DIYP魔改TV icon

base.apk

DIYP魔改TV

13.36 MB

Analyzed: 2026-03-23 10:55 UTC

APK Security & Privacy Score

Security scoring uses multi-engine scan signals and APK indicators. Privacy scoring uses requested permissions and network endpoint patterns.

Security Scan-weighted
43/100
Threat scan flagged Outdated target SDK
Privacy Permissions & network
88/100
High-risk permissions HTTP URLs found AllowBackup enabled
58/100
Caution
Overall trust

Facts

Threat scan 7/76 flagged, 0 suspicious
Permissions 10 requested
Network strings 3 URLs (2 HTTP, 1 HTTPS)
Target SDK 28
Certificate Valid until 2035-07-17 (9 years, suspicious)

Warnings

Threat scan flagged: 7/76 scanners marked this file as malicious.
Found 2 HTTP URL strings (unencrypted).
High-risk permissions detected: android.permission.REQUEST_INSTALL_PACKAGES, android.permission.SYSTEM_ALERT_WINDOW, android.permission.RECEIVE_BOOT_COMPLETED
AllowBackup is enabled.
Package Name com.player.diypnz2022
Version Code 21
Version Name 5.2.0
Application Name com.player.activity.MyApplication
Debuggable No
Allow Backup Yes
Min SDK Android 17 (Jelly Bean)
Target SDK Android 28 (Pie)
Supported ABIs
armeabi-v7a

Certificate & Signer

Valid From 2008-02-29 01:33:46
Valid To 2035-07-17 01:33:46
Serial Number 936eacbe07f201df
Thumbprint 61ed377e85d386a8dfee6b864bd85b0bfaa5af81
Issuer: C US
Issuer: CN Android
Issuer: DN C:US, CN:Android, L:Mountain View, O:Android, ST:California, OU:Android, email:android@android.com
Issuer: L Mountain View
Issuer: O Android
Issuer: OU Android
Issuer: ST California
Issuer: email android@android.com
Subject: C US
Subject: CN Android
Subject: DN C:US, CN:Android, L:Mountain View, O:Android, ST:California, OU:Android, email:android@android.com
Subject: L Mountain View
Subject: O Android
Subject: OU Android
Subject: ST California
Subject: email android@android.com

Security Scan

7 /76
⚠️ Threats Detected
Detected by 7 vendors: AhnLab-V3 (Dropper/Android.Agent.1295958), BitDefenderFalx (Android.Riskware.Agent.JUS), CAT-QuickHeal (Android.ScytheSCF.KQ)
Scanned by 76 security vendors
Last scan: 2026-03-23 10:55 UTC
Malicious
7
Suspicious
0
Harmless
0
Undetected
60
Timeout
0
Failure
1

