---------------------------------------------------------------
xeBuild v1.04.535
---------------------------------------------------------------
building retail image
<enter> key on completion suppressed
data directory overridden from command line to '.\xeBuild\7371\'
per build directory overridden from command line to 'xeBuild\data'
file name overridden from command line to 'C:\Users\Paul\Desktop\J-Runner v02 (278) Core Pack\404975663005\updflash.bin'
------ parsing user ini at '.\xeBuild\data\options.ini' ------
loading file...done!
pre-parsing and sanitizing
done!
User options.ini loaded, 0x18c bytes in memory
loading cpukey.txt from .\xeBuild\data\cpukey.txt
CPU Key set to: 0x76103CF920B2E790C5F0F8EE75EC9BA2
setting 1blkey from ini: 0xDD88AD0C9ED669E7B56794FB68563EFA
1BL Key set to: 0xDD88AD0C9ED669E7B56794FB68563EFA sum: 0x983 (expects: 0x983)
xex Key set to: 0x20B185A59D28FDC340583FBB0896BF91 sum: 0x800 (expects: 0x800)
------ parsing ini at '.\xeBuild\7371\_retail.ini' ------
ini version 7371
ini: label [xenonbl] found
found (1) 'cb_1921.bin' crc: 0x14cec7b4
found (2) 'none' crc: 0x00000000
found (3) 'cd_1921.bin' crc: 0xb907093a
found (4) 'ce_1888.bin' crc: 0xff9b60df
found (5) 'cf_7371.bin' crc: 0xb4da22a3
found (6) 'cg_7371.bin' crc: 0x957b8b9a
ini: label [flashfs] found
found (1) 'aac.xexp' crc: 0x98f707c5
found (2) 'bootanim.xex' crc: 0xab6cb761
found (3) 'bootanim.xexp' crc: 0xa9a88070
found (4) 'createprofile.xex' crc: 0x9b68039f
found (5) 'createprofile.xexp' crc: 0x4d12a1cd
found (6) 'dash.xex' crc: 0xc9a6f38c
found (7) 'deviceselector.xex' crc: 0x09b27d93
found (8) 'deviceselector.xexp' crc: 0x679e52e5
found (9) 'gamerprofile.xex' crc: 0xf7ad0e5d
found (10) 'gamerprofile.xexp' crc: 0x7e9a54f9
found (11) 'hud.xex' crc: 0x403c8555
found (12) 'hud.xexp' crc: 0xea0697a0
found (13) 'huduiskin.xex' crc: 0x45a0b4be
found (14) 'mfgbootlauncher.xex' crc: 0x817e1d7d
found (15) 'mfgbootlauncher.xexp' crc: 0x05c8e5ae
found (16) 'minimediaplayer.xex' crc: 0xc0d0ecd8
found (17) 'minimediaplayer.xexp' crc: 0x343cc811
found (18) 'signin.xex' crc: 0x09a200b5
found (19) 'signin.xexp' crc: 0x1e7e6dd8
found (20) 'updater.xex' crc: 0xc99e0769
found (21) 'updater.xexp' crc: 0x3724244c
found (22) 'vk.xex' crc: 0x3b47f263
found (23) 'vk.xexp' crc: 0x13d664f4
found (24) 'xam.xex' crc: 0x7e0a086c
found (25) 'xam.xexp' crc: 0xe703904b
found (26) 'xenonclatin.xtt' crc: 0xd5d17ff5
found (27) 'xenonclatin.xttp' crc: 0xd88f962e
found (28) 'xenonjklatin.xtt' crc: 0xdde4a14c
found (29) 'xenonjklatin.xttp' crc: 0xcc43c4ac
found (30) 'ximecore.xex' crc: 0xc0050780
found (31) 'ximedic.xex' crc: 0x1d992bfb
found (32) 'ximedic.xexp' crc: 0xd688dcd9
ini: label [security] found
found (1) 'crl.bin' crc: 0x00000000
found (2) 'odd.bin' crc: 0x00000000
found (3) 'extended.bin' crc: 0x00000000
found (4) 'secdata.bin' crc: 0x00000000
------ ini parsing completed ------
output name overridden to: C:\Users\Paul\Desktop\J-Runner v02 (278) Core Pack\404975663005\updflash.bin
------ Checking .\xeBuild\data\nanddump.bin ------
nanddump header checks passed OK!
