LITEON DG-16D4S - SLIM Liteon Bricked

NJH1295

Noob Account
Jul 31, 2010
8
0
I have a Liteon that is from a slim xbox. When flashing it after i unlocked the drive i was writing the firmware and it failed on the verification. I proceeded to try it again and it failed once again.

Now when i open Jungle Flasher the drive wont go into vendor mode.

Im using an x360USB and a ck3 pro on a win 7 64 bit system. As for the status of the x360usb it is flashing red when the drive is on. I have tried the instructions for this in the Jungle Flasher tutorial on how to fix it but had no luck.

Help is much appreciated and thanks for your time.
 

x360ccm

BANNED
Jan 18, 2011
3,616
0
south coast UK
are you trying to flash to a tx unlocked pcb.

or is it a mxic thats you done the kamikaze hack on.

or is it a mxic that you fitted a sputnik switch to.

this is his jf log he sent me.

JungleFlasher 0.1.89 Beta (284)
Session Started Sat Oct 22 21:27:49 2011

This is a Wow 64 process running on 4 x 64 bit CPUs
X360USB PRO detected, Version 0.18

Found 1 I/O Ports.
Found 1 Com Ports.
Found 6 windows drives C: D: E: F: H: I:
Found 1 CD/DVD drives F:

Sending Vendor Intro to port 0x0000
Status 0x80
Re-sending Vendor Intro:
.......
Serial flash found with Status 0x72

Sending Device ID request to port 0x0000
Spi Status: 0x00
Manufacturer ID: 0xC2
Device ID: 0x11
Flash Name: MXIC(MX25L2005)
Flash Size: 262144 bytes
Loading firmware file E:\Xbox info\Xbox OFW\Senior Taco\Dummy.bin
MD5 hash: d81919f7a43ddb0da16b360221d904cb
Inquiry string found
Identify string found
Drive key @ 0xA030 C removed 3
Firmware Osig: [PLDS DG-16D4S 0272]
Firmware is: SlimKey Extract
Auto-Loading firmware file E:\JungleFlasher v0.1.89 Beta (284)\Firmware\LTPlus-0272-v2.0.bin
MD5 hash: e89c22ad8eecf634a3b27510901999c8
Genuine LT plus v2.0
Drive key @ n/a FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
Firmware Osig: [PLDS DG-16D4S 0272]
Firmware is: LT-Plus 2.0
Spoofing Target
DVD Key copied to target
Key Sector copied from Source to Target
Target is LT - ID strings not copied to Target


Getting Status from port 0x0000
SPi flash found with Status 0x72

Sending Chip Erase to Port 0x0000
Erasing:
Writing target buffer to flash
Writing Bank 0: ................
Writing Bank 1: ................
Writing Bank 2: ................
Writing Bank 3: ................
............
Flash Verification Test !
Reading Bank 0: Dump Failed
 
Last edited:

x360ccm

BANNED
Jan 18, 2011
3,616
0
south coast UK
why dont you answer what i ask you.

are you trying to flash to a tx unlocked pcb.

or is it a mxic thats you done the kamikaze hack on.

or is it a mxic that you fitted a sputnik switch to.