Online
reparar imei Tecno Spark Go 2023 Bf7 Con Pandora f4 nueva seguridad
VAN A IR DONDE DICE ACTORIZACION AVANZADA PRELOADER, ELIGEN TYPE MT6761 SEC2024, LUEGO LE DAN REPARAR IMEI Y CONECTAN CON V-V+ Y ELLA HACE SU MAGIA.
Selected model: Tecno BF7 (Tecno Spark Go 2023)
Operation: Repair
Software version: 7.3
Work ID: 41925146
Connect phone in PRELOADER Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek PreLoader USB VCOM_V1632 (Android),usb2ser.sys,3.0.1504.0]
Device found at COM7 [PRELOADER]
Open port... OK
Send start cmd... OK
Get HW code from device... 0717
Get sec config... OK [00000005]
Active sec flags: [SBC DAA]
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0200, HW SUB CODE: 8A00
Detect chip [MT6761]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Preloader exist. Skip connection verification.
Get ME ID... OK
ME_ID = 0x9CCAAE21, 0x1672375E, 0x8CD341A8, 0x5A510E63
Load DownloadAgent... OK
Search DA... OK [0]
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [PRELOADER]
Preloader alive. Skip initializing external RAM
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_CNAME: A3A561
EMMC_ID : 0xD601034133413536311226DD25D11933
EMMC_BOOT1: 0x0000400000 (4,00Mb)
EMMC_BOOT2: 0x0000400000 (4,00Mb)
EMMC_RPMB : 0x0001000000 (16,00Mb)
EMMC_USER : 0x0E67800000 (57,62Gb)
RAM INFO:
INT_SRAM: 0x000003A600 (233,50Kb)
EXT_RAM : 0x0100000000 (4,00Gb)
Checking USB status... USB_HIGH_SPEED
[EFUSE INFO]: BROM not disabled
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... [EXT4] ... OK
Product Brand : TECNO
Product Manufacturer : TECNO
Product Model : TECNO BF7
Product Name : BF7-GL
Product Device : TECNO-BF7
Product Board : TECNO-BF7
Board Platform : mt6761
Build ID : SP1A.210812.016
Build Date : Wed Jul 3 12:26:53 CST 2024
Display ID : TECNO-S-64-240703V1695
Security Patch : 2024-06-05
Version SDK : 31
Version Release : 12
Version Codename : REL
Firmware Version : 240703V1812
Userdata FS Type : F2FS
Switch to BROM
Read partition "preloader"... OK
Read partition "preloader_backup"... OK
Parse scatter file... OK
Load Rom Images... OK
Connect phone in BROM Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1632,usb2ser.sys,3.0.1504.0]
Device found at COM9 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0717
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0200, HW SUB CODE: 8A00
Detect chip [MT6761]
LibUSB installed
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Release testpoint, waiting 2 seconds
Advanced Bypass Security... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1632,usb2ser.sys,3.0.1504.0]
Device found at COM9 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0717
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0200, HW SUB CODE: 8A00
Detect chip [MT6761]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x9CCAAE21, 0x1672375E, 0x8CD341A8, 0x5A510E63
Get Chip ID... [MT6761]
Get SOC ID... [7E0046D6D2F18C8AABA5FDFE6B1D1FB7FA584FE44774BABE7A654A4CFC32E16C]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [5]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0xD601034133413536311226DD25D11933
Load EMI from file... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_CNAME: A3A561
EMMC_ID : 0xD601034133413536311226DD25D11933
EMMC_BOOT1: 0x0000400000 (4,00Mb)
EMMC_BOOT2: 0x0000400000 (4,00Mb)
EMMC_RPMB : 0x0001000000 (16,00Mb)
EMMC_USER : 0x0E67800000 (57,62Gb)
RAM INFO:
INT_SRAM: 0x000003A500 (233,25Kb)
EXT_RAM : 0x0100000000 (4,00Gb)
HEALTH:
Pre EOL Info: normal
DeviceLifeTimeEstA: 20% - 30% device life time used
DeviceLifeTimeEstB: info not available
Checking USB status... USB_HIGH_SPEED
Restore parts:
Write file "preloader_bf7_h6127.bin"... OK
Write file "preloader_bf7_h6127_backup.bin"... OK
Read partitions info from phone... OK
Checking A/B state... OK
Read security partition from phone...
Decrypting security data... OK
Encrypt security data... OK
Read partition "nvdata"... OK
Read partition "protect1"... OK
Read partition "nvram"... OK
Read NVDATA files... OK
Read NVRAM files... OK
Read security files... OK
Calculating... OK
Read IMEI... OK
IMEI 1: 355936275519441
IMEI 2: 355936275519458
Repairing IMEI...
IMEI 1: 353961118801071
IMEI 2: 353961115325074
Write IMEI [NVDATA]... OK
Write IMEI [NVRAM]... OK
Write partition "nvdata"... OK
Write partition "nvram"... OK
Repair Security done!