Você está na página 1de 13

* Para iniciar o processo a Extra__o(Dump) de sua Nand _ necess_ria:

- Se voc_ possui a extra__o, carregue-a.


- Se voc_ j_ tem a FSD v3 conecte seu console _ rede e clique Ler-IP(IP-Read)
- Se voc_ n_o tem a FSD, mas tem o XELL, tente usar o bot_o Dumper-USB e siga o
process.
- Se o console _ Original de F_brica, instale e escolha seu Leitor de Nand clique
Flasher-Read.
* Se voc_ j_ tem a FSD v3 e quer atualizar sua Dash selecione Lan ou Modo Usb(Usb
Mode) e escolha AutoAtualizar-Dash(AutoUpdate-Dash

Aguarde gerando arquivos temporarios...OK

DETECTANDO NAND: "nand\nanddump.bin"

-----------------------------------------------------------------------------------
--------------------------
NandPro v3.0a by Tiros

Could not open Virtual Nand Device File: nand\nanddump.bin


Can not continue

-----------------------------------------------------------------------------------
--------------------------

-----------------------------------------------------------------------------------
--------------------------
NandPro v2.0e by Tiros

Could not open Virtual Nand Device File: nand\nanddump.bin

Can not continue

-----------------------------------------------------------------------------------
--------------------------
Unecc dump detected
Checking ECC-CheckSum... Wait
BUSCANDO SMC_CONFIG na NAND
Smc Config encontrado em 0x02FF0000
Lendo Temperaturas...:
Reset Parental Code: YYDD
ANALIZANDO DAdOS Da NAND

ID: e06a5e39
Encontrado SMC (version 2.5) : 00000800 - 00004000
SMC Patch found at offset 0x13b9

Nand NO RETAIL (Exploited)


Encontrado Keyvault : 00004000 - 00008000
Looking for Cpukey in Local Database. Not Found
Procurando cpukey na mesma pasta cpukey.txt.CPUKEY adcionada na base de dados
Reloaded_Glitch.bin

-----------------------------------------------------------------------------------
--------------------------
1 arquivo(s) copiado(s).

-----------------------------------------------------------------------------------
--------------------------
Found.
Checking CpuKey
Saved New Id: e06a5e39 with Cpukey : b9556c12ba222d1dbbfec512a1018c99
Reloaded_Glitch.bin

-----------------------------------------------------------------------------------
--------------------------
1 arquivo(s) copiado(s).

-----------------------------------------------------------------------------------
--------------------------
CpuKey is correct
Encontrado CB_A (build 13121) : 00008000 - 00009af0
Encontrado CB_B (build 13121) : 00009af0 - 00011630
Encontrado CD (build 12905) : 00011630 - 00016a30
Encontrado CE (build 1888) : 00016a30 - 0006caa0
Encontrado CF (build 17544) : 000b0000- 000b4560
Encontrado CF1 build : None
Encontrado CG (build 17544) : 000b4560- 0012b41a
Encontrado CG1 build : None
Nand valida
DETECTANDO MODELO DO CONSOLE
Verificando se _ um modelo Exploiteable...
Modelo : Corona4g CB_A_13121 GLITCHEABLE
CD_12905 Invalida para Jtag ou j_ Jtaged

Size: 64

Reloaded_Glitch_c.bin

-----------------------------------------------------------------------------------
--------------------------
1 arquivo(s) copiado(s).

-----------------------------------------------------------------------------------
--------------------------

FileSystems:
FileSystem Active:31 offset:0xE60000
FileSystem Last:31 offset:0xE60000

Block Size File


0x00000800 0x00003800 SMC_2.5.bin
0x00004000 0x00004000 Keyvault.bin
0x00008000 0x00001AF0 CB_A_13121.bin
0x00009AF0 0x00007B40 CB_B_13121.bin
0x00011630 0x00005400 CD_12905.bin
0x00016A30 0x00056070 CE_1888.bin
0x000B0000 0x00004560 CF_17544.bin
0x000B4560 0x00076EBA CG_17544.bin
0x000C9B26 0x0006B420 sysupdate.xexp1
0x001326C9 0x00014000 aac.xexp1
0x00145D17 0x00061000 bootanim.xex
0x001A6C9B 0x0000C000 createprofile.xex
0x001B26C9 0x005B1000 dash.xex
0x0073A2E8 0x0000A000 deviceselector.xex
0x00745D17 0x0001B000 gamerprofile.xex
0x00760F83 0x0001D000 hud.xex
0x00780000 0x00014000 huduiskin.xex
0x0079364D 0x00008000 mfgbootlauncher.xex
0x0079B26C 0x0000C000 minimediaplayer.xex
0x007A6C9B 0x0000F000 nomni.xexp1
0x007B64D9 0x00002000 nomnifwk.xexp1
0x007BA2E8 0x00005000 nomnifwm.xexp1
0x007C9B26 0x0001A000 signin.xex
0x007EC9B2 0x0000B000 vk.xex
0x007F83E0 0x00251000 xam.xex
0x00A3A2E8 0x0011B000 xenonclatin.xtt
0x00B4D936 0x00018000 xenonclatin.xttp1
0x00B64D93 0x001A8000 xenonjklatin.xtt
0x00D00000 0x00007000 xenonjklatin.xttp1
0x00D07C1F 0x00017000 ximecore.xex
0x00D1F07C 0x00090000 ximedic.xex
0x00DAAAAA 0x00002800 ximedic.xexp1
0x00DAE8BA 0x0000B800 launch.xex
0x00DBA2E8 0x00004800 lhelper.xex
0x00DC1F07 0x000002E5 launch.ini
0x00DC5D17 0x00000A00 crl.bin
0x00DC9B26 0x0000AD30 dae.bin
0x00DD5555 0x00004000 extended.bin
Saved New Id: e06a5e39 with Cpukey : b9556c12ba222d1dbbfec512a1018c99

7- A Cpukey parece estar correta, sera salva automaticamente na base de dados


associada a esta Nand.
Se em outra ocasi_o voltar a abrir manualmente esta nand sera carregada
automaticamente com todos dados.
Copia de seguran_a de sua Nand salvar como:
nands\498312113705\Corona4g_498312113705_b9556c12ba222d1dbbfec512a1018c99.bin

smc.bin copiado a nands\498312113705


kv.bin copiado a nands\498312113705
smc_config.bin copiado a nands\498312113705
CB_B_enc copiado a nands\498312113705
CB_A_enc copiado a nands\498312113705
ldv.txt copiado a nands\498312113705
cpukey.txt copiado a nands\498312113705Modelo:Corona4g

Serial:498312113705

Cpukey:b9556c12ba222d1dbbfec512a1018c99
Dvdkey:C7057971D85F5CB02734D5BE3C41F5E8

CB:13121
CF:17544
LDV:1

OSIG:Philips/LiteOn DG-16D5S 1175


Region:0x00FF | NTSC/US

Reloaded_Glitch_c.bin

-----------------------------------------------------------------------------------
--------------------------
1 arquivo(s) copiado(s).

-----------------------------------------------------------------------------------
--------------------------
-----------------------------------------------------------------------------------
--------------------------

* Selecione o tipo de imagem e as op__es desejadas e clique Criar - Xebuild

-----------------------------------------------------------------------------------
--------------------------
Nand nand\nanddump.bin valido.Procesando xeBuild aguarde................
Nand j_ Glitcheada, N_o sera aplicado patch no SMC
17544 Installed
Foram ultilizada as seguintes op__es para gerar a imagem:
xeBuild.exe -o cfldv=1 -noenter -t Glitch2 -c Corona4g -d ..\nand -f 17544 -b
DD88AD0C9ED669E7B56794FB68563EFA -p b9556c12ba222d1dbbfec512a1018c99
..\output\nandflash.bin -v
-----------------------------------------------------------------------------------
--------------------------
---------------------------------------------------------------
xeBuild v1.11.647
---------------------------------------------------------------
---- { Image Build Mode } ----
building glitch2 image

verbose set to level 1

------ parsing user ini at '..\nand\options.ini' ------

******* WARNING: could not open user ini at '..\nand\options.ini', skipping


default console DVD eject button is being used to start xell

------ parsing ini at '17544\_glitch2.ini' ------


ini version 17544

ini: label [coronabl] found


found (1) 'cba_13121.bin' crc: 0x9255dfb1
found (2) 'cbb_13121.bin' crc: 0x6f3f9c18
found (3) 'cd_12905.bin' crc: 0x58221592
found (4) 'ce_1888.bin' crc: 0xff9b60df
found (5) 'cf_17544.bin' crc: 0x227bdad7
found (6) 'cg_17544.bin' crc: 0x7f873612
ini dictates dual CB for this model

ini: label [flashfs] found


found (1) 'aac.xexp' crc: 0x33d334fa
found (2) 'bootanim.xex' crc: 0x0f32f900
found (3) 'createprofile.xex' crc: 0x4e94de1c
found (4) 'dash.xex' crc: 0x00797560
found (5) 'deviceselector.xex' crc: 0x3d9f5224
found (6) 'gamerprofile.xex' crc: 0x5d1f6849
found (7) 'hud.xex' crc: 0x67dbf321
found (8) 'huduiskin.xex' crc: 0xb6086e82
found (9) 'mfgbootlauncher.xex' crc: 0x544f6ae5
found (10) 'minimediaplayer.xex' crc: 0xfa53a16e
found (11) 'nomni.xexp' crc: 0x09b5943b
found (12) 'nomnifwk.xexp' crc: 0xa40a67f8
found (13) 'nomnifwm.xexp' crc: 0xf6849a64
found (14) 'SegoeXbox-Light.xtt' crc: 0xe0ee6049
found (15) 'signin.xex' crc: 0x3b49ec1d
found (16) 'updater.xex' crc: 0x33a03ef3
found (17) 'vk.xex' crc: 0x9b081587
found (18) 'xam.xex' crc: 0x2766df27
found (19) 'xenonclatin.xtt' crc: 0xd5d17ff5
found (20) 'xenonclatin.xttp' crc: 0x7a507ad1
found (21) 'xenonjklatin.xtt' crc: 0xdde4a14c
found (22) 'xenonjklatin.xttp' crc: 0xe2adddfb
found (23) 'ximecore.xex' crc: 0x6332b0c7
found (24) 'ximedic.xex' crc: 0x1d992bfb
found (25) 'ximedic.xexp' crc: 0xd7a976cb
found (26) '..\launch.xex' crc: 0x00000000
found (27) '..\lhelper.xex' crc: 0x00000000
found (28) '..\launch.ini' crc: 0x00000000

ini: label [security] found


found (1) 'crl.bin' crc: 0x00000000
found (2) 'dae.bin' crc: 0x00000000
found (3) 'extended.bin' crc: 0x00000000
found (4) 'fcrt.bin' crc: 0x00000000
found (5) 'secdata.bin' crc: 0x00000000
------ ini parsing completed ------

output name overridden to: ..\output\nandflash.bin

1BL RSA pub key file is not available, signature checks will not be performed
PIRS RSA pub key file is not available, signature checks will not be performed
MASTER RSA pub key file is not available, signature checks will not be performed

------ Checking ..\nand\nanddump.bin ------


..\nand\nanddump.bin file size: 0x3000000
nanddump header checks passed OK!
Loading NAND dump (0x3000000 bytes)...done!
Detecting NAND controller type from dump data...
NAND dump is from a mmc machine
NAND dump uses big block controller
decrypting KeyVault at address 0x4000 of size 0x4000
keyvault decrypted OK, will use if no kv.bin is provided
decrypting SMC at address 0x800 of size 0x3800
SMC decrypted OK, will use if no external smc.bin is provided
seeking smc config in dump...found at offset 0x2ffc000! Using if no smc config is
provided.
CF slot 0 decrypted ok LDV 0x01 Pairing: 0xbf5431
setting pairing data from image to 0xbf5431
pairing set to: bf 54 31
LDV was already set to 1
attempting to find valid anchor block
anchor block v 1 at 0x2fe8000 is valid
anchor block v 2 at 0x2fec000 is valid
anchor block v 2 at 0x2fec000 is selected
MobileB.dat found at sector 0x394 (offset 0xe50000), size 2048 (0x800) bytes
MobileC.dat found at sector 0x395 (offset 0xe54000), size 512 (0x200) bytes
MobileD.dat found at sector 0x396 (offset 0xe58000), size 2048 (0x800) bytes
MobileE.dat found at sector 0x397 (offset 0xe5c000), size 2048 (0x800) bytes
Statistics.settings found at offset 0x2ff8000, size 4096 (0x1000) bytes
Manufacturing.data found at offset 0x2ff4000, size 4096 (0x1000) bytes
seeking security files...
crl.bin found in sector 0x38d size 0xa00...verified! Will use if external file not
found.
dae.bin found in sector 0x38e size 0xad30...verified! Will use if external file not
found.
extended.bin found in sector 0x391 size 0x4000...verified! Will use if external
file not found.
fcrt.bin found in sector 0x392 size 0x4000...verified! Will use if external file
not found.
secdata.bin found in sector 0x393 size 0x400...verified! Will use if external file
not found.
done!
Writing initial header to flash image

