GSM-Forum

GSM-Forum (https://forum.gsmhosting.com/vbb/)
-   Pandora’s box (https://forum.gsmhosting.com/vbb/f1110/)
-   -   Post here successfully job with Pandora's (https://forum.gsmhosting.com/vbb/f1110/post-here-successfully-job-pandoras-2953984/)

blang 03-12-2021 22:38

Post here successfully job with Pandora's
 
Post here successfully job only.

YisusCell 03-22-2021 04:28

I am going to buy it, the z3x equipment, I succeed with everything, I will update soon

ziggywong0305 03-28-2021 21:35

go ahead we need to see all the miracles so we can buy too

kamal112233 03-29-2021 09:56

Redmi Note 9 Unlock bootloader done with Pandora Box
 
Redmi Note 9 Unlock bootloader done with pandora Box



https://i.ibb.co/34H5M19/redmi-note-9-read-info.png


https://i.ibb.co/smyNx1W/redmi-note-9-bootunlock.png

kamal112233 03-29-2021 09:58

Redmi Note 9 Write Flash done with Pandora Box
 
Redmi Note 9 Write Flash done with Pandora Box

https://i.ibb.co/CsNBpyf/redmi-note-9-flash-Done.png

h3yazlan 03-29-2021 16:40

yeah let's see i will spent 200, If you do something that no one has ever done before

ak0101 04-10-2021 09:52

Revvl 4 TMB 5007Z Revvl unlock done
 
Selected model: TMB 5007Z (Revvl 4)
Operation: Unlock network
Software version: 1.6

Host Power Off... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Wait for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0717
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0200, HW SUB CODE: 8A00
Detect chip [MT6761]
Get sec config... OK [000000E7]
Active sec flags: [SBC SLA DAA]
Advanced Bypass Security... OK
Disconnect virtual port... OK
Connect Type-C to HUB... OK
Wait for device connecting... OK
Device found at COM37 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0717
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0200, HW SUB CODE: 8A00
Detect chip [MT6761]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x50ACBA38, 0x87FF9E47, 0xB38CF83E, 0xB4EE72EC
Get Chip ID... [MT6761]
Get SOC ID... [D7CE7CE4806DFDB36EDD76BA489D02318A2B27136ED931C4E1 C4D8362D981AFD]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [30]
Send preloader... OK
Start preloader... OK
Check preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x1501003458364B4D42030703DC8CA781
Load EMI config from database [DB VER: 47 DB DATE: 04-02-2021] OK [1]
Trying EMI [44724C4B, 7CB86554, 9C47C7D7, C26ECB0F, CCFE52E9, 2E865ED1, 4C76F2A3]
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_ID : 0x1501003458364B4D42030703DC8CA781
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0000400000 (4.00Mb)
EMMC_USER : 0x0747C00000 (29.12Gb)
RAM INFO:
INT_SRAM: 0x0000039000 (228.00Kb)
EXT_RAM : 0x0080000000 (2.00Gb)
Check USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Read security partition from phone... OK
Read security files... OK
Read lock info... OK
Write lock info... OK
Write security partition to phone... OK
Network Unlock done!

okello 04-13-2021 06:29

Alcatel 1 5007u unlock done

https://i.postimg.cc/j2sbHZhw/alcatel-5007u.png

GSM.AFRICA 04-13-2021 12:32

Huawei Amn-LXX (y5 2019) imei Repair With Pandora’s Box
 
Huawei Amn-LXX (y5 2019) imei Repair With Pandora’s Box

http://www.youtube.com/watch?v=I9Eh7Sg_bVw

kzafquiel 04-22-2021 06:20

zte blade v smart READ CODES ,imei and read flash done
 
Selected model: ZTE UNKNOWN
Operation: Read Flash Info
Software version: 1.7
https://i.ibb.co/T1g5vgf/zte.jpg
copiar imagen de pagina web
Host Power Off... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Host Power On... OK
Wait for device connecting... OK
Device found at COM8 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0788
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6771]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x3257773D, 0xBC2D560F, 0x5DE19E90, 0xBB581B26
Get Chip ID... [MT6771]
Get SOC ID... [B35CE499B8B04002C8D17B2A334E9EC8FCB6221C4CB572D81D ABB16F75B3CCE7]
Get sec config... OK [000000E1]
Load DownloadAgent... OK
Search DA... OK [25]
Send preloader... OK
Start preloader... OK
Check preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... timeout


Selected model: ZTE UNKNOWN
Operation: Read Flash Info
Software version: 1.7

Host Power Off... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Wait for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0788
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6771]
Get sec config... OK [000000E1]
Active sec flags: [SBC]
Advanced Bypass Security... OK
Disconnect virtual port... OK
Connect Type-C to HUB... OK
Wait for device connecting... OK
Device found at COM8 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0788
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6771]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x3257773D, 0xBC2D560F, 0x5DE19E90, 0xBB581B26
Get Chip ID... [MT6771]
Get SOC ID... [B35CE499B8B04002C8D17B2A334E9EC8FCB6221C4CB572D81D ABB16F75B3CCE7]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [25]
Send preloader... OK
Start preloader... OK
Check preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x45010044413431323801ABD76440C677
Load EMI config from database [DB VER: 56 DB DATE: 04-11-2021] OK [2]
Trying EMI [08EDF5FC, 6A5BF28C]
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_ID : 0x45010044413431323801ABD76440C677
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0001000000 (16.00Mb)
EMMC_USER : 0x1D1EC00000 (116.48Gb)
RAM INFO:
INT_SRAM: 0x0000039000 (228.00Kb)
EXT_RAM : 0x0100000000 (4.00Gb)
Read Flash Info done!


Selected model: ZTE UNKNOWN
Operation: Read PTT
Software version: 1.7

Host Power Off... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Wait for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0788
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6771]
Get sec config... OK [000000E1]
Active sec flags: [SBC]
Advanced Bypass Security... OK
Disconnect virtual port... OK
Connect Type-C to HUB... OK
Wait for device connecting... OK
Device found at COM8 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0788
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6771]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x3257773D, 0xBC2D560F, 0x5DE19E90, 0xBB581B26
Get Chip ID... [MT6771]
Get SOC ID... [B35CE499B8B04002C8D17B2A334E9EC8FCB6221C4CB572D81D ABB16F75B3CCE7]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [25]
Send preloader... OK
Start preloader... OK
Check preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x45010044413431323801ABD76440C677
Load EMI config from database [DB VER: 56 DB DATE: 04-11-2021] OK [2]
Trying EMI [08EDF5FC, 6A5BF28C]
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_ID : 0x45010044413431323801ABD76440C677
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0001000000 (16.00Mb)
EMMC_USER : 0x1D1EC00000 (116.48Gb)
RAM INFO:
INT_SRAM: 0x0000039000 (228.00Kb)
EXT_RAM : 0x0100000000 (4.00Gb)
Check USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Read partition "preloader"... OK
Read partition "pgpt"... OK
Read partition "boot_para"... OK
Read partition "recovery"... OK
Read partition "para"... OK
Read partition "expdb"... OK
Read partition "ztecfg"... OK
Read partition "frp"... OK
Read partition "nvcfg"... OK
Read partition "nvdata"... OK
Read partition "metadata"... OK
Read partition "protect1"... OK
Read partition "protect2"... OK
Read partition "seccfg"... OK
Read partition "persist"... OK
Read partition "sec1"... OK
Read partition "proinfo"... OK
Read partition "md1img"... OK
Read partition "md1dsp"... OK
Read partition "spmfw"... OK
Read partition "scp1"... OK
Read partition "scp2"... OK
Read partition "sspm_1"... OK
Read partition "sspm_2"... OK
Read partition "cam_vpu1"... OK
Read partition "cam_vpu2"... OK
Read partition "cam_vpu3"... OK
Read partition "gz1"... OK
Read partition "gz2"... OK
Read partition "nvram"... OK
Read partition "lk"... OK
Read partition "lk2"... OK
Read partition "boot"... OK
Read partition "logo"... OK
Read partition "dtbo"... OK
Read partition "tee1"... OK
Read partition "tee2"... OK
Read partition "vendor"... OK
Read partition "system"... OK
Read partition "cache"... OK
Read partition "otp"... OK
Read partition "flashinfo"... OK
Read partition "sgpt"... OK
Dumping Partitions done!


Selected model: ZTE UNKNOWN
Operation: Read Region
Software version: 1.7

Select region for dump!


