GSM Shop GSM Shop
GSM-Forum  

Welcome to the GSM-Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features.
Only registered members may post questions, contact other members or search our database of over 8 million posts.

Registration is fast, simple and absolutely free so please - Click to REGISTER!

If you have any problems with the registration process or your account login, please contact contact us .

Go Back   GSM-Forum > Product Support Sections > Hard/Software Products (official support) > Pandora’s box


Reply
 
LinkBack Thread Tools Display Modes
Old 03-12-2021, 22:38   #1 (permalink)
Product Manager
 
blang's Avatar
 
Join Date: Oct 2000
Location: future
Posts: 22,431
Member: 2368
Status: Offline
Sonork: 100.111111
Thanks Meter: 186,554
Donate money to this user
Post here successfully job with Pandora's


Post here successfully job only.
  Reply With Quote
The Following 20 Users Say Thank You to blang For This Useful Post:
Show/Hide list of the thanked
Old 03-22-2021, 04:28   #2 (permalink)
Freak Poster
 
Join Date: Jul 2012
Location: Costa Rica
Posts: 177
Member: 1790061
Status: Offline
Thanks Meter: 63
I am going to buy it, the z3x equipment, I succeed with everything, I will update soon
  Reply With Quote
The Following 2 Users Say Thank You to YisusCell For This Useful Post:
Old 03-28-2021, 21:35   #3 (permalink)
No Life Poster
 
Join Date: Feb 2015
Location: Jamaican
Posts: 1,708
Member: 2339843
Status: Offline
Thanks Meter: 1,450
Donate money to this user
go ahead we need to see all the miracles so we can buy too
  Reply With Quote
The Following User Says Thank You to ziggywong0305 For This Useful Post:
Old 03-29-2021, 09:56   #4 (permalink)
Insane Poster
 
Join Date: Oct 2010
Posts: 83
Member: 1418749
Status: Offline
Thanks Meter: 45
Redmi Note 9 Unlock bootloader done with Pandora Box

Redmi Note 9 Unlock bootloader done with pandora Box






  Reply With Quote
The Following 4 Users Say Thank You to kamal112233 For This Useful Post:
Show/Hide list of the thanked
Old 03-29-2021, 09:58   #5 (permalink)
Insane Poster
 
Join Date: Oct 2010
Posts: 83
Member: 1418749
Status: Offline
Thanks Meter: 45
Thumbs up Redmi Note 9 Write Flash done with Pandora Box

Redmi Note 9 Write Flash done with Pandora Box

  Reply With Quote
The Following 3 Users Say Thank You to kamal112233 For This Useful Post:
Show/Hide list of the thanked
Old 03-29-2021, 16:40   #6 (permalink)
Freak Poster
 
Join Date: Nov 2019
Location: pakistan
Age: 26
Posts: 282
Member: 2934984
Status: Offline
Sonork: 69
Thanks Meter: 46
yeah let's see i will spent 200, If you do something that no one has ever done before
  Reply With Quote
The Following 2 Users Say Thank You to h3yazlan For This Useful Post:
Old 04-10-2021, 09:52   #7 (permalink)
No Life Poster
 
Join Date: May 2005
Location: Tirana
Age: 43
Posts: 789
Member: 143851
Status: Offline
Thanks Meter: 159
Talking Revvl 4 TMB 5007Z Revvl unlock done

Selected model: TMB 5007Z (Revvl 4)
Operation: Unlock network
Software version: 1.6

Host Power Off... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Wait for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0717
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0200, HW SUB CODE: 8A00
Detect chip [MT6761]
Get sec config... OK [000000E7]
Active sec flags: [SBC SLA DAA]
Advanced Bypass Security... OK
Disconnect virtual port... OK
Connect Type-C to HUB... OK
Wait for device connecting... OK
Device found at COM37 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0717
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0200, HW SUB CODE: 8A00
Detect chip [MT6761]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x50ACBA38, 0x87FF9E47, 0xB38CF83E, 0xB4EE72EC
Get Chip ID... [MT6761]
Get SOC ID... [D7CE7CE4806DFDB36EDD76BA489D02318A2B27136ED931C4E1 C4D8362D981AFD]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [30]
Send preloader... OK
Start preloader... OK
Check preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x1501003458364B4D42030703DC8CA781
Load EMI config from database [DB VER: 47 DB DATE: 04-02-2021] OK [1]
Trying EMI [44724C4B, 7CB86554, 9C47C7D7, C26ECB0F, CCFE52E9, 2E865ED1, 4C76F2A3]
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_ID : 0x1501003458364B4D42030703DC8CA781
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0000400000 (4.00Mb)
EMMC_USER : 0x0747C00000 (29.12Gb)
RAM INFO:
INT_SRAM: 0x0000039000 (228.00Kb)
EXT_RAM : 0x0080000000 (2.00Gb)
Check USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Read security partition from phone... OK
Read security files... OK
Read lock info... OK
Write lock info... OK
Write security partition to phone... OK
Network Unlock done!
  Reply With Quote
The Following User Says Thank You to ak0101 For This Useful Post:
Old 04-13-2021, 06:29   #8 (permalink)
No Life Poster
 
Join Date: Jul 2011
Location: Nairobi, Kenya
Posts: 538
Member: 1610674
Status: Offline
Sonork: 210921
Thanks Meter: 217
Alcatel 1 5007u unlock done

  Reply With Quote
Old 04-13-2021, 12:32   #9 (permalink)
Freak Poster
 
Join Date: Nov 2019
Location: South Africa
Age: 33
Posts: 124
Member: 2934673
Status: Offline
Sonork: Still Not Created
Thanks Meter: 218
Donate money to this user
Huawei Amn-LXX (y5 2019) imei Repair With Pandora’s Box

Huawei Amn-LXX (y5 2019) imei Repair With Pandora’s Box

http://www.youtube.com/watch?v=I9Eh7Sg_bVw

Last edited by rmarconcini; 04-14-2021 at 16:58.
  Reply With Quote
The Following 2 Users Say Thank You to GSM.AFRICA For This Useful Post:
Old 04-22-2021, 06:20   #10 (permalink)
Freak Poster
 
kzafquiel's Avatar
 
Join Date: Jun 2010
Location: MEXICO
Posts: 343
Member: 1318721
Status: Offline
Thanks Meter: 166
zte blade v smart READ CODES ,imei and read flash done

Selected model: ZTE UNKNOWN
Operation: Read Flash Info
Software version: 1.7

copiar imagen de pagina web
Host Power Off... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Host Power On... OK
Wait for device connecting... OK
Device found at COM8 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0788
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6771]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x3257773D, 0xBC2D560F, 0x5DE19E90, 0xBB581B26
Get Chip ID... [MT6771]
Get SOC ID... [B35CE499B8B04002C8D17B2A334E9EC8FCB6221C4CB572D81D ABB16F75B3CCE7]
Get sec config... OK [000000E1]
Load DownloadAgent... OK
Search DA... OK [25]
Send preloader... OK
Start preloader... OK
Check preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... timeout


Selected model: ZTE UNKNOWN
Operation: Read Flash Info
Software version: 1.7

Host Power Off... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Wait for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0788
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6771]
Get sec config... OK [000000E1]
Active sec flags: [SBC]
Advanced Bypass Security... OK
Disconnect virtual port... OK
Connect Type-C to HUB... OK
Wait for device connecting... OK
Device found at COM8 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0788
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6771]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x3257773D, 0xBC2D560F, 0x5DE19E90, 0xBB581B26
Get Chip ID... [MT6771]
Get SOC ID... [B35CE499B8B04002C8D17B2A334E9EC8FCB6221C4CB572D81D ABB16F75B3CCE7]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [25]
Send preloader... OK
Start preloader... OK
Check preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x45010044413431323801ABD76440C677
Load EMI config from database [DB VER: 56 DB DATE: 04-11-2021] OK [2]
Trying EMI [08EDF5FC, 6A5BF28C]
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_ID : 0x45010044413431323801ABD76440C677
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0001000000 (16.00Mb)
EMMC_USER : 0x1D1EC00000 (116.48Gb)
RAM INFO:
INT_SRAM: 0x0000039000 (228.00Kb)
EXT_RAM : 0x0100000000 (4.00Gb)
Read Flash Info done!


Selected model: ZTE UNKNOWN
Operation: Read PTT
Software version: 1.7

Host Power Off... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Wait for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0788
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6771]
Get sec config... OK [000000E1]
Active sec flags: [SBC]
Advanced Bypass Security... OK
Disconnect virtual port... OK
Connect Type-C to HUB... OK
Wait for device connecting... OK
Device found at COM8 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0788
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6771]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x3257773D, 0xBC2D560F, 0x5DE19E90, 0xBB581B26
Get Chip ID... [MT6771]
Get SOC ID... [B35CE499B8B04002C8D17B2A334E9EC8FCB6221C4CB572D81D ABB16F75B3CCE7]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [25]
Send preloader... OK
Start preloader... OK
Check preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x45010044413431323801ABD76440C677
Load EMI config from database [DB VER: 56 DB DATE: 04-11-2021] OK [2]
Trying EMI [08EDF5FC, 6A5BF28C]
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_ID : 0x45010044413431323801ABD76440C677
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0001000000 (16.00Mb)
EMMC_USER : 0x1D1EC00000 (116.48Gb)
RAM INFO:
INT_SRAM: 0x0000039000 (228.00Kb)
EXT_RAM : 0x0100000000 (4.00Gb)
Check USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Read partition "preloader"... OK
Read partition "pgpt"... OK
Read partition "boot_para"... OK
Read partition "recovery"... OK
Read partition "para"... OK
Read partition "expdb"... OK
Read partition "ztecfg"... OK
Read partition "frp"... OK
Read partition "nvcfg"... OK
Read partition "nvdata"... OK
Read partition "metadata"... OK
Read partition "protect1"... OK
Read partition "protect2"... OK
Read partition "seccfg"... OK
Read partition "persist"... OK
Read partition "sec1"... OK
Read partition "proinfo"... OK
Read partition "md1img"... OK
Read partition "md1dsp"... OK
Read partition "spmfw"... OK
Read partition "scp1"... OK
Read partition "scp2"... OK
Read partition "sspm_1"... OK
Read partition "sspm_2"... OK
Read partition "cam_vpu1"... OK
Read partition "cam_vpu2"... OK
Read partition "cam_vpu3"... OK
Read partition "gz1"... OK
Read partition "gz2"... OK
Read partition "nvram"... OK
Read partition "lk"... OK
Read partition "lk2"... OK
Read partition "boot"... OK
Read partition "logo"... OK
Read partition "dtbo"... OK
Read partition "tee1"... OK
Read partition "tee2"... OK
Read partition "vendor"... OK
Read partition "system"... OK
Read partition "cache"... OK
Read partition "otp"... OK
Read partition "flashinfo"... OK
Read partition "sgpt"... OK
Dumping Partitions done!


Selected model: ZTE UNKNOWN
Operation: Read Region
Software version: 1.7

Select region for dump!


Selected model: ZTE UNKNOWN
Operation: Read OTP
Software version: 1.7

Host Power Off... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Wait for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0788
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6771]
Get sec config... OK [000000E1]
Active sec flags: [SBC]
Advanced Bypass Security... OK
Disconnect virtual port... OK
Connect Type-C to HUB... OK
Wait for device connecting... OK
Device found at COM8 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0788
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6771]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x3257773D, 0xBC2D560F, 0x5DE19E90, 0xBB581B26
Get Chip ID... [MT6771]
Get SOC ID... [B35CE499B8B04002C8D17B2A334E9EC8FCB6221C4CB572D81D ABB16F75B3CCE7]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [25]
Send preloader... OK
Start preloader... OK
Check preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x45010044413431323801ABD76440C677
Load EMI config from database [DB VER: 56 DB DATE: 04-11-2021] OK [2]
Trying EMI [08EDF5FC, 6A5BF28C]
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_ID : 0x45010044413431323801ABD76440C677
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0001000000 (16.00Mb)
EMMC_USER : 0x1D1EC00000 (116.48Gb)
RAM INFO:
INT_SRAM: 0x0000039000 (228.00Kb)
EXT_RAM : 0x0100000000 (4.00Gb)
Check USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Check OTP status... [STATUS_OTP_UNLOCKED]
Read OTP... OK
Reading OTP done!


Selected model: ZTE UNKNOWN
Operation: Read Codes
Software version: 1.7

Host Power Off... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Wait for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0788
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6771]
Get sec config... OK [000000E1]
Active sec flags: [SBC]
Advanced Bypass Security... OK
Disconnect virtual port... OK
Connect Type-C to HUB... OK
Wait for device connecting... OK
Device found at COM8 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0788
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6771]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x3257773D, 0xBC2D560F, 0x5DE19E90, 0xBB581B26
Get Chip ID... [MT6771]
Get SOC ID... [B35CE499B8B04002C8D17B2A334E9EC8FCB6221C4CB572D81D ABB16F75B3CCE7]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [25]
Send preloader... OK
Start preloader... OK
Check preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x45010044413431323801ABD76440C677
Load EMI config from database [DB VER: 56 DB DATE: 04-11-2021] OK [2]
Trying EMI [08EDF5FC, 6A5BF28C]
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_ID : 0x45010044413431323801ABD76440C677
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0001000000 (16.00Mb)
EMMC_USER : 0x1D1EC00000 (116.48Gb)
RAM INFO:
INT_SRAM: 0x0000039000 (228.00Kb)
EXT_RAM : 0x0100000000 (4.00Gb)
Check USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Read security partition from phone... OK
Read security files... OK
Read lock info... OK
N Code : 12345678
NS Code : 00000000
SP Code : 781234??
C Code : 00000000
SIM Code : 2222????
NS_SP Code: 00000000
SIM_C Code: 44??????
Read Codes done!


