[APP][v1.10] VD Infos (Package: com.vitaodoidao.vdinfos)

Search This thread

VD171

Senior Member
Jun 21, 2012
2,817
2
2,077
127.0.0.1
LG K10
Samsung Galaxy J7
Total found: 4.
* Emulator detected.
================
-> ROOT

#1. [* EMULATOR]: android-build

#2. [* EMULATOR]: [ro.build.user]: android-build

#3. [* EMULATOR]: [ro.bootmode]: unknown

#4. [* EMULATOR]: [ro.product.system.device]: generic

What would these things cause?

Curious if the Chase Banking App detects these as I can't get it to fully work with everything I try.
This means you are using an android emulator or a custom/modded rom.
 

ihavenolifee

Senior Member
Aug 22, 2017
56
5
This means you are using an android emulator or a custom/modded rom.

Total of tries: 7,261,495.

Total found: 7.

* Emulator detected.
================
-> ROOT

#1. [* EMULATOR]: android-build

#2. [* EMULATOR]: [ro.build.user]: android-build

#3. [* EMULATOR]: [ro.bootmode]: unknown

#4. [* EMULATOR]: [ro.product.system.device]: generic

#5. [Found]: eu.faircode.xlua

#6. [Found]: eu.faircode.xlua.ApplicationEx

#7. [Found]: /data/system/xlua

================

This is the full one actually.

For the Emulator I thought I was on Stock ROM so a bit confused.

Also any idea what to do with the XluaPrivacy files found?

Thanks again.

Still think the Chase app is like just superior somehow haha
 

sasha007

Senior Member
Aug 29, 2011
384
6
@VD171

Does my log signify root? I'm using Magisk v23 and magiskhide vdinfo. Also using XprivacyLUA with everything restricted for vdinfo.

How do i fix these findings?

-> Quantities

Total Time: 50 minutes and 12 seconds.

Total of tries: 6,311,301.

Total found: 40.

* Emulator detected.

================
================
-> ROOT

#1. [* EMULATOR]: unknown (SIM1)

#2. [* EMULATOR]: unknown (unknown)

#3. [* EMULATOR]: [gsm.network.type]: Unknown,Unknown

#4. [* EMULATOR]: com.device.emulator

#5. [Found]: com.keramidas.TitaniumBackup

#6. [Found]: com.keramidas.TitaniumBackupAddon

#7. [Found]: eu.faircode.xlua

#8. [Found]: eu.faircode.xlua.pro

#9. [Found]: /data/system/xlua

#10. [Found]: /data/system/xprivacy

#11. [Found]: /system/lib/libsigchain.so

#12. [Found]: /system/lib64/libsigchain.so

#13. [Found]: /system/lib64/libart-disassembler.so

#14. [Found]: /system/lib/libart-compiler.so

#15. [Found]: /system/lib64/libart-compiler.so

#16. [* EMULATOR]: /data/data/com.device.emulator

#17. [* EMULATOR]: /data/user/0/com.device.emulator

#18. [* EMULATOR]: /data/user_de/0/com.device.emulator

#19. [* EMULATOR]: /data/misc/profiles/cur/0/com.device.emulator

#20. [* EMULATOR]: /data/misc/profiles/ref/com.device.emulator

#21. [Found]: /data/data/com.keramidas.TitaniumBackup

#22. [Found]: /data/user/0/com.keramidas.TitaniumBackup

#23. [Found]: /data/user_de/0/com.keramidas.TitaniumBackup

#24. [Found]: /data/misc/profiles/cur/0/com.keramidas.TitaniumBackup

#25. [Found]: /data/misc/profiles/ref/com.keramidas.TitaniumBackup

#26. [Found]: /data/data/com.keramidas.TitaniumBackupAddon

#27. [Found]: /data/user/0/com.keramidas.TitaniumBackupAddon

#28. [Found]: /data/user_de/0/com.keramidas.TitaniumBackupAddon

#29. [Found]: /data/misc/profiles/cur/0/com.keramidas.TitaniumBackupAddon

#30. [Found]: /data/misc/profiles/ref/com.keramidas.TitaniumBackupAddon

#31. [Found]: /data/data/eu.faircode.xlua

#32. [Found]: /data/user/0/eu.faircode.xlua

#33. [Found]: /data/user_de/0/eu.faircode.xlua

#34. [Found]: /data/misc/profiles/cur/0/eu.faircode.xlua

#35. [Found]: /data/misc/profiles/ref/eu.faircode.xlua

#36. [Found]: /data/data/eu.faircode.xlua.pro

#37. [Found]: /data/user/0/eu.faircode.xlua.pro

#38. [Found]: /data/user_de/0/eu.faircode.xlua.pro

#39. [Found]: /data/misc/profiles/cur/0/eu.faircode.xlua.pro

#40. [Found]: /data/misc/profiles/ref/eu.faircode.xlua.pro

PS- Oprek detector doesn't detect anything but applist detector detects xposed hooks (attached screenshot)
 

Attachments

  • 20220814_175918.jpg
    20220814_175918.jpg
    1.3 MB · Views: 31
Last edited:

VD171

Senior Member
Jun 21, 2012
2,817
2
2,077
127.0.0.1
LG K10
Samsung Galaxy J7
@VD171

Does my log signify root? I'm using Magisk v23 and magiskhide vdinfo. Also using XprivacyLUA with everything restricted for vdinfo.

How do i fix these findings?

-> Quantities

Total Time: 50 minutes and 12 seconds.

Total of tries: 6,311,301.

Total found: 40.

* Emulator detected.

================
================
-> ROOT

#1. [* EMULATOR]: unknown (SIM1)

#2. [* EMULATOR]: unknown (unknown)

#3. [* EMULATOR]: [gsm.network.type]: Unknown,Unknown

#4. [* EMULATOR]: com.device.emulator

#5. [Found]: com.keramidas.TitaniumBackup

#6. [Found]: com.keramidas.TitaniumBackupAddon

#7. [Found]: eu.faircode.xlua

#8. [Found]: eu.faircode.xlua.pro

#9. [Found]: /data/system/xlua

#10. [Found]: /data/system/xprivacy

#11. [Found]: /system/lib/libsigchain.so

#12. [Found]: /system/lib64/libsigchain.so

#13. [Found]: /system/lib64/libart-disassembler.so

#14. [Found]: /system/lib/libart-compiler.so

#15. [Found]: /system/lib64/libart-compiler.so

#16. [* EMULATOR]: /data/data/com.device.emulator

#17. [* EMULATOR]: /data/user/0/com.device.emulator

#18. [* EMULATOR]: /data/user_de/0/com.device.emulator

#19. [* EMULATOR]: /data/misc/profiles/cur/0/com.device.emulator

#20. [* EMULATOR]: /data/misc/profiles/ref/com.device.emulator

#21. [Found]: /data/data/com.keramidas.TitaniumBackup

#22. [Found]: /data/user/0/com.keramidas.TitaniumBackup

#23. [Found]: /data/user_de/0/com.keramidas.TitaniumBackup

#24. [Found]: /data/misc/profiles/cur/0/com.keramidas.TitaniumBackup

#25. [Found]: /data/misc/profiles/ref/com.keramidas.TitaniumBackup

#26. [Found]: /data/data/com.keramidas.TitaniumBackupAddon

#27. [Found]: /data/user/0/com.keramidas.TitaniumBackupAddon

#28. [Found]: /data/user_de/0/com.keramidas.TitaniumBackupAddon

#29. [Found]: /data/misc/profiles/cur/0/com.keramidas.TitaniumBackupAddon

#30. [Found]: /data/misc/profiles/ref/com.keramidas.TitaniumBackupAddon

#31. [Found]: /data/data/eu.faircode.xlua

#32. [Found]: /data/user/0/eu.faircode.xlua

#33. [Found]: /data/user_de/0/eu.faircode.xlua

#34. [Found]: /data/misc/profiles/cur/0/eu.faircode.xlua

#35. [Found]: /data/misc/profiles/ref/eu.faircode.xlua

#36. [Found]: /data/data/eu.faircode.xlua.pro

#37. [Found]: /data/user/0/eu.faircode.xlua.pro

#38. [Found]: /data/user_de/0/eu.faircode.xlua.pro

#39. [Found]: /data/misc/profiles/cur/0/eu.faircode.xlua.pro

#40. [Found]: /data/misc/profiles/ref/eu.faircode.xlua.pro

PS- Oprek detector doesn't detect anything but applist detector detects xposed hooks (attached screenshot)
Yes, because you are using apps for rooted devices only.
You can hide all them using custom hooks on XPrivacyLua.
 
  • Like
Reactions: sasha007

sasha007

Senior Member
Aug 29, 2011
384
6
Yes, because you are using apps for rooted devices only.
You can hide all them using custom hooks on XPrivacyLua.

Thanks for your review. Can you kindly advise which hook to specifically use to hide these apps?
Also, will hiding these fix applist detector identifying Xposed hooks and XPrivacyLua?

One additional thing is Momo root detector says the environment is broken. Is this something to be concerned of?
 

VD171

Senior Member
Jun 21, 2012
2,817
2
2,077
127.0.0.1
LG K10
Samsung Galaxy J7
Thanks for your review. Can you kindly advise which hook to specifically use to hide these apps?
Also, will hiding these fix applist detector identifying Xposed hooks and XPrivacyLua?

One additional thing is Momo root detector says the environment is broken. Is this something to be concerned of?
Almost all methods present in PackageManger can gather details about installed apps, see here: https://developer.android.com/reference/android/content/pm/PackageManager#public-methods
Applist Detector uses queryIntentActivities().

XPrivacyLua is being detected because its folder path is permanently same, we should just hope @M66B fix that generating a new one folder path for every new installation and then avoiding any type of folder/file detection.

Since detections of momo are present in native codes only and its source is closed, you can just ignore its results.
 
  • Like
Reactions: sasha007

sasha007

Senior Member
Aug 29, 2011
384
6
Almost all methods present in PackageManger can gather details about installed apps, see here: https://developer.android.com/reference/android/content/pm/PackageManager#public-methods
Applist Detector uses queryIntentActivities().

XPrivacyLua is being detected because its folder path is permanently same, we should just hope @M66B fix that generating a new one folder path for every new installation and then avoiding any type of folder/file detection.

Since detections of momo are present in native codes only and its source is closed, you can just ignore its results.

Ok, since my VDINFO results didn't actually detect root, am I ok not mitigating the other files found by it if the apps I intend to run don't detect root either. Is the Emulator detected by VDInfo a sign that apps can detect root? I am a delivery person so my use case is with Uber, Lyft, Instacart type of apps.
 

VD171

Senior Member
Jun 21, 2012
2,817
2
2,077
127.0.0.1
LG K10
Samsung Galaxy J7
Ok, since my VDINFO results didn't actually detect root, am I ok not mitigating the other files found by it if the apps I intend to run don't detect root either. Is the Emulator detected by VDInfo a sign that apps can detect root? I am a delivery person so my use case is with Uber, Lyft, Instacart type of apps.
Yes, if my app VD Infos can read something, any other app can read the same thing.
Shamiko is enough for basic hiding root.
If you didn't have problems, so theres is nothing for fixing :cool:
 
  • Like
Reactions: sasha007

VD171

Senior Member
Jun 21, 2012
2,817
2
2,077
127.0.0.1
LG K10
Samsung Galaxy J7
Thanks for your review. Can you kindly advise which hook to specifically use to hide these apps?
Also, will hiding these fix applist detector identifying Xposed hooks and XPrivacyLua?

One additional thing is Momo root detector says the environment is broken. Is this something to be concerned of?
About xposed detection:

Xposed does NOT run in NATIVE-side.
Xposed run in JAVA-side only.

So, even using native methods, it needs to read contents from the java.
In someway at somewhere, you can hook the native method reading the java.

The app Applist Detector by @Dr-TSNG uses the library XposedDetector by vvb2060.
Here, you can see some native methods used for reading content from the java present in XposedDetector:
 
  • Like
Reactions: sasha007
I see no correlations of detections with Google Play Store.
Some apps are now requiring Play Protect enabled, just it.
About Netflix, you can download latest release directly from the official website:
You can too download and install other apps manually:
fixed, after fix safetynet fix, check with intergrity checker, now netflix show up again
 

Attachments

  • photo_2022-08-19_08-55-44.jpg
    photo_2022-08-19_08-55-44.jpg
    75.8 KB · Views: 21
  • photo_2022-08-19_08-55-54.jpg
    photo_2022-08-19_08-55-54.jpg
    25.7 KB · Views: 22
  • photo_2022-08-19_08-55-58.jpg
    photo_2022-08-19_08-55-58.jpg
    49 KB · Views: 22

tungtrinh1402

Member
Dec 13, 2014
5
0
@VD171 .
I use Android Faker and similar apps. when i use the feature "UPDATE CONTENTS" in VD-Info, it can read the original information of the android and all fake information. Is the original information of android do VD-Info access in BUILDS.PROP, android.os.Build, android.os.Process ?
And in addition, what components does VD-Info access to discover the original information of ? android?
My android information is below:

-> Android Version
Android 8.2
Android REL
Android 9
API 28
API 27
================
================
-> System Version
armeabi,armeabi-v7a
SMG360FC7Y5QE.G4BQOM
M105MUBS5BTG1
-> HOST
HOST
Samsung
SWDH7918
-> SERIAL
QAggED
5200a50efae7641d
-> Fingerprint
samsung/coreprimelte/coreprimelte:8.2/C7Y5QE/SMG360FC7Y5QE:user/release-keys
samsung/m10lteub/m10lte:9/PPR1.180610.011/M105MUBS5BTG1:user/release-keys
coreprimelte-user 8.2 C7Y5QE SMG360FC7Y5QE release-keys
m10lteub-user 9 PPR1.180610.011 M105MUBS5BTG1 release-keys
-> Device
coreprimelte
samsung
m10lte
universal7870
================
================
-> Brand
Samsung
================
================
-> Model
SM-G360F
SM-M105M
================
================
-> Product
coreprimelte
m10lteub
================
================
-> DISPLAY ID
C7Y5QE
SF-PORT V3 M105MUBS5BTG1
PPR1.180610.011
================
================
-> Manufacturer
samsung
================
================
-> Hardware
SAMSUNGEXYNOS7870
EXYNOS5
QCOM
cortex-a15
armv8l
x86
armeabi-v7a

