Hi guy's i cannot find the unlocked button on JF 1.92 (304) i have a 0401 windbond chip and i succesfully unlocked, can someone help?
here my log and pic:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
JungleFlasher 0.1.92 Beta (304)
Session Started Fri Jun 01 14:24:08 2012
This is a 32 bit process running on 2 x 32 bit CPUs
X360USB PRO detected, Version 0.18
Found 1 I/O Ports.
Found 2 Com Ports.
Found 1 windows drives C:
Found 0 CD/DVD drives
Drive is Slim Lite-On..
Key found in KeyDB at record (466 - N/A)
Key is:XXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
Key has been tested and verified, thanks C4eva !
0000: 05 80 00 32 5B 00 00 00 - 50 4C 44 53 20 20 20 20 ...2[...PLDS
0010: 44 47 2D 31 36 44 34 53 - 20 20 20 20 20 20 20 20 DG-16D4S
0020: 30 34 30 31 00 00 00 00 - 00 00 00 00 00 00 00 00 0401............
0030: 00 00 00 00 41 30 41 30 - 00 00 00 00 00 00 00 00 ....A0A0........
0040: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0050: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0060: 44 37 31 36 43 47 31 31 - 32 39 30 33 30 30 41 4A D716CG11290300AJ
0070: 59 20 20 20 Y
Sending Vendor Intro to port 0x0000
Serial flash found with Status 0x72
Sending Device ID request to port 0x0000
Manufacturer ID: 0xEF
Device ID: 0x11
Flash Name: Winbond/NEX(W25P20/NX25P20)
Flash Size: 262144 bytes
............
Key: XXXXXXXXXXXXXXXXXXXXXXXXXXXXX is verified, Thanks C4eva
Grabbing Key sector: ................
Key Sector verified.
Grabbing Serial info: ........
Drive is Slim Lite-On..
Key found in KeyDB at record (466 - N/A)
Key is: XXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
Key has been tested and verified, thanks C4eva !
0000: 05 80 00 32 5B 00 00 00 - 50 4C 44 53 20 20 20 20 ...2[...PLDS
0010: 44 47 2D 31 36 44 34 53 - 20 20 20 20 20 20 20 20 DG-16D4S
0020: 30 34 30 31 00 00 00 00 - 00 00 00 00 00 00 00 00 0401............
0030: 00 00 00 00 41 30 41 30 - 00 00 00 00 00 00 00 00 ....A0A0........
0040: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0050: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0060: 44 37 31 36 43 47 31 31 - 32 39 30 33 30 30 41 4A D716CG11290300AJ
0070: 59 20 20 20 Y
0000: C0 85 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0010: 00 00 00 00 37 44 36 31 - 47 43 31 31 39 32 33 30 ....7D61GC119230
0020: 30 30 4A 41 20 59 20 20 - 00 00 00 00 00 00 34 30 00JA Y ......40
0030: 31 30 20 20 20 20 4C 50 - 53 44 20 20 20 20 47 44 10 LPSD GD
0040: 31 2D 44 36 53 34 20 20 - 20 20 20 20 20 20 00 00 1-D6S4 ..
0050: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0060: 00 00 00 0F 00 40 00 04 - 00 02 06 00 00 00 00 00 [email protected]
0070: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0080: 03 00 78 00 78 00 78 00 - 78 00 00 00 00 00 00 00 ..x.x.x.x.......
0090: 00 00 F8 00 10 02 00 00 - 02 02 00 00 60 00 40 00 ............`[email protected]
00A0: F8 00 10 02 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00B0: 3F 20 00 00 ? ..
0000: 44 37 31 36 43 47 31 31 - 32 39 30 33 30 30 41 4A D716CG11290300AJ
0010: 59 20 20 20 FF FF FF FF - 31 43 31 33 30 32 38 39 Y ....1C130289
0020: 31 36 34 39 35 58 58 52 - 41 30 FF FF 53 34 50 31 16495XXRA0..S4P1
0030: 33 31 37 30 30 30 30 30 - 30 30 38 38 30 31 00 00 31700000008801..
0040: 00 00 00 00 00 00 00 00 - 00 00 00 00 41 30 FF FF ............A0..
Hashing Drive: ................
Dummy.bin file saved to Dummy.bin
Loading firmware from buffer
Inquiry string found
Identify string found
Drive key @ 0xA030 XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
Firmware Osig: [PLDS DG-16D4S 0401]
Firmware is: SlimKey Extract
Key database updated
Auto-Loading firmware file C:\Users\ataroreh8132\Desktop\JungleFlasher v0.1.92 Beta (304)\firmware\LTPlus-0401-v3.0.bin
MD5 hash: 87fba52607d01d3c73722f9f818588c9
Genuine LT plus v3.0
Drive key @ n/a FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
Firmware Osig: [PLDS DG-16D4S 0401]
Firmware is: LT-Plus 3.0
Spoofing Target
DVD Key copied to target
Key Sector copied from Source to Target
Target is LT - ID strings not copied to Target
Spoofing Target
DVD Key already matches
Key Sector copied from Source to Target
Target is LT - ID strings not copied to Target
Serial data already matches
Target f/w saved as: Lite_CFW.bin
Sending Vendor Intro to port 0x0000
Status 0x51
Re-sending Vendor Intro:
............
Serial flash found with Status 0x72
Sending Device ID request to port 0x0000
Spi Status: 0xBC
Manufacturer ID: 0xEF
Device ID: 0x11
Flash Name: Winbond/NEX(W25P20/NX25P20)
Flash Size: 262144 bytes
Sending Vendor Outro to port 0x0000
Drive is Slim Lite-On..
Key found in KeyDB at record (466 - 0401)
Key is: XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
Key has been tested and verified, thanks C4eva !
here my log and pic:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
JungleFlasher 0.1.92 Beta (304)
Session Started Fri Jun 01 14:24:08 2012
This is a 32 bit process running on 2 x 32 bit CPUs
X360USB PRO detected, Version 0.18
Found 1 I/O Ports.
Found 2 Com Ports.
Found 1 windows drives C:
Found 0 CD/DVD drives
Drive is Slim Lite-On..
Key found in KeyDB at record (466 - N/A)
Key is:XXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
Key has been tested and verified, thanks C4eva !
0000: 05 80 00 32 5B 00 00 00 - 50 4C 44 53 20 20 20 20 ...2[...PLDS
0010: 44 47 2D 31 36 44 34 53 - 20 20 20 20 20 20 20 20 DG-16D4S
0020: 30 34 30 31 00 00 00 00 - 00 00 00 00 00 00 00 00 0401............
0030: 00 00 00 00 41 30 41 30 - 00 00 00 00 00 00 00 00 ....A0A0........
0040: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0050: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0060: 44 37 31 36 43 47 31 31 - 32 39 30 33 30 30 41 4A D716CG11290300AJ
0070: 59 20 20 20 Y
Sending Vendor Intro to port 0x0000
Serial flash found with Status 0x72
Sending Device ID request to port 0x0000
Manufacturer ID: 0xEF
Device ID: 0x11
Flash Name: Winbond/NEX(W25P20/NX25P20)
Flash Size: 262144 bytes
............
Key: XXXXXXXXXXXXXXXXXXXXXXXXXXXXX is verified, Thanks C4eva
Grabbing Key sector: ................
Key Sector verified.
Grabbing Serial info: ........
Drive is Slim Lite-On..
Key found in KeyDB at record (466 - N/A)
Key is: XXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
Key has been tested and verified, thanks C4eva !
0000: 05 80 00 32 5B 00 00 00 - 50 4C 44 53 20 20 20 20 ...2[...PLDS
0010: 44 47 2D 31 36 44 34 53 - 20 20 20 20 20 20 20 20 DG-16D4S
0020: 30 34 30 31 00 00 00 00 - 00 00 00 00 00 00 00 00 0401............
0030: 00 00 00 00 41 30 41 30 - 00 00 00 00 00 00 00 00 ....A0A0........
0040: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0050: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0060: 44 37 31 36 43 47 31 31 - 32 39 30 33 30 30 41 4A D716CG11290300AJ
0070: 59 20 20 20 Y
0000: C0 85 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0010: 00 00 00 00 37 44 36 31 - 47 43 31 31 39 32 33 30 ....7D61GC119230
0020: 30 30 4A 41 20 59 20 20 - 00 00 00 00 00 00 34 30 00JA Y ......40
0030: 31 30 20 20 20 20 4C 50 - 53 44 20 20 20 20 47 44 10 LPSD GD
0040: 31 2D 44 36 53 34 20 20 - 20 20 20 20 20 20 00 00 1-D6S4 ..
0050: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0060: 00 00 00 0F 00 40 00 04 - 00 02 06 00 00 00 00 00 [email protected]
0070: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0080: 03 00 78 00 78 00 78 00 - 78 00 00 00 00 00 00 00 ..x.x.x.x.......
0090: 00 00 F8 00 10 02 00 00 - 02 02 00 00 60 00 40 00 ............`[email protected]
00A0: F8 00 10 02 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00B0: 3F 20 00 00 ? ..
0000: 44 37 31 36 43 47 31 31 - 32 39 30 33 30 30 41 4A D716CG11290300AJ
0010: 59 20 20 20 FF FF FF FF - 31 43 31 33 30 32 38 39 Y ....1C130289
0020: 31 36 34 39 35 58 58 52 - 41 30 FF FF 53 34 50 31 16495XXRA0..S4P1
0030: 33 31 37 30 30 30 30 30 - 30 30 38 38 30 31 00 00 31700000008801..
0040: 00 00 00 00 00 00 00 00 - 00 00 00 00 41 30 FF FF ............A0..
Hashing Drive: ................
Dummy.bin file saved to Dummy.bin
Loading firmware from buffer
Inquiry string found
Identify string found
Drive key @ 0xA030 XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
Firmware Osig: [PLDS DG-16D4S 0401]
Firmware is: SlimKey Extract
Key database updated
Auto-Loading firmware file C:\Users\ataroreh8132\Desktop\JungleFlasher v0.1.92 Beta (304)\firmware\LTPlus-0401-v3.0.bin
MD5 hash: 87fba52607d01d3c73722f9f818588c9
Genuine LT plus v3.0
Drive key @ n/a FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
Firmware Osig: [PLDS DG-16D4S 0401]
Firmware is: LT-Plus 3.0
Spoofing Target
DVD Key copied to target
Key Sector copied from Source to Target
Target is LT - ID strings not copied to Target
Spoofing Target
DVD Key already matches
Key Sector copied from Source to Target
Target is LT - ID strings not copied to Target
Serial data already matches
Target f/w saved as: Lite_CFW.bin
Sending Vendor Intro to port 0x0000
Status 0x51
Re-sending Vendor Intro:
............
Serial flash found with Status 0x72
Sending Device ID request to port 0x0000
Spi Status: 0xBC
Manufacturer ID: 0xEF
Device ID: 0x11
Flash Name: Winbond/NEX(W25P20/NX25P20)
Flash Size: 262144 bytes
Sending Vendor Outro to port 0x0000
Drive is Slim Lite-On..
Key found in KeyDB at record (466 - 0401)
Key is: XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
Key has been tested and verified, thanks C4eva !
Last edited: