TV_CLASICA_Nueva_actualizaci_n__apkdescargas.com_.apk

7.96 MB

Analyzed: 2026-02-12 16:33 UTC

APK Security & Privacy Score

Security scoring uses multi-engine scan signals and APK indicators. Privacy scoring uses requested permissions and network endpoint patterns.

Security Scan-weighted
16/100
Threat scan flagged
Privacy Permissions & network
95/100
High-risk permissions Low data access
27/100
High Risk
Overall trust

Facts

Threat scan 26/76 flagged, 0 suspicious
Permissions 7 requested
Network strings 2 URLs (0 HTTP, 2 HTTPS)
Target SDK 31
Certificate Valid until 3015-01-25 (292 years, suspicious)

Warnings

Threat scan flagged: 26/76 scanners marked this file as malicious.
High-risk permissions detected: android.permission.QUERY_ALL_PACKAGES, android.permission.RECEIVE_BOOT_COMPLETED
Package Name com.worldtv2.tvclasica
Version Code 100000000
Version Name 100
Application Name mt.modder.hub.MTApplication
Debuggable No
Allow Backup No
Min SDK Android 21 (Lollipop)
Target SDK Android 31 (Android 12)
Supported ABIs
Universal

Certificate & Signer

Valid From 2016-09-23 11:57:06
Valid To 3015-01-25 11:57:06
Serial Number 333a0b9b
Thumbprint d122d9adc3e5d5ff346b32c0413f5cf3a3cc4658
Issuer: C debugging
Issuer: DN C:debugging
Subject: C debugging
Subject: DN C:debugging

Security Scan

26 /76
⚠️ Threats Detected
Detected by 26 vendors: AVG (Android:Arsink-D [PUP]), AhnLab-V3 (PUP/Android.Moda.1299330), Avast (Android:Arsink-D [PUP])
Scanned by 76 security vendors
Last scan: 2026-02-12 06:33 UTC
Malicious
26
Suspicious
0
Harmless
0
Undetected
40
Timeout
0
Failure
1

