Guest User

CASUAL r515-celyko

a guest
Jul 10th, 2013
68
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 20.06 KB | None | 0 0
  1. [INFO]We are running Windows 8
  2. Creating Temp Folder in:C:\Users\Cody\AppData\Local\Temp\CodyTEMPCASUAL4BA9856D\CASUAL Cross-platform Android Scripting and Unified Auxiliary Loader
  3. Revision:515 build:3,777
  4. CASUAL Copyright (C) 2013 Adam Outler
  5. This program comes with ABSOLUTELY NO WARRANTY. This is free software,
  6. and you are welcome to redistribute it, under certain conditions; run
  7. 'C:\Users\Cody\Documents\NoYouVerizon-GalaxyNote2-CASUAL%20R515.jar --license'
  8. for details. http://android-casual.googlecode.com for source.
  9. [DEBUG]Found Windows Computer
  10. [DEBUG]Picking Jar File:/C:/Users/Cody/Documents/NoYouVerizon-GalaxyNote2-CASUAL%20R515.jar
  11. [DEBUG]Found: Galaxy Note 2 Jailbreak-NoYouVerizon
  12. [DEBUG]Attempting to write C:\Users\Cody\AppData\Local\Temp\CodyTEMPCASUAL4BA9856D\Elevate.exe
  13. [DEBUG]File verified.
  14. [DEBUG]Attempting to write C:\Users\Cody\AppData\Local\Temp\CodyTEMPCASUAL4BA9856D\adb.exe
  15. [DEBUG]File verified.
  16. [DEBUG]Attempting to write C:\Users\Cody\AppData\Local\Temp\CodyTEMPCASUAL4BA9856D\AdbWinApi.dll
  17. [DEBUG]File verified.
  18. [DEBUG]Attempting to write C:\Users\Cody\AppData\Local\Temp\CodyTEMPCASUAL4BA9856D\AdbWinUsbApi.dll
  19. [DEBUG]File verified.
  20. [DEBUG]sleeping for Windows ADB start
  21. [DEBUG]OMFGWOOT GUI running!
  22. [INFO]This is a tool which will root, unlock, and install a custom recovery on a Verizon Galaxy Note 2.
  23.  
  24. [DEBUG]Searching for scripts
  25. [DEBUG]Updating Scripts for UI
  26. [VERBOSE]From Resource: true
  27. [INFO]--Galaxy Note 2 Jailbreak-NoYouVerizon--
  28. [INFO]This is a tool which will root, unlock, and install a custom recovery on a Verizon Galaxy Note 2. Put your device into ADB mode. Credit for this exploit goes to Lee Harrison
  29.  
  30. [DEBUG]Created zipResource at /SCRIPTS/Galaxy Note 2 Jailbreak-NoYouVerizon.zip
  31. [DEBUG]Exiting comboBoxUpdate()
  32. [DEBUG]attempted to lock controls but controls are not availble yet
  33. [DEBUG]Extracting archive....
  34. [DEBUG]Target Script Is resource
  35. [VERBOSE]Unzipping Superuser.apk
  36. [VERBOSE]Unzipping busybox
  37. [VERBOSE]Unzipping exploit
  38. [VERBOSE]Unzipping exynos-abuse
  39. [VERBOSE]Unzipping rootGN.sh
  40. [VERBOSE]Unzipping swagBoot
  41. [VERBOSE]Unzipping sch-i605-16gb.pit
  42. [VERBOSE]Unzipping sboot.bin
  43. [VERBOSE]Unzipping recoverThis
  44. [VERBOSE]Unzipping boot.img
  45. [DEBUG]Attempting to write C:\Users\Cody\AppData\Local\Temp\CodyTEMPCASUAL4BA9856D\adb_usb.ini
  46. [DEBUG]File verified.
  47. [DEBUG]###executing: C:\Users\Cody\AppData\Local\Temp\CodyTEMPCASUAL4BA9856D\adb.exe###
  48. [VERBOSE]Unzipping su
  49. [VERBOSE]Unzip Complete
  50. [VERBOSE]List of devices attached
  51. [DEBUG]unknown
  52.  
  53. [DEBUG]Device List:
  54.  
  55.  
  56.  
  57. [DEBUG]State Change Detected, The new state is: 1
  58. [DEBUG]State Connected commanded
  59. [ERROR]
  60. [DEBUG]StartButtonActionPerformed() Script Activated
  61. [DEBUG]Script known as Galaxy Note 2 Jailbreak-NoYouVerizon is running
  62. [DEBUG]disk location for script resources
  63. [DEBUG]Loading internal resource: Galaxy Note 2 Jailbreak-NoYouVerizon
  64. [DEBUG]Selected resourceGalaxy Note 2 Jailbreak-NoYouVerizon
  65. [DEBUG]Lines in Script 64
  66. [DEBUG]Executing Scripted Datastreamjava.io.DataInputStream@d7cf62
  67. [DEBUG]CASUAL has initiated a multithreaded execution environment
  68. [DEBUG]/SCRIPTS/Galaxy Note 2 Jailbreak-NoYouVerizon not found in repository.
  69. [DEBUG]Reading datastreamjava.io.DataInputStream@d7cf62
  70. [DEBUG]SCRIPT COMMAND:$USERCANCELOPTION Are you sure?, This is your only warning.\n You will be Unlocked and Rooted. Your device will\n reboot once and then again into Odin mode. CASUAL\n will then flash the No You Verizon Bootloader\n package for you.
  71. [DEBUG]SCRIPT COMMAND:$ECHO Rebooting into download mode
  72. [DEBUG]Received ECHO command$ECHO Rebooting into download mode
  73. [INFO]Rebooting into download mode
  74. [DEBUG]SCRIPT COMMAND:$ADB reboot download
  75. [DEBUG]sending
  76. [DEBUG]###executing real-time command: C:\Users\Cody\AppData\Local\Temp\CodyTEMPCASUAL4BA9856D\adb.exe###
  77. [DEBUG]return from ADB:
  78. [DEBUG]SCRIPT COMMAND:$HEIMDALL flash --pit "$ZIPFILEsch-i605-16gb.pit" --repartition --BOOTLOADER "$ZIPFILEsboot.bin" --8 "$ZIPFILEboot.img"
  79. [VERBOSE]verified C:\Users\Cody\AppData\Local\Temp\CodyTEMPCASUAL4BA9856D\Galaxy Note 2 Jailbreak-NoYouVerizon\sch-i605-16gb.pit exists
  80. [VERBOSE]verified C:\Users\Cody\AppData\Local\Temp\CodyTEMPCASUAL4BA9856D\Galaxy Note 2 Jailbreak-NoYouVerizon\sboot.bin exists
  81. [VERBOSE]verified C:\Users\Cody\AppData\Local\Temp\CodyTEMPCASUAL4BA9856D\Galaxy Note 2 Jailbreak-NoYouVerizon\boot.img exists
  82. [DEBUG]Expanded $ZIPFILE: $HEIMDALL flash --pit "C:\Users\Cody\AppData\Local\Temp\CodyTEMPCASUAL4BA9856D\Galaxy Note 2 Jailbreak-NoYouVerizon\sch-i605-16gb.pit" --repartition --BOOTLOADER "C:\Users\Cody\AppData\Local\Temp\CodyTEMPCASUAL4BA9856D\Galaxy Note 2 Jailbreak-NoYouVerizon\sboot.bin" --8 "C:\Users\Cody\AppData\Local\Temp\CodyTEMPCASUAL4BA9856D\Galaxy Note 2 Jailbreak-NoYouVerizon\boot.img"
  83. [DEBUG]Received Command: flash --pit "C:\Users\Cody\AppData\Local\Temp\CodyTEMPCASUAL4BA9856D\Galaxy Note 2 Jailbreak-NoYouVerizon\sch-i605-16gb.pit" --repartition --BOOTLOADER "C:\Users\Cody\AppData\Local\Temp\CodyTEMPCASUAL4BA9856D\Galaxy Note 2 Jailbreak-NoYouVerizon\sboot.bin" --8 "C:\Users\Cody\AppData\Local\Temp\CodyTEMPCASUAL4BA9856D\Galaxy Note 2 Jailbreak-NoYouVerizon\boot.img"
  84. [DEBUG]verifying Heimdall deployment.
  85. [DEBUG]Attempting to write C:\Users\Cody\AppData\Local\Temp\CodyTEMPCASUAL4BA9856D\libusb-1.0.dll
  86. [DEBUG]File verified.
  87. [DEBUG]Attempting to write C:\Users\Cody\AppData\Local\Temp\CodyTEMPCASUAL4BA9856D\heimdall.exe
  88. [DEBUG]File verified.
  89. [DEBUG]Attempting to write C:\Users\Cody\AppData\Local\Temp\CodyTEMPCASUAL4BA9856D\msvcp110.dll
  90. [DEBUG]File verified.
  91. [DEBUG]Attempting to write C:\Users\Cody\AppData\Local\Temp\CodyTEMPCASUAL4BA9856D\msvcr110.dll
  92. [DEBUG]File verified.
  93. [VERBOSE]detected!
  94. [INFO]Executing Heimdall command.
  95. [VERBOSE]Performing standard Heimdall commandflash --pit "C:\Users\Cody\AppData\Local\Temp\CodyTEMPCASUAL4BA9856D\Galaxy Note 2 Jailbreak-NoYouVerizon\sch-i605-16gb.pit" --repartition --BOOTLOADER "C:\Users\Cody\AppData\Local\Temp\CodyTEMPCASUAL4BA9856D\Galaxy Note 2 Jailbreak-NoYouVerizon\sboot.bin" --8 "C:\Users\Cody\AppData\Local\Temp\CodyTEMPCASUAL4BA9856D\Galaxy Note 2 Jailbreak-NoYouVerizon\boot.img"
  96. [DEBUG]###executing real-time command: C:\Users\Cody\AppData\Local\Temp\CodyTEMPCASUAL4BA9856D\heimdall.exe###
  97. Waiting for Downoad Mode device.....Heimdall v1.4 RC2
  98.  
  99.  
  100.  
  101. Copyright (c) 2010-2012, Benjamin Dobell, Glass Echidna
  102.  
  103. http://www.glassechidna.com.au/
  104.  
  105.  
  106.  
  107. This software is provided free of charge. Copying and redistribution is
  108.  
  109. encouraged.
  110.  
  111.  
  112.  
  113. If you appreciate this software and you would like to support future
  114.  
  115. development please consider donating:
  116.  
  117. http://www.glassechidna.com.au/donate/
  118.  
  119.  
  120.  
  121. Initialising connection...
  122.  
  123. Detecting device...
  124.  
  125. Claiming interface...
  126.  
  127. Setting up interface...
  128.  
  129.  
  130.  
  131. Checking if protocol is initialised...
  132.  
  133. Protocol is not initialised.
  134.  
  135.  
  136.  
  137. Initialising protocol...
  138.  
  139. Protocol initialisation successful.
  140.  
  141.  
  142.  
  143. Beginning session...
  144.  
  145.  
  146.  
  147. This device may take up to 2 minutes to respond.
  148.  
  149. Please be patient!
  150.  
  151.  
  152.  
  153. Session begun.
  154.  
  155.  
  156.  
  157. Uploading PIT
  158.  
  159. PIT upload successful
  160.  
  161.  
  162.  
  163. Uploading BOOTLOADER
  164.  
  165. 0%
  166. 
  167. 100%
  168.  
  169. BOOTLOADER upload successful
  170.  
  171.  
  172.  
  173. Uploading BOOT
  174.  
  175. 0%
  176. 
  177. 19%
  178. 
  179. 
  180. 38%
  181. 
  182. 
  183. 57%
  184. 
  185. 
  186. 76%
  187. 
  188. 
  189. 95%
  190. 
  191. 
  192. 100%
  193.  
  194. BOOT upload successful
  195.  
  196.  
  197.  
  198. Ending session...
  199.  
  200. Rebooting device...
  201.  
  202. Releasing device interface...
  203.  
  204.  
  205.  
  206. [INFO]
  207. [Heimdall Success]
  208.  
  209.  
  210. [DEBUG]SCRIPT COMMAND:$ECHO Your device should be rebooting into Android now.
  211. [DEBUG]Received ECHO command$ECHO Your device should be rebooting into Android now.
  212. [INFO]Your device should be rebooting into Android now.
