Z3X Pandora 6.4 & 6.5 Exlusive Update Released.

Z3X Team

GsmToto

Super Moderator
Jan 1, 2021
3,728
19,001
UK
Skype
gsmtoto
Sonork ID
100.1684601
Selected model: Motorola XT2345-4 (Motorola Moto E13)
Operation: Repair
Software version: 6.5
Work ID: 24987311

Connect phone in BROM mode. Use volume key buttons or testpoint.
Waiting for device... OK
Device found at COM7
Port: USB\VID_1782&PID_4D00\5&390FD7C2&0&4
Driver: [UNISOC Communications Inc.,sprdvcom,SPRD U2S Diag,sprdvcom.sys,4.19.38.134]
Port type: BROM
Connecting to device... OK
Selected processor: Tiger_T606_64
Load files... (MOTOROLA/XT2155-5) OK
Connect preloader 1... OK
Connect preloader 2... OK
Connect loader 1... OK
Connect loader 2... OK
Serial Number: ZY22GZTJCV
Flash Type: EMMC
Read partitions info... OK
Checking A/B state... OK
Read product info... [EROFS] ... OK
Product Brand : motorola
Product Manufacturer : motorola
Product Model : SabahLite
Product Name : m170
Product Device : m170
Board Platform : ums9230
Build ID : TLAS33.105-257-6
Build Date : Tue Jan 16 16:26:50 CST 2024
Display ID : TLAS33.105-257-6
Security Patch : 2024-01-05
Version SDK : 33
Version Release : 13
Version Codename : REL
Firmware Version : 105-257-6
Userdata FS Type : F2FS
Load NVD... OK
Read IMEI... OK
Current IMEI:
IMEI 1: 3233635
IMEI 2: 0316620
Repaired IMEI:
IMEI 1: 353129
Check security state... OK [3]
Unlock bootloader... OK
Patch modem check...
Patch cert... OK
Write IMEI... OK
Save NVD... OK
Done!
If your phone after this operation keeps rebooting - use wipe data optio
 
  • Like
Reactions: SPYROS

GsmToto

Super Moderator
Jan 1, 2021
3,728
19,001
UK
Skype
gsmtoto
Sonork ID
100.1684601
Selected model: Motorola XT2345-4 (Motorola Moto E13)
Operation: Repair
Software version: 6.5
Work ID: 29519011

Connect phone in BROM mode. Use volume key buttons or testpoint.
Waiting for device... OK
Device found at COM3
Port: USB\VID_1782&PID_4D00\5&390FD7C2&0&4
Driver: [UNISOC Communications Inc.,sprdvcom,SPRD U2S Diag,sprdvcom.sys,4.19.38.134]
Port type: BROM
Connecting to device... OK
Selected processor: Tiger_T606_64
Load files... (MOTOROLA/XT2155-5) OK
Connect preloader 1... OK
Connect preloader 2... OK
Connect loader 1... OK
Connect loader 2... OK
Serial Number: ZY22GZTJCV
Flash Type: EMMC
Read partitions info... OK
Checking A/B state... OK
Read product info... [EROFS] ... OK
Product Brand : motorola
Product Manufacturer : motorola
Product Model : SabahLite
Product Name : m170
Product Device : m170
Board Platform : ums9230
Build ID : TLAS33.105-257-6
Build Date : Tue Jan 16 16:26:50 CST 2024
Display ID : TLAS33.105-257-6
Security Patch : 2024-01-05
Version SDK : 33
Version Release : 13
Version Codename : REL
Firmware Version : 105-257-6
Userdata FS Type : F2FS
Load NVD... OK
Read IMEI... OK
Current IMEI:
IMEI 1: 3233635
IMEI 2: 0316620
Repaired IMEI:
IMEI 1: 353129
Check security state... OK [3]
Unlock bootloader... OK
Patch modem check...
Patch cert... OK
Write IMEI... OK
Save NVD... OK
Done!
If your phone after this operation keeps rebooting - use wipe data option.
 
  • Like
Reactions: SPYROS

GsmToto

Super Moderator
Jan 1, 2021
3,728
19,001
UK
Skype
gsmtoto
Sonork ID
100.1684601
Selected model: TCL Mediatek
Operation: Repair
Software version: 6.5
Work ID: 29347211

Connect phone in BROM Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM8 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0717
Get sec config... OK [000000E7]
Active sec flags: [SBC SLA DAA]
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0200, HW SUB CODE: 8A00
Detect chip [MT6761]
LibUSB installed
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Release testpoint, waiting 2 seconds
Advanced Bypass Security... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM8 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0717
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0200, HW SUB CODE: 8A00
Detect chip [MT6761]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x7BC998B2, 0x579CD1A8, 0xAC324F5E, 0xD293D717
Get Chip ID... [MT6761]
Get SOC ID... [CC2A03FC6DAF8A4500F3F75C63EAB43C37A2A75D242C99217A 5F9D68DBDA05E7]
Get sec config... OK [000000E0]
Get hw mode... OK
Load DownloadAgent... OK
Search DA... OK [5]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0xF4012241524A313158103BB40EEBB971
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_CNAME: ARJ11X
EMMC_ID : 0xF4012241524A313158103BB40EEBB971
EMMC_BOOT1: 0x0000400000 (4,00Mb)
EMMC_BOOT2: 0x0000400000 (4,00Mb)
EMMC_RPMB : 0x0000400000 (4,00Mb)
EMMC_USER : 0x0748000000 (29,13Gb)
RAM INFO:
INT_SRAM: 0x000003A500 (233,25Kb)
EXT_RAM : 0x0080000000 (2,00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... [EXT4] ... OK
Product Brand : TCL
Product Manufacturer : TCL
Product Model : T431A
Product Name : T431A
Product Device : Rio
Product Board : MT6761
Board Platform : mt6761
Build ID : SP1A.210812.016
Build Date : Wed Mar 29 17:24:25 CST 2023
Display ID : SP1A.210812.016 release-keys
Security Patch : 2023-02-01
Version SDK : 31
Version Release : 12
Version Codename : REL
Firmware Version : KW2Y
Read security partition from phone...
Decrypting security data... OK
Encrypt security data... OK
Read OTP... OK
IMEI: 35790xxxxxxxxxxx
Set new IMEI to:
IMEI: 3595xxxxxxxxxxxx
Checking OTP status... [STATUS_OTP_UNLOCKED]
Write OTP... OK
Repair Security done!
 

GsmToto

Super Moderator
Jan 1, 2021
3,728
19,001
UK
Skype
gsmtoto
Sonork ID
100.1684601
Selected model: Mediatek Mediatek
Operation: Eliminar FRP
Software version: 6.5
Work ID: 29382611

Connect phone in BROM Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1512.0]
You are using driver version 3.0.1512.0, we recommend using version 3.0.1504.0 for proper operation. You can install the correct driver from the program directory.
Device found at COM7 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
LibUSB installed
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Release testpoint, waiting 2 seconds
Advanced Bypass Security... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1512.0]
You are using driver version 3.0.1512.0, we recommend using version 3.0.1504.0 for proper operation. You can install the correct driver from the program directory.
Device found at COM7 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0xF334C089, 0xA367C781, 0x1929098C, 0x7E077AE2
Get Chip ID... [MT6765]
Get SOC ID... [3287FCCB168C1B6C4AEEFB3163D6CCC87BDAD5FA967FCB2545 C0222BADE15A8A]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [7]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x7001005832393132388A1FEE7C5B2973
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_CNAME: X29128
EMMC_ID : 0x7001005832393132388A1FEE7C5B2973
EMMC_BOOT1: 0x0000400000 (4,00Mb)
EMMC_BOOT2: 0x0000400000 (4,00Mb)
EMMC_RPMB : 0x0000400000 (4,00Mb)
EMMC_USER : 0x1D25000000 (116,58Gb)
RAM INFO:
INT_SRAM: 0x000003A000 (232,00Kb)
EXT_RAM : 0x0100000000 (4,00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... [EXT4] ... OK
Product Brand : motorola
Product Manufacturer : motorola
Product Model : moto g22
Product Name : hawaiip_g
Product Device : hawaiip
Product Board : p410ae
Board Platform : mt6765
Build ID : STAS32.79-77-28-50-9
Build Date : Wed Dec 13 18:56:09 CST 2023
Display ID : STAS32.79-77-28-50-9
Security Patch : 2023-12-05
Version SDK : 31
Version Release : 12
Version Codename : REL
Firmware Version : 77-28-50-9
Read partition "frp"... OK
Backup saved to C:/Program%20Files%20(x86)/Z3X/Pandora/Backup/MTK/Mediatek_MT6765/FRP_BACKUP_(2024-3-16_18-33-13)/
Writting FRP data... OK
Erase FRP done!
 

GsmToto

Super Moderator
Jan 1, 2021
3,728
19,001
UK
Skype
gsmtoto
Sonork ID
100.1684601
Selected model: OPPO CPH2249 (OPPO Reno6 Pro 5G)
Operation: Repair
Software version: 6.5

Connect Type-C to NONE... OK
Host Power Off... OK
Connect phone to [PC] in BROM Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1632,usb2ser.sys,3.0.1504.0]
Device found at COM4 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0950
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6893]
Install LibUSB... OK
Waiting for device... OK
Open port... OK
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Release testpoint, waiting 2 seconds
Advanced Bypass Security... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1632,usb2ser.sys,3.0.1504.0]
Device found at COM68 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0950
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6893]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x626E3A15, 0x47010FC6, 0x9FCDC328, 0x9536350C
Get Chip ID... [MT6893]
Get SOC ID... [7613EFE7443A0AC5D00FA07E3721BEE0C2BE8C565C9C0F8B7B ACD51F12163A5E]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [19]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
UFS CID (FW VER): KLUEG8UHDC-B0E1 (0600)
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
UFS INFO:
UFS_CID : KLUEG8UHDC-B0E1
UFS_FWVER : 0600
BLOCK_SIZE: 0x0000001000 (4.00Kb)
UFS_LU0 : 0x0000400000 (4.00Mb)
UFS_LU1 : 0x0000400000 (4.00Mb)
UFS_LU2 : 0x3B96000000 (238.34Gb)
RAM INFO:
INT_SRAM: 0x0000070000 (448.00Kb)
EXT_RAM : 0x0100000000 (4.00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... [EXT4] ... OK
Product Brand : alps
Product Manufacturer : alps
Product Model : DN2101
Product Name : vnd_oplus6893
Product Device : oplus6893
Product Board : oplus6893
Board Platform : mt6893
Build ID : RP1A.200720.011
Build Date : Wed Jun 30 13:17:35 CST 2021
Display ID : DN2101_11_A.01
Security Patch : 2021-06-05
Version SDK : 30
Version Release : 11
Version Codename : REL
Firmware Version : 1624757731858
Read security partition from phone...
Decrypting security data... error
Wrong key, unable to unlock bootloader!
 

aliipi

Friend's Martview
Oct 28, 2019
122
33
method -1 -2 -3 all fail


Selected model: Infinix X6515 (Infinix X6515)
Operation: Erase FRP
Software version: 6.5

Connect Type-C to NONE... OK
Host Power Off... OK
Connect phone to [PC] in PRELOADER Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek PreLoader USB VCOM (Android),usb2ser.sys,3.0.1511.0]
You are using driver version 3.0.1511.0, we recommend using version 3.0.1504.0 for proper operation. You can install the correct driver from the program directory.
Device found at COM32 [PRELOADER]
Open port... OK
Send start cmd... OK
Get HW code from device... 0717
Get sec config... OK [00000005]
Active sec flags: [SBC DAA]
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0200, HW SUB CODE: 8A00
Detect chip [MT6761]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Preloader exist. Skip connection verification.
Get ME ID... OK
ME_ID = 0xEB6EA9CD, 0x8BEF875B, 0xD86920D5, 0x6357ECA1
Load DownloadAgent... OK
Search DA... OK [1]
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... error(STATUS_SEC_INVALID_DA_VER)
 
  • Like
Reactions: GsmToto

Gsmnsd99

Member
Nov 19, 2016
9
1
dhaka
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
UFS CID (FW VER): H9HQ15AECMBDAR (A043)
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
UFS INFO:
UFS_CID : H9HQ15AECMBDAR
UFS_FWVER : A043
BLOCK_SIZE: 0x0000001000 (4.00Kb)
UFS_LU0 : 0x0000400000 (4.00Mb)
UFS_LU1 : 0x0000400000 (4.00Mb)
UFS_LU2 : 0x1DCB000000 (119.17Gb)
RAM INFO:
INT_SRAM: 0x0000070000 (448.00Kb)
EXT_RAM : 0x0100000000 (4.00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK [A]
Read product info... [EXT4] ... OK
Product Brand : Redmi
Product Manufacturer : Xiaomi
Product Model : opal
Product Name : opal_global
Product Device : opal
Product Board : opal
Board Platform : mt6833
Build ID : RP1A.200720.011
Build Date : Tue Jun 28 00:21:53 CST 2022
Display ID : CUST_opal
Security Patch : 2022-06-01
Version SDK : 30
Version Release : 11
Version Codename : REL
Firmware Version : V13.0.6.0.RGLMIXM
Read security partition from phone...
Decrypting security data... OK
Encrypt security data... OK
Read partition "nvdata"... OK
Read partition "protect1"... OK
Read partition "nvram"... OK
Read NVDATA files... OK
Read NVRAM files... OK
Read security files... OK
Calculating... OK
Read IMEI... OK
IMEI 1: 0
IMEI 2: 0
Repairing IMEI...
IMEI 1: 867564535231713
IMEI 2: 867564535231705
Write IMEI and patch CERT [NVDATA]... OK
Load partiton for patching... OK
Checking boot unlock status... LOCKED
You need to perform the official bootloader unlocking procedure.



Selected model: Xiaomi Redmi Note 11S 5G (Opal)
Operation: Repair
Software version: 6.5
Work ID: 22596244
 
  • Like
Reactions: GsmToto
Top