec.android.app.samsungapps.UPDATE_EXISTS com.sec.android.app.samsungapps.UPDATE_EXISTS
com.sec.android.inputmethod.base.view.OtpBroadcastReceiver
Actions
android.provider.Telephony.SMS_RECEIVED android.provider.Telephony.SMS_RECEIVED

Native Libraries (2)

libTransliterate libTransliterate.so
libXt9core libXt9core.so

Requested Permissions (51)

com.sec.spp.permission.TOKEN_7fe61c4a5ddc8e7d8833670a6095f61e3164b8977334dd20f984d898f2e42134dd7e46e4e06e650d101de87ffa25db9fc3210d5e8860d70cafca73b44aac7742973ab59fe7406531ca3223555d8e486d9366c534fe5ea5f66d0f774558fd5eeaea2f1c386a125cec957fd79ce6e008b066e2f848cfc80bea2bdd54d3da6a5123 Custom app or vendor permission (not publicly documented). com.sec.spp.permission.TOKEN_7fe61c4a5ddc8e7d8833670a6095f61e3164b8977334dd20f984d898f2e42134dd7e46e4e06e650d101de87ffa25db9fc3210d5e8860d70cafca73b44aac7742973ab59fe7406531ca3223555d8e486d9366c534fe5ea5f66d0f774558fd5eeaea2f1c386a125cec957fd79ce6e008b066e2f848cfc80bea2bdd54d3da6a5123
keep car screen turned on Allows the app to keep the car screen turned on. android.permission.WAKE_LOCK
Read Privileged Phone State android.permission.READ_PRIVILEGED_PHONE_STATE
control vibration Allows the app to control the vibrator. android.permission.VIBRATE
pair with Bluetooth devices Allows the app to view the configuration of Bluetooth on the tablet, and to make and accept connections with paired devices. android.permission.BLUETOOTH
change your audio settings Allows the app to modify global audio settings such as volume and which speaker is used for output. android.permission.MODIFY_AUDIO_SETTINGS
modify or delete the contents of your shared storage Allows the app to write the contents of your shared storage. android.permission.WRITE_EXTERNAL_STORAGE
view network connections Allows the app to view information about network connections such as which networks exist and are connected. android.permission.ACCESS_NETWORK_STATE
have full network access Allows the app to create network sockets and use custom network protocols. The browser and other applications provide means to send data to the internet, so this permission is not required to send data to the internet. android.permission.INTERNET
modify system settings Allows the app to modify the system\'s settings data. Malicious apps may corrupt your system\'s configuration. android.permission.WRITE_SETTINGS
read your contacts Allows the app to read data about your contacts stored on your tablet. Apps will also have access to the accounts on your tablet that have created contacts. This may include accounts created by apps you have installed. This permission allows apps to save your contact data, and malicious apps may share contact data without your knowledge. android.permission.READ_CONTACTS
find accounts on the device Allows the app to get the list of accounts known by the tablet. This may include any accounts created by applications you have installed. android.permission.GET_ACCOUNTS
Manage Accounts android.permission.MANAGE_ACCOUNTS
Authenticate Accounts android.permission.AUTHENTICATE_ACCOUNTS
com.samsung.helphub.permission.HELP Custom app or vendor permission (not publicly documented). com.samsung.helphub.permission.HELP
view Wi-Fi connections Allows the app to view information about Wi-Fi networking, such as whether Wi-Fi is enabled and name of connected Wi-Fi devices. android.permission.ACCESS_WIFI_STATE
connect and disconnect from Wi-Fi Allows the app to connect to and disconnect from Wi-Fi access points and to make changes to device configuration for Wi-Fi networks. android.permission.CHANGE_WIFI_STATE
com.sec.android.app.twdvfs.DVFS_BOOSTER_PERMISSION
com.mirrorlink.android.service.ACCESS_PERMISSION
Write Secure Settings android.permission.WRITE_SECURE_SETTINGS
Internal System Window android.permission.INTERNAL_SYSTEM_WINDOW
com.wssnps.permission.COM_WSSNPS Custom app or vendor permission (not publicly documented). com.wssnps.permission.COM_WSSNPS
Manage Usb android.permission.MANAGE_USB
Interact Across Users Full android.permission.INTERACT_ACROSS_USERS_FULL
Manage Users android.permission.MANAGE_USERS
Inject Events android.permission.INJECT_EVENTS
read sync statistics Allows an app to read the sync stats for an account, including the history of sync events and how much data is synced. android.permission.READ_SYNC_STATS
read sync settings Allows the app to read the sync settings for an account. For example, this can determine whether the People app is synced with an account. android.permission.READ_SYNC_SETTINGS
toggle sync on and off Allows an app to modify the sync settings for an account. For example, this can be used to enable sync of the People app with an account. android.permission.WRITE_SYNC_SETTINGS
Set Process Limit android.permission.SET_PROCESS_LIMIT
com.sec.mms.permission.RECEIVE_MESSAGES_INFORMATION Custom app or vendor permission (not publicly documented). com.sec.mms.permission.RECEIVE_MESSAGES_INFORMATION
receive text messages (SMS) Allows the app to receive and process SMS messages. This means the app could monitor or delete messages sent to your device without showing them to you. android.permission.RECEIVE_SMS
com.samsung.android.knox.permission.KNOX_CUSTOM_SYSTEM Custom app or vendor permission (not publicly documented). com.samsung.android.knox.permission.KNOX_CUSTOM_SYSTEM
android.permission.DOWNLOAD_WITHOUT_NOTIFICATION Custom app or vendor permission (not publicly documented). android.permission.DOWNLOAD_WITHOUT_NOTIFICATION
android.permission.REQUEST_INSTALL_PACKAGES Custom app or vendor permission (not publicly documented). android.permission.REQUEST_INSTALL_PACKAGES
com.sec.android.inputmethod.permission.RESOURCEMANAGER_LANGUAGE_UPDATE Custom app or vendor permission (not publicly documented). com.sec.android.inputmethod.permission.RESOURCEMANAGER_LANGUAGE_UPDATE
com.samsung.android.scloud.backup.lib.read
com.samsung.android.scloud.backup.lib.write
com.samsung.android.providers.context.permission.WRITE_USE_APP_FEATURE_SURVEY Custom app or vendor permission (not publicly documented). com.samsung.android.providers.context.permission.WRITE_USE_APP_FEATURE_SURVEY
This app can appear on top of other apps This app can appear on top of other apps or other parts of the screen. This may interfere with normal app usage and change the way that other apps appear. android.permission.SYSTEM_ALERT_WINDOW
expand/collapse status bar Allows the app to expand or collapse the status bar. android.permission.EXPAND_STATUS_BAR
com.samsung.systemui.POPUP_UI_PERMISSION
com.samsung.android.service.livedrawing.permission.START Custom app or vendor permission (not publicly documented). com.samsung.android.service.livedrawing.permission.START
com.samsung.android.bixby.agent.permission.READ_LANGUAGE Custom app or vendor permission (not publicly documented). com.samsung.android.bixby.agent.permission.READ_LANGUAGE
com.samsung.android.bixby.permission.BIXBY_DICTATION Custom app or vendor permission (not publicly documented). com.samsung.android.bixby.permission.BIXBY_DICTATION
com.sec.android.app.samsungapps.accesspermisson.UPDATE_EXISTS
App badge update Allows the app to update the launcher icon badge count on Samsung launchers. com.sec.android.provider.badge.permission.READ
App badge update Allows the app to update the launcher icon badge count on Samsung launchers. com.sec.android.provider.badge.permission.WRITE
read phone status and identity Allows the app to access the phone features of the device. This permission allows the app to determine the phone number and device IDs, whether a call is active, and the remote number connected by a call. android.permission.READ_PHONE_STATE
com.samsung.android.stickercenter.permission.sticker.READ Custom app or vendor permission (not publicly documented). com.samsung.android.stickercenter.permission.sticker.READ
com.samsung.android.stickercenter.service.ACCESS

