JannatLui

Well-known Member
Joined
Sep 1, 2010
Posts
2,836
Likes
14
answer: [MXKEY - INFO] Successfully Unlocked/repaired Phones By MXKey

Imei net: 352056021319872
Version: SIMLOCK SERVER VERSION 63
Counter: 0/3, 0/10

CONFIG_DATA: FFFFFFFFFFFFFFFF
PROFILE_BITS: FFFFFFFFFFFFFFFF

BLOCK 1: 1=CORRUPTED

Backup saved to *quot;BB5_352056021319872_SIMLOCK.back*quot;
Using device: UFS_USB V2.8 (c) SarasSoft 2007.
Library version: 1.0.0.10912, Date: 05-11-2009

ROOT KEY HASH: BAF3A9C3DBFA8454937DB77F2B8852B1
ROM ID: 191EC665DFAAF68F

Sending SecondaryBoot(0x3D00 bytes) ...OK
Sending PreLoader(0x2E4 bytes) ...OK
Sending ROM(0x3948 bytes) ...OK
Sending CustomLoader(0x50B0 bytes) ...OK
Sending SecurityBlock(0x2000 bytes) ...OK
Sending SimlockBinary(0x3B0 bytes) ...OK
Calculating LOCK data ...OK
Receiving Unlocked PM, please WAIT ... OK
Writing Unlocked PM ... OK
Completed in 30.609 s
Restarting phone ...

Reading Simlock info ...
Imei net: 352056021319872
Version: SIMLOCK SERVER VERSION 63
Provider: Nokia Test, Country: Finland
Counter: 0/3, 0/10

CONFIG_DATA: 2440700000000000
PROFILE_BITS: 0000000000000000

BLOCK 1: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 2: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 3: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 4: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 5: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 6: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 7: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
 

JannatLui

Well-known Member
Joined
Sep 1, 2010
Posts
2,836
Likes
14
answer: [MXKEY - INFO] Successfully Unlocked/repaired Phones By MXKey

N95 Unlocked With using TMA Eva

Imei net: 352255012533000
Version: SIMLOCK SERVER
Provider: Orange, Country: United Kingdom
Counter: 0/3, 0/10

CONFIG_DATA: 2343300000000000
PROFILE_BITS: 0000000000000000

BLOCK 1: 1=LOCKED (MCC+MNC): 23433F, DATA=23433F
BLOCK 2: 1=LOCKED (MCC+MNC): 23486F, DATA=23486F
BLOCK 3: 1=LOCKED (MCC+MNC): 23433F, DATA=23433F
BLOCK 4: 1=LOCKED (MCC+MNC): 23486F, DATA=23486F

Backup saved to *quot;BB5_352255012533000_SIMLOCK.back*quot;
Using device: J.A.F, FW ver: 01.B0
Library version: 1.0.0.10913, Date: 05-11-2009

ROOT KEY HASH: CAEEBB65D3C48E6DC73B49DC5063A2EE
ROM ID: F2C6EBADC86E6189

Sending SecondaryBoot(0x3AC0 bytes) ...OK
Sending PreLoader(0x2E4 bytes) ...OK
Sending ROM(0x39C0 bytes) ...OK
Sending CustomLoader(0x50D8 bytes) ...OK
Sending SecurityBlock(0x2000 bytes) ...OK
Sending SimlockBinary(0x3B0 bytes) ...OK
Calculating LOCK data ...OK
Receiving Unlocked PM, please WAIT ... OK
Writing Unlocked PM ... OK
Completed in 46.953 s
Restarting phone ...

Reading Simlock info ...
Imei net: 352255012533000
Version: SIMLOCK SERVER
Provider: Nokia Test, Country: Finland
Counter: 0/3, 0/10

CONFIG_DATA: 2440700000000000
PROFILE_BITS: 0000000000000000

BLOCK 1: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 2: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 3: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 4: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 5: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 6: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 7: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
 

JannatLui

Well-known Member
Joined
Sep 1, 2010
Posts
2,836
Likes
14
answer: [MXKEY - INFO] Successfully Unlocked/repaired Phones By MXKey

n80 unlocked



CONFIG_DATA: 2343300000000000
PROFILE_BITS: 0000000000000000

BLOCK 1: 1=LOCKED (MCC+MNC): 23433F, DATA=23433F
BLOCK 2: 1=LOCKED (MCC+MNC): 23486F, DATA=23486F
BLOCK 3: 1=LOCKED (MCC+MNC): 23433F, DATA=23433F
BLOCK 4: 1=LOCKED (MCC+MNC): 23486F, DATA=23486F

Backup saved to *quot;BB5_3***************_SIMLOCK.back*quot;
Using device: UFS_USB V2.8 (c) SarasSoft 2007.
Library version: 1.0.0.10913, Date: 05-11-2009

ROOT KEY HASH: BAF3A9C3DBFA8454937DB77F2B8852B1
ROM ID: 273F6D55DFAAF68F

Sending SecondaryBoot(0x3D00 bytes) ...OK
Sending PreLoader(0x2E4 bytes) ...OK
Sending ROM(0x3948 bytes) ...OK
Sending CustomLoader(0x50B0 bytes) ...OK
Sending SecurityBlock(0x2000 bytes) ...OK
Sending SimlockBinary(0x3B0 bytes) ...OK
Calculating LOCK data ...OK
Receiving Unlocked PM, please WAIT ... OK
Writing Unlocked PM ... OK
Completed in 26.641 s
Restarting phone ...

Reading Simlock info ...
Imei net: 3**************
Version: SIMLOCK SERVER VERSION 62
Provider: Nokia Test, Country: Finland
Counter: 0/3, 0/10

CONFIG_DATA: 2440700000000000
PROFILE_BITS: 0000000000000000

BLOCK 1: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 2: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 3: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 4: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 5: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 6: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 7: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
 

JannatLui

Well-known Member
Joined
Sep 1, 2010
Posts
2,836
Likes
14
answer: [MXKEY - INFO] Successfully Unlocked/repaired Phones By MXKey

E71x unlock successfully by mxkey


Imei: 356875022095967
Version: SIMLOCK SERVER
Provider: CINGULAR - Pacific Bell Wireless, Country: U.S.A.
Counter: 0/3, 0/10

CONFIG_DATA: 3101700000000000
PROFILE_BITS: 8000000000000000

BLOCK 1: 1=LOCKED (MCC+MNC): 310150, DATA=310150
BLOCK 2: 1=LOCKED (MCC+MNC): 310170, DATA=310170
BLOCK 3: 1=LOCKED (MCC+MNC): 311180, DATA=311180
BLOCK 4: 1=LOCKED (MCC+MNC): 310410, DATA=310410
BLOCK 5: 1=LOCKED (MCC+MNC): 310980, DATA=310980

Backup saved to *quot;BB5_356875022095967_SIMLOCK.back*quot;
Using device: J.A.F, FW ver: 01.B1

ROOT KEY HASH: CAEEBB65D3C48E6DC73B49DC5063A2EE
ROM ID: 4B9B75103E691FF8

Sending SecondaryBoot(0x3AC0 bytes) ...OK
Sending PreLoader(0x2E4 bytes) ...OK
Sending ROM(0x11C4 bytes) ...OK
Sending SecurityBlock(0x2000 bytes) ...OK
Sending SimlockBinary(0x190 bytes) ...OK
Sending Certificate(0x1930 bytes) ...OK
Calculating LOCK data ...Writing Unlocked PM ... OK
Completed in 16.891 s
Restarting phone ...

Reading Simlock info ...
Imei: 356875022095967
Version: SIMLOCK SERVER
Provider: ALL Operator, Country: -
Counter: 0/3, 0/10

CONFIG_DATA: 0010100000000000
PROFILE_BITS: 8000000000000000

BLOCK 1: 1=OPEN, DATA=00101F
 

JannatLui

Well-known Member
Joined
Sep 1, 2010
Posts
2,836
Likes
14
answer: [MXKEY - INFO] Successfully Unlocked/repaired Phones By MXKey

6120 unlocked successfully.

Imei net: 354846027966009
Version: SIMLOCK SERVER
Provider: Hutchinson 3G (3), Country: United Kingdom
Counter: 0/3, 0/10

CONFIG_DATA: 2342000000000000
PROFILE_BITS: 0000000000000000

BLOCK 1: 1=LOCKED (MCC+MNC): 23420F, DATA=23420F
BLOCK 2: 1=LOCKED (MCC+MNC): 23594F, DATA=23594F
BLOCK 3: 1=LOCKED (MCC+MNC): 23420F, DATA=23420F
BLOCK 4: 1=LOCKED (MCC+MNC): 23594F, DATA=23594F

Backup saved to *quot;BB5_354846027966009_SIMLOCK.back*quot;
Using device: UFS_USB V2.8 (c) SarasSoft 2007.
Library version: 1.0.0.10912, Date: 05-11-2009

ROOT KEY HASH: CAEEBB65D3C48E6DC73B49DC5063A2EE
ROM ID: A8C1D6713E691FF8

Sending SecondaryBoot(0x3AC0 bytes) ...OK
Sending PreLoader(0x2E4 bytes) ...OK
Sending ROM(0x11C4 bytes) ...OK
Sending SecurityBlock(0x2000 bytes) ...OK
Sending SimlockBinary(0x190 bytes) ...OK
Sending Certificate(0x1930 bytes) ...OK
Calculating LOCK data ...Writing Unlocked PM ... OK
Completed in 51.203 s
Restarting phone ...

Reading Simlock info ...
Imei net: 354846027966009
Version: SIMLOCK SERVER
Provider: ALL Operator, Country: -
Counter: 0/3, 0/10

CONFIG_DATA: 0010100000000000
PROFILE_BITS: 8000000000000000

BLOCK 1: 1=OPEN, DATA=00101F
 

JannatLui

Well-known Member
Joined
Sep 1, 2010
Posts
2,836
Likes
14
answer: [MXKEY - INFO] Successfully Unlocked/repaired Phones By MXKey

E71 Locked to 3G Unlocked Successfully

Imei net: 354208038415478
Version: SIMLOCK SERVER
Provider: Hutchinson 3G (3), Country: United Kingdom
Counter: 0/3, 0/10

CONFIG_DATA: 2342000000000000
PROFILE_BITS: 8000000000000000

BLOCK 1: 1=LOCKED (MCC+MNC): 23420F, DATA=23420F
BLOCK 2: 1=LOCKED (MCC+MNC): 23595F, DATA=23595F

Backup saved to *quot;BB5_354208038415478_SIMLOCK.back*quot;
Using device: J.A.F, FW ver: 01.B0
Library version: 1.0.0.10913, Date: 05-11-2009

ROOT KEY HASH: CAEEBB65D3C48E6DC73B49DC5063A2EE
ROM ID: 4B9B75103E691FF8

Sending SecondaryBoot(0x3AC0 bytes) ...OK
Sending PreLoader(0x2E4 bytes) ...OK
Sending ROM(0x11C4 bytes) ...OK
Sending SecurityBlock(0x2000 bytes) ...OK
Sending SimlockBinary(0x190 bytes) ...OK
Sending Certificate(0x1930 bytes) ...OK
Calculating LOCK data ...Writing Unlocked PM ... OK
Completed in 15.235 s
Restarting phone ...

Reading Simlock info ...
Imei net: 354208038415478
Version: SIMLOCK SERVER
Provider: ALL Operator, Country: -
Counter: 0/3, 0/10

CONFIG_DATA: 0010100000000000
PROFILE_BITS: 8000000000000000

BLOCK 1: 1=OPEN, DATA=00101F
 

JannatLui

Well-known Member
Joined
Sep 1, 2010
Posts
2,836
Likes
14
answer: [MXKEY - INFO] Successfully Unlocked/repaired Phones By MXKey

6555 unlock.


Imei net: 356271012224926
Version: SIMLOCK SERVER
Provider: CINGULAR - Pacific Bell Wireless, Country: U.S.A.
Counter: 0/3, 0/10

CONFIG_DATA: 3101700000000000
PROFILE_BITS: 8000000000000000

BLOCK 1: 1=LOCKED (MCC+MNC): 310150, DATA=310150
BLOCK 2: 1=LOCKED (MCC+MNC): 310170, DATA=310170
BLOCK 3: 1=LOCKED (MCC+MNC): 311180, DATA=311180
BLOCK 4: 1=LOCKED (MCC+MNC): 310410, DATA=310410
BLOCK 5: 1=LOCKED (MCC+MNC): 310980, DATA=310980

Backup saved to *quot;BB5_356271012224926_SIMLOCK.back*quot;
Using device: UFS_USB V2.8 (c) SarasSoft 2007.
Library version: 1.0.0.10912, Date: 05-11-2009

ROOT KEY HASH: BAF3A9C3DBFA8454937DB77F2B8852B1
ROM ID: 273F6D55DFAAF68F

Sending SecondaryBoot(0x3C00 bytes) ...OK
Sending PreLoader(0x2E4 bytes) ...OK
Sending ROM(0x11BC bytes) ...OK
Sending SecurityBlock(0x2000 bytes) ...OK
Sending SimlockBinary(0x190 bytes) ...OK
Sending Certificate(0x1940 bytes) ...OK
Calculating LOCK data ...Writing Unlocked PM ... OK
Completed in 23.484 s
Restarting phone ...

Reading Simlock info ...
Imei net: 356271012224926
Version: SIMLOCK SERVER
Provider: ALL Operator, Country: -
Counter: 0/3, 0/10

CONFIG_DATA: 0010100000000000
PROFILE_BITS: 8000000000000000

BLOCK 1: 1=OPEN, DATA=00101F
 

JannatLui

Well-known Member
Joined
Sep 1, 2010
Posts
2,836
Likes
14
answer: [MXKEY - INFO] Successfully Unlocked/repaired Phones By MXKey

1112 repaired

Using device: J.A.F, FW ver: 01.B1
ASIC ID: 0x2201 [UPP_2M ver: 2]
SecondaryBoot: u_2nd.fia [DCT4] version: 4.70.1 revision: 0.7 size: 0x9A0
Supported Ids: 0011, 0010, 0121, 0120, 1120, 1131, 1130, 2141, 2140, 2142, 2151, 1141, 1181, 1015, 1021, 2031, 2030, 3041, 1201, 2201, 2291, 3161, 3160, 3164
FlashID0: 0001 2A7E [AMD S29NS032J,32 Mbits] page size: 64 K type: NOR area: 01000000-013FFFFF
FlashID1: 0000 0001 [unused/removed]
ExtBUSC: AD7E B61A 1BBE 0BE2 7D58 6BE4 DBEE 6514
Algorithm: u_amd.fia [DCT4 ALGORITHM] version: 4.70.1 revision: 0.7 size: 0x7518
Supported Ids: 0011, 0010, 0121, 0120, 1120, 1131, 1130, 2141, 2140, 2142, 2151, 1141, 1181, 1015, 1021, 2031, 2030, 3041, 1201, 2201, 2291, 3161, 3160, 3164
Performing Flash Authentication ...OK
UEM ID: 00870A4A:2984DA60
ASIC type: 2
UEM Imei: 35806701987049
Flash Imei: 35806701987049
RPL saved to *quot;C:\mobileEx\3.2\data\backup\RPL\3580670198704 9_BA CK.rpl*quot;
Processing file: rh93_07.020 as MCU
[DCT4,DCT4 ALGORITHM] size: 1.89 MB
Supported Ids: 0120, 0121, 1021, 1120, 1130, 1131, 1201, 2140, 2142, 2201, 2031, 2030, 2032, 2033
ASIC ID: 0x2201 [UPP_2M ver: 2]
SecondaryBoot: u_2nd.fia [DCT4] version: 4.70.1 revision: 0.7 size: 0x9A0
Supported Ids: 0011, 0010, 0121, 0120, 1120, 1131, 1130, 2141, 2140, 2142, 2151, 1141, 1181, 1015, 1021, 2031, 2030, 3041, 1201, 2201, 2291, 3161, 3160, 3164
FlashID0: 0001 2A7E [AMD S29NS032J,32 Mbits] page size: 64 K type: NOR area: 01000000-013FFFFF
FlashID1: 0000 0001 [unused/removed]
ExtBUSC: AD7E B61A 1BBE 0BE2 7D58 6BE4 DBEE 6514
Algorithm: u_amd.fia [DCT4 ALGORITHM] version: 4.70.1 revision: 0.7 size: 0x7518
Supported Ids: 0011, 0010, 0121, 0120, 1120, 1131, 1130, 2141, 2140, 2142, 2151, 1141, 1181, 1015, 1021, 2031, 2030, 3041, 1201, 2201, 2291, 3161, 3160, 3164
Performing Flash Authentication ...OK
UEM ID: 00870A4A:2984DA60
Area [01000000-0100FFFF] erased in 0.437 s
Area [01010000-013BFFFF] erased in 25.297 s
Area [013C0000-013EFFFF] erased in 1.266 s
Area [017C0000-017EFFFF] erased in 0.062 s
Area [01FC0000-01FEFFFF] erased in 0.063 s
Flash programming ...
Programming completed in 13.750 s
File Processed in 58.609 s
Processing file: rh930_nai7.02ia as CNT
[DCT4,DCT4 ALGORITHM] size: 159.09 KB
Supported Ids: 0120, 0121, 1021, 1120, 1130, 1131, 1201, 2140, 2142, 2201, 2031, 2030, 2032, 2033
ASIC ID: 0x2201 [UPP_2M ver: 2]
SecondaryBoot: u_2nd.fia [DCT4] version: 4.70.1 revision: 0.7 size: 0x9A0
Supported Ids: 0011, 0010, 0121, 0120, 1120, 1131, 1130, 2141, 2140, 2142, 2151, 1141, 1181, 1015, 1021, 2031, 2030, 3041, 1201, 2201, 2291, 3161, 3160, 3164
FlashID0: 0001 2A7E [AMD S29NS032J,32 Mbits] page size: 64 K type: NOR area: 01000000-013FFFFF
FlashID1: 0000 0001 [unused/removed]
ExtBUSC: AD7E B61A 1BBE 0BE2 7D58 6BE4 DBEE 6514
Algorithm: u_amd.fia [DCT4 ALGORITHM] version: 4.70.1 revision: 0.7 size: 0x7518
Supported Ids: 0011, 0010, 0121, 0120, 1120, 1131, 1130, 2141, 2140, 2142, 2151, 1141, 1181, 1015, 1021, 2031, 2030, 3041, 1201, 2201, 2291, 3161, 3160, 3164
Performing Flash Authentication ...OK
UEM ID: 00870A4A:2984DA60
Area [01380000-013BFFFF] erased in 1.734 s
Flash programming ...
Programming completed in 1.235 s
Extracting Content Pack, File Server fake reply for CUI phone.
Content Pack extracted successfully in 0.047 s
File Processed in 26.532 s
Processing file: rh93_07.02ia as PPM
[DCT4,DCT4 ALGORITHM] size: 1.28 MB
Supported Ids: 0120, 0121, 1021, 1120, 1130, 1131, 1201, 2140, 2142, 2201, 2031, 2030, 2032, 2033
ASIC ID: 0x2201 [UPP_2M ver: 2]
SecondaryBoot: u_2nd.fia [DCT4] version: 4.70.1 revision: 0.7 size: 0x9A0
Supported Ids: 0011, 0010, 0121, 0120, 1120, 1131, 1130, 2141, 2140, 2142, 2151, 1141, 1181, 1015, 1021, 2031, 2030, 3041, 1201, 2201, 2291, 3161, 3160, 3164
FlashID0: 0001 2A7E [AMD S29NS032J,32 Mbits] page size: 64 K type: NOR area: 01000000-013FFFFF
FlashID1: 0000 0001 [unused/removed]
ExtBUSC: AD7E B61A 1BBE 0BE2 7D58 6BE4 DBEE 6514
Algorithm: u_amd.fia [DCT4 ALGORITHM] version: 4.70.1 revision: 0.7 size: 0x7518
Supported Ids: 0011, 0010, 0121, 0120, 1120, 1131, 1130, 2141, 2140, 2142, 2151, 1141, 1181, 1015, 1021, 2031, 2030, 3041, 1201, 2201, 2291, 3161, 3160, 3164
Performing Flash Authentication ...OK
UEM ID: 00870A4A:2984DA60
Area [011E0000-011EFFFF] erased in 0.438 s
Area [011F0000-0137FFFF] erased in 10.687 s
Flash programming ...
Programming completed in 9.282 s
File Processed in 36.140 s
Flashing completed in 2 min 42.328 s


Phone Type: RH-93
SW Version: V 7.02 10-12-07 RH-93 (c) NMP
Imei plain: 35806701987049-9
Product Code: 0533135
Cellular System: GSM
ASIC ID: 0x2201, type: 2
Ppm Id: IA
Language Pack:
English,Arabic,Farsi,French,Urdu


Imei net: 35806701987049
Provider: ALL Operator, Country: -
Counter: 0/3, 0/10

CONFIG_DATA: 0010100000000000
PROFILE_BITS: 0000000000010002

BLOCK 1: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 2: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 3: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 4: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 5: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 6: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 7: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
Total time to process is 2 min 50.985 s
 

JannatLui

Well-known Member
Joined
Sep 1, 2010
Posts
2,836
Likes
14
answer: [MXKEY - INFO] Successfully Unlocked/repaired Phones By MXKey

2330c unlock done mx key great team
Imei net: 35798303880427
Provider: Orange, Country: United Kingdom
Counter: 0/3, 0/10

CONFIG_DATA: 2343300000000000
PROFILE_BITS: 800000000003000B

BLOCK 1: 1.LOCKED (MCC+MNC): 23433F
BLOCK 2: 1.LOCKED (MCC+MNC): 23486F

PhoneType:RM-512
SwVersion: V 08.20 30-06-09 RM-512 (c) Nokia
MCU file: rm512__08.20.mcusw
Trying to find patch position ...OK


ASIC ID: 0x3168 [UPP_8M ver: 6.4]
SecondaryBoot: u3_2nd.fia [DCT4] version: 4.76.0 revision: 0.7 size: 0x9A8
Supported Ids: 3040, 2292, 2293, 3162, 3166, 3168
FlashID0: 0089 8981 [Intel NU48F256,256 Mbits] page size: 128 K type: NOR area: 01000000-02FFFFFF - COMBO FLASH
ExtBUSC: AD7E B61B 2310 0340 C605 E401 20A2 0000
Algorithm: u3_intel.fia [DCT4 ALGORITHM] version: 4.76.0 revision: 0.7 size: 0x56A0
Supported Ids: 3040, 2292, 2293, 3162, 3166, 3168
Performing Flash Authentication ...OK
UEM ID: 00D68407:3B8ADA60
Area [01000000-0101FFFF] erased in 0.938 s
Area [01220000-0123FFFF] erased in 0.671 s
Area [01440000-0145FFFF] erased in 0.797 s
Area [014C0000-014DFFFF] erased in 0.734 s
Area [01CE0000-01CFFFFF] erased in 0.016 s
Programming ...
Programming completed.
Updating SIMLOCK ...OK
Completed in 1 min 17.281 s

Reading Simlock info ...
Imei net: 35798303880427
Provider: ALL Operator, Country: -
Counter: 0/3, 0/10

CONFIG_DATA: 0010100000000000
PROFILE_BITS: 800000000003000B

BLOCK 1: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 2: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 3: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 4: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 5: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 6: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 7: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
 

JannatLui

Well-known Member
Joined
Sep 1, 2010
Posts
2,836
Likes
14
answer: [MXKEY - INFO] Successfully Unlocked/repaired Phones By MXKey

Imei net: 35822703767061
Provider: Swisscom NATEL, Country: Switzerland
Counter: 0/3, 0/10

CONFIG_DATA: 2280100000000000
PROFILE_BITS: 800000000003000B

BLOCK 1: 1.LOCKED (MCC+MNC): 22801F

PhoneType:RM-512
SwVersion: V 08.20 30-06-09 RM-512 (c) Nokia
MCU file: rm512__08.20.mcusw
Trying to find patch position ...OK


ASIC ID: 0x3168 [UPP_8M ver: 6.4]
SecondaryBoot: u3_2nd.fia [DCT4] version: 4.76.0 revision: 0.7 size: 0x9A8
Supported Ids: 3040, 2292, 2293, 3162, 3166, 3168
FlashID0: 0089 8981 [Intel NU48F256,256 Mbits] page size: 128 K type: NOR area: 01000000-02FFFFFF - COMBO FLASH
ExtBUSC: AD7E B61B 2310 0340 C605 E401 20A2 0000
Algorithm: u3_intel.fia [DCT4 ALGORITHM] version: 4.76.0 revision: 0.7 size: 0x56A0
Supported Ids: 3040, 2292, 2293, 3162, 3166, 3168
Performing Flash Authentication ...OK
UEM ID: 0093E278:3B8ADA60
Area [01000000-0101FFFF] erased in 0.860 s
Area [01220000-0123FFFF] erased in 0.781 s
Area [01440000-0145FFFF] erased in 0.750 s
Area [014C0000-014DFFFF] erased in 0.703 s
Area [01CE0000-01CFFFFF] erased in 0.016 s
Programming ...
Programming completed.
Updating SIMLOCK ...OK
Completed in 1 min 19.500 s

Reading Simlock info ...
Imei net: 35822703767061
Provider: ALL Operator, Country: -
Counter: 0/3, 0/10

CONFIG_DATA: 0010100000000000
PROFILE_BITS: 800000000003000B

BLOCK 1: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 2: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 3: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 4: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 5: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 6: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 7: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
 

JannatLui

Well-known Member
Joined
Sep 1, 2010
Posts
2,836
Likes
14
answer: [MXKEY - INFO] Successfully Unlocked/repaired Phones By MXKey

Using device: J.A.F, FW ver: 01.B1
Library version: 1.0.0.10913, Date: 05-11-2009
Processing file: rh105_04.000 as MCU
[DCT4,DCT4 ALGORITHM] size: 2.26 MB
Supported Ids: 2292
ASIC ID: 0x2292 [UPPCosto ver: 1.3]
SecondaryBoot: u3_2nd.fia [DCT4] version: 4.76.0 revision: 0.7 size: 0x9A8
Supported Ids: 3040, 2292, 2293, 3162, 3166, 3168
FlashID0: 0020 8828 [ST 58WR032FU,32 Mbits] page size: 64 K type: NOR area: 01000000-013FFFFF
FlashID1: 0000 0001 [unused/removed]
ExtBUSC: AD7E B61A 1BBE 0BE2 7D58 6BE4 DBEE 6514
Algorithm: u3_st_i.fia [DCT4 ALGORITHM] version: 4.76.0 revision: 0.7 size: 0x4C30
Supported Ids: 3040, 2292, 2293, 3162, 3166, 3168
Performing Flash Authentication ...OK
UEM ID: 00DEBED3:2984DA60
Area [01000000-0100FFFF] erased in 1.188 s
Area [01010000-013AFFFF] erased in 1 min 8.484 s
Area [013B0000-013EFFFF] erased in 4.672 s
Area [017C0000-017EFFFF] erased in 0.062 s
Area [01FC0000-01FEFFFF] erased in 0.063 s
Flash programming ...
Programming completed in 15.079 s
File Processed in 1 min 41.640 s
Formating FS: FILE2 ...
Processing file: rh1050_nai4.00ia as CNT
[DCT4,DCT4 ALGORITHM] size: 159.99 KB
Supported Ids: 2292
ASIC ID: 0x2292 [UPPCosto ver: 1.3]
SecondaryBoot: u3_2nd.fia [DCT4] version: 4.76.0 revision: 0.7 size: 0x9A8
Supported Ids: 3040, 2292, 2293, 3162, 3166, 3168
FlashID0: 0020 8828 [ST 58WR032FU,32 Mbits] page size: 64 K type: NOR area: 01000000-013FFFFF
FlashID1: 0000 0001 [unused/removed]
ExtBUSC: AD7E B61A 1BBE 0BE2 7D58 6BE4 DBEE 6514
Algorithm: u3_st_i.fia [DCT4 ALGORITHM] version: 4.76.0 revision: 0.7 size: 0x4C30
Supported Ids: 3040, 2292, 2293, 3162, 3166, 3168
Performing Flash Authentication ...OK
UEM ID: 00DEBED3:2984DA60
Area [01380000-013AFFFF] erased in 3.547 s
Flash programming ...
Programming completed in 1.156 s
Extracting Content Pack, File Server fake reply for CUI phone.
Content Pack extracted successfully in 0.031 s
File Processed in 24.125 s
Processing file: rh105_04.00ia as PPM
[DCT4,DCT4 ALGORITHM] size: 1.17 MB
Supported Ids: 2292
ASIC ID: 0x2292 [UPPCosto ver: 1.3]
SecondaryBoot: u3_2nd.fia [DCT4] version: 4.76.0 revision: 0.7 size: 0x9A8
Supported Ids: 3040, 2292, 2293, 3162, 3166, 3168
FlashID0: 0020 8828 [ST 58WR032FU,32 Mbits] page size: 64 K type: NOR area: 01000000-013FFFFF
FlashID1: 0000 0001 [unused/removed]
ExtBUSC: AD7E B61A 1BBE 0BE2 7D58 6BE4 DBEE 6514
Algorithm: u3_st_i.fia [DCT4 ALGORITHM] version: 4.76.0 revision: 0.7 size: 0x4C30
Supported Ids: 3040, 2292, 2293, 3162, 3166, 3168
Performing Flash Authentication ...OK
UEM ID: 00DEBED3:2984DA60
Area [01240000-0124FFFF] erased in 1.563 s
Area [01250000-0137FFFF] erased in 22.500 s
Flash programming ...
Programming completed in 8.282 s
File Processed in 44.437 s
Flashing completed in 3 min 7.593 s

After Flash Processing ...

PhoneType:RH-105
SwVersion: V 4.00 19-10-07 RH-105 (c) NMP
MCU file: rh105_04.000
Trying to find patch position ...OK, case id: 3

ASIC ID: 0x2292 [UPPCosto ver: 1.3]
SecondaryBoot: u3_2nd.fia [DCT4] version: 4.76.0 revision: 0.7 size: 0x9A8
Supported Ids: 3040, 2292, 2293, 3162, 3166, 3168
FlashID0: 0020 8828 [ST 58WR032FU,32 Mbits] page size: 64 K type: NOR area: 01000000-013FFFFF
FlashID1: 0000 0001 [unused/removed]
ExtBUSC: AD7E B61A 1BBE 0BE2 7D58 6BE4 DBEE 6514
Algorithm: u3_st_i.fia [DCT4 ALGORITHM] version: 4.76.0 revision: 0.7 size: 0x4C30
Supported Ids: 3040, 2292, 2293, 3162, 3166, 3168
Performing Flash Authentication ...OK
UEM ID: 00DEBED3:2984DA60
Area [01000000-0101FFFF] erased in 2.344 s
Area [01140000-0115FFFF] erased in 2.359 s
Programming ...
Programming completed.
Updating SIMLOCK ...OK
Completed in 29.532 s


Phone Type: RH-105
SW Version: V 4.00 19-10-07 RH-105 (c) NMP
Imei plain: 35320803557209-0
Product Code: 0568772
Cellular System: GSM
ASIC ID: 0x2292, type: 11
Ppm Id: IA
Language Pack:
- not available.


Imei net: 35320803557209
Provider: ALL Operator, Country: -
Counter: 0/3, 0/10

CONFIG_DATA: 0010100000000000
PROFILE_BITS: 800000000001000B

BLOCK 1: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 2: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 3: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 4: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 5: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 6: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 7: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
Total time to process is 3 min 45.844 s
 

JannatLui

Well-known Member
Joined
Sep 1, 2010
Posts
2,836
Likes
14
answer: [MXKEY - INFO] Successfully Unlocked/repaired Phones By MXKey

Using device: J.A.F, FW ver: 01.B1
Library version: 1.0.0.10913, Date: 05-11-2009
Processing file: rh105_04.000 as MCU
[DCT4,DCT4 ALGORITHM] size: 2.26 MB
Supported Ids: 2292
ASIC ID: 0x2292 [UPPCosto ver: 1.3]
SecondaryBoot: u3_2nd.fia [DCT4] version: 4.76.0 revision: 0.7 size: 0x9A8
Supported Ids: 3040, 2292, 2293, 3162, 3166, 3168
FlashID0: 0020 8828 [ST 58WR032FU,32 Mbits] page size: 64 K type: NOR area: 01000000-013FFFFF
FlashID1: 0000 0001 [unused/removed]
ExtBUSC: AD7E B61A 1BBE 0BE2 7D58 6BE4 DBEE 6514
Algorithm: u3_st_i.fia [DCT4 ALGORITHM] version: 4.76.0 revision: 0.7 size: 0x4C30
Supported Ids: 3040, 2292, 2293, 3162, 3166, 3168
Performing Flash Authentication ...OK
UEM ID: 0041589B:2984DA60
Area [01000000-0100FFFF] erased in 1.265 s
Area [01010000-013AFFFF] erased in 1 min 12.938 s
Area [013B0000-013EFFFF] erased in 4.969 s
Area [017C0000-017EFFFF] erased in 0.015 s
Area [01FC0000-01FEFFFF] erased in 0.031 s
Flash programming ...
Programming completed in 14.219 s
File Processed in 1 min 45.281 s
Formating FS: FILE2 ...
Processing file: rh1050_nai4.00ia as CNT
[DCT4,DCT4 ALGORITHM] size: 159.99 KB
Supported Ids: 2292
ASIC ID: 0x2292 [UPPCosto ver: 1.3]
SecondaryBoot: u3_2nd.fia [DCT4] version: 4.76.0 revision: 0.7 size: 0x9A8
Supported Ids: 3040, 2292, 2293, 3162, 3166, 3168
FlashID0: 0020 8828 [ST 58WR032FU,32 Mbits] page size: 64 K type: NOR area: 01000000-013FFFFF
FlashID1: 0000 0001 [unused/removed]
ExtBUSC: AD7E B61A 1BBE 0BE2 7D58 6BE4 DBEE 6514
Algorithm: u3_st_i.fia [DCT4 ALGORITHM] version: 4.76.0 revision: 0.7 size: 0x4C30
Supported Ids: 3040, 2292, 2293, 3162, 3166, 3168
Performing Flash Authentication ...OK
UEM ID: 0041589B:2984DA60
Area [01380000-013AFFFF] erased in 3.796 s
Flash programming ...
Programming completed in 1.109 s
Extracting Content Pack, File Server fake reply for CUI phone.
Content Pack extracted successfully in 0.047 s
File Processed in 24.515 s
Processing file: rh105_04.00ia as PPM
[DCT4,DCT4 ALGORITHM] size: 1.17 MB
Supported Ids: 2292
ASIC ID: 0x2292 [UPPCosto ver: 1.3]
SecondaryBoot: u3_2nd.fia [DCT4] version: 4.76.0 revision: 0.7 size: 0x9A8
Supported Ids: 3040, 2292, 2293, 3162, 3166, 3168
FlashID0: 0020 8828 [ST 58WR032FU,32 Mbits] page size: 64 K type: NOR area: 01000000-013FFFFF
FlashID1: 0000 0001 [unused/removed]
ExtBUSC: AD7E B61A 1BBE 0BE2 7D58 6BE4 DBEE 6514
Algorithm: u3_st_i.fia [DCT4 ALGORITHM] version: 4.76.0 revision: 0.7 size: 0x4C30
Supported Ids: 3040, 2292, 2293, 3162, 3166, 3168
Performing Flash Authentication ...OK
UEM ID: 0041589B:2984DA60
Area [01240000-0124FFFF] erased in 1.266 s
Area [01250000-0137FFFF] erased in 23.891 s
Flash programming ...
Programming completed in 7.453 s
File Processed in 44.688 s
Flashing completed in 3 min 11.750 s

After Flash Processing ...

PhoneType:RH-105
SwVersion: V 4.00 19-10-07 RH-105 (c) NMP
MCU file: rh105_04.000
Trying to find patch position ...OK, case id: 3

ASIC ID: 0x2292 [UPPCosto ver: 1.3]
SecondaryBoot: u3_2nd.fia [DCT4] version: 4.76.0 revision: 0.7 size: 0x9A8
Supported Ids: 3040, 2292, 2293, 3162, 3166, 3168
FlashID0: 0020 8828 [ST 58WR032FU,32 Mbits] page size: 64 K type: NOR area: 01000000-013FFFFF
FlashID1: 0000 0001 [unused/removed]
ExtBUSC: AD7E B61A 1BBE 0BE2 7D58 6BE4 DBEE 6514
Algorithm: u3_st_i.fia [DCT4 ALGORITHM] version: 4.76.0 revision: 0.7 size: 0x4C30
Supported Ids: 3040, 2292, 2293, 3162, 3166, 3168
Performing Flash Authentication ...OK
UEM ID: 0041589B:2984DA60
Area [01000000-0101FFFF] erased in 2.547 s
Area [01140000-0115FFFF] erased in 2.532 s
Programming ...
Programming completed.
Updating SIMLOCK ...OK
Completed in 29.797 s


Phone Type: RH-105
SW Version: V 4.00 19-10-07 RH-105 (c) NMP
Imei plain: 35320803557191-0
Product Code: 0568772
Cellular System: GSM
ASIC ID: 0x2292, type: 11
Ppm Id: IA
Language Pack:
- not available.


Imei net: 35320803557191
Provider: ALL Operator, Country: -
Counter: 0/3, 0/10

CONFIG_DATA: 0010100000000000
PROFILE_BITS: 800000000001000B

BLOCK 1: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 2: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 3: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 4: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 5: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 6: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 7: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
Total time to process is 3 min 50.031 s
 

JannatLui

Well-known Member
Joined
Sep 1, 2010
Posts
2,836
Likes
14
answer: [MXKEY - INFO] Successfully Unlocked/repaired Phones By MXKey

