|
Welcome to the GSM-Forum forums. You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. Only registered members may post questions, contact other members or search our database of over 8 million posts. Registration is fast, simple and absolutely free so please - Click to REGISTER! If you have any problems with the registration process or your account login, please contact contact us . |
|
Register | FAQ | Donate | Forum Rules | Root any Device | ★iPhone Unlock★ | ★ Direct Codes ★ | Direct Unlock Source | Today's Posts | Search |
| LinkBack | Thread Tools | Display Modes |
02-27-2024, 21:33 | #481 (permalink) |
Freak Poster Join Date: Mar 2020 Location: bolivia
Posts: 292
Member: 2951556 Status: Offline Thanks Meter: 313 | Operation: Erase FRP Software version: 6.3 Host Power Off... OK Switch virtual port to NONE... OK Connect Type-C to HUB... OK Host Power On... OK Connect phone to [BOX or PC] Connect phone in BROM mode. Use volume key buttons or testpoint. Waiting for device... OK Device found at COM30 Port: USB\VID_1782&PID_4D00\6&17B2F180&0&2 Driver: [UNISOC Communications Inc.,sprdvcom,SPRD U2S Diag,sprdvcom.sys,4.19.38.134] Port type: BROM Connecting to device... OK Selected processor: SC9863A_64 Load files... (universal) OK Connect preloader 1... OK Connect preloader 2... OK Connect loader 1... OK Connect loader 2... OK Serial Number: 097121535C005921 Read partitions info... OK Checking A/B state... OK [B] Read product info... [EROFS] ... OK Product Brand : TECNO Product Manufacturer : TECNO Product Model : TECNO BF6 Product Name : BF6-OP Product Device : TECNO-BF6 Product Board : BF6 Board Platform : sp9863a Build ID : SP1A.210812.001 Build Date : Thu Oct 12 19:00:45 CST 2023 Display ID : BF6-SE668SABCDE-SGo-OP-231012V709 Security Patch : 2023-10-05 Version SDK : 31 Version Release : 12 Version Codename : REL Firmware Version : 231012V709 Userdata FS Type : F2FS Backup partitions... OK Formatting "persist" partition... OK Done! |
02-27-2024, 21:42 | #482 (permalink) |
Freak Poster Join Date: Mar 2020 Location: bolivia
Posts: 292
Member: 2951556 Status: Offline Thanks Meter: 313 | Selected model: Xiaomi Redmi 9 (Lancelot) Operation: Eliminar FRP Software version: 6.3 Host Power Off... OK Switch virtual port to NONE... OK Connect Type-C to HUB... OK Host Power On... OK Connect phone to [BOX] in BROM/PRELOADER Mode Waiting for device... OK Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1632,usb2ser.sys,3.0.1504.0] Device found at COM51 [BROM] Open port... OK Send start cmd... OK Get HW code from device... 0707 Get sec config... OK [000000E7] Active sec flags: [SBC SLA DAA] Get HW & SW version from device... OK HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6768] Library Version [2] Select platform... OK Init BROM... OK Force Charge... OK Disable WatchDog Timer... OK Force switch to BROM... OK Host Power Off... OK Switch virtual port to USB... OK Connect Type-C to BOX... OK Host Power On... OK Waiting for device... OK Read usbhost speed... HIGH Read Device Descriptor... Get VID/PID...0E8D/0003 Send start cmd... OK Get HW code from device... 0707 Get HW & SW version from device... OK HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6768] Get sec config... OK [000000E7] Active sec flags: [SBC SLA DAA] Release testpoint Advanced Bypass Security... OK Switch virtual port to NONE... OK Connect Type-C to HUB... OK Waiting for device... OK Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1632,usb2ser.sys,3.0.1504.0] Device found at COM51 [BROM] Open port... OK Send start cmd... OK Get HW code from device... 0707 Get sec config... OK [000000E0] Active sec flags: [] Get HW & SW version from device... OK HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6768] Library Version [2] Select platform... OK Init BROM... OK Force Charge... OK Disable WatchDog Timer... OK Reopen port for libver2... OK Get ME ID... OK ME_ID = 0x3469DE77, 0x6F98CB9B, 0x7A39DF8F, 0x272757EA Get Chip ID... [MT6768] Get SOC ID... [B093360C6708843FADF819C6EC8DB8F9F02EDD58666F6EEDB3 8BFBC5F2FD22E6] Get sec config... OK [000000E0] Load DownloadAgent... OK Search DA... OK [8] Send preloader... OK Start preloader... OK Checking preloader answer... OK Send bootloader... OK Start bootloader... OK Wait for answer from bootloader... OK Send SYNC signal... OK Setup device enviroment... OK Setup device parametres... OK Receive DA SYNC signal... OK Set DA parametres... OK Get device connection agent... [BROM] Get device info... OK EMMC_ID: 0x15010044503644414203E80F9AFE573B Load EMI from phone... OK Parse EMI config... OK Init EXT RAM... OK Send 2nd DA... OK Get device info... OK EMMC INFO: EMMC_CNAME: DP6DAB EMMC_ID : 0x15010044503644414203E80F9AFE573B EMMC_BOOT1: 0x0000400000 (4,00Mb) EMMC_BOOT2: 0x0000400000 (4,00Mb) EMMC_RPMB : 0x0001000000 (16,00Mb) EMMC_USER : 0x0E8F800000 (58,24Gb) RAM INFO: INT_SRAM: 0x0000070000 (448,00Kb) EXT_RAM : 0x0100000000 (4,00Gb) Checking USB status... USB_HIGH_SPEED Read partitions info from phone... OK Checking A/B state... OK Read product info... [EXT4] ... OK Product Brand : Redmi Product Manufacturer : Xiaomi Product Model : lancelot Product Name : lancelot Product Device : lancelot Product Board : lancelot Board Platform : mt6768 Build ID : SP1A.210812.016 Build Date : Tue Nov 15 11:38:52 CST 2022 Display ID : SP1A.210812.016 Security Patch : 2022-10-01 Version SDK : 31 Version Release : 12 Version Codename : REL Firmware Version : V13.0.2.0.SJCMIXM Userdata FS Type : EXT4 Read partition "frp"... OK Backup saved to C:/Program%20Files%20(x86)/Z3X/Pandora/Backup/MTK/Xiaomi_Redmi%209%20(Lancelot)/FRP_BACKUP_(2024-2-27_16-30-11)/ Writting FRP data... OK Erase FRP done! |
02-28-2024, 15:22 | #483 (permalink) |
No Life Poster Join Date: Jun 2009 Location: SouthAmericaUnlockers Age: 52
Posts: 2,641
Member: 1057178 Status: Offline Sonork: Kfe~Labs Co.- Thanks Meter: 569 | e6 plus FRP Done Selected model: Motorola XT2025 (Motorola E6 Plus) Operation: Erase FRP Software version: 6.3 Work ID: 20822268 Connect phone in BROM Mode Waiting for device... OK Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1632,usb2ser.sys,3.0.1504.0] Device found at COM4 [BROM] Open port... OK Send start cmd... OK Get HW code from device... 0766 Get sec config... OK [000000E5] Active sec flags: [SBC DAA] Get HW & SW version from device... OK HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6765] LibUSB installed Library Version [2] Select platform... OK Init BROM... OK Force Charge... OK Disable WatchDog Timer... OK Release testpoint, waiting 2 seconds Advanced Bypass Security... OK Waiting for device... OK Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1632,usb2ser.sys,3.0.1504.0] Device found at COM4 [BROM] Open port... OK Send start cmd... OK Get HW code from device... 0766 Get sec config... OK [000000E0] Active sec flags: [] Get HW & SW version from device... OK HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6765] Library Version [2] Select platform... OK Init BROM... OK Force Charge... OK Disable WatchDog Timer... OK Reopen port for libver2... OK Get ME ID... OK ME_ID = 0x9B5E6512, 0x36BD7CD1, 0xE8C68EBB, 0xC97BD927 Get Chip ID... [MT6765] Get SOC ID... [31D3EE313F4951D1627BB5D6EA51A91BBC8017F7E52F6A16E7 6CE5E916BE5E38] Get sec config... OK [000000E0] Load DownloadAgent... OK Search DA... OK [7] Send preloader... OK Start preloader... OK Checking preloader answer... OK Send bootloader... OK Start bootloader... OK Wait for answer from bootloader... OK Send SYNC signal... OK Setup device enviroment... OK Setup device parametres... OK Receive DA SYNC signal... OK Set DA parametres... OK Get device connection agent... [BROM] Get device info... OK EMMC_ID: 0x150100514436334D4201F14996E396DB Load EMI from phone... OK Parse EMI config... OK Init EXT RAM... OK Send 2nd DA... OK Get device info... OK EMMC INFO: EMMC_CNAME: QD63MB EMMC_ID : 0x150100514436334D4201F14996E396DB EMMC_BOOT1: 0x0000400000 (4,00Mb) EMMC_BOOT2: 0x0000400000 (4,00Mb) EMMC_RPMB : 0x0001000000 (16,00Mb) EMMC_USER : 0x0747C00000 (29,12Gb) RAM INFO: INT_SRAM: 0x000003A000 (232,00Kb) EXT_RAM : 0x0080000000 (2,00Gb) Checking USB status... USB_HIGH_SPEED Read partitions info from phone... OK Checking A/B state... OK Read product info... [EXT4] ... OK Product Brand : motorola Product Manufacturer : motorola Product Model : moto e(6) plus Product Name : pokerp Product Device : pokerp Product Board : p161m Board Platform : mt6765 Build ID : PTAS29.401-58-8 Build Date : Fri Jul 9 19:11:38 CST 2021 Display ID : PTAS29.401-58-8 Security Patch : 2021-08-01 Version SDK : 28 Version Release : 9 Version Codename : REL Firmware Version : 58-8 Userdata FS Type : EXT4 Read partition "frp"... OK Backup saved to C:/Program%20Files%20(x86)/Z3X/Pandora/Backup/MTK/Motorola_XT2025%20(Motorola%20E6%20Plus)/FRP_BACKUP_(2024-2-28_11-21-30)/ Writting FRP data... OK Erase FRP done! Polaco |
02-28-2024, 23:04 | #484 (permalink) |
Freak Poster Join Date: Mar 2020 Location: bolivia
Posts: 292
Member: 2951556 Status: Offline Thanks Meter: 313 | Selected model: Tecno KE7 (Tecno Spark 6) Operation: Eliminar FRP Software version: 6.3 Host Power Off... OK Switch virtual port to NONE... OK Connect Type-C to HUB... OK Host Power On... OK Connect phone to [BOX] in BROM/PRELOADER Mode Waiting for device... OK Driver: [MediaTek Inc.,wdm_usb,MediaTek PreLoader USB VCOM_V1632 (Android),usb2ser.sys,3.0.1504.0] Device found at COM9 [PRELOADER] Open port... OK Send start cmd... OK Get HW code from device... 0707 Get sec config... OK [00000005] Active sec flags: [SBC DAA] Get HW & SW version from device... OK HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6768] Library Version [2] Select platform... OK Init BROM... OK Force Charge... OK Disable WatchDog Timer... OK Read Efuse error Force switch to BROM... OK Host Power Off... OK Switch virtual port to USB... OK Connect Type-C to BOX... OK Host Power On... OK Waiting for device... OK Read usbhost speed... HIGH Read Device Descriptor... Get VID/PID...0E8D/0003 Send start cmd... OK Get HW code from device... 0707 Get HW & SW version from device... OK HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6768] Get sec config... OK [000000E5] Active sec flags: [SBC DAA] Release testpoint Advanced Bypass Security... OK Switch virtual port to NONE... OK Connect Type-C to HUB... OK Waiting for device... OK Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1632,usb2ser.sys,3.0.1504.0] Device found at COM51 [BROM] Open port... OK Send start cmd... OK Get HW code from device... 0707 Get sec config... OK [000000E0] Active sec flags: [] Get HW & SW version from device... OK HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6768] Library Version [2] Select platform... OK Init BROM... OK Force Charge... OK Disable WatchDog Timer... OK Reopen port for libver2... OK Get ME ID... OK ME_ID = 0x7440CBB9, 0xE6138591, 0x0F00A20D, 0x13B75870 Get Chip ID... [MT6768] Get SOC ID... [478D54DE68B1A8F326E4C85C593FC426AC4EF211D10A1EDF32 E3EEBD7A21B046] Get sec config... OK [000000E0] Load DownloadAgent... OK Search DA... OK [8] Send preloader... OK Start preloader... OK Checking preloader answer... OK Send bootloader... OK Start bootloader... OK Wait for answer from bootloader... OK Send SYNC signal... OK Setup device enviroment... OK Setup device parametres... OK Receive DA SYNC signal... OK Set DA parametres... OK Get device connection agent... [BROM] Get device info... OK EMMC_ID: 0x90014A684339615033010089B3B0182F Load EMI from phone... OK Parse EMI config... OK Init EXT RAM... OK Send 2nd DA... OK Get device info... OK EMMC INFO: EMMC_CNAME: hC9aP3 EMMC_ID : 0x90014A684339615033010089B3B0182F EMMC_BOOT1: 0x0000400000 (4,00Mb) EMMC_BOOT2: 0x0000400000 (4,00Mb) EMMC_RPMB : 0x0001000000 (16,00Mb) EMMC_USER : 0x0E8F800000 (58,24Gb) RAM INFO: INT_SRAM: 0x0000070000 (448,00Kb) EXT_RAM : 0x0100000000 (4,00Gb) Checking USB status... USB_HIGH_SPEED Read partitions info from phone... OK Checking A/B state... OK Read product info... [EXT4] ... OK Product Brand : TECNO Product Manufacturer : TECNO MOBILE LIMITED Product Model : TECNO KE7 Product Name : KE7-GL Product Device : TECNO-KE7 Product Board : TECNO-KE7 Board Platform : mt6768 Build ID : QP1A.190711.020 Build Date : Fri Jul 29 22:06:10 CST 2022 Display ID : TECNO-Q-64-220729V379 Security Patch : 2022-07-05 Version SDK : 29 Version Release : 10 Version Codename : REL Firmware Version : 220729V398 Userdata FS Type : F2FS Read partition "frp"... OK Backup saved to C:/Program%20Files%20(x86)/Z3X/Pandora/Backup/MTK/Tecno_KE7%20(Tecno%20Spark%206)/FRP_BACKUP_(2024-2-28_17-52-40)/ Writting FRP data... OK Erase FRP done! |
03-01-2024, 14:59 | #485 (permalink) |
Freak Poster Join Date: Mar 2020 Location: bolivia
Posts: 292
Member: 2951556 Status: Offline Thanks Meter: 313 | Selected model: Tecno LG7n (Tecno Pova 4) Operation: Eliminar FRP Software version: 6.3 Host Power Off... OK Switch virtual port to NONE... OK Connect Type-C to HUB... OK Host Power On... OK Connect phone to [BOX or PC] in PRELOADER Mode Waiting for device... OK Driver: [MediaTek Inc.,wdm_usb,MediaTek PreLoader USB VCOM_V1632 (Android),usb2ser.sys,3.0.1504.0] Device found at COM9 [PRELOADER] Open port... OK Send start cmd... OK Get HW code from device... 1208 Get sec config... OK [00000005] Active sec flags: [SBC DAA] Get HW & SW version from device... OK HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6789] Library Version [2] Select platform... OK Init BROM... OK Force Charge... OK Disable WatchDog Timer... OK Reopen port for libver2... OK Preloader exist. Skip connection verification. Get ME ID... OK ME_ID = 0x996B1D95, 0x54501843, 0xDA6F036D, 0x2561818C Load DownloadAgent... OK Search DA... OK [1] Send bootloader... OK Start bootloader... OK Setup device enviroment... OK Setup device parametres... OK Get device info... OK UFS CID (FW VER): H9QT1G6DN6X132 () Send preloader... OK Load DownloadAgent... OK Search DA... OK [0] Send 2nd DA... OK Get device info... OK UFS INFO: UFS_CID : H9QT1G6DN6X132 UFS_FWVER : BLOCK_SIZE: 0x0000001000 (4,00Kb) UFS_LU0 : 0x0000400000 (4,00Mb) UFS_LU1 : 0x0000400000 (4,00Mb) UFS_LU2 : 0x3B96000000 (238,34Gb) [EFUSE INFO]: BROM not disabled Read partitions info from phone... OK Checking A/B state... OK [B] Read product info... error(0) Read partition "frp"... OK Backup saved to C:/Program%20Files%20(x86)/Z3X/Pandora/Backup/MTK/Tecno_LG7n%20(Tecno%20Pova%204)/FRP_BACKUP_(2024-3-1_9-47-12)/ Writting FRP data... OK Erase FRP done! |
03-03-2024, 15:04 | #486 (permalink) |
Freak Poster Join Date: Mar 2020 Location: bolivia
Posts: 292
Member: 2951556 Status: Offline Thanks Meter: 313 | Selected model: Spreadtrum Spreadtrum Operation: Erase FRP Software version: 6.3 Host Power Off... OK Switch virtual port to NONE... OK Connect Type-C to HUB... OK Host Power On... OK Connect phone to [BOX or PC] Connect phone in BROM mode. Use volume key buttons or testpoint. Waiting for device... OK Device found at COM30 Port: USB\VID_1782&PID_4D00\6&17B2F180&0&2 Driver: [UNISOC Communications Inc.,sprdvcom,SPRD U2S Diag,sprdvcom.sys,4.19.38.134] Port type: BROM Connecting to device... OK Selected processor: SC9863A Load files... (universal) OK Connect preloader 1... OK Connect preloader 2... OK Connect loader 1... OK Connect loader 2... OK Serial Number: 751522101778 Read partitions info... OK Checking A/B state... OK [A] Read product info... [EROFS] ... OK Product Brand : ZTE Product Manufacturer : ZTE Product Model : ZTE Blade A53 Pro Product Name : P963F63_2 Product Device : P963F63 Product Board : s9863a1h10 Board Platform : sp9863a Build ID : SP1A.210812.016 Build Date : Thu Mar 30 01:56:27 CST 2023 Display ID : MyOS12.0.0_A53Pro_LA Security Patch : 2023-03-05 Version SDK : 31 Version Release : 12 Version Codename : REL Firmware Version : 20230330.005014 Userdata FS Type : F2FS Backup partitions... OK Formatting "persist" partition... OK Done! |
03-03-2024, 23:32 | #487 (permalink) |
Freak Poster Join Date: Jun 2015 Location: inside mother's womb Age: 43
Posts: 206
Member: 2418465 Status: Offline Thanks Meter: 34 | Selected model: Samsung SM-A042F (Samsung Galaxy A04e) Operation: Erase FRP Software version: 6.3 Searching USB Flash interface... COM6 detected Setup connection... OK Model: SM-A042F SW version: A042FXXU1AVJ2 Sales code: XNZ Device ID: 1c66a4b3fca8 Vendor: SAMSUNG Product: 4X62MB Unique Number: H153458300D6E2E436B9 FW Version: 4 Capacity: 32 Gb Reading data from phone... OK Sending data to phone... OK Rebooting to download... OK Searching USB Flash interface... COM6 detected Setup connection... OK Sending data to phone... OK Sending data to phone... OK Rebooting... OK Erase FRP done! |
03-03-2024, 23:46 | #488 (permalink) |
Freak Poster Join Date: Jun 2015 Location: inside mother's womb Age: 43
Posts: 206
Member: 2418465 Status: Offline Thanks Meter: 34 | Selected model: Samsung SM-A125F (Samsung Galaxy A12) Operation: Erase FRP Software version: 6.3 Searching USB Flash interface... COM6 detected Setup connection... OK Model: SM-A125F SW version: A125FXXS4CWK4 Sales code: XNZ Device ID: 3808bc4148e1 Vendor: SAMSUNG Product: DV6DAB Unique Number: CDV00DB25D40E18 FW Version: 1 Capacity: 128 Gb Reading data from phone... OK Sending data to phone... OK Rebooting to download... OK Searching USB Flash interface... COM6 detected Setup connection... OK Sending data to phone... OK Sending data to phone... OK Rebooting... OK Erase FRP done! |
03-03-2024, 23:53 | #489 (permalink) |
Freak Poster Join Date: Jun 2015 Location: inside mother's womb Age: 43
Posts: 206
Member: 2418465 Status: Offline Thanks Meter: 34 | Selected model: TCL Mediatek Operation: Erase FRP Software version: 6.3 Connect Type-C to NONE... OK Host Power Off... OK Connect phone to [PC] in BROM Mode Waiting for device... OK Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1632,usb2ser.sys,3.0.1504.0] Device found at COM32 [BROM] Open port... OK Send start cmd... OK Get HW code from device... 0766 Get sec config... OK [000000E7] Active sec flags: [SBC SLA DAA] Get HW & SW version from device... OK HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6765] Install LibUSB... OK Waiting for device... OK Open port... OK Library Version [2] Select platform... OK Init BROM... OK Force Charge... OK Disable WatchDog Timer... OK Release testpoint, waiting 2 seconds Advanced Bypass Security... OK Waiting for device... OK Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1632,usb2ser.sys,3.0.1504.0] Device found at COM32 [BROM] Open port... OK Send start cmd... OK Get HW code from device... 0766 Get sec config... OK [000000E0] Active sec flags: [] Get HW & SW version from device... OK HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6765] Library Version [2] Select platform... OK Init BROM... OK Force Charge... OK Disable WatchDog Timer... OK Reopen port for libver2... OK Get ME ID... OK ME_ID = 0x13779CB7, 0xC65E4CAD, 0xAF24786D, 0xC1664E34 Get Chip ID... [MT6765] Get SOC ID... [0B8076F183511069CC3AD23EAE886E6B32556B5AD89BF5A81A BF45791456D4FC] Get sec config... OK [000000E0] Get hw mode... OK Load DownloadAgent... OK Search DA... OK [7] Send preloader... OK Start preloader... OK Checking preloader answer... OK Send bootloader... OK Start bootloader... OK Wait for answer from bootloader... OK Send SYNC signal... OK Setup device enviroment... OK Setup device parametres... OK Receive DA SYNC signal... OK Set DA parametres... OK Get device connection agent... [BROM] Get device info... OK EMMC_ID: 0xF40122426977696E201017398A953927 Load EMI from phone... OK Parse EMI config... OK Init EXT RAM... OK Send 2nd DA... OK Get device info... OK EMMC INFO: EMMC_CNAME: Biwin EMMC_ID : 0xF40122426977696E201017398A953927 EMMC_BOOT1: 0x0000400000 (4.00Mb) EMMC_BOOT2: 0x0000400000 (4.00Mb) EMMC_RPMB : 0x0000400000 (4.00Mb) EMMC_USER : 0x1CD4000000 (115.31Gb) RAM INFO: INT_SRAM: 0x000003A000 (232.00Kb) EXT_RAM : 0x0100000000 (4.00Gb) Checking USB status... USB_HIGH_SPEED Read partitions info from phone... OK Checking A/B state... OK [A] Read product info... [EXT4] ... OK Product Brand : TCL Product Manufacturer : TCL Product Model : 6165H Product Name : 6165H Product Device : Cruze_Pro Product Board : MT6765 Board Platform : mt6765 Build ID : SP1A.210812.016 Build Date : Thu Apr 28 18:19:50 CST 2022 Display ID : SP1A.210812.016 release-keys Security Patch : 2022-04-05 Version SDK : 31 Version Release : 12 Version Codename : REL Firmware Version : 1AB2 Userdata FS Type : F2FS Read partition "frp"... OK Backup saved to C:/Program%20Files%20(x86)/Z3X/Pandora/Backup/MTK/TCL_MT6765/FRP_BACKUP_(2024-2-29_11-48-23)/ Writting FRP data... OK Erase FRP done! |
03-04-2024, 01:03 | #490 (permalink) |
Freak Poster Join Date: Jun 2015 Location: inside mother's womb Age: 43
Posts: 206
Member: 2418465 Status: Offline Thanks Meter: 34 | Selected model: Infinix X6810 (Infinix Zero X Pro) Operation: Flash (Download only) Software version: 6.3 Parse scatter file... OK Load Rom Images... OK Connect Type-C to NONE... OK Host Power Off... OK Connect phone to [PC] in BROM Mode Waiting for device... OK Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1632,usb2ser.sys,3.0.1504.0] Device found at COM32 [BROM] Open port... OK Send start cmd... OK Get HW code from device... 0813 Get sec config... OK [000000E5] Active sec flags: [SBC DAA] Get HW & SW version from device... OK HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6785] LibUSB installed Library Version [2] Select platform... OK Init BROM... OK Force Charge... OK Disable WatchDog Timer... OK Release testpoint, waiting 2 seconds Advanced Bypass Security... OK Waiting for device... OK Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1632,usb2ser.sys,3.0.1504.0] Device found at COM32 [BROM] Open port... OK Send start cmd... OK Get HW code from device... 0813 Get sec config... OK [000000E0] Active sec flags: [] Get HW & SW version from device... OK HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6785] Library Version [2] Select platform... OK Init BROM... OK Force Charge... OK Disable WatchDog Timer... OK Reopen port for libver2... OK Get ME ID... OK ME_ID = 0xF64166F2, 0x249A762B, 0xA6B5C273, 0x5ED50531 Get Chip ID... [MT6785] Get SOC ID... [13F54A9252F026FE92EF05DCBBACD95D556C23871C8E8F1B86 4BA402C725AD96] Get sec config... OK [000000E0] Load DownloadAgent... OK Search DA... OK [12] Send preloader... OK Start preloader... OK Checking preloader answer... OK Send bootloader... OK Start bootloader... OK Wait for answer from bootloader... OK Send SYNC signal... OK Setup device enviroment... OK Setup device parametres... OK Receive DA SYNC signal... OK Set DA parametres... OK Get device connection agent... [BROM] Get device info... OK UFS CID (FW VER): H9HQ15AFAMBDAR (A002) Load EMI config from preloader... OK Init EXT RAM... OK Send 2nd DA... OK Get device info... OK UFS INFO: UFS_CID : H9HQ15AFAMBDAR UFS_FWVER : A002 BLOCK_SIZE: 0x0000001000 (4.00Kb) UFS_LU0 : 0x0000400000 (4.00Mb) UFS_LU1 : 0x0000400000 (4.00Mb) UFS_LU2 : 0x1DCB000000 (119.17Gb) RAM INFO: INT_SRAM: 0x0000080000 (512.00Kb) EXT_RAM : 0x0200000000 (8.00Gb) Get scatter info... OK Checking USB status... USB_HIGH_SPEED Read partitions info from phone... OK Checking A/B state... OK [A] Read product info... [EXT4] ... OK Product Brand : Infinix Product Manufacturer : INFINIX MOBILITY LIMITED Product Model : Infinix X6810 Product Name : X6810-GL Product Device : Infinix-X6810 Product Board : Infinix-X6810 Board Platform : mt6785 Build ID : RP1A.200720.011 Build Date : Fri Aug 25 00:17:06 CST 2023 Display ID : INFINIX-R-64-230824V997 Security Patch : 2023-08-05 Version SDK : 30 Version Release : 11 Version Codename : REL Firmware Version : 230824V630 Userdata FS Type : F2FS Get scatter info... OK Verify scatter file... OK Do NAND BMT remark... OK Setup download info... OK Get partition table catagory... OK [GPT] Read mirror partition table... OK Checking partition table layout changed... OK Read major partition table... OK Checking major partition table layout changed... OK Download "preloader"... OK Download "vbmeta_a"... OK Download "vbmeta_system_a"... OK Download "vbmeta_vendor_a"... OK Download "md1img_a"... OK Download "spmfw_a"... OK Download "scp_a"... OK Download "sspm_a"... OK Download "cam_vpu1_a"... OK Download "cam_vpu2_a"... OK Download "cam_vpu3_a"... OK Download "gz_a"... OK Download "lk_a"... OK Download "logo_a"... OK Download "boot_a"... OK Download "dtbo_a"... OK Download "tee_a"... OK Download "super"... OK Download "tranfs"... OK Download "userdata"... OK Flashing done! |
03-06-2024, 04:05 | #491 (permalink) |
Freak Poster Join Date: Jun 2015 Location: inside mother's womb Age: 43
Posts: 206
Member: 2418465 Status: Offline Thanks Meter: 34 | Selected model: Samsung SM-A042F (Samsung Galaxy A04e) Operation: Erase FRP Software version: 6.3 Searching USB Flash interface... COM6 detected Setup connection... OK Model: SM-A042F SW version: A042FXXU1AVJ2 Sales code: XNZ Device ID: 1c66a4b3fca8 Vendor: SAMSUNG Product: 4X62MB Unique Number: H153458300D6E2E436B9 FW Version: 4 Capacity: 32 Gb Reading data from phone... OK Sending data to phone... OK Rebooting to download... OK Searching USB Flash interface... COM6 detected Setup connection... OK Sending data to phone... OK Sending data to phone... OK Rebooting... OK Erase FRP done! |
03-06-2024, 23:06 | #492 (permalink) |
Freak Poster Join Date: Mar 2020 Location: bolivia
Posts: 292
Member: 2951556 Status: Offline Thanks Meter: 313 | Selected model: Tecno LD7 (Tecno Pova) Operation: Eliminar FRP Software version: 6.5 Host Power Off... OK Switch virtual port to NONE... OK Connect Type-C to HUB... OK Host Power On... OK Connect phone to [BOX or PC] in PRELOADER Mode Waiting for device... OK Driver: [MediaTek Inc.,wdm_usb,MediaTek PreLoader USB VCOM_V1632 (Android),usb2ser.sys,3.0.1504.0] Device found at COM9 [PRELOADER] Open port... OK Send start cmd... OK Get HW code from device... 0707 Get sec config... OK [00000005] Active sec flags: [SBC DAA] Get HW & SW version from device... OK HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6768] Library Version [2] Select platform... OK Init BROM... OK Force Charge... OK Disable WatchDog Timer... OK Reopen port for libver2... OK Preloader exist. Skip connection verification. Get ME ID... OK ME_ID = 0x4A816AB6, 0x5078C831, 0xB1971B91, 0x8ED56185 Load DownloadAgent... OK Search DA... OK [1] Send bootloader... OK Start bootloader... OK Wait for answer from bootloader... OK Send SYNC signal... OK Setup device enviroment... OK Setup device parametres... OK Receive DA SYNC signal... OK Set DA parametres... OK Get device connection agent... [PRELOADER] Preloader alive. Skip initializing external RAM Get device info... OK EMMC_ID: 0x15010033563643414202CBBFD037283D Send preloader... OK Load DownloadAgent... OK Search DA... OK [8] Send 2nd DA... OK Get device info... OK EMMC INFO: EMMC_CNAME: 3V6CAB EMMC_ID : 0x15010033563643414202CBBFD037283D EMMC_BOOT1: 0x0000400000 (4,00Mb) EMMC_BOOT2: 0x0000400000 (4,00Mb) EMMC_RPMB : 0x0001000000 (16,00Mb) EMMC_USER : 0x1D1EC00000 (116,48Gb) RAM INFO: INT_SRAM: 0x0000070000 (448,00Kb) EXT_RAM : 0x0100000000 (4,00Gb) Checking USB status... USB_HIGH_SPEED [EFUSE INFO]: BROM not disabled Read partitions info from phone... OK Checking A/B state... OK Read product info... [EXT4] ... OK Product Brand : TECNO Product Manufacturer : TECNO MOBILE LIMITED Product Model : TECNO LD7 Product Name : LD7-OP Product Device : TECNO-LD7 Product Board : TECNO-LD7 Board Platform : mt6768 Build ID : QP1A.190711.020 Build Date : Wed Aug 24 18:21:58 CST 2022 Display ID : TECNO-Q-64-220824V456 Security Patch : 2022-08-01 Version SDK : 29 Version Release : 10 Version Codename : REL Firmware Version : 220824V456 Read partition "frp"... OK Backup saved to C:/Program%20Files%20(x86)/Z3X/Pandora/Backup/MTK/Tecno_LD7%20(Tecno%20Pova)/FRP_BACKUP_(2024-3-6_10-57-13)/ Writting FRP data... OK Erase FRP done! |
03-06-2024, 23:13 | #493 (permalink) |
Freak Poster Join Date: Mar 2020 Location: bolivia
Posts: 292
Member: 2951556 Status: Offline Thanks Meter: 313 | Selected model: Infinix X659B (Infinix Hot 10i) Operation: Eliminar FRP Software version: 6.5 Host Power Off... OK Switch virtual port to NONE... OK Connect Type-C to HUB... OK Host Power On... OK Connect phone to [BOX or PC] in PRELOADER Mode Waiting for device... OK Driver: [MediaTek Inc.,wdm_usb,MediaTek PreLoader USB VCOM_V1632 (Android),usb2ser.sys,3.0.1504.0] Device found at COM45 [PRELOADER] Open port... OK Send start cmd... OK Get HW code from device... 0707 Get sec config... OK [00000005] Active sec flags: [SBC DAA] Get HW & SW version from device... OK HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6768] Library Version [2] Select platform... OK Init BROM... OK Force Charge... OK Disable WatchDog Timer... OK Reopen port for libver2... OK Preloader exist. Skip connection verification. Get ME ID... OK ME_ID = 0x1A127B5A, 0x18311931, 0xBD164689, 0x217A12BD Load DownloadAgent... OK Search DA... OK [1] Send bootloader... OK Start bootloader... OK Wait for answer from bootloader... OK Send SYNC signal... OK Setup device enviroment... OK Setup device parametres... OK Receive DA SYNC signal... OK Set DA parametres... OK Get device connection agent... [PRELOADER] Preloader alive. Skip initializing external RAM Get device info... OK EMMC_ID: 0x13014E47314A395339100F940BF528BB Send preloader... OK Load DownloadAgent... OK Search DA... OK [8] Send 2nd DA... OK Get device info... OK EMMC INFO: EMMC_CNAME: G1J9S9 EMMC_ID : 0x13014E47314A395339100F940BF528BB EMMC_BOOT1: 0x0000400000 (4,00Mb) EMMC_BOOT2: 0x0000400000 (4,00Mb) EMMC_RPMB : 0x0001000000 (16,00Mb) EMMC_USER : 0x1D1F000000 (116,48Gb) RAM INFO: INT_SRAM: 0x0000070000 (448,00Kb) EXT_RAM : 0x0100000000 (4,00Gb) Checking USB status... USB_HIGH_SPEED [EFUSE INFO]: BROM not disabled Read partitions info from phone... OK Checking A/B state... OK [B] Read product info... [EXT4] ... OK Product Brand : Infinix Product Manufacturer : INFINIX MOBILITY LIMITED Product Model : Infinix X659B Product Name : X659B-OP Product Device : Infinix-X659B Product Board : Infinix-X659B Board Platform : mt6768 Build ID : RP1A.200720.011 Build Date : Tue Feb 14 10:34:05 CST 2023 Display ID : INFINIX-R-64-230213V172 Security Patch : 2023-02-01 Version SDK : 30 Version Release : 11 Version Codename : REL Firmware Version : 230213V227 Read partition "frp"... OK Backup saved to C:/Program%20Files%20(x86)/Z3X/Pandora/Backup/MTK/Infinix_X659B%20(Infinix%20Hot%2010i)/FRP_BACKUP_(2024-3-6_14-24-24)/ Writting FRP data... OK Erase FRP done! |
03-07-2024, 09:50 | #494 (permalink) |
Freak Poster Join Date: May 2016 Location: MOZAMBIQUE
Posts: 117
Member: 2576731 Status: Offline Thanks Meter: 75 | Vivo V2236 (Vivo Y02a) frp & reset sucefully done Selected model: Vivo V2236 (Vivo Y02a) Operation: Erase FRP Software version: 6.5 Connect Type-C to NONE... OK Host Power Off... OK Connect phone to [PC] in PRELOADER Mode Waiting for device... OK Driver: [MediaTek Inc.,wdm_usb,MediaTek PreLoader USB VCOM_V1632 (Android),usb2ser.sys,3.0.1504.0] Device found at COM7 [PRELOADER] Open port... OK Send start cmd... OK Get HW code from device... 0766 Get sec config... OK [00000005] Active sec flags: [SBC DAA] Get HW & SW version from device... OK HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6765] Library Version [2] Select platform... OK Init BROM... OK Force Charge... OK Disable WatchDog Timer... OK Reopen port for libver2... OK Preloader exist. Skip connection verification. Get ME ID... OK ME_ID = 0x9CEB7868, 0xFEBA4CDA, 0x5E8A2353, 0x416AE82D Load DownloadAgent... OK Search DA... OK [2] Send bootloader... OK Start bootloader... OK Wait for answer from bootloader... OK Send SYNC signal... OK Setup device enviroment... OK Setup device parametres... OK Receive DA SYNC signal... OK Set DA parametres... OK Get device connection agent... [PRELOADER] Preloader alive. Skip initializing external RAM Get device info... OK EMMC_ID: 0x9B010059325030333200C4020EE979C7 Send preloader... OK Load DownloadAgent... OK Search DA... OK [7] Send 2nd DA... OK Get device info... OK EMMC INFO: EMMC_CNAME: Y2P032 EMMC_ID : 0x9B010059325030333200C4020EE979C7 EMMC_BOOT1: 0x0000400000 (4.00Mb) EMMC_BOOT2: 0x0000400000 (4.00Mb) EMMC_RPMB : 0x0001000000 (16.00Mb) EMMC_USER : 0x0747C00000 (29.12Gb) RAM INFO: INT_SRAM: 0x000003A000 (232.00Kb) EXT_RAM : 0x0080000000 (2.00Gb) Checking USB status... USB_HIGH_SPEED [EFUSE INFO]: BROM disabled !!! Read partitions info from phone... OK Checking A/B state... OK Read product info... [EXT4] ... OK Product Brand : vivo Product Manufacturer : vivo Product Model : V2236 Product Name : V2236 Product Device : V2236 Product Board : k65v1_32_bsp_2g_ago Board Platform : mt6765 Build ID : SP1A.210812.003 Build Date : Mon Sep 4 18:36:53 CST 2023 Display ID : SP1A.210812.003 release-keys Security Patch : 2023-09-01 Version SDK : 31 Version Release : 12 Version Codename : REL Firmware Version : compiler09041826 Read partition "frp"... OK Backup saved to C:/Program%20Files%20(x86)/Z3X/Pandora/Backup/MTK/Vivo_V2236%20(Vivo%20Y02a)/FRP_BACKUP_(2024-3-7_10-35-38)/ Writting FRP data... OK Erase FRP done! |
03-07-2024, 10:01 | #495 (permalink) |
Freak Poster Join Date: May 2016 Location: MOZAMBIQUE
Posts: 117
Member: 2576731 Status: Offline Thanks Meter: 75 | OPPO CPH2273 (OPPO A54s) IMEI REPAIR DONE REPAIR IMEI SUCESSFULL WITH V6.5 OPPO CPH2273 (OPPO A54s) HERE THE LOGS Selected model: OPPO CPH2273 (OPPO A54s) Operation: Repair Software version: 6.4 Connect Type-C to NONE... OK Host Power Off... OK Connect phone to [PC] in BROM Mode Waiting for device... OK Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1632,usb2ser.sys,3.0.1504.0] Device found at COM44 [BROM] Open port... OK Send start cmd... OK Get HW code from device... 0766 Get sec config... OK [000000E5] Active sec flags: [SBC DAA] Get HW & SW version from device... OK HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6765] LibUSB installed Library Version [2] Select platform... OK Init BROM... OK Force Charge... OK Disable WatchDog Timer... OK Release testpoint, waiting 2 seconds Advanced Bypass Security... OK Waiting for device... OK Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1632,usb2ser.sys,3.0.1504.0] Device found at COM44 [BROM] Open port... OK Send start cmd... OK Get HW code from device... 0766 Get sec config... OK [000000E0] Active sec flags: [] Get HW & SW version from device... OK HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6765] Library Version [2] Select platform... OK Init BROM... OK Force Charge... OK Disable WatchDog Timer... OK Reopen port for libver2... OK Get ME ID... OK ME_ID = 0xE4518633, 0xBA1C658E, 0xA321BBC9, 0xAC77849E Get Chip ID... [MT6765] Get SOC ID... [7B01727DB80640884447D13D07B485692BD9FDEC0CE448918D 36D192C82ED52B] Get sec config... OK [000000E0] Load DownloadAgent... OK Search DA... OK [7] Send preloader... OK Start preloader... OK Checking preloader answer... OK Send bootloader... OK Start bootloader... OK Wait for answer from bootloader... OK Send SYNC signal... OK Setup device enviroment... OK Setup device parametres... OK Receive DA SYNC signal... OK Set DA parametres... OK Get device connection agent... [BROM] Get device info... OK EMMC_ID: 0x13014E47314A395339101AD40D2319A3 Load EMI from phone... OK Parse EMI config... OK Init EXT RAM... OK Send 2nd DA... OK Get device info... OK EMMC INFO: EMMC_CNAME: G1J9S9 EMMC_ID : 0x13014E47314A395339101AD40D2319A3 EMMC_BOOT1: 0x0000400000 (4.00Mb) EMMC_BOOT2: 0x0000400000 (4.00Mb) EMMC_RPMB : 0x0001000000 (16.00Mb) EMMC_USER : 0x1D1F000000 (116.48Gb) RAM INFO: INT_SRAM: 0x000003A000 (232.00Kb) EXT_RAM : 0x0100000000 (4.00Gb) Checking USB status... USB_HIGH_SPEED Read partitions info from phone... OK Checking A/B state... OK Read product info... [EXT4] ... OK Product Brand : alps Product Manufacturer : alps Product Model : CPH2273 Product Name : vnd_oppo6765 Product Device : oppo6765 Product Board : oppo6765 Board Platform : mt6765 Build ID : RP1A.200720.011 Build Date : Wed Nov 24 02:12:03 CST 2021 Display ID : CPH2273_11_A.01 Security Patch : 2021-11-05 Version SDK : 30 Version Release : 11 Version Codename : REL Firmware Version : 1637690366587 Read security partition from phone... Decrypting security data... OK Encrypt security data... OK Read partition "nvdata"... OK Read partition "protect1"... OK Read partition "nvram"... OK Read NVDATA files... OK Read NVRAM files... OK Read security files... OK Calculating... OK Repairing IMEI... IMEI: 8603140503,,,,, Write IMEI and patch CERT [NVDATA]... OK Checking patch type... [1] Patching CERT... Exception: Access violation at address 017603D3 in module PandoraTool.exe. Read of address E2EC0010 v6.5 done patching Selected model: OPPO CPH2273 (OPPO A54s) Operation: Repair Software version: 6.5 Connect Type-C to NONE... OK Host Power Off... OK Connect phone to [PC] in BROM Mode Waiting for device... OK Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1632,usb2ser.sys,3.0.1504.0] Device found at COM36 [BROM] Open port... OK Send start cmd... OK Get HW code from device... 0766 Get sec config... OK [000000E5] Active sec flags: [SBC DAA] Get HW & SW version from device... OK HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6765] LibUSB installed Library Version [2] Select platform... OK Init BROM... OK Force Charge... OK Disable WatchDog Timer... OK Release testpoint, waiting 2 seconds Advanced Bypass Security... OK Waiting for device... OK Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1632,usb2ser.sys,3.0.1504.0] Device found at COM36 [BROM] Open port... OK Send start cmd... OK Get HW code from device... 0766 Get sec config... OK [000000E0] Active sec flags: [] Get HW & SW version from device... OK HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6765] Library Version [2] Select platform... OK Init BROM... OK Force Charge... OK Disable WatchDog Timer... OK Reopen port for libver2... OK Get ME ID... OK ME_ID = 0xE4518633, 0xBA1C658E, 0xA321BBC9, 0xAC77849E Get Chip ID... [MT6765] Get SOC ID... [7B01727DB80640884447D13D07B485692BD9FDEC0CE448918D 36D192C82ED52B] Get sec config... OK [000000E0] Load DownloadAgent... OK Search DA... OK [7] Send preloader... OK Start preloader... OK Checking preloader answer... OK Send bootloader... OK Start bootloader... OK Wait for answer from bootloader... OK Send SYNC signal... OK Setup device enviroment... OK Setup device parametres... OK Receive DA SYNC signal... OK Set DA parametres... OK Get device connection agent... [BROM] Get device info... OK EMMC_ID: 0x13014E47314A395339101AD40D2319A3 Load EMI from phone... OK Parse EMI config... OK Init EXT RAM... OK Send 2nd DA... OK Get device info... OK EMMC INFO: EMMC_CNAME: G1J9S9 EMMC_ID : 0x13014E47314A395339101AD40D2319A3 EMMC_BOOT1: 0x0000400000 (4.00Mb) EMMC_BOOT2: 0x0000400000 (4.00Mb) EMMC_RPMB : 0x0001000000 (16.00Mb) EMMC_USER : 0x1D1F000000 (116.48Gb) RAM INFO: INT_SRAM: 0x000003A000 (232.00Kb) EXT_RAM : 0x0100000000 (4.00Gb) Checking USB status... USB_HIGH_SPEED Read partitions info from phone... OK Checking A/B state... OK Read product info... [EXT4] ... OK Product Brand : alps Product Manufacturer : alps Product Model : CPH2273 Product Name : vnd_oppo6765 Product Device : oppo6765 Product Board : oppo6765 Board Platform : mt6765 Build ID : RP1A.200720.011 Build Date : Wed Nov 24 02:12:03 CST 2021 Display ID : CPH2273_11_A.01 Security Patch : 2021-11-05 Version SDK : 30 Version Release : 11 Version Codename : REL Firmware Version : 1637690366587 Read security partition from phone... Decrypting security data... OK Encrypt security data... OK Read partition "nvdata"... OK Read partition "protect1"... OK Read partition "nvram"... OK Read NVDATA files... OK Read NVRAM files... OK Read security files... OK Calculating... OK Repairing IMEI... IMEI: 860314050//;;;; Write IMEI and patch CERT [NVDATA]... OK Checking patch type... [1] Patching CERT... OK Save patched partiton... OK Updating NVRAM... OK Read security partition from phone... OK Write security partition to phone... OK Checking additional lock... [ENABLED] Disable additional lock... OK Unlock bootloader done! Selected "Disable VBMETA verification" Read security partition from phone... OK Write security partition to phone... OK Write IMEI and patch CERT [NVRAM]... OK Write partition "nvdata"... OK Write partition "nvram"... OK Repair Security and Patch cert done! If your phone after repair keeps rebooting - use wipe data option. reset sucessfully Selected model: OPPO CPH2273 (OPPO A54s) Operation: Erase FRP And Wipe Software version: 6.5 Erasing of partitions can damage your device. Make sure that you have a backup created. Continue? YES Connect Type-C to NONE... OK Host Power Off... OK Connect phone to [PC] in BROM Mode Waiting for device... OK Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1632,usb2ser.sys,3.0.1504.0] Device found at COM36 [BROM] Open port... OK Send start cmd... OK Get HW code from device... 0766 Get sec config... OK [000000E5] Active sec flags: [SBC DAA] Get HW & SW version from device... OK HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6765] LibUSB installed Library Version [2] Select platform... OK Init BROM... OK Force Charge... OK Disable WatchDog Timer... OK Release testpoint, waiting 2 seconds Advanced Bypass Security... OK Waiting for device... OK Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1632,usb2ser.sys,3.0.1504.0] Device found at COM36 [BROM] Open port... OK Send start cmd... OK Get HW code from device... 0766 Get sec config... OK [000000E0] Active sec flags: [] Get HW & SW version from device... OK HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6765] Library Version [2] Select platform... OK Init BROM... OK Force Charge... OK Disable WatchDog Timer... OK Reopen port for libver2... OK Get ME ID... OK ME_ID = 0xE4518633, 0xBA1C658E, 0xA321BBC9, 0xAC77849E Get Chip ID... [MT6765] Get SOC ID... [7B01727DB80640884447D13D07B485692BD9FDEC0CE448918D 36D192C82ED52B] Get sec config... OK [000000E0] Load DownloadAgent... OK Search DA... OK [7] Send preloader... OK Start preloader... OK Checking preloader answer... OK Send bootloader... OK Start bootloader... OK Wait for answer from bootloader... OK Send SYNC signal... OK Setup device enviroment... OK Setup device parametres... OK Receive DA SYNC signal... OK Set DA parametres... OK Get device connection agent... [BROM] Get device info... OK EMMC_ID: 0x13014E47314A395339101AD40D2319A3 Load EMI from phone... OK Parse EMI config... OK Init EXT RAM... OK Send 2nd DA... OK Get device info... OK EMMC INFO: EMMC_CNAME: G1J9S9 EMMC_ID : 0x13014E47314A395339101AD40D2319A3 EMMC_BOOT1: 0x0000400000 (4.00Mb) EMMC_BOOT2: 0x0000400000 (4.00Mb) EMMC_RPMB : 0x0001000000 (16.00Mb) EMMC_USER : 0x1D1F000000 (116.48Gb) RAM INFO: INT_SRAM: 0x000003A000 (232.00Kb) EXT_RAM : 0x0100000000 (4.00Gb) Checking USB status... USB_HIGH_SPEED Read partitions info from phone... OK Checking A/B state... OK Read product info... [EXT4] ... OK Product Brand : alps Product Manufacturer : alps Product Model : CPH2273 Product Name : vnd_oppo6765 Product Device : oppo6765 Product Board : oppo6765 Board Platform : mt6765 Build ID : RP1A.200720.011 Build Date : Wed Nov 24 02:12:03 CST 2021 Display ID : CPH2273_11_A.01 Security Patch : 2021-11-05 Version SDK : 30 Version Release : 11 Version Codename : REL Firmware Version : 1637690366587 Read partition "frp"... OK Backup saved to C:/Program%20Files%20(x86)/Z3X/Pandora/Backup/MTK/OPPO_CPH2273%20(OPPO%20A54s)/FRP_BACKUP_(2024-3-6_11-49-35)/ Writting FRP data... OK Formatting "userdata" partition... OK Formatting "cache" partition... OK Formatting "metadata" partition... OK Formatting "md_udc" partition... OK Wipe data done! |
Bookmarks |
| |
|