VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.
4, If your browser cannot upload files, please download VirSCAN uploader to upload.

Language
Server load
Server Load

VirSCAN
VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

File information

Scanner results
Scanner results:0%Antivirus software(0/32)found malware!
Behavior analysis report:         Habo file analysis
Time: 2015-07-08 15:27:47 (CST)
Scanner Engine Ver Sig Ver Sig Date Scan result Time
antiy AVL SDK 3.0 1970-01-01 Found nothing 5
asquared 9.0.0.4324 9.0.0.4324 2014-07-03 Found nothing 1
avast 141231-0 4.7.4 2014-12-31 Found nothing 48
avg 2109/8133 10.0.1405 2014-11-26 Found nothing 6
baidu 2.0.1.0 4.1.3.52192 2.0.1.0 Found nothing 5
baidusd 1.0 1.0 2014-04-02 Found nothing 1
bitdefender 7.58469 7.90123 2014-12-25 Found nothing 1
clamav 19745 0.97.5 2014-12-07 Found nothing 1
drweb 5.0.2.3300 5.0.1.1 2014-12-31 Found nothing 58
fortinet 23.345, 23.345 5.1.158 2014-12-08 Found nothing 1
fprot 4.6.2.117 6.5.1.5418 2014-12-31 Found nothing 3
fsecure 2014-04-02-01 9.13 2014-04-02 Found nothing 11
gdata 25.2410 25.2410 2015-07-07 Found nothing 9
ikarus 1.06.01 V1.32.31.0 2014-12-08 Found nothing 13
jiangmin 16.0.100 1.0.0.0 2014-08-20 Found nothing 37
kaspersky 5.5.33 5.5.33 2014-04-01 Found nothing 45
kingsoft 2.1 2.1 2013-09-22 Found nothing 6
mcafee 7638 5400.1158 2014-11-30 Found nothing 37
nod32 0920 3.0.21 2014-12-23 Found nothing 4
panda 9.05.01 9.05.01 2014-12-31 Found nothing 5
pcc 11.380.07 9.500-1005 2014-12-31 Found nothing 2
qh360 1.0.1 1.0.1 1.0.1 Found nothing 12
qqphone 1.0.0.0 1.0.0.0 2014-12-09 Found nothing 1
quickheal 14.00 14.00 2014-12-31 Found nothing 3
rising 25.46.06.04 25.46.06.04 2014-12-28 Found nothing 3
sophos 5.08 3.55.0 2014-12-01 Found nothing 6
symantec 20141230.001 1.3.0.24 2014-12-30 Found nothing 1
tachyon 9.9.9 9.9.9 2013-12-27 Found nothing 6
thehacker 6.8.0.5 6.8.0.5 2014-12-29 Found nothing 2
tws 17.47.17308 1.0.2.2108 2014-12-08 Found nothing 13
vba 3.12.26.3 3.12.26.3 2014-12-31 Found nothing 25
virusbuster 15.0.985.0 5.5.2.13 2014-12-05 Found nothing 43
权限列表
许可名称 信息
android.permission.WAKE_LOCK 手机屏幕关闭后后台进程仍运行
android.permission.INTERNET 连接网络(2G或3G)
android.permission.ACCESS_NETWORK_STATE 读取网络状态(2G或3G)
android.permission.ACCESS_WIFI_STATE 读取wifi网络状态
android.permission.WRITE_EXTERNAL_STORAGE 写外部存储器(如:SD卡)
文件信息
VirSCANVirSCAN
安全评分 :
基本信息
VirSCANVirSCAN
MD5:58b33e2ec5aa92a5f8b6b1af7e5d6589
文件大小:5.58MB
上传时间: 2014-09-22 10:36:30 (CST)
包名:com.alexander.jq
最低运行环境:Android 2.2.x
版权:
关键行为
VirSCANVirSCAN
行为描述: 写权限映射文件
详情信息: CiceroSharedMemDefaultS-1-5-21-1482476501-1645522239-1417001333-500
\WINDOWS\system32\zh-cn\ieframe.dll.mui
Local\UrlZonesSM_Administrator
Local\!PrivacIE!SharedMem!Counter
\WINDOWS\system32\zh-cn\mshtml.dll.mui
MSCTF.MarshalInterface.FileMap.AOJ..NNMFF
MSCTF.MarshalInterface.FileMap.AOJ.B.NNMFF
MSCTF.MarshalInterface.FileMap.AOJ.C.NNMFF
MSCTF.MarshalInterface.FileMap.AOJ.D.NNMFF
MSCTF.MarshalInterface.FileMap.AOJ.E.NNMFF
MSCTF.MarshalInterface.FileMap.AOJ.F.NNMFF
MSCTF.MarshalInterface.FileMap.AOJ.G.NNMFF
MSCTF.MarshalInterface.FileMap.AOJ.H.NNMFF
MSCTF.MarshalInterface.FileMap.AOJ.I.NNMFF
MSCTF.MarshalInterface.FileMap.AOJ.J.NNMFF
行为描述: 设置特殊文件夹属性
详情信息: C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
行为描述: 隐藏指定窗口
详情信息: [Window,Class] = [,Afx:10000000:8:10011:1900015:0]
[Window,Class] = [,Afx:f50000:b:10011:1900010:0]
文件行为
VirSCANVirSCAN
行为描述: 写权限映射文件
详情信息: CiceroSharedMemDefaultS-1-5-21-1482476501-1645522239-1417001333-500
\WINDOWS\system32\zh-cn\ieframe.dll.mui
Local\UrlZonesSM_Administrator
Local\!PrivacIE!SharedMem!Counter
\WINDOWS\system32\zh-cn\mshtml.dll.mui
MSCTF.MarshalInterface.FileMap.AOJ..NNMFF
MSCTF.MarshalInterface.FileMap.AOJ.B.NNMFF
MSCTF.MarshalInterface.FileMap.AOJ.C.NNMFF
MSCTF.MarshalInterface.FileMap.AOJ.D.NNMFF
MSCTF.MarshalInterface.FileMap.AOJ.E.NNMFF
MSCTF.MarshalInterface.FileMap.AOJ.F.NNMFF
MSCTF.MarshalInterface.FileMap.AOJ.G.NNMFF
MSCTF.MarshalInterface.FileMap.AOJ.H.NNMFF
MSCTF.MarshalInterface.FileMap.AOJ.I.NNMFF
MSCTF.MarshalInterface.FileMap.AOJ.J.NNMFF
行为描述: 设置特殊文件夹属性
详情信息: C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
行为描述: 修改文件内容
详情信息: C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\6TLOMATB\dnserrordiagoff_webOC[1]---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\dnserrordiagoff_webOC[1]---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\6TLOMATB\ErrorPageTemplate[2]---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\errorPageStrings[1]---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\httpErrorPagesScripts[3]---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\background_gradient[2]---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\IUKHR8T2\info_48[1]---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\bullet[2]---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\6TLOMATB\ErrorPageTemplate[3]---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\6TLOMATB\errorPageStrings[1]---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\down[1]---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\IUKHR8T2\httpErrorPagesScripts[1]---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\background_gradient[3]---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\info_48[1]---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\IUKHR8T2\bullet[1]---> Offset = 0
网络行为
VirSCANVirSCAN
行为描述: 连接指定站点
详情信息: InternetConnectA: ServerName = www.2345.com, PORT = 80
InternetConnectA: ServerName = www.qqjishu.net, PORT = 80
行为描述: 发送一个已连接的套接字数据
详情信息: SOCKET = 0x00000430, TotalSize = 762, Offset = 0, ReadSize = 512.
SOCKET = 0x00000430, TotalSize = 762, Offset = 512, ReadSize = 250.
