VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

Language
Server load
Server Load

VirSCAN
VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

File information

Scanner results
Scanner results:0%Antivirus software(0/32)found malware!
Behavior analysis report:         Habo file analysis
Time: 2016-08-19 10:32:44 (CST)
Scanner Engine Ver Sig Ver Sig Date Scan result Time
antiy AVL SDK 3.0 1970-01-01 Found nothing 5
asquared 9.0.0.4324 9.0.0.4324 2014-07-03 Found nothing 2
avast 150725-1 4.7.4 2015-07-25 Found nothing 60
avg 2109/8133 10.0.1405 2014-11-26 Found nothing 60
baidu 2.0.1.0 4.1.3.52192 2.0.1.0 Found nothing 3
baidusd 1.0 1.0 2014-04-02 Found nothing 1
bitdefender 7.58469 7.90123 2014-12-25 Found nothing 60
clamav 19861 0.97.5 2014-12-31 Found nothing 60
drweb 5.0.2.3300 5.0.1.1 2014-12-31 Found nothing 60
fortinet 23.345, 23.345 5.1.158 2014-12-08 Found nothing 60
fprot 4.6.2.117 6.5.1.5418 2014-12-31 Found nothing 60
fsecure 2014-04-02-01 9.13 2014-04-02 Found nothing 60
gdata 25.7937 25.7937 2016-08-18 Found nothing 11
ikarus 1.06.01 V1.32.31.0 2014-12-08 Found nothing 60
jiangmin 16.0.100 1.0.0.0 2015-07-25 Found nothing 45
kaspersky 5.5.33 5.5.33 2014-04-01 Found nothing 60
kingsoft 2.1 2.1 2013-09-22 Found nothing 10
mcafee 7638 5400.1158 2014-11-30 Found nothing 60
nod32 0920 3.0.21 2014-12-23 Found nothing 60
panda 9.05.01 9.05.01 2015-07-26 Found nothing 4
pcc 11.380.07 9.500-1005 2014-12-31 Found nothing 60
qh360 1.0.1 1.0.1 1.0.1 Found nothing 7
qqphone 1.0.0.0 1.0.0.0 2014-12-09 Found nothing 60
quickheal 14.00 14.00 2015-07-25 Found nothing 2
rising 25.76.04.01 25.76.04.01 2015-07-24 Found nothing 4
sophos 5.08 3.55.0 2014-12-01 Found nothing 60
symantec 20141230.001 1.3.0.24 2014-12-30 Found nothing 60
tachyon 9.9.9 9.9.9 2013-12-27 Found nothing 8
thehacker 6.8.0.5 6.8.0.5 2015-07-23 Found nothing 6
tws 17.47.17308 1.0.2.2108 2014-12-08 Found nothing 15
vba 3.12.26.3 3.12.26.3 2014-12-31 Found nothing 60
virusbuster 15.0.985.0 5.5.2.13 2014-12-05 Found nothing 60
权限列表
许可名称 信息
com.android.launcher.permission.INSTALL_SHORTCUT 创建快捷方式
android.permission.MOUNT_UNMOUNT_FILESYSTEMS 挂载、反挂载外部文件系统
android.permission.READ_PHONE_STATE 读取电话状态
android.permission.SYSTEM_ALERT_WINDOW 显示系统窗口
android.permission.GET_TASKS 获取有关当前或最近运行的任务信息
android.permission.WRITE_SETTINGS 读写系统设置项
android.permission.WRITE_EXTERNAL_STORAGE 写外部存储器(如:SD卡)
android.permission.INTERNET 连接网络(2G或3G)
android.permission.ACCESS_WIFI_STATE 读取wifi网络状态
com.android.launcher.permission.READ_SETTINGS 读取快捷方式信息
android.permission.WAKE_LOCK 手机屏幕关闭后后台进程仍运行
android.permission.ACCESS_NETWORK_STATE 读取网络状态(2G或3G)
android.permission.CHANGE_CONFIGURATION 修改当前设置(如:本地化)
文件信息
VirSCANVirSCAN
安全评分 :
基本信息
VirSCANVirSCAN
MD5:c20729120a747988b21a3ee205019c7a
文件大小:5.58MB
上传时间: 2014-09-22 10:36:30 (CST)
包名:com.clybapp
最低运行环境:Android 2.2.x
版权:E4A
关键行为
VirSCANVirSCAN
行为描述: 跨进程写入数据
详情信息: TargetProcess = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\ge537.exe, WriteAddress = 0x00400000, Size = 0x00000400
TargetProcess = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\ge537.exe, WriteAddress = 0x00404000, Size = 0x00000e00
TargetProcess = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\ge537.exe, WriteAddress = 0x00405000, Size = 0x00000a00
TargetProcess = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\ge537.exe, WriteAddress = 0x00406000, Size = 0x00000200
TargetProcess = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\ge537.exe, WriteAddress = 0x00407000, Size = 0x00000200
TargetProcess = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\ge537.exe, WriteAddress = 0x00408000, Size = 0x00000400
TargetProcess = C:\Documents and Settings\Administrator\WinHost32.exe, WriteAddress = 0x00400000, Size = 0x00000400
TargetProcess = C:\Documents and Settings\Administrator\WinHost32.exe, WriteAddress = 0x00404000, Size = 0x00000e00
TargetProcess = C:\Documents and Settings\Administrator\WinHost32.exe, WriteAddress = 0x00405000, Size = 0x00000a00
TargetProcess = C:\Documents and Settings\Administrator\WinHost32.exe, WriteAddress = 0x00406000, Size = 0x00000200
TargetProcess = C:\Documents and Settings\Administrator\WinHost32.exe, WriteAddress = 0x00407000, Size = 0x00000200
TargetProcess = C:\Documents and Settings\Administrator\WinHost32.exe, WriteAddress = 0x00408000, Size = 0x00000400
行为描述: 设置线程上下文
详情信息: C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\ge537.exe
C:\Documents and Settings\Administrator\WinHost32.exe
行为描述: 获取TickCount值
详情信息: TickCount = 347215, SleepMilliseconds = 200.
