Z3X A77 CPH2385 IMEI REPAIR DONE BY PANDORA BOX

Z3X Team

aafaq mobilwe

Active Member
May 23, 2021
25
22
Distt. Mandi Baha Uddin Punjab Pakistan
Skype
qasim1439
A77 OPPO CPH2385 VER 12.png

a77 1.jpeg

LOGS
Selected model: OPPO CPH1909 (OPPO A5s)
Operation: Repair
Software version: 5.3

Host Power Off... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Connect phone to [BOX] in BROM mode
Waiting for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0766
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Release testpoint
Advanced Bypass Security... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1633,usb2ser.sys,3.0.1504.0]
Device found at COM26 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x77026F18, 0x35F1A66A, 0x927CB144, 0xF97D4ECA
Get Chip ID... [MT6765]
Get SOC ID... [64D5BF0744EEF34980FB8DF5988B0A66B5D3041D9700D7362868E47AB9AC4660]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [7]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x150100445554423432029834C09699DB
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_CNAME: DUTB42
EMMC_ID : 0x150100445554423432029834C09699DB
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0001000000 (16.00Mb)
EMMC_USER : 0x1D1EC00000 (116.48Gb)
RAM INFO:
INT_SRAM: 0x000003A000 (232.00Kb)
EXT_RAM : 0x0100000000 (4.00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... [EROFS] ... OK
Product Brand: oplus
Product Manufacturer: oplus
Product Model: ossi
Product Name: ossi
Product Device: ossi
Product Board: k65v1_64_bsp
Board Platform: connac1x
Build ID: SP1A.210812.016
Build Date: Fri Mar 10 21:54:39 CST 2023
Display ID: SP1A.210812.016 release-keys
Security Patch: 2023-03-05
Version SDK: 31
Version Release: 12
Version Codename: REL
Firmware Version: 1678456479494
Userdata FS Type: F2FS
Read partition "nvdata"... OK
Read partition "nvram"... OK
Read NVDATA files... OK
Read NVRAM files... OK
Repairing IMEI...
IMEI 1: 3512XXXXXXXXXX
IMEI 2: 3512XXXXXXXXXX
Write IMEI and patch CERT [NVDATA]... OK
Checking patch type... [1]
Patching partition... OK
Save patched partiton... OK
Selected "Auto unlock bootloader"
Read security partition from phone... OK
Decrypting security data... OK
Encrypt security data... OK
Write security partition to phone... OK
Checking additional lock... [ENABLED]
Disable additional lock... OK
Unlock bootloader done!
Write IMEI and patch CERT [NVRAM]... OK
Write partition "nvdata"... OK
Write partition "nvram"... OK
Repair Security and Patch cert done!
If your phone after repair keeps rebooting - use wipe data option.

latest security patch
direct repair done
Aafaq Flashing Lab
03456953001 :Y::Y:
 
  • Like
Reactions: intel32
Top