Device found at COM5 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0699
Get sec config... OK [000000E7]
Active sec flags: [SBC SLA DAA]
Get HW & SW version from device... OK
HW VER: CB00, SW VER: 0002, HW SUB CODE: 8A00
Detect chip [MT6739]
LibUSB installed
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Release testpoint, waiting 2 seconds
Advanced Bypass Security... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1511.0]
Device found at COM5 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0699
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CB00, SW VER: 0002, HW SUB CODE: 8A00
Detect chip [MT6739]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x3C3A5816, 0x9973643D, 0x3DD2E500, 0xFF0050CF
Get Chip ID... [MT6739]
Get SOC ID... [98920C993DC06A907EC46E8104316A07846D49185396A111C2CD6D89E1D38207]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [1]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x150100464536324D4203909XXXXXX
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_CNAME: FE62MB
EMMC_ID : 0x150100464536324D4203909707EE85DB
EMMC_BOOT1: 0x0000400000 (4,00Mb)
EMMC_BOOT2: 0x0000400000 (4,00Mb)
EMMC_RPMB : 0x0000400000 (4,00Mb)
EMMC_USER : 0x03A3E00000 (14,56Gb)
RAM INFO:
INT_SRAM: 0x0000020000 (128,00Kb)
EXT_RAM : 0x0040000000 (1,00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... [EXT4] ... OK
Product Brand : TCL
Product Manufacturer : TCL
Product Model : 5059A
Product Name : 5059A
Product Device : U5A_PLUS_4G
Product Board : MT6739
Board Platform : mt6739
Build ID : O11019
Build Date : Wed Jun 27 11:55:15 CST 2018
Display ID : Nougat
Security Patch : 2018-06-05
Version SDK : 27
Version Release : 8.1.0
Version Codename : REL
Firmware Version : v6J2F-0
Userdata FS Type : F2FS
Read security partition from phone...
Decrypting security data... OK
Encrypt security data... OK
Read OTP... OK
IMEI: 35624107XXXXXXX
Set new IMEI to:
IMEI: 3551820XXXXXXX
Checking OTP status... [STATUS_OTP_LOCKED_TYPE_DISABLE]
Write OTP... OK
Repair Security done!
Selected model: Alcatel 5008R (Alcatel 1X (2019))
Operation: Repair
Software version: 7.1
Work ID: XXXXXX
TODO HECHO CON PANDORA.
Open port... OK
Send start cmd... OK
Get HW code from device... 0699
Get sec config... OK [000000E7]
Active sec flags: [SBC SLA DAA]
Get HW & SW version from device... OK
HW VER: CB00, SW VER: 0002, HW SUB CODE: 8A00
Detect chip [MT6739]
LibUSB installed
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Release testpoint, waiting 2 seconds
Advanced Bypass Security... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1511.0]
Device found at COM5 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0699
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CB00, SW VER: 0002, HW SUB CODE: 8A00
Detect chip [MT6739]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x3C3A5816, 0x9973643D, 0x3DD2E500, 0xFF0050CF
Get Chip ID... [MT6739]
Get SOC ID... [98920C993DC06A907EC46E8104316A07846D49185396A111C2CD6D89E1D38207]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [1]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x150100464536324D4203909XXXXXX
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_CNAME: FE62MB
EMMC_ID : 0x150100464536324D4203909707EE85DB
EMMC_BOOT1: 0x0000400000 (4,00Mb)
EMMC_BOOT2: 0x0000400000 (4,00Mb)
EMMC_RPMB : 0x0000400000 (4,00Mb)
EMMC_USER : 0x03A3E00000 (14,56Gb)
RAM INFO:
INT_SRAM: 0x0000020000 (128,00Kb)
EXT_RAM : 0x0040000000 (1,00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... [EXT4] ... OK
Product Brand : TCL
Product Manufacturer : TCL
Product Model : 5059A
Product Name : 5059A
Product Device : U5A_PLUS_4G
Product Board : MT6739
Board Platform : mt6739
Build ID : O11019
Build Date : Wed Jun 27 11:55:15 CST 2018
Display ID : Nougat
Security Patch : 2018-06-05
Version SDK : 27
Version Release : 8.1.0
Version Codename : REL
Firmware Version : v6J2F-0
Userdata FS Type : F2FS
Read security partition from phone...
Decrypting security data... OK
Encrypt security data... OK
Read OTP... OK
IMEI: 35624107XXXXXXX
Set new IMEI to:
IMEI: 3551820XXXXXXX
Checking OTP status... [STATUS_OTP_LOCKED_TYPE_DISABLE]
Write OTP... OK
Repair Security done!
Selected model: Alcatel 5008R (Alcatel 1X (2019))
Operation: Repair
Software version: 7.1
Work ID: XXXXXX
TODO HECHO CON PANDORA.