JannatLui

Well-known Member
Joined
Sep 1, 2010
Posts
2,836
Likes
14
answer: [MXKEY - INFO] Successfully Unlocked/repaired Phones By MXKey

2680 unlocked ok


Provider: Movistar (DCT4), Country: Spain
Counter: 0/3, 0/10

CONFIG_DATA: 2140700000000000
PROFILE_BITS: 800000000003000B

BLOCK 1: 1.LOCKED (MCC+MNC): 21407F
BLOCK 2: 1.LOCKED (MCC+MNC): 21402F

PhoneType:RM-392
SwVersion: V 05.28 05-11-08 RM-392 (c) Nokia
MCU file: rm392__05.28.mcusw
Trying to find patch position ...OK, case id: 4
ROM version: 3

ASIC ID: 0x3162 [UPP_8M ver: 6.11]
u3_2nd.fia: [DCT4] version: 4.70.1 revision: 0.7 size: 0x9A8
Supported Ids: 3040, 2292, 2293, 3162, 3166, 3168
FlashID0: 0020 883C [ST ] page size: 128 K type: NOR area: 01000000-01FFFFFF - COMBO FLASH
ExtBUSC: AD7E B61B 00FF 1040 0000 0000 0000 0000
u3_intel.fia: [DCT4 ALGORITHM] version: 4.70.1 revision: 0.7 size: 0x5548
Supported Ids: 3040, 2292, 2293, 3162, 3166, 3168
Performing Flash Authentication ...OK
UEM ID: 00D9EE43:3B8ADA60
Area [01000000-0101FFFF] erased in 1.110 s
Area [01080000-0109FFFF] erased in 1.109 s
Programming ...
Programming completed.
Updating SIMLOCK ...OK

ASIC ID: 0x3162 [UPP_8M ver: 6.11]
u3_2nd.fia: [DCT4] version: 4.70.1 revision: 0.7 size: 0x9A8
Supported Ids: 3040, 2292, 2293, 3162, 3166, 3168
FlashID0: 0020 883C [ST ] page size: 128 K type: NOR area: 01000000-01FFFFFF - COMBO FLASH
ExtBUSC: AD7E B61B 00FF 1040 0000 0000 0000 0000
u3_intel.fia: [DCT4 ALGORITHM] version: 4.70.1 revision: 0.7 size: 0x5548
Supported Ids: 3040, 2292, 2293, 3162, 3166, 3168
Performing Flash Authentication ...OK
UEM ID: 00D9EE43:3B8ADA60
Area [01000000-0101FFFF] erased in 1.109 s
Area [01080000-0109FFFF] erased in 1.109 s
Programming ...
Programming completed.
Completed in 1 min 14.062 s

Reading Simlock info ...
Imei net: 300000000000002
Provider: ALL Operator, Country: -
Counter: 0/3, 0/10

CONFIG_DATA: 0010100000000000
PROFILE_BITS: 800000000003000B

BLOCK 1: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 2: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 3: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 4: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 5: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 6: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 7: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
 

JannatLui

Well-known Member
Joined
Sep 1, 2010
Posts
2,836
Likes
14
answer: [MXKEY - INFO] Successfully Unlocked/repaired Phones By MXKey

E51 Unlocked........ Provider: Vodafone - Eircell, Country: Ireland
Counter: 0/3, 0/10

CONFIG_DATA: 2720100000000000
PROFILE_BITS: 8000000000000000

BLOCK 1: 1=LOCKED (MCC+MNC): 27201F, DATA=27201F

Backup saved to *quot;BB5_359330028266656_SIMLOCK.back*quot;

ROOT KEY HASH: CAEEBB65D3C48E6DC73B49DC5063A2EE
ROM ID: 4B9B75103E691FF8

Sending bootloader, size: 0x3AC0 ...
Calculating data ...OK
Writing PM buffer ... OK
Completed in 16.812 s
Restarting phone ...

Reading Simlock info ...
Provider: ALL Operator, Country: -
Counter: 0/3, 0/10

CONFIG_DATA: 0010100000000000
PROFILE_BITS: 8000000000000000

BLOCK 1: 1=OPEN, DATA=00101F
 

JannatLui

Well-known Member
Joined
Sep 1, 2010
Posts
2,836
Likes
14
answer: [MXKEY - INFO] Successfully Unlocked/repaired Phones By MXKey

1209 Contact Service successfully repair


Code:
Processing file: rh105_v5.80
ASIC ID: 0x2292 [UPPCosto ver: 1.3]
*nbsp;u3_2nd.fia: [DCT4] version: 4.70.1 revision: 0.7 size: 0x9A8
*nbsp;Supported Ids: 3040, 2292, 2293, 3162, 3166, 3168
FlashID0: 00EC 2268 [Samsung K8S3215ETE,32 Mbits] page size: 64 K type: NOR area: 01000000-013FFFFF
FlashID1: 0000 0001 [unused/removed] 
ExtBUSC: FFFF FFFF FFFF FFFF FFFF FFFF FFFF FFFF 
*nbsp;u3_amd.fia: [DCT4 ALGORITHM] version: 4.70.1 revision: 0.7 size: 0x7528
*nbsp;Supported Ids: 3040, 2292, 2293, 3162, 3166, 3168
Performing Flash Authentication ...OK
UEM ID: 009DBDCA:2984DA60
Programming MCU ...
*nbsp;rh105_v5.80: 
*nbsp;[DCT4,DCT4 ALGORITHM] *nbsp;size: 2.27 MB
*nbsp;Supported Ids: 2292
Area [01000000-0100FFFF] erased in 0.406 s
Area [01010000-013AFFFF] erased in 24.500 s
Area [013B0000-013EFFFF] erased in 1.531 s
Area [017C0000-017EFFFF] erased in 0.016 s
Area [01FC0000-01FEFFFF] erased in 0.031 s
Flash programming ...
Programming completed in 14.218 s
File Processed in 54.562 s
Processing file: rh1050_nai5.80ic
ASIC ID: 0x2292 [UPPCosto ver: 1.3]
*nbsp;u3_2nd.fia: [DCT4] version: 4.70.1 revision: 0.7 size: 0x9A8
*nbsp;Supported Ids: 3040, 2292, 2293, 3162, 3166, 3168
FlashID0: 00EC 2268 [Samsung K8S3215ETE,32 Mbits] page size: 64 K type: NOR area: 01000000-013FFFFF
FlashID1: 0000 0001 [unused/removed] 
ExtBUSC: AD7E B61A 1BBE 0BE2 7D58 6BE4 DBEE 6514 
*nbsp;u3_amd.fia: [DCT4 ALGORITHM] version: 4.70.1 revision: 0.7 size: 0x7528
*nbsp;Supported Ids: 3040, 2292, 2293, 3162, 3166, 3168
Performing Flash Authentication ...OK
UEM ID: 009DBDCA:2984DA60
Programming Content Pack ...
*nbsp;rh1050_nai5.80ic: 
*nbsp;[DCT4,DCT4 ALGORITHM] *nbsp;size: 141.12 KB
*nbsp;Supported Ids: 2292
Area [01380000-013AFFFF] erased in 1.297 s
Flash programming ...
Programming completed in 0.985 s
Extracting Content Pack, File Server fake reply for CUI phone.
Content Pack extracted successfully in 0.078 s
File Processed in 22.891 s
Processing file: rh105_v5.80ic
ASIC ID: 0x2292 [UPPCosto ver: 1.3]
*nbsp;u3_2nd.fia: [DCT4] version: 4.70.1 revision: 0.7 size: 0x9A8
*nbsp;Supported Ids: 3040, 2292, 2293, 3162, 3166, 3168
FlashID0: 00EC 2268 [Samsung K8S3215ETE,32 Mbits] page size: 64 K type: NOR area: 01000000-013FFFFF
FlashID1: 0000 0001 [unused/removed] 
ExtBUSC: AD7E B61A 1BBE 0BE2 7D58 6BE4 DBEE 6514 
*nbsp;u3_amd.fia: [DCT4 ALGORITHM] version: 4.70.1 revision: 0.7 size: 0x7528
*nbsp;Supported Ids: 3040, 2292, 2293, 3162, 3166, 3168
Performing Flash Authentication ...OK
UEM ID: 009DBDCA:2984DA60
Programming PPM ...
*nbsp;rh105_v5.80ic: 
*nbsp;[DCT4,DCT4 ALGORITHM] *nbsp;size: 1.18 MB
*nbsp;Supported Ids: 2292
Area [01240000-0124FFFF] erased in 0.453 s
Area [01250000-0137FFFF] erased in 7.907 s
Flash programming ...
Programming completed in 7.922 s
File Processed in 35.828 s
Flashing completed in 1 min 56.359 s
*nbsp;
After Flash Processing ...
Reseting Factory Values OK.
Uploading PM 
Writing PMM C:\mobileEx\3.2\data\backup\PM\1208 Rh-105_.pm
Range: 1 - 242
Section: 1, 7 key(s)
*nbsp;- Key: 0, size 120 bytes written.
*nbsp;- Key: 1, size 426 bytes written.
*nbsp;- Key: 2, size 42 bytes written.
*nbsp;- Key: 4, size 110 bytes written.
*nbsp;- Key: 6, size 42 bytes written.
*nbsp;- Key: 12, size 2 bytes written.
*nbsp;- Key: 16, size 2 bytes written.
Section: 2, 1 key(s)
*nbsp;- Key: 0, size 424 bytes written.
Section: 3, 1 key(s)
*nbsp;- Key: 0, size 2 bytes written.
Section: 4, 8 key(s)
*nbsp;- Key: 0, size 1 bytes written.
*nbsp;- Key: 1, size 16 bytes written.
*nbsp;- Key: 2, size 44 bytes written.
*nbsp;- Key: 3, size 10 bytes written.
*nbsp;- Key: 4, size 8 bytes written.
*nbsp;- Key: 5, size 8 bytes written.
*nbsp;- Key: 6, size 8 bytes written.
*nbsp;- Key: 9, size 5 bytes written.
Section: 5, 1 key(s)
*nbsp;- Key: 0, size 78 bytes written.
Section: 7, 3 key(s)
*nbsp;- Key: 0, size 4 bytes written.
*nbsp;- Key: 1, size 32 bytes written.
*nbsp;- Key: 2, size 4 bytes written.
Section: 8, 1 key(s)
*nbsp;- Key: 0, size 12 bytes written.
Section: 11, 115 key(s)
*nbsp;- Key: 0, size 4 bytes written.
*nbsp;- Key: 1, size 4 bytes written.
*nbsp;- Key: 2, size 4 bytes written.
*nbsp;- Key: 3, size 4 bytes written.
*nbsp;- Key: 4, size 1 bytes written.
*nbsp;- Key: 5, size 6 bytes written.
*nbsp;- Key: 6, size 4 bytes written.
*nbsp;- Key: 7, size 2 bytes written.
*nbsp;- Key: 8, size 1 bytes written.
*nbsp;- Key: 9, size 4 bytes written.
*nbsp;- Key: 10, size 36 bytes written.
*nbsp;- Key: 11, size 2 bytes written.
*nbsp;- Key: 12, size 1 bytes written.
*nbsp;- Key: 13, size 1 bytes written.
*nbsp;- Key: 14, size 1 bytes written.
*nbsp;- Key: 15, size 1 bytes written.
*nbsp;- Key: 16, size 8 bytes written.
*nbsp;- Key: 17, size 1 bytes written.
*nbsp;- Key: 18, size 1 bytes written.
*nbsp;- Key: 19, size 4 bytes written.
*nbsp;- Key: 20, size 2 bytes written.
*nbsp;- Key: 21, size 2 bytes written.
*nbsp;- Key: 22, size 1 bytes written.
*nbsp;- Key: 23, size 8 bytes written.
*nbsp;- Key: 24, size 1 bytes written.
*nbsp;- Key: 25, size 2 bytes written.
*nbsp;- Key: 26, size 2 bytes written.
*nbsp;- Key: 27, size 2 bytes written.
*nbsp;- Key: 28, size 2 bytes written.
*nbsp;- Key: 29, size 2 bytes written.
*nbsp;- Key: 30, size 4 bytes written.
*nbsp;- Key: 31, size 4 bytes written.
*nbsp;- Key: 32, size 4 bytes written.
*nbsp;- Key: 33, size 4 bytes written.
*nbsp;- Key: 34, size 4 bytes written.
*nbsp;- Key: 35, size 4 bytes written.
*nbsp;- Key: 36, size 16 bytes written.
*nbsp;- Key: 37, size 4 bytes written.
*nbsp;- Key: 38, size 2 bytes written.
*nbsp;- Key: 39, size 4 bytes written.
*nbsp;- Key: 40, size 2 bytes written.
*nbsp;- Key: 41, size 2 bytes written.
*nbsp;- Key: 42, size 1 bytes written.
*nbsp;- Key: 43, size 1 bytes written.
*nbsp;- Key: 44, size 4 bytes written.
*nbsp;- Key: 45, size 4 bytes written.
*nbsp;- Key: 46, size 4 bytes written.
*nbsp;- Key: 47, size 4 bytes written.
*nbsp;- Key: 48, size 4 bytes written.
*nbsp;- Key: 49, size 4 bytes written.
*nbsp;- Key: 50, size 4 bytes written.
*nbsp;- Key: 51, size 4 bytes written.
*nbsp;- Key: 52, size 4 bytes written.
*nbsp;- Key: 53, size 4 bytes written.
*nbsp;- Key: 54, size 4 bytes written.
*nbsp;- Key: 55, size 4 bytes written.
*nbsp;- Key: 56, size 4 bytes written.
*nbsp;- Key: 57, size 4 bytes written.
*nbsp;- Key: 58, size 4 bytes written.
*nbsp;- Key: 59, size 4 bytes written.
*nbsp;- Key: 60, size 4 bytes written.
*nbsp;- Key: 61, size 4 bytes written.
*nbsp;- Key: 62, size 4 bytes written.
*nbsp;- Key: 63, size 4 bytes written.
*nbsp;- Key: 64, size 4 bytes written.
*nbsp;- Key: 65, size 4 bytes written.
*nbsp;- Key: 66, size 4 bytes written.
*nbsp;- Key: 67, size 4 bytes written.
*nbsp;- Key: 68, size 4 bytes written.
*nbsp;- Key: 69, size 4 bytes written.
*nbsp;- Key: 70, size 4 bytes written.
*nbsp;- Key: 71, size 4 bytes written.
*nbsp;- Key: 72, size 4 bytes written.
*nbsp;- Key: 73, size 4 bytes written.
*nbsp;- Key: 74, size 4 bytes written.
*nbsp;- Key: 75, size 4 bytes written.
*nbsp;- Key: 76, size 4 bytes written.
*nbsp;- Key: 77, size 4 bytes written.
*nbsp;- Key: 78, size 4 bytes written.
*nbsp;- Key: 79, size 4 bytes written.
*nbsp;- Key: 80, size 4 bytes written.
*nbsp;- Key: 81, size 4 bytes written.
*nbsp;- Key: 82, size 2 bytes written.
*nbsp;- Key: 83, size 4 bytes written.
*nbsp;- Key: 84, size 2 bytes written.
*nbsp;- Key: 85, size 1 bytes written.
*nbsp;- Key: 86, size 16 bytes written.
*nbsp;- Key: 87, size 88 bytes written.
*nbsp;- Key: 88, size 2 bytes written.
*nbsp;- Key: 89, size 4 bytes written.
*nbsp;- Key: 90, size 2 bytes written.
*nbsp;- Key: 91, size 2 bytes written.
*nbsp;- Key: 92, size 2 bytes written.
*nbsp;- Key: 93, size 2 bytes written.
*nbsp;- Key: 94, size 2 bytes written.
*nbsp;- Key: 95, size 2 bytes written.
*nbsp;- Key: 96, size 2 bytes written.
*nbsp;- Key: 97, size 2 bytes written.
*nbsp;- Key: 98, size 2 bytes written.
*nbsp;- Key: 99, size 2 bytes written.
*nbsp;- Key: 100, size 2 bytes written.
*nbsp;- Key: 101, size 2 bytes written.
*nbsp;- Key: 102, size 2 bytes written.
*nbsp;- Key: 103, size 2 bytes written.
*nbsp;- Key: 104, size 2 bytes written.
*nbsp;- Key: 105, size 2 bytes written.
*nbsp;- Key: 106, size 2 bytes written.
*nbsp;- Key: 107, size 2 bytes written.
*nbsp;- Key: 108, size 2 bytes written.
*nbsp;- Key: 109, size 2 bytes written.
*nbsp;- Key: 110, size 2 bytes written.
*nbsp;- Key: 111, size 2 bytes written.
*nbsp;- Key: 112, size 2 bytes written.
*nbsp;- Key: 113, size 2 bytes written.
*nbsp;- Key: 114, size 2 bytes written.
Section: 12, 1 key(s)
*nbsp;- Key: 0, size 2 bytes written.
Section: 13, 200 key(s)
*nbsp;- Key: 0, size 70 bytes written.
*nbsp;- Key: 1, size 70 bytes written.
*nbsp;- Key: 2, size 70 bytes written.
*nbsp;- Key: 3, size 70 bytes written.
*nbsp;- Key: 4, size 70 bytes written.
*nbsp;- Key: 5, size 70 bytes written.
*nbsp;- Key: 6, size 70 bytes written.
*nbsp;- Key: 7, size 70 bytes written.
*nbsp;- Key: 8, size 70 bytes written.
*nbsp;- Key: 9, size 70 bytes written.
*nbsp;- Key: 10, size 70 bytes written.
*nbsp;- Key: 11, size 70 bytes written.
*nbsp;- Key: 12, size 70 bytes written.
*nbsp;- Key: 13, size 70 bytes written.
*nbsp;- Key: 14, size 70 bytes written.
*nbsp;- Key: 15, size 70 bytes written.
*nbsp;- Key: 16, size 70 bytes written.
*nbsp;- Key: 17, size 70 bytes written.
*nbsp;- Key: 18, size 70 bytes written.
*nbsp;- Key: 19, size 70 bytes written.
*nbsp;- Key: 20, size 70 bytes written.
*nbsp;- Key: 21, size 70 bytes written.
*nbsp;- Key: 22, size 70 bytes written.
*nbsp;- Key: 23, size 70 bytes written.
*nbsp;- Key: 24, size 70 bytes written.
*nbsp;- Key: 25, size 70 bytes written.
*nbsp;- Key: 26, size 70 bytes written.
*nbsp;- Key: 27, size 70 bytes written.
*nbsp;- Key: 28, size 70 bytes written.
*nbsp;- Key: 29, size 70 bytes written.
*nbsp;- Key: 30, size 70 bytes written.
*nbsp;- Key: 31, size 70 bytes written.
*nbsp;- Key: 32, size 70 bytes written.
*nbsp;- Key: 33, size 70 bytes written.
*nbsp;- Key: 34, size 70 bytes written.
*nbsp;- Key: 35, size 70 bytes written.
*nbsp;- Key: 36, size 70 bytes written.
*nbsp;- Key: 37, size 70 bytes written.
*nbsp;- Key: 38, size 70 bytes written.
*nbsp;- Key: 39, size 70 bytes written.
*nbsp;- Key: 40, size 70 bytes written.
*nbsp;- Key: 41, size 70 bytes written.
*nbsp;- Key: 42, size 70 bytes written.
*nbsp;- Key: 43, size 70 bytes written.
*nbsp;- Key: 44, size 70 bytes written.
*nbsp;- Key: 45, size 70 bytes written.
*nbsp;- Key: 46, size 70 bytes written.
*nbsp;- Key: 47, size 70 bytes written.
*nbsp;- Key: 48, size 70 bytes written.
*nbsp;- Key: 49, size 70 bytes written.
*nbsp;- Key: 50, size 70 bytes written.
*nbsp;- Key: 51, size 70 bytes written.
*nbsp;- Key: 52, size 70 bytes written.
*nbsp;- Key: 53, size 70 bytes written.
*nbsp;- Key: 54, size 70 bytes written.
*nbsp;- Key: 55, size 70 bytes written.
*nbsp;- Key: 56, size 70 bytes written.
*nbsp;- Key: 57, size 70 bytes written.
*nbsp;- Key: 58, size 70 bytes written.
*nbsp;- Key: 59, size 70 bytes written.
*nbsp;- Key: 60, size 70 bytes written.
*nbsp;- Key: 61, size 70 bytes written.
*nbsp;- Key: 62, size 70 bytes written.
*nbsp;- Key: 63, size 70 bytes written.
*nbsp;- Key: 64, size 70 bytes written.
*nbsp;- Key: 65, size 70 bytes written.
*nbsp;- Key: 66, size 70 bytes written.
*nbsp;- Key: 67, size 70 bytes written.
*nbsp;- Key: 68, size 70 bytes written.
*nbsp;- Key: 69, size 70 bytes written.
*nbsp;- Key: 70, size 70 bytes written.
*nbsp;- Key: 71, size 70 bytes written.
*nbsp;- Key: 72, size 70 bytes written.
*nbsp;- Key: 73, size 70 bytes written.
*nbsp;- Key: 74, size 70 bytes written.
*nbsp;- Key: 75, size 70 bytes written.
*nbsp;- Key: 76, size 70 bytes written.
*nbsp;- Key: 77, size 70 bytes written.
*nbsp;- Key: 78, size 70 bytes written.
*nbsp;- Key: 79, size 70 bytes written.
*nbsp;- Key: 80, size 70 bytes written.
*nbsp;- Key: 81, size 70 bytes written.
*nbsp;- Key: 82, size 70 bytes written.
*nbsp;- Key: 83, size 70 bytes written.
*nbsp;- Key: 84, size 70 bytes written.
*nbsp;- Key: 85, size 70 bytes written.
*nbsp;- Key: 86, size 70 bytes written.
*nbsp;- Key: 87, size 70 bytes written.
*nbsp;- Key: 88, size 70 bytes written.
*nbsp;- Key: 89, size 70 bytes written.
*nbsp;- Key: 90, size 70 bytes written.
*nbsp;- Key: 91, size 70 bytes written.
*nbsp;- Key: 92, size 70 bytes written.
*nbsp;- Key: 93, size 70 bytes written.
*nbsp;- Key: 94, size 70 bytes written.
*nbsp;- Key: 95, size 70 bytes written.
*nbsp;- Key: 96, size 70 bytes written.
*nbsp;- Key: 97, size 70 bytes written.
*nbsp;- Key: 98, size 70 bytes written.
*nbsp;- Key: 99, size 70 bytes written.
*nbsp;- Key: 100, size 70 bytes written.
*nbsp;- Key: 101, size 70 bytes written.
*nbsp;- Key: 102, size 70 bytes written.
*nbsp;- Key: 103, size 70 bytes written.
*nbsp;- Key: 104, size 70 bytes written.
*nbsp;- Key: 105, size 70 bytes written.
*nbsp;- Key: 106, size 70 bytes written.
*nbsp;- Key: 107, size 70 bytes written.
*nbsp;- Key: 108, size 70 bytes written.
*nbsp;- Key: 109, size 70 bytes written.
*nbsp;- Key: 110, size 70 bytes written.
*nbsp;- Key: 111, size 70 bytes written.
*nbsp;- Key: 112, size 70 bytes written.
*nbsp;- Key: 113, size 70 bytes written.
*nbsp;- Key: 114, size 70 bytes written.
*nbsp;- Key: 115, size 70 bytes written.
*nbsp;- Key: 116, size 70 bytes written.
*nbsp;- Key: 117, size 70 bytes written.
*nbsp;- Key: 118, size 70 bytes written.
*nbsp;- Key: 119, size 70 bytes written.
*nbsp;- Key: 120, size 70 bytes written.
*nbsp;- Key: 121, size 70 bytes written.
*nbsp;- Key: 122, size 70 bytes written.
*nbsp;- Key: 123, size 70 bytes written.
*nbsp;- Key: 124, size 70 bytes written.
*nbsp;- Key: 125, size 70 bytes written.
*nbsp;- Key: 126, size 70 bytes written.
*nbsp;- Key: 127, size 70 bytes written.
*nbsp;- Key: 128, size 70 bytes written.
*nbsp;- Key: 129, size 70 bytes written.
*nbsp;- Key: 130, size 70 bytes written.
*nbsp;- Key: 131, size 70 bytes written.
*nbsp;- Key: 132, size 70 bytes written.
*nbsp;- Key: 133, size 70 bytes written.
*nbsp;- Key: 134, size 70 bytes written.
*nbsp;- Key: 135, size 70 bytes written.
*nbsp;- Key: 136, size 70 bytes written.
*nbsp;- Key: 137, size 70 bytes written.
*nbsp;- Key: 138, size 70 bytes written.
*nbsp;- Key: 139, size 70 bytes written.
*nbsp;- Key: 140, size 70 bytes written.
*nbsp;- Key: 141, size 70 bytes written.
*nbsp;- Key: 142, size 70 bytes written.
*nbsp;- Key: 143, size 70 bytes written.
*nbsp;- Key: 144, size 70 bytes written.
*nbsp;- Key: 145, size 70 bytes written.
*nbsp;- Key: 146, size 70 bytes written.
*nbsp;- Key: 147, size 70 bytes written.
*nbsp;- Key: 148, size 70 bytes written.
*nbsp;- Key: 149, size 70 bytes written.
*nbsp;- Key: 150, size 70 bytes written.
*nbsp;- Key: 151, size 70 bytes written.
*nbsp;- Key: 152, size 70 bytes written.
*nbsp;- Key: 153, size 70 bytes written.
*nbsp;- Key: 154, size 70 bytes written.
*nbsp;- Key: 155, size 70 bytes written.
*nbsp;- Key: 156, size 70 bytes written.
*nbsp;- Key: 157, size 70 bytes written.
*nbsp;- Key: 158, size 70 bytes written.
*nbsp;- Key: 159, size 70 bytes written.
*nbsp;- Key: 160, size 70 bytes written.
*nbsp;- Key: 161, size 70 bytes written.
*nbsp;- Key: 162, size 70 bytes written.
*nbsp;- Key: 163, size 70 bytes written.
*nbsp;- Key: 164, size 70 bytes written.
*nbsp;- Key: 165, size 70 bytes written.
*nbsp;- Key: 166, size 70 bytes written.
*nbsp;- Key: 167, size 70 bytes written.
*nbsp;- Key: 168, size 70 bytes written.
*nbsp;- Key: 169, size 70 bytes written.
*nbsp;- Key: 170, size 70 bytes written.
*nbsp;- Key: 171, size 70 bytes written.
*nbsp;- Key: 172, size 70 bytes written.
*nbsp;- Key: 173, size 70 bytes written.
*nbsp;- Key: 174, size 70 bytes written.
*nbsp;- Key: 175, size 70 bytes written.
*nbsp;- Key: 176, size 70 bytes written.
*nbsp;- Key: 177, size 70 bytes written.
*nbsp;- Key: 178, size 70 bytes written.
*nbsp;- Key: 179, size 70 bytes written.
*nbsp;- Key: 180, size 70 bytes written.
*nbsp;- Key: 181, size 70 bytes written.
*nbsp;- Key: 182, size 70 bytes written.
*nbsp;- Key: 183, size 70 bytes written.
*nbsp;- Key: 184, size 70 bytes written.
*nbsp;- Key: 185, size 70 bytes written.
*nbsp;- Key: 186, size 70 bytes written.
*nbsp;- Key: 187, size 70 bytes written.
*nbsp;- Key: 188, size 70 bytes written.
*nbsp;- Key: 189, size 70 bytes written.
*nbsp;- Key: 190, size 70 bytes written.
*nbsp;- Key: 191, size 70 bytes written.
*nbsp;- Key: 192, size 70 bytes written.
*nbsp;- Key: 193, size 70 bytes written.
*nbsp;- Key: 194, size 70 bytes written.
*nbsp;- Key: 195, size 70 bytes written.
*nbsp;- Key: 196, size 70 bytes written.
*nbsp;- Key: 197, size 70 bytes written.
*nbsp;- Key: 198, size 70 bytes written.
*nbsp;- Key: 199, size 70 bytes written.
Section: 14, 20 key(s)
*nbsp;- Key: 0, size 73 bytes written.
*nbsp;- Key: 1, size 73 bytes written.
*nbsp;- Key: 2, size 73 bytes written.
*nbsp;- Key: 3, size 73 bytes written.
*nbsp;- Key: 4, size 73 bytes written.
*nbsp;- Key: 5, size 73 bytes written.
*nbsp;- Key: 6, size 73 bytes written.
*nbsp;- Key: 7, size 73 bytes written.
*nbsp;- Key: 8, size 73 bytes written.
*nbsp;- Key: 9, size 73 bytes written.
*nbsp;- Key: 10, size 73 bytes written.
*nbsp;- Key: 11, size 73 bytes written.
*nbsp;- Key: 12, size 73 bytes written.
*nbsp;- Key: 13, size 73 bytes written.
*nbsp;- Key: 14, size 73 bytes written.
*nbsp;- Key: 15, size 73 bytes written.
*nbsp;- Key: 16, size 73 bytes written.
*nbsp;- Key: 17, size 73 bytes written.
*nbsp;- Key: 18, size 73 bytes written.
*nbsp;- Key: 19, size 73 bytes written.
Section: 15, 10 key(s)
*nbsp;- Key: 0, size 73 bytes written.
*nbsp;- Key: 1, size 73 bytes written.
*nbsp;- Key: 2, size 73 bytes written.
*nbsp;- Key: 3, size 73 bytes written.
*nbsp;- Key: 4, size 73 bytes written.
*nbsp;- Key: 5, size 73 bytes written.
*nbsp;- Key: 6, size 73 bytes written.
*nbsp;- Key: 7, size 73 bytes written.
*nbsp;- Key: 8, size 73 bytes written.
*nbsp;- Key: 9, size 73 bytes written.
Section: 16, 10 key(s)
*nbsp;- Key: 0, size 73 bytes written.
*nbsp;- Key: 1, size 73 bytes written.
*nbsp;- Key: 2, size 73 bytes written.
*nbsp;- Key: 3, size 73 bytes written.
*nbsp;- Key: 4, size 73 bytes written.
*nbsp;- Key: 5, size 73 bytes written.
*nbsp;- Key: 6, size 73 bytes written.
*nbsp;- Key: 7, size 73 bytes written.
*nbsp;- Key: 8, size 73 bytes written.
*nbsp;- Key: 9, size 73 bytes written.
Section: 17, 3 key(s)
*nbsp;- Key: 0, size 80 bytes written.
*nbsp;- Key: 1, size 80 bytes written.
*nbsp;- Key: 2, size 80 bytes written.
Section: 18, 1 key(s)
*nbsp;- Key: 0, size 2056 bytes written.
Section: 19, 1 key(s)
*nbsp;- Key: 0, size 15 bytes written.
Section: 22, 1 key(s)
*nbsp;- Key: 0, size 174 bytes written.
Section: 26, 30 key(s)
*nbsp;- Key: 0, size 302 bytes written.
*nbsp;- Key: 1, size 302 bytes written.
*nbsp;- Key: 2, size 302 bytes written.
*nbsp;- Key: 3, size 302 bytes written.
*nbsp;- Key: 4, size 302 bytes written.
*nbsp;- Key: 5, size 302 bytes written.
*nbsp;- Key: 6, size 302 bytes written.
*nbsp;- Key: 7, size 302 bytes written.
*nbsp;- Key: 8, size 302 bytes written.
*nbsp;- Key: 9, size 302 bytes written.
*nbsp;- Key: 10, size 302 bytes written.
*nbsp;- Key: 11, size 302 bytes written.
*nbsp;- Key: 12, size 302 bytes written.
*nbsp;- Key: 13, size 302 bytes written.
*nbsp;- Key: 14, size 302 bytes written.
*nbsp;- Key: 15, size 302 bytes written.
*nbsp;- Key: 16, size 302 bytes written.
*nbsp;- Key: 17, size 302 bytes written.
*nbsp;- Key: 18, size 302 bytes written.
*nbsp;- Key: 19, size 302 bytes written.
*nbsp;- Key: 20, size 302 bytes written.
*nbsp;- Key: 21, size 302 bytes written.
*nbsp;- Key: 22, size 302 bytes written.
*nbsp;- Key: 23, size 302 bytes written.
*nbsp;- Key: 24, size 302 bytes written.
*nbsp;- Key: 25, size 302 bytes written.
*nbsp;- Key: 26, size 302 bytes written.
*nbsp;- Key: 27, size 302 bytes written.
*nbsp;- Key: 28, size 302 bytes written.
*nbsp;- Key: 29, size 302 bytes written.
Section: 27, 8 key(s)
*nbsp;- Key: 0, size 142 bytes written.
*nbsp;- Key: 1, size 142 bytes written.
*nbsp;- Key: 2, size 142 bytes written.
*nbsp;- Key: 3, size 142 bytes written.
*nbsp;- Key: 4, size 142 bytes written.
*nbsp;- Key: 5, size 142 bytes written.
*nbsp;- Key: 6, size 142 bytes written.
*nbsp;- Key: 7, size 142 bytes written.
Section: 28, 8 key(s)
*nbsp;- Key: 0, size 16 bytes written.
*nbsp;- Key: 1, size 16 bytes written.
*nbsp;- Key: 2, size 16 bytes written.
*nbsp;- Key: 3, size 16 bytes written.
*nbsp;- Key: 4, size 16 bytes written.
*nbsp;- Key: 5, size 16 bytes written.
*nbsp;- Key: 6, size 16 bytes written.
*nbsp;- Key: 7, size 16 bytes written.
Section: 29, 5 key(s)
*nbsp;- Key: 0, size 304 bytes written.
*nbsp;- Key: 1, size 304 bytes written.
*nbsp;- Key: 2, size 304 bytes written.
*nbsp;- Key: 3, size 304 bytes written.
*nbsp;- Key: 4, size 304 bytes written.
Section: 30, 1 key(s)
*nbsp;- Key: 0, size 144 bytes written.
Section: 32, 3 key(s)
*nbsp;- Key: 0, size 10 bytes written.
*nbsp;- Key: 1, size 1 bytes written.
*nbsp;- Key: 2, size 2 bytes written.
Section: 33, 8 key(s)
*nbsp;- Key: 6, size 3 bytes written.
*nbsp;- Key: 7, size 3 bytes written.
*nbsp;- Key: 8, size 3 bytes written.
*nbsp;- Key: 9, size 3 bytes written.
*nbsp;- Key: 10, size 3 bytes written.
*nbsp;- Key: 11, size 3 bytes written.
*nbsp;- Key: 12, size 3 bytes written.
*nbsp;- Key: 13, size 3 bytes written.
Section: 34, 8 key(s)
*nbsp;- Key: 0, size 8 bytes written.
*nbsp;- Key: 1, size 8 bytes written.
*nbsp;- Key: 2, size 8 bytes written.
*nbsp;- Key: 3, size 8 bytes written.
*nbsp;- Key: 4, size 8 bytes written.
*nbsp;- Key: 5, size 8 bytes written.
*nbsp;- Key: 6, size 1 bytes written.
*nbsp;- Key: 7, size 1 bytes written.
Section: 35, 1 key(s)
*nbsp;- Key: 0, size 1 bytes written.
Section: 36, 18 key(s)
*nbsp;- Key: 0, size 32 bytes written.
*nbsp;- Key: 1, size 32 bytes written.
*nbsp;- Key: 2, size 1 bytes written.
*nbsp;- Key: 3, size 1 bytes written.
*nbsp;- Key: 4, size 1 bytes written.
*nbsp;- Key: 5, size 4 bytes written.
*nbsp;- Key: 6, size 4 bytes written.
*nbsp;- Key: 8, size 120 bytes written.
*nbsp;- Key: 9, size 1 bytes written.
*nbsp;- Key: 10, size 2 bytes written.
*nbsp;- Key: 11, size 6 bytes written.
*nbsp;- Key: 12, size 17 bytes written.
*nbsp;- Key: 13, size 3 bytes written.
*nbsp;- Key: 14, size 38 bytes written.
*nbsp;- Key: 15, size 38 bytes written.
*nbsp;- Key: 17, size 10 bytes written.
*nbsp;- Key: 18, size 6 bytes written.
*nbsp;- Key: 20, size 201 bytes written.
Section: 37, 1 key(s)
*nbsp;- Key: 0, size 1 bytes written.
Section: 38, 11 key(s)
*nbsp;- Key: 0, size 13 bytes written.
*nbsp;- Key: 1, size 13 bytes written.
*nbsp;- Key: 2, size 13 bytes written.
*nbsp;- Key: 3, size 13 bytes written.
*nbsp;- Key: 4, size 13 bytes written.
*nbsp;- Key: 5, size 13 bytes written.
*nbsp;- Key: 6, size 40 bytes written.
*nbsp;- Key: 7, size 40 bytes written.
*nbsp;- Key: 8, size 40 bytes written.
*nbsp;- Key: 9, size 40 bytes written.
*nbsp;- Key: 10, size 40 bytes written.
Section: 40, 8 key(s)
*nbsp;- Key: 0, size 6 bytes written.
*nbsp;- Key: 1, size 6 bytes written.
*nbsp;- Key: 2, size 6 bytes written.
*nbsp;- Key: 3, size 6 bytes written.
*nbsp;- Key: 4, size 6 bytes written.
*nbsp;- Key: 5, size 6 bytes written.
*nbsp;- Key: 6, size 6 bytes written.
*nbsp;- Key: 7, size 6 bytes written.
Section: 41, 1 key(s)
*nbsp;- Key: 0, size 10 bytes written.
Section: 46, 2 key(s)
*nbsp;- Key: 0, size 1 bytes written.
*nbsp;- Key: 1, size 2 bytes written.
Section: 54, 1 key(s)
*nbsp;- Key: 0, size 4 bytes written.
Section: 57, 1 key(s)
*nbsp;- Key: 0, size 39 bytes written.
Section: 60, 1 key(s)
*nbsp;- Key: 0, size 8 bytes written.
Section: 61, 1 key(s)
*nbsp;- Key: 0, size 4 bytes written.
Section: 68, 20 key(s)
*nbsp;- Key: 0, size 20 bytes written.
*nbsp;- Key: 1, size 20 bytes written.
*nbsp;- Key: 2, size 20 bytes written.
*nbsp;- Key: 3, size 20 bytes written.
*nbsp;- Key: 4, size 20 bytes written.
*nbsp;- Key: 5, size 20 bytes written.
*nbsp;- Key: 6, size 20 bytes written.
*nbsp;- Key: 7, size 20 bytes written.
*nbsp;- Key: 8, size 20 bytes written.
*nbsp;- Key: 9, size 20 bytes written.
*nbsp;- Key: 10, size 20 bytes written.
*nbsp;- Key: 11, size 20 bytes written.
*nbsp;- Key: 12, size 20 bytes written.
*nbsp;- Key: 13, size 20 bytes written.
*nbsp;- Key: 14, size 20 bytes written.
*nbsp;- Key: 15, size 20 bytes written.
*nbsp;- Key: 16, size 20 bytes written.
*nbsp;- Key: 17, size 20 bytes written.
*nbsp;- Key: 18, size 20 bytes written.
*nbsp;- Key: 19, size 20 bytes written.
Section: 73, 3 key(s)
*nbsp;- Key: 0, size 74 bytes written.
*nbsp;- Key: 1, size 20 bytes written.
*nbsp;- Key: 2, size 360 bytes written.
Section: 74, 1 key(s)
*nbsp;- Key: 0, size 3 bytes written.
Section: 91, 1 key(s)
*nbsp;- Key: 0, size 174 bytes written.
Section: 93, 5 key(s)
*nbsp;- Key: 0, size 40 bytes written.
*nbsp;- Key: 1, size 40 bytes written.
*nbsp;- Key: 2, size 40 bytes written.
*nbsp;- Key: 3, size 40 bytes written.
*nbsp;- Key: 4, size 40 bytes written.
Section: 100, 1 key(s)
*nbsp;- Key: 0, size 2 bytes written.
Section: 101, 10 key(s)
*nbsp;- Key: 0, size 4 bytes written.
*nbsp;- Key: 1, size 3 bytes written.
*nbsp;- Key: 2, size 6 bytes written.
*nbsp;- Key: 3, size 1 bytes written.
*nbsp;- Key: 4, size 9 bytes written.
*nbsp;- Key: 5, size 10 bytes written.
*nbsp;- Key: 6, size 8 bytes written.
*nbsp;- Key: 13, size 3 bytes written.
*nbsp;- Key: 14, size 3 bytes written.
*nbsp;- Key: 16, size 40 bytes written.
Section: 109, 1 key(s)
*nbsp;- Key: 0, size 102 bytes written.
Section: 111, 1 key(s)
*nbsp;- Key: 0, size 8 bytes written.
Section: 237, 1 key(s)
*nbsp;- Key: 0, size 6 bytes written.
Section: 239, 14 key(s)
*nbsp;- Key: 15, size 16 bytes written.
*nbsp;- Key: 16, size 16 bytes written.
*nbsp;- Key: 17, size 16 bytes written.
*nbsp;- Key: 18, size 16 bytes written.
*nbsp;- Key: 19, size 16 bytes written.
*nbsp;- Key: 20, size 16 bytes written.
*nbsp;- Key: 21, size 16 bytes written.
*nbsp;- Key: 22, size 16 bytes written.
*nbsp;- Key: 23, size 16 bytes written.
*nbsp;- Key: 24, size 16 bytes written.
*nbsp;- Key: 25, size 16 bytes written.
*nbsp;- Key: 26, size 16 bytes written.
*nbsp;- Key: 27, size 16 bytes written.
*nbsp;- Key: 28, size 16 bytes written.
Section: 242, 3 key(s)
Warning: failed to write 242 - 0 (8 bytes)
Warning: failed to write 242 - 1 (64 bytes)
Warning: failed to write 242 - 2 (8 bytes)
Completed in 31.547 s
*nbsp;
PhoneType:RH-105
SwVersion: V 5.80 14-11-08 RH-105 (c) NMP 
MCU file: rh105_v5.80
Trying to find patch position ...OK, case id: 3
*nbsp;
ASIC ID: 0x2292 [UPPCosto ver: 1.3]
*nbsp;u3_2nd.fia: [DCT4] version: 4.70.1 revision: 0.7 size: 0x9A8
*nbsp;Supported Ids: 3040, 2292, 2293, 3162, 3166, 3168
FlashID0: 00EC 2268 [Samsung K8S3215ETE,32 Mbits] page size: 64 K type: NOR area: 01000000-013FFFFF
FlashID1: 0000 0001 [unused/removed] 
ExtBUSC: AD7E B61A 1BBE 0BE2 7D58 6BE4 DBEE 6514 
*nbsp;u3_amd.fia: [DCT4 ALGORITHM] version: 4.70.1 revision: 0.7 size: 0x7528
*nbsp;Supported Ids: 3040, 2292, 2293, 3162, 3166, 3168
Performing Flash Authentication ...OK
UEM ID: 009DBDCA:2984DA60
Area [01000000-0101FFFF] erased in 0.796 s
Area [01160000-0117FFFF] erased in 0.844 s
Programming ...
Programming completed.
Updating SIMLOCK *nbsp;...OK
Completed in 21.312 s
*nbsp;
*nbsp;
Phone Type: RH-105 
SW Version: V 5.80 14-11-08 RH-105 (c) NMP 
Imei plain: 35931202684766-1
Product Code: 0549920
Cellular System: GSM
ASIC ID: 0x2292, type: 11
Ppm Id: IA
Language Pack:
- not available.

*nbsp;
Imei net: 35931202684766
Provider: ALL Operator, Country: -
Counter: 0/3, 0/10
*nbsp;
CONFIG_DATA: 0010100000000000
PROFILE_BITS: 800000000001000B
*nbsp;
BLOCK 1: *nbsp; 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 2: *nbsp; 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 3: *nbsp; 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 4: *nbsp; 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 5: *nbsp; 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 6: *nbsp; 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 7: *nbsp; 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
Total time to process is 3 min 2.734 s
 

JannatLui

Well-known Member
Joined
Sep 1, 2010
Posts
2,836
Likes
14
answer: [MXKEY - INFO] Successfully Unlocked/repaired Phones By MXKey

6555 rm-271unlock successfully

Code:
Provider: Movistar (DCT4), Country: Spain
Counter: 0/3, 0/10
*nbsp;
CONFIG_DATA: 2140700000000000
PROFILE_BITS: 8000000000000000
*nbsp;
BLOCK 1: *nbsp; 1=LOCKED (MCC+MNC): 21407F, DATA=21407F
BLOCK 2: *nbsp; 1=LOCKED (MCC+MNC): 21402F, DATA=21402F
*nbsp;
Backup saved to *quot;BB5_356984012118498_SIMLOCK.back*quot;
*nbsp;
ROOT KEY HASH: BAF3A9C3DBFA8454937DB77F2B8852B1
ROM ID: 273F6D55DFAAF68F
*nbsp;
Sending bootloader, size: 0x3C00 ...
Calculating data ...OK
Writing PM buffer ... OK
Completed in 19.235 s
Restarting phone ...
*nbsp;
Reading Simlock info ...
Provider: ALL Operator, Country: -
Counter: 0/3, 0/10
*nbsp;
CONFIG_DATA: 0010100000000000
PROFILE_BITS: 8000000000000000
*nbsp;
BLOCK 1: *nbsp; 1=OPEN, DATA=00101F
 

JannatLui

Well-known Member
Joined
Sep 1, 2010
Posts
2,836
Likes
14
answer: [MXKEY - INFO] Successfully Unlocked/repaired Phones By MXKey

7390 rm-209 successful flash repair
UFS as interface


Code:
Processing file: rm209__05.50.mcusw
RAP Data :
SYSTEM ASIC ID: 000000010000022600010006010C192101001101 [RAPGSM ver: 1.1]
EM1 ID: 00000232
EM2 ID: 00000353
PUBLIC ID: 03E00003A51C6B5614A8F59BBEFAFDAAC7573129
ASIC MODE ID: 00
ROOT KEY HASH: BAF3A9C3DBFA8454937DB77F2B8852B1
ROM ID: 191EC665DFAAF68F
*nbsp;rap3gv3_2nd.fg: [BB5] version: 1.30.0 revision: 0.0 size: 0x3C00
*nbsp;Supported RAP Ids: 0103192101003000, 010C192101003000,  *nbsp;0103192101013000, 010C192101013000, 0103192101003100,  010C192101003100, *nbsp;0303192101023000, 030C192101023000,  0303192101033000, 030C192101033000, *nbsp;0103192101001101,  010C192101001101, 0003192101001002, 000C192101001002,  *nbsp;0013192101001002, 001C192101001002
FlashID0: 0001 002F *nbsp;- 0000 6921 [AMD S29NS256N,256 Mbits] type: NOR,RAP 
ExtBUSC: FFFF FFFF FFFF FFFF FFFF FFFF FFFF FFFF 
ExtDEVC: FFFF 0000 - 0000 0000
*nbsp;RAP3Gv3_algo.fg: [BB5 ALGORITHM] version: 1.33.1 revision: 0.0 size: 0x29878
*nbsp;Supported RAP Ids: 0103192101003000, 010C192101003000,  *nbsp;0103192101013000, 010C192101013000, 0103192101003100,  010C192101003100, *nbsp;0303192101023000, 030C192101023000,  0303192101033000, 030C192101033000, *nbsp;0003192101002000,  000C192101002000, 0003192101002100, 000C192101002100,  *nbsp;0003192101002200, 000C192101002200, 0003192101012200,  000C192101012200, *nbsp;0103192101001101, 010C192101001101,  0003192101001002, 000C192101001002, *nbsp;0013192101001002,  001C192101001002
RAP PAPUBKEYS is blank/erased.
Programming MCU ...
*nbsp;rm209__05.50.mcusw: 
*nbsp;[BB5,BB5 ALGORITHM] *nbsp;size: 14.44 MB
*nbsp;Supported RAP Ids: 0103192101001101, 010C192101001101
Total erase size: 16.37 MB
CMT NOR area [00000000-000006BF] erased in 0.062 s
CMT NOR area [000006C0-0001FFFF] erased in 2.672 s
CMT NOR area [00020000-0007FFFF] erased in 7.234 s
CMT NOR area [00080000-000DFFFF] erased in 2.719 s
CMT NOR area [00100000-001FFFFF] erased in 2.984 s
CMT NOR area [00200000-0031FFFF] erased in 3.000 s
CMT NOR area [00320000-0105FFFF] erased in 4.875 s
CMT NOR area [01060000-01067FFF] erased in 2.813 s
CMT NOR area [01068000-0107FFFF] erased in 2.703 s
Flash programming ...
Selecting first PAPUB block with matching CMT RootKey, CMT PAPUBKEYS, RAP Certificate v.1.0 written.
Programming completed in 1 min 37.719 s
Processing file: rm209__05.50.ppm_c
RAP Data :
SYSTEM ASIC ID: 000000010000022600010006010C192101001101 [RAPGSM ver: 1.1]
EM1 ID: 00000232
EM2 ID: 00000353
PUBLIC ID: 03E00003A51C6B5614A8F59BBEFAFDAAC7573129
ASIC MODE ID: 00
ROOT KEY HASH: BAF3A9C3DBFA8454937DB77F2B8852B1
ROM ID: 191EC665DFAAF68F
*nbsp;rap3gv3_2nd.fg: [BB5] version: 1.30.0 revision: 0.0 size: 0x3C00
*nbsp;Supported RAP Ids: 0103192101003000, 010C192101003000,  *nbsp;0103192101013000, 010C192101013000, 0103192101003100,  010C192101003100, *nbsp;0303192101023000, 030C192101023000,  0303192101033000, 030C192101033000, *nbsp;0103192101001101,  010C192101001101, 0003192101001002, 000C192101001002,  *nbsp;0013192101001002, 001C192101001002
FlashID0: 0001 002F *nbsp;- 0000 6921 [AMD S29NS256N,256 Mbits] type: NOR,RAP 
ExtBUSC: 0000 0000 0000 0000 0000 0000 0000 0000 
ExtDEVC: FFFF 0000 - 0000 0000
*nbsp;RAP3Gv3_algo.fg: [BB5 ALGORITHM] version: 1.33.1 revision: 0.0 size: 0x29878
*nbsp;Supported RAP Ids: 0103192101003000, 010C192101003000,  *nbsp;0103192101013000, 010C192101013000, 0103192101003100,  010C192101003100, *nbsp;0303192101023000, 030C192101023000,  0303192101033000, 030C192101033000, *nbsp;0003192101002000,  000C192101002000, 0003192101002100, 000C192101002100,  *nbsp;0003192101002200, 000C192101002200, 0003192101012200,  000C192101012200, *nbsp;0103192101001101, 010C192101001101,  0003192101001002, 000C192101001002, *nbsp;0013192101001002,  001C192101001002
RAP PAPUBKEYS ID: 50B1B4F65829FE94B06088AE470164C9426BD29E
Programming PPM ...
*nbsp;rm209__05.50.ppm_c: 
*nbsp;[BB5,BB5 ALGORITHM] *nbsp;size: 4.55 MB
*nbsp;Supported RAP Ids: 0103192101001101, 010C192101001101
Total erase size: 5.50 MB
CMT NOR area [01080000-015FFFFF] erased in 21.703 s
Flash programming ...
Programming completed in 28.047 s
Processing file: rm209__05.50.image_c
NOR page size in the phone is 128 K.
RAP Data :
SYSTEM ASIC ID: 000000010000022600010006010C192101001101 [RAPGSM ver: 1.1]
EM1 ID: 00000232
EM2 ID: 00000353
PUBLIC ID: 03E00003A51C6B5614A8F59BBEFAFDAAC7573129
ASIC MODE ID: 00
ROOT KEY HASH: BAF3A9C3DBFA8454937DB77F2B8852B1
ROM ID: 191EC665DFAAF68F
*nbsp;rap3gv3_2nd.fg: [BB5] version: 1.30.0 revision: 0.0 size: 0x3C00
*nbsp;Supported RAP Ids: 0103192101003000, 010C192101003000,  *nbsp;0103192101013000, 010C192101013000, 0103192101003100,  010C192101003100, *nbsp;0303192101023000, 030C192101023000,  0303192101033000, 030C192101033000, *nbsp;0103192101001101,  010C192101001101, 0003192101001002, 000C192101001002,  *nbsp;0013192101001002, 001C192101001002
FlashID0: 0001 002F *nbsp;- 0000 6921 [AMD S29NS256N,256 Mbits] type: NOR,RAP 
ExtBUSC: 0000 0000 0000 0000 0000 0000 0000 0000 
ExtDEVC: FFFF 0000 - 0000 0000
*nbsp;RAP3Gv3_algo.fg: [BB5 ALGORITHM] version: 1.33.1 revision: 0.0 size: 0x29878
*nbsp;Supported RAP Ids: 0103192101003000, 010C192101003000,  *nbsp;0103192101013000, 010C192101013000, 0103192101003100,  010C192101003100, *nbsp;0303192101023000, 030C192101023000,  0303192101033000, 030C192101033000, *nbsp;0003192101002000,  000C192101002000, 0003192101002100, 000C192101002100,  *nbsp;0003192101002200, 000C192101002200, 0003192101012200,  000C192101012200, *nbsp;0103192101001101, 010C192101001101,  0003192101001002, 000C192101001002, *nbsp;0013192101001002,  001C192101001002
RAP PAPUBKEYS ID: 50B1B4F65829FE94B06088AE470164C9426BD29E
Programming Content Pack ...
*nbsp;rm209__05.50.image_c: 
*nbsp;[BB5,BB5 ALGORITHM] page size: 64 K *nbsp;size: 2.82 MB
*nbsp;Supported RAP Ids: 0103192101001101, 010C192101001101
Total erase size: 9.87 MB
CMT NOR area [01600000-01FDFFFF] erased in 52.171 s
Converting UCP blocks to 128 K.
Flash programming ...
Programming completed in 17.187 s
Flashing completed in 4 min 48.110 s
*nbsp;
*nbsp;
Phone Type: RM-209 (Nokia 7373)
SW Version: V 05.50 14-08-07 RM-209 (c) Nokia. *nbsp; *nbsp; *nbsp; *nbsp; *nbsp; *nbsp;
Imei plain: 35629101381319-6
Product Code: 0535813
VariantId: C
Language Pack:
- not available.

SIMLOCK seems to be valid
SUPERDONGLE_KEY seems to be valid
SIMLOCK_TEST passed
SECURITY_TEST passed
*nbsp;
*nbsp;
Provider: Nokia Test, Country: Finland
Counter: 0/3, 0/10
*nbsp;
CONFIG_DATA: 2440700000000000
PROFILE_BITS: 0000000000000000
*nbsp;
BLOCK 1: *nbsp; 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 2: *nbsp; 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 3: *nbsp; 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 4: *nbsp; 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 5: *nbsp; 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 6: *nbsp; 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 7: *nbsp; 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
Total time to process is 5 min 5.391 s
 

JannatLui

Well-known Member
Joined
Sep 1, 2010
Posts
2,836
Likes
14
answer: [MXKEY - INFO] Successfully Unlocked/repaired Phones By MXKey

ONE MORE NOKIA 3110c RM-237 REPAIRED SUCESSFULLY

Code:
RAP Data :
SYSTEM ASIC ID: 000000010000022600010006010C192101001101 [RAPGSM ver: 1.1]
EM1 ID: 00000232
EM2 ID: 00000353
PUBLIC ID: 06B0000BCB4A7C56BDA07B9D744CBAE75E737339
ASIC MODE ID: 00
ROOT KEY HASH: BAF3A9C3DBFA8454937DB77F2B8852B1
ROM ID: 191EC665DFAAF68F
*nbsp;rap3gv3_2nd.fg: [BB5] version: 1.30.0 revision: 0.0 size: 0x3C00
*nbsp;Supported RAP Ids: 0103192101003000, 010C192101003000,  *nbsp;0103192101013000, 010C192101013000, 0103192101003100,  010C192101003100, *nbsp;0303192101023000, 030C192101023000,  0303192101033000, 030C192101033000, *nbsp;0103192101001101,  010C192101001101, 0003192101001002, 000C192101001002,  *nbsp;0013192101001002, 001C192101001002
FlashID0: 0089 8981 *nbsp;- 0000 0000 [Intel ] type: NOR,RAP 
ExtBUSC: 0000 0000 0000 0000 0000 0000 0000 0000 
ExtDEVC: FFFF 0000 - 0000 0000
*nbsp;RAP3Gv3_algo.fg: [BB5 ALGORITHM] version: 1.33.1 revision: 0.0 size: 0x29878
*nbsp;Supported RAP Ids: 0103192101003000, 010C192101003000,  *nbsp;0103192101013000, 010C192101013000, 0103192101003100,  010C192101003100, *nbsp;0303192101023000, 030C192101023000,  0303192101033000, 030C192101033000, *nbsp;0003192101002000,  000C192101002000, 0003192101002100, 000C192101002100,  *nbsp;0003192101002200, 000C192101002200, 0003192101012200,  000C192101012200, *nbsp;0103192101001101, 010C192101001101,  0003192101001002, 000C192101001002, *nbsp;0013192101001002,  001C192101001002
RAP PAPUBKEYS ID: C0E691EA16A7593A9BB28832D7312A39F7ED668D
Reading RAP NPC (0x168 bytes).
Reading RAP VARIANT (0x0 bytes).
Reading RAP CCC (0x160 bytes).
Reading RAP HWC (0xD4 bytes).
Flash Imei: 35641802939910
NPC_DATA saved OK
CCC_DATA saved OK
HWC_DATA saved OK
WMDRM_PD_DATA saved OK
RF_DATA saved OK
WARRANTY_DATA saved OK
PROD_DATA saved OK
BT_DATA saved OK
LOCK_DATA saved OK
BB_DATA saved OK
RPL saved to *quot;C:\mobileEx\3.2\data\backup\RPL\BB5_35641802939910_back.rpl*quot; 
Processing file: rm237__07.21.mcusw
RAP Data :
SYSTEM ASIC ID: 000000010000022600010006010C192101001101 [RAPGSM ver: 1.1]
EM1 ID: 00000232
EM2 ID: 00000353
PUBLIC ID: 06B0000BCB4A7C56BDA07B9D744CBAE75E737339
ASIC MODE ID: 00
ROOT KEY HASH: BAF3A9C3DBFA8454937DB77F2B8852B1
ROM ID: 191EC665DFAAF68F
*nbsp;rap3gv3_2nd.fg: [BB5] version: 1.30.0 revision: 0.0 size: 0x3C00
*nbsp;Supported RAP Ids: 0103192101003000, 010C192101003000,  *nbsp;0103192101013000, 010C192101013000, 0103192101003100,  010C192101003100, *nbsp;0303192101023000, 030C192101023000,  0303192101033000, 030C192101033000, *nbsp;0103192101001101,  010C192101001101, 0003192101001002, 000C192101001002,  *nbsp;0013192101001002, 001C192101001002
FlashID0: 0089 8981 *nbsp;- 0000 0000 [Intel ] type: NOR,RAP 
ExtBUSC: 0000 0000 0000 0000 0000 0000 0000 0000 
ExtDEVC: FFFF 0000 - 0000 0000
*nbsp;RAP3Gv3_algo.fg: [BB5 ALGORITHM] version: 1.33.1 revision: 0.0 size: 0x29878
*nbsp;Supported RAP Ids: 0103192101003000, 010C192101003000,  *nbsp;0103192101013000, 010C192101013000, 0103192101003100,  010C192101003100, *nbsp;0303192101023000, 030C192101023000,  0303192101033000, 030C192101033000, *nbsp;0003192101002000,  000C192101002000, 0003192101002100, 000C192101002100,  *nbsp;0003192101002200, 000C192101002200, 0003192101012200,  000C192101012200, *nbsp;0103192101001101, 010C192101001101,  0003192101001002, 000C192101001002, *nbsp;0013192101001002,  001C192101001002
RAP PAPUBKEYS ID: C0E691EA16A7593A9BB28832D7312A39F7ED668D
Programming MCU ...
*nbsp;rm237__07.21.mcusw: 
*nbsp;[BB5,BB5 ALGORITHM] *nbsp;size: 14.48 MB
*nbsp;Supported RAP Ids: 0103192101001101, 010C192101001101
Total erase size: 16.37 MB
CMT NOR area [00000000-000006BF] erased in 0.703 s
CMT NOR area [000006C0-0001FFFF] erased in 0.578 s
CMT NOR area [00020000-0007FFFF] erased in 2.422 s
CMT NOR area [00080000-000DFFFF] erased in 0.610 s
CMT NOR area [00100000-001FFFFF] erased in 0.672 s
CMT NOR area [00200000-0031FFFF] erased in 6.266 s
CMT NOR area [00320000-0105FFFF] erased in 1 min 7.000 s
CMT NOR area [01060000-01067FFF] erased in 0.984 s
CMT NOR area [01068000-0107FFFF] erased in 0.578 s
Flash programming ...
Valid PAPUB key found, CMT PAPUBKEYS, RAP Certificate 66 v2 written.
Programming completed in 1 min 45.281 s
Processing file: rm237__07.21.ppm_mr
RAP Data :
SYSTEM ASIC ID: 000000010000022600010006010C192101001101 [RAPGSM ver: 1.1]
EM1 ID: 00000232
EM2 ID: 00000353
PUBLIC ID: 06B0000BCB4A7C56BDA07B9D744CBAE75E737339
ASIC MODE ID: 00
ROOT KEY HASH: BAF3A9C3DBFA8454937DB77F2B8852B1
ROM ID: 191EC665DFAAF68F
*nbsp;rap3gv3_2nd.fg: [BB5] version: 1.30.0 revision: 0.0 size: 0x3C00
*nbsp;Supported RAP Ids: 0103192101003000, 010C192101003000,  *nbsp;0103192101013000, 010C192101013000, 0103192101003100,  010C192101003100, *nbsp;0303192101023000, 030C192101023000,  0303192101033000, 030C192101033000, *nbsp;0103192101001101,  010C192101001101, 0003192101001002, 000C192101001002,  *nbsp;0013192101001002, 001C192101001002
FlashID0: 0089 8981 *nbsp;- 0000 0000 [Intel ] type: NOR,RAP 
ExtBUSC: 0000 0000 0000 0000 0000 0000 0000 0000 
ExtDEVC: FFFF 0000 - 0000 0000
*nbsp;RAP3Gv3_algo.fg: [BB5 ALGORITHM] version: 1.33.1 revision: 0.0 size: 0x29878
*nbsp;Supported RAP Ids: 0103192101003000, 010C192101003000,  *nbsp;0103192101013000, 010C192101013000, 0103192101003100,  010C192101003100, *nbsp;0303192101023000, 030C192101023000,  0303192101033000, 030C192101033000, *nbsp;0003192101002000,  000C192101002000, 0003192101002100, 000C192101002100,  *nbsp;0003192101002200, 000C192101002200, 0003192101012200,  000C192101012200, *nbsp;0103192101001101, 010C192101001101,  0003192101001002, 000C192101001002, *nbsp;0013192101001002,  001C192101001002
RAP PAPUBKEYS ID: C0E691EA16A7593A9BB28832D7312A39F7ED668D
Programming PPM ...
*nbsp;rm237__07.21.ppm_mr: 
*nbsp;[BB5,BB5 ALGORITHM] *nbsp;size: 3.55 MB
*nbsp;Supported RAP Ids: 0103192101001101, 010C192101001101
Total erase size: 4.62 MB
CMT NOR area [01080000-0151FFFF] erased in 18.422 s
Flash programming ...
Programming completed in 23.125 s
Processing file: rm237__07.21_sd_allmost_empty_512.fpsimage
file is empty, skipped.
Processing file: rm237__07.21.image_mr
NOR page size in the phone is 128 K.
RAP Data :
SYSTEM ASIC ID: 000000010000022600010006010C192101001101 [RAPGSM ver: 1.1]
EM1 ID: 00000232
EM2 ID: 00000353
PUBLIC ID: 06B0000BCB4A7C56BDA07B9D744CBAE75E737339
ASIC MODE ID: 00
ROOT KEY HASH: BAF3A9C3DBFA8454937DB77F2B8852B1
ROM ID: 191EC665DFAAF68F
*nbsp;rap3gv3_2nd.fg: [BB5] version: 1.30.0 revision: 0.0 size: 0x3C00
*nbsp;Supported RAP Ids: 0103192101003000, 010C192101003000,  *nbsp;0103192101013000, 010C192101013000, 0103192101003100,  010C192101003100, *nbsp;0303192101023000, 030C192101023000,  0303192101033000, 030C192101033000, *nbsp;0103192101001101,  010C192101001101, 0003192101001002, 000C192101001002,  *nbsp;0013192101001002, 001C192101001002
FlashID0: 0089 8981 *nbsp;- 0000 0000 [Intel ] type: NOR,RAP 
ExtBUSC: 0000 0000 0000 0000 0000 0000 0000 0000 
ExtDEVC: FFFF 0000 - 0000 0000
*nbsp;RAP3Gv3_algo.fg: [BB5 ALGORITHM] version: 1.33.1 revision: 0.0 size: 0x29878
*nbsp;Supported RAP Ids: 0103192101003000, 010C192101003000,  *nbsp;0103192101013000, 010C192101013000, 0103192101003100,  010C192101003100, *nbsp;0303192101023000, 030C192101023000,  0303192101033000, 030C192101033000, *nbsp;0003192101002000,  000C192101002000, 0003192101002100, 000C192101002100,  *nbsp;0003192101002200, 000C192101002200, 0003192101012200,  000C192101012200, *nbsp;0103192101001101, 010C192101001101,  0003192101001002, 000C192101001002, *nbsp;0013192101001002,  001C192101001002
RAP PAPUBKEYS ID: C0E691EA16A7593A9BB28832D7312A39F7ED668D
Programming Content Pack ...
*nbsp;rm237__07.21.image_mr: 
*nbsp;[BB5,BB5 ALGORITHM] page size: 64 K *nbsp;size: 4.00 MB
*nbsp;Supported RAP Ids: 0103192101001101, 010C192101001101
Total erase size: 10.75 MB
CMT NOR area [01520000-01FDFFFF] erased in 1 min 16.282 s
Converting UCP blocks to 128 K.
Flash programming ...
Programming completed in 26.641 s
Flashing completed in 6 min 32.500 s
*nbsp;
*nbsp;
Phone Type: RM-237 (Nokia 3110c)
SW Version: V 07.21 05-11-08 RM-237 (c) Nokia. *nbsp; *nbsp; *nbsp; *nbsp; *nbsp; *nbsp;
Imei plain: 35641802939910-6
Product Code: 0566963
VariantId: M
Language Pack:
- not available.

SIMLOCK seems to be valid
SUPERDONGLE_KEY seems to be valid
SIMLOCK_TEST passed
SECURITY_TEST passed
*nbsp;
*nbsp;
Provider: Nokia Test, Country: Finland
Counter: 0/3, 0/10
*nbsp;
CONFIG_DATA: 2440700000000000
PROFILE_BITS: 0000000000000000
*nbsp;
BLOCK 1: *nbsp; 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 2: *nbsp; 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 3: *nbsp; 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 4: *nbsp; 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 5: *nbsp; 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 6: *nbsp; 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 7: *nbsp; 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
Total time to process is 6 min 47.547 s
READED INFO

Code:
Version Info:
MCU SW version: *nbsp;V 07.21 05-11-08 RM-237 (c) Nokia. *nbsp; *nbsp; *nbsp;
HW version: *nbsp;5005
RFIC version: *nbsp; 17211721
DSP version: *nbsp; ICPR61_08w10
PPM version: *nbsp;V 07.21 05-11-08 RM-237 (c) Nokia. *nbsp; *nbsp; *nbsp;MR
Retu version: *nbsp;32
Tahvo version: *nbsp;53
Content Pack version: *nbsp;Content: mr V 07.21 13-01-09 RM-237 (c) Nokia. *nbsp; *nbsp; *nbsp;
Product Info:
Production serial number: *nbsp;MPF657764
Product code: *nbsp;0566963
Module code: *nbsp;0203291
Basic production code: *nbsp;0542523
Serial Numbers:
IMEI plain: *nbsp;356418029399106
IMEI spare to net: *nbsp;3A 65 14 08 92 93 19 
IMEI SV to net: *nbsp;33 65 14 08 92 93 19 20 F5 
Other Info:
Model : *nbsp;Nokia 3110c (Classic Phone)
BSI: 3,7 KOhm
*nbsp;
Provider: Nokia Test, Country: Finland
Counter: 0/3, 0/10
*nbsp;
CONFIG_DATA: 2440700000000000
PROFILE_BITS: 0000000000000000
*nbsp;
BLOCK 1: *nbsp; 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 2: *nbsp; 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 3: *nbsp; 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 4: *nbsp; 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 5: *nbsp; 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 6: *nbsp; 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 7: *nbsp; 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
FULL FACTORY... OK
USER DATA... OK
Reset User Code (to default:12345) ... OK
Completed in 1.110 s
 

JannatLui

Well-known Member
Joined
Sep 1, 2010
Posts
2,836
Likes
14
answer: [MXKEY - INFO] Successfully Unlocked/repaired Phones By MXKey

5610d_SUCCESSFULL_FLASHED,,

LOGS:

Processing file: rm242__04.81.mcusw
--- Press phone's POWER button or connect a CHARGER ! ---
warning: Some new phones consume more power, please connect cable to USB host instead of USB hub.
[ADL] Pooling for ADL device
[ADL] Device found : nmwcdnsuc\Nokia USB Flashing Generic-2bb3de96
RAP SYSTEM ASIC ID: 000000010000022600010006010C192101003000 [RAP3G ver: PA 3.0]
RAP EM1 ID: 00000295
RAP EM2 ID: 00000B22
RAP PUBLIC ID: 0CA00107859B465017B775E5A8CBDBCED4B73966
RAP ASIC MODE ID: 00
RAP ROOT KEY HASH: BAF3A9C3DBFA8454937DB77F2B8852B1
RAP ROM ID: 273F6D55DFAAF68F
[ADL] Flashing CMT Update Server Data, ULO: 0x3900 bytes
[ADL] Update Server code succesfully sent to phone
[ADL] Flashing CMT Update Server Data, UPDAPP: 0x46F40 bytes
[ADL] Update Server code succesfully sent to phone
[ADL] Flashing CMT Update Server Data, PASUBTOC: 0x55300 bytes
[ADL] Update Server code succesfully sent to phone
[ADL] Pooling for ADL device
[ADL] Device found : nmwcdnsuc\Nokia BB5 ADL Loader USB Generic-78c6b7c
[ADL] Verifying communication to device OK.
RAP ROOT KEY HASH: BAF3A9C3DBFA8454937DB77F2B8852B1
RAP PAPUBKEYS ID: EE7EB2973C70788F43BFADFB1AD46A77E51DF8DB
Original Product code: 0558248
Original Imei: 358952014464424
Programming MCU ...
rm242__04.81.mcusw:
[BB5,BB5 ALGORITHM] size: 19.91 MB
Supported RAP Ids: 0103192101003000, 010C192101003000
Total erase size: 21.12 MB
RAP NOR area [00000000-0001FFFF] erased in 0.359 s
RAP NOR area [00040000-000BFFFF] erased in 1.453 s
RAP NOR area [000C0000-0013FFFF] erased in 0.094 s
RAP NOR area [013C0000-0153FFFF] erased in 4.421 s
RAP NOR area [00140000-013BFFFF] erased in 53.219 s
Flash programming ...
Valid PAPUB key found, CMT PAPUBKEYS, RAP Certificate 83 v1 written.
Programming completed in 3 min 55.890 s
Processing file: rm242__04.81.ppm_blue_m4
Programming PPM ...
rm242__04.81.ppm_blue_m4:
[BB5,BB5 ALGORITHM] size: 4.52 MB
Supported RAP Ids: 0103192101003000, 010C192101003000
Total erase size: 6.50 MB
RAP NOR area [01540000-01BBFFFF] erased in 13.828 s
Flash programming ...
Programming completed in 54.563 s
Processing file: rm242__04.81_ISM_007.image_blue_m4
Programming Content Pack ...
rm242__04.81_ISM_007.image_blue_m4:
[BB5,BB5 ALGORITHM] page size: 128 K size: 14.77 MB
Supported RAP Ids: 0103192101003000, 010C192101003000
Total erase size: 35.87 MB
RAP NOR area [01EC0000-03F9FFFF] erased in 1 min 35.860 s
RAP NOR area [01BC0000-01EBFFFF] erased in 8.828 s
Flash programming ...
Programming completed in 2 min 43.984 s
[ADL] Pooling for ADL device
[ADL] Timeout, no device not found.
[ADL] Pooling for ADL device
[ADL] Device found : nmwcdc\Nokia 5610 XpressMusic USB Generic-1f36b86d
[ADL] Verifying communication to device OK.
Flashing completed in 12 min 27.344 s


Phone Type: RM-242 (Nokia 5610d-1)
SW Version: V 04.81 22-11-07 RM-242 (c) Nokia
Imei plain: 35895201446442-4
Product Code: 0558248
VariantId: m
Language Pack:
- not available.

Total time to process is 12 min 31.844 s
 

JannatLui

Well-known Member
Joined
Sep 1, 2010
Posts
2,836
Likes
14
answer: [MXKEY - INFO] Successfully Unlocked/repaired Phones By MXKey

5310 xm rm-303 unlock done!


Code:
Provider: Movistar (DCT4), Country: Spain
Counter: 0/3, 0/10
*nbsp;
CONFIG_DATA: 2140700000000000
PROFILE_BITS: 8000000000000000
*nbsp;
BLOCK 1: *nbsp; 1=LOCKED (MCC+MNC): 21407F, DATA=21407F
BLOCK 2: *nbsp; 1=LOCKED (MCC+MNC): 21402F, DATA=21402F
*nbsp;
Backup saved to *quot;BB5_356870026913430_SIMLOCK.back*quot;
*nbsp;
ROOT KEY HASH: BAF3A9C3DBFA8454937DB77F2B8852B1
ROM ID: 273F6D55DFAAF68F
*nbsp;
Sending bootloader, size: 0x3C00 ...
Calculating data ...OK
Writing PM buffer ... OK
Completed in 19.922 s
Restarting phone ...
*nbsp;
Reading Simlock info ...
Provider: ALL Operator, Country: -
Counter: 0/3, 0/10
*nbsp;
CONFIG_DATA: 0010100000000000
PROFILE_BITS: 8000000000000000
*nbsp;
BLOCK 1: *nbsp; 1=OPEN, DATA=00101F
 

JannatLui

Well-known Member
Joined
Sep 1, 2010
Posts
2,836
Likes
14
answer: [MXKEY - INFO] Successfully Unlocked/repaired Phones By MXKey

Succsessfully unlock nokia 1680c-2 with mx-key

[COLOR=**00ff00] Here is log:[/COLOR]
[COLOR=**00ff00]
Imei net: 35684102496470
Provider: Virgin, Country: United Kingdom
Counter: 0/3, 0/10

CONFIG_DATA: 2343000000000000
PROFILE_BITS: 800000000001000B

BLOCK 1: 1.LOCKED (MCC+MNC): 23430F

PhoneType:RM-394
SwVersion: V 06.82 26-09-08 RM-394 (c) Nokia
MCU file: rm394__06.82.mcusw
Trying to find patch position ...OK, case id: 4
ROM version: 4

ASIC ID: 0x3162 [UPP_8M ver: 6.11]
u3_2nd.fia: [DCT4] version: 4.70.1 revision: 0.7 size: 0x9A8
Supported Ids: 3040, 2292, 2293, 3162, 3166, 3168
FlashID0: 0001 317E [AMD S29NS256P,256 Mbits] page size: 128 K type: NOR area: 01000000-02FFFFFF - COMBO FLASH
ExtBUSC: AD7E B61B 00FF 1040 0000 0000 0000 0000
u3_amd.fia: [DCT4 ALGORITHM] version: 4.70.1 revision: 0.7 size: 0x7528
Supported Ids: 3040, 2292, 2293, 3162, 3166, 3168
Performing Flash Authentication ...OK
UEM ID: 005B139B:3B8ADA60
Area [01000000-0101FFFF] erased in 0.766 s
Area [01080000-0109FFFF] erased in 0.765 s
Programming ...
Programming completed.
Updating SIMLOCK ...OK

ASIC ID: 0x3162 [UPP_8M ver: 6.11]
u3_2nd.fia: [DCT4] version: 4.70.1 revision: 0.7 size: 0x9A8
Supported Ids: 3040, 2292, 2293, 3162, 3166, 3168
FlashID0: 0001 317E [AMD S29NS256P,256 Mbits] page size: 128 K type: NOR area: 01000000-02FFFFFF - COMBO FLASH
ExtBUSC: AD7E B61B 00FF 1040 0000 0000 0000 0000
u3_amd.fia: [DCT4 ALGORITHM] version: 4.70.1 revision: 0.7 size: 0x7528
Supported Ids: 3040, 2292, 2293, 3162, 3166, 3168
Performing Flash Authentication ...OK
UEM ID: 005B139B:3B8ADA60
Area [01000000-0101FFFF] erased in 0.703 s
Area [01080000-0109FFFF] erased in 0.797 s
Programming ...
Programming completed.
Completed in 51.157 s

Reading Simlock info ...
Imei net: 35684102496470
Provider: ALL Operator, Country: -
Counter: 0/3, 0/10

CONFIG_DATA: 0010100000000000
PROFILE_BITS: 800000000001000B

BLOCK 1: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 2: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 3: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 4: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 5: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 6: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 7: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
[/COLOR]
 

JannatLui

Well-known Member
Joined
Sep 1, 2010
Posts
2,836
Likes
14
answer: [MXKEY - INFO] Successfully Unlocked/repaired Phones By MXKey

NOKIA N73 RM-133 DEAD REPAIRED SUCCESSFULLY BY MX-KEY


Code:
APE Data :
SYSTEM ASIC ID: 17100708 [OMAP1710 ver: 2.0]
ASIC MODE ID: 00
PUBLIC ID: 35DF68B1377EBC50DF55A1ED87E29228EBC99CCA
ROOT KEY HASH: 49A97E826B93BA20B7ED0B082475C00500000000
ROM ID: 1DFD66132C872FD4
RAP Data :
SYSTEM ASIC ID: 000000010000022600010006010C192101003000 [RAP3G ver: PA 3.0]
EM1 ID: 00000295
EM2 ID: 00000B22
PUBLIC ID: 1AF0000DFAFA015496B0AE6F6C626B1AF76A8DA6
ASIC MODE ID: 00
ROOT KEY HASH: BAF3A9C3DBFA8454937DB77F2B8852B1
ROM ID: 273F6D55DFAAF68F
*nbsp;rap3gv3_2nd.fg: [BB5] version: 1.30.0 revision: 0.0 size: 0x3C00
*nbsp;Supported RAP Ids: 0103192101003000, 010C192101003000,  *nbsp;0103192101013000, 010C192101013000, 0103192101003100,  010C192101003100, *nbsp;0303192101023000, 030C192101023000,  0303192101033000, 030C192101033000, *nbsp;0103192101001101,  010C192101001101, 0003192101001002, 000C192101001002,  *nbsp;0013192101001002, 001C192101001002
FlashID0: 00EC 22E8 *nbsp;- 0000 6921 [Samsung K8S2815ETB,128 Mbits] type: NOR,RAP 
ExtBUSC: 0000 0000 0000 0000 0000 0000 0000 0000 
ExtDEVC: FFFF 0000 - 0000 0000
*nbsp;RAP3Gv3_algo.fg: [BB5 ALGORITHM] version: 1.33.1 revision: 0.0 size: 0x29878
*nbsp;Supported RAP Ids: 0103192101003000, 010C192101003000,  *nbsp;0103192101013000, 010C192101013000, 0103192101003100,  010C192101003100, *nbsp;0303192101023000, 030C192101023000,  0303192101033000, 030C192101033000, *nbsp;0003192101002000,  000C192101002000, 0003192101002100, 000C192101002100,  *nbsp;0003192101002200, 000C192101002200, 0003192101012200,  000C192101012200, *nbsp;0103192101001101, 010C192101001101,  0003192101001002, 000C192101001002, *nbsp;0013192101001002,  001C192101001002
RAP PAPUBKEYS ID: 5E8D0D504A0902E261268C14FCD8A2C9093523BC
*nbsp;helen3_2nd.fg: [BB5] version: 1.35.0 revision: 0.0 size: 0x3500
*nbsp;Supported APE Ids: 17100700, 17100701, 17100702, 17100703, 17100704, 17100708
RX2 enabled.
FlashID0: 00EC 00A1 *nbsp;- 0080 0015 [Samsung KAL00T00EM-DGYY/66,1 Gbits] type: NAND,APE 
ExtBUSC: FFFF FFFF FFFF FFFF FFFF FFFF FFFF FFFF 
*nbsp;h3_sam_nand_xsr.fg: [OMAP1710 UNISTORE-II-1.2.1 *nbsp;ALG] version: 1.47.0 revision: 0.0 size: 0x13598
*nbsp;Supported APE Ids: 17100700, 17100701, 17100702, 17100703, 17100704, 17100708
APE PAPUBKEYS ID: 5E8D0D504A0902E261268C14FCD8A2C9093523BC
Reading RAP NPC (0x168 bytes).
Reading RAP VARIANT (0xB8 bytes).
Reading RAP CCC (0x0 bytes).
Reading RAP HWC (0x0 bytes).
Reading APE NPC (0x0 bytes).
Reading APE VARIANT (0x0 bytes).
Reading APE CCC (0x0 bytes).
Reading APE HWC (0x0 bytes).
Flash Imei: 35897301278774
NPC_DATA saved OK
VARIANT_DATA saved OK
RF_DATA saved OK
WARRANTY_DATA saved OK
PROD_DATA saved OK
BT_DATA saved OK
LOCK_DATA saved OK
BB_DATA saved OK
RPL saved to *quot;C:\mobileEx\3.2\data\backup\RPL\BB5_35897301278774_back.rpl*quot; 
Processing file: N73_4.0750.31.2.1_western_C00_PRD_cc.fpsx
APE Data :
SYSTEM ASIC ID: 17100708 [OMAP1710 ver: 2.0]
ASIC MODE ID: 00
PUBLIC ID: 35DF68B1377EBC50DF55A1ED87E29228EBC99CCA
ROOT KEY HASH: 49A97E826B93BA20B7ED0B082475C00500000000
ROM ID: 1DFD66132C872FD4
RAP Data :
SYSTEM ASIC ID: 000000010000022600010006010C192101003000 [RAP3G ver: PA 3.0]
EM1 ID: 00000295
EM2 ID: 00000B22
PUBLIC ID: 1AF0000DFAFA015496B0AE6F6C626B1AF76A8DA6
ASIC MODE ID: 00
ROOT KEY HASH: BAF3A9C3DBFA8454937DB77F2B8852B1
ROM ID: 273F6D55DFAAF68F
*nbsp;rap3gv3_2nd.fg: [BB5] version: 1.30.0 revision: 0.0 size: 0x3C00
*nbsp;Supported RAP Ids: 0103192101003000, 010C192101003000,  *nbsp;0103192101013000, 010C192101013000, 0103192101003100,  010C192101003100, *nbsp;0303192101023000, 030C192101023000,  0303192101033000, 030C192101033000, *nbsp;0103192101001101,  010C192101001101, 0003192101001002, 000C192101001002,  *nbsp;0013192101001002, 001C192101001002
FlashID0: 00EC 22E8 *nbsp;- 0000 6921 [Samsung K8S2815ETB,128 Mbits] type: NOR,RAP 
ExtBUSC: 0000 0000 0000 0000 0000 0000 0000 0000 
ExtDEVC: FFFF 0000 - 0000 0000
*nbsp;RAP3Gv3_algo.fg: [BB5 ALGORITHM] version: 1.33.1 revision: 0.0 size: 0x29878
*nbsp;Supported RAP Ids: 0103192101003000, 010C192101003000,  *nbsp;0103192101013000, 010C192101013000, 0103192101003100,  010C192101003100, *nbsp;0303192101023000, 030C192101023000,  0303192101033000, 030C192101033000, *nbsp;0003192101002000,  000C192101002000, 0003192101002100, 000C192101002100,  *nbsp;0003192101002200, 000C192101002200, 0003192101012200,  000C192101012200, *nbsp;0103192101001101, 010C192101001101,  0003192101001002, 000C192101001002, *nbsp;0013192101001002,  001C192101001002
RAP PAPUBKEYS ID: 5E8D0D504A0902E261268C14FCD8A2C9093523BC
*nbsp;helen3_2nd.fg: [BB5] version: 1.35.0 revision: 0.0 size: 0x3500
*nbsp;Supported APE Ids: 17100700, 17100701, 17100702, 17100703, 17100704, 17100708
RX2 enabled.
FlashID0: 00EC 00A1 *nbsp;- 0080 0015 [Samsung KAL00T00EM-DGYY/66,1 Gbits] type: NAND,APE 
ExtBUSC: FFFF FFFF FFFF FFFF FFFF FFFF FFFF FFFF 
*nbsp;h3_sam_nand_xsr.fg: [OMAP1710 UNISTORE-II-1.2.1 *nbsp;ALG] version: 1.47.0 revision: 0.0 size: 0x13598
*nbsp;Supported APE Ids: 17100700, 17100701, 17100702, 17100703, 17100704, 17100708
APE PAPUBKEYS ID: 5E8D0D504A0902E261268C14FCD8A2C9093523BC
Programming MCU ...
*nbsp;N73_4.0750.31.2.1_western_C00_PRD_cc.fpsx: 
*nbsp;[BB5,BB5 ALGORITHM,BB5,OMAP1710 UNISTORE-II-1.2.1 *nbsp;ALG] *nbsp;size: 48.10 MB
*nbsp;Supported RAP Ids: 0103192101003000, 010C192101003000
*nbsp;Supported APE Ids: 17100708
Total erase size: 91.38 MB
CMT NOR area [00080000-0073142D] erased in 34.532 s
CMT NOR area [00000000-0005FFFF] erased in 0.953 s
CMT NOR area [001E0000-001FFFFF] erased in 0.484 s
CMT NOR area [00880000-00FEFFFF] erased in 8.219 s
APE NAND area [00000000-0007FFFF] erased in 0.047 s
APE NAND area [00080000-000FFFFF] erased in 0.047 s
APE NAND area [00100000-0025FFFF] erased in 0.531 s
APE NAND area [003C0000-04E1FFFF] erased in 1.422 s
Flash programming ...
Valid PAPUB key found, CMT PAPUBKEYS, Rap Certificate 26 v1 written.
Valid PAPUB key found, APE PAPUBKEYS, Ape Certificate 26 v1 written.
Programming completed in 4 min 45.593 s
Processing file: N73_rofx_4.0750.31.2.1_PRD.V11
APE Data :
SYSTEM ASIC ID: 17100708 [OMAP1710 ver: 2.0]
ASIC MODE ID: 00
PUBLIC ID: 35DF68B1377EBC50DF55A1ED87E29228EBC99CCA
ROOT KEY HASH: 49A97E826B93BA20B7ED0B082475C00500000000
ROM ID: 1DFD66132C872FD4
RAP Data :
SYSTEM ASIC ID: 000000010000022600010006010C192101003000 [RAP3G ver: PA 3.0]
EM1 ID: 00000295
EM2 ID: 00000B22
PUBLIC ID: 1AF0000DFAFA015496B0AE6F6C626B1AF76A8DA6
ASIC MODE ID: 00
ROOT KEY HASH: BAF3A9C3DBFA8454937DB77F2B8852B1
ROM ID: 273F6D55DFAAF68F
*nbsp;rap3gv3_2nd.fg: [BB5] version: 1.30.0 revision: 0.0 size: 0x3C00
*nbsp;Supported RAP Ids: 0103192101003000, 010C192101003000,  *nbsp;0103192101013000, 010C192101013000, 0103192101003100,  010C192101003100, *nbsp;0303192101023000, 030C192101023000,  0303192101033000, 030C192101033000, *nbsp;0103192101001101,  010C192101001101, 0003192101001002, 000C192101001002,  *nbsp;0013192101001002, 001C192101001002
FlashID0: 00EC 22E8 *nbsp;- 0000 6921 [Samsung K8S2815ETB,128 Mbits] type: NOR,RAP 
ExtBUSC: 0000 0000 0000 0000 0000 0000 0000 0000 
ExtDEVC: FFFF 0000 - 0000 0000
*nbsp;RAP3Gv3_algo.fg: [BB5 ALGORITHM] version: 1.33.1 revision: 0.0 size: 0x29878
*nbsp;Supported RAP Ids: 0103192101003000, 010C192101003000,  *nbsp;0103192101013000, 010C192101013000, 0103192101003100,  010C192101003100, *nbsp;0303192101023000, 030C192101023000,  0303192101033000, 030C192101033000, *nbsp;0003192101002000,  000C192101002000, 0003192101002100, 000C192101002100,  *nbsp;0003192101002200, 000C192101002200, 0003192101012200,  000C192101012200, *nbsp;0103192101001101, 010C192101001101,  0003192101001002, 000C192101001002, *nbsp;0013192101001002,  001C192101001002
RAP PAPUBKEYS ID: 5E8D0D504A0902E261268C14FCD8A2C9093523BC
*nbsp;helen3_2nd.fg: [BB5] version: 1.35.0 revision: 0.0 size: 0x3500
*nbsp;Supported APE Ids: 17100700, 17100701, 17100702, 17100703, 17100704, 17100708
RX2 enabled.
FlashID0: 00EC 00A1 *nbsp;- 0080 0015 [Samsung KAL00T00EM-DGYY/66,1 Gbits] type: NAND,APE 
ExtBUSC: FFFF FFFF FFFF FFFF FFFF FFFF FFFF FFFF 
*nbsp;h3_sam_nand_xsr.fg: [OMAP1710 UNISTORE-II-1.2.1 *nbsp;ALG] version: 1.47.0 revision: 0.0 size: 0x13598
*nbsp;Supported APE Ids: 17100700, 17100701, 17100702, 17100703, 17100704, 17100708
APE PAPUBKEYS ID: 5E8D0D504A0902E261268C14FCD8A2C9093523BC
Programming PPM ...
*nbsp;N73_rofx_4.0750.31.2.1_PRD.V11: 
*nbsp;[BB5,BB5 ALGORITHM,BB5,OMAP1710 UNISTORE-II-1.2.1 *nbsp;ALG] *nbsp;size: 15.46 MB
*nbsp;Supported RAP Ids: 0000000000000000, 0003192101002000,  *nbsp;000C192101002000, 0003192101002100, 000C192101002100,  0003192101002200, *nbsp;000C192101002200, 0103192101003000,  010C192101003000, 0103192101013000, *nbsp;010C192101013000
*nbsp;Supported APE Ids: 17100700, 17100701, 17100702, 17100708
Total erase size: 21.00 MB
APE NAND area [03920000-04E1FFFF] erased in 1.640 s
Flash programming ...
Programming completed in 1 min 43.641 s
Processing file: N73_userarea_4.0750.31.2.1.U01
APE Data :
SYSTEM ASIC ID: 17100708 [OMAP1710 ver: 2.0]
ASIC MODE ID: 00
PUBLIC ID: 35DF68B1377EBC50DF55A1ED87E29228EBC99CCA
ROOT KEY HASH: 49A97E826B93BA20B7ED0B082475C00500000000
ROM ID: 1DFD66132C872FD4
RAP Data :
SYSTEM ASIC ID: 000000010000022600010006010C192101003000 [RAP3G ver: PA 3.0]
EM1 ID: 00000295
EM2 ID: 00000B22
PUBLIC ID: 1AF0000DFAFA015496B0AE6F6C626B1AF76A8DA6
ASIC MODE ID: 00
ROOT KEY HASH: BAF3A9C3DBFA8454937DB77F2B8852B1
ROM ID: 273F6D55DFAAF68F
*nbsp;rap3gv3_2nd.fg: [BB5] version: 1.30.0 revision: 0.0 size: 0x3C00
*nbsp;Supported RAP Ids: 0103192101003000, 010C192101003000,  *nbsp;0103192101013000, 010C192101013000, 0103192101003100,  010C192101003100, *nbsp;0303192101023000, 030C192101023000,  0303192101033000, 030C192101033000, *nbsp;0103192101001101,  010C192101001101, 0003192101001002, 000C192101001002,  *nbsp;0013192101001002, 001C192101001002
FlashID0: 00EC 22E8 *nbsp;- 0000 6921 [Samsung K8S2815ETB,128 Mbits] type: NOR,RAP 
ExtBUSC: 0000 0000 0000 0000 0000 0000 0000 0000 
ExtDEVC: FFFF 0000 - 0000 0000
*nbsp;RAP3Gv3_algo.fg: [BB5 ALGORITHM] version: 1.33.1 revision: 0.0 size: 0x29878
*nbsp;Supported RAP Ids: 0103192101003000, 010C192101003000,  *nbsp;0103192101013000, 010C192101013000, 0103192101003100,  010C192101003100, *nbsp;0303192101023000, 030C192101023000,  0303192101033000, 030C192101033000, *nbsp;0003192101002000,  000C192101002000, 0003192101002100, 000C192101002100,  *nbsp;0003192101002200, 000C192101002200, 0003192101012200,  000C192101012200, *nbsp;0103192101001101, 010C192101001101,  0003192101001002, 000C192101001002, *nbsp;0013192101001002,  001C192101001002
RAP PAPUBKEYS ID: 5E8D0D504A0902E261268C14FCD8A2C9093523BC
*nbsp;helen3_2nd.fg: [BB5] version: 1.35.0 revision: 0.0 size: 0x3500
*nbsp;Supported APE Ids: 17100700, 17100701, 17100702, 17100703, 17100704, 17100708
RX2 enabled.
FlashID0: 00EC 00A1 *nbsp;- 0080 0015 [Samsung KAL00T00EM-DGYY/66,1 Gbits] type: NAND,APE 
ExtBUSC: FFFF FFFF FFFF FFFF FFFF FFFF FFFF FFFF 
*nbsp;h3_sam_nand_xsr.fg: [OMAP1710 UNISTORE-II-1.2.1 *nbsp;ALG] version: 1.47.0 revision: 0.0 size: 0x13598
*nbsp;Supported APE Ids: 17100700, 17100701, 17100702, 17100703, 17100704, 17100708
APE PAPUBKEYS ID: 5E8D0D504A0902E261268C14FCD8A2C9093523BC
Programming Content Pack ...
*nbsp;N73_userarea_4.0750.31.2.1.U01: 
*nbsp;[BB5,BB5 ALGORITHM,BB5,OMAP1710 UNISTORE-II-1.2.1 *nbsp;ALG] *nbsp;size: 11.46 MB
*nbsp;Supported RAP Ids: 0000000000000000, 0003192101002000,  *nbsp;000C192101002000, 0003192101002100, 000C192101002100,  0003192101002200, *nbsp;000C192101002200, 0103192101003000,  010C192101003000, 0103192101013000, *nbsp;010C192101013000
*nbsp;Supported APE Ids: 17100708
Total erase size: 46.50 MB
APE NAND area [04E20000-07C9FFFF] erased in 1.187 s
Flash programming ...
Programming completed in 1 min 6.703 s
Flashing completed in 9 min 30.203 s
*nbsp;
*nbsp;
Phone Type: RM-133 (Nokia N73)
SW Version: V 05wk47v53.1 29-10-07 RM-133 (c) Nokia. *nbsp; 
Imei plain: 35897301278774-9
Product Code: 0543843
Language Pack:
- not available.

SIMLOCK seems to be valid
SUPERDONGLE_KEY seems to be valid
SIMLOCK_TEST passed
SECURITY_TEST passed
*nbsp;
*nbsp;
Provider: Nokia Test, Country: Finland
Counter: 0/3, 0/10
*nbsp;
CONFIG_DATA: 2440700000000000
PROFILE_BITS: 0000000000000000
*nbsp;
BLOCK 1: *nbsp; 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 2: *nbsp; 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 3: *nbsp; 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 4: *nbsp; 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 5: *nbsp; 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 6: *nbsp; 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 7: *nbsp; 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
Total time to process is 9 min 43.265 s
READED INFO

Code:
Version Info:
MCU SW version: *nbsp;V 05wk47v53.1 29-10-07 RM-133 (c) Nokia. 
HW version: *nbsp;7200
RFIC version: *nbsp; 17211721
DSP version: *nbsp; scarfe_05wk46v50
APE SW Core version: *nbsp;V 4.0750.31.2.1 15-12-2007 RM-133 
APE Variant version: *nbsp;V 4.0750.31.2.1-11 15-12-2007 RM-133 
Retu version: *nbsp;15
Tahvo version: *nbsp;22
APE HW version: *nbsp;1
APE ADSP SW version: *nbsp;256
Camera version: *nbsp;1
APE BT version: *nbsp;HCI Version 3 (rev. 1740). LMP Version 3 (rev. 1740). Manufacturer 10.
Product Info:
Production serial number: *nbsp;CFI965031
Product code: *nbsp;0543843
Module code: *nbsp;0202855
Basic production code: *nbsp;0537044
Serial Numbers:
IMEI plain: *nbsp;358973012787749
IMEI spare to net: *nbsp;3A 85 79 03 21 87 77 04 
IMEI SV to net: *nbsp;33 85 79 03 21 87 77 54 F7 
Other Info:
Model : *nbsp;Nokia N73 (Imaging Phone)
CS type : *nbsp;GSM850/900/1800/1900/WCDMA2100
Project Name: *nbsp;Scarfe(EU)
HW Details:
RAP: *nbsp;RAP3G v2.11 PA-4396177
OMAP: *nbsp;OMAP 1710-n/a
RETU: *nbsp;RETU v3.02-4396177
TAHVO: *nbsp;TAHVO v4.1-n/a
RF: *nbsp;HINKU v3.10A + VINKU v3.14A-n/a + n/a
BSI: 0,0 KOhm
*nbsp;
Provider: Nokia Test, Country: Finland
Counter: 0/3, 0/10
*nbsp;
CONFIG_DATA: 2440700000000000
PROFILE_BITS: 0000000000000000
*nbsp;
BLOCK 1: *nbsp; 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 2: *nbsp; 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 3: *nbsp; 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 4: *nbsp; 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 5: *nbsp; 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 6: *nbsp; 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 7: *nbsp; 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
 

JannatLui

Well-known Member
Joined
Sep 1, 2010
Posts
2,836
Likes
14
answer: [MXKEY - INFO] Successfully Unlocked/repaired Phones By MXKey

6300 repaired ok Counter: 0/3, 1/10

CONFIG_DATA: FFFFFFFFFFFFFFFF
PROFILE_BITS: FFFFFFFFFFFFFFFF

BLOCK 1: 1=CORRUPTED

Backup saved to *quot;BB5_359809016734643_SIMLOCK.back*quot;

ROOT KEY HASH: BAF3A9C3DBFA8454937DB77F2B8852B1
ROM ID: 191EC665DFAAF68F

Sending bootloader, size: 0x3D00 ...
Calculating data ...OK
Receiving PM buffer, please WAIT ... OK
Writing PM buffer ... OK
Completed in 34.344 s
Restarting phone ...

Reading Simlock info ...
Provider: Nokia Test, Country: Finland
Counter: 0/3, 0/10

CONFIG_DATA: 2440700000000000
PROFILE_BITS: 0000000000000000

BLOCK 1: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 2: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 3: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 4: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 5: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 6: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 7: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
 

JannatLui

Well-known Member
Joined
Sep 1, 2010
Posts
2,836
Likes
14
answer: [MXKEY - INFO] Successfully Unlocked/repaired Phones By MXKey

6133 unlocked ok
Provider: T-Mobile, Country: U.S.A.
Counter: 0/3, 0/10

CONFIG_DATA: 3102000000000000
PROFILE_BITS: 0000000000000000

BLOCK 1: 1=LOCKED (MCC+MNC): 20416F, DATA=20416F
BLOCK 2: 1=LOCKED (MCC+MNC): 21630F, DATA=21630F
BLOCK 3: 1=LOCKED (MCC+MNC): 21901F, DATA=21901F
BLOCK 4: 1=LOCKED (MCC+MNC): 23001F, DATA=23001F
BLOCK 5: 1=LOCKED (MCC+MNC): 23102F, DATA=23102F
BLOCK 6: 1=LOCKED (MCC+MNC): 23203F, DATA=23203F
BLOCK 7: 1=LOCKED (MCC+MNC): 23430F, DATA=23430F
BLOCK 8: 1=LOCKED (MCC+MNC): 25001F, DATA=25001F
BLOCK 9: 1=LOCKED (MCC+MNC): 25502F, DATA=25502F
BLOCK 10: 1=LOCKED (MCC+MNC): 26002F, DATA=26002F
BLOCK 11: 1=LOCKED (MCC+MNC): 26201F, DATA=26201F
BLOCK 12: 1=LOCKED (MCC+MNC): 310160, DATA=310160
BLOCK 13: 1=LOCKED (MCC+MNC): 310200, DATA=310200
BLOCK 14: 1=LOCKED (MCC+MNC): 310210, DATA=310210
BLOCK 15: 1=LOCKED (MCC+MNC): 310220, DATA=310220
BLOCK 16: 1=LOCKED (MCC+MNC): 310230, DATA=310230
BLOCK 17: 1=LOCKED (MCC+MNC): 310240, DATA=310240
BLOCK 18: 1=LOCKED (MCC+MNC): 310250, DATA=310250
BLOCK 19: 1=LOCKED (MCC+MNC): 310260, DATA=310260
BLOCK 20: 1=LOCKED (MCC+MNC): 310270, DATA=310270
BLOCK 21: 1=LOCKED (MCC+MNC): 310280, DATA=310280
BLOCK 22: 1=LOCKED (MCC+MNC): 310300, DATA=310300
BLOCK 23: 1=LOCKED (MCC+MNC): 310310, DATA=310310
BLOCK 24: 1=LOCKED (MCC+MNC): 310580, DATA=310580
BLOCK 25: 1=LOCKED (MCC+MNC): 310660, DATA=310660
BLOCK 26: 1=LOCKED (MCC+MNC): 310800, DATA=310800
BLOCK 27: 1=LOCKED (MCC+MNC): 20416F, DATA=20416F
BLOCK 28: 1=LOCKED (MCC+MNC): 21630F, DATA=21630F
BLOCK 29: 1=LOCKED (MCC+MNC): 21901F, DATA=21901F
BLOCK 30: 1=LOCKED (MCC+MNC): 23001F, DATA=23001F
BLOCK 31: 1=LOCKED (MCC+MNC): 23102F, DATA=23102F
BLOCK 32: 1=LOCKED (MCC+MNC): 23203F, DATA=23203F
BLOCK 33: 1=LOCKED (MCC+MNC): 23430F, DATA=23430F
BLOCK 34: 1=LOCKED (MCC+MNC): 25001F, DATA=25001F
BLOCK 35: 1=LOCKED (MCC+MNC): 25502F, DATA=25502F
BLOCK 36: 1=LOCKED (MCC+MNC): 26002F, DATA=26002F
BLOCK 37: 1=LOCKED (MCC+MNC): 26201F, DATA=26201F
BLOCK 38: 1=LOCKED (MCC+MNC): 310160, DATA=310160
BLOCK 39: 1=LOCKED (MCC+MNC): 310200, DATA=310200
BLOCK 40: 1=LOCKED (MCC+MNC): 310210, DATA=310210
BLOCK 41: 1=LOCKED (MCC+MNC): 310220, DATA=310220
BLOCK 42: 1=LOCKED (MCC+MNC): 310230, DATA=310230
BLOCK 43: 1=LOCKED (MCC+MNC): 310240, DATA=310240
BLOCK 44: 1=LOCKED (MCC+MNC): 310250, DATA=310250
BLOCK 45: 1=LOCKED (MCC+MNC): 310260, DATA=310260
BLOCK 46: 1=LOCKED (MCC+MNC): 310270, DATA=310270
BLOCK 47: 1=LOCKED (MCC+MNC): 310280, DATA=310280
BLOCK 48: 1=LOCKED (MCC+MNC): 310300, DATA=310300
BLOCK 49: 1=LOCKED (MCC+MNC): 310310, DATA=310310
BLOCK 50: 1=LOCKED (MCC+MNC): 310580, DATA=310580
BLOCK 51: 1=LOCKED (MCC+MNC): 310660, DATA=310660
BLOCK 52: 1=LOCKED (MCC+MNC): 310800, DATA=310800

Backup saved to *quot;BB5_352736013845436_SIMLOCK.back*quot;

ROOT KEY HASH: BAF3A9C3DBFA8454937DB77F2B8852B1
ROM ID: 191EC665DFAAF68F

Sending bootloader, size: 0x3D00 ...
Calculating data ...OK
Receiving PM buffer, please WAIT ... OK
Writing PM buffer ... OK
Completed in 34.672 s
Restarting phone ...

Reading Simlock info ...
Provider: Nokia Test, Country: Finland
Counter: 0/3, 0/10

CONFIG_DATA: 2440700000000000
PROFILE_BITS: 0000000000000000

BLOCK 1: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 2: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 3: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 4: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 5: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 6: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 7: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
 

JannatLui

Well-known Member
Joined
Sep 1, 2010
Posts
2,836
Likes
14
answer: [MXKEY - INFO] Successfully Unlocked/repaired Phones By MXKey

Nokia 6500s Hutchinson 3G

Code:
Provider: Hutchinson 3G (3), Country: United Kingdom
Counter: 0/3, 0/10
*nbsp;
CONFIG_DATA: 2342000000000000
PROFILE_BITS: 8000000000000002
*nbsp;
BLOCK 1: *nbsp; 1=LOCKED (MCC+MNC): 23420F, DATA=23420F
BLOCK 2: *nbsp; 1=LOCKED (MCC+MNC): 23594F, DATA=23594F
*nbsp;
Backup saved to *quot;BB5_353076020318385_SIMLOCK.back*quot;
*nbsp;
ROOT KEY HASH: BAF3A9C3DBFA8454937DB77F2B8852B1
ROM ID: 273F6D55DFAAF68F
*nbsp;
Sending bootloader, size: 0x3C00 ...
Calculating data ...OK
Writing PM buffer ... OK
Completed in 17.219 s
Restarting phone ...
*nbsp;
Reading Simlock info ...
Provider: ALL Operator, Country: -
Counter: 0/3, 0/10
*nbsp;
CONFIG_DATA: 0010100000000000
PROFILE_BITS: 8000000000000000
*nbsp;
BLOCK 1: *nbsp; 1=OPEN, DATA=00101F
 

JannatLui

Well-known Member
Joined
Sep 1, 2010
Posts
2,836
Likes
14
answer: [MXKEY - INFO] Successfully Unlocked/repaired Phones By MXKey

e65 repaired simlock data ok

Counter: 0/3, 1/10

CONFIG_DATA: FFFFFFFFFFFFFFFF
PROFILE_BITS: FFFFFFFFFFFFFFFF

BLOCK 1: 1=CORRUPTED

Backup saved to *quot;BB5_358631011892361_SIMLOCK.back*quot;

ROOT KEY HASH: BAF3A9C3DBFA8454937DB77F2B8852B1
ROM ID: 273F6D55DFAAF68F

Sending bootloader, size: 0x3D00 ...
Calculating data ...OK
Receiving PM buffer, please WAIT ... OK
Writing PM buffer ... OK
Completed in 38.922 s
Restarting phone ...


Provider: Nokia Test, Country: Finland
Counter: 0/3, 0/10

CONFIG_DATA: 2440700000000000
PROFILE_BITS: 0000000000000000

BLOCK 1: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 2: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 3: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 4: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 5: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 6: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
BLOCK 7: 1=OPEN 2=OPEN 3=OPEN 4=OPEN 5=OPEN, DATA=FFFFFF
 

JannatLui

Well-known Member
Joined
Sep 1, 2010
Posts
2,836
Likes
14
answer: [MXKEY - INFO] Successfully Unlocked/repaired Phones By MXKey

E_71_UNLOCKED_SUCCESSFULLY:

LOGS:

LOCKED_INFO:
----------------
RAP Data :
SYSTEM ASIC ID: 000000010000022600010006400C192101031103 [RAPIDO3G ver: 1.x]
EM1 ID: 00000295
EM2 ID: 00000B22
PUBLIC ID: 1B90000DAA790052140BB94B705996B75D8F8776
ASIC MODE ID: 00
ROOT KEY HASH: CAEEBB65D3C48E6DC73B49DC5063A2EE
ROM ID: 4B9B75103E691FF8
RAPIDOv11_2nd.fg: [BB5] version: 1.30.0 revision: 0.0 size: 0x3AC0
Supported RAP Ids: 0003192101002003, 000C192101002003, 4003192101002003, 400C192101002003, 4003192101011103, 400C192101011103, 4003192101021103, 400C192101021103, 4003192101031103, 400C192101031103, 4003192101011105, 400C192101011105, 400C192101021105, 400C192101031105
FlashID0: 00EC 0040 - 0040 0121 [Samsung 2Gb DDP OneNAND,2 Gbits] type: ONENAND,RAP
ExtBUSC: 0000 0000 0000 0000 0000 0000 0000 0000
ExtDEVC: FFFF 0000 - 0000 0000
RAPIDOv11_algo.fg: [XSR 1.5] version: 1.35.0 revision: 0.0 size: 0x272B0
Supported RAP Ids: 0003192101002003, 000C192101002003, 4003192101002003, 400C192101002003, 4003192101011103, 400C192101011103, 4003192101021103, 400C192101021103, 4003192101031103, 400C192101031103, 4003192101011105, 400C192101011105, 400C192101021105, 400C192101031105
RAP PAPUBKEYS ID: 52570A2086C79E6965175815B5388535CDD5C6F7
Original Imei: 35************
Original Product code: 0569999

Phone Type: RM-346 (Nokia E71)
SW Version: V 100.71.821.4 06-06-08 RM-346 (c) Nokia
Imei plain: 35************
Product Code: 0569999
ApeCoreSw: 100.07.76
VariantId: 100.07.76100.07.76_v241.02
Language Pack:
- not available.

SIMLOCK seems to be valid
SUPERDONGLE_KEY seems to be valid
SIMLOCK_TEST passed
SECURITY_TEST passed

*quot;C:\Program Files\Nokia\Phoenix\Products\RM-346*quot; folder created.

Provider: Hutchinson 3G (3), Country: United Kingdom
Counter: 0/3, 0/10

CONFIG_DATA: 2342000000000000
PROFILE_BITS: 8000000000000000

BLOCK 1: 1=LOCKED (MCC+MNC): 23420F, DATA=23420F
BLOCK 2: 1=LOCKED (MCC+MNC): 23595F, DATA=23595F
================================================== ==============

UNLOCKED_INFO:
-------------------

Provider: Hutchinson 3G (3), Country: United Kingdom
Counter: 0/3, 0/10

CONFIG_DATA: 2342000000000000
PROFILE_BITS: 8000000000000000

BLOCK 1: 1=LOCKED (MCC+MNC): 23420F, DATA=23420F
BLOCK 2: 1=LOCKED (MCC+MNC): 23595F, DATA=23595F

Backup saved to *quot;BB5_35************_SIMLOCK.back*quot;

ROOT KEY HASH: CAEEBB65D3C48E6DC73B49DC5063A2EE
ROM ID: 4B9B75103E691FF8

Sending bootloader, size: 0x3AC0 ...
Calculating data ...OK
Writing PM buffer ... OK
Completed in 18.375 s
Restarting phone ...

Reading Simlock info ...
Provider: ALL Operator, Country: -
Counter: 0/3, 0/10

CONFIG_DATA: 0010100000000000
PROFILE_BITS: 8000000000000000

BLOCK 1: 1=OPEN, DATA=00101F
 
Back
Top