(OTA) TMobile USA CRC1 FROM CRB43 LINK - G1 Android Development

[OTA Update] Anyone know about it?
Does anyone know anything about the OTA update being sent to G1's today? It's labeled as being security and bug fixes - mainly for developers.

the vast majority of the posters in this forum ahve rooted phones and dont receive ota's. if you dont get an answer here id try the two general forums, im kind of curious my self...

yea I keep mine rooted too, saw the article on tmonews.com talking about it, was guessing it was an spl upgrade, but eh those are dangerous to do OTA, but I guess they can do as they wish

In the uk I just got /cache/signed-kila_eu
CRC1-from-CRB43-FIX2.1c36f92b.zip it says it will update on my next reboot. Unless itls signed with test keys I doubt it though. Interested to know what's in it though

In the uk I just got /cache/signed-kila_eu
CRC1-from-CRB43-FIX2.1c36f92b.zip it says it will update on my next reboot. Unless itls signed with test keys I doubt it though. Interested to know what's in it though

SilentMobius said:
In the uk I just got /cache/signed-kila_eu
CRC1-from-CRB43-FIX2.1c36f92b.zip it says it will update on my next reboot. Unless itls signed with test keys I doubt it though. Interested to know what's in it though
Click to expand...
Click to collapse
did you happen to get the link to the zip from logcat?

Found this using google
http://android.clients.google.com/updates/signed-kila_eu-CRC1-from-CRB43-FIX2.1c36f92b.zip

i'm rooted using jf 1.51 us and it promts me to update.just not so sure i want to do it.
NEW car 2006 eclipsegt Wahoo.

Im wondering if its like u said the prefected dreaded spl lol... No clue what im talking about

kintera said:
i'm rooted using jf 1.51 us and it promts me to update.just not so sure i want to do it.
New car 2006 eclipsegt wahoo.
Click to expand...
Click to collapse
i would not till they find out what it is on here i wonder if it could be a patch that does not allow downgrading from cupcake to gain root the kinda like those people in europe where talking about in the forums

Looking in the update zip there are patches to many of the apps, and the recovery image. So if its a security update its a very comprehensive one.
Code:
Archive: signed-kila_eu-CRC1-from-CRB43-FIX2.1c36f92b.zip
Length Date Time Name
-------- ---- ---- ----
12163 08-20-08 22:19 META-INF/MANIFEST.MF
12216 08-20-08 22:19 META-INF/CERT.SF
1702 08-20-08 22:19 META-INF/CERT.RSA
48665 01-01-09 00:00 META-INF/com/google/android/update-script
210472 01-01-09 00:00 applypatch
966 01-01-09 00:00 patch/boot.img.p
1122 01-01-09 00:00 patch/recovery.img.p0
1440451 01-01-09 00:00 patch/recovery.img.p1
4026 01-01-09 00:00 patch/system/app/AlarmClock.apk.p
200 01-01-09 00:00 patch/system/app/AlarmClock.odex.p
7588 01-01-09 00:00 patch/system/app/Browser.apk.p
208 01-01-09 00:00 patch/system/app/Browser.odex.p
157 01-01-09 00:00 patch/system/app/BugReport.apk.p
199 01-01-09 00:00 patch/system/app/BugReport.odex.p
2267 01-01-09 00:00 patch/system/app/Calculator.apk.p
202 01-01-09 00:00 patch/system/app/Calculator.odex.p
5834 01-01-09 00:00 patch/system/app/Calendar.apk.p
202 01-01-09 00:00 patch/system/app/Calendar.odex.p
1837 01-01-09 00:00 patch/system/app/CalendarProvider.apk.p
203 01-01-09 00:00 patch/system/app/CalendarProvider.odex.p
11638 01-01-09 00:00 patch/system/app/Camera.apk.p
204 01-01-09 00:00 patch/system/app/Camera.odex.p
10512 01-01-09 00:00 patch/system/app/Contacts.apk.p
199 01-01-09 00:00 patch/system/app/Contacts.odex.p
174 01-01-09 00:00 patch/system/app/DownloadProvider.apk.p
199 01-01-09 00:00 patch/system/app/DownloadProvider.odex.p
165 01-01-09 00:00 patch/system/app/DrmProvider.apk.p
199 01-01-09 00:00 patch/system/app/DrmProvider.odex.p
7012 01-01-09 00:00 patch/system/app/Email.apk.p
213 01-01-09 00:00 patch/system/app/Email.odex.p
2864 01-01-09 00:00 patch/system/app/FieldTest.apk.p
9431 01-01-09 00:00 patch/system/app/Gmail.apk.p
205 01-01-09 00:00 patch/system/app/Gmail.odex.p
1254 01-01-09 00:00 patch/system/app/GmailProvider.apk.p
205 01-01-09 00:00 patch/system/app/GmailProvider.odex.p
1440 01-01-09 00:00 patch/system/app/GoogleApps.apk.p
202 01-01-09 00:00 patch/system/app/GoogleApps.odex.p
1236 01-01-09 00:00 patch/system/app/GoogleContactsProvider.apk.p
202 01-01-09 00:00 patch/system/app/GoogleContactsProvider.odex.p
162 01-01-09 00:00 patch/system/app/GooglePartnerSetup.apk.p
199 01-01-09 00:00 patch/system/app/GooglePartnerSetup.odex.p
1340 01-01-09 00:00 patch/system/app/GoogleSearch.apk.p
199 01-01-09 00:00 patch/system/app/GoogleSearch.odex.p
170 01-01-09 00:00 patch/system/app/GoogleSettingsProvider.apk.p
200 01-01-09 00:00 patch/system/app/GoogleSettingsProvider.odex.p
2000 01-01-09 00:00 patch/system/app/GoogleSubscribedFeedsProvider.apk.p
200 01-01-09 00:00 patch/system/app/GoogleSubscribedFeedsProvider.odex.p
157 01-01-09 00:00 patch/system/app/HTMLViewer.apk.p
197 01-01-09 00:00 patch/system/app/HTMLViewer.odex.p
2034 01-01-09 00:00 patch/system/app/ImProvider.apk.p
202 01-01-09 00:00 patch/system/app/ImProvider.odex.p
5592 01-01-09 00:00 patch/system/app/LatinIME.apk.p
200 01-01-09 00:00 patch/system/app/LatinIME.odex.p
8320 01-01-09 00:00 patch/system/app/Launcher.apk.p
203 01-01-09 00:00 patch/system/app/Launcher.odex.p
16191 01-01-09 00:00 patch/system/app/Maps.apk.p
1434 01-01-09 00:00 patch/system/app/MediaProvider.apk.p
200 01-01-09 00:00 patch/system/app/MediaProvider.odex.p
2749 01-01-09 00:00 patch/system/app/MediaUploader.apk.p
7249 01-01-09 00:00 patch/system/app/Mms.apk.p
211 01-01-09 00:00 patch/system/app/Mms.odex.p
7487 01-01-09 00:00 patch/system/app/Music.apk.p
206 01-01-09 00:00 patch/system/app/Music.odex.p
159 01-01-09 00:00 patch/system/app/NetworkLocation.apk.p
200 01-01-09 00:00 patch/system/app/NetworkLocation.odex.p
1874 01-01-09 00:00 patch/system/app/PackageInstaller.apk.p
201 01-01-09 00:00 patch/system/app/PackageInstaller.odex.p
11757 01-01-09 00:00 patch/system/app/Phone.apk.p
203 01-01-09 00:00 patch/system/app/Phone.odex.p
21756 01-01-09 00:00 patch/system/app/Settings.apk.p
203 01-01-09 00:00 patch/system/app/Settings.odex.p
168 01-01-09 00:00 patch/system/app/SettingsProvider.apk.p
198 01-01-09 00:00 patch/system/app/SettingsProvider.odex.p
17038 01-01-09 00:00 patch/system/app/SetupWizard.apk.p
199 01-01-09 00:00 patch/system/app/SetupWizard.odex.p
1982 01-01-09 00:00 patch/system/app/SoundRecorder.apk.p
197 01-01-09 00:00 patch/system/app/SoundRecorder.odex.p
1935 01-01-09 00:00 patch/system/app/Stk.apk.p
200 01-01-09 00:00 patch/system/app/Stk.odex.p
2072 01-01-09 00:00 patch/system/app/Street.apk.p
203 01-01-09 00:00 patch/system/app/Street.odex.p
1719 01-01-09 00:00 patch/system/app/SystemUpdater.apk.p
200 01-01-09 00:00 patch/system/app/SystemUpdater.odex.p
6951 01-01-09 00:00 patch/system/app/Talk.apk.p
208 01-01-09 00:00 patch/system/app/Talk.odex.p
1233 01-01-09 00:00 patch/system/app/TelephonyProvider.apk.p
200 01-01-09 00:00 patch/system/app/TelephonyProvider.odex.p
159 01-01-09 00:00 patch/system/app/UserDictionaryProvider.apk.p
195 01-01-09 00:00 patch/system/app/UserDictionaryProvider.odex.p
7419 01-01-09 00:00 patch/system/app/Vending.apk.p
208 01-01-09 00:00 patch/system/app/Vending.odex.p
1327 01-01-09 00:00 patch/system/app/Webnwalk.apk.p
196 01-01-09 00:00 patch/system/app/Webnwalk.odex.p
4764 01-01-09 00:00 patch/system/app/YouTube.apk.p
208 01-01-09 00:00 patch/system/app/YouTube.odex.p
157 01-01-09 00:00 patch/system/app/checkin.apk.p
201 01-01-09 00:00 patch/system/app/checkin.odex.p
1720 01-01-09 00:00 patch/system/app/gtalkservice.apk.p
208 01-01-09 00:00 patch/system/app/gtalkservice.odex.p
165 01-01-09 00:00 patch/system/bin/debuggerd.p
246 01-01-09 00:00 patch/system/build.prop.p
171 01-01-09 00:00 patch/system/etc/security/otacerts.zip.p
152 01-01-09 00:00 patch/system/framework/am.jar.p
195 01-01-09 00:00 patch/system/framework/am.odex.p
176 01-01-09 00:00 patch/system/framework/android.awt.jar.p
206 01-01-09 00:00 patch/system/framework/android.awt.odex.p
152 01-01-09 00:00 patch/system/framework/android.policy.jar.p
203 01-01-09 00:00 patch/system/framework/android.policy.odex.p
152 01-01-09 00:00 patch/system/framework/android.test.runner.jar.p
199 01-01-09 00:00 patch/system/framework/android.test.runner.odex.p
152 01-01-09 00:00 patch/system/framework/com.android.im.plugin.jar.p
199 01-01-09 00:00 patch/system/framework/com.android.im.plugin.odex.p
152 01-01-09 00:00 patch/system/framework/com.google.android.gtalkservice.jar.p
202 01-01-09 00:00 patch/system/framework/com.google.android.gtalkservice.odex.p
153 01-01-09 00:00 patch/system/framework/com.google.android.maps.jar.p
205 01-01-09 00:00 patch/system/framework/com.google.android.maps.odex.p
285 01-01-09 00:00 patch/system/framework/core.jar.p
165 01-01-09 00:00 patch/system/framework/core.odex.p
152 01-01-09 00:00 patch/system/framework/ext.jar.p
166 01-01-09 00:00 patch/system/framework/ext.odex.p
63736 01-01-09 00:00 patch/system/framework/framework-res.apk.p
152 01-01-09 00:00 patch/system/framework/framework-tests.jar.p
201 01-01-09 00:00 patch/system/framework/framework-tests.odex.p
166 01-01-09 00:00 patch/system/framework/framework.jar.p
99442 01-01-09 00:00 patch/system/framework/framework.odex.p
152 01-01-09 00:00 patch/system/framework/ime.jar.p
195 01-01-09 00:00 patch/system/framework/ime.odex.p
152 01-01-09 00:00 patch/system/framework/input.jar.p
195 01-01-09 00:00 patch/system/framework/input.odex.p
152 01-01-09 00:00 patch/system/framework/monkey.jar.p
200 01-01-09 00:00 patch/system/framework/monkey.odex.p
152 01-01-09 00:00 patch/system/framework/pm.jar.p
195 01-01-09 00:00 patch/system/framework/pm.odex.p
154 01-01-09 00:00 patch/system/framework/services.jar.p
211 01-01-09 00:00 patch/system/framework/services.odex.p
152 01-01-09 00:00 patch/system/framework/svc.jar.p
198 01-01-09 00:00 patch/system/framework/svc.odex.p
3372 01-01-09 00:00 patch/system/lib/libcameraservice.so.p
2719 01-01-09 00:00 patch/system/lib/libmediaplayerservice.so.p
50388 01-01-09 00:00 system/etc/NOTICE.html.gz
-------- -------
2169286 140 files
Were the previous updates binary patches? I read about googles new binary patching algorithm, won't that make it tough for us to produce new roms? as the binary patches won't apply to any pre-modified binary blobs? I guess we'll be compiling more and more from the source. I hope this release is tagged in git

If they are patching BOOT and RECOVERY with this update (which they obviously are), you DO NOT want to install this update. You will almost certainly loose root, and might not be able to get it back easily.
I am sure the various XDA developers like Cyanogen will want to go through and see exactly what the changes are. And they might want to incorporate any valuable changes to the applications themselves. But, until that happens, I wouldn't touch this update with a ten foot pole.