Scan Providers

76 vendors
ALYac undetected
No result reported
Engine 2.0.0.10
APEX type-unsupported
No result reported
Engine 6.761
AVG undetected
No result reported
Engine 23.9.8494.0
Acronis undetected
No result reported
Engine 1.2.0.121
AhnLab-V3 malicious
Dropper/Android.Agent.1295958
Engine 3.29.3.10609
Alibaba undetected
No result reported
Engine 0.3.0.5
Antiy-AVL undetected
No result reported
Engine 3.0
Arcabit undetected
No result reported
Engine 2025.0.0.23
Avast undetected
No result reported
Engine 23.9.8494.0
Avast-Mobile undetected
No result reported
Engine 260323-00
Avira undetected
No result reported
Engine 8.3.3.24
Baidu undetected
No result reported
Engine 1.0.0.2
BitDefender undetected
No result reported
Engine 7.2
BitDefenderFalx malicious
Android.Riskware.Agent.JUS
Engine 2.0.936
Bkav undetected
No result reported
Engine 2.0.0.1
CAT-QuickHeal malicious
Android.ScytheSCF.KQ
Engine 22.00
CMC undetected
No result reported
Engine 2.4.2022.1
CTX undetected
No result reported
Engine 2024.8.29.1
ClamAV undetected
No result reported
Engine 1.5.2.0
CrowdStrike undetected
No result reported
Engine 1.0
Cylance type-unsupported
No result reported
Engine 3.0.0.0
Cynet undetected
No result reported
Engine 4.0.3.4
DeepInstinct type-unsupported
No result reported
Engine 5.0.0.8
DrWeb undetected
No result reported
Engine 7.0.75.2070
ESET-NOD32 undetected
No result reported
Engine 18.2.18.0
Elastic undetected
No result reported
Engine 4.0.252
Emsisoft undetected
No result reported
Engine 2024.8.0.61147
F-Secure undetected
No result reported
Engine 18.10.1547.307
Fortinet malicious
Android/Agent.HWY!tr
Engine 7.0.30.0
GData undetected
No result reported
Engine GD:27.43958AVA:64.30891
Google malicious
Detected
Engine 1774260049
Gridinsoft undetected
No result reported
Engine 1.0.241.174
Ikarus malicious
Trojan-Dropper.AndroidOS.Agent
Engine 6.4.16.0
Jiangmin undetected
No result reported
Engine 16.0.100
K7AntiVirus undetected
No result reported
Engine 14.42.58961
K7GW malicious
Trojan ( 0057a1a41 )
Engine 14.42.58962
Kaspersky undetected
No result reported
Engine 22.0.1.28
Kingsoft undetected
No result reported
Engine None
Lionic undetected
No result reported
Engine 8.16
Malwarebytes undetected
No result reported
Engine 3.1.0.214
MaxSecure undetected
No result reported
Engine 1.0.0.1
McAfeeD undetected
No result reported
Engine 1.2.0.14148
MicroWorld-eScan undetected
No result reported
Engine 14.0.409.0
Microsoft undetected
No result reported
Engine 1.1.26010.1
NANO-Antivirus undetected
No result reported
Engine 1.0.170.26895
Paloalto type-unsupported
No result reported
Engine 0.9.0.1003
Panda undetected
No result reported
Engine 4.6.4.2
Rising undetected
No result reported
Engine 25.0.0.28
SUPERAntiSpyware undetected
No result reported
Engine 5.6.0.1032
Sangfor undetected
No result reported
Engine 2.22.3.0
SentinelOne type-unsupported
No result reported
Engine 7.5.3.1
Skyhigh failure
No result reported
Sophos undetected
No result reported
Engine 3.3.1.0
Symantec undetected
No result reported
Engine 1.22.0.0
SymantecMobileInsight undetected
No result reported
Engine 2.0
TACHYON undetected
No result reported
Engine 2026-03-23.02
Tencent undetected
No result reported
Engine 1.0.0.1
Trapmine type-unsupported
No result reported
Engine 4.0.10.0
TrellixENS undetected
No result reported
Engine 6.0.6.653
TrendMicro undetected
No result reported
Engine 24.550.0.1002
TrendMicro-HouseCall undetected
No result reported
Engine 24.550.0.1002
Trustlook undetected
No result reported
Engine 1.0
VBA32 undetected
No result reported
Engine 5.5.1
VIPRE undetected
No result reported
Engine 6.0.0.35
Varist undetected
No result reported
Engine 6.6.1.3
ViRobot undetected
No result reported
Engine 2014.3.20.0
VirIT undetected
No result reported
Engine 9.5.1170
Webroot undetected
No result reported
Engine 1.9.0.8
Xcitium undetected
No result reported
Engine 38506
Yandex undetected
No result reported
Engine 5.5.2.24
Zillya undetected
No result reported
Engine 2.0.0.5567
ZoneAlarm undetected
No result reported
Engine 6.23-113519112
Zoner undetected
No result reported
Engine 2.2.2.0
alibabacloud type-unsupported
No result reported
Engine 2.2.0
huorong undetected
No result reported
Engine 352f466:352f466:38b5ae0:38b5ae0
tehtris type-unsupported
No result reported

File Signatures

SHA-256 d2ecdbcad44e23ee4f381bd011ffd4b7afa59a8e0eb20c1cbd06f2b610d8117c
MD5 52b1429745e9261be2eefc0561efec9e
SHA-1 222c676b374dde84933bbab60b129459b878db6f
SSDEEP 393216:dTjc6Lan9Cl9nVgBv/TADgmkzQs0qCPTRrQ/0U:1jzNgBH5Qs0qCPTTU
TLSH T146E63390EB8DFD2FE0B385374BB5413D1125AC5A4A82DB136599F62C0E7BE888DC5DC8
VHASH 5b2b529641a418524e97a26dd21b052c
PERMHASH 7cf1087220fb4fbf5830d2cb77bf5fc930471b7fabb616692e654d2ac0a73d6a

File Intelligence

Type Description Android Human-friendly file type name based on multiple detection methods.
Type Extension apk Most likely file extension inferred from the content.
Type Tag android Primary type tag assigned by the classifier.
Type Tags executable, mobile, android, apk Additional type tags that describe the file content.
Magic Zip archive data, at least v2.0 to extract, compression method=deflate File signature result from magic bytes inspection.
Magika APK File type predicted by Magika (ML-based file type detection).
TrID Android Package (60.6%), Java Archive (30.3%), ZIP compressed archive (8.9%) TrID file type guesses with probabilities.
dhash 0000001e1e0c1110 Perceptual hash used to compare visual similarity of files.
raw md5 be3d5a17b69da4401f0309f62f1f960c Raw MD5 hash of the file contents.
extensions png (277), xml (229), version (30), so (14), json (2), arsc (1), dex (1), gz (1), html (1), js (1), MF (1), RSA (1), SF (1) File extensions found inside the APK and how many of each.
file types PNG (277), XML (229), unknown (36), ELF (14), JSON (2), DEX (1), HTML (1) Detected embedded file types and their counts.
highest datetime 2025-04-14 21:08:08 UTC Latest timestamp found among files inside the archive.
lowest datetime 2019-02-11 19:12:42 UTC Earliest timestamp found among files inside the archive.
num children 560 Number of files contained within the archive.
type APK Container type detected for the analyzed file.
uncompressed size 25 MB Estimated total size of all files after extraction.

Sandbox

Sandbox Verdicts

Zenbox android
Harmless 91% confidence CLEAN

Deep Manifest Analysis

Activity Intents (1)

com.player.activity.LoginActivity
Actions
Main Activity Action: Start as a main entry point, does not expect to android.intent.action.MAIN
Categories
android.intent.category.LAUNCHER

Receiver Intents (1)

com.player.utils.BootReceiver
Actions
Boot Completed Broadcast Action: This is broadcast once, after the system has finished android.intent.action.BOOT_COMPLETED
android.intent.action.REBOOT android.intent.action.REBOOT
Media Mounted Broadcast Action: External media is present and mounted at its mount point. android.intent.action.MEDIA_MOUNTED
Media Unmounted Broadcast Action: External media is present, but not mounted at its mount point. android.intent.action.MEDIA_UNMOUNTED
android.net.conn.CONNECTIVITY_CHANGE android.net.conn.CONNECTIVITY_CHANGE
android.net.wifi.WIFI_STATE_CHANGED android.net.wifi.WIFI_STATE_CHANGED
User Present Broadcast Action: Sent when the user is present after device wakes up (e.g when the android.intent.action.USER_PRESENT
android.bluetooth.adapter.action.STATE_CHANGED android.bluetooth.adapter.action.STATE_CHANGED
Power Connected Broadcast Action: External power has been connected to the device. android.intent.action.ACTION_POWER_CONNECTED
android.intent.action.ACTION_POWER_DISCONNECTED android.intent.action.ACTION_POWER_DISCONNECTED
android.media.AUDIO_BECOMING_NOISY android.media.AUDIO_BECOMING_NOISY
Media Removed Broadcast Action: External media has been removed. android.intent.action.MEDIA_REMOVED
Media Checking Broadcast Action: External media is present, and being disk-checked android.intent.action.MEDIA_CHECKING
Media Eject Broadcast Action: User has expressed the desire to remove the external storage media. android.intent.action.MEDIA_EJECT

Native Libraries (13)

libijkffmpeg libijkffmpeg.so
libijkplayer libijkplayer.so
libijksdl libijksdl.so
libmitv libmitv.so
libmpc_jni libmpc_jni.so
libp2p libp2p.so
libp2ptv libp2ptv.so
libp3p libp3p.so
libp4p libp4p.so
libp5p libp5p.so
libp6p libp6p.so
libplayer libplayer.so
libtvcore libtvcore.so

Requested Permissions (10)

have full network access Allows the app to create network sockets and use custom network protocols. The browser and other applications provide means to send data to the internet, so this permission is not required to send data to the internet. android.permission.INTERNET
read phone status and identity Allows the app to access the phone features of the device. This permission allows the app to determine the phone number and device IDs, whether a call is active, and the remote number connected by a call. android.permission.READ_PHONE_STATE
run at startup Allows the app to have itself started as soon as the system has finished booting. This can make it take longer to start the tablet and allow the app to slow down the overall tablet by always running. android.permission.RECEIVE_BOOT_COMPLETED
read the contents of your shared storage Allows the app to read the contents of your shared storage. android.permission.READ_EXTERNAL_STORAGE
modify or delete the contents of your shared storage Allows the app to write the contents of your shared storage. android.permission.WRITE_EXTERNAL_STORAGE
view network connections Allows the app to view information about network connections such as which networks exist and are connected. android.permission.ACCESS_NETWORK_STATE
view Wi-Fi connections Allows the app to view information about Wi-Fi networking, such as whether Wi-Fi is enabled and name of connected Wi-Fi devices. android.permission.ACCESS_WIFI_STATE
android.permission.REQUEST_INSTALL_PACKAGES Custom app or vendor permission (not publicly documented). android.permission.REQUEST_INSTALL_PACKAGES
This app can appear on top of other apps This app can appear on top of other apps or other parts of the screen. This may interfere with normal app usage and change the way that other apps appear. android.permission.SYSTEM_ALERT_WINDOW
reorder running apps Allows the app to move tasks to the foreground and background. The app may do this without your input. android.permission.REORDER_TASKS

Activities (2)

com.player.activity.LoginActivity
com.player.activity.PlayerActivity

Services (10)

com.tvbus.engine2333.TVService
com.gsoft.mitv.MainActivity
com.forcetech.service.P2PService
com.forcetech.service.P3PService
com.forcetech.service.P4PService
com.forcetech.service.P5PService
com.forcetech.service.P6PService
com.forcetech.service.P7PService
com.forcetech.service.P8PService
com.forcetech.service.P9PService

Broadcast Receivers (1)

com.player.utils.BootReceiver com.player.utils.BootReceiver

Submission Details

Submitted At 2026-03-23
First Submission 2026-03-23
Last Submission 2026-03-23
Stored Until 2026-04-22