W880i revive

System diagnostics passed.
Version 13.20 ready!
[ --- Attach to Phone --- ]
Connecting via Fighter USB Cable...
Powering on the phone...
[ --- Detach Phone --- ]
Terminating threads...
All threads terminated.
[ --- Attach to Phone --- ]
Connecting via Fighter USB Cable...
Powering on the phone...
Baseband chip ID: 0x9900
Protocol version: 3.1
Baudrate = 460800Bd
Booting via ROM...
Trying CID53 recovery applet...
Sending applet prologue...
Sending applet body...
Time spent entering bootstrap: 2s
Initializing phone hardware...
Applet ID: 070703 1229 NPA4_CXC1329130_DB2020_...
Flash manufacturer: ST Microelectronics
Flash ID: 0x2019
OTP Security Level: 1 (Retail)
OTP CID: 51
Phone CID: 51
Phone color: Red
Sending applet...
Applet ID: 061205 1523 HANCXC9876543210_DB2020...
Sending applet...
Terminating threads...
All threads terminated.
[ --- Attach to Phone --- ]
Connecting via Fighter USB Cable...
Powering on the phone...
Baseband chip ID: 0x9900
Protocol version: 3.1
Baudrate = 460800Bd
Booting via ROM...
Trying CID53 recovery applet...
Time spent entering bootstrap: 10s
Unsupported flash certificate
Terminating threads...
All threads terminated.
[ --- Attach to Phone --- ]
Connecting via Fighter USB Cable...
Powering on the phone...
Baseband chip ID: 0x9900
Protocol version: 3.1
Baudrate = 460800Bd
Booting via ROM...
Trying CID53 recovery applet...
Sending applet prologue...
Sending applet body...
Time spent entering bootstrap: 2s
Initializing phone hardware...
Applet ID: 070703 1229 NPA4_CXC1329130_DB2020_...
Flash manufacturer: ST Microelectronics
Flash ID: 0x2019
OTP Security Level: 1 (Retail)
OTP CID: 51
Phone CID: 51
Phone color: Red
Sending applet...
Terminating threads...
All threads terminated.
[ --- Attach to Phone --- ]
Connecting via Fighter USB Cable...
Powering on the phone...
Baseband chip ID: 0x9900
Protocol version: 3.1
Baudrate = 460800Bd
Booting via ROM...
Trying CID53 recovery applet...
Sending applet prologue...
Sending applet body...
Time spent entering bootstrap: 2s
Initializing phone hardware...
Applet ID: 070703 1229 NPA4_CXC1329130_DB2020_...
Flash manufacturer: ST Microelectronics
Flash ID: 0x2019
OTP Security Level: 1 (Retail)
OTP CID: 51
Phone CID: 51
Phone color: Red
Sending applet...
Applet ID: 061205 1523 HANCXC9876543210_DB2020...
Sending applet...
Terminating threads...
All threads terminated.
[ --- Attach to Phone --- ]
Connecting via Fighter USB Cable...
Powering on the phone...
Baseband chip ID: 0x9900
Protocol version: 3.1
Baudrate = 460800Bd
Booting via ROM...
Trying CID53 recovery applet...
Sending applet prologue...
Sending applet body...
Time spent entering bootstrap: 2s
Initializing phone hardware...
Applet ID: 070703 1229 NPA4_CXC1329130_DB2020_...
Flash manufacturer: ST Microelectronics
Flash ID: 0x2019
OTP Security Level: 1 (Retail)
OTP CID: 51
Phone CID: 51
Phone color: Red
Sending applet...
Applet ID: 061205 1523 HANCXC9876543210_DB2020...
Sending applet...
Applet ID: 061201 1314 HANCXC1329129_DB2020_FL...
RSA protection state cannot be determined for this CID.
Phone hardware initialized OK
[ --- Flash Main Firmware --- ]
Flash file: "W880i_CXC1250640_Generic_R1JC002_Red51.cw88sw"
Waiting for flash file to load...
Preparing to program flash...
Baudrate = 921600Bd
The applet ignored baudrate change request!
Programming flash...
Time: 00:11:54
Flash process done.
[ --- Flash Raw File System --- ]
Flash file: "W880i_CXC1250651_APAC_R1JC002_Red51.cw88fs"
Waiting for flash file to load...
Preparing to program flash...
Baudrate = 921600Bd
The applet ignored baudrate change request!
Programming flash...
Time: 00:04:02
Flash process done.
[ --- Customize File System --- ]
Sending CS applet...
Applet ID: 070410 1557 HANCXC1250562_DB2020_CS...
Initializing CS applet...
Applet ID: 070410 1557 HANCXC1250562_DB2020_CS...
Baudrate = 921600Bd
Starting up GDFS service...
Starting up filesystem, please wait...
Building customization...
Customizing phone...
Done.
Writing CDA Article MS string...
New value: CDA102568/10
Done.
Writing CDA Version MS string...
New value: R5A
Done.
Writing Default Article MS string...
New value: cxc1250651
Done.
Writing Default Version MS string...
New value: R8BE001
Done.
Writing langpack string...
New value: EUROPE_1
Done.
Writing country...
