0/63

Threat

com.sec.android.app.factorykeystring

DeviceKeystring

Analyzed on 2021-11-13T06:38:10.454868

45

permissions

119

activities

2

services

7

receivers

0

domains

File sums

MD5 65238b07a8e2ffef0d2e6c97a87886ea
SHA1 edaafece71ccf981ed7aff2f1598c74340f35b3d
SHA256 9f2aab24de242b256d949286cd68a00a6d8e173fba2464d564e876a7947e3af7
Size 4.94MB

APKiD

Information computed with APKiD.

/tmp/tmpx7m8g2p4!classes.dex
yara_issue
  • yara issue - dex file recognized by apkid but not yara module
anti_vm
  • ro.build.type check
compiler
  • unknown (please file detection issue!)

SSdeep

Information computed with ssdeep.

APK file 98304:TUbHtFi3B22GwPHWKCZ7q15ImAmOkQfNxPX5G1xTVjw1dHk:oZE3B22GAfIYOt/axu15k
Manifest 768:v1WgSkJhNdbFcKxLNTGMXPwJE+73i+J1IEhcMAh69h3xY137OE2nf85e6vR+9Hla:…
classes.dex 12288:qeunr+SaI+eZED/EGDUJ4yd9DTK0uy8nS8IK2TYXfJDEe2UIkHuRB3kP7ljomne…

Dexofuzzy

Information computed with Dexofuzzy.

classes.dex None

APK details

Information computed with AndroGuard and Pithus.

Package com.sec.android.app.factorykeystring
App name DeviceKeystring
Version name 9
Version code 28
SDK 16 - 26
UAID 75b18dcda96aaebcde85a903762b072abb688d5b
Signature Signature V1 Signature V2
Frosting Not frosted
Blocks found within V2 signature:
  • 0x7109871a: Unknown

Certificate details

Information computed with AndroGuard.

MD5 d087e72912fba064cafa78dc34aea839
SHA1 9ca5170f381919dfe0446fcdab18b19a143b3163
SHA256 34df0e7a9f1cf1892e45c056b4973cd81ccf148a4050d11aea4ac5a65f900a42
Issuer Email Address: android.os@samsung.com, Common Name: Samsung Cert, Organizational Unit: DMC, Organization: Samsung Corporation, Locality: Suwon City, State/Province: South Korea, Country: KR
Not before 2011-06-22T12:25:12+00:00
Not after 2038-11-07T12:25:12+00:00

File Analysis

Information computed with MobSF.

Findings Files
Certificate/Key files hardcoded inside the app. SEC-INF/buildConfirm.crt

Manifest analysis

Information computed with MobSF.

