4.5 (9)

وصف:

بدء الأجانب الخاص يحاولون تدمير العالم. لذلك تحتاج إلى اتخاذ التحدي وتدمير كل حثالة الغريبة التي سوف تأتي عبر في طريقك. على الطريق، لا تنسى أن تلتقط مختلف وشكا من السلطة والأسلحة والمعدات الطبية. هناك خمسة أنواع من الأسلحة و50 نوعا من القوات الأنواع الغريبة.

إعلان

تحميل افراط الغريبة 1.0.969

معلومات عامة
نص 1.0.969 (17)
تحميل التسجيل 2012-03-23 21:12
حجم 20.33 MB
العربية لا
متطلبات
الروبوت 2.1+
هندسة معمارية ARM7 ARM6
تحقق التطبيق
يتم إيداع الملف
إذن

Allows the app to prevent the device from going to sleep.

Allows the app to view information about network connections such as which networks exist and are connected.

Allows the app to create network sockets and use custom network protocols. The browser and other applications provide means to send data to the internet, so this permission is not required to send data to the internet.

Allows the app to access the phone features of the device. This permission allows the app to determine the phone number and device IDs, whether a call is active, and the remote number connected by a call.

Allows the app to prevent the device from going to sleep.

Allows the app to view information about network connections such as which networks exist and are connected.

Allows the app to create network sockets and use custom network protocols. The browser and other applications provide means to send data to the internet, so this permission is not required to send data to the internet.

Allows the app to access the phone features of the device. This permission allows the app to determine the phone number and device IDs, whether a call is active, and the remote number connected by a call.

معلومات عامة
نص 1.0.973 (16)
تحميل التسجيل 2014-11-10 02:27
حجم 11.07 MB
العربية لا
متطلبات
الروبوت 2.1+
هندسة معمارية ARM7 ARM6
تحقق التطبيق
يتم إيداع الملف
إذن

Allows the app to prevent the device from going to sleep.

Allows the app to view information about network connections such as which networks exist and are connected.

Allows the app to disable the keylock and any associated password security. For example, the phone disables the keylock when receiving an incoming phone call, then re-enables the keylock when the call is finished.

Allows the app to create network sockets and use custom network protocols. The browser and other applications provide means to send data to the internet, so this permission is not required to send data to the internet.

Allows the app to access the phone features of the device. This permission allows the app to determine the phone number and device IDs, whether a call is active, and the remote number connected by a call.

Allows the app to prevent the device from going to sleep.

Allows the app to view information about network connections such as which networks exist and are connected.

Allows the app to disable the keylock and any associated password security. For example, the phone disables the keylock when receiving an incoming phone call, then re-enables the keylock when the call is finished.

Allows the app to create network sockets and use custom network protocols. The browser and other applications provide means to send data to the internet, so this permission is not required to send data to the internet.

Allows the app to access the phone features of the device. This permission allows the app to determine the phone number and device IDs, whether a call is active, and the remote number connected by a call.

اهتمام! استضافت جميع الملفات تطبيقات بإذن من المؤلفين أو وجدت متاحة مجانا على شبكة الإنترنت، وإذا كان أي من الملفات ينتهك حقوقك, واسمحوا لنا أن نعرف

2012/03/23 21:11
ألعاب ذات صلة:
© 2011-2024 mob-core.com