New value: Generic Trade
Done.
Version 13.20 ready!
[ --- Attach to Phone --- ]
Connecting via Fighter USB Cable...
Powering on the phone...
[ --- Detach Phone --- ]
Terminating threads...
All threads terminated.
[ --- Attach to Phone --- ]
Connecting via Fighter USB Cable...
Powering on the phone...
Baseband chip ID: 0x9900
Protocol version: 3.1
Baudrate = 460800Bd
Booting via ROM...
Trying CID53 recovery applet...
Sending applet prologue...
Sending applet body...
Time spent entering bootstrap: 2s
Initializing phone hardware...
Applet ID: 070703 1229 NPA4_CXC1329130_DB2020_...
Flash manufacturer: ST Microelectronics
Flash ID: 0x2019
OTP Security Level: 1 (Retail)
OTP CID: 51
Phone CID: 51
Phone color: Red
Sending applet...
Applet ID: 061205 1523 HANCXC9876543210_DB2020...
Sending applet...
Terminating threads...
All threads terminated.
[ --- Attach to Phone --- ]
Connecting via Fighter USB Cable...
Powering on the phone...
Baseband chip ID: 0x9900
Protocol version: 3.1
Baudrate = 460800Bd
Booting via ROM...
Trying CID53 recovery applet...
Time spent entering bootstrap: 10s
Unsupported flash certificate
Terminating threads...
All threads terminated.
[ --- Attach to Phone --- ]
Connecting via Fighter USB Cable...
Powering on the phone...
Baseband chip ID: 0x9900
Protocol version: 3.1
Baudrate = 460800Bd
Booting via ROM...
Trying CID53 recovery applet...
Sending applet prologue...
Sending applet body...
Time spent entering bootstrap: 2s
Initializing phone hardware...
Applet ID: 070703 1229 NPA4_CXC1329130_DB2020_...
Flash manufacturer: ST Microelectronics
Flash ID: 0x2019
OTP Security Level: 1 (Retail)
OTP CID: 51
Phone CID: 51
Phone color: Red
Sending applet...
Terminating threads...
All threads terminated.
[ --- Attach to Phone --- ]
Connecting via Fighter USB Cable...
Powering on the phone...
Baseband chip ID: 0x9900
Protocol version: 3.1
Baudrate = 460800Bd
Booting via ROM...
Trying CID53 recovery applet...
Sending applet prologue...
Sending applet body...
Time spent entering bootstrap: 2s
Initializing phone hardware...
Applet ID: 070703 1229 NPA4_CXC1329130_DB2020_...
Flash manufacturer: ST Microelectronics
Flash ID: 0x2019
OTP Security Level: 1 (Retail)
OTP CID: 51
Phone CID: 51
Phone color: Red
Sending applet...
Applet ID: 061205 1523 HANCXC9876543210_DB2020...
Sending applet...
Terminating threads...
All threads terminated.
[ --- Attach to Phone --- ]
Connecting via Fighter USB Cable...
Powering on the phone...
Baseband chip ID: 0x9900
Protocol version: 3.1
Baudrate = 460800Bd
Booting via ROM...
Trying CID53 recovery applet...
Sending applet prologue...
Sending applet body...
Time spent entering bootstrap: 2s
Initializing phone hardware...
Applet ID: 070703 1229 NPA4_CXC1329130_DB2020_...
Flash manufacturer: ST Microelectronics
Flash ID: 0x2019
OTP Security Level: 1 (Retail)
OTP CID: 51
Phone CID: 51
Phone color: Red
Sending applet...
Applet ID: 061205 1523 HANCXC9876543210_DB2020...
Sending applet...
Applet ID: 061201 1314 HANCXC1329129_DB2020_FL...
RSA protection state cannot be determined for this CID.
Phone hardware initialized OK
[ --- Flash Main Firmware --- ]
Flash file: "W880i_CXC1250640_Generic_R1JC002_Red51.cw88sw"
Waiting for flash file to load...
Preparing to program flash...
Baudrate = 921600Bd
The applet ignored baudrate change request!
Programming flash...
Time: 00:11:54
Flash process done.
[ --- Flash Raw File System --- ]
Flash file: "W880i_CXC1250651_APAC_R1JC002_Red51.cw88fs"
Waiting for flash file to load...
Preparing to program flash...
Baudrate = 921600Bd
The applet ignored baudrate change request!
Programming flash...
Time: 00:04:02
Flash process done.
[ --- Customize File System --- ]
Sending CS applet...
Applet ID: 070410 1557 HANCXC1250562_DB2020_CS...
Initializing CS applet...
Applet ID: 070410 1557 HANCXC1250562_DB2020_CS...
Baudrate = 921600Bd
Starting up GDFS service...
Starting up filesystem, please wait...
Building customization...
Customizing phone...
Done.
Writing CDA Article MS string...
New value: CDA102568/10
Done.
Writing CDA Version MS string...
New value: R5A
Done.
Writing Default Article MS string...
New value: cxc1250651
Done.
Writing Default Version MS string...
New value: R8BE001
Done.
Writing langpack string...
New value: EUROPE_1
Done.
Writing country...
New value: Generic Trade
Done.


