GSM Shop GSM Shop
GSM-Forum  

Welcome to the GSM-Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features.
Only registered members may post questions, contact other members or search our database of over 8 million posts.

Registration is fast, simple and absolutely free so please - Click to REGISTER!

If you have any problems with the registration process or your account login, please contact contact us .

Go Back   GSM-Forum > Product Support Sections > Hard/Software Products (official support) > Pandora’s box

Reply
 
LinkBack Thread Tools Display Modes
Old 02-27-2024, 21:33   #481 (permalink)
Freak Poster
 
Join Date: Mar 2020
Location: bolivia
Posts: 292
Member: 2951556
Status: Offline
Thanks Meter: 313

Selected model: Tecno BF6 (Tecno Pop 7)
Operation: Erase FRP
Software version: 6.3

Host Power Off... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Host Power On... OK
Connect phone to [BOX or PC]
Connect phone in BROM mode. Use volume key buttons or testpoint.
Waiting for device... OK
Device found at COM30
Port: USB\VID_1782&PID_4D00\6&17B2F180&0&2
Driver: [UNISOC Communications Inc.,sprdvcom,SPRD U2S Diag,sprdvcom.sys,4.19.38.134]
Port type: BROM
Connecting to device... OK
Selected processor: SC9863A_64
Load files... (universal) OK
Connect preloader 1... OK
Connect preloader 2... OK
Connect loader 1... OK
Connect loader 2... OK
Serial Number: 097121535C005921
Read partitions info... OK
Checking A/B state... OK [B]
Read product info... [EROFS] ... OK
Product Brand : TECNO
Product Manufacturer : TECNO
Product Model : TECNO BF6
Product Name : BF6-OP
Product Device : TECNO-BF6
Product Board : BF6
Board Platform : sp9863a
Build ID : SP1A.210812.001
Build Date : Thu Oct 12 19:00:45 CST 2023
Display ID : BF6-SE668SABCDE-SGo-OP-231012V709
Security Patch : 2023-10-05
Version SDK : 31
Version Release : 12
Version Codename : REL
Firmware Version : 231012V709
Userdata FS Type : F2FS
Backup partitions... OK
Formatting "persist" partition... OK
Done!
  Reply With Quote
Old 02-27-2024, 21:42   #482 (permalink)
Freak Poster
 
Join Date: Mar 2020
Location: bolivia
Posts: 292
Member: 2951556
Status: Offline
Thanks Meter: 313
Selected model: Xiaomi Redmi 9 (Lancelot)
Operation: Eliminar FRP
Software version: 6.3

Host Power Off... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Host Power On... OK
Connect phone to [BOX] in BROM/PRELOADER Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1632,usb2ser.sys,3.0.1504.0]
Device found at COM51 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0707
Get sec config... OK [000000E7]
Active sec flags: [SBC SLA DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6768]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Force switch to BROM... OK
Host Power Off... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Waiting for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0707
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6768]
Get sec config... OK [000000E7]
Active sec flags: [SBC SLA DAA]
Release testpoint
Advanced Bypass Security... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1632,usb2ser.sys,3.0.1504.0]
Device found at COM51 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0707
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6768]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x3469DE77, 0x6F98CB9B, 0x7A39DF8F, 0x272757EA
Get Chip ID... [MT6768]
Get SOC ID... [B093360C6708843FADF819C6EC8DB8F9F02EDD58666F6EEDB3 8BFBC5F2FD22E6]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [8]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x15010044503644414203E80F9AFE573B
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_CNAME: DP6DAB
EMMC_ID : 0x15010044503644414203E80F9AFE573B
EMMC_BOOT1: 0x0000400000 (4,00Mb)
EMMC_BOOT2: 0x0000400000 (4,00Mb)
EMMC_RPMB : 0x0001000000 (16,00Mb)
EMMC_USER : 0x0E8F800000 (58,24Gb)
RAM INFO:
INT_SRAM: 0x0000070000 (448,00Kb)
EXT_RAM : 0x0100000000 (4,00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... [EXT4] ... OK
Product Brand : Redmi
Product Manufacturer : Xiaomi
Product Model : lancelot
Product Name : lancelot
Product Device : lancelot
Product Board : lancelot
Board Platform : mt6768
Build ID : SP1A.210812.016
Build Date : Tue Nov 15 11:38:52 CST 2022
Display ID : SP1A.210812.016
Security Patch : 2022-10-01
Version SDK : 31
Version Release : 12
Version Codename : REL
Firmware Version : V13.0.2.0.SJCMIXM
Userdata FS Type : EXT4
Read partition "frp"... OK
Backup saved to C:/Program%20Files%20(x86)/Z3X/Pandora/Backup/MTK/Xiaomi_Redmi%209%20(Lancelot)/FRP_BACKUP_(2024-2-27_16-30-11)/
Writting FRP data... OK
Erase FRP done!
  Reply With Quote
Old 02-28-2024, 15:22   #483 (permalink)
No Life Poster
 
el-polaco's Avatar
 
Join Date: Jun 2009
Location: SouthAmericaUnlockers
Age: 52
Posts: 2,641
Member: 1057178
Status: Offline
Sonork: Kfe~Labs Co.-
Thanks Meter: 569
e6 plus FRP Done