SOCKET = 0x00000430, TotalSize = 258, Offset = 0, ReadSize = 258.
行为描述: 建立到一个指定的套接字连接
详情信息: 127.0.0.1:1032
113.108.90.53:8080
行为描述: 打开HTTP请求
详情信息: HttpOpenRequestA: www.2345.com:80/?k341739877, hConnect = 0x000004bc
HttpOpenRequestA: www.qqjishu.net:80/, hConnect = 0x00000490
注册表行为
VirSCANVirSCAN
行为描述: 修改注册表
详情信息: \REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings
行为描述: 删除注册表键值_IE连接设置
详情信息: \REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyServer
\REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\Software\Microsoft\Windows\CurrentVersion\Internet Settings\AutoConfigURL
其他行为
VirSCANVirSCAN
行为描述: 创建互斥体
详情信息: CTF.LBES.MutexDefaultS-1-5-21-1482476501-1645522239-1417001333-500
CTF.Compart.MutexDefaultS-1-5-21-1482476501-1645522239-1417001333-500
CTF.Asm.MutexDefaultS-1-5-21-1482476501-1645522239-1417001333-500
CTF.Layouts.MutexDefaultS-1-5-21-1482476501-1645522239-1417001333-500
CTF.TMD.MutexDefaultS-1-5-21-1482476501-1645522239-1417001333-500
CTF.TimListCache.FMPDefaultS-1-5-21-1482476501-1645522239-1417001333-500MUTEX.DefaultS-1-5-21-1482476501-1645522239-1417001333-500
Local\ZonesCounterMutex
Local\ZoneAttributeCacheCounterMutex
Local\ZonesCacheCounterMutex
Local\ZonesLockedCacheCounterMutex
RasPbFile
Local\!PrivacIE!SharedMemory!Mutex
MSCTF.Shared.MUTEX.AEH
MSCTF.Shared.MUTEX.AOJ
行为描述: 查找指定窗口
详情信息: NtUserFindWindowEx: [Class,Window] = [MS_AutodialMonitor,]
NtUserFindWindowEx: [Class,Window] = [MS_WebCheckMonitor,]
NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
行为描述: 隐藏指定窗口
详情信息: [Window,Class] = [,Afx:10000000:8:10011:1900015:0]
[Window,Class] = [,Afx:f50000:b:10011:1900010:0]
行为描述: 窗口信息
详情信息: Pid = 2524, Hwnd=0x1037e, Text = 添加订单, ClassName = Button(GroupBox).
Pid = 2524, Hwnd=0x1037c, Text = 添加, ClassName = Button.
Pid = 2524, Hwnd=0x10378, Text = QQ帐号:, ClassName = Afx:10000000:b:10011:1900015:0.
Pid = 2524, Hwnd=0x10376, Text = 日志, ClassName = Button(GroupBox).
Pid = 2524, Hwnd=0x10374, Text = 小号登录中.......... , ClassName = Edit.
Pid = 2524, Hwnd=0x1036c, Text = 目标列表:, ClassName = Button(GroupBox).
Pid = 2524, Hwnd=0x1036a, Text = 控制台, ClassName = Button(GroupBox).
Pid = 2524, Hwnd=0x1039c, Text = 定时读取并执行, ClassName = Button(CheckBox).
Pid = 2524, Hwnd=0x10398, Text = QQ帐号:, ClassName = Afx:10000000:b:10011:1900015:0.
Pid = 2524, Hwnd=0x10392, Text = 开始拉标签, ClassName = Button.
Pid = 2524, Hwnd=0x10390, Text = 标签id:, ClassName = Afx:10000000:b:10011:1900015:0.
Pid = 2524, Hwnd=0x1038c, Text = 单独执行, ClassName = Button.
Pid = 2524, Hwnd=0x1038a, Text = 取标签参数, ClassName = Button.
Pid = 2524, Hwnd=0x10388, Text = 自动取标签, ClassName = Button(CheckBox).
