answer: [MXKEY - INFO] Successfully Unlocked/repaired Phones By MXKey
MY FIRST ONE WITH MX KEY TODAY
Using device: UFS_USB V2.7 (c) SarasSoft 2005.
Library version: 1.0.0.10913, Date: 05-11-2009
ASIC ID: 0x2201 [UPP_2M ver: 2]
SecondaryBoot: u_2nd.fia [DCT4] version: 4.76.0 revision: 0.7 size: 0x9A0
Supported Ids: 0011, 0010, 0121, 0120, 1120, 1131, 1130, 2141, 2140, 2142, 2151, 1141, 1181, 1015, 1021, 2031, 2030, 3041, 1201, 2201, 2291, 3161, 3160, 3164
FlashID0: 00EC 2268 [Samsung K8S3215ETE,32 Mbits] page size: 64 K type: NOR area: 01000000-013FFFFF
FlashID1: 0000 0001 [unused/removed]
ExtBUSC: AD7E B61A 1BBE 0BE2 7D58 6BE4 DBEE 6514
Algorithm: u_amd.fia [DCT4 ALGORITHM] version: 4.76.0 revision: 0.7 size: 0x78B8
Supported Ids: 0011, 0010, 0121, 0120, 1120, 1131, 1130, 2141, 2140, 2142, 2151, 1141, 1181, 1015, 1021, 2031, 2030, 3041, 1201, 2201, 2291, 3161, 3160, 3164
Performing Flash Authentication ...OK
UEM ID: 001ACB33:2984DA60
ASIC type: 2
UEM Imei: 35323701695449
Flash Imei: 35323701695449
RPL saved to *quot;C:\mobileEx\3.2\data\backup\RPL\3532370169544 9_BA CK.rpl*quot;
Processing file: RH70_05.530 as MCU
[DCT4,DCT4 ALGORITHM] size: 1.89 MB
Supported Ids: 0120, 0121, 1021, 1120, 1130, 1131, 1201, 2140, 2142, 2201, 2031, 2030, 2032, 2033
ASIC ID: 0x2201 [UPP_2M ver: 2]
SecondaryBoot: u_2nd.fia [DCT4] version: 4.76.0 revision: 0.7 size: 0x9A0
Supported Ids: 0011, 0010, 0121, 0120, 1120, 1131, 1130, 2141, 2140, 2142, 2151, 1141, 1181, 1015, 1021, 2031, 2030, 3041, 1201, 2201, 2291, 3161, 3160, 3164
FlashID0: 00EC 2268 [Samsung K8S3215ETE,32 Mbits] page size: 64 K type: NOR area: 01000000-013FFFFF
FlashID1: 0000 0001 [unused/removed]
ExtBUSC: AD7E B61A 1BBE 0BE2 7D58 6BE4 DBEE 6514
Algorithm: u_amd.fia [DCT4 ALGORITHM] version: 4.76.0 revision: 0.7 size: 0x78B8
Supported Ids: 0011, 0010, 0121, 0120, 1120, 1131, 1130, 2141, 2140, 2142, 2151, 1141, 1181, 1015, 1021, 2031, 2030, 3041, 1201, 2201, 2291, 3161, 3160, 3164
Performing Flash Authentication ...OK
UEM ID: 001ACB33:2984DA60
Area [01000000-0100FFFF] erased in 0.438 s
Area [01010000-013BFFFF] erased in 23.609 s
Area [013C0000-013EFFFF] erased in 1.219 s
Area [017C0000-017EFFFF] erased in 0.062 s
Area [01FC0000-01FEFFFF] erased in 0.047 s
Flash programming ...
