nokia 1661 flesh problem with mxkey Dear all plz Using device: UFS_USB V2.8 (c) SarasSoft 2007. Library version: 1.0.0.8336(03-05-2010), 1.0.0.12955(03-05-2010) ASIC ID: 0x2293 [UPPCosto ver: 2.0] SecondaryBoot: u3_2nd.fia [DCT4] version: 4.76.0 revision: 0.7 size: 0x9A8 Supported Ids: 3040, 2292, 2293, 3162, 3166, 3168 FlashID0: 00EC 2254 [Samsung ] page size: 64 K type: NOR area: 01000000-01FFFFFF FlashID1: 0000 0001 [unused/removed] ExtBUSC: AD7E B61A 2310 0340 C605 E401 20A2 6514 Algorithm: u3_amd.fia [DCT4 ALGORITHM] version: 4.76.0 revision: 0.7 size: 0x78C0 Supported Ids: 3040, 2292, 2293, 3162, 3166, 3168 Performing Flash Authentication ...OK UEM ID: 00E99884:DA3BDA66 ASIC type: 11 UEM Imei: 35799603135426 Flash Imei: 35799603135426 RPL saved to "C:\mobileEx\3.4\data\backup\RPL\35799603135426_BA CK.rpl" Processing file: rh122_004.300 as MCU [DCT4,DCT4 ALGORITHM] size: 2.38 MB Supported Ids: 2293 ASIC ID: 0x2293 [UPPCosto ver: 2.0] SecondaryBoot: u3_2nd.fia [DCT4] version: 4.76.0 revision: 0.7 size: 0x9A8 Supported Ids: 3040, 2292, 2293, 3162, 3166, 3168 FlashID0: 00EC 2254 [Samsung ] page size: 64 K type: NOR area: 01000000-01FFFFFF FlashID1: 0000 0001 [unused/removed] ExtBUSC: AD7E B61A 2310 0340 C605 E401 20A2 6514 Algorithm: u3_amd.fia [DCT4 ALGORITHM] version: 4.76.0 revision: 0.7 size: 0x78C0 Supported Ids: 3040, 2292, 2293, 3162, 3166, 3168 Performing Flash Authentication ...OK UEM ID: 00E99884:2984DA60 Area [01000000-0100FFFF] erased in 0.000 s Area [01010000-0179FFFF] erased in 0.031 s Area [017A0000-017EFFFF] erased in 0.031 s Area [01F00000-01FDFFFF] erased in 0.016 s Flash programming ... Programming completed in 0.110 s File Processed in 9.766 s Processing file: rh1220_nai04.30ej as CNT [DCT4,DCT4 ALGORITHM] size: 175.91 KB Supported Ids: 2293 ASIC ID: 0x2293 [UPPCosto ver: 2.0] SecondaryBoot: u3_2nd.fia [DCT4] version: 4.76.0 revision: 0.7 size: 0x9A8 Supported Ids: 3040, 2292, 2293, 3162, 3166, 3168 FlashID0: 00EC 2254 [Samsung ] page size: 64 K type: NOR area: 01000000-01FFFFFF FlashID1: 0000 0001 [unused/removed] ExtBUSC: AD7E B61A 2310 0340 C605 E401 20A2 6514 Algorithm: u3_amd.fia [DCT4 ALGORITHM] version: 4.76.0 revision: 0.7 size: 0x78C0 Supported Ids: 3040, 2292, 2293, 3162, 3166, 3168 Performing Flash Authentication ...OK UEM ID: 00E99884:2984DA60 Area [01750000-0178FFFF] erased in 0.047 s Flash programming ... Programming completed in 0.047 s Content extract fail, continue anyway ... File Processed in 52.562 s Processing file: rh122_004.30ej as PPM [DCT4,DCT4 ALGORITHM] size: 2.72 MB Supported Ids: 2293 ASIC ID: 0x2293 [UPPCosto ver: 2.0] SecondaryBoot: u3_2nd.fia [DCT4] version: 4.76.0 revision: 0.7 size: 0x9A8 Supported Ids: 3040, 2292, 2293, 3162, 3166, 3168 FlashID0: 00EC 2254 [Samsung ] page size: 64 K type: NOR area: 01000000-01FFFFFF FlashID1: 0000 0001 [unused/removed] ExtBUSC: AD7E B61A 2310 0340 C605 E401 20A2 6514 Algorithm: u3_amd.fia [DCT4 ALGORITHM] version: 4.76.0 revision: 0.7 size: 0x78C0 Supported Ids: 3040, 2292, 2293, 3162, 3166, 3168 Performing Flash Authentication ...OK UEM ID: 00E99884:2984DA60 Area [01250000-0125FFFF] erased in 0.000 s Area [01260000-0174FFFF] erased in 0.062 s Flash programming ... Programming completed in 0.172 s File Processed in 12.125 s Flashing completed in 2 min 5.844 s Phone Emulation passed, image file succesfully verified. Phone not responding ! Total time to process is 2 min 51.063 s |
All times are GMT +1. The time now is 17:03. |
vBulletin Optimisation provided by
vB Optimise (Pro) -
vBulletin Mods & Addons Copyright © 2024 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2023 -