chomper icon indicating copy to clipboard operation
chomper copied to clipboard

ceair_iOS_branch中也有一个ali vmp,属于是0003开头的那种,经测试报错

Open irabbit666666 opened this issue 11 months ago • 6 comments

`import logging import os import urllib.request from pathlib import Path

from chomper import Chomper from chomper.const import ARCH_ARM64, OS_IOS from chomper.objc import ObjC from chomper.utils import pyobj2nsobj

base_path = os.path.abspath(os.path.dirname(file))

log_format = "%(asctime)s - %(name)s - %(levelname)s: %(message)s" logging.basicConfig( format=log_format, level=logging.INFO, )

logger = logging.getLogger()

def main(): binary_path = "binaries/ios/com.ceair.b2m/ceair_iOS_branch" binary_filepath = os.path.join(base_path, binary_path)

emu = Chomper(
    arch=ARCH_ARM64,
    os_type=OS_IOS,
    rootfs_path=os.path.join(base_path, "rootfs/ios"),
    enable_ui_kit=True,
)
objc = ObjC(emu)

emu.load_module(binary_filepath)

with objc.autorelease_pool():
    # Initialize
    ali_tiger_tally_instance = objc.msg_send("AliTigerTally", "sharedInstance")

    app_key = pyobj2nsobj(emu, "ypWt5wEEQwOEgLM4e12Gl26wHlW6Qj_XOG0-l7p3ju05wOt2jZ0tNkr5he6ei73A2AQQUH2QbJfvfJoKU_rKkdwvHEn75U6xYNgpgVYUVSjxZt1Ks5MdUQoZY_SK-ETAArxOUW1Mhf8uTnvvLUOB9vvT6atg_PEjEf0Svu8KOn8=")
    objc.msg_send(ali_tiger_tally_instance, "initialize:", app_key)

    # vmpSign
    data = pyobj2nsobj(emu, b'{"biClassId":["2","3","4"]}')
    vmp_sign = objc.msg_send(ali_tiger_tally_instance, "vmpSign:", data)
    vmp_sign_str = emu.read_string(objc.msg_send(vmp_sign, "cStringUsingEncoding:", 4))

    logger.info("AliTigerTally vmpSign: %s", vmp_sign_str)

if name == "main": main() `

2024-12-20 13:46:59,302 - chomper.file - INFO: Monitor 'opendir' call: path='/private/var/containers/Bundle/Application/9A5D67E5-5DBF-429A-9000-473A2AE73C69/com.ceair.b2m' 2024-12-20 13:46:59,302 - chomper.file - INFO: Forward path '/private/var/containers/Bundle/Application/9A5D67E5-5DBF-429A-9000-473A2AE73C69/com.ceair.b2m' -> 'D:\iRabbitProject\irabbit_project\ibox-wtoken-server-master-dongfanghangkong\ceair_server\rootfs/ios\private\var\containers\Bundle\Application\43E5FB44-22FC-4DC2-9D9E-E2702A988A2E\com.yourcompany.ProductName' 2024-12-20 13:46:59,302 - chomper.file - INFO: Monitor 'opendir' return: 134219320 2024-12-20 13:46:59,302 - chomper.file - INFO: Monitor 'readdir' call: dirp=134219320 2024-12-20 13:46:59,302 - chomper.file - INFO: Monitor 'readdir' return: 134748160 2024-12-20 13:46:59,303 - chomper.file - INFO: Monitor 'readdir' call: dirp=134219320 2024-12-20 13:46:59,303 - chomper.file - INFO: Monitor 'readdir' return: 0 2024-12-20 13:46:59,303 - chomper.file - INFO: Monitor 'closedir' call: dirp=134219320 2024-12-20 13:46:59,303 - chomper.file - INFO: Monitor 'closedir' return: 0 2024-12-20 13:46:59,305 - chomper.core - INFO: System call 0x152 invoked from libsystem_kernel.dylib!0x1ac331304 2024-12-20 13:46:59,305 - chomper.file - INFO: Monitor 'stat' call: path='/private/var/containers/Bundle/Application/9A5D67E5-5DBF-429A-9000-473A2AE73C69/com.ceair.b2m/Wrapper' 2024-12-20 13:46:59,305 - chomper.file - INFO: Map path '/private/var/containers/Bundle/Application/9A5D67E5-5DBF-429A-9000-473A2AE73C69/com.ceair.b2m/Wrapper' -> 'D:\iRabbitProject\irabbit_project\ibox-wtoken-server-master-dongfanghangkong\ceair_server\rootfs\ios\private\var\containers\Bundle\Application\9A5D67E5-5DBF-429A-9000-473A2AE73C69\com.ceair.b2m\Wrapper' 2024-12-20 13:46:59,306 - chomper.core - INFO: System call 0x152 invoked from libsystem_kernel.dylib!0x1ac331304 2024-12-20 13:46:59,306 - chomper.file - INFO: Monitor 'stat' call: path='/private/var/containers/Bundle/Application/9A5D67E5-5DBF-429A-9000-473A2AE73C69/com.ceair.b2m' 2024-12-20 13:46:59,307 - chomper.file - INFO: Forward path '/private/var/containers/Bundle/Application/9A5D67E5-5DBF-429A-9000-473A2AE73C69/com.ceair.b2m' -> 'D:\iRabbitProject\irabbit_project\ibox-wtoken-server-master-dongfanghangkong\ceair_server\rootfs/ios\private\var\containers\Bundle\Application\43E5FB44-22FC-4DC2-9D9E-E2702A988A2E\com.yourcompany.ProductName' 2024-12-20 13:46:59,307 - chomper.file - INFO: Monitor 'stat' return 2024-12-20 13:46:59,308 - chomper.file - INFO: Monitor 'opendir' call: path='/private/var/containers/Bundle/Application/9A5D67E5-5DBF-429A-9000-473A2AE73C69/com.ceair.b2m' 2024-12-20 13:46:59,308 - chomper.file - INFO: Forward path '/private/var/containers/Bundle/Application/9A5D67E5-5DBF-429A-9000-473A2AE73C69/com.ceair.b2m' -> 'D:\iRabbitProject\irabbit_project\ibox-wtoken-server-master-dongfanghangkong\ceair_server\rootfs/ios\private\var\containers\Bundle\Application\43E5FB44-22FC-4DC2-9D9E-E2702A988A2E\com.yourcompany.ProductName' 2024-12-20 13:46:59,308 - chomper.file - INFO: Monitor 'opendir' return: 134219320 2024-12-20 13:46:59,308 - chomper.file - INFO: Monitor 'readdir' call: dirp=134219320 2024-12-20 13:46:59,308 - chomper.file - INFO: Monitor 'readdir' return: 134748160 2024-12-20 13:46:59,309 - chomper.file - INFO: Monitor 'readdir' call: dirp=134219320 2024-12-20 13:46:59,309 - chomper.file - INFO: Monitor 'readdir' return: 0 2024-12-20 13:46:59,309 - chomper.file - INFO: Monitor 'closedir' call: dirp=134219320 2024-12-20 13:46:59,309 - chomper.file - INFO: Monitor 'closedir' return: 0 2024-12-20 13:46:59,311 - chomper.core - INFO: System call 0x152 invoked from libsystem_kernel.dylib!0x1ac331304 2024-12-20 13:46:59,311 - chomper.file - INFO: Monitor 'stat' call: path='/private/var/containers/Bundle/Application/9A5D67E5-5DBF-429A-9000-473A2AE73C69/com.ceair.b2m/ceair_iOS_branch' 2024-12-20 13:46:59,311 - chomper.file - INFO: Forward path '/private/var/containers/Bundle/Application/9A5D67E5-5DBF-429A-9000-473A2AE73C69/com.ceair.b2m/ceair_iOS_branch' -> 'D:\iRabbitProject\irabbit_project\ibox-wtoken-server-master-dongfanghangkong\ceair_server\binaries/ios/com.ceair.b2m/ceair_iOS_branch' 2024-12-20 13:46:59,311 - chomper.file - INFO: Monitor 'stat' return 2024-12-20 13:46:59,311 - chomper.core - INFO: System call 0x5 invoked from libsystem_kernel.dylib!0x1ac32e2f0 2024-12-20 13:46:59,311 - chomper.file - INFO: Monitor 'open' call: path='/private/var/containers/Bundle/Application/9A5D67E5-5DBF-429A-9000-473A2AE73C69/com.ceair.b2m/ceair_iOS_branch', flags=32768 2024-12-20 13:46:59,311 - chomper.file - INFO: Forward path '/private/var/containers/Bundle/Application/9A5D67E5-5DBF-429A-9000-473A2AE73C69/com.ceair.b2m/ceair_iOS_branch' -> 'D:\iRabbitProject\irabbit_project\ibox-wtoken-server-master-dongfanghangkong\ceair_server\binaries/ios/com.ceair.b2m/ceair_iOS_branch' 2024-12-20 13:46:59,311 - chomper.file - INFO: Monitor 'open' return: 3 2024-12-20 13:46:59,311 - chomper.core - INFO: System call 0x3 invoked from libsystem_kernel.dylib!0x1ac330cc4 2024-12-20 13:46:59,311 - chomper.file - INFO: Monitor 'read' call: fd=3, size=512 2024-12-20 13:46:59,311 - chomper.file - INFO: Monitor 'read' return 2024-12-20 13:46:59,312 - chomper.core - INFO: System call 0x6 invoked from libsystem_kernel.dylib!0x1ac32f89c 2024-12-20 13:46:59,312 - chomper.file - INFO: Monitor 'close' call: fd=3 2024-12-20 13:46:59,312 - chomper.file - INFO: Monitor 'close' return: 0 2024-12-20 13:46:59,314 - chomper.core - INFO: Call symbol "__CFBundleCreateInfoDictFromData" 2024-12-20 13:46:59,315 - chomper.core - INFO: Start emulate at CoreFoundation!0x180454814 2024-12-20 13:46:59,354 - chomper.core - INFO: System call 0x154 invoked from libsystem_kernel.dylib!0x1ac330544 2024-12-20 13:46:59,355 - chomper.file - INFO: Monitor 'lstat' call: path='/private' 2024-12-20 13:46:59,356 - chomper.core - INFO: System call 0x152 invoked from libsystem_kernel.dylib!0x1ac331304 2024-12-20 13:46:59,356 - chomper.file - INFO: Monitor 'stat' call: path='/var/containers/Bundle/Application/9A5D67E5-5DBF-429A-9000-473A2AE73C69/com.ceair.b2m' 2024-12-20 13:46:59,357 - chomper.file - INFO: Map path '/var/containers/Bundle/Application/9A5D67E5-5DBF-429A-9000-473A2AE73C69/com.ceair.b2m' -> 'D:\iRabbitProject\irabbit_project\ibox-wtoken-server-master-dongfanghangkong\ceair_server\rootfs\ios\var\containers\Bundle\Application\9A5D67E5-5DBF-429A-9000-473A2AE73C69\com.ceair.b2m' 2024-12-20 13:46:59,358 - chomper.core - INFO: System call 0x152 invoked from libsystem_kernel.dylib!0x1ac331304 2024-12-20 13:46:59,358 - chomper.file - INFO: Monitor 'stat' call: path='/private/var/containers/Bundle/Application/9A5D67E5-5DBF-429A-9000-473A2AE73C69/com.ceair.b2m' 2024-12-20 13:46:59,358 - chomper.file - INFO: Forward path '/private/var/containers/Bundle/Application/9A5D67E5-5DBF-429A-9000-473A2AE73C69/com.ceair.b2m' -> 'D:\iRabbitProject\irabbit_project\ibox-wtoken-server-master-dongfanghangkong\ceair_server\rootfs/ios\private\var\containers\Bundle\Application\43E5FB44-22FC-4DC2-9D9E-E2702A988A2E\com.yourcompany.ProductName' 2024-12-20 13:46:59,358 - chomper.file - INFO: Monitor 'stat' return 2024-12-20 13:46:59,359 - chomper.core - INFO: System call 0x21 invoked from libsystem_kernel.dylib!0x1ac32f52c 2024-12-20 13:46:59,359 - chomper.file - INFO: Monitor 'access' call: path='/private/var/containers/Bundle/Application/9A5D67E5-5DBF-429A-9000-473A2AE73C69/com.ceair.b2m', mode=4 2024-12-20 13:46:59,359 - chomper.file - INFO: Forward path '/private/var/containers/Bundle/Application/9A5D67E5-5DBF-429A-9000-473A2AE73C69/com.ceair.b2m' -> 'D:\iRabbitProject\irabbit_project\ibox-wtoken-server-master-dongfanghangkong\ceair_server\rootfs/ios\private\var\containers\Bundle\Application\43E5FB44-22FC-4DC2-9D9E-E2702A988A2E\com.yourcompany.ProductName' 2024-12-20 13:46:59,359 - chomper.file - INFO: Monitor 'access' return: 0 2024-12-20 13:46:59,372 - chomper.core - INFO: Call symbol "_sel_registerName" 2024-12-20 13:46:59,373 - chomper.core - INFO: Start emulate at libobjc.A.dylib!0x1948074a4 2024-12-20 13:46:59,373 - chomper.core - INFO: Call symbol "_objc_msgSend" 2024-12-20 13:46:59,373 - chomper.core - INFO: Start emulate at libobjc.A.dylib!0x1947ec460 2024-12-20 13:46:59,375 - chomper.core - INFO: Call symbol "_sel_registerName" 2024-12-20 13:46:59,376 - chomper.core - INFO: Start emulate at libobjc.A.dylib!0x1948074a4 2024-12-20 13:46:59,376 - chomper.core - INFO: Call symbol "_objc_msgSend" 2024-12-20 13:46:59,376 - chomper.core - INFO: Start emulate at libobjc.A.dylib!0x1947ec460 2024-12-20 13:46:59,378 - chomper.core - INFO: Call symbol "_sel_registerName" 2024-12-20 13:46:59,379 - chomper.core - INFO: Start emulate at libobjc.A.dylib!0x1948074a4 2024-12-20 13:46:59,379 - chomper.core - INFO: Call symbol "_objc_msgSend" 2024-12-20 13:46:59,380 - chomper.core - INFO: Start emulate at libobjc.A.dylib!0x1947ec460 2024-12-20 13:46:59,384 - chomper.core - INFO: Call symbol "_CFDataCreate" 2024-12-20 13:46:59,385 - chomper.core - INFO: Start emulate at CoreFoundation!0x1803ae524 2024-12-20 13:46:59,398 - chomper.core - ERROR: Emulator crashed from: libcorecrypto.dylib!0x1c0071d54 <- libc++abi.dylib!0x1948eeba0 <- libobjc.A.dylib!0x1947f0c78 <- Foundation!0x1816afdf4 <- Foundation!0x181684fe4 <- Foundation!0x18160f098 <- Foundation!0x181658538 <- Foundation!0x181658b0c <- ceair_iOS_branch!0x10299d404 <- ceair_iOS_branch!0x1029b7da8 <- ceair_iOS_branch!0x1029b5390 <- ceair_iOS_branch!0x1029b51b8 <- ceair_iOS_branch!0x1029e08f4 2024-12-20 13:46:59,398 - chomper.core - INFO: Call symbol "_objc_autoreleasePoolPop" 2024-12-20 13:46:59,399 - chomper.core - INFO: Start emulate at libobjc.A.dylib!0x19480f380 Traceback (most recent call last): File "D:\iRabbitProject\irabbit_project\ibox-wtoken-server-master-dongfanghangkong\ceair_server\chomper\core.py", line 215, in _start_emulate self.uc.emu_start(address, stop_addr) File "C:\Users\Administrator\AppData\Local\Programs\Python\Python39\lib\site-packages\unicorn\unicorn_py3\unicorn.py", line 626, in emu_start raise UcError(status) unicorn.unicorn_py3.unicorn.UcError: Invalid memory fetch (UC_ERR_FETCH_UNMAPPED)

The above exception was the direct cause of the following exception:

Traceback (most recent call last): File "D:\iRabbitProject\irabbit_project\ibox-wtoken-server-master-dongfanghangkong\ceair_server\example_ios_ali_vmp_sign.py", line 52, in main() File "D:\iRabbitProject\irabbit_project\ibox-wtoken-server-master-dongfanghangkong\ceair_server\example_ios_ali_vmp_sign.py", line 41, in main objc.msg_send(ali_tiger_tally_instance, "initialize:", app_key) File "D:\iRabbitProject\irabbit_project\ibox-wtoken-server-master-dongfanghangkong\ceair_server\chomper\objc.py", line 62, in msg_send return self.emu.call_symbol( File "D:\iRabbitProject\irabbit_project\ibox-wtoken-server-master-dongfanghangkong\ceair_server\chomper\core.py", line 765, in call_symbol return self._start_emulate(address, *args, va_list=va_list) File "D:\iRabbitProject\irabbit_project\ibox-wtoken-server-master-dongfanghangkong\ceair_server\chomper\core.py", line 218, in _start_emulate self.crash("Unknown reason", exc=e) File "D:\iRabbitProject\irabbit_project\ibox-wtoken-server-master-dongfanghangkong\ceair_server\chomper\core.py", line 369, in crash raise EmulatorCrashed(f"{message} at {self.debug_symbol(address)}") from exc chomper.exceptions.EmulatorCrashed: Unknown reason at libcorecrypto.dylib!0x1c0071d54

irabbit666666 avatar Dec 20 '24 05:12 irabbit666666

确实存在一些问题,发生在 -[AliTigerTally initialize:] 的调用中:

  1. chomper 默认使 _SecItemCopyMatching 返回一个空对象而非 nil, 导致程序对空数据对象调用了 +[NSKeyedUnarchiver unarchiveObjectWithData:] ,进而引发错误。这个后面会考虑一下调整默认行为。
  2. 系统调用 lseek 未处理 offset 为负数的情况。(已修复:#118 )
  3. 调用了 socket,该函数暂未支持。

可以暂时通过 Hook 解决,覆盖掉 chomper 默认的 _SecItemCopyMatching 行为,直接返回空值,socket 也直接 Hook 掉。

from chomper.os.ios.hooks import register_hook


@register_hook("_SecItemCopyMatching")
def hook_sec_item_copy_matching(uc, address, size, user_data):
    return 0


@register_hook("_socket")
def hook_socket(uc, address, size, user_data):
    return 0

在脚本中加入上面的 Hook 后,就可以正常执行出结果。

sledgeh4w avatar Dec 20 '24 13:12 sledgeh4w

是的,可以强行跑通,但是风控数据估计就混乱了,导致无法通过检测

SecItemCopyMatching 是尝试从钥匙串读取 com.ceair.b2m-deviceToken, 应该就是一个缓存的逻辑。

socket 的那处调用,我又看了一下,倒有可能标记了一些信息。函数地址在 0x10299A48C,调用 socket 的位置在 0x10299A4EC,函数结果是判断 socket 的返回值是否等于 -1,所以只要不是 -1 理论上都一样。

sledgeh4w avatar Dec 20 '24 16:12 sledgeh4w

研究明白了,我自己搭建了一个waf来测试,把模拟器等检测全部打开,其他的没问题,但是能被检测到应用二次打包修改,也就是读取签名的时候不能得到跟原app一样的数据,我把系统文件都复制过去也不行,建议补充一下ios系统里获取app签名值的地方,类似安卓的signature那种 测试接口: https://app.ceair.com/sale/booking 其他接口没开二次重打包检测 https://app.ceair.com/sale/booking 这个接口开了二次重打包检测

