Z3X Pandora PRO 5.11-5.12 new Hot Update

Z3X Team

SPYROS

Product Supporter
Jan 27, 2023
233
705
PK

What's news [VER 5.11]

- Added support Vivo NEW security, autodetect, repair ...

- Added support a lot of Vivo phones

PD2123 T1x 5G, PD2123B T1x 5G, PD2123C T1x 5G, PD2123D T1x 5G,
PD2123E T1x 5G, PD2130 S10e, PD2130B S10e, PD2131 iQOO Z5x,
PD2131B iQOO Z5x, PD2131C iQOO Z5x, PD2215F V25, PD2224 Y77 5G,
PD2224BF Y77 5G, PD2224CF Y77 5G, PD2224F Y77 5G, PD2224GF Y77 5G,
PD2224HF Y77 5G, PD2224IF Y77 5G, PD2230 iQOO Z7i, PD2230F Y56 5G,
PD2236BF Y02, PD2236CF Y02, PD2236DF Y02, PD2236F Y02, PD2236HF Y02a,
PD2236IF Y02t, PD2236KF Y02t, PD2238F iQOO Neo 7, PD2257F Y100,
PD2257KF iQOO Z7 5G, PD2279F Y36 5G, PD2281F Y27, PD2281GF Y27 4G,
PD2317F Y17s, V2068A Y31s, V2069BA Y75s, V2118 Y01, V2130 V23 5G,
V2130A S10e, V2131A iQOO Z5x, V2166 Y01a, V2202 V25 5G, V2208 X80 Lite,
V2213 Y02, V2214 Y16, V2217 Y02, V2225 Y56 5G, V2230A Y35m 5G,V2230EA iQOO Z7i,
V2234 Y02a, V2236 Y02A, V2236A Y11 2023, V2237 V27e, V2238 Y22, V2239 Y100,
V2248 Y36 5G, V2249 Y27 4G, V2279A Y35 Plus, V2302 Y27, V2310 Y17s

- Added support Infinix X6517, X6823

- Added support Inoi 2 2021, Inoi 2 Lite 2021, Inoi 5 2021, Inoi 5 Lite 2021, Inoi 7 2020, Inoi 7 2021,
Inoi 83, Inoi A22 Lite, Inoi A52 Lite, Inoi A62 Lite, Inoi A72, Inoi Note 12,
Inoi inoiPad, Inoi inoiPad mini, Inoi inoiPad Pro

- Added support P662L Itel P40, P683L Itel P40 Plus, A632W Itel A04
A662L Itel A60, A662LM Itel A60s, S665L, S665LN Itel S23

- Added support TB328FU, TB328XU Lenovo Tab M10 Gen 3

- GUI updated

- Mediatek Read Phone Info expanded (detect real model name etc)

- Small bug fixes

If you still not have pandora contact with official z3x reseller and buy a license and get Pandora Online immediately.
If you wish a Standalone solution, contact with domestic official reseller and buy Pandora BOX.

Pandora PRO 5.12 Setup
New Link

DO NOT POST ANY LOGS OF JOB HERE in this thread, if you have any error - open own thread and supporters will answer there!!!
 
Last edited by a moderator:

aliipi

Friend's Martview
Oct 28, 2019
145
46

What's news [VER 5.11]

- Added support Vivo NEW security, autodetect, repair ...