------ loading system update container ------


17544\su20076000_00000000 found, loading...done!
Read 0xb50000 bytes to memory
checking integrity...
header seems valid, version 2.0.17544.0
header hash is OK, checking content hashes...
content hashes seem OK, everything looks good!
extracted SUPD\xboxupd.bin (0x7b420 bytes)
decrypting SUPD\xboxupd.bin\CF_17544.bin (0x4560 bytes)...done!
decrypting SUPD\xboxupd.bin\CG_17544.bin (0x76eba bytes)...done!

------ Loading bootloaders and required security files ------


reading ..\nand\smc.bin failed, using smc.bin from nand dump
reset smc load address to 0x800 size 0x3800
reading ..\nand\kv.bin failed, using kv.bin from nand dump
reading .\common\cba_13121.bin (0x1af0 bytes)
loaded cba_13121.bin, could not check signature rsa key not present!
reading .\common\cbb_13121.bin (0x7b40 bytes)
reading .\common\cd_12905.bin (0x5090 bytes)
reading .\common\ce_1888.bin (0x5606a b pad 0x56070 b)
reading ..\nand\xell-gggggg.bin (0x40000 bytes)
extracted SUPD\xboxupd.bin\CF_17544.bin (0x4560 bytes)
extracted SUPD\xboxupd.bin\CG_17544.bin (0x76eba bytes)
reading 17544\bin\patches_g2corona.bin (0x92c bytes)
reading ..\nand\smc_config.bin failed, using smc_config.bin from nand dump
-------------------
checking smc_config
-------------------
extracting config
------------------
SMC config info:
------------------
Target temps: Cpu: 82_C Gpu: 78_C Edram: 76_C
Max temps : Cpu: 89_C Gpu: 82_C Edram: 82_C
Cpu Fan : (auto)
Gpu Fan : (auto)
MAC Address : 7c:ed:8d:ff:24:e6
AVRegion : 0x00000100 (NTSC-M)
GameRegion : 0x00ff (NTSC/US)
DVDRegion : 1
resetKey : YYDD
---------------------
Checking for smc config data patches
smc config was not patched
---------------------
could not check signature of cba_13121.bin, 1BL RSA key not present!
done!
patch slot offset reset to: 0xb0000

------ Patching BLs and modifying patches ------


Patching BLs...Done!

------ Patching boot reasons and options into flash header ------
Patching header for xell power reason

------ Encrypting and finalizing bootloaders ------


encoding smc.bin size 0x3800
SMC checksum: 39a623be
unknown SMC found, type: Corona v6.2(2.05)
glitch hack found in smc.bin!
encoding kv.bin size 0x4000
decrypted keyvault has been set for reference
Master RSA pub not available, not checking hash
encoding cba_13121.bin size 0x1af0
encoding cbb_13121.bin size 0x7b40
CB 13121 seq 0x03020002 type: 0x03 cseq: 0x02 allow: 0x0002
expected fuses:
fuseset 00: C0FFFFFFFFFFFFFF
fuseset 01: 0F0F0F0F0F0FF0F0
fuseset 02: 0F00000000000000 (sequence)
fuseset 02: 0F00000000000000 (allow cseq 2)
**dual CB flag detected!**
encoding cd_12905.bin size 0x5400
encoding ce_1888.bin size 0x56070
encoding xell-gggggg.bin size 0x40000
encoding cf_17544.bin size 0x4560
encoding cg_17544.bin size 0x76ec0
encoding patches_g2corona.bin size 0x550
done!

------ Adding bootloaders to flash image ------


adding smc.bin at raw offset 0x00000800 len 0x3800 (end 0x4000)
adding kv.bin at raw offset 0x00004000 len 0x4000 (end 0x8000)
adding cba_13121.bin at raw offset 0x00008000 len 0x1af0 (end 0x9af0)
adding cbb_13121.bin at raw offset 0x00009af0 len 0x7b40 (end 0x11630)
adding cd_12905.bin at raw offset 0x00011630 len 0x5400 (end 0x16a30)
adding ce_1888.bin at raw offset 0x00016a30 len 0x56070 (end 0x6caa0)
adding xell-gggggg.bin at raw offset 0x00070000 len 0x40000 (end 0xb0000)
adding cf_17544.bin at raw offset 0x000b0000 len 0x4560 (end 0xb4560)
adding cg_17544.bin at raw offset 0x000b4560 len 0x76ec0 (end 0xc0000, rest in fs)
adding patches_g2corona.bin at raw offset 0x000c0010 len 0x550 (end 0xc0560)
Fixing up FS table...done!
Writing zeropair CG patch slot overflow data to sysupdate.xexp1
at raw offset 0xd0000 len 0x0006b420 (end: 0x0013b420)...done!

------ adding 28 firmware files ------


extracted SUPD\aac.xexp (0x14000 bytes) (crc32: 0x33d334fa ini: 0x33d334fa)
adding as aac.xexp1 at raw offset 0x13b420 len 0x00014000 (end 0x0014f420)
extracted SUPD\bootanim.xex (0x61000 bytes) (crc32: 0x0f32f900 ini: 0x0f32f900)
adding as bootanim.xex at raw offset 0x150000 len 0x00061000 (end 0x001b1000)
extracted SUPD\createprofile.xex (0xc000 bytes) (crc32: 0x4e94de1c ini: 0x4e94de1c)
adding as createprofile.xex at raw offset 0x1b1000 len 0x0000c000 (end
0x001bd000)
extracted SUPD\dash.xex (0x5b1000 bytes) (crc32: 0x00797560 ini: 0x00797560)
adding as dash.xex at raw offset 0x1c0000 len 0x005b1000 (end 0x00771000)
extracted SUPD\deviceselector.xex (0xa000 bytes) (crc32: 0x3d9f5224 ini:
0x3d9f5224)
adding as deviceselector.xex at raw offset 0x771000 len 0x0000a000 (end
0x0077b000)
extracted SUPD\gamerprofile.xex (0x1b000 bytes) (crc32: 0x5d1f6849 ini: 0x5d1f6849)
adding as gamerprofile.xex at raw offset 0x77e000 len 0x0001b000 (end
0x00799000)
extracted SUPD\hud.xex (0x1d000 bytes) (crc32: 0x67dbf321 ini: 0x67dbf321)
adding as hud.xex at raw offset 0x79b000 len 0x0001d000 (end 0x007b8000)
extracted SUPD\huduiskin.xex (0x14000 bytes) (crc32: 0xb6086e82 ini: 0xb6086e82)
adding as huduiskin.xex at raw offset 0x7b9000 len 0x00014000 (end
0x007cd000)
extracted SUPD\mfgbootlauncher.xex (0x8000 bytes) (crc32: 0x544f6ae5 ini:
0x544f6ae5)
adding as mfgbootlauncher.xex at raw offset 0x7d0000 len 0x00008000 (end
0x007d8000)
extracted SUPD\minimediaplayer.xex (0xc000 bytes) (crc32: 0xfa53a16e ini:
0xfa53a16e)
adding as minimediaplayer.xex at raw offset 0x7d8000 len 0x0000c000 (end
0x007e4000)
extracted SUPD\nomni.xexp (0xf000 bytes) (crc32: 0x09b5943b ini: 0x09b5943b)
adding as nomni.xexp1 at raw offset 0x7e4000 len 0x0000f000 (end 0x007f3000)
extracted SUPD\nomnifwk.xexp (0x2000 bytes) (crc32: 0xa40a67f8 ini: 0xa40a67f8)
adding as nomnifwk.xexp1 at raw offset 0x7f3000 len 0x00002000 (end
0x007f5000)
extracted SUPD\nomnifwm.xexp (0x5000 bytes) (crc32: 0xf6849a64 ini: 0xf6849a64)
adding as nomnifwm.xexp1 at raw offset 0x7f6000 len 0x00005000 (end
0x007fb000)
extracted SUPD\SegoeXbox-Light.xtt (0x6000 bytes) (crc32: 0xe0ee6049 ini:
0xe0ee6049)
adding as SegoeXbox-Light.xtt at raw offset 0x7fd000 len 0x00006000 (end
0x00803000)
extracted SUPD\signin.xex (0x1a000 bytes) (crc32: 0x3b49ec1d ini: 0x3b49ec1d)
adding as signin.xex at raw offset 0x806000 len 0x0001a000 (end 0x00820000)
extracted SUPD\updater.xex (0x7000 bytes) (crc32: 0x33a03ef3 ini: 0x33a03ef3)
adding as updater.xex at raw offset 0x822000 len 0x00007000 (end 0x00829000)
extracted SUPD\vk.xex (0xb000 bytes) (crc32: 0x9b081587 ini: 0x9b081587)
adding as vk.xex at raw offset 0x82b000 len 0x0000b000 (end 0x00836000)
extracted SUPD\xam.xex (0x251000 bytes) (crc32: 0x2766df27 ini: 0x2766df27)
adding as xam.xex at raw offset 0x837000 len 0x00251000 (end 0x00a88000)
extracted nanddump\xenonclatin.xtt (0x11b000 bytes) (crc32: 0xd5d17ff5 ini:
0xd5d17ff5)
adding as xenonclatin.xtt at raw offset 0xa89000 len 0x0011b000 (end
0x00ba4000)
extracted SUPD\xenonclatin.xttp (0x18000 bytes) (crc32: 0x7a507ad1 ini: 0x7a507ad1)
adding as xenonclatin.xttp1 at raw offset 0xba7000 len 0x00018000 (end
0x00bbf000)
extracted nanddump\xenonjklatin.xtt (0x1a8000 bytes) (crc32: 0xdde4a14c ini:
0xdde4a14c)
adding as xenonjklatin.xtt at raw offset 0xbc0000 len 0x001a8000 (end
0x00d68000)
extracted SUPD\xenonjklatin.xttp (0x7000 bytes) (crc32: 0xe2adddfb ini: 0xe2adddfb)
adding as xenonjklatin.xttp1 at raw offset 0xd68000 len 0x00007000 (end
0x00d6f000)
extracted SUPD\ximecore.xex (0x17000 bytes) (crc32: 0x6332b0c7 ini: 0x6332b0c7)
adding as ximecore.xex at raw offset 0xd6f000 len 0x00017000 (end 0x00d86000)
extracted nanddump\ximedic.xex (0x90000 bytes) (crc32: 0x1d992bfb ini: 0x1d992bfb)
adding as ximedic.xex at raw offset 0xd87000 len 0x00090000 (end 0x00e17000)
extracted SUPD\ximedic.xexp (0x2800 bytes) (crc32: 0xd7a976cb ini: 0xd7a976cb)
adding as ximedic.xexp1 at raw offset 0xe18000 len 0x00002800 (end
0x00e1a800)
reading 17544\..\launch.xex (0xd000 bytes)
adding as launch.xex at raw offset 0xe1a800 len 0x0000d000 (end 0x00e27800)
reading 17544\..\lhelper.xex (0x6000 bytes)
adding as lhelper.xex at raw offset 0xe29000 len 0x00006000 (end 0x00e2f000)
reading 17544\..\launch.ini (0x2e5 bytes)
adding as launch.ini at raw offset 0xe32000 len 0x000002e5 (end 0x00e322e5)

