I am hoping to learn if I am having a unique or shared problem with downloading e4gtauto.zip file using the link provided in http://forum.xda-developers.com/showthread.php?t=1342728
The download appears to reach 100% but then fails with a dialog box showing
"e4gtauto.zip.part could not be saved, because the source file could not be read.
Try again later, or contact the server administrator."
From the PC I have used Firefox, Chrome, and IE, and from the phone the stock internet browers, and Firefox to attempt the download. And with each browser on both the PC & phone I recieve a variation of the failure message.
Respectfully,
KungFuDad
Finally figured this out.... To users of ESET Smart Security, the solution is to use a VM (virtual machine) that ESET does not have access to or use the temporay disable protection option and the files will download without issue.
ESET is reporting the following: ....e4gtauto.zip » ZIP » e4gtauto/copy2tmp/zergrush - Linux/Exploit.Lotoor.AN trojan
Since we are knowinly using the exploit to root the phone this is not an issue.... *palm slaps self on the forehead*
I added a note to the Auto Root download section about zergrush and anti-virus scanners so hopefully it would be less effort to figure out the issue in the future.
Thank you very much sfhub; also I found that ESET Security Suite in addition to stopping download from completing, it would prevent the scripts from properly installing to the phone & successfully rooting. As soon as I temporarily disabled antivirus / spyware functions the scripts ran perfectly. My phone is now rooted, and I deeply appreciate the work you have done.
Related
Now, I know no-one actually likes reading threads, and would prefer to just post a new question at the end (I'm guessing partly because the threads are so long, but that's because everyone is doing it) so I'm going to try and give solutions to as many of the issues with ChevronWP7, sideloading and anything else that's not quite working.
Note, none of this is to facilitate any kind of software pirating (we will notice if it gets discussed, and it's in the forum rules - and kinda immoral).
Firstly, Windows Vista (I think SP2) or Windows 7 is required, this won't work on XP without a few hacks/tweaks, and it's not worth me writing the whole process out, plus I don't have an XP machine to hand, so I can't try things.
The most common issues can be fixed with just installing the correct software.
You NEED to have the official WP7 Developer Tools installed, they're a free download from Microsoft, and if you're planning on doing development (which is after all part of the reason for wanting sideloading) you kind of need them.
There's a guide on how to install them (provided by Microsoft) here. You only need the basic toolset from here, but installing the October update won't cause any issues.
This should solve the following exception:
Code:
System.IO.FileNotFoundException: Could not load file or assembly 'Microsoft.SmartDevice.Connectivity, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a' or one of its dependencies. The system cannot find the file specified.
as well as a few other issues.
When running any of the tools, if you encounter issues, try either running the tool as an administrator or turn of UAC (for both, do a search if you've no idea what I'm on about), this may solve some issues with access rights etc.
Once you've got that installed, Chevron issues are in post #2, sideloading XAPs in #3.
ChevronWP7 Issues
With Chevron, most things are explained well in the opening post of this thread. Read it.
Chevron works by tricking your phone into thinking it's communicating with Microsoft servers, when it's actually just communicating with Chevron, this means certain web based activities may interfere (Skype for example).
The best way of finding out what's going on, is to use the following guide, it should work, if that fails, then post a question.
sushovande said:
Okay so here is *everything* I did to succeed in re-unlocking my Samsung Focus
1. Have Winphone developer tools installed
2. Connect Phone via USB
3. Wait till zune starts and sync completes
4. Verify that zune is not in a guest relationship
5. open a command prompt, type netstat -a to confirm that port 443 is not being used
6. open an admin command prompt, navigate to c:\windows\system32\drivers\etc\ then type notepad hosts and delete any references to windowsphone developer services
7. go to the settings on the phone and turn airplane mode on (so that the phone is forced to use internet via zune)
8. While the phone is still on the settings page, run Chevron with admin privileges
And it worked!
Click to expand...
Click to collapse
There's no way to know whether a device is unlocked or not until you come to sideloading, which is the point where it matters anyway. Nothing (visible) will change on the device, so don't bother looking for any changes.
WP7 devices occasionally phone home (as far as I know they only do so when connected with Zune) to check whether they should be unlocked or not. If not, they quietly re-lock themselves, and non-marketplace apps will say something along the lines of "This application has been revoked". You'll need to try unlocking again with Chevron and possibly reinstall the apps. There's not much that can be done other than legitimately unlocking your devices.
There's a sideload limit of 10 applications, though there's a version of Chevron that has this limit hacked out of it, I just can't remember where it is. For most legitimate uses, this limit should be fine (and is better than the student/DreamSpark limit of 3).
XAP Installation
A first port of call if Toms XAP Installer doesn't work is to use the official one. It does work.
