Right have you flashed SAM_OFW from the Samsung_Post_13141 folder ??
What you do is load your original dump in the open source firmware it will ask to to auto load fw say no then you manually load SAM_OFW from the Samsung_Post_13141 folder to the open target firmware then click spoof source to target then you unlock the sammy and write the fw ...
i have tried that but doesnt seem to work :facepalm:
can you see in my log if i'm doing it wrong? would this be the reason for 3 red lights? thanks again.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
JungleFlasher 0.1.91 Beta (300)
Session Started Sun Jan 15 01:10:49 2012
This is a Wow 64 process running on 2 x 64 bit CPUs
X360USB PRO detected, Version 0.18
Found 1 I/O Ports.
Found 1 Com Ports.
Found 2 windows drives C: D:
Found 1 CD/DVD drives D:
Loading firmware file C:\Users\Ryan and Laura\Desktop\Everything to Flash\SAM-OFW.bin
MD5 hash: c9350a4f0e1fccf516d1e3a1a5a3185b
Inquiry string found
Identify string found
Drive key @ 0x40EC E9****************B
Firmware Osig: [TSSTcorpDVD-ROM TS-H943Ams25]
Firmware is: Stock
Loading firmware file C:\Users\Ryan and Laura\Desktop\Everything to Flash\JungleFlasher (LT+ 3.0)\Firmware\Stock Firmware\Samsung\Samsung_Post_13141\SAM_OFW.bin
MD5 hash: e*************************e
Inquiry string found
Identify string found
Drive key @ 0x4140 00000000000000000000000000000000
Firmware Osig: [TSSTcorpDVD-ROM TS-H943Ams28]
Firmware is: Stock
Spoofing Target
DVD Key copied to target
Inquiry string copied to Target
Identify string copied to Target
Sending Sammy_Un_Lock to Drive on port 0x0000
Stage 1, Complete!
Stage 2, Complete!
Stage 3, Complete!
Done!
Sending Vendor Intro
Requesting Device ID
Manufacturer ID: 0xBF
Device ID: 0xB6
Flash Name: SST(SST39SF020)
Flash Size: 262144 bytes
Getting Status from port 0x0000
Parallel flash found with Status 0x70
Writing target buffer to flash
Sending Chip Erase request to port 0x0000
Erasing:............
Writing Bank 0: ................
Writing Bank 1: ................
Writing Bank 2: ................
Writing Bank 3: ................
Flash Verification Test !
Reading Bank 0: ................
Reading Bank 1: ................
Reading Bank 2: ................
Reading Bank 3: ................
Write verified OK !
Sending Vendor Outro to port 0x0000
Key found in KeyDB at record (2 - Desktop)
Key is: E***************************B
Key has been tested and verified, thanks C4eva !
Drive is Samsung..