Z3X Pandora PRO 7.1 Released. New devices added.

Z3X Team

SPYROS

Product Supporter
Jan 27, 2023
216
613
PK
Pandora PRO 7.1 Released. New devices added.

More and more updates on the way...


- Added support for Huawei phones:

CET-AL00 Huawei Mate 50
CET-LX9 Huawei Mate 50
DCO-AL00 Huawei Mate 50 Pro
DCO-LX9 Huawei Mate 50 Pro
LNA-AL00 Huawei P60
LNA-LX9 Huawei P60
MNA-AL00 Huawei P60 Art
MNA-LX9 Huawei P60 Pro


List of supported functions for listed Huawei phones: (Write Firmware (XML)*, Read/Write*/Wipe Security, Read Info, Read Partitions,
Wipe Data, Factory Reset, Reset FRP, Reset Huawei ID, Repair/Reset Chip Damage)


- Added support for Honor phones:

NTH-AN00 Honor 50
NTH-N29 Honor 50
NTH-NX9 Honor 50
RNA-AN00 Honor 50 Pro
RNA-TN00 Honor 50 Pro
VNE-AN00 Honor Play 30
VNE-AN40 Honor Play 6C
VNE-AN60 Honor Play 30
VNE-N41 Honor X8 5G
VNE-TN00 Honor Play 30
VNE-TN00BX Honor Play 30


List of supported functions for listed Honor phones: (Write Firmware (XML)*, Read/Write*/Wipe Security, Read Info, Read Partitions,
Wipe Data, Factory Reset, Reset FRP, Reset ID, Repair/Reset Chip Damage)



- Added support for Samsung phones:

SM-S711U Galaxy S23 FE (Bit 2)
SM-S9010 Galaxy S22 5G (Bit 4)
SM-S901E Galaxy S22 5G (Bit 7)
SM-S906E Galaxy S22 Plus (Bit 7)
SM-S908E Galaxy S22 Ultra (Bit 8)
SM-S908N Galaxy S22 Ultra (Bit 3)
SM-S916N Galaxy S23 Plus (Bit 2)
SM-S9180 Galaxy S23 Ultra (Bit 3)
SM-S918N Galaxy S23 Ultra (Bit 2)
SM-S928N Galaxy S24 Ultra (Bit 2)
SM-A115M Galaxy A11 (Bit 5)


List of supported functions for listed Samsung phones: (Write Firmware (XML)*, Read/Write*/Wipe Security, Read Info, Read Partitions,
Wipe Data, Factory Reset, Reset FRP, Change CSC, Repair SN)



- Added support Unisoc CPUs based phones:

SC7731E:
ZTE P731F60 Blade L220

SC9832E:
ZTE P501 Optus X Start 3

SC9863A:
ZTE A7030, P963F07 Blade A71
P503 Optus X Start 4
P545 Optus X Power 2
P630 Optus X Delight 2
P650 Optus X Delight
P652 Optus X Tap 2


T606:
ZTE A7040, P606F01 Blade V40 Smart
ZTE A7050 Blade A72s Blade V41 Smart, Optus X Max
Vortex HD67, HD68, J24, NS65, Tab8, V20



- Added support for Vortex phones (Mediatek):

Vortex Btab10, CG65 Pro, Vortex HD55, Vortex HD60
Vortex HD60I, Vortex HD60L, Vortex HD62, Vortex HD65, MUV


Fixed:

- Reset FRP for Samsung in EDL mode
- some exceptions
- creating default FS
- detecting a/b state




DO NOT POST ANY LOGS OF JOB HERE in this thread, if you have any error - open own thread and supporters will answer there!!!

List of resellers with stock: HERE


 

anas203203203

Junior Member
Sep 15, 2020
3
2
lahore
Please play more on MTK device. Basically your box came for mtk. infinix techno Vivo security of 2024 If you don't solve this problem quickly, your box may disappear from the market. z3x team please think about it . People have a lot of expectations from you.
 

dany_boy

Active Member
Oct 28, 2017
94
13
Pakistan punjab
Skype
[email protected]
Pandora PRO 7.1 Released. New devices added.

More and more updates on the way...


