VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

Language
Server load
Server Load

VirSCAN
VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

File information

Scanner results
Scanner results:28%Antivirus software(9/32)found malware!
Behavior analysis report:         Habo file analysis
Time: 2015-03-12 14:46:21 (CST)
Scanner Engine Ver Sig Ver Sig Date Scan result Time
antiy AVL SDK 3.0 1970-01-01 Found nothing 36
asquared 9.0.0.4324 9.0.0.4324 2014-07-03 Android.Trojan.FakeInst.AQ 1
avast 141231-0 4.7.4 2014-12-31 Found nothing 45
avg 2109/8133 10.0.1405 2014-11-26 Found nothing 7
baidu 2.0.1.0 4.1.3.52192 2.0.1.0 Found nothing 13
baidusd 1.0 1.0 2014-04-02 Found nothing 3
bitdefender 7.58469 7.90123 2014-12-25 Found nothing 1
clamav 19745 0.97.5 2014-12-07 Found nothing 1
drweb 5.0.2.3300 5.0.1.1 2014-12-31 Found nothing 48
fprot 4.6.2.117 6.5.1.5418 2014-12-31 ANDR/FakeInst.Q 6
fsecure 2014-04-02-01 9.13 2014-04-02 Trojan:Android/OpFake.E 15
gdata 25.473 25.473 2015-03-01 Found nothing 60
ikarus 1.06.01 V1.32.31.0 2014-12-08 Found nothing 7
jiangmin 16.0.100 1.0.0.0 2014-08-20 Found nothing 60
kaspersky 5.5.33 5.5.33 2014-04-01 Found nothing 36
kingsoft 2.1 2.1 2013-09-22 Android.Troj.FakeInst.mf.(kcloud) 28
mcafee 7638 5400.1158 2014-11-30 Found nothing 34
nod32 0920 3.0.21 2014-12-23 Found nothing 4
panda 9.05.01 9.05.01 2014-12-31 Found nothing 11
pcc 11.380.07 9.500-1005 2014-12-31 Android.9084A07C 5
qh360 1.0.1 1.0.1 1.0.1 Malware.Radar01.Gen 12
qqphone 1.0.0.0 1.0.0.0 2014-12-09 Found nothing 1
quickheal 14.00 14.00 2014-12-31 Android.SMSSend.X 21
rising 25.46.06.04 25.46.06.04 2014-12-28 Found nothing 10
sophos 5.08 3.55.0 2014-12-01 Found nothing 11
symantec 20141230.001 1.3.0.24 2014-12-30 Trojan.Gen.2 1
tachyon 9.9.9 9.9.9 2013-12-27 Found nothing 51
thehacker 6.8.0.5 6.8.0.5 2014-12-29 Found nothing 28
tws 17.47.17308 1.0.2.2108 2014-12-08 Found nothing 60
vba 3.12.26.3 3.12.26.3 2014-12-31 Trojan-SMS.AndroidOS.Opfake.bo 13
virusbuster 15.0.985.0 5.5.2.13 2014-12-05 Found nothing 31
权限列表
许可名称 信息
android.permission.READ_PHONE_STATE 读取电话状态
android.permission.ACCESS_NETWORK_STATE 读取网络状态(2G或3G)
android.permission.SEND_SMS 发送短信
android.permission.INTERNET 连接网络(2G或3G)
com.android.launcher.permission.INSTALL_SHORTCUT 创建快捷方式