Loading NAND dump (0x1080000 bytes)...done!
Detecting NAND controller type from dump data...
NAND dump is from a small block machine
NAND dump uses small block controller
parsing dump into user and spare...
done!
KeyVault cannot be 0x0 bytes, using 0x4000
decrypting KeyVault at address 0x4000 of size 0x4000
keyvault decrypted OK, will use if no kv.bin is provided
decrypting SMC at address 0x1000 of size 0x3000
SMC decrypted OK, will use if no external smc.bin is provided
seeking smc config in dump...found at offset 0xf7c000! Using if no smc config is provided.
CF slot 0 decrypted ok LDV 0x04 Pairing: 0x55812b
CF slot 1 decrypted ok LDV 0x03 Pairing: 0x55812b
setting LDV from image to 4
setting pairing data from image to 0x55812b
MobileB.dat found at page 0x3720, size 2048 (0x800) bytes
MobileC.dat found at page 0x3f60, size 512 (0x200) bytes
MobileD.dat found at page 0x3440, size 2048 (0x800) bytes
MobileE.dat found at page 0x43e0, size 1024 (0x400) bytes
Statistics.settings found at page 0x7bc0, size 4096 (0x1000) bytes
seeking FSRoot...fsroot found at page 0x7040 raw offset 0xe78400
seeking security files...
crl.bin found in sector 0x223 size 0x7c0...verified! Will use if external file not found.
odd.bin found in sector 0x369 size 0x40...verified! Will use if external file not found.
extended.bin found in sector 0x365 size 0x4000...verified! Will use if external file not found.
secdata.bin found in sector 0x381 size 0x400...verified! Will use if external file not found.
done!
Writing initial header to flash image
------ loading system update container ------
.\xeBuild\7371\su20076000_00000000 found, loading...done!
Read 0x792000 bytes to memory
checking container integrity...
header seems valid, version 2.0.7371.00
header hash is OK, checking content hashes...
content hashes seem OK, everything looks good!
extracted SUPD\xboxupd.bin (0x4a140 bytes)
decrypting SUPD\xboxupd.bin\CF_7371.bin (0x4450 bytes)...done!
decrypting SUPD\xboxupd.bin\CG_7371.bin (0x45cf0 bytes)...done!
------ Loading bootloaders and required security files ------
reading .\xeBuild\data\smc.bin failed, using smc.bin from nand dump
reset smc load address to 0x1000 size 0x3000
reading .\xeBuild\data\kv.bin failed, using kv.bin from nand dump
reading .\common\cb_1921.bin (0x9800 bytes)
reading .\common\cd_1921.bin (0x56c0 bytes)
reading .\common\ce_1888.bin (0x5606a b pad 0x56070 b)
extracted SUPD\xboxupd.bin\CF_7371.bin (0x4450 bytes)
extracted SUPD\xboxupd.bin\CG_7371.bin (0x45cf0 bytes)
reading .\xeBuild\data\smc_config.bin failed, using smc_config.bin from nand dump
-------------------
checking smc_config
-------------------
extracting config
------------------
SMC config info:
------------------
Target temps: Cpu: 80øC Gpu: 83øC Edram: 85øC
Max temps : Cpu: 100øC Gpu: 110øC Edram: 117øC
Cpu Fan : (auto)
Gpu Fan : (auto)
MAC Address : 00:12:5a:ce:78:7c
AVRegion : 0x00000300 (PAL50)
GameRegion : 0x02fe (PAL/EU)
DVDRegion : 2
resetKey : DUUD
---------------------
Checking for smc config data patches
smc config was not patched
---------------------
done!
patch slot offset reset to: 0x70000
------ Encrypting and finalizing bootloaders ------
encoding smc.bin size 0x3000
SMC checksum: b92ed1ba
unknown SMC found, type: Xenon v1.2(1.51)
clean smc.bin found!