- Added support for Huawei phones:

CET-AL00 Huawei Mate 50
CET-LX9 Huawei Mate 50
DCO-AL00 Huawei Mate 50 Pro
DCO-LX9 Huawei Mate 50 Pro
LNA-AL00 Huawei P60
LNA-LX9 Huawei P60
MNA-AL00 Huawei P60 Art
MNA-LX9 Huawei P60 Pro


List of supported functions for listed Huawei phones: (Write Firmware (XML)*, Read/Write*/Wipe Security, Read Info, Read Partitions,
Wipe Data, Factory Reset, Reset FRP, Reset Huawei ID, Repair/Reset Chip Damage)


- Added support for Honor phones:

NTH-AN00 Honor 50
NTH-N29 Honor 50
NTH-NX9 Honor 50
RNA-AN00 Honor 50 Pro
RNA-TN00 Honor 50 Pro
VNE-AN00 Honor Play 30
VNE-AN40 Honor Play 6C
VNE-AN60 Honor Play 30
VNE-N41 Honor X8 5G
VNE-TN00 Honor Play 30
VNE-TN00BX Honor Play 30


List of supported functions for listed Honor phones: (Write Firmware (XML)*, Read/Write*/Wipe Security, Read Info, Read Partitions,
Wipe Data, Factory Reset, Reset FRP, Reset ID, Repair/Reset Chip Damage)



- Added support for Samsung phones:

SM-S711U Galaxy S23 FE (Bit 2)
SM-S9010 Galaxy S22 5G (Bit 4)
SM-S901E Galaxy S22 5G (Bit 7)
SM-S906E Galaxy S22 Plus (Bit 7)
SM-S908E Galaxy S22 Ultra (Bit 8)
SM-S908N Galaxy S22 Ultra (Bit 3)
SM-S916N Galaxy S23 Plus (Bit 2)
SM-S9180 Galaxy S23 Ultra (Bit 3)
SM-S918N Galaxy S23 Ultra (Bit 2)
SM-S928N Galaxy S24 Ultra (Bit 2)
SM-A115M Galaxy A11 (Bit 5)


List of supported functions for listed Samsung phones: (Write Firmware (XML)*, Read/Write*/Wipe Security, Read Info, Read Partitions,
Wipe Data, Factory Reset, Reset FRP, Change CSC, Repair SN)



- Added support Unisoc CPUs based phones:

SC7731E:
ZTE P731F60 Blade L220

SC9832E:
ZTE P501 Optus X Start 3

SC9863A:
ZTE A7030, P963F07 Blade A71
P503 Optus X Start 4
P545 Optus X Power 2
P630 Optus X Delight 2
P650 Optus X Delight
P652 Optus X Tap 2


T606:
ZTE A7040, P606F01 Blade V40 Smart
ZTE A7050 Blade A72s Blade V41 Smart, Optus X Max
Vortex HD67, HD68, J24, NS65, Tab8, V20



- Added support for Vortex phones (Mediatek):

Vortex Btab10, CG65 Pro, Vortex HD55, Vortex HD60
Vortex HD60I, Vortex HD60L, Vortex HD62, Vortex HD65, MUV


Fixed:

- Reset FRP for Samsung in EDL mode
- some exceptions
- creating default FS
- detecting a/b state




DO NOT POST ANY LOGS OF JOB HERE in this thread, if you have any error - open own thread and supporters will answer there!!!

List of resellers with stock: HERE


New update is suck its have bug's i try 4 mobile for imei repair oppo a58 realme c11 redmi 9c and oppo a54 every time done but it not working old imei still remaining
 
  • Like
Reactions: almanah

Saimmobiles711

Active Member
Mar 19, 2022
16
5
Allahabad
Pandora PRO 7.1 Released. New devices added.

More and more updates on the way...


- Added support for Huawei phones:

CET-AL00 Huawei Mate 50
CET-LX9 Huawei Mate 50
DCO-AL00 Huawei Mate 50 Pro
DCO-LX9 Huawei Mate 50 Pro
LNA-AL00 Huawei P60
LNA-LX9 Huawei P60
MNA-AL00 Huawei P60 Art
MNA-LX9 Huawei P60 Pro


List of supported functions for listed Huawei phones: (Write Firmware (XML)*, Read/Write*/Wipe Security, Read Info, Read Partitions,
Wipe Data, Factory Reset, Reset FRP, Reset Huawei ID, Repair/Reset Chip Damage)


- Added support for Honor phones:

NTH-AN00 Honor 50
NTH-N29 Honor 50
NTH-NX9 Honor 50
RNA-AN00 Honor 50 Pro
RNA-TN00 Honor 50 Pro
VNE-AN00 Honor Play 30
VNE-AN40 Honor Play 6C
VNE-AN60 Honor Play 30
VNE-N41 Honor X8 5G
VNE-TN00 Honor Play 30
VNE-TN00BX Honor Play 30


List of supported functions for listed Honor phones: (Write Firmware (XML)*, Read/Write*/Wipe Security, Read Info, Read Partitions,
Wipe Data, Factory Reset, Reset FRP, Reset ID, Repair/Reset Chip Damage)



- Added support for Samsung phones:

SM-S711U Galaxy S23 FE (Bit 2)
SM-S9010 Galaxy S22 5G (Bit 4)
SM-S901E Galaxy S22 5G (Bit 7)
SM-S906E Galaxy S22 Plus (Bit 7)
SM-S908E Galaxy S22 Ultra (Bit 8)
SM-S908N Galaxy S22 Ultra (Bit 3)
SM-S916N Galaxy S23 Plus (Bit 2)
SM-S9180 Galaxy S23 Ultra (Bit 3)
SM-S918N Galaxy S23 Ultra (Bit 2)
SM-S928N Galaxy S24 Ultra (Bit 2)
SM-A115M Galaxy A11 (Bit 5)


List of supported functions for listed Samsung phones: (Write Firmware (XML)*, Read/Write*/Wipe Security, Read Info, Read Partitions,
Wipe Data, Factory Reset, Reset FRP, Change CSC, Repair SN)



- Added support Unisoc CPUs based phones:

SC7731E:
ZTE P731F60 Blade L220

SC9832E:
ZTE P501 Optus X Start 3

SC9863A:
ZTE A7030, P963F07 Blade A71
P503 Optus X Start 4
P545 Optus X Power 2
P630 Optus X Delight 2
P650 Optus X Delight
P652 Optus X Tap 2


T606:
ZTE A7040, P606F01 Blade V40 Smart
ZTE A7050 Blade A72s Blade V41 Smart, Optus X Max
Vortex HD67, HD68, J24, NS65, Tab8, V20



- Added support for Vortex phones (Mediatek):

Vortex Btab10, CG65 Pro, Vortex HD55, Vortex HD60
Vortex HD60I, Vortex HD60L, Vortex HD62, Vortex HD65, MUV


Fixed:

- Reset FRP for Samsung in EDL mode
- some exceptions
- creating default FS
- detecting a/b state




DO NOT POST ANY LOGS OF JOB HERE in this thread, if you have any error - open own thread and supporters will answer there!!!

List of resellers with stock: HERE


After update showing this error
Exception: Access violation at address 0124BEDE in module PandoraTool.exe. Read of address 08BB3169

Selected model: Spreadtrum Spreadtrum
Operation: Repair
Software version: 7.1

Host Power Off... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Host Power On... OK
Connect phone to [BOX or PC]
Connect phone in BROM mode. Use volume key buttons or testpoint.
Waiting for device... OK
Device found at COM49
Port: USB\VID_1782&PID_4D00\5&2156D303&0&2
Driver: [UNISOC Communications Inc.,sprdvcom,SPRD U2S Diag,sprdvcom.sys,4.19.38.134]
Port type: BROM
Connecting to device... OK
Selected processor: Tiger_T606_64
Load files... (universal) OK
Connect preloader 1... OK
Connect preloader 2... OK
Connect loader 1... OK
Connect loader 2... OK
Serial Number: 82406A6T039AF
Flash Type: EMMC
Read partitions info... OK
Checking A/B state... OK
Read produ
ct info... [EXT4] ...
Exception: Access violation at address 0124BEDE in module PandoraTool.exe. Read of address 08BB3169
 
  • Like
Reactions: SPYROS and almanah

Saimmobiles711

Active Member
Mar 19, 2022
16
5
Allahabad
plz fix this error
Exception: Access violation at address 0124BEDE in module PandoraTool.exe. Read of address 08BB3169
after update showing this error
Exception: Access violation at address 0124BEDE in module PandoraTool.exe. Read of address 08BB3169
Exception: Access violation at address 0124BEDE in module PandoraTool.exe. Read of address 08BB3169
 

sabirahmadzai4197

Junior Member
Aug 21, 2024
1
2
Peshawar
after 7.0 update im facing this problem with many model


