GSM Shop GSM Shop
GSM-Forum  

Welcome to the GSM-Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features.
Only registered members may post questions, contact other members or search our database of over 8 million posts.

Registration is fast, simple and absolutely free so please - Click to REGISTER!

If you have any problems with the registration process or your account login, please contact contact us .

Go Back   GSM-Forum > Product Support Sections > No More Supported Solutions (Dead Products) > No More Supported H/W Products > MXKEY (by Alim Hape) > MXKEY Nokia Flasher and Unlocker (by Alim Hape)


Closed Thread
 
LinkBack Thread Tools Display Modes
Old 12-13-2009, 11:31   #16 (permalink)
No Life Poster
 
Andra's Avatar
 
Join Date: Feb 2005
Location: AD
Posts: 4,665
Member: 976728
Status: Offline
Sonork: 1589709
Thanks Meter: 4,775
sync time with server


follow this manuall to sync time with server.

- double click your time/date PC


- select your time/date country


- tick auto sync and "Update NOW"


and do sign app.


br,
 
The Following 22 Users Say Thank You to Andra For This Useful Post:
Show/Hide list of the thanked
Old 01-21-2010, 14:20   #17 (permalink)
No Life Poster
 
Andra's Avatar
 
Join Date: Feb 2005
Location: AD
Posts: 4,665
Member: 976728
Status: Offline
Sonork: 1589709
Thanks Meter: 4,775
Image dl

Frimware download from "IMAGE DL" button



- enter manually product code
- press "IMAGE DL"
- after show new form ( image to download ) ,press "download"

video manual
download 1
download 2
download 3
download 4
download 5
download 6
credit goes to : sneha


br,

Last edited by Andra; 01-29-2010 at 21:42. Reason: add info
 
The Following 17 Users Say Thank You to Andra For This Useful Post:
Show/Hide list of the thanked
Old 01-21-2010, 23:11   #18 (permalink)
No Life Poster
 
gbluez's Avatar
 
Join Date: Jul 2004
Posts: 11,049
Member: 73565
Status: Offline
Thanks Meter: 5,062
Lightbulb Just in case if Recovery via Server doesn't work.......

Hi,
This is just another method, let's say it is a temporary solution, will find another way to be more simple with mxkey.

It's all about HWC recovery issue.

Scan

Code:
Phone Type: RM-237 (Nokia 3110c)
SW Version: V 07.21 05-11-08 RM-237 (c) Nokia.            
Imei plain: 35322503273286-5
Product Code: 0514959
Language Pack:
- not available.

SIMLOCK seems to be valid
SUPERDONGLE_KEY seems to be valid
SIMLOCK_TEST passed
SECURITY_TEST failed!
 
TimeStamp: 2008-11-12T09:25:55Z
SW Version: 07.21
Variant Version: 014
ProductProfile: RM237_0514959_07.21_014.spr
Simlock: 0514959_simlock.bin
 
Imei net: 353225032732865
Version: SIMLOCK SERVER VERSION 63
Provider: Nokia Test, Country: Finland
Counter: 0/3, 0/10
 
CONFIG_DATA: 2440700000000000
PROFILE_BITS: 0000000000000000
 
BLOCK 1:   1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 2:   1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 3:   1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 4:   1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 5:   1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 6:   1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 7:   1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BB5 Secure Storage Validation
Service > Phone Test > Various > BB5 Secure Storage Validation

Code:
SIMLOCK seems to be valid
SUPERDONGLE_KEY seems to be valid
SIMLOCK_TEST passed
SECURITY_TEST failed!
Q: Why after write pm via SX4 i still end up with security failed issue?
A: Please check your phone via this feature.

BB5 Certivicate Validation
Service > Phone Test > Various > BB5 Certivicate Validation

Code:
RAP Data :
SYSTEM ASIC ID: 000000010000022600010006010C192101001101 [RAPGSM ver: 1.1]
EM0 ID: 00000232
EM1 ID: 00000353
PUBLIC ID: 094002010DA07E5652111A03CFD2350DD48AD044
ASIC MODE ID: 00
ROOT KEY HASH: BAF3A9C3DBFA8454937DB77F2B8852B1
ROM ID: 191EC665DFAAF68F
 SecondaryBoot: rap3gv3_2nd.fg [BB5]  version: 1.30.0 revision: 0.0 size: 0x3C00
 Supported RAP Ids: 0103192101003000, 010C192101003000, 0103192101013000, 010C192101013000, 0103192101003100, 010C192101003100, 0303192101023000, 

030C192101023000, 0303192101033000, 030C192101033000, 0103192101001101, 010C192101001101, 0003192101001002, 000C192101001002, 0013192101001002, 

001C192101001002
FlashID0: 0089 8981  - 0000 0000 [Intel NU48F256,256 Mbits] type: NOR,RAP 
ExtBUSC: 0000 0000 0000 0000 0000 0000 0000 0000 
ExtDEVC: FFFF 0000 - 0000 0000
 Algorithm: RAP3Gv3_algo_131.fg [BB5 ALGORITHM]  version: 1.31.0 revision: 0.0 size: 0x297E0
 Supported RAP Ids: 0103192101003000, 010C192101003000, 0103192101013000, 010C192101013000, 0103192101003100, 010C192101003100, 0303192101023000, 

030C192101023000, 0303192101033000, 030C192101033000, 0003192101002000, 000C192101002000, 0003192101002100, 000C192101002100, 0003192101002200, 

000C192101002200, 0003192101012200, 000C192101012200, 0103192101001101, 010C192101001101, 0003192101001002, 000C192101001002, 0013192101001002, 

001C192101001002
RAP PAPUBKEYS HASH: C0E691EA16A7593A9BB28832D7312A39F7ED668D
Reading RAP NPC  (0x168 bytes)
Original Product Code: 0514959
Reading RAP VARIANT  (0x0 bytes)
Reading RAP CCC  (0x160 bytes)
 Product Code: 0514959
CCC seems to be valid
Reading RAP HWC  (0x0 bytes)
HWC empty !
Recover CERT
Service > Imei Rebuild > Recover CERT

Code:
RAP Data :
SYSTEM ASIC ID: 000000010000022600010006010C192101001101 [RAPGSM ver: 1.1]
EM0 ID: 00000232
EM1 ID: 00000353
PUBLIC ID: 094002010DA07E5652111A03CFD2350DD48AD044
ASIC MODE ID: 00
ROOT KEY HASH: BAF3A9C3DBFA8454937DB77F2B8852B1
ROM ID: 191EC665DFAAF68F
 SecondaryBoot: rap3gv3_2nd.fg [BB5]  version: 1.30.0 revision: 0.0 size: 0x3C00
 Supported RAP Ids: 0103192101003000, 010C192101003000, 0103192101013000, 010C192101013000, 0103192101003100, 010C192101003100, 0303192101023000, 

030C192101023000, 0303192101033000, 030C192101033000, 0103192101001101, 010C192101001101, 0003192101001002, 000C192101001002, 0013192101001002, 

001C192101001002
FlashID0: 0089 8981  - 0000 0000 [Intel NU48F256,256 Mbits] type: NOR,RAP 
ExtBUSC: 0000 0000 0000 0000 0000 0000 0000 0000 
ExtDEVC: FFFF 0000 - 0000 0000
 Algorithm: RAP3Gv3_algo_131.fg [BB5 ALGORITHM]  version: 1.31.0 revision: 0.0 size: 0x297E0
 Supported RAP Ids: 0103192101003000, 010C192101003000, 0103192101013000, 010C192101013000, 0103192101003100, 010C192101003100, 0303192101023000, 

030C192101023000, 0303192101033000, 030C192101033000, 0003192101002000, 000C192101002000, 0003192101002100, 000C192101002100, 0003192101002200, 

000C192101002200, 0003192101012200, 000C192101012200, 0103192101001101, 010C192101001101, 0003192101001002, 000C192101001002, 0013192101001002, 

001C192101001002
RAP PAPUBKEYS HASH: C0E691EA16A7593A9BB28832D7312A39F7ED668D
Reading RAP NPC  (0x168 bytes)
 
Begin Certificate Request ...
Connecting to server ...OK, Login ...
Query done with status: OK
Updating PRODUCTCODE (0514959)... OK
RAP Data :
SYSTEM ASIC ID: 000000010000022600010006010C192101001101 [RAPGSM ver: 1.1]
EM0 ID: 00000232
EM1 ID: 00000353
PUBLIC ID: 094002010DA07E5652111A03CFD2350DD48AD044
ASIC MODE ID: 00
ROOT KEY HASH: BAF3A9C3DBFA8454937DB77F2B8852B1
ROM ID: 191EC665DFAAF68F
 SecondaryBoot: rap3gv3_2nd.fg [BB5]  version: 1.30.0 revision: 0.0 size: 0x3C00
 Supported RAP Ids: 0103192101003000, 010C192101003000, 0103192101013000, 010C192101013000, 0103192101003100, 010C192101003100, 0303192101023000, 

030C192101023000, 0303192101033000, 030C192101033000, 0103192101001101, 010C192101001101, 0003192101001002, 000C192101001002, 0013192101001002, 

001C192101001002
FlashID0: 0089 8981  - 0000 0000 [Intel NU48F256,256 Mbits] type: NOR,RAP 
ExtBUSC: 0000 0000 0000 0000 0000 0000 0000 0000 
ExtDEVC: FFFF 0000 - 0000 0000
 Algorithm: RAP3Gv3_algo_131.fg [BB5 ALGORITHM]  version: 1.31.0 revision: 0.0 size: 0x297E0
 Supported RAP Ids: 0103192101003000, 010C192101003000, 0103192101013000, 010C192101013000, 0103192101003100, 010C192101003100, 0303192101023000, 

030C192101023000, 0303192101033000, 030C192101033000, 0003192101002000, 000C192101002000, 0003192101002100, 000C192101002100, 0003192101002200, 

000C192101002200, 0003192101012200, 000C192101012200, 0103192101001101, 010C192101001101, 0003192101001002, 000C192101001002, 0013192101001002, 

001C192101001002
RAP PAPUBKEYS HASH: C0E691EA16A7593A9BB28832D7312A39F7ED668D
Updating CMT  NPC ...OK
Updating CMT  CCC ...OK
Updating CMT  HWC ...failed, Result: 06C0000000117200
Certificate programmed successfully !
In this case, you will need to write HWC certivicate ONLY.
In this example is using HWK, select HWC cert from the SAME PHONE TYPE.

Unfortunately, i don't have here on my hand a good phone to backup CRT partialy via MXKey.
Only got here collected backups on HWK format .
You also can read HWC CRT partialy on MXKey:
Service > Imei & Security > Imei Rebuild > Backup RPL > Section - Drop down, Select HWC only from a good phone.

Please Note: In this case, HWC is missing. Watch more detail on your own case.

Logs from UFSxHWK:
Code:
Certificate: Rm-237_351963038604637_1027200951214_HWCCmt.bin
CER FLASH ERASE OK, Time: 00:01
CER FLASH WRITE OK, Time: 00:00
Written: 1 Certificate(s)
Certificate(s) Write Done
Test again,
Service > Phone Test > Various > BB5 Certivicate Validation

Code:
RAP Data :
SYSTEM ASIC ID: 000000010000022600010006010C192101001101 [RAPGSM ver: 1.1]
EM0 ID: 00000232
EM1 ID: 00000353
PUBLIC ID: 094002010DA07E5652111A03CFD2350DD48AD044
ASIC MODE ID: 00
ROOT KEY HASH: BAF3A9C3DBFA8454937DB77F2B8852B1
ROM ID: 191EC665DFAAF68F
 SecondaryBoot: rap3gv3_2nd.fg [BB5]  version: 1.30.0 revision: 0.0 size: 0x3C00
 Supported RAP Ids: 0103192101003000, 010C192101003000, 0103192101013000, 010C192101013000, 0103192101003100, 010C192101003100, 0303192101023000, 030C192101023000, 0303192101033000, 030C192101033000, 0103192101001101, 010C192101001101, 0003192101001002, 000C192101001002, 0013192101001002, 001C192101001002
FlashID0: 0089 8981  - 0000 0000 [Intel NU48F256,256 Mbits] type: NOR,RAP 
ExtBUSC: 0000 0000 0000 0000 0000 0000 0000 0000 
ExtDEVC: FFFF 0000 - 0000 0000
 Algorithm: RAP3Gv3_algo_131.fg [BB5 ALGORITHM]  version: 1.31.0 revision: 0.0 size: 0x297E0
 Supported RAP Ids: 0103192101003000, 010C192101003000, 0103192101013000, 010C192101013000, 0103192101003100, 010C192101003100, 0303192101023000, 030C192101023000, 0303192101033000, 030C192101033000, 0003192101002000, 000C192101002000, 0003192101002100, 000C192101002100, 0003192101002200, 000C192101002200, 0003192101012200, 000C192101012200, 0103192101001101, 010C192101001101, 0003192101001002, 000C192101001002, 0013192101001002, 001C192101001002
RAP PAPUBKEYS HASH: C0E691EA16A7593A9BB28832D7312A39F7ED668D
Reading RAP NPC  (0x168 bytes)
Original Product Code: 0514959
Reading RAP VARIANT  (0x0 bytes)
Reading RAP CCC  (0x160 bytes)
 Product Code: 0514959
CCC seems to be valid
Reading RAP HWC  (0xD4 bytes)
 Product Code: 0514959
HWC seems to be valid
From SCAN, you will still see Security failed

Code:
Phone Type: RM-237 (Nokia 3110c)
SW Version: V 07.21 05-11-08 RM-237 (c) Nokia.            
Imei plain: 35322503273286-5
Product Code: 0514959
Language Pack:
- not available.

SIMLOCK seems to be valid
SUPERDONGLE_KEY seems to be valid
SIMLOCK_TEST passed
SECURITY_TEST failed!
 
TimeStamp: 2008-11-12T09:25:55Z
SW Version: 07.21
Variant Version: 014
ProductProfile: RM237_0514959_07.21_014.spr
Simlock: 0514959_simlock.bin
 
Imei net: 353225032732865
Version: SIMLOCK SERVER VERSION 63
Provider: Nokia Test, Country: Finland
Counter: 0/3, 0/10
 
CONFIG_DATA: 2440700000000000
PROFILE_BITS: 0000000000000000
 
BLOCK 1:   1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 2:   1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 3:   1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 4:   1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 5:   1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 6:   1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 7:   1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
And last step is
SX4 Online - PMM auth

Code:
Connecting to server ...OK
Scanning local SX4 Card ...
No SX4 Card found.
Authenticating using security server ...
Connecting to server[main.mxkey.biz] ...MXKEY-SX4 ver 2.5(ID),  hello 114.127.220.142
SUPERDONGLE auth succeeded!
Write PM

Code:
Writing PM from Node ...
Section: 1
 - Key: 0, size 114 bytes written.
 - Key: 2, size 98 bytes written.
 - Key: 4, size 110 bytes written.
 - Key: 6, size 98 bytes written.
 - Key: 8, size 110 bytes written.
 - Key: 13, size 98 bytes written.
 - Key: 16, size 86 bytes written.
 - Key: 18, size 86 bytes written.
 - Key: 20, size 86 bytes written.
 - Key: 25, size 4 bytes written.
 - Key: 29, size 6 bytes written.
 - Key: 34, size 80 bytes written.
Section: 2
 - Key: 0, size 432 bytes written.
Section: 4
 - Key: 1, size 64 bytes written.
 - Key: 3, size 10 bytes written.
 - Key: 4, size 8 bytes written.
 - Key: 5, size 8 bytes written.
 - Key: 6, size 8 bytes written.
 - Key: 9, size 5 bytes written.
 - Key: 18, size 80 bytes written.
 - Key: 19, size 4 bytes written.
Section: 8
 - Key: 0, size 12 bytes written.
 - Key: 1, size 12 bytes written.
 - Key: 2, size 128 bytes written.
 - Key: 3, size 128 bytes written.
 - Key: 4, size 8 bytes written.
 - Key: 6, size 4 bytes written.
 - Key: 7, size 8 bytes written.
 - Key: 8, size 8 bytes written.
 - Key: 9, size 16 bytes written.
Section: 11
 - Key: 0, size 4 bytes written.
 - Key: 1, size 4 bytes written.
 - Key: 2, size 4 bytes written.
 - Key: 3, size 4 bytes written.
 - Key: 5, size 6 bytes written.
 - Key: 6, size 2 bytes written.
 - Key: 14, size 2 bytes written.
 - Key: 15, size 2 bytes written.
 - Key: 16, size 2 bytes written.
 - Key: 17, size 2 bytes written.
 - Key: 18, size 16 bytes written.
 - Key: 19, size 32 bytes written.
 - Key: 20, size 32 bytes written.
 - Key: 21, size 2 bytes written.
 - Key: 22, size 2 bytes written.
 - Key: 23, size 2 bytes written.
 - Key: 24, size 2 bytes written.
 - Key: 25, size 2 bytes written.
 - Key: 26, size 2 bytes written.
 - Key: 27, size 2 bytes written.
 - Key: 28, size 2 bytes written.
 - Key: 29, size 2 bytes written.
 - Key: 30, size 2 bytes written.
 - Key: 31, size 2 bytes written.
 - Key: 32, size 2 bytes written.
 - Key: 33, size 2 bytes written.
 - Key: 34, size 2 bytes written.
 - Key: 35, size 2 bytes written.
 - Key: 36, size 2 bytes written.
 - Key: 37, size 2 bytes written.
 - Key: 38, size 2 bytes written.
 - Key: 39, size 2 bytes written.
 - Key: 40, size 2 bytes written.
 - Key: 41, size 2 bytes written.
 - Key: 42, size 2 bytes written.
 - Key: 43, size 2 bytes written.
 - Key: 44, size 2 bytes written.
 - Key: 45, size 2 bytes written.
 - Key: 46, size 2 bytes written.
 - Key: 47, size 2 bytes written.
 - Key: 48, size 2 bytes written.
 - Key: 49, size 2 bytes written.
 - Key: 50, size 2 bytes written.
 - Key: 51, size 2 bytes written.
 - Key: 52, size 2 bytes written.
 - Key: 53, size 2 bytes written.
 - Key: 54, size 2 bytes written.
 - Key: 55, size 2 bytes written.
 - Key: 56, size 2 bytes written.
 - Key: 57, size 2 bytes written.
 - Key: 58, size 2 bytes written.
 - Key: 59, size 2 bytes written.
 - Key: 60, size 2 bytes written.
 - Key: 61, size 2 bytes written.
 - Key: 62, size 2 bytes written.
 - Key: 63, size 4 bytes written.
 - Key: 65, size 4 bytes written.
 - Key: 66, size 4 bytes written.
 - Key: 67, size 4 bytes written.
 - Key: 68, size 4 bytes written.
 - Key: 69, size 16 bytes written.
 - Key: 70, size 4 bytes written.
 - Key: 71, size 2 bytes written.
 - Key: 72, size 13 bytes written.
Section: 12
 - Key: 0, size 102 bytes written.
Section: 13
 - Key: 1, size 2 bytes written.
 - Key: 3, size 2 bytes written.
 - Key: 8, size 2 bytes written.
 - Key: 11, size 48 bytes written.
 - Key: 12, size 4 bytes written.
 - Key: 15, size 886 bytes written.
 - Key: 16, size 2 bytes written.
 - Key: 19, size 8 bytes written.
 - Key: 25, size 2 bytes written.
 - Key: 37, size 4 bytes written.
 - Key: 42, size 4 bytes written.
 - Key: 43, size 4 bytes written.
 - Key: 45, size 4 bytes written.
 - Key: 46, size 4 bytes written.
 - Key: 48, size 4 bytes written.
 - Key: 52, size 2 bytes written.
 - Key: 53, size 4 bytes written.
 - Key: 54, size 4 bytes written.
 - Key: 58, size 2 bytes written.
 - Key: 60, size 4 bytes written.
 - Key: 61, size 4 bytes written.
 - Key: 63, size 4 bytes written.
 - Key: 64, size 4 bytes written.
 - Key: 66, size 4 bytes written.
 - Key: 67, size 4 bytes written.
 - Key: 71, size 4 bytes written.
 - Key: 72, size 4 bytes written.
 - Key: 74, size 4 bytes written.
 - Key: 75, size 2 bytes written.
 - Key: 76, size 2 bytes written.
 - Key: 77, size 2 bytes written.
 - Key: 83, size 2 bytes written.
 - Key: 85, size 4 bytes written.
 - Key: 86, size 4 bytes written.
 - Key: 87, size 2 bytes written.
 - Key: 89, size 4 bytes written.
 - Key: 90, size 4 bytes written.
 - Key: 91, size 2 bytes written.
 - Key: 93, size 4 bytes written.
 - Key: 94, size 4 bytes written.
 - Key: 95, size 2 bytes written.
 - Key: 97, size 4 bytes written.
 - Key: 98, size 4 bytes written.
 - Key: 99, size 2 bytes written.
 - Key: 100, size 4 bytes written.
 - Key: 101, size 2 bytes written.
 - Key: 103, size 4 bytes written.
 - Key: 104, size 4 bytes written.
 - Key: 105, size 4 bytes written.
 - Key: 106, size 4 bytes written.
 - Key: 107, size 4 bytes written.
 - Key: 108, size 2 bytes written.
 - Key: 109, size 4 bytes written.
 - Key: 110, size 4 bytes written.
 - Key: 111, size 4 bytes written.
 - Key: 112, size 2 bytes written.
 - Key: 113, size 4 bytes written.
 - Key: 114, size 4 bytes written.
 - Key: 118, size 4 bytes written.
 - Key: 119, size 4 bytes written.
 - Key: 123, size 8 bytes written.
 - Key: 129, size 4 bytes written.
 - Key: 130, size 4 bytes written.
 - Key: 133, size 2 bytes written.
 - Key: 135, size 2 bytes written.
 - Key: 138, size 4 bytes written.
 - Key: 139, size 4 bytes written.
 - Key: 144, size 4 bytes written.
 - Key: 145, size 8 bytes written.
 - Key: 146, size 4 bytes written.
 - Key: 147, size 4 bytes written.
 - Key: 159, size 2 bytes written.
 - Key: 160, size 2 bytes written.
 - Key: 167, size 8 bytes written.
 - Key: 168, size 4 bytes written.
Section: 14
 - Key: 0, size 6 bytes written.
Section: 31
 - Key: 4, size 12 bytes written.
Section: 42
 - Key: 0, size 2 bytes written.
 - Key: 1, size 12 bytes written.
 - Key: 2, size 36 bytes written.
 - Key: 3, size 36 bytes written.
 - Key: 4, size 36 bytes written.
 - Key: 5, size 36 bytes written.
 - Key: 6, size 36 bytes written.
 - Key: 7, size 36 bytes written.
 - Key: 8, size 36 bytes written.
 - Key: 9, size 36 bytes written.
 - Key: 10, size 36 bytes written.
 - Key: 11, size 36 bytes written.
 - Key: 12, size 36 bytes written.
 - Key: 13, size 40 bytes written.
 - Key: 14, size 40 bytes written.
 - Key: 15, size 40 bytes written.
 - Key: 16, size 40 bytes written.
 - Key: 17, size 40 bytes written.
 - Key: 18, size 40 bytes written.
 - Key: 19, size 40 bytes written.
 - Key: 20, size 40 bytes written.
Section: 50
 - Key: 0, size 2 bytes written.
Section: 51
 - Key: 4, size 74 bytes written.
Section: 54
 - Key: 0, size 2 bytes written.
 - Key: 2, size 24 bytes written.
Section: 55
 - Key: 0, size 80 bytes written.
 - Key: 1, size 2 bytes written.
Section: 56
 - Key: 0, size 4 bytes written.
 - Key: 1, size 4 bytes written.
Section: 58
 - Key: 0, size 51 bytes written.
 - Key: 1, size 83 bytes written.
 - Key: 2, size 57 bytes written.
 - Key: 3, size 63 bytes written.
 - Key: 4, size 59 bytes written.
 - Key: 5, size 57 bytes written.
 - Key: 6, size 47 bytes written.
 - Key: 7, size 57 bytes written.
 - Key: 8, size 39 bytes written.
 - Key: 9, size 51 bytes written.
 - Key: 10, size 41 bytes written.
 - Key: 11, size 49 bytes written.
 - Key: 12, size 75 bytes written.
 - Key: 13, size 45 bytes written.
 - Key: 14, size 61 bytes written.
 - Key: 15, size 59 bytes written.
 - Key: 16, size 37 bytes written.
 - Key: 17, size 49 bytes written.
 - Key: 18, size 86 bytes written.
 - Key: 19, size 51 bytes written.
 - Key: 20, size 48 bytes written.
 - Key: 21, size 40 bytes written.
 - Key: 22, size 46 bytes written.
 - Key: 23, size 64 bytes written.
 - Key: 24, size 49 bytes written.
 - Key: 25, size 69 bytes written.
 - Key: 26, size 42 bytes written.
 - Key: 27, size 61 bytes written.
 - Key: 28, size 55 bytes written.
 - Key: 29, size 56 bytes written.
 - Key: 30, size 56 bytes written.
 - Key: 31, size 61 bytes written.
 - Key: 32, size 49 bytes written.
 - Key: 33, size 47 bytes written.
 - Key: 34, size 49 bytes written.
 - Key: 35, size 69 bytes written.
 - Key: 36, size 51 bytes written.
 - Key: 37, size 39 bytes written.
 - Key: 38, size 138 bytes written.
 - Key: 39, size 42 bytes written.
 - Key: 40, size 46 bytes written.
 - Key: 41, size 47 bytes written.
 - Key: 42, size 43 bytes written.
 - Key: 43, size 43 bytes written.
 - Key: 44, size 34 bytes written.
 - Key: 45, size 59 bytes written.
 - Key: 46, size 73 bytes written.
Section: 59
 - Key: 0, size 68 bytes written.
 - Key: 1, size 149 bytes written.
 - Key: 2, size 101 bytes written.
 - Key: 3, size 64 bytes written.
 - Key: 4, size 36 bytes written.
 - Key: 5, size 174 bytes written.
 - Key: 6, size 66 bytes written.
 - Key: 7, size 97 bytes written.
 - Key: 8, size 109 bytes written.
 - Key: 9, size 156 bytes written.
 - Key: 10, size 36 bytes written.
 - Key: 11, size 164 bytes written.
 - Key: 12, size 169 bytes written.
 - Key: 13, size 71 bytes written.
 - Key: 14, size 178 bytes written.
 - Key: 15, size 177 bytes written.
 - Key: 16, size 78 bytes written.
 - Key: 17, size 141 bytes written.
 - Key: 18, size 68 bytes written.
 - Key: 19, size 107 bytes written.
Section: 60
 - Key: 0, size 95 bytes written.
 - Key: 1, size 129 bytes written.
 - Key: 2, size 73 bytes written.
 - Key: 3, size 63 bytes written.
 - Key: 4, size 25 bytes written.
 - Key: 5, size 81 bytes written.
 - Key: 6, size 27 bytes written.
 - Key: 7, size 61 bytes written.
 - Key: 8, size 67 bytes written.
 - Key: 9, size 75 bytes written.
 - Key: 10, size 55 bytes written.
 - Key: 11, size 27 bytes written.
Section: 61
 - Key: 0, size 62 bytes written.
 - Key: 1, size 57 bytes written.
 - Key: 2, size 99 bytes written.
 - Key: 3, size 110 bytes written.
 - Key: 4, size 156 bytes written.
 - Key: 5, size 174 bytes written.
 - Key: 6, size 64 bytes written.
 - Key: 7, size 36 bytes written.
 - Key: 8, size 35 bytes written.
 - Key: 9, size 36 bytes written.
 - Key: 10, size 36 bytes written.
 - Key: 11, size 87 bytes written.
 - Key: 12, size 164 bytes written.
 - Key: 13, size 87 bytes written.
 - Key: 14, size 90 bytes written.
 - Key: 15, size 139 bytes written.
 - Key: 16, size 70 bytes written.
 - Key: 17, size 57 bytes written.
 - Key: 18, size 156 bytes written.
 - Key: 19, size 76 bytes written.
Section: 62
 - Key: 1, size 15 bytes written.
 - Key: 3, size 15 bytes written.
 - Key: 4, size 15 bytes written.
Section: 63
 - Key: 0, size 14 bytes written.
Section: 65
 - Key: 0, size 11 bytes written.
 - Key: 1, size 11 bytes written.
 - Key: 2, size 11 bytes written.
 - Key: 3, size 11 bytes written.
 - Key: 4, size 11 bytes written.
Section: 66
 - Key: 0, size 160 bytes written.
 - Key: 1, size 160 bytes written.
 - Key: 4, size 160 bytes written.
 - Key: 5, size 4 bytes written.
 - Key: 6, size 4 bytes written.
 - Key: 7, size 4 bytes written.
 - Key: 8, size 4 bytes written.
 - Key: 9, size 160 bytes written.
 - Key: 10, size 240 bytes written.
 - Key: 12, size 192 bytes written.
 - Key: 13, size 192 bytes written.
 - Key: 14, size 4 bytes written.
 - Key: 16, size 4 bytes written.
 - Key: 19, size 4 bytes written.
 - Key: 20, size 4 bytes written.
 - Key: 21, size 228 bytes written.
 - Key: 22, size 192 bytes written.
 - Key: 23, size 192 bytes written.
 - Key: 24, size 4 bytes written.
 - Key: 26, size 4 bytes written.
 - Key: 28, size 4 bytes written.
 - Key: 30, size 4 bytes written.
 - Key: 32, size 4 bytes written.
 - Key: 34, size 4 bytes written.
 - Key: 36, size 4 bytes written.
 - Key: 38, size 4 bytes written.
 - Key: 40, size 4 bytes written.
 - Key: 47, size 251 bytes written.
 - Key: 52, size 2 bytes written.
 - Key: 64, size 8 bytes written.
 - Key: 65, size 8 bytes written.
 - Key: 66, size 8 bytes written.
 - Key: 67, size 41 bytes written.
 - Key: 68, size 8 bytes written.
 - Key: 70, size 8 bytes written.
 - Key: 82, size 9 bytes written.
 - Key: 83, size 9 bytes written.
 - Key: 84, size 8 bytes written.
 - Key: 85, size 1001 bytes written.
 - Key: 87, size 6144 bytes written.
 - Key: 88, size 300 bytes written.
 - Key: 89, size 40 bytes written.
 - Key: 90, size 288 bytes written.
 - Key: 91, size 4 bytes written.
 - Key: 92, size 251 bytes written.
 - Key: 97, size 251 bytes written.
 - Key: 98, size 251 bytes written.
 - Key: 104, size 35 bytes written.
 - Key: 105, size 4 bytes written.
 - Key: 106, size 4 bytes written.
 - Key: 107, size 4 bytes written.
 - Key: 108, size 4 bytes written.
 - Key: 111, size 4 bytes written.
 - Key: 112, size 4 bytes written.
 - Key: 113, size 4 bytes written.
 - Key: 114, size 4 bytes written.
 - Key: 115, size 4 bytes written.
 - Key: 116, size 4 bytes written.
 - Key: 117, size 2 bytes written.
 - Key: 118, size 4 bytes written.
 - Key: 120, size 4 bytes written.
Section: 67
 - Key: 0, size 2756 bytes written.
Section: 76
 - Key: 0, size 534 bytes written.
Section: 84
 - Key: 0, size 3 bytes written.
Section: 88
 - Key: 0, size 36 bytes written.
Section: 91
 - Key: 0, size 2048 bytes written.
Section: 96
 - Key: 0, size 24 bytes written.
Section: 107
 - Key: 0, size 21 bytes written.
 - Key: 1, size 89 bytes written.
 - Key: 2, size 69 bytes written.
 - Key: 3, size 70 bytes written.
 - Key: 25, size 132 bytes written.
Section: 110
 - Key: 0, size 6 bytes written.
Section: 111
 - Key: 0, size 200 bytes written.
 - Key: 1, size 20 bytes written.
 - Key: 2, size 20 bytes written.
 - Key: 126, size 20 bytes written.
 - Key: 127, size 20 bytes written.
 - Key: 150, size 8 bytes written.
 - Key: 151, size 4 bytes written.
 - Key: 152, size 40 bytes written.
Section: 116
 - Key: 0, size 2 bytes written.
 - Key: 1, size 12 bytes written.
 - Key: 2, size 36 bytes written.
 - Key: 3, size 36 bytes written.
 - Key: 4, size 36 bytes written.
 - Key: 5, size 36 bytes written.
 - Key: 6, size 36 bytes written.
 - Key: 7, size 36 bytes written.
 - Key: 8, size 36 bytes written.
 - Key: 9, size 36 bytes written.
 - Key: 10, size 36 bytes written.
 - Key: 11, size 36 bytes written.
 - Key: 12, size 36 bytes written.
 - Key: 13, size 40 bytes written.
 - Key: 14, size 40 bytes written.
 - Key: 15, size 40 bytes written.
 - Key: 16, size 40 bytes written.
 - Key: 17, size 40 bytes written.
 - Key: 18, size 40 bytes written.
 - Key: 19, size 40 bytes written.
 - Key: 20, size 40 bytes written.
 - Key: 21, size 40 bytes written.
 - Key: 22, size 40 bytes written.
Section: 117
 - Key: 5, size 10 bytes written.
 - Key: 6, size 8 bytes written.
 - Key: 8, size 40 bytes written.
Section: 123
 - Key: 0, size 3 bytes written.
 - Key: 4, size 3 bytes written.
Section: 153
 - Key: 0, size 68 bytes written.
 - Key: 1, size 68 bytes written.
 - Key: 2, size 68 bytes written.
 - Key: 3, size 68 bytes written.
 - Key: 4, size 68 bytes written.
 - Key: 5, size 68 bytes written.
Section: 163
 - Key: 0, size 8 bytes written.
Section: 165
 - Key: 0, size 16 bytes written.
 - Key: 1, size 8 bytes written.
Section: 181
 - Key: 0, size 8 bytes written.
 - Key: 1, size 10 bytes written.
Section: 182
 - Key: 3, size 8 bytes written.
 - Key: 13, size 8 bytes written.
 - Key: 18, size 8 bytes written.
 - Key: 19, size 8 bytes written.
 - Key: 22, size 8 bytes written.
Section: 183
 - Key: 3, size 8 bytes written.
 - Key: 13, size 8 bytes written.
 - Key: 18, size 8 bytes written.
 - Key: 19, size 8 bytes written.
 - Key: 22, size 8 bytes written.
Section: 184
 - Key: 3, size 8 bytes written.
 - Key: 13, size 8 bytes written.
 - Key: 18, size 8 bytes written.
 - Key: 19, size 8 bytes written.
 - Key: 22, size 8 bytes written.
Section: 185
 - Key: 3, size 8 bytes written.
 - Key: 13, size 8 bytes written.
 - Key: 18, size 8 bytes written.
 - Key: 19, size 8 bytes written.
 - Key: 22, size 8 bytes written.
Section: 186
 - Key: 3, size 8 bytes written.
 - Key: 5, size 8 bytes written.
 - Key: 12, size 12 bytes written.
 - Key: 13, size 8 bytes written.
 - Key: 18, size 8 bytes written.
 - Key: 19, size 8 bytes written.
 - Key: 22, size 8 bytes written.
Section: 187
 - Key: 3, size 8 bytes written.
 - Key: 13, size 8 bytes written.
 - Key: 18, size 8 bytes written.
 - Key: 19, size 8 bytes written.
 - Key: 22, size 8 bytes written.
Section: 188
 - Key: 3, size 8 bytes written.
 - Key: 13, size 8 bytes written.
 - Key: 18, size 8 bytes written.
 - Key: 19, size 8 bytes written.
 - Key: 22, size 8 bytes written.
Section: 190
 - Key: 0, size 355 bytes written.
Section: 191
 - Key: 0, size 5 bytes written.
Section: 193
 - Key: 2, size 8 bytes written.
 - Key: 3, size 32 bytes written.
 - Key: 4, size 32 bytes written.
 - Key: 9, size 64 bytes written.
Section: 200
 - Key: 0, size 5 bytes written.
Section: 202
 - Key: 4, size 42 bytes written.
Section: 213
 - Key: 0, size 20 bytes written.
Section: 215
 - Key: 0, size 84 bytes written.
Section: 217
 - Key: 0, size 32 bytes written.
Section: 218
 - Key: 0, size 2 bytes written.
Section: 225
 - Key: 1, size 6 bytes written.
 - Key: 2, size 6 bytes written.
Section: 232
 - Key: 0, size 20 bytes written.
 - Key: 9, size 4 bytes written.
Section: 238
Section: 250
 - Key: 1, size 1224 bytes written.
 - Key: 2, size 128 bytes written.
 - Key: 3, size 426 bytes written.
 - Key: 4, size 36 bytes written.
Section: 301
 - Key: 0, size 2 bytes written.
 - Key: 1, size 12 bytes written.
 - Key: 2, size 36 bytes written.
 - Key: 3, size 36 bytes written.
 - Key: 4, size 36 bytes written.
 - Key: 5, size 36 bytes written.
 - Key: 6, size 36 bytes written.
 - Key: 7, size 36 bytes written.
 - Key: 8, size 36 bytes written.
 - Key: 9, size 36 bytes written.
 - Key: 10, size 36 bytes written.
 - Key: 11, size 36 bytes written.
 - Key: 12, size 36 bytes written.
 - Key: 13, size 40 bytes written.
 - Key: 14, size 40 bytes written.
 - Key: 15, size 40 bytes written.
 - Key: 16, size 40 bytes written.
 - Key: 17, size 40 bytes written.
 - Key: 18, size 40 bytes written.
 - Key: 19, size 40 bytes written.
 - Key: 20, size 40 bytes written.
 - Key: 21, size 40 bytes written.
 - Key: 22, size 40 bytes written.
Section: 306
 - Key: 0, size 2 bytes written.
- 308 skipped
Section: 309
 - Key: 0, size 4 bytes written.
 - Key: 1, size 2 bytes written.
 - Key: 2, size 12 bytes written.
 - Key: 4, size 12 bytes written.
 - Key: 5, size 12 bytes written.
 - Key: 7, size 12 bytes written.
 - Key: 8, size 12 bytes written.
 - Key: 17, size 12 bytes written.
 - Key: 22, size 12 bytes written.
Section: 319
 - Key: 0, size 148 bytes written.
 - Key: 1, size 148 bytes written.
 - Key: 2, size 148 bytes written.
 - Key: 3, size 148 bytes written.
 - Key: 4, size 148 bytes written.
 - Key: 5, size 148 bytes written.
 - Key: 6, size 148 bytes written.
 - Key: 7, size 148 bytes written.
 - Key: 8, size 148 bytes written.
 - Key: 9, size 148 bytes written.
 - Key: 10, size 148 bytes written.
 - Key: 11, size 148 bytes written.
 - Key: 12, size 148 bytes written.
 - Key: 13, size 148 bytes written.
 - Key: 14, size 148 bytes written.
 - Key: 15, size 148 bytes written.
 - Key: 16, size 148 bytes written.
 - Key: 17, size 148 bytes written.
 - Key: 18, size 148 bytes written.
 - Key: 19, size 148 bytes written.
 - Key: 20, size 148 bytes written.
 - Key: 21, size 148 bytes written.
 - Key: 22, size 148 bytes written.
 - Key: 23, size 148 bytes written.
 - Key: 24, size 148 bytes written.
 - Key: 25, size 148 bytes written.
 - Key: 26, size 148 bytes written.
 - Key: 27, size 148 bytes written.
 - Key: 28, size 148 bytes written.
 - Key: 29, size 148 bytes written.
 - Key: 30, size 148 bytes written.
 - Key: 31, size 148 bytes written.
 - Key: 32, size 148 bytes written.
 - Key: 33, size 148 bytes written.
 - Key: 34, size 148 bytes written.
 - Key: 35, size 148 bytes written.
 - Key: 36, size 148 bytes written.
 - Key: 37, size 148 bytes written.
 - Key: 38, size 148 bytes written.
 - Key: 39, size 148 bytes written.
 - Key: 40, size 148 bytes written.
 - Key: 41, size 148 bytes written.
 - Key: 42, size 148 bytes written.
 - Key: 43, size 148 bytes written.
 - Key: 44, size 148 bytes written.
 - Key: 45, size 148 bytes written.
 - Key: 46, size 148 bytes written.
Section: 320
 - Key: 0, size 148 bytes written.
 - Key: 1, size 148 bytes written.
 - Key: 2, size 148 bytes written.
 - Key: 3, size 148 bytes written.
 - Key: 4, size 148 bytes written.
 - Key: 5, size 148 bytes written.
 - Key: 6, size 148 bytes written.
 - Key: 7, size 148 bytes written.
 - Key: 8, size 148 bytes written.
 - Key: 9, size 148 bytes written.
 - Key: 10, size 148 bytes written.
 - Key: 11, size 148 bytes written.
 - Key: 12, size 148 bytes written.
 - Key: 13, size 148 bytes written.
 - Key: 14, size 148 bytes written.
 - Key: 15, size 148 bytes written.
 - Key: 16, size 148 bytes written.
 - Key: 17, size 148 bytes written.
 - Key: 18, size 148 bytes written.
Section: 321
 - Key: 0, size 148 bytes written.
 - Key: 1, size 148 bytes written.
 - Key: 2, size 148 bytes written.
 - Key: 3, size 148 bytes written.
 - Key: 4, size 148 bytes written.
 - Key: 5, size 148 bytes written.
 - Key: 6, size 148 bytes written.
 - Key: 7, size 148 bytes written.
Section: 322
Section: 325
 - Key: 0, size 63 bytes written.
 - Key: 1, size 87 bytes written.
 - Key: 2, size 69 bytes written.
 - Key: 3, size 73 bytes written.
 - Key: 4, size 93 bytes written.
 - Key: 5, size 63 bytes written.
 - Key: 6, size 55 bytes written.
Section: 334
Section: 339
 - Key: 0, size 511 bytes written.
 - Key: 1, size 511 bytes written.
Section: 341
 - Key: 3, size 4 bytes written.
 - Key: 4, size 4902 bytes written.
Completed in 21.954 s
And all be done,

Code:
Phone Type: RM-237 (Nokia 3110c)
SW Version: V 07.21 05-11-08 RM-237 (c) Nokia.            
Imei plain: 35322503273286-5
Product Code: 0550691
Language Pack:
- not available.

SIMLOCK seems to be valid
SUPERDONGLE_KEY seems to be valid
SIMLOCK_TEST passed
SECURITY_TEST passed
 
 
Imei net: 353225032732865
Version: SIMLOCK SERVER VERSION 63
Provider: Nokia Test, Country: Finland
Counter: 0/3, 0/10
 
CONFIG_DATA: 2440700000000000
PROFILE_BITS: 0000000000000000
 
BLOCK 1:   1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 2:   1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 3:   1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 4:   1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 5:   1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 6:   1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 7:   1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF

Last edited by gbluez; 01-22-2010 at 03:19.
 
The Following 181 Users Say Thank You to gbluez For This Useful Post:
Show/Hide list of the thanked
Old 01-27-2010, 17:36   #19 (permalink)
No Life Poster
 
gbluez's Avatar
 
Join Date: Jul 2004
Posts: 11,049
Member: 73565
Status: Offline
Thanks Meter: 5,062
Lightbulb Why we need NOKIA USB ROM as interface? One of the reason....

Hello,
here is another tips, how to take flashing job such phone by mxkey.

Here is boot check output by UFSxHWK.
Just example using UFS.



And this is the BUS Check by using mobileEx current version.



Try to fix the flash loader if you had problem like this.
This also fix DCT4 issue about "BootLoader not responding, mostly RAM problem !"





Nay...nay..nay.. This phone is not supported for flashing on F-Bus interface.



As told by mobileEx, that current interface is not supported, so we must use Nokia USB ROM.
And all be done without any problem.




Code:
Flashing completed in 4 min 28.672 s
 
 
Phone Type:  
SW Version: 
Imei plain: -
Language Pack:
- not available.

 
 
Total time to process is 4 min 55.312 s
USB Pooling failed, phone not found !
Just ignore the final error message, that is not a problem.

You can use F-Bus for any Service Operation.
It is supported. Reset, Format, write PM, etc.

Code:
Phone Type: RM-504 (Nokia 5530 XpressMusic)
SW Version: V ICPR72_09w36.5 25-09-09 RM-504 (c) Nokia 
Imei plain: 35420003703310-5
Product Code: 0578167
ApeCoreSw: V 20.0.080
Language Pack:
- not available.

This phone have PM308 protected, SD security in not restorable.
- Avoid SW Downgrade & manual erase to this phone !
 
SIMLOCK seems to be valid
SUPERDONGLE_KEY seems to be valid
SIMLOCK_TEST passed
SECURITY_TEST passed
 
TimeStamp: 2009-12-07T11:08:23+00:00
SW Version: 20.0.080
Variant Version: 001
ProductProfile: RM504_0578167_20.0.080_001.spr
Simlock: simlock_3gstandard_bb5.bin
 
Imei net: 354200037033105
Version: SIMLOCK SERVER
Provider: Nokia Test, Country: Finland
Counter: 0/3, 0/10
 
CONFIG_DATA: 2440700000000000
PROFILE_BITS: 0000000000000000
 
BLOCK 1:   1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 2:   1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 3:   1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 4:   1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 5:   1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 6:   1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 7:   1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
Reset:
Code:
FULL FACTORY... OK
USER DATA... OK
LEAVE FACTORY... OK
SERVICE CENTER... OK
SOFTWARE UPGRADE... OK
PRODUCTION TUNING... OK
Reset User Code (to default:12345) ... OK
Completed in 4.109 s
Format:
Code:
Formating FS: C ... 
Completed in 0.172 s
Formating FS: D ... 
Completed in 0.203 s
Formating FS: E ... 
Completed in 1.453 s
Formating FS: Z ... 
Completed in 0.203 s


Best Regards,
MX Key
 
The Following 64 Users Say Thank You to gbluez For This Useful Post:
Show/Hide list of the thanked
Old 02-06-2010, 10:06   #20 (permalink)
No Life Poster
 
Andra's Avatar
 
Join Date: Feb 2005
Location: AD
Posts: 4,665
Member: 976728
Status: Offline
Sonork: 1589709
Thanks Meter: 4,775
Repair SUPERDONGLE

phone info
Code:
Phone Type: RM-303 (Nokia 5310 XpressMusic)
SW Version: V 10.10 23-03-09 RM-303 (c) Nokia             
Imei plain: andra
Product Code: 0558573
Language Pack:
- not available.

SIMLOCK seems to be valid
SUPERDONGLE_KEY invalid!
- WD timer enabled, phone will reboot itself after 3 min.
SIMLOCK_TEST passed
SECURITY_TEST passed
 
 
Imei net: andra
Version: SIMLOCK SERVER
Provider: Nokia Test, Country: Finland
Counter: 0/3, 0/10
 
CONFIG_DATA: 2440700000000000
PROFILE_BITS: 0000000000000000
 
BLOCK 1:   1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 2:   1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 3:   1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 4:   1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 5:   1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 6:   1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 7:   1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
repair SUPERDONGLE



Code:
Product: V 10.10 23-03-09 RM-303 (c) Nokia             
 
SYSTEM ASIC ID: 000000010000022600010006010C192101013000 
ROOT KEY HASH: BAF3A9C3DBFA8454937DB77F2B8852B1
ROM ID: 273F6D55DFAAF68F
Sending SecondaryBoot  ...OK
Sending PreLoader ...OK
Sending CustomLoader ...OK
 
Calculating SUPERDONGLE using security server ...
Connecting to server[main.mxkey.biz] ...OK, secure login ...
Completed in 9.484 s
 
RPL saved to "C:\mobileEx\3.3\data\backup\BB5_RM-303_andra_SD.RPL" 
Updating SUPERDONGLE_KEY ...OK
scan
Code:
Phone Type: RM-303 (Nokia 5310 XpressMusic)
SW Version: V 10.10 23-03-09 RM-303 (c) Nokia             
Imei plain: andra
Product Code: 0558573
Language Pack:
- not available.

SIMLOCK seems to be valid
SUPERDONGLE_KEY seems to be valid
SIMLOCK_TEST passed
SECURITY_TEST failed!
 
 
Imei net: andra
Version: SIMLOCK SERVER
Provider: Nokia Test, Country: Finland
Counter: 0/3, 0/10
 
CONFIG_DATA: 2440700000000000
PROFILE_BITS: 0000000000000000
 
BLOCK 1:   1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 2:   1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 3:   1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 4:   1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 5:   1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 6:   1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 7:   1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF

DO "SUPER SD AUTH"



Code:
Product: V 10.10 23-03-09 RM-303 (c) Nokia             
 
SYSTEM ASIC ID: 000000010000022600010006010C192101013000 
ROOT KEY HASH: BAF3A9C3DBFA8454937DB77F2B8852B1
ROM ID: 273F6D55DFAAF68F
Sending SecondaryBoot  ...OK
Sending PreLoader ...OK
Sending CustomLoader ...OK
 
Restarting phone ...
Connecting to server[main.mxkey.biz] ...OK, secure login ...
Authenticating to SUPERDONGLE using security server ...
SUPERDONGLE authorized :)!
write PM
Code:
Writing PM from Node ...
Section: 1
 - Key: 0, size 12 bytes written.
 - Key: 2, size 70 bytes written.
 - Key: 3, size 70 bytes written.
 - Key: 4, size 70 bytes written.
 - Key: 6, size 276 bytes written.
 - Key: 7, size 276 bytes written.
 - Key: 8, size 276 bytes written.
 - Key: 10, size 384 bytes written.
 - Key: 11, size 384 bytes written.
 - Key: 12, size 384 bytes written.
 - Key: 14, size 384 bytes written.
 - Key: 15, size 384 bytes written.
 - Key: 16, size 384 bytes written.
 - Key: 17, size 32 bytes written.
 - Key: 19, size 16 bytes written.
Section: 2
 - Key: 0, size 440 bytes written.
Section: 4
 - Key: 1, size 800 bytes written.
 - Key: 3, size 10 bytes written.
 - Key: 4, size 8 bytes written.
 - Key: 5, size 8 bytes written.
 - Key: 6, size 8 bytes written.
 - Key: 9, size 5 bytes written.
 - Key: 18, size 80 bytes written.
 - Key: 19, size 4 bytes written.
 - Key: 28, size 2 bytes written.
Section: 8
 - Key: 0, size 12 bytes written.
 - Key: 1, size 12 bytes written.
 - Key: 2, size 128 bytes written.
 - Key: 3, size 128 bytes written.
 - Key: 4, size 8 bytes written.
 - Key: 6, size 4 bytes written.
 - Key: 7, size 8 bytes written.
 - Key: 8, size 8 bytes written.
 - Key: 9, size 24 bytes written.
Section: 11
 - Key: 0, size 4 bytes written.
 - Key: 1, size 4 bytes written.
 - Key: 2, size 4 bytes written.
 - Key: 3, size 4 bytes written.
 - Key: 4, size 1 bytes written.
 - Key: 5, size 6 bytes written.
 - Key: 6, size 2 bytes written.
 - Key: 7, size 1 bytes written.
 - Key: 8, size 1 bytes written.
 - Key: 9, size 1 bytes written.
 - Key: 10, size 1 bytes written.
 - Key: 11, size 1 bytes written.
 - Key: 12, size 1 bytes written.
 - Key: 13, size 1 bytes written.
 - Key: 14, size 2 bytes written.
 - Key: 15, size 2 bytes written.
 - Key: 16, size 2 bytes written.
 - Key: 17, size 2 bytes written.
 - Key: 18, size 16 bytes written.
 - Key: 19, size 32 bytes written.
 - Key: 20, size 32 bytes written.
 - Key: 21, size 2 bytes written.
 - Key: 22, size 2 bytes written.
 - Key: 23, size 2 bytes written.
 - Key: 24, size 2 bytes written.
 - Key: 25, size 2 bytes written.
 - Key: 26, size 2 bytes written.
 - Key: 27, size 2 bytes written.
 - Key: 28, size 2 bytes written.
 - Key: 29, size 2 bytes written.
 - Key: 30, size 2 bytes written.
 - Key: 31, size 2 bytes written.
 - Key: 32, size 2 bytes written.
 - Key: 33, size 2 bytes written.
 - Key: 34, size 2 bytes written.
 - Key: 35, size 2 bytes written.
 - Key: 36, size 2 bytes written.
 - Key: 37, size 2 bytes written.
 - Key: 38, size 2 bytes written.
 - Key: 39, size 2 bytes written.
 - Key: 40, size 2 bytes written.
 - Key: 41, size 2 bytes written.
 - Key: 42, size 2 bytes written.
 - Key: 43, size 2 bytes written.
 - Key: 44, size 2 bytes written.
 - Key: 45, size 2 bytes written.
 - Key: 46, size 2 bytes written.
 - Key: 47, size 2 bytes written.
 - Key: 48, size 2 bytes written.
 - Key: 49, size 2 bytes written.
 - Key: 50, size 2 bytes written.
 - Key: 51, size 2 bytes written.
 - Key: 52, size 2 bytes written.
 - Key: 53, size 2 bytes written.
 - Key: 54, size 2 bytes written.
 - Key: 55, size 2 bytes written.
 - Key: 56, size 2 bytes written.
 - Key: 57, size 2 bytes written.
 - Key: 58, size 2 bytes written.
 - Key: 59, size 2 bytes written.
 - Key: 60, size 2 bytes written.
 - Key: 61, size 2 bytes written.
 - Key: 62, size 2 bytes written.
 - Key: 63, size 2 bytes written.
 - Key: 64, size 2 bytes written.
 - Key: 65, size 4 bytes written.
 - Key: 66, size 1 bytes written.
 - Key: 67, size 4 bytes written.
 - Key: 68, size 4 bytes written.
 - Key: 69, size 4 bytes written.
 - Key: 70, size 4 bytes written.
 - Key: 71, size 16 bytes written.
 - Key: 72, size 4 bytes written.
 - Key: 73, size 2 bytes written.
 - Key: 74, size 13 bytes written.
Section: 12
 - Key: 0, size 102 bytes written.
Section: 13
 - Key: 0, size 1 bytes written.
 - Key: 1, size 2 bytes written.
 - Key: 2, size 1 bytes written.
 - Key: 3, size 2 bytes written.
 - Key: 4, size 1 bytes written.
 - Key: 5, size 1 bytes written.
 - Key: 6, size 1 bytes written.
 - Key: 7, size 1 bytes written.
 - Key: 8, size 2 bytes written.
 - Key: 9, size 1 bytes written.
 - Key: 10, size 1 bytes written.
 - Key: 11, size 48 bytes written.
 - Key: 12, size 4 bytes written.
 - Key: 13, size 1 bytes written.
 - Key: 14, size 1 bytes written.
 - Key: 15, size 886 bytes written.
 - Key: 16, size 2 bytes written.
 - Key: 17, size 1 bytes written.
 - Key: 18, size 1 bytes written.
 - Key: 19, size 8 bytes written.
 - Key: 20, size 1 bytes written.
 - Key: 21, size 1 bytes written.
 - Key: 22, size 1 bytes written.
 - Key: 23, size 1 bytes written.
 - Key: 24, size 1 bytes written.
 - Key: 25, size 2 bytes written.
 - Key: 26, size 1 bytes written.
 - Key: 27, size 1 bytes written.
 - Key: 28, size 1 bytes written.
 - Key: 29, size 1 bytes written.
 - Key: 30, size 1 bytes written.
 - Key: 31, size 1 bytes written.
 - Key: 32, size 1 bytes written.
 - Key: 33, size 1 bytes written.
 - Key: 34, size 1 bytes written.
 - Key: 35, size 1 bytes written.
 - Key: 36, size 1 bytes written.
 - Key: 37, size 4 bytes written.
 - Key: 38, size 1 bytes written.
 - Key: 39, size 1 bytes written.
 - Key: 40, size 1 bytes written.
 - Key: 41, size 1 bytes written.
 - Key: 42, size 4 bytes written.
 - Key: 43, size 4 bytes written.
 - Key: 44, size 1 bytes written.
 - Key: 45, size 4 bytes written.
 - Key: 46, size 4 bytes written.
 - Key: 47, size 1 bytes written.
 - Key: 48, size 4 bytes written.
 - Key: 49, size 1 bytes written.
 - Key: 50, size 1 bytes written.
 - Key: 51, size 1 bytes written.
 - Key: 52, size 2 bytes written.
 - Key: 53, size 4 bytes written.
 - Key: 54, size 4 bytes written.
 - Key: 55, size 1 bytes written.
 - Key: 56, size 1 bytes written.
 - Key: 57, size 1 bytes written.
 - Key: 58, size 2 bytes written.
 - Key: 59, size 1 bytes written.
 - Key: 60, size 4 bytes written.
 - Key: 61, size 4 bytes written.
 - Key: 62, size 1 bytes written.
 - Key: 63, size 4 bytes written.
 - Key: 64, size 4 bytes written.
 - Key: 65, size 1 bytes written.
 - Key: 66, size 4 bytes written.
 - Key: 67, size 4 bytes written.
 - Key: 68, size 1 bytes written.
 - Key: 69, size 1 bytes written.
 - Key: 70, size 1 bytes written.
 - Key: 71, size 4 bytes written.
 - Key: 72, size 4 bytes written.
 - Key: 73, size 1 bytes written.
 - Key: 74, size 4 bytes written.
 - Key: 75, size 2 bytes written.
 - Key: 76, size 2 bytes written.
 - Key: 77, size 2 bytes written.
 - Key: 78, size 1 bytes written.
 - Key: 79, size 1 bytes written.
 - Key: 80, size 1 bytes written.
 - Key: 81, size 1 bytes written.
 - Key: 82, size 1 bytes written.
 - Key: 83, size 2 bytes written.
 - Key: 84, size 1 bytes written.
 - Key: 85, size 4 bytes written.
 - Key: 86, size 4 bytes written.
 - Key: 87, size 2 bytes written.
 - Key: 88, size 1 bytes written.
 - Key: 89, size 4 bytes written.
 - Key: 90, size 4 bytes written.
 - Key: 91, size 2 bytes written.
 - Key: 92, size 1 bytes written.
 - Key: 93, size 4 bytes written.
 - Key: 94, size 4 bytes written.
 - Key: 95, size 2 bytes written.
 - Key: 96, size 1 bytes written.
 - Key: 97, size 4 bytes written.
 - Key: 98, size 4 bytes written.
 - Key: 99, size 2 bytes written.
 - Key: 100, size 4 bytes written.
 - Key: 101, size 2 bytes written.
 - Key: 102, size 1 bytes written.
 - Key: 103, size 4 bytes written.
 - Key: 104, size 4 bytes written.
 - Key: 105, size 4 bytes written.
 - Key: 106, size 4 bytes written.
 - Key: 107, size 4 bytes written.
 - Key: 108, size 2 bytes written.
 - Key: 109, size 4 bytes written.
 - Key: 110, size 4 bytes written.
 - Key: 111, size 4 bytes written.
 - Key: 112, size 2 bytes written.
 - Key: 113, size 4 bytes written.
 - Key: 114, size 4 bytes written.
 - Key: 115, size 1 bytes written.
 - Key: 116, size 1 bytes written.
 - Key: 117, size 1 bytes written.
 - Key: 118, size 4 bytes written.
 - Key: 119, size 4 bytes written.
 - Key: 120, size 1 bytes written.
 - Key: 121, size 1 bytes written.
 - Key: 122, size 1 bytes written.
 - Key: 123, size 8 bytes written.
 - Key: 124, size 1 bytes written.
 - Key: 125, size 1 bytes written.
 - Key: 126, size 1 bytes written.
 - Key: 127, size 1 bytes written.
 - Key: 128, size 1 bytes written.
 - Key: 129, size 4 bytes written.
 - Key: 130, size 4 bytes written.
 - Key: 131, size 1 bytes written.
 - Key: 132, size 1 bytes written.
 - Key: 133, size 2 bytes written.
 - Key: 134, size 1 bytes written.
 - Key: 135, size 2 bytes written.
 - Key: 136, size 1 bytes written.
 - Key: 137, size 1 bytes written.
 - Key: 138, size 4 bytes written.
 - Key: 139, size 4 bytes written.
 - Key: 140, size 1 bytes written.
 - Key: 141, size 1 bytes written.
 - Key: 142, size 1 bytes written.
 - Key: 143, size 1 bytes written.
 - Key: 144, size 4 bytes written.
 - Key: 145, size 8 bytes written.
 - Key: 146, size 4 bytes written.
 - Key: 147, size 4 bytes written.
 - Key: 148, size 1 bytes written.
 - Key: 149, size 1 bytes written.
 - Key: 150, size 1 bytes written.
 - Key: 151, size 1 bytes written.
 - Key: 152, size 1 bytes written.
 - Key: 153, size 1 bytes written.
 - Key: 154, size 1 bytes written.
 - Key: 155, size 1 bytes written.
 - Key: 156, size 1 bytes written.
 - Key: 157, size 1 bytes written.
 - Key: 158, size 1 bytes written.
 - Key: 159, size 2 bytes written.
 - Key: 160, size 2 bytes written.
 - Key: 161, size 1 bytes written.
 - Key: 162, size 1 bytes written.
 - Key: 163, size 1 bytes written.
 - Key: 164, size 1 bytes written.
 - Key: 165, size 1 bytes written.
 - Key: 166, size 1 bytes written.
 - Key: 167, size 8 bytes written.
 - Key: 168, size 4 bytes written.
 - Key: 169, size 1 bytes written.
 - Key: 170, size 1 bytes written.
 - Key: 171, size 1 bytes written.
 - Key: 172, size 1 bytes written.
 - Key: 173, size 1 bytes written.
 - Key: 174, size 1 bytes written.
 - Key: 175, size 1 bytes written.
 - Key: 176, size 1 bytes written.
 - Key: 177, size 4 bytes written.
 - Key: 178, size 2 bytes written.
 - Key: 179, size 1 bytes written.
 - Key: 180, size 1 bytes written.
 - Key: 181, size 1 bytes written.
 - Key: 182, size 1 bytes written.
 - Key: 183, size 1 bytes written.
 - Key: 184, size 1 bytes written.
 - Key: 185, size 1 bytes written.
 - Key: 186, size 1 bytes written.
 - Key: 187, size 1 bytes written.
 - Key: 188, size 1 bytes written.
 - Key: 189, size 1 bytes written.
 - Key: 190, size 4 bytes written.
 - Key: 191, size 2 bytes written.
 - Key: 192, size 1 bytes written.
 - Key: 193, size 4 bytes written.
 - Key: 194, size 1 bytes written.
 - Key: 195, size 1 bytes written.
 - Key: 196, size 10 bytes written.
Section: 31
 - Key: 4, size 14 bytes written.
Section: 42
 - Key: 0, size 2 bytes written.
 - Key: 1, size 12 bytes written.
 - Key: 2, size 36 bytes written.
 - Key: 3, size 36 bytes written.
 - Key: 4, size 36 bytes written.
 - Key: 5, size 36 bytes written.
 - Key: 6, size 36 bytes written.
 - Key: 7, size 40 bytes written.
 - Key: 8, size 40 bytes written.
 - Key: 9, size 40 bytes written.
 - Key: 10, size 40 bytes written.
 - Key: 11, size 40 bytes written.
 - Key: 12, size 40 bytes written.
 - Key: 13, size 40 bytes written.
 - Key: 14, size 40 bytes written.
Section: 44
 - Key: 0, size 1 bytes written.
Section: 50
 - Key: 0, size 2 bytes written.
Section: 54
 - Key: 0, size 2 bytes written.
Section: 58
 - Key: 0, size 22 bytes written.
 - Key: 1, size 39 bytes written.
 - Key: 2, size 34 bytes written.
 - Key: 3, size 38 bytes written.
 - Key: 4, size 40 bytes written.
 - Key: 5, size 43 bytes written.
 - Key: 6, size 41 bytes written.
 - Key: 7, size 27 bytes written.
 - Key: 8, size 28 bytes written.
 - Key: 9, size 40 bytes written.
 - Key: 10, size 37 bytes written.
 - Key: 11, size 38 bytes written.
 - Key: 12, size 35 bytes written.
 - Key: 13, size 38 bytes written.
 - Key: 14, size 30 bytes written.
 - Key: 15, size 45 bytes written.
 - Key: 16, size 39 bytes written.
 - Key: 17, size 37 bytes written.
 - Key: 18, size 34 bytes written.
 - Key: 19, size 42 bytes written.
 - Key: 20, size 38 bytes written.
 - Key: 21, size 28 bytes written.
 - Key: 22, size 37 bytes written.
 - Key: 23, size 41 bytes written.
 - Key: 24, size 48 bytes written.
 - Key: 25, size 41 bytes written.
 - Key: 26, size 43 bytes written.
 - Key: 27, size 55 bytes written.
 - Key: 28, size 49 bytes written.
 - Key: 29, size 43 bytes written.
 - Key: 30, size 28 bytes written.
 - Key: 31, size 41 bytes written.
 - Key: 32, size 41 bytes written.
 - Key: 33, size 26 bytes written.
 - Key: 34, size 35 bytes written.
 - Key: 35, size 41 bytes written.
 - Key: 36, size 33 bytes written.
 - Key: 37, size 39 bytes written.
 - Key: 38, size 29 bytes written.
 - Key: 39, size 34 bytes written.
 - Key: 40, size 23 bytes written.
 - Key: 41, size 29 bytes written.
 - Key: 42, size 31 bytes written.
 - Key: 43, size 25 bytes written.
 - Key: 44, size 31 bytes written.
 - Key: 45, size 38 bytes written.
 - Key: 46, size 28 bytes written.
 - Key: 47, size 31 bytes written.
 - Key: 48, size 30 bytes written.
 - Key: 49, size 26 bytes written.
 - Key: 50, size 37 bytes written.
 - Key: 51, size 33 bytes written.
 - Key: 52, size 42 bytes written.
 - Key: 53, size 25 bytes written.
 - Key: 54, size 27 bytes written.
 - Key: 55, size 34 bytes written.
 - Key: 56, size 27 bytes written.
 - Key: 57, size 41 bytes written.
 - Key: 58, size 38 bytes written.
 - Key: 59, size 31 bytes written.
 - Key: 60, size 39 bytes written.
 - Key: 61, size 48 bytes written.
 - Key: 62, size 43 bytes written.
 - Key: 63, size 53 bytes written.
 - Key: 64, size 19 bytes written.
 - Key: 65, size 48 bytes written.
 - Key: 66, size 33 bytes written.
 - Key: 67, size 19 bytes written.
 - Key: 68, size 49 bytes written.
 - Key: 69, size 48 bytes written.
 - Key: 70, size 49 bytes written.
 - Key: 71, size 37 bytes written.
 - Key: 72, size 37 bytes written.
 - Key: 73, size 32 bytes written.
 - Key: 74, size 48 bytes written.
 - Key: 75, size 41 bytes written.
 - Key: 76, size 31 bytes written.
 - Key: 77, size 40 bytes written.
 - Key: 78, size 47 bytes written.
 - Key: 79, size 39 bytes written.
 - Key: 80, size 28 bytes written.
 - Key: 81, size 29 bytes written.
 - Key: 82, size 47 bytes written.
 - Key: 83, size 29 bytes written.
 - Key: 84, size 35 bytes written.
 - Key: 85, size 31 bytes written.
 - Key: 86, size 31 bytes written.
 - Key: 87, size 41 bytes written.
 - Key: 88, size 35 bytes written.
 - Key: 89, size 31 bytes written.
 - Key: 90, size 25 bytes written.
 - Key: 91, size 28 bytes written.
 - Key: 92, size 34 bytes written.
 - Key: 93, size 33 bytes written.
 - Key: 94, size 26 bytes written.
 - Key: 95, size 33 bytes written.
 - Key: 96, size 49 bytes written.
 - Key: 97, size 28 bytes written.
 - Key: 98, size 29 bytes written.
 - Key: 99, size 38 bytes written.
 - Key: 100, size 27 bytes written.
 - Key: 101, size 45 bytes written.
 - Key: 102, size 39 bytes written.
 - Key: 103, size 31 bytes written.
 - Key: 104, size 39 bytes written.
 - Key: 105, size 29 bytes written.
 - Key: 106, size 26 bytes written.
 - Key: 107, size 28 bytes written.
 - Key: 108, size 53 bytes written.
 - Key: 109, size 20 bytes written.
 - Key: 110, size 38 bytes written.
 - Key: 111, size 29 bytes written.
 - Key: 112, size 45 bytes written.
 - Key: 113, size 24 bytes written.
 - Key: 114, size 40 bytes written.
 - Key: 115, size 34 bytes written.
 - Key: 116, size 32 bytes written.
 - Key: 117, size 34 bytes written.
 - Key: 118, size 39 bytes written.
 - Key: 119, size 34 bytes written.
 - Key: 120, size 40 bytes written.
 - Key: 121, size 38 bytes written.
 - Key: 122, size 35 bytes written.
 - Key: 123, size 43 bytes written.
 - Key: 124, size 29 bytes written.
 - Key: 125, size 36 bytes written.
 - Key: 126, size 35 bytes written.
 - Key: 127, size 36 bytes written.
 - Key: 128, size 44 bytes written.
 - Key: 129, size 27 bytes written.
 - Key: 130, size 36 bytes written.
 - Key: 131, size 39 bytes written.
 - Key: 132, size 30 bytes written.
 - Key: 133, size 27 bytes written.
 - Key: 134, size 34 bytes written.
 - Key: 135, size 32 bytes written.
 - Key: 136, size 42 bytes written.
 - Key: 137, size 37 bytes written.
 - Key: 138, size 46 bytes written.
 - Key: 139, size 48 bytes written.
 - Key: 140, size 30 bytes written.
 - Key: 141, size 38 bytes written.
 - Key: 142, size 36 bytes written.
 - Key: 143, size 38 bytes written.
 - Key: 144, size 77 bytes written.
 - Key: 145, size 32 bytes written.
 - Key: 146, size 42 bytes written.
 - Key: 147, size 35 bytes written.
 - Key: 148, size 29 bytes written.
 - Key: 149, size 79 bytes written.
 - Key: 150, size 29 bytes written.
 - Key: 151, size 28 bytes written.
 - Key: 152, size 30 bytes written.
 - Key: 153, size 40 bytes written.
 - Key: 154, size 43 bytes written.
 - Key: 155, size 43 bytes written.
 - Key: 156, size 28 bytes written.
 - Key: 157, size 29 bytes written.
 - Key: 158, size 41 bytes written.
 - Key: 159, size 39 bytes written.
 - Key: 160, size 50 bytes written.
 - Key: 161, size 22 bytes written.
 - Key: 162, size 25 bytes written.
 - Key: 163, size 40 bytes written.
Section: 59
 - Key: 0, size 136 bytes written.
 - Key: 1, size 50 bytes written.
 - Key: 2, size 110 bytes written.
 - Key: 3, size 32 bytes written.
 - Key: 4, size 105 bytes written.
 - Key: 5, size 78 bytes written.
Section: 60
 - Key: 0, size 45 bytes written.
 - Key: 1, size 63 bytes written.
Section: 61
 - Key: 0, size 48 bytes written.
 - Key: 1, size 50 bytes written.
 - Key: 2, size 68 bytes written.
Section: 66
 - Key: 0, size 2050 bytes written.
 - Key: 1, size 240 bytes written.
 - Key: 2, size 240 bytes written.
 - Key: 3, size 1 bytes written.
 - Key: 4, size 1 bytes written.
 - Key: 5, size 240 bytes written.
 - Key: 6, size 4 bytes written.
 - Key: 7, size 4 bytes written.
 - Key: 8, size 4 bytes written.
 - Key: 9, size 4 bytes written.
 - Key: 10, size 240 bytes written.
 - Key: 11, size 240 bytes written.
 - Key: 12, size 1 bytes written.
 - Key: 16, size 4 bytes written.
 - Key: 18, size 4 bytes written.
 - Key: 20, size 4 bytes written.
 - Key: 22, size 4 bytes written.
 - Key: 24, size 4 bytes written.
 - Key: 26, size 4 bytes written.
 - Key: 28, size 4 bytes written.
 - Key: 30, size 4 bytes written.
 - Key: 32, size 4 bytes written.
 - Key: 34, size 4 bytes written.
 - Key: 41, size 251 bytes written.
 - Key: 46, size 2 bytes written.
 - Key: 57, size 8 bytes written.
 - Key: 58, size 8 bytes written.
 - Key: 59, size 8 bytes written.
 - Key: 60, size 8 bytes written.
 - Key: 61, size 8 bytes written.
 - Key: 62, size 8 bytes written.
 - Key: 63, size 8 bytes written.
 - Key: 64, size 8 bytes written.
 - Key: 65, size 8 bytes written.
 - Key: 66, size 8 bytes written.
 - Key: 67, size 8 bytes written.
 - Key: 68, size 8 bytes written.
 - Key: 69, size 8 bytes written.
 - Key: 70, size 8 bytes written.
 - Key: 71, size 8 bytes written.
 - Key: 72, size 8 bytes written.
 - Key: 73, size 8 bytes written.
 - Key: 75, size 8 bytes written.
 - Key: 76, size 8 bytes written.
 - Key: 77, size 24016 bytes written.
 - Key: 78, size 6144 bytes written.
 - Key: 79, size 300 bytes written.
 - Key: 80, size 60 bytes written.
 - Key: 84 skipped, frame length too long
 - Key: 85, size 8 bytes written.
 - Key: 86, size 3 bytes written.
 - Key: 87, size 3 bytes written.
 - Key: 88, size 3 bytes written.
 - Key: 89, size 3 bytes written.
 - Key: 91, size 3 bytes written.
 - Key: 92, size 3 bytes written.
 - Key: 93, size 3 bytes written.
 - Key: 94, size 3 bytes written.
 - Key: 95, size 3 bytes written.
 - Key: 96, size 3 bytes written.
 - Key: 97, size 2 bytes written.
 - Key: 98, size 4 bytes written.
 - Key: 103, size 8 bytes written.
 - Key: 106, size 680 bytes written.
 - Key: 107, size 712 bytes written.
 - Key: 108, size 4 bytes written.
 - Key: 109, size 4 bytes written.
 - Key: 110, size 660 bytes written.
 - Key: 111, size 990 bytes written.
 - Key: 112, size 4 bytes written.
 - Key: 113, size 660 bytes written.
 - Key: 114, size 660 bytes written.
 - Key: 115, size 441 bytes written.
 - Key: 116, size 441 bytes written.
 - Key: 117, size 441 bytes written.
 - Key: 118, size 441 bytes written.
 - Key: 119, size 441 bytes written.
 - Key: 120, size 441 bytes written.
 - Key: 121, size 441 bytes written.
 - Key: 122, size 120 bytes written.
 - Key: 123, size 2 bytes written.
 - Key: 125, size 30 bytes written.
 - Key: 126, size 1 bytes written.
 - Key: 127, size 20 bytes written.
 - Key: 129, size 8 bytes written.
 - Key: 130, size 37 bytes written.
 - Key: 131, size 24246 bytes written.
 - Key: 132, size 10 bytes written.
 - Key: 133, size 24206 bytes written.
 - Key: 134, size 10 bytes written.
 - Key: 135, size 16246 bytes written.
Section: 88
 - Key: 0, size 36 bytes written.
Section: 96
 - Key: 0, size 24 bytes written.
Section: 107
 - Key: 0, size 21 bytes written.
 - Key: 1, size 89 bytes written.
 - Key: 2, size 69 bytes written.
 - Key: 3, size 70 bytes written.
 - Key: 25, size 132 bytes written.
 - Key: 26, size 12 bytes written.
Section: 116
 - Key: 0, size 2 bytes written.
 - Key: 1, size 12 bytes written.
 - Key: 2, size 36 bytes written.
 - Key: 3, size 36 bytes written.
 - Key: 4, size 36 bytes written.
 - Key: 5, size 36 bytes written.
 - Key: 6, size 36 bytes written.
 - Key: 7, size 40 bytes written.
 - Key: 8, size 40 bytes written.
 - Key: 9, size 40 bytes written.
 - Key: 10, size 40 bytes written.
 - Key: 11, size 40 bytes written.
 - Key: 12, size 40 bytes written.
 - Key: 13, size 40 bytes written.
 - Key: 14, size 40 bytes written.
 - Key: 15, size 40 bytes written.
 - Key: 16, size 40 bytes written.
Section: 117
 - Key: 0, size 4 bytes written.
 - Key: 1, size 3 bytes written.
 - Key: 2, size 6 bytes written.
 - Key: 3, size 1 bytes written.
 - Key: 5, size 10 bytes written.
 - Key: 6, size 8 bytes written.
 - Key: 13, size 3 bytes written.
 - Key: 14, size 3 bytes written.
 - Key: 16, size 40 bytes written.
Section: 153
 - Key: 0, size 68 bytes written.
 - Key: 1, size 68 bytes written.
 - Key: 2, size 68 bytes written.
 - Key: 3, size 68 bytes written.
 - Key: 4, size 68 bytes written.
 - Key: 5, size 68 bytes written.
Section: 163
 - Key: 0, size 8 bytes written.
Section: 193
 - Key: 2, size 8 bytes written.
 - Key: 3, size 32 bytes written.
 - Key: 4, size 32 bytes written.
 - Key: 9, size 64 bytes written.
Section: 208
 - Key: 1, size 4 bytes written.
Section: 217
 - Key: 0, size 32 bytes written.
Section: 218
 - Key: 0, size 2 bytes written.
Section: 232
 - Key: 0, size 20 bytes written.
 - Key: 2, size 1 bytes written.
 - Key: 3, size 1 bytes written.
Section: 238
 - Key: 1, size 1 bytes written.
Section: 250
 - Key: 1, size 2368 bytes written.
 - Key: 2, size 128 bytes written.
 - Key: 3, size 788 bytes written.
 - Key: 4, size 40 bytes written.
Section: 301
 - Key: 0, size 2 bytes written.
 - Key: 1, size 12 bytes written.
 - Key: 2, size 36 bytes written.
 - Key: 3, size 36 bytes written.
 - Key: 4, size 36 bytes written.
 - Key: 5, size 36 bytes written.
 - Key: 6, size 36 bytes written.
 - Key: 7, size 40 bytes written.
 - Key: 8, size 40 bytes written.
 - Key: 9, size 40 bytes written.
 - Key: 10, size 40 bytes written.
 - Key: 11, size 40 bytes written.
 - Key: 12, size 40 bytes written.
 - Key: 13, size 40 bytes written.
 - Key: 14, size 40 bytes written.
 - Key: 15, size 40 bytes written.
 - Key: 16, size 40 bytes written.
Section: 304
 - Key: 8, size 4 bytes written.
 - Key: 9, size 4 bytes written.
Section: 309
 - Key: 0, size 4 bytes written.
 - Key: 1, size 2 bytes written.
 - Key: 2, size 12 bytes written.
 - Key: 4, size 12 bytes written.
 - Key: 5, size 12 bytes written.
 - Key: 7, size 12 bytes written.
 - Key: 8, size 12 bytes written.
 - Key: 17, size 12 bytes written.
Section: 319
 - Key: 0, size 148 bytes written.
 - Key: 1, size 148 bytes written.
 - Key: 2, size 148 bytes written.
 - Key: 3, size 148 bytes written.
 - Key: 4, size 148 bytes written.
 - Key: 5, size 148 bytes written.
 - Key: 6, size 148 bytes written.
 - Key: 7, size 148 bytes written.
 - Key: 8, size 148 bytes written.
 - Key: 9, size 148 bytes written.
 - Key: 10, size 148 bytes written.
 - Key: 11, size 148 bytes written.
 - Key: 12, size 148 bytes written.
 - Key: 13, size 148 bytes written.
 - Key: 14, size 148 bytes written.
 - Key: 15, size 148 bytes written.
 - Key: 16, size 148 bytes written.
 - Key: 17, size 148 bytes written.
 - Key: 18, size 148 bytes written.
 - Key: 19, size 148 bytes written.
 - Key: 20, size 148 bytes written.
 - Key: 21, size 148 bytes written.
 - Key: 22, size 148 bytes written.
 - Key: 23, size 148 bytes written.
 - Key: 24, size 148 bytes written.
 - Key: 25, size 148 bytes written.
 - Key: 26, size 148 bytes written.
 - Key: 27, size 148 bytes written.
 - Key: 28, size 148 bytes written.
 - Key: 29, size 148 bytes written.
 - Key: 30, size 148 bytes written.
 - Key: 31, size 148 bytes written.
 - Key: 32, size 148 bytes written.
 - Key: 33, size 148 bytes written.
 - Key: 34, size 148 bytes written.
 - Key: 35, size 148 bytes written.
 - Key: 36, size 148 bytes written.
 - Key: 37, size 148 bytes written.
 - Key: 38, size 148 bytes written.
 - Key: 39, size 148 bytes written.
 - Key: 40, size 148 bytes written.
 - Key: 41, size 148 bytes written.
 - Key: 42, size 148 bytes written.
 - Key: 43, size 148 bytes written.
 - Key: 44, size 148 bytes written.
 - Key: 45, size 148 bytes written.
 - Key: 46, size 148 bytes written.
 - Key: 47, size 148 bytes written.
 - Key: 48, size 148 bytes written.
 - Key: 49, size 148 bytes written.
 - Key: 50, size 148 bytes written.
 - Key: 51, size 148 bytes written.
 - Key: 52, size 148 bytes written.
 - Key: 53, size 148 bytes written.
 - Key: 54, size 148 bytes written.
 - Key: 55, size 148 bytes written.
 - Key: 56, size 148 bytes written.
 - Key: 57, size 148 bytes written.
 - Key: 58, size 148 bytes written.
 - Key: 59, size 148 bytes written.
 - Key: 60, size 148 bytes written.
 - Key: 61, size 148 bytes written.
 - Key: 62, size 148 bytes written.
 - Key: 63, size 148 bytes written.
 - Key: 64, size 148 bytes written.
 - Key: 65, size 148 bytes written.
 - Key: 66, size 148 bytes written.
 - Key: 67, size 148 bytes written.
 - Key: 68, size 148 bytes written.
 - Key: 69, size 148 bytes written.
 - Key: 70, size 148 bytes written.
 - Key: 71, size 148 bytes written.
 - Key: 72, size 148 bytes written.
 - Key: 73, size 148 bytes written.
 - Key: 74, size 148 bytes written.
 - Key: 75, size 148 bytes written.
 - Key: 76, size 148 bytes written.
 - Key: 77, size 148 bytes written.
 - Key: 78, size 148 bytes written.
 - Key: 79, size 148 bytes written.
 - Key: 80, size 148 bytes written.
 - Key: 81, size 148 bytes written.
 - Key: 82, size 148 bytes written.
 - Key: 83, size 148 bytes written.
 - Key: 84, size 148 bytes written.
 - Key: 85, size 148 bytes written.
 - Key: 86, size 148 bytes written.
 - Key: 87, size 148 bytes written.
 - Key: 88, size 148 bytes written.
 - Key: 89, size 148 bytes written.
 - Key: 90, size 148 bytes written.
 - Key: 91, size 148 bytes written.
 - Key: 92, size 148 bytes written.
 - Key: 93, size 148 bytes written.
 - Key: 94, size 148 bytes written.
 - Key: 95, size 148 bytes written.
 - Key: 96, size 148 bytes written.
 - Key: 97, size 148 bytes written.
 - Key: 98, size 148 bytes written.
 - Key: 99, size 148 bytes written.
 - Key: 100, size 148 bytes written.
 - Key: 101, size 148 bytes written.
 - Key: 102, size 148 bytes written.
 - Key: 103, size 148 bytes written.
 - Key: 104, size 148 bytes written.
 - Key: 105, size 148 bytes written.
 - Key: 106, size 148 bytes written.
 - Key: 107, size 148 bytes written.
 - Key: 108, size 148 bytes written.
 - Key: 109, size 148 bytes written.
 - Key: 110, size 148 bytes written.
 - Key: 111, size 148 bytes written.
 - Key: 112, size 148 bytes written.
 - Key: 113, size 148 bytes written.
 - Key: 114, size 148 bytes written.
 - Key: 115, size 148 bytes written.
 - Key: 116, size 148 bytes written.
 - Key: 117, size 148 bytes written.
 - Key: 118, size 148 bytes written.
 - Key: 119, size 148 bytes written.
 - Key: 120, size 148 bytes written.
 - Key: 121, size 148 bytes written.
 - Key: 122, size 148 bytes written.
 - Key: 123, size 148 bytes written.
 - Key: 124, size 148 bytes written.
 - Key: 125, size 148 bytes written.
 - Key: 126, size 148 bytes written.
 - Key: 127, size 148 bytes written.
 - Key: 128, size 148 bytes written.
 - Key: 129, size 148 bytes written.
 - Key: 130, size 148 bytes written.
 - Key: 131, size 148 bytes written.
 - Key: 132, size 148 bytes written.
 - Key: 133, size 148 bytes written.
 - Key: 134, size 148 bytes written.
 - Key: 135, size 148 bytes written.
 - Key: 136, size 148 bytes written.
 - Key: 137, size 148 bytes written.
 - Key: 138, size 148 bytes written.
 - Key: 139, size 148 bytes written.
 - Key: 140, size 148 bytes written.
 - Key: 141, size 148 bytes written.
 - Key: 142, size 148 bytes written.
 - Key: 143, size 148 bytes written.
 - Key: 144, size 148 bytes written.
 - Key: 145, size 148 bytes written.
 - Key: 146, size 148 bytes written.
 - Key: 147, size 148 bytes written.
 - Key: 148, size 148 bytes written.
 - Key: 149, size 148 bytes written.
 - Key: 150, size 148 bytes written.
 - Key: 151, size 148 bytes written.
 - Key: 152, size 148 bytes written.
 - Key: 153, size 148 bytes written.
 - Key: 154, size 148 bytes written.
 - Key: 155, size 148 bytes written.
 - Key: 156, size 148 bytes written.
 - Key: 157, size 148 bytes written.
 - Key: 158, size 148 bytes written.
 - Key: 159, size 148 bytes written.
 - Key: 160, size 148 bytes written.
 - Key: 161, size 148 bytes written.
 - Key: 162, size 148 bytes written.
 - Key: 163, size 148 bytes written.
Section: 320
 - Key: 0, size 148 bytes written.
 - Key: 1, size 148 bytes written.
 - Key: 2, size 148 bytes written.
 - Key: 3, size 148 bytes written.
 - Key: 4, size 148 bytes written.
 - Key: 5, size 148 bytes written.
 - Key: 6, size 148 bytes written.
 - Key: 7, size 148 bytes written.
 - Key: 8, size 148 bytes written.
 - Key: 9, size 148 bytes written.
 - Key: 10, size 148 bytes written.
 - Key: 11, size 148 bytes written.
 - Key: 12, size 148 bytes written.
 - Key: 13, size 148 bytes written.
 - Key: 14, size 148 bytes written.
 - Key: 15, size 148 bytes written.
 - Key: 16, size 148 bytes written.
 - Key: 17, size 148 bytes written.
 - Key: 18, size 148 bytes written.
 - Key: 19, size 148 bytes written.
 - Key: 20, size 148 bytes written.
 - Key: 21, size 148 bytes written.
 - Key: 22, size 148 bytes written.
 - Key: 23, size 148 bytes written.
 - Key: 24, size 148 bytes written.
 - Key: 25, size 148 bytes written.
 - Key: 26, size 148 bytes written.
 - Key: 27, size 148 bytes written.
 - Key: 28, size 148 bytes written.
 - Key: 29, size 148 bytes written.
 - Key: 30, size 148 bytes written.
 - Key: 31, size 148 bytes written.
 - Key: 32, size 148 bytes written.
 - Key: 33, size 148 bytes written.
 - Key: 34, size 148 bytes written.
 - Key: 35, size 148 bytes written.
 - Key: 36, size 148 bytes written.
 - Key: 37, size 148 bytes written.
 - Key: 38, size 148 bytes written.
Section: 322
 - Key: 0, size 1 bytes written.
Section: 325
 - Key: 0, size 101 bytes written.
 - Key: 1, size 105 bytes written.
 - Key: 2, size 51 bytes written.
 - Key: 3, size 114 bytes written.
 - Key: 4, size 59 bytes written.
 - Key: 5, size 59 bytes written.
 - Key: 6, size 70 bytes written.
Section: 334
 - Key: 0, size 1 bytes written.
Section: 339
 - Key: 0, size 511 bytes written.
 - Key: 1, size 511 bytes written.
Section: 341
 - Key: 0, size 1 bytes written.
 - Key: 3, size 4 bytes written.
 - Key: 4, size 4284 bytes written.
Section: 345
 - Key: 0, size 12 bytes written.
Section: 354
 - Key: 0, size 3 bytes written.
Section: 355
 - Key: 1, size 2028 bytes written.
Section: 356
 - Key: 0, size 2 bytes written.
 - Key: 1, size 8 bytes written.
Section: 362
 - Key: 0, size 1 bytes written.
 - Key: 1, size 120 bytes written.
Section: 364
 - Key: 0, size 2 bytes written.
 - Key: 1, size 12 bytes written.
 - Key: 2, size 36 bytes written.
 - Key: 3, size 36 bytes written.
 - Key: 4, size 36 bytes written.
 - Key: 5, size 36 bytes written.
 - Key: 6, size 36 bytes written.
 - Key: 7, size 40 bytes written.
 - Key: 8, size 40 bytes written.
 - Key: 9, size 40 bytes written.
 - Key: 10, size 40 bytes written.
 - Key: 11, size 40 bytes written.
 - Key: 12, size 40 bytes written.
 - Key: 13, size 40 bytes written.
 - Key: 14, size 40 bytes written.
Section: 365
 - Key: 0, size 2 bytes written.
 - Key: 1, size 12 bytes written.
 - Key: 2, size 36 bytes written.
 - Key: 3, size 36 bytes written.
 - Key: 4, size 36 bytes written.
 - Key: 5, size 36 bytes written.
 - Key: 6, size 36 bytes written.
 - Key: 7, size 40 bytes written.
 - Key: 8, size 40 bytes written.
 - Key: 9, size 40 bytes written.
 - Key: 10, size 40 bytes written.
 - Key: 11, size 40 bytes written.
 - Key: 12, size 40 bytes written.
 - Key: 13, size 40 bytes written.
 - Key: 14, size 40 bytes written.
Completed in 58.796 s
br,
 
The Following 64 Users Say Thank You to Andra For This Useful Post:
Show/Hide list of the thanked
Old 02-07-2010, 17:56   #21 (permalink)
No Life Poster
 
gbluez's Avatar
 
Join Date: Jul 2004
Posts: 11,049
Member: 73565
Status: Offline
Thanks Meter: 5,062
Arrow You got Only NPC? NO PROBLEMO!

[Phones contain ENO handling]

When you receive any phone with this condition, it's very easy to completely repair by mxkey

Code:
Phone Type: RM-243 (Nokia 6120)
SW Version: V 07.10 15-07-09 RM-243 (c) Nokia 
Imei plain: 35571202019489-1
Product Code: 0547930
ApeCoreSw: 07.10
ApeVariant: rofs_version_inforofx_version_info
ApeTest: rm243_ENO_A_2009wk15v0.100
Language Pack:
- not available.

SIMLOCK invalid!
SUPERDONGLE_KEY seems to be valid
SECURITY_TEST failed!
 
 
SIMLOCK_DATA corrupted!
1. You need to backup Certificate first. NPC ONLY.
BB5 > Servie > Imei & Security - Select NPC from drop down menu.

Code:
RAP Data :
SYSTEM ASIC ID: 000000010000022600010006400C192101021103 [RAPIDO3G ver: 1.11]
EM0 ID: 00000295
EM1 ID: 00000B22
PUBLIC ID: 0D1002081F650052DBE947006386111BA6351BAE
ASIC MODE ID: 00
ROOT KEY HASH: CAEEBB65D3C48E6DC73B49DC5063A2EE
ROM ID: A8C1D6713E691FF8
 SecondaryBoot: RAPIDOv11_2nd.fg [BB5]  version: 1.37.1 revision: 0.0 size: 0x3B80
 Supported RAP Ids: 0003192101002003, 000C192101002003, 4003192101002003, 400C192101002003, 4003192101011103, 400C192101011103, 4003192101021103, 400C192101021103, 4003192101031103, 400C192101031103, 4003192101011105, 400C192101011105, 400C192101021105, 400C192101031105
FlashID0: 00EC 0030  - 0040 0121 [Samsung K5W1G13ACM-DJ60,1 Gbits] type: ONENAND,RAP 
ExtBUSC: 0000 0000 0000 0000 0000 0000 0000 0000 
ExtDEVC: FFFF 0000 - 0000 0000
 Algorithm: RAPIDOv11_algo.fg [XSR 1.5]  version: 1.40.0 revision: 0.0 size: 0x27520
 Supported RAP Ids: 0003192101002003, 000C192101002003, 4003192101002003, 400C192101002003, 4003192101011103, 400C192101011103, 4003192101021103, 400C192101021103, 4003192101031103, 400C192101031103, 4003192101011105, 400C192101011105, 400C192101021105, 400C192101031105
RAP PAPUBKEYS HASH: 0FE1BA92D924A658E4800780FA6F4868100AC947
Flash Imei: 35571202019489
NPC_DATA saved OK
RPL saved to "C:\Documents and Settings\Satu\Desktop\setool\BB5_35571202019489_BACK_NPC.rpl"
2. You need to COMPLETELY ERASE the whole flash.
BB5 > Flash > Advanced, Get Addr, untick SAFE Erase

Code:
Using device: UFS_USB V2.8 (c) SarasSoft 2007.
Library version: 1.0.0.11985, Date: 03-02-2010
RAP Data :
SYSTEM ASIC ID: 000000010000022600010006400C192101021103 [RAPIDO3G ver: 1.11]
EM0 ID: 00000295
EM1 ID: 00000B22
PUBLIC ID: 0D1002081F650052DBE947006386111BA6351BAE
ASIC MODE ID: 00
ROOT KEY HASH: CAEEBB65D3C48E6DC73B49DC5063A2EE
ROM ID: A8C1D6713E691FF8
 SecondaryBoot: RAPIDOv11_2nd.fg [BB5]  version: 1.37.1 revision: 0.0 size: 0x3B80
 Supported RAP Ids: 0003192101002003, 000C192101002003, 4003192101002003, 400C192101002003, 4003192101011103, 400C192101011103, 4003192101021103, 400C192101021103, 4003192101031103, 400C192101031103, 4003192101011105, 400C192101011105, 400C192101021105, 400C192101031105
FlashID0: 00EC 0030  - 0040 0121 [Samsung K5W1G13ACM-DJ60,1 Gbits] type: ONENAND,RAP 
ExtBUSC: 0000 0000 0000 0000 0000 0000 0000 0000 
ExtDEVC: FFFF 0000 - 0000 0000
 Algorithm: RAPIDOv11_algo.fg [XSR 1.5]  version: 1.40.0 revision: 0.0 size: 0x27520
 Supported RAP Ids: 0003192101002003, 000C192101002003, 4003192101002003, 400C192101002003, 4003192101011103, 400C192101011103, 4003192101021103, 400C192101021103, 4003192101031103, 400C192101031103, 4003192101011105, 400C192101011105, 400C192101021105, 400C192101031105
RAP PAPUBKEYS HASH: 0FE1BA92D924A658E4800780FA6F4868100AC947
Total erase size: 128.00 MB
CMT ONENAND area [00000000-07FFFFFF] erased in 1.969 s
warning : erase sector address out of chip bound.
3. Reflash all necessary data to phone. (ENO (if needed), MCU, PPM, etc)
In this case, regarding with supported firmware for simlock rebuid, you will need to use OLDER firmware.

Code:
Using device: UFS_USB V2.8 (c) SarasSoft 2007.
Library version: 1.0.0.11985, Date: 03-02-2010
Processing file: rm243_ENO_x_2008wk32v0.010.fpsx as MCU 
 [BB5,XSR 1.5]  size: 5.08 MB
 Supported RAP Ids: 4003192101002003, 400C192101002003, 0003192101002003, 000C192101002003, 4003192101011103, 400C192101011103, 4003192101021103, 400C192101021103, 4003192101031103, 400C192101031103, 4003192101011105, 400C192101011105, 4003192101021105, 400C192101021105, 400C192101031105
RAP Data :
SYSTEM ASIC ID: 000000010000022600010006400C192101021103 [RAPIDO3G ver: 1.11]
EM0 ID: 00000295
EM1 ID: 00000B22
PUBLIC ID: 0D1002081F650052DBE947006386111BA6351BAE
ASIC MODE ID: 00
ROOT KEY HASH: CAEEBB65D3C48E6DC73B49DC5063A2EE
ROM ID: A8C1D6713E691FF8
 SecondaryBoot: RAPIDOv11_2nd.fg [BB5]  version: 1.37.1 revision: 0.0 size: 0x3B80
 Supported RAP Ids: 0003192101002003, 000C192101002003, 4003192101002003, 400C192101002003, 4003192101011103, 400C192101011103, 4003192101021103, 400C192101021103, 4003192101031103, 400C192101031103, 4003192101011105, 400C192101011105, 400C192101021105, 400C192101031105
FlashID0: 00EC 0030  - 0040 0121 [Samsung K5W1G13ACM-DJ60,1 Gbits] type: ONENAND,RAP 
ExtBUSC: 0000 0000 0000 0000 0000 0000 0000 0000 
ExtDEVC: FFFF 0000 - 0000 0000
 Algorithm: RAPIDOv11_algo.fg [XSR 1.5]  version: 1.40.0 revision: 0.0 size: 0x27520
 Supported RAP Ids: 0003192101002003, 000C192101002003, 4003192101002003, 400C192101002003, 4003192101011103, 400C192101011103, 4003192101021103, 400C192101021103, 4003192101031103, 400C192101031103, 4003192101011105, 400C192101011105, 400C192101021105, 400C192101031105
RAP PAPUBKEYS is blank/erased.
Storing certificate ...OK
Partitioning ...OK
Total erase size: 64.00 KB
CMT ONENAND area [00040000-07B3FFFF]
Format NAND
erased in 1.922 s
Flash programming ...
CMT PAPUBKEYS: 0FE1BA92D924A658E4800780FA6F4868100AC947 (RAP Certificate 68 v1) written.
Programming completed in 26.344 s
Flashing completed in 39.938 s
 
 
Phone Type: RM-243 (Nokia 6120)
SW Version: Vp 04.53 14-02-08 RM-243 (c) Nokia 
Imei plain: 12345610654321-?
Language Pack:
- not available.

SIMLOCK invalid!
SUPERDONGLE_KEY invalid!
- WD timer enabled, phone will reboot itself after 3 min.
SECURITY_TEST passed
 
 
Imei plain is invalid !!!
SIMLOCK_DATA corrupted!
Total time to process is 59.282 s
4. Flash MCU ONLY, same version with ENO firmware, that you flashed on first flashing

Code:
Using device: UFS_USB V2.8 (c) SarasSoft 2007.
Library version: 1.0.0.11985, Date: 03-02-2010
Processing file: rm243_05.11_prd_core.fpsx as MCU 
 [BB5,XSR 1.5]  size: 43.68 MB
 Supported RAP Ids: 4003192101002003, 400C192101002003, 0003192101002003, 000C192101002003, 4003192101011103, 400C192101011103, 4003192101021103, 400C192101021103, 4003192101011105, 400C192101011105, 4003192101021105, 400C192101021105, 400C192101031105, 4003192101031105, 4003192101031103, 400C192101031103
RAP Data :
SYSTEM ASIC ID: 000000010000022600010006400C192101021103 [RAPIDO3G ver: 1.11]
EM0 ID: 00000295
EM1 ID: 00000B22
PUBLIC ID: 0D1002081F650052DBE947006386111BA6351BAE
ASIC MODE ID: 00
ROOT KEY HASH: CAEEBB65D3C48E6DC73B49DC5063A2EE
ROM ID: A8C1D6713E691FF8
 SecondaryBoot: RAPIDOv11_2nd.fg [BB5]  version: 1.37.1 revision: 0.0 size: 0x3B80
 Supported RAP Ids: 0003192101002003, 000C192101002003, 4003192101002003, 400C192101002003, 4003192101011103, 400C192101011103, 4003192101021103, 400C192101021103, 4003192101031103, 400C192101031103, 4003192101011105, 400C192101011105, 400C192101021105, 400C192101031105
FlashID0: 00EC 0030  - 0040 0121 [Samsung K5W1G13ACM-DJ60,1 Gbits] type: ONENAND,RAP 
ExtBUSC: 0000 0000 0000 0000 0000 0000 0000 0000 
ExtDEVC: FFFF 0000 - 0000 0000
 Algorithm: RAPIDOv11_algo.fg [XSR 1.5]  version: 1.40.0 revision: 0.0 size: 0x27520
 Supported RAP Ids: 0003192101002003, 000C192101002003, 4003192101002003, 400C192101002003, 4003192101011103, 400C192101011103, 4003192101021103, 400C192101021103, 4003192101031103, 400C192101031103, 4003192101011105, 400C192101011105, 400C192101021105, 400C192101031105
RAP PAPUBKEYS HASH: 0FE1BA92D924A658E4800780FA6F4868100AC947
Storing certificate ...OK
Partitioning ...OK
Total erase size: 64.00 KB
CMT ONENAND area [00040000-00082FFF]
CMT ONENAND area [00083400-0087FFFF]
CMT ONENAND area [00B80000-04DFFFFF]
Format NAND
erased in 1.187 s
Flash programming ...
CMT PAPUBKEYS: 0FE1BA92D924A658E4800780FA6F4868100AC947 (RAP Certificate 68 v1) written.
Programming completed in 3 min 45.219 s
Flashing completed in 3 min 56.390 s
 
 
Phone Type: RM-243 (Nokia 6120)
SW Version: V 05.11 21-04-08 RM-243 (c) Nokia 
Imei plain: 12345610654321-?
ApeCoreSw: 05.11
ApeVariant: rofs_version_info
ApeTest: rm243_ENO_x_2008wk32v0.010
Language Pack:
- not available.

SIMLOCK invalid!
SUPERDONGLE_KEY invalid!
- WD timer enabled, phone will reboot itself after 3 min.
SECURITY_TEST passed
 
 
Imei plain is invalid !!!
SIMLOCK_DATA corrupted!
Total time to process is 4 min 15.000 s
5. Next step is Certificate restore. Write back your NPC Backup.

Code:
Imei: 35571202019489
RAP Data :
SYSTEM ASIC ID: 000000010000022600010006400C192101021103 [RAPIDO3G ver: 1.11]
EM0 ID: 00000295
EM1 ID: 00000B22
PUBLIC ID: 0D1002081F650052DBE947006386111BA6351BAE
ASIC MODE ID: 00
ROOT KEY HASH: CAEEBB65D3C48E6DC73B49DC5063A2EE
ROM ID: A8C1D6713E691FF8
 SecondaryBoot: RAPIDOv11_2nd.fg [BB5]  version: 1.37.1 revision: 0.0 size: 0x3B80
 Supported RAP Ids: 0003192101002003, 000C192101002003, 4003192101002003, 400C192101002003, 4003192101011103, 400C192101011103, 4003192101021103, 400C192101021103, 4003192101031103, 400C192101031103, 4003192101011105, 400C192101011105, 400C192101021105, 400C192101031105
FlashID0: 00EC 0030  - 0040 0121 [Samsung K5W1G13ACM-DJ60,1 Gbits] type: ONENAND,RAP 
ExtBUSC: 0000 0000 0000 0000 0000 0000 0000 0000 
ExtDEVC: FFFF 0000 - 0000 0000
 Algorithm: RAPIDOv11_algo.fg [XSR 1.5]  version: 1.40.0 revision: 0.0 size: 0x27520
 Supported RAP Ids: 0003192101002003, 000C192101002003, 4003192101002003, 400C192101002003, 4003192101011103, 400C192101011103, 4003192101021103, 400C192101021103, 4003192101031103, 400C192101031103, 4003192101011105, 400C192101011105, 400C192101021105, 400C192101031105
RAP PAPUBKEYS HASH: 0FE1BA92D924A658E4800780FA6F4868100AC947
NPC verified Ok.
Updating CMT  NPC ...OK
Certificate programmed successfully !
 
Phone Type: RM-243 (Nokia 6120)
SW Version: V 05.11 21-04-08 RM-243 (c) Nokia 
Imei plain: 35571202019489-1
ApeCoreSw: 05.11
ApeVariant: rofs_version_info
ApeTest: rm243_ENO_x_2008wk32v0.010
Language Pack:
- not available.

SIMLOCK invalid!
SUPERDONGLE_KEY invalid!
- WD timer enabled, phone will reboot itself after 3 min.
SECURITY_TEST failed!
 
 
SIMLOCK_DATA corrupted!
6. REPAIR SIMLOCK - Determind first what SL level you got
- It's SL2, so what?
Code:
RAP Data :
SYSTEM ASIC ID: 000000010000022600010006400C192101021103 [RAPIDO3G ver: 1.11]
EM0 ID: 00000295
EM1 ID: 00000B22
PUBLIC ID: 0D1002081F650052DBE947006386111BA6351BAE
ASIC MODE ID: 00
ROOT KEY HASH: CAEEBB65D3C48E6DC73B49DC5063A2EE
ROM ID: A8C1D6713E691FF8
 SecondaryBoot: RAPIDOv11_2nd.fg [BB5]  version: 1.37.1 revision: 0.0 size: 0x3B80
 Supported RAP Ids: 0003192101002003, 000C192101002003, 4003192101002003, 400C192101002003, 4003192101011103, 400C192101011103, 4003192101021103, 400C192101021103, 4003192101031103, 400C192101031103, 4003192101011105, 400C192101011105, 400C192101021105, 400C192101031105
FlashID0: 00EC 0030  - 0040 0121 [Samsung K5W1G13ACM-DJ60,1 Gbits] type: ONENAND,RAP 
ExtBUSC: 0000 0000 0000 0000 0000 0000 0000 0000 
ExtDEVC: FFFF 0000 - 0000 0000
 Algorithm: RAPIDOv11_algo.fg [XSR 1.5]  version: 1.40.0 revision: 0.0 size: 0x27520
 Supported RAP Ids: 0003192101002003, 000C192101002003, 4003192101002003, 400C192101002003, 4003192101011103, 400C192101011103, 4003192101021103, 400C192101021103, 4003192101031103, 400C192101031103, 4003192101011105, 400C192101011105, 400C192101021105, 400C192101031105
RAP PAPUBKEYS HASH: 0FE1BA92D924A658E4800780FA6F4868100AC947
 
PA_SIMLOCK: PA_SL2
> Tick PA_SL2
> Choose Repair SIMLOCK
> Tick make SIMLOCK RPL
> Click Repair SPLock


Code:
SIMLOCK_DATA corrupted!
 
Using device: UFS_USB V2.8 (c) SarasSoft 2007.
Library version: 1.0.0.11985, Date: 03-02-2010
 
Product: V 05.11 21-04-08 RM-243 (c) Nokia 
ApeCoreSw: 05.11
 
SYSTEM ASIC ID: 000000010000022600010006400C192101021103 [RAPIDO3G ver: 1.11]
ROOT KEY HASH: CAEEBB65D3C48E6DC73B49DC5063A2EE
ROM ID: A8C1D6713E691FF8
Sending SecondaryBoot  ...OK
Sending PreLoader ...OK
Sending CustomLoader ...OK
 
Calculating SIMLOCK using security server ...
Connecting to server[main.mxkey.biz] ...OK, secure login ...
Completed in 44.515 s
 
RPL saved to "C:\mobileEx\3.3\data\backup\BB5_RM-243_355712020194891_SIM.RPL" 
Updating SIMLOCK...OK
 
Reading Simlock info ...
Imei net: 355712020194891
Version: SIMLOCK SERVER
Provider: Nokia Test, Country: Finland
Counter: 0/3, 0/10
 
CONFIG_DATA: 2440700000000000
PROFILE_BITS: 0000000000000000
 
BLOCK 1:   1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 2:   1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 3:   1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 4:   1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 5:   1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 6:   1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 7:   1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
7. REPAIR SD
Code:
 
Using device: UFS_USB V2.8 (c) SarasSoft 2007.
Library version: 1.0.0.11985, Date: 03-02-2010
 
Product: V 05.11 21-04-08 RM-243 (c) Nokia 
ApeCoreSw: 05.11
 
SYSTEM ASIC ID: 000000010000022600010006400C192101021103 [RAPIDO3G ver: 1.11]
ROOT KEY HASH: CAEEBB65D3C48E6DC73B49DC5063A2EE
ROM ID: A8C1D6713E691FF8
Sending SecondaryBoot  ...OK
Sending PreLoader ...OK
Sending CustomLoader ...OK
 
Calculating SUPERDONGLE using security server ...
Connecting to server[main.mxkey.biz] ...OK, secure login ...
Completed in 44.422 s
 
RPL saved to "C:\mobileEx\3.3\data\backup\BB5_RM-243_355712020194891_SD.RPL" 
Updating SUPERDONGLE_KEY ...OK
8. Now check for your Certificate by Certificate Validation Tool
BB5 > Service > Phone Test > Various > BB5 Certificate Validation

In my case, phone doesn't has CCC and HWC, next step is:

Write CLONE RPL

Code:
RAP Data :
SYSTEM ASIC ID: 000000010000022600010006400C192101021103 [RAPIDO3G ver: 1.11]
EM0 ID: 00000295
EM1 ID: 00000B22
PUBLIC ID: 0D1002081F650052DBE947006386111BA6351BAE
ASIC MODE ID: 00
ROOT KEY HASH: CAEEBB65D3C48E6DC73B49DC5063A2EE
ROM ID: A8C1D6713E691FF8
 SecondaryBoot: RAPIDOv11_2nd.fg [BB5]  version: 1.37.1 revision: 0.0 size: 0x3B80
 Supported RAP Ids: 0003192101002003, 000C192101002003, 4003192101002003, 400C192101002003, 4003192101011103, 400C192101011103, 4003192101021103, 400C192101021103, 4003192101031103, 400C192101031103, 4003192101011105, 400C192101011105, 400C192101021105, 400C192101031105
FlashID0: 00EC 0030  - 0040 0121 [Samsung K5W1G13ACM-DJ60,1 Gbits] type: ONENAND,RAP 
ExtBUSC: 0000 0000 0000 0000 0000 0000 0000 0000 
ExtDEVC: FFFF 0000 - 0000 0000
 Algorithm: RAPIDOv11_algo.fg [XSR 1.5]  version: 1.40.0 revision: 0.0 size: 0x27520
 Supported RAP Ids: 0003192101002003, 000C192101002003, 4003192101002003, 400C192101002003, 4003192101011103, 400C192101011103, 4003192101021103, 400C192101021103, 4003192101031103, 400C192101031103, 4003192101011105, 400C192101011105, 400C192101021105, 400C192101031105
RAP PAPUBKEYS HASH: 0FE1BA92D924A658E4800780FA6F4868100AC947
Updating CMT  CCC ...OK
Updating CMT  HWC ...OK
Certificate programmed successfully !
 
Phone Type: RM-243 (Nokia 6120)
SW Version: V 05.11 21-04-08 RM-243 (c) Nokia 
Imei plain: 35571202019489-1
ApeCoreSw: 05.11
ApeVariant: rofs_version_info
ApeTest: rm243_ENO_x_2008wk32v0.010
Language Pack:
- not available.

SIMLOCK seems to be valid
SUPERDONGLE_KEY seems to be valid
SECURITY_TEST failed!
 
 
Imei net: 355712020194891
Version: SIMLOCK SERVER
Provider: Nokia Test, Country: Finland
Counter: 0/3, 0/10
 
CONFIG_DATA: 2440700000000000
PROFILE_BITS: 0000000000000000
 
BLOCK 1:   1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 2:   1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 3:   1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 4:   1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 5:   1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 6:   1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 7:   1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
9. Proceed with SUPER SD Auth, and write PM after it.
Load PM > Suped SD Auth

Code:
Using device: UFS_USB V2.8 (c) SarasSoft 2007.
Library version: 1.0.0.11985, Date: 03-02-2010
 
Product: V 05.11 21-04-08 RM-243 (c) Nokia 
ApeCoreSw: 05.11
 
SYSTEM ASIC ID: 000000010000022600010006400C192101021103 [RAPIDO3G ver: 1.11]
ROOT KEY HASH: CAEEBB65D3C48E6DC73B49DC5063A2EE
ROM ID: A8C1D6713E691FF8
Sending SecondaryBoot  ...OK
Sending PreLoader ...OK
Sending CustomLoader ...OK
 
Restarting phone ...
Connecting to server[main.mxkey.biz] ... 
Connecting to server[main.mxkey.biz] ...OK, secure login ...
Authenticating to SUPERDONGLE using security server ...
SUPERDONGLE authorized :)!
Writing PM from Node ...
Section: 1
 - Key: 0, size 114 bytes written.
 - Key: 1, size 4 bytes written.
 - Key: 2, size 98 bytes written.
 - Key: 4, size 110 bytes written.
 - Key: 5, size 4 bytes written.
 - Key: 6, size 98 bytes written.
 - Key: 8, size 110 bytes written.
 - Key: 13, size 98 bytes written.
 - Key: 15, size 4 bytes written.
 - Key: 16, size 98 bytes written.
 - Key: 18, size 98 bytes written.
 - Key: 20, size 98 bytes written.
 - Key: 22, size 16 bytes written.
 - Key: 23, size 4 bytes written.
 - Key: 24, size 84 bytes written.
 - Key: 25, size 4 bytes written.
 - Key: 26, size 110 bytes written.
 - Key: 27, size 4 bytes written.
 - Key: 28, size 98 bytes written.
 - Key: 29, size 10 bytes written.
 - Key: 31, size 98 bytes written.
 - Key: 33, size 36 bytes written.
 - Key: 34, size 80 bytes written.
 - Key: 40, size 16 bytes written.
 - Key: 41, size 182 bytes written.
 - Key: 42, size 4 bytes written.
 - Key: 43, size 36 bytes written.
 - Key: 44, size 182 bytes written.
 - Key: 46, size 64 bytes written.
Section: 2
 - Key: 0, size 440 bytes written.
Section: 4
 - Key: 1, size 1020 bytes written.
 - Key: 3, size 10 bytes written.
 - Key: 4, size 8 bytes written.
 - Key: 5, size 8 bytes written.
 - Key: 9, size 5 bytes written.
 - Key: 28, size 2 bytes written.
Section: 8
 - Key: 0, size 12 bytes written.
 - Key: 1, size 12 bytes written.
 - Key: 2, size 128 bytes written.
 - Key: 3, size 128 bytes written.
 - Key: 7, size 8 bytes written.
 - Key: 8, size 8 bytes written.
 - Key: 9, size 16 bytes written.
Section: 11
 - Key: 0, size 4 bytes written.
 - Key: 1, size 4 bytes written.
 - Key: 2, size 4 bytes written.
 - Key: 3, size 4 bytes written.
 - Key: 4, size 1 bytes written.
 - Key: 5, size 6 bytes written.
 - Key: 6, size 1 bytes written.
 - Key: 7, size 2 bytes written.
 - Key: 8, size 2 bytes written.
 - Key: 9, size 2 bytes written.
 - Key: 10, size 2 bytes written.
 - Key: 11, size 2 bytes written.
 - Key: 12, size 1 bytes written.
 - Key: 13, size 1 bytes written.
 - Key: 14, size 1 bytes written.
 - Key: 15, size 1 bytes written.
 - Key: 16, size 1 bytes written.
 - Key: 17, size 1 bytes written.
 - Key: 18, size 1 bytes written.
 - Key: 19, size 2 bytes written.
 - Key: 20, size 2 bytes written.
 - Key: 21, size 1 bytes written.
 - Key: 22, size 1 bytes written.
 - Key: 23, size 4 bytes written.
 - Key: 24, size 4 bytes written.
 - Key: 25, size 2 bytes written.
 - Key: 26, size 2 bytes written.
 - Key: 27, size 2 bytes written.
 - Key: 28, size 2 bytes written.
 - Key: 29, size 1 bytes written.
 - Key: 30, size 1 bytes written.
 - Key: 31, size 1 bytes written.
 - Key: 32, size 1 bytes written.
 - Key: 33, size 1 bytes written.
 - Key: 34, size 1 bytes written.
 - Key: 35, size 1 bytes written.
 - Key: 36, size 1 bytes written.
 - Key: 37, size 1 bytes written.
 - Key: 38, size 2 bytes written.
 - Key: 39, size 2 bytes written.
 - Key: 40, size 2 bytes written.
 - Key: 41, size 2 bytes written.
 - Key: 42, size 2 bytes written.
 - Key: 43, size 4 bytes written.
 - Key: 44, size 4 bytes written.
 - Key: 45, size 4 bytes written.
 - Key: 46, size 1 bytes written.
 - Key: 47, size 16 bytes written.
 - Key: 48, size 2 bytes written.
 - Key: 49, size 2 bytes written.
 - Key: 50, size 20 bytes written.
 - Key: 51, size 10 bytes written.
 - Key: 52, size 2 bytes written.
 - Key: 53, size 20 bytes written.
 - Key: 54, size 10 bytes written.
 - Key: 55, size 1 bytes written.
 - Key: 56, size 1 bytes written.
 - Key: 57, size 1 bytes written.
 - Key: 58, size 1 bytes written.
 - Key: 59, size 1 bytes written.
 - Key: 60, size 1 bytes written.
 - Key: 61, size 1 bytes written.
 - Key: 62, size 1 bytes written.
 - Key: 63, size 1 bytes written.
 - Key: 64, size 1 bytes written.
 - Key: 65, size 1 bytes written.
 - Key: 66, size 32 bytes written.
 - Key: 67, size 32 bytes written.
 - Key: 68, size 2 bytes written.
 - Key: 69, size 2 bytes written.
 - Key: 70, size 2 bytes written.
 - Key: 71, size 2 bytes written.
 - Key: 72, size 2 bytes written.
 - Key: 73, size 2 bytes written.
 - Key: 74, size 2 bytes written.
 - Key: 75, size 2 bytes written.
 - Key: 76, size 2 bytes written.
 - Key: 77, size 2 bytes written.
 - Key: 78, size 2 bytes written.
 - Key: 79, size 2 bytes written.
 - Key: 80, size 2 bytes written.
 - Key: 81, size 2 bytes written.
 - Key: 82, size 2 bytes written.
 - Key: 83, size 2 bytes written.
 - Key: 84, size 2 bytes written.
 - Key: 85, size 2 bytes written.
 - Key: 86, size 2 bytes written.
 - Key: 87, size 2 bytes written.
 - Key: 88, size 2 bytes written.
 - Key: 89, size 2 bytes written.
 - Key: 90, size 2 bytes written.
 - Key: 91, size 2 bytes written.
 - Key: 92, size 2 bytes written.
 - Key: 93, size 2 bytes written.
 - Key: 94, size 2 bytes written.
 - Key: 95, size 2 bytes written.
 - Key: 96, size 2 bytes written.
 - Key: 97, size 2 bytes written.
 - Key: 98, size 2 bytes written.
 - Key: 99, size 2 bytes written.
 - Key: 100, size 2 bytes written.
 - Key: 101, size 2 bytes written.
 - Key: 102, size 2 bytes written.
 - Key: 103, size 2 bytes written.
 - Key: 104, size 2 bytes written.
 - Key: 105, size 2 bytes written.
 - Key: 106, size 2 bytes written.
 - Key: 107, size 2 bytes written.
 - Key: 108, size 2 bytes written.
 - Key: 109, size 2 bytes written.
 - Key: 110, size 2 bytes written.
 - Key: 111, size 2 bytes written.
 - Key: 112, size 2 bytes written.
 - Key: 113, size 2 bytes written.
 - Key: 114, size 2 bytes written.
 - Key: 115, size 2 bytes written.
 - Key: 116, size 4 bytes written.
 - Key: 117, size 4 bytes written.
 - Key: 118, size 1 bytes written.
 - Key: 119, size 4 bytes written.
 - Key: 120, size 4 bytes written.
 - Key: 121, size 4 bytes written.
 - Key: 122, size 4 bytes written.
 - Key: 123, size 16 bytes written.
 - Key: 124, size 4 bytes written.
 - Key: 125, size 2 bytes written.
 - Key: 126, size 2 bytes written.
 - Key: 127, size 1437 bytes written.
Section: 12
 - Key: 0, size 102 bytes written.
Section: 31
 - Key: 4, size 20 bytes written.
Section: 44
 - Key: 0, size 1 bytes written.
Section: 50
 - Key: 0, size 2 bytes written.
Section: 54
 - Key: 0, size 2 bytes written.
 - Key: 2, size 24 bytes written.
Section: 88
 - Key: 0, size 36 bytes written.
Section: 96
 - Key: 0, size 24 bytes written.
Section: 107
 - Key: 0, size 21 bytes written.
 - Key: 1, size 79 bytes written.
 - Key: 2, size 79 bytes written.
 - Key: 3, size 70 bytes written.
 - Key: 25, size 132 bytes written.
 - Key: 26, size 16 bytes written.
Section: 117
 - Key: 0, size 4 bytes written.
 - Key: 1, size 3 bytes written.
 - Key: 2, size 6 bytes written.
 - Key: 3, size 1 bytes written.
 - Key: 5, size 10 bytes written.
 - Key: 6, size 8 bytes written.
 - Key: 8, size 42 bytes written.
 - Key: 13, size 3 bytes written.
 - Key: 14, size 3 bytes written.
 - Key: 19, size 40 bytes written.
- 120 skipped
Section: 193
 - Key: 2, size 8 bytes written.
 - Key: 3, size 32 bytes written.
 - Key: 4, size 32 bytes written.
 - Key: 9, size 64 bytes written.
Section: 208
 - Key: 1, size 4 bytes written.
Section: 217
 - Key: 0, size 32 bytes written.
Section: 309
 - Key: 0, size 4 bytes written.
 - Key: 1, size 2 bytes written.
 - Key: 2, size 12 bytes written.
 - Key: 4, size 12 bytes written.
 - Key: 5, size 12 bytes written.
 - Key: 7, size 12 bytes written.
 - Key: 8, size 12 bytes written.
 - Key: 17, size 12 bytes written.
Section: 322
 - Key: 0, size 1 bytes written.
Section: 334
 - Key: 0, size 1 bytes written.
Section: 354
 - Key: 0, size 13 bytes written.
Section: 356
 - Key: 0, size 2 bytes written.
Completed in 7.454 s
10. And the last step, you can update to the latest firmware.
Code:
Using device: UFS_USB V2.8 (c) SarasSoft 2007.
Library version: 1.0.0.11985, Date: 03-02-2010
Processing file: rm243_07.10_prd_core.fpsx as MCU 
 [BB5,XSR 1.5]  size: 43.63 MB
 Supported RAP Ids: 4003192101002003, 400C192101002003, 0003192101002003, 000C192101002003, 4003192101011103, 400C192101011103, 4003192101021103, 400C192101021103, 4003192101011105, 400C192101011105, 4003192101021105, 400C192101021105, 400C192101031105, 4003192101031105, 4003192101031103, 400C192101031103, 4003192101051103, 400C192101051103, 4003192101051105, 400C192101051105
RAP Data :
SYSTEM ASIC ID: 000000010000022600010006400C192101021103 [RAPIDO3G ver: 1.11]
EM0 ID: 00000295
EM1 ID: 00000B22
PUBLIC ID: 0D1002081F650052DBE947006386111BA6351BAE
ASIC MODE ID: 00
ROOT KEY HASH: CAEEBB65D3C48E6DC73B49DC5063A2EE
ROM ID: A8C1D6713E691FF8
 SecondaryBoot: RAPIDOv11_2nd.fg [BB5]  version: 1.37.1 revision: 0.0 size: 0x3B80
 Supported RAP Ids: 0003192101002003, 000C192101002003, 4003192101002003, 400C192101002003, 4003192101011103, 400C192101011103, 4003192101021103, 400C192101021103, 4003192101031103, 400C192101031103, 4003192101011105, 400C192101011105, 400C192101021105, 400C192101031105
FlashID0: 00EC 0030  - 0040 0121 [Samsung K5W1G13ACM-DJ60,1 Gbits] type: ONENAND,RAP 
ExtBUSC: 0000 0000 0000 0000 0000 0000 0000 0000 
ExtDEVC: FFFF 0000 - 0000 0000
 Algorithm: RAPIDOv11_algo.fg [XSR 1.5]  version: 1.40.0 revision: 0.0 size: 0x27520
 Supported RAP Ids: 0003192101002003, 000C192101002003, 4003192101002003, 400C192101002003, 4003192101011103, 400C192101011103, 4003192101021103, 400C192101021103, 4003192101031103, 400C192101031103, 4003192101011105, 400C192101011105, 400C192101021105, 400C192101031105
RAP PAPUBKEYS HASH: 0FE1BA92D924A658E4800780FA6F4868100AC947
Storing certificate ...OK
Partitioning ...OK
Total erase size: 64.00 KB
CMT ONENAND area [00040000-00082FFF]
CMT ONENAND area [00083400-0087FFFF]
CMT ONENAND area [00B80000-04DFFFFF]
Format NAND
erased in 1.172 s
Flash programming ...
CMT PAPUBKEYS: 0FE1BA92D924A658E4800780FA6F4868100AC947 (RAP Certificate 68 v1) written.
Programming completed in 3 min 42.766 s
Processing file: rm243_07.10_prd_vB14_03_apac1.fpsx as PPM 
 [BB5,XSR 1.5]  size: 24.02 MB
 Supported RAP Ids: 4003192101002003, 400C192101002003, 0003192101002003, 000C192101002003, 4003192101011103, 400C192101011103, 4003192101021103, 400C192101021103, 4003192101011105, 400C192101011105, 4003192101021105, 400C192101021105, 400C192101031105, 4003192101031105, 4003192101031103, 400C192101031103, 4003192101051103, 400C192101051103, 4003192101051105, 400C192101051105
RAP Data :
SYSTEM ASIC ID: 000000010000022600010006400C192101021103 [RAPIDO3G ver: 1.11]
EM0 ID: 00000295
EM1 ID: 00000B22
PUBLIC ID: 0D1002081F650052DBE947006386111BA6351BAE
ASIC MODE ID: 00
ROOT KEY HASH: CAEEBB65D3C48E6DC73B49DC5063A2EE
ROM ID: A8C1D6713E691FF8
 SecondaryBoot: RAPIDOv11_2nd.fg [BB5]  version: 1.37.1 revision: 0.0 size: 0x3B80
 Supported RAP Ids: 0003192101002003, 000C192101002003, 4003192101002003, 400C192101002003, 4003192101011103, 400C192101011103, 4003192101021103, 400C192101021103, 4003192101031103, 400C192101031103, 4003192101011105, 400C192101011105, 400C192101021105, 400C192101031105
FlashID0: 00EC 0030  - 0040 0121 [Samsung K5W1G13ACM-DJ60,1 Gbits] type: ONENAND,RAP 
ExtBUSC: 0000 0000 0000 0000 0000 0000 0000 0000 
ExtDEVC: FFFF 0000 - 0000 0000
 Algorithm: RAPIDOv11_algo.fg [XSR 1.5]  version: 1.40.0 revision: 0.0 size: 0x27520
 Supported RAP Ids: 0003192101002003, 000C192101002003, 4003192101002003, 400C192101002003, 4003192101011103, 400C192101011103, 4003192101021103, 400C192101021103, 4003192101031103, 400C192101031103, 4003192101011105, 400C192101011105, 400C192101021105, 400C192101031105
RAP PAPUBKEYS HASH: 0FE1BA92D924A658E4800780FA6F4868100AC947
Total erase size: 27.00 MB
CMT ONENAND area [03300000-04DFFFFF]
erased in 0.453 s
Flash programming ...
Programming completed in 2 min 10.141 s
Processing file: rm243_07.10_prd_UDA_Classic_Red.fpsx as CNT 
 [BB5,XSR 1.5]  size: 111.26 KB
 Supported RAP Ids: 4003192101002003, 400C192101002003, 0003192101002003, 000C192101002003, 4003192101011103, 400C192101011103, 4003192101021103, 400C192101021103, 4003192101011105, 400C192101011105, 4003192101021105, 400C192101021105
RAP Data :
SYSTEM ASIC ID: 000000010000022600010006400C192101021103 [RAPIDO3G ver: 1.11]
EM0 ID: 00000295
EM1 ID: 00000B22
PUBLIC ID: 0D1002081F650052DBE947006386111BA6351BAE
ASIC MODE ID: 00
ROOT KEY HASH: CAEEBB65D3C48E6DC73B49DC5063A2EE
ROM ID: A8C1D6713E691FF8
 SecondaryBoot: RAPIDOv11_2nd.fg [BB5]  version: 1.37.1 revision: 0.0 size: 0x3B80
 Supported RAP Ids: 0003192101002003, 000C192101002003, 4003192101002003, 400C192101002003, 4003192101011103, 400C192101011103, 4003192101021103, 400C192101021103, 4003192101031103, 400C192101031103, 4003192101011105, 400C192101011105, 400C192101021105, 400C192101031105
FlashID0: 00EC 0030  - 0040 0121 [Samsung K5W1G13ACM-DJ60,1 Gbits] type: ONENAND,RAP 
ExtBUSC: 0000 0000 0000 0000 0000 0000 0000 0000 
ExtDEVC: FFFF 0000 - 0000 0000
 Algorithm: RAPIDOv11_algo.fg [XSR 1.5]  version: 1.40.0 revision: 0.0 size: 0x27520
 Supported RAP Ids: 0003192101002003, 000C192101002003, 4003192101002003, 400C192101002003, 4003192101011103, 400C192101011103, 4003192101021103, 400C192101021103, 4003192101031103, 400C192101031103, 4003192101011105, 400C192101011105, 400C192101021105, 400C192101031105
RAP PAPUBKEYS HASH: 0FE1BA92D924A658E4800780FA6F4868100AC947
Total erase size: 45.25 MB
CMT ONENAND area [04E00000-07B3FFFF]
erased in 0.735 s
Flash programming ...
Programming completed in 1.750 s
Processing file: rm243_ENO_A_2009wk15v0.100.fpsx as CNT 
 [BB5,XSR 1.5]  size: 1.41 MB
 Supported RAP Ids: 4003192101002003, 400C192101002003, 0003192101002003, 000C192101002003, 4003192101011103, 400C192101011103, 4003192101021103, 400C192101021103, 4003192101011105, 400C192101011105, 4003192101021105, 400C192101021105, 400C192101031105, 4003192101031105, 4003192101031103, 400C192101031103, 4003192101051103, 400C192101051103, 4003192101051105, 400C192101051105
RAP Data :
SYSTEM ASIC ID: 000000010000022600010006400C192101021103 [RAPIDO3G ver: 1.11]
EM0 ID: 00000295
EM1 ID: 00000B22
PUBLIC ID: 0D1002081F650052DBE947006386111BA6351BAE
ASIC MODE ID: 00
ROOT KEY HASH: CAEEBB65D3C48E6DC73B49DC5063A2EE
ROM ID: A8C1D6713E691FF8
 SecondaryBoot: RAPIDOv11_2nd.fg [BB5]  version: 1.37.1 revision: 0.0 size: 0x3B80
 Supported RAP Ids: 0003192101002003, 000C192101002003, 4003192101002003, 400C192101002003, 4003192101011103, 400C192101011103, 4003192101021103, 400C192101021103, 4003192101031103, 400C192101031103, 4003192101011105, 400C192101011105, 400C192101021105, 400C192101031105
FlashID0: 00EC 0030  - 0040 0121 [Samsung K5W1G13ACM-DJ60,1 Gbits] type: ONENAND,RAP 
ExtBUSC: 0000 0000 0000 0000 0000 0000 0000 0000 
ExtDEVC: FFFF 0000 - 0000 0000
 Algorithm: RAPIDOv11_algo.fg [XSR 1.5]  version: 1.40.0 revision: 0.0 size: 0x27520
 Supported RAP Ids: 0003192101002003, 000C192101002003, 4003192101002003, 400C192101002003, 4003192101011103, 400C192101011103, 4003192101021103, 400C192101021103, 4003192101031103, 400C192101031103, 4003192101011105, 400C192101011105, 400C192101021105, 400C192101031105
RAP PAPUBKEYS HASH: 0FE1BA92D924A658E4800780FA6F4868100AC947
Total erase size: 3.00 MB
CMT ONENAND area [00880000-00B7FFFF]
erased in 0.109 s
Flash programming ...
Programming completed in 7.735 s
Flashing completed in 6 min 36.953 s
 
 
Phone Type: RM-243 (Nokia 6120)
SW Version: V 07.10 15-07-09 RM-243 (c) Nokia 
Imei plain: 35571202019489-1
Product Code: 0547930
ApeCoreSw: 07.10
ApeVariant: rofs_version_inforofx_version_info
ApeTest: rm243_ENO_A_2009wk15v0.100
Language Pack:
- not available.

SIMLOCK seems to be valid
SUPERDONGLE_KEY seems to be valid
SECURITY_TEST passed
 
 
Imei net: 355712020194891
Version: SIMLOCK SERVER
Provider: Nokia Test, Country: Finland
Counter: 0/3, 0/10
 
CONFIG_DATA: 2440700000000000
PROFILE_BITS: 0000000000000000
 
BLOCK 1:   1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 2:   1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 3:   1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 4:   1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 5:   1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 6:   1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 7:   1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
Total time to process is 6 min 55.953 s

All done in 10 steps.
This method also work for phone that can not be fully backuped. (cant' safe PM, can't local mode, blank screen, etc)

!! DONT DO THIS ON SL3 !!

If you got phones with corrupted simlock, the main thing is you need to clean it up first. That phone's PM is messy
The whole steps as simple as:
Backup NPC > Erase > Reflash > Restore NPC > Rebuild Simlock > Pm auth, write pm. Thats all.

BR.
MXKey

Last edited by gbluez; 02-07-2010 at 20:31.
 
The Following 91 Users Say Thank You to gbluez For This Useful Post:
Show/Hide list of the thanked
Old 02-10-2010, 00:17   #22 (permalink)
No Life Poster
 
Andra's Avatar
 
Join Date: Feb 2005
Location: AD
Posts: 4,665
Member: 976728
Status: Offline
Sonork: 1589709
Thanks Meter: 4,775
distinguish when using NCK and SIMLOCK Repair

NCK Calculator
Phone have LOCKED to network

Code:
SIMLOCK seems to be valid
SUPERDONGLE_KEY seems to be valid
SIMLOCK_TEST passed
SECURITY_TEST passed
 
 
Imei net: 3520450xxxxxxxx
Version: SIMLOCK SERVER
Provider: PT. Satelindo, Country: Indonesia
Counter: 0/3, 0/10
 
CONFIG_DATA: 5100100000000000
PROFILE_BITS: 8000000000000006
 
BLOCK 1:   1=LOCKED (MCC+MNC): 51001F, DATA=51001F
BLOCK 2:   1=LOCKED (MCC+MNC): 51001F, DATA=51001F
BLOCK 3:   1=LOCKED (MCC+MNC): 00101F, DATA=00101F
please USE "NCK Calculator" for safe UNLOCKING

>> "SCAN" for "Identify" SIMLOCK GENERATION
>> Select "Unlock by CODE"
>> "Calc NCK"



Code:
Imei net: 3520450xxxxxxxx
Version: SIMLOCK SERVER
Provider: PT. Satelindo, Country: Indonesia
Counter: 0/3, 0/10
 
CONFIG_DATA: 5100100000000000
PROFILE_BITS: 8000000000000006
 
BLOCK 1:   1=LOCKED (MCC+MNC): 51001F, DATA=51001F
BLOCK 2:   1=LOCKED (MCC+MNC): 51001F, DATA=51001F
BLOCK 3:   1=LOCKED (MCC+MNC): 00101F, DATA=00101F
 
 
Backup saved to "BB5_3520450xxxxxxxx_SIMLOCK.back"
Using device: J.A.F, FW ver: 01.B1
Library version: 1.0.0.12027, Date: 06-02-2010
 
Product: V 10.10 23-03-09 RM-303 (c) Nokia             
 
SYSTEM ASIC ID: 000000010000022600010006010C192101013000 
ROOT KEY HASH: BAF3A9C3DBFA8454937DB77F2B8852B1
ROM ID: 273F6D55DFAAF68F
Sending SecondaryBoot  ...OK
Sending PreLoader ...OK
Sending CustomLoader ...OK
 
Calculating NCK using security server ...
Connecting to server[main.mxkey.biz] ...OK, secure login ...
 
#pw+ 693402639114130 +1 # 
#pw+ 592385163892314 +2 # 
#pw+ 858969064820817 +3 # 
#pw+ 912863836291037 +4 # 
#pw+ 818484633555523 +5 # 
#pw+ 049580344180624 +6 # 
#pw+ 488738539254885 +7 # 
 
Sending NCK code ...
Trying NCK lock 7 ... OK: code accepted.
Completed in 23.516 s
 
Restarting phone ...
 
Reading Simlock info ...
Imei net: 3520450xxxxxxxx
Version: SIMLOCK SERVER
Provider: PT. Satelindo, Country: Indonesia
Counter: 0/3, 0/10
 
CONFIG_DATA: 5100100000000000
PROFILE_BITS: 8000000000000006
 
BLOCK 1:   1=OPEN, DATA=51001F
BLOCK 2:   1=OPEN, DATA=51001F
BLOCK 3:   1=OPEN, DATA=00101F
SIMLOCK REPAIR
when Phone have DAMAGE SIMLOCK

Code:
SIMLOCK invalid!
SUPERDONGLE_KEY seems to be valid
SECURITY_TEST failed!
 
SIMLOCK_DATA corrupted!
then use

>> REPAIR SIMLOCK
>> tick "Make SIMLOCK RPL"
>> "Repair SPLOCK"



Code:
Updating SIMLOCK...OK
 
Reading Simlock info ...
Imei net: 3520450xxxxxxxx
Version: SIMLOCK SERVER
Provider: Nokia Test, Country: Finland
Counter: 0/3, 0/10
 
CONFIG_DATA: 2440700000000000
PROFILE_BITS: 0000000000000000
 
BLOCK 1:   1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 2:   1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 3:   1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 4:   1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 5:   1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 6:   1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 7:   1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF

br,
 
The Following 98 Users Say Thank You to Andra For This Useful Post:
Show/Hide list of the thanked
Old 10-21-2010, 21:26   #23 (permalink)
No Life Poster
 
gbluez's Avatar
 
Join Date: Jul 2004
Posts: 11,049
Member: 73565
Status: Offline
Thanks Meter: 5,062
Regarding BB5 phones with NEW HASH

Hello,
it's been a while since my last post on this topic. Here is another blablabla regarding some new BB5 phones that came with new HASH, what we can't do and what we can.

Example: E63 - current interface UFS.

BUS CHECK



To flash this phone, you have to use another interface, such as ATF or use USB flash.

But by using UFS you still can do all service operation features,



Self Test



Or PM things



On other side, it is fully supported by using ATF as interface.
All flash and service operations are supported. Fully!

BUS CHECK



RPL Backup



Flashing



Please PAY ATTENTION on this description:





This logs means that alternative loader that we used to repair simlock and repair super dongle is NOT AVAILABE at the moment.
Another words: MXKEY - also another third party tool, can NOT UNLOCK / REPAIR SIM LOCK / REPAIR SUPER DONGLE for NOW.
Your only solution on such phone with damaged security data is to buy RPL.


Last message

 
The Following 7 Users Say Thank You to gbluez For This Useful Post:
Show/Hide list of the thanked
Old 10-22-2010, 19:43   #24 (permalink)
No Life Poster
 
gbluez's Avatar
 
Join Date: Jul 2004
Posts: 11,049
Member: 73565
Status: Offline
Thanks Meter: 5,062
Arrow All NEW DCT4+ should use this unlock method - RSA

Old patching method is obsolete, it is highly recommended to use this unlock / repair method. SL remove / repair use the same way.

First, please make sure that you are on BLADE-X server that most suitable for your location.

1. Get simlock info



2. Do simlock operation



note.
this function will NOT work on OLD DCT4/WD2/TIKU phones.
if you're working on old DCT4, DO NOT tick 'Direct Unlock'

Relock Function




Those solutions above are PERMANENT. Phone will stay on the same condition after flash.


=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
ticked 'direct unlock' - mobileEx will use new routine for simlock operation.
internet connection and registered dongle needed, intended for all DCT4+ phones.

unticked 'direct unlock' - mobileEx will use old routine for simlock operation.
standalone, SL patching (DCT4+ old method), intended for OLD phone.
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
 
The Following 3 Users Say Thank You to gbluez For This Useful Post:
Show/Hide list of the thanked
Old 11-13-2010, 22:49   #25 (permalink)
No Life Poster
 
gbluez's Avatar
 
Join Date: Jul 2004
Posts: 11,049
Member: 73565
Status: Offline
Thanks Meter: 5,062
Cool

Hi,
This is an updated providers .ini file that placed on
Code:
modules\{3EBAF427-9F55-419F-8A75-385DFC651169}
This full list is based on Annex to ITU OB 958-E (No. 958 – 15.VI.2010).

case example regarding this updated .ini:
http://forum.gsmhosting.com/vbb/f550...wered-1121480/


BR

ps.
will be included on next installer on update.
Attached Files
File Type: rar providers.rar (59.7 KB, 344 views)
 
The Following 5 Users Say Thank You to gbluez For This Useful Post:
Show/Hide list of the thanked
Old 11-21-2010, 19:07   #26 (permalink)
No Life Poster
 
gbluez's Avatar
 
Join Date: Jul 2004
Posts: 11,049
Member: 73565
Status: Offline
Thanks Meter: 5,062
hello,
this is how to use new function called "reset certificate" correctly.

this is the initial condition,
st_test failed, succeeded pm auth, but do not bring solutuion.




it it recommended to test everything first or time be wasted after
run BB5 certificate validation tool, and this is the bad things




our goal is to fix ccc and hwc. so we need to erase that part first in order to get clean field. this is how to use it.
>Scan Available:
mobileEx will search any available certificate. the option will me marked automatically if the field is exist.
> Reset selected:
mobileEx will erase choosed certificate.



ps.
out of topic: Reset NPC button is now removed. So if you want to perform NPC reset, just mark NPC, and click Reset Selected.
assumed you all know about backup, so i skip to talk about it.

- tick CCC and HWC, press Erase Selected.
mobileEx is performing certificate reset on selected field



Proceed with Recover Certificate DIRECTLY!



Run BB5 Certificate Validation Tool just to see if it works



And if everything goes fine, proceed with RFBB calibration.
- mark Load RFBB from Server
- do correct auth (PMM auth for virgin phone, Super SD auth for phone with super SD repaired)
- click write when ready



All done.



ps.
for phone with dcc config, pleace check camera function,
proceed to dcc maintenance if needed.


will add some more

BR

in order to complete our ccc and hwc database regarding certificate recovery feature,
we invite all user to do a small contribution to press this button.



it's ok if server already has your kind certificate.
will send : ccc, hwc, varian. npc is excluded.
 
The Following 17 Users Say Thank You to gbluez For This Useful Post:
Show/Hide list of the thanked
Closed Thread

Bookmarks


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


Similar Threads
Thread Thread Starter Forum Replies Last Post
Cell Phone Tips and Tricks - Students and Cell Phones murtaza_nns Off Topic Zone 3 10-05-2009 21:59
My tips and tricks and questions for N73 6280 etc pearsonjohnboy BB5BOX 7 03-06-2008 14:58
Ah no, its dummy S40 phone and unfortunately S60 tip and trick doesn’t works on that apocalypso Nokia Base Band 5 ( BB-5 ) 0 06-25-2007 14:05
D500 tips and trick over here!!!!!! austinchan SWIFT Platform 4 06-07-2005 14:40
9210 Tips and Trick #1 and #2 X-Shadow Nokia Legacy Phones ( DCT-1 ,2 ,3 ,L ) 0 11-26-2001 02:26

 



All times are GMT +1. The time now is 11:14.



Powered by Searchlight © 2024 Axivo Inc.
vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2024 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2023 -
Page generated in 0.67499 seconds with 10 queries

SEO by vBSEO