الجهاز ميدياتك وبه حماية جديدة (01-05-2024) ،في هذه الحماية و الأعلى منها تم قفل ثغرات(Force Brom PL،Force Brom PGPTوFRP on Download mode).
تم الفك عن طريق ال Test point.
تم الفك عن طريق ال Test point.
كود:
CM2 - MT2 Service Tool v2.72
probe UAC... Ok
probe libusb... v1.2.6.0
Wait...
S/N: *********** v0163
initalize log engine... Ok
Build directories tree... Ok
Firmware files: D:\reno8\
Backup files: C:\InfinityBox\CM2MT2\backup\
Backup files: 1 dirs: 0
load emi database... Internal: 28 custom: 0
Load IDBase v915508 Ok
Build device list... Ok
Load 169 profiles... Ok
initalize external tools... Ok
initialize libusb... Ok
Ready
DA selected: ~latest | 2023-v6 | DA_BR.2023-12.c2490704.bin
28 DA available, try it one-by-one
DA selected: ~latest | 2024-v6 | DA_BR.2024-06.92aa0977.bin
10 DA available, try it one-by-one
Operation: Identify [ v2.72 ]
Wait...
Connection: Boot [DA] Factory
Port: Both [ B + P ]; Force BROM: Off; USB High-Speed: On
DA Key: custom; Local SLA: Off; Auto-EMI: On
Power device Off and connect cable now
Remember Volume Up/Down or Test-Point
Waiting for device...
PTFN: MediaTek USB Port_V2023 (COM20)
MODE: BOOTROM; PORT: 20
Waiting for BOOT ACK...
BROM: Init... Ok
CHIP: MT6768 SBID: 0x8A00 HWVR: 0xCA00 SWVR: 0x0000 EVOL: 0x0000 HWC: 0x0707
Code: Talbot
Type: MODERN [RAPHAEL]
MEID: A901B656676D60A376DF1F89DA61CBE3
BROM: Sec Level: 0x000000E5; Mode: SBC+SDA+EXT
Ver: 0x05 BL: 0xFE [BOOTROM]
SOCID: 1F85780C857228EDEFD2060A7AA6740B378D6A8AB92D962EB47D665593109F81
SLA: Local Auth [Forced mode]
Start Auth... Ok
Continue Auth... Ok
[FF] Looking for EMI Found
SLA: Start 0x15
Auth Passed; SEC: 0x000000E0
EMI loaded by MEID: A901B656676D60A376DF1F89DA61CBE3
Agent:
[cc9dd105] C:\InfinityBox\CM2MT2\boot\~latest\2024-v6\DA_BR.2024-06.92aa0977.bin
Looking for bootchain in DA...
Selected DA do not support SoC Talbot MODERN [RAPHAEL]
Try with default DA? Yes
Switch to v2216
[3365c4d2] C:\InfinityBox\CM2MT2\boot\0_base\base_v2216\MTK_AllInOne_DA.bin
Found: MT6768; DA: MTK_DOWNLOAD_AGENT
BROM: Sending DA1... Ok [1|1|1|0]
Jump to DA... Ok
Sync... Ok
DA sync... Ok
DA Set Params... Ok
Mode: BROM [1|1|1|0]
EXT_RAM NOT initialized
EMMC CID: 15010044503644414200ED03D2DF29C9 crc Ok
Vendor: Samsung OEM: 256 ID: 445036444142 [DP6DAB] PRV: 0x00
Serial: 3976450783 0xED03D2DF
MM/YY: 2/2022
EMI: FireFly preloader_k69v1_64_titan_buffalo.bin with 13 memory type(s)
1. eMMC LP_DDR4X ID: 150100335636434142 Samsung 3V6CAB RAM: 6.00 Gb
2. eMMC LP_DDR4X ID: 150100444836444142 Samsung DH6DAB RAM: 4.00 Gb
3. eMMC LP_DDR4X ID: 150100445036444142 Samsung DP6DAB RAM: 4.00 Gb
4. eMMC LP_DDR4X ID: 150100445636444142 Samsung DV6DAB RAM: 4.00 Gb
5. eMMC LP_DDR4X ID: 13014E47314331324C Micron G1C12L RAM: 8.00 Gb
6. eMMC LP_DDR4X ID: 13014E47314A395139 Micron G1J9Q9 RAM: 6.00 Gb
7. eMMC LP_DDR4X ID: 13014E47314A395339 Micron G1J9S9 RAM: 4.00 Gb
8. eMMC LP_DDR4X ID: 13014E47314A395238 Micron G1J9R8 RAM: 4.00 Gb
9. eMMC LP_DDR4X ID: 150100444336444D42 Samsung DC6DMB RAM: 4.00 Gb
10. eMMC LP_DDR4X ID: 150100445836384D42 Samsung DX68MB RAM: 3.00 Gb
11. eMMC LP_DDR4X ID: 150100335636434242 Samsung 3V6CBB RAM: 6.00 Gb
12. eMMC LP_DDR4X ID: 150100445636444242 Samsung DV6DBB RAM: 4.00 Gb
13. eMMC LP_DDR4X ID: 150100445036444242 Samsung DP6DBB RAM: 4.00 Gb
Push EMI... EXT_RAM CFG Passed
Boot DA2... Ok [1|1|1|28]
DA Sync... Ok
Load HW info...
