GSM Shop GSM Shop
GSM-Forum  

Welcome to the GSM-Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features.
Only registered members may post questions, contact other members or search our database of over 8 million posts.

Registration is fast, simple and absolutely free so please - Click to REGISTER!

If you have any problems with the registration process or your account login, please contact contact us .

Go Back   GSM-Forum > Product Support Sections > No More Supported Solutions (Dead Products) > No More Supported H/W Products > MXKEY (by Alim Hape) > MXKEY Nokia Flasher and Unlocker (by Alim Hape)


Reply
 
LinkBack Thread Tools Display Modes
Old 01-18-2012, 16:10   #1 (permalink)
No Life Poster
 
micmac's Avatar
 
Join Date: Mar 2002
Location: tunis,tunisia
Age: 48
Posts: 1,450
Member: 10396
Status: Offline
Thanks Meter: 32
Connection timed out (ANSWERED)


SERVER->MXKEY - BLADE X at host2, agent version 1.2 revision 0.2

Authenticating using [MX] security server ...
Connecting to server[main.mxkey.biz] ...Connection timed out
Connecting to server[main.mxkey.biz] ...Connection timed out
Connecting to server[main.mxkey.biz] ...Connection timed out
Retrying ...
SERVER->MXKEY - BLADE X at host2, agent version 1.2 revision 0.2
  Reply With Quote
Old 01-18-2012, 16:35   #2 (permalink)
No Life Poster
 
Sucre79's Avatar
 
Join Date: Oct 2010
Location: Poland (3 City)
Posts: 656
Member: 1413902
Status: Offline
Sonork: 100.1611698
Thanks Meter: 143
try to disable antyvir or windows firewall and try again
  Reply With Quote
Old 01-18-2012, 17:16   #3 (permalink)
No Life Poster
 
micmac's Avatar
 
Join Date: Mar 2002
Location: tunis,tunisia
Age: 48
Posts: 1,450
Member: 10396
Status: Offline
Thanks Meter: 32
Nokia 5700 securitytest failed !



Phone type: RM-230 (Nokia 5700)
SW version: V 03.29 10-05-07 RM-230 (c) Nokia
Imei plain: 35396401197358-3
Product code: 0548931
Battery voltage: 4645 mV, current: 97 mA
ApeCoreSw: 03.29
Language Pack:
- not available.

SLPA ver[1]: PA_SL (15 digit NCK)

SIMLOCK seems to be valid
SUPERDONGLE_KEY[MX] seems to be valid
CMLA_KEY seems to be valid
WMDRM_PD seems to be valid
SECURITY_TEST failed!


Imei net: 353964011973583
Version: SIMLOCK SERVER
Counter: 0/3, 0/10

CONFIG_DATA: 2440700000000000
PROFILE_BITS: 0000000000000000

BLOCK1: 1=OPEN, 2=OPEN, 3=OPEN, 4=OPEN, 5=OPEN
BLOCK2: 1=OPEN, 2=OPEN, 3=OPEN, 4=OPEN, 5=OPEN
BLOCK3: 1=OPEN, 2=OPEN, 3=OPEN, 4=OPEN, 5=OPEN
BLOCK4: 1=OPEN, 2=OPEN, 3=OPEN, 4=OPEN, 5=OPEN
BLOCK5: 1=OPEN, 2=OPEN, 3=OPEN, 4=OPEN, 5=OPEN
BLOCK6: 1=OPEN, 2=OPEN, 3=OPEN, 4=OPEN, 5=OPEN
BLOCK7: 1=OPEN, 2=OPEN, 3=OPEN, 4=OPEN, 5=OPEN


