~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
JungleFlasher 0.1.90 Beta (293)
Session Started Fri Dec 23 13:48:24 2011
This is a 32 bit process running on 4 x 32 bit CPUs
X360USB PRO detected, Version 0.18
Found 1 I/O Ports.
Found 1 Com Ports.
Found 2 windows drives C: D:
Found 1 CD/DVD drives D:
Sending Sammy_Un_Lock to Drive on port 0x0000
Stage 1, Complete!
Stage 2, Complete!
Stage 3, Complete!
Done!
Sending Vendor Intro
Requesting Device ID
Manufacturer ID: 0xBF
Device ID: 0xB6
Flash Name: SST(SST39SF020)
Flash Size: 262144 bytes
Loading firmware file C:\Documents and Settings\KIERAN\My Documents\SAM-OFW.bin
MD5 hash: 89b5ea5cc3b9fa414375c7a939929f5a
Inquiry string found
Identify string found
Drive key @ 0x406E xxxxxxxxxxxxxxxxxxxxxxxx
Firmware Osig: [TSSTcorpDVD-ROM TS-H943Ams28]
Firmware is: LT v2.01
Auto-Loading firmware file C:\Documents and Settings\KIERAN\Desktop\JungleFlasher v0.1.90 Beta (293)\firmware\LT-sammy-v2.01.bin
MD5 hash: d66252800c1c072bc612f2f72d1e3c76
Genuine LT v2.01
Inquiry string found
Identify string found
Drive key @ 0x4044 FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
Firmware Osig: [TSSTcorpDVD-ROM TS-H943Ams28]
Firmware is: LT v2.01
Spoofing Target
DVD Key copied to target
ID strings already match
Spoofing Target
DVD Key already matches
ID strings already match