android.permission.WRITE_EXTERNAL_STORAGE 写外部存储器(如:SD卡)
android.permission.INSTALL_PACKAGES 安装应用
android.permission.ACCESS_COARSE_LOCATION 获取粗略的位置(通过wifi、基站)
android.permission.ACCESS_FINE_LOCATION 获取精确的位置(通过GPS)
android.permission.ACCESS_COARSE_UPDATES
android.permission.RECEIVE_BOOT_COMPLETED 接收开机启动广播
文件信息
VirSCANVirSCAN
安全评分 :78
基本信息
VirSCANVirSCAN
MD5:4ba5e19f09673e4b5276b0a34a88ae61
文件大小:5.58MB
上传时间: 2014-09-22 10:36:30 (CST)
包名:fhvm.vnnej
最低运行环境:Android 2.1.x
版权:Opera
关键行为
VirSCANVirSCAN
行为描述: 修改注册表_启动项
详情信息: \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\XXX_252CB07B
行为描述: 自删除
详情信息: C:\%temp%\1419218465.802468.exe
行为描述: 按名称获取主机地址
详情信息: ggteam2024.gnway.cc
ggteam2014.vicp.cc
showbox1004.gnway.net
ip2.nwt.gg-team.net
174.139.217.151
进程行为
VirSCANVirSCAN
行为描述: 修改注册表_启动项
详情信息: \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\XXX_252CB07B
行为描述: 自删除
详情信息: C:\%temp%\1419218465.802468.exe
行为描述: 按名称获取主机地址
详情信息: ggteam2024.gnway.cc
ggteam2014.vicp.cc
showbox1004.gnway.net
ip2.nwt.gg-team.net
174.139.217.151
文件行为
VirSCANVirSCAN
行为描述: 写权限映射文件
详情信息: _Share_GGT_0
Local\UrlZonesSM_Administrator
行为描述: 创建可执行文件
详情信息: C:\WINDOWS\GTFA889AE\system32.exe
C:\WINDOWS\GTsystem.sys
行为描述: 修改文件内容
详情信息: C:\Documents and Settings\Administrator\Local Settings\Temp\Temp0.bat---> Offset = 0
行为描述: 自删除
详情信息: C:\%temp%\1419218465.802468.exe
行为描述: 修改新生成的可执行文件
详情信息: C:\WINDOWS\GTFA889AE\system32.exe---> Offset = 299008
网络行为
VirSCANVirSCAN
行为描述: 发送一个已连接的套接字数据
详情信息: SOCKET = 0x00000178, TotalSize = 260, Offset = 0, ReadSize = 260.
SOCKET = 0x00000178, TotalSize = 258, Offset = 0, ReadSize = 258.
SOCKET = 0x00000178, TotalSize = 261, Offset = 0, ReadSize = 261.
SOCKET = 0x00000178, TotalSize = 259, Offset = 0, ReadSize = 259.
SOCKET = 0x00000178, TotalSize = 253, Offset = 0, ReadSize = 253.
SOCKET = 0x00000178, TotalSize = 252, Offset = 0, ReadSize = 252.
SOCKET = 0x00000178, TotalSize = 251, Offset = 0, ReadSize = 251.
SOCKET = 0x00000178, TotalSize = 255, Offset = 0, ReadSize = 255.
SOCKET = 0x00000178, TotalSize = 257, Offset = 0, ReadSize = 257.
SOCKET = 0x00000178, TotalSize = 254, Offset = 0, ReadSize = 254.
SOCKET = 0x00000178, TotalSize = 256, Offset = 0, ReadSize = 256.
SOCKET = 0x00000178, TotalSize = 250, Offset = 0, ReadSize = 250.
行为描述: 建立到一个指定的套接字连接
详情信息: 219.133.40.1:9910
行为描述: 按名称获取主机地址
详情信息: ggteam2024.gnway.cc
ggteam2014.vicp.cc
showbox1004.gnway.net
ip2.nwt.gg-team.net
174.139.217.151
注册表行为
VirSCANVirSCAN
行为描述: 修改注册表
详情信息: \REGISTRY\MACHINE\SOFTWARE\XXX_252CB07B\1
\REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\X\BaseClass
\REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\Software\Microsoft\Windows\ShellNoRoam\MUICache\C:\Documents and Settings\Administrator\Local Settings\Temp\Temp0.bat
行为描述: 修改注册表_系统动态组件
详情信息: \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{12d6f312-b0f6-11d0-94ab-0080c74c7e95}\StubPath
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{12d6f312-b0f6-11d0-94ab-0080c74c7e95}\
行为描述: 修改注册表_启动项
详情信息: \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\XXX_252CB07B
其他行为
VirSCANVirSCAN
行为描述: 创建互斥体
详情信息: 252CB07B$2_
252CB07B$0_
SHIMLIB_LOG_MUTEX
Local\ZonesCounterMutex
Local\ZoneAttributeCacheCounterMutex
Local\ZonesCacheCounterMutex
Local\ZonesLockedCacheCounterMutex
行为描述: 获取系统权限
详情信息: SE_LOAD_DRIVER_PRIVILEGE
SE_DEBUG_PRIVILEGE
SE_SHUTDOWN_PRIVILEGE
动态列表行为
VirSCANVirSCAN
行为描述: 传递附加信息
详情信息: Ljava/lang/String;=appId | Ljava/lang/String;=76
Ljava/lang/String;=apiKey | Ljava/lang/String;=mapk01_20f
Ljava/lang/String;=imei | Ljava/lang/String;=357242043237511
Ljava/lang/String;=imsi | Ljava/lang/String;=310260000000000
Ljava/lang/String;=phone | Ljava/lang/String;=15555215554
Ljava/lang/String;=android.intent.extra.shortcut.INTENT | Landroid/os/Parcelable;=Intent { act=android.intent.action.VIEW dat=http://m-001.net/i/ flg=0x14000000 }
Ljava/lang/String;=android.intent.extra.shortcut.NAME | Ljava/lang/String;=
Ljava/lang/String;=android.intent.extra.shortcut.ICON_RESOURCE | Landroid/os/Parcelable;=android:drawable/ic_menu_search
Ljava/lang/String;=duplicate | Z=false
行为描述: 启动服务
详情信息: com.android.musicfx.Compatibility$Service
com.android.mms.transaction.SmsReceiverService
行为描述: 读取文件
详情信息: path:/proc/783/cmdline length:105
path:/proc/799/cmdline length:105
path:/proc/811/cmdline length:105
path:/proc/842/cmdline length:105
path:/proc/852/cmdline length:105
行为描述: 写入文件
详情信息: path:/data/data/com.android.gallery3d/shared_prefs/com.android.gallery3d_preferences.xml length:105
path:/data/data/com.android.musicfx/shared_prefs/musicfx.xml length:105
path:/data/data/fhvm.vnnej/shared_prefs/alpha.xml length:105
path:/data/data/fhvm.vnnej/shared_prefs/alpha.xml length:105
path:/data/data/com.android.launcher/shared_prefs/com.android.launcher2.prefs.xml length:105
