Tools: Mumu Player (netease) Silently Runs 17 Reconnaissance Commands...

Tools: Mumu Player (netease) Silently Runs 17 Reconnaissance Commands...

MuMu Player Pro for macOS (by NetEase) executes a comprehensive system data collection routine every 30 minutes while the emulator is running. This includes enumerating all devices on your local network, capturing every running process with full command-line arguments, inventorying all installed applications, reading your hosts file, and dumping kernel parameters -- all tied to your Mac's serial number via SensorsData analytics.

Every 30 minutes, MuMu creates a timestamped directory under:

Each directory (e.g. 20260220-071645) contains the output of the following commands, all executed automatically in the background:

A collect-finished manifest file logs the success/failure of each collection.

The process list captures full command-line arguments for every process on the system. In practice this exposes:

This is captured every 30 minutes, creating a detailed behavioral timeline of your computer usage.

MuMu uses SensorsData (a Chinese analytics platform) for tracking. Files in the report/ directory include:

Identity tracking (sensorsanalytics-com.sensorsdata.identities.plist):

Your Mac's hardware serial number is collected and used as a persistent identifier.

Campaign tracking (sensorsanalytics-super_properties.plist):

Source: HackerNews