CMT Data :
SYSTEM ASIC ID: 000000010000022600010006400C192101011103 [RAPIDO3G ver: 1.11]
EM0 ID: 00000295
EM1 ID: 00000B22
PUBLIC ID: 20100115B65400583BD9007EAE0132C63A383404
ASIC MODE ID: 00
ROOT KEY HASH: 9A28E119033B91D14D22838C86D0D53C
ROM ID: F2C6EBADC86E6189
SecondaryBoot: RAPIDOv11_2nd.fg [BB5] version: 11.34.0 revision: 2.0 size: 0x3B80
Supported Ids: 0003192101001203, 000C192101001203, 4003192101001203, 400C192101001203, 0003192101002003, 000C192101002003, 4003192101002003, 400C192101002003, 4003192101011103, 400C192101011103, 4003192101021103, 400C192101021103, 4003192101031103, 400C192101031103, 4003192101011105, 400C192101011105, 400C192101021105, 400C192101031105, 4003192101051103, 400C192101051103, 400C192101051105, 4003192101051105
eBB5ProtocolType: NEW
TransmissionMode: DDR&TX2
Storage0: 0000 0000 - 0000 0000 type: RAM, asic:CMT
Storage1: FFFF 0000 - 0000 0000 type: MMC, asic:CMT
Storage2: 0400 0000 - 0000 0000 [unused/removed] type: FLASH,NOR, asic:CMT
Storage3: 0000 0001 - 0000 0000 [unused/removed] type: FLASH,NOR, asic:CMT
Storage4: 00EC 0030 - 0000 0121 [Samsung K5W1G13ACM-DJ60,1 Gbits] type: FLASH,MuxOneNAND, asic:CMT
Suggested algorithm: XSR 1.5
Algorithm: RAPIDOv11_XSR15_alg.fg [XSR 1.5] version: 11.34.0 revision: 2.0 size: 0x8FE30
Supported Ids: 0003192101001203, 000C192101001203, 4003192101001203, 400C192101001203, 0003192101002003, 000C192101002003, 4003192101002003, 400C192101002003, 4003192101011103, 400C192101011103, 4003192101021103, 400C192101021103, 4003192101031103, 400C192101031103, 4003192101011105, 400C192101011105, 400C192101021105, 400C192101031105, 4003192101051103, 400C192101051103, 400C192101051105, 4003192101051105
TransmissionMode: DDR&TX2
FUR: Adding Asic CMT as client OK
CMT PAPUBKEYS HASH: 3D66090E94F3701646DA91CCD35BBAC22E5CBF73
Reading CMT NPC (0x168 bytes).
Original Product Code: 0548789
Reading CMT VARIANT (0x0 bytes).
Reading CMT CCC (0x160 bytes).
Product Code: 0548789
CCC seems to be valid
Reading CMT HWC (0xD4 bytes).
Product Code: 0548789
HWC seems to be valid
  Reply With Quote
Old 01-18-2012, 17:18   #4 (permalink)
No Life Poster
 
micmac's Avatar
 
Join Date: Mar 2002
Location: tunis,tunisia
Age: 48
Posts: 1,450
Member: 10396
Status: Offline
Thanks Meter: 32
MXKEY [MxKey Team HTI Flasher Interface (WinUSB) 4], SN: C0854B02
Using device: HTI, FW ver: 00.50, SN: 00002D57
Connection status: UHCI:HUB:USB 2.00 (Full-speed)
Driver: WinUSB, ver: 3.5.0.0
Module ver: 1.0.0.19798(05-01-2012), Library ver: 1.0.0.13703(05-01-2012)

Phone type: RM-230 (Nokia 5700)
SW version: V 03.29 10-05-07 RM-230 (c) Nokia
ApeCoreSw: 03.29

