Z3X Redmi Note 9 5G_Cannon_Mi Account Bypass Pandora Box

Z3X Team

Yeminoo

Friend's Martview
Sep 13, 2019
734
550
Myawaddy

Redmi Note 9 5G_Cannon_Mi Account Bypass Pandora Box


Selected model: Xiaomi Redmi Note 9 5G (China) (Cannon)
Operation: Reset Mi Acc
Software version: 7.1

Host Power Off... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Host Power On... OK
Connect phone to [BOX] in BROM/PRELOADER Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1633,usb2ser.sys,3.0.1504.0]
Device found at COM3 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0996
Get sec config... OK [000000E7]
Active sec flags: [SBC SLA DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6853]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Force switch to BROM... OK
Host Power Off... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Waiting for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0996
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6853]
Get sec config... OK [000000E7]
Active sec flags: [SBC SLA DAA]
Release testpoint
Advanced Bypass Security... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1633,usb2ser.sys,3.0.1504.0]
Device found at COM3 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0996
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6853]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0xDB4C2DEF, 0xB363C6C1, 0x7355B867, 0x204A4661
Get Chip ID... [MT6853]
Get SOC ID... [502A70ECEAD30EE591A5112ACEF09AC9334485C6C5A96341025AD2EF32893246]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [15]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
UFS CID (FW VER): KM8V8001JM-B813 (2302)
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
UFS INFO:
UFS_CID : KM8V8001JM-B813
UFS_FWVER : 2302
BLOCK_SIZE: 0x0000001000 (4.00Kb)
UFS_LU0 : 0x0000400000 (4.00Mb)
UFS_LU1 : 0x0000400000 (4.00Mb)
UFS_LU2 : 0x1DCB000000 (119.17Gb)
RAM INFO:
INT_SRAM: 0x0000070000 (448.00Kb)
EXT_RAM : 0x0100000000 (4.00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... [EXT4] ... OK
Product Brand : Redmi
Product Manufacturer : Xiaomi
Product Model : M2007J22C
Product Name : cannon
Product Device : cannon
Product Board : cannon
Board Platform : mt6853
Build ID : RP1A.200720.011
Build Date : Tue Jun 1 21:11:30 CST 2021
Display ID : RP1A.200720.011
Security Patch : 2021-05-01
Version SDK : 30
Version Release : 11
Version Codename : REL
Firmware Version : V12.5.4.0.RJECNXM
Userdata FS Type : F2FS
Read security partition from phone... OK
Checking FS type... [EXT4] ... OK
Unlocking bootloader...
Read security partition from phone...
Decrypting security data... OK
Encrypt security data... OK
Read security partition from phone... OK
Write security partition to phone... OK
Unlock bootloader done!
Disabling vbmeta verification...
Read security partition from phone... OK
Write security partition to phone... OK
Reset Mi Account... OK
Write security partition to phone... OK
Reset Mi Acc done!
 
Top