VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

Language
Server load
Server Load

File information
File Name :30ac3aec3842e12aaaee7cba11dd413e5d268d12.apk (File not down)
File Size :1789328 byte
File Type :application/jar
MD5:7241bb831f810e67d4a6867d0f5191e7
SHA1:30ac3aec3842e12aaaee7cba11dd413e5d268d12
  • 扫描结果
  • 权限
  • 文件行为分析
  • Scanner results
    Scanner results:6%Scanner(s) (2/32)found malware!
    Behavior analysis report:         Habo file analysis
    Time: 2017-08-25 15:03:54 (CST)
    VirSCANVirSCAN
    Scanner Engine Ver Sig Ver Sig Date Scan result Time
    antiy AVL SDK 2.0 1970-01-01 Found nothing 5
    asquared 9.0.0.4799 9.0.0.4799 2015-03-08 Found nothing 2
    avast 170303-1 4.7.4 2017-03-03 Found nothing 60
    avg 2109/14366 10.0.1405 2017-08-23 Found nothing 60
    baidu 2.0.1.0 4.1.3.52192 2.0.1.0 Found nothing 6
    baidusd 1.0 1.0 2017-03-22 Found nothing 1
    bitdefender 7.58879 7.90123 2015-01-16 Found nothing 60
    clamav 23696 0.97.5 2017-08-22 Found nothing 60
    drweb 5.0.2.3300 5.0.1.1 2017-06-18 Found nothing 60
    fortinet 1.000, 51.150, 51.106, 51.128 5.4.247 2017-08-24 Found nothing 60
    fprot 4.6.2.117 6.5.1.5418 2016-02-05 Found nothing 60
    fsecure 2015-08-01-02 9.13 2015-08-01 Found nothing 60
    gdata 25.13965 25.13965 2017-08-25 Found nothing 12
    ikarus 1.06.01 V1.32.31.0 2017-08-24 Found nothing 60
    jiangmin 16.0.100 1.0.0.0 2017-08-24 Found nothing 2
    kaspersky 5.5.33 5.5.33 2014-04-01 Found nothing 60
    kingsoft 2.1 2.1 2017-08-24 Found nothing 4
    mcafee 8620 5400.1158 2017-08-12 Found nothing 60
    nod32 5964 3.0.21 2017-08-23 Found nothing 60
    panda 9.05.01 9.05.01 2017-08-24 Found nothing 4
    pcc 13.302.06 9.500-1005 2017-03-27 Found nothing 60
    qh360 1.0.1 1.0.1 1.0.1 Android mobile malware 3
    qqphone 1.0.0.0 1.0.0.0 2015-12-30 Found nothing 60
    quickheal 14.00 14.00 2017-08-24 Android.SmsPay.GEN11269 (PUP) 3
    rising 26.28.00.01 26.28.00.01 2016-07-18 Found nothing 3
    sophos 5.32 3.65.2 2016-10-10 Found nothing 60
    symantec 20151230.005 1.3.0.24 2015-12-30 Found nothing 60
    tachyon 9.9.9 9.9.9 2013-12-27 Found nothing 4
    thehacker 6.8.0.5 6.8.0.5 2017-08-20 Found nothing 2
    tws 17.47.17308 1.0.2.2108 2017-08-24 Found nothing 15
    vba 3.12.29.5 beta 3.12.29.5 beta 2017-08-24 Found nothing 60
    virusbuster 15.0.985.0 5.5.2.13 2014-12-05 Found nothing 60
    Heuristic/Suspicious Exact
    NOTICE: Results are not 100% accurate and can be reported as a false positive by some scannerswhen and if malware is found. Please judge these results for yourself.
  • 权限列表
    许可名称信息
    android.permission.INTERNET连接网络(2G或3G)
    android.permission.READ_PHONE_STATE读取电话状态
    android.permission.ACCESS_WIFI_STATE读取wifi网络状态
    android.permission.DOWNLOAD_WITHOUT_NOTIFICATION
    android.permission.CHANGE_WIFI_STATE改变WIFI连接状态
    android.permission.ACCESS_NETWORK_STATE读取网络状态(2G或3G)
    android.permission.ACCESS_COARSE_LOCATION获取粗略的位置(通过wifi、基站)
    android.permission.CHANGE_NETWORK_STATE变更网络状态
    android.permission.WRITE_EXTERNAL_STORAGE写外部存储器(如:SD卡)
    android.permission.MOUNT_UNMOUNT_FILESYSTEMS挂载、反挂载外部文件系统
    android.permission.RECEIVE_BOOT_COMPLETED接收开机启动广播
    android.permission.SYSTEM_ALERT_WINDOW显示系统窗口
    android.permission.READ_EXTERNAL_STORAGE读外部存储器(如:SD卡)
    android.permission.ACCESS_FINE_LOCATION获取精确的位置(通过GPS)
  • 文件信息
    安全评分 :
    基本信息
    MD5:7241bb831f810e67d4a6867d0f5191e7
    包名:com.mzhguqvn.mzhguq
    最低运行环境:Android 4.0.3, 4.0.4
    版权:123
    关键行为
    行为描述:跨进程写代码段数据
    详情信息:TargetProcess = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\近月汉化补丁\汉化补丁\近月少女的礼仪_v1.21.exe, WriteAddress = 0x005d2bd8, Size = 0x00000004 TargetPID = 0x00000ca4
    TargetProcess = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\近月汉化补丁\汉化补丁\近月少女的礼仪_v1.21.exe, WriteAddress = 0x005d3934, Size = 0x00000080 TargetPID = 0x00000ca4
    TargetProcess = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\近月汉化补丁\汉化补丁\近月少女的礼仪_v1.21.exe, WriteAddress = 0x005d3534, Size = 0x00000400 TargetPID = 0x00000ca4
    TargetProcess = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\近月汉化补丁\汉化补丁\近月少女的礼仪_v1.21.exe, WriteAddress = 0x005d3508, Size = 0x00000004 TargetPID = 0x00000ca4
    TargetProcess = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\近月汉化补丁\汉化补丁\近月少女的礼仪_v1.21.exe, WriteAddress = 0x005d350c, Size = 0x00000004 TargetPID = 0x00000ca4
    TargetProcess = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\近月汉化补丁\汉化补丁\近月少女的礼仪_v1.21.exe, WriteAddress = 0x005d3510, Size = 0x00000004 TargetPID = 0x00000ca4
    TargetProcess = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\近月汉化补丁\汉化补丁\近月少女的礼仪_v1.21.exe, WriteAddress = 0x005d3514, Size = 0x00000004 TargetPID = 0x00000ca4
    TargetProcess = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\近月汉化补丁\汉化补丁\近月少女的礼仪_v1.21.exe, WriteAddress = 0x005d3518, Size = 0x00000004 TargetPID = 0x00000ca4
    TargetProcess = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\近月汉化补丁\汉化补丁\近月少女的礼仪_v1.21.exe, WriteAddress = 0x005d351c, Size = 0x00000004 TargetPID = 0x00000ca4
    TargetProcess = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\近月汉化补丁\汉化补丁\近月少女的礼仪_v1.21.exe, WriteAddress = 0x005d3520, Size = 0x00000004 TargetPID = 0x00000ca4
    TargetProcess = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\近月汉化补丁\汉化补丁\近月少女的礼仪_v1.21.exe, WriteAddress = 0x005d3524, Size = 0x00000004 TargetPID = 0x00000ca4
    TargetProcess = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\近月汉化补丁\汉化补丁\近月少女的礼仪_v1.21.exe, WriteAddress = 0x005d3528, Size = 0x00000004 TargetPID = 0x00000ca4
    TargetProcess = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\近月汉化补丁\汉化补丁\近月少女的礼仪_v1.21.exe, WriteAddress = 0x005d352c, Size = 0x00000004 TargetPID = 0x00000ca4
    TargetProcess = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\近月汉化补丁\汉化补丁\近月少女的礼仪_v1.21.exe, WriteAddress = 0x005d3530, Size = 0x00000004 TargetPID = 0x00000ca4
    TargetProcess = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\近月汉化补丁\汉化补丁\近月少女的礼仪_v1.21.exe, WriteAddress = 0x005caa10, Size = 0x00000150 TargetPID = 0x00000ca4
    行为描述:设置特殊文件夹属性
    详情信息:C:\Documents and Settings\Administrator\Local Settings\Application Data\.#
    行为描述:获取TickCount值
    详情信息:TickCount = 221046, SleepMilliseconds = 250.
    TickCount = 221062, SleepMilliseconds = 250.
    TickCount = 230941, SleepMilliseconds = 4.
    TickCount = 230957, SleepMilliseconds = 4.
    TickCount = 232316, SleepMilliseconds = 4.
    TickCount = 232640, SleepMilliseconds = 250.
    TickCount = 245738, SleepMilliseconds = 4.
    TickCount = 246006, SleepMilliseconds = 100.
    进程行为
    行为描述:创建进程
    详情信息:[0x00000ca4]ImagePath = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\近月汉化补丁\汉化补丁\近月少女的礼仪_v1.21.exe, CmdLine = "C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\近月汉化补丁\汉化补丁\近月少女的礼仪_v1.21.exe"
    行为描述:创建本地线程
    详情信息:TargetProcess: 近月少女的礼仪_v1.21.exe, InheritedFromPID = 2000, ProcessID = 2612, ThreadID = 2696, StartAddress = 00405420, Parameter = 01275010
    行为描述:枚举进程
    详情信息:N/A
    行为描述:跨进程写代码段数据
    详情信息:TargetProcess = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\近月汉化补丁\汉化补丁\近月少女的礼仪_v1.21.exe, WriteAddress = 0x005d2bd8, Size = 0x00000004 TargetPID = 0x00000ca4
    TargetProcess = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\近月汉化补丁\汉化补丁\近月少女的礼仪_v1.21.exe, WriteAddress = 0x005d3934, Size = 0x00000080 TargetPID = 0x00000ca4
    TargetProcess = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\近月汉化补丁\汉化补丁\近月少女的礼仪_v1.21.exe, WriteAddress = 0x005d3534, Size = 0x00000400 TargetPID = 0x00000ca4
    TargetProcess = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\近月汉化补丁\汉化补丁\近月少女的礼仪_v1.21.exe, WriteAddress = 0x005d3508, Size = 0x00000004 TargetPID = 0x00000ca4
    TargetProcess = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\近月汉化补丁\汉化补丁\近月少女的礼仪_v1.21.exe, WriteAddress = 0x005d350c, Size = 0x00000004 TargetPID = 0x00000ca4
    TargetProcess = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\近月汉化补丁\汉化补丁\近月少女的礼仪_v1.21.exe, WriteAddress = 0x005d3510, Size = 0x00000004 TargetPID = 0x00000ca4
    TargetProcess = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\近月汉化补丁\汉化补丁\近月少女的礼仪_v1.21.exe, WriteAddress = 0x005d3514, Size = 0x00000004 TargetPID = 0x00000ca4
    TargetProcess = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\近月汉化补丁\汉化补丁\近月少女的礼仪_v1.21.exe, WriteAddress = 0x005d3518, Size = 0x00000004 TargetPID = 0x00000ca4
    TargetProcess = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\近月汉化补丁\汉化补丁\近月少女的礼仪_v1.21.exe, WriteAddress = 0x005d351c, Size = 0x00000004 TargetPID = 0x00000ca4
    TargetProcess = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\近月汉化补丁\汉化补丁\近月少女的礼仪_v1.21.exe, WriteAddress = 0x005d3520, Size = 0x00000004 TargetPID = 0x00000ca4
    TargetProcess = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\近月汉化补丁\汉化补丁\近月少女的礼仪_v1.21.exe, WriteAddress = 0x005d3524, Size = 0x00000004 TargetPID = 0x00000ca4
    TargetProcess = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\近月汉化补丁\汉化补丁\近月少女的礼仪_v1.21.exe, WriteAddress = 0x005d3528, Size = 0x00000004 TargetPID = 0x00000ca4
    TargetProcess = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\近月汉化补丁\汉化补丁\近月少女的礼仪_v1.21.exe, WriteAddress = 0x005d352c, Size = 0x00000004 TargetPID = 0x00000ca4
    TargetProcess = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\近月汉化补丁\汉化补丁\近月少女的礼仪_v1.21.exe, WriteAddress = 0x005d3530, Size = 0x00000004 TargetPID = 0x00000ca4
    TargetProcess = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\近月汉化补丁\汉化补丁\近月少女的礼仪_v1.21.exe, WriteAddress = 0x005caa10, Size = 0x00000150 TargetPID = 0x00000ca4
    文件行为
    行为描述:创建文件
    详情信息:C:\Documents and Settings\Administrator\Local Settings\Application Data\.#\MBX@A34@B3B580.###
