Z3X Post here successfully Unlocked / Repaired / Flashed Phones with Pandora's 2021

Z3X Team

Abid Gabol

Active Member
Aug 5, 2018
32
2
Pakistan
Skype
abidgabol
Xiaomi_Redmi12 (Fire) Dump Partition Done

Selected model: Xiaomi Redmi 12 (Fire)
Operation: Read PTT
Software version: 7.11
Work ID: 56534320

Connect phone in BROM Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V2023,usb2ser_mtk.sys,3.0.1512.0]
You are using driver version 3.0.1512.0, we recommend using version 3.0.1504.0 for proper operation. You can install the correct driver from the program directory.
Device found at COM4 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0707
Get sec config... OK [000000E7]
Active sec flags: [SBC SLA DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6768]
LibUSB installed
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Release testpoint, waiting 2 seconds
Advanced Bypass Security... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V2023,usb2ser_mtk.sys,3.0.1512.0]
You are using driver version 3.0.1512.0, we recommend using version 3.0.1504.0 for proper operation. You can install the correct driver from the program directory.
Device found at COM4 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0707
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6768]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x8A7057F0, 0x528D7A31, 0x3788A9CA, 0xCAFB1E06
Get Chip ID... [MT6768]
Get SOC ID... [C30DB4EDC5A4A58791ED0A44FF691744C26451821BD0347369 6D1C26772C0256]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [8]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0xD62D004D4D43313238510E470E633AA3
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_CNAME: MMC128
EMMC_ID : 0xD62D004D4D43313238510E470E633AA3
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0000400000 (4.00Mb)
EMMC_USER : 0x1D1EC00000 (116.48Gb)
RAM INFO:
INT_SRAM: 0x0000070000 (448.00Kb)
EXT_RAM : 0x0100000000 (4.00Gb)
HEALTH:
Pre EOL Info: normal
DeviceLifeTimeEstA: 0% - 10% device life time used
DeviceLifeTimeEstB: 0% - 10% device life time used
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... [EROFS] ... OK
Product Brand : Redmi
Product Manufacturer : Xiaomi
Product Model : fire
Product Name : vnd_fire
Product Device : fire
Product Board : fire
Board Platform : mt6768
Build ID : TP1A.220624.014
Build Date : Wed Dec 6 15:36:41 UTC 2023
Display ID : TP1A.220624.014
Security Patch : 2023-12-01
Version SDK : 33
Version Release : 13
Version Codename : REL
Firmware Version : V14.0.13.0.TMXMIXM
Userdata FS Type : F2FS
Read partition "preloader"... OK
Read partition "preloader_backup"... OK
Read partition "pgpt"... OK
Read partition "misc"... OK
Read partition "countrycode"... OK
Read partition "para"... OK
Read partition "expdb"... OK
Read partition "frp"... OK
Read partition "vbmeta_a"... OK
Read partition "vbmeta_system_a"... OK
Read partition "vbmeta_vendor_a"... OK
Read partition "vbmeta_b"... OK
Read partition "vbmeta_system_b"... OK
Read partition "vbmeta_vendor_b"... OK
Read partition "md_udc"... OK
Read partition "metadata"... OK
Read partition "nvcfg"... OK
Read partition "nvdata"... OK
Read partition "persist"... OK
Read partition "persistbak"... OK
Read partition "protect1"... OK
Read partition "protect2"... OK
Read partition "seccfg"... OK
Read partition "md1img_a"... OK
Read partition "spmfw_a"... OK
Read partition "scp_a"... OK
Read partition "sspm_a"... OK
Read partition "gz_a"... OK
Read partition "lk_a"... OK
Read partition "boot_a"... OK
Read partition "vendor_boot_a"... OK
Read partition "dtbo_a"... OK
Read partition "tee_a"... OK
Read partition "logo_a"... OK
Read partition "sec1"... OK
Read partition "proinfo"... OK
Read partition "efuse"... OK
Read partition "boot_para"... OK
Read partition "nvram"... OK
Read partition "md1img_b"... OK
Read partition "spmfw_b"... OK
Read partition "scp_b"... OK
Read partition "sspm_b"... OK
Read partition "gz_b"... OK
Read partition "lk_b"... OK
Read partition "boot_b"... OK
Read partition "vendor_boot_b"... OK
Read partition "dtbo_b"... OK
Read partition "tee_b"... OK
Read partition "logo_b"... OK
Read partition "cust"... OK
Read partition "rescue"... OK
Read partition "opcust"... OK
Read partition "opconfig"... OK
Read partition "gsort"... OK
Read partition "ffu"... OK
Read partition "devinfo"... OK
Read partition "mem"... OK
Read partition "oops"... OK
Read partition "super"... OK
Read partition "otp"... OK
Read partition "flashinfo"... OK
Read partition "sgpt"... OK
Saved to C:/Program/Files/(x86)/Z3X/Pandora/Backup/MTK/Xiaomi_Redmi12(Fire)/Xiaomi_Redmi12_DUMP_(2025-1-7_19-42-26)/

 
Last edited:

Abid Gabol

Active Member
Aug 5, 2018
32
2
Pakistan
Skype
abidgabol
Selected model: Xiaomi Redmi 12 (Fire)
Operation: Unlock bootloader
Software version: 7.11
Work ID: 56533732

Connect phone in BROM Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V2023,usb2ser_mtk.sys,3.0.1512.0]
You are using driver version 3.0.1512.0, we recommend using version 3.0.1504.0 for proper operation. You can install the correct driver from the program directory.
Device found at COM4 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0707
Get sec config... OK [000000E7]
Active sec flags: [SBC SLA DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6768]
Install LibUSB... OK
Waiting for device... OK
Open port... OK
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Release testpoint, waiting 2 seconds
Advanced Bypass Security... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V2023,usb2ser_mtk.sys,3.0.1512.0]
You are using driver version 3.0.1512.0, we recommend using version 3.0.1504.0 for proper operation. You can install the correct driver from the program directory.
Device found at COM4 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0707
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6768]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x8A7057F0, 0x528D7A31, 0x3788A9CA, 0xCAFB1E06
Get Chip ID... [MT6768]
Get SOC ID... [C30DB4EDC5A4A58791ED0A44FF691744C26451821BD0347369 6D1C26772C0256]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [8]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0xD62D004D4D43313238510E470E633AA3
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_CNAME: MMC128
EMMC_ID : 0xD62D004D4D43313238510E470E633AA3
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0000400000 (4.00Mb)
EMMC_USER : 0x1D1EC00000 (116.48Gb)
RAM INFO:
INT_SRAM: 0x0000070000 (448.00Kb)
EXT_RAM : 0x0100000000 (4.00Gb)
HEALTH:
Pre EOL Info: normal
DeviceLifeTimeEstA: 0% - 10% device life time used
DeviceLifeTimeEstB: 0% - 10% device life time used
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... [EROFS] ... OK
Product Brand : Redmi
Product Manufacturer : Xiaomi
Product Model : fire
Product Name : vnd_fire
Product Device : fire
Product Board : fire
Board Platform : mt6768
Build ID : TP1A.220624.014
Build Date : Wed Dec 6 15:36:41 UTC 2023
Display ID : TP1A.220624.014
Security Patch : 2023-12-01
Version SDK : 33
Version Release : 13
Version Codename : REL
Firmware Version : V14.0.13.0.TMXMIXM
Userdata FS Type : F2FS
Read security partition from phone...
Decrypting security data... OK
Encrypt security data... OK
Read security partition from phone... OK
Write security partition to phone... OK
Unlock bootloader done!
 

Abid Gabol

Active Member
Aug 5, 2018
32
2
Pakistan
Skype
abidgabol
Selected model: Xiaomi Redmi 12 (Fire)
Operation: Read Flash Info
Software version: 7.11
Work ID: 56534082

Connect phone in BROM Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V2023,usb2ser_mtk.sys,3.0.1512.0]
You are using driver version 3.0.1512.0, we recommend using version 3.0.1504.0 for proper operation. You can install the correct driver from the program directory.
Device found at COM4 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0707
Get sec config... OK [000000E7]
Active sec flags: [SBC SLA DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6768]
LibUSB installed
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Release testpoint, waiting 2 seconds
Advanced Bypass Security... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V2023,usb2ser_mtk.sys,3.0.1512.0]
You are using driver version 3.0.1512.0, we recommend using version 3.0.1504.0 for proper operation. You can install the correct driver from the program directory.
Device found at COM4 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0707
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6768]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x8A7057F0, 0x528D7A31, 0x3788A9CA, 0xCAFB1E06
Get Chip ID... [MT6768]
Get SOC ID... [C30DB4EDC5A4A58791ED0A44FF691744C26451821BD0347369 6D1C26772C0256]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [8]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0xD62D004D4D43313238510E470E633AA3
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_CNAME: MMC128
EMMC_ID : 0xD62D004D4D43313238510E470E633AA3
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0000400000 (4.00Mb)
EMMC_USER : 0x1D1EC00000 (116.48Gb)
RAM INFO:
INT_SRAM: 0x0000070000 (448.00Kb)
EXT_RAM : 0x0100000000 (4.00Gb)
HEALTH:
Pre EOL Info: normal
DeviceLifeTimeEstA: 0% - 10% device life time used
DeviceLifeTimeEstB: 0% - 10% device life time used
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... [EROFS] ... OK
Product Brand : Redmi
Product Manufacturer : Xiaomi
Product Model : fire
Product Name : vnd_fire
Product Device : fire
Product Board : fire
Board Platform : mt6768
Build ID : TP1A.220624.014
Build Date : Wed Dec 6 15:36:41 UTC 2023
Display ID : TP1A.220624.014
Security Patch : 2023-12-01
Version SDK : 33
Version Release : 13
Version Codename : REL
Firmware Version : V14.0.13.0.TMXMIXM
Userdata FS Type : F2FS
Read Flash Info done!
 

