RGH e64 when drive is pluged in

daftdog198

Senior Member
Oct 8, 2011
140
0
doncaster
Hi.
Whoever you got the console from must have tried to flash the drive and messed it up.
As its an rgh you can get the osig and the dvd key so you just need to reflash the drive with working firmware
 

bsmiley

VIP Member
Dec 22, 2005
156
0
Mansfield - Nottinghamshire
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

JungleFlasher 0.1.92 Beta (304)

Session Started Mon Mar 19 23:35:40 2012



This is a 32 bit process running on 2 x 32 bit CPUs

X360USB PRO detected, Version 0.18



Found 1 I/O Ports.

Found 1 Com Ports.

Found 1 windows drives C:

Found 0 CD/DVD drives



Drive is Slim Lite-On..





0000: 05 80 00 32 5B 00 00 00 - 50 4C 44 53 20 20 20 20 ...2[...PLDS

0010: 44 47 2D 31 36 44 34 53 - 20 20 20 20 20 20 20 20 DG-16D4S

0020: 30 34 30 31 00 00 00 00 - 00 00 00 00 00 00 00 00 0401............

0030: 00 00 00 00 41 30 41 30 - 00 00 00 00 00 00 00 00 ....A0A0........

0040: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

0050: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

0060: 44 37 31 36 42 42 31 31 - 37 36 30 32 30 30 33 50 D716BB117602003P

0070: 58 20 20 20 X



Sending Vendor Intro to port 0x0000

Status 0x51

Re-sending Vendor Intro:

..........

Serial flash found with Status 0x72



Sending Device ID request to port 0x0000

Manufacturer ID: 0xEF

Device ID: 0x11

Flash Name: Winbond/NEX(W25P20/NX25P20)

Flash Size: 262144 bytes

............

Key: 7073A8F68BEB145588696C83B261CCA9 is verified, Thanks C4eva



Grabbing Key sector: ................

Key Sector verified.

Grabbing Serial info: ........



Drive is Slim Lite-On..

0000: 05 80 00 32 5B 00 00 00 - 50 4C 44 53 20 20 20 20 ...2[...PLDS

0010: 44 47 2D 31 36 44 34 53 - 20 20 20 20 20 20 20 20 DG-16D4S

0020: 30 34 30 31 00 00 00 00 - 00 00 00 00 00 00 00 00 0401............

0030: 00 00 00 00 41 30 41 30 - 00 00 00 00 00 00 00 00 ....A0A0........

0040: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

0050: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

0060: 44 37 31 36 42 42 31 31 - 37 36 30 32 30 30 33 50 D716BB117602003P

0070: 58 20 20 20 X



0000: C0 85 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

0010: 00 00 00 00 37 44 36 31 - 42 42 31 31 36 37 32 30 ....7D61BB116720

0020: 30 30 50 33 20 58 20 20 - 00 00 00 00 00 00 34 30 00P3 X ......40

0030: 31 30 20 20 20 20 4C 50 - 53 44 20 20 20 20 47 44 10 LPSD GD

0040: 31 2D 44 36 53 34 20 20 - 20 20 20 20 20 20 00 00 1-D6S4 ..

0050: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

0060: 00 00 00 0F 00 40 00 04 - 00 02 06 00 00 00 00 00 [email protected]

0070: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

0080: 03 00 78 00 78 00 78 00 - 78 00 00 00 00 00 00 00 ..x.x.x.x.......

0090: 00 00 F8 00 10 02 00 00 - 02 02 00 00 60 00 40 00 ............`[email protected]

00A0: F8 00 10 02 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

00B0: 3F 20 00 00 ? ..



0000: 44 37 31 36 42 42 31 31 - 37 36 30 32 30 30 33 50 D716BB117602003P

0010: 58 20 20 20 FF FF FF FF - 31 44 31 31 30 33 35 38 X ....1D110358

0020: 31 36 30 34 35 58 58 52 - 41 30 FF FF 53 35 50 31 16045XXRA0..S5P1

0030: 34 32 31 30 30 30 30 30 - 30 32 33 39 39 33 00 00 42100000023993..

0040: 00 00 00 00 00 00 00 00 - 00 00 00 00 41 30 FF FF ............A0..



Hashing Drive: ................



Dummy.bin file saved to Dummy.bin

Loading firmware from buffer

Inquiry string found

Identify string found

Drive key @ 0xA030 7073A8F68BEB145588696C83B261CCA9

Firmware Osig: [PLDS DG-16D4S 0401]

Firmware is: SlimKey Extract

Key added to database



Auto-Loading firmware file C:\JungleFlasher v0.1.92 Beta (304)\firmware\LTPlus-0401-v3.0.bin

MD5 hash: 87fba52607d01d3c73722f9f818588c9

Genuine LT plus v3.0

Drive key @ n/a FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF

Firmware Osig: [PLDS DG-16D4S 0401]

Firmware is: LT-Plus 3.0

Spoofing Target

DVD Key copied to target

Key Sector copied from Source to Target

Target is LT - ID strings not copied to Target



Drive is Slim Lite-On..



Key found in KeyDB at record (11 - simon asda)

Key is: 7073A8F68BEB145588696C83B261CCA9

Key has been tested and verified, thanks C4eva !

Sending Vendor Intro to port 0x0000

Status 0x51

Re-sending Vendor Intro:

.

Serial flash found with Status 0x72



Sending Device ID request to port 0x0000

Spi Status: 0x8C

Manufacturer ID: 0xEF

Device ID: 0x11

Flash Name: Winbond/NEX(W25P20/NX25P20)

Flash Size: 262144 bytes



Sending Spi UnLock request to Port 0x0000

......................................................................

Spi Status: 0x00



Getting Status from port 0x0000

Serial flash found with Status 0x72

Reading Drive Key.

............

Authorised !

Grabbing sector 0x3E000.

................

Blank 3E000 sector detected!

Known f/w confirmed !

Sending Vendor Intro to port 0x0000

Status 0x51

Re-sending Vendor Intro:

........

Serial flash found with Status 0x72



Sending Device ID request to port 0x0000

Manufacturer ID: 0xEF

Device ID: 0x11

Flash Name: Winbond/NEX(W25P20/NX25P20)

Flash Size: 262144 bytes



Updating flash for on-line dump.



Sending Sector Erase to Port 0x0000

Erasing: 0x3E000

Writing: 0x3E000

............

Reading Bank 0: ................

Reading Bank 1: ................

Reading Bank 2: ................

Reading Bank 3: ................

Dumped in 4703mS



Restoring sector 0x3E000.



Sending Sector Erase to Port 0x0000

Erasing: 0x3E000

Writing: 0x3E000

............

Authorised !

................

Restore 0x3E000 verified !



Lite-On Dump file saved to Lite-OFW.bin

Loading firmware from buffer

Drive key @ n/a 7073A8F68BEB145588696C83B261CCA9

Firmware Osig: [PLDS DG-16D4S 0401]

Firmware is: Stock

Key database updated



Auto-Loading firmware file C:\JungleFlasher v0.1.92 Beta (304)\firmware\LTPlus-0401-v3.0.bin

MD5 hash: 87fba52607d01d3c73722f9f818588c9

Genuine LT plus v3.0

Drive key @ n/a FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF

Firmware Osig: [PLDS DG-16D4S 0401]

Firmware is: LT-Plus 3.0

Spoofing Target

DVD Key copied to target

Key Sector copied from Source to Target

Target is LT - ID strings not copied to Target



Drive is Slim Lite-On..



Key found in KeyDB at record (11 - simon asda)

Key is: 7073A8F68BEB145588696C83B261CCA9

Key has been tested and verified, thanks C4eva !

Sending Vendor Intro to port 0x0000

Status 0x51

Re-sending Vendor Intro:

.......

Serial flash found with Status 0x72



Sending Device ID request to port 0x0000

Spi Status: 0x00

Manufacturer ID: 0xEF

Device ID: 0x11

Flash Name: Winbond/NEX(W25P20/NX25P20)

Flash Size: 262144 bytes



Getting Status from port 0x0000

SPi flash found with Status 0x72



Sending Chip Erase to Port 0x0000

Erasing:

Writing target buffer to flash

Writing Bank 0: ................

Writing Bank 1: ................

Writing Bank 2: ................

Writing Bank 3: ................

............

Flash Verification Test !

Reading Bank 0: ................

Reading Bank 1: ................

Reading Bank 2: ................

Reading Bank 3: ................

Dumped in 4938mS



Write verified OK !



Restoring sector 0x3E000.



Sending Sector Erase to Port 0x0000

Erasing: 0x3E000

Writing: 0x3E000

............

Authorised !

................

Restore verified OK !

Drive is Slim Lite-On..



Key found in KeyDB at record (11 - simon asda)

Key is: 7073A8F68BEB145588696C83B261CCA9

Key has been tested and verified, thanks C4eva !

Sending Vendor Intro to port 0x0000

Status 0x51

Re-sending Vendor Intro:

.........

Serial flash found with Status 0x72



Sending Device ID request to port 0x0000

Spi Status: 0x00

Manufacturer ID: 0xEF

Device ID: 0x11

Flash Name: Winbond/NEX(W25P20/NX25P20)

Flash Size: 262144 bytes



Sending Spi Lock request to Port 0x0000

Spi Status: 0x8C

Sending Vendor Outro to port 0x0000

Drive is Slim Lite-On..



Key found in KeyDB at record (11 - simon asda)

Key is: 7073A8F68BEB145588696C83B261CCA9

Key has been tested and verified, thanks C4eva !

XECUTER X360USB PRO removed.

---------- Post added at 23:50 ---------- Previous post was at 23:49 ----------

*******************************************
*******************************************
Console Type: Trinity

Cpu Key: 80F02366***************D6B8ED7198E

KV Type: 2

MFR Date: 06-28-11

Console ID: A66B8FA830

Serial: 082856612709

Region: 02FE | PAL/EU

Osig: PLDS DG-16D4S 0401

DVD Key: 7073A8F68BEB145588696C83B261CCA9

*******************************************
*******************************************

---------- Post added at 23:50 ---------- Previous post was at 23:50 ----------

i have just flashed this with the lt 3.0 and still the same no had open the drive up as i just did it all
 

BL4K3Y

VIP Member
Jul 7, 2010
13,721
118
Colne, Lancashire (UK)
The following was taken from XBOX Scene:
E64: DVD Drive Error - Dvd drive timed out during reset :Wrong firmware, dvd is without f/w chip, etc. This can also be caused by the tray not being fully closed on boot. also it could mean that the Kernel can't be launched/signature in NAND Flash chip is broken It could be possible after bad update. This might also be caused by a bad SATA cable.
Have you tried another SATA cable as stated in the above description?