Advertisement
Guest User

Untitled

a guest
May 20th, 2017
106
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 86.17 KB | None | 0 0
  1. xflasher loader.sin 0 0 0FCE ADDE 0 0 >xflasher.log & if %ERRORLEVEL% neq 0 ( exit %ERRORLEVEL% )
  2.  
  3. :::flash sin files
  4. xflasher partition.sin 0 0 0FCE ADDE 0 0 >>xflasher.log & if %ERRORLEVEL% neq 0 ( exit %ERRORLEVEL% )
  5. xflasher amss_fsg.sin 0 0 0FCE ADDE 0 0 >>xflasher.log & if %ERRORLEVEL% neq 0 ( exit %ERRORLEVEL% )
  6. xflasher amss_fs_1.sin 0 0 0FCE ADDE 0 0 >>xflasher.log & if %ERRORLEVEL% neq 0 ( exit %ERRORLEVEL% )
  7. xflasher amss_fs_2.sin 0 0 0FCE ADDE 0 0 >>xflasher.log & if %ERRORLEVEL% neq 0 ( exit %ERRORLEVEL% )
  8. xflasher apps_log.sin 0 0 0FCE ADDE 0 0 >>xflasher.log & if %ERRORLEVEL% neq 0 ( exit %ERRORLEVEL% )
  9. xflasher cache.sin 0 0 0FCE ADDE 0 0 >>xflasher.log & if %ERRORLEVEL% neq 0 ( exit %ERRORLEVEL% )
  10. xflasher diag.sin 0 0 0FCE ADDE 0 0 >>xflasher.log & if %ERRORLEVEL% neq 0 ( exit %ERRORLEVEL% )
  11. xflasher elabel.sin 0 0 0FCE ADDE 0 0 >>xflasher.log & if %ERRORLEVEL% neq 0 ( exit %ERRORLEVEL% )
  12. :::xflasher fotakernel.sin 0 0 0FCE ADDE 0 0 >>xflasher.log & if %ERRORLEVEL% neq 0 ( exit %ERRORLEVEL% )
  13. :::xflasher kernel.sin 0 0 0FCE ADDE 0 0 >>xflasher.log & if %ERRORLEVEL% neq 0 ( exit %ERRORLEVEL% )
  14. xflasher modem.sin 0 0 0FCE ADDE 0 0 >>xflasher.log & if %ERRORLEVEL% neq 0 ( exit %ERRORLEVEL% )
  15. xflasher oem.sin 0 0 0FCE ADDE 0 0 >>xflasher.log & if %ERRORLEVEL% neq 0 ( exit %ERRORLEVEL% )
  16. xflasher persist.sin 0 0 0FCE ADDE 0 0 >>xflasher.log & if %ERRORLEVEL% neq 0 ( exit %ERRORLEVEL% )
  17. xflasher ramdump.sin 0 0 0FCE ADDE 0 0 >>xflasher.log & if %ERRORLEVEL% neq 0 ( exit %ERRORLEVEL% )
  18. xflasher ssd.sin 0 0 0FCE ADDE 0 0 >>xflasher.log & if %ERRORLEVEL% neq 0 ( exit %ERRORLEVEL% )
  19. :::xflasher system.sin 0 0 0FCE ADDE 0 0 >>xflasher.log & if %ERRORLEVEL% neq 0 ( exit %ERRORLEVEL% )
  20. :::xflasher userdata.sin 0 0 0FCE ADDE 0 0 >>xflasher.log & if %ERRORLEVEL% neq 0 ( exit %ERRORLEVEL% )
  21.  
  22. :::flash ta files
  23. xflasher 0 0 0 0FCE ADDE 0 auto-boot.ta >>xflasher.log & if %ERRORLEVEL% neq 0 ( exit %ERRORLEVEL% )
  24. xflasher 0 0 0 0FCE ADDE 0 cust-reset.ta >>xflasher.log & if %ERRORLEVEL% neq 0 ( exit %ERRORLEVEL% )
  25. xflasher 0 0 0 0FCE ADDE 0 fota-reset.ta >>xflasher.log & if %ERRORLEVEL% neq 0 ( exit %ERRORLEVEL% )
  26. xflasher 0 0 0 0FCE ADDE 0 master-reset.ta >>xflasher.log & if %ERRORLEVEL% neq 0 ( exit %ERRORLEVEL% )
  27. xflasher 0 0 0 0FCE ADDE 0 osv-restriction.ta >>xflasher.log & if %ERRORLEVEL% neq 0 ( exit %ERRORLEVEL% )
  28. xflasher 0 0 0 0FCE ADDE 0 reset-non-secure-adb.ta >>xflasher.log & if %ERRORLEVEL% neq 0 ( exit %ERRORLEVEL% )
  29.  
  30. :::flash boot delivery
  31. xflasher 0 0 0 0FCE ADDE 1 0 >>xflasher.log & if %ERRORLEVEL% neq 0 ( exit %ERRORLEVEL% )
  32.  
  33. -------------------------------------------------------
  34. Xperia Command Line Flasher
  35.  
  36. by Munjeni @ 2014-2017
  37. -------------------------------------------------------
  38. Device path: \\?\usb#vid_0fce&pid_adde#5&3879604a&0&5#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  39. Class Description: Universal Serial Bus controllers
  40. Device Instance Id: USB\VID_0FCE&PID_ADDE\5&3879604A&0&5
  41.  
  42. Successfully read 0xd bytes from handle.
  43. Raw input [0xD]:
  44.  
  45. 00000000 00 00 00 01 00 00 00 01 00 00 04 41 4C ...........AL
  46.  
  47. Successfully read 0x441 bytes from handle.
  48. Raw input [0x441]:
  49.  
  50. 00000000 50 52 4F 54 5F 56 45 52 3D 22 30 34 22 3B 56 45 PROT_VER="04";VE
  51. 00000010 52 3D 22 53 31 5F 42 6F 6F 74 5F 4D 53 4D 38 39 R="S1_Boot_MSM89
  52. 00000020 39 34 5F 4C 41 31 2E 32 2E 32 5F 34 32 42 22 3B 94_LA1.2.2_42B";
  53. 00000030 53 31 53 42 4C 5F 56 45 52 3D 22 4D 53 4D 38 39 S1SBL_VER="MSM89
  54. 00000040 39 34 5F 35 30 22 3B 49 44 3D 22 31 32 38 39 2D 94_50";ID="1289-
  55. 00000050 35 36 32 30 22 3B 54 59 50 45 3D 22 53 31 5F 42 5620";TYPE="S1_B
  56. 00000060 4F 4F 54 22 3B 41 43 54 49 56 45 5F 43 4F 4D 50 OOT";ACTIVE_COMP
  57. 00000070 5F 41 49 44 3D 22 30 30 30 34 22 3B 4D 41 58 5F _AID="0004";MAX_
  58. 00000080 50 4B 54 5F 53 5A 3D 22 30 30 30 38 30 30 30 30 PKT_SZ="00080000
  59. 00000090 22 3B 49 47 4E 4F 52 45 5F 43 52 43 3D 22 48 44 ";IGNORE_CRC="HD
  60. 000000A0 52 2C 44 41 54 41 22 3B 44 45 46 5F 53 45 43 3D R,DATA";DEF_SEC=
  61. 000000B0 22 4F 4E 22 3B 48 57 43 4F 4E 46 5F 41 49 44 3D "ON";HWCONF_AID=
  62. 000000C0 22 30 30 30 34 22 3B 4C 4F 41 44 45 52 5F 41 49 "0004";LOADER_AI
  63. 000000D0 44 3D 22 30 30 30 34 22 3B 42 4F 4F 54 5F 41 49 D="0004";BOOT_AI
  64. 000000E0 44 3D 22 30 30 30 34 22 3B 4E 4F 5F 53 55 42 5F D="0004";NO_SUB_
  65. 000000F0 53 59 53 54 45 4D 53 3D 22 30 30 30 31 22 3B 4F SYSTEMS="0001";O
  66. 00000100 54 50 5F 44 41 54 41 5F 31 3D 22 30 31 30 30 30 TP_DATA_1="01000
  67. 00000110 34 30 30 22 3B 4F 54 50 5F 4C 4F 43 4B 5F 53 54 400";OTP_LOCK_ST
  68. 00000120 41 54 55 53 5F 31 3D 22 4C 4F 43 4B 45 44 22 3B ATUS_1="LOCKED";
  69. 00000130 55 4E 49 51 55 45 5F 44 45 56 5F 49 44 5F 31 3D UNIQUE_DEV_ID_1=
  70. 00000140 22 30 32 43 45 32 43 45 41 22 3B 49 44 43 4F 44 "02CE2CEA";IDCOD
  71. 00000150 45 5F 31 3D 22 31 30 39 34 30 30 45 31 22 3B 53 E_1="109400E1";S
  72. 00000160 55 49 44 5F 31 3D 22 30 31 30 30 30 30 30 30 45 UID_1="01000000E
  73. 00000170 31 30 30 39 34 31 30 45 41 32 43 43 45 30 32 30 1009410EA2CCE020
  74. 00000180 30 30 30 30 30 30 30 22 3B 53 31 5F 52 4F 4F 54 0000000";S1_ROOT
  75. 00000190 3D 22 53 31 5F 52 6F 6F 74 5F 66 39 33 36 2C 53 ="S1_Root_f936,S
  76. 000001A0 31 5F 52 6F 6F 74 5F 54 65 73 74 5F 62 33 31 36 1_Root_Test_b316
  77. 000001B0 22 3B 4D 53 4E 3D 22 51 56 37 30 31 43 30 47 30 ";MSN="QV701C0G0
  78. 000001C0 33 22 3B 48 57 5F 43 4F 4E 46 49 47 5F 56 45 52 3";HW_CONFIG_VER
  79. 000001D0 3D 22 30 30 30 36 22 3B 48 57 5F 43 4F 4E 46 49 ="0006";HW_CONFI
  80. 000001E0 47 5F 49 4E 46 4F 3D 22 48 57 43 5F 4B 69 74 61 G_INFO="HWC_Kita
  81. 000001F0 6B 61 6D 69 5F 43 6F 6D 5F 30 31 30 22 3B 53 45 kami_Com_010";SE
  82. 00000200 43 5F 53 54 41 54 45 3D 22 48 57 43 5F 4B 69 74 C_STATE="HWC_Kit
  83. 00000210 61 6B 61 6D 69 5F 43 6F 6D 5F 30 31 30 22 3B 49 akami_Com_010";I
  84. 00000220 4D 45 49 3D 22 33 35 36 30 38 36 30 37 30 34 37 MEI="35608607047
  85. 00000230 38 33 33 22 3B 50 52 4F 44 5F 49 44 3D 22 30 30 833";PROD_ID="00
  86. 00000240 30 31 22 3B 47 4C 4F 42 5F 53 45 43 3D 22 30 30 01";GLOB_SEC="00
  87. 00000250 30 30 22 3B 50 48 4F 4E 45 5F 49 44 3D 22 30 30 00";PHONE_ID="00
  88. 00000260 30 30 3A 33 35 36 30 38 36 30 37 30 34 37 38 33 00:3560860704783
  89. 00000270 33 22 3B 48 57 5F 43 4F 4E 46 49 47 3D 22 53 31 3";HW_CONFIG="S1
  90. 00000280 5F 42 6F 6F 74 3A 30 30 30 34 3A 30 30 31 33 2C _Boot:0004:0013,
  91. 00000290 53 31 5F 4C 6F 61 64 65 72 3A 30 30 30 34 3A 30 S1_Loader:0004:0
  92. 000002A0 30 30 42 2C 53 31 5F 53 57 3A 30 30 30 36 3A 30 00B,S1_SW:0006:0
  93. 000002B0 30 31 33 2C 53 31 5F 43 75 73 74 3A 30 30 30 34 013,S1_Cust:0004
  94. 000002C0 3A 30 30 31 33 2C 53 31 5F 45 4C 61 62 65 6C 3A :0013,S1_ELabel:
  95. 000002D0 30 30 30 34 3A 30 30 31 33 2C 53 31 5F 53 4C 3A 0004:0013,S1_SL:
  96. 000002E0 30 30 30 34 3A 30 30 34 33 2C 53 31 5F 4D 6F 64 0004:0043,S1_Mod
  97. 000002F0 65 6D 53 57 3A 30 30 30 36 3A 30 30 31 33 2C 53 emSW:0006:0013,S
  98. 00000300 31 5F 46 4F 54 41 3A 30 30 30 36 3A 30 30 32 33 1_FOTA:0006:0023
  99. 00000310 2C 53 31 5F 52 49 43 3A 30 30 30 36 3A 30 31 32 ,S1_RIC:0006:012
  100. 00000320 33 2C 53 31 5F 48 65 78 61 67 6F 6E 53 57 33 3A 3,S1_HexagonSW3:
  101. 00000330 30 30 30 36 3A 30 30 32 33 2C 53 31 5F 52 49 56 0006:0023,S1_RIV
  102. 00000340 41 33 3A 30 30 30 36 3A 30 30 32 33 2C 53 31 5F A3:0006:0023,S1_
  103. 00000350 56 69 64 65 6F 33 3A 30 30 30 36 3A 30 30 32 33 Video3:0006:0023
  104. 00000360 2C 53 31 5F 45 54 53 3A 30 30 30 36 3A 30 30 31 ,S1_ETS:0006:001
  105. 00000370 33 2C 53 31 5F 52 41 4D 45 54 53 3A 30 30 30 36 3,S1_RAMETS:0006
  106. 00000380 3A 30 30 30 42 2C 53 31 5F 54 5A 45 78 65 63 33 :000B,S1_TZExec3
  107. 00000390 3A 30 30 30 36 3A 30 30 41 33 2C 53 31 5F 52 4C :0006:00A3,S1_RL
  108. 000003A0 6F 63 6B 3A 30 30 30 34 3A 30 32 32 33 2C 53 31 ock:0004:0223,S1
  109. 000003B0 5F 47 43 6F 64 65 73 3A 30 30 30 34 3A 30 34 32 _GCodes:0004:042
  110. 000003C0 33 22 3B 52 4F 4F 54 49 4E 47 5F 53 54 41 54 55 3";ROOTING_STATU
  111. 000003D0 53 3D 22 52 4F 4F 54 45 44 22 3B 50 4C 46 5F 52 S="ROOTED";PLF_R
  112. 000003E0 4F 4F 54 5F 31 3D 22 46 34 32 31 42 31 36 46 46 OOT_1="F421B16FF
  113. 000003F0 44 44 35 32 31 32 34 41 37 31 30 37 43 32 31 35 DD52124A7107C215
  114. 00000400 36 42 36 43 34 37 38 33 35 35 39 39 31 42 43 39 6B6C478355991BC9
  115. 00000410 44 38 38 46 30 46 38 36 38 32 43 44 30 38 46 31 D88F0F8682CD08F1
  116. 00000420 32 37 41 30 46 41 35 22 3B 52 45 4D 4F 54 45 5F 27A0FA5";REMOTE_
  117. 00000430 4C 4F 43 4B 3D 22 55 4E 4C 4F 43 4B 45 44 22 3B LOCK="UNLOCKED";
  118. 00000440 00 .
  119.  
  120. Successfully read 0x4 bytes from handle.
  121. Raw input [0x4]:
  122.  
