UpdatedOct 19, 2024
PublishedOct 19, 2024
Packagecom.zamm.pigclick
MD50f0cfb7077e46d5d80e03be7b88a5e19
SHA1 (signer)F3:AF:50:F1:3F:83:93:8D:59:73:74:48:EF:E2:25:56:51:09:4C:AF
Signed byCN=Unknown, OU=Unknown, O=Unknown, L=Unknown, ST=Unknown, C=Unknown
Malware scanTRUSTED
Description
It is the first app from an indie developer, it does not require any kind of permissions, I will update it later and add new features
Required features
- Faketouch android.hardware.faketouch
Permissions (9)
pig click requests the following Android permissions:
- Access Adservices Ad Id android.permission.ACCESS_ADSERVICES_AD_ID
- Access Adservices Attribution android.permission.ACCESS_ADSERVICES_ATTRIBUTION
- Access Adservices Topics android.permission.ACCESS_ADSERVICES_TOPICS
- Access Network State android.permission.ACCESS_NETWORK_STATE
- Foreground Service android.permission.FOREGROUND_SERVICE
- Internet android.permission.INTERNET
- Wake Lock android.permission.WAKE_LOCK
- Gms Permission Ad Id com.google.android.gms.permission.AD_ID
- Com Zamm Pigclick Dynamic Receiver Not Exported Permission com.zamm.pigclick.DYNAMIC_RECEIVER_NOT_EXPORTED_PERMISSION