why cant download firmware in hti suite
via Welcome to gsm-tips http://ift.tt/1jS0fd4
Number of Image Files: 4 (Mass Memory File Detected) Processing Image File : rm902_11.1.1.mcusw.fpsx CMT Type : XG223 CMT Algorithm : XG223_V0 ALG Secondary Sending Speed : 650000Hz Algorithm Sending Speed : 6500000Hz Program Sending Speed : 6500000Hz Message Reading Speed : 98000Hz Number of Blocks : 80 Entry Point: 0x293D Page Format : -1 MAX PAGE : 0x00080000 Processing Image File : rm902_11.1.1_059R6B7_m2.rofs.fpsx CMT Type : XG223 CMT Algorithm : XG223_V0 ALG Secondary Sending Speed : 650000Hz Algorithm Sending Speed : 6500000Hz Program Sending Speed : 6500000Hz Message Reading Speed : 98000Hz Number of Blocks : 15 Entry Point: 0x00B5 Page Format : -1 MAX PAGE : 0x00080000 Processing Image File : rm902_11.1.1_059R6B7_m2.image.fpsx CMT Type : XG223 CMT Algorithm : XG223_V0 ALG Secondary Sending Speed : 650000Hz Algorithm Sending Speed : 6500000Hz Program Sending Speed : 6500000Hz Message Reading Speed : 98000Hz Number of Blocks : 57 Entry Point: 0x00B8 Page Format : -1 MAX PAGE : 0x00080000 Processing Image File : rm902_11.1.1_059R6B7_m2_SD_4GB.fpsimage.fpsx CMT Type : XG223 CMT Algorithm : XG223_V0 ALG Secondary Sending Speed : 650000Hz Algorithm Sending Speed : 6500000Hz Program Sending Speed : 6500000Hz Message Reading Speed : 98000Hz Number of Blocks : 35 Entry Point: 0x00BA Page Format : -1 MAX PAGE : 0x00080000 AUTO SELECTED DEAD USB FLASHING... If Phone Booting does not Start in 5 Seconds, Then Perform Steps 1, 2, 3 and 4... 1. Remove USB and Battery... 2. Insert USB. 3. Insert Battery. (Some phones boot automatically) 4. Please Power on phone shortly... AdvanceFBox SendBootCodeEx InitialiseBootstrap_DCT5 DIR BootFlashMode_DCT5 READING BOOTROM BootFlashModeDCT5Ex Succeeded First Time SYSTEM_ID_RESPONSE_BB5 (0xC0) - 82 (0x52) bytes returned Number of Sub Blocks 5 (0x05) 1 SYSTEM_ASIC_ID 01 Block Length : 21 (15) BB ASIC Index : 0 (00) CMT ID DWORD 0 : 00000C20 ID DWORD 1 : 16100040 ID DWORD 2 : 498A2409 ID DWORD 3 : 9214E4DC ID DWORD 4 : 02E42E00 2 PUBLIC_ID 12 Block Length : 21 (15) BB ASIC Index : 0 (00) CMT ID DWORD 0 : 23542EFB ID DWORD 1 : EE6D73AC ID DWORD 2 : 498A2409 ID DWORD 3 : 9214E4DC ID DWORD 4 : 02E42E00 3 ASIC_MODE_ID 13 Block Length : 2 (02) BB ASIC Index : 0 (00) CMT Mode Id : 00 4 ROOT_KEY_HASH 14 Block Length : 17 (11) BB ASIC Index : 0 (00) CMT Hash : 12 5F C7 26 05 B5 C4 E4 8A 9E 02 25 08 4D 25 79 5 ROM_ID 15 Block Length : 9 (09) BB ASIC Index : 0 (00) CMT CRC 0 : 53588225 CRC 1 : 2F54C676 CMT Secondary Loader: C:\AdvanceBox Turbo Flasher\Nokia\BB5_Loader\New\XG223_v11_usb2nd.fg Secondary Loader Sent.... CMT Algorithm Loader: C:\AdvanceBox Turbo Flasher\Nokia\BB5_Loader\New\XG223_v11_usbalg.fg Algorithm Loader Sent.... FUR_Control_AddClient_BB5() ASIC_INDEX_CMT (Ready) FUR control Ok START READING RPL DATA IMEI: 358364055118945 Reading : NPC... OK! Reading : CCC... OK! Reading : HWC... OK! Reading : R&D... OK! NPC CERTIFICATE