GSM Shop GSM Shop
GSM-Forum  

Welcome to the GSM-Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features.
Only registered members may post questions, contact other members or search our database of over 8 million posts.

Registration is fast, simple and absolutely free so please - Click to REGISTER!

If you have any problems with the registration process or your account login, please contact contact us .

Go Back   GSM-Forum > Product Support Sections > Hard/Software Products (official support) > UnlockTool

Reply
 
LinkBack Thread Tools Display Modes
Old 06-14-2022, 08:27   #226 (permalink)
No Life Poster
 
Join Date: Apr 2008
Location: South Africa
Posts: 718
Member: 746586
Status: Offline
Thanks Meter: 210
Donate money to this user

Selected Model : Oppo A53s (2020)
Code Name : CPH2139 | CPH2135
Operation : Factory Reset [4]
Authenticating... OK
Retrieving data... OK [273.7 KiB]
Initializing data... OK
Waiting for HS-USB QDLoader 9008... COM6
Connecting to device... OK
Handshaking... OK
Reading bootloader info... OK
Serial : 2815055530 SoC : [Snapdragon 460] [SM4250-AA] [0x001360E1]
OEM : Oppo/Oneplus [0x0051] Model : Unknown [0x0000]
PK_HASH[0] : 49445E14621312DFECCD4389F267E6B7
PK_HASH[1] : 1674DDD36B1BC41D1F605AA991D14AD6
Writing flash programmer... OK
Connecting to flash programmer... OK
Configuring device... OK
Firehose config : UFS [Sector:4096] [Target:0] [Host:1048576]
Erasing FRP... OK
Erasing USERDATA... OK
Rebooting... OK
  Reply With Quote
Old 06-14-2022, 09:22   #227 (permalink)
Freak Poster
 
Join Date: Oct 2020
Location: india
Posts: 184
Member: 2970939
Status: Offline
Thanks Meter: 50
Oppo F17 CPH2095 pattern lock done

[EDL] FACTORY RESET Selected Model : Oppo F17 (2020)
Code Name : CPH2095
Operation : Factory Reset [4]
**Authenticating... OK
**Retrieving data... OK [273.7 KiB]
Initializing data... OK
Waiting for HS-USB QDLoader 9008... COM13
Connecting to device... OK
Handshaking... OK
Reading bootloader info... OK
**Serial : 3143887302 SoC : [Snapdragon 662] [SM6115] [0x0014D0E1]
**OEM : Oppo/Oneplus [0x0051] Model : Unknown [0x0000]
**PK_HASH[0] : 49445E14621312DFECCD4389F267E6B7
**PK_HASH[1] : 1674DDD36B1BC41D1F605AA991D14AD6
Writing flash programmer... OK
Connecting to flash programmer... OK
Configuring device... OK
**Firehose config : UFS [Sector:4096] [Target:0] [Host:1048576]
Erasing FRP... OK
Erasing USERDATA... OK
Rebooting... OK
UNLOCKTOOL 2022.06.11.0
Elapsed time : 36 seconds
  Reply With Quote
Old 06-15-2022, 03:21   #228 (permalink)
No Life Poster
 
Join Date: Dec 2020
Location: ph
Age: 48
Posts: 593
Member: 2974628
Status: Offline
Sonork: 11223344
Thanks Meter: 179
Are-l22hn

EDL MODE
ARE-L22HN
FRP DONE


[EDL] ERASE FRP Selected Model : Huawei Honor 8X Max (V2)
Code Name : ARE-AL00 | L22HN | AL10_V2
Operation : Erase FRP [1]
**Authenticating... OK
**Retrieving data... OK [266.45 KiB]
Initializing data... OK
Waiting for HS-USB QDLoader 9008... COM4
Connecting to device... OK
Handshaking... OK
Reading bootloader info... OK
**Serial : 2050486599 SoC : [Snapdragon 660] [SDM660] [0x0008C0E1]
**OEM : Huawei [0x0015] Model : Unknown [0x0000]
**PK_HASH[0] : A1A5C29846C9881B7A6081EC218212B9
**PK_HASH[1] : B7EB1765EE8843798F16619D6FCD3FE0
Writing flash programmer... OK
Connecting to flash programmer... OK
Configuring device... OK
**Firehose config : eMMC [Sector:512] [Target:4096] [Host:1048576]
Reading partition map... OK - LU Count : 1
Reading software info... OK
** Model Name : sdm660_64
** Manufacturer : unknown
** Platform : sdm660
** Android Version : 8.1.0
** Security Patch : 2020-07-01
** Build ID : System 8.2.0.036(2E35)
** Build Date : Mon Aug 16 15:37:46 CST 2021
Erasing FRP... OK
Rebooting... OK
UNLOCKTOOL 2022.06.11.0
Elapsed time : 20 seconds
  Reply With Quote
Old 06-15-2022, 23:24   #229 (permalink)
Insane Poster
 
Join Date: Nov 2016
Location: Algérie
Posts: 70
Member: 2650328
Status: Offline
Thanks Meter: 4
[COM] REMOVE FRP [2022] Scanning for device... COM27
Connecting to port... OK
Reading Info... OK
Model Number : SM-A217F
Country Code : BTC
Serial Number : R58N85J52SL
Unique Number : CR8100527891057
Enabling ADB... OK
Model : SM-A217F
Manufacturer : samsung
Platform : universal3830
CPU Arch : arm64-v8a
Android Serial : R58N85J52SL
Manufacturing Date : 20200826
Security Patch : 2022-04-01
Connection : mtp,adb
Timezone : Africa/Algiers
Android Version : 11
Android SDK : 30
Build : RP1A.200720.012.A217FXXS8CVD1
Build Date : Mon Apr 25 12:37:08 +07 2022
Product Code : SM-A217FZKGBTC
Device Name : a21s
Product Name : a21snnxx
Code Name : SM-A217FZKGBTC
**BL : A217FXXS8CVD1
**PDA : A217FXXS8CVD1
**CP : A217FXXU8CVC2,A217FXXU8CVC2
**CSC : A217FOJM8CVC2
Sales Code : BTC
Removing FRP... OK
UNLOCKTOOL 2022.06.11.0
Elapsed time : 51 seconds
  Reply With Quote
Old 06-17-2022, 13:23   #230 (permalink)
No Life Poster
 
Join Date: Nov 2013
Location: pakistan P G L
Age: 39
Posts: 1,139
Member: 2067643
Status: Offline
Sonork: 1611265
Thanks Meter: 477
[COM] REMOVE FRP [2022] Scanning for device... COM27
Connecting to port... OK
Reading Info... OK
Model Number : SM-G930F
Country Code : XEU
Serial Number : R58HC0QNMRA
Unique Number : CE11160BBBF21D0B01
Enabling ADB... OK
Model : SM-G930F
Manufacturer : samsung
Platform : exynos5
CPU Arch : arm64-v8a
Android Serial : ce11160bbbf21d0b01
Manufacturing Date : 20161203
Security Patch : 2019-02-01
Connection : mtp,adb
Timezone : Asia/Karachi
Knox Warranty : 0 - valid
Android Version : 8.0.0
Android SDK : 26
Build : R16NW.G930FXXS4ESAE
Build Date : Tue Jan 29 17:48:31 KST 2019
Product Code : SM-G930FZKAXEU
Samsung Serial : R58HC0QNMRA
Device Name : herolte
Product Name : heroltexx
Code Name : SM-G930FZKAXEU
**BL : G930FXXS4ESAE
**PDA : G930FXXS4ESAE
**CP : G930FXXU4ESAE
**CSC : G930FXEU4ERKF
Sales Code : XEU
Removing FRP... OK
UNLOCKTOOL 2022.06.11.0
Elapsed time : 27 seconds
  Reply With Quote
Old 06-20-2022, 09:40   #231 (permalink)
Insane Poster
 
Join Date: May 2022
Location: Germiston
Posts: 70
Member: 3013514
Status: Offline
Thanks Meter: 10
frl-l22 frp

