Virtual Button for ROOT device 2015.04.26c (9000019)

jp.ne.neko.freewing.VirtualButtonRoot.apk, developed by SAKAMOTO.
Last updated: Wed, 25 Sep 2019 9:06:35 UTC

Virtual Button for Rooted Android (2.3-4.4.4)
HOME & BACK & SEARCH & MENU key.

Download Virtual Button for ROOT device 2015.04.26c:2015/04/26 Reduce size of Application 2015/04/14 Fix AD SDK 2015/04/11 Remove setenforce function for Google Play Developer Content Policy . 2014/12/03 Remove ACCESS_SUPERUSER permission Fix SuperSU 2.37 not work Support ART runtime (Tested Nexus5 OS 4.4.4 with SuperSU v2.37) (Tested Galaxy S5 OS 4.4.2 with SuperSU v2.40)

Virtual Button for ROOT device File Information

  • Version: 2015.04.26c (9000019)
  • File size: 478.97 KB
  • Uploaded: Wed, 25 Sep 2019 9:06:35 UTC
  • Minimum Android version: Android 2.3.x and up
  • MD5: f3f10674bcabad9bb02ca14b4274f5da
  • SHA1: 3374073329B37A7DD5EFC398A4C37DCC3EA8AABC
  • Developer: SAKAMOTO

Download Virtual Button for ROOT device 2015.04.26c APK 9000019

ChangeLog

What's new in 2015.04.26c (9000019) ?
  • 2015/04/26 Reduce size of Application
    2015/04/14 Fix AD SDK
    2015/04/11 Remove setenforce function for Google Play Developer Content Policy .
    2014/12/03 Remove ACCESS_SUPERUSER permission
    Fix SuperSU 2.37 not work
    Support ART runtime
    (Tested Nexus5 OS 4.4.4 with SuperSU v2.37)
    (Tested Galaxy S5 OS 4.4.2 with SuperSU v2.40)
anAtbmUtbmVrby1mcmVld2luZy12aXJ0dWFsYnV0dG9ucm9vdC05MDAwMDE5LTQ3ODk3MjI5LWYzZjEwNjc0YmNhYmFkOWJiMDJjYTE0YjQyNzRmNWRh.apk
Name:jp-ne-neko-freewing-virtualbuttonroot-9000019-47897229-f3f10674bcabad9bb02ca14b4274f5da.apk
Name:1592269731814.apk

Apk scan results


Apk Scaned By TotalVirus Antivirus,jp.ne.neko.freewing.VirtualButtonRoot.apk Was Risky.Detected 1 From 55 Scan.
Scan Stats:harmless:0|type-unsupported:11|suspicious:0|confirmed-timeout:0|timeout:0|failure:1|malicious:0|undetected:64|
Name:anAtbmUtbmVrby1mcmVld2luZy12aXJ0dWFsYnV0dG9ucm9vdC05MDAwMDE5LTQ3ODk3MjI5LWYzZjEwNjc0YmNhYmFkOWJiMDJjYTE0YjQyNzRmNWRh.apk
Name:jp-ne-neko-freewing-virtualbuttonroot-9000019-47897229-f3f10674bcabad9bb02ca14b4274f5da.apk
Name:1592269731814.apk SHA-1:6f26059dd2c4ae72b90898e630575d3a1e424a7b SHA-256:96a63b866ba08750811fb88c3a69b053d3ff6917c94a7bb43fb9638287c2a62f SSDEEP:12288:iY33pOrXV+GERjSrEInHOwAgPex2QkRXWlGHUfgP:X3cwGRrEIHiVxUJbh File type:Android Magic:Zip archive data, at least v2.0 to extract File size:490462 Uncompressed Size:1023667 Contained Files :39 Contained Files By Type:dex:1,xml:17,MF:1,jar:2,RSA:1,SF:1,png:15,

Permissions

requires following permissions on your android device.

android.permission.ACCESS_NETWORK_STATE
android.permission.INTERNET
android.permission.RECEIVE_BOOT_COMPLETED
android.permission.SYSTEM_ALERT_WINDOW
android.permission.VIBRATE
com.appcoins.BILLING
com.asfoundation.ADVERTISING
android.hardware.faketouch

Certificate

Certificate Issuer:O:SAKAMOTO
Certificate Subject:O:SAKAMOTO

Activities

jp.ne.neko.freewing.VirtualButtonRoot.VirtualButtonRoot
com.google.android.gms.ads.AdActivity
com.appcoins.sdk.billing.helpers.InstallDialogActivity

Providers

net.grandcentrix.tray.provider.TrayContentProvider

Services

jp.ne.neko.freewing.VirtualButtonRoot.VirtualButtonService
com.asf.appcoins.sdk.ads.poa.SDKPoAService

Receivers

jp.ne.neko.freewing.VirtualButtonRoot.MyBroadcastReceiver

Interesting Strings

http://googleads.g.doubleclick.net
http://media.admob.com/mraid/v1/mraid_app_banner.js
http://media.admob.com/mraid/v1/mraid_app_expanded_banner.js
http://media.admob.com/mraid/v1/mraid_app_interstitial.js
http://plus.google.com/
http://www.google.com
https://api.blockchainds.com
https://apichain-dev.blockchainds.com
https://apichain.blockchainds.com
https://ws75.aptoide.com/api/7/user/addEvent/action=CLICK/context=MIGRATOR/name=PURCHASE_INTENT

Other Versions

More Android Apps to Consider