Selected model: Motorola XT2025 (Motorola E6 Plus)
Operation: Erase FRP
Software version: 6.3
Work ID: 20822268

Connect phone in BROM Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1632,usb2ser.sys,3.0.1504.0]
Device found at COM4 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
LibUSB installed
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Release testpoint, waiting 2 seconds
Advanced Bypass Security... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1632,usb2ser.sys,3.0.1504.0]
Device found at COM4 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x9B5E6512, 0x36BD7CD1, 0xE8C68EBB, 0xC97BD927
Get Chip ID... [MT6765]
Get SOC ID... [31D3EE313F4951D1627BB5D6EA51A91BBC8017F7E52F6A16E7 6CE5E916BE5E38]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [7]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x150100514436334D4201F14996E396DB
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_CNAME: QD63MB
EMMC_ID : 0x150100514436334D4201F14996E396DB
EMMC_BOOT1: 0x0000400000 (4,00Mb)
EMMC_BOOT2: 0x0000400000 (4,00Mb)
EMMC_RPMB : 0x0001000000 (16,00Mb)
EMMC_USER : 0x0747C00000 (29,12Gb)
RAM INFO:
INT_SRAM: 0x000003A000 (232,00Kb)
EXT_RAM : 0x0080000000 (2,00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... [EXT4] ... OK
Product Brand : motorola
Product Manufacturer : motorola
Product Model : moto e(6) plus
Product Name : pokerp
Product Device : pokerp
Product Board : p161m
Board Platform : mt6765
Build ID : PTAS29.401-58-8
Build Date : Fri Jul 9 19:11:38 CST 2021
Display ID : PTAS29.401-58-8
Security Patch : 2021-08-01
Version SDK : 28
Version Release : 9
Version Codename : REL
Firmware Version : 58-8
Userdata FS Type : EXT4
Read partition "frp"... OK
Backup saved to C:/Program%20Files%20(x86)/Z3X/Pandora/Backup/MTK/Motorola_XT2025%20(Motorola%20E6%20Plus)/FRP_BACKUP_(2024-2-28_11-21-30)/
Writting FRP data... OK
Erase FRP done!


Polaco
  Reply With Quote
Old 02-28-2024, 23:04   #484 (permalink)
Freak Poster
 
Join Date: Mar 2020
Location: bolivia
Posts: 292
Member: 2951556
Status: Offline
Thanks Meter: 313
Selected model: Tecno KE7 (Tecno Spark 6)
Operation: Eliminar FRP
Software version: 6.3

Host Power Off... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Host Power On... OK
Connect phone to [BOX] in BROM/PRELOADER Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek PreLoader USB VCOM_V1632 (Android),usb2ser.sys,3.0.1504.0]
Device found at COM9 [PRELOADER]
Open port... OK
Send start cmd... OK
Get HW code from device... 0707
Get sec config... OK [00000005]
Active sec flags: [SBC DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6768]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Read Efuse error
Force switch to BROM... OK
Host Power Off... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Waiting for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0707
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6768]
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Release testpoint
Advanced Bypass Security... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1632,usb2ser.sys,3.0.1504.0]
Device found at COM51 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0707
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6768]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x7440CBB9, 0xE6138591, 0x0F00A20D, 0x13B75870
Get Chip ID... [MT6768]
Get SOC ID... [478D54DE68B1A8F326E4C85C593FC426AC4EF211D10A1EDF32 E3EEBD7A21B046]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [8]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x90014A684339615033010089B3B0182F
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_CNAME: hC9aP3
EMMC_ID : 0x90014A684339615033010089B3B0182F
EMMC_BOOT1: 0x0000400000 (4,00Mb)
EMMC_BOOT2: 0x0000400000 (4,00Mb)
EMMC_RPMB : 0x0001000000 (16,00Mb)
EMMC_USER : 0x0E8F800000 (58,24Gb)
RAM INFO:
INT_SRAM: 0x0000070000 (448,00Kb)
EXT_RAM : 0x0100000000 (4,00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... [EXT4] ... OK
Product Brand : TECNO
Product Manufacturer : TECNO MOBILE LIMITED
Product Model : TECNO KE7
Product Name : KE7-GL
Product Device : TECNO-KE7
Product Board : TECNO-KE7
Board Platform : mt6768
Build ID : QP1A.190711.020
Build Date : Fri Jul 29 22:06:10 CST 2022
Display ID : TECNO-Q-64-220729V379
Security Patch : 2022-07-05
Version SDK : 29
Version Release : 10
Version Codename : REL
Firmware Version : 220729V398
Userdata FS Type : F2FS
Read partition "frp"... OK
Backup saved to C:/Program%20Files%20(x86)/Z3X/Pandora/Backup/MTK/Tecno_KE7%20(Tecno%20Spark%206)/FRP_BACKUP_(2024-2-28_17-52-40)/
Writting FRP data... OK
Erase FRP done!
  Reply With Quote
Old 03-01-2024, 14:59   #485 (permalink)
Freak Poster
 
Join Date: Mar 2020
Location: bolivia
Posts: 292
Member: 2951556
Status: Offline
Thanks Meter: 313
Selected model: Tecno LG7n (Tecno Pova 4)
Operation: Eliminar FRP
Software version: 6.3

Host Power Off... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Host Power On... OK
Connect phone to [BOX or PC] in PRELOADER Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek PreLoader USB VCOM_V1632 (Android),usb2ser.sys,3.0.1504.0]
Device found at COM9 [PRELOADER]
Open port... OK
Send start cmd... OK
Get HW code from device... 1208
Get sec config... OK [00000005]
Active sec flags: [SBC DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6789]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Preloader exist. Skip connection verification.
Get ME ID... OK
ME_ID = 0x996B1D95, 0x54501843, 0xDA6F036D, 0x2561818C
Load DownloadAgent... OK
Search DA... OK [1]
Send bootloader... OK
Start bootloader... OK
Setup device enviroment... OK
Setup device parametres... OK
Get device info... OK
UFS CID (FW VER): H9QT1G6DN6X132 ()
Send preloader... OK
Load DownloadAgent... OK
Search DA... OK [0]
Send 2nd DA... OK
Get device info... OK
UFS INFO:
UFS_CID : H9QT1G6DN6X132
UFS_FWVER :
BLOCK_SIZE: 0x0000001000 (4,00Kb)
UFS_LU0 : 0x0000400000 (4,00Mb)
UFS_LU1 : 0x0000400000 (4,00Mb)
UFS_LU2 : 0x3B96000000 (238,34Gb)
[EFUSE INFO]: BROM not disabled
Read partitions info from phone... OK
Checking A/B state... OK [B]
Read product info... error(0)
Read partition "frp"... OK
Backup saved to C:/Program%20Files%20(x86)/Z3X/Pandora/Backup/MTK/Tecno_LG7n%20(Tecno%20Pova%204)/FRP_BACKUP_(2024-3-1_9-47-12)/
Writting FRP data... OK
Erase FRP done!
  Reply With Quote
Old 03-03-2024, 15:04   #486 (permalink)
Freak Poster
 
Join Date: Mar 2020
Location: bolivia
Posts: 292
Member: 2951556
Status: Offline
Thanks Meter: 313
Selected model: Spreadtrum Spreadtrum
Operation: Erase FRP
Software version: 6.3

Host Power Off... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Host Power On... OK
Connect phone to [BOX or PC]
Connect phone in BROM mode. Use volume key buttons or testpoint.
Waiting for device... OK
Device found at COM30
Port: USB\VID_1782&PID_4D00\6&17B2F180&0&2
Driver: [UNISOC Communications Inc.,sprdvcom,SPRD U2S Diag,sprdvcom.sys,4.19.38.134]
Port type: BROM
Connecting to device... OK
Selected processor: SC9863A
Load files... (universal) OK
Connect preloader 1... OK
Connect preloader 2... OK
Connect loader 1... OK
Connect loader 2... OK
Serial Number: 751522101778
Read partitions info... OK
Checking A/B state... OK [A]
Read product info... [EROFS] ... OK
Product Brand : ZTE
Product Manufacturer : ZTE
Product Model : ZTE Blade A53 Pro
Product Name : P963F63_2
Product Device : P963F63
Product Board : s9863a1h10
Board Platform : sp9863a
Build ID : SP1A.210812.016
Build Date : Thu Mar 30 01:56:27 CST 2023
Display ID : MyOS12.0.0_A53Pro_LA
Security Patch : 2023-03-05
Version SDK : 31
Version Release : 12
Version Codename : REL
Firmware Version : 20230330.005014
Userdata FS Type : F2FS
Backup partitions... OK
Formatting "persist" partition... OK
Done!
  Reply With Quote
Old 03-03-2024, 23:32   #487 (permalink)
Freak Poster
 
professorjazz's Avatar
 
Join Date: Jun 2015
Location: inside mother's womb
Age: 43
Posts: 206
Member: 2418465
Status: Offline
Thanks Meter: 34
Selected model: Samsung SM-A042F (Samsung Galaxy A04e)
Operation: Erase FRP
Software version: 6.3

Searching USB Flash interface... COM6 detected
Setup connection... OK
Model: SM-A042F
SW version: A042FXXU1AVJ2
Sales code: XNZ
Device ID: 1c66a4b3fca8
Vendor: SAMSUNG
Product: 4X62MB
Unique Number: H153458300D6E2E436B9
FW Version: 4
Capacity: 32 Gb
Reading data from phone... OK
Sending data to phone... OK
Rebooting to download... OK
Searching USB Flash interface... COM6 detected
Setup connection... OK
Sending data to phone... OK
Sending data to phone... OK
Rebooting... OK
Erase FRP done!
  Reply With Quote
Old 03-03-2024, 23:46   #488 (permalink)
Freak Poster
 
professorjazz's Avatar
 
Join Date: Jun 2015
Location: inside mother's womb
Age: 43
Posts: 206
Member: 2418465
Status: Offline
Thanks Meter: 34
Selected model: Samsung SM-A125F (Samsung Galaxy A12)
Operation: Erase FRP
Software version: 6.3

Searching USB Flash interface... COM6 detected
Setup connection... OK
Model: SM-A125F
SW version: A125FXXS4CWK4
Sales code: XNZ
Device ID: 3808bc4148e1
Vendor: SAMSUNG
Product: DV6DAB
Unique Number: CDV00DB25D40E18
FW Version: 1
Capacity: 128 Gb
Reading data from phone... OK
Sending data to phone... OK
Rebooting to download... OK
Searching USB Flash interface... COM6 detected
Setup connection... OK
Sending data to phone... OK
Sending data to phone... OK
Rebooting... OK
Erase FRP done!
  Reply With Quote
Old 03-03-2024, 23:53   #489 (permalink)
Freak Poster
 
professorjazz's Avatar
 
Join Date: Jun 2015
Location: inside mother's womb
Age: 43
Posts: 206
Member: 2418465
Status: Offline
Thanks Meter: 34
Selected model: TCL Mediatek
Operation: Erase FRP
Software version: 6.3

Connect Type-C to NONE... OK
Host Power Off... OK
Connect phone to [PC] in BROM Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1632,usb2ser.sys,3.0.1504.0]
Device found at COM32 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get sec config... OK [000000E7]
Active sec flags: [SBC SLA DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Install LibUSB... OK
Waiting for device... OK
Open port... OK
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Release testpoint, waiting 2 seconds
Advanced Bypass Security... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1632,usb2ser.sys,3.0.1504.0]
Device found at COM32 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x13779CB7, 0xC65E4CAD, 0xAF24786D, 0xC1664E34
Get Chip ID... [MT6765]
Get SOC ID... [0B8076F183511069CC3AD23EAE886E6B32556B5AD89BF5A81A BF45791456D4FC]
Get sec config... OK [000000E0]
Get hw mode... OK
Load DownloadAgent... OK
Search DA... OK [7]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0xF40122426977696E201017398A953927
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_CNAME: Biwin
EMMC_ID : 0xF40122426977696E201017398A953927
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0000400000 (4.00Mb)
EMMC_USER : 0x1CD4000000 (115.31Gb)
RAM INFO:
INT_SRAM: 0x000003A000 (232.00Kb)
EXT_RAM : 0x0100000000 (4.00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK [A]
Read product info... [EXT4] ... OK
Product Brand : TCL
Product Manufacturer : TCL
Product Model : 6165H
Product Name : 6165H
Product Device : Cruze_Pro
Product Board : MT6765
Board Platform : mt6765
Build ID : SP1A.210812.016
Build Date : Thu Apr 28 18:19:50 CST 2022
Display ID : SP1A.210812.016 release-keys
Security Patch : 2022-04-05
Version SDK : 31
Version Release : 12
Version Codename : REL
Firmware Version : 1AB2
Userdata FS Type : F2FS
Read partition "frp"... OK
Backup saved to C:/Program%20Files%20(x86)/Z3X/Pandora/Backup/MTK/TCL_MT6765/FRP_BACKUP_(2024-2-29_11-48-23)/
Writting FRP data... OK
Erase FRP done!
  Reply With Quote
Old 03-04-2024, 01:03   #490 (permalink)
Freak Poster
 
professorjazz's Avatar
 
Join Date: Jun 2015
Location: inside mother's womb
Age: 43
Posts: 206
Member: 2418465
Status: Offline
Thanks Meter: 34
Selected model: Infinix X6810 (Infinix Zero X Pro)
Operation: Flash (Download only)
Software version: 6.3

Parse scatter file... OK
Load Rom Images... OK
Connect Type-C to NONE... OK
Host Power Off... OK
Connect phone to [PC] in BROM Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1632,usb2ser.sys,3.0.1504.0]
Device found at COM32 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0813
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6785]
LibUSB installed
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Release testpoint, waiting 2 seconds
Advanced Bypass Security... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1632,usb2ser.sys,3.0.1504.0]
Device found at COM32 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0813
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6785]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0xF64166F2, 0x249A762B, 0xA6B5C273, 0x5ED50531
Get Chip ID... [MT6785]
Get SOC ID... [13F54A9252F026FE92EF05DCBBACD95D556C23871C8E8F1B86 4BA402C725AD96]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [12]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
UFS CID (FW VER): H9HQ15AFAMBDAR (A002)
Load EMI config from preloader... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
UFS INFO:
UFS_CID : H9HQ15AFAMBDAR
UFS_FWVER : A002
BLOCK_SIZE: 0x0000001000 (4.00Kb)
UFS_LU0 : 0x0000400000 (4.00Mb)
UFS_LU1 : 0x0000400000 (4.00Mb)
UFS_LU2 : 0x1DCB000000 (119.17Gb)
RAM INFO:
INT_SRAM: 0x0000080000 (512.00Kb)
EXT_RAM : 0x0200000000 (8.00Gb)
Get scatter info... OK
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK [A]
Read product info... [EXT4] ... OK
Product Brand : Infinix
Product Manufacturer : INFINIX MOBILITY LIMITED
Product Model : Infinix X6810
Product Name : X6810-GL
Product Device : Infinix-X6810
Product Board : Infinix-X6810
Board Platform : mt6785
Build ID : RP1A.200720.011
Build Date : Fri Aug 25 00:17:06 CST 2023
Display ID : INFINIX-R-64-230824V997
Security Patch : 2023-08-05
Version SDK : 30
Version Release : 11
Version Codename : REL
Firmware Version : 230824V630
Userdata FS Type : F2FS
Get scatter info... OK
Verify scatter file... OK
Do NAND BMT remark... OK
Setup download info... OK
Get partition table catagory... OK [GPT]
Read mirror partition table... OK
Checking partition table layout changed... OK
Read major partition table... OK
Checking major partition table layout changed... OK
Download "preloader"... OK
Download "vbmeta_a"... OK
Download "vbmeta_system_a"... OK
Download "vbmeta_vendor_a"... OK
Download "md1img_a"... OK
Download "spmfw_a"... OK
Download "scp_a"... OK
Download "sspm_a"... OK
Download "cam_vpu1_a"... OK
Download "cam_vpu2_a"... OK
Download "cam_vpu3_a"... OK
Download "gz_a"... OK
Download "lk_a"... OK
Download "logo_a"... OK
Download "boot_a"... OK
Download "dtbo_a"... OK
Download "tee_a"... OK
Download "super"... OK
Download "tranfs"... OK
Download "userdata"... OK
Flashing done!
  Reply With Quote
Old 03-06-2024, 04:05   #491 (permalink)
Freak Poster
 
professorjazz's Avatar
 
Join Date: Jun 2015
Location: inside mother's womb
Age: 43
Posts: 206
Member: 2418465
Status: Offline
Thanks Meter: 34
Selected model: Samsung SM-A042F (Samsung Galaxy A04e)
Operation: Erase FRP
Software version: 6.3

Searching USB Flash interface... COM6 detected
Setup connection... OK
Model: SM-A042F
SW version: A042FXXU1AVJ2
Sales code: XNZ
Device ID: 1c66a4b3fca8
Vendor: SAMSUNG
Product: 4X62MB
Unique Number: H153458300D6E2E436B9
FW Version: 4
Capacity: 32 Gb
Reading data from phone... OK
Sending data to phone... OK
Rebooting to download... OK
Searching USB Flash interface... COM6 detected
Setup connection... OK
Sending data to phone... OK
Sending data to phone... OK
Rebooting... OK
Erase FRP done!
  Reply With Quote
Old 03-06-2024, 23:06   #492 (permalink)
Freak Poster
 
Join Date: Mar 2020
Location: bolivia
Posts: 292
Member: 2951556
Status: Offline
Thanks Meter: 313
Selected model: Tecno LD7 (Tecno Pova)
Operation: Eliminar FRP
Software version: 6.5

Host Power Off... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Host Power On... OK
Connect phone to [BOX or PC] in PRELOADER Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek PreLoader USB VCOM_V1632 (Android),usb2ser.sys,3.0.1504.0]
Device found at COM9 [PRELOADER]
Open port... OK
Send start cmd... OK
Get HW code from device... 0707
Get sec config... OK [00000005]
Active sec flags: [SBC DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6768]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Preloader exist. Skip connection verification.
Get ME ID... OK
ME_ID = 0x4A816AB6, 0x5078C831, 0xB1971B91, 0x8ED56185
Load DownloadAgent... OK
Search DA... OK [1]
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [PRELOADER]
Preloader alive. Skip initializing external RAM
Get device info... OK
EMMC_ID: 0x15010033563643414202CBBFD037283D
Send preloader... OK
Load DownloadAgent... OK
Search DA... OK [8]
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_CNAME: 3V6CAB
EMMC_ID : 0x15010033563643414202CBBFD037283D
EMMC_BOOT1: 0x0000400000 (4,00Mb)
EMMC_BOOT2: 0x0000400000 (4,00Mb)
EMMC_RPMB : 0x0001000000 (16,00Mb)
EMMC_USER : 0x1D1EC00000 (116,48Gb)
RAM INFO:
INT_SRAM: 0x0000070000 (448,00Kb)
EXT_RAM : 0x0100000000 (4,00Gb)
Checking USB status... USB_HIGH_SPEED
[EFUSE INFO]: BROM not disabled
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... [EXT4] ... OK
Product Brand : TECNO
Product Manufacturer : TECNO MOBILE LIMITED
Product Model : TECNO LD7
Product Name : LD7-OP
Product Device : TECNO-LD7
Product Board : TECNO-LD7
Board Platform : mt6768
Build ID : QP1A.190711.020
Build Date : Wed Aug 24 18:21:58 CST 2022
Display ID : TECNO-Q-64-220824V456
Security Patch : 2022-08-01
Version SDK : 29
Version Release : 10
Version Codename : REL
Firmware Version : 220824V456
Read partition "frp"... OK
Backup saved to C:/Program%20Files%20(x86)/Z3X/Pandora/Backup/MTK/Tecno_LD7%20(Tecno%20Pova)/FRP_BACKUP_(2024-3-6_10-57-13)/
Writting FRP data... OK
Erase FRP done!
  Reply With Quote
Old 03-06-2024, 23:13   #493 (permalink)
Freak Poster
 
Join Date: Mar 2020
Location: bolivia
Posts: 292
Member: 2951556
Status: Offline
Thanks Meter: 313
Selected model: Infinix X659B (Infinix Hot 10i)
Operation: Eliminar FRP
Software version: 6.5

Host Power Off... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Host Power On... OK
Connect phone to [BOX or PC] in PRELOADER Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek PreLoader USB VCOM_V1632 (Android),usb2ser.sys,3.0.1504.0]
Device found at COM45 [PRELOADER]
Open port... OK
Send start cmd... OK
Get HW code from device... 0707
Get sec config... OK [00000005]
Active sec flags: [SBC DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6768]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Preloader exist. Skip connection verification.
Get ME ID... OK
ME_ID = 0x1A127B5A, 0x18311931, 0xBD164689, 0x217A12BD
Load DownloadAgent... OK
Search DA... OK [1]
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [PRELOADER]
Preloader alive. Skip initializing external RAM
Get device info... OK
EMMC_ID: 0x13014E47314A395339100F940BF528BB
Send preloader... OK
Load DownloadAgent... OK
Search DA... OK [8]
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_CNAME: G1J9S9
EMMC_ID : 0x13014E47314A395339100F940BF528BB
EMMC_BOOT1: 0x0000400000 (4,00Mb)
EMMC_BOOT2: 0x0000400000 (4,00Mb)
EMMC_RPMB : 0x0001000000 (16,00Mb)
EMMC_USER : 0x1D1F000000 (116,48Gb)
RAM INFO:
INT_SRAM: 0x0000070000 (448,00Kb)
EXT_RAM : 0x0100000000 (4,00Gb)
Checking USB status... USB_HIGH_SPEED
[EFUSE INFO]: BROM not disabled
Read partitions info from phone... OK
Checking A/B state... OK [B]
Read product info... [EXT4] ... OK
Product Brand : Infinix
Product Manufacturer : INFINIX MOBILITY LIMITED
Product Model : Infinix X659B
Product Name : X659B-OP
Product Device : Infinix-X659B
Product Board : Infinix-X659B
Board Platform : mt6768
Build ID : RP1A.200720.011
Build Date : Tue Feb 14 10:34:05 CST 2023
Display ID : INFINIX-R-64-230213V172
Security Patch : 2023-02-01
Version SDK : 30
Version Release : 11
Version Codename : REL
Firmware Version : 230213V227
Read partition "frp"... OK
Backup saved to C:/Program%20Files%20(x86)/Z3X/Pandora/Backup/MTK/Infinix_X659B%20(Infinix%20Hot%2010i)/FRP_BACKUP_(2024-3-6_14-24-24)/
Writting FRP data... OK
Erase FRP done!
  Reply With Quote
Old 03-07-2024, 09:50   #494 (permalink)
Freak Poster
 
Join Date: May 2016
Location: MOZAMBIQUE
Posts: 117
Member: 2576731
Status: Offline
Thanks Meter: 75
Donate money to this user
Vivo V2236 (Vivo Y02a) frp & reset sucefully done

Selected model: Vivo V2236 (Vivo Y02a)
Operation: Erase FRP
Software version: 6.5

