Sunteți pe pagina 1din 10

* Para iniciar o processo a Extra__o(Dump) de sua Nand _ necess_ria:

- Se voc_ possui a extra__o, carregue-a.


- Se voc_ j_ tem a FSD v3 conecte seu console _ rede e clique Ler-IP(IP-Read)
- Se voc_ n_o tem a FSD, mas tem o XELL, tente usar o bot_o Dumper-USB e siga
o process.
- Se o console _ Original de F_brica, instale e escolha seu Leitor de Nand cli
que
Flasher-Read.
* Se voc_ j_ tem a FSD v3 e quer atualizar sua Dash selecione Lan ou Modo Usb(
Usb Mode) e escolha AutoAtualizar-Dash(AutoUpdate-Dash
Aguarde gerando arquivos temporarios...OK
DETECTANDO NAND: "nand\nanddump.bin"
-----------------------------------------------------------------------------------------------------------NandPro v3.0a by Tiros
Could not open Virtual Nand Device File: nand\nanddump.bin
Can not continue
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------NandPro v2.0e by Tiros
Could not open Virtual Nand Device File: nand\nanddump.bin
Can not continue
-----------------------------------------------------------------------------------------------------------Unecc dump detected
Checking ECC-CheckSum... Wait
BUSCANDO SMC_CONFIG na NAND
Smc Config encontrado em 0x02FF0000
Lendo Temperaturas...:
Reset Parental Code: XXUD
ANALIZANDO DAdOS Da NAND
ID: a8bc7570
Encontrado SMC (version 2.5) : 00000800 - 00004000
SMC Patch found at offset 0x13b9
Nand NO RETAIL (Exploited)
Encontrado Keyvault : 00004000 - 00008000
Looking for Cpukey in Local Database. Saved New Id: a8bc7570 with Cpukey : 3956A
906711604BF59E6E60B67E30BAD
Reloaded_Glitch.bin
-----------------------------------------------------------------------------------------------------------1 arquivo(s) copiado(s).
------------------------------------------------------------------------------------------------------------

Cpukey Detected : 3956A906711604BF59E6E60B67E30BAD


Checking CpuKey
Saved New Id: a8bc7570 with Cpukey : 3956A906711604BF59E6E60B67E30BAD
Reloaded_Glitch.bin
-----------------------------------------------------------------------------------------------------------1 arquivo(s) copiado(s).
-----------------------------------------------------------------------------------------------------------CpuKey is correct
Encontrado CB_A (build 13121) :
00008000 - 00009af0
Encontrado CB_B (build 13121) :
00009af0 - 00011630
Encontrado CD (build 12905) : 00011630 - 00016a30
Encontrado CE (build 1888) : 00016a30 - 0006caa0
Encontrado CF (build 16203) : 000b0000- 000b4560
Encontrado CF1 build :
None
Encontrado CG (build 16203) : 000b4560- 00129a52
Encontrado CG1 build :
None
Nand valida
DETECTANDO MODELO DO CONSOLE
Verificando se _ um modelo Exploiteable...
Modelo : Corona4g CB_A_13121 GLITCHEABLE
CD_12905 Invalida para Jtag ou j_ Jtaged
Size: 64
Reloaded_Glitch_c.bin
-----------------------------------------------------------------------------------------------------------1 arquivo(s) copiado(s).
-----------------------------------------------------------------------------------------------------------FileSystems:
FileSystem Active:31 offset:0xE50000
FileSystem Last:31 offset:0xE50000
Block
0x00000800
0x00004000
0x00008000
0x00009AF0
0x00011630
0x00016A30
0x00070000
0x000B0000
0x000B4560
0x000C9B26
0x001326C9
0x00145D17
0x001A6C9B
0x001B26C9
0x00722E8B
0x0072E8BA
0x00749B26
0x00768BA2

Size
0x00003800
0x00004000
0x00001AF0
0x00007B40
0x00005400
0x00056070
0x00040000
0x00004560
0x000754F2
0x00069A60
0x00014000
0x00061000
0x0000C000
0x0059C000
0x0000A000
0x0001B000
0x0001D000
0x00014000

File
SMC_2.5.bin
Keyvault.bin
CB_A_13121.bin
CB_B_13121.bin
CD_12905.bin
CE_1888.bin
xell.bin
CF_16203.bin
CG_16203.bin
sysupdate.xexp1
aac.xexp1
bootanim.xex
createprofile.xex
dash.xex
deviceselector.xex
gamerprofile.xex
hud.xex
huduiskin.xex

0x0077C1F0
0x00008000
mfgbootlauncher.xex
0x00783E0F
0x0000B000
minimediaplayer.xex
0x0078F83E
0x0000E000
nomni.xexp1
0x0079F07C
0x00002000
nomnifwk.xexp1
0x007A2E8B
0x00005000
nomnifwm.xexp1
0x007B26C9
0x00016000
signin.xex
0x007D1745
0x0000B000
vk.xex
0x007DD174
0x0024F000
xam.xex
0x00A1B26C
0x0011B000
xenonclatin.xtt
0x00B2E8BA
0x00018000
xenonclatin.xttp1
0x00B45D17
0x001A8000
xenonjklatin.xtt
0x00CE0F83
0x00007000
xenonjklatin.xttp1
0x00CE8BA2
0x00017000
ximecore.xex
0x00D00000
0x00090000
ximedic.xex
0x00D8BA2E
0x00002800
ximedic.xexp1
0x00D8F83E
0x0000C800
launch.xex
0x00D9F07C
0x00006000
lhelper.xex
0x00DA6C9B
0x000002AD
launch.ini
0x00DAAAAA
0x00000A00
crl.bin
0x00DAE8BA
0x0000AD30
dae.bin
0x00DDD174
0x00004000
extended.bin
Saved New Id: a8bc7570 with Cpukey : 3956A906711604BF59E6E60B67E30BAD
Nand in Folder
Reloaded_Glitch_c.bin
-----------------------------------------------------------------------------------------------------------1 arquivo(s) copiado(s).
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------* Selecione o tipo de imagem e as op__es desejadas e clique Criar - Xebuild
-----------------------------------------------------------------------------------------------------------Nand nand\nanddump.bin valido.Procesando xeBuild aguarde................
Nand j_ Glitcheada, N_o sera aplicado patch no SMC
17489 Installed
Foram ultilizada as seguintes op__es para gerar a imagem:
xeBuild.exe -a nofcrt -o cfldv=3 -noenter -t Glitch2 -c Corona4g -d ..\nand -f
17489 -b DD88AD0C9ED669E7B56794FB68563EFA -p 3956A906711604BF59E6E60B67E30BAD ..
\output\nandflash.bin -v
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------xeBuild v1.16.728
------------------------------------------------------------------ { Image Build Mode } ---building glitch2 image
verbose set to level 1
------ parsing user ini at '..\nand\options.ini' -----******* WARNING: could not open user ini at '..\nand\options.ini', skipping

default console DVD eject button is being used to start xell


------ parsing ini at '17489\_glitch2.ini' -----ini version 17489
ini: label [coronabl] found
found (1) 'cba_13121.bin' crc: 0x9255dfb1
found (2) 'cbb_13121.bin' crc: 0x6f3f9c18
found (3) 'cd_12905.bin' crc: 0x58221592
found (4) 'ce_1888.bin' crc: 0xff9b60df
found (5) 'cf_17489.bin' crc: 0x26c9baed
found (6) 'cg_17489.bin' crc: 0xa9c9815e
ini dictates dual CB for this model
[rawpatch] label not found in ini
ini: label [flashfs] found
found (1) 'aac.xexp' crc: 0x40d5adce
found (2) 'bootanim.xex' crc: 0x85238a78
found (3) 'createprofile.xex' crc: 0x034acd79
found (4) 'dash.xex' crc: 0xdb4717cf
found (5) 'deviceselector.xex' crc: 0x1eb402b9
found (6) 'gamerprofile.xex' crc: 0xf4e4902e
found (7) 'hud.xex' crc: 0xb1485b31
found (8) 'huduiskin.xex' crc: 0x5fb2d289
found (9) 'mfgbootlauncher.xex' crc: 0xe9d4483a
found (10) 'minimediaplayer.xex' crc: 0x61f6c912
found (11) 'nomni.xexp' crc: 0x3ec9f846
found (12) 'nomnifwk.xexp' crc: 0x96bf4907
found (13) 'nomnifwm.xexp' crc: 0x772eb1df
found (14) 'SegoeXbox-Light.xtt' crc: 0xe0ee6049
found (15) 'signin.xex' crc: 0x68541d87
found (16) 'updater.xex' crc: 0xd63a84d9
found (17) 'vk.xex' crc: 0x81700712
found (18) 'xam.xex' crc: 0xa5741001
found (19) 'xenonclatin.xtt' crc: 0xd5d17ff5
found (20) 'xenonclatin.xttp' crc: 0x7a507ad1
found (21) 'xenonjklatin.xtt' crc: 0xdde4a14c
found (22) 'xenonjklatin.xttp' crc: 0xe2adddfb
found (23) 'ximecore.xex' crc: 0x86cbabf6
found (24) 'ximedic.xex' crc: 0x1d992bfb
found (25) 'ximedic.xexp' crc: 0xbee64013
found (26) '..\launch.xex' crc: 0x00000000
found (27) '..\lhelper.xex' crc: 0x00000000
found (28) '..\launch.ini' crc: 0x00000000
ini: label [security] found
found (1) 'crl.bin' crc: 0x00000000
found (2) 'dae.bin' crc: 0x00000000
found (3) 'extended.bin' crc: 0x00000000
found (4) 'fcrt.bin' crc: 0x00000000
found (5) 'secdata.bin' crc: 0x00000000
------ ini parsing completed -----output name overridden to: ..\output\nandflash.bin
1BL RSA pub key (1BL_pub.bin) not available, signature checks will not be perfor
med
PIRS RSA pub key (PIRS_pub.bin) not available, signature checks will not be perf
ormed

MASTER RSA pub key (MAST_pub.bin) not available, signature checks will not be pe
rformed
------ Checking ..\nand\nanddump.bin -----..\nand\nanddump.bin file size: 0x3000000
nanddump header checks passed OK!
Loading NAND dump (0x3000000 bytes)...done!
Detecting NAND controller type from dump data...
NAND dump is from a mmc machine
NAND dump uses big block controller
decrypting KeyVault at address 0x4000 of size 0x4000
keyvault decrypted OK, will use if no kv.bin is provided
decrypting SMC at address 0x800 of size 0x3800
SMC decrypted OK, will use if no external smc.bin is provided
seeking smc config in dump...found at offset 0x2ffc000! Using if no smc config i
s provided.
CF slot 0 decrypted ok LDV 0x03 Pairing: 0x376598
setting pairing data from image to 0x376598
pairing set to: 37 65 98
LDV was already set to 3
Scanning for mobile data and fsroot...attempting to find valid anchor block
anchor block v 163 at 0x2fe8000 is valid
anchor block v 164 at 0x2fec000 is valid
anchor block v 164 at 0x2fec000 is selected
done! fsroot found ok!
Mobiles found:
fsroot
version 01 found at offset 0x00e50000 len 0x4000 page 0x00000000
mobileB.dat version 01 found at offset 0x010bc000 len 0x0800 page 0x00000001
mobileC.dat version 01 found at offset 0x00e38000 len 0x0200 page 0x00000002
mobileD.dat version 01 found at offset 0x00e34000 len 0x0800 page 0x00000003
mobileE.dat version 01 found at offset 0x00e3c000 len 0x0800 page 0x00000004
extracting MobileB.dat from page 0x1 (offset 0x10bc000), size 2048 (0x800) bytes
extracting MobileC.dat from page 0x2 (offset 0xe38000), size 512 (0x200) bytes
extracting MobileD.dat from page 0x3 (offset 0xe34000), size 2048 (0x800) bytes
extracting MobileE.dat from page 0x4 (offset 0xe3c000), size 2048 (0x800) bytes
Statistics.settings found at offset 0x2ff8000, size 4096 (0x1000) bytes
Manufacturing.data found at offset 0x2ff4000, size 4096 (0x1000) bytes
seeking security files...
crl.bin found in sector 0x386 size 0xa00...verified! Will use if external file n
ot found.
dae.bin found in sector 0x387 size 0xad30...verified! Will use if external file
not found.
extended.bin found in sector 0x393 size 0x4000...verified! Will use if external
file not found.
fcrt.bin found in sector 0x38b size 0x4000...pub key to verify signature is not
available, skipping!
verified! Will use if external file not found.
secdata.bin found in sector 0x391 size 0x400...verified! Will use if external fi
le not found.
done!
Writing initial header to flash image
------ loading system update container -----17489\su20076000_00000000 found, loading...done!
Read 0xb50000 bytes to memory
checking integrity...
header seems valid, version 2.0.17489.0
header hash is OK, checking content hashes...
content hashes seem OK, everything looks good!
extracted SUPD\xboxupd.bin (0x7ce00 bytes)

