GSM Shop GSM Shop
GSM-Forum  

Welcome to the GSM-Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features.
Only registered members may post questions, contact other members or search our database of over 8 million posts.

Registration is fast, simple and absolutely free so please - Click to REGISTER!

If you have any problems with the registration process or your account login, please contact contact us .

Go Back   GSM-Forum > Product Support Sections > Hard/Software Products (official support) > Pandora’s box


Reply
 
LinkBack Thread Tools Display Modes
Old 03-30-2023, 17:11   #1 (permalink)
Product Manager
 
blang's Avatar
 
Join Date: Oct 2000
Location: future
Posts: 22,431
Member: 2368
Status: Offline
Sonork: 100.111111
Thanks Meter: 186,551
Donate money to this user
Pandora Tool 4.9 Update. New devices, new exclusive functions added


Pandora Tool 4.9 Released. New devices, new exclusive functions added


Samsung SPD devices added:

Samsung SM-A032F Galaxy A03 Core
Samsung SM-A032M Galaxy A03 Core
Samsung SM-A035F Galaxy A03
Samsung SM-A035G Galaxy A03
Samsung SM-A035M Galaxy A03
Samsung SM-T509 Galaxy Tab A7 10.4
Samsung SM-X200 Galaxy Tab A8 2021
Samsung SM-X205 Galaxy Tab A8 2021
Samsung SM-X205C Galaxy Tab A8 2021
Samsung SM-X205N Galaxy Tab A8 2021


List of supported function for listed Samsung devices (Relock/Unlock Bootloader, Backup/Write/Format RPMB, Erase FRP, Format Flash, Read Info/IMEI/Partitions, Restore From Backup, Unlock Network, Repair, Wipe Data/Partitions, Write Firmware, SET KG state, Repair SN)



SIGMA MTK Devices added:

X-TREME PQ18
X-TREME PQ34
X-TREME PQ36
X-TREME PQ39 Max
X-TREME PQ39 Ultra
X-TREME PQ51

List of supported function for listed VIVO devices(Relock/Unlock Bootloader, Backup/Write/Format RPMB, Erase FRP, Format Flash, Read Info/IMEI/Partitions, Restore From Backup, Unlock Network, Repair, Wipe Data/Partitions, Write Firmware)



Tecno SPD devices added:

BC2c Tecno Pop 4
BD2, BD2p Tecno Pop 5
BD1 Tecno Pop 5 Go
BD4 Tecno Pop 5 LTE


List of supported function for listed Tecno devices (Relock/Unlock Bootloader, Backup/Write/Format RPMB, Erase FRP, Format Flash, Read Info/IMEI/Partitions, Restore From Backup, Unlock Network, Repair, Wipe Data/Partitions, Write Firmware)


Added new checkbox in Setting - General - Allow Beta/Unsafe Operations
This option don't stored in SW settings, need enable every launch


IMPORTANT: Temporary disabled Advanced Authorization in Preloader mode for Vivo on MT6833, MT6853, MT6893 ( Can be enabled in Setting - General - Allow Beta/Unsafe Operations).
We received some user report about full memory «erase»
At this moment we try to get similar situation on our devices and fix this.


Added Erase FRP And Wipe for MTK

Improved connections UFS

Improved support EROFS

Last edited by Z3X; 03-30-2023 at 17:27.
  Reply With Quote
The Following 9 Users Say Thank You to blang For This Useful Post:
Show/Hide list of the thanked
Old 03-30-2023, 17:34   #2 (permalink)
No Life Poster
 
ali_ipi's Avatar
 
Join Date: Sep 2011
Location: karachi
Posts: 595
Member: 1655288
Status: Offline
Thanks Meter: 90
Quote:
Originally Posted by blang View Post
Pandora Tool 4.9 Released. New devices, new exclusive functions added


Samsung SPD devices added:

Samsung SM-A032F Galaxy A03 Core
Samsung SM-A032M Galaxy A03 Core
Samsung SM-A035F Galaxy A03
Samsung SM-A035G Galaxy A03
Samsung SM-A035M Galaxy A03
Samsung SM-T509 Galaxy Tab A7 10.4
Samsung SM-X200 Galaxy Tab A8 2021
Samsung SM-X205 Galaxy Tab A8 2021
Samsung SM-X205C Galaxy Tab A8 2021
Samsung SM-X205N Galaxy Tab A8 2021


