Jump to content

Search the Community

Showing results for 'Huawei mate 10'.

  • Search By Tags

    Type tags separated by commas.
    For example, the common name of the game: PUBG, Free Fire, Rules of Survival, Critical Ops, Mobile Legends: Bang Bang, etc.
  • Search By Author

Content Type


Forums

  • GameGuardian
    • Requests
    • Help
    • Guides
    • Cheats
    • Video Tutorials
    • Unintended Effects
  • General
    • General Discussion
    • Introduce yourself (:
    • Announcements
    • Website suggestions/Bugs
  • Downloads Support
    • Apps
    • LUA scripts
  • Online Multiplayer Mods
    • Altering Online Games with Gameguardian
    • Download Mods
  • Other Hacks
    • Tutorials
    • Non-GameGuardian
  • Archive
    • Archived topics

Categories

  • Official Downloads
  • Virtual spaces (no root)
  • LUA scripts
    • Forward Assault
    • Free Fire
    • PUBG
    • Rules of Survival
    • Templates
    • Tools
  • Test applications
  • Other

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Device


Discord ID

  1. More Info: https://play.google.com/store/apps/details?id=com.makingfun.mageandminions Requirements: • ROOTED Device • Game Guardian Guide: The following guide is based on Mage and Minions version 1.1.29. Gems This method you will be editing your rewards paid for completing achievements. And too speed it up I also hack achievements. So I focused on damage achievement. You have 3 tiers 5 10 15 gems and each need 50000 500000 and 2500000 damage. Stay with dword union search of 50000;500000;2500000:2048 If union search fails, you can search each individual amount and edit to 0. Claim the 5 and 10 gems. Now clear search and dword union search 5;10;15:256 Then search 15. Change menu and change the 'scenery' and keep searching 15. Now goto filter and set it to 50. We do not want to edit too many. High risk of crash. Edit selected 16 and increments of 1 (so every value is unique). Goto rewards screen. Did it change from 15? If no, edit results back to 15 then delete select results. Now edit results again 16 increments of 1. Do this until the 15 changes. When it does, find that in the list of edited values. Uncheck and put all others back to 15. Now click and edit that value, edit to something very high like 2123456789. Check rewards, if it changed, claim reward and enjoy large amount of gems. Video Tutorial: Gems Credits for Hacking Guide to NoFear
  2. NoFear