- Added support a lot of Vivo phones

PD2123 T1x 5G, PD2123B T1x 5G, PD2123C T1x 5G, PD2123D T1x 5G,
PD2123E T1x 5G, PD2130 S10e, PD2130B S10e, PD2131 iQOO Z5x,
PD2131B iQOO Z5x, PD2131C iQOO Z5x, PD2215F V25, PD2224 Y77 5G,
PD2224BF Y77 5G, PD2224CF Y77 5G, PD2224F Y77 5G, PD2224GF Y77 5G,
PD2224HF Y77 5G, PD2224IF Y77 5G, PD2230 iQOO Z7i, PD2230F Y56 5G,
PD2236BF Y02, PD2236CF Y02, PD2236DF Y02, PD2236F Y02, PD2236HF Y02a,
PD2236IF Y02t, PD2236KF Y02t, PD2238F iQOO Neo 7, PD2257F Y100,
PD2257KF iQOO Z7 5G, PD2279F Y36 5G, PD2281F Y27, PD2281GF Y27 4G,
PD2317F Y17s, V2068A Y31s, V2069BA Y75s, V2118 Y01, V2130 V23 5G,
V2130A S10e, V2131A iQOO Z5x, V2166 Y01a, V2202 V25 5G, V2208 X80 Lite,
V2213 Y02, V2214 Y16, V2217 Y02, V2225 Y56 5G, V2230A Y35m 5G,V2230EA iQOO Z7i,
V2234 Y02a, V2236 Y02A, V2236A Y11 2023, V2237 V27e, V2238 Y22, V2239 Y100,
V2248 Y36 5G, V2249 Y27 4G, V2279A Y35 Plus, V2302 Y27, V2310 Y17s

- Added support Infinix X6517, X6823

- Added support Inoi 2 2021, Inoi 2 Lite 2021, Inoi 5 2021, Inoi 5 Lite 2021, Inoi 7 2020, Inoi 7 2021,
Inoi 83, Inoi A22 Lite, Inoi A52 Lite, Inoi A62 Lite, Inoi A72, Inoi Note 12,
Inoi inoiPad, Inoi inoiPad mini, Inoi inoiPad Pro

- Added support P662L Itel P40, P683L Itel P40 Plus, A632W Itel A04
A662L Itel A60, A662LM Itel A60s, S665L, S665LN Itel S23

- Added support TB328FU, TB328XU Lenovo Tab M10 Gen 3

- GUI updated

- Mediatek Read Phone Info expanded (detect real model name etc)

- Small bug fixes

If you still not have pandora contact with official z3x reseller and buy a license and get Pandora Online immediately.
If you wish a Standalone solution, contact with domestic official reseller and buy Pandora BOX.



DO NOT POST ANY LOGS OF JOB HERE in this thread, if you have any error - open own thread and supporters will answer there!!!
Selected model: OPPO CPH2269 (OPPO A16)
Operation: Repair
Software version: 5.12

Connect Type-C to NONE... OK
Host Power Off... OK
Connect phone to [PC] in BROM/PRELOADER Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek PreLoader USB VCOM_V1633 (Android),usb2ser.sys,3.0.1504.0]
Device found at COM48 [PRELOADER]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get sec config... OK [00000005]
Active sec flags: [SBC DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Force switch to BROM... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1633,usb2ser.sys,3.0.1504.0]
Device found at COM12 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
LibUSB installed
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Release testpoint, waiting 2 seconds
Advanced Bypass Security... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1633,usb2ser.sys,3.0.1504.0]
Device found at COM12 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0xDF1C9841, 0xB9CAACEB, 0x0FE0013A, 0xCE262D8B
Get Chip ID... [MT6765]
Get SOC ID... [738CBBD7522DD04E97EDBBA60AA795A37EAC9E2A3698F1BA41D43883B0BA06A8]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [7]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x15010044503644424202EDADFAC6C895
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_CNAME: DP6DBB
EMMC_ID : 0x15010044503644424202EDADFAC6C895
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0001000000 (16.00Mb)
EMMC_USER : 0x0E8F800000 (58.24Gb)
RAM INFO:
INT_SRAM: 0x000003A000 (232.00Kb)
EXT_RAM : 0x0100000000 (4.00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... [EXT4] ... OK
Product Brand : alps
Product Manufacturer : alps
Product Model : CPH2269
Product Name : vnd_oppo6765
Product Device : oppo6765
Product Board : oppo6765
Board Platform : mt6765
Build ID : RP1A.200720.011
Build Date : Thu Jun 2 15:13:11 CST 2022
Display ID : CPH2269_11_A.01
Security Patch : 2022-06-05
Version SDK : 30
Version Release : 11
Version Codename : REL
Firmware Version : 1654152843290
Userdata FS Type : F2FS
Read partition "nvdata"... OK
Read partition "nvram"... OK
Read NVDATA files... OK
Read NVRAM files... OK
Repairing IMEI...
IMEI 1: 351429=======
IMEI 2: 35142========
Write IMEI and patch CERT [NVDATA]... OK
Checking patch type... [2]
Load partiton for patching... OK
Patching CERT... error(ERR_SF_4)
 
  • Like
Reactions: lpservice

SPYROS

Product Supporter
Jan 27, 2023
233
705
PK
Selected model: Infinix X6815 (Infinix Zero 5G)
Operation: Repair
Software version: 5.11

Parse scatter file... OK
Load Rom Images... OK
Host Power Off... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Connect phone to [BOX] in BROM mode
Waiting for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0959
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6877]
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Release testpoint
Advanced Bypass Security... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1645,usb2ser.sys,3.0.1504.0]
Device found at COM9 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0959
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6877]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0xE70C12D3, 0x9ABB2DB8, 0x43C2322E, 0x3EFAB9F0
Get Chip ID... [MT6877]
Get SOC ID... [E63D1A5AFCF33422E5AA806A595DC3C895CE24A97F9C004A3B]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [17]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
UFS CID (FW VER): KMAG9001PM-B814 (0200)
Load EMI config from preloader... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
UFS INFO:
UFS_CID : KMAG9001PM-B814
UFS_FWVER : 0200
BLOCK_SIZE: 0x0000001000 (4.00Kb)
UFS_LU0 : 0x0000400000 (4.00Mb)
UFS_LU1 : 0x0000400000 (4.00Mb)
UFS_LU2 : 0x1DCB000000 (119.17Gb)
RAM INFO:
INT_SRAM: 0x0000070000 (448.00Kb)
EXT_RAM : 0x0200000000 (8.00Gb)
Get scatter info... OK
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK [A]
Read partition "nvdata"... OK
Read partition "nvram"... OK
Read NVDATA files... OK
Read NVRAM files... OK
Read IMEI... error
Repairing IMEI...
IMEI 1: *************************
IMEI 2: ***********************
Write IMEI [NVDATA]... OK
Write IMEI [NVRAM]... OK
Write partition "nvdata"... OK
Repair Security done!
 
  • Like
Reactions: nakash and cxara

unlocker

Active Member
Nov 19, 2016
34
7
pakistan
A O A Sir,

Pendora 5.10 pr ok tha Ab Update krne se ye ERROR aa raha hy

Selected model: OPPO CPH2269 (OPPO A16)
Operation: Repair
Software version: 5.12
Work ID: 9617101

Connect phone in BROM/PRELOADER Mode
Waiting for device... OK
Driver: [MediaTek Inc.,usbser,MediaTek USB Port,usbser.sys,10.0.19041.2130]
You are using driver version 10.0.19041.2130, we recommend using version 3.0.1504.0 for proper operation. You can install the correct driver from the program directory.
Device found at COM44 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
LibUSB installed
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Release testpoint, waiting 2 seconds
Advanced Bypass Security... OK
Waiting for device... OK
Driver: [MediaTek Inc.,usbser,MediaTek USB Port,usbser.sys,10.0.19041.2130]
You are using driver version 10.0.19041.2130, we recommend using version 3.0.1504.0 for proper operation. You can install the correct driver from the program directory.
Device found at COM44 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0xD99B8D5B, 0x5FE647F8, 0xC54F3D3A, 0xC9E39766
Get Chip ID... [MT6765]
Get SOC ID... [61C28D893F69F70C2E4B5A5FD2C7A4B222EE6377D245B36E0C8F999B12DB1F72]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [7]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x13014E47314A395238101306F22658C1
Load EMI from phone... Skip (read preloader error)
Load EMI config from database [DB VER: 212 DB DATE: 05-15-2023] OK [1]
Trying EMI [7805E65B, 4ECF8C5A, 667E0B28, F1ADA01B, 154C2947, A5FE5CDA, F7711DB6]
Init EXT RAM... error(2)

plz Helps me
thanks 2 All
 
  • Like
Reactions: nakash

SPYROS

Product Supporter
Jan 27, 2023
233
705
PK
Selected model: Mediatek Mediatek
Operation: Unlock network
Software version: 5.12

Host Power Off... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Host Power On... OK
Connect phone to [BOX] in BROM/PRELOADER Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM12 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0699
Get sec config... OK [00000000]
Get HW & SW version from device... OK
HW VER: CB00, SW VER: 0002, HW SUB CODE: 8A00
Detect chip [MT6739]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Force switch to BROM... OK
Host Power Off... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Waiting for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0699
Get HW & SW version from device... OK
HW VER: CB00, SW VER: 0002, HW SUB CODE: 8A00
Detect chip [MT6739]
Get sec config... OK [00000000]
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM80 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0699
Get sec config... OK [00000000]
Get HW & SW version from device... OK
HW VER: CB00, SW VER: 0002, HW SUB CODE: 8A00
Detect chip [MT6739]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x65EFE65F, 0xB53E9CDC, 0x1922702A, 0xFDDE2F4B
Get Chip ID... [MT6739]
Get SOC ID... [EBC580E3668BEFA4F19C63BCBB33297B06C90B8A2D72106474 E3E97DF2184AA9]
Get sec config... OK [00000000]
Load DownloadAgent... OK
Search DA... OK [1]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0xD601033538413433317485E659241955
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_CNAME: 58A431
EMMC_ID : 0xD601033538413433317485E659241955
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0000400000 (4.00Mb)
EMMC_USER : 0x03A5C00000 (14.59Gb)
RAM INFO:
INT_SRAM: 0x0000020000 (128.00Kb)
EXT_RAM : 0x0040000000 (1.00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... [EXT4] ... OK
Product Brand : Altice
Product Manufacturer : MobiWire
Product Model : S24
Product Name : S24
Product Device : S24
Product Board : k39tv1_bsp_1g
Board Platform : mt6739
Build ID : QP1A.190711.020
Build Date : Mon Nov 29 17:58:41 CST 2021
Display ID : QP1A.190711.020 release-keys
Security Patch : 2021-11-05
Version SDK : 29
Version Release : 10
Version Codename : REL
Firmware Version : 1638179944
Userdata FS Type : F2FS
Read security partition from phone... OK
Read security files... OK
Read security files... OK
Read lock info... OK
Unlock... OK [DF1, GB2, UN]
Write lock info... OK
Write security partition to phone... OK
Network Unlock done!
 

samfrnds90

Active Member
Nov 19, 2019
37
12
Selected model: Infinix X6815 (Infinix Zero 5G)
Operation: Repair
Software version: 5.11

Parse scatter file... OK
Load Rom Images... OK
Host Power Off... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Connect phone to [BOX] in BROM mode
Waiting for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0959
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6877]
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Release testpoint
Advanced Bypass Security... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1645,usb2ser.sys,3.0.1504.0]
Device found at COM9 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0959
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6877]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0xE70C12D3, 0x9ABB2DB8, 0x43C2322E, 0x3EFAB9F0
Get Chip ID... [MT6877]
Get SOC ID... [E63D1A5AFCF33422E5AA806A595DC3C895CE24A97F9C004A3B]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [17]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
UFS CID (FW VER): KMAG9001PM-B814 (0200)
Load EMI config from preloader... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
UFS INFO:
UFS_CID : KMAG9001PM-B814
UFS_FWVER : 0200
BLOCK_SIZE: 0x0000001000 (4.00Kb)
UFS_LU0 : 0x0000400000 (4.00Mb)
UFS_LU1 : 0x0000400000 (4.00Mb)
UFS_LU2 : 0x1DCB000000 (119.17Gb)
RAM INFO:
INT_SRAM: 0x0000070000 (448.00Kb)
EXT_RAM : 0x0200000000 (8.00Gb)
Get scatter info... OK
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK [A]
Read partition "nvdata"... OK
Read partition "nvram"... OK
Read NVDATA files... OK
Read NVRAM files... OK
Read IMEI... error
Repairing IMEI...
IMEI 1: *************************
IMEI 2: ***********************
Write IMEI [NVDATA]... OK
Write IMEI [NVRAM]... OK
Write partition "nvdata"... OK
Repair Security done!
please give me nvfiles im unble to repair
 

hermann07

Active Member
Jul 19, 2017
35
25
ABIDJAN
Skype
hermann0990
Sonork ID
100.1650096
PANDORA 5.13 ERROR;)
EMMC_ID: 0x150100445036444242005E09D3827953
Send preloader... OK
Load DownloadAgent... OK
Search DA... OK [7]
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_CNAME: DP6DBB
EMMC_ID : 0x150100445036444242005E09D3827953
EMMC_BOOT1: 0x0000400000 (4,00Mb)
EMMC_BOOT2: 0x0000400000 (4,00Mb)
EMMC_RPMB : 0x0001000000 (16,00Mb)
EMMC_USER : 0x0E8F800000 (58,24Gb)
RAM INFO:
INT_SRAM: 0x000003A000 (232,00Kb)
EXT_RAM : 0x0100000000 (4,00Gb)
Checking USB status... USB_HIGH_SPEED
[EFUSE INFO]: BROM disabled !!!
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... [F2FS] ... OK
Product Brand : samsung
Product Manufacturer : samsung
Product Model : SM-A045F
Product Name : a04xx
Product Device : a04
Product Board : a04
Board Platform : mt6765
Build ID : SP1A.210812.016
Build Date : Tue Aug 23 15:41:17 KST 2022
Display ID : SP1A.210812.016.A045FXXU1AVH6
Security Patch : 2022-07-01
Version SDK : 31
Version Release : 12
Version Codename : REL
Firmware Version : A045FXXU1AVH6
Userdata FS Type : F2FS
Read security partition from phone... OK
Decrypting security data... error(2)
 
  • Like
Reactions: nakash and GsmToto

hermann07

Active Member
Jul 19, 2017
35
25
ABIDJAN
Skype
hermann0990
Sonork ID
100.1650096
PANDORA 5.13 ERROR PLEASE FIX IT :cry:
Device found at COM31 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x467DECAE, 0xFEC0546F, 0xC51120EB, 0xA65E02AB
Get Chip ID... [MT6765]
Get SOC ID... [1C3A909DD10A7F47865520327C9DF699A6A3D6F551A7E36DBD20D78ADF46A90B]

Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [7]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x13014E47314A395238101E123BD949F5
Load EMI from phone... Skip (read preloader error)
Load EMI config from database [DB VER: 212 DB DATE: 05-15-2023] OK [1]
Trying EMI [7805E65B, 4ECF8C5A, 667E0B28, F1ADA01B, 154C2947, A5FE5CDA]
Init EXT RAM... error(2)
 
  • Like
Reactions: nakash and GsmToto

faraday

Friend's Martview
Sep 24, 2020
152
19
İSTANBUL
What's news [VER 5.11]

- Added support Vivo NEW security, autodetect, repair ...

- Added support a lot of Vivo phones

PD2123 T1x 5G, PD2123B T1x 5G, PD2123C T1x 5G, PD2123D T1x 5G,
PD2123E T1x 5G, PD2130 S10e, PD2130B S10e, PD2131 iQOO Z5x,
PD2131B iQOO Z5x, PD2131C iQOO Z5x, PD2215F V25, PD2224 Y77 5G,
PD2224BF Y77 5G, PD2224CF Y77 5G, PD2224F Y77 5G, PD2224GF Y77 5G,
PD2224HF Y77 5G, PD2224IF Y77 5G, PD2230 iQOO Z7i, PD2230F Y56 5G,
PD2236BF Y02, PD2236CF Y02, PD2236DF Y02, PD2236F Y02, PD2236HF Y02a,
PD2236IF Y02t, PD2236KF Y02t, PD2238F iQOO Neo 7, PD2257F Y100,
PD2257KF iQOO Z7 5G, PD2279F Y36 5G, PD2281F Y27, PD2281GF Y27 4G,
PD2317F Y17s, V2068A Y31s, V2069BA Y75s, V2118 Y01, V2130 V23 5G,
V2130A S10e, V2131A iQOO Z5x, V2166 Y01a, V2202 V25 5G, V2208 X80 Lite,
V2213 Y02, V2214 Y16, V2217 Y02, V2225 Y56 5G, V2230A Y35m 5G,V2230EA iQOO Z7i,
V2234 Y02a, V2236 Y02A, V2236A Y11 2023, V2237 V27e, V2238 Y22, V2239 Y100,
V2248 Y36 5G, V2249 Y27 4G, V2279A Y35 Plus, V2302 Y27, V2310 Y17s

- Added support Infinix X6517, X6823

- Added support Inoi 2 2021, Inoi 2 Lite 2021, Inoi 5 2021, Inoi 5 Lite 2021, Inoi 7 2020, Inoi 7 2021,
Inoi 83, Inoi A22 Lite, Inoi A52 Lite, Inoi A62 Lite, Inoi A72, Inoi Note 12,
Inoi inoiPad, Inoi inoiPad mini, Inoi inoiPad Pro

- Added support P662L Itel P40, P683L Itel P40 Plus, A632W Itel A04
A662L Itel A60, A662LM Itel A60s, S665L, S665LN Itel S23

- Added support TB328FU, TB328XU Lenovo Tab M10 Gen 3

- GUI updated

- Mediatek Read Phone Info expanded (detect real model name etc)

- Small bug fixes

If you still not have pandora contact with official z3x reseller and buy a license and get Pandora Online immediately.
If you wish a Standalone solution, contact with domestic official reseller and buy Pandora BOX.

Pandora PRO 5.12 Setup
New Link

DO NOT POST ANY LOGS OF JOB HERE in this thread, if you have any error - open own thread and supporters will answer there!!!
pandora box It is not right for you to release such a tool or box without developing some z3x box that is unfair to z3x box users. I am personally a z3x box user. Why don't you activate the z3x box? You want me to buy it externally. Clean up this disgrace. I regret using the z3x box.
 

SPYROS

Product Supporter
Jan 27, 2023
233
705
PK
Selected model: Samsung SM-A037F (Galaxy A03s)
Operation: Erase FRP
Software version: 4.8

Host Power Off... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Host Power On... OK
Connect phone in PRELOADER Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek PreLoader USB VCOM_V12 (Android),usb2ser.sys,3.0.1504.0]
Device found at COM12 [PRELOADER]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get sec config... OK [00000005]
Active sec flags: [SBC DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
LibUSB installed
Detect chip [MT6765]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Preloader exist. Skip connection verification.
Get ME ID... OK
ME_ID = 0x61E76959, 0xA87967D0, 0x4C3D9B86, 0xF02C6388
Load DownloadAgent... OK
Search DA... OK [0]
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [PRELOADER]
Preloader alive. Skip initializing external RAM
Get device info... OK
EMMC_ID: 0x15010052503634414200DD72CC2D29A7
Advanced Bypass Security... OK
Send preloader... OK
Load DownloadAgent... OK
Search DA... OK [7]
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_CNAME: RP64AB
EMMC_ID : 0x15010052503634414200DD72CC2D29A7
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0001000000 (16.00Mb)
EMMC_USER : 0x0E8F800000 (58.24Gb)
RAM INFO:
INT_SRAM: 0x000003A000 (232.00Kb)
EXT_RAM : 0x0100000000 (4.00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... OK
Product Brand : samsung
Product Manufacturer : samsung
Product Model : SM-A037F
Product Name : a03snnxx
Product Device : a03s
Product Board : a03s
Board Platform : connac1x
Build ID : TP1A.220624.014
Build Date : Mon Nov 28 23:23:34 KST 2022
Display ID : TP1A.220624.014.A037FXXU2CVK7
Security Patch : 2022-11-01
Version SDK : 33
Version Release : 13
Version Codename : REL
Firmware Version : A037FXXU2CVK7
Read partition "frp"... OK
Read partition "persistent"... OK
Backup saved to C:/Program%20Files%20(x86)/Z3X/Pandora/Backup/MTK/Samsung_SM-A037F%20(Galaxy%20A03s)/FRP_BACKUP_(2023-3-29_16-42-38)/"directory
Writting FRP data... OK
Erase FRP done!
 

SPYROS

Product Supporter
Jan 27, 2023
233
705
PK
Xiaomi Note 11 Pro Viva Mui 14.0.3 Repair Patch Done


Selected model: Xiaomi Redmi Note 11 Pro 4G (Viva)
Operation: Read PTT
Software version: 5.13
Work ID: 10000468

Connect phone in BROM/PRELOADER Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1632,usb2ser.sys,3.0.1504.0]
Device found at COM4 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 1066
Get sec config... OK [000000E7]
Active sec flags: [SBC SLA DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6781]
LibUSB installed
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Release testpoint, waiting 2 seconds
Advanced Bypass Security... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1632,usb2ser.sys,3.0.1504.0]
Device found at COM4 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 1066
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6781]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x1133FBED, 0x4C1BE181, 0xA4941ED3, 0x27E4CDC4
Get Chip ID... [MT6781]
Get SOC ID... [F027F6AAA9B7AF7053E2451A92EBD8B6F970C5E06B4ACB19D66A52DE41EAC990]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [11]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
UFS CID (FW VER): KM8L9001JM-B624 (0300)
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
UFS INFO:
UFS_CID : KM8L9001JM-B624
UFS_FWVER : 0300
BLOCK_SIZE: 0x0000001000 (4,00Kb)
UFS_LU0 : 0x0000400000 (4,00Mb)
UFS_LU1 : 0x0000400000 (4,00Mb)
UFS_LU2 : 0x1DCB000000 (119,17Gb)
RAM INFO:
INT_SRAM: 0x0000060000 (384,00Kb)
EXT_RAM : 0x0200000000 (8,00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... [EXT4] ... OK
Product Brand : Redmi
Product Manufacturer : Xiaomi
Product Model : viva
Product Name : viva_global
Product Device : viva
Product Board : viva
Board Platform : mt6781
Build ID : SP1A.210812.016
Build Date : Tue Jul 4 10:57:21 UTC 2023
Display ID : TP1A.220624.014
Security Patch : 2023-07-01
Version SDK : 33
Version Release : 13
Version Codename : REL
Firmware Version : V14.0.3.0.TGDMIXM
Userdata FS Type : F2FS
Read partition "preloader"... OK
Read partition "pgpt"... OK
Read partition "misc"... OK
Read partition "para"... OK
Read partition "expdb"... OK
Read partition "frp"... OK
Read partition "nvcfg"... OK
Read partition "nvdata"... OK
Read partition "gsort"... OK
Read partition "vbmeta_a"... OK
Read partition "vbmeta_b"... OK
Read partition "persist"... OK
Read partition "protect1"... OK
Read partition "protect2"... OK
Read partition "seccfg"... OK
Read partition "otp"... OK
Read partition "boot_a"... OK
Read partition "sec1"... OK
Read partition "proinfo"... OK
Read partition "efuse"... OK
Read partition "nvram"... OK
Read partition "boot_para"... OK
Read partition "boot_b"... OK
Read partition "flashinfo"... OK
Read partition "sgpt"... OK
Saved to C:/Program%20Files%20(x86)/Z3X/Pandora/Backup/MTK/Xiaomi_Redmi%20Note%2011%20Pro%204G%20(Viva)/Xiaomi_Redmi%20Note%2011%20Pro%204G_DUMP_(2023-10-13_17-42-21)/
Dumping Partitions done!

Selected model: Xiaomi Redmi Note 11 Pro 4G (Viva)
Operation: Read RPMB
Software version: 5.13
Work ID: 10000865

Connect phone in BROM/PRELOADER Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1632,usb2ser.sys,3.0.1504.0]
Device found at COM4 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 1066
Get sec config... OK [000000E7]
Active sec flags: [SBC SLA DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6781]
LibUSB installed
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Release testpoint, waiting 2 seconds
Advanced Bypass Security... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1632,usb2ser.sys,3.0.1504.0]
Device found at COM4 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 1066
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6781]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x1133FBED, 0x4C1BE181, 0xA4941ED3, 0x27E4CDC4
Get Chip ID... [MT6781]
Get SOC ID... [F027F6AAA9B7AF7053E2451A92EBD8B6F970C5E06B4ACB19D66A52DE41EAC990]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [11]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
UFS CID (FW VER): KM8L9001JM-B624 (0300)
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
UFS INFO:
UFS_CID : KM8L9001JM-B624
UFS_FWVER : 0300
BLOCK_SIZE: 0x0000001000 (4,00Kb)
UFS_LU0 : 0x0000400000 (4,00Mb)
UFS_LU1 : 0x0000400000 (4,00Mb)
UFS_LU2 : 0x1DCB000000 (119,17Gb)
RAM INFO:
INT_SRAM: 0x0000060000 (384,00Kb)
EXT_RAM : 0x0200000000 (8,00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... [EXT4] ... OK
Product Brand : Redmi
Product Manufacturer : Xiaomi
Product Model : viva
Product Name : viva_global
Product Device : viva
Product Board : viva
Board Platform : mt6781
Build ID : SP1A.210812.016
Build Date : Tue Jul 4 10:57:21 UTC 2023
Display ID : TP1A.220624.014
Security Patch : 2023-07-01
Version SDK : 33
Version Release : 13
Version Codename : REL
Firmware Version : V14.0.3.0.TGDMIXM
Userdata FS Type : F2FS
Read Write Counter[WC][MAX=0xFFFFFFFF]... 20565 OK
Get UFS RPMB size... 0x01000000 OK
Read RPMB... OK
Saved to C:/Program%20Files%20(x86)/Z3X/Pandora/Backup/MTK/Xiaomi_Redmi%20Note%2011%20Pro%204G%20(Viva)/
Read RPMB done!



Operation: Repair
Software version: 5.13
Work ID: 10000975

Connect phone in BROM/PRELOADER Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1632,usb2ser.sys,3.0.1504.0]
Device found at COM16 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 1066
Get sec config... OK [000000E7]
Active sec flags: [SBC SLA DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6781]
LibUSB installed
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Release testpoint, waiting 2 seconds
Advanced Bypass Security... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1632,usb2ser.sys,3.0.1504.0]
Device found at COM16 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 1066
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6781]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x1133FBED, 0x4C1BE181, 0xA4941ED3, 0x27E4CDC4
Get Chip ID... [MT6781]
Get SOC ID... [F027F6AAA9B7AF7053E2451A92EBD8B6F970C5E06B4ACB19D66A52DE41EAC990]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [11]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
UFS CID (FW VER): KM8L9001JM-B624 (0300)
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
UFS INFO:
UFS_CID : KM8L9001JM-B624
UFS_FWVER : 0300
BLOCK_SIZE: 0x0000001000 (4,00Kb)
UFS_LU0 : 0x0000400000 (4,00Mb)
UFS_LU1 : 0x0000400000 (4,00Mb)
UFS_LU2 : 0x1DCB000000 (119,17Gb)
RAM INFO:
INT_SRAM: 0x0000060000 (384,00Kb)
EXT_RAM : 0x0200000000 (8,00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... [EXT4] ... OK
Product Brand : Redmi
Product Manufacturer : Xiaomi
Product Model : viva
Product Name : viva_global
Product Device : viva
Product Board : viva
Board Platform : mt6781
Build ID : SP1A.210812.016
Build Date : Tue Jul 4 10:57:21 UTC 2023
Display ID : TP1A.220624.014
Security Patch : 2023-07-01
Version SDK : 33
Version Release : 13
Version Codename : REL
Firmware Version : V14.0.3.0.TGDMIXM
Userdata FS Type : F2FS
Read partition "nvdata"... OK
Read partition "nvram"... OK
Read NVDATA files... OK
Read NVRAM files... OK
Read IMEI... OK
IMEI 1: 869896062797106
IMEI 2: 869896062797114
Repairing IMEI...
IMEI 1: 8680410385
IMEI 2: 868041038
Write IMEI and patch CERT [NVDATA]... OK
Load partiton for patching... OK
Patching... OK
Selected "Auto unlock bootloader"
Read security partition from phone... OK
Decrypting security data... OK
Encrypt security data... OK
Write security partition to phone... OK
Unlock bootloader done!
Selected "Disable VBMETA verification"
Read security partition from phone... OK
Write security partition to phone... OK
Write IMEI and patch CERT [NVRAM]... OK
Write partition "nvdata"... OK
Write partition "nvram"... OK
Repair Security and Patch cert done!
If your phone after repair keeps rebooting - use wipe data option.
 
Top