|
Welcome to the GSM-Forum forums. You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. Only registered members may post questions, contact other members or search our database of over 8 million posts. Registration is fast, simple and absolutely free so please - Click to REGISTER! If you have any problems with the registration process or your account login, please contact contact us . |
|
Register | FAQ | Donate | Forum Rules | Root any Device | ★iPhone Unlock★ | ★ Direct Codes ★ | Direct Unlock Source |
| LinkBack | Thread Tools | Display Modes |
03-17-2023, 07:41 | #1 (permalink) |
No Life Poster Join Date: Aug 2007 Location: earth
Posts: 901
Member: 570373 Status: Offline Thanks Meter: 236 | realme c15 imei repair ok hydra tool Oppo Flash Mode Searching for MTK Device...Found MTK Port Type : Flashmode BROM FriendlyName : MTK USB Port (COM10) Device : VID_0E8D&PID_0003/5&136f0554&0&2 SymbolicName : \??\USB#VID_0E8D&PID_0003#5&136f0554&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver : 02/07/2018,2.0.0.6 ;DriverVer=mm/dd/yyyy,w.x.y.z Service : usbser Openning Port [COM10] Ok Handshaking...Ok HwCode : 0766 {MT6765/MT8768t} Hwver : 0000 Target config : E5 SBC : 01 (True) SLA : 00 (False) DAA : 04 (True) SWJTAG : 04 (True) EPP : 00 (False) CERT : 00 (False) MEMREAD : 20 (True) MEMWRITE : 40 (True) CMD_C8 : 80 (True) Connection : BROM HW Subcode : 8A00 HW Subcode : CA00 SW Ver : 0000 ME_ID : 22D47D01C3EE64427046E0ACA7BB08DA SOC_ID : 8B6F26BF9A631394E22A5CEC332686D3480814B969646714CE C723AD9BDC8E6D Exploiting Device... Successfully Exploited.. Handshaking...Ok Dumping Preloader from Bootrom.. Seeking preloader address..Found @ 0x00200BC4 Starting to dump... Prel Size : 0x0003F03C Successfully dump preloader.. [C:\Hydra Tool\Boot\PreloaderDump\preloader_oppo6765.bin] Target config : 00 SBC : 00 (False) SLA : 00 (False) DAA : 00 (False) SWJTAG : 00 (False) EPP : 00 (False) CERT : 00 (False) MEMREAD : 00 (False) MEMWRITE : 00 (False) CMD_C8 : 00 (False) Connection : BROM Download Agent... DA :MTK_AllInOne_DA_5.2152.bin Patching da2 ... Ok Uploading data Successfully uploaded stage 1, jumping .. Executing JUMP Da Command... Jumping to 0x00200000 Ok Successfully received DA sync ONNECTION_AGENT : brom DRAM config needed for : 1501004448364441 Sending emi data.. [DRAM setup passed.] Sending emi data succeeded. Uploading stage 2... Upload data was accepted. Jumping to stage 2... Successfully uploaded stage 2 ERAM Size : 0x000000000003A000-232 KB IRAM Size : 0x0000000100000000-4 GB EMMC Boot1 Size : 0x0000000000400000-4 MB EMMC Boot2 Size : 0x0000000000400000-4 MB EMMC RPMB Size : 0x0000000001000000-16 MB EMMC USER Size : 0x0000000E8F800000-58.242 GB EMMC CID : 15010044483644414208FC14DC60380B - DH6DAB HW-CODE : 0x766 HWSUB-CODE : 0x8A00 HW-VERSION : 0xCA00 SW-VERSION : 0x0 CHIP-EVOLUTION : 0x0 DA-VERSION : 1.0 Speed : high-speed Upload data was accepted. Jumping to stage 2... DA Extensions successfully added Reading Partition Table .. Partition Count : 49 --------------- Reading build.prop content --------------- Brand : alps Vendor : alps Model : oplus_mssi_64_cn Product : oplus_mssi_64_cn Manufacturer : alps ID : RP1A.200720.011 SDK : 30 Release : 11 ABI : arm64-v8a CPU abilist : arm64-v8a,armeabi-v7a,armeabi Locale : en-US Description : sys_oplus_mssi_64_cn-user 11 RP1A.200720.011 1609743540423 release-keys Display ID : RP1A.200720.011 release-keys Security Patch : 2022-07-05 StorageType : mtp --------------- end of build.prop content --------------- Reading IMEI........ ------------------------------- Bootloader Status... Bootloader : Locked ------------------------------- Backing up Security.. - preloader(preloader.bin), 512 KB = Ok [preloader_oppo6765.bin] *Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0766_22D47D01C3EE64427046E0ACA 7BB08DA\Auto\031023162057\6765_Android_scatter.txt - pgpt(pgpt.bin), 32 KB = Ok - nvram(nvram.bin), 64 MB = Ok - nvdata(nvdata.bin), 64 MB = Ok - frp(frp.bin), 1024 KB = Ok - protect1(protect1.bin), 8 MB = Ok - protect2(protect2.bin), 15.867 MB = Ok - persist(persist.bin), 48 MB = Ok - proinfo(proinfo.bin), 3 MB = Ok - oppo_custom(oppo_custom.bin), 1024 KB = Ok - opporeserve1(opporeserve1.bin), 8 MB = Ok - opporeserve2(opporeserve2.bin), 128 MB = Ok - nvcfg(nvcfg.bin), 32 MB = Ok - sec1(sec1.bin), 2 MB = Ok - seccfg(seccfg.bin), 8 MB = Ok Backup Done!!! --------------------------- Oppo Method 2 --------------------------- Backing up Security.. - boot Ok - nvram Ok - nvdata Ok - vbmeta Ok - seccfg Ok - md1img Ok Writing certificate and IMEI.. Please wait... Step 1 Ok Step 2 Ok Step 3 Ok Step 4 Ok Step 5 Ok Writing IMEI Done!!! Reading IMEI........ IMEI1 : 864477 IMEI2 : 86447 Rebooting Device... Reboot Option : RebootToNormal Rebooting Operation Done!!!! Elapsed Time : 00:02:08 |
The Following 3 Users Say Thank You to naizer For This Useful Post: |
Bookmarks |
| |
|