i have create a vkp-file for my w200 (r4ha014 cid52),but how can i play this patch to my phone?
i have tried it with setool2lite, but it doesnt work
i have create a vkp-file for my w200 (r4ha014 cid52),but how can i play this patch to my phone?
i have tried it with setool2lite, but it doesnt work
i do it exactly like you have show me, but look what setool says to me:
Loaded 51 flash descriptors
Going to execute VKP script....
ChipID:8040,EMP protocol:0301
NEW SECURITY MODEL DETECTED
PHONE IS RED RETAIL PRODUCT
FLASH CID detected:52
Speed:921600
OTP LOCKED:1 CID:51 PAF:1 IMEI:35735501188504 CERT:RED
LDR:061205 1354 HAN_DB2012_FLASHLOADER_R2B012_CXC1326738
Flash ID check:897E
Flash props sent ok
Starting to process VKP patch script: D:\AutoPatcher\vkp\Remove_SIM_lock_W200_R4GB001.vk p
VKP script loaded OK. Lines: 6
Patch structure created OK. Determining blocks to read...
New block #0000 added: $44CC0000
Blocks selected OK. Reading blocks: 1
Block @ $44CC0000 read error. Have only: 00000000 bytes
Elapsed:105 secs.
You cannot apply any patch to 'real' W200 phone, because SETool2 Lite and XS++ doesn't support patching DB2012 phones.
And guys(DomagojX and interferej), the trick is that my tool can generate vkp patches from DB2010/2012 CID36/49/50/51/52 firmwares, but you can apply the generated patches to DB2010 CID36/49 only.:)
Edit:
Released version 1.2 which supports GSlide generated firmware files. For more info please check out the first post.
Last edited by simox; 12-26-2007 at 02:06 PM. Reason: New version(v1.2)
simox, are you working by the db2020 firmware? Are you near to break it?
Haven't found the right functions so far. It is hard(at least for me) to make a working unlock patch for DB2020 phones, because they are totally different from DB2000/2010/2012 firmwares.
If someone can help me to make a working "unlock" patch for any DB2020 phone, and/or has a SETool box and want to help me(for testing), do not hesitate to contact me...:)
Last edited by simox; 12-26-2007 at 06:46 PM.
There are currently 2 users browsing this thread. (0 members and 2 guests)