Redmi Note 10S Mi Account Remove Pandora Box
- Without VPN
-Remove Mi Account One Click MTK Mode
Selected model: Xiaomi Redmi Note 10S (Rosemary)
Operation: Reset Mi Acc
Software version: 6.3
Host Power Off... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Host Power On... OK
Connect phone to [BOX] in BROM/PRELOADER Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM18 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0813
Get sec config... OK [000000E7]
Active sec flags: [SBC SLA DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6785]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Force switch to BROM... OK
Host Power Off... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Waiting for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0813
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6785]
Get sec config... OK [000000E7]
Active sec flags: [SBC SLA DAA]
Release testpoint
Advanced Bypass Security... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM18 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0813
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6785]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0xC3B98830, 0xE35EE099, 0x993571FB, 0x903C1D10
Get Chip ID... [MT6785]
Get SOC ID... [4C4C6EAADF8A3544896DDDF973237E5CBB4B464457978A0BE5D8BAF4AC51C535]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [12]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
UFS CID (FW VER): H9HQ15AFAMBDAR (A043)
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
UFS INFO:
UFS_CID : H9HQ15AFAMBDAR
UFS_FWVER : A043
BLOCK_SIZE: 0x0000001000 (4.00Kb)
UFS_LU0 : 0x0000400000 (4.00Mb)
UFS_LU1 : 0x0000400000 (4.00Mb)
UFS_LU2 : 0x1DCB000000 (119.17Gb)
RAM INFO:
INT_SRAM: 0x0000080000 (512.00Kb)
EXT_RAM : 0x0200000000 (8.00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK [A]
Read product info... [EXT4] ... OK
Product Brand : Redmi
Product Manufacturer : Xiaomi
Product Model : rosemary
Product Name : rosemary
Product Device : rosemary
Product Board : rosemary
Board Platform : mt6785
Build ID : SP1A.210812.016
Build Date : Sat Oct 7 08:24:45 UTC 2023
Display ID : TP1A.220624.014
Security Patch : 2023-10-01
Version SDK : 33
Version Release : 13
Version Codename : REL
Firmware Version : V14.0.8.0.TKLMIXM
Userdata FS Type : F2FS
Read security partition from phone... OK
Checking FS type... [EXT4] ... OK
Unlocking bootloader...
Read security partition from phone... OK
Decrypting security data... OK
Encrypt security data... OK
Write security partition to phone... OK
Unlock bootloader done!
Disabling vbmeta verification...
Read security partition from phone... OK
Write security partition to phone... OK
Reset Mi Account... OK
Write security partition to phone... OK
Reset Mi Acc done!