Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- JungleFlasher 0.1.96 Beta (323)
- Session Started Sat Dec 07 21:11:44 2013
- This is a 32 bit process running on a 32 bit CPU
- X360USB PRO detected, Version 0.18
- Found 1 I/O Ports.
- Found 2 Com Ports.
- Found 3 windows drives C: D: E:
- Found 1 CD/DVD drives E:
- Drive is Slim Lite-On..
- Drive is Slim Lite-On..
- 0000: 05 80 00 32 5B 00 00 00 - 50 4C 44 53 20 20 20 20 ...2[...PLDS
- 0010: 44 47 2D 31 36 44 34 53 - 20 20 20 20 20 20 20 20 DG-16D4S
- 0020: 30 32 32 35 00 00 00 00 - 00 00 00 00 00 00 00 00 0225............
- 0030: 00 00 00 00 41 30 41 30 - 00 00 00 00 00 00 00 00 ....A0A0........
- 0040: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
- 0050: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
- 0060: 44 37 31 34 43 47 30 34 - 30 39 30 31 30 30 31 46 D714CG040901001F
- 0070: 58 20 20 20 X
- Sending Password to Drive on port 0x0000
- Drive is Slim Lite-On..
- Drive is Slim Lite-On..
- 0000: 05 80 00 32 5B 00 00 00 - 50 4C 44 53 20 20 20 20 ...2[...PLDS
- 0010: 44 47 2D 31 36 44 34 53 - 20 20 20 20 20 20 20 20 DG-16D4S
- 0020: 30 32 32 35 00 00 00 00 - 00 00 00 00 00 00 00 00 0225............
- 0030: 00 00 00 00 41 30 41 30 - 00 00 00 00 00 00 00 00 ....A0A0........
- 0040: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
- 0050: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
- 0060: 44 37 31 34 43 47 30 34 - 30 39 30 31 30 30 31 46 D714CG040901001F
- 0070: 58 20 20 20 X
- 0000: C0 85 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
- 0010: 00 00 00 00 37 44 34 31 - 47 43 34 30 39 30 31 30 ....7D41GC409010
- 0020: 30 30 46 31 20 58 20 20 - 00 00 00 00 00 00 32 30 00F1 X ......20
- 0030: 35 32 20 20 20 20 4C 50 - 53 44 20 20 20 20 47 44 52 LPSD GD
- 0040: 31 2D 44 36 53 34 20 20 - 20 20 20 20 20 20 00 00 1-D6S4 ..
- 0050: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
- 0060: 00 00 00 0F 00 40 00 04 - 00 02 06 00 00 00 00 00 .....@..........
- 0070: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
- 0080: 03 00 78 00 78 00 78 00 - 78 00 00 00 00 00 00 00 ..x.x.x.x.......
- 0090: 00 00 F8 00 10 02 00 00 - 02 02 00 00 60 00 00 00 ............`...
- 00A0: F8 00 10 02 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
- 00B0: 3F 20 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ? ..............
- 00C0: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
- 00D0: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
- 00E0: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
- 00F0: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
- 0100: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
- 0110: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
- 0120: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
- 0130: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
- 0140: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
- 0150: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
- 0160: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
- 0170: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
- 0180: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
- 0190: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
- 01A0: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
- 01B0: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
- 01C0: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
- 01D0: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
- 01E0: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
- 01F0: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
- Sending Vendor Intro to port 0x0000
- Status 0x51
- Re-sending Vendor Intro:
- ........
- Serial flash found with Status 0x72
- Sending Device ID request to port 0x0000
- Manufacturer ID: 0xEF
- Device ID: 0x11
- Flash Name: Winbond/NEX(W25P20/NX25P20)
- Flash Size: 262144 bytes
- ............
- Key: 4ED247B1ADBEF30B09C8DC203CE882A9 is verified, Thanks C4eva
- Grabbing Key sector: ................
- Key Sector verified.
- Grabbing Serial info: ........
- Drive is Slim Lite-On..
- Key data saved to C:\Documents and Settings\J\Desktop\JungleFlasher.0.1.94.Beta(320)\firmware\Original\Dummy_(Slim)_109563404308.bin
- 0000: 05 80 00 32 5B 00 00 00 - 50 4C 44 53 20 20 20 20 ...2[...PLDS
- 0010: 44 47 2D 31 36 44 34 53 - 20 20 20 20 20 20 20 20 DG-16D4S
- 0020: 30 32 32 35 00 00 00 00 - 00 00 00 00 00 00 00 00 0225............
- 0030: 00 00 00 00 41 30 41 30 - 00 00 00 00 00 00 00 00 ....A0A0........
