Gustavos CoinTab icon

cointab.apk

Gustavos CoinTab

8.22 MB

Analyzed: 2026-03-12 15:13 UTC

APK Security & Privacy Score

Security scoring uses multi-engine scan signals and APK indicators. Privacy scoring uses requested permissions and network endpoint patterns.

Security Scan-weighted
50/100
Threat scan flagged
Privacy Permissions & network
95/100
High-risk permissions HTTP URLs found Low data access
66/100
Caution
Overall trust

Facts

Threat scan 6/76 flagged, 0 suspicious
Permissions 6 requested
Network strings 113 URLs (15 HTTP, 98 HTTPS)
Target SDK 29
Certificate Valid until 2051-01-05 (25 years, suspicious)

Warnings

Threat scan flagged: 6/76 scanners marked this file as malicious.
Found 15 HTTP URL strings (unencrypted).
High-risk permissions detected: android.permission.SYSTEM_ALERT_WINDOW, android.permission.QUERY_ALL_PACKAGES, android.permission.RECEIVE_BOOT_COMPLETED
Package Name com.xmacoyx.gustavocointab
Version Code 9
Version Name 1.0
Application Name com.joaomgcd.taskerm.util.TaskerApp
Debuggable No
Allow Backup No
Min SDK Android 27 (Oreo)
Target SDK Android 29 (Android 10)
Supported ABIs
Universal

Certificate & Signer

Valid From 2026-01-11 16:09:05
Valid To 2051-01-05 16:09:05
Serial Number 19badd17b0a
Thumbprint 6c41b1f5de72c38fffce01e09489d1e21eadf3b8
Issuer: C US
Issuer: CN Tasker User 942005936
Issuer: DN C:US, CN:Tasker User 942005936, L:Anon, O:Android Developers, ST:Anon, OU:Tasker Users
Issuer: L Anon
Issuer: O Android Developers
Issuer: OU Tasker Users
Issuer: ST Anon
Subject: C US
Subject: CN Tasker User 942005936
Subject: DN C:US, CN:Tasker User 942005936, L:Anon, O:Android Developers, ST:Anon, OU:Tasker Users
Subject: L Anon
Subject: O Android Developers
Subject: OU Tasker Users
Subject: ST Anon

Security Scan

6 /76
⚠️ Threats Detected
Detected by 6 vendors: AhnLab-V3 (AppCare/Android.Tasker.1209258), Avira (ANDROID/Locker.FTCH.Gen), Cynet (Malicious (score: 99))
Scanned by 76 security vendors
Last scan: 2026-03-12 15:12 UTC
Malicious
6
Suspicious
0
Harmless
0
Undetected
61
Timeout
0
Failure
0

Scan Providers

76 vendors
ALYac undetected
No result reported
Engine 2.0.0.10
APEX type-unsupported
No result reported
Engine 6.757
AVG undetected
No result reported
Engine 23.9.8494.0
Acronis undetected
No result reported
Engine 1.2.0.121
AhnLab-V3 malicious
AppCare/Android.Tasker.1209258
Engine 3.29.1.10604
Alibaba undetected
No result reported
Engine 0.3.0.5
Antiy-AVL undetected
No result reported
Engine 3.0
Arcabit undetected
No result reported
Engine 2025.0.0.23
Avast undetected
No result reported
Engine 23.9.8494.0
Avast-Mobile undetected
No result reported
Engine 260312-02
Avira malicious
ANDROID/Locker.FTCH.Gen
Engine 8.3.3.24
Baidu undetected
No result reported
Engine 1.0.0.2
BitDefender undetected
No result reported
Engine 7.2
BitDefenderFalx undetected
No result reported
Engine 2.0.936
Bkav undetected
No result reported
Engine 2.0.0.1
CAT-QuickHeal undetected
No result reported
Engine 22.00
CMC undetected
No result reported
Engine 2.4.2022.1
CTX undetected
No result reported
Engine 2024.8.29.1
ClamAV undetected
No result reported
Engine 1.5.2.0
CrowdStrike undetected
No result reported
Engine 1.0
Cylance type-unsupported
No result reported
Engine 3.0.0.0
Cynet malicious
Malicious (score: 99)
Engine 4.0.3.4
DeepInstinct type-unsupported
No result reported
Engine 5.0.0.8
DrWeb undetected
No result reported
Engine 7.0.75.2070
ESET-NOD32 undetected
No result reported
Engine 18.2.18.0
Elastic type-unsupported
No result reported
Engine 4.0.252
Emsisoft undetected
No result reported
Engine 2024.8.0.61147
F-Secure malicious
Malware.ANDROID/Locker.FTCH.Gen
Engine 18.10.1547.307
Fortinet undetected
No result reported
Engine 7.0.30.0
GData undetected
No result reported
Engine GD:27.43830AVA:64.30826
Google malicious
Detected
Engine 1773324086
Gridinsoft undetected
No result reported
Engine 1.0.241.174
Ikarus malicious
Trojan.AndroidOS.Locker
Engine 6.4.16.0
Jiangmin undetected
No result reported
Engine 16.0.100
K7AntiVirus undetected
No result reported
Engine 14.41.58857
K7GW undetected
No result reported
Engine 14.41.58859
Kaspersky undetected
No result reported
Engine 22.0.1.28
Kingsoft undetected
No result reported
Engine None
Lionic undetected
No result reported
Engine 8.16
Malwarebytes undetected
No result reported
Engine 3.1.0.211
MaxSecure undetected
No result reported
Engine 1.0.0.1
McAfeeD undetected
No result reported
Engine 1.2.0.14035
MicroWorld-eScan undetected
No result reported
Engine 14.0.409.0
Microsoft undetected
No result reported
Engine 1.1.26010.1
NANO-Antivirus undetected
No result reported
Engine 1.0.170.26895
Paloalto type-unsupported
No result reported
Engine 0.9.0.1003
Panda undetected
No result reported
Engine 4.6.4.2
Rising undetected
No result reported
Engine 25.0.0.28
SUPERAntiSpyware undetected
No result reported
Engine 5.6.0.1032
Sangfor undetected
No result reported
Engine 2.22.3.0
SentinelOne type-unsupported
No result reported
Engine 7.5.3.1
Skyhigh undetected
No result reported
Engine v2021.2.0+4045
Sophos undetected
No result reported
Engine 3.3.1.0
Symantec undetected
No result reported
Engine 1.22.0.0
SymantecMobileInsight undetected
No result reported
Engine 2.0
TACHYON undetected
No result reported
Engine 2026-03-12.02
Tencent undetected
No result reported
Engine 1.0.0.1
Trapmine type-unsupported
No result reported
Engine 4.0.10.0
TrellixENS undetected
No result reported
Engine 6.0.6.653
TrendMicro undetected
No result reported
Engine 24.550.0.1002
TrendMicro-HouseCall undetected
No result reported
Engine 24.550.0.1002
Trustlook undetected
No result reported
Engine 1.0
VBA32 undetected
No result reported
Engine 5.5.1
VIPRE undetected
No result reported
Engine 6.0.0.35
Varist undetected
No result reported
Engine 6.6.1.3
ViRobot undetected
No result reported
Engine 2014.3.20.0
VirIT undetected
No result reported
Engine 9.5.1164
Webroot undetected
No result reported
Engine 1.9.0.8
Xcitium undetected
No result reported
Engine 38478
Yandex undetected
No result reported
Engine 5.5.2.24
Zillya undetected
No result reported
Engine 2.0.0.5561
ZoneAlarm undetected
No result reported
Engine 6.23-113518857
Zoner undetected
No result reported
Engine 2.2.2.0
alibabacloud type-unsupported
No result reported
Engine 2.2.0
huorong undetected
No result reported
Engine e357881:e357881:4eba1a7:4eba1a7
tehtris type-unsupported
No result reported

