![]() ![]() ![]() |
![]() |
Welcome to the GSM-Forum forums. You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. Only registered members may post questions, contact other members or search our database of over 8 million posts. Registration is fast, simple and absolutely free so please - Click to REGISTER! If you have any problems with the registration process or your account login, please contact contact us . |
|
Register | FAQ | Donate | Forum Rules | Root any Device | ★iPhone Unlock★ | [ Easy-JTAG ] | Direct Unlock Source | Search | Today's Posts | Mark Forums Read |
![]() |
| LinkBack | Thread Tools | Display Modes |
![]() | #226 (permalink) |
No Life Poster ![]() ![]() ![]() ![]() ![]() Join Date: Apr 2008 Location: South Africa
Posts: 673
Member: 746586 Status: Offline Thanks Meter: 186 | Code Name : CPH2139 | CPH2135 Operation : Factory Reset [4] Authenticating... OK Retrieving data... OK [273.7 KiB] Initializing data... OK Waiting for HS-USB QDLoader 9008... COM6 Connecting to device... OK Handshaking... OK Reading bootloader info... OK Serial : 2815055530 SoC : [Snapdragon 460] [SM4250-AA] [0x001360E1] OEM : Oppo/Oneplus [0x0051] Model : Unknown [0x0000] PK_HASH[0] : 49445E14621312DFECCD4389F267E6B7 PK_HASH[1] : 1674DDD36B1BC41D1F605AA991D14AD6 Writing flash programmer... OK Connecting to flash programmer... OK Configuring device... OK Firehose config : UFS [Sector:4096] [Target:0] [Host:1048576] Erasing FRP... OK Erasing USERDATA... OK Rebooting... OK |
![]() |
![]() | #227 (permalink) |
Freak Poster ![]() ![]() ![]() ![]() Join Date: Oct 2020 Location: india Age: 36
Posts: 122
Member: 2970939 Status: Offline Thanks Meter: 43 | Oppo F17 CPH2095 pattern lock done [EDL] FACTORY RESET Selected Model : Oppo F17 (2020) Code Name : CPH2095 Operation : Factory Reset [4] **Authenticating... OK **Retrieving data... OK [273.7 KiB] Initializing data... OK Waiting for HS-USB QDLoader 9008... COM13 Connecting to device... OK Handshaking... OK Reading bootloader info... OK **Serial : 3143887302 SoC : [Snapdragon 662] [SM6115] [0x0014D0E1] **OEM : Oppo/Oneplus [0x0051] Model : Unknown [0x0000] **PK_HASH[0] : 49445E14621312DFECCD4389F267E6B7 **PK_HASH[1] : 1674DDD36B1BC41D1F605AA991D14AD6 Writing flash programmer... OK Connecting to flash programmer... OK Configuring device... OK **Firehose config : UFS [Sector:4096] [Target:0] [Host:1048576] Erasing FRP... OK Erasing USERDATA... OK Rebooting... OK UNLOCKTOOL 2022.06.11.0 Elapsed time : 36 seconds |
![]() |
![]() | #228 (permalink) |
No Life Poster ![]() ![]() ![]() ![]() ![]() Join Date: Dec 2020 Location: ph Age: 47
Posts: 571
Member: 2974628 Status: Offline Sonork: 11223344 Thanks Meter: 166 | Are-l22hn EDL MODE ARE-L22HN FRP DONE [EDL] ERASE FRP Selected Model : Huawei Honor 8X Max (V2) Code Name : ARE-AL00 | L22HN | AL10_V2 Operation : Erase FRP [1] **Authenticating... OK **Retrieving data... OK [266.45 KiB] Initializing data... OK Waiting for HS-USB QDLoader 9008... COM4 Connecting to device... OK Handshaking... OK Reading bootloader info... OK **Serial : 2050486599 SoC : [Snapdragon 660] [SDM660] [0x0008C0E1] **OEM : Huawei [0x0015] Model : Unknown [0x0000] **PK_HASH[0] : A1A5C29846C9881B7A6081EC218212B9 **PK_HASH[1] : B7EB1765EE8843798F16619D6FCD3FE0 Writing flash programmer... OK Connecting to flash programmer... OK Configuring device... OK **Firehose config : eMMC [Sector:512] [Target:4096] [Host:1048576] Reading partition map... OK - LU Count : 1 Reading software info... OK ** Model Name : sdm660_64 ** Manufacturer : unknown ** Platform : sdm660 ** Android Version : 8.1.0 ** Security Patch : 2020-07-01 ** Build ID : System 8.2.0.036(2E35) ** Build Date : Mon Aug 16 15:37:46 CST 2021 Erasing FRP... OK Rebooting... OK UNLOCKTOOL 2022.06.11.0 Elapsed time : 20 seconds |
![]() |
![]() | #229 (permalink) |
Insane Poster ![]() ![]() ![]() Join Date: Nov 2016
Posts: 62
Member: 2650328 Status: Offline Thanks Meter: 3 | [COM] REMOVE FRP [2022] Scanning for device... COM27 Connecting to port... OK Reading Info... OK Model Number : SM-A217F Country Code : BTC Serial Number : R58N85J52SL Unique Number : CR8100527891057 Enabling ADB... OK Model : SM-A217F Manufacturer : samsung Platform : universal3830 CPU Arch : arm64-v8a Android Serial : R58N85J52SL Manufacturing Date : 20200826 Security Patch : 2022-04-01 Connection : mtp,adb Timezone : Africa/Algiers Android Version : 11 Android SDK : 30 Build : RP1A.200720.012.A217FXXS8CVD1 Build Date : Mon Apr 25 12:37:08 +07 2022 Product Code : SM-A217FZKGBTC Device Name : a21s Product Name : a21snnxx Code Name : SM-A217FZKGBTC **BL : A217FXXS8CVD1 **PDA : A217FXXS8CVD1 **CP : A217FXXU8CVC2,A217FXXU8CVC2 **CSC : A217FOJM8CVC2 Sales Code : BTC Removing FRP... OK UNLOCKTOOL 2022.06.11.0 Elapsed time : 51 seconds |
![]() |
![]() | #230 (permalink) |
No Life Poster ![]() ![]() ![]() ![]() ![]() ![]() Join Date: Nov 2013 Location: pakistan P G L Age: 38
Posts: 1,037
Member: 2067643 Status: Offline Sonork: 1611265 Thanks Meter: 424 | [COM] REMOVE FRP [2022] Scanning for device... COM27 Connecting to port... OK Reading Info... OK Model Number : SM-G930F Country Code : XEU Serial Number : R58HC0QNMRA Unique Number : CE11160BBBF21D0B01 Enabling ADB... OK Model : SM-G930F Manufacturer : samsung Platform : exynos5 CPU Arch : arm64-v8a Android Serial : ce11160bbbf21d0b01 Manufacturing Date : 20161203 Security Patch : 2019-02-01 Connection : mtp,adb Timezone : Asia/Karachi Knox Warranty : 0 - valid Android Version : 8.0.0 Android SDK : 26 Build : R16NW.G930FXXS4ESAE Build Date : Tue Jan 29 17:48:31 KST 2019 Product Code : SM-G930FZKAXEU Samsung Serial : R58HC0QNMRA Device Name : herolte Product Name : heroltexx Code Name : SM-G930FZKAXEU **BL : G930FXXS4ESAE **PDA : G930FXXS4ESAE **CP : G930FXXU4ESAE **CSC : G930FXEU4ERKF Sales Code : XEU Removing FRP... OK UNLOCKTOOL 2022.06.11.0 Elapsed time : 27 seconds |
![]() |
![]() | #231 (permalink) |
Major Poster ![]() ![]() Join Date: May 2022 Location: Germiston
Posts: 42
Member: 3013514 Status: Offline Thanks Meter: 2 | frl-l22 frp [BROM] ERASE HUAWEI ID Initializing usb... OK Waiting for device... COM7 [BOOTROM:0E8D:0003] Bypassing authentication... OK Analyzing preloader... preloader_k69v1_64.bin [MT6769:25:4112] [Internal] Handshaking... OK Reading hardware info... OK * Hardware : MT6768 [Helio G70|G80|G85|P65] 0707 8A00 CA00 0000 * Security Config : SCB SLA DAA * MEID : 03B912C27DCD010D93EEABFDEA103D66 Sending Download-Agent... OK Syncing with target... OK Booting device... OK Syncing with DA... OK **Storage : EMMC - CID : 44000145.32313441.DF6C0138.6B681E67 **Vendor : Scandisk - Name : DA4128 - Serial : 510123884 - Rev : 1 **Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 16 MiB - User Area : 116,48 GiB Erasing HUAWEI ID... OK UNLOCKTOOL 2022.05.19.0 Elapsed time : 1 minute 2 seconds |
![]() |
![]() | #232 (permalink) |
Major Poster ![]() ![]() Join Date: May 2022 Location: Germiston
Posts: 42
Member: 3013514 Status: Offline Thanks Meter: 2 | [COM] REMOVE FRP [2022] Scanning for device... COM69 Connecting to port... OK Reading Info... OK Model Number : SM-J410F Country Code : XFA Serial Number : R28M32TXCTX Unique Number : CFE00BF4A96B936 Enabling ADB... OK Model : SM-J410F Manufacturer : samsung Platform : msm8937 CPU Arch : armeabi-v7a Android Serial : bf4a96b9 Manufacturing Date : 2019.03.28 Security Patch : 2020-12-01 Connection : sec_charging,adb Timezone : Africa/Johannesburg Knox Warranty : 0 - valid Android Version : 8.1.0 Android SDK : 27 Build : M1AJB.J410FXXS2AUD1 Build Date : Fri Apr 23 15:45:43 KST 2021 Product Code : SM-J410FZKDXFA Samsung Serial : R28M32TXCTX Device Name : j4corelte Product Name : j4coreltejx Code Name : SM-J410FZKDXFA **BL : J410FXXS2AUD1 **PDA : J410FXXS2AUD1 **CP : J410FXXS2ATF1 **CSC : J410FOJM2ASL2 Sales Code : XFA Removing FRP... OK UNLOCKTOOL 2022.05.04.0 Elapsed time : 20 seconds |
![]() |
![]() | #233 (permalink) |
Major Poster ![]() ![]() Join Date: May 2022 Location: Germiston
Posts: 42
Member: 3013514 Status: Offline Thanks Meter: 2 | [ODIN] ERASE FRP Scanning for device... COM28 Connecting to port... OK Reading Info... OK Key Value Model SM-J106F Unique No C8G0116C52C1394 Storage Capacity 8G Manufacturer HYNIX Firmware Version 0 eMCP H8G4t2 Handshaking... OK Initializing... OK Changing download speed... HIGH Reading PIT Mapping... OK Platform : SPRD8735 Selected Model : Frp_SPRD_Samsung Code Name : Frp_SPRD_Samsung Operation : Eng Userdata [2] **Authenticating... OK **Retrieving data... OK [17,58 MiB] Writing userdata.img [17,57 MiB]... OK (1,647s) Closing connection... OK Rebooting... OK UNLOCKTOOL 2022.06.11.0 Elapsed time : 1 minute 22 seconds |
![]() |
![]() | #234 (permalink) |
Major Poster ![]() ![]() Join Date: May 2022 Location: Germiston
Posts: 42
Member: 3013514 Status: Offline Thanks Meter: 2 | VNS-L31-P9 lite [USB 1.0] ERASE FRP Scanning port... COM14 Connecting to port... OK Connection : USB 1.0 Full-Speed USB Driver : [HUAWEI Incorporated] HSPL_usbvcom Selected Model : HiSilicon Kirin 650 Code Name : Hi650 Operation : Kirin Testpoint [1] **Authenticating... OK **Retrieving data... OK [1,13 MiB] Platform : HiSilicon Kirin 650 Writing sec_usb_xloader... OK 0,517s Writing sec_usb_fastboot... OK 22,533s Waiting for fastboot... OK Product Model : HUAWEI VNS-L31 Erasing FRP... OK UNLOCKTOOL 2022.05.19.0 Elapsed time : 40 seconds |
![]() |
![]() | #235 (permalink) |
Major Poster ![]() ![]() Join Date: May 2022 Location: Germiston
Posts: 42
Member: 3013514 Status: Offline Thanks Meter: 2 | [USB 1.0] ERASE FRP Scanning port... COM14 Connecting to port... OK Connection : USB 1.0 Full-Speed USB Driver : [HUAWEI Incorporated] HSPL_usbvcom Selected Model : HiSilicon Kirin 650 Code Name : Hi650 Operation : Kirin Testpoint [1] **Authenticating... OK **Retrieving data... OK [1,13 MiB] Platform : HiSilicon Kirin 650 Writing sec_usb_xloader... OK 0,495s Writing sec_usb_fastboot... OK 19,202s Waiting for fastboot... OK Product Model : HUAWEI VNS-L31 Erasing FRP... OK UNLOCKTOOL 2022.06.11.0 Elapsed time : 34 seconds |
![]() |
![]() | #236 (permalink) |
Major Poster ![]() ![]() Join Date: May 2022 Location: Germiston
Posts: 42
Member: 3013514 Status: Offline Thanks Meter: 2 | a325 scatter write FLASH Initializing usb... OK Waiting for device... COM7 [BOOTROM:0E8D:0003] Bypassing authentication... OK Analyzing preloader... preloader_k69v1_64_titan_marmot.bin [MT6769:12:2032] [Internal] Vendor : SAMSUNG Handshaking... OK Reading hardware info... OK * Hardware : MT6768 [Helio G70|G80|G85|P65] 0707 8A00 CA00 0000 * Security Config : SCB SLA DAA * MEID : 16BA62E1630CD620D5DB7EF0BC349662 Sending Download-Agent... OK Syncing with target... OK Booting device... OK Syncing with DA... OK **Storage : EMMC - CID : 44000115.41443656.701A0042.1D784ACE **Vendor : Samsung - Name : DV6DAB - Serial : 1255043098 - Rev : 0 **Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 16 MiB - User Area : 116,48 GiB Tips : GPT not initialized! Using scatter as partition map! Writing steady.img [4 MiB] -> steady [4 MiB]... OK Writing spmfw.img [1 MiB] -> spmfw [1 MiB]... OK Writing scp1.img [1 MiB] -> scp1 [1 MiB]... OK Writing sspm_1.img [1 MiB] -> sspm_1 [1 MiB]... OK Writing uh.img [2 MiB] -> uh [2 MiB]... OK Writing tee1.img [2 MiB] -> tee1 [2 MiB]... OK Writing tzar.img [4 MiB] -> tzar [4 MiB]... OK Writing lk.bin [2 MiB] -> lk [2 MiB]... OK Writing dtbo.img [8 MiB] -> dtbo [8 MiB]... OK Writing vbmeta.img [64 KiB] -> vbmeta [64 KiB]... OK Writing btd.img [2,94 MiB] -> btd [2,94 MiB]... OK Writing bota.img [45,5 MiB] -> bota [45,5 MiB]... OK Writing keyrefuge.img [16 MiB] -> keyrefuge [16 MiB]... OK Writing keydata.img [16 MiB] -> keydata [16 MiB]... OK Writing persistent.img [512 KiB] -> persistent [512 KiB]... OK Writing md1img.img [128 MiB] -> md1img [128 MiB]... OK Writing param.img [4 MiB] -> param [4 MiB]... OK Writing boot.img [32 MiB] -> boot [32 MiB]... OK Writing recovery.img [32 MiB] -> recovery [32 MiB]... OK Writing vbmeta_system.img [64 KiB] -> vbmeta_system [64 KiB]... OK Writing vbmeta_vendor.img [64 KiB] -> vbmeta_vendor [64 KiB]... OK Writing efuse.img [512 KiB] -> efuse [512 KiB]... OK Writing super.img [7,3 GiB] -> super [7,3 GiB]... OK Writing prism.img [880 MiB] -> prism [880 MiB]... OK Writing optics.img [24 MiB] -> optics [24 MiB]... OK Writing cache.img [200 MiB] -> cache [200 MiB]... OK Writing omr.img [50 MiB] -> omr [50 MiB]... OK Writing spu.img [50 MiB] -> spu [50 MiB]... OK Writing userdata.img [141,21 MiB] -> userdata [107,37 GiB]... OK UNLOCKTOOL 2022.05.19.0 Elapsed time : 5 minutes 47 seconds |
![]() |
![]() | #237 (permalink) |
Major Poster ![]() ![]() Join Date: May 2022 Location: Germiston
Posts: 42
Member: 3013514 Status: Offline Thanks Meter: 2 | [BROM] ERASE FRP Initializing usb... OK Waiting for device... COM4 [BOOTROM:0E8D:0003] Bypassing authentication... OK Analyzing preloader... preloader_k69v1_64_titan_marmot.bin [MT6769:12:2032] [Internal] Vendor : SAMSUNG Handshaking... OK Reading hardware info... OK * Hardware : MT6768 [Helio G70|G80|G85|P65] 0707 8A00 CA00 0000 * Security Config : SCB SLA DAA * MEID : 16BA62E1630CD620D5DB7EF0BC349662 Sending Download-Agent... OK Syncing with target... OK Booting device... OK Syncing with DA... OK **Storage : EMMC - CID : 44000115.41443656.701A0042.1D784ACE **Vendor : Samsung - Name : DV6DAB - Serial : 1255043098 - Rev : 0 **Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 16 MiB - User Area : 116,48 GiB Reading partition info... OK [49] Reading device info... OK ** Model Name : SM-A325F ** Product Name : a32xx ** Manufacturer : samsung ** Platform : k69v1_64_titan_marmot ** Android Version : 11 ** Security Patch : 2021-11-01 ** Build ID : RP1A.200720.012.A325FXXU2AUJ4 ** Build : A325FXXU2AUJ4 ** Build Date : Mon Oct 18 13:18:40 KST 2021 ** PDA : A325FXXU2AUJ4 Erasing FRP... OK UNLOCKTOOL 2022.05.19.0 Elapsed time : 16 seconds |
![]() |
![]() | #238 (permalink) |
Major Poster ![]() ![]() Join Date: May 2022 Location: Germiston
Posts: 42
Member: 3013514 Status: Offline Thanks Meter: 2 | [COM] REMOVE FRP [2022] Scanning for device... COM5 Connecting to port... OK Reading Info... OK Model Number : SM-A260F Country Code : XFA Serial Number : RZ8M73P6D2E Unique Number : C000105A0A50D56 Enabling ADB... OK Model : SM-A260F Manufacturer : samsung Platform : exynos5 CPU Arch : armeabi-v7a Android Serial : 380105a0a50d5611 Manufacturing Date : 20190723 Security Patch : 2019-04-01 Connection : sec_charging,adb Timezone : Africa/Johannesburg Knox Warranty : 0 - valid Android Version : 8.1.0 Android SDK : 27 Build : OPR6.A260FXXU1ASD2 Build Date : Fri Apr 12 17:57:48 KST 2019 Product Code : SM-A260FZRAXFA Samsung Serial : RZ8M73P6D2E Device Name : a2corelte Product Name : a2coreltejx Code Name : SM-A260FZRAXFA **BL : A260FXXU1ASD2 **PDA : A260FXXU1ASD2 **CP : A260FJVU1ASCA **CSC : A260FOJM1ASD2 Sales Code : XFA Removing FRP... OK UNLOCKTOOL 2022.05.19.0 Elapsed time : 15 seconds |
![]() |
![]() | #239 (permalink) |
Major Poster ![]() ![]() Join Date: May 2022 Location: Germiston
Posts: 42
Member: 3013514 Status: Offline Thanks Meter: 2 | [COM] REMOVE FRP [2022] Scanning for device... COM54 Connecting to port... OK Reading Info... OK Model Number : SM-A260F Country Code : XFV Serial Number : RF8M41YB5AF Unique Number : C000199ACF30B36 Enabling ADB... OK Model : SM-A260F Manufacturer : samsung Platform : exynos5 CPU Arch : armeabi-v7a Android Serial : 380199acf30b3623 Manufacturing Date : 20190413 Security Patch : 2021-07-01 Connection : sec_charging,adb Timezone : Africa/Johannesburg Knox Warranty : 0 - valid Android Version : 8.1.0 Android SDK : 27 Build : OPR6.A260FXXSDAUG2 Build Date : Thu Jul 1 16:46:22 KST 2021 Product Code : SM-A260FZBAXFV Samsung Serial : RF8M41YB5AF Device Name : a2corelte Product Name : a2coreltejx Code Name : SM-A260FZBAXFV **BL : A260FXXSDAUG2 **PDA : A260FXXSDAUG2 **CP : A260FJVSDAUE1 **CSC : A260FOJMDAUG2 Sales Code : XFV Removing FRP... OK UNLOCKTOOL 2022.05.27.2 Elapsed time : 15 seconds |
![]() |
![]() | #240 (permalink) |
Major Poster ![]() ![]() Join Date: May 2022 Location: Germiston
Posts: 42
Member: 3013514 Status: Offline Thanks Meter: 2 | FACTORY RESET Selected Model : Samsung Galaxy A01 Code Name : A015F | A015V | A015T Operation : Factory Reset [1] **Authenticating... OK **Retrieving data... OK [245,27 KiB] Initializing data... OK Searching for HS-USB QDLoader 9008... COM70 **Connection : USB 2.0 High-Speed **USB Driver : [Qualcomm Incorporated] qcusbser - Version : 2.1.2.0 Connecting to device... OK Handshaking... OK Reading bootloader info... OK **Serial : 1667358607 SoC : [Snapdragon 439] [SDM439] [0x000BF0E1] **OEM : Samsung [0x0020] Model : Unknown [0x0000] **PK_HASH[0] : 3CC959AC5B3364A42EC3CB40C091C90F **PK_HASH[1] : 2A8101F1C1207C5C9ED1D2348AA10082 Writing flash programmer... OK Connecting to flash programmer... OK Configuring device... OK Firehose config : eMMC [Sector:512] [Target:4096] [Host:1048576] Reading partition map... OK - LU Count : 1 Reading info... OK ** Model Name : SM-A015F ** Product Name : a01qxx ** Manufacturer : samsung ** Platform : QC_Reference_Phone ** Android Version : 10 ** Security Patch : 2020-03-01 ** Build ID : QP1A.190711.020.A015FXXU2ATB5 ** Build : A015FXXU2ATB5 ** Build Date : Sat Feb 29 01:09:19 KST 2020 ** PDA : A015FXXU2ATB5 Formatting USERDATA... OK Erasing FRP... OK Total sector : 64 Rebooting... OK UNLOCKTOOL 2022.05.04.0 Elapsed time : 19 seconds |
![]() |
![]() |
Bookmarks |
Thread Tools | |
Display Modes | |
| |
|