asLody / SandHook

Android ART Hook/Native Inline Hook/Single Instruction Hook - support 4.4 - 11.0 32/64 bit - Xposed API Compat
Other
2.02k stars 443 forks source link

SandVXposed-beta_3.apk在mumu模拟器运行apk异常 #55

Open Jimmy0806 opened 4 years ago

Jimmy0806 commented 4 years ago

java.lang.reflect.InvocationTargetException at java.lang.reflect.Method.invoke(Native Method) at com.swift.sandhook.utils.ReflectionUtils.(ReflectionUtils.java:28) at com.swift.sandhook.utils.ReflectionUtils.passApiCheck(ReflectionUtils.java) at com.swift.sandhook.SandHook.passApiCheck(SandHook.java:322) at com.lody.virtual.sandxposed.SandXposed.init(SandXposed.java:28) at io.virtualapp.VApp.attachBaseContext(VApp.java:39) at android.app.Application.attach(Application.java:187) at android.app.Instrumentation.newApplication(Instrumentation.java:997) at android.app.Instrumentation.newApplication(Instrumentation.java:981) at android.app.LoadedApk.makeApplication(LoadedApk.java:573) at android.app.ActivityThread.handleBindApplication(ActivityThread.java:4752) at android.app.ActivityThread.-wrap1(ActivityThread.java) at android.app.ActivityThread$H.handleMessage(ActivityThread.java:1414) at android.os.Handler.dispatchMessage(Handler.java:102) at android.os.Looper.loop(Looper.java:148) at android.app.ActivityThread.main(ActivityThread.java:5539) at java.lang.reflect.Method.invoke(Native Method) at com.android.internal.os.ZygoteInit$MethodAndArgsCaller.run(ZygoteInit.java:745) at com.android.internal.os.ZygoteInit.main(ZygoteInit.java:635) Caused by: java.lang.NoSuchMethodException: setHiddenApiExemptions [class [Ljava.lang.String;] at java.lang.Class.getMethod(Class.java:624) at java.lang.Class.getDeclaredMethod(Class.java:586) at java.lang.reflect.Method.invoke(Native Method)  at com.swift.sandhook.utils.ReflectionUtils.(ReflectionUtils.java:28)  at com.swift.sandhook.utils.ReflectionUtils.passApiCheck(ReflectionUtils.java)  at com.swift.sandhook.SandHook.passApiCheck(SandHook.java:322)  at com.lody.virtual.sandxposed.SandXposed.init(SandXposed.java:28)  at io.virtualapp.VApp.attachBaseContext(VApp.java:39)  at android.app.Application.attach(Application.java:187)  at android.app.Instrumentation.newApplication(Instrumentation.java:997)  at android.app.Instrumentation.newApplication(Instrumentation.java:981)  at android.app.LoadedApk.makeApplication(LoadedApk.java:573)  at android.app.ActivityThread.handleBindApplication(ActivityThread.java:4752)  at android.app.ActivityThread.-wrap1(ActivityThread.java)  at android.app.ActivityThread$H.handleMessage(ActivityThread.java:1414)  at android.os.Handler.dispatchMessage(Handler.java:102)  at android.os.Looper.loop(Looper.java:148)  at android.app.ActivityThread.main(ActivityThread.java:5539)  at java.lang.reflect.Method.invoke(Native Method)  at com.android.internal.os.ZygoteInit$MethodAndArgsCaller.run(ZygoteInit.java:745)  at com.android.internal.os.ZygoteInit.main(ZygoteInit.java:635) 

Jimmy0806 commented 4 years ago

demo在mumu模拟器(Android 6.0)也是会闪退,mumu模拟器正常是支持运行armv7的应用的 、 `06-18 14:43:17.209 7084-7084/? W/art: Unexpected CPU variant for X86 using defaults: x86 06-18 14:43:17.236 7084-7091/? E/art: Failed sending reply to debugger: Broken pipe 06-18 14:43:17.298 7084-7084/? W/SandHook-Native: JNI Loaded 06-18 14:43:17.401 7084-7084/? W/SandHook-Native: can not inline due to origin code is too small(size is 0) 06-18 14:43:17.462 7084-7084/? W/art: Before Android 4.1, method android.graphics.PorterDuffColorFilter android.support.graphics.drawable.VectorDrawableCompat.updateTintFilter(android.graphics.PorterDuffColorFilter, android.content.res.ColorStateList, android.graphics.PorterDuff$Mode) would have incorrectly overridden the package-private method in android.graphics.drawable.Drawable

--------- beginning of crash

06-18 14:43:17.477 7084-7084/? A/libc: Fatal signal 11 (SIGSEGV), code 128, fault addr 0x0 in tid 7084 (.swift.sandhook) 06-18 14:43:17.578 246-246/? A/DEBUG: 06-18 14:43:17.578 246-246/? A/DEBUG: Build fingerprint: 'OnePlus/OnePlus2/OnePlus2:6.0.1/MMB29M/1447841200:user/release-keys' 06-18 14:43:17.578 246-246/? A/DEBUG: Revision: '0' 06-18 14:43:17.578 246-246/? A/DEBUG: ABI: 'x86' 06-18 14:43:17.578 246-246/? A/DEBUG: pid: 7084, tid: 7084, name: .swift.sandhook >>> com.swift.sandhook <<< 06-18 14:43:17.578 246-246/? A/DEBUG: signal 11 (SIGSEGV), code 128 (SI_KERNEL), fault addr 0x0 06-18 14:43:17.581 246-246/? A/DEBUG: eax 70981de0 ebx 0000000c ecx 12c295d0 edx 00000000 06-18 14:43:17.581 246-246/? A/DEBUG: esi 719f2a21 edi bf8a658c 06-18 14:43:17.581 246-246/? A/DEBUG: xcs 00000073 xds 0000007b xes 0000007b xfs 0000003b xss 0000007b 06-18 14:43:17.581 246-246/? A/DEBUG: eip 733ff75e ebp bf8a643c esp bf8a642c flags 00210283 06-18 14:43:17.582 246-246/? A/DEBUG: backtrace: 06-18 14:43:17.582 246-246/? A/DEBUG: #00 pc 0000075e /system/framework/x86/boot.oat (offset 0x28c2000) 06-18 14:43:17.582 246-246/? A/DEBUG: #01 pc 000b64ff 06-18 14:43:17.582 246-246/? A/DEBUG: #02 pc 007fb493 [stack] 06-18 14:43:17.627 246-246/? A/DEBUG: Tombstone written to: /data/tombstones/tombstone_05`

Jimmy0806 commented 4 years ago

sandhook demo在红米android 6.0系统也直接崩溃 ` --------- beginning of crash 06-18 17:34:22.159 21292-21309/com.swift.sandhook E/AndroidRuntime: FATAL EXCEPTION: Thread-1204 Process: com.swift.sandhook, PID: 21292 java.lang.NullPointerException: Attempt to invoke virtual method 'java.lang.StringBuilder java.lang.StringBuilder.append(java.lang.Object)' on a null object reference at com.swift.sandhook.MainActivity$3.run(MainActivity.java:79) at java.lang.Thread.run(Thread.java:818)

