Skip to content

Instantly share code, notes, and snippets.

@TameemS
Last active April 29, 2024 11:51
Show Gist options
  • Star 33 You must be signed in to star a gist
  • Fork 3 You must be signed in to fork a gist
  • Save TameemS/894cdb8adae1d6042a5f21c4e80bcd9e to your computer and use it in GitHub Desktop.
Save TameemS/894cdb8adae1d6042a5f21c4e80bcd9e to your computer and use it in GitHub Desktop.
Debloating LDPlayer

Inspired by this

More of my guides: Debloating MEMu - Debloating Nox (Updated)

This mainly applies to LDPlayer9. They will probably work on the low end options (like LDPlayer5) but not guaranteed.

Debloating LDPlayer

This emulator seems to have less stability issues than MEMu. I think we get the shtick that these emulators do spooky stuff.

  1. Download LDPlayer, preferably an offline version from the version history
  2. Go to LDPlayer Settings, make system.vmdk writable, go to Other Settings and enable Root Permission
  3. I would suggest getting off of LD's Launcher. Go get another one and set it as a default home app.
  4. Get a file manager that supports root, go to the root directory, then delete /system/priv-app/LDAppStore and /system/app/Launcher3. (why did they modify the AOSP launcher lol)
  5. Get AdAway and set it up, preferably with root-based blocking.
  6. Open C:\Windows\System32\drivers\etc\hosts with a text editor of your choice and add this in
0.0.0.0 encdn.ldmnq.com.w.alikunlun.com
0.0.0.0 apien.ldmnq.com
0.0.0.0 advertise.ldplayer.net.a.lahuashanbx.com
0.0.0.0 d19przo9d3f9zk.cloudfront.net
0.0.0.0 dldgmpfyeblzc.cloudfront.net
0.0.0.0 ins-o9iydzqn.ias.tencent-cloud.net
0.0.0.0 appstore.ldmnq.com
0.0.0.0 netease-publish-gdlgphs.w.alikunlun.com
0.0.0.0 d330if318qxsm2.cloudfront.net
0.0.0.0 dn2sifz9m7tkk.cloudfront.net
0.0.0.0 d3p6x1jquzbe0c.cloudfront.net
0.0.0.0 de2pmm85odupd.cloudfront.net
0.0.0.0 p-sgsg00.kxcdn.com
0.0.0.0 adabdapi.ldmnq.com
0.0.0.0 lden.oss-ap-southeast-1.aliyuncs.com
0.0.0.0 middledata.ldmnq.com
0.0.0.0 alb-fc2psc581f288qx1e4.cn-shanghai.alb.aliyuncs.com
0.0.0.0 www.google-analytics.com

(Most of these domains are according to Glasswire. If there are any more to block, tell me in the comments)

  1. Block dnplayer.exe in the firewall

And block the IP addresses using the files attached to this gist (original courtesy of ehindiayleau). Make sure both the batch and the text file are in the same folder! Open command prompt as admin and CD to the folder where you saved the two files.

Now let's install Magisk! (optional). Make sure you kept root on during all of this.

  1. Download Magisk Delta
  2. Launch it and allow everything it throws at you
  3. Directly install to system partition (you may need to relaunch the app for this option)
  4. Reboot, go to a root-supported file manager and delete /system/xbin/su to avoid conflicts and reboot again.
  5. That's about it. Go crazy

As far as I know there aren't any known ways to get around the SafetyNet detection. I've tried the usual methods that I use on my rooted phone and they didn't work. If you found a solution, please comment below! At the moment, SafetyNet requirements do not seem to pose a big threat and devs do use workarounds so that everyone can play no matter which platform (e.g. multiplayer games putting you in emulator lobbies).

@echo off
if "%1"=="list" (
netsh advfirewall firewall show rule ld_ip_to_fw_rule | findstr RemoteIP
exit/b
)
netsh advfirewall firewall delete rule name="ld_ip_to_fw_rule"
for /f %%i in (ld_block.txt) do (
netsh advfirewall firewall add rule name="ld_ip_to_fw_rule" protocol=any dir=in action=block remoteip=%%i
netsh advfirewall firewall add rule name="ld_ip_to_fw_rule" protocol=any dir=out action=block remoteip=%%i
)
call %0 list
pause
79.133.177.0-79.133.177.255,163.181.56.0-163.181.56.255,163.181.92.0-163.181.92.255,47.74.196.235,139.224.223.140,106.14.57.193,139.196.27.122,106.15.125.201,47.74.196.239
@TrialMacameau
Copy link

TrialMacameau commented May 15, 2023

Again it does involve deleting folders off the emulator which can be reinstalled upon upgrades to the software and if you can't remove these 2 mentioned folders due to Read Only despite having Root Permission enabled, you can Freeze them using Titanium Backup : https://drive.google.com/file/d/1KXARgGteRzFBd_rs77g19S31pag-R3E9/view?usp=share_link

@DABnoREGRET
Copy link

You missed the quotation marks in the bat file.

for /f %%i in ("ld_block.txt") do (

@TameemS
Copy link
Author

TameemS commented Jul 5, 2023

You missed the quotation marks in the bat file.

