[Q] How to unhide system folders in my PNA? - General Questions and Answers
I have a PNA that has system hidden folders (such as ResidentFlash and ResidentFlash2).
I want to unhide those folder, so I could see them normally in TotalCommander.
I've tried to change the registry values of the StorageManager profiles - but seems that nothing have changed.
I've changed all the "MountHidden" values under [HKEY_LOCAL_MACHINE\System\StorageManager\Profiles\FlashDrv] to 0, still nor ResidentFlash niether ResidentFlash2 appear in TotalCommander.
I've attached the relevant registry values, so you can observe them:
Code:
REGEDIT4
[HKEY_LOCAL_MACHINE\System\StorageManager]
"Dll"="fsdmgr.dll"
"PNPUnloadDelay"=dword:00000100
"PNPWaitIODelay"=dword:000009C4
[HKEY_LOCAL_MACHINE\System\StorageManager\BinFS]
"MountHidden"=dword:00000000
"FriendlyName"="Bin FileSystem"
"DLL"="binfs.dll"
"Paging"=dword:00000001
"Folder"="BINFS"
"MountAsROM"=dword:00000001
"MountPermanent"=dword:00000001
"BootPhase"=dword:00000000
[HKEY_LOCAL_MACHINE\System\StorageManager\Profiles]
"AutoMount"=dword:00000001
"AutoPart"=dword:00000000
"AutoFormat"=dword:00000000
"MountFlags"=dword:00000000
"DefaultFileSystem"="FATFS"
"PartitionDriverName"="MSPART"
"Folder"="Mounted Volume"
"ActivityEvent"="PowerManager/ActivityTimer/SystemActivity"
"MountHidden"=dword:00000000
"MountAsROM"=dword:00000000
"MountPermanent"=dword:00000000
"MountAsBootable"=dword:00000000
"MountAsRoot"=dword:00000000
"MountSystem"=dword:00000000
"MountAsNetwork"=dword:00000000
"PartitionDriver"="mspart.dll"
[HKEY_LOCAL_MACHINE\System\StorageManager\Profiles\FlashDrv]
"DefaultFileSystem"="BINFS"
"PartitionDriver"="mspart.dll"
"AutoMount"=dword:00000001
"AutoPart"=dword:00000001
"Folder"="ResidentFlash"
"Name"="Microsoft Flash Disk"
"BootPhase"=dword:00000000
"DisableAutoScan"=dword:00000001
"ForceWritethrough"=dword:00000001
...
[HKEY_LOCAL_MACHINE\System\StorageManager\Profiles\FlashDrv\BINFS]
"MountHidden"=dword:00000000
"MountAsROM"=dword:00000001
"MountPermanent"=dword:00000001
[HKEY_LOCAL_MACHINE\System\StorageManager\Profiles\FlashDrv\FATFS]
"AutoFormat"=dword:00000001
"FatCacheSize"=dword:00000000
"DataCacheSize"=dword:00000000
"BitmapCacheSize"=dword:00000000
"DisableAutoScan"=dword:00000001
"DisableAutoFormat"=dword:00000000
"ForceWritethrough"=dword:00000001
"EnableWriteBack"=dword:00000000
"NonatomicSector"=dword:00000001
[HKEY_LOCAL_MACHINE\System\StorageManager\Profiles\FlashDrv\PART_R3]
"FriendlyName"="FAT FileSystem"
"Dll"="exfat.dll"
"Paging"=dword:00000001
"FatCacheSize"=dword:00000000
"DataCacheSize"=dword:00000000
"Util"="fatutil.dll"
"DisableAutoScan"=dword:00000001
"ForceWritethrough"=dword:00000001
"PartitionDriver"="mspart.dll"
"AutoMount"=dword:00000001
"Folder"="NandFlash"
"EnableWriteBack"=dword:00000000
[HKEY_LOCAL_MACHINE\System\StorageManager\Profiles\HDProfile]
"MountAsBootable"=dword:00000001
...
Any help will highly appriciate!
Anyone?
Is there is in XDA some proper PNA forum?
Couldn't find one...
Related
Enable Headset with widcomm 1.4.2 stack
Just figured tis out. Not sure if it is realy working because I don´t have a bt headset. It is (only?) for the Widcomm 1.4.2 bt stack that is used on some wm2003se devices. Can someone with same version and bt headset check it out? Thanks Here you go (only blue parts are interesting) [HKEY_LOCAL_MACHINE\SOFTWARE\Widcomm] [HKEY_LOCAL_MACHINE\SOFTWARE\Widcomm\BtConfig] [HKEY_LOCAL_MACHINE\SOFTWARE\Widcomm\BtConfig\Platform] "AudioEnabled"=dword:00000001 "WaveDevDll"="wavedev.dll" ; or btceif.dll? [HKEY_LOCAL_MACHINE\SOFTWARE\Widcomm\BtConfig\SerialTransport] "ReceivePriority256"=dword:000000f0 "TransmitPriority256"=dword:000000f0 [HKEY_LOCAL_MACHINE\SOFTWARE\Widcomm\BtConfig\General] "RadioInitRunMode"="Auto" "StackMode"=dword:00000000 "UseIconView"=dword:00000001 "PeriodicInquiry"=dword:00000000 "LowPowerSupport"=dword:00000001 "NoResetAllowed"=dword:00000000 "DontShowAdvanced"=dword:00000000 "PowerControlLibrary"="Auto" "PnpId"="" "TransportLibrary"="BtCeBCSPTrans.dll" "RadioInitLibrary"="" "KeepStackLoaded"=dword:00000000 "InquirySupportedWithConnsUp"=dword:00000001 "ReportNotNamedDevices"=dword:00000001 "InquiryMaxResults"=dword:00000014 "PeriodicInquiryRetryTime"=dword:0000000a "-ForceDevClassMinor"=dword:00000000 "-ForceDevClassMajor"=dword:00000000 "UseInquiryFilters"=dword:00000000 "AutoDiscovery"=dword:00000001 "InquiryMode"=dword:00000000 "-DefaultInputCharset"=dword:00000000 "-DefaultOutputCharset"=dword:00000000 "InquiryDuration"=dword:0000000a "DeviceName"="Pocket_PC" "MinorClass"=dword:00000004 ; was 16 "SecurityType"=dword:00000002 "CountryCode"=dword:00000000 "MaxSimultConnections"=dword:00000007 "NoSleepingWhileConnected"=dword:00000001 "UnnamedDeviceName"="<No Name>" "DefaultStatusDll"="" "DefaultPropertiesDll"="" [HKEY_LOCAL_MACHINE\SOFTWARE\Widcomm\BtConfig\UserInterface] "FarEastFonts"=dword:00000000 "DeviceName"="" [HKEY_LOCAL_MACHINE\SOFTWARE\Widcomm\BtConfig\Services] [HKEY_LOCAL_MACHINE\SOFTWARE\Widcomm\BtConfig\Services\0001] "UUID"=dword:00001101 "Authorization"=dword:00000000 "Authentication"=dword:00000000 "Encryption"=dword:00000000 "SecurityId"=dword:00000001 "Name"="Generic Serial" "GUID"="{00001101-0000-1000-8000-00805F9B34FB}" "StatusDll"="" "PropertiesDll"="" "Auto"=dword:00000001 "ComPortNumber"=dword:00000005 "UserInstalled"=dword:00000000 [HKEY_LOCAL_MACHINE\SOFTWARE\Widcomm\BtConfig\Services\0002] "UUID"=dword:00001105 "Authorization"=dword:00000000 "Authentication"=dword:00000001 "Encryption"=dword:00000001 "SecurityId"=dword:00000005 "Name"="OBEX Object Push" "GUID"="{00001105-0000-1000-8000-00805F9B34FB}" "StatusDll"="" "PropertiesDll"="" "Auto"=dword:00000000 "DefaultBusinessCard"="0" "InboxDirectory"="\\My Documents" "AcceptBusinessCards"=dword:00000001 "AcceptCalendarItems"=dword:00000001 "AcceptEmailMessages"=dword:00000001 "AcceptNotes"=dword:00000001 "SendBusinessCardOnRequest"=dword:00000001 "SaveInPIM"=dword:00000001 [HKEY_LOCAL_MACHINE\SOFTWARE\Widcomm\BtConfig\Services\0003] "UUID"=dword:00001106 "Authorization"=dword:00000000 "Authentication"=dword:00000001 "Encryption"=dword:00000001 "SecurityId"=dword:00000006 "Name"="OBEX File Transfer" "GUID"="{00001106-0000-1000-8000-00805F9B34FB}" "StatusDll"="" "PropertiesDll"="" "Auto"=dword:00000000 "Root"="\\My Documents" "FlistFormat"=dword:00000000 [HKEY_LOCAL_MACHINE\SOFTWARE\Widcomm\BtConfig\Services\0004] "Name"="Dial-Up Networking" "GUID"="{00001103-0000-1000-8000-00805F9B34FB}" "UUID"=dword:00001103 "Authentication"=dword:00000001 "Encryption"=dword:00000001 "Authorization"=dword:00000000 "Auto"=dword:00000000 "SecurityID"=dword:00000003 "ModemComPortNumber"=dword:00000001 "BaudRate"=dword:0000e100 "FlowControl"=dword:00000001 "Enabled"=dword:00000000 [HKEY_LOCAL_MACHINE\SOFTWARE\Widcomm\BtConfig\Services\0005] "GUID"="{00001102-0000-1000-8000-00805F9B34FB}" "Enabled"=dword:00000001 "UUID"=dword:00001102 "Authorization"=dword:00000000 "Authentication"=dword:00000001 "Encryption"=dword:00000001 "SecurityId"=dword:00000002 "Name"="Network Access" "StatusDll"="" "PropertiesDll"="" "Auto"=dword:00000000 "NetworkMode"=dword:00000000 "Description"="Network" ; if you enable "Audio gateway" you get services\0006 [HKEY_LOCAL_MACHINE\SOFTWARE\Widcomm\BtConfig\Services\0006] "UUID"=dword:00001112 "Authorization"=dword:00000000 "Authentication"=dword:00000000 "Encryption"=dword:00000000 "SecurityId"=dword:00000012 "Name"="Audio Gateway" "GUID"="{00001112-0000-1000-8000-00805F9B34FB}" "StatusDll"="" "PropertiesDll"="" "Auto"=dword:00000001 "AudioType"="" !Not sure if this one should be in here! I cannot see it in BT manager -> New [HKEY_LOCAL_MACHINE\SOFTWARE\Widcomm\BtConfig\Services\0007] "Authentication"=dword:00000000 "Authorization"=dword:00000000 "Auto"=dword:00000001 "Enabled"=dword:00000001 "Encryption"=dword:00000000 "Name"="Headset" "PropertiesDll"="" "StatusDll"="" "GUID"="{00001108-0000-1000-8000-00805F9B34FB}" "UUID"=dword:00001108 "SecurityId"=dword:00000008 [HKEY_LOCAL_MACHINE\SOFTWARE\Widcomm\BtConfig\Applications] [HKEY_LOCAL_MACHINE\SOFTWARE\Widcomm\BtConfig\Applications\0001] "Name"="Generic Serial" "GUID"="{00001101-0000-1000-8000-00805F9B34FB}" "UUID"=dword:00001101 "Authentication"=dword:00000000 "Encryption"=dword:00000000 "SecurityId"=dword:00000001 "ComPortNumber"=dword:00000006 [HKEY_LOCAL_MACHINE\SOFTWARE\Widcomm\BtConfig\Applications\0002] "Name"="LAN Access Using PPP" "GUID"="{00001102-0000-1000-8000-00805F9B34FB}" "UUID"=dword:00001102 "Authentication"=dword:00000000 "Encryption"=dword:00000000 "SecurityId"=dword:00000002 "ComPortNumber"=dword:0000000c [HKEY_LOCAL_MACHINE\SOFTWARE\Widcomm\BtConfig\Applications\0003] "Name"="Dialup Networking" "GUID"="{00001103-0000-1000-8000-00805F9B34FB}" "UUID"=dword:00001103 "Authentication"=dword:00000000 "Encryption"=dword:00000000 "SecurityId"=dword:00000003 "ComPortNumber"=dword:0000000b [HKEY_LOCAL_MACHINE\SOFTWARE\Widcomm\BtConfig\Applications\0004] "Name"="OBEX Object Push" "GUID"="{00001105-0000-1000-8000-00805F9B34FB}" "UUID"=dword:00001105 "Authentication"=dword:00000000 "Encryption"=dword:00000000 "SecurityId"=dword:00000005 [HKEY_LOCAL_MACHINE\SOFTWARE\Widcomm\BtConfig\Applications\0005] "Name"="OBEX File Transfer" "GUID"="{00001106-0000-1000-8000-00805F9B34FB}" "UUID"=dword:00001106 "Authentication"=dword:00000000 "Encryption"=dword:00000000 "SecurityId"=dword:00000006 [HKEY_LOCAL_MACHINE\SOFTWARE\Widcomm\BtConfig\Applications\0006] "Name"="ActiveSync Serial Port" "GUID"="{00001101-0000-1000-8000-00805F9B34FB}" "UUID"=dword:00001101 "Authentication"=dword:00000000 "Encryption"=dword:00000000 "SecurityId"=dword:00000001 "ComPortNumber"=dword:0000000e [HKEY_LOCAL_MACHINE\SOFTWARE\Widcomm\BtConfig\Applications\0007] "Name"="Headset" "GUID"="{00001108-0000-1000-8000-00805F9B34FB}" "UUID"=dword:00001108 "Authentication"=dword:00000000 "Encryption"=dword:00000000 "SecurityID"=dword:00000008 [HKEY_LOCAL_MACHINE\SOFTWARE\Widcomm\BtConfig\Applications\0008] "Auto"=dword:00000001 "Name"="Voice Gateway" "GUID"="{00001112-0000-1000-8000-00805F9B34FB}" "UUID"=dword:00001112 "Authentication"=dword:00000000 "Encryption"=dword:00000000 "SecurityID"=dword:0000000c [HKEY_LOCAL_MACHINE\SOFTWARE\Widcomm\BtConfig\Filters] "AllowOthersToDiscover"=dword:00000000 "WhoAllowedToConnect"=dword:00000001 "InquiryScanMode"=dword:00000002 "InquiryScanInterval"=dword:00000000 "InquiryScanWindow"=dword:00000000 "PageScanInterval"=dword:00000000 "PageScanWindow"=dword:00000000 [HKEY_LOCAL_MACHINE\SOFTWARE\Widcomm\BtConfig\Filters\Inquiry] "AutoDiscovery"=dword:00000001 "ReportNotNamedDevices"=dword:00000001 "UseInquiryFilters"=dword:00000000 "InquiryMode"=dword:00000000 [HKEY_LOCAL_MACHINE\SOFTWARE\Widcomm\Connection Wizard] "HeadsetAutoShortcut"=dword:00000001 [HKEY_LOCAL_MACHINE\SOFTWARE\Widcomm\Connection Wizard\AddIns] [HKEY_LOCAL_MACHINE\SOFTWARE\Widcomm\Connection Wizard\AddIns\Headset] "Dll"="btwizardprofiles.dll,6" "Title"="btwizardprofiles.dll,26061" "Description"="btwizardprofiles.dll,26062" "Icon"="btwizardprofiles.dll,26072" "Order"=dword:00000015 [HKEY_LOCAL_MACHINE\SOFTWARE\Widcomm\Connection Wizard\AddIns\Explore a Bluetooth device] "Dll"="btwizardprofiles.dll,0" "Icon"="btwizardprofiles.dll,26059" "Description"="btwizardprofiles.dll,26022" "Title"="btwizardprofiles.dll,26021" "Order"=dword:00000046 [HKEY_LOCAL_MACHINE\SOFTWARE\Widcomm\Connection Wizard\AddIns\PAN] "Dll"="btwizardprofiles.dll,2" "Icon"="btwizardprofiles.dll,26073" "Description"="btwizardprofiles.dll,26067" "Title"="btwizardprofiles.dll,26066" "Order"=dword:00000032 [HKEY_LOCAL_MACHINE\SOFTWARE\Widcomm\Connection Wizard\AddIns\Connect to the Internet] "Dll"="btwizardprofiles.dll,1" "Icon"="btwizardprofiles.dll,26065" "Description"="btwizardprofiles.dll,26024" "Title"="btwizardprofiles.dll,26023" "Order"=dword:00000028 [HKEY_LOCAL_MACHINE\SOFTWARE\Widcomm\Connection Wizard\AddIns\Bluetooth File Transfer] "Dll"="btwizardprofiles.dll,5" "Icon"="btwizardprofiles.dll,26071" "Description"="btwizardprofiles.dll,26028" "Title"="btwizardprofiles.dll,26027" "Order"=dword:00000014 [HKEY_LOCAL_MACHINE\SOFTWARE\Widcomm\Connection Wizard\AddIns\ActiveSync via Bluetooth] "Dll"="btwizardprofiles.dll,4" "Icon"="btwizardprofiles.dll,26067" "Description"="btwizardprofiles.dll,26026" "Title"="btwizardprofiles.dll,26025" "Order"=dword:0000000a "MinOSVersion"=dword:00000001 [HKEY_LOCAL_MACHINE\SOFTWARE\Widcomm\Connection Wizard\AddIns\Business Card Exchange] "Command"="\\Windows\\BTBusinessCard.exe" "Icon"="btrez.dll,22132" "Description"="btrez.dll,22763" "Title"="btrez.dll,22762" "Order"=dword:0000003c [HKEY_LOCAL_MACHINE\SOFTWARE\Widcomm\Connection Wizard\AddIns\Partner with a cellphone] "Dll"="btwizardprofiles.dll,3" "Icon"="btwizardprofiles.dll,26069" "Description"="btwizardprofiles.dll,26030" "Title"="btwizardprofiles.dll,26029" "Order"=dword:00000009 [HKEY_LOCAL_MACHINE\SOFTWARE\Widcomm\Connection Wizard\Profiles] [HKEY_LOCAL_MACHINE\SOFTWARE\Widcomm\Connection Wizard\Profiles\0000] "Dll"="BTWizardProfiles.dll" [HKEY_LOCAL_MACHINE\SOFTWARE\Widcomm\Locations] "CurrentLocation"=dword:00000000 [HKEY_LOCAL_MACHINE\SOFTWARE\Widcomm\Locations\0000] "Name"="Default" [HKEY_LOCAL_MACHINE\SOFTWARE\Widcomm\Version] "Software"="1.4.2.2" "RadioLmpSubVersion"=dword:0000036f "RadioManufacturer"=dword:0000000a "RadioLmpVersion"=dword:00000001 "RadioHciRevision"=dword:0000036f "RadioHciVersion"=dword:00000001 Click to expand... Click to collapse
Tried this on a rx3715 with rom 1.0.11b and bluetooth software version 1.50 build 2600 -- didn't work. I'm selling it, without the ability to hook up an external microphone it's pretty much useless for me.
Icons messed up
The icon that indicates its a JPEG image is not showing. Instead it shows an icon which means that its an unknown file format. However the image opens properly. PNG images have the proper icon intact, but only the JPEG image icons aren't showing up. Please help me get the icon back. Is there something i need to download or tweak in the registry or something ? Please guide me
I have the same problem. Is there any way to fix it?
Solved: MemMaid 2.3 -> Jump To -> Databases -> Extensions -> .jpg .jpeg -> Edit... -> Edit Class -> Class: JPEGFile ; Description: JPEG Image ; Icon: browsres.dll,-6704 ; Commands: 1 - Name: DRMOpen Command: pimg.exe "%1" 2 - Name:Open Command: pimg.exe "%1"
How to unlock my ExtROM & Storage?(Huawei C8100,WM6.1p)
I've read all the instructions about configure registry or run unlock tools,but it doesn't work for it. my device is Huawei C8100(CDMA EVDO),CE 5.2.2.0971(internal version 20971.1.5.4) here is the registry dump of HLM\System\StorageManager,I trid a tool from http://forum.xda-developers.com/showpost.php?p=1696907&postcount=113,after run the 1st tool and soft-reset,my sd card was hidden and can not view from explorer. Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\System\StorageManager] "PNPWaitIODelay"=dword:00001000 "PNPUnloadDelay"=dword:00001000 "Dll"="fsdmgr.dll" [HKEY_LOCAL_MACHINE\System\StorageManager\Filters] [HKEY_LOCAL_MACHINE\System\StorageManager\Filters\ENCFilt] "DeviceGUID"=hex:99,F3,DC,7D,54,04,B6,1A,C6,2E,88,BD,4C,E2,C2,FB "PolicyDLL"="DeviceEncryptionPolicy.dll" "EncryptByDefault"=dword:00000000 [HKEY_LOCAL_MACHINE\System\StorageManager\Filters\fsdspy] "dll"="fsdspy.dll" [HKEY_LOCAL_MACHINE\System\StorageManager\Filters\fsreplxfilt] "DirsToExclude"=hex(7):5C,00,6D,00,78,00,69,00,70,00,5F,00,69,00,6E,00,69,00,74,00,64,00,62,\ 00,2E,00,76,00,6F,00,6C,00,00,00,5C,00,6D,00,78,00,69,00,70,00,5F,00,73,00,\ 79,00,73,00,74,00,65,00,6D,00,2E,00,76,00,6F,00,6C,00,00,00,5C,00,6D,00,78,\ 00,69,00,70,00,5F,00,6E,00,6F,00,74,00,69,00,66,00,79,00,2E,00,76,00,6F,00,\ 6C,00,00,00,5C,00,6D,00,78,00,69,00,70,00,5F,00,6C,00,61,00,6E,00,67,00,2E,\ 00,76,00,6F,00,6C,00,00,00,5C,00,63,00,65,00,6D,00,61,00,69,00,6C,00,2E,00,\ 76,00,6F,00,6C,00,00,00,5C,00,70,00,69,00,6D,00,2E,00,76,00,6F,00,6C,00,00,\ 00,5C,00,44,00,6F,00,63,00,75,00,6D,00,65,00,6E,00,74,00,73,00,20,00,61,00,\ 6E,00,64,00,20,00,53,00,65,00,74,00,74,00,69,00,6E,00,67,00,73,00,5C,00,64,\ 00,65,00,66,00,61,00,75,00,6C,00,74,00,5C,00,75,00,73,00,65,00,72,00,2E,00,\ 68,00,76,00,00,00,5C,00,44,00,6F,00,63,00,75,00,6D,00,65,00,6E,00,74,00,73,\ 00,20,00,61,00,6E,00,64,00,20,00,53,00,65,00,74,00,74,00,69,00,6E,00,67,00,\ 73,00,5C,00,73,00,79,00,73,00,74,00,65,00,6D,00,2E,00,68,00,76,00,00,00,5C,\ 00,57,00,69,00,6E,00,64,00,6F,00,77,00,73,00,5C,00,50,00,72,00,6F,00,66,00,\ 69,00,6C,00,65,00,73,00,5C,00,67,00,75,00,65,00,73,00,74,00,5C,00,54,00,65,\ 00,6D,00,70,00,6F,00,72,00,61,00,72,00,79,00,20,00,49,00,6E,00,74,00,65,00,\ 72,00,6E,00,65,00,74,00,20,00,46,00,69,00,6C,00,65,00,73,00,5C,00,00,00,5C,\ 00,57,00,69,00,6E,00,64,00,6F,00,77,00,73,00,5C,00,50,00,72,00,6F,00,66,00,\ 69,00,6C,00,65,00,73,00,5C,00,67,00,75,00,65,00,73,00,74,00,5C,00,43,00,6F,\ 00,6F,00,6B,00,69,00,65,00,73,00,5C,00,00,00,5C,00,57,00,69,00,6E,00,64,00,\ 6F,00,77,00,73,00,5C,00,50,00,72,00,6F,00,66,00,69,00,6C,00,65,00,73,00,5C,\ 00,67,00,75,00,65,00,73,00,74,00,5C,00,48,00,69,00,73,00,74,00,6F,00,72,00,\ 79,00,5C,00,00,00,5C,00,57,00,69,00,6E,00,64,00,6F,00,77,00,73,00,5C,00,41,\ 00,63,00,74,00,69,00,76,00,65,00,73,00,79,00,6E,00,63,00,5C,00,00,00,5C,00,\ 77,00,69,00,6E,00,64,00,6F,00,77,00,73,00,5C,00,6D,00,65,00,73,00,73,00,61,\ 00,67,00,69,00,6E,00,67,00,5C,00,00,00,5C,00,54,00,65,00,6D,00,70,00,5C,00,\ 00,00,5C,00,57,00,69,00,6E,00,64,00,6F,00,77,00,73,00,5C,00,53,00,79,00,73,\ 00,74,00,65,00,6D,00,5C,00,50,00,75,00,73,00,68,00,52,00,6F,00,75,00,74,00,\ 65,00,72,00,5C,00,63,00,6C,00,69,00,65,00,6E,00,74,00,71,00,75,00,65,00,75,\ 00,65,00,73,00,2E,00,76,00,6F,00,6C,00,00,00,5C,00,50,00,72,00,6F,00,67,00,\ 72,00,61,00,6D,00,20,00,46,00,69,00,6C,00,65,00,73,00,5C,00,00,00,00,00 "NumDirsToExclude"=dword:00000010 "ReplStoreCacheSize"=dword:00000000 "ReplStoreDoImmaculate"=dword:00000000 "ReplStoreName"="ReplStor" "ReplStorePath"="\\ReplStorVol" "ReplStoreHostVolume"="" [HKEY_LOCAL_MACHINE\System\StorageManager\AutoLoad] [HKEY_LOCAL_MACHINE\System\StorageManager\AutoLoad\Relfsd] "BootPhase"=dword:00000002 "MountFlags"=dword:00000001 [HKEY_LOCAL_MACHINE\System\StorageManager\AutoLoad\NANDDISK] "LoadFlags"=dword:00000001 "DriverPath"="Drivers\\BlockDevice\\NANDDISK" "BootPhase"=dword:00000001 [HKEY_LOCAL_MACHINE\System\StorageManager\AutoLoad\ExtFlash] "Order"=dword:00000000 "LoadFlags"=dword:00000001 "DriverPath"="Drivers\\BuiltIn\\ExtFlash" "BootPhase"=dword:00000002 [HKEY_LOCAL_MACHINE\System\StorageManager\AutoLoad\MSFlash] "Order"=dword:00000000 "LoadFlags"=dword:00000001 "DriverPath"="Drivers\\BuiltIn\\MSFlash" "BootPhase"=dword:00000000 [HKEY_LOCAL_MACHINE\System\StorageManager\AutoLoad\RAMFMD] "BootPhase"=dword:00000001 "LoadFlags"=dword:00000001 "DriverPath"="Drivers\\BlockDevice\\RAMFMD" [HKEY_LOCAL_MACHINE\System\StorageManager\FATFS] "Flags"=dword:00000044 "CacheDll"="diskcache.dll" "Util"="fatutil.dll" "CacheSize"=dword:00000000 "EnableCache"=dword:00000001 "Paging"=dword:00000001 "Dll"="fatfsd.dll" "FriendlyName"="FAT FileSystem" [HKEY_LOCAL_MACHINE\System\StorageManager\FATFS\Filters] [HKEY_LOCAL_MACHINE\System\StorageManager\FATFS\Filters\ENCFilt] "Dll"="mencfilt.dll" "Order"=dword:00000005 [HKEY_LOCAL_MACHINE\System\StorageManager\FATFS\Filters\CacheFilt] "Dll"="" "Order"=dword:00000001 [HKEY_LOCAL_MACHINE\System\StorageManager\HRFFS] "Dll"="hrffs1.dll" "FriendlyName"="HRFFS FileSystem" [HKEY_LOCAL_MACHINE\System\StorageManager\PartitionTable] "26"="BINARY" "25"="IMGFS" "23"="RAWFS" "22"="RAWFS" "21"="BINFS" "20"="BOOT" "0F"="FATFS" "0E"="FATFS" "0C"="FATFS" "0B"="FATFS" "07"="NTFS" "06"="FATFS" "04"="FATFS" "01"="FATFS" [HKEY_LOCAL_MACHINE\System\StorageManager\Profiles] "Folder"="已装入的卷" "PartitionDriverName"="MSPART" "DefaultFileSystem"="" "MountFlags"=dword:00000000 "AutoFormat"=dword:00000000 "AutoPart"=dword:00000000 "AutoMount"=dword:00000001 [HKEY_LOCAL_MACHINE\System\StorageManager\Profiles\PCMCIA] "Folder"="存储卡" "Name"="PCMCIA/Compact Flash Device" [HKEY_LOCAL_MACHINE\System\StorageManager\Profiles\HDProfile] "Folder"="硬盘" [HKEY_LOCAL_MACHINE\System\StorageManager\Profiles\SDMMC] "Folder"="存储卡" [HKEY_LOCAL_MACHINE\System\StorageManager\Profiles\SDMemory] "Folder"="Storage Card" "Name"="SD Memory Card" [HKEY_LOCAL_MACHINE\System\StorageManager\Profiles\SDMemory\FATFS] "Flags"=dword:00000064 [HKEY_LOCAL_MACHINE\System\StorageManager\Profiles\SDMemory\FATFS\Filters] [HKEY_LOCAL_MACHINE\System\StorageManager\Profiles\SDMemory\FATFS\Filters\ENCFilt] "Dll"="encfilt.dll" [HKEY_LOCAL_MACHINE\System\StorageManager\Profiles\MMC] "Name"="MMC Card" "Folder"="MMC Card" [HKEY_LOCAL_MACHINE\System\StorageManager\Profiles\MMC\FATFS] [HKEY_LOCAL_MACHINE\System\StorageManager\Profiles\MMC\FATFS\Filters] [HKEY_LOCAL_MACHINE\System\StorageManager\Profiles\MMC\FATFS\Filters\ENCFilt] "Dll"="encfilt.dll" [HKEY_LOCAL_MACHINE\System\StorageManager\Profiles\HRFFS] "DefaultFileSystem"="HRFFS" "PartitionDriver"="mspart.dll" "AutoPart"=dword:00000001 "AutoFormat"=dword:00000001 "CheckForFormat"=dword:00000001 "Folder"="HRFFS" [HKEY_LOCAL_MACHINE\System\StorageManager\Profiles\HRFFS\PartitionTable] "34"="HRFFS" [HKEY_LOCAL_MACHINE\System\StorageManager\Profiles\MSFlash_DDRRAM] "AutoFormat"=dword:00000001 "AutoPart"=dword:00000001 "Folder"="DDR Disk" [HKEY_LOCAL_MACHINE\System\StorageManager\Profiles\MSFlash_DDRRAM\FATFS] "FormatTfat"=dword:00000001 [HKEY_LOCAL_MACHINE\System\StorageManager\Profiles\ExtFlash] "PartitionDriver"="mspart.dll" "MountAsROM"=dword:00000001 "MountHidden"=dword:00000001 "Folder"="Extended_ROM" "Name"="FLASH Disk Block Device" [HKEY_LOCAL_MACHINE\System\StorageManager\Profiles\ExtFlash\FATFS] "MountAsROM"=dword:00000000 "MountHidden"=dword:00000000 "Flags"=dword:00000004 "CheckForFormat"=dword:00000001 [HKEY_LOCAL_MACHINE\System\StorageManager\Profiles\MSFlash_RAMFMD] "DefaultFileSystem"="HRFFS" "PartitionDriver"="mspart.dll" "CheckForFormat"=dword:00000001 "Folder"="Disk" "AutoFormat"=dword:00000001 "AutoPart"=dword:00000001 [HKEY_LOCAL_MACHINE\System\StorageManager\Profiles\MSFlash_RAMFMD\PartitionTable] "34"="HRFFS" [HKEY_LOCAL_MACHINE\System\StorageManager\Profiles\USBCDProfile] "Folder"="光盘驱动器" "PartitionDriver"="" "DefaultFileSystem"="UDFS" "Name"="USB CDROM/DVD Drive" [HKEY_LOCAL_MACHINE\System\StorageManager\Profiles\USBCDProfile\PartitionTable] [HKEY_LOCAL_MACHINE\System\StorageManager\Profiles\USBFDProfile] "Folder"="软盘驱动器" "PartitionDriver"="" "DefaultFileSystem"="FATFS" "Name"="USB Floppy Disk Drive" [HKEY_LOCAL_MACHINE\System\StorageManager\Profiles\USBHDProfile] "Folder"="硬盘" "Name"="USB Hard Disk Drive" [HKEY_LOCAL_MACHINE\System\StorageManager\Profiles\USBHDProfile\FATFS] "EnableCacheWarm"=dword:00000000 [HKEY_LOCAL_MACHINE\System\StorageManager\Profiles\CDProfile] "Folder"="光盘驱动器" "PartitionDriver"="" "DefaultFileSystem"="UDFS" "Name"="IDE CDROM/DVD Drive" [HKEY_LOCAL_MACHINE\System\StorageManager\Profiles\CDProfile\PartitionTable] [HKEY_LOCAL_MACHINE\System\StorageManager\Profiles\MSFlash] "Name"="FLASH Disk Block Device" "Folder"="Flash Disk" "MountHidden"=dword:00000001 "MountAsROM"=dword:00000001 "PartitionDriver"="mspart.dll" [HKEY_LOCAL_MACHINE\System\StorageManager\Profiles\MSFlash\IMGFS] "XIP"=dword:00000000 [HKEY_LOCAL_MACHINE\System\StorageManager\Profiles\MSFlash\FATFS] "Flags"=dword:00600014 "EnableWriteBack"=dword:00000001 "MountAsRoot"=dword:00000001 "MountAsBootable"=dword:00000001 "DataCacheSize"=dword:00000800 "FatCacheSize"=dword:00000200 "CheckForFormat"=dword:00000001 "FormatTfat"=dword:00000001 "MountHidden"=dword:00000000 "MountAsROM"=dword:00000000 [HKEY_LOCAL_MACHINE\System\StorageManager\Profiles\MSFlash\FATFS\Filters] [HKEY_LOCAL_MACHINE\System\StorageManager\Profiles\MSFlash\FATFS\Filters\fsreplxfilt] "Order"=dword:00000001 "Dll"="fsreplxfilt.dll" [HKEY_LOCAL_MACHINE\System\StorageManager\MSPART] "Dll"="mspart.dll" [HKEY_LOCAL_MACHINE\System\StorageManager\IMGFS] "ShadowROM"=dword:00000001 "Paging"=dword:00000001 "Dll"="imgfs.dll" "FriendlyName"="Image-Update Filesystem"
Wrong forum Welcome to forums We dedicate here only to HTC devices, so you won´t find too much attention. Better to try in other fora Good luck,
[Q] FSP loox 720 custom ROM. Is it real?
hello. revived, I still own a pda FS Loox 720 is it possible to make custom rom for this PDA? made of nbf nb0, but he did not see any one program to extract/edit/remove files from the directory works correctly only Dumpromx, but it only allows you to extract the firmware and replace the files, not more.
a short walk to dump the firmware ... shows that the start_rom ecec and not one in the firmware of wm2003se. obtained 13 pieces: Code: 0. start 80040000 0. ecec 8009edb8 1. start 80180000 1. ecec 802e5c00 2. start 80404000 2. ecec 8097fc98 3. start 809b0000 3. ecec 80a494cc 4. start 80b20000 4. ecec 80c2132c 5. start 80cf0000 5. ecec 80e68394 6. start 80ff0000 6. ecec 81446630 7. start 81470000 7. ecec 814a2ae0 8. start 818b0000 8. ecec 818d5360 9. start 81a20000 9. ecec 81ce8350 10. start 81df0000 10. ecec 81e636d0 11. start 81e80000 11. ecec 81f2ffac 12. start 81f50000 12. ecec 81fa5c3c 13. start 82000000 13. ecec 821cc02c an example of the firmware: Code: 80040000 - 80040000 L00000000 rom_00 start 80040000 - 80040004 L00000004 JUMP to kernel start 80040004 - 80040040 L0000003c NUL 80040040 - 80040048 L00000008 'ECEC' -> 8009edb8 80040048 - 80041000 L00000fb8 NUL 80041000 - 8009e7f0 L0005d7f0 o32 region_0 rva=00001000 vsize=0005d7f0 real=80041000 psize=0005d800 f=60000020 for nk.exe ... 80176390 - 80176390 L00000000 rom_00 end ... 81f30808 - 81f30824 L0000001c filent 62 00000805 01c420356cf64524 7498 2039 81f2f7b4 VehicleML.pxt 81f30824 - 81f30824 L00000000 rom_11 end 81f30824 - 81f50000 L0001f7dc NUL 81f50000 - 81f50000 L00000000 rom_12 start 81f50000 - 81f50022 L00000022 filedata h_termservclient.lnk 81f50024 - 81f50034 L00000010 filedata mstsc.lnk 81f50034 - 81f5003d L00000009 modname l2tp.dll 81f50040 - 81f50048 L00000008 'ECEC' -> 81fa5c3c 81f50048 - 81f50fa5 L00000f5d o32 region_2 rva=0004b000 vsize=00001e20 real=0390b000 psize=00000f5d f=40002040 for ipsecsvc.dll ... 81fdaf38 - 81fdaf38 L00000000 rom_12 end 81fdaf38 - 82000000 L000250c8 NUL 82000000 - 82000000 L00000000 rom_13 start 82000000 - 82000018 L00000018 filedata Camera.lnk 82000018 - 8200003b L00000023 filedata CameraWizard.lnk 8200003b - 82000040 L00000005 NUL 82000040 - 82000048 L00000008 'ECEC' -> 821cc02c .... 821cc5c0 - 821cc5dc L0000001c filent 48 00000807 01c4c54239f7e7b7 25600 12138 821c8d8c OV9640.dll 821cc5dc - 821cc5dc L00000000 rom_13 end 821cc5dc - 82200000 unknown on this and can give an error all the programs? as they say in the instructions that only one should be romhdr Pointer, and then as many as 14. and can therefore be extracted only that it was between the first and start rom_00 romhdr pointer. and the rest of the start rom_01 - start rom_13 prog and are not intended as unaware of their existence. 3. Insert this value (4 bytes!) in little endian at offset 0x48 in the NB0 (overwriting original info there). If the original info was part of some file or module in the image, hence corrupting it, you will be able to get that file from unmodified NB0 using dumprom or dumpromx (see below), then use xipport to reinsert the file before rebuilding the image so no worries. Example for the nec 900c: start adress: 0x84080000, romhdr pointer: 0x85e9c945, 4 bytes to insert: 45 C9 E1 01 (0x84080000 subtracted from 0x85e9c945 and converted to little endian). That’s all for preparing the NB0 image! Click to expand... Click to collapse say, individually unpack it all, changing the value 0x48 + 4 bytes by calculations for each rom start_ ** and how to combine into one and then the whole firmware? because there will be 14 directories OUT ... or if / delete / add anything in just one, for example, rom start_05 other rom start_0 * will not be affected?
obtained as follows: ECEC [4 bytes romhdr pointer] [4 byte subtraction rom start of romhdr pointer] (it's all in the recursively) but the prog is only the first and all. then not a word .... first attempt to remove the ECEC and the following bytes to anything nor has led ... helped to partition a file into 14 parts. I'm 14 and got modulyaimi directories and files. but back pack does not work, because it requires coredll. *, and it only be in rom start_00 may suggest how to pack back the modified modules without module coredll
so. thanks to several people who appeared program that allows you to now edit the firmware for Win CE 4.2. ask for help in editing, but rather create a custom firmware for a PDA. list of files attached. well defined with neskokolkimi programs that do not really need and / or rarely used. list of files Code: oeminfo.xml defaultconfig.xml wm_start.wma Voicbeep.wav type.wav Splat.wav RecEnd.wav Quietest.wav online.wav notify.wav msgbox.wav MenuPop.wav Lowbatt.wav Loudest.wav Infend.wav Infbeg.wav hwandsw.wav Default.wav Alarm4.wav Alarm3.wav Alarm2.wav Alarm1.wav mxip_XIPKERNEL.ver mxip_SHELL.ver mxip_PICTURES192.ver mxip_OS.ver mxip_MISC.ver mxip_LANGSHELL.ver mxip_LANGCOREAPPS.ver mxip_KERNEL.ver mxip_EXAPPS.ver mxip_CPUOPT.ver mxip_COREAPPS.ver mxip_BROWSING.ver tscscan.txt sym.txt hwhelp.txt autocorrect.txt AKU_OU1.txt tahomabd.ttf tahoma.ttf cour.ttf Bliss.tsk square192.skn square96.skn portrait192.skn portrait96.skn landscape192.skn landscape96.skn nk-exe.sig coredll-dll.sig mxip_xipkernel_100.rgu mxip_shell_100.rgu mxip_PICTURES192_100.rgu mxip_OS_100.rgu mxip_misc_100.rgu mxip_LANGSHELL_100.rgu mxip_LANGCOREAPPS_100.rgu mxip_KERNEL_100.rgu mxip_EXAPPS_100.rgu mxip_CPUOPT_100.rgu mxip_COREAPPS_100.rgu mxip_BROWSING_100.rgu CW-registry.reg VehicleML.pxt todo.pwi phone.pwi memo.pwi meeting.pwi blank.pwi todo.psw phone.psw memo.psw meeting.psw blank.psw sysroots.p7b wince.nls Region_1_0.nlp Culture3_1_0.nlp Culture2_1_0.nlp Culture1_1_0.nlp CharInfo_1_0.nlp Calendar_1_0.nlp wsp.dll.0409.mui wininet.dll.0409.mui waveapi.dll.0409.mui urlmon.dll.0409.mui unimodem.dll.0409.mui shlwapi.dll.0409.mui netmui.dll.0409.mui mlang.dll.0409.mui malcommon.dll.0409.mui jawres.dll.0409.mui IECEExt.dll.0409.mui fatutil.dll.0409.mui coredll.dll.0409.mui commdlg.dll.0409.mui wm_start.lnk WLNPWRCTL.lnk WindowsMedia.lnk welcome.lnk voice.lnk Transcriber.lnk Tone.lnk tmail.lnk tasks.lnk sync.lnk square.lnk solitare.lnk RunningPrograms.lnk romupdnote.lnk repllog.lnk pxl.lnk pword.lnk Processor.lnk poutlook.lnk portrait.lnk pmail.lnk pimg.lnk pie.lnk notetake.lnk mstsc.lnk MSNMsgr.lnk MSNMobile.lnk LEAP.lnk landscape.lnk KeyLock1.lnk Jawbreaker.lnk hotvoice.lnk help.lnk h_wmppc.lnk h_wince.lnk h_termservclient.lnk h_tasks.lnk h_sync.lnk h_soltr.lnk h_simrdr.lnk h_pxl.lnk h_pword.lnk h_pimg.lnk h_pie.lnk h_Jawbreaker.lnk h_inkwrit.lnk h_inbox.lnk h_im.lnk h_ctpnl.lnk h_connct.lnk h_cntcs.lnk h_clndr.lnk h_calc.lnk h_bluetooth.lnk gamesico.lnk FSCSpeedMenu3.lnk FSCSpeedMenu2.lnk FSCPanning.lnk FSCEasy2Connect_hlp.lnk FSCEasy2Connect_exe.lnk FSCBackup_hlp.lnk FSCBackup_exe.lnk FSCautorun_hlp.lnk FSC_Panning.lnk find.lnk fexplore.lnk eventrst.lnk Enroll.lnk DispLighting1.lnk Connections.lnk CameraWizard.lnk Camera.lnk calendar.lnk calc.lnk BTTrayCE.lnk Bluetooth.lnk Battery1.lnk async.lnk AlignScreen.lnk Album.lnk addrbook.lnk mssp2_en.lex OEM.jpg DOL.jpg AudioBK.jpg initdb.ini FSCSMdef.ini wmppc.htm wince.htm TranscriberEnu.htm termservclient.htm tasks.htm sync.htm soltr.htm SIMReader.htm rnetw.htm pword.htm pocketmsn.htm piehelp.htm pic.htm pexcel.htm notes.htm KeyLock.htm Jawbreaker.htm inbox.htm im.htm FSCSpeedMenu.htm FSCEasy2Connect20.htm FSCautorun.htm FSC_Panning.htm FSC_Backup.htm evbruntime.htm Enroll.htm default.htm ctpnl.htm connect.htm cntcs.htm clndr.htm CameraWizard_(ht)b.htm CameraWizard_(ht).htm calc.htm btwcehlp.htm bluetooth.htm agdefault.htm 16_oem.htm TIPostInit.hcs TICoexEnable.hcs TICoexDisable.hcs BTVoiceEnable.hcs BTVoiceDisable.hcs welcomehead.192.gif volumethumbSQ192.gif volumethumbSQ96.gif volumethumb192.gif volumethumb96.gif VideoBK.gif Totem-Heart.gif Totem.gif t_msgr.gif SyncAnimation.gif stylushead.192.gif stylus2.192.gif stylus1.192.gif stylus1.96.gif square192.gif square96.gif seekthumbSQ192.gif seekthumbSQ96.gif seekthumb192.gif seekthumb96.gif pushedSQ192.gif pushedSQ96.gif pushed192.gif pushed96.gif ppc.gif portrait192.gif portrait96.gif piecarrier.gif oem.gif myinfo.gif msn.gif Magazine.gif landscape192.gif landscape96.gif IMWater.gif IMAddSuccess.gif IMAddFailure.gif FSCSpeedMenu.gif fly.gif disabledSQ192.gif disabledSQ96.gif disabled192.gif disabled96.gif Default_stwater_480_480.gif Default_stwater.gif dayview.192.gif dayview.96.gif complete.192.gif Clothes-Line.gif beam.gif bannerstrip.gif banner.gif avantgo.gif arrow2.192.gif 11select.192.gif 11select.96.gif Gprs.gdb default.fdf www-Hotspot.fbk www-GPRS.fbk wmplayer.exe WLNPWRCTL.exe welcome.exe wceloadsp.exe wceload.exe updatexip.exe unload.exe umarshaller.exe udp2tcp.exe TraShapeSelector.Exe Transcriber.Exe Tone.exe tmarshaller.exe tmail.exe testReg.exe tasks.exe srvtrust.exe solitare.exe sndplay.exe shfind.exe shell32.exe services.exe rundll32.exe romupdnote.exe rnaapp.exe repllog.exe remnet.exe rapisrv.exe pxl.exe pword.exe Processor.exe PowerWLAN.exe PowerExe.exe poutlook.exe pimg.exe peghelp.exe notes.exe nk.exe mstsc40.exe mstli.exe LEAP.exe KeyLockRes.exe jawbreaker.exe instmsgr.exe iexplore.exe idledetect.exe hwhelp.exe hotvoice.exe HFPUI.exe gwes.exe FSCSpeedMenu.exe FSCEasy2Connect20.exe FSC_PwdStart.exe FSC_PwdCheck.exe FSC_Panning.exe FSC_Backup.exe filesys.exe fexplore.exe eventrst.exe Enroll.exe device.exe ctlpnl.exe cow.exe connmgr.exe coldinit.exe clocknot.exe clock.exe cgacutil.exe cfdetect.exe certinst.exe Camera.exe calnot.exe calendar.exe calc.exe BTWizardCE.exe BTTrayCE.exe BTPanManagerCE.exe BTFileExplorer.exe BTCplCE.exe BTConnManagerCE.exe BTCePimCmdApp.exe BTBusinessCard.exe beam.exe Backlight.exe Album.exe adjustmem.exe addrbook.exe XSCSDCard.dll xls2pxl.dll wzcsvc.dll wzcsapi.dll wsppush.dll wspm.dll wsp.dll ws2instl.dll ws2.dll wmvdecoder.dll wmres.dll wmlview.dll wmcore.dll wmavdecoder.dll wmadecoder.dll wldap32.dll winsock.dll wininet.dll wendyser.dll webview.dll wdppush.dll wcestreambt.dll WBtDll.dll wbtapiCE.dll wavedev.dll waveapi.dll wapdrv.dll wap.dll voicedll.dll VoiceCtl.dll VoiceBar.dll VCOMCtl.dll VBarCall.dll usbmsc.dll usbhid.dll usbdisk6.dll usbd.dll urlmon.dll unimodem.dll uicom.dll tshres.192.dll tshres.dll tsctrc.dll trustmarshaller.dll TraRes0409.192.dll TraRes0409.dll TraRecoEnu.dll TranscriberSip.Dll touch.dll toolhelp.dll tmailutl.dll TIRadioInit.dll tiacxwln.dll termctrl.dll tcpstk.dll tcpip6.dll taskdll.dll tapres.192.dll tapi.dll syscsps.dll syncres.192.dll syncres.dll syncmgr.dll stcusb.dll ssllsp.dll spnego.dll softkb.dll shutil.dll shlwapi.dll shellresapps.192.dll shellresapps.96.dll shellresapps.dll shellres.192.dll shellres.dll servhost.dll serial32.dll serial.dll secur32.dll SecIDLib.dll SDMemory.dll SdkCE.dll SDBusDriver.dll schannel.dll rsaenh.dll rra_stm.dll riresdll.192.dll riresdll.96.dll riresdll.dll richink.dll relfsd.dll regenum.dll redir.dll rdpdr.dll rdpapi.dll pxlfile.dll pxl2xls.dll pwwiff.dll pwddll.dll pushrouter.dll pushprxy.dll psmfsd.dll pptp.dll ppp.dll pm.dll pimutil.dll pimstore.dll pimdlg.dll pimapi.dll pegobj.dll pegcards.192.dll pegcards.dll pcmcia.dll OV9640.dll outres.192.dll outres.dll ossvcs.dll olece300.dll oleaut32.dll ole32.dll ohci.dll officeres.192.dll officeres.dll office.dll OEMUtil.dll oemregistry.dll oectrl.dll obexsrvr.dll obexinbx.dll obexapi.dll ntlmssp.dll nspm.dll note_prj.dll note.dll netui.dll netmui.dll netcfagl1_0.dll netbios.dll ne2000.dll ndisuio.dll ndis.dll msxml.dll msscript.dll mspart.dll msnsspc.dll msnewmnu.dll msmsgsc.dll msimnetc.dll msimmsgr.dll msim.192.dll msim.dll MsgStore.dll msgslang.dll msdmo.dll mscoree1_0.dll mscoree.dll msasn1.dll MPEG4SPVIDEOENC.dll MP4Writer.DLL mp4spvd.dll MP4_READER.dll mmtimer.dll mlang.dll miscres.192.dll miscres.dll MidiLib2.dll mfcce300.dll malcommon.dll malclmgr.dll mailtrns.dll l2tp.dll KeyLock.dll keybddr.dll kbdhid.dll jscript.dll JPEGENC.dll jpeg.dll jawres.dll Jacket.dll irsqrt.dll irsir.dll irdastk.dll ircomm.dll ipv6hlp.dll ipsecsvc.dll ipsec.dll iphlpapi.dll inreplce.dll inkx.dll inkobj.dll infantry.dll imgdecmp.dll IMEngine.dll imaging.dll imagelib.dll IECEExt.dll htmlview.dll HTCcamera1.dll hidparse.dll HFPControlPanel.dll H263VIDEOENC.DLL gxdma.dll gx.dll GSMAMRENC.dll GSMAMRDLL.dll GAC_System_v1_0_5000_0_cneutral_1.dll GAC_System.Xml_v1_0_5000_0_cneutral_1.dll GAC_System.Windows.Forms_v1_0_5000_0_cneutral_1.dll GAC_System.Windows.Forms.DataGrid_v1_0_5000_0_cneutral_1.dll GAC_System.Web.Services_v1_0_5000_0_cneutral_1.dll GAC_System.Net.IrDA_v1_0_5000_0_cneutral_1.dll GAC_System.Drawing_v1_0_5000_0_cneutral_1.dll GAC_System.Data_v1_0_5000_0_cneutral_1.dll GAC_mscorlib_v1_0_5000_0_cneutral_1.dll GAC_Microsoft.WindowsCE.Forms_v1_0_5000_0_cneutral_1.dll GAC_Microsoft.VisualBasic_v7_0_5000_0_cneutral_1.dll fsdmgr.dll FSCSMrsc.dll FSCE2CRes.dll FSC_LXInfo.dll Frontlight.dll find.dll fatutil.dll fatfsd.dll exappres.192.dll exappres.dll ethman.dll eaptls.dll eapol.dll eapchap.dll eap.dll dssdh.dll doclist.dll dhcp.dll ddi.dll cxport.dll cspras.dll cspproxy.dll cspnet.dll crypt32.dll coreres.192.dll coreres.dll coredll.dll connplan.dll conncfg.dll configmanager.dll compime.dll commdlg.dll commctrl.dll colorConvScaling.dll clockdll.dll citydb.dll chngtrk.dll cespell.dll ceshell.dll cemapi.dll cemailsync.dll cellcore.dll cefobj.dll cedrmutil.dll ceddk.dll ccoreprv.dll calstore.dll caldll.dll cabinstl.dll bvd_udc_ser.dll BTWizardProfiles.dll BTWizardHfp.dll BtSdkCE30.dll btrez.dll bthutil.dll bthusb.dll bthuniv.dll bthuart.dll bthsc.dll bthlink.dll bthcsr.dll bthamb.dll btdrt.dll BTDialer.dll btd.dll BtCoreIf.dll BTChooserLib.dll BtCeStack.dll BtCeSendTo_Poom.dll BtCeProfiles.dll btcepan.dll BTCeOsif4.dll BtCeIf.dll BtCeBCSPTrans.dll BTAudioGW.dll browsres.192.dll browsres.dll browser.dll battdrvr.dll aygshell.dll audevman.dll atlce300.dll atadisk.dll asyncmac.dll asfplayer.dll appinstaller.dll Album_Res.dll airsync.dll agiehandler.dll afd.dll adosync.dll adoceoledb30.dll adocedb30.dll adoce30.dll addrstor.dll addrdll.dll abstraction.dll AACDLL.dll statdict.dat splash.dat pwipat.dat initobj.dat dictprob.dat SystemInfo.cpl PowerWLAN.cpl Powerg.cpl cplmain.cpl BTConfigCE.cpl Backlight.cpl malconfig.cfg Zoom-Indicator.bmp zoom.bmp winmedia.bmp webguide.bmp volume.bmp voicetag.bmp Thumbnail-view.bmp sysvol.bmp slideshow.bmp sending.192.bmp sending.96.bmp senddsbl.192.bmp senddsbl.96.bmp send.192.bmp send.96.bmp rotate.bmp Remaining-video-time.bmp Remaining-images.bmp question.bmp ppccom.bmp Picture-Theme-Next-Previous-arrows.bmp Msrg_undo.bmp Msrg_tab.bmp Msrg_space.bmp Msrg_paste.bmp Msrg_entr.bmp Msrg_cut.bmp Msrg_copy.bmp Msrg_case.bmp Msrg_back.bmp Msrg_all.bmp msn_mail.bmp msn.bmp Full-Screen-exit-icon.bmp Full-Screen-entrance-icon.bmp device.bmp crop.bmp Confirm-Send.bmp Confirm-Detailed-View.bmp Confirm-Delete.bmp Confirm-Back.bmp Capture-Size.bmp Capture-Indicator.bmp Camera-Settings.bmp bt_tran.bmp bt_spc.bmp bt_rtn.bmp bt_rmode.bmp bt_rarr.bmp bt_optns.bmp bt_lss.bmp bt_larr.bmp bt_kbrd.bmp bt_help.bmp bt_bspc.bmp appointment.bmp Ambience-Incandescent.bmp Ambience-Fluorescent.bmp Ambience-Daylight.bmp alerts.bmp aglogo.bmp maxim_radio_dl.bin ACX100_dl.bin async.asy gsm610.acm wmlb.2bp wm_wmcom.2bp wm_volume.2bp wm_unmute.2bp wm_stop.2bp wm_progress.2bp wm_previous.2bp wm_play.2bp wm_pause.2bp wm_next.2bp wm_info.2bp wm_fullscreen.2bp Win_Start.2bp web_content.2bp vcard.2bp up_play.2bp undo.2bp toolbar.2bp Tip_Icon.2bp Stop_icon.2bp stop.2bp space.2bp Signal_Strength_Yellow.2bp Signal_Strength_RED.2bp Signal_Strength_Green.2bp send.2bp scard.2bp reply.2bp Refresh_icon.2bp Red_Bul.2bp record.2bp play_play.2bp pen.2bp NewCard.2bp mic.2bp line.2bp light.2bp input.2bp info_play.2bp Icon_Work.2bp Icon_Ntwk_Card.2bp Icon_Init.2bp Icon_Connect_Internet.2bp Icon_Connect.2bp format.2bp Folder_icon.2bp flag.2bp favorite.2bp Edit_profile_icon.2bp Edit_Num.2bp drform.2bp down_play.2bp direct16.2bp dialup16.2bp Dial_Num.2bp deletefolder.2bp delete_play.2bp dataconnection.2bp chooser_prev.2bp chooser_next.2bp cf.2bp BT_PhoneDialer.2bp BT_icon_Gray.2bp BT_icon_Blue.2bp BT_Globe_icon.2bp BT_BizCard_icon.2bp brcm_ppc.2bp Blu_Bul.2bp autosum.2bp attach.2bp align.2bp address.2bp add_play.2bp avantgocfg.1 avantgocfg.0 list of files found by the programs Easy2Connect Code: FSCE2CRes.dll FSCEasy2Connect_hlp.lnk FSCEasy2Connect_exe.lnk www-Hotspot.fbk www-GPRS.fbk solitare Code: solitare.lnk h_soltr.lnk gamesico.lnk solitare.exe soltr.htm FSCSpeedMenu Code: FSCSpeedMenu.exe FSCSpeedMenu3.lnk FSCSpeedMenu2.lnk FSCSMdef.ini FSCSMrsc.dll office Code: h_pxl.lnk pxl.exe pxl.lnk pxl2xls.dll pxlfile.dll office.dll pword.exe h_pword.lnk pword.lnk xls2pxl.dll pword.htm pwwiff.dll calculator Code: h_calc.lnk calc.lnk calc.htm calc.exe Transcriber Code: TraRes0409.192.dll TraRes0409.dll TraRecoEnu.dll TranscriberSip.Dll Transcriber.lnk TranscriberENU.htm Transcriber.exe Msrg_undo.bmp Msrg_tab.bmp Msrg_space.bmp Msrg_paste.bmp Msrg_entr.bmp Msrg_cut.bmp Msrg_copy.bmp Msrg_case.bmp Msrg_back.bmp Msrg_all.bmp bt_tran.bmp bt_spc.bmp bt_rtn.bmp bt_rmode.bmp bt_rarr.bmp bt_optns.bmp bt_lss.bmp bt_larr.bmp bt_kbrd.bmp bt_help.bmp bt_bspc.bmp other files: Code: *.psw and *.pxt wm_start.wma wm_start.lnk it's all that I have found so far. tell me what other programs, libraries, files can be deleted. for example, wmp, outlook, tmail, etc ...
[Tool] LG Back up & restore (com.lge.bnr) .lbf file analysis & extract tool
Hello, recently I looked into LG backup and restore application using static analysis. Note: this is based on version lg bnr 8.0.26 from 2020-02-13, tested with 7.0.20 from 2008-12-31 Here is the extract tool: https://github.com/Mysak0CZ/LBFtool And here is the technical part (you don't need to read this, if you just want to extract your data): The file contains 2 headers (one of them is referred to as "new") These are XML documents encrypted using AES/ECB/PKCS5Padding + SHA256 and null IV with static password Code: cd562f61-5399-3978-ac76-7c54b0508010 And they look like this: Code: <?xml version="1.0" encoding="UTF-8"?> <BackUp> <Common> <Name>LGBackup_200217_1</Name> <!-- Name of the backup file --> <Id>Randomly generated UUID</Id> <!-- Id of the backup file --> <IsNew>True</IsNew> <!-- IsNew is same in new and old header --> <Version>1.00</Version> <Attr Name="product_model">LM-X525</Attr> <Attr Name="os_version">9</Attr> <!-- And other attributes including google email --> </Common> <BackupItem Category="settings_DB" StartOffset="59392" DataSize="136626" /> <BackupItem Category="MEDIA_DB" StartOffset="901169" DataSize="78393344" FileName="external.db" /> <!-- Other backuped items --> </BackUp> The "new" header has more information than original header, but same structure. The attribute "IsNew" signals the presence of the new header. (and is True in both files) All numbers inside file are in Big-endian. And this is the structure of the file (decimal position): Code: 0: Unknown - 0x00 for me 1: Int32 - size of the new header 5: Int64 - offset to the new header (usually 13) 13 ... EOF-33: data EOF-33: 20 bytes - SHA1 hash of the password (if present, otherwise still data) EOF-13: Int64 - offset to the (old) header EOF-5: Int32 - size of the (old) header EOF-1: Bool - Lock byte - the file is (0x01) or isn't (0x00) protected by password The password is only checked during import, not used to encrypt data (so to remove password, just set the last byte to 0) Every "BackupItem" entry has a "Category". Special case is Category="APPLICATION" with this structure: Code: <BackupItem Category="APPLICATION"> <APPLICATION Name="com.lge.ime" StartOffset="19221586" DataSize="2385983" Package="com.lge.ime"> <Attr Name="com.lge.ime">com.lge.ime</Attr> </APPLICATION> <APPLICATION Name="org.exmple.app" StartOffset="1429652009" DataSize="3420160" FileName="org.exmple.app.tar" Package="org.exmple.app"> <Attr Name="org.exmple.app">org.exmple.app</Attr> </APPLICATION> <!-- ... --> </BackupItem> All applications are tar files that contain 2 folders: app - contains the apk file data - application's internal data All other items have: StartOffset - Offset inside file DataSize - Self explanatory FileName - Not all have this, but most do; it is the original name of the backuped file. The files are not compressed nor encrypted. Footnote: This is my first post on XDA, so sorry for any mistakes I made (including my english) and feel free to correct me/give me advice.
Mysak0CZ said: Hello, recently I looked into LG backup and restore application using static analysis. Note: this is based on version lg bnr 8.0.26 from 2020-02-13, tested with 7.0.20 from 2008-12-31 Here is the extract tool: And here is the technical part (you don't need to read this, if you just want to extract your data): The file contains 2 headers (one of them is referred to as "new") These are XML documents encrypted using AES/ECB/PKCS5Padding + SHA256 and null IV with static password And they look like this: The "new" header has more information than original header, but same structure. The attribute "IsNew" signals the presence of the new header. (and is True in both files) All numbers inside file are in Big-endian. And this is the structure of the file (decimal position): The password is only checked during import, not used to encrypt data (so to remove password, just set the last byte to 0) Every "BackupItem" entry has a "Category". Special case is Category="APPLICATION" with this structure: All applications are tar files that contain 2 folders: app - contains the apk file data - application's internal data All other items have: StartOffset - Offset inside file DataSize - Self explanatory FileName - Not all have this, but most do; it is the original name of the backuped file. The files are not compressed nor encrypted. Footnote: This is my first post on XDA, so sorry for any mistakes I made (including my english) and feel free to correct me/give me advice. Click to expand... Click to collapse Nice job dude! just a the quick recommendation: I would suggest that you put your code on gitlab or GitHub so it will become easier for others to contribute Sent from my OnePlus 6T using XDA Labs
Hi. I'm trying to use this tool but I don't know how to use it. I followed the instructions and downloaded Python. but none of the other steps are working for me. I have my backup on my PC and am trying to extract my files into normal formats as I wish to move away from the LG platform. Thank you. ---------- Post added at 07:20 AM ---------- Previous post was at 06:57 AM ---------- Nevermind, I found a work around. For anyone else in the future wondering: If you select backup with the app on the phone and backup to the internal memory, it will create .pdf files of all text/images in internal storage>>Quickmemo+. This doesn't help to retrieve the audio or video recordings, but at least that way you can retrieve your text files/images.
Tried script on old backup, failed with error. Mysak0CZ said: Hello, recently I looked into LG backup and restore application using static analysis. Note: this is based on version lg bnr 8.0.26 from 2020-02-13, tested with 7.0.20 from 2008-12-31 Here is the extract tool: And here is the technical part (you don't need to read this, if you just want to extract your data): The file contains 2 headers (one of them is referred to as "new") These are XML documents encrypted using AES/ECB/PKCS5Padding + SHA256 and null IV with static password Code: cd562f61-5399-3978-ac76-7c54b0508010 ... [/CODE] All applications are tar files that contain 2 folders: app - contains the apk file data - application's internal data All other items have: StartOffset - Offset inside file DataSize - Self explanatory FileName - Not all have this, but most do; it is the original name of the backuped file. The files are not compressed nor encrypted. Footnote: This is my first post on XDA, so sorry for any mistakes I made (including my english) and feel free to correct me/give me advice. Click to expand... Click to collapse My first post as well. Thanks for the script. I ran it on an old backup I was hoping to extract contacts from. See excerpt with error below. C:\Temp\LG G4\Backup>python extract.py LGBackup_190218.lbf [+] Backup size: 597864605 Parsing... Reading header [*] Header start offset: 597792768 [*] Header length: 71824 [+] Header read OK Reading header (new) [*] Header start offset: 7021235167904623918 Traceback (most recent call last): File "extract.py", line 125, in <module> root = readHeader(True) File "extract.py", line 99, in readHeader size = getBackupInfoSize(isNew) File "extract.py", line 88, in getBackupInfoSize raise Exception("Invalid header length.") Exception: Invalid header length. C:\Temp\LG G4\Backup> Click to expand... Click to collapse I'm a complete newbie with Python, haven't done any coding in over a decade. Where do I go from here?
Ninja_Toad said: My first post as well. Thanks for the script. I ran it on an old backup I was hoping to extract contacts from. See excerpt with error below. I'm a complete newbie with Python, haven't done any coding in over a decade. Where do I go from here? Click to expand... Click to collapse Hi! Your backup seem to be at least partially corrupted. (The new header position seems to start at 7021235167904623918, however the file is only 597864605 bytes long). Fortunatly there are two headers in the backup and the old one seems to be ok (You got "[+] Header read OK" for the old header). So you can try ignoring the "new" header. To ignore the faulty header just set the relevant "FORCE_*_HEADER" to True in the script header. In your case just set "FORCE_OLD_HEADER = True". Also note, that extracting contacts in readable format is beyond this script's current scope. This can however be done manually. After you get your data successfully extracted, look for export/data/contacts_DB file. This is a TAR file in which you need to find file "data/data/user/0/com.android.providers.contacts/databases/contacts2.db". This is the contact database as your phone stores it. To actually extract the contacts, you will need to find a way to convert the database to some other format (I have't looked into how the contacts are stored, you will need to do your own googling)
Files extracted but... hello guys, I also managed to extract my files using the hack mentioned above (force old headers to TRUE) since by using the default script i was also getting a similar error as above. However now all of my files (pictures in particular) are corrupted and i cannot seem to be able to open them using several editors. Anyone else had the same issue? Thanks in advance!
serlal said: hello guys, I also managed to extract my files using the hack mentioned above (force old headers to TRUE) since by using the default script i was also getting a similar error as above. However now all of my files (pictures in particular) are corrupted and i cannot seem to be able to open them using several editors. Anyone else had the same issue? Thanks in advance! Click to expand... Click to collapse Yes I have exactly same issue as you have. All exported files cannot be read.
Hello @tking2000 and @serlal, this script was written based on versions that are available to me. There are two possibilities of what is happening: 1) The file was badly corruped, however the old header stayed itact. (This is the likely case, if you are trying this tool because your phone refused to restore the backup) 2) The file was made by version that does something differently and the script doesn't account for it. In the first case there is nothing anyone can do (short of trying some corrupted file recovery software hoping the corruption is only minor) In the second case, you can try sending me a PM with following information, so I can have a look and confirm whether this is truly the case (and improve the script) 1) The script's output 2a) The <Version> and <Attr Name="settingVersionName"> from the <Common> part of the header 2b) If you aren't concerned about privacy or it is just easier for you: just send the whole header file 3) The version of the com.lge.bnr app (LG Mobile Switch); this is not necessary, but may help me Feel free to censor anything you are sending with [CENSORED] (like your email or filenames)
I have no experience with python, but I have one of these lbf files and I'm trying to figure out how to make it work and all I get is couldn't get library pycryptodome. How do I get Python 3.8.3 to get this library?
Multipart backups Hello everyone, I just finished an update, that should enable the tool to extract backups that have multiple files. If you received "Exception: Invalid header length." in the past and your backup has multiple files, try the script now; your backups are likely to extract correctly now. This is the likely case for: @Ninja_Toad @serlal and @tking2000 This was made possible thanks to @cheesyzombie who sent me the data I asked for. @kamikazkid, You don't need to know Python to use this tool, the easiest way is to enter the commands in quotes on the github page into the console (To open the console Shift+Right click in the folder with backups and choose "Open command window here"). Just: Download the zip on the github page (Under "Code" button) Make sure the extract.py and your backup are in the same folder Follow the usage, skip the 4th step and replace xxxxxx to match your backup name.
I figured it out, it was something with windows 10 and the version of python installation I used. Microsoft garbaging things up as usual, thanks for the help though. Thanks, I recovered my files from my old phone successfully.
I have no experience withc++, but I have one of these lbf files and I'm trying to figure out how to make it work, it is a great this forum
Is there a way to import the _DB files (contacts, messages, call logs etc.) back to a phone? I asked before: https://forum.xda-developers.com/lg-g3/general/restore-backup-lbf-lineage-17-t4172483#post83644281
Thank you so much for this! I was able to extract the Messaging data from an LG G8 ThinQ. Does anybody know the easiest way to view that data on my PC?
Hi, you can follow these steps to extract data fron _db files: 1) Send the _db files like contacts_db, messages_db to any android phone 2) Double tap on the file and open it using File Manager (which is by default on Mi phones) 3) The file will now open as a folder. Continue opening the folders until you reach to the last file. 4) The last file is the database file. It won't open directly. Select the file and extract the file. 5) Now transfer the file to computer and you can now view it using SQLite DB Browser if its a contacts file or you can use any VMG reader if its a messages file. Hope this helps you.
Hi @Mysak0CZ, just follow your instructions on GitHub but when I run the command on Command Prompt, nothing happens. Just like this: F:\>python -m pip install pycryptodome F:\>python extract.py LGBackup-201031.lbf When I enter nothing happened. Kindly help to advise for this. Thank you
Problem in powershell Mysak0CZ said: Hi! Your backup seem to be at least partially corrupted. (The new header position seems to start at 7021235167904623918, however the file is only 597864605 bytes long). Fortunatly there are two headers in the backup and the old one seems to be ok (You got "[+] Header read OK" for the old header). So you can try ignoring the "new" header. To ignore the faulty header just set the relevant "FORCE_*_HEADER" to True in the script header. In your case just set "FORCE_OLD_HEADER = True". Also note, that extracting contacts in readable format is beyond this script's current scope. This can however be done manually. After you get your data successfully extracted, look for export/data/contacts_DB file. This is a TAR file in which you need to find file "data/data/user/0/com.android.providers.contacts/databases/contacts2.db". This is the contact database as your phone stores it. To actually extract the contacts, you will need to find a way to convert the database to some other format (I have't looked into how the contacts are stored, you will need to do your own googling) Click to expand... Click to collapse Hi, I am trying to extract via your method but in the power shell in sending the command "python extract.py LGBackup_1x0x07.lbf" it does not execute and brings me back the initial path line. Do you have solutions in this regard? Thanks in advance Ps. I use Win10
Worked so well. I only needed to recover images and audio recordings after realizing that LG backup tool won't restore on other brand phones. Thank you!!
Mysak0CZ said: Hello, recently I looked into LG backup and restore application using static analysis. Note: this is based on version lg bnr 8.0.26 from 2020-02-13, tested with 7.0.20 from 2008-12-31 Here is the extract tool: https://github.com/Mysak0CZ/LBFtool And here is the technical part (you don't need to read this, if you just want to extract your data): The file contains 2 headers (one of them is referred to as "new") These are XML documents encrypted using AES/ECB/PKCS5Padding + SHA256 and null IV with static password Code: cd562f61-5399-3978-ac76-7c54b0508010 And they look like this: Code: <?xml version="1.0" encoding="UTF-8"?> <BackUp> <Common> <Name>LGBackup_200217_1</Name> <!-- Name of the backup file --> <Id>Randomly generated UUID</Id> <!-- Id of the backup file --> <IsNew>True</IsNew> <!-- IsNew is same in new and old header --> <Version>1.00</Version> <Attr Name="product_model">LM-X525</Attr> <Attr Name="os_version">9</Attr> <!-- And other attributes including google email --> </Common> <BackupItem Category="settings_DB" StartOffset="59392" DataSize="136626" /> <BackupItem Category="MEDIA_DB" StartOffset="901169" DataSize="78393344" FileName="external.db" /> <!-- Other backuped items --> </BackUp> The "new" header has more information than original header, but same structure. The attribute "IsNew" signals the presence of the new header. (and is True in both files) All numbers inside file are in Big-endian. And this is the structure of the file (decimal position): Code: 0: Unknown - 0x00 for me 1: Int32 - size of the new header 5: Int64 - offset to the new header (usually 13) 13 ... EOF-33: data EOF-33: 20 bytes - SHA1 hash of the password (if present, otherwise still data) EOF-13: Int64 - offset to the (old) header EOF-5: Int32 - size of the (old) header EOF-1: Bool - Lock byte - the file is (0x01) or isn't (0x00) protected by password The password is only checked during import, not used to encrypt data (so to remove password, just set the last byte to 0) Every "BackupItem" entry has a "Category". Special case is Category="APPLICATION" with this structure: Code: <BackupItem Category="APPLICATION"> <APPLICATION Name="com.lge.ime" StartOffset="19221586" DataSize="2385983" Package="com.lge.ime"> <Attr Name="com.lge.ime">com.lge.ime</Attr> </APPLICATION> <APPLICATION Name="org.exmple.app" StartOffset="1429652009" DataSize="3420160" FileName="org.exmple.app.tar" Package="org.exmple.app"> <Attr Name="org.exmple.app">org.exmple.app</Attr> </APPLICATION> <!-- ... --> </BackupItem> All applications are tar files that contain 2 folders: app - contains the apk file data - application's internal data All other items have: StartOffset - Offset inside file DataSize - Self explanatory FileName - Not all have this, but most do; it is the original name of the backuped file. The files are not compressed nor encrypted. Footnote: This is my first post on XDA, so sorry for any mistakes I made (including my english) and feel free to correct me/give me advice. Click to expand... Click to collapse ok I am so lost. And here is the technical part (you don't need to read this, if you just want to extract your data): that statement would make it appear easy. well the link only takes you to the code, there is no tool and nothing with "new" as header. so ive tried deciphering what to do for hours now and i cant figure npthing out. rooted and flashed my lgv20 and did a backup with lg bridge beforehand. trying to restore and phone connects to computer fine but doesnt regster in lg bridge so that is why i need to extract .lbf file. can someone make this easier?
hello..it ended up successful.but there is no jpeg or mp4 file on DCIM folder..how can i restore them?should i do somthing with the script? i don't know pyton