HOT Realme C55 RMX3710 imei Repair Done Android 13 2024 Security Patch Without TEST POINT

asad76

Friend's Martview
Apr 17, 2020
328
244
US

Realme C55 RMX3710 imei Repair Done Android 13 2024 Security Patch Without TEST POINT Without DOWNGRADE


Selected model: Realme RMX3710 (Realme C55)
Operation: Repair
Software version: 6.3
Work ID: 21194275

Connect phone in BROM Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1633,usb2ser.sys,3.0.1504.0]
Device found at COM21 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0707
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6768]
LibUSB installed
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Release testpoint, waiting 2 seconds
Advanced Bypass Security... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1633,usb2ser.sys,3.0.1504.0]
Device found at COM21 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0707
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6768]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x32614B71, 0xD2D19D33, 0xAC745D12, 0x1038E5DD
Get Chip ID... [MT6768]
Get SOC ID... [F7062793E8117774DABEB3C495ED0FF7320CE5B223DD4341F2D70DA8B22BB68B]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [8]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x9B010059305332353600A28A171C5A8D
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_CNAME: Y0S256
EMMC_ID : 0x9B010059305332353600A28A171C5A8D
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0001000000 (16.00Mb)
EMMC_USER : 0x3A3E000000 (232.97Gb)
RAM INFO:
INT_SRAM: 0x0000070000 (448.00Kb)
EXT_RAM : 0x0100000000 (4.00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK [A]
Read product info... error(0)
Read partition "nvdata"... OK
Read partition "nvram"... OK
Read NVDATA files... OK
Read NVRAM files... OK
Repairing IMEI...
IMEI 1: 3546xxxxxxxxxxxx
IMEI 2: 3546xxxxxxxxxxxx
Write IMEI and patch CERT [NVDATA]... OK
Checking patch type... [1]
Patching partition... OK
Save patched partiton... OK
Read security partition from phone... OK
Decrypting security data... OK
Encrypt security data... OK
Write security partition to phone... OK
Checking additional lock... [DISABLED]
Write IMEI and patch CERT [NVRAM]... OK
Write partition "nvdata"... OK
Write partition "nvram"... OK
Repair Security and Patch cert done!
If your phone after repair keeps rebooting - use wipe data option.
 
Top