Infinity realme c3 RMX2020 unlock network

Infinity Box & Dongle

Habib Tech

Friend's Martview
Sep 11, 2019
145
25
Sudan
Unlock not done . see someone done by CM2 after flash some file but not found on support

Operation : Identify Device [ v2.35 ]

Mode : FLASH
Deep Info: On
Wait...

1. Power Off the device
2. Wait 20 seconds
3. Connect USB cable to device
Waiting for device connection...

PTFN : MediaTek USB Port_V1633 (COM4)
MODE : BOOTROM
PORT : 4
Waiting BOOT ack...
BROM : Skip ACK verify
BROM : Init BROM
BROM init passed
CHIP : MT6768 , SBID : 0x8A00 , HWVR : 0xCA00 , SWVR : 0x0000
CODE : Talbot
TYPE : MODERN [RAPHAEL]
BROM : MEID : B8881C3F6DAC53E417BF3293D016EA2F
BROM : SecLevel : 0x000000E5
BROM : SecMode : SBC+SDA+EXT
BROM : BROM|BL : 0x05|0xFE
BROM : BOOTROM
BROM : SOCID : 86CE9D1CF64C842E6A7B4E920FB77A1C445E79D4289F6CE524048FB0ECFDDDCA
BROM : SLA : Local Auth
BROM : SLA : Starting Auth
BROM : SLA : Auth Passed
BROM : SEC : 0x000000E0
AGENT : 0_base : BASE_v2112 | Manual : Disabled
AGENT : Looking for suitable BootChain in DA...
AGENT : MTK_AllInOne_DA.bin
AGENT : Found MT6768
AGENT : MTK_DOWNLOAD_AGENT
BROM : Sending 1st DA...
BROM : DA sent
BROM : Transfer control to DA...
DA : AGENT started
DA : SYNC
DA : MODE : BROM
DA : EXT_RAM NOT initialized

EMMC: CID : 150100445036384D42027A3DD830C615
EMMC: VEN : SAMSUNG : OEM : 0 : ID : 445036384D42 : PRV : 0x02
EMMC: VEN : SAMSUNG : DP68MB
EMMC: SNN : 2050873392 ( 0x7A3DD830 ) , MF : 12/2019

EMI : DEV : INFINITY
EMI : SRC : PRELOADER_INFINITY_0
EMI : CNT : 0001
EMI : Init EMI from INTERNAL DB
EMI : EXT_RAM CFG Passed

DA : BOOT to 2nd DA...
DA : 2ND stage confirmed
DA : SYNC with DA passed
DA : Receiving HW info

SRAM: 0x00070000 [ 448.00 KB ]
DRAM: 0x100000000 [ 4.00 GB ]

EMMC: CID : 150100445036384D42027A3DD830C615
EMMC: VEN : SAMSUNG : OEM : 0 : ID : 445036384D42 : PRV : 0x02
EMMC: VEN : SAMSUNG : DP68MB
EMMC: SNN : 2050873392 ( 0x7A3DD830 ) , MF : 12/2019

EMMC:
BOOT1 : 0x00400000 [ 4.00 MB ]
BOOT2 : 0x00400000 [ 4.00 MB ]
RPMB : 0x01000000 [ 16.00 MB ]
USER : 0xE8F800000 [ 58.24 GB ]

CHIP : MT6768 , SBID : 0x8A00 , HWVR : 0xCA00 , SWVR : 0x0001 , EVOL : 0x0000

RNID : B5D193CD191B5124B74BB547C88EF5D6

DA : USB : HIGH-SPEED

Boot done

Patch Level : QP1A.190711.020
Display ID : QP1A.190711.020 release-keys
Ver. CodeName : REL
Ver. Release : 10
Sec. Patch : 2021-02-05
Build Time : 18.02.2021
Product Info : oppo6769

Device UID : MT6768__RMX2020_11_A.21_200410_7419c884

USERDATA : FILESYSTEM : EXT4 with FBE ( File-Base Encryption )

NVRAM : OPPO6769_19741_MDBIN_PCB01_MT6768_S00.MOLY_LR12A_R2_TC16_Q_G70_PR1_SP_V1_P54
NVRAM : 0xBF0AD01F
NVRAM : State : Ok
INFO : WiFi MAC : BC2DEF08F4D9
INFO : BlTh MAC : BC2DEF08F4D8


Backup critical data [18] to backup\MT6768__B8881C3F6DAC53E417BF3293D016EA2F\
[25] Read : NVRAM
[17] Read : NVDATA
[23] Read : PROINFO
[38] Read : LK
[16] Read : NVCFG
[19] Read : PROTECT1
[1] Read : PGPT
[18] Read : PERSIST
[0] Read : PRELOADER
[7] Read : OPPORESERVE3
[8] Read : OPPO_CUSTOM
Backup done


STORAGE : Life Status : eMMC : OK!
STORAGE : OTP Status : UNLOCKED!
STORAGE : RPMB Status : eMMC : RPMB KEY PROGRAMMED [UNUSABLE]
Scan preloader...

PRELOADER: MT6752 preloader_oppo6769.bin with 13 memory type(s) supported
EMI : [00] : eMMC : LP_DDR4X : ID : 150100445636444D42 : VEN : SAMSUNG | DEV : DV6DMB : RAM : [ 4.00 GB ]
EMI : [01] : eMMC : LP_DDR4X : ID : 13014E53304A394B39 : VEN : MICRON | DEV : S0J9K9 : RAM : [ 4.00 GB ]
EMI : [02] : eMMC : LP_DDR4X : ID : 150100444436384D42 : VEN : SAMSUNG | DEV : DD68MB : RAM : [ 3.00 GB ]
EMI : [03] : eMMC : LP_DDR4X : ID : 150100444836444142 : VEN : SAMSUNG | DEV : DH6DAB : RAM : [ 4.00 GB ]
EMI : [04] : eMMC : LP_DDR4X : ID : 90014A68433861503E : VEN : HYNIX | DEV : hC8aP> : RAM : [ 3.00 GB ]
EMI : [05] : eMMC : LP_DDR4X : ID : 90014A684339615033 : VEN : HYNIX | DEV : hC9aP3 : RAM : [ 4.00 GB ]
EMI : [06] : eMMC : LP_DDR4X : ID : 150100445036384D42 : VEN : SAMSUNG | DEV : DP68MB : RAM : [ 3.00 GB ]
EMI : [07] : eMMC : LP_DDR4X : ID : 90014A68423861503E : VEN : HYNIX | DEV : hB8aP> : RAM : [ 3.00 GB ]
EMI : [08] : eMMC : LP_DDR4X : ID : 1501003458364B4D42 : VEN : SAMSUNG | DEV : 4X6KMB : RAM : [ 2.00 GB ]
EMI : [09] : eMMC : LP_DDR4X : ID : 450100444134313238 : VEN : SANDISK | DEV : DA4128 : RAM : [ 4.00 GB ]
EMI : [0A] : eMMC : LP_DDR4X : ID : 90014A68423861503E : VEN : HYNIX | DEV : hB8aP> : RAM : [ 2.00 GB ]
EMI : [0B] : eMMC : LP_DDR4X : ID : 150100334836434142 : VEN : SAMSUNG | DEV : 3H6CAB : RAM : [ 6.00 GB ]
EMI : [0C] : eMMC : LP_DDR4X : ID : 90014A68433861503E : VEN : HYNIX | DEV : hC8aP> : RAM : [ 6.00 GB ]
PRELOADER saved to: backup\PRELOADER\preloader_oppo6769.bin

Verify backup\PRELOADER\preloader_oppo6769.bin with hash cacaa303
Exist
Ok

Done
Elapsed: 00:00:37

Operation : SP Unlock [ v2.35 ]
Mode : FLASH

1. Power Off the device
2. Wait 20 seconds
3. Connect USB cable to device
Waiting for device connection...

PTFN : MediaTek USB Port_V1633 (COM4)
MODE : BOOTROM
PORT : 4
Waiting BOOT ack...
BROM : Skip ACK verify
BROM : Init BROM
BROM init passed
CHIP : MT6768 , SBID : 0x8A00 , HWVR : 0xCA00 , SWVR : 0x0000
CODE : Talbot
TYPE : MODERN [RAPHAEL]
BROM : MEID : B8881C3F6DAC53E417BF3293D016EA2F
BROM : SecLevel : 0x000000E5
BROM : SecMode : SBC+SDA+EXT
BROM : BROM|BL : 0x05|0xFE
BROM : BOOTROM
BROM : SOCID : 86CE9D1CF64C842E6A7B4E920FB77A1C445E79D4289F6CE524048FB0ECFDDDCA
BROM : SLA : Local Auth
BROM : SLA : Starting Auth
BROM : SLA : Auth Passed
BROM : SEC : 0x000000E0
AGENT : 0_base : BASE_v2112 | Manual : Disabled
AGENT : Looking for suitable BootChain in DA...
AGENT : MTK_AllInOne_DA.bin
AGENT : Found MT6768
AGENT : MTK_DOWNLOAD_AGENT
BROM : Sending 1st DA...
BROM : DA sent
BROM : Transfer control to DA...
DA : AGENT started
DA : SYNC
DA : MODE : BROM
DA : EXT_RAM NOT initialized

EMMC: CID : 150100445036384D42027A3DD830C615
EMMC: VEN : SAMSUNG : OEM : 0 : ID : 445036384D42 : PRV : 0x02
EMMC: VEN : SAMSUNG : DP68MB
EMMC: SNN : 2050873392 ( 0x7A3DD830 ) , MF : 12/2019

EMI : DEV : INFINITY
EMI : SRC : PRELOADER_INFINITY_0
EMI : CNT : 0001
EMI : Init EMI from INTERNAL DB
EMI : EXT_RAM CFG Passed

DA : BOOT to 2nd DA...
DA : 2ND stage confirmed
DA : SYNC with DA passed
DA : Receiving HW info

SRAM: 0x00070000 [ 448.00 KB ]
DRAM: 0x100000000 [ 4.00 GB ]

EMMC: CID : 150100445036384D42027A3DD830C615
EMMC: VEN : SAMSUNG : OEM : 0 : ID : 445036384D42 : PRV : 0x02
EMMC: VEN : SAMSUNG : DP68MB
EMMC: SNN : 2050873392 ( 0x7A3DD830 ) , MF : 12/2019

EMMC:
BOOT1 : 0x00400000 [ 4.00 MB ]
BOOT2 : 0x00400000 [ 4.00 MB ]
RPMB : 0x01000000 [ 16.00 MB ]
USER : 0xE8F800000 [ 58.24 GB ]

CHIP : MT6768 , SBID : 0x8A00 , HWVR : 0xCA00 , SWVR : 0x0001 , EVOL : 0x0000

RNID : B5D193CD191B5124B74BB547C88EF5D6

DA : USB : HIGH-SPEED

Boot done

[Info] : Unsupported security type in selected mode. Repeat operation in META mode!
INFO : Generating and send report data...
Send report...
Sent


Done
Elapsed: 00:00:29

Operation : SP Unlock [ v2.35 ]
Mode : META

1. Power Off the device
2. Wait 20 seconds
3. Connect USB cable to device
Waiting for device connection...

PTFN : MediaTek USB Port_V1633 (COM4)
MODE : BOOTROM
PORT : 4
Waiting BOOT ack...
BROM : Skip ACK verify
BROM : Init BROM
BROM init passed
CHIP : MT6768 , SBID : 0x8A00 , HWVR : 0xCA00 , SWVR : 0x0000
CODE : Talbot
TYPE : MODERN [RAPHAEL]
BROM : MEID : B8881C3F6DAC53E417BF3293D016EA2F
BROM : SecLevel : 0x000000E5
BROM : SecMode : SBC+SDA+EXT
BROM : BROM|BL : 0x05|0xFE
BROM : BOOTROM
BROM : SOCID : 86CE9D1CF64C842E6A7B4E920FB77A1C445E79D4289F6CE524048FB0ECFDDDCA
BROM : SLA : Local Auth
BROM : SLA : Starting Auth
BROM : SLA : Auth Passed
BROM : SEC : 0x000000E0
BROM : Configuring target for META

BROM : META configured

INIT : META confirmed

Boot done

AP_CHIP : MT6768
AP_SWTM : Thu Feb 18 12:55:24 CST 2021
AP_SWVR : RMX2020_11_A.59_210218_7b2e9438
MD_CHIP : MT6768
MD_SWVR : OPPO_RM_G70_Q0MP1_K69V1_64_BSP_HW

IMEI[1] : 863651040197168
ID0 : Lock : Not Locked | MNC : 0 | CNT : 5 | CODE : 12345678
ID1 : Lock : Not Locked | MNC : 0 | CNT : 5 | CODE : 56781234
ID2 : Lock : Not Locked | MNC : 0 | CNT : 5 | CODE : 11112222
ID3 : Lock : Not Locked | MNC : 0 | CNT : 5 | CODE : 33334444
ID4 : Lock : Not Locked | MNC : 0 | CNT : 5 | CODE : 55556666
ID5 : Lock : Not Locked | MNC : 0 | CNT : 5 | CODE : 77778888
ID6 : Lock : Not Locked | MNC : 0 | CNT : 5 | CODE : 99990000
SPLock Info : Not locked
IMEI[2] : 863651040197168
ID0 : Lock : Not Locked | MNC : 0 | CNT : 5 | CODE : 12345678
ID1 : Lock : Not Locked | MNC : 0 | CNT : 5 | CODE : 56781234
ID2 : Lock : Not Locked | MNC : 0 | CNT : 5 | CODE : 11112222
ID3 : Lock : Not Locked | MNC : 0 | CNT : 5 | CODE : 33334444
ID4 : Lock : Not Locked | MNC : 0 | CNT : 5 | CODE : 55556666
ID5 : Lock : Not Locked | MNC : 0 | CNT : 5 | CODE : 77778888
ID6 : Lock : Not Locked | MNC : 0 | CNT : 5 | CODE : 99990000
SPLock Info : Not locked


Done
Elapsed: 00:00:52
 

Infinity-Box

Product Supporter
Feb 10, 2019
2,583
544
What network/operator this phone is locked?
Where do you see info about flashing?

Also make "Identify" with this latest test version [pub] software/beta/
and copy log text here, probably I will see more info than before
 

Habib Tech

Friend's Martview
Sep 11, 2019
145
25
Sudan
Identify Device [ v2.36 ]


Load IDBase v723487 Ok
Operation : Identify Device [ v2.36 ]

Platform: MTK SmartPhone - MT65/67/68/81/83/87 | Helio G/P/X
Mode : FLASH
[+] SecureData Backup
[+] AutoBoot
[+] Read Deep Info: PRL, HW, DEBUG
[+] FireFly : AutoEMI
[+] FireFly : FireFly UNI-Proto
[+] Smart Service
[-] Local SLA
Wait...

1. Power Off the device
2. Wait 20 seconds
3. Connect USB cable to device
Waiting for device connection...

PTFN : MediaTek USB Port_V1633 (COM7)
MODE : BOOTROM
PORT : 7
Waiting BOOT ack...
BROM : Skip ACK verify
BROM : Init BROM
BROM init passed
CHIP: MT6768 SBID: 0x8A00 HWVR: 0xCA00 SWVR: 0x0000 EVOL: 0x0000 HWC: 0x0707
CODE: Talbot
TYPE: MODERN [RAPHAEL]

BROM : MEID : B8881C3F6DAC53E417BF3293D016EA2F
BROM : SecLevel : 0x000000E5
BROM : SecMode : SBC+SDA+EXT
BROM : BROM|BL : 0x05|0xFE
BROM : BOOTROM
BROM : SOCID : 86CE9D1CF64C842E6A7B4E920FB77A1C445E79D4289F6CE524048FB0ECFDDDCA
BROM : SLA : Local Auth
BROM : SLA : Starting Auth
BROM : SLA : Auth Passed
BROM : SEC : 0x000000E0
AGENT : 0_base : BASE_v2112 | Manual : Disabled
AGENT : Looking for suitable BootChain in DA...
AGENT : [0656ff20] C:\InfinityBox\CM2MT2\boot\0_base\BASE_v2112\MTK_AllInOne_DA.bin
AGENT : Found MT6768
AGENT : MTK_DOWNLOAD_AGENT
BROM : Sending 1st DA...
BROM : DA sent
BROM : Transfer control to DA...
DA : AGENT started
DA : SYNC
DA : MODE : BROM
DA : EXT_RAM NOT initialized

EMMC: CID: 150100445036384D42027A3DD830C615
EMMC: VEN: Samsung : OEM: 0 : ID: 445036384D42 : PRV: 0x02
EMMC: VEN: Samsung : DP68MB
EMMC: SNN: 2050873392 ( 0x7A3DD830 ) MF: 12/2019

EMI: INFINITY PRELOADER_INFINITY_0 with 1 memory type(s) supported
EMI : Init EMI from INTERNAL DB
EMI : EXT_RAM CFG Passed

DA : BOOT to 2nd DA...
DA : 2ND stage confirmed
DA : SYNC with DA passed
DA : Receiving HW info

SRAM: 0x00070000 [ 448.00 KB ]
DRAM: 0x100000000 [ 4.00 GB ]

EMMC: CID: 150100445036384D42027A3DD830C615
EMMC: VEN: Samsung : OEM: 0 : ID: 445036384D42 : PRV: 0x02
EMMC: VEN: Samsung : DP68MB
EMMC: SNN: 2050873392 ( 0x7A3DD830 ) MF: 12/2019

EMMC:
BOOT1 : 0x00400000 [ 4.00 MB ]
BOOT2 : 0x00400000 [ 4.00 MB ]
RPMB : 0x01000000 [ 16.00 MB ]
USER : 0xE8F800000 [ 58.24 GB ]

CHIP: MT6768 SBID: 0x8A00 HWVR: 0xCA00 SWVR: 0x0001 EVOL: 0x0000 HWC: 0x0707
CODE: Talbot
TYPE: MODERN [RAPHAEL]
RNID: B5D193CD191B5124B74BB547C88EF5D6


DA: USB : HIGH-SPEED

Boot done

Patch Level : QP1A.190711.020
Display ID : QP1A.190711.020 release-keys
Ver. CodeName : REL
Ver. Release : 10
Sec. Patch : 2021-02-05
Build Time : 18.02.2021
CPU : arm64-v8a,armeabi-v7a,armeabi
CPU : armeabi-v7a,armeabi
CPU : arm64-v8a
Product Info : oppo6769
SW : full_oppo6769-user 10 QP1A.190711.020 68b77aba7cb33275 release-keys

Device UID: MT6768__RMX2020_11_A.21_200410_7419c884

USERDATA : FILESYSTEM : EXT4 with FBE ( File-Base Encryption )

Verify device config...
Ok
Process...
Verify loader[83925e56:]...
Ok
NVRAM: OPPO6769_19741_MDBIN_PCB01_MT6768_S00.MOLY_LR12A_R2_TC16_Q_G70_PR1_SP_V1_P54
NVRAM: Items: 0xBF Size: 0x0AD01F
NVRAM: State: Ok
INFO : WiFi MAC: BC2DEF08F4D9
INFO : BlTh MAC: BC2DEF08F4D8

Backup critical data [18] to backup\MT6768__B8881C3F6DAC53E417BF3293D016EA2F\
Done


STORAGE : Life Status : eMMC : OK!
STORAGE : OTP Status : UNLOCKED!
STORAGE : RPMB Status : eMMC : RPMB KEY PROGRAMMED [UNUSABLE]
Scan preloader...
Preloader:
EMI: MT6752 preloader_oppo6769.bin with 13 memory type(s) supported
EMI[00] : eMMC : LP_DDR4X : ID: 150100445636444D42 : Ven: Samsung | Dev: DV6DMB : RAM: [ 4.00 GB ]
EMI[01] : eMMC : LP_DDR4X : ID: 13014E53304A394B39 : Ven: Micron | Dev: S0J9K9 : RAM: [ 4.00 GB ]
EMI[02] : eMMC : LP_DDR4X : ID: 150100444436384D42 : Ven: Samsung | Dev: DD68MB : RAM: [ 3.00 GB ]
EMI[03] : eMMC : LP_DDR4X : ID: 150100444836444142 : Ven: Samsung | Dev: DH6DAB : RAM: [ 4.00 GB ]
EMI[04] : eMMC : LP_DDR4X : ID: 90014A68433861503E : Ven: Hynix | Dev: hC8aP> : RAM: [ 3.00 GB ]
EMI[05] : eMMC : LP_DDR4X : ID: 90014A684339615033 : Ven: Hynix | Dev: hC9aP3 : RAM: [ 4.00 GB ]
EMI[06] : eMMC : LP_DDR4X : ID: 150100445036384D42 : Ven: Samsung | Dev: DP68MB : RAM: [ 3.00 GB ]
EMI[07] : eMMC : LP_DDR4X : ID: 90014A68423861503E : Ven: Hynix | Dev: hB8aP> : RAM: [ 3.00 GB ]
EMI[08] : eMMC : LP_DDR4X : ID: 1501003458364B4D42 : Ven: Samsung | Dev: 4X6KMB : RAM: [ 2.00 GB ]
EMI[09] : eMMC : LP_DDR4X : ID: 450100444134313238 : Ven: Sandisk | Dev: DA4128 : RAM: [ 4.00 GB ]
EMI[0A] : eMMC : LP_DDR4X : ID: 90014A68423861503E : Ven: Hynix | Dev: hB8aP> : RAM: [ 2.00 GB ]
EMI[0B] : eMMC : LP_DDR4X : ID: 150100334836434142 : Ven: Samsung | Dev: 3H6CAB : RAM: [ 6.00 GB ]
EMI[0C] : eMMC : LP_DDR4X : ID: 90014A68433861503E : Ven: Hynix | Dev: hC8aP> : RAM: [ 6.00 GB ]
Preloader exist: C:\InfinityBox\CM2MT2\backup\PRELOADER\preloader_oppo6769.bin
Verify backup\PRELOADER\preloader_oppo6769.bin with uid cacaa303
Exist
Ok

Done
Elapsed: 00:01:22

unlock flash mode

Boot done

[Info]: Unsupported security type in selected mode. Repeat operation in META mode!
INFO: Generating and send report data...
Send report...
Sent

Verify device config...
Ok
Verification Ok

Done
Elapsed: 00:00:45

SP Unlock [ v2.36 ]
Mode : META

Operation : SP Unlock [ v2.36 ]
Mode : META

1. Power Off the device
2. Wait 20 seconds
3. Connect USB cable to device
Waiting for device connection...

PTFN : MediaTek USB Port_V1633 (COM7)
MODE : BOOTROM
PORT : 7
Waiting BOOT ack...
BROM : Skip ACK verify
BROM : Init BROM
BROM init passed
CHIP: MT6768 SBID: 0x8A00 HWVR: 0xCA00 SWVR: 0x0000 EVOL: 0x0000 HWC: 0x0707
CODE: Talbot
TYPE: MODERN [RAPHAEL]

BROM : MEID : B8881C3F6DAC53E417BF3293D016EA2F
BROM : SecLevel : 0x000000E5
BROM : SecMode : SBC+SDA+EXT
BROM : BROM|BL : 0x05|0xFE
BROM : BOOTROM
BROM : SOCID : 86CE9D1CF64C842E6A7B4E920FB77A1C445E79D4289F6CE524048FB0ECFDDDCA
BROM : SLA : Local Auth
BROM : SLA : Starting Auth
BROM : SLA : Auth Passed
BROM : SEC : 0x000000E0
BROM : Configuring target for META

BROM : META configured

INIT: META confirmed

Boot done

AP_CHIP: MT6768
AP_SWTM: Thu Feb 18 12:55:24 CST 2021
AP_SWVR: RMX2020_11_A.59_210218_7b2e9438
MD_CHIP: MT6768
MD_SWVR: OPPO_RM_G70_Q0MP1_K69V1_64_BSP_HW

IMEI[1]: 863651040197168
ID0: Lock : Not Locked | MNC : 0 | CNT : 5 | CODE : 12345678
ID1: Lock : Not Locked | MNC : 0 | CNT : 5 | CODE : 56781234
ID2: Lock : Not Locked | MNC : 0 | CNT : 5 | CODE : 11112222
ID3: Lock : Not Locked | MNC : 0 | CNT : 5 | CODE : 33334444
ID4: Lock : Not Locked | MNC : 0 | CNT : 5 | CODE : 55556666
ID5: Lock : Not Locked | MNC : 0 | CNT : 5 | CODE : 77778888
ID6: Lock : Not Locked | MNC : 0 | CNT : 5 | CODE : 99990000
SPLock Info : Not locked
IMEI[2]: 863651040197168
ID0: Lock : Not Locked | MNC : 0 | CNT : 5 | CODE : 12345678
ID1: Lock : Not Locked | MNC : 0 | CNT : 5 | CODE : 56781234
ID2: Lock : Not Locked | MNC : 0 | CNT : 5 | CODE : 11112222
ID3: Lock : Not Locked | MNC : 0 | CNT : 5 | CODE : 33334444
ID4: Lock : Not Locked | MNC : 0 | CNT : 5 | CODE : 55556666
ID5: Lock : Not Locked | MNC : 0 | CNT : 5 | CODE : 77778888
ID6: Lock : Not Locked | MNC : 0 | CNT : 5 | CODE : 99990000
SPLock Info : Not locked

Verify device config...
Ok
Verification Ok

Done
Elapsed: 00:00:47
 
  • Like
Reactions: Infinity-Box

Habib Tech

Friend's Martview
Sep 11, 2019
145
25
Sudan
Also have Alcatel 9032z locked

here info

Operation : Identify Device [ v2.36 ]

Platform: MTK SmartPhone - MT65/67/68/81/83/87 | Helio G/P/X
Mode : META
[+] SecureData Backup
[+] AutoBoot
[+] Read Deep Info: PRL, HW, DEBUG
[+] FireFly : AutoEMI
[+] FireFly : FireFly UNI-Proto
[+] Smart Service
[-] Local SLA
Wait...

1. Power Off the device
2. Wait 20 seconds
3. Connect USB cable to device
Waiting for device connection...

PTFN : MediaTek USB Port_V1633 (COM7)
MODE : BOOTROM
PORT : 7
Waiting BOOT ack...
BROM : Skip ACK verify
BROM : Init BROM
BROM init passed
CHIP: MT6761 SBID: 0x8A00 HWVR: 0xCA01 SWVR: 0x0200 EVOL: 0x0000 HWC: 0x0717
CODE: Merlot
TYPE: MODERN [RAPHAEL]

BROM : MEID : AFB9CFB2D701EE66A6E9ED13E8CDA740
BROM : SecLevel : 0x000000E7
BROM : SecMode : SBC+SLA+SDA+EXT
BROM : BROM|BL : 0x05|0xFE
BROM : BOOTROM
BROM : SOCID : F924AE7700C9576C09F5AE3C68E9DED18938657F7FEC5199FF1B16318C7AEB3E
BROM : SLA : Local Auth
BROM : SLA : Starting Auth
BROM : FF : Look for EMI
BROM : FF : EMI found
BROM : SLA : Auth Passed
BROM : SEC : 0x000000E0
BROM : Configuring target for META

BROM : META configured

INIT: META confirmed

Boot done

AP_CHIP : MT6761
AP_SWTM : Thu Sep 8 19:09:47 CST 2022
AP_SWVR : alps-mp-q0.mp1-V9.77_tct.tmo.q0mp1.k61v1.64.bsp_P14
MD_CHIP : MT6761
MD_SWTM : 2000.00.00
MD_DSPV : 1.0
MD_DSPP : MOLY.LR12A.R3.TC5.PR2.SP.V2.P9
MD_SWVR : TCT_TMO_Q0MP1_K61V1_64_BSP_HW
MD_HWVR : Unknown

IMEI[1]: 01609500xxxxxxxx
IMEI[2]: 000000000000000
NVRAM saved as: MT6761_1.0_MOLY.LR12A.R3.TC5.PR2.SP.V2.P9_TCT_TMO_Q0MP1_K61V1_64_BSP_HW.bin

Done
Elapsed: 00:01:21
SP Unlock [ v2.36 ]
Operation : SP Unlock [ v2.36 ]
Mode : META

1. Power Off the device
2. Wait 20 seconds
3. Connect USB cable to device
Waiting for device connection...

PTFN : MediaTek USB VCOM (Android) (COM176)
MODE : MTK USB PORT
PORT : 176

Boot done

AP_CHIP: MT6761
AP_SWTM: Thu Sep 8 19:09:47 CST 2022
AP_SWVR: alps-mp-q0.mp1-V9.77_tct.tmo.q0mp1.k61v1.64.bsp_P14
MD_CHIP: MT6761
MD_SWVR: TCT_TMO_Q0MP1_K61V1_64_BSP_HW

IMEI[1]: 016095004xxxxxxx
ID0: Lock : Not Locked | MNC : 0 | CNT : 0 | CODE : 00000000000000000000000000000000
ID1: Lock : Not Locked | MNC : 0 | CNT : 0 | CODE : 00000000000000000000000000000000
ID2: Lock : Locked! | MNC : 256 | CNT : 0 | CODE : 00000000000000000000000000000000
ID3: Lock : Not Locked | MNC : 0 | CNT : 0 | CODE : 97887E79000000000000000000000000
ID4: Lock : Not Locked | MNC : 0 | CNT : 0 | CODE : 00000000000000000000000000000000
ID5: Lock : Not Locked | MNC : 0 | CNT : 0 | CODE : 00000000000000000000000000000000
ID6: Lock : Not Locked | MNC : 0 | CNT : 0 | CODE : 00000000000000000000000000000000
IMEI[2]: 000000000000000
ID0: Lock : Not Locked | MNC : 0 | CNT : 0 | CODE : 00000000000000000000000000000000
ID1: Lock : Not Locked | MNC : 0 | CNT : 0 | CODE : 00000000000000000000000000000000
ID2: Lock : Not Locked | MNC : 0 | CNT : 0 | CODE : 00000000000000000000000000000000
ID3: Lock : Not Locked | MNC : 0 | CNT : 0 | CODE : 97887E79000000000000000000000000
ID4: Lock : Not Locked | MNC : 0 | CNT : 0 | CODE : 00000000000000000000000000000000
ID5: Lock : Not Locked | MNC : 0 | CNT : 0 | CODE : 00000000000000000000000000000000
ID6: Lock : Not Locked | MNC : 0 | CNT : 0 | CODE : 00000000000000000000000000000000

Verify device config...
Ok
Verification Ok

Done
Elapsed: 00:00:25
 
  • Like
Reactions: Infinity-Box

Infinity-Box

Product Supporter
Feb 10, 2019
2,583
544
What is the result with Alcatel 9032z?

oppo: no idea yet, it may be need to flash it with debranded firmware but no any guarantee. checking
 
Top