日志(跑出来能过除了https://app.ceair.com/sale/booking外的接口): 2024-12-21 04:16:56,436 - chomper.core - INFO: Load module "libsystem_platform.dylib" 2024-12-21 04:16:56,437 - chomper.core - INFO: Hook export symbol "_os_unfair_lock_assert_owner" at 0x10003714 2024-12-21 04:16:56,437 - chomper.core - INFO: Hook import symbol "_mach_vm_allocate" at 0x1d973a778 2024-12-21 04:16:56,438 - chomper.core - INFO: Hook import symbol "_mach_vm_deallocate" at 0x1d973a780 2024-12-21 04:16:56,442 - chomper.core - INFO: Load module "libsystem_kernel.dylib" 2024-12-21 04:16:56,445 - chomper.core - INFO: Hook export symbol "_malloc" at 0x285015a4 2024-12-21 04:16:56,445 - chomper.core - INFO: Hook export symbol "_free" at 0x285015b8 2024-12-21 04:16:56,445 - chomper.core - INFO: Hook export symbol "_realloc" at 0x285015cc 2024-12-21 04:16:56,445 - chomper.core - INFO: Hook export symbol "___sysctlbyname" at 0x285281c0 2024-12-21 04:16:56,445 - chomper.core - INFO: Hook export symbol "_mach_vm_allocate" at 0x2850e3c8 2024-12-21 04:16:56,445 - chomper.core - INFO: Hook export symbol "_mach_vm_deallocate" at 0x2850e470 2024-12-21 04:16:56,464 - chomper.core - INFO: Load module "libsystem_c.dylib" 2024-12-21 04:16:56,468 - chomper.core - INFO: Hook export symbol "___srefill" at 0x5d33f6c8 2024-12-21 04:16:56,468 - chomper.core - INFO: Hook export symbol "_closedir" at 0x5d323c58 2024-12-21 04:16:56,468 - chomper.core - INFO: Hook export symbol "_localtime_r" at 0x5d34d0f0 2024-12-21 04:16:56,468 - chomper.core - INFO: Hook export symbol "_opendir" at 0x5d3297b8 2024-12-21 04:16:56,468 - chomper.core - INFO: Hook export symbol "_random" at 0x5d358d88 2024-12-21 04:16:56,468 - chomper.core - INFO: Hook export symbol "_readdir" at 0x5d32a3d4 2024-12-21 04:16:56,468 - chomper.core - INFO: Hook export symbol "_srandom" at 0x5d358cb4 2024-12-21 04:16:56,468 - chomper.core - INFO: Hook export symbol "_time" at 0x5d32c530 2024-12-21 04:16:56,469 - chomper.core - INFO: Hook import symbol "_calloc" at 0x1d298fec8 2024-12-21 04:16:56,469 - chomper.core - INFO: Hook import symbol "_dlsym" at 0x1d298ff40 2024-12-21 04:16:56,469 - chomper.core - INFO: Hook import symbol "_getpwuid" at 0x1d2990048 2024-12-21 04:16:56,469 - chomper.core - INFO: Hook import symbol "_getpwuid_r" at 0x1d2990050 2024-12-21 04:16:56,469 - chomper.core - INFO: Hook import symbol "_pthread_mutex_lock" at 0x1d29902a0 2024-12-21 04:16:56,469 - chomper.core - INFO: Hook import symbol "_pthread_rwlock_rdlock" at 0x1d29902c8 2024-12-21 04:16:56,469 - chomper.core - INFO: Hook import symbol "_pthread_rwlock_unlock" at 0x1d29902d0 2024-12-21 04:16:56,469 - chomper.core - INFO: Hook import symbol "_pthread_rwlock_wrlock" at 0x1d29902d8 2024-12-21 04:16:56,469 - chomper.core - INFO: Hook import symbol "_pthread_self" at 0x1d29902e0 2024-12-21 04:16:56,516 - chomper.core - INFO: Load module "libsystem_pthread.dylib" 2024-12-21 04:16:56,517 - chomper.core - INFO: Hook export symbol "_pthread_rwlock_rdlock$VARIANT$armv81" at 0xb5300a50 2024-12-21 04:16:56,517 - chomper.core - INFO: Hook export symbol "_pthread_rwlock_unlock$VARIANT$armv81" at 0xb5300cc8 2024-12-21 04:16:56,517 - chomper.core - INFO: Hook export symbol "_pthread_rwlock_wrlock$VARIANT$armv81" at 0xb5300e6c 2024-12-21 04:16:56,517 - chomper.core - INFO: Hook export symbol "_pthread_self" at 0xb530d1d4 2024-12-21 04:16:56,524 - chomper.core - INFO: Load module "libsystem_info.dylib" 2024-12-21 04:16:56,526 - chomper.core - INFO: Hook export symbol "_getpwuid" at 0xcd807510 2024-12-21 04:16:56,527 - chomper.core - INFO: Hook export symbol "_getpwuid_r" at 0xcd809a44 2024-12-21 04:16:56,527 - chomper.core - INFO: Hook import symbol "_calloc" at 0x1d298e978 2024-12-21 04:16:56,527 - chomper.core - INFO: Hook import symbol "_dispatch_async" at 0x1d298e9a0 2024-12-21 04:16:56,527 - chomper.core - INFO: Hook import symbol "_dlsym" at 0x1d298e9d0 2024-12-21 04:16:56,527 - chomper.core - INFO: Hook import symbol "_malloc_default_zone" at 0x1d298eb58 2024-12-21 04:16:56,527 - chomper.core - INFO: Hook import symbol "_malloc_zone_calloc" at 0x1d298eb70 2024-12-21 04:16:56,527 - chomper.core - INFO: Hook import symbol "_malloc_zone_from_ptr" at 0x1d298eb78 2024-12-21 04:16:56,527 - chomper.core - INFO: Hook import symbol "_malloc_zone_realloc" at 0x1d298eb80 2024-12-21 04:16:56,527 - chomper.core - INFO: Hook import symbol "_os_log_create" at 0x1d298ebf8 2024-12-21 04:16:56,527 - chomper.core - INFO: Hook import symbol "_os_log_type_enabled" at 0x1d298ec00 2024-12-21 04:16:56,527 - chomper.core - INFO: Hook import symbol "_pthread_mutex_lock" at 0x1d298ec58 2024-12-21 04:16:56,541 - chomper.core - INFO: Load module "libsystem_darwin.dylib" 2024-12-21 04:16:56,542 - chomper.core - INFO: Hook import symbol "_calloc" at 0x1d9737610 2024-12-21 04:16:56,547 - chomper.core - INFO: Load module "libsystem_featureflags.dylib" 2024-12-21 04:16:56,550 - chomper.core - INFO: Load module "libsystem_m.dylib" 2024-12-21 04:16:56,566 - chomper.core - INFO: Load module "libcorecrypto.dylib" Command 'SUB_CLIENT' (20) not parsed! 2024-12-21 04:16:56,570 - chomper.core - INFO: Hook import symbol "_calloc" at 0x1d4894108 2024-12-21 04:16:56,570 - chomper.core - INFO: Hook import symbol "_os_log_create" at 0x1d4894178 2024-12-21 04:16:56,571 - chomper.core - INFO: Hook import symbol "_os_log_type_enabled" at 0x1d4894188 2024-12-21 04:16:56,575 - chomper.core - INFO: Load module "libcommonCrypto.dylib" 2024-12-21 04:16:56,577 - chomper.core - INFO: Hook import symbol "_dyld_program_sdk_at_least" at 0x1d972fc00 2024-12-21 04:16:56,577 - chomper.core - INFO: Hook import symbol "_os_log_type_enabled" at 0x1d972fc48 2024-12-21 04:16:56,583 - chomper.core - INFO: Load module "libc++abi.dylib" 2024-12-21 04:16:56,586 - chomper.core - INFO: Hook import symbol "_calloc" at 0x1d3d02b90 2024-12-21 04:16:56,586 - chomper.core - INFO: Hook import symbol "_dlsym" at 0x1d3d02ba0 2024-12-21 04:16:56,586 - chomper.core - INFO: Hook import symbol "_posix_memalign" at 0x1d3d02be0 2024-12-21 04:16:56,586 - chomper.core - INFO: Hook import symbol "_pthread_mutex_lock" at 0x1d3d02c10 2024-12-21 04:16:56,597 - chomper.core - INFO: Load module "libc++.1.dylib" 2024-12-21 04:16:56,605 - chomper.core - INFO: Hook import symbol "_dlsym" at 0x1d3d009b8 2024-12-21 04:16:56,606 - chomper.core - INFO: Hook import symbol "_pthread_mutex_lock" at 0x1d3d00b20 2024-12-21 04:16:56,642 - chomper.core - INFO: Load module "libmacho.dylib" 2024-12-21 04:16:56,646 - chomper.core - INFO: Load module "libdyld.dylib" 2024-12-21 04:16:56,649 - chomper.core - INFO: Hook export symbol "_dlsym" at 0x27f9056e4 2024-12-21 04:16:56,649 - chomper.core - INFO: Hook export symbol "_dyld_program_sdk_at_least" at 0x27f904f40 2024-12-21 04:16:56,650 - chomper.core - INFO: Hook import symbol "_malloc_size" at 0x1da049440 2024-12-21 04:16:56,650 - chomper.core - INFO: Hook import symbol "_calloc" at 0x1d1965cb8 2024-12-21 04:16:56,650 - chomper.core - INFO: Hook import symbol "_dispatch_async" at 0x1d1965d08 2024-12-21 04:16:56,650 - chomper.core - INFO: Hook import symbol "_pthread_mutex_lock" at 0x1d1965e80 2024-12-21 04:16:56,672 - chomper.core - INFO: Load module "libobjc.A.dylib" 2024-12-21 04:16:56,780 - chomper.core - INFO: Hook import symbol "_calloc" at 0x1d3cf2bf0 2024-12-21 04:16:56,780 - chomper.core - INFO: Hook import symbol "_malloc_default_zone" at 0x1d3cf2cb0 2024-12-21 04:16:56,780 - chomper.core - INFO: Hook import symbol "_malloc_size" at 0x1d3cf2cb8 2024-12-21 04:16:56,780 - chomper.core - INFO: Hook import symbol "_malloc_zone_calloc" at 0x1d3cf2cc8 2024-12-21 04:16:56,780 - chomper.core - INFO: Hook import symbol "_malloc_zone_from_ptr" at 0x1d3cf2cd0 2024-12-21 04:16:56,780 - chomper.core - INFO: Hook import symbol "_malloc_zone_malloc" at 0x1d3cf2cd8 2024-12-21 04:16:56,780 - chomper.core - INFO: Hook import symbol "_malloc_zone_memalign" at 0x1d3cf2ce0 2024-12-21 04:16:56,780 - chomper.core - INFO: Hook import symbol "_posix_memalign" at 0x1d3cf2d48 2024-12-21 04:16:56,780 - chomper.core - INFO: Hook import symbol "_pthread_mutex_lock" at 0x1d3cf2d80 2024-12-21 04:16:56,799 - chomper.core - INFO: Call symbol "__ZL9protocolsv" 2024-12-21 04:16:56,799 - chomper.core - INFO: Start emulate at libobjc.A.dylib!0x1947fb630 2024-12-21 04:16:56,801 - chomper.core - INFO: Call symbol "__objc_init" 2024-12-21 04:16:56,801 - chomper.core - INFO: Start emulate at libobjc.A.dylib!0x19480ae0c 2024-12-21 04:16:56,801 - chomper.core - INFO: System call 0x147 invoked from libsystem_kernel.dylib!0x1ac330364 2024-12-21 04:16:56,802 - chomper.core - INFO: System call 0x10A invoked from libsystem_kernel.dylib!0x1ac32ef60 2024-12-21 04:16:56,803 - chomper.core - INFO: System call 0xFFFFFFFFFFFFFFE6 invoked from libsystem_kernel.dylib!0x1ac30b614 2024-12-21 04:16:56,803 - chomper.core - INFO: System call 0xFFFFFFFFFFFFFFE1 invoked from libsystem_kernel.dylib!0x1ac30b644 2024-12-21 04:16:56,803 - chomper.core - INFO: Call symbol "_map_images" 2024-12-21 04:16:56,804 - chomper.core - INFO: Start emulate at libobjc.A.dylib!0x1947f9dcc 2024-12-21 04:16:56,805 - chomper.core - INFO: System call 0xFFFFFFFFFFFFFFA7 invoked from libsystem_kernel.dylib!0x1ac30b7ac 2024-12-21 04:16:56,805 - chomper.core - INFO: System call 0xFFFFFFFD invoked from libsystem_kernel.dylib!0x1ac30a9f0 2024-12-21 04:16:56,809 - chomper.core - INFO: Call symbol "_load_images" 2024-12-21 04:16:56,809 - chomper.core - INFO: Start emulate at libobjc.A.dylib!0x1947f9eac 2024-12-21 04:16:56,812 - chomper.core - INFO: Load module "libdispatch.dylib" 2024-12-21 04:16:56,819 - chomper.core - INFO: Hook export symbol "_dispatch_resume" at 0x32d35e5a8 2024-12-21 04:16:56,821 - chomper.core - INFO: Hook import symbol "_calloc" at 0x1d1950190 2024-12-21 04:16:56,821 - chomper.core - INFO: Hook import symbol "_malloc_engaged_nano" at 0x1d1950358 2024-12-21 04:16:56,821 - chomper.core - INFO: Hook import symbol "_posix_memalign" at 0x1d1950418 2024-12-21 04:16:56,883 - chomper.core - INFO: Call symbol "_map_images" 2024-12-21 04:16:56,884 - chomper.core - INFO: Start emulate at libobjc.A.dylib!0x1947f9dcc 2024-12-21 04:16:56,884 - chomper.core - INFO: System call 0xFFFFFFFD invoked from libsystem_kernel.dylib!0x1ac30a9f0 2024-12-21 04:16:56,885 - chomper.core - INFO: Call symbol "_load_images" 2024-12-21 04:16:56,886 - chomper.core - INFO: Start emulate at libobjc.A.dylib!0x1947f9eac 2024-12-21 04:16:56,887 - chomper.core - INFO: Load module "libsystem_blocks.dylib" 2024-12-21 04:16:56,890 - chomper.core - INFO: Call symbol "_map_images" 2024-12-21 04:16:56,891 - chomper.core - INFO: Start emulate at libobjc.A.dylib!0x1947f9dcc 2024-12-21 04:16:56,891 - chomper.core - INFO: System call 0xFFFFFFFD invoked from libsystem_kernel.dylib!0x1ac30a9f0 2024-12-21 04:16:56,891 - chomper.core - INFO: Call symbol "_load_images" 2024-12-21 04:16:56,891 - chomper.core - INFO: Start emulate at libobjc.A.dylib!0x1947f9eac 2024-12-21 04:16:56,892 - chomper.core - INFO: Load module "libsystem_trace.dylib" 2024-12-21 04:16:56,894 - chomper.core - INFO: Hook export symbol "__os_activity_initiate" at 0x3a6a04ab0 2024-12-21 04:16:56,894 - chomper.core - INFO: Hook export symbol "_os_log_create" at 0x3a6a0cbec 2024-12-21 04:16:56,894 - chomper.core - INFO: Hook export symbol "_os_log_type_enabled" at 0x3a6a0d758 2024-12-21 04:16:56,895 - chomper.core - INFO: Hook import symbol "_calloc" at 0x1d40d20b8 2024-12-21 04:16:56,895 - chomper.core - INFO: Hook import symbol "_dispatch_async" at 0x1d40d2128 2024-12-21 04:16:56,895 - chomper.core - INFO: Hook import symbol "_notify_register_dispatch" at 0x1d40d22f8 2024-12-21 04:16:56,905 - chomper.core - INFO: Call symbol "_map_images" 2024-12-21 04:16:56,906 - chomper.core - INFO: Start emulate at libobjc.A.dylib!0x1947f9dcc 2024-12-21 04:16:56,906 - chomper.core - INFO: System call 0xFFFFFFFD invoked from libsystem_kernel.dylib!0x1ac30a9f0 2024-12-21 04:16:56,906 - chomper.core - INFO: Call symbol "_load_images" 2024-12-21 04:16:56,906 - chomper.core - INFO: Start emulate at libobjc.A.dylib!0x1947f9eac 2024-12-21 04:16:56,907 - chomper.core - INFO: Load module "libsystem_sandbox.dylib" 2024-12-21 04:16:56,908 - chomper.core - INFO: Hook import symbol "_calloc" at 0x1d973abd8 2024-12-21 04:16:56,911 - chomper.core - INFO: Call symbol "_map_images" 2024-12-21 04:16:56,911 - chomper.core - INFO: Start emulate at libobjc.A.dylib!0x1947f9dcc 2024-12-21 04:16:56,911 - chomper.core - INFO: Call symbol "_load_images" 2024-12-21 04:16:56,911 - chomper.core - INFO: Start emulate at libobjc.A.dylib!0x1947f9eac 2024-12-21 04:16:56,912 - chomper.core - INFO: Load module "libnetwork.dylib" 2024-12-21 04:16:56,943 - chomper.core - INFO: Hook import symbol "_calloc" at 0x1d1c5c360 2024-12-21 04:16:56,943 - chomper.core - INFO: Hook import symbol "_dispatch_async" at 0x1d1c5c418 2024-12-21 04:16:56,943 - chomper.core - INFO: Hook import symbol "_dispatch_resume" at 0x1d1c5c4b0 2024-12-21 04:16:56,943 - chomper.core - INFO: Hook import symbol "_malloc_zone_calloc" at 0x1d1c5c7f0 2024-12-21 04:16:56,943 - chomper.core - INFO: Hook import symbol "_malloc_zone_free" at 0x1d1c5c7f8 2024-12-21 04:16:56,944 - chomper.core - INFO: Hook import symbol "_malloc_zone_memalign" at 0x1d1c5c800 2024-12-21 04:16:56,944 - chomper.core - INFO: Hook import symbol "_notify_register_dispatch" at 0x1d1c5c9d0 2024-12-21 04:16:56,944 - chomper.core - INFO: Hook import symbol "_posix_memalign" at 0x1d1c5cd70 2024-12-21 04:16:56,944 - chomper.core - INFO: Hook import symbol "_pthread_mutex_lock" at 0x1d1c5cd90 2024-12-21 04:16:56,944 - chomper.core - INFO: Hook import symbol "_pthread_rwlock_rdlock" at 0x1d1c5cda8 2024-12-21 04:16:56,944 - chomper.core - INFO: Hook import symbol "_pthread_rwlock_unlock" at 0x1d1c5cdb0 2024-12-21 04:16:56,944 - chomper.core - INFO: Hook import symbol "_pthread_rwlock_wrlock" at 0x1d1c5cdb8 2024-12-21 04:16:57,564 - chomper.core - INFO: Call symbol "_map_images" 2024-12-21 04:16:57,565 - chomper.core - INFO: Start emulate at libobjc.A.dylib!0x1947f9dcc 2024-12-21 04:16:57,565 - chomper.core - INFO: System call 0xFFFFFFFD invoked from libsystem_kernel.dylib!0x1ac30a9f0 2024-12-21 04:16:57,565 - chomper.core - INFO: Call symbol "_load_images" 2024-12-21 04:16:57,566 - chomper.core - INFO: Start emulate at libobjc.A.dylib!0x1947f9eac 2024-12-21 04:16:57,567 - chomper.core - INFO: Load module "libicucore.A.dylib" 2024-12-21 04:16:57,823 - chomper.core - INFO: Call symbol "_map_images" 2024-12-21 04:16:57,824 - chomper.core - INFO: Start emulate at libobjc.A.dylib!0x1947f9dcc 2024-12-21 04:16:57,824 - chomper.core - INFO: Call symbol "_load_images" 2024-12-21 04:16:57,824 - chomper.core - INFO: Start emulate at libobjc.A.dylib!0x1947f9eac 2024-12-21 04:16:57,825 - chomper.core - INFO: Load module "libcache.dylib" 2024-12-21 04:16:57,829 - chomper.core - INFO: Hook import symbol "_calloc" at 0x1d972f570 2024-12-21 04:16:57,829 - chomper.core - INFO: Hook import symbol "_dispatch_async" at 0x1d972f578 2024-12-21 04:16:57,829 - chomper.core - INFO: Hook import symbol "_dispatch_resume" at 0x1d972f588 2024-12-21 04:16:57,831 - chomper.core - INFO: Call symbol "_map_images" 2024-12-21 04:16:57,832 - chomper.core - INFO: Start emulate at libobjc.A.dylib!0x1947f9dcc 2024-12-21 04:16:57,832 - chomper.core - INFO: Call symbol "_load_images" 2024-12-21 04:16:57,832 - chomper.core - INFO: Start emulate at libobjc.A.dylib!0x1947f9eac 2024-12-21 04:16:57,832 - chomper.core - INFO: Load module "CoreFoundation" Command 'ROUTINES_64' (26) not parsed! 2024-12-21 04:16:57,862 - chomper.core - INFO: Hook export symbol "-[NSObject(NSObject) doesNotRecognizeSelector:]" at 0x4e372ab30 2024-12-21 04:16:57,862 - chomper.core - INFO: Hook export symbol "+[NSObject(NSObject) doesNotRecognizeSelector:]" at 0x4e372efe4 2024-12-21 04:16:57,862 - chomper.core - INFO: Hook export symbol "__CFBundleResourceLogger" at 0x4e3745658 2024-12-21 04:16:57,862 - chomper.core - INFO: Hook export symbol "__CFBundleCreateInfoDictFromMainExecutable" at 0x4e38016dc 2024-12-21 04:16:57,862 - chomper.core - INFO: Hook export symbol "__CFPrefsClientLog" at 0x4e38338e0 2024-12-21 04:16:57,862 - chomper.core - INFO: Hook export symbol "___CFXPreferencesCopyCurrentApplicationStateWithDeadlockAvoidance" at 0x4e3873f58 2024-12-21 04:16:57,863 - chomper.core - INFO: Hook export symbol "_CFNotificationCenterAddObserver" at 0x4e377b5a4 2024-12-21 04:16:57,863 - chomper.core - INFO: Hook export symbol "_CFNotificationCenterGetLocalCenter" at 0x4e377b228 2024-12-21 04:16:57,863 - chomper.core - INFO: Hook export symbol "_CFNotificationCenterPostNotification" at 0x4e377b46c 2024-12-21 04:16:57,863 - chomper.core - INFO: Hook export symbol "__CFPreferencesCopyAppValueWithContainerAndConfiguration" at 0x4e38745ec 2024-12-21 04:16:57,867 - chomper.core - INFO: Hook import symbol "_calloc" at 0x1d1988658 2024-12-21 04:16:57,868 - chomper.core - INFO: Hook import symbol "_dispatch_async" at 0x1d1988710 2024-12-21 04:16:57,868 - chomper.core - INFO: Hook import symbol "_dispatch_resume" at 0x1d1988778 2024-12-21 04:16:57,868 - chomper.core - INFO: Hook import symbol "_malloc_default_zone" at 0x1d1988a80 2024-12-21 04:16:57,868 - chomper.core - INFO: Hook import symbol "_malloc_good_size" at 0x1d1988a88 2024-12-21 04:16:57,868 - chomper.core - INFO: Hook import symbol "_malloc_size" at 0x1d1988a90 2024-12-21 04:16:57,868 - chomper.core - INFO: Hook import symbol "_malloc_zone_calloc" at 0x1d1988a98 2024-12-21 04:16:57,868 - chomper.core - INFO: Hook import symbol "_malloc_zone_free" at 0x1d1988aa0 2024-12-21 04:16:57,868 - chomper.core - INFO: Hook import symbol "_malloc_zone_malloc" at 0x1d1988aa8 2024-12-21 04:16:57,868 - chomper.core - INFO: Hook import symbol "_malloc_zone_memalign" at 0x1d1988ab0 2024-12-21 04:16:57,868 - chomper.core - INFO: Hook import symbol "_malloc_zone_realloc" at 0x1d1988ab8 2024-12-21 04:16:57,868 - chomper.core - INFO: Hook import symbol "_notify_register_dispatch" at 0x1d1988b68 2024-12-21 04:16:57,868 - chomper.core - INFO: Hook import symbol "_pthread_mutex_lock" at 0x1d1988e70 2024-12-21 04:16:58,579 - chomper.core - INFO: Call symbol "_map_images" 2024-12-21 04:16:58,579 - chomper.core - INFO: Start emulate at libobjc.A.dylib!0x1947f9dcc 2024-12-21 04:16:58,580 - chomper.core - INFO: System call 0xFFFFFFFD invoked from libsystem_kernel.dylib!0x1ac30a9f0 2024-12-21 04:16:58,583 - chomper.core - INFO: Call symbol "_load_images" 2024-12-21 04:16:58,583 - chomper.core - INFO: Start emulate at libobjc.A.dylib!0x1947f9eac 2024-12-21 04:16:58,585 - chomper.core - INFO: Load module "CFNetwork" 2024-12-21 04:16:58,604 - chomper.core - INFO: Hook import symbol "_SecItemAdd" at 0x1d9a223f8 2024-12-21 04:16:58,604 - chomper.core - INFO: Hook import symbol "_SecItemCopyMatching" at 0x1d9a223f0 2024-12-21 04:16:58,604 - chomper.core - INFO: Hook import symbol "_SecItemDelete" at 0x1d9a22408 2024-12-21 04:16:58,604 - chomper.core - INFO: Hook import symbol "_SecItemUpdate" at 0x1d9a22400 2024-12-21 04:16:58,607 - chomper.core - INFO: Hook import symbol "_NSLog" at 0x1d1c10410 2024-12-21 04:16:58,608 - chomper.core - INFO: Hook import symbol "_calloc" at 0x1d1c10b20 2024-12-21 04:16:58,608 - chomper.core - INFO: Hook import symbol "_dispatch_async" at 0x1d1c10b70 2024-12-21 04:16:58,608 - chomper.core - INFO: Hook import symbol "_dispatch_resume" at 0x1d1c10c78 2024-12-21 04:16:58,608 - chomper.core - INFO: Hook import symbol "_notify_register_dispatch" at 0x1d1c110b0 2024-12-21 04:16:58,609 - chomper.core - INFO: Hook import symbol "_pthread_mutex_lock" at 0x1d1c119c0 2024-12-21 04:16:59,078 - chomper.core - INFO: Call symbol "_map_images" 2024-12-21 04:16:59,079 - chomper.core - INFO: Start emulate at libobjc.A.dylib!0x1947f9dcc 2024-12-21 04:16:59,079 - chomper.core - INFO: System call 0xFFFFFFFD invoked from libsystem_kernel.dylib!0x1ac30a9f0 2024-12-21 04:16:59,082 - chomper.core - INFO: Call symbol "_load_images" 2024-12-21 04:16:59,082 - chomper.core - INFO: Start emulate at libobjc.A.dylib!0x1947f9eac 2024-12-21 04:16:59,083 - chomper.core - INFO: Load module "Foundation" 2024-12-21 04:16:59,143 - chomper.core - INFO: Hook export symbol "_NSLog" at 0x5a4e2b064 2024-12-21 04:16:59,160 - chomper.core - INFO: Hook import symbol "_calloc" at 0x1d1c87a30 2024-12-21 04:16:59,160 - chomper.core - INFO: Hook import symbol "_dispatch_async" at 0x1d1c87bc8 2024-12-21 04:16:59,160 - chomper.core - INFO: Hook import symbol "_dispatch_resume" at 0x1d1c87cb0 2024-12-21 04:16:59,160 - chomper.core - INFO: Hook import symbol "_malloc_default_zone" at 0x1d1c87fc0 2024-12-21 04:16:59,160 - chomper.core - INFO: Hook import symbol "_malloc_good_size" at 0x1d1c87fd0 2024-12-21 04:16:59,160 - chomper.core - INFO: Hook import symbol "_malloc_size" at 0x1d1c87fe0 2024-12-21 04:16:59,161 - chomper.core - INFO: Hook import symbol "_malloc_zone_calloc" at 0x1d1c87fe8 2024-12-21 04:16:59,161 - chomper.core - INFO: Hook import symbol "_malloc_zone_free" at 0x1d1c87ff8 2024-12-21 04:16:59,161 - chomper.core - INFO: Hook import symbol "_malloc_zone_from_ptr" at 0x1d1c88000 2024-12-21 04:16:59,161 - chomper.core - INFO: Hook import symbol "_malloc_zone_malloc" at 0x1d1c88008 2024-12-21 04:16:59,161 - chomper.core - INFO: Hook import symbol "_malloc_zone_realloc" at 0x1d1c88010 2024-12-21 04:16:59,161 - chomper.core - INFO: Hook import symbol "_notify_register_dispatch" at 0x1d1c880f8 2024-12-21 04:16:59,161 - chomper.core - INFO: Hook import symbol "_pthread_mutex_lock" at 0x1d1c884d0 2024-12-21 04:16:59,161 - chomper.core - INFO: Hook import symbol "_pthread_rwlock_rdlock" at 0x1d1c88528 2024-12-21 04:16:59,161 - chomper.core - INFO: Hook import symbol "_pthread_rwlock_unlock" at 0x1d1c88540 2024-12-21 04:16:59,161 - chomper.core - INFO: Hook import symbol "_pthread_rwlock_wrlock" at 0x1d1c88548 2024-12-21 04:16:59,510 - chomper.core - INFO: Call symbol "_map_images" 2024-12-21 04:16:59,511 - chomper.core - INFO: Start emulate at libobjc.A.dylib!0x1947f9dcc 2024-12-21 04:16:59,511 - chomper.core - INFO: System call 0xFFFFFFFD invoked from libsystem_kernel.dylib!0x1ac30a9f0 2024-12-21 04:16:59,516 - chomper.core - INFO: Call symbol "_load_images" 2024-12-21 04:16:59,517 - chomper.core - INFO: Start emulate at libobjc.A.dylib!0x1947f9eac 2024-12-21 04:16:59,518 - chomper.core - INFO: System call 0x19 invoked from libsystem_kernel.dylib!0x1ac33001c 2024-12-21 04:16:59,518 - chomper.core - INFO: System call 0x18 invoked from libsystem_kernel.dylib!0x1ac330224 2024-12-21 04:16:59,518 - chomper.core - INFO: System call 0x14 invoked from libsystem_kernel.dylib!0x1ac32d8b8 2024-12-21 04:16:59,518 - chomper.core - INFO: System call 0xCA invoked from libsystem_kernel.dylib!0x1ac32f1a0 2024-12-21 04:16:59,518 - chomper.core - INFO: System call 0x11E invoked from libsystem_kernel.dylib!0x1ac32d964 2024-12-21 04:16:59,518 - chomper.core - INFO: System call 0x19 invoked from libsystem_kernel.dylib!0x1ac33001c 2024-12-21 04:16:59,518 - chomper.core - INFO: System call 0x2B invoked from libsystem_kernel.dylib!0x1ac32ffcc 2024-12-21 04:16:59,520 - chomper.core - INFO: System call 0xFFFFFFFFFFFFFFF1 invoked from libsystem_kernel.dylib!0x1ac30b59c 2024-12-21 04:16:59,527 - chomper.core - INFO: System call 0xA9 invoked from libsystem_kernel.dylib!0x1ac32f8ec 2024-12-21 04:16:59,527 - chomper.core - INFO: System call 0x150 invoked from libsystem_kernel.dylib!0x1ac32e4dc 2024-12-21 04:16:59,539 - chomper.core - INFO: Load module "Security" 2024-12-21 04:16:59,560 - chomper.core - INFO: Hook export symbol "_SecItemAdd" at 0x604a9f748 2024-12-21 04:16:59,560 - chomper.core - INFO: Hook export symbol "_SecItemCopyMatching" at 0x604a9f8d4 2024-12-21 04:16:59,560 - chomper.core - INFO: Hook export symbol "_SecItemDelete" at 0x604a9fa74 2024-12-21 04:16:59,560 - chomper.core - INFO: Hook export symbol "_SecItemUpdate" at 0x604a9f694 2024-12-21 04:16:59,570 - chomper.core - INFO: Hook import symbol "_MGCopyAnswer" at 0x1d2615668 2024-12-21 04:16:59,570 - chomper.core - INFO: Hook import symbol "_calloc" at 0x1d2615998 2024-12-21 04:16:59,571 - chomper.core - INFO: Hook import symbol "_dispatch_async" at 0x1d2615d90 2024-12-21 04:16:59,571 - chomper.core - INFO: Hook import symbol "_dispatch_resume" at 0x1d2615e00 2024-12-21 04:16:59,571 - chomper.core - INFO: Hook import symbol "_malloc_size" at 0x1d2615f68 2024-12-21 04:16:59,571 - chomper.core - INFO: Hook import symbol "_notify_register_dispatch" at 0x1d2615fd8 2024-12-21 04:16:59,571 - chomper.core - INFO: Hook import symbol "_pthread_mutex_lock" at 0x1d26161c0 2024-12-21 04:16:59,721 - chomper.core - INFO: Call symbol "_map_images" 2024-12-21 04:16:59,721 - chomper.core - INFO: Start emulate at libobjc.A.dylib!0x1947f9dcc 2024-12-21 04:16:59,721 - chomper.core - INFO: System call 0xFFFFFFFD invoked from libsystem_kernel.dylib!0x1ac30a9f0 2024-12-21 04:16:59,722 - chomper.core - INFO: Call symbol "_load_images" 2024-12-21 04:16:59,723 - chomper.core - INFO: Start emulate at libobjc.A.dylib!0x1947f9eac 2024-12-21 04:16:59,724 - chomper.core - INFO: Call symbol "___CFInitialize" 2024-12-21 04:16:59,726 - chomper.core - INFO: Start emulate at CoreFoundation!0x1803f0ab4 2024-12-21 04:16:59,726 - chomper.core - INFO: Call symbol "__NSInitializePlatform" 2024-12-21 04:16:59,727 - chomper.core - INFO: Start emulate at Foundation!0x181727e0c 2024-12-21 04:16:59,727 - chomper.core - INFO: Load module "QuartzCore" 2024-12-21 04:16:59,774 - chomper.core - INFO: Hook import symbol "_calloc" at 0x1d1ff96e8 2024-12-21 04:16:59,774 - chomper.core - INFO: Hook import symbol "_dispatch_async" at 0x1d1ff9770 2024-12-21 04:16:59,774 - chomper.core - INFO: Hook import symbol "_dispatch_resume" at 0x1d1ff9800 2024-12-21 04:16:59,774 - chomper.core - INFO: Hook import symbol "_malloc_good_size" at 0x1d1ff9a28 2024-12-21 04:16:59,774 - chomper.core - INFO: Hook import symbol "_malloc_zone_calloc" at 0x1d1ff9a38 2024-12-21 04:16:59,774 - chomper.core - INFO: Hook import symbol "_malloc_zone_free" at 0x1d1ff9a40 2024-12-21 04:16:59,774 - chomper.core - INFO: Hook import symbol "_malloc_zone_malloc" at 0x1d1ff9a48 2024-12-21 04:16:59,774 - chomper.core - INFO: Hook import symbol "_notify_register_dispatch" at 0x1d1ff9b08 2024-12-21 04:16:59,774 - chomper.core - INFO: Hook import symbol "_posix_memalign" at 0x1d1ff9c68 2024-12-21 04:16:59,774 - chomper.core - INFO: Hook import symbol "_pthread_mutex_lock" at 0x1d1ff9d40 2024-12-21 04:17:00,047 - chomper.core - INFO: Call symbol "_map_images" 2024-12-21 04:17:00,047 - chomper.core - INFO: Start emulate at libobjc.A.dylib!0x1947f9dcc 2024-12-21 04:17:00,047 - chomper.core - INFO: System call 0xFFFFFFFD invoked from libsystem_kernel.dylib!0x1ac30a9f0 2024-12-21 04:17:00,049 - chomper.core - INFO: Call symbol "_load_images" 2024-12-21 04:17:00,049 - chomper.core - INFO: Start emulate at libobjc.A.dylib!0x1947f9eac 2024-12-21 04:17:00,050 - chomper.core - INFO: Load module "BaseBoard" 2024-12-21 04:17:00,071 - chomper.core - INFO: Hook import symbol "_MGCopyAnswer" at 0x1d21ebaf0 2024-12-21 04:17:00,071 - chomper.core - INFO: Hook import symbol "_calloc" at 0x1d21ebd60 2024-12-21 04:17:00,071 - chomper.core - INFO: Hook import symbol "_dispatch_async" at 0x1d21ebde0 2024-12-21 04:17:00,071 - chomper.core - INFO: Hook import symbol "_dispatch_resume" at 0x1d21ebe40 2024-12-21 04:17:00,071 - chomper.core - INFO: Hook import symbol "_notify_register_dispatch" at 0x1d21ec018 2024-12-21 04:17:00,072 - chomper.core - INFO: Hook import symbol "_pthread_mutex_lock" at 0x1d21ec260 2024-12-21 04:17:00,142 - chomper.core - INFO: Call symbol "_map_images" 2024-12-21 04:17:00,142 - chomper.core - INFO: Start emulate at libobjc.A.dylib!0x1947f9dcc 2024-12-21 04:17:00,142 - chomper.core - INFO: System call 0xFFFFFFFD invoked from libsystem_kernel.dylib!0x1ac30a9f0 2024-12-21 04:17:00,143 - chomper.core - ERROR: Emulator crashed from: libobjc.A.dylib!0x1947fa998 <- libobjc.A.dylib!0x1947fa994 <- libobjc.A.dylib!0x1947fa640 <- libobjc.A.dylib!0x19480a1a0 <- libobjc.A.dylib!0x1947f9e28 2024-12-21 04:17:00,143 - chomper.core - WARNING: Initialize Objective-C failed. 2024-12-21 04:17:00,144 - chomper.core - INFO: Load module "FrontBoardServices" 2024-12-21 04:17:00,191 - chomper.core - INFO: Hook import symbol "_calloc" at 0x1d32e62f0 2024-12-21 04:17:00,191 - chomper.core - INFO: Hook import symbol "_dispatch_async" at 0x1d32e6328 2024-12-21 04:17:00,191 - chomper.core - INFO: Hook import symbol "_dispatch_resume" at 0x1d32e6350 2024-12-21 04:17:00,269 - chomper.core - INFO: Call symbol "_map_images" 2024-12-21 04:17:00,269 - chomper.core - INFO: Start emulate at libobjc.A.dylib!0x1947f9dcc 2024-12-21 04:17:00,269 - chomper.core - INFO: System call 0xFFFFFFFD invoked from libsystem_kernel.dylib!0x1ac30a9f0 2024-12-21 04:17:00,271 - chomper.core - INFO: Call symbol "_load_images" 2024-12-21 04:17:00,271 - chomper.core - INFO: Start emulate at libobjc.A.dylib!0x1947f9eac 2024-12-21 04:17:00,273 - chomper.core - INFO: Load module "PrototypeTools" 2024-12-21 04:17:00,285 - chomper.core - INFO: Hook import symbol "_dispatch_async" at 0x1d53b8a50 2024-12-21 04:17:00,306 - chomper.core - INFO: Call symbol "_map_images" 2024-12-21 04:17:00,306 - chomper.core - INFO: Start emulate at libobjc.A.dylib!0x1947f9dcc 2024-12-21 04:17:00,306 - chomper.core - INFO: System call 0xFFFFFFFD invoked from libsystem_kernel.dylib!0x1ac30a9f0 2024-12-21 04:17:00,310 - chomper.core - INFO: Call symbol "_load_images" 2024-12-21 04:17:00,310 - chomper.core - INFO: Start emulate at libobjc.A.dylib!0x1947f9eac 2024-12-21 04:17:00,311 - chomper.core - INFO: Load module "TextInput" 2024-12-21 04:17:00,344 - chomper.core - INFO: Hook import symbol "_MGCopyAnswer" at 0x1d20560a0 2024-12-21 04:17:00,344 - chomper.core - INFO: Hook import symbol "_calloc" at 0x1d2056170 2024-12-21 04:17:00,344 - chomper.core - INFO: Hook import symbol "_dispatch_async" at 0x1d2056190 2024-12-21 04:17:00,448 - chomper.core - INFO: Call symbol "_map_images" 2024-12-21 04:17:00,448 - chomper.core - INFO: Start emulate at libobjc.A.dylib!0x1947f9dcc 2024-12-21 04:17:00,448 - chomper.core - INFO: System call 0xFFFFFFFD invoked from libsystem_kernel.dylib!0x1ac30a9f0 2024-12-21 04:17:00,451 - chomper.core - INFO: Call symbol "_load_images" 2024-12-21 04:17:00,451 - chomper.core - INFO: Start emulate at libobjc.A.dylib!0x1947f9eac 2024-12-21 04:17:00,453 - chomper.core - INFO: Load module "PhysicsKit" 2024-12-21 04:17:00,501 - chomper.core - INFO: Call symbol "_map_images" 2024-12-21 04:17:00,501 - chomper.core - INFO: Start emulate at libobjc.A.dylib!0x1947f9dcc 2024-12-21 04:17:00,501 - chomper.core - INFO: System call 0xFFFFFFFD invoked from libsystem_kernel.dylib!0x1ac30a9f0 2024-12-21 04:17:00,502 - chomper.core - INFO: Call symbol "_load_images" 2024-12-21 04:17:00,502 - chomper.core - INFO: Start emulate at libobjc.A.dylib!0x1947f9eac 2024-12-21 04:17:00,503 - chomper.core - INFO: Load module "CoreAutoLayout" 2024-12-21 04:17:00,520 - chomper.core - INFO: Hook import symbol "_calloc" at 0x1d3d3fa00 2024-12-21 04:17:00,521 - chomper.core - INFO: Hook import symbol "_malloc_good_size" at 0x1d3d3fa50 2024-12-21 04:17:00,556 - chomper.core - INFO: Call symbol "_map_images" 2024-12-21 04:17:00,556 - chomper.core - INFO: Start emulate at libobjc.A.dylib!0x1947f9dcc 2024-12-21 04:17:00,557 - chomper.core - INFO: System call 0xFFFFFFFD invoked from libsystem_kernel.dylib!0x1ac30a9f0 2024-12-21 04:17:00,557 - chomper.core - INFO: Call symbol "_load_images" 2024-12-21 04:17:00,558 - chomper.core - INFO: Start emulate at libobjc.A.dylib!0x1947f9eac 2024-12-21 04:17:00,559 - chomper.core - INFO: Load module "UIFoundation" 2024-12-21 04:17:00,586 - chomper.core - INFO: Hook import symbol "_calloc" at 0x1d296b018 2024-12-21 04:17:00,586 - chomper.core - INFO: Hook import symbol "_dispatch_resume" at 0x1d296b050 2024-12-21 04:17:00,586 - chomper.core - INFO: Hook import symbol "_pthread_rwlock_rdlock" at 0x1d296b2b0 2024-12-21 04:17:00,586 - chomper.core - INFO: Hook import symbol "_pthread_rwlock_unlock" at 0x1d296b2c0 2024-12-21 04:17:00,716 - chomper.core - INFO: Call symbol "_map_images" 2024-12-21 04:17:00,716 - chomper.core - INFO: Start emulate at libobjc.A.dylib!0x1947f9dcc 2024-12-21 04:17:00,717 - chomper.core - INFO: System call 0xFFFFFFFD invoked from libsystem_kernel.dylib!0x1ac30a9f0 2024-12-21 04:17:00,719 - chomper.core - ERROR: Emulator crashed from: libobjc.A.dylib!0x1947f9140 <- libobjc.A.dylib!0x1947f913c <- libobjc.A.dylib!0x194809c3c <- libobjc.A.dylib!0x1947f9e28 2024-12-21 04:17:00,719 - chomper.core - WARNING: Initialize Objective-C failed. 2024-12-21 04:17:00,720 - chomper.core - INFO: Load module "UIKitServices" 2024-12-21 04:17:00,733 - chomper.core - INFO: Hook import symbol "_MGCopyAnswer" at 0x1d210a1a8 2024-12-21 04:17:00,733 - chomper.core - INFO: Hook import symbol "_dispatch_async" at 0x1d210a218 2024-12-21 04:17:00,734 - chomper.core - INFO: Hook import symbol "_notify_register_dispatch" at 0x1d210a2a8 2024-12-21 04:17:00,749 - chomper.core - INFO: Call symbol "_map_images" 2024-12-21 04:17:00,749 - chomper.core - INFO: Start emulate at libobjc.A.dylib!0x1947f9dcc 2024-12-21 04:17:00,749 - chomper.core - INFO: System call 0xFFFFFFFD invoked from libsystem_kernel.dylib!0x1ac30a9f0 2024-12-21 04:17:00,750 - chomper.core - INFO: Call symbol "_load_images" 2024-12-21 04:17:00,750 - chomper.core - INFO: Start emulate at libobjc.A.dylib!0x1947f9eac 2024-12-21 04:17:00,751 - chomper.core - INFO: Load module "UIKitCore" 2024-12-21 04:17:01,299 - chomper.core - INFO: Hook import symbol "_MGCopyAnswer" at 0x1d1d7e020 2024-12-21 04:17:01,299 - chomper.core - INFO: Hook import symbol "_calloc" at 0x1d1d7e860 2024-12-21 04:17:01,299 - chomper.core - INFO: Hook import symbol "_dispatch_async" at 0x1d1d7e950 2024-12-21 04:17:01,299 - chomper.core - INFO: Hook import symbol "_dispatch_resume" at 0x1d1d7ea10 2024-12-21 04:17:01,300 - chomper.core - INFO: Hook import symbol "_notify_register_dispatch" at 0x1d1d7ed80 2024-12-21 04:17:01,300 - chomper.core - INFO: Hook import symbol "_pthread_mutex_lock" at 0x1d1d7f060 2024-12-21 04:17:04,203 - chomper.core - INFO: Call symbol "_map_images" 2024-12-21 04:17:04,204 - chomper.core - INFO: Start emulate at libobjc.A.dylib!0x1947f9dcc 2024-12-21 04:17:04,204 - chomper.core - INFO: System call 0xFFFFFFFD invoked from libsystem_kernel.dylib!0x1ac30a9f0 2024-12-21 04:17:04,247 - chomper.core - ERROR: Emulator crashed from: libobjc.A.dylib!0x1947f9140 <- libobjc.A.dylib!0x1947f913c <- libobjc.A.dylib!0x194809c3c <- libobjc.A.dylib!0x1947f9e28 2024-12-21 04:17:04,247 - chomper.core - WARNING: Initialize Objective-C failed. 2024-12-21 04:17:04,264 - chomper.core - INFO: Load module "CSMBP-AppStore-Package" 2024-12-21 04:17:07,042 - chomper.core - INFO: Hook import symbol "_calloc" at 0x104f45430 2024-12-21 04:17:07,042 - chomper.core - INFO: Hook import symbol "_dispatch_resume" at 0x104f45608 2024-12-21 04:17:07,042 - chomper.core - INFO: Hook import symbol "_pthread_mutex_lock" at 0x104f462b0 2024-12-21 04:17:07,042 - chomper.core - INFO: Hook import symbol "_pthread_mutex_lock" at 0x104f462b0 2024-12-21 04:17:07,045 - chomper.core - INFO: Hook import symbol "_calloc" at 0x104f45430 2024-12-21 04:17:07,045 - chomper.core - INFO: Hook import symbol "_dispatch_async" at 0x104f45540 2024-12-21 04:17:07,045 - chomper.core - INFO: Hook import symbol "_dispatch_resume" at 0x104f45608 2024-12-21 04:17:07,046 - chomper.core - INFO: Hook import symbol "_malloc_size" at 0x104f45e08 2024-12-21 04:17:07,046 - chomper.core - INFO: Hook import symbol "_notify_register_dispatch" at 0x104f45ec8 2024-12-21 04:17:07,046 - chomper.core - INFO: Hook import symbol "_posix_memalign" at 0x104f46150 2024-12-21 04:17:07,046 - chomper.core - INFO: Hook import symbol "_pthread_mutex_lock" at 0x104f462b0 2024-12-21 04:17:07,046 - chomper.core - INFO: Hook import symbol "_pthread_rwlock_rdlock" at 0x104f462f8 2024-12-21 04:17:07,046 - chomper.core - INFO: Hook import symbol "_pthread_rwlock_unlock" at 0x104f46300 2024-12-21 04:17:07,046 - chomper.core - INFO: Hook import symbol "_pthread_rwlock_wrlock" at 0x104f46308 2024-12-21 04:17:07,055 - chomper.core - INFO: Call symbol "_map_images" 2024-12-21 04:17:07,055 - chomper.core - INFO: Start emulate at libobjc.A.dylib!0x1947f9dcc 2024-12-21 04:17:07,056 - chomper.core - INFO: System call 0xFFFFFFFD invoked from libsystem_kernel.dylib!0x1ac30a9f0 2024-12-21 04:17:07,142 - chomper.core - INFO: Call symbol "_load_images" 2024-12-21 04:17:07,142 - chomper.core - INFO: Start emulate at libobjc.A.dylib!0x1947f9eac 2024-12-21 04:17:07,162 - chomper.core - INFO: System call 0xC2 invoked from libsystem_kernel.dylib!0x1ac32d8ec 2024-12-21 04:17:07,162 - chomper.core - INFO: System call 0xC2 invoked from libsystem_kernel.dylib!0x1ac32d8ec 2024-12-21 04:17:07,163 - chomper.core - INFO: System call 0x18E invoked from libsystem_kernel.dylib!0x1ac32e368 2024-12-21 04:17:07,164 - chomper.file - INFO: Monitor 'open' call: path='/System/Library/CoreServices/SystemVersion.plist', flags=32768 2024-12-21 04:17:07,164 - chomper.file - INFO: Map path '/System/Library/CoreServices/SystemVersion.plist' -> 'D:\iRabbitProject\irabbit_project\ibox-wtoken-server-master-dongfanghangkong\ceair_server\rootfs\ios\System\Library\CoreServices\SystemVersion.plist' 2024-12-21 04:17:07,164 - chomper.file - INFO: Monitor 'open' return: 3 2024-12-21 04:17:07,165 - chomper.core - INFO: System call 0x153 invoked from libsystem_kernel.dylib!0x1ac32fdc4 2024-12-21 04:17:07,165 - chomper.file - INFO: Monitor 'fstat' call: fd=3 2024-12-21 04:17:07,165 - chomper.file - INFO: Monitor 'fstat' return 2024-12-21 04:17:07,165 - chomper.core - INFO: System call 0x153 invoked from libsystem_kernel.dylib!0x1ac32fdc4 2024-12-21 04:17:07,166 - chomper.file - INFO: Monitor 'fstat' call: fd=3 2024-12-21 04:17:07,166 - chomper.file - INFO: Monitor 'fstat' return 2024-12-21 04:17:07,166 - chomper.core - INFO: System call 0xC7 invoked from libsystem_kernel.dylib!0x1ac32dc60 2024-12-21 04:17:07,166 - chomper.file - INFO: Monitor 'lseek' call: fd=3, offset=0, whence=1 2024-12-21 04:17:07,166 - chomper.file - INFO: Monitor 'lseek' return: 0 2024-12-21 04:17:07,166 - chomper.core - INFO: System call 0xC7 invoked from libsystem_kernel.dylib!0x1ac32dc60 2024-12-21 04:17:07,166 - chomper.file - INFO: Monitor 'lseek' call: fd=3, offset=0, whence=0 2024-12-21 04:17:07,167 - chomper.file - INFO: Monitor 'lseek' return: 0 2024-12-21 04:17:07,167 - chomper.core - INFO: System call 0xC7 invoked from libsystem_kernel.dylib!0x1ac32dc60 2024-12-21 04:17:07,167 - chomper.file - INFO: Monitor 'lseek' call: fd=3, offset=0, whence=2 2024-12-21 04:17:07,167 - chomper.file - INFO: Monitor 'lseek' return: 591 2024-12-21 04:17:07,167 - chomper.core - INFO: System call 0xC7 invoked from libsystem_kernel.dylib!0x1ac32dc60 2024-12-21 04:17:07,168 - chomper.file - INFO: Monitor 'lseek' call: fd=3, offset=0, whence=0 2024-12-21 04:17:07,168 - chomper.file - INFO: Monitor 'lseek' return: 0 2024-12-21 04:17:07,169 - chomper.core - INFO: System call 0x18C invoked from libsystem_kernel.dylib!0x1ac32e948 2024-12-21 04:17:07,169 - chomper.file - INFO: Monitor 'read' call: fd=3, size=4096 2024-12-21 04:17:07,169 - chomper.file - INFO: Monitor 'read' return 2024-12-21 04:17:07,197 - chomper.core - INFO: System call 0x18F invoked from libsystem_kernel.dylib!0x1ac32d498 2024-12-21 04:17:07,197 - chomper.file - INFO: Monitor 'close' call: fd=3 2024-12-21 04:17:07,197 - chomper.file - INFO: Monitor 'close' return: 0 2024-12-21 04:17:07,207 - chomper.core - INFO: System call 0x18E invoked from libsystem_kernel.dylib!0x1ac32e368 2024-12-21 04:17:07,207 - chomper.file - INFO: Monitor 'open' call: path='/System/Library/CoreServices/SystemVersion.plist', flags=32768 2024-12-21 04:17:07,207 - chomper.file - INFO: Map path '/System/Library/CoreServices/SystemVersion.plist' -> 'D:\iRabbitProject\irabbit_project\ibox-wtoken-server-master-dongfanghangkong\ceair_server\rootfs\ios\System\Library\CoreServices\SystemVersion.plist' 2024-12-21 04:17:07,208 - chomper.file - INFO: Monitor 'open' return: 3 2024-12-21 04:17:07,208 - chomper.core - INFO: System call 0x153 invoked from libsystem_kernel.dylib!0x1ac32fdc4 2024-12-21 04:17:07,208 - chomper.file - INFO: Monitor 'fstat' call: fd=3 2024-12-21 04:17:07,208 - chomper.file - INFO: Monitor 'fstat' return 2024-12-21 04:17:07,208 - chomper.core - INFO: System call 0x153 invoked from libsystem_kernel.dylib!0x1ac32fdc4 2024-12-21 04:17:07,208 - chomper.file - INFO: Monitor 'fstat' call: fd=3 2024-12-21 04:17:07,208 - chomper.file - INFO: Monitor 'fstat' return 2024-12-21 04:17:07,208 - chomper.core - INFO: System call 0xC7 invoked from libsystem_kernel.dylib!0x1ac32dc60 2024-12-21 04:17:07,208 - chomper.file - INFO: Monitor 'lseek' call: fd=3, offset=0, whence=1 2024-12-21 04:17:07,208 - chomper.file - INFO: Monitor 'lseek' return: 0 2024-12-21 04:17:07,208 - chomper.core - INFO: System call 0xC7 invoked from libsystem_kernel.dylib!0x1ac32dc60 2024-12-21 04:17:07,208 - chomper.file - INFO: Monitor 'lseek' call: fd=3, offset=0, whence=0 2024-12-21 04:17:07,208 - chomper.file - INFO: Monitor 'lseek' return: 0 2024-12-21 04:17:07,208 - chomper.core - INFO: System call 0xC7 invoked from libsystem_kernel.dylib!0x1ac32dc60 2024-12-21 04:17:07,208 - chomper.file - INFO: Monitor 'lseek' call: fd=3, offset=0, whence=2 2024-12-21 04:17:07,208 - chomper.file - INFO: Monitor 'lseek' return: 591 2024-12-21 04:17:07,208 - chomper.core - INFO: System call 0xC7 invoked from libsystem_kernel.dylib!0x1ac32dc60 2024-12-21 04:17:07,208 - chomper.file - INFO: Monitor 'lseek' call: fd=3, offset=0, whence=0 2024-12-21 04:17:07,208 - chomper.file - INFO: Monitor 'lseek' return: 0 2024-12-21 04:17:07,208 - chomper.core - INFO: System call 0x18C invoked from libsystem_kernel.dylib!0x1ac32e948 2024-12-21 04:17:07,208 - chomper.file - INFO: Monitor 'read' call: fd=3, size=4096 2024-12-21 04:17:07,208 - chomper.file - INFO: Monitor 'read' return 2024-12-21 04:17:07,215 - chomper.core - INFO: System call 0x18F invoked from libsystem_kernel.dylib!0x1ac32d498 2024-12-21 04:17:07,215 - chomper.file - INFO: Monitor 'close' call: fd=3 2024-12-21 04:17:07,215 - chomper.file - INFO: Monitor 'close' return: 0 2024-12-21 04:17:07,253 - chomper.core - INFO: System call 0x152 invoked from libsystem_kernel.dylib!0x1ac331304 2024-12-21 04:17:07,253 - chomper.file - INFO: Monitor 'stat' call: path='/var/containers/Bundle/Application/E7C9AE8F-B469-492B-AEAF-BAACADAD34FA/com.ceair.b2m/ceair_iOS_branch' 2024-12-21 04:17:07,253 - chomper.file - INFO: Map path '/var/containers/Bundle/Application/E7C9AE8F-B469-492B-AEAF-BAACADAD34FA/com.ceair.b2m/ceair_iOS_branch' -> 'D:\iRabbitProject\irabbit_project\ibox-wtoken-server-master-dongfanghangkong\ceair_server\rootfs\ios\var\containers\Bundle\Application\E7C9AE8F-B469-492B-AEAF-BAACADAD34FA\com.ceair.b2m\ceair_iOS_branch' 2024-12-21 04:17:07,256 - chomper.core - INFO: System call 0x147 invoked from libsystem_kernel.dylib!0x1ac330364 2024-12-21 04:17:07,257 - chomper.core - INFO: System call 0x11E invoked from libsystem_kernel.dylib!0x1ac32d964 2024-12-21 04:17:07,257 - chomper.core - INFO: System call 0x19 invoked from libsystem_kernel.dylib!0x1ac33001c 2024-12-21 04:17:07,257 - chomper.core - INFO: System call 0x2B invoked from libsystem_kernel.dylib!0x1ac32ffcc 2024-12-21 04:17:07,257 - chomper.core - INFO: System call 0x11E invoked from libsystem_kernel.dylib!0x1ac32d964 2024-12-21 04:17:07,257 - chomper.core - INFO: System call 0x19 invoked from libsystem_kernel.dylib!0x1ac33001c 2024-12-21 04:17:07,257 - chomper.core - INFO: System call 0x2B invoked from libsystem_kernel.dylib!0x1ac32ffcc 2024-12-21 04:17:07,262 - chomper.core - INFO: Call symbol "_sel_registerName" 2024-12-21 04:17:07,262 - chomper.core - INFO: Start emulate at libobjc.A.dylib!0x1948074a4 2024-12-21 04:17:07,262 - chomper.core - INFO: Call symbol "_objc_msgSend" 2024-12-21 04:17:07,263 - chomper.core - INFO: Start emulate at libobjc.A.dylib!0x1947ec460 2024-12-21 04:17:07,266 - chomper.core - INFO: Call symbol "_CFArrayCreateMutable" 2024-12-21 04:17:07,267 - chomper.core - INFO: Start emulate at CoreFoundation!0x1803d9ff4 2024-12-21 04:17:07,268 - chomper.core - INFO: Call symbol "_CFStringCreateWithCString" 2024-12-21 04:17:07,269 - chomper.core - INFO: Start emulate at CoreFoundation!0x18040e36c 2024-12-21 04:17:07,269 - chomper.core - INFO: Call symbol "_CFArrayAppendValue" 2024-12-21 04:17:07,270 - chomper.core - INFO: Start emulate at CoreFoundation!0x1803856c4 2024-12-21 04:17:07,271 - chomper.core - INFO: Call symbol "_CFStringCreateWithCString" 2024-12-21 04:17:07,273 - chomper.core - INFO: Start emulate at CoreFoundation!0x18040e36c 2024-12-21 04:17:07,273 - chomper.core - INFO: Call symbol "_CFArrayAppendValue" 2024-12-21 04:17:07,274 - chomper.core - INFO: Start emulate at CoreFoundation!0x1803856c4 2024-12-21 04:17:07,278 - chomper.core - INFO: Call symbol "_CFDictionaryCreateMutable" 2024-12-21 04:17:07,279 - chomper.core - INFO: Start emulate at CoreFoundation!0x1803b856c 2024-12-21 04:17:07,280 - chomper.core - INFO: Call symbol "_CFStringCreateWithCString" 2024-12-21 04:17:07,281 - chomper.core - INFO: Start emulate at CoreFoundation!0x18040e36c 2024-12-21 04:17:07,283 - chomper.core - INFO: Call symbol "_CFArrayCreateMutable" 2024-12-21 04:17:07,284 - chomper.core - INFO: Start emulate at CoreFoundation!0x1803d9ff4 2024-12-21 04:17:07,285 - chomper.core - INFO: Call symbol "_CFStringCreateWithCString" 2024-12-21 04:17:07,286 - chomper.core - INFO: Start emulate at CoreFoundation!0x18040e36c 2024-12-21 04:17:07,286 - chomper.core - INFO: Call symbol "_CFArrayAppendValue" 2024-12-21 04:17:07,288 - chomper.core - INFO: Start emulate at CoreFoundation!0x1803856c4 2024-12-21 04:17:07,288 - chomper.core - INFO: Call symbol "_CFStringCreateWithCString" 2024-12-21 04:17:07,291 - chomper.core - INFO: Start emulate at CoreFoundation!0x18040e36c 2024-12-21 04:17:07,291 - chomper.core - INFO: Call symbol "_CFArrayAppendValue" 2024-12-21 04:17:07,292 - chomper.core - INFO: Start emulate at CoreFoundation!0x1803856c4 2024-12-21 04:17:07,292 - chomper.core - INFO: Call symbol "_CFDictionaryAddValue" 2024-12-21 04:17:07,293 - chomper.core - INFO: Start emulate at CoreFoundation!0x1803b9148 2024-12-21 04:17:07,295 - chomper.core - INFO: Call symbol "_CFStringCreateWithCString" 2024-12-21 04:17:07,296 - chomper.core - INFO: Start emulate at CoreFoundation!0x18040e36c 2024-12-21 04:17:07,297 - chomper.core - INFO: Call symbol "_CFStringCreateWithCString" 2024-12-21 04:17:07,297 - chomper.core - INFO: Start emulate at CoreFoundation!0x18040e36c 2024-12-21 04:17:07,297 - chomper.core - INFO: Call symbol "_CFDictionaryAddValue" 2024-12-21 04:17:07,298 - chomper.core - INFO: Start emulate at CoreFoundation!0x1803b9148 2024-12-21 04:17:07,298 - chomper.core - INFO: Call symbol "_CFRelease" 2024-12-21 04:17:07,300 - chomper.core - INFO: Start emulate at CoreFoundation!0x1803554b0 2024-12-21 04:17:07,300 - chomper.core - INFO: Call symbol "_CFRelease" 2024-12-21 04:17:07,300 - chomper.core - INFO: Start emulate at CoreFoundation!0x1803554b0 2024-12-21 04:17:07,301 - chomper.core - INFO: Call symbol "_CFRelease" 2024-12-21 04:17:07,301 - chomper.core - INFO: Start emulate at CoreFoundation!0x1803554b0 2024-12-21 04:17:07,301 - chomper.core - INFO: Call symbol "_CFRelease" 2024-12-21 04:17:07,302 - chomper.core - INFO: Start emulate at CoreFoundation!0x1803554b0 2024-12-21 04:17:07,322 - chomper.file - INFO: Monitor 'opendir' call: path='/private/var/containers/Bundle/Application/E7C9AE8F-B469-492B-AEAF-BAACADAD34FA/com.ceair.b2m' 2024-12-21 04:17:07,322 - chomper.file - INFO: Forward path '/private/var/containers/Bundle/Application/E7C9AE8F-B469-492B-AEAF-BAACADAD34FA/com.ceair.b2m' -> 'D:\iRabbitProject\irabbit_project\ibox-wtoken-server-master-dongfanghangkong\ceair_server\rootfs/ios\private\var\containers\Bundle\Application\43E5FB44-22FC-4DC2-9D9E-E2702A988A2E\com.yourcompany.ProductName' 2024-12-21 04:17:07,323 - chomper.file - INFO: Monitor 'opendir' return: 134219304 2024-12-21 04:17:07,323 - chomper.file - INFO: Monitor 'readdir' call: dirp=134219304 2024-12-21 04:17:07,323 - chomper.file - INFO: Monitor 'readdir' return: 134748160 2024-12-21 04:17:07,324 - chomper.file - INFO: Monitor 'readdir' call: dirp=134219304 2024-12-21 04:17:07,324 - chomper.file - INFO: Monitor 'readdir' return: 134750208 2024-12-21 04:17:07,324 - chomper.file - INFO: Monitor 'readdir' call: dirp=134219304 2024-12-21 04:17:07,324 - chomper.file - INFO: Monitor 'readdir' return: 134752256 2024-12-21 04:17:07,324 - chomper.file - INFO: Monitor 'readdir' call: dirp=134219304 2024-12-21 04:17:07,324 - chomper.file - INFO: Monitor 'readdir' return: 134754304 2024-12-21 04:17:07,324 - chomper.file - INFO: Monitor 'readdir' call: dirp=134219304 2024-12-21 04:17:07,324 - chomper.file - INFO: Monitor 'readdir' return: 134756352 2024-12-21 04:17:07,325 - chomper.file - INFO: Monitor 'readdir' call: dirp=134219304 2024-12-21 04:17:07,325 - chomper.file - INFO: Monitor 'readdir' return: 0 2024-12-21 04:17:07,325 - chomper.file - INFO: Monitor 'closedir' call: dirp=134219304 2024-12-21 04:17:07,325 - chomper.file - INFO: Monitor 'closedir' return: 0 2024-12-21 04:17:07,327 - chomper.core - INFO: System call 0x152 invoked from libsystem_kernel.dylib!0x1ac331304 2024-12-21 04:17:07,327 - chomper.file - INFO: Monitor 'stat' call: path='/private/var/containers/Bundle/Application/E7C9AE8F-B469-492B-AEAF-BAACADAD34FA/com.ceair.b2m/Wrapper' 2024-12-21 04:17:07,328 - chomper.file - INFO: Map path '/private/var/containers/Bundle/Application/E7C9AE8F-B469-492B-AEAF-BAACADAD34FA/com.ceair.b2m/Wrapper' -> 'D:\iRabbitProject\irabbit_project\ibox-wtoken-server-master-dongfanghangkong\ceair_server\rootfs\ios\private\var\containers\Bundle\Application\E7C9AE8F-B469-492B-AEAF-BAACADAD34FA\com.ceair.b2m\Wrapper' 2024-12-21 04:17:07,329 - chomper.core - INFO: System call 0x152 invoked from libsystem_kernel.dylib!0x1ac331304 2024-12-21 04:17:07,329 - chomper.file - INFO: Monitor 'stat' call: path='/private/var/containers/Bundle/Application/E7C9AE8F-B469-492B-AEAF-BAACADAD34FA/com.ceair.b2m' 2024-12-21 04:17:07,329 - chomper.file - INFO: Forward path '/private/var/containers/Bundle/Application/E7C9AE8F-B469-492B-AEAF-BAACADAD34FA/com.ceair.b2m' -> 'D:\iRabbitProject\irabbit_project\ibox-wtoken-server-master-dongfanghangkong\ceair_server\rootfs/ios\private\var\containers\Bundle\Application\43E5FB44-22FC-4DC2-9D9E-E2702A988A2E\com.yourcompany.ProductName' 2024-12-21 04:17:07,329 - chomper.file - INFO: Monitor 'stat' return 2024-12-21 04:17:07,331 - chomper.file - INFO: Monitor 'opendir' call: path='/private/var/containers/Bundle/Application/E7C9AE8F-B469-492B-AEAF-BAACADAD34FA/com.ceair.b2m' 2024-12-21 04:17:07,331 - chomper.file - INFO: Forward path '/private/var/containers/Bundle/Application/E7C9AE8F-B469-492B-AEAF-BAACADAD34FA/com.ceair.b2m' -> 'D:\iRabbitProject\irabbit_project\ibox-wtoken-server-master-dongfanghangkong\ceair_server\rootfs/ios\private\var\containers\Bundle\Application\43E5FB44-22FC-4DC2-9D9E-E2702A988A2E\com.yourcompany.ProductName' 2024-12-21 04:17:07,331 - chomper.file - INFO: Monitor 'opendir' return: 134219304 2024-12-21 04:17:07,331 - chomper.file - INFO: Monitor 'readdir' call: dirp=134219304 2024-12-21 04:17:07,331 - chomper.file - INFO: Monitor 'readdir' return: 134748160 2024-12-21 04:17:07,331 - chomper.file - INFO: Monitor 'readdir' call: dirp=134219304 2024-12-21 04:17:07,332 - chomper.file - INFO: Monitor 'readdir' return: 134750208 2024-12-21 04:17:07,332 - chomper.file - INFO: Monitor 'readdir' call: dirp=134219304 2024-12-21 04:17:07,332 - chomper.file - INFO: Monitor 'readdir' return: 134752256 2024-12-21 04:17:07,332 - chomper.file - INFO: Monitor 'readdir' call: dirp=134219304 2024-12-21 04:17:07,332 - chomper.file - INFO: Monitor 'readdir' return: 134754304 2024-12-21 04:17:07,332 - chomper.file - INFO: Monitor 'readdir' call: dirp=134219304 2024-12-21 04:17:07,332 - chomper.file - INFO: Monitor 'readdir' return: 134756352 2024-12-21 04:17:07,332 - chomper.file - INFO: Monitor 'readdir' call: dirp=134219304 2024-12-21 04:17:07,332 - chomper.file - INFO: Monitor 'readdir' return: 0 2024-12-21 04:17:07,332 - chomper.file - INFO: Monitor 'closedir' call: dirp=134219304 2024-12-21 04:17:07,332 - chomper.file - INFO: Monitor 'closedir' return: 0 2024-12-21 04:17:07,334 - chomper.core - INFO: System call 0x152 invoked from libsystem_kernel.dylib!0x1ac331304 2024-12-21 04:17:07,334 - chomper.file - INFO: Monitor 'stat' call: path='/private/var/containers/Bundle/Application/E7C9AE8F-B469-492B-AEAF-BAACADAD34FA/com.ceair.b2m/ceair_iOS_branch' 2024-12-21 04:17:07,334 - chomper.file - INFO: Forward path '/private/var/containers/Bundle/Application/E7C9AE8F-B469-492B-AEAF-BAACADAD34FA/com.ceair.b2m/ceair_iOS_branch' -> 'D:\iRabbitProject\irabbit_project\ibox-wtoken-server-master-dongfanghangkong\ceair_server\binaries/ios/com.ceair.b2m/CSMBP-AppStore-Package' 2024-12-21 04:17:07,334 - chomper.file - INFO: Monitor 'stat' return 2024-12-21 04:17:07,334 - chomper.core - INFO: System call 0x5 invoked from libsystem_kernel.dylib!0x1ac32e2f0 2024-12-21 04:17:07,334 - chomper.file - INFO: Monitor 'open' call: path='/private/var/containers/Bundle/Application/E7C9AE8F-B469-492B-AEAF-BAACADAD34FA/com.ceair.b2m/ceair_iOS_branch', flags=32768 2024-12-21 04:17:07,334 - chomper.file - INFO: Forward path '/private/var/containers/Bundle/Application/E7C9AE8F-B469-492B-AEAF-BAACADAD34FA/com.ceair.b2m/ceair_iOS_branch' -> 'D:\iRabbitProject\irabbit_project\ibox-wtoken-server-master-dongfanghangkong\ceair_server\binaries/ios/com.ceair.b2m/CSMBP-AppStore-Package' 2024-12-21 04:17:07,334 - chomper.file - INFO: Monitor 'open' return: 3 2024-12-21 04:17:07,335 - chomper.core - INFO: System call 0x3 invoked from libsystem_kernel.dylib!0x1ac330cc4 2024-12-21 04:17:07,335 - chomper.file - INFO: Monitor 'read' call: fd=3, size=512 2024-12-21 04:17:07,335 - chomper.file - INFO: Monitor 'read' return 2024-12-21 04:17:07,336 - chomper.core - INFO: System call 0x6 invoked from libsystem_kernel.dylib!0x1ac32f89c 2024-12-21 04:17:07,336 - chomper.file - INFO: Monitor 'close' call: fd=3 2024-12-21 04:17:07,336 - chomper.file - INFO: Monitor 'close' return: 0 2024-12-21 04:17:07,337 - chomper.core - INFO: Call symbol "__CFBundleCreateInfoDictFromData" 2024-12-21 04:17:07,338 - chomper.core - INFO: Start emulate at CoreFoundation!0x180454814 2024-12-21 04:17:07,361 - chomper.file - INFO: Monitor 'opendir' call: path='/private/var/containers/Bundle/Application/E7C9AE8F-B469-492B-AEAF-BAACADAD34FA/com.ceair.b2m' 2024-12-21 04:17:07,361 - chomper.file - INFO: Forward path '/private/var/containers/Bundle/Application/E7C9AE8F-B469-492B-AEAF-BAACADAD34FA/com.ceair.b2m' -> 'D:\iRabbitProject\irabbit_project\ibox-wtoken-server-master-dongfanghangkong\ceair_server\rootfs/ios\private\var\containers\Bundle\Application\43E5FB44-22FC-4DC2-9D9E-E2702A988A2E\com.yourcompany.ProductName' 2024-12-21 04:17:07,361 - chomper.file - INFO: Monitor 'opendir' return: 134219304 2024-12-21 04:17:07,361 - chomper.file - INFO: Monitor 'readdir' call: dirp=134219304 2024-12-21 04:17:07,361 - chomper.file - INFO: Monitor 'readdir' return: 134748160 2024-12-21 04:17:07,362 - chomper.file - INFO: Monitor 'readdir' call: dirp=134219304 2024-12-21 04:17:07,362 - chomper.file - INFO: Monitor 'readdir' return: 134750208 2024-12-21 04:17:07,362 - chomper.file - INFO: Monitor 'readdir' call: dirp=134219304 2024-12-21 04:17:07,362 - chomper.file - INFO: Monitor 'readdir' return: 134754304 2024-12-21 04:17:07,362 - chomper.file - INFO: Monitor 'readdir' call: dirp=134219304 2024-12-21 04:17:07,362 - chomper.file - INFO: Monitor 'readdir' return: 134756352 2024-12-21 04:17:07,362 - chomper.file - INFO: Monitor 'readdir' call: dirp=134219304 2024-12-21 04:17:07,362 - chomper.file - INFO: Monitor 'readdir' return: 134758400 2024-12-21 04:17:07,362 - chomper.file - INFO: Monitor 'readdir' call: dirp=134219304 2024-12-21 04:17:07,362 - chomper.file - INFO: Monitor 'readdir' return: 0 2024-12-21 04:17:07,362 - chomper.file - INFO: Monitor 'closedir' call: dirp=134219304 2024-12-21 04:17:07,362 - chomper.file - INFO: Monitor 'closedir' return: 0 2024-12-21 04:17:07,377 - chomper.core - INFO: System call 0x152 invoked from libsystem_kernel.dylib!0x1ac331304 2024-12-21 04:17:07,377 - chomper.file - INFO: Monitor 'stat' call: path='/usr/share/icu/icudt66l.dat' 2024-12-21 04:17:07,377 - chomper.file - INFO: Map path '/usr/share/icu/icudt66l.dat' -> 'D:\iRabbitProject\irabbit_project\ibox-wtoken-server-master-dongfanghangkong\ceair_server\rootfs\ios\usr\share\icu\icudt66l.dat' 2024-12-21 04:17:07,377 - chomper.file - INFO: Monitor 'stat' return 2024-12-21 04:17:07,377 - chomper.core - INFO: System call 0x5 invoked from libsystem_kernel.dylib!0x1ac32e2f0 2024-12-21 04:17:07,377 - chomper.file - INFO: Monitor 'open' call: path='/usr/share/icu/icudt66l.dat', flags=32768 2024-12-21 04:17:07,377 - chomper.file - INFO: Map path '/usr/share/icu/icudt66l.dat' -> 'D:\iRabbitProject\irabbit_project\ibox-wtoken-server-master-dongfanghangkong\ceair_server\rootfs\ios\usr\share\icu\icudt66l.dat' 2024-12-21 04:17:07,377 - chomper.file - INFO: Monitor 'open' return: 3 2024-12-21 04:17:07,377 - chomper.core - INFO: System call 0xC5 invoked from libsystem_kernel.dylib!0x1ac32e048 2024-12-21 04:17:07,498 - chomper.core - INFO: System call 0x6 invoked from libsystem_kernel.dylib!0x1ac32f89c 2024-12-21 04:17:07,498 - chomper.file - INFO: Monitor 'close' call: fd=3 2024-12-21 04:17:07,498 - chomper.file - INFO: Monitor 'close' return: 0 2024-12-21 04:17:07,498 - chomper.core - INFO: System call 0x4B invoked from libsystem_kernel.dylib!0x1ac33056c 2024-12-21 04:17:07,530 - chomper.core - INFO: System call 0x11E invoked from libsystem_kernel.dylib!0x1ac32d964 2024-12-21 04:17:07,530 - chomper.core - INFO: System call 0x19 invoked from libsystem_kernel.dylib!0x1ac33001c 2024-12-21 04:17:07,530 - chomper.core - INFO: System call 0x2B invoked from libsystem_kernel.dylib!0x1ac32ffcc 2024-12-21 04:17:07,536 - chomper.core - INFO: System call 0x11E invoked from libsystem_kernel.dylib!0x1ac32d964 2024-12-21 04:17:07,536 - chomper.core - INFO: System call 0x19 invoked from libsystem_kernel.dylib!0x1ac33001c 2024-12-21 04:17:07,536 - chomper.core - INFO: System call 0x2B invoked from libsystem_kernel.dylib!0x1ac32ffcc 2024-12-21 04:17:07,541 - chomper.core - INFO: System call 0x147 invoked from libsystem_kernel.dylib!0x1ac330364 2024-12-21 04:17:07,541 - chomper.core - INFO: System call 0x147 invoked from libsystem_kernel.dylib!0x1ac330364 2024-12-21 04:17:07,541 - chomper.core - INFO: System call 0x11E invoked from libsystem_kernel.dylib!0x1ac32d964 2024-12-21 04:17:07,541 - chomper.core - INFO: System call 0x19 invoked from libsystem_kernel.dylib!0x1ac33001c 2024-12-21 04:17:07,542 - chomper.core - INFO: System call 0x2B invoked from libsystem_kernel.dylib!0x1ac32ffcc 2024-12-21 04:17:07,545 - chomper.core - INFO: System call 0x152 invoked from libsystem_kernel.dylib!0x1ac331304 2024-12-21 04:17:07,545 - chomper.file - INFO: Monitor 'stat' call: path='/var/root' 2024-12-21 04:17:07,545 - chomper.file - INFO: Map path '/var/root' -> 'D:\iRabbitProject\irabbit_project\ibox-wtoken-server-master-dongfanghangkong\ceair_server\rootfs\ios\var\root' 2024-12-21 04:17:07,550 - chomper.core - ERROR: Emulator crashed from: libcorecrypto.dylib!0x1abc6a4d8 <- CoreFoundation!0x180376814 <- CoreFoundation!0x1803617ec <- CoreFoundation!0x18048767c <- CoreFoundation!0x180487b88 <- CoreFoundation!0x180439a4c <- CoreFoundation!0x180439e10 <- CoreFoundation!0x180359b30 <- CoreFoundation!0x1804c4848 <- CoreFoundation!0x18048a370 <- CoreFoundation!0x180489a5c <- CoreFoundation!0x18048a1e4 <- CoreFoundation!0x1803595e4 <- CoreFoundation!0x1804c7ae0 <- Foundation!0x18163dcc0 <- CSMBP-AppStore-Package!0x10069e7e8 <- libobjc.A.dylib!0x1947fa258 2024-12-21 04:17:07,550 - chomper.core - WARNING: Initialize Objective-C failed. 2024-12-21 04:17:07,575 - chomper.core - INFO: Call symbol "_objc_autoreleasePoolPush" 2024-12-21 04:17:07,576 - chomper.core - INFO: Start emulate at libobjc.A.dylib!0x19480f2a8 2024-12-21 04:17:07,576 - chomper.core - INFO: Call symbol "_objc_getClass" 2024-12-21 04:17:07,576 - chomper.core - INFO: Start emulate at libobjc.A.dylib!0x194805c54 2024-12-21 04:17:07,577 - chomper.core - INFO: Call symbol "_sel_registerName" 2024-12-21 04:17:07,577 - chomper.core - INFO: Start emulate at libobjc.A.dylib!0x1948074a4 2024-12-21 04:17:07,577 - chomper.core - INFO: Call symbol "_objc_msgSend" 2024-12-21 04:17:07,577 - chomper.core - INFO: Start emulate at libobjc.A.dylib!0x1947ec460 2024-12-21 04:17:07,579 - chomper.core - INFO: Call symbol "_objc_getClass" 2024-12-21 04:17:07,580 - chomper.core - INFO: Start emulate at libobjc.A.dylib!0x194805c54 2024-12-21 04:17:07,580 - chomper.core - INFO: Call symbol "_sel_registerName" 2024-12-21 04:17:07,580 - chomper.core - INFO: Start emulate at libobjc.A.dylib!0x1948074a4 2024-12-21 04:17:07,580 - chomper.core - INFO: Call symbol "_objc_msgSend" 2024-12-21 04:17:07,580 - chomper.core - INFO: Start emulate at libobjc.A.dylib!0x1947ec460 2024-12-21 04:17:07,581 - chomper.core - INFO: Call symbol "_sel_registerName" 2024-12-21 04:17:07,581 - chomper.core - INFO: Start emulate at libobjc.A.dylib!0x1948074a4 2024-12-21 04:17:07,581 - chomper.core - INFO: Call symbol "_objc_msgSend" 2024-12-21 04:17:07,581 - chomper.core - INFO: Start emulate at libobjc.A.dylib!0x1947ec460 2024-12-21 04:17:07,603 - chomper.core - INFO: System call 0x154 invoked from libsystem_kernel.dylib!0x1ac330544 2024-12-21 04:17:07,603 - chomper.file - INFO: Monitor 'lstat' call: path='/private' 2024-12-21 04:17:07,603 - chomper.core - INFO: System call 0x152 invoked from libsystem_kernel.dylib!0x1ac331304 2024-12-21 04:17:07,603 - chomper.file - INFO: Monitor 'stat' call: path='/var/containers/Bundle/Application/E7C9AE8F-B469-492B-AEAF-BAACADAD34FA/com.ceair.b2m' 2024-12-21 04:17:07,603 - chomper.file - INFO: Map path '/var/containers/Bundle/Application/E7C9AE8F-B469-492B-AEAF-BAACADAD34FA/com.ceair.b2m' -> 'D:\iRabbitProject\irabbit_project\ibox-wtoken-server-master-dongfanghangkong\ceair_server\rootfs\ios\var\containers\Bundle\Application\E7C9AE8F-B469-492B-AEAF-BAACADAD34FA\com.ceair.b2m' 2024-12-21 04:17:07,604 - chomper.core - INFO: System call 0x152 invoked from libsystem_kernel.dylib!0x1ac331304 2024-12-21 04:17:07,604 - chomper.file - INFO: Monitor 'stat' call: path='/private/var/containers/Bundle/Application/E7C9AE8F-B469-492B-AEAF-BAACADAD34FA/com.ceair.b2m' 2024-12-21 04:17:07,604 - chomper.file - INFO: Forward path '/private/var/containers/Bundle/Application/E7C9AE8F-B469-492B-AEAF-BAACADAD34FA/com.ceair.b2m' -> 'D:\iRabbitProject\irabbit_project\ibox-wtoken-server-master-dongfanghangkong\ceair_server\rootfs/ios\private\var\containers\Bundle\Application\43E5FB44-22FC-4DC2-9D9E-E2702A988A2E\com.yourcompany.ProductName' 2024-12-21 04:17:07,604 - chomper.file - INFO: Monitor 'stat' return 2024-12-21 04:17:07,605 - chomper.core - INFO: System call 0x21 invoked from libsystem_kernel.dylib!0x1ac32f52c 2024-12-21 04:17:07,605 - chomper.file - INFO: Monitor 'access' call: path='/private/var/containers/Bundle/Application/E7C9AE8F-B469-492B-AEAF-BAACADAD34FA/com.ceair.b2m', mode=4 2024-12-21 04:17:07,605 - chomper.file - INFO: Forward path '/private/var/containers/Bundle/Application/E7C9AE8F-B469-492B-AEAF-BAACADAD34FA/com.ceair.b2m' -> 'D:\iRabbitProject\irabbit_project\ibox-wtoken-server-master-dongfanghangkong\ceair_server\rootfs/ios\private\var\containers\Bundle\Application\43E5FB44-22FC-4DC2-9D9E-E2702A988A2E\com.yourcompany.ProductName' 2024-12-21 04:17:07,605 - chomper.file - INFO: Monitor 'access' return: 0 2024-12-21 04:17:07,609 - chomper.core - INFO: Call symbol "_sel_registerName" 2024-12-21 04:17:07,609 - chomper.core - INFO: Start emulate at libobjc.A.dylib!0x1948074a4 2024-12-21 04:17:07,609 - chomper.core - INFO: Call symbol "_objc_msgSend" 2024-12-21 04:17:07,610 - chomper.core - INFO: Start emulate at libobjc.A.dylib!0x1947ec460 2024-12-21 04:17:07,611 - chomper.core - INFO: Call symbol "_CFStringCreateWithCString" 2024-12-21 04:17:07,612 - chomper.core - IN

