VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

Language
Server load
Server Load

File information
File Name :4G1.9.apk (File not down)
File Size :3845044 byte
File Type :application/zip
MD5:f2977bd7c47ff90140ad559a47006b68
SHA1:af6d9520a8821b796e6e4afb229d8b6c77087500
  • 扫描结果
  • 权限
  • 文件行为分析
  • Scanner results
    Scanner results:0%Scanner(s) (0/32)found malware!
    Behavior analysis report:         Habo file analysis
    Time: 2016-08-19 16:38:35 (CST)
    VirSCANVirSCAN
    Scanner Engine Ver Sig Ver Sig Date Scan result Time
    antiy AVL SDK 3.0 1970-01-01 Found nothing 5
    asquared 9.0.0.4324 9.0.0.4324 2014-07-03 Found nothing 2
    avast 150725-1 4.7.4 2015-07-25 Found nothing 60
    avg 2109/8133 10.0.1405 2014-11-26 Found nothing 60
    baidu 2.0.1.0 4.1.3.52192 2.0.1.0 Found nothing 5
    baidusd 1.0 1.0 2014-04-02 Found nothing 1
    bitdefender 7.58469 7.90123 2014-12-25 Found nothing 60
    clamav 19861 0.97.5 2014-12-31 Found nothing 60
    drweb 5.0.2.3300 5.0.1.1 2014-12-31 Found nothing 60
    fortinet 23.345, 23.345 5.1.158 2014-12-08 Found nothing 60
    fprot 4.6.2.117 6.5.1.5418 2014-12-31 Found nothing 60
    fsecure 2014-04-02-01 9.13 2014-04-02 Found nothing 60
    gdata 25.7937 25.7937 2016-08-18 Found nothing 12
    ikarus 1.06.01 V1.32.31.0 2014-12-08 Found nothing 60
    jiangmin 16.0.100 1.0.0.0 2015-07-25 Found nothing 44
    kaspersky 5.5.33 5.5.33 2014-04-01 Found nothing 60
    kingsoft 2.1 2.1 2013-09-22 Found nothing 60
    mcafee 7638 5400.1158 2014-11-30 Found nothing 60
    nod32 0920 3.0.21 2014-12-23 Found nothing 60
    panda 9.05.01 9.05.01 2015-07-26 Found nothing 4
    pcc 11.380.07 9.500-1005 2014-12-31 Found nothing 60
    qh360 1.0.1 1.0.1 1.0.1 Found nothing 5
    qqphone 1.0.0.0 1.0.0.0 2014-12-09 Found nothing 60
    quickheal 14.00 14.00 2015-07-25 Found nothing 3
    rising 25.76.04.01 25.76.04.01 2015-07-24 Found nothing 1
    sophos 5.08 3.55.0 2014-12-01 Found nothing 60
    symantec 20141230.001 1.3.0.24 2014-12-30 Found nothing 60
    tachyon 9.9.9 9.9.9 2013-12-27 Found nothing 7
    thehacker 6.8.0.5 6.8.0.5 2015-07-23 Found nothing 2
    tws 17.47.17308 1.0.2.2108 2014-12-08 Found nothing 14
    vba 3.12.26.3 3.12.26.3 2014-12-31 Found nothing 60
    virusbuster 15.0.985.0 5.5.2.13 2014-12-05 Found nothing 60
    Heuristic/Suspicious Exact
    NOTICE: Results are not 100% accurate and can be reported as a false positive by some scannerswhen and if malware is found. Please judge these results for yourself.
  • 权限列表
    许可名称信息
    android.permission.INTERNET连接网络(2G或3G)
    android.permission.ACCESS_NETWORK_STATE读取网络状态(2G或3G)
    android.permission.USE_CREDENTIALS获取认证令牌
    android.permission.READ_EXTERNAL_STORAGE读外部存储器(如:SD卡)
    android.permission.RECEIVE_BOOT_COMPLETED接收开机启动广播
    android.permission.ACCESS_WIFI_STATE读取wifi网络状态
    android.permission.WRITE_EXTERNAL_STORAGE写外部存储器(如:SD卡)
    com.android.launcher.permission.INSTALL_SHORTCUT创建快捷方式
    android.permission.GET_TASKS获取有关当前或最近运行的任务信息
    android.permission.WAKE_LOCK手机屏幕关闭后后台进程仍运行
    android.permission.READ_PHONE_STATE读取电话状态
    android.permission.CHANGE_NETWORK_STATE变更网络状态
    android.permission.SYSTEM_ALERT_WINDOW显示系统窗口
    android.permission.SYSTEM_OVERLAY_WINDOW
  • 文件信息
    安全评分 :
    基本信息
    MD5:f2977bd7c47ff90140ad559a47006b68
    包名:net.openvpn.openvpn
    最低运行环境:Android 4.0, 4.0.1, 4.0.2
    版权:
    关键行为
    行为描述:跨进程写入数据
    详情信息:TargetProcess = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\ge537.exe, WriteAddress = 0x00400000, Size = 0x00000400
    TargetProcess = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\ge537.exe, WriteAddress = 0x00404000, Size = 0x00000e00
    TargetProcess = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\ge537.exe, WriteAddress = 0x00405000, Size = 0x00000a00
    TargetProcess = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\ge537.exe, WriteAddress = 0x00406000, Size = 0x00000200
    TargetProcess = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\ge537.exe, WriteAddress = 0x00407000, Size = 0x00000200
    TargetProcess = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\ge537.exe, WriteAddress = 0x00408000, Size = 0x00000400
    TargetProcess = C:\Documents and Settings\Administrator\WinHost32.exe, WriteAddress = 0x00400000, Size = 0x00000400
    TargetProcess = C:\Documents and Settings\Administrator\WinHost32.exe, WriteAddress = 0x00404000, Size = 0x00000e00
    TargetProcess = C:\Documents and Settings\Administrator\WinHost32.exe, WriteAddress = 0x00405000, Size = 0x00000a00
    TargetProcess = C:\Documents and Settings\Administrator\WinHost32.exe, WriteAddress = 0x00406000, Size = 0x00000200
    TargetProcess = C:\Documents and Settings\Administrator\WinHost32.exe, WriteAddress = 0x00407000, Size = 0x00000200
    TargetProcess = C:\Documents and Settings\Administrator\WinHost32.exe, WriteAddress = 0x00408000, Size = 0x00000400
    行为描述:设置线程上下文
    详情信息:C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\ge537.exe
    C:\Documents and Settings\Administrator\WinHost32.exe
    行为描述:获取TickCount值
    详情信息:TickCount = 347215, SleepMilliseconds = 200.
    TickCount = 357393, SleepMilliseconds = 50.
    TickCount = 357471, SleepMilliseconds = 50.
    TickCount = 357487, SleepMilliseconds = 50.
    TickCount = 357503, SleepMilliseconds = 50.
    TickCount = 357831, SleepMilliseconds = 50.
    TickCount = 357878, SleepMilliseconds = 50.
    TickCount = 357893, SleepMilliseconds = 50.
    TickCount = 357925, SleepMilliseconds = 50.
    TickCount = 357940, SleepMilliseconds = 50.
    TickCount = 357956, SleepMilliseconds = 50.
    TickCount = 357971, SleepMilliseconds = 50.
    TickCount = 357987, SleepMilliseconds = 50.
    TickCount = 358003, SleepMilliseconds = 50.
    TickCount = 358034, SleepMilliseconds = 50.
    行为描述:跨进程写代码段数据
    详情信息:TargetProcess = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\ge537.exe, WriteAddress = 0x00401000, Size = 0x00002c00
    TargetProcess = C:\Documents and Settings\Administrator\WinHost32.exe, WriteAddress = 0x00401000, Size = 0x00002c00
    行为描述:设置特殊文件夹属性
    详情信息:C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
    C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
    C:\Documents and Settings\Administrator\Local Settings\History
    C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
    C:\Documents and Settings\Administrator\Cookies
    行为描述:修改注册表_启动项
    详情信息:\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Run\WinHost32
    进程行为
    行为描述:隐藏窗口创建进程
    详情信息:ImagePath = C:\WINDOWS\system32\cmd.exe, CmdLine = /c del C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\ge537.exe >> NUL
    行为描述:创建进程
    详情信息:ImagePath = C:\WINDOWS\system32\cmd.exe, CmdLine = /c del C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\ge537.exe >> NUL
    行为描述:创建本地线程
    详情信息:TargetProcess: WINWORD.EXE, InheritedFromPID = 2008, ProcessID = 1524, ThreadID = 1420, StartAddress = 02B41D6F, Parameter = 00000000
    TargetProcess: WINWORD.EXE, InheritedFromPID = 2008, ProcessID = 1524, ThreadID = 1932, StartAddress = 65001FF8, Parameter = 00000000
    TargetProcess: ge537.exe, InheritedFromPID = 1832, ProcessID = 2216, ThreadID = 2248, StartAddress = 77DC845A, Parameter = 00000000
    TargetProcess: WINWORD.EXE, InheritedFromPID = 2008, ProcessID = 1524, ThreadID = 2356, StartAddress = 30D5CF6C, Parameter = 03C9E758
    TargetProcess: WINWORD.EXE, InheritedFromPID = 2008, ProcessID = 1524, ThreadID = 2372, StartAddress = 30072FB7, Parameter = 30AEA990
    TargetProcess: WINWORD.EXE, InheritedFromPID = 2008, ProcessID = 1524, ThreadID = 2476, StartAddress = 30072FB7, Parameter = 30AEA990
    TargetProcess: WinHost32.exe, InheritedFromPID = 2516, ProcessID = 2568, ThreadID = 2576, StartAddress = 77DC845A, Parameter = 00000000
    TargetProcess: WinHost32.exe, InheritedFromPID = 2516, ProcessID = 2568, ThreadID = 2604, StartAddress = 7C947EBB, Parameter = 00000000
    TargetProcess: WinHost32.exe, InheritedFromPID = 2516, ProcessID = 2568, ThreadID = 2608, StartAddress = 7C930230, Parameter = 00000000
    TargetProcess: WinHost32.exe, InheritedFromPID = 2516, ProcessID = 2568, ThreadID = 2612, StartAddress = 6302B849, Parameter = 001978B0
    TargetProcess: WINWORD.EXE, InheritedFromPID = 2008, ProcessID = 1524, ThreadID = 2644, StartAddress = 30D72B9D, Parameter = 0B311FF0
    行为描述:跨进程写入数据
    详情信息:TargetProcess = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\ge537.exe, WriteAddress = 0x00400000, Size = 0x00000400
    TargetProcess = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\ge537.exe, WriteAddress = 0x00404000, Size = 0x00000e00
    TargetProcess = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\ge537.exe, WriteAddress = 0x00405000, Size = 0x00000a00
    TargetProcess = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\ge537.exe, WriteAddress = 0x00406000, Size = 0x00000200
    TargetProcess = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\ge537.exe, WriteAddress = 0x00407000, Size = 0x00000200
    TargetProcess = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\ge537.exe, WriteAddress = 0x00408000, Size = 0x00000400
    TargetProcess = C:\Documents and Settings\Administrator\WinHost32.exe, WriteAddress = 0x00400000, Size = 0x00000400
    TargetProcess = C:\Documents and Settings\Administrator\WinHost32.exe, WriteAddress = 0x00404000, Size = 0x00000e00
    TargetProcess = C:\Documents and Settings\Administrator\WinHost32.exe, WriteAddress = 0x00405000, Size = 0x00000a00
    TargetProcess = C:\Documents and Settings\Administrator\WinHost32.exe, WriteAddress = 0x00406000, Size = 0x00000200
    TargetProcess = C:\Documents and Settings\Administrator\WinHost32.exe, WriteAddress = 0x00407000, Size = 0x00000200
    TargetProcess = C:\Documents and Settings\Administrator\WinHost32.exe, WriteAddress = 0x00408000, Size = 0x00000400
    行为描述:设置线程上下文
    详情信息:C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\ge537.exe
    C:\Documents and Settings\Administrator\WinHost32.exe
    行为描述:枚举进程
    详情信息:N/A
    行为描述:跨进程写代码段数据
    详情信息:TargetProcess = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\ge537.exe, WriteAddress = 0x00401000, Size = 0x00002c00
    TargetProcess = C:\Documents and Settings\Administrator\WinHost32.exe, WriteAddress = 0x00401000, Size = 0x00002c00
    行为描述:创建新文件进程
    详情信息:ImagePath = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\ge537.exe, CmdLine = "C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\ge537.exe"
    ImagePath = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\ge537.exe, CmdLine = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\ge537.exe
    ImagePath = C:\Documents and Settings\Administrator\WinHost32.exe, CmdLine = "C:\Documents and Settings\Administrator\WinHost32.exe"
    文件行为
    行为描述:创建文件
    详情信息:C:\Documents and Settings\Administrator\Local Settings\Temp\~DFC2F1.tmp
    C:\Documents and Settings\Administrator\Local Settings\%temp%\****.doc
    C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.Word\~WRF0001.tmp
    C:\Documents and Settings\Administrator\Local Settings\Temp\~DFDA75.tmp
    C:\Documents and Settings\Administrator\Local Settings\Temp\VBE\MSForms.exd
    C:\Documents and Settings\Administrator\Application Data\Microsoft\Forms\WINWORD.box
    C:\Documents and Settings\Administrator\Local Settings\Temp\~DFE4B2.tmp
    C:\Documents and Settings\Administrator\Local Settings\Temp\~DFE4CC.tmp
    C:\Documents and Settings\Administrator\Local Settings\Temp\ge537.exe
    C:\Documents and Settings\Administrator\Application Data\Microsoft\Office\Recent\%temp%\****.doc.LNK
    C:\Documents and Settings\Administrator\Application Data\Microsoft\Office\Recent\EB93A6.LNK
    C:\Documents and Settings\Administrator\WinHost32.exe
    C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\IUKHR8T2\wpad[1].dat
    C:\Documents and Settings\Administrator\Application Data\Microsoft\Office\VB11.pip
    行为描述:创建可执行文件
    详情信息:C:\Documents and Settings\Administrator\Local Settings\Temp\ge537.exe
    C:\Documents and Settings\Administrator\WinHost32.exe
    行为描述:覆盖已有文件
    详情信息:C:\Documents and Settings\Administrator\Application Data\Microsoft\Office\Word11.pip
    行为描述:复制文件
    详情信息:C:\DOCUME~1\ALLUSE~1\APPLIC~1\MICROS~1\OFFICE\DATA\OPA11.BAK ---> C:\DOCUME~1\ALLUSE~1\APPLIC~1\MICROS~1\OFFICE\DATA\opa11.dat
    行为描述:删除文件
    详情信息:C:\Documents and Settings\Administrator\Local Settings\Temp\~DFC2F1.tmp
    C:\Documents and Settings\Administrator\Local Settings\Temp\~DFDA75.tmp
    C:\Documents and Settings\Administrator\Application Data\Microsoft\Forms\WINWORD.box
    C:\Documents and Settings\Administrator\Local Settings\Temp\~DFE4CC.tmp
    C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\IUKHR8T2\wpad[1].dat
    C:\Documents and Settings\Administrator\Local Settings\Temp\~DFE4B2.tmp
    C:\Documents and Settings\Administrator\Local Settings\%temp%\****.doc
    C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.Word\~WRS0000.tmp
    C:\Documents and Settings\Administrator\Application Data\Microsoft\Templates\~$Normal.dot
    C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.Word\~WRF0001.tmp
    行为描述:查找文件
    详情信息:FileName = C:\Documents and Settings
    FileName = C:\Documents and Settings\Administrator
    FileName = C:\Documents and Settings\Administrator\Local Settings
    FileName = C:\Documents and Settings\Administrator\Application Data
    FileName = C:\Documents and Settings\Administrator\Application Data\Microsoft
    FileName = C:\Documents and Settings\Administrator\Application Data\Microsoft\Templates
    FileName = Normal
    FileName = C:\Program Files\Microsoft Office 2007\Office12
    FileName = C:\DOCUME~1
    FileName = C:\DOCUME~1\ADMINI~1
    FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1
    FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp
    FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\VBE
    FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\VBE\MSForms.exd
    FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\ge537.exe
    行为描述:设置特殊文件夹属性
    详情信息:C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
    C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
    C:\Documents and Settings\Administrator\Local Settings\History
    C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
    C:\Documents and Settings\Administrator\Cookies
    行为描述:修改文件内容
    详情信息:C:\Documents and Settings\Administrator\Local Settings\%temp%\****.doc ---> Offset = 0
    C:\Documents and Settings\Administrator\Local Settings\%temp%\****.doc ---> Offset = 54
    C:\Documents and Settings\Administrator\Local Settings\Temp\VBE\MSForms.exd ---> Offset = 0
    C:\Documents and Settings\Administrator\Local Settings\Temp\VBE\MSForms.exd ---> Offset = 4
    C:\Documents and Settings\Administrator\Local Settings\Temp\VBE\MSForms.exd ---> Offset = 8
    C:\Documents and Settings\Administrator\Local Settings\Temp\VBE\MSForms.exd ---> Offset = 12
    C:\Documents and Settings\Administrator\Local Settings\Temp\VBE\MSForms.exd ---> Offset = 16
    C:\Documents and Settings\Administrator\Local Settings\Temp\ge537.exe ---> Offset = 0
    C:\Documents and Settings\Administrator\Application Data\Microsoft\Office\Recent\%temp%\****.doc.LNK ---> Offset = 0
    C:\Documents and Settings\Administrator\Application Data\Microsoft\Office\Recent\index.dat ---> Offset = 55
    C:\Documents and Settings\Administrator\Application Data\Microsoft\Office\Recent\EB93A6.LNK ---> Offset = 0
    C:\Documents and Settings\Administrator\Application Data\Microsoft\Office\Recent\index.dat ---> Offset = 28
    C:\Documents and Settings\Administrator\Application Data\Microsoft\Office\Recent\index.dat ---> Offset = 0
    C:\Documents and Settings\Administrator\WinHost32.exe ---> Offset = 0
    C:\Documents and Settings\Administrator\Application Data\Microsoft\Office\VB11.pip ---> Offset = 0
    网络行为
    行为描述:联网打开网址
    详情信息:InternetOpenUrlA: http://**.133.40.**:128/wpad.dat, hInternet = 0x00cc0010, Flags = 0x00000010
    行为描述:连接指定站点
    详情信息:InternetConnectA: ServerName = go****om, PORT = 80, UserName = , Password = , hSession = 0x00cc0004, hConnect = 0x00cc0008, Flags = 0x00000000
    InternetConnectA: ServerName = **.133.40.**, PORT = 128, UserName = , Password = , hSession = 0x00cc0010, hConnect = 0x00cc0014, Flags = 0x00000010
    行为描述:打开HTTP连接
    详情信息:InternetOpenA: UserAgent: Mozilla/5.0 (Windows NT 6.1; rv:24.0) Gecko/20100101 Firefox/24.0, hSession = 0x00cc0004
    InternetOpenA: UserAgent: Mozilla/4.0 (compatible; MSIE 8.0; Win32; Trident/4.0), hSession = 0x00cc0010
    行为描述:建立到一个指定的套接字连接
    详情信息:URL: wpad, IP: **.133.40.**:128, SOCKET = 0x000002ac
    URL: go****om, IP: **.133.40.**:80, SOCKET = 0x000002b8
    行为描述:读取网络文件
    详情信息:hFile = 0x00cc0018, BytesToRead =4010, BytesRead = 4010.
    hFile = 0x00cc000c, BytesToRead =256, BytesRead = 256.
    行为描述:发送HTTP包
    详情信息:GET /wpad.dat HTTP/1.1 Accept: */* User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Win32; Trident/4.0) Host: **.133.40.**:128
    GET / HTTP/1.1 Accept: */* Content-Type: application/x-www-form-urlencoded User-Agent: Mozilla/5.0 (Windows NT 6.1; rv:24.0) Gecko/20100101 Firefox/24.0 Host: go****om Cache-Control: no-cache
    行为描述:打开HTTP请求
    详情信息:HttpOpenRequestA: **.133.40.**:128/wpad.dat, hConnect = 0x00cc0014, hRequest = 0x00cc0018, Verb: GET, Referer: , Flags = 0x00000010
    行为描述:按名称获取主机地址
    详情信息:GetAddrInfoW: computer
    GetAddrInfoW: wpad
    GetAddrInfoW: go****om
    注册表行为
    行为描述:修改注册表
    详情信息:\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\4080110900063D11C8EF10054038389C\Usage\VBAFiles
    \REGISTRY\USER\S-*\Software\Microsoft\Office\11.0\Common\ReviewCycle\ReviewToken
    \REGISTRY\USER\S-*\Software\Microsoft\Office\11.0\Word\Resiliency\DocumentRecovery\4F6A2\4F6A2
    \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\4080110900063D11C8EF10054038389C\Usage\WordEngWizDotFiles2
    \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{42D84CC3-5636-4BF9-8CB0-4DF7C22AD5C4}\2.0\
    \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{42D84CC3-5636-4BF9-8CB0-4DF7C22AD5C4}\2.0\FLAGS\
    \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{42D84CC3-5636-4BF9-8CB0-4DF7C22AD5C4}\2.0\0\win32\
    \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{42D84CC3-5636-4BF9-8CB0-4DF7C22AD5C4}\2.0\HELPDIR\
    \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\4080110900063D11C8EF10054038389C\Usage\WORDHelpFiles
    \REGISTRY\USER\S-*\Software\Microsoft\Office\Common\Assistant\CurrAsstState
    \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\4080110900063D11C8EF10054038389C\Usage\SpellingAndGrammarFiles_2052
    \REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings
    \REGISTRY\MACHINE\SOFTWARE\Microsoft\ESENT\Process\WinHost32\DEBUG\Trace Level
    \REGISTRY\USER\S-*\Software\Microsoft\VBA\6.0\Common\PropertiesWindow
    \REGISTRY\USER\S-*\Software\Microsoft\VBA\6.0\Common\MainWindow
    行为描述:删除注册表键值
    详情信息:\REGISTRY\USER\S-*\Software\Microsoft\Office\11.0\Word\Resiliency\StartupItems\t
    \REGISTRY\USER\S-*\Software\Microsoft\Office\11.0\Word\Resiliency\StartupItems\Es
    \REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\MSSCIPY\Keyboard Mapping Version
    \REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\MSSCIPY\Keyboard Mapping
    \REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyServer
    \REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\AutoConfigURL
    \REGISTRY\MACHINE\SOFTWARE\Microsoft\ESENT\Process\WinHost32\DEBUG\Trace Level
    \REGISTRY\USER\S-*\Software\Microsoft\Office\11.0\Word\Resiliency\DocumentRecovery\4F6A2\4F6A2
    \REGISTRY\USER\S-*\Software\Microsoft\Office\Common\Assistant\CurrAsstState
    \REGISTRY\USER\S-*\Software\Microsoft\Office\11.0\Word\MTTT
    行为描述:删除注册表键
    详情信息:\REGISTRY\USER\S-*\Software\Microsoft\Office\11.0\Word\Resiliency\StartupItems\
    \REGISTRY\USER\S-*\Software\Microsoft\Office\11.0\Word\Resiliency\DocumentRecovery\4F6A2\
    \REGISTRY\USER\S-*\Software\Microsoft\Office\11.0\Word\Resiliency\DocumentRecovery\
    \REGISTRY\USER\S-*\Software\Microsoft\Office\11.0\Word\Resiliency\
    行为描述:修改注册表_启动项
    详情信息:\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Run\WinHost32
    其他行为
    行为描述:创建互斥体
    详情信息:Global\MTX_MSO_Formal1_S-*
    Global\MTX_MSO_AdHoc1_S-*
    Local\Mso97SharedDg19521108172Mutex
    LocalMutex2341MSPYhld23qwe2529
    mscandui20.mutexDefault
    GlobalUserFileMappingEudcMSPYhld23qwe_lock_SYNCROOT
    _lock_SYNCROOT
    GlobalUserFileMappingEudpMSPYhld23qwe_lock_SYNCROOT
    PAdministratorLx.DAT!_SYNCROOT
    CfgSyncMSPYqeuir9hj_SYNCROOT
    PAdministratorSx.DAT!_SYNCROOT
    MSCTF.Shared.MUTEX.APH
    Local\Mso97SharedDg19531108172Mutex
    Local\Mso97SharedDg19541108172Mutex
    OfficeAssistantStateMutex
    行为描述:隐藏指定窗口
    详情信息:[Window,Class] = [,_WwB]
    [Window,Class] = [,ComboLBox]
    [Window,Class] = [lund,ThunderDFrame]
    [Window,Class] = [,DesignerWindow]
    [Window,Class] = [UserForm2,ThunderDFrame]
    [Window,Class] = [,ThunderRT6Main]
    [Window,Class] = [,Edit]
    [Window,Class] = [,Button]
    行为描述:查找指定窗口
    详情信息:NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
    NtUserFindWindowEx: [Class,Window] = [MSOBALLOON,]
    NtUserFindWindowEx: [Class,Window] = [MsoHelp10,]
    NtUserFindWindowEx: [Class,Window] = [AgentAnim,]
    NtUserFindWindowEx: [Class,Window] = [MsoHelp11,]
    行为描述:窗口信息
    详情信息:Pid = 1524, Hwnd=0x130184, Text = MsoDockTop, ClassName = MsoCommandBarDock.
    Pid = 1524, Hwnd=0x1201c8, Text = 格式, ClassName = MsoCommandBar.
    Pid = 1524, Hwnd=0x120172, Text = 常用, ClassName = MsoCommandBar.
    Pid = 1524, Hwnd=0x90260, Text = 菜单栏, ClassName = MsoCommandBar.
    Pid = 1524, Hwnd=0xf01f0, Text = %temp%\****.doc, ClassName = _WwB.
    Pid = 1524, Hwnd=0xe0216, Text = MSO Generic Control Container, ClassName = MsoCommandBar.
    Pid = 1524, Hwnd=0x120160, Text = MSO Generic Control Container, ClassName = MsoCommandBar.
    Pid = 1524, Hwnd=0xf01e6, Text = Microsoft Word 文档, ClassName = _WwG.
    Pid = 1524, Hwnd=0x1001dc, Text = %temp%\****.doc - Microsoft Word, ClassName = OpusApp.
    Pid = 1524, Hwnd=0x102f8, Text = 小四, ClassName = RichEdit20W.
    Pid = 1524, Hwnd=0x102f6, Text = Times New Roman, ClassName = RichEdit20W.
    Pid = 1524, Hwnd=0x102f4, Text = 正文, ClassName = RichEdit20W.
    Pid = 1524, Hwnd=0x102f2, Text = 100%, ClassName = RichEdit20W.
    Pid = 1524, Hwnd=0x202f0, Text = 键入需要帮助的问题, ClassName = RichEdit20W.
    行为描述:获取TickCount值
    详情信息:TickCount = 347215, SleepMilliseconds = 200.
    TickCount = 357393, SleepMilliseconds = 50.
    TickCount = 357471, SleepMilliseconds = 50.
    TickCount = 357487, SleepMilliseconds = 50.
    TickCount = 357503, SleepMilliseconds = 50.
    TickCount = 357831, SleepMilliseconds = 50.
    TickCount = 357878, SleepMilliseconds = 50.
    TickCount = 357893, SleepMilliseconds = 50.
    TickCount = 357925, SleepMilliseconds = 50.
    TickCount = 357940, SleepMilliseconds = 50.
    TickCount = 357956, SleepMilliseconds = 50.
    TickCount = 357971, SleepMilliseconds = 50.
    TickCount = 357987, SleepMilliseconds = 50.
    TickCount = 358003, SleepMilliseconds = 50.
    TickCount = 358034, SleepMilliseconds = 50.
    行为描述:打开事件
    详情信息:MSPY Non-PC softkbd
    CTF.ThreadMIConnectionEvent.000007F0.00000000.0000001E
    CTF.ThreadMarshalInterfaceEvent.000007F0.00000000.0000001E
    CTF.ThreadMIConnectionEvent.000007F0.00000000.0000001F
    CTF.ThreadMarshalInterfaceEvent.000007F0.00000000.0000001F
    MSCTF.SendReceiveConection.Event.APH.IC
    MSCTF.SendReceive.Event.APH.IC
    HookSwitchHookEnabledEvent
    AtlTraceModuleManager_ProcessAddedStatic3
    CTF.ThreadMIConnectionEvent.000007F0.00000000.00000020
    CTF.ThreadMarshalInterfaceEvent.000007F0.00000000.00000020
    \SECURITY\LSA_AUTHENTICATION_INITIALIZED
    Global\SvcctrlStartEvent_A3752DX
    \INSTALLATION_SECURITY_HOLD
    Global\crypt32LogoffEvent
    行为描述:枚举窗口
    详情信息:N/A
    行为描述:可执行文件签名信息
    详情信息:C:\Documents and Settings\Administrator\Local Settings\Temp\ge537.exe(签名验证: 未通过)
    C:\Documents and Settings\Administrator\WinHost32.exe(签名验证: 未通过)
    行为描述:调用Sleep函数
    详情信息:[1]: MilliSeconds = 200.
    [2]: MilliSeconds = 200.
    [3]: MilliSeconds = 200.
    [4]: MilliSeconds = 200.
    [5]: MilliSeconds = 200.
    [6]: MilliSeconds = 200.
    [7]: MilliSeconds = 200.
    [8]: MilliSeconds = 200.
    [9]: MilliSeconds = 200.
    [10]: MilliSeconds = 200.
    [1]: MilliSeconds = 60000.
    [2]: MilliSeconds = 60000.
    [3]: MilliSeconds = 60000.
    [4]: MilliSeconds = 60000.
    [5]: MilliSeconds = 60000.
    行为描述:创建事件对象
    详情信息:EventName = MSPY Non-PC softkbd
    EventName = Global\userenv: User Profile setup event
    EventName = MSCTF.SendReceive.Event.ABF.IC
    EventName = MSCTF.SendReceiveConection.Event.ABF.IC
    EventName = DINPUTWINMM
    EventName = Global\crypt32LogoffEvent
    行为描述:可执行文件MD5
    详情信息:C:\Documents and Settings\Administrator\Local Settings\Temp\ge537.exe ---> 19d360946bffa9b52662888f0524e3d5
    C:\Documents and Settings\Administrator\WinHost32.exe ---> 19d360946bffa9b52662888f0524e3d5
    行为描述:打开互斥体
    详情信息:Global\MTX_MSO_Formal1_S-*
    Global\MTX_MSO_AdHoc1_S-*
    Local\Mso97SharedDg19521108172Mutex
    Local\Mso97SharedDg19531108172Mutex
    Local\Mso97SharedDg19541108172Mutex
    OfficeAssistantStateMutex
    ShimCacheMutex
    Local\_!MSFTHISTORY!_
    Local\c:!documents and settings!administrator!local settings!temporary internet files!content.ie5!
    Local\c:!documents and settings!administrator!cookies!
    Local\c:!documents and settings!administrator!local settings!history!history.ie5!
    Local\WininetStartupMutex
    Local\WininetConnectionMutex
    Local\WininetProxyRegistryMutex
    RasPbFile
    Activities
    活动名类型
    .OpenVPNClientandroid.intent.action.MAIN
    .OpenVPNClientandroid.intent.category.LAUNCHER
    .OpenVPNAttachmentReceiverandroid.intent.action.VIEW
    .OpenVPNAttachmentReceiverandroid.intent.category.BROWSABLE
    .OpenVPNAttachmentReceiverandroid.intent.category.DEFAULT
    危险函数
    函数名称信息
    ContentResolver;->query读取联系人、短信等数据库
    android/app/NotificationManager;->notify信息通知栏
    HttpClient;->execute请求远程服务器
    TelephonyManager;->getDeviceId搜集用户手机IMEI码、电话号码、系统版本号等信息
    getRuntime获取命令行环境
    ContentResolver;->delete删除短信、联系人
    java/net/HttpURLConnection;->connect连接URL
    java/lang/Runtime;->exec执行字符串命令
    java/net/URL;->openConnection连接URL
    DefaultHttpClient;->execute发送HTTP请求
    WifiManager;->setWifiEnabled变更WIFI状态
    java/net/URLConnection;->connect连接URL
    启动方式
    名称信息
    net.openvpn.openvpn.OpenVPNRebootReceiver开机启动服务
    权限列表
    许可名称信息
    android.permission.INTERNET连接网络(2G或3G)
    android.permission.ACCESS_NETWORK_STATE读取网络状态(2G或3G)
    android.permission.USE_CREDENTIALS获取认证令牌
    android.permission.READ_EXTERNAL_STORAGE读外部存储器(如:SD卡)
    android.permission.RECEIVE_BOOT_COMPLETED接收开机启动广播
    android.permission.ACCESS_WIFI_STATE读取wifi网络状态
    android.permission.WRITE_EXTERNAL_STORAGE写外部存储器(如:SD卡)
    com.android.launcher.permission.INSTALL_SHORTCUT创建快捷方式
    android.permission.GET_TASKS获取有关当前或最近运行的任务信息
    android.permission.WAKE_LOCK手机屏幕关闭后后台进程仍运行
    android.permission.READ_PHONE_STATE读取电话状态
    android.permission.CHANGE_NETWORK_STATE变更网络状态
    android.permission.SYSTEM_ALERT_WINDOW显示系统窗口
    android.permission.SYSTEM_OVERLAY_WINDOW
    服务列表
    名称
    net.openvpn.openvpn.OpenVPNService
    net.openvpn.openvpn.Traffic_Service
    文件列表
    文件名 校验码
    META-INF/MANIFEST.MF 0x64e17ff7
    META-INF/CERT.SF 0x21fb5e56
    META-INF/CERT.RSA 0xa1f8f305
    AndroidManifest.xml 0xd6617d1b
    assets/请先安装路线.ovpn 0xbff20c37
    classes.dex 0x15285f49
    lib/arm64-v8a/libbmob.so 0xe7644eb6
    lib/arm64-v8a/libovpncli.so 0x60afdd1a
    lib/armeabi-v7a/libbmob.so 0xdc44a6ca
    lib/armeabi-v7a/libovpncli.so 0x512cb9a
    lib/armeabi/libbmob.so 0x2d8637
    lib/armeabi/libovpncli.so 0xadccfaee
    lib/mips/libbmob.so 0x76e28f13
    lib/mips64/libbmob.so 0x628621ae
    lib/x86/libbmob.so 0x57d9a01b
    lib/x86_64/libbmob.so 0xc3698a82
    res/color/abs__primary_text_disable_only_holo_dark.xml 0x655ee45c
    res/color/abs__primary_text_disable_only_holo_light.xml 0xf6a431de
    res/color/abs__primary_text_holo_dark.xml 0x16e82628
    res/color/abs__primary_text_holo_light.xml 0xeab84f6b
    res/color/my_functiontextview.xml 0x628c9b3f
    res/color/my_title_textcolor.xml 0x612902ac
    res/drawable-hdpi-v4/border1.png 0x3b3ce932
    res/drawable-hdpi-v4/btn_back.xml 0xec0e1c69
    res/drawable-hdpi-v4/btn_back_bg.png 0xca8a1311
    res/drawable-hdpi-v4/btn_back_nor.png 0xa7cfb1f9
    res/drawable-hdpi-v4/btn_back_on.png 0xf595e49b
    res/drawable-hdpi-v4/btn_back_sel.png 0xa3e9022d
    res/drawable-hdpi-v4/clickall.xml 0xb8a8740
    res/drawable-hdpi-v4/connected.png 0xc4d8bfb0
    res/drawable-hdpi-v4/connecting.png 0x140c3f06
    res/drawable-hdpi-v4/delete.png 0x27c0ce1
    res/drawable-hdpi-v4/disconnected.png 0x99bb1a27
    res/drawable-hdpi-v4/edit.png 0x4ada0291
    res/drawable-hdpi-v4/edit_border.png 0xdd8762e1
    res/drawable-hdpi-v4/error.png 0xdfbb82e6
    res/drawable-hdpi-v4/file_dialog_file.png 0xb9ca8135
    res/drawable-hdpi-v4/file_dialog_folder.png 0x24721e8d
    res/drawable-hdpi-v4/ic_launcher.png 0xf248df62
    res/drawable-hdpi-v4/icon.png 0xdfca71d7
    res/drawable-hdpi-v4/info.png 0x8c930b05
    res/drawable-hdpi-v4/list_child_sel_chech.png 0x542cf62b
    res/drawable-hdpi-v4/list_child_sel_nocheck.png 0x5b56482c
    res/drawable-hdpi-v4/openvpn_connected.png 0x51c76cd8
    res/drawable-hdpi-v4/openvpn_connecting.png 0xc24735cd
    res/drawable-hdpi-v4/openvpn_disconnected.png 0x255eb46a
    res/drawable-hdpi-v4/pause.png 0xab16c1cc
    res/drawable-hdpi-v4/pt.png 0xdfca71d7
    res/drawable-hdpi-v4/pwd_icon.png 0x93f99a1c
    res/drawable-hdpi-v4/radio_selector.xml 0x3a7f7487
    res/drawable-hdpi-v4/rightarrow.png 0x2ba4adf5
    res/drawable-hdpi-v4/user_icon.png 0xa66e41ec
    res/drawable-hdpi/ic_launcher.png 0xf248df62
    res/drawable-ldpi-v4/connected.png 0xc4d8bfb0
    res/drawable-ldpi-v4/connecting.png 0x140c3f06
    res/drawable-ldpi-v4/delete.png 0x27c0ce1
    res/drawable-ldpi-v4/disconnected.png 0x99bb1a27
    res/drawable-ldpi-v4/edit.png 0x4ada0291
    res/drawable-ldpi-v4/error.png 0xdfbb82e6
    res/drawable-ldpi-v4/file_dialog_file.png 0xb9ca8135
    res/drawable-ldpi-v4/file_dialog_folder.png 0x24721e8d
    res/drawable-ldpi-v4/icon.png 0xdfca71d7
    res/drawable-ldpi-v4/info.png 0x8c930b05
    res/drawable-ldpi-v4/openvpn_connected.png 0x51c76cd8
    res/drawable-ldpi-v4/openvpn_connecting.png 0xc24735cd
    res/drawable-ldpi-v4/openvpn_disconnected.png 0x255eb46a
    res/drawable-ldpi-v4/pause.png 0xab16c1cc
    res/drawable-ldpi-v4/rightarrow.png 0x2ba4adf5
    res/drawable-mdpi-v4/connected.png 0xc4d8bfb0
    res/drawable-mdpi-v4/connecting.png 0x140c3f06
    res/drawable-mdpi-v4/delete.png 0x27c0ce1
    res/drawable-mdpi-v4/disconnected.png 0x99bb1a27
    res/drawable-mdpi-v4/edit.png 0x4ada0291
    res/drawable-mdpi-v4/error.png 0xdfbb82e6
    res/drawable-mdpi-v4/file_dialog_file.png 0xb9ca8135
    res/drawable-mdpi-v4/file_dialog_folder.png 0x24721e8d
    res/drawable-mdpi-v4/ic_launcher.png 0x6a84dfd9
    res/drawable-mdpi-v4/icon.png 0xdfca71d7
    res/drawable-mdpi-v4/info.png 0x8c930b05
    res/drawable-mdpi-v4/openvpn_connected.png 0x51c76cd8
    res/drawable-mdpi-v4/openvpn_connecting.png 0xc24735cd
    res/drawable-mdpi-v4/openvpn_disconnected.png 0x255eb46a
    res/drawable-mdpi-v4/pause.png 0xab16c1cc
    res/drawable-mdpi-v4/rightarrow.png 0x2ba4adf5
    res/drawable-mdpi/ic_launcher.png 0x6a84dfd9
    res/drawable-xhdpi-v4/connected.png 0xc4d8bfb0
    res/drawable-xhdpi-v4/connecting.png 0x140c3f06
    res/drawable-xhdpi-v4/delete.png 0x27c0ce1
    res/drawable-xhdpi-v4/disconnected.png 0x99bb1a27
    res/drawable-xhdpi-v4/edit.png 0x4ada0291
    res/drawable-xhdpi-v4/error.png 0xdfbb82e6
    res/drawable-xhdpi-v4/file_dialog_file.png 0xb9ca8135
    res/drawable-xhdpi-v4/file_dialog_folder.png 0x24721e8d
    res/drawable-xhdpi-v4/ic_launcher.png 0xa227fc8a
    res/drawable-xhdpi-v4/icon.png 0xdfca71d7
    res/drawable-xhdpi-v4/info.png 0x8c930b05
    res/drawable-xhdpi-v4/openvpn_connected.png 0x51c76cd8
    res/drawable-xhdpi-v4/openvpn_connecting.png 0xc24735cd
    res/drawable-xhdpi-v4/openvpn_disconnected.png 0x255eb46a
    res/drawable-xhdpi-v4/pause.png 0xab16c1cc
    res/drawable-xhdpi-v4/rightarrow.png 0x2ba4adf5
    res/drawable-xhdpi/ic_launcher.png 0xa227fc8a
    res/drawable-xxhdpi-v4/connected.png 0xc4d8bfb0
    res/drawable-xxhdpi-v4/connecting.png 0x140c3f06
    res/drawable-xxhdpi-v4/delete.png 0x27c0ce1
    res/drawable-xxhdpi-v4/disconnected.png 0x99bb1a27
    res/drawable-xxhdpi-v4/edit.png 0x4ada0291
    res/drawable-xxhdpi-v4/error.png 0xdfbb82e6
    res/drawable-xxhdpi-v4/file_dialog_file.png 0xb9ca8135
    res/drawable-xxhdpi-v4/file_dialog_folder.png 0x24721e8d
    res/drawable-xxhdpi-v4/ic_launcher.png 0x2a4a99d1
    res/drawable-xxhdpi-v4/icon.png 0xdfca71d7
    res/drawable-xxhdpi-v4/info.png 0x8c930b05
    res/drawable-xxhdpi-v4/openvpn_connected.png 0x51c76cd8
    res/drawable-xxhdpi-v4/openvpn_connecting.png 0xc24735cd
    res/drawable-xxhdpi-v4/openvpn_disconnected.png 0x255eb46a
    res/drawable-xxhdpi-v4/pause.png 0xab16c1cc
    res/drawable-xxhdpi-v4/rightarrow.png 0x2ba4adf5
    res/drawable-xxhdpi/ic_launcher.png 0x2a4a99d1
    res/drawable-xxxhdpi-v4/connected.png 0xc4d8bfb0
    res/drawable-xxxhdpi-v4/connecting.png 0x140c3f06
    res/drawable-xxxhdpi-v4/delete.png 0x27c0ce1
    res/drawable-xxxhdpi-v4/disconnected.png 0x99bb1a27
    res/drawable-xxxhdpi-v4/edit.png 0x4ada0291
    res/drawable-xxxhdpi-v4/error.png 0xdfbb82e6
    res/drawable-xxxhdpi-v4/file_dialog_file.png 0xb9ca8135
    res/drawable-xxxhdpi-v4/file_dialog_folder.png 0x24721e8d
    res/drawable-xxxhdpi-v4/icon.png 0xdfca71d7
    res/drawable-xxxhdpi-v4/info.png 0x8c930b05
    res/drawable-xxxhdpi-v4/openvpn_connected.png 0x51c76cd8
    res/drawable-xxxhdpi-v4/openvpn_connecting.png 0xc24735cd
    res/drawable-xxxhdpi-v4/openvpn_disconnected.png 0x255eb46a
    res/drawable-xxxhdpi-v4/pause.png 0xab16c1cc
    res/drawable-xxxhdpi-v4/rightarrow.png 0x2ba4adf5
    res/drawable/bg.png 0xf2264c67
    res/drawable/border1.png 0x3b3ce932
    res/drawable/btn_back.xml 0xec0e1c69
    res/drawable/btn_back_bg.png 0xca8a1311
    res/drawable/btn_back_nor.png 0xa7cfb1f9
    res/drawable/btn_back_on.png 0xf595e49b
    res/drawable/btn_back_sel.png 0xa3e9022d
    res/drawable/btn_delete.xml 0x20690c9
    res/drawable/button_start.png 0xda925f3a
    res/drawable/button_stop.png 0x39f75c46
    res/drawable/ceshiab.png 0xcf1c6838
    res/drawable/chongzhi.png 0xe0ddc7f4
    res/drawable/clickall.xml 0xb8a8740
    res/drawable/denglu.png 0xa9a8e8eb
    res/drawable/down_ico.png 0xff0f1830
    res/drawable/edit_border.png 0xb92f08aa
    res/drawable/editbutton.xml 0x5b869511
    res/drawable/editview.xml 0xfffd0ce2
    res/drawable/fuli1.png 0xd5c70847
    res/drawable/fuli2.png 0x5c6f7135
    res/drawable/fuwubaozheng.png 0x653f2959
    res/drawable/fw.png 0x3094d4f1
    res/drawable/icon.png 0xdfca71d7
    res/drawable/icons.png 0x3094d4f1
    res/drawable/info_box.xml 0x4cc276a6
    res/drawable/kameng.png 0xc256da0e
    res/drawable/lianjie.png 0x8bfeba77
    res/drawable/lijizhuce_button.xml 0xa0abe98c
    res/drawable/line.xml 0xfba27e53
    res/drawable/list_child_sel_chech.png 0x542cf62b
    res/drawable/list_child_sel_nocheck.png 0x5b56482c
    res/drawable/liuliang.png 0xf9a847df
    res/drawable/liuliang2.png 0xbb03874c
    res/drawable/loading_ios.png 0xe6354491
    res/drawable/logintop.png 0x0
    res/drawable/luxian.png 0xc03c0489
    res/drawable/profile_box.xml 0x4cc276a6
    res/drawable/progress_bar_circle.xml 0x775ed8b8
    res/drawable/progress_bar_horizontal.xml 0x504bf0ab
    res/drawable/pwd_icon.png 0x93f99a1c
    res/drawable/qq.png 0xb7c2fe6f
    res/drawable/radio_selector.xml 0x3a7f7487
    res/drawable/rounded_edittext.xml 0x2a41c332
    res/drawable/search.9.png 0x3d680ad5
    res/drawable/sep_line.png 0xe5c1e2ee
    res/drawable/shezhi.png 0xdd31ca13
    res/drawable/shop.png 0x48f18a48
    res/drawable/shouhoufuwu.png 0x9a939b54
    res/drawable/shuoming.png 0xb2250f7e
    res/drawable/start.xml 0x719f90ac
    res/drawable/stats_box.xml 0xca691a9b
    res/drawable/stop.xml 0xafdab6e7
    res/drawable/taobao.png 0x64936f26
    res/drawable/user_icon.png 0xa66e41ec
    res/drawable/xinxixianshi.png 0x239c0b30
    res/layout-land/cert_warn.xml 0xbcad2270
    res/layout/about.xml 0x5880d0d0
    res/layout/activity_bomb.xml 0xef87f76c
    res/layout/activity_chongzhi.xml 0x4dbb7974
    res/layout/activity_common.xml 0x68ab28e2
    res/layout/activity_doing.xml 0xca9788a6
    res/layout/activity_line.xml 0xeb57a742
    res/layout/activity_main.xml 0xbe8fcaaa
    res/layout/activity_more_info.xml 0xc617b03d
    res/layout/activity_open_vpnattachment_receiver.xml 0xef87f76c
    res/layout/activity_open_vpnclient.xml 0xe28bd179
    res/layout/activity_registration.xml 0x3bdb612e
    res/layout/activity_test.xml 0x92a7c39
    res/layout/activity_vpnclient.xml 0xe28bd179
    res/layout/activiyt_login.xml 0x2c1c6c0
    res/layout/add_proxy.xml 0x281b051e
    res/layout/add_shortcut.xml 0xea85512f
    res/layout/attachment_receiver.xml 0xb4ac365b
    res/layout/cert_warn.xml 0x5f2dedd2
    res/layout/cr_dialog.xml 0x3a0d4fe7
    res/layout/create_shortcut_dialog.xml 0xf0080b74
    res/layout/detail.xml 0xf01dd466
    res/layout/file_dialog_main.xml 0xc2fc40cf
    res/layout/file_dialog_row.xml 0x31dfbc4e
    res/layout/form.xml 0x8363f6d
    res/layout/import_profile.xml 0x1bbe5f8a
    res/layout/import_server_item.xml 0x4aa50903
    res/layout/item_header.xml 0x64db3aa4
    res/layout/list_items.xml 0xed887a30
    res/layout/list_view.xml 0x3f8ea3ba
    res/layout/log.xml 0xbe6c8c61
    res/layout/maintab.xml 0xa16da1ee
    res/layout/progress_circle.xml 0xaa584f48
    res/layout/progress_horizontal.xml 0xb730329f
    res/layout/proxy_creds.xml 0xe5f17156
    res/layout/rename_profile_dialog.xml 0x519da404
    res/layout/stats.xml 0xcb0ac9a1
    res/layout/traffic_view.xml 0xef23b973
    res/menu/bomb.xml 0x683d33b4
    res/menu/chongzhi.xml 0x683d33b4
    res/menu/menu.xml 0xaaacdb32
    res/menu/open_vpnattachment_receiver.xml 0x683d33b4
    res/xml/preferences.xml 0x67f403ec
    resources.arsc 0xa10c19b0
    运行截图
    VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号