Advertisement
Bradiss69

Bradiss - Jungleflasher

Dec 8th, 2013
1,084
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1.  
  2.  
  3.  
  4.  
  5. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  6.  
  7. JungleFlasher 0.1.96 Beta (323)
  8.  
  9. Session Started Sat Dec 07 21:11:44 2013
  10.  
  11.  
  12.  
  13. This is a 32 bit process running on a 32 bit CPU
  14.  
  15. X360USB PRO detected, Version 0.18
  16.  
  17.  
  18.  
  19. Found 1 I/O Ports.
  20.  
  21. Found 2 Com Ports.
  22.  
  23. Found 3 windows drives C: D: E:
  24.  
  25. Found 1 CD/DVD drives E:
  26.  
  27.  
  28.  
  29. Drive is Slim Lite-On..
  30.  
  31. Drive is Slim Lite-On..
  32.  
  33.  
  34.  
  35.  
  36.  
  37. 0000: 05 80 00 32 5B 00 00 00 - 50 4C 44 53 20 20 20 20 ...2[...PLDS    
  38.  
  39. 0010: 44 47 2D 31 36 44 34 53 - 20 20 20 20 20 20 20 20 DG-16D4S        
  40.  
  41. 0020: 30 32 32 35 00 00 00 00 - 00 00 00 00 00 00 00 00 0225............
  42.  
  43. 0030: 00 00 00 00 41 30 41 30 - 00 00 00 00 00 00 00 00 ....A0A0........
  44.  
  45. 0040: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
  46.  
  47. 0050: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
  48.  
  49. 0060: 44 37 31 34 43 47 30 34 - 30 39 30 31 30 30 31 46 D714CG040901001F
  50.  
  51. 0070: 58 20 20 20                                       X              
  52.  
  53.  
  54.  
  55. Sending Password to Drive on port 0x0000
  56.  
  57. Drive is Slim Lite-On..
  58.  
  59. Drive is Slim Lite-On..
  60.  
  61.  
  62.  
  63.  
  64.  
  65. 0000: 05 80 00 32 5B 00 00 00 - 50 4C 44 53 20 20 20 20 ...2[...PLDS    
  66.  
  67. 0010: 44 47 2D 31 36 44 34 53 - 20 20 20 20 20 20 20 20 DG-16D4S        
  68.  
  69. 0020: 30 32 32 35 00 00 00 00 - 00 00 00 00 00 00 00 00 0225............
  70.  
  71. 0030: 00 00 00 00 41 30 41 30 - 00 00 00 00 00 00 00 00 ....A0A0........
  72.  
  73. 0040: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
  74.  
  75. 0050: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
  76.  
  77. 0060: 44 37 31 34 43 47 30 34 - 30 39 30 31 30 30 31 46 D714CG040901001F
  78.  
  79. 0070: 58 20 20 20                                       X              
  80.  
  81.  
  82.  
  83. 0000: C0 85 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
  84.  
  85. 0010: 00 00 00 00 37 44 34 31 - 47 43 34 30 39 30 31 30 ....7D41GC409010
  86.  
  87. 0020: 30 30 46 31 20 58 20 20 - 00 00 00 00 00 00 32 30 00F1 X  ......20
  88.  
  89. 0030: 35 32 20 20 20 20 4C 50 - 53 44 20 20 20 20 47 44 52    LPSD    GD
  90.  
  91. 0040: 31 2D 44 36 53 34 20 20 - 20 20 20 20 20 20 00 00 1-D6S4        ..
  92.  
  93. 0050: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
  94.  
  95. 0060: 00 00 00 0F 00 40 00 04 - 00 02 06 00 00 00 00 00 .....@..........
  96.  
  97. 0070: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
  98.  
  99. 0080: 03 00 78 00 78 00 78 00 - 78 00 00 00 00 00 00 00 ..x.x.x.x.......
  100.  
  101. 0090: 00 00 F8 00 10 02 00 00 - 02 02 00 00 60 00 00 00 ............`...
  102.  
  103. 00A0: F8 00 10 02 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
  104.  
  105. 00B0: 3F 20 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ? ..............
  106.  
  107. 00C0: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
  108.  
  109. 00D0: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
  110.  
  111. 00E0: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
  112.  
  113. 00F0: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
  114.  
  115. 0100: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
  116.  
  117. 0110: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
  118.  
