Having trouble with error -103 on a LG phone - Android Q&A, Help & Troubleshooting

Hello. After a software version update and then using LG tool to unlock the phone there's now a problem with opening LG apps like Quick Memo+ because it cannot find the license provider. The error has the number -103 at the end of the message. I tried to find another android software version update to see if it could overwrite the problem but it looks like its already at the latest version. I'm mostly interested in extracting the memos which I cannot find anywhere in the storage folders. I'm not sure how quick memo stores them because before the error appears I can briefly see the memos are still there. Do you have suggestions to fix this?

memos usually stored in sqlite database inside /data/user*/0/<pkgname> and hard to recover
(pkgname=com.lge.qmemoplus)
https://sqliteforensictoolkit.com/how-not-to-examine-sqlite-wal-files

Related

Any way to restore my WhatsApp msgs?

Sorry if wrongly posted but I need some help,
Today I lost my WhatsApp chat history somehow and I am trying to restore it, did all the tricks I could find.... but no success.
My wife died the 22th of April and I really want her msgs back :crying:
I Have no Key file (searched for it but can't find it
Tried xTract butcouldn't open my files
Tried a bunch of websites...
I got one msgstore.db.crypt file
7 msgstore.db.crypt7 files with dates (the last 7 backups I guess)
1 msgstore.db.crypt7 file
1 msgstore.db.crypt5 file
Who can help me out ?
Sorry to hear about your wife passing. I can't even imagine...
I'm not really familiar with Whatsapp but thought I'd give a crack at getting to help nevertheless. So, to get your key, you have to be rooted. But it seems like this
http://forum.xda-developers.com/showthread.php?t=2689911
might have a lot of useful info on how to decrypt them and I'm sure someone there knows how to get the key too.
Thnx, I tried the web-version from WhatsCrypt but liked said I am unable to get a keyfile.... it's not in the folders, tried the App version now too... it decrypts a DB but also unable to get a Keyfile (file isnt there)
I will not give up tho
*edit* Saw you are running a rom, so am assuming you are rooted. Duh...
But I see you posted over on that thread. They would obviously know more about it than I would. I wish you well!
I dunno if this might help at all:
https://play.google.com/store/apps/details?id=com.tricrypt
And I guess you should be able to find your key in the /data/data folder for Whatsapp.
I've tried all those tools but did not got any msg back, there is no keyfile located in that folder I've checked like a thousands of times.
Well, guess I need to write support

[Q] Install Whats'App by coping system files??

Hi,
Maybe the title is not really accurate but I didn't know how to formulate my question.
I'm actually living in Japan and I bought a new phone (OnePlus One). Because I don't need my phone number, I froze my phone contract with my provider (Swisscom). So my phone number is not active anymore.
But What's app is still working on my old phone. But I can't install it on the new one because of the verification. I tried some of the "hacks" you can find online about spoofing my sms but it's not working because my phone number is not active anymore.
Do you have any solution that can help me install whats'app on my new phone?
I was wondering if it was possible to copy all the files from my previous phone on the new one (whats'app file of course) maybe there is a validation files somewhere which can be transfered. I don't know I'm out of ideas.

UP920 Looking for install logs / unwanted app keeps getting reinstalled

Hi!
I recently got an android 4.4.2 phone ( "uhappy up920" ) and I can't find any logs or any way to see WTF is going on. An application that wasn't originally included ( "Maxthon Cloud Browser" ) keeps getting reinstalled and I can't figure out how / why.
( Phone isn't / probably can't be rooted )
Any hints?
edit:
- the unwanted "maxthon cloud browser 4.1.4.2000" is an obsolete version that does not show up in play store or in f-mod when it's installed.
- "Avira" and "App install tracker" both show when it's getting installed, but offer no hints on how to find out why/how it is installed
- Sometimes it gets reinstalled only a few minutes after I remove it, sometimes it takes a few hours.
- After uninstalling the unwanted Browser, I can't locate any traces of it in the part of the file system I can access with an unrooted adb connection
- Can't find any connections to suspicious sources from the phone in my router's iptables logs either (there are no SIM cars in the phone) - then again, that's sort of hard since I don't know what to look for
- Kernel is 3.4.67, build date Mon Mar 2 12:35:55 CST 2015 - which probably leaves me with no working exploits for easy privilege escalation?
- Fastboot + the bootloader unlock function etc seem to be intentionally broken and it almost looks like I'm the only person in the world using this phone so, no idea how to get around that + more access to stuff
The only way I know how to get rid of "Maxthon Cloud Browser" and whatever/whoever keeps reinstalling it would be with a hammer, so any alternative suggestions are appreciated!
Found an installation file in a download directory under the name "com.mx.browser.mtk4.1.4.2000.apk" (no idea how I missed that earlier)
Deleting that wasn't enough to stop the browser from being reinstalled, so I copied + renamed a random mp3 (cut to have the same size with dd) to replace the file. Since then, it has not been reinstalled.
I've been waiting for the file to be replaced or at least for error messages concerning the "corrupted executable" to pop up somewhere and give away which service was the culprit, but so far there were none. So I'd guess whatever installed the browser is rather quiet and rather sloppily coded :/

No Whatsapp key in data/data/com.whatsapp, but SQLite Editor reads the crypt7 files

Hey there guys. I am currently trying to retrieve whatsapp conversations from one of my older phones, a Huawei Ascend G510. However, the thing is that when I found the phone, Whatsapp was already asking to verify my phone number, and I don't have the old number nor the old SIM card anymore, my brother also updated whatsapp to the newest version, thinking this would somehow help, needless to say that now when I open Whatsapp it just asks to verify my number, which I don't have anymore. However I managed to find the original crypt7 files, dated all the way back to 2014, I managed to root the device in order to search for the key file, but the thing is I cannot find it anywhere.
Strangely enough, the folder data/data/com.whatsapp contains only these folders:
- app_Keys (made in 2013, but is empty);
- app_minidumps (empty);
- cache;
- code_cache;
- databases (another old folder, containing _jobqueue-WhatsAppJobManager, _jobqueue-WhatsAppJobManager-journal, axolotl.db, axolotl.db-shm, axolotl.db-wal, google_app_measurement_local.db, google_app_measurement_local.db-journal, wa.db, wa.db-shm, and wa.db-wal);
- files;
- lib;
- no-backup;
- shared_prefs.
None of them contain a key file. I read some threads here in the forums, everybody was saying that without the key file, the crypt7 backups are useless. However, I thought that I should also check it with the SQLite Editor app. And surprise. It opened the crypt7 backups. The SQLite Editor opened the conversations, the only problem being that instead of a date it's just an unintelligible timestamp. However, this lead me to believe that the key file must be in there somewhere, otherwise the SQLite Editor couldn't have opened the backups. Does anyone know how can I find it, where could it be, so I can decrypt the backups and be able to read the conversations properly, with a date and time on the messagges? Thank you.

How to extract Whatsapp Key from an SD-card install?

Dear all,
Though I'm kind of a beginner, I have made much progress backing up and decrypting Whatsapp messages from my old Android phone. However, there seems to have been an even older installment of Whatsapp running from an SD-card on the same device. There are Whatsapp-database files there, but I cannot find the decryption key.
I have tried many ways of going about it:
1. Exploring the root of the SD Card does not lead anywhere.
2. When I use Whatsapp-Key-DB-extractor by Tripcode, it only extracts from the phone's main drive.
3. When I transfer the older databases from the SD-card into their corresponding folder on the phone (either alongside, or replacing them), and then run the Extractor, again no success.
4. In the Apps menu of my phone Configurations, when I go to Whatsapp, the button "Move to SD-card" is unavailable. I figured this may be because only older versions of Whatsapp were able to move to an SD-card and run from there.
5. I downloaded and tried to install older versions of Whatsapp through APK-mirror (with the objective to consequently see if I can move it to the SD-card), but all of them ended in "unable to install"... And anyway, the oldest version available on apkmirror is not as old as the databases we're talking about (which are from June-July 2014).
6. Finally, I noticed that part of the Whatsapp-extractor's procedure is to revert to an older version (2.11.431) and back, so I tried interrupting the process before it sets the new version back. To no avail.
Can anyone come up with a workaround? Those messages are quite precious diaries of those days. My phone is an Experia Z (Model D5503, Android 5.1.1), but it has been stuck in a BootLoop since a very long time. I finally found the time and energy to sit down and see if I can learn how to get the most valuable information out of it after all, and after many, many hours and lots of patience and steady-handedness (the rebooting seems to occur with movement), I decrypted the database from the phone itself. Now I really cannot accept defeat in front of an even older treasure
Oh and post-edit: The databases from 2014 are crypt7. The ones that I DID extract succesfully are crypt12.
Best,
Publo

Categories

Resources