[ro.bootimage.build.fingerprint]: samsung/coreprimelte/coreprimelte:8.2/C7Y5QE/SMG360FC7Y5QE:user/release-keys
[ro.bootimage.build.fingerprint]: samsung/m10lteub/m10lte:9/PPR1.180610.011/M105MUBS5BTG1:user/release-keys
[ro.build.fingerprint]: samsung/coreprimelte/coreprimelte:8.2/C7Y5QE/SMG360FC7Y5QE:user/release-keys
[ro.build.fingerprint]: samsung/m10lteub/m10lte:9/PPR1.180610.011/M105MUBS5BTG1:user/release-keys
[ro.build.description]: coreprimelte-user 8.2 C7Y5QE SMG360FC7Y5QE release-keys
[ro.build.description]: m10lteub-user 9 PPR1.180610.011 M105MUBS5BTG1 release-keys
[ro.build.id]: C7Y5QE
[ro.build.id]: PPR1.180610.011
[ro.build.host]: Samsung
[ro.build.host]: SWDH7918
[ro.build.product]: coreprimelte
[ro.build.product]: m10lte
[ro.build.user]: dpi
[ro.build.version.codename]: REL
[ro.build.version.incremental]: SMG360FC7Y5QE.G4BQOM
[ro.build.version.incremental]: M105MUBS5BTG1
[ro.build.version.release]: 8.2
[ro.build.version.release]: 9
[ro.build.version.security_patch]: 2020-07-01
[ro.hardware]: qcom
[ro.hardware.chipname]: exynos7870
[ro.hardware]: samsungexynos7870
[ro.product.board]: samsung
[ro.product.board]: universal7870
[ro.product.brand]: samsung
[ro.product.cpu.abi]: x86
[ro.product.cpu.abi]: armeabi-v7a
[ro.product.cpu.abi2]: armeabi
[ro.product.cpu.abilist]: armeabi-v7a,armeabi
[ro.product.cpu.abilist32]: armeabi-v7a,armeabi
[ro.product.cpu.abi2]: armeabi,armeabi-v7a
[ro.product.device]: coreprimelte
[ro.product.device]: m10lte
[ro.product.manufacturer]: samsung
[ro.product.model]: SM-G360F
[ro.product.model]: SM-M105M
[ro.product.name]: coreprimelte
[ro.product.name]: m10lteub
[ro.vendor.build.fingerprint]: samsung/coreprimelte/coreprimelte:8.2/C7Y5QE/SMG360FC7Y5QE:user/release-keys
[ro.vendor.build.fingerprint]: samsung/m10lteub/m10lte:9/PPR1.180610.011/M105MUBS5BTG1:user/release-keys
[ro.build.type]: user
[ro.build.tags]: release-keys
[ro.build.display.id]: C7Y5QE
[ro.build.display.id]: SF-PORT V3 M105MUBS5BTG1
[ro.debuggable]: 0
[ro.debuggable]: 1
[ro.secure]: 1
[ro.secure]: 0
[ro.securestorage.knox]: false
[ro.securestorage.support]: false
[ro.build.selinux]: 1
[ro.build.selinux.enforce]: 0
[ro.build.selinux.enforce]: 1
[service.adb.root]: 1
[ro.kernel.qemu]: 0
[ro.kernel.qemu.gles]: 1
[ril.serialnumber]: QAgeED
[ril.serialnumber]: R58J762T0YZ
[ro.serialno]: QAgeED
[ro.serialno]: 5200a50efae7641d
[sys.serialnumber]: QAgeED
[dalvik.vm.isa.arm.variant]: cortex-a15
[gsm.network.type]: LTE,Unknown
[gsm.operator.alpha]: TRIATEL
[gsm.operator.alpha]: VN VINAPHONE
[gsm.operator.iso-country]: AS
[gsm.operator.iso-country]: vn
[gsm.operator.numeric]: TRIATEL
[gsm.operator.numeric]: 45202
[gsm.sim.operator.alpha]: TRIATEL
[gsm.sim.operator.alpha]: VINAPHONE
[gsm.sim.operator.iso-country]: AS
[gsm.sim.operator.iso-country]: vn
[gsm.sim.operator.numeric]: TRIATEL
[gsm.sim.operator.numeric]: 45202
[gsm.version.baseband]: SMG360FC7Y5QE,SMG360FC7Y5QE
[gsm.version.baseband]: J730GDXSDCUC1,J730GDXSDCUC1
[vendor.gsm.version.baseband]: J730GDXSDCUC1,J730GDXSDCUC1
[gsm.version.ril-impl]: Samsung RIL v4.0
[net.bt.name]: Android
[net.dns1]: 10.149.205.128
[net.dns1]: 8.8.8.8
[net.dns2]: 113.185.56.73
[net.dns2]: 8.8.4.4
[persist.sys.timezone]: Pacific/Pago_Pago
[persist.sys.timezone]: Asia/Ho_Chi_Minh
[ro.adb.secure]: 1
[ro.adb.secure]: 0
[ro.allow.mock.location]: 0
[ro.allow.mock.location]: 1
[ro.baseband]: SMG360FC7Y5QE,SMG360FC7Y5QE
[ro.baseband]: unknown
[ro.board.platform]: exynos5
[ro.boot.bootreason]: reboot,userrequested
[ro.boot.flash.locked]: 1
[ro.boot.hardware]: qcom
[ro.boot.hardware]: samsungexynos7870
[ro.boot.selinux]: enforcing
[ro.boot.selinux]: permissive
[ro.boot.serialno]: QAgeED
[ro.boot.serialno]: 5200a50efae7641d
[ro.boot.verifiedbootstate]: green
[ro.bootimage.build.date]: Sat Jul 18 07:28:41 KST 2020
[ro.bootimage.build.date.utc]: 1595024921
[ro.bootloader]: SMG360FC7Y5QE
[ro.bootloader]: J730GDXSDCUC1
[ro.bootmode]: unknown
[ro.build.date]: Sat Jul 18 07:28:41 KST 2020
[ro.build.date.utc]: 1595024921
[ro.build.date.utc]: Sun Jul 14 2013 04:44:10 GMT+0700 (GMT+07:00)
[ro.build.flavor]: m10lteub-user
[ro.build.system_root_image]: false
[ro.build.version.all_codenames]: REL
[ro.build.version.base_os]: samsung/m10lteub/m10lte:9/PPR1.180610.011/M105MUBU2BSI2:user/release-keys
[ro.build.version.min_supported_target_sdk]: 17
[ro.build.version.preview_sdk]: 0
[ro.build.version.sdk]: 27
[ro.build.version.sdk]: 28
[ro.carrier]: SF-PORT V3
[ro.com.google.clientidbase]: android-samsung-ss
[ro.com.google.gmsversion]: 9_201907
[ro.crypto.state]: unsupported
[ro.oem_unlock_supported]: 1
[ro.opengles.version]: 196610
[ro.product.first_api_level]: 27
[ro.product.locale]: en-GB
[ro.product.vendor.brand]: samsung
[ro.product.vendor.device]: m10lte
[ro.product.vendor.manufacturer]: samsung
[ro.product.vendor.model]: SM-M105M
[ro.product.vendor.name]: m10lteub
[ro.runtime.firstboot]: 1661092960203
[ro.vendor.build.date]: Sat Jul 18 07:28:41 KST 2020
[ro.vendor.build.date.utc]: 1595024921
[ro.vendor.product.cpu.abilist]: armeabi-v7a,armeabi
[ro.vendor.product.cpu.abilist32]: armeabi-v7a,armeabi
 

VD171

Senior Member
Jun 21, 2012
2,817
2
2,077
127.0.0.1
LG K10
Samsung Galaxy J7
@VD171 .
I use Android Faker and similar apps. when i use the feature "UPDATE CONTENTS" in VD-Info, it can read the original information of the android and all fake information. Is the original information of android do VD-Info access in BUILDS.PROP, android.os.Build, android.os.Process ?
And in addition, what components does VD-Info access to discover the original information of ? android?
My android information is below:

-> Android Version
Android 8.2
Android REL
Android 9
API 28
API 27
[...]
My app VD Infos checks for many ways for reading device properties.
You should hook all them.
Did you try android.os.SystemProperties ?
 

tungtrinh1402

Member
Dec 13, 2014
5
0
My app VD Infos checks for many ways for reading device properties.
You should hook all them.
Did you try android.os.SystemProperties ?
I thank you for your reply and your contribution. I never thought it would be android.os.SystemProperties. sorry for checking your source.
I saw about 119 imports coming from VD-info. I couldn't find a reason to hook all them. Real and fake parameters are always displayed side-by-side.
(hardware manufacturer display id product model brand device radio baseband fingerprint serial host system version android version kernel).
What other advice can you give me besides android.os.SystemProperties ?
I will try all your advice at once.
Thanks for all, @VD171 !
 

VD171

Senior Member
Jun 21, 2012
2,817
2
2,077
127.0.0.1
LG K10
Samsung Galaxy J7
I thank you for your reply and your contribution. I never thought it would be android.os.SystemProperties. sorry for checking your source.
I saw about 119 imports coming from VD-info. I couldn't find a reason to hook all them. Real and fake parameters are always displayed side-by-side.
(hardware manufacturer display id product model brand device radio baseband fingerprint serial host system version android version kernel).
What other advice can you give me besides android.os.SystemProperties ?
I will try all your advice at once.
Thanks for all, @VD171 !
I suggest you to apply all hooks you can.
Privacy is not an exception.
Developers abuse Android methods to spying and identifying you, so we should protect ourselves at any price.
 
Last edited:
  • Like
Reactions: bush911

bush911

Senior Member
Oct 12, 2012
804
341
重庆
Google Nexus 5
Google Pixel
Pixel 6, Android 12 with XprivacyLua
I got the following content.
Is this OK?
Could you please tell me how to make device name visible @VD171

================
-> Device Name

[ Fail. Not found. ]

================
================
-> Kernel

5.10.81-android12-9-00001-geba40aecb3b7-ab8534902

Linux localhost 5.10.81-android12-9-00001-geba40aecb3b7-ab8534902 #1 SMP PREEMPT Tue May 3 02:46:17 UTC 2022 aarch64

================
================
-> BOOTLOADER

locked

================
================
-> Encryption

encrypted

file

true

================
================
-> Android Version

Android 12

Android REL

API 32

================
================
-> System Version

8979303

================
================
-> Build Date

01/Jan/1970 08:00:00 GMT+08:00

23/Aug/2022 08:22:17 GMT+08:00

Tue Aug 23 00:22:17 UTC 2022

================
================
-> Security Patch

2022-07-05

================
================
-> HOST

unknown

abfarm834

================
================
-> Type

unknown

user

================
================
-> Region

Asia/Shanghai

en-US

================
================
-> SERIAL

DDFDA8A216452A0A

================
================
-> IMEI

012648844394173

[SIM 1]: 012648844394173

================
================
-> Android ID

5c48d6afb5f7196c

================
================
-> Google Service Framework

[ Fail. Failed to READ GSF ID. ]

================
================
-> ID Advertising

[ Fail. Not found. ]

================
================
-> Fingerprint

google/oriole/oriole:12/SQ3A.220705.004.X2/8979303:user/release-keys

oriole-user 12 SQ3A.220705.004.X2 8979303 release-keys

================
================
-> User-Agent

Dalvik/2.1.0 (Linux; U; Android 12; Pixel 6 Build/SQ3A.220705.004.X2)

================
================
-> Radio/Modem/Baseband

unknown

g5123b-100840-220505-B-8544885

================
================
-> SELINUX

Activated

================
================
-> KEYS

unknown

release-keys

================
================
-> Telefony

[IMEI]: 012648844394173
[Number]: Fail
[Country]: XX
[Operator Code]: 00101
[Operator Name]: unknown
[Quantity of SIM]: 1
[Voice Mail Name]: null
[Voice Mail Number]: null
[Network]: LTE
[Operator name]: China Unicom
[Country]: cn
[Operator Code]: 46001
[Max Quantity of SIM]: 2

================
================
-> SIM

[ Fail. No SIM found. ]

================
================
-> Market Name

[ Fail. Not found. ]

================
================
-> Device

oriole

unknown

GB7N6

generic

================
================
-> Brand

unknown

google

================
================
-> Model

unknown

Pixel 6

mainline

================
================
-> Product

unknown

oriole

mainline

================
================
-> DISPLAY ID

unknown

SQ3A.220705.004.X2

================
================
-> Manufacturer

unknown

Google

================
================
-> Hardware

UNKNOWN
GS101
ORIOLE

cortex-a53
cortex-a55

aarch64
arm64-v8a
armeabi-v7a

================
================
-> BUILDS

[BRAND]: unknown
[DEVICE]: oriole
[FINGERPRINT]: google/oriole/oriole:12/SQ3A.220705.004.X2/8979303:user/release-keys
[HARDWARE]: unknown
[MANUFACTURER]: unknown
[MODEL]: unknown
[PRODUCT]: unknown
[RADIO]: unknown
[SERIAL]: DDFDA8A216452A0A
[BOARD]: unknown
[BOOTLOADER]: unknown
[CPU_ABI]: arm64-v8a
[DISPLAY]: unknown
[HOST]: unknown
[ID]: unknown
[TIME]: 01/Jan/1970 08:00:00 GMT+08:00
[TYPE]: unknown
[USER]: unknown
[VERSION.CODENAME]: REL
[VERSION.INCREMENTAL]: 8979303
[VERSION.RELEASE]: 12
[VERSION.SDK]: 32
[VERSION.SDK_INT]: 32

================
================
-> Accounts

[ Fail. No account found. ]

================
================
-> Bluetooh MAC

[ Fail. Not found. ]

================
================
-> Bounded Bluetooh Devices

[ Fail. No bluetooth found. ]

================
================
-> Wi-Fi

[MAC Network]: aa:bb:cc:dd:ee:ff
[Name]: null
[IP]: 0.0.0.0
[Speed]: -1 Mbps

- DHCP: -

[IP]: 0.0.0.0
[DNS-1]: 0.0.0.0

================
================
-> Networks

[LoopBack]: ip6-localhost/::1

[Network Name]: dummy0
[IP]: fe80::10e9:71ff:feef:353a (fe80::10e9:71ff:feef:353a%dummy0)

[Network Name]: rmnet0
[IP]: 172.19.49.199 (172.19.49.199)

[Network Name]: lo
[IP]: ::1 (localhost)
[IP]: 127.0.0.1 (localhost)

[Network Name]: tun0
[IP]: fe80::898:6dde:d90e:f8e3 (fe80::898:6dde:d90e:f8e3%tun0)
[IP]: 26.26.26.1 (26.26.26.1)

