在越狱环境中,app闪退如何解决

需求: 需要对一个app进行分析学习,但是下载之后打开即闪退。尝试了很多屏蔽越狱检测插件,都没有效果。

希望大家可以给一些思路,如何可以找到相关函数进行hook,让程序正常启动。
**日志:
Hardware Model: iPhone8,1
Process: xxx [4564]
Path: /private/var/containers/Bundle/Application/9069C0E3-0E58-48A7-9EC0-C8CC4C9A231B/xxx.app/xxx
Identifier: xxxx
Version: 3.3.5 (3.3.5)
AppStoreTools: 13C90b
AppVariant: 1:iPhone8,1:13
Code Type: ARM-64 (Native)
Role: Foreground
Parent Process: launchd [1]
Coalition: [860]

Date/Time: 2022-02-11 19:03:19.1977 +0800
Launch Time: 2022-02-11 19:03:18.8927 +0800
OS Version: iPhone OS 13.7 (17H35)
Release Type: User
Baseband Version: 7.70.01
Report Version: 104

Exception Type: EXC_BAD_ACCESS (SIGBUS)
Exception Subtype: EXC_ARM_DA_ALIGN at 0x004cb907f9405d01
VM Region Info: 0x4cb907f9405d01 is not in any region. Bytes after previous region: 21595530853375234
REGION TYPE START - END [ VSIZE] PRT/MAX SHRMOD REGION DETAIL
MALLOC_NANO 0000000280000000-00000002a0000000 [512.0M] rw-/rwx SM=PRV
—>
UNUSED SPACE AT END

Termination Signal: Bus error: 10
Termination Reason: Namespace SIGNAL, Code 0xa
Terminating Process: exc handler [4564]
Triggered by Thread: 0

Thread 0 name: Dispatch queue: com.apple.main-thread
Thread 0 Crashed:
0 ??? 0x004cb907f9405d01 0 + 21595542127664385
1 ??? 0x007ffffffee63d62 0 + 36028797000498530

Thread 1:
0 libsystem_pthread.dylib 0x00000001a7476738 0x1a7468000 + 59192

Thread 2:
0 libsystem_pthread.dylib 0x00000001a7476738 0x1a7468000 + 59192

Thread 0 crashed with ARM Thread State (64-bit):
x0: 0x0000000000000000 x1: 0x0000000104a81a00 x2: 0x000000000000000a x3: 0x00000001a7464e90
x4: 0x000000028213cb40 x5: 0x0000000000000001 x6: 0x0000000000000000 x7: 0x0000000000000403
x8: 0xfffff9ea1d54732d x9: 0x944cb907f9405d01 x10: 0x0000000000000029 x11: 0x000000000000002a
x12: 0x000000016da80738 x13: 0x0000000000000001 x14: 0x0000000000000001 x15: 0x0000000000000881
x16: 0x00000001a7464628 x17: 0x0000000000000000 x18: 0x0000000000000000 x19: 0x0000000104a819e0
x20: 0x0000000000000008 x21: 0x00000001a74a6960 x22: 0x000000028081bc18 x23: 0x000000010289ec70
x24: 0x000000028081bc00 x25: 0x00000001e2a441b6 x26: 0x00000001044c3e00 x27: 0x00000001f42ea000
x28: 0x00000001f14dc000 fp: 0x000000016da807f0 lr: 0x0000000000000000
sp: 0x0000000000000000 pc: 0x004cb907f9405d01 cpsr: 0x60000000
esr: 0x8a000000 (PC alignment)

Binary Images:
0x102378000 - 0x10414ffff xxx arm64 <75020b8c30f837b59f8dabc3a3a61ea8> /var/containers/Bundle/Application/9069C0E3-0E58-48A7-9EC0-C8CC4C9A231B/xxx.app/xxx
0x104d60000 - 0x104d63fff SubstrateBootstrap.dylib arm64 /usr/lib/substrate/SubstrateBootstrap.dylib
0x104dd4000 - 0x104debfff SubstrateLoader.dylib arm64 <08f63dbbd7153bd3b4ca926c1c575e74> /usr/lib/substrate/SubstrateLoader.dylib
0x104e58000 - 0x104e5bfff SubstrateInserter.dylib arm64 /usr/lib/substrate/SubstrateInserter.dylib
0x104e64000 - 0x104f73fff libsubstrate.dylib arm64 /usr/lib/libsubstrate.dylib
0x104fc8000 - 0x104fcffff Choicy.dylib arm64 <07e77db5604d39ac9a3ba4c0d9645f4d> /Library/MobileSubstrate/DynamicLibraries/ Choicy.dylib
0x104ff0000 - 0x104ff7fff SSLKillSwitch2.dylib arm64 <1558cf50b9ed33efb44238933dd9e056> /Library/MobileSubstrate/DynamicLibraries/SSLKillSwitch2.dylib
0x105004000 - 0x105067fff cy-xyww45.dylib arm64 /Library/Caches/cy-xyww45.dylib
0x1050e4000 - 0x106253fff JCSDKOC arm64 <8842df1d99f13bf285aa5598cdc66485>

** 任何其他描述: 用idevicesyslog查看了启动时候的日志,没发现什么有用的信息。

光大的云缴费app啊,我看刑 :joy:

太刑了

用汇编写的,找到位置手动path吧

1 个赞

额,因为我的手机是越狱手机,想正常使用软件来着,然后打不开,就想看看怎么解决。

能更详细地说一下吗,谢谢

大佬,就是想正常使用,这个也做不了啥啊。