TickCount = 357393, SleepMilliseconds = 50.
TickCount = 357471, SleepMilliseconds = 50.
TickCount = 357487, SleepMilliseconds = 50.
TickCount = 357503, SleepMilliseconds = 50.
TickCount = 357831, SleepMilliseconds = 50.
TickCount = 357878, SleepMilliseconds = 50.
TickCount = 357893, SleepMilliseconds = 50.
TickCount = 357925, SleepMilliseconds = 50.
TickCount = 357940, SleepMilliseconds = 50.
TickCount = 357956, SleepMilliseconds = 50.
TickCount = 357971, SleepMilliseconds = 50.
TickCount = 357987, SleepMilliseconds = 50.
TickCount = 358003, SleepMilliseconds = 50.
TickCount = 358034, SleepMilliseconds = 50.
行为描述: 跨进程写代码段数据
详情信息: TargetProcess = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\ge537.exe, WriteAddress = 0x00401000, Size = 0x00002c00
TargetProcess = C:\Documents and Settings\Administrator\WinHost32.exe, WriteAddress = 0x00401000, Size = 0x00002c00
行为描述: 设置特殊文件夹属性
详情信息: C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
行为描述: 修改注册表_启动项
详情信息: \REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Run\WinHost32
进程行为
VirSCANVirSCAN
行为描述: 跨进程写入数据
详情信息: TargetProcess = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\ge537.exe, WriteAddress = 0x00400000, Size = 0x00000400
TargetProcess = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\ge537.exe, WriteAddress = 0x00404000, Size = 0x00000e00
TargetProcess = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\ge537.exe, WriteAddress = 0x00405000, Size = 0x00000a00
TargetProcess = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\ge537.exe, WriteAddress = 0x00406000, Size = 0x00000200
TargetProcess = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\ge537.exe, WriteAddress = 0x00407000, Size = 0x00000200
TargetProcess = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\ge537.exe, WriteAddress = 0x00408000, Size = 0x00000400
TargetProcess = C:\Documents and Settings\Administrator\WinHost32.exe, WriteAddress = 0x00400000, Size = 0x00000400
TargetProcess = C:\Documents and Settings\Administrator\WinHost32.exe, WriteAddress = 0x00404000, Size = 0x00000e00
TargetProcess = C:\Documents and Settings\Administrator\WinHost32.exe, WriteAddress = 0x00405000, Size = 0x00000a00
TargetProcess = C:\Documents and Settings\Administrator\WinHost32.exe, WriteAddress = 0x00406000, Size = 0x00000200
TargetProcess = C:\Documents and Settings\Administrator\WinHost32.exe, WriteAddress = 0x00407000, Size = 0x00000200
TargetProcess = C:\Documents and Settings\Administrator\WinHost32.exe, WriteAddress = 0x00408000, Size = 0x00000400
行为描述: 设置线程上下文
详情信息: C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\ge537.exe
C:\Documents and Settings\Administrator\WinHost32.exe
行为描述: 获取TickCount值
详情信息: TickCount = 347215, SleepMilliseconds = 200.
TickCount = 357393, SleepMilliseconds = 50.
TickCount = 357471, SleepMilliseconds = 50.
TickCount = 357487, SleepMilliseconds = 50.
TickCount = 357503, SleepMilliseconds = 50.
TickCount = 357831, SleepMilliseconds = 50.
TickCount = 357878, SleepMilliseconds = 50.
TickCount = 357893, SleepMilliseconds = 50.
TickCount = 357925, SleepMilliseconds = 50.
TickCount = 357940, SleepMilliseconds = 50.
TickCount = 357956, SleepMilliseconds = 50.
TickCount = 357971, SleepMilliseconds = 50.
TickCount = 357987, SleepMilliseconds = 50.
TickCount = 358003, SleepMilliseconds = 50.
TickCount = 358034, SleepMilliseconds = 50.
行为描述: 跨进程写代码段数据
详情信息: TargetProcess = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\ge537.exe, WriteAddress = 0x00401000, Size = 0x00002c00
TargetProcess = C:\Documents and Settings\Administrator\WinHost32.exe, WriteAddress = 0x00401000, Size = 0x00002c00
行为描述: 设置特殊文件夹属性
详情信息: C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
行为描述: 修改注册表_启动项
详情信息: \REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Run\WinHost32
文件行为
VirSCANVirSCAN
行为描述: 创建文件
详情信息: C:\Documents and Settings\Administrator\Local Settings\Temp\~DFC2F1.tmp
C:\Documents and Settings\Administrator\Local Settings\%temp%\****.doc
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.Word\~WRF0001.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\~DFDA75.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\VBE\MSForms.exd
C:\Documents and Settings\Administrator\Application Data\Microsoft\Forms\WINWORD.box
C:\Documents and Settings\Administrator\Local Settings\Temp\~DFE4B2.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\~DFE4CC.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\ge537.exe
C:\Documents and Settings\Administrator\Application Data\Microsoft\Office\Recent\%temp%\****.doc.LNK
C:\Documents and Settings\Administrator\Application Data\Microsoft\Office\Recent\EB93A6.LNK
C:\Documents and Settings\Administrator\WinHost32.exe
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\IUKHR8T2\wpad[1].dat
C:\Documents and Settings\Administrator\Application Data\Microsoft\Office\VB11.pip
行为描述: 创建可执行文件
详情信息: C:\Documents and Settings\Administrator\Local Settings\Temp\ge537.exe
C:\Documents and Settings\Administrator\WinHost32.exe
行为描述: 覆盖已有文件
详情信息: C:\Documents and Settings\Administrator\Application Data\Microsoft\Office\Word11.pip
行为描述: 复制文件
详情信息: C:\DOCUME~1\ALLUSE~1\APPLIC~1\MICROS~1\OFFICE\DATA\OPA11.BAK ---> C:\DOCUME~1\ALLUSE~1\APPLIC~1\MICROS~1\OFFICE\DATA\opa11.dat
行为描述: 删除文件
详情信息: C:\Documents and Settings\Administrator\Local Settings\Temp\~DFC2F1.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\~DFDA75.tmp
C:\Documents and Settings\Administrator\Application Data\Microsoft\Forms\WINWORD.box
C:\Documents and Settings\Administrator\Local Settings\Temp\~DFE4CC.tmp
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\IUKHR8T2\wpad[1].dat
C:\Documents and Settings\Administrator\Local Settings\Temp\~DFE4B2.tmp
C:\Documents and Settings\Administrator\Local Settings\%temp%\****.doc
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.Word\~WRS0000.tmp
C:\Documents and Settings\Administrator\Application Data\Microsoft\Templates\~$Normal.dot
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.Word\~WRF0001.tmp
行为描述: 查找文件
详情信息: FileName = C:\Documents and Settings
FileName = C:\Documents and Settings\Administrator
FileName = C:\Documents and Settings\Administrator\Local Settings
FileName = C:\Documents and Settings\Administrator\Application Data
FileName = C:\Documents and Settings\Administrator\Application Data\Microsoft
FileName = C:\Documents and Settings\Administrator\Application Data\Microsoft\Templates
FileName = Normal
FileName = C:\Program Files\Microsoft Office 2007\Office12
FileName = C:\DOCUME~1
FileName = C:\DOCUME~1\ADMINI~1
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\VBE
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\VBE\MSForms.exd
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\ge537.exe
行为描述: 设置特殊文件夹属性
详情信息: C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
行为描述: 修改文件内容
详情信息: C:\Documents and Settings\Administrator\Local Settings\%temp%\****.doc ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\%temp%\****.doc ---> Offset = 54
C:\Documents and Settings\Administrator\Local Settings\Temp\VBE\MSForms.exd ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temp\VBE\MSForms.exd ---> Offset = 4
C:\Documents and Settings\Administrator\Local Settings\Temp\VBE\MSForms.exd ---> Offset = 8
C:\Documents and Settings\Administrator\Local Settings\Temp\VBE\MSForms.exd ---> Offset = 12
C:\Documents and Settings\Administrator\Local Settings\Temp\VBE\MSForms.exd ---> Offset = 16
C:\Documents and Settings\Administrator\Local Settings\Temp\ge537.exe ---> Offset = 0
C:\Documents and Settings\Administrator\Application Data\Microsoft\Office\Recent\%temp%\****.doc.LNK ---> Offset = 0
C:\Documents and Settings\Administrator\Application Data\Microsoft\Office\Recent\index.dat ---> Offset = 55
C:\Documents and Settings\Administrator\Application Data\Microsoft\Office\Recent\EB93A6.LNK ---> Offset = 0
C:\Documents and Settings\Administrator\Application Data\Microsoft\Office\Recent\index.dat ---> Offset = 28
C:\Documents and Settings\Administrator\Application Data\Microsoft\Office\Recent\index.dat ---> Offset = 0
C:\Documents and Settings\Administrator\WinHost32.exe ---> Offset = 0
C:\Documents and Settings\Administrator\Application Data\Microsoft\Office\VB11.pip ---> Offset = 0
网络行为
VirSCANVirSCAN
行为描述: 联网打开网址
详情信息: InternetOpenUrlA: http://**.133.40.**:128/wpad.dat, hInternet = 0x00cc0010, Flags = 0x00000010
行为描述: 连接指定站点
详情信息: InternetConnectA: ServerName = go****om, PORT = 80, UserName = , Password = , hSession = 0x00cc0004, hConnect = 0x00cc0008, Flags = 0x00000000
InternetConnectA: ServerName = **.133.40.**, PORT = 128, UserName = , Password = , hSession = 0x00cc0010, hConnect = 0x00cc0014, Flags = 0x00000010
行为描述: 打开HTTP连接
详情信息: InternetOpenA: UserAgent: Mozilla/5.0 (Windows NT 6.1; rv:24.0) Gecko/20100101 Firefox/24.0, hSession = 0x00cc0004
InternetOpenA: UserAgent: Mozilla/4.0 (compatible; MSIE 8.0; Win32; Trident/4.0), hSession = 0x00cc0010
行为描述: 建立到一个指定的套接字连接
详情信息: URL: wpad, IP: **.133.40.**:128, SOCKET = 0x000002ac
URL: go****om, IP: **.133.40.**:80, SOCKET = 0x000002b8
行为描述: 读取网络文件
详情信息: hFile = 0x00cc0018, BytesToRead =4010, BytesRead = 4010.
hFile = 0x00cc000c, BytesToRead =256, BytesRead = 256.
行为描述: 发送HTTP包
详情信息: GET /wpad.dat HTTP/1.1 Accept: */* User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Win32; Trident/4.0) Host: **.133.40.**:128
GET / HTTP/1.1 Accept: */* Content-Type: application/x-www-form-urlencoded User-Agent: Mozilla/5.0 (Windows NT 6.1; rv:24.0) Gecko/20100101 Firefox/24.0 Host: go****om Cache-Control: no-cache
行为描述: 打开HTTP请求
详情信息: HttpOpenRequestA: **.133.40.**:128/wpad.dat, hConnect = 0x00cc0014, hRequest = 0x00cc0018, Verb: GET, Referer: , Flags = 0x00000010
行为描述: 按名称获取主机地址
详情信息: GetAddrInfoW: computer
GetAddrInfoW: wpad
GetAddrInfoW: go****om
注册表行为
VirSCANVirSCAN
行为描述: 修改注册表
详情信息: \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\4080110900063D11C8EF10054038389C\Usage\VBAFiles
\REGISTRY\USER\S-*\Software\Microsoft\Office\11.0\Common\ReviewCycle\ReviewToken
\REGISTRY\USER\S-*\Software\Microsoft\Office\11.0\Word\Resiliency\DocumentRecovery\4F6A2\4F6A2
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\4080110900063D11C8EF10054038389C\Usage\WordEngWizDotFiles2
\REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{42D84CC3-5636-4BF9-8CB0-4DF7C22AD5C4}\2.0\
\REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{42D84CC3-5636-4BF9-8CB0-4DF7C22AD5C4}\2.0\FLAGS\
\REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{42D84CC3-5636-4BF9-8CB0-4DF7C22AD5C4}\2.0\0\win32\
\REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{42D84CC3-5636-4BF9-8CB0-4DF7C22AD5C4}\2.0\HELPDIR\
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\4080110900063D11C8EF10054038389C\Usage\WORDHelpFiles
\REGISTRY\USER\S-*\Software\Microsoft\Office\Common\Assistant\CurrAsstState
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\4080110900063D11C8EF10054038389C\Usage\SpellingAndGrammarFiles_2052
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings
\REGISTRY\MACHINE\SOFTWARE\Microsoft\ESENT\Process\WinHost32\DEBUG\Trace Level
\REGISTRY\USER\S-*\Software\Microsoft\VBA\6.0\Common\PropertiesWindow
\REGISTRY\USER\S-*\Software\Microsoft\VBA\6.0\Common\MainWindow
行为描述: 删除注册表键值
详情信息: \REGISTRY\USER\S-*\Software\Microsoft\Office\11.0\Word\Resiliency\StartupItems\t
\REGISTRY\USER\S-*\Software\Microsoft\Office\11.0\Word\Resiliency\StartupItems\Es
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\MSSCIPY\Keyboard Mapping Version
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\MSSCIPY\Keyboard Mapping
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyServer
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\AutoConfigURL
\REGISTRY\MACHINE\SOFTWARE\Microsoft\ESENT\Process\WinHost32\DEBUG\Trace Level
\REGISTRY\USER\S-*\Software\Microsoft\Office\11.0\Word\Resiliency\DocumentRecovery\4F6A2\4F6A2
\REGISTRY\USER\S-*\Software\Microsoft\Office\Common\Assistant\CurrAsstState
\REGISTRY\USER\S-*\Software\Microsoft\Office\11.0\Word\MTTT
行为描述: 删除注册表键
详情信息: \REGISTRY\USER\S-*\Software\Microsoft\Office\11.0\Word\Resiliency\StartupItems\
\REGISTRY\USER\S-*\Software\Microsoft\Office\11.0\Word\Resiliency\DocumentRecovery\4F6A2\
\REGISTRY\USER\S-*\Software\Microsoft\Office\11.0\Word\Resiliency\DocumentRecovery\
\REGISTRY\USER\S-*\Software\Microsoft\Office\11.0\Word\Resiliency\
行为描述: 修改注册表_启动项
详情信息: \REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Run\WinHost32
其他行为
VirSCANVirSCAN
行为描述: 创建互斥体
详情信息: Global\MTX_MSO_Formal1_S-*
Global\MTX_MSO_AdHoc1_S-*
Local\Mso97SharedDg19521108172Mutex
LocalMutex2341MSPYhld23qwe2529
mscandui20.mutexDefault
GlobalUserFileMappingEudcMSPYhld23qwe_lock_SYNCROOT
_lock_SYNCROOT
GlobalUserFileMappingEudpMSPYhld23qwe_lock_SYNCROOT
PAdministratorLx.DAT!_SYNCROOT
CfgSyncMSPYqeuir9hj_SYNCROOT
PAdministratorSx.DAT!_SYNCROOT
MSCTF.Shared.MUTEX.APH
Local\Mso97SharedDg19531108172Mutex
Local\Mso97SharedDg19541108172Mutex
OfficeAssistantStateMutex
行为描述: 隐藏指定窗口
详情信息: [Window,Class] = [,_WwB]
[Window,Class] = [,ComboLBox]
[Window,Class] = [lund,ThunderDFrame]
[Window,Class] = [,DesignerWindow]
[Window,Class] = [UserForm2,ThunderDFrame]
[Window,Class] = [,ThunderRT6Main]
[Window,Class] = [,Edit]
[Window,Class] = [,Button]
行为描述: 查找指定窗口
详情信息: NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
NtUserFindWindowEx: [Class,Window] = [MSOBALLOON,]
NtUserFindWindowEx: [Class,Window] = [MsoHelp10,]
NtUserFindWindowEx: [Class,Window] = [AgentAnim,]
NtUserFindWindowEx: [Class,Window] = [MsoHelp11,]
行为描述: 窗口信息
详情信息: Pid = 1524, Hwnd=0x130184, Text = MsoDockTop, ClassName = MsoCommandBarDock.
Pid = 1524, Hwnd=0x1201c8, Text = 格式, ClassName = MsoCommandBar.
Pid = 1524, Hwnd=0x120172, Text = 常用, ClassName = MsoCommandBar.
Pid = 1524, Hwnd=0x90260, Text = 菜单栏, ClassName = MsoCommandBar.
Pid = 1524, Hwnd=0xf01f0, Text = %temp%\****.doc, ClassName = _WwB.
Pid = 1524, Hwnd=0xe0216, Text = MSO Generic Control Container, ClassName = MsoCommandBar.
Pid = 1524, Hwnd=0x120160, Text = MSO Generic Control Container, ClassName = MsoCommandBar.
Pid = 1524, Hwnd=0xf01e6, Text = Microsoft Word 文档, ClassName = _WwG.
Pid = 1524, Hwnd=0x1001dc, Text = %temp%\****.doc - Microsoft Word, ClassName = OpusApp.
Pid = 1524, Hwnd=0x102f8, Text = 小四, ClassName = RichEdit20W.
Pid = 1524, Hwnd=0x102f6, Text = Times New Roman, ClassName = RichEdit20W.
Pid = 1524, Hwnd=0x102f4, Text = 正文, ClassName = RichEdit20W.
Pid = 1524, Hwnd=0x102f2, Text = 100%, ClassName = RichEdit20W.
Pid = 1524, Hwnd=0x202f0, Text = 键入需要帮助的问题, ClassName = RichEdit20W.
行为描述: 获取TickCount值
详情信息: TickCount = 347215, SleepMilliseconds = 200.
TickCount = 357393, SleepMilliseconds = 50.
TickCount = 357471, SleepMilliseconds = 50.
TickCount = 357487, SleepMilliseconds = 50.
TickCount = 357503, SleepMilliseconds = 50.
TickCount = 357831, SleepMilliseconds = 50.
TickCount = 357878, SleepMilliseconds = 50.
TickCount = 357893, SleepMilliseconds = 50.
TickCount = 357925, SleepMilliseconds = 50.
TickCount = 357940, SleepMilliseconds = 50.
TickCount = 357956, SleepMilliseconds = 50.
TickCount = 357971, SleepMilliseconds = 50.
TickCount = 357987, SleepMilliseconds = 50.
TickCount = 358003, SleepMilliseconds = 50.
TickCount = 358034, SleepMilliseconds = 50.
行为描述: 打开事件
详情信息: MSPY Non-PC softkbd
CTF.ThreadMIConnectionEvent.000007F0.00000000.0000001E
CTF.ThreadMarshalInterfaceEvent.000007F0.00000000.0000001E
CTF.ThreadMIConnectionEvent.000007F0.00000000.0000001F
CTF.ThreadMarshalInterfaceEvent.000007F0.00000000.0000001F
MSCTF.SendReceiveConection.Event.APH.IC
MSCTF.SendReceive.Event.APH.IC
HookSwitchHookEnabledEvent
AtlTraceModuleManager_ProcessAddedStatic3
CTF.ThreadMIConnectionEvent.000007F0.00000000.00000020
CTF.ThreadMarshalInterfaceEvent.000007F0.00000000.00000020
\SECURITY\LSA_AUTHENTICATION_INITIALIZED
Global\SvcctrlStartEvent_A3752DX
\INSTALLATION_SECURITY_HOLD
Global\crypt32LogoffEvent
行为描述: 枚举窗口
详情信息: N/A
行为描述: 可执行文件签名信息
详情信息: C:\Documents and Settings\Administrator\Local Settings\Temp\ge537.exe(签名验证: 未通过)
C:\Documents and Settings\Administrator\WinHost32.exe(签名验证: 未通过)
行为描述: 调用Sleep函数
详情信息: [1]: MilliSeconds = 200.
[2]: MilliSeconds = 200.
[3]: MilliSeconds = 200.
[4]: MilliSeconds = 200.
[5]: MilliSeconds = 200.
[6]: MilliSeconds = 200.
[7]: MilliSeconds = 200.
[8]: MilliSeconds = 200.
[9]: MilliSeconds = 200.
[10]: MilliSeconds = 200.
[1]: MilliSeconds = 60000.
[2]: MilliSeconds = 60000.
[3]: MilliSeconds = 60000.
[4]: MilliSeconds = 60000.
[5]: MilliSeconds = 60000.
行为描述: 创建事件对象
详情信息: EventName = MSPY Non-PC softkbd
EventName = Global\userenv: User Profile setup event
EventName = MSCTF.SendReceive.Event.ABF.IC
EventName = MSCTF.SendReceiveConection.Event.ABF.IC
EventName = DINPUTWINMM
EventName = Global\crypt32LogoffEvent
行为描述: 可执行文件MD5
详情信息: C:\Documents and Settings\Administrator\Local Settings\Temp\ge537.exe ---> 19d360946bffa9b52662888f0524e3d5
C:\Documents and Settings\Administrator\WinHost32.exe ---> 19d360946bffa9b52662888f0524e3d5
行为描述: 打开互斥体
详情信息: Global\MTX_MSO_Formal1_S-*
Global\MTX_MSO_AdHoc1_S-*
Local\Mso97SharedDg19521108172Mutex
Local\Mso97SharedDg19531108172Mutex
Local\Mso97SharedDg19541108172Mutex
OfficeAssistantStateMutex
ShimCacheMutex
Local\_!MSFTHISTORY!_
Local\c:!documents and settings!administrator!local settings!temporary internet files!content.ie5!
Local\c:!documents and settings!administrator!cookies!
Local\c:!documents and settings!administrator!local settings!history!history.ie5!
Local\WininetStartupMutex
Local\WininetConnectionMutex
Local\WininetProxyRegistryMutex
RasPbFile
Activities
VirSCANVirSCAN
活动名 类型
com.e4a.runtime.android.StartActivity android.intent.action.MAIN
com.e4a.runtime.android.StartActivity android.intent.category.DEFAULT
com.e4a.runtime.android.StartActivity android.intent.category.LAUNCHER
com.e4a.runtime.android.mainActivity android.intent.action.MAIN
com.e4a.runtime.android.mainActivity android.intent.category.DEFAULT
com.e4a.runtime.components.impl.android.Ok百度视频类库.VideoViewPlayingActivity android.intent.action.VIEW
com.e4a.runtime.components.impl.android.Ok百度视频类库.VideoViewPlayingActivity android.intent.category.DEFAULT
com.e4a.runtime.components.impl.android.Ok百度视频类库.VideoViewPlayingActivity android.intent.category.BROWSABLE
com.e4a.runtime.components.impl.android.Ok百度视频类库.VideoViewPlayingActivity2 android.intent.action.VIEW
com.e4a.runtime.components.impl.android.Ok百度视频类库.VideoViewPlayingActivity2 android.intent.category.DEFAULT
com.e4a.runtime.components.impl.android.Ok百度视频类库.VideoViewPlayingActivity2 android.intent.category.BROWSABLE
com.e4a.runtime.components.impl.android.Ok百度视频类库.VideoViewPlayingActivity4 android.intent.action.VIEW
com.e4a.runtime.components.impl.android.Ok百度视频类库.VideoViewPlayingActivity4 android.intent.category.DEFAULT
com.e4a.runtime.components.impl.android.Ok百度视频类库.VideoViewPlayingActivity4 android.intent.category.BROWSABLE
危险函数
VirSCANVirSCAN
函数名称 信息
HttpClient;->execute 请求远程服务器
java/net/URL;->openConnection 连接URL
java/net/HttpURLConnection;->connect 连接URL
TelephonyManager;->getDeviceId 搜集用户手机IMEI码、电话号码、系统版本号等信息
LocationManager;->getLastKnownLocation 获取地址位置
权限列表
VirSCANVirSCAN
许可名称 信息
com.android.launcher.permission.INSTALL_SHORTCUT 创建快捷方式
android.permission.MOUNT_UNMOUNT_FILESYSTEMS 挂载、反挂载外部文件系统
android.permission.READ_PHONE_STATE 读取电话状态
android.permission.SYSTEM_ALERT_WINDOW 显示系统窗口
android.permission.GET_TASKS 获取有关当前或最近运行的任务信息
android.permission.WRITE_SETTINGS 读写系统设置项
android.permission.WRITE_EXTERNAL_STORAGE 写外部存储器(如:SD卡)
android.permission.INTERNET 连接网络(2G或3G)
android.permission.ACCESS_WIFI_STATE 读取wifi网络状态
com.android.launcher.permission.READ_SETTINGS 读取快捷方式信息
android.permission.WAKE_LOCK 手机屏幕关闭后后台进程仍运行
android.permission.ACCESS_NETWORK_STATE 读取网络状态(2G或3G)
android.permission.CHANGE_CONFIGURATION 修改当前设置(如:本地化)
文件列表
VirSCANVirSCAN
文件名 校验码
META-INF/MANIFEST.MF 0xa4955223
META-INF/YUNBO.SF 0x18f2793f
META-INF/YUNBO.RSA 0x9a501fa5
assets/abc_ic_ab_back_mtrl_am_alpha.png 0xd92f8b09
assets/abc_ic_search_api_mtrl_alpha.png 0x5d3ec086
assets/bg_welcome2.png 0xcbb3d4e1
assets/bjk.png 0x1846c135
assets/bjt.png 0x840a0d27
assets/common_menu_icon_arrow.png 0x29872ddd
assets/ic_clear_all.png 0x72a1602a
assets/ic_collection.png 0x82f4f3ce
assets/ic_history.png 0x971ad5be
assets/ic_launcher.png 0xaf5535d
assets/ic_menu.png 0x87505834
assets/ic_movie.png 0x1005bbf2
assets/ic_refresh.png 0xecb75a24
assets/ic_search.png 0xb44508e7
assets/ic_send.png 0xeaa2a1a6
assets/ic_settings.png 0x3df8cb15
assets/ic_sousuo.png 0xf012e004
assets/iv_movie.png 0x3a069f87
assets/mzsm.txt 0x781d9007
assets/srkbj.png 0xfadccd61
assets/zhibo.txt 0x477accd6
res/drawable/ad_indicator_selected.png 0x3c90412a
res/drawable/bg_default.png 0xc5d0508b
res/drawable/bg_h_loading.png 0xa1c51331
res/drawable/bkg.9.png 0x6e530870
res/drawable/btn_style_alert_dialog_button.xml 0xaf2a6653
res/drawable/btn_style_alert_dialog_cancel.xml 0xe69cb350
res/drawable/btn_style_alert_dialog_special.xml 0x2760728a
res/drawable/caidan_btn_style.xml 0xe7d7fc0b
res/drawable/caidian_lie_style.xml 0xa3e3b0d5
res/drawable/caidian_lies_style.xml 0x3db6e9fa
res/drawable/e4alistview_new_message.png 0x1cdc5409
res/drawable/emoticon_pager_select_normal.png 0xd4b3274c
res/drawable/fancircle_banner_cover.png 0x635e2d55
res/drawable/hou.png 0x356ecd7c
res/drawable/icon.png 0xaf5535d
res/drawable/moren.png 0x8a1f4b00
res/drawable/next_btn_style.xml 0xd51ffd05
res/drawable/ok_win10.xml 0xbd4b47d8
res/drawable/ound_easyicon.png 0x9d7c819f
res/drawable/pause_btn_style.xml 0x712d9988
res/drawable/play_btn_style.xml 0xe3869317
res/drawable/player_landscape_more_normal.png 0xcf66ec96
res/drawable/player_landscape_more_press.png 0x38397897
res/drawable/pre_btn_style.xml 0x116ba123
res/drawable/qcloud_player_icon_audio_vol.png 0x73be6b62
res/drawable/qcloud_player_icon_brightness.png 0x3e7ba87b
res/drawable/qian.png 0xf69d578
res/drawable/seekbar_define_style.xml 0xf4173e7e
res/drawable/seekbar_thumb.xml 0x1d05d596
res/drawable/vive_yuanxing.xml 0xed764e58
res/drawable/zidingyi_anniu_style.xml 0x45f030a1
res/drawable/zidingyi_anniu_style1.xml 0xd6ef4fdb
res/drawable/zidingyi_anniu_style2.xml 0x470ce6a3
res/layout/canduanxiang.xml 0xce5c0f09
res/layout/controllerplayinging.xml 0x3bae56c6
res/layout/controllerplayingok.xml 0x26bd465d
res/layout/loading_dialog.xml 0xe3fa3c91
AndroidManifest.xml 0xf2087c96
resources.arsc 0xf6e9a51d
res/drawable-hdpi/cyberplayer_listbtn_normal.png 0xa2be03dc
res/drawable-hdpi/cyberplayer_listbtn_pressed.png 0x21de95cb
res/drawable-hdpi/cyberplayer_next_play.png 0x4dbc08ae
res/drawable-hdpi/cyberplayer_next_play_disable.png 0xd9509e6a
res/drawable-hdpi/cyberplayer_next_play_pressed.png 0xecd2fb3a
res/drawable-hdpi/cyberplayer_play_media.png 0x7825fccf
res/drawable-hdpi/cyberplayer_play_media_disable.png 0xd06ad4ea
res/drawable-hdpi/cyberplayer_play_media_pressed.png 0x754abc4d
res/drawable-hdpi/cyberplayer_retreat_media.png 0xc1863e71
res/drawable-hdpi/cyberplayer_retreat_media_disable.png 0x105d69ea
res/drawable-hdpi/cyberplayer_retreat_media_pressed.png 0x107d406d
res/drawable-hdpi/cyberplayer_seekbar_background.png 0x470141ee
res/drawable-hdpi/cyberplayer_seekbar_background_normal.9.png 0xb682f96c
res/drawable-hdpi/cyberplayer_seekbar_background_process.9.png 0x525e50fe
res/drawable-hdpi/cyberplayer_seekbar_background_sound_normal.9.png 0xf670f95b
res/drawable-hdpi/cyberplayer_seekbar_background_sound_process.9.png 0x5e8b1ec9
res/drawable-hdpi/cyberplayer_seekbar_cache.png 0x273eb0ec
res/drawable-hdpi/cyberplayer_seekbar_normal.png 0x60b412f3
res/drawable-hdpi/cyberplayer_seekbar_ratio.png 0x8ec16bd1
res/drawable-hdpi/cyberplayer_seekbar_ratio_white.png 0xa7a8ded9
res/drawable-hdpi/cyberplayer_stop_media.png 0x6395a790
res/drawable-hdpi/cyberplayer_stop_media_disable.png 0xbaafc338
res/drawable-hdpi/cyberplayer_stop_media_pressed.png 0x520b1252
res/drawable-hdpi/cyberplayer_subtitle_setting.png 0xdd3621e6
res/drawable-hdpi/cyberplayer_subtitle_setting_disable.png 0xcb77113f
res/drawable-hdpi/cyberplayer_subtitle_setting_pressed.png 0x9a0a6625
res/drawable-hdpi/cyberplayer_switch_subtitle.png 0xe91d219b
res/drawable-hdpi/cyberplayer_switch_subtitle_disable.png 0x4f852d8c
res/drawable-hdpi/cyberplayer_switch_subtitle_pressed.png 0xf6580cd6
res/drawable-hdpi/cyberplayer_take_snapshot.png 0xab8e7fd5
res/drawable-hdpi/cyberplayer_take_snapshot_disable.png 0x234d73be
res/drawable-hdpi/cyberplayer_take_snapshot_pressed.png 0x241205e
res/drawable-hdpi/cyberplayer_textbtn_background_blue.9.png 0x84105c73
res/drawable-hdpi/cyberplayer_titlebar_return.png 0xaafad296
res/drawable-hdpi/cyberplayer_volumebar_background.9.png 0xd4992489
res/drawable-hdpi/ic_episode_titlebar_videoplayer.png 0xc4f1ae6b
res/drawable-hdpi/ic_episode_titlebar_videoplayer_disable.png 0xaba89ad2
res/drawable-hdpi/ic_episode_titlebar_videoplayer_pressed.png 0x4b8d08e3
res/drawable-hdpi/ic_next_play.png 0x719162df
res/drawable-hdpi/ic_next_play_pressed.png 0x1da89f5
res/drawable-hdpi/ic_play_media.png 0xe1efa842
res/drawable-hdpi/ic_play_media_disable.png 0xd06ad4ea
res/drawable-hdpi/ic_play_media_pressed.png 0x369158f9
res/drawable-hdpi/ic_retreat_media.png 0x62ad09c7
res/drawable-hdpi/ic_retreat_media_disable.png 0x105d69ea
res/drawable-hdpi/ic_retreat_media_pressed.png 0x9e62fb86
res/drawable-hdpi/ic_stop_media.png 0x5e106da4
res/drawable-hdpi/ic_stop_media_pressed.png 0x101fb9db
res/drawable-hdpi/ic_zoom_in_btn_videoplayer.png 0x986da792
res/drawable-hdpi/ic_zoom_in_btn_videoplayer_disable.png 0x590e0a34
res/drawable-hdpi/ic_zoom_in_btn_videoplayer_pressed.png 0xea9b5ca1
res/drawable-hdpi/ic_zoom_out_btn_videoplayer.png 0xa25660f0
res/drawable-hdpi/ic_zoom_out_btn_videoplayer_disable.png 0x1489a84c
res/drawable-hdpi/ic_zoom_out_btn_videoplayer_pressed.png 0x722558a6
res/drawable-xhdpi/bookmark_expand_icon.png 0x6639221b
res/drawable-xhdpi/bookmark_icon_folder.png 0xae8b5d6b
res/drawable-xhdpi/bookmark_unexpand_icon.png 0xf6e40be6
res/drawable-xhdpi/btn_style_alert_dialog_button_normal.9.png 0x19f80729
res/drawable-xhdpi/btn_style_alert_dialog_button_pressed.9.png 0xca61388e
res/drawable-xhdpi/btn_style_alert_dialog_cancel_normal.9.png 0x2baa5f01
res/drawable-xhdpi/btn_style_alert_dialog_special_normal.9.png 0xfb7979e3
res/drawable-xhdpi/btn_style_alert_dialog_special_pressed.9.png 0x4d13cbda
res/drawable-xhdpi/download_bookmark_toolbar_delete.png 0x3a7249be
res/drawable-xhdpi/download_toolbar_backward.png 0xa3e23cfd
res/drawable-xhdpi/ic_action_search.png 0x3294aee3
res/drawable-xhdpi/menu_exit.png 0x2983d8b8
res/drawable-xhdpi/mo_shang.png 0xf1f9fdba
res/drawable-xhdpi/mo_xia.png 0x6b9aa78a
res/drawable-xhdpi/mo_zhong.png 0x7694836b
res/drawable-xhdpi/ok_win10_1.png 0x3f2da75e
res/drawable-xhdpi/ok_win10_10.png 0xf1b2f71e
res/drawable-xhdpi/ok_win10_11.png 0xbb91fe35
res/drawable-xhdpi/ok_win10_12.png 0x8e59419e
res/drawable-xhdpi/ok_win10_13.png 0x583476b6
res/drawable-xhdpi/ok_win10_14.png 0x7e6d87da
res/drawable-xhdpi/ok_win10_15.png 0x9c5fd291
res/drawable-xhdpi/ok_win10_16.png 0xda091058
res/drawable-xhdpi/ok_win10_17.png 0xabd11b0b
res/drawable-xhdpi/ok_win10_18.png 0x7d50df6d
res/drawable-xhdpi/ok_win10_19.png 0xedd4f106
res/drawable-xhdpi/ok_win10_2.png 0x8c31996e
res/drawable-xhdpi/ok_win10_20.png 0xc2062a6
res/drawable-xhdpi/ok_win10_21.png 0x7b988fc4
res/drawable-xhdpi/ok_win10_22.png 0xb429d99c
res/drawable-xhdpi/ok_win10_23.png 0x8e25fefa
res/drawable-xhdpi/ok_win10_24.png 0x8f107ff3
res/drawable-xhdpi/ok_win10_25.png 0x23650567
res/drawable-xhdpi/ok_win10_26.png 0x7c5fadae
res/drawable-xhdpi/ok_win10_27.png 0xf9812dff
res/drawable-xhdpi/ok_win10_28.png 0x353d2aef
res/drawable-xhdpi/ok_win10_29.png 0xd6403544
res/drawable-xhdpi/ok_win10_3.png 0x30d49bea
res/drawable-xhdpi/ok_win10_30.png 0x4fd184fe
res/drawable-xhdpi/ok_win10_31.png 0xae4fcca7
res/drawable-xhdpi/ok_win10_32.png 0x1811001f
res/drawable-xhdpi/ok_win10_33.png 0xf1647bbe
res/drawable-xhdpi/ok_win10_34.png 0xee51f09b
res/drawable-xhdpi/ok_win10_35.png 0xd4560822
res/drawable-xhdpi/ok_win10_36.png 0xf2f61c5
res/drawable-xhdpi/ok_win10_37.png 0x8c34a715
res/drawable-xhdpi/ok_win10_38.png 0x54f98dd1
res/drawable-xhdpi/ok_win10_39.png 0x5b69bac3
res/drawable-xhdpi/ok_win10_4.png 0x9042ed2
res/drawable-xhdpi/ok_win10_40.png 0x5204a48e
res/drawable-xhdpi/ok_win10_41.png 0x562d4ca1
res/drawable-xhdpi/ok_win10_42.png 0xfbb04908
res/drawable-xhdpi/ok_win10_43.png 0x96e3309e
res/drawable-xhdpi/ok_win10_44.png 0x583476b6
res/drawable-xhdpi/ok_win10_45.png 0x5af76e72
res/drawable-xhdpi/ok_win10_46.png 0xdf187d2f
res/drawable-xhdpi/ok_win10_47.png 0x72bf0510
res/drawable-xhdpi/ok_win10_48.png 0x8c77307a
res/drawable-xhdpi/ok_win10_49.png 0x7d50df6d
res/drawable-xhdpi/ok_win10_5.png 0x1e969f02
res/drawable-xhdpi/ok_win10_50.png 0x93a5e64e
res/drawable-xhdpi/ok_win10_51.png 0x84db4127
res/drawable-xhdpi/ok_win10_52.png 0xf2b97805
res/drawable-xhdpi/ok_win10_53.png 0x9816bea0
res/drawable-xhdpi/ok_win10_54.png 0xa397d7dd
res/drawable-xhdpi/ok_win10_55.png 0x8f107ff3
res/drawable-xhdpi/ok_win10_56.png 0x5819d596
res/drawable-xhdpi/ok_win10_57.png 0xb37a1fd1
res/drawable-xhdpi/ok_win10_58.png 0xd02da4a6
res/drawable-xhdpi/ok_win10_59.png 0x353d2aef
res/drawable-xhdpi/ok_win10_6.png 0xf8a63f04
res/drawable-xhdpi/ok_win10_60.png 0xf3901052
res/drawable-xhdpi/ok_win10_61.png 0xb7a2ff0e
res/drawable-xhdpi/ok_win10_62.png 0xdc899480
res/drawable-xhdpi/ok_win10_63.png 0x1811001f
res/drawable-xhdpi/ok_win10_64.png 0x89777e6b
res/drawable-xhdpi/ok_win10_65.png 0x6ec37229
res/drawable-xhdpi/ok_win10_66.png 0xd849beaa
res/drawable-xhdpi/ok_win10_67.png 0x3bad2405
res/drawable-xhdpi/ok_win10_68.png 0x726b7b15
res/drawable-xhdpi/ok_win10_69.png 0xe59993a2
res/drawable-xhdpi/ok_win10_7.png 0xb5d1e2f4
res/drawable-xhdpi/ok_win10_70.png 0xd1b58aa5
res/drawable-xhdpi/ok_win10_71.png 0xa97f2961
res/drawable-xhdpi/ok_win10_72.png 0xb79aa5b7
res/drawable-xhdpi/ok_win10_73.png 0xbec3199d
res/drawable-xhdpi/ok_win10_74.png 0xf52b6e9b
res/drawable-xhdpi/ok_win10_75.png 0xc4a38d7f
res/drawable-xhdpi/ok_win10_8.png 0xb6af5baf
res/drawable-xhdpi/ok_win10_9.png 0x90a86d8c
res/drawable-xhdpi/round_48px_1071539_easyicon.png 0xc24a6722
res/drawable-xhdpi/yanse_baise.png 0xc1df8226
res/drawable-xhdpi/yanse_baisu.png 0x1da031d2
res/drawable-xhdpi/yanse_huhuise.png 0xbf5ef6c1
res/drawable-xhdpi/yanse_huise.png 0xd8256c99
classes.dex 0xfd2e5f94
lib/armeabi/libcyberplayer-core.so 0xb98484e0
lib/armeabi/libcyberplayer.so 0x2350af82
运行截图
VirSCANVirSCAN
VirSCAN