path:/data/data/com.android.gallery3d/shared_prefs/com.android.gallery3d_preferences.xml length:105
path:/data/data/fhvm.vnnej/shared_prefs/settings.xml length:105
行为描述: 获取用户ID
详情信息: 310260000000000
行为描述: 类加载
详情信息: path:/system/app/PicoTts.apk
path:/system/app/MusicFX.apk
path:/system/framework/am.jar
path:/data/app/fhvm.vnnej-1.apk
行为描述: 初始化Intent
详情信息: Landroid/content/Context;=android.app.Application@41559938 | Ljava/lang/Class;=class bnjk.jjk3e.CReceiver
Ljava/lang/String;=android.intent.action.VIEW | Landroid/net/Uri;=http://m-001.net/i/
Landroid/content/Context;=android.app.ReceiverRestrictedContext@41565870 | Ljava/lang/Class;=class bnjk.jjk3e.CReceiver
行为描述: 获取设备ID
详情信息: 357242043237511
Activities
VirSCANVirSCAN
活动名 类型
.JKldv android.intent.action.MAIN
.JKldv android.intent.category.LAUNCHER
危险函数
VirSCANVirSCAN
函数名称 信息
TelephonyManager;->getLine1Number 获取手机号
TelephonyManager;->getDeviceId 搜集用户手机IMEI码、电话号码、系统版本号等信息
java/net/URL;->openConnection 连接URL
java/net/HttpURLConnection;->connect 连接URL
android/app/NotificationManager;->notify 信息通知栏
SmsManager;->sendTextMessage 发送普通短信
启动方式
VirSCANVirSCAN
名称 信息
fhvm.vnnej.CBReceiver 开机启动服务
权限列表
VirSCANVirSCAN
许可名称 信息
android.permission.READ_PHONE_STATE 读取电话状态
android.permission.ACCESS_NETWORK_STATE 读取网络状态(2G或3G)
android.permission.SEND_SMS 发送短信
android.permission.INTERNET 连接网络(2G或3G)
com.android.launcher.permission.INSTALL_SHORTCUT 创建快捷方式
android.permission.WRITE_EXTERNAL_STORAGE 写外部存储器(如:SD卡)
android.permission.INSTALL_PACKAGES 安装应用
android.permission.ACCESS_COARSE_LOCATION 获取粗略的位置(通过wifi、基站)
android.permission.ACCESS_FINE_LOCATION 获取精确的位置(通过GPS)
android.permission.ACCESS_COARSE_UPDATES
android.permission.RECEIVE_BOOT_COMPLETED 接收开机启动广播
服务列表
VirSCANVirSCAN
名称
bnjk.jjk3e.CService
文件列表
VirSCANVirSCAN
文件名 校验码
META-INF/MANIFEST.MF 0x6b3a9cc6
META-INF/ALARM.SF 0x76114f65
META-INF/ALARM.RSA 0x1bab1672
res/drawable/greenbutton.xml 0x759c9843
res/drawable/linkbutton.xml 0xe0bbaa5d
res/layout/end.xml 0xcccd36db
res/layout/license.xml 0x7ca7d76c
res/layout/load.xml 0x1c67e3d7
res/layout/main.xml 0xee225db3
AndroidManifest.xml 0xa034a46f
resources.arsc 0x368ac717
res/drawable-hdpi/background.9.png 0x1727c35e
res/drawable-hdpi/background_button.png 0x5414f0ae
res/drawable-hdpi/greenbutton_normal.png 0x91e9283c
res/drawable-hdpi/greenbutton_pressed.png 0xff00350d
res/drawable-hdpi/linkbutton_normal.png 0x747daa9e
classes.dex 0xcaa8e062
res/raw/data.dat 0xd4daefb2
res/drawable-hdpi/logo.png 0x27bc873d
res/drawable-ldpi/logo.png 0x27bc873d
res/drawable-mdpi/logo.png 0x27bc873d
res/drawable-hdpi/icon.png 0xde82d5d2
res/drawable-ldpi/icon.png 0xde82d5d2
res/drawable-mdpi/icon.png 0xde82d5d2
res/raw/0 0xee8c9b06
res/raw/1 0xee8c9b06
res/raw/2 0xee8c9b06
res/raw/3 0xee8c9b06
res/raw/4 0xee8c9b06
res/raw/5 0xee8c9b06
res/raw/6 0xee8c9b06
res/raw/7 0xee8c9b06
res/raw/8 0xee8c9b06
res/raw/9 0xee8c9b06
res/raw/10 0xee8c9b06
res/raw/11 0xee8c9b06
res/raw/12 0xee8c9b06
res/raw/13 0xee8c9b06
res/raw/14 0xee8c9b06
res/raw/15 0xee8c9b06
res/raw/16 0xee8c9b06
res/raw/17 0xee8c9b06
res/raw/18 0xee8c9b06
res/raw/19 0xee8c9b06
res/raw/20 0xee8c9b06
res/raw/21 0xee8c9b06
res/raw/22 0xee8c9b06
res/raw/23 0xee8c9b06
res/raw/24 0xee8c9b06
res/raw/25 0xee8c9b06
res/raw/26 0xee8c9b06
res/raw/27 0xee8c9b06
res/raw/28 0xee8c9b06
res/raw/29 0xee8c9b06
res/raw/30 0xee8c9b06
res/raw/31 0xee8c9b06
res/raw/32 0xee8c9b06
res/raw/33 0xee8c9b06
res/raw/34 0xee8c9b06
res/raw/35 0xee8c9b06
res/raw/36 0xee8c9b06
res/raw/37 0xee8c9b06
res/raw/38 0xee8c9b06
res/raw/39 0xee8c9b06
res/raw/40 0xee8c9b06
res/raw/41 0xee8c9b06
res/raw/42 0xee8c9b06
res/raw/43 0xee8c9b06
res/raw/44 0xee8c9b06
res/raw/45 0xee8c9b06
res/raw/46 0xee8c9b06
res/raw/47 0xee8c9b06
res/raw/48 0xee8c9b06
res/raw/49 0xee8c9b06
res/raw/50 0xee8c9b06
res/raw/51 0xee8c9b06
res/raw/52 0xee8c9b06
res/raw/53 0xee8c9b06
res/raw/54 0xee8c9b06
res/raw/55 0xee8c9b06
res/raw/56 0xee8c9b06
res/raw/57 0xee8c9b06
res/raw/58 0xee8c9b06
res/raw/59 0xee8c9b06
res/raw/60 0xee8c9b06
res/raw/61 0xee8c9b06
res/raw/62 0xee8c9b06
res/raw/63 0xee8c9b06
res/raw/64 0xee8c9b06
res/raw/65 0xee8c9b06
res/raw/66 0xee8c9b06
res/raw/67 0xee8c9b06
res/raw/68 0xee8c9b06
res/raw/69 0xee8c9b06
res/raw/70 0xee8c9b06
res/raw/71 0xee8c9b06
res/raw/72 0xee8c9b06
res/raw/73 0xee8c9b06
res/raw/74 0xee8c9b06
res/raw/75 0xee8c9b06
res/raw/76 0xee8c9b06
res/raw/77 0xee8c9b06
res/raw/78 0xee8c9b06
res/raw/79 0xee8c9b06
res/raw/80 0xee8c9b06
res/raw/81 0xee8c9b06
res/raw/82 0xee8c9b06
res/raw/83 0xee8c9b06
res/raw/84 0xee8c9b06
res/raw/85 0xee8c9b06
res/raw/86 0xee8c9b06
res/raw/87 0xee8c9b06
res/raw/88 0xee8c9b06
res/raw/89 0xee8c9b06
res/raw/90 0xee8c9b06
res/raw/91 0xee8c9b06
res/raw/92 0xee8c9b06
res/raw/93 0xee8c9b06
res/raw/94 0xee8c9b06
res/raw/95 0xee8c9b06
res/raw/96 0xee8c9b06
res/raw/97 0xee8c9b06
res/raw/98 0xee8c9b06
res/raw/99 0xee8c9b06
res/raw/100 0xee8c9b06
res/raw/101 0xee8c9b06
res/raw/102 0xee8c9b06
res/raw/103 0xee8c9b06
res/raw/104 0xee8c9b06
res/raw/105 0xee8c9b06
res/raw/106 0xee8c9b06
