Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- [DEBUG]working
- [INFO]We are running Windows Vista
- Creating Temp Folder in:C:\Users\Troy\AppData\Local\Temp\CASUALTroy-2013-09-25-16.03.11\CASUAL Cross-platform Android Scripting and Unified Auxiliary Loader
- Revision:816 build:6,941
- CASUAL Copyright (C) 2013 Adam Outler
- This program comes with ABSOLUTELY NO WARRANTY. This is free software,
- and you are welcome to redistribute it, under certain conditions; run
- 'C:\Users\Troy\Desktop\VZW-Gnote2-CASUAL-NoYouVerizon-CASUAL-R816b--Nightly.jar --license'
- for details. http://android-casual.googlecode.com for source.
- [DEBUG]launching GUI
- [DEBUG]Found Windows Computer
- [DEBUG]Attempting to write C:\Users\Troy\AppData\Local\Temp\CASUALTroy-2013-09-25-16.03.11\Elevate.exe
- [DEBUG]File verified.
- [DEBUG]Attempting to write C:\Users\Troy\AppData\Local\Temp\CASUALTroy-2013-09-25-16.03.11\adb.exe
- [DEBUG]File verified.
- [DEBUG]Attempting to write C:\Users\Troy\AppData\Local\Temp\CASUALTroy-2013-09-25-16.03.11\AdbWinApi.dll
- [DEBUG]Picking Jar File:/C:/Users/Troy/Desktop/VZW-Gnote2-CASUAL-NoYouVerizon-CASUAL-R816b--Nightly.jar ..scanning.
- [DEBUG]File verified.
- [DEBUG]Attempting to write C:\Users\Troy\AppData\Local\Temp\CASUALTroy-2013-09-25-16.03.11\AdbWinUsbApi.dll
- [DEBUG]File verified.
- [DEBUG]getting MD5 for:SCRIPTS/
- [DEBUG]getting MD5 for:SCRIPTS/boot.img
- [DEBUG]State Change Detected, The new state is: 1
- [DEBUG]Device Connected
- [DEBUG]@stateConnected
- [DEBUG]State Change Detected, The new state is: 1
- [DEBUG]Device Connected
- [DEBUG]@stateConnected
- [DEBUG]processing:SCRIPTS/-build.properties
- [DEBUG]Loading build information from prop information
- [DEBUG]#This properties file was generated by CASUAL
- #Wed Sep 25 16:03:16 MST 2013
- Application.AlwaysEnableControls=False
- Audio.Enabled=True
- Developer.Name=Adam Outler
- Developer.DonateLink=https\://www.paypal.com/cgi-bin/webscr?cmd\=_s-xclick&hosted_button_id\=W5GQCZUCZCMPU
- Window.Title=No You Verizon
- Window.UsePictureForBanner=True
- Window.ExecuteButtonText=Do It
- Window.BannerPic=
- Developer.DonateToButtonText=Exploit Devs
- Window.BannerText=Online Update Testing
- [DEBUG]getting MD5 for:SCRIPTS/-build.properties
- [DEBUG]processing:SCRIPTS/Galaxy Note 2 Jailbreak-NoYouVerizon.meta
- [DEBUG]Looking up SCRIPTS/Galaxy Note 2 Jailbreak-NoYouVerizon.meta
- [DEBUG]Setting up script SCRIPTS/Galaxy Note 2 Jailbreak-NoYouVerizon with name, tempdir and type
- [DEBUG]getting MD5 for:SCRIPTS/Galaxy Note 2 Jailbreak-NoYouVerizon.meta
- [DEBUG]processing:SCRIPTS/Galaxy Note 2 Jailbreak-NoYouVerizon.scr
- [DEBUG]Looking up SCRIPTS/Galaxy Note 2 Jailbreak-NoYouVerizon.scr
- [DEBUG]getting MD5 for:SCRIPTS/Galaxy Note 2 Jailbreak-NoYouVerizon.scr
- [DEBUG]processing:SCRIPTS/Galaxy Note 2 Jailbreak-NoYouVerizon.txt
- [DEBUG]Looking up SCRIPTS/Galaxy Note 2 Jailbreak-NoYouVerizon.txt
- [DEBUG]getting MD5 for:SCRIPTS/Galaxy Note 2 Jailbreak-NoYouVerizon.txt
- [DEBUG]processing:SCRIPTS/Galaxy Note 2 Jailbreak-NoYouVerizon.zip
- [VERBOSE]found zip at SCRIPTS/Galaxy Note 2 Jailbreak-NoYouVerizon.zip
- [DEBUG]Looking up SCRIPTS/Galaxy Note 2 Jailbreak-NoYouVerizon.zip
- [DEBUG]getting MD5 for:SCRIPTS/Galaxy Note 2 Jailbreak-NoYouVerizon.zip
- [DEBUG]Setting executable C:\Users\Troy\AppData\Local\Temp\CASUALTroy-2013-09-25-16.03.11\adb.exe. Result=true
- [DEBUG]State Change Detected, The new state is: 1
- [DEBUG]Device Connected
- [DEBUG]@stateConnected
- [VERBOSE]ADB Server Started!!!
- [VERBOSE]TimeOut on C:\Users\Troy\AppData\Local\Temp\CASUALTroy-2013-09-25-16.03.11\adb.exe after 5000ms. Returning what was received.
- [DEBUG]State Change Detected, The new state is: 1
- [DEBUG]Controls Enabled status: true
- [DEBUG]Device Connected
- [DEBUG]@stateConnected
- [DEBUG]Controls Enabled status: true
- [DEBUG]processing:SCRIPTS/-logo.png
- [DEBUG]getting MD5 for:SCRIPTS/-logo.png
- [DEBUG]processing:SCRIPTS/-Overview.txt
- [DEBUG]getting MD5 for:SCRIPTS/-Overview.txt
- [DEBUG]Finalizing active script up to be run
- [VERBOSE]Setting script SCRIPTS/Galaxy Note 2 Jailbreak-NoYouVerizon as active and loading
- [DEBUG]Starting loadActiveScript CASPAC unzip.
- [VERBOSE]This is a CASUAL jar with resources
- [DEBUG]returned from checking updates.
- [VERBOSE]Performing unzip of resources.
- [INFO]This is a tool which will root, unlock, and install a custom recovery on a Verizon Galaxy Note 2.
- [DEBUG]adding SCRIPTS/Galaxy Note 2 Jailbreak-NoYouVerizon to UI
- [INFO]This is a tool which will root, unlock, and install a custom recovery on a Verizon Galaxy Note 2. Put your device into ADB mode. Credit for this exploit goes to Lee Harrison
- [DEBUG]Examining CASUAL mode script contents:SCRIPTS/Galaxy Note 2 Jailbreak-NoYouVerizon.zip
- [DEBUG]unzip of SCRIPTS/Galaxy Note 2 Jailbreak-NoYouVerizon.zip is beginning.
- [VERBOSE]Unzipping Superuser.apk
- [VERBOSE]Unzipping busybox
- [VERBOSE]Unzipping exploit
- [VERBOSE]Unzipping exynos-abuse
- [VERBOSE]Unzipping rootGN.sh
- [VERBOSE]Unzipping swagBoot
- [VERBOSE]Unzipping sch-i605-16gb.pit
- [VERBOSE]Unzipping sboot.bin
- [VERBOSE]Unzipping recoverThis
- [VERBOSE]Unzipping boot.img
- [VERBOSE]Unzipping su
- [VERBOSE]Unzip Complete
- [DEBUG]unzip of SCRIPTS/Galaxy Note 2 Jailbreak-NoYouVerizon is complete.
- [DEBUG]StartButtonActionPerformed() Script Activated
- [DEBUG]Script known as SCRIPTS/Galaxy Note 2 Jailbreak-NoYouVerizon is running
- [DEBUG]Controls Enabled status: false
- [DEBUG]Loading internal resource: SCRIPTS/Galaxy Note 2 Jailbreak-NoYouVerizon
- [DEBUG]Executing Scripted Datastreamjava.io.DataInputStream@85ce5a
- [DEBUG]Executing
- [DEBUG]CASUAL has initiated a multithreaded execution environment
- [DEBUG]Reading datastreamjava.io.DataInputStream@85ce5a
- [DEBUG]SCRIPT COMMAND:$USERCANCELOPTION Are you sure?, This is your only warning.\n You will be Unlocked and Rooted. Your device will\n reboot once and then again into Odin mode. CASUAL\n will then flash the No You Verizon Bootloader\n package for you.
- [DEBUG]SCRIPT COMMAND:$ECHO Rebooting into download mode
- [DEBUG]Received ECHO command$ECHO Rebooting into download mode
- [INFO]Rebooting into download mode
- [DEBUG]SCRIPT COMMAND:$ADB reboot download
- [DEBUG]sending
- [DEBUG]###executing real-time command: C:\Users\Troy\AppData\Local\Temp\CASUALTroy-2013-09-25-16.03.11\adb.exe###
- [DEBUG]return from ADB:
- [DEBUG]SCRIPT COMMAND:$HEIMDALL flash --pit "$ZIPFILEsch-i605-16gb.pit" --repartition --BOOTLOADER "$ZIPFILEsboot.bin" --8 "$ZIPFILEboot.img"
- [VERBOSE]verified C:\Users\Troy\AppData\Local\Temp\CASUALTroy-2013-09-25-16.03.11\SCRIPTS/Galaxy Note 2 Jailbreak-NoYouVerizon\sch-i605-16gb.pit exists
- [VERBOSE]verified C:\Users\Troy\AppData\Local\Temp\CASUALTroy-2013-09-25-16.03.11\SCRIPTS/Galaxy Note 2 Jailbreak-NoYouVerizon\sboot.bin exists
- [VERBOSE]verified C:\Users\Troy\AppData\Local\Temp\CASUALTroy-2013-09-25-16.03.11\SCRIPTS/Galaxy Note 2 Jailbreak-NoYouVerizon\boot.img exists
- [DEBUG]Expanded $ZIPFILE: $HEIMDALL flash --pit "C:\Users\Troy\AppData\Local\Temp\CASUALTroy-2013-09-25-16.03.11\SCRIPTS/Galaxy Note 2 Jailbreak-NoYouVerizon\sch-i605-16gb.pit" --repartition --BOOTLOADER "C:\Users\Troy\AppData\Local\Temp\CASUALTroy-2013-09-25-16.03.11\SCRIPTS/Galaxy Note 2 Jailbreak-NoYouVerizon\sboot.bin" --8 "C:\Users\Troy\AppData\Local\Temp\CASUALTroy-2013-09-25-16.03.11\SCRIPTS/Galaxy Note 2 Jailbreak-NoYouVerizon\boot.img"
- [DEBUG]Received Command: flash --pit "C:\Users\Troy\AppData\Local\Temp\CASUALTroy-2013-09-25-16.03.11\SCRIPTS/Galaxy Note 2 Jailbreak-NoYouVerizon\sch-i605-16gb.pit" --repartition --BOOTLOADER "C:\Users\Troy\AppData\Local\Temp\CASUALTroy-2013-09-25-16.03.11\SCRIPTS/Galaxy Note 2 Jailbreak-NoYouVerizon\sboot.bin" --8 "C:\Users\Troy\AppData\Local\Temp\CASUALTroy-2013-09-25-16.03.11\SCRIPTS/Galaxy Note 2 Jailbreak-NoYouVerizon\boot.img"
- [DEBUG]CASUALLanguage- verifying Heimdall deployment.
- [DEBUG]Attempting to write C:\Users\Troy\AppData\Local\Temp\CASUALTroy-2013-09-25-16.03.11\libusb-1.0.dll
- [DEBUG]File verified.
- [DEBUG]Attempting to write C:\Users\Troy\AppData\Local\Temp\CASUALTroy-2013-09-25-16.03.11\heimdall.exe
- [DEBUG]File verified.
- [DEBUG]Attempting to write C:\Users\Troy\AppData\Local\Temp\CASUALTroy-2013-09-25-16.03.11\msvcp110.dll
- [DEBUG]File verified.
- [DEBUG]Attempting to write C:\Users\Troy\AppData\Local\Temp\CASUALTroy-2013-09-25-16.03.11\msvcr110.dll
- [DEBUG]File verified.
- [DEBUG]deployHeimdallForWindows- verifying Heimdall deployment
- [DEBUG]heimdall install sucessful
- [DEBUG][TRANSLATION]@waitingForDownload
- [INFO]Searching for Download Mode device.
- [VERBOSE]detected!
- [DEBUG][TRANSLATION]@executingHeimdall
- [INFO]Executing Heimdall command.
- [VERBOSE]Performing standard Heimdall commandflash --pit "C:\Users\Troy\AppData\Local\Temp\CASUALTroy-2013-09-25-16.03.11\SCRIPTS/Galaxy Note 2 Jailbreak-NoYouVerizon\sch-i605-16gb.pit" --repartition --BOOTLOADER "C:\Users\Troy\AppData\Local\Temp\CASUALTroy-2013-09-25-16.03.11\SCRIPTS/Galaxy Note 2 Jailbreak-NoYouVerizon\sboot.bin" --8 "C:\Users\Troy\AppData\Local\Temp\CASUALTroy-2013-09-25-16.03.11\SCRIPTS/Galaxy Note 2 Jailbreak-NoYouVerizon\boot.img"
- [DEBUG]###executing real-time command: C:\Users\Troy\AppData\Local\Temp\CASUALTroy-2013-09-25-16.03.11\heimdall.exe###
- ......Heimdall v1.4.0
- Copyright (c) 2010-2013, Benjamin Dobell, Glass Echidna
- http://www.glassechidna.com.au/
- This software is provided free of charge. Copying and redistribution is
- encouraged.
- If you appreciate this software and you would like to support future
- development please consider donating:
- http://www.glassechidna.com.au/donate/
- Initialising connection...
- Detecting device...
- ERROR: Failed to access device. libusb error: -12
- [DEBUG]WindowsDrivers() Initializing
- [DEBUG][TRANSLATION]@interactionInstallingCADI
- [VERBOSE]Installing driver for VID:04E8
- [DEBUG]driverExtract() Unzipping CADI
- [VERBOSE]Unzipping amd64/libusb0.dll
- [VERBOSE]Unzipping amd64/libusb0.sys
- [VERBOSE]Unzipping amd64/libusb0_x86.dll
- [VERBOSE]Unzipping amd64/libusbK.dll
- [VERBOSE]Unzipping amd64/libusbK.sys
- [VERBOSE]Unzipping amd64/libusbK_x86.dll
- [VERBOSE]Unzipping amd64/WdfCoInstaller01011.dll
- [VERBOSE]Unzipping cadi.cat
- [VERBOSE]Unzipping cadi.inf
- [VERBOSE]Unzipping driver_x64.exe
- [VERBOSE]Unzipping driver_x86.exe
- [VERBOSE]Unzipping x86/libusb0.dll
- [VERBOSE]Unzipping x86/libusb0.sys
- [VERBOSE]Unzipping x86/libusb0_x86.dll
- [VERBOSE]Unzipping x86/libusbK.dll
- [VERBOSE]Unzipping x86/libusbK.sys
- [VERBOSE]Unzipping x86/WdfCoInstaller01011.dll
- [VERBOSE]Unzip Complete
- [DEBUG]Executing timeoutShellCommand
- [DEBUG]
- ###executing: cmd.exe###
- [DEBUG]The current time is: 1380150265457
- [DEBUG]The thread will end at: 1380150355456
- [INFO]
- [VERBOSE]Installing driver for VID:0B05
- [DEBUG]Executing timeoutShellCommand
- [DEBUG]The current time is: 1380150287941
- [DEBUG]The thread will end at: 1380150377941
- [DEBUG]
- ###executing: cmd.exe###
- [INFO]
- [VERBOSE]Installing driver for VID:0BB4
- [DEBUG]Executing timeoutShellCommand
- [DEBUG]
- ###executing: cmd.exe###
- [DEBUG]The current time is: 1380150294117
- [DEBUG]The thread will end at: 1380150384116
- [INFO]
- [VERBOSE]Installing driver for VID:22B8
- [DEBUG]Executing timeoutShellCommand
- [DEBUG]The current time is: 1380150295568
- [DEBUG]The thread will end at: 1380150385567
- [DEBUG]
- ###executing: cmd.exe###
- [DEBUG][TRANSLATION]@interactionPastebinError
- [DEBUG]Requesting User Input.. Title:An Error Has Occured! -message:This is an automated prompt to sumbit a CASUAL log to Pastebin.
- Please enter your XDA-Developers username and click 'Ok', click 'Cancel' to cancel
- [RESPONSEEXPECTED]
- [VERBOSE]TimeOut on cmd.exe after 90000ms. Returning what was received.
- [INFO]Timeout!!!
- [VERBOSE]Installing driver for VID:054C
- [DEBUG]Executing timeoutShellCommand
- [DEBUG]The current time is: 1380150385572
- [DEBUG]The thread will end at: 1380150475571
- [DEBUG]
- ###executing: cmd.exe###
- [DEBUG]Pastebin Login Successful
Advertisement
Add Comment
Please, Sign In to add comment