I have now created a Python script to extract the needed files. If I find the time, I’ll enhance it and make it available for everyone. For the moment it’s just a hack, programmed in an hour and not nice enough for everyone
But anyway, the steps to get the files are the following (all can be found in the SQLite database):
- Find the file in the “File” table and get the corresponding BlocksetID
- In the table “BlocksetEntry”, find the BlocksetID and get the BlockIDs in the correct order (Index)
- In the table “Block” look for the BlockIDs from step two (in this table only ID) and save the Hash and VolumeID
- Now go to table “RemoteVolume” and go to the VolumeID from Step 4 (in this table only ID) and get the dblock filenames
Now you have all the information. Decrypt the necessary dblock zip files, get the blocks and concatenate them to get the original file.