Selected model: ZTE UNKNOWN
Operation: Read IMEI Info
Software version: 1.7

Host Power Off... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Wait for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0788
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6771]
Get sec config... OK [000000E1]
Active sec flags: [SBC]
Advanced Bypass Security... OK
Disconnect virtual port... OK
Connect Type-C to HUB... OK
Wait for device connecting... OK
Device found at COM8 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0788
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6771]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x3257773D, 0xBC2D560F, 0x5DE19E90, 0xBB581B26
Get Chip ID... [MT6771]
Get SOC ID... [B35CE499B8B04002C8D17B2A334E9EC8FCB6221C4CB572D81D ABB16F75B3CCE7]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [25]
Send preloader... OK
Start preloader... OK
Check preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x45010044413431323801ABD76440C677
Load EMI config from database [DB VER: 56 DB DATE: 04-11-2021] OK [2]
Trying EMI [08EDF5FC, 6A5BF28C]
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_ID : 0x45010044413431323801ABD76440C677
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0001000000 (16.00Mb)
EMMC_USER : 0x1D1EC00000 (116.48Gb)
RAM INFO:
INT_SRAM: 0x0000039000 (228.00Kb)
EXT_RAM : 0x0100000000 (4.00Gb)
Check USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Read partition "nvram"... OK
Read NVRAM files... OK
Read IMEI... OK
IMEI: XXXXXXXX2255953
Reading IMEI done!


Selected model: ZTE UNKNOWN
Operation: Repair
Software version: 1.7

Host Power Off... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Wait for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0788
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6771]
Get sec config... OK [000000E1]
Active sec flags: [SBC]
Advanced Bypass Security... OK
Disconnect virtual port... OK
Connect Type-C to HUB... OK
Wait for device connecting... OK
Device found at COM8 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0788
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6771]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x3257773D, 0xBC2D560F, 0x5DE19E90, 0xBB581B26
Get Chip ID... [MT6771]
Get SOC ID... [B35CE499B8B04002C8D17B2A334E9EC8FCB6221C4CB572D81D ABB16F75B3CCE7]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [25]
Send preloader... OK
Start preloader... OK
Check preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x45010044413431323801ABD76440C677
Load EMI config from database [DB VER: 56 DB DATE: 04-11-2021] OK [2]
Trying EMI [08EDF5FC, 6A5BF28C]
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_ID : 0x45010044413431323801ABD76440C677
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0001000000 (16.00Mb)
EMMC_USER : 0x1D1EC00000 (116.48Gb)
RAM INFO:
INT_SRAM: 0x0000039000 (228.00Kb)
EXT_RAM : 0x0100000000 (4.00Gb)
Check USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Read partition "nvdata"... OK
Read partition "nvram"... OK
Read NVRAM files... OK
Read IMEI... OK
Read NVDATA files... OK
Read IMEI... OK
IMEI: XXXXXXXX2255953
Set new IMEI to:
IMEI: XXXXXXXX9021697
Write IMEI... OK
Format EMMC_USER partition( 0x05708000..0x09707FFF )... OK
Repair Security done!
  Reply With Quote
The Following User Says Thank You to kzafquiel For This Useful Post:
Old 04-22-2021, 06:23   #11 (permalink)
Freak Poster
 
kzafquiel's Avatar
 
Join Date: Jun 2010
Location: MEXICO
Posts: 343
Member: 1318721
Status: Offline
Thanks Meter: 166
Alcatel 5080A (Shine Lite) read flash , imei done

Selected model: Alcatel 5080A (Shine Lite)
Operation: Read Flash Info
Software version: 1.7

copiar imagen de pagina web
Host Power Off... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Host Power On... OK
Wait for device connecting... OK
Device found at COM8 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0335
Get HW & SW version from device... OK
HW VER: CB00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6735]
Library Version [1]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Load DownloadAgent... OK
ME_ID = 0xC209C2CD, 0xCD596B42, 0xC71B0813, 0x9E786C35
Get sec config... OK [00000007]
Active sec flags: [ SBC SLA DAA]
Get BROM version... OK
AUTH file not found!


Selected model: Alcatel 5080A (Shine Lite)
Operation: Read Flash Info
Software version: 1.7

Host Power Off... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Host Power On... OK
Wait for device connecting... OK
Device found at COM8 [BROM]
Open port... OK
Send start cmd... timeout(S_BROM_CMD_STARTCMD_TIMEOUT)


Selected model: Alcatel 5080A (Shine Lite)
Operation: Read Flash Info
Software version: 1.7

Host Power Off... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Host Power On... OK
Wait for device connecting... OK
Device found at COM8 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0335
Get HW & SW version from device... OK
HW VER: CB00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6735]
Library Version [1]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Load DownloadAgent... OK
ME_ID = 0xC209C2CD, 0xCD596B42, 0xC71B0813, 0x9E786C35
Get sec config... OK [00000007]
Active sec flags: [ SBC SLA DAA]
Get BROM version... OK
AUTH file not found!


Selected model: Alcatel 5080A (Shine Lite)
Operation: Read Flash Info
Software version: 1.7

Host Power Off... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Host Power On... OK
Wait for device connecting... OK
Device found at COM8 [BROM]
Open port... OK
Send start cmd... error(4)


Selected model: Alcatel 5080A (Shine Lite)
Operation: Read Flash Info
Software version: 1.7

Host Power Off... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Host Power On... OK
Wait for device connecting... OK
Device found at COM8 [BROM]
Open port... OK
Send start cmd... error(4)


Selected model: Alcatel 5080A (Shine Lite)
Operation: Read Flash Info
Software version: 1.7

Host Power Off... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Wait for device... OK
Read usbhost speed... FULL
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0335
Get HW & SW version from device... OK
HW VER: CB00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6735]
Get sec config... OK [00000007]
Active sec flags: [SBC SLA DAA]
Advanced Bypass Security... OK
Disconnect virtual port... OK
Connect Type-C to HUB... OK
Wait for device connecting... OK
Device found at COM8 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0335
Get HW & SW version from device... OK
HW VER: CB00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6735]
Library Version [1]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Load DownloadAgent... OK
ME_ID = 0xC209C2CD, 0xCD596B42, 0xC71B0813, 0x9E786C35
Get sec config... OK [00000000]
Get BROM version... OK
Search DA... OK [11]
Send preloader... OK
Start preloader... OK
Check preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Check bootloader answer... OK
Wait for answer from bootloader... OK
Wait for hw detection... OK
Wait DA version... v4.2
Send BROM version... OK
Send storage config... OK
SyncBmtInfoWithDA... OK
Set params... OK
Read flash info... OK
EMMC_ID: 0x150100514531334D420D5902B282A0D3
Load EMI config from database [DB VER: 56 DB DATE: 04-11-2021] OK [9]
Trying EMI [FCD13E57, 49CE1F40, 49120D13, 5DCFFA1A, DCF716DA, BBFE481A, ADB0E084, C3F7DB20, CC85EC35]
Init DRAM... OK
Enable DRAM... OK
Sync with DA... OK
Wait for DA H/W detection... OK
EMMC INFO:
EMMC_ID : 0x150100514531334D420D5902B28224D3
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0000400000 (4.00Mb)
EMMC_USER : 0x03A3E00000 (14.56Gb)
RAM INFO:
INT_SRAM: 0x0000020000 (128.00Kb)
EXT_RAM : 0x0080000000 (2.00Gb)
Read Flash Info done!


Selected model: Alcatel 5080A (Shine Lite)
Operation: Read Flash Info
Software version: 1.7

Host Power Off... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Wait for device... OK
Read usbhost speed... FULL
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0335
Get HW & SW version from device... OK
HW VER: CB00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6735]
Get sec config... OK [00000007]
Active sec flags: [SBC SLA DAA]
Advanced Bypass Security... OK
Disconnect virtual port... OK
Connect Type-C to HUB... OK
Wait for device connecting... OK
Device found at COM8 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0335
Get HW & SW version from device... OK
HW VER: CB00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6735]
Library Version [1]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Load DownloadAgent... OK
ME_ID = 0xC209C2CD, 0xCD596B42, 0xC71B0813, 0x9E786C35
Get sec config... OK [00000000]
Get BROM version... OK
Search DA... OK [11]
Send preloader... OK
Start preloader... OK
Check preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Check bootloader answer... OK
Wait for answer from bootloader... OK
Wait for hw detection... OK
Wait DA version... v4.2
Send BROM version... OK
Send storage config... OK
SyncBmtInfoWithDA... OK
Set params... OK
Read flash info... OK
EMMC_ID: 0x150100514531334D420D5902B282A0D3
Load EMI config from database [DB VER: 56 DB DATE: 04-11-2021] OK [9]
Trying EMI [FCD13E57, 49CE1F40, 49120D13, 5DCFFA1A, DCF716DA, BBFE481A, ADB0E084, C3F7DB20, CC85EC35]
Init DRAM... OK
Enable DRAM... OK
Sync with DA... OK
Wait for DA H/W detection... OK
EMMC INFO:
EMMC_ID : 0x150100514531334D420D5902B28224D3
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0000400000 (4.00Mb)
EMMC_USER : 0x03A3E00000 (14.56Gb)
RAM INFO:
INT_SRAM: 0x0000020000 (128.00Kb)
EXT_RAM : 0x0080000000 (2.00Gb)
Read Flash Info done!


Selected model: Alcatel 5080A (Shine Lite)
Operation: Read PTT
Software version: 1.7

Host Power Off... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Wait for device... OK
Read usbhost speed... FULL
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0335
Get HW & SW version from device... OK
HW VER: CB00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6735]
Get sec config... OK [00000007]
Active sec flags: [SBC SLA DAA]
Advanced Bypass Security... OK
Disconnect virtual port... OK
Connect Type-C to HUB... OK
Wait for device connecting... OK
Device found at COM8 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0335
Get HW & SW version from device... OK
HW VER: CB00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6735]
Library Version [1]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Load DownloadAgent... OK
ME_ID = 0xC209C2CD, 0xCD596B42, 0xC71B0813, 0x9E786C35
Get sec config... OK [00000000]
Get BROM version... OK
Search DA... OK [11]
Send preloader... OK
Start preloader... OK
Check preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Check bootloader answer... OK
Wait for answer from bootloader... OK
Wait for hw detection... OK
Wait DA version... v4.2
Send BROM version... OK
Send storage config... OK
SyncBmtInfoWithDA... OK
Set params... OK
Read flash info... OK
EMMC_ID: 0x150100514531334D420D5902B282A0D3
Load EMI config from database [DB VER: 56 DB DATE: 04-11-2021] OK [9]
Trying EMI [FCD13E57, 49CE1F40, 49120D13, 5DCFFA1A, DCF716DA, BBFE481A, ADB0E084, C3F7DB20, CC85EC35]
Init DRAM... OK
Enable DRAM... OK
Sync with DA... OK
Wait for DA H/W detection... OK
EMMC INFO:
EMMC_ID : 0x150100514531334D420D5902B28224D3
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0000400000 (4.00Mb)
EMMC_USER : 0x03A3E00000 (14.56Gb)
RAM INFO:
INT_SRAM: 0x0000020000 (128.00Kb)
EXT_RAM : 0x0080000000 (2.00Gb)
Check USB status... USB_FULL_SPEED
Switching to USB high speed... OK
Wait for device... OK
High Speed USB detected at COM10
Open port... OK
Check USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Read partition preloader... OK
Read partition pgpt... OK
Read partition proinfo... OK
Read partition nvram... OK
Read partition protect1... OK
Read partition protect2... OK
Read partition tctpersist... OK
Read partition simlock... OK
Read partition para... OK
Read partition lk... OK
Read partition boot... OK
Read partition recovery... OK
Read partition logo... OK
Read partition expdb... OK
Read partition seccfg... OK
Read partition oemkeystore... OK
Read partition secro... OK
Read partition keystore... OK
Read partition tee1... OK
Read partition tee2... OK
Read partition persist... OK
Read partition efuse... OK
Read partition frp... OK
Read partition nvdata... OK
Read partition metadata... OK
Read partition system... OK
Read partition cache... OK
Read partition otp... OK
Read partition flashinfo... OK
Read partition sgpt... OK
Dumping Partitions done!


Selected model: Alcatel 5080A (Shine Lite)
Operation: Repair
Software version: 1.7

Host Power Off... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Wait for device... OK
Read usbhost speed... FULL
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0335
Get HW & SW version from device... OK
HW VER: CB00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6735]
Get sec config... OK [00000007]
Active sec flags: [SBC SLA DAA]
Advanced Bypass Security... OK
Disconnect virtual port... OK
Connect Type-C to HUB... OK
Wait for device connecting... OK
Device found at COM8 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0335
Get HW & SW version from device... OK
HW VER: CB00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6735]
Library Version [1]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Load DownloadAgent... OK
ME_ID = 0xC209C2CD, 0xCD596B42, 0xC71B0813, 0x9E786C35
Get sec config... OK [00000000]
Get BROM version... OK
Search DA... OK [11]
Send preloader... OK
Start preloader... OK
Check preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Check bootloader answer... OK
Wait for answer from bootloader... OK
Wait for hw detection... OK
Wait DA version... v4.2
Send BROM version... OK
Send storage config... OK
SyncBmtInfoWithDA... OK
Set params... OK
Read flash info... OK
EMMC_ID: 0x150100514531334D420D5902B282A0D3
Load EMI config from database [DB VER: 56 DB DATE: 04-11-2021] OK [9]
Trying EMI [FCD13E57, 49CE1F40, 49120D13, 5DCFFA1A, DCF716DA, BBFE481A, ADB0E084, C3F7DB20, CC85EC35]
Init DRAM... OK
Enable DRAM... OK
Sync with DA... OK
Wait for DA H/W detection... OK
EMMC INFO:
EMMC_ID : 0x150100514531334D420D5902B28224D3
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0000400000 (4.00Mb)
EMMC_USER : 0x03A3E00000 (14.56Gb)
RAM INFO:
INT_SRAM: 0x0000020000 (128.00Kb)
EXT_RAM : 0x0080000000 (2.00Gb)
Check USB status... USB_FULL_SPEED
Switching to USB high speed... OK
Wait for device... OK
High Speed USB detected at COM10
Open port... OK
Check USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Get OTP size... OK [0x00800000]
Read OTP... OK
IMEI: xxxxxxxx1523764
Set new IMEI to:
IMEI: xxxxxxxx7504164
Check OTP status... [S_DA_OTP_LOCKED]
Write OTP... OK
Repair Security done!
  Reply With Quote
The Following User Says Thank You to kzafquiel For This Useful Post:
Old 04-22-2021, 23:06   #12 (permalink)
Junior Member
 
Join Date: Mar 2017
Location: Republica Dominicana
Posts: 26
Member: 2693343
Status: Offline
Thanks Meter: 3
Quote:
Originally Posted by ak0101 View Post
Selected model: TMB 5007Z (Revvl 4)
Operation: Unlock network
Software version: 1.6

Host Power Off... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Wait for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0717
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0200, HW SUB CODE: 8A00
Detect chip [MT6761]
Get sec config... OK [000000E7]
Active sec flags: [SBC SLA DAA]
Advanced Bypass Security... OK
Disconnect virtual port... OK
Connect Type-C to HUB... OK
Wait for device connecting... OK
Device found at COM37 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0717
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0200, HW SUB CODE: 8A00
Detect chip [MT6761]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x50ACBA38, 0x87FF9E47, 0xB38CF83E, 0xB4EE72EC
Get Chip ID... [MT6761]
Get SOC ID... [D7CE7CE4806DFDB36EDD76BA489D02318A2B27136ED931C4E1 C4D8362D981AFD]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [30]
Send preloader... OK
Start preloader... OK
Check preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x1501003458364B4D42030703DC8CA781
Load EMI config from database [DB VER: 47 DB DATE: 04-02-2021] OK [1]
Trying EMI [44724C4B, 7CB86554, 9C47C7D7, C26ECB0F, CCFE52E9, 2E865ED1, 4C76F2A3]
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_ID : 0x1501003458364B4D42030703DC8CA781
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0000400000 (4.00Mb)
EMMC_USER : 0x0747C00000 (29.12Gb)
RAM INFO:
INT_SRAM: 0x0000039000 (228.00Kb)
EXT_RAM : 0x0080000000 (2.00Gb)
Check USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Read security partition from phone... OK
Read security files... OK
Read lock info... OK
Write lock info... OK
Write security partition to phone... OK
Network Unlock done!
De donde descargaste el SCAT bro?
  Reply With Quote
Old 04-22-2021, 23:06   #13 (permalink)
Junior Member
 
Join Date: Mar 2017
Location: Republica Dominicana
Posts: 26
Member: 2693343
Status: Offline
Thanks Meter: 3
Quote:
Originally Posted by ak0101 View Post
Selected model: TMB 5007Z (Revvl 4)
Operation: Unlock network
Software version: 1.6

Host Power Off... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Wait for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0717
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0200, HW SUB CODE: 8A00
Detect chip [MT6761]
Get sec config... OK [000000E7]
Active sec flags: [SBC SLA DAA]
Advanced Bypass Security... OK
Disconnect virtual port... OK
Connect Type-C to HUB... OK
Wait for device connecting... OK
Device found at COM37 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0717
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0200, HW SUB CODE: 8A00
Detect chip [MT6761]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x50ACBA38, 0x87FF9E47, 0xB38CF83E, 0xB4EE72EC
Get Chip ID... [MT6761]
Get SOC ID... [D7CE7CE4806DFDB36EDD76BA489D02318A2B27136ED931C4E1 C4D8362D981AFD]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [30]
Send preloader... OK
Start preloader... OK
Check preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x1501003458364B4D42030703DC8CA781
Load EMI config from database [DB VER: 47 DB DATE: 04-02-2021] OK [1]
Trying EMI [44724C4B, 7CB86554, 9C47C7D7, C26ECB0F, CCFE52E9, 2E865ED1, 4C76F2A3]
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_ID : 0x1501003458364B4D42030703DC8CA781
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0000400000 (4.00Mb)
EMMC_USER : 0x0747C00000 (29.12Gb)
RAM INFO:
INT_SRAM: 0x0000039000 (228.00Kb)
EXT_RAM : 0x0080000000 (2.00Gb)
Check USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Read security partition from phone... OK
Read security files... OK
Read lock info... OK
Write lock info... OK
Write security partition to phone... OK
Network Unlock done!
De donde descargaste el SCAT bro?
  Reply With Quote
Old 04-23-2021, 06:14   #14 (permalink)
Product Supporter
 
nongmobile's Avatar
 
Join Date: Mar 2008
Location: Thailand
Age: 46
Posts: 920
Member: 716581
Status: Offline
Thanks Meter: 767
VIVO Y17 Read info , Write Firmware , Erase FRP By Pandora Box



Selected model: Vivo UNKNOWN
Operation: Read Flash Info
Software version: 1.7

Host Power Off... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Wait for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0766
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Advanced Bypass Security... OK
Disconnect virtual port... OK
Connect Type-C to HUB... OK
Wait for device connecting... OK
Device found at COM43 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x2407BC92, 0xD470517C, 0x2E9BC903, 0x903C4AB6
Get Chip ID... [MT6765]
Get SOC ID... [2571ED125253BFBAD2835CD78409DE5FA95146C172F5CF4E3D 2FAE6A6DB92544]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [29]
Send preloader... OK
Start preloader... OK
Check preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x150100444836444D420526E76A27B529
Load EMI config from database [DB VER: 56 DB DATE: 04-11-2021] OK [1]
Trying EMI [F6969C3D]
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_ID : 0x150100444836444D420526E76A27B529
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0000400000 (4.00Mb)
EMMC_USER : 0x0E8F800000 (58.24Gb)
RAM INFO:
INT_SRAM: 0x000003A000 (232.00Kb)
EXT_RAM : 0x0100000000 (4.00Gb)
Read Flash Info done!






Selected model: Vivo UNKNOWN
Operation: Flash (Download only)
Software version: 1.7

Parse scatter file... OK
Load Rom Images... OK
Host Power Off... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Wait for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0766
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Advanced Bypass Security... OK
Disconnect virtual port... OK
Connect Type-C to HUB... OK
Wait for device connecting... OK
Device found at COM43 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x2407BC92, 0xD470517C, 0x2E9BC903, 0x903C4AB6
Get Chip ID... [MT6765]
Get SOC ID... [2571ED125253BFBAD2835CD78409DE5FA95146C172F5CF4E3D 2FAE6A6DB92544]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [29]
Send preloader... OK
Start preloader... OK
Check preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x150100444836444D420526E76A27B529
Load EMI config from preloader... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_ID : 0x150100444836444D420526E76A27B529
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0000400000 (4.00Mb)
EMMC_USER : 0x0E8F800000 (58.24Gb)
RAM INFO:
INT_SRAM: 0x000003A000 (232.00Kb)
EXT_RAM : 0x0100000000 (4.00Gb)
Get scatter info... OK
Check USB status... USB_HIGH_SPEED
Get scatter info... OK
Verify scatter file... OK
Do NAND BMT remark... OK
Setup download info... OK
Get partition table catagory... OK [GPT]
Read mirror partition table... OK
Check partition table layout changed... OK
Read major partition table... OK
Check major partition table layout changed... OK
Download "preloader"... OK
Download "recovery"... OK
Download "survival"... OK
Download "cust"... OK
Download "efuse"... OK
Download "md1img"... OK
Download "spmfw"... OK
Download "scp1"... OK
Download "scp2"... OK
Download "sspm_1"... OK
Download "sspm_2"... OK
Download "lk"... OK
Download "lk2"... OK
Download "boot"... OK
Download "logo"... OK
Download "dtbo"... OK
Download "tee1"... OK
Download "tee2"... OK
Download "vendor"... OK
Download "system"... OK
Download "vbmeta"... OK
Download "cache"... OK
Download "userdata"... OK
Flashing done!




Selected model: Vivo UNKNOWN
Operation: Erase FRP
Software version: 1.7

Parse scatter file... OK
Load Rom Images... OK
Host Power Off... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Wait for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0766
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Advanced Bypass Security... OK
Disconnect virtual port... OK
Connect Type-C to HUB... OK
Wait for device connecting... OK
Device found at COM43 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x2407BC92, 0xD470517C, 0x2E9BC903, 0x903C4AB6
Get Chip ID... [MT6765]
Get SOC ID... [2571ED125253BFBAD2835CD78409DE5FA95146C172F5CF4E3D 2FAE6A6DB92544]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [29]
Send preloader... OK
Start preloader... OK
Check preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x150100444836444D420526E76A27B529
Load EMI config from preloader... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_ID : 0x150100444836444D420526E76A27B529
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0000400000 (4.00Mb)
EMMC_USER : 0x0E8F800000 (58.24Gb)
RAM INFO:
INT_SRAM: 0x000003A000 (232.00Kb)
EXT_RAM : 0x0100000000 (4.00Gb)
Get scatter info... OK
Check USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Read partition "frp"... OK
Format EMMC_USER partition( 0x05588000..0x05687FFF )... OK
Erase FRP done!
  Reply With Quote
The Following User Says Thank You to nongmobile For This Useful Post:
Old 04-25-2021, 08:18   #15 (permalink)
Product Supporter
 
nongmobile's Avatar
 
Join Date: Mar 2008
Location: Thailand
Age: 46
Posts: 920
Member: 716581
Status: Offline
Thanks Meter: 767
OPPO A31 CPH2015 Read info , Backup RPMB



  Reply With Quote
The Following User Says Thank You to nongmobile For This Useful Post:
Reply

Bookmarks


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


 



All times are GMT +1. The time now is 00:37.



Powered by Searchlight © 2024 Axivo Inc.
vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2024 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2023 -
Page generated in 0.17750 seconds with 9 queries

SEO by vBSEO