Online
Selected model: OPPO CPH2339 (Oppo A77 5G)
Operation: Unlock network
Software version: 6.10
Work ID: 32315572
Connect phone in BROM Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM0 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Install LibUSB... OK
Waiting for device... OK
Open port... OK
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Release testpoint, waiting 2 seconds
Advanced Bypass Security... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM15 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x0DFE64ED, 0x0AE2B8AA, 0x5D1B61AF, 0xA7D223FA
Get Chip ID... [MT6765]
Get SOC ID... [40FAAEDFEFBAD0A648E614BEC117DAE98105A0B5E734357849 F1B121D8A15777]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [7]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x15010044555442343202797EE8DE39C3
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_CNAME: DUTB42
EMMC_ID : 0x15010044555442343202797EE8DE39C3
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0001000000 (16.00Mb)
EMMC_USER : 0x1D1EC00000 (116.48Gb)
RAM INFO:
INT_SRAM: 0x000003A000 (232.00Kb)
EXT_RAM : 0x0100000000 (4.00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... [EROFS] ... OK
Product Brand : OPPO
Product Manufacturer : OPPO
Product Model : CPH2385
Product Name : CPH2385
Product Device : OP5353L1
Product Board : k65v1_64_bsp
Board Platform : mt6765
Build ID : SP1A.210812.016
Build Date : Sat Mar 30 18:25:29 CST 2024
Display ID : CPH2385_14.0.0.620(EX01)
Security Patch : 2024-04-05
Version SDK : 34
Version Release : 14
Version Codename : REL
Firmware Version : S.1754e84_35a93
Userdata FS Type : F2FS
Read security partition from phone... OK
Read security files... OK
Read NVDATA files... OK
Calculating... OK
Read lock info... OK
Read partition "nvdata"... OK
Read partition "protect1"... OK
Read security files... OK
Read NVDATA files... OK
Read IMEI... OK
Unlock... OK [DF1, DF2, GB1, GB2, SM]
Write lock info... OK
Write security partition to phone... OK
Network Unlock done!
Operation: Unlock network
Software version: 6.10
Work ID: 32315572
Connect phone in BROM Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM0 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Install LibUSB... OK
Waiting for device... OK
Open port... OK
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Release testpoint, waiting 2 seconds
Advanced Bypass Security... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM15 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x0DFE64ED, 0x0AE2B8AA, 0x5D1B61AF, 0xA7D223FA
Get Chip ID... [MT6765]
Get SOC ID... [40FAAEDFEFBAD0A648E614BEC117DAE98105A0B5E734357849 F1B121D8A15777]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [7]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x15010044555442343202797EE8DE39C3
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_CNAME: DUTB42
EMMC_ID : 0x15010044555442343202797EE8DE39C3
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0001000000 (16.00Mb)
EMMC_USER : 0x1D1EC00000 (116.48Gb)
RAM INFO:
INT_SRAM: 0x000003A000 (232.00Kb)
EXT_RAM : 0x0100000000 (4.00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... [EROFS] ... OK
Product Brand : OPPO
Product Manufacturer : OPPO
Product Model : CPH2385
Product Name : CPH2385
Product Device : OP5353L1
Product Board : k65v1_64_bsp
Board Platform : mt6765
Build ID : SP1A.210812.016
Build Date : Sat Mar 30 18:25:29 CST 2024
Display ID : CPH2385_14.0.0.620(EX01)
Security Patch : 2024-04-05
Version SDK : 34
Version Release : 14
Version Codename : REL
Firmware Version : S.1754e84_35a93
Userdata FS Type : F2FS
Read security partition from phone... OK
Read security files... OK
Read NVDATA files... OK
Calculating... OK
Read lock info... OK
Read partition "nvdata"... OK
Read partition "protect1"... OK
Read security files... OK
Read NVDATA files... OK
Read IMEI... OK
Unlock... OK [DF1, DF2, GB1, GB2, SM]
Write lock info... OK
Write security partition to phone... OK
Network Unlock done!