Using cached productData.
PUBLIC ID: 20100115B65400583BD9007EAE0132C63A383404
PRIVATE ID: 34C7007488FC6CCE76B922C8542E80F54DB29F9F
SUPERDONGLE authorized !
Writing PM from Node ...
Section: 1
- Key: 0, size 114 bytes written.
- Key: 2, size 98 bytes written.
- Key: 4, size 110 bytes written.
- Key: 5, size 4 bytes written.
- Key: 6, size 98 bytes written.
- Key: 8, size 110 bytes written.
- Key: 13, size 98 bytes written.
- Key: 16, size 98 bytes written.
- Key: 18, size 98 bytes written.
- Key: 20, size 98 bytes written.
- Key: 22, size 16 bytes written.
- Key: 23, size 4 bytes written.
- Key: 24, size 84 bytes written.
- Key: 25, size 4 bytes written.
- Key: 26, size 110 bytes written.
- Key: 28, size 98 bytes written.
- Key: 29, size 10 bytes written.
- Key: 31, size 98 bytes written.
- Key: 33, size 36 bytes written.
- Key: 34, size 80 bytes written.
- Key: 44, size 182 bytes written.
- Key: 46, size 64 bytes written.
Section: 2
- Key: 0, size 440 bytes written.
Section: 4
- Key: 1, size 16 bytes written.
- Key: 3, size 10 bytes written.
- Key: 4, size 8 bytes written.
- Key: 5, size 8 bytes written.
- Key: 9, size 5 bytes written.
- Key: 28, size 2 bytes written.
Section: 8
- Key: 0, size 12 bytes written.
- Key: 1, size 12 bytes written.
- Key: 2, size 128 bytes written.
- Key: 3, size 128 bytes written.
- Key: 7, size 8 bytes written.
Section: 11
- Key: 0, size 4 bytes written.
- Key: 1, size 4 bytes written.
- Key: 2, size 4 bytes written.
- Key: 3, size 4 bytes written.
- Key: 4, size 1 byte written.
- Key: 5, size 6 bytes written.
- Key: 6, size 1 byte written.
- Key: 7, size 2 bytes written.
- Key: 8, size 2 bytes written.
- Key: 9, size 2 bytes written.
- Key: 10, size 2 bytes written.
- Key: 11, size 2 bytes written.
- Key: 12, size 1 byte written.
- Key: 13, size 1 byte written.
- Key: 14, size 1 byte written.
- Key: 15, size 1 byte written.
- Key: 16, size 1 byte written.
- Key: 17, size 1 byte written.
- Key: 18, size 1 byte written.
- Key: 19, size 2 bytes written.
- Key: 20, size 2 bytes written.
- Key: 21, size 1 byte written.
- Key: 22, size 1 byte written.
- Key: 23, size 4 bytes written.
- Key: 24, size 4 bytes written.
- Key: 25, size 2 bytes written.
- Key: 26, size 2 bytes written.
- Key: 27, size 2 bytes written.
- Key: 28, size 2 bytes written.
- Key: 29, size 1 byte written.
- Key: 30, size 1 byte written.
- Key: 31, size 1 byte written.
- Key: 32, size 1 byte written.
- Key: 33, size 1 byte written.
- Key: 34, size 1 byte written.
- Key: 35, size 1 byte written.
- Key: 36, size 1 byte written.
- Key: 37, size 1 byte written.
- Key: 38, size 2 bytes written.
- Key: 39, size 2 bytes written.
- Key: 40, size 2 bytes written.
- Key: 41, size 2 bytes written.
- Key: 42, size 2 bytes written.
- Key: 43, size 4 bytes written.
- Key: 44, size 4 bytes written.
- Key: 45, size 4 bytes written.
- Key: 46, size 1 byte written.
- Key: 47, size 16 bytes written.
- Key: 48, size 2 bytes written.
- Key: 49, size 2 bytes written.
- Key: 50, size 20 bytes written.
- Key: 51, size 10 bytes written.
- Key: 52, size 2 bytes written.
- Key: 53, size 20 bytes written.
- Key: 54, size 10 bytes written.
- Key: 55, size 1 byte written.
- Key: 56, size 1 byte written.
- Key: 57, size 1 byte written.
- Key: 58, size 1 byte written.
- Key: 59, size 1 byte written.
- Key: 60, size 1 byte written.
- Key: 61, size 1 byte written.
- Key: 62, size 1 byte written.
- Key: 63, size 1 byte written.
- Key: 64, size 1 byte written.
- Key: 65, size 1 byte written.
- Key: 66, size 32 bytes written.
- Key: 67, size 32 bytes written.
- Key: 68, size 2 bytes written.
- Key: 69, size 2 bytes written.
- Key: 70, size 2 bytes written.
- Key: 71, size 2 bytes written.
- Key: 72, size 2 bytes written.
- Key: 73, size 2 bytes written.
- Key: 74, size 2 bytes written.
- Key: 75, size 2 bytes written.
- Key: 76, size 2 bytes written.
- Key: 77, size 2 bytes written.
- Key: 78, size 2 bytes written.
- Key: 79, size 2 bytes written.
- Key: 80, size 2 bytes written.
- Key: 81, size 2 bytes written.
- Key: 82, size 2 bytes written.
- Key: 83, size 2 bytes written.
- Key: 84, size 2 bytes written.
- Key: 85, size 2 bytes written.
- Key: 86, size 2 bytes written.
- Key: 87, size 2 bytes written.
- Key: 88, size 2 bytes written.
- Key: 89, size 2 bytes written.
- Key: 90, size 2 bytes written.
- Key: 91, size 2 bytes written.
- Key: 92, size 2 bytes written.
- Key: 93, size 2 bytes written.
- Key: 94, size 2 bytes written.
- Key: 95, size 2 bytes written.
- Key: 96, size 2 bytes written.
- Key: 97, size 2 bytes written.
- Key: 98, size 2 bytes written.
- Key: 99, size 2 bytes written.
- Key: 100, size 2 bytes written.
- Key: 101, size 2 bytes written.
- Key: 102, size 2 bytes written.
- Key: 103, size 2 bytes written.
- Key: 104, size 2 bytes written.
- Key: 105, size 2 bytes written.
- Key: 106, size 2 bytes written.
- Key: 107, size 2 bytes written.
- Key: 108, size 2 bytes written.
- Key: 109, size 2 bytes written.
- Key: 110, size 2 bytes written.
- Key: 111, size 2 bytes written.
- Key: 112, size 2 bytes written.
- Key: 113, size 2 bytes written.
- Key: 114, size 2 bytes written.
- Key: 115, size 2 bytes written.
- Key: 116, size 4 bytes written.
- Key: 117, size 4 bytes written.
- Key: 118, size 1 byte written.
- Key: 119, size 4 bytes written.
- Key: 120, size 4 bytes written.
- Key: 121, size 4 bytes written.
- Key: 122, size 4 bytes written.
- Key: 123, size 16 bytes written.
- Key: 124, size 4 bytes written.
- Key: 125, size 2 bytes written.
- Key: 126, size 2 bytes written.
- Key: 127, size 1437 bytes written.
Section: 12
- Key: 0, size 102 bytes written.
Section: 26
- Key: 0, size 16 bytes written.
- Key: 1, size 68 bytes written.
Section: 31
- Key: 4, size 20 bytes written.
Section: 44
- Key: 0, size 1 byte written.
Section: 50
- Key: 0, size 2 bytes written.
Section: 54
- Key: 0, size 2 bytes written.
Section: 88
- Key: 0, size 36 bytes written.
Section: 96
- Key: 0, size 24 bytes written.
Section: 107
- Key: 0, size 21 bytes written.
- Key: 1, size 79 bytes written.
- Key: 2, size 79 bytes written.
- Key: 3, size 70 bytes written.
- Key: 25, size 132 bytes written.
Section: 117
- Key: 0, size 4 bytes written.
- Key: 1, size 3 bytes written.
- Key: 2, size 6 bytes written.
- Key: 3, size 1 byte written.
- Key: 5, size 10 bytes written.
- Key: 6, size 8 bytes written.
- Key: 8, size 42 bytes written.
- Key: 13, size 3 bytes written.
- Key: 14, size 3 bytes written.
- Key: 19, size 40 bytes written.
Section: 193
- Key: 2, size 8 bytes written.
- Key: 3, size 32 bytes written.
- Key: 4, size 32 bytes written.
- Key: 9, size 64 bytes written.
Section: 208
- Key: 1, size 4 bytes written.
Section: 217
- Key: 0, size 32 bytes written.
Section: 309
- Key: 0, size 4 bytes written.
- Key: 1, size 2 bytes written.
- Key: 2, size 12 bytes written.
- Key: 4, size 12 bytes written.
- Key: 5, size 12 bytes written.
- Key: 7, size 12 bytes written.
- Key: 8, size 12 bytes written.
- Key: 17, size 12 bytes written.
Section: 322
- Key: 0, size 1 byte written.
Section: 334
- Key: 0, size 1 byte written.
Section: 341
- Key: 0, size 1 byte written.
- Key: 3, size 4 bytes written.
- Key: 4, size 4404 bytes written.
Section: 354
- Key: 0, size 18 bytes written.
Section: 356
- Key: 0, size 2 bytes written.
- Key: 1, size 8 bytes written.
Completed in 18.281 s
Phone type: RM-230 (Nokia 5700)
SW version: V 03.29 10-05-07 RM-230 (c) Nokia
Imei plain: 35396401197358-3
Product code: 0548931
Battery voltage: 4653 mV, current: 94 mA
ApeCoreSw: 03.29
Language Pack:
- not available.

SLPA ver[1]: PA_SL (15 digit NCK)

SIMLOCK seems to be valid
SUPERDONGLE_KEY[MX] seems to be valid
CMLA_KEY seems to be valid
WMDRM_PD seems to be valid
SECURITY_TEST failed!


Imei net: 353964011973583
Version: SIMLOCK SERVER
Counter: 0/3, 0/10

CONFIG_DATA: 2440700000000000
PROFILE_BITS: 0000000000000000

BLOCK1: 1=OPEN, 2=OPEN, 3=OPEN, 4=OPEN, 5=OPEN
BLOCK2: 1=OPEN, 2=OPEN, 3=OPEN, 4=OPEN, 5=OPEN
BLOCK3: 1=OPEN, 2=OPEN, 3=OPEN, 4=OPEN, 5=OPEN
BLOCK4: 1=OPEN, 2=OPEN, 3=OPEN, 4=OPEN, 5=OPEN
BLOCK5: 1=OPEN, 2=OPEN, 3=OPEN, 4=OPEN, 5=OPEN
BLOCK6: 1=OPEN, 2=OPEN, 3=OPEN, 4=OPEN, 5=OPEN
BLOCK7: 1=OPEN, 2=OPEN, 3=OPEN, 4=OPEN, 5=OPEN
  Reply With Quote
Old 01-18-2012, 17:51   #5 (permalink)
No Life Poster
 
micmac's Avatar
 
Join Date: Mar 2002
Location: tunis,tunisia
Age: 48
Posts: 1,450
Member: 10396
Status: Offline
Thanks Meter: 32
CMT Data :
SYSTEM ASIC ID: 000000010000022600010006400C192101011103 [RAPIDO3G ver: 1.11]
EM0 ID: 00000295
EM1 ID: 00000B22
PUBLIC ID: 20100115B65400583BD9007EAE0132C63A383404
ASIC MODE ID: 00
ROOT KEY HASH: 9A28E119033B91D14D22838C86D0D53C
ROM ID: F2C6EBADC86E6189
SecondaryBoot: RAPIDOv11_2nd.fg [BB5] version: 11.34.0 revision: 2.0 size: 0x3B80
Supported Ids: 0003192101001203, 000C192101001203, 4003192101001203, 400C192101001203, 0003192101002003, 000C192101002003, 4003192101002003, 400C192101002003, 4003192101011103, 400C192101011103, 4003192101021103, 400C192101021103, 4003192101031103, 400C192101031103, 4003192101011105, 400C192101011105, 400C192101021105, 400C192101031105, 4003192101051103, 400C192101051103, 400C192101051105, 4003192101051105
eBB5ProtocolType: NEW
TransmissionMode: DDR&TX2
Storage0: 0000 0000 - 0000 0000 type: RAM, asic:CMT
Storage1: FFFF 0000 - 0000 0000 type: MMC, asic:CMT
Storage2: 0400 0000 - 0000 0000 [unused/removed] type: FLASH,NOR, asic:CMT
Storage3: 0000 0001 - 0000 0000 [unused/removed] type: FLASH,NOR, asic:CMT
Storage4: 00EC 0030 - 0000 0121 [Samsung K5W1G13ACM-DJ60,1 Gbits] type: FLASH,MuxOneNAND, asic:CMT
Suggested algorithm: XSR 1.5
Algorithm: RAPIDOv11_XSR15_alg.fg [XSR 1.5] version: 11.34.0 revision: 2.0 size: 0x8FE30
Supported Ids: 0003192101001203, 000C192101001203, 4003192101001203, 400C192101001203, 0003192101002003, 000C192101002003, 4003192101002003, 400C192101002003, 4003192101011103, 400C192101011103, 4003192101021103, 400C192101021103, 4003192101031103, 400C192101031103, 4003192101011105, 400C192101011105, 400C192101021105, 400C192101031105, 4003192101051103, 400C192101051103, 400C192101051105, 4003192101051105
TransmissionMode: DDR&TX2
FUR: Adding Asic CMT as client OK
CMT PAPUBKEYS HASH: 3D66090E94F3701646DA91CCD35BBAC22E5CBF73

Begin Certificate Request ...
SERVER->MXKEY - BLADE X at host2, agent version 1.2 revision 0.2

Updating PRODUCTCODE (0548789)... OK
Updating CMLA_KEY ...OK
Updating WMDRM_PD ...OK
MXKEY [MxKey Team HTI Flasher Interface (WinUSB) 4], SN: C0854B02
Using device: HTI, FW ver: 00.50, SN: 00002D57
Connection status: UHCI:HUB:USB 2.00 (Full-speed)
Driver: WinUSB, ver: 3.5.0.0
Module ver: 1.0.0.19798(05-01-2012), Library ver: 1.0.0.13703(05-01-2012)
CMT Data :
SYSTEM ASIC ID: 000000010000022600010006400C192101011103 [RAPIDO3G ver: 1.11]
EM0 ID: 00000295
EM1 ID: 00000B22
PUBLIC ID: 20100115B65400583BD9007EAE0132C63A383404
ASIC MODE ID: 00
ROOT KEY HASH: 9A28E119033B91D14D22838C86D0D53C
ROM ID: F2C6EBADC86E6189
SecondaryBoot: RAPIDOv11_2nd.fg [BB5] version: 11.34.0 revision: 2.0 size: 0x3B80
Supported Ids: 0003192101001203, 000C192101001203, 4003192101001203, 400C192101001203, 0003192101002003, 000C192101002003, 4003192101002003, 400C192101002003, 4003192101011103, 400C192101011103, 4003192101021103, 400C192101021103, 4003192101031103, 400C192101031103, 4003192101011105, 400C192101011105, 400C192101021105, 400C192101031105, 4003192101051103, 400C192101051103, 400C192101051105, 4003192101051105
eBB5ProtocolType: NEW
TransmissionMode: DDR&TX2
Storage0: 0000 0000 - 0000 0000 type: RAM, asic:CMT
Storage1: FFFF 0000 - 0000 0000 type: MMC, asic:CMT
Storage2: 0400 0000 - 0000 0000 [unused/removed] type: FLASH,NOR, asic:CMT
Storage3: 0000 0001 - 0000 0000 [unused/removed] type: FLASH,NOR, asic:CMT
Storage4: 00EC 0030 - 0000 0121 [Samsung K5W1G13ACM-DJ60,1 Gbits] type: FLASH,MuxOneNAND, asic:CMT
Suggested algorithm: XSR 1.5
Algorithm: RAPIDOv11_XSR15_alg.fg [XSR 1.5] version: 11.34.0 revision: 2.0 size: 0x8FE30
Supported Ids: 0003192101001203, 000C192101001203, 4003192101001203, 400C192101001203, 0003192101002003, 000C192101002003, 4003192101002003, 400C192101002003, 4003192101011103, 400C192101011103, 4003192101021103, 400C192101021103, 4003192101031103, 400C192101031103, 4003192101011105, 400C192101011105, 400C192101021105, 400C192101031105, 4003192101051103, 400C192101051103, 400C192101051105, 4003192101051105
TransmissionMode: DDR&TX2
FUR: Adding Asic CMT as client OK
CMT PAPUBKEYS HASH: 3D66090E94F3701646DA91CCD35BBAC22E5CBF73
Updating CMT NPC ...OK
Updating CMT CCC ...OK
Updating CMT HWC ...OK
Prog.status for Asic CMT ...
NAND: OK

SIMLOCK seems to be valid
SUPERDONGLE_KEY[MX] seems to be valid
CMLA_KEY seems to be valid
WMDRM_PD seems to be valid
SECURITY_TEST failed!
  Reply With Quote
Old 01-18-2012, 17:52   #6 (permalink)
No Life Poster
 
micmac's Avatar
 
Join Date: Mar 2002
Location: tunis,tunisia
Age: 48
Posts: 1,450
Member: 10396
Status: Offline
Thanks Meter: 32
CMT Data :
SYSTEM ASIC ID: 000000010000022600010006400C192101011103 [RAPIDO3G ver: 1.11]
EM0 ID: 00000295
EM1 ID: 00000B22
PUBLIC ID: 20100115B65400583BD9007EAE0132C63A383404
ASIC MODE ID: 00
ROOT KEY HASH: 9A28E119033B91D14D22838C86D0D53C
ROM ID: F2C6EBADC86E6189
SecondaryBoot: RAPIDOv11_2nd.fg [BB5] version: 11.34.0 revision: 2.0 size: 0x3B80
Supported Ids: 0003192101001203, 000C192101001203, 4003192101001203, 400C192101001203, 0003192101002003, 000C192101002003, 4003192101002003, 400C192101002003, 4003192101011103, 400C192101011103, 4003192101021103, 400C192101021103, 4003192101031103, 400C192101031103, 4003192101011105, 400C192101011105, 400C192101021105, 400C192101031105, 4003192101051103, 400C192101051103, 400C192101051105, 4003192101051105
eBB5ProtocolType: NEW
TransmissionMode: DDR&TX2
Storage0: 0000 0000 - 0000 0000 type: RAM, asic:CMT
Storage1: FFFF 0000 - 0000 0000 type: MMC, asic:CMT
Storage2: 0400 0000 - 0000 0000 [unused/removed] type: FLASH,NOR, asic:CMT
Storage3: 0000 0001 - 0000 0000 [unused/removed] type: FLASH,NOR, asic:CMT
Storage4: 00EC 0030 - 0000 0121 [Samsung K5W1G13ACM-DJ60,1 Gbits] type: FLASH,MuxOneNAND, asic:CMT
Suggested algorithm: XSR 1.5
Algorithm: RAPIDOv11_XSR15_alg.fg [XSR 1.5] version: 11.34.0 revision: 2.0 size: 0x8FE30
Supported Ids: 0003192101001203, 000C192101001203, 4003192101001203, 400C192101001203, 0003192101002003, 000C192101002003, 4003192101002003, 400C192101002003, 4003192101011103, 400C192101011103, 4003192101021103, 400C192101021103, 4003192101031103, 400C192101031103, 4003192101011105, 400C192101011105, 400C192101021105, 400C192101031105, 4003192101051103, 400C192101051103, 400C192101051105, 4003192101051105
TransmissionMode: DDR&TX2
FUR: Adding Asic CMT as client OK
CMT PAPUBKEYS HASH: 3D66090E94F3701646DA91CCD35BBAC22E5CBF73
Reading CMT NPC (0x168 bytes).
Original Product Code: 0548789
Reading CMT VARIANT (0x0 bytes).
Reading CMT CCC (0x160 bytes).
Product Code: 0548789
CCC seems to be valid
Reading CMT HWC (0xD4 bytes).
Product Code: 0548789
HWC seems to be valid
  Reply With Quote
Old 01-18-2012, 17:53   #7 (permalink)
No Life Poster
 
micmac's Avatar
 
Join Date: Mar 2002
Location: tunis,tunisia
Age: 48
Posts: 1,450
Member: 10396
Status: Offline
Thanks Meter: 32
CMT Data :
SYSTEM ASIC ID: 000000010000022600010006400C192101011103 [RAPIDO3G ver: 1.11]
EM0 ID: 00000295
EM1 ID: 00000B22
PUBLIC ID: 20100115B65400583BD9007EAE0132C63A383404
ASIC MODE ID: 00
ROOT KEY HASH: 9A28E119033B91D14D22838C86D0D53C
ROM ID: F2C6EBADC86E6189
SecondaryBoot: RAPIDOv11_2nd.fg [BB5] version: 11.34.0 revision: 2.0 size: 0x3B80
Supported Ids: 0003192101001203, 000C192101001203, 4003192101001203, 400C192101001203, 0003192101002003, 000C192101002003, 4003192101002003, 400C192101002003, 4003192101011103, 400C192101011103, 4003192101021103, 400C192101021103, 4003192101031103, 400C192101031103, 4003192101011105, 400C192101011105, 400C192101021105, 400C192101031105, 4003192101051103, 400C192101051103, 400C192101051105, 4003192101051105
eBB5ProtocolType: NEW
TransmissionMode: DDR&TX2
Storage0: 0000 0000 - 0000 0000 type: RAM, asic:CMT
Storage1: FFFF 0000 - 0000 0000 type: MMC, asic:CMT
Storage2: 0400 0000 - 0000 0000 [unused/removed] type: FLASH,NOR, asic:CMT
Storage3: 0000 0001 - 0000 0000 [unused/removed] type: FLASH,NOR, asic:CMT
Storage4: 00EC 0030 - 0000 0121 [Samsung K5W1G13ACM-DJ60,1 Gbits] type: FLASH,MuxOneNAND, asic:CMT
Suggested algorithm: XSR 1.5
Algorithm: RAPIDOv11_XSR15_alg.fg [XSR 1.5] version: 11.34.0 revision: 2.0 size: 0x8FE30
Supported Ids: 0003192101001203, 000C192101001203, 4003192101001203, 400C192101001203, 0003192101002003, 000C192101002003, 4003192101002003, 400C192101002003, 4003192101011103, 400C192101011103, 4003192101021103, 400C192101021103, 4003192101031103, 400C192101031103, 4003192101011105, 400C192101011105, 400C192101021105, 400C192101031105, 4003192101051103, 400C192101051103, 400C192101051105, 4003192101051105
TransmissionMode: DDR&TX2
FUR: Adding Asic CMT as client OK
CMT PAPUBKEYS HASH: 3D66090E94F3701646DA91CCD35BBAC22E5CBF73
Reading CMT NPC (0x168 bytes).
Original Product Code: 0548789
Reading CMT VARIANT (0x0 bytes).
Reading CMT CCC (0x160 bytes).
Product Code: 0548789
CCC seems to be valid
Reading CMT HWC (0xD4 bytes).
Product Code: 0548789
HWC seems to be valid

MXKEY [MxKey Team HTI Flasher Interface (WinUSB) 4], SN: C0854B02
Using device: HTI, FW ver: 00.50, SN: 00002D57
Connection status: UHCI:HUB:USB 2.00 (Full-speed)
Driver: WinUSB, ver: 3.5.0.0
Module ver: 1.0.0.19798(05-01-2012), Library ver: 1.0.0.13703(05-01-2012)

Phone type: RM-230 (Nokia 5700)
SW version: V 03.29 10-05-07 RM-230 (c) Nokia
ApeCoreSw: 03.29

Using cached productData.
PUBLIC ID: 20100115B65400583BD9007EAE0132C63A383404
PRIVATE ID: 34C7007488FC6CCE76B922C8542E80F54DB29F9F
SUPERDONGLE authorized !
SERVER->MXKEY - BLADE X at host2, agent version 1.2 revision 0.2

Updating RFBB data ...
Writing section 1...
Writing section 309...
Done.
  Reply With Quote
Old 01-18-2012, 17:54   #8 (permalink)
No Life Poster
 
micmac's Avatar
 
Join Date: Mar 2002
Location: tunis,tunisia
Age: 48
Posts: 1,450
Member: 10396
Status: Offline
Thanks Meter: 32
Always the same thing


Phone type: RM-230 (Nokia 5700)
SW version: V 03.29 10-05-07 RM-230 (c) Nokia
Imei plain: 35396401197358-3
Product code: 0548789
Battery voltage: 4617 mV, current: 103 mA
ApeCoreSw: 03.29
Language Pack:
- not available.

SLPA ver[1]: PA_SL (15 digit NCK)

SIMLOCK seems to be valid
SUPERDONGLE_KEY[MX] seems to be valid
CMLA_KEY seems to be valid
WMDRM_PD seems to be valid
SECURITY_TEST failed!


Imei net: 353964011973583
Version: SIMLOCK SERVER
Counter: 0/3, 0/10

CONFIG_DATA: 2440700000000000
PROFILE_BITS: 0000000000000000

BLOCK1: 1=OPEN, 2=OPEN, 3=OPEN, 4=OPEN, 5=OPEN
BLOCK2: 1=OPEN, 2=OPEN, 3=OPEN, 4=OPEN, 5=OPEN
BLOCK3: 1=OPEN, 2=OPEN, 3=OPEN, 4=OPEN, 5=OPEN
BLOCK4: 1=OPEN, 2=OPEN, 3=OPEN, 4=OPEN, 5=OPEN
BLOCK5: 1=OPEN, 2=OPEN, 3=OPEN, 4=OPEN, 5=OPEN
BLOCK6: 1=OPEN, 2=OPEN, 3=OPEN, 4=OPEN, 5=OPEN
BLOCK7: 1=OPEN, 2=OPEN, 3=OPEN, 4=OPEN, 5=OPEN
  Reply With Quote
Old 01-18-2012, 19:58   #9 (permalink)
No Life Poster
 
sajohaker's Avatar
 
Join Date: Feb 2008
Location: Bosnia
Posts: 865
Member: 698071
Status: Offline
Sonork: 100.1622915
Thanks Meter: 283
Complete repair damaged simlock and superdongle by mxkey:
1. Backup RAP NPC
Service > Imei & Security > Imei Rebuild: Section, Select RAP > Backup RPL
2. FULL ERASE
Flash > Advance : untick safe ERASE > Erase Flash
3. Flash MCU,PPM,CNT
4. Restore IMEI
Service > Imei & Security > Imei Rebuild > Restore Imei
5. Repair SPLock
Service > Imei & Security > Simlock : Repair Simlock > Repair SPLock
6. Repair SD
Service > Imei & Security > Imei Rebuild > Repair SD
7. Super SD Auth
Service > PM > Super SD Auth
8. When super SD auth is done, write PM imediately.
  Reply With Quote
The Following User Says Thank You to sajohaker For This Useful Post:
Old 01-19-2012, 23:58   #10 (permalink)
No Life Poster
 
gbluez's Avatar
 
Join Date: Jul 2004
Posts: 11,049
Member: 73565
Status: Offline
Thanks Meter: 5,062
If problem still there, please start self test. and report any error what you see.

BR
  Reply With Quote
Reply

Bookmarks


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


Similar Threads
Thread Thread Starter Forum Replies Last Post
How to use Nokia tool - with connection 6-7 pin or not?.. 2M Nokia Legacy Phones ( DCT-1 ,2 ,3 ,L ) 0 07-20-2000 19:53
WE OFFER cables for connection cellular-phones to the computers GLEBUS Main Sales Section 0 06-04-2000 19:05
Avoid 3 times error code in Nokia 6185 X-plot Nokia Legacy Phones ( DCT-1 ,2 ,3 ,L ) 0 05-08-2000 20:24
Nokia Datasuite Connection Failure Judesp Nokia Legacy Phones ( DCT-1 ,2 ,3 ,L ) 0 12-27-1999 09:36
Silly question!! Why is it impossible to read out the mastercode of Nokia phones???? MyKe Nokia Legacy Phones ( DCT-1 ,2 ,3 ,L ) 0 09-26-1999 14:31

 



All times are GMT +1. The time now is 23:24.



Powered by Searchlight © 2024 Axivo Inc.
vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2024 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2023 -
Page generated in 0.30137 seconds with 9 queries

SEO by vBSEO