W380i auto shut off done by cruiser

System diagnostics passed.
Version 13.20 ready!
[ --- Attach to Phone --- ]
Connecting via Fighter USB Cable...
Powering on the phone...
Baseband chip ID: 0xD000
Protocol version: 3.1
Baudrate = 460800Bd
Booting via EROM...
Trying Red CID53 flash applet...
Sending applet prologue...
Sending applet body...
Time spent entering bootstrap: 2s
Initializing phone hardware...
Applet ID: 071213 1552 PERCXC1720441_R2A022_PN...
Flash manufacturer: ST Microelectronics
Flash ID: 0x2019
OTP Security Level: 1 (Retail)
OTP CID: 52
Phone hardware initialized OK
[ --- Flash Main Firmware --- ]
Flash file: "W380i_1201-4421_Generic_R10CA001_Red53.a1sw"
Waiting for flash file to load...
Preparing to program flash...
Baudrate = 921600Bd
The applet ignored baudrate change request!
Programming flash...
[ --- Flash Main Firmware --- ]
Flash file: "W380i_1201-4424_HongKong_R10CA001_Red53.a1sw"
Waiting for flash file to load...
Preparing to program flash...
Baudrate = 230400Bd
[ --- Detach Phone --- ]
Terminating threads...
All threads terminated.
[ --- Attach to Phone --- ]
Connecting via Fighter USB Cable...
Powering on the phone...
Baseband chip ID: 0xD000
Protocol version: 3.1
Baudrate = 230400Bd
Booting via EROM...
Trying Red CID53 flash applet...
Sending applet prologue...
Sending applet body...
Time spent entering bootstrap: 3s
Initializing phone hardware...
Applet ID: 071213 1552 PERCXC1720441_R2A022_PN...
Flash manufacturer: ST Microelectronics
Flash ID: 0x2019
OTP Security Level: 1 (Retail)
OTP CID: 52
Phone hardware initialized OK
[ --- Flash Main Firmware --- ]
Flash file: "W380i_1201-4421_Generic_R10CA001_Red53.a1sw"
Waiting for flash file to load...
Preparing to program flash...
Programming flash...
Time: 00:24:44
Flash process done.
[ --- Flash Main Firmware --- ]
[ --- Flash Raw File System --- ]
Flash file: "W380i_1201-4439_ANZ_R9BB001_Red53.a1fs"
Waiting for flash file to load...
Preparing to program flash...
Programming flash...
Time: 00:07:02
Flash process done.
[ --- Customize File System --- ]
Sending CS applet...
Applet ID: 070904 1356 AN2CXC1250610_R3A016_PN...
Initializing CS applet...
Starting up GDFS service...
Starting up filesystem, please wait...
Building customization...
Customizing phone...
Done.
Writing CDA Article MS string...
New value: CDA102568/10
Done.
Writing CDA Version MS string...
New value: R6A
Done.
Writing Default Article MS string...
New value: 1201-4439
Done.
Writing Default Version MS string...
New value: R10CA001
Done.
Writing langpack string...
New value: EUROPE_1
Done.
Writing country...
New value: Generic Trade
Done.


k500i



McuId: 80000301FFFFFF, CID: 29, 4 (Red)
Mcert: A1_SEMC
Baud Rate: 921600
X_K500_125886_000000_0000_R2AA{0102030301}.bin [DB2010_29_RED]
Trying: CXC1326738_050425_0904_R2AB{0101030301}.bin
Certificate Error 1:
PayLoader Failed
MCU Part_1 Flashing Failed, Time: 00:01
Trying: CXC1326738_050425_0904_R2AB{0101030301}.bin
PayLoader Certificate Accepted
Prolgue Ok
PayLoader: 050425 0904 MATCXC1326738_COMPACTFLASHLOADER R2AB, Ok
IMEI : 354228-00-712290-0, CID: 29, CDT: 1 0 1 (Red)
FlId0: 890D, Intel RD38F4050L0YT
FlashImage: X_K500_125886_000000_0000_R2AA{0102030301}.bin (29_RED)
FlashImage Certificate Accepted
MCU Part_1 Flashing Done, Time: 04:24
X_K500_125961_TAIWAN-MR2_000000_0000_R2AA{0102030301}.bin [DB2010_29_RED]
FlashImage: X_K500_125961_TAIWAN-MR2_000000_0000_R2AA{0102030301}.bin (29_RED)
FlashImage Certificate Accepted
MCU Part_1 Flashing Done, Time: 01:24
X_K500_CDA102307-11_R5A.bib [Cust Bundle]
McuId: 80000301FFFFFF, CID: 29, 4 (Red)
Mcert: A1_SEMC
Baud Rate: 921600
Trying: CXC1326739_R2F{0101030301}.bin
PayLoader Certificate Accepted
Prolgue Ok
PayLoader: 040614 1538 LLECXC1326739_COMPACTCERTLOADER R2F, Ok
IMEI : 354228-00-712290-0, CID: 29, CDT: 1 0 1 (Red)
FlId0: 890D, Intel RD38F4050L0YT
OTP_F: 061632311641696B - Locked
OTP_U: 0D80B4670520E6AD - Locked
040615 1632 GOHCXC125924_COMPACT_SEMC_FS_LOADER_R2B
ITP Sw : CXC 125 860 R2A
Brand : Generic Trade
CUST Lp: CHINESE
CDA ver: CDA102338/36 R5A
CXC ver: cxc125961 6E6W'
CustBundle: X_K500_CDA102307-11_R5A.bib
CUST Flashing Done, Time: 02:12
McuId: 80000301FFFFFF, CID: 29, 4 (Red)
Mcert: A1_SEMC
Baud Rate: 921600
Trying: CXC1326739_R2F{0101030301}.bin
PayLoader Certificate Accepted
Prolgue Ok
PayLoader: 040614 1538 LLECXC1326739_COMPACTCERTLOADER R2F, Ok
IMEI : 354228-00-712290-0, CID: 29, CDT: 1 0 1 (Red)
FlId0: 890D, Intel RD38F4050L0YT
OTP_F: 061632311641696B - Locked
OTP_U: 0D80B4670520E6AD - Locked
BLK_0: 0x44F40000
IMEI : 354228-00-712290-0
OTP CID: 29, GDFS CID: 29
ULCK : 0000 - Off
NCK : Open [5-5]
NSCK : Open [5-5]
SPCK : Open [5-5]
CCK : Open [5-5]
PCK : Open [5-5]
ESLK : Open [5-5]
Flags : 0AFFFFFFFFFFFFFFFFFF [EGSM900,DCS1800,PCS1900]
Security Backup: K500_35422800712290_3222009_83619.sim
Security Initialization Done, Time: 00:06