Medium Application Data can be Backed up[android:allowBackup] flag is missing.
The flag [android:allowBackup] should be set to false. By default it is set to true and allows anyone to backup your application data via adb. It allows users who have enabled USB debugging to copy application data off of the device.
Low Broadcast Receiver (com.sec.android.app.serial_number_label_Indicator.MainLabelBroadcastReceiver) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.sec.android.app.factorymode.permission.KEYSTRING
protectionLevel: signatureOrSystem [android:exported=true]
A Broadcast Receiver is found to be exported, but is protected by a permission. However, the protection level of the permission is set to signatureOrSystem. It is recommended that signature level is used instead. Signature level should suffice for most purposes, and does not depend on where the applications are installed on the device.
Low Broadcast Receiver (com.sec.android.app.shutdown.ShutdownSettingBroadcastReceiver) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.sec.android.app.factorymode.permission.KEYSTRING
protectionLevel: signatureOrSystem [android:exported=true]
A Broadcast Receiver is found to be exported, but is protected by a permission. However, the protection level of the permission is set to signatureOrSystem. It is recommended that signature level is used instead. Signature level should suffice for most purposes, and does not depend on where the applications are installed on the device.
Low Broadcast Receiver (com.sec.android.app.version.Version_Receiver) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.sec.android.app.factorymode.permission.KEYSTRING
protectionLevel: signatureOrSystem [android:exported=true]
A Broadcast Receiver is found to be exported, but is protected by a permission. However, the protection level of the permission is set to signatureOrSystem. It is recommended that signature level is used instead. Signature level should suffice for most purposes, and does not depend on where the applications are installed on the device.
Low Activity (com.sec.android.app.status.BatteryStatus) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.sec.android.app.factorymode.permission.KEYSTRING
protectionLevel: signatureOrSystem [android:exported=true]
An Activity is found to be exported, but is protected by a permission. However, the protection level of the permission is set to signatureOrSystem. It is recommended that signature level is used instead. Signature level should suffice for most purposes, and does not depend on where the applications are installed on the device.
Low Activity (com.sec.android.app.status.BatteryStatusEng) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.sec.android.app.factorymode.permission.KEYSTRING
protectionLevel: signatureOrSystem [android:exported=true]
An Activity is found to be exported, but is protected by a permission. However, the protection level of the permission is set to signatureOrSystem. It is recommended that signature level is used instead. Signature level should suffice for most purposes, and does not depend on where the applications are installed on the device.
Low Activity (com.sec.android.app.status.BatteryStatus_kor) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.sec.android.app.factorymode.permission.KEYSTRING
protectionLevel: signatureOrSystem [android:exported=true]
An Activity is found to be exported, but is protected by a permission. However, the protection level of the permission is set to signatureOrSystem. It is recommended that signature level is used instead. Signature level should suffice for most purposes, and does not depend on where the applications are installed on the device.
High Activity (com.sec.android.app.status.PowerStatus) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.sec.factory.permission.KEYSTRING [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
Low Activity (com.sec.android.app.status.LightsensorRead) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.sec.android.app.factorymode.permission.KEYSTRING
protectionLevel: signatureOrSystem [android:exported=true]
An Activity is found to be exported, but is protected by a permission. However, the protection level of the permission is set to signatureOrSystem. It is recommended that signature level is used instead. Signature level should suffice for most purposes, and does not depend on where the applications are installed on the device.
Low Activity (com.sec.android.app.status.TouchNoise) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.sec.android.app.factorymode.permission.KEYSTRING
protectionLevel: signatureOrSystem [android:exported=true]
An Activity is found to be exported, but is protected by a permission. However, the protection level of the permission is set to signatureOrSystem. It is recommended that signature level is used instead. Signature level should suffice for most purposes, and does not depend on where the applications are installed on the device.
Low Activity (com.sec.android.app.status.TouchNoiseSynaptics) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.sec.android.app.factorymode.permission.KEYSTRING
protectionLevel: signatureOrSystem [android:exported=true]
An Activity is found to be exported, but is protected by a permission. However, the protection level of the permission is set to signatureOrSystem. It is recommended that signature level is used instead. Signature level should suffice for most purposes, and does not depend on where the applications are installed on the device.
Low Activity (com.sec.android.app.status.HdcpCheckDialog) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.sec.android.app.factorymode.permission.KEYSTRING
protectionLevel: signatureOrSystem [android:exported=true]
An Activity is found to be exported, but is protected by a permission. However, the protection level of the permission is set to signatureOrSystem. It is recommended that signature level is used instead. Signature level should suffice for most purposes, and does not depend on where the applications are installed on the device.
Low Activity (com.sec.android.app.status.AccSensorCalibration) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.sec.android.app.factorymode.permission.KEYSTRING
protectionLevel: signatureOrSystem [android:exported=true]
An Activity is found to be exported, but is protected by a permission. However, the protection level of the permission is set to signatureOrSystem. It is recommended that signature level is used instead. Signature level should suffice for most purposes, and does not depend on where the applications are installed on the device.
Low Activity (com.sec.android.app.status.SPenDetectionTest) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.sec.android.app.factorymode.permission.KEYSTRING
protectionLevel: signatureOrSystem [android:exported=true]
An Activity is found to be exported, but is protected by a permission. However, the protection level of the permission is set to signatureOrSystem. It is recommended that signature level is used instead. Signature level should suffice for most purposes, and does not depend on where the applications are installed on the device.
Low Activity (com.sec.android.app.status.SPenTestUI) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.sec.android.app.factorymode.permission.KEYSTRING
protectionLevel: signatureOrSystem [android:exported=true]
An Activity is found to be exported, but is protected by a permission. However, the protection level of the permission is set to signatureOrSystem. It is recommended that signature level is used instead. Signature level should suffice for most purposes, and does not depend on where the applications are installed on the device.
Low Activity (com.sec.android.app.status.SPenTestMode) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.sec.android.app.factorymode.permission.KEYSTRING
protectionLevel: signatureOrSystem [android:exported=true]
An Activity is found to be exported, but is protected by a permission. However, the protection level of the permission is set to signatureOrSystem. It is recommended that signature level is used instead. Signature level should suffice for most purposes, and does not depend on where the applications are installed on the device.
Low Activity (com.sec.android.app.status.SPen_AccuracyUI) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.sec.android.app.factorymode.permission.KEYSTRING
protectionLevel: signatureOrSystem [android:exported=true]
An Activity is found to be exported, but is protected by a permission. However, the protection level of the permission is set to signatureOrSystem. It is recommended that signature level is used instead. Signature level should suffice for most purposes, and does not depend on where the applications are installed on the device.
Low Activity (com.sec.android.app.status.SPen_LinearityUI) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.sec.android.app.factorymode.permission.KEYSTRING
protectionLevel: signatureOrSystem [android:exported=true]
An Activity is found to be exported, but is protected by a permission. However, the protection level of the permission is set to signatureOrSystem. It is recommended that signature level is used instead. Signature level should suffice for most purposes, and does not depend on where the applications are installed on the device.
Low Activity (com.sec.android.app.status.SPen_HoverAccurayUI) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.sec.android.app.factorymode.permission.KEYSTRING
protectionLevel: signatureOrSystem [android:exported=true]
An Activity is found to be exported, but is protected by a permission. However, the protection level of the permission is set to signatureOrSystem. It is recommended that signature level is used instead. Signature level should suffice for most purposes, and does not depend on where the applications are installed on the device.
Low Activity (com.sec.android.app.status.EPenTestUI) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.sec.android.app.factorymode.permission.KEYSTRING
protectionLevel: signatureOrSystem [android:exported=true]
An Activity is found to be exported, but is protected by a permission. However, the protection level of the permission is set to signatureOrSystem. It is recommended that signature level is used instead. Signature level should suffice for most purposes, and does not depend on where the applications are installed on the device.
Low Activity (com.sec.android.app.status.EPenTestMain) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.sec.android.app.factorymode.permission.KEYSTRING
protectionLevel: signatureOrSystem [android:exported=true]
An Activity is found to be exported, but is protected by a permission. However, the protection level of the permission is set to signatureOrSystem. It is recommended that signature level is used instead. Signature level should suffice for most purposes, and does not depend on where the applications are installed on the device.
Low Activity (com.sec.android.app.status.LcdTypeInfo) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.sec.android.app.factorymode.permission.KEYSTRING
protectionLevel: signatureOrSystem [android:exported=true]
An Activity is found to be exported, but is protected by a permission. However, the protection level of the permission is set to signatureOrSystem. It is recommended that signature level is used instead. Signature level should suffice for most purposes, and does not depend on where the applications are installed on the device.
Low Activity (com.sec.android.app.status.RTCTimeRead) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.sec.android.app.factorymode.permission.KEYSTRING
protectionLevel: signatureOrSystem [android:exported=true]
An Activity is found to be exported, but is protected by a permission. However, the protection level of the permission is set to signatureOrSystem. It is recommended that signature level is used instead. Signature level should suffice for most purposes, and does not depend on where the applications are installed on the device.
Low Activity (com.sec.android.app.status.FailHistRead) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.sec.android.app.factorymode.permission.KEYSTRING
protectionLevel: signatureOrSystem [android:exported=true]
An Activity is found to be exported, but is protected by a permission. However, the protection level of the permission is set to signatureOrSystem. It is recommended that signature level is used instead. Signature level should suffice for most purposes, and does not depend on where the applications are installed on the device.
Low Activity (com.sec.android.app.status.FailHistDetailInformation) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.sec.android.app.factorymode.permission.KEYSTRING
protectionLevel: signatureOrSystem [android:exported=true]
An Activity is found to be exported, but is protected by a permission. However, the protection level of the permission is set to signatureOrSystem. It is recommended that signature level is used instead. Signature level should suffice for most purposes, and does not depend on where the applications are installed on the device.
Low Activity (com.sec.android.app.status.ShowCountryCertInfo) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.sec.android.app.factorymode.permission.KEYSTRING
protectionLevel: signatureOrSystem [android:exported=true]
An Activity is found to be exported, but is protected by a permission. However, the protection level of the permission is set to signatureOrSystem. It is recommended that signature level is used instead. Signature level should suffice for most purposes, and does not depend on where the applications are installed on the device.
Low Broadcast Receiver (com.sec.android.app.entry.FactoryKeyStringBroadcastReceiver) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.sec.android.app.factorymode.permission.KEYSTRING
protectionLevel: signatureOrSystem [android:exported=true]
A Broadcast Receiver is found to be exported, but is protected by a permission. However, the protection level of the permission is set to signatureOrSystem. It is recommended that signature level is used instead. Signature level should suffice for most purposes, and does not depend on where the applications are installed on the device.
Low Broadcast Receiver (com.sec.android.app.brightness.BrightnessReceiver) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.sec.android.app.factorymode.permission.KEYSTRING
protectionLevel: signatureOrSystem [android:exported=true]
A Broadcast Receiver is found to be exported, but is protected by a permission. However, the protection level of the permission is set to signatureOrSystem. It is recommended that signature level is used instead. Signature level should suffice for most purposes, and does not depend on where the applications are installed on the device.
Low Broadcast Receiver (com.sec.android.app.phoneutil.PhoneUtilReceiver) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.sec.android.app.phoneutil.permission.KEYSTRING
protectionLevel: signatureOrSystem [android:exported=true]
A Broadcast Receiver is found to be exported, but is protected by a permission. However, the protection level of the permission is set to signatureOrSystem. It is recommended that signature level is used instead. Signature level should suffice for most purposes, and does not depend on where the applications are installed on the device.
Low Activity (com.sec.android.app.phoneutil.UsbLogging) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.sec.android.app.phoneutil.permission.KEYSTRING
protectionLevel: signatureOrSystem [android:exported=true]
An Activity is found to be exported, but is protected by a permission. However, the protection level of the permission is set to signatureOrSystem. It is recommended that signature level is used instead. Signature level should suffice for most purposes, and does not depend on where the applications are installed on the device.
High Dailer Code: 737425 Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
High Dailer Code: 7594 Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
High Dailer Code: 7595 Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
High Dailer Code: 1234 Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
High Dailer Code: 9999 Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
High Dailer Code: 12580*369 Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
High Dailer Code: 99732 Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
High Dailer Code: 1111_WIFI Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
High Dailer Code: 2222_WIFI Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
High Dailer Code: 4943 Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
High Dailer Code: 278837 Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
High Dailer Code: 0000 Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
High Dailer Code: 877 Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
High Dailer Code: 272447 Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
High Dailer Code: 46837 Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
High Dailer Code: 0228 Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
High Dailer Code: 02288 Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
High Dailer Code: 22888973 Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
High Dailer Code: 80 Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
High Dailer Code: 251 Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
High Dailer Code: 250 Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
High Dailer Code: 350 Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
High Dailer Code: 5238973 Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
High Dailer Code: 4327 Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
High Dailer Code: 22235 Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
High Dailer Code: 4378873 Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
High Dailer Code: 7736 Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
High Dailer Code: 77368378 Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
High Dailer Code: 3736 Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
High Dailer Code: 77361379 Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
High Dailer Code: 0782 Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
High Dailer Code: 86824 Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
High Dailer Code: 0842 Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
High Dailer Code: 0673 Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
High Dailer Code: 0289 Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
High Dailer Code: 2663 Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
High Dailer Code: 1004 Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
High Dailer Code: 2664 Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
High Dailer Code: 0588 Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
High Dailer Code: 3264 Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
High Dailer Code: 0589 Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
High Dailer Code: 7769 Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
High Dailer Code: 87976633 Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
High Dailer Code: 07 Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
High Dailer Code: 9998*3288 Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
High Dailer Code: 767*2878 Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
High Dailer Code: 0283 Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
High Dailer Code: \ 7328735824 Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
High Dailer Code: 22228378 Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
High Dailer Code: \ 266536966 Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
High Dailer Code: 1105 Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
High Dailer Code: 726387 Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
High Dailer Code: 8778378 Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
High Dailer Code: 26732875 Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
High Dailer Code: 435517 Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
High Dailer Code: 1106 Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
High Dailer Code: \ 6364366633 Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
High Dailer Code: 0775 Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
High Dailer Code: 27743 Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
High Dailer Code: 1470 Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
High Dailer Code: 1471 Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
High Dailer Code: 0229 Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
High Dailer Code: 3833 Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
High Dailer Code: 35789 Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
High Dailer Code: 3215987 Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
High Dailer Code: 297277 Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
High Dailer Code: 3226 Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
High Dailer Code: 36723 Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
High Dailer Code: 2272 Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
High Dailer Code: 4747 Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
High Dailer Code: \ 022884478 Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
High Dailer Code: 362 Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
High Dailer Code: 7676 Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
High Dailer Code: 15987 Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
High Dailer Code: 159874 Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
High Dailer Code: 4562580 Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
High Dailer Code: 32266 Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
High Dailer Code: 8213 Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
High Dailer Code: 5442 Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
High Dailer Code: 66867 Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
High Dailer Code: 42663 Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
High Dailer Code: 2288379 Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.

