Z3X Pandora PRO 6.10 Update.

Z3X Team

GsmToto

Super Moderator
Jan 1, 2021
4,413
20,750
UK
Skype
gsmtoto
Sonork ID
100.1684601
Selected model: TCL Mediatek
Operation: Erase FRP
Software version: 6.10


Connect Type-C to NONE... OK
Host Power Off... OK
Connect phone to [PC] in BROM/PRELOADER Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM2 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get sec config... OK [000000E7]
Active sec flags: [SBC SLA DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
LibUSB installed
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Release testpoint, waiting 2 seconds
Advanced Bypass Security... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM2 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0xEF663928, 0x1A40D7S2, 0x7E93D3XX, 0xC54873VV
Get Chip ID... [MT6765]
Get SOC ID... [5BC9C359EC20A93C333BEDFD2A273312C 907EA080ED58A4EA5C3E4F7AB5CAE8F]
Get sec config... OK [000000E0]
Get hw mode... OK
Load DownloadAgent... OK
Search DA... OK [7]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0xF231581323698C1C6AED401224152563NN
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_CNAME: ARV21X
EMMC_ID : 0xF40121323698C1C6AED2415256323158NN
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0000400000 (4.00Mb)
EMMC_USER : 0x1CD0000000 (115.25Gb)
RAM INFO:
INT_SRAM: 0x000003A000 (232.00Kb)
EXT_RAM : 0x0100000000 (4.00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... [EXT4] ... OK
Product Brand : TCL
Product Manufacturer : TCL
Product Model : mssi_64_ww
Product Board : model_3
Board Platform : mt6765
Build ID : SP1A.210812.016
Build Date : Mon Feb 19 20:40:23 CST 2024
Display ID : TP1A.220624.014
Security Patch : 2024-02-01
Version SDK : 33
Version Release : 13
Version Codename : REL
Firmware Version : 7GHO
Userdata FS Type : F2FS
Read partition "frp"... OK
Backup saved to C:/Program%20Files%20(x86)/Z3X/Pandora/Backup/MTK/TCL_MT6765/FRP_BACKUP_(2024-7-23_17-11-43)/
Writting FRP data... OK
Erase FRP done!
 

aliipi

Friend's Martview
Oct 28, 2019
138
36
Selected model: Vivo V2120 (Vivo Y15s)
Operation: Erase FRP
Software version: 6.10

Connect Type-C to NONE... OK
Host Power Off... OK
Connect phone to [PC] in PRELOADER Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek PreLoader USB VCOM_V1633 (Android),usb2ser.sys,3.0.1504.0]
Device found at COM36 [PRELOADER]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get sec config... OK [00000005]
Active sec flags: [SBC DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Preloader exist. Skip connection verification.
Get ME ID... OK
ME_ID = 0x7DC6CF71, 0x8026AFE5, 0xBF16747A, 0x385D7C70
Load DownloadAgent... OK
Search DA... OK [2]
Send bootloader... error(DA_IN_BLACKLIST)
 

GsmToto

Super Moderator
Jan 1, 2021
4,413
20,750
UK
Skype
gsmtoto
Sonork ID
100.1684601
Selected model: Nokia TA-1211 (Nokia 2.3)
Operation: Erase FRP And Wipe
Software version: 6.10
Work ID: 36865222


Connect phone in BROM/PRELOADER Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1632,usb2ser.sys,3.0.1504.0]
Device found at COM2 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0717
Get sec config... OK [000000E7]
Active sec flags: [SBC SLA DAA]
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0200, HW SUB CODE: 8A00
Detect chip [MT6761]
LibUSB installed
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Release testpoint, waiting 2 seconds
Advanced Bypass Security... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1632,usb2ser.sys,3.0.1504.0]
Device found at COM2 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0717
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0200, HW SUB CODE: 8A00
Detect chip [MT6761]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0xCBDDC0F5, 0x54913DFB, 0x540C150F, 0xE807C533
Get Chip ID... [MT6761]
Get SOC ID... [13BBE2FDBEC8E9C163CE74D68E51B6CCFADFB432D73B137E5B33F2E35C7AB5EB]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [5]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0xF401222010000015849719426977696E
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_CNAME: Biwin
EMMC_ID : 0xF401224260000015849719977696E201
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0000400000 (4.00Mb)
EMMC_USER : 0x0735000000 (28.83Gb)
RAM INFO:
INT_SRAM: 0x000003A500 (233.25Kb)
EXT_RAM : 0x0080000000 (2.00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK [A]
Read product info... [EXT4] ... OK
Product Brand : Nokia
Product Manufacturer : HMD Global
Product Model : Nokia 2.3
Product Name : Ironman_00WW
Product Device : IRM_sprout
Product Board : MT6761
Board Platform : mt6761
Build ID : RP1A.200720.011
Build Date : Tue Jul 6 10:54:01 CST 2021
Display ID : 00WW_3_220_SP04
Security Patch : 2021-07-05
Version SDK : 30
Version Release : 11
Version Codename : REL
Firmware Version : mp1V44
Userdata FS Type : EXT4
Read partition "frp"... OK
Backup saved to C:/Program%20Files%20(x86)/Z3X/Pandora/Backup/MTK/Nokia_TA-1211%20(Nokia%202.3)/FRP_BACKUP_(2024-7-29_10-21-33)/
Writting FRP data... OK
Formatting "userdata" partition... OK
Formatting "metadata" partition... OK
Wipe data done!
 

GsmToto

Super Moderator
Jan 1, 2021
4,413
20,750
UK
Skype
gsmtoto
Sonork ID
100.1684601
Selected model: Blackview BV4800
Operation: Erase FRP and Wipe
Software version: 6.10

Connect Type-C to NONE... OK
Host Power Off... OK
Connect phone to [PC] in BROM Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1632,usb2ser.sys,3.0.1504.0]
Device found at COM3 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0717
Get sec config... OK [00000000]
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0200, HW SUB CODE: 8A00
Detect chip [MT6761]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0xE994113C, 0x3E473A4E, 0x6247863E, 0xE1AA7A1F
Get Chip ID... [MT6761]
Get SOC ID... [CFABD2917A718B320BE1AAE7D9658C 2A1687A6DF07A8F1A4DEB104AAC835402D]
Get sec config... OK [00000000]
Load DownloadAgent... OK
Search DA... OK [5]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0xF40192D05382AE722415256313158154
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_CNAME: ARV11X
EMMC_ID : 0xF4012292D05382AE7415256313158154
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0000400000 (4.00Mb)
EMMC_USER : 0x0E90000000 (58.25Gb)
RAM INFO:
INT_SRAM: 0x000003A500 (233.25Kb)
EXT_RAM : 0x00C0000000 (3.00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK [A]
Read product info... [EXT4] ... OK
Product Brand : Blackview
Product Manufacturer : Blackview
Product Model : BV4800
Product Name : BV4800_Pro_NEU
Product Device : BV4800
Product Board : k61v1_32_bsp_2g_ago
Board Platform : mt6761
Build ID : BV4800_NEU_M662B_V1.0_64g3g_03_20231201V05
Build Date : Fri Dec 1 13:28:31 CST 2023
Display ID : BV4800_NEU_M662B_V1.0_64g3g_03_20231201V05
Security Patch : 2023-10-05
Version SDK : 33
Version Release : 13
Version Codename : REL
Firmware Version : mp1V15125
Userdata FS Type : F2FS
Read partition "frp"... OK
Backup saved to C:/Program%20Files%20(x86)/Z3X/Pandora/Backup/MTK/Blackview_BV4800/FRP_BACKUP_(2024-7-31_18-33-36)/
Writting FRP data... OK
Erase FRP done!
 

GsmToto

Super Moderator
Jan 1, 2021
4,413
20,750
UK
Skype
gsmtoto
Sonork ID
100.1684601
Selected model: Realme RMX3231 (Realme C11 2021)
Operation: Erase FRP
Software version: 6.10

Host Power Off... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Host Power On... OK
Connect phone to [BOX or PC]
Connect phone in BROM mode. Use volume key buttons or testpoint.
Waiting for device... OK
Device found at COM30
Port: USB\VID_1782&PID_4D00\6&17B2F180&0&2
Driver: [UNISOC Communications Inc.,sprdvcom,SPRD U2S Diag,sprdvcom.sys,4.19.38.134]
Port type: BROM
Connecting to device... OK
Selected processor: SC9863A_64
Load files... (universal) OK
Connect preloader 1... OK
Connect preloader 2... OK
Connect loader 1... OK
Connect loader 2... OK
Serial Number: 0252102V221889J4D
Read partitions info... OK
Checking A/B state... OK
Read product info... [EXT4] ... OK
Product Brand : realme
Product Manufacturer : realme
Product Model : RMX3231
Product Device : RMX3231
Product Board : RMX3231
Board Platform : sp9863a
Build ID : RP1A.201005.001
Build Date : Fri Mar 1 14:52:58 CST 2024
Display ID : RMX3231_11.A.123
Security Patch : 2024-02-05
Version SDK : 30
Version Release : 11
Version Codename : REL
Firmware Version : 475
Userdata FS Type : F2FS
Backup partitions... OK
Formatting "persist" partition... OK
Done!
 

