Tutorial on converting DB2020 cid49/cid51 to cid 52 and unlock
Since that the unlocking of DB2020 cid52 is free, you can unlock cid49/cid51 without using or wasting log credits by converting it to cid52.
Note:
Use DCU-60 cable.
Procedure:
1. identify phone first by ticking "Identify" button.
Code:
v0.914014/UNI
Card serial:000xxxxx
Loaded 51 flash descriptors
Open COM port OK
ChipID:9900,EMP protocol:0301
Speed:921600
Flash ID check:897E
Flash props sent ok
OTP LOCKED:1 CID:51 PAF:1 IMEI:35463701962686 CERT:N/A
FLASH CID:51 COLOR:RED
Model:K610i
MAPP CXC article: R1GB001 prgCXC1250374_GENERIC_TH
MAPP CXC version: R1GB001
Language Package:T_MOB_INT_A
CDA article: CDA102497/8
CDA version: R12A
Default article: cxc1250376
Default version: R1GB001
Extended LOCKED
Operator: MULTIPLE
RESTORATION FILE PRESENT FOR DETECTED FIRMWARE
Elapsed:5 secs.
2.goto "settings" tab then tick "use server for csca flash/unlock and empty user/password section
3. write this misc. files "DB2020_CID49_51_to_CID52" then tick "write script"
* you can find this file in script folder
Code:
SERVER SUPPORT ENABLED.
ChipID:9900,EMP protocol:0301
PHONE IS RED RETAIL PRODUCT
FLASH CID detected:51
Speed:921600
OTP LOCKED:1 CID:51 PAF:1 IMEI:35463701962686 CERT:RED
FLASH CID:51 COLOR:RED
PATCH:061205 1523 HANCXC9876543210_DB2020_MEM_PATCHER_R2A006 0
LDR:061201 1314 HANCXC1329129_DB2020_FLASHLOADER_R2A005
Flash ID check:897E
Flash props sent ok
LDR:070410 1557 HANCXC1250562_DB2020_CSLOADER_R3A009
loader startup: executed
loader GDFS startup: executed
loader filesystem startup: executed
loader unlock: executed
Will execute script now.
Writing GDFS var 0001:084E len:010B
Success
Phone detached
Elapsed:29 secs.
4. tick "identify" button again and the result is like this
Code:
SERVER SUPPORT ENABLED.
ChipID:9900,EMP protocol:0301
PHONE IS RED RETAIL PRODUCT
FLASH CID detected:52
Speed:921600
Flash ID check:897E
Flash props sent ok
OTP LOCKED:1 CID:51 PAF:1 IMEI:35463701962686 CERT:RED
FLASH CID:52 COLOR:RED
Model:K610i
MAPP CXC article: R1GB001 prgCXC1250374_GENERIC_TH
MAPP CXC version: R1GB001
Language Package:T_MOB_INT_A
CDA article: CDA102497/8
CDA version: R12A
Default article: cxc1250376
Default version: R1GB001
Extended LOCKED
Operator: MULTIPLE
RESTORATION FILE PRESENT FOR DETECTED FIRMWARE
SECURITY UNITS BACKUP CREATED.
Now your phone is cid52... The phone is ready to unlock..
Unlocking Procedure:
1. In "Settings" Tab tick "Complete phone after flash", "Unlock After Flash", "Use sever for csca unlock/flash", "Enable alternative security bypass" and empty user/password area.
2. Add flash files Main & fs (you need to put main & fs files if you don't have the same files that the phone is presently using, but if you have files then you can use the main file only.)
3. then click "Flash" button and follow all instructions and wait until it finished.
Code:
SERVER SUPPORT ENABLED.
ALTERNATIVE SECURITY BYPASS ENABLED.
ChipID:9900,EMP protocol:0301
PHONE IS RED RETAIL PRODUCT
FLASH CID detected:52
Speed:921600
OTP LOCKED:1 CID:51 PAF:1 IMEI:35463701962686 CERT:RED
FLASH CID:52 COLOR:RED
PATCH:061205 1523 HANCXC9876543210_DB2020_MEM_PATCHER_R2A006 0
LDR:061201 1314 HANCXC1329129_DB2020_FLASHLOADER_R2A005
Flash ID check:897E
Flash props sent ok
CID52 BYPASS PROCEDURE STARTED
Processing part1...
Processing part2...
Processing part3....
OTP LOCKED:1 CID:51 PAF:1 IMEI:35463701962686 CERT:RED
FLASH CID:52 COLOR:RED
PATCH:061205 1523 HANCXC9876543210_DB2020_MEM_PATCHER_R2A006 0
LDR:061201 1314 HANCXC1329129_DB2020_FLASHLOADER_R2A005
Flash ID check:897E
Flash props sent ok
REMOVE CABLE FROM PHONE
REMOVE BATTERY FROM PHONE, THEN INSERT IT BACK
HOLD "C" BUTTON AND ATTACH AGAIN
CID52 BYPASS PROCEDURE FINISHED
ChipID:9900,EMP protocol:0301
PHONE IS RED RETAIL PRODUCT
FLASH CID detected:52
Speed:921600
Trying to launch embedded bootloader...
Embedded flashloader:
DB2020_PRELOADER_FOR_SETOOL2
Flash ID check:897E
Flash props sent ok
writing D:\Downloads\setool3 flash files\k610\cid52\R1JG001_1250540_CHINA_TH.ssw
CURRENT FLASH FILE CID:52
SSW uses complete hash, hash len is:9200
Will flash 460 blocks...
SSW loading returns:0
writing D:\Downloads\setool3 flash files\k610\cid52\R1JG001_FS_APAC_TH_RED_CID52.ssw
CURRENT FLASH FILE CID:52
SSW uses complete hash, hash len is:2740
Will flash 137 blocks...
SSW loading returns:0
full sig complete.
USERCODE RESET TO "0000"
Searching...
Firmware lock check determined.
loader startup: executed
loader GDFS startup: executed
loader filesystem startup: executed
loader unlock: executed
writing tpa/preset/custom/C3_PCA_G3v2.cer
writing tpa/preset/custom/CONTENT_DOWNLOAD_HOOK_2.itm
writing tpa/preset/custom/customize.xml
writing tpa/preset/custom/DESKTOP_HOOK_2.itm
writing tpa/preset/custom/Entrust.net Root Certificate.cer
writing tpa/preset/custom/Entrust.net_WTLS_Root_Certificate.wcrt
writing tpa/preset/custom/FM_PICTURES_HOOK_3.itm
writing tpa/preset/custom/FM_SOUNDS_HOOK_3.itm
writing tpa/preset/custom/FM_THEMES_HOOK_3.itm
writing tpa/preset/custom/FM_VIDEOS_HOOK_3.itm
writing tpa/preset/custom/GAMES_HOOK_3.itm
writing tpa/preset/custom/GTE_CyberTrust_Root.cer
writing tpa/preset/custom/GTE_Cybe_Trust_Root_WTLS.wcrt
writing tpa/preset/custom/Root.cer
writing tpa/preset/custom/SEMC_E2E_Root_CA.crt
writing tpa/preset/custom/SETT_RINGTONE_HOOK_3.itm
writing tpa/preset/custom/ThawtePremium.der
writing tpa/preset/custom/ThawteServerCA.cer
writing tpa/preset/custom/Utiroot.cer
writing tpa/preset/custom/VeriSignClass3Root.cer
writing tpa/preset/custom/Verisign_Class_3_CA_WTLS.wcrt
Phone detached
Elapsed:989 secs.
You have now working unlocked DB2020 cid52 phones....
Happy unlocking.
Posted by
Hilman Anshori
at
4:12 AM
ALL AVAILABLE bypass packages AND ALL RESETS FILE HERE
JUST download and extract in to ur ///:\SETool\rest and enjoy.
http://rapidshare.com/files/12187690...part1.rar.html
http://rapidshare.com/files/12208152...part2.rar.html
http://rapidshare.com/files/12209344...part3.rar.html
http://rapidshare.com/files/122107118/rest.part4.rar
Posted by
Hilman Anshori
at
12:24 AM
6/11/2008 9:21:45 AM v0.914031/UNI
6/11/2008 9:21:45 AM CARD SERIAL: 00032462
6/11/2008 9:21:45 AM Loaded 51 flash descriptors
6/11/2008 9:22:30 AM SIGNED MODE (USING SERVER).
6/11/2008 9:22:30 AM ALTERNATIVE SECURITY BYPASS ENABLED.
