CASUAL-Automated

CASUAL r816-azsaluki

Sep 25th, 2013
51
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 11.38 KB | None | 0 0
  1. [DEBUG]working
  2. [INFO]We are running Windows Vista
  3. Creating Temp Folder in:C:\Users\Troy\AppData\Local\Temp\CASUALTroy-2013-09-25-16.03.11\CASUAL Cross-platform Android Scripting and Unified Auxiliary Loader
  4. Revision:816 build:6,941
  5. CASUAL Copyright (C) 2013 Adam Outler
  6. This program comes with ABSOLUTELY NO WARRANTY. This is free software,
  7. and you are welcome to redistribute it, under certain conditions; run
  8. 'C:\Users\Troy\Desktop\VZW-Gnote2-CASUAL-NoYouVerizon-CASUAL-R816b--Nightly.jar --license'
  9. for details. http://android-casual.googlecode.com for source.
  10. [DEBUG]launching GUI
  11. [DEBUG]Found Windows Computer
  12. [DEBUG]Attempting to write C:\Users\Troy\AppData\Local\Temp\CASUALTroy-2013-09-25-16.03.11\Elevate.exe
  13. [DEBUG]File verified.
  14. [DEBUG]Attempting to write C:\Users\Troy\AppData\Local\Temp\CASUALTroy-2013-09-25-16.03.11\adb.exe
  15. [DEBUG]File verified.
  16. [DEBUG]Attempting to write C:\Users\Troy\AppData\Local\Temp\CASUALTroy-2013-09-25-16.03.11\AdbWinApi.dll
  17. [DEBUG]Picking Jar File:/C:/Users/Troy/Desktop/VZW-Gnote2-CASUAL-NoYouVerizon-CASUAL-R816b--Nightly.jar ..scanning.
  18. [DEBUG]File verified.
  19. [DEBUG]Attempting to write C:\Users\Troy\AppData\Local\Temp\CASUALTroy-2013-09-25-16.03.11\AdbWinUsbApi.dll
  20. [DEBUG]File verified.
  21. [DEBUG]getting MD5 for:SCRIPTS/
  22. [DEBUG]getting MD5 for:SCRIPTS/boot.img
  23. [DEBUG]State Change Detected, The new state is: 1
  24. [DEBUG]Device Connected
  25. [DEBUG]@stateConnected
  26. [DEBUG]State Change Detected, The new state is: 1
  27. [DEBUG]Device Connected
  28. [DEBUG]@stateConnected
  29. [DEBUG]processing:SCRIPTS/-build.properties
  30. [DEBUG]Loading build information from prop information
  31. [DEBUG]#This properties file was generated by CASUAL
  32. #Wed Sep 25 16:03:16 MST 2013
  33. Application.AlwaysEnableControls=False
  34. Audio.Enabled=True
  35. Developer.Name=Adam Outler
  36. Developer.DonateLink=https\://www.paypal.com/cgi-bin/webscr?cmd\=_s-xclick&hosted_button_id\=W5GQCZUCZCMPU
  37. Window.Title=No You Verizon
  38. Window.UsePictureForBanner=True
  39. Window.ExecuteButtonText=Do It
  40. Window.BannerPic=
  41. Developer.DonateToButtonText=Exploit Devs
  42. Window.BannerText=Online Update Testing
  43.  
  44. [DEBUG]getting MD5 for:SCRIPTS/-build.properties
  45. [DEBUG]processing:SCRIPTS/Galaxy Note 2 Jailbreak-NoYouVerizon.meta
  46. [DEBUG]Looking up SCRIPTS/Galaxy Note 2 Jailbreak-NoYouVerizon.meta
  47. [DEBUG]Setting up script SCRIPTS/Galaxy Note 2 Jailbreak-NoYouVerizon with name, tempdir and type
  48. [DEBUG]getting MD5 for:SCRIPTS/Galaxy Note 2 Jailbreak-NoYouVerizon.meta
  49. [DEBUG]processing:SCRIPTS/Galaxy Note 2 Jailbreak-NoYouVerizon.scr
  50. [DEBUG]Looking up SCRIPTS/Galaxy Note 2 Jailbreak-NoYouVerizon.scr
  51. [DEBUG]getting MD5 for:SCRIPTS/Galaxy Note 2 Jailbreak-NoYouVerizon.scr
  52. [DEBUG]processing:SCRIPTS/Galaxy Note 2 Jailbreak-NoYouVerizon.txt
  53. [DEBUG]Looking up SCRIPTS/Galaxy Note 2 Jailbreak-NoYouVerizon.txt
  54. [DEBUG]getting MD5 for:SCRIPTS/Galaxy Note 2 Jailbreak-NoYouVerizon.txt
  55. [DEBUG]processing:SCRIPTS/Galaxy Note 2 Jailbreak-NoYouVerizon.zip
  56. [VERBOSE]found zip at SCRIPTS/Galaxy Note 2 Jailbreak-NoYouVerizon.zip
  57. [DEBUG]Looking up SCRIPTS/Galaxy Note 2 Jailbreak-NoYouVerizon.zip
  58. [DEBUG]getting MD5 for:SCRIPTS/Galaxy Note 2 Jailbreak-NoYouVerizon.zip
  59. [DEBUG]Setting executable C:\Users\Troy\AppData\Local\Temp\CASUALTroy-2013-09-25-16.03.11\adb.exe. Result=true
  60. [DEBUG]State Change Detected, The new state is: 1
  61. [DEBUG]Device Connected
  62. [DEBUG]@stateConnected
  63. [VERBOSE]ADB Server Started!!!
  64. [VERBOSE]TimeOut on C:\Users\Troy\AppData\Local\Temp\CASUALTroy-2013-09-25-16.03.11\adb.exe after 5000ms. Returning what was received.
  65. [DEBUG]State Change Detected, The new state is: 1
  66. [DEBUG]Controls Enabled status: true
  67. [DEBUG]Device Connected
  68. [DEBUG]@stateConnected
  69. [DEBUG]Controls Enabled status: true
  70. [DEBUG]processing:SCRIPTS/-logo.png
  71. [DEBUG]getting MD5 for:SCRIPTS/-logo.png
  72. [DEBUG]processing:SCRIPTS/-Overview.txt
  73. [DEBUG]getting MD5 for:SCRIPTS/-Overview.txt
  74. [DEBUG]Finalizing active script up to be run
  75. [VERBOSE]Setting script SCRIPTS/Galaxy Note 2 Jailbreak-NoYouVerizon as active and loading
  76. [DEBUG]Starting loadActiveScript CASPAC unzip.
  77. [VERBOSE]This is a CASUAL jar with resources
  78. [DEBUG]returned from checking updates.
  79. [VERBOSE]Performing unzip of resources.
  80. [INFO]This is a tool which will root, unlock, and install a custom recovery on a Verizon Galaxy Note 2.
  81. [DEBUG]adding SCRIPTS/Galaxy Note 2 Jailbreak-NoYouVerizon to UI
  82. [INFO]This is a tool which will root, unlock, and install a custom recovery on a Verizon Galaxy Note 2. Put your device into ADB mode. Credit for this exploit goes to Lee Harrison
  83. [DEBUG]Examining CASUAL mode script contents:SCRIPTS/Galaxy Note 2 Jailbreak-NoYouVerizon.zip
  84. [DEBUG]unzip of SCRIPTS/Galaxy Note 2 Jailbreak-NoYouVerizon.zip is beginning.
  85. [VERBOSE]Unzipping Superuser.apk
  86. [VERBOSE]Unzipping busybox
  87. [VERBOSE]Unzipping exploit
  88. [VERBOSE]Unzipping exynos-abuse
  89. [VERBOSE]Unzipping rootGN.sh
  90. [VERBOSE]Unzipping swagBoot
  91. [VERBOSE]Unzipping sch-i605-16gb.pit
  92. [VERBOSE]Unzipping sboot.bin
  93. [VERBOSE]Unzipping recoverThis
  94. [VERBOSE]Unzipping boot.img
  95. [VERBOSE]Unzipping su
  96. [VERBOSE]Unzip Complete
  97. [DEBUG]unzip of SCRIPTS/Galaxy Note 2 Jailbreak-NoYouVerizon is complete.
  98. [DEBUG]StartButtonActionPerformed() Script Activated
  99. [DEBUG]Script known as SCRIPTS/Galaxy Note 2 Jailbreak-NoYouVerizon is running
  100. [DEBUG]Controls Enabled status: false
  101. [DEBUG]Loading internal resource: SCRIPTS/Galaxy Note 2 Jailbreak-NoYouVerizon
  102. [DEBUG]Executing Scripted Datastreamjava.io.DataInputStream@85ce5a
  103. [DEBUG]Executing
  104. [DEBUG]CASUAL has initiated a multithreaded execution environment
  105. [DEBUG]Reading datastreamjava.io.DataInputStream@85ce5a
  106. [DEBUG]SCRIPT COMMAND:$USERCANCELOPTION Are you sure?, This is your only warning.\n You will be Unlocked and Rooted. Your device will\n reboot once and then again into Odin mode. CASUAL\n will then flash the No You Verizon Bootloader\n package for you.
  107. [DEBUG]SCRIPT COMMAND:$ECHO Rebooting into download mode
  108. [DEBUG]Received ECHO command$ECHO Rebooting into download mode
  109. [INFO]Rebooting into download mode
  110. [DEBUG]SCRIPT COMMAND:$ADB reboot download
  111. [DEBUG]sending
  112. [DEBUG]###executing real-time command: C:\Users\Troy\AppData\Local\Temp\CASUALTroy-2013-09-25-16.03.11\adb.exe###
  113. [DEBUG]return from ADB:
  114. [DEBUG]SCRIPT COMMAND:$HEIMDALL flash --pit "$ZIPFILEsch-i605-16gb.pit" --repartition --BOOTLOADER "$ZIPFILEsboot.bin" --8 "$ZIPFILEboot.img"
  115. [VERBOSE]verified C:\Users\Troy\AppData\Local\Temp\CASUALTroy-2013-09-25-16.03.11\SCRIPTS/Galaxy Note 2 Jailbreak-NoYouVerizon\sch-i605-16gb.pit exists
  116. [VERBOSE]verified C:\Users\Troy\AppData\Local\Temp\CASUALTroy-2013-09-25-16.03.11\SCRIPTS/Galaxy Note 2 Jailbreak-NoYouVerizon\sboot.bin exists
  117. [VERBOSE]verified C:\Users\Troy\AppData\Local\Temp\CASUALTroy-2013-09-25-16.03.11\SCRIPTS/Galaxy Note 2 Jailbreak-NoYouVerizon\boot.img exists
  118. [DEBUG]Expanded $ZIPFILE: $HEIMDALL flash --pit "C:\Users\Troy\AppData\Local\Temp\CASUALTroy-2013-09-25-16.03.11\SCRIPTS/Galaxy Note 2 Jailbreak-NoYouVerizon\sch-i605-16gb.pit" --repartition --BOOTLOADER "C:\Users\Troy\AppData\Local\Temp\CASUALTroy-2013-09-25-16.03.11\SCRIPTS/Galaxy Note 2 Jailbreak-NoYouVerizon\sboot.bin" --8 "C:\Users\Troy\AppData\Local\Temp\CASUALTroy-2013-09-25-16.03.11\SCRIPTS/Galaxy Note 2 Jailbreak-NoYouVerizon\boot.img"
  119. [DEBUG]Received Command: flash --pit "C:\Users\Troy\AppData\Local\Temp\CASUALTroy-2013-09-25-16.03.11\SCRIPTS/Galaxy Note 2 Jailbreak-NoYouVerizon\sch-i605-16gb.pit" --repartition --BOOTLOADER "C:\Users\Troy\AppData\Local\Temp\CASUALTroy-2013-09-25-16.03.11\SCRIPTS/Galaxy Note 2 Jailbreak-NoYouVerizon\sboot.bin" --8 "C:\Users\Troy\AppData\Local\Temp\CASUALTroy-2013-09-25-16.03.11\SCRIPTS/Galaxy Note 2 Jailbreak-NoYouVerizon\boot.img"
  120. [DEBUG]CASUALLanguage- verifying Heimdall deployment.
  121. [DEBUG]Attempting to write C:\Users\Troy\AppData\Local\Temp\CASUALTroy-2013-09-25-16.03.11\libusb-1.0.dll
  122. [DEBUG]File verified.
  123. [DEBUG]Attempting to write C:\Users\Troy\AppData\Local\Temp\CASUALTroy-2013-09-25-16.03.11\heimdall.exe
  124. [DEBUG]File verified.
  125. [DEBUG]Attempting to write C:\Users\Troy\AppData\Local\Temp\CASUALTroy-2013-09-25-16.03.11\msvcp110.dll
  126. [DEBUG]File verified.
  127. [DEBUG]Attempting to write C:\Users\Troy\AppData\Local\Temp\CASUALTroy-2013-09-25-16.03.11\msvcr110.dll
  128. [DEBUG]File verified.
  129. [DEBUG]deployHeimdallForWindows- verifying Heimdall deployment
  130. [DEBUG]heimdall install sucessful
  131. [DEBUG][TRANSLATION]@waitingForDownload
  132. [INFO]Searching for Download Mode device.
  133. [VERBOSE]detected!
  134. [DEBUG][TRANSLATION]@executingHeimdall
  135. [INFO]Executing Heimdall command.
