Z3X Pandora PRO 7.1 Released. New devices added.

Z3X Team

GsmToto

Super Moderator
Jan 1, 2021
4,876
21,548
UK
Skype
gsmtoto
Sonork ID
100.1684601
Selected model: Samsung SM-A225F (Samsung Galaxy A22 2021)
Operation: Erase FRP And Wipe
Software version: 7.1
Erasing of partitions can damage your device.
Make sure that you have a backup created. Continue? YES
Work ID: 39764677

Connect phone in BROM Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM2 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0707
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6768]
LibUSB installed
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Release testpoint, waiting 2 seconds
Advanced Bypass Security... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM2 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0707
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6768]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0xE687B5E8, 0x0AADE389, 0xA0EE13BA, 0x08653343
Get Chip ID... [MT6768]
Get SOC ID... [557B3ED18E9FCAE365E77E94AAE5C1 D1E4168B15AEB67DD1AA0169D9454534AD]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [8]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x150100445C4D06188E3636444142000D
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_CNAME: DV6DAB
EMMC_ID : 0x15010044563C4D06188E36444142000D
EMMC_BOOT1: 0x0000400000 (4,00Mb)
EMMC_BOOT2: 0x0000400000 (4,00Mb)
EMMC_RPMB : 0x0001000000 (16,00Mb)
EMMC_USER : 0x1D1F000000 (116,48Gb)
RAM INFO:
INT_SRAM: 0x0000070000 (448,00Kb)
EXT_RAM : 0x0100000000 (4,00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... [EXT4] ... OK
Product Brand : samsung
Product Manufacturer : samsung
Product Model : SM-A225M
Product Name : a22ub
Product Device : a22
Product Board : a22
Board Platform : mt6768
Build ID : SP1A.210812.016
Build Date : Sat Jan 27 04:24:16 KST 2024
Display ID : TP1A.220624.014.A225MUBU7CXA8
Security Patch : 2024-02-01
Version SDK : 33
Version Release : 13
Version Codename : REL
Firmware Version : A225MUBU7CXA8
Userdata FS Type : F2FS
Read partition "frp"... OK
Read partition "persistent"... OK
Backup saved to C:/Program%20Files%20(x86)/Z3X/Pandora/Backup/MTK/Samsung_SM-A225F%20(Samsung%20Galaxy%20A22%202021)/FRP_BACKUP_(2024-8-28_16-38-33)/
Writting FRP data... OK
Formatting "userdata" partition... OK
Formatting "cache" partition... OK
Formatting "metadata" partition... OK
Formatting "md_udc" partition... OK
Wipe data done!
 
  • Like
Reactions: SPYROS

GsmToto

Super Moderator
Jan 1, 2021
4,876
21,548
UK
Skype
gsmtoto
Sonork ID
100.1684601
Selected model: Nokia TA-1401 (Nokia G11)
Operation: Repair
Software version: 7.1
Work ID: 40735733

Connect phone in BROM mode. Use volume key buttons or testpoint.
Waiting for device... OK
Device found at COM3
Port: USB\VID_1782&PID_4D00\5&3AAD0DCD&0&11
Driver: [UNISOC Communications Inc.,sprdvcom,SPRD U2S Diag,sprdvcom.sys,4.19.38.134]
Port type: BROM
Connecting to device... OK
Selected processor: Tiger_T616_64
Load files... (universal) OK
Connect preloader 1... OK
Connect preloader 2... OK
Connect loader 1... OK
Connect loader 2... OK
Serial Number: P232527XXXXXXXXXXX
Flash Type: EMMC
Read partitions info... OK
Checking A/B state... OK
Read product info... [EXT4] ... OK
Product Brand : Nokia
Product Manufacturer : HMD Global
Product Model : Nokia G11
Product Name : Shadowcat_00WW
Product Device : SCT_sprout
Board Platform : ums9230
Build ID : TP1A.220624.014
Build Date : Mon Apr 17 06:23:13 UTC 2023
Display ID : 00WW_3_430
Security Patch : 2023-04-05
Version SDK : 33
Version Release : 13
Version Codename : REL
Firmware Version : 00WW_3_430
Userdata FS Type : F2FS
Load NVD... OK
Read IMEI... OK
Current IMEI:
IMEI 1:
IMEI 2:
Repaired IMEI:
IMEI 1: 359XXXXXXXXXXXX
IMEI 2: 359XXXXXXXXXXXX
Check security state... OK [3]
Unlock bootloader... OK
Patch modem check... already patched,skip
Patch cert... OK
Write IMEI... OK
Save NVD... OK
Done!
If your phone after this operation keeps rebooting - use wipe data option.
 
  • Like
Reactions: SPYROS

GsmToto

Super Moderator
Jan 1, 2021
4,876
21,548
UK
Skype
gsmtoto
Sonork ID
100.1684601
Selected model: Samsung SM-A136U (Samsung Galaxy A13 5G)
Operation: Unlock network (Server)
Software version: 7.1
Work ID: 40589644

Work ID: 40446717
Model: SM-A136U
AP version: A136USQXG6SAD
CSC version: A136UOYXG6NAD
CP version: A136USQXG6SAD
OS version: 13
Product code: XAA
Carrier ID: XAU
Phone SN: R5CT627M22V
Unique number: CDC009881G678KJ7IB78
IMEI: 3589578944578902
IMEI Certi: PASS
Changing csc to XAA... OK
Powering off... OK
Connect phone in BROM Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM2 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0989
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6833]
LibUSB installed
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Release testpoint, waiting 2 seconds
Advanced Bypass Security... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM2 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0989
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6833]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0xA084F747, 0xC00282A8, 0xB1F59074, 0xB76AB3F0
Get Chip ID... [MT6833]
Get SOC ID... [31A2B36489DB55708FF8B08D2BE259 126480CF1B4A5E636ACB840512D0C56E9C]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [14]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x150100444332D629D76444D42009881F
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_CNAME: DC6DMB
EMMC_ID : 0x15010044433642D629D744D42009881F
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0001000000 (16.00Mb)
EMMC_USER : 0x0E8F800000 (58.24Gb)
RAM INFO:
INT_SRAM: 0x0000070000 (448.00Kb)
EXT_RAM : 0x0100000000 (4.00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... [EXT4] ... OK
Product Brand : samsung
Product Manufacturer : samsung
Product Model : SM-A136U
Product Name : a13xsq
Product Device : a13x
Product Board : a13x
Board Platform : mt6833
Build ID : SP1A.210812.016
Build Date : Wed Jul 31 15:46:43 KST 2024
Display ID : TP1A.220624.014.A136USQXG6SAD
Security Patch : 2024-08-01
Version SDK : 33
Version Release : 13
Version Codename : REL
Firmware Version : A136USQXG6SAD
Userdata FS Type : F2FS
Read security partition from phone... OK
Searching server... OK
Waiting for server answer... OK
Unlocking ... [3] ... OK
Every time you turn on your phone, you must enter unlock code 0000000000000000 (16 zeros)
Network Unlock done!
 
  • Like
Reactions: SPYROS
Top