*Finger moves slowly away from OK button, while reading this via tether*

LINK
here is the link pulled from logcat for the us version
http://android.clients.google.com/updates/signed-kila-CRC1-from-CRB43-FIX.7ca4a1d7.zip

here is the link i recovered from logcat and does work tested. this seems to update recovery.img and boot .img though the download size is under a meg does not seem to contain new spl.
WARNING THIS WILL MORE THEN LIKELY DROP ROOT. AKA no more root.
http://android.clients.google.com/updates/signed-kila-CRC1-from-CRB43-FIX.7ca4a1d7.zip

I've had it up for a while... and yes you're correct... it updates your radio, boot and rom...
http://www.myhangoutonline.com/htc-phones/htc-dream/roms/official/70-signed-kila-ota-148830-de6a94ca
this is the official t-mobile (US) cupcake (1.5) rom.... it will put your phone back to stock.

Dev phone users were getting one too, (so some posts said) if anyone can grab that link that would be cool too.

whitemonster said:
I've had it up for a while... and yes you're correct... it updates your radio, boot and rom...
http://www.myhangoutonline.com/htc-phones/htc-dream/roms/official/70-signed-kila-ota-148830-de6a94ca
this is the official t-mobile (US) cupcake (1.5) rom.... it will put your phone back to stock.
Click to expand...
Click to collapse
that link is not the same to what was just released this updat is only 833KB this is CRC1 offical 1.5 cupcake is CRB43

I'm really interested in the new radio. Anyone want to try and pull it from the zip file and fastboot it onto their phone and report back?

Can someone with the new update boot into recovery and tell us what the new radio is and whether or not you have a new spl version? Im surprised T-Mobile/Google hasn't stated what this really does. Doubt its JUST security fixes.

Related

NeedHelp:screwed up my g1,cant finished boot

It just loop on the green sparkling robot.
What I did is just modifying TC5-RC8 update.zip with test key, and do the update as normal.
I've been using RC8 for couple days since it's been released and no problem.
After this problem occurd, I've tried to re-flash it to the origianl TC5-RC8 update.zip which released by JesusFreke. BUT the problem still.
My guess is flash recovery.img when booting due to some hardware issues.
Need Your Help.
I finally do a update to and old version of my modified TC5-RC8, the phone booted.
The bad news is I do recovered it to factory mode, so I need to login to Google account again.
Unfortunately, when I finished the Login, and ready to press "Finish setup" and move(dont know how to express in English that movement, the screen is open, what I do is close it so it covers the keyboard) the the screen, and exception occured: "com.google.process.gapps has stopped..."
Don't know whether google will check its own sign or not, im using the test key.
And, I can do adb shell, this is the ps:
# ps
ps
USER PID PPID VSIZE RSS WCHAN PC NAME
root 1 0 264 176 c00a5cd0 0000c36c S /init
root 2 0 0 0 c005bd28 00000000 S kthreadd
root 3 2 0 0 c004c12c 00000000 S ksoftirqd/0
root 4 2 0 0 c006e978 00000000 S watchdog/0
root 5 2 0 0 c0058b40 00000000 S events/0
root 6 2 0 0 c0058b40 00000000 S khelper
root 7 2 0 0 c0182558 00000000 S suspend/0
root 8 2 0 0 c0058b40 00000000 S kblockd/0
root 9 2 0 0 c0058b40 00000000 S kmmcd
root 10 2 0 0 c0058b40 00000000 S btaddconn
root 11 2 0 0 c0058b40 00000000 S btdelconn
root 12 2 0 0 c0058b40 00000000 S qmi
root 13 2 0 0 c003263c 00000000 D rpcrouter
root 14 2 0 0 c0058b40 00000000 S detection/0
root 15 2 0 0 c0032fb4 00000000 S krpcserversd
root 16 2 0 0 c007a964 00000000 S pdflush
root 17 2 0 0 c007a964 00000000 S pdflush
root 18 2 0 0 c007e8b4 00000000 S kswapd0
root 19 2 0 0 c0058b40 00000000 S aio/0
root 20 2 0 0 c0032fb4 00000000 S kadspd
root 21 2 0 0 c0058b40 00000000 S panel_on/0
root 22 2 0 0 c0151ff8 00000000 S mtdblockd
root 23 2 0 0 c0157d84 00000000 S USB mass_storag
root 24 2 0 0 c0058b40 00000000 S synaptics_wq
root 25 2 0 0 c020dfc0 00000000 S krfcommd
system 26 1 796 276 c0189f10 afe0b74c S /system/bin/servicemanager
root 27 1 1828 336 ffffffff afe0b50c S /system/bin/mountd
root 28 1 652 252 c0196e68 afe0c0bc S /system/bin/debuggerd
radio 29 1 7720 936 ffffffff afe0bdbc S /system/bin/rild
media 31 1 17304 3420 ffffffff afe0b74c S /system/bin/mediaserver
bluetooth 33 1 1164 716 c00a5cd0 afe0c69c S /system/bin/dbus-daemon
root 34 1 788 292 c01fb090 afe0b50c S /system/bin/installd
compass 36 1 1304 572 c0169014 afe0b74c S /system/bin/akmd
root 37 1 3324 148 ffffffff 0000e664 S /sbin/adbd
root 43 2 0 0 c01751d0 00000000 S mmcqd
root 359 1 66044 19428 c00a62ec afe0b874 S zygote
system 360 359 183032 25080 ffffffff afe0b74c S system_server
radio 392 359 106732 18708 ffffffff afe0c824 S com.android.phone
app_11 409 359 88092 12244 ffffffff afe0c824 S com.android.mms
app_4 430 359 87436 10576 ffffffff afe0c824 S com.google.android.talk
app_12 441 359 87988 11940 ffffffff afe0c824 S android.process.media
app_14 444 359 90068 11992 ffffffff afe0c824 S android.process.acore
app_18 463 359 93428 14788 ffffffff afe0c824 S com.android.calendar
app_22 475 359 87120 11456 ffffffff afe0c824 S com.android.alarmclock
app_16 487 359 87472 11300 ffffffff afe0c824 S com.google.android.gm
app_8 582 359 106360 15604 ffffffff afe0c824 S com.android.setupwizard
app_0 608 359 94940 15916 ffffffff afe0c824 S com.google.process.gapps
root 645 2 0 0 c0032dc8 00000000 D audmgr_rpc
root 687 37 724 320 c0049a2c afe0c4cc S /system/bin/sh
root 689 687 868 328 00000000 afe0b50c R ps
#
Click to expand...
Click to collapse
I do it again, said "The setup wizzard stopped unexpectly"