List of supported function for listed Samsung devices (Relock/Unlock Bootloader, Backup/Write/Format RPMB, Erase FRP, Format Flash, Read Info/IMEI/Partitions, Restore From Backup, Unlock Network, Repair, Wipe Data/Partitions, Write Firmware, SET KG state, Repair SN)



SIGMA MTK Devices added:

X-TREME PQ18
X-TREME PQ34
X-TREME PQ36
X-TREME PQ39 Max
X-TREME PQ39 Ultra
X-TREME PQ51

List of supported function for listed VIVO devices(Relock/Unlock Bootloader, Backup/Write/Format RPMB, Erase FRP, Format Flash, Read Info/IMEI/Partitions, Restore From Backup, Unlock Network, Repair, Wipe Data/Partitions, Write Firmware)



Tecno SPD devices added:

BC2c Tecno Pop 4
BD2, BD2p Tecno Pop 5
BD1 Tecno Pop 5 Go
BD4 Tecno Pop 5 LTE


List of supported function for listed Tecno devices (Relock/Unlock Bootloader, Backup/Write/Format RPMB, Erase FRP, Format Flash, Read Info/IMEI/Partitions, Restore From Backup, Unlock Network, Repair, Wipe Data/Partitions, Write Firmware)


Added new checkbox in Setting - General - Allow Beta/Unsafe Operations
This option don't stored in SW settings, need enable every launch


IMPORTANT: Temporary disabled Advanced Authorization in Preloader mode for Vivo on MT6833, MT6853, MT6893 ( Can be enabled in Setting - General - Allow Beta/Unsafe Operations).
We received some user report about full memory «erase»
At this moment we try to get similar situation on our devices and fix this.


Added Erase FRP And Wipe for MTK

Improved connections UFS

Improved support EROFS
Selected model: Tecno CH6 (Tecno Camon 18)
Operation: Erase FRP And Wipe
Software version: 4.9
Erasing of partitions can damage your device.
Make sure that you have a backup created. Continue? YES

Host Power Off... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Host Power On... OK
Connect phone to BOX in BROM/PRELOADER Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1448.0]
Device found at COM208 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0707
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6768]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Force switch to BROM... OK
Host Power Off... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Waiting for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0707
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6768]
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Release testpoint
Advanced Bypass Security... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1448.0]
Device found at COM208 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0707
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6768]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x57D8667E, 0x1E6E9380, 0x15EA447A, 0x2EE4D766
Get Chip ID... [MT6768]
Get SOC ID... [7374943216B99D35E7A22C37F0DCF273E947BE21FACBC92324 8CC847D3AE5439]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [8]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x15010033563643424202684D6A625999
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_CNAME: 3V6CBB
EMMC_ID : 0x15010033563643424202684D6A625999
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0001000000 (16.00Mb)
EMMC_USER : 0x1D1EC00000 (116.48Gb)
RAM INFO:
INT_SRAM: 0x0000070000 (448.00Kb)
EXT_RAM : 0x0100000000 (4.00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK [B]
Read product info... [EXT4] ... OK
Product Brand : TECNO
Product Manufacturer : TECNO
Product Model : TECNO CH6i
Product Name : TSSI
Product Device : FULL-64
Product Board : TECNO-CH6i
Board Platform : connac1x
Build ID : SP1A.210812.016
Build Date : Thu Dec 29 17:15:46 CST 2022
Display ID : TECNO-S-64-221229V647
Security Patch : 2022-12-05
Version SDK : 31
Version Release : 12
Version Codename : REL
Firmware Version : 221229V1930
Read partitions info from phone... OK
Read partition "frp"... OK
Backup saved to
Exception: Access violation at address 00000000 in module PandoraTool.exe. Execution of address 00000000
  Reply With Quote
The Following 2 Users Say Thank You to ali_ipi For This Useful Post:
Old 03-30-2023, 20:31   #3 (permalink)
No Life Poster
 
johnoroo37's Avatar
 
Join Date: Sep 2013
Location: INSIDE YOUR MIND
Posts: 1,300
Member: 2025428
Status: Offline
Thanks Meter: 445
Donate money to this user
FRP ERROR FIX BUG
Selected model: Xiaomi Redmi 9 (Lancelot)
Operation: Erase FRP
Software version: 4.9

Host Power Off... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Connect phone to BOX in BROM mode
Waiting for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0707
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6768]
Get sec config... OK [000000E7]
Active sec flags: [SBC SLA DAA]
Release testpoint
Advanced Bypass Security... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1632,usb2ser.sys,3.0.1504.0]
Device found at COM172 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0707
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6768]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0xF0858201, 0xCBC8F5B6, 0xAA6C62AF, 0x754F0A3F
Get Chip ID... [MT6768]
Get SOC ID... [87F21C07A2B5133D7B55AFEF94BF6E1234DA8519563AB790F3 D40ECE7D261B94]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [8]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x150100445036444142030479E4D0470D
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_CNAME: DP6DAB
EMMC_ID : 0x150100445036444142030479E4D0470D
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0001000000 (16.00Mb)
EMMC_USER : 0x0E8F800000 (58.24Gb)
RAM INFO:
INT_SRAM: 0x0000070000 (448.00Kb)
EXT_RAM : 0x0100000000 (4.00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... [EXT4] ... OK
Product Brand : Redmi
Product Manufacturer : Xiaomi
Product Model : lancelot
Product Name : lancelot_global
Product Device : lancelot
Product Board : lancelot
Board Platform : MT6768
Build ID : QP1A.190711.020
Build Date : Wed Jun 17 23:16:28 CST 2020
Display ID : build-20200617231236
Security Patch : 2020-06-01
Version SDK : 29
Version Release : 10
Version Codename : REL
Firmware Version : V11.0.4.0.QJCMIXM
Read partitions info from phone... OK
Read partition "frp"... OK
Backup saved to
Exception: Access violation at address 00000000 in module PandoraTool.exe. Execution of address 00000000
  Reply With Quote
The Following User Says Thank You to johnoroo37 For This Useful Post:
Old 03-30-2023, 20:31   #4 (permalink)
Junior Member
 
Join Date: Dec 2011
Location: ask
Age: 34
Posts: 34
Member: 1705765
Status: Offline
Sonork: marvinmegamind
Thanks Meter: 11
Donate money to this user
infinix x6511b nolonger booting after updating to 4.9 please fix it
  Reply With Quote
The Following User Says Thank You to saad100 For This Useful Post:
Old 03-30-2023, 20:34   #5 (permalink)
Junior Member
 
Join Date: Dec 2011
Location: ask
Age: 34
Posts: 34
Member: 1705765
Status: Offline
Sonork: marvinmegamind
Thanks Meter: 11
Donate money to this user
x6511b loader failed after updating to 4.9 pliz fix it

Selected model: Infinix X6511B (Infinix Smart 6)
Operation: Read Flash Info
Software version: 4.9
Work ID: 1250357

Waiting for device... OK
Device found at COM29
Port: USB\VID_1782&PID_4D00\5&272D57E8&0&2
Driver: [UNISOC Communications Inc.,sprdvcom,SPRD U2S Diag,sprdvcom.sys,4.19.38.134]
Connecting to device... OK
Selected processor: SC9863A
Load files... OK
Connect preloader 1... OK
Connect preloader 2... OK
Connect loader 1... error(42)
  Reply With Quote
The Following User Says Thank You to saad100 For This Useful Post:
Old 03-30-2023, 23:27   #6 (permalink)
Junior Member
 
Join Date: Mar 2023
Location: Bangladesh
Age: 32
Posts: 5
Member: 3035336
Status: Offline
Thanks Meter: 2
SM A03 A035F U3 IMEI Repair And Patched Supported Or Not With Pandora 4.9?
Please Reply Pandora Team ��
  Reply With Quote
The Following User Says Thank You to GSMNeon For This Useful Post:
Old 03-31-2023, 10:02   #7 (permalink)
No Life Poster
 
Join Date: Dec 2015
Location: Somewhere on the Internet
Posts: 1,162
Member: 2500215
Status: Offline
Thanks Meter: 417
Donate money to this user
There is no Network Unlock option in these samsung models listed.
  Reply With Quote
The Following User Says Thank You to Southsider2009 For This Useful Post:
Old 03-31-2023, 10:19   #8 (permalink)
Junior Member
 
