TV_CLASICA_Nueva_actualizaci_n__apkdescargas.com_.apk
7.96 MB
Analyzed: 2026-02-12 16:33 UTC
APK Security & Privacy Score
Security scoring uses multi-engine scan signals and APK indicators. Privacy scoring uses requested permissions and network endpoint patterns.
Security
Scan-weighted
16/100
Threat scan flagged
Privacy
Permissions & network
95/100
High-risk permissions
Low data access
27/100
High Risk
Overall trust
Facts
Threat scan
26/76 flagged, 0 suspicious
Permissions
7 requested
Network strings
2 URLs (0 HTTP, 2 HTTPS)
Target SDK
31
Certificate
Valid until 3015-01-25 (292 years, suspicious)
Warnings
Threat scan flagged: 26/76 scanners marked this file as malicious.
High-risk permissions detected: android.permission.QUERY_ALL_PACKAGES, android.permission.RECEIVE_BOOT_COMPLETED
Package Name
com.worldtv2.tvclasica
Version Code
100000000
Version Name
100
Application Name
mt.modder.hub.MTApplication
Debuggable
No
Allow Backup
No
Min SDK
Android 21 (Lollipop)
Target SDK
Android 31 (Android 12)
Supported ABIs
Universal
Certificate & Signer
Valid From
Valid To
Serial Number
Thumbprint
Issuer: C
Issuer: DN
Subject: C
Subject: DN
Security Scan
26
⚠️ Threats Detected
Detected by
26 vendors:
AVG (Android:Arsink-D [PUP]), AhnLab-V3 (PUP/Android.Moda.1299330), Avast (Android:Arsink-D [PUP])
Malicious
26
Suspicious
0
Harmless
0
Undetected
40
Timeout
0
Failure
1
Scan Providers
ALYac
APEX
AVG
Android:Arsink-D [PUP]
Acronis
AhnLab-V3
PUP/Android.Moda.1299330
Alibaba
Antiy-AVL
Arcabit
Avast
Android:Arsink-D [PUP]
Avast-Mobile
Android:Arsink-D [PUP]
Avira
PUA/ANDR.Packed.FRVW.Gen
Baidu
BitDefender
BitDefenderFalx
Android.Riskware.Dropper.AFM
Bkav
CAT-QuickHeal
cld.android.obfus.1694543488
CMC
CTX
apk.trojan.andr
ClamAV
CrowdStrike
Cylance
Cynet
Malicious (score: 99)
DeepInstinct
DrWeb
Android.Packed.27.origin
ESET-NOD32
Android/HackTool.Metasploit.BK potentially unsafe application
Elastic
Emsisoft
F-Secure
PotentialRisk.PUA/ANDR.Packed.FRVW.Gen
Fortinet
Android/Agent.JDU!tr
GData
Google
Detected
Gridinsoft
Ikarus
Trojan-Spy.AndroidOS.Banker
Jiangmin
K7AntiVirus
K7GW
Adware ( 005a42401 )
Kaspersky
Kingsoft
Android.HackTool.Metasploit.BK
Lionic
Trojan.AndroidOS.Andr.C!c
Malwarebytes
MaxSecure
McAfeeD
MicroWorld-eScan
Microsoft
Trojan:Script/Phonzy.A!ml
NANO-Antivirus
Trojan.Android.RemoteCode.jyiyfe
Paloalto
Panda
Rising
Trojan.Banker/Android!8.FA95 (CLOUD)
SUPERAntiSpyware
Sangfor
SentinelOne
Skyhigh
Sophos
Symantec
PUA.Gen.2
SymantecMobileInsight
AppRisk:Generisk
TACHYON
Tencent
Trapmine
TrellixENS
Artemis!0A65CDC8A6FF
TrendMicro
TrendMicro-HouseCall
Trustlook
Android.PUA.Spyware
VBA32
VIPRE
Varist
AndroidOS/Agent.BRV
ViRobot
VirIT
Webroot
Xcitium
Yandex
Zillya
ZoneAlarm
Zoner
alibabacloud
huorong
tehtris
File Signatures
SHA-256
6443310fc2204c2b29cf75bffac97af8046cde991c8cc207cb07b6b540beab2f
MD5
0a65cdc8a6ffe0193186d76dea643745
SHA-1
9d56985dbdecb495a811213365fd28d4978a36e1
SSDEEP
196608:YWJDimtV1RZvEQp9KyltzxjQLXS/BlCtPz+HXPZWSjROUR3n:rxtLRZsqPxjQLXaCtL+HXFRzhn
TLSH
T18A860197B741AE3EC43B41B109561736662BAC21CA5392AB780C374D3F379EC0F95AD8
VHASH
50f9b0af9d782cba3514c63ccb34be6e
PERMHASH
ee0dfd198cf1f4fb2fc5da03b0c7f5f69be29c91c07638bb1e137d3b4c0bf8d2
File Intelligence
Type Description
Human-friendly file type name based on multiple detection methods.
Type Extension
Most likely file extension inferred from the content.
Type Tag
Primary type tag assigned by the classifier.
Type Tags
Additional type tags that describe the file content.
Magic
File signature result from magic bytes inspection.
Magika
File type predicted by Magika (ML-based file type detection).
TrID
TrID file type guesses with probabilities.
dhash
Perceptual hash used to compare visual similarity of files.
raw md5
Raw MD5 hash of the file contents.
extensions
File extensions found inside the APK and how many of each.
file types
Detected embedded file types and their counts.
highest datetime
Latest timestamp found among files inside the archive.
lowest datetime
Earliest timestamp found among files inside the archive.
num children
Number of files contained within the archive.
type
Container type detected for the analyzed file.
uncompressed size
Estimated total size of all files after extraction.
Deep Manifest Analysis
Activity Intents (4)
com.google.firebase.auth.internal.GenericIdpActivity
com.google.firebase.auth.internal.RecaptchaActivity
com.plpro.tvclasica.MainActivity
com.plpro.tvclasica.PlayerActivity
Service Intents (1)
com.plpro.tvclasica.DemoDownloadService
Receiver Intents (1)
Profile installer
androidx.profileinstaller.ProfileInstallReceiver
Requested Permissions (7)
have full network access
android.permission.INTERNET
view network connections
android.permission.ACCESS_NETWORK_STATE
run at startup
android.permission.RECEIVE_BOOT_COMPLETED
Foreground service
android.permission.FOREGROUND_SERVICE
android.permission.QUERY_ALL_PACKAGES
android.permission.QUERY_ALL_PACKAGES
com.worldtv2.tvclasica_com.google.android.gms.permission.AD_ID
com.worldtv2.tvclasica_com.google.android.gms.permission.AD_ID
Dynamic receiver access
com.worldtv2.tvclasica.DYNAMIC_RECEIVER_NOT_EXPORTED_PERMISSION
Uses Features (2)
Touchscreen
android.hardware.touchscreen
Leanback
android.software.leanback
Activities (9)
com.plpro.tvclasica.AdultoActivity
com.plpro.tvclasica.CineActivity
com.plpro.tvclasica.WebViewActivity
com.plpro.tvclasica.activitysplash
com.plpro.tvclasica.MainActivity
com.plpro.tvclasica.PlayerActivity
com.google.firebase.auth.internal.GenericIdpActivity
com.google.firebase.auth.internal.RecaptchaActivity
com.google.android.gms.common.api.GoogleApiActivity
Services (3)
com.plpro.tvclasica.DemoDownloadService
com.google.android.tvonline.scheduler.PlatformScheduler$PlatformSchedulerService
com.google.firebase.components.ComponentDiscoveryService
Broadcast Receivers (1)
Profile installer
androidx.profileinstaller.ProfileInstallReceiver
Content Providers (2)
com.squareup.picasso.PicassoProvider
androidx.startup.InitializationProvider
URL Endpoints (2)
Submission Details
Submitted At
First Submission
Last Submission
Stored Until