Pid = 2524, Hwnd=0x10386, Text = 保存日志, ClassName = Button(CheckBox).
危险行为
VirSCANVirSCAN
行为描述: 执行系统命令
详情信息: [u'[logcat, -d, -v, raw, -s, AndroidRuntime:E, -p, com.alexander.jq]']
[u'logcat -c']
动态列表行为
VirSCANVirSCAN
行为描述: 调用哈希算法
详情信息: MD5
行为描述: 获取加密实例
详情信息: [u'DES']
行为描述: 对指定数据计算哈希
详情信息: 60:e7:01:09:b9:6f
143219655312651656f4552701539d7000026c3deeee2b6d1a7da22a43c30dd4a4fc9
行为描述: 执行系统命令
详情信息: [u'[logcat, -d, -v, raw, -s, AndroidRuntime:E, -p, com.alexander.jq]']
[u'logcat -c']
行为描述: 执行SQL查询
详情信息: [u'SELECT b1285126B886647CD026790A9998B95DA, b1E80060086D600699E5E9C7949F2D7B2, b05E6EDA795F314914B4401F0029D155F22A8A5DA073F4748, b17D4BD9300EEA8ED7CB4042DABA58BCE, bAF61BBA2546A280CD6E8C6BF18A79D1AD762A78010AA322B, bE469B72940638DA6ECC0779AB16487AE, b373E283EE2F88763ECC0779AB16487AE FROM bFF23D43B301827ABC1CA263EFF55D05DECC0779AB16487AE', u'[]']
行为描述: 添加悬浮窗口
详情信息: [u'com.android.internal.policy.impl.PhoneWindow$DecorView@414ec2b8', u'WM.LayoutParams{(0,0)(fillxfill) sim=#100 ty=1 fl=#8010100 pfl=0x8 wanim=0x1030001}', u'android.view.CompatibilityInfoHolder@414b40d0']
行为描述: 窗口信息
详情信息: {"text": "开始游戏", "class": "android.widget.Button"}
{"text": "游戏设置", "class": "android.widget.Button"}
{"text": "游戏规则", "class": "android.widget.Button"}
{"text": "退出游戏", "class": "android.widget.Button"}
行为描述: 缓冲区读取一行数据
详情信息: Processor : ARMv7 Processor rev 0 (v7l)
行为描述: 写入文件
详情信息: path:/data/data/com.alexander.jq/shared_prefs/9C06DFD30734D6081033BE64F90E66A47FE9A319E6D476FFB945544F4A6EDA10.xml length:117
path:/data/data/com.alexander.jq/shared_prefs/9C06DFD30734D6081033BE64F90E66A47FE9A319E6D476FFB945544F4A6EDA10.xml length:163
path:/data/data/com.alexander.jq/shared_prefs/9C06DFD30734D6081033BE64F90E66A47FE9A319E6D476FFB945544F4A6EDA10.xml length:284
path:/data/data/com.alexander.jq/shared_prefs/9C06DFD30734D6081033BE64F90E66A47FE9A319E6D476FFB945544F4A6EDA10.xml length:331
path:/data/data/com.alexander.jq/shared_prefs/9C06DFD30734D6081033BE64F90E66A47FE9A319E6D476FFB945544F4A6EDA10.xml length:378
path:/data/data/com.alexander.jq/shared_prefs/9C06DFD30734D6081033BE64F90E66A47FE9A319E6D476FFB945544F4A6EDA10.xml length:427
path:/data/data/com.alexander.jq/shared_prefs/mobclick_agent_state_com.alexander.jq.xml length:342
path:/data/data/com.alexander.jq/shared_prefs/mobclick_agent_header_com.alexander.jq.xml length:992
path:unknown length:105
行为描述: 获取网络状态信息[*]
详情信息: [u'0']
[u'1']
行为描述: 初始化文件读取
详情信息: [u'/proc/cpuinfo']
行为描述: 初始化Intent
详情信息: [u'android.os.Parcel@414b16d8']