encoding kv.bin size 0x4000
decrypted keyvault has been set for reference
encoding cb_1921.bin size 0x9800
CB 1921 seq 0x0105001b type: 0x01 cseq: 0x05 allow: 0x001b
expected fuses:
fuseset 00: C0FFFFFFFFFFFFFF
fuseset 01: 0F0F0F0F0F0F0FF0
fuseset 02: 0000F00000000000 (sequence)
fuseset 02: F000000000000000 (allow cseq 1)
fuseset 02: 0F00000000000000 (allow cseq 2)
fuseset 02: 000F000000000000 (allow cseq 4)
fuseset 02: 0000F00000000000 (allow cseq 5)
encoding cd_1921.bin size 0x56c0
encoding ce_1888.bin size 0x56070
encoding xell-gggggg.bin size 0x0
encoding cf_7371.bin size 0x4450
encoding cg_7371.bin size 0x45cf0
encoding patches_fat.bin size 0x0
done!
------ Adding bootloaders to flash image ------
adding smc.bin at raw offset 0x00001000 len 0x3000 (end 0x4000)
adding kv.bin at raw offset 0x00004000 len 0x4000 (end 0x8000)
adding cb_1921.bin at raw offset 0x00008000 len 0x9800 (end 0x11800)
adding cd_1921.bin at raw offset 0x00011800 len 0x56c0 (end 0x16ec0)
adding ce_1888.bin at raw offset 0x00016ec0 len 0x56070 (end 0x6cf30)
retail image, skipping xell-gggggg.bin
adding cf_7371.bin at raw offset 0x00070000 len 0x4450 (end 0x74450)
adding cg_7371.bin at raw offset 0x00074450 len 0x45cf0 (end 0x80000, rest in fs)
retail image, skipping patches_fat.bin
Fixing up FS table...done!
Writing zeropair CG patch slot overflow data to sysupdate.xexp1
at raw offset 0x90000 len 0x0003a140 (end: 0x000ca140)...done!
------ adding 32 firmware files ------
extracted SUPD\aac.xexp (0x4000 bytes) (crc32: 0x98f707c5 ini: 0x98f707c5)
adding as aac.xexp1 at raw offset 0xca140 len 0x00004000 (end 0x000ce140)
reading .\xeBuild\7371\bootanim.xex (0x61000 bytes) (crc32: 0xab6cb761 ini: 0xab6cb761)
adding as bootanim.xex at raw offset 0xd0000 len 0x00061000 (end 0x00131000)
extracted SUPD\bootanim.xexp (0x7000 bytes) (crc32: 0xa9a88070 ini: 0xa9a88070)
adding as bootanim.xexp1 at raw offset 0x131000 len 0x00007000 (end 0x00138000)
reading .\xeBuild\7371\createprofile.xex (0xa000 bytes) (crc32: 0x9b68039f ini: 0x9b68039f)
adding as createprofile.xex at raw offset 0x13b000 len 0x0000a000 (end 0x00145000)
extracted SUPD\createprofile.xexp (0xd000 bytes) (crc32: 0x4d12a1cd ini: 0x4d12a1cd)
adding as createprofile.xexp1 at raw offset 0x146000 len 0x0000d000 (end 0x00153000)
extracted SUPD\dash.xex (0x4b2000 bytes) (crc32: 0xc9a6f38c ini: 0xc9a6f38c)
adding as dash.xex at raw offset 0x155000 len 0x004b2000 (end 0x00607000)
reading .\xeBuild\7371\deviceselector.xex (0x5000 bytes) (crc32: 0x09b27d93 ini: 0x09b27d93)
adding as deviceselector.xex at raw offset 0x60a000 len 0x00005000 (end 0x0060f000)
extracted SUPD\deviceselector.xexp (0x2800 bytes) (crc32: 0x679e52e5 ini: 0x679e52e5)
adding as deviceselector.xexp1 at raw offset 0x611000 len 0x00002800 (end 0x00613800)
reading .\xeBuild\7371\gamerprofile.xex (0x13000 bytes) (crc32: 0xf7ad0e5d ini: 0xf7ad0e5d)
adding as gamerprofile.xex at raw offset 0x616800 len 0x00013000 (end 0x00629800)
extracted SUPD\gamerprofile.xexp (0xf800 bytes) (crc32: 0x7e9a54f9 ini: 0x7e9a54f9)
adding as gamerprofile.xexp1 at raw offset 0x62b000 len 0x0000f800 (end 0x0063a800)
reading .\xeBuild\7371\hud.xex (0x1f000 bytes) (crc32: 0x403c8555 ini: 0x403c8555)
adding as hud.xex at raw offset 0x63b800 len 0x0001f000 (end 0x0065a800)
extracted SUPD\hud.xexp (0x25800 bytes) (crc32: 0xea0697a0 ini: 0xea0697a0)
adding as hud.xexp1 at raw offset 0x65b000 len 0x00025800 (end 0x00680800)
extracted SUPD\huduiskin.xex (0x55000 bytes) (crc32: 0x45a0b4be ini: 0x45a0b4be)
adding as huduiskin.xex at raw offset 0x681800 len 0x00055000 (end 0x006d6800)
reading .\xeBuild\7371\mfgbootlauncher.xex (0x9000 bytes) (crc32: 0x817e1d7d ini: 0x817e1d7d)
adding as mfgbootlauncher.xex at raw offset 0x6d9000 len 0x00009000 (end 0x006e2000)
extracted SUPD\mfgbootlauncher.xexp (0x4800 bytes) (crc32: 0x05c8e5ae ini: 0x05c8e5ae)
adding as mfgbootlauncher.xexp1 at raw offset 0x6e5000 len 0x00004800 (end 0x006e9800)
reading .\xeBuild\7371\minimediaplayer.xex (0x9000 bytes) (crc32: 0xc0d0ecd8 ini: 0xc0d0ecd8)
adding as minimediaplayer.xex at raw offset 0x6ec800 len 0x00009000 (end 0x006f5800)
extracted SUPD\minimediaplayer.xexp (0x7800 bytes) (crc32: 0x343cc811 ini: 0x343cc811)
adding as minimediaplayer.xexp1 at raw offset 0x6f9000 len 0x00007800 (end 0x00700800)
reading .\xeBuild\7371\signin.xex (0xc000 bytes) (crc32: 0x09a200b5 ini: 0x09a200b5)
adding as signin.xex at raw offset 0x703800 len 0x0000c000 (end 0x0070f800)
extracted SUPD\signin.xexp (0x7800 bytes) (crc32: 0x1e7e6dd8 ini: 0x1e7e6dd8)
adding as signin.xexp1 at raw offset 0x710000 len 0x00007800 (end 0x00717800)
reading .\xeBuild\7371\updater.xex (0x5000 bytes) (crc32: 0xc99e0769 ini: 0xc99e0769)
adding as updater.xex at raw offset 0x717800 len 0x00005000 (end 0x0071c800)
extracted SUPD\updater.xexp (0x3000 bytes) (crc32: 0x3724244c ini: 0x3724244c)
adding as updater.xexp1 at raw offset 0x71d000 len 0x00003000 (end 0x00720000)
reading .\xeBuild\7371\vk.xex (0x1c000 bytes) (crc32: 0x3b47f263 ini: 0x3b47f263)
adding as vk.xex at raw offset 0x723000 len 0x0001c000 (end 0x0073f000)
extracted SUPD\vk.xexp (0xb000 bytes) (crc32: 0x13d664f4 ini: 0x13d664f4)
adding as vk.xexp1 at raw offset 0x740000 len 0x0000b000 (end 0x0074b000)
reading .\xeBuild\7371\xam.xex (0x12a000 bytes) (crc32: 0x7e0a086c ini: 0x7e0a086c)
adding as xam.xex at raw offset 0x74b000 len 0x0012a000 (end 0x00875000)
extracted SUPD\xam.xexp (0x11c000 bytes) (crc32: 0xe703904b ini: 0xe703904b)
adding as xam.xexp1 at raw offset 0x876000 len 0x0011c000 (end 0x00992000)
reading .\xeBuild\7371\xenonclatin.xtt (0x11b000 bytes) (crc32: 0xd5d17ff5 ini: 0xd5d17ff5)
adding as xenonclatin.xtt at raw offset 0x994000 len 0x0011b000 (end 0x00aaf000)
extracted SUPD\xenonclatin.xttp (0x15000 bytes) (crc32: 0xd88f962e ini: 0xd88f962e)
adding as xenonclatin.xttp1 at raw offset 0xaaf000 len 0x00015000 (end 0x00ac4000)
reading .\xeBuild\7371\xenonjklatin.xtt (0x1a8000 bytes) (crc32: 0xdde4a14c ini: 0xdde4a14c)
adding as xenonjklatin.xtt at raw offset 0xac5000 len 0x001a8000 (end 0x00c6d000)
extracted SUPD\xenonjklatin.xttp (0x3000 bytes) (crc32: 0xcc43c4ac ini: 0xcc43c4ac)
adding as xenonjklatin.xttp1 at raw offset 0xc70000 len 0x00003000 (end 0x00c73000)
extracted SUPD\ximecore.xex (0x12000 bytes) (crc32: 0xc0050780 ini: 0xc0050780)
adding as ximecore.xex at raw offset 0xc73000 len 0x00012000 (end 0x00c85000)
reading .\xeBuild\7371\ximedic.xex (0x90000 bytes) (crc32: 0x1d992bfb ini: 0x1d992bfb)
adding as ximedic.xex at raw offset 0xc86000 len 0x00090000 (end 0x00d16000)
extracted SUPD\ximedic.xexp (0x2000 bytes) (crc32: 0xd688dcd9 ini: 0xd688dcd9)
adding as ximedic.xexp1 at raw offset 0xd18000 len 0x00002000 (end 0x00d1a000)
------ adding 4 security files ------
<- Processing crl.bin ->
reading .\xeBuild\data\crl.bin (0xa00 bytes)
crl appears crypted, attempting to decrypt with CPU key...failed! Trying alternate key...success!
adding as crl.bin at raw offset 0xd1c000 len 0x00000a00 (end 0x00d1ca00)
<- Processing odd.bin ->
could not read odd.bin, using data from nanddump.bin...
adding as odd.bin at raw offset 0xd20000 len 0x00000040 (end 0x00d20040)
<- Processing extended.bin ->
reading .\xeBuild\data\extended.bin (0x4000 bytes)
adding as extended.bin at raw offset 0xd24000 len 0x00004000 (end 0x00d28000)
<- Processing secdata.bin ->
reading .\xeBuild\data\secdata.bin (0x400 bytes)
adding as secdata.bin at raw offset 0xd28000 len 0x00000400 (end 0x00d28400)
------ checking for Mobile*.dat ------
MobileB.dat found, adding from nanddump.bin
adding MobileB.dat as type 0x31 at raw offset 0xd2c000 len 0x800 (end 0xd2c800)
MobileC.dat found, adding from nanddump.bin
adding MobileC.dat as type 0x32 at raw offset 0xd30000 len 0x200 (end 0xd30200)
MobileD.dat found, adding from nanddump.bin
adding MobileD.dat as type 0x33 at raw offset 0xd34000 len 0x800 (end 0xd34800)
MobileE.dat found, adding from nanddump.bin
adding MobileE.dat as type 0x34 at raw offset 0xd38000 len 0x400 (end 0xd38400)
Statistics.settings found, adding from nanddump.bin
adding Statistics.settings at raw offset 0xf78000 len 0x1000 (end 0xf79000)
------ adding smc_config.bin ------
adding smc config to offset 0x00f7c000, len 0x400
------ finalizing image ------
Fixing up empty FS block entries...done!
Writing FS table to image offset 0xd3c000 len 0x4000 (end 0xd40000)...done!
calculating ECD bytes and assembling raw image...done!
writing file 'C:\Users\Paul\Desktop\J-Runner v02 (278) Core Pack\404975663005\updflash.bin' to disk...done!
C:\Users\Paul\Desktop\J-Runner v02 (278) Core Pack\404975663005\updflash.bin written OK
---------------------------------------------------------------
C:\Users\Paul\Desktop\J-Runner v02 (278) Core Pack\404975663005\updflash.bin image built, info:
---------------------------------------------------------------
Console : Xenon
NAND size : 16MiB
Build : Retail
Serial : 404975663005
ConsoleId : 019093566683
MoboSerial: 7866526108646305
Mfg Date : 07/24/2006
CPU Key : 76103CF920B2E790C5F0F8EE75EC9BA2
1BL Key : DD88AD0C9ED669E7B56794FB68563EFA
DVD Key : A2A7B3978E4C41824BE771B520F858FB
CF LDV : 4
KV type : type1 (no hash)
---------------------------------------------------------------
xeBuild Finished. Have a nice day.
---------------------------------------------------------------