[BROM] ERASE HUAWEI ID Initializing usb... OK
Waiting for device... COM7 [BOOTROM:0E8D:0003]
Bypassing authentication... OK
Analyzing preloader... preloader_k69v1_64.bin [MT6769:25:4112] [Internal]
Handshaking... OK
Reading hardware info... OK
* Hardware : MT6768 [Helio G70|G80|G85|P65] 0707 8A00 CA00 0000
* Security Config : SCB SLA DAA
* MEID : 03B912C27DCD010D93EEABFDEA103D66
Sending Download-Agent... OK
Syncing with target... OK
Booting device... OK
Syncing with DA... OK
**Storage : EMMC - CID : 44000145.32313441.DF6C0138.6B681E67
**Vendor : Scandisk - Name : DA4128 - Serial : 510123884 - Rev : 1
**Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 16 MiB - User Area : 116,48 GiB
Erasing HUAWEI ID... OK
UNLOCKTOOL 2022.05.19.0
Elapsed time : 1 minute 2 seconds
  Reply With Quote
Old 06-20-2022, 09:43   #232 (permalink)
Insane Poster
 
Join Date: May 2022
Location: Germiston
Posts: 70
Member: 3013514
Status: Offline
Thanks Meter: 10
[COM] REMOVE FRP [2022] Scanning for device... COM69
Connecting to port... OK
Reading Info... OK
Model Number : SM-J410F
Country Code : XFA
Serial Number : R28M32TXCTX
Unique Number : CFE00BF4A96B936
Enabling ADB... OK
Model : SM-J410F
Manufacturer : samsung
Platform : msm8937
CPU Arch : armeabi-v7a
Android Serial : bf4a96b9
Manufacturing Date : 2019.03.28
Security Patch : 2020-12-01
Connection : sec_charging,adb
Timezone : Africa/Johannesburg
Knox Warranty : 0 - valid
Android Version : 8.1.0
Android SDK : 27
Build : M1AJB.J410FXXS2AUD1
Build Date : Fri Apr 23 15:45:43 KST 2021
Product Code : SM-J410FZKDXFA
Samsung Serial : R28M32TXCTX
Device Name : j4corelte
Product Name : j4coreltejx
Code Name : SM-J410FZKDXFA
**BL : J410FXXS2AUD1
**PDA : J410FXXS2AUD1
**CP : J410FXXS2ATF1
**CSC : J410FOJM2ASL2
Sales Code : XFA
Removing FRP... OK
UNLOCKTOOL 2022.05.04.0
Elapsed time : 20 seconds
  Reply With Quote
Old 06-20-2022, 09:44   #233 (permalink)
Insane Poster
 
Join Date: May 2022
Location: Germiston
Posts: 70
Member: 3013514
Status: Offline
Thanks Meter: 10
[ODIN] ERASE FRP Scanning for device... COM28
Connecting to port... OK
Reading Info... OK


Key Value
Model SM-J106F
Unique No C8G0116C52C1394
Storage Capacity 8G
Manufacturer HYNIX
Firmware Version 0
eMCP H8G4t2
Handshaking... OK
Initializing... OK
Changing download speed... HIGH
Reading PIT Mapping... OK
Platform : SPRD8735
Selected Model : Frp_SPRD_Samsung
Code Name : Frp_SPRD_Samsung
Operation : Eng Userdata [2]
**Authenticating... OK
**Retrieving data... OK [17,58 MiB]
Writing userdata.img [17,57 MiB]... OK (1,647s)
Closing connection... OK
Rebooting... OK
UNLOCKTOOL 2022.06.11.0
Elapsed time : 1 minute 22 seconds
  Reply With Quote
Old 06-20-2022, 09:45   #234 (permalink)
Insane Poster
 
Join Date: May 2022
Location: Germiston
Posts: 70
Member: 3013514
Status: Offline
Thanks Meter: 10
VNS-L31-P9 lite

[USB 1.0] ERASE FRP Scanning port... COM14
Connecting to port... OK
Connection : USB 1.0 Full-Speed
USB Driver : [HUAWEI Incorporated] HSPL_usbvcom
Selected Model : HiSilicon Kirin 650
Code Name : Hi650
Operation : Kirin Testpoint [1]
**Authenticating... OK
**Retrieving data... OK [1,13 MiB]
Platform : HiSilicon Kirin 650
Writing sec_usb_xloader... OK 0,517s
Writing sec_usb_fastboot... OK 22,533s
Waiting for fastboot... OK
Product Model : HUAWEI VNS-L31
Erasing FRP... OK
UNLOCKTOOL 2022.05.19.0
Elapsed time : 40 seconds
  Reply With Quote
Old 06-20-2022, 09:46   #235 (permalink)
Insane Poster
 
Join Date: May 2022
Location: Germiston
Posts: 70
Member: 3013514
Status: Offline
Thanks Meter: 10
[USB 1.0] ERASE FRP Scanning port... COM14
Connecting to port... OK
Connection : USB 1.0 Full-Speed
USB Driver : [HUAWEI Incorporated] HSPL_usbvcom
Selected Model : HiSilicon Kirin 650
Code Name : Hi650
Operation : Kirin Testpoint [1]
**Authenticating... OK
**Retrieving data... OK [1,13 MiB]
Platform : HiSilicon Kirin 650
Writing sec_usb_xloader... OK 0,495s
Writing sec_usb_fastboot... OK 19,202s
Waiting for fastboot... OK
Product Model : HUAWEI VNS-L31
Erasing FRP... OK
UNLOCKTOOL 2022.06.11.0
Elapsed time : 34 seconds
  Reply With Quote
Old 06-20-2022, 09:47   #236 (permalink)
Insane Poster
 
Join Date: May 2022
Location: Germiston
Posts: 70
Member: 3013514
Status: Offline
Thanks Meter: 10
a325 scatter write

FLASH Initializing usb... OK
Waiting for device... COM7 [BOOTROM:0E8D:0003]
Bypassing authentication... OK
Analyzing preloader... preloader_k69v1_64_titan_marmot.bin [MT6769:12:2032] [Internal]
Vendor : SAMSUNG
Handshaking... OK
Reading hardware info... OK
* Hardware : MT6768 [Helio G70|G80|G85|P65] 0707 8A00 CA00 0000
* Security Config : SCB SLA DAA
* MEID : 16BA62E1630CD620D5DB7EF0BC349662
Sending Download-Agent... OK
Syncing with target... OK
Booting device... OK
Syncing with DA... OK
**Storage : EMMC - CID : 44000115.41443656.701A0042.1D784ACE
**Vendor : Samsung - Name : DV6DAB - Serial : 1255043098 - Rev : 0
**Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 16 MiB - User Area : 116,48 GiB
Tips : GPT not initialized! Using scatter as partition map!
Writing steady.img [4 MiB] -> steady [4 MiB]... OK
Writing spmfw.img [1 MiB] -> spmfw [1 MiB]... OK
Writing scp1.img [1 MiB] -> scp1 [1 MiB]... OK
Writing sspm_1.img [1 MiB] -> sspm_1 [1 MiB]... OK
Writing uh.img [2 MiB] -> uh [2 MiB]... OK
Writing tee1.img [2 MiB] -> tee1 [2 MiB]... OK
Writing tzar.img [4 MiB] -> tzar [4 MiB]... OK
Writing lk.bin [2 MiB] -> lk [2 MiB]... OK
Writing dtbo.img [8 MiB] -> dtbo [8 MiB]... OK
Writing vbmeta.img [64 KiB] -> vbmeta [64 KiB]... OK
Writing btd.img [2,94 MiB] -> btd [2,94 MiB]... OK
Writing bota.img [45,5 MiB] -> bota [45,5 MiB]... OK
Writing keyrefuge.img [16 MiB] -> keyrefuge [16 MiB]... OK
Writing keydata.img [16 MiB] -> keydata [16 MiB]... OK
Writing persistent.img [512 KiB] -> persistent [512 KiB]... OK
Writing md1img.img [128 MiB] -> md1img [128 MiB]... OK
Writing param.img [4 MiB] -> param [4 MiB]... OK
Writing boot.img [32 MiB] -> boot [32 MiB]... OK
Writing recovery.img [32 MiB] -> recovery [32 MiB]... OK
Writing vbmeta_system.img [64 KiB] -> vbmeta_system [64 KiB]... OK
Writing vbmeta_vendor.img [64 KiB] -> vbmeta_vendor [64 KiB]... OK
Writing efuse.img [512 KiB] -> efuse [512 KiB]... OK
Writing super.img [7,3 GiB] -> super [7,3 GiB]... OK
Writing prism.img [880 MiB] -> prism [880 MiB]... OK
Writing optics.img [24 MiB] -> optics [24 MiB]... OK
Writing cache.img [200 MiB] -> cache [200 MiB]... OK
Writing omr.img [50 MiB] -> omr [50 MiB]... OK
Writing spu.img [50 MiB] -> spu [50 MiB]... OK
Writing userdata.img [141,21 MiB] -> userdata [107,37 GiB]... OK
UNLOCKTOOL 2022.05.19.0
Elapsed time : 5 minutes 47 seconds
  Reply With Quote
Old 06-20-2022, 09:48   #237 (permalink)
Insane Poster
 
Join Date: May 2022
Location: Germiston
Posts: 70
Member: 3013514
Status: Offline
Thanks Meter: 10
[BROM] ERASE FRP Initializing usb... OK
Waiting for device... COM4 [BOOTROM:0E8D:0003]
Bypassing authentication... OK
Analyzing preloader... preloader_k69v1_64_titan_marmot.bin [MT6769:12:2032] [Internal]
Vendor : SAMSUNG
Handshaking... OK
Reading hardware info... OK
* Hardware : MT6768 [Helio G70|G80|G85|P65] 0707 8A00 CA00 0000
* Security Config : SCB SLA DAA
* MEID : 16BA62E1630CD620D5DB7EF0BC349662
Sending Download-Agent... OK
Syncing with target... OK
Booting device... OK
Syncing with DA... OK
**Storage : EMMC - CID : 44000115.41443656.701A0042.1D784ACE
**Vendor : Samsung - Name : DV6DAB - Serial : 1255043098 - Rev : 0
**Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 16 MiB - User Area : 116,48 GiB
Reading partition info... OK [49]
Reading device info... OK
** Model Name : SM-A325F
** Product Name : a32xx
** Manufacturer : samsung
** Platform : k69v1_64_titan_marmot
** Android Version : 11
** Security Patch : 2021-11-01
** Build ID : RP1A.200720.012.A325FXXU2AUJ4
** Build : A325FXXU2AUJ4
** Build Date : Mon Oct 18 13:18:40 KST 2021
** PDA : A325FXXU2AUJ4
Erasing FRP... OK
UNLOCKTOOL 2022.05.19.0
Elapsed time : 16 seconds
  Reply With Quote
Old 06-20-2022, 09:49   #238 (permalink)
Insane Poster
 
Join Date: May 2022
Location: Germiston
Posts: 70
Member: 3013514
Status: Offline
Thanks Meter: 10
[COM] REMOVE FRP [2022] Scanning for device... COM5
Connecting to port... OK
Reading Info... OK
Model Number : SM-A260F
Country Code : XFA
Serial Number : RZ8M73P6D2E
Unique Number : C000105A0A50D56
Enabling ADB... OK
Model : SM-A260F
Manufacturer : samsung
Platform : exynos5
CPU Arch : armeabi-v7a
Android Serial : 380105a0a50d5611
Manufacturing Date : 20190723
Security Patch : 2019-04-01
Connection : sec_charging,adb
Timezone : Africa/Johannesburg
Knox Warranty : 0 - valid
Android Version : 8.1.0
Android SDK : 27
Build : OPR6.A260FXXU1ASD2
Build Date : Fri Apr 12 17:57:48 KST 2019
Product Code : SM-A260FZRAXFA
Samsung Serial : RZ8M73P6D2E
Device Name : a2corelte
Product Name : a2coreltejx
Code Name : SM-A260FZRAXFA
**BL : A260FXXU1ASD2
**PDA : A260FXXU1ASD2
**CP : A260FJVU1ASCA
**CSC : A260FOJM1ASD2
Sales Code : XFA
Removing FRP... OK
UNLOCKTOOL 2022.05.19.0
Elapsed time : 15 seconds
  Reply With Quote
Old 06-20-2022, 09:49   #239 (permalink)
Insane Poster
 
Join Date: May 2022
Location: Germiston
Posts: 70
Member: 3013514
Status: Offline
Thanks Meter: 10
[COM] REMOVE FRP [2022] Scanning for device... COM54
Connecting to port... OK
Reading Info... OK
Model Number : SM-A260F
Country Code : XFV
Serial Number : RF8M41YB5AF
Unique Number : C000199ACF30B36
Enabling ADB... OK
Model : SM-A260F
Manufacturer : samsung
Platform : exynos5
CPU Arch : armeabi-v7a
Android Serial : 380199acf30b3623
Manufacturing Date : 20190413
Security Patch : 2021-07-01
Connection : sec_charging,adb
Timezone : Africa/Johannesburg
Knox Warranty : 0 - valid
Android Version : 8.1.0
Android SDK : 27
Build : OPR6.A260FXXSDAUG2
Build Date : Thu Jul 1 16:46:22 KST 2021
Product Code : SM-A260FZBAXFV
Samsung Serial : RF8M41YB5AF
Device Name : a2corelte
Product Name : a2coreltejx
Code Name : SM-A260FZBAXFV
**BL : A260FXXSDAUG2
**PDA : A260FXXSDAUG2
**CP : A260FJVSDAUE1
**CSC : A260FOJMDAUG2
Sales Code : XFV
Removing FRP... OK
UNLOCKTOOL 2022.05.27.2
Elapsed time : 15 seconds
  Reply With Quote
Old 06-20-2022, 09:50   #240 (permalink)
Insane Poster
 
Join Date: May 2022
Location: Germiston
Posts: 70
Member: 3013514
Status: Offline
Thanks Meter: 10
FACTORY RESET Selected Model : Samsung Galaxy A01
Code Name : A015F | A015V | A015T
Operation : Factory Reset [1]
**Authenticating... OK
**Retrieving data... OK [245,27 KiB]
Initializing data... OK
Searching for HS-USB QDLoader 9008... COM70
**Connection : USB 2.0 High-Speed
**USB Driver : [Qualcomm Incorporated] qcusbser - Version : 2.1.2.0
Connecting to device... OK
Handshaking... OK
Reading bootloader info... OK
**Serial : 1667358607 SoC : [Snapdragon 439] [SDM439] [0x000BF0E1]
**OEM : Samsung [0x0020] Model : Unknown [0x0000]
**PK_HASH[0] : 3CC959AC5B3364A42EC3CB40C091C90F
**PK_HASH[1] : 2A8101F1C1207C5C9ED1D2348AA10082
Writing flash programmer... OK
Connecting to flash programmer... OK
Configuring device... OK
Firehose config : eMMC [Sector:512] [Target:4096] [Host:1048576]
Reading partition map... OK - LU Count : 1
Reading info... OK
** Model Name : SM-A015F
** Product Name : a01qxx
** Manufacturer : samsung
** Platform : QC_Reference_Phone
** Android Version : 10
** Security Patch : 2020-03-01
** Build ID : QP1A.190711.020.A015FXXU2ATB5
** Build : A015FXXU2ATB5
** Build Date : Sat Feb 29 01:09:19 KST 2020
** PDA : A015FXXU2ATB5
Formatting USERDATA... OK
Erasing FRP... OK
Total sector : 64
Rebooting... OK
UNLOCKTOOL 2022.05.04.0
Elapsed time : 19 seconds
  Reply With Quote
Reply

Bookmarks

Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


 



All times are GMT +1. The time now is 18:00.



Powered by Searchlight © 2024 Axivo Inc.
vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2024 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2023 -
Page generated in 0.13477 seconds with 9 queries

SEO by vBSEO