2023.10.11
今天早上不幸得知账号被冻结了。重新绑了一下密保手机之后解冻了,然后删除device.json和cache文件夹重新登录成功。
冻结原因未知。
2023.10.5
稍微等了一段时间,时不时在自己手机上挂一下使用,并且在其他渠道找到了8.9.70的ANDROID_PAD登陆协议和签名服务器配置,今天使用8.9.70重新登录成功(删除了过去的cache文件夹和device.json),暂时改成已解决。后续如果出现其他问题我会继续在帖子里更新。
忘记说了,我在这次登陆装了这个能让设备信息更拟真的插件:
https://github.com/cssxsh/mirai-device-generator/releases/tag/v1.2.0
2023.9.28
我使用的mirai版本是:2.16.0-RC
用的是ANDROID_PAD协议,版本是8.9.63
然后用的服务是unidbg-fetch-qsign
使用签名服务前两天能够正常自动登陆,第三天自动和手动登陆都报CODE=45
Mirai日志:
...
Mirai日志:
/login 账号 密码 ANDROID_PAD
2023-09-28 22:19:02 I/KFCFactory: create EncryptService(id=2750556895), protocol=ANDROID_PAD(8.9.63) by fuqiuluo/unidbg-fetch-qsign from file:///D:/mirai-dice-classic/KFCFactory.json
2023-09-28 22:19:02 I/KFCFactory: unidbg-fetch-qsign by http://127.0.0.1:8080 about
{
"code": 0,
"msg": "IAA 云天明 章北海",
"data": {
"version": "1.1.9",
"protocol": {
"qua": "V1_AND_SQ_8.9.63_4194_YYB_D",
"version": "8.9.63",
"code": "4194",
"package_name": "com.tencent.mobileqq"
}
}
}
2023-09-28 22:19:02 I/Bot.2750556895: Loaded account secrets from local cache.
2023-09-28 22:19:03 I/UnidbgFetchQsign: Bot(2750556895) initialize by http://127.0.0.1:8080
2023-09-28 22:19:05 I/UnidbgFetchQsign: Bot(2750556895) register, Instance loaded successfully.
2023-09-28 22:19:05 I/UnidbgFetchQsign: Bot(2750556895) initialize complete
2023-09-28 22:19:06 I/Bot.2750556895: Loaded account secrets from local cache.
2023-09-28 22:19:07 I/Bot.2750556895: Loaded account secrets from local cache.
2023-09-28 22:19:07 W/UnidbgFetchQsign: with CoroutineName(SendMessage)
java.lang.RuntimeException: Bot(2750556895) callback trpc.o3.ecdh_access.EcdhAccess.SsoSecureA2Establish
at fix-protocol-version-1.12.0.mirai2.jar//xyz.cssxsh.mirai.tool.UnidbgFetchQsign$callback$1.invokeSuspend(UnidbgFetchQsign.kt:236)
at kotlin.coroutines.jvm.internal.BaseContinuationImpl.resumeWith(ContinuationImpl.kt:33)
at kotlinx.coroutines.DispatchedTask.run(DispatchedTask.kt:104)
at kotlinx.coroutines.scheduling.CoroutineScheduler.runSafely(CoroutineScheduler.kt:570)
at kotlinx.coroutines.scheduling.CoroutineScheduler$Worker.executeTask(CoroutineScheduler.kt:750)
at kotlinx.coroutines.scheduling.CoroutineScheduler$Worker.runWorker(CoroutineScheduler.kt:677)
at kotlinx.coroutines.scheduling.CoroutineScheduler$Worker.run(CoroutineScheduler.kt:664)
Caused by: net.mamoe.mirai.internal.network.components.LoginFailedExceptionAsNetworkException: BotAuthorization(BotAuthorization.byPassword(<ERASED>)) threw an exception during authorization process. See cause below.
at net.mamoe.mirai.internal.network.handler.CommonNetworkHandler$StateConnecting$startState$2.invokeSuspend(CommonNetworkHandler.kt:249)
at kotlin.coroutines.jvm.internal.BaseContinuationImpl.resumeWith(ContinuationImpl.kt:33)
at kotlinx.coroutines.internal.ScopeCoroutine.afterResume(Scopes.kt:33)
at kotlinx.coroutines.AbstractCoroutine.resumeWith(AbstractCoroutine.kt:102)
at kotlin.coroutines.jvm.internal.BaseContinuationImpl.resumeWith(ContinuationImpl.kt:46)
at kotlinx.coroutines.DispatchedTask.run(DispatchedTask.kt:106)
... 4 more
Caused by: net.mamoe.mirai.network.BotAuthorizationException: BotAuthorization(BotAuthorization.byPassword(<ERASED>)) threw an exception during authorization process. See cause below.
at net.mamoe.mirai.internal.network.components.SsoProcessorImpl.login(SsoProcessor.kt:263)
at net.mamoe.mirai.internal.network.components.SsoProcessorImpl$login$1.invokeSuspend(SsoProcessor.kt)
... 9 more
Suppressed: net.mamoe.mirai.network.WrongPasswordException: Error(bot=Bot(2750556895), code=45, title=禁止登录, message=你当前使用的QQ版本过低,请前往QQ官网im.qq.com下载最新版QQ后重试。, errorInfo=)
at net.mamoe.mirai.internal.network.components.SsoProcessorImpl$SlowLoginImpl.doLogin(SsoProcessor.kt:490)
at net.mamoe.mirai.internal.network.components.SsoProcessorImpl$SlowLoginImpl$doLogin$1.invokeSuspend(SsoProcessor.kt)
... 9 more
Suppressed: java.lang.IllegalStateException: Fast login failed: Error(bot=Bot(2750556895), code=16, title=登录失败, message=你的用户身份已失效,为保证账号安全,请你重新 登录。, errorInfo=)
at net.mamoe.mirai.internal.network.components.SsoProcessorImpl$FastLoginImpl.doLogin(SsoProcessor.kt:528)
at net.mamoe.mirai.internal.network.components.SsoProcessorImpl$FastLoginImpl$doLogin$1.invokeSuspend(SsoProcessor.kt)
... 9 more
[CIRCULAR REFERENCE:net.mamoe.mirai.network.WrongPasswordException: Error(bot=Bot(2750556895), code=45, title=禁止登录, message=你当前使用的QQ版本过低,请前往QQ官网im.qq.com下载最新版QQ后重试。, errorInfo=)]
2023-09-28 22:19:07 I/UnidbgFetchQsign: Bot(2750556895) destroy, Instance destroyed successfully.
2023-09-28 22:19:07 I/Bot.2750556895: Bot cancelled: Bot closed
Login failed: BotAuthorization(BotAuthorization.byPassword(<ERASED>)) threw an exception during authorization process. See cause below.
2023-09-28 22:19:10 E/console: net.mamoe.mirai.network.BotAuthorizationException: BotAuthorization(BotAuthorization.byPassword(<ERASED>)) threw an exception during authorization process. See cause below.
net.mamoe.mirai.network.BotAuthorizationException: BotAuthorization(BotAuthorization.byPassword(<ERASED>)) threw an exception during authorization process. See cause below.
at net.mamoe.mirai.internal.network.components.SsoProcessorImpl.login(SsoProcessor.kt:263)
at net.mamoe.mirai.internal.network.components.SsoProcessorImpl$login$1.invokeSuspend(SsoProcessor.kt)
at kotlin.coroutines.jvm.internal.BaseContinuationImpl.resumeWith(ContinuationImpl.kt:33)
at kotlinx.coroutines.internal.ScopeCoroutine.afterResume(Scopes.kt:33)
at kotlinx.coroutines.AbstractCoroutine.resumeWith(AbstractCoroutine.kt:102)
at kotlin.coroutines.jvm.internal.BaseContinuationImpl.resumeWith(ContinuationImpl.kt:46)
at kotlinx.coroutines.DispatchedTask.run(DispatchedTask.kt:106)
at kotlinx.coroutines.scheduling.CoroutineScheduler.runSafely(CoroutineScheduler.kt:570)
at kotlinx.coroutines.scheduling.CoroutineScheduler$Worker.executeTask(CoroutineScheduler.kt:750)
at kotlinx.coroutines.scheduling.CoroutineScheduler$Worker.runWorker(CoroutineScheduler.kt:677)
at kotlinx.coroutines.scheduling.CoroutineScheduler$Worker.run(CoroutineScheduler.kt:664)
Suppressed: net.mamoe.mirai.network.WrongPasswordException: Error(bot=Bot(2750556895), code=45, title=禁止登录, message=你当前使用的QQ版本过低,请前往QQ官网im.qq.com下载最新版QQ后重试。, errorInfo=)
at net.mamoe.mirai.internal.network.components.SsoProcessorImpl$SlowLoginImpl.doLogin(SsoProcessor.kt:490)
at net.mamoe.mirai.internal.network.components.SsoProcessorImpl$SlowLoginImpl$doLogin$1.invokeSuspend(SsoProcessor.kt)
... 9 more
Suppressed: java.lang.IllegalStateException: Fast login failed: Error(bot=Bot(2750556895), code=16, title=登录失败, message=你的用户身份已失效,为保证账号安全,请你重新 登录。, errorInfo=)
at net.mamoe.mirai.internal.network.components.SsoProcessorImpl$FastLoginImpl.doLogin(SsoProcessor.kt:528)
at net.mamoe.mirai.internal.network.components.SsoProcessorImpl$FastLoginImpl$doLogin$1.invokeSuspend(SsoProcessor.kt)
... 9 more
[CIRCULAR REFERENCE:net.mamoe.mirai.network.WrongPasswordException: Error(bot=Bot(2750556895), code=45, title=禁止登录, message=你当前使用的QQ版本过低,请前往QQ官网im.qq.com下载最新版QQ后重试。, errorInfo=)]
签名服务日志
...
Microsoft Windows [版本 10.0.19045.3448]
(c) Microsoft Corporation。保留所有权利。
D:\unidbg-fetch-qsign.3\unidbg-fetch-qsign-1.1.9>bin\unidbg-fetch-qsign.bat --basePath=txlib\8.9.63
FEBond sum = 7680
Load Package = Protocol(qua=V1_AND_SQ_8.9.63_4194_YYB_D, version=8.9.63, code=4194, packageName=com.tencent.mobileqq)
22:03:37.922 [main] INFO ktor.application - Autoreload is disabled because the development mode is off.
22:03:38.271 [main] INFO ktor.application - Application started in 0.38 seconds.
22:03:38.277 [main] DEBUG io.netty.util.internal.logging.InternalLoggerFactory - Using SLF4J as the default logging framework
22:03:38.296 [main] DEBUG io.netty.util.internal.PlatformDependent0 - -Dio.netty.noUnsafe: false
22:03:38.297 [main] DEBUG io.netty.util.internal.PlatformDependent0 - Java version: 11
22:03:38.298 [main] DEBUG io.netty.util.internal.PlatformDependent0 - sun.misc.Unsafe.theUnsafe: available
22:03:38.298 [main] DEBUG io.netty.util.internal.PlatformDependent0 - sun.misc.Unsafe.copyMemory: available
22:03:38.299 [main] DEBUG io.netty.util.internal.PlatformDependent0 - sun.misc.Unsafe.storeFence: available
22:03:38.299 [main] DEBUG io.netty.util.internal.PlatformDependent0 - java.nio.Buffer.address: available
22:03:38.300 [main] DEBUG io.netty.util.internal.PlatformDependent0 - direct buffer constructor: unavailable: Reflective setAccessible(true) disabled
22:03:38.300 [main] DEBUG io.netty.util.internal.PlatformDependent0 - java.nio.Bits.unaligned: available, true
22:03:38.301 [main] DEBUG io.netty.util.internal.PlatformDependent0 - jdk.internal.misc.Unsafe.allocateUninitializedArray(int): unavailable: class io.netty.util.internal.PlatformDependent0$7 cannot access class jdk.internal.misc.Unsafe (in module java.base) because module java.base does not export jdk.internal.misc to unnamed module @7af707e0
22:03:38.302 [main] DEBUG io.netty.util.internal.PlatformDependent0 - java.nio.DirectByteBuffer.<init>(long, int): unavailable
22:03:38.302 [main] DEBUG io.netty.util.internal.PlatformDependent - sun.misc.Unsafe: available
22:03:38.329 [main] DEBUG io.netty.util.internal.PlatformDependent - maxDirectMemory: 2107637760 bytes (maybe)
22:03:38.330 [main] DEBUG io.netty.util.internal.PlatformDependent - -Dio.netty.tmpdir: C:\Users\A\AppData\Local\Temp (java.io.tmpdir)
22:03:38.330 [main] DEBUG io.netty.util.internal.PlatformDependent - -Dio.netty.bitMode: 64 (sun.arch.data.model)
22:03:38.331 [main] DEBUG io.netty.util.internal.PlatformDependent - Platform: Windows
22:03:38.332 [main] DEBUG io.netty.util.internal.PlatformDependent - -Dio.netty.maxDirectMemory: -1 bytes
22:03:38.332 [main] DEBUG io.netty.util.internal.PlatformDependent - -Dio.netty.uninitializedArrayAllocationThreshold: -1
22:03:38.333 [main] DEBUG io.netty.util.internal.CleanerJava9 - java.nio.ByteBuffer.cleaner(): available
22:03:38.333 [main] DEBUG io.netty.util.internal.PlatformDependent - -Dio.netty.noPreferDirect: false
22:03:38.463 [main] DEBUG io.netty.channel.MultithreadEventLoopGroup - -Dio.netty.eventLoopThreads: 16
22:03:38.469 [main] DEBUG io.netty.util.concurrent.GlobalEventExecutor - -Dio.netty.globalEventExecutor.quietPeriodSeconds: 1
22:03:38.472 [main] DEBUG io.netty.util.internal.InternalThreadLocalMap - -Dio.netty.threadLocalMap.stringBuilder.initialSize: 1024
22:03:38.472 [main] DEBUG io.netty.util.internal.InternalThreadLocalMap - -Dio.netty.threadLocalMap.stringBuilder.maxSize: 4096
22:03:38.476 [main] DEBUG io.netty.channel.nio.NioEventLoop - -Dio.netty.noKeySetOptimization: false
22:03:38.477 [main] DEBUG io.netty.channel.nio.NioEventLoop - -Dio.netty.selectorAutoRebuildThreshold: 512
22:03:38.482 [main] DEBUG io.netty.util.internal.PlatformDependent - org.jctools-core.MpscChunkedArrayQueue: available
22:03:38.510 [main] DEBUG io.netty.channel.DefaultChannelId - -Dio.netty.processId: 19036 (auto-detected)
22:03:38.513 [main] DEBUG io.netty.util.NetUtil - -Djava.net.preferIPv4Stack: false
22:03:38.513 [main] DEBUG io.netty.util.NetUtil - -Djava.net.preferIPv6Addresses: false
22:03:38.602 [main] DEBUG io.netty.util.NetUtilInitializations - Loopback interface: lo (Software Loopback Interface 1, 127.0.0.1)
22:03:38.602 [main] DEBUG io.netty.util.NetUtil - Failed to get SOMAXCONN from sysctl and file \proc\sys\net\core\somaxconn. Default: 200
22:03:38.608 [main] DEBUG io.netty.channel.DefaultChannelId - -Dio.netty.machineId: d4:3b:04:ff:fe:58:aa:ca (auto-detected)
22:03:38.616 [main] DEBUG io.netty.util.ResourceLeakDetector - -Dio.netty.leakDetection.level: simple
22:03:38.616 [main] DEBUG io.netty.util.ResourceLeakDetector - -Dio.netty.leakDetection.targetRecords: 4
22:03:38.634 [main] DEBUG io.netty.buffer.PooledByteBufAllocator - -Dio.netty.allocator.numHeapArenas: 16
22:03:38.634 [main] DEBUG io.netty.buffer.PooledByteBufAllocator - -Dio.netty.allocator.numDirectArenas: 16
22:03:38.634 [main] DEBUG io.netty.buffer.PooledByteBufAllocator - -Dio.netty.allocator.pageSize: 8192
22:03:38.634 [main] DEBUG io.netty.buffer.PooledByteBufAllocator - -Dio.netty.allocator.maxOrder: 9
22:03:38.634 [main] DEBUG io.netty.buffer.PooledByteBufAllocator - -Dio.netty.allocator.chunkSize: 4194304
22:03:38.634 [main] DEBUG io.netty.buffer.PooledByteBufAllocator - -Dio.netty.allocator.smallCacheSize: 256
22:03:38.635 [main] DEBUG io.netty.buffer.PooledByteBufAllocator - -Dio.netty.allocator.normalCacheSize: 64
22:03:38.635 [main] DEBUG io.netty.buffer.PooledByteBufAllocator - -Dio.netty.allocator.maxCachedBufferCapacity: 32768