Scan Providers

76 vendors
ALYac undetected
No result reported
Engine 2.0.0.10
APEX type-unsupported
No result reported
Engine 6.746
AVG malicious
Android:Arsink-D [PUP]
Engine 23.9.8494.0
Acronis undetected
No result reported
Engine 1.2.0.121
AhnLab-V3 malicious
PUP/Android.Moda.1299330
Engine 3.29.1.10604
Alibaba undetected
No result reported
Engine 0.3.0.5
Antiy-AVL undetected
No result reported
Engine 3.0
Arcabit undetected
No result reported
Engine 2025.0.0.23
Avast malicious
Android:Arsink-D [PUP]
Engine 23.9.8494.0
Avast-Mobile malicious
Android:Arsink-D [PUP]
Engine 260211-00
Avira malicious
PUA/ANDR.Packed.FRVW.Gen
Engine 8.3.3.24
Baidu undetected
No result reported
Engine 1.0.0.2
BitDefender undetected
No result reported
Engine 7.2
BitDefenderFalx malicious
Android.Riskware.Dropper.AFM
Engine 2.0.936
Bkav failure
No result reported
Engine 2.0.0.1
CAT-QuickHeal malicious
cld.android.obfus.1694543488
Engine 22.00
CMC undetected
No result reported
Engine 2.4.2022.1
CTX malicious
apk.trojan.andr
Engine 2024.8.29.1
ClamAV undetected
No result reported
Engine 1.5.1.0
CrowdStrike undetected
No result reported
Engine 1.0
Cylance type-unsupported
No result reported
Engine 3.0.0.0
Cynet malicious
Malicious (score: 99)
Engine 4.0.3.4
DeepInstinct type-unsupported
No result reported
Engine 5.0.0.8
DrWeb malicious
Android.Packed.27.origin
Engine 7.0.74.11120
ESET-NOD32 malicious
Android/HackTool.Metasploit.BK potentially unsafe application
Engine 18.2.18.0
Elastic type-unsupported
No result reported
Engine 4.0.248
Emsisoft undetected
No result reported
Engine 2024.8.0.61147
F-Secure malicious
PotentialRisk.PUA/ANDR.Packed.FRVW.Gen
Engine 18.10.1547.307
Fortinet malicious
Android/Agent.JDU!tr
Engine 7.0.30.0
GData undetected
No result reported
Engine GD:27.43510AVA:64.30645
Google malicious
Detected
Engine 1770872509
Gridinsoft undetected
No result reported
Engine 1.0.237.174
Ikarus malicious
Trojan-Spy.AndroidOS.Banker
Engine 6.4.16.0
Jiangmin undetected
No result reported
Engine 16.0.100
K7AntiVirus undetected
No result reported
Engine 14.35.58565
K7GW malicious
Adware ( 005a42401 )
Engine 14.35.58565
Kaspersky undetected
No result reported
Engine 22.0.1.28
Kingsoft malicious
Android.HackTool.Metasploit.BK
Engine None
Lionic malicious
Trojan.AndroidOS.Andr.C!c
Engine 8.16
Malwarebytes undetected
No result reported
Engine 3.1.0.209
MaxSecure undetected
No result reported
Engine 1.0.0.1
McAfeeD undetected
No result reported
Engine 1.2.0.13781
MicroWorld-eScan undetected
No result reported
Engine 14.0.409.0
Microsoft malicious
Trojan:Script/Phonzy.A!ml
Engine 1.1.26010.1
NANO-Antivirus malicious
Trojan.Android.RemoteCode.jyiyfe
Engine 1.0.170.26895
Paloalto type-unsupported
No result reported
Engine 0.9.0.1003
Panda undetected
No result reported
Engine 4.6.4.2
Rising malicious
Trojan.Banker/Android!8.FA95 (CLOUD)
Engine 25.0.0.28
SUPERAntiSpyware undetected
No result reported
Engine 5.6.0.1032
Sangfor undetected
No result reported
Engine 2.22.3.0
SentinelOne type-unsupported
No result reported
Engine 7.5.3.1
Skyhigh undetected
No result reported
Engine v2021.2.0+4045
Sophos undetected
No result reported
Engine 3.3.1.0
Symantec malicious
PUA.Gen.2
Engine 1.22.0.0
SymantecMobileInsight malicious
AppRisk:Generisk
Engine 2.0
TACHYON undetected
No result reported
Engine 2026-02-12.01
Tencent undetected
No result reported
Engine 1.0.0.1
Trapmine type-unsupported
No result reported
Engine 4.0.9.0
TrellixENS malicious
Artemis!0A65CDC8A6FF
Engine 6.0.6.653
TrendMicro undetected
No result reported
Engine 24.550.0.1002
TrendMicro-HouseCall undetected
No result reported
Engine 24.550.0.1002
Trustlook malicious
Android.PUA.Spyware
Engine 1.0
VBA32 undetected
No result reported
Engine 5.5.0
VIPRE undetected
No result reported
Engine 6.0.0.35
Varist malicious
AndroidOS/Agent.BRV
Engine 6.6.1.3
ViRobot undetected
No result reported
Engine 2014.3.20.0
VirIT undetected
No result reported
Engine 9.5.1143
Webroot undetected
No result reported
Engine 1.9.0.8
Xcitium undetected
No result reported
Engine 38405
Yandex undetected
No result reported
Engine 5.5.2.24
Zillya undetected
No result reported
Engine 2.0.0.5542
ZoneAlarm undetected
No result reported
Engine 6.22-112233836
Zoner undetected
No result reported
Engine 2.2.2.0
alibabacloud type-unsupported
No result reported
Engine 2.2.0
huorong undetected
No result reported
Engine 5247c43:5247c43:ad69aaa:ad69aaa
tehtris type-unsupported
No result reported

File Signatures

SHA-256 6443310fc2204c2b29cf75bffac97af8046cde991c8cc207cb07b6b540beab2f
MD5 0a65cdc8a6ffe0193186d76dea643745
SHA-1 9d56985dbdecb495a811213365fd28d4978a36e1
SSDEEP 196608:YWJDimtV1RZvEQp9KyltzxjQLXS/BlCtPz+HXPZWSjROUR3n:rxtLRZsqPxjQLXaCtL+HXFRzhn
TLSH T18A860197B741AE3EC43B41B109561736662BAC21CA5392AB780C374D3F379EC0F95AD8
VHASH 50f9b0af9d782cba3514c63ccb34be6e
PERMHASH ee0dfd198cf1f4fb2fc5da03b0c7f5f69be29c91c07638bb1e137d3b4c0bf8d2

File Intelligence

Type Description Android Human-friendly file type name based on multiple detection methods.
Type Extension apk Most likely file extension inferred from the content.
Type Tag android Primary type tag assigned by the classifier.
Type Tags executable, mobile, android, apk Additional type tags that describe the file content.
Magic Zip archive data, at least v1.0 to extract, compression method=deflate File signature result from magic bytes inspection.
Magika APK File type predicted by Magika (ML-based file type detection).
TrID Java Archive (77.1%), ZIP compressed archive (22.8%) TrID file type guesses with probabilities.
dhash 0000000c0e0d0c00 Perceptual hash used to compare visual similarity of files.
raw md5 b4d64b7668c145055317251a46563d75 Raw MD5 hash of the file contents.
extensions xml (410), version (35), properties (11), kotlin_builtins (5), efy (2), arsc (1), bin (1), dex (1), json (1), prof (1), profm (1), q (1), txt (1) File extensions found inside the APK and how many of each.
file types XML (539), PNG (381), unknown (77), DEX (1), Java Bytecode (1), JPG (1) Detected embedded file types and their counts.
highest datetime 2025-11-09 12:00:58 UTC Latest timestamp found among files inside the archive.
lowest datetime 2025-11-09 01:01:00 UTC Earliest timestamp found among files inside the archive.
num children 1277 Number of files contained within the archive.
type APK Container type detected for the analyzed file.
uncompressed size 11 MB Estimated total size of all files after extraction.