  123. 00000000 C5 98 18 F0 ....
  124.  
  125. Proccessing loader.sin...
  126. File size: 0x3D4EC
  127. Sin header size: 0x400
  128. Sin data size: 0x3D0EC
  129. Setting max packet size to: 0x80000
  130. Sending command...
  131. Raw command[0xD]:
  132.  
  133. 00000000 00 00 00 05 00 00 00 03 00 00 04 00 09 .............
  134.  
  135. Successfully write 0xd bytes to handle.
  136. Writing sin header with size of 0x400 bytes
  137. Successfully write 0x400 bytes to handle.
  138. Sin header writen.
  139. CRC32[0x4]:
  140.  
  141. 00000000 49 CE 3F 5A I.?Z
  142.  
  143. Writing crc32 for sin header...
  144. Successfully write 0x4 bytes to handle.
  145. Successfully read 0xd bytes from handle.
  146. Raw input [0xD]:
  147.  
  148. 00000000 00 00 00 05 00 00 00 01 00 00 00 00 0B .............
  149.  
  150. Verifying crc32...
  151. success: device replied with 0000000500000001000000000B which mean ok.
  152.  
  153. Successfully read 0x4 bytes from handle.
  154. Raw input [0x4]:
  155.  
  156. 00000000 00 00 00 00 ....
  157.  
  158. Sending command...
  159. Raw command[0xD]:
  160.  
  161. 00000000 00 00 00 06 00 00 00 03 00 03 D0 EC 41 ............A
  162.  
  163. Successfully write 0xd bytes to handle.
  164. Writing chunk part: 1 with size of 0x3d0ec bytes
  165. Successfully write 0x3d0ec bytes to handle.
  166. Chunk part: 1 writen.
  167. CRC32[0x4]:
  168.  
  169. 00000000 9F 2F 58 AC ./X.
  170.  
  171. Writing crc32 for chunk part: 1
  172. Successfully write 0x4 bytes to handle.
  173. WRITING LAST PACKET. SETTING TIMEOUT TO 600000 (ms).
  174. Successfully read 0xd bytes from handle.
  175. Raw input [0xD]:
  176.  
  177. 00000000 00 00 00 06 00 00 00 01 00 00 00 00 0E .............
  178.  
  179. Verifying crc32...
  180. Success: device replied with 0000000600000001000000000E which mean ok.
  181.  
  182. LAST PACKET REAPLY AFTER ms: 94.000000
  183. Successfully read 0x4 bytes from handle.
  184. Raw input [0x4]:
  185.  
  186. 00000000 00 00 00 00 ....
  187.  
  188. Finished.
  189.  
  190.  
  191. loader.sin uploaded sucessfully.
  192.  
  193. Successfully read 0xd bytes from handle.
  194. Raw input [0xD]:
  195.  
  196. 00000000 00 00 00 01 00 00 00 01 00 00 04 BA C5 .............
  197.  
  198. Successfully read 0x4ba bytes from handle.
  199. Raw input [0x4BA]:
  200.  
  201. 00000000 50 52 4F 54 5F 56 45 52 3D 22 30 34 22 3B 56 45 PROT_VER="04";VE
  202. 00000010 52 3D 22 4D 53 4D 38 39 39 34 5F 35 30 22 3B 49 R="MSM8994_50";I
  203. 00000020 44 3D 22 31 32 38 39 2D 35 36 32 33 22 3B 54 59 D="1289-5623";TY
  204. 00000030 50 45 3D 22 53 31 5F 4C 4F 41 44 45 52 22 3B 41 PE="S1_LOADER";A
  205. 00000040 43 54 49 56 45 5F 43 4F 4D 50 5F 41 49 44 3D 22 CTIVE_COMP_AID="
  206. 00000050 30 30 30 34 22 3B 4D 41 58 5F 50 4B 54 5F 53 5A 0004";MAX_PKT_SZ
  207. 00000060 3D 22 30 30 34 30 30 30 30 30 22 3B 49 47 4E 4F ="00400000";IGNO
  208. 00000070 52 45 5F 43 52 43 3D 22 48 44 52 2C 44 41 54 41 RE_CRC="HDR,DATA
  209. 00000080 22 3B 44 45 46 5F 53 45 43 3D 22 4F 4E 22 3B 48 ";DEF_SEC="ON";H
  210. 00000090 57 43 4F 4E 46 5F 41 49 44 3D 22 30 30 30 34 22 WCONF_AID="0004"
  211. 000000A0 3B 4C 4F 41 44 45 52 5F 41 49 44 3D 22 30 30 30 ;LOADER_AID="000
  212. 000000B0 34 22 3B 42 4F 4F 54 5F 41 49 44 3D 22 30 30 30 4";BOOT_AID="000
  213. 000000C0 34 22 3B 4E 4F 5F 53 55 42 5F 53 59 53 54 45 4D 4";NO_SUB_SYSTEM
  214. 000000D0 53 3D 22 30 30 30 31 22 3B 4F 54 50 5F 44 41 54 S="0001";OTP_DAT
  215. 000000E0 41 5F 31 3D 22 30 31 30 30 30 34 30 30 22 3B 4F A_1="01000400";O
  216. 000000F0 54 50 5F 4C 4F 43 4B 5F 53 54 41 54 55 53 5F 31 TP_LOCK_STATUS_1
  217. 00000100 3D 22 4C 4F 43 4B 45 44 22 3B 55 4E 49 51 55 45 ="LOCKED";UNIQUE
  218. 00000110 5F 44 45 56 5F 49 44 5F 31 3D 22 30 32 43 45 32 _DEV_ID_1="02CE2
  219. 00000120 43 45 41 22 3B 49 44 43 4F 44 45 5F 31 3D 22 31 CEA";IDCODE_1="1
  220. 00000130 30 39 34 30 30 45 31 22 3B 53 55 49 44 5F 31 3D 09400E1";SUID_1=
  221. 00000140 22 30 31 30 30 30 30 30 30 45 31 30 30 39 34 31 "01000000E100941
  222. 00000150 30 45 41 32 43 43 45 30 32 30 30 30 30 30 30 30 0EA2CCE020000000
  223. 00000160 30 22 3B 53 31 5F 52 4F 4F 54 3D 22 53 31 5F 52 0";S1_ROOT="S1_R
  224. 00000170 6F 6F 74 5F 66 39 33 36 2C 53 31 5F 52 6F 6F 74 oot_f936,S1_Root
  225. 00000180 5F 54 65 73 74 5F 62 33 31 36 22 3B 48 57 5F 43 _Test_b316";HW_C
  226. 00000190 4F 4E 46 49 47 5F 56 45 52 3D 22 30 30 30 36 22 ONFIG_VER="0006"
  227. 000001A0 3B 48 57 5F 43 4F 4E 46 49 47 5F 49 4E 46 4F 3D ;HW_CONFIG_INFO=
  228. 000001B0 22 48 57 43 5F 4B 69 74 61 6B 61 6D 69 5F 43 6F "HWC_Kitakami_Co
  229. 000001C0 6D 5F 30 31 30 22 3B 53 45 43 5F 53 54 41 54 45 m_010";SEC_STATE
  230. 000001D0 3D 22 48 57 43 5F 4B 69 74 61 6B 61 6D 69 5F 43 ="HWC_Kitakami_C
  231. 000001E0 6F 6D 5F 30 31 30 22 3B 49 4D 45 49 3D 22 33 35 om_010";IMEI="35
  232. 000001F0 36 30 38 36 30 37 30 34 37 38 33 33 22 3B 50 52 608607047833";PR
  233. 00000200 4F 44 5F 49 44 3D 22 30 30 30 31 22 3B 47 4C 4F OD_ID="0001";GLO
  234. 00000210 42 5F 53 45 43 3D 22 30 30 30 30 22 3B 50 48 4F B_SEC="0000";PHO
  235. 00000220 4E 45 5F 49 44 3D 22 30 30 30 30 3A 33 35 36 30 NE_ID="0000:3560
  236. 00000230 38 36 30 37 30 34 37 38 33 33 22 3B 48 57 5F 43 8607047833";HW_C
  237. 00000240 4F 4E 46 49 47 3D 22 53 31 5F 42 6F 6F 74 3A 30 ONFIG="S1_Boot:0
  238. 00000250 30 30 34 3A 30 30 31 33 2C 53 31 5F 4C 6F 61 64 004:0013,S1_Load
  239. 00000260 65 72 3A 30 30 30 34 3A 30 30 30 42 2C 53 31 5F er:0004:000B,S1_
  240. 00000270 53 57 3A 30 30 30 36 3A 30 30 31 33 2C 53 31 5F SW:0006:0013,S1_
  241. 00000280 43 75 73 74 3A 30 30 30 34 3A 30 30 31 33 2C 53 Cust:0004:0013,S
  242. 00000290 31 5F 45 4C 61 62 65 6C 3A 30 30 30 34 3A 30 30 1_ELabel:0004:00
  243. 000002A0 31 33 2C 53 31 5F 53 4C 3A 30 30 30 34 3A 30 30 13,S1_SL:0004:00
  244. 000002B0 34 33 2C 53 31 5F 4D 6F 64 65 6D 53 57 3A 30 30 43,S1_ModemSW:00
  245. 000002C0 30 36 3A 30 30 31 33 2C 53 31 5F 46 4F 54 41 3A 06:0013,S1_FOTA:
  246. 000002D0 30 30 30 36 3A 30 30 32 33 2C 53 31 5F 52 49 43 0006:0023,S1_RIC
  247. 000002E0 3A 30 30 30 36 3A 30 31 32 33 2C 53 31 5F 48 65 :0006:0123,S1_He
  248. 000002F0 78 61 67 6F 6E 53 57 33 3A 30 30 30 36 3A 30 30 xagonSW3:0006:00
  249. 00000300 32 33 2C 53 31 5F 52 49 56 41 33 3A 30 30 30 36 23,S1_RIVA3:0006
  250. 00000310 3A 30 30 32 33 2C 53 31 5F 56 69 64 65 6F 33 3A :0023,S1_Video3:
  251. 00000320 30 30 30 36 3A 30 30 32 33 2C 53 31 5F 45 54 53 0006:0023,S1_ETS
  252. 00000330 3A 30 30 30 36 3A 30 30 31 33 2C 53 31 5F 52 41 :0006:0013,S1_RA
  253. 00000340 4D 45 54 53 3A 30 30 30 36 3A 30 30 30 42 2C 53 METS:0006:000B,S
  254. 00000350 31 5F 54 5A 45 78 65 63 33 3A 30 30 30 36 3A 30 1_TZExec3:0006:0
  255. 00000360 30 41 33 2C 53 31 5F 52 4C 6F 63 6B 3A 30 30 30 0A3,S1_RLock:000
  256. 00000370 34 3A 30 32 32 33 2C 53 31 5F 47 43 6F 64 65 73 4:0223,S1_GCodes
  257. 00000380 3A 30 30 30 34 3A 30 34 32 33 22 3B 41 55 54 48 :0004:0423";AUTH
  258. 00000390 5F 4C 45 56 45 4C 3D 22 4E 4F 4E 45 22 3B 41 55 _LEVEL="NONE";AU
  259. 000003A0 54 48 5F 4D 45 54 3D 22 30 30 30 31 22 3B 4D 45 TH_MET="0001";ME
  260. 000003B0 4D 44 45 56 53 3D 22 30 33 3A 30 30 3A 30 30 39 MDEVS="03:00:009
  261. 000003C0 30 3A 30 31 34 41 3A 30 30 30 35 3A 30 33 41 34 0:014A:0005:03A4
  262. 000003D0 30 30 30 30 3A 30 30 30 30 30 34 30 30 3A 30 30 0000:00000400:00
  263. 000003E0 30 30 30 32 30 30 2C 30 34 3A 30 31 3A 30 30 30 000200,04:01:000
  264. 000003F0 39 3A 34 31 35 30 3A 30 30 31 30 3A 30 31 44 44 9:4150:0010:01DD
  265. 00000400 33 38 30 30 3A 30 30 30 30 30 30 30 31 3A 30 30 3800:00000001:00
  266. 00000410 30 30 30 32 30 30 22 3B 50 4C 46 5F 52 4F 4F 54 000200";PLF_ROOT
  267. 00000420 5F 31 3D 22 46 34 32 31 42 31 36 46 46 44 44 35 _1="F421B16FFDD5
  268. 00000430 32 31 32 34 41 37 31 30 37 43 32 31 35 36 42 36 2124A7107C2156B6
  269. 00000440 43 34 37 38 33 35 35 39 39 31 42 43 39 44 38 38 C478355991BC9D88
  270. 00000450 46 30 46 38 36 38 32 43 44 30 38 46 31 32 37 41 F0F8682CD08F127A
  271. 00000460 30 46 41 35 22 3B 52 41 4D 5F 49 4E 46 4F 3D 22 0FA5";RAM_INFO="
  272. 00000470 30 31 30 33 30 30 30 34 3A 30 31 30 33 30 30 30 01030004:0103000
  273. 00000480 34 3A 30 31 30 33 30 30 30 34 3A 30 31 30 33 30 4:01030004:01030
  274. 00000490 30 30 34 22 3B 43 41 52 44 5F 50 52 45 53 45 4E 004";CARD_PRESEN
  275. 000004A0 54 3D 22 59 45 53 22 3B 43 41 52 44 5F 53 49 5A T="YES";CARD_SIZ
  276. 000004B0 45 3D 22 31 36 47 42 22 3B 00 E="16GB";.
  277.  
  278. Successfully read 0x4 bytes from handle.
  279. Raw input [0x4]:
  280.  
  281. 00000000 DB 95 7B 63 ..{c
  282.  
  283. -------------------------------------------------------
  284. Xperia Command Line Flasher
  285.  
  286. by Munjeni @ 2014-2017
  287. -------------------------------------------------------
  288. Device path: \\?\usb#vid_0fce&pid_adde#5&3879604a&0&5#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  289. Class Description: Universal Serial Bus controllers
  290. Device Instance Id: USB\VID_0FCE&PID_ADDE\5&3879604A&0&5
  291.  
  292. Proccessing partition.sin...
  293. File size: 0x2F20
  294. Sin header size: 0x408
  295. Sin data size: 0x2B18
  296. Setting max packet size to: 0x400000
  297. Sending command...
  298. Raw command[0xD]:
  299.  
  300. 00000000 00 00 00 05 00 00 00 03 00 00 04 08 11 .............
  301.  
  302. Successfully write 0xd bytes to handle.
  303. Writing sin header with size of 0x408 bytes
  304. Successfully write 0x408 bytes to handle.
  305. Sin header writen.
  306. CRC32[0x4]:
  307.  
  308. 00000000 01 F1 FB 3F ...?
  309.  
  310. Writing crc32 for sin header...
  311. Successfully write 0x4 bytes to handle.
  312. Successfully read 0xd bytes from handle.
  313. Raw input [0xD]:
  314.  
  315. 00000000 00 00 00 05 00 00 00 01 00 00 00 00 0B .............
  316.  
  317. Verifying crc32...
  318. success: device replied with 0000000500000001000000000B which mean ok.
  319.  
  320. Successfully read 0x4 bytes from handle.
  321. Raw input [0x4]:
  322.  
  323. 00000000 00 00 00 00 ....
  324.  
  325. Sending command...
  326. Raw command[0xD]:
  327.  
  328. 00000000 00 00 00 06 00 00 00 03 00 00 2B 18 3D ..........+.=
  329.  
  330. Successfully write 0xd bytes to handle.
  331. Writing chunk part: 1 with size of 0x2b18 bytes
  332. Successfully write 0x2b18 bytes to handle.
  333. Chunk part: 1 writen.
  334. CRC32[0x4]:
  335.  
  336. 00000000 1A CD 7C 37 ..|7
  337.  
  338. Writing crc32 for chunk part: 1
  339. Successfully write 0x4 bytes to handle.
  340. WRITING LAST PACKET. SETTING TIMEOUT TO 600000 (ms).
  341. Successfully read 0xd bytes from handle.
  342. Raw input [0xD]:
  343.  
  344. 00000000 00 00 00 06 00 00 00 01 00 00 00 00 0E .............
  345.  
  346. Verifying crc32...
  347. Success: device replied with 0000000600000001000000000E which mean ok.
  348.  
  349. LAST PACKET REAPLY AFTER ms: 0.000000
  350. Successfully read 0x4 bytes from handle.
  351. Raw input [0x4]:
  352.  
  353. 00000000 00 00 00 00 ....
  354.  
  355. Finished.
  356.  
  357.  
  358. partition.sin uploaded sucessfully.
  359.  
  360. -------------------------------------------------------
  361. Xperia Command Line Flasher
  362.  
  363. by Munjeni @ 2014-2017
  364. -------------------------------------------------------
  365. Device path: \\?\usb#vid_0fce&pid_adde#5&3879604a&0&5#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  366. Class Description: Universal Serial Bus controllers
  367. Device Instance Id: USB\VID_0FCE&PID_ADDE\5&3879604A&0&5
  368.  
  369. Proccessing amss_fsg.sin...
  370. File size: 0x867E4
  371. Sin header size: 0x458
  372. Sin data size: 0x8638C
  373. Setting max packet size to: 0x400000
  374. Sending command...
  375. Raw command[0xD]:
  376.  
  377. 00000000 00 00 00 05 00 00 00 03 00 00 04 58 61 ...........Xa
  378.  
  379. Successfully write 0xd bytes to handle.
  380. Writing sin header with size of 0x458 bytes
  381. Successfully write 0x458 bytes to handle.
  382. Sin header writen.
  383. CRC32[0x4]:
  384.  
  385. 00000000 80 B7 A4 67 ...g
  386.  
  387. Writing crc32 for sin header...
  388. Successfully write 0x4 bytes to handle.
  389. Successfully read 0xd bytes from handle.
  390. Raw input [0xD]:
  391.  
  392. 00000000 00 00 00 05 00 00 00 01 00 00 00 00 0B .............
  393.  
  394. Verifying crc32...
  395. success: device replied with 0000000500000001000000000B which mean ok.
  396.  
  397. Successfully read 0x4 bytes from handle.
  398. Raw input [0x4]:
  399.  
  400. 00000000 00 00 00 00 ....
  401.  
  402. Sending command...
  403. Raw command[0xD]:
  404.  
  405. 00000000 00 00 00 06 00 00 00 03 00 08 63 8C E9 ..........c..
  406.  
  407. Successfully write 0xd bytes to handle.
  408. Writing chunk part: 1 with size of 0x8638c bytes
  409. Successfully write 0x8638c bytes to handle.
  410. Chunk part: 1 writen.
  411. CRC32[0x4]:
  412.  
  413. 00000000 39 39 6C 75 99lu
  414.  
  415. Writing crc32 for chunk part: 1
  416. Successfully write 0x4 bytes to handle.
  417. WRITING LAST PACKET. SETTING TIMEOUT TO 600000 (ms).
  418. Successfully read 0xd bytes from handle.
  419. Raw input [0xD]:
  420.  
  421. 00000000 00 00 00 06 00 00 00 01 00 00 00 00 0E .............
  422.  
  423. Verifying crc32...
  424. Success: device replied with 0000000600000001000000000E which mean ok.
  425.  
  426. LAST PACKET REAPLY AFTER ms: 967.000000
  427. Successfully read 0x4 bytes from handle.
  428. Raw input [0x4]:
  429.  
  430. 00000000 00 00 00 00 ....
  431.  
  432. Finished.
  433.  
  434.  
  435. amss_fsg.sin uploaded sucessfully.
  436.  
  437. -------------------------------------------------------
  438. Xperia Command Line Flasher
  439.  
  440. by Munjeni @ 2014-2017
  441. -------------------------------------------------------
  442. Device path: \\?\usb#vid_0fce&pid_adde#5&3879604a&0&5#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  443. Class Description: Universal Serial Bus controllers
  444. Device Instance Id: USB\VID_0FCE&PID_ADDE\5&3879604A&0&5
  445.  
  446. Proccessing amss_fs_1.sin...
  447. File size: 0x898
  448. Sin header size: 0x434
  449. Sin data size: 0x464
  450. Setting max packet size to: 0x400000
  451. Sending command...
  452. Raw command[0xD]:
  453.  
  454. 00000000 00 00 00 05 00 00 00 03 00 00 04 34 3D ...........4=
  455.  
  456. Successfully write 0xd bytes to handle.
  457. Writing sin header with size of 0x434 bytes
  458. Successfully write 0x434 bytes to handle.
  459. Sin header writen.
  460. CRC32[0x4]:
  461.  
  462. 00000000 E9 40 6E D1 .@n.
  463.  
  464. Writing crc32 for sin header...
  465. Successfully write 0x4 bytes to handle.
  466. Successfully read 0xd bytes from handle.
  467. Raw input [0xD]:
  468.  
  469. 00000000 00 00 00 05 00 00 00 01 00 00 00 00 0B .............
  470.  
  471. Verifying crc32...
  472. success: device replied with 0000000500000001000000000B which mean ok.
  473.  
  474. Successfully read 0x4 bytes from handle.
  475. Raw input [0x4]:
  476.  
  477. 00000000 00 00 00 00 ....
  478.  
  479. Sending command...
  480. Raw command[0xD]:
  481.  
  482. 00000000 00 00 00 06 00 00 00 03 00 00 04 64 6C ...........dl
  483.  
  484. Successfully write 0xd bytes to handle.
  485. Writing chunk part: 1 with size of 0x464 bytes
  486. Successfully write 0x464 bytes to handle.
  487. Chunk part: 1 writen.
  488. CRC32[0x4]:
  489.  
  490. 00000000 F5 A7 CE 5B ...[
  491.  
  492. Writing crc32 for chunk part: 1
  493. Successfully write 0x4 bytes to handle.
  494. WRITING LAST PACKET. SETTING TIMEOUT TO 600000 (ms).
  495. Successfully read 0xd bytes from handle.
  496. Raw input [0xD]:
  497.  
  498. 00000000 00 00 00 06 00 00 00 01 00 00 00 00 0E .............
  499.  
  500. Verifying crc32...
  501. Success: device replied with 0000000600000001000000000E which mean ok.
  502.  
  503. LAST PACKET REAPLY AFTER ms: 109.000000
  504. Successfully read 0x4 bytes from handle.
  505. Raw input [0x4]:
  506.  
  507. 00000000 00 00 00 00 ....
  508.  
  509. Finished.
  510.  
  511.  
  512. amss_fs_1.sin uploaded sucessfully.
  513.  
  514. -------------------------------------------------------
  515. Xperia Command Line Flasher
  516.  
  517. by Munjeni @ 2014-2017
  518. -------------------------------------------------------
  519. Device path: \\?\usb#vid_0fce&pid_adde#5&3879604a&0&5#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  520. Class Description: Universal Serial Bus controllers
  521. Device Instance Id: USB\VID_0FCE&PID_ADDE\5&3879604A&0&5
  522.  
  523. Proccessing amss_fs_2.sin...
  524. File size: 0x898
  525. Sin header size: 0x434
  526. Sin data size: 0x464
  527. Setting max packet size to: 0x400000
  528. Sending command...
  529. Raw command[0xD]:
  530.  
  531. 00000000 00 00 00 05 00 00 00 03 00 00 04 34 3D ...........4=
  532.  
  533. Successfully write 0xd bytes to handle.
  534. Writing sin header with size of 0x434 bytes
  535. Successfully write 0x434 bytes to handle.
  536. Sin header writen.
  537. CRC32[0x4]:
  538.  
  539. 00000000 8D 95 48 1B ..H.
  540.  
  541. Writing crc32 for sin header...
  542. Successfully write 0x4 bytes to handle.
  543. Successfully read 0xd bytes from handle.
  544. Raw input [0xD]:
  545.  
  546. 00000000 00 00 00 05 00 00 00 01 00 00 00 00 0B .............
  547.  
  548. Verifying crc32...
  549. success: device replied with 0000000500000001000000000B which mean ok.
  550.  
  551. Successfully read 0x4 bytes from handle.
  552. Raw input [0x4]:
  553.  
  554. 00000000 00 00 00 00 ....
  555.  
  556. Sending command...
  557. Raw command[0xD]:
  558.  
  559. 00000000 00 00 00 06 00 00 00 03 00 00 04 64 6C ...........dl
  560.  
  561. Successfully write 0xd bytes to handle.
  562. Writing chunk part: 1 with size of 0x464 bytes
  563. Successfully write 0x464 bytes to handle.
  564. Chunk part: 1 writen.
  565. CRC32[0x4]:
  566.  
  567. 00000000 AA 50 CD D8 .P..
  568.  
  569. Writing crc32 for chunk part: 1
  570. Successfully write 0x4 bytes to handle.
  571. WRITING LAST PACKET. SETTING TIMEOUT TO 600000 (ms).
  572. Successfully read 0xd bytes from handle.
  573. Raw input [0xD]:
  574.  
  575. 00000000 00 00 00 06 00 00 00 01 00 00 00 00 0E .............
  576.  
  577. Verifying crc32...
  578. Success: device replied with 0000000600000001000000000E which mean ok.
  579.  
  580. LAST PACKET REAPLY AFTER ms: 16.000000
  581. Successfully read 0x4 bytes from handle.
  582. Raw input [0x4]:
  583.  
  584. 00000000 00 00 00 00 ....
  585.  
  586. Finished.
  587.  
  588.  
  589. amss_fs_2.sin uploaded sucessfully.
  590.  
  591. -------------------------------------------------------
  592. Xperia Command Line Flasher
  593.  
  594. by Munjeni @ 2014-2017
  595. -------------------------------------------------------
  596. Device path: \\?\usb#vid_0fce&pid_adde#5&3879604a&0&5#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  597. Class Description: Universal Serial Bus controllers
  598. Device Instance Id: USB\VID_0FCE&PID_ADDE\5&3879604A&0&5
  599.  
  600. Proccessing apps_log.sin...
  601. File size: 0x2015
  602. Sin header size: 0x408
  603. Sin data size: 0x1C0D
  604. Setting max packet size to: 0x400000
  605. Sending command...
  606. Raw command[0xD]:
  607.  
  608. 00000000 00 00 00 05 00 00 00 03 00 00 04 08 11 .............
  609.  
  610. Successfully write 0xd bytes to handle.
  611. Writing sin header with size of 0x408 bytes
  612. Successfully write 0x408 bytes to handle.
  613. Sin header writen.
  614. CRC32[0x4]:
  615.  
  616. 00000000 71 6A C1 7E qj.~
  617.  
  618. Writing crc32 for sin header...
  619. Successfully write 0x4 bytes to handle.
  620. Successfully read 0xd bytes from handle.
  621. Raw input [0xD]:
  622.  
  623. 00000000 00 00 00 05 00 00 00 01 00 00 00 00 0B .............
  624.  
  625. Verifying crc32...
  626. success: device replied with 0000000500000001000000000B which mean ok.
  627.  
  628. Successfully read 0x4 bytes from handle.
  629. Raw input [0x4]:
  630.  
  631. 00000000 00 00 00 00 ....
  632.  
  633. Sending command...
  634. Raw command[0xD]:
  635.  
  636. 00000000 00 00 00 06 00 00 00 03 00 00 1C 0D 1B .............
  637.  
  638. Successfully write 0xd bytes to handle.
  639. Writing chunk part: 1 with size of 0x1c0d bytes
  640. Successfully write 0x1c0d bytes to handle.
  641. Chunk part: 1 writen.
  642. CRC32[0x4]:
  643.  
  644. 00000000 DC 88 30 AD ..0.
  645.  
  646. Writing crc32 for chunk part: 1
  647. Successfully write 0x4 bytes to handle.
  648. WRITING LAST PACKET. SETTING TIMEOUT TO 600000 (ms).
  649. Successfully read 0xd bytes from handle.
  650. Raw input [0xD]:
  651.  
  652. 00000000 00 00 00 06 00 00 00 01 00 00 00 00 0E .............
  653.  
  654. Verifying crc32...
  655. Success: device replied with 0000000600000001000000000E which mean ok.
  656.  
  657. LAST PACKET REAPLY AFTER ms: 172.000000
  658. Successfully read 0x4 bytes from handle.
  659. Raw input [0x4]:
  660.  
  661. 00000000 00 00 00 00 ....
  662.  
  663. Finished.
  664.  
  665.  
  666. apps_log.sin uploaded sucessfully.
  667.  
  668. -------------------------------------------------------
  669. Xperia Command Line Flasher
  670.  
  671. by Munjeni @ 2014-2017
  672. -------------------------------------------------------
  673. Device path: \\?\usb#vid_0fce&pid_adde#5&3879604a&0&5#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  674. Class Description: Universal Serial Bus controllers
  675. Device Instance Id: USB\VID_0FCE&PID_ADDE\5&3879604A&0&5
  676.  
  677. Proccessing cache.sin...
  678. File size: 0x6372
  679. Sin header size: 0x408
  680. Sin data size: 0x5F6A
  681. Setting max packet size to: 0x400000
  682. Sending command...
  683. Raw command[0xD]:
  684.  
  685. 00000000 00 00 00 05 00 00 00 03 00 00 04 08 11 .............
  686.  
  687. Successfully write 0xd bytes to handle.
  688. Writing sin header with size of 0x408 bytes
  689. Successfully write 0x408 bytes to handle.
  690. Sin header writen.
  691. CRC32[0x4]:
  692.  
  693. 00000000 B9 43 5D 46 .C]F
  694.  
  695. Writing crc32 for sin header...
  696. Successfully write 0x4 bytes to handle.
  697. Successfully read 0xd bytes from handle.
  698. Raw input [0xD]:
  699.  
  700. 00000000 00 00 00 05 00 00 00 01 00 00 00 00 0B .............
  701.  
  702. Verifying crc32...
  703. success: device replied with 0000000500000001000000000B which mean ok.
  704.  
  705. Successfully read 0x4 bytes from handle.
  706. Raw input [0x4]:
  707.  
  708. 00000000 00 00 00 00 ....
  709.  
  710. Sending command...
  711. Raw command[0xD]:
  712.  
  713. 00000000 00 00 00 06 00 00 00 03 00 00 5F 6A 37 .........._j7
  714.  
  715. Successfully write 0xd bytes to handle.
  716. Writing chunk part: 1 with size of 0x5f6a bytes
  717. Successfully write 0x5f6a bytes to handle.
  718. Chunk part: 1 writen.
  719. CRC32[0x4]:
  720.  