22:03:38.635 [main] DEBUG io.netty.buffer.PooledByteBufAllocator - -Dio.netty.allocator.cacheTrimInterval: 8192
22:03:38.635 [main] DEBUG io.netty.buffer.PooledByteBufAllocator - -Dio.netty.allocator.cacheTrimIntervalMillis: 0
22:03:38.635 [main] DEBUG io.netty.buffer.PooledByteBufAllocator - -Dio.netty.allocator.useCacheForAllThreads: false
22:03:38.635 [main] DEBUG io.netty.buffer.PooledByteBufAllocator - -Dio.netty.allocator.maxCachedByteBuffersPerChunk: 1023
22:03:38.646 [main] DEBUG io.netty.buffer.ByteBufUtil - -Dio.netty.allocator.type: pooled
22:03:38.647 [main] DEBUG io.netty.buffer.ByteBufUtil - -Dio.netty.threadLocalDirectBufferSize: 0
22:03:38.648 [main] DEBUG io.netty.buffer.ByteBufUtil - -Dio.netty.maxThreadLocalCharBufferSize: 16384
22:03:38.666 [DefaultDispatcher-worker-1] INFO ktor.application - Responding at http://127.0.0.1:8080
22:05:04.725 [eventLoopGroupProxy-3-1] DEBUG io.netty.buffer.AbstractByteBuf - -Dio.netty.buffer.checkAccessible: true
22:05:04.725 [eventLoopGroupProxy-3-1] DEBUG io.netty.buffer.AbstractByteBuf - -Dio.netty.buffer.checkBounds: true
22:05:04.730 [eventLoopGroupProxy-3-1] DEBUG io.netty.util.ResourceLeakDetectorFactory - Loaded default ResourceLeakDetector: io.netty.util.ResourceLeakDetector@5ce883a9
22:05:04.796 [eventLoopGroupProxy-3-1] DEBUG io.netty.util.Recycler - -Dio.netty.recycler.maxCapacityPerThread: 4096
22:05:04.796 [eventLoopGroupProxy-3-1] DEBUG io.netty.util.Recycler - -Dio.netty.recycler.ratio: 8
22:05:04.799 [eventLoopGroupProxy-3-1] DEBUG io.netty.util.Recycler - -Dio.netty.recycler.chunkSize: 32
22:05:04.804 [eventLoopGroupProxy-3-1] DEBUG io.netty.util.Recycler - -Dio.netty.recycler.blocking: false
22:05:04.805 [eventLoopGroupProxy-3-1] DEBUG io.netty.util.Recycler - -Dio.netty.recycler.batchFastThreadLocalOnly: true
22:05:06.141 [eventLoopGroupProxy-4-2] DEBUG org.scijava.nativelib.BaseJniExtractor - Deleting leftover folder: C:\Users\A\AppData\Local\Temp\nativelib-loader_4069085358442131152
22:05:06.150 [eventLoopGroupProxy-4-2] DEBUG org.scijava.nativelib.NativeLibraryUtil - processor is INTEL_64 os.arch is amd64
22:05:06.151 [eventLoopGroupProxy-4-2] DEBUG org.scijava.nativelib.NativeLibraryUtil - architecture is WINDOWS_64 os.name is windows 10
22:05:06.151 [eventLoopGroupProxy-4-2] DEBUG org.scijava.nativelib.NativeLibraryUtil - architecture is WINDOWS_64 os.name is windows 10
22:05:06.152 [eventLoopGroupProxy-4-2] DEBUG org.scijava.nativelib.NativeLibraryUtil - platform specific path is natives/windows_64/
22:05:06.152 [eventLoopGroupProxy-4-2] DEBUG org.scijava.nativelib.BaseJniExtractor - mappedLib is unicorn.dll
22:05:06.154 [eventLoopGroupProxy-4-2] DEBUG org.scijava.nativelib.BaseJniExtractor - URL is jar:file:/D:/unidbg-fetch-qsign.3/unidbg-fetch-qsign-1.1.9/lib/unidbg-android-105.jar!/natives/windows_64/unicorn.dll
22:05:06.154 [eventLoopGroupProxy-4-2] DEBUG org.scijava.nativelib.BaseJniExtractor - URL path is file:/D:/unidbg-fetch-qsign.3/unidbg-fetch-qsign-1.1.9/lib/unidbg-android-105.jar!/natives/windows_64/unicorn.dll
22:05:06.155 [eventLoopGroupProxy-4-2] DEBUG org.scijava.nativelib.BaseJniExtractor - Extracting 'jar:file:/D:/unidbg-fetch-qsign.3/unidbg-fetch-qsign-1.1.9/lib/unidbg-android-105.jar!/natives/windows_64/unicorn.dll' to 'C:\Users\A\AppData\Local\Temp\nativelib-loader_17248491636897764305\unicorn.dll'
QSign-Unidbg 白名单模式