- 0040: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
- 0050: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
- 0060: 44 37 31 34 43 47 30 34 - 30 39 30 31 30 30 31 46 D714CG040901001F
- 0070: 58 20 20 20 X
- Inquiry String saved to C:\Documents and Settings\J\Desktop\JungleFlasher.0.1.94.Beta(320)\firmware\Original\Inquiry_(Slim)_109563404308.bin
- 0000: C0 85 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
- 0010: 00 00 00 00 37 44 34 31 - 47 43 34 30 39 30 31 30 ....7D41GC409010
- 0020: 30 30 46 31 20 58 20 20 - 00 00 00 00 00 00 32 30 00F1 X ......20
- 0030: 35 32 20 20 20 20 4C 50 - 53 44 20 20 20 20 47 44 52 LPSD GD
- 0040: 31 2D 44 36 53 34 20 20 - 20 20 20 20 20 20 00 00 1-D6S4 ..
- 0050: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
- 0060: 00 00 00 0F 00 40 00 04 - 00 02 06 00 00 00 00 00 .....@..........
- 0070: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
- 0080: 03 00 78 00 78 00 78 00 - 78 00 00 00 00 00 00 00 ..x.x.x.x.......
- 0090: 00 00 F8 00 10 02 00 00 - 02 02 00 00 60 00 40 00 ............`.@.
- 00A0: F8 00 10 02 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
- 00B0: 3F 20 00 00 ? ..
- Identify String saved to C:\Documents and Settings\J\Desktop\JungleFlasher.0.1.94.Beta(320)\firmware\Original\Identify_(Slim)_109563404308.bin
- 0000: 44 37 31 34 43 47 30 34 - 30 39 30 31 30 30 31 46 D714CG040901001F
- 0010: 58 20 20 20 FF FF FF FF - 30 49 30 39 31 38 36 34 X ....0I091864
- 0020: 31 36 39 32 31 35 58 58 - 41 30 FF FF 53 34 50 30 169215XXA0..S4P0
- 0030: 39 32 37 30 30 30 30 30 - 31 32 39 37 30 33 00 00 92700000129703..
- 0040: 00 00 00 00 00 00 00 00 - 00 00 00 00 41 30 FF FF ............A0..
- Serial String saved to C:\Documents and Settings\J\Desktop\JungleFlasher.0.1.94.Beta(320)\firmware\Original\Serial_(Slim)_109563404308.bin
- Hashing Drive: ................
- Dummy.bin file saved to Dummy_(Slim)_109563404308.bin
- Loading firmware from buffer
- Inquiry string found
- Identify string found
- Drive key @ 0xA030 4ED247B1ADBEF30B09C8DC203CE882A9
- Firmware Osig: [PLDS DG-16D4S 0225]
- Firmware is: SlimKey Extract
- Key added to database
- Auto-Loading firmware file C:\Documents and Settings\J\Desktop\JungleFlasher.0.1.94.Beta(320)\firmware\LTPlus-0225-v3.0.bin
- MD5 hash: 1a38d3a2a6519339599fa1866642c513
- Genuine LT plus v3.0
- Drive key @ n/a FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
- Firmware Osig: [PLDS DG-16D4S 0225]
- Firmware is: LT-Plus 3.0
- Spoofing Target
- DVD Key copied to target
- Key Sector copied from Source to Target
- Target is LT - ID strings not copied to Target
- Sending Vendor Intro to port 0x0000
- Status 0x80
- Re-sending Vendor Intro:
- ....
- Serial flash found with Status 0x72
- Sending Device ID request to port 0x0000
- Spi Status: 0x00
- Manufacturer ID: 0xEF
- Device ID: 0x11
- Flash Name: Winbond/NEX(W25P20/NX25P20)
- Flash Size: 262144 bytes
- Getting Status from port 0x0000
- SPi flash found with Status 0x72
- Sending Chip Erase to Port 0x0000
- Erasing:
- Writing target buffer to flash
- Writing Bank 0: ................
- Writing Bank 1: ................
- Writing Bank 2: ................
- Writing Bank 3: ................
- Flash Verification Test !
- Reading Bank 0: ................
- Reading Bank 1: ................
- Reading Bank 2: ................
- Reading Bank 3: ................
- Write verified OK !
- Sending Spi Lock request to Port 0x0000
- Spi Status: 0x8C
- Sending Spi UnLock request to Port 0x0000
- .....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
- Sending Spi UnLock request to Port 0x0000
- .....................................
- Aborted by User!
- .......................................................................
- Sending Spi UnLock request to Port 0x0000
- .......
- Aborted by User!
- Sending Vendor Outro to port 0x0000
- Sending Vendor Outro to port 0x0000
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- JungleFlasher 0.1.96 Beta (323)
- Session Started Sun Dec 08 11:19:35 2013
- This is a 32 bit process running on a 32 bit CPU
- X360USB PRO detected, Version 0.18
- Found 1 I/O Ports.
- Found 2 Com Ports.
- Found 2 windows drives C: E:
- Found 1 CD/DVD drives E:
- Loading firmware file C:\Documents and Settings\J\Desktop\JungleFlasher.0.1.94.Beta(320)\firmware\Original\Dummy_(Slim)_109563404308.bin
- MD5 hash: fc6c6809da281e35be648d0de259f931
- Inquiry string found
- Identify string found
- Drive key @ 0xA030 4ED247B1ADBEF30B09C8DC203CE882A9
- Firmware Osig: [PLDS DG-16D4S 0225]
- Firmware is: SlimKey Extract
- Sending Vendor Intro to port 0x0000
- Status 0x80
- Re-sending Vendor Intro:
- .......
