KinoshkaTV icon

kinoshkatv-v1.1.0.apk

KinoshkaTV

86.80 MB

Analyzed: 2026-04-07 06:31 UTC

APK Security & Privacy Score

Security scoring uses multi-engine scan signals and APK indicators. Privacy scoring uses requested permissions and network endpoint patterns.

Security Scan-weighted
84/100
Threat scan flagged Modern target SDK
Privacy Permissions & network
96/100
High-risk permissions AllowBackup enabled Low data access
90/100
Excellent
Overall trust

Facts

Threat scan 1/76 flagged, 0 suspicious
Permissions 9 requested
Network strings No URL strings detected
Target SDK 36
Certificate Valid until 2052-04-30 (26 years, suspicious)

Warnings

Threat scan flagged: 1/76 scanners marked this file as malicious.
High-risk permissions detected: android.permission.REQUEST_INSTALL_PACKAGES, android.permission.SYSTEM_ALERT_WINDOW
AllowBackup is enabled.
Package Name com.anonymous.KinoshkaTV
Version Code 1
Version Name 1.1.0
Application Name com.anonymous.KinoshkaTV.MainApplication
Debuggable No
Allow Backup Yes
Min SDK Android 24 (Nougat)
Target SDK Android 36 (Unknown)
Supported ABIs
arm64-v8a armeabi-v7a x86 x86_64

Certificate & Signer

Valid From 2013-12-31 22:35:04
Valid To 2052-04-30 22:35:04
Serial Number 232eae62
Thumbprint 5e8f16062ea3cd2c4a0d547876baa6f38cabf625
Issuer: C US
Issuer: CN Android Debug
Issuer: DN C:US, CN:Android Debug, L:Unknown, O:Unknown, ST:Unknown, OU:Android
Issuer: L Unknown
Issuer: O Unknown
Issuer: OU Android
Issuer: ST Unknown
Subject: C US
Subject: CN Android Debug
Subject: DN C:US, CN:Android Debug, L:Unknown, O:Unknown, ST:Unknown, OU:Android
Subject: L Unknown
Subject: O Unknown
Subject: OU Android
Subject: ST Unknown

Security Scan

1 /76
⚠️ Threats Detected
Detected by 1 vendor: AhnLab-V3 (PUP/Android.Malct.518314)
Scanned by 76 security vendors
Last scan: 2026-04-07 06:30 UTC
Malicious
1
Suspicious
0
Harmless
0
Undetected
67
Timeout
0
Failure
0

Scan Providers

76 vendors
ALYac undetected
No result reported
Engine 2.0.0.10
APEX type-unsupported
No result reported
Engine 6.766
AVG undetected
No result reported
Engine 23.9.8494.0
Acronis undetected
No result reported
Engine 1.2.0.121
AhnLab-V3 malicious
PUP/Android.Malct.518314
Engine 3.29.3.10609
Alibaba undetected
No result reported
Engine 0.3.0.5
Antiy-AVL undetected
No result reported
Engine 3.0
Arcabit undetected
No result reported
Engine 2025.0.0.23
Avast undetected
No result reported
Engine 23.9.8494.0
Avast-Mobile undetected
No result reported
Engine 260406-00
Avira undetected
No result reported
Engine 8.3.3.24
Baidu undetected
No result reported
Engine 1.0.0.2
BitDefender undetected
No result reported
Engine 7.2
BitDefenderFalx undetected
No result reported
Engine 2.0.936
Bkav undetected
No result reported
Engine 2.0.0.1
CAT-QuickHeal undetected
No result reported
Engine 22.00
CMC undetected
No result reported
Engine 2.4.2022.1
CTX undetected
No result reported
Engine 2024.8.29.1
ClamAV undetected
No result reported
Engine 1.5.2.0
CrowdStrike undetected
No result reported
Engine 1.0
Cylance type-unsupported
No result reported
Engine 3.0.0.0
Cynet type-unsupported
No result reported
Engine 4.0.3.4
DeepInstinct type-unsupported
No result reported
Engine 5.0.0.8
DrWeb undetected
No result reported
Engine 7.0.75.2070
ESET-NOD32 undetected
No result reported
Engine 18.2.18.0
Elastic undetected
No result reported
Engine 4.0.255
Emsisoft undetected
No result reported
Engine 2024.8.0.61147
F-Secure undetected
No result reported
Engine 18.10.1547.307
Fortinet undetected
No result reported
Engine 7.0.30.0
GData undetected
No result reported
Engine GD:27.44135AVA:64.30982
Google undetected
No result reported
Engine 1775538033
Gridinsoft undetected
No result reported
Engine 1.0.242.174
Ikarus undetected
No result reported
Engine 6.4.16.0
Jiangmin undetected
No result reported
Engine 16.0.100
K7AntiVirus undetected
No result reported
Engine 14.45.59115
K7GW undetected
No result reported
Engine 14.45.59115
Kaspersky undetected
No result reported
Engine 22.0.1.28
Kingsoft undetected
No result reported
Engine None
Lionic undetected
No result reported
Engine 8.16
Malwarebytes undetected
No result reported
Engine 3.1.0.214
MaxSecure undetected
No result reported
Engine 1.0.0.1
McAfeeD undetected
No result reported
Engine 1.2.0.14370
MicroWorld-eScan undetected
No result reported
Engine 14.0.409.0
Microsoft undetected
No result reported
Engine 1.1.26020.3
NANO-Antivirus undetected
No result reported
Engine 1.0.170.26895
Paloalto type-unsupported
No result reported
Engine 0.9.0.1003
Panda undetected
No result reported
Engine 4.6.4.2
Rising undetected
No result reported
Engine 25.0.0.28
SUPERAntiSpyware undetected
No result reported
Engine 5.6.0.1032
Sangfor undetected
No result reported
Engine 2.22.3.0
SentinelOne undetected
No result reported
Engine 7.6.2.19
Skyhigh undetected
No result reported
Engine v2021.2.0+4045
Sophos undetected
No result reported
Engine 3.4.1.0
Symantec undetected
No result reported
Engine 1.22.0.0
SymantecMobileInsight undetected
No result reported
Engine 2.0
TACHYON undetected
No result reported
Engine 2026-04-07.01
Tencent undetected
No result reported
Engine 1.0.0.1
Trapmine type-unsupported
No result reported
Engine 4.0.11.0
TrellixENS undetected
No result reported
Engine 6.0.6.653
TrendMicro undetected
No result reported
Engine 24.550.0.1002
TrendMicro-HouseCall undetected
No result reported
Engine 24.550.0.1002
Trustlook undetected
No result reported
Engine 1.0
VBA32 undetected
No result reported
Engine 5.5.1
VIPRE undetected
No result reported
Engine 6.0.0.35
Varist undetected
No result reported
Engine 6.6.1.3
ViRobot undetected
No result reported
Engine 2014.3.20.0
VirIT undetected
No result reported
Engine 9.5.1180
Webroot undetected
No result reported
Engine 1.9.0.8
Xcitium undetected
No result reported
Engine 38547
Yandex undetected
No result reported
Engine 5.5.2.24
Zillya undetected
No result reported
Engine 2.0.0.5576
ZoneAlarm undetected
No result reported
Engine 6.23-113519421
Zoner undetected
No result reported
Engine 2.2.2.0
alibabacloud type-unsupported
No result reported
Engine 2.2.0
huorong undetected
No result reported
Engine 7139403:7139403:fd748a7:fd748a7
tehtris type-unsupported
No result reported

File Signatures

SHA-256 33283717ef5a1b471a458fd266f500c767beb4890f2eb0aaa0b68d670157d27c
MD5 352b1e2d80cc6f845048c86a064b8253
SHA-1 790db07cb9e910e864e58489fe1c014c62963c8a
SSDEEP 1572864:vNqqfoYvXk9/8Q+0BY4wcCN4PdmqMk9yMs3kazpvm:7ve8Q+0BY4wcCN4n5K3BE
TLSH T10C18CF46B34A886AECD764B8C50B56B1AA307C484362A0DF7E06E7847D773E52F7D381
VHASH 6830112a32b53805467c660169fcdfb5
PERMHASH 8274283c8f2985f033ef63904c21c2bad764e1b9e7d08a50206ff173fdac193e

File Intelligence

Type Description Android Human-friendly file type name based on multiple detection methods.
Type Extension apk Most likely file extension inferred from the content.
Type Tag android Primary type tag assigned by the classifier.
Type Tags executable, mobile, android, apk Additional type tags that describe the file content.
Magic Zip archive data, at least v0.0 to extract, compression method=deflate File signature result from magic bytes inspection.
Magika APK File type predicted by Magika (ML-based file type detection).
TrID Android Package (50%), VYM Mind Map (23.1%), Sweet Home 3D Design (generic) (19.4%), ZIP compressed archive (7.4%) TrID file type guesses with probabilities.
dhash 00001c1e1c1e1108 Perceptual hash used to compare visual similarity of files.
raw md5 df6e12e899a80eb25a446a4b494538de Raw MD5 hash of the file contents.
extensions xml (551), txt (129), png (116), so (84), version (62), ttf (15), webp (15), kotlin_builtins (8), dex (3), otf (3), bin (1), BuiltInsLoader (1), bundle (1), config (1), CoroutineExceptionHandler (1), ExternalOverridabilityCondition (1), gz (1), json (1), MainDispatcherFactory (1), prof (1), profm (1), properties (1), textproto (1) File extensions found inside the APK and how many of each.
file types XML (551), unknown (232), PNG (131), ELF (84), Java Bytecode (1), JSON (1) Detected embedded file types and their counts.
highest datetime 1981-01-01 01:01:02 UTC Latest timestamp found among files inside the archive.
lowest datetime 1981-01-01 01:01:02 UTC Earliest timestamp found among files inside the archive.
num children 1308 Number of files contained within the archive.
type APK Container type detected for the analyzed file.
uncompressed size 100 MB Estimated total size of all files after extraction.

Deep Manifest Analysis

Activity Intents (1)

com.anonymous.KinoshkaTV.MainActivity
Actions
Main Activity Action: Start as a main entry point, does not expect to android.intent.action.MAIN
View Activity Action: Display the data to the user. android.intent.action.VIEW
Categories
android.intent.category.LAUNCHER android.intent.category.LEANBACK_LAUNCHER android.intent.category.DEFAULT android.intent.category.BROWSABLE

Receiver Intents (1)

Profile installer Installs performance profiles to speed up app startup and hot paths. androidx.profileinstaller.ProfileInstallReceiver
Actions
Install performance profile Installs a profile that helps optimize app performance. androidx.profileinstaller.action.INSTALL_PROFILE
Skip profile install Skips profile installation for this build. androidx.profileinstaller.action.SKIP_FILE
Save performance profile Saves a profile generated during app usage. androidx.profileinstaller.action.SAVE_PROFILE
Benchmark operation Runs a profile installer benchmark operation. androidx.profileinstaller.action.BENCHMARK_OPERATION

Native Libraries (21)

libanimation-decoder-gif libanimation-decoder-gif.so
libappmodules libappmodules.so
libavif_android libavif_android.so
C++ Standard Library Android NDK C++ runtime used by native code. libc++_shared.so
libexpo-modules-core libexpo-modules-core.so
FBJNI JNI helper library for bridging Java and C++ code. libfbjni.so
libgesturehandler libgesturehandler.so
libgifimage libgifimage.so
libhermestooling libhermestooling.so
libhermesvm libhermesvm.so
libimagepipeline libimagepipeline.so
libjsi libjsi.so
libnative-filters libnative-filters.so
libnative-imagetranscoder libnative-imagetranscoder.so
libreact_codegen_rnscreens libreact_codegen_rnscreens.so
libreact_codegen_safeareacontext libreact_codegen_safeareacontext.so
libreactnative libreactnative.so
libreanimated libreanimated.so
librnscreens librnscreens.so
libstatic-webp libstatic-webp.so
libworklets libworklets.so

Requested Permissions (9)

have full network access Allows the app to create network sockets and use custom network protocols. The browser and other applications provide means to send data to the internet, so this permission is not required to send data to the internet. android.permission.INTERNET
read the contents of your shared storage Allows the app to read the contents of your shared storage. android.permission.READ_EXTERNAL_STORAGE
android.permission.REQUEST_INSTALL_PACKAGES Custom app or vendor permission (not publicly documented). android.permission.REQUEST_INSTALL_PACKAGES
This app can appear on top of other apps This app can appear on top of other apps or other parts of the screen. This may interfere with normal app usage and change the way that other apps appear. android.permission.SYSTEM_ALERT_WINDOW
control vibration Allows the app to control the vibrator. android.permission.VIBRATE
modify or delete the contents of your shared storage Allows the app to write the contents of your shared storage. android.permission.WRITE_EXTERNAL_STORAGE
view network connections Allows the app to view information about network connections such as which networks exist and are connected. android.permission.ACCESS_NETWORK_STATE
Dynamic receiver access Internal app permission used to protect dynamic broadcast receivers. com.anonymous.KinoshkaTV.DYNAMIC_RECEIVER_NOT_EXPORTED_PERMISSION
Install Referrer service Allows Google Play to bind to the app's Install Referrer service for install attribution. com.google.android.finsky.permission.BIND_GET_INSTALL_REFERRER_SERVICE

Uses Features (3)

Faketouch Feature for {@link #getSystemAvailableFeatures} and android.hardware.faketouch
Touchscreen Feature for {@link #getSystemAvailableFeatures} and android.hardware.touchscreen
Leanback Feature for {@link #getSystemAvailableFeatures} and android.software.leanback

Activities (2)

com.anonymous.KinoshkaTV.MainActivity
expo.modules.webbrowser.BrowserProxyActivity

Broadcast Receivers (1)

Profile installer Installs performance profiles to speed up app startup and hot paths. androidx.profileinstaller.ProfileInstallReceiver

Content Providers (3)

expo.modules.sharing.SharingFileProvider
expo.modules.filesystem.FileSystemFileProvider
androidx.startup.InitializationProvider

Submission Details

Submitted At 2026-04-07
First Submission 2026-04-07
Last Submission 2026-04-07
Stored Until 2026-05-07