Z3X Pandora PRO 6.8 Update

Z3X Team

GsmToto

Super Moderator
Jan 1, 2021
3,748
19,025
UK
Skype
gsmtoto
Sonork ID
100.1684601
Selected model: Xiaomi Redmi Note 11 Pro 4G (Viva)
Operation: Repair
Software version: 6.8

Connect Type-C to NONE... OK
Host Power Off... OK
Connect phone to [PC] in BROM/PRELOADER Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V2023,usb2ser_mtk.sys,3.0.1512.0]
You are using driver version 3.0.1512.0, we recommend using version 3.0.1504.0 for proper operation. You can install the correct driver from the program directory.
Device found at COM4 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 1066
Get sec config... OK [000000E7]
Active sec flags: [SBC SLA DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6781]
LibUSB installed
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Release testpoint, waiting 2 seconds
Advanced Bypass Security... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V2023,usb2ser_mtk.sys,3.0.1512.0]
You are using driver version 3.0.1512.0, we recommend using version 3.0.1504.0 for proper operation. You can install the correct driver from the program directory.
Device found at COM7 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 1066
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6781]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x78768D27, 0xE8CEF360, 0xEA01C712, 0x420B2CBF
Get Chip ID... [MT6781]
Get SOC ID... [E5C2F53DAA8CA6D50B675FE1DC5E3B59734F240B4503097D8E 96F8C9FED19662]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [11]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
UFS CID (FW VER): KM8L9001JM-B624 (0300)
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
UFS INFO:
UFS_CID : KM8L9001JM-B624
UFS_FWVER : 0300
BLOCK_SIZE: 0x0000001000 (4.00Kb)
UFS_LU0 : 0x0000400000 (4.00Mb)
UFS_LU1 : 0x0000400000 (4.00Mb)
UFS_LU2 : 0x1DCB000000 (119.17Gb)
RAM INFO:
INT_SRAM: 0x0000060000 (384.00Kb)
EXT_RAM : 0x0200000000 (8.00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK [A]
Read product info... [EXT4] ... OK
Product Brand : Redmi
Product Manufacturer : Xiaomi
Product Model : viva
Product Name : viva_global
Product Device : viva
Product Board : viva
Board Platform : mt6781
Build ID : SP1A.210812.016
Build Date : Fri Mar 1 08:58:06 UTC 2024
Display ID : TP1A.220624.014
Security Patch : 2024-02-01
Version SDK : 33
Version Release : 13
Version Codename : REL
Firmware Version : V816.0.3.0.TGDMIXM
Read security partition from phone...
Decrypting security data... OK
Encrypt security data... OK
Read partition "nvdata"... OK
Read partition "protect1"... OK
Read partition "nvram"... OK
Read NVDATA files... OK
Read NVRAM files... OK
Read security files... OK
Calculating... OK
Read IMEI... OK
IMEI 1: 86XXXXXXXXXXXXXXXX
IMEI 2: 86XXXXXXXXXXXXXXXX
Repairing IMEI...
IMEI 1: 350000XXXXXXXX
IMEI 2: 3500XXXXXXXXXX
Write IMEI and patch CERT [NVDATA]... OK
Load partiton for patching... OK
Patching... OK
Selected "Auto unlock bootloader"
Read security partition from phone... OK
Write security partition to phone... OK
Unlock bootloader done!
Selected "Disable VBMETA verification"
Read security partition from phone... OK
Write security partition to phone... OK
Write IMEI and patch CERT [NVRAM]... OK
Write partition "nvdata"... OK
Write partition "nvram"... OK
Repair Security and Patch cert done!
If your phone after repair keeps rebooting - use wipe data option.
 
  • Like
Reactions: tsui_thomas
Mar 8, 2020
13
4
pakistan


Pandora PRO 6.8 Update. Lot of new devices added.

Added support Bmobile devices:

- AX620, AX650, AX660, AX670, AX675, AX680, AX680+, AX681, AX683, AX685, AX690, AX700,
- AX705, AX710, AX745, AX750, AX751, AX753, AX754, AX800, AX810, AX822, AX823, AX826,
- AX830, AX905, AX921, AX922, AX925, AX926, AX950, AX951, AX959, AX960, AX1010, AX1020,
- AX1030, AX1035, AX1040, AX1045, AX1045E, AX1050, AX1055, AX1060, AX687, AX688, AX688+,
- AX715, AX751+, AX824, AX824 Lite, AX824A, AX824+, AX1100, BL55, BM65 Plus, AX1080,
- AX1085, AX1092, AX1095, B55, B55 Ultra, B60 Pro, B63 Pro, Bella, BL52T, BL60, BL60 Pro,
- N20266, X10


Added support Dexp phones:

- Ursus M170, Ursus N180i, Ursus N210, Ursus N280i, Ursus N310, Ursus N380i, Ursus N410,
- Ursus N570, Ursus N370, Ursus N470


Added support Mobicel phones:

- Zen, Zoom, Zoom H, Vivo Dual Sim, Vivo Single Sim, Venus Go, V1, V2, Rush, RX17, Sapphire,
- Samba, Scarlet, Shift, Smart Gem, Solo P9122, Solo Tab P9120, Sonic V20, Switch, Switch Go,
- Tango, Epic Pro 2, Epic Pro LTE


Added support Doogee phones:

- DK10, Flip X, R10, R20, S100, S100 Pro, S110, S mini, T20 Ultra, T30 Max, T30 Pro,
- T30 Ultra, V Max, V20 Pro, V20 Pro Ultra, V20S, V30, V30 Pro, V30T, V31GT, PT1, N50S,
- S98, S98 Pro, S99, T30S


Added support myPhone phones:

- myA1 Plus, myA17, myG1, myP1, myWX1 Lite, myXI1, myWX1 Plus, myWX2, myXI1 Plus, myXI1 Pro,
- myWX2 Pro, Pocket Pro


Added support BLU phones:

- C6L Max, Dash 4.5 2016, Dash 4.5 2016, G73, G53, G63, G33, J10L

Added support: Realme C51s


Fixed:

- Spreadtrum Nokia repair
- downgrading bootloaders for Xiaomi
- regional unlock Realme
- patch cert error Realme (error(2.ERR_SF_4))
- 'EXT4 REMAP SUPER FAIL' while reading info
- creating default fs
- some bugs



Mega: 180.85 MB file on MEGA
add update with new preloader new secuirty patch frp
 

GsmToto

Super Moderator
Jan 1, 2021
3,748
19,025
UK
Skype
gsmtoto
Sonork ID
100.1684601
Selected model: Vivo V2072A (Vivo S9 5G)
Operation: Read PTT
Software version: 6.8
Work ID: 266433422

Connect phone in PRELOADER Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek PreLoader USB VCOM_V1633 (Android),usb2ser.sys,3.0.1504.0]
Device found at COM2 [PRELOADER]
Open port... OK
Send start cmd... OK
Get HW code from device... 0950
Get sec config... OK [00000005]
Active sec flags: [SBC DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6893]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Preloader exist. Skip connection verification.
Get ME ID... OK
ME_ID = 0x191666DD, 0xB7F7252D, 0x48FB5B2C, 0x4B7F5A56
Load DownloadAgent... OK
Search DA... OK [12]
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... error(STATUS_SEC_INVALID_DA_VER)
 
  • Like
Reactions: tsui_thomas

mdarfin

Member
Apr 24, 2022
8
3
Bangladesh


Pandora PRO 6.8 Update. Lot of new devices added.

Added support Bmobile devices:

- AX620, AX650, AX660, AX670, AX675, AX680, AX680+, AX681, AX683, AX685, AX690, AX700,
- AX705, AX710, AX745, AX750, AX751, AX753, AX754, AX800, AX810, AX822, AX823, AX826,
- AX830, AX905, AX921, AX922, AX925, AX926, AX950, AX951, AX959, AX960, AX1010, AX1020,
- AX1030, AX1035, AX1040, AX1045, AX1045E, AX1050, AX1055, AX1060, AX687, AX688, AX688+,
- AX715, AX751+, AX824, AX824 Lite, AX824A, AX824+, AX1100, BL55, BM65 Plus, AX1080,
- AX1085, AX1092, AX1095, B55, B55 Ultra, B60 Pro, B63 Pro, Bella, BL52T, BL60, BL60 Pro,
- N20266, X10


Added support Dexp phones:

- Ursus M170, Ursus N180i, Ursus N210, Ursus N280i, Ursus N310, Ursus N380i, Ursus N410,
- Ursus N570, Ursus N370, Ursus N470


Added support Mobicel phones:

- Zen, Zoom, Zoom H, Vivo Dual Sim, Vivo Single Sim, Venus Go, V1, V2, Rush, RX17, Sapphire,
- Samba, Scarlet, Shift, Smart Gem, Solo P9122, Solo Tab P9120, Sonic V20, Switch, Switch Go,
- Tango, Epic Pro 2, Epic Pro LTE


Added support Doogee phones:

