This is how my come out
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
JungleFlasher 0.1.92 Beta (304)
Session Started Mon Jan 16 10:19:39 2012
This is a 32 bit process running on 2 x 32 bit CPUs
X360USB PRO detected, Version 0.18
Found 1 I/O Ports.
Found 0 Com Ports.
Found 3 windows drives C: D: F:
Found 2 CD/DVD drives D: F:
Loading firmware file C:\Users\ShoneSR\Desktop\MODS\XBOX SLIM 0225 OFW&KEY\Dummy.bin
MD5 hash: e7f2caf0c76fcb2c0c09b27d2e9e4a15
Inquiry string found
Identify string found
Drive key @ 0xA030 E302153607189B2CD22CD7E90E61E27E
Firmware Osig: [PLDS DG-16D4S 0225]
Firmware is: SlimKey Extract
Auto-Loading firmware file C:\Users\ShoneSR\Desktop\JungleFlasher.0.1.92.Beta(304)\JungleFlasher v0.1.92 Beta (304)\firmware\LTPlus-0225-v3.0.bin
MD5 hash: 1a38d3a2a6519339599fa1866642c513
Genuine LT plus v3.0
Drive key @ n/a FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
Firmware Osig: [PLDS DG-16D4S 0225]
Firmware is: LT-Plus 3.0
Spoofing Target
DVD Key copied to target
Key Sector copied from Source to Target
Target is LT - ID strings not copied to Target
Loading firmware file C:\Users\ShoneSR\Desktop\JungleFlasher.0.1.92.Beta(304)\JungleFlasher v0.1.92 Beta (304)\firmware\LTPlus-0225-v3.0u.bin
MD5 hash: db5c70eaaabb53501c2c4f53dce9abfd
Genuine LT plus v3.0 (9504 upgrade)
Drive key @ n/a FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
Firmware Osig: [PLDS DG-16D4S 0225]
Firmware is: LT-Plus 3.0
Spoofing Target
DVD Key copied to target
Key Sector copied from Source to Target
Target is LT - ID strings not copied to Target
Drive is Slim Lite-On..
Key found in KeyDB at record (1 - New folder)
Key is: E302153607189B2CD22CD7E90E61E27E
Key has been tested and verified, thanks C4eva !
0000: 05 80 00 32 5B 00 00 00 - 50 4C 44 53 20 20 20 20 ...2[...PLDS
0010: 44 47 2D 31 36 44 34 53 - 20 20 20 20 20 20 20 20 DG-16D4S
0020: 30 32 32 35 00 00 00 00 - 00 00 00 00 00 00 00 00 0225............
0030: 00 00 00 00 41 30 41 30 - 00 00 00 00 00 00 00 00 ....A0A0........
0040: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0050: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0060: 44 37 31 31 43 47 30 31 - 32 39 30 37 30 30 30 39 D711CG0129070009
0070: 59 20 20 20 Y
Sending Vendor Intro to port 0x0000
Status 0x51
Re-sending Vendor Intro:
....................................
Device Intro failed!
SlimKey extraction failed!
Drive is Slim Lite-On..
Key found in KeyDB at record (1 - New folder)
Key is: E302153607189B2CD22CD7E90E61E27E
Key has been tested and verified, thanks C4eva !
0000: 05 80 00 32 5B 00 00 00 - 50 4C 44 53 20 20 20 20 ...2[...PLDS
0010: 44 47 2D 31 36 44 34 53 - 20 20 20 20 20 20 20 20 DG-16D4S
0020: 30 32 32 35 00 00 00 00 - 00 00 00 00 00 00 00 00 0225............
0030: 00 00 00 00 41 30 41 30 - 00 00 00 00 00 00 00 00 ....A0A0........
0040: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0050: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0060: 44 37 31 31 43 47 30 31 - 32 39 30 37 30 30 30 39 D711CG0129070009
0070: 59 20 20 20 Y
Sending Vendor Intro to port 0x0000
Status 0x51
Re-sending Vendor Intro:
....................................
Device Intro failed!
SlimKey extraction failed!
Drive is Slim Lite-On..
Key found in KeyDB at record (1 - New folder)
Key is: E302153607189B2CD22CD7E90E61E27E
Key has been tested and verified, thanks C4eva !
Sending Vendor Intro to port 0x0000
Serial flash found with Status 0x72
Sending Device ID request to port 0x0000
PhatKey extraction failed!
Drive in Vendor Mode! DVDkey files extraction aborted!
Drive is Slim Lite-On..
Key found in KeyDB at record (1 - New folder)
Key is: E302153607189B2CD22CD7E90E61E27E
Key has been tested and verified, thanks C4eva !
Drive is Slim Lite-On..
Key found in KeyDB at record (1 - New folder)
Key is: E302153607189B2CD22CD7E90E61E27E
Key has been tested and verified, thanks C4eva !
0000: 05 80 00 32 5B 00 00 00 - 50 4C 44 53 20 20 20 20 ...2[...PLDS
0010: 44 47 2D 31 36 44 34 53 - 20 20 20 20 20 20 20 20 DG-16D4S
0020: 30 32 32 35 00 00 00 00 - 00 00 00 00 00 00 00 00 0225............
0030: 00 00 00 00 41 30 41 30 - 00 00 00 00 00 00 00 00 ....A0A0........
0040: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0050: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0060: 44 37 31 31 43 47 30 31 - 32 39 30 37 30 30 30 39 D711CG0129070009
0070: 59 20 20 20 Y
Sending Vendor Intro to port 0x0000
Status 0x51
Re-sending Vendor Intro:
....................................
Device Intro failed!
SlimKey extraction failed!
Getting Status from port 0x0000
Invalid Status 0x51
Sending Vendor Intro to port 0x0000
Serial flash found with Status 0x72
Sending Device ID request to port 0x0000
Spi Status: 0x8C
Manufacturer ID: 0xEF
Device ID: 0x11
Flash Name: Winbond/NEX(W25P20/NX25P20)
Flash Size: 262144 bytes
Getting Status from port 0x0000
Serial flash found with Status 0x72
Reading Bank 0: ................
Reading Bank 1: ................
Reading Bank 2: ................
Reading Bank 3: ................
Dumped in 10895mS
Lite-On Dump file saved to Lite-OFW.bin
Loading firmware from buffer
Drive key @ n/a E302153607189B2CD22CD7E90E61E27E
Firmware Osig: [PLDS DG-16D4S 0225]
Firmware is: LT-Plus 2.0
Key database updated
Auto-Loading firmware file C:\Users\ShoneSR\Desktop\JungleFlasher.0.1.92.Beta(304)\JungleFlasher v0.1.92 Beta (304)\firmware\LTPlus-0225-v3.0u.bin
MD5 hash: db5c70eaaabb53501c2c4f53dce9abfd
Genuine LT plus v3.0 (9504 upgrade)
Drive key @ n/a FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
Firmware Osig: [PLDS DG-16D4S 0225]
Firmware is: LT-Plus 3.0
Spoofing Target
DVD Key copied to target
Key Sector copied from Source to Target
Target is LT - ID strings not copied to Target
Loading MTK_Flash source file
Loading firmware file C:\Users\ShoneSR\Desktop\JungleFlasher.0.1.92.Beta(304)\JungleFlasher v0.1.92 Beta (304)\firmware\LTPlus-0225-v3.0u.bin
MD5 hash: db5c70eaaabb53501c2c4f53dce9abfd
Genuine LT plus v3.0 (9504 upgrade)
Drive key @ n/a FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
Firmware Osig: [PLDS DG-16D4S 0225]
Firmware is: LT-Plus 3.0
Spoofing Target
DVD Key copied to target
Key Sector copied from Source to Target
Target is LT - ID strings not copied to Target
Getting Status from port 0x0000
SPi flash found with Status 0x72
Spi is locked, Aborting!
Getting Status from port 0x0000
SPi flash found with Status 0x72
Spi is locked, Aborting!
Sending Spi UnLock request to Port 0x0000
.
Spi Status: 0x00
Getting Status from port 0x0000
SPi flash found with Status 0x72
Sending Chip Erase to Port 0x0000
Erasing:
Writing target buffer to flash
Writing Bank 0: ................
Writing Bank 1: ................
Writing Bank 2: ................
Writing Bank 3: ................
Flash Verification Test !
Reading Bank 0: ................
Reading Bank 1: ................
Reading Bank 2: ................
Reading Bank 3: ................
Write Verify Failed !
Getting Status from port 0x0000
SPi flash found with Status 0x72
Sending Chip Erase to Port 0x0000
Erasing:
Writing target buffer to flash
Writing Bank 0: ................
Writing Bank 1: ................
Writing Bank 2: ................
Writing Bank 3: ................
Flash Verification Test !
Reading Bank 0: ................
Reading Bank 1: ................
Reading Bank 2: ................
Reading Bank 3: ................
Write Verify Failed !
Getting Status from port 0x0000
SPi flash found with Status 0x72
Sending Chip Erase to Port 0x0000
Erasing:
Writing target buffer to flash
Writing Bank 0: ................
Writing Bank 1: ................
Writing Bank 2: ................
Writing Bank 3: ................
Flash Verification Test !
Reading Bank 0: ................
Reading Bank 1: ................
Reading Bank 2: ................
Reading Bank 3: ................
Write verified OK !
Sending Spi Lock request to Port 0x0000
Spi Status: 0x8C
Drive is Slim Lite-On..
Key found in KeyDB at record (1 - Desktop)
Key is: E302153607189B2CD22CD7E90E61E27E
Key has been tested and verified, thanks C4eva !