Connect phone in PRELOADER Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek PreLoader USB VCOM_V2023 (Android),usb2ser_mtk.sys,3.0.1512.0]
You are using driver version 3.0.1512.0, we recommend using version 3.0.1504.0 for proper operation. You can install the correct driver from the program directory.
Device found at COM12 [PRELOADER]
Open port... OK
Send start cmd... OK
Get HW code from device... 0959
Get sec config... OK [00000005]
Active sec flags: [SBC DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6877]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Preloader exist. Skip connection verification.
Get ME ID... OK
ME_ID = 0x1F24B1FE, 0x828393CE, 0xDCC3AF34, 0xCC52866E
Load DownloadAgent... OK
Search DA... OK [0]
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [PRELOADER]
Preloader alive. Skip initializing external RAM
Send preloader... OK
Load DownloadAgent... OK
Search DA... OK [17]
Send 2nd DA... OK
Get device info... OK
UFS INFO:
UFS_CID : KM8F9001MM-B830
UFS_FWVER : 0700
BLOCK_SIZE: 0x0000001000 (4.00Kb)
UFS_LU0 : 0x0000400000 (4.00Mb)
UFS_LU1 : 0x0000400000 (4.00Mb)
UFS_LU2 : 0x3B96000000 (238.34Gb)
RAM INFO:
INT_SRAM: 0x0000070000 (448.00Kb)
EXT_RAM : 0x0300000000 (12.00Gb)
Checking USB status... USB_HIGH_SPEED
[EFUSE INFO]: BROM not disabled
Read partitions info from phone... OK
Checking A/B state... OK [A]
Read product info... [EROFS] ... OK
Product Brand : OPPO
Product Manufacturer : OPPO
Product Model : CPH2599
Product Name : CPH2599
Product Device : OP5ABFL1
Product Board : k6877v1_64_k419
Board Platform : mt6877
Build ID : SP1A.210812.016
Build Date : Thu Dec 7 00:02:32 CST 2023
Display ID : CPH2599_14.0.0.223(EX01)
Security Patch : 2023-11-05
Version SDK : 34
Version Release : 14
Version Codename : REL
Firmware Version : U.R4T2.1508d9d_1
Userdata FS Type : F2FS
Read security partition from phone...
Decrypting security data... OK
Encrypt security data... OK
Read partition "nvdata"... OK
Read partition "protect1"... OK
Read partition "nvram"... OK
Read NVDATA files... OK
Read NVRAM files... OK
Read security files... OK
Calculating... OK
Repairing IMEI...
IMEI 1: 353654080001941
IMEI 2: 353654080001974
Write IMEI and patch CERT [NVDATA]... OK
Checking patch type... patch impossible


Selected model: OPPO CPH2599 (Oppo Reno11 5G)
Operation: Repair
Software version: 7.1
Work ID: 39440481
 
  • Like
Reactions: SPYROS and almanah

tsui_thomas

Active Member
Jan 30, 2024
49
2
india
Selected model: Vortex ZG65
Operation: Unlock network
Software version: 7.1

Host Power Off... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Host Power On... OK
Connect phone to [BOX or PC] in PRELOADER Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek PreLoader USB VCOM (Android),usb2ser.sys,3.0.1504.0]
Device found at COM3 [PRELOADER]
Open port... OK
Send start cmd... OK
Get HW code from device... 0699
Get sec config... OK [00000000]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6739]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Preloader exist. Skip connection verification.
Get ME ID... OK
ME_ID = 0xC7D73AB5, 0xDC36CD38, 0xD542C881, 0xFFF6CDAA
Load DownloadAgent... OK
Search DA... OK [0]
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [PRELOADER]
Preloader alive. Skip initializing external RAM
Send preloader... OK
Load DownloadAgent... OK
Search DA... OK [1]
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_CNAME: GD6BMB
EMMC_ID : 0x15010047484606ADB609436424D4201A
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0000400000 (4.00Mb)
EMMC_USER : 0x0747C00000 (29.12Gb)
RAM INFO:
INT_SRAM: 0x0000020000 (128.00Kb)
EXT_RAM : 0x00C0000000 (3.00Gb)
Checking USB status... USB_HIGH_SPEED
[EFUSE INFO]: BROM not disabled
Read partitions info from phone... OK
Checking A/B state... OK [A]
Read product info... [EXT4] ... OK
Product Brand : Vortex
Product Manufacturer : Vortex
Product Model : ZG65H
Product Name : ZG65
Product Device : ZG65
Product Board : k39tv1_bsp_1g_k419
Board Platform : mt6739
Build ID : SP1A.210812.016
Build Date : Sat Dec 23 15:04:50 CST 2023
Display ID : Vortex_ZG65H_V01_20231223
Security Patch : 2023-11-05
Version SDK : 33
Version Release : 13
Version Codename : REL
Firmware Version : 202374881
Userdata FS Type : F2FS
Read security partition from phone... OK
Read security files... OK
Read NVDATA files... OK
Calculating... OK
Read lock info... OK
Read partition "nvdata"... OK
Read partition "protect1"... OK
Read security files... OK
Read NVDATA files... OK
Read IMEI... OK
Unlock... OK [DF1, DF2, GB1, GB2]
Write lock info... OK
Write security partition to phone... OK
Network Unlock done!
 
