Guest User

CASUAL r515-bmfluitt1984

a guest
Dec 9th, 2013
67
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 15.33 KB | None | 0 0
  1. [INFO]We are running Windows Vista
  2. Creating Temp Folder in:C:\Users\Brandon\AppData\Local\Temp\BrandonTEMPCASUAL3C4DEE77\CASUAL Cross-platform Android Scripting and Unified Auxiliary Loader
  3. Revision:515 build:3,777
  4. CASUAL Copyright (C) 2013 Adam Outler
  5. This program comes with ABSOLUTELY NO WARRANTY. This is free software,
  6. and you are welcome to redistribute it, under certain conditions; run
  7. 'C:\Users\Brandon\Desktop\NoYouVerizon-GalaxyNote2-CASUAL%20R515.jar --license'
  8. for details. http://android-casual.googlecode.com for source.
  9. [DEBUG]Picking Jar File:/C:/Users/Brandon/Desktop/NoYouVerizon-GalaxyNote2-CASUAL%20R515.jar
  10. [DEBUG]Found Windows Computer
  11. [DEBUG]Attempting to write C:\Users\Brandon\AppData\Local\Temp\BrandonTEMPCASUAL3C4DEE77\Elevate.exe
  12. [DEBUG]File verified.
  13. [DEBUG]Attempting to write C:\Users\Brandon\AppData\Local\Temp\BrandonTEMPCASUAL3C4DEE77\adb.exe
  14. [DEBUG]File verified.
  15. [DEBUG]Attempting to write C:\Users\Brandon\AppData\Local\Temp\BrandonTEMPCASUAL3C4DEE77\AdbWinApi.dll
  16. [DEBUG]File verified.
  17. [DEBUG]Attempting to write C:\Users\Brandon\AppData\Local\Temp\BrandonTEMPCASUAL3C4DEE77\AdbWinUsbApi.dll
  18. [DEBUG]File verified.
  19. [DEBUG]sleeping for Windows ADB start
  20. [DEBUG]Found: Galaxy Note 2 Jailbreak-NoYouVerizon
  21. [DEBUG]OMFGWOOT GUI running!
  22. [INFO]This is a tool which will root, unlock, and install a custom recovery on a Verizon Galaxy Note 2.
  23.  
  24. [DEBUG]Searching for scripts
  25. [DEBUG]Updating Scripts for UI
  26. [VERBOSE]From Resource: true
  27. [INFO]--Galaxy Note 2 Jailbreak-NoYouVerizon--
  28. [INFO]This is a tool which will root, unlock, and install a custom recovery on a Verizon Galaxy Note 2. Put your device into ADB mode. Credit for this exploit goes to Lee Harrison
  29.  
  30. [DEBUG]Created zipResource at /SCRIPTS/Galaxy Note 2 Jailbreak-NoYouVerizon.zip
  31. [DEBUG]Exiting comboBoxUpdate()
  32. [DEBUG]attempted to lock controls but controls are not availble yet
  33. [DEBUG]Extracting archive....
  34. [DEBUG]Target Script Is resource
  35. [VERBOSE]Unzipping Superuser.apk
  36. [DEBUG]Attempting to write C:\Users\Brandon\AppData\Local\Temp\BrandonTEMPCASUAL3C4DEE77\adb_usb.ini
  37. [DEBUG]File verified.
  38. [DEBUG]###executing: C:\Users\Brandon\AppData\Local\Temp\BrandonTEMPCASUAL3C4DEE77\adb.exe###
  39. [VERBOSE]Unzipping busybox
  40. [VERBOSE]Unzipping exploit
  41. [VERBOSE]Unzipping rootGN.sh
  42. [VERBOSE]Unzipping swagBoot
  43. [VERBOSE]Unzipping sch-i605-16gb.pit
  44. [VERBOSE]Unzipping sboot.bin
  45. [VERBOSE]Unzipping recoverThis
  46. [VERBOSE]Unzipping boot.img
  47. [VERBOSE]Unzipping su
  48. [VERBOSE]Unzip Complete
  49. [VERBOSE]List of devices attached
  50. [DEBUG]Device List:
  51.  
  52.  
  53.  
  54. [DEBUG]unknown
  55.  
  56. [DEBUG]State Change Detected, The new state is: 1
  57. [DEBUG]State Connected commanded
  58. [ERROR]
  59. [DEBUG]StartButtonActionPerformed() Script Activated
  60. [DEBUG]Script known as Galaxy Note 2 Jailbreak-NoYouVerizon is running
  61. [DEBUG]disk location for script resources
  62. [DEBUG]Loading internal resource: Galaxy Note 2 Jailbreak-NoYouVerizon
  63. [DEBUG]Selected resourceGalaxy Note 2 Jailbreak-NoYouVerizon
  64. [DEBUG]Lines in Script 64
  65. [DEBUG]Executing Scripted Datastreamjava.io.DataInputStream@d733ca
  66. [DEBUG]CASUAL has initiated a multithreaded execution environment
  67. [DEBUG]/SCRIPTS/Galaxy Note 2 Jailbreak-NoYouVerizon not found in repository.
  68. [DEBUG]Reading datastreamjava.io.DataInputStream@d733ca
  69. [DEBUG]SCRIPT COMMAND:$USERCANCELOPTION Are you sure?, This is your only warning.\n You will be Unlocked and Rooted. Your device will\n reboot once and then again into Odin mode. CASUAL\n will then flash the No You Verizon Bootloader\n package for you.
  70. [DEBUG]SCRIPT COMMAND:$ECHO Rebooting into download mode
  71. [DEBUG]Received ECHO command$ECHO Rebooting into download mode
  72. [INFO]Rebooting into download mode
  73. [DEBUG]SCRIPT COMMAND:$ADB reboot download
  74. [DEBUG]sending
  75. [DEBUG]###executing real-time command: C:\Users\Brandon\AppData\Local\Temp\BrandonTEMPCASUAL3C4DEE77\adb.exe###
  76. [DEBUG]return from ADB:
  77. [DEBUG]SCRIPT COMMAND:$HEIMDALL flash --pit "$ZIPFILEsch-i605-16gb.pit" --repartition --BOOTLOADER "$ZIPFILEsboot.bin" --8 "$ZIPFILEboot.img"
  78. [VERBOSE]verified C:\Users\Brandon\AppData\Local\Temp\BrandonTEMPCASUAL3C4DEE77\Galaxy Note 2 Jailbreak-NoYouVerizon\sch-i605-16gb.pit exists
  79. [VERBOSE]verified C:\Users\Brandon\AppData\Local\Temp\BrandonTEMPCASUAL3C4DEE77\Galaxy Note 2 Jailbreak-NoYouVerizon\sboot.bin exists
  80. [VERBOSE]verified C:\Users\Brandon\AppData\Local\Temp\BrandonTEMPCASUAL3C4DEE77\Galaxy Note 2 Jailbreak-NoYouVerizon\boot.img exists
  81. [DEBUG]Expanded $ZIPFILE: $HEIMDALL flash --pit "C:\Users\Brandon\AppData\Local\Temp\BrandonTEMPCASUAL3C4DEE77\Galaxy Note 2 Jailbreak-NoYouVerizon\sch-i605-16gb.pit" --repartition --BOOTLOADER "C:\Users\Brandon\AppData\Local\Temp\BrandonTEMPCASUAL3C4DEE77\Galaxy Note 2 Jailbreak-NoYouVerizon\sboot.bin" --8 "C:\Users\Brandon\AppData\Local\Temp\BrandonTEMPCASUAL3C4DEE77\Galaxy Note 2 Jailbreak-NoYouVerizon\boot.img"
  82. [DEBUG]Received Command: flash --pit "C:\Users\Brandon\AppData\Local\Temp\BrandonTEMPCASUAL3C4DEE77\Galaxy Note 2 Jailbreak-NoYouVerizon\sch-i605-16gb.pit" --repartition --BOOTLOADER "C:\Users\Brandon\AppData\Local\Temp\BrandonTEMPCASUAL3C4DEE77\Galaxy Note 2 Jailbreak-NoYouVerizon\sboot.bin" --8 "C:\Users\Brandon\AppData\Local\Temp\BrandonTEMPCASUAL3C4DEE77\Galaxy Note 2 Jailbreak-NoYouVerizon\boot.img"
  83. [DEBUG]verifying Heimdall deployment.
  84. [DEBUG]Attempting to write C:\Users\Brandon\AppData\Local\Temp\BrandonTEMPCASUAL3C4DEE77\libusb-1.0.dll
  85. [DEBUG]File verified.
  86. [DEBUG]Attempting to write C:\Users\Brandon\AppData\Local\Temp\BrandonTEMPCASUAL3C4DEE77\heimdall.exe
  87. [DEBUG]File verified.
  88. [VERBOSE]detected!
  89. [INFO]Executing Heimdall command.
  90. [VERBOSE]Performing standard Heimdall commandflash --pit "C:\Users\Brandon\AppData\Local\Temp\BrandonTEMPCASUAL3C4DEE77\Galaxy Note 2 Jailbreak-NoYouVerizon\sch-i605-16gb.pit" --repartition --BOOTLOADER "C:\Users\Brandon\AppData\Local\Temp\BrandonTEMPCASUAL3C4DEE77\Galaxy Note 2 Jailbreak-NoYouVerizon\sboot.bin" --8 "C:\Users\Brandon\AppData\Local\Temp\BrandonTEMPCASUAL3C4DEE77\Galaxy Note 2 Jailbreak-NoYouVerizon\boot.img"
  91. [DEBUG]###executing real-time command: C:\Users\Brandon\AppData\Local\Temp\BrandonTEMPCASUAL3C4DEE77\heimdall.exe###
  92. Waiting for Downoad Mode device...Heimdall v1.4 RC2
  93.  
  94.  
  95.  
  96. Copyright (c) 2010-2012, Benjamin Dobell, Glass Echidna
  97.  
  98. http://www.glassechidna.com.au/
  99.  
  100.  
  101.  
  102. This software is provided free of charge. Copying and redistribution is
  103.  
  104. encouraged.
  105.  
  106.  
  107.  
  108. If you appreciate this software and you would like to support future
  109.  
  110. development please consider donating:
  111.  
  112. http://www.glassechidna.com.au/donate/
  113.  
  114.  
  115.  
  116. Initialising connection...
  117.  
  118. Detecting device...
  119.  
  120. ERROR: Failed to detect compatible download-mode device.
  121.  
  122. [ERROR]
  123. [Heimdall Error Report] Detected:
  124. Heimdall uncontinuable error; Script halted
  125. [/Heimdall Error Report]
  126.  
  127.  
  128. [DEBUG]HALT RECEIVED
  129. [DEBUG]Finishing remaining commands:$SENDLOG
  130. [DEBUG]Sendlog Command Issued!
  131. No remaining commands
  132. [INFO]done
  133. [INFO]Script Complete
  134. [DEBUG]State Change Detected, The new state is: 0
  135. [DEBUG]State Disconnected commanded
  136. [DEBUG]State Change Detected, The new state is: 1
  137. [DEBUG]State Connected commanded
  138. [ERROR]
  139. [DEBUG]StartButtonActionPerformed() Script Activated
  140. [DEBUG]Script known as Galaxy Note 2 Jailbreak-NoYouVerizon is running
  141. [DEBUG]disk location for script resources
  142. [DEBUG]Loading internal resource: Galaxy Note 2 Jailbreak-NoYouVerizon
  143. [DEBUG]Selected resourceGalaxy Note 2 Jailbreak-NoYouVerizon
  144. [DEBUG]Lines in Script 64
  145. [DEBUG]Executing Scripted Datastreamjava.io.DataInputStream@117ffc5
  146. [DEBUG]CASUAL has initiated a multithreaded execution environment
  147. [DEBUG]/SCRIPTS/Galaxy Note 2 Jailbreak-NoYouVerizon not found in repository.
  148. [DEBUG]Reading datastreamjava.io.DataInputStream@117ffc5
  149. [DEBUG]SCRIPT COMMAND:$USERCANCELOPTION Are you sure?, This is your only warning.\n You will be Unlocked and Rooted. Your device will\n reboot once and then again into Odin mode. CASUAL\n will then flash the No You Verizon Bootloader\n package for you.
  150. [DEBUG]SCRIPT COMMAND:$ECHO Rebooting into download mode
  151. [DEBUG]Received ECHO command$ECHO Rebooting into download mode
  152. [INFO]Rebooting into download mode
  153. [DEBUG]SCRIPT COMMAND:$ADB reboot download
  154. [DEBUG]sending
  155. [DEBUG]###executing real-time command: C:\Users\Brandon\AppData\Local\Temp\BrandonTEMPCASUAL3C4DEE77\adb.exe###
  156. [DEBUG]return from ADB:
  157. [DEBUG]SCRIPT COMMAND:$HEIMDALL flash --pit "$ZIPFILEsch-i605-16gb.pit" --repartition --BOOTLOADER "$ZIPFILEsboot.bin" --8 "$ZIPFILEboot.img"
  158. [VERBOSE]verified C:\Users\Brandon\AppData\Local\Temp\BrandonTEMPCASUAL3C4DEE77\Galaxy Note 2 Jailbreak-NoYouVerizon\sch-i605-16gb.pit exists
  159. [VERBOSE]verified C:\Users\Brandon\AppData\Local\Temp\BrandonTEMPCASUAL3C4DEE77\Galaxy Note 2 Jailbreak-NoYouVerizon\sboot.bin exists
  160. [VERBOSE]verified C:\Users\Brandon\AppData\Local\Temp\BrandonTEMPCASUAL3C4DEE77\Galaxy Note 2 Jailbreak-NoYouVerizon\boot.img exists
  161. [DEBUG]Expanded $ZIPFILE: $HEIMDALL flash --pit "C:\Users\Brandon\AppData\Local\Temp\BrandonTEMPCASUAL3C4DEE77\Galaxy Note 2 Jailbreak-NoYouVerizon\sch-i605-16gb.pit" --repartition --BOOTLOADER "C:\Users\Brandon\AppData\Local\Temp\BrandonTEMPCASUAL3C4DEE77\Galaxy Note 2 Jailbreak-NoYouVerizon\sboot.bin" --8 "C:\Users\Brandon\AppData\Local\Temp\BrandonTEMPCASUAL3C4DEE77\Galaxy Note 2 Jailbreak-NoYouVerizon\boot.img"
  162. [DEBUG]Received Command: flash --pit "C:\Users\Brandon\AppData\Local\Temp\BrandonTEMPCASUAL3C4DEE77\Galaxy Note 2 Jailbreak-NoYouVerizon\sch-i605-16gb.pit" --repartition --BOOTLOADER "C:\Users\Brandon\AppData\Local\Temp\BrandonTEMPCASUAL3C4DEE77\Galaxy Note 2 Jailbreak-NoYouVerizon\sboot.bin" --8 "C:\Users\Brandon\AppData\Local\Temp\BrandonTEMPCASUAL3C4DEE77\Galaxy Note 2 Jailbreak-NoYouVerizon\boot.img"
  163. [DEBUG]verifying Heimdall deployment.
  164. [VERBOSE]detected!
  165. [INFO]Executing Heimdall command.
  166. [VERBOSE]Performing standard Heimdall commandflash --pit "C:\Users\Brandon\AppData\Local\Temp\BrandonTEMPCASUAL3C4DEE77\Galaxy Note 2 Jailbreak-NoYouVerizon\sch-i605-16gb.pit" --repartition --BOOTLOADER "C:\Users\Brandon\AppData\Local\Temp\BrandonTEMPCASUAL3C4DEE77\Galaxy Note 2 Jailbreak-NoYouVerizon\sboot.bin" --8 "C:\Users\Brandon\AppData\Local\Temp\BrandonTEMPCASUAL3C4DEE77\Galaxy Note 2 Jailbreak-NoYouVerizon\boot.img"
  167. [DEBUG]###executing real-time command: C:\Users\Brandon\AppData\Local\Temp\BrandonTEMPCASUAL3C4DEE77\heimdall.exe###
  168. Waiting for Downoad Mode device.......Heimdall v1.4 RC2
  169.  
  170.  
  171.  
  172. Copyright (c) 2010-2012, Benjamin Dobell, Glass Echidna
  173.  
  174. http://www.glassechidna.com.au/
  175.  
  176.  
  177.  
  178. This software is provided free of charge. Copying and redistribution is
  179.  
  180. encouraged.
  181.  
  182.  
  183.  
  184. If you appreciate this software and you would like to support future
  185.  
  186. development please consider donating:
  187.  
  188. http://www.glassechidna.com.au/donate/
  189.  
  190.  
  191.  
  192. Initialising connection...
  193.  
  194. Detecting device...
  195.  
  196. Claiming interface...
  197.  
  198. Setting up interface...
  199.  
  200.  
  201.  
  202. Checking if protocol is initialised...
  203.  
  204. Protocol is not initialised.
  205.  
  206.  
  207.  
  208. Initialising protocol...
  209.  
  210. Protocol initialisation successful.
  211.  
  212.  
  213.  
  214. Beginning session...
  215.  
  216.  
  217.  
  218. This device may take up to 2 minutes to respond.
  219.  
  220. Please be patient!
  221.  
  222.  
  223.  
  224. Session begun.
  225.  
  226.  
  227.  
  228. Uploading PIT
  229.  
  230. PIT upload successful
  231.  
  232.  
  233.  
  234. Uploading BOOTLOADER
  235.  
  236. 0%
  237. 
  238. 100%
  239.  
  240. BOOTLOADER upload successful
  241.  
  242.  
  243.  
  244. Uploading BOOT
  245.  
  246. 0%
  247. 
  248. 19%
  249. 
  250. 
  251. 38%
  252. 
  253. 
  254. 57%
  255. 
  256. 
  257. 76%
  258. 
  259. 
  260. 95%
  261. 
  262. 
  263. 100%
  264.  
  265. BOOT upload successful
  266.  
  267.  
  268.  
  269. Ending session...
  270.  
  271. Rebooting device...
  272.  
  273. Releasing device interface...
  274.  
  275.  
  276.  
  277. [INFO]
  278. [Heimdall Success]
  279.  
  280.  
  281. [DEBUG]SCRIPT COMMAND:$ECHO Your device should be rebooting into Android now.
  282. [DEBUG]Received ECHO command$ECHO Your device should be rebooting into Android now.
  283. [INFO]Your device should be rebooting into Android now.
  284. [DEBUG]SCRIPT COMMAND:$ADB wait-for-device
  285. [INFO]Waiting for ADB device connection. When Windows Vista recognizes the device, we will continue. Don't touch anything.
  286. [DEBUG]sending
  287. [DEBUG]###executing real-time command: C:\Users\Brandon\AppData\Local\Temp\BrandonTEMPCASUAL3C4DEE77\adb.exe###
  288. [DEBUG]return from ADB:
  289. [DEBUG]Ignoring commented line#Reboot to clear logs
  290. [DEBUG]SCRIPT COMMAND:shell "mkdir /data/local/tmp"
  291. [DEBUG]sending
  292. [DEBUG]###executing real-time command: C:\Users\Brandon\AppData\Local\Temp\BrandonTEMPCASUAL3C4DEE77\adb.exe###
  293. mkdir failed for /data/local/tmp, File exists
  294.  
  295.  
  296. [DEBUG]return from ADB:mkdir failed for /data/local/tmp, File exists
  297.  
  298.  
  299. [DEBUG]SCRIPT COMMAND:$ECHO Pushing dependencies
  300. [DEBUG]Received ECHO command$ECHO Pushing dependencies
  301. [INFO]Pushing dependencies
  302. [DEBUG]SCRIPT COMMAND:$ECHO Pushing su binary...
  303. [DEBUG]Received ECHO command$ECHO Pushing su binary...
  304. [INFO]Pushing su binary...
  305. [DEBUG]SCRIPT COMMAND:push "$ZIPFILEsu" /data/local/tmp/
  306. [VERBOSE]verified C:\Users\Brandon\AppData\Local\Temp\BrandonTEMPCASUAL3C4DEE77\Galaxy Note 2 Jailbreak-NoYouVerizon\su exists
  307. [DEBUG]Expanded $ZIPFILE: push "C:\Users\Brandon\AppData\Local\Temp\BrandonTEMPCASUAL3C4DEE77\Galaxy Note 2 Jailbreak-NoYouVerizon\su" /data/local/tmp/
  308. [DEBUG]sending
  309. [DEBUG]###executing real-time command: C:\Users\Brandon\AppData\Local\Temp\BrandonTEMPCASUAL3C4DEE77\adb.exe###
  310. 3357 KB/s (96260 bytes in 0.028s)
  311.  
  312. [DEBUG]return from ADB:3357 KB/s (96260 bytes in 0.028s)
  313.  