decrypting SUPD\xboxupd.bin\CF_17489.bin (0x4560 bytes)...done!


decrypting SUPD\xboxupd.bin\CG_17489.bin (0x7889c bytes)...done!
------ Loading bootloaders and required security files -----reading ..\nand\smc.bin failed, using smc.bin from nand dump
reset smc load address to 0x800 size 0x3800
reading ..\nand\kv.bin failed, using kv.bin from nand dump
reading .\common\cba_13121.bin (0x1af0 bytes)
loaded cba_13121.bin, could not check signature rsa key not present!
reading .\common\cbb_13121.bin (0x7b40 bytes)
reading .\common\cd_12905.bin (0x5090 bytes)
reading .\common\ce_1888.bin (0x5606a b pad 0x56070 b)
reading ..\nand\xell-gggggg.bin (0x40000 bytes)
extracted SUPD\xboxupd.bin\CF_17489.bin (0x4560 bytes)
extracted SUPD\xboxupd.bin\CG_17489.bin (0x7889c bytes)
reading 17489\bin\patches_g2corona.bin (0x92c bytes)
reading 17489\bin\nofcrt.bin (0x20 bytes)
added 0x20 bytes to patches via 1 external patch files
patches now 0x950 bytes total with addon byte count appended
reading ..\nand\smc_config.bin failed, using smc_config.bin from nand dump
------------------checking smc_config
------------------extracting config
-----------------SMC config info:
-----------------Target temps: Cpu: 82_C Gpu: 78_C Edram: 76_C
Max temps : Cpu: 89_C Gpu: 82_C Edram: 82_C
Cpu Fan
: (auto)
Gpu Fan
: (auto)
MAC Address : 7c:1e:52:18:16:81
AVRegion
: 0x00000100 (NTSC-M)
GameRegion : 0x00ff (NTSC/US)
DVDRegion : 4
resetKey
: XXUD
--------------------Checking for smc config data patches
smc config was not patched
--------------------could not check signature of cba_13121.bin, 1BL RSA key not present!
done!
patch slot offset reset to: 0xb0000
------ Patching BLs and modifying patches -----Patching BLs...Done!
------ Patching boot reasons and options into flash header -----Patching header for xell power reason
------ Encrypting and finalizing bootloaders -----encoding smc.bin size 0x3800
SMC checksum: 39a623be
unknown SMC found, type: Corona v6.2(2.05)
glitch hack found in SMC binary!
encoding kv.bin size 0x4000
decrypted keyvault has been set for reference
Master RSA pub not available, not checking hash
encoding cba_13121.bin size 0x1af0
encoding cbb_13121.bin size 0x7b40

CB 13121 seq 0x03020002 type: 0x03 cseq: 0x02 allow: 0x0002


expected fuses:
fuseset 00: C0FFFFFFFFFFFFFF
fuseset 01: 0F0F0F0F0F0FF0F0 (retail slim)
fuseset 02: 0F00000000000000 (sequence)
fuseset 02: 0F00000000000000 (allow cseq 2)
**dual CB flag detected!**
encoding cd_12905.bin size 0x5400
encoding ce_1888.bin size 0x56070
encoding xell-gggggg.bin size 0x40000
encoding cf_17489.bin size 0x4560
encoding cg_17489.bin size 0x788a0
encoding patches_g2corona.bin size 0x570
done!
------ Adding bootloaders to flash image -----adding smc.bin at raw offset 0x00000800 len 0x3800 (end 0x4000)
adding kv.bin at raw offset 0x00004000 len 0x4000 (end 0x8000)
adding cba_13121.bin at raw offset 0x00008000 len 0x1af0 (end 0x9af0)
adding cbb_13121.bin at raw offset 0x00009af0 len 0x7b40 (end 0x11630)
adding cd_12905.bin at raw offset 0x00011630 len 0x5400 (end 0x16a30)
adding ce_1888.bin at raw offset 0x00016a30 len 0x56070 (end 0x6caa0)
adding xell-gggggg.bin at raw offset 0x00070000 len 0x40000 (end 0xb0000)
adding cf_17489.bin at raw offset 0x000b0000 len 0x4560 (end 0xb4560)
adding cg_17489.bin at raw offset 0x000b4560 len 0x788a0 (end 0xc0000, rest in f
s)
adding patches_g2corona.bin at raw offset 0x000c0010 len 0x570 (end 0xc0580)
Fixing up FS table...done!
Writing zeropair CG patch slot overflow data to sysupdate.xexp1
at raw offset 0xd0000 len 0x0006ce00 (end: 0x0013ce00)...done!
------ adding 28 firmware files -----extracted SUPD\aac.xexp (0x14000 bytes) (crc32: 0x40d5adce ini: 0x40d5adce)
adding as aac.xexp1 at raw offset 0x13ce00 len 0x00014000 (end 0x00150e0
0)
extracted SUPD\bootanim.xex (0x61000 bytes) (crc32: 0x85238a78 ini: 0x85238a78)
adding as bootanim.xex at raw offset 0x154000 len 0x00061000 (end 0x001b
5000)
extracted SUPD\createprofile.xex (0xc000 bytes) (crc32: 0x034acd79 ini: 0x034acd
79)
adding as createprofile.xex at raw offset 0x1b5000 len 0x0000c000 (end 0
x001c1000)
extracted SUPD\dash.xex (0x5b0000 bytes) (crc32: 0xdb4717cf ini: 0xdb4717cf)
adding as dash.xex at raw offset 0x1c4000 len 0x005b0000 (end 0x00774000
)
extracted SUPD\deviceselector.xex (0xa000 bytes) (crc32: 0x1eb402b9 ini: 0x1eb40
2b9)
adding as deviceselector.xex at raw offset 0x774000 len 0x0000a000 (end
0x0077e000)
extracted SUPD\gamerprofile.xex (0x1b000 bytes) (crc32: 0xf4e4902e ini: 0xf4e490
2e)
adding as gamerprofile.xex at raw offset 0x77e000 len 0x0001b000 (end 0x
00799000)
extracted SUPD\hud.xex (0x1d000 bytes) (crc32: 0xb1485b31 ini: 0xb1485b31)
adding as hud.xex at raw offset 0x79b000 len 0x0001d000 (end 0x007b8000)
extracted SUPD\huduiskin.xex (0x14000 bytes) (crc32: 0x5fb2d289 ini: 0x5fb2d289)
adding as huduiskin.xex at raw offset 0x7b9000 len 0x00014000 (end 0x007
cd000)
extracted SUPD\mfgbootlauncher.xex (0x8000 bytes) (crc32: 0xe9d4483a ini: 0xe9d4
483a)

adding as mfgbootlauncher.xex at raw offset 0x7d0000 len 0x00008000 (end


0x007d8000)
extracted SUPD\minimediaplayer.xex (0xc000 bytes) (crc32: 0x61f6c912 ini: 0x61f6
c912)
adding as minimediaplayer.xex at raw offset 0x7d8000 len 0x0000c000 (end
0x007e4000)
extracted SUPD\nomni.xexp (0xf000 bytes) (crc32: 0x3ec9f846 ini: 0x3ec9f846)
adding as nomni.xexp1 at raw offset 0x7e4000 len 0x0000f000 (end 0x007f3
000)
extracted SUPD\nomnifwk.xexp (0x2000 bytes) (crc32: 0x96bf4907 ini: 0x96bf4907)
adding as nomnifwk.xexp1 at raw offset 0x7f3000 len 0x00002000 (end 0x00
7f5000)
extracted SUPD\nomnifwm.xexp (0x5000 bytes) (crc32: 0x772eb1df ini: 0x772eb1df)
adding as nomnifwm.xexp1 at raw offset 0x7f6000 len 0x00005000 (end 0x00
7fb000)
extracted SUPD\SegoeXbox-Light.xtt (0x6000 bytes) (crc32: 0xe0ee6049 ini: 0xe0ee
6049)
adding as SegoeXbox-Light.xtt at raw offset 0x7fd000 len 0x00006000 (end
0x00803000)
extracted SUPD\signin.xex (0x1a000 bytes) (crc32: 0x68541d87 ini: 0x68541d87)
adding as signin.xex at raw offset 0x806000 len 0x0001a000 (end 0x008200
00)
extracted SUPD\updater.xex (0x7000 bytes) (crc32: 0xd63a84d9 ini: 0xd63a84d9)
adding as updater.xex at raw offset 0x822000 len 0x00007000 (end 0x00829
000)
extracted SUPD\vk.xex (0xb000 bytes) (crc32: 0x81700712 ini: 0x81700712)
adding as vk.xex at raw offset 0x82b000 len 0x0000b000 (end 0x00836000)
extracted SUPD\xam.xex (0x251000 bytes) (crc32: 0xa5741001 ini: 0xa5741001)
adding as xam.xex at raw offset 0x837000 len 0x00251000 (end 0x00a88000)
extracted nanddump\xenonclatin.xtt (0x11b000 bytes) (crc32: 0xd5d17ff5 ini: 0xd5
d17ff5)
adding as xenonclatin.xtt at raw offset 0xa89000 len 0x0011b000 (end 0x0
0ba4000)
extracted SUPD\xenonclatin.xttp (0x18000 bytes) (crc32: 0x7a507ad1 ini: 0x7a507a
d1)
adding as xenonclatin.xttp1 at raw offset 0xba7000 len 0x00018000 (end 0
x00bbf000)
extracted nanddump\xenonjklatin.xtt (0x1a8000 bytes) (crc32: 0xdde4a14c ini: 0xd
de4a14c)
adding as xenonjklatin.xtt at raw offset 0xbc0000 len 0x001a8000 (end 0x
00d68000)
extracted SUPD\xenonjklatin.xttp (0x7000 bytes) (crc32: 0xe2adddfb ini: 0xe2addd
fb)
adding as xenonjklatin.xttp1 at raw offset 0xd68000 len 0x00007000 (end
0x00d6f000)
extracted SUPD\ximecore.xex (0x17000 bytes) (crc32: 0x86cbabf6 ini: 0x86cbabf6)
adding as ximecore.xex at raw offset 0xd6f000 len 0x00017000 (end 0x00d8
6000)
extracted nanddump\ximedic.xex (0x90000 bytes) (crc32: 0x1d992bfb ini: 0x1d992bf
b)
adding as ximedic.xex at raw offset 0xd87000 len 0x00090000 (end 0x00e17
000)
extracted SUPD\ximedic.xexp (0x2800 bytes) (crc32: 0xbee64013 ini: 0xbee64013)
adding as ximedic.xexp1 at raw offset 0xe18000 len 0x00002800 (end 0x00e
1a800)
reading 17489\..\launch.xex (0xb800 bytes)
adding as launch.xex at raw offset 0xe1a800 len 0x0000b800 (end 0x00e260
00)
reading 17489\..\lhelper.xex (0x4800 bytes)
adding as lhelper.xex at raw offset 0xe27800 len 0x00004800 (end 0x00e2c

000)
reading 17489\..\launch.ini (0x2e5 bytes)
adding as launch.ini at raw offset 0xe2c800 len 0x000002e5 (end 0x00e2ca
e5)
------ adding 5 security files -----<- Processing crl.bin ->
reading ..\nand\crl.bin (0xa00 bytes)
crl appears crypted, attempting to decrypt with CPU key...failed! Trying alterna
te key...success!
adding as crl.bin at raw offset 0xe34000 len 0x00000a00 (end 0x00e34a00)
<- Processing dae.bin ->
reading ..\nand\dae.bin (0xad30 bytes)
dae appears encrypted, attempting to decrypt with CPU key...failed! Attempting t
o decrypt with alternate key...
success!
adding as dae.bin at raw offset 0xe38000 len 0x0000ad30 (end 0x00e42d30)
<- Processing extended.bin ->
reading ..\nand\extended.bin (0x4000 bytes)
adding as extended.bin at raw offset 0xe44000 len 0x00004000 (end 0x00e4
8000)
<- Processing fcrt.bin ->
could not read fcrt.bin, using data from previous parse...
adding as fcrt.bin at raw offset 0xe48000 len 0x00004000 (end 0x00e4c000
)
<- Processing secdata.bin ->
reading ..\nand\secdata.bin (0x400 bytes)
adding as secdata.bin at raw offset 0xe4c000 len 0x00000400 (end 0x00e4c
400)
------ checking for Mobile*.dat -----MobileB.dat found, adding from previous parse
adding MobileB.dat as type 0x31 at raw offset 0xe50000 len 0x800 (end 0x
e50800)
MobileC.dat found, adding from previous parse
adding MobileC.dat as type 0x32 at raw offset 0xe54000 len 0x200 (end 0x
e54200)
MobileD.dat found, adding from previous parse
adding MobileD.dat as type 0x33 at raw offset 0xe58000 len 0x800 (end 0x
e58800)
MobileE.dat found, adding from previous parse
adding MobileE.dat as type 0x34 at raw offset 0xe5c000 len 0x800 (end 0x
e5c800)
Statistics.settings found, adding from previous parse
adding Statistics.settings at raw offset 0x2ff8000 len 0x1000 (end 0x2ff
9000)
Manufacturing.data found, adding from previous parse
adding Manufacturing.data at raw offset 0x2ff4000 len 0x1000 (end 0x2ff5
000)
------ adding smc_config.bin -----adding smc config to offset 0x02ffc000, len 0x400
------ cleaning up image -----Fixing up empty FS block entries...done!
Writing FS table to image offset 0xe60000 len 0x4000 (end 0xe64000)...done!

copying anchor block 1 to offset 0x2fe8000


copying anchor block 2 to offset 0x2fec000
------ finalizing image ----------- writing image to disk -----writing file '..\output\nandflash.bin' to disk...done!
--------------------------------------------------------------..\output\nandflash.bin image built, info:
--------------------------------------------------------------Kernel
: 2.0.17489.0
Console : Corona
NAND size : 48MiB MMC (system only)
Build
: Glitch (v2)
Xell
: power on console with console eject button
Serial
: 402342622000
ConsoleId : 487058366737
MoboSerial: 0910061108742200
Mfg Date : 05/18/2012
CPU Key : 3956A906711604BF59E6E60B67E30BAD
1BL Key : DD88AD0C9ED669E7B56794FB68563EFA
DVD Key : C9B81BB3DA110F496C90404D5EE53A47
CF LDV
: 3
KV type : type2 (hashed - unchecked, master key not available)
--------------------------------------------------------------xeBuild Finished. Have a nice day.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------xeBuild Nand gerada.s_ falta escrever a xeBuild Nand gerada
(output\nandflash.bin)
-----------------------------------------------------------------------------------------------------------* Para gravar uma Imagem Xebuild. Voc_ tem 3 op__es:
1. - Se voc_ tem um leitor/gravador clique Xebuild - Escrever.
2. - Prepare um dispositivo USB em Fat32 e clique Escrever-Raw(Raw-Flash) para
copiar os arquivos necess_rios , coloque no console e inicie o Xell.
3. - Se voc_ FSD v3 ligue o console a rede(Lan) e clique (Escrever-IP/IP-Flash
) - xebuild
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------1 arquivo(s) copiado(s).
-----------------------------------------------------------------------------------------------------------Copia salva como:
C:\Users\Flavio\Desktop\Glitch_Corona4g_402342622000_3956A906711604BF59E6E60B67E
30BAD.bin
Wait, closing Autogg

S-ar putea să vă placă și