Z3X Post here successfully Unlocked / Repaired / Flashed Phones with Pandora Tool

Z3X Team

saharsoft

Friend's Martview
Apr 5, 2017
194
106
afghanistan
Selected model: Samsung SM-A107F (Samsung Galaxy A10s)
Operation: Erase FRP
Software version: 9.7
Work ID: 93055737

Connect phone in BROM/PRELOADER Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek PreLoader USB VCOM_V1632 (Android),usb2ser.sys,3.0.1504.0]
Device found at COM88 [PRELOADER]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get sec config... OK [00000005]
Active sec flags: [SBC DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Force switch to BROM... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1632,usb2ser.sys,3.0.1504.0]
Device found at COM135 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
LibUSB installed
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Release testpoint, waiting 2 seconds
Advanced Bypass Security... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1632,usb2ser.sys,3.0.1504.0]
Device found at COM135 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x85D4481D, 0x853CC550, 0xE6E30D95, 0x707D8852
Get Chip ID... [MT6765]
Get SOC ID... [23786C721D8030992C8D1056CE525ADC15DF533DEF317C10E0094B53B04C365A]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [7]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x150100514436334D420393C60710969F
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_CNAME: QD63MB
EMMC_ID : 0x150100514436334D420393C60710969F
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0001000000 (16.00Mb)
EMMC_USER : 0x0747C00000 (29.12Gb)
RAM INFO:
INT_SRAM: 0x000003A000 (232.00Kb)
EXT_RAM : 0x0080000000 (2.00Gb)
HEALTH:
Pre EOL Info: normal
DeviceLifeTimeEstA: 40% - 50% device life time used
DeviceLifeTimeEstB: 40% - 50% device life time used
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... [EXT4] ... OK
Product Brand : samsung
Product Manufacturer : samsung
Product Model : SM-A107F
Product Name : a10sxx
Product Device : a10s
Product Board : S96116RA1
Board Platform : mt6765
Build ID : RP1A.200720.012
Build Date : Mon Apr 24 13:16:46 KST 2023
Display ID : RP1A.200720.012.A107FXXS8CWD3
Security Patch : 2023-03-01
Version SDK : 30
Version Release : 11
Version Codename : REL
Firmware Version : A107FXXS8CWD3
Userdata FS Type : EXT4
Read partition "frp"... OK
Read partition "persistent"... OK
Backup saved to C:/Program%20Files%20(x86)/Z3X/Pandora/Backup/MTK/Samsung_SM-A107F%20(Samsung%20Galaxy%20A10s)/FRP_BACKUP_(2025-10-11_12-54-53)/
Format FRP... [P1] [P2] OK
Writting FRP data... OK
Erase FRP done!
 

saharsoft

Friend's Martview
Apr 5, 2017
194
106
afghanistan
Xiaomi Redmi Note 10S (Rosemary) Mi account Remove one click


Selected model: Xiaomi Redmi Note 10S (Rosemary)
Operation: Reset Mi Acc
Software version: 9.7
Work ID: 93167861

Connect phone in BROM/PRELOADER Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1632,usb2ser.sys,3.0.1504.0]
Device found at COM35 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0813
Get sec config... OK [000000E7]
Active sec flags: [SBC SLA DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6785]
LibUSB installed
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Release testpoint, waiting 2 seconds
Advanced Bypass Security... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1632,usb2ser.sys,3.0.1504.0]
Device found at COM35 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0813
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6785]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x73426C96, 0xA4650588, 0x9FA529C1, 0xF8BBB188
Get Chip ID... [MT6785]
Get SOC ID... [C8B3E163CCB88D827BEDBE78409AB78D73275FED428D44074A3EABC794D79AA1]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [12]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
UFS CID (FW VER): H9HQ15AECMBDAR (A043)
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
UFS INFO:
UFS_CID : H9HQ15AECMBDAR
UFS_FWVER : A043
BLOCK_SIZE: 0x0000001000 (4.00Kb)
UFS_LU0 : 0x0000400000 (4.00Mb)
UFS_LU1 : 0x0000400000 (4.00Mb)
UFS_LU2 : 0x1DCAC00000 (119.17Gb)
RAM INFO:
INT_SRAM: 0x0000080000 (512.00Kb)
EXT_RAM : 0x0180000000 (6.00Gb)
HEALTH:
Pre EOL Info: normal
DeviceLifeTimeEstA: 20% - 30% device life time used
DeviceLifeTimeEstB: 0% - 10% device life time used
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... [EXT4] ... OK
Product Brand : Redmi
Product Manufacturer : Xiaomi
Product Model : rosemary
Product Name : rosemary
Product Device : rosemary
Product Board : rosemary
Board Platform : mt6785
Build ID : SP1A.210812.016
Build Date : Tue Jul 9 10:23:02 UTC 2024
Display ID : TP1A.220624.014
Security Patch : 2024-07-01
Version SDK : 33
Version Release : 13
Version Codename : REL
Firmware Version : V14.0.11.0.TKLMIXM
Userdata FS Type : F2FS
MiAcc Find Device : Enabled
MiAcc Phone Number : +98913*****66
MiAcc E-Mail : mra***@gmail.com
Read security partition from phone... OK
Checking FS type... [EXT4] ... OK
Unlocking bootloader...
Read security partition from phone...
Decrypting security data... OK
Encrypt security data... OK
Read security partition from phone... OK
Write security partition to phone... OK
Unlock bootloader done!
Disabling vbmeta verification...
Read security partition from phone... OK
Write security partition to phone... OK
Reset Mi Account... OK
Write security partition to phone... OK
Reset Mi Acc done!
 

saharsoft

Friend's Martview
Apr 5, 2017
194
106
afghanistan
Selected model: Xiaomi Redmi 13 (Moon)
Operation: Erase FRP
Software version: 9.7
Work ID: 93694351

Connect phone in PRELOADER Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek PreLoader USB VCOM_V1632 (Android),usb2ser.sys,3.0.1504.0]
Device found at COM88 [PRELOADER]
Open port... OK
Send start cmd... OK
Get HW code from device... 0707
Get sec config... OK [00000007]
Active sec flags: [SBC SLA DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6768]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Preloader exist. Skip connection verification.
Get ME ID... OK
ME_ID = 0x1576EF9F, 0x38FE0B9E, 0x00C4097B, 0x985DCF25
Load DownloadAgent... OK
Search DA... OK [0]
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [PRELOADER]
Preloader alive. Skip initializing external RAM
Send 2nd DA... OK
DA2 auth: enabled
Get device info... OK
EMMC INFO:
EMMC_CNAME: C09G00
EMMC_ID : 0xD62D00433039473030511C1A284B4BF7
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0000400000 (4.00Mb)
EMMC_USER : 0x3A4BB00000 (233.18Gb)
RAM INFO:
INT_SRAM: 0x0000070000 (448.00Kb)
EXT_RAM : 0x0100000000 (4.00Gb)
Checking USB status... USB_HIGH_SPEED
[EFUSE INFO]: read error
Read partitions info from phone... OK
Checking A/B state... OK [A]
Read product info... [EROFS] ... OK
Product Brand : Redmi
Product Manufacturer : Xiaomi
Product Model : moon
Product Name : vnd_moon
Product Device : moon
Product Board : moon
Board Platform : mt6768
Build ID : SP1A.210812.016
Build Date : Thu May 16 15:56:18 UTC 2024
Display ID : AL7015A-moon-build-20240516161333
Security Patch : 2024-05-01
Version SDK : 34
Version Release : 14
Version Codename : REL
Firmware Version : V816.0.4.0.UNTMIXM
Userdata FS Type : F2FS
MiAcc Find Device : Enabled
Read partition "frp"... OK
Backup saved to C:/Program%20Files%20(x86)/Z3X/Pandora/Backup/MTK/Xiaomi_Redmi%2013%20(Moon)/FRP_BACKUP_(2025-10-16_11-5-33)/
Format FRP... [P1] OK
Erase FRP done!
 
Top