Z3X Pandora Tool New Update v6.1

Z3X Team

SPYROS

Friend's Martview
Jan 27, 2023
159
375
PK


Pandora Tool v6.1

- Improved Patch Cert procedure for Unisoc phones

- Added support new Oppo phones in Preloader mode:
PFFM20 Oppo Find X5 Pro,
PFZM10, PGZM10 Oppo Reno8 Pro+,
PGJM10 Oppo K10 5G,
PGX110 Oppo Reno9 Pro


- Added support new OnePlus phones in Preloader mode:
OPD2203 OnePlus Pad,
OPD2304, OPD2305 OnePlus Pad Go,
PGKM10 OnePlus Ace,
PGZ110 OnePlus Ace Racing Edition,
PHP110 OnePlus Ace 2V


- Added support Vivo phones in Preloader mode:
PD2285BF, PD2285CF, PD2285DF, PD2285EF, PD2285F iQOO Z7 Pro 5G

- Fixed some bugs

- Infinix/Tecno loaders updated

Download

163.1 MB file on MEGA
 

GsmToto

Super Moderator
Jan 1, 2021
3,776
19,155
UK
Skype
gsmtoto
Sonork ID
100.1684601
Selected model: Mediatek Mediatek
Operation: Unlock network
Software version: 6.1

Host Power Off... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Host Power On... OK
Connect phone to [BOX] in BROM/PRELOADER Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek PreLoader USB VCOM (Android),usb2ser.sys,3.0.1504.0]
Device found at COM5 [PRELOADER]
Open port... OK
Send start cmd... OK
Get HW code from device... 0717
Get sec config... OK [00000000]
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0200, HW SUB CODE: 8A00
Detect chip [MT6761]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Force switch to BROM... OK
Host Power Off... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Waiting for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0717
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0200, HW SUB CODE: 8A00
Detect chip [MT6761]
Get sec config... OK [00000000]
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM5 [BROM]
Open port... OK
Get HW code from device... 0717
Get sec config... OK [00000000]
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0200, HW SUB CODE: 8A00
Detect chip [MT6761]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x1D96713C, 0x72E739B4, 0x3CBDE432, 0xA5D170BC
Get Chip ID... [MT6761]
Get SOC ID... [FA8B440C16DB3284C7963EC624438CBB9E103770C97E97C77F E1743927792804]
Get sec config... OK [00000000]
Load DownloadAgent... OK
Search DA... OK [5]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x13014E51334A3937561005A792754407
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_CNAME: Q3J97V
EMMC_ID : 0x13014E51334A3937561005A792754407
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0000400000 (4.00Mb)
EMMC_USER : 0x0747C00000 (29.12Gb)
RAM INFO:
INT_SRAM: 0x000003A500 (233.25Kb)
EXT_RAM : 0x00C0000000 (3.00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... error(0)
Read security partition from phone... OK
Read security files... OK
Read security files... OK
Read lock info... OK
Unlock... OK [DF1, UN]
Write lock info... OK
Write security partition to phone... OK
Network Unlock done!
 

IMRAN BAGBAN

Friend's Martview
Oct 4, 2018
111
116
Skype
786


Pandora Tool v6.1

- Improved Patch Cert procedure for Unisoc phones

- Added support new Oppo phones in Preloader mode:
PFFM20 Oppo Find X5 Pro,
PFZM10, PGZM10 Oppo Reno8 Pro+,
PGJM10 Oppo K10 5G,
PGX110 Oppo Reno9 Pro


- Added support new OnePlus phones in Preloader mode:
OPD2203 OnePlus Pad,
OPD2304, OPD2305 OnePlus Pad Go,
PGKM10 OnePlus Ace,
PGZ110 OnePlus Ace Racing Edition,
PHP110 OnePlus Ace 2V


- Added support Vivo phones in Preloader mode:
PD2285BF, PD2285CF, PD2285DF, PD2285EF, PD2285F iQOO Z7 Pro 5G

- Fixed some bugs

- Infinix/Tecno loaders updated

Download

163.1 MB file on MEGA
Vivo v29 Pro letest security not working
So please fix it
 

ayoub.hafid74

Active Member
Dec 18, 2019
24
6
Selected model: Infinix X669C (Infinix Hot 30i)
Operation: Switch Slot
Software version: 6.1