Selected model: ZTE UNKNOWN
Operation: Read OTP
Software version: 1.7

Host Power Off... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Wait for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0788
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6771]
Get sec config... OK [000000E1]
Active sec flags: [SBC]
Advanced Bypass Security... OK
Disconnect virtual port... OK
Connect Type-C to HUB... OK
Wait for device connecting... OK
Device found at COM8 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0788
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6771]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x3257773D, 0xBC2D560F, 0x5DE19E90, 0xBB581B26
Get Chip ID... [MT6771]
Get SOC ID... [B35CE499B8B04002C8D17B2A334E9EC8FCB6221C4CB572D81D ABB16F75B3CCE7]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [25]
Send preloader... OK
Start preloader... OK
Check preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x45010044413431323801ABD76440C677
Load EMI config from database [DB VER: 56 DB DATE: 04-11-2021] OK [2]
Trying EMI [08EDF5FC, 6A5BF28C]
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_ID : 0x45010044413431323801ABD76440C677
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0001000000 (16.00Mb)
EMMC_USER : 0x1D1EC00000 (116.48Gb)
RAM INFO:
INT_SRAM: 0x0000039000 (228.00Kb)
EXT_RAM : 0x0100000000 (4.00Gb)
Check USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Check OTP status... [STATUS_OTP_UNLOCKED]
Read OTP... OK
Reading OTP done!


Selected model: ZTE UNKNOWN
Operation: Read Codes
Software version: 1.7

Host Power Off... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Wait for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0788
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6771]
Get sec config... OK [000000E1]
Active sec flags: [SBC]
Advanced Bypass Security... OK
Disconnect virtual port... OK
Connect Type-C to HUB... OK
Wait for device connecting... OK
Device found at COM8 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0788
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6771]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x3257773D, 0xBC2D560F, 0x5DE19E90, 0xBB581B26
Get Chip ID... [MT6771]
Get SOC ID... [B35CE499B8B04002C8D17B2A334E9EC8FCB6221C4CB572D81D ABB16F75B3CCE7]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [25]
Send preloader... OK
Start preloader... OK
Check preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x45010044413431323801ABD76440C677
Load EMI config from database [DB VER: 56 DB DATE: 04-11-2021] OK [2]
Trying EMI [08EDF5FC, 6A5BF28C]
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_ID : 0x45010044413431323801ABD76440C677
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0001000000 (16.00Mb)
EMMC_USER : 0x1D1EC00000 (116.48Gb)
RAM INFO:
INT_SRAM: 0x0000039000 (228.00Kb)
EXT_RAM : 0x0100000000 (4.00Gb)
Check USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Read security partition from phone... OK
Read security files... OK
Read lock info... OK
N Code : 12345678
NS Code : 00000000
SP Code : 781234??
C Code : 00000000
SIM Code : 2222????
NS_SP Code: 00000000
SIM_C Code: 44??????
Read Codes done!


Selected model: ZTE UNKNOWN
Operation: Read IMEI Info
Software version: 1.7

Host Power Off... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Wait for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0788
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6771]
Get sec config... OK [000000E1]
Active sec flags: [SBC]
Advanced Bypass Security... OK
Disconnect virtual port... OK
Connect Type-C to HUB... OK
Wait for device connecting... OK
Device found at COM8 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0788
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6771]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x3257773D, 0xBC2D560F, 0x5DE19E90, 0xBB581B26
Get Chip ID... [MT6771]
Get SOC ID... [B35CE499B8B04002C8D17B2A334E9EC8FCB6221C4CB572D81D ABB16F75B3CCE7]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [25]
Send preloader... OK
Start preloader... OK
Check preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x45010044413431323801ABD76440C677
Load EMI config from database [DB VER: 56 DB DATE: 04-11-2021] OK [2]
Trying EMI [08EDF5FC, 6A5BF28C]
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_ID : 0x45010044413431323801ABD76440C677
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0001000000 (16.00Mb)
EMMC_USER : 0x1D1EC00000 (116.48Gb)
RAM INFO:
INT_SRAM: 0x0000039000 (228.00Kb)
EXT_RAM : 0x0100000000 (4.00Gb)
Check USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Read partition "nvram"... OK
Read NVRAM files... OK
Read IMEI... OK
IMEI: XXXXXXXX2255953
Reading IMEI done!


Selected model: ZTE UNKNOWN
Operation: Repair
Software version: 1.7

Host Power Off... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Wait for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0788
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6771]
Get sec config... OK [000000E1]
Active sec flags: [SBC]
Advanced Bypass Security... OK
Disconnect virtual port... OK
Connect Type-C to HUB... OK
Wait for device connecting... OK
Device found at COM8 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0788
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6771]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x3257773D, 0xBC2D560F, 0x5DE19E90, 0xBB581B26
Get Chip ID... [MT6771]
Get SOC ID... [B35CE499B8B04002C8D17B2A334E9EC8FCB6221C4CB572D81D ABB16F75B3CCE7]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [25]
Send preloader... OK
Start preloader... OK
Check preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x45010044413431323801ABD76440C677
Load EMI config from database [DB VER: 56 DB DATE: 04-11-2021] OK [2]
Trying EMI [08EDF5FC, 6A5BF28C]
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_ID : 0x45010044413431323801ABD76440C677
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0001000000 (16.00Mb)
EMMC_USER : 0x1D1EC00000 (116.48Gb)
RAM INFO:
INT_SRAM: 0x0000039000 (228.00Kb)
EXT_RAM : 0x0100000000 (4.00Gb)
Check USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Read partition "nvdata"... OK
Read partition "nvram"... OK
Read NVRAM files... OK
Read IMEI... OK
Read NVDATA files... OK
Read IMEI... OK
IMEI: XXXXXXXX2255953
Set new IMEI to:
IMEI: XXXXXXXX9021697
Write IMEI... OK
Format EMMC_USER partition( 0x05708000..0x09707FFF )... OK
Repair Security done!

kzafquiel 04-22-2021 06:23

Alcatel 5080A (Shine Lite) read flash , imei done
 
Selected model: Alcatel 5080A (Shine Lite)
Operation: Read Flash Info
Software version: 1.7
https://i.ibb.co/n8wNqxk/shine.jpg
copiar imagen de pagina web
Host Power Off... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Host Power On... OK
Wait for device connecting... OK
Device found at COM8 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0335
Get HW & SW version from device... OK
HW VER: CB00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6735]
Library Version [1]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Load DownloadAgent... OK
ME_ID = 0xC209C2CD, 0xCD596B42, 0xC71B0813, 0x9E786C35
Get sec config... OK [00000007]
Active sec flags: [ SBC SLA DAA]
Get BROM version... OK
AUTH file not found!


Selected model: Alcatel 5080A (Shine Lite)
Operation: Read Flash Info
Software version: 1.7

Host Power Off... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Host Power On... OK
Wait for device connecting... OK
Device found at COM8 [BROM]
Open port... OK
Send start cmd... timeout(S_BROM_CMD_STARTCMD_TIMEOUT)


Selected model: Alcatel 5080A (Shine Lite)
Operation: Read Flash Info
Software version: 1.7

Host Power Off... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Host Power On... OK
Wait for device connecting... OK
Device found at COM8 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0335
Get HW & SW version from device... OK
HW VER: CB00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6735]
Library Version [1]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Load DownloadAgent... OK
ME_ID = 0xC209C2CD, 0xCD596B42, 0xC71B0813, 0x9E786C35
Get sec config... OK [00000007]
Active sec flags: [ SBC SLA DAA]
Get BROM version... OK
AUTH file not found!


Selected model: Alcatel 5080A (Shine Lite)
Operation: Read Flash Info
Software version: 1.7

Host Power Off... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Host Power On... OK
Wait for device connecting... OK
Device found at COM8 [BROM]
Open port... OK
Send start cmd... error(4)


Selected model: Alcatel 5080A (Shine Lite)
Operation: Read Flash Info
Software version: 1.7

Host Power Off... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Host Power On... OK
Wait for device connecting... OK
Device found at COM8 [BROM]
Open port... OK
Send start cmd... error(4)


Selected model: Alcatel 5080A (Shine Lite)
Operation: Read Flash Info
Software version: 1.7

