我在仙界当富豪 icon

wzxjdfhyx1.0.3.apk

我在仙界当富豪

66.92 MB

Analyzed: 2026-03-22 06:43 UTC

APK Security & Privacy Score

Security scoring uses multi-engine scan signals and APK indicators. Privacy scoring uses requested permissions and network endpoint patterns.

Security Scan-weighted
58/100
Threat scan flagged
Privacy Permissions & network
69/100
High-risk permissions
63/100
Caution
Overall trust

Facts

Threat scan 5/76 flagged, 0 suspicious
Permissions 20 requested
Network strings No URL strings detected
Target SDK 30
Certificate Valid until 2076-01-13 (50 years, suspicious)

Warnings

Threat scan flagged: 5/76 scanners marked this file as malicious.
High-risk permissions detected: android.permission.REQUEST_INSTALL_PACKAGES, android.permission.QUERY_ALL_PACKAGES
Package Name com.twfxgame.godshop
Version Code 3
Version Name 1.0.3
Application Name com.stub.StubApp
Debuggable No
Allow Backup No
Min SDK Android 21 (Lollipop)
Target SDK Android 30 (Android 11)
Supported ABIs
arm64-v8a armeabi-v7a

Certificate & Signer

Valid From 2021-04-11 06:57:37
Valid To 2076-01-13 06:57:37
Serial Number 23488392
Thumbprint 57afc5bd4658ec48193da3d06089cd67d4580fd0
Issuer: C oo
Issuer: CN oo
Issuer: DN C:oo, CN:oo, L:oo, O:oo, ST:oo, OU:oo
Issuer: L oo
Issuer: O oo
Issuer: OU oo
Issuer: ST oo
Subject: C oo
Subject: CN oo
Subject: DN C:oo, CN:oo, L:oo, O:oo, ST:oo, OU:oo
Subject: L oo
Subject: O oo
Subject: OU oo
Subject: ST oo

Security Scan

5 /76
⚠️ Threats Detected
Detected by 5 vendors: AhnLab-V3 (PUP/Android.Malct.1078451), ESET-NOD32 (Android/Packed.Jiagu.D potentially unsafe application), Google (Detected)
Scanned by 76 security vendors
Last scan: 2026-03-22 06:43 UTC
Malicious
5
Suspicious
0
Harmless
0
Undetected
61
Timeout
1
Failure
1

Scan Providers

76 vendors
ALYac undetected
No result reported
Engine 2.0.0.10
APEX type-unsupported
No result reported
Engine 6.760
AVG undetected
No result reported
Engine 23.9.8494.0
Acronis undetected
No result reported
Engine 1.2.0.121
AhnLab-V3 malicious
PUP/Android.Malct.1078451
Engine 3.29.3.10609
Alibaba undetected
No result reported
Engine 0.3.0.5
Antiy-AVL undetected
No result reported
Engine 3.0
Arcabit undetected
No result reported
Engine 2025.0.0.23
Avast undetected
No result reported
Engine 23.9.8494.0
Avast-Mobile undetected
No result reported
Engine 260321-02
Avira undetected
No result reported
Engine 8.3.3.24
Baidu undetected
No result reported
Engine 1.0.0.2
BitDefender undetected
No result reported
Engine 7.2
BitDefenderFalx undetected
No result reported
Engine 2.0.936
Bkav undetected
No result reported
Engine 2.0.0.1
CAT-QuickHeal undetected
No result reported
Engine 22.00
CMC undetected
No result reported
Engine 2.4.2022.1
CTX undetected
No result reported
Engine 2024.8.29.1
ClamAV undetected
No result reported
Engine 1.5.2.0
CrowdStrike undetected
No result reported
Engine 1.0
Cylance type-unsupported
No result reported
Engine 3.0.0.0
Cynet type-unsupported
No result reported
Engine 4.0.3.4
DeepInstinct type-unsupported
No result reported
Engine 5.0.0.8
DrWeb undetected
No result reported
Engine 7.0.75.2070
ESET-NOD32 malicious
Android/Packed.Jiagu.D potentially unsafe application
Engine 18.2.18.0
Elastic undetected
No result reported
Engine 4.0.252
Emsisoft undetected
No result reported
Engine 2024.8.0.61147
F-Secure undetected
No result reported
Engine 18.10.1547.307
Fortinet undetected
No result reported
Engine 7.0.30.0
GData undetected
No result reported
Engine GD:27.43944AVA:64.30883
Google malicious
Detected
Engine 1774155653
Gridinsoft undetected
No result reported
Engine 1.0.241.174
Ikarus malicious
Trojan-Spy.AndroidOS.Banker
Engine 6.4.16.0
Jiangmin undetected
No result reported
Engine 16.0.100
K7AntiVirus undetected
No result reported
Engine 14.42.58953
K7GW malicious
Trojan ( 0057773e1 )
Engine 14.42.58953
Kaspersky undetected
No result reported
Engine 22.0.1.28
Kingsoft undetected
No result reported
Engine None
Lionic undetected
No result reported
Engine 8.16
Malwarebytes undetected
No result reported
Engine 3.1.0.214
MaxSecure undetected
No result reported
Engine 1.0.0.1
McAfeeD undetected
No result reported
Engine 1.2.0.14148
MicroWorld-eScan undetected
No result reported
Engine 14.0.409.0
Microsoft undetected
No result reported
Engine 1.1.26010.1
NANO-Antivirus undetected
No result reported
Engine 1.0.170.26895
Paloalto type-unsupported
No result reported
Engine 0.9.0.1003
Panda undetected
No result reported
Engine 4.6.4.2
Rising undetected
No result reported
Engine 25.0.0.28
SUPERAntiSpyware undetected
No result reported
Engine 5.6.0.1032
Sangfor undetected
No result reported
Engine 2.22.3.0
SentinelOne undetected
No result reported
Engine 7.5.3.1
Skyhigh timeout
No result reported
Sophos undetected
No result reported
Engine 3.3.1.0
Symantec undetected
No result reported
Engine 1.22.0.0
SymantecMobileInsight undetected
No result reported
Engine 2.0
TACHYON undetected
No result reported
Engine 2026-03-22.01
Tencent undetected
No result reported
Engine 1.0.0.1
Trapmine type-unsupported
No result reported
Engine 4.0.10.0
TrellixENS undetected
No result reported
Engine 6.0.6.653
TrendMicro undetected
No result reported
Engine 24.550.0.1002
TrendMicro-HouseCall undetected
No result reported
Engine 24.550.0.1002
Trustlook undetected
No result reported
Engine 1.0
VBA32 undetected
No result reported
Engine 5.5.1
VIPRE undetected
No result reported
Engine 6.0.0.35
Varist undetected
No result reported
Engine 6.6.1.3
ViRobot undetected
No result reported
Engine 2014.3.20.0
VirIT undetected
No result reported
Engine 9.5.1170
Webroot undetected
No result reported
Engine 1.9.0.8
Xcitium undetected
No result reported
Engine 38499
Yandex undetected
No result reported
Engine 5.5.2.24
Zillya failure
No result reported
Engine 2.0.0.5567
ZoneAlarm undetected
No result reported
Engine 6.23-113519107
Zoner undetected
No result reported
Engine 2.2.2.0
alibabacloud type-unsupported
No result reported
Engine 2.2.0
huorong undetected
No result reported
Engine dbd7303:dbd7303:38b5ae0:38b5ae0
tehtris type-unsupported
No result reported
Engine v0.1.4

File Signatures

SHA-256 a59c3fe13ff5c54be1843e9bb541f1a741d0101ba730a55ef6c11b1d8c7c1c1c
MD5 6313735eb017c593660e47f94f987142
SHA-1 fb564b1f78acbb22793f8d71c7f458abbec1c1c0
SSDEEP 1572864:Ue++pyabrhWvyWdm4U288pCXPh9/GPaMjhWqFkr3VQ7kDaRjVx8EYo:Ue++pLbgKz48oC/TGPaMjhh7kD8V
TLSH T108F73344DB48F26EF1F3C033CD75866294C48C4C9DD2D66758AEB71DA9BFE840982AC6
VHASH 48fe8d436ab4bb98a908fc665ca3783a
PERMHASH 1086764f8dc0714d56b5346d520463600e1925c6671e64e79f52ce4757d77e8f

File Intelligence

Type Description Android Human-friendly file type name based on multiple detection methods.
Type Extension apk Most likely file extension inferred from the content.
Type Tag android Primary type tag assigned by the classifier.
Type Tags executable, mobile, android, apk Additional type tags that describe the file content.
Magic Zip archive data, at least v2.0 to extract, compression method=deflate File signature result from magic bytes inspection.
Magika APK File type predicted by Magika (ML-based file type detection).
TrID Android Package (49%), Java Archive (24.5%), Sweet Home 3D Design (generic) (19%), ZIP compressed archive (7.2%) TrID file type guesses with probabilities.
dhash 0000001e1e0c0908 Perceptual hash used to compare visual similarity of files.
raw md5 0d752db9b08fb61a48b38168f6392b55 Raw MD5 hash of the file contents.
extensions png (433), xml (353), assetbundle (62), version (26), so (14), config (7), assets (5), bytes (5), aspx (3), browser (3), json (3), map (3), dat (2), txt (2), arsc (1), dex (1), dylib (1), info (1), ini (1), jar (1), MF (1), RSA (1), SF (1), split0 (1), split1 (1), split2 (1), split3 (1), split4 (1), split5 (1), split6 (1), split7 (1) File extensions found inside the APK and how many of each.
file types PNG (433), XML (362), unknown (153), ELF (14), JSON (2), ZIP (2), DEX (1), Mac OS X Executable (1) Detected embedded file types and their counts.
highest datetime 2023-09-07 19:59:00 UTC Latest timestamp found among files inside the archive.
lowest datetime 2023-09-07 19:55:38 UTC Earliest timestamp found among files inside the archive.
num children 968 Number of files contained within the archive.
type APK Container type detected for the analyzed file.
uncompressed size 159 MB Estimated total size of all files after extraction.

Deep Manifest Analysis

Activity Intents (1)

com.unity3d.player.UnityPlayerActivity
Actions
Main Activity Action: Start as a main entry point, does not expect to android.intent.action.MAIN
Categories
android.intent.category.LAUNCHER android.intent.category.LEANBACK_LAUNCHER

Service Intents (1)

com.ss.android.socialbase.downloader.downloader.IndependentProcessDownloadService
Actions
com.ss.android.socialbase.downloader.remote com.ss.android.socialbase.downloader.remote

Receiver Intents (1)

com.anythink.china.common.NotificationBroadcaseReceiver
Actions
anythink_action_notification_click anythink_action_notification_click
anythink_action_notification_cancel anythink_action_notification_cancel

Native Libraries (6)

libX86Bridge libX86Bridge.so
libil2cpp libil2cpp.so
libmain libmain.so
libpangleflipped libpangleflipped.so
libunity libunity.so
libxlua libxlua.so

Requested Permissions (20)

have full network access Allows the app to create network sockets and use custom network protocols. The browser and other applications provide means to send data to the internet, so this permission is not required to send data to the internet. android.permission.INTERNET
view network connections Allows the app to view information about network connections such as which networks exist and are connected. android.permission.ACCESS_NETWORK_STATE
record audio android.permission.RECORD_AUDIO
change your audio settings Allows the app to modify global audio settings such as volume and which speaker is used for output. android.permission.MODIFY_AUDIO_SETTINGS
pair with Bluetooth devices Allows the app to view the configuration of Bluetooth on the tablet, and to make and accept connections with paired devices. android.permission.BLUETOOTH
read phone status and identity Allows the app to access the phone features of the device. This permission allows the app to determine the phone number and device IDs, whether a call is active, and the remote number connected by a call. android.permission.READ_PHONE_STATE
modify or delete the contents of your shared storage Allows the app to write the contents of your shared storage. android.permission.WRITE_EXTERNAL_STORAGE
read the contents of your shared storage Allows the app to read the contents of your shared storage. android.permission.READ_EXTERNAL_STORAGE
view Wi-Fi connections Allows the app to view information about Wi-Fi networking, such as whether Wi-Fi is enabled and name of connected Wi-Fi devices. android.permission.ACCESS_WIFI_STATE
android.permission.REQUEST_INSTALL_PACKAGES Custom app or vendor permission (not publicly documented). android.permission.REQUEST_INSTALL_PACKAGES
com.google.android.gms.permission.AD_ID Custom app or vendor permission (not publicly documented). com.google.android.gms.permission.AD_ID
retrieve running apps Allows the app to retrieve information about currently and recently running tasks. This may allow the app to discover information about which applications are used on the device. android.permission.GET_TASKS
keep car screen turned on Allows the app to keep the car screen turned on. android.permission.WAKE_LOCK
change network connectivity Allows the app to change the state of network connectivity. android.permission.CHANGE_NETWORK_STATE
android.permission.QUERY_ALL_PACKAGES Custom app or vendor permission (not publicly documented). android.permission.QUERY_ALL_PACKAGES
reorder running apps Allows the app to move tasks to the foreground and background. The app may do this without your input. android.permission.REORDER_TASKS
control vibration Allows the app to control the vibrator. android.permission.VIBRATE
access approximate location only in the foreground This app can get your approximate location from location services while the app is in use. Location services for your device must be turned on for the app to get location. android.permission.ACCESS_COARSE_LOCATION
com.twfxgame.godshop.openadsdk.permission.TT_PANGOLIN Custom app or vendor permission (not publicly documented). com.twfxgame.godshop.openadsdk.permission.TT_PANGOLIN
com.asus.msa.SupplementaryDID.ACCESS

Uses Features (4)

Microphone Feature for {@link #getSystemAvailableFeatures} and android.hardware.microphone
Touchscreen Feature for {@link #getSystemAvailableFeatures} and android.hardware.touchscreen
Touchscreen Multitouch Feature for {@link #getSystemAvailableFeatures} and android.hardware.touchscreen.multitouch
Touchscreen Multitouch Distinct Feature for {@link #getSystemAvailableFeatures} and android.hardware.touchscreen.multitouch.distinct

Activities (32)

com.unity3d.player.UnityPlayerActivity
com.anythink.china.activity.TransparentActivity
com.anythink.china.activity.ApkConfirmDialogActivity
com.anythink.core.activity.AnyThinkGdprAuthActivity
com.anythink.basead.ui.AdLandscapeActivity
com.anythink.basead.ui.AdPortraitActivity
com.anythink.basead.ui.AdLandscapeTranslucentActivity
com.anythink.basead.ui.AdPortraitTranslucentActivity
com.anythink.core.basead.ui.web.WebLandPageActivity
com.anythink.basead.ui.RewardExitConfirmDialogActivity
com.anythink.expressad.reward.player.ATRewardVideoActivity
com.qq.e.ads.ADActivity
com.qq.e.ads.PortraitADActivity
com.qq.e.ads.LandscapeADActivity
com.qq.e.ads.RewardvideoPortraitADActivity
com.qq.e.ads.RewardvideoLandscapeADActivity
com.qq.e.ads.DialogActivity
com.bytedance.sdk.openadsdk.stub.activity.Stub_Standard_Activity
com.bytedance.sdk.openadsdk.stub.activity.Stub_Standard_Portrait_Activity
com.bytedance.sdk.openadsdk.stub.activity.Stub_Standard_Activity_T
com.bytedance.sdk.openadsdk.stub.activity.Stub_Standard_Landscape_Activity
com.bytedance.sdk.openadsdk.stub.activity.Stub_Activity
com.bytedance.sdk.openadsdk.stub.activity.Stub_SingleTask_Activity_T
com.bytedance.sdk.openadsdk.stub.activity.Stub_SingleTask_Activity
com.ss.android.downloadlib.addownload.compliance.AppPrivacyPolicyActivity
com.ss.android.downloadlib.addownload.compliance.AppDetailInfoActivity
com.ss.android.downloadlib.activity.TTDelegateActivity
com.ss.android.downloadlib.activity.JumpKllkActivity
com.ss.android.socialbase.appdownloader.view.DownloadTaskDeleteActivity
com.ss.android.socialbase.appdownloader.view.JumpUnknownSourceActivity
com.taptap.sdk.ui.TapTapActivity
com.taptap.sdk.TapLoginHelperActivity

Services (9)

com.anythink.china.common.service.ApkDownloadService
com.qq.e.comm.DownloadService
com.ss.android.socialbase.appdownloader.DownloadHandlerService
com.ss.android.socialbase.appdownloader.RetryJobSchedulerService
com.ss.android.socialbase.downloader.downloader.IndependentProcessDownloadService
com.ss.android.socialbase.downloader.notification.DownloadNotificationService
com.ss.android.socialbase.downloader.downloader.DownloadService
com.ss.android.socialbase.downloader.impls.DownloadHandleService
com.ss.android.socialbase.downloader.downloader.SqlDownloadCacheService

Broadcast Receivers (2)

com.anythink.china.common.NotificationBroadcaseReceiver com.anythink.china.common.NotificationBroadcaseReceiver
com.ss.android.downloadlib.core.download.DownloadReceiver com.ss.android.downloadlib.core.download.DownloadReceiver

Content Providers (9)

com.anythink.china.common.ApkFileProvider
com.qq.e.comm.GDTFileProvider
com.bytedance.sdk.openadsdk.multipro.TTMultiProvider
com.bytedance.sdk.openadsdk.TTFileProvider
com.bytedance.sdk.openadsdk.stub.server.DownloaderServerManager
com.bytedance.sdk.openadsdk.stub.server.MainServerManager
com.bytedance.pangle.provider.MainProcessProviderProxy
com.bytedance.pangle.FileProvider
com.tramini.plugin.api.TraminiContentProvider

Submission Details

Submitted At 2026-03-22
First Submission 2026-03-22
Last Submission 2026-03-22
Stored Until 2026-04-21