Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- [DEBUG]Verifying permissions in folder:C:\Users\MHUTCH~1\AppData\Local\Temp\CASUALUSER-2014-10-31-15.08.59\
- [DEBUG]working
- [INFO]We are running Windows 8.1
- Creating Temp Folder in:C:\Users\MHUTCH~1\AppData\Local\Temp\CASUALUSER-2014-10-31-15.08.59\CASUAL Cross-platform Android Scripting and Unified Auxiliary Loader
- Revision:795 build:6,640
- CASUAL Copyright (C) 2013 Adam Outler
- This program comes with ABSOLUTELY NO WARRANTY. This is free software,
- and you are welcome to redistribute it, under certain conditions; run
- 'D:\Downloads\d2vzw-CASUAL-R795b-BeansTown106%20(1).jar --license'
- for details. http://android-casual.googlecode.com for source.
- [DEBUG]codesource: (file:/D:/Downloads/d2vzw-CASUAL-R795b-BeansTown106%20(1).jar <no signer certificates>)
- [DEBUG]launching GUI
- [DEBUG]Picking Jar File:/D:/Downloads/d2vzw-CASUAL-R795b-BeansTown106%20(1).jar ..scanning.
- [DEBUG]parsing SCRIPTS/
- [DEBUG]Found Windows Computer
- [DEBUG]Attempting to write C:\Users\MHUTCH~1\AppData\Local\Temp\CASUALUSER-2014-10-31-15.08.59\Elevate.exe
- [DEBUG]File verified.
- [DEBUG]Attempting to write C:\Users\MHUTCH~1\AppData\Local\Temp\CASUALUSER-2014-10-31-15.08.59\adb.exe
- [DEBUG]File verified.
- [DEBUG]Attempting to write C:\Users\MHUTCH~1\AppData\Local\Temp\CASUALUSER-2014-10-31-15.08.59\AdbWinApi.dll
- [DEBUG]File verified.
- [DEBUG]Attempting to write C:\Users\MHUTCH~1\AppData\Local\Temp\CASUALUSER-2014-10-31-15.08.59\AdbWinUsbApi.dll
- [DEBUG]File verified.
- [DEBUG]Attempting to write \USERHOME\.android\adb_usb.ini
- [DEBUG]File verified.
- [DEBUG]Setting executable C:\Users\MHUTCH~1\AppData\Local\Temp\CASUALUSER-2014-10-31-15.08.59\adb.exe. Result=true
- [DEBUG]parsing SCRIPTS/1.RootGS3.scr
- [DEBUG]Looking up SCRIPTS/1.RootGS3.scr
- [DEBUG]parsing SCRIPTS/1.RootGS3.txt
- [DEBUG]parsing SCRIPTS/1.RootGS3.zip
- [VERBOSE]found zip at SCRIPTS/1.RootGS3.zip
- [DEBUG]Looking up SCRIPTS/1.RootGS3.zip
- [DEBUG]parsing SCRIPTS/2.Flash Insecure Aboot.scr
- [DEBUG]Looking up SCRIPTS/2.Flash Insecure Aboot.scr
- [DEBUG]parsing SCRIPTS/2.Flash Insecure Aboot.txt
- [DEBUG]parsing SCRIPTS/2.Flash Insecure Aboot.zip
- [VERBOSE]found zip at SCRIPTS/2.Flash Insecure Aboot.zip
- [DEBUG]Looking up SCRIPTS/2.Flash Insecure Aboot.zip
- [DEBUG]Searching for scripts
- [DEBUG]parsing SCRIPTS/3.Verizon GS3 Install TWRP Recovery.scr
- [DEBUG]Looking up SCRIPTS/3.Verizon GS3 Install TWRP Recovery.scr
- [DEBUG]parsing SCRIPTS/3.Verizon GS3 Install TWRP Recovery.txt
