6
6587946
游客
本人第一次发的教程帖不足多多包涵
v0.914014/UNI
Card serial:000*****
Loaded 51 flash descriptors
ChipID:9900,EMP protocol:0301
PHONE IS RED RETAIL PRODUCT
FLASH CID detected:52
Speed:921600
Flash ID check:897E
Flash props sent ok
OTP LOCKED:1 CID:51 PAF:1 IMEI:35908701595416 CERT:RED
FLASH CID:52 COLOR:RED
Model:K800i
MAPP CXC article: R1JC002 prgCXC1250211_[backcolor=#FF0000]VODAFONE_WI[/backcolor]
MAPP CXC version: R1JC002
Language Package:VFE_LIVE_3
CDA article: CDA102295/1
CDA version: R2A
Default article: cxc1250490
Default version: R1JC002
Network LOCKED
Operator: 272-01
RESTORATION FILE PRESENT FOR DETECTED FIRMWARE
SECURITY UNITS BACKUP CREATED.
Elapsed:5 secs.
SERVER SUPPORT ENABLED.
ChipID:9900,EMP protocol:0301
PHONE IS RED RETAIL PRODUCT
FLASH CID detected:52
Speed:921600
OTP LOCKED:1 CID:51 PAF:1 IMEI:35908701595416 CERT:RED
FLASH CID:52 COLOR:RED
PATCH:061205 1523 HANCXC9876543210_DB2020_MEM_PATCHER_R2A006 0
LDR:061201 1314 HANCXC1329129_DB2020_FLASHLOADER_R2A005
Flash ID check:897E
Flash props sent ok
[backcolor=#FF0000]writing D:\setool3\SE\k800\R1KG001-CID52\R1KG001_1250214_CHINA_WI.ssw[/backcolor]
CURRENT FLASH FILE CID:52
SSW uses complete hash, hash len is:9200
Will flash 460 blocks...
SSW loading returns:0
[backcolor=#FF0000]writing D:\setool3\SE\k800\R1KG001-CID52\R1KG001_APAC_fs.ssw[/backcolor]
CURRENT FLASH FILE CID:52
SSW uses complete hash, hash len is:4980
Will flash 249 blocks...
SSW loading returns:0
loader startup: executed
loader GDFS startup: executed
loader filesystem startup: executed
loader unlock: executed
writing tpa/preset/custom/C3_PCA_G3v2.cer
writing tpa/preset/custom/CONTENT_DOWNLOAD_HOOK_2.itm
writing tpa/preset/custom/customize.xml
writing tpa/preset/custom/DESKTOP_HOOK_2.itm
writing tpa/preset/custom/Entrust.net Root Certificate.cer
writing tpa/preset/custom/Entrust.net_WTLS_Root_Certificate.wcrt
writing tpa/preset/custom/FM_PICTURES_HOOK_3.itm
writing tpa/preset/custom/FM_SOUNDS_HOOK_3.itm
writing tpa/preset/custom/FM_THEMES_HOOK_3.itm
writing tpa/preset/custom/FM_VIDEOS_HOOK_3.itm
writing tpa/preset/custom/GAMES_HOOK_3.itm
writing tpa/preset/custom/GTE_CyberTrust_Root.cer
writing tpa/preset/custom/GTE_Cybe_Trust_Root_WTLS.wcrt
writing tpa/preset/custom/Root.cer
writing tpa/preset/custom/SEMC_E2E_Root_CA.crt
writing tpa/preset/custom/SETT_RINGTONE_HOOK_3.itm
writing tpa/preset/custom/ThawtePremium.der
writing tpa/preset/custom/ThawteServerCA.cer
writing tpa/preset/custom/Utiroot.cer
writing tpa/preset/custom/VeriSignClass3Root.cer
writing tpa/preset/custom/Verisign_Class_3_CA_WTLS.wcrt
Phone detached
Elapsed:420 secs.
SERVER SUPPORT ENABLED.
ALTERNATIVE SECURITY BYPASS ENABLED.
ChipID:9900,EMP protocol:0301
PHONE IS RED RETAIL PRODUCT
FLASH CID detected:52
Speed:921600
OTP LOCKED:1 CID:51 PAF:1 IMEI:35908701595416 CERT:RED
FLASH CID:52 COLOR:RED
PATCH:061205 1523 HANCXC9876543210_DB2020_MEM_PATCHER_R2A006 0
LDR:061201 1314 HANCXC1329129_DB2020_FLASHLOADER_R2A005
Flash ID check:897E
Flash props sent ok
[backcolor=#FF0000]CID52 BYPASS PROCEDURE STARTED
Processing part1...
Processing part2...
Processing part3....[/backcolor]
OTP LOCKED:1 CID:51 PAF:1 IMEI:35908701595416 CERT:RED
FLASH CID:52 COLOR:RED
PATCH:061205 1523 HANCXC9876543210_DB2020_MEM_PATCHER_R2A006 0
LDR:061201 1314 HANCXC1329129_DB2020_FLASHLOADER_R2A005
Flash ID check:897E
Flash props sent ok
[backcolor=#FF0000]REMOVE CABLE FROM PHONE
REMOVE BATTERY FROM PHONE, THEN INSERT IT BACK
HOLD "C" BUTTON AND ATTACH AGAIN[/backcolor]
CID52 BYPASS PROCEDURE FINISHED
ChipID:9900,EMP protocol:0301
PHONE IS RED RETAIL PRODUCT
FLASH CID detected:52
Speed:921600
Trying to launch embedded bootloader...
Embedded flashloader:
DB2020_PRELOADER_FOR_SETOOL2
Flash ID check:897E
Flash props sent ok
[backcolor=#FF0000]writing D:\setool3\SE\k800\R1KG001-CID52\R1KG001_1250214_CHINA_WI.ssw[/backcolor]
CURRENT FLASH FILE CID:52
SSW uses complete hash, hash len is:9200
Will flash 460 blocks...
SSW loading returns:0
full sig complete.
[backcolor=#FF0000]USERCODE RESET TO "0000"
Searching...
Firmware lock check determined.
Elapsed:590 secs. 因为是补丁解锁所以下次刷机还会出现网锁的请注意,下面是教程.[/backcolor]
v0.914014/UNI
Card serial:000*****
Loaded 51 flash descriptors
ChipID:9900,EMP protocol:0301
PHONE IS RED RETAIL PRODUCT
FLASH CID detected:52
Speed:921600
Flash ID check:897E
Flash props sent ok
OTP LOCKED:1 CID:51 PAF:1 IMEI:35908701595416 CERT:RED
FLASH CID:52 COLOR:RED
Model:K800i
MAPP CXC article: R1JC002 prgCXC1250211_[backcolor=#FF0000]VODAFONE_WI[/backcolor]
MAPP CXC version: R1JC002
Language Package:VFE_LIVE_3
CDA article: CDA102295/1
CDA version: R2A
Default article: cxc1250490
Default version: R1JC002
Network LOCKED
Operator: 272-01
RESTORATION FILE PRESENT FOR DETECTED FIRMWARE
SECURITY UNITS BACKUP CREATED.
Elapsed:5 secs.
SERVER SUPPORT ENABLED.
ChipID:9900,EMP protocol:0301
PHONE IS RED RETAIL PRODUCT
FLASH CID detected:52
Speed:921600
OTP LOCKED:1 CID:51 PAF:1 IMEI:35908701595416 CERT:RED
FLASH CID:52 COLOR:RED
PATCH:061205 1523 HANCXC9876543210_DB2020_MEM_PATCHER_R2A006 0
LDR:061201 1314 HANCXC1329129_DB2020_FLASHLOADER_R2A005
Flash ID check:897E
Flash props sent ok
[backcolor=#FF0000]writing D:\setool3\SE\k800\R1KG001-CID52\R1KG001_1250214_CHINA_WI.ssw[/backcolor]
CURRENT FLASH FILE CID:52
SSW uses complete hash, hash len is:9200
Will flash 460 blocks...
SSW loading returns:0
[backcolor=#FF0000]writing D:\setool3\SE\k800\R1KG001-CID52\R1KG001_APAC_fs.ssw[/backcolor]
CURRENT FLASH FILE CID:52
SSW uses complete hash, hash len is:4980
Will flash 249 blocks...
SSW loading returns:0
loader startup: executed
loader GDFS startup: executed
loader filesystem startup: executed
loader unlock: executed
writing tpa/preset/custom/C3_PCA_G3v2.cer
writing tpa/preset/custom/CONTENT_DOWNLOAD_HOOK_2.itm
writing tpa/preset/custom/customize.xml
writing tpa/preset/custom/DESKTOP_HOOK_2.itm
writing tpa/preset/custom/Entrust.net Root Certificate.cer
writing tpa/preset/custom/Entrust.net_WTLS_Root_Certificate.wcrt
writing tpa/preset/custom/FM_PICTURES_HOOK_3.itm
writing tpa/preset/custom/FM_SOUNDS_HOOK_3.itm
writing tpa/preset/custom/FM_THEMES_HOOK_3.itm
writing tpa/preset/custom/FM_VIDEOS_HOOK_3.itm
writing tpa/preset/custom/GAMES_HOOK_3.itm
writing tpa/preset/custom/GTE_CyberTrust_Root.cer
writing tpa/preset/custom/GTE_Cybe_Trust_Root_WTLS.wcrt
writing tpa/preset/custom/Root.cer
writing tpa/preset/custom/SEMC_E2E_Root_CA.crt
writing tpa/preset/custom/SETT_RINGTONE_HOOK_3.itm
writing tpa/preset/custom/ThawtePremium.der
writing tpa/preset/custom/ThawteServerCA.cer
writing tpa/preset/custom/Utiroot.cer
writing tpa/preset/custom/VeriSignClass3Root.cer
writing tpa/preset/custom/Verisign_Class_3_CA_WTLS.wcrt
Phone detached
Elapsed:420 secs.
SERVER SUPPORT ENABLED.
ALTERNATIVE SECURITY BYPASS ENABLED.
ChipID:9900,EMP protocol:0301
PHONE IS RED RETAIL PRODUCT
FLASH CID detected:52
Speed:921600
OTP LOCKED:1 CID:51 PAF:1 IMEI:35908701595416 CERT:RED
FLASH CID:52 COLOR:RED
PATCH:061205 1523 HANCXC9876543210_DB2020_MEM_PATCHER_R2A006 0
LDR:061201 1314 HANCXC1329129_DB2020_FLASHLOADER_R2A005
Flash ID check:897E
Flash props sent ok
[backcolor=#FF0000]CID52 BYPASS PROCEDURE STARTED
Processing part1...
Processing part2...
Processing part3....[/backcolor]
OTP LOCKED:1 CID:51 PAF:1 IMEI:35908701595416 CERT:RED
FLASH CID:52 COLOR:RED
PATCH:061205 1523 HANCXC9876543210_DB2020_MEM_PATCHER_R2A006 0
LDR:061201 1314 HANCXC1329129_DB2020_FLASHLOADER_R2A005
Flash ID check:897E
Flash props sent ok
[backcolor=#FF0000]REMOVE CABLE FROM PHONE
REMOVE BATTERY FROM PHONE, THEN INSERT IT BACK
HOLD "C" BUTTON AND ATTACH AGAIN[/backcolor]
CID52 BYPASS PROCEDURE FINISHED
ChipID:9900,EMP protocol:0301
PHONE IS RED RETAIL PRODUCT
FLASH CID detected:52
Speed:921600
Trying to launch embedded bootloader...
Embedded flashloader:
DB2020_PRELOADER_FOR_SETOOL2
Flash ID check:897E
Flash props sent ok
[backcolor=#FF0000]writing D:\setool3\SE\k800\R1KG001-CID52\R1KG001_1250214_CHINA_WI.ssw[/backcolor]
CURRENT FLASH FILE CID:52
SSW uses complete hash, hash len is:9200
Will flash 460 blocks...
SSW loading returns:0
full sig complete.
[backcolor=#FF0000]USERCODE RESET TO "0000"
Searching...
Firmware lock check determined.
Elapsed:590 secs. 因为是补丁解锁所以下次刷机还会出现网锁的请注意,下面是教程.[/backcolor]
附件
-
1 MB 查看: 0
-
1 MB 查看: 0
-
1 MB 查看: 0
-
1 MB 查看: 0
-
1 MB 查看: 0
-
1 MB 查看: 0
-
1 MB 查看: 0
-
1 MB 查看: 0
-
1 MB 查看: 0
-
1 MB 查看: 0
-
204 KB 查看: 0