  119. 0120: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
  120.  
  121. 0130: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
  122.  
  123. 0140: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
  124.  
  125. 0150: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
  126.  
  127. 0160: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
  128.  
  129. 0170: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
  130.  
  131. 0180: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
  132.  
  133. 0190: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
  134.  
  135. 01A0: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
  136.  
  137. 01B0: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
  138.  
  139. 01C0: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
  140.  
  141. 01D0: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
  142.  
  143. 01E0: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
  144.  
  145. 01F0: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
  146.  
  147.  
  148.  
  149. Sending Vendor Intro to port 0x0000
  150.  
  151. Status 0x51
  152.  
  153. Re-sending Vendor Intro:
  154.  
  155. ........
  156.  
  157. Serial flash found with Status 0x72
  158.  
  159.  
  160.  
  161. Sending Device ID request to port 0x0000
  162.  
  163. Manufacturer ID: 0xEF
  164.  
  165. Device ID: 0x11
  166.  
  167. Flash Name:  Winbond/NEX(W25P20/NX25P20)
  168.  
  169. Flash Size:  262144 bytes
  170.  
  171. ............
  172.  
  173. Key: 4ED247B1ADBEF30B09C8DC203CE882A9 is verified, Thanks C4eva
  174.  
  175.  
  176.  
  177. Grabbing Key sector: ................
  178.  
  179. Key Sector verified.
  180.  
  181. Grabbing Serial info: ........
  182.  
  183.  
  184.  
  185. Drive is Slim Lite-On..
  186.  
  187. Key data saved to C:\Documents and Settings\J\Desktop\JungleFlasher.0.1.94.Beta(320)\firmware\Original\Dummy_(Slim)_109563404308.bin
  188.  
  189.  
  190.  
  191. 0000: 05 80 00 32 5B 00 00 00 - 50 4C 44 53 20 20 20 20 ...2[...PLDS    
  192.  
  193. 0010: 44 47 2D 31 36 44 34 53 - 20 20 20 20 20 20 20 20 DG-16D4S        
  194.  
  195. 0020: 30 32 32 35 00 00 00 00 - 00 00 00 00 00 00 00 00 0225............
  196.  
  197. 0030: 00 00 00 00 41 30 41 30 - 00 00 00 00 00 00 00 00 ....A0A0........
  198.  
  199. 0040: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
  200.  
  201. 0050: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
  202.  
  203. 0060: 44 37 31 34 43 47 30 34 - 30 39 30 31 30 30 31 46 D714CG040901001F
  204.  
  205. 0070: 58 20 20 20                                       X              
  206.  
  207.  
  208.  
  209. Inquiry String saved to C:\Documents and Settings\J\Desktop\JungleFlasher.0.1.94.Beta(320)\firmware\Original\Inquiry_(Slim)_109563404308.bin
  210.  
  211.  
  212.  
  213. 0000: C0 85 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
  214.  
  215. 0010: 00 00 00 00 37 44 34 31 - 47 43 34 30 39 30 31 30 ....7D41GC409010
  216.  
  217. 0020: 30 30 46 31 20 58 20 20 - 00 00 00 00 00 00 32 30 00F1 X  ......20
  218.  
  219. 0030: 35 32 20 20 20 20 4C 50 - 53 44 20 20 20 20 47 44 52    LPSD    GD
  220.  
  221. 0040: 31 2D 44 36 53 34 20 20 - 20 20 20 20 20 20 00 00 1-D6S4        ..
  222.  
  223. 0050: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
  224.  
  225. 0060: 00 00 00 0F 00 40 00 04 - 00 02 06 00 00 00 00 00 .....@..........
  226.  
  227. 0070: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
  228.  
  229. 0080: 03 00 78 00 78 00 78 00 - 78 00 00 00 00 00 00 00 ..x.x.x.x.......
  230.  
  231. 0090: 00 00 F8 00 10 02 00 00 - 02 02 00 00 60 00 40 00 ............`.@.
  232.  
  233. 00A0: F8 00 10 02 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
  234.  
  235. 00B0: 3F 20 00 00                                       ? ..            
  236.  
  237.  
  238.  
  239. Identify String saved to C:\Documents and Settings\J\Desktop\JungleFlasher.0.1.94.Beta(320)\firmware\Original\Identify_(Slim)_109563404308.bin
  240.  
  241.  
  242.  
  243. 0000: 44 37 31 34 43 47 30 34 - 30 39 30 31 30 30 31 46 D714CG040901001F
  244.  
  245. 0010: 58 20 20 20 FF FF FF FF - 30 49 30 39 31 38 36 34 X   ....0I091864
  246.  
  247. 0020: 31 36 39 32 31 35 58 58 - 41 30 FF FF 53 34 50 30 169215XXA0..S4P0
  248.  
  249. 0030: 39 32 37 30 30 30 30 30 - 31 32 39 37 30 33 00 00 92700000129703..
  250.  
  251. 0040: 00 00 00 00 00 00 00 00 - 00 00 00 00 41 30 FF FF ............A0..
  252.  
  253.  
  254.  
  255. Serial String saved to C:\Documents and Settings\J\Desktop\JungleFlasher.0.1.94.Beta(320)\firmware\Original\Serial_(Slim)_109563404308.bin
  256.  
  257.  
  258.  
  259. Hashing Drive: ................
  260.  
  261.  
  262.  
  263. Dummy.bin file saved to Dummy_(Slim)_109563404308.bin
  264.  
  265. Loading firmware from buffer
  266.  
  267. Inquiry string found
  268.  
  269. Identify string found
  270.  
  271. Drive key @ 0xA030 4ED247B1ADBEF30B09C8DC203CE882A9
  272.  
  273. Firmware Osig: [PLDS    DG-16D4S        0225]
  274.  
  275. Firmware is:  SlimKey Extract                
  276.  
  277. Key added to database
  278.  
  279.  
  280.  
  281. Auto-Loading firmware file C:\Documents and Settings\J\Desktop\JungleFlasher.0.1.94.Beta(320)\firmware\LTPlus-0225-v3.0.bin
  282.  
  283. MD5 hash:  1a38d3a2a6519339599fa1866642c513
  284.  
  285. Genuine LT plus v3.0
  286.  
  287. Drive key @ n/a FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
  288.  
  289. Firmware Osig: [PLDS    DG-16D4S        0225]
  290.  
  291. Firmware is:  LT-Plus 3.0                    
  292.  
  293. Spoofing Target
  294.  
  295. DVD Key copied to target
  296.  
  297. Key Sector copied from Source to Target
  298.  
  299. Target is LT - ID strings not copied to Target
  300.  
  301.  
  302.  
  303. Sending Vendor Intro to port 0x0000
  304.  
  305. Status 0x80
  306.  
  307. Re-sending Vendor Intro:
  308.  
  309. ....
  310.  
  311. Serial flash found with Status 0x72
  312.  
  313.  
  314.  
  315. Sending Device ID request to port 0x0000
  316.  
  317. Spi Status: 0x00
  318.  
  319. Manufacturer ID: 0xEF
  320.  
  321. Device ID: 0x11
  322.  
  323. Flash Name:  Winbond/NEX(W25P20/NX25P20)
  324.  
  325. Flash Size:  262144 bytes
  326.  
  327.  
  328.  
  329. Getting Status from port 0x0000
  330.  
  331. SPi flash found with Status 0x72
  332.  
  333.  
  334.  
  335. Sending Chip Erase to Port 0x0000
  336.  
  337. Erasing:
  338.  
  339. Writing target buffer to flash
  340.  
  341. Writing Bank 0: ................
  342.  
  343. Writing Bank 1: ................
  344.  
  345. Writing Bank 2: ................
  346.  
  347. Writing Bank 3: ................
  348.  
  349.  
  350.  
  351. Flash Verification Test !
  352.  
  353. Reading Bank 0: ................
  354.  
  355. Reading Bank 1: ................
  356.  
  357. Reading Bank 2: ................
  358.  
  359. Reading Bank 3: ................
  360.  
  361. Write verified OK !
  362.  
  363.  
  364.  
  365.  
  366.  
  367. Sending Spi Lock request to Port 0x0000
  368.  
  369. Spi Status: 0x8C
  370.  
  371.  
  372.  
  373. Sending Spi UnLock request to Port 0x0000
  374.  
  375. .....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
  376.  
  377. Sending Spi UnLock request to Port 0x0000
  378.  
  379. .....................................
  380.  
  381. Aborted by User!
  382.  
  383. .......................................................................
  384.  
  385. Sending Spi UnLock request to Port 0x0000
  386.  