06-18 18:32:18.806 15633-15653/com.swift.sandhook A/libc: Fatal signal 11 (SIGSEGV), code 1, fault addr 0x78 in tid 15653 (RenderThread) 06-18 18:32:18.857 501-501/? A/DEBUG: 06-18 18:32:18.857 501-501/? A/DEBUG: Build fingerprint: 'Xiaomi/nikel/nikel:6.0/MRA58K/V10.2.2.0.MBFCNXM:user/release-keys' 06-18 18:32:18.857 501-501/? A/DEBUG: Revision: '0' 06-18 18:32:18.857 501-501/? A/DEBUG: ABI: 'arm64' 06-18 18:32:18.857 501-501/? A/DEBUG: pid: 15633, tid: 15653, name: RenderThread >>> com.swift.sandhook <<< 06-18 18:32:18.857 501-501/? A/DEBUG: signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x78 06-18 18:32:18.863 501-501/? A/DEBUG: x0 0000000000000000 x1 0000000000000000 x2 0000007f84a5eb20 x3 0000000000020000 06-18 18:32:18.864 501-501/? A/DEBUG: x4 0000007f84a5ec58 x5 00000000705b524f x6 0000000012d6cccc x7 0000000000080401 06-18 18:32:18.864 501-501/? A/DEBUG: x8 0000000012d7a800 x9 0000000000000000 x10 0000000000000056 x11 0000000000000014 06-18 18:32:18.864 501-501/? A/DEBUG: x12 0000007f8650d200 x13 0000000000000001 x14 f3867324cd0487d7 x15 0000000000000009 06-18 18:32:18.864 501-501/? A/DEBUG: x16 0000000000000000 x17 0000000000005419 x18 0000007f84a9f800 x19 0000007f84a9f898 06-18 18:32:18.864 501-501/? A/DEBUG: x20 0000007f84a9f800 x21 0000007f8abfa000 x22 00000000700ee098 x23 0000007f84a5eb88 06-18 18:32:18.864 501-501/? A/DEBUG: x24 0000000000000000 x25 0000000000000000 x26 00000000705b524f x27 000000006fd7f0e8 06-18 18:32:18.864 501-501/? A/DEBUG: x28 0000000000000001 x29 0000000000000000 x30 0000007f8a705180 06-18 18:32:18.864 501-501/? A/DEBUG: sp 0000007f84a5eb20 pc 0000007f8a705190 pstate 0000000000000000 06-18 18:32:18.864 501-501/? E/AEE/LIBAEE: aee_try_get_word: read:15653 addr:0x0000000000000008 ret:-1, 5 06-18 18:32:18.864 501-501/? E/AEE/LIBAEE: aee_try_get_word: read:15653 addr:0x0000000000000008 ret:-1, 5 06-18 18:32:18.864 501-501/? A/DEBUG: backtrace: 06-18 18:32:18.865 501-501/? A/DEBUG: #00 pc 000000000012d190 /system/lib64/libart.so (_ZN3art9ArtMethod6InvokeEPNS_6ThreadEPjjPNS_6JValueEPKc+196) 06-18 18:32:18.925 501-501/? A/DEBUG: Tombstone written to: /data/tombstones/tombstone_07`

Jimmy0806 commented 4 years ago

测试了一下,好像这个sandhook demo在国内各个主流的模拟器上都是直接崩溃,yahfa也一样

hwangjr commented 3 years ago

最新版本 sandvexposed 使用 红米 miui 10.2 也闪退


08-25 10:45:41.452 12461-12461/? W/ResourceType: No package identifier when getting name for resource number 0x00000000
08-25 10:45:41.469 12461-12461/? I/MultiDex: VM with version 2.1.0 has multidex support
08-25 10:45:41.469 12461-12461/? I/MultiDex: Installing application
08-25 10:45:41.469 12461-12461/? I/MultiDex: VM has multidex support, MultiDex support library is disabled.
08-25 10:45:41.496 12461-12461/? W/SandHook-Native: JNI Loaded
08-25 10:45:41.513 12461-12461/? D/dlopen: f4927000-f4d5f000 r-xp 00000000 fd:00 2240                               /system/lib/libart.so
08-25 10:45:41.513 12461-12461/? D/SandHook-Native: get module base /system/lib/libart.so: 4103237632
08-25 10:45:41.514 12461-12461/? D/SandHook-Native: find /system/lib/libart.so: eb001

    --------- beginning of crash
08-25 10:45:41.516 12461-12461/? A/libc: Fatal signal 11 (SIGSEGV), code 2, fault addr 0xab7dd3b0 in tid 12461 (app.sandvxposed)
08-25 10:45:41.568 697-697/? A/DEBUG: *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
08-25 10:45:41.568 697-697/? A/DEBUG: Build fingerprint: 'Xiaomi/rolex/rolex:6.0.1/MMB29M/V10.2.2.0.MCCCNXM:user/release-keys'
08-25 10:45:41.568 697-697/? A/DEBUG: Revision: '0'
08-25 10:45:41.568 697-697/? A/DEBUG: ABI: 'arm'
08-25 10:45:41.568 697-697/? A/DEBUG: pid: 12461, tid: 12461, name: app.sandvxposed  >>> io.virtualapp.sandvxposed <<<
08-25 10:45:41.568 697-697/? A/DEBUG: signal 11 (SIGSEGV), code 2 (SEGV_ACCERR), fault addr 0xab7dd3b0
08-25 10:45:41.580 697-697/? A/DEBUG:     r0 ab76fb88  r1 ab76fb88  r2 ab7dd3b0  r3 00000002
08-25 10:45:41.580 697-697/? A/DEBUG:     r4 00000008  r5 f4a34a05  r6 ab551130  r7 ffc83dd8
08-25 10:45:41.580 697-697/? A/DEBUG:     r8 ab55d6c4  r9 ab55d638  sl 00000000  fp ffc84054
08-25 10:45:41.580 697-697/? A/DEBUG:     ip f6e165dc  sp ffc83cd0  lr ef9372a9  pc ab7dd3b0  cpsr 20070010
08-25 10:45:41.582 697-697/? A/DEBUG: backtrace:
08-25 10:45:41.582 697-697/? A/DEBUG:     #00 pc 002973b0  [heap]
08-25 10:45:41.582 697-697/? A/DEBUG:     #01 pc 0004b2a7  /data/app/io.virtualapp.sandvxposed-1/lib/arm/libsandhook-native.so (_ZN8SandHook7Decoder12Arm32Decoder11DisassembleEPvjRNS0_11InstVisitorEb+1510)
08-25 10:45:41.582 697-697/? A/DEBUG:     #02 pc 0004d71d  /data/app/io.virtualapp.sandvxposed-1/lib/arm/libsandhook-native.so (_ZN8SandHook3Asm15CodeRelocateA328RelocateEPvjS2_+228)
08-25 10:45:41.582 697-697/? A/DEBUG:     #03 pc 0004b96d  /data/app/io.virtualapp.sandvxposed-1/lib/arm/libsandhook-native.so (_ZN8SandHook4Hook22InlineHookArm32Android4HookEPvS2_+412)
08-25 10:45:41.583 697-697/? A/DEBUG:     #04 pc 0003c28f  /data/app/io.virtualapp.sandvxposed-1/lib/arm/libsandhook-native.so (SandInlineHook+42)
08-25 10:45:41.583 697-697/? A/DEBUG:     #05 pc 0001750f  /data/app/io.virtualapp.sandvxposed-1/lib/arm/libsandhook.so (hookClassInit+54)
08-25 10:45:41.583 697-697/? A/DEBUG:     #06 pc 0001588b  /data/app/io.virtualapp.sandvxposed-1/lib/arm/libsandhook.so (Java_com_swift_sandhook_SandHook_initForPendingHook+62)
08-25 10:45:41.583 697-697/? A/DEBUG:     #07 pc 00b5c9d5  /data/app/io.virtualapp.sandvxposed-1/oat/arm/base.odex (offset 0x82b000)
08-25 10:45:41.753 1504-1524/? I/Timeline: Timeline: App_transition_stopped time:1045749100
08-25 10:45:41.754 697-697/? A/DEBUG: Tombstone written to: /data/tombstones/tombstone_09
08-25 10:45:41.754 697-697/? E/DEBUG: AM write failed: Broken pipe
08-25 10:45:41.755 3247-3273/? D/PowerKeeper.Event: notifyAMCrash packageName: 0, pid:1504

    --------- beginning of system
08-25 10:45:41.759 1504-12475/? W/ActivityManager:   Force finishing activity io.virtualapp.sandvxposed/io.virtualapp.splash.SplashActivity
08-25 10:45:41.764 1504-12475/? D/ActivityTrigger: ActivityTrigger activityPauseTrigger 

SandHook 也是闪退:


08-25 10:54:34.112 13303-13303/com.swift.sandhook W/ResourceType: No package identifier when getting name for resource number 0x00000000
08-25 10:54:34.134 13303-13303/com.swift.sandhook W/SandHook-Native: JNI Loaded
08-25 10:54:34.146 13303-13303/com.swift.sandhook D/dlopen: 7f7cf56000-7f7d540000 r-xp 00000000 fd:00 2599                           /system/lib64/libart.so
08-25 10:54:34.146 13303-13303/com.swift.sandhook D/SandHook-Native: get module base /system/lib64/libart.so: 547557302272
08-25 10:54:34.148 13303-13303/com.swift.sandhook D/SandHook-Native: find /system/lib64/libart.so: 128740
08-25 10:54:34.152 13303-13303/com.swift.sandhook D/dlopen: 7f7cf56000-7f7d540000 r-xp 00000000 fd:00 2599                           /system/lib64/libart.so
08-25 10:54:34.153 13303-13303/com.swift.sandhook D/SandHook-Native: get module base /system/lib64/libart.so: 547557302272
08-25 10:54:34.155 13303-13303/com.swift.sandhook D/SandHook-Native: find /system/lib64/libart.so: 1285d0

    --------- beginning of crash
08-25 10:54:34.165 13303-13303/com.swift.sandhook A/libc: Fatal signal 11 (SIGSEGV), code 2, fault addr 0x7f808e5b88 in tid 13303 (.swift.sandhook)
08-25 10:54:34.217 698-698/? A/DEBUG: *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
08-25 10:54:34.217 698-698/? A/DEBUG: Build fingerprint: 'Xiaomi/rolex/rolex:6.0.1/MMB29M/V10.2.2.0.MCCCNXM:user/release-keys'
08-25 10:54:34.217 698-698/? A/DEBUG: Revision: '0'
08-25 10:54:34.217 698-698/? A/DEBUG: ABI: 'arm64'
08-25 10:54:34.217 698-698/? A/DEBUG: pid: 13303, tid: 13303, name: .swift.sandhook  >>> com.swift.sandhook <<<
08-25 10:54:34.217 698-698/? A/DEBUG: signal 11 (SIGSEGV), code 2 (SEGV_ACCERR), fault addr 0x7f808e5b88
08-25 10:54:34.229 698-698/? A/DEBUG:     x0   000000559bea5b40  x1   0000007f808e5de4  x2   0000000000000001  x3   000000559bea5b90
08-25 10:54:34.229 698-698/? A/DEBUG:     x4   0000000000000000  x5   0000000000000001  x6   0000000000000000  x7   0000000000000000
08-25 10:54:34.229 698-698/? A/DEBUG:     x8   0000007f7d09b190  x9   000000559bea5b40  x10  0000007f808e5b88  x11  0000000000001000
08-25 10:54:34.229 698-698/? A/DEBUG:     x12  0000007f808e5b78  x13  0000007f808e5b78  x14  0000000000000033  x15  0000000000001040
08-25 10:54:34.229 698-698/? A/DEBUG:     x16  0000007f808dea58  x17  0000000000000000  x18  0000007f808e5000  x19  0000007f7c138150
08-25 10:54:34.230 698-698/? A/DEBUG:     x20  0000007f7c16c390  x21  000000559bb326c0  x22  0000007f77a52e08  x23  0000007ff9337768
08-25 10:54:34.230 698-698/? A/DEBUG:     x24  0000007ff9337af8  x25  0000007ff933782c  x26  0000007ff9337df0  x27  0000007f7d561000
08-25 10:54:34.230 698-698/? A/DEBUG:     x28  0000000000000000  x29  0000007ff9337300  x30  0000007f77d55034
08-25 10:54:34.230 698-698/? A/DEBUG:     sp   0000007ff9337140  pc   0000007f808e5b88  pstate 0000000020000000
08-25 10:54:34.247 698-698/? A/DEBUG: backtrace:
08-25 10:54:34.247 698-698/? A/DEBUG:     #00 pc 0000000000003b88  <unknown>
08-25 10:54:34.248 698-698/? A/DEBUG:     #01 pc 0000000000063030  /data/app/com.swift.sandhook-1/lib/arm64/libsandhook-native.so (_ZN8SandHook7Decoder12Arm64Decoder11DisassembleEPvmRNS0_11InstVisitorEb+2140)
08-25 10:54:34.248 698-698/? A/DEBUG:     #02 pc 0000000000063dc8  /data/app/com.swift.sandhook-1/lib/arm64/libsandhook-native.so (_ZN8SandHook3Asm15CodeRelocateA648RelocateEPvmS2_+200)
08-25 10:54:34.248 698-698/? A/DEBUG:     #03 pc 00000000000654a4  /data/app/com.swift.sandhook-1/lib/arm64/libsandhook-native.so (_ZN8SandHook4Hook22InlineHookArm64Android4HookEPvS2_+324)
08-25 10:54:34.248 698-698/? A/DEBUG:     #04 pc 000000000004a738  /data/app/com.swift.sandhook-1/lib/arm64/libsandhook-native.so (SandInlineHook+52)
08-25 10:54:34.248 698-698/? A/DEBUG:     #05 pc 000000000001f640  /data/app/com.swift.sandhook-1/lib/arm64/libsandhook.so (hookClassInit+96)
08-25 10:54:34.248 698-698/? A/DEBUG:     #06 pc 000000000001ce78  /data/app/com.swift.sandhook-1/lib/arm64/libsandhook.so (Java_com_swift_sandhook_SandHook_initForPendingHook+116)
08-25 10:54:34.249 698-698/? A/DEBUG:     #07 pc 0000000000a846c8  /data/app/com.swift.sandhook-1/oat/arm64/base.odex (offset 0x5db000) (boolean com.swift.sandhook.SandHook.initForPendingHook()+124)
08-25 10:54:34.249 698-698/? A/DEBUG:     #08 pc 000000000011ecd8  /system/lib64/libart.so (art_quick_invoke_static_stub+600)
08-25 10:54:34.249 698-698/? A/DEBUG:     #09 pc 000000000012d984  /system/lib64/libart.so (_ZN3art9ArtMethod6InvokeEPNS_6ThreadEPjjPNS_6JValueEPKc+344)
08-25 10:54:34.249 698-698/? A/DEBUG:     #10 pc 00000000004d3b54  /system/lib64/libart.so (artInterpreterToCompiledCodeBridge+212)
08-25 10:54:34.249 698-698/? A/DEBUG:     #11 pc 00000000002abfd0  /system/lib64/libart.so (_ZN3art11interpreter6DoCallILb0ELb0EEEbPNS_9ArtMethodEPNS_6ThreadERNS_11ShadowFrameEPKNS_11InstructionEtPNS_6JValueE+480)
08-25 10:54:34.250 698-698/? A/DEBUG:     #12 pc 00000000000ddd08  /system/lib64/libart.so (_ZN3art11interpreter15ExecuteGotoImplILb0ELb0EEENS_6JValueEPNS_6ThreadEPKNS_7DexFile8CodeItemERNS_11ShadowFrameES2_+22200)
08-25 10:54:34.250 698-698/? A/DEBUG:     #13 pc 00000000002889e0  /system/lib64/libart.so (_ZN3art11interpreter30EnterInterpreterFromEntryPointEPNS_6ThreadEPKNS_7DexFile8CodeItemEPNS_11ShadowFrameE+96)
08-25 10:54:34.250 698-698/? A/DEBUG:     #14 pc 000000000053f668  /system/lib64/libart.so (artQuickToInterpreterBridge+632)
08-25 10:54:34.250 698-698/? A/DEBUG:     #15 pc 00000000001287a4  /system/lib64/libart.so (art_quick_to_interpreter_bridge+100)
08-25 10:54:34.250 698-698/? A/DEBUG:     #16 pc 000000000011ecd8  /system/lib64/libart.so (art_quick_invoke_static_stub+600)
08-25 10:54:34.250 698-698/? A/DEBUG:     #17 pc 000000000012d984  /system/lib64/libart.so (_ZN3art9ArtMethod6InvokeEPNS_6ThreadEPjjPNS_6JValueEPKc+344)
08-25 10:54:34.250 698-698/? A/DEBUG:     #18 pc 000000000019ae1c  /system/lib64/libart.so (_ZN3art11ClassLinker15InitializeClassEPNS_6ThreadENS_6HandleINS_6mirror5ClassEEEbb.part.608+852)
08-25 10:54:34.251 698-698/? A/DEBUG:     #19 pc 000000000019bdc0  /system/lib64/libart.so (_ZN3art11ClassLinker17EnsureInitializedEPNS_6ThreadENS_6HandleINS_6mirror5ClassEEEbb+116)
08-25 10:54:34.251 698-698/? A/DEBUG:     #20 pc 00000000005375e8  /system/lib64/libart.so (artInitializeStaticStorageFromCode+184)
08-25 10:54:34.251 698-698/? A/DEBUG:     #21 pc 000000000011f2f0  /system/lib64/libart.so (art_quick_initialize_static_storage+64)
08-25 10:54:34.251 698-698/? A/DEBUG:     #22 pc 0000000000a8415c  /data/app/com.swift.sandhook-1/oat/arm64/base.odex (offset 0x5db000) (void com.swift.sandhook.SandHook.hook(com.swift.sandhook.wrapper.HookWrapper$HookEntity)+4400)
08-25 10:54:34.251 698-698/? A/DEBUG:     #23 pc 0000000000a92518  /data/app/com.swift.sandhook-1/oat/arm64/base.odex (offset 0x5db000) (void com.swift.sandhook.wrapper.HookWrapper.addHookClass(java.lang.ClassLoader, java.lang.Class)+460)
08-25 10:54:34.251 698-698/? A/DEBUG:     #24 pc 0000000000a9288c  /data/app/com.swift.sandhook-1/oat/arm64/base.odex (offset 0x5db000) (void com.swift.sandhook.wrapper.HookWrapper.addHookClass(java.lang.ClassLoader, java.lang.Class[])+176)
08-25 10:54:34.251 698-698/? A/DEBUG:     #25 pc 0000000000a92940  /data/app/com.swift.sandhook-1/oat/arm64/base.odex (offset 0x5db000) (void com.swift.sandhook.wrapper.HookWrapper.addHookClass(java.lang.Class[])+68)
08-25 10:54:34.251 698-698/? A/DEBUG:     #26 pc 0000000000a81024  /data/app/com.swift.sandhook-1/oat/arm64/base.odex (offset 0x5db000) (void com.swift.sandhook.SandHook.addHookClass(java.lang.Class[])+88)
08-25 10:54:34.252 698-698/? A/DEBUG:     #27 pc 0000000000a7eff8  /data/app/com.swift.sandhook-1/oat/arm64/base.odex (offset 0x5db000) (void com.swift.sandhook.MyApp.onCreate()+1436)
08-25 10:54:34.252 698-698/? A/DEBUG:     #28 pc 0000000073727558  /data/dalvik-cache/arm64/system@framework@boot.oat (offset 0x2566000)
08-25 10:54:34.416 698-698/? A/DEBUG: Tombstone written to: /data/tombstones/tombstone_02
08-25 10:54:34.416 3247-3273/? D/PowerKeeper.Event: notifyAMCrash packageName: 0, pid:1504
08-25 10:54:34.416 698-698/? E/DEBUG: AM write failed: Broken pipe
08-25 10:54:34.417 1504-1524/? I/Timeline: Timeline: App_transition_stopped time:1046281716

    --------- beginning of system
08-25 10:54:34.431 1504-13318/? W/ActivityManager:   Force finishing activity com.swift.sandhook/.MainActivity
08-25 10:54:34.433 716-716/? I/Zygote: Process 13303 exited due to signal (11)
08-25 10:54:34.437 1504-13318/? D/ActivityTrigger: ActivityTrigger activityPauseTrigger