[FEKit_]info: device_token_entry.h:87 initUin 2750556895
[FEKit_]info: device_info.h:583 start create xwid
[FEKit_]info: device_info.h:610 create xwid complete
[FEKit_]info: device_info.h:620 start create xwid step2
9月 28, 2023 10:05:08 下午 moe.fuqiuluo.unidbg.env.FileResolver resolve
警告: Couldn't find file: /mnt/sdcard/jly1/
9月 28, 2023 10:05:08 下午 moe.fuqiuluo.unidbg.env.FileResolver resolve
警告: Couldn't find file: /mnt/sdcard/jly1/a
[FEKit_]info: device_info.h:629 create xwid step2 complete ret is 71
[FEKit_]info: device_token.h:89 create new xwId complete
[FEKit_]error: o3_channel_encrypt.h:275 gen new channel
FEBound.transform(ac3d4779b87f770f889fe358e959fecd940e4bdd0294dc281e5bf57c6dbd2d61) => 70d1fff068dad596e3bd4a5ad0f0c9d4c7acf9942638c9aec111cfb044bc110e
[FEKit_]error: o3_channel_encrypt.h:491 est check: 57f6bc4b31127f9490dd904dc88ceb3da7a967d9a7e539570c1b22a63559a76902a82eaaeb057e432027bb36284d5e09
[FEKit_]error: ChannelManager.cpp:72 o3cm@S: GetSecConf, trpc.o3.ecdh_access.EcdhAccess.SsoSecureA2Establish
uin = 2750556895, id = 0, sendPacket(cmd = trpc.o3.ecdh_access.EcdhAccess.SsoSecureA2Establish, data = 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)
FEBound.transform(7e0401020000032ec1c8c10005d430917d340c28060e1b00000000214e295000000000) => 19a920af2d951eaad574b6940112dc5e18d92a0d259cba951d951dd9ced0bc832ea62e
[FEKit_]error: device_info.h:179 jniGetAppVersionName:8.9.63
[FEKit_]info: device_info.h:538 538
[FEKit_]info: device_info.h:540 540
[FEKit_]info: device_info.h:542 542
[FEKit_]info: device_token.h:247 begin pack
[FEKit_]info: device_token.h:249 pack buff result len:1412
[FEKit_]info: device_token.h:264 begin sendmessage : len :1412
[FEKit_]error: o3_channel_encrypt.h:442 ecdh repeat establish
FEBound.transform(940e43952664f82938215f9e5836a42d472a3acadb2ea16d8346091e1c54bbc2) => c7acf3ca5558aca053306b6bbbefe774fb6fc58e0f6c937fecf21ceb1df28ad8
[FEKit_]error: o3_channel_encrypt.h:491 est check: cc97626f4aec7fa70c476a5d85bb6c3538a954ea57e410cc3ed966ddda67be857b21ccd7db1e472bece06f5f5a929be8
[FEKit_]error: ChannelManager.cpp:72 o3cm@S: getToken, trpc.o3.ecdh_access.EcdhAccess.SsoSecureA2Establish
uin = 2750556895, id = 1, sendPacket(cmd = trpc.o3.ecdh_access.EcdhAccess.SsoSecureA2Establish, data = 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)
[FEKit_]info: qq_sign.h:132 [GetSign] cmd:wtlogin.exchange_emp
FEBound.transform(bb220102000003f5e8a168000f2ad074a513a16889f068000000007036783800000000) => b36320af2d951e8263a0a7940fdd6c107f50401d4a457c951d951db4fa7ed4832ea62e
[FEKit_]info: qq_sign.h:132 [GetSign] cmd:trpc.o3.ecdh_access.EcdhAccess.SsoSecureA2Establish
FEBound.transform(9e310102000003c3fddcfd00044d90e2e2e6436a1fe7a500000000723d784100000000) => c9de20af2d951e6db6cfce94085c9ca84c78f31e73e990951d951dbef47efb832ea62e
FEBound.transform(b330010200000323f2c7c200067c287665fe70fdc133c5000000004568496e00000000) => b5d620af2d951eadb979b3940a73141baf1c8e34f2ff30951d951dfc4b50a9832ea62e
[FEKit_]info: ChannelManager.cpp:97 origin cmd:GetSecConf ,cmd:trpc.o3.ecdh_access.EcdhAccess.SsoSecureA2Establish
[FEKit_]error: ChannelManager.cpp:100 [ChannelManager:OnReceive] success:1 cmd:trpc.o3.ecdh_access.EcdhAccess.SsoSecureA2Establish bcmd:GetSecConf
[FEKit_]info: task_handle.h:74 TaskSystem not allow
9月 28, 2023 10:05:10 下午 com.github.unidbg.linux.AndroidSyscallHandler getPipePair
信息: Return default pipe pair.