Join Date: Dec 2011
Location: ask
Age: 34
Posts: 34
Member: 1705765
Status: Offline
Sonork: marvinmegamind
Thanks Meter: 11
Donate money to this user
Alcatel 5007u access violation please fix 4.9 update

Selected model: Alcatel 5007U (Alcatel 1V (2020))
Operation: Erase FRP And Wipe
Software version: 4.9
Erasing of partitions can damage your device.
Make sure that you have a backup created. Continue? YES
Work ID: 1260664

Connect phone in BROM Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM3 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get sec config... OK [000000E7]
Active sec flags: [SBC SLA DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
LibUSB installed
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Release testpoint, waiting 2 seconds
Advanced Bypass Security... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM3 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
LibUSB installed
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x0E9404F4, 0x38BA434E, 0xA4B0C74D, 0xE12A269F
Get Chip ID... [MT6765]
Get SOC ID... [43F011D59433304B4791531EF10A3494D547E58FE566860AC7 5D7E9CFD5BA70E]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [7]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0xF40122426977696E2010000AA4DDC7D9
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_CNAME: Biwin
EMMC_ID : 0xF40122426977696E2010000AA4DDC7D9
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0000400000 (4.00Mb)
EMMC_USER : 0x0748000000 (29.13Gb)
RAM INFO:
INT_SRAM: 0x000003A000 (232.00Kb)
EXT_RAM : 0x0080000000 (2.00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... [EXT4] ... OK
Product Manufacturer : TCL
Product Board : MT6765
Board Platform : MT6765
Build ID : QP1A.190711.020
Build Date : Thu Nov 19 21:17:47 CST 2020
Display ID : QP1A.190711.020 release-keys
Security Patch : 2020-11-05
Version SDK : 29
Version Release : 10
Version Codename : REL
Firmware Version : v4G3Q-0
Read partitions info from phone... OK
Read partition "frp"... OK
Backup saved to
Exception: Access violation at address 00000000 in module PandoraTool.exe. Execution of address 00000000
  Reply With Quote
The Following 2 Users Say Thank You to saad100 For This Useful Post:
Old 04-01-2023, 16:21   #9 (permalink)
Banned
 
Join Date: Jan 2007
Location: morroco rabat massira n67 sect
Age: 51
Posts: 430
Member: 443140
Status: Offline
Thanks Meter: 45
Host Power Off... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Host Power On... OK
Connect phone to BOX in BROM/PRELOADER Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1632,usb2ser.sys,3.0.1504.0]
Device found at COM40 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0707
Get sec config... OK [000000E7]
Active sec flags: [SBC SLA DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6768]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Force switch to BROM... OK
Host Power Off... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Waiting for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0707
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6768]
Get sec config... OK [000000E7]
Active sec flags: [SBC SLA DAA]
Release testpoint
Advanced Bypass Security... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1632,usb2ser.sys,3.0.1504.0]
Device found at COM40 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0707
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6768]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0xE7404E34, 0x3D2AF975, 0x038E1157, 0x6A7CD847
Get Chip ID... [MT6768]
Get SOC ID... [E48F144C67CB3FF5DDE22D285F2F42E70CF0DFC859EBD48188 2CA58676ACD83C]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [8]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x150100444436384D42026989D09737C5
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_CNAME: DD68MB
EMMC_ID : 0x150100444436384D42026989D09737C5
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0000400000 (4.00Mb)
EMMC_USER : 0x0747C00000 (29.12Gb)
RAM INFO:
INT_SRAM: 0x0000070000 (448.00Kb)
EXT_RAM : 0x0100000000 (4.00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... [EXT4] ... OK
Product Brand : Redmi
Product Manufacturer : Xiaomi
Product Model : lancelot
Product Name : lancelot_eea
Product Device : lancelot
Product Board : lancelot
Board Platform : MT6768
Build ID : RP1A.200720.011
Build Date : Thu Apr 14 18:10:24 CST 2022
Display ID : RP1A.200720.011
Security Patch : 2022-04-01
Version SDK : 30
Version Release : 11
Version Codename : REL
Firmware Version : V12.5.5.0.RJCEUXM
Read partitions info from phone... OK
Read partition "frp"... OK
Backup saved to
Exception: Access violation at address 00000000 in module PandoraTool.exe. Execution of address 00000000

Selected model: Xiaomi Redmi 9 (Lancelot)
Operation: Erase FRP
Software version: 4.9
  Reply With Quote
Old 04-01-2023, 17:35   #10 (permalink)
Freak Poster
 
yuslamunique's Avatar
 
Join Date: Jul 2021
Location: Nigeria
Posts: 403
Member: 2993572
Status: Offline
Thanks Meter: 164
Donate money to this user
Quote:
Originally Posted by ali_ipi View Post
Selected model: Tecno CH6 (Tecno Camon 18)
Operation: Erase FRP And Wipe
Software version: 4.9
Erasing of partitions can damage your device.
Make sure that you have a backup created. Continue? YES

Host Power Off... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Host Power On... OK
Connect phone to BOX in BROM/PRELOADER Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1448.0]
Device found at COM208 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0707
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6768]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Force switch to BROM... OK
Host Power Off... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Waiting for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0707
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6768]
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Release testpoint
Advanced Bypass Security... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1448.0]
Device found at COM208 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0707
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6768]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x57D8667E, 0x1E6E9380, 0x15EA447A, 0x2EE4D766
Get Chip ID... [MT6768]
Get SOC ID... [7374943216B99D35E7A22C37F0DCF273E947BE21FACBC92324 8CC847D3AE5439]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [8]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x15010033563643424202684D6A625999
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_CNAME: 3V6CBB
EMMC_ID : 0x15010033563643424202684D6A625999
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0001000000 (16.00Mb)
EMMC_USER : 0x1D1EC00000 (116.48Gb)
RAM INFO:
INT_SRAM: 0x0000070000 (448.00Kb)
EXT_RAM : 0x0100000000 (4.00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK [B]
Read product info... [EXT4] ... OK
Product Brand : TECNO
Product Manufacturer : TECNO
Product Model : TECNO CH6i
Product Name : TSSI
Product Device : FULL-64
Product Board : TECNO-CH6i
Board Platform : connac1x
Build ID : SP1A.210812.016
Build Date : Thu Dec 29 17:15:46 CST 2022
Display ID : TECNO-S-64-221229V647
Security Patch : 2022-12-05
Version SDK : 31
Version Release : 12
Version Codename : REL
Firmware Version : 221229V1930
Read partitions info from phone... OK
Read partition "frp"... OK
Backup saved to
Exception: Access violation at address 00000000 in module PandoraTool.exe. Execution of address 00000000
With or Without Test Point?
  Reply With Quote
The Following User Says Thank You to yuslamunique For This Useful Post:
Old 04-03-2023, 23:27   #11 (permalink)
Junior Member
 
Join Date: Mar 2018
Location: dhaka,bangladesh
Posts: 25
Member: 2818969
Status: Offline
Sonork: gsmmilat
Thanks Meter: 5
Donate money to this user
pandora old update working good for all frp but new update not clean any frp i think this is the big bugs in pandora device please solved this problem argently.
  Reply With Quote
The Following 3 Users Say Thank You to gsmmillat For This Useful Post:
Show/Hide list of the thanked
Old 04-04-2023, 22:37   #12 (permalink)
Insane Poster
 
Join Date: Feb 2014
Location: Honduras , la ceiba atlantida
Posts: 71
Member: 2127804
Status: Offline
Thanks Meter: 6
I can't frp alcatel 9032z it gives me an error
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... [EXT4] ... OK
Product Brand : Alcatel
Product Manufacturer : TCL
Product Model : 9032Z
Product Name : 9032Z
Product Device : Apollo_8_4G_TMO
Product Board : apollo84gtmo
Board Platform : MT6761
Build ID : QP1A.190711.020
Build Date : Thu Nov 10 13:02:47 CST 2022
Display ID : QP1A.190711.020 release-keys
Security Patch : 2022-11-05
Version SDK : 29
Version Release : 10
Version Codename : REL
Firmware Version : v1C7F-0
Read partitions info from phone... OK
Read partition "frp"... OK
Backup saved to
Exception: Access violation at address 00000000 in module PandoraTool.exe. Execution of address 00000000

Selected model: Alcatel 9032Z (Alcatel Joy Tab 2)
Operation: Erase FRP
Software*version:*4.9
  Reply With Quote
Old 04-05-2023, 00:36   #13 (permalink)
Junior Member
 
Join Date: Jan 2023
Location: tonga
Age: 43
Posts: 16
Member: 3029576
Status: Offline
Thanks Meter: 1
credit

Quote:
Originally Posted by blang View Post
Pandora Tool 4.9 Released. New devices, new exclusive functions added


Samsung SPD devices added:

Samsung SM-A032F Galaxy A03 Core
Samsung SM-A032M Galaxy A03 Core
Samsung SM-A035F Galaxy A03
Samsung SM-A035G Galaxy A03
Samsung SM-A035M Galaxy A03
Samsung SM-T509 Galaxy Tab A7 10.4
Samsung SM-X200 Galaxy Tab A8 2021
Samsung SM-X205 Galaxy Tab A8 2021
Samsung SM-X205C Galaxy Tab A8 2021
Samsung SM-X205N Galaxy Tab A8 2021


List of supported function for listed Samsung devices (Relock/Unlock Bootloader, Backup/Write/Format RPMB, Erase FRP, Format Flash, Read Info/IMEI/Partitions, Restore From Backup, Unlock Network, Repair, Wipe Data/Partitions, Write Firmware, SET KG state, Repair SN)



SIGMA MTK Devices added:

X-TREME PQ18
X-TREME PQ34
X-TREME PQ36
X-TREME PQ39 Max
X-TREME PQ39 Ultra
X-TREME PQ51

List of supported function for listed VIVO devices(Relock/Unlock Bootloader, Backup/Write/Format RPMB, Erase FRP, Format Flash, Read Info/IMEI/Partitions, Restore From Backup, Unlock Network, Repair, Wipe Data/Partitions, Write Firmware)



Tecno SPD devices added:

BC2c Tecno Pop 4
BD2, BD2p Tecno Pop 5
BD1 Tecno Pop 5 Go
BD4 Tecno Pop 5 LTE


List of supported function for listed Tecno devices (Relock/Unlock Bootloader, Backup/Write/Format RPMB, Erase FRP, Format Flash, Read Info/IMEI/Partitions, Restore From Backup, Unlock Network, Repair, Wipe Data/Partitions, Write Firmware)


Added new checkbox in Setting - General - Allow Beta/Unsafe Operations
This option don't stored in SW settings, need enable every launch


IMPORTANT: Temporary disabled Advanced Authorization in Preloader mode for Vivo on MT6833, MT6853, MT6893 ( Can be enabled in Setting - General - Allow Beta/Unsafe Operations).
We received some user report about full memory «erase»
At this moment we try to get similar situation on our devices and fix this.


Added Erase FRP And Wipe for MTK

Improved connections UFS

Improved support EROFS

whare can we buy pandora box credit for unlock samsung network
  Reply With Quote
Old 04-06-2023, 00:06   #14 (permalink)
Freak Poster
 
Join Date: Nov 2012
Location: indea
Posts: 120
Member: 1842985
Status: Offline
Sonork: taufeekkhan
Thanks Meter: 6
Pandora box Vivo mobile not supported koi bhi mobile Vivo ke nahin ho rahe hain please help
  Reply With Quote
Old 04-09-2023, 17:26   #15 (permalink)
No Life Poster
 
ali_ipi's Avatar
 
Join Date: Sep 2011
Location: karachi
Posts: 595
Member: 1655288
Status: Offline
Thanks Meter: 90
Selected model: Samsung SM-A035F (Samsung Galaxy A03 )
Operation: Erase FRP
Software version: 4.10

Host Power Off... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Host Power On... OK
Waiting for device... OK
Device found at COM38
Port: USB\VID_1782&PID_4D00\6&BE8D4ED&1&2
Driver: [DriverCoding Corporation,sprdvcom,SPRD U2S Diag,sprdvcom.sys,2.0.0.131]
Connecting to device... OK
Selected processor: SC9863A_64
Load files... OK
Connect preloader 1... error(32)

i try multiple time but same error fix it asap
  Reply With Quote
The Following User Says Thank You to ali_ipi For This Useful Post:
Reply

Bookmarks


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


 



All times are GMT +1. The time now is 15:55.



Powered by Searchlight © 2024 Axivo Inc.
vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2024 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2023 -
Page generated in 0.31720 seconds with 8 queries

SEO by vBSEO