APK Security & Privacy Score
Security scoring uses multi-engine scan signals and APK indicators. Privacy scoring uses requested permissions and network endpoint patterns.
Security
Scan-weighted
84/100
Threat scan flagged
Modern target SDK
Privacy
Permissions & network
96/100
High-risk permissions
AllowBackup enabled
Low data access
90/100
Excellent
Overall trust
Facts
Threat scan
1/76 flagged, 0 suspicious
Permissions
9 requested
Network strings
No URL strings detected
Target SDK
36
Certificate
Valid until 2052-04-30 (26 years, suspicious)
Warnings
Threat scan flagged: 1/76 scanners marked this file as malicious.
High-risk permissions detected: android.permission.REQUEST_INSTALL_PACKAGES, android.permission.SYSTEM_ALERT_WINDOW
AllowBackup is enabled.
Package Name
com.anonymous.KinoshkaTV
Version Code
1
Version Name
1.1.0
Application Name
com.anonymous.KinoshkaTV.MainApplication
Debuggable
No
Allow Backup
Yes
Min SDK
Android 24 (Nougat)
Target SDK
Android 36 (Unknown)
Supported ABIs
arm64-v8a
armeabi-v7a
x86
x86_64
Certificate & Signer
Valid From
Valid To
Serial Number
Thumbprint
Issuer: C
Issuer: CN
Issuer: DN
Issuer: L
Issuer: O
Issuer: OU
Issuer: ST
Subject: C
Subject: CN
Subject: DN
Subject: L
Subject: O
Subject: OU
Subject: ST
Security Scan
1
⚠️ Threats Detected
Detected by
1 vendor:
AhnLab-V3
(PUP/Android.Malct.518314)
Malicious
1
Suspicious
0
Harmless
0
Undetected
67
Timeout
0
Failure
0
Scan Providers
ALYac
APEX
AVG
Acronis
AhnLab-V3
PUP/Android.Malct.518314
Alibaba
Antiy-AVL
Arcabit
Avast
Avast-Mobile
Avira
Baidu
BitDefender
BitDefenderFalx
Bkav
CAT-QuickHeal
CMC
CTX
ClamAV
CrowdStrike
Cylance
Cynet
DeepInstinct
DrWeb
ESET-NOD32
Elastic
Emsisoft
F-Secure
Fortinet
GData
Google
Gridinsoft
Ikarus
Jiangmin
K7AntiVirus
K7GW
Kaspersky
Kingsoft
Lionic
Malwarebytes
MaxSecure
McAfeeD
MicroWorld-eScan
Microsoft
NANO-Antivirus
Paloalto
Panda
Rising
SUPERAntiSpyware
Sangfor
SentinelOne
Skyhigh
Sophos
Symantec
SymantecMobileInsight
TACHYON
Tencent
Trapmine
TrellixENS
TrendMicro
TrendMicro-HouseCall
Trustlook
VBA32
VIPRE
Varist
ViRobot
VirIT
Webroot
Xcitium
Yandex
Zillya
ZoneAlarm
Zoner
alibabacloud
huorong
tehtris
File Signatures
SHA-256
33283717ef5a1b471a458fd266f500c767beb4890f2eb0aaa0b68d670157d27c
MD5
352b1e2d80cc6f845048c86a064b8253
SHA-1
790db07cb9e910e864e58489fe1c014c62963c8a
SSDEEP
1572864:vNqqfoYvXk9/8Q+0BY4wcCN4PdmqMk9yMs3kazpvm:7ve8Q+0BY4wcCN4n5K3BE
TLSH
T10C18CF46B34A886AECD764B8C50B56B1AA307C484362A0DF7E06E7847D773E52F7D381
VHASH
6830112a32b53805467c660169fcdfb5
PERMHASH
8274283c8f2985f033ef63904c21c2bad764e1b9e7d08a50206ff173fdac193e
File Intelligence
Type Description
Human-friendly file type name based on multiple detection methods.
Type Extension
Most likely file extension inferred from the content.
Type Tag
Primary type tag assigned by the classifier.
Type Tags
Additional type tags that describe the file content.
Magic
File signature result from magic bytes inspection.
Magika
File type predicted by Magika (ML-based file type detection).
TrID
TrID file type guesses with probabilities.
dhash
Perceptual hash used to compare visual similarity of files.
raw md5
Raw MD5 hash of the file contents.
extensions
File extensions found inside the APK and how many of each.
file types
Detected embedded file types and their counts.
highest datetime
Latest timestamp found among files inside the archive.
lowest datetime
Earliest timestamp found among files inside the archive.
num children
Number of files contained within the archive.
type
Container type detected for the analyzed file.
uncompressed size
Estimated total size of all files after extraction.
Deep Manifest Analysis
Activity Intents (1)
com.anonymous.KinoshkaTV.MainActivity
Receiver Intents (1)
Profile installer
androidx.profileinstaller.ProfileInstallReceiver
Native Libraries (21)
libanimation-decoder-gif
libanimation-decoder-gif.so
libappmodules
libappmodules.so
libavif_android
libavif_android.so
C++ Standard Library
libc++_shared.so
libexpo-modules-core
libexpo-modules-core.so
FBJNI
libfbjni.so
libgesturehandler
libgesturehandler.so
libgifimage
libgifimage.so
libhermestooling
libhermestooling.so
libhermesvm
libhermesvm.so
libimagepipeline
libimagepipeline.so
libjsi
libjsi.so
libnative-filters
libnative-filters.so
libnative-imagetranscoder
libnative-imagetranscoder.so
libreact_codegen_rnscreens
libreact_codegen_rnscreens.so
libreact_codegen_safeareacontext
libreact_codegen_safeareacontext.so
libreactnative
libreactnative.so
libreanimated
libreanimated.so
librnscreens
librnscreens.so
libstatic-webp
libstatic-webp.so
libworklets
libworklets.so
Requested Permissions (9)
have full network access
android.permission.INTERNET
read the contents of your shared storage
android.permission.READ_EXTERNAL_STORAGE
android.permission.REQUEST_INSTALL_PACKAGES
android.permission.REQUEST_INSTALL_PACKAGES
This app can appear on top of other apps
android.permission.SYSTEM_ALERT_WINDOW
control vibration
android.permission.VIBRATE
modify or delete the contents of your shared storage
android.permission.WRITE_EXTERNAL_STORAGE
view network connections
android.permission.ACCESS_NETWORK_STATE
Dynamic receiver access
com.anonymous.KinoshkaTV.DYNAMIC_RECEIVER_NOT_EXPORTED_PERMISSION
Install Referrer service
com.google.android.finsky.permission.BIND_GET_INSTALL_REFERRER_SERVICE
Uses Features (3)
Faketouch
android.hardware.faketouch
Touchscreen
android.hardware.touchscreen
Leanback
android.software.leanback
Activities (2)
com.anonymous.KinoshkaTV.MainActivity
expo.modules.webbrowser.BrowserProxyActivity
Broadcast Receivers (1)
Profile installer
androidx.profileinstaller.ProfileInstallReceiver
Content Providers (3)
expo.modules.sharing.SharingFileProvider
expo.modules.filesystem.FileSystemFileProvider
androidx.startup.InitializationProvider
Submission Details
Submitted At
First Submission
Last Submission
Stored Until