Activities
VirSCANVirSCAN
活动名 类型
android.easysu.junqi.StartActivity android.intent.action.MAIN
android.easysu.junqi.StartActivity android.intent.category.LAUNCHER
危险函数
VirSCANVirSCAN
函数名称 信息
java/net/URL;->openConnection 连接URL
java/net/HttpURLConnection;->connect 连接URL
android/app/NotificationManager;->notify 信息通知栏
HttpClient;->execute 请求远程服务器
getRuntime 获取命令行环境
java/lang/Runtime;->exec 执行字符串命令
TelephonyManager;->getDeviceId 搜集用户手机IMEI码、电话号码、系统版本号等信息
LocationManager;->getLastKnownLocation 获取地址位置
启动方式
VirSCANVirSCAN
名称 信息
com.eng.tan.TbAr 应用安装时启动服务
权限列表
VirSCANVirSCAN
许可名称 信息
android.permission.WAKE_LOCK 手机屏幕关闭后后台进程仍运行
android.permission.INTERNET 连接网络(2G或3G)
android.permission.ACCESS_NETWORK_STATE 读取网络状态(2G或3G)
android.permission.ACCESS_WIFI_STATE 读取wifi网络状态
android.permission.WRITE_EXTERNAL_STORAGE 写外部存储器(如:SD卡)
服务列表
VirSCANVirSCAN
名称
com.eng.tan.TsAv
文件列表
VirSCANVirSCAN
文件名 校验码
META-INF/MANIFEST.MF 0x71239946
META-INF/JUNQI.SF 0x62320543
META-INF/JUNQI.RSA 0x6a138afc
res/anim/zoomin.xml 0xd9c07b1b
res/anim/zoomout.xml 0x4064ea77
res/drawable/board.jpg 0x3daec4bf
res/drawable/button.xml 0xef7ac4d1
res/drawable/selector_checkbox.xml 0x63bf76be
res/drawable/selector_list_item_all.xml 0x3de27883
res/drawable/selector_list_item_bot.xml 0x287b5964
res/drawable/selector_list_item_mid.xml 0x92234406
res/drawable/selector_list_item_top.xml 0x3491aaa
res/drawable/selector_pref_more.xml 0xda6cd65d
res/drawable/selector_text_detail.xml 0xb52d0426
res/drawable/selector_text_title.xml 0x4862fc93
res/drawable/umeng_analyse_blank_selector.xml 0x2363eea2
res/drawable/umeng_analyse_bottom_banner.xml 0xee926e82
res/drawable/umeng_analyse_dev_bubble.9.png 0x8493510f
res/drawable/umeng_analyse_feedback_bar_bg.9.png 0x382879f2
res/drawable/umeng_analyse_feedback_list_item.9.png 0x1dd77523
res/drawable/umeng_analyse_feedback_list_item_pressed.9.png 0xdcc0e0d
res/drawable/umeng_analyse_feedback_list_item_selector.xml 0x952ae75f
res/drawable/umeng_analyse_feedback_statusbar_icon.png 0x6eefda9a
res/drawable/umeng_analyse_gradient_green.xml 0x962bb903
res/drawable/umeng_analyse_gradient_orange.xml 0xd5106ae2
res/drawable/umeng_analyse_gray_frame.xml 0xd1c4cb2
res/drawable/umeng_analyse_point_new.xml 0xb0b65b88
res/drawable/umeng_analyse_point_normal.xml 0xd54fcdde
res/drawable/umeng_analyse_see_list_normal.png 0x6d9ee2f3
res/drawable/umeng_analyse_see_list_pressed.png 0x3ff6d161
res/drawable/umeng_analyse_see_list_selector.xml 0xa1db90b4
res/drawable/umeng_analyse_submit_selector.xml 0x3dee0e38