[Q] [Verified Android Trojan] Unknown app sends hidden sms to +493394991625

Hi,
After downloading dozens of apps from appbrain last night
I've noticed an unknown app sending a sms to +493394991625
30.7.2011 1 : 25 : 59 493394991625 1,00Stk. 1,00Stk. 0,20 EUR
from my htc wildfire S A510e in my service providers logs last night.
and looks like it's hiding and wiping traces by disabling storing sent sms messages and other notification settings.
Furthermore I noticed disabled Lookout security app update setting,
I've installed a bunch of popular malware detectors, let's see who wins...
Code:
$ ps
USER PID PPID VSIZE RSS WCHAN PC NAME
root 1 0 388 240 ffffffff 00000000 S /init
root 2 0 0 0 ffffffff 00000000 S kthreadd
root 3 2 0 0 ffffffff 00000000 S ksoftirqd/0
root 4 2 0 0 ffffffff 00000000 S watchdog/0
root 5 2 0 0 ffffffff 00000000 S events/0
root 6 2 0 0 ffffffff 00000000 S khelper
root 7 2 0 0 ffffffff 00000000 S async/mgr
root 8 2 0 0 ffffffff 00000000 S suspend
root 9 2 0 0 ffffffff 00000000 S sync_supers
root 10 2 0 0 ffffffff 00000000 S bdi-default
root 11 2 0 0 ffffffff 00000000 S kblockd/0
root 12 2 0 0 ffffffff 00000000 S kmmcd
root 13 2 0 0 ffffffff 00000000 S kondemand/0
root 14 2 0 0 ffffffff 00000000 S smd_tty
root 15 2 0 0 ffffffff 00000000 D rpcrouter
root 16 2 0 0 ffffffff 00000000 S krpcserversd
root 17 2 0 0 ffffffff 00000000 S qmi
root 18 2 0 0 ffffffff 00000000 S kadspd
root 19 2 0 0 ffffffff 00000000 S microp_work_q
root 20 2 0 0 ffffffff 00000000 S detect/0
root 21 2 0 0 ffffffff 00000000 S button/0
root 22 2 0 0 ffffffff 00000000 S detect/0
root 23 2 0 0 ffffffff 00000000 S button/0
root 24 2 0 0 ffffffff 00000000 S HS_GPIO_DETECT/
root 25 2 0 0 ffffffff 00000000 S HS_GPIO_BUTTON/
root 26 2 0 0 ffffffff 00000000 S khungtaskd
root 27 2 0 0 ffffffff 00000000 S kswapd0
root 28 2 0 0 ffffffff 00000000 S aio/0
root 29 2 0 0 ffffffff 00000000 S crypto/0
root 40 2 0 0 ffffffff 00000000 S panel_on/0
root 41 2 0 0 ffffffff 00000000 S diag_wq
root 42 2 0 0 ffffffff 00000000 S msm_serial_hs
root 43 2 0 0 ffffffff 00000000 S msm_serial_hs
root 44 2 0 0 ffffffff 00000000 S msm_serial_hs
root 45 2 0 0 ffffffff 00000000 S mtdblockd
root 52 2 0 0 ffffffff 00000000 S msm_hsusb
root 53 2 0 0 ffffffff 00000000 S usb_mass_storag
root 54 2 0 0 ffffffff 00000000 S gs_tty
root 55 2 0 0 ffffffff 00000000 S cypress_touch
root 56 2 0 0 ffffffff 00000000 S synaptics_wq
root 57 2 0 0 ffffffff 00000000 S ki_queue
root 58 2 0 0 ffffffff 00000000 S cm3628_wq
root 59 2 0 0 ffffffff 00000000 S kstriped
root 60 2 0 0 ffffffff 00000000 S binder
root 61 2 0 0 ffffffff 00000000 S l2cap
root 62 2 0 0 ffffffff 00000000 S krfcommd
root 63 1 300 140 ffffffff 00000000 S /sbin/ueventd
system 65 1 856 160 ffffffff 00000000 S /system/bin/servicemanager
root 66 2 0 0 ffffffff 00000000 S sd-qd
root 67 1 3940 348 ffffffff 00000000 S /system/bin/vold
root 68 1 3952 288 ffffffff 00000000 S /system/bin/netd
root 69 1 3260 216 ffffffff 00000000 S /system/bin/debuggerd
radio 70 1 14240 560 ffffffff 00000000 S /system/bin/rild
root 71 1 98644 22776 ffffffff 00000000 S zygote
media 72 1 44440 3164 ffffffff 00000000 S /system/bin/mediaserver
root 73 1 12344 780 ffffffff 00000000 S /system/bin/htcfs
bluetooth 74 1 1312 168 ffffffff 00000000 S /system/bin/dbus-daemon
root 75 1 880 268 ffffffff 00000000 S /system/bin/installd
keystore 76 1 1824 184 ffffffff 00000000 S /system/bin/keystore
root 77 1 840 148 ffffffff 00000000 S /system/bin/ipd
compass 79 1 3180 300 ffffffff 00000000 S /system/bin/akmd
root 81 1 1100 288 ffffffff 00000000 S /system/bin/htc_ebdlogd
root 87 81 2152 1664 ffffffff 00000000 S /system/bin/logcat2
root 116 2 0 0 ffffffff 00000000 D snd_rpc
system 118 71 246828 38828 ffffffff 00000000 S system_server
root 140 2 0 0 ffffffff 00000000 D audmgr_rpc
system 187 71 143140 26508 ffffffff 00000000 S com.android.systemui
app_11 209 71 131368 20700 ffffffff 00000000 S com.htc.android.htcime
radio 216 71 155760 26148 ffffffff 00000000 S com.android.phone
app_21 221 71 248620 51508 ffffffff 00000000 S android.process.acore
app_17 245 71 187440 24360 ffffffff 00000000 S com.google.process.gapps
root 431 2 0 0 ffffffff 00000000 S flush-0:17
root 552 2 0 0 ffffffff 00000000 S flush-179:0
root 803 2 0 0 ffffffff 00000000 D audmgr_rpc
app_126 981 1 5368 376 ffffffff 00000000 S ./smrsd
app_126 983 981 2140 1664 ffffffff 00000000 S /system/bin/logcat
root 1487 2 0 0 ffffffff 00000000 S flush-31:0
app_72 2482 71 113872 15820 ffffffff 00000000 S org.sipdroid.sipua
app_6 2534 71 193320 31532 ffffffff 00000000 S com.android.vending
app_101 2586 1 944 472 ffffffff 00000000 S logcat
app_86 3159 71 169616 20608 ffffffff 00000000 S com.lookout
app_101 3167 71 128972 18376 ffffffff 00000000 S com.antivirus
app_101 3203 3167 944 468 ffffffff 00000000 S logcat
app_86 3341 3159 1888 1412 ffffffff 00000000 S logcat
app_7 3404 71 147256 17180 ffffffff 00000000 S android.process.media
nobody 3635 71 146292 33480 ffffffff 00000000 S com.htc.launcher
app_21 3738 71 129612 20424 ffffffff 00000000 S com.android.htccontacts
app_52 3861 71 126588 16900 ffffffff 00000000 S com.android.mms
app_40 4468 71 127588 16696 ffffffff 00000000 S com.htc.cspeoplesync
app_121 4617 71 108112 14208 ffffffff 00000000 S com.zrgiu.antivirus
app_47 4631 71 107632 13392 ffffffff 00000000 S com.htc.wotaproviders
system 4784 71 107632 12704 ffffffff 00000000 S com.android.server.vpn:remote
app_122 4833 71 108588 14044 ffffffff 00000000 S com.netqin.antivirussc
app_130 4846 71 111336 15288 ffffffff 00000000 S com.trustmobi.MobiShield
app_12 4859 71 117108 22404 ffffffff 00000000 S com.htc.bgp
app_124 5059 71 111520 15684 ffffffff 00000000 S com.zoner.android.antivirus
app_27 5268 71 119504 15020 ffffffff 00000000 S com.google.android.googlequicksearchbox
app_58 5277 71 133176 20560 ffffffff 00000000 S com.htc.lmw
root 5317 2 0 0 ffffffff 00000000 S flush-7:8
root 5319 2 0 0 ffffffff 00000000 S loop8
root 5320 2 0 0 ffffffff 00000000 S kdmflush
root 5321 2 0 0 ffffffff 00000000 S kcryptd_io
root 5322 2 0 0 ffffffff 00000000 S kcryptd
root 5345 2 0 0 ffffffff 00000000 S flush-7:9
root 5348 2 0 0 ffffffff 00000000 S loop9
root 5349 2 0 0 ffffffff 00000000 S kdmflush
root 5350 2 0 0 ffffffff 00000000 S kcryptd_io
root 5351 2 0 0 ffffffff 00000000 S kcryptd
root 5373 2 0 0 ffffffff 00000000 S flush-7:10
root 5376 2 0 0 ffffffff 00000000 S loop10
root 5377 2 0 0 ffffffff 00000000 S kdmflush
root 5378 2 0 0 ffffffff 00000000 S kcryptd_io
root 5379 2 0 0 ffffffff 00000000 S kcryptd
root 5397 2 0 0 ffffffff 00000000 S flush-7:11
root 5401 2 0 0 ffffffff 00000000 S loop11
root 5402 2 0 0 ffffffff 00000000 S kdmflush
root 5403 2 0 0 ffffffff 00000000 S kcryptd_io
root 5404 2 0 0 ffffffff 00000000 S kcryptd
root 5421 2 0 0 ffffffff 00000000 S flush-7:12
root 5424 2 0 0 ffffffff 00000000 S loop12
root 5425 2 0 0 ffffffff 00000000 S kdmflush
root 5426 2 0 0 ffffffff 00000000 S kcryptd_io
root 5427 2 0 0 ffffffff 00000000 S kcryptd
root 5445 2 0 0 ffffffff 00000000 S flush-7:13
root 5448 2 0 0 ffffffff 00000000 S loop13
root 5449 2 0 0 ffffffff 00000000 S kdmflush
root 5450 2 0 0 ffffffff 00000000 S kcryptd_io
root 5451 2 0 0 ffffffff 00000000 S kcryptd
root 5466 2 0 0 ffffffff 00000000 S flush-7:14
root 5472 2 0 0 ffffffff 00000000 S loop14
root 5473 2 0 0 ffffffff 00000000 S kdmflush
root 5474 2 0 0 ffffffff 00000000 S kcryptd_io
root 5475 2 0 0 ffffffff 00000000 S kcryptd
app_63 5483 71 118580 20480 ffffffff 00000000 S com.google.android.gm
root 5501 2 0 0 ffffffff 00000000 S flush-7:15
root 5508 2 0 0 ffffffff 00000000 S loop15
root 5509 2 0 0 ffffffff 00000000 S kdmflush
root 5510 2 0 0 ffffffff 00000000 S kcryptd_io
root 5511 2 0 0 ffffffff 00000000 S kcryptd
root 5527 2 0 0 ffffffff 00000000 S flush-7:16
root 5539 2 0 0 ffffffff 00000000 S loop16
root 5540 2 0 0 ffffffff 00000000 S kdmflush
root 5541 2 0 0 ffffffff 00000000 S kcryptd_io
root 5542 2 0 0 ffffffff 00000000 S kcryptd
root 5550 2 0 0 ffffffff 00000000 S flush-7:17
root 5562 2 0 0 ffffffff 00000000 S loop17
root 5563 2 0 0 ffffffff 00000000 S kdmflush
root 5564 2 0 0 ffffffff 00000000 S kcryptd_io
root 5565 2 0 0 ffffffff 00000000 S kcryptd
app_56 5579 71 174784 28264 ffffffff 00000000 S com.htc.cs
root 5587 2 0 0 ffffffff 00000000 S flush-7:18
root 5603 2 0 0 ffffffff 00000000 S loop18
root 5604 2 0 0 ffffffff 00000000 S kdmflush
root 5605 2 0 0 ffffffff 00000000 S kcryptd_io
root 5606 2 0 0 ffffffff 00000000 S kcryptd
root 5650 2 0 0 ffffffff 00000000 S flush-7:19
root 5656 2 0 0 ffffffff 00000000 S loop19
root 5657 2 0 0 ffffffff 00000000 S kdmflush
root 5658 2 0 0 ffffffff 00000000 S kcryptd_io
root 5659 2 0 0 ffffffff 00000000 S kcryptd
root 5708 2 0 0 ffffffff 00000000 S flush-7:20
root 5712 2 0 0 ffffffff 00000000 S loop20
root 5713 2 0 0 ffffffff 00000000 S kdmflush
root 5714 2 0 0 ffffffff 00000000 S kcryptd_io
root 5715 2 0 0 ffffffff 00000000 S kcryptd
app_59 5856 71 109988 16604 ffffffff 00000000 S com.htc.recommend
root 5916 2 0 0 ffffffff 00000000 S flush-7:21
root 5919 2 0 0 ffffffff 00000000 S loop21
root 5920 2 0 0 ffffffff 00000000 S kdmflush
root 5921 2 0 0 ffffffff 00000000 S kcryptd_io
root 5922 2 0 0 ffffffff 00000000 S kcryptd
app_16 5993 71 107696 14992 ffffffff 00000000 S com.htc.htchubsyncprovider
app_20 6014 71 107808 16072 ffffffff 00000000 S com.htc.messagecs
app_28 6021 71 107924 16172 ffffffff 00000000 S com.htc.musicmarkeditems
app_128 6026 71 109936 15720 ffffffff 00000000 S com.opensystem.terminator
app_11 6044 71 136420 17812 ffffffff 00000000 S com.htc.android.htcime:provider
app_120 6091 71 109956 16904 ffffffff 00000000 S com.drweb:monitor
app_67 6117 71 122120 19548 ffffffff 00000000 S com.google.android.apps.maps:NetworkLocationService
app_12 6137 71 113356 18940 ffffffff 00000000 S com.htc.bg
app_138 6145 71 114012 20244 ffffffff 00000000 S com.mymobileprotection15
app_79 6164 71 109788 15888 ffffffff afd0c64c S br.com.bott.droidsshd
app_76 6177 71 121940 21804 ffffffff 00000000 S com.wefi.wefi
system 6235 71 113144 17280 ffffffff 00000000 S com.android.settings
app_79 6251 6465 1212 496 c00f98cc 00063324 S /data/data/br.com.bott.droidsshd/files/bin/dropbear
app_79 6252 6251 728 316 c0083920 afd0c4dc S -sh
app_79 6259 6252 876 300 00000000 afd0b58c R ps
app_79 6465 1 1212 180 c00f98cc 00063324 S /data/data/br.com.bott.droidsshd/files/bin/dropbear
root 9575 2 0 0 ffffffff 00000000 S flush-7:0
root 9581 2 0 0 ffffffff 00000000 S loop0
root 9582 2 0 0 ffffffff 00000000 S kdmflush
root 9583 2 0 0 ffffffff 00000000 S kcryptd_io
root 9584 2 0 0 ffffffff 00000000 S kcryptd
root 10019 2 0 0 ffffffff 00000000 S flush-7:1
root 10025 2 0 0 ffffffff 00000000 S loop1
root 10026 2 0 0 ffffffff 00000000 S kdmflush
root 10027 2 0 0 ffffffff 00000000 S kcryptd_io
root 10028 2 0 0 ffffffff 00000000 S kcryptd
root 10179 2 0 0 ffffffff 00000000 S flush-7:2
root 10185 2 0 0 ffffffff 00000000 S loop2
root 10186 2 0 0 ffffffff 00000000 S kdmflush
root 10187 2 0 0 ffffffff 00000000 S kcryptd_io
root 10188 2 0 0 ffffffff 00000000 S kcryptd
root 10293 2 0 0 ffffffff 00000000 S flush-7:3
root 10299 2 0 0 ffffffff 00000000 S loop3
root 10300 2 0 0 ffffffff 00000000 S kdmflush
root 10301 2 0 0 ffffffff 00000000 S kcryptd_io
root 10302 2 0 0 ffffffff 00000000 S kcryptd
root 10860 2 0 0 ffffffff 00000000 S flush-7:4
root 10867 2 0 0 ffffffff 00000000 S loop4
root 10868 2 0 0 ffffffff 00000000 S kdmflush
root 10869 2 0 0 ffffffff 00000000 S kcryptd_io
root 10870 2 0 0 ffffffff 00000000 S kcryptd
root 11330 2 0 0 ffffffff 00000000 S flush-7:5
root 11332 2 0 0 ffffffff 00000000 S loop5
root 11333 2 0 0 ffffffff 00000000 S kdmflush
root 11334 2 0 0 ffffffff 00000000 S kcryptd_io
root 11335 2 0 0 ffffffff 00000000 S kcryptd
root 11353 2 0 0 ffffffff 00000000 S flush-7:6
root 11360 2 0 0 ffffffff 00000000 S loop6
root 11361 2 0 0 ffffffff 00000000 S kdmflush
root 11362 2 0 0 ffffffff 00000000 S kcryptd_io
root 11363 2 0 0 ffffffff 00000000 S kcryptd
root 11376 2 0 0 ffffffff 00000000 S flush-7:7
root 11378 2 0 0 ffffffff 00000000 S loop7
root 11379 2 0 0 ffffffff 00000000 S kdmflush
root 11380 2 0 0 ffffffff 00000000 S kcryptd_io
root 11381 2 0 0 ffffffff 00000000 S kcryptd
app_56 13589 71 112512 17840 ffffffff 00000000 S com.htc.cs:remote
app_78 21827 71 117468 16508 ffffffff 00000000 S com.skype.raider
app_78 21917 21827 14616 10268 ffffffff 00000000 S /data/data/com.skype.raider/files/skypekit
root 22015 2 0 0 ffffffff 00000000 S iscan_sysioc
root 22016 2 0 0 ffffffff 00000000 S dhcp_sysioc
root 22017 2 0 0 ffffffff 00000000 S ap_sysioc
root 22018 2 0 0 ffffffff 00000000 S dhd_watchdog
root 22019 2 0 0 ffffffff 00000000 S dhd_dpc
root 22020 2 0 0 ffffffff 00000000 S dhd_sysioc
log 22021 1 708 152 ffffffff 00000000 S /system/bin/logwrapper
wifi 22023 22021 2480 744 ffffffff 00000000 S /system/bin/wpa_supplicant
app_101 24919 1 944 468 ffffffff 00000000 S logcat
app_101 26402 1 944 468 ffffffff 00000000 S logcat
dhcp 29044 1 900 212 ffffffff 00000000 S /system/bin/dhcpcd
app_101 29471 1 944 472 ffffffff 00000000 S logcat
app_123 29948 1 952 444 ffffffff 00000000 S /data/data/jp.ktinc.fastscan/fseng
app_125 31043 71 173488 42988 ffffffff 00000000 S com.morrison.applocklite
app_125 31056 31043 944 472 ffffffff 00000000 S logcat
app_125 31083 31043 944 468 ffffffff 00000000 S logcat
app_126 32496 71 146544 23948 ffffffff 00000000 S com.symantec.mobilesecurity
app_126 32763 32496 1588 1112 ffffffff 00000000 S logcat
$
Code:
Aug 1 15:54:12 freshclam[6026]: main.cvd is up to date (version: 53, sigs: 846214, f-level: 53, builder: sven)
Aug 1 15:54:12 freshclam[6026]: daily.cld is up to date (version: 13385, sigs: 166221, f-level: 60, builder: ccordes)
Aug 1 15:54:12 freshclam[6026]: bytecode.cld is up to date (version: 144, sigs: 41, f-level: 60, builder: edwin)
Code:
$ clamscan -r --bell --detect-pua=yes --heuristic-scan-precedence=yes sdcard16GB-virus
sdcard16GB-virus/google_*****.vcf: OK
sdcard16GB-virus/setup_3.0.5551.exe: OK
sdcard16GB-virus/pcsc_pcsc_00001.vcf: OK
sdcard16GB-virus/Android/data/com.google.android.apps.maps/cache/cache_its.m: OK
sdcard16GB-virus/Android/data/com.google.android.apps.maps/cache/cache_vts_tran_GMM.m: OK
sdcard16GB-virus/Android/data/com.google.android.apps.maps/cache/cache_its_ter.m: OK
sdcard16GB-virus/Android/data/com.google.android.apps.maps/cache/cache_vts_GMM.m: OK
sdcard16GB-virus/Android/data/com.google.android.apps.maps/cache/cache_r.m: OK
sdcard16GB-virus/Android/data/com.google.android.apps.maps/cache/cache_vts_labl_GMM.m: OK
sdcard16GB-virus/Android/data/.nomedia: Empty file
sdcard16GB-virus/svox/en-GB_ta.bin: OK
sdcard16GB-virus/svox/en-US_lh0_sg.bin: OK
sdcard16GB-virus/svox/fr-FR_ta.bin: OK
sdcard16GB-virus/svox/es-ES_zl0_sg.bin: OK
sdcard16GB-virus/svox/fr-FR_nk0_sg.bin: OK
sdcard16GB-virus/svox/it-IT_ta.bin: OK
sdcard16GB-virus/svox/es-ES_ta.bin: OK
sdcard16GB-virus/svox/en-GB_kh0_sg.bin: OK
sdcard16GB-virus/svox/it-IT_cm0_sg.bin: OK
sdcard16GB-virus/svox/en-US_ta.bin: OK
sdcard16GB-virus/svox/de-DE_gl0_sg.bin: OK
sdcard16GB-virus/svox/de-DE_ta.bin: OK
sdcard16GB-virus/download/DroidSSHdv06.apk: OK
sdcard16GB-virus/download/Apps_Installer_0.2.1.apk: OK
sdcard16GB-virus/download/org.mozilla.firefox.apk: OK
sdcard16GB-virus/download/com.wefi.wefi.apk: OK
sdcard16GB-virus/download/com.faststring.fastappinstaller.apk: OK
sdcard16GB-virus/download/de.schildbach.oeffi.apk: OK
sdcard16GB-virus/download/org.mozilla.firefox_beta.apk: OK
sdcard16GB-virus/google_******_00002.vcf: OK