================
================
-> BUILD PROPS

[ro.build.fingerprint]: google/oriole/oriole:12/SQ3A.220705.004.X2/8979303:user/release-keys
[ro.build.description]: oriole-user 12 SQ3A.220705.004.X2 8979303 release-keys
[ro.build.id]: SQ3A.220705.004.X2
[ro.build.host]: abfarm834
[ro.build.product]: oriole
[ro.build.user]: android-build
[ro.build.version.codename]: REL
[ro.build.version.incremental]: 8979303
[ro.build.version.release]: 12
[ro.build.version.release_or_codename]: 12
[ro.build.version.security_patch]: 2022-07-05
[ro.hardware]: oriole
[ro.hardware.egl]: mali
[ro.hardware.gatekeeper]: trusty
[ro.hardware.keystore]: trusty
[ro.product.board]: oriole
[ro.product.brand]: google
[ro.product.cpu.abi]: arm64-v8a
[ro.product.cpu.abilist]: arm64-v8a,armeabi-v7a,armeabi
[ro.product.cpu.abilist32]: armeabi-v7a,armeabi
[ro.product.cpu.abilist64]: arm64-v8a
[ro.product.device]: oriole
[ro.product.manufacturer]: Google
[ro.product.model]: Pixel 6
[ro.product.name]: oriole
[ro.product.product.brand]: google
[ro.product.product.device]: oriole
[ro.product.product.manufacturer]: Google
[ro.product.product.model]: Pixel 6
[ro.product.product.name]: oriole
[ro.vendor.build.fingerprint]: google/oriole/oriole:12/SQ3A.220705.004.X2/8979303:user/release-keys
[ro.build.type]: user
[ro.build.tags]: release-keys
[ro.build.display.id]: SQ3A.220705.004.X2
[ro.debuggable]: 0
[ro.secure]: 1
[ro.serialno]: DDFDA8A216452A0A
[dalvik.vm.isa.arm.variant]: cortex-a53
[dalvik.vm.isa.arm64.variant]: cortex-a55
[gsm.network.type]: LTE
[gsm.operator.alpha]: unknown
[gsm.operator.alpha]: China Unicom
[gsm.operator.iso-country]: xx
[gsm.operator.iso-country]: cn
[gsm.operator.numeric]: 00101
[gsm.operator.numeric]: 46001
[gsm.sim.operator.alpha]: unknown
[gsm.sim.operator.alpha]: China Unicom
[gsm.sim.operator.iso-country]: xx
[gsm.sim.operator.iso-country]: cn
[gsm.sim.operator.numeric]: 00101
[gsm.sim.operator.numeric]: 46001
[gsm.version.baseband]: g5123b-100840-220505-B-8544885
[gsm.version.ril-impl]: Samsung S.LSI Vendor RIL V2.3 Build 2022-08-23 00:41:45
[net.bt.name]: Android
[persist.sys.timezone]: Asia/Shanghai
[ro.adb.secure]: 1
[ro.allow.mock.location]: 0
[ro.baseband]: unknown
[ro.board.platform]: gs101
[ro.boot.boot_devices]: 14700000.ufs
[ro.boot.flash.locked]: 1
[ro.boot.hardware]: oriole
[ro.boot.hardware.color]: BLK
[ro.boot.hardware.coo]: CN
[ro.boot.hardware.ddr]: 8GB,Samsung,LPDDR5,0108
[ro.boot.hardware.platform]: gs101
[ro.boot.hardware.radio.subtype]: 0
[ro.boot.hardware.revision]: MP1.0
[ro.boot.hardware.sku]: GB7N6
[ro.boot.hardware.ufs]: 128GB,SKHynix
[ro.boot.product.hardware.sku]: GB7N6
[ro.boot.serialno]: DDFDA8A216452A0A
[ro.boot.verifiedbootstate]: green
[ro.bootloader]: slider-1.2-8831283
[ro.bootmode]: unknown
[ro.build.date]: Tue Aug 23 00:22:17 UTC 2022
[ro.build.date.utc]: 1661214137
[ro.build.flavor]: oriole-user
[ro.build.system_root_image]: false
[ro.build.version.all_codenames]: REL
[ro.build.version.min_supported_target_sdk]: 23
[ro.build.version.preview_sdk]: 0
[ro.build.version.preview_sdk_fingerprint]: REL
[ro.build.version.sdk]: 32
[ro.carrier]: unknown
[ro.carriersetup.vzw_consent_page]: true
[ro.com.google.clientidbase]: android-google
[ro.control_privapp_permissions]: enforce
[ro.crypto.state]: encrypted
[ro.crypto.type]: file
[ro.crypto.uses_fs_ioc_add_encryption_key]: true
[ro.frp.pst]: /dev/block/by-name/frp
[ro.odm.build.date]: Tue Aug 23 00:22:17 UTC 2022
[ro.odm.build.date.utc]: 1661214137
[ro.odm.build.fingerprint]: google/oriole/oriole:12/SQ3A.220705.004.X2/8979303:user/release-keys
[ro.odm.build.version.incremental]: 8979303
[ro.opengles.version]: 196610
[ro.product.build.date]: Tue Aug 23 00:22:17 UTC 2022
[ro.product.build.date.utc]: 1661214137
[ro.product.build.fingerprint]: google/oriole/oriole:12/SQ3A.220705.004.X2/8979303:user/release-keys
[ro.product.build.id]: SQ3A.220705.004.X2
[ro.product.build.tags]: release-keys
[ro.product.build.type]: user
[ro.product.build.version.incremental]: 8979303
[ro.product.build.version.release]: 12
[ro.product.build.version.release_or_codename]: 12
[ro.product.build.version.sdk]: 32
[ro.product.first_api_level]: 31
[ro.product.locale]: en-US
[ro.product.odm.brand]: google
[ro.product.odm.device]: oriole
[ro.product.odm.manufacturer]: Google
[ro.product.odm.model]: Pixel 6
[ro.product.odm.name]: oriole
[ro.product.system.brand]: google
[ro.product.system.device]: generic
[ro.product.system.manufacturer]: Google
[ro.product.system.model]: mainline
[ro.product.system.name]: mainline
[ro.product.system_ext.brand]: google
[ro.product.system_ext.device]: oriole
[ro.product.system_ext.manufacturer]: Google
[ro.product.system_ext.model]: Pixel 6
[ro.product.system_ext.name]: oriole
[ro.product.vendor.brand]: google
[ro.product.vendor.device]: oriole
[ro.product.vendor.manufacturer]: Google
[ro.product.vendor.model]: Pixel 6
[ro.product.vendor.name]: oriole
[ro.system.build.date]: Tue Aug 23 00:22:17 UTC 2022
[ro.system.build.date.utc]: 1661214137
[ro.system.build.fingerprint]: google/oriole/oriole:12/SQ3A.220705.004.X2/8979303:user/release-keys
[ro.system.build.id]: SQ3A.220705.004.X2
[ro.system.build.tags]: release-keys
[ro.system.build.type]: user
[ro.system.build.version.incremental]: 8979303
[ro.system.build.version.release]: 12
[ro.system.build.version.release_or_codename]: 12
[ro.system.build.version.sdk]: 32
[ro.system_ext.build.date]: Tue Aug 23 00:22:17 UTC 2022
[ro.system_ext.build.date.utc]: 1661214137
[ro.system_ext.build.fingerprint]: google/oriole/oriole:12/SQ3A.220705.004.X2/8979303:user/release-keys
[ro.system_ext.build.id]: SQ3A.220705.004.X2
[ro.system_ext.build.tags]: release-keys
[ro.system_ext.build.type]: user
[ro.system_ext.build.version.incremental]: 8979303
[ro.system_ext.build.version.release]: 12
[ro.system_ext.build.version.release_or_codename]: 12
[ro.system_ext.build.version.sdk]: 32
[ro.vendor.build.date]: Tue Aug 23 00:22:17 UTC 2022
[ro.vendor.build.date.utc]: 1661214137
[ro.vendor.build.id]: SQ3A.220705.004.X2
[ro.vendor.build.tags]: release-keys
[ro.vendor.build.type]: user
[ro.vendor.build.version.incremental]: 8979303
[ro.vendor.build.version.release]: 12
[ro.vendor.build.version.release_or_codename]: 12
[ro.vendor.build.version.sdk]: 32
[ro.vendor.product.cpu.abilist]: arm64-v8a,armeabi-v7a,armeabi
[ro.vendor.product.cpu.abilist32]: armeabi-v7a,armeabi
[ro.vendor.product.cpu.abilist64]: arm64-v8a
[telephony.active_modems.max_count]: 2

================
================
-> Memory

MemTotal: 7775076 kB
MemFree: 124772 kB
MemAvailable: 1641160 kB
Buffers: 1856 kB
Cached: 2058600 kB
SwapCached: 282060 kB
Active: 943308 kB
Inactive: 3884204 kB
Active(anon): 383796 kB
Inactive(anon): 3032976 kB
Active(file): 559512 kB
Inactive(file): 851228 kB
Unevictable: 242948 kB
Mlocked: 242948 kB
SwapTotal: 3145724 kB
SwapFree: 1299712 kB
Dirty: 860 kB
Writeback: 0 kB
AnonPages: 2732512 kB
Mapped: 1117244 kB
Shmem: 420064 kB
KReclaimable: 310544 kB
Slab: 432436 kB
SReclaimable: 123148 kB
SUnreclaim: 309288 kB
KernelStack: 68992 kB
ShadowCallStack: 17580 kB
PageTables: 131176 kB
NFS_Unstable: 0 kB
Bounce: 0 kB
WritebackTmp: 0 kB
CommitLimit: 7033260 kB
Committed_AS: 120559740 kB
VmallocTotal: 262930368 kB
VmallocUsed: 176616 kB
VmallocChunk: 0 kB
Percpu: 12096 kB
AnonHugePages: 0 kB
ShmemHugePages: 0 kB
ShmemPmdMapped: 0 kB
FileHugePages: 10240 kB
FilePmdMapped: 10240 kB
CmaTotal: 667648 kB
CmaFree: 48 kB
ION_heap: 332692 kB
ION_heap_pool: 187396 kB

================
================
-> Calls

[ Fail. No call found. ]

================
================
-> Running Services

[ Fail. No running services found. ]

================
================
-> Running Processes

[Group]: 10266
[Process]: com.vitaodoidao.vdinfos
[Package]: com.vitaodoidao.vdinfos;

================
================
-> Installed Packages

[Package]: com.vitaodoidao.vdinfos
[Version]: 1.10

================
================
-> Installed Applications

[ID]: 10266
[Dir]: /data/user/0/com.vitaodoidao.vdinfos
[Package]: com.vitaodoidao.vdinfos
[Dir]: /data/app/~~d6_PrFiqlLqf7UvKofi_0Q==/com.vitaodoidao.vdinfos-pDWXZcvsFJt2um0qsU3awg==/base.apk
[Libraries]: /data/app/~~d6_PrFiqlLqf7UvKofi_0Q==/com.vitaodoidao.vdinfos-pDWXZcvsFJt2um0qsU3awg==/lib/arm64

================
 
Last edited by a moderator:

Top Liked Posts