Z3X Post here successfully Unlocked / Repaired / Flashed Phones with Pandora's 2021

Z3X Team

TATAISONA

Friend's Martview
Jul 5, 2019
2,551
4,944
India
Oppo A1K Screen Unlock Done By Pandora Box


 
  • Like
Reactions: GsmToto

iPROSHOP Studio

Active Member
Oct 10, 2020
27
26
Thailand
VIVO Y17 Read info , Write Firmware , Erase FRP By Pandora Box



Selected model: Vivo UNKNOWN
Operation: Read Flash Info
Software version: 1.7

Host Power Off... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Wait for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0766
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Advanced Bypass Security... OK
Disconnect virtual port... OK
Connect Type-C to HUB... OK
Wait for device connecting... OK
Device found at COM43 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x2407BC92, 0xD470517C, 0x2E9BC903, 0x903C4AB6
Get Chip ID... [MT6765]
Get SOC ID... [2571ED125253BFBAD2835CD78409DE5FA95146C172F5CF4E3D 2FAE6A6DB92544]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [29]
Send preloader... OK
Start preloader... OK
Check preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x150100444836444D420526E76A27B529
Load EMI config from database [DB VER: 56 DB DATE: 04-11-2021] OK [1]
Trying EMI [F6969C3D]
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_ID : 0x150100444836444D420526E76A27B529
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0000400000 (4.00Mb)
EMMC_USER : 0x0E8F800000 (58.24Gb)
RAM INFO:
INT_SRAM: 0x000003A000 (232.00Kb)
EXT_RAM : 0x0100000000 (4.00Gb)
Read Flash Info done!






Selected model: Vivo UNKNOWN
Operation: Flash (Download only)
Software version: 1.7

Parse scatter file... OK
Load Rom Images... OK
Host Power Off... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Wait for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0766
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Advanced Bypass Security... OK
Disconnect virtual port... OK
Connect Type-C to HUB... OK
Wait for device connecting... OK
Device found at COM43 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x2407BC92, 0xD470517C, 0x2E9BC903, 0x903C4AB6
Get Chip ID... [MT6765]
Get SOC ID... [2571ED125253BFBAD2835CD78409DE5FA95146C172F5CF4E3D 2FAE6A6DB92544]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [29]
Send preloader... OK
Start preloader... OK
Check preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x150100444836444D420526E76A27B529
Load EMI config from preloader... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_ID : 0x150100444836444D420526E76A27B529
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0000400000 (4.00Mb)
EMMC_USER : 0x0E8F800000 (58.24Gb)
RAM INFO:
INT_SRAM: 0x000003A000 (232.00Kb)
EXT_RAM : 0x0100000000 (4.00Gb)
Get scatter info... OK
Check USB status... USB_HIGH_SPEED
Get scatter info... OK
Verify scatter file... OK
Do NAND BMT remark... OK
Setup download info... OK
Get partition table catagory... OK [GPT]
Read mirror partition table... OK
Check partition table layout changed... OK
Read major partition table... OK
Check major partition table layout changed... OK
Download "preloader"... OK
Download "recovery"... OK
Download "survival"... OK
Download "cust"... OK
Download "efuse"... OK
Download "md1img"... OK
Download "spmfw"... OK
Download "scp1"... OK
Download "scp2"... OK
Download "sspm_1"... OK
Download "sspm_2"... OK
Download "lk"... OK
Download "lk2"... OK
Download "boot"... OK
Download "logo"... OK
Download "dtbo"... OK
Download "tee1"... OK
Download "tee2"... OK
Download "vendor"... OK
Download "system"... OK
Download "vbmeta"... OK
Download "cache"... OK
Download "userdata"... OK
Flashing done!




Selected model: Vivo UNKNOWN
Operation: Erase FRP
Software version: 1.7

Parse scatter file... OK
Load Rom Images... OK
Host Power Off... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Wait for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0766
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Advanced Bypass Security... OK
Disconnect virtual port... OK
Connect Type-C to HUB... OK
Wait for device connecting... OK
Device found at COM43 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x2407BC92, 0xD470517C, 0x2E9BC903, 0x903C4AB6
Get Chip ID... [MT6765]
Get SOC ID... [2571ED125253BFBAD2835CD78409DE5FA95146C172F5CF4E3D 2FAE6A6DB92544]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [29]
Send preloader... OK
Start preloader... OK
Check preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x150100444836444D420526E76A27B529
Load EMI config from preloader... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_ID : 0x150100444836444D420526E76A27B529
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0000400000 (4.00Mb)
EMMC_USER : 0x0E8F800000 (58.24Gb)
RAM INFO:
INT_SRAM: 0x000003A000 (232.00Kb)
EXT_RAM : 0x0100000000 (4.00Gb)
Get scatter info... OK
Check USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Read partition "frp"... OK
Format EMMC_USER partition( 0x05588000..0x05687FFF )... OK
Erase FRP done!
 

GsmToto

Super Moderator
Jan 1, 2021
3,695
18,642
UK
Skype
gsmtoto
Sonork ID
100.1684601
Realme RMX3511 (C35)
Operation: Read Flash Info
Software version: 4.0

Host Power Off... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Host Power On... OK
Waiting for device... OK
Device found at COM3
Port: USB\VID_1782&PID_4D02B47B14&0&4574
Connecting to device... OK
Load files... OK
Connect preloader 1... OK
Connect preloader 2... OK
Connect loader 1... OK
Connect loader 2... OK
Serial Number: 0G52509V28442DC
Flash Type: UFS
Read partitions info... OK
Checking A/B state... OK [A]
Read product info... OK
Product Brand : realme
Product Manufacturer : realme
Product Model : RMX3511
Product Name : ums9230_nico_Natv
Product Device : RE87BAL1
Build ID : RP1A.201005.001
Build Date : Tue Sep 21 15:18:17 CST 2022
Display ID : RMX3511PU_11_A.55
Security Patch : 2022-09-08
Version SDK : 30
Version Release : 11
Version Codename : REL
Firmware Version : 1396
Done!
 

GsmToto

Super Moderator
Jan 1, 2021
3,695
18,642
UK
Skype
gsmtoto
Sonork ID
100.1684601
Selected model: TCL A502DL (TCL LX)
Operation: Unlock network
Software version: 4.2

Host Power Off... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Wait for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0004
Send start cmd... OK
Get HW code from device... 0699
Get HW & SW version from device... OK
HW VER: CB00, SW VER: 0002, HW SUB CODE: 8A00
Detect chip [MT6739]
Get sec config... OK [000000E8]
Active sec flags: [SBC SLA DAA]
Advanced Bypass Security... OK
Disconnect virtual port... OK
Connect Type-C to HUB... OK
Wait for device connecting... OK
Device found at COM26 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0699
Get HW & SW version from device... OK
HW VER: CB00, SW VER: 0002, HW SUB CODE: 8A00
Detect chip [MT6739]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0xCB57DD5F, 0x01B0300F, 0x43ADBD46, 0xFE6988D2
Get Chip ID... [MT6739]
Get SOC ID... [8FB27F672C3576B8341617B94E811CD67439EA69B21C485A]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [0]
Send preloader... OK
Start preloader... OK
Check preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x150100514536334D4203485FAA031
Load EMI config from database [DB VER: 164 DB OK [3]
Trying EMI [A04CDABF, 0BFBC345, 8FABA264]
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_ID : 0x150100514536334D4203485FAA03
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0000400000 (4.00Mb)
EMMC_USER : 0x03A3E00000 (14.56Gb)
RAM INFO:
INT_SRAM: 0x0000020000 (128.00Kb)
EXT_RAM : 0x0080000000 (2.00Gb)
Check USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Read security partition from phone... OK
Read security files... OK
Read security files... OK
Read lock info... OK
Write lock info... OK
Write security partition to phone... OK
Network Unlock done!
 

GsmToto

Super Moderator
Jan 1, 2021
3,695
18,642
UK
Skype
gsmtoto
Sonork ID
100.1684601
Selected model: Xiaomi M2006C3LG (Redmi 9A)
Operation: Wipe Partitions
Software version: 4.2

Erasing of partitions can damage your device.
Make sure that you have a backup created. Continue? YES
Host Power Off... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Wait for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0004
Send start cmd... OK
Get HW code from device... 0766
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Get sec config... OK [000000E7]
Active sec flags: [SBC SLA DAA]
Advanced Bypass Security... OK
Disconnect virtual port... OK
Connect Type-C to HUB... OK
Wait for device connecting... OK
Device found at COM10 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0xAEBE887A, 0xD6E615B2, 0xADBBF255, 0x059E84QF
Get Chip ID... [MT6765]
Get SOC ID... [ED535D5190162BD9C16D5890636FED0F07FF863A8342DBA7F5DC5811BAA]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [23]
Send preloader... OK
Start preloader... OK
Check preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x45010044413430333201D1DD6D137522
Load EMI config from database [DB VER: 164 DB DATE: 07-17-2021] OK [1]
Trying EMI [46F6F1CA, 22BA5289, 92392267, EB371E79, C3498624, 7770139F, C0129602, E6CB89A3, CB03FF37, 11593C4B, 6526FEW5]
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_ID : 0x45010044413430333201D1DD6D14822
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0001000000 (16.00Mb)
EMMC_USER : 0x0747C00000 (29.12Gb)
RAM INFO:
INT_SRAM: 0x000003A000 (232.00Kb)
EXT_RAM : 0x0080000000 (2.00Gb)
Check USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Format "persist" partition... OK
Format Partitions done!
 

GsmToto

Super Moderator
Jan 1, 2021
3,695
18,642
UK
Skype
gsmtoto
Sonork ID
100.1684601
Selected model: OPPO CPH2185 (Oppo A15)
Operation: Erase FRP
Software version: 4.2

Host Power Off... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Host Power On... OK
Connect phone to BOX in BROM/PRELOADER Mode
Wait for device connecting... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1632,usb2ser.sys,3.0.1504.0]
Device found at COM0 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Force switch to BROM... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Wait for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0002
Send start cmd... OK
Get HW code from device... 0766
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Advanced Bypass Security... OK
Disconnect virtual port... OK
Connect Type-C to HUB... OK
Wait for device connecting... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1632,usb2ser.sys,3.0.1504.0]
Device found at COM105 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x8345354F, 0xFEFC23BD, 0x11A7F326, 0x6C63B85B
Get Chip ID... [MT6765]
Get SOC ID... [F68D09062A8923D96C9DCA702CE8C9660BE10D2C5B653735C2 8989D2547]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [13]
Send preloader... OK
Start preloader... OK
Check preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x90014A68423861503E0300938A36C211
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_ID : 0x90014A68423861503E0300938A36C211
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0001000000 (16.00Mb)
EMMC_USER : 0x0747C00000 (29.12Gb)
RAM INFO:
INT_SRAM: 0x000003A000 (232.00Kb)
EXT_RAM : 0x00C0000000 (3.00Gb)
Check USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Check A/B state... OK
Read product info... OK
Product Board : oppo6765
Board Platform : MT6765
Build ID : QP1A.190711.020
Build Date : Sun Feb 14 16:25:06 CST 2021
Display ID : QP1A.190711.020 release-keys
Security Patch : 2021-02-05
Version SDK : 29
Version Release : 10
Version Codename : REL
Read partition "frp"... OK
Backup saved to C:/Program%20Files%20(x86)/Z3X/Pandora/Backup/MTK/OPPO_CPH2185%20)/FRP_BACKUP_(2023-1-1_17-6-55)/"directory
Format "frp" partition... OK
Writting FRP data... OK
Erase FRP done!
 

GsmToto

Super Moderator
Jan 1, 2021
3,695
18,642
UK
Skype
gsmtoto
Sonork ID
100.1684601
Software version: 4.2

Host Power Off... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Host Power On... OK
Connect phone to BOX in BROM/PRELOADER Mode
Wait for device connecting... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek PreLoader USB VCOM_V1633 (Android),usb2ser.sys,3.0.1504.0]
Device found at COM11 [PRELOADER]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Force switch to BROM... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Wait for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0766
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Advanced Bypass Security... OK
Disconnect virtual port... OK
Connect Type-C to HUB... OK
Wait for device connecting... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1633,usb2ser.sys,3.0.1504.0]
Device found at COM11 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x2D607EA4, 0x6FC835DE, 0xA780E9C6, 0x2B5CF73C
Get Chip ID... [MT6765]
Get SOC ID... [E9C36DC3FE3BE7FCE410159A6CE6B16A87AC3FB75E11664B19 77382EAFE8374F]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [7]
Send preloader... OK
Start preloader... OK
Check preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x13014E47314A395238101868866B
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_ID : 0x13014E47314A395238101868866B
EMMC_BOOT1: 0x0000400000 (4,00Mb)
EMMC_BOOT2: 0x0000400000 (4,00Mb)
EMMC_RPMB : 0x0001000000 (16,00Mb)
EMMC_USER : 0x0E8F800000 (58,24Gb)
RAM INFO:
INT_SRAM: 0x000003A000 (232,00Kb)
EXT_RAM : 0x0100000000 (4,00Gb)
Check USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Check A/B state... OK
Read product info... OK
Product Brand : alps
Product Manufacturer : alps
Product Model : oplus_mssi_64_cn
Product Name : sys_oplus_mssi_64_cn
Product Device : oplus_mssi_64_cn
Product Board : oppo6765
Board Platform : MT6765
Build ID : RP1A.200720.011
Build Date : Mon Jun 6 10:18:32 CST 2022
Display ID : RP1A.200720.011 release-keys
Security Patch : 2022-06-05
Version SDK : 30
Version Release : 11
Version Codename : REL
Firmware Version : 1654481069984
Read partition "frp"... OK
Backup saved to C:/Program%20Files%20(x86)/Z3X/Pandora/Backup/MTK/OPPO_CPH2271%20(Oppo%20A16s)/FRP_BACKUP_(2023-1-3_9-20-35)/"directory
Format "frp" partition... OK
Writting FRP data... OK
Erase FRP done!
 

GsmToto

Super Moderator
Jan 1, 2021
3,695
18,642
UK
Skype
gsmtoto
Sonork ID
100.1684601
Selected model: Xiaomi
Operation: Read Flash Info
Software version: 4.3

Connect phone in BROM Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V13,usb2ser.sys,3]
Device found at COM4 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 1066
Get sec config... OK [000000E7]
Active sec flags: [SBC SLA DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
LibUSB installed
Detect chip [MT6781]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Advanced Bypass Security... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V13,usb2ser.sys,3]
Device found at COM4 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 1066
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
LibUSB installed
Detect chip [MT6781]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0xC914633A, 0x84EB6FA3, 0xC45446E0, 0x7ED18177
Get Chip ID... [MT6781]
Get SOC ID... [D2B2DAE240E1C533107CB1C8A8A39B2237AD42A0BB3D5DBC88 EC30531CAC2331]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [11]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
UFS CID (FW VER): KM8L9001JM-B639 (0300)
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
UFS INFO:
UFS_CID : KM8L9001JM-B639
UFS_FWVER : 0300
BLOCK_SIZE: 0x0000001000 (4.00Kb)
UFS_LU0 : 0x0000400000 (4.00Mb)
UFS_LU1 : 0x0000400000 (4.00Mb)
UFS_LU2 : 0x1DCB000000 (119.17Gb)
RAM INFO:
INT_SRAM: 0x0000060000 (384.00Kb)
EXT_RAM : 0x0200000000 (8.00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK [A]
Read product info... OK
Product Brand : Redmi
Product Manufacturer : Xiaomi
Product Model : viva
Product Name : viva_global
Product Device : viva
Product Board : viva
Board Platform : MT6781
Build ID : RP1A.200720.011
Build Date : Mon May 9 21:02:17 CST 2022
Display ID : CUST_viva
Security Patch : 2022-05-01
Version SDK : 30
Version Release : 12
Version Codename : REL
Firmware Version : V13.0.9.0.RGDMIXM
Read Flash Info done!
 

GsmToto

Super Moderator
Jan 1, 2021
3,695
18,642
UK
Skype
gsmtoto
Sonork ID
100.1684601
vivo y12 pattern unlock by test point done
Selected model: Vivo PD1901BF (Vivo Y12)
Operation: Erase FRP And Wipe
Software version: 4.10
Erasing of partitions can damage your device.
Make sure that you have a backup created. Continue? YES
Work ID: 18****
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek PreLoader USB VCOM_V1633 (Android),usb2ser.sys,3.0.1504.0]
Device found at COM8 [PRELOADER]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get sec config... OK [00000005]
Active sec flags: [SBC DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Force switch to BROM... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1633,usb2ser.sys,3.0.1504.0]
Device found at COM3 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
LibUSB installed
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Release testpoint, waiting 2 seconds
Advanced Bypass Security... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1633,usb2ser.sys,3.0.1504.0]
Device found at COM3 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
LibUSB installed
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x9E4877A1, 0x58A1FD56, 0x23E9AB00, 0x81715D20
Get Chip ID... [MT6765]
Get SOC ID... [22F5CCAB3F8D0F4AC35ADEED5B2AE46AAD92E7D9C054E0E43C 426832641A2E1D]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [7]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x90014A68433861503E0322B44449B6D1
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_CNAME: hC8aP>
EMMC_ID : 0x90014A68433861503E0322B44449B6D1
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0001000000 (16.00Mb)
EMMC_USER : 0x0E8F800000 (58.24Gb)
RAM INFO:
INT_SRAM: 0x000003A000 (232.00Kb)
EXT_RAM : 0x00C0000000 (3.00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... [EXT4] ... OK
Product Brand : vivo
Product Manufacturer : vivo
Product Model : vivo 1901
Product Name : 1901
Product Device : 1901
Product Board : k62v1_64_bsp
Board Platform : MTK6765
Build ID : RP1A.200720.012
Build Date : Mon Mar 6 18:32:38 CST 2023
Display ID : Funtouch OS_9
Security Patch : 2022-05-01
Version SDK : 30
Version Release : 11
Version Codename : REL
Firmware Version : 6.72.30
Read partitions info from phone... OK
Read partition "frp"... OK
Backup saved to C:/Program%20Files%20(x86)/Z3X/Pandora/Backup/MTK/Vivo_PD1901BF%20(Vivo%20Y12)/FRP_BACKUP_(2023-4-24_22-6-37)/"directory
Writting FRP data... OK
Read partitions info from phone... OK
Formatting "userdata" partition... OK
Formatting "cache" partition... OK
Formatting "metadata" partition... OK
Creating default filesystems... OK
Wipe data done!




Selected model: Vivo PD1901BF (Vivo Y12)
Operation: Repair
Software version: 4.10
Work ID: 18******

Connect phone in BROM/PRELOADER Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek PreLoader USB VCOM_V1633 (Android),usb2ser.sys,3.0.1504.0]
Device found at COM8 [PRELOADER]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get sec config... OK [00000005]
Active sec flags: [SBC DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Force switch to BROM... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1633,usb2ser.sys,3.0.1504.0]
Device found at COM3 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
LibUSB installed
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Release testpoint, waiting 2 seconds
Advanced Bypass Security... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1633,usb2ser.sys,3.0.1504.0]
Device found at COM3 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
LibUSB installed
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x9E4877A1, 0x58A1FD56, 0x23E9AB00, 0x81715D20
Get Chip ID... [MT6765]
Get SOC ID... [22F5CCAB3F8D0F4AC35ADEED5B2AE46AAD92E7D9C054E0E43C 426832641A2E1D]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [7]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x90014A68433861503E0322B44449B6D1
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_CNAME: hC8aP>
EMMC_ID : 0x90014A68433861503E0322B44449B6D1
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0001000000 (16.00Mb)
EMMC_USER : 0x0E8F800000 (58.24Gb)
RAM INFO:
INT_SRAM: 0x000003A000 (232.00Kb)
EXT_RAM : 0x00C0000000 (3.00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... [EXT4] ... OK
Product Brand : vivo
Product Manufacturer : vivo
Product Model : vivo 1901
Product Name : 1901
Product Device : 1901
Product Board : k62v1_64_bsp
Board Platform : MTK6765
Build ID : RP1A.200720.012
Build Date : Mon Mar 6 18:32:38 CST 2023
Display ID : Funtouch OS_9
Security Patch : 2022-05-01
Version SDK : 30
Version Release : 11
Version Codename : REL
Firmware Version : 6.72.30
Reading security from phone... OK
IMEI 1: 869xxxxxxxxxxxxx
IMEI 2: 869xxxxxxxxxxxxx
Set new IMEI to:
IMEI 1: 866xxxxxxxxxxx
IMEI 2: 866xxxxxxxxxxx
Searching security key... found! [1]
Writing security to phone... OK
Repair Security done!
 

GsmToto

Super Moderator
Jan 1, 2021
3,695
18,642
UK
Skype
gsmtoto
Sonork ID
100.1684601
cph2471 a17k frp remove by selecting A55

Selected model: OPPO CPH2325 (OPPO A55)
Operation: Erase FRP
Software version: 5.0

Host Power Off... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Host Power On... OK
Connect phone to [BOX] in BROM/PRELOADER Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek PreLoader USB VCOM_V1632 (Android),usb2ser.sys,3.0.1504.0]
Device found at COM17 [PRELOADER]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get sec config... OK [00000005]
Active sec flags: [SBC DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Force switch to BROM... OK
Host Power Off... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Waiting for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0766
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Release testpoint
Advanced Bypass Security... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1632,usb2ser.sys,3.0.1504.0]
Device found at COM15 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x297BC620, 0x25AAEBDE, 0x1C69CA00, 0x62E8C5E7
Get Chip ID... [MT6765]
Get SOC ID... [C4C2F1BF3CC569A21C871649E57EEA0811B4714E47CAC6754D F44BAA7D9718E3]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [7]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x9B01005932503036340063552DFCB927
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_CNAME: Y2P064
EMMC_ID : 0x9B01005932503036340063552DFCB927
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0001000000 (16.00Mb)
EMMC_USER : 0x0E8F800000 (58.24Gb)
RAM INFO:
INT_SRAM: 0x000003A000 (232.00Kb)
EXT_RAM : 0x00C0000000 (3.00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK [A]
Read product info... [EROFS] ... OK
Product Brand : oplus
Product Manufacturer : oplus
Product Model : ossi
Product Name : ossi
Product Device : ossi
Product Board : k65v1_64_bsp
Board Platform : connac1x
Build ID : SP1A.210812.016
Build Date : Tue Nov 29 17:42:02 CST 2022
Display ID : SP1A.210812.016 release-keys
Security Patch : 2022-11-05
Version SDK : 31
Version Release : 12
Version Codename : REL
Firmware Version : 1669714922467
Userdata FS Type : F2FS
Read partitions info from phone... OK
Read partition "frp"... OK
Backup saved to C:/Program%20Files%20(x86)/Z3X/Pandora/Backup/MTK/OPPO_CPH2325%20(OPPO%20A55)/FRP_BACKUP_(2023-5-11_19-6-26)/"directory
Writting FRP data... OK
Erase FRP done!
 
Top