UpdatedAug 11, 2024
PublishedAug 11, 2024
Packagecom.android1500.androidfaker
MD5e0a56501acfad760640b7dc923519b3c
SHA1 (signer)31:5C:CB:1C:04:ED:1D:EE:F8:F0:7A:4C:1B:6E:02:38:BD:F3:F9:69
Signed byC=US, O=Android, CN=Android Debug
Architecturesx86, x86-64, armeabi-v7a, arm64-v8a
Malware scanUNKNOWN
Description
fake to android
Required features
- Faketouch android.hardware.faketouch
Permissions (7)
Android Faker requests the following Android permissions:
- Access Network State android.permission.ACCESS_NETWORK_STATE
- Foreground Service android.permission.FOREGROUND_SERVICE
- Internet android.permission.INTERNET
- Kill Background Processes android.permission.KILL_BACKGROUND_PROCESSES
- Query All Packages android.permission.QUERY_ALL_PACKAGES
- Vibrate android.permission.VIBRATE
- Com Android1500 Androidfaker Dynamic Receiver Not Exported Permission com.android1500.androidfaker.DYNAMIC_RECEIVER_NOT_EXPORTED_PERMISSION