Frida-Multiple-Bypass icon indicating copy to clipboard operation
Frida-Multiple-Bypass copied to clipboard

emulator detected LDPlayer9 Android 9 64bit - can't login MH Now com.nianticlabs.monsterhunter

Open MujurID opened this issue 1 year ago • 0 comments

emulator detected LDPlayer9 Android 9 64bit - can't login MH Now com.nianticlabs.monsterhunter bypass.js

  --> Bypassing Trustmanager (Android < 7) request
  --> Bypassing TrustManagerImpl checkTrusted
Process crashed: SIGSEGV SI_KERNEL

***
*** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
Build fingerprint: 'samsung/star2qltezh/star2qltechn:9/PQ3B.190801.12041624/G9650ZHU2ARC6:user/release-keys'
Revision: '0'
ABI: 'x86_64'
pid: 6438, tid: 6627, name: UnityMain  >>> com.nianticlabs.monsterhunter <<<
signal 11 (SIGSEGV), code 128 (SI_KERNEL), fault addr 0x0
    rax 00ffffffffffffff  rbx 00000000038062c0  rcx 0000000000000005  rdx 00007fff55b64030
    r8  00007fff6f1c1920  r9  00007fff6ead7620  r10 0000000000008270  r11 0000000000000246
    r12 00007fff56212070  r13 006dda79c2df1b16  r14 00007fff6f1c9260  r15 00007fff6f1c3f80
    rdi 00000000038062c0  rsi 0000000000000005
    rbp 0000000000000009  rsp 00007ffe62bc32f0  rip 00007fff6ead776a

backtrace:
    #00 pc 000000000011676a  /system/lib64/libhoudini.so (offset 0xfd000)
    #01 pc 00000000001db14f  /system/lib64/libhoudini.so (offset 0xfd000)
    #02 pc 00000000000f9f66  /system/lib64/libhoudini.so
    #03 pc 00000000002f6143  /system/lib64/libhoudini.so (offset 0xfd000)
***
[SM G977N::com.nianticlabs.monsterhunter ]->

Thank you for using Frida!

MujurID avatar Jan 13 '24 18:01 MujurID