  136. [VERBOSE]Performing standard Heimdall commandflash --pit "C:\Users\Troy\AppData\Local\Temp\CASUALTroy-2013-09-25-16.03.11\SCRIPTS/Galaxy Note 2 Jailbreak-NoYouVerizon\sch-i605-16gb.pit" --repartition --BOOTLOADER "C:\Users\Troy\AppData\Local\Temp\CASUALTroy-2013-09-25-16.03.11\SCRIPTS/Galaxy Note 2 Jailbreak-NoYouVerizon\sboot.bin" --8 "C:\Users\Troy\AppData\Local\Temp\CASUALTroy-2013-09-25-16.03.11\SCRIPTS/Galaxy Note 2 Jailbreak-NoYouVerizon\boot.img"
  137. [DEBUG]###executing real-time command: C:\Users\Troy\AppData\Local\Temp\CASUALTroy-2013-09-25-16.03.11\heimdall.exe###
  138. ......Heimdall v1.4.0
  139.  
  140. Copyright (c) 2010-2013, Benjamin Dobell, Glass Echidna
  141. http://www.glassechidna.com.au/
  142.  
  143. This software is provided free of charge. Copying and redistribution is
  144. encouraged.
  145.  
  146. If you appreciate this software and you would like to support future
  147. development please consider donating:
  148. http://www.glassechidna.com.au/donate/
  149.  
  150. Initialising connection...
  151. Detecting device...
  152. ERROR: Failed to access device. libusb error: -12
  153. [DEBUG]WindowsDrivers() Initializing
  154. [DEBUG][TRANSLATION]@interactionInstallingCADI
  155. [VERBOSE]Installing driver for VID:04E8
  156. [DEBUG]driverExtract() Unzipping CADI
  157. [VERBOSE]Unzipping amd64/libusb0.dll
  158. [VERBOSE]Unzipping amd64/libusb0.sys
  159. [VERBOSE]Unzipping amd64/libusb0_x86.dll
  160. [VERBOSE]Unzipping amd64/libusbK.dll
  161. [VERBOSE]Unzipping amd64/libusbK.sys
  162. [VERBOSE]Unzipping amd64/libusbK_x86.dll
  163. [VERBOSE]Unzipping amd64/WdfCoInstaller01011.dll
  164. [VERBOSE]Unzipping cadi.cat
  165. [VERBOSE]Unzipping cadi.inf
  166. [VERBOSE]Unzipping driver_x64.exe
  167. [VERBOSE]Unzipping driver_x86.exe
  168. [VERBOSE]Unzipping x86/libusb0.dll
  169. [VERBOSE]Unzipping x86/libusb0.sys
  170. [VERBOSE]Unzipping x86/libusb0_x86.dll
  171. [VERBOSE]Unzipping x86/libusbK.dll
  172. [VERBOSE]Unzipping x86/libusbK.sys
  173. [VERBOSE]Unzipping x86/WdfCoInstaller01011.dll
  174. [VERBOSE]Unzip Complete
  175. [DEBUG]Executing timeoutShellCommand
  176. [DEBUG]
  177. ###executing: cmd.exe###
  178. [DEBUG]The current time is: 1380150265457
  179. [DEBUG]The thread will end at: 1380150355456
  180. [INFO]
  181. [VERBOSE]Installing driver for VID:0B05
  182. [DEBUG]Executing timeoutShellCommand
  183. [DEBUG]The current time is: 1380150287941
  184. [DEBUG]The thread will end at: 1380150377941
  185. [DEBUG]
  186. ###executing: cmd.exe###
  187. [INFO]
  188. [VERBOSE]Installing driver for VID:0BB4
  189. [DEBUG]Executing timeoutShellCommand
  190. [DEBUG]
  191. ###executing: cmd.exe###
  192. [DEBUG]The current time is: 1380150294117
  193. [DEBUG]The thread will end at: 1380150384116
  194. [INFO]
  195. [VERBOSE]Installing driver for VID:22B8
  196. [DEBUG]Executing timeoutShellCommand
  197. [DEBUG]The current time is: 1380150295568
  198. [DEBUG]The thread will end at: 1380150385567
  199. [DEBUG]
  200. ###executing: cmd.exe###
  201. [DEBUG][TRANSLATION]@interactionPastebinError
  202. [DEBUG]Requesting User Input.. Title:An Error Has Occured! -message:This is an automated prompt to sumbit a CASUAL log to Pastebin.
  203.  
  204. Please enter your XDA-Developers username and click 'Ok', click 'Cancel' to cancel
  205. [RESPONSEEXPECTED]
  206. [VERBOSE]TimeOut on cmd.exe after 90000ms. Returning what was received.
  207. [INFO]Timeout!!!
  208. [VERBOSE]Installing driver for VID:054C
  209. [DEBUG]Executing timeoutShellCommand
  210. [DEBUG]The current time is: 1380150385572
  211. [DEBUG]The thread will end at: 1380150475571
  212. [DEBUG]
  213. ###executing: cmd.exe###
  214. [DEBUG]Pastebin Login Successful
Advertisement
Add Comment
Please, Sign In to add comment