irabbit666666 avatar Dec 20 '24 20:12 irabbit666666

我分析一下它是怎么检测的

sledgeh4w avatar Dec 21 '24 11:12 sledgeh4w

[] Query Dictionary: { acct = "acw_sc__v3"; class = genp; "m_Limit" = "m_LimitOne"; pdmn = cku; "r_Data" = 1; svce = "acw_sc__v3"; } [-] 查询失败,错误代码: -25300 [] SecItemCopyMatching Called! [] Query Dictionary: { acct = "com.amap.adiu.desencrypt"; class = genp; svce = "com.amap.adiu.desencrypt"; sync = 0; } [+] 查询成功! Error: access violation accessing 0x0 at (frida/runtime/core.js:141) at onLeave (/hook_SecItemCopyMatchin .js:24) [] SecItemCopyMatching Called! [] Query Dictionary: { atag = {length = 14, bytes = 0x5253415574696c5f5075624b6579}; class = keys; kcls = 0; "r_Ref" = 1; type = 42; } [+] 查询成功! [+] 返回结果: <SecKeyRef algorithm id: 1, key type: RSAPublicKey, version: 4, block size: 2048 bits, exponent: {hex: 10001, decimal: 65 537}, modulus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addr: 0x281aadba0> [!] 数据解析失败: not a function [] SecItemCopyMatching Called! [] Query Dictionary: { acct = SDKSSKeyBangcleDevTimeAccount; class = genp; "m_Limit" = "m_LimitOne"; "r_Data" = 1; svce = SDKSSKeyBangcleDevService; sync = syna; } [-] 查询失败,错误代码: -25300 [] SecItemCopyMatching Called! [] Query Dictionary: { acct = SSKeyBangcleImeiAccount; class = genp; "m_Limit" = "m_LimitOne"; "r_Data" = 1; svce = SSKeyBangcleImeiService; sync = syna; } [+] 查询成功! [+] 返回结果: {length = 36, bytes = 0x44313438 44414439 2d343245 302d3445 ... 34353237 38374342 } [!] 数据解析失败: not a function [] SecItemCopyMatching Called! [] Query Dictionary: { acct = SSKeyBangcleDevAddressAccount; class = genp; "m_Limit" = "m_LimitOne"; "r_Data" = 1; svce = SSKeyBangcleDevAddressService; sync = syna; } [+] 查询成功! [+] 返回结果: {length = 36, bytes = 0x31423841 33313446 2d414139 312d3444 ... 34444444 35463046 } [!] 数据解析失败: not a function [] SecItemCopyMatching Called! [] Query Dictionary: { acct = "acw_sc__v3"; class = genp; "m_Limit" = "m_LimitOne"; pdmn = cku; "r_Data" = 1; svce = "acw_sc__v3"; } [-] 查询失败,错误代码: -25300 [] SecItemCopyMatching Called! [] Query Dictionary: { acct = "APSecuritySDKcom.alipay.securesdk.storage"; class = genp; "m_Limit" = "m_LimitOne"; "r_Data" = 1; svce = "com.alipay.alisecx.localstorage.G0qoiq-qnvodakfa"; } [+] 查询成功! [+] 返回结果: {length = 216, bytes = 0x4c707159 544c6366 31337077 62537149 ... 612b6a4a 34513d3d } [!] 数据解析失败: not a function [] SecItemCopyMatching Called! [] Query Dictionary: { acct = APSecuritySDKpassword; class = genp; "m_Limit" = "m_LimitOne"; "r_Data" = 1; svce = "sec_sdk_shared"; } [-] 查询失败,错误代码: -25300 [] SecItemCopyMatching Called! [] Query Dictionary: { acct = "APSecuritySDKcom.alipay.asssecuresdk.apdidc"; class = genp; "m_Limit" = "m_LimitOne"; "r_Data" = 1; svce = "com.alipay.alisecx.localstorage.G0qoiq-qnvodakfa"; } [-] 查询失败,错误代码: -25300 [] SecItemCopyMatching Called! [] Query Dictionary: { acct = "APSecuritySDKcom.alipay.securesdk.ranstr"; class = genp; "m_Limit" = "m_LimitOne"; "r_Data" = 1; svce = "com.alipay.alisecx.localstorage.G0qoiq-qnvodakfa"; } [] SecItemCopyMatching Called! [] Query Dictionary: { acct = "APSecuritySDKcom.alipay.securesdk.storage"; class = genp; "m_Limit" = "m_LimitOne"; "r_Data" = 1; svce = "com.alipay.alisecx.localstorage.G0qoiq-qnvodakfa"; } [+] 查询成功! [+] 返回结果: {length = 64, bytes = 0x584b684b 597a7856 504e5a41 542f6f67 ... 63537434 4a52754a } [+] 查询成功! [+] 返回结果: {length = 216, bytes = 0x4c707159 544c6366 31337077 62537149 ... 612b6a4a 34513d3d } [!] 数据解析失败: not a function [!] 数据解析失败: not a function [] SecItemCopyMatching Called! [] SecItemCopyMatching Called! [] Query Dictionary: { acct = APSecuritySDKpassword; class = genp; "m_Limit" = "m_LimitOne"; "r_Data" = 1; svce = "sec_sdk_shared"; } [] Query Dictionary: { acct = "APSecuritySDKcom.alipay.securesdk.clientkey"; class = genp; "m_Limit" = "m_LimitOne"; "r_Data" = 1; svce = "com.alipay.alisecx.localstorage.G0qoiq-qnvodakfa"; } [-] 查询失败,错误代码: -25300 [] SecItemCopyMatching Called! [] Query Dictionary: { acct = "APSecuritySDKcom.alipay.asssecuresdk.apdidc"; class = genp; "m_Limit" = "m_LimitOne"; "r_Data" = 1; svce = "com.alipay.alisecx.localstorage.G0qoiq-qnvodakfa"; } [+] 查询成功! [-] 查询失败,错误代码: -25300 [+] 返回结果: {length = 64, bytes = 0x575a5253 4a58756d 514c4431 4874676d ... 344b7870 67664163 } [] SecItemCopyMatching Called! [!] 数据解析失败: not a function [] SecItemCopyMatching Called! [] Query Dictionary: { acct = "APSecuritySDKcom.alipay.securesdk.ranstr"; class = genp; "m_Limit" = "m_LimitOne"; "r_Data" = 1; svce = "com.alipay.alisecx.localstorage.G0qoiq-qnvodakfa"; } [] Query Dictionary: { acct = "APSecuritySDKcom.alipay.asssecuritySDK.lastlogintime"; class = genp; "m_Limit" = "m_LimitOne"; "r_Data" = 1; svce = "com.alipay.alisecx.localstorage.G0qoiq-qnvodakfa"; } [+] 查询成功! [+] 查询成功! [+] 返回结果: {length = 44, bytes = 0x65624d46 694d6977 6d6f697a 33323238 ... 374f6f58 5537553d } [!] 数据解析失败: not a function [] SecItemCopyMatching Called! [] Query Dictionary: { acct = "APSecuritySDKcom.alipay.securesdk.tokenid"; class = genp; "m_Limit" = "m_LimitOne"; "r_Data" = 1; svce = "com.alipay.alisecx.localstorage.G0qoiq-qnvodakfa"; } [+] 返回结果: {length = 64, bytes = 0x584b684b 597a7856 504e5a41 542f6f67 ... 63537434 4a52754a } [!] 数据解析失败: not a function [] SecItemCopyMatching Called! [] Query Dictionary: { acct = "APSecuritySDKcom.alipay.securesdk.clientkey"; class = genp; "m_Limit" = "m_LimitOne"; "r_Data" = 1; svce = "com.alipay.alisecx.localstorage.G0qoiq-qnvodakfa"; } [+] 查询成功! [+] 返回结果: {length = 56, bytes = 0x41414d41 5271364a 73697478 644e776c ... 36474a6e 44656743 } [!] 数据解析失败: not a function [+] 查询成功! [] SecItemCopyMatching Called! [] Query Dictionary: { acct = "APSecuritySDKcom.alipay.asssecuresdk.config"; class = genp; "m_Limit" = "m_LimitOne"; "r_Data" = 1; svce = "com.alipay.alisecx.localstorage.G0qoiq-qnvodakfa"; } [+] 返回结果: {length = 64, bytes = 0x575a5253 4a58756d 514c4431 4874676d ... 344b7870 67664163 } [!] 数据解析失败: not a function [] SecItemCopyMatching Called! [] Query Dictionary: { acct = "APSecuritySDKcom.alipay.asssecuritySDK.lastlogintime"; class = genp; "m_Limit" = "m_LimitOne"; "r_Data" = 1; svce = "com.alipay.alisecx.localstorage.G0qoiq-qnvodakfa"; } [+] 查询成功! [+] 返回结果: {length = 172, bytes = 0x5138477a 486f7759 37377563 6661307a ... 4a6a6369 4774303d } [!] 数据解析失败: not a function [+] 查询成功! [+] 返回结果: {length = 44, bytes = 0x65624d46 694d6977 6d6f697a 33323238 ... 374f6f58 5537553d } [!] 数据解析失败: not a function [] SecItemCopyMatching Called! [] Query Dictionary: { acct = "APSecuritySDKcom.alipay.securesdk.tokenid"; class = genp; "m_Limit" = "m_LimitOne"; "r_Data" = 1; svce = "com.alipay.alisecx.localstorage.G0qoiq-qnvodakfa"; } [+] 查询成功! [+] 返回结果: {length = 56, bytes = 0x41414d41 5271364a 73697478 644e776c ... 36474a6e 44656743 } [!] 数据解析失败: not a function [] SecItemCopyMatching Called! [] Query Dictionary: { acct = "APSecuritySDKcom.alipay.asssecuritySDK.zorro"; class = genp; "m_Limit" = "m_LimitOne"; "r_Data" = 1; svce = "com.alipay.alisecx.localstorage.G0qoiq-qnvodakfa"; } [+] 查询成功! [+] 返回结果: {length = 88, bytes = 0x4f4d3532 48592f6a 4a4c7577 465a6d73 ... 72416e44 72413d3d } [!] 数据解析失败: not a function [] SecItemCopyMatching Called! [] Query Dictionary: { acct = "APSecuritySDKcom.alipay.asssecuresdk.envmode.mainToken"; class = genp; "m_Limit" = "m_LimitOne"; "r_Data" = 1; svce = "com.alipay.alisecx.localstorage.G0qoiq-qnvodakfa"; } [+] 查询成功! [+] 返回结果: {length = 64, bytes = 0x4a4a5565 4a593756 6d37526c 54745158 ... 716a4d4d 6a6f614f } [!] 数据解析失败: not a function [] SecItemCopyMatching Called! [] Query Dictionary: { acct = "APSecuritySDKcom.alipay.asssecuresdk.dynamickey"; class = genp; "m_Limit" = "m_LimitOne"; "r_Data" = 1; svce = "com.alipay.alisecx.localstorage.G0qoiq-qnvodakfa"; } [+] 查询成功! [+] 返回结果: {length = 108, bytes = 0x30312b54 32596665 4a446e4c 744b6348 ... 73493945 565a773d } [!] 数据解析失败: not a function [] SecItemCopyMatching Called! [] Query Dictionary: { atag = {length = 14, bytes = 0x5253415574696c5f5075624b6579}; class = keys; kcls = 0; "r_Ref" = 1; type = 42; } [+] 查询成功! [+] 返回结果: <SecKeyRef algorithm id: 1, key type: RSAPublicKey, version: 4, block size: 2048 bits, exponent: {hex: 10001, decimal: 65 537}, modulus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addr: 0x281fe3ce0> [!] 数据解析失败: not a function [] SecItemCopyMatching Called! [] Query Dictionary: { acct = SDKSSKeyBangcleDevTimeAccount; class = genp; "m_Limit" = "m_LimitOne"; "r_Data" = 1; svce = SDKSSKeyBangcleDevService; sync = syna; } [-] 查询失败,错误代码: -25300 [] SecItemCopyMatching Called! [] Query Dictionary: { acct = SSKeyBangcleImeiAccount; class = genp; "m_Limit" = "m_LimitOne"; "r_Data" = 1; svce = SSKeyBangcleImeiService; sync = syna; } [+] 查询成功! [+] 返回结果: {length = 36, bytes = 0x44313438 44414439 2d343245 302d3445 ... 34353237 38374342 } [!] 数据解析失败: not a function [] SecItemCopyMatching Called! [] Query Dictionary: { acct = SSKeyBangcleDevAddressAccount; class = genp; "m_Limit" = "m_LimitOne"; "r_Data" = 1; svce = SSKeyBangcleDevAddressService; sync = syna; } [+] 查询成功! [+] 返回结果: {length = 36, bytes = 0x31423841 33313446 2d414139 312d3444 ... 34444444 35463046 } [!] 数据解析失败: not a function [] SecItemCopyMatching Called! [] Query Dictionary: { acct = "acw_sc__v3"; class = genp; "m_Limit" = "m_LimitOne"; pdmn = cku; "r_Data" = 1; svce = "acw_sc__v3"; } [-] 查询失败,错误代码: -25300 [] SecItemCopyMatching Called! [] Query Dictionary: { atag = {length = 14, bytes = 0x5253415574696c5f5075624b6579}; class = keys; kcls = 0; "r_Ref" = 1; type = 42; } [+] 查询成功! [+] 返回结果: <SecKeyRef algorithm id: 1, key type: RSAPublicKey, version: 4, block size: 2048 bits, exponent: {hex: 10001, decimal: 65 537}, modulus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addr: 0x281f93200> [!] 数据解析失败: not a function [] SecItemCopyMatching Called! [] Query Dictionary: { acct = SDKSSKeyBangcleDevTimeAccount; class = genp; "m_Limit" = "m_LimitOne"; "r_Data" = 1; svce = SDKSSKeyBangcleDevService; sync = syna; } [-] 查询失败,错误代码: -25300 [] SecItemCopyMatching Called! [] Query Dictionary: { acct = SSKeyBangcleImeiAccount; class = genp; "m_Limit" = "m_LimitOne"; "r_Data" = 1; svce = SSKeyBangcleImeiService; sync = syna; } [+] 查询成功! [+] 返回结果: {length = 36, bytes = 0x44313438 44414439 2d343245 302d3445 ... 34353237 38374342 } [!] 数据解析失败: not a function [] SecItemCopyMatching Called! [] Query Dictionary: { acct = SSKeyBangcleDevAddressAccount; class = genp; "m_Limit" = "m_LimitOne"; "r_Data" = 1; svce = SSKeyBangcleDevAddressService; sync = syna; } [+] 查询成功! [+] 返回结果: {length = 36, bytes = 0x31423841 33313446 2d414139 312d3444 ... 34444444 35463046 } [!] 数据解析失败: not a function [] SecItemCopyMatching Called! [] Query Dictionary: { acct = "acw_sc__v3"; class = genp; "m_Limit" = "m_LimitOne"; pdmn = cku; "r_Data" = 1; svce = "acw_sc__v3"; } [-] 查询失败,错误代码: -25300 [] SecItemCopyMatching Called! [] Query Dictionary: { atag = {length = 14, bytes = 0x5253415574696c5f5075624b6579}; class = keys; kcls = 0; "r_Ref" = 1; type = 42; } [+] 查询成功! [+] 返回结果: <SecKeyRef algorithm id: 1, key type: RSAPublicKey, version: 4, block size: 2048 bits, exponent: {hex: 10001, decimal: 65 537}, modulus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addr: 0x281fb9740> [!] 数据解析失败: not a function [] SecItemCopyMatching Called! [] Query Dictionary: { acct = SDKSSKeyBangcleDevTimeAccount; class = genp; "m_Limit" = "m_LimitOne"; "r_Data" = 1; svce = SDKSSKeyBangcleDevService; sync = syna; } [-] 查询失败,错误代码: -25300 [] SecItemCopyMatching Called! [] Query Dictionary: { acct = SSKeyBangcleImeiAccount; class = genp; "m_Limit" = "m_LimitOne"; "r_Data" = 1; svce = SSKeyBangcleImeiService; sync = syna; } [+] 查询成功! [+] 返回结果: {length = 36, bytes = 0x44313438 44414439 2d343245 302d3445 ... 34353237 38374342 } [!] 数据解析失败: not a function [] SecItemCopyMatching Called! [] Query Dictionary: { acct = SSKeyBangcleDevAddressAccount; class = genp; "m_Limit" = "m_LimitOne"; "r_Data" = 1; svce = SSKeyBangcleDevAddressService; sync = syna; } [+] 查询成功! [+] 返回结果: {length = 36, bytes = 0x31423841 33313446 2d414139 312d3444 ... 34444444 35463046 } [!] 数据解析失败: not a function [] SecItemCopyMatching Called! [] Query Dictionary: { acct = "acw_sc__v3"; class = genp; "m_Limit" = "m_LimitOne"; pdmn = cku; "r_Data" = 1; svce = "acw_sc__v3"; } [-] 查询失败,错误代码: -25300 [] SecItemCopyMatching Called! [] Query Dictionary: { atag = {length = 14, bytes = 0x5253415574696c5f5075624b6579}; class = keys; kcls = 0; "r_Ref" = 1; type = 42; } [+] 查询成功! [+] 返回结果: <SecKeyRef algorithm id: 1, key type: RSAPublicKey, version: 4, block size: 2048 bits, exponent: {hex: 10001, decimal: 65 537}, modulus: A4C9C4A7B4D2FC5BFEFD363929F2A27B7837C80776A731EBC154A7DA40F3CDC321507624A6A94B5F50E13BBB185C569AFCDFAD2993E9151618ECA693A11931A0E094ED4ADDEE0318319C2F5A80BA5083F247E388081A71AE27861430BDEBAC770FE3A641C88977CD87DAAA328D318EC271E57EAFAD394E2B4F50A00E7E9C583763717EB37B2B7756410DAE0902738628131E4C13CA42E0731CBC6E373B93C35DA3BCBF28C37CE05BC26FEEFF4660059ADAC2C02B909F066595A7C2178C8EE642670164F167EB42047391BB2A7CF1D0C62230AA67F5E9037AB80AEFA64DCA6BE9F0537BABFDF0E8EBF8942E7354B17A72BC6267C05FCE51C68C6926C299D38915, addr: 0x281fba680> [!] 数据解析失败: not a function [] SecItemCopyMatching Called! [] Query Dictionary: { acct = SDKSSKeyBangcleDevTimeAccount; class = genp; "m_Limit" = "m_LimitOne"; "r_Data" = 1; svce = SDKSSKeyBangcleDevService; sync = syna; } [-] 查询失败,错误代码: -25300 [] SecItemCopyMatching Called! [] Query Dictionary: { acct = SSKeyBangcleImeiAccount; class = genp; "m_Limit" = "m_LimitOne"; "r_Data" = 1; svce = SSKeyBangcleImeiService; sync = syna; } [+] 查询成功! [+] 返回结果: {length = 36, bytes = 0x44313438 44414439 2d343245 302d3445 ... 34353237 38374342 } [!] 数据解析失败: not a function [] SecItemCopyMatching Called! [] Query Dictionary: { acct = SSKeyBangcleDevAddressAccount; class = genp; "m_Limit" = "m_LimitOne"; "r_Data" = 1; svce = SSKeyBangcleDevAddressService; sync = syna; } [+] 查询成功! [+] 返回结果: {length = 36, bytes = 0x31423841 33313446 2d414139 312d3444 ... 34444444 35463046 } [!] 数据解析失败: not a function [] SecItemCopyMatching Called! [] Query Dictionary: { acct = "acw_sc__v3"; class = genp; "m_Limit" = "m_LimitOne"; pdmn = cku; "r_Data" = 1; svce = "acw_sc__v3"; } [-] 查询失败,错误代码: -25300 [] SecItemCopyMatching Called! [] Query Dictionary: { atag = {length = 14, bytes = 0x5253415574696c5f5075624b6579}; class = keys; kcls = 0; "r_Ref" = 1; type = 42; } [+] 查询成功! [+] 返回结果: <SecKeyRef algorithm id: 1, key type: RSAPublicKey, version: 4, block size: 2048 bits, exponent: {hex: 10001, decimal: 65 537}, modulus: A4C9C4A7B4D2FC5BFEFD363929F2A27B7837C80776A731EBC154A7DA40F3CDC321507624A6A94B5F50E13BBB185C569AFCDFAD2993E9151618ECA693A11931A0E094ED4ADDEE0318319C2F5A80BA5083F247E388081A71AE27861430BDEBAC770FE3A641C88977CD87DAAA328D318EC271E57EAFAD394E2B4F50A00E7E9C583763717EB37B2B7756410DAE0902738628131E4C13CA42E0731CBC6E373B93C35DA3BCBF28C37CE05BC26FEEFF4660059ADAC2C02B909F066595A7C2178C8EE642670164F167EB42047391BB2A7CF1D0C62230AA67F5E9037AB80AEFA64DCA6BE9F0537BABFDF0E8EBF8942E7354B17A72BC6267C05FCE51C68C6926C299D38915, addr: 0x281f41b80> [!] 数据解析失败: not a function [] SecItemCopyMatching Called! [] Query Dictionary: { acct = SDKSSKeyBangcleDevTimeAccount; class = genp; "m_Limit" = "m_LimitOne"; "r_Data" = 1; svce = SDKSSKeyBangcleDevService; sync = syna; } [-] 查询失败,错误代码: -25300 [] SecItemCopyMatching Called! [] Query Dictionary: { acct = SSKeyBangcleImeiAccount; class = genp; "m_Limit" = "m_LimitOne"; "r_Data" = 1; svce = SSKeyBangcleImeiService; sync = syna; } [+] 查询成功! [+] 返回结果: {length = 36, bytes = 0x44313438 44414439 2d343245 302d3445 ... 34353237 38374342 } [!] 数据解析失败: not a function [] SecItemCopyMatching Called! [] Query Dictionary: { acct = SSKeyBangcleDevAddressAccount; class = genp; "m_Limit" = "m_LimitOne"; "r_Data" = 1; svce = SSKeyBangcleDevAddressService; sync = syna; } [+] 查询成功! [+] 返回结果: {length = 36, bytes = 0x31423841 33313446 2d414139 312d3444 ... 34444444 35463046 } [!] 数据解析失败: not a function [] SecItemCopyMatching Called! [] Query Dictionary: { acct = "acw_sc__v3"; class = genp; "m_Limit" = "m_LimitOne"; pdmn = cku; "r_Data" = 1; svce = "acw_sc__v3"; } [-] 查询失败,错误代码: -25300 [] SecItemCopyMatching Called! [] Query Dictionary: { atag = {length = 14, bytes = 0x5253415574696c5f5075624b6579}; class = keys; kcls = 0; "r_Ref" = 1; type = 42; } [+] 查询成功! [+] 返回结果: <SecKeyRef algorithm id: 1, key type: RSAPublicKey, version: 4, block size: 2048 bits, exponent: {hex: 10001, decimal: 65 537}, modulus: A4C9C4A7B4D2FC5BFEFD363929F2A27B7837C80776A731EBC154A7DA40F3CDC321507624A6A94B5F50E13BBB185C569AFCDFAD2993E9151618ECA693A11931A0E094ED4ADDEE0318319C2F5A80BA5083F247E388081A71AE27861430BDEBAC770FE3A641C88977CD87DAAA328D318EC271E57EAFAD394E2B4F50A00E7E9C583763717EB37B2B7756410DAE0902738628131E4C13CA42E0731CBC6E373B93C35DA3BCBF28C37CE05BC26FEEFF4660059ADAC2C02B909F066595A7C2178C8EE642670164F167EB42047391BB2A7CF1D0C62230AA67F5E9037AB80AEFA64DCA6BE9F0537BABFDF0E8EBF8942E7354B17A72BC6267C05FCE51C68C6926C299D38915, addr: 0x281cad7e0> [!] 数据解析失败: not a function [] SecItemCopyMatching Called! [] Query Dictionary: { acct = SDKSSKeyBangcleDevTimeAccount; class = genp; "m_Limit" = "m_LimitOne"; "r_Data" = 1; svce = SDKSSKeyBangcleDevService; sync = syna; } [-] 查询失败,错误代码: -25300 [] SecItemCopyMatching Called! [] Query Dictionary: { acct = SSKeyBangcleImeiAccount; class = genp; "m_Limit" = "m_LimitOne"; "r_Data" = 1; svce = SSKeyBangcleImeiService; sync = syna; } [+] 查询成功! [+] 返回结果: {length = 36, bytes = 0x44313438 44414439 2d343245 302d3445 ... 34353237 38374342 } [!] 数据解析失败: not a function [] SecItemCopyMatching Called! [] Query Dictionary: { acct = SSKeyBangcleDevAddressAccount; class = genp; "m_Limit" = "m_LimitOne"; "r_Data" = 1; svce = SSKeyBangcleDevAddressService; sync = syna; } [+] 查询成功! [+] 返回结果: {length = 36, bytes = 0x31423841 33313446 2d414139 312d3444 ... 34444444 35463046 } [!] 数据解析失败: not a function [] SecItemCopyMatching Called! [] Query Dictionary: { acct = "acw_sc__v3"; class = genp; "m_Limit" = "m_LimitOne"; pdmn = cku; "r_Data" = 1; svce = "acw_sc__v3"; } [-] 查询失败,错误代码: -25300 [] SecItemCopyMatching Called! [] Query Dictionary: { atag = {length = 14, bytes = 0x5253415574696c5f5075624b6579}; class = keys; kcls = 0; "r_Ref" = 1; type = 42; } [+] 查询成功! [+] 返回结果: <SecKeyRef algorithm id: 1, key type: RSAPublicKey, version: 4, block size: 2048 bits, exponent: {hex: 10001, decimal: 65 537}, modulus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addr: 0x281f0c360> [!] 数据解析失败: not a function [] SecItemCopyMatching Called! [] Query Dictionary: { acct = SDKSSKeyBangcleDevTimeAccount; class = genp; "m_Limit" = "m_LimitOne"; "r_Data" = 1; svce = SDKSSKeyBangcleDevService; sync = syna; } [-] 查询失败,错误代码: -25300 [] SecItemCopyMatching Called! [] Query Dictionary: { acct = SSKeyBangcleImeiAccount; class = genp; "m_Limit" = "m_LimitOne"; "r_Data" = 1; svce = SSKeyBangcleImeiService; sync = syna; } [+] 查询成功! [+] 返回结果: {length = 36, bytes = 0x44313438 44414439 2d343245 302d3445 ... 34353237 38374342 } [!] 数据解析失败: not a function [] SecItemCopyMatching Called! [] Query Dictionary: { acct = SSKeyBangcleDevAddressAccount; class = genp; "m_Limit" = "m_LimitOne"; "r_Data" = 1; svce = SSKeyBangcleDevAddressService; sync = syna; } [+] 查询成功! [+] 返回结果: {length = 36, bytes = 0x31423841 33313446 2d414139 312d3444 ... 34444444 35463046 } [!] 数据解析失败: not a function [] SecItemCopyMatching Called! [] Query Dictionary: { acct = "acw_sc__v3"; class = genp; "m_Limit" = "m_LimitOne"; pdmn = cku; "r_Data" = 1; svce = "acw_sc__v3"; } [-] 查询失败,错误代码: -25300 [] SecItemCopyMatching Called! [] Query Dictionary: { atag = {length = 14, bytes = 0x5253415574696c5f5075624b6579}; class = keys; kcls = 0; "r_Ref" = 1; type = 42; } [+] 查询成功! [+] 返回结果: <SecKeyRef algorithm id: 1, key type: RSAPublicKey, version: 4, block size: 2048 bits, exponent: {hex: 10001, decimal: 65 537}, modulus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addr: 0x281f0b900> [!] 数据解析失败: not a function [] SecItemCopyMatching Called! [] Query Dictionary: { acct = SDKSSKeyBangcleDevTimeAccount; class = genp; "m_Limit" = "m_LimitOne"; "r_Data" = 1; svce = SDKSSKeyBangcleDevService; sync = syna; } [-] 查询失败,错误代码: -25300 [] SecItemCopyMatching Called! [] Query Dictionary: { acct = SSKeyBangcleImeiAccount; class = genp; "m_Limit" = "m_LimitOne"; "r_Data" = 1; svce = SSKeyBangcleImeiService; sync = syna; } [+] 查询成功! [+] 返回结果: {length = 36, bytes = 0x44313438 44414439 2d343245 302d3445 ... 34353237 38374342 } [!] 数据解析失败: not a function [] SecItemCopyMatching Called! [] Query Dictionary: { acct = SSKeyBangcleDevAddressAccount; class = genp; "m_Limit" = "m_LimitOne"; "r_Data" = 1; svce = SSKeyBangcleDevAddressService; sync = syna; } [+] 查询成功! [+] 返回结果: {length = 36, bytes = 0x31423841 33313446 2d414139 312d3444 ... 34444444 35463046 } [!] 数据解析失败: not a function [] SecItemCopyMatching Called! [] Query Dictionary: { acct = "acw_sc__v3"; class = genp; "m_Limit" = "m_LimitOne"; pdmn = cku; "r_Data" = 1; svce = "acw_sc__v3"; } [-] 查询失败,错误代码: -25300 [] SecItemCopyMatching Called! [] Query Dictionary: { atag = {length = 14, bytes = 0x5253415574696c5f5075624b6579}; class = keys; kcls = 0; "r_Ref" = 1; type = 42; } [+] 查询成功! [+] 返回结果: <SecKeyRef algorithm id: 1, key type: RSAPublicKey, version: 4, block size: 2048 bits, exponent: {hex: 10001, decimal: 65 537}, modulus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addr: 0x281f0aac0> [!] 数据解析失败: not a function [] SecItemCopyMatching Called! [] Query Dictionary: { acct = SDKSSKeyBangcleDevTimeAccount; class = genp; "m_Limit" = "m_LimitOne"; "r_Data" = 1; svce = SDKSSKeyBangcleDevService; sync = syna; } [-] 查询失败,错误代码: -25300 [] SecItemCopyMatching Called! [] Query Dictionary: { acct = SSKeyBangcleImeiAccount; class = genp; "m_Limit" = "m_LimitOne"; "r_Data" = 1; svce = SSKeyBangcleImeiService; sync = syna; } [+] 查询成功! [+] 返回结果: {length = 36, bytes = 0x44313438 44414439 2d343245 302d3445 ... 34353237 38374342 } [!] 数据解析失败: not a function [] SecItemCopyMatching Called! [] Query Dictionary: { acct = SSKeyBangcleDevAddressAccount; class = genp; "m_Limit" = "m_LimitOne"; "r_Data" = 1; svce = SSKeyBangcleDevAddressService; sync = syna; } [+] 查询成功! [+] 返回结果: {length = 36, bytes = 0x31423841 33313446 2d414139 312d3444 ... 34444444 35463046 } [!] 数据解析失败: not a function [] SecItemCopyMatching Called! [*] Query Dictionary: { acct = "acw_sc__v3"; class = genp; "m_Limit" = "m_LimitOne"; pdmn = cku; "r_Data" = 1; svce = "acw_sc__v3"; } [-] 查询失败,错误代码: -25300

SecItemCopyMatching 里的很多数据都是必要的,不能粗暴的直接返回0,这样会导致新版本token完全失效

irabbit666666 avatar Dec 21 '24 16:12 irabbit666666

我大概定位到了问题所在,-[AliTigerTally initialize:] 没有执行完全。在 0x102B58CC 有一处 dispatch_async 调用(chomper 默认不会执行),这个异步任务里面包含数十项各类的检测,不执行完的话,最后加密出来的结果就会被视为异常。这些检测里面涉及的不少系统函数还需要从底层支持一下。

sledgeh4w avatar Jan 03 '25 02:01 sledgeh4w