GSMSERVER GSM Shop
GSM-Forum  

Welcome to the GSM-Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features.
Only registered members may post questions, contact other members or search our database of over 8 million posts.

Registration is fast, simple and absolutely free so please - Click to REGISTER!

If you have any problems with the registration process or your account login, please contact contact us .

Go Back   GSM-Forum > Product Support Sections > Hard/Software Products (Non-Official Support) > SETool2

Reply
 
LinkBack Thread Tools Display Modes
Old 09-21-2010, 23:08   #1 (permalink)
No Life Poster
 
:Aishur:'s Avatar
 
Join Date: Jun 2010
Age: 10
Posts: 2,708
Member: 1315677
Status: Offline
Thanks Meter: 1,227
Lightbulb Satio Repair


PART I

here is solution for omap3430 phones with valid hwconfig, but damaged trim area.

first, make flash readout with options: signed mode,use alternative security bypass.
start 80021000
len 00200000
"read as ssw" UNCHECKED

you will get trim area image readout.

now lets determine if hwconfig present and not mismatched.
get and hex editor (hiew, winhex or simular)

using editor search function, locate in readout bytes d3 07 00 00
now check attached picture.

if imei is your, then you can try to fix phone.
if imei is not your and you do not have backup - send phone to semc.

now, lets extract needed trim area units and build script.

1.
you need to copy binary data from "data start" till "data end" (inclusive)
then convert binary data to its ASCII values (with same winhex)

add script command to data

example, from attached example file read_80021000_00200000_35681003102941.bin:


Code:
tawrite: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
2. using editor search function, locate in readout bytes da 07 00 00.
extract binary data ( method very same as shown on picture ), add script command

Code:
tawrite:000207da3C3B2B0D083B7915E34D77D8E6435A1C2FFF36DC000000000000000000000000FF00000000000000000000000000000000000000000000000000000000000000000000000000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009A1063006AF6C5FA39B0BABBEE5A8EC78CD3380024CB85626500000000551E0001001E000055551E0001001E000055551E0001001E000055551E0001001E000055551E0001001E000055551E0001001E00005500000000000000000000000000000000000000000000000000000000106400283288EF30958212E12BEB1D148AD7C5EA57CB78290000000000000000000000000000000000000000000100

3. using editor search function, locate in readout bytes 51 08 00 00.
extract binary data ( method very same as shown on picture ), add script command

Code:
tawrite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
4. you have now 3 big string.
copy them into one file (each string should be on one line !)
add 4-th script command in the end of file

Code:
tawrite:0002FDE800
you have own fixup file.
proceed to
1. pda tab, u1_satio, options: signed mode,altbypass,format gdfs when writing
2. add to misc.edit satio_ta.zip, write gdfs
3. add to misc.edit fixup_35681003102941.txt, write script
4. your phone is locked, so unlock phone (signed mode+do full unlock)

ps.
get satio_ta.zip from any simular post.

notice, that is you will get simlock tampered message after fix procedure, you NEED to unlock phone using signature server.

Samples
Readout and fixup

the samples are taken from
U1i SATIO DEAD


PART II

Tools
WinHex v15.6
install and register it

Video Tutorial
Satio_fixup_video
  Reply With Quote
The Following 13 Users Say Thank You to :Aishur: For This Useful Post:
Show/Hide list of the thanked
Old 10-22-2010, 20:56   #2 (permalink)
No Life Poster
 
:Aishur:'s Avatar
 
Join Date: Jun 2010
Age: 10
Posts: 2,708
Member: 1315677
Status: Offline
Thanks Meter: 1,227
Complete folder (tools + sample + videos)

4shared - Satio fixup - shared folder - free file sharing and storage
  Reply With Quote
Old 10-23-2010, 04:56   #3 (permalink)
Freak Poster
 
andrew88's Avatar
 
Join Date: Jun 2006
Posts: 361
Member: 299797
Status: Online
Thanks Meter: 70
Excellent tuto, very very great........................
  Reply With Quote
Old 10-23-2010, 21:04   #4 (permalink)
Crazy Poster
 
Join Date: Jan 2010
Location: uae dubai
Age: 40
Posts: 54
Member: 1198634
Status: Offline
Sonork: mobile filed
Thanks Meter: 8
hi boss place send setool new setup//////////////////
  Reply With Quote
Old 10-23-2010, 21:29   #5 (permalink)
Crazy Poster
 
Join Date: Oct 2010
Location: china-gz
Posts: 53
Member: 1425701
Status: Offline
Sonork: 1578094
Thanks Meter: 10
Excellent tuto, very very great........................
  Reply With Quote
Old 10-23-2010, 21:32   #6 (permalink)
Crazy Poster
 
Join Date: Oct 2010
Location: china-gz
Posts: 53
Member: 1425701
Status: Offline
Sonork: 1578094
Thanks Meter: 10
unlock phone using signature server
  Reply With Quote
Old 10-31-2010, 15:28   #7 (permalink)
No Life Poster
 
