Hola buenas, he tenido un problema despues de flashear el cd con junglflash.
Todos los pasos han sido correctos pero a la hora de conectar el lector a la consola no me reconoce los discos, se queda en leyendo, tambien he podido comprobar que la consola tarda mucho mas en encender, se queda en la pantalla de xbox 360.
Las keys salieron bien, depues de varios intentos, me faltaba velocidad en cambiar el switch de in a off y vicebersa, y a la hora de grabar y escribir en la flash todo ok, me da el mensajito de thx C4eva
El tema es que no se que probar ahora, he intentado volver a borrar la flash y reescribirla con el lt 2 incluso con el firmware original.
Otro problema que me da es que cuando cargo el firmaware me dice warning 0800 f/w should not be used in a console, it is for external use only.
He hecho caso omiso al warning
¿me podeis facilitar alguna idea?
pongo el txt del jungle.
JungleFlasher 0.1.95 Beta (321)
Session Started Tue Sep 10 10:56:48 2013
This is a Wow 64 process running on 4 x 64 bit CPUs
portio64.sys Driver Installed
portio64.sys Driver Started, thanks Schtrom !
Found 4 I/O Ports.
Found 1 Com Ports.
Found 7 windows drives C: D: F: G: H: I: J:
Found 1 CD/DVD drives F:
Loading firmware file C:\Users\Administrador\Documents\Dummy.bin
MD5 hash: 1f41aae44fa42d483f687cfea1d6745c
Inquiry string found
Identify string found
Drive key @ 0xA030 420FAEA4452431293514C928924EF0AB
Firmware Osig: [PLDS DG-16D2S 0251]
Firmware is: PhatKey Extract
Loading firmware file C:\Users\Administrador\Desktop\liteon orig\74850C.BIN
MD5 hash: a1241f2c2e9ca989dfa86eb9c1c8ef0a
Drive key @ n/a 55AA55AA55AA55AA55AA55AA55AA55AA
Firmware Osig: [PLDS DG-16D2S 7485]
Firmware is: Stock
Spoofing Target
DVD Key copied to target
Inquiry string copied to Target
Identify string copied to Target
Serial data copied from Source to Target
Getting Status from port 0xF0D0
Invalid Status 0x50
Sending Lite-On-Erase request to port 0xF0D0
..............
Drive returned Status 0xD0
.....
Serial flash found with Status 0x72
Manufacturer ID: 0xC2
Device ID: 0x11
Flash Name: MXIC(MX25L2005)
Flash Size: 262144 bytes
Sending Lite-On-Erase request to port 0xF0D0
..............
Drive returned Status 0x72
Manufacturer ID: 0x0
Device ID: 0x0
Flash Name: Unknown type
Flash Size: n/a
Loading firmware file C:\Users\Administrador\Desktop\0800_BenQ and phat Lite-on v3\LT-liteon-0800-v3.bin
MD5 hash: 777e8c2d89e0f57f891aa6735ed1cc95
Genuine Lite-On LT 0800 v3
Drive key @ n/a 55AA55AA55AA55AA55AA55AA55AA55AA
Firmware Osig: [PLDS DG-16D2S 7485]
Firmware is: LITEON-AP25V3.0 DG-16D2S
Loading firmware file C:\Users\Administrador\Desktop\0800_BenQ and phat Lite-on v3\LT-liteon-0800-v3.bin
MD5 hash: 777e8c2d89e0f57f891aa6735ed1cc95
Genuine Lite-On LT 0800 v3
Drive key @ n/a 55AA55AA55AA55AA55AA55AA55AA55AA
Firmware Osig: [PLDS DG-16D2S 7485]
Firmware is: LITEON-AP25V3.0 DG-16D2S
Loading firmware file C:\Users\Administrador\Desktop\0800_BenQ and phat Lite-on v3\LTPlus-0251-v3.0.bin
MD5 hash: d14fe82b96741b7a18e5c1e7adbf0a98
Genuine LT plus v3.0
Drive key @ n/a FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
Firmware Osig: [PLDS DG-16D2S 0251]
Firmware is: LT-Plus 3.0
Spoofing Target
DVD Key copied to target
Target is LT - ID strings not copied to Target
Serial data already matches
Target rev is LT 02510C, serial info not copied
Sending Lite-On-Erase request to port 0xF0D0
..............
Drive returned Status 0x80
......
Serial flash found with Status 0x72
Manufacturer ID: 0xC2
Device ID: 0x11
Flash Name: MXIC(MX25L2005)
Flash Size: 262144 bytes
Getting Status from port 0xF0D0
SPi flash found with Status 0x72
Sending Chip Erase to Port 0xF0D0
Erasing:
Writing target buffer to flash
Writing Bank 0: ................
Writing Bank 1: ................
Writing Bank 2: ................
Writing Bank 3: ................
Flash Verification Test !
Reading Bank 0: ................
Reading Bank 1: ................
Reading Bank 2: ................
Reading Bank 3: ................
Write verified OK !
Sending Vendor Outro to port 0xF0D0
Drive is Lite-On..
Key found in KeyDB at record (1 - Documents)
Key is: 420FAEA4452431293514C928924EF0AB
Key has been tested and verified, thanks C4eva !
Gracias de antemano