- Mar 16, 2017
- 2,151
- 7,272
- Skype
- GSMKINGMAKER
- Sonork ID
- 9655528882
.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Service Function
Factory Reset Protection[FRP]
Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Searching for MTK Device...Found
MTK Port Type : Flashmode Preloader
FriendlyName : MediaTek PreLoader USB VCOM (Android) (COM7)
Device : /5&15c311e1&0&2
SymbolicName : \\?\usb#vid_0e8d&pid_2000#5&15c311e1&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2016,3.0.1504.0
Service : wdm_usb
Openning Port [COM7] Ok
Handshaking...
HwCode : 6580 {MT6580}
Hwver : 0000
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)
Connection : Preloader
HW Subcode : 8A00
HW Subcode : CA00
SW Ver : 0000
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Preloader To Brom Function.....
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- Method 1 Exploit Executed..... [Failed]
- Method 2 Exploit Executed..... [Failed]
- Method 3 Exploit Executed..... [Successfully Crash Preloader.]
Device now is BROM Port
Exploiting Device...
Successfully Exploited..
Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..Found @ 0x00200B40
Starting to dump...
Prel Size : 0x0001ED24
Successfully dump preloader.. [D:\SOFTWARE_BOXES\HYDRA\HYDRA_TOOL_V.5.4\Boot\PreloaderDump\preloader_pixi3_10_emmc.bin]
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)
Connection : BROM
Uploading legacy da...
DA :MTK_AllInOne_DA_5.2152.bin
Legacy DA2 Patched..
Legacy DA2 CMD F0 is patched.
Successfully uploaded stage 1, jumping ..
Executing JUMP_DA Address @ 0x00200000
Jumping to 0x00200000 Ok
Got loader sync !
Reading Nand Info..
Reading EMMC Info
EMMC_INFO : 0x00000000
Uploading Stage 2
DRAM config needed for : 460001154D32584E3FB50642312416F2
Reading dram nand info ...
Sending dram info ...
RAM-Length: BC000000
5A
Successfully upload stage 2
Flash and ram info.....
m_int_sram_ret : 0x00000000
m_ext_ram_ret : 0x00000000
m_ext_ram_type : 0x02
m_ext_ram_chip_select : 0x00
m_int_sram_ret : 0x00000000
m_ext_ram_size : 0x0000000040000000-1024 MB
Randomid : 0x5F3CF6E1A045947F7369DF80B7FC2B9F
m_emmc_ret : 0x00000000
m_emmc_boot1_size : 0x0000000000400000-4 MB
m_emmc_boot2_size : 0x0000000000400000-4 MB
m_emmc_rpmb_size : 0x0000000000400000-512 KB
m_emmc_gp_size[0] : 0x0000000000000000-0 Bytes
m_emmc_gp_size[1] : 0x0000000000000000-0 Bytes
m_emmc_gp_size[2] : 0x0000000000000000-0 Bytes
m_emmc_gp_size[3] : 0x0000000000000000-0 Bytes
m_emmc_ua_size : 0x00000001D2000000-7.281 GB
CID : 460001154D32584E3FB50642312416F2
Checking Connection Speed..
Configuration HighSpeed Switch : True
Full Speed Detected..
Switching To High Speed...
Connected to preloader...
Reconnecting to preloader...
Reading Partition Table ..
Partition Count : 25
Reading System Info
Reading IMEI........
IMEI Info....
IMEI1 : 45F5090D0E1E56A
IMEI2 : 45F5090D0E1E56A
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------
Backing up Security..
- preloader(preloader.bin), 512 KB = Ok [preloader_pixi3_10_emmc.bin]
*Creating Scatter file... D:\SOFTWARE_BOXES\HYDRA\HYDRA_TOOL_V.5.4\Backup\MTKBKUP\6580_52F1D64C3B0702A97B77C7D45D8612A2\Auto\061623182817\6580_Android_scatter.txt
- pgpt(pgpt.bin), 512 KB = Ok
- nvram(nvram.bin), 5 MB = Ok
- nvdata(nvdata.bin), 32 MB = Ok
- frp(frp.bin), 1024 KB = Ok
- protect1(protect1.bin), 10 MB = Ok
- protect2(protect2.bin), 10 MB = Ok
- proinfo(proinfo.bin), 3 MB = Ok
- seccfg(seccfg.bin), 256 KB = Ok
- lk(lk.bin), 384 KB = Ok
Backup Done!!!
Action Result : Ok
Elapsed Time : 00:01:07