Sudan-Mobiles's Avatar
 
Join Date: May 2006
Location: some times here ..
Posts: 1,535
Member: 281857
Status: Offline
Sonork: 100.1600687
Thanks Meter: 184
please fix this and i need it soon as possible ..
Attached Files
File Type: rar read_80021000_00200000_35681003450299.rar (13.5 KB, 525 views)
  Reply With Quote
Old 10-31-2010, 15:49   #8 (permalink)
No Life Poster
 
:Aishur:'s Avatar
 
Join Date: Jun 2010
Age: 10
Posts: 2,708
Member: 1315677
Status: Offline
Thanks Meter: 1,227
here is the fixup
Download read_80021000_00200000_35681003450299.rar from Sendspace.com - send big files the easy way
  Reply With Quote
The Following User Says Thank You to :Aishur: For This Useful Post:
Old 10-31-2010, 15:58   #9 (permalink)
No Life Poster
 
algerienbox's Avatar
 
Join Date: Sep 2007
Location: algeria
Posts: 2,350
Member: 591880
Status: Offline
Thanks Meter: 554
thanks for this video aishur
  Reply With Quote
Old 10-31-2010, 16:16   #10 (permalink)
No Life Poster
 
:Aishur:'s Avatar
 
Join Date: Jun 2010
Age: 10
Posts: 2,708
Member: 1315677
Status: Offline
Thanks Meter: 1,227
ooooopppppsssssssssss
Download fixup_35681003450299.rar from Sendspace.com - send big files the easy way



Hi algerienbox
you are welcome bro

Best regards
  Reply With Quote
The Following 2 Users Say Thank You to :Aishur: For This Useful Post:
Old 11-01-2010, 11:01   #11 (permalink)
No Life Poster
 
Sudan-Mobiles's Avatar
 
Join Date: May 2006
Location: some times here ..
Posts: 1,535
Member: 281857
Status: Offline
Sonork: 100.1600687
Thanks Meter: 184
i cant write your scrip check please
Quote:
RUNNING v 1.09/UNI
CARD SERIAL 00021726
USBFLASH DRIVER VERSION 02.02.00.05
SIGNED MODE (USING SERVER)
ALTERNATIVE SECURITY BYPASS ENABLED
CFG:110000000000
Processing script "F:\setool3\v1.088\read_80021000_00200000_35681003 450299.bin"...
PLEASE ATTACH TURNED OFF PHONE NOW
PRESS AND HOLD "GREEN" BUTTON...

EROM "R6A032" AID: 0001
SOFTWARE AID: FFFF
SIMLOCK STATE: "TAMPERED"
LOADER AID: 0002
FLASH ID: "0020/0040"
LOADER VERSION: "R4A012"

PHONE IMEI:35681003450299
Elapsed: 36 secs.
whats the problem ?.... thanks
  Reply With Quote
Old 11-01-2010, 11:05   #12 (permalink)
No Life Poster
 
Sudan-Mobiles's Avatar
 
Join Date: May 2006
Location: some times here ..
Posts: 1,535
Member: 281857
Status: Offline
Sonork: 100.1600687
Thanks Meter: 184
ok now done thanks for good help
Quote:
Processing script "F:\setool3\fixup_35681003450299.txt"...
PLEASE ATTACH TURNED OFF PHONE NOW
PRESS AND HOLD "GREEN" BUTTON...

EROM "R6A032" AID: 0001
SOFTWARE AID: FFFF
SIMLOCK STATE: "TAMPERED"
LOADER AID: 0002
FLASH ID: "0020/0040"
LOADER VERSION: "R4A012"

PHONE IMEI:35681003450299
Writing TA var 0002/07D3/02E1
Writing TA var 0002/07DA/024F
Writing TA var 0002/0851/0418
Writing TA var 0002/FDE8/0001
Elapsed: 31 secs.
  Reply With Quote
Old 11-01-2010, 11:37   #13 (permalink)
No Life Poster
 
Sudan-Mobiles's Avatar
 
Join Date: May 2006
Location: some times here ..
Posts: 1,535
Member: 281857
Status: Offline
Sonork: 100.1600687
Thanks Meter: 184
but not power its only vibration here flashing log
Quote:
SIGNED MODE (USING SERVER)
ALTERNATIVE SECURITY BYPASS ENABLED
CFG:110000000000
PLEASE ATTACH TURNED OFF PHONE NOW
PRESS AND HOLD "GREEN" BUTTON...

EROM "R6A032" AID: 0001
SOFTWARE AID: FFFF
SIMLOCK STATE: "TAMPERED"
LOADER AID: 0002
FLASH ID: "0020/0040"
LOADER VERSION: "R4A012"

PHONE IMEI:35681003450299
GOT SEED:74AAD06F80CA7135B0EF6D95
OMAP P96 AUTH PASSED
GOT SEED:CB3D868E6F80CA7135B0EF6D
CCPU P96 AUTH PASSED
writing "F:\setool3\flash file\sonny ericson\u1_satio\U1_M_EAST_N_AFR_CDF1227_7367.zip"
Processing package
F:\setool3\flash file\sonny ericson\u1_satio\U1_M_EAST_N_AFR_CDF1227_7367.zip

Processing ACPU files
PROCESSING: R1AA006_APP_SW_KOKORO_CRASHDATA_1227_0058_S1_SW_LI VE_1F6D_0001_XSR.software
FILE FLASHED OK
PROCESSING: R2AA004_USERDATA_FS_KOKORO_GENERIC_1225_8182_S1_SW _LIVE_1F6D_0001_XSR.software
FILE FLASHED OK
PROCESSING: R2AK006_CORE_OS_APP_SW_KOKORO_AP1_GENERIC_1218_950 0_S1_SW_LIVE_1F6D_0001_XSR.software
FILE FLASHED OK
PROCESSING: R2AK006_ROFS1_APP_SW_KOKORO_AP1_GENERIC_1218_9500_ S1_SW_LIVE_1F6D_0001_XSR.software
FILE FLASHED OK
PROCESSING: R2AK006_ROFS2_FS_KOKORO_M_EAST_N_AFR_1224_3812_S1_ SW_LIVE_1F6D_0001_XSR.software
FILE FLASHED OK
PROCESSING: R2B005_APP_SW_KOKORO_CCPU_GENERIC_1216_3377_S1_SW_ LIVE_1F6D_0001_SSW.software
FILE FLASHED OK
PROCESSING: R8A_CDF_ROFS3_U1i_CUST_IN_1227_7367_S1_CUST_LIVE_2 63F_0001_XSR.software
FILE FLASHED OK
Processing update files
PROCESSING: 0906121409_HB109_Open_MiscTA_Restore.ta.gdfs
Writing TA var 0002/0899/0001
Writing TA var 0002/0BB9/0006
Writing TA var 0002/10CF/0010
PROCESSING: 0909230823_HB109_Open_TA_Restore.ta.gdfs
Writing TA var 0001/0063/0001
Writing TA var 0001/0128/0001
Writing TA var 0001/0143/0001
Writing TA var 0001/0144/0001
Writing TA var 0001/0145/0001
Writing TA var 0001/0146/0001
Writing TA var 0001/018F/0001
Writing TA var 0001/0190/0001
Writing TA var 0001/0191/0001
Writing TA var 0001/0192/0001
Writing TA var 0001/01A3/0001
Writing TA var 0001/13BB/0001
PROCESSING: R8A_CDF_U1i_CUST_IN_1227_7367.ta.gdfs
Writing TA var 0001/0128/0001
Writing TA var 0001/13BB/0001
PROCESSING: R8A_R2AK006_CDF_INFO_U1i_CUST_IN_1227_7367.ta.gdfs
Writing TA var 0002/08A2/0003
Writing TA var 0002/089A/0010
Writing TA var 0002/08AD/0011
Writing TA var 0002/08B0/0011
Writing TA var 0002/089C/000C
Writing TA var 0002/08B1/0011
Writing TA var 0002/089D/000D
Writing TA var 0002/0BB8/0001
Writing TA var 0002/0BBA/000E
Elapsed: 161 secs.
  Reply With Quote
Old 11-21-2010, 18:20   #14 (permalink)
Freak Poster
 
Join Date: Apr 2008
Location: http://donganhgsm.net
Posts: 190
Member: 754345
Status: Offline
Thanks Meter: 32
Please fixup for me this file
read_80021000_00200000_35681003094515.rar - 4shared.com - online file sharing and storage - download
  Reply With Quote
Old 11-21-2010, 18:35   #15 (permalink)
No Life Poster
 
:Aishur:'s Avatar
 
Join Date: Jun 2010
Age: 10
Posts: 2,708
Member: 1315677
Status: Offline
Thanks Meter: 1,227
Sorry, I can't make it and I also deleted my video until we get exact starting addresses and lengths

Anyway you can ask at the official setool support.

Best regards
  Reply With Quote
The Following 2 Users Say Thank You to :Aishur: For This Useful Post:
Reply

Bookmarks

Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


Similar Threads
thread Thread Starter Forum Replies Last Post
Nokia "Contact Service" Repairer Dirk Nokia Legacy Phones ( DCT-1 ,2 ,3 ,L ) 5 10-04-2011 05:45
Repaired dead phone without backup Prodigal Nokia Legacy Phones ( DCT-1 ,2 ,3 ,L ) 3 07-29-2011 11:26
Contact Service Repairer 1.2 by Bartek Allen Nokia Legacy Phones ( DCT-1 ,2 ,3 ,L ) 4 02-23-2011 08:00
5110 Contact Service Repairer via MBUS/FBUS Allen Nokia Legacy Phones ( DCT-1 ,2 ,3 ,L ) 4 11-15-2010 03:17
New!! Nokia Flash Checksum And Contact Service Repair HookerGsM Main Sales Section 0 01-02-2001 09:12

 



All times are GMT +1. The time now is 17:26.



Powered by Searchlight © 2020 Axivo Inc.
vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2020 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2017 -
Page generated in 0.61989 seconds with 9 queries

SEO by vBSEO