sdcard16GB-virus/Quick Start Guide/20110413_Marvel_HTC_Italian_QSG.pdf: OK
sdcard16GB-virus/Quick Start Guide/20110414_Marvel_HTC_German_QSG.pdf.pdf: OK
sdcard16GB-virus/Quick Start Guide/20110413_Marvel_HTC_French_QSG.pdf: OK
sdcard16GB-virus/*********/Sipdroid-2.3.apk: OK
sdcard16GB-virus/sim_SIM_00001.vcf: OK
sdcard16GB-virus/sim_SIM_00002.vcf: Empty file
sdcard16GB-virus/pcsc_pcsc_00002.vcf: OK
sdcard16GB-virus/Safety Guide/20110406_Marvel_HTC_Italian_Safety-regulatory_guide.pdf: OK
sdcard16GB-virus/Safety Guide/20110325_Marvel_HTC_French_Safety-regulatory_guide.pdf: OK
sdcard16GB-virus/Safety Guide/20110324_Marvel_HTC_German_Safety-regulatory_guide.pdf: OK
sdcard16GB-virus/miren_browser/.cache/CacheList: OK
sdcard16GB-virus/miren_browser/.cache/databases/ApplicationCache.db: OK
sdcard16GB-virus/miren_browser/.cache/geolocation/CachedGeoposition.db: OK
sdcard16GB-virus/miren_browser/.cache/geolocation/GeolocationPermissions.db: Empty file
sdcard16GB-virus/miren_browser/imagecaches/rssIcon/3d87920807b05c46ee34b296fc331cdf.png: OK
sdcard16GB-virus/miren_browser/imagecaches/rssIcon/8a1f63f02b6f44fb91bd197dd5dfdc9e.png: OK
sdcard16GB-virus/miren_browser/imagecaches/rssIcon/a7e4cbd44379085999164a851497a8fa.png: OK
sdcard16GB-virus/miren_browser/imagecaches/rssIcon/39fbd541589b2ec6a36d872e02514412.png: OK
sdcard16GB-virus/miren_browser/imagecaches/rssIcon/3f7f3c517a020bf4836368e24830632f.png: OK
sdcard16GB-virus/miren_browser/.persist/webview_pictures/webview_0: OK
sdcard16GB-virus/DCIM/sample01.jpg: OK
sdcard16GB-virus/DCIM/sample07.jpg: OK
sdcard16GB-virus/DCIM/sample06.jpg: OK
sdcard16GB-virus/DCIM/sample09.jpg: OK
sdcard16GB-virus/DCIM/sample03.jpg: OK
sdcard16GB-virus/DCIM/.thumbnails/4-712AC800-2155097-480.jpg: OK
sdcard16GB-virus/DCIM/.thumbnails/2-9683FC85-3126664-480.jpg: OK
sdcard16GB-virus/DCIM/.thumbnails/2-3C600F01-2699282-480.jpg: OK
sdcard16GB-virus/DCIM/.thumbnails/2-92F65F82-3806217-480.jpg: OK
sdcard16GB-virus/DCIM/.thumbnails/4-4D34F029-7255294-480.jpg: OK
sdcard16GB-virus/DCIM/.thumbnails/2-C1F43D8A-4013455-480.jpg: OK
sdcard16GB-virus/DCIM/.thumbnails/2-58111224-2901259-480.jpg: OK
sdcard16GB-virus/DCIM/.thumbnails/4-9683FC85-3126664-480.jpg: OK
sdcard16GB-virus/DCIM/.thumbnails/4-58111224-2901259-480.jpg: OK
sdcard16GB-virus/DCIM/.thumbnails/2-4D34F029-7255294-480.jpg: OK
sdcard16GB-virus/DCIM/.thumbnails/2-712AC800-2155097-480.jpg: OK
sdcard16GB-virus/DCIM/.thumbnails/2-D37EF1ED-4197534-480.jpg: OK
sdcard16GB-virus/DCIM/.thumbnails/4-D37EF1ED-4197534-480.jpg: OK
sdcard16GB-virus/DCIM/.thumbnails/4-92F65F82-3806217-480.jpg: OK
sdcard16GB-virus/DCIM/.thumbnails/4-C1F43D8A-4013455-480.jpg: OK
sdcard16GB-virus/DCIM/.thumbnails/2-13D94E9B-1919498-480.jpg: OK
sdcard16GB-virus/DCIM/sample05.jpg: OK
sdcard16GB-virus/DCIM/sample04.jpg: OK
sdcard16GB-virus/DCIM/sample02.jpg: OK
sdcard16GB-virus/DCIM/sample08.jpg: OK
sdcard16GB-virus/background.log: OK
sdcard16GB-virus/User Manual/20110413_Marvel_HTC_German_UM.pdf: OK
----------- SCAN SUMMARY -----------
Known viruses: 1012338
Engine version: 0.97
Scanned directories: 38
Scanned files: 74
Infected files: 0
Data scanned: 153.86 MB
Data read: 227.97 MB (ratio 0.67:1)
Time: 79.317 sec (1 m 19 s)
What to do now?
If that app really is a virus then it's very nasty :O
I recon you hard reset your whole phone. Backup your contacts, maybe sms, but not your apps of course, and simply reset your device =/.
This is an example of the ineffectiveness of todays antiviruses for android. They can detect, generally too late, but can't fix anything... Not much of an proper antivirus around for the time being, it's just fancy apps that don't do much and reassure people...
-Deleted Post-
my android trojan desaster recovery continued
crakeron said:
I recon you hard reset your whole phone. Backup your contacts, maybe sms, but not your apps of course, and simply reset your device
Click to expand...
Click to collapse
Not possible, the setup wizard after factory reset + reboot on this marvel HTC Wildfire S requires google + htc sense account access to have the google and htc apps configured and working correctly (there's a warning in the manual not to disable that),
and this will auto-restore all settings and apps to the desaster state far before you get the chance to disable the auto-restore and sync in settings, surely including the trojan,
You notice that behaviour first if you changed your wlan AP key for desaster recovery and a few minutes after setup wizard run your old wlan key is silently restored despite explicitly disabled sync + auto restore settings:
Code:
01.08.11 01:49:00 WLAN-Gerät Anmeldung gescheitert (2,4 GHz): ungültiger WLAN-Schlüssel. Name: htc.
01.08.11 01:48:48 WLAN-Gerät Anmeldung gescheitert (2,4 GHz): ungültiger WLAN-Schlüssel. Name: htc.
01.08.11 01:48:45 WLAN-Gerät angemeldet, WLAN wird mit voller Leistung reaktiviert (2,4 GHz).
01.08.11 01:38:52 Kein WLAN-Gerät mehr angemeldet, Stromverbrauch wird reduziert (2,4 GHz).
01.08.11 01:36:39 WLAN-Gerät Anmeldung gescheitert (2,4 GHz): ungültiger WLAN-Schlüssel. Name: htc.
01.08.11 01:36:28 WLAN-Gerät hat sich abgemeldet (2,4 GHz). Name: htc.
01.08.11 01:27:42 WLAN-Gerät angemeldet (2,4 GHz). Name: htc, Geschwindigkeit 54 Mbit/s.
01.08.11 01:27:42 WLAN-Gerät angemeldet, WLAN wird mit voller Leistung reaktiviert (2,4 GHz).
"ungültiger WLAN-Schlüssel" means invalid EAP-PSK, sorry avm.de is uncapable of english language.
The attackers possibly compromised my AVM fritzbox router, too, they tried to download a malware firmware image to it over the marvel (web management showed warning about failed firmware update yesterday morning) or the newly setup AVM VPN access is insecure , had to factory reset and reinstall the firmware for another desaster recovery,
but I don't know if they managed to have the device memory still compromised using one of the methods known by ip-phone-forum.de to debrand the product, etc.
And well, it's very hard to get a verified clean genuine firmware image file over a possibly compromised and redirecting router from a manufacturer not supporting https certificate auth or crypto signed software on his servers, had to verify sha1sums with another guy over phone before download the image to the box..
Another trojan verification evidence is that the hackers incoming phone/sms account +493394991625 where the sms was sent is no longer reachable or my provider has got wrong data in costs logs.
Code:
01.08.11 14:49:55 Internettelefonie mit [email protected] über sip.qsc.de war nicht erfolgreich. Ursache: Not Found (404)
01.08.11 14:49:41 Internettelefonie mit [email protected] über sip.12voip.com war nicht erfolgreich. Ursache: User not found (404)
Theres neither a way to remove marvel configuration data from your google account or htc sync account, this is absolutely not acceptable,
The only desaster recovery option this marvel accepts is to enable accept of official market apps only, so some apps from appbrain.com were hopefully left out from the auto-restore, is this rechecked?
OK, lets do a remote virus scan of the marvel wildfire S over WLAN (needs e.g. sshdroid app with sftp support running as ROOT ):
Code:
[email protected]:~/htc$ sshfs htc:/ /home/xxxxxxx/htc/sshfs -p xx -o ro,reconnect
[email protected]'s password:
[email protected]:~/htc$
[email protected]:~/htc$ #clamscan -r --bell --no-summary --infected --detect-pua=yes --heuristic-scan-precedence=yes sshfs/app-cache
[email protected]:~/htc$ ls -l sshfs
insgesamt 208
drwxr-xr-x 1 root root 0 1. Aug 04:03 acct
drwxr-xr-x 1 root xxxxxxx 60 1. Aug 04:03 app-cache
-rw-r--r-- 1 root root 460 1. Jan 1970 bootcomplete.rc
drwxrwx--- 1 xxxxxxx 2001 4096 1. Aug 21:11 cache
dr-x------ 1 root root 0 1. Aug 04:03 config
-rw-r--r-- 1 root root 1398 1. Jan 1970 cwkeys
drwxrwx--x 1 xxxxxxx xxxxxxx 4096 1. Aug 01:10 data
-rw-r--r-- 1 root root 118 1. Jan 1970 default.prop
drwxr-xr-x 1 root root 1600 1. Aug 18:47 dev
drwx------ 1 root root 4096 1. Aug 15:25 devlog
lrwxrwxrwx 1 root root 11 1. Aug 04:03 etc -> /system/etc
-rwxr-x--- 1 root root 107244 1. Jan 1970 init
-rwxr-x--- 1 root root 1677 1. Jan 1970 init.goldfish.rc
-rwxr-x--- 1 root root 5396 1. Jan 1970 init.marvel.rc
-rwxr-x--- 1 root root 20294 1. Jan 1970 init.rc
-rw-r--r-- 1 root root 11336 1. Jan 1970 logo.rle
drwxrwxr-x 1 root xxxxxxx 0 1. Aug 04:03 mnt
dr-xr-xr-x 1 root root 0 1. Jan 1970 proc
drwx------ 1 root root 0 16. Apr 19:08 root
drwxr-x--- 1 root root 0 1. Jan 1970 sbin
lrwxrwxrwx 1 root root 11 1. Aug 04:03 sdcard -> /mnt/sdcard
drwxr-xr-x 1 root root 0 1. Aug 04:03 sys
drwxr-xr-x 1 root root 4096 16. Apr 20:31 system
-rw-r--r-- 1 root root 0 1. Jan 1970 ueventd.goldfish.rc
-rw-r--r-- 1 root root 4311 1. Jan 1970 ueventd.rc
lrwxrwxrwx 1 root root 14 1. Aug 04:03 vendor -> /system/vendor
[email protected]:~/htc$
[email protected]:~/htc$ clamscan -r --bell --no-summary --infected --detect-pua=yes --heuristic-scan-precedence=yes sshfs/app-cache
xxxxx[email protected]:~/htc$ clamscan -r --bell --no-summary --infected --detect-pua=yes --heuristic-scan-precedence=yes sshfs/cache
[email protected]:~/htc$ clamscan -r --bell --no-summary --infected --detect-pua=yes --heuristic-scan-precedence=yes sshfs/data
[email protected]:~/htc$ clamscan -r --bell --no-summary --infected --detect-pua=yes --heuristic-scan-precedence=yes sshfs/mnt
[email protected]:~/htc$ clamscan -r --bell --no-summary --infected --detect-pua=yes --heuristic-scan-precedence=yes sshfs/sdcard
[email protected]:~/htc$ clamscan -r --bell --no-summary --infected --detect-pua=yes --heuristic-scan-precedence=yes sshfs/system
[email protected]:~/htc$
[email protected]:~/htc$ clamscan -r --bell --no-summary --infected --detect-pua=yes sshfs/app-cache
[email protected]:~/htc$ clamscan -r --bell --no-summary --infected --detect-pua=yes sshfs/cache
[email protected]:~/htc$ clamscan -r --bell --no-summary --infected --detect-pua=yes sshfs/data
[email protected]:~/htc$ clamscan -r --bell --no-summary --infected --detect-pua=yes sshfs/mnt
[email protected]:~/htc$ clamscan -r --bell --no-summary --infected --detect-pua=yes sshfs/sdcard
[email protected]:~/htc$ clamscan -r --bell --no-summary --infected --detect-pua=yes sshfs/system
[email protected]:~/htc$ fusermount -u /home/xxxxxxx/htc/sshfs
[email protected]:~/htc$
Maybe many files left out due to permissions and ro mount:
~# chown xxxxxxx.xxxxxx /home/xxxxxxx/htc/sshfs
chown: Zugriff auf „/home/xxxxxxx/htc/sshfs“ nicht möglich: Keine Berechtigung
The 3 installed EICAR Testfiles cannot be missed by clamav.
Some more console apps on the market like iptraf were helpful to track down the trojan if we got x-permissions at all from ssh.
I'm out of options for now, HTC Europe support has taken over the case, will report.
Just wanted to let You know the trojan is still on the device and active:
Today he moved one of the EICAR virus testfiles to the sipdroid app's space (is this possible without root?), Lookout reported it.
If you're rooted, why not do terminal
su
ls -la (virus listed)
chmod +000 the apk
reboot
rm -rf
woprr said:
Just wanted to let You know the trojan is still on the device and active:
Today he moved one of the EICAR virus testfiles to the sipdroid app's space (is this possible without root?), Lookout reported it.
Click to expand...
Click to collapse
Indirect said:
If you're rooted, why not do terminal
su
ls -la (virus listed)
chmod +000 the apk
reboot
rm -rf
Click to expand...
Click to collapse
i think he isnt on root..
Still, it is a valid option.
No. Rooting voids warranty. I've bought this product for fun not for having work with it.
Then I don't know what to tell you dude.
I'm just on my 5th try to factory reset the phone and using my google account without htc sense, hopefully it does not restore the trojan again, if it does, htc support has one week to fix it or the product is sent back to the seller, I should do this anyway, there much better phones.
Does not work, google is restoring the phone now, despite explicitly disabled sync settings.
What a crap!
HTC cannot fix that, problem with google, I'll try without setting up Google account access and using only googlemail par IMAP/SMTP access to get rid of the stored android phone sync data on google account.
woprr said:
I'm just on my 5th try to factory reset the phone and using my google account without htc sense, hopefully it does not restore the trojan again, if it does, htc support has one week to fix it or the product is sent back to the seller, I should do this anyway, there much better phones.
Does not work, google is restoring the phone now, despite explicitly disabled sync settings.
What a crap!
Click to expand...
Click to collapse
Seems your trojan is re-enabling those settings somehow, and a factory reset only wipes /data, therefore, the trojan must be in /system, which would only be possible if the device is rooted, try typing "su" in terminal emulator, or check if / is r/w in root explorer, if either of those are right, then your device is rooted, and you should install a custom recovery and wipe everything except /boot. (Note: make sure to have a ROM (should be .zip) on the root of you sdcard to flash after you wipe everything, otherwise, the device will not boot)
1. I've said I do not want root. rooting voids warranty, I've paid HTC and google to manage the Product for me.
2. I do not have root:
Code:
ssh htc -p 2222
$ su
su: permission denied
$ echo test > /system/test
cannot create /system/test: read-only file system
$
If you were rooted, you would learn to fix things like this and wouldn't need a warranty unless it was accidental damage and even then, you can easily unroot your device and put s-on. It's not impossible. People unroot their devices to send in for warranty all the time.
I've said I've not yet decided to keep the phone. There're better ones for little money more around. In Germany You can revoke contracts with online sellers and return within 2 weeks.
woprr said:
I've said I've not yet decided to keep the phone. There're better ones for little money more around. In Germany You can revoke contracts with online sellers and return within 2 weeks.
Click to expand...
Click to collapse
Just return it and get something else since you don't want to root. You could root though, remove the virus, then unroot, as if you never had it touched...I don't see what use xda is if you're an unrooted user anyway, many things here require it, and i'm not trying to be rude to you.
How can a virus get the privileges on android you assume it's got without root access?
The virus itself could be running an exploit to allow root privledges also, it doesn't need root to be sending texts, only just to install itself into /system. Although it could also be hiding in dalvik
An exploit ^^. Scenario?
Ok, factory reset and not setup google +htc sense account in first run setup wizard should do the trick.
The Phone should be clean now.
I'm setting up google mail with the standard mua app, not the gmail app.
BTW, I've found the settings option to delete the sync data from google servers:
I'ts under Settings->Privacy->Backup and Restore->Uncheck Automatic restore (Msgbox popup warning: "...erase all copies on google servers?") but leave Back up my setting checked, if all is setup then setup google account in phone and sync.
Let's see if this works...
Looks like. But I dont know if the data on google servers got overwritten or merged.
I'will know when re-enabling automatic restore...