File Signatures

SHA-256 a3f1eb201e5e24463c263939a8dbe65557bc9300ddcbe2c58f82f7187413eba3
MD5 507794ad75d4a3db2dc0f0601ff0b334
SHA-1 82f23d90690db860f300143bea93633b515e7c5f
SSDEEP 196608:JN9FP0vgiu1XHCUGoacp44f0zYKS+pcQn88gfXyxsmJQg:JN9FsvwXHvGoS2kd1pB4XCD
TLSH T183961235F30DA823F856DA33533A918B574999F15184F7DA7A0BE8AC7EE3AE4C115E00
VHASH aa18300532853a34282dd8179fe241b9
PERMHASH eb9bfe86282efbc102286069ce66b20e7aaa1047a06adebfd2a33e2fd29b398b

File Intelligence

Type Description Android Human-friendly file type name based on multiple detection methods.
Type Extension apk Most likely file extension inferred from the content.
Type Tag android Primary type tag assigned by the classifier.
Type Tags executable, mobile, android, apk Additional type tags that describe the file content.
Magic Zip archive data, at least v2.0 to extract, compression method=deflate File signature result from magic bytes inspection.
Magika APK File type predicted by Magika (ML-based file type detection).
TrID Android Package (28.1%), OpenOffice Extension (22.3%), Java Archive (14%), Pocket Code/Catroid Catrobat Project (11.4%), Sweet Home 3D Design (generic) (10.9%) TrID file type guesses with probabilities.
dhash 0000001e1f161600 Perceptual hash used to compare visual similarity of files.
raw md5 c72a529e43ba84ed94e97c4097d7bbea Raw MD5 hash of the file contents.
extensions xml (519), kotlin_metadata (285), png (154), properties (31), kotlin_builtins (7), dex (2), bin (1), txt (1) File extensions found inside the APK and how many of each.
file types unknown (799), PNG (150), XML (48), DEX (2), Java Bytecode (1) Detected embedded file types and their counts.
highest datetime 2026-01-12 01:09:04 UTC Latest timestamp found among files inside the archive.
lowest datetime 2026-01-12 01:09:04 UTC Earliest timestamp found among files inside the archive.
num children 3022 Number of files contained within the archive.
type APK Container type detected for the analyzed file.
uncompressed size 10 MB Estimated total size of all files after extraction.

Sandbox

Sandbox Verdicts

Zenbox android
Malicious 60% confidence MALWARE TROJAN EVADER SMSAGENT

Deep Manifest Analysis

Activity Intents (1)

net.dinglisch.android.taskerm.Kid
Actions
Main Activity Action: Start as a main entry point, does not expect to android.intent.action.MAIN
Categories
android.intent.category.LAUNCHER

Service Intents (2)

com.joaomgcd.taskerm.plugin.ServiceRequestQuery
Actions
com.twofortyfouram.locale.intent.action.REQUEST_QUERY com.twofortyfouram.locale.intent.action.REQUEST_QUERY
net.dinglisch.android.taskerm.MyAccessibilityService
Actions
android.accessibilityservice.AccessibilityService android.accessibilityservice.AccessibilityService

Receiver Intents (2)

net.dinglisch.android.taskerm.ReceiverStaticAlwaysOn
Actions
net.dinglisch.android.taskerm.WILLYUM net.dinglisch.android.taskerm.WILLYUM
net.dinglisch.android.taskerm.AWAKEY net.dinglisch.android.taskerm.AWAKEY
Boot Completed Broadcast Action: This is broadcast once, after the system has finished android.intent.action.BOOT_COMPLETED
Package Added Broadcast Action: A new application package has been installed on the android.intent.action.PACKAGE_ADDED
Package Replaced Broadcast Action: A new version of an application package has been android.intent.action.PACKAGE_REPLACED
Package Removed Broadcast Action: An existing application package has been removed from android.intent.action.PACKAGE_REMOVED
My Package Replaced Broadcast Action: A new version of your application has been installed android.intent.action.MY_PACKAGE_REPLACED
net.dinglisch.android.taskerm.ReceiverStaticInternal
Actions
Date Changed Broadcast Action: The date has changed. android.intent.action.DATE_CHANGED
Time Changed Broadcast Action: The time was set. android.intent.action.TIME_SET
Timezone Changed Broadcast Action: The timezone has changed. android.intent.action.TIMEZONE_CHANGED
net.dinglisch.android.tasker.ANDPROFTUM net.dinglisch.android.tasker.ANDPROFTUM

Requested Permissions (6)

android.permission.SCHEDULE_EXACT_ALARM Custom app or vendor permission (not publicly documented). android.permission.SCHEDULE_EXACT_ALARM
Foreground service Allows the app to run a foreground service. android.permission.FOREGROUND_SERVICE
android.permission.QUERY_ALL_PACKAGES Custom app or vendor permission (not publicly documented). android.permission.QUERY_ALL_PACKAGES
This app can appear on top of other apps This app can appear on top of other apps or other parts of the screen. This may interfere with normal app usage and change the way that other apps appear. android.permission.SYSTEM_ALERT_WINDOW
keep car screen turned on Allows the app to keep the car screen turned on. android.permission.WAKE_LOCK
run at startup Allows the app to have itself started as soon as the system has finished booting. This can make it take longer to start the tablet and allow the app to slow down the overall tablet by always running. android.permission.RECEIVE_BOOT_COMPLETED

Activities (7)

net.dinglisch.android.taskerm.Kid
net.dinglisch.android.taskerm.ProxyTransparent
net.dinglisch.android.taskerm.DummyActivity
net.dinglisch.android.taskerm.SceneActivity
net.dinglisch.android.taskerm.SceneActivityResize
com.joaomgcd.taskerm.genericaction.ActivityGenericAction
com.joaomgcd.taskerm.genericaction.ActivityGenericActionForResult

Services (7)

net.dinglisch.android.taskerm.ExecuteService
net.dinglisch.android.taskerm.MonitorService
net.dinglisch.android.taskerm.MyAccessibilityService
com.joaomgcd.taskerm.plugin.ServiceRequestQuery
com.joaomgcd.taskerm.plugin.ServicePluginFinished
com.joaomgcd.taskerm.genericaction.ServiceGenericAction
com.joaomgcd.taskerm.genericaction.ServiceGenericActionJobs

Broadcast Receivers (2)

net.dinglisch.android.taskerm.ReceiverStaticAlwaysOn net.dinglisch.android.taskerm.ReceiverStaticAlwaysOn
net.dinglisch.android.taskerm.ReceiverStaticInternal net.dinglisch.android.taskerm.ReceiverStaticInternal

Content Providers (1)

androidx.core.content.FileProvider

URL Endpoints (117)

http://Tasker.joaoapps.com/FAQ-problem.html#app http://code.google.com/p/a2dp-connect/ http://developer.android.com/reference/ http://securesettings.intangibleobject.com/ http://steelgirderdev.com/steelgirderdev/gvsettings.html http://tasker.dinglisch.net/faq-problem.html#app http://tasker.joaoapps.com/download.html http://tasker.joaoapps.com/faq-problem.html#app http://test.com http://wiki.devmil.de/tiki-index.php http://www.afterhoursdevelopers.com/applications/android/synker-android-sync-widget http://www.bing.com/bingbot.htm http://www.google.com/bot.html http://www.tacit.dk/foldersync http://zoom.dinglisch.net/ http://zoom.dinglisch.net/Zoom.apk https://accounts.google.com/o/oauth2/revoke?token= https://accounts.google.com/o/oauth2/v2/auth https://ajax.googleapis.com/ajax/libs/chrome-frame/1.0.2/CFInstall.min.js https://ajax.googleapis.com/ajax/libs/dojo/1.7.2/dojo/dojo.js

Submission Details

Submitted At 2026-03-12
First Submission 2026-03-12
Last Submission 2026-03-12
Stored Until 2026-04-11