Vivo Y53s V2058 PD2103F  Latest Security 2024 Firmware Read BY GSM BISMA









bhaijan33710



DA selected: Vanzo | MT6570 | MTK_AllInOne_DA_1728_2017-08-22.1ff60f3b.bin
DA selected: Vivo | 2019-MT6765 | MTK_AllInOne_DA.2018-03.af91cc0b.bin | auth.766cb13d.auth
DA selected: Vivo | 2024-11-v5 | MTK_AllInOne_DA.2024-11.a6947361.bin
Sec. Patch: 2024-11+ MT6763, MT6771, MT6765, MT6761, MT6768, MT6885, MT6873, MT6785, MT6853, MT6893, MT6833, MT6877, MT6781
To connect this device use CM2MT2 v2.84 or higher and un-check [RPMB state] in [Settings]

Start: Identify [ v2.80 ]
Protocol: Boot [DA] Factory
Port: Both [ B + P ]; Force BROM: Off; USB High-Speed: On
DA Key: custom; Local SLA: Off; Auto-EMI: On

Power device Off and connect cable now
Remember Volume Up/Down or Test-Point
Waiting for device...
  [ PRELOADER PORT #3 ] MediaTek PreLoader USB VCOM_V1632 (Android) (COM3)
Waiting for boot Ack...
Boot Init... Ok
MT6768 HWs: 0x8A00 HWv: 0xCA00 HWc: 0x0707 SWv: 0x0000 Evo: 0x0000 Talbot|P65|G85
  Type: MODERN [RAPHAEL]
Sec Level: 0x00000005; Mode: SBC+SDA
  Ver: 0xFF BL: 0x03 [PRELOADER PORT]
  SOCID: 90867FB585B907678029E12242254E159F74CC30FB1A844CBAF7B8E97773BE46
Agent:
  [d316571a] C:\InfinityBox\CM2MT2\boot\Vivo\2024-11-v5\MTK_AllInOne_DA.2024-11.a6947361.bin
Looking for bootchain in DA...
Found: MT6768; DA: MTK_DOWNLOAD_AGENT
Sending DA1... Ok  [1|0|0|0]
Jump to DA... Ok
Sync... Ok
DA sync... Ok
Set PowerKey... Ok
Set PowerSource... Ok
Set ChecksumLevel [both]... Ok
DA Set Params... Ok
  Mode: PRELOADER  [1|0|0|0]
  EXT_RAM initialized
Boot DA2... Ok  [1|0|0|28]
DA Sync... Ok

Get hardware info...
RAM: SRAM: 0x00070000 448.00 Kb
RAM: DRAM: 0x100000000 4.00 Gb

EMMC CID: 13014E47314331324C1011CA2FE03853 crc Ok
  Vendor: Micron OEM: 334 ID: 47314331324C [G1C12L] PRV: 0x10
  Serial: 298463200 0x11CA2FE0
  MM/YY: 3/2021
  BOOT1: 0x00400000 4.00 Mb
  BOOT2: 0x00400000 4.00 Mb
  RPMB: 0x01000000 16.00 Mb
  USER: 0x1D1F000000 116.48 Gb

MT6768 HWs: 0x8A00 HWv: 0xCA00 HWc: 0x0707 SWv: 0x0001 Evo: 0x0000 Talbot|P65|G85
  Type: MODERN [RAPHAEL]
  RNID: 46B50A2B14FED9389076A2C6D6BDF853
  MEID: F18A1C8E915A328C432F06872B9BA929
  SOCID: 90867FB585B907678029E12242254E159F74CC30FB1A844CBAF7B8E97773BE46
da3 engine nOk(boot)

USB: HIGH-SPEED
Boot done 6 sec
Build key.json... Ok
Saved: C:\InfinityBox\CM2MT2\phdata\key.json
Load partition table... Ok 16 us
Partition table: PGPT [0x64] 49 entries
Load [MemTool]... Ok
[FF3] init fail: da init nOk(send)
Connect via BROM (volume keys)
rpmb engine: Off

Storage [MMC] Life State: OK
Storage OTP Status: Unlocked
Storage [MMC] RPMB State: RPMB Key programmed [UNUSABLE]
Partitions:
  1. 0x000000000000 Size 0x000000400000 preloader
  2. 0x000000000000 Size 0x000000008000 pgpt
  3. 0x000000008000 Size 0x000006000000 recovery
  4. 0x000006008000 Size 0x000000080000 misc
  5. 0x000006088000 Size 0x000000080000 para
  6. 0x000006108000 Size 0x000001400000 expdb
  7. 0x000007508000 Size 0x000000100000 frp
  8. 0x000007608000 Size 0x000000800000 vbmeta
  9. 0x000007E08000 Size 0x000000800000 vbmeta_system
  10. 0x000008608000 Size 0x000000800000 vbmeta_vendor
  11. 0x000008E08000 Size 0x00000169A000 md_udc
  12. 0x00000A4A2000 Size 0x000002000000 metadata
  13. 0x00000C4A2000 Size 0x000002000000 nvcfg
  14. 0x00000E4A2000 Size 0x000004000000 nvdata
  15. 0x0000124A2000 Size 0x000000A00000 backup
  16. 0x000012EA2000 Size 0x000000A00000 reserved
  17. 0x0000138A2000 Size 0x000000010000 vbmeta_oem
  18. 0x0000138B2000 Size 0x000000010000 vbmeta_vgc
  19. 0x0000138C2000 Size 0x000004000000 storage
  20. 0x0000178C2000 Size 0x000004000000 logdump
  21. 0x00001B8C2000 Size 0x000003000000 persist
  22. 0x00001E8C2000 Size 0x000000800000 protect1
  23. 0x00001F0C2000 Size 0x000000F3E000 protect2
  24. 0x000020000000 Size 0x000000800000 seccfg
  25. 0x000020800000 Size 0x000000200000 sec1
  26. 0x000020A00000 Size 0x000000300000 proinfo
  27. 0x000020D00000 Size 0x000000080000 efuse
  28. 0x000020D80000 Size 0x000001A00000 boot_para
  29. 0x000022780000 Size 0x000004000000 nvram
  30. 0x000026780000 Size 0x000000800000 logo
  31. 0x000026F80000 Size 0x000008000000 md1img
  32. 0x00002EF80000 Size 0x000008000000 md1img_1
  33. 0x000036F80000 Size 0x000000100000 spmfw
  34. 0x000037080000 Size 0x000000600000 scp1
  35. 0x000037680000 Size 0x000000600000 scp2
  36. 0x000037C80000 Size 0x000000100000 sspm_1
  37. 0x000037D80000 Size 0x000000100000 sspm_2
  38. 0x000037E80000 Size 0x000001000000 gz1
  39. 0x000038E80000 Size 0x000001000000 gz2
  40. 0x000039E80000 Size 0x000004000000 lk
  41. 0x00003DE80000 Size 0x000004000000 lk2
  42. 0x000041E80000 Size 0x000006000000 boot
  43. 0x000047E80000 Size 0x000004000000 vendor_boot
  44. 0x00004BE80000 Size 0x000000800000 dtbo
  45. 0x00004C680000 Size 0x000000500000 tee1
  46. 0x00004CB80000 Size 0x000000C80000 tee2
  47. 0x00004D800000 Size 0x000280000000 super
  48. 0x0002CD800000 Size 0x000010000000 cache
  49. 0x0002DD800000 Size 0x001A3DCF8000 userdata
  50. 0x001D1B4F8000 Size 0x000002B00000 otp
  51. 0x001D1DFF8000 Size 0x000001000000 flashinfo
  52. 0x001D1EFF8000 Size 0x000000008000 sgpt

If process will stop later - try with [SW info] Off
Device has no slots
Probe boot...
boot: vendor_boot;ramsidk size=0;recovery;gzip;ramdisk size 0x5142800;boot;gzip;ramdisk size 0x279700; Ok 1 sec
  Product Brand: vivo
  Product Device: 2058
  Product Model: V2058
  Product Name: 2058N
  SW: vivo/2058N/2058:12/SP1A.210812.003/compiler10211658:user/release-keys
  Patch Level: SP1A.210812.003
  Display ID: SP1A.210812.003 release-keys
  SW Version: compiler10211658
  Ver. CodeName: REL
  Ver. Release: 12
  Sec. Patch: 2024-04-01
  Build Time: 10/21/2024 9:19:05 AM
  Product Info: k69v1_64
  SW: full_k69v1_64-user 12 SP1A.210812.003 compiler10211658 release-keys
  Product Manfct: vivo
  Product Board: k69v1_64
  Board Platform: mt6768
Device ID: vivo-v2058-2058n-k69v1-64
Strategy: [vivo]
Firmware ID: MT6768_vivo_V2058_OSv12_SP1A.210812.003_k69v1_64
Verify firmware [MT6768_vivo_V2058_OSv12_SP1A.210812.003_k69v1_64]... Exist (1)

Probe userdata...
userData: fileSystem : [f2fs]  with FBE [file based encryption]

Backup 72 items to C:\InfinityBox\CM2MT2\backup\MT6768__F18A1C8E915A328C432F06872B9BA929_vivo-v2058-2058n-k69v1-64\
Read [seccfg] Ok 219 us
Read [nvram] Ok 1 sec
Read [nvdata] Ok 1 sec
Read [proinfo] Ok 94 us
Read [lk] Ok 1 sec
Read [nvcfg] Ok 828 us
Read [protect1] Ok 234 us
Read [pgpt] Ok 15 us
Read [persist] Ok 1 sec
Read [preloader] Ok 141 us
Done 10 files 10 sec
Compress: C:\InfinityBox\CM2MT2\backup\MT6768__F18A1C8E915A328C432F06872B9BA929_vivo-v2058-2058n-k69v1-64\ Ok
Verify C:\InfinityBox\CM2MT2\backup\MT6768__F18A1C8E915A328C432F06872B9BA929_vivo-v2058-2058n-k69v1-64.7z Finished
Verify [recovery.vivo-v2058-2058n-k69v1-64] data... Ok 2 sec

Load nvram...
NVRAM: 181 items; State: Ok
  WiFi MAC: AA:00:6E:74:2F:76
  BT MAC: C0:4XXXXXX
  IMEI1: 866XXXXXXXX
  IMEI2: 86XXXXXXXXX
  PSN1: 0B1XXXXXXXXXXXX

get modem info...
load [md1img] Ok 3 sec BBK_R0MP1_K69T_V1_64_BSP_MDBIN_PCB01_MT6768_S00.MOLY_LR12A_R3_TC19_PR2_SP_V1_P43

Secondary RPMB... Off

Probe preloader...
Read [preloader]... Ok
EMI: MT6769 preloader_k69v1_64.bin with 16 memory types [20241021-170540] slots: no

Probe LK...
load [lk] Ok 1 sec
lk [541eddf0] k69v1_64-e26efb2-20240110204643-20241021170631
Verify [lk.vivo-v2058-2058n-k69v1-64] data... Ok 4 sec

Probe FRP... Most probably: On

Probe bootloader... Seems as locked
Stop: Identify [ v2.80 ] 1 min 6 sec => Keep connection