Kernel (Android OS)

It seems that a rather large chunk of my battery is being consumed by Kernel (Android OS). This started about two weeks ago. I am running 4.4. Here are the GSAM stats. I can't figure out what is causing this. I have also attached a screen shot of GSAM Battery stats.
GSam Labs - Battery Monitor - Export Data
Kernel (Android OS)
Jul 31, 2014 5:18:43 PM
Usage Details
CPU Usage:1h 12m 45s
App UID:0
Wakelock Detail
Included Packages
Included Processes
init
kthreadd
ksoftirqd/0
migration/0
irq/203-msmdata
sync_supers
bdi-default
khubd
kswapd0
file-storage
w1_bus_master1
cfinteractive
mmcqd/0
ueventd
jbd2/mmcblk0p38
jbd2/mmcblk0p1-
f2fs_gc-259:8
jbd2/mmcblk0p36
jbd2/mmcblk0p23
kjournald
healthd
vold
netd
debuggerd
zygote
thermald
kworker/0:3
flush-179:0
loop0
loop2
MC_Thread
TX_Thread
RX_Thread
loop7
loop8
logwrapper
loop9
loop11
loop12
loop13
loop15
loop16
loop18
loop19
loop20
loop21
kworker/u:0
mpdecision
kworker/0:0
kworker/0:1
kworker/u:2
loop23
kworker/u:3
kworker/0:4
kworker/u:1
flush-0:19
irq/334-synapti
kworker/0:2
kworker/u:4
kworker/1:0
kworker/1:1

disable services at android?? nfc

Hi
I cant find the daemon for some services, can somebody explain me how to disable services with android
i have root and terminal for android
At APPS i have disabled NFC service, but after print "ps" at terminal this nfc service daemon Still working.
Here is ps of my phone
USER PID PPID VSIZE RSS WCHAN PC NAME
root 1 0 2668 880 c02829a0 0002a808 S /init
root 2 0 0 0 c01c59a4 00000000 S kthreadd
root 3 2 0 0 c01cd87c 00000000 S ksoftirqd/0
root 6 2 0 0 c018b6e4 00000000 S kworker/u:0
root 7 2 0 0 c0188aac 00000000 S kworker/u:0H
root 8 2 0 0 c01cd87c 00000000 S migration/0
root 9 2 0 0 c01c51b8 00000000 R migration/1
root 10 2 0 0 c01c51b8 00000000 R ksoftirqd/1
root 11 2 0 0 c01c0038 00000000 S kworker/1:0
root 12 2 0 0 c01c0038 00000000 S kworker/1:0H
root 13 2 0 0 c01c51b8 00000000 R migration/2
root 14 2 0 0 c01c51b8 00000000 R ksoftirqd/2
root 16 2 0 0 c01c0038 00000000 S kworker/2:0H
root 17 2 0 0 c01cd87c 00000000 S migration/3
root 18 2 0 0 c01cd87c 00000000 S ksoftirqd/3
root 20 2 0 0 c01c0038 00000000 S kworker/3:0H
root 21 2 0 0 c01bfa08 00000000 S khelper
root 22 2 0 0 c01bfa08 00000000 S netns
root 27 2 0 0 c01c0038 00000000 S kworker/0:1H
root 28 2 0 0 c01bfa08 00000000 S modem_notifier
root 29 2 0 0 c01bfa08 00000000 S smd_channel_clo
root 30 2 0 0 c01bfa08 00000000 S smsm_cb_wq
root 32 2 0 0 c01bfa08 00000000 S rpm-smd
root 33 2 0 0 c01c0038 00000000 S kworker/u:1H
root 34 2 0 0 c01bfa08 00000000 S mpm
root 35 2 0 0 c02510f0 00000000 S sync_supers
root 36 2 0 0 c025172c 00000000 S bdi-default
root 37 2 0 0 c01bfa08 00000000 S kblockd
root 38 2 0 0 c0443218 00000000 S system
root 39 2 0 0 c04fd304 00000000 S khubd
root 40 2 0 0 c020b6c0 00000000 S irq/99-msm_iomm
root 41 2 0 0 c020b6c0 00000000 S irq/105-msm_iom
root 42 2 0 0 c020b6c0 00000000 S irq/77-msm_iomm
root 43 2 0 0 c020b6c0 00000000 S irq/70-msm_iomm
root 44 2 0 0 c020b6c0 00000000 S irq/94-msm_iomm
root 45 2 0 0 c020b6c0 00000000 S irq/102-msm_iom
root 46 2 0 0 c020b6c0 00000000 S irq/102-msm_iom
root 47 2 0 0 c020b6c0 00000000 S irq/102-msm_iom
root 48 2 0 0 c020b6c0 00000000 S irq/79-msm_iomm
root 49 2 0 0 c020b6c0 00000000 S irq/78-msm_iomm
root 50 2 0 0 c020b6c0 00000000 S irq/78-msm_iomm
root 51 2 0 0 c020b6c0 00000000 S irq/74-msm_iomm
root 52 2 0 0 c020b6c0 00000000 S irq/75-msm_iomm
root 53 2 0 0 c020b6c0 00000000 S irq/75-msm_iomm
root 54 2 0 0 c020b6c0 00000000 S irq/75-msm_iomm
root 55 2 0 0 c020b6c0 00000000 S irq/75-msm_iomm
root 56 2 0 0 c020b6c0 00000000 S irq/273-msm_iom
root 57 2 0 0 c020b6c0 00000000 S irq/273-msm_iom
root 58 2 0 0 c020b6c0 00000000 S irq/273-msm_iom
root 59 2 0 0 c020b6c0 00000000 S irq/97-msm_iomm
root 60 2 0 0 c020b6c0 00000000 S irq/97-msm_iomm
root 61 2 0 0 c020b6c0 00000000 S irq/97-msm_iomm
root 62 2 0 0 c01bfa08 00000000 S devfreq_wq
root 63 2 0 0 c01bfa08 00000000 S l2cap
root 64 2 0 0 c01bfa08 00000000 S a2mp
root 65 2 0 0 c01bfa08 00000000 S cfg80211
root 77 2 0 0 c020b6c0 00000000 S irq/476-adsp
root 78 2 0 0 c020b6c0 00000000 S irq/412-mba
root 79 2 0 0 c020b6c0 00000000 S irq/540-wcnss
root 80 2 0 0 c01bfa08 00000000 S qmi
root 81 2 0 0 c01bfa08 00000000 S nmea
root 82 2 0 0 c01bfa08 00000000 S msm_ipc_router
root 83 2 0 0 c01bfa08 00000000 S apr_driver
root 84 2 0 0 c0248b34 00000000 S kswapd0
root 85 2 0 0 c0268c94 00000000 S ksmd
root 86 2 0 0 c02ab534 00000000 S fsnotify_mark
root 87 2 0 0 c0330260 00000000 S ecryptfs-kthrea
root 88 2 0 0 c01bfa08 00000000 S crypto
root 109 2 0 0 c01bfa08 00000000 S ad_calc_wq
root 110 2 0 0 c03f9d94 00000000 D mdss_dsi_event
root 111 2 0 0 c01bfa08 00000000 S k_hsuart
root 112 2 0 0 c01bfa08 00000000 S diag_real_time_
root 113 2 0 0 c01bfa08 00000000 S diag_modem_data
root 114 2 0 0 c01bfa08 00000000 S diag_lpass_data
root 115 2 0 0 c01bfa08 00000000 S diag_wcnss_data
root 116 2 0 0 c01bfa08 00000000 S diag_wq
root 117 2 0 0 c01bfa08 00000000 S diag_usb_wq
root 118 2 0 0 c01bfa08 00000000 S diag_cntl_wq
root 119 2 0 0 c01bfa08 00000000 S diag_dci_wq
root 120 2 0 0 c01bfa08 00000000 S kgsl-3d0
root 121 2 0 0 c01bfa08 00000000 S kgsl_devfreq_wq
root 122 2 0 0 c01bfa08 00000000 S f9966000.spi
root 123 2 0 0 c01bfa08 00000000 S f9965000.spi
root 126 2 0 0 c01bfa08 00000000 S usbnet
root 127 2 0 0 c01bfa08 00000000 S k_rmnet_mux_wor
root 128 2 0 0 c01bfa08 00000000 S f_mtp
root 129 2 0 0 c056e090 00000000 S file-storage
root 130 2 0 0 c01bfa08 00000000 S uether
root 131 2 0 0 c01c0038 00000000 S kworker/1:2
root 133 2 0 0 c01bfa08 00000000 S dsx_exp_workque
root 135 2 0 0 c01bfa08 00000000 S fwu_workqueue
root 137 2 0 0 c01bfa08 00000000 S msm_vidc_worker
root 138 2 0 0 c01bfa08 00000000 S pm_workerq_venu
root 139 2 0 0 c01bfa08 00000000 S msm_vidc_worker
root 140 2 0 0 c01bfa08 00000000 S fwu_workqueue
root 141 2 0 0 c020b6c0 00000000 S irq/344-synapti
root 142 2 0 0 c01bfa08 00000000 S msm_cpp_workque
root 143 2 0 0 c01bfa08 00000000 S dm_bufio_cache
root 144 2 0 0 c01cd87c 00000000 S dbs_sync/0
root 145 2 0 0 c01c51b8 00000000 R dbs_sync/1
root 146 2 0 0 c01c51b8 00000000 R dbs_sync/2
root 147 2 0 0 c01cd87c 00000000 S dbs_sync/3
root 148 2 0 0 c069aba0 00000000 S cfinteractive
root 149 2 0 0 c020b6c0 00000000 S irq/170-msm_sdc
root 150 2 0 0 c020b6c0 00000000 S irq/253-msm_sdc
root 169 2 0 0 c01bfa08 00000000 S binder
root 170 2 0 0 c01bfa08 00000000 S usb_bam_wq
root 171 2 0 0 c01bfa08 00000000 S bam_dmux_rx
root 172 2 0 0 c01bfa08 00000000 S bam_dmux_tx
root 173 2 0 0 c01bfa08 00000000 S rq_stats
root 174 2 0 0 c01bfa08 00000000 S deferwq
root 178 2 0 0 c01bfa08 00000000 S sb-1
root 179 2 0 0 c020b6c0 00000000 S irq/195-ngd_sli
root 180 2 0 0 c04d5af8 00000000 D ngd_rx_thread1
root 181 2 0 0 c04d37ac 00000000 D ngd_notify_sl1
root 182 2 0 0 c0b295bc 00000000 S msm_thermal:hot
root 183 2 0 0 c0b29474 00000000 S msm_thermal:fre
root 184 2 0 0 c0b28d80 00000000 S msm_thermal:the
root 185 2 0 0 c01cd87c 00000000 S boost_sync/0
root 186 2 0 0 c01c51b8 00000000 R boost_sync/1
root 187 2 0 0 c01c51b8 00000000 R boost_sync/2
root 188 2 0 0 c01cd87c 00000000 S boost_sync/3
root 189 2 0 0 c06b38b0 00000000 S mmcqd/0
root 190 2 0 0 c06b38b0 00000000 S mmcqd/0rpmb
root 191 1 2664 628 c02829a0 0002a808 S /sbin/ueventd
root 193 2 0 0 c031764c 00000000 S jbd2/mmcblk0p14
root 194 2 0 0 c01bfa08 00000000 S ext4-dio-unwrit
root 199 2 0 0 c031764c 00000000 S jbd2/mmcblk0p28
root 200 2 0 0 c01bfa08 00000000 S ext4-dio-unwrit
root 204 2 0 0 c031764c 00000000 S jbd2/mmcblk0p16
root 205 2 0 0 c01bfa08 00000000 S ext4-dio-unwrit
root 209 2 0 0 c031764c 00000000 S jbd2/mmcblk0p15
root 210 2 0 0 c01bfa08 00000000 S ext4-dio-unwrit
root 235 2 0 0 c01bfa08 00000000 S IPCRTR
root 237 2 0 0 c01bfa08 00000000 S ipc_rtr_q6_ipcr
logd 238 1 15136 3340 ffffffff b6f57580 S /system/bin/logd
root 239 1 3700 328 c02aede8 00033cd0 S /sbin/healthd
root 240 1 4392 1036 c02aede8 b6eb1bd8 S /system/bin/lmkd
system 241 1 3300 624 c070f570 b6eb7640 S /system/bin/servicemanager
root 242 1 9656 1700 ffffffff b6f22f38 S /system/bin/vold
system 243 1 132708 12564 ffffffff b6ee3bd8 S /system/bin/surfaceflinger
nobody 244 1 16700 904 ffffffff b6f7595c S /system/bin/rmt_storage
system 245 1 5984 880 ffffffff b6ec695c S /system/bin/rfs_access
system 246 1 4936 976 c01aa32c b6f6ea84 S /system/bin/qseecomd
audit 249 1 3100 568 c02829a0 b6ef8dc8 S /system/bin/auditd
root 250 1 27816 2232 ffffffff b6f73f38 S /system/bin/netd
root 251 1 3872 808 c09ad2a8 b6fa348c S /system/bin/debuggerd
radio 252 1 48472 9060 ffffffff b6fa9f38 S /system/bin/rild
drm 253 1 16576 5256 ffffffff b6ea8640 S /system/bin/drmserver
media 254 1 194600 24588 ffffffff b6f1e640 S /system/bin/mediaserver
install 255 1 3256 680 c0a6d95c b6f87f84 S /system/bin/installd
radio 257 1 27044 1376 ffffffff b6ea695c S /system/bin/qmuxd
radio 259 1 14892 1728 ffffffff b6e7319c S /system/bin/netmgrd
root 261 1 61012 1752 ffffffff b6f4c580 S /system/bin/thermal-engine
media 262 1 5132 396 ffffffff b6f22dc8 S /system/bin/adsprpcd
system 263 1 7468 1328 ffffffff b6ec0f84 S /system/bin/wcnss_service
root 264 1 1481340 64244 ffffffff b6f9f95c S zygote
root 265 2 0 0 c02001d8 00000000 S kauditd
media_rw 266 1 7200 1200 ffffffff b6f58f84 S /system/bin/sdcard
sensors 267 1 71332 1888 ffffffff b6ebe95c S /system/bin/sensors.qcom
gps 268 1 3856 936 c01b9ffc b6ee0580 S /system/bin/loc_launcher
camera 269 1 55888 5856 ffffffff b6f7f95c S /system/bin/mm-qcamera-daemon
system 270 1 13416 1268 ffffffff b6f4819c S /system/bin/time_daemon
system 271 1 14332 3164 ffffffff b6eb6640 S /system/bin/audiod
system 273 1 34888 8668 ffffffff b6ed4ed8 S /system/bin/mm-pp-daemon
gps 292 268 44980 8952 ffffffff b6cd219c S /system/vendor/bin/slim_ap_daemon
root 311 2 0 0 c01c5ac8 00000000 S msm_slim_qmi_cl
root 312 2 0 0 c01bfa08 00000000 S msm_qmi_rtx_q
root 322 2 0 0 c01c0038 00000000 S kworker/2:2
root 364 2 0 0 c020b6c0 00000000 S irq/288-wcd9xxx
root 391 2 0 0 c01c0038 00000000 S kworker/1:1H
system 428 246 9124 616 ffffffff b6f6f580 S /system/bin/qseecomd
root 589 2 0 0 c01bfa08 00000000 S IPCRTR
root 590 2 0 0 c01bfa08 00000000 S ipc_rtr_smd_ipc
root 632 1 3188 340 c09ad2a8 b6f2948c S daemonsu:mount:master
root 797 1 8308 484 ffffffff b6f2948c S daemonsu:master
system 826 264 1759212 145812 ffffffff b6f9fbd8 S system_server
keystore 930 1 6292 1728 00000000 b6f65640 R /system/bin/keystore
root 1045 2 0 0 c01bfa08 00000000 S IPCRTR
root 1046 2 0 0 c01bfa08 00000000 S ipc_rtr_wcnss_i
u0_a16 1230 264 1744444 170220 ffffffff b6f9fbd8 S com.android.systemui
root 1363 2 0 0 c087f5f8 00000000 S WD_Thread
root 1366 2 0 0 c087ef10 00000000 S MC_Thread
root 1367 2 0 0 c087ea88 00000000 S TX_Thread
root 1368 2 0 0 c087e5a0 00000000 S RX_Thread
u0_a22 1588 264 1619108 82872 ffffffff b6f9fbd8 S com.google.process.gapps
u0_a22 1657 264 1885300 148724 ffffffff b6f9fbd8 S com.google.android.gms
u0_a22 1688 264 1627276 95104 ffffffff b6f9fbd8 S com.google.process.location
root 1875 2 0 0 c0841440 00000000 S wlan_logging_th
wifi 1877 1 7340 2608 c02829a0 b6e9b95c S /system/bin/wpa_supplicant
u0_a18 1879 264 1520316 63172 ffffffff b6f9fbd8 S org.cyanogenmod.theme.chooser
u0_a28 1902 264 1561260 50792 ffffffff b6f9fbd8 S com.google.android.googlequicksearchbox:interactor
radio 1997 264 1528552 52468 ffffffff b6f9fbd8 S com.android.server.telecom
nfc 2020 264 1536744 55016 ffffffff b6f9fbd8 S com.android.nfc
radio 2044 264 1541764 74808 ffffffff b6f9fbd8 S com.android.phone
u0_a8 2060 264 1525296 45828 ffffffff b6f9fbd8 S com.android.incallui
u0_a0 2081 264 1530844 48728 ffffffff b6f9fbd8 S org.cyanogenmod.audiofx
root 2279 2 0 0 c01c0038 00000000 S kworker/3:1H
u0_a19 2328 264 1597404 103592 ffffffff b6f9fbd8 S com.cyanogenmod.trebuchet
root 2520 2 0 0 c020b6c0 00000000 S irq/33-bw_hwmon
root 2521 1 11092 892 ffffffff b6e7c19c S /system/bin/mpdecision
root 2524 2 0 0 c01c0038 00000000 S kworker/2:1H
root 2733 797 9332 628 c09ad2a8 b6f2948c S daemonsu:10080
u0_a63 2807 264 1498984 42380 ffffffff b6f9fbd8 S com.android.smspush
radio 3728 264 1501116 44012 ffffffff b6f9fbd8 S com.qualcomm.qcrilmsgtunnel
root 4337 797 9332 576 c09ad2a8 b6f2948c S daemonsu:10116
u0_a109 8679 264 1606356 79204 ffffffff b6f9fbd8 S com.viber.voip
u0_a82 8727 264 1555392 69032 ffffffff b6ef6e5e R com.menny.android.anysoftkeyboard
u0_a112 8800 264 1537336 65548 ffffffff b6f9fbd8 S de.web.mobile.android.mail
u0_a113 9608 264 1658008 127164 ffffffff b6f9fbd8 S com.whatsapp
root 10641 2 0 0 c01c0038 00000000 S kworker/3:1
root 10857 797 10356 552 c09ad2a8 b6f2948c S daemonsu:10091
u0_a22 11492 264 1581976 54116 ffffffff b6f9fbd8 S com.google.android.gms.wearable
root 15395 2 0 0 c01c0038 00000000 S kworker/u:3
root 16198 2 0 0 c01c0038 00000000 S kworker/u:2
root 17192 2 0 0 c01c0038 00000000 S kworker/u:1
u0_a75 17448 264 1664604 115456 ffffffff b6f9fbd8 S com.google.android.apps.plus
root 17703 2 0 0 c01c0038 00000000 S kworker/0:0
root 17814 2 0 0 c0296ea4 00000000 S flush-179:0
root 17880 2 0 0 c01c0038 00000000 S kworker/2:0
root 18119 2 0 0 c01c0038 00000000 S kworker/3:0
root 18298 2 0 0 c01c0038 00000000 S kworker/0:2H
u0_a28 18987 264 1575072 75424 ffffffff b6f9fbd8 S com.google.android.googlequicksearchbox:search
root 20502 2 0 0 c01c0038 00000000 S kworker/0:2
root 20512 2 0 0 c01c0038 00000000 S kworker/u:5
root 20516 2 0 0 c01c0038 00000000 S kworker/u:6
u0_a73 20828 264 1603616 68832 ffffffff b6f9fbd8 S com.google.android.music:main
root 21225 2 0 0 c01c0038 00000000 S kworker/1:1
root 22952 2 0 0 c01c0038 00000000 S kworker/3:3
root 23004 2 0 0 c01c0038 00000000 S kworker/2:1
root 23219 2 0 0 c01c0038 00000000 S kworker/u:7
root 23914 2 0 0 c01c0038 00000000 S kworker/u:8
root 23915 2 0 0 c01c0038 00000000 S kworker/u:9
root 23916 2 0 0 c01c0038 00000000 S kworker/u:10
u0_a71 24438 264 1617528 86048 ffffffff b6f9fbd8 S com.google.android.talk
u0_a26 24486 264 1553280 68824 ffffffff b6f9fbd8 S com.android.vending
u0_a45 24568 264 1506056 45420 ffffffff b6f9fbd8 S com.android.gallery3d
u0_a115 24599 264 1514576 45632 ffffffff b6f9fbd8 S org.blackmart.market
u0_a116 24624 264 1508620 47348 ffffffff b6f9fbd8 S com.android.vending.billing.InAppBillingService.LUCK
root 24664 2 0 0 c020b6c0 00000000 S irq/289-
root 24665 2 0 0 c040c424 00000000 D mdss_fb0
u0_a107 24682 264 1512332 48172 ffffffff b6f9fbd8 S com.android.chrome
u0_a80 24703 264 1535404 54780 ffffffff b6f9fbd8 S eu.chainfire.supersu
u0_a102 24741 264 1584844 83992 ffffffff b5b7846c R jackpal.androidterm
root 24772 2 0 0 c01c0038 00000000 S kworker/0:1
u0_a5 24791 264 1499564 44676 ffffffff b6f9fbd8 S com.android.cellbroadcastreceiver
u0_a95 24813 264 1558800 70464 ffffffff b6f9fbd8 S de.motain.iliga
root 24932 797 14452 672 ffffffff b6f2948c S daemonsu:10102
root 24935 24932 12404 920 c01aa32c b6f29a84 S daemonsu:10102:24929
root 24939 24935 3188 756 c041a75c b6f05f84 S tmp-mksh
u0_a96 25119 264 1539840 65068 ffffffff b6f9fbd8 S com.ghisler.android.TotalCommander
u0_a51 25150 264 1500656 45708 ffffffff b6f9fbd8 S com.cyanogenmod.lockclock
root 25176 2 0 0 c01c0038 00000000 S kworker/u:4
system 25177 264 1507908 55164 ffffffff b6f9fbd8 S system:ui
u0_a32 25217 264 1539012 65312 ffffffff b6f9fbd8 S com.cyanogenmod.filemanager
u0_a32 25237 25217 3188 700 c0279a54 b6ecef84 S /system/bin/sh
u0_a32 25246 25217 3188 700 c0279a54 b6e90f84 S /system/bin/sh
u0_a46 25344 264 1623280 95640 ffffffff b6f9fbd8 S com.android.htmlviewer
u0_a102 25449 24741 3188 744 c01b9ffc b6f67580 S /system/bin/sh
u0_a102 25483 25449 3188 356 c02829a0 b6eb495c S su
root 25486 24932 14452 1008 c02829a0 b6f2995c S daemonsu:10102:25483
root 25490 25486 3188 744 c01b9ffc b6e8b580 S tmp-mksh
root 25575 25490 4476 724 00000000 b6f31f84 R ps
uragan1987 said:
Hi
I cant find the daemon for some services, can somebody explain me how to disable services with android
i have root and terminal for android
At APPS i have disabled NFC service, but after print "ps" at terminal this nfc service daemon Still working.
Here is ps of my phone
USER PID PPID VSIZE RSS WCHAN PC NAME
root 1 0 2668 880 c02829a0 0002a808 S /init
root 2 0 0 0 c01c59a4 00000000 S kthreadd
root 3 2 0 0 c01cd87c 00000000 S ksoftirqd/0
root 6 2 0 0 c018b6e4 00000000 S kworker/u:0
root 7 2 0 0 c0188aac 00000000 S kworker/u:0H
root 8 2 0 0 c01cd87c 00000000 S migration/0
root 9 2 0 0 c01c51b8 00000000 R migration/1
root 10 2 0 0 c01c51b8 00000000 R ksoftirqd/1
root 11 2 0 0 c01c0038 00000000 S kworker/1:0
root 12 2 0 0 c01c0038 00000000 S kworker/1:0H
root 13 2 0 0 c01c51b8 00000000 R migration/2
root 14 2 0 0 c01c51b8 00000000 R ksoftirqd/2
root 16 2 0 0 c01c0038 00000000 S kworker/2:0H
root 17 2 0 0 c01cd87c 00000000 S migration/3
root 18 2 0 0 c01cd87c 00000000 S ksoftirqd/3
root 20 2 0 0 c01c0038 00000000 S kworker/3:0H
root 21 2 0 0 c01bfa08 00000000 S khelper
root 22 2 0 0 c01bfa08 00000000 S netns
root 27 2 0 0 c01c0038 00000000 S kworker/0:1H
root 28 2 0 0 c01bfa08 00000000 S modem_notifier
root 29 2 0 0 c01bfa08 00000000 S smd_channel_clo
root 30 2 0 0 c01bfa08 00000000 S smsm_cb_wq
root 32 2 0 0 c01bfa08 00000000 S rpm-smd
root 33 2 0 0 c01c0038 00000000 S kworker/u:1H
root 34 2 0 0 c01bfa08 00000000 S mpm
root 35 2 0 0 c02510f0 00000000 S sync_supers
root 36 2 0 0 c025172c 00000000 S bdi-default
root 37 2 0 0 c01bfa08 00000000 S kblockd
root 38 2 0 0 c0443218 00000000 S system
root 39 2 0 0 c04fd304 00000000 S khubd
root 40 2 0 0 c020b6c0 00000000 S irq/99-msm_iomm
root 41 2 0 0 c020b6c0 00000000 S irq/105-msm_iom
root 42 2 0 0 c020b6c0 00000000 S irq/77-msm_iomm
root 43 2 0 0 c020b6c0 00000000 S irq/70-msm_iomm
root 44 2 0 0 c020b6c0 00000000 S irq/94-msm_iomm
root 45 2 0 0 c020b6c0 00000000 S irq/102-msm_iom
root 46 2 0 0 c020b6c0 00000000 S irq/102-msm_iom
root 47 2 0 0 c020b6c0 00000000 S irq/102-msm_iom
root 48 2 0 0 c020b6c0 00000000 S irq/79-msm_iomm
root 49 2 0 0 c020b6c0 00000000 S irq/78-msm_iomm
root 50 2 0 0 c020b6c0 00000000 S irq/78-msm_iomm
root 51 2 0 0 c020b6c0 00000000 S irq/74-msm_iomm
root 52 2 0 0 c020b6c0 00000000 S irq/75-msm_iomm
root 53 2 0 0 c020b6c0 00000000 S irq/75-msm_iomm
root 54 2 0 0 c020b6c0 00000000 S irq/75-msm_iomm
root 55 2 0 0 c020b6c0 00000000 S irq/75-msm_iomm
root 56 2 0 0 c020b6c0 00000000 S irq/273-msm_iom
root 57 2 0 0 c020b6c0 00000000 S irq/273-msm_iom
root 58 2 0 0 c020b6c0 00000000 S irq/273-msm_iom
root 59 2 0 0 c020b6c0 00000000 S irq/97-msm_iomm
root 60 2 0 0 c020b6c0 00000000 S irq/97-msm_iomm
root 61 2 0 0 c020b6c0 00000000 S irq/97-msm_iomm
root 62 2 0 0 c01bfa08 00000000 S devfreq_wq
root 63 2 0 0 c01bfa08 00000000 S l2cap
root 64 2 0 0 c01bfa08 00000000 S a2mp
root 65 2 0 0 c01bfa08 00000000 S cfg80211
root 77 2 0 0 c020b6c0 00000000 S irq/476-adsp
root 78 2 0 0 c020b6c0 00000000 S irq/412-mba
root 79 2 0 0 c020b6c0 00000000 S irq/540-wcnss
root 80 2 0 0 c01bfa08 00000000 S qmi
root 81 2 0 0 c01bfa08 00000000 S nmea
root 82 2 0 0 c01bfa08 00000000 S msm_ipc_router
root 83 2 0 0 c01bfa08 00000000 S apr_driver
root 84 2 0 0 c0248b34 00000000 S kswapd0
root 85 2 0 0 c0268c94 00000000 S ksmd
root 86 2 0 0 c02ab534 00000000 S fsnotify_mark
root 87 2 0 0 c0330260 00000000 S ecryptfs-kthrea
root 88 2 0 0 c01bfa08 00000000 S crypto
root 109 2 0 0 c01bfa08 00000000 S ad_calc_wq
root 110 2 0 0 c03f9d94 00000000 D mdss_dsi_event
root 111 2 0 0 c01bfa08 00000000 S k_hsuart
root 112 2 0 0 c01bfa08 00000000 S diag_real_time_
root 113 2 0 0 c01bfa08 00000000 S diag_modem_data
root 114 2 0 0 c01bfa08 00000000 S diag_lpass_data
root 115 2 0 0 c01bfa08 00000000 S diag_wcnss_data
root 116 2 0 0 c01bfa08 00000000 S diag_wq
root 117 2 0 0 c01bfa08 00000000 S diag_usb_wq
root 118 2 0 0 c01bfa08 00000000 S diag_cntl_wq
root 119 2 0 0 c01bfa08 00000000 S diag_dci_wq
root 120 2 0 0 c01bfa08 00000000 S kgsl-3d0
root 121 2 0 0 c01bfa08 00000000 S kgsl_devfreq_wq
root 122 2 0 0 c01bfa08 00000000 S f9966000.spi
root 123 2 0 0 c01bfa08 00000000 S f9965000.spi
root 126 2 0 0 c01bfa08 00000000 S usbnet
root 127 2 0 0 c01bfa08 00000000 S k_rmnet_mux_wor
root 128 2 0 0 c01bfa08 00000000 S f_mtp
root 129 2 0 0 c056e090 00000000 S file-storage
root 130 2 0 0 c01bfa08 00000000 S uether
root 131 2 0 0 c01c0038 00000000 S kworker/1:2
root 133 2 0 0 c01bfa08 00000000 S dsx_exp_workque
root 135 2 0 0 c01bfa08 00000000 S fwu_workqueue
root 137 2 0 0 c01bfa08 00000000 S msm_vidc_worker
root 138 2 0 0 c01bfa08 00000000 S pm_workerq_venu
root 139 2 0 0 c01bfa08 00000000 S msm_vidc_worker
root 140 2 0 0 c01bfa08 00000000 S fwu_workqueue
root 141 2 0 0 c020b6c0 00000000 S irq/344-synapti
root 142 2 0 0 c01bfa08 00000000 S msm_cpp_workque
root 143 2 0 0 c01bfa08 00000000 S dm_bufio_cache
root 144 2 0 0 c01cd87c 00000000 S dbs_sync/0
root 145 2 0 0 c01c51b8 00000000 R dbs_sync/1
root 146 2 0 0 c01c51b8 00000000 R dbs_sync/2
root 147 2 0 0 c01cd87c 00000000 S dbs_sync/3
root 148 2 0 0 c069aba0 00000000 S cfinteractive
root 149 2 0 0 c020b6c0 00000000 S irq/170-msm_sdc
root 150 2 0 0 c020b6c0 00000000 S irq/253-msm_sdc
root 169 2 0 0 c01bfa08 00000000 S binder
root 170 2 0 0 c01bfa08 00000000 S usb_bam_wq
root 171 2 0 0 c01bfa08 00000000 S bam_dmux_rx
root 172 2 0 0 c01bfa08 00000000 S bam_dmux_tx
root 173 2 0 0 c01bfa08 00000000 S rq_stats
root 174 2 0 0 c01bfa08 00000000 S deferwq
root 178 2 0 0 c01bfa08 00000000 S sb-1
root 179 2 0 0 c020b6c0 00000000 S irq/195-ngd_sli
