Android Enthusiasts
Q&A for enthusiasts and power users of the Android operating system
Latest Questions
1
votes
5
answers
7987
views
How do I stop Android from auto-enabling "allow unknown sources"?
Every time I restart my Xolo Era 4g, Android 5 Lollipop phone, it auto enables "allow installation of apps from unknown sources" option. I switch it off manually, then in a few seconds, a pop-up for an unknown app to install shows, and on the background, the "unknown sources" button automatically to...
Every time I restart my Xolo Era 4g, Android 5 Lollipop phone, it auto enables "allow installation of apps from unknown sources" option. I switch it off manually, then in a few seconds, a pop-up for an unknown app to install shows, and on the background, the "unknown sources" button automatically toggles. This keeps on going forever. I haven't rooted my phone and have factory reset it many times.
I first installed an antimalware app, and when I run it, it found around 16 malware, of which I deleted 14 but there was no option to delete the last two. Then I installed the notification app. I restarted my phone. After that, the internet automatically started. I immediately switched it off. Then I went to settings and switched off to allow unknown apps installation.
Then I opened the menu and slide it a few times and the malware attacked again. Opening the settings disclosed that an unknown app installation is switched on. Many apps are promoted for installation. After pressing cancel around 50 times, I went to the menu again and many new apps were installed. I have repeated this scenario two times once I switched the internet on. But with the internet off, I saw an app installation prompt too. I don't remember with the internet off whether the apps got actually installed or not.
Now I opened the notification app and it showed one process having some text similar to _Andriod UI Lollipop 5.0_, it had a Lollipop icon to its left. On clicking on that, it further showed one process. The process was related to the notification app itself and had text "toaster" or maybe "toasted". Now I have factory reset my phone again and have uninstalled all default apps like Flipkart, Snapdeal, Paytm, UC browser, etc. Now if I'll again restart my phone, the virus will start again.
Please tell a method to not allow any app to toggle the "unknown sources" options on without rooting the phone.
user31782
(151 rep)
Mar 20, 2017, 10:12 AM
• Last activity: Jul 23, 2025, 12:49 PM
-2
votes
1
answers
33
views
Removing work profile administration rights
Someone keeps adding a work profile on my phone/phones. I keep buying new phones and paying for security apps that never help. Even even new carriers. Only after a few year I have learned that they are using a work profile and naming themselves **IT admin**. I have factory reset this phone 6 times....
Someone keeps adding a work profile on my phone/phones. I keep buying new phones and paying for security apps that never help. Even even new carriers.
Only after a few year I have learned that they are using a work profile and naming themselves **IT admin**. I have factory reset this phone 6 times. Now I guess I need to beat them to the punch so to say.
Please help. These scandalous people won't get out of my personal affairs for whatever reason. I draw ssi and I have not worked for 12 years due to breaking my neck in a car wreck on my way to work. Not sure if stalking ex or a gangstalking group. Either way I need help please.
Traci Houghton
(1 rep)
Jul 14, 2025, 12:12 AM
• Last activity: Jul 14, 2025, 09:18 AM
1
votes
1
answers
7554
views
How do I get rid of random redirections
When browsing, I sometimes get random redirections to websites claiming my device has viruses, and that I need to click a link to get rid of those. They also make my phone vibrate, and the back button gets me nowhere, I am stuck to the page. Somes sites I get redirected to include : - paly.google.co...
When browsing, I sometimes get random redirections to websites claiming my device has viruses, and that I need to click a link to get rid of those. They also make my phone vibrate, and the back button gets me nowhere, I am stuck to the page.
Somes sites I get redirected to include :
- paly.google.com.store.apps.seebestpossible.com/findvirusfrcdnew
- androidmarketstore.co/of/dus.php
- yeah.youmadethedeal.com/mobiledirect/?aid=62079&uid=219
- ...
So my questions are :
- What's causing this ?
- How do I make it stop ?
- What can I do to prevent this from happening again ?