  721. 00000000 FD D7 3C 51 ..<Q
  722.  
  723. Writing crc32 for chunk part: 1
  724. Successfully write 0x4 bytes to handle.
  725. WRITING LAST PACKET. SETTING TIMEOUT TO 600000 (ms).
  726. Successfully read 0xd bytes from handle.
  727. Raw input [0xD]:
  728.  
  729. 00000000 00 00 00 06 00 00 00 01 00 00 00 00 0E .............
  730.  
  731. Verifying crc32...
  732. Success: device replied with 0000000600000001000000000E which mean ok.
  733.  
  734. LAST PACKET REAPLY AFTER ms: 686.000000
  735. Successfully read 0x4 bytes from handle.
  736. Raw input [0x4]:
  737.  
  738. 00000000 00 00 00 00 ....
  739.  
  740. Finished.
  741.  
  742.  
  743. cache.sin uploaded sucessfully.
  744.  
  745. -------------------------------------------------------
  746. Xperia Command Line Flasher
  747.  
  748. by Munjeni @ 2014-2017
  749. -------------------------------------------------------
  750. Device path: \\?\usb#vid_0fce&pid_adde#5&3879604a&0&5#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  751. Class Description: Universal Serial Bus controllers
  752. Device Instance Id: USB\VID_0FCE&PID_ADDE\5&3879604A&0&5
  753.  
  754. Proccessing diag.sin...
  755. File size: 0x1941CC
  756. Sin header size: 0x4E0
  757. Sin data size: 0x193CEC
  758. Setting max packet size to: 0x400000
  759. Sending command...
  760. Raw command[0xD]:
  761.  
  762. 00000000 00 00 00 05 00 00 00 03 00 00 04 E0 E9 .............
  763.  
  764. Successfully write 0xd bytes to handle.
  765. Writing sin header with size of 0x4e0 bytes
  766. Successfully write 0x4e0 bytes to handle.
  767. Sin header writen.
  768. CRC32[0x4]:
  769.  
  770. 00000000 69 8F B0 CC i...
  771.  
  772. Writing crc32 for sin header...
  773. Successfully write 0x4 bytes to handle.
  774. Successfully read 0xd bytes from handle.
  775. Raw input [0xD]:
  776.  
  777. 00000000 00 00 00 05 00 00 00 01 00 00 00 00 0B .............
  778.  
  779. Verifying crc32...
  780. success: device replied with 0000000500000001000000000B which mean ok.
  781.  
  782. Successfully read 0x4 bytes from handle.
  783. Raw input [0x4]:
  784.  
  785. 00000000 00 00 00 00 ....
  786.  
  787. Sending command...
  788. Raw command[0xD]:
  789.  
  790. 00000000 00 00 00 06 00 00 00 03 00 19 3C EC D3 ..........<..
  791.  
  792. Successfully write 0xd bytes to handle.
  793. Writing chunk part: 1 with size of 0x193cec bytes
  794. Successfully write 0x193cec bytes to handle.
  795. Chunk part: 1 writen.
  796. CRC32[0x4]:
  797.  
  798. 00000000 13 25 28 DD .%(.
  799.  
  800. Writing crc32 for chunk part: 1
  801. Successfully write 0x4 bytes to handle.
  802. WRITING LAST PACKET. SETTING TIMEOUT TO 600000 (ms).
  803. Successfully read 0xd bytes from handle.
  804. Raw input [0xD]:
  805.  
  806. 00000000 00 00 00 06 00 00 00 01 00 00 00 00 0E .............
  807.  
  808. Verifying crc32...
  809. Success: device replied with 0000000600000001000000000E which mean ok.
  810.  
  811. LAST PACKET REAPLY AFTER ms: 203.000000
  812. Successfully read 0x4 bytes from handle.
  813. Raw input [0x4]:
  814.  
  815. 00000000 00 00 00 00 ....
  816.  
  817. Finished.
  818.  
  819.  
  820. diag.sin uploaded sucessfully.
  821.  
  822. -------------------------------------------------------
  823. Xperia Command Line Flasher
  824.  
  825. by Munjeni @ 2014-2017
  826. -------------------------------------------------------
  827. Device path: \\?\usb#vid_0fce&pid_adde#5&3879604a&0&5#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  828. Class Description: Universal Serial Bus controllers
  829. Device Instance Id: USB\VID_0FCE&PID_ADDE\5&3879604A&0&5
  830.  
  831. Proccessing elabel.sin...
  832. File size: 0x10008F0
  833. Sin header size: 0x88C
  834. Sin data size: 0x1000064
  835. Setting max packet size to: 0x400000
  836. Sending command...
  837. Raw command[0xD]:
  838.  
  839. 00000000 00 00 00 05 00 00 00 03 00 00 08 8C 89 .............
  840.  
  841. Successfully write 0xd bytes to handle.
  842. Writing sin header with size of 0x88c bytes
  843. Successfully write 0x88c bytes to handle.
  844. Sin header writen.
  845. CRC32[0x4]:
  846.  
  847. 00000000 AD 3A F2 E0 .:..
  848.  
  849. Writing crc32 for sin header...
  850. Successfully write 0x4 bytes to handle.
  851. Successfully read 0xd bytes from handle.
  852. Raw input [0xD]:
  853.  
  854. 00000000 00 00 00 05 00 00 00 01 00 00 00 00 0B .............
  855.  
  856. Verifying crc32...
  857. success: device replied with 0000000500000001000000000B which mean ok.
  858.  
  859. Successfully read 0x4 bytes from handle.
  860. Raw input [0x4]:
  861.  
  862. 00000000 00 00 00 00 ....
  863.  
  864. Sending command...
  865. Raw command[0xD]:
  866.  
  867. 00000000 00 00 00 06 00 00 00 07 00 40 00 00 48 .........@..H
  868.  
  869. Successfully write 0xd bytes to handle.
  870. Writing chunk part: 1 with size of 0x400000 bytes
  871. Successfully write 0x400000 bytes to handle.
  872. Chunk part: 1 writen.
  873. CRC32[0x4]:
  874.  
  875. 00000000 83 32 83 02 .2..
  876.  
  877. Writing crc32 for chunk part: 1
  878. Successfully write 0x4 bytes to handle.
  879. Successfully read 0xd bytes from handle.
  880. Raw input [0xD]:
  881.  
  882. 00000000 00 00 00 06 00 00 00 01 00 00 00 00 0E .............
  883.  
  884. Verifying crc32...
  885. Success: device replied with 0000000600000001000000000E which mean ok.
  886.  
  887. Successfully read 0x4 bytes from handle.
  888. Raw input [0x4]:
  889.  
  890. 00000000 00 00 00 00 ....
  891.  
  892. Sending command...
  893. Raw command[0xD]:
  894.  
  895. 00000000 00 00 00 06 00 00 00 07 00 40 00 00 48 .........@..H
  896.  
  897. Successfully write 0xd bytes to handle.
  898. Writing chunk part: 2 with size of 0x400000 bytes
  899. Successfully write 0x400000 bytes to handle.
  900. Chunk part: 2 writen.
  901. CRC32[0x4]:
  902.  
  903. 00000000 88 4A 32 4A .J2J
  904.  
  905. Writing crc32 for chunk part: 2
  906. Successfully write 0x4 bytes to handle.
  907. Successfully read 0xd bytes from handle.
  908. Raw input [0xD]:
  909.  
  910. 00000000 00 00 00 06 00 00 00 01 00 00 00 00 0E .............
  911.  
  912. Verifying crc32...
  913. Success: device replied with 0000000600000001000000000E which mean ok.
  914.  
  915. Successfully read 0x4 bytes from handle.
  916. Raw input [0x4]:
  917.  
  918. 00000000 00 00 00 00 ....
  919.  
  920. Sending command...
  921. Raw command[0xD]:
  922.  
  923. 00000000 00 00 00 06 00 00 00 07 00 40 00 00 48 .........@..H
  924.  
  925. Successfully write 0xd bytes to handle.
  926. Writing chunk part: 3 with size of 0x400000 bytes
  927. Successfully write 0x400000 bytes to handle.
  928. Chunk part: 3 writen.
  929. CRC32[0x4]:
  930.  
  931. 00000000 00 00 00 00 ....
  932.  
  933. Writing crc32 for chunk part: 3
  934. Successfully write 0x4 bytes to handle.
  935. Successfully read 0xd bytes from handle.
  936. Raw input [0xD]:
  937.  
  938. 00000000 00 00 00 06 00 00 00 01 00 00 00 00 0E .............
  939.  
  940. Verifying crc32...
  941. Success: device replied with 0000000600000001000000000E which mean ok.
  942.  
  943. Successfully read 0x4 bytes from handle.
  944. Raw input [0x4]:
  945.  
  946. 00000000 00 00 00 00 ....
  947.  
  948. Sending command...
  949. Raw command[0xD]:
  950.  
  951. 00000000 00 00 00 06 00 00 00 07 00 40 00 00 48 .........@..H
  952.  
  953. Successfully write 0xd bytes to handle.
  954. Writing chunk part: 4 with size of 0x400000 bytes
  955. Successfully write 0x400000 bytes to handle.
  956. Chunk part: 4 writen.
  957. CRC32[0x4]:
  958.  
  959. 00000000 00 00 00 00 ....
  960.  
  961. Writing crc32 for chunk part: 4
  962. Successfully write 0x4 bytes to handle.
  963. Successfully read 0xd bytes from handle.
  964. Raw input [0xD]:
  965.  
  966. 00000000 00 00 00 06 00 00 00 01 00 00 00 00 0E .............
  967.  
  968. Verifying crc32...
  969. Success: device replied with 0000000600000001000000000E which mean ok.
  970.  
  971. Successfully read 0x4 bytes from handle.
  972. Raw input [0x4]:
  973.  
  974. 00000000 00 00 00 00 ....
  975.  
  976. Sending command...
  977. Raw command[0xD]:
  978.  
  979. 00000000 00 00 00 06 00 00 00 03 00 00 00 64 68 ...........dh
  980.  
  981. Successfully write 0xd bytes to handle.
  982. Writing chunk part: 5 with size of 0x64 bytes
  983. Successfully write 0x64 bytes to handle.
  984. Chunk part: 5 writen.
  985. CRC32[0x4]:
  986.  
  987. 00000000 00 00 00 00 ....
  988.  
  989. Writing crc32 for chunk part: 5
  990. Successfully write 0x4 bytes to handle.
  991. WRITING LAST PACKET. SETTING TIMEOUT TO 600000 (ms).
  992. Successfully read 0xd bytes from handle.
  993. Raw input [0xD]:
  994.  
  995. 00000000 00 00 00 06 00 00 00 01 00 00 00 00 0E .............
  996.  
  997. Verifying crc32...
  998. Success: device replied with 0000000600000001000000000E which mean ok.
  999.  
  1000. LAST PACKET REAPLY AFTER ms: 1669.000000
  1001. Successfully read 0x4 bytes from handle.
  1002. Raw input [0x4]:
  1003.  
  1004. 00000000 00 00 00 00 ....
  1005.  
  1006. Finished.
  1007.  
  1008.  
  1009. elabel.sin uploaded sucessfully.
  1010.  
  1011. -------------------------------------------------------
  1012. Xperia Command Line Flasher
  1013.  
  1014. by Munjeni @ 2014-2017
  1015. -------------------------------------------------------
  1016. Device path: \\?\usb#vid_0fce&pid_adde#5&3879604a&0&5#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  1017. Class Description: Universal Serial Bus controllers
  1018. Device Instance Id: USB\VID_0FCE&PID_ADDE\5&3879604A&0&5
  1019.  
  1020. Proccessing modem.sin...
  1021. File size: 0x2641652
  1022. Sin header size: 0xEC0
  1023. Sin data size: 0x2640792
  1024. Setting max packet size to: 0x400000
  1025. Sending command...
  1026. Raw command[0xD]:
  1027.  
  1028. 00000000 00 00 00 05 00 00 00 03 00 00 0E C0 CF .............
  1029.  
  1030. Successfully write 0xd bytes to handle.
  1031. Writing sin header with size of 0xec0 bytes
  1032. Successfully write 0xec0 bytes to handle.
  1033. Sin header writen.
  1034. CRC32[0x4]:
  1035.  
  1036. 00000000 68 E2 F1 70 h..p
  1037.  
  1038. Writing crc32 for sin header...
  1039. Successfully write 0x4 bytes to handle.
  1040. Successfully read 0xd bytes from handle.
  1041. Raw input [0xD]:
  1042.  
  1043. 00000000 00 00 00 05 00 00 00 01 00 00 00 00 0B .............
  1044.  
  1045. Verifying crc32...
  1046. success: device replied with 0000000500000001000000000B which mean ok.
  1047.  
  1048. Successfully read 0x4 bytes from handle.
  1049. Raw input [0x4]:
  1050.  
  1051. 00000000 00 00 00 00 ....
  1052.  
  1053. Sending command...
  1054. Raw command[0xD]:
  1055.  
  1056. 00000000 00 00 00 06 00 00 00 07 00 40 00 00 48 .........@..H
  1057.  
  1058. Successfully write 0xd bytes to handle.
  1059. Writing chunk part: 1 with size of 0x400000 bytes
  1060. Successfully write 0x400000 bytes to handle.
  1061. Chunk part: 1 writen.
  1062. CRC32[0x4]:
  1063.  
  1064. 00000000 35 52 C8 49 5R.I
  1065.  
  1066. Writing crc32 for chunk part: 1
  1067. Successfully write 0x4 bytes to handle.
  1068. Successfully read 0xd bytes from handle.
  1069. Raw input [0xD]:
  1070.  
  1071. 00000000 00 00 00 06 00 00 00 01 00 00 00 00 0E .............
  1072.  
  1073. Verifying crc32...
  1074. Success: device replied with 0000000600000001000000000E which mean ok.
  1075.  
  1076. Successfully read 0x4 bytes from handle.
  1077. Raw input [0x4]:
  1078.  
  1079. 00000000 00 00 00 00 ....
  1080.  
  1081. Sending command...
  1082. Raw command[0xD]:
  1083.  
  1084. 00000000 00 00 00 06 00 00 00 07 00 40 00 00 48 .........@..H
  1085.  
  1086. Successfully write 0xd bytes to handle.
  1087. Writing chunk part: 2 with size of 0x400000 bytes
  1088. Successfully write 0x400000 bytes to handle.
  1089. Chunk part: 2 writen.
  1090. CRC32[0x4]:
  1091.  
  1092. 00000000 40 0B AE C3 @...
  1093.  
  1094. Writing crc32 for chunk part: 2
  1095. Successfully write 0x4 bytes to handle.
  1096. Successfully read 0xd bytes from handle.
  1097. Raw input [0xD]:
  1098.  
  1099. 00000000 00 00 00 06 00 00 00 01 00 00 00 00 0E .............
  1100.  
  1101. Verifying crc32...
  1102. Success: device replied with 0000000600000001000000000E which mean ok.
  1103.  
  1104. Successfully read 0x4 bytes from handle.
  1105. Raw input [0x4]:
  1106.  
  1107. 00000000 00 00 00 00 ....
  1108.  
  1109. Sending command...
  1110. Raw command[0xD]:
  1111.  
  1112. 00000000 00 00 00 06 00 00 00 07 00 40 00 00 48 .........@..H
  1113.  
  1114. Successfully write 0xd bytes to handle.
  1115. Writing chunk part: 3 with size of 0x400000 bytes
  1116. Successfully write 0x400000 bytes to handle.
  1117. Chunk part: 3 writen.
  1118. CRC32[0x4]:
  1119.  
  1120. 00000000 14 E6 E1 05 ....
  1121.  
  1122. Writing crc32 for chunk part: 3
  1123. Successfully write 0x4 bytes to handle.
  1124. Successfully read 0xd bytes from handle.
  1125. Raw input [0xD]:
  1126.  
  1127. 00000000 00 00 00 06 00 00 00 01 00 00 00 00 0E .............
  1128.  
  1129. Verifying crc32...
  1130. Success: device replied with 0000000600000001000000000E which mean ok.
  1131.  
  1132. Successfully read 0x4 bytes from handle.
  1133. Raw input [0x4]:
  1134.  
  1135. 00000000 00 00 00 00 ....
  1136.  
  1137. Sending command...
  1138. Raw command[0xD]:
  1139.  
  1140. 00000000 00 00 00 06 00 00 00 07 00 40 00 00 48 .........@..H
  1141.  
  1142. Successfully write 0xd bytes to handle.
  1143. Writing chunk part: 4 with size of 0x400000 bytes
  1144. Successfully write 0x400000 bytes to handle.
  1145. Chunk part: 4 writen.
  1146. CRC32[0x4]:
  1147.  
  1148. 00000000 EF 4B 26 D3 .K&.
  1149.  
  1150. Writing crc32 for chunk part: 4
  1151. Successfully write 0x4 bytes to handle.
  1152. Successfully read 0xd bytes from handle.
  1153. Raw input [0xD]:
  1154.  
  1155. 00000000 00 00 00 06 00 00 00 01 00 00 00 00 0E .............
  1156.  
  1157. Verifying crc32...
  1158. Success: device replied with 0000000600000001000000000E which mean ok.
  1159.  
  1160. Successfully read 0x4 bytes from handle.
  1161. Raw input [0x4]:
  1162.  
  1163. 00000000 00 00 00 00 ....
  1164.  
  1165. Sending command...
  1166. Raw command[0xD]:
  1167.  
  1168. 00000000 00 00 00 06 00 00 00 07 00 40 00 00 48 .........@..H
  1169.  
  1170. Successfully write 0xd bytes to handle.
  1171. Writing chunk part: 5 with size of 0x400000 bytes
  1172. Successfully write 0x400000 bytes to handle.
  1173. Chunk part: 5 writen.
  1174. CRC32[0x4]:
  1175.  
  1176. 00000000 CF E3 74 CC ..t.
  1177.  
  1178. Writing crc32 for chunk part: 5
  1179. Successfully write 0x4 bytes to handle.
  1180. Successfully read 0xd bytes from handle.
  1181. Raw input [0xD]:
  1182.  
  1183. 00000000 00 00 00 06 00 00 00 01 00 00 00 00 0E .............
  1184.  
  1185. Verifying crc32...
  1186. Success: device replied with 0000000600000001000000000E which mean ok.
  1187.  
  1188. Successfully read 0x4 bytes from handle.
  1189. Raw input [0x4]:
  1190.  
  1191. 00000000 00 00 00 00 ....
  1192.  
  1193. Sending command...
  1194. Raw command[0xD]:
  1195.  
  1196. 00000000 00 00 00 06 00 00 00 07 00 40 00 00 48 .........@..H
  1197.  
  1198. Successfully write 0xd bytes to handle.
  1199. Writing chunk part: 6 with size of 0x400000 bytes
  1200. Successfully write 0x400000 bytes to handle.
  1201. Chunk part: 6 writen.
  1202. CRC32[0x4]:
  1203.  
  1204. 00000000 93 10 50 91 ..P.
  1205.  
  1206. Writing crc32 for chunk part: 6
  1207. Successfully write 0x4 bytes to handle.
  1208. Successfully read 0xd bytes from handle.
  1209. Raw input [0xD]:
  1210.  
  1211. 00000000 00 00 00 06 00 00 00 01 00 00 00 00 0E .............
  1212.  
  1213. Verifying crc32...
  1214. Success: device replied with 0000000600000001000000000E which mean ok.
  1215.  
  1216. Successfully read 0x4 bytes from handle.
  1217. Raw input [0x4]:
  1218.  
  1219. 00000000 00 00 00 00 ....
  1220.  
  1221. Sending command...
  1222. Raw command[0xD]:
  1223.  
  1224. 00000000 00 00 00 06 00 00 00 07 00 40 00 00 48 .........@..H
  1225.  
  1226. Successfully write 0xd bytes to handle.
  1227. Writing chunk part: 7 with size of 0x400000 bytes
  1228. Successfully write 0x400000 bytes to handle.
  1229. Chunk part: 7 writen.
  1230. CRC32[0x4]:
  1231.  
  1232. 00000000 32 79 54 3F 2yT?
  1233.  
  1234. Writing crc32 for chunk part: 7
  1235. Successfully write 0x4 bytes to handle.
  1236. Successfully read 0xd bytes from handle.
  1237. Raw input [0xD]:
  1238.  
  1239. 00000000 00 00 00 06 00 00 00 01 00 00 00 00 0E .............
  1240.  
  1241. Verifying crc32...
  1242. Success: device replied with 0000000600000001000000000E which mean ok.
  1243.  
  1244. Successfully read 0x4 bytes from handle.
  1245. Raw input [0x4]:
  1246.  
  1247. 00000000 00 00 00 00 ....
  1248.  
  1249. Sending command...
  1250. Raw command[0xD]:
  1251.  
  1252. 00000000 00 00 00 06 00 00 00 07 00 40 00 00 48 .........@..H
  1253.  
  1254. Successfully write 0xd bytes to handle.
  1255. Writing chunk part: 8 with size of 0x400000 bytes
  1256. Successfully write 0x400000 bytes to handle.
  1257. Chunk part: 8 writen.
  1258. CRC32[0x4]:
  1259.  
  1260. 00000000 09 49 E2 45 .I.E
  1261.  
  1262. Writing crc32 for chunk part: 8
  1263. Successfully write 0x4 bytes to handle.
  1264. Successfully read 0xd bytes from handle.
  1265. Raw input [0xD]:
  1266.  
  1267. 00000000 00 00 00 06 00 00 00 01 00 00 00 00 0E .............
  1268.  
  1269. Verifying crc32...
  1270. Success: device replied with 0000000600000001000000000E which mean ok.
  1271.  
  1272. Successfully read 0x4 bytes from handle.
  1273. Raw input [0x4]:
  1274.  
  1275. 00000000 00 00 00 00 ....
  1276.  
  1277. Sending command...
  1278. Raw command[0xD]:
  1279.  
  1280. 00000000 00 00 00 06 00 00 00 07 00 40 00 00 48 .........@..H
  1281.  
  1282. Successfully write 0xd bytes to handle.
  1283. Writing chunk part: 9 with size of 0x400000 bytes
  1284. Successfully write 0x400000 bytes to handle.
  1285. Chunk part: 9 writen.
  1286. CRC32[0x4]:
  1287.  
  1288. 00000000 25 45 D5 7A %E.z
  1289.  
  1290. Writing crc32 for chunk part: 9
  1291. Successfully write 0x4 bytes to handle.
  1292. Successfully read 0xd bytes from handle.
  1293. Raw input [0xD]:
  1294.  
  1295. 00000000 00 00 00 06 00 00 00 01 00 00 00 00 0E .............
  1296.  
  1297. Verifying crc32...
  1298. Success: device replied with 0000000600000001000000000E which mean ok.
  1299.  
  1300. Successfully read 0x4 bytes from handle.
  1301. Raw input [0x4]:
  1302.  
  1303. 00000000 00 00 00 00 ....
  1304.  
  1305. Sending command...
  1306. Raw command[0xD]:
  1307.  
  1308. 00000000 00 00 00 06 00 00 00 03 00 24 07 92 BB .........$...
  1309.  
  1310. Successfully write 0xd bytes to handle.
  1311. Writing chunk part: 10 with size of 0x240792 bytes
  1312. Successfully write 0x240792 bytes to handle.
  1313. Chunk part: 10 writen.
  1314. CRC32[0x4]:
  1315.  
  1316. 00000000 63 1B 66 45 c.fE
  1317.  
  1318. Writing crc32 for chunk part: 10
  1319. Successfully write 0x4 bytes to handle.
  1320. WRITING LAST PACKET. SETTING TIMEOUT TO 600000 (ms).
  1321. Successfully read 0xd bytes from handle.
  1322. Raw input [0xD]:
  1323.  
  1324. 00000000 00 00 00 06 00 00 00 01 00 00 00 00 0E .............
  1325.  
  1326. Verifying crc32...
  1327. Success: device replied with 0000000600000001000000000E which mean ok.
  1328.  
  1329. LAST PACKET REAPLY AFTER ms: 5772.000000
  1330. Successfully read 0x4 bytes from handle.
  1331. Raw input [0x4]:
  1332.  
  1333. 00000000 00 00 00 00 ....
  1334.  
  1335. Finished.
  1336.  
  1337.  
  1338. modem.sin uploaded sucessfully.
  1339.  
  1340. -------------------------------------------------------
  1341. Xperia Command Line Flasher
  1342.  
  1343. by Munjeni @ 2014-2017
  1344. -------------------------------------------------------
  1345. Device path: \\?\usb#vid_0fce&pid_adde#5&3879604a&0&5#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  1346. Class Description: Universal Serial Bus controllers
  1347. Device Instance Id: USB\VID_0FCE&PID_ADDE\5&3879604A&0&5
  1348.  
  1349. Proccessing oem.sin...
  1350. File size: 0x2EE3DEC
  1351. Sin header size: 0x111C
  1352. Sin data size: 0x2EE2CD0
  1353. Setting max packet size to: 0x400000
  1354. Sending command...
  1355. Raw command[0xD]:
  1356.  
  1357. 00000000 00 00 00 05 00 00 00 03 00 00 11 1C 12 .............
  1358.  
  1359. Successfully write 0xd bytes to handle.
  1360. Writing sin header with size of 0x111c bytes
  1361. Successfully write 0x111c bytes to handle.
  1362. Sin header writen.
  1363. CRC32[0x4]:
  1364.  
  1365. 00000000 6E 07 E9 48 n..H
  1366.  
  1367. Writing crc32 for sin header...
  1368. Successfully write 0x4 bytes to handle.
  1369. Successfully read 0xd bytes from handle.
  1370. Raw input [0xD]:
  1371.  
  1372. 00000000 00 00 00 05 00 00 00 01 00 00 00 00 0B .............
  1373.  
  1374. Verifying crc32...
  1375. success: device replied with 0000000500000001000000000B which mean ok.
  1376.  
  1377. Successfully read 0x4 bytes from handle.
  1378. Raw input [0x4]:
  1379.  
  1380. 00000000 00 00 00 00 ....
  1381.  
  1382. Sending command...
  1383. Raw command[0xD]:
  1384.  
  1385. 00000000 00 00 00 06 00 00 00 07 00 40 00 00 48 .........@..H
  1386.  
  1387. Successfully write 0xd bytes to handle.
  1388. Writing chunk part: 1 with size of 0x400000 bytes
  1389. Successfully write 0x400000 bytes to handle.
  1390. Chunk part: 1 writen.
  1391. CRC32[0x4]:
  1392.  
  1393. 00000000 BB 4F E0 D1 .O..
  1394.  
  1395. Writing crc32 for chunk part: 1
  1396. Successfully write 0x4 bytes to handle.
  1397. Successfully read 0xd bytes from handle.
  1398. Raw input [0xD]:
  1399.  
  1400. 00000000 00 00 00 06 00 00 00 01 00 00 00 00 0E .............
  1401.  
  1402. Verifying crc32...
  1403. Success: device replied with 0000000600000001000000000E which mean ok.
  1404.  
  1405. Successfully read 0x4 bytes from handle.
  1406. Raw input [0x4]:
  1407.  
  1408. 00000000 00 00 00 00 ....
  1409.  
  1410. Sending command...
  1411. Raw command[0xD]:
  1412.  
  1413. 00000000 00 00 00 06 00 00 00 07 00 40 00 00 48 .........@..H
  1414.  
  1415. Successfully write 0xd bytes to handle.
  1416. Writing chunk part: 2 with size of 0x400000 bytes
  1417. Successfully write 0x400000 bytes to handle.
  1418. Chunk part: 2 writen.
  1419. CRC32[0x4]:
  1420.  
  1421. 00000000 02 B4 C3 66 ...f
  1422.  
  1423. Writing crc32 for chunk part: 2
  1424. Successfully write 0x4 bytes to handle.
  1425. Successfully read 0xd bytes from handle.
  1426. Raw input [0xD]:
  1427.  
  1428. 00000000 00 00 00 06 00 00 00 01 00 00 00 00 0E .............
  1429.  
  1430. Verifying crc32...
  1431. Success: device replied with 0000000600000001000000000E which mean ok.
  1432.  
  1433. Successfully read 0x4 bytes from handle.
  1434. Raw input [0x4]:
  1435.  
  1436. 00000000 00 00 00 00 ....
  1437.  
  1438. Sending command...
  1439. Raw command[0xD]:
  1440.  
  1441. 00000000 00 00 00 06 00 00 00 07 00 40 00 00 48 .........@..H
  1442.  
  1443. Successfully write 0xd bytes to handle.
  1444. Writing chunk part: 3 with size of 0x400000 bytes
  1445. Successfully write 0x400000 bytes to handle.
  1446. Chunk part: 3 writen.
  1447. CRC32[0x4]:
  1448.  
  1449. 00000000 9C 11 AA 8E ....
  1450.  
  1451. Writing crc32 for chunk part: 3
  1452. Successfully write 0x4 bytes to handle.
  1453. Successfully read 0xd bytes from handle.
  1454. Raw input [0xD]:
  1455.  
  1456. 00000000 00 00 00 06 00 00 00 01 00 00 00 00 0E .............
  1457.  
  1458. Verifying crc32...
  1459. Success: device replied with 0000000600000001000000000E which mean ok.
  1460.  
  1461. Successfully read 0x4 bytes from handle.
  1462. Raw input [0x4]:
  1463.  
  1464. 00000000 00 00 00 00 ....
  1465.  
  1466. Sending command...
  1467. Raw command[0xD]:
  1468.  
  1469. 00000000 00 00 00 06 00 00 00 07 00 40 00 00 48 .........@..H
  1470.  
  1471. Successfully write 0xd bytes to handle.
  1472. Writing chunk part: 4 with size of 0x400000 bytes
  1473. Successfully write 0x400000 bytes to handle.
  1474. Chunk part: 4 writen.
  1475. CRC32[0x4]:
  1476.  
  1477. 00000000 6C 1D 48 AB l.H.
  1478.  
  1479. Writing crc32 for chunk part: 4
  1480. Successfully write 0x4 bytes to handle.
  1481. Successfully read 0xd bytes from handle.
  1482. Raw input [0xD]:
  1483.  
  1484. 00000000 00 00 00 06 00 00 00 01 00 00 00 00 0E .............
  1485.  
  1486. Verifying crc32...
  1487. Success: device replied with 0000000600000001000000000E which mean ok.
  1488.  
  1489. Successfully read 0x4 bytes from handle.
  1490. Raw input [0x4]:
  1491.  
  1492. 00000000 00 00 00 00 ....
  1493.  
  1494. Sending command...
  1495. Raw command[0xD]:
  1496.  
  1497. 00000000 00 00 00 06 00 00 00 07 00 40 00 00 48 .........@..H
  1498.  
  1499. Successfully write 0xd bytes to handle.
  1500. Writing chunk part: 5 with size of 0x400000 bytes
  1501. Successfully write 0x400000 bytes to handle.
  1502. Chunk part: 5 writen.
  1503. CRC32[0x4]:
  1504.  
  1505. 00000000 77 87 59 5A w.YZ
  1506.  
  1507. Writing crc32 for chunk part: 5
  1508. Successfully write 0x4 bytes to handle.
  1509. Successfully read 0xd bytes from handle.
  1510. Raw input [0xD]:
  1511.  
  1512. 00000000 00 00 00 06 00 00 00 01 00 00 00 00 0E .............
  1513.  
  1514. Verifying crc32...
  1515. Success: device replied with 0000000600000001000000000E which mean ok.
  1516.  
  1517. Successfully read 0x4 bytes from handle.
  1518. Raw input [0x4]:
  1519.  
  1520. 00000000 00 00 00 00 ....
  1521.  
  1522. Sending command...
  1523. Raw command[0xD]:
  1524.  
  1525. 00000000 00 00 00 06 00 00 00 07 00 40 00 00 48 .........@..H
  1526.  
  1527. Successfully write 0xd bytes to handle.
  1528. Writing chunk part: 6 with size of 0x400000 bytes
  1529. Successfully write 0x400000 bytes to handle.
  1530. Chunk part: 6 writen.
  1531. CRC32[0x4]:
  1532.  
  1533. 00000000 61 6C 75 DF alu.
  1534.  
  1535. Writing crc32 for chunk part: 6
  1536. Successfully write 0x4 bytes to handle.
  1537. Successfully read 0xd bytes from handle.
  1538. Raw input [0xD]:
  1539.  
  1540. 00000000 00 00 00 06 00 00 00 01 00 00 00 00 0E .............
  1541.  
  1542. Verifying crc32...
  1543. Success: device replied with 0000000600000001000000000E which mean ok.
  1544.  
  1545. Successfully read 0x4 bytes from handle.
  1546. Raw input [0x4]:
  1547.  
  1548. 00000000 00 00 00 00 ....
  1549.  
  1550. Sending command...
  1551. Raw command[0xD]:
  1552.  
  1553. 00000000 00 00 00 06 00 00 00 07 00 40 00 00 48 .........@..H
  1554.  
  1555. Successfully write 0xd bytes to handle.
  1556. Writing chunk part: 7 with size of 0x400000 bytes
  1557. Successfully write 0x400000 bytes to handle.
  1558. Chunk part: 7 writen.
  1559. CRC32[0x4]:
  1560.  
  1561. 00000000 E7 7E 4E 1C .~N.
  1562.  
  1563. Writing crc32 for chunk part: 7
  1564. Successfully write 0x4 bytes to handle.
  1565. Successfully read 0xd bytes from handle.
  1566. Raw input [0xD]:
  1567.  
  1568. 00000000 00 00 00 06 00 00 00 01 00 00 00 00 0E .............
  1569.  
  1570. Verifying crc32...
  1571. Success: device replied with 0000000600000001000000000E which mean ok.
  1572.  
  1573. Successfully read 0x4 bytes from handle.
  1574. Raw input [0x4]:
  1575.  
  1576. 00000000 00 00 00 00 ....
  1577.  
  1578. Sending command...
  1579. Raw command[0xD]:
  1580.  
  1581. 00000000 00 00 00 06 00 00 00 07 00 40 00 00 48 .........@..H
  1582.  
  1583. Successfully write 0xd bytes to handle.
  1584. Writing chunk part: 8 with size of 0x400000 bytes
  1585. Successfully write 0x400000 bytes to handle.
  1586. Chunk part: 8 writen.
  1587. CRC32[0x4]:
  1588.  
  1589. 00000000 D4 EA 50 9D ..P.
  1590.  
  1591. Writing crc32 for chunk part: 8
  1592. Successfully write 0x4 bytes to handle.
  1593. Successfully read 0xd bytes from handle.
  1594. Raw input [0xD]:
  1595.  
  1596. 00000000 00 00 00 06 00 00 00 01 00 00 00 00 0E .............
  1597.  
  1598. Verifying crc32...
  1599. Success: device replied with 0000000600000001000000000E which mean ok.
  1600.  
  1601. Successfully read 0x4 bytes from handle.
  1602. Raw input [0x4]:
  1603.  
  1604. 00000000 00 00 00 00 ....
  1605.  
  1606. Sending command...
  1607. Raw command[0xD]:
  1608.  
  1609. 00000000 00 00 00 06 00 00 00 07 00 40 00 00 48 .........@..H
  1610.  
  1611. Successfully write 0xd bytes to handle.
  1612. Writing chunk part: 9 with size of 0x400000 bytes
  1613. Successfully write 0x400000 bytes to handle.
  1614. Chunk part: 9 writen.
  1615. CRC32[0x4]:
  1616.  
  1617. 00000000 F4 51 3E 94 .Q>.
  1618.  
  1619. Writing crc32 for chunk part: 9
  1620. Successfully write 0x4 bytes to handle.
  1621. Successfully read 0xd bytes from handle.
  1622. Raw input [0xD]:
  1623.  
  1624. 00000000 00 00 00 06 00 00 00 01 00 00 00 00 0E .............
  1625.  
  1626. Verifying crc32...
  1627. Success: device replied with 0000000600000001000000000E which mean ok.
  1628.  
  1629. Successfully read 0x4 bytes from handle.
  1630. Raw input [0x4]:
  1631.  
  1632. 00000000 00 00 00 00 ....
  1633.  
  1634. Sending command...
  1635. Raw command[0xD]:
  1636.  
  1637. 00000000 00 00 00 06 00 00 00 07 00 40 00 00 48 .........@..H
  1638.  
  1639. Successfully write 0xd bytes to handle.
  1640. Writing chunk part: 10 with size of 0x400000 bytes
  1641. Successfully write 0x400000 bytes to handle.
  1642. Chunk part: 10 writen.
  1643. CRC32[0x4]:
  1644.  
  1645. 00000000 9F B7 8A A3 ....
  1646.  
  1647. Writing crc32 for chunk part: 10
  1648. Successfully write 0x4 bytes to handle.
  1649. Successfully read 0xd bytes from handle.
  1650. Raw input [0xD]:
  1651.  
  1652. 00000000 00 00 00 06 00 00 00 01 00 00 00 00 0E .............
  1653.  
  1654. Verifying crc32...
  1655. Success: device replied with 0000000600000001000000000E which mean ok.
  1656.  
  1657. Successfully read 0x4 bytes from handle.
  1658. Raw input [0x4]:
  1659.  
  1660. 00000000 00 00 00 00 ....
  1661.  
  1662. Sending command...
  1663. Raw command[0xD]:
  1664.  
  1665. 00000000 00 00 00 06 00 00 00 07 00 40 00 00 48 .........@..H
  1666.  
  1667. Successfully write 0xd bytes to handle.
  1668. Writing chunk part: 11 with size of 0x400000 bytes
  1669. Successfully write 0x400000 bytes to handle.
  1670. Chunk part: 11 writen.
  1671. CRC32[0x4]:
  1672.  
  1673. 00000000 78 EA 3B 2D x.;-
  1674.  
  1675. Writing crc32 for chunk part: 11
  1676. Successfully write 0x4 bytes to handle.
  1677. Successfully read 0xd bytes from handle.
  1678. Raw input [0xD]:
  1679.  
  1680. 00000000 00 00 00 06 00 00 00 01 00 00 00 00 0E .............
  1681.  
  1682. Verifying crc32...
  1683. Success: device replied with 0000000600000001000000000E which mean ok.
  1684.  
  1685. Successfully read 0x4 bytes from handle.
  1686. Raw input [0x4]:
  1687.  
  1688. 00000000 00 00 00 00 ....
  1689.  
  1690. Sending command...
  1691. Raw command[0xD]:
  1692.  
  1693. 00000000 00 00 00 06 00 00 00 03 00 2E 2C D0 DE ..........,..
  1694.  
  1695. Successfully write 0xd bytes to handle.
  1696. Writing chunk part: 12 with size of 0x2e2cd0 bytes
  1697. Successfully write 0x2e2cd0 bytes to handle.
  1698. Chunk part: 12 writen.
  1699. CRC32[0x4]:
  1700.  
  1701. 00000000 69 43 26 1D iC&.
  1702.  
  1703. Writing crc32 for chunk part: 12
  1704. Successfully write 0x4 bytes to handle.
  1705. WRITING LAST PACKET. SETTING TIMEOUT TO 600000 (ms).
  1706. Successfully read 0xd bytes from handle.
  1707. Raw input [0xD]:
  1708.  
  1709. 00000000 00 00 00 06 00 00 00 01 00 00 00 00 0E .............
  1710.  
  1711. Verifying crc32...
  1712. Success: device replied with 0000000600000001000000000E which mean ok.
  1713.  
  1714. LAST PACKET REAPLY AFTER ms: 6255.000000
  1715. Successfully read 0x4 bytes from handle.
  1716. Raw input [0x4]:
  1717.  
  1718. 00000000 00 00 00 00 ....
  1719.  
  1720. Finished.
  1721.  
  1722.  
  1723. oem.sin uploaded sucessfully.
  1724.  
  1725. -------------------------------------------------------
  1726. Xperia Command Line Flasher
  1727.  
  1728. by Munjeni @ 2014-2017
  1729. -------------------------------------------------------
  1730. Device path: \\?\usb#vid_0fce&pid_adde#5&3879604a&0&5#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  1731. Class Description: Universal Serial Bus controllers
  1732. Device Instance Id: USB\VID_0FCE&PID_ADDE\5&3879604A&0&5
  1733.  
  1734. Proccessing persist.sin...
  1735. File size: 0x4915D4
  1736. Sin header size: 0x570
  1737. Sin data size: 0x491064
  1738. Setting max packet size to: 0x400000
  1739. Sending command...
  1740. Raw command[0xD]:
  1741.  
  1742. 00000000 00 00 00 05 00 00 00 03 00 00 05 70 7A ...........pz
  1743.  
  1744. Successfully write 0xd bytes to handle.
  1745. Writing sin header with size of 0x570 bytes
  1746. Successfully write 0x570 bytes to handle.
  1747. Sin header writen.
  1748. CRC32[0x4]:
  1749.  
  1750. 00000000 59 F3 0E 90 Y...
  1751.  
  1752. Writing crc32 for sin header...
  1753. Successfully write 0x4 bytes to handle.
  1754. Successfully read 0xd bytes from handle.
  1755. Raw input [0xD]:
  1756.  
  1757. 00000000 00 00 00 05 00 00 00 01 00 00 00 00 0B .............
  1758.  
  1759. Verifying crc32...
  1760. success: device replied with 0000000500000001000000000B which mean ok.
  1761.  
  1762. Successfully read 0x4 bytes from handle.
  1763. Raw input [0x4]:
  1764.  
  1765. 00000000 00 00 00 00 ....
  1766.  
  1767. Sending command...
  1768. Raw command[0xD]:
  1769.  
  1770. 00000000 00 00 00 06 00 00 00 07 00 40 00 00 48 .........@..H
  1771.  
  1772. Successfully write 0xd bytes to handle.
  1773. Writing chunk part: 1 with size of 0x400000 bytes
  1774. Successfully write 0x400000 bytes to handle.
  1775. Chunk part: 1 writen.
  1776. CRC32[0x4]:
  1777.  
  1778. 00000000 2B 51 5E EF +Q^.
  1779.  
  1780. Writing crc32 for chunk part: 1
  1781. Successfully write 0x4 bytes to handle.
  1782. Successfully read 0xd bytes from handle.
  1783. Raw input [0xD]:
  1784.  
  1785. 00000000 00 00 00 06 00 00 00 01 00 00 00 00 0E .............
  1786.  
  1787. Verifying crc32...
  1788. Success: device replied with 0000000600000001000000000E which mean ok.
  1789.  
  1790. Successfully read 0x4 bytes from handle.
  1791. Raw input [0x4]:
  1792.  
  1793. 00000000 00 00 00 00 ....
  1794.  
  1795. Sending command...
  1796. Raw command[0xD]:
  1797.  
  1798. 00000000 00 00 00 06 00 00 00 03 00 09 10 64 7F ...........d.
  1799.  
  1800. Successfully write 0xd bytes to handle.
  1801. Writing chunk part: 2 with size of 0x91064 bytes
  1802. Successfully write 0x91064 bytes to handle.
  1803. Chunk part: 2 writen.
  1804. CRC32[0x4]:
  1805.  
  1806. 00000000 FE C1 6C 91 ..l.
  1807.  
  1808. Writing crc32 for chunk part: 2
  1809. Successfully write 0x4 bytes to handle.
  1810. WRITING LAST PACKET. SETTING TIMEOUT TO 600000 (ms).
  1811. Successfully read 0xd bytes from handle.
  1812. Raw input [0xD]:
  1813.  
  1814. 00000000 00 00 00 06 00 00 00 01 00 00 00 00 0E .............
  1815.  
  1816. Verifying crc32...
  1817. Success: device replied with 0000000600000001000000000E which mean ok.
  1818.  
  1819. LAST PACKET REAPLY AFTER ms: 1575.000000
  1820. Successfully read 0x4 bytes from handle.
  1821. Raw input [0x4]:
  1822.  
  1823. 00000000 00 00 00 00 ....
  1824.  
  1825. Finished.
  1826.  
  1827.  
  1828. persist.sin uploaded sucessfully.
  1829.  
  1830. -------------------------------------------------------
  1831. Xperia Command Line Flasher
  1832.  
  1833. by Munjeni @ 2014-2017
  1834. -------------------------------------------------------
  1835. Device path: \\?\usb#vid_0fce&pid_adde#5&3879604a&0&5#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  1836. Class Description: Universal Serial Bus controllers
  1837. Device Instance Id: USB\VID_0FCE&PID_ADDE\5&3879604A&0&5
  1838.  
  1839. Proccessing ramdump.sin...
  1840. File size: 0x9E389C
  1841. Sin header size: 0x6D8
  1842. Sin data size: 0x9E31C4
  1843. Setting max packet size to: 0x400000
  1844. Sending command...
  1845. Raw command[0xD]:
  1846.  
  1847. 00000000 00 00 00 05 00 00 00 03 00 00 06 D8 DF .............
  1848.  
  1849. Successfully write 0xd bytes to handle.
  1850. Writing sin header with size of 0x6d8 bytes
  1851. Successfully write 0x6d8 bytes to handle.
  1852. Sin header writen.
  1853. CRC32[0x4]:
  1854.  
  1855. 00000000 0B B4 C0 50 ...P
  1856.  
  1857. Writing crc32 for sin header...
  1858. Successfully write 0x4 bytes to handle.
  1859. Successfully read 0xd bytes from handle.
  1860. Raw input [0xD]:
  1861.  
  1862. 00000000 00 00 00 05 00 00 00 01 00 00 00 00 0B .............
  1863.  
  1864. Verifying crc32...
  1865. success: device replied with 0000000500000001000000000B which mean ok.
  1866.  
  1867. Successfully read 0x4 bytes from handle.
  1868. Raw input [0x4]:
  1869.  
  1870. 00000000 00 00 00 00 ....
  1871.  
  1872. Sending command...
  1873. Raw command[0xD]:
  1874.  
  1875. 00000000 00 00 00 06 00 00 00 07 00 40 00 00 48 .........@..H
  1876.  
  1877. Successfully write 0xd bytes to handle.
  1878. Writing chunk part: 1 with size of 0x400000 bytes
  1879. Successfully write 0x400000 bytes to handle.
  1880. Chunk part: 1 writen.
  1881. CRC32[0x4]:
  1882.  
  1883. 00000000 E2 68 EE D7 .h..
  1884.  
  1885. Writing crc32 for chunk part: 1
  1886. Successfully write 0x4 bytes to handle.
  1887. Successfully read 0xd bytes from handle.
  1888. Raw input [0xD]:
  1889.  
  1890. 00000000 00 00 00 06 00 00 00 01 00 00 00 00 0E .............
  1891.  
  1892. Verifying crc32...
  1893. Success: device replied with 0000000600000001000000000E which mean ok.
  1894.  
  1895. Successfully read 0x4 bytes from handle.
  1896. Raw input [0x4]:
  1897.  
  1898. 00000000 00 00 00 00 ....
  1899.  
  1900. Sending command...
  1901. Raw command[0xD]:
  1902.  
  1903. 00000000 00 00 00 06 00 00 00 07 00 40 00 00 48 .........@..H
  1904.  
  1905. Successfully write 0xd bytes to handle.
  1906. Writing chunk part: 2 with size of 0x400000 bytes
  1907. Successfully write 0x400000 bytes to handle.
  1908. Chunk part: 2 writen.
  1909. CRC32[0x4]:
  1910.  
  1911. 00000000 B0 D6 79 D3 ..y.
  1912.  
  1913. Writing crc32 for chunk part: 2
  1914. Successfully write 0x4 bytes to handle.
  1915. Successfully read 0xd bytes from handle.
  1916. Raw input [0xD]:
  1917.  
  1918. 00000000 00 00 00 06 00 00 00 01 00 00 00 00 0E .............
  1919.  
  1920. Verifying crc32...
  1921. Success: device replied with 0000000600000001000000000E which mean ok.
  1922.  
  1923. Successfully read 0x4 bytes from handle.
  1924. Raw input [0x4]:
  1925.  
  1926. 00000000 00 00 00 00 ....
  1927.  
  1928. Sending command...
  1929. Raw command[0xD]:
  1930.  
  1931. 00000000 00 00 00 06 00 00 00 03 00 1E 31 C4 F5 ..........1..
  1932.  
  1933. Successfully write 0xd bytes to handle.
  1934. Writing chunk part: 3 with size of 0x1e31c4 bytes
  1935. Successfully write 0x1e31c4 bytes to handle.
  1936. Chunk part: 3 writen.
  1937. CRC32[0x4]:
  1938.  
  1939. 00000000 F1 C7 4E BF ..N.
  1940.  
  1941. Writing crc32 for chunk part: 3
  1942. Successfully write 0x4 bytes to handle.
  1943. WRITING LAST PACKET. SETTING TIMEOUT TO 600000 (ms).
  1944. Successfully read 0xd bytes from handle.
  1945. Raw input [0xD]:
  1946.  
  1947. 00000000 00 00 00 06 00 00 00 01 00 00 00 00 0E .............
  1948.  
  1949. Verifying crc32...
  1950. Success: device replied with 0000000600000001000000000E which mean ok.
  1951.  
  1952. LAST PACKET REAPLY AFTER ms: 1077.000000
  1953. Successfully read 0x4 bytes from handle.
  1954. Raw input [0x4]:
  1955.  
  1956. 00000000 00 00 00 00 ....
  1957.  
  1958. Finished.
  1959.  
  1960.  
  1961. ramdump.sin uploaded sucessfully.
  1962.  
  1963. -------------------------------------------------------
  1964. Xperia Command Line Flasher
  1965.  
  1966. by Munjeni @ 2014-2017
  1967. -------------------------------------------------------
  1968. Device path: \\?\usb#vid_0fce&pid_adde#5&3879604a&0&5#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  1969. Class Description: Universal Serial Bus controllers
  1970. Device Instance Id: USB\VID_0FCE&PID_ADDE\5&3879604A&0&5
  1971.  
  1972. Proccessing ssd.sin...
  1973. File size: 0x491
  1974. Sin header size: 0x42C
  1975. Sin data size: 0x65
  1976. Setting max packet size to: 0x400000
  1977. Sending command...
  1978. Raw command[0xD]:
  1979.  
  1980. 00000000 00 00 00 05 00 00 00 03 00 00 04 2C 35 ...........,5
  1981.  
  1982. Successfully write 0xd bytes to handle.
  1983. Writing sin header with size of 0x42c bytes
  1984. Successfully write 0x42c bytes to handle.
  1985. Sin header writen.
  1986. CRC32[0x4]:
  1987.  
  1988. 00000000 EA 39 1B 04 .9..
  1989.  
  1990. Writing crc32 for sin header...
  1991. Successfully write 0x4 bytes to handle.
  1992. Successfully read 0xd bytes from handle.
  1993. Raw input [0xD]:
  1994.  
  1995. 00000000 00 00 00 05 00 00 00 01 00 00 00 00 0B .............
  1996.  
  1997. Verifying crc32...
  1998. success: device replied with 0000000500000001000000000B which mean ok.
  1999.  
  2000. Successfully read 0x4 bytes from handle.
  2001. Raw input [0x4]:
  2002.  
  2003. 00000000 00 00 00 00 ....
  2004.  
  2005. Sending command...
  2006. Raw command[0xD]:
  2007.  
  2008. 00000000 00 00 00 06 00 00 00 03 00 00 00 65 67 ...........eg
  2009.  
  2010. Successfully write 0xd bytes to handle.
  2011. Writing chunk part: 1 with size of 0x65 bytes
  2012. Successfully write 0x65 bytes to handle.
  2013. Chunk part: 1 writen.
  2014. CRC32[0x4]:
  2015.  
  2016. 00000000 29 61 B2 AC )a..
  2017.  
  2018. Writing crc32 for chunk part: 1
  2019. Successfully write 0x4 bytes to handle.
  2020. WRITING LAST PACKET. SETTING TIMEOUT TO 600000 (ms).
  2021. Successfully read 0xd bytes from handle.
  2022. Raw input [0xD]:
  2023.  
  2024. 00000000 00 00 00 06 00 00 00 01 00 00 00 00 0E .............
  2025.  
  2026. Verifying crc32...
  2027. Success: device replied with 0000000600000001000000000E which mean ok.
  2028.  
  2029. LAST PACKET REAPLY AFTER ms: 312.000000
  2030. Successfully read 0x4 bytes from handle.
  2031. Raw input [0x4]:
  2032.  
  2033. 00000000 00 00 00 00 ....
  2034.  
  2035. Finished.
  2036.  
  2037.  
  2038. ssd.sin uploaded sucessfully.
  2039.  
  2040. -------------------------------------------------------
  2041. Xperia Command Line Flasher
  2042.  
  2043. by Munjeni @ 2014-2017
  2044. -------------------------------------------------------
  2045. Device path: \\?\usb#vid_0fce&pid_adde#5&3879604a&0&5#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  2046. Class Description: Universal Serial Bus controllers
  2047. Device Instance Id: USB\VID_0FCE&PID_ADDE\5&3879604A&0&5
  2048.  
  2049. Found partition: 02
  2050. Sending command to bootloader to open partition: 02 ...
  2051. Opening ta...
  2052. Sending command...
  2053. Raw command[0xD]:
  2054.  
  2055. 00000000 00 00 00 09 00 00 00 03 00 00 00 01 12 .............
  2056.  
  2057. Successfully write 0xd bytes to handle.
  2058. Want open ta unit partition: 2
  2059. Successfully write 0x1 bytes to handle.
  2060. Ta unit partition argument writen.
  2061. CRC32[0x4]:
  2062.  
  2063. 00000000 EE 0E 61 2C ..a,
  2064.  
  2065. Writing crc32 for ta unit partition argument...
  2066. Successfully write 0x4 bytes to handle.
  2067. Successfully read 0xd bytes from handle.
  2068. Raw input [0xD]:
  2069.  
  2070. 00000000 00 00 00 09 00 00 00 01 00 00 00 00 0F .............
  2071.  
  2072. Verifying crc32...
  2073. success: device replied with 0000000900000001000000000F which mean ta unit partition: 2 is opened.
  2074.  
  2075. Successfully read 0x4 bytes from handle.
  2076. Raw input [0x4]:
  2077.  
  2078. 00000000 00 00 00 00 ....
  2079.  
  2080. Partition 02 opened.
  2081.  
  2082. Retrieved line of lenght: 17
  2083. Line lenght after trim: 14
  2084. Found unit: 00000907
  2085. Unit size: 01
  2086.  
  2087. <<-------------------- Retrieval finished! Found unit: 00000907, Unit size: 0001, Unit data:
  2088. 00000907[0x1]:
  2089.  
  2090. 00000000 00 .
  2091.  
  2092. ---------------------->> Writing ta unit data to phone...
  2093. Want write ta unit 00000907...
  2094.  
  2095. Sending command...
  2096. Command raw[0xD]:
  2097.  
  2098. 00000000 00 00 00 0D 00 00 00 03 00 00 00 09 0E .............
  2099.  
  2100. Successfully write 0xd bytes to handle.
  2101. Sending command...
  2102. Writing data into unit[0x4]:
  2103.  
  2104. 00000000 00 00 09 07 ....
  2105.  
  2106. Successfully write 0x9 bytes to handle.
  2107. CRC32[0x4]:
  2108.  
  2109. 00000000 91 86 44 2A ..D*
  2110.  
  2111. Writing crc32 for data...
  2112. Successfully write 0x4 bytes to handle.
  2113. Successfully read 0xd bytes from handle.
  2114. Raw input [0xD]:
  2115.  
  2116. 00000000 00 00 00 0D 00 00 00 01 00 00 00 00 13 .............
  2117.  
  2118. Verifying crc32...
  2119. success: device replied with 0000000D000000010000000013 which mean unit data is writen.
  2120.  
  2121. Successfully read 0x4 bytes from handle.
  2122. Raw input [0x4]:
  2123.  
  2124. 00000000 00 00 00 00 ....
  2125.  
  2126.  
  2127. Sending command to bootloader to close ta.
  2128.  
  2129. Closing ta unit partition: 2
  2130. Successfully write 0x11 bytes to handle.
  2131. Successfully read 0xd bytes from handle.
  2132. Raw input [0xD]:
  2133.  
  2134. 00000000 00 00 00 0A 00 00 00 01 00 00 00 00 12 .............
  2135.  
  2136. success: device replied with 0000000A000000010000000012 which mean ta unit partition is closed.
  2137.  
  2138. Successfully read 0x4 bytes from handle.
  2139. Raw input [0x4]:
  2140.  
  2141. 00000000 00 00 00 00 ....
  2142.  
  2143. -------------------------------------------------------
  2144. Xperia Command Line Flasher
  2145.  
  2146. by Munjeni @ 2014-2017
  2147. -------------------------------------------------------
  2148. Device path: \\?\usb#vid_0fce&pid_adde#5&3879604a&0&5#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  2149. Class Description: Universal Serial Bus controllers
  2150. Device Instance Id: USB\VID_0FCE&PID_ADDE\5&3879604A&0&5
  2151.  
  2152. Found partition: 02
  2153. Sending command to bootloader to open partition: 02 ...
  2154. Opening ta...
  2155. Sending command...
  2156. Raw command[0xD]:
  2157.  
  2158. 00000000 00 00 00 09 00 00 00 03 00 00 00 01 12 .............
  2159.  
  2160. Successfully write 0xd bytes to handle.
  2161. Want open ta unit partition: 2
  2162. Successfully write 0x1 bytes to handle.
  2163. Ta unit partition argument writen.
  2164. CRC32[0x4]:
  2165.  
  2166. 00000000 EE 0E 61 2C ..a,
  2167.  
  2168. Writing crc32 for ta unit partition argument...
  2169. Successfully write 0x4 bytes to handle.
  2170. Successfully read 0xd bytes from handle.
  2171. Raw input [0xD]:
  2172.  
  2173. 00000000 00 00 00 09 00 00 00 01 00 00 00 00 0F .............
  2174.  
  2175. Verifying crc32...
  2176. success: device replied with 0000000900000001000000000F which mean ta unit partition: 2 is opened.
  2177.  
  2178. Successfully read 0x4 bytes from handle.
  2179. Raw input [0x4]:
  2180.  
  2181. 00000000 00 00 00 00 ....
  2182.  
  2183. Partition 02 opened.
  2184.  
  2185. Retrieved line of lenght: 55
  2186. Line lenght after trim: 40
  2187. Found unit: 000008A4
  2188. Unit size: 0E
  2189.  
  2190. <<-------------------- Retrieval finished! Found unit: 000008A4, Unit size: 000E, Unit data:
  2191. 000008A4[0xE]:
  2192.  
  2193. 00000000 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ..............
  2194.  
  2195. ---------------------->> Writing ta unit data to phone...
  2196. Want write ta unit 000008A4...
  2197.  
  2198. Sending command...
  2199. Command raw[0xD]:
  2200.  
  2201. 00000000 00 00 00 0D 00 00 00 03 00 00 00 16 1F .............
  2202.  
  2203. Successfully write 0xd bytes to handle.
  2204. Sending command...
  2205. Writing data into unit[0x4]:
  2206.  
  2207. 00000000 00 00 08 A4 ....
  2208.  
  2209. Successfully write 0x16 bytes to handle.
  2210. CRC32[0x4]:
  2211.  
  2212. 00000000 25 55 6D 61 %Uma
  2213.  
  2214. Writing crc32 for data...
  2215. Successfully write 0x4 bytes to handle.
  2216. Successfully read 0xd bytes from handle.
  2217. Raw input [0xD]:
  2218.  
  2219. 00000000 00 00 00 0D 00 00 00 01 00 00 00 00 13 .............
  2220.  
  2221. Verifying crc32...
  2222. success: device replied with 0000000D000000010000000013 which mean unit data is writen.
  2223.  
  2224. Successfully read 0x4 bytes from handle.
  2225. Raw input [0x4]:
  2226.  
  2227. 00000000 00 00 00 00 ....
  2228.  
  2229.  
  2230. Sending command to bootloader to close ta.
  2231.  
  2232. Closing ta unit partition: 2
  2233. Successfully write 0x11 bytes to handle.
  2234. Successfully read 0xd bytes from handle.
  2235. Raw input [0xD]:
  2236.  
  2237. 00000000 00 00 00 0A 00 00 00 01 00 00 00 00 12 .............
  2238.  
  2239. success: device replied with 0000000A000000010000000012 which mean ta unit partition is closed.
  2240.  
  2241. Successfully read 0x4 bytes from handle.
  2242. Raw input [0x4]:
  2243.  
  2244. 00000000 00 00 00 00 ....
  2245.  
