[Q] How to unhide system folders in my PNA? - General Questions and Answers

I have a PNA that has system hidden folders (such as ResidentFlash and ResidentFlash2).
I want to unhide those folder, so I could see them normally in TotalCommander.
I've tried to change the registry values of the StorageManager profiles - but seems that nothing have changed.
I've changed all the "MountHidden" values under [HKEY_LOCAL_MACHINE\System\StorageManager\Profiles\FlashDrv] to 0, still nor ResidentFlash niether ResidentFlash2 appear in TotalCommander.
I've attached the relevant registry values, so you can observe them:
Code:
REGEDIT4
[HKEY_LOCAL_MACHINE\System\StorageManager]
"Dll"="fsdmgr.dll"
"PNPUnloadDelay"=dword:00000100
"PNPWaitIODelay"=dword:000009C4
[HKEY_LOCAL_MACHINE\System\StorageManager\BinFS]
"MountHidden"=dword:00000000
"FriendlyName"="Bin FileSystem"
"DLL"="binfs.dll"
"Paging"=dword:00000001
"Folder"="BINFS"
"MountAsROM"=dword:00000001
"MountPermanent"=dword:00000001
"BootPhase"=dword:00000000
[HKEY_LOCAL_MACHINE\System\StorageManager\Profiles]
"AutoMount"=dword:00000001
"AutoPart"=dword:00000000
"AutoFormat"=dword:00000000
"MountFlags"=dword:00000000
"DefaultFileSystem"="FATFS"
"PartitionDriverName"="MSPART"
"Folder"="Mounted Volume"
"ActivityEvent"="PowerManager/ActivityTimer/SystemActivity"
"MountHidden"=dword:00000000
"MountAsROM"=dword:00000000
"MountPermanent"=dword:00000000
"MountAsBootable"=dword:00000000
"MountAsRoot"=dword:00000000
"MountSystem"=dword:00000000
"MountAsNetwork"=dword:00000000
"PartitionDriver"="mspart.dll"
[HKEY_LOCAL_MACHINE\System\StorageManager\Profiles\FlashDrv]
"DefaultFileSystem"="BINFS"
"PartitionDriver"="mspart.dll"
"AutoMount"=dword:00000001
"AutoPart"=dword:00000001
"Folder"="ResidentFlash"
"Name"="Microsoft Flash Disk"
"BootPhase"=dword:00000000
"DisableAutoScan"=dword:00000001
"ForceWritethrough"=dword:00000001
...
[HKEY_LOCAL_MACHINE\System\StorageManager\Profiles\FlashDrv\BINFS]
"MountHidden"=dword:00000000
"MountAsROM"=dword:00000001
"MountPermanent"=dword:00000001
[HKEY_LOCAL_MACHINE\System\StorageManager\Profiles\FlashDrv\FATFS]
"AutoFormat"=dword:00000001
"FatCacheSize"=dword:00000000
"DataCacheSize"=dword:00000000
"BitmapCacheSize"=dword:00000000
"DisableAutoScan"=dword:00000001
"DisableAutoFormat"=dword:00000000
"ForceWritethrough"=dword:00000001
"EnableWriteBack"=dword:00000000
"NonatomicSector"=dword:00000001
[HKEY_LOCAL_MACHINE\System\StorageManager\Profiles\FlashDrv\PART_R3]
"FriendlyName"="FAT FileSystem"
"Dll"="exfat.dll"
"Paging"=dword:00000001
"FatCacheSize"=dword:00000000
"DataCacheSize"=dword:00000000
"Util"="fatutil.dll"
"DisableAutoScan"=dword:00000001
"ForceWritethrough"=dword:00000001
"PartitionDriver"="mspart.dll"
"AutoMount"=dword:00000001
"Folder"="NandFlash"
"EnableWriteBack"=dword:00000000
[HKEY_LOCAL_MACHINE\System\StorageManager\Profiles\HDProfile]
"MountAsBootable"=dword:00000001
...
Any help will highly appriciate!

Anyone?
Is there is in XDA some proper PNA forum?
Couldn't find one...

Related

Enable Headset with widcomm 1.4.2 stack

Just figured tis out. Not sure if it is realy working because I don´t have a bt headset. It is (only?) for the Widcomm 1.4.2 bt stack that is used on some wm2003se devices.
Can someone with same version and bt headset check it out? Thanks
Here you go (only blue parts are interesting)
[HKEY_LOCAL_MACHINE\SOFTWARE\Widcomm]
[HKEY_LOCAL_MACHINE\SOFTWARE\Widcomm\BtConfig]
[HKEY_LOCAL_MACHINE\SOFTWARE\Widcomm\BtConfig\Platform]
"AudioEnabled"=dword:00000001
"WaveDevDll"="wavedev.dll" ; or btceif.dll?
[HKEY_LOCAL_MACHINE\SOFTWARE\Widcomm\BtConfig\SerialTransport]
"ReceivePriority256"=dword:000000f0
"TransmitPriority256"=dword:000000f0
[HKEY_LOCAL_MACHINE\SOFTWARE\Widcomm\BtConfig\General]
"RadioInitRunMode"="Auto"
"StackMode"=dword:00000000
"UseIconView"=dword:00000001
"PeriodicInquiry"=dword:00000000
"LowPowerSupport"=dword:00000001
"NoResetAllowed"=dword:00000000
"DontShowAdvanced"=dword:00000000
"PowerControlLibrary"="Auto"
"PnpId"=""
"TransportLibrary"="BtCeBCSPTrans.dll"
"RadioInitLibrary"=""
"KeepStackLoaded"=dword:00000000
"InquirySupportedWithConnsUp"=dword:00000001
"ReportNotNamedDevices"=dword:00000001
"InquiryMaxResults"=dword:00000014
"PeriodicInquiryRetryTime"=dword:0000000a
"-ForceDevClassMinor"=dword:00000000
"-ForceDevClassMajor"=dword:00000000
"UseInquiryFilters"=dword:00000000
"AutoDiscovery"=dword:00000001
"InquiryMode"=dword:00000000
"-DefaultInputCharset"=dword:00000000
"-DefaultOutputCharset"=dword:00000000
"InquiryDuration"=dword:0000000a
"DeviceName"="Pocket_PC"
"MinorClass"=dword:00000004 ; was 16
"SecurityType"=dword:00000002
"CountryCode"=dword:00000000
"MaxSimultConnections"=dword:00000007
"NoSleepingWhileConnected"=dword:00000001
"UnnamedDeviceName"="<No Name>"
"DefaultStatusDll"=""
"DefaultPropertiesDll"=""
[HKEY_LOCAL_MACHINE\SOFTWARE\Widcomm\BtConfig\UserInterface]
"FarEastFonts"=dword:00000000
"DeviceName"=""
[HKEY_LOCAL_MACHINE\SOFTWARE\Widcomm\BtConfig\Services]
[HKEY_LOCAL_MACHINE\SOFTWARE\Widcomm\BtConfig\Services\0001]
"UUID"=dword:00001101
"Authorization"=dword:00000000
"Authentication"=dword:00000000
"Encryption"=dword:00000000
"SecurityId"=dword:00000001
"Name"="Generic Serial"
"GUID"="{00001101-0000-1000-8000-00805F9B34FB}"
"StatusDll"=""
"PropertiesDll"=""
"Auto"=dword:00000001
"ComPortNumber"=dword:00000005
"UserInstalled"=dword:00000000
[HKEY_LOCAL_MACHINE\SOFTWARE\Widcomm\BtConfig\Services\0002]
"UUID"=dword:00001105
"Authorization"=dword:00000000
"Authentication"=dword:00000001
"Encryption"=dword:00000001
"SecurityId"=dword:00000005
"Name"="OBEX Object Push"
"GUID"="{00001105-0000-1000-8000-00805F9B34FB}"
"StatusDll"=""
"PropertiesDll"=""
"Auto"=dword:00000000
"DefaultBusinessCard"="0"
"InboxDirectory"="\\My Documents"
"AcceptBusinessCards"=dword:00000001
"AcceptCalendarItems"=dword:00000001
"AcceptEmailMessages"=dword:00000001
"AcceptNotes"=dword:00000001
"SendBusinessCardOnRequest"=dword:00000001
"SaveInPIM"=dword:00000001
[HKEY_LOCAL_MACHINE\SOFTWARE\Widcomm\BtConfig\Services\0003]
"UUID"=dword:00001106
"Authorization"=dword:00000000
"Authentication"=dword:00000001
"Encryption"=dword:00000001
"SecurityId"=dword:00000006
"Name"="OBEX File Transfer"
"GUID"="{00001106-0000-1000-8000-00805F9B34FB}"
"StatusDll"=""
"PropertiesDll"=""
"Auto"=dword:00000000
"Root"="\\My Documents"
"FlistFormat"=dword:00000000
[HKEY_LOCAL_MACHINE\SOFTWARE\Widcomm\BtConfig\Services\0004]
"Name"="Dial-Up Networking"
"GUID"="{00001103-0000-1000-8000-00805F9B34FB}"
"UUID"=dword:00001103
"Authentication"=dword:00000001
"Encryption"=dword:00000001
"Authorization"=dword:00000000
"Auto"=dword:00000000
"SecurityID"=dword:00000003
"ModemComPortNumber"=dword:00000001
"BaudRate"=dword:0000e100
"FlowControl"=dword:00000001
"Enabled"=dword:00000000
[HKEY_LOCAL_MACHINE\SOFTWARE\Widcomm\BtConfig\Services\0005]
"GUID"="{00001102-0000-1000-8000-00805F9B34FB}"
"Enabled"=dword:00000001
"UUID"=dword:00001102
"Authorization"=dword:00000000
"Authentication"=dword:00000001
"Encryption"=dword:00000001
"SecurityId"=dword:00000002
"Name"="Network Access"
"StatusDll"=""
"PropertiesDll"=""
"Auto"=dword:00000000
"NetworkMode"=dword:00000000
"Description"="Network"
; if you enable "Audio gateway" you get services\0006
[HKEY_LOCAL_MACHINE\SOFTWARE\Widcomm\BtConfig\Services\0006]
"UUID"=dword:00001112
"Authorization"=dword:00000000
"Authentication"=dword:00000000
"Encryption"=dword:00000000
"SecurityId"=dword:00000012
"Name"="Audio Gateway"
"GUID"="{00001112-0000-1000-8000-00805F9B34FB}"
"StatusDll"=""
"PropertiesDll"=""
"Auto"=dword:00000001
"AudioType"=""
!Not sure if this one should be in here! I cannot see it in BT manager -> New
[HKEY_LOCAL_MACHINE\SOFTWARE\Widcomm\BtConfig\Services\0007]
"Authentication"=dword:00000000
"Authorization"=dword:00000000
"Auto"=dword:00000001
"Enabled"=dword:00000001
"Encryption"=dword:00000000
"Name"="Headset"
"PropertiesDll"=""
"StatusDll"=""
"GUID"="{00001108-0000-1000-8000-00805F9B34FB}"
"UUID"=dword:00001108
"SecurityId"=dword:00000008
[HKEY_LOCAL_MACHINE\SOFTWARE\Widcomm\BtConfig\Applications]
[HKEY_LOCAL_MACHINE\SOFTWARE\Widcomm\BtConfig\Applications\0001]
"Name"="Generic Serial"
"GUID"="{00001101-0000-1000-8000-00805F9B34FB}"
"UUID"=dword:00001101
"Authentication"=dword:00000000
"Encryption"=dword:00000000
"SecurityId"=dword:00000001
"ComPortNumber"=dword:00000006
[HKEY_LOCAL_MACHINE\SOFTWARE\Widcomm\BtConfig\Applications\0002]
"Name"="LAN Access Using PPP"
"GUID"="{00001102-0000-1000-8000-00805F9B34FB}"
"UUID"=dword:00001102
"Authentication"=dword:00000000
"Encryption"=dword:00000000
"SecurityId"=dword:00000002
"ComPortNumber"=dword:0000000c
[HKEY_LOCAL_MACHINE\SOFTWARE\Widcomm\BtConfig\Applications\0003]
"Name"="Dialup Networking"
"GUID"="{00001103-0000-1000-8000-00805F9B34FB}"
"UUID"=dword:00001103
"Authentication"=dword:00000000
"Encryption"=dword:00000000
"SecurityId"=dword:00000003
"ComPortNumber"=dword:0000000b
[HKEY_LOCAL_MACHINE\SOFTWARE\Widcomm\BtConfig\Applications\0004]
"Name"="OBEX Object Push"
"GUID"="{00001105-0000-1000-8000-00805F9B34FB}"
"UUID"=dword:00001105
"Authentication"=dword:00000000
"Encryption"=dword:00000000
"SecurityId"=dword:00000005
[HKEY_LOCAL_MACHINE\SOFTWARE\Widcomm\BtConfig\Applications\0005]
"Name"="OBEX File Transfer"
"GUID"="{00001106-0000-1000-8000-00805F9B34FB}"
"UUID"=dword:00001106
"Authentication"=dword:00000000
"Encryption"=dword:00000000
"SecurityId"=dword:00000006
[HKEY_LOCAL_MACHINE\SOFTWARE\Widcomm\BtConfig\Applications\0006]
"Name"="ActiveSync Serial Port"
"GUID"="{00001101-0000-1000-8000-00805F9B34FB}"
"UUID"=dword:00001101
"Authentication"=dword:00000000
"Encryption"=dword:00000000
"SecurityId"=dword:00000001
"ComPortNumber"=dword:0000000e
[HKEY_LOCAL_MACHINE\SOFTWARE\Widcomm\BtConfig\Applications\0007]
"Name"="Headset"
"GUID"="{00001108-0000-1000-8000-00805F9B34FB}"
"UUID"=dword:00001108
"Authentication"=dword:00000000
"Encryption"=dword:00000000
"SecurityID"=dword:00000008
[HKEY_LOCAL_MACHINE\SOFTWARE\Widcomm\BtConfig\Applications\0008]
"Auto"=dword:00000001
"Name"="Voice Gateway"
"GUID"="{00001112-0000-1000-8000-00805F9B34FB}"
"UUID"=dword:00001112
"Authentication"=dword:00000000
"Encryption"=dword:00000000
"SecurityID"=dword:0000000c
[HKEY_LOCAL_MACHINE\SOFTWARE\Widcomm\BtConfig\Filters]
"AllowOthersToDiscover"=dword:00000000
"WhoAllowedToConnect"=dword:00000001
"InquiryScanMode"=dword:00000002
"InquiryScanInterval"=dword:00000000
"InquiryScanWindow"=dword:00000000
"PageScanInterval"=dword:00000000
"PageScanWindow"=dword:00000000
[HKEY_LOCAL_MACHINE\SOFTWARE\Widcomm\BtConfig\Filters\Inquiry]
"AutoDiscovery"=dword:00000001
"ReportNotNamedDevices"=dword:00000001
"UseInquiryFilters"=dword:00000000
"InquiryMode"=dword:00000000
[HKEY_LOCAL_MACHINE\SOFTWARE\Widcomm\Connection Wizard]
"HeadsetAutoShortcut"=dword:00000001
[HKEY_LOCAL_MACHINE\SOFTWARE\Widcomm\Connection Wizard\AddIns]
[HKEY_LOCAL_MACHINE\SOFTWARE\Widcomm\Connection Wizard\AddIns\Headset]
"Dll"="btwizardprofiles.dll,6"
"Title"="btwizardprofiles.dll,26061"
"Description"="btwizardprofiles.dll,26062"
"Icon"="btwizardprofiles.dll,26072"
"Order"=dword:00000015
[HKEY_LOCAL_MACHINE\SOFTWARE\Widcomm\Connection Wizard\AddIns\Explore a Bluetooth device]
"Dll"="btwizardprofiles.dll,0"
"Icon"="btwizardprofiles.dll,26059"
"Description"="btwizardprofiles.dll,26022"
"Title"="btwizardprofiles.dll,26021"
"Order"=dword:00000046
[HKEY_LOCAL_MACHINE\SOFTWARE\Widcomm\Connection Wizard\AddIns\PAN]
"Dll"="btwizardprofiles.dll,2"
"Icon"="btwizardprofiles.dll,26073"
"Description"="btwizardprofiles.dll,26067"
"Title"="btwizardprofiles.dll,26066"
"Order"=dword:00000032
[HKEY_LOCAL_MACHINE\SOFTWARE\Widcomm\Connection Wizard\AddIns\Connect to the Internet]
"Dll"="btwizardprofiles.dll,1"
"Icon"="btwizardprofiles.dll,26065"
"Description"="btwizardprofiles.dll,26024"
"Title"="btwizardprofiles.dll,26023"
"Order"=dword:00000028
[HKEY_LOCAL_MACHINE\SOFTWARE\Widcomm\Connection Wizard\AddIns\Bluetooth File Transfer]
"Dll"="btwizardprofiles.dll,5"
"Icon"="btwizardprofiles.dll,26071"
"Description"="btwizardprofiles.dll,26028"
"Title"="btwizardprofiles.dll,26027"
"Order"=dword:00000014
[HKEY_LOCAL_MACHINE\SOFTWARE\Widcomm\Connection Wizard\AddIns\ActiveSync via Bluetooth]
"Dll"="btwizardprofiles.dll,4"
"Icon"="btwizardprofiles.dll,26067"
"Description"="btwizardprofiles.dll,26026"
"Title"="btwizardprofiles.dll,26025"
"Order"=dword:0000000a
"MinOSVersion"=dword:00000001
[HKEY_LOCAL_MACHINE\SOFTWARE\Widcomm\Connection Wizard\AddIns\Business Card Exchange]
"Command"="\\Windows\\BTBusinessCard.exe"
"Icon"="btrez.dll,22132"
"Description"="btrez.dll,22763"
"Title"="btrez.dll,22762"
"Order"=dword:0000003c
[HKEY_LOCAL_MACHINE\SOFTWARE\Widcomm\Connection Wizard\AddIns\Partner with a cellphone]
"Dll"="btwizardprofiles.dll,3"
"Icon"="btwizardprofiles.dll,26069"
"Description"="btwizardprofiles.dll,26030"
"Title"="btwizardprofiles.dll,26029"
"Order"=dword:00000009
[HKEY_LOCAL_MACHINE\SOFTWARE\Widcomm\Connection Wizard\Profiles]
[HKEY_LOCAL_MACHINE\SOFTWARE\Widcomm\Connection Wizard\Profiles\0000]
"Dll"="BTWizardProfiles.dll"
[HKEY_LOCAL_MACHINE\SOFTWARE\Widcomm\Locations]
"CurrentLocation"=dword:00000000
[HKEY_LOCAL_MACHINE\SOFTWARE\Widcomm\Locations\0000]
"Name"="Default"
[HKEY_LOCAL_MACHINE\SOFTWARE\Widcomm\Version]
"Software"="1.4.2.2"
"RadioLmpSubVersion"=dword:0000036f
"RadioManufacturer"=dword:0000000a
"RadioLmpVersion"=dword:00000001
"RadioHciRevision"=dword:0000036f
"RadioHciVersion"=dword:00000001
Click to expand...
Click to collapse
Tried this on a rx3715 with rom 1.0.11b and bluetooth software version 1.50 build 2600 -- didn't work. I'm selling it, without the ability to hook up an external microphone it's pretty much useless for me.

Icons messed up

The icon that indicates its a JPEG image is not showing. Instead it shows an icon which means that its an unknown file format. However the image opens properly. PNG images have the proper icon intact, but only the JPEG image icons aren't showing up. Please help me get the icon back. Is there something i need to download or tweak in the registry or something ? Please guide me
I have the same problem. Is there any way to fix it?
Solved: MemMaid 2.3 -> Jump To -> Databases -> Extensions -> .jpg .jpeg -> Edit... -> Edit Class -> Class: JPEGFile ; Description: JPEG Image ; Icon: browsres.dll,-6704 ; Commands: 1 - Name: DRMOpen Command: pimg.exe "%1" 2 - Name:Open Command: pimg.exe "%1"

How to unlock my ExtROM & Storage?(Huawei C8100,WM6.1p)

I've read all the instructions about configure registry or run unlock tools,but it doesn't work for it.
my device is Huawei C8100(CDMA EVDO),CE 5.2.2.0971(internal version 20971.1.5.4)
here is the registry dump of HLM\System\StorageManager,I trid a tool from http://forum.xda-developers.com/showpost.php?p=1696907&postcount=113,after run the 1st tool and soft-reset,my sd card was hidden and can not view from explorer.
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\System\StorageManager]
"PNPWaitIODelay"=dword:00001000
"PNPUnloadDelay"=dword:00001000
"Dll"="fsdmgr.dll"
[HKEY_LOCAL_MACHINE\System\StorageManager\Filters]
[HKEY_LOCAL_MACHINE\System\StorageManager\Filters\ENCFilt]
"DeviceGUID"=hex:99,F3,DC,7D,54,04,B6,1A,C6,2E,88,BD,4C,E2,C2,FB
"PolicyDLL"="DeviceEncryptionPolicy.dll"
"EncryptByDefault"=dword:00000000
[HKEY_LOCAL_MACHINE\System\StorageManager\Filters\fsdspy]
"dll"="fsdspy.dll"
[HKEY_LOCAL_MACHINE\System\StorageManager\Filters\fsreplxfilt]
"DirsToExclude"=hex(7):5C,00,6D,00,78,00,69,00,70,00,5F,00,69,00,6E,00,69,00,74,00,64,00,62,\
00,2E,00,76,00,6F,00,6C,00,00,00,5C,00,6D,00,78,00,69,00,70,00,5F,00,73,00,\
79,00,73,00,74,00,65,00,6D,00,2E,00,76,00,6F,00,6C,00,00,00,5C,00,6D,00,78,\
00,69,00,70,00,5F,00,6E,00,6F,00,74,00,69,00,66,00,79,00,2E,00,76,00,6F,00,\
6C,00,00,00,5C,00,6D,00,78,00,69,00,70,00,5F,00,6C,00,61,00,6E,00,67,00,2E,\
00,76,00,6F,00,6C,00,00,00,5C,00,63,00,65,00,6D,00,61,00,69,00,6C,00,2E,00,\
76,00,6F,00,6C,00,00,00,5C,00,70,00,69,00,6D,00,2E,00,76,00,6F,00,6C,00,00,\
00,5C,00,44,00,6F,00,63,00,75,00,6D,00,65,00,6E,00,74,00,73,00,20,00,61,00,\
6E,00,64,00,20,00,53,00,65,00,74,00,74,00,69,00,6E,00,67,00,73,00,5C,00,64,\
00,65,00,66,00,61,00,75,00,6C,00,74,00,5C,00,75,00,73,00,65,00,72,00,2E,00,\
68,00,76,00,00,00,5C,00,44,00,6F,00,63,00,75,00,6D,00,65,00,6E,00,74,00,73,\
00,20,00,61,00,6E,00,64,00,20,00,53,00,65,00,74,00,74,00,69,00,6E,00,67,00,\
73,00,5C,00,73,00,79,00,73,00,74,00,65,00,6D,00,2E,00,68,00,76,00,00,00,5C,\
00,57,00,69,00,6E,00,64,00,6F,00,77,00,73,00,5C,00,50,00,72,00,6F,00,66,00,\
69,00,6C,00,65,00,73,00,5C,00,67,00,75,00,65,00,73,00,74,00,5C,00,54,00,65,\
00,6D,00,70,00,6F,00,72,00,61,00,72,00,79,00,20,00,49,00,6E,00,74,00,65,00,\
72,00,6E,00,65,00,74,00,20,00,46,00,69,00,6C,00,65,00,73,00,5C,00,00,00,5C,\
00,57,00,69,00,6E,00,64,00,6F,00,77,00,73,00,5C,00,50,00,72,00,6F,00,66,00,\
69,00,6C,00,65,00,73,00,5C,00,67,00,75,00,65,00,73,00,74,00,5C,00,43,00,6F,\
00,6F,00,6B,00,69,00,65,00,73,00,5C,00,00,00,5C,00,57,00,69,00,6E,00,64,00,\
6F,00,77,00,73,00,5C,00,50,00,72,00,6F,00,66,00,69,00,6C,00,65,00,73,00,5C,\
00,67,00,75,00,65,00,73,00,74,00,5C,00,48,00,69,00,73,00,74,00,6F,00,72,00,\
79,00,5C,00,00,00,5C,00,57,00,69,00,6E,00,64,00,6F,00,77,00,73,00,5C,00,41,\
00,63,00,74,00,69,00,76,00,65,00,73,00,79,00,6E,00,63,00,5C,00,00,00,5C,00,\
77,00,69,00,6E,00,64,00,6F,00,77,00,73,00,5C,00,6D,00,65,00,73,00,73,00,61,\
00,67,00,69,00,6E,00,67,00,5C,00,00,00,5C,00,54,00,65,00,6D,00,70,00,5C,00,\
00,00,5C,00,57,00,69,00,6E,00,64,00,6F,00,77,00,73,00,5C,00,53,00,79,00,73,\
00,74,00,65,00,6D,00,5C,00,50,00,75,00,73,00,68,00,52,00,6F,00,75,00,74,00,\
65,00,72,00,5C,00,63,00,6C,00,69,00,65,00,6E,00,74,00,71,00,75,00,65,00,75,\
00,65,00,73,00,2E,00,76,00,6F,00,6C,00,00,00,5C,00,50,00,72,00,6F,00,67,00,\
72,00,61,00,6D,00,20,00,46,00,69,00,6C,00,65,00,73,00,5C,00,00,00,00,00
"NumDirsToExclude"=dword:00000010
"ReplStoreCacheSize"=dword:00000000
"ReplStoreDoImmaculate"=dword:00000000
"ReplStoreName"="ReplStor"
"ReplStorePath"="\\ReplStorVol"
"ReplStoreHostVolume"=""
[HKEY_LOCAL_MACHINE\System\StorageManager\AutoLoad]
[HKEY_LOCAL_MACHINE\System\StorageManager\AutoLoad\Relfsd]
"BootPhase"=dword:00000002
"MountFlags"=dword:00000001
[HKEY_LOCAL_MACHINE\System\StorageManager\AutoLoad\NANDDISK]
"LoadFlags"=dword:00000001
"DriverPath"="Drivers\\BlockDevice\\NANDDISK"
"BootPhase"=dword:00000001
[HKEY_LOCAL_MACHINE\System\StorageManager\AutoLoad\ExtFlash]
"Order"=dword:00000000
"LoadFlags"=dword:00000001
"DriverPath"="Drivers\\BuiltIn\\ExtFlash"
"BootPhase"=dword:00000002
[HKEY_LOCAL_MACHINE\System\StorageManager\AutoLoad\MSFlash]
"Order"=dword:00000000
"LoadFlags"=dword:00000001
"DriverPath"="Drivers\\BuiltIn\\MSFlash"
"BootPhase"=dword:00000000
[HKEY_LOCAL_MACHINE\System\StorageManager\AutoLoad\RAMFMD]
"BootPhase"=dword:00000001
"LoadFlags"=dword:00000001
"DriverPath"="Drivers\\BlockDevice\\RAMFMD"
[HKEY_LOCAL_MACHINE\System\StorageManager\FATFS]
"Flags"=dword:00000044
"CacheDll"="diskcache.dll"
"Util"="fatutil.dll"
"CacheSize"=dword:00000000
"EnableCache"=dword:00000001
"Paging"=dword:00000001
"Dll"="fatfsd.dll"
"FriendlyName"="FAT FileSystem"
[HKEY_LOCAL_MACHINE\System\StorageManager\FATFS\Filters]
[HKEY_LOCAL_MACHINE\System\StorageManager\FATFS\Filters\ENCFilt]
"Dll"="mencfilt.dll"
"Order"=dword:00000005
[HKEY_LOCAL_MACHINE\System\StorageManager\FATFS\Filters\CacheFilt]
"Dll"=""
"Order"=dword:00000001
[HKEY_LOCAL_MACHINE\System\StorageManager\HRFFS]
"Dll"="hrffs1.dll"
"FriendlyName"="HRFFS FileSystem"
[HKEY_LOCAL_MACHINE\System\StorageManager\PartitionTable]
"26"="BINARY"
"25"="IMGFS"
"23"="RAWFS"
"22"="RAWFS"
"21"="BINFS"
"20"="BOOT"
"0F"="FATFS"
"0E"="FATFS"
"0C"="FATFS"
"0B"="FATFS"
"07"="NTFS"
"06"="FATFS"
"04"="FATFS"
"01"="FATFS"
[HKEY_LOCAL_MACHINE\System\StorageManager\Profiles]
"Folder"="已装入的卷"
"PartitionDriverName"="MSPART"
"DefaultFileSystem"=""
"MountFlags"=dword:00000000
"AutoFormat"=dword:00000000
"AutoPart"=dword:00000000
"AutoMount"=dword:00000001
[HKEY_LOCAL_MACHINE\System\StorageManager\Profiles\PCMCIA]
"Folder"="存储卡"
"Name"="PCMCIA/Compact Flash Device"
[HKEY_LOCAL_MACHINE\System\StorageManager\Profiles\HDProfile]
"Folder"="硬盘"
[HKEY_LOCAL_MACHINE\System\StorageManager\Profiles\SDMMC]
"Folder"="存储卡"
[HKEY_LOCAL_MACHINE\System\StorageManager\Profiles\SDMemory]
"Folder"="Storage Card"
"Name"="SD Memory Card"
[HKEY_LOCAL_MACHINE\System\StorageManager\Profiles\SDMemory\FATFS]
"Flags"=dword:00000064
[HKEY_LOCAL_MACHINE\System\StorageManager\Profiles\SDMemory\FATFS\Filters]
[HKEY_LOCAL_MACHINE\System\StorageManager\Profiles\SDMemory\FATFS\Filters\ENCFilt]
"Dll"="encfilt.dll"
[HKEY_LOCAL_MACHINE\System\StorageManager\Profiles\MMC]
"Name"="MMC Card"
"Folder"="MMC Card"
[HKEY_LOCAL_MACHINE\System\StorageManager\Profiles\MMC\FATFS]
[HKEY_LOCAL_MACHINE\System\StorageManager\Profiles\MMC\FATFS\Filters]
[HKEY_LOCAL_MACHINE\System\StorageManager\Profiles\MMC\FATFS\Filters\ENCFilt]
"Dll"="encfilt.dll"
[HKEY_LOCAL_MACHINE\System\StorageManager\Profiles\HRFFS]
"DefaultFileSystem"="HRFFS"
"PartitionDriver"="mspart.dll"
"AutoPart"=dword:00000001
"AutoFormat"=dword:00000001
"CheckForFormat"=dword:00000001
"Folder"="HRFFS"
[HKEY_LOCAL_MACHINE\System\StorageManager\Profiles\HRFFS\PartitionTable]
"34"="HRFFS"
[HKEY_LOCAL_MACHINE\System\StorageManager\Profiles\MSFlash_DDRRAM]
"AutoFormat"=dword:00000001
"AutoPart"=dword:00000001
"Folder"="DDR Disk"
[HKEY_LOCAL_MACHINE\System\StorageManager\Profiles\MSFlash_DDRRAM\FATFS]
"FormatTfat"=dword:00000001
[HKEY_LOCAL_MACHINE\System\StorageManager\Profiles\ExtFlash]
"PartitionDriver"="mspart.dll"
"MountAsROM"=dword:00000001
"MountHidden"=dword:00000001
"Folder"="Extended_ROM"
"Name"="FLASH Disk Block Device"
[HKEY_LOCAL_MACHINE\System\StorageManager\Profiles\ExtFlash\FATFS]
"MountAsROM"=dword:00000000
"MountHidden"=dword:00000000
"Flags"=dword:00000004
"CheckForFormat"=dword:00000001
[HKEY_LOCAL_MACHINE\System\StorageManager\Profiles\MSFlash_RAMFMD]
"DefaultFileSystem"="HRFFS"
"PartitionDriver"="mspart.dll"
"CheckForFormat"=dword:00000001
"Folder"="Disk"
"AutoFormat"=dword:00000001
"AutoPart"=dword:00000001
[HKEY_LOCAL_MACHINE\System\StorageManager\Profiles\MSFlash_RAMFMD\PartitionTable]
"34"="HRFFS"
[HKEY_LOCAL_MACHINE\System\StorageManager\Profiles\USBCDProfile]
"Folder"="光盘驱动器"
"PartitionDriver"=""
"DefaultFileSystem"="UDFS"
"Name"="USB CDROM/DVD Drive"
[HKEY_LOCAL_MACHINE\System\StorageManager\Profiles\USBCDProfile\PartitionTable]
[HKEY_LOCAL_MACHINE\System\StorageManager\Profiles\USBFDProfile]
"Folder"="软盘驱动器"
"PartitionDriver"=""
"DefaultFileSystem"="FATFS"
"Name"="USB Floppy Disk Drive"
[HKEY_LOCAL_MACHINE\System\StorageManager\Profiles\USBHDProfile]
"Folder"="硬盘"
"Name"="USB Hard Disk Drive"
[HKEY_LOCAL_MACHINE\System\StorageManager\Profiles\USBHDProfile\FATFS]
"EnableCacheWarm"=dword:00000000
[HKEY_LOCAL_MACHINE\System\StorageManager\Profiles\CDProfile]
"Folder"="光盘驱动器"
"PartitionDriver"=""
"DefaultFileSystem"="UDFS"
"Name"="IDE CDROM/DVD Drive"
[HKEY_LOCAL_MACHINE\System\StorageManager\Profiles\CDProfile\PartitionTable]
[HKEY_LOCAL_MACHINE\System\StorageManager\Profiles\MSFlash]
"Name"="FLASH Disk Block Device"
"Folder"="Flash Disk"
"MountHidden"=dword:00000001
"MountAsROM"=dword:00000001
"PartitionDriver"="mspart.dll"
[HKEY_LOCAL_MACHINE\System\StorageManager\Profiles\MSFlash\IMGFS]
"XIP"=dword:00000000
[HKEY_LOCAL_MACHINE\System\StorageManager\Profiles\MSFlash\FATFS]
"Flags"=dword:00600014
"EnableWriteBack"=dword:00000001
"MountAsRoot"=dword:00000001
"MountAsBootable"=dword:00000001
"DataCacheSize"=dword:00000800
"FatCacheSize"=dword:00000200
"CheckForFormat"=dword:00000001
"FormatTfat"=dword:00000001
"MountHidden"=dword:00000000
"MountAsROM"=dword:00000000
[HKEY_LOCAL_MACHINE\System\StorageManager\Profiles\MSFlash\FATFS\Filters]
[HKEY_LOCAL_MACHINE\System\StorageManager\Profiles\MSFlash\FATFS\Filters\fsreplxfilt]
"Order"=dword:00000001
"Dll"="fsreplxfilt.dll"
[HKEY_LOCAL_MACHINE\System\StorageManager\MSPART]
"Dll"="mspart.dll"
[HKEY_LOCAL_MACHINE\System\StorageManager\IMGFS]
"ShadowROM"=dword:00000001
"Paging"=dword:00000001
"Dll"="imgfs.dll"
"FriendlyName"="Image-Update Filesystem"
Wrong forum
Welcome to forums
We dedicate here only to HTC devices, so you won´t find too much attention.
Better to try in other fora
Good luck,

[Q] FSP loox 720 custom ROM. Is it real?

hello.
revived, I still own a pda FS Loox 720
is it possible to make custom rom for this PDA? made of nbf nb0, but he did not see any one program to extract/edit/remove files from the directory works correctly only Dumpromx, but it only allows you to extract the firmware and replace the files, not more.
a short walk to dump the firmware ...
shows that the
start_rom ecec and not one in the firmware of wm2003se.
obtained 13 pieces:
Code:
0. start 80040000
0. ecec 8009edb8
1. start 80180000
1. ecec 802e5c00
2. start 80404000
2. ecec 8097fc98
3. start 809b0000
3. ecec 80a494cc
4. start 80b20000
4. ecec 80c2132c
5. start 80cf0000
5. ecec 80e68394
6. start 80ff0000
6. ecec 81446630
7. start 81470000
7. ecec 814a2ae0
8. start 818b0000
8. ecec 818d5360
9. start 81a20000
9. ecec 81ce8350
10. start 81df0000
10. ecec 81e636d0
11. start 81e80000
11. ecec 81f2ffac
12. start 81f50000
12. ecec 81fa5c3c
13. start 82000000
13. ecec 821cc02c
an example of the firmware:
Code:
80040000 - 80040000 L00000000 rom_00 start
80040000 - 80040004 L00000004 JUMP to kernel start
80040004 - 80040040 L0000003c NUL
80040040 - 80040048 L00000008 'ECEC' -> 8009edb8
80040048 - 80041000 L00000fb8 NUL
80041000 - 8009e7f0 L0005d7f0 o32 region_0 rva=00001000 vsize=0005d7f0 real=80041000 psize=0005d800 f=60000020 for nk.exe
...
80176390 - 80176390 L00000000 rom_00 end
...
81f30808 - 81f30824 L0000001c filent 62 00000805 01c420356cf64524 7498 2039 81f2f7b4 VehicleML.pxt
81f30824 - 81f30824 L00000000 rom_11 end
81f30824 - 81f50000 L0001f7dc NUL
81f50000 - 81f50000 L00000000 rom_12 start
81f50000 - 81f50022 L00000022 filedata h_termservclient.lnk
81f50024 - 81f50034 L00000010 filedata mstsc.lnk
81f50034 - 81f5003d L00000009 modname l2tp.dll
81f50040 - 81f50048 L00000008 'ECEC' -> 81fa5c3c
81f50048 - 81f50fa5 L00000f5d o32 region_2 rva=0004b000 vsize=00001e20 real=0390b000 psize=00000f5d f=40002040 for ipsecsvc.dll
...
81fdaf38 - 81fdaf38 L00000000 rom_12 end
81fdaf38 - 82000000 L000250c8 NUL
82000000 - 82000000 L00000000 rom_13 start
82000000 - 82000018 L00000018 filedata Camera.lnk
82000018 - 8200003b L00000023 filedata CameraWizard.lnk
8200003b - 82000040 L00000005 NUL
82000040 - 82000048 L00000008 'ECEC' -> 821cc02c
....
821cc5c0 - 821cc5dc L0000001c filent 48 00000807 01c4c54239f7e7b7 25600 12138 821c8d8c OV9640.dll
821cc5dc - 821cc5dc L00000000 rom_13 end
821cc5dc - 82200000 unknown
on this and can give an error all the programs?
as they say in the instructions that only one should be romhdr Pointer, and then as many as 14.
and can therefore be extracted only that it was between the first and start rom_00 romhdr pointer. and the rest of the start rom_01 - start rom_13 prog and are not intended as unaware of their existence.
3. Insert this value (4 bytes!) in little endian at offset 0x48 in the NB0 (overwriting original info there). If the original info was part of some file or module in the image, hence corrupting it, you will be able to get that file from unmodified NB0 using dumprom or dumpromx (see below), then use xipport to reinsert the file before rebuilding the image so no worries.
Example for the nec 900c: start adress: 0x84080000, romhdr pointer: 0x85e9c945, 4 bytes to insert: 45 C9 E1 01 (0x84080000 subtracted from 0x85e9c945 and converted to little endian).
That’s all for preparing the NB0 image!
Click to expand...
Click to collapse
say, individually unpack it all, changing the value 0x48 + 4 bytes by calculations for each rom start_ **
and how to combine into one and then the whole firmware? because there will be 14 directories OUT ...
or if / delete / add anything in just one, for example, rom start_05 other rom start_0 * will not be affected?
obtained as follows:
ECEC [4 bytes romhdr pointer] [4 byte subtraction rom start of romhdr pointer] (it's all in the recursively)
but the prog is only the first and all. then not a word ....
first attempt to remove the ECEC and the following bytes to anything nor has led ...
helped to partition a file into 14 parts.
I'm 14 and got modulyaimi directories and files.
but back pack does not work, because it requires coredll. *, and it only be in rom start_00
may suggest how to pack back the modified modules without module coredll
so.
thanks to several people who appeared program that allows you to now edit the firmware for Win CE 4.2.
ask for help in editing, but rather create a custom firmware for a PDA.
list of files attached.
well defined with neskokolkimi programs that do not really need and / or rarely used.
list of files
Code:
oeminfo.xml
defaultconfig.xml
wm_start.wma
Voicbeep.wav
type.wav
Splat.wav
RecEnd.wav
Quietest.wav
online.wav
notify.wav
msgbox.wav
MenuPop.wav
Lowbatt.wav
Loudest.wav
Infend.wav
Infbeg.wav
hwandsw.wav
Default.wav
Alarm4.wav
Alarm3.wav
Alarm2.wav
Alarm1.wav
mxip_XIPKERNEL.ver
mxip_SHELL.ver
mxip_PICTURES192.ver
mxip_OS.ver
mxip_MISC.ver
mxip_LANGSHELL.ver
mxip_LANGCOREAPPS.ver
mxip_KERNEL.ver
mxip_EXAPPS.ver
mxip_CPUOPT.ver
mxip_COREAPPS.ver
mxip_BROWSING.ver
tscscan.txt
sym.txt
hwhelp.txt
autocorrect.txt
AKU_OU1.txt
tahomabd.ttf
tahoma.ttf
cour.ttf
Bliss.tsk
square192.skn
square96.skn
portrait192.skn
portrait96.skn
landscape192.skn
landscape96.skn
nk-exe.sig
coredll-dll.sig
mxip_xipkernel_100.rgu
mxip_shell_100.rgu
mxip_PICTURES192_100.rgu
mxip_OS_100.rgu
mxip_misc_100.rgu
mxip_LANGSHELL_100.rgu
mxip_LANGCOREAPPS_100.rgu
mxip_KERNEL_100.rgu
mxip_EXAPPS_100.rgu
mxip_CPUOPT_100.rgu
mxip_COREAPPS_100.rgu
mxip_BROWSING_100.rgu
CW-registry.reg
VehicleML.pxt
todo.pwi
phone.pwi
memo.pwi
meeting.pwi
blank.pwi
todo.psw
phone.psw
memo.psw
meeting.psw
blank.psw
sysroots.p7b
wince.nls
Region_1_0.nlp
Culture3_1_0.nlp
Culture2_1_0.nlp
Culture1_1_0.nlp
CharInfo_1_0.nlp
Calendar_1_0.nlp
wsp.dll.0409.mui
wininet.dll.0409.mui
waveapi.dll.0409.mui
urlmon.dll.0409.mui
unimodem.dll.0409.mui
shlwapi.dll.0409.mui
netmui.dll.0409.mui
mlang.dll.0409.mui
malcommon.dll.0409.mui
jawres.dll.0409.mui
IECEExt.dll.0409.mui
fatutil.dll.0409.mui
coredll.dll.0409.mui
commdlg.dll.0409.mui
wm_start.lnk
WLNPWRCTL.lnk
WindowsMedia.lnk
welcome.lnk
voice.lnk
Transcriber.lnk
Tone.lnk
tmail.lnk
tasks.lnk
sync.lnk
square.lnk
solitare.lnk
RunningPrograms.lnk
romupdnote.lnk
repllog.lnk
pxl.lnk
pword.lnk
Processor.lnk
poutlook.lnk
portrait.lnk
pmail.lnk
pimg.lnk
pie.lnk
notetake.lnk
mstsc.lnk
MSNMsgr.lnk
MSNMobile.lnk
LEAP.lnk
landscape.lnk
KeyLock1.lnk
Jawbreaker.lnk
hotvoice.lnk
help.lnk
h_wmppc.lnk
h_wince.lnk
h_termservclient.lnk
h_tasks.lnk
h_sync.lnk
h_soltr.lnk
h_simrdr.lnk
h_pxl.lnk
h_pword.lnk
h_pimg.lnk
h_pie.lnk
h_Jawbreaker.lnk
h_inkwrit.lnk
h_inbox.lnk
h_im.lnk
h_ctpnl.lnk
h_connct.lnk
h_cntcs.lnk
h_clndr.lnk
h_calc.lnk
h_bluetooth.lnk
gamesico.lnk
FSCSpeedMenu3.lnk
FSCSpeedMenu2.lnk
FSCPanning.lnk
FSCEasy2Connect_hlp.lnk
FSCEasy2Connect_exe.lnk
FSCBackup_hlp.lnk
FSCBackup_exe.lnk
FSCautorun_hlp.lnk
FSC_Panning.lnk
find.lnk
fexplore.lnk
eventrst.lnk
Enroll.lnk
DispLighting1.lnk
Connections.lnk
CameraWizard.lnk
Camera.lnk
calendar.lnk
calc.lnk
BTTrayCE.lnk
Bluetooth.lnk
Battery1.lnk
async.lnk
AlignScreen.lnk
Album.lnk
addrbook.lnk
mssp2_en.lex
OEM.jpg
DOL.jpg
AudioBK.jpg
initdb.ini
FSCSMdef.ini
wmppc.htm
wince.htm
TranscriberEnu.htm
termservclient.htm
tasks.htm
sync.htm
soltr.htm
SIMReader.htm
rnetw.htm
pword.htm
pocketmsn.htm
piehelp.htm
pic.htm
pexcel.htm
notes.htm
KeyLock.htm
Jawbreaker.htm
inbox.htm
im.htm
FSCSpeedMenu.htm
FSCEasy2Connect20.htm
FSCautorun.htm
FSC_Panning.htm
FSC_Backup.htm
evbruntime.htm
Enroll.htm
default.htm
ctpnl.htm
connect.htm
cntcs.htm
clndr.htm
CameraWizard_(ht)b.htm
CameraWizard_(ht).htm
calc.htm
btwcehlp.htm
bluetooth.htm
agdefault.htm
16_oem.htm
TIPostInit.hcs
TICoexEnable.hcs
TICoexDisable.hcs
BTVoiceEnable.hcs
BTVoiceDisable.hcs
welcomehead.192.gif
volumethumbSQ192.gif
volumethumbSQ96.gif
volumethumb192.gif
volumethumb96.gif
VideoBK.gif
Totem-Heart.gif
Totem.gif
t_msgr.gif
SyncAnimation.gif
stylushead.192.gif
stylus2.192.gif
stylus1.192.gif
stylus1.96.gif
square192.gif
square96.gif
seekthumbSQ192.gif
seekthumbSQ96.gif
seekthumb192.gif
seekthumb96.gif
pushedSQ192.gif
pushedSQ96.gif
pushed192.gif
pushed96.gif
ppc.gif
portrait192.gif
portrait96.gif
piecarrier.gif
oem.gif
myinfo.gif
msn.gif
Magazine.gif
landscape192.gif
landscape96.gif
IMWater.gif
IMAddSuccess.gif
IMAddFailure.gif
FSCSpeedMenu.gif
fly.gif
disabledSQ192.gif
disabledSQ96.gif
disabled192.gif
disabled96.gif
Default_stwater_480_480.gif
Default_stwater.gif
dayview.192.gif
dayview.96.gif
complete.192.gif
Clothes-Line.gif
beam.gif
bannerstrip.gif
banner.gif
avantgo.gif
arrow2.192.gif
11select.192.gif
11select.96.gif
Gprs.gdb
default.fdf
www-Hotspot.fbk
www-GPRS.fbk
wmplayer.exe
WLNPWRCTL.exe
welcome.exe
wceloadsp.exe
wceload.exe
updatexip.exe
unload.exe
umarshaller.exe
udp2tcp.exe
TraShapeSelector.Exe
Transcriber.Exe
Tone.exe
tmarshaller.exe
tmail.exe
testReg.exe
tasks.exe
srvtrust.exe
solitare.exe
sndplay.exe
shfind.exe
shell32.exe
services.exe
rundll32.exe
romupdnote.exe
rnaapp.exe
repllog.exe
remnet.exe
rapisrv.exe
pxl.exe
pword.exe
Processor.exe
PowerWLAN.exe
PowerExe.exe
poutlook.exe
pimg.exe
peghelp.exe
notes.exe
nk.exe
mstsc40.exe
mstli.exe
LEAP.exe
KeyLockRes.exe
jawbreaker.exe
instmsgr.exe
iexplore.exe
idledetect.exe
hwhelp.exe
hotvoice.exe
HFPUI.exe
gwes.exe
FSCSpeedMenu.exe
FSCEasy2Connect20.exe
FSC_PwdStart.exe
FSC_PwdCheck.exe
FSC_Panning.exe
FSC_Backup.exe
filesys.exe
fexplore.exe
eventrst.exe
Enroll.exe
device.exe
ctlpnl.exe
cow.exe
connmgr.exe
coldinit.exe
clocknot.exe
clock.exe
cgacutil.exe
cfdetect.exe
certinst.exe
Camera.exe
calnot.exe
calendar.exe
calc.exe
BTWizardCE.exe
BTTrayCE.exe
BTPanManagerCE.exe
BTFileExplorer.exe
BTCplCE.exe
BTConnManagerCE.exe
BTCePimCmdApp.exe
BTBusinessCard.exe
beam.exe
Backlight.exe
Album.exe
adjustmem.exe
addrbook.exe
XSCSDCard.dll
xls2pxl.dll
wzcsvc.dll
wzcsapi.dll
wsppush.dll
wspm.dll
wsp.dll
ws2instl.dll
ws2.dll
wmvdecoder.dll
wmres.dll
wmlview.dll
wmcore.dll
wmavdecoder.dll
wmadecoder.dll
wldap32.dll
winsock.dll
wininet.dll
wendyser.dll
webview.dll
wdppush.dll
wcestreambt.dll
WBtDll.dll
wbtapiCE.dll
wavedev.dll
waveapi.dll
wapdrv.dll
wap.dll
voicedll.dll
VoiceCtl.dll
VoiceBar.dll
VCOMCtl.dll
VBarCall.dll
usbmsc.dll
usbhid.dll
usbdisk6.dll
usbd.dll
urlmon.dll
unimodem.dll
uicom.dll
tshres.192.dll
tshres.dll
tsctrc.dll
trustmarshaller.dll
TraRes0409.192.dll
TraRes0409.dll
TraRecoEnu.dll
TranscriberSip.Dll
touch.dll
toolhelp.dll
tmailutl.dll
TIRadioInit.dll
tiacxwln.dll
termctrl.dll
tcpstk.dll
tcpip6.dll
taskdll.dll
tapres.192.dll
tapi.dll
syscsps.dll
syncres.192.dll
syncres.dll
syncmgr.dll
stcusb.dll
ssllsp.dll
spnego.dll
softkb.dll
shutil.dll
shlwapi.dll
shellresapps.192.dll
shellresapps.96.dll
shellresapps.dll
shellres.192.dll
shellres.dll
servhost.dll
serial32.dll
serial.dll
secur32.dll
SecIDLib.dll
SDMemory.dll
SdkCE.dll
SDBusDriver.dll
schannel.dll
rsaenh.dll
rra_stm.dll
riresdll.192.dll
riresdll.96.dll
riresdll.dll
richink.dll
relfsd.dll
regenum.dll
redir.dll
rdpdr.dll
rdpapi.dll
pxlfile.dll
pxl2xls.dll
pwwiff.dll
pwddll.dll
pushrouter.dll
pushprxy.dll
psmfsd.dll
pptp.dll
ppp.dll
pm.dll
pimutil.dll
pimstore.dll
pimdlg.dll
pimapi.dll
pegobj.dll
pegcards.192.dll
pegcards.dll
pcmcia.dll
OV9640.dll
outres.192.dll
outres.dll
ossvcs.dll
olece300.dll
oleaut32.dll
ole32.dll
ohci.dll
officeres.192.dll
officeres.dll
office.dll
OEMUtil.dll
oemregistry.dll
oectrl.dll
obexsrvr.dll
obexinbx.dll
obexapi.dll
ntlmssp.dll
nspm.dll
note_prj.dll
note.dll
netui.dll
netmui.dll
netcfagl1_0.dll
netbios.dll
ne2000.dll
ndisuio.dll
ndis.dll
msxml.dll
msscript.dll
mspart.dll
msnsspc.dll
msnewmnu.dll
msmsgsc.dll
msimnetc.dll
msimmsgr.dll
msim.192.dll
msim.dll
MsgStore.dll
msgslang.dll
msdmo.dll
mscoree1_0.dll
mscoree.dll
msasn1.dll
MPEG4SPVIDEOENC.dll
MP4Writer.DLL
mp4spvd.dll
MP4_READER.dll
mmtimer.dll
mlang.dll
miscres.192.dll
miscres.dll
MidiLib2.dll
mfcce300.dll
malcommon.dll
malclmgr.dll
mailtrns.dll
l2tp.dll
KeyLock.dll
keybddr.dll
kbdhid.dll
jscript.dll
JPEGENC.dll
jpeg.dll
jawres.dll
Jacket.dll
irsqrt.dll
irsir.dll
irdastk.dll
ircomm.dll
ipv6hlp.dll
ipsecsvc.dll
ipsec.dll
iphlpapi.dll
inreplce.dll
inkx.dll
inkobj.dll
infantry.dll
imgdecmp.dll
IMEngine.dll
imaging.dll
imagelib.dll
IECEExt.dll
htmlview.dll
HTCcamera1.dll
hidparse.dll
HFPControlPanel.dll
H263VIDEOENC.DLL
gxdma.dll
gx.dll
GSMAMRENC.dll
GSMAMRDLL.dll
GAC_System_v1_0_5000_0_cneutral_1.dll
GAC_System.Xml_v1_0_5000_0_cneutral_1.dll
GAC_System.Windows.Forms_v1_0_5000_0_cneutral_1.dll
GAC_System.Windows.Forms.DataGrid_v1_0_5000_0_cneutral_1.dll
GAC_System.Web.Services_v1_0_5000_0_cneutral_1.dll
GAC_System.Net.IrDA_v1_0_5000_0_cneutral_1.dll
GAC_System.Drawing_v1_0_5000_0_cneutral_1.dll
GAC_System.Data_v1_0_5000_0_cneutral_1.dll
GAC_mscorlib_v1_0_5000_0_cneutral_1.dll
GAC_Microsoft.WindowsCE.Forms_v1_0_5000_0_cneutral_1.dll
GAC_Microsoft.VisualBasic_v7_0_5000_0_cneutral_1.dll
fsdmgr.dll
FSCSMrsc.dll
FSCE2CRes.dll
FSC_LXInfo.dll
Frontlight.dll
find.dll
fatutil.dll
fatfsd.dll
exappres.192.dll
exappres.dll
ethman.dll
eaptls.dll
eapol.dll
eapchap.dll
eap.dll
dssdh.dll
doclist.dll
dhcp.dll
ddi.dll
cxport.dll
cspras.dll
cspproxy.dll
cspnet.dll
crypt32.dll
coreres.192.dll
coreres.dll
coredll.dll
connplan.dll
conncfg.dll
configmanager.dll
compime.dll
commdlg.dll
commctrl.dll
colorConvScaling.dll
clockdll.dll
citydb.dll
chngtrk.dll
cespell.dll
ceshell.dll
cemapi.dll
cemailsync.dll
cellcore.dll
cefobj.dll
cedrmutil.dll
ceddk.dll
ccoreprv.dll
calstore.dll
caldll.dll
cabinstl.dll
bvd_udc_ser.dll
BTWizardProfiles.dll
BTWizardHfp.dll
BtSdkCE30.dll
btrez.dll
bthutil.dll
bthusb.dll
bthuniv.dll
bthuart.dll
bthsc.dll
bthlink.dll
bthcsr.dll
bthamb.dll
btdrt.dll
BTDialer.dll
btd.dll
BtCoreIf.dll
BTChooserLib.dll
BtCeStack.dll
BtCeSendTo_Poom.dll
BtCeProfiles.dll
btcepan.dll
BTCeOsif4.dll
BtCeIf.dll
BtCeBCSPTrans.dll
BTAudioGW.dll
browsres.192.dll
browsres.dll
browser.dll
battdrvr.dll
aygshell.dll
audevman.dll
atlce300.dll
atadisk.dll
asyncmac.dll
asfplayer.dll
appinstaller.dll
Album_Res.dll
airsync.dll
agiehandler.dll
afd.dll
adosync.dll
adoceoledb30.dll
adocedb30.dll
adoce30.dll
addrstor.dll
addrdll.dll
abstraction.dll
AACDLL.dll
statdict.dat
splash.dat
pwipat.dat
initobj.dat
dictprob.dat
SystemInfo.cpl
PowerWLAN.cpl
Powerg.cpl
cplmain.cpl
BTConfigCE.cpl
Backlight.cpl
malconfig.cfg
Zoom-Indicator.bmp
zoom.bmp
winmedia.bmp
webguide.bmp
volume.bmp
voicetag.bmp
Thumbnail-view.bmp
sysvol.bmp
slideshow.bmp
sending.192.bmp
sending.96.bmp
senddsbl.192.bmp
senddsbl.96.bmp
send.192.bmp
send.96.bmp
rotate.bmp
Remaining-video-time.bmp
Remaining-images.bmp
question.bmp
ppccom.bmp
Picture-Theme-Next-Previous-arrows.bmp
Msrg_undo.bmp
Msrg_tab.bmp
Msrg_space.bmp
Msrg_paste.bmp
Msrg_entr.bmp
Msrg_cut.bmp
Msrg_copy.bmp
Msrg_case.bmp
Msrg_back.bmp
Msrg_all.bmp
msn_mail.bmp
msn.bmp
Full-Screen-exit-icon.bmp
Full-Screen-entrance-icon.bmp
device.bmp
crop.bmp
Confirm-Send.bmp
Confirm-Detailed-View.bmp
Confirm-Delete.bmp
Confirm-Back.bmp
Capture-Size.bmp
Capture-Indicator.bmp
Camera-Settings.bmp
bt_tran.bmp
bt_spc.bmp
bt_rtn.bmp
bt_rmode.bmp
bt_rarr.bmp
bt_optns.bmp
bt_lss.bmp
bt_larr.bmp
bt_kbrd.bmp
bt_help.bmp
bt_bspc.bmp
appointment.bmp
Ambience-Incandescent.bmp
Ambience-Fluorescent.bmp
Ambience-Daylight.bmp
alerts.bmp
aglogo.bmp
maxim_radio_dl.bin
ACX100_dl.bin
async.asy
gsm610.acm
wmlb.2bp
wm_wmcom.2bp
wm_volume.2bp
wm_unmute.2bp
wm_stop.2bp
wm_progress.2bp
wm_previous.2bp
wm_play.2bp
wm_pause.2bp
wm_next.2bp
wm_info.2bp
wm_fullscreen.2bp
Win_Start.2bp
web_content.2bp
vcard.2bp
up_play.2bp
undo.2bp
toolbar.2bp
Tip_Icon.2bp
Stop_icon.2bp
stop.2bp
space.2bp
Signal_Strength_Yellow.2bp
Signal_Strength_RED.2bp
Signal_Strength_Green.2bp
send.2bp
scard.2bp
reply.2bp
Refresh_icon.2bp
Red_Bul.2bp
record.2bp
play_play.2bp
pen.2bp
NewCard.2bp
mic.2bp
line.2bp
light.2bp
input.2bp
info_play.2bp
Icon_Work.2bp
Icon_Ntwk_Card.2bp
Icon_Init.2bp
Icon_Connect_Internet.2bp
Icon_Connect.2bp
format.2bp
Folder_icon.2bp
flag.2bp
favorite.2bp
Edit_profile_icon.2bp
Edit_Num.2bp
drform.2bp
down_play.2bp
direct16.2bp
dialup16.2bp
Dial_Num.2bp
deletefolder.2bp
delete_play.2bp
dataconnection.2bp
chooser_prev.2bp
chooser_next.2bp
cf.2bp
BT_PhoneDialer.2bp
BT_icon_Gray.2bp
BT_icon_Blue.2bp
BT_Globe_icon.2bp
BT_BizCard_icon.2bp
brcm_ppc.2bp
Blu_Bul.2bp
autosum.2bp
attach.2bp
align.2bp
address.2bp
add_play.2bp
avantgocfg.1
avantgocfg.0
list of files found by the programs
Easy2Connect
Code:
FSCE2CRes.dll
FSCEasy2Connect_hlp.lnk
FSCEasy2Connect_exe.lnk
www-Hotspot.fbk
www-GPRS.fbk
solitare
Code:
solitare.lnk
h_soltr.lnk
gamesico.lnk
solitare.exe
soltr.htm
FSCSpeedMenu
Code:
FSCSpeedMenu.exe
FSCSpeedMenu3.lnk
FSCSpeedMenu2.lnk
FSCSMdef.ini
FSCSMrsc.dll
office
Code:
h_pxl.lnk
pxl.exe
pxl.lnk
pxl2xls.dll
pxlfile.dll
office.dll
pword.exe
h_pword.lnk
pword.lnk
xls2pxl.dll
pword.htm
pwwiff.dll
calculator
Code:
h_calc.lnk
calc.lnk
calc.htm
calc.exe
Transcriber
Code:
TraRes0409.192.dll
TraRes0409.dll
TraRecoEnu.dll
TranscriberSip.Dll
Transcriber.lnk
TranscriberENU.htm
Transcriber.exe
Msrg_undo.bmp
Msrg_tab.bmp
Msrg_space.bmp
Msrg_paste.bmp
Msrg_entr.bmp
Msrg_cut.bmp
Msrg_copy.bmp
Msrg_case.bmp
Msrg_back.bmp
Msrg_all.bmp
bt_tran.bmp
bt_spc.bmp
bt_rtn.bmp
bt_rmode.bmp
bt_rarr.bmp
bt_optns.bmp
bt_lss.bmp
bt_larr.bmp
bt_kbrd.bmp
bt_help.bmp
bt_bspc.bmp
other files:
Code:
*.psw and *.pxt
wm_start.wma
wm_start.lnk
it's all that I have found so far.
tell me what other programs, libraries, files can be deleted.
for example, wmp, outlook, tmail, etc ...

[Tool] LG Back up & restore (com.lge.bnr) .lbf file analysis & extract tool

Hello, recently I looked into LG backup and restore application using static analysis.
Note: this is based on version lg bnr 8.0.26 from 2020-02-13, tested with 7.0.20 from 2008-12-31
Here is the extract tool:
https://github.com/Mysak0CZ/LBFtool
And here is the technical part (you don't need to read this, if you just want to extract your data):
The file contains 2 headers (one of them is referred to as "new")
These are XML documents encrypted using AES/ECB/PKCS5Padding + SHA256 and null IV with static password
Code:
cd562f61-5399-3978-ac76-7c54b0508010
And they look like this:
Code:
<?xml version="1.0" encoding="UTF-8"?>
<BackUp>
<Common>
<Name>LGBackup_200217_1</Name> <!-- Name of the backup file -->
<Id>Randomly generated UUID</Id> <!-- Id of the backup file -->
<IsNew>True</IsNew> <!-- IsNew is same in new and old header -->
<Version>1.00</Version>
<Attr Name="product_model">LM-X525</Attr>
<Attr Name="os_version">9</Attr>
<!-- And other attributes including google email -->
</Common>
<BackupItem Category="settings_DB" StartOffset="59392" DataSize="136626" />
<BackupItem Category="MEDIA_DB" StartOffset="901169" DataSize="78393344" FileName="external.db" />
<!-- Other backuped items -->
</BackUp>
The "new" header has more information than original header, but same structure.
The attribute "IsNew" signals the presence of the new header. (and is True in both files)
All numbers inside file are in Big-endian.
And this is the structure of the file (decimal position):
Code:
0: Unknown - 0x00 for me
1: Int32 - size of the new header
5: Int64 - offset to the new header (usually 13)
13 ... EOF-33: data
EOF-33: 20 bytes - SHA1 hash of the password (if present, otherwise still data)
EOF-13: Int64 - offset to the (old) header
EOF-5: Int32 - size of the (old) header
EOF-1: Bool - Lock byte - the file is (0x01) or isn't (0x00) protected by password
The password is only checked during import, not used to encrypt data (so to remove password, just set the last byte to 0)
Every "BackupItem" entry has a "Category".
Special case is Category="APPLICATION" with this structure:
Code:
<BackupItem Category="APPLICATION">
<APPLICATION Name="com.lge.ime" StartOffset="19221586" DataSize="2385983" Package="com.lge.ime">
<Attr Name="com.lge.ime">com.lge.ime</Attr>
</APPLICATION>
<APPLICATION Name="org.exmple.app" StartOffset="1429652009" DataSize="3420160" FileName="org.exmple.app.tar" Package="org.exmple.app">
<Attr Name="org.exmple.app">org.exmple.app</Attr>
</APPLICATION>
<!-- ... -->
</BackupItem>
All applications are tar files that contain 2 folders:
app - contains the apk file
data - application's internal data
All other items have:
StartOffset - Offset inside file
DataSize - Self explanatory
FileName - Not all have this, but most do; it is the original name of the backuped file.
The files are not compressed nor encrypted.
Footnote: This is my first post on XDA, so sorry for any mistakes I made (including my english) and feel free to correct me/give me advice.
Mysak0CZ said:
Hello, recently I looked into LG backup and restore application using static analysis.
Note: this is based on version lg bnr 8.0.26 from 2020-02-13, tested with 7.0.20 from 2008-12-31
Here is the extract tool:
And here is the technical part (you don't need to read this, if you just want to extract your data):
The file contains 2 headers (one of them is referred to as "new")
These are XML documents encrypted using AES/ECB/PKCS5Padding + SHA256 and null IV with static password
And they look like this:
The "new" header has more information than original header, but same structure.
The attribute "IsNew" signals the presence of the new header. (and is True in both files)
All numbers inside file are in Big-endian.
And this is the structure of the file (decimal position):
The password is only checked during import, not used to encrypt data (so to remove password, just set the last byte to 0)
Every "BackupItem" entry has a "Category".
Special case is Category="APPLICATION" with this structure:
All applications are tar files that contain 2 folders:
app - contains the apk file
data - application's internal data
All other items have:
StartOffset - Offset inside file
DataSize - Self explanatory
FileName - Not all have this, but most do; it is the original name of the backuped file.
The files are not compressed nor encrypted.
Footnote: This is my first post on XDA, so sorry for any mistakes I made (including my english) and feel free to correct me/give me advice.
Click to expand...
Click to collapse
Nice job dude! just a the quick recommendation: I would suggest that you put your code on gitlab or GitHub so it will become easier for others to contribute
Sent from my OnePlus 6T using XDA Labs
Hi. I'm trying to use this tool but I don't know how to use it. I followed the instructions and downloaded Python. but none of the other steps are working for me. I have my backup on my PC and am trying to extract my files into normal formats as I wish to move away from the LG platform. Thank you.
---------- Post added at 07:20 AM ---------- Previous post was at 06:57 AM ----------
Nevermind, I found a work around.
For anyone else in the future wondering: If you select backup with the app on the phone and backup to the internal memory, it will create .pdf files of all text/images in internal storage>>Quickmemo+. This doesn't help to retrieve the audio or video recordings, but at least that way you can retrieve your text files/images.
Tried script on old backup, failed with error.
Mysak0CZ said:
Hello, recently I looked into LG backup and restore application using static analysis.
Note: this is based on version lg bnr 8.0.26 from 2020-02-13, tested with 7.0.20 from 2008-12-31
Here is the extract tool:
And here is the technical part (you don't need to read this, if you just want to extract your data):
The file contains 2 headers (one of them is referred to as "new")
These are XML documents encrypted using AES/ECB/PKCS5Padding + SHA256 and null IV with static password
Code:
cd562f61-5399-3978-ac76-7c54b0508010
...
[/CODE]
All applications are tar files that contain 2 folders:
app - contains the apk file
data - application's internal data
All other items have:
StartOffset - Offset inside file
DataSize - Self explanatory
FileName - Not all have this, but most do; it is the original name of the backuped file.
The files are not compressed nor encrypted.
Footnote: This is my first post on XDA, so sorry for any mistakes I made (including my english) and feel free to correct me/give me advice.
Click to expand...
Click to collapse
My first post as well. Thanks for the script. I ran it on an old backup I was hoping to extract contacts from. See excerpt with error below.
C:\Temp\LG G4\Backup>python extract.py LGBackup_190218.lbf
[+] Backup size: 597864605
Parsing...
Reading header
[*] Header start offset: 597792768
[*] Header length: 71824
[+] Header read OK
Reading header (new)
[*] Header start offset: 7021235167904623918
Traceback (most recent call last):
File "extract.py", line 125, in <module>
root = readHeader(True)
File "extract.py", line 99, in readHeader
size = getBackupInfoSize(isNew)
File "extract.py", line 88, in getBackupInfoSize
raise Exception("Invalid header length.")
Exception: Invalid header length.
C:\Temp\LG G4\Backup>
Click to expand...
Click to collapse
I'm a complete newbie with Python, haven't done any coding in over a decade. Where do I go from here?
Ninja_Toad said:
My first post as well. Thanks for the script. I ran it on an old backup I was hoping to extract contacts from. See excerpt with error below.
I'm a complete newbie with Python, haven't done any coding in over a decade. Where do I go from here?
Click to expand...
Click to collapse
Hi! Your backup seem to be at least partially corrupted. (The new header position seems to start at 7021235167904623918, however the file is only 597864605 bytes long). Fortunatly there are two headers in the backup and the old one seems to be ok (You got "[+] Header read OK" for the old header). So you can try ignoring the "new" header.
To ignore the faulty header just set the relevant "FORCE_*_HEADER" to True in the script header. In your case just set "FORCE_OLD_HEADER = True".
Also note, that extracting contacts in readable format is beyond this script's current scope. This can however be done manually. After you get your data successfully extracted, look for export/data/contacts_DB file. This is a TAR file in which you need to find file "data/data/user/0/com.android.providers.contacts/databases/contacts2.db". This is the contact database as your phone stores it. To actually extract the contacts, you will need to find a way to convert the database to some other format (I have't looked into how the contacts are stored, you will need to do your own googling)
Files extracted but...
hello guys,
I also managed to extract my files using the hack mentioned above (force old headers to TRUE) since by using the default script i was also getting a similar error as above.
However now all of my files (pictures in particular) are corrupted and i cannot seem to be able to open them using several editors.
Anyone else had the same issue?
Thanks in advance!
serlal said:
hello guys,
I also managed to extract my files using the hack mentioned above (force old headers to TRUE) since by using the default script i was also getting a similar error as above.
However now all of my files (pictures in particular) are corrupted and i cannot seem to be able to open them using several editors.
Anyone else had the same issue?
Thanks in advance!
Click to expand...
Click to collapse
Yes I have exactly same issue as you have. All exported files cannot be read.
Hello @tking2000 and @serlal, this script was written based on versions that are available to me. There are two possibilities of what is happening:
1) The file was badly corruped, however the old header stayed itact. (This is the likely case, if you are trying this tool because your phone refused to restore the backup)
2) The file was made by version that does something differently and the script doesn't account for it.
In the first case there is nothing anyone can do (short of trying some corrupted file recovery software hoping the corruption is only minor)
In the second case, you can try sending me a PM with following information, so I can have a look and confirm whether this is truly the case (and improve the script)
1) The script's output
2a) The <Version> and <Attr Name="settingVersionName"> from the <Common> part of the header
2b) If you aren't concerned about privacy or it is just easier for you: just send the whole header file
3) The version of the com.lge.bnr app (LG Mobile Switch); this is not necessary, but may help me
Feel free to censor anything you are sending with [CENSORED] (like your email or filenames)
I have no experience with python, but I have one of these lbf files and I'm trying to figure out how to make it work and all I get is couldn't get library pycryptodome. How do I get Python 3.8.3 to get this library?
Multipart backups
Hello everyone,
I just finished an update, that should enable the tool to extract backups that have multiple files.
If you received "Exception: Invalid header length." in the past and your backup has multiple files, try the script now; your backups are likely to extract correctly now.
This is the likely case for: @Ninja_Toad @serlal and @tking2000
This was made possible thanks to @cheesyzombie who sent me the data I asked for.
@kamikazkid, You don't need to know Python to use this tool, the easiest way is to enter the commands in quotes on the github page into the console (To open the console Shift+Right click in the folder with backups and choose "Open command window here").
Just:
Download the zip on the github page (Under "Code" button)
Make sure the extract.py and your backup are in the same folder
Follow the usage, skip the 4th step and replace xxxxxx to match your backup name.
I figured it out, it was something with windows 10 and the version of python installation I used. Microsoft garbaging things up as usual, thanks for the help though. Thanks, I recovered my files from my old phone successfully.
I have no experience withc++, but I have one of these lbf files and I'm trying to figure out how to make it work, it is a great this forum
Is there a way to import the _DB files (contacts, messages, call logs etc.) back to a phone?
I asked before:
https://forum.xda-developers.com/lg-g3/general/restore-backup-lbf-lineage-17-t4172483#post83644281
Thank you so much for this! I was able to extract the Messaging data from an LG G8 ThinQ. Does anybody know the easiest way to view that data on my PC?
Hi, you can follow these steps to extract data fron _db files:
1) Send the _db files like contacts_db, messages_db to any android phone
2) Double tap on the file and open it using File Manager (which is by default on Mi phones)
3) The file will now open as a folder. Continue opening the folders until you reach to the last file.
4) The last file is the database file. It won't open directly. Select the file and extract the file.
5) Now transfer the file to computer and you can now view it using SQLite DB Browser if its a contacts file or you can use any VMG reader if its a messages file.
Hope this helps you.
Hi @Mysak0CZ, just follow your instructions on GitHub but when I run the command on Command Prompt, nothing happens. Just like this:
F:\>python -m pip install pycryptodome
F:\>python extract.py LGBackup-201031.lbf
When I enter nothing happened. Kindly help to advise for this.
Thank you
Problem in powershell
Mysak0CZ said:
Hi! Your backup seem to be at least partially corrupted. (The new header position seems to start at 7021235167904623918, however the file is only 597864605 bytes long). Fortunatly there are two headers in the backup and the old one seems to be ok (You got "[+] Header read OK" for the old header). So you can try ignoring the "new" header.
To ignore the faulty header just set the relevant "FORCE_*_HEADER" to True in the script header. In your case just set "FORCE_OLD_HEADER = True".
Also note, that extracting contacts in readable format is beyond this script's current scope. This can however be done manually. After you get your data successfully extracted, look for export/data/contacts_DB file. This is a TAR file in which you need to find file "data/data/user/0/com.android.providers.contacts/databases/contacts2.db". This is the contact database as your phone stores it. To actually extract the contacts, you will need to find a way to convert the database to some other format (I have't looked into how the contacts are stored, you will need to do your own googling)
Click to expand...
Click to collapse
Hi, I am trying to extract via your method but in the power shell in sending the command "python extract.py LGBackup_1x0x07.lbf" it does not execute and brings me back the initial path line. Do you have solutions in this regard? Thanks in advance
Ps. I use Win10
Worked so well. I only needed to recover images and audio recordings after realizing that LG backup tool won't restore on other brand phones.
Thank you!!
Mysak0CZ said:
Hello, recently I looked into LG backup and restore application using static analysis.
Note: this is based on version lg bnr 8.0.26 from 2020-02-13, tested with 7.0.20 from 2008-12-31
Here is the extract tool:
https://github.com/Mysak0CZ/LBFtool
And here is the technical part (you don't need to read this, if you just want to extract your data):
The file contains 2 headers (one of them is referred to as "new")
These are XML documents encrypted using AES/ECB/PKCS5Padding + SHA256 and null IV with static password
Code:
cd562f61-5399-3978-ac76-7c54b0508010
And they look like this:
Code:
<?xml version="1.0" encoding="UTF-8"?>
<BackUp>
<Common>
<Name>LGBackup_200217_1</Name> <!-- Name of the backup file -->
<Id>Randomly generated UUID</Id> <!-- Id of the backup file -->
<IsNew>True</IsNew> <!-- IsNew is same in new and old header -->
<Version>1.00</Version>
<Attr Name="product_model">LM-X525</Attr>
<Attr Name="os_version">9</Attr>
<!-- And other attributes including google email -->
</Common>
<BackupItem Category="settings_DB" StartOffset="59392" DataSize="136626" />
<BackupItem Category="MEDIA_DB" StartOffset="901169" DataSize="78393344" FileName="external.db" />
<!-- Other backuped items -->
</BackUp>
The "new" header has more information than original header, but same structure.
The attribute "IsNew" signals the presence of the new header. (and is True in both files)
All numbers inside file are in Big-endian.
And this is the structure of the file (decimal position):
Code:
0: Unknown - 0x00 for me
1: Int32 - size of the new header
5: Int64 - offset to the new header (usually 13)
13 ... EOF-33: data
EOF-33: 20 bytes - SHA1 hash of the password (if present, otherwise still data)
EOF-13: Int64 - offset to the (old) header
EOF-5: Int32 - size of the (old) header
EOF-1: Bool - Lock byte - the file is (0x01) or isn't (0x00) protected by password
The password is only checked during import, not used to encrypt data (so to remove password, just set the last byte to 0)
Every "BackupItem" entry has a "Category".
Special case is Category="APPLICATION" with this structure:
Code:
<BackupItem Category="APPLICATION">
<APPLICATION Name="com.lge.ime" StartOffset="19221586" DataSize="2385983" Package="com.lge.ime">
<Attr Name="com.lge.ime">com.lge.ime</Attr>
</APPLICATION>
<APPLICATION Name="org.exmple.app" StartOffset="1429652009" DataSize="3420160" FileName="org.exmple.app.tar" Package="org.exmple.app">
<Attr Name="org.exmple.app">org.exmple.app</Attr>
</APPLICATION>
<!-- ... -->
</BackupItem>
All applications are tar files that contain 2 folders:
app - contains the apk file
data - application's internal data
All other items have:
StartOffset - Offset inside file
DataSize - Self explanatory
FileName - Not all have this, but most do; it is the original name of the backuped file.
The files are not compressed nor encrypted.
Footnote: This is my first post on XDA, so sorry for any mistakes I made (including my english) and feel free to correct me/give me advice.
Click to expand...
Click to collapse
ok I am so lost. And here is the technical part (you don't need to read this, if you just want to extract your data):
that statement would make it appear easy. well the link only takes you to the code, there is no tool and nothing with "new" as header. so ive tried deciphering what to do for hours now and i cant figure npthing out. rooted and flashed my lgv20 and did a backup with lg bridge beforehand. trying to restore and phone connects to computer fine but doesnt regster in lg bridge so that is why i need to extract .lbf file. can someone make this easier?
hello..it ended up successful.but there is no jpeg or mp4 file on DCIM folder..how can i restore them?should i do somthing with the script? i don't know pyton

Categories

Resources