Malware Analysis Report

2025-01-19 04:50

Sample ID 240618-jgdqqatcpd
Target ba7f7f013a817bf77253370452514d05_JaffaCakes118
SHA256 a1b9eae661910cffe5e55ee407e69bb64c93eb26352bfb29e66c2632e080c1b4
Tags
banker collection discovery evasion execution impact persistence
score
8/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Mobile Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral4

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral5

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
8/10

SHA256

a1b9eae661910cffe5e55ee407e69bb64c93eb26352bfb29e66c2632e080c1b4

Threat Level: Likely malicious

The file ba7f7f013a817bf77253370452514d05_JaffaCakes118 was found to be: Likely malicious.

Malicious Activity Summary

banker collection discovery evasion execution impact persistence

Checks if the Android device is rooted.

Queries the phone number (MSISDN for GSM devices)

Checks known Qemu pipes.

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

Requests cell location

Reads the content of photos stored on the user's device.

Checks known Qemu files.

Queries information about running processes on the device

Queries information about the current nearby Wi-Fi networks

Queries information about active data network

Queries information about the current Wi-Fi connection

Reads information about phone network operator.

Requests dangerous framework permissions

Queries the unique device ID (IMEI, MEID, IMSI)

Listens for changes in the sensor environment (might be used to detect emulation)

Uses Crypto APIs (Might try to encrypt user data)

Schedules tasks to execute at a specified time

Registers a broadcast receiver at runtime (usually for listening for system events)

Checks CPU information

Checks memory information

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-06-18 07:38

Signatures

Requests dangerous framework permissions

Description Indicator Process Target
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows an application to read from external storage. android.permission.READ_EXTERNAL_STORAGE N/A N/A
Allows an app to access approximate location. android.permission.ACCESS_COARSE_LOCATION N/A N/A
Allows an app to access precise location. android.permission.ACCESS_FINE_LOCATION N/A N/A
Allows an application to read or write the system settings. android.permission.WRITE_SETTINGS N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Required to be able to access the camera device. android.permission.CAMERA N/A N/A
Allows an application to record audio. android.permission.RECORD_AUDIO N/A N/A
Allows an application to request installing packages. android.permission.REQUEST_INSTALL_PACKAGES N/A N/A
Allows an app to create windows using the type LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. android.permission.SYSTEM_ALERT_WINDOW N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-18 07:38

Reported

2024-06-18 07:41

Platform

android-x86-arm-20240611.1-en

Max time kernel

179s

Max time network

187s

Command Line

com.ifeng.newvideo

Signatures

Checks if the Android device is rooted.

evasion
Description Indicator Process Target
N/A /system/xbin/su N/A N/A
N/A /system/app/Superuser.apk N/A N/A
N/A /sbin/su N/A N/A
N/A /system/bin/su N/A N/A
N/A /system/xbin/su N/A N/A
N/A /sbin/su N/A N/A
N/A /system/bin/su N/A N/A

Checks known Qemu files.

evasion
Description Indicator Process Target
N/A /system/lib/libc_malloc_debug_qemu.so N/A N/A
N/A /sys/qemu_trace N/A N/A
N/A /system/bin/qemu-props N/A N/A

Checks known Qemu pipes.

evasion
Description Indicator Process Target
N/A /dev/socket/qemud N/A N/A
N/A /dev/qemu_pipe N/A N/A

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

banker discovery

Queries information about running processes on the device

discovery
Description Indicator Process Target
Framework service call android.app.IActivityManager.getRunningAppProcesses N/A N/A
Framework service call android.app.IActivityManager.getRunningAppProcesses N/A N/A
Framework service call android.app.IActivityManager.getRunningAppProcesses N/A N/A
Framework service call android.app.IActivityManager.getRunningAppProcesses N/A N/A

Queries information about the current nearby Wi-Fi networks

discovery
Description Indicator Process Target
Framework service call android.net.wifi.IWifiManager.getScanResults N/A N/A
Framework service call android.net.wifi.IWifiManager.getScanResults N/A N/A

Queries the phone number (MSISDN for GSM devices)

discovery

Reads the content of photos stored on the user's device.

collection
Description Indicator Process Target
URI accessed for read content://media/external/images/media N/A N/A

Requests cell location

collection discovery
Description Indicator Process Target
Framework service call com.android.internal.telephony.ITelephony.getAllCellInfo N/A N/A
Framework service call com.android.internal.telephony.ITelephony.getAllCellInfo N/A N/A
Framework service call com.android.internal.telephony.ITelephony.getCellLocation N/A N/A

Queries information about active data network

discovery
Description Indicator Process Target
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A

Queries information about the current Wi-Fi connection

discovery
Description Indicator Process Target
Framework service call android.net.wifi.IWifiManager.getConnectionInfo N/A N/A
Framework service call android.net.wifi.IWifiManager.getConnectionInfo N/A N/A

Queries the unique device ID (IMEI, MEID, IMSI)

discovery

Reads information about phone network operator.

discovery

Listens for changes in the sensor environment (might be used to detect emulation)

evasion
Description Indicator Process Target
Framework API call android.hardware.SensorManager.registerListener N/A N/A
Framework API call android.hardware.SensorManager.registerListener N/A N/A

Registers a broadcast receiver at runtime (usually for listening for system events)

persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.registerReceiver N/A N/A
Framework service call android.app.IActivityManager.registerReceiver N/A N/A
Framework service call android.app.IActivityManager.registerReceiver N/A N/A
Framework service call android.app.IActivityManager.registerReceiver N/A N/A

Schedules tasks to execute at a specified time

execution persistence
Description Indicator Process Target
Framework service call android.app.job.IJobScheduler.schedule N/A N/A

Uses Crypto APIs (Might try to encrypt user data)

impact
Description Indicator Process Target
Framework API call javax.crypto.Cipher.doFinal N/A N/A
Framework API call javax.crypto.Cipher.doFinal N/A N/A

Checks CPU information

Description Indicator Process Target
File opened for read /proc/cpuinfo N/A N/A
File opened for read /proc/cpuinfo N/A N/A

Checks memory information

Description Indicator Process Target
File opened for read /proc/meminfo N/A N/A
File opened for read /proc/meminfo N/A N/A

Processes

com.ifeng.newvideo

com.ifeng.newvideo:pushservice

sh -c cat /proc/sys/kernel/random/uuid

getprop ro.product.manufacturer

cat /proc/sys/kernel/random/uuid

getprop ro.product.manufacturer

sh -c cat /sdcard/../../../../../../sdcard/..ccdid

cat /sdcard/../../../../../../sdcard/..ccdid

com.ifeng.newvideo:bdMap

com.ifeng.newvideo:pushservice

sh -c cat /sdcard/../../../../../../sdcard/..ccdid

cat /sdcard/../../../../../../sdcard/..ccdid

sh -c cat /sdcard/../../../../../../sdcard/Android/Data/System/local/.ccdid

cat /sdcard/../../../../../../sdcard/Android/Data/System/local/.ccdid

sh -c service call iphonesubinfo 1

service call iphonesubinfo 1

sh -c cd /proc/;cat cpuinfo

cat cpuinfo

sh -c cd /proc/net/ && cat arp

cat arp

sh -c ls /dev/socket

ls /dev/socket

sh -c which su

which su

sh -c cat /proc/sys/kernel/random/boot_id

cat /proc/sys/kernel/random/boot_id

sh -c cat /proc/sys/kernel/random/uuid

cat /proc/sys/kernel/random/uuid

sh -c cat /proc/sys/kernel/osrelease

cat /proc/sys/kernel/osrelease

sh -c id

id

sh -c cat

cat

sh -c cd /proc/self/;cat status

cat status

sh -c cat /proc/uptime

cat /proc/uptime

sh -c cat /proc/uptime

cat /proc/uptime

sh -c date

date

sh -c cat /sys/class/net/eth0/address

cat /sys/class/net/eth0/address

sh -c cat /sys/class/net/eth1/address

cat /sys/class/net/eth1/address

sh -c cat /sys/class/net/eth2/address

cat /sys/class/net/eth2/address

sh -c ps

ps

sh -c df

df

sh -c ls /system/fonts

ls /system/fonts

sh -c cat /proc/meminfo

cat /proc/meminfo

sh -c cat /sys/block/mmcblk0/device/cid

cat /sys/block/mmcblk0/device/cid

sh -c cat /sdcard/../../../../../../sdcard/._driver.dat

cat /sdcard/../../../../../../sdcard/._driver.dat

sh -c cat /sdcard/../../../../../../sdcard/Android/Data/System/local/_driver.dat

cat /sdcard/../../../../../../sdcard/Android/Data/System/local/_driver.dat

sh -c cat /sdcard/../../../../../../sdcard/._system.dat

cat /sdcard/../../../../../../sdcard/._system.dat

sh -c cat /sdcard/../../../../../../sdcard/Android/Data/System/local/_system.dat

cat /sdcard/../../../../../../sdcard/Android/Data/System/local/_system.dat

sh -c cat /sdcard/../../../../../../sdcard/._android.dat

cat /sdcard/../../../../../../sdcard/._android.dat

sh -c cat /sdcard/../../../../../../sdcard/Android/Data/System/local/_android.dat

cat /sdcard/../../../../../../sdcard/Android/Data/System/local/_android.dat

sh -c cd /sys/class/net/wlan0/ && cat address

sh -c cd /sys/class/net/eth0/ && cat address

sh -c ip link

ip link

sh -c cd /sys/class/net/wlan0/ && cat address

sh -c cd /sys/class/net/eth0/ && cat address

sh -c ip link

ip link

sh -c mkdir -p /sdcard/../../../../../../sdcard/Android/Data/System/local/

mkdir -p /sdcard/../../../../../../sdcard/Android/Data/System/local/

sh -c echo NjQyREQzRDBFNDYzRDcxNjcxMDY0RUJBQzM4QTcwNzkxNEQ5ODM6NkM5MjZDOjM2NzYyQw== > /sdcard/../../../../../../sdcard/Android/Data/System/local/_driver.dat

sh -c echo NjQyREQzRDBFNDYzRDcxNjcxMDY0RUJBQzM4QTcwNzkxNEQ5ODM6NkM5MjZDOjM2NzYyQw== > /sdcard/../../../../../../sdcard/._driver.dat

sh -c mkdir -p /sdcard/../../../../../../sdcard/Android/Data/System/local/

mkdir -p /sdcard/../../../../../../sdcard/Android/Data/System/local/

sh -c echo QUQ5QTQxQjQwNEIzMEYyQ0ZDRUUxNUFEQUFGNTIyMUIxNThDQkU6QjEzOERGOjkwNDRGMg== > /sdcard/../../../../../../sdcard/Android/Data/System/local/_system.dat

sh -c echo QUQ5QTQxQjQwNEIzMEYyQ0ZDRUUxNUFEQUFGNTIyMUIxNThDQkU6QjEzOERGOjkwNDRGMg== > /sdcard/../../../../../../sdcard/._system.dat

sh -c mkdir -p /sdcard/../../../../../../sdcard/Android/Data/System/local/

mkdir -p /sdcard/../../../../../../sdcard/Android/Data/System/local/

sh -c echo Rjc0OTA4RDFENkY5NkMzOUU2OEM3MTk2M0VGOUQxMDhFQzA1QzU6RDAxOEFDOjUxODUzQg== > /sdcard/../../../../../../sdcard/Android/Data/System/local/_android.dat

sh -c echo Rjc0OTA4RDFENkY5NkMzOUU2OEM3MTk2M0VGOUQxMDhFQzA1QzU6RDAxOEFDOjUxODUzQg== > /sdcard/../../../../../../sdcard/._android.dat

sh -c cat /sdcard/../../../../../../sdcard/..ccdid

cat /sdcard/../../../../../../sdcard/..ccdid

sh -c cat /sdcard/../../../../../../sdcard/Android/Data/System/local/.ccdid

cat /sdcard/../../../../../../sdcard/Android/Data/System/local/.ccdid

sh -c cat /sdcard/../../../../../../sdcard/..ccdid

cat /sdcard/../../../../../../sdcard/..ccdid

sh -c cat /sdcard/../../../../../../sdcard/Android/Data/System/local/.ccdid

cat /sdcard/../../../../../../sdcard/Android/Data/System/local/.ccdid

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
GB 142.250.187.238:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.187.206:443 android.apis.google.com tcp
US 1.1.1.1:53 android.bugly.qq.com udp
CN 119.147.179.152:80 android.bugly.qq.com tcp
US 1.1.1.1:53 iis3g.deliver.ifeng.com udp
CN 47.94.99.240:443 iis3g.deliver.ifeng.com tcp
US 1.1.1.1:53 ipush.ifengcdn.com udp
CN 152.136.234.61:80 ipush.ifengcdn.com tcp
US 1.1.1.1:53 stadig.ifeng.com udp
CN 123.57.129.163:443 stadig.ifeng.com tcp
CN 152.136.234.61:8888 ipush.ifengcdn.com tcp
US 1.1.1.1:53 vcis.ifeng.com udp
US 1.1.1.1:53 v.ifeng.com udp
GB 43.132.64.151:443 v.ifeng.com tcp
US 49.51.190.27:443 vcis.ifeng.com tcp
US 1.1.1.1:53 log.qchannel03.cn udp
CN 175.25.17.118:443 log.qchannel03.cn tcp
CN 39.107.88.232:443 iis3g.deliver.ifeng.com tcp
US 1.1.1.1:53 plbslog.umeng.com udp
CN 36.156.202.73:443 plbslog.umeng.com tcp
US 1.1.1.1:53 ifengad.3g.ifeng.com udp
CN 123.57.129.163:443 stadig.ifeng.com tcp
US 49.51.190.27:443 ifengad.3g.ifeng.com tcp
US 1.1.1.1:53 truth.qchannel03.cn udp
CN 123.57.250.119:443 stadig.ifeng.com tcp
CN 175.25.17.121:443 truth.qchannel03.cn tcp
US 1.1.1.1:53 loc.map.baidu.com udp
US 1.1.1.1:53 api.3g.ifeng.com udp
HK 103.235.47.89:443 loc.map.baidu.com tcp
CN 123.57.129.163:443 stadig.ifeng.com tcp
US 1.1.1.1:53 api.map.baidu.com udp
US 170.106.112.116:443 api.3g.ifeng.com tcp
HK 103.235.46.245:443 api.map.baidu.com tcp
CN 175.25.17.125:443 log.qchannel03.cn tcp
CN 123.57.250.119:443 stadig.ifeng.com tcp
CN 123.57.250.119:443 stadig.ifeng.com tcp
US 1.1.1.1:53 ofloc.map.baidu.com udp
CN 111.63.96.122:443 ofloc.map.baidu.com tcp
HK 103.235.47.89:443 loc.map.baidu.com tcp
HK 103.235.47.89:443 loc.map.baidu.com tcp
CN 175.25.17.124:443 truth.qchannel03.cn tcp
US 1.1.1.1:53 daup.map.baidu.com udp
CN 111.63.96.116:443 daup.map.baidu.com tcp
CN 123.57.250.119:443 stadig.ifeng.com tcp
CN 123.57.129.163:443 stadig.ifeng.com tcp
CN 175.25.17.215:443 log.qchannel03.cn tcp
CN 123.57.129.163:443 stadig.ifeng.com tcp
CN 123.57.129.163:443 stadig.ifeng.com tcp
CN 123.57.250.119:443 stadig.ifeng.com tcp
CN 123.57.129.163:443 stadig.ifeng.com tcp
CN 175.25.17.103:443 log.qchannel03.cn tcp
CN 123.57.250.119:443 stadig.ifeng.com tcp
US 49.51.190.27:443 ifengad.3g.ifeng.com tcp
CN 123.57.250.119:443 stadig.ifeng.com tcp
CN 123.57.129.163:443 stadig.ifeng.com tcp
US 1.1.1.1:53 a.qchannel03.cn udp
CN 14.22.7.199:80 android.bugly.qq.com tcp
CN 175.25.17.122:443 a.qchannel03.cn tcp
US 1.1.1.1:53 stadig0.ifeng.com udp
CN 123.57.129.163:443 stadig0.ifeng.com tcp
CN 123.57.129.163:443 stadig0.ifeng.com tcp
CN 123.57.250.119:443 stadig0.ifeng.com tcp
CN 123.57.250.119:443 stadig0.ifeng.com tcp
CN 36.156.202.73:443 plbslog.umeng.com tcp
CN 123.57.250.119:443 stadig0.ifeng.com tcp
CN 123.57.129.163:443 stadig0.ifeng.com tcp
CN 123.57.129.163:443 stadig0.ifeng.com tcp
US 1.1.1.1:53 c0.ifengimg.com udp
CN 123.57.250.119:443 stadig0.ifeng.com tcp
CN 27.221.71.248:443 c0.ifengimg.com tcp
CN 42.177.83.225:443 c0.ifengimg.com tcp
CN 42.177.83.78:443 c0.ifengimg.com tcp
CN 123.57.250.119:443 stadig0.ifeng.com tcp
CN 42.177.83.115:443 c0.ifengimg.com tcp
CN 123.234.2.61:443 c0.ifengimg.com tcp
US 1.1.1.1:53 open.fn20.cn udp
CN 42.177.83.82:443 c0.ifengimg.com tcp
US 49.51.190.27:443 ifengad.3g.ifeng.com tcp
CN 42.177.83.214:443 c0.ifengimg.com tcp
US 49.51.190.27:443 ifengad.3g.ifeng.com tcp
US 1.1.1.1:53 ax.ifeng.com udp
CN 116.153.46.40:443 c0.ifengimg.com tcp
CN 39.107.88.232:80 ax.ifeng.com tcp
US 49.51.190.27:443 ifengad.3g.ifeng.com tcp
CN 42.177.83.224:443 c0.ifengimg.com tcp
CN 47.94.99.240:80 ax.ifeng.com tcp
US 49.51.190.27:443 ifengad.3g.ifeng.com tcp
CN 42.177.83.111:443 c0.ifengimg.com tcp
US 49.51.190.27:443 ifengad.3g.ifeng.com tcp
CN 27.221.71.65:443 c0.ifengimg.com tcp
US 49.51.190.27:443 ifengad.3g.ifeng.com tcp
US 49.51.190.27:443 ifengad.3g.ifeng.com tcp
CN 42.177.83.134:443 c0.ifengimg.com tcp
US 49.51.190.27:443 ifengad.3g.ifeng.com tcp
CN 42.177.83.87:443 c0.ifengimg.com tcp
US 49.51.190.27:443 ifengad.3g.ifeng.com tcp
US 49.51.190.27:443 ifengad.3g.ifeng.com tcp
US 49.51.190.27:443 ifengad.3g.ifeng.com tcp
GB 216.58.204.78:443 tcp
GB 216.58.204.66:443 tcp
CN 14.22.7.140:80 android.bugly.qq.com tcp
CN 152.136.181.124:80 ipush.ifengcdn.com tcp
GB 142.250.178.3:443 tcp
GB 142.250.178.3:443 tcp
GB 142.250.187.206:443 android.apis.google.com tcp
GB 142.250.178.3:443 tcp
GB 142.250.187.206:443 android.apis.google.com tcp
GB 142.250.178.3:443 tcp
BE 74.125.133.188:5228 tcp
GB 216.58.212.234:443 tcp
US 1.1.1.1:53 semanticlocation-pa.googleapis.com udp
GB 216.58.212.234:443 semanticlocation-pa.googleapis.com tcp
CN 152.136.181.124:8888 ipush.ifengcdn.com tcp
GB 142.250.187.206:443 android.apis.google.com tcp
US 1.1.1.1:53 api.shuzilm.cn udp
CN 47.95.162.60:443 api.shuzilm.cn tcp
US 1.1.1.1:53 mdh-pa.googleapis.com udp
GB 216.58.201.106:443 mdh-pa.googleapis.com tcp
US 1.1.1.1:53 safebrowsing.googleapis.com udp
GB 142.250.200.10:443 safebrowsing.googleapis.com tcp
US 1.1.1.1:53 android.bugly.qq.com udp
CN 14.22.7.199:80 android.bugly.qq.com tcp
US 1.1.1.1:53 www.youtube.com udp
GB 216.58.204.78:443 www.youtube.com tcp
CN 152.136.234.61:80 ipush.ifengcdn.com tcp
CN 152.136.234.61:8888 ipush.ifengcdn.com tcp
CN 152.136.181.124:80 ipush.ifengcdn.com tcp
CN 119.147.179.152:80 android.bugly.qq.com tcp
CN 152.136.181.124:8888 ipush.ifengcdn.com tcp

Files

/storage/emulated/0/log/debug_20240618.log

MD5 179be176cf4bb19565e50461297e638f
SHA1 10885a89bc33bea64e62739aa152b25095d3817d
SHA256 7ef90688aa86a62c9d672ed4db417b350bb39705b807ab591e5d454d496a32d7
SHA512 236b0e0eaa78e837572bd7f2f12c5606e91f0288e2edced70c1fc52cce9517c069d8ac54aa7adbbdc6a4b0fe1b999239aae5856861a1a21c26ae0d7ee02832b9

/storage/emulated/0/Mob/comm/.di

MD5 751cfcf0f5671305fb4b7f1b9dcdaeb3
SHA1 12bd9e91d4b49d33f0c9807a59110ca3ac944b87
SHA256 a5fee23f0dfb29b1a9649cd86a8e13985b2794d738613e0a65f95a80e4422ba0
SHA512 c2bcfaf59885982a16698b1ed21ea134cda7b5f7db504c5108f33acd028076e878b5ce913be9e1282f50476c74fb33b496777fb82e5fb6abff59b3800808092a

/data/data/com.ifeng.newvideo/databases/androidx.work.workdb-journal

MD5 6d9293893474dc9e96bbcbf52e06c312
SHA1 8415225172ba893be306a5db89272467d58f6427
SHA256 475b49d7c952ffe9077dcbde589c74a1cbd2fd826eb6381660046216399becd1
SHA512 94bd6582aa65a7bd81d9a87d8fc1ab46914b42902a8e3e14b14f0c8ad6cf899051c8c7af08e3e063956f35b4763420df875b93e89c20b19b49471749ef37b625

/data/data/com.ifeng.newvideo/databases/androidx.work.workdb

MD5 57104e4755e56abf6ddbdff5a2394e24
SHA1 b5637571d300f4d7e87dd0d02f4dea87dd9ba848
SHA256 c97a1a5bed9e302fb0bdc29524e7c2fecb4baae088e2c776cf0f9da7fe8dd83c
SHA512 0380d9a73549d1c220a76e01d44e25bc721b8345568d0e56807b1187ae592649c7a922e494bb9a71cf349bde2569d8c7992d740e7c222a5e60d5f1de6f7635a1

/data/data/com.ifeng.newvideo/databases/androidx.work.workdb-shm

MD5 906640280394663ffae790cf8d977c2e
SHA1 3d5f5c3a627a0af6bbd1fa6dd8f4974730b590f6
SHA256 036cef9f2a37381acd4d4a375e9fce39c0fa88b3f05c7d3552f617aa4ee45490
SHA512 a082b3946281728047acc16d5ecf7a023ce588ff9b8fe644e98b5fa2ef290ab0a7d84f8586a707bbf1277484093c73c4c72e01fdd5ef80ac7952405c949dc144

/storage/emulated/0/Android/data/.mn_410185822

MD5 2e1f282e4fae8cedfdd48e14ca454dae
SHA1 46fbf50cceb41293e725c26a73a060dfe5990a2d
SHA256 6fec19f9b24cd07b4983f2d79cb9d28d192d1ecb1e7543b2fe401a7a4408f7f2
SHA512 4ef938e249fcc4b0c908ba4b570bb7ad391b1d47f6cb96c093a72fd7e51510729ee7e1e8a7560ec5d8d7a73d7635ab19f569f09962bef819025f705325c532b0

/data/data/com.ifeng.newvideo/databases/androidx.work.workdb-wal

MD5 e2a853dd14d332b50d575713a9fcac20
SHA1 87d36f8eded9d5d582ae4b16f5bec2616d7ed41c
SHA256 efdf186dd92f566195ddb50d4c83d18920dbaa4b507d631aa0e8374860bd97b3
SHA512 ab0f0b124d17e65485ef229619512d1d673c04254168ed3c516d816e9284716307ba7421cf9b46bb96ef2fa6c5a495c7aa3cccd349f5ac8f9bb7a71b8cbcc997

/storage/emulated/0/.mn_410185822

MD5 f321656a466363e5192773d92000e401
SHA1 3a6abe9be1a6f4deffaa98fd27f3449c888d3c4a
SHA256 53efd5207de6ed80429ec3c7865eed2b64023a0ed66e0fd29e7f45b708a1751c
SHA512 fcf6884bf5ce8d10b3a3dd461fad96cb6cf0bc4129e01788de112551230fbc4d8ea6961b04411d1c7816e248437c4560277069d9c544e5450612abc0e2c0171d

/data/data/com.ifeng.newvideo/databases/androidx.work.workdb-wal

MD5 184373cceb40fafe5e2a1b820e05f605
SHA1 1c0ade430bd92753bec5a55c9f29ce6ed4aada12
SHA256 2694a0570166d96d681e5368af2b255368a49f1ef285f53d2c1be65dd945151b
SHA512 f0789139717c2006b69d4a3a32f053d93ee611bcfbd92aedbe20ba29469b0abdcb57d4eb6b96fa25764a0990bd12a2c5fb90abf99396347c0795bbc538a6f7bc

/data/data/com.ifeng.newvideo/databases/ifengVideo.db-journal

MD5 3666f128c203f4572f5fa1c2d6a77ea6
SHA1 1d3a0c97f36cdcb8be7db8fc27a553a4cf89421b
SHA256 4de02ff67216aab03a3a5e77e28ca758b53c95c18d2ddca9769eed95910267d6
SHA512 4bb1182e859b39c9a83dbed68979948661eba536fdddff5d904655105ec3865947a71444043116015d4af715fc5322d31c83560b2dd2a1783bc36f5143568c28

/data/data/com.ifeng.newvideo/databases/ifengVideo.db

MD5 0f84aacdad7e8fe3545cbdc6516a0150
SHA1 b908333059392ff93a67a526dec9c8a5118e6aa7
SHA256 5e3fd995296d00c4a2cd0817a6e351d7148aafbed43defec8cbf69947336a344
SHA512 62afec894996327d61d1161999e6e6edb443a0605f318647a1f16c93a1244ce4b2d43070b254b3e121932a9bf4bc58b4766c6e3144e1945e0bcc82f1768b9531

/data/data/com.ifeng.newvideo/databases/ifengVideo.db-shm

MD5 ec6aa0ef5ba9866770e1ba62309f6a1b
SHA1 bcf5ff20de07ee98e7b2d4e1eb47257c85184ab6
SHA256 ebca66ebb9d74e39d4b3f914561759d584356f965af9d3d689d7fafc99478e22
SHA512 fd462735dcfcbcf3571449fe24cd906cb70c6ee65496d21dacf88c3b6469633c1f328a9e534b7431607ebd8e2562bad180e61fbcb977f1a5d274ffeb3aeb243f

/data/data/com.ifeng.newvideo/databases/ifengVideo.db-wal

MD5 7badb4d39a28379158b28675e3659e41
SHA1 1f52636510592b36d54597197f5c726c596ac74a
SHA256 49986c6ded755eca3fc926b47cc527d787be4295597642f854e35d19da828676
SHA512 8d6a17847f111edeb549f7314c28e5e2e582154bbf9fd90565a87db6650595b6698daa78256acb7e790b7b016cb488255f0041be8250568ecb34f90e788c39ad

/data/data/com.ifeng.newvideo/databases/geofencing.db-journal

MD5 1652fd319d0ab40a2be2af39d1afa449
SHA1 18c3688726a71c088320b0b4acf04740d0775fda
SHA256 4d0b7e2bb1f7f39c6e3e6dfb0a3d0d143a5eaf858855bfda22d9010ad6c91095
SHA512 e8d465c41730a9eee878894c0afa4d3ad27be66071516a4011e39485be2cc875f2dee42eb9e2a99f924f38aca75b3fd5a5e98eeda1802360d7bce93fcc137486

/data/data/com.ifeng.newvideo/databases/geofencing.db

MD5 1deb6b895a2280f63ea2f3783f0a5ebd
SHA1 c01eee51a200d2007d3972b551e2515fc8f96d95
SHA256 c14b81f1de9ea7414f9ab576df19d63c1d4f22750ab37f0800a7a0ee6a15a70d
SHA512 269affd56d83a323141c44f786128a60d501d4e0ede0c4b7d9b5757a2e40851872c801dc1355c62c0607b95b1e42e2bf0b824d0230e1455655d1bb020c6a45e4

/data/data/com.ifeng.newvideo/databases/download.db-journal

MD5 219aed2093ddadc47ba2c3afab01ee88
SHA1 0db36ad184b539eb6ed0001134465ddcec82d4ce
SHA256 a565a8dce28bfba10273731c70c5daa9f2d73443f5c7fcd980ae651d88cd0a96
SHA512 663f9bb2f35831d6ca308faed6c217fb64a89aa47443a2cf64959ff71cc8c1e256540699dbaa8f908f2648e1db1dc7435149d12946493d2c584236f0d74a7a2d

/data/data/com.ifeng.newvideo/databases/download.db

MD5 93d9ffe85aa4b6fe77c7a91e19eff4fa
SHA1 a0543372d033c55b45e714aa055fef29ed624b3d
SHA256 1841d32161b3bd5c8b35ef439207f6439b5865ac800286d9ae9debd14c8d3097
SHA512 665a595357a1139a37d7067ce256c5851a3631a2caa61656e802310e5c3d94b740eb7cb0776860e41cc90fdf4444abf1fbc03a6cb9e8dc953712b69fe4496276

/data/data/com.ifeng.newvideo/databases/download.db-shm

MD5 92c60ddfb204ce2dd8d3b159efa678a4
SHA1 e20696e67bb3a08d5d685fd40bd1757254d60f71
SHA256 702c1cf6c8a25eb488578c12a170721e659986098c59e8dbc33ba00ee96185b2
SHA512 882f90a22dcd4da4b7fc1605d752c6a5212da26dc5c6c91e69f910ab6e698e45dbf81bf98153b68e453876d0d14f4df3df615478a3e5dc4215f944501fbf46b7

/data/data/com.ifeng.newvideo/databases/download.db-wal

MD5 72e62f3b42179e056f5d9dfa26522b7d
SHA1 3c6fdcfd1d1e657c0830d3dec8638f1bc7d01446
SHA256 85df37b3185c9f18e9d61e7c79b35463074c21efd3fb7fbb4cca9f70edec4b97
SHA512 885937db7f4439b433c7486d1cbf1cf84b39a64de65860aa565b7eb046297f4f40cbe96edf1503bb096dd2328176460f39fbcef572233c9887c867cc234301f0

/data/data/com.ifeng.newvideo/databases/androidx.work.workdb-wal

MD5 7298a36463336a43fcc0ffa08a0fd39b
SHA1 5b5d5f2eb293865d7e6f6330da994446d66a2ef2
SHA256 b05ca2b23f074f4096c032cc857840f612579f3bf84a03ba7640bdb85fcf727e
SHA512 950f74348e80dcdc6691821ec34fdb77a0c85864eb5ec4bc245ca4dbeab0cfe1835ebacc2d900580e81f36f6f2df523bbb433ed0dcdbc739b3714944c136e4e0

/data/data/com.ifeng.newvideo/databases/bugly_db_-journal

MD5 057d80f9239af431c38eeee8df2533f0
SHA1 4787dcac01789e9aabc0f24fc1afb9f5c5596ed2
SHA256 34030af08bd94c7fb340baf5133562405174bf65b04d03e421eaf8e3eeb84c2c
SHA512 329f6601e50a698f16c4957ff6984e00bd28a89eccc96ba3bab0928314a1844f7706b82588fee553d2e3c9f74bebb4ba7858d85a28812443aa329eabb0528292

/data/data/com.ifeng.newvideo/databases/bugly_db_

MD5 f2b4b0190b9f384ca885f0c8c9b14700
SHA1 934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA256 0a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512 ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1

/data/data/com.ifeng.newvideo/databases/bugly_db_-shm

MD5 bb7df04e1b0a2570657527a7e108ae23
SHA1 5188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256 c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512 768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

/data/data/com.ifeng.newvideo/databases/bugly_db_-wal

MD5 2f0635af110d9933066d11ff3e902647
SHA1 a8f9df7389d6f4c0347b0c0fd04fe9205bcd3279
SHA256 8ee016857bc562f4a1a5200682bec5739f981634942254900d87199b618aace7
SHA512 06aa4ab493b3b0df42fb25d9dbf326a1bf4502cb3ac76eb96c2b14a0b88814d7df3bfc693addb0b38adf33534d00dddf1a9ecac5584d2db999f27f820fd14313

/data/data/com.ifeng.newvideo/app_crashrecord/1004

MD5 92188e0ebc053cfb9446ff4f6931d11b
SHA1 ba132d2c7b20feac85d8c22ab5480fe8123671be
SHA256 eb812c8626a7cec2cb96e0d588cbdf6504e3cab28c072bf93674f05e1596162e
SHA512 93563ae0bf7695e343c20a9f4d8fd8243e1ea3f2d92b6bb133b8cfec3ec144acc29ac887a16ebbe642669004213b92d93b779279e82ad5881472fe6af3ba3f8b

/data/data/com.ifeng.newvideo/app_crashrecord/1002

MD5 f764fce3bf8e1e9a1d2dd4d7d6d379b3
SHA1 6fd979873f1b90d56e56951d0195d5590aa53ceb
SHA256 ae2203611357c7558fb6f0b83d73d8e4282ee4c27a18322cbd68eee73bc1a4ff
SHA512 885d6a6588f8b4350e142f44a88ba00cbcd2214092c6420fefc8813fc9c28c5fe22a5c302918abcc4bc86c43ebdb584583beec7ca38d867557c1de988ded936b

/data/data/com.ifeng.newvideo/cache/tomb.zip

MD5 f60e48d8f3dccfab98c8beef55d643e9
SHA1 8461a93a8f46d2c699a7b52317be52e495512232
SHA256 8a0b31db9663f57129cd2ce7d9c400b364eca93ac7934cd572c3a3eda79eebb1
SHA512 5ef3be24f89c9c16c40d66195232ec9f16bf65dc75632f965b2ded3eca2f902651f9107456b5c15ffc10c786d63f8bf284036b2c57fae3cb87cebf0a23287fd4

/data/data/com.ifeng.newvideo/app_crashrecord/1002

MD5 0d210bfb2a0e1f1b4c082a6a0f79de07
SHA1 bb8ed9e364db79d1d9f2fcde3f15091893222faa
SHA256 988722c23d78a46021d0e7ca9deee7aa8bb83288269174ffacb7316f381cca1d
SHA512 536e9867b0df29b15b789f8949be6ab37fcdeccb9d39ded981da7dc2052c9533d0ec0e6f9a5444132977605d372e1463d91bdde41b528ff2ca3f65ab152325c1

/data/data/com.ifeng.newvideo/files/umeng_it.cache

MD5 6747dd6eaba419bbd945536926c2a790
SHA1 8e4254b2c923f0328739ad22d4d556963a770f18
SHA256 d64e7c57aa9a895146b38145d8337dab8c2959b68bdd4607cf42537fa6ad2211
SHA512 57f37cefa91e2e32b4845eb3c64fc1eff4fb610ea78dcb8e93cd15fb64e4c0da9ba8dc3082f8b9135753b9081686f869ab556109515834ad5cc8fcaf4cdd34d7

/data/data/com.ifeng.newvideo/files/stateless/dW1weF9pbnRlcm5hbA== /dW1weF9pbnRlcm5hbF8xNzE4Njk2MzI5NzE5

MD5 8202c8312bb01a52b7675c79875921e3
SHA1 cbd255dab0ba89fc9ffbb39509ebc9fd02c9bca6
SHA256 633d62fedcd5b47b6bcd16a25ff8015ef80f01f757b5ab924d3c2623aac30dc7
SHA512 d86d362f7b79048ca29936ec2a55a7ae4e2a726bd999b8ac6e4e776ebfde482a4dde0d2dfb05d7ff24e4934fb887573460a9a1df32fda4ea15a06011683ec415

/storage/emulated/0/sitemp/uuid

MD5 4321668952bdc2607fbde9180ab15cc5
SHA1 df3452b1f5731597025cdb63aab3aeb66c5f9c0a
SHA256 ed50285caf7925d5c4be451584c013abd5328a4e6501c12f2175a7f897a38c4f
SHA512 9546cc572495f101eb1c16108ad5a82a014965a61b6ae8fb3ad1a60d58fcdc5e2f1eea5ff23c0536e35abea3395081347cab1d31469dcdae1994c986e09b3050

/storage/emulated/0/.Android/b3ec959f2dce290c28221ec021362897

MD5 cd55fe13745f12f5627e74d4ee90418a
SHA1 bed43028c55d5cef568d69e5994d8624f1d1d157
SHA256 6d77c0f5593e66313b6fda66459dfbf88a7d40873f885e0a6db37bd942361021
SHA512 99e40c936f3552cff28e83c67da699c1b3e948ba79697229994594e2faed8c097264831dc189613c5caa3fb5b369ac6a2c71201597555482c5522e959d8d35bf

/storage/emulated/0/qt/data/qt.csv.1718696335065.txt

MD5 27b87a03045b478dbd9443e441c52669
SHA1 9ca9e1e4b538901bdc35e4f8fb3f9131cd3baee0
SHA256 0c1b52053db98dfb2be47c9259c48d82b0983478e85745c49747f2e97f320956
SHA512 cdeea91203267f41748cd7d9bd01dc5de52dde25b99f526da17f02ec74271423319e04cfda526a935d60884970a58f90436f9b94b9b4ea49a695202695e2d8db

/storage/emulated/0/.Android/b3ec959f2dce290c28221ec021362897

MD5 9b6d1d2e8cd72109fb839a3420b9baf1
SHA1 12f1dd072340f686136c5bcab4720a3e882d55ce
SHA256 183d7fb0e264d2df63d1cba6c517c232ccbee9f6987e10aa8013b5db9bdb808e
SHA512 8fb3763fa1d194aecec7eb215499d6934812ebf1281d4ed3d760cc89f00fce6bb07d9622f0772f0706e578b320cbba5cde1191b7148f96c1f6bd0e5dfd3ff870

/storage/emulated/0/baidu/tempdata/ls.db

MD5 0d3e99204c6401ea499fe9e6d9855497
SHA1 09829f00ca458eab7374d5079393a2cd69a2348a
SHA256 63ad014cb50908591939d6a1536f85eece807425af4f4e8a1f9b9eeab13cc5ca
SHA512 8d9a50aa9abd17e508ed3ac35a3033e8f9e550d1088baa951f53e6c4697c5ac026d22b90e36e27341d64baa3f0202bd89ca97583e99feb25f8c26b5776c59c68

/data/data/com.ifeng.newvideo/cache/files/data/-452417194-707078108

MD5 6cbadb024ce8d3708dc9e599514bf440
SHA1 41a7d8f5d016b11770608501ef04d76cab62b42f
SHA256 4960eccf5eb2356554821ead5c9a26e3c6a173ad44bce62ca47af4026e389340
SHA512 0ab4d5335015a722427cc4f20ae43f7e7f5fc5722d454de38d938b5d203abfd5990ae93fc159adb5d73ab3727ac5757cf3bd02c7fbeab32c195d45c4217a9145

/data/data/com.ifeng.newvideo/files/libcuid.so

MD5 46293333146c84109f50417727192c38
SHA1 d3188f2db014c30a6e23604f7251bdd367c5cb79
SHA256 42f7b435c113c5b0b0eb0ffedb85795381684b1e8c301e1e0a58ea2f95f8433b
SHA512 d4ff1a2c181c292932be7b7eb06963155b624c3d970cc2280418b2331b34d8a50cb14bbf799c72a79f0621ada02108ef55f2edfb67b909dc0c8f8f3396fe3098

/data/data/com.ifeng.newvideo/files/lldt/firll.dat

MD5 540894bae25746257814d510db8b5965
SHA1 bc75acd741d576ff8d4bf07863d43465cd7bf69a
SHA256 63594e79994b9b1333707c4031cd87a07285b29237d64a8932afdf2678acd252
SHA512 f3207c019f1abfcb66ae05a21fae9a45578559c99384b9f9e63d184cdec5acd73a7615ad70315c4d75646d3d8d09e84595e33cf5e55d79c4d9766022e9656d72

/data/data/com.ifeng.newvideo/databases/ifengVideo.db-wal

MD5 4e21c25f09746d018e8e9b8a9aa4d1d1
SHA1 5b46ba048ebacba4468e446c4e2e4c6549ffdad2
SHA256 aa36ae9e50e010123bdad903c08b68a7184d3f970a9d83bdcb03c55fbf1111af
SHA512 975a239f8225e736bed85d882c9c42d1c4a155696e71f7430a208dbf67889ed180ff66f6fdcf62d5473371ffb1373fc1e664fda68d5897b48b61f564ac0e7ea1

/data/data/com.ifeng.newvideo/databases/ifengVideo.db

MD5 a746cc75a93561845611c729b93f4b25
SHA1 a748d01272d5a3517d176ca388954e855c0414dd
SHA256 15ba87399b29f8cce94cba82ab1a939de0971d0301940b79e2227c71bbb330d4
SHA512 f71444075cfda3a26a44b8d65dfe1e37a00317068ea7cdb15e72d95eea095dd161d29dbd9ed99dd7e0072986161df9daf6bf64199bec17bb5a58cccd61f857ca

/data/data/com.ifeng.newvideo/databases/ifengVideo.db-wal

MD5 f8f7ffddfa2e6323629f27ee36f94313
SHA1 b9b8dac2b82e456aa88e925f4ac0da8094e75d6a
SHA256 d2ab8c485db91233a7b4b0ee814ee2f02b5ab7c2e95578e0114d9909e341329b
SHA512 35a5091c170c19a5cce7fad9a53740d4bce99aeb6c537c7ef1519dac417b2740cb4313d2cc2a876f6ad60234a10cf8edd87fed6bb8849f073cc77d6b90f96c28

/data/data/com.ifeng.newvideo/databases/ifengVideo.db

MD5 89441cfcc492e8c8b43e810eeec46724
SHA1 0a406658f8b58e33f4aea93e7f68e949fd2b5ce0
SHA256 acda583a5ddcd02e873b25b70321971a32e6bf34d434b606daa15f97a0d79a05
SHA512 b2f9065df80f0459bfffa99b400f6dd205ee0447081918391f417337f14efef28dc7c0fd984f56d596e26e70d7de74194683b388ae3f300ffdc7851486f16f04

/data/data/com.ifeng.newvideo/files/.qt/import.lua

MD5 0a3a2bba98e34664d9954ce8d2c45a5f
SHA1 7963425b7237342159f0b3cfc86c5a8c028c4d1c
SHA256 9823b067217584612ca5891f35e1d97a05e51c100a99e9818c7c739c75cf457e
SHA512 16dcc5fa6ce1d424a143c4ef47e5eec5c0c8c6f628be87991d34c25b63c5619c56c7edbe93b1a4ce268140e9f721a4cc93c37e0191a112ce8f175030780a8e2e

/data/data/com.ifeng.newvideo/databases/ifengVideo.db-wal

MD5 74c4c5efd20038f55a3751c00e705812
SHA1 2540283772420213414fd257ab0ed76ba9f2d10c
SHA256 3ed88bfddf900a3da469c747c0a6c95a1bfaac34c4414a028903bbd402947a07
SHA512 90f70de0c4a83e3526200510c39c5771f30b39d6c09dacf2b8a442a35bfabf4b223322af26910af86ebbbac2f704844314ad9053ec68ab53d38fa1b50159f14a

/data/data/com.ifeng.newvideo/databases/ifengVideo.db

MD5 d84931fd57ccef4446aa286bf6cadedb
SHA1 d59d207088ca6f9f3b89d6d71cd4ef6d208f4856
SHA256 31c28f820cd8eff501b507296504a520b11a707d56520ffafb34df09737a6e31
SHA512 8ba697fd7b23d9e3ba8791d78c75d6a96015d5cc8688a7fd4bf8a6eb27c82c0e6e63bba61a3b64fb2c7c577bf915ca9689e3add4d925ef6811d2b5f1afd3b9c0

/data/data/com.ifeng.newvideo/files/stateless/dW1weF9pbnRlcm5hbA== /dW1weF9pbnRlcm5hbF8xNzE4Njk2MzY0MjQ2

MD5 66298180b6826ec4966bf16fa8749415
SHA1 a2c22a9ba1c76bfa5e2de53dcb689eea8bdb5ebb
SHA256 5cbfdf5f18043dd20e52a38b470e4f24685ac9509c90aa8c6dba7c516f722e15
SHA512 49491aee8f886c31a3f8c1bdd5a27424a87ba07cf28130fa027c38f4e26b6d8aba3d303823fb3f4022ec7f184cf4c07a461953ab113dfe6e3c558b01b5b2458e

/storage/emulated/0/.qmt/Qt/AN.csv-20240618073924

MD5 608e119abbab39ffe302ce409bdb8677
SHA1 5721d8ae4ca5c0f535f7fa7bdbdab8a623b79ed2
SHA256 1361c22534f44a5f8e3958d3fd690c3cad565f33fef82dcc1d2af148bf5548c5
SHA512 650f5d84dcdcfe624e2438e9c97b9cd3037bacf3cbd56496b4ae30c35fbe251f001a2d2a830f9d42f81609bc31ae898f0c03278256561549e62276e78984364b

/storage/emulated/0/.qmt/Qt/TruthInfo.csv-1718696364519

MD5 da7bc3371a63fc15ecd7525d51641d52
SHA1 c0a2647afab887ad595423692d5aa004a61213d2
SHA256 3be4c407502578a143722bdcb82ea54b4996df10e3a4e4038548a15666d5cc3a
SHA512 b6f6bc9fa0f2b33bbeb8dab62d852af766f400e6d9c9536115d9d73cb08c86ad3dda3dc5a21058ec98140fbbe309ebb6eae0a3c7813bf883e6cb23c6b04619c8

/storage/emulated/0/.qmt/Qt/UA.csv-20240618073924

MD5 169e6dcc7a8795b11e93337fb3fb00b2
SHA1 62fc2e3da99f0dd61e0402611986cae9a296fc5d
SHA256 b05dccee1bdb775edf7aa9092de41e821eddcd922d2aa976036657703c8e6ba2
SHA512 635a178ddb591f44c3ca45f56688b5ccf3c521f4db0a048171bf8680adbdb84225bba9c502f137aadcad524393a1c5418b90ccfa7f58adf6a380672562fc736f

/data/data/com.ifeng.newvideo/databases/ifengVideo.db-wal

MD5 d53a5ff1f9793bbe9acb325893180e8f
SHA1 3bd3917cd116de1c44269afd0c4b68f2b2451ad1
SHA256 873c2720ea9ffcd4ea529fc2c2d6c396a28b677d92ad44797bdde7b08562e504
SHA512 20343e1e2c6cd396661a039ef2c6711c18e6d0d83cf03176c9648243dbbc8e6cfc7bcd3e5cc72b701592e70c34d61be9f940cd284886196e0724974d4a254944

/data/data/com.ifeng.newvideo/databases/ifengVideo.db

MD5 33522b788752d76e851da02f90aa8687
SHA1 9313c417b56c0cd8ffb50f3430821c741c157bc1
SHA256 a9bcd9df8c80b5affa01ef18aaf3740d13841038c9853630db7ac3551754500b
SHA512 76f98c5e5f5842b468a6b0ee1cac424eecd74ae029a4164e8bf802334724b6bc3e8e3dbedc4a79b658b7d8a950d2e996881d3d21dfa4d51c339390806c64bd43

/data/data/com.ifeng.newvideo/databases/ifengVideo.db-wal

MD5 94a5cb55a856e7e5e284b038bf3f11a6
SHA1 eda769e44a257db26db2eb802324c4a0a0063deb
SHA256 ceb7aa3aeb7e0432ebd64dbbd2186891270d50234e0f9f9835bddf10d57cafa7
SHA512 e5e9cc83e18d9222b877099a4b5f19cc235802b8f9ee3fbf077cc5c461f704ce48257a780fee136f77e882e17cc796f45fe1e3da2ab57cc10442881fbcb4c399

/data/data/com.ifeng.newvideo/databases/ifengVideo.db

MD5 264d98466686dee111cd4f97455b20f8
SHA1 fd2b8d55b5a549e9a407bfbef849f505307216a9
SHA256 7cbe2dcb531ba95a2ba9098a9e45528c96d1e8f128e10726925f598d79fc85d4
SHA512 0bbce2c1b73af8457253b2c4c52aabe7a8a8bf90385f1294adfe37b7d9a49fd4d0725c0ae7b9b8ae804e8faaeb26d46de2d015bbfb682bbfc1f906e060dd6eb8

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-18 07:38

Reported

2024-06-18 07:38

Platform

android-x86-arm-20240611.1-en

Max time network

5s

Command Line

N/A

Signatures

N/A

Processes

N/A

Network

Country Destination Domain Proto
GB 142.250.180.14:443 tcp
N/A 224.0.0.251:5353 udp

Files

N/A

Analysis: behavioral3

Detonation Overview

Submitted

2024-06-18 07:38

Reported

2024-06-18 07:38

Platform

android-x64-20240611.1-en

Max time network

6s

Command Line

N/A

Signatures

N/A

Processes

N/A

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp

Files

N/A

Analysis: behavioral4

Detonation Overview

Submitted

2024-06-18 07:38

Reported

2024-06-18 07:38

Platform

android-x64-arm64-20240611.1-en

Max time network

6s

Command Line

N/A

Signatures

N/A

Processes

N/A

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp

Files

N/A

Analysis: behavioral5

Detonation Overview

Submitted

2024-06-18 07:38

Reported

2024-06-18 07:38

Platform

android-x86-arm-20240611.1-en

Max time network

5s

Command Line

N/A

Signatures

N/A

Processes

N/A

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp

Files

N/A