Programming completed in 12.875 s
File Processed in 48.234 s
Processing file: rh700_nai5.53ia as CNT
[DCT4,DCT4 ALGORITHM] size: 166.37 KB
Supported Ids: 0120, 0121, 1021, 1120, 1130, 1131, 1201, 2140, 2142, 2201, 2031, 2030, 2032, 2033
ASIC ID: 0x2201 [UPP_2M ver: 2]
SecondaryBoot: u_2nd.fia [DCT4] version: 4.76.0 revision: 0.7 size: 0x9A0
Supported Ids: 0011, 0010, 0121, 0120, 1120, 1131, 1130, 2141, 2140, 2142, 2151, 1141, 1181, 1015, 1021, 2031, 2030, 3041, 1201, 2201, 2291, 3161, 3160, 3164
FlashID0: 00EC 2268 [Samsung K8S3215ETE,32 Mbits] page size: 64 K type: NOR area: 01000000-013FFFFF
FlashID1: 0000 0001 [unused/removed]
ExtBUSC: AD7E B61A 1BBE 0BE2 7D58 6BE4 DBEE 6514
Algorithm: u_amd.fia [DCT4 ALGORITHM] version: 4.76.0 revision: 0.7 size: 0x78B8
Supported Ids: 0011, 0010, 0121, 0120, 1120, 1131, 1130, 2141, 2140, 2142, 2151, 1141, 1181, 1015, 1021, 2031, 2030, 3041, 1201, 2201, 2291, 3161, 3160, 3164
Performing Flash Authentication ...OK
UEM ID: 001ACB33:2984DA60
Area [01380000-013BFFFF] erased in 1.718 s
Flash programming ...
Programming completed in 1.156 s
Extracting Content Pack, File Server fake reply for CUI phone.
Content Pack extracted successfully in 0.031 s
File Processed in 16.532 s
Processing file: rh70_05.53ia as PPM
[DCT4,DCT4 ALGORITHM] size: 1.40 MB
Supported Ids: 0120, 0121, 1021, 1120, 1130, 1131, 1201, 2140, 2142, 2201, 2031, 2030, 2032, 2033
ASIC ID: 0x2201 [UPP_2M ver: 2]
SecondaryBoot: u_2nd.fia [DCT4] version: 4.76.0 revision: 0.7 size: 0x9A0
Supported Ids: 0011, 0010, 0121, 0120, 1120, 1131, 1130, 2141, 2140, 2142, 2151, 1141, 1181, 1015, 1021, 2031, 2030, 3041, 1201, 2201, 2291, 3161, 3160, 3164
FlashID0: 00EC 2268 [Samsung K8S3215ETE,32 Mbits] page size: 64 K type: NOR area: 01000000-013FFFFF
FlashID1: 0000 0001 [unused/removed]
ExtBUSC: AD7E B61A 1BBE 0BE2 7D58 6BE4 DBEE 6514
Algorithm: u_amd.fia [DCT4 ALGORITHM] version: 4.76.0 revision: 0.7 size: 0x78B8
Supported Ids: 0011, 0010, 0121, 0120, 1120, 1131, 1130, 2141, 2140, 2142, 2151, 1141, 1181, 1015, 1021, 2031, 2030, 3041, 1201, 2201, 2291, 3161, 3160, 3164
Performing Flash Authentication ...OK
UEM ID: 001ACB33:2984DA60
Area [011E0000-011EFFFF] erased in 0.390 s
Area [011F0000-0137FFFF] erased in 10.407 s
Flash programming ...
Programming completed in 10.125 s
File Processed in 29.156 s
Flashing completed in 2 min 6.187 s
Phone Type: RH-70
SW Version: V 5.53 20-07-06 RH-70 (c) NMP
Imei plain: 35323701695449-8
Product Code: 0525242
Cellular System: GSM
ASIC ID: 0x2201, type: 2
Ppm Id: IA
Language Pack:
English,Arabic,Farsi,French,Urdu
Imei net: 35323701695449
Provider: ALL Operator, Country: -
Counter: 0/3, 0/10
CONFIG_DATA: 0010100000000000
PROFILE_BITS: 0000000000000002
BLOCK 1: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 2: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 3: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 4: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 5: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 6: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
BLOCK 7: 1.OPEN 2.OPEN 3.OPEN 4.OPEN 5.OPEN
Total time to process is 2 min 14.187 s
FULL FACTORY... OK
USER DATA... OK
LEAVE FACTORY... OK
SERVICE CENTER... OK
SOFTWARE UPGRADE... OK