9月 28, 2023 10:05:10 下午 com.github.unidbg.linux.ARM64SyscallHandler fork
信息: fork
9月 28, 2023 10:05:10 下午 moe.fuqiuluo.unidbg.env.FileResolver resolve
警告: Couldn't find file: /data/app/~~vbcRLwPxS0GyVfqT-nCYrQ==/com.tencent.mobileqq-xJKJPVp9lorkCgR_w5zhyA==/lib/arm64
[FEKit_]info: task_handle.h:74 TaskSystem not allow
[FEKit_]info: qq_sign.h:132 [GetSign] cmd:wtlogin.login
FEBound.transform(bd060102000003e7c3f6d3000785c82315f190391cd27f00000000333e354500000000) => b8a820af2d951e08dc22da9406a534725f1eded070bbdb951d951d27fee5f0832ea62e
[FEKit_]info: qq_sign.h:132 [GetSign] cmd:trpc.o3.ecdh_access.EcdhAccess.SsoSecureA2Establish
FEBound.transform(bf320102000003e9361326000c5ff825bd136d33f8106f00000000726f787200000000) => b1d320af2d951e005edb89940dfbc471b85057d788a57b951d951dbe4f7e4d832ea62e
QSign-Unidbg 白名单模式
[FEKit_]info: device_token_entry.h:87 initUin 2750556895
[FEKit_]info: device_info.h:583 start create xwid
[FEKit_]info: device_info.h:610 create xwid complete
[FEKit_]info: device_info.h:620 start create xwid step2
9月 28, 2023 10:19:04 下午 moe.fuqiuluo.unidbg.env.FileResolver resolve
警告: Couldn't find file: /mnt/sdcard/jly1/
9月 28, 2023 10:19:04 下午 moe.fuqiuluo.unidbg.env.FileResolver resolve
警告: Couldn't find file: /mnt/sdcard/jly1/a
[FEKit_]info: device_info.h:629 create xwid step2 complete ret is 71
[FEKit_]info: device_token.h:89 create new xwId complete
[FEKit_]error: o3_channel_encrypt.h:275 gen new channel
FEBound.transform(7d483d9f6002e61e12a317a884c902c8c53410a7920813d11629cc8df7275026) => 18f4c7c91d9b02cac9abe01a58c00ddf6fd96eecb696be14ce36b50126d9bc7b
[FEKit_]error: o3_channel_encrypt.h:491 est check: 0a230eaf5b01c3a5969ee75f91edfc44082414300484fa409b06a8bb029a99beeb5f85fd199886f340b81d1b12e2c19c
[FEKit_]error: ChannelManager.cpp:72 o3cm@S: GetSecConf, trpc.o3.ecdh_access.EcdhAccess.SsoSecureA2Establish
uin = 2750556895, id = 0, sendPacket(cmd = trpc.o3.ecdh_access.EcdhAccess.SsoSecureA2Establish, data = 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)
FEBound.transform(ffe00102000003e7deebae0005c0a896b9ebd7e2a1041a0000000039363d3c00000000) => 917620af2d951e089161249401c4e45bb675efbf9298b4951d951d2dfaecd8832ea62e
[FEKit_]error: device_info.h:179 jniGetAppVersionName:8.9.63
[FEKit_]info: device_info.h:538 538
[FEKit_]info: device_info.h:540 540
[FEKit_]info: device_info.h:542 542
[FEKit_]info: device_token.h:247 begin pack
[FEKit_]info: device_token.h:249 pack buff result len:1412
[FEKit_]info: device_token.h:264 begin sendmessage : len :1412
[FEKit_]error: o3_channel_encrypt.h:442 ecdh repeat establish
FEBound.transform(79bfc268ecdf16dff206de86927cc65cd43ec742f5f5be26662d80635b0cae3a) => 16e7361dd0bab216b992d402a3733f9987dc3f2f814ee1acae389d47b283e9cd
[FEKit_]error: o3_channel_encrypt.h:491 est check: 6708aad9c79cad943b7fcf05c2fdafe180ac62b9f2f51a419117ec280ad9ff4f5c7bf8b5b822d1f6832f4edda462941c
[FEKit_]error: ChannelManager.cpp:72 o3cm@S: getToken, trpc.o3.ecdh_access.EcdhAccess.SsoSecureA2Establish
uin = 2750556895, id = 1, sendPacket(cmd = trpc.o3.ecdh_access.EcdhAccess.SsoSecureA2Establish, data = 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)
[FEKit_]info: qq_sign.h:132 [GetSign] cmd:wtlogin.exchange_emp
FEBound.transform(fb720102000003f5e7a297000db7b89d0740d9c1cebd17000000003226382a00000000) => 938320af2d951e826aaef09404b984542bf6e181fb82b5951d951d2e9aee12832ea62e
[FEKit_]info: qq_sign.h:132 [GetSign] cmd:trpc.o3.ecdh_access.EcdhAccess.SsoSecureA2Establish
FEBound.transform(ff910102000003eaf4c5f4000242206505fdf11dc63a7700000000323e384200000000) => 919e20af2d951e03b77ac19403581c012f11a074f5f4d5951d951d2efeeefd832ea62e
FEBound.transform(ff7b0102000003c7c0c9c00003f7a039ba383e3bddb69c000000007224742c00000000) => 918520af2d951e68dd76bd940799ecccb2d4cbd60e8149951d951dbe987218832ea62e
[FEKit_]info: ChannelManager.cpp:97 origin cmd:GetSecConf ,cmd:trpc.o3.ecdh_access.EcdhAccess.SsoSecureA2Establish
[FEKit_]error: ChannelManager.cpp:100 [ChannelManager:OnReceive] success:1 cmd:trpc.o3.ecdh_access.EcdhAccess.SsoSecureA2Establish bcmd:GetSecConf
[FEKit_]info: task_handle.h:74 TaskSystem not allow
9月 28, 2023 10:19:06 下午 com.github.unidbg.linux.AndroidSyscallHandler getPipePair
信息: Return default pipe pair.
9月 28, 2023 10:19:06 下午 com.github.unidbg.linux.ARM64SyscallHandler fork
信息: fork
9月 28, 2023 10:19:06 下午 moe.fuqiuluo.unidbg.env.FileResolver resolve
警告: Couldn't find file: /data/app/~~vbcRLwPxS0GyVfqT-nCYrQ==/com.tencent.mobileqq-xJKJPVp9lorkCgR_w5zhyA==/lib/arm64
[FEKit_]info: task_handle.h:74 TaskSystem not allow
[FEKit_]info: qq_sign.h:132 [GetSign] cmd:wtlogin.login
FEBound.transform(b849010200000330c0c9c00002f5d0a813b169f6b610cc0000000065636b6600000000) => b4fb20af2d951e55dd76bd9403956c4f55ee513b65a539951d951d4c4737af832ea62e
[FEKit_]info: qq_sign.h:132 [GetSign] cmd:trpc.o3.ecdh_access.EcdhAccess.SsoSecureA2Establish
FEBound.transform(bf44010200000323c7c2f70006d9e8e50840918eb9e1a00000000073247b2500000000) => b1f920af2d951eadda7ec0940a1054a124f6d0586ae39d951d951db7987710832ea62e