![]() ![]() ![]() ![]() |
![]() |
Welcome to the GSM-Forum forums. You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. Only registered members may post questions, contact other members or search our database of over 8 million posts. Registration is fast, simple and absolutely free so please - Click to REGISTER! If you have any problems with the registration process or your account login, please contact contact us . |
|
Register | FAQ | Donate | Forum Rules | Root any Device | ★iPhone Unlock★ | ★ Direct Codes ★ | Direct Unlock Source | Search | Today's Posts | Mark Forums Read |
![]() |
| LinkBack | Thread Tools | Display Modes |
![]() | #211 (permalink) |
Insane Poster ![]() ![]() ![]() Join Date: Jan 2008
Posts: 78
Member: 668748 Status: Offline Thanks Meter: 110 | Waiting for device... COM12 [BOOTROM:0E8D:0003] Initializing usb... OK Waiting for device... COM12 [BOOTROM:0E8D:0003] Bypassing authentication... OK Analyzing preloader... preloader_k65v1_32_bsp_2g_ago.bin [MT6765:15:2512] [Cust] Handshaking... OK Reading hardware info... OK * Hardware : MT6765 [Helio G25|G35|P35] 0766 8A00 CA00 0000 * Security Config : SCB SLA DAA * MEID : 6372FF7FCA172BD6C78170FAE59BA5A5 Sending Download-Agent... OK Syncing with target... OK Booting device... OK Syncing with DA... OK **Storage : EMMC - CID : 44000115.4D383658.6A890942.99385ECE **Vendor : Samsung - Name : DX68MB - Serial : 1590585993 - Rev : 9 **Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 4 MiB - User Area : 29.12 GiB Reading partition info... OK [47] Reading device info... OK ** Model Name : V2120 ** Product Name : 2020 ** Manufacturer : vivo ** Platform : k65v1_32_bsp_2g_ago ** Android Version : 12 ** Security Patch : 2022-04-01 ** Build ID : SP1A.210812.003 release-keys ** Build : compiler04252208 ** Build Date : Mon Apr 25 22:07:19 CST 2022 ** Vivo Model : PD2140F_EXMA ** Vivo Version : PD2140F_EX_A_6.20.4 ** OS Name : vos ** OS Version : 3.0 ** OS Build : Funtouch OS 12 Global Changing device state... OK Erasing FRP... OK Erasing USERDATA... OK UNLOCKTOOL 2022.05.27.2 Elapsed time : 33 seconds |
![]() |
![]() | #212 (permalink) |
No Life Poster ![]() ![]() ![]() ![]() ![]() Join Date: Apr 2008 Location: South Africa
Posts: 736
Member: 746586 Status: Offline Thanks Meter: 216 ![]() | [EDL] RESET | DISABLE MI CLOUD Selected Model : Xiaomi Redmi 9T | Redmi 9 | Redmi 9 Power Code Name : (lime) Operation : Reset MiCloud [2] **Authenticating... OK **Retrieving data... OK [270.92 KiB] Initializing data... OK Waiting for HS-USB QDLoader 9008... COM11 Connecting to device... OK Handshaking... OK Reading bootloader info... OK **Serial : 2665702229 SoC : [Snapdragon 662] [SM6115] [0x0014D0E1] **OEM : Xiaomi [0x0072] Model : Unknown [0x0000] **PK_HASH[0] : 1BEBE3863A6781DB4B01086063007334 **PK_HASH[1] : DE9E5CA14971C7C4F4358EC9D79CDA46 Writing flash programmer... OK Connecting to flash programmer... OK Configuring device... OK **Firehose config : UFS [Sector:4096] [Target:0] [Host:1048576] Reading partition map... OK - LU Count : 6 Reading software info... OK ** Model Name : Lime for arm64 ** Product Name : lime ** Manufacturer : Xiaomi ** Platform : lime ** Android Version : 11 ** Security Patch : 2022-05-01 ** Build ID : Android-Q-build-20220516115819 ** Build : V12.5.11.0.RJQMIXM ** Build Date : Mon May 16 12:31:02 CST 2022 ** MIUI Version : V125 ** MIUI Build : V12.5.11.0.RJQMIXM ** MIUI Region : lime_global ** MIUI Locale : en-GB Erasing lock data... OK Formatting USERDATA... OK Disabling MiCloud... OK Erasing FRP... OK Rebooting... OK UNLOCKTOOL 2022.05.27.2 Elapsed time : 2 minutes 52 seconds |
![]() |
![]() | #213 (permalink) |
No Life Poster ![]() ![]() ![]() ![]() ![]() Join Date: Apr 2008 Location: South Africa
Posts: 736
Member: 746586 Status: Offline Thanks Meter: 216 ![]() | Mobicel R7 frp reset Selected Model : Unisoc SC7731E V1 Code Name : Spreadtrum SC7731E_1 Operation : Erase FRP [1] Authenticating... OK Retrieving data... OK [233.55 KiB] Hold VOL DOWN then plug-in USB cable! Waiting for device... COM83 Protocol : SPRD3 Sending FDL1... OK [29.34 KiB] Boot ver: Spreadtrum Boot Block version 1.1 Sending FDL2... OK [407.34 KiB] Reading DEVINFO... OK Model Name : R7_1 Platform : R7_1 Android Version : 10 Security Patch : 2021-11-05 Build ID : Mobicel_R7_1_DS_T_V08_20211118_MP Erasing FRP... Ok |
![]() |
![]() | #214 (permalink) |
No Life Poster ![]() ![]() ![]() ![]() ![]() Join Date: Apr 2008 Location: South Africa
Posts: 736
Member: 746586 Status: Offline Thanks Meter: 216 ![]() | Mobicel Berry 2 frp reset Selected Model : Unisoc SC7731E V2 Code Name : Spreadtrum SC7731E_2 Operation : Erase FRP [1] Authenticating... OK Retrieving data... OK [272.55 KiB] Hold VOL DOWN then plug-in USB cable! Waiting for device... COM83 Protocol : SPRD3 Sending FDL1... OK [32.57 KiB] Boot ver: Spreadtrum Boot Block version 1.1 Sending FDL2... OK [483.82 KiB] Reading DEVINFO... OK Model Name : VENUS_G Manufacturer : Mobicel Platform : k130_v1.1.0 Android Version : 8.1.0 Security Patch : 2019-06-05 Build ID : OPM2.171019.012 release-keys Erasing FRP... OK |
![]() |
![]() | #215 (permalink) |
No Life Poster ![]() ![]() ![]() ![]() ![]() Join Date: Apr 2008 Location: South Africa
Posts: 736
Member: 746586 Status: Offline Thanks Meter: 216 ![]() | Scanning for device... COM69 Connecting to port... OK Reading Info... OK Model Number : SM-P585 Country Code : XFA Serial Number : R52J411GRZZ Unique Number : CAJ03708C648634 Enabling ADB... OK Model : SM-P585 Manufacturer : samsung Platform : exynos5 CPU Arch : armeabi-v7a Android Serial : 5203708c648634ef Manufacturing Date : 20170425 Security Patch : 2018-11-01 Connection : mtp,adb Timezone : Africa/Johannesburg Knox Warranty : 0 - valid Android Version : 8.1.0 Android SDK : 27 Build : M1AJQ.P585JXU3CRK3 Build Date : Mon Nov 19 15:44:56 KST 2018 Product Code : SM-P585NZKAXFA Samsung Serial : R52J411GRZZ Device Name : gtanotexllte Product Name : gtanotexlltejx Code Name : SM-P585NZKAXFA BL : P585JXU3CRK3 PDA : P585JXU3CRK3 CP : P585JXU3CRJ6 CSC : P585OJV3CRK2 Sales Code : XFA Removing FRP... OK UNLOCKTOOL 2022.05.27.2 Elapsed time : 35 seconds |
![]() |
![]() | #216 (permalink) |
Freak Poster ![]() ![]() ![]() ![]() Join Date: Sep 2011 Location: Sudan
Posts: 496
Member: 1648903 Status: Offline Thanks Meter: 171 | TECNO KE5 FACTORY RESET [BROM] FACTORY RESET Initializing usb... OK Waiting for device... COM24 [BOOTROM:0E8D:0003] Bypassing authentication... OK Analyzing preloader... preloader_ke5_h6123go.bin [MT6761:9:1552] [Internal] Handshaking... OK Reading hardware info... OK * Hardware : MT6761 [Helio A20|A22|A25|G25|P22] 0717 8A00 CA01 0200 * Security Config : SCB SLA DAA * MEID : DA3AD6D22E5C2E1AA5B1C0C70EB10E74 Sending Download-Agent... OK Syncing with target... OK Booting device... OK Syncing with DA... OK **Storage : EMMC - CID : 684A0190.50613842.4D10033E.A3C7AF83 **Vendor : SK Hynix - Name : hB8aP> - Serial : 2944617744 - Rev : 3 **Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 16 MiB - User Area : 29.12 GiB Reading partition info... OK [41] Reading device info... OK ** Model Name : TECNO KE5 ** Product Name : KE5-GL ** Manufacturer : TECNO MOBILE LIMITED ** Platform : TECNO-KE5 ** Android Version : 10 ** Security Patch : 2021-02-05 ** Build ID : KE5-H6123ABC-QGo-GL-210128V243 ** Build : ABC-GL-210128V243 ** Build Date : Thu Jan 28 16:45:53 CST 2021 Erasing USERDATA... OK UNLOCKTOOL 2022.05.27.2 Elapsed time : 59 seconds |
![]() |
![]() | #217 (permalink) |
Freak Poster ![]() ![]() ![]() ![]() Join Date: Sep 2011 Location: Sudan
Posts: 496
Member: 1648903 Status: Offline Thanks Meter: 171 | Tecno ke5 factory reset TECNO KE5 FACTORY RESET [BROM] FACTORY RESET Initializing usb... OK Waiting for device... COM24 [BOOTROM:0E8D:0003] Bypassing authentication... OK Analyzing preloader... preloader_ke5_h6123go.bin [MT6761:9:1552] [Internal] Handshaking... OK Reading hardware info... OK * Hardware : MT6761 [Helio A20|A22|A25|G25|P22] 0717 8A00 CA01 0200 * Security Config : SCB SLA DAA * MEID : DA3AD6D22E5C2E1AA5B1C0C70EB10E74 Sending Download-Agent... OK Syncing with target... OK Booting device... OK Syncing with DA... OK **Storage : EMMC - CID : 684A0190.50613842.4D10033E.A3C7AF83 **Vendor : SK Hynix - Name : hB8aP> - Serial : 2944617744 - Rev : 3 **Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 16 MiB - User Area : 29.12 GiB Reading partition info... OK [41] Reading device info... OK ** Model Name : TECNO KE5 ** Product Name : KE5-GL ** Manufacturer : TECNO MOBILE LIMITED ** Platform : TECNO-KE5 ** Android Version : 10 ** Security Patch : 2021-02-05 ** Build ID : KE5-H6123ABC-QGo-GL-210128V243 ** Build : ABC-GL-210128V243 ** Build Date : Thu Jan 28 16:45:53 CST 2021 Erasing USERDATA... OK UNLOCKTOOL 2022.05.27.2 Elapsed time : 59 seconds |
![]() |
![]() | #218 (permalink) |
Freak Poster ![]() ![]() ![]() ![]() Join Date: Sep 2011 Location: Sudan
Posts: 496
Member: 1648903 Status: Offline Thanks Meter: 171 | TECNO KE5 FRP [BROM] ERASE FRP Initializing usb... OK Waiting for device... COM23 [PRELOADER:0E8D:2000] Jumping to BROM... OK Bypassing authentication... OK Analyzing preloader... preloader_ke5_h6123go.bin [MT6761:9:1552] [Internal] Handshaking... OK Reading hardware info... OK * Hardware : MT6761 [Helio A20|A22|A25|G25|P22] 0717 8A00 CA01 0200 * Security Config : SCB SLA DAA * MEID : DA3AD6D22E5C2E1AA5B1C0C70EB10E74 Sending Download-Agent... OK Syncing with target... OK Booting device... OK Syncing with DA... OK **Storage : EMMC - CID : 684A0190.50613842.4D10033E.A3C7AF83 **Vendor : SK Hynix - Name : hB8aP> - Serial : 2944617744 - Rev : 3 **Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 16 MiB - User Area : 29.12 GiB Reading partition info... OK [41] Reading device info... OK ** Model Name : TECNO KE5 ** Product Name : KE5-GL ** Manufacturer : TECNO MOBILE LIMITED ** Platform : TECNO-KE5 ** Android Version : 10 ** Security Patch : 2021-02-05 ** Build ID : KE5-H6123ABC-QGo-GL-210128V243 ** Build : ABC-GL-210128V243 ** Build Date : Thu Jan 28 16:45:53 CST 2021 Erasing FRP... OK UNLOCKTOOL 2022.05.27.2 Elapsed time : 56 seconds |
