Z3X Oppo a16 repair error

Z3X Team
Jan 10, 2020
10
1
Selected model: OPPO CPH2269 (OPPO A16)
Operation: Repair
Software version: 6.4

Connect Type-C to NONE... OK
Host Power Off... OK
Connect phone to [PC] in BROM/PRELOADER Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM4 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
LibUSB installed
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Release testpoint, waiting 2 seconds
Advanced Bypass Security... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM4 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0xF981A20F, 0xF8C1C69D, 0x60E3A068, 0x1E5F0F78
Get Chip ID... [MT6765]
Get SOC ID... [ABD03575CDDBC4A014AB310060DE9157678339C3CA027084F74E06A986CD9B48]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [7]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x90014A68433861503E031009EC349845
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_CNAME: hC8aP>
EMMC_ID : 0x90014A68433861503E031009EC349845
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0001000000 (16.00Mb)
EMMC_USER : 0x0E8F800000 (58.24Gb)
RAM INFO:
INT_SRAM: 0x000003A000 (232.00Kb)
EXT_RAM : 0x0100000000 (4.00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK
Read security partition from phone...
Decrypting security data... OK
Encrypt security data... OK
Read partition "nvdata"... OK
Read partition "protect1"... OK
Read partition "nvram"... OK
Read NVDATA files... OK
Read NVRAM files... OK
Read security files... OK
Calculating... OK
Repairing IMEI...
IMEI 1: 3533951**********
IMEI 2: 3533951**********
Write IMEI and patch CERT [NVDATA]... OK
Checking patch type... [1]
Patching CERT...
Exception: Access violation at address 017603D3 in module PandoraTool.exe. Read of address D3170010
 

dany_boy

Friend's Martview
Oct 28, 2017
138
20
Pakistan punjab
Skype
[email protected]
Selected model: OPPO CPH2269 (OPPO A16)
Operation: Repair
Software version: 6.4

Connect Type-C to NONE... OK
Host Power Off... OK
Connect phone to [PC] in BROM/PRELOADER Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM4 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
LibUSB installed
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Release testpoint, waiting 2 seconds
Advanced Bypass Security... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM4 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0xF981A20F, 0xF8C1C69D, 0x60E3A068, 0x1E5F0F78
Get Chip ID... [MT6765]
Get SOC ID... [ABD03575CDDBC4A014AB310060DE9157678339C3CA027084F74E06A986CD9B48]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [7]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x90014A68433861503E031009EC349845
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_CNAME: hC8aP>
EMMC_ID : 0x90014A68433861503E031009EC349845
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0001000000 (16.00Mb)
EMMC_USER : 0x0E8F800000 (58.24Gb)
RAM INFO:
INT_SRAM: 0x000003A000 (232.00Kb)
EXT_RAM : 0x0100000000 (4.00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK
Read security partition from phone...
Decrypting security data... OK
Encrypt security data... OK
Read partition "nvdata"... OK
Read partition "protect1"... OK
Read partition "nvram"... OK
Read NVDATA files... OK
Read NVRAM files... OK
Read security files... OK
Calculating... OK
Repairing IMEI...
IMEI 1: 3533951**********
IMEI 2: 3533951**********
Write IMEI and patch CERT [NVDATA]... OK
Checking patch type... [1]
Patching CERT...
Exception: Access violation at address 017603D3 in module PandoraTool.exe. Read of address D3170010
Now pandora tool today I repair poco m4 5g IMEI but pandora failed and other tool 1 click done and Pandora team please fix this and give us new mtk update
 

babaali1342

Junior Member
Jul 1, 2017
3
1
pakistan
Skype
[email protected]
Brand/Model : *Auto* / *Auto Detect*
Operation : Flash OFP Firmware
Firmware : CPH2269export_11_A.17_2022060216380000_GsmMafia.Com.ofp
USING PL_EXLOIT [OPPO V1]
Using Preloader from Firmware
BOOT CFG : [PL_EXPLOIT : ON]
Waiting for Device...Found
Port : MediaTek PreLoader USB VCOM_V1632 (Android) (COM28)
Device Path : \\?\usb#vid_22d9&pid_0006#6&50b8eb1&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver : MediaTek Inc., 3.0.1504.0 [usb2ser.sys]
Mode : PRELOADER
Hw ID : MT6765 [0766] Helio P35/G35
Details : 8A00,CA00,0000
Sec. Config : [SBA:True] [SLA:False] [DAA:True]
MEID : 92A7CB694E77DDA6D718F466D864F1A6
SoC ID[0] : A9112D32BACA9FB175A6CC8B432AFF0F
SoC ID[1] : EC47F15FC9871E017427A0FBE880F2AF
Sending 1st DA..OK
Jump DA Address...OK
Syncing...OK
Checksum Level is Storage
Connection : preloader
Speed : HIGH-SPEED
Reading RAM Configuration...OK
Running PL_EXPLOIT [1]...Done
Sending 2nd DA...Failed!
Operation Finished.
[UltimateMTK2 v1.6]
Log Saved : 20250101_133654.log


slution pl
 

Attachments

  • Screenshot (7).png
    Screenshot (7).png
    254.8 KB · Views: 8
Top