0/64

Threat

com.egostudio.clean

Super Clean

Analyzed on 2022-07-25T12:28:52.641350

115

permissions

96

activities

48

services

24

receivers

80

domains

File sums

MD5 7aa2cc43a5a1e7c48e0018ce86c9bc7f
SHA1 83a53feb120bc3b8bedbf2f1eb7965caf4cb11b9
SHA256 8c91bd9aca7880a09a59c791596f7939d9afa306dbfb10d23d11ec1d9fb89d20
Size 19.08MB

APKiD

Information computed with APKiD.

/tmp/tmp5e7mpq7m!assets/audience_network.dex
anti_vm
  • possible Build.SERIAL check
anti_debug
  • Debug.isDebuggerConnected() check
compiler
  • unknown (please file detection issue!)
/tmp/tmp5e7mpq7m!classes.dex
anti_vm
  • Build.MODEL check
  • Build.MANUFACTURER check
  • Build.PRODUCT check
  • Build.BOARD check
  • possible Build.SERIAL check
  • SIM operator check
  • network operator name check
  • possible VM check
compiler
  • r8
/tmp/tmp5e7mpq7m!classes2.dex
anti_vm
  • Build.FINGERPRINT check
  • Build.MODEL check
  • Build.MANUFACTURER check
  • Build.PRODUCT check
  • Build.TAGS check
  • SIM operator check
  • network operator name check
compiler
  • r8 without marker (suspicious)
/tmp/tmp5e7mpq7m!classes3.dex
anti_vm
  • Build.FINGERPRINT check
  • Build.MODEL check
  • Build.MANUFACTURER check
  • Build.PRODUCT check
  • Build.BOARD check
  • network operator name check
compiler
  • r8 without marker (suspicious)
/tmp/tmp5e7mpq7m!lib/arm64-v8a/libdaemon2.so
obfuscator
  • Obfuscator-LLVM version unknown
/tmp/tmp5e7mpq7m!lib/arm64-v8a/libnets.so
obfuscator
  • Obfuscator-LLVM version unknown
/tmp/tmp5e7mpq7m!lib/armeabi-v7a/libdaemon2.so
obfuscator
  • Obfuscator-LLVM version unknown
/tmp/tmp5e7mpq7m!lib/armeabi-v7a/libnets.so
obfuscator
  • Obfuscator-LLVM version unknown

SSdeep

Information computed with ssdeep.

APK file 393216:ERNYAAQVy5DOq6HiMUomkkF7BXB9Ap4r7soO+0rbDsNCGHr:E/YAAQVy5DO3HZfmP7bqp4r4oOPr/sIw
Manifest 1536:b1BK5AukraGGUrnWYioTAkAwz6Erfq6PwSXuQIhyymr:b19dAW1Ih5mr
assets/audience_network.dex 49152:2I4+6Ptxu5kKKrpTdFLFlDLjvj44ZF3I2BFC3JXbPw/Rm:e+otxhawJm
classes.dex 98304:vtsxefEq8/NZx78TAd8f45WK+K62WLJiQt4AuL:VREV/Pp8TAd8f+ei0uL
classes2.dex 98304:A8FuiDeaWmOXdaaweJcZ8PnMUoBMy4FNXk4BiU5C:A8FP7OXdaaweJcZ8+GXviU…
classes3.dex 49152:cTEQbbMsE83zE7B/Gz17WFF1fzSj/FsH9QUR57LH2V3n684CAaNJD5:aEQPMV83…

Dexofuzzy

Information computed with Dexofuzzy.

APK file 12288:GLcvm/PNAe+YAoizhd9wXaBtraG3Lgx2IA1A2bt1PE5rGgwtb5NYIFobuly67WX…
assets/audience_network.dex 3072:HS79SbMZQ2zwPtLHE85MUZVKYoOKQOgM3Lnw8ubOcYNeRzLZZZZZCmLLBoXeNUz:…
classes.dex 6144:GLcvC9/UmuI5PAeIfGlBEOMdRAjdCa4f74Uhd9zkXF8amXdYquiB+GyyyyyyyyCl…
classes2.dex 6144:YLgJv20pD0cTWNEwGUz6t2eBgXHqeAwPE5rd7c6kVSNJuNoEtM1Ie:YLgx2IA1A2…
classes3.dex 6144:WNs/JWWgDiFbI7lyMjzPWVR97RzB/52W/g+iq6IxKQ0v3NXe7G:WNYIFobuly67W…

APK details

Information computed with AndroGuard and Pithus.

Package com.egostudio.clean
App name Super Clean
Version name 1.1.8
Version code 22
SDK 19 - 30
UAID 1559a3e57f4c8b02ad750c844311fff86cc39260
Signature Signature V1 Signature V2
Frosting Not frosted
Blocks found within V2 signature:
  • 0x7109871a: Unknown

Certificate details

Information computed with AndroGuard.

MD5 e51ee3facb1b6d2e7a61444b768bd307
SHA1 77129e9e1811768bfd202fcdf845b87d7d7eef8c
SHA256 3b76e15c91b0f76abd1b1093959897986e6515ef1fa2e5e96d9bba9dcb26fbf1
Issuer Common Name: egostudio, Organizational Unit: egostudio, Organization: egostudio, Locality: Hong Kong, State/Province: Hong Kong, Country: HK
Not before 2020-02-18T10:06:42+00:00
Not after 2045-02-11T10:06:42+00:00

Manifest analysis

Information computed with MobSF.