Deep Manifest Analysis

Activity Intents (4)

com.google.firebase.auth.internal.GenericIdpActivity
Actions
View Activity Action: Display the data to the user. android.intent.action.VIEW
Categories
android.intent.category.DEFAULT android.intent.category.BROWSABLE
com.google.firebase.auth.internal.RecaptchaActivity
Actions
View Activity Action: Display the data to the user. android.intent.action.VIEW
Categories
android.intent.category.DEFAULT android.intent.category.BROWSABLE
com.plpro.tvclasica.MainActivity
Actions
Main Activity Action: Start as a main entry point, does not expect to android.intent.action.MAIN
View Activity Action: Display the data to the user. android.intent.action.VIEW
Categories
android.intent.category.LAUNCHER android.intent.category.LEANBACK_LAUNCHER android.intent.category.DEFAULT android.intent.category.BROWSABLE
com.plpro.tvclasica.PlayerActivity
Actions
com.google.android.exoplayer.demo.action.VIEW com.google.android.exoplayer.demo.action.VIEW
com.google.android.exoplayer.demo.action.VIEW_LIST com.google.android.exoplayer.demo.action.VIEW_LIST
Categories
android.intent.category.DEFAULT

Service Intents (1)

com.plpro.tvclasica.DemoDownloadService
Actions
com.google.android.exoplayer.downloadService.action.RESTART com.google.android.exoplayer.downloadService.action.RESTART

Receiver Intents (1)

Profile installer Installs performance profiles to speed up app startup and hot paths. androidx.profileinstaller.ProfileInstallReceiver
Actions
Install performance profile Installs a profile that helps optimize app performance. androidx.profileinstaller.action.INSTALL_PROFILE
Skip profile install Skips profile installation for this build. androidx.profileinstaller.action.SKIP_FILE
Save performance profile Saves a profile generated during app usage. androidx.profileinstaller.action.SAVE_PROFILE
Benchmark operation Runs a profile installer benchmark operation. androidx.profileinstaller.action.BENCHMARK_OPERATION

Requested Permissions (7)

have full network access Allows the app to create network sockets and use custom network protocols. The browser and other applications provide means to send data to the internet, so this permission is not required to send data to the internet. android.permission.INTERNET
view network connections Allows the app to view information about network connections such as which networks exist and are connected. android.permission.ACCESS_NETWORK_STATE
run at startup Allows the app to have itself started as soon as the system has finished booting. This can make it take longer to start the tablet and allow the app to slow down the overall tablet by always running. android.permission.RECEIVE_BOOT_COMPLETED
Foreground service Allows the app to run a foreground service. android.permission.FOREGROUND_SERVICE
android.permission.QUERY_ALL_PACKAGES Custom app or vendor permission (not publicly documented). android.permission.QUERY_ALL_PACKAGES
com.worldtv2.tvclasica_com.google.android.gms.permission.AD_ID Custom app or vendor permission (not publicly documented). com.worldtv2.tvclasica_com.google.android.gms.permission.AD_ID
Dynamic receiver access Internal app permission used to protect dynamic broadcast receivers. com.worldtv2.tvclasica.DYNAMIC_RECEIVER_NOT_EXPORTED_PERMISSION

Uses Features (2)

Touchscreen Feature for {@link #getSystemAvailableFeatures} and android.hardware.touchscreen
Leanback Feature for {@link #getSystemAvailableFeatures} and android.software.leanback

Activities (9)

com.plpro.tvclasica.AdultoActivity
com.plpro.tvclasica.CineActivity
com.plpro.tvclasica.WebViewActivity
com.plpro.tvclasica.activitysplash
com.plpro.tvclasica.MainActivity
com.plpro.tvclasica.PlayerActivity
com.google.firebase.auth.internal.GenericIdpActivity
com.google.firebase.auth.internal.RecaptchaActivity
com.google.android.gms.common.api.GoogleApiActivity

Services (3)

com.plpro.tvclasica.DemoDownloadService
com.google.android.tvonline.scheduler.PlatformScheduler$PlatformSchedulerService
com.google.firebase.components.ComponentDiscoveryService

Broadcast Receivers (1)

Profile installer Installs performance profiles to speed up app startup and hot paths. androidx.profileinstaller.ProfileInstallReceiver

Content Providers (2)

com.squareup.picasso.PicassoProvider
androidx.startup.InitializationProvider

Submission Details

Submitted At 2026-02-12
First Submission 2026-02-12
Last Submission 2026-02-12
Stored Until 2026-03-14