Advertisement
CASUAL-Automated

CASUAL r795-Anonymous

Oct 31st, 2014
130
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 7.25 KB | None | 0 0
  1. [DEBUG]Verifying permissions in folder:C:\Users\MHUTCH~1\AppData\Local\Temp\CASUALUSER-2014-10-31-15.08.59\
  2. [DEBUG]working
  3. [INFO]We are running Windows 8.1
  4. Creating Temp Folder in:C:\Users\MHUTCH~1\AppData\Local\Temp\CASUALUSER-2014-10-31-15.08.59\CASUAL Cross-platform Android Scripting and Unified Auxiliary Loader
  5. Revision:795 build:6,640
  6. CASUAL Copyright (C) 2013 Adam Outler
  7. This program comes with ABSOLUTELY NO WARRANTY. This is free software,
  8. and you are welcome to redistribute it, under certain conditions; run
  9. 'D:\Downloads\d2vzw-CASUAL-R795b-BeansTown106%20(1).jar --license'
  10. for details. http://android-casual.googlecode.com for source.
  11. [DEBUG]codesource: (file:/D:/Downloads/d2vzw-CASUAL-R795b-BeansTown106%20(1).jar <no signer certificates>)
  12. [DEBUG]launching GUI
  13. [DEBUG]Picking Jar File:/D:/Downloads/d2vzw-CASUAL-R795b-BeansTown106%20(1).jar ..scanning.
  14. [DEBUG]parsing SCRIPTS/
  15. [DEBUG]Found Windows Computer
  16. [DEBUG]Attempting to write C:\Users\MHUTCH~1\AppData\Local\Temp\CASUALUSER-2014-10-31-15.08.59\Elevate.exe
  17. [DEBUG]File verified.
  18. [DEBUG]Attempting to write C:\Users\MHUTCH~1\AppData\Local\Temp\CASUALUSER-2014-10-31-15.08.59\adb.exe
  19. [DEBUG]File verified.
  20. [DEBUG]Attempting to write C:\Users\MHUTCH~1\AppData\Local\Temp\CASUALUSER-2014-10-31-15.08.59\AdbWinApi.dll
  21. [DEBUG]File verified.
  22. [DEBUG]Attempting to write C:\Users\MHUTCH~1\AppData\Local\Temp\CASUALUSER-2014-10-31-15.08.59\AdbWinUsbApi.dll
  23. [DEBUG]File verified.
  24. [DEBUG]Attempting to write \USERHOME\.android\adb_usb.ini
  25. [DEBUG]File verified.
  26. [DEBUG]Setting executable C:\Users\MHUTCH~1\AppData\Local\Temp\CASUALUSER-2014-10-31-15.08.59\adb.exe. Result=true
  27. [DEBUG]parsing SCRIPTS/1.RootGS3.scr
  28. [DEBUG]Looking up SCRIPTS/1.RootGS3.scr
  29. [DEBUG]parsing SCRIPTS/1.RootGS3.txt
  30. [DEBUG]parsing SCRIPTS/1.RootGS3.zip
  31. [VERBOSE]found zip at SCRIPTS/1.RootGS3.zip
  32. [DEBUG]Looking up SCRIPTS/1.RootGS3.zip
  33. [DEBUG]parsing SCRIPTS/2.Flash Insecure Aboot.scr
  34. [DEBUG]Looking up SCRIPTS/2.Flash Insecure Aboot.scr
  35. [DEBUG]parsing SCRIPTS/2.Flash Insecure Aboot.txt
  36. [DEBUG]parsing SCRIPTS/2.Flash Insecure Aboot.zip
  37. [VERBOSE]found zip at SCRIPTS/2.Flash Insecure Aboot.zip
  38. [DEBUG]Looking up SCRIPTS/2.Flash Insecure Aboot.zip
  39. [DEBUG]Searching for scripts
  40. [DEBUG]parsing SCRIPTS/3.Verizon GS3 Install TWRP Recovery.scr
  41. [DEBUG]Looking up SCRIPTS/3.Verizon GS3 Install TWRP Recovery.scr
  42. [DEBUG]parsing SCRIPTS/3.Verizon GS3 Install TWRP Recovery.txt
  43. [DEBUG]parsing SCRIPTS/3.Verizon GS3 Install TWRP Recovery.zip
  44. [VERBOSE]found zip at SCRIPTS/3.Verizon GS3 Install TWRP Recovery.zip
  45. [DEBUG]Looking up SCRIPTS/3.Verizon GS3 Install TWRP Recovery.zip
  46. [DEBUG]parsing SCRIPTS/4.Verizon GS3 Install CWM Recovery.scr
  47. [DEBUG]Looking up SCRIPTS/4.Verizon GS3 Install CWM Recovery.scr
  48. [DEBUG]parsing SCRIPTS/4.Verizon GS3 Install CWM Recovery.txt
  49. [DEBUG]parsing SCRIPTS/4.Verizon GS3 Install CWM Recovery.zip
  50. [VERBOSE]found zip at SCRIPTS/4.Verizon GS3 Install CWM Recovery.zip
  51. [DEBUG]Looking up SCRIPTS/4.Verizon GS3 Install CWM Recovery.zip
  52. [DEBUG]parsing SCRIPTS/5.Verizon GS3 Install CWM Touch Recovery.scr
  53. [DEBUG]Looking up SCRIPTS/5.Verizon GS3 Install CWM Touch Recovery.scr
  54. [DEBUG]parsing SCRIPTS/5.Verizon GS3 Install CWM Touch Recovery.txt
  55. [DEBUG]parsing SCRIPTS/5.Verizon GS3 Install CWM Touch Recovery.zip
  56. [VERBOSE]found zip at SCRIPTS/5.Verizon GS3 Install CWM Touch Recovery.zip
  57. [DEBUG]Looking up SCRIPTS/5.Verizon GS3 Install CWM Touch Recovery.zip
  58. [DEBUG]parsing SCRIPTS/-build.properties
  59. [DEBUG]parsing SCRIPTS/-logo.png
  60. [DEBUG]parsing SCRIPTS/-Overview.txt
  61. [DEBUG][TRANSLATION]@resourceNotFound://SCRIPTS/-Overview.txt
  62. [VERBOSE]*****MISSING TRANSLATION VALUE*****
  63. [ERROR]
  64. [DEBUG]parsing SCRIPTS/Reboot Download.scr
  65. [DEBUG]Looking up SCRIPTS/Reboot Download.scr
  66. [DEBUG]parsing SCRIPTS/Reboot Download.txt
  67. [DEBUG]parsing SCRIPTS/Reboot Recovery.scr
  68. [DEBUG]Looking up SCRIPTS/Reboot Recovery.scr
  69. [DEBUG]parsing SCRIPTS/Reboot Recovery.txt
  70. [DEBUG]
  71.  
  72.  
  73. Starting CASPAC unzip.
  74. [INFO]This CASUAL app contains multiple scripts and exploits for use with the Verizon Galaxy S3 running Android 4.1.1 - 4.1.2
  75.  
  76.  
  77. Step 1. Root
  78. Step 2. Flash Insecure Aboot
  79. Step 3. Flash Recovery of Your Choice
  80.  
  81. Casual Repackaged For VZW S3 By: @BeansTown106
  82.  
  83.  
  84. [DEBUG]Examining CASUAL mode script contents:SCRIPTS/1.RootGS3.zip
  85. [DEBUG]adding SCRIPTS/1.RootGS3 to UI
  86. [DEBUG]adding SCRIPTS/2.Flash Insecure Aboot to UI
  87. [DEBUG]adding SCRIPTS/3.Verizon GS3 Install TWRP Recovery to UI
  88. [DEBUG]adding SCRIPTS/4.Verizon GS3 Install CWM Recovery to UI
  89. [DEBUG]adding SCRIPTS/5.Verizon GS3 Install CWM Touch Recovery to UI
  90. [DEBUG]adding SCRIPTS/Reboot Download to UI
  91. [DEBUG]unzip of SCRIPTS/1.RootGS3.zip is beginning.
  92. [VERBOSE]Unzipping pwn
  93. [DEBUG]adding SCRIPTS/Reboot Recovery to UI
  94. [INFO]
  95. [VERBOSE]Unzipping su
  96. [VERBOSE]Unzipping Superuser.apk
  97. [VERBOSE]Unzipping busybox
  98. [VERBOSE]Unzip Complete
  99. [DEBUG]unzip of SCRIPTS/1.RootGS3 is complete.