Activities

Information computed with AndroGuard.

com.sec.android.app.serial_number_label_Indicator.MainLabel
com.sec.android.app.shutdown.ShutdownPreference
com.sec.android.app.shutdown.Uart1KControl
com.sec.android.app.version.SimpleVersion
com.sec.android.app.version.SimpleVersionTMO
com.sec.android.app.version.MainVersion
com.sec.android.app.version.BuildInfo
com.sec.android.app.version.FTASWVersion
com.sec.android.app.version.FTAHWVersion
com.sec.android.app.version.HWIDInfo
com.sec.android.app.version.CpuVersion
com.sec.android.app.status.BattType
com.sec.android.app.status.BatteryStatus
com.sec.android.app.status.BatteryStatusEng
com.sec.android.app.status.BatteryStatus_kor
com.sec.android.app.status.PowerStatus
com.sec.android.app.status.LightsensorRead
com.sec.android.app.status.TouchNoise
com.sec.android.app.status.TouchNoiseSynaptics
com.sec.android.app.status.HdcpCheckDialog
com.sec.android.app.status.AccSensorCalibration
com.sec.android.app.status.SPenDetectionTest
com.sec.android.app.status.SPenTestUI
com.sec.android.app.status.SPenTestMode
com.sec.android.app.status.SPen_AccuracyUI
com.sec.android.app.status.SPen_LinearityUI
com.sec.android.app.status.SPen_HoverAccurayUI
com.sec.android.app.status.EPenTestUI
com.sec.android.app.status.EPenTestMain
com.sec.android.app.status.LcdTypeInfo
com.sec.android.app.status.RTCTimeRead
com.sec.android.app.status.FailHistRead
com.sec.android.app.status.FailHistDetailInformation
com.sec.android.app.status.touch_key_sensitivity_default
com.sec.android.app.status.IDChipNFCTest
com.sec.android.app.status.touch_key_sensitivity_graph
com.sec.android.app.status.touch_key_sensitivity
com.sec.android.app.status.vibration_test
com.sec.android.app.status.melody_test
com.sec.android.app.status.SoundSourceTest
com.sec.android.app.status.touch_firmware
com.sec.android.app.status.PointerLocation
com.sec.android.app.status.Proximity_test
com.sec.android.app.status.ram_check
com.sec.android.app.status.cabctest
com.sec.android.app.status.BatteryCoolDown
com.sec.android.app.status.MdnieTest
com.sec.android.app.status.Proximity_offset
com.sec.android.app.status.Iris_proximity
com.sec.android.app.status.Proximity_color
com.sec.android.app.status.AP_chip_test
com.sec.android.app.status.AP_chip_test_Qualcomm
com.sec.android.app.status.Proximity_offset_sharp_nonadc
com.sec.android.app.status.Proximity_offset_JB
com.sec.android.app.status.SecureJT
com.sec.android.app.status.ShowCountryCertInfo
com.sec.android.app.status.IrisSetting
com.sec.android.app.status.LoopbackTestNew
com.sec.android.app.status.PCMDump
com.sec.android.app.status.GloveSetting
com.sec.android.app.status.TspResult
com.sec.android.app.status.TspTestMode
com.sec.android.app.status.TspHoverAccuracyPoint
com.sec.android.app.status.TspSideTouchTest
com.sec.android.app.status.CoreCTRL
com.sec.android.app.status.WiFiStressTest
com.sec.android.app.status.GripSensorCalibrationEntry
com.sec.android.app.status.GripSensorCalibrationEntryNew
com.sec.android.app.status.GripSensorCalibrationTouchIC
com.sec.android.app.status.GripSensorCalibrationTouchIC_A96T316
com.sec.android.app.status.GripSensorCalibrationASPxx
com.sec.android.app.status.GripSensorCalibrationADxxxx
com.sec.android.app.status.GripSensorCalibrationSXxxxx
com.sec.android.app.status.GripSensorCalibrationSXxxxx_CP
com.sec.android.app.status.GripSensorCalibrationSXxxxxNew
com.sec.android.app.status.GripSensorInitialWorkingTest
com.sec.android.app.status.GripSensorInitialWorkingTest_CP
com.sec.android.app.status.GripSensorInitialWorkingTestDouble
com.sec.android.app.status.GripSensorInitialWorkingTestNew
com.sec.android.app.status.GripSensorInitialWorkingTestLnB
com.sec.android.app.status.GripSensorInitialWorkingTestTouch
com.sec.android.app.status.GripSensorCalibrationCalScreen
com.sec.android.app.status.GripSensorCalibration
com.sec.android.app.status.GripSensorTest
com.sec.android.app.status.GripSensorTest2
com.sec.android.app.status.GripSensorTest2_CP
com.sec.android.app.status.GripSensorCalibrationDoubleSXxxxx
com.sec.android.app.status.receiverSpeakerTest
com.sec.android.app.status.DualChargingMode
com.sec.android.app.status.CCIC_LPM
com.sec.android.app.status.BatteryDataHistory
com.sec.android.app.status.McdTest
com.sec.android.app.status.BypassMode
com.sec.android.app.status.ForceTouchTestMode
com.sec.android.app.status.ForceTouchTest
com.sec.android.app.status.ForceTouchComplexTest
com.sec.android.app.status.ForceTouchSelfTest
com.sec.android.app.status.ForceTouchCalRawData
com.sec.android.app.status.ForceTouchJitterTest
com.sec.android.app.status.BarcodeEmulTest
com.sec.android.app.status.BeamActivity
com.sec.android.app.status.HandWriteHwPartInformList
com.sec.android.app.status.HandWriteHwPartInform
com.sec.android.app.status.ColorCompensation
com.sec.android.app.status.ColorCompensationNew
com.sec.android.app.status.UIOisSelfTest
com.sec.android.app.status.ColourBalance
com.sec.android.app.status.ShowProtoTypeSerialNumber
com.sec.android.app.status.TspGhostTouchTest
com.sec.android.app.status.ProximityTouchSensingTest
com.sec.android.app.status.TouchSensitivityMeasurement
com.sec.android.app.status.BrightnessControl
com.sec.android.app.status.GripSensorMultiTouchIC
com.sec.android.app.status.GripSensorMultiTouchICWorkingTest
com.sec.android.app.status.JigBSignal
com.sec.android.app.status.SlidingMotor
com.sec.android.app.brightness.Brightness
com.sec.android.app.phoneutil.UsbLogging
com.sec.android.app.fuelgauge.FuelGaugeRegister

Receivers

Information computed with AndroGuard.

com.sec.android.app.serial_number_label_Indicator.MainLabelBroadcastReceiver
com.sec.android.app.status.WakeUpReceiver
com.sec.android.app.shutdown.ShutdownSettingBroadcastReceiver
com.sec.android.app.version.Version_Receiver
com.sec.android.app.entry.FactoryKeyStringBroadcastReceiver
com.sec.android.app.brightness.BrightnessReceiver
com.sec.android.app.phoneutil.PhoneUtilReceiver

Services

Information computed with AndroGuard.

com.sec.android.app.status.ModuleAudioService
com.sec.android.app.status.AlwaysOnDisplayService

Sample timeline

Oldest file found in APK Jan. 1, 2009, midnight
Latest file found in APK Jan. 1, 2009, midnight
Certificate valid not before June 22, 2011, 12:25 p.m.
First submission on VT April 27, 2021, 4:08 a.m.
Last submission on VT April 27, 2021, 4:08 a.m.
Upload on Pithus Nov. 13, 2021, 6:38 a.m.
Certificate valid not after Nov. 7, 2038, 12:25 p.m.

NIAP analysis

Information computed with MobSF.

FCS_RBG_EXT.1.1 The application use no DRBG functionality for its cryptographic operations.
Random Bit Generation Services
FCS_STO_EXT.1.1 The application does not store any credentials to non-volatile memory.
Storage of Credentials
FCS_CKM_EXT.1.1 The application generate no asymmetric cryptographic keys.
Cryptographic Key Generation Services
FDP_DEC_EXT.1.1 The application has access to ['location', 'bluetooth', 'network connectivity', 'camera'].
Access to Platform Resources
FDP_DEC_EXT.1.2 The application has access to ['system logs'].
Access to Platform Resources
FDP_NET_EXT.1.1 The application has no network communications.
Network Communications
FDP_DAR_EXT.1.1 The application does not encrypt files in non-volatile memory.
Encryption Of Sensitive Application Data
FMT_MEC_EXT.1.1 The application invoke the mechanisms recommended by the platform vendor for storing and setting configuration options.
Supported Configuration Mechanism
FTP_DIT_EXT.1.1 The application does not encrypt any data in traffic or does not transmit any data between itself and another trusted IT product.
Protection of Data in Transit
FCS_COP.1.1(2) The application perform cryptographic hashing services not in accordance with FCS_COP.1.1(2) and uses the cryptographic algorithm RC2/RC4/MD4/MD5.
Cryptographic Operation - Hashing

Code analysis

Information computed with MobSF.

High
CVSS:5.5
App can read/write to External Storage. Any App can read data written to External Storage.
MASVS: MSTG-STORAGE-2
CWE-276 Incorrect Default Permissions
M2: Insecure Data Storage
Files:
 com/sec/android/app/status/BatteryStatus_kor.java
com/sec/android/app/status/Proximity_color.java
com/sec/xmldata/support/Support.java
com/sec/android/app/status/touch_firmware.java
Low
CVSS:7.5
The App logs information. Sensitive information should never be logged.
MASVS: MSTG-STORAGE-3
CWE-532 Insertion of Sensitive Information into Log File
Files:
 com/sec/android/app/status/ModuleAudioService.java
com/sec/android/app/status/cabctest.java
com/samsung/android/sdk/cover/ScoverManager.java
com/sec/android/app/status/BatteryStatus_kor.java
com/sec/android/app/status/BatteryCoolDown.java
com/sec/android/app/status/touch_key_sensitivity_graph.java
com/sec/android/app/status/ShowCountryCertInfo.java
com/sec/android/app/status/PowerStatus.java
com/sec/android/app/phoneutil/UsbLogging.java
com/sec/android/app/status/LtUtil.java
com/sec/android/app/lcdtest/support/LtUtil.java
com/sec/xmldata/support/XmlUtil.java
com/sec/android/app/status/MdnieTest.java
com/sec/android/app/status/FailHistRead.java
com/sec/android/app/serial_number_label_Indicator/MainLabelBroadcastReceiver.java
com/sec/android/app/shutdown/ShutdownSettingBroadcastReceiver.java
com/sec/android/app/status/BattType.java
com/sec/android/app/status/Proximity_offset_JB.java
com/sec/android/app/status/PCMDump.java
High
CVSS:7.5
The App uses an insecure Random Number Generator.
MASVS: MSTG-CRYPTO-6
CWE-330 Use of Insufficiently Random Values
M5: Insufficient Cryptography
Files:
 com/sec/android/app/status/TspSideTouchTest.java
High
CVSS:7.4
MD5 is a weak hash known to have hash collisions.
MASVS: MSTG-CRYPTO-4
CWE-327 Use of a Broken or Risky Cryptographic Algorithm
M5: Insufficient Cryptography
Files:
 com/sec/android/app/status/HandWriteHwPartInform.java

Permissions analysis

Information computed with MobSF.

High android.permission.WRITE_EXTERNAL_STORAGE read/modify/delete external storage contents
Allows an application to write to external storage.
High android.permission.READ_PHONE_STATE read phone state and identity
Allows the application to access the phone features of the device. An application with this permission can determine the phone number and serial number of this phone, whether a call is active, the number that call is connected to and so on.
High android.permission.WRITE_SETTINGS modify global system settings
Allows an application to modify the system's settings data. Malicious applications can corrupt your system's configuration.
High android.permission.MOUNT_UNMOUNT_FILESYSTEMS mount and unmount file systems
Allows the application to mount and unmount file systems for removable storage.
High android.permission.CALL_PHONE directly call phone numbers
Allows the application to call phone numbers without your intervention. Malicious applications may cause unexpected calls on your phone bill. Note that this does not allow the application to call emergency numbers.
High android.permission.WRITE_APN_SETTINGS write Access Point Name settings
Allows an application to modify the APN settings, such as Proxy and Port of any APN.
High android.permission.CAMERA take pictures and videos
Allows application to take pictures and videos with the camera. This allows the application to collect images that the camera is seeing at any time.
High android.permission.ACCESS_FINE_LOCATION fine (GPS) location
Access fine location sources, such as the Global Positioning System on the phone, where available. Malicious applications can use this to determine where you are and may consume additional battery power.
High android.permission.READ_LOGS read sensitive log data
Allows an application to read from the system's various log files. This allows it to discover general information about what you are doing with the phone, potentially including personal or private information.
Low android.permission.VIBRATE control vibrator
Allows the application to control the vibrator.
Low android.permission.WAKE_LOCK prevent phone from sleeping
Allows an application to prevent the phone from going to sleep.
Low android.permission.RECEIVE_BOOT_COMPLETED automatically start at boot
Allows an application to start itself as soon as the system has finished booting. This can make it take longer to start the phone and allow the application to slow down the overall phone by always running.
Low android.permission.MODIFY_AUDIO_SETTINGS change your audio settings
Allows application to modify global audio settings, such as volume and routing.
Low android.permission.BLUETOOTH_ADMIN bluetooth administration
Allows applications to discover and pair bluetooth devices.
Low android.permission.BLUETOOTH create Bluetooth connections
Allows applications to connect to paired bluetooth devices.
Low android.permission.ACCESS_WIFI_STATE view Wi-Fi status
Allows an application to view the information about the status of Wi-Fi.
Low android.permission.CHANGE_WIFI_STATE change Wi-Fi status
Allows an application to connect to and disconnect from Wi-Fi access points and to make changes to configured Wi-Fi networks.
Low android.permission.ACCESS_NETWORK_STATE view network status
Allows an application to view the status of all networks.
Low android.permission.CHANGE_NETWORK_STATE change network connectivity
Allows applications to change network connectivity state.
Medium android.permission.DEVICE_POWER turn phone on or off
Allows the application to turn the phone on or off.
Medium android.permission.HARDWARE_TEST test hardware
Allows the application to control various peripherals for the purpose of hardware testing.
Medium android.permission.CLEAR_APP_USER_DATA delete other applications' data
Allows an application to clear user data.
Medium android.permission.MASTER_CLEAR reset system to factory defaults
Allows an application to completely reset the system to its factory settings, erasing all data, configuration and installed applications.
Medium android.permission.REBOOT force phone reboot
Allows the application to force the phone to reboot.
Medium android.permission.CHANGE_CONFIGURATION change your UI settings
Allows an application to change the current configuration, such as the locale or overall font size.
Medium android.permission.MODIFY_PHONE_STATE modify phone status
Allows the application to control the phone features of the device. An application with this permission can switch networks, turn the phone radio on and off and the like, without ever notifying you.
Medium android.permission.ACCESS_CHECKIN_PROPERTIES access check-in properties
Allows read/write access to properties uploaded by the check-in service. Not for use by common applications.
Medium android.permission.WRITE_SECURE_SETTINGS modify secure system settings
Allows an application to modify the system's secure settings data. Not for use by common applications.
Medium android.permission.UPDATE_DEVICE_STATS modify battery statistics
Allows the modification of collected battery statistics. Not for use by common applications.
com.sec.android.app.factorymode.permission.KEYSTRING Unknown permission
Unknown permission from android reference
com.sec.android.app.DataCreate.permission.KEYSTRING Unknown permission
Unknown permission from android reference
com.sec.android.app.phoneutil.permission.KEYSTRING Unknown permission
Unknown permission from android reference
com.sec.android.app.selftestmode.permission.KEYSTRING Unknown permission
Unknown permission from android reference
com.sec.android.app.servicemodeapp.permission.KEYSTRING Unknown permission
Unknown permission from android reference
com.sec.factory.permission.KEYSTRING Unknown permission
Unknown permission from android reference
com.sec.modem.settings.permission.KEYSTRING Unknown permission
Unknown permission from android reference
com.sec.testingsettings.permission.KEYSTRING Unknown permission
Unknown permission from android reference
com.sec.permission.preconfig Unknown permission
Unknown permission from android reference
android.permission.WRITE_MEDIA_STORAGE Unknown permission
Unknown permission from android reference
com.android.launcher.permission.INSTALL_SHORTCUT Unknown permission
Unknown permission from android reference
com.android.launcher.permission.UNINSTALL_SHORTCUT Unknown permission
Unknown permission from android reference
com.samsung.accessory.manager.permission.AUTHENTICATION_CONTROL Unknown permission
Unknown permission from android reference
android.permission.sec.BARCODE_READ Unknown permission
Unknown permission from android reference
android.permission.WRITE_OWNER_DATA Unknown permission
Unknown permission from android reference
android.Manifest.permission.USE_IRIS Unknown permission
Unknown permission from android reference

Threat analysis

Information computed with Quark-Engine.

Confidence:
100%
Find a method from given class name, usually for reflection
Confidence:
100%
Modify voice volume
Confidence:
100%
Method reflection
Confidence:
100%
Monitor the broadcast action events (BOOT_COMPLETED)
Confidence:
100%
Get calendar information
Confidence:
80%
Read data and put it into a buffer stream
Confidence:
80%
Read file and put it into a stream
Confidence:
80%
Open a file from given absolute path of the file
Confidence:
80%
Get absolute path of the file and store in string

Behavior analysis

Information computed with MobSF.

Base64 decode
       com/sec/xmldata/support/XMLDataStorage.java
Execute os command
       com/sec/android/app/status/PowerStatus.java
com/sec/android/app/lcdtest/support/LtUtil.java
Get system service
       com/sec/android/app/status/SPen_HoverAccurayUI.java
com/sec/android/app/status/vibration_test.java
com/sec/android/app/status/BatteryStatus_kor.java
com/sec/android/app/status/receiverSpeakerTest.java
com/sec/android/app/status/GripSensorTest.java
com/sec/android/app/status/GripSensorCalibrationSXxxxxNew.java
com/sec/android/app/status/touch_key_sensitivity_view.java
com/sec/android/app/status/TspSideTouchTest.java
com/sec/android/app/status/TouchNoise.java
com/sec/android/app/status/GripSensorInitialWorkingTestTouch.java
com/sec/android/app/status/GripSensorMultiTouchICWorkingTest.java
com/sec/android/app/status/WiFiStressTest.java
com/sec/android/app/status/SPen_LinearityUI.java
com/sec/android/app/status/GripSensorInitialWorkingTestDouble.java
com/sec/android/app/status/SPen_AccuracyUI.java
com/sec/android/app/status/ColorCompensationNew.java
com/sec/android/app/status/PCMDump.java
com/sec/android/app/status/SoundSourceTest.java
com/sec/android/app/status/Proximity_test.java
com/sec/android/app/status/LightsensorRead.java
com/sec/android/app/status/ForceTouchComplexTest.java
com/sec/android/app/status/FailHistDetailInformation.java
com/sec/android/app/status/ModuleAudioService.java
com/sec/android/app/status/ColorCompensation.java
com/sec/android/app/status/WakeUpReceiver.java
com/sec/android/app/status/LoopbackTestNew.java
com/sec/android/app/shutdown/ShutdownPreference.java
com/sec/android/app/status/touch_key_sensitivity_default.java
com/sec/android/app/status/GripSensorCalibrationDoubleSXxxxx.java
com/sec/android/app/version/SimpleVersion.java
com/sec/android/app/lcdtest/view/Graph.java
com/sec/android/app/status/SPenTestUI.java
com/sec/android/app/status/IrisSetting.java
com/sec/android/app/status/TspHoverAccuracyPoint.java
com/sec/android/app/status/BrightnessControl.java
com/sec/android/app/status/GripSensorCalibrationTouchIC_A96T316.java
com/sec/android/app/status/AlwaysOnDisplayService.java
com/sec/android/app/status/TouchNoiseSynaptics.java
com/sec/android/app/shutdown/Uart1KControl.java
com/sec/android/app/status/Proximity_offset.java
com/sec/android/app/status/touch_key_sensitivity_graph.java
com/sec/android/app/status/HandWriteHwPartInformList.java
com/sec/android/app/status/GripSensorCalibrationADxxxx.java
com/sec/android/app/status/BatteryStatusEng.java
com/sec/android/app/status/BatteryStatus.java
com/sec/android/app/lcdtest/modules/ModulePower.java
com/sec/android/app/status/GripSensorInitialWorkingTest_CP.java
com/sec/android/app/status/SlidingMotor.java
com/sec/android/app/status/Proximity_offset_JB.java
com/sec/android/app/status/EPenTestUI.java
com/sec/android/app/status/GripSensorCalibrationTouchIC.java
com/sec/android/app/status/touch_firmware.java
com/sec/android/app/status/AccSensorCalibration.java
com/sec/android/app/lcdtest/modules/ModuleObject.java
com/sec/android/app/status/GripSensorTest2.java
com/sec/android/app/status/GripSensorTest2_CP.java
com/sec/android/app/status/GripSensorInitialWorkingTest.java
com/sec/android/app/status/GripSensorInitialWorkingTestLnB.java
com/sec/android/app/lcdtest/modules/ModuleForceTouch.java
com/sec/android/app/lcdtest/modules/ModuleDevice.java
com/sec/android/app/status/GripSensorInitialWorkingTestNew.java
com/sec/android/app/status/SPenTestMode.java
com/sec/android/app/status/melody_test.java
com/sec/android/app/status/GripSensorCalibrationASPxx.java
com/sec/android/app/status/TouchSensitivityMeasurement.java
com/sec/android/app/status/Proximity_offset_sharp_nonadc.java
com/sec/android/app/status/GripSensorMultiTouchIC.java
com/sec/android/app/status/Iris_proximity.java
com/sec/android/app/status/GripSensorCalibrationSXxxxx.java
Inter process communication
       com/sec/android/app/status/BatteryStatus_kor.java
com/sec/android/app/status/GripSensorCalibrationCalScreen.java
com/sec/android/app/status/TspTestMode.java
com/sec/android/app/status/GripSensorTest.java
com/sec/android/app/status/DualChargingMode.java
com/sec/android/app/status/GripSensorCalibrationSXxxxxNew.java
com/sec/android/app/status/GripSensorCalibration.java
com/sec/android/app/status/GripSensorCalibrationEntryNew.java
com/sec/android/app/status/TouchNoise.java
com/sec/android/app/status/WiFiStressTest.java