res/raw/107 0xee8c9b06
res/raw/108 0xee8c9b06
res/raw/109 0xee8c9b06
res/raw/110 0xee8c9b06
res/raw/111 0xee8c9b06
res/raw/112 0xee8c9b06
res/raw/113 0xee8c9b06
res/raw/114 0xee8c9b06
res/raw/115 0xee8c9b06
res/raw/116 0xee8c9b06
res/raw/117 0xee8c9b06
res/raw/118 0xee8c9b06
res/raw/119 0xee8c9b06
res/raw/120 0xee8c9b06
res/raw/121 0xee8c9b06
res/raw/122 0xee8c9b06
res/raw/123 0xee8c9b06
res/raw/124 0xee8c9b06
res/raw/125 0xee8c9b06
res/raw/126 0xee8c9b06
res/raw/127 0xee8c9b06
res/raw/128 0xee8c9b06
res/raw/129 0xee8c9b06
res/raw/130 0xee8c9b06
res/raw/131 0xee8c9b06
res/raw/132 0xee8c9b06
res/raw/133 0xee8c9b06
res/raw/134 0xee8c9b06
res/raw/135 0xee8c9b06
res/raw/136 0xee8c9b06
res/raw/137 0xee8c9b06
res/raw/138 0xee8c9b06
res/raw/139 0xee8c9b06
res/raw/140 0xee8c9b06
res/raw/141 0xee8c9b06
res/raw/142 0xee8c9b06
res/raw/143 0xee8c9b06
res/raw/144 0xee8c9b06
res/raw/145 0xee8c9b06
res/raw/146 0xee8c9b06
res/raw/147 0xee8c9b06
res/raw/148 0xee8c9b06
res/raw/149 0xee8c9b06
res/raw/150 0xee8c9b06
res/raw/151 0xee8c9b06
res/raw/152 0xee8c9b06
res/raw/153 0xee8c9b06
res/raw/154 0xee8c9b06
res/raw/155 0xee8c9b06
res/raw/156 0xee8c9b06
res/raw/157 0xee8c9b06
res/raw/158 0xee8c9b06
res/raw/159 0xee8c9b06
res/raw/160 0xee8c9b06
res/raw/161 0xee8c9b06
res/raw/162 0xee8c9b06
res/raw/163 0xee8c9b06
res/raw/164 0xee8c9b06
res/raw/165 0xee8c9b06
res/raw/166 0xee8c9b06
res/raw/167 0xee8c9b06
res/raw/168 0xee8c9b06
res/raw/169 0xee8c9b06
res/raw/170 0xee8c9b06
res/raw/171 0xee8c9b06
res/raw/172 0xee8c9b06
res/raw/173 0xee8c9b06
res/raw/174 0xee8c9b06
res/raw/175 0xee8c9b06
res/raw/176 0xee8c9b06
res/raw/177 0xee8c9b06
res/raw/178 0xee8c9b06
res/raw/179 0xee8c9b06
res/raw/180 0xee8c9b06
res/raw/181 0xee8c9b06
res/raw/182 0xee8c9b06
res/raw/183 0xee8c9b06
res/raw/184 0xee8c9b06
res/raw/185 0xee8c9b06
res/raw/186 0xee8c9b06
res/raw/187 0xee8c9b06
res/raw/188 0xee8c9b06
res/raw/189 0xee8c9b06
res/raw/190 0xee8c9b06
res/raw/191 0xee8c9b06
res/raw/192 0xee8c9b06
res/raw/193 0xee8c9b06
res/raw/194 0xee8c9b06
res/raw/195 0xee8c9b06
res/raw/196 0xee8c9b06
res/raw/197 0xee8c9b06
res/raw/198 0xee8c9b06
res/raw/199 0xee8c9b06
res/raw/200 0xee8c9b06
res/raw/201 0xee8c9b06
res/raw/202 0xee8c9b06
res/raw/203 0xee8c9b06
res/raw/204 0xee8c9b06
res/raw/205 0xee8c9b06
res/raw/206 0xee8c9b06
res/raw/207 0xee8c9b06
res/raw/208 0xee8c9b06
res/raw/209 0xee8c9b06
res/raw/210 0xee8c9b06
res/raw/211 0xee8c9b06
res/raw/212 0xee8c9b06
res/raw/213 0xee8c9b06
res/raw/214 0xee8c9b06
res/raw/215 0xee8c9b06
