~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
JungleFlasher 0.1.92 Beta (304)
Session Started Thu Apr 26 02:07:31 2012
This is a Wow 64 process running on 2 x 64 bit CPUs
X360USB PRO detected, Version 0.18
Found 1 I/O Ports.
Found 1 Com Ports.
Found 7 windows drives C: D: F: G: H: I: Q:
Found 1 CD/DVD drives D:
Sending Vendor Intro to port 0x0000
Status 0x51
Sending Vendor Intro to port 0x0000
Status 0x51
Re-sending Vendor Intro:
.............
Serial flash found with Status 0x72
Sending Device ID request to port 0x0000
Spi Status: 0x00
Manufacturer ID: 0xC2
Device ID: 0x11
Flash Name: MXIC(MX25L2005)
Flash Size: 262144 bytes
Getting Status from port 0x0000
SPi flash found with Status 0x72
Sending Chip Erase to Port 0x0000
Erasing:
Done !
Loading firmware file C:\Users\carl\Desktop\slim rgh drive\Dummy.bin
MD5 hash: d1ba43aefb40f7ce2bda388d70051930
Inquiry string found
Identify string found
Drive key @ 0xA030 353EEBD79ECDE961D030C68B7796DE8B
Firmware Osig: [PLDS DG-16D4S 0401]
Firmware is: SlimKey Extract
Auto-Loading firmware file C:\Users\carl\Desktop\JungleFlasher v0.1.92 Beta (304)\firmware\LTPlus-0401-v3.0.bin
MD5 hash: 87fba52607d01d3c73722f9f818588c9
Genuine LT plus v3.0
Drive key @ n/a FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
Firmware Osig: [PLDS DG-16D4S 0401]
Firmware is: LT-Plus 3.0
Spoofing Target
DVD Key copied to target
Key Sector copied from Source to Target
Target is LT - ID strings not copied to Target
Loading firmware file C:\Users\carl\Desktop\JungleFlasher v0.1.92 Beta (304)\firmware\Stock firmware\LiteOn (Slim)\0272\Orig-0272.bin
MD5 hash: 371cb1cdf0c953534cbca83c6930abb9
Drive key @ n/a FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
Firmware Osig: [PLDS DG-16D4S 0272]
Firmware is: Stock
Spoofing Target
DVD Key copied to target
Key Sector copied from Source to Target
Target is LT - ID strings not copied to Target
Getting Status from port 0x0000
SPi flash found with Status 0x72
Sending Chip Erase to Port 0x0000
Erasing:
Writing target buffer to flash
Writing Bank 0: ................
Writing Bank 1: ................
Writing Bank 2: ................
Writing Bank 3: ................
............
Flash Verification Test !
Reading Bank 0: ................
Reading Bank 1: ................
Reading Bank 2: ................
Reading Bank 3: ................
Dumped in 3978mS
Write verified OK !
Restoring sector 0x3E000.
Sending Sector Erase to Port 0x0000
Erasing: 0x3E000
Writing: 0x3E000
............
Authorisation Failed!
Restore Verify Failed !