Host Power Off... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Host Power On... OK
Connect phone to [BOX or PC] in PRELOADER Mode
Waiting for device... OK
Driver: [MediaTek Inc.,usbser,MediaTek PreLoader USB VCOM (Android),usbser.sys,10.0.19041.3636]
You are using driver version 10.0.19041.3636, we recommend using version 3.0.1504.0 for proper operation. You can install the correct driver from the program directory.
Device found at COM71 [PRELOADER]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get sec config... OK [00000005]
Active sec flags: [SBC DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Preloader exist. Skip connection verification.
Get ME ID... OK
ME_ID = 0xD4DF4A12, 0x2D0420F5, 0x0F70F894, 0xC6E18FE6
Load DownloadAgent... OK
Search DA... OK [1]
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... error(STATUS_SEC_INVALID_DA_VER)
 

Officialsmubeen

Active Member
Jul 24, 2022
15
8
Pakistan


Pandora Tool v6.1

- Improved Patch Cert procedure for Unisoc phones

- Added support new Oppo phones in Preloader mode:
PFFM20 Oppo Find X5 Pro,
PFZM10, PGZM10 Oppo Reno8 Pro+,
PGJM10 Oppo K10 5G,
PGX110 Oppo Reno9 Pro


- Added support new OnePlus phones in Preloader mode:
OPD2203 OnePlus Pad,
OPD2304, OPD2305 OnePlus Pad Go,
PGKM10 OnePlus Ace,
PGZ110 OnePlus Ace Racing Edition,
PHP110 OnePlus Ace 2V


- Added support Vivo phones in Preloader mode:
PD2285BF, PD2285CF, PD2285DF, PD2285EF, PD2285F iQOO Z7 Pro 5G

- Fixed some bugs

- Infinix/Tecno loaders updated

Download

163.1 MB file on MEGA
Hello Team Please Check Fix Your latest Unisoc Phones Cant Unlock Bootloader After Unlock On Show operations Pass But there is still device lock have bootloop sec May To latest Fix Its ASAP I HAVE TEST IN 4 5 Devices But bootloader no Unlock . Thanks Team in advance
 
  • Like
Reactions: SPYROS

tahirshanmughal

Active Member
Dec 22, 2021
29
5
pak
Selected model: Mediatek Mediatek
Operation: Unlock network
Software version: 6.1

Host Power Off... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Host Power On... OK
Connect phone to [BOX] in BROM/PRELOADER Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek PreLoader USB VCOM (Android),usb2ser.sys,3.0.1504.0]
Device found at COM5 [PRELOADER]
Open port... OK
Send start cmd... OK
Get HW code from device... 0717
Get sec config... OK [00000000]
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0200, HW SUB CODE: 8A00
Detect chip [MT6761]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Force switch to BROM... OK
Host Power Off... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Waiting for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0717
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0200, HW SUB CODE: 8A00
Detect chip [MT6761]
Get sec config... OK [00000000]
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM5 [BROM]
Open port... OK
Get HW code from device... 0717
Get sec config... OK [00000000]
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0200, HW SUB CODE: 8A00
Detect chip [MT6761]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x1D96713C, 0x72E739B4, 0x3CBDE432, 0xA5D170BC
Get Chip ID... [MT6761]
Get SOC ID... [FA8B440C16DB3284C7963EC624438CBB9E103770C97E97C77F E1743927792804]
Get sec config... OK [00000000]
Load DownloadAgent... OK
Search DA... OK [5]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x13014E51334A3937561005A792754407
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_CNAME: Q3J97V
EMMC_ID : 0x13014E51334A3937561005A792754407
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0000400000 (4.00Mb)
EMMC_USER : 0x0747C00000 (29.12Gb)
RAM INFO:
INT_SRAM: 0x000003A500 (233.25Kb)
EXT_RAM : 0x00C0000000 (3.00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... error(0)
Read security partition from phone... OK
Read security files... OK
Read security files... OK
Read lock info... OK
Unlock... OK [DF1, UN]
Write lock info... OK
Write security partition to phone... OK
Network Unlock done!
team help
pandora oppo a16 cph2269 repire security fail 6.1 but 3.0 repire done


Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_CNAME: DX68MB
EMMC_ID : 0x150100445836384D4209ED16CAD37805
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0000400000 (4.00Mb)
EMMC_USER : 0x0747C00000 (29.12Gb)
RAM INFO:
INT_SRAM: 0x000003A000 (232.00Kb)
EXT_RAM : 0x00C0000000 (3.00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... [EXT4] ... OK
Product Brand : alps
Product Manufacturer : alps
Product Model : CPH2269
Product Name : vnd_oppo6765
Product Device : oppo6765
Product Board : oppo6765
Board Platform : mt6765
Build ID : RP1A.200720.011
Build Date : Thu Aug 26 18:28:39 CST 2021
Display ID : CPH2269_11_A.01
Security Patch : 2021-08-05
Version SDK : 30
Version Release : 11
Version Codename : REL
Firmware Version : 1629972958632
Userdata FS Type : F2FS
Read partition "nvdata"... OK
Read partition "nvram"... OK
Read NVDATA files... OK
Read NVRAM files... OK
Repairing IMEI...
IMEI 1: 355329100000000
IMEI 2: 355329000000000
Write IMEI and patch CERT [NVDATA]... OK
Checking patch type... [1]
Patching partition... already patched, skip
Selected "Auto unlock bootloader"
Read security partition from phone... OK
Decrypting security data... error(6)


Selected model: OPPO CPH2269 (OPPO A16)
Operation: Repair
Software version: 6.1
 
  • Like
Reactions: SPYROS and GsmToto

ector

Active Member
Mar 31, 2021
15
3
mexico
a326u does not accept 16 zeros unlock

Selected model: Samsung SM-A326U (Samsung Galaxy A32 5G)
Operation: Unlock network (Server)
Software version: 6.1
Work ID: 14247482

Checking Login and Password... OK
Balance: 7 crd.
Le quedan 7 crédito(s). Esta operación consume 5 créditos. ¿Continuar? Yes
Searching Samsung modem... detected COM62
Reading phone info... OK
Model: SM-A326U
AP version: A326USQUBDWI8
CSC version: A326UOYNBDWI8
CP version: A326USQUBDWI8
OS version: 13
Product code: XAA
Carrier ID: TMB
Phone SN: RFCR60G8YJH
Unique number: CE042154891FB43A1C7E
IMEI: 355561775942974
IMEI Certi: PASS
Changing csc to XAA... OK
WARNING!!! DO NOT USE THIS METHOD if KG is Locked/Active or sec ctrl status(0). This will damage your phone. Continue? YES
Rebooting to download... OK
Searching USB Flash interface... COM8 detected
Setup connection... OK
Reading data from phone... OK
Sending data to phone... OK
Sending data to phone... OK
Searching USB Flash interface... COM8 detected
Setup connection... OK
Reading data from phone... OK
Sending data to phone... OK
Connect phone in BROM/PRELOADER Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM38 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0996
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6853]
LibUSB installed
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Release testpoint, waiting 2 seconds
Advanced Bypass Security... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM38 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0996
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6853]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x4C4ABDD4, 0xC0F424F8, 0x4A4A2E91, 0xB1147F28
Get Chip ID... [MT6853]
Get SOC ID... [17808092694B77F7BE630A5F8645C5FC229F9D2BF8641016EB3352FC08793C9C]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [15]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
UFS CID (FW VER): KM5P8001DM-B424 (0002)
Load EMI from phone... Skip (invalid magic flash header)
Load EMI config from database [DB VER: 222 DB DATE: 11-13-2023] OK [1]
Trying EMI [58C04EF5, 5B1D8E36, 9B425B1E, 9AED5305, 762A6CD6, 635C486B, D0CDE7D2, E064B692, F7581BCD, 9069B3B2]
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
UFS INFO:
UFS_CID : KM5P8001DM-B424
UFS_FWVER : 0002
BLOCK_SIZE: 0x0000001000 (4.00Kb)
UFS_LU0 : 0x0000400000 (4.00Mb)
UFS_LU1 : 0x0000400000 (4.00Mb)
UFS_LU2 : 0x0EE5800000 (59.59Gb)
RAM INFO:
INT_SRAM: 0x0000070000 (448.00Kb)
EXT_RAM : 0x0100000000 (4.00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... [EXT4] ... OK
Product Brand : samsung
Product Manufacturer : samsung
Product Model : SM-A326U
Product Name : a32xsq
Product Device : a32x
Product Board : a32x
Board Platform : mt6853
Build ID : SP1A.210812.016
Build Date : Mon Sep 18 15:09:16 KST 2023
Display ID : TP1A.220624.014.A326USQUBDWI8
Security Patch : 2023-09-01
Version SDK : 33
Version Release : 13
Version Codename : REL
Firmware Version : A326USQUBDWI8
Userdata FS Type : F2FS
Restoring partition table... OK
Read security partition from phone... OK
Searching server... OK
Waiting for server answer... OK
Unlocking ... [3] ... OK
Every time you turn on your phone, you must enter unlock code 0000000000000000 (16 zeros)
Network Unlock done!
user PND_6ozxSwXh
 
  • Like
Reactions: SPYROS and GsmToto

saymon

Member
Apr 6, 2020
6
2
dhaka,bangladesh


Pandora Tool v6.1

- Improved Patch Cert procedure for Unisoc phones

- Added support new Oppo phones in Preloader mode:
PFFM20 Oppo Find X5 Pro,
PFZM10, PGZM10 Oppo Reno8 Pro+,
PGJM10 Oppo K10 5G,
PGX110 Oppo Reno9 Pro


- Added support new OnePlus phones in Preloader mode:
OPD2203 OnePlus Pad,
OPD2304, OPD2305 OnePlus Pad Go,
PGKM10 OnePlus Ace,
PGZ110 OnePlus Ace Racing Edition,
PHP110 OnePlus Ace 2V


- Added support Vivo phones in Preloader mode:
PD2285BF, PD2285CF, PD2285DF, PD2285EF, PD2285F iQOO Z7 Pro 5G

- Fixed some bugs

- Infinix/Tecno loaders updated

Download

163.1 MB file on MEGA
Pd2284bf vivo v29 pro failed November security
 
  • Like
Reactions: SPYROS and GsmToto

GsmToto

Super Moderator
Jan 1, 2021
3,776
19,155
UK
Skype
gsmtoto
Sonork ID
100.1684601
Selected model: Mediatek Mediatek
Operation: Read PTT
Software version: 6.1

Host Power Off... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Host Power On... OK
Connect phone to [BOX] in BROM/PRELOADER Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM4 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0699
Get sec config... OK [000000E7]
Active sec flags: [SBC SLA DAA]
Get HW & SW version from device... OK
HW VER: CC00, SW VER: 0002, HW SUB CODE: 8A00
Detect chip [MT6739]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Force switch to BROM... OK
Host Power Off... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Waiting for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0699
Get HW & SW version from device... OK
HW VER: CC00, SW VER: 0002, HW SUB CODE: 8A00
Detect chip [MT6739]
Get sec config... OK [000000E7]
Active sec flags: [SBC SLA DAA]
Release testpoint
Advanced Bypass Security... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM4 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0699
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CC00, SW VER: 0002, HW SUB CODE: 8A00
Detect chip [MT6739]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x63B2DF9E, 0x0EA371E0, 0x89B0A63E, 0x1E57D29F
Get Chip ID... [MT6739]
Get SOC ID... [F9B6288E997944D61AB747405D3671D573D8BFF41BB0C0E27D 20D8DF61EFFDD5]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [1]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x15010051583633414209D905CA965837
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_CNAME: QX63AB
EMMC_ID : 0x15010051583633414209D905CA965837
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0000400000 (4.00Mb)
EMMC_USER : 0x0747C00000 (29.12Gb)
RAM INFO:
INT_SRAM: 0x0000020000 (128.00Kb)
EXT_RAM : 0x0080000000 (2.00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... [EXT4] ... OK
Product Brand : Lively
Product Manufacturer : TCL
Product Model : 4058P
Product Name : 4058P
Product Device : Gflip6_GC
Product Board : gflip6
Board Platform : mt6739
Build ID : RP1A.200720.011
Build Date : Thu Sep 21 10:43:40 CST 2023
Security Patch : 2021-09-05
Version SDK : 30
Version Release : 11
Version Codename : REL
Firmware Version : RL5N
Userdata FS Type : F2FS
Read partition "preloader"... OK
Read partition "pgpt"... OK
Read partition "proinfo"... OK
Read partition "nvram"... OK
Read partition "swversion"... OK
Read partition "persist"... OK
Read partition "oembin"... OK
Read partition "oempersist"... OK
Read partition "otapkg"... OK
Read partition "boot_para"... OK
Read partition "recovery"... OK
Read partition "para"... OK
Read partition "expdb"... OK
Read partition "frp"... OK
Read partition "nvcfg"... OK
Read partition "nvdata"... OK
Read partition "metadata"... OK
Read partition "protect1"... OK
Read partition "protect2"... OK
Read partition "md_udc"... OK
Read partition "seccfg"... OK
Read partition "sec1"... OK
Read partition "efuse"... OK
Read partition "md1img"... OK
Read partition "md1dsp"... OK
Read partition "spmfw"... OK
Read partition "mcupmfw"... OK
Read partition "gz1"... OK
Read partition "gz2"... OK
Read partition "lk"... OK
Read partition "lk2"... OK
Read partition "loader_ext1"... OK
Read partition "loader_ext2"... OK
Read partition "boot"... OK
Read partition "vendor_boot"... OK
Read partition "logo"... OK
Read partition "dtbo"... OK
Read partition "vbmeta"... OK
Read partition "vbmeta_system"... OK
Read partition "vbmeta_vendor"... OK
Read partition "tee1"... OK
Read partition "tee2"... OK
Read partition "super"... OK
Read partition "otp"... OK
Read partition "flashinfo"... OK
Read partition "sgpt"... OK
Saved to C:/Program%20Files%20(x86)/Z3X/Pandora/Backup/MTK/Mediatek_MT6739/Mediatek_Mediatek_DUMP_(2023-12-19_15-33-4)/
Dumping Partitions done!
 
Top