  100. [VERBOSE]TimeOut on C:\Users\MHUTCH~1\AppData\Local\Temp\CASUALUSER-2014-10-31-15.08.59\adb.exe after 5000ms. Returning what was received.
  101. [VERBOSE]ADB Server Started!!!
  102. [DEBUG]Controls Enabled status: true
  103. [DEBUG]State Change Detected, The new state is: 1
  104. [DEBUG]Device Connected
  105. [DEBUG]@stateConnected
  106. [DEBUG]Controls Enabled status: true
  107. [DEBUG]State Change Detected, The new state is: 0
  108. [DEBUG]@stateDisconnected
  109. [DEBUG]Device Removed
  110. [DEBUG]Controls Enabled status: false
  111. [DEBUG]Controls Enabled status: false
  112. [DEBUG]hiding script selector TargetScript: SCRIPTS/4.Verizon GS3 Install CWM Recovery
  113. [DEBUG]
  114.  
  115.  
  116. Starting CASPAC unzip.
  117. [INFO]
  118. [DEBUG]Examining CASUAL mode script contents:SCRIPTS/4.Verizon GS3 Install CWM Recovery.zip
  119. [DEBUG]Currently waiting for Threads:1
  120. [DEBUG]unzip of SCRIPTS/4.Verizon GS3 Install CWM Recovery.zip is beginning.
  121. [VERBOSE]Unzipping d2vzwcwm_recovery.img
  122. [VERBOSE]Unzip Complete
  123. [DEBUG]unzip of SCRIPTS/4.Verizon GS3 Install CWM Recovery is complete.
  124. [INFO]This CASUAL app contains multiple scripts and exploits for use with the Verizon Galaxy S3 running Android 4.1.1 - 4.1.2
  125.  
  126.  
  127. Step 1. Root
  128. Step 2. Flash Insecure Aboot
  129. Step 3. Flash Recovery of Your Choice
  130.  
  131. Casual Repackaged For VZW S3 By: @BeansTown106
  132.  
  133.  
  134. [DEBUG]adding SCRIPTS/1.RootGS3 to UI
  135. [DEBUG]adding SCRIPTS/2.Flash Insecure Aboot to UI
  136. [DEBUG]adding SCRIPTS/3.Verizon GS3 Install TWRP Recovery to UI
  137. [DEBUG]adding SCRIPTS/4.Verizon GS3 Install CWM Recovery to UI
  138. [DEBUG]adding SCRIPTS/5.Verizon GS3 Install CWM Touch Recovery to UI
  139. [DEBUG]adding SCRIPTS/Reboot Download to UI
  140. [DEBUG]adding SCRIPTS/Reboot Recovery to UI
  141. [INFO]
  142. [DEBUG]Unzipping complete.
  143. [DEBUG]Shutting Down
  144. [DEBUG]Shutting Down
  145. [DEBUG]working
  146. [DEBUG]Found Windows Computer
  147. [DEBUG]Attempting to write C:\Users\MHUTCH~1\AppData\Local\Temp\CASUALUSER-2014-10-31-15.08.59\Elevate.exe
  148. [DEBUG]File verified.
  149. [DEBUG]Attempting to write C:\Users\MHUTCH~1\AppData\Local\Temp\CASUALUSER-2014-10-31-15.08.59\adb.exe
  150. [DEBUG]File verified.
  151. [DEBUG]Attempting to write C:\Users\MHUTCH~1\AppData\Local\Temp\CASUALUSER-2014-10-31-15.08.59\AdbWinApi.dll
  152. [DEBUG]File verified.
  153. [DEBUG]Attempting to write C:\Users\MHUTCH~1\AppData\Local\Temp\CASUALUSER-2014-10-31-15.08.59\AdbWinUsbApi.dll
  154. [DEBUG]File verified.
  155. [DEBUG]Setting executable C:\Users\MHUTCH~1\AppData\Local\Temp\CASUALUSER-2014-10-31-15.08.59\adb.exe. Result=true
  156. [VERBOSE]TimeOut on C:\Users\MHUTCH~1\AppData\Local\Temp\CASUALUSER-2014-10-31-15.08.59\adb.exe after 5000ms. Returning what was received.
  157. [DEBUG]Shutting Down
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement