Guest User

CASUAL r515-androidbeast503

a guest
Jun 14th, 2013
68
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 11.31 KB | None | 0 0
  1. [INFO]We are running Windows 7
  2. Creating Temp Folder in:C:\Users\Aarons\AppData\Local\Temp\AaronsTEMPCASUALC35273F5\CASUAL Cross-platform Android Scripting and Unified Auxiliary Loader
  3. Revision:515 build:3,777
  4. CASUAL Copyright (C) 2013 Adam Outler
  5. This program comes with ABSOLUTELY NO WARRANTY. This is free software,
  6. and you are welcome to redistribute it, under certain conditions; run
  7. 'C:\Users\Aarons\Desktop\NoYouVerizon-GalaxyNote2-CASUAL%20R515.jar --license'
  8. for details. http://android-casual.googlecode.com for source.
  9. [DEBUG]Picking Jar File:/C:/Users/Aarons/Desktop/NoYouVerizon-GalaxyNote2-CASUAL%20R515.jar
  10. [DEBUG]Found Windows Computer
  11. [DEBUG]Found: Galaxy Note 2 Jailbreak-NoYouVerizon
  12. [DEBUG]Attempting to write C:\Users\Aarons\AppData\Local\Temp\AaronsTEMPCASUALC35273F5\Elevate.exe
  13. [DEBUG]File verified.
  14. [DEBUG]Attempting to write C:\Users\Aarons\AppData\Local\Temp\AaronsTEMPCASUALC35273F5\adb.exe
  15. [DEBUG]File verified.
  16. [DEBUG]Attempting to write C:\Users\Aarons\AppData\Local\Temp\AaronsTEMPCASUALC35273F5\AdbWinApi.dll
  17. [DEBUG]File verified.
  18. [DEBUG]Attempting to write C:\Users\Aarons\AppData\Local\Temp\AaronsTEMPCASUALC35273F5\AdbWinUsbApi.dll
  19. [DEBUG]OMFGWOOT GUI running!
  20. [INFO]This is a tool which will root, unlock, and install a custom recovery on a Verizon Galaxy Note 2.
  21.  
  22. [DEBUG]Searching for scripts
  23. [DEBUG]Updating Scripts for UI
  24. [VERBOSE]From Resource: true
  25. [INFO]--Galaxy Note 2 Jailbreak-NoYouVerizon--
  26. [INFO]This is a tool which will root, unlock, and install a custom recovery on a Verizon Galaxy Note 2. Put your device into ADB mode. Credit for this exploit goes to Lee Harrison
  27.  
  28. [DEBUG]Created zipResource at /SCRIPTS/Galaxy Note 2 Jailbreak-NoYouVerizon.zip
  29. [DEBUG]Exiting comboBoxUpdate()
  30. [DEBUG]attempted to lock controls but controls are not availble yet
  31. [DEBUG]Extracting archive....
  32. [DEBUG]Target Script Is resource
  33. [DEBUG]File verified.
  34. [VERBOSE]Unzipping Superuser.apk
  35. [DEBUG]sleeping for Windows ADB start
  36. [VERBOSE]Unzipping busybox
  37. [VERBOSE]Unzipping exploit
  38. [VERBOSE]Unzipping exynos-abuse
  39. [VERBOSE]Unzipping rootGN.sh
  40. [VERBOSE]Unzipping swagBoot
  41. [VERBOSE]Unzipping sch-i605-16gb.pit
  42. [VERBOSE]Unzipping sboot.bin
  43. [VERBOSE]Unzipping recoverThis
  44. [VERBOSE]Unzipping boot.img
  45. [VERBOSE]Unzipping su
  46. [VERBOSE]Unzip Complete
  47. [DEBUG]Attempting to write C:\Users\Aarons\AppData\Local\Temp\AaronsTEMPCASUALC35273F5\adb_usb.ini
  48. [DEBUG]File verified.
  49. [DEBUG]###executing: C:\Users\Aarons\AppData\Local\Temp\AaronsTEMPCASUALC35273F5\adb.exe###
  50. [VERBOSE]List of devices attached
  51. [DEBUG]Device List:
  52.  
  53.  
  54.  
  55. [DEBUG]unknown
  56.  
  57. [DEBUG]State Change Detected, The new state is: 1
  58. [DEBUG]State Connected commanded
  59. [ERROR]
  60. [DEBUG]StartButtonActionPerformed() Script Activated
  61. [DEBUG]Script known as Galaxy Note 2 Jailbreak-NoYouVerizon is running
  62. [DEBUG]disk location for script resources
  63. [DEBUG]Loading internal resource: Galaxy Note 2 Jailbreak-NoYouVerizon
  64. [DEBUG]Selected resourceGalaxy Note 2 Jailbreak-NoYouVerizon
  65. [DEBUG]Lines in Script 64
  66. [DEBUG]Executing Scripted Datastreamjava.io.DataInputStream@13fde6e
  67. [DEBUG]CASUAL has initiated a multithreaded execution environment
  68. [DEBUG]/SCRIPTS/Galaxy Note 2 Jailbreak-NoYouVerizon not found in repository.
  69. [DEBUG]Reading datastreamjava.io.DataInputStream@13fde6e
  70. [DEBUG]SCRIPT COMMAND:$USERCANCELOPTION Are you sure?, This is your only warning.\n You will be Unlocked and Rooted. Your device will\n reboot once and then again into Odin mode. CASUAL\n will then flash the No You Verizon Bootloader\n package for you.
  71. [DEBUG]SCRIPT COMMAND:$ECHO Rebooting into download mode
  72. [DEBUG]Received ECHO command$ECHO Rebooting into download mode
  73. [INFO]Rebooting into download mode
  74. [DEBUG]SCRIPT COMMAND:$ADB reboot download
  75. [DEBUG]sending
  76. [DEBUG]###executing real-time command: C:\Users\Aarons\AppData\Local\Temp\AaronsTEMPCASUALC35273F5\adb.exe###
  77. [DEBUG]return from ADB:
  78. [DEBUG]SCRIPT COMMAND:$HEIMDALL flash --pit "$ZIPFILEsch-i605-16gb.pit" --repartition --BOOTLOADER "$ZIPFILEsboot.bin" --8 "$ZIPFILEboot.img"
  79. [VERBOSE]verified C:\Users\Aarons\AppData\Local\Temp\AaronsTEMPCASUALC35273F5\Galaxy Note 2 Jailbreak-NoYouVerizon\sch-i605-16gb.pit exists
  80. [VERBOSE]verified C:\Users\Aarons\AppData\Local\Temp\AaronsTEMPCASUALC35273F5\Galaxy Note 2 Jailbreak-NoYouVerizon\sboot.bin exists
  81. [VERBOSE]verified C:\Users\Aarons\AppData\Local\Temp\AaronsTEMPCASUALC35273F5\Galaxy Note 2 Jailbreak-NoYouVerizon\boot.img exists
  82. [DEBUG]Expanded $ZIPFILE: $HEIMDALL flash --pit "C:\Users\Aarons\AppData\Local\Temp\AaronsTEMPCASUALC35273F5\Galaxy Note 2 Jailbreak-NoYouVerizon\sch-i605-16gb.pit" --repartition --BOOTLOADER "C:\Users\Aarons\AppData\Local\Temp\AaronsTEMPCASUALC35273F5\Galaxy Note 2 Jailbreak-NoYouVerizon\sboot.bin" --8 "C:\Users\Aarons\AppData\Local\Temp\AaronsTEMPCASUALC35273F5\Galaxy Note 2 Jailbreak-NoYouVerizon\boot.img"
  83. [DEBUG]Received Command: flash --pit "C:\Users\Aarons\AppData\Local\Temp\AaronsTEMPCASUALC35273F5\Galaxy Note 2 Jailbreak-NoYouVerizon\sch-i605-16gb.pit" --repartition --BOOTLOADER "C:\Users\Aarons\AppData\Local\Temp\AaronsTEMPCASUALC35273F5\Galaxy Note 2 Jailbreak-NoYouVerizon\sboot.bin" --8 "C:\Users\Aarons\AppData\Local\Temp\AaronsTEMPCASUALC35273F5\Galaxy Note 2 Jailbreak-NoYouVerizon\boot.img"
  84. [DEBUG]verifying Heimdall deployment.
  85. [DEBUG]Attempting to write C:\Users\Aarons\AppData\Local\Temp\AaronsTEMPCASUALC35273F5\libusb-1.0.dll
  86. [DEBUG]File verified.
  87. [DEBUG]Attempting to write C:\Users\Aarons\AppData\Local\Temp\AaronsTEMPCASUALC35273F5\heimdall.exe
  88. [DEBUG]File verified.
  89. [VERBOSE]detected!
  90. [INFO]Executing Heimdall command.
  91. [VERBOSE]Performing standard Heimdall commandflash --pit "C:\Users\Aarons\AppData\Local\Temp\AaronsTEMPCASUALC35273F5\Galaxy Note 2 Jailbreak-NoYouVerizon\sch-i605-16gb.pit" --repartition --BOOTLOADER "C:\Users\Aarons\AppData\Local\Temp\AaronsTEMPCASUALC35273F5\Galaxy Note 2 Jailbreak-NoYouVerizon\sboot.bin" --8 "C:\Users\Aarons\AppData\Local\Temp\AaronsTEMPCASUALC35273F5\Galaxy Note 2 Jailbreak-NoYouVerizon\boot.img"
  92. [DEBUG]###executing real-time command: C:\Users\Aarons\AppData\Local\Temp\AaronsTEMPCASUALC35273F5\heimdall.exe###
  93. Waiting for Downoad Mode device.....Heimdall v1.4 RC2
  94.  
  95.  
  96.  
  97. Copyright (c) 2010-2012, Benjamin Dobell, Glass Echidna
  98.  
  99. http://www.glassechidna.com.au/
  100.  
  101.  
  102.  
  103. This software is provided free of charge. Copying and redistribution is
  104.  
  105. encouraged.
  106.  
  107.  
  108.  
  109. If you appreciate this software and you would like to support future
  110.  
  111. development please consider donating:
  112.  
  113. http://www.glassechidna.com.au/donate/
  114.  
  115.  
  116.  
  117. Initialising connection...
  118.  
  119. Detecting device...
  120.  
  121. Claiming interface...
  122.  
  123. Setting up interface...
  124.  
  125.  
  126.  
  127. Checking if protocol is initialised...
  128.  
  129. Protocol is not initialised.
  130.  
  131.  
  132.  
  133. Initialising protocol...
  134.  
  135. Protocol initialisation successful.
  136.  
  137.  
  138.  
  139. Beginning session...
  140.  
  141.  
  142.  
  143. This device may take up to 2 minutes to respond.
  144.  
  145. Please be patient!
  146.  
  147.  
  148.  
  149. Session begun.
  150.  
  151.  
  152.  
  153. Uploading PIT
  154.  
  155. PIT upload successful
  156.  
  157.  
  158.  
  159. Uploading BOOTLOADER
  160.  
  161. 0%
  162. 
  163. 100%
  164.  
  165. BOOTLOADER upload successful
  166.  
  167.  
  168.  
  169. Uploading BOOT
  170.  
  171. 0%
  172. 
  173. 19%
  174. 
  175. 
  176. 38%
  177. 
  178. 
  179. 57%
  180. 
  181. 
  182. 76%
  183. 
  184. 
  185. 95%
  186. 
  187. 
  188. 100%
  189.  
  190. BOOT upload successful
  191.  
  192.  
  193.  
  194. Ending session...
  195.  
  196. Rebooting device...
  197.  
  198. Releasing device interface...
  199.  
  200.  
  201.  
  202. [INFO]
  203. [Heimdall Success]
  204.  
  205.  
  206. [DEBUG]SCRIPT COMMAND:$ECHO Your device should be rebooting into Android now.
  207. [DEBUG]Received ECHO command$ECHO Your device should be rebooting into Android now.
  208. [INFO]Your device should be rebooting into Android now.
  209. [DEBUG]SCRIPT COMMAND:$ADB wait-for-device
  210. [INFO]Waiting for ADB device connection. When Windows 7 recognizes the device, we will continue. Don't touch anything.
  211. [DEBUG]sending
  212. [DEBUG]###executing real-time command: C:\Users\Aarons\AppData\Local\Temp\AaronsTEMPCASUALC35273F5\adb.exe###
  213. [DEBUG]return from ADB:
  214. [DEBUG]Ignoring commented line#Reboot to clear logs
  215. [DEBUG]SCRIPT COMMAND:shell "mkdir /data/local/tmp"
  216. [DEBUG]sending
  217. [DEBUG]###executing real-time command: C:\Users\Aarons\AppData\Local\Temp\AaronsTEMPCASUALC35273F5\adb.exe###
  218. mkdir failed for /data/local/tmp, File exists
  219.  
  220.  
  221. [DEBUG]return from ADB:mkdir failed for /data/local/tmp, File exists
  222.  
  223.  
  224. [DEBUG]SCRIPT COMMAND:$ECHO Pushing dependencies
  225. [DEBUG]Received ECHO command$ECHO Pushing dependencies
  226. [INFO]Pushing dependencies
  227. [DEBUG]SCRIPT COMMAND:$ECHO Pushing su binary...
  228. [DEBUG]Received ECHO command$ECHO Pushing su binary...
  229. [INFO]Pushing su binary...
  230. [DEBUG]SCRIPT COMMAND:push "$ZIPFILEsu" /data/local/tmp/
  231. [VERBOSE]verified C:\Users\Aarons\AppData\Local\Temp\AaronsTEMPCASUALC35273F5\Galaxy Note 2 Jailbreak-NoYouVerizon\su exists
  232. [DEBUG]Expanded $ZIPFILE: push "C:\Users\Aarons\AppData\Local\Temp\AaronsTEMPCASUALC35273F5\Galaxy Note 2 Jailbreak-NoYouVerizon\su" /data/local/tmp/
  233. [DEBUG]sending
  234. [DEBUG]###executing real-time command: C:\Users\Aarons\AppData\Local\Temp\AaronsTEMPCASUALC35273F5\adb.exe###
  235. 1205 KB/s (96260 bytes in 0.078s)
  236.  
  237. [DEBUG]return from ADB:1205 KB/s (96260 bytes in 0.078s)
  238.  
  239. [DEBUG]SCRIPT COMMAND:$ECHO Pushing SuperSU app...
  240. [DEBUG]Received ECHO command$ECHO Pushing SuperSU app...
  241. [INFO]Pushing SuperSU app...
  242. [DEBUG]SCRIPT COMMAND:push "$ZIPFILESuperuser.apk" /data/local/tmp/
  243. [VERBOSE]verified C:\Users\Aarons\AppData\Local\Temp\AaronsTEMPCASUALC35273F5\Galaxy Note 2 Jailbreak-NoYouVerizon\Superuser.apk exists
  244. [DEBUG]Expanded $ZIPFILE: push "C:\Users\Aarons\AppData\Local\Temp\AaronsTEMPCASUALC35273F5\Galaxy Note 2 Jailbreak-NoYouVerizon\Superuser.apk" /data/local/tmp/
  245. [DEBUG]sending
  246. [DEBUG]###executing real-time command: C:\Users\Aarons\AppData\Local\Temp\AaronsTEMPCASUALC35273F5\adb.exe###
  247. 4456 KB/s (996704 bytes in 0.218s)
  248.  
  249. [DEBUG]return from ADB:4456 KB/s (996704 bytes in 0.218s)
  250.  
  251. [DEBUG]SCRIPT COMMAND:$ECHO Pushing Exynos-Abuse exploit
  252. [DEBUG]Received ECHO command$ECHO Pushing Exynos-Abuse exploit
  253. [INFO]Pushing Exynos-Abuse exploit
  254. [DEBUG]SCRIPT COMMAND:push "$ZIPFILEexynos-abuse" /data/local/tmp/
  255. [ERROR][CRITICAL]1
  256. 1
  257. java.lang.ArrayIndexOutOfBoundsException: 1
  258.  
  259. java.lang.ArrayIndexOutOfBoundsException: 1
  260. at CASUAL.CASUALInteraction.showUserCancelOption(CASUALInteraction.java:144)
  261. at CASUAL.CASUALLanguage.commandHandler(CASUALLanguage.java:305)
  262. at CASUAL.CASUALLanguage.beginScriptingHandler(CASUALLanguage.java:66)
  263. at CASUAL.CASUALScriptParser$1.run(CASUALScriptParser.java:122)
  264. at java.lang.Thread.run(Unknown Source)
  265.  
  266. [ERROR]A critical error was encoutered. Please copy the log from About>Show Log and report this issue
  267. [ERROR][CRITICAL]CASUAL scripting error
  268. push "$ZIPFILEexynos-abuse" /data/local/tmp/
  269. CASUAL scripting error
  270. push "$ZIPFILEexynos-abuse" /data/local/tmp/
  271. java.lang.RuntimeException: CASUAL scripting error
  272. push "$ZIPFILEexynos-abuse" /data/local/tmp/
  273.  
  274. java.lang.RuntimeException: CASUAL scripting error
  275. push "$ZIPFILEexynos-abuse" /data/local/tmp/
  276. at CASUAL.CASUALLanguage.beginScriptingHandler(CASUALLanguage.java:73)
  277. at CASUAL.CASUALScriptParser$1.run(CASUALScriptParser.java:122)
  278. at java.lang.Thread.run(Unknown Source)
  279. Caused by: java.lang.ArrayIndexOutOfBoundsException: 1
  280. at CASUAL.CASUALInteraction.showUserCancelOption(CASUALInteraction.java:144)
  281. at CASUAL.CASUALLanguage.commandHandler(CASUALLanguage.java:305)
  282. at CASUAL.CASUALLanguage.beginScriptingHandler(CASUALLanguage.java:66)
  283. ... 2 more
  284.  
  285. [ERROR]A critical error was encoutered. Please copy the log from About>Show Log and report this issue
  286. [ERROR]CASUAL experienced an error while parsing command:
  287. push "$ZIPFILEexynos-abuse" /data/local/tmp/
  288. please report the above exception.
  289. [INFO]Script Complete
  290. [DEBUG]State Change Detected, The new state is: 0
  291. [DEBUG]State Disconnected commanded
  292. [DEBUG]Pastebin Login Successful
  293. [DEBUG]http://pastebin.com/sJQrsVX9
  294. [DEBUG]Pastebin Login Successful
Advertisement
Add Comment
Please, Sign In to add comment