RAM: SRAM: 0x00070000 [ 448.00 Kb ]
RAM: DRAM: 0x100000000 [ 4.00 Gb ]
EMMC CID: 15010044503644414200ED03D2DF29C9 crc Ok
Vendor: Samsung OEM: 256 ID: 445036444142 [DP6DAB] PRV: 0x00
Serial: 3976450783 0xED03D2DF
MM/YY: 2/2022
BOOT1: 0x00400000 [ 4.00 Mb ]
BOOT2: 0x00400000 [ 4.00 Mb ]
RPMB: 0x01000000 [ 16.00 Mb ]
USER: 0xE8F800000 [ 58.24 Gb ]
CHIP: MT6768 SBID: 0x8A00 HWVR: 0xCA00 SWVR: 0x0001 EVOL: 0x0000 HWC: 0x0707
Code: Talbot
Type: MODERN [RAPHAEL]
RNID: A3FD622AA2EA67F0F564B89443424096
MEID: A901B656676D60A376DF1F89DA61CBE3
USB: HIGH-SPEED
Boot done MODERN [RAPHAEL] 21 sec
Analyze PMT... Ok
Partition table: PGPT [0x64] with 49 records
Storage [eMMC] Life State: OK
Storage OTP Status: NOT Enabled
Storage [eMMC] RPMB State: RPMB KEY PROGRAMMED [UNUSABLE]
Load [MemTool]... Ok
Probe boot... Ok 844 us
AndroidInfo: recovery;gzip;bootimage|loaded ramsidk size 0xD336B0|1CCF600;
Product Brand: samsung
Product Device: f22
Product Model: SM-E225F
Product Name: f22ins
SW: samsung/f22ins/f22:12/SP1A.210812.016/E225FXXSADXE1:user/release-keys
Patch Level: SP1A.210812.016
Display ID: SP1A.210812.016.E225FXXSADXE1
SW Version: E225FXXSADXE1
Ver. CodeName: REL
Ver. Release: 12
Sec. Patch: 2024-05-01
Build Time: 5/20/2024 5:25:04 AM
Product Info: f22
SW: f22ins-user 12 SP1A.210812.016 E225FXXSADXE1 release-keys
Product Manfct: samsung
Product Board: f22
Board Platform: mt6768
Device ID: f22-samsung-sm-e225f-f22-f22ins
Strategy: [samsung]
Firmware ID: MT6768_samsung_SM-E225F_OSv12_SP1A.210812.016.E225FXXSADXE1_SP1A.210812.016_f22
Verify firmware [MT6768_samsung_SM-E225F_OSv12_SP1A.210812.016.E225FXXSADXE1_SP1A.210812.016_f22]... Firmware is unknown
Please upload https://infinity-box.com/?r=100020
Analyze userdata...
Load userdata header... Ok
userData: encryptable
Backup 23 items to C:\InfinityBox\CM2MT2\backup\MT6768__A901B656676D60A376DF1F89DA61CBE3\
Read [5] nvram Ok 2 sec
Read [27] nvdata Ok 2 sec
Read [33] proinfo Ok 156 us
Zero content file deleted: C:\InfinityBox\CM2MT2\backup\MT6768__A901B656676D60A376DF1F89DA61CBE3\proinfo.bin
Read [13] lk Ok 109 us lk [2313f8d9]
Read [26] nvcfg Ok 1 sec
Read [17] protect1 Ok 344 us
Read [1] pgpt Ok 15 us
Read [32] persistent Ok 47 us
Read [0] preloader Ok 188 us
Read [2] efs Ok 344 us
Read [3] sec_efs Ok 344 us
Exist [32] persistent
Done 10 files 8 sec
Compress: C:\InfinityBox\CM2MT2\backup\MT6768__A901B656676D60A376DF1F89DA61CBE3\ Ok
Verify C:\InfinityBox\CM2MT2\backup\MT6768__A901B656676D60A376DF1F89DA61CBE3.7z Verified
get modem info... loaded 16 us
TITAN_M22LTE_R0MP1_K69V1_64_BSP_MDBIN_PCB01_MT6768_S00.MOLY_LR12A_R3_TC10_6M_PR_A22_M22_M32_SP_V3_T3453
Load nvram items...
NVRAM size: 0x0F3850; 188 items; State: Ok
WiFi MAC: 00:00:00:00:00:00
BT MAC: 00:00:46:00:00:01
imei-1: C8523BDA804A4F
imei-2: 2CEC3CE8E30996
PSN1: N/A
Secondary RPMB... Unknown
Analyze preloader...
EMI: MT6752 preloader_k69v1_64_titan_buffalo.bin with 13 memory type(s)
1. eMMC LP_DDR4X ID: 150100335636434142 Samsung 3V6CAB RAM: 6.00 Gb
2. eMMC LP_DDR4X ID: 150100444836444142 Samsung DH6DAB RAM: 4.00 Gb
3. eMMC LP_DDR4X ID: 150100445036444142 Samsung DP6DAB RAM: 4.00 Gb
4. eMMC LP_DDR4X ID: 150100445636444142 Samsung DV6DAB RAM: 4.00 Gb
5. eMMC LP_DDR4X ID: 13014E47314331324C Micron G1C12L RAM: 8.00 Gb
6. eMMC LP_DDR4X ID: 13014E47314A395139 Micron G1J9Q9 RAM: 6.00 Gb
7. eMMC LP_DDR4X ID: 13014E47314A395339 Micron G1J9S9 RAM: 4.00 Gb
8. eMMC LP_DDR4X ID: 13014E47314A395238 Micron G1J9R8 RAM: 4.00 Gb
9. eMMC LP_DDR4X ID: 150100444336444D42 Samsung DC6DMB RAM: 4.00 Gb
10. eMMC LP_DDR4X ID: 150100445836384D42 Samsung DX68MB RAM: 3.00 Gb
11. eMMC LP_DDR4X ID: 150100335636434242 Samsung 3V6CBB RAM: 6.00 Gb
12. eMMC LP_DDR4X ID: 150100445636444242 Samsung DV6DBB RAM: 4.00 Gb
13. eMMC LP_DDR4X ID: 150100445036444242 Samsung DP6DBB RAM: 4.00 Gb
Preloader saved: C:\InfinityBox\CM2MT2\backup\preloader\preloader_k69v1_64_titan_buffalo.bin
Verify C:\InfinityBox\CM2MT2\backup\preloader\preloader_k69v1_64_titan_buffalo.bin [d84cc389]... Exist
Probe FRP... Most probably On
Probe bootloader... Seems as Locked
Verify [DA] data... Ok
Finished 1 min 3 sec
Keep connection
Operation: Reset Settings/Format FS [ v2.72 ]
WARNING: Reset may delete ALL USER DATA!
Wipe Off; Userdata Off; FRP On; Accounts Off; Smart Analyzer On
Wait...
Analyze PMT... Ok
Partition table: PGPT [0x64] with 49 records
Product Brand: samsung
Product Device: f22
Product Model: SM-E225F
Product Name: f22ins
SW: samsung/f22ins/f22:12/SP1A.210812.016/E225FXXSADXE1:user/release-keys
Patch Level: SP1A.210812.016
Display ID: SP1A.210812.016.E225FXXSADXE1
SW Version: E225FXXSADXE1
Ver. CodeName: REL
Ver. Release: 12
Sec. Patch: 2024-05-01
Build Time: 5/20/2024 5:25:04 AM
Product Info: f22
SW: f22ins-user 12 SP1A.210812.016 E225FXXSADXE1 release-keys
Product Manfct: samsung
Product Board: f22
Board Platform: mt6768
Device ID: f22-samsung-sm-e225f-f22-f22ins
Strategy: [samsung]
Firmware ID: MT6768_samsung_SM-E225F_OSv12_SP1A.210812.016.E225FXXSADXE1_SP1A.210812.016_f22
Android ver: 12
UserDataFS: 0x02 [ext4|8+] CacheFS: 0x02 [ext4|8+]
Verify [DA] data... Ok
Backup exist: C:\InfinityBox\CM2MT2\backup\MT6768__A901B656676D60A376DF1F89DA61CBE3
Stage: Android OS Off
Stage: FRP...
process [frp]... Ok
verify [frp] 128.00 Kb...
rewrite... Ok
process [persistent]... Ok Ok
Completed
Stage: Vendor...
process [persistent]... Ok
verify [persistent] 128.00 Kb...
rewrite... Ok
If FRP still active after reset, set [Userdata] On and make reset again
Finished 16 sec
Keep connection