Malware Analysis Report

2024-07-28 11:30

Sample ID 240613-k8621swflr
Target a4cf186b366af1716ecb5047469fba7c_JaffaCakes118
SHA256 87ba1ec9955a6593cc6967cee43a8fabd0f5b6ea1f2e2565a29a1fdce8a18311
Tags
collection discovery evasion impact persistence
score
8/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
8/10

SHA256

87ba1ec9955a6593cc6967cee43a8fabd0f5b6ea1f2e2565a29a1fdce8a18311

Threat Level: Likely malicious

The file a4cf186b366af1716ecb5047469fba7c_JaffaCakes118 was found to be: Likely malicious.

Malicious Activity Summary

collection discovery evasion impact persistence

Checks if the Android device is rooted.

Requests cell location

Queries information about the current nearby Wi-Fi networks

Queries information about running processes on the device

Queries information about the current Wi-Fi connection

Requests dangerous framework permissions

Acquires the wake lock

Queries information about active data network

Reads information about phone network operator.

Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

Registers a broadcast receiver at runtime (usually for listening for system events)

Uses Crypto APIs (Might try to encrypt user data)

Checks memory information

Checks CPU information

MITRE ATT&CK Matrix

N/A

Analysis: static1

Detonation Overview

Reported

2024-06-13 09:17

Signatures

Requests dangerous framework permissions

Description Indicator Process Target
Allows an application to read from external storage. android.permission.READ_EXTERNAL_STORAGE N/A N/A
Allows an app to access approximate location. android.permission.ACCESS_COARSE_LOCATION N/A N/A
Allows an app to access precise location. android.permission.ACCESS_FINE_LOCATION N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows an application to read or write the system settings. android.permission.WRITE_SETTINGS N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-13 09:17

Reported

2024-06-13 09:20

Platform

android-x86-arm-20240611.1-en

Max time kernel

178s

Max time network

171s

Command Line

com.nophone.android

Signatures

Checks if the Android device is rooted.

evasion
Description Indicator Process Target
N/A /system/bin/su N/A N/A
N/A /system/xbin/su N/A N/A

Queries information about running processes on the device

discovery
Description Indicator Process Target
Framework service call android.app.IActivityManager.getRunningAppProcesses N/A N/A

Queries information about the current nearby Wi-Fi networks

discovery
Description Indicator Process Target
Framework service call android.net.wifi.IWifiManager.getScanResults N/A N/A
Framework service call android.net.wifi.IWifiManager.getScanResults N/A N/A

Requests cell location

collection discovery evasion
Description Indicator Process Target
Framework service call com.android.internal.telephony.ITelephony.getCellLocation N/A N/A

Acquires the wake lock

Description Indicator Process Target
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A

Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

Description Indicator Process Target
N/A alog.umeng.com N/A N/A
N/A alog.umeng.com N/A N/A

Queries information about active data network

discovery
Description Indicator Process Target
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A

Queries information about the current Wi-Fi connection

discovery
Description Indicator Process Target
Framework service call android.net.wifi.IWifiManager.getConnectionInfo N/A N/A
Framework service call android.net.wifi.IWifiManager.getConnectionInfo N/A N/A

Reads information about phone network operator.

discovery

Registers a broadcast receiver at runtime (usually for listening for system events)

persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.registerReceiver N/A N/A
Framework service call android.app.IActivityManager.registerReceiver N/A N/A

Uses Crypto APIs (Might try to encrypt user data)

impact
Description Indicator Process Target
Framework API call javax.crypto.Cipher.doFinal N/A N/A

Checks CPU information

Description Indicator Process Target
File opened for read /proc/cpuinfo N/A N/A

Checks memory information

Description Indicator Process Target
File opened for read /proc/meminfo N/A N/A

Processes

com.nophone.android

com.nophone.android:remote

/system/bin/cat /sys/devices/system/cpu/cpu0/cpufreq/cpuinfo_max_freq

/system/bin/cat /sys/devices/system/cpu/cpu0/cpufreq/cpuinfo_min_freq

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 alog.umeng.com udp
CN 223.109.148.176:80 alog.umeng.com tcp
US 1.1.1.1:53 loc.map.baidu.com udp
HK 103.235.46.246:80 loc.map.baidu.com tcp
US 1.1.1.1:53 semanticlocation-pa.googleapis.com udp
HK 103.235.46.246:80 loc.map.baidu.com tcp
US 1.1.1.1:53 api.skyhookwireless.com udp
FR 13.37.206.148:443 api.skyhookwireless.com tcp
CN 101.251.199.38:8302 tcp
US 1.1.1.1:53 pingma.qq.com udp
CN 119.45.78.184:80 pingma.qq.com tcp
CN 223.109.148.130:80 alog.umeng.com tcp
GB 142.250.187.206:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.200.46:443 android.apis.google.com tcp
CN 223.109.148.177:80 alog.umeng.com tcp
GB 172.217.169.10:443 semanticlocation-pa.googleapis.com tcp
CN 223.109.148.178:80 alog.umeng.com tcp
CN 223.109.148.179:80 alog.umeng.com tcp
CN 223.109.148.141:80 alog.umeng.com tcp
US 1.1.1.1:53 alog.umeng.co udp
US 1.1.1.1:53 alog.umeng.com udp
CN 223.109.148.177:80 alog.umeng.com tcp
CN 223.109.148.179:80 alog.umeng.com tcp
CN 223.109.148.176:80 alog.umeng.com tcp
CN 223.109.148.141:80 alog.umeng.com tcp

Files

/data/data/com.nophone.android/files/umeng_it.cache

MD5 7a6f22f92633932599536cdd6deef821
SHA1 8503564af283eec851347b0d220ff6f364149338
SHA256 8baac788a6a4c7cee8b1ca2313433c212337b625ddeb9da1a18aae0d3b62219b
SHA512 a893a69775927406d4b893e7773ba2d45ec4fbaa5a125cad78c114b4574c2befe5fa1308eee646ade96b6b817e46fdc2f9ef77697db5a42baa022f9fca8becdb

/storage/emulated/0/baidu/tempdata/ls.db-journal

MD5 4bb0f84d4b25a8d48df8697c347ccf0a
SHA1 fb74d61d757774d5777b02ec330171d6699f47d3
SHA256 e278dad743bb2de3fcd64d42c24172aaaee391a8249acd447b27963b43f619a1
SHA512 986fccade67f20f5a1784510612e6543a5b9582732e067373095821c8090a43cb0252db63cd42481ad88d685ba96e8ec150ef5328f11f3043923a77775b6c9b2

/storage/emulated/0/baidu/tempdata/ls.db

MD5 dcd16e080581b0b2293503167bdb6f96
SHA1 6e3e81d122a85c6879ac3e1d230fbc541d82d916
SHA256 f5e80f34ccb87671bfda1dd169146356d350ad8ffc3ab77d8f48979b8071998a
SHA512 dec2085da8d7e1174d1a046b519837d4905488bbeac025635347dd442d30479ffdc58fb0bad5eeebbd2de40c878b23130a67794cfb94aebb1e3d864499482525

/storage/emulated/0/baidu/tempdata/ls.db-shm

MD5 670d8bc46551c40a1fb9ff8ec4b72092
SHA1 82253b089122b4d8c7ae61dbbeabd9d037ddd49c
SHA256 ca2684e4da544d08c906c70f147d8dbc91da3a7972d255e6a00e1c99419f78e2
SHA512 4977d35230c533e26162cb0e4da38345a23a87ff41510685e755a52152fc78d0b027e8e8942fe10ae28fe332b16bb9a7ba0c0644ec0efd635d579515c3d5df67

