Ну я собсна тоже не пойму почему к телику, видимо получить ключи по Хелл, но если залит без имедж то как????
Small Block Detected Reading Nand wait........... Using XFlash @ [0:1] ARM Version 3 FlashConfig: 0x00043000 Reading 0x03FF / 0x03FF Done! Dump Readed, Reading Next One Using XFlash @ [0:1] ARM Version 3 FlashConfig: 0x00043000 Reading 0x03FF / 0x03FF Done! Nand read without differences. DETECT NAND: "nand\nanddump.bin" ------------------------------------------------------------------------------------------------------------- NandPro v3.0a by Tiros Using Virtual Nand Device File: nand\nanddump.bin Flash Config: 0x00023010 Block Size: 16KB Block Limits: 0x000000..0x000000 File: common\temp\flash.bin Reading Couldn't open common\temp\flash.bin for writing ------------------------------------------------------------------------------------------------------------- Small Block Detected Checking ECC-CheckSum... Wait ------------------------------------------------------------------------------------------------------------- Ecc Check: OK ------------------------------------------------------------------------------------------------------------- Done CHECKING SMC_CONFIG Smc Config found: 0x00FEB800 Reading Temperatures...: Reset Parental Code: YDRU CHECKING NAND DATA ID: 2d87614f ECC - unECC Found SMC (version 2.5) : 00000800 - 00004000 SMC Patch found at offset 0x13b9 Nand NO RETAIL (Exploited) Found Keyvault : 00004000 - 00008000 Looking for Cpukey in Local Database. Not Found Looking for Cpukey in same folder cpukey.txt.Not Found Looking for Cpukey on Nand.Not Found Found CB_A (build 918 : 00008000 - 00009ac0 Found CB_B (build 918 : 00009ac0 - 00011600 Found CD (build 9452) : 00011600 - 00017600 Nand valida CHECKING CONSOLE MODEL Checking if Exploiteable... Model : Corona CB_A_9188 GLITCHEABLE CD_9452 Not JTAGABLE or Jtaged Size: 16 Reloaded_Glitch_c.bin ------------------------------------------------------------------------------------------------------------- ‘Є®ЇЁа®ў ® д ©«®ў: 1. ------------------------------------------------------------------------------------------------------------- FileSystems: FileSystem Active:28 offset:0xAAF000 FileSystem Last:22 offset:0xF3EE40 Block Size File 0x00000800 0x00003800 SMC_2.5.bin 0x00004000 0x00004000 Keyvault.bin 0x00008000 0x00001AC0 CB_A_9188.bin 0x00009AC0 0x00007B40 CB_B_9188.bin 0x00011600 0x00006000 CD_9452.bin 0x00ECC000 0x00014000 aac.xexp2 0x00EE0000 0x00061000 bootanim.xex 0x000F8000 0x0001D000 hud.xex 0x00118000 0x00014000 huduiskin.xex 0x0012C000 0x00008000 mfgbootlauncher.xex 0x00134000 0x0000C800 nomni.xexp2 0x00144000 0x00005000 nomnifwm.xexp2 0x0014C000 0x00002000 nomnifwk.xexp2 0x00150000 0x00253000 xam.xex 0x003A4000 0x00017000 ximecore.xex 0x003BC000 0x00002800 ximedic.xexp2 0x0040C000 0x00018000 xenonclatin.xttp2 0x00424000 0x00007000 xenonjklatin.xttp2 0x00434000 0x0000C000 createprofile.xex 0x00440000 0x00597000 dash.xex 0x009D8000 0x0000A000 deviceselector.xex 0x009E4000 0x0001B000 gamerprofile.xex 0x00EBC000 0x00000A00 crl.bin 0x00AE0000 0x0011B000 xenonclatin.xtt 0x00A00000 0x0000C000 minimediaplayer.xex 0x00C14000 0x001A8000 xenonjklatin.xtt 0x00A0C000 0x00019000 signin.xex 0x00A28000 0x00007000 updater.xex 0x00DDC000 0x00090000 ximedic.xex 0x00A30000 0x0000B000 vk.xex 0x00E70000 0x00004000 extended.bin 0x00A44000 0x0000DE60 dae.bin 0x00A58000 0x00000400 secdata.bin 0x00EB8000 0x00004000 fcrt.bin 0x00EEC000 0x0006A010 sysupdate.xexp2 ------------------------------------------------------------------------------------------------------------- * CpuKey unknown. If you know it write in Cpukey field or use any of methods to retrieve it. * If you havent got it yet choose Xell model and Click NandXell-Create ------------------------------------------------------------------------------------------------------------- Copy saved as: nands\backups\2d87614f\nanddump_606.bin Generating Nand Xell . Wait ... ! Warning: can't patch this Corona type SMC! New Cb Detected patchset for 13121 found, 5 patch(es) Using RIP CB_A Adding to NandXell 0x00000000..0x000001FF (0x00000200 bytes) Header 0x00000200..0x000007FF (0x00000600 bytes) Padding 0x00000800..0x00003FFF (0x00003800 bytes) SMC 0x00004000..0x00007FFF (0x00004000 bytes) Keyvault 0x00008000..0x00009ABF (0x00001AC0 bytes) CB_A 9188 0x00009AC0..0x000115FF (0x00007B40 bytes) CB_B 13121 0x00011600..0x000175FF (0x00006000 bytes) CD 8453 0x00017600..0x0001FFFF (0x00008A00 bytes) Padding Generating ECC. Wait...Adding Xell part Xell: Reloaded (tuxuser corona) OK Xell Nand generated.Now you can Flash it (output\nandxell.bin) ------------------------------------------------------------------------------------------------------------- * If created click on NandXell-Flash to write Nandxell (Ecc) on your Xbox. ------------------------------------------------------------------------------------------------------------- Wait............. Using XFlash @ [0:1] ARM Version 3 FlashConfig: 0x00043000 Writing 0x004F / 0x004F Done! ------------------------------------------------------------------------------------------------------------- * Once properly flashed boot console Xell. To retrieve CpuKey you can: - Write by hand in the program field CPUKEY - Connect console to Lan and click IP - Cpukey. - Try USB - Dumper button and follow the instructions - If you have installed flasher you can read it clicking Flasher - Cpukey. * If you have any problem flashing , try another nandpro version in Options. ) ------------------------------------------------------------------------------------------------------------- ------------------------------------------------------------------------------------------------------------- ‘Є®ЇЁа®ў ® д ©«®ў: 1. ------------------------------------------------------------------------------------------------------------- Copy saved as: C:\Users\Admin\Desktop\AutoGG_0.9.2\Corona__.bin
Залил значит, укладка и сопли все сними, сделай перемычки путные, что бы контакт был нормальный, ресеты должны идти жирные, длятся секунды 2 - 2,5... провода все по дефолту припаяй, так как у Риччи по FAQ