Z3X Pandora 6.4 & 6.5 Exlusive Update Released.

Z3X Team

SPYROS

Friend's Martview
Jan 27, 2023
156
360
PK


-
Pandora PRO 6.4. Exclusive solution and new devices added.


Exclusive solution - Patch/Repair CERT support for Oppo/Realme/OnePlus phones in Preloader mode (for compatible FW)


Added support MTK phones:

- CPH2357 Oppo Reno8 Pro 5G
- CPH2437 Oppo Find N2 Flip
- CPH2481 Oppo Reno8 T
- CPH2607 Oppo Reno11 Pro 5G
- OPD2201 Oppo Pad 2
- OPD2202 Oppo Pad 2
- OPD2301 Oppo Pad Air 2
- OPD2302 Oppo Pad Neo
- OPD2303 Oppo Pad Neo
- PHV110 Oppo Reno10 Pro 5G
- PJH110 Oppo Reno11 5G

- Blackview BL8000, Blackview BL8800, Blackview BL8800 Pro, Blackview BL9000, Blackview BV4800
- Blackview BV5200, Blackview BV5200 Pro, Blackview BV5300, Blackview BV5300 Plus, Blackview BV5300 Pro,
- Blackview BV6200, Blackview BV6200 Pro, Blackview BV7100, Blackview BV7200, Blackview BV8900,
- Blackview BV8900 Pro, Blackview BV9200, Blackview Oscal C30, Blackview Oscal C30 Pro,
- Blackview Oscal S60 Pro Night Vision, Blackview Oscal S70, Blackview Oscal S70 Pro, Blackview Oscal S80,
- Blackview Tab 13, Blackview Tab 13 Pro, Blackview Tab 11 WiFi, Blackview A96, Blackview A200 Pro,
- Blackview Active 8 Pro, Blackview BV9300, Blackview BV9300 Pro, Blackview N6000, Blackview Oscal Tiger 12,
- Blackview Shark 8, Blackview Tab 18*
- Realme Pad 2 RMP2204/RMP2205

- Oukitel C21 Plus, Oukitel C31, Oukitel C31 Pro, Oukitel C90 Pro, Oukitel F150 H2022, Oukitel RT2,
- Oukitel RT3, Oukitel WP18 Pro, Oukitel WP20 Pro, Oukitel WP22, Oukitel WP30 Pro

- Kyocera: A001KC Katan Sumaho 2, A201KC Katan Sumaho 2 Plus, KC-T304, KC-T304C,
- KY-42C Digno Keitai R, KY-43C Digno Mobile Cameraless, KYT34 Digno Tab WiMAX 2 Plus,
- KYV47 Basio 4, KYV48 Gratina, S6-KC S6, S8-KC S8

- OnePlus CPH2389 Nord N300, CPH2399, CPH2401 Nord 2T, CPH2469 Nord N20 SE

- UmidigiA13 Pro 5G, Umidigi A13 Pro Max 5G

- Sparx Neo X

- Xiaomi Redmi 13C/Poco C65 (Thanks for iProServis(Hojiakbar))



Added support for new Unisoc devices:

- Blackview A52 Pro, Blackview A53, Blackview A53 Pro, Blackview Active 6, Blackview Active 8,
- Blackview Oscal C70, Blackview Oscal Flat 1C, Blackview Oscal Modern 8, Blackview Oscal Pad 13,
- Blackview Oscal Pad 15, Blackview Oscal Pad 16, Blackview Oscal Pad 18, Blackview Oscal Spider 8,
- Blackview Oscal Tiger 10, Blackview Tab 3 Kids, Blackview Tab 7 Pro, Blackview Tab 12 Pro, Blackview Wave 6C,
- Blackview Tab 15 Pro, Blackview Tab 16, Blackview Tab 60, Blackview Tab 60 Kids, Blackview Tab 80

- Nokia C22 (TA-1533, TA-1536, TA-1539, TA-1541)*

- Umidigi A13 Tab, Umidigi A15, Umidigi A15C, Umidigi A15 Tab, Umidigi Active T1, Umidigi G3 Max,
- Umidigi G3 Plus, Umidigi G5, Umidigi G5 Mecha, Umidigi G5 Tab, Umidigi G5 Tab Kids

- Oukitel C32, Oukitel C36

- Sparx Neo 5 Plus, Sparx Neo 7 Ultra, Sparx Neo 7 Plus, Sparx S3, Sparx S9*

- RMX3830 Realme C51, RMX3834 Realme Note 50, RMP2105 Realme Pad Mini, RMP2106 Realme Pad Mini


List of supported functions for listed Unisoc phones (Relock/Unlock Bootloader, Backup/Write/Format RPMB, Erase FRP, Format Flash, Read Info/IMEI/Partitions, Restore From Backup, Unlock Network, Switch Slot, Repair, Wipe Data/Partitions, Fix Dm-Verity)




Added repair/patch CERT support for Oppo/Realme/OnePlus phones in Preloader mode (for compatible FW)

IMPORTANT:
When you will use this function software will detect details of FW and will give you know: supported FW or not)



GUI changes:

- Added: Turkish and Arabic languages

- Added: New button icons

- Added: Activation/Renewal by "1 year activation code"


Improved and added: support new security Repair and Patch CERT for Oppo/Realme/OnePlus


180.21 MB file on MEGA

Pandora_setup_6.5 .exe



DO NOT POST ANY LOGS OF JOB HERE in this thread, if you have any error - open own thread and supporters will answer there!!!

List of resellers with stock: HERE


 
Last edited by a moderator:

Gsm Lemar

Junior Member
Dec 20, 2020
2
0
Afghanistan
Link Pl


- Added Activation/Renewal by "activation code"
- Added repair/patch CERT support for Oppo/Realme/OnePlus phones in Preloader mode (for compatible FW)
- Improved and added support new security Repair and Patch CERT for Oppo/Realme/OnePlus

- Added support MTK phones:
CPH2357 Oppo Reno8 Pro 5G, CPH2437 Oppo Find N2 Flip, CPH2481 Oppo Reno8 T, CPH2607 Oppo Reno11 Pro 5G,

OPD2201 Oppo Pad 2, OPD2202 Oppo Pad 2, OPD2301 Oppo Pad Air 2, OPD2302 Oppo Pad Neo, OPD2303 Oppo Pad Neo,
PHV110 Oppo Reno10 Pro 5G, PJH110 Oppo Reno11 5G
Realme Pad 2 RMP2204/RMP2205
OnePlus CPH2389 Nord N300, CPH2399, CPH2401 Nord 2T, CPH2469 Nord N20 SE
Oukitel C21 Plus, Oukitel C31, Oukitel C31 Pro, Oukitel C90 Pro, Oukitel F150 H2022, Oukitel RT2,
Oukitel RT3, Oukitel WP18 Pro, Oukitel WP20 Pro, Oukitel WP22, Oukitel WP30 Pro
Blackview BL8000, Blackview BL8800, Blackview BL8800 Pro, Blackview BL9000, Blackview BV4800
Blackview BV5200, Blackview BV5200 Pro, Blackview BV5300, Blackview BV5300 Plus, Blackview BV5300 Pro,
Blackview BV6200, Blackview BV6200 Pro, Blackview BV7100, Blackview BV7200, Blackview BV8900,
Blackview BV8900 Pro, Blackview BV9200, Blackview Oscal C30, Blackview Oscal C30 Pro,
Blackview Oscal S60 Pro Night Vision, Blackview Oscal S70, Blackview Oscal S70 Pro, Blackview Oscal S80,
Blackview Tab 13, Blackview Tab 13 Pro, Blackview Tab 11 WiFi, Blackview A96, Blackview A200 Pro,
Blackview Active 8 Pro, Blackview BV9300, Blackview BV9300 Pro, Blackview N6000, Blackview Oscal Tiger 12,
Blackview Shark 8, Blackview Tab 18‌
Kyocera: A001KC Katan Sumaho 2, A201KC Katan Sumaho 2 Plus, KC-T304, KC-T304C,
KY-42C Digno Keitai R, KY-43C Digno Mobile Cameraless, KYT34 Digno Tab WiMAX 2 Plus,
KYV47 Basio 4, KYV48 Gratina, S6-KC S6, S8-KC S8
Umidigi A13 Pro 5G, Umidigi A13 Pro Max 5G
Sparx Neo X

Xiaomi Redmi 13C/Poco C65 (Thanks for iProServis(Hojiakbar))
- Added support new Unisoc phones:
Oukitel C32, Oukitel C36
Sparx Neo 5 Plus, Sparx Neo 7 Ultra, Sparx Neo 7 Plus, Sparx S3, Sparx S9‌
Blackview A52 Pro, Blackview A53, Blackview A53 Pro, Blackview Active 6, Blackview Active 8,
Blackview Oscal C70, Blackview Oscal Flat 1C, Blackview Oscal Modern 8, Blackview Oscal Pad 13,
Blackview Oscal Pad 15, Blackview Oscal Pad 16, Blackview Oscal Pad 18, Blackview Oscal Spider 8,
Blackview Oscal Tiger 10, Blackview Tab 3 Kids, Blackview Tab 7 Pro, Blackview Tab 12 Pro, Blackview Wave 6C,
Blackview Tab 15 Pro, Blackview Tab 16, Blackview Tab 60, Blackview Tab 60 Kids, Blackview Tab 80
Nokia C22 (TA-1533, TA-1536, TA-1539, TA-1541)‌
Umidigi A13 Tab, Umidigi A15, Umidigi A15C, Umidigi A15 Tab, Umidigi Active T1, Umidigi G3 Max,
Umidigi G3 Plus, Umidigi G5, Umidigi G5 Mecha, Umidigi G5 Tab, Umidigi G5 Tab Kids
RMX3830 Realme C51, RMX3834 Realme Note 50, RMP2105 Realme Pad Mini, RMP2106 Realme Pad Mini

- GUI: Added Turkish and Arabic languages
- GUI: New button icons



DO NOT POST ANY LOGS OF JOB HERE in this thread, if you have any error - open own thread and supporters will answer there!!!
Link Please ???
 

gsmlahore54

Junior Member
Apr 29, 2017
2
2
lahore
After Update show This Error Many Model Try

Exception: Access violation at address 017603D3 in module PandoraTool.exe. Read of address D3B60010

Team Fix This Error immediately


Selected model: OPPO CPH2325 (OPPO A55)
Operation: Repair
Software version: 6.4
Work ID: 21353874

Connect phone in BROM/PRELOADER Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek PreLoader USB VCOM_V1633 (Android),usb2ser.sys,3.0.1504.0]
Device found at COM475 [PRELOADER]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get sec config... OK [00000005]
Active sec flags: [SBC DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Force switch to BROM... OK
Waiting for device... OK
Driver: [MediaTek Inc.,usbser,MediaTek USB Port,usbser.sys,6.1.7601.18247]
You are using driver version 6.1.7601.18247, we recommend using version 3.0.1504.0 for proper operation. You can install the correct driver from the program directory.
Device found at COM476 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
LibUSB installed
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Release testpoint, waiting 2 seconds
Advanced Bypass Security... OK
Waiting for device... OK
Driver: [MediaTek Inc.,usbser,MediaTek USB Port,usbser.sys,6.1.7601.18247]
You are using driver version 6.1.7601.18247, we recommend using version 3.0.1504.0 for proper operation. You can install the correct driver from the program directory.
Device found at COM476 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0xFB491CBC, 0xDD6B4E5E, 0x65832FB7, 0xC7E8D402
Get Chip ID... [MT6765]
Get SOC ID... [C507513A61E4E5DBCE219C1A4F43C01CA3770E6F1FE12B266E6846935B823492]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [7]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x150100445036444242024B8BCE0CA8B1
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_CNAME: DP6DBB
EMMC_ID : 0x150100445036444242024B8BCE0CA8B1
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0001000000 (16.00Mb)
EMMC_USER : 0x0E8F800000 (58.24Gb)
RAM INFO:
INT_SRAM: 0x000003A000 (232.00Kb)
EXT_RAM : 0x0100000000 (4.00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... [EROFS] ... OK
Product Model : CPH2325
Display ID : CPH2325_11_A.01
Read security partition from phone...
Decrypting security data... OK
Encrypt security data... OK
Read partition "nvdata"... OK
Read partition "protect1"... OK
Read partition "nvram"... OK
Read NVDATA files... OK
Read NVRAM files... OK
Read security files... OK
Calculating... OK
Repairing IMEI...
IMEI 1: 80000000000000
IMEI 2: 80000000000000
Write IMEI and patch CERT [NVDATA]... OK
Checking patch type... [1]
Patching CERT...
Exception: Access violation at address 017603D3 in module PandoraTool.exe. Read of address D3B60010
 
  • Like
Reactions: GsmToto

yousafawan

Active Member
May 25, 2021
35
10
muzaffarabad AJK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1633,usb2ser.sys,3.0.1504.0]
Device found at COM21 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x42A96A73, 0x1891248E, 0x017B6D5E, 0x02F167D6
Get Chip ID... [MT6765]
Get SOC ID... [DF0781F29A95B40D570074CF374CA605775D119AE584843650B3134A5687CD33]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [7]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x13014E47314A3953391016EBEEA898AB
Load EMI config from database [DB VER: 222 DB DATE: 11-13-2023] OK [1]
Trying EMI [7805E65B, 4ECF8C5A, 667E0B28, F1ADA01B, 154C2947, A5FE5CDA, D8F5BD39, C41C94FB, EA914E49, C8B7B877, 1A304479]
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_CNAME: G1J9S9
EMMC_ID : 0x13014E47314A3953391016EBEEA898AB
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0001000000 (16.00Mb)
EMMC_USER : 0x1D1F000000 (116.48Gb)
RAM INFO:
INT_SRAM: 0x000003A000 (232.00Kb)
EXT_RAM : 0x0100000000 (4.00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... [EROFS] ... OK
Product Brand : alps
Product Manufacturer : alps
Product Model : CPH2325
Product Name : vnd_oppo6765
Product Device : oppo6765
Product Board : oppo6765
Board Platform : mt6765
Build ID : RP1A.200720.011
Build Date : Sat Oct 23 04:37:56 CST 2021
Display ID : CPH2325_11_A.01
Security Patch : 2021-09-05
Version SDK : 30
Version Release : 11
Version Codename : REL
Firmware Version : 1634934260041
Read security partition from phone...
Decrypting security data... OK
Encrypt security data... OK
Read partition "nvdata"... OK
Read partition "protect1"... OK
Read partition "nvram"... OK
Read NVDATA files... OK
Read NVRAM files... OK
Read security files... OK
Calculating... OK
Repairing IMEI...
IMEI 1: 8659940
IMEI 2: 8659940
Write IMEI and patch CERT [NVDATA]... OK
Checking patch type... [1]
Patching CERT...
Exception: Access violation at address 017603D3 in module PandoraTool.exe. Read of address E7430010