/storage/emulated/0/baidu/tempdata/ls.db-wal

MD5 493b16ca539b4f8974bdb033c78e515a
SHA1 29e98fb1bb4f71f7ccc9305957f60fda71098fde
SHA256 37e31742e99a79be02c72371112a5e8045acdb03391908bf3580311f219bd28c
SHA512 142e7ac93e705635e95f0bd00f52046b5467ff7439d50424a279920eaf5136e1e71c60e5bbc3080b87b392cfeb558e53d6086ee292090fa6cc36e2a95acb65d6

/data/data/com.nophone.android/files/lldt/firll.dat

MD5 0e1e1d3c18c5264bfd4d78a215dbc1a5
SHA1 d6321fd0cecfd1efb71ed1c51ba78ccb0289e64d
SHA256 cb54ea9d1c8b61937da43f2e1c5e18af9ca3102241b4865745a437ac5bc8d567
SHA512 8a21b587a8f4bb920ea7be86351fa292c38c8d5dbb9408a075b1118c7d2d31bf19651c13b7391b76e2df5ebc8637979eb73ef69eac424f7bbb06baa216eff235

/storage/emulated/0/baidu/tempdata/lcvif.dat

MD5 e05592318034e17ce0bb2ea5e0058ccf
SHA1 0bee04f09ff52da852d20090f8f6064a3d8e853b
SHA256 71900eec05efac039c59c22f741f016590439d1408403933c9edf88e0111bf40
SHA512 1762c600517e33f7b085977f25aaf776f98ad8f516932afc444e0924141073a3a9e0d10030d1deaaf169416c951ada7410e3739b158d7c7f008664c60f2fecbc

/storage/emulated/0/baidu/tempdata/conlts.dat

MD5 ded6233c6759a530b874b3153df983bc
SHA1 b65fecb8cc4eff13f24ccd9c228dd08852108de5
SHA256 2daa2d0ee5092465802ab25f4188e9b724f6a9ae3609d606c596acdcce9b3474
SHA512 47c917738df60cce168a44cb7e58580bc1c3d264df973988d540416708e6d4ba66124b5971d25163e9012c2b63215685740286298cb8e6d54255f506b0c23ffe

/storage/emulated/0/baidu/tempdata/conlts.dat

MD5 06d33fe258e9a93bed28f7f3b57998ed
SHA1 e6d0524a2f51a21b21263d2e80f471b1b5b96d54
SHA256 ad4a60de2879f7141ccd97f7126b1d12689d083d9d5ce057c2c8efab6b7b88fd
SHA512 48e4e418943f7d4e2aa8eadef60dbc444def635acf997c518847bebbc9a4dd6eb605662b9b36c651b9fc6e5778f4b67257d84b94f8370435159dacd2eef0ce94

/storage/emulated/0/baidu/tempdata/lcvif.dat

MD5 b1c7d9b793258fe25284a817e1f3df9e
SHA1 fede8446dc354c63e31e54c17711372995f8938f
SHA256 9b199f2c16bab2b6a529ed8ab8e3d44a80aea4a5834be51b1a3ef3ce6c0cb4d5
SHA512 0462f79fdac50d09d7e1e77ee91d05846823d5b87ecc71701a212764f5e6b686f187561ff66491b76546826e6f571020fe61d13a2f58d84809daeea4d51c604d

/data/data/com.nophone.android/files/lldt/offinfo.dat

MD5 4ddbc5dd33fb4974390075e721bc74e8
SHA1 b068b63288988cc2b25c5d5c07a92494bb6bde7e
SHA256 71a190fb80c3462235f2570b3cb3b3bfe71029bf27d3ef018b4b61bcd8a049dd
SHA512 8d273ade647b790d90b1d623f09e6630afe7504d72ced709c8551753475aaec4b6a5f0774e3387ea7ab010aef084bc9aaa046272bd39d0a848baa7f9e8f82649

/storage/emulated/0/baidu/tempdata/yoh.dat

MD5 a936690571e9104e1922dda4a0ba5bd1
SHA1 65f49c57edde2f96be2a1dbdfc3f7351f1e66554
SHA256 f0f5049c51879dd7da0ce4a43349b5b34ce053d072a0ca704f62cf22ba4a8412
SHA512 3be1c3693963aebdfc04e86b1c820ee0ec3cf0b200e6a4788ef1141f39fd6c2f77f4227247ae4affa66c0a6c027df8466cc0dcec1e67ebfb953e36bee97de394

/storage/emulated/0/baidu/tempdata/yoh.dat

MD5 1681ffc6e046c7af98c9e6c232a3fe0a
SHA1 d3399b7262fb56cb9ed053d68db9291c410839c4
SHA256 9d908ecfb6b256def8b49a7c504e6c889c4b0e41fe6ce3e01863dd7b61a20aa0
SHA512 11bb994b5d2eab48b18667c7d8943e82c9011cb1d974304b8f2b6247a7e6b7f55ca2f7c62893644c3728d17dafd74ae3ba46271cf6287bb9e751c779a26fefc5

/data/data/com.nophone.android/databases/pri_wxop_tencent_analysis.db

MD5 f2b4b0190b9f384ca885f0c8c9b14700
SHA1 934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA256 0a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512 ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1

/data/data/com.nophone.android/databases/wxop_tencent_analysis.db-wal

MD5 32ea229c6e9d209c0840f797bebcbe9b
SHA1 fdada7914d249bdf7804f6e75e1503305355d5aa
SHA256 971e474ee35e355d8fe4847ef914cb0cde1b49c1d75229f9ae8296329c72fa32
SHA512 89a88847abb68cb2e97ceb69d03698d70a8b941265d5d7205764c698b14c98ec4e6584c8173b7b07eb8018fee5103799ecaf53595451c02d859b310d6b5a0105

/data/data/com.nophone.android/files/mobclick_agent_sealed_com.nophone.android

MD5 16b91c7e528be67e4dfd70545384f9bc
SHA1 08615c43fe19be3c3790a8b566c990ac32f96488
SHA256 91086a7cd6a760a5307e4995503ab8ae535212d059b89cad1620cbdd768296e3
SHA512 168ae6f9a072c5ec3b22970cdddf45bfef312f6f82f3a1c5fb6d74b9c5e347bda728bea9260e1678e562efc5fe3476d461077d95906f78c385fdf719b3470217

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-13 09:17

Reported

2024-06-13 09:20

Platform

android-x64-arm64-20240611.1-en

Max time kernel

179s

Max time network

147s

Command Line

com.nophone.android

Signatures

Checks if the Android device is rooted.

evasion
Description Indicator Process Target
N/A /system/bin/su N/A N/A

Queries information about running processes on the device

discovery
Description Indicator Process Target
Framework service call android.app.IActivityManager.getRunningAppProcesses N/A N/A

Queries information about the current nearby Wi-Fi networks

discovery
Description Indicator Process Target
Framework service call android.net.wifi.IWifiManager.getScanResults N/A N/A
Framework service call android.net.wifi.IWifiManager.getScanResults N/A N/A

Requests cell location

collection discovery evasion
Description Indicator Process Target
Framework service call com.android.internal.telephony.ITelephony.getCellLocation N/A N/A

Acquires the wake lock

Description Indicator Process Target
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A

Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

Description Indicator Process Target
N/A alog.umeng.com N/A N/A
N/A alog.umeng.com N/A N/A

Queries information about active data network

discovery
Description Indicator Process Target
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A

Queries information about the current Wi-Fi connection

discovery
Description Indicator Process Target
Framework service call android.net.wifi.IWifiManager.getConnectionInfo N/A N/A
Framework service call android.net.wifi.IWifiManager.getConnectionInfo N/A N/A

Reads information about phone network operator.

discovery

Checks CPU information

Description Indicator Process Target
File opened for read /proc/cpuinfo N/A N/A

Checks memory information

Description Indicator Process Target
File opened for read /proc/meminfo N/A N/A

Processes

com.nophone.android

com.nophone.android:remote

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
GB 142.250.187.238:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.187.206:443 android.apis.google.com tcp
US 1.1.1.1:53 alog.umeng.com udp
CN 223.109.148.141:80 alog.umeng.com tcp
US 1.1.1.1:53 ssl.google-analytics.com udp
US 1.1.1.1:53 loc.map.baidu.com udp
HK 103.235.47.89:80 loc.map.baidu.com tcp
HK 103.235.47.89:80 loc.map.baidu.com tcp
US 1.1.1.1:53 api.skyhookwireless.com udp
FR 13.37.206.148:443 api.skyhookwireless.com tcp
CN 101.251.199.38:8302 tcp
US 1.1.1.1:53 pingma.qq.com udp
CN 119.45.78.184:80 pingma.qq.com tcp
CN 223.109.148.130:80 alog.umeng.com tcp
CN 223.109.148.177:80 alog.umeng.com tcp
CN 223.109.148.178:80 alog.umeng.com tcp
GB 142.250.180.4:443 tcp
GB 142.250.180.4:443 tcp
US 1.1.1.1:53 www.google.com udp
GB 216.58.212.196:443 www.google.com tcp
CN 223.109.148.176:80 alog.umeng.com tcp
CN 223.109.148.179:80 alog.umeng.com tcp
US 1.1.1.1:53 alog.umeng.co udp
US 1.1.1.1:53 android.apis.google.com udp
GB 172.217.16.238:443 android.apis.google.com tcp
US 1.1.1.1:53 alog.umeng.com udp
SG 47.246.109.108:80 alog.umeng.com tcp

Files

/data/user/0/com.nophone.android/files/umeng_it.cache

MD5 9eeb6659158e6a470707c11a6a4d1327
SHA1 af13ae1453cf16bde90ec4784d3b4c1a0b1b6e32
SHA256 cc3cc99e05b78f173235b533adacc9223a3f2f06e07f591792b6ac6683f046be
SHA512 dd5304804b6cd098bc73813055027848647372e8ab897b64f91eb7ec7bd43f32263d92ccfbff4120ee2f317f7cb0288bd234b9a9a3aa266600fb6192dba99106

/storage/emulated/0/baidu/tempdata/ls.db-journal

MD5 d49d7954856af1367cc4234003f83406
SHA1 2b14125332ff63565c83027adae8d070d21a870d
SHA256 0cb364f2b8459fcb1c39c4470add3c267f86acf5484e6f5ad1494ec7bb3622d3
SHA512 290e016c5748d77d4abf604fd2d5ce15c5ec18c36c9e030487f7759fffe7410fe18f46d8335f03f7cd120b87b24f212929f6c585948859b69493fd6958b35068

/storage/emulated/0/baidu/tempdata/ls.db

MD5 847f28bd957f7dd14d2628e3e3f7a920
SHA1 6e0bedd7589cfc5ecdf3d27b40b4e27727663215
SHA256 5f3d2dff24a2d845f16661f2898a8841a2907d3916b9316863010222f4d77464
SHA512 6194047dce59a03f651ca8c1f3c07eaffc7403a2871647b2a78bb5883762bd83f6a66217c148024cad91b32f9571344c570a28344ed0884b1607ae181bb5b0c8

/storage/emulated/0/baidu/tempdata/ls.db-journal

MD5 a14440077daa33bf620bfe9373de4d0c
SHA1 33cb95f102193fcb5fc5d361cdb408900496c0fb
SHA256 cfd9e95be6fd63a44ac9a3f092afdc03dd16c06c5ef22efa5d36789875113e93
SHA512 ca8468b94651d7fb690cafc51019657eb5ddd042fc96a13532d8f08ce8bce161fd54d8192f719bbf62957169d5630f51f5063a7fb73a462624b098605b9e51ec