    Tap Tycoon

    Lol. Yes, sorry, quickly uploaded video before the gym. So the meter for time remaining for building to claim reward is 0 to 1 floating. It's basically percent full. .5 being 50% etc... Once you have found that value nearby the address above is the upgrade price for that building. Edit floating to 0. Now you want to edit the upgrade qty from 1 10 100 to something crazy high. This is a dword value. Side note, when you find a building upgrade price. If you scroll ~3 pages (scroll up for next building down in list) you can edit next building without having to search all over again.
  3. Answer: same as previous is double. double - double hex - first 32 bit as dword. 10 = 4024000000000000 1076101120 2978 = 40a7440000000000 1084703744 3056 = 40a7e00000000000 1084743680 3234 = 40a9440000000000 1084834816 3254 = 40a96c0000000000 1084845056 3289 = 40a9b20000000000 1084862976 3299 = 40a9c60000000000 1084868096 3309 = 40a9da0000000000 1084873216 3334 = 40aa0c0000000000 1084886016 3354 = 40aa340000000000 1084896256 7458 = 40bd220000000000 1086136832 7468 = 40bd2c0000000000 1086139392 7478 = 40bd360000000000 1086141952 15492 = 40ce420000000000 1087259136 15570 = 40ce690000000000 1087269120 Code for http://www.tutorialspoint.com/compile_java_online.php public class HelloWorld{ public static void main(String []args){ int[] arr = new int[] {10,2978,3056,3234,3254,3289,3299,3309,3334,3354,7458,7468,7478,15492,15570}; for (int j: arr) { long l = Double.doubleToLongBits((double)j); System.out.println(j + " = " + Long.toHexString(l) + " " + ((int)(l >> 32))); } } } For your new data: 1 = 3ff0000000000000 1072693248 2 = 4000000000000000 1073741824 3 = 4008000000000000 1074266112 4 = 4010000000000000 1074790400 5 = 4014000000000000 1075052544 6 = 4018000000000000 1075314688 7 = 401c000000000000 1075576832 8 = 4020000000000000 1075838976 9 = 4022000000000000 1075970048 10 = 4024000000000000 1076101120 11 = 4026000000000000 1076232192 12 = 4028000000000000 1076363264 13 = 402a000000000000 1076494336 14 = 402c000000000000 1076625408 15 = 402e000000000000 1076756480 16 = 4030000000000000 1076887552 17 = 4031000000000000 1076953088 18 = 4032000000000000 1077018624 19 = 4033000000000000 1077084160 20 = 4034000000000000 1077149696 21 = 4035000000000000 1077215232 22 = 4036000000000000 1077280768 23 = 4037000000000000 1077346304
  4. Please, need help with determining how values are converted. Here is a list of values in game and the Dword value of it: 10 1076101120 7458 1086136832 7468 1086139392 7478 1086141952 2978 1084703680 3056 1084743680 3234 1084834816 3254 1084845056 3289 1084862976 3299 1084868096 3309 1084873216 3334 1084886016 3354 1084896256 15492 1087259136 15570 1087269120 Hopefully @Enyby you can help me
  5. Double - Double in hex - first 32 bit double as float. 0 = 0 0.0 1 = 3ff0000000000000 1.875 2 = 4000000000000000 2.0 3 = 4008000000000000 2.125 4 = 4010000000000000 2.25 5 = 4014000000000000 2.3125 6 = 4018000000000000 2.375 7 = 401c000000000000 2.4375 8 = 4020000000000000 2.5 9 = 4022000000000000 2.53125 10 = 4024000000000000 2.5625 11 = 4026000000000000 2.59375 12 = 4028000000000000 2.625 13 = 402a000000000000 2.65625 14 = 402c000000000000 2.6875 15 = 402e000000000000 2.71875 16 = 4030000000000000 2.75 17 = 4031000000000000 2.765625 18 = 4032000000000000 2.78125 19 = 4033000000000000 2.796875 20 = 4034000000000000 2.8125 21 = 4035000000000000 2.828125 22 = 4036000000000000 2.84375 23 = 4037000000000000 2.859375 24 = 4038000000000000 2.875 25 = 4039000000000000 2.890625 26 = 403a000000000000 2.90625 27 = 403b000000000000 2.921875 28 = 403c000000000000 2.9375 29 = 403d000000000000 2.953125 30 = 403e000000000000 2.96875 From code: public class HelloWorld{ public static void main(String []args){ for (int i = 0; i < 100; i++) { long l = Double.doubleToLongBits((double)i); System.out.println(i + " = " + Long.toHexString(l) + " " + Float.intBitsToFloat((int)(l >> 32))); } } } For: http://www.tutorialspoint.com/compile_java_online.php In last GG you can simple search with double data type.
  6. You can hack HP, thanks to the trick NoFear1183 shared. The HP value for 50( when you have nothing equipped) is: 3.140625 After searching that value, equip wooden armour, your HP will become 85. Now you need to search value for 85 which is: 3.33203125 Now there should be only two values. Just change to 10 or 20. But keep in mind the HP will not change permanently. You need to freeze it for unlimited hp. You need to do this every time you load the game.
  7. If value of item is 1, search 1.875 (floating) 2 of item, search 2. (floating) Some other sample values. 2.3125 5 2.375 6 2.4375 7 2.5 8 2.53125 9 2.5625 10 2.59375 11 2.625 12 2.8125 20 10 524288 You can see the trend of point 125 then 0.03125 Then later the increments get smaller and smaller. As you see 10 floating is 524,288. When editing values, keep in mind the decimal. Best is multiply what you are editing by 10. (edit 1.875 to 10.875). This way you don't "break" the values. Here is a video sample for you :
  8. Group search format: value1; value2; value 3: region In total, you can specify from 2 to 8 values. The region should be 1 to 65535. The larger the area, the slower the search and more memory is needed for it. If the region is not specified, it is assumed to be equal to 512. The value can be specified as a number or in hexadecimal with a pointer type, or in the reverse hexadecimal. For example: 10 - 10 type Auto. 10B - 10 with the type Byte. 10F - 10.0 with the Float type. 10X - 10 with the type of Xor. 0Ah - 10 in hexadecimal notation. 0A00hD - 2560 in hexadecimal notation and the type Dword. 0A00rW - 10 in reverse hex and Word type. Contact hexadecimal notation allows you to record the bytes as they are in the memory, not doing their permutation. For example, the number ABCDEFh in memory will be written as EF CD AB. Instead of rearranging the bytes yourself, you can simply write EFCDABr. Thus, you can write something like: 10; BCh; 0A00hW; FFEErD; 1.234F: 2345 And it will search with GG. The most simple and obvious use - Search byte string in memory. The maximum length is 4 * 8 - 32 bytes. For example: "6E 6E 62 61 65 64 72 6F 66 5F 6D" It: 62 61 6E 6ErD; 65 64 5F 66rD; 72hB; 6FhB; 6DhB: 11 The only negative - will be found all the permutations of these numbers.