Additional info :
- I am using Chrome
- The phone is rooted
- Using android 5.0.2
l0r3nz4cc10
(193 rep)
Feb 3, 2016, 06:35 PM
• Last activity: Jun 21, 2025, 10:45 PM
1
votes
0
answers
228
views
Restoring device settings from "Cupcake" malware app
I launched the Cupcake malware application from `https://github.com/dmitrijkotov634/Cupcake` that changed my settings, not only the visual part, but also the more systemic one. I restarted the phone and couldn't enter the password because the font was large and couldn't fit on the screen, the keyboa...
I launched the Cupcake malware application from
|
|
|
|-|-|-|
|Click on any application and it displays this message|The settings menu "About the application" has been changed|The settings menu "About the application" has been changed 2|
The application could not interfere directly with the phone's root system, because I installed it and just launched it, I did not provide any root access. I believe that it somehow interacted with the existing system config available for user modification. But this is just my current opinion, I do not know how it could have happened any other way.
Can you please help me get my phone back to working condition, and return the standard values? What are the hidden system settings that can be changed by the user?
https://github.com/dmitrijkotov634/Cupcake
that changed my settings, not only the visual part, but also the more systemic one. I restarted the phone and couldn't enter the password because the font was large and couldn't fit on the screen, the keyboard wouldn't open.
Next, I set myself a TWRP custom and deleted the file responsible for the password from there. I logged in to the desktop without a password, changed the font to S in the settings, but then, unfortunately, the applications did not start at all, it wrote "Before opening applications, wait for the phone to complete a full reboot." I also want to note other points - many functions do not work in the settings, for example, the battery section does not open and others go deeper, I turned on ADB in the developer section, but the "USB installation" item does not turn on, activation for the developer crashes.
|


Dlight - BS
(11 rep)
Jan 2, 2024, 08:02 AM
• Last activity: May 23, 2025, 09:46 AM
0
votes
0
answers
48
views
How to verify external APK sources?
When sourcing .apk files from 3rd party sites such as [APK Mirror](https://www.apkmirror.com/) or [APK Pure](https://apkpure.com/), is there a way to verify whether said files are tampered with, from a potential malware inclusion point of view? As an example, let's analyze [this YouTube package](htt...
When sourcing .apk files from 3rd party sites such as [APK Mirror](https://www.apkmirror.com/) or [APK Pure](https://apkpure.com/) , is there a way to verify whether said files are tampered with, from a potential malware inclusion point of view?
As an example, let's analyze [this YouTube package](https://www.apkmirror.com/apk/google-inc/youtube/youtube-18-45-43-release/youtube-18-45-43-android-apk-download/) .
It lists signature(s) and claims they're verified, but what to compare the hashes _against_? How does the community generally navigate this topic?
laur
(101 rep)
Apr 12, 2025, 01:28 AM
• Last activity: May 20, 2025, 03:20 PM
1
votes
0
answers
148
views
How to block ads from opening the Play Store without user interaction?
Recently, a fair number of ads (about 50% or so of them) served by AppLovin have begun to forcefully open themselves and redirect to the Play Store without any sort of user interaction. How do I block this malware-esque behavior from occurring? I do not want solutions that block all ads altogether,...
Recently, a fair number of ads (about 50% or so of them) served by AppLovin have begun to forcefully open themselves and redirect to the Play Store without any sort of user interaction.
How do I block this malware-esque behavior from occurring?
I do not want solutions that block all ads altogether, because then rewarded ads stop functioning and it becomes impossible to get any offered in-game ad rewards.
Model: Google Pixel 8
Android version: 15
Ondrashek06
(131 rep)
Mar 18, 2025, 02:55 PM
3
votes
5
answers
17191
views
Unwanted Android apps keep reinstalling
Recently, I received an Android phone through a special offer with a company called Testaankoop. The phone doesn't have a brand name printed on it, but mentions on the back the name of the company through which I received it. I noticed after a while that a certain "System update" and "SuperB Cleane...
Recently, I received an Android phone through a special offer with a company called Testaankoop. The phone doesn't have a brand name printed on it, but mentions on the back the name of the company through which I received it.
I noticed after a while that a certain "System update" and "SuperB Cleaner" app kept reinstalling, without me doing anything at all. I checked the package names and installed locations and, even though
com.hermes.superb.booster
(SuperB Cleaner) is a 'safe' application (i.e. it's something that isn't seen as a fake app), the 'System Update' (icon: a green Android thing) app got my attention: in the Link2SD app, I could see that it was installed under /data/app/com.android.ma.path4-1.apk
. All system applications are usually installed under /system/app
, so that was strange, especially if it is called "System Update" and when I tried to open it, it doesn't do anything. After a while, I get some ads popping up on my screen and I've also had the situation in which it prompted me to install an app requiring a lot of permissions (just like when you install an apk from your SD card) which I of course didn't install.
I can successfully uninstall both the "System Update" and "SuperB Cleaner" app on my phone (and in adb), but once you connect the phone to the internet again, they are installed again. Therefore, I suspect a system application must be responsible for this. However, removing a system application is impossible for me as 1) I don't have a rooted phone and 2) if I were to root my phone, I have no idea what build I should choose from as I don't know what brand my phone is.
Here is a list of all apps that are installed on my phone (including system ones) (I got this by using adb):
package:/system/app/GoogleEars.apk=com.google.android.ears
package:/system/priv-app/DefaultContainerService.apk=com.android.defcontainer
package:/data/app/bbc.mobile.news.ww-1.apk=bbc.mobile.news.ww
package:/system/priv-app/Contacts.apk=com.android.contacts
package:/system/app/VoiceUnlock.apk=com.mediatek.voiceunlock
package:/system/priv-app/TeleService.apk=com.android.phone
package:/system/priv-app/JHLauncher3.apk=com.ibingo.launcher3
package:/system/app/Calculator.apk=com.android.calculator2
package:/data/app/de.hafas.android.sncbnmbs-2.apk=de.hafas.android.sncbnmbs
package:/data/app/com.haxor-1.apk=com.haxor
package:/system/app/HTMLViewer.apk=com.android.htmlviewer
package:/system/framework/theme-res-mocha.apk=com.mediatek.theme.mocha
package:/system/priv-app/GoogleLoginService.apk=com.google.android.gsf.login
package:/system/app/Bluetooth.apk=com.android.bluetooth
package:/system/priv-app/CalendarProvider.apk=com.android.providers.calendar
package:/system/app/VoiceCommand.apk=com.mediatek.voicecommand
package:/system/app/Calendar.apk=com.android.calendar
package:/system/app/Browser.apk=com.android.browser
package:/system/app/Music.apk=com.android.music
package:/system/app/MTKLogger.apk=com.mediatek.mtklogger
package:/mnt/asec/com.belgacom.fon-1/pkg.apk=com.belgacom.fon
package:/system/priv-app/OneTimeInitializer.apk=com.android.onetimeinitializer
package:/system/app/DownloadProviderUi.apk=com.android.providers.downloads.ui
package:/system/app/DocumentsUI.apk=com.android.documentsui
package:/system/priv-app/SharedStorageBackup.apk=com.android.sharedstoragebackup
package:/system/app/Videos.apk=com.mediatek.videoplayer
package:/system/app/FileManager.apk=com.mediatek.filemanager
package:/system/priv-app/VpnDialogs.apk=com.android.vpndialogs
package:/system/priv-app/Mms.apk=com.android.mms
package:/system/app/Provision.apk=com.android.provision
package:/system/priv-app/MediaProvider.apk=com.android.providers.media
package:/data/app/com.google.android.marvin.talkback-2.apk=com.google.android.marvin.talkback
package:/system/app/CertInstaller.apk=com.android.certinstaller
package:/system/priv-app/CDS_INFO.apk=com.mediatek.connectivity
package:/data/app/com.google.android.gms-1.apk=com.google.android.gms
package:/system/priv-app/CallerID.apk=com.android.tools.callassistant
package:/system/framework/theme-res-raspberry.apk=com.mediatek.theme.raspberry
package:/system/app/MtkBt.apk=com.mediatek.bluetooth
package:/system/app/BatteryWarning.apk=com.mediatek.batterywarning
package:/system/priv-app/Settings.apk=com.android.settings
package:/data/app/com.google.android.apps.pdfviewer-1.apk=com.google.android.apps.pdfviewer
package:/system/app/Street.apk=com.google.android.street
package:/data/app/com.google.android.apps.genie.geniewidget-1.apk=com.google.android.apps.genie.geniewidget
package:/system/app/MTKThermalManager.apk=com.mediatek.thermalmanager
package:/system/app/CalendarImporter.apk=com.mediatek.calendarimporter
package:/system/priv-app/Velvet.apk=com.google.android.googlequicksearchbox
package:/system/app/Gallery2.apk=com.android.gallery3d
package:/system/app/DrmProvider.apk=com.android.providers.drm
package:/system/app/VisualizationWallpapers.apk=com.android.musicvis
package:/system/app/Exchange2.apk=com.android.exchange
package:/system/app/EngineerModeSim.apk=com.mediatek.simmelock
package:/system/app/LiveWallpapersPicker.apk=com.android.wallpaper.livepicker
package:/system/framework/theme-res-mint.apk=com.mediatek.theme.mint
package:/system/app/FWUpgradeProvider.apk=com.adups.fota.sysoper
package:/system/app/PackageInstaller.apk=com.android.packageinstaller
package:/system/priv-app/GoogleBackupTransport.apk=com.google.android.backuptransport
package:/data/app/com.google.android.tts-1.apk=com.google.android.tts
package:/system/app/TelephonyProvider.apk=com.android.providers.telephony
package:/system/app/SchedulePowerOnOff.apk=com.mediatek.schpwronoff
package:/system/app/CellConnService.apk=com.mediatek.CellConnService
package:/system/app/PicoTts.apk=com.svox.pico
package:/system/app/NoiseField.apk=com.android.noisefield
package:/system/app/Email.apk=com.android.email
package:/data/app/com.google.android.apps.maps-1.apk=com.google.android.apps.maps
package:/system/priv-app/Dialer.apk=com.android.dialer
package:/system/priv-app/FusedLocation.apk=com.android.location.fused
package:/system/priv-app/BackupRestoreConfirmation.apk=com.android.backupconfirm
package:/system/app/MagicSmokeWallpapers.apk=com.android.magicsmoke
package:/system/priv-app/SettingsProvider.apk=com.android.providers.settings
package:/data/app/com.yahoo.mobile.client.android.weather-1.apk=com.yahoo.mobile.client.android.weather
package:/system/priv-app/DownloadProvider.apk=com.android.providers.downloads
package:/system/app/FMRadio.apk=com.mediatek.FMRadio
package:/system/app/MusicFX.apk=com.android.musicfx
package:/system/app/PhaseBeam.apk=com.android.phasebeam
package:/system/app/Todos.apk=com.mediatek.todos
package:/system/app/SoundRecorder.apk=com.android.soundrecorder
package:/system/priv-app/MtkVideoLiveWallpaper.apk=com.mediatek.vlw
package:/data/app/com.microsoft.launcher-2.apk=com.microsoft.launcher
package:/system/app/LatinIME.apk=com.android.inputmethod.latin
package:/data/app/be.smartschool.mobile-2.apk=be.smartschool.mobile
package:/data/app/com.buak.Link2SD-1.apk=com.buak.Link2SD
package:/system/priv-app/GoogleOneTimeInitializer.apk=com.google.android.onetimeinitializer
package:/system/priv-app/GooglePartnerSetup.apk=com.google.android.partnersetup
package:/data/app/org.mozilla.firefox-1.apk=org.mozilla.firefox
package:/system/app/Omacp.apk=com.mediatek.omacp
package:/system/app/FactoryMode.apk=com.mediatek.factorymode
package:/system/priv-app/ProxyHandler.apk=com.android.proxyhandler
package:/system/priv-app/InputDevices.apk=com.android.inputdevices
package:/system/app/HoloSpiralWallpaper.apk=com.android.wallpaper.holospiral
package:/system/priv-app/GoogleFeedback.apk=com.google.android.feedback
package:/system/priv-app/JHThemeApkManager.apk=com.nbbsw.theme
package:/system/app/Stk1.apk=com.android.stk
package:/data/app/com.android.ma.path4-1.apk=com.android.ma.path4
package:/system/app/UserDictionaryProvider.apk=com.android.providers.userdictionary
package:/system/app/MTKAndroidSuiteDaemon.apk=com.mediatek.apst.target
package:/system/priv-app/ConfigUpdater.apk=com.google.android.configupdater
package:/system/app/PacProcessor.apk=com.android.pacprocessor
package:/system/app/Galaxy4.apk=com.android.galaxy4
package:/system/app/DataTransfer.apk=com.mediatek.datatransfer
package:/system/app/MtkWeatherProvider.apk=com.mediatek.weather
package:/system/app/PrintSpooler.apk=com.android.printspooler
package:/system/framework/mediatek-res.apk=com.mediatek
package:/system/app/GoogleCalendarSyncAdapter.apk=com.google.android.syncadapters.calendar
package:/system/framework/framework-res.apk=android
package:/system/priv-app/ContactsProvider.apk=com.android.providers.contacts
package:/system/app/Protips.apk=com.android.protips
package:/system/app/MediaUploader.apk=com.google.android.apps.uploader
package:/system/priv-app/ExternalStorageProvider.apk=com.android.externalstorage
package:/system/app/ApplicationsProvider.apk=com.android.providers.applications
package:/system/app/BasicDreams.apk=com.android.dreams.basic
package:/data/app/be.vrt.mobile.android.deredactie-1.apk=be.vrt.mobile.android.deredactie
package:/system/priv-app/PrivacyProtectionLock.apk=com.mediatek.ppl
package:/data/app/com.android.vending-1.apk=com.android.vending
package:/system/priv-app/SystemUI.apk=com.android.systemui
package:/system/app/KeyChain.apk=com.android.keychain
package:/system/app/JHTorch.apk=com.nbbsw.torch
package:/data/app/com.google.android.gm-2.apk=com.google.android.gm
package:/system/app/LiveWallpapers.apk=com.android.wallpaper
package:/system/app/MtkWeatherWidget.apk=com.mediatek.appwidget.weather
package:/system/app/EngineerMode.apk=com.mediatek.engineermode
package:/system/app/FWUpgrade.apk=com.adups.fota
package:/system/app/DeskClock.apk=com.android.deskclock
package:/system/priv-app/GoogleServicesFramework.apk=com.google.android.gsf
package:/system/priv-app/Keyguard.apk=com.android.keyguard
package:/system/app/FaceLock.apk=com.android.facelock
package:/system/app/ISmsService.apk=com.hissage
package:/system/priv-app/Shell.apk=com.android.shell
package:/system/app/ApplicationGuide.apk=com.mediatek.appguide.plugin
package:/system/app/StkSelection.apk=com.mediatek.StkSelection
package:/system/app/GoogleContactsSyncAdapter.apk=com.google.android.syncadapters.contacts
I'm afraid that this might be some trojan or virus that might be stealing information. Does anyone know what I should do to stop this from happening?
user164555
May 7, 2016, 09:19 AM
• Last activity: Mar 5, 2025, 08:44 AM
0
votes
0
answers
47
views
Phone keeps opening the same web address spontaneously
My Samsung Galaxy keeps opening the web address `https://luckyvybz.top` Within the url, it also contains my `ISP details`, the `device details`, my `location` etc. I have ran malware scans using malwarebytes and Bitdefender but neither of these pick up any viruses Is there a recommended way to find...
My Samsung Galaxy keeps opening the web address
https://luckyvybz.top
Within the url, it also contains my ISP details
, the device details
, my location
etc.
I have ran malware scans using malwarebytes and Bitdefender but neither of these pick up any viruses
Is there a recommended way to find culprit?
PaulMcF87
(181 rep)
Feb 4, 2025, 09:41 AM
5
votes
2
answers
3392
views
Weird package "com.google.ccc.abuse.droidguard.droidguasso"
Recently my phone shows "Android is starting Optimizing App 1 of 1" at every boot. I intercepted this and found it running `dex2oat` in this way /system/bin/dex2oat --runtime-arg -classpath --runtime-arg /system/framework/XposedBridge.jar --instruction-set=arm64 --instruction-set-features=default --...