com/sec/android/app/brightness/BrightnessReceiver.java
com/sec/android/app/entry/FactoryKeyStringBroadcastReceiver.java
com/sec/android/app/status/ColorCompensationNew.java
com/sec/android/app/serial_number_label_Indicator/MainLabelBroadcastReceiver.java
com/sec/android/app/status/touch_key_sensitivity.java
com/sec/android/app/status/ForceTouchTest.java
com/sec/android/app/status/ModuleAudioService.java
com/sec/android/app/status/GripSensorCalibrationEntry.java
com/sec/android/app/version/Version_Receiver.java
com/sec/android/app/status/ColorCompensation.java
com/sec/android/app/status/WakeUpReceiver.java
com/sec/android/app/status/LoopbackTestNew.java
com/sec/android/app/status/GripSensorCalibrationDoubleSXxxxx.java
com/sec/android/app/status/SPenTestUI.java
com/sec/android/app/status/GripSensorCalibrationSXxxxx_CP.java
com/sec/android/app/status/GripSensorCalibrationTouchIC_A96T316.java
com/sec/android/app/status/AlwaysOnDisplayService.java
com/sec/android/app/status/Proximity_offset.java
com/sec/android/app/status/HandWriteHwPartInformList.java
com/sec/android/app/status/GripSensorCalibrationADxxxx.java
com/sec/android/app/status/ColourBalance.java
com/sec/android/app/status/EPenTestMain.java
com/sec/android/app/status/BarcodeEmulTest.java
com/sec/android/app/version/SimpleVersionTMO.java
com/sec/android/app/shutdown/ShutdownSettingBroadcastReceiver.java
com/sec/android/app/status/HandWriteHwPartInform.java
com/sec/android/app/status/BeamActivity.java
com/sec/android/app/status/EPenTestUI.java
com/sec/android/app/status/GripSensorCalibrationTouchIC.java
com/sec/android/app/lcdtest/modules/ModuleCoverID.java
com/sec/android/app/status/GripSensorTest2.java
com/sec/android/app/status/GripSensorTest2_CP.java
com/sec/android/app/status/SPenDetectionTest.java
com/sec/android/app/status/ForceTouchCalRawData.java
com/sec/android/app/phoneutil/PhoneUtilReceiver.java
com/sec/android/app/lcdtest/modules/ModuleDevice.java
com/sec/android/app/status/ForceTouchTestMode.java
com/sec/android/app/status/SPenTestMode.java
com/sec/android/app/status/GripSensorCalibrationASPxx.java
com/sec/android/app/status/GripSensorMultiTouchIC.java
com/sec/android/app/status/FailHistRead.java
com/sec/android/app/status/FactoryTestPhone.java
com/sec/android/app/status/GripSensorCalibrationSXxxxx.java
Java reflection
       com/sec/android/app/status/TspDataMeasure.java
com/sec/android/app/status/vibration_test.java
Local file i/o operations
       com/sec/android/app/shutdown/ShutdownPreference.java
com/sec/android/app/entry/FactoryKeyStringBroadcastReceiver.java
com/sec/android/app/phoneutil/UsbLogging.java
Message digest
       com/sec/android/app/status/HandWriteHwPartInform.java
Sending broadcast
       com/sec/android/app/status/WiFiStressTest.java
com/sec/android/app/entry/FactoryKeyStringBroadcastReceiver.java
com/sec/android/app/phoneutil/PhoneUtilReceiver.java
com/sec/android/app/lcdtest/modules/ModuleCoverID.java
Starting activity
       com/sec/android/app/status/BatteryStatus_kor.java
com/sec/android/app/status/Proximity_offset.java
com/sec/android/app/status/GripSensorCalibrationCalScreen.java
com/sec/android/app/status/HandWriteHwPartInformList.java
com/sec/android/app/status/TspTestMode.java
com/sec/android/app/status/GripSensorCalibrationADxxxx.java
com/sec/android/app/status/GripSensorCalibrationSXxxxxNew.java
com/sec/android/app/status/GripSensorCalibration.java
com/sec/android/app/status/GripSensorCalibrationEntryNew.java
com/sec/android/app/status/TouchNoise.java
com/sec/android/app/status/EPenTestMain.java
com/sec/android/app/status/BarcodeEmulTest.java
com/sec/android/app/brightness/BrightnessReceiver.java
com/sec/android/app/entry/FactoryKeyStringBroadcastReceiver.java
com/sec/android/app/serial_number_label_Indicator/MainLabelBroadcastReceiver.java
com/sec/android/app/shutdown/ShutdownSettingBroadcastReceiver.java
com/sec/android/app/status/touch_key_sensitivity.java
com/sec/android/app/status/GripSensorCalibrationTouchIC.java
com/sec/android/app/status/GripSensorCalibrationEntry.java
com/sec/android/app/version/Version_Receiver.java
com/sec/android/app/phoneutil/PhoneUtilReceiver.java
com/sec/android/app/status/ForceTouchTestMode.java
com/sec/android/app/status/SPenTestMode.java
com/sec/android/app/status/GripSensorCalibrationASPxx.java
com/sec/android/app/status/GripSensorCalibrationDoubleSXxxxx.java
com/sec/android/app/status/GripSensorCalibrationSXxxxx_CP.java
com/sec/android/app/status/GripSensorMultiTouchIC.java
com/sec/android/app/status/FailHistRead.java
com/sec/android/app/status/GripSensorCalibrationSXxxxx.java
com/sec/android/app/status/GripSensorCalibrationTouchIC_A96T316.java
Starting service
       com/sec/android/app/status/LoopbackTestNew.java
com/sec/android/app/entry/FactoryKeyStringBroadcastReceiver.java
com/sec/android/app/version/SimpleVersionTMO.java
com/sec/android/app/status/FactoryTestPhone.java

Control flow graphs analysis

Information computed by Pithus.

The application probably uses the phone sensors