ne ten ir buvo seniau liteonas ten kur buvo hitachi guli jau sutvarkytas veikiantis normaliai viskas su juo bet su situ problemos tik va to jungle flasher logas
Ne į temą JungleFlasher 0.1.64 BetaSession Started Wed Jul 15 07:52:31 2009 This is a 32 bit process running on a 32 bit CPU PortIO is installed and running. Found 9 I/O Ports. Found 2 Com Ports. Found 6 windows drives A: C: D: E: F: G: Found 2 CD/DVD drives F: G: Loading Source File C:\Documents and Settings\RolKiss\Desktop\Liteon 2008 -08\Dummy.bin Inquiry string found Identify string found DVD key found @ 0xA030 key is F48D721C31A1E554EB3AB8BC92AC8C6E Firmware is a Lite-On Dummy OSIG: PLDS DG-16D2S 7485 Loading Fixed Dummy.bin file Inquiry string found Identify string found DVD key found @ 0xA030 key is F48D721C31A1E554EB3AB8BC92AC8C6E Firmware is a Lite-On Dummy OSIG: PLDS DG-16D2S 7485 Firmware type is: DVDKey32 extract Loading target file C:\Documents and Settings\RolKiss\Desktop\Liteon 2008 -08\Dummy.bin Target File MD5 hash is: 05af488d7f7d4da30d9e0a9f952ce3d1 Inquiry string found Dummy f/w, not suitable as target, load aborted Loading target file C:\Documents and Settings\RolKiss\Desktop\Liteon 2008 -08\dummy_fixed.bin Target File MD5 hash is: df5a0f57bfe94fb63d556cf9ea098180 Inquiry string found Dummy f/w, not suitable as target, load aborted Loading target file E:\Firmwere hacking soft\ix15-liteon.bin Target File MD5 hash is: d8aaa30797c7680109b395bc3a380d5f Genuine Lite-On iXtreme 1.5 Final Inquiry area found Current DVD key is 55AA55AA55AA55AA55AA55AA55AA55AA Firmware is a Lite-On encrypted iXtreme OSIG: PLDS DG-16D2S 7485 Firmware type is: iXtreme v1.50-12X DVD Key copied to target Inquiry string copied from Source to Target Identify string copied from Source to Target Serial strings copied from Source to Target Sending iXtreme DVDkey request to port 0x9000 iXtreme DVDkey extraction failed! Sending Lite-On-Erase request to port 0x9000 .............. Drive returned Status 0xD1 ............ Serial flash found with Status 0x72 Sending Vendor Outro to port 0x9000 Manufacturer ID: 0xC2 Device ID: 0x11 Flash Name: MXIC(MX25L2005) Flash Size: 262144 bytes Getting Status from port 0x9000 SPi flash found with Status 0x72 Sending Chip Erase to Port 0x9000 Writing target buffer to flash Writing Bank 0: ................ Writing Bank 1: ................ Writing Bank 2: ................ Writing Bank 3: ................ Flash Verification Test ! Reading Bank 0: ................ Reading Bank 1: ................ Reading Bank 2: ................ Reading Bank 3: ................ Write verified OK ! Sending iXtreme DVDkey request to port 0x9000 Extracted drive key F48D721C31A1E554EB3AB8BC92AC8C6E iXtreme v1.50-12x- Key data saved to C:\Documents and Settings\RolKiss\Desktop\Elite\6\Key.bin 0000: 05 80 00 32 5B 00 00 00 - 50 4C 44 53 20 20 20 20 ...2[...PLDS 0010: 44 47 2D 31 36 44 32 53 - 20 20 20 20 20 20 20 20 DG-16D2S 0020: 37 34 38 35 30 43 41 30 - 41 31 44 36 30 38 43 47 74850CA0A1D608CG 0030: 38 32 39 38 30 33 30 30 - 54 32 32 20 20 20 00 00 82980300T22 .. 0040: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 0050: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ Inquiry String saved to C:\Documents and Settings\RolKiss\Desktop\Elite\6\Inquiry.bin 0000: C0 85 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 0010: 00 00 00 00 44 36 30 38 - 43 47 38 32 39 38 30 33 ....D608CG829803 0020: 30 30 54 32 32 20 20 20 - 00 00 00 00 00 00 34 37 00T22 ......47 0030: 35 38 43 30 20 20 4C 50 - 53 44 20 20 20 20 47 44 58C0 LPSD GD 0040: 31 2D 44 36 53 32 20 20 - 20 20 20 20 20 20 20 20 1-D6S2 0050: 20 20 20 20 20 20 20 20 - 20 20 20 20 20 20 00 00 .. 0060: 00 00 00 0B 00 00 00 04 - 00 02 06 00 00 00 00 00 ................ 0070: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 0080: 03 00 78 00 78 00 E3 00 - 78 00 00 00 00 00 00 00 ..x.x...x....... 0090: 00 00 00 00 00 00 00 00 - 02 02 00 00 68 00 00 00 ............h... 00A0: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 00B0: 20 20 00 00 .. Identify String saved to C:\Documents and Settings\RolKiss\Desktop\Elite\6\Identify.bin 0000: 44 36 30 38 43 47 38 32 - 39 38 30 33 30 30 54 32 D608CG82980300T2 0010: 32 20 20 20 FF FF FF FF - 38 47 30 37 30 39 32 34 2 ....8G070924 0020: 31 37 41 33 31 34 58 58 - 41 30 FF FF 53 34 50 38 17A314XXA0..S4P8 0030: 37 31 35 30 30 30 30 30 - 31 30 38 36 31 32 00 00 71500000108612.. 0040: FF FF FF FF FF FF FF FF - FF FF FF FF 41 31 FF FF ............A1.. Dummy.bin file saved to C:\Documents and Settings\RolKiss\Desktop\Elite\6\Dummy.bin Loading DVDkey source file Inquiry string found Identify string found DVD key found @ 0xA030 key is F48D721C31A1E554EB3AB8BC92AC8C6E Firmware is a Lite-On Dummy OSIG: PLDS DG-16D2S 7485 Firmware type is: iXtreme v1.50-12x- Auto-Loading target file E:\Firmwere hacking soft\JungleFlasher.0.1.64.Beta\JungleFlasher v0.1.64 Beta\firmware\ix16-liteon.bin Target File MD5 hash is: c3a17c9726f4be3cc3e597797caba7f9 Genuine Lite-On iXtreme 1.6 Inquiry area found Current DVD key is 55AA55AA55AA55AA55AA55AA55AA55AA Firmware is a Lite-On encrypted iXtreme OSIG: PLDS DG-16D2S 7485 Firmware type is: iXtreme v1.60-12X-FINAL-DG-16D2S DVD Key copied to target Inquiry string copied from Source to Target Identify string copied from Source to Target Serial strings copied from Source to Target Key database updated Loading Source File C:\Documents and Settings\RolKiss\Desktop\Elite\6\Dummy.bin Inquiry string found Identify string found DVD key found @ 0xA030 key is F48D721C31A1E554EB3AB8BC92AC8C6E Firmware is a Lite-On Dummy OSIG: PLDS DG-16D2S 7485 Firmware type is: iXtreme v1.50-12x- Sending Vendor Outro to port 0x9000 Loading Source File C:\Documents and Settings\RolKiss\Desktop\Elite\6\Dummy.bin Inquiry string found Identify string found DVD key found @ 0xA030 key is F48D721C31A1E554EB3AB8BC92AC8C6E Firmware is a Lite-On Dummy OSIG: PLDS DG-16D2S 7485 Firmware type is: iXtreme v1.50-12x- Loading Source File C:\Documents and Settings\RolKiss\Desktop\Elite\Dummy.bin Inquiry string found Identify string found DVD key found @ 0xA030 key is F48D721C31A1E554EB3AB8BC92AC8C6E Firmware is a Lite-On Dummy OSIG: PLDS DG-16D2S 7485 Firmware spoofed as: HL-DT-STDVD-ROM GDR3120L0078 Firmware type is: iXtreme v1.60-12x- Loading Source File C:\Documents and Settings\RolKiss\Desktop\Liteon 2008 -08\dummy_fixed.bin Inquiry string found Identify string found DVD key found @ 0xA030 key is F48D721C31A1E554EB3AB8BC92AC8C6E Firmware is a Lite-On Dummy OSIG: PLDS DG-16D2S 7485 Firmware type is: DVDKey32 extract Loading Source File C:\Documents and Settings\RolKiss\Desktop\Liteon 2008 -08\Dummy.bin Inquiry string found Identify string found DVD key found @ 0xA030 key is F48D721C31A1E554EB3AB8BC92AC8C6E Firmware is a Lite-On Dummy OSIG: PLDS DG-16D2S 7485 Loading Fixed Dummy.bin file Inquiry string found Identify string found DVD key found @ 0xA030 key is F48D721C31A1E554EB3AB8BC92AC8C6E Firmware is a Lite-On Dummy OSIG: PLDS DG-16D2S 7485 Firmware type is: DVDKey32 extract Loading target file E:\Firmwere hacking soft\ix15-liteon.bin Target File MD5 hash is: d8aaa30797c7680109b395bc3a380d5f Genuine Lite-On iXtreme 1.5 Final Inquiry area found Current DVD key is 55AA55AA55AA55AA55AA55AA55AA55AA Firmware is a Lite-On encrypted iXtreme OSIG: PLDS DG-16D2S 7485 Firmware type is: iXtreme v1.50-12X DVD Key copied to target Inquiry string copied from Source to Target Identify string copied from Source to Target Serial strings copied from Source to Target Sending Lite-On-Erase request to port 0x9000 .............. Drive returned Status 0xD0 ............ Serial flash found with Status 0x72 Sending Vendor Outro to port 0x9000 Manufacturer ID: 0xC2 Device ID: 0x11 Flash Name: MXIC(MX25L2005) Flash Size: 262144 bytes Getting Status from port 0x9000 SPi flash found with Status 0x72 Sending Chip Erase to Port 0x9000 Writing target buffer to flash Writing Bank 0: ................ Writing Bank 1: ................ Writing Bank 2: ................ Writing Bank 3: ................ Flash Verification Test ! Reading Bank 0: ................ Reading Bank 1: ................ Reading Bank 2: ................ Reading Bank 3: ................ Write verified OK ! Sending Vendor Outro to port 0x9000