    行为描述:创建可执行文件
    详情信息:C:\Documents and Settings\Administrator\Local Settings\Application Data\.#\MBX@A34@B3B580.###
    行为描述:查找文件
    详情信息:FileName = C:\Documents and Settings\Administrator\Local Settings\Temp
    FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%
    FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\近月汉化补丁
    FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\近月汉化补丁\汉化补丁
    FileName = C:\Documents and Settings
    FileName = C:\Documents and Settings\Administrator
    FileName = C:\Documents and Settings\Administrator\Local Settings
    FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump
    FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\近月汉化补丁\汉化补丁\近月少女的礼仪_v1.21.exe
    FileName = MBX@A34@*.###
    行为描述:删除文件
    详情信息:C:\Documents and Settings\Administrator\Local Settings\Application Data\.#\MBX@A34@B3B580.###
    行为描述:设置特殊文件夹属性
    详情信息:C:\Documents and Settings\Administrator\Local Settings\Application Data\.#
    行为描述:修改文件内容
    详情信息:C:\Documents and Settings\Administrator\Local Settings\Application Data\.#\MBX@A34@B3B580.### ---> Offset = 0
    C:\Documents and Settings\Administrator\Local Settings\Application Data\.#\MBX@A34@B3B580.### ---> Offset = 1536
    注册表行为
    行为描述:修改注册表
    详情信息:\REGISTRY\USER\S-*\Software\Microsoft\Direct3D\MostRecentApplication\Name
    其他行为
    行为描述:创建互斥体
    详情信息:DirectSound DllMain mutex (0x00000A34)
    DDrawWindowListMutex
    DDrawDriverObjectListMutex
    __DDrawExclMode__
    __DDrawCheckExclMode__
    CTF.LBES.MutexDefaultS-*
    CTF.Compart.MutexDefaultS-*
    CTF.Asm.MutexDefaultS-*
    CTF.Layouts.MutexDefaultS-*
    CTF.TMD.MutexDefaultS-*
    CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
    application_近月少女的礼仪_v1.21.exe
    MSCTF.Shared.MUTEX.IOH
    MSCTF.Shared.MUTEX.IDK
    行为描述:创建事件对象
    详情信息:EventName = DINPUTWINMM
    EventName = MSCTF.SendReceive.Event.IDK.IC
    EventName = MSCTF.SendReceiveConection.Event.IDK.IC
    行为描述:打开事件
    详情信息:HookSwitchHookEnabledEvent
    CTF.ThreadMIConnectionEvent.000007E8.00000000.00000010
    CTF.ThreadMarshalInterfaceEvent.000007E8.00000000.00000010
    MSCTF.SendReceiveConection.Event.IOH.IC
    MSCTF.SendReceive.Event.IOH.IC
    行为描述:查找指定窗口
    详情信息:NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
    NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
    行为描述:枚举窗口
    详情信息:N/A
    行为描述:获取TickCount值
    详情信息:TickCount = 221046, SleepMilliseconds = 250.
    TickCount = 221062, SleepMilliseconds = 250.
    TickCount = 230941, SleepMilliseconds = 4.
    TickCount = 230957, SleepMilliseconds = 4.
    TickCount = 232316, SleepMilliseconds = 4.
    TickCount = 232640, SleepMilliseconds = 250.
    TickCount = 245738, SleepMilliseconds = 4.
    TickCount = 246006, SleepMilliseconds = 100.
    行为描述:获取光标位置
    详情信息:CursorPos = (80,18468), SleepMilliseconds = 250.
    CursorPos = (6373,26501), SleepMilliseconds = 250.
    CursorPos = (19208,15725), SleepMilliseconds = 250.
    CursorPos = (11517,29359), SleepMilliseconds = 4.
    CursorPos = (27001,24465), SleepMilliseconds = 4.
    CursorPos = (5744,28146), SleepMilliseconds = 4.
    CursorPos = (23320,16828), SleepMilliseconds = 4.
    CursorPos = (10000,492), SleepMilliseconds = 4.
    CursorPos = (3034,11943), SleepMilliseconds = 4.
    CursorPos = (4866,5437), SleepMilliseconds = 4.
    CursorPos = (32430,14605), SleepMilliseconds = 4.
    CursorPos = (3941,154), SleepMilliseconds = 4.
    CursorPos = (331,12383), SleepMilliseconds = 4.
    CursorPos = (17460,18717), SleepMilliseconds = 4.
    CursorPos = (19757,19896), SleepMilliseconds = 4.
    行为描述:窗口信息
    详情信息:Pid = 2612, Hwnd=0x30352, Text = OK, ClassName = TButton.
    行为描述:可执行文件签名信息
    详情信息:C:\Documents and Settings\Administrator\Local Settings\Application Data\.#\MBX@A34@B3B580.###(签名验证: 未通过)
    行为描述:调用Sleep函数
    详情信息:[1]: MilliSeconds = 250.
    [2]: MilliSeconds = 4.
    [3]: MilliSeconds = 250.
    [4]: MilliSeconds = 4.
    [5]: MilliSeconds = 4.
    [6]: MilliSeconds = 4.
    [7]: MilliSeconds = 4.
    [8]: MilliSeconds = 4.
    [9]: MilliSeconds = 4.
    [10]: MilliSeconds = 4.
    [1]: MilliSeconds = 100.
    行为描述:可执行文件MD5
    详情信息:C:\Documents and Settings\Administrator\Local Settings\Application Data\.#\MBX@A34@B3B580.### ---> b32c7773d90e88e048dc0cadf1921aa4
    行为描述:打开互斥体
    详情信息:__DDrawExclMode__
    __DDrawCheckExclMode__
    ShimCacheMutex
    application_近月少女的礼仪_v1.21.exe
    行为描述:加载新释放的文件
    详情信息:Image: C:\Documents and Settings\Administrator\Local Settings\Application Data\.#\MBX@A34@B3B580.###.
    Activities
    活动名类型
    com.kaikai.live.juese.ui.AppStartActivityandroid.intent.action.MAIN
    com.kaikai.live.juese.ui.AppStartActivityandroid.intent.category.LAUNCHER
    com.kaikai.live.juese.ui.MainActivityandroid.intent.category.DEFAULT
    危险函数
    函数名称信息
    android/app/NotificationManager;->notify信息通知栏
    ContentResolver;->query读取联系人、短信等数据库
    HttpClient;->execute请求远程服务器
    TelephonyManager;->getDeviceId搜集用户手机IMEI码、电话号码、系统版本号等信息
    TelephonyManager;->getLine1Number获取手机号
    TelephonyManager;->getSimSerialNumber获取SIM序列号
    DefaultHttpClient;->execute发送HTTP请求
    java/net/URL;->openConnection连接URL
    java/net/HttpURLConnection;->connect连接URL
    LocationManager;->getLastKnownLocation获取地址位置
    ContentResolver;->delete删除短信、联系人
    权限列表
    许可名称信息
    android.permission.INTERNET连接网络(2G或3G)
    android.permission.READ_PHONE_STATE读取电话状态
    android.permission.ACCESS_WIFI_STATE读取wifi网络状态
    android.permission.DOWNLOAD_WITHOUT_NOTIFICATION
    android.permission.CHANGE_WIFI_STATE改变WIFI连接状态
    android.permission.ACCESS_NETWORK_STATE读取网络状态(2G或3G)
    android.permission.ACCESS_COARSE_LOCATION获取粗略的位置(通过wifi、基站)
    android.permission.CHANGE_NETWORK_STATE变更网络状态
    android.permission.WRITE_EXTERNAL_STORAGE写外部存储器(如:SD卡)
    android.permission.MOUNT_UNMOUNT_FILESYSTEMS挂载、反挂载外部文件系统
    android.permission.RECEIVE_BOOT_COMPLETED接收开机启动广播
    android.permission.SYSTEM_ALERT_WINDOW显示系统窗口
    android.permission.READ_EXTERNAL_STORAGE读外部存储器(如:SD卡)
    android.permission.ACCESS_FINE_LOCATION获取精确的位置(通过GPS)
    服务列表
    名称
    com.kaikai.live.juese.service.MyService
    文件列表
    文件名 校验码
    AndroidManifest.xml 0xd2f83198
    res/color/live_main_tab_item_txt_selector.xml 0xe783a563
    res/drawable-hdpi-v4/frame.png 0x51dfcaec
    res/drawable-hdpi-v4/operation_pic.jpg 0x8ace5130
    res/drawable-hdpi-v4/operation_title.png 0x93990bed
    res/drawable-hdpi-v4/shape1.xml 0x3c2d9eff
    res/drawable-hdpi-v4/shape2.xml 0x117e6c96
    res/drawable-hdpi-v4/shape3.xml 0x2683edbf
    res/drawable-hdpi-v4/wx.png 0x8e82124
    res/drawable-xhdpi-v4/ali_normal.png 0xb46bfe60
    res/drawable-xhdpi-v4/ali_pressd.png 0x439a8855
    res/drawable-xhdpi-v4/beijing.webp 0x8eb10e6b
    res/drawable-xhdpi-v4/black_pay_btn.png 0x3b1936b7
    res/drawable-xhdpi-v4/blue_pay_btn.png 0x2c7639eb
    res/drawable-xhdpi-v4/bt_playwith_bg.9.png 0xe8de87e
    res/drawable-xhdpi-v4/bt_playwith_press_bg.9.png 0x443da012
    res/drawable-xhdpi-v4/chenrendongman.webp 0xb467c67f
    res/drawable-xhdpi-v4/cililian.webp 0xb488d3f9
    res/drawable-xhdpi-v4/daoguo.webp 0x6c1d9c16
    res/drawable-xhdpi-v4/exit_btn.png 0xa0ce05e4
    res/drawable-xhdpi-v4/exit_btn2.png 0xf565b59f
    res/drawable-xhdpi-v4/fanqiang.png 0xa8612557
    res/drawable-xhdpi-v4/fasong.png 0xa46a0250
    res/drawable-xhdpi-v4/gaoqingsuyan.webp 0x52c27b0c
    res/drawable-xhdpi-v4/gaoqinzhongzi.webp 0xe3f368aa
    res/drawable-xhdpi-v4/guan.png 0xc27c6684
    res/drawable-xhdpi-v4/ic_arrow_back_white_18dp.png 0x3207d0ae
    res/drawable-xhdpi-v4/ic_camera_blue_grey_500_36dp.png 0xe1ef81fd
    res/drawable-xhdpi-v4/ic_crop_original_blue_grey_100_48dp.png 0xbd7866e9
    res/drawable-xhdpi-v4/ic_mine.png 0x8b20160b
    res/drawable-xhdpi-v4/ic_movie_blue_grey_500_36dp.png 0xf41186ed
    res/drawable-xhdpi-v4/ic_people_blue_grey_500_36dp.png 0x77625181
    res/drawable-xhdpi-v4/ic_play.png 0x496ab56c
    res/drawable-xhdpi-v4/ic_radio_blue_grey_500_36dp.png 0x4ac3baa9
    res/drawable-xhdpi-v4/kai.png 0x3a0974b4
    res/drawable-xhdpi-v4/lock.png 0xa7dac605
    res/drawable-xhdpi-v4/mei.png 0x2a756ba3
    res/drawable-xhdpi-v4/paihou.png 0xed2decab
    res/drawable-xhdpi-v4/paiqian.png 0xee2cc8bc
    res/drawable-xhdpi-v4/pay_bg.png 0x88b2a3b0
    res/drawable-xhdpi-v4/pay_box.png 0xf1ac82e1
    res/drawable-xhdpi-v4/pay_month.png 0xbc72cfc2
    res/drawable-xhdpi-v4/pay_upgrage.png 0xf6a45fff
    res/drawable-xhdpi-v4/play.png 0xe8b16cf4
    res/drawable-xhdpi-v4/qiupian.webp 0x153d8af8
    res/drawable-xhdpi-v4/shape_danmu.xml 0xddcc4084
    res/drawable-xhdpi-v4/start.jpg 0xd8805762
    res/drawable-xhdpi-v4/stop.png 0xbe428bd8
    res/drawable-xhdpi-v4/tab_bbs_n.png 0xb307ebcc
    res/drawable-xhdpi-v4/tab_bbs_p.png 0x13df5e9
    res/drawable-xhdpi-v4/tab_category_n.png 0x34eca7ea
    res/drawable-xhdpi-v4/tab_category_p.png 0x1532d75e
    res/drawable-xhdpi-v4/tab_pic_n.png 0xee1b9ff3
    res/drawable-xhdpi-v4/tab_pic_p.png 0xa93ce929
    res/drawable-xhdpi-v4/tab_try_n.png 0x2abddfcd
    res/drawable-xhdpi-v4/tab_try_p.png 0x3ec0c70
    res/drawable-xhdpi-v4/tab_vip1_n.png 0xdcfc12b1
    res/drawable-xhdpi-v4/tab_vip1_p.png 0x964cdb2f
    res/drawable-xhdpi-v4/tab_vip2_n.png 0xfa20ce45
    res/drawable-xhdpi-v4/tab_vip2_p.png 0x34e86b0d
    res/drawable-xhdpi-v4/tab_vip3_n.png 0x86babd05
    res/drawable-xhdpi-v4/tab_vip3_p.png 0xacd5c8d1
    res/drawable-xhdpi-v4/tab_vip4_n.png 0xc6acf1a3
    res/drawable-xhdpi-v4/tab_vip4_p.png 0xd6b3f64
    res/drawable-xhdpi-v4/tab_vip5_n.png 0x34c6a4a
    res/drawable-xhdpi-v4/tab_vip5_p.png 0x734947d3
    res/drawable-xhdpi-v4/tab_vip6_n.png 0x5e1ef8f
    res/drawable-xhdpi-v4/tab_vip6_p.png 0x7cb8daf0
    res/drawable-xhdpi-v4/tietu.webp 0x8f0dc556
    res/drawable-xhdpi-v4/tishi.png 0xb54a65b4
    res/drawable-xhdpi-v4/tongyan.webp 0x6cc64393
    res/drawable-xhdpi-v4/toper.png 0x2d376a0b
    res/drawable-xhdpi-v4/topsan.png 0x1d34596b
    res/drawable-xhdpi-v4/topyi.png 0x38f01df0
    res/drawable-xhdpi-v4/touhou.png 0x206dc72c
    res/drawable-xhdpi-v4/toupiao.png 0x24b2216b
    res/drawable-xhdpi-v4/touqian.png 0xcd46ca1e
    res/drawable-xhdpi-v4/vip.png 0x398c9b1e
    res/drawable-xhdpi-v4/vipba.png 0x24e225fc
    res/drawable-xhdpi-v4/wangluofenxiang.webp 0x2dac2b64
    res/drawable-xhdpi-v4/wangsu.png 0x97a92a96
    res/drawable-xhdpi-v4/wei_normal.png 0x43298b54
    res/drawable-xhdpi-v4/wei_pressd.png 0x8cbc92dd
    res/drawable-xhdpi-v4/weixinyi.png 0x4214da97
    res/drawable-xhdpi-v4/wp_b_0.xml 0xd7e65643
    res/drawable-xhdpi-v4/xunlei.webp 0x73768177
    res/drawable-xhdpi-v4/yonghu.png 0xb65aef29
    res/drawable-xhdpi-v4/zan.png 0x136cd2ac
    res/drawable-xhdpi-v4/zhifu.webp 0x3aa5e30e
    res/drawable-xhdpi-v4/zhifubaoyi.png 0x4bdf2648
    res/drawable-xhdpi-v4/zhongjibeij.webp 0x272b3080
    res/drawable-xhdpi-v4/zipai.webp 0xcf2f7d88
    res/drawable-xhdpi-v4/zizhuan_pay_btn.png 0x3ce15554
    res/drawable/btn_alipay.xml 0xa0a3138
    res/drawable/btn_close.png 0x6640bfb9
    res/drawable/btn_down.xml 0xdbfb6f67
    res/drawable/btn_weixin.xml 0x8bd5c623
    res/drawable/hy_bg.png 0x966dbb4a
    res/drawable/recylerview_drawable.xml 0xd7e65643
    res/drawable/red_shape.xml 0xf7ee2735
    res/drawable/setbar_bg.xml 0xaec248e4
    res/drawable/shape.xml 0x1da32cd
    res/drawable/shape_red.xml 0xa9de4539
    res/drawable/shape_text.xml 0xf50480b9
    res/drawable/shape_yuan.xml 0xa7a3d978
    res/drawable/shape_yuantu.xml 0xd7e65643
    res/drawable/shape_yuanyin.xml 0xd7e65643
    res/drawable/show_pay_shape.xml 0x3c129375
    res/drawable/show_pwd_shape.xml 0xc7775c3
    res/drawable/show_tishi_shape.xml 0xad249e5a
    res/drawable/text_share.xml 0x8675dcf5
    res/drawable/textview_style.xml 0x3bea72b6
    res/drawable/user_ic.png 0x5dc2db4f
    res/drawable/white_shape.xml 0x8bf5a640
    res/drawable/widget_bar_tab1.xml 0xc4bbf32c
    res/drawable/widget_bar_tab2.xml 0x7ee3ee4e
    res/drawable/widget_bar_tab3.xml 0x6b7acfa9
    res/drawable/widget_bar_tab4.xml 0xd122d2cb
    res/drawable/widget_bar_tab5.xml 0xaa6471e3
    res/drawable/widget_bar_tab6.xml 0x1b74e5ac
    res/drawable/widget_bar_vip2.xml 0xef89b0e2
    res/drawable/widget_bar_vip3.xml 0x55d1ad80
    res/drawable/widget_bar_vip4.xml 0x40488c67
    res/drawable/widget_bar_vip5.xml 0xfa109105
    res/drawable/widget_bar_vip6.xml 0xb9ed377e
    res/drawable/wx_pay_button_selecter.xml 0x171f2c4a
    res/drawable/yellow_shape.xml 0xc323ada
    res/layout-v17/comment_list.xml 0xcd61c797
    res/layout-v17/danmu_item.xml 0x4583b049
    res/layout-v17/itemss.xml 0xa30f5b78
    res/layout-v17/pay_activity.xml 0xa76539c0
    res/layout/acitivy_wxpay_dialog.xml 0x12bdafc5
    res/layout/activity_ads.xml 0x405b51c9
    res/layout/activity_app_start.xml 0xc5e1af8c
    res/layout/activity_details.xml 0xd5f6975f
    res/layout/activity_main.xml 0xde7b240b
    res/layout/activity_mianze.xml 0x67df9070
    res/layout/activity_mine.xml 0xcc029a1
    res/layout/activity_pic_list.xml 0x442f22b5
    res/layout/activity_player.xml 0x20d4129a
    res/layout/activity_tab1.xml 0xed16ff71
    res/layout/activity_vip9.xml 0x7d6d32c4
    res/layout/apk_item.xml 0x700fc282
    res/layout/banner.xml 0xd7e65643
    res/layout/comment_list.xml 0x2522a27
    res/layout/danmu_item.xml 0x680346dc
    res/layout/footer_layout.xml 0xd83b477
    res/layout/footer_layoutsa.xml 0xd7e65643
    res/layout/item.xml 0xf09ca28d
    res/layout/item_bbs.xml 0xb8397136
    res/layout/item_phb.xml 0x80a589a1
    res/layout/item_phb1.xml 0xe4ae1bd7
    res/layout/itempindao.xml 0x2e956013
    res/layout/items.xml 0x6203f42e
    res/layout/itemss.xml 0xda5315b8
    res/layout/main_footer_layout.xml 0xa42265c5
    res/layout/paihangbang.xml 0xd094422b
    res/layout/paihangbangjs.xml 0x490b8f79
    res/layout/pay_activity.xml 0xbcce7f74
    res/layout/progressbar.xml 0x51941074
    res/layout/recyclerview.xml 0x203d80e0
    res/layout/recyclerview1.xml 0xacc70bfc
    res/layout/tishi.xml 0x5735ae37
    res/layout/tool_bar.xml 0xcb8c40ce
    res/layout/video_list.xml 0x9bf459be
    res/layout/vip3.xml 0x5a8f9873
    res/layout/vip3_item.xml 0xa8914703
    res/layout/wx_scan.xml 0x2e88818a
    res/mipmap-hdpi-v4/ic_launcher.jpg 0xa3f4958c
    res/mipmap-xhdpi-v4/pay_bg.png 0xaafc9a84
    resources.arsc 0xed37beba
    classes.dex 0x93e2bb6f
    com/tencent/mm/sdk/platformtools/rep5402863540997075488.tmp 0x0
    META-INF/MANIFEST.MF 0xd7504bc5
    META-INF/CERT.SF 0x5775797d
    META-INF/CERT.RSA 0x6e4f1ce8
    META-INF/cztchannel_play028 0x0
    运行截图
    VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
Translated by Keith Miller, United States
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号