• Register

User Dimidrolus

Member for: 2 years (since Jan 5, 2020)
Type: Moderator
Extra privileges: Recategorizing any question
Editing any question
Editing any answer
Editing any comment
Editing posts silently
Closing any question
Selecting answer for any question
Viewing IPs of anonymous posts
Viewing who voted or flagged posts
Approving or rejecting posts
Hiding or showing any post
Deleting hidden posts
Viewing the newest users page
Viewing the special users page
Full name: Dima
Location: Ukraine

Activity by Dimidrolus

Score: 135,760 points (ranked #1)
Questions: 0
Answers: 2,250 (135 chosen as best)
Comments: 873
Voted on: 2 questions, 11 answers
Gave out: 13 up votes, 0 down votes
Received: 276 up votes, 25 down votes

Wall for Dimidrolus

Please log in or register to post on this wall.
please help
Exception: Access violation at address 014E4F4D in module 'SamsungToolPRO.exe'. Read of address 2B357D93
Done with Samsung Tool PRO v.44.13 [SM-G532F,Patch Certificate]
4 days ago by Hakam hamze
Exception: Access violation at address 014E4F4D in module 'SamsungToolPRO.exe'. Read of address 2B357D93
Done with Samsung Tool PRO v.44.13 [SM-G532F,Patch Certificate]
4 days ago by Hakam hamze
hi Dimidrolus
i got problem with executing 6 2.7.9 N970F .. Could you please help ..details :
Operation: Repair
Selected model: SM-N970F
Software version: 44.11

Waiting ADB device... OK
Reading phone info...
Model: SM-N970F
Android version: 11
PDA version: N970FXXS7FUL1
CSC version: N970FOWA7FUH3
Phone version: N970FXXS7FUI5
Product code: SM-N970XZKACHL
CSC country code: Chile
CSC sales code: CHL
Phone SN: R58M78P1AFL
IMEI: 000000000000000
HW version: REV0.6
RF cal date: 20190730
Chip name: EXYNOS9825
Modem board: SHANNON5000
Security patch: 2021-12-01
Boot Warranty bit: 1
SIM State: ABSENT,ABSENT
Checking Super user right... true
Root version: 25.1:MAGISKSU
Checking data... OK
Searching server... OK
Checking server answer... OK
Data preparation... OK
Initialization zTool... OK
Running zTool, please wait... OK
Executing 1st step...error (6 2.7.9)
Rebooting phone... OK
Aug 10 by minhnguyebn120888
hola bro nada me reintegraron 5 y el proceso lo realize doble
Jul 9 by dnltallon
I sent you dumb partition link in private and screenshot lock in Question
May 30 by ImmensiTech
I post screenshots on ask question
May 29 by ImmensiTech
How that i have to wait for many days to fix the software, when i tried unlock tcl 6125f tcl 20e tool keep freezing,and admin can't talk to me
May 28 by ImmensiTech
Why you don't answer me in private? The update was fake?
May 28 by ImmensiTech
tcl 20e 6125f not unlock
Selected model: Alcatel 6125F (Alcatel TCL20E)
Operation: Unlock network
Software version: 3.5

Host Power Off... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Connect phone to BOX in BROM mode
Wait for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0766
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Get sec config... OK [000000E7]
Active sec flags: [SBC SLA DAA]
Advanced Bypass Security... OK
Disconnect virtual port... OK
Connect Type-C to HUB... OK
Wait for device connecting... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM116 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID =  0xBD1B9FBD, 0x01190BEC, 0x8BA702F8, 0xAA8D93A1
Get Chip ID... [MT6765]
Get SOC ID... [F904ECE5F4234CC684DE29997C050FE97933A2A46F8AA84AF3CDD374FDC717D5]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [7]
Send preloader... OK
Start preloader... OK
Check preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0xF40122426977696E201042C6CCEAC87D
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
   EMMC_ID   : 0xF40122426977696E201042C6CCEAC87D
   EMMC_BOOT1: 0x0000400000 (4.00Mb)
   EMMC_BOOT2: 0x0000400000 (4.00Mb)
   EMMC_RPMB : 0x0000400000 (4.00Mb)
   EMMC_USER : 0x0E6A000000 (57.66Gb)
RAM INFO:
   INT_SRAM: 0x000003A000 (232.00Kb)
   EXT_RAM : 0x0100000000 (4.00Gb)
Check USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Check A/B state... OK [A]
Read product info... OK
Product Manufacturer : TCL
Product Board        : hongkong
Board Platform       : MT6765
Build ID             : RP1A.200720.011
Build Date           : Mon Sep  6 17:59:13 CST 2021
Display ID           : RP1A.200720.011 release-keys
Security Patch       : 2021-09-05
Version SDK          : 30
Version Release      : 11
Version Codename     : REL
Firmware Version     : 9MBA
Read security partition from phone... OK
Read security files... OK
Read security files... OK
Read lock info... OK
Read OTP... OK
Unlock... OK [DF1, DF2]
Write lock info... OK
Write security partition to phone... OK
Network Unlock done!
Selected model: Alcatel 6125F (Alcatel TCL20E)
Operation: Unlock network
Software version: 3.5

Host Power Off... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Connect phone to BOX in BROM mode
Wait for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0766
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Get sec config... OK [000000E7]
Active sec flags: [SBC SLA DAA]
Advanced Bypass Security... OK
Disconnect virtual port... OK
Connect Type-C to HUB... OK
Wait for device connecting... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM116 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID =  0xBD1B9FBD, 0x01190BEC, 0x8BA702F8, 0xAA8D93A1
Get Chip ID... [MT6765]
Get SOC ID... [F904ECE5F4234CC684DE29997C050FE97933A2A46F8AA84AF3CDD374FDC717D5]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [7]
Send preloader... OK
Start preloader... OK
Check preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0xF40122426977696E201042C6CCEAC87D
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
   EMMC_ID   : 0xF40122426977696E201042C6CCEAC87D
   EMMC_BOOT1: 0x0000400000 (4.00Mb)
   EMMC_BOOT2: 0x0000400000 (4.00Mb)
   EMMC_RPMB : 0x0000400000 (4.00Mb)
   EMMC_USER : 0x0E6A000000 (57.66Gb)
RAM INFO:
   INT_SRAM: 0x000003A000 (232.00Kb)
   EXT_RAM : 0x0100000000 (4.00Gb)
Check USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Check A/B state... OK [A]
Read product info... OK
Product Manufacturer : TCL
Product Board        : hongkong
Board Platform       : MT6765
Build ID             : RP1A.200720.011
Build Date           : Mon Sep  6 17:59:13 CST 2021
Display ID           : RP1A.200720.011 release-keys
Security Patch       : 2021-09-05
Version SDK          : 30
Version Release      : 11
Version Codename     : REL
Firmware Version     : 9MBA
Read security partition from phone... OK
Read security files... OK
Read security files... OK
Read lock info... OK
Read OTP... OK
Unlock... OK [DF1, DF2]
Write lock info... OK
Write security partition to phone... OK
Network Unlock done!
May 26 by ImmensiTech
Hello I want to update the box
May 6 by zikougsmsat
...