  213. [DEBUG]SCRIPT COMMAND:$ADB wait-for-device
  214. [INFO]Waiting for ADB device connection. When Windows 8 recognizes the device, we will continue. Don't touch anything.
  215. [DEBUG]sending
  216. [DEBUG]###executing real-time command: C:\Users\Cody\AppData\Local\Temp\CodyTEMPCASUAL4BA9856D\adb.exe###
  217. [DEBUG]return from ADB:
  218. [DEBUG]Ignoring commented line#Reboot to clear logs
  219. [DEBUG]SCRIPT COMMAND:shell "mkdir /data/local/tmp"
  220. [DEBUG]sending
  221. [DEBUG]###executing real-time command: C:\Users\Cody\AppData\Local\Temp\CodyTEMPCASUAL4BA9856D\adb.exe###
  222. mkdir failed for /data/local/tmp, File exists
  223.  
  224.  
  225. [DEBUG]return from ADB:mkdir failed for /data/local/tmp, File exists
  226.  
  227.  
  228. [DEBUG]SCRIPT COMMAND:$ECHO Pushing dependencies
  229. [DEBUG]Received ECHO command$ECHO Pushing dependencies
  230. [INFO]Pushing dependencies
  231. [DEBUG]SCRIPT COMMAND:$ECHO Pushing su binary...
  232. [DEBUG]Received ECHO command$ECHO Pushing su binary...
  233. [INFO]Pushing su binary...
  234. [DEBUG]SCRIPT COMMAND:push "$ZIPFILEsu" /data/local/tmp/
  235. [VERBOSE]verified C:\Users\Cody\AppData\Local\Temp\CodyTEMPCASUAL4BA9856D\Galaxy Note 2 Jailbreak-NoYouVerizon\su exists
  236. [DEBUG]Expanded $ZIPFILE: push "C:\Users\Cody\AppData\Local\Temp\CodyTEMPCASUAL4BA9856D\Galaxy Note 2 Jailbreak-NoYouVerizon\su" /data/local/tmp/
  237. [DEBUG]sending
  238. [DEBUG]###executing real-time command: C:\Users\Cody\AppData\Local\Temp\CodyTEMPCASUAL4BA9856D\adb.exe###
  239. 5532 KB/s (96260 bytes in 0.016s)
  240.  
  241. [DEBUG]return from ADB:5532 KB/s (96260 bytes in 0.016s)
  242.  
  243. [DEBUG]SCRIPT COMMAND:$ECHO Pushing SuperSU app...
  244. [DEBUG]Received ECHO command$ECHO Pushing SuperSU app...
  245. [INFO]Pushing SuperSU app...
  246. [DEBUG]SCRIPT COMMAND:push "$ZIPFILESuperuser.apk" /data/local/tmp/
  247. [VERBOSE]verified C:\Users\Cody\AppData\Local\Temp\CodyTEMPCASUAL4BA9856D\Galaxy Note 2 Jailbreak-NoYouVerizon\Superuser.apk exists
  248. [DEBUG]Expanded $ZIPFILE: push "C:\Users\Cody\AppData\Local\Temp\CodyTEMPCASUAL4BA9856D\Galaxy Note 2 Jailbreak-NoYouVerizon\Superuser.apk" /data/local/tmp/
  249. [DEBUG]sending
  250. [DEBUG]###executing real-time command: C:\Users\Cody\AppData\Local\Temp\CodyTEMPCASUAL4BA9856D\adb.exe###
  251. 6524 KB/s (996704 bytes in 0.149s)
  252.  
  253. [DEBUG]return from ADB:6524 KB/s (996704 bytes in 0.149s)
  254.  
  255. [DEBUG]SCRIPT COMMAND:$ECHO Pushing Exynos-Abuse exploit
  256. [DEBUG]Received ECHO command$ECHO Pushing Exynos-Abuse exploit
  257. [INFO]Pushing Exynos-Abuse exploit
  258. [DEBUG]SCRIPT COMMAND:push "$ZIPFILEexynos-abuse" /data/local/tmp/
  259. [ERROR][CRITICAL]1
  260. 1
  261. java.lang.ArrayIndexOutOfBoundsException: 1
  262.  
  263. java.lang.ArrayIndexOutOfBoundsException: 1
  264. at CASUAL.CASUALInteraction.showUserCancelOption(CASUALInteraction.java:144)
  265. at CASUAL.CASUALLanguage.commandHandler(CASUALLanguage.java:305)
  266. at CASUAL.CASUALLanguage.beginScriptingHandler(CASUALLanguage.java:66)
  267. at CASUAL.CASUALScriptParser$1.run(CASUALScriptParser.java:122)
  268. at java.lang.Thread.run(Unknown Source)
  269.  
  270. [ERROR]A critical error was encoutered. Please copy the log from About>Show Log and report this issue
  271. [ERROR][CRITICAL]CASUAL scripting error
  272. push "$ZIPFILEexynos-abuse" /data/local/tmp/
  273. CASUAL scripting error
  274. push "$ZIPFILEexynos-abuse" /data/local/tmp/
  275. java.lang.RuntimeException: CASUAL scripting error
  276. push "$ZIPFILEexynos-abuse" /data/local/tmp/
  277.  
  278. java.lang.RuntimeException: CASUAL scripting error
  279. push "$ZIPFILEexynos-abuse" /data/local/tmp/
  280. at CASUAL.CASUALLanguage.beginScriptingHandler(CASUALLanguage.java:73)
  281. at CASUAL.CASUALScriptParser$1.run(CASUALScriptParser.java:122)
  282. at java.lang.Thread.run(Unknown Source)
  283. Caused by: java.lang.ArrayIndexOutOfBoundsException: 1
  284. at CASUAL.CASUALInteraction.showUserCancelOption(CASUALInteraction.java:144)
  285. at CASUAL.CASUALLanguage.commandHandler(CASUALLanguage.java:305)
  286. at CASUAL.CASUALLanguage.beginScriptingHandler(CASUALLanguage.java:66)
  287. ... 2 more
  288.  
  289. [ERROR]A critical error was encoutered. Please copy the log from About>Show Log and report this issue
  290. [ERROR]CASUAL experienced an error while parsing command:
  291. push "$ZIPFILEexynos-abuse" /data/local/tmp/
  292. please report the above exception.
  293. [INFO]Script Complete
  294. [DEBUG]State Change Detected, The new state is: 0
  295. [DEBUG]State Disconnected commanded
  296. [DEBUG]State Change Detected, The new state is: 1
  297. [DEBUG]State Connected commanded
  298. [DEBUG]State Change Detected, The new state is: 0
  299. [DEBUG]State Disconnected commanded
  300. [DEBUG]State Change Detected, The new state is: 1
  301. [DEBUG]State Connected commanded
  302. [DEBUG]State Change Detected, The new state is: 0
  303. [DEBUG]State Disconnected commanded
  304. [DEBUG]State Change Detected, The new state is: 1
  305. [DEBUG]State Connected commanded
  306. [ERROR]
  307. [DEBUG]StartButtonActionPerformed() Script Activated
  308. [DEBUG]Script known as Galaxy Note 2 Jailbreak-NoYouVerizon is running
  309. [DEBUG]disk location for script resources
  310. [DEBUG]Loading internal resource: Galaxy Note 2 Jailbreak-NoYouVerizon
  311. [DEBUG]Selected resourceGalaxy Note 2 Jailbreak-NoYouVerizon
  312. [DEBUG]Lines in Script 64
  313. [DEBUG]Executing Scripted Datastreamjava.io.DataInputStream@13cd5b5
  314. [DEBUG]CASUAL has initiated a multithreaded execution environment
  315. [DEBUG]/SCRIPTS/Galaxy Note 2 Jailbreak-NoYouVerizon not found in repository.
  316. [DEBUG]Reading datastreamjava.io.DataInputStream@13cd5b5
  317. [DEBUG]SCRIPT COMMAND:$USERCANCELOPTION Are you sure?, This is your only warning.\n You will be Unlocked and Rooted. Your device will\n reboot once and then again into Odin mode. CASUAL\n will then flash the No You Verizon Bootloader\n package for you.
  318. [DEBUG]SCRIPT COMMAND:$ECHO Rebooting into download mode
  319. [DEBUG]Received ECHO command$ECHO Rebooting into download mode
  320. [INFO]Rebooting into download mode
  321. [DEBUG]SCRIPT COMMAND:$ADB reboot download
  322. [DEBUG]sending
  323. [DEBUG]###executing real-time command: C:\Users\Cody\AppData\Local\Temp\CodyTEMPCASUAL4BA9856D\adb.exe###
  324. [DEBUG]return from ADB:
  325. [DEBUG]SCRIPT COMMAND:$HEIMDALL flash --pit "$ZIPFILEsch-i605-16gb.pit" --repartition --BOOTLOADER "$ZIPFILEsboot.bin" --8 "$ZIPFILEboot.img"
  326. [VERBOSE]verified C:\Users\Cody\AppData\Local\Temp\CodyTEMPCASUAL4BA9856D\Galaxy Note 2 Jailbreak-NoYouVerizon\sch-i605-16gb.pit exists
  327. [VERBOSE]verified C:\Users\Cody\AppData\Local\Temp\CodyTEMPCASUAL4BA9856D\Galaxy Note 2 Jailbreak-NoYouVerizon\sboot.bin exists
  328. [VERBOSE]verified C:\Users\Cody\AppData\Local\Temp\CodyTEMPCASUAL4BA9856D\Galaxy Note 2 Jailbreak-NoYouVerizon\boot.img exists
  329. [DEBUG]Expanded $ZIPFILE: $HEIMDALL flash --pit "C:\Users\Cody\AppData\Local\Temp\CodyTEMPCASUAL4BA9856D\Galaxy Note 2 Jailbreak-NoYouVerizon\sch-i605-16gb.pit" --repartition --BOOTLOADER "C:\Users\Cody\AppData\Local\Temp\CodyTEMPCASUAL4BA9856D\Galaxy Note 2 Jailbreak-NoYouVerizon\sboot.bin" --8 "C:\Users\Cody\AppData\Local\Temp\CodyTEMPCASUAL4BA9856D\Galaxy Note 2 Jailbreak-NoYouVerizon\boot.img"
  330. [DEBUG]Received Command: flash --pit "C:\Users\Cody\AppData\Local\Temp\CodyTEMPCASUAL4BA9856D\Galaxy Note 2 Jailbreak-NoYouVerizon\sch-i605-16gb.pit" --repartition --BOOTLOADER "C:\Users\Cody\AppData\Local\Temp\CodyTEMPCASUAL4BA9856D\Galaxy Note 2 Jailbreak-NoYouVerizon\sboot.bin" --8 "C:\Users\Cody\AppData\Local\Temp\CodyTEMPCASUAL4BA9856D\Galaxy Note 2 Jailbreak-NoYouVerizon\boot.img"
  331. [DEBUG]verifying Heimdall deployment.
  332. [VERBOSE]detected!
  333. [INFO]Executing Heimdall command.
  334. [VERBOSE]Performing standard Heimdall commandflash --pit "C:\Users\Cody\AppData\Local\Temp\CodyTEMPCASUAL4BA9856D\Galaxy Note 2 Jailbreak-NoYouVerizon\sch-i605-16gb.pit" --repartition --BOOTLOADER "C:\Users\Cody\AppData\Local\Temp\CodyTEMPCASUAL4BA9856D\Galaxy Note 2 Jailbreak-NoYouVerizon\sboot.bin" --8 "C:\Users\Cody\AppData\Local\Temp\CodyTEMPCASUAL4BA9856D\Galaxy Note 2 Jailbreak-NoYouVerizon\boot.img"
  335. [DEBUG]###executing real-time command: C:\Users\Cody\AppData\Local\Temp\CodyTEMPCASUAL4BA9856D\heimdall.exe###
  336. Waiting for Downoad Mode device.......Heimdall v1.4 RC2
  337.  
  338.  
  339.  
  340. Copyright (c) 2010-2012, Benjamin Dobell, Glass Echidna
  341.  
  342. http://www.glassechidna.com.au/
  343.  
  344.  
  345.  
  346. This software is provided free of charge. Copying and redistribution is
  347.  
  348. encouraged.
  349.  
  350.  
  351.  
  352. If you appreciate this software and you would like to support future
  353.  
  354. development please consider donating:
  355.  
  356. http://www.glassechidna.com.au/donate/
  357.  
  358.  
  359.  
  360. Initialising connection...
  361.  
  362. Detecting device...
  363.  
  364. Claiming interface...
  365.  
  366. Setting up interface...
  367.  
  368.  
  369.  
  370. Checking if protocol is initialised...
  371.  
  372. Protocol is not initialised.
  373.  
  374.  
  375.  
  376. Initialising protocol...
  377.  
  378. Protocol initialisation successful.
  379.  
  380.  
  381.  
  382. Beginning session...
  383.  
  384.  
  385.  
  386. This device may take up to 2 minutes to respond.
  387.  
  388. Please be patient!
  389.  
  390.  
  391.  
  392. Session begun.
  393.  
  394.  
  395.  
  396. Uploading PIT
  397.  
  398. PIT upload successful
  399.  
  400.  
  401.  
  402. Uploading BOOTLOADER
  403.  
  404. 0%
  405. 
  406. 100%
  407.  
  408. BOOTLOADER upload successful
  409.  
  410.  
  411.  
  412. Uploading BOOT
  413.  
  414. 0%
  415. 
  416. 19%
  417. 
  418. 
  419. 38%
  420. 
  421. 
  422. 57%
  423. 
  424. 
  425. 76%
  426. 
  427. 
  428. 95%
  429. 
  430. 
  431. 100%
  432.  
  433. BOOT upload successful
  434.  
  435.  
  436.  
  437. Ending session...
  438.  
  439. Rebooting device...
  440.  
  441. Releasing device interface...
  442.  
  443.  
  444.  
  445. [INFO]
  446. [Heimdall Success]
  447.  
  448.  
  449. [DEBUG]SCRIPT COMMAND:$ECHO Your device should be rebooting into Android now.
  450. [DEBUG]Received ECHO command$ECHO Your device should be rebooting into Android now.
  451. [INFO]Your device should be rebooting into Android now.
  452. [DEBUG]SCRIPT COMMAND:$ADB wait-for-device
  453. [INFO]Waiting for ADB device connection. When Windows 8 recognizes the device, we will continue. Don't touch anything.
  454. [DEBUG]sending
  455. [DEBUG]###executing real-time command: C:\Users\Cody\AppData\Local\Temp\CodyTEMPCASUAL4BA9856D\adb.exe###
  456. [DEBUG]return from ADB:
  457. [DEBUG]Ignoring commented line#Reboot to clear logs
  458. [DEBUG]SCRIPT COMMAND:shell "mkdir /data/local/tmp"
  459. [DEBUG]sending
  460. [DEBUG]###executing real-time command: C:\Users\Cody\AppData\Local\Temp\CodyTEMPCASUAL4BA9856D\adb.exe###
  461. mkdir failed for /data/local/tmp, File exists
  462.  
  463.  
  464. [DEBUG]return from ADB:mkdir failed for /data/local/tmp, File exists
  465.  
  466.  
  467. [DEBUG]SCRIPT COMMAND:$ECHO Pushing dependencies
  468. [DEBUG]Received ECHO command$ECHO Pushing dependencies
  469. [INFO]Pushing dependencies
  470. [DEBUG]SCRIPT COMMAND:$ECHO Pushing su binary...
  471. [DEBUG]Received ECHO command$ECHO Pushing su binary...
  472. [INFO]Pushing su binary...
  473. [DEBUG]SCRIPT COMMAND:push "$ZIPFILEsu" /data/local/tmp/
  474. [VERBOSE]verified C:\Users\Cody\AppData\Local\Temp\CodyTEMPCASUAL4BA9856D\Galaxy Note 2 Jailbreak-NoYouVerizon\su exists
  475. [DEBUG]Expanded $ZIPFILE: push "C:\Users\Cody\AppData\Local\Temp\CodyTEMPCASUAL4BA9856D\Galaxy Note 2 Jailbreak-NoYouVerizon\su" /data/local/tmp/
  476. [DEBUG]sending
  477. [DEBUG]###executing real-time command: C:\Users\Cody\AppData\Local\Temp\CodyTEMPCASUAL4BA9856D\adb.exe###
  478. 6151 KB/s (96260 bytes in 0.015s)
  479.  
  480. [DEBUG]return from ADB:6151 KB/s (96260 bytes in 0.015s)
  481.  
  482. [DEBUG]SCRIPT COMMAND:$ECHO Pushing SuperSU app...
  483. [DEBUG]Received ECHO command$ECHO Pushing SuperSU app...
  484. [INFO]Pushing SuperSU app...
  485. [DEBUG]SCRIPT COMMAND:push "$ZIPFILESuperuser.apk" /data/local/tmp/
  486. [VERBOSE]verified C:\Users\Cody\AppData\Local\Temp\CodyTEMPCASUAL4BA9856D\Galaxy Note 2 Jailbreak-NoYouVerizon\Superuser.apk exists
  487. [DEBUG]Expanded $ZIPFILE: push "C:\Users\Cody\AppData\Local\Temp\CodyTEMPCASUAL4BA9856D\Galaxy Note 2 Jailbreak-NoYouVerizon\Superuser.apk" /data/local/tmp/
  488. [DEBUG]sending
  489. [DEBUG]###executing real-time command: C:\Users\Cody\AppData\Local\Temp\CodyTEMPCASUAL4BA9856D\adb.exe###
  490. 6446 KB/s (996704 bytes in 0.150s)
  491.  
  492. [DEBUG]return from ADB:6446 KB/s (996704 bytes in 0.150s)
  493.  
  494. [DEBUG]SCRIPT COMMAND:$ECHO Pushing Exynos-Abuse exploit
  495. [DEBUG]Received ECHO command$ECHO Pushing Exynos-Abuse exploit
  496. [INFO]Pushing Exynos-Abuse exploit
  497. [DEBUG]SCRIPT COMMAND:push "$ZIPFILEexynos-abuse" /data/local/tmp/
  498. [ERROR][CRITICAL]1
  499. 1
  500. java.lang.ArrayIndexOutOfBoundsException: 1
  501.  
  502. java.lang.ArrayIndexOutOfBoundsException: 1
  503. at CASUAL.CASUALInteraction.showUserCancelOption(CASUALInteraction.java:144)
  504. at CASUAL.CASUALLanguage.commandHandler(CASUALLanguage.java:305)
  505. at CASUAL.CASUALLanguage.beginScriptingHandler(CASUALLanguage.java:66)
  506. at CASUAL.CASUALScriptParser$1.run(CASUALScriptParser.java:122)
  507. at java.lang.Thread.run(Unknown Source)
  508.  
  509. [ERROR]A critical error was encoutered. Please copy the log from About>Show Log and report this issue
  510. [ERROR][CRITICAL]CASUAL scripting error
  511. push "$ZIPFILEexynos-abuse" /data/local/tmp/
  512. CASUAL scripting error
  513. push "$ZIPFILEexynos-abuse" /data/local/tmp/
  514. java.lang.RuntimeException: CASUAL scripting error
  515. push "$ZIPFILEexynos-abuse" /data/local/tmp/
  516.  
  517. java.lang.RuntimeException: CASUAL scripting error
  518. push "$ZIPFILEexynos-abuse" /data/local/tmp/
  519. at CASUAL.CASUALLanguage.beginScriptingHandler(CASUALLanguage.java:73)
  520. at CASUAL.CASUALScriptParser$1.run(CASUALScriptParser.java:122)
  521. at java.lang.Thread.run(Unknown Source)
  522. Caused by: java.lang.ArrayIndexOutOfBoundsException: 1
  523. at CASUAL.CASUALInteraction.showUserCancelOption(CASUALInteraction.java:144)
  524. at CASUAL.CASUALLanguage.commandHandler(CASUALLanguage.java:305)
  525. at CASUAL.CASUALLanguage.beginScriptingHandler(CASUALLanguage.java:66)
  526. ... 2 more
  527.  
  528. [ERROR]A critical error was encoutered. Please copy the log from About>Show Log and report this issue
  529. [ERROR]CASUAL experienced an error while parsing command:
  530. push "$ZIPFILEexynos-abuse" /data/local/tmp/
  531. please report the above exception.
  532. [INFO]Script Complete
  533. [DEBUG]State Change Detected, The new state is: 0
  534. [DEBUG]State Disconnected commanded
  535. [DEBUG]Pastebin Login Successful
Advertisement
Add Comment
Please, Sign In to add comment