快⁤⁢⁤手⁡视​频⁤  icon

kssp.apk

快⁤⁢⁤手⁡视​频⁤ 

24.46 MB

Analyzed: 2026-05-16 02:59 UTC

APK Security & Privacy Score

Security scoring uses multi-engine scan signals and APK indicators. Privacy scoring uses requested permissions and network endpoint patterns.

Security Scan-weighted
78/100
Threat scan flagged Modern target SDK
Privacy Permissions & network
66/100
High-risk permissions
72/100
Caution
Overall trust

Facts

Threat scan 2/75 flagged, 0 suspicious
Permissions 37 requested
Network strings 1 URLs (0 HTTP, 1 HTTPS)
Target SDK 34
Certificate Valid until 2126-04-16 (100 years, suspicious)

Warnings

Threat scan flagged: 2/75 scanners marked this file as malicious.
High-risk permissions detected: android.permission.WRITE_SETTINGS, android.permission.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS, android.permission.RECEIVE_BOOT_COMPLETED
Requests 37 permissions (review carefully).
Package Name yvlvpx.ugsylb.lzksxc
Version Code 314
Version Name 3.1.4
Application Name com.sjxusalgs.xaloue.StubApp
Debuggable No
Allow Backup No
Min SDK Android 21 (Lollipop)
Target SDK Android 34 (Android 14)
Supported ABIs
arm64-v8a

Certificate & Signer

Valid From 2026-05-10 09:08:32
Valid To 2126-04-16 09:08:32
Serial Number 9b8dc57
Thumbprint 9b411beb472b0804b7045aa273b55b95ac3c20b3
Issuer: C KP
Issuer: CN Media
Issuer: DN C:KP, CN:Media, L:Medina, O:Media, ST:Medina, OU:Development
Issuer: L Medina
Issuer: O Media
Issuer: OU Development
Issuer: ST Medina
Subject: C KP
Subject: CN Media
Subject: DN C:KP, CN:Media, L:Medina, O:Media, ST:Medina, OU:Development
Subject: L Medina
Subject: O Media
Subject: OU Development
Subject: ST Medina

Security Scan

2 /75
⚠️ Threats Detected
Detected by 2 vendors: AhnLab-V3 (Trojan/Android.SMSstealer.1220772), Ikarus (PUA.AndroidOS.Agent)
Scanned by 75 security vendors
Last scan: 2026-05-16 02:59 UTC
Malicious
2
Suspicious
0
Harmless
0
Undetected
61
Timeout
2
Failure
2

Scan Providers

75 vendors
ALYac undetected
No result reported
Engine 2.0.0.10
APEX type-unsupported
No result reported
Engine 6.778
AVG undetected
No result reported
Engine 23.9.8494.0
Acronis undetected
No result reported
Engine 1.2.0.121
AhnLab-V3 malicious
Trojan/Android.SMSstealer.1220772
Engine 3.30.0.10666
Alibaba undetected
No result reported
Engine 0.3.0.5
Antiy-AVL undetected
No result reported
Engine 3.0
Arcabit undetected
No result reported
Engine 2025.0.0.23
Avast undetected
No result reported
Engine 23.9.8494.0
Avast-Mobile undetected
No result reported
Engine 260515-00
Avira undetected
No result reported
Engine 8.3.3.24
BitDefender undetected
No result reported
Engine 7.2
BitDefenderFalx undetected
No result reported
Engine 2.0.936
Bkav failure
No result reported
Engine 8.2.40(8338)
CAT-QuickHeal undetected
No result reported
Engine 22.00
CMC undetected
No result reported
Engine 2.4.2022.1
CTX undetected
No result reported
Engine 2024.8.29.1
ClamAV timeout
No result reported
Engine 1.5.2.0
CrowdStrike undetected
No result reported
Engine 1.0
Cylance type-unsupported
No result reported
Engine 3.0.0.0
Cynet type-unsupported
No result reported
Engine 4.0.3.4
DeepInstinct type-unsupported
No result reported
Engine 5.0.0.8
DrWeb undetected
No result reported
Engine 7.0.75.2070
ESET-NOD32 undetected
No result reported
Engine 18.2.18.0
Elastic undetected
No result reported
Engine 4.0.261
Emsisoft undetected
No result reported
Engine 2024.8.0.61147
F-Secure undetected
No result reported
Engine 18.10.1547.307
Fortinet undetected
No result reported
Engine 7.0.30.0
GData undetected
No result reported
Engine GD:27.44559AVA:64.31251
Google undetected
No result reported
Engine 1778896859
Gridinsoft undetected
No result reported
Engine 1.0.245.174
Ikarus malicious
PUA.AndroidOS.Agent
Engine 6.4.16.0
Jiangmin undetected
No result reported
Engine 16.0.100
K7AntiVirus undetected
No result reported
Engine 14.52.59521
K7GW undetected
No result reported
Engine 14.52.59521
Kaspersky undetected
No result reported
Engine 22.0.1.28
Kingsoft undetected
No result reported
Engine None
Lionic undetected
No result reported
Engine 8.16
Malwarebytes undetected
No result reported
Engine 3.1.0.235
MaxSecure timeout
No result reported
Engine 1.0.0.1
McAfeeD undetected
No result reported
Engine 1.2.0.14532
MicroWorld-eScan undetected
No result reported
Engine 14.0.409.0
Microsoft undetected
No result reported
Engine 1.1.26030.3008
NANO-Antivirus undetected
No result reported
Engine 1.0.170.26895
Paloalto type-unsupported
No result reported
Engine 0.9.0.1003
Panda undetected
No result reported
Engine 4.6.4.2
Rising undetected
No result reported
Engine 25.0.0.28
SUPERAntiSpyware undetected
No result reported
Engine 5.6.0.1032
Sangfor undetected
No result reported
Engine 2.22.3.0
SentinelOne undetected
No result reported
Engine 7.6.2.19
Skyhigh undetected
No result reported
Engine v2021.2.0+4045
Sophos undetected
No result reported
Engine 3.5.1.0
Symantec failure
No result reported
Engine 1.22.0.0
SymantecMobileInsight undetected
No result reported
Engine 2.0
TACHYON undetected
No result reported
Engine 2026-05-16.01
Tencent undetected
No result reported
Engine 1.0.0.1
Trapmine type-unsupported
No result reported
Engine 4.0.12.0
TrellixENS undetected
No result reported
Engine 6.0.6.653
TrendMicro undetected
No result reported
Engine 24.550.0.1002
TrendMicro-HouseCall undetected
No result reported
Engine 24.550.0.1002
Trustlook undetected
No result reported
Engine 1.0
VBA32 undetected
No result reported
Engine 5.6.1
VIPRE undetected
No result reported
Engine 6.0.0.35
Varist undetected
No result reported
Engine 6.6.1.3
ViRobot undetected
No result reported
Engine 2014.3.20.0
VirIT undetected
No result reported
Engine 9.5.1208
Webroot undetected
No result reported
Engine 1.9.0.8
Xcitium undetected
No result reported
Engine 38649
Yandex undetected
No result reported
Engine 5.5.2.24
Zillya undetected
No result reported
Engine 2.0.0.5603
ZoneAlarm undetected
No result reported
Engine 6.24-114820949
Zoner undetected
No result reported
Engine 2.2.2.0
alibabacloud type-unsupported
No result reported
Engine 2.2.0
huorong undetected
No result reported
Engine f16fe5e:f16fe5e:d24df83:d24df83
tehtris type-unsupported
No result reported

File Signatures

SHA-256 737d629c952dc702e7be03036ce9fe9f24326f485621af6da8eecb23d2d0843c
MD5 2a0d15ba62300c5bd629f84caa7697dc
SHA-1 60c63d39a8f157c2421cf3677bcf23e7e8ee0f7e
SSDEEP 786432:ViMqVwCNnkHXB8DdLdG1JFz3Z98If+eEgSfFj/:ViMkwYn2XB8pLuzJuTgSFj/
TLSH T1A0473322EB84DA1ED4B3C637DB714CB368021C69979BD217AA9FB0384B7F5D08449BC5
VHASH a612733ce6121bb1ecda8ca69c4bf03e
PERMHASH 26047d54d565be257222f97e66b58e6885ee072df2c46d529651b80e64cbeba5

File Intelligence

Type Description Android Human-friendly file type name based on multiple detection methods.
Type Extension apk Most likely file extension inferred from the content.
Type Tag android Primary type tag assigned by the classifier.
Type Tags executable, mobile, android, apk Additional type tags that describe the file content.
Magic Zip archive data, at least v1.0 to extract, compression method=store File signature result from magic bytes inspection.
Magika APK File type predicted by Magika (ML-based file type detection).
TrID SPSS Extension (35.2%), Android Package (31.7%), Java Archive (15.8%), Sweet Home 3D Design (generic) (12.3%), ZIP compressed archive (4.7%) TrID file type guesses with probabilities.
dhash 0000001a1e091410 Perceptual hash used to compare visual similarity of files.
raw md5 3696794399119d334efd37d3e48c7ecb Raw MD5 hash of the file contents.
extensions xml (361), png (328), version (42), so (20), js (17), kotlin_builtins (8), json (6), gif (4), html (4), dat (3), gz (2), ttf (2), andserver (1), arsc (1), AutoDiscoverable (1), bin (1), BuiltInsLoader (1), CoroutineExceptionHandler (1), css (1), dex (1), ExternalOverridabilityCondition (1), MainDispatcherFactory (1), MessageBodyReader (1), MessageBodyWriter (1), MetadataExtensions (1), MF (1), ogg (1), prof (1), profm (1), properties (1), Providers (1), RSA (1), SF (1), textproto (1) File extensions found inside the APK and how many of each.
file types XML (359), PNG (328), unknown (99), ELF (20), GIF (4), HTML (4), JSON (2), DEX (1), Java Bytecode (1), JavaScript (1), OGG (1) Detected embedded file types and their counts.
highest datetime 2026-05-10 02:08:54 UTC Latest timestamp found among files inside the archive.
lowest datetime 2026-05-10 02:08:46 UTC Earliest timestamp found among files inside the archive.
num children 820 Number of files contained within the archive.
type APK Container type detected for the analyzed file.
uncompressed size 57 MB Estimated total size of all files after extraction.

Sandbox

Sandbox Verdicts

Zenbox android
Harmless 94% confidence CLEAN

Deep Manifest Analysis

Activity Intents (1)

io.dcloud.PandoraEntry
Actions
Main Activity Action: Start as a main entry point, does not expect to android.intent.action.MAIN
Categories
android.intent.category.LAUNCHER

Service Intents (1)

com.blankj.utilcode.util.MessengerUtils$ServerService
Actions
yvlvpx.ugsylb.lzksxc.messenger yvlvpx.ugsylb.lzksxc.messenger

Receiver Intents (1)

Profile installer Installs performance profiles to speed up app startup and hot paths. androidx.profileinstaller.ProfileInstallReceiver
Actions
Install performance profile Installs a profile that helps optimize app performance. androidx.profileinstaller.action.INSTALL_PROFILE
Skip profile install Skips profile installation for this build. androidx.profileinstaller.action.SKIP_FILE
Save performance profile Saves a profile generated during app usage. androidx.profileinstaller.action.SAVE_PROFILE
Benchmark operation Runs a profile installer benchmark operation. androidx.profileinstaller.action.BENCHMARK_OPERATION

Native Libraries (16)

libCloudClinkAPI libCloudClinkAPI.so
Breakpad Crash Reporter Crash reporting library that captures diagnostic minidumps. libbreakpad-core.so
libdcblur libdcblur.so
libgifimage libgifimage.so
libimagepipeline libimagepipeline.so
libkiwi libkiwi.so
liblamemp3 liblamemp3.so
libnative-filters libnative-filters.so
libnative-imagetranscoder libnative-imagetranscoder.so
libpl_droidsonroids_gif libpl_droidsonroids_gif.so
libsecsdk libsecsdk.so
libuts-runtime libuts-runtime.so
libweexcore libweexcore.so
libweexjsb libweexjsb.so
libweexjss libweexjss.so
libweexjst libweexjst.so

Requested Permissions (37)

take pictures and videos This app can take pictures and record videos using the camera while the app is in use. android.permission.CAMERA
control vibration Allows the app to control the vibrator. android.permission.VIBRATE
Flashlight android.permission.FLASHLIGHT
record audio android.permission.RECORD_AUDIO
change your audio settings Allows the app to modify global audio settings such as volume and which speaker is used for output. android.permission.MODIFY_AUDIO_SETTINGS
change network connectivity Allows the app to change the state of network connectivity. android.permission.CHANGE_NETWORK_STATE
Mount Unmount Filesystems android.permission.MOUNT_UNMOUNT_FILESYSTEMS
Read Logs android.permission.READ_LOGS
view Wi-Fi connections Allows the app to view information about Wi-Fi networking, such as whether Wi-Fi is enabled and name of connected Wi-Fi devices. android.permission.ACCESS_WIFI_STATE
view network connections Allows the app to view information about network connections such as which networks exist and are connected. android.permission.ACCESS_NETWORK_STATE
find accounts on the device Allows the app to get the list of accounts known by the tablet. This may include any accounts created by applications you have installed. android.permission.GET_ACCOUNTS
read phone status and identity Allows the app to access the phone features of the device. This permission allows the app to determine the phone number and device IDs, whether a call is active, and the remote number connected by a call. android.permission.READ_PHONE_STATE
connect and disconnect from Wi-Fi Allows the app to connect to and disconnect from Wi-Fi access points and to make changes to device configuration for Wi-Fi networks. android.permission.CHANGE_WIFI_STATE
keep car screen turned on Allows the app to keep the car screen turned on. android.permission.WAKE_LOCK
modify system settings Allows the app to modify the system\'s settings data. Malicious apps may corrupt your system\'s configuration. android.permission.WRITE_SETTINGS
android.permission.START_ACTIVITIES Custom app or vendor permission (not publicly documented). android.permission.START_ACTIVITIES
Foreground service Allows the app to run a foreground service. android.permission.FOREGROUND_SERVICE
run at startup Allows the app to have itself started as soon as the system has finished booting. This can make it take longer to start the tablet and allow the app to slow down the overall tablet by always running. android.permission.RECEIVE_BOOT_COMPLETED
retrieve running apps Allows the app to retrieve information about currently and recently running tasks. This may allow the app to discover information about which applications are used on the device. android.permission.GET_TASKS
android.permission.SCHEDULE_EXACT_ALARM Custom app or vendor permission (not publicly documented). android.permission.SCHEDULE_EXACT_ALARM
android.permission.SET_ALARM Custom app or vendor permission (not publicly documented). android.permission.SET_ALARM
android.permission.USE_EXACT_ALARM Custom app or vendor permission (not publicly documented). android.permission.USE_EXACT_ALARM
android.permission.POST_NOTIFICATIONS Custom app or vendor permission (not publicly documented). android.permission.POST_NOTIFICATIONS
android.permission.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS Custom app or vendor permission (not publicly documented). android.permission.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS
android.permission.FOREGROUND_SERVICE_MEDIA_PLAYBACK Custom app or vendor permission (not publicly documented). android.permission.FOREGROUND_SERVICE_MEDIA_PLAYBACK
modify or delete the contents of your shared storage Allows the app to write the contents of your shared storage. android.permission.WRITE_EXTERNAL_STORAGE
android.permission.READ_MEDIA_IMAGES Custom app or vendor permission (not publicly documented). android.permission.READ_MEDIA_IMAGES
android.permission.READ_MEDIA_VIDEO Custom app or vendor permission (not publicly documented). android.permission.READ_MEDIA_VIDEO
android.permission.READ_MEDIA_VISUAL_USER_SELECTED Custom app or vendor permission (not publicly documented). android.permission.READ_MEDIA_VISUAL_USER_SELECTED
have full network access Allows the app to create network sockets and use custom network protocols. The browser and other applications provide means to send data to the internet, so this permission is not required to send data to the internet. android.permission.INTERNET
App badge update Allows the app to update the launcher icon badge count on Huawei launchers. com.huawei.android.launcher.permission.CHANGE_BADGE
App badge update Allows the app to update the launcher icon badge count on launcher launchers. com.vivo.notification.permission.BADGE_ICON
read the contents of your shared storage Allows the app to read the contents of your shared storage. android.permission.READ_EXTERNAL_STORAGE
com.asus.msa.SupplementaryDID.ACCESS
freemme.permission.msa Custom app or vendor permission (not publicly documented). freemme.permission.msa
Read Privileged Phone State android.permission.READ_PRIVILEGED_PHONE_STATE
Dynamic receiver access Internal app permission used to protect dynamic broadcast receivers. yvlvpx.ugsylb.lzksxc.DYNAMIC_RECEIVER_NOT_EXPORTED_PERMISSION

Uses Features (2)

Camera Feature for {@link #getSystemAvailableFeatures} and android.hardware.camera
Camera Autofocus Feature for {@link #getSystemAvailableFeatures} and android.hardware.camera.autofocus

Activities (7)

io.dcloud.PandoraEntry
io.dcloud.PandoraEntryActivity
io.dcloud.feature.gallery.imageedit.IMGEditActivity
io.dcloud.sdk.activity.WebViewActivity
io.dcloud.uniplugin.NativePageActivity
com.blankj.utilcode.util.UtilsTransActivity4MainProcess
com.blankj.utilcode.util.UtilsTransActivity

Services (2)

io.dcloud.sdk.base.service.DownloadService
com.blankj.utilcode.util.MessengerUtils$ServerService

Broadcast Receivers (2)

com.taobao.weex.WXGlobalEventReceiver com.taobao.weex.WXGlobalEventReceiver
Profile installer Installs performance profiles to speed up app startup and hot paths. androidx.profileinstaller.ProfileInstallReceiver

Content Providers (4)

io.dcloud.common.util.DCloud_FileProvider
io.dcloud.sdk.base.service.provider.DCloudAdFileProvider
com.blankj.utilcode.util.UtilsFileProvider
androidx.startup.InitializationProvider

Submission Details

Submitted At 2026-05-16
First Submission 2026-05-16
Last Submission 2026-05-16
Stored Until 2026-06-15