RUNNING v 1.1203/01.10/UNI
CARD SERIAL 00178465
USBFLASH DRIVER VERSION 02.02.00.05
SIGNED MODE (USING SERVER)
ALTERNATIVE SECURITY BYPASS ENABLED
CFG:110000110000
ChipID:9900,EMP protocol:0301
PHONE STATE: "RETAIL"
FLASH CID: 0049
Speed:921600
LDR:071130 1150 NPACXC1250330_DB2020_PRODUCTIONIDLOADER_P3M
FLASH ID: 2019
OTP LOCKED:1 CID:49 PAF:1 IMEI:35170701709746 CERT:RED
ACTIVE CID:49 COLOR:RED
Model (from GDFS):K800i
Brand:Generic
MAPP CXC article: 2007-12-13 16:25 CXC1722434_TEMS
MAPP CXC version: R2B
Language Package: TEMS
CDA article: CDA12345678/123
CDA version: R2A
Default article: cxc1722435
Default version: R2B
PROVIDER: 000-00
SIMLOCKS NOT DETECTED
RESTORATION FILE NOT PRESENT
"2007-12-13_07-12-13 16:25 CXC1722434_TEMS"
YOU MUST PERFORM FULL FLASHING
WHEN "ALTERNATIVE SECURITY BYPASS" ENABLED
BYPASS PACKAGE NOT PRESENT
"2007-12-13_07-12-13 16:25 CXC1722434_TEMS.zip"
YOU MUST FLASH SUPPORTED FIRMWARE
TO USE "ALTERNATIVE SECURITY BYPASS"
SECURITY UNITS BACKUP CREATED.
Elapsed: 10 secs.
SIGNED MODE (USING SERVER)
CFG:101000000000
RESET MODE STARTED
ChipID:9900,EMP protocol:0301
PHONE STATE: "RETAIL"
FLASH CID: 0049
PLEASE CONNECT PHONE IN "BOOTROM" MODE
Elapsed: 6 secs.
SIGNED MODE (USING SERVER)
CFG:101000000000
RESET MODE STARTED
ChipID:9900,EMP protocol:0301
PHONE STATE: "RETAIL"
FLASH CID: 0049
PLEASE CONNECT PHONE IN "BOOTROM" MODE
Elapsed: 5 secs.
SIGNED MODE (USING SERVER)
CFG:101000000000
RESET MODE STARTED
ChipID:9900,EMP protocol:0301
BOOTROM MODE DETECTED
Speed:921600
RESET:070703 1106 NPACXC1250329_DB2020_CERTRESETLOADER_P3AA
FLASH ID: 2019
GOT SEED:828A9C732180DB5D152047AD
P96 AUTH PASSED
OTP LOCKED:1 CID:49 PAF:1 IMEI:35170701709746
PHONE SUCCESSFULLY RESET TO DEVELOPER STATE
Elapsed: 16 secs.
SIGNED MODE (USING SERVER)
CFG:101000000000
ChipID:9900,EMP protocol:0301
BOOTROM MODE DETECTED
Speed:921600
LDR:071130 1150 NPACXC1250330_DB2020_PRODUCTIONIDLOADER_P3M
OTP LOCKED:1 CID:49 PAF:1 IMEI:35170701709746
ACTIVE CID:49 COLOR:BROWN
LDR

B2020 SERVICE LOADER FOR SETOOL2
FLASH ID: 2019
writing "C:\SETOOL\gdfs_in_ssw_format\db2020\K800_GDFS_SSW .ssw"
CURRENT FLASH FILE CID: 49
SSW uses full hash, hash len is: 640
Will flash 32 blocks ...
Setting up GDFS ...
OTP WRITE NOT EXECUTED
WRITING CLEAR SIMLOCK UNITS ...
SIGNING ...
Elapsed: 53 secs.
SIGNED MODE (USING SERVER)
CFG:101000000000
ChipID:9900,EMP protocol:0301
BOOTROM MODE DETECTED
Speed:921600
LDR:071130 1150 NPACXC1250330_DB2020_PRODUCTIONIDLOADER_P3M
OTP LOCKED:1 CID:49 PAF:1 IMEI:35170701709746
ACTIVE CID:49 COLOR:BROWN
LDR

B2020 SERVICE LOADER FOR SETOOL2
FLASH ID: 2019
writing "C:\SETOOL\eroms\db2020\DB2020EROM_CNV_RED49_BROWN _CID49_DB2020.ssw"
CURRENT FLASH FILE CID: 49
SSW uses full hash, hash len is: 80
Will flash 4 blocks ...
Setting up GDFS ...
OTP WRITE NOT EXECUTED
WRITING CLEAR SIMLOCK UNITS ...
SIGNING ...
Elapsed: 16 secs.
SIGNED MODE (USING SERVER)
ALTERNATIVE SECURITY BYPASS ENABLED
CFG:110000110000
ChipID:9900,EMP protocol:0301
PHONE STATE: "RETAIL"
FLASH CID: 0049
Speed:921600
LDR:071130 1150 NPACXC1250330_DB2020_PRODUCTIONIDLOADER_P3M
FLASH ID: 2019
OTP LOCKED:1 CID:49 PAF:1 IMEI:35170701709746 CERT:RED
ACTIVE CID:49 COLOR:RED
Model (from GDFS):K800i
Brand:Generic
MAPP CXC article: 2007-12-13 16:25 CXC1722434_TEMS
MAPP CXC version: R2B
Language Package: TEMS
CDA article: CDA12345678/123
CDA version: R2A
Default article: cxc1722435
Default version: R2B
PROVIDER: 000-00
SIMLOCKS NOT DETECTED
RESTORATION FILE NOT PRESENT
"2007-12-13_07-12-13 16:25 CXC1722434_TEMS"
YOU MUST PERFORM FULL FLASHING
WHEN "ALTERNATIVE SECURITY BYPASS" ENABLED
BYPASS PACKAGE NOT PRESENT
"2007-12-13_07-12-13 16:25 CXC1722434_TEMS.zip"
YOU MUST FLASH SUPPORTED FIRMWARE
TO USE "ALTERNATIVE SECURITY BYPASS"
SECURITY UNITS BACKUP CREATED.
Elapsed: 7 secs.
SIGNED MODE (USING SERVER)
ALTERNATIVE SECURITY BYPASS ENABLED
CFG:111000000000
ChipID:9900,EMP protocol:0301
BOOTROM MODE DETECTED
Speed:921600
LDR:071130 1150 NPACXC1250330_DB2020_PRODUCTIONIDLOADER_P3M
OTP LOCKED:1 CID:49 PAF:1 IMEI:35170701709746
ACTIVE CID:49 COLOR:RED
LDR:061205 1523 HANCXC9876543210_DB2020_MEM_PATCHER_R2A006 0
LDR:080108 1810 ESGCXC1329129_DB2020_FLASHLOADER_R2A015
FLASH ID: 2019
LDR:070904 1245 AN2CXC1250562_DB2020_CSLOADER_R3A013
loader GDFS startup executed
loader FILESYSTEM startup executed
BYPASS PACKAGE ABSENT FOR THAT FIRMWARE.
"2007-12-13_07-12-13 16:25 CXC1722434_TEMS"
Elapsed: 27 secs.
SIGNED MODE (USING SERVER)
CFG:101000000000
ChipID:9900,EMP protocol:0301
BOOTROM MODE DETECTED
Speed:921600
LDR:071130 1150 NPACXC1250330_DB2020_PRODUCTIONIDLOADER_P3M
OTP LOCKED:1 CID:49 PAF:1 IMEI:35170701709746
ACTIVE CID:49 COLOR:RED
LDR:061205 1523 HANCXC9876543210_DB2020_MEM_PATCHER_R2A006 0
LDR:080108 1810 ESGCXC1329129_DB2020_FLASHLOADER_R2A015
FLASH ID: 2019
writing "C:\k800\K800_R1CB001_MAIN_GENERIC_WI_RED49.mb n"
CURRENT FLASH FILE CID: 49
SSW uses full hash, hash len is: 9100
Will flash 455 blocks ...
writing "C:\k800\K800_R1CB001_FS_RUSSIA_RED49.fbn"
CURRENT FLASH FILE CID: 49
SSW uses full hash, hash len is: 4100
Will flash 205 blocks ...
LDR:070904 1245 AN2CXC1250562_DB2020_CSLOADER_R3A013
loader GDFS startup executed
loader FILESYSTEM startup executed
using GENERIC phone customization
tpa/preset/custom/C3_PCA_G3v2.cer
tpa/preset/custom/CONTENT_DOWNLOAD_HOOK_2.itm
tpa/preset/custom/customize.xml
tpa/preset/custom/DESKTOP_HOOK_2.itm
tpa/preset/custom/Entrust.net Root Certificate.cer
tpa/preset/custom/Entrust.net_WTLS_Root_Certificate.wcrt
tpa/preset/custom/FM_PICTURES_HOOK_3.itm
tpa/preset/custom/FM_SOUNDS_HOOK_3.itm
tpa/preset/custom/FM_THEMES_HOOK_3.itm
tpa/preset/custom/FM_VIDEOS_HOOK_3.itm
tpa/preset/custom/GAMES_HOOK_3.itm
tpa/preset/custom/GTE_CyberTrust_Root.cer
tpa/preset/custom/GTE_Cybe_Trust_Root_WTLS.wcrt
tpa/preset/custom/Root.cer
tpa/preset/custom/SEMC_E2E_Root_CA.crt
tpa/preset/custom/SETT_RINGTONE_HOOK_3.itm
tpa/preset/custom/ThawtePremium.der
tpa/preset/custom/ThawteServerCA.cer
tpa/preset/custom/Utiroot.cer
tpa/preset/custom/VeriSignClass3Root.cer
tpa/preset/custom/Verisign_Class_3_CA_WTLS.wcrt
Phone detached
Elapsed: 364 secs.