res/drawable/umeng_analyse_top_banner.xml 0xf7574374
res/drawable/umeng_analyse_user_bubble.9.png 0x23cfe9b2
res/drawable/umeng_analyse_write_feedback_normal.png 0xf3083af7
res/drawable/umeng_analyse_write_feedback_pressed.png 0x10dae61
res/drawable/umeng_analyse_write_feedback_selector.xml 0x359e9d3d
res/layout/layout_setting.xml 0xa4bd3db5
res/layout/listview_array.xml 0x44715bf2
res/layout/main.xml 0x65045ab7
res/layout/menu.xml 0xa1832a9d
res/layout/pref_category.xml 0x9737d5d
res/layout/pref_list_item_all.xml 0x64634e04
res/layout/pref_list_item_bot.xml 0xe842d098
res/layout/pref_list_item_mid.xml 0xfa4405ce
res/layout/pref_list_item_top.xml 0x76659b52
res/layout/pref_widget_checkbox.xml 0xf2b875a7
res/layout/pref_widget_more.xml 0x2eb349ee
res/layout/umeng_analyse_download_notification.xml 0xe725ddc0
res/layout/umeng_analyse_feedback_atom.xml 0x2efbbf77
res/layout/umeng_analyse_feedback_conversation.xml 0x2c9e5b48
res/layout/umeng_analyse_feedback_conversation_item.xml 0xf335cfcd
res/layout/umeng_analyse_feedback_conversations.xml 0x31670229
res/layout/umeng_analyse_feedback_conversations_item.xml 0x62ab2a76
res/layout/umeng_analyse_feedback_list_item.xml 0xb02df6fa
res/layout/umeng_analyse_new_reply_alert_dialog.xml 0xf0a74e0e
res/layout/umeng_analyse_send_feedback.xml 0x9754c53d
res/menu/main_menu.xml 0xec243218
res/menu/start_menu.xml 0x8221677b
res/raw/button.ogg 0x85d5be7a
res/raw/equal.wav 0xa351fea0
res/raw/gameover.mp3 0x809e2c80
res/raw/gamestart.mp3 0xf0d43a46
res/raw/kill.wav 0xcb21f1b2
res/raw/killed.wav 0x5ab08a50
res/raw/lineup_1.jq 0x27ad11c
res/raw/lineup_10.jq 0x3f20250d
res/raw/lineup_11.jq 0x8210467b
res/raw/lineup_12.jq 0xf0b593d8
res/raw/lineup_13.jq 0xa997593c
res/raw/lineup_14.jq 0x1274a393
res/raw/lineup_15.jq 0x66e9e910
res/raw/lineup_16.jq 0x142fd7d
res/raw/lineup_17.jq 0x5b721536
res/raw/lineup_18.jq 0x3b865c43
res/raw/lineup_19.jq 0xfa339764
res/raw/lineup_2.jq 0x7495ab7f
res/raw/lineup_20.jq 0x3caf77bb
res/raw/lineup_21.jq 0x66841784
res/raw/lineup_22.jq 0xbd024c49
res/raw/lineup_23.jq 0x53c0bc97
res/raw/lineup_24.jq 0x4dcc94e0
res/raw/lineup_25.jq 0x93c07c2c
res/raw/lineup_26.jq 0x7810ec8c
res/raw/lineup_27.jq 0x71bc1b2d
res/raw/lineup_28.jq 0xcdd68ce8
res/raw/lineup_29.jq 0x57d77532
res/raw/lineup_3.jq 0xbf23f4ca
res/raw/lineup_30.jq 0x3c8a442b
res/raw/lineup_31.jq 0x607c229c
res/raw/lineup_32.jq 0x226dfd0e
res/raw/lineup_33.jq 0x9e9d8dc4
res/raw/lineup_34.jq 0x116a8bea
res/raw/lineup_35.jq 0x26831e8
res/raw/lineup_36.jq 0x5a6d6533
res/raw/lineup_37.jq 0xb378a87
res/raw/lineup_38.jq 0x6c5826eb
res/raw/lineup_39.jq 0xa6369436
res/raw/lineup_4.jq 0x1e7db817
res/raw/lineup_40.jq 0x6d927e48
res/raw/lineup_41.jq 0x1b0fc84
res/raw/lineup_42.jq 0x2ff45ffc
res/raw/lineup_43.jq 0xcf97b014
res/raw/lineup_44.jq 0x5ebcbf80
res/raw/lineup_45.jq 0xaa3e446a
res/raw/lineup_46.jq 0xbdc2fc7e
res/raw/lineup_47.jq 0x8b580623
res/raw/lineup_48.jq 0xdf6ed73a
res/raw/lineup_49.jq 0x6ed41f6d
res/raw/lineup_5.jq 0xcc56f5d2
res/raw/lineup_50.jq 0x48857ebc
res/raw/lineup_51.jq 0x4f6e82d8
res/raw/lineup_52.jq 0xf8154ad0
res/raw/lineup_53.jq 0xc3a95a22
res/raw/lineup_54.jq 0x1f43ea78
res/raw/lineup_55.jq 0xa515791a
res/raw/lineup_56.jq 0x93a59be2
res/raw/lineup_57.jq 0x620c1711
res/raw/lineup_58.jq 0x74d0e66c
res/raw/lineup_59.jq 0x9b9b01e8
res/raw/lineup_6.jq 0xc83aa04f
res/raw/lineup_60.jq 0xcc7f6d2e
res/raw/lineup_7.jq 0x4a8acb5e
res/raw/lineup_8.jq 0x27b32aba
res/raw/lineup_9.jq 0x4e2b89ca
res/raw/move.mp3 0x551272e5
res/raw/win.wav 0x9d2887cb
res/xml/preferences.xml 0xd5edd23b
AndroidManifest.xml 0x61ae592c
resources.arsc 0x62fc7102
res/drawable-hdpi/bg_body.png 0xc4adfd3d
res/drawable-hdpi/bg_list_item_all_normal.9.png 0x282e56d4
res/drawable-hdpi/bg_list_item_all_pressed.9.png 0x440a5b56
res/drawable-hdpi/bg_list_item_bot_normal.9.png 0xfe312c58
res/drawable-hdpi/bg_list_item_bot_pressed.9.png 0x8538ac0d
res/drawable-hdpi/bg_list_item_mid_normal.9.png 0x49e641f3
res/drawable-hdpi/bg_list_item_mid_pressed.9.png 0x303fc0bd
res/drawable-hdpi/bg_list_item_top_normal.9.png 0x523bcd4
res/drawable-hdpi/bg_list_item_top_pressed.9.png 0xb9841f6c
res/drawable-hdpi/button_nor.9.png 0xc9eabe26
res/drawable-hdpi/button_press.9.png 0x957aee18
res/drawable-hdpi/checkbox_checked.png 0x29cdf524
res/drawable-hdpi/checkbox_checked_unclickable.png 0xa7f405f5
res/drawable-hdpi/checkbox_normal.png 0xd9e8118f
res/drawable-hdpi/icn_settings_arrow.png 0x62623718
res/drawable-hdpi/icn_settings_arrow_pressed.png 0x969d2fa1
res/drawable-hdpi/list_divider.png 0x4cf320e0
res/drawable-mdpi/background.png 0xc32f940c
res/drawable-mdpi/smile.png 0x43b79161
res/drawable-mdpi/surprise.png 0x99162935
res/drawable-xhdpi/ic_menu_about.png 0xaa6c01d4
res/drawable-xhdpi/ic_menu_back.png 0x1f42240f
res/drawable-xhdpi/ic_menu_replay.png 0x5f2090a0
res/drawable-xhdpi/ic_menu_settings.png 0x179c336d
res/drawable-xhdpi/icon.png 0xdc6e93f4
classes.dex 0x170a6314
运行截图
VirSCANVirSCAN
VirSCAN