So I have my key from my working drive. Why is it when I flash a different drive using that key with FW lt2.01 it still wont play backups. Could it be as simple as changing a laser? Here is the jungle flasher log if that helps.
JungleFlasher 0.1.94 Beta (320)
Session Started Fri Aug 16 21:22:35 2013
This is a 32 bit process running on 2 x 32 bit CPUs
portio32.sys Driver Installed
portio32.sys Driver Started, thanks Schtrom !
Found 4 I/O Ports.
Found 2 Com Ports.
Found 2 windows drives C: F:
Found 0 CD/DVD drives
Key found in KeyDB at record (1 - FirmwareBACKUPSAMMY-MS28)
Key is: 102FF905113E4C53DCC494D8F77AE43A
Key has been tested and verified, thanks C4eva !
Drive is Samsung..
Sending Sammy_Un_Lock to Drive on port 0xD8A0
Stage 1, Complete!
Stage 2, Complete!
Stage 3, Complete!
Done!
Sending Vendor Intro
Requesting Device ID
Manufacturer ID: 0xBF
Device ID: 0xB6
Flash Name: SST(SST39SF020)
Flash Size: 262144 bytes
Sending Vendor Intro to port 0xD8A0
Parallel flash found with Status 0x70
Sending Device ID request to port 0xD8A0
Manufacturer ID: 0xBF
Device ID: 0xB6
Flash Name: SST(SST39SF020)
Flash Size: 262144 bytes
Loading firmware file C:\Documents and Settings\Curt Huber\Desktop\JungleFlasher v0.1.94 Beta (320)\firmware\org-ms28a.bin
MD5 hash: 49d7f6f63c0abbf72f20b7444307b52e
Inquiry string found
Identify string found
Scanning sector 0x4000 for keys
0x401A 00000000000000000000000000000000
2 keys populated
Reverting to last good key FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF found at
F/W file saved to origms28aSAM-OFW-Fixed.bin
Loading firmware from buffer
Parse Failed !
Drive key @ 0x0000 00000000000000000000000000000000
Firmware Osig: []
Firmware is:
Loading firmware file C:\Documents and Settings\Curt Huber\Desktop\JungleFlasher v0.1.94 Beta (320)\firmware\origms28aSAM-OFW-Fixed.bin
MD5 hash: 430662d5e686a448c1a67434ddb36177
Parse Failed !
Loading firmware file C:\Documents and Settings\Curt Huber\Desktop\JungleFlasher v0.1.94 Beta (320)\firmware\origms28aSAM-OFW-Fixed.bin
MD5 hash: 430662d5e686a448c1a67434ddb36177
Parse Failed !
Loading firmware file C:\Documents and Settings\Curt Huber\Desktop\Samsung_Post_13141\SAM_OFW.bin
MD5 hash: e4b000f492df6b88406aad2ec3d705be
Inquiry string found
Identify string found
Scanning sector 0x4000 for keys
0x401A BBBBBBFFFFFFFFFFFFFFFFFFFFFFFFFF
0x4044 BBBBBBFFFFFFFFFFFFFFFFFFFFFFFFFF
0x406E BBBBBBFFFFFFFFFFFFFFFFFFFFFFFFFF
0x4098 BBBBBBFFFFFFFFFFFFFFFFFFFFFFFFFF
0x40C2 BBBBBBFFFFFFFFFFFFFFFFFFFFFFFFFF
0x40EC CEA71BBCCD9E1B39FFB67BB5597388FC
0x4116 CEA71BBCCD9E1B39FFB67BB5597388FC
0x4140 00000000000000000000000000000000
9 keys populated
0x40EC CEA71BBCCD9E1B39FFB67BB5597388FC x 2
Reverting to last good key CEA71BBCCD9E1B39FFB67BB5597388FC found at 0x40EC
F/W file saved to OrigFWSamMS28-ConfirmedSAM-OFW.bin
Loading firmware from buffer
Inquiry string found
Identify string found
Drive key @ 0x40EC CEA71BBCCD9E1B39FFB67BB5597388FC
Firmware Osig: [TSSTcorpDVD-ROM TS-H943Ams28]
Firmware is: Stock
Key added to database
Auto-Loading firmware file C:\Documents and Settings\Curt Huber\Desktop\JungleFlasher v0.1.94 Beta (320)\firmware\LT-sammy-v2.01.bin
MD5 hash: d66252800c1c072bc612f2f72d1e3c76
Genuine LT v2.01
Inquiry string found
Identify string found
Drive key @ 0x4044 FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
Firmware Osig: [TSSTcorpDVD-ROM TS-H943Ams28]
Firmware is: LT v2.01
Spoofing Target
DVD Key copied to target
ID strings already match
Drive key @ 0x40EC CEA71BBCCD9E1B39FFB67BB5597388FC
Firmware Osig: [TSSTcorpDVD-ROM TS-H943Ams28]
Firmware is: Stock
Auto-Loading firmware file C:\Documents and Settings\Curt Huber\Desktop\JungleFlasher v0.1.94 Beta (320)\firmware\LT-sammy-v2.01.bin
MD5 hash: d66252800c1c072bc612f2f72d1e3c76
Genuine LT v2.01
Inquiry string found
Identify string found
Drive key @ 0x4044 FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
Firmware Osig: [TSSTcorpDVD-ROM TS-H943Ams28]
Firmware is: LT v2.01
Spoofing Target
DVD Key copied to target
ID strings already match
Spoofing Target
DVD Key already matches
ID strings already match
Getting Status from port 0xD8A0
Parallel flash found with Status 0x70
Writing target buffer to flash
Sending Chip Erase request to port 0xD8A0
Erasing:............
Writing Bank 0: ................
Writing Bank 1: ................
Writing Bank 2: ................
Writing Bank 3: ................
Flash Verification Test !
Reading Bank 0: ................
Reading Bank 1: ................
Reading Bank 2: ................
Reading Bank 3: ................
Write verified OK !
Sending Vendor Outro to port 0xD8A0
Sending Vendor Outro to port 0xD8A0