INFORMATION (CMT): IMEI 1 : 358364055118945 IMEI 2 : 358364055118952 PRODUCT CODE : 059R6B7 WLAN ID : DC:3E:F8:52:8D:2F BLUETOOTH ID : 88:44:F6:96:CA:83 PUBLIC_ID : 23542EFBEE6D73AC498A24099214E4DC02E42E00 PAPUB_KEYS_HASH: 7E4AA99553DB48A5F2DD39E02FA1B862ECB0EF5E CCC CERTIFICATE INFORMATION (CMT): PRODUCT CODE : 059R6B7 HWC CERTIFICATE INFORMATION (CMT): PUBLIC_ID : 23542EFBEE6D73AC498A24099214E4DC02E42E00 PRODUCT CODE : 059R6B7 RPL Backup was Successful... Plain RPL saved to: C:\AdvanceBox Turbo Flasher\Nokia\Backup\358364055118945\3583640551189 45_164223.rpl PA PUBLIC KEY Request PhoneInfoRequest_BB5 (Asic Index 00 ) PHONE_INFO_RESPONSE_BB5 PAPUB_KEYS_HASH_RESP_BB5 2A BB Asic Index : 00 CMT PAPUBKEYS HASH: 7E4AA99553DB48A5F2DD39E02FA1B862ECB0EF5E Reading : ISA-USER... OK! PPM HASH : f8c29201d7b32946b965474e9a5012be9c2dc37e PPM VERSION: 10.0.2 ================================================== ==== PHONE FIRMWARE VERSION: 10.0.2 ================================================== ==== ImagePath: C:\Program Files\Nokia\Phoenix\Products\RM-902\ ImageFilename: rm902_11.1.1.mcusw.fpsx Read Type : FIASCO_BB5_DO_NOT_READ_CERTIFICATE (01) Sending STORE_CERTIFICATE_REQUEST_BB5 (CMT 00 only) Certificate 1 Name : NPC ASIC Index : CMT 0 Certificate 2 Name : CCC ASIC Index : CMT 0 Certificate 3 Name : HWC ASIC Index : CMT 0 Certificate 4 Name : R&D ASIC Index : CMT 0 STORE_CERTIFICATE_REQUEST_BB5 : 61 04 2B 0D 4E 50 43 00 00 00 00 00 00 00 00 00 00 2B 0D 43 43 43 00 00 00 00 00 00 00 00 00 00 2B 0D 48 57 43 00 00 00 00 00 00 00 00 00 00 2B 0D 52 26 44 00 00 00 00 00 00 00 00 00 00 D3 STORE_CERTIFICATE_REQUEST_BB5 : No Error - 0 (0x00) StartErase_DCT5... BlockLength : 0x26 (38) ERASE Blocks : 0x01 (1) 0 ERASE_AREA_BB5 0x12 Block Length : 0x23 (35) BB ASIC Index : 0x00 CMT Device Type : 0x00 NOR Device Index : 0x00 0 : 40000000-4003FFFF 1 : 47E00000-47E3FFFF 2 : 40060000-426FFFFF 3 : 47E40000-47F1FFFF ERASE_REQUEST_BB5 : 5004120B000000400000004003FFFF120B00000047E0000047 E3FFFF120B00000040060000426FFFFF120B00000047E40000 47F1FFFF61 Successfully Erased... Total blocks to write : 80 >> CMT Rootkey Hash CERT : ISSW >> CMT Rootkey Hash CERT : MEMSET >> CMT Rootkey Hash CERT : PRIMAPP >> CMT Rootkey Hash CERT : LOADER >> CMT Rootkey Hash CERT : PASUBTOC >> CMT Rootkey Hash CERT : PAPUBKEYS [7E4AA99553DB48A5F2DD39E02FA1B862ECB0EF5E] >> CMT Rootkey Hash CERT : UPDAPP >> CMT Rootkey Hash CERT : MCUSW ImagePath: C:\Program Files\Nokia\Phoenix\Products\RM-902\ ImageFilename: rm902_11.1.1_059R6B7_m2.rofs.fpsx StartErase_DCT5... BlockLength : 0x0E (14) ERASE Blocks : 0x01 (1) 0 ERASE_AREA_BB5 0x12 Block Length : 0x0B (11) BB ASIC Index : 0x00 CMT Device Type : 0x00 NOR Device Index : 0x00 0 : 42700000-437FFFFF ERASE_REQUEST_BB5 : 5001120B00000042700000437FFFFF6F Successfully Erased... Total blocks to write : 15 >> CMT Rootkey Hash CERT : PPM ImagePath: C:\Program Files\Nokia\Phoenix\Products\RM-902\ ImageFilename: rm902_11.1.1_059R6B7_m2.image.fpsx StartErase_DCT5... BlockLength : 0x0E (14) ERASE Blocks : 0x01 (1) 0 ERASE_AREA_BB5 0x12 Block Length : 0x0B (11) BB ASIC Index : 0x00 CMT Device Type : 0x00 NOR Device Index : 0x00 0 : 43800000-47DFFFFF ERASE_REQUEST_BB5 : 5001120B0000004380000047DFFFFFFA Successfully Erased... Total blocks to write : 57 ImagePath: C:\Program Files\Nokia\Phoenix\Products\RM-902\ ImageFilename: rm902_11.1.1_059R6B7_m2_SD_4GB.fpsimage.fpsx Total blocks to write : 35 ContinueFlash_DCT5 Complete Continue Flash Complete : : No Error - 0 (0x00) FlashInfo.RestartMode : Test Mode Flashing Done... Total Flashing Time (Erase + Flashing) : 00:00:41 (Booting time is NOT Included) Waiting for Phone to Start-Up..(Max 150 seconds) Operation Cancelled... |
Start Samsung I9300 READ INFO at 10:01:18 a.m. Please power on phone and connect to usb in android debug mode! If phone ask to allow usb debuging please accept! Searching for phone: OK Reading info: OK Checking root: OK (ROOTED) BRAND: SAMSUNG MODEL: GT-I9300 / M0 HWID: SMDK4X12-12 BOOT LOADER: I9300UBEMA2 VERSION: ANDROID 4.1.2 BUILD JZO54K I9300UBEMA2 / I9300ZTAEMB1 (PDA/CSC) FIRMWARE: M0UB-USER KERNEL: 3.0.31-789635 (gcc 4.4.3) CPU TYPE: EXYNOS4 / ARMv7 End Samsung I9300 READ INFO at 10:01:56 a.m. |
Start Samsung I9300 UNLOCK at 10:11:54 a.m. Please power on phone and connect to usb in android debug mode! If phone ask to allow usb debuging please accept! Searching for phone: OK Reading info: OK Checking root: OK (ROOTED) BRAND: SAMSUNG MODEL: GT-I9300 / M0 HWID: SMDK4X12-12 BOOT LOADER: I9300UBEMA2 VERSION: ANDROID 4.1.2 BUILD JZO54K I9300UBEMA2 / I9300ZTAEMB1 (PDA/CSC) FIRMWARE: M0UB-USER KERNEL: 3.0.31-789635 (gcc 4.4.3) CPU TYPE: EXYNOS4 / ARMv7 Reading data: OK Backups\SAMSUNG\I9300\I9300__SIMLOCK_2014_03_31_10 _13_03.hxcf Saving backup: OK Searching simlock block: OK Writing data: OK Restarting phone: OK End Samsung I9300 UNLOCK at 10:13:57 a.m. |
Start Chinese All Tablets READ INFO at 10:02:37 a.m. Please power on phone and connect to usb in android debug mode! If phone ask to allow usb debuging please accept! Searching for phone: OK Reading info: OK Checking root: OK (ROOTED) BRAND: TPD MODEL: XPD8 / NUCLEAR-OCOCCI HWID: SUN5I-41275 VERSION: ANDROID 4.2.2 BUILD JDQ39 FIRMWARE: NUCLEAR_OCOCCI-ENG KERNEL: 3.0.8+ (gcc 4.5.1) CPU TYPE: EXDROID / ARMv7 CARD ID: 02544D53413034471321BEE6B900DB27 End Chinese All Tablets READ INFO at 10:02:46 a.m. |
Start BlackBerry 8520 REPAIR IMEI at 09:40:14 a.m. Searching for phone: OK Switching to OS MODE: ERROR (IGNORED) NEW IMEI: 000000000000000 Searching for phone: OK Switching to BOOTROM MODE: OK Get BOOTROM info: OK BOOTROM: 5.6.0.20 METRICS: 6.9 HWID: 0x8C000F03 RIM BlackBerry Device Sending loader: OK Run loader: OK Reading flash id: OK Flash (NAND) ID: EC:44:0:0 Flash geometry: 2020 sectors 40:800 Reading data: OK C:\Users\Wz\Downloads\HXCMagma_V1.0.0.5_BETA_PRO_R ELEASE\BACKUPS\BLACKBERRY\8520_SECURITY_BKP_2014_0 3_30_09_40_27.hxcf Saving data: OK End BlackBerry 8520 REPAIR IMEI at 09:40:28 a.m. |