Jump to content

Recommended Posts

Posted

It seems the game stores those in files, as .code files, in this directory /storage/emulated/0/Android/data/com.quattroplay.GraalEra/files/weblevels/weapons/loginera%***graalonline%***com%:%*****%*%*loginera%***graalonline%***com%:%*****%*%*loginera%***graalonline%***com%:%*****%*%*/

 image.thumb.png.e7f90b98718fc778c4fb35a7b7f5df06.png

Is there any way I could decrypt this, perhaps with a memory dump? Or if someone could try it would be great

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.