- [DEBUG]parsing SCRIPTS/3.Verizon GS3 Install TWRP Recovery.zip
- [VERBOSE]found zip at SCRIPTS/3.Verizon GS3 Install TWRP Recovery.zip
- [DEBUG]Looking up SCRIPTS/3.Verizon GS3 Install TWRP Recovery.zip
- [DEBUG]parsing SCRIPTS/4.Verizon GS3 Install CWM Recovery.scr
- [DEBUG]Looking up SCRIPTS/4.Verizon GS3 Install CWM Recovery.scr
- [DEBUG]parsing SCRIPTS/4.Verizon GS3 Install CWM Recovery.txt
- [DEBUG]parsing SCRIPTS/4.Verizon GS3 Install CWM Recovery.zip
- [VERBOSE]found zip at SCRIPTS/4.Verizon GS3 Install CWM Recovery.zip
- [DEBUG]Looking up SCRIPTS/4.Verizon GS3 Install CWM Recovery.zip
- [DEBUG]parsing SCRIPTS/5.Verizon GS3 Install CWM Touch Recovery.scr
- [DEBUG]Looking up SCRIPTS/5.Verizon GS3 Install CWM Touch Recovery.scr
- [DEBUG]parsing SCRIPTS/5.Verizon GS3 Install CWM Touch Recovery.txt
- [DEBUG]parsing SCRIPTS/5.Verizon GS3 Install CWM Touch Recovery.zip
- [VERBOSE]found zip at SCRIPTS/5.Verizon GS3 Install CWM Touch Recovery.zip
- [DEBUG]Looking up SCRIPTS/5.Verizon GS3 Install CWM Touch Recovery.zip
- [DEBUG]parsing SCRIPTS/-build.properties
- [DEBUG]parsing SCRIPTS/-logo.png
- [DEBUG]parsing SCRIPTS/-Overview.txt
- [DEBUG][TRANSLATION]@resourceNotFound://SCRIPTS/-Overview.txt
- [VERBOSE]*****MISSING TRANSLATION VALUE*****
- [ERROR]
- [DEBUG]parsing SCRIPTS/Reboot Download.scr
- [DEBUG]Looking up SCRIPTS/Reboot Download.scr
- [DEBUG]parsing SCRIPTS/Reboot Download.txt
- [DEBUG]parsing SCRIPTS/Reboot Recovery.scr
- [DEBUG]Looking up SCRIPTS/Reboot Recovery.scr
- [DEBUG]parsing SCRIPTS/Reboot Recovery.txt
- [DEBUG]
- Starting CASPAC unzip.
- [INFO]This CASUAL app contains multiple scripts and exploits for use with the Verizon Galaxy S3 running Android 4.1.1 - 4.1.2
- Step 1. Root
- Step 2. Flash Insecure Aboot
- Step 3. Flash Recovery of Your Choice
- Casual Repackaged For VZW S3 By: @BeansTown106
- [DEBUG]Examining CASUAL mode script contents:SCRIPTS/1.RootGS3.zip
- [DEBUG]adding SCRIPTS/1.RootGS3 to UI
- [DEBUG]adding SCRIPTS/2.Flash Insecure Aboot to UI
- [DEBUG]adding SCRIPTS/3.Verizon GS3 Install TWRP Recovery to UI
- [DEBUG]adding SCRIPTS/4.Verizon GS3 Install CWM Recovery to UI
- [DEBUG]adding SCRIPTS/5.Verizon GS3 Install CWM Touch Recovery to UI
- [DEBUG]adding SCRIPTS/Reboot Download to UI
- [DEBUG]unzip of SCRIPTS/1.RootGS3.zip is beginning.
- [VERBOSE]Unzipping pwn
- [DEBUG]adding SCRIPTS/Reboot Recovery to UI
- [INFO]
- [VERBOSE]Unzipping su
- [VERBOSE]Unzipping Superuser.apk
- [VERBOSE]Unzipping busybox
- [VERBOSE]Unzip Complete
- [DEBUG]unzip of SCRIPTS/1.RootGS3 is complete.
- [VERBOSE]TimeOut on C:\Users\MHUTCH~1\AppData\Local\Temp\CASUALUSER-2014-10-31-15.08.59\adb.exe after 5000ms. Returning what was received.
- [VERBOSE]ADB Server Started!!!
- [DEBUG]Controls Enabled status: true
- [DEBUG]State Change Detected, The new state is: 1
- [DEBUG]Device Connected
- [DEBUG]@stateConnected
- [DEBUG]Controls Enabled status: true
- [DEBUG]State Change Detected, The new state is: 0
- [DEBUG]@stateDisconnected
- [DEBUG]Device Removed
- [DEBUG]Controls Enabled status: false
- [DEBUG]Controls Enabled status: false
- [DEBUG]hiding script selector TargetScript: SCRIPTS/4.Verizon GS3 Install CWM Recovery
- [DEBUG]
- Starting CASPAC unzip.
- [INFO]
- [DEBUG]Examining CASUAL mode script contents:SCRIPTS/4.Verizon GS3 Install CWM Recovery.zip
- [DEBUG]Currently waiting for Threads:1
- [DEBUG]unzip of SCRIPTS/4.Verizon GS3 Install CWM Recovery.zip is beginning.
- [VERBOSE]Unzipping d2vzwcwm_recovery.img
- [VERBOSE]Unzip Complete
- [DEBUG]unzip of SCRIPTS/4.Verizon GS3 Install CWM Recovery is complete.
- [INFO]This CASUAL app contains multiple scripts and exploits for use with the Verizon Galaxy S3 running Android 4.1.1 - 4.1.2
- Step 1. Root
- Step 2. Flash Insecure Aboot
- Step 3. Flash Recovery of Your Choice
- Casual Repackaged For VZW S3 By: @BeansTown106
- [DEBUG]adding SCRIPTS/1.RootGS3 to UI
- [DEBUG]adding SCRIPTS/2.Flash Insecure Aboot to UI
- [DEBUG]adding SCRIPTS/3.Verizon GS3 Install TWRP Recovery to UI
- [DEBUG]adding SCRIPTS/4.Verizon GS3 Install CWM Recovery to UI
- [DEBUG]adding SCRIPTS/5.Verizon GS3 Install CWM Touch Recovery to UI
- [DEBUG]adding SCRIPTS/Reboot Download to UI
- [DEBUG]adding SCRIPTS/Reboot Recovery to UI
- [INFO]
- [DEBUG]Unzipping complete.
- [DEBUG]Shutting Down
- [DEBUG]Shutting Down
- [DEBUG]working
- [DEBUG]Found Windows Computer
- [DEBUG]Attempting to write C:\Users\MHUTCH~1\AppData\Local\Temp\CASUALUSER-2014-10-31-15.08.59\Elevate.exe
- [DEBUG]File verified.
- [DEBUG]Attempting to write C:\Users\MHUTCH~1\AppData\Local\Temp\CASUALUSER-2014-10-31-15.08.59\adb.exe
- [DEBUG]File verified.
- [DEBUG]Attempting to write C:\Users\MHUTCH~1\AppData\Local\Temp\CASUALUSER-2014-10-31-15.08.59\AdbWinApi.dll
- [DEBUG]File verified.
- [DEBUG]Attempting to write C:\Users\MHUTCH~1\AppData\Local\Temp\CASUALUSER-2014-10-31-15.08.59\AdbWinUsbApi.dll
- [DEBUG]File verified.
- [DEBUG]Setting executable C:\Users\MHUTCH~1\AppData\Local\Temp\CASUALUSER-2014-10-31-15.08.59\adb.exe. Result=true
- [VERBOSE]TimeOut on C:\Users\MHUTCH~1\AppData\Local\Temp\CASUALUSER-2014-10-31-15.08.59\adb.exe after 5000ms. Returning what was received.
- [DEBUG]Shutting Down
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement