Skip to content

Instantly share code, notes, and snippets.

@silverwolfceh
Forked from TameemS/debloatLDPlayer.md
Created July 5, 2024 04:47
Show Gist options
  • Save silverwolfceh/45158f08b5334be69e7896b8f7022cc3 to your computer and use it in GitHub Desktop.
Save silverwolfceh/45158f08b5334be69e7896b8f7022cc3 to your computer and use it in GitHub Desktop.
Debloating LDPlayer

Inspired by this

More of my guides: Debloating MEMu - Debloating Nox (Updated)

This mainly applies to LDPlayer9. They will probably work on the low end options (like LDPlayer5) but not guaranteed.

Debloating LDPlayer

This emulator seems to have less stability issues than MEMu. I think we get the shtick that these emulators do spooky stuff.

  1. Download LDPlayer, preferably an offline version from the version history
  2. Go to LDPlayer Settings, make system.vmdk writable, go to Other Settings and enable Root Permission
  3. I would suggest getting off of LD's Launcher. Go get another one and set it as a default home app.
  4. Get a file manager that supports root, go to the root directory, then delete /system/priv-app/LDAppStore and /system/app/Launcher3. (why did they modify the AOSP launcher lol)
  5. Get AdAway and set it up, preferably with root-based blocking.
  6. Open C:\Windows\System32\drivers\etc\hosts with a text editor of your choice and add this in
0.0.0.0 encdn.ldmnq.com.w.alikunlun.com
0.0.0.0 apien.ldmnq.com
0.0.0.0 advertise.ldplayer.net.a.lahuashanbx.com
0.0.0.0 d19przo9d3f9zk.cloudfront.net
0.0.0.0 dldgmpfyeblzc.cloudfront.net
0.0.0.0 ins-o9iydzqn.ias.tencent-cloud.net
0.0.0.0 appstore.ldmnq.com
0.0.0.0 netease-publish-gdlgphs.w.alikunlun.com
0.0.0.0 d330if318qxsm2.cloudfront.net
0.0.0.0 dn2sifz9m7tkk.cloudfront.net
0.0.0.0 d3p6x1jquzbe0c.cloudfront.net
0.0.0.0 de2pmm85odupd.cloudfront.net
0.0.0.0 p-sgsg00.kxcdn.com
0.0.0.0 adabdapi.ldmnq.com
0.0.0.0 lden.oss-ap-southeast-1.aliyuncs.com
0.0.0.0 middledata.ldmnq.com
0.0.0.0 alb-fc2psc581f288qx1e4.cn-shanghai.alb.aliyuncs.com
0.0.0.0 www.google-analytics.com

(Most of these domains are according to Glasswire. If there are any more to block, tell me in the comments)

  1. Block dnplayer.exe in the firewall

And block the IP addresses using the files attached to this gist (original courtesy of ehindiayleau). Make sure both the batch and the text file are in the same folder! Open command prompt as admin and CD to the folder where you saved the two files.

Now let's install Magisk! (optional). Make sure you kept root on during all of this.

  1. Download Magisk Delta
  2. Launch it and allow everything it throws at you
  3. Directly install to system partition (you may need to relaunch the app for this option)
  4. Reboot, go to a root-supported file manager and delete /system/xbin/su to avoid conflicts and reboot again.
  5. That's about it. Go crazy

As far as I know there aren't any known ways to get around the SafetyNet detection. I've tried the usual methods that I use on my rooted phone and they didn't work. If you found a solution, please comment below! At the moment, SafetyNet requirements do not seem to pose a big threat and devs do use workarounds so that everyone can play no matter which platform (e.g. multiplayer games putting you in emulator lobbies).

@echo off
if "%1"=="list" (
netsh advfirewall firewall show rule ld_ip_to_fw_rule | findstr RemoteIP
exit/b
)
netsh advfirewall firewall delete rule name="ld_ip_to_fw_rule"
for /f %%i in (ld_block.txt) do (
netsh advfirewall firewall add rule name="ld_ip_to_fw_rule" protocol=any dir=in action=block remoteip=%%i
netsh advfirewall firewall add rule name="ld_ip_to_fw_rule" protocol=any dir=out action=block remoteip=%%i
)
call %0 list
pause
79.133.177.0-79.133.177.255,163.181.56.0-163.181.56.255,163.181.92.0-163.181.92.255,47.74.196.235,139.224.223.140,106.14.57.193,139.196.27.122,106.15.125.201,47.74.196.239
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment