![]() ![]() ![]() ![]() |
![]() |
Welcome to the GSM-Forum forums. You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. Only registered members may post questions, contact other members or search our database of over 8 million posts. Registration is fast, simple and absolutely free so please - Click to REGISTER! If you have any problems with the registration process or your account login, please contact contact us . |
|
Register | FAQ | Donate | Forum Rules | Root any Device | ★iPhone Unlock★ | ★ Direct Codes ★ | Direct Unlock Source | Search | Today's Posts | Mark Forums Read |
![]() |
| LinkBack | Thread Tools | Display Modes |
![]() | #16 (permalink) |
Product Supporter ![]() ![]() ![]() Join Date: Mar 2008 Location: Thailand Age: 47
Posts: 920
Member: 716581 Status: Offline Thanks Meter: 767 | Infinix HOT9 Play Wipe data / Erase FRP By Pandora Box |
![]() |
The Following 2 Users Say Thank You to nongmobile For This Useful Post: |
![]() | #17 (permalink) |
No Life Poster ![]() ![]() ![]() ![]() ![]() Join Date: Dec 2016 Location: .
Posts: 874
Member: 2659717 Status: Offline Thanks Meter: 487 | Tecno B1p dead boot unbrick done wrong preloader flashed successfully done best mtk tool ever Selected model: Mediatek Mediatek Operation: Flash (Upgrade) Software version: 1.7 Parse scatter file... OK Load Rom Images... OK Host Power Off... OK Switch virtual port to USB... OK Connect Type-C to BOX... OK Host Power On... OK Wait for device... OK Read usbhost speed... FULL Read Device Descriptor... Get VID/PID...0E8D/0003 Send start cmd... OK Get HW code from device... 6580 Get HW & SW version from device... OK HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6580] Get sec config... OK [00000005] Active sec flags: [SBC DAA] Advanced Bypass Security... OK Disconnect virtual port... OK Connect Type-C to HUB... OK Wait for device connecting... OK Device found at COM41 [BROM] Open port... OK Send start cmd... OK Get HW code from device... 6580 Get HW & SW version from device... OK HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6580] Library Version [1] Select platform... OK Init BROM... OK Force Charge... OK Disable WatchDog Timer... OK Load DownloadAgent... OK ME_ID = 0x513E2F39, 0x85A10C65, 0xA15E0AD8, 0xF52AA3D0 Get sec config... OK [00000000] Get BROM version... OK Search DA... OK [12] Send preloader... OK Start preloader... OK Check preloader answer... OK Send bootloader... OK Start bootloader... OK Check bootloader answer... OK Wait for answer from bootloader... OK Wait for hw detection... OK StorageType matched! Wait DA version... v4.2 Send BROM version... OK Send storage config... OK SyncBmtInfoWithDA... OK Set params... OK Read flash info... OK EMMC_ID: 0x460001154D3236451F20034269565F07 Load EMI config from preloader... OK Init DRAM... OK Enable DRAM... OK Sync with DA... OK Wait for DA H/W detection... OK EMMC INFO: EMMC_ID : 0x150100464536324D4203201F075F5669 EMMC_BOOT1: 0x0000400000 (4.00Mb) EMMC_BOOT2: 0x0000400000 (4.00Mb) EMMC_RPMB : 0x0000400000 (4.00Mb) EMMC_USER : 0x03A3E00000 (14.56Gb) RAM INFO: INT_SRAM: 0x0000020000 (128.00Kb) EXT_RAM : 0x0040000000 (1.00Gb) Check USB status... USB_FULL_SPEED Switching to USB high speed... OK Wait for device... OK High Speed USB detected at COM42 Open port... OK Check USB status... USB_HIGH_SPEED Prepare list for upgrade... OK Check upgrade list... OK Prepare format list... OK Prepare final partition list... OK Read partition preloader... OK Read partition proinfo... OK Read partition nvram... OK Read partition protect1... OK Read partition protect2... OK Read partition persist... OK Verify checksum... OK Format EMMC_BOOT1_BOOT2 partition... OK Format EMMC_USER partition... OK Format EMMC_USER partition... OK Check sec info... OK Check SUSBDL Status... enabled Verify PL... OK Do BMT remark... OK Download BootLoader... OK Update ROM info... OK Verify "lk"... OK Secure USB Authenticate Image... OK Secure USB ImageInfo Check... OK Verify "lk2"... OK Secure USB Authenticate Image... OK Secure USB ImageInfo Check... OK Verify "boot"... OK Secure USB Authenticate Image... OK Secure USB ImageInfo Check... OK Verify "recovery"... OK Secure USB Authenticate Image... OK Secure USB ImageInfo Check... OK Verify "logo"... OK Secure USB Authenticate Image... OK Secure USB ImageInfo Check... OK Verify "odmdtbo"... OK Secure USB Authenticate Image... OK Secure USB ImageInfo Check... OK Verify "vendor"... OK Secure USB Authenticate Image... OK Secure USB ImageInfo Check... OK Verify "tkv"... OK Check for unsigned image "tkv"... OK Verify "tee1"... OK Secure USB Authenticate Image... OK Secure USB ImageInfo Check... OK Verify "tee2"... OK Secure USB Authenticate Image... OK Secure USB ImageInfo Check... OK Verify "secro"... OK Secure USB Authenticate Image... OK Secure USB ImageInfo Check... OK Verify "system"... OK Secure USB Authenticate Image... OK Secure USB ImageInfo Check... OK Verify "cache"... OK Secure USB Authenticate Image... OK Secure USB ImageInfo Check... OK Verify "userdata"... OK Secure USB Authenticate Image... OK Secure USB ImageInfo Check... OK Downloading "lk"... OK Downloading "lk2"... OK Downloading "boot"... OK Downloading "recovery"... OK Downloading "logo"... OK Downloading "odmdtbo"... OK Downloading "vendor"... OK Downloading "tkv"... OK Downloading "tee1"... OK Downloading "tee2"... OK Downloading "secro"... OK Downloading "system"... OK Downloading "cache"... OK Downloading "userdata"... OK Verify images checksum... OK Write SEC CFG... OK Update ROM info... OK Check parametres... OK Write file "proinfo.bin"... OK Check parametres... OK Write file "nvram.bin"... OK Check parametres... OK Write file "protect1.bin"... OK Check parametres... OK Write file "protect2.bin"... OK Check parametres... OK Write file "persist.bin"... OK Flashing done! |
![]() |
The Following User Says Thank You to mickeybrown026 For This Useful Post: |
![]() | #20 (permalink) |
Product Supporter ![]() ![]() ![]() Join Date: Mar 2008 Location: Thailand Age: 47
Posts: 920
Member: 716581 Status: Offline Thanks Meter: 767 | Wiko VIEW3 Write Flash By Pandora Box Wiko VIEW3 Write Flash By Pandora Box ![]() Selected model: Mediatek Mediatek Operation: Flash (Upgrade) Software version: 1.7 Parse scatter file... OK Load Rom Images... OK Host Power Off... OK Switch virtual port to USB... OK Connect Type-C to BOX... OK Host Power On... OK Wait for device... OK Read usbhost speed... HIGH Read Device Descriptor... Get VID/PID...0E8D/0003 Send start cmd... OK Get HW code from device... 0766 Get HW & SW version from device... OK HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6765] Get sec config... OK [000000E1] Active sec flags: [SBC] Advanced Bypass Security... OK Disconnect virtual port... OK Connect Type-C to HUB... OK Wait for device connecting... OK Device found at COM43 [BROM] Open port... OK Send start cmd... OK Get HW code from device... 0766 Get HW & SW version from device... OK HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6765] Library Version [2] Select platform... OK Init BROM... OK Force Charge... OK Disable WatchDog Timer... OK Reopen port for libver2... OK Get ME ID... OK ME_ID = 0x6FF0FA6A, 0xF5DAA0C5, 0x6646C54A, 0x8F459A60 Get Chip ID... [MT6765] Get SOC ID... [F2AE49D0A40FE220D565EED39DD73D0FFB161D8637BD44922B 0EB7BB597BCECC] Get sec config... OK [000000E0] Load DownloadAgent... OK Search DA... OK [29] Send preloader... OK Start preloader... OK Check preloader answer... OK Send bootloader... OK Start bootloader... OK Wait for answer from bootloader... OK Send SYNC signal... OK Setup device enviroment... OK Setup device parametres... OK Receive DA SYNC signal... OK Set DA parametres... OK Get device connection agent... [BROM] Get device info... OK EMMC_ID: 0x700100544132383332201997D5AC260F Load EMI config from preloader... OK Init EXT RAM... OK Send 2nd DA... OK Get device info... OK EMMC INFO: EMMC_ID : 0x700100544132383332201997D5AC260F EMMC_BOOT1: 0x0000400000 (4.00Mb) EMMC_BOOT2: 0x0000400000 (4.00Mb) EMMC_RPMB : 0x0000400000 (4.00Mb) EMMC_USER : 0x074A000000 (29.16Gb) RAM INFO: INT_SRAM: 0x000003A000 (232.00Kb) EXT_RAM : 0x00C0000000 (3.00Gb) Get scatter info... OK Check USB status... USB_HIGH_SPEED Prepare list for upgrade... OK Check upgrade list... OK Prepare format list... OK Prepare final partition list... OK Read partition "preloader"... OK Read partition "nvcfg"... OK Read partition "protect1"... OK Read partition "protect2"... OK Read partition "persist"... OK Read partition "proinfo"... OK Read partition "nvram"... OK Verify checksum... OK Format EMMC_USER partition( 0x00008000..0x03687FFF )... OK Format EMMC_USER partition( 0x05688000..0x0B687FFF )... OK Format EMMC_USER partition( 0x0C800000..0x0CFFFFFF )... OK Format EMMC_USER partition( 0x10000000..0x107FFFFF )... OK Format EMMC_USER partition( 0x10B00000..0x19FFFFFF )... OK Format EMMC_USER partition( 0x1E000000..0x7464FBDFF )... OK Get scatter info... OK Verify scatter file... OK Do NAND BMT remark... OK Setup download info... OK Get partition table catagory... OK [GPT] Read mirror partition table... OK Check partition table layout changed... OK Read major partition table... OK Check major partition table layout changed... OK Download "preloader"... OK Download "recovery"... OK Download "md1img"... OK Download "spmfw"... OK Download "scp1"... OK Download "scp2"... OK Download "sspm_1"... OK Download "sspm_2"... OK Download "lk"... OK Download "lk2"... OK Download "boot"... OK Download "logo"... OK Download "dtbo"... OK Download "tee1"... OK Download "tee2"... OK Download "vendor"... OK Download "system"... OK Download "vbmeta"... OK Download "cache"... OK Download "userdata"... OK Write file "nvcfg.bin"... OK Write file "protect1.bin"... OK Write file "protect2.bin"... OK Write file "persist.bin"... OK Write file "proinfo.bin"... OK Write file "nvram.bin"... OK Flashing done! |
![]() |
![]() | #21 (permalink) |
No Life Poster ![]() ![]() ![]() ![]() ![]() Join Date: Jul 2011 Location: Nairobi, Kenya
Posts: 540
Member: 1610674 Status: Offline Sonork: 210921 Thanks Meter: 221 | Readmi note 9 merlin imei repair without eng rom both imei 1 and 2 repair done in flash mode no need eng rom Selected model: Xiaomi M2004J7AC (Redmi 10X 5G) Operation: Repair Software version: 1.7 Host Power Off... OK Switch virtual port to USB... OK Connect Type-C to BOX... OK Host Power On... OK Wait for device... OK Read usbhost speed... HIGH Read Device Descriptor... Get VID/PID...0E8D/0003 Send start cmd... OK Get HW code from device... 0707 Get HW & SW version from device... OK HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6768] Get sec config... OK [000000E7] Active sec flags: [SBC SLA DAA] Advanced Bypass Security... OK Disconnect virtual port... OK Connect Type-C to HUB... OK Wait for device connecting... OK Device found at COM30 [BROM] Open port... OK Send start cmd... OK Get HW code from device... 0707 Get HW & SW version from device... OK HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6768] Library Version [2] Select platform... OK Init BROM... OK Force Charge... OK Disable WatchDog Timer... OK Reopen port for libver2... OK Get ME ID... OK ME_ID = 0xC728F050, 0x7470C11D, 0xCE3B2AE3, 0x7E8BC3C3 Get Chip ID... [MT6768] Get SOC ID... [5F075FBE2CEC9F113D15B1EBF5283E73C21DAE86D5BECC390C D344853BF6C171] Get sec config... OK [000000E0] Load DownloadAgent... OK Search DA... OK [31] Send preloader... OK Start preloader... OK Check preloader answer... OK Send bootloader... OK Start bootloader... OK Wait for answer from bootloader... OK Send SYNC signal... OK Setup device enviroment... OK Setup device parametres... OK Receive DA SYNC signal... OK Set DA parametres... OK Get device connection agent... [BROM] Get device info... OK EMMC_ID: 0x13014E53304A394A38101A3D8A6C378F Load EMI config from database [DB VER: 56 DB DATE: 04-11-2021] OK [1] Trying EMI [293BC252] Init EXT RAM... OK Send 2nd DA... OK Get device info... OK EMMC INFO: EMMC_ID : 0x13014E53304A394A38101A3D8A6C378F EMMC_BOOT1: 0x0000400000 (4.00Mb) EMMC_BOOT2: 0x0000400000 (4.00Mb) EMMC_RPMB : 0x0001000000 (16.00Mb) EMMC_USER : 0x0E8F800000 (58.24Gb) RAM INFO: INT_SRAM: 0x0000070000 (448.00Kb) EXT_RAM : 0x0100000000 (4.00Gb) Check USB status... USB_HIGH_SPEED Read partitions info from phone... OK Read partition "nvdata"... OK Read partition "nvram"... OK Read NVRAM files... OK Read IMEI... OK Read NVDATA files... OK Read IMEI... OK IMEI 1: IMEI 2: 000000000000000 Set new IMEI to: IMEI 1: 86500074xxxxxx IMEI 2: 86500074xxxxxx Write IMEI... OK Format EMMC_USER partition( 0x0C4A2000..0x104A1FFF )... OK Repair Security done! |
![]() |
![]() | #23 (permalink) |
No Life Poster ![]() ![]() ![]() ![]() ![]() Join Date: May 2005 Location: Tirana Age: 44
Posts: 793
Member: 143851 Status: Offline Thanks Meter: 163 | TMB 5007Z Revvl 4 unlock done Selected model: TMB 5007Z (Revvl 4) Operation: Unlock network Software version: 1.6 Host Power Off... OK Switch virtual port to USB... OK Connect Type-C to BOX... OK Host Power On... OK Wait for device... OK Read usbhost speed... HIGH Read Device Descriptor... Get VID/PID...0E8D/0003 Send start cmd... OK Get HW code from device... 0717 Get HW & SW version from device... OK HW VER: CA01, SW VER: 0200, HW SUB CODE: 8A00 Detect chip [MT6761] Get sec config... OK [000000E7] Active sec flags: [SBC SLA DAA] Advanced Bypass Security... OK Disconnect virtual port... OK Connect Type-C to HUB... OK Wait for device connecting... OK Device found at COM37 [BROM] Open port... OK Send start cmd... OK Get HW code from device... 0717 Get HW & SW version from device... OK HW VER: CA01, SW VER: 0200, HW SUB CODE: 8A00 Detect chip [MT6761] Library Version [2] Select platform... OK Init BROM... OK Force Charge... OK Disable WatchDog Timer... OK Reopen port for libver2... OK Get ME ID... OK ME_ID = 0xBF3CA0FD, 0x8102D0EF, 0xA7FBAAE7, 0x17B54E63 Get Chip ID... [MT6761] Get SOC ID... [8338F507747A171BC97CB14AEBC9B8963E2E3670FE03ADC212 0E088EC1C5D5B7] Get sec config... OK [000000E0] Load DownloadAgent... OK Search DA... OK [30] Send preloader... OK Start preloader... OK Check preloader answer... OK Send bootloader... OK Start bootloader... OK Wait for answer from bootloader... OK Send SYNC signal... OK Setup device enviroment... OK Setup device parametres... OK Receive DA SYNC signal... OK Set DA parametres... OK Get device connection agent... [BROM] Get device info... OK EMMC_ID: 0x1501003458364B4D420305D1DCEC97F9 Load EMI config from database [DB VER: 47 DB DATE: 04-02-2021] OK [1] Trying EMI [44724C4B, 7CB86554, 9C47C7D7, C26ECB0F, CCFE52E9, 2E865ED1, 4C76F2A3] Init EXT RAM... OK Send 2nd DA... OK Get device info... OK EMMC INFO: EMMC_ID : 0x1501003458364B4D420305D1DCEC97F9 EMMC_BOOT1: 0x0000400000 (4.00Mb) EMMC_BOOT2: 0x0000400000 (4.00Mb) EMMC_RPMB : 0x0000400000 (4.00Mb) EMMC_USER : 0x0747C00000 (29.12Gb) RAM INFO: INT_SRAM: 0x0000039000 (228.00Kb) EXT_RAM : 0x0080000000 (2.00Gb) Check USB status... USB_HIGH_SPEED Read partitions info from phone... OK Read security partition from phone... OK Read security files... OK Read lock info... OK Write lock info... OK Write security partition to phone... OK Network Unlock done! Selected model: TMB 5007Z (Revvl 4) Operation: Unlock network Software version: 1.6 Host Power Off... OK Switch virtual port to USB... OK Connect Type-C to BOX... OK Host Power On... OK Wait for device... OK Read usbhost speed... HIGH Read Device Descriptor... Get VID/PID...0E8D/0003 Send start cmd... OK Get HW code from device... 0717 Get HW & SW version from device... OK HW VER: CA01, SW VER: 0200, HW SUB CODE: 8A00 Detect chip [MT6761] Get sec config... OK [000000E7] Active sec flags: [SBC SLA DAA] Advanced Bypass Security... OK Disconnect virtual port... OK Connect Type-C to HUB... OK Wait for device connecting... OK Device found at COM37 [BROM] Open port... OK Send start cmd... OK Get HW code from device... 0717 Get HW & SW version from device... OK HW VER: CA01, SW VER: 0200, HW SUB CODE: 8A00 Detect chip [MT6761] Library Version [2] Select platform... OK Init BROM... OK Force Charge... OK Disable WatchDog Timer... OK Reopen port for libver2... OK Get ME ID... OK ME_ID = 0xC2DB2AF7, 0x01B5A2E8, 0x255416A3, 0x0206ACE3 Get Chip ID... [MT6761] Get SOC ID... [A3282D9C4150FF60690AF3FBC5AA8D737740A7A3FEEEF97362 A4A5DD10A8AD70] Get sec config... OK [000000E0] Load DownloadAgent... OK Search DA... OK [30] Send preloader... OK Start preloader... OK Check preloader answer... OK Send bootloader... OK Start bootloader... OK Wait for answer from bootloader... OK Send SYNC signal... OK Setup device enviroment... OK Setup device parametres... OK Receive DA SYNC signal... OK Set DA parametres... OK Get device connection agent... [BROM] Get device info... OK EMMC_ID: 0x1501003458364B4D420305C8DC1497F5 Load EMI config from database [DB VER: 47 DB DATE: 04-02-2021] OK [1] Trying EMI [44724C4B, 7CB86554, 9C47C7D7, C26ECB0F, CCFE52E9, 2E865ED1, 4C76F2A3] Init EXT RAM... OK Send 2nd DA... OK Get device info... OK EMMC INFO: EMMC_ID : 0x1501003458364B4D420305C8DC1497F5 EMMC_BOOT1: 0x0000400000 (4.00Mb) EMMC_BOOT2: 0x0000400000 (4.00Mb) EMMC_RPMB : 0x0000400000 (4.00Mb) EMMC_USER : 0x0747C00000 (29.12Gb) RAM INFO: INT_SRAM: 0x0000039000 (228.00Kb) EXT_RAM : 0x0080000000 (2.00Gb) Check USB status... USB_HIGH_SPEED Read partitions info from phone... OK Read security partition from phone... OK Read security files... OK Read lock info... OK Write lock info... OK Write security partition to phone... OK Network Unlock done! Selected model: TMB 5007Z (Revvl 4) Operation: Unlock network Software version: 1.6 Host Power Off... OK Switch virtual port to USB... OK Connect Type-C to BOX... OK Host Power On... OK Wait for device... OK Read usbhost speed... HIGH Read Device Descriptor... Get VID/PID...0E8D/0003 Send start cmd... OK Get HW code from device... 0717 Get HW & SW version from device... OK HW VER: CA01, SW VER: 0200, HW SUB CODE: 8A00 Detect chip [MT6761] Get sec config... OK [000000E7] Active sec flags: [SBC SLA DAA] Advanced Bypass Security... OK Disconnect virtual port... OK Connect Type-C to HUB... OK Wait for device connecting... OK Device found at COM37 [BROM] Open port... OK Send start cmd... OK Get HW code from device... 0717 Get HW & SW version from device... OK HW VER: CA01, SW VER: 0200, HW SUB CODE: 8A00 Detect chip [MT6761] Library Version [2] Select platform... OK Init BROM... OK Force Charge... OK Disable WatchDog Timer... OK Reopen port for libver2... OK Get ME ID... OK ME_ID = 0x3FADD426, 0xC6CDA57F, 0x0F7B648E, 0x2D8AF585 Get Chip ID... [MT6761] Get SOC ID... [65BC4E3430A3923A04EC698442E2321D29BF6BAF01B6E0CD63 9A9229C9AA2ED1] Get sec config... OK [000000E0] Load DownloadAgent... OK Search DA... OK [30] Send preloader... OK Start preloader... OK Check preloader answer... OK Send bootloader... OK Start bootloader... OK Wait for answer from bootloader... OK Send SYNC signal... OK Setup device enviroment... OK Setup device parametres... OK Receive DA SYNC signal... OK Set DA parametres... OK Get device connection agent... [BROM] Get device info... OK EMMC_ID: 0x1501003458364B4D4203063DDC6D97B1 Load EMI config from database [DB VER: 47 DB DATE: 04-02-2021] OK [1] Trying EMI [44724C4B, 7CB86554, 9C47C7D7, C26ECB0F, CCFE52E9, 2E865ED1, 4C76F2A3] Init EXT RAM... OK Send 2nd DA... OK Get device info... OK EMMC INFO: EMMC_ID : 0x1501003458364B4D4203063DDC6D97B1 EMMC_BOOT1: 0x0000400000 (4.00Mb) EMMC_BOOT2: 0x0000400000 (4.00Mb) EMMC_RPMB : 0x0000400000 (4.00Mb) EMMC_USER : 0x0747C00000 (29.12Gb) RAM INFO: INT_SRAM: 0x0000039000 (228.00Kb) EXT_RAM : 0x0080000000 (2.00Gb) Check USB status... USB_HIGH_SPEED Read partitions info from phone... OK Read security partition from phone... OK Read security files... OK Read lock info... OK Write lock info... OK Write security partition to phone... OK Network Unlock done! |
![]() |
![]() | #24 (permalink) |
Insane Poster ![]() ![]() ![]() Join Date: Feb 2014
Posts: 60
Member: 2121390 Status: Offline Thanks Meter: 12 | huawei dra-lx3 unlock nerwork Selected model: Huawei UNKNOWN Operation: Unlock network Software version: 1.9 Host Power Off... OK Switch virtual port to USB... OK Connect Type-C to BOX... OK Host Power On... OK Wait for device... OK Read usbhost speed... HIGH Read Device Descriptor... Get VID/PID...0E8D/0003 Send start cmd... OK Get HW code from device... 0699 Get HW & SW version from device... OK HW VER: CB00, SW VER: 0002, HW SUB CODE: 8A00 Detect chip [MT6739] Get sec config... OK [000000E3] Active sec flags: [SBC SLA] Advanced Bypass Security... OK Disconnect virtual port... OK Connect Type-C to HUB... OK Wait for device connecting... OK Device found at COM110 [BROM] Open port... OK Send start cmd... OK Get HW code from device... 0699 Get HW & SW version from device... OK HW VER: CB00, SW VER: 0002, HW SUB CODE: 8A00 Detect chip [MT6739] Library Version [2] Select platform... OK Init BROM... OK Force Charge... OK Disable WatchDog Timer... OK Reopen port for libver2... OK Get ME ID... OK ME_ID = 0xDE2F4B21, 0x058F33BA, 0x25DEAFF4, 0x113F4178 Get Chip ID... [MT6739] Get SOC ID... [1D2578ABEFD720434D36E2FF64C808671063818C4570BAD1D8 A2FFA5F1101FB9] Get sec config... OK [000000E0] Load DownloadAgent... OK Search DA... OK [0] Send preloader... OK Start preloader... OK Check preloader answer... OK Send bootloader... OK Start bootloader... OK Wait for answer from bootloader... OK Send SYNC signal... OK Setup device enviroment... OK Setup device parametres... OK Receive DA SYNC signal... OK Set DA parametres... OK Get device connection agent... [BROM] Get device info... OK EMMC_ID: 0x150100464536324D420615999AD64725 Load EMI config from database [DB VER: 79 DB DATE: 04-28-2021] OK [2] Trying EMI [FC9B8C75, 50D22373] Init EXT RAM... OK Send 2nd DA... OK Get device info... OK EMMC INFO: EMMC_ID : 0x150100464536324D420615999AD64725 EMMC_BOOT1: 0x0000400000 (4.00Mb) EMMC_BOOT2: 0x0000400000 (4.00Mb) EMMC_RPMB : 0x0000400000 (4.00Mb) EMMC_USER : 0x03A3E00000 (14.56Gb) RAM INFO: INT_SRAM: 0x0000020000 (128.00Kb) EXT_RAM : 0x0040000000 (1.00Gb) Check USB status... USB_HIGH_SPEED Read partitions info from phone... OK Read security partition from phone... OK Read security files... OK Read lock info... OK Write lock info... OK Write security partition to phone... OK Network Unlock done! |
![]() |
![]() | #29 (permalink) | |||
No Life Poster ![]() ![]() ![]() ![]() ![]() ![]() Join Date: Apr 2008 Location: -=Cellulare Zone Europ-EGYPT=-
Posts: 1,227
Member: 762055 Status: Online Sonork: -=664053=- Thanks Meter: 781 ![]() | Operation: Erase FRP Quote:
Quote:
Quote:
BR, -=MR_Gsm=- | |||
![]() |
![]() | #30 (permalink) |
Product Supporter ![]() ![]() ![]() Join Date: Mar 2008 Location: Thailand Age: 47
Posts: 920
Member: 716581 Status: Offline Thanks Meter: 767 | OPPO A12 Wipe Data Done. ![]() Selected model: OPPO CPH2077 (Oppo A12) Operation: Wipe Data Software version: 1.13 There is a risk of data loss. This procedure will erase all User Data Make sure that you have a backup created. Continue? YES Host Power Off... OK Switch virtual port to USB... OK Connect Type-C to BOX... OK Host Power On... OK Wait for device... OK Read usbhost speed... HIGH Read Device Descriptor... Get VID/PID...0E8D/0003 Send start cmd... OK Get HW code from device... 0766 Get HW & SW version from device... OK HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6765] Get sec config... OK [000000E5] Active sec flags: [SBC DAA] Advanced Bypass Security... OK Disconnect virtual port... OK Connect Type-C to HUB... OK Wait for device connecting... OK Device found at COM43 [BROM] Open port... OK Send start cmd... OK Get HW code from device... 0766 Get HW & SW version from device... OK HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6765] Library Version [2] Select platform... OK Init BROM... OK Force Charge... OK Disable WatchDog Timer... OK Reopen port for libver2... OK Get ME ID... OK ME_ID = 0x5561CE16, 0x050B0E25, 0xCEABD163, 0x573BC05D Get Chip ID... [MT6765] Get SOC ID... [71A91F835648ED76ACBC0148D13CE452584141BB3CB7C18EAB DB8A556DF72CF7] Get sec config... OK [000000E0] Load DownloadAgent... OK Search DA... OK [23] Send preloader... OK Start preloader... OK Check preloader answer... OK Send bootloader... OK Start bootloader... OK Wait for answer from bootloader... OK Send SYNC signal... OK Setup device enviroment... OK Setup device parametres... OK Receive DA SYNC signal... OK Set DA parametres... OK Get device connection agent... [BROM] Get device info... OK EMMC_ID: 0x90014A68423861503E03518A4275171F Load EMI config from database [DB VER: 121 DB DATE: 06-07-2021] OK [1] Trying EMI [B772E8DA, 7805E65B, D8F5BD39, 4C76F2A3, BCFFEFAA, 1BB1F176, E1B3CCEC, 4ECF8C5A, 44724C4B, 148572B4] Init EXT RAM... OK Send 2nd DA... OK Get device info... OK EMMC INFO: EMMC_ID : 0x90014A68423861503E03518A4275171F EMMC_BOOT1: 0x0000400000 (4.00Mb) EMMC_BOOT2: 0x0000400000 (4.00Mb) EMMC_RPMB : 0x0001000000 (16.00Mb) EMMC_USER : 0x0747C00000 (29.12Gb) RAM INFO: INT_SRAM: 0x000003A000 (232.00Kb) EXT_RAM : 0x00C0000000 (3.00Gb) Check USB status... USB_HIGH_SPEED Read partitions info from phone... OK Format "userdata" partition... OK Wipe data done! |
![]() |
![]() |
Bookmarks |
Thread Tools | |
Display Modes | |
| |
|