High Clear text traffic is Enabled For App[android:usesCleartextTraffic=true]
The app intends to use cleartext network traffic, such as cleartext HTTP, FTP stacks, DownloadManager, and MediaPlayer. The default value for apps that target API level 27 or lower is "true". Apps that target API level 28 or higher default to "false". The key reason for avoiding cleartext traffic is the lack of confidentiality, authenticity, and protections against tampering; a network attacker can eavesdrop on transmitted data and also modify it without being detected.
Low App has a Network Security Configuration[android:networkSecurityConfig=@xml/network_config]
The Network Security Configuration feature lets apps customize their network security settings in a safe, declarative configuration file without modifying app code. These settings can be configured for specific domains and for a specific app.
High Launch Mode of Activity (com.egostudio.clean.ui.activity.RequestPermissionsActivity) is not standard.
An Activity should not be having the launch mode attribute set to "singleTask/singleInstance" as it becomes root Activity and it is possible for other applications to read the contents of the calling Intent. So it is required to use the "standard" launch mode attribute when sensitive information is included in an Intent.
High Launch Mode of Activity (com.egostudio.clean.ui.activity.MainActivity) is not standard.
An Activity should not be having the launch mode attribute set to "singleTask/singleInstance" as it becomes root Activity and it is possible for other applications to read the contents of the calling Intent. So it is required to use the "standard" launch mode attribute when sensitive information is included in an Intent.
High TaskAffinity is set for Activity
(com.egostudio.clean.ui.activity.InstallAppTipsActivity)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Launch Mode of Activity (com.egostudio.clean.ui.activity.InstallAppTipsActivity) is not standard.
An Activity should not be having the launch mode attribute set to "singleTask/singleInstance" as it becomes root Activity and it is possible for other applications to read the contents of the calling Intent. So it is required to use the "standard" launch mode attribute when sensitive information is included in an Intent.
High Service (com.egostudio.clean.service.SuperCleanService) is not Protected. [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Launch Mode of Activity (com.egostudio.clean.ui.activity.notification.guide.NotificationCleanerGuideActivity) is not standard.
An Activity should not be having the launch mode attribute set to "singleTask/singleInstance" as it becomes root Activity and it is possible for other applications to read the contents of the calling Intent. So it is required to use the "standard" launch mode attribute when sensitive information is included in an Intent.
High Launch Mode of Activity (com.egostudio.clean.ui.activity.notification.guide.NotificationSystemSettingGuideActivity) is not standard.
An Activity should not be having the launch mode attribute set to "singleTask/singleInstance" as it becomes root Activity and it is possible for other applications to read the contents of the calling Intent. So it is required to use the "standard" launch mode attribute when sensitive information is included in an Intent.
High Launch Mode of Activity (com.egostudio.clean.ui.activity.notification.cleaner.NotificationCleanerActivity) is not standard.
An Activity should not be having the launch mode attribute set to "singleTask/singleInstance" as it becomes root Activity and it is possible for other applications to read the contents of the calling Intent. So it is required to use the "standard" launch mode attribute when sensitive information is included in an Intent.
High Activity (com.egostudio.clean.ui.activity.notification.cleaner.NotificationCleanerActivity) is not Protected. [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Launch Mode of Activity (com.egostudio.clean.ui.activity.DuplicateFileCleanActivity) is not standard.
An Activity should not be having the launch mode attribute set to "singleTask/singleInstance" as it becomes root Activity and it is possible for other applications to read the contents of the calling Intent. So it is required to use the "standard" launch mode attribute when sensitive information is included in an Intent.
High Launch Mode of Activity (com.egostudio.clean.ui.activity.notification.cleaner.NotificationSettingActivity) is not standard.
An Activity should not be having the launch mode attribute set to "singleTask/singleInstance" as it becomes root Activity and it is possible for other applications to read the contents of the calling Intent. So it is required to use the "standard" launch mode attribute when sensitive information is included in an Intent.
High Service (com.egostudio.clean.work.notification.core.NotificationListener) is Protected by a permission, but the protection level of the permission should be checked.
Permission: android.permission.BIND_NOTIFICATION_LISTENER_SERVICE [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Content Provider (com.egostudio.clean.work.manager.NotificationServiceConfigManager$NotificationSPContentProvider) is not Protected. [android:exported=true]
A Content Provider is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Content Provider (com.egostudio.clean.work.notification.core.NotificationContentProvider) is not Protected. [android:exported=true]
A Content Provider is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Content Provider (com.egostudio.clean.work.manager.PermanentNotificationMenuManager$NotificationMenuContentProvider) is not Protected. [android:exported=true]
A Content Provider is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Content Provider (com.egostudio.clean.util.pref.SharedPrefProvider) is not Protected. [android:exported=true]
A Content Provider is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Content Provider (com.egostudio.clean.util.pref.ServiceSharedPrefProvider) is not Protected. [android:exported=true]
A Content Provider is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Launch Mode of Activity (com.egostudio.clean.professional.ui.ProfessionalMainActivity) is not standard.
An Activity should not be having the launch mode attribute set to "singleTask/singleInstance" as it becomes root Activity and it is possible for other applications to read the contents of the calling Intent. So it is required to use the "standard" launch mode attribute when sensitive information is included in an Intent.
High Activity (com.egostudio.clean.professional.ui.ProfessionalMainActivity) is not Protected.An intent-filter exists.
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Activity is explicitly exported.
High Activity (com.egostudio.clean.ui.activity.ReliveEmptyActivity) is not Protected. [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High TaskAffinity is set for Activity
(com.egostudio.clean.ui.activity.FbInsertEmptyActivity)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Launch Mode of Activity (com.egostudio.clean.ui.activity.FbInsertEmptyActivity) is not standard.
An Activity should not be having the launch mode attribute set to "singleTask/singleInstance" as it becomes root Activity and it is possible for other applications to read the contents of the calling Intent. So it is required to use the "standard" launch mode attribute when sensitive information is included in an Intent.
High TaskAffinity is set for Activity
(com.egostudio.clean.ui.activity.ChargingActivity)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Launch Mode of Activity (com.egostudio.clean.ui.activity.ChargingActivity) is not standard.
An Activity should not be having the launch mode attribute set to "singleTask/singleInstance" as it becomes root Activity and it is possible for other applications to read the contents of the calling Intent. So it is required to use the "standard" launch mode attribute when sensitive information is included in an Intent.
High TaskAffinity is set for Activity
(com.egostudio.clean.ui.activity.lock.AppLockVerifyActivity)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.egostudio.clean.ui.activity.lock.AppLockInitActivity) is not Protected. [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High TaskAffinity is set for Activity
(com.egostudio.clean.ui.activity.lock.ResetPasswordActivity)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Launch Mode of Activity (com.egostudio.clean.ui.activity.lock.ResetPasswordActivity) is not standard.
An Activity should not be having the launch mode attribute set to "singleTask/singleInstance" as it becomes root Activity and it is possible for other applications to read the contents of the calling Intent. So it is required to use the "standard" launch mode attribute when sensitive information is included in an Intent.
High TaskAffinity is set for Activity
(com.egostudio.clean.ui.activity.lock.LockAppTipActivity)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Launch Mode of Activity (com.egostudio.clean.ui.activity.lock.LockAppTipActivity) is not standard.
An Activity should not be having the launch mode attribute set to "singleTask/singleInstance" as it becomes root Activity and it is possible for other applications to read the contents of the calling Intent. So it is required to use the "standard" launch mode attribute when sensitive information is included in an Intent.
High TaskAffinity is set for Activity
(com.egostudio.clean.ui.activity.lock.permission.PermissionTransitionActivity)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Launch Mode of Activity (com.egostudio.clean.ui.activity.lock.permission.PermissionSettingGuideActivity) is not standard.
An Activity should not be having the launch mode attribute set to "singleTask/singleInstance" as it becomes root Activity and it is possible for other applications to read the contents of the calling Intent. So it is required to use the "standard" launch mode attribute when sensitive information is included in an Intent.
High Launch Mode of Activity (com.egostudio.clean.ui.activity.AccessibilityPermissionGuideActivity) is not standard.
An Activity should not be having the launch mode attribute set to "singleTask/singleInstance" as it becomes root Activity and it is possible for other applications to read the contents of the calling Intent. So it is required to use the "standard" launch mode attribute when sensitive information is included in an Intent.
High TaskAffinity is set for Activity
(com.egostudio.clean.ui.activity.lock.ShowSelfiePhotoActivity)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Content Provider (com.egostudio.superlock.lib.core.data.AppLockContentProvider) is not Protected. [android:exported=true]
A Content Provider is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Broadcast Receiver (com.egostudio.clean.receiver.InstallReferrerReceiver) is not Protected. [android:exported=true]
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Service (com.egostudio.clean.service.AutomaticService) is Protected by a permission, but the protection level of the permission should be checked.
Permission: android.permission.BIND_ACCESSIBILITY_SERVICE [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Launch Mode of Activity (com.egostudio.clean.ui.activity.BoostActivity) is not standard.
An Activity should not be having the launch mode attribute set to "singleTask/singleInstance" as it becomes root Activity and it is possible for other applications to read the contents of the calling Intent. So it is required to use the "standard" launch mode attribute when sensitive information is included in an Intent.
High Launch Mode of Activity (com.egostudio.clean.ui.activity.CoolingActivity) is not standard.
An Activity should not be having the launch mode attribute set to "singleTask/singleInstance" as it becomes root Activity and it is possible for other applications to read the contents of the calling Intent. So it is required to use the "standard" launch mode attribute when sensitive information is included in an Intent.
High Launch Mode of Activity (com.egostudio.clean.ui.activity.PowerSaveScanActivity) is not standard.
An Activity should not be having the launch mode attribute set to "singleTask/singleInstance" as it becomes root Activity and it is possible for other applications to read the contents of the calling Intent. So it is required to use the "standard" launch mode attribute when sensitive information is included in an Intent.
High Launch Mode of Activity (com.egostudio.clean.ui.activity.PowerSaveActivity) is not standard.
An Activity should not be having the launch mode attribute set to "singleTask/singleInstance" as it becomes root Activity and it is possible for other applications to read the contents of the calling Intent. So it is required to use the "standard" launch mode attribute when sensitive information is included in an Intent.
High Launch Mode of Activity (com.egostudio.clean.ui.activity.VideoClearActivity) is not standard.
An Activity should not be having the launch mode attribute set to "singleTask/singleInstance" as it becomes root Activity and it is possible for other applications to read the contents of the calling Intent. So it is required to use the "standard" launch mode attribute when sensitive information is included in an Intent.
High Launch Mode of Activity (com.egostudio.clean.ui.activity.BigFileClearActivity) is not standard.
An Activity should not be having the launch mode attribute set to "singleTask/singleInstance" as it becomes root Activity and it is possible for other applications to read the contents of the calling Intent. So it is required to use the "standard" launch mode attribute when sensitive information is included in an Intent.
High Launch Mode of Activity (com.egostudio.clean.ui.activity.TrashClearActivity) is not standard.
An Activity should not be having the launch mode attribute set to "singleTask/singleInstance" as it becomes root Activity and it is possible for other applications to read the contents of the calling Intent. So it is required to use the "standard" launch mode attribute when sensitive information is included in an Intent.
High Launch Mode of Activity (com.egostudio.clean.ui.activity.WifiSafeActivity) is not standard.
An Activity should not be having the launch mode attribute set to "singleTask/singleInstance" as it becomes root Activity and it is possible for other applications to read the contents of the calling Intent. So it is required to use the "standard" launch mode attribute when sensitive information is included in an Intent.
High Launch Mode of Activity (com.egostudio.clean.ui.activity.WifiResultActivity) is not standard.
An Activity should not be having the launch mode attribute set to "singleTask/singleInstance" as it becomes root Activity and it is possible for other applications to read the contents of the calling Intent. So it is required to use the "standard" launch mode attribute when sensitive information is included in an Intent.
High Activity (com.egostudio.clean.ui.activity.PrivacyPolicyActivity) is not Protected. [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Launch Mode of Activity (com.egostudio.clean.work.newpush.ImitateNotificationActivity) is not standard.
An Activity should not be having the launch mode attribute set to "singleTask/singleInstance" as it becomes root Activity and it is possible for other applications to read the contents of the calling Intent. So it is required to use the "standard" launch mode attribute when sensitive information is included in an Intent.
High Content Provider (com.egostudio.clean.work.manager.ForegroundManager) is not Protected. [android:exported=true]
A Content Provider is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Content Provider (com.egostudio.clean.ads.ForegroundAdLoader) is not Protected. [android:exported=true]
A Content Provider is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High TaskAffinity is set for Activity
(com.egostudio.clean.ui.activity.OutWindowActivity)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Launch Mode of Activity (com.egostudio.clean.ui.activity.OutWindowActivity) is not standard.
An Activity should not be having the launch mode attribute set to "singleTask/singleInstance" as it becomes root Activity and it is possible for other applications to read the contents of the calling Intent. So it is required to use the "standard" launch mode attribute when sensitive information is included in an Intent.
High Service (com.egostudio.clean.wallpaper.LiveWallpaperService) is Protected by a permission, but the protection level of the permission should be checked.
Permission: android.permission.BIND_WALLPAPER [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Launch Mode of Activity (com.egostudio.clean.wallpaper.WallpaperAnimActivity) is not standard.
An Activity should not be having the launch mode attribute set to "singleTask/singleInstance" as it becomes root Activity and it is possible for other applications to read the contents of the calling Intent. So it is required to use the "standard" launch mode attribute when sensitive information is included in an Intent.
High TaskAffinity is set for Activity
(com.google.android.gms.ads.AdActivity)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Launch Mode of Activity (com.google.android.gms.ads.AdActivity) is not standard.
An Activity should not be having the launch mode attribute set to "singleTask/singleInstance" as it becomes root Activity and it is possible for other applications to read the contents of the calling Intent. So it is required to use the "standard" launch mode attribute when sensitive information is included in an Intent.
High TaskAffinity is set for Activity
(com.facebook.ads.AudienceNetworkActivity)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Launch Mode of Activity (com.facebook.ads.AudienceNetworkActivity) is not standard.
An Activity should not be having the launch mode attribute set to "singleTask/singleInstance" as it becomes root Activity and it is possible for other applications to read the contents of the calling Intent. So it is required to use the "standard" launch mode attribute when sensitive information is included in an Intent.
High TaskAffinity is set for Activity
(com.bytedance.sdk.openadsdk.activity.TTWebsiteActivity)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Launch Mode of Activity (com.bytedance.sdk.openadsdk.activity.TTWebsiteActivity) is not standard.
An Activity should not be having the launch mode attribute set to "singleTask/singleInstance" as it becomes root Activity and it is possible for other applications to read the contents of the calling Intent. So it is required to use the "standard" launch mode attribute when sensitive information is included in an Intent.
High TaskAffinity is set for Activity
(com.bytedance.sdk.openadsdk.activity.TTLandingPageActivity)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Launch Mode of Activity (com.bytedance.sdk.openadsdk.activity.TTLandingPageActivity) is not standard.
An Activity should not be having the launch mode attribute set to "singleTask/singleInstance" as it becomes root Activity and it is possible for other applications to read the contents of the calling Intent. So it is required to use the "standard" launch mode attribute when sensitive information is included in an Intent.
High TaskAffinity is set for Activity
(com.mbridge.msdk.reward.player.MBRewardVideoActivity)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Launch Mode of Activity (com.mbridge.msdk.reward.player.MBRewardVideoActivity) is not standard.
An Activity should not be having the launch mode attribute set to "singleTask/singleInstance" as it becomes root Activity and it is possible for other applications to read the contents of the calling Intent. So it is required to use the "standard" launch mode attribute when sensitive information is included in an Intent.
High TaskAffinity is set for Activity
(com.unity3d.services.ads.adunit.AdUnitActivity)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Launch Mode of Activity (com.unity3d.services.ads.adunit.AdUnitActivity) is not standard.
An Activity should not be having the launch mode attribute set to "singleTask/singleInstance" as it becomes root Activity and it is possible for other applications to read the contents of the calling Intent. So it is required to use the "standard" launch mode attribute when sensitive information is included in an Intent.
High TaskAffinity is set for Activity
(com.applovin.adview.AppLovinFullscreenActivity)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Launch Mode of Activity (com.applovin.adview.AppLovinFullscreenActivity) is not standard.
An Activity should not be having the launch mode attribute set to "singleTask/singleInstance" as it becomes root Activity and it is possible for other applications to read the contents of the calling Intent. So it is required to use the "standard" launch mode attribute when sensitive information is included in an Intent.
High TaskAffinity is set for Activity
(com.applovin.adview.AppLovinInterstitialActivity)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High TaskAffinity is set for Activity
(com.adcolony.sdk.AdColonyInterstitialActivity)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High TaskAffinity is set for Activity
(com.bytedance.sdk.openadsdk.activity.TTFullScreenVideoActivity)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Launch Mode of Activity (com.bytedance.sdk.openadsdk.activity.TTFullScreenVideoActivity) is not standard.
An Activity should not be having the launch mode attribute set to "singleTask/singleInstance" as it becomes root Activity and it is possible for other applications to read the contents of the calling Intent. So it is required to use the "standard" launch mode attribute when sensitive information is included in an Intent.
High TaskAffinity is set for Activity
(com.bytedance.sdk.openadsdk.activity.TTFullScreenExpressVideoActivity)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Launch Mode of Activity (com.bytedance.sdk.openadsdk.activity.TTFullScreenExpressVideoActivity) is not standard.
An Activity should not be having the launch mode attribute set to "singleTask/singleInstance" as it becomes root Activity and it is possible for other applications to read the contents of the calling Intent. So it is required to use the "standard" launch mode attribute when sensitive information is included in an Intent.
High TaskAffinity is set for Activity
(com.vungle.warren.ui.VungleActivity)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High TaskAffinity is set for Activity
(com.egostudio.clean.ads.InsertAdHandlerActivity)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Launch Mode of Activity (com.egostudio.clean.ads.InsertAdHandlerActivity) is not standard.
An Activity should not be having the launch mode attribute set to "singleTask/singleInstance" as it becomes root Activity and it is possible for other applications to read the contents of the calling Intent. So it is required to use the "standard" launch mode attribute when sensitive information is included in an Intent.
High Service (com.net.jobscheduler.ZQJobService) is Protected by a permission, but the protection level of the permission should be checked.
Permission: android.permission.BIND_JOB_SERVICE [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Service (com.net.account.AuthenticatorService) is not Protected. [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Service (com.net.account.SyncService3) is not Protected. [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Content Provider (com.net.account.SyncProvider3) is not Protected. [android:exported=true]
A Content Provider is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Content Provider (com.daemon.process.provider.P0) is not Protected. [android:exported=true]
A Content Provider is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Content Provider (com.daemon.process.provider.P1) is not Protected. [android:exported=true]
A Content Provider is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Content Provider (com.daemon.process.provider.P2) is not Protected. [android:exported=true]
A Content Provider is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Content Provider (com.daemon.process.provider.P3) is not Protected. [android:exported=true]
A Content Provider is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Content Provider (com.daemon.process.provider.P4) is not Protected. [android:exported=true]
A Content Provider is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Content Provider (com.daemon.process.provider.P5) is not Protected. [android:exported=true]
A Content Provider is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Service (com.daemon.process.services.DeskService) is not Protected. [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Service (com.daemon.process.services.DService) is not Protected. [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Service (com.daemon.process.services.AFService) is not Protected. [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Service (com.daemon.process.services.ASService) is not Protected. [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Broadcast Receiver (com.onesignal.FCMBroadcastReceiver) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.google.android.c2dm.permission.SEND [android:exported=true]
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Activity (com.onesignal.NotificationOpenedActivityHMS) is not Protected. [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Broadcast Receiver (com.onesignal.NotificationDismissReceiver) is not Protected. [android:exported=true]
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Broadcast Receiver (com.onesignal.BootUpReceiver) is not Protected. [android:exported=true]
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Broadcast Receiver (com.onesignal.UpgradeReceiver) is not Protected. [android:exported=true]
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Activity (com.onesignal.NotificationOpenedReceiver) is not Protected. [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Activity (com.onesignal.NotificationOpenedReceiverAndroid22AndOlder) is not Protected. [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Activity (com.facebook.CustomTabActivity) is not Protected. [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High TaskAffinity is set for Activity
(com.egostudio.superlock.lib.core.ui.activity.FingerprintActivity)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Launch Mode of Activity (com.egostudio.superlock.lib.core.ui.activity.FingerprintActivity) is not standard.
An Activity should not be having the launch mode attribute set to "singleTask/singleInstance" as it becomes root Activity and it is possible for other applications to read the contents of the calling Intent. So it is required to use the "standard" launch mode attribute when sensitive information is included in an Intent.
High Service (com.egostudio.superlock.lib.core.dispatch.DispatchService) is not Protected.An intent-filter exists.
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Service is explicitly exported.
High Content Provider (com.egostudio.superlock.lib.core.dispatch.DispatchContentProvider) is not Protected. [android:exported=true]
A Content Provider is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Broadcast Receiver (com.egostudio.superlock.lib.core.receiver.ScreenStatusReceiver) is not Protected.An intent-filter exists.
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Broadcast Receiver is explicitly exported.
High Service (com.ludashi.watchdog.wallpaper.CWallpaperService) is Protected by a permission, but the protection level of the permission should be checked.
Permission: android.permission.BIND_WALLPAPER [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Service (com.ludashi.watchdog.keepalive.ProtectService) is not Protected. [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Broadcast Receiver (com.ludashi.watchdog.receiver.DaemonReceiver) is not Protected.An intent-filter exists.
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Broadcast Receiver is explicitly exported.
High Broadcast Receiver (androidx.core.app.PowerExportReceiver) is not Protected. [android:exported=true]
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Service (androidx.core.app.PowerExportService) is not Protected. [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Service (com.ludashi.watchdog.account.AuthenticatorService) is not Protected. [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Service (com.ludashi.watchdog.account.SyncService) is not Protected. [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Content Provider (com.ludashi.watchdog.account.StubProvider) is not Protected. [android:exported=true]
A Content Provider is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Content Provider (com.ludashi.watchdog.keepalive.BaseProvider3) is not Protected. [android:exported=true]
A Content Provider is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Content Provider (com.ludashi.watchdog.keepalive.SyncContentProvider) is not Protected. [android:exported=true]
A Content Provider is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Broadcast Receiver (com.google.firebase.iid.FirebaseInstanceIdReceiver) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.google.android.c2dm.permission.SEND [android:exported=true]
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Service (androidx.work.impl.background.systemjob.SystemJobService) is Protected by a permission, but the protection level of the permission should be checked.
Permission: android.permission.BIND_JOB_SERVICE [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Broadcast Receiver (androidx.work.impl.diagnostics.DiagnosticsReceiver) is Protected by a permission, but the protection level of the permission should be checked.
Permission: android.permission.DUMP [android:exported=true]
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
Medium High Intent Priority (999)[android:priority]
By setting an intent priority higher than another intent, the app effectively overrides other requests.
Medium High Intent Priority (1000)[android:priority]
By setting an intent priority higher than another intent, the app effectively overrides other requests.
Medium High Intent Priority (2147483647)[android:priority]
By setting an intent priority higher than another intent, the app effectively overrides other requests.
Medium High Intent Priority (2147483647)[android:priority]
By setting an intent priority higher than another intent, the app effectively overrides other requests.
Medium High Intent Priority (2147483647)[android:priority]
By setting an intent priority higher than another intent, the app effectively overrides other requests.
Medium High Intent Priority (2147483647)[android:priority]
By setting an intent priority higher than another intent, the app effectively overrides other requests.

