Malware Analysis Report

2024-07-28 11:24

Sample ID 240613-3pjfqazbml
Target 46dc56504714d5266d5da5eefc5cf425128a408a98978751e93f50733cf6aed9.bin
SHA256 46dc56504714d5266d5da5eefc5cf425128a408a98978751e93f50733cf6aed9
Tags
octo banker collection credential_access discovery evasion impact infostealer persistence rat stealth trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

46dc56504714d5266d5da5eefc5cf425128a408a98978751e93f50733cf6aed9

Threat Level: Known bad

The file 46dc56504714d5266d5da5eefc5cf425128a408a98978751e93f50733cf6aed9.bin was found to be: Known bad.

Malicious Activity Summary

octo banker collection credential_access discovery evasion impact infostealer persistence rat stealth trojan

Octo payload

Octo

Removes its main activity from the application launcher

Loads dropped Dex/Jar

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

Obtains sensitive information copied to the device clipboard

Queries the phone number (MSISDN for GSM devices)

Makes use of the framework's Accessibility service

Declares services with permission to bind to the system

Requests dangerous framework permissions

Acquires the wake lock

Performs UI accessibility actions on behalf of the user

Queries the unique device ID (IMEI, MEID, IMSI)

Requests disabling of battery optimizations (often used to enable hiding in the background).

Reads information about phone network operator.

Queries the mobile country code (MCC)

Requests accessing notifications (often used to intercept notifications before users become aware).

Makes use of the framework's foreground persistence service

Declares broadcast receivers with permission to handle system events

Uses Crypto APIs (Might try to encrypt user data)

Registers a broadcast receiver at runtime (usually for listening for system events)

Checks memory information

Checks CPU information

MITRE ATT&CK Matrix

N/A

Analysis: static1

Detonation Overview

Reported

2024-06-13 23:41

Signatures

Declares broadcast receivers with permission to handle system events

Description Indicator Process Target
Required by device admin receivers to bind with the system. Allows apps to manage device administration features. android.permission.BIND_DEVICE_ADMIN N/A N/A

Declares services with permission to bind to the system

Description Indicator Process Target
Required by accessibility services to bind with the system. Allows apps to access accessibility features. android.permission.BIND_ACCESSIBILITY_SERVICE N/A N/A
Required by notification listener services to bind with the system. Allows apps to listen to and interact with notifications on the device. android.permission.BIND_NOTIFICATION_LISTENER_SERVICE N/A N/A

Requests dangerous framework permissions

Description Indicator Process Target
Allows an application to read from external storage. android.permission.READ_EXTERNAL_STORAGE N/A N/A
Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. android.permission.CALL_PHONE N/A N/A
Allows an application to send SMS messages. android.permission.SEND_SMS N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows an application to read or write the system settings. android.permission.WRITE_SETTINGS N/A N/A
Allows an application to receive SMS messages. android.permission.RECEIVE_SMS N/A N/A
Allows an app to access location in the background. android.permission.ACCESS_BACKGROUND_LOCATION N/A N/A
Allows an application to record audio. android.permission.RECORD_AUDIO N/A N/A
Allows an application a broad access to external storage in scoped storage. android.permission.MANAGE_EXTERNAL_STORAGE N/A N/A
Allows an application to read SMS messages. android.permission.READ_SMS N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-13 23:41

Reported

2024-06-13 23:45

Platform

android-x86-arm-20240611.1-en

Max time kernel

179s

Max time network

179s

Command Line

com.turnexample15

Signatures

Octo

banker trojan infostealer rat octo

Octo payload

Description Indicator Process Target
N/A N/A N/A N/A

Removes its main activity from the application launcher

stealth trojan evasion
Description Indicator Process Target
N/A N/A N/A N/A

Loads dropped Dex/Jar

evasion
Description Indicator Process Target
N/A /data/user/0/com.turnexample15/app_DynamicOptDex/CWH.json N/A N/A
N/A /data/user/0/com.turnexample15/app_DynamicOptDex/CWH.json N/A N/A
N/A /data/user/0/com.turnexample15/cache/lvseceqyhd N/A N/A
N/A /data/user/0/com.turnexample15/cache/lvseceqyhd N/A N/A

Makes use of the framework's Accessibility service

collection evasion credential_access
Description Indicator Process Target
Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId N/A N/A
Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId N/A N/A

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

banker discovery

Queries the phone number (MSISDN for GSM devices)

discovery

Acquires the wake lock

Description Indicator Process Target
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A

Makes use of the framework's foreground persistence service

evasion persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.setServiceForeground N/A N/A

Performs UI accessibility actions on behalf of the user

evasion
Description Indicator Process Target
N/A android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction N/A N/A
N/A android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction N/A N/A
N/A android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction N/A N/A

Queries the mobile country code (MCC)

discovery
Description Indicator Process Target
Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone N/A N/A

Queries the unique device ID (IMEI, MEID, IMSI)

discovery

Requests accessing notifications (often used to intercept notifications before users become aware).

collection credential_access
Description Indicator Process Target
Intent action android.settings.ACTION_NOTIFICATION_LISTENER_SETTINGS N/A N/A

Requests disabling of battery optimizations (often used to enable hiding in the background).

evasion
Description Indicator Process Target
Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS N/A N/A

Registers a broadcast receiver at runtime (usually for listening for system events)

persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.registerReceiver N/A N/A

Uses Crypto APIs (Might try to encrypt user data)

impact
Description Indicator Process Target
Framework API call javax.crypto.Cipher.doFinal N/A N/A

Checks CPU information

Description Indicator Process Target
File opened for read /proc/cpuinfo N/A N/A

Checks memory information

Description Indicator Process Target
File opened for read /proc/meminfo N/A N/A

Processes

com.turnexample15

/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.turnexample15/app_DynamicOptDex/CWH.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.turnexample15/app_DynamicOptDex/oat/x86/CWH.odex --compiler-filter=quicken --class-loader-context=&

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
GB 216.58.201.106:443 tcp
US 1.1.1.1:53 semanticlocation-pa.googleapis.com udp
US 1.1.1.1:53 golevasi800.top udp
US 1.1.1.1:53 www.ip-api.com udp
US 208.95.112.1:80 www.ip-api.com tcp
US 1.1.1.1:53 musherpicka.live udp
US 1.1.1.1:53 9r8i1u84t2gp.online udp
US 1.1.1.1:53 9r8i1u84t2gp1.online udp
RU 185.161.248.142:443 9r8i1u84t2gp1.online tcp
RU 185.161.248.142:443 9r8i1u84t2gp1.online tcp
US 1.1.1.1:53 arw2he7x57wp1.pw udp
RU 185.161.248.142:443 arw2he7x57wp1.pw tcp
GB 216.58.212.238:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 172.217.16.238:443 android.apis.google.com tcp
RU 185.161.248.142:443 arw2he7x57wp1.pw tcp
RU 185.161.248.142:443 arw2he7x57wp1.pw tcp
US 1.1.1.1:53 arw2he7x57wp.pw udp
RU 185.161.248.142:443 arw2he7x57wp.pw tcp
US 1.1.1.1:53 cm603lzeyxdw1.site udp
US 1.1.1.1:53 5a9udxg6l6gd.su udp
RU 185.161.248.142:443 5a9udxg6l6gd.su tcp
US 1.1.1.1:53 cm603lzeyxdw.site udp
RU 185.161.248.142:443 cm603lzeyxdw.site tcp
RU 185.161.248.142:443 cm603lzeyxdw.site tcp
RU 185.161.248.142:443 cm603lzeyxdw.site tcp

Files

/data/data/com.turnexample15/app_DynamicOptDex/CWH.json

MD5 5f107804ff0e326c6ef94d24b49ad99a
SHA1 661252e40944de34643c898f815b386e359cab4e
SHA256 84b3701df0766799818eeb463187d61527180eea2968d1c64d5a8568b35b486d
SHA512 6e52bc80e1a5752d76db1ba61aff38b3d77e75f9f9308a2146ccc944fc8639140e169791af459264b995d1433432fa1fb595f03172266f445f7d8406dc9dc784

/data/data/com.turnexample15/app_DynamicOptDex/CWH.json

MD5 ea069c09435e9b22d791136a680581b5
SHA1 4e8ea1f9fb336ea31b23aed7fed4ed12fac054c2
SHA256 ba3062904be94cdc2d0154093ad54a52b97d8cef7fb0c188a425794d7e0c37b9
SHA512 ddb016acc841b607c65f49f5be5fa503ed3beaf56580c04e86aacb24269215b69495343cf2e97334a9ec92acfe3fcc205ff47322b63409645673d5797bbe363f

/data/user/0/com.turnexample15/app_DynamicOptDex/CWH.json

MD5 5ae419f42981cff6894434c9f79467c3
SHA1 00c55eadd6fc960a89f6d6e27f6f8b02431e0f55
SHA256 eca7f673d1be3ef858c03ec4f79c07467fe4dd9f37e47c4a325ca433f09d594b
SHA512 314438b93ee9bb03cf49ef2a3339a5ece79dc6bbdb7f681770e418e5349a991e9b98c4e290814959deb1d4b3979dc51e0254adcb2da9727ea2b69e3929d6f762

/data/user/0/com.turnexample15/app_DynamicOptDex/CWH.json

MD5 83fb60c128e122eae540598672627cc8
SHA1 ba16e1bddaa119dc48defb1d10117a72196edec6
SHA256 53f5c5e9a62ed3bc3080b13c2bf6ee80003ec0322a3a4655cf9ee90b9abe192e
SHA512 c4a30500fc1c528933e69aab4be93f3509e96d999865187dc339baa669f86e19f0c8092aa61a111382684a3dfa1d7ca7c8da73340bd252fe703523e1f97c25af

/data/data/com.turnexample15/cache/lvseceqyhd

MD5 6f3cf16d8a64cda396cf0e14be0dee13
SHA1 b99ff2737cdd8244e3cd7b616279b3e6a138526a
SHA256 f85d16490d4a5725516476ff48bece912ae923f132f42cd88a22197929f2cfc6
SHA512 fffbe48dbb14fec6435ca28556a1ff2e01f4e9259194fe6c85e76329c23f94e8344e2a780aa44d931b6dbf04f9d210cfed0ce5e9b9746539fe04983142b9173a

/data/data/com.turnexample15/kl.txt

MD5 6311c3fd15588bb5c126e6c28ff5fffe
SHA1 ce81d136fce31779f4dd62e20bdaf99c91e2fc57
SHA256 8b82f6032e29a2b5c96031a3630fb6173d12ff0295bc20bb21b877d08f0812d8
SHA512 2975fe2e94b6a8adc9cfc1a865ad113772b54572883a537b02a16dd2d029c0f7d9cca3b154fd849bdfe978e18b396bcf9fa6e67e7c61f92bdc089a29a9c355c6

/data/data/com.turnexample15/kl.txt

MD5 3d0675606b0329478e1d1ca457d8642b
SHA1 2e9645ef85435ccf36ef56dcd830d8ac4f35daed
SHA256 4fa4f4e9e697c331450ee0473e8f226c45c1f977ad53b218534933380329a721
SHA512 f60a70e9f732ef8bb9bf737fd46f343c9ab29c20d13b9852c61cef939876e1721c940b58d7b73063d0f1086bc58c3682a91a2277949716d1b5622e1c09fcef3e

/data/data/com.turnexample15/kl.txt

MD5 de15798e5591c477062913af3b4feca3
SHA1 2003f65bfe05f07165e7f73135f66cbfc5ad0b0b
SHA256 87f57258c1e82b286cb5f7bb5e3fb8f318675db92afd63825e56c8636a935e32
SHA512 358df10bedc05792ff396c5cfc0039140e109691071c99fd70b4aab66653b7d1f15c3b85767f58c22e6d155afbd72185d251d059d78fc7f4a5a3e95a76553fa5

/data/data/com.turnexample15/kl.txt

MD5 b79b1576ec091e476dfa6e3eb8208eac
SHA1 e1a07de63e4b6c80e86d032df593dc1b6087491d
SHA256 aaffd966a6fa47b78136449fc9d5e3cb884919f9ecbb10782bf368c93aab3490
SHA512 9b833ca11105ea99edf1673885ccee007e00388751d75fad48a3a4bfeb228df90e33ca724efc8b1bf7715a1064fc0f09f962be3264513a8778d46bdcfd1178a1

/data/data/com.turnexample15/kl.txt

MD5 fc9e31162036675d524c0bef9313e5a9
SHA1 d1774f097ade50a3f71966a10d9560372c9e86c9
SHA256 f6d771ea37d2d644ca6379115c58f52da81c9b6a40f3334796c4fdab78431528
SHA512 2373b443d52cb7169ac0d97527f4492a3471e46d9a975d67181a74209a19db065e6994440d1a39c833043e519ae6510360591265470967e5adaad16378ed6c9f

/data/data/com.turnexample15/cache/oat/lvseceqyhd.cur.prof

MD5 066c8bb63de7ded20938d54f393a602a
SHA1 d3d23ec74f3851201bf7c6774b9e72efcd73dc3d
SHA256 4657f92e258cf10a3effebec7e8b494382bcf8944edbfc183dcc3dad1917f969
SHA512 a7c5e2c72c306d7369fdafb88e74553df27b78b2aac81998d7a85768af59ffc15d7b48cd5eb27453cc100d9c5d1d3b0c2e1052a129e4001d594d8efe7ecaa8bf

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-13 23:41

Reported

2024-06-13 23:44

Platform

android-x64-arm64-20240611.1-en

Max time kernel

179s

Max time network

188s

Command Line

com.turnexample15

Signatures

Octo

banker trojan infostealer rat octo

Octo payload

Description Indicator Process Target
N/A N/A N/A N/A

Loads dropped Dex/Jar

evasion
Description Indicator Process Target
N/A /data/user/0/com.turnexample15/app_DynamicOptDex/CWH.json N/A N/A
N/A /data/user/0/com.turnexample15/cache/lvseceqyhd N/A N/A
N/A /data/user/0/com.turnexample15/cache/lvseceqyhd N/A N/A

Makes use of the framework's Accessibility service

collection evasion credential_access
Description Indicator Process Target
Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId N/A N/A
Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId N/A N/A

Obtains sensitive information copied to the device clipboard

collection credential_access impact
Description Indicator Process Target
Framework service call android.content.IClipboard.addPrimaryClipChangedListener N/A N/A

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

banker discovery

Queries the phone number (MSISDN for GSM devices)

discovery

Acquires the wake lock

Description Indicator Process Target
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A

Makes use of the framework's foreground persistence service

evasion persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.setServiceForeground N/A N/A

Performs UI accessibility actions on behalf of the user

evasion
Description Indicator Process Target
N/A android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction N/A N/A
N/A android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction N/A N/A
N/A android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction N/A N/A
N/A android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction N/A N/A

Queries the mobile country code (MCC)

discovery
Description Indicator Process Target
Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone N/A N/A

Reads information about phone network operator.

discovery

Requests accessing notifications (often used to intercept notifications before users become aware).

collection credential_access
Description Indicator Process Target
Intent action android.settings.ACTION_NOTIFICATION_LISTENER_SETTINGS N/A N/A

Requests disabling of battery optimizations (often used to enable hiding in the background).

evasion
Description Indicator Process Target
Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS N/A N/A

Uses Crypto APIs (Might try to encrypt user data)

impact
Description Indicator Process Target
Framework API call javax.crypto.Cipher.doFinal N/A N/A

Checks CPU information

Description Indicator Process Target
File opened for read /proc/cpuinfo N/A N/A

Checks memory information

Description Indicator Process Target
File opened for read /proc/meminfo N/A N/A

Processes

com.turnexample15

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
GB 142.250.200.10:443 tcp
GB 142.250.200.10:443 tcp
US 1.1.1.1:53 cm603lzeyxdw.space udp
US 1.1.1.1:53 www.ip-api.com udp
US 208.95.112.1:80 www.ip-api.com tcp
RU 185.161.248.142:443 cm603lzeyxdw.space tcp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 216.58.213.8:443 ssl.google-analytics.com tcp
US 1.1.1.1:53 5a9udxg6l6gd.su udp
RU 185.161.248.142:443 5a9udxg6l6gd.su tcp
GB 142.250.187.238:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.187.238:443 android.apis.google.com tcp
US 1.1.1.1:53 golevasi800.top udp
RU 185.161.248.142:443 5a9udxg6l6gd.su tcp
GB 142.250.179.228:443 tcp
GB 142.250.179.228:443 tcp
US 1.1.1.1:53 arw2he7x57wp.pw udp
RU 185.161.248.142:443 arw2he7x57wp.pw tcp
US 1.1.1.1:53 cm603lzeyxdw1.site udp
US 1.1.1.1:53 cm603lzeyxdw.biz udp
RU 185.161.248.142:443 arw2he7x57wp.pw tcp
US 1.1.1.1:53 9r8i1u84t2gp.online udp
RU 185.161.248.142:443 9r8i1u84t2gp.online tcp
US 1.1.1.1:53 cm603lzeyxdw.site udp
RU 185.161.248.142:443 cm603lzeyxdw.site tcp
US 1.1.1.1:53 9r8i1u84t2gp1.online udp
RU 185.161.248.142:443 9r8i1u84t2gp1.online tcp
US 1.1.1.1:53 www.google.com udp
GB 216.58.201.100:443 www.google.com tcp
RU 185.161.248.142:443 9r8i1u84t2gp1.online tcp
RU 185.161.248.142:443 9r8i1u84t2gp1.online tcp
RU 185.161.248.142:443 9r8i1u84t2gp1.online tcp
RU 185.161.248.142:443 9r8i1u84t2gp1.online tcp
RU 185.161.248.142:443 9r8i1u84t2gp1.online tcp
US 1.1.1.1:53 musherpicka.live udp
US 1.1.1.1:53 arw2he7x57wp1.pw udp
RU 185.161.248.142:443 arw2he7x57wp1.pw tcp
RU 185.161.248.142:443 arw2he7x57wp1.pw tcp
RU 185.161.248.142:443 arw2he7x57wp1.pw tcp
GB 216.58.201.100:443 www.google.com tcp
RU 185.161.248.142:443 arw2he7x57wp1.pw tcp
RU 185.161.248.142:443 arw2he7x57wp1.pw tcp
RU 185.161.248.142:443 arw2he7x57wp1.pw tcp
RU 185.161.248.142:443 arw2he7x57wp1.pw tcp
RU 185.161.248.142:443 arw2he7x57wp1.pw tcp

Files

/data/user/0/com.turnexample15/app_DynamicOptDex/CWH.json

MD5 5f107804ff0e326c6ef94d24b49ad99a
SHA1 661252e40944de34643c898f815b386e359cab4e
SHA256 84b3701df0766799818eeb463187d61527180eea2968d1c64d5a8568b35b486d
SHA512 6e52bc80e1a5752d76db1ba61aff38b3d77e75f9f9308a2146ccc944fc8639140e169791af459264b995d1433432fa1fb595f03172266f445f7d8406dc9dc784

/data/user/0/com.turnexample15/app_DynamicOptDex/CWH.json

MD5 ea069c09435e9b22d791136a680581b5
SHA1 4e8ea1f9fb336ea31b23aed7fed4ed12fac054c2
SHA256 ba3062904be94cdc2d0154093ad54a52b97d8cef7fb0c188a425794d7e0c37b9
SHA512 ddb016acc841b607c65f49f5be5fa503ed3beaf56580c04e86aacb24269215b69495343cf2e97334a9ec92acfe3fcc205ff47322b63409645673d5797bbe363f

/data/user/0/com.turnexample15/app_DynamicOptDex/CWH.json

MD5 5ae419f42981cff6894434c9f79467c3
SHA1 00c55eadd6fc960a89f6d6e27f6f8b02431e0f55
SHA256 eca7f673d1be3ef858c03ec4f79c07467fe4dd9f37e47c4a325ca433f09d594b
SHA512 314438b93ee9bb03cf49ef2a3339a5ece79dc6bbdb7f681770e418e5349a991e9b98c4e290814959deb1d4b3979dc51e0254adcb2da9727ea2b69e3929d6f762

/data/user/0/com.turnexample15/cache/lvseceqyhd

MD5 6f3cf16d8a64cda396cf0e14be0dee13
SHA1 b99ff2737cdd8244e3cd7b616279b3e6a138526a
SHA256 f85d16490d4a5725516476ff48bece912ae923f132f42cd88a22197929f2cfc6
SHA512 fffbe48dbb14fec6435ca28556a1ff2e01f4e9259194fe6c85e76329c23f94e8344e2a780aa44d931b6dbf04f9d210cfed0ce5e9b9746539fe04983142b9173a

/data/user/0/com.turnexample15/kl.txt

MD5 6311c3fd15588bb5c126e6c28ff5fffe
SHA1 ce81d136fce31779f4dd62e20bdaf99c91e2fc57
SHA256 8b82f6032e29a2b5c96031a3630fb6173d12ff0295bc20bb21b877d08f0812d8
SHA512 2975fe2e94b6a8adc9cfc1a865ad113772b54572883a537b02a16dd2d029c0f7d9cca3b154fd849bdfe978e18b396bcf9fa6e67e7c61f92bdc089a29a9c355c6

/data/user/0/com.turnexample15/kl.txt

MD5 edf4ce22c679e479a9a35d77ddd69113
SHA1 2472e79a1a28bcd2819cae3cce0cfdeef0086bec
SHA256 1bab012388667c5838abacb44c913886b09cf6f2a7b440c131fc0284fa012f17
SHA512 ae5922d2e3c10bb15a2fec19a853a33ed9e651d6dfa4664180f291cc51bd9e3e7c7cbd81cbef37a42aa0d7549dbe1c7c3670ba0b778062177f2d170276ef8e46

/data/user/0/com.turnexample15/kl.txt

MD5 4b5400c2121e7a4e69a18574ca28ceb4
SHA1 418d7a84c943a43d69c88c353948ef0674c736c9
SHA256 1fda99cf11b2c5fd622c9ec767da0b6d3355d7f1a776e61fc62df7e02f2a14dd
SHA512 2456b33045189c2c061f8ef13e9830e45772af16e1903199f5911f8e06baebdd90aea2f9b918f65dba5ae85902837a49dbf0f2fd241cec8e4c5a8c5b7f53b82e

/data/user/0/com.turnexample15/kl.txt

MD5 86e948028829e1b62ed3cf439d0de612
SHA1 6a727c47bba30dd9b08a5d6e089a8f7019a8bfda
SHA256 5e3d1b4351420a419ab4c5623ec16e68a05c7423ae34beaa1b254179d2205881
SHA512 518ed0726fbb3a1b5711f4db122596d680794937ab478bf0968826f3cbac8430fdf721480b9ccf4345f1072d3acfd9fb5fb2f1182eaefb59430601d4e801abd5

/data/user/0/com.turnexample15/kl.txt

MD5 2f6d34fa532c4e653f5450fe58169d42
SHA1 6671074e340b1595ab28143cc60da77dc0ba4532
SHA256 ea6f72dec10b73bc9a65e0b634b1cb052226217e5a020281feec3382e9eb70bd
SHA512 0517729634e5cc55e36d1cddacffe81caffff153d27208957145463903f1bc38755cd6faf22d76b8baf7bf15ae6204440de48b40e1174bef6fbc11357515c45c

/data/user/0/com.turnexample15/cache/oat/lvseceqyhd.cur.prof

MD5 bf33e86da9c939ca51f3f2608013b20a
SHA1 0287202adbd93341ebc2684d192ecb60a7185758
SHA256 f1fd1f07026f8bb813cd2d3d19f3f0c9b4248105a545f5f21449865585bc37b1
SHA512 11fb61c965cb37315b5a2cd5d94020ffa74f18e11029c517c519bcbb16909563d67e543175c59cad1ca4fe3ba57f5b0663e035f4eedd466eb08f571e60c265a2