. Again, it was not clear whether the attacker who performed the repackaging altered the name and icon, or these were the name and icon of the original application at the time of repackaging
. Again, it was not clear whetherthe attacker who performed the repackaging altered the name andicon, or these were the name and icon of the original application atthe time of repackaging