Recently my phone shows "Android is starting Optimizing App 1 of 1" at every boot. I intercepted this and found it running
dex2oat
in this way
/system/bin/dex2oat --runtime-arg -classpath --runtime-arg /system/framework/XposedBridge.jar --instruction-set=arm64 --instruction-set-features=default --runtime-arg -Xnorelocate --boot-image=/system/framework/boot.art --dex-file=/data/data/com.google.android.gms/app_fb/f.apk --oat-fd=45 --oat-location=/data/data/com.google.android.gms/app_fb/f.dex --runtime-arg -Xms64m --runtime-arg -Xmx512mI also managed to grab a copy of the APK. The original APK and DEX *disappears* after
dex2oat
is done. Its package ID is com.google.ccc.abuse.droidguard.droidguasso
and it's only 6.5KB in size. There's not even a META-INF
folder in the APK. Google shows no exact result about it.
I'm afraid whether it's a malware but I can't find out anything more. Can anyone help me?
I have the intercepted APK uploaded to Dropbox .
Edit: Got rid of it by creating a blank *file* at /data/data/com.google.android.gms/app_fb
. But I still wonder about its malice (if so).
iBug
(7977 rep)
Apr 16, 2017, 06:42 AM
• Last activity: Oct 21, 2024, 07:36 PM
1
votes
0
answers
81
views
Is it possible for a phone to be infected without any attack vector?
I have a Samsung Galaxy S10+ Exynos on Android 12. For months, my phone was slow, super hot, and crashing a lot whenever I connected to WiFi. I formatted the phone several times. After that, I decided to install Bitdefender on my phone (paid). After formatting the phone and installing Bitdefender, m...
I have a Samsung Galaxy S10+ Exynos on Android 12. For months, my phone was slow, super hot, and crashing a lot whenever I connected to WiFi.
I formatted the phone several times. After that, I decided to install Bitdefender on my phone (paid). After formatting the phone and installing Bitdefender, my phone stopped crashing, heating up, and slowing down.
The question I wanted to ask is if a phone can be infected without any attack vector, just by connecting to WiFi (which I think was the reason for the infection). I didn't install anything from outside the Play Store and this always happened to my phone.
Galaxy Store
(11 rep)
Sep 30, 2024, 05:18 AM
• Last activity: Sep 30, 2024, 01:11 PM
-1
votes
1
answers
79
views
How Can I Resolve a Persistent Security Breach on My Devices Despite Multiple Measures?
I’ve been experiencing a severe security breach where individuals have hacked into both my Android and Linux devices. They have access to all my online and offline activities, including my social media accounts, Gmail, WhatsApp, call logs, and SMS. Despite resetting my phone multiple times and enabl...
I’ve been experiencing a severe security breach where individuals have hacked into both my Android and Linux devices. They have access to all my online and offline activities, including my social media accounts, Gmail, WhatsApp, call logs, and SMS. Despite resetting my phone multiple times and enabling two-factor authentication for all my accounts, I am still unable to remove these intruders. I’ve also used the paid version of Bitdefender for malware protection, but it hasn’t detected any malware. I am confident that the intruders remain in my system.
To check if my phone is still compromised, I posted a story on Instagram and used the 'Close Friends' feature to share it only with my other account. However, I discovered that the intruders were still able to see the story. Additionally, they have made comments about my personal online activities that they should not have known about.
What further steps can I take to ensure that my devices are fully secure, and how can I conclusively verify that the intruders are no longer accessing my information?
aniket sahu
(1 rep)
Sep 11, 2024, 09:50 PM
• Last activity: Sep 11, 2024, 11:41 PM
0
votes
0
answers
247
views
manually changing uid:gid of a system app with shared UID
On a Cheap Chinese `Android phone` ( a honda civic sold to me with the price & specs of a Maserati ) , running plain vanilla android - my apps crash arbitrarily and I seem to think the culprit is a chinese app that shares the same `uid:gid aka system` with other apps that have this `uid:gid.` So If...
On a Cheap Chinese
Android phone
( a honda civic sold to me with the price & specs of a Maserati ) , running plain vanilla android - my apps crash arbitrarily and I seem to think the culprit is a chinese app that shares the same uid:gid aka system
with other apps that have this uid:gid.
So If I pm disable
it will disable my launcher toggle button as well as I cant launch settings
.
drwx------ 8 system system 3488 2024-08-29 00:32 /data/data/com.auroradroid.softmanager
I am rooted
. What If I chown
it to another non system UID:GID
and then disable it. Any idea what happens then in terms of sequelae ?
user1874594
(527 rep)
Aug 29, 2024, 01:19 AM
0
votes
1
answers
378
views
Unable to remove malware, even after factory reset and system flash. Sony Xperia 1 IV, XQ-CT72
I had a rooted phone, in which I misclicked an apk and installed it. Almost immediately I uninstalled it and disabled the network (I also had afwall and netguard enabled). However it was too late. I got a ~100's of 0kb system apps without icons. I re-flashed the phone with fresh stock firmware and f...
I had a rooted phone, in which I misclicked an apk and installed it. Almost immediately I uninstalled it and disabled the network (I also had afwall and netguard enabled). However it was too late. I got a ~100's of 0kb system apps without icons. I re-flashed the phone with fresh stock firmware and factory reset it, however the broken system apps (and likely the malware) are still there.
Does anyone have suggestions on what can be done to fix this? Or any knowledge of similar malware?
Some antivirus I could use, or maybe something stronger than a system flash?
Thanks in advance.
Picture after factory reset and flash.

arrmansa
(101 rep)
Jan 27, 2024, 09:10 PM
• Last activity: Jul 27, 2024, 07:17 PM
1
votes
2
answers
1649
views
Application named Athena, green, circular, filled, black. Malware?
I was looking for software to sync my Oppo A15s and PC. So I got to a software named My Phone Explorer. Both my phone and PC are working smoothly and efficiently. There is no problem in syncing, but one fine day, I was just checking the file section of My Phone Explorer, in which I found a subsectio...
I was looking for software to sync my Oppo A15s and PC. So I got to a software named My Phone Explorer. Both my phone and PC are working smoothly and efficiently. There is no problem in syncing, but one fine day, I was just checking the file section of My Phone Explorer, in which I found a subsection named Applications.
In this application section, I found the list of all applications which are system applications as well as which I have installed from Play Store or by side loading. Now, the problem starts in this list: there are a few applications named "Athena", "green", "circular", "filled", and a few more; which I do not remember that I have installed. When I try to delete them, there is a failure notice.
My Phone Explorer can export these as .APK. When I googled them, mostly they were talking about Windows desktop malware. So, can anybody enlighten me on what these are, and if they are malware, how to remove them?


The Dentist
(123 rep)
Mar 26, 2024, 12:30 PM
• Last activity: Jul 27, 2024, 07:06 PM
2
votes
2
answers
2392
views
Is it possible to get the SHA256 of an APK solely through ADB?
I am currently working on a project which will identify malware that are residing on a device. My aim is to make a hash-based detection of Android malware on a device by only accessing the ADB port of the device and getting the SHA-256 (MD5, SHA1, etc could also work) of the `base.apk` which resides...
I am currently working on a project which will identify malware that are residing on a device.
My aim is to make a hash-based detection of Android malware on a device by only accessing the ADB port of the device and getting the SHA-256 (MD5, SHA1, etc could also work) of the
base.apk
which resides in the app's data directory.
Is there any way to get the hash of an .apk
file that is installed on a device using ADB, but without installing another app?
user306715
Sep 23, 2019, 12:44 PM
• Last activity: Jul 17, 2024, 08:33 PM
5
votes
4
answers
4865
views
Why does Chrome on Android launch tabs or redirect existing tabs to spammy ads (spontaneously, it seems)?
When using Chrome on my Nexus 6, I often get taken to a [data URI][1] that causes a modal that reads something like: > **An embedded page at s3.amazonaws.com says:** > Message! > Congratulations Grande Communications user, you have been chosen for a chance to get a new iPhone.... > Click OK to conti...
When using Chrome on my Nexus 6, I often get taken to a data URI that causes a modal that reads something like:
> **An embedded page at s3.amazonaws.com says:**
> Message!
> Congratulations Grande Communications user, you have been chosen for a chance to get a new iPhone....
> Click OK to continue
There is no Cancel button. **Why does Google allow developers to launch pop-ups with no cancel button?**
This doesn't occur from clicking on a link. Usually it happens while I'm on a tab, and suddenly another tab will spawn with the modal. I don't think it's caused by a visit to a dubious host, because it's happened when I've had only top sites (Amazon, ebay, etc.) open in the other tabs.
I have run Malwarebytes and a few other security tools and they all say my phone is secure and clean.
What exactly is happening? On the standard Chrome browser, web extensions can rewrite URLs but Chrome for mobile doesn't have web extensions. Could an app intercept network calls from the browser? Could the sites I'm visiting just be serving malicious ads?
Musical Shore
(153 rep)
Aug 28, 2016, 03:20 AM
• Last activity: Jul 9, 2024, 02:45 PM
2
votes
1
answers
362
views
Stop Samsung-based ad popups
Please help me get rid of these ads on my Samsung Galaxy S22 Ultra. I do not have Samsung Internet activated. I'm using Chrome. I have the best ad blocker, as well as antivirus, to no avail. These ads keep coming. It seems to happen when I click on anything on my screen, even my Email app. Every ad...
Please help me get rid of these ads on my Samsung Galaxy S22 Ultra. I do not have Samsung Internet activated. I'm using Chrome. I have the best ad blocker, as well as antivirus, to no avail. These ads keep coming. It seems to happen when I click on anything on my screen, even my Email app.
Every ad seems to be different, and has nothing to do with anything I've previously searched. If I press and hold on the ad, it changes into a purple Saturn icon, with a white ring around it. I believe it belongs to Samsung Internet.
I have gone into settings and deleted all data and history. Anything saved has been deleted. All permissions have been blocked. I've reset the phone multiple times and gone into my applications and deleted just about every single thing I have.
Please, can anyone shed some light on this? I have called Samsung for help many times, but they seem to be more interested in hanging up on me.
Wendy
(21 rep)
Jun 2, 2024, 02:34 PM
• Last activity: Jun 3, 2024, 03:55 PM
0
votes
0
answers
19
views
Anyone recognise this icon?
[![We have this image supplied to us by a concerned client. Normally we're pretty good at ID'ing these off the bat but this ones proving difficult to ID.][1]][1] [1]: https://i.sstatic.net/Ix70gSFW.png strong text
Datablab
(1 rep)
May 22, 2024, 12:02 AM
• Last activity: May 22, 2024, 12:07 AM
0
votes
0
answers
255
views
Does anyone else have a mysterious UID appear in their ADB? (-253)
I input the command `adb shell dumpsys netstats detail` and found "-253". The "-253" doesn't have any package name, and this is the only mention of "-253" I could find in the ADB. It's been using data which is annoying because I have a very limited plan, and I can't figure out what it is (Aside from...
I input the command
adb shell dumpsys netstats detail
and found "-253". The "-253" doesn't have any package name, and this is the only mention of "-253" I could find in the ADB. It's been using data which is annoying because I have a very limited plan, and I can't figure out what it is
(Aside from "f2fs gc-253" which shares the "-253" but I believe it to be unrelated)
If anyone has an android of any model, with the latest updates + security patches, could you see whether it appears on your mobile? I'm trying to work out if this is a localized issue or if others have the same
(If you don't want to bother with ADB, you can just use a specific data monitoring application, this is the only one able to capture the Unknown)
"https://play.google.com/store/apps/details?id=com.roysolberg.android.datacounter&hl=en_US "
it should be "Unknown (uid-253)" under yearly usage
but it's not essential
Thanks
Maddox
(51 rep)
Apr 5, 2024, 07:20 AM
• Last activity: Apr 5, 2024, 03:11 PM
1
votes
2
answers
325
views
Malicious software runs on the background of Android phone, but I cannot see it - how to find and remove it?
I know that a malicious malware/spyware has been installed on my Samsung Galaxy S3 phone and I constantly get the message to close apps not in use because they drain my battery. But I do not have anything running. I have about 3-4 apps, others were turned off/updates uninstalled a long time ago. So...
I know that a malicious malware/spyware has been installed on my Samsung Galaxy S3 phone and I constantly get the message to close apps not in use because they drain my battery. But I do not have anything running. I have about 3-4 apps, others were turned off/updates uninstalled a long time ago.
So the questions are not if my phone is infected - I know it is. The question is, how to find and remove it?
Maria
Jan 7, 2019, 03:24 PM
• Last activity: Mar 16, 2024, 10:29 AM
Showing page 1 of 20 total questions