this error 6.4
 
  • Like
Reactions: GsmToto

yousafawan

Active Member
May 25, 2021
35
10
muzaffarabad AJK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1633,usb2ser.sys,3.0.1504.0]
Device found at COM21 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x42A96A73, 0x1891248E, 0x017B6D5E, 0x02F167D6
Get Chip ID... [MT6765]
Get SOC ID... [DF0781F29A95B40D570074CF374CA605775D119AE584843650B3134A5687CD33]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [7]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x13014E47314A3953391016EBEEA898AB
Load EMI config from database [DB VER: 222 DB DATE: 11-13-2023] OK [1]
Trying EMI [7805E65B, 4ECF8C5A, 667E0B28, F1ADA01B, 154C2947, A5FE5CDA, D8F5BD39, C41C94FB, EA914E49, C8B7B877, 1A304479]
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_CNAME: G1J9S9
EMMC_ID : 0x13014E47314A3953391016EBEEA898AB
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0001000000 (16.00Mb)
EMMC_USER : 0x1D1F000000 (116.48Gb)
RAM INFO:
INT_SRAM: 0x000003A000 (232.00Kb)
EXT_RAM : 0x0100000000 (4.00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... [EROFS] ... OK
Product Brand : alps
Product Manufacturer : alps
Product Model : CPH2325
Product Name : vnd_oppo6765
Product Device : oppo6765
Product Board : oppo6765
Board Platform : mt6765
Build ID : RP1A.200720.011
Build Date : Sat Oct 23 04:37:56 CST 2021
Display ID : CPH2325_11_A.01
Security Patch : 2021-09-05
Version SDK : 30
Version Release : 11
Version Codename : REL
Firmware Version : 1634934260041
Read security partition from phone...
Decrypting security data... OK
Encrypt security data... OK
Read partition "nvdata"... OK
Read partition "protect1"... OK
Read partition "nvram"... OK
Read NVDATA files... OK
Read NVRAM files... OK
Read security files... OK
Calculating... OK
Repairing IMEI...
IMEI 1: 8659940
IMEI 2: 8659940
Write IMEI and patch CERT [NVDATA]... OK
Checking patch type... [1]
Patching CERT...
Exception: Access violation at address 017603D3 in module PandoraTool.exe. Read of address E7430010

please fix this error pandora team
 
Mar 19, 2022
12
4
Allahabad
After update this error

Selected model: OPPO CPH2269 (OPPO A16)
Operation: Repair
Software version: 6.4

Host Power Off... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Connect phone to [BOX] in BROM mode
Waiting for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0766
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Release testpoint
Advanced Bypass Security... OK
Waiting for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0766
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Get sec config... OK [000000E0]
Active sec flags: []
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1633,usb2ser.sys,3.0.1504.0]
Device found at COM3 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x7B3EA688, 0xD5881792, 0x45709177, 0x9FCFFC33
Get Chip ID... [MT6765]
Get SOC ID... [04C9EBCBA05B5942164400FD1756B08F4FE3BC23C7697EAD391466F6C8DA3D9C]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [7]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x15010044503644424202955DD078B8D1
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_CNAME: DP6DBB
EMMC_ID : 0x15010044503644424202955DD078B8D1
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0001000000 (16.00Mb)
EMMC_USER : 0x0E8F800000 (58.24Gb)
RAM INFO:
INT_SRAM: 0x000003A000 (232.00Kb)
EXT_RAM : 0x0100000000 (4.00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... [EXT4] ... OK
Product Brand : alps
Product Manufacturer : alps
Product Model : CPH2269
Product Name : vnd_oppo6765
Product Device : oppo6765
Product Board : oppo6765
Board Platform : mt6765
Build ID : RP1A.200720.011
Build Date : Wed Nov 24 02:08:30 CST 2021
Display ID : CPH2269_11_A.01
Security Patch : 2021-11-05
Version SDK : 30
Version Release : 11
Version Codename : REL
Firmware Version : 1637690157252
Read security partition from phone...
Decrypting security data... OK
Encrypt security data... OK
Read partition "nvdata"... OK
Read partition "protect1"... OK
Read partition "nvram"... OK
Read NVDATA files... OK
Read NVRAM files... OK
Read security files... OK
Calculating... OK
Repairing IMEI...
IMEI 1: 860000000000000
IMEI 2: 860000000000000
Write IMEI and patch CERT [NVDATA]... OK
Checking patch type... [1]
Patching CERT...
Exception: Access violation at address 017603D3 in module PandoraTool.exe. Read of address DBEE0010
 
  • Like
Reactions: GsmToto

aliipi

Friend's Martview
Oct 28, 2019
122
33
we need redmi xaiomi latest patch update
techno/infiinix mdm lock remove
 
Top