![]() |
![]() | #219 (permalink) |
Freak Poster ![]() ![]() ![]() ![]() Join Date: Sep 2011 Location: Sudan
Posts: 496
Member: 1648903 Status: Offline Thanks Meter: 171 | A217F FRP ONE CLICK [COM] REMOVE FRP [2022] Scanning for device... COM18 Connecting to port... OK Reading Info... OK Model Number : SM-A217F Country Code : BTC Serial Number : RF8R10L4ZHN Unique Number : CDH003043DC3AC7 Enabling ADB... OK Model : SM-A217F Manufacturer : samsung Platform : universal3830 CPU Arch : arm64-v8a Android Serial : RF8R10L4ZHN Manufacturing Date : 20210112 Security Patch : 2021-01-01 Connection : mtp,adb Timezone : Africa/Khartoum Android Version : 10 Android SDK : 29 Build : QP1A.190711.020.A217FXXU5BUB4 Build Date : Mon Feb 22 19:00:10 KST 2021 Product Code : SM-A217FZKGBTC Device Name : a21s Product Name : a21snnxx Code Name : SM-A217FZKGBTC **BL : A217FXXU5BUB4 **PDA : A217FXXU5BUB4 **CP : A217FXXU5BUA2,A217FXXU5BUA2 **CSC : A217FOJM5BUB6 Sales Code : BTC Removing FRP... OK UNLOCKTOOL 2022.05.27.2 Elapsed time : 25 seconds |
![]() |
![]() | #220 (permalink) |
No Life Poster ![]() ![]() ![]() ![]() ![]() ![]() ![]() Join Date: Sep 2005 Location: algeria BBA BELIMOUR Age: 47
Posts: 2,565
Member: 184351 Status: Offline Thanks Meter: 272 | realme c21 from death , image converted and flashed successfully FLASH Initializing usb... OK Waiting for device... COM21 [BOOTROM:0E8D:0003] Bypassing authentication... OK Analyzing preloader... preloader_oppo6765.bin [MT6765:16:2672] [Internal] Vendor : OPPO/REALME Handshaking... OK Reading hardware info... OK * Hardware : MT6765 [Helio G25|G35|P35] 0766 8A00 CA00 0000 * Security Config : SCB SLA DAA * MEID : D7C67AD80FE706F50DB0063DCEFB3311 Sending Download-Agent... OK Syncing with target... OK Booting device... OK Syncing with DA... OK **Storage : EMMC - CID : 44000115.4D383658.84CF0942.BBB79CE8 **Vendor : Samsung - Name : DX68MB - Serial : 2632484047 - Rev : 9 **Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 4 MiB - User Area : 29,12 GiB Tips : GPT not initialized! Using scatter as partition map! Writing preloader_oppo6765.bin [252,06 KiB] -> preloader [512 KiB]... OK Writing preloader_oppo6765.bin [252,06 KiB] -> preloader_backup [512 KiB]... OK Writing recovery.img [98 MiB] -> recovery [98 MiB]... OK Writing opporeserve2.img [5,05 MiB] -> opporeserve2 [128 MiB]... OK Writing vbmeta_system.img [4 KiB] -> vbmeta_system [8 MiB]... OK Writing vbmeta_vendor.img [4 KiB] -> vbmeta_vendor [8 MiB]... OK Writing md1img.img [47,46 MiB] -> md1img [100 MiB]... OK Writing spmfw.img [62,58 KiB] -> spmfw [1 MiB]... OK Writing scp.img [952,67 KiB] -> scp1 [1 MiB]... OK Writing scp.img [952,67 KiB] -> scp2 [1 MiB]... OK Writing sspm.img [424,56 KiB] -> sspm_1 [1 MiB]... OK Writing sspm.img [424,56 KiB] -> sspm_2 [1 MiB]... OK Writing cdt_engineering.img [1 MiB] -> cdt_engineering [8 MiB]... OK Writing lk.img [3,31 MiB] -> lk [4 MiB]... OK Writing lk.img [3,31 MiB] -> lk2 [4 MiB]... OK Writing boot.img [32 MiB] -> boot [32 MiB]... OK Writing logo.bin [2,58 MiB] -> logo [8 MiB]... OK Writing dtbo.img [201,58 KiB] -> dtbo [8 MiB]... OK Writing tee.img [880,22 KiB] -> tee1 [5 MiB]... OK Writing tee.img [880,22 KiB] -> tee2 [5 MiB]... OK Writing [EUEX] super.0.a960b471.img [2,77 GiB] -> super [7,38 GiB]... OK Writing [EUEX] super.1.3169e58b.img [1,77 GiB] -> super [7,38 GiB]... OK Writing [EUEX] super.2.2e34a1a7.img [533,22 MiB] -> super [7,38 GiB]... OK Writing vbmeta.img [4 KiB] -> vbmeta [8 MiB]... OK Writing cache.img [68,17 KiB] -> cache [432 MiB]... OK Writing userdata.img [303,82 MiB] -> userdata [12 GiB]... OK UNLOCKTOOL 2022.05.27.2 Elapsed time : 7 minutes 18 seconds |
![]() |
![]() | #222 (permalink) |
No Life Poster ![]() ![]() ![]() ![]() ![]() Join Date: Apr 2008 Location: South Africa
Posts: 736
Member: 746586 Status: Offline Thanks Meter: 216 ![]() | Selected Model : Vivo Y20 | Y20i | Y20s Code Name : PD2034F | V2027 | V2029 Operation : Factory Reset [5] Authenticating... OK Retrieving data... OK [270.22 KiB] Initializing data... OK Waiting for HS-USB QDLoader 9008... COM51 Connecting to device... OK Handshaking... OK Reading bootloader info... OK Serial : 2330113678 SoC : [Snapdragon 460] [SM4250-AA] [0x001360E1] OEM : Vivo [0x0073] Model : Unknown [0x0000] PK_HASH[0] : A7DF36FFD7AB557C67A6C26675E2795C PK_HASH[1] : 922CF671308CFD7169BEDB84424C862B Writing flash programmer... OK Connecting to flash programmer... OK Configuring device... OK Firehose config : UFS [Sector:4096] [Target:0] [Host:1048576] Erasing FRP... OK Erasing USERDATA... OK Rebooting... OK |
![]() |
![]() | #223 (permalink) |
No Life Poster ![]() ![]() ![]() ![]() ![]() ![]() Join Date: Nov 2013 Location: pakistan P G L Age: 40
Posts: 1,154
Member: 2067643 Status: Offline Sonork: 1611265 Thanks Meter: 480 | [COM] REMOVE FRP [2022] Scanning for device... COM16 Connecting to port... OK Reading Info... OK Model Number : SM-G935F Country Code : FTM Serial Number : RF8HC0ZRWSP Unique Number : CE11160BF1DE2D1504 Enabling ADB... OK Model : SM-G935F Manufacturer : samsung Platform : exynos5 CPU Arch : arm64-v8a Android Serial : ce11160bf1de2d1504 Manufacturing Date : 20161212 Security Patch : 2020-09-01 Connection : mtp,adb Timezone : Asia/Karachi Knox Warranty : 0 - valid Android Version : 8.0.0 Android SDK : 26 Build : R16NW.G935FXXU8ETI2 Build Date : Tue Sep 8 09:40:13 KST 2020 Product Code : SM-G935FZSAFTM Samsung Serial : RF8HC0ZRWSP Device Name : hero2lte Product Name : hero2ltexx Code Name : SM-G935FZSAFTM **BL : G935FXXU8ETI2 **PDA : G935FXXU8ETI2 **CP : G935FXXU8ETI2 **CSC : G935FFTM8ETI2 Sales Code : FTM Removing FRP... OK UNLOCKTOOL 2022.06.11.0 Elapsed time : 27 seconds |
![]() |
![]() | #224 (permalink) |
Insane Poster ![]() ![]() ![]() Join Date: Nov 2016 Location: Algérie
Posts: 70
Member: 2650328 Status: Offline Thanks Meter: 4 | [EDL] FACTORY RESET Selected Model : Oppo A53s (2020) Code Name : CPH2139 | CPH2135 Operation : Factory Reset [4] **Authenticating... OK **Retrieving data... OK [273.7 KiB] Initializing data... OK Waiting for HS-USB QDLoader 9008... COM105 Connecting to device... OK Handshaking... OK Reading bootloader info... OK **Serial : 2595196634 SoC : [Snapdragon 460] [SM4250-AA] [0x001360E1] **OEM : Oppo/Oneplus [0x0051] Model : Unknown [0x0000] **PK_HASH[0] : 49445E14621312DFECCD4389F267E6B7 **PK_HASH[1] : 1674DDD36B1BC41D1F605AA991D14AD6 Writing flash programmer... OK Connecting to flash programmer... OK Configuring device... OK **Firehose config : UFS [Sector:4096] [Target:0] [Host:1048576] Erasing FRP... OK Erasing USERDATA... OK Rebooting... OK UNLOCKTOOL 2022.06.11.0 Elapsed time : 2 minutes 56 seconds |
![]() |
![]() |
Bookmarks |
Thread Tools | |
Display Modes | |
| |
|