Hide xposed, root, file redirection, etc.

Related tags

Database FakeXposed
Overview

FakeXposed

License

中文文档点击 这里

公众号

关注我的公众号可以第一时间收到我的最新原创技术文章分享

Changlog

Changelog

Project description

Use fake-linker to combine with Xposed, provide Java and Native two-way shielding data detection, also provide additional file redirection, JNI Monitor, file access control, provide to other software to dynamically add or modify the configuration in the process.

Use statement

This software is only used for safety study and research, to help analyze malicious software and prohibit malicious software from accessing part of the mobile phone data. Please do not use it for other purposes. It is strictly forbidden to use this software for all behaviors that violate your local laws. Otherwise, all legal liabilities And all consequences are borne by the user, and have nothing to do with the developer

Principle analysis introduction

View FakeXposed principle analysis

Supported Android

Android version: Android 5.0 ~ Android 11+. Support instructions: x86, x86_64, arm, arm64.Api 25 Because the new version of NDK is removed, you need to change the NDK version to adapt and compile

Build

  • Required build environment: Any platform that supports Android Studio, Python 3.6+ (for script build)
  • Build configuration: Edit local.properties.sample sample configuration and rename it to local.properties or pass the configuration path -PconfigPath to gradle
  • Clone sources: git clone --recurse-submodules https://github.com/sanfengAndroid/FakeXposed.git
  • Android Studio build: Import the source code into Android Studio, modify the configuration and compile
  • Command line build
    • Install Python 3.6+ (Windows platform only: add Python to the environment variable PATH, and run pip install colorama)
    • Set ANDROID_SDK_ROOT to the system environment variable, and install Android NDK 22.0.7026061, which can be done in Android Studio SDK Manager
    • Run python build.py -vrm all to execute a complete Release build
    • Run python build.py -vrm api 30 to compile only Android Api level 30
    • For more options, please see the build.py script
    • Note that Android Api 25 uses the native module of Android Api 24. The Api 24 used during compilation will not correspond to libxxx25.so

Download

Download the latest Release version

Usage

  1. This application is the Xposed module, not limited to the original Xposed, Taichi, EdXposed, VirtualXposed, you need to enable the module in the specified Xposed manager .
  2. Enable Global Hook and specify Application Hook as needed, and the module will determine whether to enable an application separately. Long press to turn on/off
  3. Configure different hook options for each application or globally, such as file blacklist, hidden maps rules, file redirection, access control, package visibility, etc. !
  4. The following data sharing of Android 9 uses XSharedPreferences without additional permissions. The non-Edxposed version of Android 9 may not be able to read the configuration data. Therefore, it is recommended to use the root permission to install the configuration file to another path. For other applications to access, otherwise, you need to set the software's self-start permission plus background execution, and use ContentProvider to exchange data, which may significantly increase the startup time
  5. Please select the x86 version for the emulator, and the arm version for normal phones

Other module calls

  • Get the ClassLoader of the module

    Hook an unused method in the application ClassLoader.defineClass

    XposedHelpers.findAndHookMethod(ClassLoader.class, "defineClass", String.class, byte[].class, int.class, int.class, new XC_MethodHook() {
        @Override
        protected void beforeHookedMethod(MethodHookParam param) throws Throwable {
            String name = (String) param.args[0];
            if (TextUtils.equals(name, BuildConfig.APPLICATION_ID)){
                LogUtil.d(TAG, "define class get self class");
                param.setResult(NativeHook.class);
            }
        }
    });

    Obtain NativeHook.class by calling as follows. Note that defineClass has several overloaded methods. Only the ones that match the above signature can be obtained, otherwise you will get an exception

    Method method = ClassLoader.class.getDeclaredMethod("defineClass", String.class, byte[].class, int.class, int.class);
    method.setAccessible(true);
    Class<?> nativeHook = (Class<?>) method.invoke(getClassLoader(), BuildConfig.APPLICATION_ID, null, 0, 0);

    Get the NativeHook.class to get the corresponding ClassLoader, and then call various functions through reflection to add or delete configurations

    Note: The loading order of Xposed modules is not controllable, so it is best to enter the application execution timing (such as the application Application.onCreate method) and then obtain NativeHook.class, and then use reflection operation, the source package name is com.sanfengandroid.fakeinterface The classes under will not be confused

  • Invoke interface

    The data mainly involves Java and Native data, all of which contains the complete configuration in Java GlobalConfig, the core data is as follows

    public class GlobalConfig {
        private static final String TAG = GlobalConfig.class.getSimpleName();
        private static final Map<String, ?>[] maps;
        private static final Object EXIST = new Object();
        private static final Map<String, String> classBlacklist = new HashMap<>();
        private static final Map<String, String> stackClassBlacklist = new HashMap<>();
        private static final Map<String, String> packageBlacklist = new HashMap<>();
        private static final Map<Integer, Object> hookMethodModifierFilter = new HashMap<>();
        private static final ObservableMap<String, String> propBlacklist = new ObservableMap<>();
        private static final ObservableMap<String, EnvBean> envBlacklist = new ObservableMap<>();
        private static final Map<String, String> globalPropertyBlacklist = new HashMap<>();
        private static final Map<String, String> componentKeyBlacklist = new HashMap<>();
        private static final Map<String, String> globalSettingsBlacklist = new HashMap<>();
        private static final Map<String, ExecBean> runtimeBlackList = new HashMap<>();
        private static final Map<String, String> fileBlacklist = new HashMap<>();
        private static final Map<String, String> symbolBlacklist = new HashMap<>();
        private static final Map<String, String> mapsBlacklist = new HashMap<>();
        private static final Map<String, String> fileRedirectList = new HashMap<>();
        private static final Map<String, String> fileAccessList = new HashMap<>();
    }

    -Java Hook data modification: directly reflect and modify the above Map object to take effect -Native Hook data modification: In addition to modifying the above Map object, you need to call NativeInit.nativeSync, which will clear some native data (file blacklist, symbol blacklist, attribute replacement, etc.) and then re-synchronized to native, which means that some old data is still in effect (maps rule, file redirection, file access permission configuration), but It can be updated

    static void NativeHook_ClearAll(JNIEnv *env, jclass clazz) {
        file_blacklist.clear();
        file_path_blacklist.clear();
        symbol_blacklist.clear();
        properties.clear();
    }

    There are some other Native interfaces that can be viewed by themselves. NativeHook Just call those public methods by reflection

Note: This application may have compatibility issues, please make a backup when the Hook system is in progress

The application has not undergone a lot of testing. If you have any questions, you can leave a message on github, blog or wechat public

Reference

RootCloak

XposedChecker

You might also like...

Mod Launcher by Jbro129 fixed to work with Root instead of VA

Fixed Jbro ModLauncher Mod Launcher by Jbro129 fixed to work with Root instead of VA Code Used: https://github.com/jbro129/PG3D-JbroLauncher https://g

Jul 23, 2022

Save local logcat via Java wiithout root

Save Logcat Android Simple way to save local logcat via Java wiithout root. It does not save full logcat from device, just only from the app. Save log

Jun 30, 2022

IntelliJ Platform plugin that shows the file name of the currently open file in the status bar.

IntelliJ Platform plugin that shows the file name of the currently open file in the status bar. Clicking shows a list of recent files.

May 9, 2022

A GUI-based file manager based on a Java file management and I/O framework using object-oriented programming ideas.

A GUI-based file manager based on a Java file management and I/O framework using object-oriented programming ideas.

FileManager A GUI-based file manager based on a Java file management and I/O framework using object-oriented programming ideas. Enables folder creatio

Feb 7, 2022

A simple program that is realized by entering data, storing it in memory (in a file) and reading from a file to printing that data.

A simple program that is realized by entering data, storing it in memory (in a file) and reading from a file to printing that data.

Pet project A simple program that is realized by entering data, storing it in memory (in a file) and reading from a file to printing that data. It can

Apr 28, 2022

Classpy is a GUI tool for investigating Java class file, Lua binary chunk, Wasm binary code, and other binary file formats.

Classpy is a GUI tool for investigating Java class file, Lua binary chunk, Wasm binary code, and other binary file formats.

Classpy Classpy is a GUI tool for investigating Java class file, Lua binary chunk, Wasm binary code, and other binary file formats. Inspiration This t

Dec 17, 2022

Xposed module for enhancing Snapchat!

