GSM Shop GSM Shop
GSM-Forum  

Welcome to the GSM-Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features.
Only registered members may post questions, contact other members or search our database of over 8 million posts.

Registration is fast, simple and absolutely free so please - Click to REGISTER!

If you have any problems with the registration process or your account login, please contact contact us .

Go Back   GSM-Forum > Product Support Sections > No More Supported Solutions (Dead Products) > Aqua Dongle


 
 
LinkBack Thread Tools Display Modes
Old 06-26-2022, 15:16   #1 (permalink)
No Life Poster
 
Join Date: Jan 2010
Location: izmir
Posts: 840
Member: 1210902
Status: Offline
Thanks Meter: 231
Talking VİVO y15 1901 new securıty patch read fw perfect


17:06:21 - Hint : How to Connect ?

17:06:21 - Brom Mode : Press Vol and Connect Usb Cable
17:06:21 - Preloader Mode : Connect Usb Cable to Powered off Phone..

17:06:21 - Waiting for Device Interface..
17:06:26 - Device Found : \\?\usb#vid_0e8d&pid_2000#5&2d3a3f9d&0&7#
17:06:26 - Mode : [Preloader] COM4 - MediaTek PreLoader USB VCOM_V1632 (Android) (COM4)

17:06:26 - Drivers : MediaTek Inc.,usb2ser.sys [1-22-2015] [3.0.1504.0]
17:06:27 - Checking Device Interface..
17:06:27 - Device Ack Found..

17:06:28 - Chip : MT6765 [Helio P35/G35]

17:06:28 - HW ID : [FD07660000] [8A00-CA00-0000] [00000005]

17:06:28 - Secure Boot Device : True
17:06:28 - SL Authorization : False
17:06:28 - DA Authorization : True

17:06:28 - [SwJtag : True] [EPP : False] [Root Cert : False]
17:06:28 - [M_Read Auth : False] [M_Write Auth : False] [Cmd_C8 : False]

17:06:28 - BL Version : 03 [03]

17:06:28 - Mediatek Download Agent Information..
17:06:28 - Sign : MTK_DOWNLOAD_AGENT
17:06:28 - ID : MTK_AllInOne_DA_v3.3001.2018/03/20.21:08_402229+403250

17:06:28 - Sending Boot [Auth]..
17:06:28 - Sending Boot [PL]..

17:06:32 - EMMC ID :
17:06:32 - EMMC CID : 00000000000000000000000000000000
17:06:32 - EMMC Boot1 Size : bytes
17:06:32 - EMMC Boot2 Size : bytes
17:06:32 - EMMC RPMB Size : bytes
17:06:32 - EMMC USER Size : bytes

17:06:32 - Sending Boot [DA]..

17:06:37 - Reading Partition Table..
17:06:37 - Memory Type : eMMC
17:06:37 - Partition Count : 40
17:06:37 - Userdata : 58,18 GB

17:06:37 - Reading Device Information...
17:06:37 - Model : k62v1_64_bsp
17:06:37 - Vivo Os : Funtouch OS_9
17:06:37 - Android Version : 11
17:06:37 - Build Id : RP1A.200720.012
17:06:37 - Fw Code : REL
17:06:37 - Fv : full_k62v1_64_bsp-user
17:06:37 - Fw Desc. : full_k62v1_64_bsp-user 11 RP1A.200720.012 eng.compil.20220218.164640 release-keys
17:06:37 - Id : RP1A.200720.012 release-keys [Fri Feb 18 16:42:47 CST 2022]
17:06:38 - Platform : MTK6765
17:06:38 - Internation : yes
17:06:38 - Security Patch Level : 2022-02-01

17:06:38 - Reading Partition : BOOT_PARA -> boot_para.img
17:06:39 - Reading Partition : RECOVERY -> recovery.img
17:06:42 - Reading Partition : PARA -> para.img
17:06:43 - Reading Partition : EXPDB -> expdb.img
17:06:45 - Reading Partition : FRP -> frp.bin
17:06:46 - Reading Partition : NVCFG -> nvcfg.img
17:06:48 - Reading Partition : NVDATA -> nvdata.img
17:06:52 - Reading Partition : BACKUP -> backup.img
17:06:53 - Reading Partition : SURVIVAL -> survival.img
17:06:56 - Reading Partition : RESERVED -> reserved.img
17:06:58 - Reading Partition : CUST -> cust.img
17:07:01 - Reading Partition : METADATA -> metadata.img
17:07:03 - Reading Partition : PROTECT1 -> protect1.img
17:07:05 - Reading Partition : PROTECT2 -> protect2.img
17:07:06 - Reading Partition : SECCFG -> seccfg.img
17:07:08 - Reading Partition : PERSIST -> persist.img
17:07:11 - Reading Partition : SEC1 -> sec1.img
17:07:12 - Reading Partition : PROINFO -> proinfo.img
17:07:13 - Reading Partition : EFUSE -> efuse.img
17:07:14 - Reading Partition : MD1IMG -> md1img.img
17:07:18 - Reading Partition : SPMFW -> spmfw.img
17:07:19 - Reading Partition : SCP1 -> scp1.img
17:07:21 - Reading Partition : SCP2 -> scp2.img
17:07:22 - Reading Partition : SSPM_1 -> sspm_1.img
17:07:23 - Reading Partition : SSPM_2 -> sspm_2.img
17:07:24 - Reading Partition : GZ1 -> gz1.img
17:07:26 - Reading Partition : GZ2 -> gz2.img
17:07:27 - Reading Partition : NVRAM -> nvram.img
17:07:31 - Reading Partition : LK -> lk.img
17:07:32 - Reading Partition : LK2 -> lk2.img
17:07:33 - Reading Partition : BOOT -> boot.img
17:07:37 - Reading Partition : LOGO -> logo.bin
17:07:38 - Reading Partition : DTBO -> dtbo.img
17:07:39 - Reading Partition : TEE1 -> tee1.img
17:07:41 - Reading Partition : TEE2 -> tee2.img
17:07:42 - Reading Partition : VENDOR -> vendor.img
17:08:21 - Rebooting Device..
17:08:21 - Finished!

select manual da and aut files and untick disable auth dump preloader first.
 
The Following User Says Thank You to master353535 For This Useful Post:
 

Bookmarks


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


 



All times are GMT +1. The time now is 14:05.



Powered by Searchlight © 2024 Axivo Inc.
vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2024 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2023 -
Page generated in 0.15942 seconds with 9 queries

SEO by vBSEO