6/11/2008 9:24:51 AM ChipID:9900,EMP protocol:0301
6/11/2008 9:24:51 AM
6/11/2008 9:24:51 AM PHONE IS RED RETAIL PRODUCT
6/11/2008 9:24:52 AM FLASH CID detected:53
6/11/2008 9:24:52 AM Speed:115200
6/11/2008 9:24:52 AM Flash ID check:897E
6/11/2008 9:24:52 AM Flash props sent ok
6/11/2008 9:24:52 AM OTP LOCKED:1 CID:51 PAF:1 IMEI:35934601056997 CERT:RED
6/11/2008 9:24:52 AM FLASH CID:53 COLOR:RED
6/11/2008 9:24:54 AM
6/11/2008 9:24:54 AM Model:K550i
6/11/2008 9:24:54 AM MAPP CXC article: R6BC002 prgCXC1250669_GENERIC_LI
6/11/2008 9:24:54 AM MAPP CXC version: R6BC002
6/11/2008 9:24:54 AM Language Package:VIVO
6/11/2008 9:24:54 AM CDA article: CDA102743/132
6/11/2008 9:24:54 AM CDA version: R10A
6/11/2008 9:24:54 AM Default article: cxc1250671
6/11/2008 9:24:54 AM Default version: R6BC002
6/11/2008 9:24:54 AM PROVIDER: 000-00
6/11/2008 9:24:54 AM Network LOCKED
6/11/2008 9:24:54 AM
6/11/2008 9:24:54 AM RESTORATION FILE PRESENT FOR DETECTED FIRMWARE
6/11/2008 9:24:54 AM
6/11/2008 9:24:54 AM BYPASS PACKAGE PRESENT FOR DETECTED FIRMWARE
6/11/2008 9:24:54 AM
6/11/2008 9:24:54 AM SECURITY UNITS BACKUP CREATED.
6/11/2008 9:24:54 AM Elapsed: 144 secs.
6/11/2008 10:25:18 AM SIGNED MODE (USING SERVER).
6/11/2008 10:25:18 AM ALTERNATIVE SECURITY BYPASS ENABLED.
6/11/2008 10:25:28 AM ChipID:9900,EMP protocol:0301
6/11/2008 10:25:28 AM
6/11/2008 10:25:28 AM PHONE IS RED RETAIL PRODUCT
6/11/2008 10:25:28 AM FLASH CID detected:53
6/11/2008 10:25:28 AM Speed:115200
6/11/2008 10:25:29 AM OTP LOCKED:1 CID:51 PAF:1 IMEI:35934601056997 CERT:RED
6/11/2008 10:25:29 AM FLASH CID:53 COLOR:RED
6/11/2008 10:25:30 AM PATCH:071120 1355
HANCXC9876543210_DB2020_MEM_PATCHER_R2A012 0
6/11/2008 10:25:30 AM LDR:080108 1810 ESGCXC1329129_DB2020_FLASHLOADER_R2A015
6/11/2008 10:25:30 AM Flash ID check:897E
6/11/2008 10:25:30 AM Flash props sent ok
6/11/2008 10:25:32 AM LDR:070904 1245 AN2CXC1250562_DB2020_CSLOADER_R3A013
6/11/2008 10:25:32 AM loader startup: executed
6/11/2008 10:25:50 AM loader GDFS startup: executed
6/11/2008 10:26:03 AM loader filesystem startup: executed
6/11/2008 10:26:03 AM loader unlock: executed
6/11/2008 10:26:09 AM
6/11/2008 10:26:09 AM DISCONNECT PHONE NOW
6/11/2008 10:26:09 AM INSERT SIM CARD, FULLY TURN PHONE ON AND ATTACH AGAIN
6/11/2008 10:26:09 AM BE SURE THAT YOU SET PHONE IN "PHONE MODE"
6/11/2008 10:26:09 AM IF ASKED, INSTALL PHONE DRIVERS
6/11/2008 10:26:09 AM
6/11/2008 10:26:09 AM SEARCHING FOR PHONE, "STOP" TO ABORT
6/11/2008 10:28:26 AM PHONE FOUND AT COM97
6/11/2008 10:28:34 AM PHONE READY TO PROCEED
6/11/2008 10:28:40 AM EXECUTOR STARTED
6/11/2008 10:28:40 AM
6/11/2008 10:28:40 AM REMOVE CABLE FROM PHONE
6/11/2008 10:28:40 AM REMOVE BATTERY FROM PHONE, THEN INSERT IT BACK
6/11/2008 10:28:40 AM THEN PRESS "READY"
6/11/2008 10:29:06 AM
6/11/2008 10:29:07 AM bypassing security...
6/11/2008 10:29:09 AM ChipID:9900,EMP protocol:0301
6/11/2008 10:29:09 AM
6/11/2008 10:29:09 AM PHONE IS RED RETAIL PRODUCT
6/11/2008 10:29:09 AM FLASH CID detected:53
6/11/2008 10:29:10 AM Speed:115200
6/11/2008 10:29:10 AM Trying to launch embedded bootloader...
6/11/2008 10:29:10 AM INT LDRB2020_PRELOADER_FOR_SETOOL2
6/11/2008 10:29:11 AM Flash ID check:897E
6/11/2008 10:29:11 AM Flash props sent ok
6/11/2008 10:29:20 AM FOUND: R6BC002_CXC1250669_GENERIC_LI
6/11/2008 10:29:20 AM Restore from:R6BC002_CXC1250669_GENERIC_LI
6/11/2008 10:29:31 AM writing D:\zz-things\setool3\SE-Flashs\K550\R6BC002_1250669_GENERIC_LI_CID53.ssw
6/11/2008 10:29:38 AM CURRENT FLASH FILE CID:53
6/11/2008 10:29:38 AM SSW uses complete hash, hash len is:9200
6/11/2008 10:29:39 AM Will flash 460 blocks...
6/11/2008 1035 AM SSW loading returns:0
6/11/2008 1035 AM writing D:\zz-things\setool3\SE-Flashs\K550\r6bc002_fs_america_2_li_red_CID53.ssw
6/11/2008 1039 AM CURRENT FLASH FILE CID:53
6/11/2008 1039 AM SSW uses complete hash, hash len is:3300
6/11/2008 1039 AM Will flash 165 blocks...
6/11/2008 1004 AM SSW loading returns:0
6/11/2008 1005 AM full sig complete.
6/11/2008 1005 AM USERCODE RESET TO "0000"
6/11/2008 1005 AM Searching...
6/11/2008 1007 AM Firmware SIMLOCK check determined.
6/11/2008 1016 AM LDR:
060426 1726
HANCXC1329133_DB2020_FILESYSTEMLOADER_P5G
6/11/2008 1016 AM loader startup: executed
6/11/2008 1019 AM loader GDFS startup: executed
6/11/2008 1022 AM loader filesystem startup: executed
6/11/2008 1022 AM loader unlock: executed
6/11/2008 1022 AM writing tpa/preset/custom/C3_PCA_G3v2.cer
6/11/2008 1022 AM writing tpa/preset/custom/CONTENT_DOWNLOAD_HOOK_2.itm
6/11/2008 1022 AM writing tpa/preset/custom/customize.xml
6/11/2008 1022 AM writing tpa/preset/custom/DESKTOP_HOOK_2.itm
6/11/2008 1022 AM writing tpa/preset/custom/Entrust.net Root Certificate.cer
6/11/2008 1022 AM writing tpa/preset/custom/Entrust.net_WTLS_Root_Certificate.wcrt
6/11/2008 1022 AM writing tpa/preset/custom/FM_PICTURES_HOOK_3.itm
6/11/2008 1022 AM writing tpa/preset/custom/FM_SOUNDS_HOOK_3.itm
6/11/2008 1022 AM writing tpa/preset/custom/FM_THEMES_HOOK_3.itm
6/11/2008 1023 AM writing tpa/preset/custom/FM_VIDEOS_HOOK_3.itm
6/11/2008 1023 AM writing tpa/preset/custom/GAMES_HOOK_3.itm
6/11/2008 1023 AM writing tpa/preset/custom/GTE_CyberTrust_Root.cer
6/11/2008 1023 AM writing tpa/preset/custom/GTE_Cybe_Trust_Root_WTLS.wcrt
6/11/2008 1023 AM writing tpa/preset/custom/Root.cer
6/11/2008 1023 AM writing tpa/preset/custom/SEMC_E2E_Root_CA.crt
6/11/2008 1023 AM writing tpa/preset/custom/SETT_RINGTONE_HOOK_3.itm
6/11/2008 1023 AM writing tpa/preset/custom/ThawtePremium.der
6/11/2008 1023 AM writing tpa/preset/custom/ThawteServerCA.cer
6/11/2008 1023 AM writing tpa/preset/custom/Utiroot.cer
6/11/2008 1023 AM writing tpa/preset/custom/VeriSignClass3Root.cer
6/11/2008 1023 AM writing tpa/preset/custom/Verisign_Class_3_CA_WTLS.wcrt
6/11/2008 1024 AM Phone detached
6/11/2008 1026 AM Elapsed: 608 secs.
Posted by
Hilman Anshori
at
11:05 AM