If you've installed the Developer Tools linked to in the first post, you'll have it already, and should be able to sideload, if your device has been unlocked. If it hasn't you'll have issues, and you should take a look at post #2 in this thread.
Hello,
i have made a Firmware Downloader that had the availability to download all Samsung Mobile Fimrwares, but since march this year samsung changed the server, and is using a new system for getting the data. However this tool could help someone who maybe find the new way to download firmwares, it has already access to the old server, only the firmwares are all transfered to the neofus server.
It could help someone, maybe, because i am not allowed to do anything here, cause i am new, i will try to support the new developers.
It is developed in C# .net 4 and you will need kies installed, or the fuscryptlib registered, found in the kies folder or in the app folder.
regsvr32 %Path%/fuscrypt.dll
Should i explain that this downloader had the availability to download also android fw and so on? maybe there is someone who can made it.
It was before march the ultimate tool to get every fw from the server. I tried at my own to make a new one, the my developer mentor tried it, we failed due to lack of time.
Just downloaded the "Slyfer300" app. The UI is superb. Just a pity Samsung has changed the server to their firmwares and we cannot use this tool for now. Let's hope and pray someone comes up and lend a hand to complete this wonderful app. So that we can easily download and flash firmwares manually without the need for kies.
I included a screenshot of this superb app below for the eyes only (until it becomes a fully functional app)
The App worked a half year, samsung changed the servers since March 2011, i was before here @badanation.de and developed it in the past. The app was secret and we offered for everyone free Firmwares of their desire, the only rule was only for badanation members.
I puplished it, cause maybe someone here @xda could make it work with the new server that was a cool time when you start the app and you can download any firmware you want.
The old system was based on a PL/SQL query over PHP, i have found a bug in the system and could request the whole Database from the Firmwares, you can see in advanced mode what was possible.
Also user names and their ... was visible, but i newer wonted to damage samsung i always wanted to help other users with the firmware problems we all have.
The new System is a little bit tricky signatures and so on no more php
As i know here was some nice developers @xda that could maybe improve it. Let us see what the feature brings to us.
Hi, nice tool. Unfortunately it's not working with the new servers. I have made a tool that can download the latest firmware from samsungs new servers, but it still requires an old firmware as input. I have not found any way to browse all firmwares like you could on the old server. A lot have chenged in the way you request firmwares and it unfortunately no possible to reuse this tool on the new server.
Yes, it was not simple to find out the right PL/SQL commands for oracle, it was more a doing by trying thing. But as i saw it on keys the listening method still exists on new server, it is the same database, only with a new system. I have done some Kies 2 researches but than give up, cause of lack of time. I had a tool that can download with the new request system.
Only what you need is to pass through the right PL/SQL command, in Kies you find an CarrierTestMode and ServiceCenterMode, one of this two can listen the whole Phonebinary databases, the code is to huge, i havent done a lot since the half year slyfer worked.
Its in a case simply only need to find out the right command, also what is neccessary to find a security whole on new server, on the old server, it was prohibited to execute SQL statements except of predefined calls, but i found a way as you see, it was more an oracle bug, how you can get anyway in and become the whole database information with dictionary commands out, it was at least so easy to get everything out of there. Then i have done some facelifting and made for me an advanced mode to be prepared of changes, but at the near end it doesnt worked any more.
I think you can get in like kies withouth authentification, as before, cause there is no username or password needet if the table is accessable by everyone, its like free to air.
If you need some tips, how i have found out the way in, i can help you. i dont know how to encrypt the new way, but i know that the answer is in the FusCipherUtil.dll it hink it is named so, dont know it exactle, kies is like an open book as you also seems to know.
Forgotten one thing, if you try to send SQL command that listen whole database, then you will get in timeout, cause oracle needs time to collect all the data, i had problems to recieve simple sized calls from it, so you must limit them that you can recieve the data in time everything over an minuete dont works as i remember.
1250 rows around was for my requests the maximum, everything above, througn a server timeout.
larioteo said:
Forgotten one thing, if you try to send SQL command that listen whole database, then you will get in timeout, cause oracle needs time to collect all the data, i had problems to recieve simple sized calls from it, so you must limit them that you can recieve the data in time everything over an minuete dont works as i remember.
1250 rows around was for my requests the maximum, everything above, througn a server timeout.
Click to expand...
Click to collapse
Your program its more power full then CheckFus.
Advanced mode verry great. Verry frustrated, cant use it for now.
hello larioteo are u still working on the new Kies app ?
This morning after a file update my Kaspersky AVG reported and deleted 7 files as containing...
backdoor.androidos.ginmaster.a
...one of which was system/app/settings.apk - I restored this file and data from a Ti backup (full scan in progress at time of writing)
others were zip files from my external SD card including
Lite ROM 0.9
and a few blob files from my CWMR backup directory.
As I haven't installed anything since the previous clean scan except from google app store and have not browsed any 'risky' sites I was wondering if anyone else had had similar reports that they consider to be 'false positives'.
New scan identified the restored file and deleted it again. !
Do I need this file ?
Where can I get a clean copy ?
I would welcome advice as to....are any other steps I should take such as changing account passwords etc.
Happened to me too!
Actually I had the same warning few days back, as Kaspersky warned me of the same virus that the game I play a lot Pocket Frogs has it, I had this game for a very long time now and I wondered what it could be the cause, deleted and reinstalled several times the same problem, until I gave skip. I wrote to mobage (game dev.) and even posted on google playstore, but it seems and I hope, it does not harm the device, not sure, did not receive any explanation from anywhere so far as what causes it or if it is true!
Only I have one cocern as the mobage sign that appears in the game windows lower left corner, is ever presently very faintly on my phone everywhre, meaning the homescreen or any programs we open as such?
Really confused.
requiem_mortis said:
This morning after a file update my Kaspersky AVG reported and deleted 7 files as containing...
backdoor.androidos.ginmaster.a
...one of which was system/app/settings.apk - I restored this file and data from a Ti backup (full scan in progress at time of writing)
others were zip files from my external SD card including
Lite ROM 0.9
and a few blob files from my CWMR backup directory.
As I haven't installed anything since the previous clean scan except from google app store and have not browsed any 'risky' sites I was wondering if anyone else had had similar reports that they consider to be 'false positives'.
New scan identified the restored file and deleted it again. !
Do I need this file ?
Where can I get a clean copy ?
I would welcome advice as to....are any other steps I should take such as changing account passwords etc.
Click to expand...
Click to collapse
Trojan on Android
avadis99 said:
Actually I had the same warning few days back, as Kaspersky warned me of the same virus that the game I play a lot Pocket Frogs has it, I had this game for a very long time now and I wondered what it could be the cause, deleted and reinstalled several times the same problem, until I gave skip. I wrote to mobage (game dev.) and even posted on google playstore, but it seems and I hope, it does not harm the device, not sure, did not receive any explanation from anywhere so far as what causes it or if it is true!
Only I have one cocern as the mobage sign that appears in the game windows lower left corner, is ever presently very faintly on my phone everywhre, meaning the homescreen or any programs we open as such?
Really confused.
Click to expand...
Click to collapse
Trojan:Android/GinMaster.A
Name : Trojan:Android/GinMaster.A
Detection Names : GinMaster
GinMaster.A
Category: Malware
Type: Trojan
Platform: Android
Summary
Trojan:Android/GinMaster.A steals confidential information from the device and sends it to a remote website.
Disinfection
Automatic
F-Secure's Mobile Security product blocks installation of this program with default settings.
Manual Removal
Monitoring-Tool:Android/GinMaster.A can be uninstalled by following the steps below:
Go to Settings
Go to Applications
Go to Manage Applications
Select the application
Press "Clear data"
Press "Uninstall"
Select "OK" when asked for confirmation and wait
Additional Details
Trojan:Android/GinMaster.A is a trojanized application which was first seen in the Android Market for (mainland) China by researchers from North Carolina State University. The exploit source code has been publicly available since April 2011.
It is the first malicious software to utilize a rooting exploit that targets Android 2.3.3 (Gingerbread) devices to escalate privileges on the system. Based on the author's own description of the exploit and examination of its binary, it may also work on Android 2.2 (Froyo) and 3.0 (Honeycomb) devices.
Trojan:Android/GinMaster.A's own description.
However, in the particular sample analyzed, the trojan will only run the exploit if the device version is not greater than 2.3.3 (up to Gingerbread version only).
Trojan:Android/GinMaster.A's use of the exploit may allow it to install additional applications to the device without the user's consent.
So you even find trojans in the Captivate? Lol
Sent from my HTC One X
thank u
I followed your advise I use in 4.1.2 version, the problem is that the shade of mobbage that ever present on my phone low left corner is still there? !?!? I do hope the virus is cleaned, and for that outline should I reset my phone to go away?
AJ2317 said:
Trojan:Android/GinMaster.A
Name : Trojan:Android/GinMaster.A
Detection Names : GinMaster
GinMaster.A
Category: Malware
Type: Trojan
Platform: Android
Summary
Trojan:Android/GinMaster.A steals confidential information from the device and sends it to a remote website.
Disinfection
Automatic
F-Secure's Mobile Security product blocks installation of this program with default settings.
Manual Removal
Monitoring-Tool:Android/GinMaster.A can be uninstalled by following the steps below:
Go to Settings
Go to Applications
Go to Manage Applications
Select the application
Press "Clear data"
Press "Uninstall"
Select "OK" when asked for confirmation and wait
Additional Details
Trojan:Android/GinMaster.A is a trojanized application which was first seen in the Android Market for (mainland) China by researchers from North Carolina State University. The exploit source code has been publicly available since April 2011.
It is the first malicious software to utilize a rooting exploit that targets Android 2.3.3 (Gingerbread) devices to escalate privileges on the system. Based on the author's own description of the exploit and examination of its binary, it may also work on Android 2.2 (Froyo) and 3.0 (Honeycomb) devices.
Trojan:Android/GinMaster.A's own description.
However, in the particular sample analyzed, the trojan will only run the exploit if the device version is not greater than 2.3.3 (up to Gingerbread version only).
Trojan:Android/GinMaster.A's use of the exploit may allow it to install additional applications to the device without the user's consent.
Click to expand...
Click to collapse
I've been looking into modding my Lumia 640 WP10, and it seems like most if not all of the apps involved require deploying with Windows Phone Power Tools. When I try to use it, it tells me the phone needs an update, and launches the Phone Tools Update Pack which always results in this message: "The update operation did not succeed. You can press Rescan to try reconnecting to the device. The exception code and error message is: 0x80004003 - Object reference not set to an instance of an object."
I have not been able to find any information about this particular error, and any assistance would be very helpful. I have already set the phone to developer mode and been able to deploy the root tool, but have been unable to do anything else without the power tools.
Same problem
I think the newest update is buggy. I was trying to do the same and keeps getting the same error. This might help you.
I'm not sure why the forum only emailed me for the first reply so I'm a bit late seeing yours, DaRealAce. I am not actually using an Insider build right now but thank you, that link did help. It's definitely not the same problem, but I was able to fix mine by using the Interop Tools app linked in that thread. Since that is an appx I was able to sideload it, making vcREG unnecessary. After going through the unlock settings in that app, I was able to deploy the AdBlocker app (my original goal) using the regular WP 8.1 Deployment Tool rather than WP Power Tools, which did not work previously.
Oddly though, somewhere in the process the phone no longer shows up on the PC as a mass storage device.
the same
Hello everybody!
I keep getting the itscythera. com malware on my phone and cannot remove it.
Surfing on internet,I was advised to install malwarebytes software and reset the chrome browser.I did both -malwarebytes did not detect it and reset the chrome did not resolve the problem so the itscythera malware is still on my phone.
Does anybody have any idea how I can remove it?
Thanks in advance,
Arye
P.S - bitdefender antivirus is installed on my phone and did not detect it,too.
Pretty much says the same here
Remove Itscythera.com pop-up ads (Virus Removal Guide)
This guide teaches you how to remove Itscythera.com pop-up ads for free by following easy step-by-step instructions.
malwaretips.com
Try clearing cache from recovery too
Look in your list of apps for anything suspicious and uninstall
Otherwise a factory reset
*Detection* said:
Pretty much says the same here
Remove Itscythera.com pop-up ads (Virus Removal Guide)
This guide teaches you how to remove Itscythera.com pop-up ads for free by following easy step-by-step instructions.
malwaretips.com
Try clearing cache from recovery too
Look in your list of apps for anything suspicious and uninstall
Otherwise a factory reset
Click to expand...
Click to collapse
I already read the article at the link attached.I will try to clear the recovery cache.
Thanks for your help.
If after reset you will not have result you must install again the rom of your phone.
miltos74 said:
If after reset you will not have result you must install again the rom of your phone.
Click to expand...
Click to collapse
Unlikely it's a rootkit that can survive a factory reset on Pie or above.
It may been in the OP's database which is a problem if it's undefined and it's location is unknown.
OP: it may be coming from a 3rd party app you installed. Try running in safe mode just for giggles. Review recently installed apps especially anything side loaded.
First dont use antivirus on android, first it's fake and it only detects package names and max urls, secondly don't install apks from random sites you don't know or allow notifications from websites which needs it to let you use their site.
DunoCZ said:
First dont use antivirus on android, first it's fake and it only detects package names and max urls, secondly don't install apks from random sites you don't know or allow notifications from websites which needs it to let you use their site.
Click to expand...
Click to collapse
Lol, you are what you install...
Back out of malicious sites, don't click any buttons on the site. Close browser page if necessary or even the browser. Wipe browser data if it locks up or behaves abnormally.
Never allow auto downloads or installs from browsers. Keep install from files disabled unless needed.
Check Download folder daily for anything that snuck by that you didn't download, it happens very rarely but occasionally.
Delete without opening.