- Serial flash found with Status 0x72
- Sending Device ID request to port 0x0000
- Spi Status: 0x8C
- Manufacturer ID: 0xEF
- Device ID: 0x11
- Flash Name: Winbond/NEX(W25P20/NX25P20)
- Flash Size: 262144 bytes
- Sending Vendor Outro to port 0x0000
- Sending Vendor Outro to port 0x0000
- Sending Vendor Outro to port 0x0000
- Sending Vendor Intro to port 0x0000
- Status 0x80
- Re-sending Vendor Intro:
- ......
- Serial flash found with Status 0x72
- Sending Device ID request to port 0x0000
- Spi Status: 0x8C
- Manufacturer ID: 0xEF
- Device ID: 0x11
- Flash Name: Winbond/NEX(W25P20/NX25P20)
- Flash Size: 262144 bytes
- Loading firmware file C:\Documents and Settings\J\Desktop\JungleFlasher.0.1.94.Beta(320)\firmware\Original\Dummy_(Slim)_109563404308.bin
- MD5 hash: fc6c6809da281e35be648d0de259f931
- Inquiry string found
- Identify string found
- Drive key @ 0xA030 4ED247B1ADBEF30B09C8DC203CE882A9
- Firmware Osig: [PLDS DG-16D4S 0225]
- Firmware is: SlimKey Extract
- Auto-Loading firmware file C:\Documents and Settings\J\Desktop\JungleFlasher.0.1.94.Beta(320)\firmware\LTPlus-0225-v3.0.bin
- MD5 hash: 1a38d3a2a6519339599fa1866642c513
- Genuine LT plus v3.0
- Drive key @ n/a FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
- Firmware Osig: [PLDS DG-16D4S 0225]
- Firmware is: LT-Plus 3.0
- Spoofing Target
- DVD Key copied to target
- Key Sector copied from Source to Target
- Target is LT - ID strings not copied to Target
- Getting Status from port 0x0000
- SPi flash found with Status 0x72
- Spi is locked, Aborting!
- Getting Status from port 0x0000
- SPi flash found with Status 0x72
- Spi is locked, Aborting!
- Getting Status from port 0x0000
- Serial flash found with Status 0x72
- Reading Bank 0: ................
- Reading Bank 1: ................
- Reading Bank 2: ................
- Reading Bank 3: ................
- Dumped in 9423mS
- Loading firmware from buffer
- Drive key @ n/a 4ED247B1ADBEF30B09C8DC203CE882A9
- Firmware Osig: [PLDS DG-16D4S 0225]
- Firmware is: LT-Plus 3.0
- Key database updated
- Auto-Loading firmware file C:\Documents and Settings\J\Desktop\JungleFlasher.0.1.94.Beta(320)\firmware\LTPlus-0225-v3.0.bin
- MD5 hash: 1a38d3a2a6519339599fa1866642c513
- Genuine LT plus v3.0
- Drive key @ n/a FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
- Firmware Osig: [PLDS DG-16D4S 0225]
- Firmware is: LT-Plus 3.0
- Spoofing Target
- DVD Key copied to target
- Key Sector copied from Source to Target
- Target is LT - ID strings not copied to Target
- Loading MTK_Flash source file
- Loading firmware file C:\Documents and Settings\J\Desktop\JungleFlasher.0.1.94.Beta(320)\firmware\Original\Dummy_(Slim)_109563404308.bin
- MD5 hash: fc6c6809da281e35be648d0de259f931
- Inquiry string found
- Identify string found
- Drive key @ 0xA030 4ED247B1ADBEF30B09C8DC203CE882A9
- Firmware Osig: [PLDS DG-16D4S 0225]
- Firmware is: SlimKey Extract
- Auto-Loading firmware file C:\Documents and Settings\J\Desktop\JungleFlasher.0.1.94.Beta(320)\firmware\LTPlus-0225-v3.0.bin
- MD5 hash: 1a38d3a2a6519339599fa1866642c513
- Genuine LT plus v3.0
- Drive key @ n/a FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
- Firmware Osig: [PLDS DG-16D4S 0225]
- Firmware is: LT-Plus 3.0
- Spoofing Target
- DVD Key copied to target
- Key Sector copied from Source to Target
- Target is LT - ID strings not copied to Target
- Getting Status from port 0x0000
- SPi flash found with Status 0x72
- Spi is locked, Aborting!
- Sending Vendor Intro to port 0x0000
- Serial flash found with Status 0x72
- Sending Device ID request to port 0x0000
- Spi Status: 0x8C
- Manufacturer ID: 0xEF
- Device ID: 0x11
- Flash Name: Winbond/NEX(W25P20/NX25P20)
- Flash Size: 262144 bytes
- Sending Vendor Outro to port 0x0000
- Sending Vendor Outro to port 0x0000
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement