answer: [MXKEY - INFO] Successfully Unlocked/repaired Phones By MXKey
Using device: J.A.F, FW ver: 01.B1
Library version: 1.0.0.10913, Date: 05-11-2009
ASIC ID: 0x2201 [UPP_2M ver: 2]
SecondaryBoot: u_2nd.fia [DCT4] version: 4.76.0 revision: 0.7 size: 0x9A0
Supported Ids: 0011, 0010, 0121, 0120, 1120, 1131, 1130, 2141, 2140, 2142, 2151, 1141, 1181, 1015, 1021, 2031, 2030, 3041, 1201, 2201, 2291, 3161, 3160, 3164
FlashID0: 0001 2A7E [AMD S29NS032J,32 Mbits] page size: 64 K type: NOR area: 01000000-013FFFFF
FlashID1: 0000 0001 [unused/removed]
ExtBUSC: AD7E B61A 1BBE 0BE2 7D58 6BE4 DBEE 6514
Algorithm: u_amd.fia [DCT4 ALGORITHM] version: 4.76.0 revision: 0.7 size: 0x78B8
Supported Ids: 0011, 0010, 0121, 0120, 1120, 1131, 1130, 2141, 2140, 2142, 2151, 1141, 1181, 1015, 1021, 2031, 2030, 3041, 1201, 2201, 2291, 3161, 3160, 3164
Performing Flash Authentication ...OK
UEM ID: 00C23EF6:2984DA60
ASIC type: 2
UEM Imei: 35484201068056
Flash Imei: 35484201068056
RPL saved to "C:\mobileEx\3.2\data\backup\RPL\35484201068056_BA CK.rpl"
Processing file: rh93_07.020 as MCU
[DCT4,DCT4 ALGORITHM] size: 1.89 MB
Supported Ids: 0120, 0121, 1021, 1120, 1130, 1131, 1201, 2140, 2142, 2201, 2031, 2030, 2032, 2033
ASIC ID: 0x2201 [UPP_2M ver: 2]
SecondaryBoot: u_2nd.fia [DCT4] version: 4.76.0 revision: 0.7 size: 0x9A0
Supported Ids: 0011, 0010, 0121, 0120, 1120, 1131, 1130, 2141, 2140, 2142, 2151, 1141, 1181, 1015, 1021, 2031, 2030, 3041, 1201, 2201, 2291, 3161, 3160, 3164
FlashID0: 0001 2A7E [AMD S29NS032J,32 Mbits] page size: 64 K type: NOR area: 01000000-013FFFFF
FlashID1: 0000 0001 [unused/removed]
ExtBUSC: AD7E B61A 1BBE 0BE2 7D58 6BE4 DBEE 6514
Algorithm: u_amd.fia [DCT4 ALGORITHM] version: 4.76.0 revision: 0.7 size: 0x78B8
Supported Ids: 0011, 0010, 0121, 0120, 1120, 1131, 1130, 2141, 2140, 2142, 2151, 1141, 1181, 1015, 1021, 2031, 2030, 3041, 1201, 2201, 2291, 3161, 3160, 3164
Performing Flash Authentication ...OK
UEM ID: 00C23EF6:2984DA60
Area [01000000-0100FFFF] erased in 0.468 s
Area [01010000-013BFFFF] erased in 27.125 s
Area [013C0000-013EFFFF] erased in 1.344 s
Area [017C0000-017EFFFF] erased in 0.031 s
Area [01FC0000-01FEFFFF] erased in 0.047 s
Flash programming ...
Programming completed in 12.297 s
File Processed in 59.141 s
Processing file: rh930_nai7.02ia as CNT
[DCT4,DCT4 ALGORITHM] size: 159.09 KB
Supported Ids: 0120, 0121, 1021, 1120, 1130, 1131, 1201, 2140, 2142, 2201, 2031, 2030, 2032, 2033
ASIC ID: 0x2201 [UPP_2M ver: 2]
SecondaryBoot: u_2nd.fia [DCT4] version: 4.76.0 revision: 0.7 size: 0x9A0
Supported Ids: 0011, 0010, 0121, 0120, 1120, 1131, 1130, 2141, 2140, 2142, 2151, 1141, 1181, 1015, 1021, 2031, 2030, 3041, 1201, 2201, 2291, 3161, 3160, 3164
FlashID0: 0001 2A7E [AMD S29NS032J,32 Mbits] page size: 64 K type: NOR area: 01000000-013FFFFF
FlashID1: 0000 0001 [unused/removed]
ExtBUSC: AD7E B61A 1BBE 0BE2 7D58 6BE4 DBEE 6514
Algorithm: u_amd.fia [DCT4 ALGORITHM] version: 4.76.0 revision: 0.7 size: 0x78B8
Supported Ids: 0011, 0010, 0121, 0120, 1120, 1131, 1130, 2141, 2140, 2142, 2151, 1141, 1181, 1015, 1021, 2031, 2030, 3041, 1201, 2201, 2291, 3161, 3160, 3164
Performing Flash Authentication ...OK
UEM ID: 00C23EF6:2984DA60
Area [01380000-013BFFFF] erased in 1.844 s
Flash programming ...
Programming completed in 1.156 s
Extracting Content Pack, File Server fake reply for CUI phone.
Content Pack extracted successfully in 0.031 s
File Processed in 26.766 s
Processing file: rh93_07.02ia as PPM
[DCT4,DCT4 ALGORITHM] size: 1.28 MB
Supported Ids: 0120, 0121, 1021, 1120, 1130, 1131, 1201, 2140, 2142, 2201, 2031, 2030, 2032, 2033
ASIC ID: 0x2201 [UPP_2M ver: 2]
SecondaryBoot: u_2nd.fia [DCT4] version: 4.76.0 revision: 0.7 size: 0x9A0
Supported Ids: 0011, 0010, 0121, 0120, 1120, 1131, 1130, 2141, 2140, 2142, 2151, 1141, 1181, 1015, 1021, 2031, 2030, 3041, 1201, 2201, 2291, 3161, 3160, 3164
FlashID0: 0001 2A7E [AMD S29NS032J,32 Mbits] page size: 64 K type: NOR area: 01000000-013FFFFF
FlashID1: 0000 0001 [unused/removed]
ExtBUSC: AD7E B61A 1BBE 0BE2 7D58 6BE4 DBEE 6514
Algorithm: u_amd.fia [DCT4 ALGORITHM] version: 4.76.0 revision: 0.7 size: 0x78B8
Supported Ids: 0011, 0010, 0121, 0120, 1120, 1131, 1130, 2141, 2140, 2142, 2151, 1141, 1181, 1015, 1021, 2031, 2030, 3041, 1201, 2201, 2291, 3161, 3160, 3164
Performing Flash Authentication ...OK
UEM ID: 00C23EF6:2984DA60
Area [011E0000-011EFFFF] erased in 0.469 s
Area [011F0000-0137FFFF] erased in 11.531 s
Flash programming ...
Programming completed in 8.375 s
File Processed in 36.453 s
Flashing completed in 2 min 46.297 s
Phone Type: RH-93
SW Version: V 7.02 10-12-07 RH-93 (c) NMP
Imei plain: 35484201068056-6
Product Code: 0536515
Cellular System: GSM
ASIC ID: 0x2201, type: 2
Ppm Id: IA
Language Pack:
English,Arabic,Farsi,French,Urdu
Imei net: 35484201068056
Provider: ALL Operator, Country: -
Counter: 0/3, 0/10
CONFIG_DATA: 0010100000000000
PROFILE_BITS: 0000000000010002
BLOCK 1: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 2: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 3: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 4: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 5: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 6: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 7: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
Total time to process is 2 min 55.984 s
Using device: J.A.F, FW ver: 01.B1
Library version: 1.0.0.10913, Date: 05-11-2009
ASIC ID: 0x2201 [UPP_2M ver: 2]
SecondaryBoot: u_2nd.fia [DCT4] version: 4.76.0 revision: 0.7 size: 0x9A0
Supported Ids: 0011, 0010, 0121, 0120, 1120, 1131, 1130, 2141, 2140, 2142, 2151, 1141, 1181, 1015, 1021, 2031, 2030, 3041, 1201, 2201, 2291, 3161, 3160, 3164
FlashID0: 0001 2A7E [AMD S29NS032J,32 Mbits] page size: 64 K type: NOR area: 01000000-013FFFFF
FlashID1: 0000 0001 [unused/removed]
ExtBUSC: AD7E B61A 1BBE 0BE2 7D58 6BE4 DBEE 6514
Algorithm: u_amd.fia [DCT4 ALGORITHM] version: 4.76.0 revision: 0.7 size: 0x78B8
Supported Ids: 0011, 0010, 0121, 0120, 1120, 1131, 1130, 2141, 2140, 2142, 2151, 1141, 1181, 1015, 1021, 2031, 2030, 3041, 1201, 2201, 2291, 3161, 3160, 3164
Performing Flash Authentication ...OK
UEM ID: 00C23EF6:2984DA60
ASIC type: 2
UEM Imei: 35484201068056
Flash Imei: 35484201068056
RPL saved to "C:\mobileEx\3.2\data\backup\RPL\35484201068056_BA CK.rpl"
Processing file: rh93_07.020 as MCU
[DCT4,DCT4 ALGORITHM] size: 1.89 MB
Supported Ids: 0120, 0121, 1021, 1120, 1130, 1131, 1201, 2140, 2142, 2201, 2031, 2030, 2032, 2033
ASIC ID: 0x2201 [UPP_2M ver: 2]
SecondaryBoot: u_2nd.fia [DCT4] version: 4.76.0 revision: 0.7 size: 0x9A0
Supported Ids: 0011, 0010, 0121, 0120, 1120, 1131, 1130, 2141, 2140, 2142, 2151, 1141, 1181, 1015, 1021, 2031, 2030, 3041, 1201, 2201, 2291, 3161, 3160, 3164
FlashID0: 0001 2A7E [AMD S29NS032J,32 Mbits] page size: 64 K type: NOR area: 01000000-013FFFFF
FlashID1: 0000 0001 [unused/removed]
ExtBUSC: AD7E B61A 1BBE 0BE2 7D58 6BE4 DBEE 6514
Algorithm: u_amd.fia [DCT4 ALGORITHM] version: 4.76.0 revision: 0.7 size: 0x78B8
Supported Ids: 0011, 0010, 0121, 0120, 1120, 1131, 1130, 2141, 2140, 2142, 2151, 1141, 1181, 1015, 1021, 2031, 2030, 3041, 1201, 2201, 2291, 3161, 3160, 3164
Performing Flash Authentication ...OK
UEM ID: 00C23EF6:2984DA60
Area [01000000-0100FFFF] erased in 0.468 s
Area [01010000-013BFFFF] erased in 27.125 s
Area [013C0000-013EFFFF] erased in 1.344 s
Area [017C0000-017EFFFF] erased in 0.031 s
Area [01FC0000-01FEFFFF] erased in 0.047 s
Flash programming ...
Programming completed in 12.297 s
File Processed in 59.141 s
Processing file: rh930_nai7.02ia as CNT
[DCT4,DCT4 ALGORITHM] size: 159.09 KB
Supported Ids: 0120, 0121, 1021, 1120, 1130, 1131, 1201, 2140, 2142, 2201, 2031, 2030, 2032, 2033
ASIC ID: 0x2201 [UPP_2M ver: 2]
SecondaryBoot: u_2nd.fia [DCT4] version: 4.76.0 revision: 0.7 size: 0x9A0
Supported Ids: 0011, 0010, 0121, 0120, 1120, 1131, 1130, 2141, 2140, 2142, 2151, 1141, 1181, 1015, 1021, 2031, 2030, 3041, 1201, 2201, 2291, 3161, 3160, 3164
FlashID0: 0001 2A7E [AMD S29NS032J,32 Mbits] page size: 64 K type: NOR area: 01000000-013FFFFF
FlashID1: 0000 0001 [unused/removed]
ExtBUSC: AD7E B61A 1BBE 0BE2 7D58 6BE4 DBEE 6514
Algorithm: u_amd.fia [DCT4 ALGORITHM] version: 4.76.0 revision: 0.7 size: 0x78B8
Supported Ids: 0011, 0010, 0121, 0120, 1120, 1131, 1130, 2141, 2140, 2142, 2151, 1141, 1181, 1015, 1021, 2031, 2030, 3041, 1201, 2201, 2291, 3161, 3160, 3164
Performing Flash Authentication ...OK
UEM ID: 00C23EF6:2984DA60
Area [01380000-013BFFFF] erased in 1.844 s
Flash programming ...
Programming completed in 1.156 s
Extracting Content Pack, File Server fake reply for CUI phone.
Content Pack extracted successfully in 0.031 s
File Processed in 26.766 s
Processing file: rh93_07.02ia as PPM
[DCT4,DCT4 ALGORITHM] size: 1.28 MB
Supported Ids: 0120, 0121, 1021, 1120, 1130, 1131, 1201, 2140, 2142, 2201, 2031, 2030, 2032, 2033
ASIC ID: 0x2201 [UPP_2M ver: 2]
SecondaryBoot: u_2nd.fia [DCT4] version: 4.76.0 revision: 0.7 size: 0x9A0
Supported Ids: 0011, 0010, 0121, 0120, 1120, 1131, 1130, 2141, 2140, 2142, 2151, 1141, 1181, 1015, 1021, 2031, 2030, 3041, 1201, 2201, 2291, 3161, 3160, 3164
FlashID0: 0001 2A7E [AMD S29NS032J,32 Mbits] page size: 64 K type: NOR area: 01000000-013FFFFF
FlashID1: 0000 0001 [unused/removed]
ExtBUSC: AD7E B61A 1BBE 0BE2 7D58 6BE4 DBEE 6514
Algorithm: u_amd.fia [DCT4 ALGORITHM] version: 4.76.0 revision: 0.7 size: 0x78B8
Supported Ids: 0011, 0010, 0121, 0120, 1120, 1131, 1130, 2141, 2140, 2142, 2151, 1141, 1181, 1015, 1021, 2031, 2030, 3041, 1201, 2201, 2291, 3161, 3160, 3164
Performing Flash Authentication ...OK
UEM ID: 00C23EF6:2984DA60
Area [011E0000-011EFFFF] erased in 0.469 s
Area [011F0000-0137FFFF] erased in 11.531 s
Flash programming ...
Programming completed in 8.375 s
File Processed in 36.453 s
Flashing completed in 2 min 46.297 s
Phone Type: RH-93
SW Version: V 7.02 10-12-07 RH-93 (c) NMP
Imei plain: 35484201068056-6
Product Code: 0536515
Cellular System: GSM
ASIC ID: 0x2201, type: 2
Ppm Id: IA
Language Pack:
English,Arabic,Farsi,French,Urdu
Imei net: 35484201068056
Provider: ALL Operator, Country: -
Counter: 0/3, 0/10
CONFIG_DATA: 0010100000000000
PROFILE_BITS: 0000000000010002
BLOCK 1: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 2: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 3: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 4: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 5: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 6: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 7: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
Total time to process is 2 min 55.984 s