nokia N73
opine line






JAF box ATmega firmware version: 1B0
Searching for phone ...
Phone found on FBUS interface
Reading phone info ...
SP LOCK status:
Block 1: CLOSED Type 5 Data: 51503F
Block 2: CLOSED Type 5 Data: 51503F
Read Phone Info OK
Searching for phone ...
Phone found on FBUS interface
Reading phone info ...
Reading PM Field 308 Subfield 1 with length 8192 bytes
Saving to file: RM-133_353641016074720_Locked_Keycnt_0_Fbuscnt_0__V_05wk47v38.1_19-01-07_RM-133_(c)_Nokia.__21_02_2009__00_49_52.bin
PM308 backup OK
Searching for JAF box ...
JAF box detected
JAF box ATmega firmware version: 1B0
Initialize JAF box ...
JAF box JAFBOX_BB5_FLASH_bb5challenge ...
ASIC ID: 000000010000022600010006010C192101003000
HASH: BAF3A9C3DBFA8454937DB77F2B8852B1
ROM ID: 273F6D55DFAAF68F
bb5king SW v1.07
Sending loader...
Rap3Gv3 selected.
BB5_FLASH_CMTbootload
JAF CMT Boot Ready
Hello ok
ok
Hello ok
Hello ok
PM send.
Test call...
cpsr - 0x0000001F
p15_1 - 0x0005307F
p15_2 - 0x0005117F
p15_3 - 0x0005317F
esn_init ret - 0x00000001,
esn_read ret - 0x00000001,
Normal BB5 found - 0x000D20C0
LR - FFFF3698, param - 0x03, size - 0x00
UpdSLock - 0x00000001
ret - 0x01,
PM_308 CRC - 0x00187D15
Reciving PM
Hello ok
PM buff recived
After unlock.
JAF box ATmega firmware version: 1B0
Searching for phone ...
Phone found on FBUS interface
Writting PM Field 308 Subfield 1 with length 8192 bytes
Reset phone ...
PM Field 308 Subfield 1 written OK
Operation time: 00:53.
Successfully done.
Thread phone exit.

Please Connect Cable to Switched-Off Mobile
Mcu_Id: 5B 08 02 01 FF FF FF FF
Secure Boot Ok, Time: 00:30
Fl_Id : 00208801 ST M58CR064P {2}
Blk_0 : 600000
IMEI : 351926-00-005019-6
ULock : Factory_Off : 0000
***** : "New" GDFS SA Layout, Cannot Calculate Codes
LockSt: Sim_Locks Open, Mcc+Mnc: FFF-FF, 5555 55
Mcu_Sw: R4A014 prgCXC1122645_TAIWAN
BackUp:'T230_351926000050196_uns_2_21_2009_6_47_56_PM.sim'Used Original GDFS Security Block
GDFS Flash Erased: 39 sector(s), Time: 00:17
GDFS Flash Written: 872448 byte(s), Time: 00:17
GDFS Flashing Done, Time: 00:36
GDFS Flash Erased: 1 sector(s), Time: 00:00
GDFS Flash Written: 28672 byte(s), Time: 00:00
Locks Init Done, Time: 00:05
OTP IMEI: 0A-010273-00-291378-9, Locked
Old IMEI: 351926-00-005019-6
"New" Security Area Layout Detected
New IMEI: 010273-00-291378-9
GDFS Flash Erased: 1 sector(s), Time: 00:00
GDFS Flash Written: 28672 byte(s), Time: 00:00GDFS Security Block Init Done, Time: 00:05




7210c complete flashing


JAF version 1.98.61
Detected PKEY: 9000AB3B
Card life counter: 99.99%
P-key nokia module version 01.02
Detected JAF INTERFACE version: 01.B0, Driver version: 40000, Library version: 30112
JAF DCT4/BB5 LOADERS DIR: C:\Program Files\ODEON\JAF\Flash\
JAF DCT4/BB5 PRODUCT DIR: C:\Program Files\Nokia\Phoenix\Products\
JAF USB LOADERS DIR: C:\Program Files\ODEON\JAF\FlashUSB\
JAF DCT3/DCTL LOADERS DIR: C:\Program Files\ODEON\JAF\Flash3\
USB Cable Driver version: 7.0.2.0
Changing mode...Done!
FILES SET FOR FLASHING:
MCU Flash file: NONE
PPM Flash file: NONE
CNT Flash file: NONE
APE Variant file: NONE
Phone Type:
FILES SET FOR FLASHING:
MCU Flash file: C:\Program Files\Nokia\Phoenix\Products\rm436__04.87.mcusw
PPM Flash file: NONE
CNT Flash file: NONE
APE Variant file: NONE
Phone Type:
FILES SET FOR FLASHING:
MCU Flash file: C:\Program Files\Nokia\Phoenix\Products\rm436__04.87.mcusw
PPM Flash file: C:\Program Files\Nokia\Phoenix\Products\rm436__04.87.ppm_i
CNT Flash file: NONE
APE Variant file: NONE
Phone Type:
FILES SET FOR FLASHING:
MCU Flash file: C:\Program Files\Nokia\Phoenix\Products\rm436__04.87.mcusw
PPM Flash file: C:\Program Files\Nokia\Phoenix\Products\rm436__04.87.ppm_i
CNT Flash file: C:\Program Files\Nokia\Phoenix\Products\rm436__04.87.image_i
APE Variant file: NONE
Manual mode selected, version can't be checked!
Booting phone...
FAST PHONE detected!
CMT Boot Data:
Asic ID: 000000010000022600010006030C192101033000
Asic Mode ID: 00
Asic EM ID: 00000B22
Asic Public ID: 28000110695A5750D1D7DA7E1D889F9BE8514B30
HASH: 9DDBFCFE6E73CED7D8C6268C8EB8572300000000
ROM ID: 273F6D55DFAAF68F
CMT Boot File: C:\Program Files\ODEON\JAF\Flash\rap3gv3_2nd.fg
Loader version: 01.1E.00 -> Revision: 0000
Patching CMT boot step1...
Patching CMT boot step2...
Patching CMT boot step3...
CMT Boot Ready
CMT Flash ID: 89820089 <=> INTEL -> Type not in database
CMT Flash Data: 00000000000000000000000000000000
CMT Loader: C:\Program Files\ODEON\JAF\Flash\RAP3Gv3_algo.fg
Loader version: 01.21.01 -> Revision: 0000
Patching CMT loader step1...
Patching CMT loader step3...
CMT Loader Ready
Operation took 0 minutes 3 seconds...
Sending CRT data...
Erasing...
Operation took 1 minutes 37 seconds...
Writing...
Stage 1
Sending CMT HASH for NOLO
Sending CMT HASH for KEYS
Sending CMT HASH for PRIMAPP
Sending CMT HASH for PASUBTOC
Sending CMT PUB KEYS...
Sending CMT HASH for UPDAPP
Sending CMT HASH for DSP0
Sending CMT HASH for MCUSW
Booting phone...
FAST PHONE detected!
CMT Boot Data:
Asic ID: 000000010000022600010006030C192101033000
Asic Mode ID: 00
Asic EM ID: 00000B22
Asic Public ID: 28000110695A5750D1D7DA7E1D889F9BE8514B30
HASH: 9DDBFCFE6E73CED7D8C6268C8EB8572300000000
ROM ID: 273F6D55DFAAF68F
CMT Boot File: C:\Program Files\ODEON\JAF\Flash\rap3gv3_2nd.fg
Loader version: 01.1E.00 -> Revision: 0000
Patching CMT boot step1...
Patching CMT boot step2...
Patching CMT boot step3...
CMT Boot Ready
CMT Flash ID: 89820089 <=> INTEL -> Type not in database
CMT Flash Data: 00000000000000000000000000000000
CMT Loader: C:\Program Files\ODEON\JAF\Flash\RAP3Gv3_algo.fg
Loader version: 01.21.01 -> Revision: 0000
Patching CMT loader step1...
Patching CMT loader step3...
CMT Loader Ready
Operation took 0 minutes 4 seconds...
Sending CRT data...
Stage 1
FAST MODE finish!
Operation took 2 minutes 23 seconds...
Reseting phone...
PPM: C:\Program Files\Nokia\Phoenix\Products\rm436__04.87.ppm_i
Booting phone...
FAST PHONE detected!
CMT Boot Data:
Asic ID: 000000010000022600010006030C192101033000
Asic Mode ID: 00
Asic EM ID: 00000B22
Asic Public ID: 28000110695A5750D1D7DA7E1D889F9BE8514B30
HASH: 9DDBFCFE6E73CED7D8C6268C8EB8572300000000
ROM ID: 273F6D55DFAAF68F
CMT Boot File: C:\Program Files\ODEON\JAF\Flash\rap3gv3_2nd.fg
Loader version: 01.1E.00 -> Revision: 0000
Patching CMT boot step1...
Patching CMT boot step2...
Patching CMT boot step3...
CMT Boot Ready
CMT Flash ID: 89820089 <=> INTEL -> Type not in database
CMT Flash Data: 00000000000000000000000000000000
CMT Loader: C:\Program Files\ODEON\JAF\Flash\RAP3Gv3_algo.fg
Loader version: 01.21.01 -> Revision: 0000
Patching CMT loader step1...
Patching CMT loader step3...
CMT Loader Ready
Operation took 0 minutes 4 seconds...
Erasing...
Operation took 0 minutes 38 seconds...
Writing...
Stage 1
Operation took 0 minutes 56 seconds...
Reseting phone...
CNT: C:\Program Files\Nokia\Phoenix\Products\rm436__04.87.image_i
Booting phone...
FAST PHONE detected!
CMT Boot Data:
Asic ID: 000000010000022600010006030C192101033000
Asic Mode ID: 00
Asic EM ID: 00000B22
Asic Public ID: 28000110695A5750D1D7DA7E1D889F9BE8514B30
HASH: 9DDBFCFE6E73CED7D8C6268C8EB8572300000000
ROM ID: 273F6D55DFAAF68F
CMT Boot File: C:\Program Files\ODEON\JAF\Flash\rap3gv3_2nd.fg
Loader version: 01.1E.00 -> Revision: 0000
Patching CMT boot step1...
Patching CMT boot step2...
Patching CMT boot step3...
CMT Boot Ready
CMT Flash ID: 89820089 <=> INTEL -> Type not in database
CMT Flash Data: 00000000000000000000000000000000
CMT Loader: C:\Program Files\ODEON\JAF\Flash\RAP3Gv3_algo.fg
Loader version: 01.21.01 -> Revision: 0000
Patching CMT loader step1...
Patching CMT loader step3...
CMT Loader Ready
Operation took 0 minutes 3 seconds...
Erasing...
Operation took 4 minutes 5 seconds...
Writing...
Stage 1
Operation took 2 minutes 35 seconds...
Reseting phone...
Done!
Total time: 12 Minutes, 29 Seconds
DCT4/BB5 counter: 143
After flash processing...
Waiting for phone to boot...
Reading...
Phone type: RM-436, Software version: 04.87
IMEI: 355743022413708
APE Ver: (null)
Variant Ver: (null)
Product Code: 0566832
Done!
alcatel c825


module v2.43
Device: Alcatel-OT-C825X
Checking data, wait...
advanced flash detection enabled
Action: write NOR flash
"smart write" active
write: Firmware
skip: Customization/Language Pack
skip: Customization
skip: Eeprom/ffs
Boot ...
Press and HOLD Power button now !
19200 fixed
Connecting, wait...
Initializing [6219:8B03:8B02]...
CPU: MT6219
detected CPU: MT6226MA
chip: 0031:05DE:A000
boot packet size: 0400
Release Power button now !
Boot Done
Initialize ...
detecting chip #00 in region #00...
flash: 01227E223C2200:2AEA0000000000
flash: Amd AMD/Fujitsu std [D 0004x010000 007Ex040000 0004x010000] 32Mb
number of flash chip/regions detected: 01/01
Initialize Done
Set baud ...
921600
Set baud Done
Initialize bootcode ...
Initialize bootcode Done
Check firmware integrity ...
detect device identification#1...
detection phase #1...
detect device identification#1 finished
identification#1 structure: 2nd [enhanced] generation
security area (code #1) is Ok
security area (code #1) backup saved: C:\Program Files\InfinityBox\MModule\backup_security\id.090A82FB.[JRD26_06A_PCB01_GPRS_MT6226M_S02.MAUI_06A_W06_28_MP_V45.BIN_A1FE66CB].rpl
identification#1 detection finished
device-id: 090A82FB
identification#1 protocol ver: 05
ver. sw 1: JRD26_06A_PCB01_GPRS_MT6226M_S02.MAUI_06A_W06_28_MP_V45.BIN
ver. sw 2: MAUI.06A.W06.28.MP.V45, 3499015E
ffs offset/size: 01000000/01000000
detect device identification#2...
detection phase #1...
detect device identification#2 finished
sim-lock status: disabled
Check firmware integrity Done
Check firmware content ...
Check firmware content Done
Backup required data ...
original imei: 35279301038613
Backup required data Done
Patch required data ...
Patch required data Done
Special operation ...
Special operation Done
Write ...
warning: rpl file not found: C:\Program Files\InfinityBox\MModule\id.090A82FB.[JRD26_06A_PCB01_GPRS_MT6226M_S02.MAUI_06A_W06_28_MP_V45.BIN_44DDC84B].rpl
warning: rpl file not found: C:\Program Files\InfinityBox\MModule\id.090A82FB._JRD26_06A_PCB01_GPRS_MT6226M_S02.MAUI_06A_W06_28_MP_V45.BIN_44DDC84B_.rpl
warning: rpl file not found: C:\Program Files\InfinityBox\MModule\backup_security\id.090A82FB.[JRD26_06A_PCB01_GPRS_MT6226M_S02.MAUI_06A_W06_28_MP_V45.BIN_44DDC84B].rpl
warning: rpl file not found: C:\Program Files\InfinityBox\MModule\backup_security\id.090A82FB._JRD26_06A_PCB01_GPRS_MT6226M_S02.MAUI_06A_W06_28_MP_V45.BIN_44DDC84B_.rpl
====================
warning: unknown identification#1 structure: JRD26_06A_PCB01_GPRS_MT6226M_S02.MAUI_06A_W06_28_MP_V45.BIN_44DDC84B
error: Unknown firmware, user action required:
1. download latest software from support area and try again !
2. if no still luck follow the next procedure:
- find good working phone with the same firmware:
JRD26_06A_PCB01_GPRS_MT6226M_S02.MAUI_06A_W06_28_MP_V45.BIN
- make "Read detailed information" operation
- send "system_log_..." file to support: mt62xx@gmail.com
- make "Read full flash" operation
- send flash backup file(s) to support: mt62xx@gmail.com
- include in your e-mail full text from phone back label (phone name etc.)
- be little bit patient and wait update
====================
You can flash phone now but can't finalize it.
In most cases phone can NOT power-on normally.
Do you want to write flash anyway ?
file saved: C:\Program Files\InfinityBox\MModule\backup_security\system_log_090A82FB_JRD26_06A_PCB01_GPRS_MT6226M_S02.MAUI_06A_W06_28_MP_V45.BIN_A1FE66CB_20090226-005644.B0X.bin
Area: Firmware
flash: 01227E223C2200:2AEA0000000000
Write: Firmware
detect device identification#2...
detection phase #1...
detect device identification#2 finished
security area (code #3, part #2) calculation...
customization: CB27BM5D
done
flash: 01227E223C2200:2AEA0000000000
flash: 01227E223C2200:2AEA0000000000
Write: security area (code #3, part #2)
security area (code #3, part #2) calculation done
security area (code #3, part #1) calculation...
..................done
flash: 01227E223C2200:2AEA0000000000
flash: 01227E223C2200:2AEA0000000000
Write: security area (code #3, part #1)
security area (code #3, part #1) calculation done
Write Done
Finalization ...
Finalization Done
file saved: C:\Program Files\InfinityBox\MModule\backup_security\system_log_090A82FB_JRD26_06A_PCB01_GPRS_MT6226M_S02.MAUI_06A_W06_28_MP_V45.BIN_A1FE66CB_20090226-010550.B0X.bin
Finished, time used: 584 sec
Remove/Install battery now !

sony ericson v800 succes unlock_ cid36 red convert to cid29 brown


Sharp V703SHF
dead revive
System diagnostics passed.
Version 13.20 ready!

[ --- Attach to Phone --- ]
Connecting via Fighter USB Cable...
Powering on the phone...
Baseband chip ID: 0x7100
Protocol version: 3.1
Baudrate = 460800Bd
Booting via ROM...
Sharp 3G phone detected.
Phone CID: 24
Phone color: Brown
Flash certificate: A1_SHARP_AS_CUSTOMER
Trying Brown CID24 flash applet...
Sending applet prologue...
Sending applet body...
Time spent entering bootstrap: 1s
Initializing phone hardware...
Applet ID: 040420 1330 LLECXC1325413_CERTLOADE...
Flash manufacturer: Sharp
Flash ID: 0xB00B
OTP Security Level: 0 (Developer)
OTP CID: 24
Defeating RSA protection...
Defeated!
Sending applet...
Applet ID: 060202 0210 CRUCXC1325712_PRODUCTIO...
Analyzing configuration...
Reading primary certificate...
Primary certificate CID: 24
Primary certificate color: Brown
Secondary certificate not found.
GDFS configuration found.
OSE configuration found.
TestProgram configuration not found.

Analysing GDFS...
Done.
Phone hardware initialized OK
[ --- Flash Main Firmware --- ]
Flash file: "Sharp_V703SHF_Japan_v1.001.flp"
Waiting for flash file to load...
Reading phone RSA certificate...
Preparing to program flash...
Baudrate = 921600Bd
Analysing flash file...
Replacing primary certificate...
Programming flash...
Primary certificate has been overwritten.
Time: 00:09:27
Preparing to program flash...
Analysing flash file...
Programming flash...
Time: 00:04:04
Flash process done.
No comments:
Post a Comment