  9. Extended edit all values In GameGuardian there are unique features that are not, in any other similar utilities. One is editing incrementally. Consider it more. "Hacks" I'll be the application TapCounter. Its essence is simple - it counts the number of Taps on the screen. The perfect object for hacking. We assume that the value is not changed to crack. A typical example - the price in the store. Here I am 47 tapov self-fulfilling. Now I want to do to make it 200. Spoiler I enter in the search found dword 47. 370 values. Too much. But to change the value, I can not, so I can not weed. Spoiler Just then comes to the rescue and change all values. Now I have uploaded the first 100 values. Only try to change them. You can not put 100, and the other numbers if the tap on the number found. Spoiler So, open edit all values. Spoiler Here we are interested in the "increment". The default is zero. What does it mean? This is the number that will be added to each value multiplied by the number in the list of results starting from scratch. Let me explain what that means with an example. We have three numbers. The value is 47. The increment is 0. If you change will be recorded 47, 47, 47. Put increment: 1 - 47, 48, 49. 2 - 47, 49, 51. 10 - 47, 57, 67. n - 0 * 47 + n, 47 + 1 * n, 47 + 2 * n. What do we need? Check the variable address. How do we do? We assign increment 1 and see the new value in the game. We do. Spoiler The "game" remains 47. What does it mean? The fact that the desired value, we have not changed. In some games, you need to exit / enter on the screen (the store), the change will be displayed. Here, too, the value does not update itself, so I click the first "+" and then "-" that it was updated. To play is not taken off, change all the values back to the 47. Now we need to download the following 100. While the user-friendly interface for this is not, use the filters on the address. Move to the last. Copy the address, making it a long tap. Spoiler Select the filters and activate the filter address our more than copied. Spoiler Now we see that filtered 200 results, showing 100, and a total of 370. Repeat change the value incrementally. The game once again, nothing has changed. Spoiler Again missing addresses 100 through filters. Spoiler In general, repeated as long as the value does not change. Spoiler It changed to 84. We go back to the GG, find the line with the value of 84. Spoiler This will be the key we are. Click on it. Put a check mark on the preserve. Spoiler Then again we go to edit everything and the value of 47 is returned to all that the game has not taken off. Clear the search and go to the tab the stored values. There will be our stored value. We put him 200 and enjoy life. Spoiler Mission accomplished. You could not dance with the filters and put the number of output is higher than the number of found (370) and change all through the increment. But then the more chance you'll change something is not right, and the game will crash. Of course, she can fly, and so, there could be as lucky. But this method is better than nothing.
  10. When i have on the end 10 rsults, must change 5 and 5 not?
  11. Not always. Lets say: -the game has a lot of small levels. -you can't use the currency you gain in game mode. Lets say level has 10 battles that might give You currency. Initial scan would be unknown. If You get a battle with no currency gain then You do get rid of counter values. Means You do need to find the value with max of 11 scans. You can't use specific scan and initial scan being unknown won't allow you to get rid of enough values to make it possible to find the right one. Lets say You get lucky few times and You do get the AoB with correct wildcards. You still aren't able to find the value easily later on since You can't scan for array of bytes.
  12. There are literally unlimited ways they can make you not find the values. For example RPG Maker games use "(2x value)+1" to store their values. I have seen games that have used "value +255" or " 4,294,967,295 - value" They can just store visual value for You to step on. Lets say you have variable "visual_gold" and "real_gold". visual_gold would be just a calculated field that would there for You to see for example "visual_gold=real_gold/10". All other (real calculations) would be done using real_gold value itself and You changing the visual_gold value wouldn't do anything for you. (Can be used to flag Your save file as cheater and make the game a lot harder for You just because You changed virtual value just once) With gg there isn't any way to find such values hidden by means of Increment or decrement. If as You say game got patched and You can't find values anymore. Array of Byte scan would easily give You new value if they haven't changed the base structure of the object at hand (they usually never chage structure just to prevent hacking).
  13. Same here. Since the last update, GGuardian finds about 10-15 numbers for example for the search 920 (ammount of gold you need to buy crate packs[Float]) instead of 100-200 lines. You can modify them, but none of them works. And if you start a new search, the GGuardians finds new lines again (You can repeat it forever. No real result) I think, they made a cheatsafe client.
  14. Speedhack will crash the app. And show alert "Operation not permitted". Same as first posted. 2016-01-13-10-21-16.txt
  15. I ran ps in terminal command and this is what I got u22_a243@Lenovo:/ $ ps USER PID PPID VSIZE RSS WCHAN PC NAME root 1 0 1272 956 ffffffff 00000000 S /init root 2 0 0 0 ffffffff 00000000 S kthreadd root 3 2 0 0 ffffffff 00000000 S ksoftirqd/0 root 5 2 0 0 ffffffff 00000000 S kworker/0:0H root 6 2 0 0 ffffffff 00000000 D kworker/u8:0 root 7 2 0 0 ffffffff 00000000 S migration/0 root 8 2 0 0 ffffffff 00000000 S rcu_preempt root 9 2 0 0 ffffffff 00000000 S rcu_bh root 10 2 0 0 ffffffff 00000000 S rcu_sched root 11 2 0 0 ffffffff 00000000 S migration/1 root 12 2 0 0 ffffffff 00000000 S ksoftirqd/1 root 14 2 0 0 ffffffff 00000000 S kworker/1:0H root 15 2 0 0 ffffffff 00000000 S migration/2 root 16 2 0 0 ffffffff 00000000 S ksoftirqd/2 root 18 2 0 0 ffffffff 00000000 S kworker/2:0H root 19 2 0 0 ffffffff 00000000 S migration/3 root 20 2 0 0 ffffffff 00000000 S ksoftirqd/3 root 22 2 0 0 ffffffff 00000000 S kworker/3:0H root 23 2 0 0 ffffffff 00000000 S khelper root 24 2 0 0 ffffffff 00000000 S netns root 29 2 0 0 ffffffff 00000000 S kworker/0:1H root 30 2 0 0 ffffffff 00000000 S smd_channel_clo root 31 2 0 0 ffffffff 00000000 S smsm_cb_wqroot 33 2 0 0 ffffffff 00000000 D kworker/u9:0 root 34 2 0 0 ffffffff 00000000 S rpm-smd root 35 2 0 0 ffffffff 00000000 S kworker/u9:1 root 36 2 0 0 ffffffff 00000000 S irq/47-cprroot 37 2 0 0 ffffffff 00000000 S deferwq root 38 2 0 0 ffffffff 00000000 S mpm root 59 2 0 0 ffffffff 00000000 S writeback root 60 2 0 0 ffffffff 00000000 S bioset root 61 2 0 0 ffffffff 00000000 S crypto root 62 2 0 0 ffffffff 00000000 S kblockd root 63 2 0 0 ffffffff 00000000 S khubd root 64 2 0 0 ffffffff 00000000 S system root 65 2 0 0 ffffffff 00000000 S irq/75-msm_iomm root 66 2 0 0 ffffffff 00000000 S irq/75-msm_iomm root 67 2 0 0 ffffffff 00000000 S irq/273-msm_iom root 68 2 0 0 ffffffff 00000000 S irq/274-msm_iom root 69 2 0 0 ffffffff 00000000 S irq/102-msm_iom root 70 2 0 0 ffffffff 00000000 S irq/102-msm_iom root 71 2 0 0 ffffffff 00000000 S irq/102-msm_iom root 72 2 0 0 ffffffff 00000000 S irq/102-msm_iom root 73 2 0 0 ffffffff 00000000 S irq/102-msm_iom root 74 2 0 0 ffffffff 00000000 S irq/102-msm_iom root 75 2 0 0 ffffffff 00000000 S irq/102-msm_iom root 76 2 0 0 ffffffff 00000000 S irq/102-msm_iom root 77 2 0 0 ffffffff 00000000 S irq/102-msm_iom root 78 2 0 0 ffffffff 00000000 S irq/102-msm_iom root 79 2 0 0 ffffffff 00000000 S irq/102-msm_iom root 80 2 0 0 ffffffff 00000000 S irq/102-msm_iom root 81 2 0 0 ffffffff 00000000 S irq/102-msm_iom root 82 2 0 0 ffffffff 00000000 