|
Welcome to the GSM-Forum forums. You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. Only registered members may post questions, contact other members or search our database of over 8 million posts. Registration is fast, simple and absolutely free so please - Click to REGISTER! If you have any problems with the registration process or your account login, please contact contact us . |
|
Register | FAQ | Donate | Forum Rules | Root any Device | ★iPhone Unlock★ | ★ Direct Codes ★ | Direct Unlock Source |
Avengers Box (Multi Unlocker Box) |
| LinkBack | Thread Tools | Display Modes |
07-11-2021, 08:59 | #1 (permalink) |
Registered User Join Date: Aug 2016 Location: Multan Pakistan
Posts: 787
Member: 2608490 Status: Offline Thanks Meter: 921 | Vivo Y12s ( V2026_21 ) Dump Firmware Done By Avengers [21]META Port Detected: MediaTek DA USB VCOM (Android) (COM21) USB\VID_0E8D&PID_2007\6&3C8ADF&0&6 Start sync target, waiting responce..... ChipID: MT6765 [MT6765]Using Algo 5 Brand: vivo Board: k65v1_64_bsp Model: V2026_21 Name: 2026TM1 Device: 2026 Release: QP1A.190711.020 release-keys Version: 10 Security Patch: 2021-04-01 [helio]Wait untill phone will start charging. [0]All done. Action : Read Firmware. Selected 0-By CPU:ELBRUS Exe version: Avengers Box MTK 0.7.8 Phone must be off with battery inside. Battery must be charged Please connect phone in brom mode For some phones need to keep "VOL-" button untill inserting USB cable. For some phones need to keep "VOL+ and VOL-" button untill inserting USB cable. For some phones need to keep "VOL+" button untill inserting USB cable. Detected(3) : MediaTek USB Port (COM3) [3] \\?\usb#vid_0e8d&pid_0003#6&3c8adf&0&6#{a5dcbf10-6530-11d2-901f-00c04fb951ed} CPU: MT6765 CPU code: 766 Target config: e5 Secure boot enabled: true Need serial link authorization: false Need download agent authorization true Executing exploit, do not disconnect phone Exploit has been executed successfully. Dumping phone preloader. Waiting for handle to become active...... Reseived active handle repply from phone...... Booting phone Detected(3) : MediaTek USB Port (COM3) [3] \\?\usb#vid_0e8d&pid_0003#6&3c8adf&0&6#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Boot mode: Brom Phone detected...Please wait BBCHIP: 6765 0 ca00 Using Algo 1. Helio MT6765 phone detected, swithing to helio api Helio enabled DRAM in First Da: FALSE Sending loader..... BBCHIP MT6765 [1]Storage EMMC EMMC FW VERSION: 00:00:00:00:00:00:00:00 EMMC CID: 90014A68423861 : 000000000000000000 EMMC UA SIZE: 0x747c00000 BOOT STYLE: EMMC BOOT FULL LENGTH: 0x749400000 [29.145 GB] Status: USB_HIGH_SPEED Detecting high speed port, wait...... If driver not installed, install high speed port driver. If not need high speed port, disable it. After repeat opperation. Detected(4) : MediaTek DA USB VCOM (Android) (COM4) [4] \\?\usb#vid_0e8d&pid_2001#6&3c8adf&0&6#{a5dcbf10-6530-11d2-901f-00c04fb951ed} FRP partition: /dev/block/platform/bootdevice/by-name/frp Phone have OTP partition. Modem version: MOLY.LR12A.R2.MP.V102.7.P69 IMEI[1]: xxxxxxxxxxxxxxxxxx IMEI[2]: xxxxxxxxxxxxxxxxxx Start dumping flash, this can take up to 1 hour....... Dumping Preloader. Partition: boot_para Partition: recovery Partition: para Partition: expdb Partition: vbmeta_system Partition: vbmeta_vendor Partition: frp Partition: nvcfg Partition: nvdata Partition: backup Partition: survival Partition: reserved Partition: cust Partition: vgc Partition: storage Partition: logdump Partition: md_udc Partition: metadata Partition: protect1 Partition: protect2 Partition: seccfg Partition: persist Partition: sec1 Partition: proinfo Partition: efuse Partition: md1img Partition: spmfw Partition: scp1 Partition: scp2 Partition: sspm_1 Partition: sspm_2 Partition: gz1 Partition: gz2 Partition: nvram Partition: lk Partition: lk2 Partition: boot Partition: logo Partition: dtbo Partition: tee1 Partition: tee2 Partition: super Partition: vbmeta Partition: cache Partition: userdata Partition: otp Partition: flashinfo Start processing recovery recovery.img Reading: BEGIN: 0x108000 - LEN: 0x6000000 Start processing vbmeta_system vbmeta_system.img Start processing vbmeta_vendor vbmeta_vendor.img Start processing nvdata.img ...... Reading: BEGIN: 0xa688000 - LEN: 0x4000000 Start processing survival survival.img Reading: BEGIN: 0xf088000 - LEN: 0x6000000 Start processing cust cust.img Reading: BEGIN: 0x15a88000 - LEN: 0x4000000 Start processing protect1.img ...... Reading: BEGIN: 0x31922000 - LEN: 0x800000 Start processing protect2.img ...... Reading: BEGIN: 0x32122000 - LEN: 0xede000 Start processing persist.img ...... Reading: BEGIN: 0x33800000 - LEN: 0x3000000 Start processing proinfo.bin ...... Reading: BEGIN: 0x36a00000 - LEN: 0x300000 Start processing md1img md1img.img Start processing spmfw spmfw.img Start processing scp1 scp.img Start processing sspm_1 sspm.img Start processing nvram.bin ...... Reading: BEGIN: 0x3f680000 - LEN: 0x4000000 Start processing lk lk.img Start processing boot boot.img Reading: BEGIN: 0x4b680000 - LEN: 0x6000000 Start processing logo logo.bin Start processing dtbo dtbo.img Reading: BEGIN: 0x51e80000 - LEN: 0x800000 Start processing tee1 tee.img Start processing super super.img Reading: BEGIN: 0x53800000 - LEN: 0x180000000 Start processing vbmeta vbmeta.img Start processing cache cache.img Start processing userdata userdata.img Saved to : C:\ProgramData\Android_MTK_Backup_Folder\firmware_ backup\MT6765_EMMC_2021_07_11_12_18 [helio]Wait untill phone will start charging. [0]All done |
The Following User Says Thank You to GSM AR For This Useful Post: |
Bookmarks |
| |
|