Host Power Off... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Wait for device... OK
Read usbhost speed... FULL
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0335
Get HW & SW version from device... OK
HW VER: CB00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6735]
Get sec config... OK [00000007]
Active sec flags: [SBC SLA DAA]
Advanced Bypass Security... OK
Disconnect virtual port... OK
Connect Type-C to HUB... OK
Wait for device connecting... OK
Device found at COM8 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0335
Get HW & SW version from device... OK
HW VER: CB00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6735]
Library Version [1]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Load DownloadAgent... OK
ME_ID = 0xC209C2CD, 0xCD596B42, 0xC71B0813, 0x9E786C35
Get sec config... OK [00000000]
Get BROM version... OK
Search DA... OK [11]
Send preloader... OK
Start preloader... OK
Check preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Check bootloader answer... OK
Wait for answer from bootloader... OK
Wait for hw detection... OK
Wait DA version... v4.2
Send BROM version... OK
Send storage config... OK
SyncBmtInfoWithDA... OK
Set params... OK
Read flash info... OK
EMMC_ID: 0x150100514531334D420D5902B282A0D3
Load EMI config from database [DB VER: 56 DB DATE: 04-11-2021] OK [9]
Trying EMI [FCD13E57, 49CE1F40, 49120D13, 5DCFFA1A, DCF716DA, BBFE481A, ADB0E084, C3F7DB20, CC85EC35]
Init DRAM... OK
Enable DRAM... OK
Sync with DA... OK
Wait for DA H/W detection... OK
EMMC INFO:
EMMC_ID : 0x150100514531334D420D5902B28224D3
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0000400000 (4.00Mb)
EMMC_USER : 0x03A3E00000 (14.56Gb)
RAM INFO:
INT_SRAM: 0x0000020000 (128.00Kb)
EXT_RAM : 0x0080000000 (2.00Gb)
Read Flash Info done!


Selected model: Alcatel 5080A (Shine Lite)
Operation: Read Flash Info
Software version: 1.7

Host Power Off... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Wait for device... OK
Read usbhost speed... FULL
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0335
Get HW & SW version from device... OK
HW VER: CB00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6735]
Get sec config... OK [00000007]
Active sec flags: [SBC SLA DAA]
Advanced Bypass Security... OK
Disconnect virtual port... OK
Connect Type-C to HUB... OK
Wait for device connecting... OK
Device found at COM8 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0335
Get HW & SW version from device... OK
HW VER: CB00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6735]
Library Version [1]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Load DownloadAgent... OK
ME_ID = 0xC209C2CD, 0xCD596B42, 0xC71B0813, 0x9E786C35
Get sec config... OK [00000000]
Get BROM version... OK
Search DA... OK [11]
Send preloader... OK
Start preloader... OK
Check preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Check bootloader answer... OK
Wait for answer from bootloader... OK
Wait for hw detection... OK
Wait DA version... v4.2
Send BROM version... OK
Send storage config... OK
SyncBmtInfoWithDA... OK
Set params... OK
Read flash info... OK
EMMC_ID: 0x150100514531334D420D5902B282A0D3
Load EMI config from database [DB VER: 56 DB DATE: 04-11-2021] OK [9]
Trying EMI [FCD13E57, 49CE1F40, 49120D13, 5DCFFA1A, DCF716DA, BBFE481A, ADB0E084, C3F7DB20, CC85EC35]
Init DRAM... OK
Enable DRAM... OK
Sync with DA... OK
Wait for DA H/W detection... OK
EMMC INFO:
EMMC_ID : 0x150100514531334D420D5902B28224D3
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0000400000 (4.00Mb)
EMMC_USER : 0x03A3E00000 (14.56Gb)
RAM INFO:
INT_SRAM: 0x0000020000 (128.00Kb)
EXT_RAM : 0x0080000000 (2.00Gb)
Read Flash Info done!


Selected model: Alcatel 5080A (Shine Lite)
Operation: Read PTT
Software version: 1.7

Host Power Off... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Wait for device... OK
Read usbhost speed... FULL
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0335
Get HW & SW version from device... OK
HW VER: CB00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6735]
Get sec config... OK [00000007]
Active sec flags: [SBC SLA DAA]
Advanced Bypass Security... OK
Disconnect virtual port... OK
Connect Type-C to HUB... OK
Wait for device connecting... OK
Device found at COM8 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0335
Get HW & SW version from device... OK
HW VER: CB00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6735]
Library Version [1]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Load DownloadAgent... OK
ME_ID = 0xC209C2CD, 0xCD596B42, 0xC71B0813, 0x9E786C35
Get sec config... OK [00000000]
Get BROM version... OK
Search DA... OK [11]
Send preloader... OK
Start preloader... OK
Check preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Check bootloader answer... OK
Wait for answer from bootloader... OK
Wait for hw detection... OK
Wait DA version... v4.2
Send BROM version... OK
Send storage config... OK
SyncBmtInfoWithDA... OK
Set params... OK
Read flash info... OK
EMMC_ID: 0x150100514531334D420D5902B282A0D3
Load EMI config from database [DB VER: 56 DB DATE: 04-11-2021] OK [9]
Trying EMI [FCD13E57, 49CE1F40, 49120D13, 5DCFFA1A, DCF716DA, BBFE481A, ADB0E084, C3F7DB20, CC85EC35]
Init DRAM... OK
Enable DRAM... OK
Sync with DA... OK
Wait for DA H/W detection... OK
EMMC INFO:
EMMC_ID : 0x150100514531334D420D5902B28224D3
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0000400000 (4.00Mb)
EMMC_USER : 0x03A3E00000 (14.56Gb)
RAM INFO:
INT_SRAM: 0x0000020000 (128.00Kb)
EXT_RAM : 0x0080000000 (2.00Gb)
Check USB status... USB_FULL_SPEED
Switching to USB high speed... OK
Wait for device... OK
High Speed USB detected at COM10
Open port... OK
Check USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Read partition preloader... OK
Read partition pgpt... OK
Read partition proinfo... OK
Read partition nvram... OK
Read partition protect1... OK
Read partition protect2... OK
Read partition tctpersist... OK
Read partition simlock... OK
Read partition para... OK
Read partition lk... OK
Read partition boot... OK
Read partition recovery... OK
Read partition logo... OK
Read partition expdb... OK
Read partition seccfg... OK
Read partition oemkeystore... OK
Read partition secro... OK
Read partition keystore... OK
Read partition tee1... OK
Read partition tee2... OK
Read partition persist... OK
Read partition efuse... OK
Read partition frp... OK
Read partition nvdata... OK
Read partition metadata... OK
Read partition system... OK
Read partition cache... OK
Read partition otp... OK
Read partition flashinfo... OK
Read partition sgpt... OK
Dumping Partitions done!


Selected model: Alcatel 5080A (Shine Lite)
Operation: Repair
Software version: 1.7

Host Power Off... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Wait for device... OK
Read usbhost speed... FULL
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0335
Get HW & SW version from device... OK
HW VER: CB00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6735]
Get sec config... OK [00000007]
Active sec flags: [SBC SLA DAA]
Advanced Bypass Security... OK
Disconnect virtual port... OK
Connect Type-C to HUB... OK
Wait for device connecting... OK
Device found at COM8 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0335
Get HW & SW version from device... OK
HW VER: CB00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6735]
Library Version [1]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Load DownloadAgent... OK
ME_ID = 0xC209C2CD, 0xCD596B42, 0xC71B0813, 0x9E786C35
Get sec config... OK [00000000]
Get BROM version... OK
Search DA... OK [11]
Send preloader... OK
Start preloader... OK
Check preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Check bootloader answer... OK
Wait for answer from bootloader... OK
Wait for hw detection... OK
Wait DA version... v4.2
Send BROM version... OK
Send storage config... OK
SyncBmtInfoWithDA... OK
Set params... OK
Read flash info... OK
EMMC_ID: 0x150100514531334D420D5902B282A0D3
Load EMI config from database [DB VER: 56 DB DATE: 04-11-2021] OK [9]
Trying EMI [FCD13E57, 49CE1F40, 49120D13, 5DCFFA1A, DCF716DA, BBFE481A, ADB0E084, C3F7DB20, CC85EC35]
Init DRAM... OK
Enable DRAM... OK
Sync with DA... OK
Wait for DA H/W detection... OK
EMMC INFO:
EMMC_ID : 0x150100514531334D420D5902B28224D3
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0000400000 (4.00Mb)
EMMC_USER : 0x03A3E00000 (14.56Gb)
RAM INFO:
INT_SRAM: 0x0000020000 (128.00Kb)
EXT_RAM : 0x0080000000 (2.00Gb)
Check USB status... USB_FULL_SPEED
Switching to USB high speed... OK
Wait for device... OK
High Speed USB detected at COM10
Open port... OK
Check USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Get OTP size... OK [0x00800000]
Read OTP... OK
IMEI: xxxxxxxx1523764
Set new IMEI to:
IMEI: xxxxxxxx7504164
Check OTP status... [S_DA_OTP_LOCKED]
Write OTP... OK
Repair Security done!

Javier156 04-22-2021 23:06

Quote:

Originally Posted by ak0101 (Post 14371570)
Selected model: TMB 5007Z (Revvl 4)
Operation: Unlock network
Software version: 1.6

Host Power Off... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Wait for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0717
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0200, HW SUB CODE: 8A00
Detect chip [MT6761]
Get sec config... OK [000000E7]
Active sec flags: [SBC SLA DAA]
Advanced Bypass Security... OK
Disconnect virtual port... OK
Connect Type-C to HUB... OK
Wait for device connecting... OK
Device found at COM37 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0717
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0200, HW SUB CODE: 8A00
Detect chip [MT6761]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x50ACBA38, 0x87FF9E47, 0xB38CF83E, 0xB4EE72EC
Get Chip ID... [MT6761]
Get SOC ID... [D7CE7CE4806DFDB36EDD76BA489D02318A2B27136ED931C4E1 C4D8362D981AFD]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [30]
Send preloader... OK
Start preloader... OK
Check preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x1501003458364B4D42030703DC8CA781
Load EMI config from database [DB VER: 47 DB DATE: 04-02-2021] OK [1]
Trying EMI [44724C4B, 7CB86554, 9C47C7D7, C26ECB0F, CCFE52E9, 2E865ED1, 4C76F2A3]
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_ID : 0x1501003458364B4D42030703DC8CA781
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0000400000 (4.00Mb)
EMMC_USER : 0x0747C00000 (29.12Gb)
RAM INFO:
INT_SRAM: 0x0000039000 (228.00Kb)
EXT_RAM : 0x0080000000 (2.00Gb)
Check USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Read security partition from phone... OK
Read security files... OK
Read lock info... OK
Write lock info... OK
Write security partition to phone... OK
Network Unlock done!

De donde descargaste el SCAT bro?

Javier156 04-22-2021 23:06

Quote:

Originally Posted by ak0101 (Post 14371570)
Selected model: TMB 5007Z (Revvl 4)
Operation: Unlock network
Software version: 1.6

Host Power Off... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Wait for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0717
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0200, HW SUB CODE: 8A00
Detect chip [MT6761]
Get sec config... OK [000000E7]
Active sec flags: [SBC SLA DAA]
Advanced Bypass Security... OK
Disconnect virtual port... OK
Connect Type-C to HUB... OK
Wait for device connecting... OK
Device found at COM37 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0717
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0200, HW SUB CODE: 8A00
Detect chip [MT6761]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x50ACBA38, 0x87FF9E47, 0xB38CF83E, 0xB4EE72EC
Get Chip ID... [MT6761]
Get SOC ID... [D7CE7CE4806DFDB36EDD76BA489D02318A2B27136ED931C4E1 C4D8362D981AFD]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [30]
Send preloader... OK
Start preloader... OK
Check preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x1501003458364B4D42030703DC8CA781
Load EMI config from database [DB VER: 47 DB DATE: 04-02-2021] OK [1]
Trying EMI [44724C4B, 7CB86554, 9C47C7D7, C26ECB0F, CCFE52E9, 2E865ED1, 4C76F2A3]
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_ID : 0x1501003458364B4D42030703DC8CA781
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0000400000 (4.00Mb)
EMMC_USER : 0x0747C00000 (29.12Gb)
RAM INFO:
INT_SRAM: 0x0000039000 (228.00Kb)
EXT_RAM : 0x0080000000 (2.00Gb)
Check USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Read security partition from phone... OK
Read security files... OK
Read lock info... OK
Write lock info... OK
Write security partition to phone... OK
Network Unlock done!

De donde descargaste el SCAT bro?

nongmobile 04-23-2021 06:14

VIVO Y17 Read info , Write Firmware , Erase FRP By Pandora Box
 
https://www.img.in.th/images/d04d272...b50eeb1780.png

Selected model: Vivo UNKNOWN
Operation: Read Flash Info
Software version: 1.7

Host Power Off... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Wait for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0766
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Advanced Bypass Security... OK
Disconnect virtual port... OK
Connect Type-C to HUB... OK
Wait for device connecting... OK
Device found at COM43 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x2407BC92, 0xD470517C, 0x2E9BC903, 0x903C4AB6
Get Chip ID... [MT6765]
Get SOC ID... [2571ED125253BFBAD2835CD78409DE5FA95146C172F5CF4E3D 2FAE6A6DB92544]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [29]
Send preloader... OK
Start preloader... OK
Check preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x150100444836444D420526E76A27B529
Load EMI config from database [DB VER: 56 DB DATE: 04-11-2021] OK [1]
Trying EMI [F6969C3D]
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_ID : 0x150100444836444D420526E76A27B529
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0000400000 (4.00Mb)
EMMC_USER : 0x0E8F800000 (58.24Gb)
RAM INFO:
INT_SRAM: 0x000003A000 (232.00Kb)
EXT_RAM : 0x0100000000 (4.00Gb)
Read Flash Info done!




https://www.img.in.th/images/e2cd868...c1fba46399.png

Selected model: Vivo UNKNOWN
Operation: Flash (Download only)
Software version: 1.7

Parse scatter file... OK
Load Rom Images... OK
Host Power Off... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Wait for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0766
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Advanced Bypass Security... OK
Disconnect virtual port... OK
Connect Type-C to HUB... OK
Wait for device connecting... OK
Device found at COM43 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x2407BC92, 0xD470517C, 0x2E9BC903, 0x903C4AB6
Get Chip ID... [MT6765]
Get SOC ID... [2571ED125253BFBAD2835CD78409DE5FA95146C172F5CF4E3D 2FAE6A6DB92544]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [29]
Send preloader... OK
Start preloader... OK
Check preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x150100444836444D420526E76A27B529
Load EMI config from preloader... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_ID : 0x150100444836444D420526E76A27B529
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0000400000 (4.00Mb)
EMMC_USER : 0x0E8F800000 (58.24Gb)
RAM INFO:
INT_SRAM: 0x000003A000 (232.00Kb)
EXT_RAM : 0x0100000000 (4.00Gb)
Get scatter info... OK
Check USB status... USB_HIGH_SPEED
Get scatter info... OK
Verify scatter file... OK
Do NAND BMT remark... OK
Setup download info... OK
Get partition table catagory... OK [GPT]
Read mirror partition table... OK
Check partition table layout changed... OK
Read major partition table... OK
Check major partition table layout changed... OK
Download "preloader"... OK
Download "recovery"... OK
Download "survival"... OK
Download "cust"... OK
Download "efuse"... OK
Download "md1img"... OK
Download "spmfw"... OK
Download "scp1"... OK
Download "scp2"... OK
Download "sspm_1"... OK
Download "sspm_2"... OK
Download "lk"... OK
Download "lk2"... OK
Download "boot"... OK
Download "logo"... OK
Download "dtbo"... OK
Download "tee1"... OK
Download "tee2"... OK
Download "vendor"... OK
Download "system"... OK
Download "vbmeta"... OK
Download "cache"... OK
Download "userdata"... OK
Flashing done!



https://www.img.in.th/images/0ac344b...02cf2dc27a.png
Selected model: Vivo UNKNOWN
Operation: Erase FRP
Software version: 1.7

Parse scatter file... OK
Load Rom Images... OK
Host Power Off... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Wait for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0766
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Advanced Bypass Security... OK
Disconnect virtual port... OK
Connect Type-C to HUB... OK
Wait for device connecting... OK
Device found at COM43 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x2407BC92, 0xD470517C, 0x2E9BC903, 0x903C4AB6
Get Chip ID... [MT6765]
Get SOC ID... [2571ED125253BFBAD2835CD78409DE5FA95146C172F5CF4E3D 2FAE6A6DB92544]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [29]
Send preloader... OK
Start preloader... OK
Check preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x150100444836444D420526E76A27B529
Load EMI config from preloader... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_ID : 0x150100444836444D420526E76A27B529
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0000400000 (4.00Mb)
EMMC_USER : 0x0E8F800000 (58.24Gb)
RAM INFO:
INT_SRAM: 0x000003A000 (232.00Kb)
EXT_RAM : 0x0100000000 (4.00Gb)
Get scatter info... OK
Check USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Read partition "frp"... OK
Format EMMC_USER partition( 0x05588000..0x05687FFF )... OK
Erase FRP done!

nongmobile 04-25-2021 08:18

OPPO A31 CPH2015 Read info , Backup RPMB
 
https://www.img.in.th/images/cedbd58...17c929596e.png

https://www.img.in.th/images/a7a8fd8...f63e4c1013.png


All times are GMT +1. The time now is 22:39.


vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2024 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2023 -

Page generated in 0.39592 seconds with 6 queries

SEO by vBSEO