  314. [DEBUG]SCRIPT COMMAND:$ECHO Pushing SuperSU app...
  315. [DEBUG]Received ECHO command$ECHO Pushing SuperSU app...
  316. [INFO]Pushing SuperSU app...
  317. [DEBUG]SCRIPT COMMAND:push "$ZIPFILESuperuser.apk" /data/local/tmp/
  318. [VERBOSE]verified C:\Users\Brandon\AppData\Local\Temp\BrandonTEMPCASUAL3C4DEE77\Galaxy Note 2 Jailbreak-NoYouVerizon\Superuser.apk exists
  319. [DEBUG]Expanded $ZIPFILE: push "C:\Users\Brandon\AppData\Local\Temp\BrandonTEMPCASUAL3C4DEE77\Galaxy Note 2 Jailbreak-NoYouVerizon\Superuser.apk" /data/local/tmp/
  320. [DEBUG]sending
  321. [DEBUG]###executing real-time command: C:\Users\Brandon\AppData\Local\Temp\BrandonTEMPCASUAL3C4DEE77\adb.exe###
  322. 3729 KB/s (996704 bytes in 0.261s)
  323.  
  324. [DEBUG]return from ADB:3729 KB/s (996704 bytes in 0.261s)
  325.  
  326. [DEBUG]SCRIPT COMMAND:$ECHO Pushing Exynos-Abuse exploit
  327. [DEBUG]Received ECHO command$ECHO Pushing Exynos-Abuse exploit
  328. [INFO]Pushing Exynos-Abuse exploit
  329. [DEBUG]SCRIPT COMMAND:push "$ZIPFILEexynos-abuse" /data/local/tmp/
  330. [ERROR][CRITICAL]1
  331. 1
  332. java.lang.ArrayIndexOutOfBoundsException: 1
  333.  
  334. java.lang.ArrayIndexOutOfBoundsException: 1
  335. at CASUAL.CASUALInteraction.showUserCancelOption(CASUALInteraction.java:144)
  336. at CASUAL.CASUALLanguage.commandHandler(CASUALLanguage.java:305)
  337. at CASUAL.CASUALLanguage.beginScriptingHandler(CASUALLanguage.java:66)
  338. at CASUAL.CASUALScriptParser$1.run(CASUALScriptParser.java:122)
  339. at java.lang.Thread.run(Unknown Source)
  340.  
  341. [ERROR]A critical error was encoutered. Please copy the log from About>Show Log and report this issue
  342. [ERROR][CRITICAL]CASUAL scripting error
  343. push "$ZIPFILEexynos-abuse" /data/local/tmp/
  344. CASUAL scripting error
  345. push "$ZIPFILEexynos-abuse" /data/local/tmp/
  346. java.lang.RuntimeException: CASUAL scripting error
  347. push "$ZIPFILEexynos-abuse" /data/local/tmp/
  348.  
  349. java.lang.RuntimeException: CASUAL scripting error
  350. push "$ZIPFILEexynos-abuse" /data/local/tmp/
  351. at CASUAL.CASUALLanguage.beginScriptingHandler(CASUALLanguage.java:73)
  352. at CASUAL.CASUALScriptParser$1.run(CASUALScriptParser.java:122)
  353. at java.lang.Thread.run(Unknown Source)
  354. Caused by: java.lang.ArrayIndexOutOfBoundsException: 1
  355. at CASUAL.CASUALInteraction.showUserCancelOption(CASUALInteraction.java:144)
  356. at CASUAL.CASUALLanguage.commandHandler(CASUALLanguage.java:305)
  357. at CASUAL.CASUALLanguage.beginScriptingHandler(CASUALLanguage.java:66)
  358. ... 2 more
  359.  
  360. [ERROR]A critical error was encoutered. Please copy the log from About>Show Log and report this issue
  361. [ERROR]CASUAL experienced an error while parsing command:
  362. push "$ZIPFILEexynos-abuse" /data/local/tmp/
  363. please report the above exception.
  364. [INFO]Script Complete
  365. [DEBUG]State Change Detected, The new state is: 0
  366. [DEBUG]State Disconnected commanded
  367. [DEBUG]Pastebin Login Successful
Advertisement
Add Comment
Please, Sign In to add comment