![]() ![]() ![]() ![]() |
![]() |
Welcome to the GSM-Forum forums. You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. Only registered members may post questions, contact other members or search our database of over 8 million posts. Registration is fast, simple and absolutely free so please - Click to REGISTER! If you have any problems with the registration process or your account login, please contact contact us . |
|
Register | FAQ | Donate | Forum Rules | Root any Device | ★iPhone Unlock★ | ★ Direct Codes ★ | Direct Unlock Source | Search | Today's Posts | Mark Forums Read |
![]() |
| LinkBack | Thread Tools | Display Modes |
![]() | #46 (permalink) |
Junior Member ![]() ![]() Join Date: Apr 2017 Location: India
Posts: 35
Member: 2710342 Status: Offline Thanks Meter: 0 | ![]() FLASH Selected Model : Realme C3 Code Name : RMX2021 / RMX2027_Auth_Bypass Operation : Auth Flash Authenticating... OK Retrieving data... OK [544.52 KiB] Initializing data... OK Waiting for device... COM16 Connection : USB 1.0 High-Speed USB Driver : [MediaTek Inc.] wdm_usb - Version : 3.0.1504.0 Boot Mode : BOOTROM [0E8D:0003] Bypassing authentication... OK Connecting to BROM... OK Sending DA... OK [250.57 KiB] Syncing with DA... OK HW Chip : MT6768 [6768] - HW Ver : 0xCA00 - SW Ver : 0x0000 Bootloader Ver : 0x00 - Secure Ver : 0x00 Internal RAM Size : 448 KiB External RAM Size : 4 GiB Storage : EMMC - CID : 44000115.4D383644.2A790242.37B644C2 Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 4 MiB - User Area : 29.12 GiB Downloading bootloader... OK [294.88 KiB] Downloading bootloader... OK [294.88 KiB] Writing vbmeta... OK [4 KiB] 0.006s Writing vbmeta_system... OK [4 KiB] 0.002s Writing vbmeta_vendor... OK [4 KiB] 0.002s Writing cdt_engineering... OK [1 MiB] 0.026s Writing logo... OK [1.89 MiB] 0.047s Writing md1img... OK [59.2 MiB] 1.637s Writing special_preload... OK [768 MiB] 22.451s Writing my_custom... OK [4.12 MiB] 0.137s Writing spmfw... OK [37.09 KiB] 0.003s Writing scp1... OK [684.61 KiB] 0.018s Writing scp2... OK [684.61 KiB] 0.018s Writing sspm_1... OK [490.23 KiB] 0.014s Writing sspm_2... OK [490.23 KiB] 0.013s Writing lk... OK [1.67 MiB] 0.042s Writing lk2... OK [1.67 MiB] 0.042s Writing boot... OK [32 MiB] 0.883s Writing dtbo... OK [178.5 KiB] 0.006s Writing tee1... OK [498.72 KiB] 0.014s Writing tee2... OK [498.72 KiB] 0.014s Writing super... OK [5.64 GiB] 168.021s Writing recovery... OK [64 MiB] 1.783s Writing cache... OK [176.19 KiB] 0.006s Writing userdata... OK [2.92 GiB] 87.347s Rebooting device... OK UNLOCKTOOL 2021.09.26.0 Elapsed time : 5 minutes Last edited by Isaac89; 09-30-2021 at 16:07. |
![]() |
![]() | #47 (permalink) |
Junior Member ![]() ![]() Join Date: Apr 2017 Location: India
Posts: 35
Member: 2710342 Status: Offline Thanks Meter: 0 | Oppo A15 CPH2185 Safe Format Wihout DATA LOSS Done by UnlockTool [IMG][/IMG] Code: SAFE FORMAT [KEEP DATA] Phone must have battery inside! Waiting for device... COM16 **Connection : USB 1.0 High-Speed **USB Driver : [MediaTek Inc.] wdm_usb - Version : 3.0.1504.0 **Boot Mode : BOOTROM [0E8D:0003] Handshaking... OK Reading hardware info... OK * Hardware code : MT6765 [0x766] * Hardware sw : 8A00 CA00 0000 * Security Config : [0xE5] [SCB : Yes] [SLA : No] [DAA : Yes] * MEID : 9F84B268D9F89363F5FF0DA0B2FCE5B2 Booting META mode... OK Phone must have battery inside! Waiting for device... COM46 **Connection : USB 2.0 High-Speed **USB Driver : [(Standard USB Host Controller)] usbccgp - Version : 3.0.1504.0 **Boot Mode : ETS [22D9:202D] Authenticating... OK Initializing META... OK Connecting to META... OK [Ver:0] [Rate:921600] Reading Software Info... OK **Brand : OPPO **Board : oppo6765 **Platform : mt6765 **Model : unknown **Android : 10 **Security Patch : 2020-10-05 **Build ID : CPH2185_11_A.05 **Build Date : Wed Oct 14 04:12:00 CST 2020 **Oppo Name : OPPO A15 Safe formatting data... OK Rebooting device... OK UNLOCKTOOL 2021.10.04.0 Elapsed time : 43 seconds ![]() |
