- Mar 16, 2017
- 2,151
- 7,272
- Skype
- GSMKINGMAKER
- Sonork ID
- 9655528882
Read Info
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Service Function
Read Info
Flash Mode
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Searching for MTK Device...Found
MTK Port Type : Flashmode BROM
FriendlyName : MediaTek USB Port_V1633 (COM5)
Device : /5&15c311e1&0&1
SymbolicName : \\?\usb#vid_0e8d&pid_0003#5&15c311e1&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0
Service : wdm_usb
Handshaking...Ok
HwCode : 0813 {MT6785}
Hwver : 0000
Target config : E5
SBC : 01 (True)
SLA : 00 (False)
DAA : 04 (True)
SWJTAG : 04 (True)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 20 (True)
MEMWRITE : 40 (True)
CMD_C8 : 80 (True)
Connection : BROM
HW Subcode : 8A00
HW Subcode : CA00
SW Ver : 0000
ME_ID : C36EF3CEC996A4EB5E86839EBEC6111B
SOC_ID : E548550B21DC4A2C8ABDECFE40B62CCBF1B44E2D7DEAB644E158CC86D810B9D5
Exploiting Device...
Successfully Exploited..
Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..Found @ 0x00200BC4
Starting to dump...
Prel Size : 0x0005B600
Successfully dump preloader.. [D:\MOBILE EXPERT\SOFTWARE_BOXES\HYDRA\HYDRA_TOOL_V.6.2\Boot\PreloaderDump\preloader_k85v1_64.bin]
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)
Connection : BROM
Preparing Download Agent..
Preparing Download Agent..[MTK_DA_V5.bin]
Patching da2 ...
Security check patched.
DA version anti-rollback patched
SBC patched to be disabled
Register read/write not allowed pat
Ok
Uploading Stage 1....
Successfully uploaded stage 1, jumping ..
Executing JUMP_DA Address @ 0x00200000
Jumping to 0x00200000 Ok.... 0xC0
Successfully received DA sync
ONNECTION_AGENT : brom
DRAM config needed for : 4B4D3856383030314A4D2D4238313300
Sending auto preloader from dump... [preloader_k85v1_64_F089E55B62.bin]
Sending emi data.. [DRAM setup passed.]
Sending emi data succeeded.
Uploading stage 2...
Patching da2 ...
Hash binding not patched.
Hash check not patched.
Register read/write not allowed pat
Write not allowed not patched.
Error: on sending data: DA hash mismatch
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
DA SLA Disabled..
Executing DA Ext Method 1
Upload data was accepted. Jumping to stage 2...
DA Extensions successfully added
Device Chip Info...
ERAM Size : 0x0000000000080000-512 KB
IRAM Size : 0x0000000200000000-8 GB
UFS MID : 0x4B
UFS FWVer : 0x1900
UFS Blocksize : 0x0000000000001000-4 KB
UFS LU0 Size : 0x0000000000400000-4 MB
UFS LU1 Size : 0x0000000000400000-4 MB
UFS LU2 Size : 0x0000001DCB000000-119.172 GB
UFS ID : 8
UFS CID : 4B4D3856383030314A4D2D423831330000000000
HW-CODE : 0x813
HWSUB-CODE : 0x8A00
HW-VERSION : 0xCA00
SW-VERSION : 0x0
CHIP-EVOLUTION : 0x0
DA-VERSION : 1.0
Speed : high-speed
Reading Partition Table ..
Partition Count : 53
Reading Phone Info...
Erofs Format Detected...
Reading IMEI........
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------
Backing up Security..
- preloader(preloader.bin), 512 KB = Ok [preloader_k85v1_64.bin]
*Creating Scatter file... D:\MOBILE EXPERT\SOFTWARE_BOXES\HYDRA\HYDRA_TOOL_V.6.2\Backup\MTKBKUP\0813_C36EF3CEC996A4EB5E86839EBEC6111B\Auto\090624161035\0813_Android_scatter.txt
- pgpt(pgpt.bin), 32 KB = Ok
- nvram(nvram.bin), 64 MB = Ok
- nvdata(nvdata.bin), 64 MB = Ok
- frp(frp.bin), 1024 KB = Ok
- protect1(protect1.bin), 8 MB = Ok
- protect2(protect2.bin), 8 MB = Ok
- persist(persist.bin), 50.367 MB = Ok
- proinfo(proinfo.bin), 3 MB = Ok
- oppo_custom(oppo_custom.bin), 1024 KB = Ok
- opporeserve1(opporeserve1.bin), 8 MB = Ok
- opporeserve2(opporeserve2.bin), 64 MB = Ok
- nvcfg(nvcfg.bin), 32 MB = Ok
- sec1(sec1.bin), 2 MB = Ok
- seccfg(seccfg.bin), 8 MB = Ok
- lk(lk.bin), 5 MB = Ok
- flashinfo(flashinfo.bin), 16 MB = Ok
Backup Done!!!
Action Result : Ok
Elapsed Time : 00:01:51
Factory Reset
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Service Function
Format/Factory Reset/ScreenLock
Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Searching for MTK Device...Found
MTK Port Type : Flashmode BROM
FriendlyName : MediaTek USB Port_V1633 (COM5)
Device : /5&15c311e1&0&1
SymbolicName : \\?\usb#vid_0e8d&pid_0003#5&15c311e1&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0
Service : wdm_usb
Device Chip Info...
ERAM Size : 0x0000000000080000-512 KB
IRAM Size : 0x0000000200000000-8 GB
UFS MID : 0x4B
UFS FWVer : 0x1900
UFS Blocksize : 0x0000000000001000-4 KB
UFS LU0 Size : 0x0000000000400000-4 MB
UFS LU1 Size : 0x0000000000400000-4 MB
UFS LU2 Size : 0x0000001DCB000000-119.172 GB
UFS ID : 8
UFS CID : 4B4D3856383030314A4D2D423831330000000000
HW-CODE : 0x813
HWSUB-CODE : 0x8A00
HW-VERSION : 0xCA00
SW-VERSION : 0x0
CHIP-EVOLUTION : 0x0
DA-VERSION : 1.0
Speed : high-speed
Reading Partition Table ..
Partition Count : 53
Reading Phone Info...
Erofs Format Detected...
Reading IMEI........
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------
------------------------------
Factory Reset Flash Mode..
------------------------------
Operation : Safeformat Universal...
Action Result : Ok
Elapsed Time : 00:00:05
.