@tadho
For some reason i didn't get an alert. Anyway.
I had a look at the decompiled bytecode and save related shit was heavily obfuscated. The decompiler could not even decompile without errors there. I have no idea how to properly reverse engineer that tbh.
If only someone could help me understand the assembly code in the screenshot below, I'm quite confident that I can write a script/program to mint the checksum for MHST mobile save file.
It's checkSaveData() function in lib/arm64-v8a/libMHR.so file inside the APK. I have like zero knowledge of assembly code, I can't do much here
Last edited by tadho,