![]() |
![]() | #48 (permalink) |
No Life Poster ![]() ![]() ![]() ![]() ![]() Join Date: Sep 2011 Location: a
Posts: 547
Member: 1647504 Status: Offline Thanks Meter: 237 | Vivo Y12s bypass FRP OK [BROM] ERASE FRP Selected Model : Vivo Y12s New Code Name : V2026/PD2036/PD2039F Operation : Erase FRP [1] Authenticating... OK Retrieving data... OK [478.56 KiB] Initializing data... OK Waiting for device... COM3 Connection : USB 1.0 High-Speed USB Driver : [MediaTek Inc.] wdm_usb - Version : 3.0.1504.0 Boot Mode : BOOTROM [0E8D:0003] Bypassing authentication... OK Connecting to BROM... OK Sending DA... OK [217.96 KiB] Syncing with DA... OK HW Chip : MT6765 [6765] - HW Ver : 0xCA00 - SW Ver : 0x0000 Bootloader Ver : 0x00 - Secure Ver : 0x00 Internal RAM Size : 224 KiB External RAM Size : 3 GiB Storage : EMMC - CID : 684A0190.50613842.3A00033E.7FA7017E Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 16 MiB - User Area : 29.12 GiB Reading partition info... OK [47] Formatting FRP... OK |
![]() |
![]() | #49 (permalink) |
No Life Poster ![]() ![]() ![]() ![]() ![]() Join Date: Apr 2008 Location: South Africa
Posts: 736
Member: 746586 Status: Offline Thanks Meter: 216 ![]() | Samsung A02 FRP Reset ERASE FRP Authenticating... OK Waiting for device... COM3 Connection : USB 1.0 High-Speed USB Driver : [MediaTek Inc.] wdm_usb - Version : 3.0.1504.0 Boot Mode : BOOTROM [0E8D:0003] Bypassing authentication... OK Analyzing preloader... preloader_k39tv1_bsp_titan_hamster.bin [EMI:7] [Internal] Handshaking... OK Reading hardware info... OK Hardware : MT6739 [0x699] 8A00 CA00 0000 Security Config : SCB SLA DAA MEID : 6E14D920A0A88D7F24372E10BA19F86C Sending Download-Agent... OK Syncing with target... OK Booting device... OK Syncing with DA... Storage : EMMC - CID : 51000115.41333658.E87D0042.1F4888CC Vendor : Samsung - Name : QX63AB - Serial : 2295130237 - Rev : 0 Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 16 MiB - User Area : 29.12 GiB Reading GPT... OK [50] Reading DEVINFO... Model Name : SM-A022F Product Name : a02xx Manufacturer : samsung Platform : k39tv1_bsp_titan_hamster Android Version : 10 Security Patch : 2021-05-01 Display ID : QP1A.190711.020.A022FXXU2AUF1 Build : A022FXXU2AUF1 Build Date : Tue Jun 1 18:00:23 KST 2021 PDA : A022FXXU2AUF1 Erasing FRP... OK UNLOCKTOOL |
![]() |
![]() | #50 (permalink) |
No Life Poster ![]() ![]() ![]() ![]() ![]() Join Date: Sep 2010 Location: Cali-Colombia Age: 47
Posts: 515
Member: 1389840 Status: Offline Sonork: 100.1627479 Thanks Meter: 114 | frp a21s done [ADB] REMOVE FRP Starting ADB Interface... OK Model : SM-A217M Manufacturer : samsung Platform : universal3830 CPU Arch : arm64-v8a Android Serial : RF8N81FNPHE Manufacturing Date : 20200813 Security Patch : 2021-07-01 Connection : mtp,adb Timezone : America/Bogota Android Version : 11 Android SDK : 30 Build : RP1A.200720.012.A217MUBU6CUG2 Build Date : Tue Jul 27 06:50:07 KST 2021 Product Code : SM-A217MZKKCOO IMEI : 355451114906510 IMEI2 : 355451114906510 Device Name : a21s Product Name : a21sub Code Name : SM-A217MZKKCOO **BL : A217MUBU6CUG2 **PDA : A217MUBU6CUG2 **CP : A217MUBU6CUG1,A217MUBU6CUG1 **CSC : A217MOWO6CUG2 Sales Code : COO Checking permission... no root Removing FRP... OK UNLOCKTOOL 2021.10.11.0 Elapsed time : 2 seconds ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() |
![]() |
The Following User Says Thank You to cerja For This Useful Post: |
![]() | #51 (permalink) |
No Life Poster ![]() ![]() ![]() ![]() ![]() Join Date: Apr 2008 Location: South Africa
Posts: 736
Member: 746586 Status: Offline Thanks Meter: 216 ![]() | Redmi Note 9 Mi Account Disable [MI] DISABLE MICLOUD Authenticating... OK Initializing usb... OK Waiting for device... COM26 **Connection : USB 1.0 High-Speed **USB Driver : [MediaTek Inc.] wdm_usb - Version : 3.0.1504.0 **Boot Mode : BOOTROM [0E8D:0003] Bypassing authentication... OK Analyzing preloader... preloader_merlin.bin[EMI:10] [Internal] Vendor : XIAOMI Handshaking... OK Reading hardware info... OK * Hardware : MT6768 [Helio G70|G80|G85|P65] [0x707] 8A00 CA00 0000 * Security Config : SCB SLA DAA * MEID : 9FC485E307135FAB745B888917B2620D Sending Download-Agent... OK Syncing with target... OK Booting device... OK Syncing with DA... **Storage : EMMC - CID : 534E0113.4A394A30.871F1038.5B87A7CB **Vendor : Micron - Name : S0J9J8 - Serial : 2815133471 - Rev : 16 **Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 16 MiB - User Area : 58.24 GiB Reading GPT... OK [48] Reading DEVINFO... ** Model Name : M2003J15SC ** Product Name : merlin_global ** Manufacturer : Xiaomi ** Platform : merlin ** Android Version : 10 ** Security Patch : 2021-02-01 ** Display ID : AL2522-Merlin-V101-Q-0223 ** Build : V12.0.7.0.QJOMIXM ** Build Date : Tue Feb 23 23:07:28 CST 2021 ** MIUI Version : V12 ** MIUI Build : V12.0.7.0.QJOMIXM Checking lockstate... LOCKED Reading unlock data... OK Unlocking bootloader... OK Disabling MiCloud... OK Resetting MiCloud... OK UNLOCKTOOL 2021.10.11.0 Elapsed time : 49 seconds |
![]() |
The Following User Says Thank You to apacheadmiral For This Useful Post: |
![]() | #52 (permalink) |
No Life Poster ![]() ![]() ![]() ![]() ![]() Join Date: Apr 2008 Location: South Africa
Posts: 736
Member: 746586 Status: Offline Thanks Meter: 216 ![]() | Samsung A02 FRP RESET ERASE FRP Authenticating... OK Initializing usb... OK Waiting for device... COM3 Connection : USB 1.0 High-Speed USB Driver : [MediaTek Inc.] wdm_usb - Version : 3.0.1504.0 Boot Mode : BOOTROM [0E8D:0003] Bypassing authentication... OK Analyzing preloader... preloader_k39tv1_bsp_titan_hamster.bin[EMI:7] [Internal] Handshaking... OK Reading hardware info... OK Hardware : MT6739 [0x699] 8A00 CB00 0002 Security Config : SCB SLA DAA MEID : B83F1ED003F05C25749A38722DD24A48 Sending Download-Agent... OK Syncing with target... OK Booting device... OK Syncing with DA... Storage : EMMC - CID : 51000115.41333658.29FB0042.61C7A7BA Vendor : Samsung - Name : QX63AB - Serial : 2813995515 - Rev : 0 Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 16 MiB - User Area : 29.12 GiB Reading GPT... OK [50] Reading DEVINFO... Model Name : SM-A022F Product Name : a02xx Manufacturer : samsung Platform : k39tv1_bsp_titan_hamster Android Version : 10 Security Patch : 2021-04-01 Display ID : QP1A.190711.020.A022FXXU2AUD4 Build : A022FXXU2AUD4 Build Date : Wed Apr 28 15:30:03 KST 2021 PDA : A022FXXU2AUD4 Erasing FRP... OK |
![]() |
The Following User Says Thank You to apacheadmiral For This Useful Post: |
![]() | #53 (permalink) |
No Life Poster ![]() ![]() ![]() ![]() ![]() Join Date: Apr 2008 Location: South Africa
Posts: 736
Member: 746586 Status: Offline Thanks Meter: 216 ![]() | OPPO A15 FORMAT DATA Waiting for device... COM3 Connection : USB 1.0 High-Speed USB Driver : [MediaTek Inc.] wdm_usb - Version : 3.0.1504.0 Boot Mode : BOOTROM [0E8D:0003] Bypassing authentication... OK Waiting for device... COM3 Connection : USB 1.0 High-Speed USB Driver : [MediaTek Inc.] wdm_usb - Version : 3.0.1504.0 Boot Mode : BOOTROM [0E8D:0003] Connecting to BROM... OK Sending DA... OK [211.62 KiB] Syncing with DA... OK HW Chip : MT6765 [6765] - HW Ver : 0xCA00 - SW Ver : 0x0000 Bootloader Ver : 0x00 - Secure Ver : 0x00 Internal RAM Size : 448 KiB External RAM Size : 2 GiB Storage : EMMC - CID : 34000115.4D4B3658.21FF0342.5777D3CE Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 4 MiB - User Area : 29.12 GiB Reading partition info... OK [47] Formatting USERDATA... OK UNLOCKTOOL 2021.10.11.0 Elapsed time : 50 seconds |
![]() |
The Following User Says Thank You to apacheadmiral For This Useful Post: |
![]() | #54 (permalink) |
No Life Poster ![]() ![]() ![]() ![]() ![]() ![]() ![]() Join Date: Dec 2005 Location: mt brazil
Posts: 3,396
Member: 211017 Status: Offline Thanks Meter: 313 | My first frp mtk samsung ERASE FRP Selected Model : Samsung A10s | M01S Code Name : SM-A107F | SM-A107M Operation : Erase FRP [3] **Authenticating... OK **Retrieving data... OK [481,67 KiB] Initializing data... OK Waiting for device... COM5 **Connection : USB 2.0 High-Speed **USB Driver : [MediaTek Inc.] wdm_usb - Version : 3.0.1504.0 **Boot Mode : PRELOADER [0E8D:2000] Jumping to BROM... OK Bypassing authentication... OK Connecting to BROM... OK Sending DA... OK [217,96 KiB] Syncing with DA... OK **HW Chip : MT6765 [6765] - HW Ver : 0xCA00 - SW Ver : 0x0000 **Bootloader Ver : 0x00 - Secure Ver : 0x00 **Internal RAM Size : 224 KiB **External RAM Size : 2 GiB **Storage : EMMC - CID : 51000115.4D333658.55C90042.71B70903 **Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 16 MiB - User Area : 29,12 GiB Erasing FRP... OK UNLOCKTOOL 2021.10.18.1 Elapsed time : 17 seconds |
![]() |
The Following User Says Thank You to turca For This Useful Post: |
![]() | #55 (permalink) |
Freak Poster ![]() ![]() ![]() ![]() Join Date: May 2016 Location: BRAZIL
Posts: 242
Member: 2578528 Status: Offline Thanks Meter: 143 | [EDL] RESET | DISABLE MI CLOUD Selected Model : Xiaomi Redmi Note 8 Code Name : Ginkgo Operation : Reset MiCloud [2] Authenticating... OK Retrieving data... OK [251,45 KiB] Initializing data... OK Searching for HS-USB QDLoader 9008... COM6 Connection : USB 2.0 High-Speed USB Driver : [Qualcomm Incorporated] qcusbser - Version : 2.1.2.2 Connecting to device... OK Handshaking... OK Reading bootloader info... OK Serial : 0 SoC : [] [] [0x00000000] OEM : Qualcomm [0x0000] Model : Unknown [0x0000] PK_HASH[0] : 00000000000000000000000000000000 PK_HASH[1] : 00000000000000000000000000000000 Sahara mode corrupted! You might need to enter EDL again! Writing flash programmer... FAIL [Sahara] Image Load - Firehose does not match this device! UNLOCKTOOL |
![]() |
![]() | #56 (permalink) |
Freak Poster ![]() ![]() ![]() ![]() Join Date: May 2016 Location: BRAZIL
Posts: 242
Member: 2578528 Status: Offline Thanks Meter: 143 | [EDL] RESET | DISABLE MI CLOUD Selected Model : Xiaomi Redmi Note 8 Code Name : Ginkgo Operation : Reset MiCloud [2] Authenticating... OK Retrieving data... OK [251,45 KiB] Initializing data... OK Searching for HS-USB QDLoader 9008... COM6 Connection : USB 2.0 High-Speed USB Driver : [Qualcomm Incorporated] qcusbser - Version : 2.1.2.2 Connecting to device... OK Handshaking... OK Reading bootloader info... OK Serial : 0 SoC : [] [] [0x00000000] OEM : Qualcomm [0x0000] Model : Unknown [0x0000] PK_HASH[0] : 00000000000000000000000000000000 PK_HASH[1] : 00000000000000000000000000000000 Sahara mode corrupted! You might need to enter EDL again! Writing flash programmer... FAIL [Sahara] Image Load - Firehose does not match this device! UNLOCKTOOL |
![]() |
![]() | #57 (permalink) | |
Freak Poster ![]() ![]() ![]() ![]() Join Date: Apr 2021 Location: VIET NAM
Posts: 241
Member: 2985732 Status: Offline Thanks Meter: 775 | Quote:
https://unlocktool.net/download/ | |
![]() |
![]() |
Bookmarks |
Thread Tools | |
Display Modes | |
| |
|