  • Like
Reactions: SPYROS

GsmToto

Super Moderator
Jan 1, 2021
4,495
20,934
UK
Skype
gsmtoto
Sonork ID
100.1684601
Selected model: Samsung SM-S918B (Galaxy S23 Ultra)
Operation: Erase FRP
Software version: 7.1


Waiting for device... OK
Device found at COM3
Port: Qualcomm HS-USB QDLoader 9008
Open port... OK
Reading device info... OK
Serial Number: 36784447924
Sahara ver: 3
Prepare loader file... OK
Sending loader... OK
FireHose initialization... OK
Detecting memory type... OK [UFS]
Get storage info... OK
Storage info:
Type: UFS
Name: KLUEG4RHHD-B0G1
Page size: 1000
Block size: 1000
Partition count: 6
LU0 size: 0x3B64000000
LU1 size: 0x0001400000
LU2 size: 0x0001400000
LU3 size: 0x0002000000
LU4 size: 0x0028000000
LU5 size: 0x0002000000
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... OK
Serial Number : R5CXXXXX
Product Brand : samsung
Product Manufacturer : samsung
Product Model : SM-S918B
Product Name : dm3qxxx
Product Device : dm3q
Product Board : kalama
Board Platform : kalama
Build ID : TP1A.220624.014
Build Date : Wed Jan 31 08:01:56 KST 2024
Display ID : UP1A.231005.007.S918BXR5H8JJ6C4
Security Patch : 2024-02-01
Version SDK : 34
Version Release : 14
Version Codename : REL
Firmware Version : S918BXXFUJ7K5N8L
Userdata FS Type : F2FS
Erase FRP... OK
Done!
 

i-PH tech

Junior Member
Sep 9, 2019
3
0
Pandora team please give solution on nokia G21 SIM premanently lock after few days of network unlock. TIA
 

GsmToto

Super Moderator
Jan 1, 2021
4,495
20,934
UK
Skype
gsmtoto
Sonork ID
100.1684601
Selected model: Realme RMX3710 (Realme C55)
Operation: Repair
Software version: 7.1

Connect Type-C to NONE... OK
Host Power Off... OK
Connect phone to [PC] in PRELOADER Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek PreLoader USB VCOM_V1633 (Android),usb2ser.sys,3.0.1504.0]
Device found at COM2 [PRELOADER]
Open port... OK
Send start cmd... OK
Get HW code from device... 0707
Get sec config... OK [00000005]
Active sec flags: [SBC DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6768]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Preloader exist. Skip connection verification.
Get ME ID... OK
ME_ID = 0xAE70BA19, 0x7D7A56MF7V, 0x29F58N9L6, 0x0EFH79M357
Load DownloadAgent... OK
Search DA... OK [1]
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [PRELOADER]
Preloader alive. Skip initializing external RAM
Send preloader... OK
Load DownloadAgent... OK
Search DA... OK [8]
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_CNAME: Y0S256
EMMC_ID : 0x9B010059E02DE99A493053323536001C
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0001000000 (16.00Mb)
EMMC_USER : 0x3A3E000000 (232.97Gb)
RAM INFO:
INT_SRAM: 0x0000070000 (448.00Kb)
EXT_RAM : 0x0100000000 (4.00Gb)
Checking USB status... USB_HIGH_SPEED
[EFUSE INFO]: BROM not disabled
Read partitions info from phone... OK
Checking A/B state... OK [A]
Read product info... [EROFS] ... OK
Product Brand : realme
Product Manufacturer : realme
Product Model : RMX3710
Product Name : RMX3710
Product Device : REE2ADL1
Product Board : k69v1_64_k419
Board Platform : mt6768
Build ID : UKQ1.230924.001
Build Date : Tue May 28 16:25:59 CST 2024
Display ID : RMX3710226AE_14.0.0.800(EX01)
Security Patch : 2024-06-05
Version SDK : 34
Version Release : 14
Version Codename : REL
Firmware Version : T.R4T2.1847e20-1
Userdata FS Type : F2FS
Read security partition from phone...
Decrypting security data... OK
Encrypt security data... OK
Read partition "nvdata"... OK
Read partition "protect1"... OK
Read partition "nvram"... OK
Read NVDATA files... OK
Read NVRAM files... OK
Read security files... OK
Calculating... OK
Repairing IMEI...
IMEI 1: XXXXXXXXXXXXX
IMEI 2: XXXXXXXXXXXXX
Write IMEI and patch CERT [NVDATA]... OK
Checking patch type... [1]
Patching CERT... OK
Save patched partiton... OK
Updating NVRAM... OK
Read security partition from phone... OK
Write security partition to phone... OK
Checking additional lock... [ENABLED]
Disable additional lock... OK
Unlock bootloader done!
Selected "Disable VBMETA verification"
Read security partition from phone... OK
Write security partition to phone... OK
Write IMEI and patch CERT [NVRAM]... OK
Write partition "nvdata"... OK
Write partition "nvram"... OK
Repair Security and Patch cert done!
If your phone after repair keeps rebooting - use wipe data option.
 
  • Like
Reactions: SPYROS

GsmToto

Super Moderator
Jan 1, 2021
4,495
20,934
UK
Skype
gsmtoto
Sonork ID
100.1684601
Selected model: Realme RMX3760 (Realme C53)
Operation: Unlock network
Software version: 7.1

Host Power Off... OK
Switch virtual port to NONE... OK
Connect Type-C to NONE... OK
Connect phone to [PC]
Connect phone in BROM mode. Use volume key buttons or testpoint.
Waiting for device... OK
Device found at COM2
Port: USB\VID_1782&PID_4D00\3&149F7D48&0&6
Driver: [UNISOC Communications Inc.,sprdvcom,SPRD U2S Diag,sprdvcom.sys,4.19.38.134]
Port type: BROM
Connecting to device... OK
Selected processor: Tiger_T616_64
Load files... (universal) OK
Connect preloader 1... OK
Connect preloader 2... OK
Connect loader 1... OK
Connect loader 2... OK
Serial Number: 0H63710I50104E0S
Flash Type: EMMC
Read partitions info... OK
Checking A/B state... OK [A]
Read product info... [EROFS] ... OK
Product Brand : realme
Product Manufacturer : realme
Product Model : ums9230_hulk_Natv
Product Name : RMX3760
Product Device : RE58C2
Product Board : ums9230_hulk
Board Platform : ums9230
Build ID : TP1A.220624.014
Build Date : Fri Aug 25 19:00:44 CST 2023
Display ID : RMX3760export_13_P.34
Security Patch : 2023-08-05
Version SDK : 33
Version Release : 13
Version Codename : REL
Firmware Version : 1137
Userdata FS Type : F2FS
Load NVD... OK
Unlock... OK
Save NVD... OK
Done!
 
  • Like
Reactions: SPYROS

GsmToto

Super Moderator
Jan 1, 2021
4,495
20,934
UK
Skype
gsmtoto
Sonork ID
100.1684601
Selected model: Samsung SM-A115M (Galaxy A11)
Operation: Erase FRP And Wipe
Software version: 7.1
BIT 5 or less is supported by EDL loader
Work ID: 39756784332

Waiting for device... OK
Device found at COM3
Port: Qualcomm HS-USB QDLoader 9008
Open port... OK
Reading device info... OK
Serial Number: 978134677223
Sahara ver: 2
MSM HW ID: 0009A0E100200000
OEM PK HASH: 084E868B04E3C48313FF498FA6F18 335E9F56C276BD8512D828C51A78A9251EC
SBL SW Ver: 00000000
CPU: SDM450 (Snapdragon 450)
Vendor: Samsung
Prepare loader file... OK
Loader hash: 084E868B04851E3C48313FF498FA6F18 335E9F56C276BD2D828C51A78A9251EC
Sending loader... OK
FireHose initialization... OK
Detecting memory type... OK [EMMC]
Get storage info... OK
Storage info:
Type: eMMC
Name: GP6BAB
Page size: 200
Block size: 200
Partition count: 3
PART0 size: 0x0E8F800000
PART1 size: 0x0000400000
PART2 size: 0x0000400000
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... OK
Serial Number : R8MR4456NM2EDA
Product Brand : samsung
Product Manufacturer : samsung
Product Model : SM-A115M
Product Name : a11qub
Product Device : a11q
Product Board : QC_Reference_Phone
Board Platform : msm8953
Build ID : SP1A.210812.016
Build Date : Sat Nov 25 09:21:16 KST 2023
Display ID : SP1A.210812.016.A115MUBG67J8KHS47
Security Patch : 2023-11-01
Version SDK : 31
Version Release : 12
Version Codename : REL
Firmware Version : A115MUBS5CWK2
Userdata FS Type : F2FS
Erase FRP... OK
Formatting "userdata" partition... OK
Creating default filesystem [F2FS]... OK
Formatting "cache" partition... OK
Creating default filesystem [EXT4]... OK
Formatting "metadata" partition... OK
Done!
 
  • Like
Reactions: SPYROS

GsmToto

Super Moderator
Jan 1, 2021
4,495
20,934
UK
Skype
gsmtoto
Sonork ID
100.1684601
Selected model: Samsung SM-A146U (Samsung Galaxy A14 5G)
Operation: Wipe Partitions
Software version: 7.1
Erasing of partitions can damage your device.
Make sure that you have a backup created. Continue? YES

Host Power Off... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Host Power On... OK
Connect phone to [BOX] in BROM/PRELOADER Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek PreLoader USB VCOM (Android),usb2ser.sys,3.0.1504.0]
Device found at COM4 [PRELOADER]
Open port... OK
Send start cmd... OK
Get HW code from device... 0989
Get sec config... OK [00000005]
Active sec flags: [SBC DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6833]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Read Efuse error
Force switch to BROM... OK
Host Power Off... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Waiting for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0989
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6833]
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Release testpoint
Advanced Bypass Security... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM4 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0989
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6833]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0xEF18973F, 0xA47EBDD7, 0xEB9665C4, 0x001FA411
Get Chip ID... [MT6833]
Get SOC ID... [BAAD5C803B33FB72C59886EF6C2CCB8CA531 6EE9325304BD60AB2389F541510A]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [14]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
UFS CID (FW VER): KM5P9001DM-B424 (0002)
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
UFS INFO:
UFS_CID : KM5P9001DM-B424
UFS_FWVER : 0002
BLOCK_SIZE: 0x0000001000 (4.00Kb)
UFS_LU0 : 0x0000400000 (4.00Mb)
UFS_LU1 : 0x0000400000 (4.00Mb)
UFS_LU2 : 0x0EE5800000 (59.59Gb)
RAM INFO:
INT_SRAM: 0x0000070000 (448.00Kb)
EXT_RAM : 0x0100000000 (4.00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... [EROFS] ... OK
Product Brand : samsung
Product Manufacturer : samsung
Product Model : SM-A146U
Product Name : a14xmsq
Product Device : a14xm
Product Board : a14xm
Board Platform : mt6833
Build ID : SP1A.210812.016
Build Date : Mon Jul 1 16:34:01 KST 2024
Firmware Version : A146USQDXG1S8
Userdata FS Type : F2FS
Format "persistent" partition... OK
Format Partitions done!
 
  • Like
Reactions: SPYROS

GUETH

Active Member
Apr 10, 2018
48
8
MALI
Skype
gueth76
Sonork ID
0
Selected model: Samsung SM-A146U (Samsung Galaxy A14 5G)
Operation: Wipe Partitions
Software version: 7.1
Erasing of partitions can damage your device.
Make sure that you have a backup created. Continue? YES

Host Power Off... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Host Power On... OK
Connect phone to [BOX] in BROM/PRELOADER Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek PreLoader USB VCOM (Android),usb2ser.sys,3.0.1504.0]
Device found at COM4 [PRELOADER]
Open port... OK
Send start cmd... OK
Get HW code from device... 0989
Get sec config... OK [00000005]
Active sec flags: [SBC DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6833]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Read Efuse error
Force switch to BROM... OK
Host Power Off... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Waiting for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0989
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6833]
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Release testpoint
Advanced Bypass Security... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM4 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0989
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6833]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0xEF18973F, 0xA47EBDD7, 0xEB9665C4, 0x001FA411
Get Chip ID... [MT6833]
Get SOC ID... [BAAD5C803B33FB72C59886EF6C2CCB8CA531 6EE9325304BD60AB2389F541510A]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [14]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
UFS CID (FW VER): KM5P9001DM-B424 (0002)
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
UFS INFO:
UFS_CID : KM5P9001DM-B424
UFS_FWVER : 0002
BLOCK_SIZE: 0x0000001000 (4.00Kb)
UFS_LU0 : 0x0000400000 (4.00Mb)
UFS_LU1 : 0x0000400000 (4.00Mb)
UFS_LU2 : 0x0EE5800000 (59.59Gb)
RAM INFO:
INT_SRAM: 0x0000070000 (448.00Kb)
EXT_RAM : 0x0100000000 (4.00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... [EROFS] ... OK
Product Brand : samsung
Product Manufacturer : samsung
Product Model : SM-A146U
Product Name : a14xmsq
Product Device : a14xm
Product Board : a14xm
Board Platform : mt6833
Build ID : SP1A.210812.016
Build Date : Mon Jul 1 16:34:01 KST 2024
Firmware Version : A146USQDXG1S8
Userdata FS Type : F2FS
Format "persistent" partition... OK
Format Partitions done!


NTH-AN00 Honor 50
NTH-N29 Honor 50
NTH-NX9 Honor 50
RNA-AN00 Honor 50 Pro
RNA-TN00 Honor 50 Pro
VNE-AN00 Honor Play 30
VNE-AN40 Honor Play 6C
VNE-AN60 Honor Play 30
VNE-N41 Honor X8 5G
VNE-TN00 Honor Play 30
VNE-TN00BX Honor Play 30
 

GsmToto

Super Moderator
Jan 1, 2021
4,495
20,934
UK
Skype
gsmtoto
Sonork ID
100.1684601
Selected model: Xiaomi Redmi Note 9 (Merlin)
Operation: Reset Mi Acc
Software version: 7.1

Host Power Off... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Connect phone to [BOX] in BROM mode
Waiting for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0707
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6768]
Get sec config... OK [000000E7]
Active sec flags: [SBC SLA DAA]
Release testpoint
Advanced Bypass Security... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1632,usb2ser.sys,3.0.1504.0]
Device found at COM2 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0707
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6768]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x28226D6C, 0x13147C3D, 0xE8A7CB47, 0xD84F1B52
Get Chip ID... [MT6768]
Get SOC ID... [6456A6073F83F5F45E6E8E25F9CE041 B0E85F85071AB2D1B2E8A77B10AA108EF]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [8]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x15010044CE9967A5563644414202705C
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_CNAME: DV6DAB
EMMC_ID : 0x150100445CE9967A563644414202705C
EMMC_BOOT1: 0x0000400000 (4,00Mb)
EMMC_BOOT2: 0x0000400000 (4,00Mb)
EMMC_RPMB : 0x0001000000 (16,00Mb)
EMMC_USER : 0x1D1EC00000 (116,48Gb)
RAM INFO:
INT_SRAM: 0x0000070000 (448,00Kb)
EXT_RAM : 0x0100000000 (4,00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... [EXT4] ... OK
Product Brand : Redmi
Product Manufacturer : Xiaomi
Product Model : merlin
Product Name : merlin
Product Device : merlin
Product Board : merlin
Board Platform : mt6768
Build ID : SP1A.210812.016
Build Date : Thu Oct 13 20:08:27 CST 2022
Display ID : SP1A.210812.016
Security Patch : 2022-09-01
Version SDK : 31
Version Release : 12
Version Codename : REL
Firmware Version : V13.0.2.0.SJOHRXMJUO
Userdata FS Type : EXT4
Read security partition from phone... OK
Checking FS type... [EXT4] ... OK
Unlocking bootloader...
Read security partition from phone...
Decrypting security data... OK
Encrypt security data... OK
Read security partition from phone... OK
Write security partition to phone... OK
Unlock bootloader done!
Disabling vbmeta verification...
Read security partition from phone... OK
Write security partition to phone... OK
Reset Mi Account... OK
Write security partition to phone... OK
Reset Mi Acc done!
 
  • Like
Reactions: SPYROS
Top