3110c repaired successfully

Version from phone: 07.21
Version from file: 07.21
Using device: UFS_USB V2.8 (c) SarasSoft 2007.
Library version: 1.0.0.10913, Date: 05-11-2009
RAP Data :
SYSTEM ASIC ID: 000000010000022600010006010C192101001101 [RAPGSM ver: 1.1]
EM1 ID: 00000232
EM2 ID: 00000353
PUBLIC ID: 2BC0011589467E56A93A0D998E01533D426053CE
ASIC MODE ID: 00
ROOT KEY HASH: BAF3A9C3DBFA8454937DB77F2B8852B1
ROM ID: 191EC665DFAAF68F
SecondaryBoot: rap3gv3_2nd.fg [BB5] version: 1.30.0 revision: 0.0 size: 0x3C00
Supported RAP Ids: 0103192101003000, 010C192101003000, 0103192101013000, 010C192101013000, 0103192101003100, 010C192101003100, 0303192101023000, 030C192101023000, 0303192101033000, 030C192101033000, 0103192101001101, 010C192101001101, 0003192101001002, 000C192101001002, 0013192101001002, 001C192101001002
FlashID0: 0089 8981 - 0000 0000 [Intel NU48F256,256 Mbits] type: NOR,RAP
ExtBUSC: 0000 0000 0000 0000 0000 0000 0000 0000
ExtDEVC: FFFF 0000 - 0000 0000
Algorithm: RAP3Gv3_algo_131.fg [BB5 ALGORITHM] version: 1.31.0 revision: 0.0 size: 0x297E0
Supported RAP Ids: 0103192101003000, 010C192101003000, 0103192101013000, 010C192101013000, 0103192101003100, 010C192101003100, 0303192101023000, 030C192101023000, 0303192101033000, 030C192101033000, 0003192101002000, 000C192101002000, 0003192101002100, 000C192101002100, 0003192101002200, 000C192101002200, 0003192101012200, 000C192101012200, 0103192101001101, 010C192101001101, 0003192101001002, 000C192101001002, 0013192101001002, 001C192101001002
RAP PAPUBKEYS HASH: C0E691EA16A7593A9BB28832D7312A39F7ED668D
Reading RAP NPC (0x168 bytes).
Reading RAP VARIANT (0x0 bytes).
Reading RAP CCC (0x160 bytes).
Reading RAP HWC (0xD4 bytes).
Flash Imei: 35196303066434
NPC_DATA saved OK
CCC_DATA saved OK
HWC_DATA saved OK
WMDRM_PD_DATA saved OK
RF_DATA saved OK
WARRANTY_DATA saved OK
PROD_DATA saved OK
BT_DATA saved OK
LOCK_DATA saved OK
BB_DATA saved OK
RPL saved to *quot;C:\mobileEx\3.2\data\backup\RPL\BB5_351963030 6643 4_BACK.rpl*quot;
Processing file: rm237__07.21.mcusw as MCU
[BB5,BB5 ALGORITHM] size: 14.48 MB
Supported RAP Ids: 0103192101001101, 010C192101001101
RAP Data :
SYSTEM ASIC ID: 000000010000022600010006010C192101001101 [RAPGSM ver: 1.1]
EM1 ID: 00000232
EM2 ID: 00000353
PUBLIC ID: 2BC0011589467E56A93A0D998E01533D426053CE
ASIC MODE ID: 00
ROOT KEY HASH: BAF3A9C3DBFA8454937DB77F2B8852B1
ROM ID: 191EC665DFAAF68F
SecondaryBoot: rap3gv3_2nd.fg [BB5] version: 1.30.0 revision: 0.0 size: 0x3C00
Supported RAP Ids: 0103192101003000, 010C192101003000, 0103192101013000, 010C192101013000, 0103192101003100, 010C192101003100, 0303192101023000, 030C192101023000, 0303192101033000, 030C192101033000, 0103192101001101, 010C192101001101, 0003192101001002, 000C192101001002, 0013192101001002, 001C192101001002
FlashID0: 0089 8981 - 0000 0000 [Intel NU48F256,256 Mbits] type: NOR,RAP
ExtBUSC: 0000 0000 0000 0000 0000 0000 0000 0000
ExtDEVC: FFFF 0000 - 0000 0000
Algorithm: RAP3Gv3_algo_131.fg [BB5 ALGORITHM] version: 1.31.0 revision: 0.0 size: 0x297E0
Supported RAP Ids: 0103192101003000, 010C192101003000, 0103192101013000, 010C192101013000, 0103192101003100, 010C192101003100, 0303192101023000, 030C192101023000, 0303192101033000, 030C192101033000, 0003192101002000, 000C192101002000, 0003192101002100, 000C192101002100, 0003192101002200, 000C192101002200, 0003192101012200, 000C192101012200, 0103192101001101, 010C192101001101, 0003192101001002, 000C192101001002, 0013192101001002, 001C192101001002
RAP PAPUBKEYS HASH: C0E691EA16A7593A9BB28832D7312A39F7ED668D
Total erase size: 16.37 MB
CMT NOR area [00000000-000006BF] erased in 0.562 s
CMT NOR area [000006C0-0001FFFF] erased in 0.063 s
CMT NOR area [00020000-0007FFFF] erased in 1.734 s
CMT NOR area [00080000-000DFFFF] erased in 0.125 s
CMT NOR area [00100000-001FFFFF] erased in 0.266 s
CMT NOR area [00200000-0031FFFF] erased in 5.344 s
CMT NOR area [00320000-0105FFFF] erased in 58.578 s
CMT NOR area [01060000-01067FFF] erased in 0.594 s
CMT NOR area [01068000-0107FFFF] erased in 0.063 s
Flash programming ...
Valid PAPUB key found.
CMT PAPUBKEYS: C0E691EA16A7593A9BB28832D7312A39F7ED668D (RAP Certificate 66 v2) written.
Programming completed in 1 min 35.844 s
Processing file: rm237__07.21.ppm_mr as PPM
[BB5,BB5 ALGORITHM] size: 3.55 MB
Supported RAP Ids: 0103192101001101, 010C192101001101
RAP Data :
SYSTEM ASIC ID: 000000010000022600010006010C192101001101 [RAPGSM ver: 1.1]
EM1 ID: 00000232
EM2 ID: 00000353
PUBLIC ID: 2BC0011589467E56A93A0D998E01533D426053CE
ASIC MODE ID: 00
ROOT KEY HASH: BAF3A9C3DBFA8454937DB77F2B8852B1
ROM ID: 191EC665DFAAF68F
SecondaryBoot: rap3gv3_2nd.fg [BB5] version: 1.30.0 revision: 0.0 size: 0x3C00
Supported RAP Ids: 0103192101003000, 010C192101003000, 0103192101013000, 010C192101013000, 0103192101003100, 010C192101003100, 0303192101023000, 030C192101023000, 0303192101033000, 030C192101033000, 0103192101001101, 010C192101001101, 0003192101001002, 000C192101001002, 0013192101001002, 001C192101001002
FlashID0: 0089 8981 - 0000 0000 [Intel NU48F256,256 Mbits] type: NOR,RAP
ExtBUSC: 0000 0000 0000 0000 0000 0000 0000 0000
ExtDEVC: FFFF 0000 - 0000 0000
Algorithm: RAP3Gv3_algo_131.fg [BB5 ALGORITHM] version: 1.31.0 revision: 0.0 size: 0x297E0
Supported RAP Ids: 0103192101003000, 010C192101003000, 0103192101013000, 010C192101013000, 0103192101003100, 010C192101003100, 0303192101023000, 030C192101023000, 0303192101033000, 030C192101033000, 0003192101002000, 000C192101002000, 0003192101002100, 000C192101002100, 0003192101002200, 000C192101002200, 0003192101012200, 000C192101012200, 0103192101001101, 010C192101001101, 0003192101001002, 000C192101001002, 0013192101001002, 001C192101001002
RAP PAPUBKEYS HASH: C0E691EA16A7593A9BB28832D7312A39F7ED668D
Total erase size: 4.62 MB
CMT NOR area [01080000-0151FFFF] erased in 16.625 s
Flash programming ...
Programming completed in 22.578 s
file rm237__07.21_sd_allmost_empty_512.fpsimage is empty, skipped.
Processing file: rm237__07.21.image_mr as CNT
[BB5,BB5 ALGORITHM] page size: 64 K size: 4.00 MB
Supported RAP Ids: 0103192101001101, 010C192101001101
NOR page size in the phone is 128 K.
Formating FS: FILE2 ...
RAP Data :
SYSTEM ASIC ID: 000000010000022600010006010C192101001101 [RAPGSM ver: 1.1]
EM1 ID: 00000232
EM2 ID: 00000353
PUBLIC ID: 2BC0011589467E56A93A0D998E01533D426053CE
ASIC MODE ID: 00
ROOT KEY HASH: BAF3A9C3DBFA8454937DB77F2B8852B1
ROM ID: 191EC665DFAAF68F
SecondaryBoot: rap3gv3_2nd.fg [BB5] version: 1.30.0 revision: 0.0 size: 0x3C00
Supported RAP Ids: 0103192101003000, 010C192101003000, 0103192101013000, 010C192101013000, 0103192101003100, 010C192101003100, 0303192101023000, 030C192101023000, 0303192101033000, 030C192101033000, 0103192101001101, 010C192101001101, 0003192101001002, 000C192101001002, 0013192101001002, 001C192101001002
FlashID0: 0089 8981 - 0000 0000 [Intel NU48F256,256 Mbits] type: NOR,RAP
ExtBUSC: 0000 0000 0000 0000 0000 0000 0000 0000
ExtDEVC: FFFF 0000 - 0000 0000
Algorithm: RAP3Gv3_algo_131.fg [BB5 ALGORITHM] version: 1.31.0 revision: 0.0 size: 0x297E0
Supported RAP Ids: 0103192101003000, 010C192101003000, 0103192101013000, 010C192101013000, 0103192101003100, 010C192101003100, 0303192101023000, 030C192101023000, 0303192101033000, 030C192101033000, 0003192101002000, 000C192101002000, 0003192101002100, 000C192101002100, 0003192101002200, 000C192101002200, 0003192101012200, 000C192101012200, 0103192101001101, 010C192101001101, 0003192101001002, 000C192101001002, 0013192101001002, 001C192101001002
RAP PAPUBKEYS HASH: C0E691EA16A7593A9BB28832D7312A39F7ED668D
Total erase size: 10.75 MB
CMT NOR area [01520000-01FDFFFF] erased in 1 min 1.656 s
Converting UCP blocks to 128 K.
Flash programming ...
Programming completed in 25.718 s
Flashing completed in 5 min 47.079 s


Phone Type: RM-237 (Nokia 3110c)
SW Version: V 07.21 05-11-08 RM-237 (c) Nokia.
Imei plain: 35196303066434-0
Product Code: 0566963
Language Pack:
- not available.

SIMLOCK seems to be valid
SUPERDONGLE_KEY seems to be valid
SIMLOCK_TEST passed
SECURITY_TEST passed


Imei net: 351963030664340
Version: SIMLOCK SERVER VERSION 63
Provider: Nokia Test, Country: Finland
Counter: 0/3, 0/10

CONFIG_DATA: 2440700000000000
PROFILE_BITS: 0000000000000000

BLOCK 1: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 2: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 3: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 4: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 5: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 6: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 7: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
Total time to process is 6 min 7.454 s
FULL FACTORY... OK
SOFTWARE UPGRADE... OK
Completed in 3.719 s
 

JannatLui

Well-known Member
Joined
Sep 1, 2010
Posts
2,836
Likes
14
answer: [MXKEY - INFO] Successfully Unlocked/repaired Phones By MXKey

Nokia 6280 unlock done

Imei net: 357603005327846
Version: SIMLOCK SERVER VERSION 63
Provider: Hutchinson 3G (3), Country: United Kingdom
Counter: 0/3, 0/10

CONFIG_DATA: 2342000000000000
PROFILE_BITS: 8000000000000006

BLOCK 1: 1=LOCKED (MCC+MNC): 23420F, DATA=23420F

Backup saved to *quot;BB5_357603005327846_SIMLOCK.back*quot;
Using device: UFS_USB V2.8 (c) SarasSoft 2007.
Library version: 1.0.0.10913, Date: 05-11-2009

ROOT KEY HASH: BAF3A9C3DBFA8454937DB77F2B8852B1
ROM ID: 273F6D55DFAAF68F

Sending SecondaryBoot(0x3D00 bytes) ...OK
Sending PreLoader(0x2E4 bytes) ...OK
Sending ROM(0x3948 bytes) ...OK
Sending CustomLoader(0x50B0 bytes) ...OK
Sending SecurityBlock(0x1000 bytes) ...OK
Sending SimlockBinary(0x3B0 bytes) ...OK
Calculating LOCK data ...OK
Receiving Unlocked PM, please WAIT ... OK
Writing Unlocked PM ... OK
Completed in 27.781 s
Restarting phone ...

Reading Simlock info ...
Imei net: 357603005327846
Version: SIMLOCK SERVER VERSION 63
Provider: Nokia Test, Country: Finland
Counter: 0/3, 0/10

CONFIG_DATA: 2440700000000000
PROFILE_BITS: 8000000000000006

BLOCK 1: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 2: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 3: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 4: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 5: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 6: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 7: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
 

JannatLui

Well-known Member
Joined
Sep 1, 2010
Posts
2,836
Likes
14
answer: [MXKEY - INFO] Successfully Unlocked/repaired Phones By MXKey

6133 unlocked successfully 6133 unlocked successfully by mx key.

Imei net: 3527360112xxxxx
Version: SIMLOCK SERVER VERSION 63
Provider: T-Mobile, Country: U.S.A.
Counter: 0/3, 0/10

CONFIG_DATA: 3102000000000000
PROFILE_BITS: 0000000000000000

BLOCK 1: 1=LOCKED (MCC+MNC): 20416F, DATA=20416F
BLOCK 2: 1=LOCKED (MCC+MNC): 21630F, DATA=21630F
BLOCK 3: 1=LOCKED (MCC+MNC): 21901F, DATA=21901F
BLOCK 4: 1=LOCKED (MCC+MNC): 23001F, DATA=23001F
BLOCK 5: 1=LOCKED (MCC+MNC): 23102F, DATA=23102F
BLOCK 6: 1=LOCKED (MCC+MNC): 23203F, DATA=23203F
BLOCK 7: 1=LOCKED (MCC+MNC): 23430F, DATA=23430F
BLOCK 8: 1=LOCKED (MCC+MNC): 25001F, DATA=25001F
BLOCK 9: 1=LOCKED (MCC+MNC): 25502F, DATA=25502F
BLOCK 10: 1=LOCKED (MCC+MNC): 26002F, DATA=26002F
BLOCK 11: 1=LOCKED (MCC+MNC): 26201F, DATA=26201F
BLOCK 12: 1=LOCKED (MCC+MNC): 310160, DATA=310160
BLOCK 13: 1=LOCKED (MCC+MNC): 310200, DATA=310200
BLOCK 14: 1=LOCKED (MCC+MNC): 310210, DATA=310210
BLOCK 15: 1=LOCKED (MCC+MNC): 310220, DATA=310220
BLOCK 16: 1=LOCKED (MCC+MNC): 310230, DATA=310230
BLOCK 17: 1=LOCKED (MCC+MNC): 310240, DATA=310240
BLOCK 18: 1=LOCKED (MCC+MNC): 310250, DATA=310250
BLOCK 19: 1=LOCKED (MCC+MNC): 310260, DATA=310260
BLOCK 20: 1=LOCKED (MCC+MNC): 310270, DATA=310270
BLOCK 21: 1=LOCKED (MCC+MNC): 310280, DATA=310280
BLOCK 22: 1=LOCKED (MCC+MNC): 310300, DATA=310300
BLOCK 23: 1=LOCKED (MCC+MNC): 310310, DATA=310310
BLOCK 24: 1=LOCKED (MCC+MNC): 310580, DATA=310580
BLOCK 25: 1=LOCKED (MCC+MNC): 310660, DATA=310660
BLOCK 26: 1=LOCKED (MCC+MNC): 310800, DATA=310800
BLOCK 27: 1=LOCKED (MCC+MNC): 20416F, DATA=20416F
BLOCK 28: 1=LOCKED (MCC+MNC): 21630F, DATA=21630F
BLOCK 29: 1=LOCKED (MCC+MNC): 21901F, DATA=21901F
BLOCK 30: 1=LOCKED (MCC+MNC): 23001F, DATA=23001F
BLOCK 31: 1=LOCKED (MCC+MNC): 23102F, DATA=23102F
BLOCK 32: 1=LOCKED (MCC+MNC): 23203F, DATA=23203F
BLOCK 33: 1=LOCKED (MCC+MNC): 23430F, DATA=23430F
BLOCK 34: 1=LOCKED (MCC+MNC): 25001F, DATA=25001F
BLOCK 35: 1=LOCKED (MCC+MNC): 25502F, DATA=25502F
BLOCK 36: 1=LOCKED (MCC+MNC): 26002F, DATA=26002F
BLOCK 37: 1=LOCKED (MCC+MNC): 26201F, DATA=26201F
BLOCK 38: 1=LOCKED (MCC+MNC): 310160, DATA=310160
BLOCK 39: 1=LOCKED (MCC+MNC): 310200, DATA=310200
BLOCK 40: 1=LOCKED (MCC+MNC): 310210, DATA=310210
BLOCK 41: 1=LOCKED (MCC+MNC): 310220, DATA=310220
BLOCK 42: 1=LOCKED (MCC+MNC): 310230, DATA=310230
BLOCK 43: 1=LOCKED (MCC+MNC): 310240, DATA=310240
BLOCK 44: 1=LOCKED (MCC+MNC): 310250, DATA=310250
BLOCK 45: 1=LOCKED (MCC+MNC): 310260, DATA=310260
BLOCK 46: 1=LOCKED (MCC+MNC): 310270, DATA=310270
BLOCK 47: 1=LOCKED (MCC+MNC): 310280, DATA=310280
BLOCK 48: 1=LOCKED (MCC+MNC): 310300, DATA=310300
BLOCK 49: 1=LOCKED (MCC+MNC): 310310, DATA=310310
BLOCK 50: 1=LOCKED (MCC+MNC): 310580, DATA=310580
BLOCK 51: 1=LOCKED (MCC+MNC): 310660, DATA=310660
BLOCK 52: 1=LOCKED (MCC+MNC): 310800, DATA=310800

Backup saved to *quot;BB5_3527360112xxxxx_SIMLOCK.back*quot;
Using device: UFS_USB V2.8 (c) SarasSoft 2007.
Library version: 1.0.0.10913, Date: 05-11-2009

ROOT KEY HASH: BAF3A9C3DBFA8454937DB77F2B8852B1
ROM ID: 191EC665DFAAF68F

Sending SecondaryBoot(0x3D00 bytes) ...OK
Sending PreLoader(0x2E4 bytes) ...OK
Sending ROM(0x3948 bytes) ...OK
Sending CustomLoader(0x50B0 bytes) ...OK
Sending SecurityBlock(0x2000 bytes) ...OK
Sending SimlockBinary(0x3B0 bytes) ...OK
Calculating LOCK data ...OK
Receiving Unlocked PM, please WAIT ... OK
Writing Unlocked PM ... OK
Completed in 29.329 s
Restarting phone ...

Reading Simlock info ...
Imei net: 352736011xxxxx
Version: SIMLOCK SERVER VERSION 63
Provider: Nokia Test, Country: Finland
Counter: 0/3, 0/10

CONFIG_DATA: 2440700000000000
PROFILE_BITS: 0000000000000000

BLOCK 1: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 2: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 3: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 4: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 5: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 6: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
 
Top