29/025/2012 10:25:42 - INFO - <- This level is successfully initialized
29/025/2012 10:25:43 - INFO - Flashtool Version 0.9.9.0 built on 2012-11-13 22:53:30
29/025/2012 10:25:43 - INFO - You can drag and drop ftf files here to start flashing them
29/025/2012 10:25:49 - INFO - Device connected with USB debugging on
29/025/2012 10:25:51 - INFO - Connected device : WT19
29/025/2012 10:25:51 - INFO - Installed version of busybox : N/A
29/025/2012 10:25:51 - INFO - Android version : 2.3.4 / kernel version : 2.6.32.9-perf / Build number : 4.0.2.A.0.58
29/025/2012 10:25:59 - INFO - Decrypting C:\Flashtool\custom\root\ZergRush\zergrush.tar.uue.enc to C:\Flashtool\custom\root\ZergRush\zergrush.tar.uue
29/026/2012 10:26:03 - INFO - Pushing C:\Flashtool\custom\root\ZergRush\zergrush.tar.uue to /data/local/tmp
29/026/2012 10:26:03 - INFO - Pushing C:\Flashtool\.\devices\WT19\busybox\1.20.0\busybox to /data/local/tmp/busybox
29/026/2012 10:26:04 - INFO - Pushing C:\Flashtool\custom\root\subin\Superuser\su to /data/local/tmp/su
29/026/2012 10:26:04 - INFO - Pushing C:\Flashtool\custom\root\subin\Superuser\Superuser.apk to /data/local/tmp/Superuser.apk
29/026/2012 10:26:05 - INFO - Running part1 of Root Exploit, please wait
29/026/2012 10:26:06 - INFO - Waiting for device. After 60secs, stop waiting will be forced
29/027/2012 10:27:09 - INFO - Forced stop waiting.
29/027/2012 10:27:09 - ERROR - The part1 exploit did not work
29/027/2012 10:27:09 - INFO - Cleaning files
29/031/2012 10:31:00 - INFO - Device disconnected
請問我哪個步驟錯了嗎? |