Z3X Post here successfully Unlocked / Repaired / Flashed Phones with Pandora Tool

Z3X Team

saharsoft

Friend's Martview
Apr 5, 2017
166
102
afghanistan

Realme C25Y RMX3265 FRP BYPASS ONE CLICK BY PANDORA TOOL​




Selected model: Realme RMX3265 (Realme C25Y)
Operation: Erase FRP
Software version: 8.9
Work ID: 73102188

Connect phone in BROM mode. Use volume key buttons or testpoint.
Waiting for device... OK
Device found at COM72
Port: USB\VID_1782&PID_4D00\6&25A71A4&0&4
Driver: [UNISOC Communications Inc.,sprdvcom,SPRD U2S Diag,sprdvcom.sys,4.19.38.134]
Port type: BROM
Connecting to device... OK
Selected processor: Tiger_T610_64
Load files... (universal) OK
Connect preloader 1... OK
Connect preloader 2... OK
Connect loader 1... OK
Connect loader 2... OK
Serial Number: 00216F611C01293310NA07PP
Read partitions info... OK
Checking A/B state... OK
Read product info... [EXT4] ... OK
Product Brand : realme
Product Manufacturer : realme
Product Model : RMX3265
Product Name : RMX3265
Product Device : RE54D1
Product Board : ums512
Board Platform : ums512
Build ID : RP1A.201005.001
Build Date : Tue Oct 10 16:15:39 CST 2023
Display ID : RMX3265_11_A.54
Security Patch : 2023-10-05
Version SDK : 30
Version Release : 11
Version Codename : REL
Firmware Version : 1696925887000
Userdata FS Type : F2FS
Backup partitions... OK
Formatting "persist" partition... OK
Done!
 

saharsoft

Friend's Martview
Apr 5, 2017
166
102
afghanistan
Redmi note 11 spes frp bypass done with test point



Selected model: Xiaomi Redmi Note 11 (Spes)
Operation: Erase FRP
Software version: 9.0
Work ID: 74452428

Waiting for device... OK
Device found at COM18
Port: Qualcomm HS-USB QDLoader 9008
Open port... OK
Reading device info... OK
Serial Number: 3419777851
Sahara ver: 2
OEM PK HASH: 1BEBE3863A6781DB4B01086063007334DE9E5CA14971C7C4F4358EC9D79CDA4692CE5E948C6FD409408F4C919FCADFE3
CPU: SM6225 (Snapdragon 680 4G)
Vendor: Xiaomi
MSM HW ID: 001B80E100720000
SBL SW Ver: 00000000
Prepare loader file... downloading... OK
Loader hash: FAAA26A045EA467A0DBC89CD533C49C1484F9057
Loader PK hash: 1BEBE3863A6781DB4B01086063007334DE9E5CA14971C7C4F4358EC9D79CDA4692CE5E948C6FD409408F4C919FCADFE3
Loader version: 6.5
Sending loader... OK
FireHose initialization... OK
Bypass EDL auth... OK
Detecting memory type... OK [UFS]
Storage info:
Type: UFS
Name:
Page size: 1000
Block size: 1000
Partition count: 6
LU0 size: 0x1C45800000 (113.09Gb)
LU1 size: 0x0000800000 (8.00Mb)
LU2 size: 0x0000800000 (8.00Mb)
LU3 size: 0x0002000000 (32.00Mb)
LU4 size: 0x0180000000 (6.00Gb)
LU5 size: 0x0002000000 (32.00Mb)
Read partitions info from phone... OK
Checking A/B state... OK [A]
Read product info... [EXT4] ... OK
Product Brand : qti
Product Manufacturer : QUALCOMM
Product Model : missi system image for arm64
Product Name : missi
Product Device : missi
Product Board : spes
Board Platform : bengal
Build ID : TKQ1.221114.001
Build Date : Sun Sep 29 03:23:13 UTC 2024
Security Patch : 2024-10-01
Version SDK : 33
Version Release : 13
Version Codename : REL
Firmware Version : V816.0.8.0.TGCMIXM
Userdata FS Type : F2FS
MiAcc Find Device : Enabled
Erase FRP... OK
Done!
 

saharsoft

Friend's Martview
Apr 5, 2017
166
102
afghanistan

Vivo PD2103CF (Vivo Y53s) complete flash with DM verify error fix with Pandora Tool​


Selected model: Vivo PD2103CF (Vivo Y53s)
Operation: Flash (Format all + download)
Software version: 9.0
Work ID: 75648558

Parse scatter file... OK
Load Rom Images... OK
Connect phone in BROM/PRELOADER Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1512.0]
You are using driver version 3.0.1512.0, we recommend using version 3.0.1504.0 for proper operation. You can install the correct driver from the program directory.
Device found at COM135 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0707
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6768]
LibUSB installed
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Release testpoint, waiting 2 seconds
Advanced Bypass Security... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1512.0]
You are using driver version 3.0.1512.0, we recommend using version 3.0.1504.0 for proper operation. You can install the correct driver from the program directory.
Device found at COM135 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0707
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6768]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0xB75E9DDE, 0x9EC9042E, 0xC1DF8EAB, 0xF62E4830
Get Chip ID... [MT6768]
Get SOC ID... [DB124F3C0F39C64D8CF5FEEFB1B9042F696103993E33EAB4219A33FE7262BF3C]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [8]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x13014E47314331324C1011A63AE738C5
Load EMI config from preloader... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_CNAME: G1C12L
EMMC_ID : 0x13014E47314331324C1011A63AE738C5
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0001000000 (16.00Mb)
EMMC_USER : 0x1D1F000000 (116.48Gb)
RAM INFO:
INT_SRAM: 0x0000070000 (448.00Kb)
EXT_RAM : 0x0100000000 (4.00Gb)
HEALTH:
Pre EOL Info: normal
DeviceLifeTimeEstA: 10% - 20% device life time used
DeviceLifeTimeEstB: 0% - 10% device life time used
Get scatter info... OK
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... [EXT4] ... OK
Product Brand : vivo
Product Manufacturer : vivo
Product Model : V2058
Product Name : 2058N
Product Device : 2058
Product Board : k69v1_64
Board Platform : mt6768
Build ID : SP1A.210812.003
Build Date : Thu May 12 16:09:14 CST 2022
Display ID : SP1A.210812.003 release-keys
Security Patch : 2022-05-01
Version SDK : 31
Version Release : 12
Version Codename : REL
Firmware Version : compiler05121614
Userdata FS Type : F2FS
Creating autoformat settings... OK
Format "EMMC_BOOT_1" partition( 0x00000000..0x003FFFFF )... OK
Format "EMMC_BOOT_2" partition( 0x00000000..0x003FFFFF )... OK
Format "EMMC_USER" partition( 0x00000000..0x1D1EFFFFFF )... OK
Get scatter info... OK
Verify scatter file... OK
Do NAND BMT remark... OK
Setup download info... OK
Get partition table catagory... OK [GPT]
Read mirror partition table... OK
Generate mirror partition table... OK
Downloading mirror partition table... OK
Read major partition table... OK
Generate major partition table... OK
Downloading major partition table... OK
Download "preloader"... OK "preloder_backup"... OK
Download "recovery"... OK
Download "vbmeta"... OK
Download "vbmeta_system"... OK
Download "vbmeta_vendor"... OK
Download "reserved"... OK
Download "vbmeta_oem"... OK
Download "vbmeta_vgc"... OK
Download "efuse"... OK
Download "logo"... OK
Download "md1img"... OK
Download "md1img_1"... OK
Download "spmfw"... OK
Download "scp1"... OK
Download "scp2"... OK
Download "sspm_1"... OK
Download "sspm_2"... OK
Download "gz1"... OK
Download "gz2"... OK
Download "lk"... OK
Download "lk2"... OK
Download "boot"... OK
Download "dtbo"... OK
Download "tee1"... OK
Download "tee2"... OK
Download "super"... OK
Download "cache"... OK
Download "userdata"... OK
Flashing done!
 
Top