S irq/102-msm_iom root 83 2 0 0 ffffffff 00000000 S irq/102-msm_iom root 84 2 0 0 ffffffff 00000000 S irq/102-msm_iom root 85 2 0 0 ffffffff 00000000 S irq/102-msm_iom root 86 2 0 0 ffffffff 00000000 S irq/102-msm_iom root 87 2 0 0 ffffffff 00000000 S irq/102-msm_iom root 88 2 0 0 ffffffff 00000000 S irq/102-msm_iom root 89 2 0 0 ffffffff 00000000 S devfreq_wqroot 90 2 0 0 ffffffff 00000000 S cfg80211 root 91 2 0 0 ffffffff 00000000 S kswapd0 root 92 2 0 0 ffffffff 00000000 S fsnotify_mark root 93 2 0 0 ffffffff 00000000 S cifsiod root 112 2 0 0 ffffffff 00000000 D mdss_dsi_event root 113 2 0 0 ffffffff 00000000 S apr_driverroot 114 2 0 0 ffffffff 00000000 S pil_vote_wq root 115 2 0 0 ffffffff 00000000 S mem_share_svc root 116 2 0 0 ffffffff 00000000 S qmi_hndl0000000 root 117 2 0 0 ffffffff 00000000 S msm_ipc_router root 118 2 0 0 ffffffff 00000000 S hwrng root 119 2 0 0 ffffffff 00000000 S diag_real_time_ root 120 2 0 0 ffffffff 00000000 S diag_modem_data root 121 2 0 0 ffffffff 00000000 S diag_lpass_data root 122 2 0 0 ffffffff 00000000 S diag_wcnss_data root 123 2 0 0 ffffffff 00000000 S diag_sensors_da root 124 2 0 0 ffffffff 00000000 S diag_wq root 125 2 0 0 ffffffff 00000000 S DIAG_USB_diag root 126 2 0 0 ffffffff 00000000 S diag_cntl_wq root 127 2 0 0 ffffffff 00000000 S diag_dci_wq root 128 2 0 0 ffffffff 00000000 S kgsl-3d0 root 129 2 0 0 ffffffff 00000000 S kgsl-events root 130 2 0 0 ffffffff 00000000 S governor_msm_ad root 131 2 0 0 ffffffff 00000000 S kgsl_devfreq_wq root 132 2 0 0 ffffffff 00000000 S proximity_als root 133 2 0 0 ffffffff 00000000 S spi0 root 136 2 0 0 ffffffff 00000000 S usbnet root 137 2 0 0 ffffffff 00000000 S sharedmem_qmi_w root 138 2 0 0 ffffffff 00000000 S qmi_hndl0000000 root 140 2 0 0 ffffffff 00000000 S k_gserial root 141 2 0 0 ffffffff 00000000 S uether root 142 2 0 0 ffffffff 00000000 S irq/328-ft5x06_ root 143 2 0 0 ffffffff 00000000 S sns_akm root 144 2 0 0 ffffffff 00000000 S elan_sensor_wq root 147 2 0 0 ffffffff 00000000 S msm_cpp_workque root 148 2 0 0 ffffffff 00000000 S dm_bufio_cache root 149 2 0 0 ffffffff 00000000 S cfinteractive root 150 2 0 0 ffffffff 00000000 S irq/170-7824900 root 151 2 0 0 ffffffff 00000000 S irq/253-7864900 root 172 2 0 0 ffffffff 00000000 S binder root 173 2 0 0 ffffffff 00000000 S usb_bam_wqroot 174 2 0 0 ffffffff 00000000 S krfcommd root 176 2 0 0 ffffffff 00000000 S irq/460-wcnss root 177 2 0 0 ffffffff 00000000 S irq/428-modem root 178 2 0 0 ffffffff 00000000 S msm_vidc_worker root 179 2 0 0 ffffffff 00000000 S pm_workerq_venu root 180 2 0 0 ffffffff 00000000 S mmcqd/0 root 181 2 0 0 ffffffff 00000000 S mmcqd/0rpmb root 182 2 0 0 ffffffff 00000000 S irq/309-fifo_up root 183 2 0 0 ffffffff 00000000 S irq/310-fsm_sta root 184 2 0 0 ffffffff 00000000 S mmcqd/1 root 185 2 0 0 ffffffff 00000000 S irq/298-fastchg root 188 2 0 0 ffffffff 00000000 S irq/301-batt_pr root 189 2 0 0 ffffffff 00000000 S rq_stats root 190 2 0 0 ffffffff 00000000 S bam_dmux_rx root 191 2 0 0 ffffffff 00000000 S bam_dmux_tx root 192 2 0 0 ffffffff 00000000 S k_bam_dataroot 193 2 0 0 ffffffff 00000000 S f_mtp root 194 2 0 0 ffffffff 00000000 S file-storage root 195 2 0 0 ffffffff 00000000 S msm_thermal:hot root 196 2 0 0 ffffffff 00000000 S msm_thermal:fre root 197 2 0 0 ffffffff 00000000 S msm_thermal:the root 198 1 972 576 ffffffff 00000000 S /sbin/ueventd root 200 2 0 0 ffffffff 00000000 S jbd2/mmcblk0p23 root 201 2 0 0 ffffffff 00000000 S ext4-dio-unwrit root 205 2 0 0 ffffffff 00000000 S kworker/1:1H root 206 2 0 0 ffffffff 00000000 S jbd2/mmcblk0p30 root 207 2 0 0 ffffffff 00000000 S ext4-dio-unwrit root 211 2 0 0 ffffffff 00000000 S jbd2/mmcblk0p25 root 212 2 0 0 ffffffff 00000000 S ext4-dio-unwrit root 213 2 0 0 ffffffff 00000000 S jbd2/mmcblk0p24 root 214 2 0 0 ffffffff 00000000 S ext4-dio-unwrit root 217 2 0 0 ffffffff 00000000 S kworker/2:1H root 251 2 0 0 ffffffff 00000000 S IPCRTR root 252 2 0 0 ffffffff 00000000 S modem_IPCRTR logd 253 1 9096 2576 ffffffff 00000000 S /system/bin/logd root 254 1 1672 172 ffffffff 00000000 S /sbin/healthd root 255 1 2348 500 ffffffff 00000000 S /system/bin/lmkd system 256 1 1616 544 ffffffff 00000000 S /system/bin/servicemanager root 257 1 5804 880 ffffffff 00000000 S /system/bin/vold system 258 1 96644 7536 ffffffff 00000000 S /system/bin/surfaceflinger nobody 259 1 6892 544 ffffffff 00000000 S /system/bin/rmt_storage system 260 1 3228 540 ffffffff 00000000 S /system/bin/rfs_access system 262 1 2928 520 ffffffff 00000000 S /system/bin/qseecomd system 263 1 1820 496 ffffffff 00000000 S /system/bin/vm_bms shell 266 1 1520 360 ffffffff 00000000 S /system/bin/sh audit 267 1 1320 468 ffffffff 00000000 S /system/bin/auditd root 268 1 14004 3072 ffffffff 00000000 S /system/bin/netd root 269 1 1516 436 ffffffff 00000000 S /system/bin/.krsh root 270 1 248 28 ffffffff 00000000 S /system/bin/debuggerd64 radio 271 1 33144 3416 ffffffff 00000000 S /system/bin/rild drm 272 1 13680 1528 ffffffff 00000000 S /system/bin/drmserver media 273 1 85836 21360 ffffffff 00000000 S /system/bin/mediaserver install 274 1 1532 592 ffffffff 00000000 S /system/bin/installd radio 277 1 12884 324 ffffffff 00000000 S /system/bin/qmuxd radio 278 1 12872 1208 ffffffff 00000000 S /system/bin/netmgrd radio 279 1 33104 2836 ffffffff 00000000 S /system/bin/rild root 280 1 33200 700 ffffffff 00000000 S /system/bin/thermal-engine system 281 1 4512 720 ffffffff 00000000 S /system/bin/wcnss_service root 282 1 936352 22844 ffffffff 00000000 S zygote camera 283 1 14136 2328 ffffffff 00000000 S /system/bin/mm-qcamera-daemon system 284 1 7404 708 ffffffff 00000000 S /system/bin/time_daemon system 285 1 10312 1108 ffffffff 00000000 S /system/bin/audiod media_rw 286 1 5184 2288 ffffffff 00000000 S /system/bin/sdcard system 287 1 6032 964 ffffffff 00000000 S /system/bin/cnd root 288 1 4852 720 ffffffff 00000000 S /system/bin/dpmd root 302 1 252 32 ffffffff 00000000 S /system/bin/debuggerd64 root 312 2 0 0 ffffffff 00000000 S kauditd system 313 1 5576 700 ffffffff 00000000 S /system/bin/mm-pp-daemon system 325 262 7164 508 ffffffff 00000000 S /system/bin/qseecomd root 327 1 3424 472 ffffffff 00000000 S /system/bin/perfd root 333 2 0 0 ffffffff 00000000 S irq/318-mbhc sw root 334 2 0 0 ffffffff 00000000 S irq/316-Button root 335 2 0 0 ffffffff 00000000 S irq/315-Button root 336 2 0 0 ffffffff 00000000 S irq/314-Elect I root 337 2 0 0 ffffffff 00000000 S irq/317-Elect R root 338 2 0 0 ffffffff 00000000 S irq/321-HPH_L O root 339 2 0 0 ffffffff 00000000 S irq/320-HPH_R O root 341 2 0 0 ffffffff 00000000 S kworker/3:1H root 360 1 428 72 ffffffff 00000000 S /system/xbin/ku.sud system 379 288 6980 968 ffffffff 00000000 S /system/bin/dpmd root 381 1 444 124 ffffffff 00000000 S /system/xbin/ku.sud root 448 1 428 144 ffffffff 00000000 S kuInotify root 688 269 2032 828 ffffffff 00000000 S /system/bin/debuggerd_real system 790 282 1178096 138632 ffffffff 00000000 S system_server keystore 958 1 4332 824 ffffffff 00000000 S /system/bin/keystore root 2140 2 0 0 ffffffff 00000000 S IPCRTR root 2142 2 0 0 ffffffff 00000000 S wcnss_IPCRTR root 3147 2 0 0 ffffffff 00000000 S kworker/0:2 u22_a19 3486 282 956116 26880 ffffffff 00000000 S com.google.process.gapps u0_a74 4289 282 1086192 71212 ffffffff 00000000 S com.touchtype.swiftkey system 4412 282 978004 28504 ffffffff 00000000 S com.quicinc.cne.CNEService system 4436 282 972256 25664 ffffffff 00000000 S org.mokee.services u0_a6 4494 282 972328 25696 ffffffff 00000000 S com.android.incallui u0_a63 4530 282 973708 25740 ffffffff 00000000 S com.atmos radio 4560 282 1044948 45992 ffffffff 00000000 S com.android.phone u0_a11 4585 282 1019688 71968 ffffffff 00000000 S com.mokee.launcher root 4593 1 260 60 ffffffff 00000000 S k_worker/31:0 u22_a109 4664 282 967656 40996 ffffffff 00000000 S com.kingroot.kinguser:service media_rw 4698 1 4392 1248 ffffffff 00000000 S /system/bin/sdcard u22_a109 4786 4664 428 4 ffffffff 00000000 S ku.sud root 4790 1 1452 40 ffffffff 00000000 S /system/xbin/ku.sud root 4791 4790 1468 532 ffffffff 00000000 S k_shell/2210109:4786 u0_a59 4896 282 973320 25172 ffffffff 00000000 S com.android.smspush u0_a19 5167 282 1111764 52348 ffffffff 00000000 S com.google.android.gms.persistent u22_system 5294 282 988068 36016 ffffffff 00000000 S com.android.settings root 5340 2 0 0 ffffffff 00000000 S kworker/u8:7 u22_a35 5523 282 966368 24768 ffffffff 00000000 S com.android.email u22_a115 5577 282 960216 27104 ffffffff 00000000 S com.cmplay.activesdk:service u22_a63 5802 282 947124 22096 ffffffff 00000000 S com.atmos u22_a60 5821 282 998860 27192 ffffffff 00000000 S com.android.de u0_a167 5922 282 983804 29656 ffffffff 00000000 S com.oasisfeng.greenify:service u0_a167 5947 5922 1500 416 ffffffff 00000000 S sh u0_a167 5952 5947 1424 560 ffffffff 00000000 S logcat u22_a110 5990 282 1156420 115336 ffffffff 00000000 S com.chrome.dev u22_a110 6079 282 1058820 64524 ffffffff 00000000 S com.chrome.dev:privileged_process0 u0_a60 6419 282 946620 23600 ffffffff 00000000 S com.android.de u22_a19 6440 282 1078752 40400 ffffffff 00000000 S com.google.android.gms.persistent u22_radio 6589 282 950000 23616 ffffffff 00000000 S com.qualcomm.qcrilmsgtunnel root 7155 2 0 0 ffffffff 00000000 S kworker/0:1 u22_a15 7179 282 1012280 61768 ffffffff 00000000 S com.android.systemui u22_a239 7835 282 991592 59300 ffffffff 00000000 S com.janerking.archery u22_a239 7863 7835 428 4 ffffffff 00000000 S su root 7868 1 1452 40 ffffffff 00000000 S /system/xbin/ku.sud root 7869 7868 2636 784 ffffffff 00000000 S kworker root 7958 7869 0 0 ffffffff 00000000 Z getenforceroot 7960 7869 0 0 ffffffff 00000000 Z getenforceroot 7961 7869 0 0 ffffffff 00000000 Z sh root 7963 7869 0 0 ffffffff 00000000 Z sh radio 8266 282 949004 22212 ffffffff 00000000 S com.qualcomm.qcrilmsgtunnel root 8303 1 252 28 ffffffff 00000000 S /data/data-lib/com.kingroot.kinguser/ktools u0_a109 8311 282 970008 32096 ffffffff 00000000 S com.kingroot.kinguser:service root 8383 2 0 0 ffffffff 00000000 S kworker/u8:1 u0_a109 8395 8311 260 4 ffffffff 00000000 S k_worker/31:10109 root 8408 4593 260 36 ffffffff 00000000 S k_worker/31:0 root 8409 8408 1528 576 ffffffff 00000000 S sh u0_a19 9532 282 1180452 45008 ffffffff 00000000 S com.google.android.gms u0_a19 9563 282 958264 29184 ffffffff 00000000 S com.google.process.gapps u22_a19 9657 282 1382200 81128 ffffffff 00000000 S com.google.android.gms u0_a15 10236 282 1102684 115992 ffffffff 00000000 S com.android.systemui root 10581 2 0 0 ffffffff 00000000 S kworker/3:0 root 11166 2 0 0 ffffffff 00000000 R kworker/u8:8 u22_a235 11191 282 1198252 176288 ffffffff 00000000 S com.ea.game.nfs14_row u22_a237 11287 282 955840 28280 ffffffff 00000000 S com.android.vending.billing.InAppBillingService.LACK:billing u22_a237 11321 11287 428 4 ffffffff 00000000 S su root 11328 1 1452 40 ffffffff 00000000 S /system/xbin/ku.sud root 11331 11328 1496 832 ffffffff 00000000 S k_shell/2210237:11321 root 11643 2 0 0 ffffffff 00000000 S kworker/1:1 u22_i170 11815 282 1157936 87616 ffffffff 00000000 S com.chrome.dev:sandboxed_process7 root 11886 2 0 0 ffffffff 00000000 S kworker/0:0 root 11929 2 0 0 ffffffff 00000000 S kworker/3:1 root 12004 2 0 0 ffffffff 00000000 S kworker/1:3 root 12272 2 0 0 ffffffff 00000000 S kworker/2:1 root 12273 2 0 0 ffffffff 00000000 S kworker/u8:2 u22_i172 12317 282 1061872 39948 ffffffff 00000000 S com.chrome.dev:sandboxed_process9 root 12561 2 0 0 ffffffff 00000000 S mdss_fb0 u0_a34 12766 282 989784 40136 ffffffff 00000000 S com.cyanogenmod.eleven:main u22_a34 12911 282 989700 39952 ffffffff 00000000 S com.cyanogenmod.eleven:main root 13246 2 0 0 ffffffff 00000000 S VosWDThread root 13247 2 0 0 ffffffff 00000000 S VosMCThread root 13248 2 0 0 ffffffff 00000000 S VosTXThread root 13249 2 0 0 ffffffff 00000000 S VosRXThread root 13250 2 0 0 ffffffff 00000000 S wlan_logging_th wifi 13251 1 4436 1388 ffffffff 00000000 S /system/bin/wpa_supplicant dhcp 13588 1 1432 444 ffffffff 00000000 S /system/bin/dhcpcd root 13944 2 0 0 ffffffff 00000000 S kworker/0:3 system 13959 282 983708 36284 ffffffff 00000000 S com.android.settings u22_a16 14049 282 953904 27996 ffffffff 00000000 S org.cyanogenmod.theme.chooser u22_a12 14176 282 1126912 103952 ffffffff 00000000 S com.android.vending u22_a7 14219 282 949704 35208 ffffffff 00000000 S android.process.media u0_a12 14244 282 996112 42552 ffffffff 00000000 S com.android.vending u22_a77 14290 282 1523528 150512 ffffffff 00000000 S com.google.android.gm u22_a4 14502 282 950688 32632 ffffffff 00000000 S android.process.acore u0_a84 14538 282 1027644 57504 ffffffff 00000000 S com.whatsapp u0_a4 14590 282 960120 42536 ffffffff 00000000 S android.process.acore u0_a235 14636 282 959496 26536 ffffffff 00000000 S com.ea.game.nfs14_row root 14703 2 0 0 ffffffff 00000000 S kworker/1:0 root 14720 2 0 0 ffffffff 00000000 S kworker/3:2 u0_a121 14809 282 956172 34512 ffffffff 00000000 S imoblife.startupmanager u0_a5 14844 282 945720 26572 ffffffff 00000000 S com.android.defcontainer u22_a16 14894 282 944864 28592 ffffffff 00000000 S org.cyanogenmod.themes.provider u22_a20 14916 282 946280 26168 ffffffff 00000000 S com.google.android.partnersetup u22_a39 14939 282 951964 28420 ffffffff 00000000 S com.android.gallery3d u22_a52 14959 282 945724 25300 ffffffff 00000000 S com.svox.pico u22_a237 15042 282 953752 29624 ffffffff 00000000 S com.android.vending.billing.InAppBillingService.LACK u22_a243 15155 282 1008300 68928 ffffffff b6deda40 R jackpal.androidterm u22_a243 15176 15155 1520 876 c03ff48c b6ec48c8 S /system/bin/sh u22_a243 15191 1 3524 1416 ffffffff b6f55b7c S adb root 15330 2 0 0 ffffffff 00000000 S kworker/2:2 u0_a19 15336 282 1054660 25928 ffffffff 00000000 S com.google.android.gms.nearby.connection root 15411 2 0 0 ffffffff 00000000 S kworker/2:3 u22_a243 15432 15155 1516 844 c012c1a8 b6ef8694 S /system/bin/sh u22_a243 15441 15432 2700 988 00000000 b6f328c8 R ps u22_a11 16656 282 1009124 60224 ffffffff 00000000 S com.mokee.launcher root 17227 1 260 36 ffffffff 00000000 S k_worker/44:0 u22_a74 17799 282 1066312 82160 ffffffff 00000000 S com.touchtype.swiftkey u0_a197 23100 282 998668 52768 ffffffff 00000000 S com.zerodesktop.appdetox.qualitytime root 30886 2 0 0 ffffffff 00000000 S kworker/2:0 u22_a243@Lenovo:/ $
  16. AbcBca

    GameGuardian

    01-10 00:59:23.891 D/BulldogService(5270): try: exec /data/app-lib/com.janerking.archery-1/libdaemon.so com.janerking.archery 01-10 00:59:38.511 F/libc (5295): Fatal signal 8 (SIGFPE) at 0x0804c677 (code=1), thread 5295 (libdaemon.so) 01-10 00:59:38.631 I/DEBUG (574): pid: 5295, tid: 5295, name: libdaemon.so >>> kworker <<< 01-10 00:59:38.631 I/DEBUG (574): #00 pc 00004677 /data/app-lib/com.janerking.archery-1/libdaemon.so 01-10 00:59:38.631 I/DEBUG (574): #01 pc 0000657b /data/app-lib/com.janerking.archery-1/libdaemon.so 01-10 00:59:38.631 I/DEBUG (574): #02 pc 00034b71 /data/app-lib/com.janerking.archery-1/libdaemon.so 01-10 00:59:38.631 I/DEBUG (574): #03 pc 00035bae /data/app-lib/com.janerking.archery-1/libdaemon.so 01-10 00:59:38.631 I/DEBUG (574): #04 pc 000011de /data/app-lib/com.janerking.archery-1/libdaemon.so 01-10 00:59:38.631 I/DEBUG (574): #06 pc 000012d8 /data/app-lib/com.janerking.archery-1/libdaemon.so 01-10 00:59:38.631 I/DEBUG (574): bf82e7b8 08049d49 /data/app-lib/com.janerking.archery-1/libdaemon.so 01-10 00:59:38.631 I/DEBUG (574): bf82e7bc 08099f1c /data/app-lib/com.janerking.archery-1/libdaemon.so 01-10 00:59:38.631 I/DEBUG (574): bf82e7cc 0804c63b /data/app-lib/com.janerking.archery-1/libdaemon.so 01-10 00:59:38.631 I/DEBUG (574): #00 bf82e7d0 080949b0 /data/app-lib/com.janerking.archery-1/libdaemon.so 01-10 00:59:38.631 I/DEBUG (574): bf82e7f0 08094992 /data/app-lib/com.janerking.archery-1/libdaemon.so 01-10 00:59:38.631 I/DEBUG (574): bf82e804 080949b0 /data/app-lib/com.janerking.archery-1/libdaemon.so 01-10 00:59:38.631 I/DEBUG (574): bf82ed94 080949b0 /data/app-lib/com.janerking.archery-1/libdaemon.so 01-10 00:59:38.631 I/DEBUG (574): bf82ed98 08094992 /data/app-lib/com.janerking.archery-1/libdaemon.so 01-10 00:59:38.631 I/DEBUG (574): bf82ed9c 080949a0 /data/app-lib/com.janerking.archery-1/libdaemon.so 01-10 00:59:38.631 I/DEBUG (574): bf82edbc 08094992 /data/app-lib/com.janerking.archery-1/libdaemon.so 01-10 00:59:38.631 I/DEBUG (574): bf82edc4 080948ab /data/app-lib/com.janerking.archery-1/libdaemon.so 01-10 00:59:38.631 I/DEBUG (574): bf82edc8 080948b9 /data/app-lib/com.janerking.archery-1/libdaemon.so 01-10 00:59:38.631 I/DEBUG (574): bf82f2c8 0809473e /data/app-lib/com.janerking.archery-1/libdaemon.so 01-10 00:59:38.631 I/DEBUG (574): bf82f2cc 08094be7 /data/app-lib/com.janerking.archery-1/libdaemon.so 01-10 00:59:38.631 I/DEBUG (574): bf82f2d0 08094634 /data/app-lib/com.janerking.archery-1/libdaemon.so 01-10 00:59:38.631 I/DEBUG (574): 08048000-08099000 r-x /data/app-lib/com.janerking.archery-1/libdaemon.so 01-10 00:59:38.691 I/DEBUG (574): pid: 5295, tid: 5295, name: libdaemon.so >>> kworker <<< 01-10 00:59:38.691 I/DEBUG (574): #00 pc 00004677 /data/app-lib/com.janerking.archery-1/libdaemon.so 01-10 00:59:38.691 I/DEBUG (574): #01 pc 0000657b /data/app-lib/com.janerking.archery-1/libdaemon.so 01-10 00:59:38.691 I/DEBUG (574): #02 pc 00034b71 /data/app-lib/com.janerking.archery-1/libdaemon.so 01-10 00:59:38.691 I/DEBUG (574): #03 pc 00035bae /data/app-lib/com.janerking.archery-1/libdaemon.so 01-10 00:59:38.691 I/DEBUG (574): #04 pc 000011de /data/app-lib/com.janerking.archery-1/libdaemon.so 01-10 00:59:38.691 I/DEBUG (574): #06 pc 000012d8 /data/app-lib/com.janerking.archery-1/libdaemon.so 01-10 00:59:38.691 I/DEBUG (574): bf82e7b8 08049d49 /data/app-lib/com.janerking.archery-1/libdaemon.so 01-10 00:59:38.691 I/DEBUG (574): bf82e7bc 08099f1c /data/app-lib/com.janerking.archery-1/libdaemon.so 01-10 00:59:38.691 I/DEBUG (574): bf82e7cc 0804c63b /data/app-lib/com.janerking.archery-1/libdaemon.so 01-10 00:59:38.691 I/DEBUG (574): #00 bf82e7d0 080949b0 /data/app-lib/com.janerking.archery-1/libdaemon.so 01-10 00:59:38.691 I/DEBUG (574): bf82e7f0 08094992 /data/app-lib/com.janerking.archery-1/libdaemon.so 01-10 00:59:38.691 I/DEBUG (574): bf82e804 080949b0 /data/app-lib/com.janerking.archery-1/libdaemon.so 01-10 00:59:38.691 I/DEBUG (574): bf82ed94 080949b0 /data/app-lib/com.janerking.archery-1/libdaemon.so 01-10 00:59:38.691 I/DEBUG (574): bf82ed98 08094992 /data/app-lib/com.janerking.archery-1/libdaemon.so 01-10 00:59:38.691 I/DEBUG (574): bf82ed9c 080949a0 /data/app-lib/com.janerking.archery-1/libdaemon.so 01-10 00:59:38.691 I/DEBUG (574): bf82edbc 08094992 /data/app-lib/com.janerking.archery-1/libdaemon.so 01-10 00:59:38.691 I/DEBUG (574): bf82edc4 080948ab /data/app-lib/com.janerking.archery-1/libdaemon.so 01-10 00:59:38.691 I/DEBUG (574): bf82edc8 080948b9 /data/app-lib/com.janerking.archery-1/libdaemon.so 01-10 00:59:38.691 I/DEBUG (574): bf82f2c8 0809473e /data/app-lib/com.janerking.archery-1/libdaemon.so 01-10 00:59:38.691 I/DEBUG (574): bf82f2cc 08094be7 /data/app-lib/com.janerking.archery-1/libdaemon.so 01-10 00:59:38.691 I/DEBUG (574): bf82f2d0 08094634 /data/app-lib/com.janerking.archery-1/libdaemon.so 01-10 00:59:38.691 I/DEBUG (574): 08048000-08099000 r-x /data/app-lib/com.janerking.archery-1/libdaemon.so 01-10 00:59:39.301 E/bulldog-daemon(5270): I/DEBUG ( 574): pid: 5295, tid: 5295, name: libdaemon.so >>> kworker <<< 01-10 00:59:39.301 E/bulldog-daemon(5270): I/DEBUG ( 574): #00 pc 00004677 /data/app-lib/com.janerking.archery-1/libdaemon.so 01-10 00:59:39.301 E/bulldog-daemon(5270): I/DEBUG ( 574): #01 pc 0000657b /data/app-lib/com.janerking.archery-1/libdaemon.so 01-10 00:59:39.301 E/bulldog-daemon(5270): I/DEBUG ( 574): #02 pc 00034b71 /data/app-lib/com.janerking.archery-1/libdaemon.so 01-10 00:59:39.301 E/bulldog-daemon(5270): I/DEBUG ( 574): #03 pc 00035bae /data/app-lib/com.janerking.archery-1/libdaemon.so 01-10 00:59:39.301 E/bulldog-daemon(5270): I/DEBUG ( 574): #04 pc 000011de /data/app-lib/com.janerking.archery-1/libdaemon.so 01-10 00:59:39.301 E/bulldog-daemon(5270): I/DEBUG ( 574): #06 pc 000012d8 /data/app-lib/com.janerking.archery-1/libdaemon.so 01-10 00:59:39.301 E/bulldog-daemon(5270): I/DEBUG ( 574): bf82e7b8 08049d49 /data/app-lib/com.janerking.archery-1/libdaemon.so 01-10 00:59:39.301 E/bulldog-daemon(5270): I/DEBUG ( 574): bf82e7bc 08099f1c /data/app-lib/com.janerking.archery-1/libdaemon.so 01-10 00:59:39.301 E/bulldog-daemon(5270): I/DEBUG ( 574): bf82e7cc 0804c63b /data/app-lib/com.janerking.archery-1/libdaemon.so 01-10 00:59:39.301 E/bulldog-daemon(5270): I/DEBUG ( 574): #00 bf82e7d0 080949b0 /data/app-lib/com.janerking.archery-1/libdaemon.so 01-10 00:59:39.301 E/bulldog-daemon(5270): I/DEBUG ( 574): bf82e7f0 08094992 /data/app-lib/com.janerking.archery-1/libdaemon.so 01-10 00:59:39.301 E/bulldog-daemon(5270): I/DEBUG ( 574): bf82e804 080949b0 /data/app-lib/com.janerking.archery-1/libdaemon.so 01-10 00:59:39.301 E/bulldog-daemon(5270): I/DEBUG ( 574): bf82ed94 080949b0 /data/app-lib/com.janerking.archery-1/libdaemon.so 01-10 00:59:39.301 E/bulldog-daemon(5270): I/DEBUG ( 574): bf82ed98 08094992 /data/app-lib/com.janerking.archery-1/libdaemon.so 01-10 00:59:39.301 E/bulldog-daemon(5270): I/DEBUG ( 574): bf82ed9c 080949a0 /data/app-lib/com.janerking.archery-1/libdaemon.so 01-10 00:59:39.421 E/bulldog-daemon(5270): I/DEBUG ( 574): pid: 5295, tid: 5295, name: libdaemon.so >>> kworker <<< 01-10 00:59:39.421 E/bulldog-daemon(5270): I/DEBUG ( 574): #00 pc 00004677 /data/app-lib/com.janerking.archery-1/libdaemon.so 01-10 00:59:39.421 E/bulldog-daemon(5270): I/DEBUG ( 574): #01 pc 0000657b /data/app-lib/com.janerking.archery-1/libdaemon.so 01-10 00:59:39.421 E/bulldog-daemon(5270): I/DEBUG ( 574): #02 pc 00034b71 /data/app-lib/com.janerking.archery-1/libdaemon.so 01-10 00:59:39.421 E/bulldog-daemon(5270): I/DEBUG ( 574): #03 pc 00035bae /data/app-lib/com.janerking.archery-1/libdaemon.so 01-10 00:59:39.421 E/bulldog-daemon(5270): I/DEBUG ( 574): #04 pc 000011de /data/app-lib/com.janerking.archery-1/libdaemon.so 01-10 00:59:39.421 E/bulldog-daemon(5270): I/DEBUG ( 574): #06 pc 000012d8 /data/app-lib/com.janerking.archery-1/libdaemon.so 01-10 00:59:39.421 E/bulldog-daemon(5270): I/DEBUG ( 574): bf82e7b8 08049d49 /data/app-lib/com.janerking.archery-1/libdaemon.so 01-10 00:59:39.421 E/bulldog-daemon(5270): I/DEBUG ( 574): bf82e7bc 08099f1c /data/app-lib/com.janerking.archery-1/libdaemon.so 01-10 00:59:39.421 E/bulldog-daemon(5270): I/DEBUG ( 574): bf82e7cc 0804c63b /data/app-lib/com.janerking.archery-1/libdaemon.so 01-10 00:59:39.421 E/bulldog-daemon(5270): I/DEBUG ( 574): #00 bf82e7d0 080949b0 /data/app-lib/com.janerking.archery-1/libdaemon.so 01-10 00:59:39.421 E/bulldog-daemon(5270): I/DEBUG ( 574): bf82e7f0 08094992 /data/app-lib/com.janerking.archery-1/libdaemon.so 01-10 00:59:39.421 E/bulldog-daemon(5270): I/DEBUG ( 574): bf82e804 080949b0 /data/app-lib/com.janerking.archery-1/libdaemon.so 01-10 00:59:39.421 E/bulldog-daemon(5270): I/DEBUG ( 574): bf82ed94 080949b0 /data/app-lib/com.janerking.archery-1/libdaemon.so 01-10 00:59:39.421 E/bulldog-daemon(5270): I/DEBUG ( 574): bf82ed98 08094992 /data/app-lib/com.janerking.archery-1/libdaemon.so 01-10 00:59:39.421 E/bulldog-daemon(5270): I/DEBUG ( 574): bf82ed9c 080949a0 /data/app-lib/com.janerking.archery-1/libdaemon.so
  17. Enyby

    Known problems

    In some firmware for use GG, you need to allow the use of floating windows. Sometimes it is called the notification, alert, docking area, dropzone and so on. MIUI v5: Go to Settings - Applications - everything. 2. Find Game Guardian 3. Enable slider "Pop-ups" Screenshot https://www.youtube.com/watch?v=0Xxj7Kz7WjQ MIUI v6 / Flyme: Go to "Settings" - "All Applications" - "All" found "GameGuardian", in its turn slider settings "pop-ups". https://www.youtube.com/watch?v=hZfcIT74PS8 Sometimes Flyme meets mistranslation as the Alarm (second paragraph): MIUI v7: Go to the application "Security" - permission - permission - GameGuardian - Pop-up windows. EMUI: Phone Manager - Go to Settings (Settings) - Shortcuts - looking there dropzone manager - activate it. Now its icon available on the desktop. We go to the dropzone manager in the list of GG and allow access. The popup does not show on Huawei phones by default. You will need to allow GameGuardian to show popup. Please open the Phone Manager, then Dropzone Management and please make sure it is turned on for GameGuardian . The Popup also does not show on some Xiaomi phones. You need to head to Settings -> Installed apps -> GameGuardian -> Other permissions -> Display pop-up window. Also, other phones may have different procedures to allow apps to show Popup windows. All such apps are usually affected this way, for example the Google Translator app with the Tap To Translate functionality. Therefore, you can simply google "YOUR_PHONE tap to translate" to find the solution. For example, for Xiaomi Redmi devices the solution is as follows: https://productforums.google.com/forum/#!topic/translate/1Pywh5vI1kE
  18. No. The problem is not the point. They start another thread that connects to the debugger main process. Well, since the debugger can be only one, the GG has not connect. app_25 18501 17857 406968 136224 ffffffff 00000000 S com.buffstudio.timinghero app_25 18514 18501 205728 27312 ffffffff 00000000 S com.buffstudio.timinghero signed int __fastcall sub_25C44(__pid_t a1, int a2) { __pid_t v2; // r4@1 __int32 v3; // r0@1 __int32 v4; // r5@1 int v5; // r1@3 int stat_loc; // [sp+4h] [bp-14h]@1 stat_loc = a2; v2 = a1; v3 = ptrace(PTRACE_ATTACH, a1); v4 = v3; if ( v3 < 0 ) return 255; if ( !v3 ) { if ( waitpid(v2, &stat_loc, 0) == -1 && *_errno(0, v5) == 10 ) waitpid(v2, &stat_loc, -2147483648); if ( ptrace(PTRACE_CONT, v2) < 0 ) { ptrace(PTRACE_DETACH, v2); return 255; } } return v4; }
  19. Oh ok. i just did and it works, but when i pause/play the game too often, the entire device freezes until i hold 10 seconds to shut down my device. can you fix it? My device is Sony Xperia Z3 Compact (ARM processor), and the firmware, SuperSU and Busybox are updated to the latest version.
  20. When I use the game acceleration, it will crash the app. I tried running GG8.X on touchwiz 5.1.1, but the same results However, GG7.3.6 works fine Is device problem or bug? Androidversion: touchwiz 5.0.1 Device model: samsung galaxy j cpu: snapdragon 800 2015-12-27-12-10-10[1].txt
  21. It's a problem of your firmware, not the application. All it falls before the application starts somewhere in the system code. It seems that the ART compilation took place correctly. I'm here I can not do anything. Perhaps this is due to the fact that the new version was used data type "long" in Java code. Similarly, it's hard to say. *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** Build fingerprint: 'samsung/zeroltexx/zerolte:5.1.1/LMY47X/G925FXXU3COI9:user/release-keys' Revision: '10' ABI: 'arm64' pid: 13690, tid: 13690, name: m.cnplay.tiles2 >>> com.cnplay.tiles2 <<< signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0xca900000000217 x0 0000007f89c933c0 x1 0000007fe63a5b80 x2 0000007f89c933c0 x3 0000000000000000 x4 000000007771a1b0 x5 0000000000000001 x6 0000000000000000 x7 0000007f89c8a1bc x8 0000000000000000 x9 0000007f89c8a1b8 x10 0000000000000000 x11 0000000000000000 x12 0000000000000000 x13 0000000000430000 x14 0000000000550000 x15 0000000000430000 x16 0000000000000000 x17 89ca90000000007f x18 0000007f89bfd520 x19 0000000000000060 x20 0000000074115020 x21 0000007f89ca9000 x22 0000007f89ca9090 x23 0000007fe63a5d50 x24 00000000718e4c79 x25 0000007fe63a5d50 x26 0000007fe63a5d60 x27 0000007fe63a5d98 x28 0000007fe63a6270 x29 0000007fe63a5c00 x30 000000007414002c sp 0000007fe63a5b70 pc 0000000074115024 pstate 0000000060000000 v0 00000000000000000000000000000000 v1 00000000000000000000007f89c65560 v2 00000000000000000000000000000000 v3 00000000000000000000007fe63a7118 v4 00000000000000000000007fe63a70a8 v5 00000000000000000000007fe63a7108 v6 00000000000000000000007fe63a7098 v7 000000000000000070c1a93870c1a938 v8 00000000000000000000007fe63a6388 v9 000000000000000000000000714f51e8 v10 00000000000000000000000000000011 v11 00000000000000000000000000000045 v12 00000000000000000000007f89ca0400 v13 00000000000000000000007f89ca0400 v14 00000000000000000000007fe63a7aa8 v15 00000000000000000000000000080000 v16 00000000000000000000007fe63a7088 v17 70c1a93870c1a93870c1a93870c1a938 v18 70c1a93870c1a93870c1a93870c1a938 v19 70c1a93870c1a93870c1a93870c1a938 v20 70c1a93870c1a93870c1a93870c1a938 v21 70c1a93870c1a93870c1a93870c1a938 v22 70c1a93870c1a93870c1a93870c1a938 v23 70c1a93870c1a93870c1a93870c1a938 v24 70c1a93870c1a93870c1a93870c1a938 v25 70c1a93870c1a93870c1a93870c1a938 v26 70c1a93870c1a93870c1a93870c1a938 v27 70c1a93870c1a93870c1a93870c1a938 v28 70c1a93870c1a93870c1a93870c1a938 v29 70c1a93870c1a93870c1a93870c1a938 v30 000000000000000000000000ebad608e v31 000000000000000000000000ebad608f fpsr 00000010 fpcr 00000000 backtrace: #00 pc 0000000000000024 /data/dalvik-cache/arm64/system@[email protected] #01 pc 000000000002b028 /data/dalvik-cache/arm64/system@[email protected] stack: 0000007fe63a5a70 0000007f8a000178 [anon:libc_malloc] 0000007fe63a5a78 0000007fe63a5b68 [stack] 0000007fe63a5a80 0000007fe63a5c30 [stack] 0000007fe63a5a88 0000007f898e0dfc /system/lib64/libart.so (art::gc::allocator::RosAlloc::AllocFromRun(art::Thread*, unsigned long, unsigned long*)+420) 0000007fe63a5a90 0000000012c6f6e0 /dev/ashmem/dalvik-main space (deleted) 0000007fe63a5a98 0000007f89ccf0e8 [anon:libc_malloc] 0000007fe63a5aa0 0000007f89c05e98 [anon:libc_malloc] 0000007fe63a5aa8 0000000000000001 0000007fe63a5ab0 0000007f7f4036d8 [anon:libc_malloc] 0000007fe63a5ab8 0000007f00000001 0000007fe63a5ac0 0000007f8a0001e8 [anon:libc_malloc] 0000007fe63a5ac8 0000007fffffffff 0000007fe63a5ad0 0000007f8a0001e8 [anon:libc_malloc] 0000007fe63a5ad8 0000007f89a0d840 /system/lib64/libart.so (art::mirror::Class::GetInterfaceTypeList()+108) 0000007fe63a5ae0 0000007fe63a5c00 [stack] 0000007fe63a5ae8 0000000074140014 /data/dalvik-cach processName:com.cnplay.tiles2 broadcastEvent : com.cnplay.tiles2 SYSTEM_TOMBSTONE You can try to uninstall and install. Maybe it works, if it was a temporary problem in the compilation of ART.
  22. Update: I decompiled the APK and found a Java file labeled MD5Util in a series of files in a droidhang/utilities directory (droidhang is the name of the dev company). I don't believe this is the function that provides the 10-digit hash spoken of, BUT I think this might help in figuring out how the OTHER XML files for the levels, heroes, and stats are encrypted. Here's the source code: package com.droidhang.util; import java.security.MessageDigest; public class MD5Util { private MD5Util() { } public static String getHexDigest(byte[] digestBytes) { if (digestBytes == null) { return null; } StringBuilder sb = new StringBuilder(); int len$ = digestBytes.length; for (int i$ = 0; i$ < len$; i$++) { sb.append(String.format("%02x", new Object[]{Byte.valueOf(arr$[i$])})); } return sb.toString(); } public static void main(String[] args) throws Throwable { System.out.println(getHexDigest(MessageDigest.getInstance("MD5").digest("asdasdadsasdasadasda".getBytes("utf-8")))); } } MD5Util.java MD5Util.java MD5Util.java
  23. During the first log it freezes somewhere above 60-70%, during 2nd search and edit on results was working fine at all. Restarting just GG, searching for different value and freeze around 10% of search. dbg1.zip dbg2.zip dbg3.zip
  24. It is not md5. md5 length of 32 characters, and then they 10. Or is it part of the hash or some other hash. A study of the source code can answer this question.
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.