Принесли K800 купили б/у решили сделать общий сброс. После сброса пропала сеть, только экстренные. Почитав форум, сделал следующее залил gdfs от K800, залил .backup.
Выбирал только для K8001. подсоединяешь дку60 и жмешь Identfy (будет у тебя бекап)
2. заливаешь в .bin через misc GDFS от K790-того.
3. в misc выбираешь файл бекапа .seczone (шить через 2+5).
4. прошить как К790 , в сетингаг complite, use server
Но сети все равно нет.
v0.914031/UNI
CARD SERIAL: 000
Loaded 51 flash descriptors
SIGNED MODE (USING SERVER).
ChipID:9900,EMP protocol:0301
PHONE IS RED RETAIL PRODUCT
FLASH CID detected:52
Speed:921600
Flash ID check:897E
Flash props sent ok
OTP LOCKED:1 CID:49 PAF:1 IMEI:35342701941099 CERT:RED
FLASH CID:52 COLOR:RED
Model:K800i
Brand:Generic
MAPP CXC article: R8BF003 prgCXC1250210_GENERIC_WI
MAPP CXC version: R8BF003
Language Package:C_ASIA
CDA article: CDA12345678/123
CDA version: R2A
Default article: cxc1250490
Default version: R8BF003
PROVIDER: 000-00
SIMLOCKS NOT DETECTED
RESTORATION FILE NOT PRESENT
"R8BF003_CXC1250210_GENERIC_WI"
YOU MUST PERFORM FULL FLASHING
WHEN "ALTERNATIVE SECURITY BYPASS" ENABLED
BYPASS PACKAGE PRESENT FOR DETECTED FIRMWARE
SECURITY UNITS BACKUP CREATED.
Elapsed: 7 secs.
SIGNED MODE (USING SERVER).
Will backup GDFS now.
ChipID:9900,EMP protocol:0301
PHONE IS RED RETAIL PRODUCT
FLASH CID detected:52
Speed:921600
OTP LOCKED:1 CID:49 PAF:1 IMEI:35342701941099 CERT:RED
FLASH CID:52 COLOR:RED
PATCH:061205 1523 HANCXC9876543210_DB2020_MEM_PATCHER_R2A006 0
LDR:061201 1314 HANCXC1329129_DB2020_FLASHLOADER_R2A005
Flash ID check:897E
Flash props sent ok
LDR:070904 1245 AN2CXC1250562_DB2020_CSLOADER_R3A013
loader startup: executed
loader GDFS startup: executed
loader unlock: executed
stated number of vars:1308
Found:696 variables
Found:612 variables
GDFS read all done, GDFS_35342701941099.BIN written
Phone detached
Elapsed: 38 secs.
POSSIBLE GDFS FILE DETECTED, EXTRACTING PHONEBOOK
PHONEBOOK NOT DETECTED IN GDFS FILE
SIGNED MODE (USING SERVER).
Will write GDFS now.
ChipID:9900,EMP protocol:0301
PHONE IS RED RETAIL PRODUCT
FLASH CID detected:52
Speed:921600
OTP LOCKED:1 CID:49 PAF:1 IMEI:35342701941099 CERT:RED
FLASH CID:52 COLOR:RED
PATCH:061205 1523 HANCXC9876543210_DB2020_MEM_PATCHER_R2A006 0
LDR:061201 1314 HANCXC1329129_DB2020_FLASHLOADER_R2A005
Flash ID check:897E
Flash props sent ok
LDR:070904 1245 AN2CXC1250562_DB2020_CSLOADER_R3A013
loader startup: executed
loader GDFS startup: executed
loader unlock: executed
will write 1267 variables
done
Phone detached
Elapsed: 51 secs.
SIGNED MODE (USING SERVER).
Processing script "H:\Program Files\se\v0.914029\backup\35342701941099\35342701941099_17_05_2008_10_46_14.backup"...
ChipID:9900,EMP protocol:0301
BOOTROM MODE DETECTED
Speed:921600
OTP LOCKED:1 CID:49 PAF:1 IMEI:35342701941099 CERT:N/A
FLASH CID:52 COLOR:RED
PATCH:061205 1523 HANCXC9876543210_DB2020_MEM_PATCHER_R2A006 0
LDR:061201 1314 HANCXC1329129_DB2020_FLASHLOADER_R2A005
Flash ID check:897E
Flash props sent ok
LDR:070904 1245 AN2CXC1250562_DB2020_CSLOADER_R3A013
loader startup: executed
loader GDFS startup: executed
loader filesystem startup: executed
loader unlock: executed
Writing GDFS var 0000:0006 len:01AA
Success
Writing GDFS var 0000:000E len:006A
Success
Writing GDFS var 0000:001C len:001C
Success
Writing GDFS var 0001:0851 len:040E
Success
Writing GDFS var 0000:0013 len:0124
Success
Writing GDFS var 0000:0018 len:0001
Success
Writing GDFS var 0000:00AA len:000A
Success
Phone detached
Elapsed: 64 secs.
SIGNED MODE (USING SERVER).
ChipID:9900,EMP protocol:0301
PHONE IS RED RETAIL PRODUCT
FLASH CID detected:52
Speed:921600
OTP LOCKED:1 CID:49 PAF:1 IMEI:35342701941099 CERT:RED
FLASH CID:52 COLOR:RED
PATCH:061205 1523 HANCXC9876543210_DB2020_MEM_PATCHER_R2A006 0
LDR:061201 1314 HANCXC1329129_DB2020_FLASHLOADER_R2A005
Flash ID check:897E
Flash props sent ok
writing E:\Software_3\setool\K800\cid52\R8BF003_1250210_GENERIC_WI.ssw
CURRENT FLASH FILE CID:52
SSW uses complete hash, hash len is:9200
Will flash 460 blocks...
SSW loading returns:0
writing E:\Software_3\setool\K800\cid52\R8BF003_FS_C_ASIA_WI_RED_CID52.ssw
CURRENT FLASH FILE CID:52
SSW uses complete hash, hash len is:4660
Will flash 233 blocks...
SSW loading returns:0
LDR:070904 1245 AN2CXC1250562_DB2020_CSLOADER_R3A013
loader startup: executed
loader GDFS startup: executed
loader filesystem startup: executed
loader unlock: executed
writing tpa/preset/custom/C3_PCA_G3v2.cer
writing tpa/preset/custom/CONTENT_DOWNLOAD_HOOK_2.itm
writing tpa/preset/custom/customize.xml
writing tpa/preset/custom/DESKTOP_HOOK_2.itm
writing tpa/preset/custom/Entrust.net Root Certificate.cer
writing tpa/preset/custom/Entrust.net_WTLS_Root_Certificate.wcrt
writing tpa/preset/custom/FM_PICTURES_HOOK_3.itm
writing tpa/preset/custom/FM_SOUNDS_HOOK_3.itm
writing tpa/preset/custom/FM_THEMES_HOOK_3.itm
writing tpa/preset/custom/FM_VIDEOS_HOOK_3.itm
writing tpa/preset/custom/GAMES_HOOK_3.itm
writing tpa/preset/custom/GTE_CyberTrust_Root.cer
writing tpa/preset/custom/GTE_Cybe_Trust_Root_WTLS.wcrt
writing tpa/preset/custom/Root.cer
writing tpa/preset/custom/SEMC_E2E_Root_CA.crt
writing tpa/preset/custom/SETT_RINGTONE_HOOK_3.itm
writing tpa/preset/custom/ThawtePremium.der
writing tpa/preset/custom/ThawteServerCA.cer
writing tpa/preset/custom/Utiroot.cer
writing tpa/preset/custom/VeriSignClass3Root.cer
writing tpa/preset/custom/Verisign_Class_3_CA_WTLS.wcrt
Phone detached
Elapsed: 454 secs.