PALVISION icon

Document_from_JUST_MOVE_ON.....apk

PALVISION

80.08 MB

Analyzed: 2026-04-25 18:57 UTC

APK Security & Privacy Score

Security scoring uses multi-engine scan signals and APK indicators. Privacy scoring uses requested permissions and network endpoint patterns.

Security Scan-weighted
67/100
Threat scan flagged
Privacy Permissions & network
95/100
High-risk permissions HTTP URLs found AllowBackup enabled Low data access
79/100
Good
Overall trust

Facts

Threat scan 4/75 flagged, 0 suspicious
Permissions 5 requested
Network strings 11 URLs (4 HTTP, 7 HTTPS)
Target SDK 29
Certificate Valid until 2044-03-10 (18 years, suspicious)

Warnings

Threat scan flagged: 4/75 scanners marked this file as malicious.
Found 4 HTTP URL strings (unencrypted).
High-risk permissions detected: android.permission.RECEIVE_BOOT_COMPLETED
AllowBackup is enabled.
Package Name com.mbm_soft.doomsmartervi2
Version Code 28
Version Name 3.8
Application Name com.mbm_soft.doomsmartervi2.QuickPlayerApp
Debuggable No
Allow Backup Yes
Min SDK Android 21 (Lollipop)
Target SDK Android 29 (Android 10)
Supported ABIs
arm64-v8a armeabi-v7a x86 x86_64

Certificate & Signer

Valid From 2016-10-23 20:10:05
Valid To 2044-03-10 20:10:05
Serial Number 56c1a15
Thumbprint 5d08264b44e0e53fbccc70b4f016474cc6c5ab5c
Issuer: C US
Issuer: CN Android Debug
Issuer: DN C:US, CN:Android Debug, L:US, O:US, ST:US, OU:Android
Issuer: L US
Issuer: O US
Issuer: OU Android
Issuer: ST US
Subject: C US
Subject: CN Android Debug
Subject: DN C:US, CN:Android Debug, L:US, O:US, ST:US, OU:Android
Subject: L US
Subject: O US
Subject: OU Android
Subject: ST US

Security Scan

4 /75
⚠️ Threats Detected
Detected by 4 vendors: AhnLab-V3 (PUP/Android.Malct.1190475), Google (Detected), Ikarus (Trojan.AndroidOS.Hiddad)
Scanned by 75 security vendors
Last scan: 2026-04-25 18:57 UTC
Malicious
4
Suspicious
0
Harmless
0
Undetected
61
Timeout
1
Failure
1

Scan Providers

75 vendors
ALYac undetected
No result reported
Engine 2.0.0.10
APEX type-unsupported
No result reported
Engine 6.773
AVG undetected
No result reported
Engine 23.9.8494.0
Acronis undetected
No result reported
Engine 1.2.0.121
AhnLab-V3 malicious
PUP/Android.Malct.1190475
Engine 3.30.0.10666
Alibaba undetected
No result reported
Engine 0.3.0.5
Antiy-AVL undetected
No result reported
Engine 3.0
Arcabit undetected
No result reported
Engine 2025.0.0.23
Avast undetected
No result reported
Engine 23.9.8494.0
Avast-Mobile undetected
No result reported
Engine 260425-02
Avira undetected
No result reported
Engine 8.3.3.24
BitDefender undetected
No result reported
Engine 7.2
BitDefenderFalx undetected
No result reported
Engine 2.0.936
Bkav undetected
No result reported
Engine 2.0.0.1
CAT-QuickHeal undetected
No result reported
Engine 22.00
CMC undetected
No result reported
Engine 2.4.2022.1
CTX undetected
No result reported
Engine 2024.8.29.1
ClamAV undetected
No result reported
Engine 1.5.2.0
CrowdStrike undetected
No result reported
Engine 1.0
Cylance type-unsupported
No result reported
Engine 3.0.0.0
Cynet type-unsupported
No result reported
Engine 4.0.3.4
DeepInstinct type-unsupported
No result reported
Engine 5.0.0.8
DrWeb undetected
No result reported
Engine 7.0.75.2070
ESET-NOD32 undetected
No result reported
Engine 18.2.18.0
Elastic undetected
No result reported
Engine 4.0.257
Emsisoft undetected
No result reported
Engine 2024.8.0.61147
F-Secure undetected
No result reported
Engine 18.10.1547.307
Fortinet undetected
No result reported
Engine 7.0.30.0
GData undetected
No result reported
Engine GD:27.44320AVA:64.31116
Google malicious
Detected
Engine 1777136466
Gridinsoft undetected
No result reported
Engine 1.0.244.174
Ikarus malicious
Trojan.AndroidOS.Hiddad
Engine 6.4.16.0
Jiangmin undetected
No result reported
Engine 16.0.100
K7AntiVirus undetected
No result reported
Engine 14.48.59312
K7GW malicious
Trojan ( 0059c2081 )
Engine 14.48.59311
Kaspersky undetected
No result reported
Engine 22.0.1.28
Kingsoft undetected
No result reported
Engine None
Lionic undetected
No result reported
Engine 8.16
Malwarebytes undetected
No result reported
Engine 3.1.0.231
MaxSecure undetected
No result reported
Engine 1.0.0.1
McAfeeD undetected
No result reported
Engine 1.2.0.14532
MicroWorld-eScan undetected
No result reported
Engine 14.0.409.0
Microsoft undetected
No result reported
Engine 1.1.26030.3008
NANO-Antivirus undetected
No result reported
Engine 1.0.170.26895
Paloalto type-unsupported
No result reported
Engine 0.9.0.1003
Panda undetected
No result reported
Engine 4.6.4.2
Rising undetected
No result reported
Engine 25.0.0.28
SUPERAntiSpyware undetected
No result reported
Engine 5.6.0.1032
Sangfor undetected
No result reported
Engine 2.22.3.0
SentinelOne undetected
No result reported
Engine 7.6.2.19
Skyhigh timeout
No result reported
Sophos undetected
No result reported
Engine 3.4.1.0
Symantec undetected
No result reported
Engine 1.22.0.0
SymantecMobileInsight undetected
No result reported
Engine 2.0
TACHYON undetected
No result reported
Engine 2026-04-23.02
Tencent undetected
No result reported
Engine 1.0.0.1
Trapmine type-unsupported
No result reported
Engine 4.0.11.0
TrellixENS undetected
No result reported
Engine 6.0.6.653
TrendMicro undetected
No result reported
Engine 24.550.0.1002
TrendMicro-HouseCall undetected
No result reported
Engine 24.550.0.1002
Trustlook undetected
No result reported
Engine 1.0
VBA32 undetected
No result reported
Engine 5.6.0
VIPRE undetected
No result reported
Engine 6.0.0.35
Varist undetected
No result reported
Engine 6.6.1.3
ViRobot undetected
No result reported
Engine 2014.3.20.0
VirIT undetected
No result reported
Engine 9.5.1194
Webroot undetected
No result reported
Engine 1.9.0.8
Xcitium undetected
No result reported
Engine 38595
Yandex undetected
No result reported
Engine 5.5.2.24
Zillya failure
No result reported
Engine 2.0.0.5588
ZoneAlarm undetected
No result reported
Engine 6.24-114820489
Zoner undetected
No result reported
Engine 2.2.2.0
alibabacloud type-unsupported
No result reported
Engine 2.2.0
huorong undetected
No result reported
Engine dbb7acd:dbb7acd:a9d2355:a9d2355
tehtris type-unsupported
No result reported
Engine v0.1.4

File Signatures

SHA-256 871c827d3e4a248944a012633c04559f376a3ebb29388aed5c379299059b6061
MD5 6727f26e65daedccd1eaf53ee5743e66
SHA-1 d1c218efd28675ac440e2154d79a154cb533dd75
SSDEEP 1572864:Ho48Rd/yrxvotGfp/1OjtYcim981cNScaMW8sAGfv8Os/HnLieCdh5M8QYWzeS53:InPyqtGfp0jqc21cgA2AGfkO+HLie2vK
TLSH T1B8083319E7549D9AC4F787338AF086B255274C258B83D6872D18F63C19B3AF01E89FD8
VHASH aa19ea43d19356f750181d2b8c239bb9
PERMHASH f17c5663b3d04631888fe59752eb4740a7263e8bac9d2ec31e4d1589fab6fcb4

File Intelligence

Type Description Android Human-friendly file type name based on multiple detection methods.
Type Extension apk Most likely file extension inferred from the content.
Type Tag android Primary type tag assigned by the classifier.
Type Tags executable, mobile, android, apk Additional type tags that describe the file content.
Magic Zip archive data, at least v2.0 to extract, compression method=deflate File signature result from magic bytes inspection.
Magika APK File type predicted by Magika (ML-based file type detection).
TrID Android Package (49%), Java Archive (24.5%), Sweet Home 3D Design (generic) (19%), ZIP compressed archive (7.2%) TrID file type guesses with probabilities.
dhash 000000080f0e0400 Perceptual hash used to compare visual similarity of files.
raw md5 36c1eea07daef6116e91fc205fbb62aa Raw MD5 hash of the file contents.
extensions xml (568), png (348), so (32), kotlin_builtins (7), arsc (1), dex (1), gz (1), html (1), jpg (1), MF (1), RSA (1), SF (1), txt (1) File extensions found inside the APK and how many of each.
file types XML (569), PNG (348), ELF (32), unknown (13), DEX (1), HTML (1), JPG (1) Detected embedded file types and their counts.
highest datetime 2026-03-29 06:54:44 UTC Latest timestamp found among files inside the archive.
lowest datetime 2026-03-29 06:54:28 UTC Earliest timestamp found among files inside the archive.
num children 965 Number of files contained within the archive.
type APK Container type detected for the analyzed file.
uncompressed size 172 MB Estimated total size of all files after extraction.

Deep Manifest Analysis

Activity Intents (1)

com.mbm_soft.doomsmartervi2.ui.intro.IntroActivity
Actions
Main Activity Action: Start as a main entry point, does not expect to android.intent.action.MAIN
Categories
android.intent.category.LAUNCHER android.intent.category.LEANBACK_LAUNCHER

Service Intents (1)

com.mbm_soft.doomsmartervi2.utils.AppDownloadService
Actions
com.google.android.exoplayer.downloadService.action.RESTART com.google.android.exoplayer.downloadService.action.RESTART

Receiver Intents (1)

com.mbm_soft.doomsmartervi2.utils.BootUpReceiver
Actions
Boot Completed Broadcast Action: This is broadcast once, after the system has finished android.intent.action.BOOT_COMPLETED
android.intent.action.QUICKBOOT_POWERON android.intent.action.QUICKBOOT_POWERON

Native Libraries (8)

libavcodec libavcodec.so
libavutil libavutil.so
C++ Standard Library Android NDK C++ runtime used by native code. libc++_shared.so
libffmpeg libffmpeg.so
libnative-lib libnative-lib.so
libswresample libswresample.so
libvlc libvlc.so
libvlcjni libvlcjni.so

Requested Permissions (5)

have full network access Allows the app to create network sockets and use custom network protocols. The browser and other applications provide means to send data to the internet, so this permission is not required to send data to the internet. android.permission.INTERNET
run at startup Allows the app to have itself started as soon as the system has finished booting. This can make it take longer to start the tablet and allow the app to slow down the overall tablet by always running. android.permission.RECEIVE_BOOT_COMPLETED
modify or delete the contents of your shared storage Allows the app to write the contents of your shared storage. android.permission.WRITE_EXTERNAL_STORAGE
view network connections Allows the app to view information about network connections such as which networks exist and are connected. android.permission.ACCESS_NETWORK_STATE
read the contents of your shared storage Allows the app to read the contents of your shared storage. android.permission.READ_EXTERNAL_STORAGE

Uses Features (3)

Microphone Feature for {@link #getSystemAvailableFeatures} and android.hardware.microphone
Touchscreen Feature for {@link #getSystemAvailableFeatures} and android.hardware.touchscreen
Leanback Feature for {@link #getSystemAvailableFeatures} and android.software.leanback

Activities (12)

com.mbm_soft.doomsmartervi2.ui.intro.IntroActivity
com.mbm_soft.doomsmartervi2.ui.home.HomeActivity
com.mbm_soft.doomsmartervi2.ui.movies.MoviesActivity
com.mbm_soft.doomsmartervi2.ui.trends.TrendsActivity
com.mbm_soft.doomsmartervi2.ui.series.SeriesActivity
com.mbm_soft.doomsmartervi2.ui.series_info.SeriesInfoActivity
com.mbm_soft.doomsmartervi2.ui.settings.SettingsActivity
com.mbm_soft.doomsmartervi2.ui.live.LiveActivity
com.mbm_soft.doomsmartervi2.ui.movie_info.MovieInfoActivity
com.mbm_soft.doomsmartervi2.ui.vod_exo.VodActivity
com.mbm_soft.doomsmartervi2.ui.vod_vlc.VodVlcActivity
com.mbm_soft.doomsmartervi2.ui.youtube.YouTubePlayerActivity

Services (3)

com.mbm_soft.doomsmartervi2.utils.AppDownloadService
com.google.android.exoplayer2.scheduler.PlatformScheduler$PlatformSchedulerService
androidx.room.MultiInstanceInvalidationService

Broadcast Receivers (1)

com.mbm_soft.doomsmartervi2.utils.BootUpReceiver com.mbm_soft.doomsmartervi2.utils.BootUpReceiver

Content Providers (2)

androidx.lifecycle.ProcessLifecycleOwnerInitializer
me.jessyan.autosize.InitProvider

Submission Details

Submitted At 2026-04-25
First Submission 2026-04-25
Last Submission 2026-04-25
Stored Until 2026-05-25