  2246. -------------------------------------------------------
  2247. Xperia Command Line Flasher
  2248.  
  2249. by Munjeni @ 2014-2017
  2250. -------------------------------------------------------
  2251. Device path: \\?\usb#vid_0fce&pid_adde#5&3879604a&0&5#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  2252. Class Description: Universal Serial Bus controllers
  2253. Device Instance Id: USB\VID_0FCE&PID_ADDE\5&3879604A&0&5
  2254.  
  2255. Found partition: 02
  2256. Sending command to bootloader to open partition: 02 ...
  2257. Opening ta...
  2258. Sending command...
  2259. Raw command[0xD]:
  2260.  
  2261. 00000000 00 00 00 09 00 00 00 03 00 00 00 01 12 .............
  2262.  
  2263. Successfully write 0xd bytes to handle.
  2264. Want open ta unit partition: 2
  2265. Successfully write 0x1 bytes to handle.
  2266. Ta unit partition argument writen.
  2267. CRC32[0x4]:
  2268.  
  2269. 00000000 EE 0E 61 2C ..a,
  2270.  
  2271. Writing crc32 for ta unit partition argument...
  2272. Successfully write 0x4 bytes to handle.
  2273. Successfully read 0xd bytes from handle.
  2274. Raw input [0xD]:
  2275.  
  2276. 00000000 00 00 00 09 00 00 00 01 00 00 00 00 0F .............
  2277.  
  2278. Verifying crc32...
  2279. success: device replied with 0000000900000001000000000F which mean ta unit partition: 2 is opened.
  2280.  
  2281. Successfully read 0x4 bytes from handle.
  2282. Raw input [0x4]:
  2283.  
  2284. 00000000 00 00 00 00 ....
  2285.  
  2286. Partition 02 opened.
  2287.  
  2288. Retrieved line of lenght: 17
  2289. Line lenght after trim: 14
  2290. Found unit: 00000964
  2291. Unit size: 01
  2292.  
  2293. <<-------------------- Retrieval finished! Found unit: 00000964, Unit size: 0001, Unit data:
  2294. 00000964[0x1]:
  2295.  
  2296. 00000000 00 .
  2297.  
  2298. ---------------------->> Writing ta unit data to phone...
  2299. Want write ta unit 00000964...
  2300.  
  2301. Sending command...
  2302. Command raw[0xD]:
  2303.  
  2304. 00000000 00 00 00 0D 00 00 00 03 00 00 00 09 0E .............
  2305.  
  2306. Successfully write 0xd bytes to handle.
  2307. Sending command...
  2308. Writing data into unit[0x4]:
  2309.  
  2310. 00000000 00 00 09 64 ...d
  2311.  
  2312. Successfully write 0x9 bytes to handle.
  2313. CRC32[0x4]:
  2314.  
  2315. 00000000 1F E6 39 DE ..9.
  2316.  
  2317. Writing crc32 for data...
  2318. Successfully write 0x4 bytes to handle.
  2319. Successfully read 0xd bytes from handle.
  2320. Raw input [0xD]:
  2321.  
  2322. 00000000 00 00 00 0D 00 00 00 01 00 00 00 00 13 .............
  2323.  
  2324. Verifying crc32...
  2325. success: device replied with 0000000D000000010000000013 which mean unit data is writen.
  2326.  
  2327. Successfully read 0x4 bytes from handle.
  2328. Raw input [0x4]:
  2329.  
  2330. 00000000 00 00 00 00 ....
  2331.  
  2332.  
  2333. Sending command to bootloader to close ta.
  2334.  
  2335. Closing ta unit partition: 2
  2336. Successfully write 0x11 bytes to handle.
  2337. Successfully read 0xd bytes from handle.
  2338. Raw input [0xD]:
  2339.  
  2340. 00000000 00 00 00 0A 00 00 00 01 00 00 00 00 12 .............
  2341.  
  2342. success: device replied with 0000000A000000010000000012 which mean ta unit partition is closed.
  2343.  
  2344. Successfully read 0x4 bytes from handle.
  2345. Raw input [0x4]:
  2346.  
  2347. 00000000 00 00 00 00 ....
  2348.  
  2349. -------------------------------------------------------
  2350. Xperia Command Line Flasher
  2351.  
  2352. by Munjeni @ 2014-2017
  2353. -------------------------------------------------------
  2354. Device path: \\?\usb#vid_0fce&pid_adde#5&3879604a&0&5#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  2355. Class Description: Universal Serial Bus controllers
  2356. Device Instance Id: USB\VID_0FCE&PID_ADDE\5&3879604A&0&5
  2357.  
  2358. Found partition: 02
  2359. Sending command to bootloader to open partition: 02 ...
  2360. Opening ta...
  2361. Sending command...
  2362. Raw command[0xD]:
  2363.  
  2364. 00000000 00 00 00 09 00 00 00 03 00 00 00 01 12 .............
  2365.  
  2366. Successfully write 0xd bytes to handle.
  2367. Want open ta unit partition: 2
  2368. Successfully write 0x1 bytes to handle.
  2369. Ta unit partition argument writen.
  2370. CRC32[0x4]:
  2371.  
  2372. 00000000 EE 0E 61 2C ..a,
  2373.  
  2374. Writing crc32 for ta unit partition argument...
  2375. Successfully write 0x4 bytes to handle.
  2376. Successfully read 0xd bytes from handle.
  2377. Raw input [0xD]:
  2378.  
  2379. 00000000 00 00 00 09 00 00 00 01 00 00 00 00 0F .............
  2380.  
  2381. Verifying crc32...
  2382. success: device replied with 0000000900000001000000000F which mean ta unit partition: 2 is opened.
  2383.  
  2384. Successfully read 0x4 bytes from handle.
  2385. Raw input [0x4]:
  2386.  
  2387. 00000000 00 00 00 00 ....
  2388.  
  2389. Partition 02 opened.
  2390.  
  2391. Retrieved line of lenght: 17
  2392. Line lenght after trim: 14
  2393. Found unit: 000009F6
  2394. Unit size: 01
  2395.  
  2396. <<-------------------- Retrieval finished! Found unit: 000009F6, Unit size: 0001, Unit data:
  2397. 000009F6[0x1]:
  2398.  
  2399. 00000000 01 .
  2400.  
  2401. ---------------------->> Writing ta unit data to phone...
  2402. Want write ta unit 000009F6...
  2403.  
  2404. Sending command...
  2405. Command raw[0xD]:
  2406.  
  2407. 00000000 00 00 00 0D 00 00 00 03 00 00 00 09 0E .............
  2408.  
  2409. Successfully write 0xd bytes to handle.
  2410. Sending command...
  2411. Writing data into unit[0x4]:
  2412.  
  2413. 00000000 00 00 09 F6 ....
  2414.  
  2415. Successfully write 0x9 bytes to handle.
  2416. CRC32[0x4]:
  2417.  
  2418. 00000000 38 4F BE 00 8O..
  2419.  
  2420. Writing crc32 for data...
  2421. Successfully write 0x4 bytes to handle.
  2422. Successfully read 0xd bytes from handle.
  2423. Raw input [0xD]:
  2424.  
  2425. 00000000 00 00 00 0D 00 00 00 01 00 00 00 00 13 .............
  2426.  
  2427. Verifying crc32...
  2428. success: device replied with 0000000D000000010000000013 which mean unit data is writen.
  2429.  
  2430. Successfully read 0x4 bytes from handle.
  2431. Raw input [0x4]:
  2432.  
  2433. 00000000 00 00 00 00 ....
  2434.  
  2435.  
  2436. Sending command to bootloader to close ta.
  2437.  
  2438. Closing ta unit partition: 2
  2439. Successfully write 0x11 bytes to handle.
  2440. Successfully read 0xd bytes from handle.
  2441. Raw input [0xD]:
  2442.  
  2443. 00000000 00 00 00 0A 00 00 00 01 00 00 00 00 12 .............
  2444.  
  2445. success: device replied with 0000000A000000010000000012 which mean ta unit partition is closed.
  2446.  
  2447. Successfully read 0x4 bytes from handle.
  2448. Raw input [0x4]:
  2449.  
  2450. 00000000 00 00 00 00 ....
  2451.  
  2452. -------------------------------------------------------
  2453. Xperia Command Line Flasher
  2454.  
  2455. by Munjeni @ 2014-2017
  2456. -------------------------------------------------------
  2457. Device path: \\?\usb#vid_0fce&pid_adde#5&3879604a&0&5#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  2458. Class Description: Universal Serial Bus controllers
  2459. Device Instance Id: USB\VID_0FCE&PID_ADDE\5&3879604A&0&5
  2460.  
  2461. Found partition: 02
  2462. Sending command to bootloader to open partition: 02 ...
  2463. Opening ta...
  2464. Sending command...
  2465. Raw command[0xD]:
  2466.  
  2467. 00000000 00 00 00 09 00 00 00 03 00 00 00 01 12 .............
  2468.  
  2469. Successfully write 0xd bytes to handle.
  2470. Want open ta unit partition: 2
  2471. Successfully write 0x1 bytes to handle.
  2472. Ta unit partition argument writen.
  2473. CRC32[0x4]:
  2474.  
  2475. 00000000 EE 0E 61 2C ..a,
  2476.  
  2477. Writing crc32 for ta unit partition argument...
  2478. Successfully write 0x4 bytes to handle.
  2479. Successfully read 0xd bytes from handle.
  2480. Raw input [0xD]:
  2481.  
  2482. 00000000 00 00 00 09 00 00 00 01 00 00 00 00 0F .............
  2483.  
  2484. Verifying crc32...
  2485. success: device replied with 0000000900000001000000000F which mean ta unit partition: 2 is opened.
  2486.  
  2487. Successfully read 0x4 bytes from handle.
  2488. Raw input [0x4]:
  2489.  
  2490. 00000000 00 00 00 00 ....
  2491.  
  2492. Partition 02 opened.
  2493.  
  2494. Retrieved line of lenght: 17
  2495. Line lenght after trim: 14
  2496. Found unit: 0000091A
  2497. Unit size: 01
  2498.  
  2499. <<-------------------- Retrieval finished! Found unit: 0000091A, Unit size: 0001, Unit data:
  2500. 0000091A[0x1]:
  2501.  
  2502. 00000000 00 .
  2503.  
  2504. ---------------------->> Writing ta unit data to phone...
  2505. Want write ta unit 0000091A...
  2506.  
  2507. Sending command...
  2508. Command raw[0xD]:
  2509.  
  2510. 00000000 00 00 00 0D 00 00 00 03 00 00 00 09 0E .............
  2511.  
  2512. Successfully write 0xd bytes to handle.
  2513. Sending command...
  2514. Writing data into unit[0x4]:
  2515.  
  2516. 00000000 00 00 09 1A ....
  2517.  
  2518. Successfully write 0x9 bytes to handle.
  2519. CRC32[0x4]:
  2520.  
  2521. 00000000 2E CE 55 6F ..Uo
  2522.  
  2523. Writing crc32 for data...
  2524. Successfully write 0x4 bytes to handle.
  2525. Successfully read 0xd bytes from handle.
  2526. Raw input [0xD]:
  2527.  
  2528. 00000000 00 00 00 0D 00 00 00 01 00 00 00 00 13 .............
  2529.  
  2530. Verifying crc32...
  2531. success: device replied with 0000000D000000010000000013 which mean unit data is writen.
  2532.  
  2533. Successfully read 0x4 bytes from handle.
  2534. Raw input [0x4]:
  2535.  
  2536. 00000000 00 00 00 00 ....
  2537.  
  2538.  
  2539. Sending command to bootloader to close ta.
  2540.  
  2541. Closing ta unit partition: 2
  2542. Successfully write 0x11 bytes to handle.
  2543. Successfully read 0xd bytes from handle.
  2544. Raw input [0xD]:
  2545.  
  2546. 00000000 00 00 00 0A 00 00 00 01 00 00 00 00 12 .............
  2547.  
  2548. success: device replied with 0000000A000000010000000012 which mean ta unit partition is closed.
  2549.  
  2550. Successfully read 0x4 bytes from handle.
  2551. Raw input [0x4]:
  2552.  
  2553. 00000000 00 00 00 00 ....
  2554.  
  2555. -------------------------------------------------------
  2556. Xperia Command Line Flasher
  2557.  
  2558. by Munjeni @ 2014-2017
  2559. -------------------------------------------------------
  2560. Device path: \\?\usb#vid_0fce&pid_adde#5&3879604a&0&5#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  2561. Class Description: Universal Serial Bus controllers
  2562. Device Instance Id: USB\VID_0FCE&PID_ADDE\5&3879604A&0&5
  2563.  
  2564. Found partition: 02
  2565. Sending command to bootloader to open partition: 02 ...
  2566. Opening ta...
  2567. Sending command...
  2568. Raw command[0xD]:
  2569.  
  2570. 00000000 00 00 00 09 00 00 00 03 00 00 00 01 12 .............
  2571.  
  2572. Successfully write 0xd bytes to handle.
  2573. Want open ta unit partition: 2
  2574. Successfully write 0x1 bytes to handle.
  2575. Ta unit partition argument writen.
  2576. CRC32[0x4]:
  2577.  
  2578. 00000000 EE 0E 61 2C ..a,
  2579.  
  2580. Writing crc32 for ta unit partition argument...
  2581. Successfully write 0x4 bytes to handle.
  2582. Successfully read 0xd bytes from handle.
  2583. Raw input [0xD]:
  2584.  
  2585. 00000000 00 00 00 09 00 00 00 01 00 00 00 00 0F .............
  2586.  
  2587. Verifying crc32...
  2588. success: device replied with 0000000900000001000000000F which mean ta unit partition: 2 is opened.
  2589.  
  2590. Successfully read 0x4 bytes from handle.
  2591. Raw input [0x4]:
  2592.  
  2593. 00000000 00 00 00 00 ....
  2594.  
  2595. Partition 02 opened.
  2596.  
  2597. Retrieved line of lenght: 14
  2598. Line lenght after trim: 12
  2599. Found unit: 000009B6
  2600. Error: corrupted unit! Skipping this unit!
  2601.  
  2602. Sending command to bootloader to close ta.
  2603.  
  2604. Closing ta unit partition: 2
  2605. Successfully write 0x11 bytes to handle.
  2606. Successfully read 0xd bytes from handle.
  2607. Raw input [0xD]:
  2608.  
  2609. 00000000 00 00 00 0A 00 00 00 01 00 00 00 00 12 .............
  2610.  
  2611. success: device replied with 0000000A000000010000000012 which mean ta unit partition is closed.
  2612.  
  2613. Successfully read 0x4 bytes from handle.
  2614. Raw input [0x4]:
  2615.  
  2616. 00000000 00 00 00 00 ....
  2617.  
  2618. -------------------------------------------------------
  2619. Xperia Command Line Flasher
  2620.  
  2621. by Munjeni @ 2014-2017
  2622. -------------------------------------------------------
  2623. Device path: \\?\usb#vid_0fce&pid_adde#5&3879604a&0&5#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  2624. Class Description: Universal Serial Bus controllers
  2625. Device Instance Id: USB\VID_0FCE&PID_ADDE\5&3879604A&0&5
  2626.  
  2627. Flashing boot delivery...
  2628. Error: boot_delivery.xml not exist in boot folder!
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement