Z3X Pandora Tool 6.3 / 6.4 new update

Z3X Team

GsmToto

Super Moderator
Jan 1, 2021
5,013
21,653
UK
Skype
gsmtoto
Sonork ID
100.1684601
Selected model: Xiaomi Redmi 9 (Lancelot)
Operation: Repair
Software version: 6.3

Host Power Off... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Host Power On... OK
Connect phone to [BOX] in BROM/PRELOADER Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1632,usb2ser.sys,3.0.1504.0]
Device found at COM4 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0707
Get sec config... OK [000000E7]
Active sec flags: [SBC SLA DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6768]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Force switch to BROM... OK
Host Power Off... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Waiting for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0707
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6768]
Get sec config... OK [000000E7]
Active sec flags: [SBC SLA DAA]
Release testpoint
Advanced Bypass Security... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1632,usb2ser.sys,3.0.1504.0]
Device found at COM4 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0707
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6768]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x39D94A61, 0xE3994271, 0xC02631E0, 0x4135F852
Get Chip ID... [MT6768]
Get SOC ID... [09C5A30DF1B581D3EA730EC42D3D5AD89BA317CE2B5B939A27 0B2382BB3730F4]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [8]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x150100445036444142037F28CA1D87C5
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_CNAME: DP6DAB
EMMC_ID : 0x150100445036444142037F28CA1D87C5
EMMC_BOOT1: 0x0000400000 (4,00Mb)
EMMC_BOOT2: 0x0000400000 (4,00Mb)
EMMC_RPMB : 0x0001000000 (16,00Mb)
EMMC_USER : 0x0E8F800000 (58,24Gb)
RAM INFO:
INT_SRAM: 0x0000070000 (448,00Kb)
EXT_RAM : 0x0100000000 (4,00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... [EXT4] ... OK
Product Brand : Redmi
Product Manufacturer : Xiaomi
Product Model : lancelot
Product Name : lancelot
Product Device : lancelot
Product Board : lancelot
Board Platform : mt6768
Build ID : SP1A.210812.016
Build Date : Tue Nov 15 11:38:52 CST 2022
Display ID : SP1A.210812.016
Security Patch : 2022-10-01
Version SDK : 31
Version Release : 12
Version Codename : REL
Firmware Version : V13.0.2.0.SJCMIXM
Userdata FS Type : EXT4
Read partition "nvdata"... OK
Read partition "nvram"... OK
Read NVDATA files... OK
Read NVRAM files... OK
Read IMEI... OK
IMEI 1: 000000000000000
IMEI 2: 000000000000000
Repairing IMEI...
IMEI 1: 869000000000000
IMEI 2: 869000000000000
Write IMEI and patch CERT [NVDATA]... OK
Load partiton for patching... OK
Checking modem patch possiblity... POSSIBLE WITH BOOT UNLOCK
Patching CERT... OK
Save patched partiton... OK
Selected "Auto unlock bootloader"
Read security partition from phone... OK
Decrypting security data... OK
Encrypt security data... OK
Write security partition to phone... OK
Unlock bootloader done!
Write IMEI and patch CERT [NVRAM]... OK
Write partition "nvdata"... OK
Write partition "nvram"... OK
Repair Security and Patch cert done!
If your phone after repair keeps rebooting - use wipe data option.
 

GsmToto

Super Moderator
Jan 1, 2021
5,013
21,653
UK
Skype
gsmtoto
Sonork ID
100.1684601
Selected model: Samsung SM-X205 (Samsung Galaxy Tab A8 2021)
Operation: Unlock bootloader
Software version: 6.3

Host Power Off... OK
Switch virtual port to NONE... OK
Connect Type-C to NONE... OK
Connect phone to [PC]
Connect phone in BROM mode. Use volume key buttons or testpoint.
Waiting for device... OK
Device found at COM8
Port: USB\VID_1782&PID_4D00\5&3A692CE1&0&3
Drier: [UNISOC Communications Inc.,sprdvcom,SPRD U2SDiag,sprdvcom.sys,4.19.38.134]
Port type: BROM
Connecting to device... OK
Selected processor: Tiger_T610_64
Load files... (universal) OK
Connect preloader 1... OK
Connect preloader 2... OK
Connect loader 1... OK
Connect loader 2... OK
Serial Number: ****
Read partitions info... OK
Checking A/B state... OK
Read product info... [EXT4] ... OK
Product Brand : samsung
Product Manufacturer : samsung
Product Model : SM-X205
Product Name : gta8xx
Product Device : gta8
Product Board : ums512_25c10
Board Platform : ums512
Build ID : TP1A.220624.014
Build Date : Mon Mar 27 12:18:53 KST 2023
Display ID : TP1A.220624.014.X205XXS2CWC3
Security Patch : 2023-04-01
Version SDK : 33
Version Release : 13
Version Codename : REL
Firmware Version : X205XXS2CWC3
Userdata FS Type : F2FS
Unlock bootloader... OK
Done!
If your phone after this operation keeps rebooting - use wipe data option.
 

GsmToto

Super Moderator
Jan 1, 2021
5,013
21,653
UK
Skype
gsmtoto
Sonork ID
100.1684601
Selected model: Realme RMX3830 (Realme C51)
Operation: Unlock Regional Lock
Software version: 6.3
Work ID: 19556228

Connect phone in BROM mode. Use volume key buttons or testpoint.
Waiting for device... OK
Device found at COM9
Port: USB\VID_1782&PID_4D00\5&39FED00A&0&4
Driver: [UNISOC Communications Inc.,sprdvcom,SPRD U2S Diag,sprdvcom.sys,4.19.38.134]
Port type: BROM
Connecting to device... OK
Selected processor: Tiger_T616_64
Load files... (universal) OK
Connect preloader 1... OK
Connect preloader 2... OK
Connect loader 1... OK
Connect loader 2... OK
Serial Number: 0C83C25I22103CF9
Flash Type: EMMC
Read partitions info... OK
Checking A/B state... OK [A]
Read product info... [EROFS] ... OK
Product Brand : realme
Product Manufacturer : realme
Product Model : ums9230_hulk_Natv
Product Name : RMX3830
Product Device : RE58BC
Board Platform : ums9230
Build ID : TP1A.220624.014
Build Date : Fri Dec 1 01:33:56 CST 2023
Display ID : RMX3830GDPR_13_A.34
Security Patch : 2023-11-05
Version SDK : 33
Version Release : 13
Version Codename : REL
Firmware Version : 610
Userdata FS Type : F2FS
Reading lock data... [2,0] ... OK
Unlocking ... OK
Done!
 

GsmToto

Super Moderator
Jan 1, 2021
5,013
21,653
UK
Skype
gsmtoto
Sonork ID
100.1684601
Selected model: Itel L6006 (Itel A48)
Operation: Unlock network
Software version: 6.3
Host Power Off... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Host Power On... OK
Connect phone to [BOX or PC]
Connect phone in BROM mode. Use volume key buttons or testpoint.
Waiting for device... OK
Device found at COM5
Port: USB\VID_1782&PID_4D00\5&2E786FD2&0&8
Driver: [DriverCoding Corporation,sprdvcom,SPRD U2S Diag,sprdvcom.sys,2.0.0.131]
Port type: BROM
Connecting to device... OK
Selected processor: SC9832E
Load files... (universal) OK
Connect preloader 1... OK
Connect preloader 2... OK
Connect loader 1... OK
Connect loader 2... OK
Serial Number: 058663114L071442
Read partitions info... OK
Checking A/B state... OK
Read product info... [EXT4] ... OK
Product Brand : Itel
Product Manufacturer : ITEL MOBILE LIMITED
Product Model : itel L6006
Product Name : SU385JIO
Product Device : itel-L6006
Product Board : sp9832e_1h10_32b
Board Platform : sp9832e
Build ID : QP1A.190711.020
Build Date : Tue Jul 27 10:17:24 CST 2021
Display ID : itel_L6006_100_0801_080721
Security Patch : 2021-07-05
Version SDK : 29
Version Release : 10
Version Codename : REL
Firmware Version : IN-JIO-V012-20210727
Userdata FS Type : F2FS
Check security state... OK [1]
Unlock bootloader... OK
Patch modem check... OK
Patch data... OK
Load NVD... OK
Unlock... OK
Save NVD... OK
Done!
 

GsmToto

Super Moderator
Jan 1, 2021
5,013
21,653
UK
Skype
gsmtoto
Sonork ID
100.1684601
elected model: Tecno LE7 (Tecno Pova 2)
Operation: Eliminar FRP
Software version: 6.3

Host Power Off... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Host Power On... OK
Connect phone to [BOX or PC] in PRELOADER Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek PreLoader USB VCOM_V1632 (Android),usb2ser.sys,3.0.1504.0]
Device found at COM5 [PRELOADER]
Open port... OK
Send start cmd... OK
Get HW code from device... 0707
Get sec config... OK [00000005]
Active sec flags: [SBC DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6768]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Preloader exist. Skip connection verification.
Get ME ID... OK
ME_ID = 0x9F6A81F6, 0x61132A38, 0xADBD8814, 0x20EE6B45
Load DownloadAgent... OK
Search DA... OK [1]
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [PRELOADER]
Preloader alive. Skip initializing external RAM
Get device info... OK
EMMC_ID: 0x90014A6844456150330300684D57A847
Send preloader... OK
Load DownloadAgent... OK
Search DA... OK [8]
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_CNAME: hDEaP3
EMMC_ID : 0x90014A6844456150330300684D57A847
EMMC_BOOT1: 0x0000400000 (4,00Mb)
EMMC_BOOT2: 0x0000400000 (4,00Mb)
EMMC_RPMB : 0x0001000000 (16,00Mb)
EMMC_USER : 0x1D1F000000 (116,48Gb)
RAM INFO:
INT_SRAM: 0x0000070000 (448,00Kb)
EXT_RAM : 0x0100000000 (4,00Gb)
Checking USB status... USB_HIGH_SPEED
[EFUSE INFO]: BROM not disabled
Read partitions info from phone... OK
Checking A/B state... OK [A]
Read product info... [EXT4] ... OK
Product Brand : TECNO
Product Manufacturer : TECNO MOBILE LIMITED
Product Model : TECNO LE7
Product Name : LE7-GL
Product Device : TECNO-LE7
Product Board : TECNO-LE7
Board Platform : mt6768
Build ID : RP1A.200720.011
Build Date : Tue Jun 20 16:37:08 CST 2023
Display ID : TECNO-R-64-230620V465
Security Patch : 2023-05-05
Version SDK : 30
Version Release : 11
Version Codename : REL
Firmware Version : 230620V597
Userdata FS Type : F2FS
Read partition "frp"... OK
Backup saved to C:/Program%20Files%20(x86)/Z3X/Pandora/Backup/MTK/Tecno_LE7%20(Tecno%20Pova%202)/FRP_BACKUP_(2024-2-12_13-52-33)/
Writting FRP data... OK
Erase FRP done!
 

GsmToto

Super Moderator
Jan 1, 2021
5,013
21,653
UK
Skype
gsmtoto
Sonork ID
100.1684601
Selected model: Tecno CK7n (Tecno Camon 20 Pro)
Operation: Eliminar FRP
Software version: 6.3

Host Power Off... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Host Power On... OK
Connect phone to [BOX or PC] in PRELOADER Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek PreLoader USB VCOM_V1632 (Android),usb2ser.sys,3.0.1504.0]
Device found at COM2 [PRELOADER]
Open port... OK
Send start cmd... OK
Get HW code from device... 1208
Get sec config... OK [00000005]
Active sec flags: [SBC DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6789]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Preloader exist. Skip connection verification.
Get ME ID... OK
ME_ID = 0x1012E0AA, 0xD5DA67C7, 0x80C571E7, 0x15271D94
Load DownloadAgent... OK
Search DA... OK [1]
Send bootloader... OK
Start bootloader... OK
Setup device enviroment... OK
Setup device parametres... OK
Get device info... OK
UFS CID (FW VER): eUFS2.2_256 ()
Send preloader... OK
Load DownloadAgent... OK
Search DA... OK [0]
Send 2nd DA... OK
Get device info... OK
UFS INFO:
UFS_CID : eUFS2.2_256
UFS_FWVER :
BLOCK_SIZE: 0x0000001000 (4,00Kb)
UFS_LU0 : 0x0000400000 (4,00Mb)
UFS_LU1 : 0x0000400000 (4,00Mb)
UFS_LU2 : 0x3BAD800000 (238,71Gb)
[EFUSE INFO]: BROM not disabled
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... [EROFS] ... OK
Product Brand : alps
Product Manufacturer : alps
Product Model : mgvi_64_nfc_armv82
Product Name : hal_mgvi_64_nfc_armv82
Product Device : mgvi_64_nfc_armv82
Product Board : mgvi_64_nfc_armv82
Board Platform : common
Build ID : SP1A.210812.016
Build Date : Thu Dec 14 13:46:18 CST 2023
Firmware Version : 503493
Userdata FS Type : F2FS
Read partition "frp"... OK
Backup saved to C:/Program%20Files%20(x86)/Z3X/Pandora/Backup/MTK/Tecno_CK7n%20(Tecno%20Camon%2020%20Pro)/FRP_BACKUP_(2024-2-12_10-50-22)/
Writting FRP data... OK
Erase FRP done!
 

GsmToto

Super Moderator
Jan 1, 2021
5,013
21,653
UK
Skype
gsmtoto
Sonork ID
100.1684601
Selected model: Alcatel 5007A (Alcatel 1V (2020))
Operation: Read Codes
Software version: 6.3
Work ID: 194462334

Connect phone in BROM Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM5 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get sec config... OK [000000E7]
Active sec flags: [SBC SLA DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
LibUSB installed
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Release testpoint, waiting 2 seconds
Advanced Bypass Security... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM5 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0xE274FF7D, 0x1EF001DB, 0xFA536857, 0x5D045F5D
Get Chip ID... [MT6765]
Get SOC ID... [5E05578F05213914577597D4F8B7494FAB3F03E578F04A6FE8 7755A4CEB006FD]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [7]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0xF40122426977696E20100004454DB7C9
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_CNAME: Biwin
EMMC_ID : 0xF40122426977696E20100004454DB7C9
EMMC_BOOT1: 0x0000400000 (4,00Mb)
EMMC_BOOT2: 0x0000400000 (4,00Mb)
EMMC_RPMB : 0x0000400000 (4,00Mb)
EMMC_USER : 0x0748000000 (29,13Gb)
RAM INFO:
INT_SRAM: 0x000003A000 (232,00Kb)
EXT_RAM : 0x0080000000 (2,00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... [EXT4] ... OK
Product Brand : Alcatel
Product Manufacturer : TCL
Product Model : 5007U
Product Name : 5007U
Product Device : Tokyo_Lite
Product Board : MT6765
Board Platform : mt6765
Build ID : QP1A.190711.020
Build Date : Mon Jan 24 15:54:56 CST 2022
Display ID : QP1A.190711.020 release-keys
Security Patch : 2022-01-05
Version SDK : 29
Version Release : 10
Version Codename : REL
Firmware Version : v4G4C-0
Userdata FS Type : F2FS
Read security partition from phone... OK
Read security files... OK
Read lock info... OK
N Code : 0000000000000000
NS Code : 0000000000000000
SP Code : 0000000000000000
C Code : 97887+7900000000
SIM Code : *000000000000000
NS_SP Code: 0000000000000000
SIM_C Code: 0000000000000000
Read Codes done!

Selected model: Alcatel 5007A (Alcatel 1V (2020))
Operation: Unlock network
Software version: 6.3
Work ID: 19663241

Connect phone in BROM Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM5 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get sec config... OK [000000E7]
Active sec flags: [SBC SLA DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
LibUSB installed
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Release testpoint, waiting 2 seconds
Advanced Bypass Security... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM5 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0xE274FF7D, 0x1EF001DB, 0xFA536857, 0x5D045F5D
Get Chip ID... [MT6765]
Get SOC ID... [5E05578F05213914577597D4F8B7494FAB3F03E578F04A6FE8 7755A4CEB006FD]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [7]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0xF40122426977696E20100004454DB7C9
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_CNAME: Biwin
EMMC_ID : 0xF40122426977696E20100004454DB7C9
EMMC_BOOT1: 0x0000400000 (4,00Mb)
EMMC_BOOT2: 0x0000400000 (4,00Mb)
EMMC_RPMB : 0x0000400000 (4,00Mb)
EMMC_USER : 0x0748000000 (29,13Gb)
RAM INFO:
INT_SRAM: 0x000003A000 (232,00Kb)
EXT_RAM : 0x0080000000 (2,00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... [EXT4] ... OK
Product Brand : Alcatel
Product Manufacturer : TCL
Product Model : 5007U
Product Name : 5007U
Product Device : Tokyo_Lite
Product Board : MT6765
Board Platform : mt6765
Build ID : QP1A.190711.020
Build Date : Mon Jan 24 15:54:56 CST 2022
Display ID : QP1A.190711.020 release-keys
Security Patch : 2022-01-05
Version SDK : 29
Version Release : 10
Version Codename : REL
Firmware Version : v4G4C-0
Userdata FS Type : F2FS
Read security partition from phone... OK
Read security files... OK
Read security files... OK
Read lock info... OK
Read OTP... OK
Unlock... OK [DF1, DF2]
Write lock info... OK
Write security partition to phone... OK
Network Unlock done!
 

hongsing625656

Active Member
Jul 27, 2021
18
9
cambodia
Selected model: Samsung SM-A136U (Samsung Galaxy A13 5G)
Operation: Unlock network (Server)
Software version: 6.3

Checking Login and Password... OK
Balance: 30 crd.
You have 30 credit(s) left. This operation takes 5 credits. Continue? Yes
Searching Samsung modem... detected COM50
Reading phone info... OK
Model: SM-A136U
AP version: A136USQS4CWC8
CSC version: A136UOYN4CWC8
CP version: A136USQS4CWC8
OS version: 13
Product code: GCF
Carrier ID: XAA
Phone SN: R5CT81TMHLM
Unique number: CDC00D7A2D24659
IMEI: 358997697189616
IMEI Certi: PASS
Powering off... OK
Host Power Off... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Connect phone to [BOX] in BROM mode
Waiting for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0989
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6833]
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Release testpoint
Advanced Bypass Security... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1511.0]
You are using driver version 3.0.1511.0, we recommend using version 3.0.1504.0 for proper operation. You can install the correct driver from the program directory.
Device found at COM68 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0989
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6833]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x26169E4A, 0x39C20474, 0x51E0268B, 0x70BDE8B6
Get Chip ID... [MT6833]
Get SOC ID... [E690227CDECD2CB4FB545A62CB0A66272A7470A66F4B503492602956428F4798]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [14]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x150100444336444D4200D7A2D24659E5
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_CNAME: DC6DMB
EMMC_ID : 0x150100444336444D4200D7A2D24659E5
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0001000000 (16.00Mb)
EMMC_USER : 0x0E8F800000 (58.24Gb)
RAM INFO:
INT_SRAM: 0x0000070000 (448.00Kb)
EXT_RAM : 0x0100000000 (4.00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... [EXT4] ... OK
Product Brand : samsung
Product Manufacturer : samsung
Product Model : SM-A136U
Product Name : a13xsq
Product Device : a13x
Product Board : a13x
Board Platform : mt6833
Build ID : SP1A.210812.016
Build Date : Thu Mar 30 16:43:24 KST 2023
Display ID : TP1A.220624.014.A136USQS4CWC8
Security Patch : 2023-03-01
Version SDK : 33
Version Release : 13
Version Codename : REL
Firmware Version : A136USQS4CWC8
Userdata FS Type : F2FS
Read security partition from phone... OK
Read security files... OK
Read lock info... OK
Searching server... OK
Waiting for server answer... OK
Unlocking ... [1] ... OK
Write lock info... OK
Write security partition to phone... OK
Network Unlock done!

! Phone still lock
 
  • Like
Reactions: SPYROS and GsmToto

aliipi

Friend's Martview
Oct 28, 2019
156
47
type 1 type 2 type 3 fail all plz update

Selected model: Tecno LH8n (Tecno Pova 5 Pro)
Operation: Repair
Software version: 6.3

Connect Type-C to NONE... OK
Host Power Off... OK
Connect phone to [PC] in PRELOADER Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek PreLoader USB VCOM (Android),usb2ser.sys,3.0.1511.0]
You are using driver version 3.0.1511.0, we recommend using version 3.0.1504.0 for proper operation. You can install the correct driver from the program directory.
Device found at COM144 [PRELOADER]
Open port... OK
Send start cmd... OK
Get HW code from device... 0989
Get sec config... OK [00000005]
Active sec flags: [SBC DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6833]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Preloader exist. Skip connection verification.
Get ME ID... OK
ME_ID = 0x401E9996, 0xCFF39FB5, 0xA1833EA1, 0x8CD6C95D
Load DownloadAgent... OK
Search DA... OK [7]
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... error(STATUS_SEC_INVALID_DA_VER)
 
  • Like
Reactions: GsmToto

GsmToto

Super Moderator
Jan 1, 2021
5,013
21,653
UK
Skype
gsmtoto
Sonork ID
100.1684601
Selected model: Realme RMX3760 (Realme C53)
Operation: Erase FRP
Software version: 6.3

Host Power Off... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Host Power On... OK
Connect phone to [BOX or PC]
Connect phone in BROM mode. Use volume key buttons or testpoint.
Waiting for device... OK
Device found at COM7
Port: USB\VID_1782&PID_4D00\6&17B2F180&0&2
Driver: [UNISOC Communications Inc.,sprdvcom,SPRD U2S Diag,sprdvcom.sys,4.19.38.134]
Port type: BROM
Connecting to device... OK
Selected processor: Tiger_T616_64
Load files... (universal) OK
Connect preloader 1... OK
Connect preloader 2... OK
Connect loader 1... OK
Connect loader 2... OK
Serial Number: 0I63511I471043DE
Flash Type: EMMC
Read partitions info... OK
Checking A/B state... OK [A]
Read product info... [EROFS] ... OK
Product Brand : realme
Product Manufacturer : realme
Product Model : ums9230_hulk_Natv
Product Name : RMX3760
Product Device : RE58C2
Board Platform : ums9230
Build ID : TP1A.220624.014
Build Date : Wed Dec 20 20:08:08 CST 2023
Display ID : RMX3760export_13_A.48
Security Patch : 2023-12-05
Version SDK : 33
Version Release : 13
Version Codename : REL
Firmware Version : 637
Userdata FS Type : F2FS
Backup partitions... OK
Formatting "persist" partition... OK
Done!
 

GsmToto

Super Moderator
Jan 1, 2021
5,013
21,653
UK
Skype
gsmtoto
Sonork ID
100.1684601
Selected model: Samsung SM-A037U (Samsung Galaxy A03s)
Operation: Erase FRP
Software version: 6.3

Searching USB Flash interface... COM4 detected
Setup connection... OK
Model: SM-A037U
SW version: A037USQU4DWG1
Sales code: TMB
Device ID: 45f4704e74e5
Vendor: SAMSUNG
Product: GX6BAB
Unique Number: W1547583009A4806F44A
FW Version: 4
Capacity: 32 Gb
Reading data from phone... OK
Sending data to phone... OK
Rebooting to download... OK
Searching USB Flash interface... COM97 detected
Setup connection... OK
Sending data to phone... OK
Sending data to phone... OK
Rebooting... OK
Erase FRP done!
 
  • Like
Reactions: tsui_thomas

GsmToto

Super Moderator
Jan 1, 2021
5,013
21,653
UK
Skype
gsmtoto
Sonork ID
100.1684601
Selected model: Tecno LG7n (Tecno Pova 4)
Operation: Eliminar FRP
Software version: 6.3

Host Power Off... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Host Power On... OK
Connect phone to [BOX or PC] in PRELOADER Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek PreLoader USB VCOM_V1632 (Android),usb2ser.sys,3.0.1504.0]
Device found at COM3 [PRELOADER]
Open port... OK
Send start cmd... OK
Get HW code from device... 1208
Get sec config... OK [00000005]
Active sec flags: [SBC DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6789]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Preloader exist. Skip connection verification.
Get ME ID... OK
ME_ID = 0xFBD15B12, 0x05C6C21F, 0x948CDB59, 0x0AB33011
Load DownloadAgent... OK
Search DA... OK [1]
Send bootloader... OK
Start bootloader... OK
Setup device enviroment... OK
Setup device parametres... OK
Get device info... OK
UFS CID (FW VER): H9QT1G6DN6X132 ()
Send preloader... OK
Load DownloadAgent... OK
Search DA... OK [0]
Send 2nd DA... OK
Get device info... OK
UFS INFO:
UFS_CID : H9QT1G6DN6X132
UFS_FWVER :
BLOCK_SIZE: 0x0000001000 (4,00Kb)
UFS_LU0 : 0x0000400000 (4,00Mb)
UFS_LU1 : 0x0000400000 (4,00Mb)
UFS_LU2 : 0x3B96000000 (238,34Gb)
[EFUSE INFO]: BROM not disabled
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... error(0)
Read partition "frp"... OK
Backup saved to C:/Program%20Files%20(x86)/Z3X/Pandora/Backup/MTK/Tecno_LG7n%20(Tecno%20Pova%204)/FRP_BACKUP_(2024-2-16_17-33-27)/
Writting FRP data... OK
Erase FRP done!
 
  • Like
Reactions: tsui_thomas

GsmToto

Super Moderator
Jan 1, 2021
5,013
21,653
UK
Skype
gsmtoto
Sonork ID
100.1684601
Selected model: Tecno KG5k (Tecno Spark 8C)
Operation: Erase FRP And Wipe
Software version: 6.3

Host Power Off... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Host Power On... OK
Connect phone to [BOX or PC]
Connect phone in BROM mode. Use volume key buttons or testpoint.
Waiting for device... OK
Device found at COM5
Port: USB\VID_1782&PID_4D00\6&17B2F180&0&2
Driver: [UNISOC Communications Inc.,sprdvcom,SPRD U2S Diag,sprdvcom.sys,4.19.38.134]
Port type: BROM
Connecting to device... OK
Selected processor: Tiger_T606_64
Load files... (universal) OK
Connect preloader 1... OK
Connect preloader 2... OK
Connect loader 1... OK
Connect loader 2... OK
Serial Number: 078173721H004350
Flash Type: EMMC
Read partitions info... OK
Checking A/B state... OK [A]
Read product info... [EXT4] ... OK
Product Brand : TECNO
Product Manufacturer : TECNO MOBILE LIMITED
Product Model : TECNO KG5k
Product Name : KG5k
Product Device : TECNO-KG5k
Product Board : KG5k
Board Platform : ums9230
Build ID : RP1A.201005.001
Build Date : Wed Nov 22 17:45:50 CST 2023
Display ID : KG5k-F062-11.0-GL-V255-20231122
Security Patch : 2023-11-05
Version SDK : 30
Version Release : 11
Version Codename : REL
Firmware Version : 696
Userdata FS Type : F2FS
Backup partitions... OK
Formatting "persist" partition... OK
Formatting "userdata" partition... OK
Formatting "cache" partition... OK
Formatting "metadata" partition... OK
Creating default filesystems... [CACHE: EXT4] ... [USERDATA: F2FS] ... OK
Done!
 
  • Like
Reactions: tsui_thomas

GsmToto

Super Moderator
Jan 1, 2021
5,013
21,653
UK
Skype
gsmtoto
Sonork ID
100.1684601
Selected model: ZTE P963F50 (ZTE Blade A5 2020)
Operation: Erase FRP
Software version: 6.3

Host Power Off... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Host Power On... OK
Connect phone to [BOX or PC]
Connect phone in BROM mode. Use volume key buttons or testpoint.
Waiting for device... OK
Device found at COM6
Port: USB\VID_1782&PID_4D00\6&17B2F180&0&2
Driver: [UNISOC Communications Inc.,sprdvcom,SPRD U2S Diag,sprdvcom.sys,4.19.38.134]
Port type: BROM
Connecting to device... OK
Selected processor: SC9863A
Load files... (universal) OK
Connect preloader 1... OK
Connect preloader 2... OK
Connect loader 1... OK
Connect loader 2... OK
Serial Number: 7431058045
Read partitions info... OK
Checking A/B state... OK [A]
Read product info... [EXT4] ... OK
Product Brand : ZTE
Product Manufacturer : ZTE
Product Model : ZTE Blade A5 2020
Product Name : P963F50_A
Product Device : P963F50_A
Product Board : s9863a1h10_go_32b
Board Platform : sp9863a
Build ID : RP1A.201005.001
Build Date : Wed Dec 29 00:44:59 CST 2021
Display ID : GEN_LA_A51Lite_RV1.0
Security Patch : 2021-12-05
Version SDK : 30
Version Release : 11
Version Codename : REL
Firmware Version : 20211229.03311
Userdata FS Type : F2FS
Backup partitions... OK
Formatting "persist" partition... OK
Done!
 
  • Like
Reactions: tsui_thomas

GsmToto

Super Moderator
Jan 1, 2021
5,013
21,653
UK
Skype
gsmtoto
Sonork ID
100.1684601
Selected model: Infinix X669D (Infinix Hot 30i NFC)
Operation: Erase FRP
Software version: 6.3

Host Power Off... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Host Power On... OK
Connect phone to [BOX or PC]
Connect phone in BROM mode. Use volume key buttons or testpoint.
Waiting for device... OK
Device found at COM4
Port: USB\VID_1782&PID_4D00\6&2A6CA225&1&2
Driver: [UNISOC Communications Inc.,sprdvcom,SPRD U2S Diag,sprdvcom.sys,4.19.38.134]
Port type: BROM
Connecting to device... OK
Selected processor: INFINIX/Tiger_T606_64&X669
Load files... (INFINIX/X669) OK
Connect preloader 1... OK
Connect preloader 2... OK
Connect loader 1... OK
Connect loader 2... OK
Serial Number: 1004737362002187
Flash Type: UFS
Read partitions info... OK
Checking A/B state... OK
Read product info... [EROFS] ... OK
Product Brand : Infinix
Product Manufacturer : INFINIX
Product Model : Infinix X669
Product Name : X669-GL
Product Device : Infinix-X669
Product Board : Infinix-X669
Board Platform : ums9230
Build ID : SP1A.210812.016
Build Date : Fri Dec 15 13:01:41 CST 2023
Display ID : X669-F065FGHIJK-S-GL-20231215V536
Security Patch : 2023-12-05
Version SDK : 31
Version Release : 12
Version Codename : REL
Firmware Version : GL-20231215V33
Userdata FS Type : F2FS
Backup partitions... OK
Formatting "persist" partition... OK
Done!
 
  • Like
Reactions: tsui_thomas

GsmToto

Super Moderator
Jan 1, 2021
5,013
21,653
UK
Skype
gsmtoto
Sonork ID
100.1684601
Connect phone in BROM/PRELOADER Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM3 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0707
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6768]
LibUSB installed
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Release testpoint, waiting 2 seconds
Advanced Bypass Security... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM3 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0707
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6768]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x603E37F3, 0x4FF473F7, 0xC977EB17, 0xC0FCE0E3
Get Chip ID... [MT6768]
Get SOC ID... [D8AE0B2FF48382EA6EC7C25A6B0030C48D20F99B448D8DA85C 93659D0798AA26]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [8]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x150100445636444D42028D2090D16693
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_CNAME: DV6DMB
EMMC_ID : 0x150100445636444D42028D2090D16693
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0001000000 (16.00Mb)
EMMC_USER : 0x1D1EC00000 (116.48Gb)
RAM INFO:
INT_SRAM: 0x0000070000 (448.00Kb)
EXT_RAM : 0x0100000000 (4.00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... [EXT4] ... OK
Product Brand : vivo
Product Manufacturer : vivo
Product Model : vivo 1907
Product Name : 1907N
Product Device : 1907N
Product Board : k68v1_64
Board Platform : MTK6768
Build ID : RP1A.200720.012
Build Date : Mon May 17 18:21:13 CST 2021
Display ID : RP1A.200720.012 release-keys
Security Patch : 2021-05-01
Version SDK : 30
Version Release : 11
Version Codename : REL
Firmware Version : eng.compil.20210517.182331
Userdata FS Type : EXT4
Read Flash Info done!

Selected model: Vivo PD1913F (Vivo S1)
Operation: Read Flash Info
Software version: 6.3
Work ID: 1992289



Selected model: Vivo PD1913F (Vivo S1)
Operation: Reset password
Software version: 6.3
This procedure will erase all downloaded apps and their data.
Photos, music, and other non-app will be retained. Continue? YES
Work ID: 1993376

Connect phone in BROM/PRELOADER Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM3[BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0707
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6768]
LibUSB installed
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Release testpoint, waiting 2 seconds
Advanced Bypass Security... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM3 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0707
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6768]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x603E37F3, 0x4FF473F7, 0xC977EB17, 0xC0FCE0E3
Get Chip ID... [MT6768]
Get SOC ID... [D8AE0B2FF48382EA6EC7C25A6B0030C48D20F99B448D8DA85C 93659D0798AA26]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [8]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x150100445636444D42028D2090D16655
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_CNAME: DV6DMB
EMMC_ID : 0x150100445636444D42028D2090D1611
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0001000000 (16.00Mb)
EMMC_USER : 0x1D1EC00000 (116.48Gb)
RAM INFO:
INT_SRAM: 0x0000070000 (448.00Kb)
EXT_RAM : 0x0100000000 (4.00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... [EXT4] ... error(0)
Read info from phone... OK
Processing data #1... error(2
 
  • Like
Reactions: tsui_thomas

Mr.AYAN.

Junior Member
May 3, 2023
2
0
moon
Selected model: Tecno KG5j (Tecno Spark Go 2022)
Operation: Eliminar FRP
Software version: 6.3

Host Power Off... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Host Power On... OK
Connect phone to [BOX or PC] in PRELOADER Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek PreLoader USB VCOM_V1632 (Android),usb2ser.sys,3.0.1504.0]
Device found at COM7 [PRELOADER]
Open port... OK
Send start cmd... OK
Get HW code from device... 0717
Get sec config... OK [00000005]
Active sec flags: [SBC DAA]
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0200, HW SUB CODE: 8A00
Detect chip [MT6761]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Preloader exist. Skip connection verification.
Get ME ID... OK
ME_ID = 0xDA5ED3CB, 0x4902DFBB, 0x6EB3AA09, 0x9643645F
Load DownloadAgent... OK
Search DA... OK [1]
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [PRELOADER]
Preloader alive. Skip initializing external RAM
Get device info... OK
EMMC_ID: 0x1501004355544134320582258FCB68FD
Send preloader... OK
Load DownloadAgent... OK
Search DA... OK [5]
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_CNAME: CUTA42
EMMC_ID : 0x1501004355544134320582258FCB68FD
EMMC_BOOT1: 0x0000400000 (4,00Mb)
EMMC_BOOT2: 0x0000400000 (4,00Mb)
EMMC_RPMB : 0x0001000000 (16,00Mb)
EMMC_USER : 0x0E8F800000 (58,24Gb)
RAM INFO:
INT_SRAM: 0x000003A500 (233,25Kb)
EXT_RAM : 0x0080000000 (2,00Gb)
Checking USB status... USB_HIGH_SPEED
[EFUSE INFO]: BROM not disabled
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... [EXT4] ... OK
Product Brand : TECNO
Product Manufacturer : TECNO MOBILE LIMITED
Product Model : TECNO KG5j
Product Name : KG5j-OP
Product Device : TECNO-KG5j
Product Board : TECNO-KG5j
Board Platform : mt6761
Build ID : RP1A.200720.011
Build Date : Tue Oct 31 21:12:11 CST 2023
Display ID : TECNO-RGo-32-231031V420
Security Patch : 2023-11-05
Version SDK : 30
Version Release : 11
Version Codename : REL
Firmware Version : 231031V479
Userdata FS Type : F2FS
Read partition "frp"... OK
Backup saved to C:/Program%20Files%20(x86)/Z3X/Pandora/Backup/MTK/Tecno_KG5j%20(Tecno%20Spark%20Go%202665)/FRP_BACKUP_(2024-1-8_17-24-43)/
Writting FRP data... OK
Erase FRP done!
Operation Failed
 

cchop99

Member
Aug 5, 2019
6
0
Selected model: Mediatek Mediatek
Operation: Read PTT
Software version: 6.3

Host Power Off... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Host Power On... OK
Connect phone to [BOX] in BROM/PRELOADER Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM11 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0717
Get sec config... OK [00000000]
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0200, HW SUB CODE: 8A00
Detect chip [MT6761]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Force switch to BROM... OK
Host Power Off... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Waiting for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0717
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0200, HW SUB CODE: 8A00
Detect chip [MT6761]
Get sec config... OK [00000000]
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM11 [BROM]
Open port... OK
Get HW code from device... 0717
Get sec config... OK [00000000]
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0200, HW SUB CODE: 8A00
Detect chip [MT6761]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x124F4609, 0xE075896C, 0x8C41D72F, 0xA9300A34
Get Chip ID... [MT6761]
Get SOC ID... [5195D705875FC967A3A05525A79966C4154D3818E4C6BAB917 FDEB435B147469]
Get sec config... OK [00000000]
Load DownloadAgent... OK
Search DA... OK [5]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x150100525831424D4207AC85C4AD832B
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_CNAME: RX1BMB
EMMC_ID : 0x150100525831424D4207AC85C4AD832B
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0000400000 (4.00Mb)
EMMC_USER : 0x0747C00000 (29.12Gb)
RAM INFO:
INT_SRAM: 0x000003A500 (233.25Kb)
EXT_RAM : 0x00C0000000 (3.00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK [A]
Read product info... [EXT4] ... OK
Product Brand : Dialn
Product Manufacturer : Dialn
Product Model : X62
Product Name : X62B
Product Device : X62B
Product Board : X62
Board Platform : mt6761
Build ID : SP1A.210812.016
Build Date : Wed Sep 27 14:17:57 CST 2023
Display ID : TP1A.220624.014
Security Patch : 2023-09-05
Version SDK : 33
Version Release : 13
Version Codename : REL
Firmware Version : 20230927.1400
Userdata FS Type : EXT4
Read partition "preloader"... OK
Read partition "pgpt"... OK
Read partition "boot_para"... OK
Read partition "para"... OK
Read partition "expdb"... OK
Read partition "frp"... OK
Read partition "nvcfg"... OK
Read partition "nvdata"... OK
Read partition "md_udc"... OK
Read partition "metadata"... OK
Read partition "protect1"... OK
Read partition "protect2"... OK
Read partition "seccfg"... OK
Read partition "sec1"... OK
Read partition "proinfo"... OK
Read partition "nvram"... OK
Read partition "logo"... OK
Read partition "md1img_a"... OK
Read partition "spmfw_a"... OK
Read partition "scp_a"... OK
Read partition "sspm_a"... OK
Read partition "gz_a"... OK
Read partition "lk_a"... OK
Read partition "boot_a"... OK
Read partition "vendor_boot_a"... OK
Read partition "init_boot_a"... OK
Read partition "dtbo_a"... OK
Read partition "tee_a"... OK
Read partition "vbmeta_a"... OK
Read partition "vbmeta_system_a"... OK
Read partition "vbmeta_vendor_a"... OK
Read partition "md1img_b"... OK
Read partition "spmfw_b"... OK
Read partition "scp_b"... OK
Read partition "sspm_b"... OK
Read partition "gz_b"... OK
Read partition "lk_b"... OK
Read partition "boot_b"... OK
Read partition "vendor_boot_b"... OK
Read partition "init_boot_b"... OK
Read partition "dtbo_b"... OK
Read partition "tee_b"... OK
Read partition "super"... OK
Read partition "vbmeta_b"... OK
Read partition "vbmeta_system_b"... OK
Read partition "vbmeta_vendor_b"... OK
Read partition "otp"... OK
Read partition "flashinfo"... OK
Read partition "sgpt"... OK
Saved to C:/Program%20Files%20(x86)/Z3X/Pandora/Backup/MTK/Mediatek_MT6761/Mediatek_Mediatek_DUMP_(2024-1-3_12-11-22)/
Dumping Partitions done!
Hello.. Can you help me to obtain a copy of the Firmware or ROM for this phone...Thanks
 

GsmToto

Super Moderator
Jan 1, 2021
5,013
21,653
UK
Skype
gsmtoto
Sonork ID
100.1684601
Selected model: Spreadtrum Spreadtrum
Operation: Unlock network
Software version: 6.3
Work ID: 20733427

Connect phone in BROM mode. Use volume key buttons or testpoint.
Waiting for device... OK
Device found at COM6
Port: USB\VID_1782&PID_4D00\5&25578154&0&1
Driver: [UNISOC Communications Inc.,sprdvcom,SPRD U2S Diag,sprdvcom.sys,4.19.38.134]
Port type: BROM
Connecting to device... OK
Selected processor: SC9863A_64
Load files... (universal) OK
Connect preloader 1... OK
Connect preloader 2... OK
Connect loader 1... OK
Connect loader 2... OK
Serial Number: 105324039D0093455
Read partitions info... OK
Checking A/B state... OK [A]
Read product info... [EROFS] ... OK
Product Brand : Itel
Product Manufacturer : ITEL
Product Model : itel A663L
Product Name : A663L
Product Device : itel-A663L
Board Platform : sp9863a
Build ID : TP1A.220624.014
Build Date : Fri Sep 1 17:50:59 CST 2023
Display ID : A663L-V450AC-TGo-ZAVC-230901V753
Security Patch : 2023-08-05
Version SDK : 33
Version Release : 13
Version Codename : REL
Firmware Version : 58
Userdata FS Type : F2FS
Check security state... OK [1]
Unlock bootloader... OK
Patch modem check...
Patch data... OK
Load NVD... OK
Unlock... OK
Save NVD... OK
Done!
 
  • Like
Reactions: tsui_thomas
Top