  387. .......
  388.  
  389. Aborted by User!
  390.  
  391. Sending Vendor Outro to port 0x0000
  392.  
  393. Sending Vendor Outro to port 0x0000
  394.  
  395.  
  396.  
  397.  
  398.  
  399. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  400.  
  401. JungleFlasher 0.1.96 Beta (323)
  402.  
  403. Session Started Sun Dec 08 11:19:35 2013
  404.  
  405.  
  406.  
  407. This is a 32 bit process running on a 32 bit CPU
  408.  
  409. X360USB PRO detected, Version 0.18
  410.  
  411.  
  412.  
  413. Found 1 I/O Ports.
  414.  
  415. Found 2 Com Ports.
  416.  
  417. Found 2 windows drives C: E:
  418.  
  419. Found 1 CD/DVD drives E:
  420.  
  421.  
  422.  
  423. Loading firmware file C:\Documents and Settings\J\Desktop\JungleFlasher.0.1.94.Beta(320)\firmware\Original\Dummy_(Slim)_109563404308.bin
  424.  
  425. MD5 hash:  fc6c6809da281e35be648d0de259f931
  426.  
  427. Inquiry string found
  428.  
  429. Identify string found
  430.  
  431. Drive key @ 0xA030 4ED247B1ADBEF30B09C8DC203CE882A9
  432.  
  433. Firmware Osig: [PLDS    DG-16D4S        0225]
  434.  
  435. Firmware is:  SlimKey Extract                
  436.  
  437. Sending Vendor Intro to port 0x0000
  438.  
  439. Status 0x80
  440.  
  441. Re-sending Vendor Intro:
  442.  
  443. .......
  444.  
  445. Serial flash found with Status 0x72
  446.  
  447.  
  448.  
  449. Sending Device ID request to port 0x0000
  450.  
  451. Spi Status: 0x8C
  452.  
  453. Manufacturer ID: 0xEF
  454.  
  455. Device ID: 0x11
  456.  
  457. Flash Name:  Winbond/NEX(W25P20/NX25P20)
  458.  
  459. Flash Size:  262144 bytes
  460.  
  461. Sending Vendor Outro to port 0x0000
  462.  
  463. Sending Vendor Outro to port 0x0000
  464.  
  465. Sending Vendor Outro to port 0x0000
  466.  
  467. Sending Vendor Intro to port 0x0000
  468.  
  469. Status 0x80
  470.  
  471. Re-sending Vendor Intro:
  472.  
  473. ......
  474.  
  475. Serial flash found with Status 0x72
  476.  
  477.  
  478.  
  479. Sending Device ID request to port 0x0000
  480.  
  481. Spi Status: 0x8C
  482.  
  483. Manufacturer ID: 0xEF
  484.  
  485. Device ID: 0x11
  486.  
  487. Flash Name:  Winbond/NEX(W25P20/NX25P20)
  488.  
  489. Flash Size:  262144 bytes
  490.  
  491. Loading firmware file C:\Documents and Settings\J\Desktop\JungleFlasher.0.1.94.Beta(320)\firmware\Original\Dummy_(Slim)_109563404308.bin
  492.  
  493. MD5 hash:  fc6c6809da281e35be648d0de259f931
  494.  
  495. Inquiry string found
  496.  
  497. Identify string found
  498.  
  499. Drive key @ 0xA030 4ED247B1ADBEF30B09C8DC203CE882A9
  500.  
  501. Firmware Osig: [PLDS    DG-16D4S        0225]
  502.  
  503. Firmware is:  SlimKey Extract                
  504.  
  505. Auto-Loading firmware file C:\Documents and Settings\J\Desktop\JungleFlasher.0.1.94.Beta(320)\firmware\LTPlus-0225-v3.0.bin
  506.  
  507. MD5 hash:  1a38d3a2a6519339599fa1866642c513
  508.  
  509. Genuine LT plus v3.0
  510.  
  511. Drive key @ n/a FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
  512.  
  513. Firmware Osig: [PLDS    DG-16D4S        0225]
  514.  
  515. Firmware is:  LT-Plus 3.0                    
  516.  
  517. Spoofing Target
  518.  
  519. DVD Key copied to target
  520.  
  521. Key Sector copied from Source to Target
  522.  
  523. Target is LT - ID strings not copied to Target
  524.  
  525.  
  526.  
  527.  
  528.  
  529. Getting Status from port 0x0000
  530.  
  531. SPi flash found with Status 0x72
  532.  
  533. Spi is locked, Aborting!
  534.  
  535.  
  536.  
  537. Getting Status from port 0x0000
  538.  
  539. SPi flash found with Status 0x72
  540.  
  541. Spi is locked, Aborting!
  542.  
  543.  
  544.  
  545. Getting Status from port 0x0000
  546.  
  547. Serial flash found with Status 0x72
  548.  
  549.  
  550.  
  551. Reading Bank 0: ................
  552.  
  553. Reading Bank 1: ................
  554.  
  555. Reading Bank 2: ................
  556.  
  557. Reading Bank 3: ................
  558.  
  559.  
  560.  
  561. Dumped in 9423mS
  562.  
  563. Loading firmware from buffer
  564.  
  565. Drive key @ n/a 4ED247B1ADBEF30B09C8DC203CE882A9
  566.  
  567. Firmware Osig: [PLDS    DG-16D4S        0225]
  568.  
  569. Firmware is:  LT-Plus 3.0                    
  570.  
  571. Key database updated
  572.  
  573.  
  574.  
  575. Auto-Loading firmware file C:\Documents and Settings\J\Desktop\JungleFlasher.0.1.94.Beta(320)\firmware\LTPlus-0225-v3.0.bin
  576.  
  577. MD5 hash:  1a38d3a2a6519339599fa1866642c513
  578.  
  579. Genuine LT plus v3.0
  580.  
  581. Drive key @ n/a FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
  582.  
  583. Firmware Osig: [PLDS    DG-16D4S        0225]
  584.  
  585. Firmware is:  LT-Plus 3.0                    
  586.  
  587. Spoofing Target
  588.  
  589. DVD Key copied to target
  590.  
  591. Key Sector copied from Source to Target
  592.  
  593. Target is LT - ID strings not copied to Target
  594.  
  595.  
  596.  
  597.  
  598.  
  599. Loading MTK_Flash source file
  600.  
  601. Loading firmware file C:\Documents and Settings\J\Desktop\JungleFlasher.0.1.94.Beta(320)\firmware\Original\Dummy_(Slim)_109563404308.bin
  602.  
  603. MD5 hash:  fc6c6809da281e35be648d0de259f931
  604.  
  605. Inquiry string found
  606.  
  607. Identify string found
  608.  
  609. Drive key @ 0xA030 4ED247B1ADBEF30B09C8DC203CE882A9
  610.  
  611. Firmware Osig: [PLDS    DG-16D4S        0225]
  612.  
  613. Firmware is:  SlimKey Extract                
  614.  
  615. Auto-Loading firmware file C:\Documents and Settings\J\Desktop\JungleFlasher.0.1.94.Beta(320)\firmware\LTPlus-0225-v3.0.bin
  616.  
  617. MD5 hash:  1a38d3a2a6519339599fa1866642c513
  618.  
  619. Genuine LT plus v3.0
  620.  
  621. Drive key @ n/a FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
  622.  
  623. Firmware Osig: [PLDS    DG-16D4S        0225]
  624.  
  625. Firmware is:  LT-Plus 3.0                    
  626.  
  627. Spoofing Target
  628.  
  629. DVD Key copied to target
  630.  
  631. Key Sector copied from Source to Target
  632.  
  633. Target is LT - ID strings not copied to Target
  634.  
  635.  
  636.  
  637.  
  638.  
  639. Getting Status from port 0x0000
  640.  
  641. SPi flash found with Status 0x72
  642.  
  643. Spi is locked, Aborting!
  644.  
  645. Sending Vendor Intro to port 0x0000
  646.  
  647.  
  648.  
  649. Serial flash found with Status 0x72
  650.  
  651.  
  652.  
  653. Sending Device ID request to port 0x0000
  654.  
  655. Spi Status: 0x8C
  656.  
  657. Manufacturer ID: 0xEF
  658.  
  659. Device ID: 0x11
  660.  
  661. Flash Name:  Winbond/NEX(W25P20/NX25P20)
  662.  
  663. Flash Size:  262144 bytes
  664.  
  665. Sending Vendor Outro to port 0x0000
  666.  
  667. Sending Vendor Outro to port 0x0000
Advertisement
RAW Paste Data Copied
Advertisement