Abid Gabol

Active Member
Aug 5, 2018
32
2
Pakistan
Skype
abidgabol
Selected model: Xiaomi Redmi 12 (Fire)
Operation: Repair
Software version: 7.11
Work ID: 56536584

Connect phone in BROM Mode
Waiting for device... canceled


Selected model: Xiaomi Redmi 12 (Fire)
Operation: Repair
Software version: 7.11
Work ID: 56536762

Connect phone in BROM Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V2023,usb2ser_mtk.sys,3.0.1512.0]
You are using driver version 3.0.1512.0, we recommend using version 3.0.1504.0 for proper operation. You can install the correct driver from the program directory.
Device found at COM4 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0707
Get sec config... OK [000000E7]
Active sec flags: [SBC SLA DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6768]
LibUSB installed
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Release testpoint, waiting 2 seconds
Advanced Bypass Security... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V2023,usb2ser_mtk.sys,3.0.1512.0]
You are using driver version 3.0.1512.0, we recommend using version 3.0.1504.0 for proper operation. You can install the correct driver from the program directory.
Device found at COM4 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0707
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6768]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x8A7057F0, 0x528D7A31, 0x3788A9CA, 0xCAFB1E06
Get Chip ID... [MT6768]
Get SOC ID... [C30DB4EDC5A4A58791ED0A44FF691744C26451821BD0347369 6D1C26772C0256]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [8]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0xD62D004D4D43313238510E470E633AA3
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_CNAME: MMC128
EMMC_ID : 0xD62D004D4D43313238510E470E633AA3
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0000400000 (4.00Mb)
EMMC_USER : 0x1D1EC00000 (116.48Gb)
RAM INFO:
INT_SRAM: 0x0000070000 (448.00Kb)
EXT_RAM : 0x0100000000 (4.00Gb)
HEALTH:
Pre EOL Info: normal
DeviceLifeTimeEstA: 0% - 10% device life time used
DeviceLifeTimeEstB: 0% - 10% device life time used
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... [EROFS] ... OK
Product Brand : Redmi
Product Manufacturer : Xiaomi
Product Model : fire
Product Name : vnd_fire
Product Device : fire
Product Board : fire
Board Platform : mt6768
Build ID : TP1A.220624.014
Build Date : Wed Dec 6 15:36:41 UTC 2023
Display ID : TP1A.220624.014
Security Patch : 2023-12-01
Version SDK : 33
Version Release : 13
Version Codename : REL
Firmware Version : V14.0.13.0.TMXMIXM
Userdata FS Type : F2FS
Read partition "nvdata"... OK
Read partition "protect1"... OK
Read partition "nvram"... OK
Read NVDATA files... OK
Read NVRAM files... OK
Read security files... OK
Calculating... OK
Read IMEI... OK
IMEI 1: XXXXXXXXXXXX362
IMEI 2: XXXXXXXXXXXX370
Repairing IMEI...
IMEI 1: XXXXXXXXXXXX706
IMEI 2: XXXXXXXXXXXX834
Write IMEI and patch CERT [NVDATA]... OK
Load partiton for patching... [Nov 2024] ... OK
Write IMEI and patch CERT [NVRAM]... OK
Write partition "nvdata"... OK
Write partition "nvram"... OK
Repair Security and Patch cert done!
If your phone after repair keeps rebooting - use wipe data option.
 

usman5752

Active Member
Aug 21, 2019
37
6
Selected model: Alcatel 5033F (Alcatel 1)
Operation: Read IMEI Info
Software version: 7.13
Work ID: 59111712

Connect phone in BROM Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V2023,usb2ser_mtk.sys,3.0.1512.0]
You are using driver version 3.0.1512.0, we recommend using version 3.0.1504.0 for proper operation. You can install the correct driver from the program directory.
Device found at COM14 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0699
Get sec config... OK [000000E7]
Active sec flags: [SBC SLA DAA]
Get HW & SW version from device... OK
HW VER: CC00, SW VER: 0002, HW SUB CODE: 8A00
Detect chip [MT6739]
LibUSB installed
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Release testpoint, waiting 2 seconds
Advanced Bypass Security... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V2023,usb2ser_mtk.sys,3.0.1512.0]
You are using driver version 3.0.1512.0, we recommend using version 3.0.1504.0 for proper operation. You can install the correct driver from the program directory.
Device found at COM14 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0699
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CC00, SW VER: 0002, HW SUB CODE: 8A00
Detect chip [MT6739]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x82895D03, 0xDE310E5A, 0x7969383A, 0x52888E08
Get Chip ID... [MT6739]
Get SOC ID... [56F3217D38C5CA51DA810303BCC09E45F4662FD7D45A6A1AF8515D557FF5858F]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [1]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x15010046453632414209246A971CB86B
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_CNAME: FE62AB
EMMC_ID : 0x15010046453632414209246A971CB86B
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0000400000 (4.00Mb)
EMMC_USER : 0x03A3E00000 (14.56Gb)
RAM INFO:
INT_SRAM: 0x0000020000 (128.00Kb)
EXT_RAM : 0x0040000000 (1.00Gb)
HEALTH:
Pre EOL Info: normal
DeviceLifeTimeEstA: 0% - 10% device life time used
DeviceLifeTimeEstB: 0% - 10% device life time used
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... [EXT4] ... OK
Product Brand : Alcatel
Product Manufacturer : TCL
Product Model : 5033F
Product Name : 5033FR_EEA
Product Device : Macau
Product Board : MT6739
Board Platform : mt6739
Build ID : RP1A.200720.011
Build Date : Tue Feb 27 10:17:20 CST 2024
Display ID : RP1A.200720.011 release-keys
Security Patch : 2024-02-05
Version SDK : 30
Version Release : 11
Version Codename : REL
Firmware Version : RB4Y
Userdata FS Type : F2FS
Read OTP...
Exception: Out of memory while expanding memory stream
 
  • Like
Reactions: GsmToto

GsmToto

Super Moderator
Jan 1, 2021
5,244
22,025
UK
Skype
gsmtoto
Sonork ID
100.1684601
OPPO CPH 2349 A16K IMEI REPAIR SUCCESFUL:
Selected model: OPPO CPH2349 (Oppo A16k)
Operation: Repair
Software version: 7.14


Connect phone in PRELOADER Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek PreLoader USB VCOM_V1632 (Android),usb2ser.sys,3.0.1504.0]
Device found at COM3 [PRELOADER]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get sec config... OK [00000005]
Active sec flags: [SBC DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Preloader exist. Skip connection verification.
Get ME ID... OK
ME_ID = 0x1879CD2D, 0x45EF2B34, 0x891CE681, 0x90642E30
Load DownloadAgent... OK
Search DA... OK [0]
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [PRELOADER]
Preloader alive. Skip initializing external RAM
Send preloader... OK
Load DownloadAgent... OK
Search DA... OK [7]
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_CNAME: DP6DBB
EMMC_ID : 0x1501004CE9219754503644424202A44C
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0001000000 (16.00Mb)
EMMC_USER : 0x0E8F800000 (58.24Gb)
RAM INFO:
INT_SRAM: 0x000003A000 (232.00Kb)
EXT_RAM : 0x0100000000 (4.00Gb)
HEALTH:
Pre EOL Info: normal
DeviceLifeTimeEstA: 0% - 10% device life time used
DeviceLifeTimeEstB: 0% - 10% device life time used
Checking USB status... USB_HIGH_SPEED
[EFUSE INFO]: BROM not disabled
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... [EXT4] ... OK
Product Brand : alps
Product Manufacturer : alps
Product Model : CPH2349
Product Name : vnd_oppo6765
Product Device : oppo6765
Product Board : oppo6765
Board Platform : mt6765
Build ID : RP1A.200720.011
Build Date : Tue Sep 10 11:38:10 CST 2024
Display ID : CPH2349_11_A.28
Security Patch : 2024-02-05
Version SDK : 30
Version Release : 11
Version Codename : REL
Firmware Version : 1725308409382
Userdata FS Type : F2FS
Read security partition from phone...
Decrypting security data... OK
Encrypt security data... OK
Read partition "nvdata"... OK
Read partition "protect1"... OK
Read partition "nvram"... OK
Read NVDATA files... OK
Read NVRAM files... OK
Read security files... OK
Calculating... OK
Repairing IMEI...
IMEI 1: 335...............
IMEI 2: 335..................
Write IMEI and patch CERT [NVDATA]... OK
Checking patch type... [2]
Patching CERT... OK
Save patched partiton... OK
Updating NVRAM... OK
Read security partition from phone... OK
Write security partition to phone... OK
Checking additional lock... [ENABLED]
Disable additional lock... OK
Unlock bootloader done!
Selected "Disable VBMETA verification"
Read security partition from phone... OK
Write security partition to phone... OK
Write IMEI and patch CERT [NVRAM]... OK
Write partition "nvdata"... OK
Write partition "nvram"... OK
Repair Security and Patch cert done!
If your phone after repair keeps rebooting - use wipe data option.
 
  • Like
Reactions: SPYROS
Top