GsmToto

Super Moderator
Jan 1, 2021
4,413
20,750
UK
Skype
gsmtoto
Sonork ID
100.1684601
Selected model: Realme RMX3630 (Realme 10 4G)
Operation: Erase FRP
Software version: 6.10

Host Power Off... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Host Power On... OK
Connect phone to [BOX or PC] in PRELOADER Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek PreLoader USB VCOM_V1632 (Android),usb2ser.sys,3.0.1504.0]
Device found at COM3 [PRELOADER]
Open port... OK
Send start cmd... OK
Get HW code from device... 1208
Get sec config... OK [00000005]
Active sec flags: [SBC DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6789]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Preloader exist. Skip connection verification.
Get ME ID... OK
ME_ID = 0xABD9BBEA, 0xBD720876, 0xC8B7A21C, 0x33DCFEF3
Load DownloadAgent... OK
Search DA... OK [0]
Send bootloader... OK
Start bootloader... OK
Setup device enviroment... OK
Setup device parametres... OK
Get device info... OK
UFS CID (FW VER): MT256GAXAU4U33 ()
Send preloader... OK
Load DownloadAgent... OK
Search DA... OK [0]
Send 2nd DA... OK
Get device info... OK
UFS INFO:
UFS_CID : MT256GAXAU4U33
UFS_FWVER :
BLOCK_SIZE: 0x0000001000 (4.00Kb)
UFS_LU0 : 0x0000400000 (4.00Mb)
UFS_LU1 : 0x0000400000 (4.00Mb)
UFS_LU2 : 0x3B96000000 (238.34Gb)
[EFUSE INFO]: BROM not disabled
Read partitions info from phone... OK
Checking A/B state... OK [A]
Read product info... [EROFS] ... OK
Product Brand : realme
Product Manufacturer : realme
Product Model : RMX3630
Product Name : RMX3630TR
Product Device : RE8DDCL1
Product Board : mgvi_64_armv82
Board Platform : common
Build ID : TP1A.220905.001
Build Date : Tue May 7 18:54:47 CST 2024
Display ID : RMX3630_11_C.25
Security Patch : 2024-04-05
Version SDK : 33
Version Release : 13
Version Codename : REL
Firmware Version : S.17f51c7_1
Userdata FS Type : F2FS
Read partition "frp"... OK
Backup saved to C:/Program%20Files%20(x86)/Z3X/Pandora/Backup/MTK/Realme_RMX3630%20(Realme%2010%204G)/FRP_BACKUP_(2024-8-2_07-34-51)/"directory
Writting FRP data... OK
Erase FRP done!
 

GsmToto

Super Moderator
Jan 1, 2021
4,413
20,750
UK
Skype
gsmtoto
Sonork ID
100.1684601
Selected model: TCL T608DL (TCL 40 T)
Operation: Repair
Software version: 6.10

Host Power Off... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Host Power On... OK
Connect phone to [BOX] in BROM/PRELOADER Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM3 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get sec config... OK [000000E7]
Active sec flags: [SBC SLA DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Force switch to BROM... OK
Host Power Off... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Waiting for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0766
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Get sec config... OK [000000E7]
Active sec flags: [SBC SLA DAA]
Release testpoint
Advanced Bypass Security... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM3 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x44220D96, 0x7EA63770, 0xB67778E3, 0x7ECFEB2A
Get Chip ID... [MT6765]
Get SOC ID... [C6C872B12578F74642B7EE8AB3BD2F50343A30644BE871CF9BC5C2096E998E6D]
Get sec config... OK [000000E0]
Get hw mode... OK
Load DownloadAgent... OK
Search DA... OK [7]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0xF401257D8C7E79412415256313158114
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_CNAME: ARV11X
EMMC_ID : 0xF401224157D8C7E79415256313158114
EMMC_BOOT1: 0x0000400000 (4,00Mb)
EMMC_BOOT2: 0x0000400000 (4,00Mb)
EMMC_RPMB : 0x0000400000 (4,00Mb)
EMMC_USER : 0x0E90000000 (58,25Gb)
RAM INFO:
INT_SRAM: 0x000003A000 (232,00Kb)
EXT_RAM : 0x0100000000 (4,00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... [EXT4] ... OK
Product Brand : TCL
Product Manufacturer : TCL
Product Model : T507A
Product Name : T507A
Product Device : Civic_Plus
Product Board : MT6765
Board Platform : mt6765
Build ID : SP1A.210812.016
Build Date : Thu Jun 29 12:17:09 CST 2023
Display ID : SP1A.210812.016 release-keys
Security Patch : 2023-06-05
Version SDK : 31
Version Release : 12
Version Codename : REL
Firmware Version : VK3A
Userdata FS Type : F2FS
Read security partition from phone...
Decrypting security data... OK
Encrypt security data... OK
Read OTP... OK
IMEI: 350511090346018
Set new IMEI to:
IMEI: 014XXXXXXXXXXXX
Checking OTP status... [STATUS_OTP_UNLOCKED]
Write OTP... OK
Repair Security done!
 

GsmToto

Super Moderator
Jan 1, 2021
4,413
20,750
UK
Skype
gsmtoto
Sonork ID
100.1684601
Selected model: Motorola Mediatek
Operation: Unlock network
Software version: 6.10
Work ID: 37784933

Connect phone in BROM Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM3 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
LibUSB installed
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Release testpoint, waiting 2 seconds
Advanced Bypass Security... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM3 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0xF5440666, 0x59BB956E, 0xB64B1A6E, 0xA9CCA85A
Get Chip ID... [MT6765]
Get SOC ID... [8F221A8A24B950E174DE4DBC5EF0B3EF77B27721CD3BCE8C3D 6BFFFFA21247D5]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [7]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x70010004EAEA3971544A33303634010D
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_CNAME: TJ3064
EMMC_ID : 0x70010004EAEA3971544A33303634010D
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0000400000 (4.00Mb)
EMMC_USER : 0x0E90000000 (58.25Gb)
RAM INFO:
INT_SRAM: 0x000003A000 (232.00Kb)
EXT_RAM : 0x0100000000 (4.00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK [A]
Read product info... [EXT4] ... OK
Product Brand : motorola
Product Manufacturer : motorola
Product Model : moto g22
Product Name : hawaiip_g
Product Device : hawaiip
Product Board : p410ae
Board Platform : mt6765
Build ID : STAS32.79-77-28-63-2
Build Date : Thu May 23 18:07:32 CST 2024
Display ID : STAS32.79-77-28-63-2
Security Patch : 2024-06-05
Version SDK : 31
Version Release : 12
Version Codename : REL
Firmware Version : 77-28-63-2
Userdata FS Type : F2FS
Read security partition from phone... OK
Read security files... OK
Read NVDATA files... OK
Calculating... OK
Read lock info... OK
Unlock... OK [DF1]
Write lock info... OK
Write security partition to phone... OK
Network Unlock done!
 

GsmToto

Super Moderator
Jan 1, 2021
4,413
20,750
UK
Skype
gsmtoto
Sonork ID
100.1684601
Selected model: Mediatek Mediatek
Operation: Unlock network
Software version: 6.10

Host Power Off... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Host Power On... OK
Connect phone to [BOX] in BROM/PRELOADER Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek PreLoader USB VCOM (Android),usb2ser.sys,3.0.1504.0]
Device found at COM4 [PRELOADER]
Open port... OK
Send start cmd... OK
Get HW code from device... 0717
Get sec config... OK [00000000]
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0200, HW SUB CODE: 8A00
Detect chip [MT6761]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Force switch to BROM... OK
Host Power Off... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Waiting for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0717
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0200, HW SUB CODE: 8A00
Detect chip [MT6761]
Get sec config... OK [00000000]
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM2 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0717
Get sec config... OK [00000000]
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0200, HW SUB CODE: 8A00
Detect chip [MT6761]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x24E85867, 0xDB461D46, 0xFA2DFAA2, 0x78723B2A
Get Chip ID... [MT6761]
Get SOC ID... [64372851C5D09C50C423E966DD9CA7D49BBDD83224FE33AABE 8750D066C4AFB2]
Get sec config... OK [00000000]
Load DownloadAgent... OK
Search DA... OK [5]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0xD601124E20862819D310341334135363
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_CNAME: A3A561
EMMC_ID : 0xD601124E20862819D310341334135363
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0001000000 (16.00Mb)
EMMC_USER : 0x0E67800000 (57.62Gb)
RAM INFO:
INT_SRAM: 0x000003A500 (233.25Kb)
EXT_RAM : 0x0100000000 (4.00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK [A]
Read product info... [EXT4] ... OK
Product Brand : ALTICE
Product Manufacturer : MobiWire
Product Model : S64
Product Name : S64
Product Device : S64
Product Board : SE682_GH6821
Board Platform : mt6761
Build ID : SP1A.210812.016
Build Date : Wed Sep 6 15:52:39 CST 2023
Display ID : SP1A.210812.016 release-keys
Security Patch : 2023-08-05
Version SDK : 31
Version Release : 12
Version Codename : REL
Firmware Version : 1693986345
Userdata FS Type : EXT4
Read security partition from phone... OK
Read security files... OK
Read NVDATA files... OK
Calculating... OK
Read lock info... OK
Unlock... OK [DF1, GB2, UN]
Write lock info... OK
Write security partition to phone... OK
Network Unlock done!
 
  • Like
Reactions: wasil AMP

GsmToto

Super Moderator
Jan 1, 2021
4,413
20,750
UK
Skype
gsmtoto
Sonork ID
100.1684601
Selected model: Xiaomi Redmi Note 12 Pro Plus (Ruby)
Operation: Erase FRP And Wipe
Software version: 6.10
Erasing of partitions can damage your device.
Make sure that you have a backup created. Continue? YES

Connect Type-C to NONE... OK
Host Power Off... OK
Connect phone to [PC] in BROM/PRELOADER Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM2 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0959
Get sec config... OK [000000E7]
Active sec flags: [SBC SLA DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6877]
LibUSB installed
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Release testpoint, waiting 2 seconds
Advanced Bypass Security... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM2 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0959
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6877]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0xB6C84208, 0x695A1389, 0xD5CEA5BF, 0xED4293356
Get Chip ID... [MT6877]
Get SOC ID... [2E0CA0EE97C15A4C4BD309A3A0A494F7 CB3465303A57F2E319678CF30BB00F0F]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [17]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
UFS CID (FW VER): H9QT1G6DN6X132 (A003)
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
UFS INFO:
UFS_CID : H9QT1G6DN6X8653
UFS_FWVER : A003
BLOCK_SIZE: 0x0000001000 (4.00Kb)
UFS_LU0 : 0x0000400000 (4.00Mb)
UFS_LU1 : 0x0000400000 (4.00Mb)
UFS_LU2 : 0x3B96000000 (238.34Gb)
RAM INFO:
INT_SRAM: 0x0000070000 (448.00Kb)
EXT_RAM : 0x0200000000 (8.00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... [EROFS] ... OK
Product Brand : Redmi
Product Manufacturer : Xiaomi
Product Model : ruby
Product Name : ruby_global
Product Device : ruby
Product Board : ruby
Board Platform : mt6877
Build ID : UP1A.230620.001
Build Date : Tue May 28 13:34:27 UTC 2024
Display ID : UP1A.231005.007
Security Patch : 2024-06-01
Version SDK : 34
Version Release : 14
Version Codename : REL
Firmware Version : V816.0.4.0.UMOHUMAET
Userdata FS Type : F2FS
Read partition "frp"... OK
Backup saved to C:/Program%20Files%20(x86)/Z3X/Pandora/Backup/MTK/Xiaomi_Redmi%20Note%2012%20Pro%20Plus%20(Ruby)/FRP_BACKUP_(2024-8-4_21-33-32)/"directory
Writting FRP data... OK
Formatting "userdata" partition... OK
Formatting "metadata" partition... OK
Wipe data done!
 
  • Like
Reactions: wasil AMP

jadoon

Member
Mar 13, 2022
8
2
pakistan
Z3X TEAM PANDORA TEAM


Selected model: Vivo V2254 (Vivo Y02t)
Operation: Repair
Software version: 6.10

Host Power Off... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Host Power On... OK
Connect phone to [BOX or PC] in PRELOADER Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek PreLoader USB VCOM_V1632 (Android),usb2ser.sys,3.0.1504.0]
Device found at COM20 [PRELOADER]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get sec config... OK [00000005]
Active sec flags: [SBC DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Preloader exist. Skip connection verification.
Get ME ID... OK
ME_ID = 0x9F0CAFFE, 0xACE0B5A8, 0x3D32EF38, 0xA46A7EE8
Load DownloadAgent... OK
Search DA... OK [2]
Send bootloader... error(DA_IN_BLACKLIST)

FIX THIS ERROR
 
  • Like
Reactions: GsmToto

GsmToto

Super Moderator
Jan 1, 2021
4,413
20,750
UK
Skype
gsmtoto
Sonork ID
100.1684601
Selected model: Alcatel 5032W (Alcatel 3V (2019))
Operation: Unlock network
Software version: 6.10

Connect Type-C to NONE... OK
Host Power Off... OK
Connect phone to [PC] in BROM Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM3 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get sec config... OK [000000E7]
Active sec flags: [SBC SLA DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
LibUSB installed
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Release testpoint, waiting 2 seconds
Advanced Bypass Security... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM3 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0xA2A14971, 0x1031A3A3, 0xA5551178, 0xF216FEDC
Get Chip ID... [MT6765]
Get SOC ID... [62355FC78B4BEAAE54E6C7 1899E912817C04B1DEA68C913C2078CA8EE905E19A]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [7]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x1501004201016B6A48C6F1474436424D
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_CNAME: GD6BMB
EMMC_ID : 0x1501004201016B6A48C6F1474436424D
EMMC_BOOT1: 0x0000400000 (4,00Mb)
EMMC_BOOT2: 0x0000400000 (4,00Mb)
EMMC_RPMB : 0x0000400000 (4,00Mb)
EMMC_USER : 0x0747C00000 (29,12Gb)
RAM INFO:
INT_SRAM: 0x000003A000 (232,00Kb)
EXT_RAM : 0x00C0000000 (3,00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... [EXT4] ... OK
Product Brand : TCL
Product Manufacturer : TCL
Product Model : 5032W
Product Name : 5032W
Product Device : Morgan_4G
Product Board : Morgan_4G
Board Platform : mt6765
Build ID : PPR1.180610.011
Build Date : Tue Nov 2 16:16:48 CST 2021
Display ID : Android P
Security Patch : 2021-11-05
Version SDK : 28
Version Release : 9
Version Codename : REL
Firmware Version : v3E9S-0
Userdata FS Type : F2FS
Read security partition from phone... OK
Read security files... OK
Read NVDATA files... OK
Calculating... OK
Read lock info... OK
Read OTP... OK
Unlock... OK [DF1, DF2]
Write lock info... OK
Write security partition to phone... OK
Network Unlock done!
 

GsmToto

Super Moderator
Jan 1, 2021
4,413
20,750
UK
Skype
gsmtoto
Sonork ID
100.1684601
Selected model: Spreadtrum Spreadtrum
Operation: Unlock network
Software version: 6.10

Host Power Off... OK
Switch virtual port to NONE... OK
Connect Type-C to NONE... OK
Connect phone to [PC]
Connect phone in BROM mode. Use volume key buttons or testpoint.
Waiting for device... OK
Device found at COM3
Port: USB\VID_1782&PID_4D00\5&1A3A044C&0&4
Driver: [UNISOC Communications Inc.,sprdvcom,SPRD U2S Diag,sprdvcom.sys,4.19.38.134]
Port type: BROM
Connecting to device... OK
Selected processor: Tiger_T310
Load files... (universal) OK
Connect preloader 1... OK
Connect preloader 2... OK
Connect loader 1... OK
Connect loader 2... OK
Serial Number: SN128615
Read partitions info... OK
Checking A/B state... OK [A]
Read product info... [EROFS] ... OK
Product Brand : DIALN
Product Manufacturer : DIALN
Product Model : G65
Product Name : G65
Product Device : G65
Board Platform : ums312
Build ID : TP1A.220624.014
Build Date : Thu Dec 7 18:50:21 CST 2023
Display ID : G65-1-v1.0-SIMLOCK-flash-20231207
Security Patch : 2023-10-05
Version SDK : 33
Version Release : 13
Version Codename : REL
Firmware Version : 17016717244
Userdata FS Type : F2FS
Check security state... OK [1]
Unlock bootloader... OK
Patch modem check... OK
Patch data... OK
Load NVD... OK
Unlock... OK
Save NVD... OK
Done!
 

GsmToto

Super Moderator
Jan 1, 2021
4,413
20,750
UK
Skype
gsmtoto
Sonork ID
100.1684601
Selected model: TCL T608DL (TCL 40 T)
Operation: Repair
Software version: 6.10

Host Power Off... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Host Power On... OK
Connect phone to [BOX] in BROM/PRELOADER Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM3 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get sec config... OK [000000E7]
Active sec flags: [SBC SLA DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Force switch to BROM... OK
Host Power Off... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Waiting for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0766
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Get sec config... OK [000000E7]
Active sec flags: [SBC SLA DAA]
Release testpoint
Advanced Bypass Security... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM3 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x502EB510, 0xCB9167675, 0x7AAE6075, 0x215FSRNU
Get Chip ID... [MT6765]
Get SOC ID... [BBC8C99F3604B6249A8885A936E00ACEA3C8A8BF92E5AFD34EB55143D30A44AB]
Get sec config... OK [000000E0]
Get hw mode... OK
Load DownloadAgent... OK
Search DA... OK [7]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0xF40122010534F108449952426977696E
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_CNAME: Biwin
EMMC_ID : 0xF401222010534F10844995426977696E
EMMC_BOOT1: 0x0000400000 (4,00Mb)
EMMC_BOOT2: 0x0000400000 (4,00Mb)
EMMC_RPMB : 0x0000400000 (4,00Mb)
EMMC_USER : 0x1CD4000000 (115,31Gb)
RAM INFO:
INT_SRAM: 0x000003A000 (232,00Kb)
EXT_RAM : 0x0100000000 (4,00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... [EXT4] ... OK
Product Brand : TCL
Product Manufacturer : TCL
Product Model : T676J
Product Name : T676J
Product Device : Passat
Product Board : MT6765
Board Platform : mt6765
Build ID : SP1A.210812.016
Build Date : Fri Oct 28 19:12:56 CST 2022
Display ID : SP1A.210812.016 release-keys
Security Patch : 2022-10-05
Version SDK : 31
Version Release : 12
Version Codename : REL
Firmware Version : 2BBQ
Userdata FS Type : F2FS
Read security partition from phone...
Decrypting security data... OK
Encrypt security data... OK
Read OTP... OK
IMEI 1: 35256899866642233
IMEI 2: 35256789954321355
Set new IMEI to:
IMEI 1: 3563347854484891
Checking OTP status... [STATUS_OTP_UNLOCKED]
Write OTP... OK
Repair Security done!
 

GsmToto

Super Moderator
Jan 1, 2021
4,413
20,750
UK
Skype
gsmtoto
Sonork ID
100.1684601
Selected model: Xiaomi Redmi Note 11 Pro 4G (Viva)
Operation: Eliminar FRP
Software version: 6.10

Host Power Off... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Connect phone to [BOX] in BROM mode
Waiting for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 1066
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6781]
Get sec config... OK [000000E7]
Active sec flags: [SBC SLA DAA]
Release testpoint
Advanced Bypass Security... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1632,usb2ser.sys,3.0.1504.0]
Device found at COM2 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 1066
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6781]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x423F555E, 0xDCDADD4A, 0x0962F2D0, 0x27D14592
Get Chip ID... [MT6781]
Get SOC ID... [9370A6C669DAAD9AB5C40FF95EC0C12C5C C198185F1BFF85F6686DA0F2965E1C]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [11]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
UFS CID (FW VER): KM8L9001JM-B624 (0300)
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
UFS INFO:
UFS_CID : KM8L9001JM-B624
UFS_FWVER : 0300
BLOCK_SIZE: 0x0000001000 (4,00Kb)
UFS_LU0 : 0x0000400000 (4,00Mb)
UFS_LU1 : 0x0000400000 (4,00Mb)
UFS_LU2 : 0x1DCB000000 (119,17Gb)
RAM INFO:
INT_SRAM: 0x0000060000 (384,00Kb)
EXT_RAM : 0x0200000000 (8,00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK [A]
Read product info... [EXT4] ... OK
Product Brand : Redmi
Product Manufacturer : Xiaomi
Product Model : viva
Product Name : viva_global
Product Device : viva
Product Board : viva
Board Platform : mt6781
Build ID : SP1A.210812.016
Build Date : Fri Mar 1 08:58:06 UTC 2024
Display ID : TP1A.220624.014
Security Patch : 2024-02-01
Version SDK : 33
Version Release : 13
Version Codename : REL
Firmware Version : V816.0.3.0.TGDAWBTJU
Userdata FS Type : F2FS
Read partition "frp"... OK
Backup saved to C:/Program%20Files%20(x86)/Z3X/Pandora/Backup/MTK/Xiaomi_Redmi%20Note%2011%20Pro%204G%20(Viva)/FRP_BACKUP_(2024-8-11_20-23-43)/
Writting FRP data... OK
Erase FRP done!
 

GsmToto

Super Moderator
Jan 1, 2021
4,413
20,750
UK
Skype
gsmtoto
Sonork ID
100.1684601
Selected model: Xiaomi Redmi Note 9 (Merlin)
Operation: Unlock bootloader
Software version: 6.10

Connect Type-C to NONE... OK
Host Power Off... OK
Connect phone to [PC] in BROM Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM2 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0707
Get sec config... OK [000000E7]
Active sec flags: [SBC SLA DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6768]
Install LibUSB... OK
Waiting for device... OK
Open port... OK
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Release testpoint, waiting 2 seconds
Advanced Bypass Security... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM2 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0707
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6768]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x6B7E4107, 0x0AE7E1EE, 0x2EBE63DA, 0xA000FBA2
Get Chip ID... [MT6768]
Get SOC ID... [3DABFFF47B21E06D48B7A9CA6430769A4 75AD19F5617DB3E1F1B985CB8D7754C]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [8]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x90014102317FA9759A68444561503303
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_CNAME: hDEaP3
EMMC_ID : 0x90014A03102317FA9759684445615033
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0001000000 (16.00Mb)
EMMC_USER : 0x1D1F000000 (116.48Gb)
RAM INFO:
INT_SRAM: 0x0000070000 (448.00Kb)
EXT_RAM : 0x0100000000 (4.00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... [EXT4] ... OK
Product Brand : Redmi
Product Manufacturer : Xiaomi
Product Model : M2003J15SC
Product Name : merlin_global
Product Device : merlin
Product Board : merlin
Board Platform : mt6768
Build ID : QP1A.190711.020
Build Date : Tue Aug 4 00:10:35 CST 2020
Display ID : AL2522-Merlin-V101-Q-0804
Security Patch : 2020-07-01
Version SDK : 29
Version Release : 10
Version Codename : REL
Firmware Version : V12.0.3.0.QJOMIXM
Userdata FS Type : EXT4
Read security partition from phone...
Decrypting security data... OK
Encrypt security data... OK
Read security partition from phone... OK
Write security partition to phone... OK
Unlock bootloader done!
 
  • Like
Reactions: zfvcvbbb

GsmToto

Super Moderator
Jan 1, 2021
4,413
20,750
UK
Skype
gsmtoto
Sonork ID
100.1684601
Selected model: Samsung SM-A146U (Samsung Galaxy A14 5G)
Operation: Erase FRP
Software version: 6.10

Searching USB Flash interface... COM2 detected
Setup connection... OK
Model: SM-A146U
SW version: A146USQS3SBYKAW
Sales code: TMK
Device ID: c2d47fac6f28
Vendor: SAMSUNG
Product: KM5P9001DM-B424
Unique Number: CE0055CF1337E223723C
FW Version: 0002
Capacity: 64 Gb
Reading data from phone... OK
Sending data to phone... OK
Rebooting to download... OK
Searching USB Flash interface... COM2 detected
Setup connection... OK
Sending data to phone... OK
Sending data to phone... OK
Rebooting... OK
Erase FRP done!
 

GsmToto

Super Moderator
Jan 1, 2021
4,413
20,750
UK
Skype
gsmtoto
Sonork ID
100.1684601
Selected model: Mediatek Mediatek
Operation: Unlock network
Software version: 6.10

Host Power Off... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Host Power On... OK
Connect phone to [BOX] in BROM/PRELOADER Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek PreLoader USB VCOM (Android),usb2ser.sys,3.0.1512.0]
You are using driver version 3.0.1512.0, we recommend using version 3.0.1504.0 for proper operation. You can install the correct driver from the program directory.
Device found at COM2 [PRELOADER]
Open port... OK
Send start cmd... OK
Get HW code from device... 0717
Get sec config... OK [00000000]
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0200, HW SUB CODE: 8A00
Detect chip [MT6761]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Force switch to BROM... OK
Host Power Off... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Waiting for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0717
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0200, HW SUB CODE: 8A00
Detect chip [MT6761]
Get sec config... OK [00000000]
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1512.0]
You are using driver version 3.0.1512.0, we recommend using version 3.0.1504.0 for proper operation. You can install the correct driver from the program directory.
Device found at COM2 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0717
Get sec config... OK [00000000]
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0200, HW SUB CODE: 8A00
Detect chip [MT6761]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x094A3702, 0x703F5F33, 0x4739E42F1, 0x228726D
Get Chip ID... [MT6761]
Get SOC ID... [5DEC63878A68E05351138BEE39D3E9F9984 24256C6F19F147A7038271957EB5D]
Get sec config... OK [00000000]
Load DownloadAgent... OK
Search DA... OK [5]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x1501042076BB1CEAE14B70525831424D
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_CNAME: RX1BMB
EMMC_ID : 0x150100542076BB1CEAE14B725831424D
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0000400000 (4.00Mb)
EMMC_USER : 0x0747C00000 (29.12Gb)
RAM INFO:
INT_SRAM: 0x000003A500 (233.25Kb)
EXT_RAM : 0x00C0000000 (3.00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... [EXT4] ... OK
Product Brand : Dialn
Product Manufacturer : Dialn
Product Model : X62
Product Name : X62C
Product Device : X62C
Product Board : X62
Board Platform : mt6761
Build ID : SP1A.210812.016
Build Date : Tue May 21 12:08:11 CST 2024
Display ID : TP1A.220624.014
Security Patch : 2024-04-05
Version SDK : 33
Version Release : 13
Version Codename : REL
Firmware Version : 20240405.1120
Userdata FS Type : EXT4
Read security partition from phone... OK
Read security files... OK
Read NVDATA files... OK
Calculating... OK
Read lock info... OK
Unlock... OK [DF1, UN]
Write lock info... OK
Write security partition to phone... OK
Network Unlock done!
 
Top