Uses Features (1)

com.samsung.android.api.version.2403

Activities (30)

com.sec.android.inputmethod.SamsungKeypadSettings
com.sec.android.inputmethod.implement.setting.ResetSettingsPreference
com.sec.android.inputmethod.ErgoTestActivity
com.sec.android.inputmethod.implement.setting.LanguagesSettings
com.sec.android.inputmethod.implement.setting.DeleteLanguages
com.sec.android.inputmethod.implement.setting.KeyboardSwipeSettings
com.sec.android.inputmethod.implement.setting.AutoReplacementSettings
com.sec.android.inputmethod.implement.setting.KeyboardTransliterationSettings
com.sec.android.inputmethod.implement.setting.SpellCheckerSettings
com.sec.android.inputmethod.implement.setting.AutoSpacingSettings
com.sec.android.inputmethod.implement.input.umlaut.HwUmlautPopup
com.sec.android.inputmethod.implement.setting.LanguageItemSettingActivity
com.sec.android.inputmethod.implement.setting.KeyboardLayoutSettings
com.sec.android.inputmethod.implement.setting.LanguagesAndTypesSettings
com.sec.android.inputmethod.implement.setting.CustomizationSettings
com.sec.android.inputmethod.implement.setting.KeyTapFeedbackSettings
com.sec.android.inputmethod.implement.setting.SmartTypingSettings
com.sec.android.inputmethod.implement.setting.MultiFlickCustomActivity
com.sec.android.inputmethod.implement.setting.FuzzyPinyinSettings
com.sec.android.inputmethod.implement.setting.PermissionGrantScreen
com.sec.android.inputmethod.implement.setting.PermissionsActivity
com.sec.android.inputmethod.implement.setting.AboutSamsungKeyboard
com.sec.android.inputmethod.implement.setting.TextShortcutsSettings
com.sec.android.inputmethod.implement.setting.KeyboardDeveloperOptionsActivity
com.sec.android.inputmethod.implement.setting.LoggingDataViewer
com.sec.android.inputmethod.test.activity.InputTestActivity
com.sec.android.inputmethod.test.activity.InputOptionsTestActivity
com.sec.android.inputmethod.implement.setting.OpenSourceLicensesActivity
com.sec.android.inputmethod.implement.setting.KeyboardLayoutTestActivity
com.sec.android.inputmethod.implement.setting.TacVisualizationActivity

Services (4)

com.sec.android.inputmethod.SamsungKeypad
com.sec.android.inputmethod.databases.CandidateExplainerDbInflater
com.sec.android.inputmethod.base.spellcheckservice.SamsungIMESpellCheckerService
com.nuance.connect.service.ConnectClient

Broadcast Receivers (6)

com.sec.android.inputmethod.base.view.OtpBroadcastReceiver com.sec.android.inputmethod.base.view.OtpBroadcastReceiver
com.sec.android.inputmethod.CscUpdateReceiver com.sec.android.inputmethod.CscUpdateReceiver
com.sec.android.inputmethod.SuggestionPickReceiver com.sec.android.inputmethod.SuggestionPickReceiver
com.sec.android.inputmethod.base.updatemanager.GalaxyAppsUpdateReceiver com.sec.android.inputmethod.base.updatemanager.GalaxyAppsUpdateReceiver
com.sec.android.inputmethod.LoggingReceiver com.sec.android.inputmethod.LoggingReceiver
com.sec.android.inputmethod.KnoxCustomKeypadReceiver com.sec.android.inputmethod.KnoxCustomKeypadReceiver

Content Providers (2)

com.sec.android.inputmethod.implement.setting.provider.KeyboardSettingsProvider
android.support.v4.content.FileProvider

URL Endpoints (61)

http://developers.facebook.com/docs/reference/rest/ http://goo.gl/8Rd3yj http://goo.gl/naFqQk http://hostname/ http://plus.google.com/ http://www.google-analytics.com http://www.google.com http://www.youtube.com/watch?v= https://accounts.google.com https://api-samsung.swypeconnect.com/ https://api.facebook.com/restserver.php https://api.swypeconnect.com/ https://api.twitter.com/1.1/account/verify_credentials.json https://api.twitter.com/1.1/application/rate_limit_status.json https://api.twitter.com/1.1/friends/list.json https://api.twitter.com/1.1/statuses/destroy/ https://api.twitter.com/1.1/statuses/update.json https://api.twitter.com/1.1/statuses/user_timeline.json https://api.twitter.com/oauth/access_token https://api.twitter.com/oauth/authorize

Submission Details

Submitted At 2026-03-13
First Submission 2026-03-13
Last Submission 2026-03-13
Stored Until 2026-04-12