Ishxan
25.11.2007, 11:10
ChipID:9900,EMP protocol:0301
Speed:921600
OTP LOCKED:1 CID:51 PAF:1 IMEI:35665701117280 CERT:N/A
FLASH CID:52 COLOR:RED
phone CID not supported in that mode
Elapsed:2 secs.
SERVER SUPPORT ENABLED.
Will backup GDFS now.
ChipID:9900,EMP protocol:0301
Speed:921600
OTP LOCKED:1 CID:51 PAF:1 IMEI:35665701117280 CERT:N/A
FLASH CID:52 COLOR:RED
PATCH:061205 1523 HANCXC9876543210_DB2020_MEM_PATCHER_R2A006 0
LDR:061201 1314 HANCXC1329129_DB2020_FLASHLOADER_R2A005
Flash ID check:2019
Flash props sent ok
Switching to USB...
Phone stays at current interface.
CSloader version:
070410 1557 HANCXC1250562_DB2020_CSLOADER_R3A009
loader startup: executed
loader GDFS startup: executed
loader unlock: executed
stated number of vars:1323
Found:846 variables
Found:404 variables
Found:73 variables
GDFS read all done, GDFS_35665701117280.BIN written
Phone detached
Elapsed:43 secs.
POSSIBLE GDFS FILE DETECTED, EXTRACTING PHONEBOOK
DONE EXTRACTING.
SERVER SUPPORT ENABLED.
ChipID:9900,EMP protocol:0301
Speed:921600
OTP LOCKED:1 CID:51 PAF:1 IMEI:35665701117280 CERT:N/A
FLASH CID:52 COLOR:RED
PATCH:061205 1523 HANCXC9876543210_DB2020_MEM_PATCHER_R2A006 0
LDR:061201 1314 HANCXC1329129_DB2020_FLASHLOADER_R2A005
Flash ID check:2019
Flash props sent ok
Switching to USB...
Phone stays at current interface.
writing D:\Phone\Product\SONY ERICSSON\K550\R1JD001_1250669_GENERIC_LI.ssw
CURRENT FLASH FILE CID:52
SSW uses complete hash, hash len is:9200
Will flash 460 blocks...
SSW loading returns:0
writing D:\Phone\Product\SONY ERICSSON\K550\R1JD001_FS_RUSSIA_LI_RED_CID52.ssw
CURRENT FLASH FILE CID:52
SSW uses complete hash, hash len is:3140
Will flash 157 blocks...
SSW loading returns:0
CSloader version:
070410 1557 HANCXC1250562_DB2020_CSLOADER_R3A009
loader startup: executed
loader filesystem startup: executed
loader GDFS startup: executed
loader unlock: executed
resetting usercode..
USERCODE RESET TO "0000"
writing tpa/preset/custom/C3_PCA_G3v2.cer
writing tpa/preset/custom/CONTENT_DOWNLOAD_HOOK_2.itm
writing tpa/preset/custom/customize.xml
writing tpa/preset/custom/DESKTOP_HOOK_2.itm
writing tpa/preset/custom/Entrust.net Root Certificate.cer
writing tpa/preset/custom/Entrust.net_WTLS_Root_Certificate.wcrt
writing tpa/preset/custom/FM_PICTURES_HOOK_3.itm
writing tpa/preset/custom/FM_SOUNDS_HOOK_3.itm
writing tpa/preset/custom/FM_THEMES_HOOK_3.itm
writing tpa/preset/custom/FM_VIDEOS_HOOK_3.itm
writing tpa/preset/custom/GAMES_HOOK_3.itm
writing tpa/preset/custom/GTE_CyberTrust_Root.cer
writing tpa/preset/custom/GTE_Cybe_Trust_Root_WTLS.wcrt
writing tpa/preset/custom/Root.cer
writing tpa/preset/custom/SEMC_E2E_Root_CA.crt
writing tpa/preset/custom/SETT_RINGTONE_HOOK_3.itm
writing tpa/preset/custom/ThawtePremium.der
writing tpa/preset/custom/ThawteServerCA.cer
writing tpa/preset/custom/Utiroot.cer
writing tpa/preset/custom/VeriSignClass3Root.cer
writing tpa/preset/custom/Verisign_Class_3_CA_WTLS.wcrt
Processing script...
Will execute script now.
Phone detached
Elapsed:819 secs.
Speed:921600
OTP LOCKED:1 CID:51 PAF:1 IMEI:35665701117280 CERT:N/A
FLASH CID:52 COLOR:RED
phone CID not supported in that mode
Elapsed:2 secs.
SERVER SUPPORT ENABLED.
Will backup GDFS now.
ChipID:9900,EMP protocol:0301
Speed:921600
OTP LOCKED:1 CID:51 PAF:1 IMEI:35665701117280 CERT:N/A
FLASH CID:52 COLOR:RED
PATCH:061205 1523 HANCXC9876543210_DB2020_MEM_PATCHER_R2A006 0
LDR:061201 1314 HANCXC1329129_DB2020_FLASHLOADER_R2A005
Flash ID check:2019
Flash props sent ok
Switching to USB...
Phone stays at current interface.
CSloader version:
070410 1557 HANCXC1250562_DB2020_CSLOADER_R3A009
loader startup: executed
loader GDFS startup: executed
loader unlock: executed
stated number of vars:1323
Found:846 variables
Found:404 variables
Found:73 variables
GDFS read all done, GDFS_35665701117280.BIN written
Phone detached
Elapsed:43 secs.
POSSIBLE GDFS FILE DETECTED, EXTRACTING PHONEBOOK
DONE EXTRACTING.
SERVER SUPPORT ENABLED.
ChipID:9900,EMP protocol:0301
Speed:921600
OTP LOCKED:1 CID:51 PAF:1 IMEI:35665701117280 CERT:N/A
FLASH CID:52 COLOR:RED
PATCH:061205 1523 HANCXC9876543210_DB2020_MEM_PATCHER_R2A006 0
LDR:061201 1314 HANCXC1329129_DB2020_FLASHLOADER_R2A005
Flash ID check:2019
Flash props sent ok
Switching to USB...
Phone stays at current interface.
writing D:\Phone\Product\SONY ERICSSON\K550\R1JD001_1250669_GENERIC_LI.ssw
CURRENT FLASH FILE CID:52
SSW uses complete hash, hash len is:9200
Will flash 460 blocks...
SSW loading returns:0
writing D:\Phone\Product\SONY ERICSSON\K550\R1JD001_FS_RUSSIA_LI_RED_CID52.ssw
CURRENT FLASH FILE CID:52
SSW uses complete hash, hash len is:3140
Will flash 157 blocks...
SSW loading returns:0
CSloader version:
070410 1557 HANCXC1250562_DB2020_CSLOADER_R3A009
loader startup: executed
loader filesystem startup: executed
loader GDFS startup: executed
loader unlock: executed
resetting usercode..
USERCODE RESET TO "0000"
writing tpa/preset/custom/C3_PCA_G3v2.cer
writing tpa/preset/custom/CONTENT_DOWNLOAD_HOOK_2.itm
writing tpa/preset/custom/customize.xml
writing tpa/preset/custom/DESKTOP_HOOK_2.itm
writing tpa/preset/custom/Entrust.net Root Certificate.cer
writing tpa/preset/custom/Entrust.net_WTLS_Root_Certificate.wcrt
writing tpa/preset/custom/FM_PICTURES_HOOK_3.itm
writing tpa/preset/custom/FM_SOUNDS_HOOK_3.itm
writing tpa/preset/custom/FM_THEMES_HOOK_3.itm
writing tpa/preset/custom/FM_VIDEOS_HOOK_3.itm
writing tpa/preset/custom/GAMES_HOOK_3.itm
writing tpa/preset/custom/GTE_CyberTrust_Root.cer
writing tpa/preset/custom/GTE_Cybe_Trust_Root_WTLS.wcrt
writing tpa/preset/custom/Root.cer
writing tpa/preset/custom/SEMC_E2E_Root_CA.crt
writing tpa/preset/custom/SETT_RINGTONE_HOOK_3.itm
writing tpa/preset/custom/ThawtePremium.der
writing tpa/preset/custom/ThawteServerCA.cer
writing tpa/preset/custom/Utiroot.cer
writing tpa/preset/custom/VeriSignClass3Root.cer
writing tpa/preset/custom/Verisign_Class_3_CA_WTLS.wcrt
Processing script...
Will execute script now.
Phone detached
Elapsed:819 secs.