|
Welcome to the GSM-Forum forums. You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. Only registered members may post questions, contact other members or search our database of over 8 million posts. Registration is fast, simple and absolutely free so please - Click to REGISTER! If you have any problems with the registration process or your account login, please contact contact us . |
|
Register | FAQ | Donate | Forum Rules | Root any Device | ★iPhone Unlock★ | ★ Direct Codes ★ | Direct Unlock Source |
| LinkBack | Thread Tools | Display Modes |
08-12-2021, 14:01 | #1 (permalink) |
Crazy Poster Join Date: Nov 2012 Location: Dominican Republic
Posts: 55
Member: 1834684 Status: Offline Thanks Meter: 18 | Alcatel 5059Z (1X) not unlock Operation: Unlock network Software version: 2.3 Host Power Off... OK Switch virtual port to USB... OK Connect Type-C to BOX... OK Host Power On... OK Wait for device... OK Read usbhost speed... HIGH Read Device Descriptor... Get VID/PID...0E8D/0003 Send start cmd... OK Get HW code from device... 0699 Get HW & SW version from device... OK HW VER: CB00, SW VER: 0002, HW SUB CODE: 8A00 Detect chip [MT6739] Get sec config... OK [000000E7] Active sec flags: [SBC SLA DAA] Advanced Bypass Security... OK Disconnect virtual port... OK Connect Type-C to HUB... OK Wait for device connecting... OK Device found at COM86 [BROM] Open port... OK Send start cmd... OK Get HW code from device... 0699 Get HW & SW version from device... OK HW VER: CB00, SW VER: 0002, HW SUB CODE: 8A00 Detect chip [MT6739] Library Version [2] Select platform... OK Init BROM... OK Force Charge... OK Disable WatchDog Timer... OK Reopen port for libver2... OK Get ME ID... OK ME_ID = 0xDCA2A61E, 0x38F8383B, 0x80052889, 0x983DAA68 Get Chip ID... [MT6739] Get SOC ID... [0B072B98D768635B7FC32230E6F21A1D855FBCBC00EDF6C877 BECAA252D943A7] Get sec config... OK [000000E0] Load DownloadAgent... OK Search DA... OK [0] Send preloader... OK Start preloader... OK Check preloader answer... OK Send bootloader... OK Start bootloader... OK Wait for answer from bootloader... OK Send SYNC signal... OK Setup device enviroment... OK Setup device parametres... OK Receive DA SYNC signal... OK Set DA parametres... OK Get device connection agent... [BROM] Get device info... OK EMMC_ID: 0x150100514536334D4203FA519A0B95F1 Load EMI config from database [DB VER: 164 DB DATE: 07-17-2021] OK [1] Trying EMI [A04CDABF, FC9B8C75, DF99C5B5, 8C50A367] Init EXT RAM... OK Send 2nd DA... OK Get device info... OK EMMC INFO: EMMC_ID : 0x150100514536334D4203FA519A0B95F1 EMMC_BOOT1: 0x0000400000 (4.00Mb) EMMC_BOOT2: 0x0000400000 (4.00Mb) EMMC_RPMB : 0x0000400000 (4.00Mb) EMMC_USER : 0x03A3E00000 (14.56Gb) RAM INFO: INT_SRAM: 0x0000020000 (128.00Kb) EXT_RAM : 0x0080000000 (2.00Gb) Check USB status... USB_HIGH_SPEED Read partitions info from phone... OK Read security partition from phone... OK Read security files... OK Read security files... OK Read lock info... Exception: Access violation at address 00407490 in module 'PandoraTool.exe'. Read of address 00000000 |
Bookmarks |
| |
|