root 180 2 0 0 c04d5af8 00000000 D ngd_rx_thread1
root 181 2 0 0 c04d37ac 00000000 D ngd_notify_sl1
root 182 2 0 0 c0b295bc 00000000 S msm_thermal:hot
root 183 2 0 0 c0b29474 00000000 S msm_thermal:fre
root 184 2 0 0 c0b28d80 00000000 S msm_thermal:the
root 185 2 0 0 c01cd87c 00000000 S boost_sync/0
root 186 2 0 0 c01c51b8 00000000 R boost_sync/1
root 187 2 0 0 c01c51b8 00000000 R boost_sync/2
root 188 2 0 0 c01cd87c 00000000 S boost_sync/3
root 189 2 0 0 c06b38b0 00000000 S mmcqd/0
root 190 2 0 0 c06b38b0 00000000 S mmcqd/0rpmb
root 191 1 2664 628 c02829a0 0002a808 S /sbin/ueventd
root 193 2 0 0 c031764c 00000000 S jbd2/mmcblk0p14
root 194 2 0 0 c01bfa08 00000000 S ext4-dio-unwrit
root 199 2 0 0 c031764c 00000000 S jbd2/mmcblk0p28
root 200 2 0 0 c01bfa08 00000000 S ext4-dio-unwrit
root 204 2 0 0 c031764c 00000000 S jbd2/mmcblk0p16
root 205 2 0 0 c01bfa08 00000000 S ext4-dio-unwrit
root 209 2 0 0 c031764c 00000000 S jbd2/mmcblk0p15
root 210 2 0 0 c01bfa08 00000000 S ext4-dio-unwrit
root 235 2 0 0 c01bfa08 00000000 S IPCRTR
root 237 2 0 0 c01bfa08 00000000 S ipc_rtr_q6_ipcr
logd 238 1 15136 3340 ffffffff b6f57580 S /system/bin/logd
root 239 1 3700 328 c02aede8 00033cd0 S /sbin/healthd
root 240 1 4392 1036 c02aede8 b6eb1bd8 S /system/bin/lmkd
system 241 1 3300 624 c070f570 b6eb7640 S /system/bin/servicemanager
root 242 1 9656 1700 ffffffff b6f22f38 S /system/bin/vold
system 243 1 132708 12564 ffffffff b6ee3bd8 S /system/bin/surfaceflinger
nobody 244 1 16700 904 ffffffff b6f7595c S /system/bin/rmt_storage
system 245 1 5984 880 ffffffff b6ec695c S /system/bin/rfs_access
system 246 1 4936 976 c01aa32c b6f6ea84 S /system/bin/qseecomd
audit 249 1 3100 568 c02829a0 b6ef8dc8 S /system/bin/auditd
root 250 1 27816 2232 ffffffff b6f73f38 S /system/bin/netd
root 251 1 3872 808 c09ad2a8 b6fa348c S /system/bin/debuggerd
radio 252 1 48472 9060 ffffffff b6fa9f38 S /system/bin/rild
drm 253 1 16576 5256 ffffffff b6ea8640 S /system/bin/drmserver
media 254 1 194600 24588 ffffffff b6f1e640 S /system/bin/mediaserver
install 255 1 3256 680 c0a6d95c b6f87f84 S /system/bin/installd
radio 257 1 27044 1376 ffffffff b6ea695c S /system/bin/qmuxd
radio 259 1 14892 1728 ffffffff b6e7319c S /system/bin/netmgrd
root 261 1 61012 1752 ffffffff b6f4c580 S /system/bin/thermal-engine
media 262 1 5132 396 ffffffff b6f22dc8 S /system/bin/adsprpcd
system 263 1 7468 1328 ffffffff b6ec0f84 S /system/bin/wcnss_service
root 264 1 1481340 64244 ffffffff b6f9f95c S zygote
root 265 2 0 0 c02001d8 00000000 S kauditd
media_rw 266 1 7200 1200 ffffffff b6f58f84 S /system/bin/sdcard
sensors 267 1 71332 1888 ffffffff b6ebe95c S /system/bin/sensors.qcom
gps 268 1 3856 936 c01b9ffc b6ee0580 S /system/bin/loc_launcher
camera 269 1 55888 5856 ffffffff b6f7f95c S /system/bin/mm-qcamera-daemon
system 270 1 13416 1268 ffffffff b6f4819c S /system/bin/time_daemon
system 271 1 14332 3164 ffffffff b6eb6640 S /system/bin/audiod
system 273 1 34888 8668 ffffffff b6ed4ed8 S /system/bin/mm-pp-daemon
gps 292 268 44980 8952 ffffffff b6cd219c S /system/vendor/bin/slim_ap_daemon
root 311 2 0 0 c01c5ac8 00000000 S msm_slim_qmi_cl
root 312 2 0 0 c01bfa08 00000000 S msm_qmi_rtx_q
root 322 2 0 0 c01c0038 00000000 S kworker/2:2
root 364 2 0 0 c020b6c0 00000000 S irq/288-wcd9xxx
root 391 2 0 0 c01c0038 00000000 S kworker/1:1H
system 428 246 9124 616 ffffffff b6f6f580 S /system/bin/qseecomd
root 589 2 0 0 c01bfa08 00000000 S IPCRTR
root 590 2 0 0 c01bfa08 00000000 S ipc_rtr_smd_ipc
root 632 1 3188 340 c09ad2a8 b6f2948c S daemonsu:mount:master
root 797 1 8308 484 ffffffff b6f2948c S daemonsu:master
system 826 264 1759212 145812 ffffffff b6f9fbd8 S system_server
keystore 930 1 6292 1728 00000000 b6f65640 R /system/bin/keystore
root 1045 2 0 0 c01bfa08 00000000 S IPCRTR
root 1046 2 0 0 c01bfa08 00000000 S ipc_rtr_wcnss_i
u0_a16 1230 264 1744444 170220 ffffffff b6f9fbd8 S com.android.systemui
root 1363 2 0 0 c087f5f8 00000000 S WD_Thread
root 1366 2 0 0 c087ef10 00000000 S MC_Thread
root 1367 2 0 0 c087ea88 00000000 S TX_Thread
root 1368 2 0 0 c087e5a0 00000000 S RX_Thread
u0_a22 1588 264 1619108 82872 ffffffff b6f9fbd8 S com.google.process.gapps
u0_a22 1657 264 1885300 148724 ffffffff b6f9fbd8 S com.google.android.gms
u0_a22 1688 264 1627276 95104 ffffffff b6f9fbd8 S com.google.process.location
root 1875 2 0 0 c0841440 00000000 S wlan_logging_th
wifi 1877 1 7340 2608 c02829a0 b6e9b95c S /system/bin/wpa_supplicant
u0_a18 1879 264 1520316 63172 ffffffff b6f9fbd8 S org.cyanogenmod.theme.chooser
u0_a28 1902 264 1561260 50792 ffffffff b6f9fbd8 S com.google.android.googlequicksearchbox:interactor
radio 1997 264 1528552 52468 ffffffff b6f9fbd8 S com.android.server.telecom
nfc 2020 264 1536744 55016 ffffffff b6f9fbd8 S com.android.nfc
radio 2044 264 1541764 74808 ffffffff b6f9fbd8 S com.android.phone
u0_a8 2060 264 1525296 45828 ffffffff b6f9fbd8 S com.android.incallui
u0_a0 2081 264 1530844 48728 ffffffff b6f9fbd8 S org.cyanogenmod.audiofx
root 2279 2 0 0 c01c0038 00000000 S kworker/3:1H
u0_a19 2328 264 1597404 103592 ffffffff b6f9fbd8 S com.cyanogenmod.trebuchet
root 2520 2 0 0 c020b6c0 00000000 S irq/33-bw_hwmon
root 2521 1 11092 892 ffffffff b6e7c19c S /system/bin/mpdecision
root 2524 2 0 0 c01c0038 00000000 S kworker/2:1H
root 2733 797 9332 628 c09ad2a8 b6f2948c S daemonsu:10080
u0_a63 2807 264 1498984 42380 ffffffff b6f9fbd8 S com.android.smspush
radio 3728 264 1501116 44012 ffffffff b6f9fbd8 S com.qualcomm.qcrilmsgtunnel
root 4337 797 9332 576 c09ad2a8 b6f2948c S daemonsu:10116
u0_a109 8679 264 1606356 79204 ffffffff b6f9fbd8 S com.viber.voip
u0_a82 8727 264 1555392 69032 ffffffff b6ef6e5e R com.menny.android.anysoftkeyboard
u0_a112 8800 264 1537336 65548 ffffffff b6f9fbd8 S de.web.mobile.android.mail
u0_a113 9608 264 1658008 127164 ffffffff b6f9fbd8 S com.whatsapp
root 10641 2 0 0 c01c0038 00000000 S kworker/3:1
root 10857 797 10356 552 c09ad2a8 b6f2948c S daemonsu:10091
u0_a22 11492 264 1581976 54116 ffffffff b6f9fbd8 S com.google.android.gms.wearable
root 15395 2 0 0 c01c0038 00000000 S kworker/u:3
root 16198 2 0 0 c01c0038 00000000 S kworker/u:2
root 17192 2 0 0 c01c0038 00000000 S kworker/u:1
u0_a75 17448 264 1664604 115456 ffffffff b6f9fbd8 S com.google.android.apps.plus
root 17703 2 0 0 c01c0038 00000000 S kworker/0:0
root 17814 2 0 0 c0296ea4 00000000 S flush-179:0
root 17880 2 0 0 c01c0038 00000000 S kworker/2:0
root 18119 2 0 0 c01c0038 00000000 S kworker/3:0
root 18298 2 0 0 c01c0038 00000000 S kworker/0:2H
u0_a28 18987 264 1575072 75424 ffffffff b6f9fbd8 S com.google.android.googlequicksearchbox:search
root 20502 2 0 0 c01c0038 00000000 S kworker/0:2
root 20512 2 0 0 c01c0038 00000000 S kworker/u:5
root 20516 2 0 0 c01c0038 00000000 S kworker/u:6
u0_a73 20828 264 1603616 68832 ffffffff b6f9fbd8 S com.google.android.music:main
root 21225 2 0 0 c01c0038 00000000 S kworker/1:1
root 22952 2 0 0 c01c0038 00000000 S kworker/3:3
root 23004 2 0 0 c01c0038 00000000 S kworker/2:1
root 23219 2 0 0 c01c0038 00000000 S kworker/u:7
root 23914 2 0 0 c01c0038 00000000 S kworker/u:8
root 23915 2 0 0 c01c0038 00000000 S kworker/u:9
root 23916 2 0 0 c01c0038 00000000 S kworker/u:10
u0_a71 24438 264 1617528 86048 ffffffff b6f9fbd8 S com.google.android.talk
u0_a26 24486 264 1553280 68824 ffffffff b6f9fbd8 S com.android.vending
u0_a45 24568 264 1506056 45420 ffffffff b6f9fbd8 S com.android.gallery3d
u0_a115 24599 264 1514576 45632 ffffffff b6f9fbd8 S org.blackmart.market
u0_a116 24624 264 1508620 47348 ffffffff b6f9fbd8 S com.android.vending.billing.InAppBillingService.LUCK
root 24664 2 0 0 c020b6c0 00000000 S irq/289-
root 24665 2 0 0 c040c424 00000000 D mdss_fb0
u0_a107 24682 264 1512332 48172 ffffffff b6f9fbd8 S com.android.chrome
u0_a80 24703 264 1535404 54780 ffffffff b6f9fbd8 S eu.chainfire.supersu
u0_a102 24741 264 1584844 83992 ffffffff b5b7846c R jackpal.androidterm
root 24772 2 0 0 c01c0038 00000000 S kworker/0:1
u0_a5 24791 264 1499564 44676 ffffffff b6f9fbd8 S com.android.cellbroadcastreceiver
u0_a95 24813 264 1558800 70464 ffffffff b6f9fbd8 S de.motain.iliga
root 24932 797 14452 672 ffffffff b6f2948c S daemonsu:10102
root 24935 24932 12404 920 c01aa32c b6f29a84 S daemonsu:10102:24929
root 24939 24935 3188 756 c041a75c b6f05f84 S tmp-mksh
u0_a96 25119 264 1539840 65068 ffffffff b6f9fbd8 S com.ghisler.android.TotalCommander
u0_a51 25150 264 1500656 45708 ffffffff b6f9fbd8 S com.cyanogenmod.lockclock
root 25176 2 0 0 c01c0038 00000000 S kworker/u:4
system 25177 264 1507908 55164 ffffffff b6f9fbd8 S system:ui
u0_a32 25217 264 1539012 65312 ffffffff b6f9fbd8 S com.cyanogenmod.filemanager
u0_a32 25237 25217 3188 700 c0279a54 b6ecef84 S /system/bin/sh
u0_a32 25246 25217 3188 700 c0279a54 b6e90f84 S /system/bin/sh
u0_a46 25344 264 1623280 95640 ffffffff b6f9fbd8 S com.android.htmlviewer
u0_a102 25449 24741 3188 744 c01b9ffc b6f67580 S /system/bin/sh
u0_a102 25483 25449 3188 356 c02829a0 b6eb495c S su
root 25486 24932 14452 1008 c02829a0 b6f2995c S daemonsu:10102:25483
root 25490 25486 3188 744 c01b9ffc b6e8b580 S tmp-mksh
root 25575 25490 4476 724 00000000 b6f31f84 R ps
Click to expand...
Click to collapse
An app called "Disable Service" may help you, I used it to disable some of Google play services and helped my battery alot

Need some info about Chrome installation

Hi,
Can anyone share sizes of files inside OnDeviceHeadSuggestModel folder somewhere in Google Chrome folders?
I don't have rooted Android with me.
Thank you
Code:
-rw------- 1 u0_a222 u0_a222_cache 1824 2023-05-11 20:06 /data/user/0/com.android.chrome/app_chrome/OnDeviceHeadSuggestModel/20230504.530023049.14/_metadata/verified_contents.json
-rw------- 1 u0_a222 u0_a222_cache 1387812 2023-05-11 20:06 /data/user/0/com.android.chrome/app_chrome/OnDeviceHeadSuggestModel/20230504.530023049.14/cr_en-us_2023-05-04_530023049_100000_index.bin
-rw------- 1 u0_a222 u0_a222_cache 66 2023-05-11 20:06 /data/user/0/com.android.chrome/app_chrome/OnDeviceHeadSuggestModel/20230504.530023049.14/manifest.fingerprint
-rw------- 1 u0_a222 u0_a222_cache 102 2023-05-11 20:06 /data/user/0/com.android.chrome/app_chrome/OnDeviceHeadSuggestModel/20230504.530023049.14/manifest.json

Categories

Resources