Xposed module for enhancing Snapchat!

SnapTrap SnapTrap is a new Snapchat project that aims at bringing back some enhancing features to Snapchat with the use of the Xposed framework! Curre

Jan 2, 2023

Xposed Injector by Saygus, and project fixed by Spring Musk

Xposed Injector Xposed Injector to mod games externally. Made by Saygus, and project fixed by Spring Musk. Spring Musk requested me to upload his proj

Nov 1, 2022

A virtual camera based on Xposed

A virtual camera based on Xposed

Dec 31, 2022

An Xposed module for Telegram clients

TMoe TMoe 是一个兼容若干第三方开源 Telegram 客户端的开源 Xposed 模块 使用方法 激活本模块后,在 Telegram 客户端的设置中点击 "TMoe 设置" 即可开关对应功能。 一切开发旨在学习,请勿用于非法用途 本项目保证永久开源,欢迎提交 Issue 或者 Pull R

Dec 31, 2022

Xposed module for Snapchat.

SnapMod Xposed module for Snapchat. Setup To set SnapMod up, download and install the latest apk from here. When you open it, it will ask to install s

Dec 21, 2022

Add custom auth options (e.g. face unlock) to your phone using Xposed.

UniversalAuth This project aims to bring a variety of custom authentication options to various Android ROMs. Your phone needs to have Xposed (or EdXpo

Dec 29, 2022

Event bus for Android and Java that simplifies communication between Activities, Fragments, Threads, Services, etc. Less code, better quality.

Event bus for Android and Java that simplifies communication between Activities, Fragments, Threads, Services, etc. Less code, better quality.

EventBus EventBus is a publish/subscribe event bus for Android and Java. EventBus... simplifies the communication between components decouples event s

Jan 3, 2023

Generate Java types from JSON or JSON Schema and annotates those types for data-binding with Jackson, Gson, etc

jsonschema2pojo jsonschema2pojo generates Java types from JSON Schema (or example JSON) and can annotate those types for data-binding with Jackson 2.x

Jan 5, 2023

DankTech is an attempt to recreate the Dank Storage mod (and \dank\null\ etc.) from a plugin.

DankTech is an attempt to recreate the Dank Storage mod (and \dank\null\ etc.) from a plugin.

DankTech is an attempt to recreate the Dank Storage mod, /dank/null and OpenBlocks /dev/null in the form of a plugin. Features The plugin currently fe

Feb 6, 2022
Comments
  • App crash, seems error while hook properties, orig___system_property_read_callback can't find in api 23

    App crash, seems error while hook properties, orig___system_property_read_callback can't find in api 23

    Env: OPPO R9s Android 6.1, API 23 Test App: https://github.com/vvb2060/MagiskDetector Install with Magisk(Canary 22005) & Xposed(version 89): https://github.com/topjohnwu/Magisk/
    https://github.com/Magisk-Modules-Repo/xposed

    build script: python build.py -vm api 23

    03-21 16:40:29.554 8840-8840/? E/HookLog: Current operating platform: arm64
    03-21 16:40:29.905 8862-8862/? E/HookLog: Current operating platform: arm64
    03-21 16:40:29.928 8840-8840/io.github.vvb2060.magiskdetector E/HookLog: ERROR: find symbol failed, symbol name: __system_property_read_callback, error code: 0xffffffe0
    03-21 16:40:29.928 8840-8840/io.github.vvb2060.magiskdetector E/HookLog: /Users/xxx/xxx/FakeXposed/app/src/main/cpp/hook/hook_properties.cpp:53: get_orig___system_property_read_callback CHECK 'orig___system_property_read_callback' failed
    03-21 16:40:29.928 8840-8840/io.github.vvb2060.magiskdetector A/libc: Fatal signal 6 (SIGABRT), code -6 in tid 8840 (.magiskdetector)
    03-21 16:40:29.982 686-686/? A/DEBUG: *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
    03-21 16:40:29.982 686-686/? A/DEBUG: Build fingerprint: 'OPPO/R9s/R9s:6.0.1/MMB29M/1482468466:user/release-keys'
    03-21 16:40:29.982 686-686/? A/DEBUG: Revision: '0'
    03-21 16:40:29.982 686-686/? A/DEBUG: ABI: 'arm64'
    03-21 16:40:29.983 686-686/? A/DEBUG: pid: 8840, tid: 8840, name: .magiskdetector  >>> io.github.vvb2060.magiskdetector <<<
    03-21 16:40:29.983 686-686/? A/DEBUG: signal 6 (SIGABRT), code -6 (SI_TKILL), fault addr --------
    03-21 16:40:29.997 686-686/? A/DEBUG:     x0   0000000000000000  x1   0000000000002288  x2   0000000000000006  x3   0000000000000000
    03-21 16:40:29.997 686-686/? A/DEBUG:     x4   0000000000000000  x5   0000000000000001  x6   0000000000000000  x7   0000000000000000
    03-21 16:40:29.997 686-686/? A/DEBUG:     x8   0000000000000083  x9   0000000000000000  x10  0000000000000000  x11  0000007fd4bd6078
    03-21 16:40:29.997 686-686/? A/DEBUG:     x12  0000007fd4bd5f50  x13  00000000000000c2  x14  0000007fd4bd6138  x15  0000000000000000
    03-21 16:40:29.998 686-686/? A/DEBUG:     x16  0000007f9004e568  x17  0000007f8ffe056c  x18  0000007f904109b4  x19  0000007f904a5088
    03-21 16:40:29.998 686-686/? A/DEBUG:     x20  0000007f904a4fc8  x21  0000000000000058  x22  0000000000000006  x23  0000007fd4bd68b0
    03-21 16:40:29.998 686-686/? A/DEBUG:     x24  0000000012d95c60  x25  0000000012c2ba40  x26  00000000700c9378  x27  0000000012cc40b0
    03-21 16:40:29.998 686-686/? A/DEBUG:     x28  0000000070ffc3f2  x29  0000007fd4bd6530  x30  0000007f8ffddd08
    03-21 16:40:29.998 686-686/? A/DEBUG:     sp   0000007fd4bd6530  pc   0000007f8ffe0574  pstate 0000000020000000
    03-21 16:40:30.006 686-686/? A/DEBUG: backtrace:
    03-21 16:40:30.006 686-686/? A/DEBUG:     #00 pc 0000000000069574  /system/lib64/libc.so (tgkill+8)
    03-21 16:40:30.006 686-686/? A/DEBUG:     #01 pc 0000000000066d04  /system/lib64/libc.so (pthread_kill+68)
    03-21 16:40:30.006 686-686/? A/DEBUG:     #02 pc 0000000000023878  /system/lib64/libc.so (raise+28)
    03-21 16:40:30.006 686-686/? A/DEBUG:     #03 pc 000000000001e018  /system/lib64/libc.so (abort+60)
    03-21 16:40:30.006 686-686/? A/DEBUG:     #04 pc 0000000000079d24  /data/app/com.sanfengandroid.datafilter-1/lib/arm/libhookl64.so (get_orig___system_property_read_callback+120)
    03-21 16:40:30.006 686-686/? A/DEBUG:     #05 pc 0000000000079df8  /data/app/com.sanfengandroid.datafilter-1/lib/arm/libhookl64.so (__system_property_read_callback+192)
    03-21 16:40:30.007 686-686/? A/DEBUG:     #06 pc 000000000000e8e8  /data/app/io.github.vvb2060.magiskdetector-2/base.apk (offset 0x1000)
    03-21 16:40:30.007 686-686/? A/DEBUG:     #07 pc 0000000000025c70  /system/lib64/libc.so (_ZL16foreach_propertyP7prop_btPFvPK9prop_infoPvES4_+172)
    03-21 16:40:30.007 686-686/? A/DEBUG:     #08 pc 0000000000025cb8  /system/lib64/libc.so (_ZL16foreach_propertyP7prop_btPFvPK9prop_infoPvES4_+244)
    03-21 16:40:30.007 686-686/? A/DEBUG:     #09 pc 0000000000025c28  /system/lib64/libc.so (_ZL16foreach_propertyP7prop_btPFvPK9prop_infoPvES4_+100)
    03-21 16:40:30.007 686-686/? A/DEBUG:     #10 pc 0000000000025c28  /system/lib64/libc.so (_ZL16foreach_propertyP7prop_btPFvPK9prop_infoPvES4_+100)
    03-21 16:40:30.007 686-686/? A/DEBUG:     #11 pc 0000000000025c28  /system/lib64/libc.so (_ZL16foreach_propertyP7prop_btPFvPK9prop_infoPvES4_+100)
    03-21 16:40:30.007 686-686/? A/DEBUG:     #12 pc 0000000000025cb8  /system/lib64/libc.so (_ZL16foreach_propertyP7prop_btPFvPK9prop_infoPvES4_+244)
    03-21 16:40:30.007 686-686/? A/DEBUG:     #13 pc 000000000000e6f0  /data/app/io.github.vvb2060.magiskdetector-2/base.apk (offset 0x1000)
    03-21 16:40:30.007 686-686/? A/DEBUG:     #14 pc 00000000005ce958  /data/app/io.github.vvb2060.magiskdetector-2/oat/arm64/base.odex (offset 0x219000) (java.lang.String io.github.vvb2060.magiskdetector.Native.getPropsHash()+124)
    03-21 16:40:30.007 686-686/? A/DEBUG:     #15 pc 00000000005cc348  /data/app/io.github.vvb2060.magiskdetector-2/oat/arm64/base.odex (offset 0x219000) (int io.github.vvb2060.magiskdetector.MainActivity.props()+2060)
    03-21 16:40:30.007 686-686/? A/DEBUG:     #16 pc 00000000005ce5a4  /data/app/io.github.vvb2060.magiskdetector-2/oat/arm64/base.odex (offset 0x219000) (void io.github.vvb2060.magiskdetector.MainActivity.onStart()+760)
    03-21 16:40:30.008 686-686/? A/DEBUG:     #17 pc 0000000073018a88  /data/dalvik-cache/arm64/system@[email protected] (offset 0x2274000)
    03-21 16:40:30.181 686-686/? A/DEBUG: Tombstone written to: /data/tombstones/tombstone_05
    03-21 16:40:30.181 686-686/? E/DEBUG: AM write failed: Broken pipe
    
    opened by hwangjr 10
  • https://github.com/Dr-TSNG/ApplistDetector 可以检测到

    https://github.com/Dr-TSNG/ApplistDetector 可以检测到

    ApplistDetector

    具体是检测 pkg.activityInfo.applicationInfo..metaData?.get("xposedminversion") 是否存在,LSPosed 最新版 测试

    https://github.com/Dr-TSNG/ApplistDetector/blob/master/library/src/main/java/icu/nullptr/applistdetector/XposedModules.kt#L22

    opened by QGB 1
  • How can I hide check root and etc with fake xposed?

    How can I hide check root and etc with fake xposed?

    How can I hide rootcheck and etc with fake xposed?Because More applications check /proc/,sdcard,getapplication installed,query intent activity,query intent service and safety net(API) and /proc/ checks root in native level datat filter how can bypass /proc/ in check root?How datafilter can hook or bypass or spoof map scan(check /proc/,/proc/[pid]/) ,Api(safetynet) ,query intent activity,query intent service?

    opened by m-kasa 0
  • App crash on AVD + Edxposed/LSPosed

    App crash on AVD + Edxposed/LSPosed

    Hello,

    I've cloned source code then try to run on AVD emulator and app crash.

    Could someone help me on this? Thank you!

    AVD Emulator: Android 8, 64bit Magisk 23 Riru 25.4.4 EdXposed 0.5.2.2

    App crash after turn on Data Filter on EdXposed

    I also tried with AVD Android 11, 64bit + Magisk Canary + LSPosed Zygisk and got crash too.

    App logcat

    2021-12-01 04:11:32.357 4921-4921/? I/zygote64: Late-enabling -Xcheck:jni 2021-12-01 04:11:32.376 4921-4921/? W/zygote64: Unexpected CPU variant for X86 using defaults: x86_64 2021-12-01 04:11:32.407 4921-4921/? I/EdXposed: Start to install inline hooks 2021-12-01 04:11:32.408 4921-4921/? I/EdXposed: Using api level 26 2021-12-01 04:11:32.408 4921-4921/? I/EdXposed: Start to install Riru hook 2021-12-01 04:11:32.455 4921-4921/? I/EdXposed: Riru hooks installed 2021-12-01 04:11:32.497 4921-4921/? I/EdXposed: ART hooks installed 2021-12-01 04:11:32.946 4921-4921/? I/zygote64: Starting a blocking GC Alloc 2021-12-01 04:11:32.983 4921-4921/? I/zygote64: Starting a blocking GC Alloc 2021-12-01 04:11:32.984 4921-4921/? I/EdXposed: Loading modules for com.sanfengandroid.datafilter 2021-12-01 04:11:32.990 4921-4921/? I/EdXposed-Bridge: Loading modules from /data/app/com.sanfengandroid.datafilter-k568Ao6evTCntWjl79ap_A==/base.apk 2021-12-01 04:11:32.997 4921-4921/? I/EdXposed-Bridge: Loading class com.sanfengandroid.xp.XposedEntry 2021-12-01 04:11:33.053 4921-4921/? W/Riru64: 383a is too old to hide so 2021-12-01 04:11:33.288 4921-4921/com.sanfengandroid.datafilter I/zygote64: Starting a blocking GC Alloc 2021-12-01 04:11:33.319 4921-4921/com.sanfengandroid.datafilter V/HookLog_XposedEntry: process: com.sanfengandroid.datafilter, package: com.sanfengandroid.datafilter 2021-12-01 04:11:33.327 4921-4921/com.sanfengandroid.datafilter V/HookLog_XposedEntry: hook myself 2021-12-01 04:11:33.433 4921-4921/com.sanfengandroid.datafilter D/com.sanfengandroid.fakelinker.FakeLinker: trying to load fake linker at : /data/app/com.sanfengandroid.datafilter-k568Ao6evTCntWjl79ap_A==/lib/x86_64/libfake-linker-2664.so 2021-12-01 04:11:33.451 4921-4921/com.sanfengandroid.datafilter E/HookLog: Current operating platform: x86_64 2021-12-01 04:11:33.471 4921-4921/com.sanfengandroid.datafilter V/HookLog: found symbol: __dl__ZL6solist, library: /linker64, address: 709e4931f7f8 2021-12-01 04:11:33.471 4921-4921/com.sanfengandroid.datafilter V/HookLog: found symbol: __dl_g_ld_debug_verbosity, library: /linker64, address: 709e4931f800 2021-12-01 04:11:33.471 4921-4921/com.sanfengandroid.datafilter V/HookLog: found symbol: __dl__ZL10g_dl_mutex, library: /linker64, address: 709e4931d000 2021-12-01 04:11:33.471 4921-4921/com.sanfengandroid.datafilter V/HookLog: found symbol: __dl__ZL19__linker_dl_err_buf, library: /linker64, address: 709e4931f4e0 2021-12-01 04:11:33.472 4921-4921/com.sanfengandroid.datafilter V/HookLog: found symbol: __dl__ZN6soinfo10link_imageERK10LinkedListIS_19SoinfoListAllocatorES4_PK17android_dlextinfo, library: /linker64, address: 709e4921a880 2021-12-01 04:11:33.472 4921-4921/com.sanfengandroid.datafilter V/HookLog: found symbol: __dl_g_default_namespace, library: /linker64, address: 709e4931f438 2021-12-01 04:11:33.472 4921-4921/com.sanfengandroid.datafilter V/HookLog: found symbol: __dl_g_soinfo_handles_map, library: /linker64, address: 709e4931f4b8 2021-12-01 04:11:33.472 4921-4921/com.sanfengandroid.datafilter V/HookLog: found symbol: __dl__Z9do_dlopenPKciPK17android_dlextinfoPKv, library: /linker64, address: 709e49217d60 2021-12-01 04:11:33.472 4921-4921/com.sanfengandroid.datafilter V/HookLog: found symbol: _dl__Z8do_dlsymPvPKcS1_PKvPS, library: /linker64, address: 709e49218690 2021-12-01 04:11:33.472 4921-4921/com.sanfengandroid.datafilter V/HookLog: found symbol: __dl__Z16create_namespacePKvPKcS2_S2_mS2_P19android_namespace_t, library: /linker64, address: 709e492192e0 2021-12-01 04:11:33.473 4921-4921/com.sanfengandroid.datafilter V/HookLog: find linker soinfo: 0x709e4931f008, g_ld_debug_verbosity:0x709e4931f800, g_default_namespace: 0x709e4931f438, g_soinfo_handles_map: 0x709e4931f4b8, link_image: 0x709e4921a880 2021-12-01 04:11:33.473 4921-4921/com.sanfengandroid.datafilter V/HookLog: linker __loader_android_dlopen_ext: 0x709e49214f40, __loader_dlsym: 0x709e49215180, __loader_android_create_namespace: 0x709e49215350 2021-12-01 04:11:33.473 4921-4921/com.sanfengandroid.datafilter D/HookLog: found art method entrypoint jni offset: 4 2021-12-01 04:11:33.473 4921-4921/com.sanfengandroid.datafilter D/HookLog: found art method match access flags offset: 4 2021-12-01 04:11:33.491 4921-4921/com.sanfengandroid.datafilter D/HookLog: Init Hook module, cache path: /data/user/0/com.sanfengandroid.datafilter/cache 2021-12-01 04:11:33.491 4921-4921/com.sanfengandroid.datafilter D/HookLog: Registering com/sanfengandroid/fakeinterface/NativeHook's 19 native methods... 2021-12-01 04:11:33.493 4921-4921/com.sanfengandroid.datafilter D/HookLog: libc handle: 0x9bc071abf36df405, libc soinfo: 0x709e4911b890, self soinfo: 0x709e48b31670 2021-12-01 04:11:33.493 4921-4921/com.sanfengandroid.datafilter V/HookLog: [Monitor __system_property_get] "name: ro.build.version.sdk, value: 26" 2021-12-01 04:11:33.493 4921-4921/com.sanfengandroid.datafilter D/com.sanfengandroid.fakelinker.FakeLinker: initialization fake linker: true 2021-12-01 04:11:33.496 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: native filter type FILE_HIDE, keyword: su 2021-12-01 04:11:33.498 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: native filter type FILE_HIDE, keyword: /data/user/0/com.sanfengandroid.datafilter/cache/test_key 2021-12-01 04:11:33.500 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: native filter type FILE_HIDE, keyword: ZUPERFAKEFILE 2021-12-01 04:11:33.502 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: native filter type FILE_HIDE, keyword: daemonsu 2021-12-01 04:11:33.504 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: native filter type FILE_HIDE, keyword: superuser.apk 2021-12-01 04:11:33.506 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: native filter type FILE_HIDE, keyword: xposed 2021-12-01 04:11:33.513 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: add native FILE_HIDE blacklist result: ERROR_NO 2021-12-01 04:11:33.515 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: native filter type SYMBOL_HIDE, keyword: riru_get_version 2021-12-01 04:11:33.516 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: native filter type SYMBOL_HIDE, keyword: riru_is_zygote_methods_replaced 2021-12-01 04:11:33.518 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: add native SYMBOL_HIDE blacklist result: ERROR_NO 2021-12-01 04:11:33.521 4921-4921/com.sanfengandroid.datafilter D/HookLog: add string blacklist type: 0, name: ro.build.tags, value: release-keys 2021-12-01 04:11:33.524 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: add native GLOBAL_SYSTEM_PROPERTY_HIDE string option name: ro.build.tags, value: release-keys, result: ERROR_NO 2021-12-01 04:11:33.524 4921-4921/com.sanfengandroid.datafilter D/HookLog: add string blacklist type: 0, name: ro.zygote, value: android 2021-12-01 04:11:33.527 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: add native GLOBAL_SYSTEM_PROPERTY_HIDE string option name: ro.zygote, value: android, result: ERROR_NO 2021-12-01 04:11:33.527 4921-4921/com.sanfengandroid.datafilter D/HookLog: add string blacklist type: 0, name: ro.build.selinux, value: 1 2021-12-01 04:11:33.530 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: add native GLOBAL_SYSTEM_PROPERTY_HIDE string option name: ro.build.selinux, value: 1, result: ERROR_NO 2021-12-01 04:11:33.530 4921-4921/com.sanfengandroid.datafilter D/HookLog: add string blacklist type: 1, name: de.robv.android.xposed.XposedHelpers, value: de.robv.android.xposed.XposedHelpers 2021-12-01 04:11:33.533 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: add native LOAD_CLASS_HIDE string option name: de.robv.android.xposed.XposedHelpers, value: de.robv.android.xposed.XposedHelpers, result: ERROR_NO 2021-12-01 04:11:33.534 4921-4921/com.sanfengandroid.datafilter D/HookLog: add string blacklist type: 1, name: de.robv.android.xposed.XposedBridge, value: de.robv.android.xposed.XposedBridge 2021-12-01 04:11:33.536 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: add native LOAD_CLASS_HIDE string option name: de.robv.android.xposed.XposedBridge, value: de.robv.android.xposed.XposedBridge, result: ERROR_NO 2021-12-01 04:11:33.536 4921-4921/com.sanfengandroid.datafilter D/HookLog: add string blacklist type: 2, name: de.robv.android.xposed.XposedHelpers, value: de.robv.android.xposed.XposedHelpers 2021-12-01 04:11:33.539 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: add native STACK_ELEMENT_HIDE string option name: de.robv.android.xposed.XposedHelpers, value: de.robv.android.xposed.XposedHelpers, result: ERROR_NO 2021-12-01 04:11:33.540 4921-4921/com.sanfengandroid.datafilter D/HookLog: add string blacklist type: 2, name: de.robv.android.xposed.XposedBridge, value: de.robv.android.xposed.XposedBridge 2021-12-01 04:11:33.542 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: add native STACK_ELEMENT_HIDE string option name: de.robv.android.xposed.XposedBridge, value: de.robv.android.xposed.XposedBridge, result: ERROR_NO 2021-12-01 04:11:33.545 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: add runtime option result: ERROR_NO 2021-12-01 04:11:33.547 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: add runtime option result: ERROR_NO 2021-12-01 04:11:33.549 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: add native maps rule: r com.sanfengandroid.datafilter, result: ERROR_NO 2021-12-01 04:11:33.551 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: add native maps rule: r XposedBridge, result: ERROR_NO 2021-12-01 04:11:33.553 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: add native maps rule: r libmemtrack_real.so, result: ERROR_NO 2021-12-01 04:11:33.555 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: add file redirect path src: /data/user/0/com.sanfengandroid.datafilter/cache/test_keysanfeng, dst: /data/user/0/com.sanfengandroid.datafilter/cache/test_keyandroid, result: true 2021-12-01 04:11:33.559 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: add file access control path: /data/user/0/com.sanfengandroid.datafilter/cache/sanfengandroid, uid: -1, gid: -1, access: 400, result: true 2021-12-01 04:11:33.625 4921-4921/com.sanfengandroid.datafilter I/zygote64: Starting a blocking GC Alloc 2021-12-01 04:11:33.625 4921-4921/com.sanfengandroid.datafilter V/HookLog_XposedFilter: Original build tags: dev-keys 2021-12-01 04:11:33.626 4921-4921/com.sanfengandroid.datafilter V/HookLog_XposedFilter: New build tags: release-keys 2021-12-01 04:11:33.662 4921-4921/com.sanfengandroid.datafilter I/zygote64: Starting a blocking GC Alloc 2021-12-01 04:11:33.706 4921-4926/com.sanfengandroid.datafilter I/zygote64: Do partial code cache collection, code=29KB, data=20KB 2021-12-01 04:11:33.709 4921-4926/com.sanfengandroid.datafilter I/zygote64: After code cache collection, code=29KB, data=20KB 2021-12-01 04:11:33.709 4921-4926/com.sanfengandroid.datafilter I/zygote64: Increasing code cache capacity to 128KB 2021-12-01 04:11:33.743 4921-4921/com.sanfengandroid.datafilter V/HookLog_HookClassLoad: hide class load 2021-12-01 04:11:33.767 4921-4921/com.sanfengandroid.datafilter I/zygote64: Starting a blocking GC Alloc 2021-12-01 04:11:33.786 4921-4921/com.sanfengandroid.datafilter I/zygote64: Starting a blocking GC Alloc 2021-12-01 04:11:33.787 4921-4921/com.sanfengandroid.datafilter D/HookLog_HookClassLoad: hook class loader success 2021-12-01 04:11:33.803 4921-4921/com.sanfengandroid.datafilter D/HookLog_HookClassLoad: edxposed find class EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6 2021-12-01 04:11:33.805 4921-4921/com.sanfengandroid.datafilter I/chatty: uid=10080(u0_a80) com.sanfengandroid.datafilter identical 2 lines 2021-12-01 04:11:33.806 4921-4921/com.sanfengandroid.datafilter D/HookLog_HookClassLoad: edxposed find class EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6 2021-12-01 04:11:33.809 4921-4921/com.sanfengandroid.datafilter I/zygote64: Starting a blocking GC Alloc 2021-12-01 04:11:33.810 4921-4921/com.sanfengandroid.datafilter V/HookLog_HookNativeMethodChecked: Hook Method Native check success 2021-12-01 04:11:33.826 4921-4921/com.sanfengandroid.datafilter V/HookLog: found symbol: __dl__ZL18g_soinfo_allocator, library: /linker64, address: 709e4931f258 2021-12-01 04:11:33.826 4921-4921/com.sanfengandroid.datafilter V/HookLog: found symbol: __dl__ZL24g_soinfo_links_allocator, library: /linker64, address: 709e4931f270 2021-12-01 04:11:33.826 4921-4921/com.sanfengandroid.datafilter V/HookLog: found symbol: __dl__ZL21g_namespace_allocator, library: /linker64, address: 709e4931f288 2021-12-01 04:11:33.826 4921-4921/com.sanfengandroid.datafilter V/HookLog: found symbol: __dl__ZL26g_namespace_list_allocator, library: /linker64, address: 709e4931f2a0 2021-12-01 04:11:33.843 4921-4921/com.sanfengandroid.datafilter V/HookLog: again relocation library: libjavacore.so 2021-12-01 04:11:33.849 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: stat, original address: 0x709e452ba6c0, new address: 0x709e2a9a7ff0 2021-12-01 04:11:33.850 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: getenv, original address: 0x709e452faf10, new address: 0x709e2a9c3c80 2021-12-01 04:11:33.850 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: __open_2, original address: 0x709e452b8260, new address: 0x709e2a9a7220 2021-12-01 04:11:33.850 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: fstat, original address: 0x709e45300a10, new address: 0x709e2a9a80c0 2021-12-01 04:11:33.853 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: access, original address: 0x709e452ae820, new address: 0x709e2a9a87b0 2021-12-01 04:11:33.854 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: chmod, original address: 0x709e452af8d0, new address: 0x709e2a9a7b40 2021-12-01 04:11:33.854 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: chown, original address: 0x709e452af8f0, new address: 0x709e2a9a9630 2021-12-01 04:11:33.854 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: execve, original address: 0x709e453008f0, new address: 0x709e2a9a5950 2021-12-01 04:11:33.854 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: fstat64, original address: 0x709e45300a10, new address: 0x709e2a9a80c0 2021-12-01 04:11:33.855 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: lchown, original address: 0x709e452b5060, new address: 0x709e2a9a9700 2021-12-01 04:11:33.855 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: link, original address: 0x709e452b66e0, new address: 0x709e2a9a8a00 2021-12-01 04:11:33.855 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: mkdir, original address: 0x709e452b7760, new address: 0x709e2a9a7d00 2021-12-01 04:11:33.856 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: open, original address: 0x709e452b8150, new address: 0x709e2a9a6f10 2021-12-01 04:11:33.856 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: rename, original address: 0x709e452b9790, new address: 0x709e2a9a7910 2021-12-01 04:11:33.857 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: statvfs, original address: 0x709e452ba720, new address: 0x709e2a9b21d0 2021-12-01 04:11:33.857 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: symlink, original address: 0x709e452baca0, new address: 0x709e2a9a9070 2021-12-01 04:11:33.857 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: unlink, original address: 0x709e452bdd90, new address: 0x709e2a9a8c30 2021-12-01 04:11:33.857 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: lstat64, original address: 0x709e452b6bc0, new address: 0x709e2a9a8190 2021-12-01 04:11:33.857 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: stat64, original address: 0x709e452ba6c0, new address: 0x709e2a9a7ff0 2021-12-01 04:11:33.858 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: lstat, original address: 0x709e452b6bc0, new address: 0x709e2a9a8190 2021-12-01 04:11:33.858 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: readlink, original address: 0x709e452b9740, new address: 0x709e2a9a93f0 2021-12-01 04:11:33.860 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: strcasecmp, original address: 0x709e452fc720, new address: 0x709e2a9ac300 2021-12-01 04:11:33.898 4921-4921/com.sanfengandroid.datafilter V/HookLog: again relocation library: libnativehelper.so 2021-12-01 04:11:33.899 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: __system_property_get, original address: 0x709e3cae1150, new address: 0x709e2a9c3dd0 2021-12-01 04:11:33.900 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: dlopen, original address: 0x709e47bec0b0, new address: 0x709e2a9a5300 2021-12-01 04:11:33.900 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: dlsym, original address: 0x709e47bec0d0, new address: 0x709e2a9a5400 2021-12-01 04:11:33.915 4921-4921/com.sanfengandroid.datafilter V/HookLog: again relocation library: libnativeloader.so 2021-12-01 04:11:33.916 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: getenv, original address: 0x709e452faf10, new address: 0x709e2a9c3c80 2021-12-01 04:11:33.916 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: dlopen, original address: 0x709e47bec0b0, new address: 0x709e2a9a5300 2021-12-01 04:11:33.917 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: android_create_namespace, original address: 0x709e47bec180, new address: 0x709e2a9a57b0 2021-12-01 04:11:33.917 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: android_dlopen_ext, original address: 0x709e47bec140, new address: 0x709e2a9a5610 2021-12-01 04:11:33.940 4921-4921/com.sanfengandroid.datafilter V/HookLog: again relocation library: libart.so 2021-12-01 04:11:33.941 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: syscall, original address: 0x709e452ae6e0, new address: 0x709e2a9aba80 2021-12-01 04:11:33.941 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: __cxa_pure_virtual, original address: 0x709e45929da0, new address: 0x709e2a9ee070 2021-12-01 04:11:33.941 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: fstat, original address: 0x709e45300a10, new address: 0x709e2a9a80c0 2021-12-01 04:11:33.941 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: stat, original address: 0x709e452ba6c0, new address: 0x709e2a9a7ff0 2021-12-01 04:11:33.942 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: open, original address: 0x709e452b8150, new address: 0x709e2a9a6f10 2021-12-01 04:11:33.942 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: __open_2, original address: 0x709e452b8260, new address: 0x709e2a9a7220 2021-12-01 04:11:33.942 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: unlink, original address: 0x709e452bdd90, new address: 0x709e2a9a8c30 2021-12-01 04:11:33.943 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: dlopen, original address: 0x709e47bec0b0, new address: 0x709e2a9a5300 2021-12-01 04:11:33.943 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: dlsym, original address: 0x709e47bec0d0, new address: 0x709e2a9a5400 2021-12-01 04:11:33.943 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: execve, original address: 0x709e453008f0, new address: 0x709e2a9a5950 2021-12-01 04:11:33.944 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: statvfs, original address: 0x709e452ba720, new address: 0x709e2a9b21d0 2021-12-01 04:11:33.944 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: access, original address: 0x709e452ae820, new address: 0x709e2a9a87b0 2021-12-01 04:11:33.944 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: readdir, original address: 0x709e452affa0, new address: 0x709e2a9a7600 2021-12-01 04:11:33.946 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: android_dlopen_ext, original address: 0x709e47bec140, new address: 0x709e2a9a5610 2021-12-01 04:11:33.946 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: mkdir, original address: 0x709e452b7760, new address: 0x709e2a9a7d00 2021-12-01 04:11:33.946 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: chmod, original address: 0x709e452af8d0, new address: 0x709e2a9a7b40 2021-12-01 04:11:33.946 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: getenv, original address: 0x709e452faf10, new address: 0x709e2a9c3c80 2021-12-01 04:11:33.947 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: fopen, original address: 0x709e4530bac0, new address: 0x709e2a9a73e0 2021-12-01 04:11:33.948 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: lstat, original address: 0x709e452b6bc0, new address: 0x709e2a9a8190 2021-12-01 04:11:33.949 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: readlink, original address: 0x709e452b9740, new address: 0x709e2a9a93f0 2021-12-01 04:11:33.949 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: strcasecmp, original address: 0x709e452fc720, new address: 0x709e2a9ac300 2021-12-01 04:11:33.964 4921-4921/com.sanfengandroid.datafilter V/HookLog: again relocation library: libopenjdkjvm.so 2021-12-01 04:11:33.964 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: open, original address: 0x709e452b8150, new address: 0x709e2a9a6f10 2021-12-01 04:11:33.965 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: dlsym, original address: 0x709e47bec0d0, new address: 0x709e2a9a5400 2021-12-01 04:11:33.978 4921-4921/com.sanfengandroid.datafilter V/HookLog: again relocation library: libandroid_runtime.so 2021-12-01 04:11:33.979 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol Typical ABSOLUTE: __cxa_pure_virtual, original address: 0x709e45929da0, new address: 0x709e2a9ee070 2021-12-01 04:11:33.986 4921-4921/com.sanfengandroid.datafilter I/chatty: uid=10080(u0_a80) com.sanfengandroid.datafilter identical 82 lines 2021-12-01 04:11:33.986 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol Typical ABSOLUTE: __cxa_pure_virtual, original address: 0x709e45929da0, new address: 0x709e2a9ee070 2021-12-01 04:11:34.028 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: stat, original address: 0x709e452ba6c0, new address: 0x709e2a9a7ff0 2021-12-01 04:11:34.028 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: getenv, original address: 0x709e452faf10, new address: 0x709e2a9c3c80 2021-12-01 04:11:34.029 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: __cxa_pure_virtual, original address: 0x709e45929da0, new address: 0x709e2a9ee070 2021-12-01 04:11:34.035 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: lstat64, original address: 0x709e452b6bc0, new address: 0x709e2a9a8190 2021-12-01 04:11:34.036 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: __open_2, original address: 0x709e452b8260, new address: 0x709e2a9a7220 2021-12-01 04:11:34.036 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: utimes, original address: 0x709e452bb4c0, new address: 0x709e2a9a9f50 2021-12-01 04:11:34.036 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: chmod, original address: 0x709e452af8d0, new address: 0x709e2a9a7b40 2021-12-01 04:11:34.036 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: rename, original address: 0x709e452b9790, new address: 0x709e2a9a7910 2021-12-01 04:11:34.037 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: unlink, original address: 0x709e452bdd90, new address: 0x709e2a9a8c30 2021-12-01 04:11:34.039 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: dlsym, original address: 0x709e47bec0d0, new address: 0x709e2a9a5400 2021-12-01 04:11:34.055 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: readdir, original address: 0x709e452affa0, new address: 0x709e2a9a7600 2021-12-01 04:11:34.069 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: fopen, original address: 0x709e4530bac0, new address: 0x709e2a9a73e0 2021-12-01 04:11:34.070 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: open, original address: 0x709e452b8150, new address: 0x709e2a9a6f10 2021-12-01 04:11:34.079 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: __system_property_get, original address: 0x709e3cae1150, new address: 0x709e2a9c3dd0 2021-12-01 04:11:34.086 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: fstat, original address: 0x709e45300a10, new address: 0x709e2a9a80c0 2021-12-01 04:11:34.113 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: access, original address: 0x709e452ae820, new address: 0x709e2a9a87b0 2021-12-01 04:11:34.114 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: strcasecmp, original address: 0x709e452fc720, new address: 0x709e2a9ac300 2021-12-01 04:11:34.114 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: lstat, original address: 0x709e452b6bc0, new address: 0x709e2a9a8190 2021-12-01 04:11:34.114 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: statfs, original address: 0x709e452ba700, new address: 0x709e2a9b1ff0 2021-12-01 04:11:34.116 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: statvfs, original address: 0x709e452ba720, new address: 0x709e2a9b21d0 2021-12-01 04:11:34.132 4921-4921/com.sanfengandroid.datafilter V/HookLog: again relocation library: libcutils.so 2021-12-01 04:11:34.133 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: __open_2, original address: 0x709e452b8260, new address: 0x709e2a9a7220 2021-12-01 04:11:34.133 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: fopen, original address: 0x709e4530bac0, new address: 0x709e2a9a73e0 2021-12-01 04:11:34.134 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: syscall, original address: 0x709e452ae6e0, new address: 0x709e2a9aba80 2021-12-01 04:11:34.134 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: access, original address: 0x709e452ae820, new address: 0x709e2a9a87b0 2021-12-01 04:11:34.135 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: getenv, original address: 0x709e452faf10, new address: 0x709e2a9c3c80 2021-12-01 04:11:34.135 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: readlink, original address: 0x709e452b9740, new address: 0x709e2a9a93f0 2021-12-01 04:11:34.135 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: lstat, original address: 0x709e452b6bc0, new address: 0x709e2a9a8190 2021-12-01 04:11:34.135 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: mkdir, original address: 0x709e452b7760, new address: 0x709e2a9a7d00 2021-12-01 04:11:34.135 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: open, original address: 0x709e452b8150, new address: 0x709e2a9a6f10 2021-12-01 04:11:34.135 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: chmod, original address: 0x709e452af8d0, new address: 0x709e2a9a7b40 2021-12-01 04:11:34.135 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: chown, original address: 0x709e452af8f0, new address: 0x709e2a9a9630 2021-12-01 04:11:34.135 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: unlink, original address: 0x709e452bdd90, new address: 0x709e2a9a8c30 2021-12-01 04:11:34.135 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: rename, original address: 0x709e452b9790, new address: 0x709e2a9a7910 2021-12-01 04:11:34.136 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: fstatat, original address: 0x709e45300a30, new address: 0x709e2a9a7dd0 2021-12-01 04:11:34.136 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: mkdirat, original address: 0x709e45300eb0, new address: 0x709e2a9a7c10 2021-12-01 04:11:34.136 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: __openat_2, original address: 0x709e452b8390, new address: 0x709e2a9a6d90 2021-12-01 04:11:34.136 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: fstat, original address: 0x709e45300a10, new address: 0x709e2a9a80c0 2021-12-01 04:11:34.137 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: __system_property_get, original address: 0x709e3cae1150, new address: 0x709e2a9c3dd0 2021-12-01 04:11:34.137 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: __system_property_read_callback, original address: 0x709e452bc770, new address: 0x709e2a9c4200 2021-12-01 04:11:34.152 4921-4921/com.sanfengandroid.datafilter V/HookLog: again relocation library: libbase.so 2021-12-01 04:11:34.154 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: fstat, original address: 0x709e45300a10, new address: 0x709e2a9a80c0 2021-12-01 04:11:34.154 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: __open_2, original address: 0x709e452b8260, new address: 0x709e2a9a7220 2021-12-01 04:11:34.154 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: open, original address: 0x709e452b8150, new address: 0x709e2a9a6f10 2021-12-01 04:11:34.154 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: unlink, original address: 0x709e452bdd90, new address: 0x709e2a9a8c30 2021-12-01 04:11:34.155 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: lstat, original address: 0x709e452b6bc0, new address: 0x709e2a9a8190 2021-12-01 04:11:34.155 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: readlink, original address: 0x709e452b9740, new address: 0x709e2a9a93f0 2021-12-01 04:11:34.156 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: getenv, original address: 0x709e452faf10, new address: 0x709e2a9c3c80 2021-12-01 04:11:34.157 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: strcasecmp, original address: 0x709e452fc720, new address: 0x709e2a9ac300 2021-12-01 04:11:34.157 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: access, original address: 0x709e452ae820, new address: 0x709e2a9a87b0 2021-12-01 04:11:34.158 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: rmdir, original address: 0x709e452b97b0, new address: 0x709e2a9a8d00 2021-12-01 04:11:34.158 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: __system_property_find, original address: 0x709e452bc540, new address: 0x709e2a9c3fd0 2021-12-01 04:11:34.158 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: __system_property_read_callback, original address: 0x709e452bc770, new address: 0x709e2a9c4200 2021-12-01 04:11:34.174 4921-4921/com.sanfengandroid.datafilter V/HookLog: again relocation library: libopenjdk.so 2021-12-01 04:11:34.185 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: fstat64, original address: 0x709e45300a10, new address: 0x709e2a9a80c0 2021-12-01 04:11:34.186 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: __open_2, original address: 0x709e452b8260, new address: 0x709e2a9a7220 2021-12-01 04:11:34.186 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: chmod, original address: 0x709e452af8d0, new address: 0x709e2a9a7b40 2021-12-01 04:11:34.186 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: open, original address: 0x709e452b8150, new address: 0x709e2a9a6f10 2021-12-01 04:11:34.186 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: open64, original address: 0x709e452b8150, new address: 0x709e2a9a6f10 2021-12-01 04:11:34.187 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: stat64, original address: 0x709e452ba6c0, new address: 0x709e2a9a7ff0 2021-12-01 04:11:34.187 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: access, original address: 0x709e452ae820, new address: 0x709e2a9a87b0 2021-12-01 04:11:34.187 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: mkdir, original address: 0x709e452b7760, new address: 0x709e2a9a7d00 2021-12-01 04:11:34.187 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: rename, original address: 0x709e452b9790, new address: 0x709e2a9a7910 2021-12-01 04:11:34.187 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: utimes, original address: 0x709e452bb4c0, new address: 0x709e2a9a9f50 2021-12-01 04:11:34.187 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: statvfs64, original address: 0x709e452ba720, new address: 0x709e2a9b21d0 2021-12-01 04:11:34.188 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: dlsym, original address: 0x709e47bec0d0, new address: 0x709e2a9a5400 2021-12-01 04:11:34.188 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: syscall, original address: 0x709e452ae6e0, new address: 0x709e2a9aba80 2021-12-01 04:11:34.188 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: fopen, original address: 0x709e4530bac0, new address: 0x709e2a9a73e0 2021-12-01 04:11:34.188 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: lstat64, original address: 0x709e452b6bc0, new address: 0x709e2a9a8190 2021-12-01 04:11:34.188 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: chown, original address: 0x709e452af8f0, new address: 0x709e2a9a9630 2021-12-01 04:11:34.188 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: lchown, original address: 0x709e452b5060, new address: 0x709e2a9a9700 2021-12-01 04:11:34.188 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: rmdir, original address: 0x709e452b97b0, new address: 0x709e2a9a8d00 2021-12-01 04:11:34.188 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: link, original address: 0x709e452b66e0, new address: 0x709e2a9a8a00 2021-12-01 04:11:34.189 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: unlink, original address: 0x709e452bdd90, new address: 0x709e2a9a8c30 2021-12-01 04:11:34.189 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: symlink, original address: 0x709e452baca0, new address: 0x709e2a9a9070 2021-12-01 04:11:34.189 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: mknod, original address: 0x709e452b77c0, new address: 0x709e2a9a83c0 2021-12-01 04:11:34.192 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: getenv, original address: 0x709e452faf10, new address: 0x709e2a9c3c80 2021-12-01 04:11:34.193 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: chdir, original address: 0x709e45300790, new address: 0x709e2a9a8dd0 2021-12-01 04:11:34.193 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: execve, original address: 0x709e453008f0, new address: 0x709e2a9a5950 2021-12-01 04:11:34.194 4921-4921/com.sanfengandroid.datafilter D/HookLog: call manual relink library 2021-12-01 04:11:34.194 4921-4921/com.sanfengandroid.datafilter D/HookLog: environments: PATH=/sbin:/system/sbin:/system/bin:/system/xbin:/vendor/bin:/vendor/xbin 2021-12-01 04:11:34.194 4921-4921/com.sanfengandroid.datafilter D/HookLog: environments: DOWNLOAD_CACHE=/data/cache 2021-12-01 04:11:34.194 4921-4921/com.sanfengandroid.datafilter D/HookLog: environments: ANDROID_BOOTLOGO=1 2021-12-01 04:11:34.194 4921-4921/com.sanfengandroid.datafilter D/HookLog: environments: ANDROID_ROOT=/system 2021-12-01 04:11:34.194 4921-4921/com.sanfengandroid.datafilter D/HookLog: environments: ANDROID_ASSETS=/system/app 2021-12-01 04:11:34.195 4921-4921/com.sanfengandroid.datafilter D/HookLog: environments: ANDROID_DATA=/data 2021-12-01 04:11:34.195 4921-4921/com.sanfengandroid.datafilter D/HookLog: environments: ANDROID_STORAGE=/storage 2021-12-01 04:11:34.195 4921-4921/com.sanfengandroid.datafilter D/HookLog: environments: EXTERNAL_STORAGE=/sdcard 2021-12-01 04:11:34.195 4921-4921/com.sanfengandroid.datafilter D/HookLog: environments: ASEC_MOUNTPOINT=/mnt/asec 2021-12-01 04:11:34.195 4921-4921/com.sanfengandroid.datafilter D/HookLog: environments: BOOTCLASSPATH=/system/framework/core-oj.jar:/system/framework/core-libart.jar:/system/framework/conscrypt.jar:/system/framework/okhttp.jar:/system/framework/legacy-test.jar:/system/framework/bouncycastle.jar:/system/framework/ext.jar:/system/framework/framework.jar:/system/framework/telephony-common.jar:/system/framework/voip-common.jar:/system/framework/ims-common.jar:/system/framework/apache-xml.jar:/system/framework/org.apache.http.legacy.boot.jar:/system/framework/android.hidl.base-V1.0-java.jar:/system/framework/android.hidl.manager-V1.0-java.jar 2021-12-01 04:11:34.195 4921-4921/com.sanfengandroid.datafilter D/HookLog: environments: SYSTEMSERVERCLASSPATH=/system/framework/services.jar:/system/framework/ethernet-service.jar:/system/framework/wifi-service.jar 2021-12-01 04:11:34.195 4921-4921/com.sanfengandroid.datafilter D/HookLog: environments: ANDROID_SOCKET_zygote=9 2021-12-01 04:11:34.195 4921-4921/com.sanfengandroid.datafilter D/HookLog: environments: test_key=sanfengandroid 2021-12-01 04:11:34.195 4921-4921/com.sanfengandroid.datafilter D/HookLog: [JNICall HookJniRegisterNatives(0x709e2aa6a756)] "start register native function 0x709e2aa6a756" 2021-12-01 04:11:34.195 4921-4921/com.sanfengandroid.datafilter D/HookLog: [JNICall HookJniRegisterNatives(0x709e2aa6a756)] "native register class: dalvik.system.VMDebug, method name: isDebuggerConnected, function signature: ()Z, register address: 0x709e2a9c67a0" 2021-12-01 04:11:34.195 4921-4921/com.sanfengandroid.datafilter D/HookLog: register VMDebug result: 1 2021-12-01 04:11:34.195 4921-4921/com.sanfengandroid.datafilter D/HookLog: [JNICall HookJniRegisterNatives(0x709e2aa6a756)] "start register native function 0x709e2aa6a756" 2021-12-01 04:11:34.195 4921-4921/com.sanfengandroid.datafilter D/HookLog: [JNICall HookJniRegisterNatives(0x709e2aa6a756)] "native register class: java.lang.Throwable, method name: nativeGetStackTrace, function signature: (Ljava/lang/Object;)[Ljava/lang/StackTraceElement;, register address: 0x709e2a9c67f0" 2021-12-01 04:11:34.195 4921-4921/com.sanfengandroid.datafilter D/HookLog: register Throwable result: 1 2021-12-01 04:11:34.195 4921-4921/com.sanfengandroid.datafilter D/HookLog: [JNICall HookJniRegisterNatives(0x709e2aa6a756)] "start register native function 0x709e2aa6a756" 2021-12-01 04:11:34.195 4921-4921/com.sanfengandroid.datafilter D/HookLog: [JNICall HookJniRegisterNatives(0x709e2aa6a756)] "native register class: java.lang.Class, method name: classForName, function signature: (Ljava/lang/String;ZLjava/lang/ClassLoader;)Ljava/lang/Class;, register address: 0x709e2a9c6d90" 2021-12-01 04:11:34.196 4921-4921/com.sanfengandroid.datafilter D/HookLog: register Throwable result: 1 2021-12-01 04:11:34.196 4921-4921/com.sanfengandroid.datafilter D/HookLog: [JNICall HookJniRegisterNatives(0x709e2aa6a756)] "start register native function 0x709e2aa6a756" 2021-12-01 04:11:34.196 4921-4921/com.sanfengandroid.datafilter D/HookLog: [JNICall HookJniRegisterNatives(0x709e2aa6a756)] "native register class: java.lang.UNIXProcess, method name: forkAndExec, function signature: ([B[BI[BI[B[IZ)I, register address: 0x709e2a9c6fc0" 2021-12-01 04:11:34.196 4921-4921/com.sanfengandroid.datafilter D/HookLog: register UNIXProcess result: 1 2021-12-01 04:11:34.196 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: native init result: 0 2021-12-01 04:11:34.200 4921-4921/com.sanfengandroid.datafilter V/HookLog: [Monitor __system_property_get] "name: debug.force_rtl, value: 0" 2021-12-01 04:11:34.201 4921-4921/com.sanfengandroid.datafilter V/HookLog: [Monitor faccessat] "dirfd: -100 path: /data/user/0/com.sanfengandroid.datafilter, mode: 0\n" 2021-12-01 04:11:34.201 4921-4921/com.sanfengandroid.datafilter V/HookLog: [Monitor faccessat] "dirfd: -100 path: /data/user/0/com.sanfengandroid.datafilter/cache, mode: 0\n" 2021-12-01 04:11:34.202 4921-4921/com.sanfengandroid.datafilter V/HookLog: [Monitor faccessat] "dirfd: -100 path: /data/user_de/0/com.sanfengandroid.datafilter, mode: 0\n" 2021-12-01 04:11:34.202 4921-4921/com.sanfengandroid.datafilter V/HookLog: [Monitor faccessat] "dirfd: -100 path: /data/user_de/0/com.sanfengandroid.datafilter/code_cache, mode: 0\n" 2021-12-01 04:11:34.203 4921-4921/com.sanfengandroid.datafilter V/HookLog: [Monitor __system_property_get] "name: ro.gfx.driver.0, value: " 2021-12-01 04:11:34.204 4921-4921/com.sanfengandroid.datafilter V/HookLog: [Monitor __open_2] "path /dev/ashmem, flags: 2" 2021-12-01 04:11:34.204 4921-4921/com.sanfengandroid.datafilter V/HookLog: Monitor: syscall invoke number: 257 2021-12-01 04:11:34.204 4921-4921/com.sanfengandroid.datafilter V/HookLog: [syscall intercept_openat] "fd: -100, path: /dev/ashmem, flags: 2, mode: 0" 2021-12-01 04:11:34.204 4921-4921/com.sanfengandroid.datafilter V/HookLog: Monitor: 'syscall' invoke number: 257, result: 33 2021-12-01 04:11:34.204 4921-4921/com.sanfengandroid.datafilter V/HookLog: [Monitor __system_property_get] "name: dalvik.vm.usejitprofiles, value: true" 2021-12-01 04:11:34.205 4921-4951/com.sanfengandroid.datafilter V/HookLog: Monitor: syscall invoke number: 158 2021-12-01 04:11:34.205 4921-4951/com.sanfengandroid.datafilter V/HookLog: Monitor: 'syscall' invoke number: 158, result: 0 2021-12-01 04:11:34.253 4921-4921/com.sanfengandroid.datafilter V/HookLog: [Monitor __open_2] "path /dev/ashmem, flags: 2" 2021-12-01 04:11:34.253 4921-4921/com.sanfengandroid.datafilter V/HookLog: Monitor: syscall invoke number: 257 2021-12-01 04:11:34.253 4921-4921/com.sanfengandroid.datafilter V/HookLog: [syscall intercept_openat] "fd: -100, path: /dev/ashmem, flags: 2, mode: 0" 2021-12-01 04:11:34.253 4921-4921/com.sanfengandroid.datafilter V/HookLog: Monitor: 'syscall' invoke number: 257, result: 33 2021-12-01 04:11:39.637 4921-4921/com.sanfengandroid.datafilter D/AndroidRuntime: Shutting down VM

    --------- beginning of crash
    

    2021-12-01 04:11:39.758 4921-4921/com.sanfengandroid.datafilter E/AndroidRuntime: FATAL EXCEPTION: main Process: com.sanfengandroid.datafilter, PID: 4921 java.lang.StackOverflowError: stack size 8MB at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:0) at java.lang.reflect.Method.getModifiers(Method.java:118) at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31) at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45) at java.lang.reflect.Method.getModifiers(Method.java:118) at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31) at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45) at java.lang.reflect.Method.getModifiers(Method.java:118) at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31) at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45) at java.lang.reflect.Method.getModifiers(Method.java:118) at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31) at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45) at java.lang.reflect.Method.getModifiers(Method.java:118) at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31) at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45) at java.lang.reflect.Method.getModifiers(Method.java:118) at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31) at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45) at java.lang.reflect.Method.getModifiers(Method.java:118) at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31) at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45) at java.lang.reflect.Method.getModifiers(Method.java:118) at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31) at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45) at java.lang.reflect.Method.getModifiers(Method.java:118) at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31) at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45) at java.lang.reflect.Method.getModifiers(Method.java:118) at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31) at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45) at java.lang.reflect.Method.getModifiers(Method.java:118) at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31) at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45) at java.lang.reflect.Method.getModifiers(Method.java:118) at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31) at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45) at java.lang.reflect.Method.getModifiers(Method.java:118) at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31) at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45) at java.lang.reflect.Method.getModifiers(Method.java:118) at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31) at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45) at java.lang.reflect.Method.getModifiers(Method.java:118) at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31) at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45) at java.lang.reflect.Method.getModifiers(Method.java:118) at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31) at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45) at java.lang.reflect.Method.getModifiers(Method.java:118) at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31) at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45) at java.lang.reflect.Method.getModifiers(Method.java:118) 2021-12-01 04:11:39.770 4921-4921/com.sanfengandroid.datafilter E/AndroidRuntime: at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31) at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45) at java.lang.reflect.Method.getModifiers(Method.java:118) at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31) at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45) at java.lang.reflect.Method.getModifiers(Method.java:118) at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31) at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45) at java.lang.reflect.Method.getModifiers(Method.java:118) at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31) at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45) at java.lang.reflect.Method.getModifiers(Method.java:118) at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31) at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45)

    opened by dhanh 0
Releases(v1.5)
Owner
sanfengAndroid
专注于Android逆向安全
sanfengAndroid
Xposed module for enhancing Snapchat!

SnapTrap SnapTrap is a new Snapchat project that aims at bringing back some enhancing features to Snapchat with the use of the Xposed framework! Curre

Raven 29 Jan 2, 2023
Generate API documents to any place: YApi, RAP2, Eolinker, etc. (一键生成API接口文档, 上传到YApi, Rap2, Eolinker等平台的IDEA插件)

Yapi X ?? ?? ?? 本项目已收录到YApi, Rap2官方仓库 一键生成API接口文档, 上传到YApi, Rap2, Eolinker等平台的IDEA插件. ?? 亮点 零成本、零入侵: 编写标准Javadoc即可,无需依赖swagger注解, 生成API文档准确性高达99%。 开箱即

Jetplugins 117 Dec 26, 2022
A simple app to use Xposed without root, unlock the bootloader or modify system image, etc.

中文文档 Introduction VirtualXposed is a simple App based on VirtualApp and epic that allows you to use an Xposed Module without needing to root, unlock t

VirtualXposed 14k Jan 8, 2023
Xposed module to hide the mock location setting

Hide Mock Location is an Xposed Module (now LSPosed on Android 11), which hides information about the 'Allow mock locations' setting.

null 27 Dec 15, 2022
LSPatch: A non-root Xposed framework fork from Xpatch

Introduction LSPatch fork from Xpatch. LSPatch provides a way to insert dex and so into the target APK by repackaging. The following changes have been

LSPosed 1.9k Jan 2, 2023
Get or Throw Spring boot Starter will help you to hide handling if entity not found.

Get or Throw Spring boot Starter Get or Throw Spring boot Starter will help you to hide handling if entity not found. 1. Setup 2. Usage Library adds c

null 3 Feb 2, 2022
A mod to hide or customize armor rendering.

Show Me Your Skin! Show Me Your Skin! (the exclamation mark is important) is a client-side mod that enables extensive customization of armor rendering

null 11 Dec 21, 2022
ThirdEye is an integrated tool for realtime monitoring of time series and interactive root-cause analysis.

ThirdEye is an integrated tool for realtime monitoring of time series and interactive root-cause analysis. It enables anyone inside an organization to collaborate on effective identification and analysis of deviations in business and system metrics. ThirdEye supports the entire workflow from anomaly detection, over root-cause analysis, to issue resolution and post-mortem reporting.

null 87 Oct 17, 2022