Browsable activities

Information computed with MobSF.

com.facebook.CustomTabActivity

Hosts: cct.com.egostudio.clean

Schemes: fbconnect://

Main Activity

Information computed with AndroGuard.

com.egostudio.clean.ui.activity.SplashActivity

Activities

Information computed with AndroGuard.

com.egostudio.clean.ui.activity.RequestPermissionsActivity
com.egostudio.clean.ui.activity.SplashActivity
com.egostudio.clean.ui.activity.MainActivity
com.egostudio.clean.ui.activity.FeedBackActivity
com.egostudio.clean.ui.activity.InstallAppTipsActivity
com.egostudio.clean.ui.activity.notification.guide.NotificationCleanerGuideActivity
com.egostudio.clean.ui.activity.notification.guide.NotificationSystemSettingGuideActivity
com.egostudio.clean.ui.activity.notification.cleaner.NotificationCleanerActivity
com.egostudio.clean.ui.activity.DuplicateFileCleanActivity
com.egostudio.clean.ui.activity.notification.cleaner.NotificationSettingActivity
com.egostudio.clean.professional.ui.ProfessionalMainActivity
com.egostudio.clean.ui.activity.ReliveEmptyActivity
com.egostudio.clean.ui.activity.FbInsertEmptyActivity
com.egostudio.clean.ui.activity.SettingActivity
com.egostudio.clean.ui.activity.OptimizeSettingActivity
com.egostudio.clean.ui.activity.FunctionRecommendActivity
com.egostudio.clean.ui.activity.ClearWhitelistActivity
com.egostudio.clean.ui.activity.ChargingActivity
com.egostudio.clean.ui.activity.lock.AppLockMainActivity
com.egostudio.clean.ui.activity.lock.AppLockCreateActivity
com.egostudio.clean.ui.activity.lock.AppLockVerifyActivity
com.egostudio.clean.ui.activity.lock.AppLockInitActivity
com.egostudio.clean.ui.activity.lock.AppLockCreateForInitActivity
com.egostudio.clean.ui.activity.lock.AppLockSettingActivity
com.egostudio.clean.ui.activity.lock.SetupEmailActivity
com.egostudio.clean.ui.activity.lock.ResetPasswordActivity
com.egostudio.clean.ui.activity.lock.IntruderSelfieActivity
com.egostudio.clean.ui.activity.lock.LockAppTipActivity
com.egostudio.clean.ui.activity.lock.permission.PermissionTransitionActivity
com.egostudio.clean.ui.activity.lock.permission.PermissionSettingGuideActivity
com.egostudio.clean.ui.activity.AccessibilityPermissionGuideActivity
com.egostudio.clean.ui.activity.lock.ShowSelfiePhotoActivity
com.egostudio.clean.ui.activity.BoostActivity
com.egostudio.clean.ui.activity.CoolingActivity
com.egostudio.clean.ui.activity.PowerSaveScanActivity
com.egostudio.clean.ui.activity.PowerSaveActivity
com.egostudio.clean.ui.activity.ClearResultActivity
com.egostudio.clean.ui.activity.ProfessionClearResultActivity
com.egostudio.clean.ui.activity.CoolingResultActivity
com.egostudio.clean.ui.activity.VideoClearActivity
com.egostudio.clean.ui.activity.BigFileClearActivity
com.egostudio.clean.ui.activity.TrashClearActivity
com.egostudio.clean.ui.activity.TestActvity
com.egostudio.clean.ui.activity.PermissionManageActivity
com.egostudio.clean.ui.activity.UnInstallClearActivity
com.egostudio.clean.ui.activity.InstallClearActivity
com.egostudio.clean.ui.activity.WifiSafeActivity
com.egostudio.clean.ui.activity.WifiResultActivity
com.egostudio.clean.ui.activity.PrivacyPolicyActivity
com.egostudio.clean.work.newpush.ImitateNotificationActivity
com.egostudio.clean.ui.activity.OutWindowActivity
com.egostudio.clean.wallpaper.WallpaperAnimActivity
com.google.android.gms.ads.AdActivity
com.facebook.ads.AudienceNetworkActivity
com.bytedance.sdk.openadsdk.activity.TTWebsiteActivity
com.bytedance.sdk.openadsdk.activity.TTLandingPageActivity
com.mbridge.msdk.reward.player.MBRewardVideoActivity
com.unity3d.services.ads.adunit.AdUnitActivity
com.applovin.adview.AppLovinFullscreenActivity
com.applovin.adview.AppLovinInterstitialActivity
com.adcolony.sdk.AdColonyInterstitialActivity
com.bytedance.sdk.openadsdk.activity.TTFullScreenVideoActivity
com.bytedance.sdk.openadsdk.activity.TTFullScreenExpressVideoActivity
com.vungle.warren.ui.VungleActivity
com.egostudio.clean.ads.InsertAdHandlerActivity
com.applovin.sdk.AppLovinWebViewActivity
com.applovin.mediation.MaxDebuggerActivity
com.applovin.mediation.MaxDebuggerDetailActivity
com.applovin.mediation.MaxDebuggerMultiAdActivity
com.applovin.mediation.MaxDebuggerAdUnitsListActivity
com.applovin.mediation.MaxDebuggerAdUnitDetailActivity
com.applovin.mediation.MaxDebuggerTestLiveNetworkActivity
com.onesignal.NotificationOpenedActivityHMS
com.onesignal.PermissionsActivity
com.onesignal.NotificationOpenedReceiver
com.onesignal.NotificationOpenedReceiverAndroid22AndOlder
com.facebook.FacebookActivity
com.facebook.CustomTabMainActivity
com.facebook.CustomTabActivity
com.egostudio.superlock.lib.core.ui.activity.FingerprintActivity
com.google.android.gms.common.api.GoogleApiActivity
com.bytedance.sdk.openadsdk.activity.TTPlayableLandingPageActivity
com.bytedance.sdk.openadsdk.activity.TTVideoLandingPageActivity
com.bytedance.sdk.openadsdk.activity.TTVideoLandingPageLink2Activity
com.bytedance.sdk.openadsdk.activity.TTRewardVideoActivity
com.bytedance.sdk.openadsdk.activity.TTRewardExpressVideoActivity
com.bytedance.sdk.openadsdk.activity.TTDelegateActivity
com.bytedance.sdk.openadsdk.activity.TTAppOpenAdActivity
com.bytedance.sdk.openadsdk.adapter.PangleAdInterstitialActivity
com.adcolony.sdk.AdColonyAdViewActivity
com.mbridge.msdk.interstitial.view.MBInterstitialActivity
com.mbridge.msdk.activity.MBCommonActivity
com.mbridge.msdk.out.LoadingActivity
com.unity3d.services.ads.adunit.AdUnitTransparentActivity
com.unity3d.services.ads.adunit.AdUnitTransparentSoftwareActivity
com.unity3d.services.ads.adunit.AdUnitSoftwareActivity

Receivers

Information computed with AndroGuard.

com.egostudio.clean.service.alive.receiver.ShortcutsReceiver
com.egostudio.clean.receiver.InstallReferrerReceiver
com.daemon.process.receivers.DReceiver
com.daemon.process.receivers.AFReceiver
com.daemon.process.receivers.ASReceiver
com.onesignal.FCMBroadcastReceiver
com.onesignal.NotificationDismissReceiver
com.onesignal.BootUpReceiver
com.onesignal.UpgradeReceiver
com.facebook.CurrentAccessTokenExpirationBroadcastReceiver
com.egostudio.superlock.lib.core.receiver.ScreenStatusReceiver
com.ludashi.watchdog.receiver.PhoneStateReceiver
com.ludashi.watchdog.receiver.DaemonReceiver
androidx.core.app.PowerExportReceiver
com.google.android.gms.measurement.AppMeasurementReceiver
com.google.firebase.iid.FirebaseInstanceIdReceiver
androidx.work.impl.utils.ForceStopRunnable$BroadcastReceiver
androidx.work.impl.background.systemalarm.ConstraintProxy$BatteryChargingProxy
androidx.work.impl.background.systemalarm.ConstraintProxy$BatteryNotLowProxy
androidx.work.impl.background.systemalarm.ConstraintProxy$StorageNotLowProxy
androidx.work.impl.background.systemalarm.ConstraintProxy$NetworkStateProxy
androidx.work.impl.background.systemalarm.RescheduleReceiver
androidx.work.impl.background.systemalarm.ConstraintProxyUpdateReceiver
androidx.work.impl.diagnostics.DiagnosticsReceiver

Services

Information computed with AndroGuard.

com.egostudio.clean.service.SuperCleanService
com.egostudio.clean.service.SuperCleanService$InnerService
com.egostudio.clean.service.alive.NotifyCleanService
com.egostudio.clean.work.notification.core.NotificationListener
com.egostudio.clean.service.AutomaticService
com.egostudio.clean.service.BigFileScanService
com.egostudio.clean.service.FingerprintAuthService
com.egostudio.clean.wallpaper.LiveWallpaperService
com.net.grayservice.GrayService
com.net.jobscheduler.ZQJobService
com.net.account.AuthenticatorService
com.net.account.SyncService3
com.net.daemon.BaseService1
com.net.daemon.BaseService2
com.net.daemon.BaseService3
com.daemon.process.services.DeskService
com.daemon.process.services.DService
com.daemon.process.services.AFService
com.daemon.process.services.ASService
com.applovin.impl.sdk.utils.AppKilledService
com.applovin.impl.adview.activity.FullscreenAdService
com.onesignal.HmsMessageServiceOneSignal
com.onesignal.FCMIntentService
com.onesignal.FCMIntentJobService
com.onesignal.SyncService
com.onesignal.SyncJobService
com.google.firebase.components.ComponentDiscoveryService
com.egostudio.superlock.lib.core.dispatch.DispatchService
com.ludashi.watchdog.job.AliveJobService
com.ludashi.watchdog.notification.NotificationService
com.ludashi.watchdog.wallpaper.CWallpaperService
com.ludashi.watchdog.keepalive.PlayMusicService
com.ludashi.watchdog.keepalive.ProtectService
androidx.core.app.PowerExportService
androidx.core.app.PowerAssistService
androidx.core.app.PowerOtherService
androidx.core.app.PowerCleanService
com.ludashi.watchdog.account.AuthenticatorService
com.ludashi.watchdog.account.SyncService
com.google.android.gms.measurement.AppMeasurementService
com.google.android.gms.measurement.AppMeasurementJobService
com.google.firebase.messaging.FirebaseMessagingService
com.google.android.gms.ads.AdService
androidx.work.impl.background.systemalarm.SystemAlarmService
androidx.work.impl.background.systemjob.SystemJobService
androidx.work.impl.foreground.SystemForegroundService
com.bytedance.sdk.openadsdk.multipro.aidl.BinderPoolService
androidx.room.MultiInstanceInvalidationService

Sample timeline

Oldest file found in APK Jan. 1, 1981, 1:01 a.m.
Latest file found in APK Jan. 1, 1981, 1:01 a.m.
Certificate valid not before Feb. 18, 2020, 10:06 a.m.
First submission on VT July 22, 2022, 2:54 p.m.
Last submission on VT July 22, 2022, 2:54 p.m.
Upload on Pithus July 25, 2022, 12:28 p.m.
Certificate valid not after Feb. 11, 2045, 10:06 a.m.

NIAP analysis

Information computed with MobSF.

FCS_RBG_EXT.1.1 The application invoke platform-provided DRBG functionality for its cryptographic operations.
Random Bit Generation Services
FCS_STO_EXT.1.1 The application does not store any credentials to non-volatile memory.
Storage of Credentials
FCS_CKM_EXT.1.1 The application implement asymmetric key generation.
Cryptographic Key Generation Services
FDP_DEC_EXT.1.1 The application has access to ['location', 'bluetooth', 'camera', 'network connectivity'].
Access to Platform Resources
FDP_DEC_EXT.1.2 The application has access to no sensitive information repositories.
Access to Platform Resources
FDP_NET_EXT.1.1 The application has user/application initiated network communications.
Network Communications
FDP_DAR_EXT.1.1 The application implement functionality to encrypt sensitive data in non-volatile memory.
Encryption Of Sensitive Application Data
FMT_MEC_EXT.1.1 The application invoke the mechanisms recommended by the platform vendor for storing and setting configuration options.
Supported Configuration Mechanism
FTP_DIT_EXT.1.1 The application does encrypt some transmitted data with HTTPS/TLS/SSH between itself and another trusted IT product.
Protection of Data in Transit
FCS_RBG_EXT.2.1
FCS_RBG_EXT.2.2
The application perform all deterministic random bit generation (DRBG) services in accordance with NIST Special Publication 800-90A using Hash_DRBG. The deterministic RBG is seeded by an entropy source that accumulates entropy from a platform-based DRBG and a software-based noise source, with a minimum of 256 bits of entropy at least equal to the greatest security strength (according to NIST SP 800-57) of the keys and hashes that it will generate.
Random Bit Generation from Application
FCS_CKM.1.1(1) The application generate asymmetric cryptographic keys not in accordance with FCS_CKM.1.1(1) using key generation algorithm RSA schemes and cryptographic key sizes of 1024-bit or lower.
Cryptographic Asymmetric Key Generation
FCS_COP.1.1(1) The application perform encryption/decryption not in accordance with FCS_COP.1.1(1), AES-ECB mode is being used.
Cryptographic Operation - Encryption/Decryption
FCS_COP.1.1(2) The application perform cryptographic hashing services not in accordance with FCS_COP.1.1(2) and uses the cryptographic algorithm RC2/RC4/MD4/MD5.
Cryptographic Operation - Hashing
FCS_HTTPS_EXT.1.1 The application implement the HTTPS protocol that complies with RFC 2818.
HTTPS Protocol
FCS_HTTPS_EXT.1.2 The application implement HTTPS using TLS.
HTTPS Protocol
FCS_HTTPS_EXT.1.3 The application notify the user and not establish the connection or request application authorization to establish the connection if the peer certificate is deemed invalid.
HTTPS Protocol
FIA_X509_EXT.1.1 The application invoked platform-provided functionality to validate certificates in accordance with the following rules: ['The certificate path must terminate with a trusted CA certificate'].
X.509 Certificate Validation
FIA_X509_EXT.2.1 The application use X.509v3 certificates as defined by RFC 5280 to support authentication for HTTPS , TLS.
X.509 Certificate Authentication
FIA_X509_EXT.2.2 When the application cannot establish a connection to determine the validity of a certificate, the application allow the administrator to choose whether to accept the certificate in these cases or accept the certificate ,or not accept the certificate.
X.509 Certificate Authentication
FPT_TUD_EXT.2.1 The application shall be distributed using the format of the platform-supported package manager.
Integrity for Installation and Update

Code analysis

Information computed with MobSF.

Low
CVSS:7.5
The App logs information. Sensitive information should never be logged.
MASVS: MSTG-STORAGE-3
CWE-532 Insertion of Sensitive Information into Log File
Files:
 com/vungle/warren/ui/view/BaseAdView.java
com/bytedance/sdk/openadsdk/component/reward/a/e.java
com/mbridge/msdk/playercommon/exoplayer2/drm/DefaultDrmSessionManager.java
com/mbridge/msdk/playercommon/exoplayer2/extractor/mp4/TrackEncryptionBox.java
com/unity3d/services/core/configuration/Experiments.java
com/unity3d/services/core/device/OpenAdvertisingId.java
com/bumptech/glide/m/h/f.java
com/vungle/warren/utility/CookieUtil.java
com/vungle/warren/ui/view/LocalAdView.java
com/mbridge/msdk/playercommon/exoplayer2/upstream/DefaultHttpDataSource.java
com/mbridge/msdk/playercommon/exoplayer2/extractor/wav/WavHeaderReader.java
clear/sdk/q.java
com/unity3d/services/banners/BannerView.java
clear/sdk/hr.java
com/mbridge/msdk/foundation/same/b/e.java
com/applovin/impl/sdk/nativeAd/AppLovinMediaView.java
com/vungle/warren/log/LogManager.java
clear/sdk/gl.java
com/mbridge/msdk/playercommon/exoplayer2/upstream/Loader.java
com/bykv/vk/openvk/component/video/api/f/c.java
com/unity3d/services/ads/video/VideoPlayerView.java
com/bumptech/glide/load/resource/bitmap/d.java
com/unity3d/services/core/misc/JsonFlattener.java
com/bytedance/sdk/openadsdk/core/h/e.java
com/unity3d/services/core/cache/CacheThread.java
com/vungle/warren/Banners.java
com/unity3d/services/core/webview/bridge/NativeCallback.java
com/vungle/warren/Plugin.java
com/unity3d/services/core/api/Intent.java
com/mbridge/msdk/playercommon/exoplayer2/extractor/ogg/VorbisUtil.java
com/unity3d/services/core/request/WebRequestThread.java
com/unity3d/services/ads/api/AdUnit.java
b/b/b/f.java
com/unity3d/services/core/webview/bridge/WebViewBridgeInterface.java
com/vungle/warren/model/Placement.java
com/bumptech/glide/load/resource/bitmap/b.java
com/vungle/warren/ui/view/VungleWebClient.java
com/bumptech/glide/load/resource/bitmap/h.java
com/mbridge/msdk/mbnative/controller/b.java
com/iab/omid/library/applovin/d/c.java
com/vungle/warren/ui/view/VungleNativeView.java
com/ludashi/watchdog/receiver/PhoneStateReceiver.java
com/unity3d/services/core/api/Cache.java
com/mbridge/msdk/playercommon/exoplayer2/MediaPeriodHolder.java
com/unity3d/services/core/device/AdvertisingId.java
com/mbridge/msdk/playercommon/exoplayer2/SimpleExoPlayer.java
com/bumptech/glide/o/h/k.java
com/mbridge/msdk/playercommon/exoplayer2/video/DummySurface.java
com/ludashi/watchdog/service/BaseService.java
com/mbridge/msdk/playercommon/exoplayer2/drm/DefaultDrmSession.java
com/unity3d/services/core/request/metrics/MetricSender.java
com/unity3d/ads/UnityAdsBaseOptions.java
com/unity3d/services/core/request/WebRequest.java
com/vungle/warren/Vungle.java
com/unity3d/services/core/device/Storage.java
com/airbnb/lottie/w/c.java
com/unity3d/services/core/configuration/ConfigurationReader.java
com/qihoo/cleandroid/sdk/plugins/NativeFuncsImpl.java
com/mbridge/msdk/playercommon/exoplayer2/text/cea/Cea708Decoder.java
com/vungle/warren/tasks/CacheBustJob.java
com/mbridge/msdk/playercommon/exoplayer2/extractor/mp4/MetadataUtil.java
com/apm/insight/l/q.java
com/unity3d/services/core/webview/bridge/Invocation.java
com/unity3d/services/ads/gmascar/adapters/ScarAdapterFactory.java
clear/sdk/ht.java
com/unity3d/services/ads/gmascar/bridges/AdapterStatusBridge.java
b/e/a/a/c/h/c.java
clear/sdk/m.java
com/unity3d/services/core/broadcast/BroadcastEventReceiver.java
com/egostudio/clean/c/a.java
com/mbridge/msdk/playercommon/exoplayer2/video/MediaCodecVideoRenderer.java
com/unity3d/services/ads/api/VideoPlayer.java
com/vungle/warren/AdLoader.java
com/egostudio/clean/c/g.java
com/onesignal/g.java
com/unity3d/services/core/api/DeviceInfo.java
com/onesignal/u2.java
clear/sdk/s.java
com/unity3d/services/core/properties/ClientProperties.java
com/mbridge/msdk/playercommon/exoplayer2/metadata/id3/Id3Decoder.java
com/unity3d/services/core/misc/ViewUtilities.java
com/unity3d/services/core/configuration/InitializeEventsMetricSender.java
com/bytedance/sdk/component/f/d/a.java
com/vungle/warren/ui/presenter/MRAIDAdPresenter.java
com/egostudio/clean/ui/widget/slidingup/SlidingUpPanelLayout.java
com/bumptech/glide/g.java
clear/sdk/bw.java
com/vungle/warren/CacheBustManager.java
com/ludashi/watchdog/keepalive/PlayMusicService.java
com/vungle/warren/AdActivity.java
com/mbridge/msdk/playercommon/exoplayer2/upstream/DefaultDataSource.java
com/vungle/warren/log/LogPersister.java
com/bumptech/glide/load/engine/cache/MemorySizeCalculator.java
com/bytedance/sdk/component/utils/HomeWatcherReceiver.java
com/bumptech/glide/m/i/a.java
com/unity3d/services/ads/UnityAdsImplementation.java
com/mbridge/msdk/playercommon/exoplayer2/upstream/cache/CachedRegionTracker.java
com/unity3d/services/core/request/metrics/MetricSenderWithBatch.java
com/bumptech/glide/k/a.java
com/bytedance/sdk/component/e/c/b.java
com/egostudio/clean/ui/widget/appboost/AppCleanView.java
com/mbridge/msdk/mbnative/controller/NativeController.java
com/adcolony/sdk/c0.java
com/apm/insight/k/k.java
O00000Oo/O000000o/O000000o/O000000o/LogUtils.java
com/bytedance/sdk/openadsdk/activity/TTBaseVideoActivity.java
clear/sdk/z.java
com/applovin/impl/sdk/v.java
com/apm/insight/h/a.java
com/vungle/warren/VungleBanner.java
com/mbridge/msdk/playercommon/exoplayer2/extractor/mkv/MatroskaExtractor.java
com/bumptech/glide/load/engine/cache/e.java
com/unity3d/services/banners/UnityBanners.java
com/vungle/warren/VungleLogger.java
com/bumptech/glide/load/model/n.java
com/unity3d/services/ads/adunit/VideoPlayerHandler.java
com/vungle/warren/tasks/SendReportsJob.java
com/vungle/warren/persistence/GraphicDesigner.java
com/bytedance/sdk/component/adexpress/d/a.java
clear/sdk/u.java
com/bumptech/glide/load/model/m.java
com/vungle/warren/utility/FileUtility.java
com/onesignal/JobIntentService.java
clear/sdk/cx.java
com/ludashi/watchdog/wallpaper/CWallpaperService.java
com/unity3d/services/core/configuration/InitializationNotificationCenter.java
com/adcolony/sdk/AdColonyAppOptions.java
com/mbridge/msdk/playercommon/exoplayer2/util/Util.java
com/unity3d/services/ads/adunit/AdUnitActivity.java
com/unity3d/services/ads/gmascar/finder/ScarVersionFinder.java
com/bykv/vk/openvk/component/video/a/b/b.java
com/unity3d/services/core/api/Sdk.java
com/unity3d/services/core/webview/WebViewApp.java
clear/sdk/dq.java
com/bumptech/glide/m/i/m/f.java
com/mbridge/msdk/playercommon/exoplayer2/ExoPlayerImpl.java
com/airbnb/lottie/LottieAnimationView.java
com/bytedance/sdk/openadsdk/core/y.java
com/unity3d/services/store/core/StoreLifecycleListener.java
com/unity3d/services/core/device/Device.java
clear/sdk/jb.java
com/unity3d/services/core/misc/JsonStorageAggregator.java
com/unity3d/services/store/gpbl/bridges/CommonJsonResponseBridge.java
com/unity3d/services/core/device/reader/DeviceInfoReader.java
com/bumptech/glide/load/resource/bitmap/i.java
com/mbridge/msdk/playercommon/exoplayer2/util/NalUnitUtil.java
com/adjust/sdk/Logger.java
com/vungle/warren/persistence/Repository.java
com/bytedance/sdk/openadsdk/l/s.java
clear/sdk/r.java
com/mbridge/msdk/playercommon/exoplayer2/text/webvtt/WebvttCue.java
com/bykv/vk/openvk/component/video/a/c/a.java
com/qihoo360/mobilesafe/opti/clear/db/dex/LaunchApps.java
clear/sdk/ij.java
com/unity3d/services/core/cache/CacheDirectory.java
com/bumptech/glide/load/resource/gif/i.java
com/unity3d/services/core/configuration/ConfigurationRequestFactory.java
com/vungle/warren/AdvertisementPresentationFactory.java
com/mbridge/msdk/playercommon/exoplayer2/DefaultRenderersFactory.java
com/ludashi/watchdog/keepalive/screenmonitor/ScreenMonitor.java
com/vungle/warren/ui/presenter/LocalAdPresenter.java
com/mbridge/msdk/playercommon/exoplayer2/extractor/ts/H265Reader.java
com/mbridge/msdk/foundation/tools/u.java
com/ludashi/watchdog/keepalive/screenmonitor/ScreenBroadcastReceiver.java
com/unity3d/services/core/cache/CacheThreadHandler.java
com/vungle/warren/model/Advertisement.java
com/mbridge/msdk/playercommon/exoplayer2/offline/DownloadService.java
clear/sdk/iw.java
clear/sdk/t.java
com/mbridge/msdk/playercommon/exoplayer2/extractor/ts/PesReader.java
com/unity3d/services/core/webview/WebViewUrlBuilder.java
com/unity3d/services/core/webview/bridge/WebViewBridge.java
com/mbridge/msdk/foundation/same/report/b/a.java
com/applovin/impl/sdk/a/f.java
com/bytedance/sdk/component/utils/l.java
com/vungle/warren/ui/view/FullAdWidget.java
com/vungle/warren/utility/UnzipUtility.java
com/ludashi/watchdog/account/AccountHelper.java
com/mbridge/msdk/playercommon/exoplayer2/extractor/mp4/AtomParsers.java
com/bytedance/sdk/component/g/d.java
com/unity3d/services/core/misc/Utilities.java
com/unity3d/services/core/preferences/AndroidPreferences.java
com/bytedance/sdk/openadsdk/l/q.java
com/bykv/vk/openvk/component/video/a/b/d.java
com/mbridge/msdk/playercommon/exoplayer2/source/chunk/ChunkedTrackBlacklistUtil.java
com/vungle/warren/downloader/CleverCache.java
com/mbridge/msdk/playercommon/exoplayer2/text/ssa/SsaDecoder.java
com/unity3d/services/store/gpbl/bridges/PurchaseBridge.java
com/unity3d/services/core/reflection/GenericBridge.java
com/mbridge/msdk/playercommon/exoplayer2/mediacodec/MediaCodecUtil.java
com/adcolony/sdk/n0.java
com/unity3d/services/core/webview/bridge/WebViewCallback.java
com/vungle/warren/persistence/CacheManager.java
com/mbridge/msdk/playercommon/exoplayer2/ExoPlayerImplInternal.java
com/bytedance/sdk/component/c/b/j.java
com/unity3d/ads/metadata/MetaData.java
com/ludashi/watchdog/util/ServiceUtils.java
com/vungle/warren/tasks/CleanupJob.java
com/mbridge/msdk/playercommon/exoplayer2/util/AtomicFile.java
com/adcolony/sdk/f.java
com/egostudio/loglib/c.java
clear/sdk/ja.java
com/bumptech/glide/m/h/g.java
com/bumptech/glide/m/h/a.java
com/unity3d/services/core/timer/IntervalTimer.java
com/bytedance/sdk/component/a/i.java
com/mbridge/msdk/playercommon/exoplayer2/util/EventLogger.java
com/unity3d/services/ads/webplayer/WebPlayerView.java
b/e/a/a/b/j/c.java
com/bytedance/sdk/component/e/c/a/a/a.java
com/unity3d/services/core/connectivity/ConnectivityMonitor.java
com/bytedance/sdk/openadsdk/component/reward/a/f.java
com/unity3d/services/ads/gmascar/finder/GMAInitializer.java
com/mbridge/msdk/playercommon/exoplayer2/text/subrip/SubripDecoder.java
com/bykv/vk/openvk/component/video/a/b/g.java
com/bumptech/glide/manager/j.java
clear/sdk/v.java
com/mbridge/msdk/playercommon/exoplayer2/text/dvb/DvbParser.java
clear/sdk/p.java
com/bytedance/sdk/openadsdk/core/h/d.java
com/bytedance/sdk/component/f/d/e.java
com/unity3d/services/core/properties/SdkProperties.java
com/unity3d/services/core/request/WebRequestRunnable.java
com/bumptech/glide/m/i/n/a.java
com/vungle/warren/tasks/runnable/JobRunnable.java
clear/sdk/l.java
b/e/a/a/a/j/c.java
com/unity3d/services/UnityServices.java
com/vungle/warren/ui/JavascriptBridge.java
com/unity3d/services/core/misc/JsonStorage.java
com/bytedance/sdk/component/b/a/a/a.java
com/vungle/warren/persistence/FutureResult.java
com/mbridge/msdk/playercommon/exoplayer2/text/webvtt/WebvttCueParser.java
com/egostudio/clean/ui/widget/appboost/AppCleanViewOld.java
com/bytedance/sdk/component/e/c/c.java
com/mbridge/msdk/playercommon/exoplayer2/extractor/mp3/VbriSeeker.java
clear/sdk/cn.java
com/bytedance/sdk/component/f/b/a.java
com/unity3d/services/core/configuration/InitializeThread.java
com/mbridge/msdk/playercommon/exoplayer2/source/chunk/ChunkSampleStream.java
com/mbridge/msdk/playercommon/exoplayer2/mediacodec/MediaCodecRenderer.java
clear/sdk/k.java
com/unity3d/services/ads/api/WebPlayer.java
com/unity3d/services/ads/configuration/AdsModuleConfiguration.java
com/unity3d/services/ads/token/AsyncTokenStorage.java
com/mbridge/msdk/playercommon/exoplayer2/extractor/ts/AdtsReader.java
com/bumptech/glide/load/resource/bitmap/k.java
com/unity3d/services/core/request/metrics/SDKMetrics.java
com/mbridge/msdk/video/module/MBridgeBaseView.java
com/vungle/warren/VungleJobRunner.java
com/unity3d/services/ads/gmascar/bridges/InitializeListenerBridge.java
com/mbridge/msdk/playercommon/exoplayer2/extractor/mp4/PsshAtomUtil.java
com/bumptech/glide/load/resource/gif/GifResourceDecoder.java
com/mbridge/msdk/foundation/tools/r.java
com/mbridge/msdk/playercommon/exoplayer2/extractor/mp4/FragmentedMp4Extractor.java
com/unity3d/services/ads/gmascar/bridges/MobileAdsBridge.java
com/bumptech/glide/load/model/e.java
com/unity3d/services/ads/token/NativeTokenGenerator.java
com/unity3d/services/core/webview/WebView.java
com/unity3d/services/core/device/reader/DeviceInfoReaderCompressor.java
com/unity3d/services/core/sensorinfo/SensorInfoListener.java
com/vungle/warren/utility/NetworkProvider.java
com/unity3d/services/core/api/Request.java
com/bumptech/glide/q/a.java
com/bumptech/glide/o/a.java
com/vungle/warren/VungleApiClient.java
com/bykv/vk/openvk/component/video/a/b/f.java
com/mbridge/msdk/widget/FeedbackRadioGroup.java
com/bumptech/glide/load/resource/bitmap/m.java
com/mbridge/msdk/playercommon/exoplayer2/text/cea/CeaUtil.java
com/vungle/warren/utility/VungleUrlUtility.java
com/bumptech/glide/k/d.java
com/apm/insight/b/j.java
com/bytedance/sdk/component/e/b/a.java
com/vungle/warren/log/LogSender.java
com/onesignal/g4/c.java
com/unity3d/ads/metadata/InAppPurchaseMetaData.java
com/vungle/warren/AdEventListener.java
com/bumptech/glide/m/i/c.java
com/mbridge/msdk/playercommon/exoplayer2/text/ttml/TtmlDecoder.java
com/unity3d/services/core/device/reader/DeviceInfoReaderUrlEncoder.java
com/unity3d/services/core/configuration/EnvironmentCheck.java
com/bytedance/sdk/component/e/c/a/a/b.java
com/bumptech/glide/m/i/i.java
com/mbridge/msdk/playercommon/exoplayer2/audio/DefaultAudioSink.java
com/mbridge/msdk/playercommon/exoplayer2/source/chunk/BaseMediaChunkOutput.java
b/b/b/a.java
com/vungle/warren/network/OkHttpCall.java
com/bytedance/sdk/component/f/d/d.java
com/mbridge/msdk/playercommon/exoplayer2/mediacodec/MediaCodecInfo.java
com/bytedance/sdk/openadsdk/core/widget/e.java
com/mbridge/msdk/playercommon/exoplayer2/extractor/ts/Id3Reader.java
com/bykv/vk/openvk/component/video/a/b/e.java
com/unity3d/services/core/log/DeviceLog.java
com/vungle/warren/utility/ExternalRouter.java
com/mbridge/msdk/playercommon/exoplayer2/drm/ClearKeyUtil.java
clear/sdk/dn.java
com/bumptech/glide/l/a.java
com/vungle/warren/tasks/JobInfo.java
com/mbridge/msdk/playercommon/exoplayer2/offline/DownloadManager.java
com/ludashi/watchdog/foundation/BaseDialog.java
com/vungle/warren/utility/ActivityManager.java
com/applovin/impl/adview/activity/b/f.java
com/mbridge/msdk/playercommon/exoplayer2/upstream/cache/SimpleCache.java
com/vungle/warren/analytics/VungleAnalytics.java
com/qihoo/cleandroid/sdk/utils/OpLog.java
com/mbridge/msdk/playercommon/exoplayer2/extractor/mp3/XingSeeker.java
com/bytedance/sdk/openadsdk/core/j/d.java
com/applovin/impl/sdk/f.java
com/vungle/warren/downloader/AssetDownloader.java
High
CVSS:5.5
App can read/write to External Storage. Any App can read data written to External Storage.
MASVS: MSTG-STORAGE-2
CWE-276 Incorrect Default Permissions
M2: Insecure Data Storage
Files:
 com/egostudio/clean/util/f0.java
clear/sdk/iy.java
com/unity3d/services/core/cache/CacheDirectory.java
com/qihoo/cleandroid/sdk/i/trashclear/TrashClearUtils.java
com/mbridge/msdk/foundation/tools/w.java
clear/sdk/ap.java
com/vungle/warren/persistence/CacheManager.java
com/egostudio/clean/util/g0.java
com/egostudio/clean/util/v0/a.java
com/apm/insight/nativecrash/b.java
clear/sdk/gr.java
com/egostudio/clean/util/m.java
com/bytedance/sdk/component/adexpress/a/b/b.java
clear/sdk/dq.java
com/apm/insight/runtime/o.java
clear/sdk/dl.java
clear/sdk/ei.java
com/vungle/warren/VungleApiClient.java
com/qihoo/cleandroid/sdk/utils/StorageDeviceUtils.java
clear/sdk/db.java
com/mbridge/msdk/foundation/same/report/b/a.java
b/c/a/a.java
clear/sdk/fa.java
com/apm/insight/entity/d.java
com/qihoo/cleandroid/sdk/utils/OpLog.java
com/vungle/warren/persistence/Repository.java
com/apm/insight/l/w.java
com/bytedance/sdk/openadsdk/l/s.java
Medium
CVSS:7.4
Files may contain hardcoded sensitive information like usernames, passwords, keys etc.
MASVS: MSTG-STORAGE-14
CWE-312 Cleartext Storage of Sensitive Information
M9: Reverse Engineering
Files:
 com/mbridge/msdk/playercommon/exoplayer2/drm/DefaultDrmSessionManager.java
com/applovin/mediation/ads/MaxRewardedAd.java
com/applovin/sdk/AppLovinSdk.java
com/applovin/mediation/ads/MaxInterstitialAd.java
com/ludashi/watchdog/info/ThisApp.java
com/bykv/vk/openvk/component/video/a/b/i.java
com/applovin/sdk/AppLovinWebViewActivity.java
com/mbridge/msdk/foundation/db/l.java
com/mbridge/msdk/foundation/same/report/d.java
com/mbridge/msdk/click/b/a.java
com/applovin/mediation/nativeAds/MaxNativeAdLoader.java
com/mbridge/msdk/video/dynview/moffer/MOfferModel.java
com/unity3d/services/core/device/reader/JsonStorageKeyNames.java
com/bytedance/sdk/openadsdk/l/d.java
com/onesignal/t3.java
com/applovin/mediation/ads/MaxAdView.java
com/applovin/mediation/ads/MaxRewardedInterstitialAd.java
com/vungle/warren/model/Cookie.java
com/onesignal/l1.java
com/onesignal/e1.java
com/applovin/impl/sdk/m.java
com/vungle/warren/log/LogSender.java
com/mbridge/msdk/foundation/entity/m.java
com/unity3d/services/core/device/reader/DeviceInfoReaderFilterProvider.java
com/unity3d/ads/metadata/InAppPurchaseMetaData.java
Medium
CVSS:5.9
App uses SQLite Database and execute raw SQL query. Untrusted user input in raw SQL queries can cause SQL Injection. Also sensitive information should be encrypted and written to the database.
CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
M7: Client Code Quality
Files:
 com/mbridge/msdk/foundation/db/e.java
com/mbridge/msdk/foundation/download/database/DatabaseHelper.java
com/mbridge/msdk/foundation/db/b.java
com/adcolony/sdk/l.java
com/mbridge/msdk/foundation/db/n.java
com/bykv/vk/openvk/component/video/a/b/b/d.java
clear/sdk/eh.java
com/onesignal/b3.java
com/vungle/warren/persistence/DatabaseHelper.java
com/apm/insight/e/b/a.java
clear/sdk/eg.java
com/egostudio/clean/database/Database.java
clear/sdk/gs.java
com/apm/insight/e/b/b.java
com/onesignal/f4/a/k.java
com/adcolony/sdk/m.java
com/bytedance/sdk/openadsdk/core/f.java
com/egostudio/clean/database/b.java
com/adcolony/sdk/k.java
clear/sdk/gt.java
com/vungle/warren/persistence/Repository.java
com/mbridge/msdk/foundation/db/g.java
com/mbridge/msdk/foundation/db/BatchReportDao.java
Medium
CVSS:7.4
MD5 is a weak hash known to have hash collisions.
MASVS: MSTG-CRYPTO-4
CWE-327 Use of a Broken or Risky Cryptographic Algorithm
M5: Insufficient Cryptography
Files:
 com/bykv/vk/openvk/component/video/api/f/b.java
com/bytedance/sdk/component/e/c/c/c.java
com/egostudio/clean/util/j.java
com/mbridge/msdk/foundation/tools/r.java
com/mbridge/msdk/foundation/download/resource/MBResourceManager.java
com/apm/insight/l/v.java
com/bytedance/sdk/component/utils/e.java
com/mbridge/msdk/videocommon/download/g.java
Medium
CVSS:7.5
The App uses an insecure Random Number Generator.
MASVS: MSTG-CRYPTO-6
CWE-330 Use of Insufficiently Random Values
M5: Insufficient Cryptography
Files:
 com/unity3d/services/core/request/metrics/SDKMetrics.java
com/qihoo/cleandroid/sdk/plugins/NativeFuncsImpl.java
clear/sdk/bo.java
com/egostudio/clean/ui/widget/BoostView.java
com/mbridge/msdk/thrid/okhttp/internal/ws/RealWebSocket.java
clear/sdk/fr.java
com/mbridge/msdk/playercommon/exoplayer2/source/ShuffleOrder.java
com/mbridge/msdk/playercommon/exoplayer2/upstream/cache/CachedContentIndex.java
com/apm/insight/h.java
com/egostudio/clean/util/f.java
com/mbridge/msdk/thrid/okhttp/OkHttpClient.java
com/mbridge/msdk/thrid/okhttp/internal/ws/WebSocketWriter.java
com/egostudio/clean/work/newpush/j/a.java
com/egostudio/clean/work/presenter/q.java
clear/sdk/bj.java
com/mbridge/msdk/playercommon/exoplayer2/trackselection/RandomTrackSelection.java
com/applovin/impl/a/l.java
clear/sdk/co.java
com/adjust/sdk/Util.java
com/bytedance/sdk/component/f/c/e.java
com/onesignal/OSUtils.java
com/egostudio/clean/j/c/a.java
Info
CVSS:0
This App may have root detection capabilities.
MASVS: MSTG-RESILIENCE-1
Files:
 com/bytedance/sdk/openadsdk/l/s.java
com/apm/insight/nativecrash/b.java
Medium
CVSS:5.5
App creates temp file. Sensitive information should never be written into a temp file.
MASVS: MSTG-STORAGE-2
CWE-276 Incorrect Default Permissions
M2: Insecure Data Storage
Files:
 com/mbridge/msdk/playercommon/exoplayer2/util/Util.java
ms/bd/o/Pgl/pblg.java
Info
CVSS:0
This App uses SSL certificate pinning to detect or prevent MITM attacks in secure communication channel.
MASVS: MSTG-NETWORK-4
Files:
 com/mbridge/msdk/thrid/okhttp/internal/Util.java
com/bytedance/sdk/component/c/b/v.java
clear/sdk/ct.java
f/f0/c.java
Medium
CVSS:8.8
Insecure WebView Implementation. Execution of user controlled code in WebView is a critical Security Hole.
MASVS: MSTG-PLATFORM-7
CWE-749 Exposed Dangerous Method or Function
M1: Improper Platform Usage
Files:
 com/adcolony/sdk/w0.java
com/bytedance/sdk/component/adexpress/d/e.java
com/onesignal/c4.java
com/unity3d/services/ads/webplayer/WebPlayerView.java
com/unity3d/services/core/webview/WebView.java
Medium
CVSS:4.3
IP Address disclosure
MASVS: MSTG-CODE-2
CWE-200 Information Exposure
Files:
 com/applovin/mediation/adapters/AdColonyMediationAdapter.java
com/applovin/mediation/adapters/ByteDanceMediationAdapter.java
com/applovin/mediation/adapters/GoogleAdManagerMediationAdapter.java
com/applovin/mediation/adapters/FacebookMediationAdapter.java
com/bytedance/sdk/openadsdk/BuildConfig.java
com/applovin/mediation/adapters/MintegralMediationAdapter.java
com/applovin/mediation/adapters/UnityAdsMediationAdapter.java
com/applovin/mediation/adapters/VungleMediationAdapter.java
com/applovin/mediation/adapters/GoogleMediationAdapter.java
Medium
CVSS:5.9
SHA-1 is a weak hash known to have hash collisions.
MASVS: MSTG-CRYPTO-4
CWE-327 Use of a Broken or Risky Cryptographic Algorithm
M5: Insufficient Cryptography
Files:
 com/unity3d/services/core/device/Device.java
com/bytedance/sdk/openadsdk/core/i/b.java
clear/sdk/bo.java
clear/sdk/bj.java
com/applovin/impl/sdk/utils/StringUtils.java
com/applovin/impl/sdk/utils/m.java
com/adcolony/sdk/x0.java
com/egostudio/clean/util/b.java
com/adcolony/sdk/u0.java
High
CVSS:5.4
Remote WebView debugging is enabled.
MASVS: MSTG-RESILIENCE-2
CWE-919 - Weaknesses in Mobile Applications
M1: Improper Platform Usage
Files:
 com/onesignal/c4.java
com/applovin/impl/adview/d.java
High
CVSS:7.4
The App uses the encryption mode CBC with PKCS5/PKCS7 padding. This configuration is vulnerable to padding oracle attacks.
MASVS: MSTG-CRYPTO-3
CWE-649 Reliance on Obfuscation or Encryption of Security-Relevant Inputs without Integrity Checking
M5: Insufficient Cryptography
Files:
 com/bytedance/sdk/component/d/a.java
High
CVSS:7.4
Weak Encryption algorithm used
MASVS: MSTG-CRYPTO-4
CWE-327 Use of a Broken or Risky Cryptographic Algorithm
M5: Insufficient Cryptography
Files:
 com/egostudio/clean/util/j.java
Pygal Australia: 100 Czech Republic: 200 Germany: 1500 Spain: 200 Hong Kong: 200 Netherlands: 800 Singapore: 300 Turkey: 300 United States: 4300

Map computed by Pithus.

Network analysis

Information computed with MobSF.

High Base config is insecurely configured to permit clear text traffic to all domains.
Scope: ['*']
Medium Base config is configured to trust system certificates.
Scope: ['*']
High Domain config is insecurely configured to permit clear text traffic to these domains in scope.
Scope: ['127.0.0.1']

Domains analysis

Information computed with MobSF.

NL api16-endcard-pack-sg.pangle.io 23.36.163.225
US d1tru86qrby720.cloudfront.net 18.66.107.35
DE lazy.rayjump.com 35.156.28.140
US app.adjust.com 185.151.204.7
US app.adjust.world 185.151.204.41
DE hb.rayjump.com 52.57.182.86
US www.applovin.com 141.193.213.21
DE gdpr.adjust.com 178.162.219.36
CZ mtg-native.rayjump.com 13.32.121.20
US www.google.com 142.250.185.196
NL api16-access-sg.pangle.io 23.36.163.243
DE appgallery.cloud.huawei.com 80.158.41.227
US cdn-adn-https.rayjump.com 18.66.112.82
DE analytics.rayjump.com 8.209.112.118
SG apse-clean.egostudio.net 47.241.1.22
SG security.ludashi.com 161.117.188.243
US app.adjust.net.in 185.151.204.31
ES ads.api.vungle.com 2.21.20.158
US egoclean-dcbf2.firebaseio.com 34.120.160.131
ES api.vungle.com 2.21.20.150
US api.onesignal.com 104.18.225.52
HK tools.3g.qq.com 129.226.106.18
DE gdpr.adjust.world 178.162.219.36
US app.eu.adjust.com 185.151.204.60
US app.us.adjust.com 185.151.204.70
NL mon.isnssdk.com 23.36.163.248
DE sf-tb-sg.ibytedtos.com 2.16.186.24
NL log-mva.isnssdk.com 23.36.163.250
US subscription.adjust.world 185.151.204.44
US sites.google.com 142.250.74.206
US subscription.adjust.net.in 185.151.204.34
DE gdpr.adjust.net.in 178.162.219.36
SG apse-s.egostudio.net 47.241.38.67
US d.applovin.com 34.110.179.88
TR app.tr.adjust.com 195.244.54.5