/storage/emulated/0/baidu/tempdata/ls.db-journal

MD5 ba07ad1d39dc5ede89f1e1842ba11efe
SHA1 0cb4eff1e00caaf645f9eb25a4c5d83e5819cb9d
SHA256 11f966dcfc12e23af4ab9edd6e0573e7ecdd7a47d587dfaaeaa5ed52e4c9c539
SHA512 966c9e1b3ee364df1af8ed6a74c6663bf024483f446bd69d35986bcc8b998c9431a0d355d7f8eb1feb8dc66186d294bea280871f194e42ca8b308bdfb1484356

/storage/emulated/0/baidu/tempdata/ls.db-journal

MD5 a81ca526c89075bb329d8a78fa9c78d1
SHA1 33f941d5f6e480bde7192e6d8cb521332cc99ea6
SHA256 0451e0649a7d4ce87aef79d4e6efa98f988531b9dd6ed9ea04557e642395ae90
SHA512 8022b622727bce5ff8fa682b3cd7f1d50e9837914134d583afd16357b5955199b1a82ebdf494734d40d5638faebbbb1e1916a35e45f264c4c504321cfea0f132

/storage/emulated/0/baidu/tempdata/ls.db-journal

MD5 df9c303f5969fb35c956a920453ebde0
SHA1 df4337d036f3aee01bbef956e0c4f7a6133754c3
SHA256 7fc87d705ee9f29b76a27346c9be6f192872dc132dc5312a770b6cc85b132218
SHA512 7969100c286e3760b174c3a006bde1e9dec24967f8f6b8479ac4fa1dbdbe0a47b48245a7e3ac57c3974ff5d50988da37a6dd3c21381d5246308787d7fde4710e

/data/user/0/com.nophone.android/files/lldt/firll.dat

MD5 6325f6d53a82cb93f5c390435569665a
SHA1 27770c0b1936fcb9c09ce807b5396ee5af52be24
SHA256 a22bc2609ff9d0c8c81c709ef855e76cd11ad400917e5c5f85a0138cbe4fb171
SHA512 ba9c3b65809786edd14fbcf3453817661214996d38fc3b8a6b2f695956a901220ac2fba28dd1d667afb101df2ed8626d39e6c3e4fc1c9b902b92a8c663eae8cf

/storage/emulated/0/baidu/tempdata/lcvif.dat

MD5 81140aa3b169becb6510a23289065884
SHA1 73b6af88a4a6482fe54ee8643a35c6a0e03db3b4
SHA256 324a80cc90bc0f5bcd810d85e60094e155a616689cde870229fcdc304d48e689
SHA512 bfde72f4d755e7842276066825650f2957601b942fe606900889fc4b5d6bc2ed2a5b688f8763e31d43ad4b47b5d27f5f92f0313f1e551dd5506d436429254d48

/storage/emulated/0/baidu/tempdata/conlts.dat

MD5 5b56e8d3d1ec4af18a68a856add682a3
SHA1 94f782b250eb6cf2e55c488c727c0e79a8cbd673
SHA256 6bbc5367d55b7c12e9a1f1db6e79ede28d24a233ec1bd8ef5d17a00e35c940ae
SHA512 794ef3a0961e3942d730e66bcebab746ee0a63986b80b7aceeaf146c9bdd10a126b4ddce321aad21051bb3c1ebbf4ccf0447d9a8e75da54d757e43641fe0958a

/storage/emulated/0/baidu/tempdata/conlts.dat

MD5 13746e63f1529d23f6ac5dd8c11d21dd
SHA1 138ebbfdf14bd3d7791d7f38aee8292faa248d65
SHA256 5d7200f44ec45c7298236256b3ceb6a867e338a5000b2afe4099bad6f48c88c9
SHA512 5b2a1c6e5d9c50837c25776d510332d645006ef2be663f580225a547dc8c09eb2ae50abdf688ac988191ea24a8a55908eac5c92cc9b3cce111b8e361dca463af

/storage/emulated/0/baidu/tempdata/lcvif.dat

MD5 ab8f5e8aa63c4734b12a4c408a1af551
SHA1 3b340c2c78223c91d349725c885b1620145b826c
SHA256 69192aa9c7200c047834f831ebf4f0ebc6e5b0d82865e3fa70a233a20fd400ab
SHA512 e78d74a23225fa0464ce4fd6d9bb2c9e4535957f07b113fc6bc08587ada414c8997d772169b6009d3184933e2b8a04fb7e0fc6d32041ce47150e17c3370bb12c

/data/user/0/com.nophone.android/files/lldt/offinfo.dat

MD5 4ddbc5dd33fb4974390075e721bc74e8
SHA1 b068b63288988cc2b25c5d5c07a92494bb6bde7e
SHA256 71a190fb80c3462235f2570b3cb3b3bfe71029bf27d3ef018b4b61bcd8a049dd
SHA512 8d273ade647b790d90b1d623f09e6630afe7504d72ced709c8551753475aaec4b6a5f0774e3387ea7ab010aef084bc9aaa046272bd39d0a848baa7f9e8f82649

/storage/emulated/0/baidu/tempdata/yoh.dat

MD5 a936690571e9104e1922dda4a0ba5bd1
SHA1 65f49c57edde2f96be2a1dbdfc3f7351f1e66554
SHA256 f0f5049c51879dd7da0ce4a43349b5b34ce053d072a0ca704f62cf22ba4a8412
SHA512 3be1c3693963aebdfc04e86b1c820ee0ec3cf0b200e6a4788ef1141f39fd6c2f77f4227247ae4affa66c0a6c027df8466cc0dcec1e67ebfb953e36bee97de394

/storage/emulated/0/baidu/tempdata/yoh.dat

MD5 1681ffc6e046c7af98c9e6c232a3fe0a
SHA1 d3399b7262fb56cb9ed053d68db9291c410839c4
SHA256 9d908ecfb6b256def8b49a7c504e6c889c4b0e41fe6ce3e01863dd7b61a20aa0
SHA512 11bb994b5d2eab48b18667c7d8943e82c9011cb1d974304b8f2b6247a7e6b7f55ca2f7c62893644c3728d17dafd74ae3ba46271cf6287bb9e751c779a26fefc5

/data/user/0/com.nophone.android/databases/wxop_tencent_analysis.db-journal

MD5 d298ff46d01c7db559147891b095b4db
SHA1 f38acf353b354473cc496ebf2125bd28f425a72f
SHA256 7e98519abc145cefa26e552484d2de326b9856e5e6ae4bd8dc50bec2819d4027
SHA512 2248a3d2152a3d9e5cea5e0553971d25e0e78833af43a0318e2298f80b3198857da800a0d5fc87249783a19ff27da3585252764f2d8cd80765c8caf6086b2b2a

/data/user/0/com.nophone.android/databases/wxop_tencent_analysis.db-journal

MD5 f8db587031ca7617a3ae70403136715c
SHA1 4898db74b7211c664519043d107135ecb1665b6e
SHA256 4f59f5a24962114ebf2a0c44c1657aea06214abe2ea990e2971b16d20edd8219
SHA512 cd27a1abbf97747a40f1dfd3b63c6375c0d4f78e91d38c9dedddca6f96af6a96673848e1faffe301c3fa5309f3a00464a08ac8e1d8551ea6b2de1fd48ac2b4c3

/data/user/0/com.nophone.android/files/umeng_it.cache

MD5 fd1e0efed1f3f2fe05d24e74887854df
SHA1 4cdbfa649910484bc5255361248ec380207010d2
SHA256 20116fa5e160cbc1b9680173b9f95ef217f98a6733971096f29d257a9398d3f8
SHA512 c809f820f453a72f248def6d953b581ea8ab4240bc51b5d80c2a42c17934723e39861454385908e403b6a7a9df0d367b7d101bc0a4d625ec34386908cc2e14a8