for /f %%i in ("ld_block.txt") do (

Shit thanks for pointing that out lol

@TameemS
Copy link
Author

TameemS commented Jul 5, 2023

Actually no im fucking tired. it was correct before lol. this is batch not java

@JaxemMax
Copy link

great guide! but i noticed that after following all the steps ldplayer still seems to connect to the following domains:
lden.oss-ap-southeast-1.aliyuncs.com
middledata.ldmnq.com

@TameemS
Copy link
Author

TameemS commented Jul 27, 2023

great guide! but i noticed that after following all the steps ldplayer still seems to connect to the following domains: lden.oss-ap-southeast-1.aliyuncs.com middledata.ldmnq.com

Alright, thanks for pointing that out. Added those domains and its associated IPs according to DNS lookup.

@JaxemMax
Copy link

sorry for asking this super late but does the domain "encdn.ldmnq.com.w.alikunlun.com" also block "encdn.ldmnq.com" when using windows hosts file

@TameemS
Copy link
Author

TameemS commented Aug 27, 2023

sorry for asking this super late but does the domain "encdn.ldmnq.com.w.alikunlun.com" also block "encdn.ldmnq.com" when using windows hosts file

Yes, encdn.ldmnq.com redirects to encdn.ldmnq.com.w.alikunlun.com which is blocked anyway. But you could add it in hosts just in case.

@JaxemMax
Copy link

sorry for asking this super late but does the domain "encdn.ldmnq.com.w.alikunlun.com" also block "encdn.ldmnq.com" when using windows hosts file

Yes, encdn.ldmnq.com redirects to encdn.ldmnq.com.w.alikunlun.com which is blocked anyway. But you could add it in hosts just in case.

cool, thanks for the reply!

@gogcwy
Copy link

gogcwy commented Aug 30, 2023

Need add Rootless Launcher first replace Launcher3

otherwise stop here

Tablet is starting...

@JingAr87
Copy link

JingAr87 commented Mar 2, 2024

I figured out a way to customize the startup ad, go to Appdata\Roaming\XuanZhi9\cache and remove everything that isn't app icons that you have installed. Then start LDplayer to get a new ads for the ease of modifying, then close the emulator. then you open up ldadconfig.data and change the following : effectiveTime to 999999999, change all cdn.ldplayer.net to localhost, action_content to whatever. Then find any image of your liking and rename it to follow the existing 2 image files and delete those 2 files. Then make the ldadconfig.data and the image files read only to prevent their dirty servers from touching the file and you should be golden. Only thing i cannot figure out is how to change what the button does inside of the emulator. I changed action_content to youtube.com but inside the emulator it still links to the previous adware URL. I hope this helps.

@Zenix-Al
Copy link

Zenix-Al commented Mar 5, 2024

there's more to block actually, since ldplayer isnt 100% rely on ldplayer.exe, but also oracle vm vbox, since i use firewall and able to monitor the internet, but it depends on your app on your ldplayer itself. here's some of the list :

encdn.ldplayer.com, apiid.ldmnq.com, ad.ldplayer.net, middledata.ldmnq.com
if youre interested what firewall im using, im using portmaster, it also block filter list like adblock did and you get full control over your network.

@MrRubberDucky
Copy link

was bored, here's my findings

  • LDPlayer9 uses Private DNS by default (can be turned off in Android settings)
  • LDPlayer9's Android can be quite talkative which needs to be blocked via DNS or whatever, mostly on android side and I guess windows side hosts is enough

here's a list of domains I got from doing the things in the emu using AdGuard Home. You don't need a Pi-Hole or AGH to apply this but you would need a DNS blocker that accepts filter lists, including user made like personalDNSfilter, DNS66 and so on.

hmma.baidu.com
ad.ldplayer.net
apiid.ldmnq.com
apien.ldmnq.com
ldcdn.ldmnq.com
en.ldplayer.net
encdn.ldmnq.com
api.ld-space.com
openrcv.baidu.com
storeen.ldmnq.com
usersdk.ldmnq.com
appstore.ldmnq.com
encdn.ldplayer.com
adabdapi.ldmnq.com
graph.facebook.com
android.bugly.qq.com
middledata.ldmnq.com
advertise.ldplayer.net
middledata.ldplayer.net
dldgmpfyeblzc.cloudfront.net
dn2sifz9m7tkk.cloudfront.net
de2pmm85odupd.cloudfront.net
dkf29paj6y8sk.cloudfront.net
d19przo9d3f9zk.cloudfront.net
d330if318qxsm2.cloudfront.net
d3p6x1jquzbe0c.cloudfront.net
encdn.ldmnq.com.w.alikunlun.com
ins-o9iydzqn.ias.tencent-cloud.net
lden.oss-ap-southeast-1.aliyuncs.com
netease-publish-gdlgphs.w.alikunlun.com
advertise.ldplayer.net.a.lahuashanbx.com

Not sure about these domains since they may have been caught in a cross-fire while testing but if you see similar then it's probably good idea to block them

p-sgsg00.kxcdn.com
alb-fc2psc581f288qx1e4.cn-shanghai.alb.aliyuncs.com

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment