VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

Language
Server load
Server Load

VirSCAN
VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

File information

Scanner results
Scanner results:0%Scanner(s) (0/39)found malware!
Behavior analysis report:         Habo file analysis
Time: 2014-10-30 15:07:22 (CST)
Scanner Engine Ver Sig Ver Sig Date Scan result Time
ahnlab 9.9.9 9.9.9 2013-05-28 Found nothing 3
antivir 1.9.2.0 1.9.159.0 7.11.182.42 Found nothing 29
antiy 114701 AVL141003 2014-10-04 Found nothing 5
arcavir 1.0 2011 2014-05-30 Found nothing 9
asquared 9.0.0.4157 9.0.0.4157 2014-07-30 Found nothing 1
avast 141029-1 4.7.4 2014-10-29 Found nothing 35
avg 2109/7906 10.0.1405 2014-10-17 Found nothing 1
baidu 2.0.1.0 4.1.3.52192 2.0.1.0 Found nothing 3
baidusd 1.0 1.0 2014-04-02 Found nothing 1
bitdefender 7.57431 7.90123 2014-10-29 Found nothing 8
clamav 19554 0.97.5 2014-10-30 Found nothing 2
comodo 15023 5.1 2014-10-03 Found nothing 3
ctch 4.6.5 5.3.14 2013-12-01 Found nothing 1
drweb 5.0.2.3300 5.0.1.1 2014-10-30 Found nothing 58
fortinet 23.078, 23.078 5.1.158 2014-10-30 Found nothing 1
fprot 4.6.2.117 6.5.1.5418 2014-10-29 Found nothing 4
fsecure 2014-04-02-01 9.13 2014-04-02 Found nothing 5
gdata 24.3819 24.3819 2014-08-29 Found nothing 7
hauri 2.73 2.73 2014-06-13 Found nothing 1
ikarus 1.06.01 V1.32.31.0 2014-10-29 Found nothing 26
jiangmin 16.0.100 1.0.0.0 2014-07-28 Found nothing 14
kaspersky 5.5.33 5.5.33 2014-04-01 Found nothing 39
kingsoft 2.1 2.1 2013-09-22 Found nothing 53
mcafee 7520 5400.1158 2014-08-04 Found nothing 17
nod32 0436 3.0.21 2014-09-18 Found nothing 1
panda 9.05.01 9.05.01 2014-06-15 Found nothing 3
pcc 11.242.06 9.500-1005 2014-10-29 Found nothing 3
qh360 1.0.1 1.0.1 1.0.1 Found nothing 12
qqphone 1.0.0.0 1.0.0.0 2014-10-30 Found nothing 1
quickheal 14.00 14.00 2014-06-14 Found nothing 3
rising 25.17.00.04 25.17.00.04 2014-06-02 Found nothing 2
sophos 5.04 3.51.0 2014-08-05 Found nothing 13
sunbelt 3.9.2589.2 3.9.2589.2 2014-06-13 Found nothing 2
symantec 20141028.001 1.3.0.24 2014-10-28 Found nothing 1
tachyon 9.9.9 9.9.9 2013-12-27 Found nothing 3
thehacker 6.8.0.5 6.8.0.5 2014-06-12 Found nothing 2
tws 17.47.17308 1.0.2.2108 2014-06-16 Found nothing 7
vba 3.12.26.3 3.12.26.3 2014-10-29 Found nothing 9
virusbuster 15.0.952.0 5.5.2.13 2014-10-28 Found nothing 21
权限列表
许可名称 信息
android.permission.INTERNET 连接网络(2G或3G)
android.permission.READ_PHONE_STATE 读取电话状态
android.permission.ACCESS_NETWORK_STATE 读取网络状态(2G或3G)
android.permission.WRITE_EXTERNAL_STORAGE 写外部存储器(如:SD卡)
android.permission.ACCESS_WIFI_STATE 读取wifi网络状态
android.permission.SYSTEM_ALERT_WINDOW 显示系统窗口
android.permission.GET_TASKS 获取有关当前或最近运行的任务信息
com.android.launcher.permission.INSTALL_SHORTCUT 创建快捷方式
android.permission.WAKE_LOCK 手机屏幕关闭后后台进程仍运行
文件信息
VirSCANVirSCAN
安全评分 :89
基本信息
VirSCANVirSCAN
MD5:b5b6ebe5ab9a81cf9cba417d811e74ea
文件大小:5.58MB
上传时间: 2014-09-22 10:36:30 (CST)
包名:fishnoodle.snowfall_free
最低运行环境:Android 2.1.x
版权:Unknown
关键行为
VirSCANVirSCAN
行为描述: 隐藏指定窗口
详情信息: [Window,Class] = [,Afx:400000:8:10011:1900015:0]
[Window,Class] = [,BrowserFrameGripperClass]
[Window,Class] = [缩放级别,ToolbarWindow32]
[Window,Class] = [,msctls_progress32]
[Window,Class] = [,Shell Embedding]
[Window,Class] = [,Internet Explorer_Server]
[Window,Class] = [,AddressDisplay Control]
[Window,Class] = [,tooltips_class32]
[Window,Class] = [,CtrlNotifySink]
行为描述: 设置消息钩子
详情信息: C:\WINDOWS\system32\IEFRAME.dll
行为描述: 设置特殊文件夹属性
详情信息: C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\WebSlices~
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Feeds Cache
C:\Documents and Settings\Administrator\IECompatCache
行为描述: 查找指定内核模块
详情信息: lstrcmpiA: ntice.sys <------> ntkrnlpa.exe (ntice.sys)
lstrcmpiA: ntice.sys <------> hal.dll (ntice.sys)
lstrcmpiA: ntice.sys <------> KDCOM.DLL (ntice.sys)
lstrcmpiA: ntice.sys <------> BOOTVID.dll (ntice.sys)
lstrcmpiA: ntice.sys <------> ACPI.sys (ntice.sys)
lstrcmpiA: ntice.sys <------> WMILIB.SYS (ntice.sys)
lstrcmpiA: ntice.sys <------> pci.sys (ntice.sys)
lstrcmpiA: ntice.sys <------> isapnp.sys (ntice.sys)
lstrcmpiA: ntice.sys <------> compbatt.sys (ntice.sys)
lstrcmpiA: ntice.sys <------> BATTC.SYS (ntice.sys)
lstrcmpiA: ntice.sys <------> intelide.sys (ntice.sys)
lstrcmpiA: ntice.sys <------> PCIIDEX.SYS (ntice.sys)
lstrcmpiA: ntice.sys <------> MountMgr.sys (ntice.sys)
lstrcmpiA: ntice.sys <------> ftdisk.sys (ntice.sys)
lstrcmpiA: ntice.sys <------> dmload.sys (ntice.sys)
行为描述: 查找反病毒常用工具窗口
详情信息: NtUserFindWindowEx: [Class,Window] = [OLLYDBG,]
NtUserFindWindowEx: [Class,Window] = [GBDYLLO,]
NtUserFindWindowEx: [Class,Window] = [pediy06,]
NtUserFindWindowEx: [Class,Window] = [FilemonClass,]
NtUserFindWindowEx: [Class,Window] = [,File Monitor - Sysinternals: www.sysinternals.com]
NtUserFindWindowEx: [Class,Window] = [PROCMON_WINDOW_CLASS,]
NtUserFindWindowEx: [Class,Window] = [,Process Monitor - Sysinternals: www.sysinternals.com]
NtUserFindWindowEx: [Class,Window] = [RegmonClass,]
NtUserFindWindowEx: [Class,Window] = [,Registry Monitor - Sysinternals: www.sysinternals.com]
行为描述: 按名称获取主机地址
详情信息: wpad
进程行为
VirSCANVirSCAN
行为描述: 隐藏指定窗口
详情信息: [Window,Class] = [,Afx:400000:8:10011:1900015:0]
[Window,Class] = [,BrowserFrameGripperClass]
[Window,Class] = [缩放级别,ToolbarWindow32]
[Window,Class] = [,msctls_progress32]
[Window,Class] = [,Shell Embedding]
[Window,Class] = [,Internet Explorer_Server]
[Window,Class] = [,AddressDisplay Control]
[Window,Class] = [,tooltips_class32]
[Window,Class] = [,CtrlNotifySink]
行为描述: 设置消息钩子
详情信息: C:\WINDOWS\system32\IEFRAME.dll
行为描述: 设置特殊文件夹属性
详情信息: C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\WebSlices~
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Feeds Cache
C:\Documents and Settings\Administrator\IECompatCache
行为描述: 查找指定内核模块
详情信息: lstrcmpiA: ntice.sys <------> ntkrnlpa.exe (ntice.sys)
lstrcmpiA: ntice.sys <------> hal.dll (ntice.sys)
lstrcmpiA: ntice.sys <------> KDCOM.DLL (ntice.sys)
lstrcmpiA: ntice.sys <------> BOOTVID.dll (ntice.sys)
lstrcmpiA: ntice.sys <------> ACPI.sys (ntice.sys)
lstrcmpiA: ntice.sys <------> WMILIB.SYS (ntice.sys)
lstrcmpiA: ntice.sys <------> pci.sys (ntice.sys)
lstrcmpiA: ntice.sys <------> isapnp.sys (ntice.sys)
lstrcmpiA: ntice.sys <------> compbatt.sys (ntice.sys)
lstrcmpiA: ntice.sys <------> BATTC.SYS (ntice.sys)
lstrcmpiA: ntice.sys <------> intelide.sys (ntice.sys)
lstrcmpiA: ntice.sys <------> PCIIDEX.SYS (ntice.sys)
lstrcmpiA: ntice.sys <------> MountMgr.sys (ntice.sys)
lstrcmpiA: ntice.sys <------> ftdisk.sys (ntice.sys)
lstrcmpiA: ntice.sys <------> dmload.sys (ntice.sys)
行为描述: 查找反病毒常用工具窗口
详情信息: NtUserFindWindowEx: [Class,Window] = [OLLYDBG,]
NtUserFindWindowEx: [Class,Window] = [GBDYLLO,]
NtUserFindWindowEx: [Class,Window] = [pediy06,]
NtUserFindWindowEx: [Class,Window] = [FilemonClass,]
NtUserFindWindowEx: [Class,Window] = [,File Monitor - Sysinternals: www.sysinternals.com]
NtUserFindWindowEx: [Class,Window] = [PROCMON_WINDOW_CLASS,]
NtUserFindWindowEx: [Class,Window] = [,Process Monitor - Sysinternals: www.sysinternals.com]
NtUserFindWindowEx: [Class,Window] = [RegmonClass,]
NtUserFindWindowEx: [Class,Window] = [,Registry Monitor - Sysinternals: www.sysinternals.com]
行为描述: 按名称获取主机地址
详情信息: wpad
文件行为
VirSCANVirSCAN
行为描述: 写权限映射文件
详情信息: \WINDOWS\system32\zh-cn\ieframe.dll.mui
Local\UrlZonesSM_Administrator
Local\!PrivacIE!SharedMem!Counter
CiceroSharedMemDefaultS-1-5-21-1482476501-1645522239-1417001333-500
\WINDOWS\system32\zh-cn\mshtml.dll.mui
\WINDOWS\system32\zh-cn\wshom.ocx.mui
Internet Explorer Immutable Application State (00000AB0-0000-0000-0000-000000000000)
Local\SqmData_IESQM-2736_S-1-5-21-1482476501-1645522239-1417001333-500
ie_lcie_main_ab0
Isolation Process Registry (0AC0ACF7-5F9C-11E4-B5D3-000C2938259F)
Isolation Signal Registry (0AC0ACF7-5F9C-11E4-B5D3-000C2938259F, 0)
ie_lcie_LogonMedium
Local\IEFrame!GetAsyncKeyStateSharedMem!2736
ie_lcie_ConnHashTable<2736>
AtlDebugAllocator_FileMappingNameStatic3_ab0
行为描述: 设置特殊文件夹属性
详情信息: C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\WebSlices~
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Feeds Cache
C:\Documents and Settings\Administrator\IECompatCache
行为描述: 修改文件内容
详情信息: C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\IUKHR8T2\dnserrordiagoff_webOC[1]---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\dnserrordiagoff_webOC[1]---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\ErrorPageTemplate[1]---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\6P4O8QNJ\errorPageStrings[1]---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\6TLOMATB\httpErrorPagesScripts[1]---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\ErrorPageTemplate[2]---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\errorPageStrings[1]---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\6P4O8QNJ\ErrorPageTemplate[1]---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\errorPageStrings[2]---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\background_gradient[1]---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\IUKHR8T2\info_48[1]---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\bullet[1]---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\IUKHR8T2\down[1]---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\httpErrorPagesScripts[1]---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\6TLOMATB\background_gradient[1]---> Offset = 0
网络行为
VirSCANVirSCAN
行为描述: 下载文件
详情信息: URLDownloadToFileW: http://www.live.com/favicon.ico ---> C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
行为描述: 连接指定站点
详情信息: InternetConnectA: ServerName = www.x5xian.com, PORT = 80
InternetConnectA: ServerName = gg.memewg.com, PORT = 80
行为描述: 建立到一个指定的套接字连接
详情信息: 127.0.0.1:1040
127.0.0.1:1044
行为描述: 读取网络文件
详情信息: hFile = 0x0000030c, BytesToRead =10240, BytesRead = 10240.
行为描述: 打开HTTP请求
详情信息: HttpOpenRequestA: www.x5xian.com:80/, hConnect = 0x00000438
HttpOpenRequestA: www.x5xian.com:80/ok.html, hConnect = 0x00000410
HttpOpenRequestA: www.x5xian.com:80/ok22.html, hConnect = 0x00000410
HttpOpenRequestA: gg.memewg.com:80/gg.txt, hConnect = 0x00000398
HttpOpenRequestA: www.x5xian.com:80/pp.txt, hConnect = 0x00000398
HttpOpenRequestA: www.x5xian.com:80/, hConnect = 0x000002e4
HttpOpenRequestA: www.x5xian.com:80/ok2.html, hConnect = 0x000002a0
HttpOpenRequestA: www.x5xian.com:80/ok2.html, hConnect = 0x00000308
HttpOpenRequestA: www.x5xian.com:80/, hConnect = 0x000003ec
行为描述: 按名称获取主机地址
详情信息: wpad
注册表行为
VirSCANVirSCAN
行为描述: 修改注册表
详情信息: \REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings
\REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\X\BaseClass
\REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\Software\Microsoft\Windows\ShellNoRoam\MUICache\C:\WINDOWS\system32\rundll32.exe
\REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\Software\Microsoft\Internet Explorer\SQM\PIDs\PID_2736
\REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\Software\Microsoft\Internet Explorer\Recovery\Active\{0AC0ACFA-5F9C-11E4-B5D3-000C2938259F}
\REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\Software\Microsoft\CTF\TIP\{1188450c-fdab-47ae-80d8-c9633f71be64}\LanguageProfile\0x00000000\{63800dac-e7ca-4df9-9a5c-20765055488d}\Enable
\REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1EA4DBF0-3C3B-11CF-810C-00AA00389B71}\1.1\0\win32\
\REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\Software\Microsoft\Internet Explorer\Main\Window_Placement
\REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}\iexplore\Count
\REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}\iexplore\Time
\REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}\iexplore\LoadTime
\REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}\iexplore\LoadTimeCount
\REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath
\REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\0\DisplayName
\REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\0\ErrorState
行为描述: 删除注册表键
详情信息: \REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\Software\Microsoft\CTF\TIP\{1188450c-fdab-47ae-80d8-c9633f71be64}\LanguageProfile\0x00000000\{63800dac-e7ca-4df9-9a5c-20765055488d}
\REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\Software\Microsoft\CTF\TIP\{1188450c-fdab-47ae-80d8-c9633f71be64}\LanguageProfile\0x00000000
\REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\Software\Microsoft\CTF\TIP\{1188450c-fdab-47ae-80d8-c9633f71be64}\LanguageProfile
\REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\Software\Microsoft\CTF\TIP\{1188450c-fdab-47ae-80d8-c9633f71be64}
行为描述: 删除注册表键值_IE连接设置
详情信息: \REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyServer
\REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\Software\Microsoft\Windows\CurrentVersion\Internet Settings\AutoConfigURL
行为描述: 删除注册表键值
详情信息: \REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\0\Expiration
\REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\1\Expiration
其他行为
VirSCANVirSCAN
行为描述: 创建互斥体
详情信息: RasPbFile
Local\ZonesCounterMutex
Local\ZoneAttributeCacheCounterMutex
Local\ZonesCacheCounterMutex
Local\ZonesLockedCacheCounterMutex
Local\!PrivacIE!SharedMemory!Mutex
CTF.LBES.MutexDefaultS-1-5-21-1482476501-1645522239-1417001333-500
CTF.Compart.MutexDefaultS-1-5-21-1482476501-1645522239-1417001333-500
CTF.Asm.MutexDefaultS-1-5-21-1482476501-1645522239-1417001333-500
CTF.Layouts.MutexDefaultS-1-5-21-1482476501-1645522239-1417001333-500
CTF.TMD.MutexDefaultS-1-5-21-1482476501-1645522239-1417001333-500
CTF.TimListCache.FMPDefaultS-1-5-21-1482476501-1645522239-1417001333-500MUTEX.DefaultS-1-5-21-1482476501-1645522239-1417001333-500
qq炫舞仙音全功能增强版0527.exe
SHIMLIB_LOG_MUTEX
IESQM-2736_S-1-5-21-1482476501-1645522239-1417001333-500
行为描述: 内联HOOK
详情信息: C:\WINDOWS\system32\ntdll.dll--->DbgUiRemoteBreakin Offset = 0x0
C:\WINDOWS\system32\ntdll.dll--->DbgBreakPoint Offset = 0x0
行为描述: 设置消息钩子
详情信息: C:\WINDOWS\system32\IEFRAME.dll
行为描述: 查找指定窗口
详情信息: NtUserFindWindowEx: [Class,Window] = [18467-41,]
NtUserFindWindowEx: [Class,Window] = [MS_AutodialMonitor,]
NtUserFindWindowEx: [Class,Window] = [MS_WebCheckMonitor,]
NtUserFindWindowEx: [Class,Window] = [IEFrame,]
NtUserFindWindowEx: [Class,Window] = [Static,]
行为描述: 窗口信息
详情信息: Pid = 1760, Hwnd=0xd01ac, Text = 请先进入游戏,在游戏大厅点击开启, ClassName = Afx:400000:b:10011:1900015:0.
Pid = 1760, Hwnd=0xb01be, Text = 已过期,无法开启, ClassName = Button.
Pid = 1760, Hwnd=0xa0196, Text = MZ, ClassName = Afx:400000:b:10011:1900015:0.
Pid = 1760, Hwnd=0xd01e8, Text = 版本已过期,请点击下载地址下载!, ClassName = Afx:400000:b:10011:1900015:0.
Pid = 1760, Hwnd=0xa018c, Text = 炫舞仙音新官网:www.x5xian.com ← ← ← ← 点击进入, ClassName = Afx:400000:b:3e0165:1900015:0.
Pid = 1760, Hwnd=0xb01b0, Text = 版本更新提示:, ClassName = Afx:400000:b:10011:1900015:0.
Pid = 1760, Hwnd=0xa01aa, Text = 仙音最新版本:, ClassName = Afx:400000:b:10011:1900015:0.
Pid = 1760, Hwnd=0xb0184, Text = MZ, ClassName = Afx:400000:b:10011:1900015:0.
Pid = 1760, Hwnd=0xd01c2, Text = V0509, ClassName = Afx:400000:b:10011:1900015:0.
Pid = 1760, Hwnd=0xb016a, Text = 【 炫舞·仙音 】 , ClassName = 反抗拉萨尽管卢卡斯莫高窟老妈快噶.
Pid = 1760, Hwnd=0xc01a6, Text = 确定, ClassName = Button.
Pid = 1760, Hwnd=0xd01f6, Text = 此版本过期,不是最新版,请进炫舞仙音官网下载最新版本 请记住官网地址,www.x5xian.com,方便下载最新版, ClassName = Static.
Pid = 1760, Hwnd=0xc01da, Text = 提示, ClassName = #32770.
Pid = 2736, Hwnd=0x80396, Text = 导航栏, ClassName = WorkerW.
Pid = 2736, Hwnd=0x90392, Text = 地址组合控制, ClassName = ToolbarWindow32.
行为描述: 获取系统权限
详情信息: SE_LOAD_DRIVER_PRIVILEGE
行为描述: 尝试打开调试器或监控软件的驱动设备对象
详情信息: \??\SICE
\??\SIWVID
\??\NTICE
行为描述: 打开指定IE网页
详情信息: www.x5xian.com
行为描述: 隐藏指定窗口
详情信息: [Window,Class] = [,Afx:400000:8:10011:1900015:0]
[Window,Class] = [,BrowserFrameGripperClass]
[Window,Class] = [缩放级别,ToolbarWindow32]
[Window,Class] = [,msctls_progress32]
[Window,Class] = [,Shell Embedding]
[Window,Class] = [,Internet Explorer_Server]
[Window,Class] = [,AddressDisplay Control]
[Window,Class] = [,tooltips_class32]
[Window,Class] = [,CtrlNotifySink]
行为描述: 查找指定内核模块
详情信息: lstrcmpiA: ntice.sys <------> ntkrnlpa.exe (ntice.sys)
lstrcmpiA: ntice.sys <------> hal.dll (ntice.sys)
lstrcmpiA: ntice.sys <------> KDCOM.DLL (ntice.sys)
lstrcmpiA: ntice.sys <------> BOOTVID.dll (ntice.sys)
lstrcmpiA: ntice.sys <------> ACPI.sys (ntice.sys)
lstrcmpiA: ntice.sys <------> WMILIB.SYS (ntice.sys)
lstrcmpiA: ntice.sys <------> pci.sys (ntice.sys)
lstrcmpiA: ntice.sys <------> isapnp.sys (ntice.sys)
lstrcmpiA: ntice.sys <------> compbatt.sys (ntice.sys)
lstrcmpiA: ntice.sys <------> BATTC.SYS (ntice.sys)
lstrcmpiA: ntice.sys <------> intelide.sys (ntice.sys)
lstrcmpiA: ntice.sys <------> PCIIDEX.SYS (ntice.sys)
lstrcmpiA: ntice.sys <------> MountMgr.sys (ntice.sys)
lstrcmpiA: ntice.sys <------> ftdisk.sys (ntice.sys)
lstrcmpiA: ntice.sys <------> dmload.sys (ntice.sys)
行为描述: 查找反病毒常用工具窗口
详情信息: NtUserFindWindowEx: [Class,Window] = [OLLYDBG,]
NtUserFindWindowEx: [Class,Window] = [GBDYLLO,]
NtUserFindWindowEx: [Class,Window] = [pediy06,]
NtUserFindWindowEx: [Class,Window] = [FilemonClass,]
NtUserFindWindowEx: [Class,Window] = [,File Monitor - Sysinternals: www.sysinternals.com]
NtUserFindWindowEx: [Class,Window] = [PROCMON_WINDOW_CLASS,]
NtUserFindWindowEx: [Class,Window] = [,Process Monitor - Sysinternals: www.sysinternals.com]
NtUserFindWindowEx: [Class,Window] = [RegmonClass,]
NtUserFindWindowEx: [Class,Window] = [,Registry Monitor - Sysinternals: www.sysinternals.com]
异常崩溃
VirSCANVirSCAN
行为描述: 创建互斥体
详情信息: RasPbFile
Local\ZonesCounterMutex
Local\ZoneAttributeCacheCounterMutex
Local\ZonesCacheCounterMutex
Local\ZonesLockedCacheCounterMutex
Local\!PrivacIE!SharedMemory!Mutex
CTF.LBES.MutexDefaultS-1-5-21-1482476501-1645522239-1417001333-500
CTF.Compart.MutexDefaultS-1-5-21-1482476501-1645522239-1417001333-500
CTF.Asm.MutexDefaultS-1-5-21-1482476501-1645522239-1417001333-500
CTF.Layouts.MutexDefaultS-1-5-21-1482476501-1645522239-1417001333-500
CTF.TMD.MutexDefaultS-1-5-21-1482476501-1645522239-1417001333-500
CTF.TimListCache.FMPDefaultS-1-5-21-1482476501-1645522239-1417001333-500MUTEX.DefaultS-1-5-21-1482476501-1645522239-1417001333-500
qq炫舞仙音全功能增强版0527.exe
SHIMLIB_LOG_MUTEX
IESQM-2736_S-1-5-21-1482476501-1645522239-1417001333-500
行为描述: 内联HOOK
详情信息: C:\WINDOWS\system32\ntdll.dll--->DbgUiRemoteBreakin Offset = 0x0
C:\WINDOWS\system32\ntdll.dll--->DbgBreakPoint Offset = 0x0
行为描述: 设置消息钩子
详情信息: C:\WINDOWS\system32\IEFRAME.dll
行为描述: 查找指定窗口
详情信息: NtUserFindWindowEx: [Class,Window] = [18467-41,]
NtUserFindWindowEx: [Class,Window] = [MS_AutodialMonitor,]
NtUserFindWindowEx: [Class,Window] = [MS_WebCheckMonitor,]
NtUserFindWindowEx: [Class,Window] = [IEFrame,]
NtUserFindWindowEx: [Class,Window] = [Static,]
行为描述: 窗口信息
详情信息: Pid = 1760, Hwnd=0xd01ac, Text = 请先进入游戏,在游戏大厅点击开启, ClassName = Afx:400000:b:10011:1900015:0.
Pid = 1760, Hwnd=0xb01be, Text = 已过期,无法开启, ClassName = Button.
Pid = 1760, Hwnd=0xa0196, Text = MZ, ClassName = Afx:400000:b:10011:1900015:0.
Pid = 1760, Hwnd=0xd01e8, Text = 版本已过期,请点击下载地址下载!, ClassName = Afx:400000:b:10011:1900015:0.
Pid = 1760, Hwnd=0xa018c, Text = 炫舞仙音新官网:www.x5xian.com ← ← ← ← 点击进入, ClassName = Afx:400000:b:3e0165:1900015:0.
Pid = 1760, Hwnd=0xb01b0, Text = 版本更新提示:, ClassName = Afx:400000:b:10011:1900015:0.
Pid = 1760, Hwnd=0xa01aa, Text = 仙音最新版本:, ClassName = Afx:400000:b:10011:1900015:0.
Pid = 1760, Hwnd=0xb0184, Text = MZ, ClassName = Afx:400000:b:10011:1900015:0.
Pid = 1760, Hwnd=0xd01c2, Text = V0509, ClassName = Afx:400000:b:10011:1900015:0.
Pid = 1760, Hwnd=0xb016a, Text = 【 炫舞·仙音 】 , ClassName = 反抗拉萨尽管卢卡斯莫高窟老妈快噶.
Pid = 1760, Hwnd=0xc01a6, Text = 确定, ClassName = Button.
Pid = 1760, Hwnd=0xd01f6, Text = 此版本过期,不是最新版,请进炫舞仙音官网下载最新版本 请记住官网地址,www.x5xian.com,方便下载最新版, ClassName = Static.
Pid = 1760, Hwnd=0xc01da, Text = 提示, ClassName = #32770.
Pid = 2736, Hwnd=0x80396, Text = 导航栏, ClassName = WorkerW.
Pid = 2736, Hwnd=0x90392, Text = 地址组合控制, ClassName = ToolbarWindow32.
行为描述: 获取系统权限
详情信息: SE_LOAD_DRIVER_PRIVILEGE
行为描述: 尝试打开调试器或监控软件的驱动设备对象
详情信息: \??\SICE
\??\SIWVID
\??\NTICE
行为描述: 打开指定IE网页
详情信息: www.x5xian.com
行为描述: 隐藏指定窗口
详情信息: [Window,Class] = [,Afx:400000:8:10011:1900015:0]
[Window,Class] = [,BrowserFrameGripperClass]
[Window,Class] = [缩放级别,ToolbarWindow32]
[Window,Class] = [,msctls_progress32]
[Window,Class] = [,Shell Embedding]
[Window,Class] = [,Internet Explorer_Server]
[Window,Class] = [,AddressDisplay Control]
[Window,Class] = [,tooltips_class32]
[Window,Class] = [,CtrlNotifySink]
行为描述: 查找指定内核模块
详情信息: lstrcmpiA: ntice.sys <------> ntkrnlpa.exe (ntice.sys)
lstrcmpiA: ntice.sys <------> hal.dll (ntice.sys)
lstrcmpiA: ntice.sys <------> KDCOM.DLL (ntice.sys)
lstrcmpiA: ntice.sys <------> BOOTVID.dll (ntice.sys)
lstrcmpiA: ntice.sys <------> ACPI.sys (ntice.sys)
lstrcmpiA: ntice.sys <------> WMILIB.SYS (ntice.sys)
lstrcmpiA: ntice.sys <------> pci.sys (ntice.sys)
lstrcmpiA: ntice.sys <------> isapnp.sys (ntice.sys)
lstrcmpiA: ntice.sys <------> compbatt.sys (ntice.sys)
lstrcmpiA: ntice.sys <------> BATTC.SYS (ntice.sys)
lstrcmpiA: ntice.sys <------> intelide.sys (ntice.sys)
lstrcmpiA: ntice.sys <------> PCIIDEX.SYS (ntice.sys)
lstrcmpiA: ntice.sys <------> MountMgr.sys (ntice.sys)
lstrcmpiA: ntice.sys <------> ftdisk.sys (ntice.sys)
lstrcmpiA: ntice.sys <------> dmload.sys (ntice.sys)
行为描述: 查找反病毒常用工具窗口
详情信息: NtUserFindWindowEx: [Class,Window] = [OLLYDBG,]
NtUserFindWindowEx: [Class,Window] = [GBDYLLO,]
NtUserFindWindowEx: [Class,Window] = [pediy06,]
NtUserFindWindowEx: [Class,Window] = [FilemonClass,]
NtUserFindWindowEx: [Class,Window] = [,File Monitor - Sysinternals: www.sysinternals.com]
NtUserFindWindowEx: [Class,Window] = [PROCMON_WINDOW_CLASS,]
NtUserFindWindowEx: [Class,Window] = [,Process Monitor - Sysinternals: www.sysinternals.com]
NtUserFindWindowEx: [Class,Window] = [RegmonClass,]
NtUserFindWindowEx: [Class,Window] = [,Registry Monitor - Sysinternals: www.sysinternals.com]
动态列表行为
VirSCANVirSCAN
行为描述: 启动服务
详情信息: com.android.musicfx.Compatibility$Service
com.android.mms.transaction.SmsReceiverService
行为描述: 读取文件
详情信息: path:/proc/783/cmdline length:105
path:/proc/799/cmdline length:105
path:/proc/811/cmdline length:105
path:/proc/841/cmdline length:105
path:/proc/854/cmdline length:105
path:/proc/898/cmdline length:105
path:/proc/900/cmdline length:105
path:/proc/909/cmdline length:105
path:/proc/967/cmdline length:105
path:/proc/969/cmdline length:105
行为描述: 写入文件
详情信息: path:/data/data/com.android.gallery3d/shared_prefs/com.android.gallery3d_preferences.xml length:105
path:/data/data/com.android.musicfx/shared_prefs/musicfx.xml length:105
path:/data/data/com.android.gallery3d/shared_prefs/com.android.gallery3d_preferences.xml length:105
path:/data/data/fishnoodle.snowfall_free/shared_prefs/j-id.xml length:105
行为描述: 访问URL
详情信息: libcore.net.http.HttpURLConnectionImpl:http://img.ninebox.cn/dat/p/2.1.3/11.dat
行为描述: 数据泄露
详情信息: sink:File operation:write data:data:<?xml version='1.0' encoding='utf-8' standalone='yes' ?> <map> <string name="i">%157%154%165%156%171
行为描述: 类加载
详情信息: path:/system/app/PicoTts.apk
path:/system/app/MusicFX.apk
path:/system/framework/am.jar
path:/data/app/fishnoodle.snowfall_free-1.apk
行为描述: 获取用户ID
详情信息: 310260000000000
行为描述: 初始化Intent
详情信息: Ljava/lang/String;=android.service.wallpaper.LIVE_WALLPAPER_CHOOSER
行为描述: 获取设备ID
详情信息: 357242043237511
Activities
VirSCANVirSCAN
活动名 类型
UpsellActivity android.intent.action.MAIN
HowToActivity android.intent.action.MAIN
HowToActivity android.intent.category.INFO
fishnoodle.snowfall_free.m.Jsrr android.intent.action.CREATE_SHORTCUT
fishnoodle.snowfall_free.m.Jsrr android.intent.category.DEFAULT
危险函数
VirSCANVirSCAN
函数名称 信息
LocationManager;->getLastKnownLocation 获取地址位置
android/app/NotificationManager;->notify 信息通知栏
TelephonyManager;->getDeviceId 搜集用户手机IMEI码、电话号码、系统版本号等信息
HttpClient;->execute 请求远程服务器
java/net/URL;->openConnection 连接URL
java/net/URLConnection;->connect 连接URL
getRuntime 获取命令行环境
java/lang/Runtime;->exec 执行字符串命令
java/net/HttpURLConnection;->connect 连接URL
启动方式
VirSCANVirSCAN
名称 信息
fishnoodle.snowfall_free.b.Sibf 应用安装时启动服务
fishnoodle.snowfall_free.b.Sibf 网络连接改变时启动服务
fishnoodle.snowfall_free.b.Sibf 屏幕解锁启动服务
fishnoodle.snowfall_free.h.Wn 应用安装时启动服务
fishnoodle.snowfall_free.h.Wn 网络连接改变时启动服务
fishnoodle.snowfall_free.h.Wn 屏幕解锁启动服务
fishnoodle.snowfall_free.m.Wjc 应用安装时启动服务
fishnoodle.snowfall_free.m.Wjc 屏幕解锁启动服务
fishnoodle.snowfall_free.m.Wjc 网络连接改变时启动服务
fishnoodle.snowfall_free.q.Xwu 网络连接改变时启动服务
fishnoodle.snowfall_free.q.Xwu 屏幕解锁启动服务
fishnoodle.snowfall_free.q.Xwu 应用安装时启动服务
fishnoodle.snowfall_free.q.Xwu 应用卸载时启动服务
权限列表
VirSCANVirSCAN
许可名称 信息
android.permission.INTERNET 连接网络(2G或3G)
android.permission.READ_PHONE_STATE 读取电话状态
android.permission.ACCESS_NETWORK_STATE 读取网络状态(2G或3G)
android.permission.WRITE_EXTERNAL_STORAGE 写外部存储器(如:SD卡)
android.permission.ACCESS_WIFI_STATE 读取wifi网络状态
android.permission.SYSTEM_ALERT_WINDOW 显示系统窗口
android.permission.GET_TASKS 获取有关当前或最近运行的任务信息
com.android.launcher.permission.INSTALL_SHORTCUT 创建快捷方式
android.permission.WAKE_LOCK 手机屏幕关闭后后台进程仍运行
服务列表
VirSCANVirSCAN
名称
fishnoodle.snowfall_free.WallpaperService
fishnoodle.snowfall_free.DreamService
fishnoodle.snowfall_free.b.Dinw
fishnoodle.snowfall_free.h.Cv
fishnoodle.snowfall_free.m.Jnz
fishnoodle.snowfall_free.q.Chf
文件列表
VirSCANVirSCAN
文件名 校验码
META-INF/MANIFEST.MF 0x1638564
META-INF/CERT.SF 0x6eaa325c
META-INF/CERT.RSA 0x72b32033
lib/armeabi/libgl20jni.so 0xa74b1d0
lib/armeabi-v7a/libgl20jni.so 0x1e49349e
lib/mips/libgl20jni.so 0xc8bf2872
lib/x86/libgl20jni.so 0xfdef1a05
res/drawable/alltrees.png 0xfd0bd757
res/drawable/calendarview_header_background.png 0x7214852c
res/drawable/color_picker_frame.9.png 0xbf01b8d0
res/drawable/color_picker_hues.9.png 0xeefc6e74
res/drawable/color_picker_saturation.9.png 0x4df8b949
res/drawable/color_picker_saturation_bg.9.png 0xe35587f5
res/drawable/color_picker_value.9.png 0xb5e8e6e3
res/drawable/crop_frame.9.png 0x108f08df
res/drawable/fifty_percent_black.png 0xf4330dcc
res/drawable/help.png 0xa3192704
res/drawable/icon.png 0x106d4410
res/drawable/listpreferencewithicon_listitem_highlight.xml 0x5606bbc0
res/drawable/preferencecolor_swatch.png 0xf422940d
res/drawable/rotate_ccw.png 0x5bfd4994
res/drawable/rotate_cw.png 0x33ada9f9
res/drawable/skies1.png 0xe5acb9f8
res/drawable/thumbnail.png 0xee975ec8
res/drawable/twentyfive_percent_black.png 0x35a9350b
res/drawable/white_dot.png 0x31e75bd6
res/drawable-hdpi/icon.png 0x6facd959
res/drawable-mdpi/icon.png 0x18b963a4
res/drawable-xhdpi/icon.png 0xff475e6
res/drawable-xxhdpi/icon.png 0xbd907578
res/layout/baseappwidget_configurationactivity.xml 0x1ece2c34
res/layout/calendarview_calendar.xml 0xc7ef7d9a
res/layout/calendarview_header.xml 0xaadeda9e
res/layout/calendarview_item.xml 0x1768b0e8
res/layout/color_picker.xml 0x8a355ce1
res/layout/dialog_image_editor.xml 0x8766f57c
res/layout/howto.xml 0xd4d5320
res/layout/howto_landscape.xml 0xef9012de
res/layout/howto_nook.xml 0x64fab1cd
res/layout/howto_nosupport.xml 0x2bb617f1
res/layout/listpreferencewithicon_listitem.xml 0x4fc8c957
res/layout/listpreferencewithicon_listitem_23.xml 0x5be2d87f
res/layout/listpreferencewithicon_widget.xml 0xa6014c2f
res/layout/listpreferencewithicon_widget_23.xml 0x9c8de4ac
res/layout/preference_radio_widget.xml 0x87162e22
res/layout/preferencecheckboxlistwithicon_listitem.xml 0x107448b9
res/layout/preferencecheckboxlistwithicon_listitem_23.xml 0xfad790e6
res/layout/preferencecolor_layout.xml 0x46111380
res/layout/preferencecolor_layout23.xml 0x9f198912
res/layout/preferencecolor_widget.xml 0x27f259bb
res/layout/preferencecolor_widget_23.xml 0x1d7ef138
res/layout/ringtone_preview_dialog.xml 0x9b196d2c
res/layout/testactivitylayout.xml 0x99476c2
res/layout/upsell.xml 0x5622aebc
res/layout/upsell_landscape.xml 0xbf625bcb
res/layout/value_slider.xml 0x660fe267
res/layout-xlarge/dialog_image_editor.xml 0x5712fd76
res/raw/animblended_vs.glessl 0x544db297
res/raw/aoverlay_ktx.ktx 0x18baaca7
res/raw/aurora.model 0xb0621569
res/raw/aurora1_ktx.ktx 0x7be86c26
res/raw/aurora_ps.glsl 0xbc761d03
res/raw/aurora_vs.glsl 0xb7c7341c
res/raw/bg.model 0xb9fa128d
res/raw/blend_ps.glsl 0x83b1f72d
res/raw/curvedpath_ps.glsl 0x9c3be451
res/raw/curvedpath_vs.glsl 0x8727326c
res/raw/default_ps.glessl 0xadac9b0a
res/raw/depth_ps.glessl 0x55c64514
res/raw/depth_vs.glessl 0x8e8ddef2
res/raw/flakes.model 0x21608135
res/raw/lgt_color_ktx.ktx 0x2e547d88
res/raw/lgt_white_ktx.ktx 0xa679edb1
res/raw/mesh_axis.model 0xf4538822
res/raw/mesh_character.model 0x66a12d98
res/raw/mix_ps.glessl 0x6e6ff3b7
res/raw/p_snow1.tga 0xce958a1e
res/raw/p_snow2.tga 0xf70a15a3
res/raw/p_snow3.tga 0xdfa57ab4
res/raw/particle_basic_ps.glessl 0x45a3d38e
res/raw/particle_basic_vs.glessl 0x2781c85e
res/raw/plane_16x16.model 0x6c1ec88
res/raw/plane_2x2.model 0x36febe2c
res/raw/plane_rendertarget.model 0xe866ea91
res/raw/points_ps.glessl 0x677ee9b9
res/raw/points_vs.glessl 0x6dcce581
res/raw/post_blur_3_ps.glsl 0x5cb4f0c5
res/raw/post_blur_3_vs.glsl 0x55dbe254
res/raw/post_blur_5_ps.glsl 0x6ade381f
res/raw/post_blur_5_vs.glsl 0xd6ba03f2
res/raw/post_blur_7_ps.glsl 0x38a5175a
res/raw/post_blur_7_vs.glsl 0xae1904c1
res/raw/post_blurpass_vs.glsl 0xe7214643
res/raw/post_pass_vs.glsl 0xa545ad2f
res/raw/post_rays_radial_vs.glsl 0x10d04d05
res/raw/post_rays_rgba_ps.glsl 0x274c7923
res/raw/santa.model 0x588226ca
res/raw/santa_t.tga 0xad7f8bbf
res/raw/santa_t_ktx.ktx 0x877038c0
res/raw/scroll_vs.glessl 0x3c655219
res/raw/simple_ps.glessl 0x1e0a5eb1
res/raw/simple_vs.glessl 0x63221b5
res/raw/skin_vsi.glsl 0x93cda215
res/raw/streak.model 0x8f4670b5
res/raw/streak_ktx.ktx 0x109ce0e5
res/raw/tint_ps.glessl 0x45a3d38e
res/raw/tree1.model 0x71c62512
res/raw/tree1_l.model 0x42eceb81
res/raw/tree2.model 0x3c0f6027
res/raw/tree2_l.model 0xc6c3fb80
res/raw/tree3.model 0xe770b96
res/raw/tree3_l.model 0x192e83f6
res/raw/treeback.model 0xc9763dd4
res/raw/treeback_l.model 0xc66d94f2
res/raw/typewriter_alpha_ps.glessl 0xcba247a8
res/raw/typewriter_ps.glessl 0xa07caa8f
res/raw/typewriter_vs.glessl 0xf25e2c62
res/xml/dream.xml 0xade11c1a
res/xml/settings.xml 0x7339f740
res/xml/wallpaper.xml 0x73346f4c
AndroidManifest.xml 0x81b6978f
classes.dex 0x70248d6a
resources.arsc 0xdbf328a1
运行截图
VirSCANVirSCAN
VirSCAN