- DK10, Flip X, R10, R20, S100, S100 Pro, S110, S mini, T20 Ultra, T30 Max, T30 Pro,
- T30 Ultra, V Max, V20 Pro, V20 Pro Ultra, V20S, V30, V30 Pro, V30T, V31GT, PT1, N50S,
- S98, S98 Pro, S99, T30S


Added support myPhone phones:

- myA1 Plus, myA17, myG1, myP1, myWX1 Lite, myXI1, myWX1 Plus, myWX2, myXI1 Plus, myXI1 Pro,
- myWX2 Pro, Pocket Pro


Added support BLU phones:

- C6L Max, Dash 4.5 2016, Dash 4.5 2016, G73, G53, G63, G33, J10L

Added support: Realme C51s


Fixed:

- Spreadtrum Nokia repair
- downgrading bootloaders for Xiaomi
- regional unlock Realme
- patch cert error Realme (error(2.ERR_SF_4))
- 'EXT4 REMAP SUPER FAIL' while reading info
- creating default fs
- some bugs



Mega: 180.85 MB file on MEGA
oppo a78 imei repair faild

Selected model: OPPO CPH2495 (Oppo A78 5G)
Operation: Repair
Software version: 6.8
Work ID: 26405112

Connect phone in PRELOADER Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek PreLoader USB VCOM_V1632 (Android),usb2ser.sys,3.0.1504.0]
Device found at COM6 [PRELOADER]
Open port... OK
Send start cmd... OK
Get HW code from device... 0989
Get sec config... OK [00000005]
Active sec flags: [SBC DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6833]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Preloader exist. Skip connection verification.
Get ME ID... OK
ME_ID = 0x6EC21320, 0x05A0E517, 0x0224E026, 0xF1D0523C
Load DownloadAgent... OK
Search DA... OK [0]
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [PRELOADER]
Preloader alive. Skip initializing external RAM
Get device info... OK
UFS CID (FW VER): MT128GAXAU2U22 (0107)
Send preloader... OK
Load DownloadAgent... OK
Search DA... OK [14]
Send 2nd DA... OK
Get device info... OK
UFS INFO:
UFS_CID : MT128GAXAU2U22
UFS_FWVER : 0107
BLOCK_SIZE: 0x0000001000 (4.00Kb)
UFS_LU0 : 0x0000400000 (4.00Mb)
UFS_LU1 : 0x0000400000 (4.00Mb)
UFS_LU2 : 0x1DCB000000 (119.17Gb)
RAM INFO:
INT_SRAM: 0x0000070000 (448.00Kb)
EXT_RAM : 0x0100000000 (4.00Gb)
Checking USB status... USB_HIGH_SPEED
[EFUSE INFO]: BROM not disabled
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... [EROFS] ... OK
Product Brand : OPPO
Product Manufacturer : OPPO
Product Model : CPH2495
Product Name : CPH2495
Product Device : OP52F3L1
Product Board : k6833v1_64_k419
Board Platform : mt6833
Build ID : UP1A.230620.001
Build Date : Wed Mar 13 15:30:26 CST 2024
Display ID : CPH2495_14.0.0.500(EX01)
Security Patch : 2024-03-05
Version SDK : 34
Version Release : 14
Version Codename : REL
Firmware Version : T.R4T2.16f7998_1
Read security partition from phone...
Decrypting security data... OK
Encrypt security data... OK
Read partition "nvdata"... OK
Read partition "protect1"... OK
Read partition "nvram"... OK
Read NVDATA files... OK
Read NVRAM files... OK
Read security files... OK
Calculating... OK
Repairing IMEI...
IMEI 1: 008864646464165
IMEI 2: 008856464646444
Write IMEI and patch CERT [NVDATA]... OK
 

mdarfin

Member
Apr 24, 2022
8
3
Bangladesh
Selected model: OPPO CPH2495 (Oppo A78 5G)
Operation: Repair
Software version: 6.8
Work ID: 26405112

Connect phone in PRELOADER Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek PreLoader USB VCOM_V1632 (Android),usb2ser.sys,3.0.1504.0]
Device found at COM6 [PRELOADER]
Open port... OK
Send start cmd... OK
Get HW code from device... 0989
Get sec config... OK [00000005]
Active sec flags: [SBC DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6833]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Preloader exist. Skip connection verification.
Get ME ID... OK
ME_ID = 0x6EC21320, 0x05A0E517, 0x0224E026, 0xF1D0523C
Load DownloadAgent... OK
Search DA... OK [0]
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [PRELOADER]
Preloader alive. Skip initializing external RAM
Get device info... OK
UFS CID (FW VER): MT128GAXAU2U22 (0107)
Send preloader... OK
Load DownloadAgent... OK
Search DA... OK [14]
Send 2nd DA... OK
Get device info... OK
UFS INFO:
UFS_CID : MT128GAXAU2U22
UFS_FWVER : 0107
BLOCK_SIZE: 0x0000001000 (4.00Kb)
UFS_LU0 : 0x0000400000 (4.00Mb)
UFS_LU1 : 0x0000400000 (4.00Mb)
UFS_LU2 : 0x1DCB000000 (119.17Gb)
RAM INFO:
INT_SRAM: 0x0000070000 (448.00Kb)
EXT_RAM : 0x0100000000 (4.00Gb)
Checking USB status... USB_HIGH_SPEED
[EFUSE INFO]: BROM not disabled
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... [EROFS] ... OK
Product Brand : OPPO
Product Manufacturer : OPPO
Product Model : CPH2495
Product Name : CPH2495
Product Device : OP52F3L1
Product Board : k6833v1_64_k419
Board Platform : mt6833
Build ID : UP1A.230620.001
Build Date : Wed Mar 13 15:30:26 CST 2024
Display ID : CPH2495_14.0.0.500(EX01)
Security Patch : 2024-03-05
Version SDK : 34
Version Release : 14
Version Codename : REL
Firmware Version : T.R4T2.16f7998_1
Read security partition from phone...
Decrypting security data... OK
Encrypt security data... OK
Read partition "nvdata"... OK
Read partition "protect1"... OK
Read partition "nvram"... OK
Read NVDATA files... OK
Read NVRAM files... OK
Read security files... OK
Calculating... OK
Repairing IMEI...
IMEI 1: 008864646464165
IMEI 2: 008856464646444
Write IMEI and patch CERT [NVDATA]... OK
Checking patch type... patch impossible
 

GsmToto

Super Moderator
Jan 1, 2021
3,748
19,025
UK
Skype
gsmtoto
Sonork ID
100.1684601
Selected model: Infinix X669 (Infinix Hot 30i NFC)
Operation: Erase FRP
Software version: 6.8

Host Power Off... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Host Power On... OK
Connect phone to [BOX or PC]
Connect phone in BROM mode. Use volume key buttons or testpoint.
Waiting for device... OK
Device found at COM30
Port: USB\VID_1782&PID_4D00\6&17B2F180&0&2
Driver: [UNISOC Communications Inc.,sprdvcom,SPRD U2S Diag,sprdvcom.sys,4.19.38.134]
Port type: BROM
Connecting to device... OK
Selected processor: INFINIX/Tiger_T606_64&X669
Load files... (INFINIX/X669) OK
Connect preloader 1... OK
Connect preloader 2... OK
Connect loader 1... OK
Connect loader 2... OK
Serial Number: 100473738B048354
Read partitions info... OK
Checking A/B state... OK [A]
Read product info... [EROFS] ... OK
Product Brand : Infinix
Product Manufacturer : INFINIX
Product Model : Infinix X669
Product Name : X669-GL
Product Device : Infinix-X669
Product Board : Infinix-X669
Board Platform : ums9230
Build ID : SP1A.210812.016
Build Date : Sun Feb 18 18:35:55 CST 2024
Display ID : X669-F065FGHIJK-S-GL-20240218V539
Security Patch : 2024-02-05
Version SDK : 31
Version Release : 12
Version Codename : REL
Firmware Version : GL-20240218V584
Userdata FS Type : F2FS
Backup partitions... OK
Formatting "persist" partition... OK
Done!
 
  • Like
Reactions: tsui_thomas

GsmToto

Super Moderator
Jan 1, 2021
3,748
19,025
UK
Skype
gsmtoto
Sonork ID
100.1684601
Selected model: Nokia TA-1533 (Nokia C22)
Operation: Wipe Data
Software version: 6.8
There is a risk of data loss.
This procedure will erase all User Data
Make sure that you have a backup created. Continue? YES
Work ID: 264534611

Connect phone in BROM mode. Use volume key buttons or testpoint.
Waiting for device... OK
Device found at COM3
Port: USB\VID_1782&PID_4D00\5&320A61ED&0&2
Driver: [UNISOC Communications Inc.,sprdvcom,SPRD U2S Diag,sprdvcom.sys,4.19.38.134]
Port type: BROM
Connecting to device... OK
Selected processor: SC9863A_64
Load files... (universal) OK
Connect preloader 1... OK
Connect preloader 2... OK
Connect loader 1... OK
Connect loader 2... error(22)
 
  • Like
Reactions: tsui_thomas

GsmToto

Super Moderator
Jan 1, 2021
3,748
19,025
UK
Skype
gsmtoto
Sonork ID
100.1684601
Selected model:OPPO A17
Operation: Unlock network
Software version: 6.8

Connect phone in BROM/PRELOADER Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek PreLoader USB VCOM_V1632 (Android),usb2ser.sys,3.0.1504.0]
Device found at COM3 [PRELOADER]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get sec config... OK [00000000]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Force switch to BROM... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1632,usb2ser.sys,3.0.1504.0]
Device found at COM3 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get sec config... OK [00000000]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0xFB7D0FAF, 0xBA89B476, 0x8F32C611, 0x090D0F0X
Get Chip ID... [MT6765]
Get SOC ID... [D7DF3A04065641CCA00706D19E1EF7BDA6110C1D6BCA4DE7CE D29AE226075A12]
Get sec config... OK [00000000]
Load DownloadAgent... OK
Search DA... OK [7]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0xD6010335384B373231691B2020B0C75D
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_CNAME: 58K721
EMMC_ID : 0xD6010335384B373231691B2020B0C75D
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0000400000 (4.00Mb)
EMMC_USER : 0x0E67800000 (57.62Gb)
RAM INFO:
INT_SRAM: 0x000003A000 (232.00Kb)
EXT_RAM : 0x0100000000 (4.00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK [A]
Read product info... [EXT4] ... OK
Product Brand : OPPO
Product Manufacturer : OPPO
Product Model : CPH2477
Product Name : CPH2477T3
Product Device : OP56F5
Product Board : k65v1_64_bsp
Board Platform : mt6765
Build ID : SP1A.210812.016
Build Date : Tue Sep 6 00:35:32 CST 2022
Display ID : CPH2477_11_A.15
Security Patch : 2022-08-05
Version SDK : 31
Version Release : 12
Version Codename : REL
Firmware Version : S.202209060246
Read security partition from phone... OK
Read security files... OK
Read NVDATA files... OK
Calculating... OK
Read lock info... OK
Read partition "nvdata"... OK
Read partition "protect1"... OK
Read security files... OK
Read NVDATA files... OK
Read IMEI... OK
Unlock... OK [DF1, DF2, GB1, GB2, SM, OPL]
Write lock info... OK
Write security partition to phone... OK
Network Unlock done!
 
  • Like
Reactions: tsui_thomas

ravimobileverma

Active Member
Sep 24, 2018
78
26
plz. fix tis problem
Selected model: Realme RMX1827 (Realme 3i)
Operation: Write OFP
Software version: 6.8

Extracting scatter file... OK
Parse scatter file... OK
Connect Type-C to NONE... OK
Host Power Off... OK
Connect phone to [PC] in BROM Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V2023,usb2ser_mtk.sys,3.0.1512.0]
You are using driver version 3.0.1512.0, we recommend using version 3.0.1504.0 for proper operation. You can install the correct driver from the program directory.
Device found at COM3 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0788
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6771]
LibUSB installed
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Release testpoint, waiting 2 seconds
Advanced Bypass Security... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V2023,usb2ser_mtk.sys,3.0.1512.0]
You are using driver version 3.0.1512.0, we recommend using version 3.0.1504.0 for proper operation. You can install the correct driver from the program directory.
Device found at COM3 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0788
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6771]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0xFAAEE95F, 0xD2CA122F, 0xBF7C7127, 0xF47D6C83
Get Chip ID... [MT6771]
Get SOC ID... [409CEBEF1560C4F8436D578B742B5B37E18BD7C952EEC8C8A03DB3C33F2E0E6E]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [9]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x150100474436424D4201564406A9B50F
Load EMI from phone... OK
Parse EMI config...
Exception: Access violation at address 75D058A7 in module KERNELBASE.dll. Read of address 31BFB929


othar tool by flashing done
 
  • Like
Reactions: GsmToto

GsmToto

Super Moderator
Jan 1, 2021
3,748
19,025
UK
Skype
gsmtoto
Sonork ID
100.1684601
Selected model: Samsung SM-A326U (Samsung Galaxy A32 5G)
Operation: Unlock network (Server)
Software version: 6.8

Checking Login and Password... OK
Balance: 20 crd.
You have 20 credit(s) left. This operation takes 5 credits. Continue? Yes
Searching Samsung modem... detected COM4
Reading phone info... OK
Model: SM-A326U
AP version: A326USQSADWE2
CSC version: A326UOYNADWE3
CP version: A326USQSADWE3
OS version: 13
Product code: XAA
Carrier ID: DSH
Phone SN: RFCR80XF04J
Unique number: CE062156712CC17E537S
IMEI: 350091126331565
IMEI Certi: PASS
Changing csc to XAA... OK
WARNING!!! DO NOT USE THIS METHOD if KG is Locked/Active or sec ctrl status(0). This will damage your phone. Continue? YES
Rebooting to download... OK
Searching USB Flash interface... COM3 detected
Setup connection... OK
Reading data from phone... OK
Sending data to phone... OK
Sending data to phone... OK
Searching USB Flash interface... COM3 detected
Setup connection... OK
Reading data from phone... OK
Sending data to phone... OK
Host Power Off... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Host Power On... OK
Connect phone to [BOX] in BROM/PRELOADER Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1511.0]
You are using driver version 3.0.1511.0, we recommend using version 3.0.1504.0 for proper operation. You can install the correct driver from the program directory.
Device found at COM4 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0996
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6853]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Force switch to BROM... OK
Host Power Off... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Waiting for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0996
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6853]
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Release testpoint
Advanced Bypass Security... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1511.0]
You are using driver version 3.0.1511.0, we recommend using version 3.0.1504.0 for proper operation. You can install the correct driver from the program directory.
Device found at COM4 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0996
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6853]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0xC8E7B3A4, 0xAF837CDB, 0x4BE55BF1, 0x467C5370
Get Chip ID... [MT6853]
Get SOC ID... [AC668DBCD407FA2C7EFC55B9988EBEC39988D747B04E217B46 37C0E0250DDE8B]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [15]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
UFS CID (FW VER): KM5P8001DM-B424 (0002)
Load EMI from phone... Skip (invalid magic flash header)
Load EMI config from database [DB VER: 222 DB DATE: 11-13-2023] OK [1]
Trying EMI [58C04EF5, 5B1D8E36, 9B425B1E, 9AED5305, 762A6CD6, 635C486B, D0CDE7D2, E064B692, F7581BCD, 9069B3B2]
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
UFS INFO:
UFS_CID : KM5P8001DM-B424
UFS_FWVER : 0002
BLOCK_SIZE: 0x0000001000 (4.00Kb)
UFS_LU0 : 0x0000400000 (4.00Mb)
UFS_LU1 : 0x0000400000 (4.00Mb)
UFS_LU2 : 0x0EE5800000 (59.59Gb)
RAM INFO:
INT_SRAM: 0x0000070000 (448.00Kb)
EXT_RAM : 0x0100000000 (4.00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... [EXT4] ... OK
Product Brand : samsung
Product Manufacturer : samsung
Product Model : SM-A326U
Product Name : a32xsq
Product Device : a32x
Product Board : a32x
Board Platform : mt6853
Build ID : SP1A.210812.016
Build Date : Thu May 25 01:17:59 KST 2023
Display ID : TP1A.220624.014.A326USQSADWE3
Security Patch : 2023-05-01
Version SDK : 33
Version Release : 13
Version Codename : REL
Firmware Version : A326USQSADWE3
Restoring partition table... OK
Read security partition from phone... OK
Read security files... OK
Calculating... OK
Read lock info... OK
Read NVDATA files... OK
Read IMEI... OK
Checking IMEI... OK
Searching server... OK
Waiting for server answer... OK
Unlocking ... [2] ... OK
Write lock info... OK
Write security partition to phone... OK
Network Unlock done!
 
  • Like
Reactions: tsui_thomas

GsmToto

Super Moderator
Jan 1, 2021
3,748
19,025
UK
Skype
gsmtoto
Sonork ID
100.1684601
Selected model: TCL T767W (TCL 30XE 5G)
Operation: Unlock network
Software version: 6.8

Connect Type-C to NONE... OK
Host Power Off... OK
Connect phone to [PC] in BROM Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1632,usb2ser.sys,3.0.1504.0]
Device found at COM3 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0989
Get sec config... OK [000000E7]
Active sec flags: [SBC SLA DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6833]
LibUSB installed
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Release testpoint, waiting 2 seconds
Advanced Bypass Security... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1632,usb2ser.sys,3.0.1504.0]
Device found at COM3 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0989
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6833]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0xC8356F0A, 0x943F88D8, 0xEC5F9985, 0xEFA7BD
Get Chip ID... [MT6833]
Get SOC ID... [727B261104847CEA4F20DFB7841953B8432439DF851EC57C20 7CDA52B3056947]
Get sec config... OK [000000E0]
Get hw mode... OK
Load DownloadAgent... OK
Search DA... OK [14]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
UFS CID (FW VER): KM5L9001DM-B424 (0100)
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
UFS INFO:
UFS_CID : KM5L9001DM-B424
UFS_FWVER : 0100
BLOCK_SIZE: 0x0000001000 (4.00Kb)
UFS_LU0 : 0x0000400000 (4.00Mb)
UFS_LU1 : 0x0000400000 (4.00Mb)
UFS_LU2 : 0x1DCB000000 (119.17Gb)
RAM INFO:
INT_SRAM: 0x0000070000 (448.00Kb)
EXT_RAM : 0x0100000000 (4.00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... [EXT4] ... OK
Product Brand : TCL
Product Manufacturer : TCL
Product Model : T779W
Product Name : T779W
Product Device : Challenger_TMO
Product Board : MT6853
Board Platform : mt6833
Build ID : SP1A.210812.016
Build Date : Thu Mar 14 11:29:54 CST 2024
Display ID : SP1A.210812.016 release-keys
Security Patch : 2024-03-05
Version SDK : 31
Version Release : 12
Version Codename : REL
Firmware Version : 6EBY
Read security partition from phone... OK
Read security files... OK
Read NVDATA files... OK
Calculating... OK
Read lock info... OK
Read OTP... OK
Unlock... OK [DF1, DF2, GB1_0C, GB2]
Write lock info... OK
Write security partition to phone... OK
Network Unlock done!
 
  • Like
Reactions: tsui_thomas

GsmToto

Super Moderator
Jan 1, 2021
3,748
19,025
UK
Skype
gsmtoto
Sonork ID
100.1684601
Selected model: Blackview BV5900
Operation: Erase FRP
Software version: 6.8

Host Power Off... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Connect phone to [BOX] in BROM mode
Waiting for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0717
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0200, HW SUB CODE: 8A00
Detect chip [MT6761]
Get sec config... OK [00000000]
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM3 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0717
Get sec config... OK [00000000]
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0200, HW SUB CODE: 8A00
Detect chip [MT6761]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0xC17443D9, 0x702DEC8C, 0x11E8144B, 0x9ECD2C78
Get Chip ID... [MT6761]
Get SOC ID... [3B557C6CCB99D62ADF697D3B6B744D170B72B87B99D259F15A C0DC391836D33A]
Get sec config... OK [00000000]
Load DownloadAgent... OK
Search DA... OK [5]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x150100525831424D42071ED6D8A8132G
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_CNAME: RX1BMB
EMMC_ID : 0x150100525831424D42071ED6D8A8132G
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0000400000 (4.00Mb)
EMMC_USER : 0x0747C00000 (29.12Gb)
RAM INFO:
INT_SRAM: 0x000003A500 (233.25Kb)
EXT_RAM : 0x00C0000000 (3.00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... [EXT4] ... OK
Product Brand : Blackview
Product Manufacturer : Blackview
Product Model : BV5900
Product Name : BV5900_EEA
Product Device : BV5900
Product Board : k61v1_64_bsp
Board Platform : MTK6771_9.0
Build ID : PPR1.180610.011
Build Date : Fri Mar 19 16:10:15 CST 2021
Display ID : BV5900_EEA_S598BG_V1.0_20210320V27
Security Patch : 2021-04-05
Version SDK : 28
Version Release : 9
Version Codename : REL
Firmware Version : 1616134975
Read partition "frp"... OK
Backup saved to C:/Program%20Files%20(x86)/Z3X/Pandora/Backup/MTK/Blackview_BV5900/FRP_BACKUP_(2024-5-4_13-22-43)/
Writting FRP data... OK
Erase FRP done!
 
  • Like
Reactions: tsui_thomas

aliipi

Friend's Martview
Oct 28, 2019
123
33
Selected model: Vivo PD2236KF (Vivo Y02t)
Operation: Read Flash Info
Software version: 6.8

Connect Type-C to NONE... OK
Host Power Off... OK
Connect phone to [PC] in PRELOADER Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek PreLoader USB VCOM_V1633 (Android),usb2ser.sys,3.0.1504.0]
Device found at COM4 [PRELOADER]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get sec config... OK [00000005]
Active sec flags: [SBC DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Preloader exist. Skip connection verification.
Get ME ID... OK
ME_ID = 0x89E10DF9, 0xF911C9C8, 0x0F17F367, 0x5D980468
Load DownloadAgent... OK
Search DA... OK [2]
Send bootloader... error(DA_IN_BLACKLIST)
 

GsmToto

Super Moderator
Jan 1, 2021
3,748
19,025
UK
Skype
gsmtoto
Sonork ID
100.1684601
Selected model: Realme RMX3785 (Realme 11X 5G)
Operation: Disable OTA Update
Software version: 6.8
Work ID: 273324511

Parse scatter file... OK
Load Rom Images... OK
Connect phone in PRELOADER Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek PreLoader USB VCOM_V1633 (Android),usb2ser.sys,3.0.1504.0]
Device found at COM3 [PRELOADER]
Open port... OK
Send start cmd... OK
Get HW code from device... 1209
Get sec config... OK [00000005]
Active sec flags: [SBC DAA]
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6835]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Preloader exist. Skip connection verification.
Get ME ID... OK
ME_ID = 0x635C0B94, 0x57499F57, 0xE86170FE, 0xC78E4986
Load DownloadAgent... OK
Search DA... OK [0]
Send bootloader... OK
Start bootloader... OK
Setup device enviroment... OK
Setup device parametres... OK
Get device info... OK
UFS CID (FW VER): HN8T062EHKX039 ()
Send preloader... OK
Load DownloadAgent... OK
Search DA... OK [3]
Send 2nd DA... OK
Get device info... OK
UFS INFO:
UFS_CID : HN8T062EHKX039
UFS_FWVER :
BLOCK_SIZE: 0x0000001000 (4.00Kb)
UFS_LU0 : 0x0000400000 (4.00Mb)
UFS_LU1 : 0x0000400000 (4.00Mb)
UFS_LU2 : 0x1DCB000000 (119.17Gb)
Get scatter info... OK
[EFUSE INFO]: BROM not disabled
Read partitions info from phone... OK
Checking A/B state... OK [A]
Read product info... [EROFS] ... OK
Product Brand : realme
Product Manufacturer : realme
Product Model : RMX3785
Product Name : RMX3785IN
Product Device : RE5C6CL1
Product Board : mgvi_64_armv82
Board Platform : common
Build ID : TP1A.220905.001
Build Date : Fri Sep 22 00:14:40 CST 2023
Display ID : RMX3785_13.2.0.200(SP02EX01)
Security Patch : 2023-09-05
Version SDK : 33
Version Release : 13
Version Codename : REL
Firmware Version : T.R4T2.1363d88_a6db-1
Disable OTA...
Exception: Division by zero
 

GsmToto

Super Moderator
Jan 1, 2021
3,748
19,025
UK
Skype
gsmtoto
Sonork ID
100.1684601
Selected model: Mediatek Mediatek
Operation: Unlock network
Software version: 6.8

Connect Type-C to NONE... OK
Host Power Off... OK
Connect phone to [PC] in BROM Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1632,usb2ser.sys,3.0.1504.0]
Device found at COM2 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get sec config... OK [00000000]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0xEE00B2AD, 0x04429340, 0xA645426A, 0x5BA14633
Get Chip ID... [MT6765]
Get SOC ID... [8B8F5C4D58B534471AFBFF00A220A01F8C157C4671AF34DAA5 05CF959FD2FC00]
Get sec config... OK [00000000]
Load DownloadAgent... OK
Search DA... OK [7]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0xDF0118534341363447109A31DB03AAX3
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_CNAME: SCA64G
EMMC_ID : 0xDF0118534341363447109A31DB03AAX3
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0000400000 (4.00Mb)
EMMC_USER : 0x0E8F000000 (58.23Gb)
RAM INFO:
INT_SRAM: 0x000003A000 (232.00Kb)
EXT_RAM : 0x0100000000 (4.00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK [A]
Read product info... [EXT4] ... OK
Product Brand : Vortex
Product Manufacturer : Vortex
Product Model : CG65
Product Name : CG65
Product Device : CG65
Product Board : k65v1_64_bsp
Board Platform : mt6765
Build ID : SP1A.210812.016
Build Date : Wed Nov 8 17:41:51 CST 2023
Display ID : Vortex_CG65_V01_20231108
Security Patch : 2023-11-05
Version SDK : 33
Version Release : 13
Version Codename : REL
Firmware Version : 20231108
Read security partition from phone... OK
Read security files... OK
Read NVDATA files... OK
Calculating... OK
Read lock info... OK
Unlock... OK [DF1, GB2, UN]
Write lock info... OK
Write security partition to phone... OK
Network Unlock done!
 
Top