• Register
0 votes

[06-14-2022 23:54:04] Selected model: Alcatel 9032T (3T8)
[06-14-2022 23:54:04] Operation: Unlock network
[06-14-2022 23:54:04] Software version: 3.6
[06-14-2022 23:54:04]
[06-14-2022 23:54:04] Host Power Off... OK
[06-14-2022 23:54:04] Switch virtual port to USB... OK
[06-14-2022 23:54:04] Connect Type-C to BOX... OK
[06-14-2022 23:54:04] Host Power On... OK
[06-14-2022 23:54:04] Connect phone to BOX in BROM mode
[06-14-2022 23:54:04] Wait for device... OK
[06-14-2022 23:54:11] Read usbhost speed... HIGH
[06-14-2022 23:54:11] Read Device Descriptor...
[06-14-2022 23:54:11] Get VID/PID...0E8D/0003
[06-14-2022 23:54:11] Send start cmd... OK
[06-14-2022 23:54:11] Get HW code from device... 0717
[06-14-2022 23:54:11] Get HW & SW version from device... OK
[06-14-2022 23:54:11] HW VER: CA01, SW VER: 0200, HW SUB CODE: 8A00
[06-14-2022 23:54:11] Detect chip [MT6761]
[06-14-2022 23:54:11] Get sec config... OK [000000E7]
[06-14-2022 23:54:11] Active sec flags: [SBC SLA DAA]
[06-14-2022 23:54:11] Advanced Bypass Security... OK
[06-14-2022 23:54:12] Disconnect virtual port... OK
[06-14-2022 23:54:12] Connect Type-C to HUB... OK
[06-14-2022 23:54:12] Wait for device connecting... OK
[06-14-2022 23:54:13] Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
[06-14-2022 23:54:13] Device found at COM145 [BROM]
[06-14-2022 23:54:13] Open port... OK
[06-14-2022 23:54:13] Send start cmd... OK
[06-14-2022 23:54:13] Get HW code from device... 0717
[06-14-2022 23:54:13] Get HW & SW version from device... OK
[06-14-2022 23:54:13] HW VER: CA01, SW VER: 0200, HW SUB CODE: 8A00
[06-14-2022 23:54:13] Detect chip [MT6761]
[06-14-2022 23:54:13] Library Version [2]
[06-14-2022 23:54:13] Select platform... OK
[06-14-2022 23:54:13] Init BROM... OK
[06-14-2022 23:54:13] Force Charge... OK
[06-14-2022 23:54:13] Disable WatchDog Timer... OK
[06-14-2022 23:54:13] Reopen port for libver2... OK
[06-14-2022 23:54:13] Get ME ID... OK
[06-14-2022 23:54:13] ME_ID = 0x0AA1C58D, 0x3A9B6B80, 0x50A24C1A, 0xE86E2D12
[06-14-2022 23:54:13] Get Chip ID... [MT6761]
[06-14-2022 23:54:13] Get SOC ID... [BCEDD4A9B948F7B89DE16BFD9870F2BFEDD0C6FD4D7981E1F6CCFB4F94CF1D08]
[06-14-2022 23:54:13] Get sec config... OK [000000E0]
[06-14-2022 23:54:13] Load DownloadAgent... OK
[06-14-2022 23:54:13] Search DA... OK [5]
[06-14-2022 23:54:13] Send preloader... OK
[06-14-2022 23:54:13] Start preloader... OK
[06-14-2022 23:54:13] Check preloader answer... OK
[06-14-2022 23:54:15] Send bootloader... OK
[06-14-2022 23:54:16] Start bootloader... OK
[06-14-2022 23:54:16] Wait for answer from bootloader... OK
[06-14-2022 23:54:16] Send SYNC signal... OK
[06-14-2022 23:54:16] Setup device enviroment... OK
[06-14-2022 23:54:16] Setup device parametres... OK
[06-14-2022 23:54:16] Receive DA SYNC signal... OK
[06-14-2022 23:54:17] Set DA parametres... OK
[06-14-2022 23:54:17] Get device connection agent... [BROM]
[06-14-2022 23:54:17] Get device info... OK
[06-14-2022 23:54:17] EMMC_ID: 0x150100445836384D4209A030D043B77F
[06-14-2022 23:54:17] Load EMI from phone... OK
[06-14-2022 23:54:17] Parse EMI config... OK
[06-14-2022 23:54:17] Init EXT RAM... OK
[06-14-2022 23:54:18] Send 2nd DA... OK
[06-14-2022 23:54:20] Get device info... OK
[06-14-2022 23:54:20] EMMC INFO:
[06-14-2022 23:54:20] EMMC_ID : 0x150100445836384D4209A030D043B77F
[06-14-2022 23:54:20] EMMC_BOOT1: 0x0000400000 (4.00Mb)
[06-14-2022 23:54:20] EMMC_BOOT2: 0x0000400000 (4.00Mb)
[06-14-2022 23:54:20] EMMC_RPMB : 0x0000400000 (4.00Mb)
[06-14-2022 23:54:20] EMMC_USER : 0x0747C00000 (29.12Gb)
[06-14-2022 23:54:20] RAM INFO:
[06-14-2022 23:54:20] INT_SRAM: 0x000003A500 (233.25Kb)
[06-14-2022 23:54:20] EXT_RAM : 0x00C0000000 (3.00Gb)
[06-14-2022 23:54:20] Check USB status... USB_HIGH_SPEED
[06-14-2022 23:54:20] Read partitions info from phone... OK
[06-14-2022 23:54:20] Check A/B state... OK
[06-14-2022 23:54:20] Read product info... OK
[06-14-2022 23:54:21] Product Brand : Alcatel
[06-14-2022 23:54:21] Product Manufacturer : TCL
[06-14-2022 23:54:21] Product Model : 9032Z

[06-14-2022 23:54:21] Product Name : 9032Z
[06-14-2022 23:54:21] Product Device : Apollo_8_4G_TMO
[06-14-2022 23:54:21] Product Board : apollo84gtmo
[06-14-2022 23:54:21] Board Platform : MT6761
[06-14-2022 23:54:21] Build ID : QP1A.190711.020
[06-14-2022 23:54:21] Build Date : Thu Apr 28 22:03:08 CST 2022
[06-14-2022 23:54:21] Display ID : QP1A.190711.020 release-keys
[06-14-2022 23:54:21] Security Patch : 2022-04-05
[06-14-2022 23:54:21] Version SDK : 29
[06-14-2022 23:54:21] Version Release : 10
[06-14-2022 23:54:21] Version Codename : REL
[06-14-2022 23:54:21] Firmware Version : v1C6X-0
[06-14-2022 23:54:21] Read security partition from phone... OK
[06-14-2022 23:54:25] Read security files... OK
[06-14-2022 23:54:25] Read security files... OK
[06-14-2022 23:54:25] Read lock info... OK
[06-14-2022 23:54:26] Read OTP... OK
[06-14-2022 23:54:28] Unlock... OK [DF1, DF2, SM]
[06-14-2022 23:54:28] Write lock info... OK
[06-14-2022 23:54:29] Write security partition to phone... OK
[06-14-2022 23:54:35] Network Unlock done!
in General questions by (320 points)

1 Answer

0 votes
Try with 3.7 and post result.
by (133k points)
Host Power Off... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Connect phone to BOX in BROM mode
Wait for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0717
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0200, HW SUB CODE: 8A00
Detect chip [MT6761]
Get sec config... OK [000000E7]
Active sec flags: [SBC SLA DAA]
Advanced Bypass Security... OK
Disconnect virtual port... OK
Connect Type-C to HUB... OK
Wait for device connecting... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM31 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0717
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0200, HW SUB CODE: 8A00
Detect chip [MT6761]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID =  0x9B7C7F89, 0x1F9B364D, 0xBA0C6ED6, 0x40878FB1
Get Chip ID... [MT6761]
Get SOC ID... [4657BE6BFA24C3244EA11EBBB2FEB1D3542FDF216A57ECA3FA2C2D8DEABF66C9]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [5]
Send preloader... OK
Start preloader... OK
Check preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x150100445836384D4209FB42D06BA813
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
   EMMC_ID   : 0x150100445836384D4209FB42D06BA813
   EMMC_BOOT1: 0x0000400000 (4.00Mb)
   EMMC_BOOT2: 0x0000400000 (4.00Mb)
   EMMC_RPMB : 0x0000400000 (4.00Mb)
   EMMC_USER : 0x0747C00000 (29.12Gb)
RAM INFO:
   INT_SRAM: 0x000003A500 (233.25Kb)
   EXT_RAM : 0x00C0000000 (3.00Gb)
Check USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Check A/B state... OK
Read product info... OK
Product Brand        : Alcatel
Product Manufacturer : TCL
Product Model        : 9032Z
Product Name         : 9032Z
Product Device       : Apollo_8_4G_TMO
Product Board        : apollo84gtmo
Board Platform       : MT6761
Build ID             : QP1A.190711.020
Build Date           : Fri Jan 21 21:32:34 CST 2022
Display ID           : QP1A.190711.020 release-keys
Security Patch       : 2022-01-05
Version SDK          : 29
Version Release      : 10
Version Codename     : REL
Firmware Version     : v1C6M-0
Read security partition from phone... OK
Read security files... OK
Read security files... OK
Read lock info... OK
Read OTP... OK
Unlock... OK [DF1, DF2, SM]
Write lock info... OK
Write security partition to phone... OK
Network Unlock done!
All ok now?
No, phone still asking for code
You told me, try with 9032t and send you log and dump file
...