------ adding 5 security files ------


<- Processing crl.bin ->
reading ..\nand\crl.bin (0xa00 bytes)
crl appears crypted, attempting to decrypt with CPU key...failed! Trying alternate
key...success!
adding as crl.bin at raw offset 0xe38000 len 0x00000a00 (end 0x00e38a00)

<- Processing dae.bin ->


reading ..\nand\dae.bin (0xad30 bytes)
dae appears encrypted, attempting to decrypt with CPU key...failed! Attempting to
decrypt with alternate key...
success!
adding as dae.bin at raw offset 0xe3c000 len 0x0000ad30 (end 0x00e46d30)

<- Processing extended.bin ->


reading ..\nand\extended.bin (0x4000 bytes)
adding as extended.bin at raw offset 0xe48000 len 0x00004000 (end 0x00e4c000)

<- Processing fcrt.bin ->


could not read fcrt.bin, using data from previous parse...
adding as fcrt.bin at raw offset 0xe4c000 len 0x00004000 (end 0x00e50000)

<- Processing secdata.bin ->


reading ..\nand\secdata.bin (0x400 bytes)
adding as secdata.bin at raw offset 0xe50000 len 0x00000400 (end 0x00e50400)

------ checking for Mobile*.dat ------


MobileB.dat found, adding from previous parse
adding MobileB.dat as type 0x31 at raw offset 0xe54000 len 0x800 (end
0xe54800)
MobileC.dat found, adding from previous parse
adding MobileC.dat as type 0x32 at raw offset 0xe58000 len 0x200 (end
0xe58200)
MobileD.dat found, adding from previous parse
adding MobileD.dat as type 0x33 at raw offset 0xe5c000 len 0x800 (end
0xe5c800)
MobileE.dat found, adding from previous parse
adding MobileE.dat as type 0x34 at raw offset 0xe60000 len 0x800 (end
0xe60800)
Statistics.settings found, adding from previous parse
adding Statistics.settings at raw offset 0x2ff8000 len 0x1000 (end 0x2ff9000)
Manufacturing.data found, adding from previous parse
adding Manufacturing.data at raw offset 0x2ff4000 len 0x1000 (end 0x2ff5000)

------ adding smc_config.bin ------


adding smc config to offset 0x02ffc000, len 0x400

------ finalizing image ------


Fixing up empty FS block entries...done!
Writing FS table to image offset 0xe64000 len 0x4000 (end 0xe68000)...done!
copying anchor block 1 to offset 0x2fe8000
copying anchor block 2 to offset 0x2fec000

------ writing image to disk ------


writing file '..\output\nandflash.bin' to disk...done!
---------------------------------------------------------------
..\output\nandflash.bin image built, info:
---------------------------------------------------------------
Kernel : 2.0.17544.0
Console : Corona
NAND size : 48MiB MMC (system only)
Build : Glitch (v2)
Xell : power on console with console eject button
Serial : 498312113705
ConsoleId : 283031073029
MoboSerial: 7910050110441375
Mfg Date : 09/08/2011
CPU Key : B9556C12BA222D1DBBFEC512A1018C99
1BL Key : DD88AD0C9ED669E7B56794FB68563EFA
DVD Key : C7057971D85F5CB02734D5BE3C41F5E8
CF LDV : 1
KV type : type2 (hashed - unchecked, master key not available)
---------------------------------------------------------------
xeBuild Finished. Have a nice day.
---------------------------------------------------------------

-----------------------------------------------------------------------------------
--------------------------
xeBuild Nand gerada.s_ falta escrever a xeBuild Nand gerada
(output\nandflash.bin)

-----------------------------------------------------------------------------------
--------------------------
* Para gravar uma Imagem Xebuild. Voc_ tem 3 op__es:
1. - Se voc_ tem um leitor/gravador clique Xebuild - Escrever.
2. - Prepare um dispositivo USB em Fat32 e clique Escrever-Raw(Raw-Flash) para
copiar os arquivos necess_rios , coloque no console e inicie o Xell.
3. - Se voc_ FSD v3 ligue o console a rede(Lan) e clique (Escrever-IP/IP-Flash) -
xebuild

-----------------------------------------------------------------------------------
--------------------------
Processando.........
Flashing NandFlash to Device MMC-SD = D:
[Errno 9] Bad file descriptor
Flasher Selected: xflash
D:Copiando arquivos.
CONFIRME SE FOI CRIADO EM SEU DISPOSITIVO USB OS ARQUIVOS NANDFLASH.BIN E
XENON.ELF.
SE ESTIVER CORRETO INSIRA A UNIDADE USB NO CONSOLE LIGUE EM MODO XELL, ESPERE
TERMINAR O PROCESSO E REINICIE O CONSOLE

Aguarde gerando arquivos temporarios...OK

*************************************************************
*************************************************************
Reiniciando arquivos e Variantes...

DETECTANDO NAND: "nand\nanddump.bin"

-----------------------------------------------------------------------------------
--------------------------
NandPro v3.0a by Tiros

Could not open Virtual Nand Device File: nand\nanddump.bin


Can not continue

-----------------------------------------------------------------------------------
--------------------------

-----------------------------------------------------------------------------------
--------------------------
NandPro v2.0e by Tiros

Could not open Virtual Nand Device File: nand\nanddump.bin

Can not continue

-----------------------------------------------------------------------------------
--------------------------
Unecc dump detected
Checking ECC-CheckSum... Wait
BUSCANDO SMC_CONFIG na NAND
Smc Config encontrado em 0x02FF0000
Lendo Temperaturas...:
Reset Parental Code: YYDD
ANALIZANDO DAdOS Da NAND

ID: e06a5e39
Encontrado SMC (version 2.5) : 00000800 - 00004000
SMC Patch found at offset 0x13b9

Nand NO RETAIL (Exploited)


Encontrado Keyvault : 00004000 - 00008000
Looking for Cpukey in Local Database. Saved New Id: e06a5e39 with Cpukey :
b9556c12ba222d1dbbfec512a1018c99
Reloaded_Glitch.bin

-----------------------------------------------------------------------------------
--------------------------
1 arquivo(s) copiado(s).

-----------------------------------------------------------------------------------
--------------------------
Cpukey Detected : b9556c12ba222d1dbbfec512a1018c99
Checking CpuKey
Saved New Id: e06a5e39 with Cpukey : b9556c12ba222d1dbbfec512a1018c99
Reloaded_Glitch.bin

-----------------------------------------------------------------------------------
--------------------------
1 arquivo(s) copiado(s).

-----------------------------------------------------------------------------------
--------------------------
CpuKey is correct
Encontrado CB_A (build 13121) : 00008000 - 00009af0
Encontrado CB_B (build 13121) : 00009af0 - 00011630
Encontrado CD (build 12905) : 00011630 - 00016a30
Encontrado CE (build 1888) : 00016a30 - 0006caa0
Encontrado CF (build 17544) : 000b0000- 000b4560
Encontrado CF1 build : None
Encontrado CG (build 17544) : 000b4560- 0012b41a
Encontrado CG1 build : None
Nand valida
DETECTANDO MODELO DO CONSOLE
Verificando se _ um modelo Exploiteable...
Modelo : Corona4g CB_A_13121 GLITCHEABLE
CD_12905 Invalida para Jtag ou j_ Jtaged

Size: 64

Reloaded_Glitch_c.bin

-----------------------------------------------------------------------------------
--------------------------
1 arquivo(s) copiado(s).

-----------------------------------------------------------------------------------
--------------------------

FileSystems:
FileSystem Active:31 offset:0xE64000
FileSystem Last:31 offset:0xE64000

Block Size File


0x00000800 0x00003800 SMC_2.5.bin
0x00004000 0x00004000 Keyvault.bin
0x00008000 0x00001AF0 CB_A_13121.bin
0x00009AF0 0x00007B40 CB_B_13121.bin
0x00011630 0x00005400 CD_12905.bin
0x00016A30 0x00056070 CE_1888.bin
0x000B0000 0x00004560 CF_17544.bin
0x000B4560 0x00076EBA CG_17544.bin
0x000C9B26 0x0006B420 sysupdate.xexp1
0x001326C9 0x00014000 aac.xexp1
0x00145D17 0x00061000 bootanim.xex
0x001A6C9B 0x0000C000 createprofile.xex
0x001B26C9 0x005B1000 dash.xex
0x0073A2E8 0x0000A000 deviceselector.xex
0x00745D17 0x0001B000 gamerprofile.xex
0x00760F83 0x0001D000 hud.xex
0x00780000 0x00014000 huduiskin.xex
0x0079364D 0x00008000 mfgbootlauncher.xex
0x0079B26C 0x0000C000 minimediaplayer.xex
0x007A6C9B 0x0000F000 nomni.xexp1
0x007B64D9 0x00002000 nomnifwk.xexp1
0x007BA2E8 0x00005000 nomnifwm.xexp1
0x007C9B26 0x0001A000 signin.xex
0x007EC9B2 0x0000B000 vk.xex
0x007F83E0 0x00251000 xam.xex
0x00A3A2E8 0x0011B000 xenonclatin.xtt
0x00B4D936 0x00018000 xenonclatin.xttp1
0x00B64D93 0x001A8000 xenonjklatin.xtt
0x00D00000 0x00007000 xenonjklatin.xttp1
0x00D07C1F 0x00017000 ximecore.xex
0x00D1F07C 0x00090000 ximedic.xex
0x00DAAAAA 0x00002800 ximedic.xexp1
0x00DAE8BA 0x0000D000 launch.xex
0x00DBE0F8 0x00006000 lhelper.xex
0x00DC5D17 0x000002E5 launch.ini
0x00DC9B26 0x00000A00 crl.bin
0x00DCD936 0x0000AD30 dae.bin
0x00DD9364 0x00004000 extended.bin
Saved New Id: e06a5e39 with Cpukey : b9556c12ba222d1dbbfec512a1018c99

Nand in Folder
Reloaded_Glitch_c.bin

-----------------------------------------------------------------------------------
--------------------------
1 arquivo(s) copiado(s).

-----------------------------------------------------------------------------------
--------------------------

-----------------------------------------------------------------------------------
--------------------------

* Selecione o tipo de imagem e as op__es desejadas e clique Criar - Xebuild

-----------------------------------------------------------------------------------
--------------------------
Wait, closing Autogg

Você também pode gostar