VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, VirSCAN can scan compressed files with password 'infected' or 'virus'.

Language
Server load
Server Load



File information
File Name :3DS emulator v0.3.4.apk (File not down)
File Size :9457758 byte
File Type :application/jar
MD5:d37e543ae413b95da3820f3b4aa99b32
SHA1:8c889e746d3d0930f151fb795a1b79c6248799fd
  • 扫描结果
  • 权限
  • 文件行为分析
  • Scanner results
    Scanner results:0%Scanner(s) (0/32)found malware!
    Behavior analysis report:         Habo file analysis
    Time: 2018-02-09 04:33:16 (CST)
    VirSCANVirSCAN
    Scanner Engine Ver Sig Ver Sig Date Scan result Time
    antiy AVL SDK 2.0 1970-01-01 Found nothing 10
    asquared 9.0.0.4799 9.0.0.4799 2015-03-08 Found nothing 3
    avast 170303-1 4.7.4 2017-03-03 Found nothing 60
    avg 2109/14865 10.0.1405 2018-02-02 Found nothing 60
    baidu 2.0.1.0 4.1.3.52192 2.0.1.0 Found nothing 6
    baidusd 1.0 1.0 2017-03-22 Found nothing 1
    bitdefender 7.58879 7.90123 2015-01-16 Found nothing 60
    clamav 24293 0.97.5 2018-02-07 Found nothing 60
    drweb 5.0.2.3300 5.0.1.1 2018-02-02 Found nothing 60
    fortinet 1.000, 54.989, 54.836, 54.859 5.4.247 2018-02-07 Found nothing 60
    fprot 4.6.2.117 6.5.1.5418 2016-02-05 Found nothing 60
    fsecure 2015-08-01-02 9.13 2015-08-01 Found nothing 60
    gdata 25.15955 25.15955 2018-02-08 Found nothing 20
    ikarus 4.00.05 V1.32.31.0 2018-02-08 Found nothing 60
    jiangmin 16.0.100 1.0.0.0 2017-12-22 Found nothing 2
    kaspersky 5.5.33 5.5.33 2014-04-01 Found nothing 60
    kingsoft 2.1 2.1 2018-02-08 Found nothing 5
    mcafee 8620 5400.1158 2017-08-12 Found nothing 60
    nod32 6866 3.0.21 2018-02-07 Found nothing 60
    panda 9.05.01 9.05.01 2018-02-08 Found nothing 4
    pcc 13.302.06 9.500-1005 2017-03-27 Found nothing 60
    qh360 1.0.1 1.0.1 1.0.1 Found nothing 5
    qqphone 1.0.0.0 1.0.0.0 2015-12-30 Found nothing 60
    quickheal 14.00 14.00 2017-11-18 Found nothing 7
    rising 3201 3201 2017-12-26 Found nothing 2
    sophos 5.32 3.65.2 2016-10-10 Found nothing 60
    symantec 20151230.005 1.3.0.24 2015-12-30 Found nothing 60
    tachyon 9.9.9 9.9.9 2013-12-27 Found nothing 5
    thehacker 6.8.0.5 6.8.0.5 2018-02-05 Found nothing 2
    tws 17.47.17308 1.0.2.2108 2018-02-08 Found nothing 15
    vba 3.12.29.5 beta 3.12.29.5 beta 2018-02-08 Found nothing 60
    virusbuster 15.0.985.0 5.5.2.13 2014-12-05 Found nothing 60
    Heuristic/Suspicious Exact
    NOTICE: Results are not 100% accurate and can be reported as a false positive by some scannerswhen and if malware is found. Please judge these results for yourself.
    Copy to clipboard
  • 权限列表
    许可名称信息
    android.permission.INTERNET连接网络(2G或3G)
    android.permission.ACCESS_NETWORK_STATE读取网络状态(2G或3G)
    android.permission.READ_PHONE_STATE读取电话状态
  • 文件信息
    安全评分 :
    基本信息
    MD5:d37e543ae413b95da3820f3b4aa99b32
    包名:com.three.DSe
    最低运行环境:Android 2.1.x
    版权:Acme Ltd.
    关键行为
    行为描述:获取TickCount值
    详情信息:TickCount = 228094, SleepMilliseconds = 1.
    TickCount = 228766, SleepMilliseconds = 1.
    TickCount = 228797, SleepMilliseconds = 1.
    TickCount = 228813, SleepMilliseconds = 1.
    TickCount = 228844, SleepMilliseconds = 1.
    TickCount = 228876, SleepMilliseconds = 1.
    TickCount = 288906, SleepMilliseconds = 60000.
    TickCount = 228938, SleepMilliseconds = 1.
    TickCount = 228954, SleepMilliseconds = 1.
    TickCount = 228985, SleepMilliseconds = 1.
    TickCount = 229016, SleepMilliseconds = 1.
    TickCount = 229032, SleepMilliseconds = 1.
    TickCount = 229047, SleepMilliseconds = 1.
    TickCount = 229079, SleepMilliseconds = 1.
    TickCount = 229126, SleepMilliseconds = 1.
    行为描述:直接获取CPU时钟
    详情信息:EAX = 0x8092a225, EDX = 0x000000b8
    EAX = 0x8092a271, EDX = 0x000000b8
    EAX = 0x8880705a, EDX = 0x000000b8
    EAX = 0x93213d73, EDX = 0x000000b8
    EAX = 0x93213dbf, EDX = 0x000000b8
    EAX = 0x985c0c78, EDX = 0x000000b8
    EAX = 0x985c0cc4, EDX = 0x000000b8
    EAX = 0xdf8d17a2, EDX = 0x000000b8
    EAX = 0xdf8d17ee, EDX = 0x000000b8
    EAX = 0xe240176a, EDX = 0x000000b8
    行为描述:修改注册表_系统防火墙可信进程列表
    详情信息:\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Documents and Settings\Administrator\Local Settings\Temp\WindowsApplication1.exe
    行为描述:修改注册表_启动项
    详情信息:\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Run\d915d84bf59b475b1b03d31691e95b01
    \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\d915d84bf59b475b1b03d31691e95b01
    进程行为
    行为描述:隐藏窗口创建进程
    详情信息:ImagePath = , CmdLine = netsh firewall add allowedprogram "C:\Documents and Settings\Administrator\Local Settings\Temp\WindowsApplication1.exe" "WindowsApplication1.exe" ENABLE
    行为描述:创建进程
    详情信息:[0x00000bd8]ImagePath = C:\WINDOWS\system32\netsh.exe, CmdLine = netsh firewall add allowedprogram "C:\Documents and Settings\Administrator\Local Settings\Temp\WindowsApplication1.exe" "WindowsApplication1.exe" ENABLE
    行为描述:创建新文件进程
    详情信息:[0x00000b8c]ImagePath = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\WindowsApplication1.exe, CmdLine = "C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\WindowsApplication1.exe"
    行为描述:创建本地线程
    详情信息:TargetProcess: WindowsApplication1.exe, InheritedFromPID = 2908, ProcessID = 2956, ThreadID = 2968, StartAddress = 792A741C, Parameter = 00000000
    TargetProcess: WindowsApplication1.exe, InheritedFromPID = 2908, ProcessID = 2956, ThreadID = 2972, StartAddress = 791F59C0, Parameter = 001AFE18
    TargetProcess: WindowsApplication1.exe, InheritedFromPID = 2908, ProcessID = 2956, ThreadID = 3004, StartAddress = 4AEA7456, Parameter = 00000000
    TargetProcess: netsh.exe, InheritedFromPID = 2956, ProcessID = 3032, ThreadID = 3040, StartAddress = 77DC845A, Parameter = 00000000
    TargetProcess: netsh.exe, InheritedFromPID = 2956, ProcessID = 3032, ThreadID = 3044, StartAddress = 77E56C7D, Parameter = 001B7460
    TargetProcess: netsh.exe, InheritedFromPID = 2956, ProcessID = 3032, ThreadID = 3048, StartAddress = 769AE43B, Parameter = 001B9040
    TargetProcess: netsh.exe, InheritedFromPID = 2956, ProcessID = 3032, ThreadID = 3052, StartAddress = 77E56C7D, Parameter = 001BE438
    TargetProcess: netsh.exe, InheritedFromPID = 2956, ProcessID = 3032, ThreadID = 3112, StartAddress = 77E56C7D, Parameter = 001B3530
    TargetProcess: WindowsApplication1.exe, InheritedFromPID = 2908, ProcessID = 2956, ThreadID = 3140, StartAddress = 791F59C0, Parameter = 001C2D10
    TargetProcess: WindowsApplication1.exe, InheritedFromPID = 2908, ProcessID = 2956, ThreadID = 3144, StartAddress = 791F59C0, Parameter = 001C2D10
    TargetProcess: WindowsApplication1.exe, InheritedFromPID = 2908, ProcessID = 2956, ThreadID = 3148, StartAddress = 77DC845A, Parameter = 00000000
    TargetProcess: WindowsApplication1.exe, InheritedFromPID = 2908, ProcessID = 2956, ThreadID = 3188, StartAddress = 77E56C7D, Parameter = 001FFD58
    TargetProcess: WindowsApplication1.exe, InheritedFromPID = 2908, ProcessID = 2956, ThreadID = 3192, StartAddress = 769AE43B, Parameter = 001C6690
    TargetProcess: WindowsApplication1.exe, InheritedFromPID = 2908, ProcessID = 2956, ThreadID = 3236, StartAddress = 74E53861, Parameter = 0348EE98
    TargetProcess: WindowsApplication1.exe, InheritedFromPID = 2908, ProcessID = 2956, ThreadID = 3240, StartAddress = 77E56C7D, Parameter = 00204350
    文件行为
    行为描述:创建文件
    详情信息:C:\Documents and Settings\Administrator\Local Settings\Temp\nss6.tmp
    C:\Documents and Settings\Administrator\Local Settings\Temp\WindowsApplication1.exe
    C:\Documents and Settings\Administrator\Local Settings\Temp\Facebook 1935354066751796.mp4
    行为描述:创建可执行文件
    详情信息:C:\Documents and Settings\Administrator\Local Settings\Temp\WindowsApplication1.exe
    行为描述:覆盖已有文件
    详情信息:C:\Documents and Settings\Administrator\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
    行为描述:查找文件
    详情信息:FileName = C:\Documents and Settings
    FileName = C:\Documents and Settings\Administrator
    FileName = C:\Documents and Settings\Administrator\Local Settings
    FileName = C:\Documents and Settings\Administrator\Local Settings\Temp
    FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%
    FileName = C:\Documents and Settings\Administrator\My Documents
    FileName = C:\Documents and Settings\All Users
    FileName = C:\Documents and Settings\All Users\Documents
    FileName = C:\Documents and Settings\Administrator\桌面
    FileName = C:\Documents and Settings\All Users\桌面
    FileName = C:\DOCUME~1
    FileName = C:\DOCUME~1\ADMINI~1
    FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1
    FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp
    FileName = C:\WINDOWS\Microsoft.NET\Framework\v4.0.30319\mscoreei.dll
    行为描述:删除文件
    详情信息:C:\Documents and Settings\Administrator\Local Settings\Temp\nss6.tmp
    行为描述:修改文件内容
    详情信息:C:\Documents and Settings\Administrator\Local Settings\Temp\WindowsApplication1.exe ---> Offset = 0
    C:\Documents and Settings\Administrator\Local Settings\Temp\WindowsApplication1.exe ---> Offset = 23998
    C:\Documents and Settings\Administrator\Local Settings\Temp\WindowsApplication1.exe ---> Offset = 49557
    C:\Documents and Settings\Administrator\Local Settings\Temp\WindowsApplication1.exe ---> Offset = 72937
    C:\Documents and Settings\Administrator\Local Settings\Temp\Facebook 1935354066751796.mp4 ---> Offset = 0
    C:\Documents and Settings\Administrator\Local Settings\Temp\Facebook 1935354066751796.mp4 ---> Offset = 28235
    C:\Documents and Settings\Administrator\Local Settings\Temp\Facebook 1935354066751796.mp4 ---> Offset = 44447
    C:\Documents and Settings\Administrator\Local Settings\Temp\Facebook 1935354066751796.mp4 ---> Offset = 61195
    C:\Documents and Settings\Administrator\Local Settings\Temp\Facebook 1935354066751796.mp4 ---> Offset = 77644
    网络行为
    行为描述:建立到一个指定的套接字连接
    详情信息:URL: em****rg, IP: **.133.40.**:3158, SOCKET = 0x00000230
    URL: em****rg, IP: **.133.40.**:3158, SOCKET = 0x000003a4
    URL: em****rg, IP: **.133.40.**:3158, SOCKET = 0x000003b8
    URL: em****rg, IP: **.133.40.**:3158, SOCKET = 0x000003cc
    URL: em****rg, IP: **.133.40.**:3158, SOCKET = 0x000003e0
    URL: em****rg, IP: **.133.40.**:3158, SOCKET = 0x000003f4
    URL: em****rg, IP: **.133.40.**:3158, SOCKET = 0x00000410
    URL: em****rg, IP: **.133.40.**:3158, SOCKET = 0x00000424
    URL: em****rg, IP: **.133.40.**:3158, SOCKET = 0x00000438
    URL: em****rg, IP: **.133.40.**:3158, SOCKET = 0x0000044c
    URL: em****rg, IP: **.133.40.**:3158, SOCKET = 0x00000460
    URL: em****rg, IP: **.133.40.**:3158, SOCKET = 0x00000474
    URL: em****rg, IP: **.133.40.**:3158, SOCKET = 0x00000488
    URL: em****rg, IP: **.133.40.**:3158, SOCKET = 0x0000049c
    URL: em****rg, IP: **.133.40.**:3158, SOCKET = 0x000004b0
    行为描述:按名称获取主机地址
    详情信息:GetAddrInfoW: em****rg
    注册表行为
    行为描述:修改注册表
    详情信息:\REGISTRY\USER\S-*\Software\Microsoft\Windows\ShellNoRoam\MUICache\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\WindowsApplication1.exe
    \REGISTRY\USER\S-*\di
    \REGISTRY\MACHINE\SOFTWARE\Microsoft\Tracing\FWCFG\EnableFileTracing
    \REGISTRY\MACHINE\SOFTWARE\Microsoft\Tracing\FWCFG\EnableConsoleTracing
    \REGISTRY\MACHINE\SOFTWARE\Microsoft\Tracing\FWCFG\FileTracingMask
    \REGISTRY\MACHINE\SOFTWARE\Microsoft\Tracing\FWCFG\ConsoleTracingMask
    \REGISTRY\MACHINE\SOFTWARE\Microsoft\Tracing\FWCFG\MaxFileSize
    \REGISTRY\MACHINE\SOFTWARE\Microsoft\Tracing\FWCFG\FileDirectory
    \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\NAP\Netsh\LogSessionName
    \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\NAP\Netsh\Active
    \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\NAP\Netsh\ControlFlags
    \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\NAP\Netsh\Napmontr\Guid
    \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\NAP\Netsh\Napmontr\BitNames
    \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\qagent\LogSessionName
    \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\qagent\Active
    行为描述:修改注册表_系统环境变量
    详情信息:\REGISTRY\USER\S-*\Environment\SEE_MASK_NOZONECHECKS
    行为描述:修改注册表_系统防火墙可信进程列表
    详情信息:\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Documents and Settings\Administrator\Local Settings\Temp\WindowsApplication1.exe
    行为描述:修改注册表_启动项
    详情信息:\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Run\d915d84bf59b475b1b03d31691e95b01
    \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\d915d84bf59b475b1b03d31691e95b01
    其他行为
    行为描述:检测自身是否被调试
    详情信息:IsDebuggerPresent
    行为描述:创建互斥体
    详情信息:CTF.LBES.MutexDefaultS-*
    CTF.Compart.MutexDefaultS-*
    CTF.Asm.MutexDefaultS-*
    CTF.Layouts.MutexDefaultS-*
    CTF.TMD.MutexDefaultS-*
    CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
    Local\ZonesCounterMutex
    Local\ZoneAttributeCacheCounterMutex
    Local\ZonesCacheCounterMutex
    Local\ZonesLockedCacheCounterMutex
    d915d84bf59b475b1b03d31691e95b01
    行为描述:创建事件对象
    详情信息:EventName = Global\userenv: User Profile setup event
    EventName = Global\CPFATE_2956_v4.0.30319
    EventName = Global\crypt32LogoffEvent
    EventName = DINPUTWINMM
    行为描述:打开互斥体
    详情信息:Local\!IETld!Mutex
    ShimCacheMutex
    行为描述:获取TickCount值
    详情信息:TickCount = 228094, SleepMilliseconds = 1.
    TickCount = 228766, SleepMilliseconds = 1.
    TickCount = 228797, SleepMilliseconds = 1.
    TickCount = 228813, SleepMilliseconds = 1.
    TickCount = 228844, SleepMilliseconds = 1.
    TickCount = 228876, SleepMilliseconds = 1.
    TickCount = 288906, SleepMilliseconds = 60000.
    TickCount = 228938, SleepMilliseconds = 1.
    TickCount = 228954, SleepMilliseconds = 1.
    TickCount = 228985, SleepMilliseconds = 1.
    TickCount = 229016, SleepMilliseconds = 1.
    TickCount = 229032, SleepMilliseconds = 1.
    TickCount = 229047, SleepMilliseconds = 1.
    TickCount = 229079, SleepMilliseconds = 1.
    TickCount = 229126, SleepMilliseconds = 1.
    行为描述:调整进程token权限
    详情信息:SE_LOAD_DRIVER_PRIVILEGE
    SE_DEBUG_PRIVILEGE
    SE_INC_BASE_PRIORITY_PRIVILEGE
    行为描述:打开事件
    详情信息:HookSwitchHookEnabledEvent
    _fCanRegisterWithShellService
    \SECURITY\LSA_AUTHENTICATION_INITIALIZED
    Global\CLR_PerfMon_StartEnumEvent
    \KernelObjects\LowMemoryCondition
    Global\crypt32LogoffEvent
    Global\SvcctrlStartEvent_A3752DX
    MSFT.VSA.COM.DISABLE.3032
    MSFT.VSA.IEC.STATUS.6c736db0
    MSFT.VSA.COM.DISABLE.2956
    行为描述:可执行文件签名信息
    详情信息:C:\Documents and Settings\Administrator\Local Settings\Temp\WindowsApplication1.exe(签名验证: 未通过)
    行为描述:调用Sleep函数
    详情信息:[1]: MilliSeconds = 5000.
    [2]: MilliSeconds = 1000.
    [3]: MilliSeconds = 2000.
    [4]: MilliSeconds = 1000.
    [5]: MilliSeconds = 1.
    [6]: MilliSeconds = 1.
    [7]: MilliSeconds = 1.
    [8]: MilliSeconds = 1.
    [9]: MilliSeconds = 1.
    [10]: MilliSeconds = 1.
    行为描述:隐藏指定窗口
    详情信息:[Window,Class] = [Form1,WindowsForms10.Window.8.app.0.2bf8098_r19_ad1]
    行为描述:可执行文件MD5
    详情信息:C:\Documents and Settings\Administrator\Local Settings\Temp\WindowsApplication1.exe ---> 9ec325bd8216b98c4f5ebc99a9093094
    行为描述:直接获取CPU时钟
    详情信息:EAX = 0x8092a225, EDX = 0x000000b8
    EAX = 0x8092a271, EDX = 0x000000b8
    EAX = 0x8880705a, EDX = 0x000000b8
    EAX = 0x93213d73, EDX = 0x000000b8
    EAX = 0x93213dbf, EDX = 0x000000b8
    EAX = 0x985c0c78, EDX = 0x000000b8
    EAX = 0x985c0cc4, EDX = 0x000000b8
    EAX = 0xdf8d17a2, EDX = 0x000000b8
    EAX = 0xdf8d17ee, EDX = 0x000000b8
    EAX = 0xe240176a, EDX = 0x000000b8
    Activities
    活动名类型
    com.three.DSe.RunnerActivityandroid.intent.action.MAIN
    com.three.DSe.RunnerActivityandroid.intent.category.LAUNCHER
    危险函数
    函数名称信息
    HttpClient;->execute请求远程服务器
    LocationManager;->getLastKnownLocation获取地址位置
    java/net/URL;->openConnection连接URL
    java/net/HttpURLConnection;->connect连接URL
    TelephonyManager;->getDeviceId搜集用户手机IMEI码、电话号码、系统版本号等信息
    ContentResolver;->query读取联系人、短信等数据库
    DefaultHttpClient;->execute发送HTTP请求
    TelephonyManager;->getLine1Number获取手机号
    java/net/URLConnection;->connect连接URL
    getRuntime获取命令行环境
    java/lang/Runtime;->exec执行字符串命令
    权限列表
    许可名称信息
    android.permission.INTERNET连接网络(2G或3G)
    android.permission.ACCESS_NETWORK_STATE读取网络状态(2G或3G)
    android.permission.READ_PHONE_STATE读取电话状态
    服务列表
    名称
    com.three.DSe.RunnerBillingService
    文件列表
    文件名 校验码
    assets/game.droid 0x85518530
    assets/splash.png 0x5579634e
    res/drawable/bkgrnd.png 0x4aa6127
    res/drawable/close.png 0x51c469e5
    res/drawable/close_button_normal.png 0xc42f8d41
    res/drawable/close_button_pressed.png 0xcc0b455d
    res/drawable/closebutton.png 0xbb69e46b
    res/drawable/default_video_poster.png 0xd2da86da
    res/drawable/facebook_icon.png 0x456cc6d8
    res/drawable/icon.png 0xe8e9c8c0
    res/drawable/leftarrow.png 0x14a14e85
    res/drawable/refresh.png 0x67e43db5
    res/drawable/rightarrow.png 0x52c54811
    res/drawable/unleftarrow.png 0xe8729e58
    res/drawable/unrightarrow.png 0xc75a9afc
    res/layout/main.xml 0x1a09cd2d
    res/layout/mraid_browser.xml 0x89202df2
    res/layout/userpasslayout.xml 0x717e7403
    res/layout/video_loading_progress.xml 0xb8626e50
    res/raw/mraid.js 0x13e99079
    res/xml/preferences.xml 0xcf4ad199
    AndroidManifest.xml 0x8cd7b256
    resources.arsc 0x9e44d647
    res/drawable-hdpi/close.png 0x8244c9fa
    res/drawable-hdpi/facebook_icon.png 0x3a774855
    res/drawable-hdpi/icon.png 0x45a0d05f
    res/drawable-ldpi/close.png 0xb8423855
    res/drawable-ldpi/facebook_icon.png 0x8ed2d7d0
    res/drawable-ldpi/icon.png 0xe1d52fac
    res/drawable-mdpi/icon.png 0x1db6aaad
    res/drawable-xhdpi/close.png 0x66e924fc
    res/drawable-xhdpi/icon.png 0xe8e9c8c0
    classes.dex 0x9c5a2f1f
    res/values/attrs.xml 0x4e9585f7
    com/adwhirl/assets/ad_frame.gif 0x6315d212
    com/flurry/org/codehaus/jackson/map/VERSION.txt 0xfd0113a7
    com/flurry/org/codehaus/jackson/impl/VERSION.txt 0xfd0113a7
    com/flurry/org/apache/avro/data/Json.avsc 0x6fce09b2
    lib/armeabi/libopenal.so 0x66ac40a5
    lib/armeabi/libyoyo.so 0x5a177478
    lib/armeabi-v7a/libopenal.so 0x9c3e1c3c
    lib/armeabi-v7a/libyoyo.so 0x6456a114
    lib/mips/libopenal.so 0xf7c59c81
    lib/mips/libyoyo.so 0x43b836c
    lib/mips-r2/libopenal.so 0xbf6d77d9
    lib/mips-r2/libyoyo.so 0x752efc2a
    lib/mips-r2-sf/libopenal.so 0xa78203b3
    lib/mips-r2-sf/libyoyo.so 0xd91b0fb6
    lib/x86/libopenal.so 0x3618224a
    lib/x86/libyoyo.so 0x902d7b87
    META-INF/MANIFEST.MF 0xde4307ed
    META-INF/CERT.SF 0x9c5e4599
    META-INF/CERT.RSA 0xe94d2e18
    运行截图
    VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
Translated by Keith Miller, United States
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号