Connect Type-C to NONE... OK
Host Power Off... OK
Connect phone to [PC] in PRELOADER Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek PreLoader USB VCOM_V1632 (Android),usb2ser.sys,3.0.1504.0]
Device found at COM7 [PRELOADER]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get sec config... OK [00000005]
Active sec flags: [SBC DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Preloader exist. Skip connection verification.
Get ME ID... OK
ME_ID = 0x9CEB7868, 0xFEBA4CDA, 0x5E8A2353, 0x416AE82D
Load DownloadAgent... OK
Search DA... OK [2]
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [PRELOADER]
Preloader alive. Skip initializing external RAM
Get device info... OK
EMMC_ID: 0x9B010059325030333200C4020EE979C7
Send preloader... OK
Load DownloadAgent... OK
Search DA... OK [7]
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_CNAME: Y2P032
EMMC_ID : 0x9B010059325030333200C4020EE979C7
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0001000000 (16.00Mb)
EMMC_USER : 0x0747C00000 (29.12Gb)
RAM INFO:
INT_SRAM: 0x000003A000 (232.00Kb)
EXT_RAM : 0x0080000000 (2.00Gb)
Checking USB status... USB_HIGH_SPEED
[EFUSE INFO]: BROM disabled !!!
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... [EXT4] ... OK
Product Brand : vivo
Product Manufacturer : vivo
Product Model : V2236
Product Name : V2236
Product Device : V2236
Product Board : k65v1_32_bsp_2g_ago
Board Platform : mt6765
Build ID : SP1A.210812.003
Build Date : Mon Sep 4 18:36:53 CST 2023
Display ID : SP1A.210812.003 release-keys
Security Patch : 2023-09-01
Version SDK : 31
Version Release : 12
Version Codename : REL
Firmware Version : compiler09041826
Read partition "frp"... OK
Backup saved to C:/Program%20Files%20(x86)/Z3X/Pandora/Backup/MTK/Vivo_V2236%20(Vivo%20Y02a)/FRP_BACKUP_(2024-3-7_10-35-38)/
Writting FRP data... OK
Erase FRP done!
  Reply With Quote
Old 03-07-2024, 10:01   #495 (permalink)
Freak Poster
 
Join Date: May 2016
Location: MOZAMBIQUE
Posts: 117
Member: 2576731
Status: Offline
Thanks Meter: 75
Donate money to this user
OPPO CPH2273 (OPPO A54s) IMEI REPAIR DONE

REPAIR IMEI SUCESSFULL WITH V6.5 OPPO CPH2273 (OPPO A54s)
HERE THE LOGS
Selected model: OPPO CPH2273 (OPPO A54s)
Operation: Repair
Software version: 6.4

Connect Type-C to NONE... OK
Host Power Off... OK
Connect phone to [PC] in BROM Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1632,usb2ser.sys,3.0.1504.0]
Device found at COM44 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
LibUSB installed
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Release testpoint, waiting 2 seconds
Advanced Bypass Security... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1632,usb2ser.sys,3.0.1504.0]
Device found at COM44 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0xE4518633, 0xBA1C658E, 0xA321BBC9, 0xAC77849E
Get Chip ID... [MT6765]
Get SOC ID... [7B01727DB80640884447D13D07B485692BD9FDEC0CE448918D 36D192C82ED52B]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [7]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x13014E47314A395339101AD40D2319A3
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_CNAME: G1J9S9
EMMC_ID : 0x13014E47314A395339101AD40D2319A3
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0001000000 (16.00Mb)
EMMC_USER : 0x1D1F000000 (116.48Gb)
RAM INFO:
INT_SRAM: 0x000003A000 (232.00Kb)
EXT_RAM : 0x0100000000 (4.00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... [EXT4] ... OK
Product Brand : alps
Product Manufacturer : alps
Product Model : CPH2273
Product Name : vnd_oppo6765
Product Device : oppo6765
Product Board : oppo6765
Board Platform : mt6765
Build ID : RP1A.200720.011
Build Date : Wed Nov 24 02:12:03 CST 2021
Display ID : CPH2273_11_A.01
Security Patch : 2021-11-05
Version SDK : 30
Version Release : 11
Version Codename : REL
Firmware Version : 1637690366587
Read security partition from phone...
Decrypting security data... OK
Encrypt security data... OK
Read partition "nvdata"... OK
Read partition "protect1"... OK
Read partition "nvram"... OK
Read NVDATA files... OK
Read NVRAM files... OK
Read security files... OK
Calculating... OK
Repairing IMEI...
IMEI: 8603140503,,,,,
Write IMEI and patch CERT [NVDATA]... OK
Checking patch type... [1]
Patching CERT...
Exception: Access violation at address 017603D3 in module PandoraTool.exe. Read of address E2EC0010

v6.5 done patching

Selected model: OPPO CPH2273 (OPPO A54s)
Operation: Repair
Software version: 6.5

Connect Type-C to NONE... OK
Host Power Off... OK
Connect phone to [PC] in BROM Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1632,usb2ser.sys,3.0.1504.0]
Device found at COM36 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
LibUSB installed
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Release testpoint, waiting 2 seconds
Advanced Bypass Security... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1632,usb2ser.sys,3.0.1504.0]
Device found at COM36 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0xE4518633, 0xBA1C658E, 0xA321BBC9, 0xAC77849E
Get Chip ID... [MT6765]
Get SOC ID... [7B01727DB80640884447D13D07B485692BD9FDEC0CE448918D 36D192C82ED52B]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [7]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x13014E47314A395339101AD40D2319A3
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_CNAME: G1J9S9
EMMC_ID : 0x13014E47314A395339101AD40D2319A3
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0001000000 (16.00Mb)
EMMC_USER : 0x1D1F000000 (116.48Gb)
RAM INFO:
INT_SRAM: 0x000003A000 (232.00Kb)
EXT_RAM : 0x0100000000 (4.00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... [EXT4] ... OK
Product Brand : alps
Product Manufacturer : alps
Product Model : CPH2273
Product Name : vnd_oppo6765
Product Device : oppo6765
Product Board : oppo6765
Board Platform : mt6765
Build ID : RP1A.200720.011
Build Date : Wed Nov 24 02:12:03 CST 2021
Display ID : CPH2273_11_A.01
Security Patch : 2021-11-05
Version SDK : 30
Version Release : 11
Version Codename : REL
Firmware Version : 1637690366587
Read security partition from phone...
Decrypting security data... OK
Encrypt security data... OK
Read partition "nvdata"... OK
Read partition "protect1"... OK
Read partition "nvram"... OK
Read NVDATA files... OK
Read NVRAM files... OK
Read security files... OK
Calculating... OK
Repairing IMEI...
IMEI: 860314050//;;;;
Write IMEI and patch CERT [NVDATA]... OK
Checking patch type... [1]
Patching CERT... OK
Save patched partiton... OK
Updating NVRAM... OK
Read security partition from phone... OK
Write security partition to phone... OK
Checking additional lock... [ENABLED]
Disable additional lock... OK
Unlock bootloader done!
Selected "Disable VBMETA verification"
Read security partition from phone... OK
Write security partition to phone... OK
Write IMEI and patch CERT [NVRAM]... OK
Write partition "nvdata"... OK
Write partition "nvram"... OK
Repair Security and Patch cert done!
If your phone after repair keeps rebooting - use wipe data option.

reset sucessfully
Selected model: OPPO CPH2273 (OPPO A54s)
Operation: Erase FRP And Wipe
Software version: 6.5
Erasing of partitions can damage your device.
Make sure that you have a backup created. Continue? YES

Connect Type-C to NONE... OK
Host Power Off... OK
Connect phone to [PC] in BROM Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1632,usb2ser.sys,3.0.1504.0]
Device found at COM36 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
LibUSB installed
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Release testpoint, waiting 2 seconds
Advanced Bypass Security... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1632,usb2ser.sys,3.0.1504.0]
Device found at COM36 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0xE4518633, 0xBA1C658E, 0xA321BBC9, 0xAC77849E
Get Chip ID... [MT6765]
Get SOC ID... [7B01727DB80640884447D13D07B485692BD9FDEC0CE448918D 36D192C82ED52B]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [7]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x13014E47314A395339101AD40D2319A3
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_CNAME: G1J9S9
EMMC_ID : 0x13014E47314A395339101AD40D2319A3
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0001000000 (16.00Mb)
EMMC_USER : 0x1D1F000000 (116.48Gb)
RAM INFO:
INT_SRAM: 0x000003A000 (232.00Kb)
EXT_RAM : 0x0100000000 (4.00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... [EXT4] ... OK
Product Brand : alps
Product Manufacturer : alps
Product Model : CPH2273
Product Name : vnd_oppo6765
Product Device : oppo6765
Product Board : oppo6765
Board Platform : mt6765
Build ID : RP1A.200720.011
Build Date : Wed Nov 24 02:12:03 CST 2021
Display ID : CPH2273_11_A.01
Security Patch : 2021-11-05
Version SDK : 30
Version Release : 11
Version Codename : REL
Firmware Version : 1637690366587
Read partition "frp"... OK
Backup saved to C:/Program%20Files%20(x86)/Z3X/Pandora/Backup/MTK/OPPO_CPH2273%20(OPPO%20A54s)/FRP_BACKUP_(2024-3-6_11-49-35)/
Writting FRP data... OK
Formatting "userdata" partition... OK
Formatting "cache" partition... OK
Formatting "metadata" partition... OK
Formatting "md_udc" partition... OK
Wipe data done!
  Reply With Quote
Reply

Bookmarks


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


 



All times are GMT +1. The time now is 14:59.



Powered by Searchlight © 2024 Axivo Inc.
vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2024 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2023 -
Page generated in 0.29128 seconds with 9 queries

SEO by vBSEO