@tadho
For some reason i didn't get an alert. Anyway.
I had a look at the decompiled bytecode and save related shit was heavily obfuscated. The decompiler could not even decompile without errors there. I have no idea how to properly reverse engineer that tbh.
If only someone could help me understand the assembly code in the screenshot below, I'm quite confident that I can write a script/program to mint the checksum for MHST mobile save file.
![Ae0tMrX.png](https://i.imgur.com/Ae0tMrX.png)
It's checkSaveData() function in lib/arm64-v8a/libMHR.so file inside the APK. I have like zero knowledge of assembly code, I can't do much here
![cry :cry: :cry:](/styles/default/gbatemp/smileys/cry.gif)
Last edited by tadho,