res/raw/216 0xee8c9b06
res/raw/217 0xee8c9b06
res/raw/218 0xee8c9b06
res/raw/219 0xee8c9b06
res/raw/220 0xee8c9b06
res/raw/221 0xee8c9b06
res/raw/222 0xee8c9b06
res/raw/223 0xee8c9b06
res/raw/224 0xee8c9b06
res/raw/225 0xee8c9b06
res/raw/226 0xee8c9b06
res/raw/227 0xee8c9b06
res/raw/228 0xee8c9b06
res/raw/229 0xee8c9b06
res/raw/230 0xee8c9b06
res/raw/231 0xee8c9b06
res/raw/232 0xee8c9b06
res/raw/233 0xee8c9b06
res/raw/234 0xee8c9b06
res/raw/235 0xee8c9b06
res/raw/236 0xee8c9b06
res/raw/237 0xee8c9b06
res/raw/238 0xee8c9b06
res/raw/239 0xee8c9b06
res/raw/240 0xee8c9b06
res/raw/241 0xee8c9b06
res/raw/242 0xee8c9b06
res/raw/243 0xee8c9b06
res/raw/244 0xee8c9b06
res/raw/245 0xee8c9b06
res/raw/246 0xee8c9b06
res/raw/247 0xee8c9b06
res/raw/248 0xee8c9b06
res/raw/249 0xee8c9b06
res/raw/250 0xee8c9b06
res/raw/251 0xee8c9b06
res/raw/252 0xee8c9b06
res/raw/253 0xee8c9b06
res/raw/254 0xee8c9b06
res/raw/255 0xee8c9b06
res/raw/256 0xee8c9b06
res/raw/257 0xee8c9b06
res/raw/258 0xee8c9b06
res/raw/259 0xee8c9b06
res/raw/260 0xee8c9b06
res/raw/261 0xee8c9b06
res/raw/262 0xee8c9b06
res/raw/263 0xee8c9b06
res/raw/264 0xee8c9b06
res/raw/265 0xee8c9b06
res/raw/266 0xee8c9b06
res/raw/267 0xee8c9b06
res/raw/268 0xee8c9b06
res/raw/269 0xee8c9b06
res/raw/270 0xee8c9b06
res/raw/271 0xee8c9b06
res/raw/272 0xee8c9b06
res/raw/273 0xee8c9b06
res/raw/274 0xee8c9b06
res/raw/275 0xee8c9b06
res/raw/276 0xee8c9b06
res/raw/277 0xee8c9b06
res/raw/278 0xee8c9b06
res/raw/279 0xee8c9b06
res/raw/280 0xee8c9b06
res/raw/281 0xee8c9b06
res/raw/282 0xee8c9b06
res/raw/283 0xee8c9b06
res/raw/284 0xee8c9b06
res/raw/285 0xee8c9b06
res/raw/286 0xee8c9b06
res/raw/287 0xee8c9b06
res/raw/288 0xee8c9b06
res/raw/289 0xee8c9b06
res/raw/290 0xee8c9b06
res/raw/291 0xee8c9b06
res/raw/292 0xee8c9b06
res/raw/293 0xee8c9b06
res/raw/294 0xee8c9b06
res/raw/295 0xee8c9b06
res/raw/296 0xee8c9b06
res/raw/297 0xee8c9b06
res/raw/298 0xee8c9b06
res/raw/299 0xee8c9b06
res/raw/300 0xee8c9b06
res/raw/301 0xee8c9b06
res/raw/302 0xee8c9b06
res/raw/303 0xee8c9b06
res/raw/304 0xee8c9b06
res/raw/305 0xee8c9b06
res/raw/306 0xee8c9b06
res/raw/307 0xee8c9b06
res/raw/308 0xee8c9b06
res/raw/309 0xee8c9b06
res/raw/310 0xee8c9b06
res/raw/311 0xee8c9b06
res/raw/312 0xee8c9b06
res/raw/313 0xee8c9b06
res/raw/314 0xee8c9b06
res/raw/315 0xee8c9b06
res/raw/316 0xee8c9b06
res/raw/317 0xee8c9b06
res/raw/318 0xee8c9b06
res/raw/319 0xee8c9b06
res/raw/320 0xee8c9b06
res/raw/321 0xee8c9b06
res/raw/322 0xee8c9b06
res/raw/323 0xee8c9b06
运行截图
VirSCANVirSCAN
VirSCAN