JannatLui

Well-known Member
Joined
Sep 1, 2010
Posts
2,836
Likes
14
answer: [MXKEY - INFO] Successfully Unlocked/repaired Phones By MXKey

E71 Locked to 3G Unlocked Successfully

Imei net: 354208038415478
Version: SIMLOCK SERVER
Provider: Hutchinson 3G (3), Country: United Kingdom
Counter: 0/3, 0/10

CONFIG_DATA: 2342000000000000
PROFILE_BITS: 8000000000000000

BLOCK 1: 1=LOCKED (MCC+MNC): 23420F, DATA=23420F
BLOCK 2: 1=LOCKED (MCC+MNC): 23595F, DATA=23595F

Backup saved to "BB5_354208038415478_SIMLOCK.back"
Using device: J.A.F, FW ver: 01.B0
Library version: 1.0.0.10913, Date: 05-11-2009

ROOT KEY HASH: CAEEBB65D3C48E6DC73B49DC5063A2EE
ROM ID: 4B9B75103E691FF8

Sending SecondaryBoot(0x3AC0 bytes) ...OK
Sending PreLoader(0x2E4 bytes) ...OK
Sending ROM(0x11C4 bytes) ...OK
Sending SecurityBlock(0x2000 bytes) ...OK
Sending SimlockBinary(0x190 bytes) ...OK
Sending Certificate(0x1930 bytes) ...OK
Calculating LOCK data ...Writing Unlocked PM ... OK
Completed in 15.235 s
Restarting phone ...

Reading Simlock info ...
Imei net: 354208038415478
Version: SIMLOCK SERVER
Provider: ALL Operator, Country: -
Counter: 0/3, 0/10

CONFIG_DATA: 0010100000000000
PROFILE_BITS: 8000000000000000

BLOCK 1: 1=OPEN, DATA=00101F
 

JannatLui

Well-known Member
Joined
Sep 1, 2010
Posts
2,836
Likes
14
answer: [MXKEY - INFO] Successfully Unlocked/repaired Phones By MXKey

6555 unlock.


Imei net: 356271012224926
Version: SIMLOCK SERVER
Provider: CINGULAR - Pacific Bell Wireless, Country: U.S.A.
Counter: 0/3, 0/10

CONFIG_DATA: 3101700000000000
PROFILE_BITS: 8000000000000000

BLOCK 1: 1=LOCKED (MCC+MNC): 310150, DATA=310150
BLOCK 2: 1=LOCKED (MCC+MNC): 310170, DATA=310170
BLOCK 3: 1=LOCKED (MCC+MNC): 311180, DATA=311180
BLOCK 4: 1=LOCKED (MCC+MNC): 310410, DATA=310410
BLOCK 5: 1=LOCKED (MCC+MNC): 310980, DATA=310980

Backup saved to "BB5_356271012224926_SIMLOCK.back"
Using device: UFS_USB V2.8 (c) SarasSoft 2007.
Library version: 1.0.0.10912, Date: 05-11-2009

ROOT KEY HASH: BAF3A9C3DBFA8454937DB77F2B8852B1
ROM ID: 273F6D55DFAAF68F

Sending SecondaryBoot(0x3C00 bytes) ...OK
Sending PreLoader(0x2E4 bytes) ...OK
Sending ROM(0x11BC bytes) ...OK
Sending SecurityBlock(0x2000 bytes) ...OK
Sending SimlockBinary(0x190 bytes) ...OK
Sending Certificate(0x1940 bytes) ...OK
Calculating LOCK data ...Writing Unlocked PM ... OK
Completed in 23.484 s
Restarting phone ...

Reading Simlock info ...
Imei net: 356271012224926
Version: SIMLOCK SERVER
Provider: ALL Operator, Country: -
Counter: 0/3, 0/10

CONFIG_DATA: 0010100000000000
PROFILE_BITS: 8000000000000000

BLOCK 1: 1=OPEN, DATA=00101F
 

JannatLui

Well-known Member
Joined
Sep 1, 2010
Posts
2,836
Likes
14
answer: [MXKEY - INFO] Successfully Unlocked/repaired Phones By MXKey

112 repaired

Using device: J.A.F, FW ver: 01.B1
ASIC ID: 0x2201 [UPP_2M ver: 2]
SecondaryBoot: u_2nd.fia [DCT4] version: 4.70.1 revision: 0.7 size: 0x9A0
Supported Ids: 0011, 0010, 0121, 0120, 1120, 1131, 1130, 2141, 2140, 2142, 2151, 1141, 1181, 1015, 1021, 2031, 2030, 3041, 1201, 2201, 2291, 3161, 3160, 3164
FlashID0: 0001 2A7E [AMD S29NS032J,32 Mbits] page size: 64 K type: NOR area: 01000000-013FFFFF
FlashID1: 0000 0001 [unused/removed]
ExtBUSC: AD7E B61A 1BBE 0BE2 7D58 6BE4 DBEE 6514
Algorithm: u_amd.fia [DCT4 ALGORITHM] version: 4.70.1 revision: 0.7 size: 0x7518
Supported Ids: 0011, 0010, 0121, 0120, 1120, 1131, 1130, 2141, 2140, 2142, 2151, 1141, 1181, 1015, 1021, 2031, 2030, 3041, 1201, 2201, 2291, 3161, 3160, 3164
Performing Flash Authentication ...OK
UEM ID: 00870A4A:2984DA60
ASIC type: 2
UEM Imei: 35806701987049
Flash Imei: 35806701987049
RPL saved to "C:\mobileEx\3.2\data\backup\RPL\35806701987049_BA CK.rpl"
Processing file: rh93_07.020 as MCU
[DCT4,DCT4 ALGORITHM] size: 1.89 MB
Supported Ids: 0120, 0121, 1021, 1120, 1130, 1131, 1201, 2140, 2142, 2201, 2031, 2030, 2032, 2033
ASIC ID: 0x2201 [UPP_2M ver: 2]
SecondaryBoot: u_2nd.fia [DCT4] version: 4.70.1 revision: 0.7 size: 0x9A0
Supported Ids: 0011, 0010, 0121, 0120, 1120, 1131, 1130, 2141, 2140, 2142, 2151, 1141, 1181, 1015, 1021, 2031, 2030, 3041, 1201, 2201, 2291, 3161, 3160, 3164
FlashID0: 0001 2A7E [AMD S29NS032J,32 Mbits] page size: 64 K type: NOR area: 01000000-013FFFFF
FlashID1: 0000 0001 [unused/removed]
ExtBUSC: AD7E B61A 1BBE 0BE2 7D58 6BE4 DBEE 6514
Algorithm: u_amd.fia [DCT4 ALGORITHM] version: 4.70.1 revision: 0.7 size: 0x7518
Supported Ids: 0011, 0010, 0121, 0120, 1120, 1131, 1130, 2141, 2140, 2142, 2151, 1141, 1181, 1015, 1021, 2031, 2030, 3041, 1201, 2201, 2291, 3161, 3160, 3164
Performing Flash Authentication ...OK
UEM ID: 00870A4A:2984DA60
Area [01000000-0100FFFF] erased in 0.437 s
Area [01010000-013BFFFF] erased in 25.297 s
Area [013C0000-013EFFFF] erased in 1.266 s
Area [017C0000-017EFFFF] erased in 0.062 s
Area [01FC0000-01FEFFFF] erased in 0.063 s
Flash programming ...
Programming completed in 13.750 s
File Processed in 58.609 s
Processing file: rh930_nai7.02ia as CNT
[DCT4,DCT4 ALGORITHM] size: 159.09 KB
Supported Ids: 0120, 0121, 1021, 1120, 1130, 1131, 1201, 2140, 2142, 2201, 2031, 2030, 2032, 2033
ASIC ID: 0x2201 [UPP_2M ver: 2]
SecondaryBoot: u_2nd.fia [DCT4] version: 4.70.1 revision: 0.7 size: 0x9A0
Supported Ids: 0011, 0010, 0121, 0120, 1120, 1131, 1130, 2141, 2140, 2142, 2151, 1141, 1181, 1015, 1021, 2031, 2030, 3041, 1201, 2201, 2291, 3161, 3160, 3164
FlashID0: 0001 2A7E [AMD S29NS032J,32 Mbits] page size: 64 K type: NOR area: 01000000-013FFFFF
FlashID1: 0000 0001 [unused/removed]
ExtBUSC: AD7E B61A 1BBE 0BE2 7D58 6BE4 DBEE 6514
Algorithm: u_amd.fia [DCT4 ALGORITHM] version: 4.70.1 revision: 0.7 size: 0x7518
Supported Ids: 0011, 0010, 0121, 0120, 1120, 1131, 1130, 2141, 2140, 2142, 2151, 1141, 1181, 1015, 1021, 2031, 2030, 3041, 1201, 2201, 2291, 3161, 3160, 3164
Performing Flash Authentication ...OK
UEM ID: 00870A4A:2984DA60
Area [01380000-013BFFFF] erased in 1.734 s
Flash programming ...
Programming completed in 1.235 s
Extracting Content Pack, File Server fake reply for CUI phone.
Content Pack extracted successfully in 0.047 s
File Processed in 26.532 s
Processing file: rh93_07.02ia as PPM
[DCT4,DCT4 ALGORITHM] size: 1.28 MB
Supported Ids: 0120, 0121, 1021, 1120, 1130, 1131, 1201, 2140, 2142, 2201, 2031, 2030, 2032, 2033
ASIC ID: 0x2201 [UPP_2M ver: 2]
SecondaryBoot: u_2nd.fia [DCT4] version: 4.70.1 revision: 0.7 size: 0x9A0
Supported Ids: 0011, 0010, 0121, 0120, 1120, 1131, 1130, 2141, 2140, 2142, 2151, 1141, 1181, 1015, 1021, 2031, 2030, 3041, 1201, 2201, 2291, 3161, 3160, 3164
FlashID0: 0001 2A7E [AMD S29NS032J,32 Mbits] page size: 64 K type: NOR area: 01000000-013FFFFF
FlashID1: 0000 0001 [unused/removed]
ExtBUSC: AD7E B61A 1BBE 0BE2 7D58 6BE4 DBEE 6514
Algorithm: u_amd.fia [DCT4 ALGORITHM] version: 4.70.1 revision: 0.7 size: 0x7518
Supported Ids: 0011, 0010, 0121, 0120, 1120, 1131, 1130, 2141, 2140, 2142, 2151, 1141, 1181, 1015, 1021, 2031, 2030, 3041, 1201, 2201, 2291, 3161, 3160, 3164
Performing Flash Authentication ...OK
UEM ID: 00870A4A:2984DA60
Area [011E0000-011EFFFF] erased in 0.438 s
Area [011F0000-0137FFFF] erased in 10.687 s
Flash programming ...
Programming completed in 9.282 s
File Processed in 36.140 s
Flashing completed in 2 min 42.328 s


Phone Type: RH-93
SW Version: V 7.02 10-12-07 RH-93 (c) NMP
Imei plain: 35806701987049-9
Product Code: 0533135
Cellular System: GSM
ASIC ID: 0x2201, type: 2
Ppm Id: IA
Language Pack:
English,Arabic,Farsi,French,Urdu


Imei net: 35806701987049
Provider: ALL Operator, Country: -
Counter: 0/3, 0/10

CONFIG_DATA: 0010100000000000
PROFILE_BITS: 0000000000010002

BLOCK 1: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 2: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 3: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 4: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 5: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 6: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 7: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
Total time to process is 2 min 50.985 s
 

JannatLui

Well-known Member
Joined
Sep 1, 2010
Posts
2,836
Likes
14
answer: [MXKEY - INFO] Successfully Unlocked/repaired Phones By MXKey

unlock done E71
Imei: 354208036687920
Version: SIMLOCK SERVER
Provider: Hutchinson 3G (3), Country: United Kingdom
Counter: 0/3, 0/10

CONFIG_DATA: 2342000000000000
PROFILE_BITS: 8000000000000000

BLOCK 1: 1=LOCKED (MCC+MNC): 23420F, DATA=23420F
BLOCK 2: 1=LOCKED (MCC+MNC): 23595F, DATA=23595F

Backup saved to "BB5_354208036687920_SIMLOCK.back"
Using device: J.A.F, FW ver: 01.B1

ROOT KEY HASH: CAEEBB65D3C48E6DC73B49DC5063A2EE
ROM ID: 4B9B75103E691FF8

Sending SecondaryBoot(0x3AC0 bytes) ...OK
Sending PreLoader(0x2E4 bytes) ...OK
Sending ROM(0x11C4 bytes) ...OK
Sending SecurityBlock(0x2000 bytes) ...OK
Sending SimlockBinary(0x190 bytes) ...OK
Sending Certificate(0x1930 bytes) ...OK
Calculating LOCK data ...Writing Unlocked PM ... OK
Completed in 14.859 s
Restarting phone ...

Reading Simlock info ...
Imei: 354208036687920
Version: SIMLOCK SERVER
Provider: ALL Operator, Country: -
Counter: 0/3, 0/10

CONFIG_DATA: 0010100000000000
PROFILE_BITS: 8000000000000000

BLOCK 1: 1=OPEN, DATA=00101F
 

JannatLui

Well-known Member
Joined
Sep 1, 2010
Posts
2,836
Likes
14
answer: [MXKEY - INFO] Successfully Unlocked/repaired Phones By MXKey

2330c unlock done mx key great team
Imei net: 35798303880427
Provider: Orange, Country: United Kingdom
Counter: 0/3, 0/10

CONFIG_DATA: 2343300000000000
PROFILE_BITS: 800000000003000B

BLOCK 1: 1.LOCKED (MCC+MNC): 23433F
BLOCK 2: 1.LOCKED (MCC+MNC): 23486F

PhoneType:RM-512
SwVersion: V 08.20 30-06-09 RM-512 (c) Nokia
MCU file: rm512__08.20.mcusw
Trying to find patch position ...OK


ASIC ID: 0x3168 [UPP_8M ver: 6.4]
SecondaryBoot: u3_2nd.fia [DCT4] version: 4.76.0 revision: 0.7 size: 0x9A8
Supported Ids: 3040, 2292, 2293, 3162, 3166, 3168
FlashID0: 0089 8981 [Intel NU48F256,256 Mbits] page size: 128 K type: NOR area: 01000000-02FFFFFF - COMBO FLASH
ExtBUSC: AD7E B61B 2310 0340 C605 E401 20A2 0000
Algorithm: u3_intel.fia [DCT4 ALGORITHM] version: 4.76.0 revision: 0.7 size: 0x56A0
Supported Ids: 3040, 2292, 2293, 3162, 3166, 3168
Performing Flash Authentication ...OK
UEM ID: 00D68407:3B8ADA60
Area [01000000-0101FFFF] erased in 0.938 s
Area [01220000-0123FFFF] erased in 0.671 s
Area [01440000-0145FFFF] erased in 0.797 s
Area [014C0000-014DFFFF] erased in 0.734 s
Area [01CE0000-01CFFFFF] erased in 0.016 s
Programming ...
Programming completed.
Updating SIMLOCK ...OK
Completed in 1 min 17.281 s

Reading Simlock info ...
Imei net: 35798303880427
Provider: ALL Operator, Country: -
Counter: 0/3, 0/10

CONFIG_DATA: 0010100000000000
PROFILE_BITS: 800000000003000B

BLOCK 1: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 2: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 3: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 4: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 5: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 6: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 7: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
 

JannatLui

Well-known Member
Joined
Sep 1, 2010
Posts
2,836
Likes
14
answer: [MXKEY - INFO] Successfully Unlocked/repaired Phones By MXKey

Imei net: 35822703767061
Provider: Swisscom NATEL, Country: Switzerland
Counter: 0/3, 0/10

CONFIG_DATA: 2280100000000000
PROFILE_BITS: 800000000003000B

BLOCK 1: 1.LOCKED (MCC+MNC): 22801F

PhoneType:RM-512
SwVersion: V 08.20 30-06-09 RM-512 (c) Nokia
MCU file: rm512__08.20.mcusw
Trying to find patch position ...OK


ASIC ID: 0x3168 [UPP_8M ver: 6.4]
SecondaryBoot: u3_2nd.fia [DCT4] version: 4.76.0 revision: 0.7 size: 0x9A8
Supported Ids: 3040, 2292, 2293, 3162, 3166, 3168
FlashID0: 0089 8981 [Intel NU48F256,256 Mbits] page size: 128 K type: NOR area: 01000000-02FFFFFF - COMBO FLASH
ExtBUSC: AD7E B61B 2310 0340 C605 E401 20A2 0000
Algorithm: u3_intel.fia [DCT4 ALGORITHM] version: 4.76.0 revision: 0.7 size: 0x56A0
Supported Ids: 3040, 2292, 2293, 3162, 3166, 3168
Performing Flash Authentication ...OK
UEM ID: 0093E278:3B8ADA60
Area [01000000-0101FFFF] erased in 0.860 s
Area [01220000-0123FFFF] erased in 0.781 s
Area [01440000-0145FFFF] erased in 0.750 s
Area [014C0000-014DFFFF] erased in 0.703 s
Area [01CE0000-01CFFFFF] erased in 0.016 s
Programming ...
Programming completed.
Updating SIMLOCK ...OK
Completed in 1 min 19.500 s

Reading Simlock info ...
Imei net: 35822703767061
Provider: ALL Operator, Country: -
Counter: 0/3, 0/10

CONFIG_DATA: 0010100000000000
PROFILE_BITS: 800000000003000B

BLOCK 1: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 2: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 3: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 4: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 5: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 6: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 7: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
 

JannatLui

Well-known Member
Joined
Sep 1, 2010
Posts
2,836
Likes
14
answer: [MXKEY - INFO] Successfully Unlocked/repaired Phones By MXKey

Using device: J.A.F, FW ver: 01.B1
Library version: 1.0.0.10913, Date: 05-11-2009
Processing file: rh105_04.000 as MCU
[DCT4,DCT4 ALGORITHM] size: 2.26 MB
Supported Ids: 2292
ASIC ID: 0x2292 [UPPCosto ver: 1.3]
SecondaryBoot: u3_2nd.fia [DCT4] version: 4.76.0 revision: 0.7 size: 0x9A8
Supported Ids: 3040, 2292, 2293, 3162, 3166, 3168
FlashID0: 0020 8828 [ST 58WR032FU,32 Mbits] page size: 64 K type: NOR area: 01000000-013FFFFF
FlashID1: 0000 0001 [unused/removed]
ExtBUSC: AD7E B61A 1BBE 0BE2 7D58 6BE4 DBEE 6514
Algorithm: u3_st_i.fia [DCT4 ALGORITHM] version: 4.76.0 revision: 0.7 size: 0x4C30
Supported Ids: 3040, 2292, 2293, 3162, 3166, 3168
Performing Flash Authentication ...OK
UEM ID: 00DEBED3:2984DA60
Area [01000000-0100FFFF] erased in 1.188 s
Area [01010000-013AFFFF] erased in 1 min 8.484 s
Area [013B0000-013EFFFF] erased in 4.672 s
Area [017C0000-017EFFFF] erased in 0.062 s
Area [01FC0000-01FEFFFF] erased in 0.063 s
Flash programming ...
Programming completed in 15.079 s
File Processed in 1 min 41.640 s
Formating FS: FILE2 ...
Processing file: rh1050_nai4.00ia as CNT
[DCT4,DCT4 ALGORITHM] size: 159.99 KB
Supported Ids: 2292
ASIC ID: 0x2292 [UPPCosto ver: 1.3]
SecondaryBoot: u3_2nd.fia [DCT4] version: 4.76.0 revision: 0.7 size: 0x9A8
Supported Ids: 3040, 2292, 2293, 3162, 3166, 3168
FlashID0: 0020 8828 [ST 58WR032FU,32 Mbits] page size: 64 K type: NOR area: 01000000-013FFFFF
FlashID1: 0000 0001 [unused/removed]
ExtBUSC: AD7E B61A 1BBE 0BE2 7D58 6BE4 DBEE 6514
Algorithm: u3_st_i.fia [DCT4 ALGORITHM] version: 4.76.0 revision: 0.7 size: 0x4C30
Supported Ids: 3040, 2292, 2293, 3162, 3166, 3168
Performing Flash Authentication ...OK
UEM ID: 00DEBED3:2984DA60
Area [01380000-013AFFFF] erased in 3.547 s
Flash programming ...
Programming completed in 1.156 s
Extracting Content Pack, File Server fake reply for CUI phone.
Content Pack extracted successfully in 0.031 s
File Processed in 24.125 s
Processing file: rh105_04.00ia as PPM
[DCT4,DCT4 ALGORITHM] size: 1.17 MB
Supported Ids: 2292
ASIC ID: 0x2292 [UPPCosto ver: 1.3]
SecondaryBoot: u3_2nd.fia [DCT4] version: 4.76.0 revision: 0.7 size: 0x9A8
Supported Ids: 3040, 2292, 2293, 3162, 3166, 3168
FlashID0: 0020 8828 [ST 58WR032FU,32 Mbits] page size: 64 K type: NOR area: 01000000-013FFFFF
FlashID1: 0000 0001 [unused/removed]
ExtBUSC: AD7E B61A 1BBE 0BE2 7D58 6BE4 DBEE 6514
Algorithm: u3_st_i.fia [DCT4 ALGORITHM] version: 4.76.0 revision: 0.7 size: 0x4C30
Supported Ids: 3040, 2292, 2293, 3162, 3166, 3168
Performing Flash Authentication ...OK
UEM ID: 00DEBED3:2984DA60
Area [01240000-0124FFFF] erased in 1.563 s
Area [01250000-0137FFFF] erased in 22.500 s
Flash programming ...
Programming completed in 8.282 s
File Processed in 44.437 s
Flashing completed in 3 min 7.593 s

After Flash Processing ...

PhoneType:RH-105
SwVersion: V 4.00 19-10-07 RH-105 (c) NMP
MCU file: rh105_04.000
Trying to find patch position ...OK, case id: 3

ASIC ID: 0x2292 [UPPCosto ver: 1.3]
SecondaryBoot: u3_2nd.fia [DCT4] version: 4.76.0 revision: 0.7 size: 0x9A8
Supported Ids: 3040, 2292, 2293, 3162, 3166, 3168
FlashID0: 0020 8828 [ST 58WR032FU,32 Mbits] page size: 64 K type: NOR area: 01000000-013FFFFF
FlashID1: 0000 0001 [unused/removed]
ExtBUSC: AD7E B61A 1BBE 0BE2 7D58 6BE4 DBEE 6514
Algorithm: u3_st_i.fia [DCT4 ALGORITHM] version: 4.76.0 revision: 0.7 size: 0x4C30
Supported Ids: 3040, 2292, 2293, 3162, 3166, 3168
Performing Flash Authentication ...OK
UEM ID: 00DEBED3:2984DA60
Area [01000000-0101FFFF] erased in 2.344 s
Area [01140000-0115FFFF] erased in 2.359 s
Programming ...
Programming completed.
Updating SIMLOCK ...OK
Completed in 29.532 s


Phone Type: RH-105
SW Version: V 4.00 19-10-07 RH-105 (c) NMP
Imei plain: 35320803557209-0
Product Code: 0568772
Cellular System: GSM
ASIC ID: 0x2292, type: 11
Ppm Id: IA
Language Pack:
- not available.


Imei net: 35320803557209
Provider: ALL Operator, Country: -
Counter: 0/3, 0/10

CONFIG_DATA: 0010100000000000
PROFILE_BITS: 800000000001000B

BLOCK 1: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 2: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 3: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 4: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 5: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 6: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 7: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
Total time to process is 3 min 45.844 s
 

JannatLui

Well-known Member
Joined
Sep 1, 2010
Posts
2,836
Likes
14
answer: [MXKEY - INFO] Successfully Unlocked/repaired Phones By MXKey

Using device: J.A.F, FW ver: 01.B1
Library version: 1.0.0.10913, Date: 05-11-2009
Processing file: rh105_04.000 as MCU
[DCT4,DCT4 ALGORITHM] size: 2.26 MB
Supported Ids: 2292
ASIC ID: 0x2292 [UPPCosto ver: 1.3]
SecondaryBoot: u3_2nd.fia [DCT4] version: 4.76.0 revision: 0.7 size: 0x9A8
Supported Ids: 3040, 2292, 2293, 3162, 3166, 3168
FlashID0: 0020 8828 [ST 58WR032FU,32 Mbits] page size: 64 K type: NOR area: 01000000-013FFFFF
FlashID1: 0000 0001 [unused/removed]
ExtBUSC: AD7E B61A 1BBE 0BE2 7D58 6BE4 DBEE 6514
Algorithm: u3_st_i.fia [DCT4 ALGORITHM] version: 4.76.0 revision: 0.7 size: 0x4C30
Supported Ids: 3040, 2292, 2293, 3162, 3166, 3168
Performing Flash Authentication ...OK
UEM ID: 0041589B:2984DA60
Area [01000000-0100FFFF] erased in 1.265 s
Area [01010000-013AFFFF] erased in 1 min 12.938 s
Area [013B0000-013EFFFF] erased in 4.969 s
Area [017C0000-017EFFFF] erased in 0.015 s
Area [01FC0000-01FEFFFF] erased in 0.031 s
Flash programming ...
Programming completed in 14.219 s
File Processed in 1 min 45.281 s
Formating FS: FILE2 ...
Processing file: rh1050_nai4.00ia as CNT
[DCT4,DCT4 ALGORITHM] size: 159.99 KB
Supported Ids: 2292
ASIC ID: 0x2292 [UPPCosto ver: 1.3]
SecondaryBoot: u3_2nd.fia [DCT4] version: 4.76.0 revision: 0.7 size: 0x9A8
Supported Ids: 3040, 2292, 2293, 3162, 3166, 3168
FlashID0: 0020 8828 [ST 58WR032FU,32 Mbits] page size: 64 K type: NOR area: 01000000-013FFFFF
FlashID1: 0000 0001 [unused/removed]
ExtBUSC: AD7E B61A 1BBE 0BE2 7D58 6BE4 DBEE 6514
Algorithm: u3_st_i.fia [DCT4 ALGORITHM] version: 4.76.0 revision: 0.7 size: 0x4C30
Supported Ids: 3040, 2292, 2293, 3162, 3166, 3168
Performing Flash Authentication ...OK
UEM ID: 0041589B:2984DA60
Area [01380000-013AFFFF] erased in 3.796 s
Flash programming ...
Programming completed in 1.109 s
Extracting Content Pack, File Server fake reply for CUI phone.
Content Pack extracted successfully in 0.047 s
File Processed in 24.515 s
Processing file: rh105_04.00ia as PPM
[DCT4,DCT4 ALGORITHM] size: 1.17 MB
Supported Ids: 2292
ASIC ID: 0x2292 [UPPCosto ver: 1.3]
SecondaryBoot: u3_2nd.fia [DCT4] version: 4.76.0 revision: 0.7 size: 0x9A8
Supported Ids: 3040, 2292, 2293, 3162, 3166, 3168
FlashID0: 0020 8828 [ST 58WR032FU,32 Mbits] page size: 64 K type: NOR area: 01000000-013FFFFF
FlashID1: 0000 0001 [unused/removed]
ExtBUSC: AD7E B61A 1BBE 0BE2 7D58 6BE4 DBEE 6514
Algorithm: u3_st_i.fia [DCT4 ALGORITHM] version: 4.76.0 revision: 0.7 size: 0x4C30
Supported Ids: 3040, 2292, 2293, 3162, 3166, 3168
Performing Flash Authentication ...OK
UEM ID: 0041589B:2984DA60
Area [01240000-0124FFFF] erased in 1.266 s
Area [01250000-0137FFFF] erased in 23.891 s
Flash programming ...
Programming completed in 7.453 s
File Processed in 44.688 s
Flashing completed in 3 min 11.750 s

After Flash Processing ...

PhoneType:RH-105
SwVersion: V 4.00 19-10-07 RH-105 (c) NMP
MCU file: rh105_04.000
Trying to find patch position ...OK, case id: 3

ASIC ID: 0x2292 [UPPCosto ver: 1.3]
SecondaryBoot: u3_2nd.fia [DCT4] version: 4.76.0 revision: 0.7 size: 0x9A8
Supported Ids: 3040, 2292, 2293, 3162, 3166, 3168
FlashID0: 0020 8828 [ST 58WR032FU,32 Mbits] page size: 64 K type: NOR area: 01000000-013FFFFF
FlashID1: 0000 0001 [unused/removed]
ExtBUSC: AD7E B61A 1BBE 0BE2 7D58 6BE4 DBEE 6514
Algorithm: u3_st_i.fia [DCT4 ALGORITHM] version: 4.76.0 revision: 0.7 size: 0x4C30
Supported Ids: 3040, 2292, 2293, 3162, 3166, 3168
Performing Flash Authentication ...OK
UEM ID: 0041589B:2984DA60
Area [01000000-0101FFFF] erased in 2.547 s
Area [01140000-0115FFFF] erased in 2.532 s
Programming ...
Programming completed.
Updating SIMLOCK ...OK
Completed in 29.797 s


Phone Type: RH-105
SW Version: V 4.00 19-10-07 RH-105 (c) NMP
Imei plain: 35320803557191-0
Product Code: 0568772
Cellular System: GSM
ASIC ID: 0x2292, type: 11
Ppm Id: IA
Language Pack:
- not available.


Imei net: 35320803557191
Provider: ALL Operator, Country: -
Counter: 0/3, 0/10

CONFIG_DATA: 0010100000000000
PROFILE_BITS: 800000000001000B

BLOCK 1: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 2: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 3: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 4: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 5: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 6: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 7: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
Total time to process is 3 min 50.031 s
 

JannatLui

Well-known Member
Joined
Sep 1, 2010
Posts
2,836
Likes
14
answer: [MXKEY - INFO] Successfully Unlocked/repaired Phones By MXKey

Using device: J.A.F, FW ver: 01.B1
Library version: 1.0.0.10913, Date: 05-11-2009
Processing file: rh105_04.000 as MCU
[DCT4,DCT4 ALGORITHM] size: 2.26 MB
Supported Ids: 2292
ASIC ID: 0x2292 [UPPCosto ver: 1.3]
SecondaryBoot: u3_2nd.fia [DCT4] version: 4.76.0 revision: 0.7 size: 0x9A8
Supported Ids: 3040, 2292, 2293, 3162, 3166, 3168
FlashID0: 0020 8828 [ST 58WR032FU,32 Mbits] page size: 64 K type: NOR area: 01000000-013FFFFF
FlashID1: 0000 0001 [unused/removed]
ExtBUSC: AD7E B61A 1BBE 0BE2 7D58 6BE4 DBEE 6514
Algorithm: u3_st_i.fia [DCT4 ALGORITHM] version: 4.76.0 revision: 0.7 size: 0x4C30
Supported Ids: 3040, 2292, 2293, 3162, 3166, 3168
Performing Flash Authentication ...OK
UEM ID: 0041589B:2984DA60
Area [01000000-0100FFFF] erased in 1.265 s
Area [01010000-013AFFFF] erased in 1 min 12.938 s
Area [013B0000-013EFFFF] erased in 4.969 s
Area [017C0000-017EFFFF] erased in 0.015 s
Area [01FC0000-01FEFFFF] erased in 0.031 s
Flash programming ...
Programming completed in 14.219 s
File Processed in 1 min 45.281 s
Formating FS: FILE2 ...
Processing file: rh1050_nai4.00ia as CNT
[DCT4,DCT4 ALGORITHM] size: 159.99 KB
Supported Ids: 2292
ASIC ID: 0x2292 [UPPCosto ver: 1.3]
SecondaryBoot: u3_2nd.fia [DCT4] version: 4.76.0 revision: 0.7 size: 0x9A8
Supported Ids: 3040, 2292, 2293, 3162, 3166, 3168
FlashID0: 0020 8828 [ST 58WR032FU,32 Mbits] page size: 64 K type: NOR area: 01000000-013FFFFF
FlashID1: 0000 0001 [unused/removed]
ExtBUSC: AD7E B61A 1BBE 0BE2 7D58 6BE4 DBEE 6514
Algorithm: u3_st_i.fia [DCT4 ALGORITHM] version: 4.76.0 revision: 0.7 size: 0x4C30
Supported Ids: 3040, 2292, 2293, 3162, 3166, 3168
Performing Flash Authentication ...OK
UEM ID: 0041589B:2984DA60
Area [01380000-013AFFFF] erased in 3.796 s
Flash programming ...
Programming completed in 1.109 s
Extracting Content Pack, File Server fake reply for CUI phone.
Content Pack extracted successfully in 0.047 s
File Processed in 24.515 s
Processing file: rh105_04.00ia as PPM
[DCT4,DCT4 ALGORITHM] size: 1.17 MB
Supported Ids: 2292
ASIC ID: 0x2292 [UPPCosto ver: 1.3]
SecondaryBoot: u3_2nd.fia [DCT4] version: 4.76.0 revision: 0.7 size: 0x9A8
Supported Ids: 3040, 2292, 2293, 3162, 3166, 3168
FlashID0: 0020 8828 [ST 58WR032FU,32 Mbits] page size: 64 K type: NOR area: 01000000-013FFFFF
FlashID1: 0000 0001 [unused/removed]
ExtBUSC: AD7E B61A 1BBE 0BE2 7D58 6BE4 DBEE 6514
Algorithm: u3_st_i.fia [DCT4 ALGORITHM] version: 4.76.0 revision: 0.7 size: 0x4C30
Supported Ids: 3040, 2292, 2293, 3162, 3166, 3168
Performing Flash Authentication ...OK
UEM ID: 0041589B:2984DA60
Area [01240000-0124FFFF] erased in 1.266 s
Area [01250000-0137FFFF] erased in 23.891 s
Flash programming ...
Programming completed in 7.453 s
File Processed in 44.688 s
Flashing completed in 3 min 11.750 s

After Flash Processing ...

PhoneType:RH-105
SwVersion: V 4.00 19-10-07 RH-105 (c) NMP
MCU file: rh105_04.000
Trying to find patch position ...OK, case id: 3

ASIC ID: 0x2292 [UPPCosto ver: 1.3]
SecondaryBoot: u3_2nd.fia [DCT4] version: 4.76.0 revision: 0.7 size: 0x9A8
Supported Ids: 3040, 2292, 2293, 3162, 3166, 3168
FlashID0: 0020 8828 [ST 58WR032FU,32 Mbits] page size: 64 K type: NOR area: 01000000-013FFFFF
FlashID1: 0000 0001 [unused/removed]
ExtBUSC: AD7E B61A 1BBE 0BE2 7D58 6BE4 DBEE 6514
Algorithm: u3_st_i.fia [DCT4 ALGORITHM] version: 4.76.0 revision: 0.7 size: 0x4C30
Supported Ids: 3040, 2292, 2293, 3162, 3166, 3168
Performing Flash Authentication ...OK
UEM ID: 0041589B:2984DA60
Area [01000000-0101FFFF] erased in 2.547 s
Area [01140000-0115FFFF] erased in 2.532 s
Programming ...
Programming completed.
Updating SIMLOCK ...OK
Completed in 29.797 s


Phone Type: RH-105
SW Version: V 4.00 19-10-07 RH-105 (c) NMP
Imei plain: 35320803557191-0
Product Code: 0568772
Cellular System: GSM
ASIC ID: 0x2292, type: 11
Ppm Id: IA
Language Pack:
- not available.


Imei net: 35320803557191
Provider: ALL Operator, Country: -
Counter: 0/3, 0/10

CONFIG_DATA: 0010100000000000
PROFILE_BITS: 800000000001000B

BLOCK 1: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 2: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 3: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 4: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 5: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 6: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 7: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
 

JannatLui

Well-known Member
Joined
Sep 1, 2010
Posts
2,836
Likes
14
answer: [MXKEY - INFO] Successfully Unlocked/repaired Phones By MXKey

3110c repaired successfully

Version from phone: 07.21
Version from file: 07.21
Using device: UFS_USB V2.8 (c) SarasSoft 2007.
Library version: 1.0.0.10913, Date: 05-11-2009
RAP Data :
SYSTEM ASIC ID: 000000010000022600010006010C192101001101 [RAPGSM ver: 1.1]
EM1 ID: 00000232
EM2 ID: 00000353
PUBLIC ID: 2BC0011589467E56A93A0D998E01533D426053CE
ASIC MODE ID: 00
ROOT KEY HASH: BAF3A9C3DBFA8454937DB77F2B8852B1
ROM ID: 191EC665DFAAF68F
SecondaryBoot: rap3gv3_2nd.fg [BB5] version: 1.30.0 revision: 0.0 size: 0x3C00
Supported RAP Ids: 0103192101003000, 010C192101003000, 0103192101013000, 010C192101013000, 0103192101003100, 010C192101003100, 0303192101023000, 030C192101023000, 0303192101033000, 030C192101033000, 0103192101001101, 010C192101001101, 0003192101001002, 000C192101001002, 0013192101001002, 001C192101001002
FlashID0: 0089 8981 - 0000 0000 [Intel NU48F256,256 Mbits] type: NOR,RAP
ExtBUSC: 0000 0000 0000 0000 0000 0000 0000 0000
ExtDEVC: FFFF 0000 - 0000 0000
Algorithm: RAP3Gv3_algo_131.fg [BB5 ALGORITHM] version: 1.31.0 revision: 0.0 size: 0x297E0
Supported RAP Ids: 0103192101003000, 010C192101003000, 0103192101013000, 010C192101013000, 0103192101003100, 010C192101003100, 0303192101023000, 030C192101023000, 0303192101033000, 030C192101033000, 0003192101002000, 000C192101002000, 0003192101002100, 000C192101002100, 0003192101002200, 000C192101002200, 0003192101012200, 000C192101012200, 0103192101001101, 010C192101001101, 0003192101001002, 000C192101001002, 0013192101001002, 001C192101001002
RAP PAPUBKEYS HASH: C0E691EA16A7593A9BB28832D7312A39F7ED668D
Reading RAP NPC (0x168 bytes).
Reading RAP VARIANT (0x0 bytes).
Reading RAP CCC (0x160 bytes).
Reading RAP HWC (0xD4 bytes).
Flash Imei: 35196303066434
NPC_DATA saved OK
CCC_DATA saved OK
HWC_DATA saved OK
WMDRM_PD_DATA saved OK
RF_DATA saved OK
WARRANTY_DATA saved OK
PROD_DATA saved OK
BT_DATA saved OK
LOCK_DATA saved OK
BB_DATA saved OK
RPL saved to "C:\mobileEx\3.2\data\backup\RPL\BB5_3519630306643 4_BACK.rpl"
Processing file: rm237__07.21.mcusw as MCU
[BB5,BB5 ALGORITHM] size: 14.48 MB
Supported RAP Ids: 0103192101001101, 010C192101001101
RAP Data :
SYSTEM ASIC ID: 000000010000022600010006010C192101001101 [RAPGSM ver: 1.1]
EM1 ID: 00000232
EM2 ID: 00000353
PUBLIC ID: 2BC0011589467E56A93A0D998E01533D426053CE
ASIC MODE ID: 00
ROOT KEY HASH: BAF3A9C3DBFA8454937DB77F2B8852B1
ROM ID: 191EC665DFAAF68F
SecondaryBoot: rap3gv3_2nd.fg [BB5] version: 1.30.0 revision: 0.0 size: 0x3C00
Supported RAP Ids: 0103192101003000, 010C192101003000, 0103192101013000, 010C192101013000, 0103192101003100, 010C192101003100, 0303192101023000, 030C192101023000, 0303192101033000, 030C192101033000, 0103192101001101, 010C192101001101, 0003192101001002, 000C192101001002, 0013192101001002, 001C192101001002
FlashID0: 0089 8981 - 0000 0000 [Intel NU48F256,256 Mbits] type: NOR,RAP
ExtBUSC: 0000 0000 0000 0000 0000 0000 0000 0000
ExtDEVC: FFFF 0000 - 0000 0000
Algorithm: RAP3Gv3_algo_131.fg [BB5 ALGORITHM] version: 1.31.0 revision: 0.0 size: 0x297E0
Supported RAP Ids: 0103192101003000, 010C192101003000, 0103192101013000, 010C192101013000, 0103192101003100, 010C192101003100, 0303192101023000, 030C192101023000, 0303192101033000, 030C192101033000, 0003192101002000, 000C192101002000, 0003192101002100, 000C192101002100, 0003192101002200, 000C192101002200, 0003192101012200, 000C192101012200, 0103192101001101, 010C192101001101, 0003192101001002, 000C192101001002, 0013192101001002, 001C192101001002
RAP PAPUBKEYS HASH: C0E691EA16A7593A9BB28832D7312A39F7ED668D
Total erase size: 16.37 MB
CMT NOR area [00000000-000006BF] erased in 0.562 s
CMT NOR area [000006C0-0001FFFF] erased in 0.063 s
CMT NOR area [00020000-0007FFFF] erased in 1.734 s
CMT NOR area [00080000-000DFFFF] erased in 0.125 s
CMT NOR area [00100000-001FFFFF] erased in 0.266 s
CMT NOR area [00200000-0031FFFF] erased in 5.344 s
CMT NOR area [00320000-0105FFFF] erased in 58.578 s
CMT NOR area [01060000-01067FFF] erased in 0.594 s
CMT NOR area [01068000-0107FFFF] erased in 0.063 s
Flash programming ...
Valid PAPUB key found.
CMT PAPUBKEYS: C0E691EA16A7593A9BB28832D7312A39F7ED668D (RAP Certificate 66 v2) written.
Programming completed in 1 min 35.844 s
Processing file: rm237__07.21.ppm_mr as PPM
[BB5,BB5 ALGORITHM] size: 3.55 MB
Supported RAP Ids: 0103192101001101, 010C192101001101
RAP Data :
SYSTEM ASIC ID: 000000010000022600010006010C192101001101 [RAPGSM ver: 1.1]
EM1 ID: 00000232
EM2 ID: 00000353
PUBLIC ID: 2BC0011589467E56A93A0D998E01533D426053CE
ASIC MODE ID: 00
ROOT KEY HASH: BAF3A9C3DBFA8454937DB77F2B8852B1
ROM ID: 191EC665DFAAF68F
SecondaryBoot: rap3gv3_2nd.fg [BB5] version: 1.30.0 revision: 0.0 size: 0x3C00
Supported RAP Ids: 0103192101003000, 010C192101003000, 0103192101013000, 010C192101013000, 0103192101003100, 010C192101003100, 0303192101023000, 030C192101023000, 0303192101033000, 030C192101033000, 0103192101001101, 010C192101001101, 0003192101001002, 000C192101001002, 0013192101001002, 001C192101001002
FlashID0: 0089 8981 - 0000 0000 [Intel NU48F256,256 Mbits] type: NOR,RAP
ExtBUSC: 0000 0000 0000 0000 0000 0000 0000 0000
ExtDEVC: FFFF 0000 - 0000 0000
Algorithm: RAP3Gv3_algo_131.fg [BB5 ALGORITHM] version: 1.31.0 revision: 0.0 size: 0x297E0
Supported RAP Ids: 0103192101003000, 010C192101003000, 0103192101013000, 010C192101013000, 0103192101003100, 010C192101003100, 0303192101023000, 030C192101023000, 0303192101033000, 030C192101033000, 0003192101002000, 000C192101002000, 0003192101002100, 000C192101002100, 0003192101002200, 000C192101002200, 0003192101012200, 000C192101012200, 0103192101001101, 010C192101001101, 0003192101001002, 000C192101001002, 0013192101001002, 001C192101001002
RAP PAPUBKEYS HASH: C0E691EA16A7593A9BB28832D7312A39F7ED668D
Total erase size: 4.62 MB
CMT NOR area [01080000-0151FFFF] erased in 16.625 s
Flash programming ...
Programming completed in 22.578 s
file rm237__07.21_sd_allmost_empty_512.fpsimage is empty, skipped.
Processing file: rm237__07.21.image_mr as CNT
[BB5,BB5 ALGORITHM] page size: 64 K size: 4.00 MB
Supported RAP Ids: 0103192101001101, 010C192101001101
NOR page size in the phone is 128 K.
Formating FS: FILE2 ...
RAP Data :
SYSTEM ASIC ID: 000000010000022600010006010C192101001101 [RAPGSM ver: 1.1]
EM1 ID: 00000232
EM2 ID: 00000353
PUBLIC ID: 2BC0011589467E56A93A0D998E01533D426053CE
ASIC MODE ID: 00
ROOT KEY HASH: BAF3A9C3DBFA8454937DB77F2B8852B1
ROM ID: 191EC665DFAAF68F
SecondaryBoot: rap3gv3_2nd.fg [BB5] version: 1.30.0 revision: 0.0 size: 0x3C00
Supported RAP Ids: 0103192101003000, 010C192101003000, 0103192101013000, 010C192101013000, 0103192101003100, 010C192101003100, 0303192101023000, 030C192101023000, 0303192101033000, 030C192101033000, 0103192101001101, 010C192101001101, 0003192101001002, 000C192101001002, 0013192101001002, 001C192101001002
FlashID0: 0089 8981 - 0000 0000 [Intel NU48F256,256 Mbits] type: NOR,RAP
ExtBUSC: 0000 0000 0000 0000 0000 0000 0000 0000
ExtDEVC: FFFF 0000 - 0000 0000
Algorithm: RAP3Gv3_algo_131.fg [BB5 ALGORITHM] version: 1.31.0 revision: 0.0 size: 0x297E0
Supported RAP Ids: 0103192101003000, 010C192101003000, 0103192101013000, 010C192101013000, 0103192101003100, 010C192101003100, 0303192101023000, 030C192101023000, 0303192101033000, 030C192101033000, 0003192101002000, 000C192101002000, 0003192101002100, 000C192101002100, 0003192101002200, 000C192101002200, 0003192101012200, 000C192101012200, 0103192101001101, 010C192101001101, 0003192101001002, 000C192101001002, 0013192101001002, 001C192101001002
RAP PAPUBKEYS HASH: C0E691EA16A7593A9BB28832D7312A39F7ED668D
Total erase size: 10.75 MB
CMT NOR area [01520000-01FDFFFF] erased in 1 min 1.656 s
Converting UCP blocks to 128 K.
Flash programming ...
Programming completed in 25.718 s
Flashing completed in 5 min 47.079 s


Phone Type: RM-237 (Nokia 3110c)
SW Version: V 07.21 05-11-08 RM-237 (c) Nokia.
Imei plain: 35196303066434-0
Product Code: 0566963
Language Pack:
- not available.

SIMLOCK seems to be valid
SUPERDONGLE_KEY seems to be valid
SIMLOCK_TEST passed
SECURITY_TEST passed


Imei net: 351963030664340
Version: SIMLOCK SERVER VERSION 63
Provider: Nokia Test, Country: Finland
Counter: 0/3, 0/10

CONFIG_DATA: 2440700000000000
PROFILE_BITS: 0000000000000000

BLOCK 1: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 2: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 3: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 4: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 5: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 6: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 7: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
Total time to process is 6 min 7.454 s
FULL FACTORY... OK
SOFTWARE UPGRADE... OK
Completed in 3.719 s
 

JannatLui

Well-known Member
Joined
Sep 1, 2010
Posts
2,836
Likes
14
answer: [MXKEY - INFO] Successfully Unlocked/repaired Phones By MXKey

Nokia 6280 unlock done

Imei net: 357603005327846
Version: SIMLOCK SERVER VERSION 63
Provider: Hutchinson 3G (3), Country: United Kingdom
Counter: 0/3, 0/10

CONFIG_DATA: 2342000000000000
PROFILE_BITS: 8000000000000006

BLOCK 1: 1=LOCKED (MCC+MNC): 23420F, DATA=23420F

Backup saved to "BB5_357603005327846_SIMLOCK.back"
Using device: UFS_USB V2.8 (c) SarasSoft 2007.
Library version: 1.0.0.10913, Date: 05-11-2009

ROOT KEY HASH: BAF3A9C3DBFA8454937DB77F2B8852B1
ROM ID: 273F6D55DFAAF68F

Sending SecondaryBoot(0x3D00 bytes) ...OK
Sending PreLoader(0x2E4 bytes) ...OK
Sending ROM(0x3948 bytes) ...OK
Sending CustomLoader(0x50B0 bytes) ...OK
Sending SecurityBlock(0x1000 bytes) ...OK
Sending SimlockBinary(0x3B0 bytes) ...OK
Calculating LOCK data ...OK
Receiving Unlocked PM, please WAIT ... OK
Writing Unlocked PM ... OK
Completed in 27.781 s
Restarting phone ...

Reading Simlock info ...
Imei net: 357603005327846
Version: SIMLOCK SERVER VERSION 63
Provider: Nokia Test, Country: Finland
Counter: 0/3, 0/10

CONFIG_DATA: 2440700000000000
PROFILE_BITS: 8000000000000006

BLOCK 1: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 2: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 3: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 4: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 5: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 6: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 7: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
 

JannatLui

Well-known Member
Joined
Sep 1, 2010
Posts
2,836
Likes
14
answer: [MXKEY - INFO] Successfully Unlocked/repaired Phones By MXKey

6133 unlocked successfully 6133 unlocked successfully by mx key.

Imei net: 3527360112xxxxx
Version: SIMLOCK SERVER VERSION 63
Provider: T-Mobile, Country: U.S.A.
Counter: 0/3, 0/10

CONFIG_DATA: 3102000000000000
PROFILE_BITS: 0000000000000000

BLOCK 1: 1=LOCKED (MCC+MNC): 20416F, DATA=20416F
BLOCK 2: 1=LOCKED (MCC+MNC): 21630F, DATA=21630F
BLOCK 3: 1=LOCKED (MCC+MNC): 21901F, DATA=21901F
BLOCK 4: 1=LOCKED (MCC+MNC): 23001F, DATA=23001F
BLOCK 5: 1=LOCKED (MCC+MNC): 23102F, DATA=23102F
BLOCK 6: 1=LOCKED (MCC+MNC): 23203F, DATA=23203F
BLOCK 7: 1=LOCKED (MCC+MNC): 23430F, DATA=23430F
BLOCK 8: 1=LOCKED (MCC+MNC): 25001F, DATA=25001F
BLOCK 9: 1=LOCKED (MCC+MNC): 25502F, DATA=25502F
BLOCK 10: 1=LOCKED (MCC+MNC): 26002F, DATA=26002F
BLOCK 11: 1=LOCKED (MCC+MNC): 26201F, DATA=26201F
BLOCK 12: 1=LOCKED (MCC+MNC): 310160, DATA=310160
BLOCK 13: 1=LOCKED (MCC+MNC): 310200, DATA=310200
BLOCK 14: 1=LOCKED (MCC+MNC): 310210, DATA=310210
BLOCK 15: 1=LOCKED (MCC+MNC): 310220, DATA=310220
BLOCK 16: 1=LOCKED (MCC+MNC): 310230, DATA=310230
BLOCK 17: 1=LOCKED (MCC+MNC): 310240, DATA=310240
BLOCK 18: 1=LOCKED (MCC+MNC): 310250, DATA=310250
BLOCK 19: 1=LOCKED (MCC+MNC): 310260, DATA=310260
BLOCK 20: 1=LOCKED (MCC+MNC): 310270, DATA=310270
BLOCK 21: 1=LOCKED (MCC+MNC): 310280, DATA=310280
BLOCK 22: 1=LOCKED (MCC+MNC): 310300, DATA=310300
BLOCK 23: 1=LOCKED (MCC+MNC): 310310, DATA=310310
BLOCK 24: 1=LOCKED (MCC+MNC): 310580, DATA=310580
BLOCK 25: 1=LOCKED (MCC+MNC): 310660, DATA=310660
BLOCK 26: 1=LOCKED (MCC+MNC): 310800, DATA=310800
BLOCK 27: 1=LOCKED (MCC+MNC): 20416F, DATA=20416F
BLOCK 28: 1=LOCKED (MCC+MNC): 21630F, DATA=21630F
BLOCK 29: 1=LOCKED (MCC+MNC): 21901F, DATA=21901F
BLOCK 30: 1=LOCKED (MCC+MNC): 23001F, DATA=23001F
BLOCK 31: 1=LOCKED (MCC+MNC): 23102F, DATA=23102F
BLOCK 32: 1=LOCKED (MCC+MNC): 23203F, DATA=23203F
BLOCK 33: 1=LOCKED (MCC+MNC): 23430F, DATA=23430F
BLOCK 34: 1=LOCKED (MCC+MNC): 25001F, DATA=25001F
BLOCK 35: 1=LOCKED (MCC+MNC): 25502F, DATA=25502F
BLOCK 36: 1=LOCKED (MCC+MNC): 26002F, DATA=26002F
BLOCK 37: 1=LOCKED (MCC+MNC): 26201F, DATA=26201F
BLOCK 38: 1=LOCKED (MCC+MNC): 310160, DATA=310160
BLOCK 39: 1=LOCKED (MCC+MNC): 310200, DATA=310200
BLOCK 40: 1=LOCKED (MCC+MNC): 310210, DATA=310210
BLOCK 41: 1=LOCKED (MCC+MNC): 310220, DATA=310220
BLOCK 42: 1=LOCKED (MCC+MNC): 310230, DATA=310230
BLOCK 43: 1=LOCKED (MCC+MNC): 310240, DATA=310240
BLOCK 44: 1=LOCKED (MCC+MNC): 310250, DATA=310250
BLOCK 45: 1=LOCKED (MCC+MNC): 310260, DATA=310260
BLOCK 46: 1=LOCKED (MCC+MNC): 310270, DATA=310270
BLOCK 47: 1=LOCKED (MCC+MNC): 310280, DATA=310280
BLOCK 48: 1=LOCKED (MCC+MNC): 310300, DATA=310300
BLOCK 49: 1=LOCKED (MCC+MNC): 310310, DATA=310310
BLOCK 50: 1=LOCKED (MCC+MNC): 310580, DATA=310580
BLOCK 51: 1=LOCKED (MCC+MNC): 310660, DATA=310660
BLOCK 52: 1=LOCKED (MCC+MNC): 310800, DATA=310800

Backup saved to "BB5_3527360112xxxxx_SIMLOCK.back"
Using device: UFS_USB V2.8 (c) SarasSoft 2007.
Library version: 1.0.0.10913, Date: 05-11-2009

ROOT KEY HASH: BAF3A9C3DBFA8454937DB77F2B8852B1
ROM ID: 191EC665DFAAF68F

Sending SecondaryBoot(0x3D00 bytes) ...OK
Sending PreLoader(0x2E4 bytes) ...OK
Sending ROM(0x3948 bytes) ...OK
Sending CustomLoader(0x50B0 bytes) ...OK
Sending SecurityBlock(0x2000 bytes) ...OK
Sending SimlockBinary(0x3B0 bytes) ...OK
Calculating LOCK data ...OK
Receiving Unlocked PM, please WAIT ... OK
Writing Unlocked PM ... OK
Completed in 29.329 s
Restarting phone ...

Reading Simlock info ...
Imei net: 352736011xxxxx
Version: SIMLOCK SERVER VERSION 63
Provider: Nokia Test, Country: Finland
Counter: 0/3, 0/10

CONFIG_DATA: 2440700000000000
PROFILE_BITS: 0000000000000000

BLOCK 1: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 2: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 3: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 4: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 5: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 6: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
 

JannatLui

Well-known Member
Joined
Sep 1, 2010
Posts
2,836
Likes
14
answer: [MXKEY - INFO] Successfully Unlocked/repaired Phones By MXKey

N91 successfully repair with MX key
Version from phone: 3.10.023
Version from file: V3.10.023.core
Using device: J.A.F, FW ver: 01.B1
Library version: 1.0.0.10913, Date: 05-11-2009
APE Data :
SYSTEM ASIC ID: 17100708 [OMAP1710 ver: 2.0]
ASIC MODE ID: 00
PUBLIC ID: C310E008270D7203753083D3794CC0AE3ED5EEB8
ROOT KEY HASH: 49A97E826B93BA20B7ED0B082475C00500000000
ROM ID: 1DFD66132C872FD4
RAP Data :
SYSTEM ASIC ID: 000000010000022600010006000C192101002200 [RAP3G ver: PA 2.2]
EM1 ID: 00000232
EM2 ID: 00000352
PUBLIC ID: 0920010EBC6D5151DFB0E025C6349B02727ABA27
ASIC MODE ID: 00
ROOT KEY HASH: E9EFF4BFAA5393217CA6B17755FC3E14
ROM ID: F28A211FCEA7B19D
SecondaryBoot: rap3gv2_2nd.fg [BB5] version: 1.21.0 revision: 0.0 size: 0x3D00
Supported RAP Ids: 0003192101002000, 000C192101002000, 0003192101002100, 000C192101002100, 0003192101002200, 000C192101002200, 0003192101012200, 000C192101012200
FlashID0: 00EC 2250 - 0000 0121 [Samsung K8S6415ETB,64 Mbits] type: NOR,RAP
ExtBUSC: 0000 0000 0000 0000 0000 0000 0000 0000
ExtDEVC: FFFF 0000 - 0000 0000
Algorithm: RAP3Gv3_algo.fg [BB5 ALGORITHM] version: 1.40.0 revision: 0.0 size: 0x22C10
Supported RAP Ids: 0103192101003000, 010C192101003000, 0103192101013000, 010C192101013000, 0103192101003100, 010C192101003100, 0303192101023000, 030C192101023000, 0303192101033000, 030C192101033000, 0003192101002000, 000C192101002000, 0003192101002100, 000C192101002100, 0003192101002200, 000C192101002200, 0003192101012200, 000C192101012200, 0103192101001101, 010C192101001101, 0003192101001002, 000C192101001002, 0013192101001002, 001C192101001002
RAP PAPUBKEYS HASH: 6E25F5B4407C1CBD0598994502C24000F3657C18
SecondaryBoot: helen3_2nd.fg [BB5] version: 1.35.0 revision: 0.0 size: 0x3500
Supported APE Ids: 17100700, 17100701, 17100702, 17100703, 17100704, 17100708
FlashID0: 00EC 0036 - 00A5 00C0 [Samsung KAL00R00EM-DGXX,512 Mbits] type: NAND,APE
ALG [35]: OMAP1710 UNISTORE-II-1.2.1 ALG
ExtBUSC: 0002 0000 0006 0000 0000 0000 0000 0000
Algorithm: h3_sam_nand_xsr.fg [OMAP1710 UNISTORE-II-1.2.1 ALG] version: 1.49.0 revision: 0.0 size: 0x13AA0
Supported APE Ids: 17100700, 17100701, 17100702, 17100703, 17100704, 17100708
APE PAPUBKEYS HASH: 6E25F5B4407C1CBD0598994502C24000F3657C18
Reading RAP NPC (0x168 bytes).
Reading RAP VARIANT (0xB8 bytes).
Reading RAP CCC (0x0 bytes).
Reading RAP HWC (0x0 bytes).
Reading APE NPC (0x0 bytes).
Reading APE VARIANT (0x0 bytes).
Reading APE CCC (0x0 bytes).
Reading APE HWC (0x0 bytes).
Flash Imei: 35276501003811
NPC_DATA saved OK
VARIANT_DATA saved OK
RF_DATA saved OK
WARRANTY_DATA saved OK
PROD_DATA saved OK
BT_DATA saved OK
LOCK_DATA saved OK
BB_DATA saved OK
WLAN_DATA saved OK
RPL saved to "C:\mobileEx\3.2\data\backup\RPL\BB5_3527650100381 1_BACK.rpl"
Processing file: RM43_V3.10.023.core as MCU
[BB5,BB5 ALGORITHM,BB5,OMAP1710 UNISTORE-II-1.2.1 ALG] size: 34.54 MB
Supported RAP Ids: 0003192101002000, 000C192101002000, 0003192101002100, 000C192101002100, 0003192101002200, 000C192101002200
Supported APE Ids: 17100708
APE Data :
SYSTEM ASIC ID: 17100708 [OMAP1710 ver: 2.0]
ASIC MODE ID: 00
PUBLIC ID: C310E008270D7203753083D3794CC0AE3ED5EEB8
ROOT KEY HASH: 49A97E826B93BA20B7ED0B082475C00500000000
ROM ID: 1DFD66132C872FD4
RAP Data :
SYSTEM ASIC ID: 000000010000022600010006000C192101002200 [RAP3G ver: PA 2.2]
EM1 ID: 00000232
EM2 ID: 00000352
PUBLIC ID: 0920010EBC6D5151DFB0E025C6349B02727ABA27
ASIC MODE ID: 00
ROOT KEY HASH: E9EFF4BFAA5393217CA6B17755FC3E14
ROM ID: F28A211FCEA7B19D
SecondaryBoot: rap3gv2_2nd.fg [BB5] version: 1.21.0 revision: 0.0 size: 0x3D00
Supported RAP Ids: 0003192101002000, 000C192101002000, 0003192101002100, 000C192101002100, 0003192101002200, 000C192101002200, 0003192101012200, 000C192101012200
FlashID0: 00EC 2250 - 0000 0121 [Samsung K8S6415ETB,64 Mbits] type: NOR,RAP
ExtBUSC: 0000 0000 0000 0000 0000 0000 0000 0000
ExtDEVC: FFFF 0000 - 0000 0000
Algorithm: RAP3Gv3_algo.fg [BB5 ALGORITHM] version: 1.40.0 revision: 0.0 size: 0x22C10
Supported RAP Ids: 0103192101003000, 010C192101003000, 0103192101013000, 010C192101013000, 0103192101003100, 010C192101003100, 0303192101023000, 030C192101023000, 0303192101033000, 030C192101033000, 0003192101002000, 000C192101002000, 0003192101002100, 000C192101002100, 0003192101002200, 000C192101002200, 0003192101012200, 000C192101012200, 0103192101001101, 010C192101001101, 0003192101001002, 000C192101001002, 0013192101001002, 001C192101001002
RAP PAPUBKEYS HASH: 6E25F5B4407C1CBD0598994502C24000F3657C18
SecondaryBoot: helen3_2nd.fg [BB5] version: 1.35.0 revision: 0.0 size: 0x3500
Supported APE Ids: 17100700, 17100701, 17100702, 17100703, 17100704, 17100708
FlashID0: 00EC 0036 - 00A5 00C0 [Samsung KAL00R00EM-DGXX,512 Mbits] type: NAND,APE
ALG [35]: OMAP1710 UNISTORE-II-1.2.1 ALG
ExtBUSC: 0002 0000 0006 0000 0000 0000 0000 0000
Algorithm: h3_sam_nand_xsr.fg [OMAP1710 UNISTORE-II-1.2.1 ALG] version: 1.49.0 revision: 0.0 size: 0x13AA0
Supported APE Ids: 17100700, 17100701, 17100702, 17100703, 17100704, 17100708
APE PAPUBKEYS HASH: 6E25F5B4407C1CBD0598994502C24000F3657C18
Total erase size: 53.53 MB
CMT NOR area [00000000-00530561]
CMT NOR area [006A0000-006BFFFF]
CMT NOR area [006DF000-006EFFFF]
CMT NOR area [00700000-007EFFFF]
APE NAND area [00000000-0000FFFF]
APE NAND area [00010000-0001FFFF]
APE NAND area [00020000-000203FF]
APE NAND area [00028000-02F3CFFF]
erased in 41.172 s
Flash programming ...
Valid PAPUB key found.
CMT PAPUBKEYS: 6E25F5B4407C1CBD0598994502C2400000303030 (RAP Certificate 74 v1) written.
Valid PAPUB key found.
APE PAPUBKEYS: 6E25F5B4407C1CBD0598994502C2400000737C42 (APE Certificate 74 v1) written.
Programming completed in 3 min 26.484 s
Processing file: RM43_V3.10.023.04.variant as PPM
[BB5,BB5 ALGORITHM,BB5,OMAP1710 UNISTORE-II-1.2.1 ALG] size: 14.16 MB
Supported RAP Ids: 0000000000000000, 0003192101002000, 000C192101002000, 0003192101002100, 000C192101002100, 0003192101002200, 000C192101002200, 0003192101012200, 000C192101012200
Supported APE Ids: 17100700, 17100701, 17100702, 17100708
APE Data :
SYSTEM ASIC ID: 17100708 [OMAP1710 ver: 2.0]
ASIC MODE ID: 00
PUBLIC ID: C310E008270D7203753083D3794CC0AE3ED5EEB8
ROOT KEY HASH: 49A97E826B93BA20B7ED0B082475C00500000000
ROM ID: 1DFD66132C872FD4
RAP Data :
SYSTEM ASIC ID: 000000010000022600010006000C192101002200 [RAP3G ver: PA 2.2]
EM1 ID: 00000232
EM2 ID: 00000352
PUBLIC ID: 0920010EBC6D5151DFB0E025C6349B02727ABA27
ASIC MODE ID: 00
ROOT KEY HASH: E9EFF4BFAA5393217CA6B17755FC3E14
ROM ID: F28A211FCEA7B19D
SecondaryBoot: rap3gv2_2nd.fg [BB5] version: 1.21.0 revision: 0.0 size: 0x3D00
Supported RAP Ids: 0003192101002000, 000C192101002000, 0003192101002100, 000C192101002100, 0003192101002200, 000C192101002200, 0003192101012200, 000C192101012200
FlashID0: 00EC 2250 - 0000 0121 [Samsung K8S6415ETB,64 Mbits] type: NOR,RAP
ExtBUSC: 0000 0000 0000 0000 0000 0000 0000 0000
ExtDEVC: FFFF 0000 - 0000 0000
Algorithm: RAP3Gv3_algo.fg [BB5 ALGORITHM] version: 1.40.0 revision: 0.0 size: 0x22C10
Supported RAP Ids: 0103192101003000, 010C192101003000, 0103192101013000, 010C192101013000, 0103192101003100, 010C192101003100, 0303192101023000, 030C192101023000, 0303192101033000, 030C192101033000, 0003192101002000, 000C192101002000, 0003192101002100, 000C192101002100, 0003192101002200, 000C192101002200, 0003192101012200, 000C192101012200, 0103192101001101, 010C192101001101, 0003192101001002, 000C192101001002, 0013192101001002, 001C192101001002
RAP PAPUBKEYS HASH: 6E25F5B4407C1CBD0598994502C24000F3657C18
SecondaryBoot: helen3_2nd.fg [BB5] version: 1.35.0 revision: 0.0 size: 0x3500
Supported APE Ids: 17100700, 17100701, 17100702, 17100703, 17100704, 17100708
FlashID0: 00EC 0036 - 00A5 00C0 [Samsung KAL00R00EM-DGXX,512 Mbits] type: NAND,APE
ALG [35]: OMAP1710 UNISTORE-II-1.2.1 ALG
ExtBUSC: 0002 0000 0006 0000 0000 0000 0000 0000
Algorithm: h3_sam_nand_xsr.fg [OMAP1710 UNISTORE-II-1.2.1 ALG] version: 1.49.0 revision: 0.0 size: 0x13AA0
Supported APE Ids: 17100700, 17100701, 17100702, 17100703, 17100704, 17100708
APE PAPUBKEYS HASH: 6E25F5B4407C1CBD0598994502C24000F3657C18
Total erase size: 15.68 MB
APE NAND area [01F90000-02F3CFFF]
erased in 1.797 s
Flash programming ...
Programming completed in 2 min 24.688 s
Flashing completed in 9 min 9.000 s

After Flash Processing ...

Phone Type: RM-43 (Nokia N91-1)
SW Version: V w33_07w11v1 14-03-07 RM-43 (c) Nokia.
Imei plain: 35276501003811-7
Product Code: 0524007
Language Pack:
- not available.

SIMLOCK seems to be valid
SUPERDONGLE_KEY seems to be valid
SIMLOCK_TEST passed
SECURITY_TEST passed


Imei net: 352765010038117
Version: SIMLOCK SERVER VERSION 62
Provider: Nokia Test, Country: Finland
Counter: 0/3, 0/10

CONFIG_DATA: 2440700000000000
PROFILE_BITS: 0000000000000000

BLOCK 1: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 2: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 3: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 4: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 5: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 6: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 7: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
Total time to process is 9 min 38.094 s
 

JannatLui

Well-known Member
Joined
Sep 1, 2010
Posts
2,836
Likes
14
answer: [MXKEY - INFO] Successfully Unlocked/repaired Phones By MXKey

N95 successfully unlocked here is logs

Imei net: 35*************
Version: SIMLOCK SERVER
Provider: Virgin, Country: United Kingdom
Counter: 0/3, 0/10

CONFIG_DATA: 2343000000000000
PROFILE_BITS: 0000000000000000

BLOCK 1: 1=LOCKED (MCC+MNC): 23430F, DATA=23430F
BLOCK 2: 1=LOCKED (MCC+MNC): 23430F, DATA=23430F

Backup already exist.
Using device: J.A.F, FW ver: 01.B1
Library version: 1.0.0.10913, Date: 05-11-2009

ROOT KEY HASH: CAEEBB65D3C48E6DC73B49DC5063A2EE
ROM ID: A8C1D6713E691FF8

Sending SecondaryBoot(0x3AC0 bytes) ...OK
Sending PreLoader(0x2E4 bytes) ...OK
Sending ROM(0x39C0 bytes) ...OK
Sending CustomLoader(0x50D8 bytes) ...OK
Sending SecurityBlock(0x2000 bytes) ...OK
Sending SimlockBinary(0x3B0 bytes) ...OK
Calculating LOCK data ...OK
Receiving Unlocked PM, please WAIT ... OK
Writing Unlocked PM ... OK
Completed in 52.844 s
Restarting phone ...

Reading Simlock info ...
Imei net: 356996014932650
Version: SIMLOCK SERVER
Provider: Nokia Test, Country: Finland
Counter: 0/3, 0/10

CONFIG_DATA: 2440700000000000
PROFILE_BITS: 0000000000000000

BLOCK 1: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 2: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 3: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 4: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 5: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 6: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 7: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
 

JannatLui

Well-known Member
Joined
Sep 1, 2010
Posts
2,836
Likes
14
answer: [MXKEY - INFO] Successfully Unlocked/repaired Phones By MXKey

6300 Unlock Ok

Imei net: 3530790XXXXXXX
Version: SIMLOCK SERVER VERSION 63
Counter: 0/3, 0/10

CONFIG_DATA: 7321230140723740
PROFILE_BITS: 8000000000000000

BLOCK 1: 1=LOCKED (MCC+MNC): 732123, DATA=732123
BLOCK 2: 1=LOCKED (MCC+MNC): 74000F, DATA=74000F
BLOCK 3: 1=LOCKED (MCC+MNC): 71606F, DATA=71606F
BLOCK 4: 1=LOCKED (MCC+MNC): 73404F, DATA=73404F
BLOCK 5: 1=LOCKED (MCC+MNC): 73002F, DATA=73002F
BLOCK 6: 1=LOCKED (MCC+MNC): 72207F, DATA=72207F
BLOCK 7: 1=LOCKED (MCC+MNC): 74807F, DATA=74807F
BLOCK 8: 1=LOCKED (MCC+MNC): 70403F, DATA=70403F
BLOCK 9: 1=LOCKED (MCC+MNC): 70604F, DATA=70604F
BLOCK 10: 1=LOCKED (MCC+MNC): 71030F, DATA=71030F
BLOCK 11: 1=LOCKED (MCC+MNC): 21407F, DATA=21407F
BLOCK 12: 1=LOCKED (MCC+MNC): 21402F, DATA=21402F
BLOCK 13: 1=LOCKED (MCC+MNC): 33403F, DATA=33403F
BLOCK 14: 1=LOCKED (MCC+MNC): 71402F, DATA=71402F

Backup saved to "BB5_3530790XXXXXXX_SIMLOCK.back"
Using device: J.A.F, FW ver: 01.B0
Library version: 1.0.0.10913, Date: 05-11-2009

ROOT KEY HASH: BAF3A9C3DBFA8454937DB77F2B8852B1
ROM ID: 191EC665DFAAF68F

Sending SecondaryBoot(0x3D00 bytes) ...OK
Sending PreLoader(0x2E4 bytes) ...OK
Sending ROM(0x3948 bytes) ...OK
Sending CustomLoader(0x50B0 bytes) ...OK
Sending SecurityBlock(0x2000 bytes) ...OK
Sending SimlockBinary(0x3B0 bytes) ...OK
Calculating LOCK data ...OK
Receiving Unlocked PM, please WAIT ... OK
Writing Unlocked PM ... OK
Completed in 41.031 s
Restarting phone ...

Reading Simlock info ...
Imei net: 3530790XXXXXXX
Version: SIMLOCK SERVER VERSION 63
Provider: Nokia Test, Country: Finland
Counter: 0/3, 0/10

CONFIG_DATA: 2440700000000000
PROFILE_BITS: 8000000000000000

BLOCK 1: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 2: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 3: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 4: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 5: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 6: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 7: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
 
Back
Top