GSM Shop  
GSM Shop GSM Shop
GSM-Forum  

Welcome to the GSM-Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features.
Only registered members may post questions, contact other members or search our database of over 8 million posts.

Registration is fast, simple and absolutely free so please - Click to REGISTER!

If you have any problems with the registration process or your account login, please contact contact us .

Go Back   GSM-Forum > Product Support Sections > Hard/Software Products (official support) > UnlockTool

Reply
 
LinkBack Thread Tools Display Modes
Old 10-24-2023, 09:28   #751 (permalink)
No Life Poster
 
Join Date: May 2005
Location: Bulgaria
Age: 50
Posts: 1,802
Member: 142632
Status: Online
Sonork: 100.1589012
Thanks Meter: 460
Samsung A51 Remove FRP OK !


[COM] REMOVE FRP [2023] Scanning for device... COM8
Reading Info... FAIL
Trying method [1]... OK
Waiting for device...
Model : SM-A515F
Manufacturer : samsung
Platform : universal9611
CPU Arch : arm64-v8a
Android Serial : R58N10G793L
Manufacturing Date : 20200103
Security Patch : 2022-09-01
Connection : mtp,adb
Timezone : Europe/Sofia
Android Version : 12
Android SDK : 31
Build : SP1A.210812.016.A515FXXS5FVI2
Build Date : Tue Sep 20 20:31:35 KST 2022
Product Code : SM-A515FZKVDBT
Device Name : a51
Product Name : a51nseea
Code Name : SM-A515FZKVDBT
**BL : A515FXXS5FVI2
**PDA : A515FXXS5FVI2
**CP : A515FXXU5FVG3,A515FXXU5FVG3
**CSC : A515FOXM5FVH1
Sales Code : DBT
Removing FRP... OK
UNLOCKTOOL 2023.10.17.0
Elapsed time : 28 seconds
  Reply With Quote
Old 10-24-2023, 09:57   #752 (permalink)
No Life Poster
 
blinet's Avatar
 
Join Date: Nov 2002
Location: Slovakia
Age: 40
Posts: 1,092
Member: 17405
Status: Offline
Thanks Meter: 358
Redmi A2 - frp

[BROM] ERASE FRP Initializing usb... OK
Waiting for device... COM56 [BOOTROM:0E8D:0003]
Bypassing authentication... OK
Analyzing... preloader_water.bin [MT6765:7:1232] [Internal]
Handshaking... OK
Reading hardware info... OK
Hardware : MT6765 [Helio G25|G35|P35] 0766 8A00 CA00 0000
Security Config : SCB SLA DAA
MEID : CC4301CBCAE8C7DEAC16B55359BB5DFA
Sending Download-Agent [1]... OK
Syncing with device... OK
Booting device... OK
Syncing with DA... OK
Storage : EMMC - CID : 4D002DD6.3233434D.40B5147.A1C9BA79
Vendor : Samsung - Name : MMC32G - Serial : 3128493067 - Rev : 81
Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 4 MiB - User Area : 29,12 GiB
Reading partition info... OK [56]
Reading device info... SKIP [EROFS]
Erasing FRP... OK

UNLOCKTOOL 2023.10.17.0
Elapsed time : 19 seconds
  Reply With Quote
Old 10-26-2023, 18:44   #753 (permalink)
Junior Member
 
Join Date: Jun 2008
Location: Bahia-Brazil
Age: 52
Posts: 36
Member: 795630
Status: Offline
Thanks Meter: 10
Nokia C01 Plus FRP by EDL!!

[SPRD] FACTORY RESET Selected Platform : SC9863A_64_Bypass
Connect Testpoint or hold VOL DOWN! Instruction here!
Waiting for device... COM12 (SPRD U2S Diag)
USB : USB\VID_1782&PID_4D00\6&C1A2E2F&0&2
Initializing loader... OK
Protocol : SPRD3
Sending payload... OK
Sending auth data... OK
Sending preloader1... OK
Sending preloader2... OK
Booting loader, please wait... OK
Boot ver: Spreadtrum Boot Block version 1.1
Sending FDL1... OK
Sending FDL2... OK
Reading partitions info... OK [76]
Reading device info... OK [super]
** Model Name : Nokia C01 Plus
** Product Name : IRS
** Manufacturer : Nokia
** Android Version : 11
** Security Patch : 2023-05-05
** Build ID : 00WW_1_400
** Build Date : Wed May 31 18:03:07 CST 2023
Erasing FRP (persist)... OK
Erasing USERDATA... OK
UNLOCKTOOL 2023.10.24.0
Elapsed time : 25 seconds

We are waiting for support for MiUI 13 (Xiaomi), Pissaro, Fog, etc...
  Reply With Quote
Old 10-30-2023, 10:55   #754 (permalink)
No Life Poster
 
unlock_allgsm's Avatar
 
Join Date: Oct 2011
Location: gsmsection
Posts: 758
Member: 1678945
Status: Offline
Sonork: 100.1620753
Thanks Meter: 107
samsung a13 android 13

[COM] REMOVE FRP [2023] Method : [2]
Scanning for device... COM63
Reading Info... FAIL
Enabling ADB... OK
Waiting for device...
Model : SM-A137F
Manufacturer : samsung
Platform : mt6768
CPU Arch : armeabi-v7a
Android Serial : R58TA02NEXV
Manufacturing Date : 20221003
Security Patch : 2023-06-01
Connection : mtp,adb
Timezone : Africa/Casablanca
Android Version : 13
Android SDK : 33
Build : TP1A.220624.014.A137FXXU3CWE1
Build Date : Mon May 29 10:28:37 +07 2023
Product Code : SM-A137FZWHXSG
Device Name : a13ve
Product Name : a13vennxx
Code Name : SM-A137FZWHXSG
**BL : A137FXXU3CWE1
**PDA : A137FXXU3CWE1
**CP : A137FXXU3CWE1,A137FXXU3CWE1
**CSC : A137FOJM3CWE1
Sales Code : XSG
Removing FRP... OK
UNLOCKTOOL 2023.10.29.0
Elapsed time : 4 minutes
  Reply With Quote
Old 10-31-2023, 14:26   #755 (permalink)
Freak Poster
 
Join Date: Jun 2011
Location: galaxy
Posts: 347
Member: 1589971
Status: Offline
Thanks Meter: 151
Samsung A02S (A025F) Frp done

ERASE FRP Selected Model : Samsung Galaxy A02s
Code Name : SM-A025F
Operation : Erase FRP [1]
**Authenticating... OK
**Retrieving data... OK [233.21 KiB]
Initializing data... OK
Waiting for HS-USB QDLoader 9008... COM25
Connecting to device... OK
Handshaking... OK
Reading bootloader info... OK
**Serial : 982798091 SoC : [Snapdragon 450] [SDM450] [0x0009A0E1]
**OEM : Samsung [0x0020] Model : Unknown [0x0000]
**PK_HASH[0] : C8C8DD565BF1D8407777A58F8A8E580E
**PK_HASH[1] : 00207116E0222C9AB19F3E1F88599034
Writing flash programmer... OK
Connecting to flash programmer... OK
Configuring device... OK
**Firehose config : eMMC [Sector:512] [Target:4096] [Host:1048576]
Reading partition map... OK - LU Count : 1
Reading software info... OK [super]
** Model Name : SM-A025F
** Product Name : a02qnnxx
** Manufacturer : samsung
** Platform : QC_Reference_Phone
** Android Version : 12
** Security Patch : 2023-04-01
** Build ID : SP1A.210812.016.A025FXXU6CWE2
** Build : A025FXXU6CWE2
** Build Date : Tue May 16 17:44:20 +07 2023
** Code Name : SM-A025F
** PDA : A025FXXU6CWE2
Erasing FRP... OK
Rebooting... OK
UNLOCKTOOL 2023.10.29.0
Elapsed time : 28 seconds
  Reply With Quote
Old 11-01-2023, 11:10   #756 (permalink)
No Life Poster
 
Join Date: Feb 2006
Location: Anywhere
Posts: 2,888
Member: 233142
Status: Offline
Sonork: 100.1595099
Thanks Meter: 535
Donate money to this user
Orange sanza touch format done

FORMAT DATA Selected Platform : SC9832E_Bypass
Connect Testpoint or hold VOL DOWN! Instruction here!
Waiting for device... COM4 (SPRD U2S Diag)
USB : USB\VID_1782&PID_4D00\6&205AB8D&0&3
Initializing loader... OK
Protocol : SPRD3
Sending payload... OK
Sending auth data... OK
Sending preloader1... OK
Sending preloader2... OK
Booting loader, please wait... OK
Boot ver: Spreadtrum Boot Block version 1.1
Sending FDL1... OK
Sending FDL2... OK
Reading partitions info... OK [40]
Reading device info... OK [super]
** Model Name : Orange Sanza touch
** Product Name : Sanza_touch_Lock
** Manufacturer : Orange
** Platform : sp9832e_1h10_go
** Android Version : 10
** Security Patch : 2020-08-05
** Build ID : M681F4_00.60.01RPD_MEA.SKU1_20200827
** Build Date : Fri Aug 21 18:46:34 CST 2020
Erasing FRP (persist)... OK
Erasing USERDATA... OK
UNLOCKTOOL 2023.10.29.0
Elapsed time : 23 seconds
  Reply With Quote
Old 11-01-2023, 14:57   #757 (permalink)
Freak Poster
 
Join Date: Jun 2011
Location: galaxy
Posts: 347
Member: 1589971
Status: Offline
Thanks Meter: 151
Infinix Hot 11 (X662B) Frp done

ERASE FRP Initializing usb... OK
Waiting for device... COM58 [BOOTROM:0E8D:0003]
Bypassing authentication... OK
Analyzing... preloader_x662b_h6913.bin [MT6769:7:1232] [Internal]
Handshaking... OK
Reading hardware info... OK
* Hardware : MT6768 [Helio G70|G80|G85|P65] 0707 8A00 CA00 0000
* Security Config : SCB SLA DAA
* MEID : 4BBBD547CF940E581E30A0D284EDEFBB
Sending Download-Agent [1]... OK
Syncing with device... OK
Booting device... OK
Syncing with DA... OK
**Storage : EMMC - CID : 44000115.41443656.19590242.E188B4F2
**Vendor : Samsung - Name : DV6DAB - Serial : 3035765081 - Rev : 2
**Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 16 MiB - User Area : 116.48 GiB
Reading partition info... OK [49]
Reading device info... OK [super]
** Model Name : Infinix X662B
** Product Name : X662B-GL
** Manufacturer : INFINIX MOBILITY LIMITED
** Platform : Infinix-X662B
** Android Version : 11
** Security Patch : 2023-02-01
** Build ID : INFINIX-R-64-230213V208
** Build : 230213V338
** Build Date : Mon Feb 13 17:40:31 CST 2023
Erasing FRP... OK
UNLOCKTOOL 2023.10.29.0
Elapsed time : 16 seconds
  Reply With Quote
Old 11-02-2023, 08:21   #758 (permalink)
No Life Poster
 
Join Date: Dec 2009
Location: pakistan
Posts: 1,129
Member: 1189561
Status: Offline
Thanks Meter: 743
oppo a71 reset patren

[EDL] FACTORY RESET
Selected Model : Oppo A71
Code Name : CPH1801
Operation : Factory Reset [1]
Authenticating... OK
Retrieving data... OK [222.87 KiB]
Initializing data... OK
Waiting for HS-USB QDLoader 9008... COM35
Connecting to device... OK
Handshaking... OK
Reading bootloader info... OK
Serial : 2266009527 SoC : [Snapdragon 450] [SDM450] [0x0009A0E1]
OEM : Qualcomm [0x0000] Model : Unknown [0x0000]
PK_HASH[0] : 05F06BA44EEB2ABDF14BB644AABC2E69
PK_HASH[1] : 3DDF7B8711CC7CF07D4CD0EB2E1A8728
Writing flash programmer... OK
Validating programmer... OK
Connecting to flash programmer... OK
Configuring device... OK
Firehose config : eMMC [Sector:512] [Target:4096] [Host:1048576]
Erasing USERDATA... OK
Please reboot phone normaly then select RESET PHONE UNLOCKTOOL 2023.10.29.0
Elapsed time : 1 minute 27 seconds
  Reply With Quote
Old 11-02-2023, 08:21   #759 (permalink)
No Life Poster
 
Join Date: Dec 2009
Location: pakistan
Posts: 1,129
Member: 1189561
Status: Offline
Thanks Meter: 743
oppo a71 reset patren

[EDL] FACTORY RESET
Selected Model : Oppo A71
Code Name : CPH1801
Operation : Factory Reset [1]
Authenticating... OK
Retrieving data... OK [222.87 KiB]
Initializing data... OK
Waiting for HS-USB QDLoader 9008... COM35
Connecting to device... OK
Handshaking... OK
Reading bootloader info... OK
Serial : 2266009527 SoC : [Snapdragon 450] [SDM450] [0x0009A0E1]
OEM : Qualcomm [0x0000] Model : Unknown [0x0000]
PK_HASH[0] : 05F06BA44EEB2ABDF14BB644AABC2E69
PK_HASH[1] : 3DDF7B8711CC7CF07D4CD0EB2E1A8728
Writing flash programmer... OK
Validating programmer... OK
Connecting to flash programmer... OK
Configuring device... OK
Firehose config : eMMC [Sector:512] [Target:4096] [Host:1048576]
Erasing USERDATA... OK
Please reboot phone normaly then select RESET PHONE UNLOCKTOOL 2023.10.29.0
Elapsed time : 1 minute 27 seconds
  Reply With Quote
Old 11-02-2023, 08:22   #760 (permalink)
No Life Poster
 
Join Date: Dec 2009
Location: pakistan
Posts: 1,129
Member: 1189561
Status: Offline
Thanks Meter: 743
oppo a53 patren frp

Selected Model : Oppo A53 (2020)
Code Name : CPH2127
Operation : Factory Reset [4]
Authenticating... OK
Retrieving data... OK [273.7 KiB]
Initializing data... OK
Waiting for HS-USB QDLoader 9008... COM17
Connecting to device... OK
Handshaking... OK
Reading bootloader info... OK
Serial : 1900690129 SoC : [Snapdragon 460] [SM4250-AA] [0x001360E1]
OEM : Oppo/Oneplus [0x0051] Model : Unknown [0x0000]
PK_HASH[0] : 49445E14621312DFECCD4389F267E6B7
PK_HASH[1] : 1674DDD36B1BC41D1F605AA991D14AD6
Writing flash programmer... OK
Connecting to flash programmer... OK
Configuring device... OK
Firehose config : UFS [Sector:4096] [Target:0] [Host:1048576]
Erasing FRP... OK
Erasing USERDATA... OK
Rebooting... OK
  Reply With Quote
The Following User Says Thank You to M.AKHTER For This Useful Post:
Old 11-02-2023, 08:22   #761 (permalink)
No Life Poster
 
Join Date: Dec 2009
Location: pakistan
Posts: 1,129
Member: 1189561
Status: Offline
Thanks Meter: 743
infinix x6816 frp adb

Starting ADB Interface... OK
Model : Infinix X6816C
Manufacturer : INFINIX MOBILITY LIMITED
Platform : ums512
CPU Arch : arm64-v8a
Android Serial : 079481525N011422
Security Patch : 2022-09-05
Connection : adb
Timezone : Asia/Karachi
Android Version : 11
Android SDK : 30
Build : X6816C-ST683SBCDS-R-GL-220908V11
Build Date : Thu Sep 8 22:43:22 CST 2022
IMEI : 353575323414569
IMEI2 : 353575323414569
Device Name : Infinix-X6816C
Product Name : X6816C-GL
CP : 4G_MODEM_20A_W22.28.2|sharkl5pro_modem,4G_MODEM_20 A_W22.28.2|sharkl5pro_modem
Checking permission... no root
Removing FRP... OK
UNLOCKTOOL 2023.10.29.0
Elapsed time : 1 second
  Reply With Quote
Old 11-05-2023, 06:37   #762 (permalink)
No Life Poster
 
Join Date: Feb 2006
Location: Anywhere
Posts: 2,888
Member: 233142
Status: Offline
Sonork: 100.1595099
Thanks Meter: 535
Donate money to this user
Tecno bf6 format data done

FORMAT DATA Selected Platform : SC9863A_32_Bypass
Connect Testpoint or hold VOL DOWN! Instruction here!
Waiting for device... COM4 (SCI USB2Serial)
USB : USB\VID_1782&PID_4D00\6&205AB8D&0&1
Initializing loader... OK
Protocol : SPRD3
Sending payload... OK
Sending auth data... OK
Sending preloader1... OK
Sending preloader2... OK
Booting loader, please wait... OK
Boot ver: Spreadtrum Boot Block version 1.1
Sending FDL1... OK
Sending FDL2... OK
Reading partitions info... OK [70]
Reading device info... FAIL
[EXT4] Invalid header magic!
Erasing FRP (persist)... OK
Erasing USERDATA... OK
UNLOCKTOOL 2023.10.29.0
Elapsed time : 31 seconds
  Reply With Quote
Old 11-06-2023, 14:22   #763 (permalink)
Freak Poster
 
Join Date: Jun 2011
Location: galaxy
Posts: 347
Member: 1589971
Status: Offline
Thanks Meter: 151
Vivo Y71 (1724) Logo Restart problem solved

EDL FLASH Selected Model : Vivo Y71 (1724)
Code Name : PD1731F/PD1731BF
Operation : Auth Flash
**Authenticating... OK
**Retrieving data... OK [191.1 KiB]
Initializing data... OK
Waiting for HS-USB QDLoader 9008... COM56
Connecting to device... OK
Handshaking... OK
Reading bootloader info... OK
**Serial : 3286015666 SoC : [Snapdragon 425] [MSM8917] [0x000560E1]
**OEM : Qualcomm [0x0000] Model : Unknown [0x0000]
**PK_HASH[0] : 60BA997FEF6DA9F05885FA11F1DD6D2A
**PK_HASH[1] : 90D052A257A09C2075D7246CC73C0D43
Writing flash programmer... OK
Connecting to flash programmer... OK
Configuring device... OK
**Firehose config : eMMC [Sector:512] [Target:4096] [Host:1048576]

Processing LUN0 - rawprogram_unsparse_no_qcn.xml
*Writing NON-HLOS.bin [fat:128 MiB]->modem... OK 6.229s
*Writing sbl1.mbn [elf:289.72 KiB]->sbl1... OK 0.114s
*Writing sbl1.mbn [elf:289.72 KiB]->sbl1bak... OK 0.116s
*Writing rpm.mbn [elf:180.39 KiB]->rpm... OK 0.118s
*Writing rpm.mbn [elf:180.39 KiB]->rpmbak... OK 0.110s
*Writing tz.mbn [elf:1.48 MiB]->tz... OK 0.218s
*Writing tz.mbn [elf:1.48 MiB]->tzbak... OK 0.226s
*Writing devcfg.mbn [elf:60.17 KiB]->devcfg... OK 0.104s
*Writing devcfg.mbn [elf:60.17 KiB]->devcfgbak... OK 0.105s
*Writing adspso.bin [ext4:16 MiB]->dsp... OK 0.917s
*Writing sec.dat [raw:436 bytes]->sec... OK 0.103s
*Writing emmc_appsboot.mbn [elf:6.57 MiB]->aboot... OK 0.427s
*Writing emmc_appsboot.mbn [elf:6.57 MiB]->abootbak... OK 0.452s
*Writing boot.img [kernel:26.88 MiB]->boot... OK 1.412s
*Writing recovery.img [kernel:39.91 MiB]->recovery... OK 1.984s
*Writing system_1.img [ext4:128.01 MiB]->system... OK 6.090s
*Writing system_2.img [raw:8 KiB]->system... OK 0.104s
*Writing system_3.img [raw:125.15 MiB]->system... OK 5.902s
*Writing system_4.img [raw:126.03 MiB]->system... OK 5.970s
*Writing system_5.img [raw:8 KiB]->system... OK 0.105s
*Writing system_6.img [raw:125.15 MiB]->system... OK 5.984s
*Writing system_7.img [raw:126.03 MiB]->system... OK 5.986s
*Writing system_8.img [raw:8 KiB]->system... OK 0.102s
*Writing system_9.img [raw:125.15 MiB]->system... OK 5.932s
*Writing system_10.img [raw:126.03 MiB]->system... OK 5.955s
*Writing system_11.img [raw:8 KiB]->system... OK 0.103s
*Writing system_12.img [raw:125.15 MiB]->system... OK 7.394s
*Writing system_13.img [raw:126.03 MiB]->system... OK 6.347s
*Writing system_14.img [raw:8 KiB]->system... OK 0.103s
*Writing system_15.img [elf:125.15 MiB]->system... OK 5.955s
*Writing system_16.img [raw:126.03 MiB]->system... OK 6.009s
*Writing system_17.img [raw:126.03 MiB]->system... OK 5.965s
*Writing system_18.img [raw:38.81 MiB]->system... OK 1.909s
*Writing system_19.img [raw:8 KiB]->system... OK 0.103s
*Writing system_20.img [elf:96.5 MiB]->system... OK 4.515s
*Writing system_21.img [raw:8 KiB]->system... OK 0.103s
*Writing system_22.img [elf:126.03 MiB]->system... OK 5.992s
*Writing system_23.img [elf:126.03 MiB]->system... OK 6.239s
*Writing system_24.img [raw:126.03 MiB]->system... OK 8.785s
*Writing system_25.img [raw:126.03 MiB]->system... OK 6.753s
*Writing system_26.img [raw:126.03 MiB]->system... OK 5.958s
*Writing system_27.img [elf:126.03 MiB]->system... OK 5.951s
*Writing system_28.img [elf:126.03 MiB]->system... OK 7.542s
*Writing system_29.img [elf:126.03 MiB]->system... OK 6.171s
*Writing system_30.img [raw:126.03 MiB]->system... OK 5.913s
*Writing system_31.img [raw:126.03 MiB]->system... OK 5.927s
*Writing system_32.img [raw:126.03 MiB]->system... OK 6.039s
*Writing system_33.img [raw:8 KiB]->system... OK 0.103s
*Writing system_34.img [raw:125.15 MiB]->system... OK 6.250s
*Writing system_35.img [elf:126.03 MiB]->system... OK 7.423s
*Writing system_36.img [raw:8 KiB]->system... OK 0.103s
*Writing system_37.img [raw:125.14 MiB]->system... OK 6.393s
*Writing vendor_1.img [ext4:128.01 MiB]->vendor... OK 8.216s
*Writing vendor_2.img [raw:8 KiB]->vendor... OK 0.103s
*Writing vendor_3.img [elf:316 KiB]->vendor... OK 0.220s
*Writing vendor_4.img [raw:8 KiB]->vendor... OK 0.103s
*Writing vendor_5.img [elf:22.07 MiB]->vendor... OK 1.631s
*Writing vendor_6.img [raw:8 KiB]->vendor... OK 0.103s
*Writing vendor_7.img [raw:8 KiB]->vendor... OK 0.103s
*Writing vendor_8.img [elf:125.78 MiB]->vendor... OK 7.196s
*Writing vendor_9.img [elf:126.03 MiB]->vendor... OK 6.015s
*Writing vendor_10.img [raw:8 KiB]->vendor... OK 0.102s
*Writing vendor_11.img [elf:125.78 MiB]->vendor... OK 7.752s
*Writing vendor_12.img [elf:126.03 MiB]->vendor... OK 7.018s
*Writing vendor_13.img [raw:8 KiB]->vendor... OK 0.104s
*Writing vendor_14.img [raw:125.77 MiB]->vendor... OK 6.409s
*Writing cache_1.img [ext4:6.09 MiB]->cache... OK 0.619s
*Writing cache_2.img [raw:8 KiB]->cache... OK 0.103s
*Writing cache_3.img [raw:8 KiB]->cache... OK 0.103s
*Writing oem_1.img [ext4:7.3 MiB]->oem... OK 0.551s
*Writing oem_2.img [raw:1.04 MiB]->oem... OK 0.237s
*Writing mdtp.img [raw:16.98 MiB]->mdtp... OK 1.129s
*Writing cmnlib_30.mbn [elf:208.84 KiB]->cmnlib... OK 0.113s
*Writing cmnlib_30.mbn [elf:208.84 KiB]->cmnlibbak... OK 0.112s
*Writing cmnlib64_30.mbn [elf:262.78 KiB]->cmnlib64... OK 0.115s
*Writing cmnlib64_30.mbn [elf:262.78 KiB]->cmnlib64bak... OK 0.115s
*Writing keymaster64.mbn [elf:265.12 KiB]->keymaster... OK 0.145s
*Writing keymaster64.mbn [elf:265.12 KiB]->keymasterbak... OK 0.115s
*Writing survival.img [kernel:43.07 MiB]->survival... OK 2.131s
*Writing userdata_1.img [ext4:128.01 MiB]->userdata... OK 6.076s
*Writing userdata_2.img [raw:8 KiB]->userdata... OK 0.102s
*Writing userdata_3.img [raw:8 KiB]->userdata... OK 0.103s
*Writing userdata_4.img [raw:126 MiB]->userdata... OK 6.091s
*Writing userdata_5.img [raw:8 KiB]->userdata... OK 0.103s
*Writing userdata_6.img [raw:8 KiB]->userdata... OK 0.102s
*Writing userdata_7.img [raw:126 MiB]->userdata... OK 9.277s
*Writing userdata_8.img [raw:8 KiB]->userdata... OK 0.102s
*Writing userdata_9.img [raw:8 KiB]->userdata... OK 0.103s
*Writing userdata_10.img [raw:126 MiB]->userdata... OK 6.137s
*Writing userdata_11.img [raw:8 KiB]->userdata... OK 0.103s
*Writing userdata_12.img [raw:8 KiB]->userdata... OK 0.103s
*Writing userdata_13.img [raw:124.66 MiB]->userdata... OK 9.916s
*Writing userdata_14.img [raw:8 KiB]->userdata... OK 0.104s
*Writing userdata_15.img [raw:8 KiB]->userdata... OK 0.102s
*Writing userdata_16.img [raw:124.96 MiB]->userdata... OK 5.952s
*Writing userdata_17.img [raw:8 KiB]->userdata... OK 0.102s
*Writing userdata_18.img [raw:125.09 MiB]->userdata... OK 6.197s
*Writing userdata_19.img [raw:8 KiB]->userdata... OK 0.103s
*Writing userdata_20.img [raw:124.75 MiB]->userdata... OK 7.194s
*Writing userdata_21.img [raw:8 KiB]->userdata... OK 0.102s
*Writing userdata_22.img [raw:42.89 MiB]->userdata... OK 2.265s
*Writing userdata_23.img [raw:8 KiB]->userdata... OK 0.104s
*Writing userdata_24.img [raw:8 KiB]->userdata... OK 0.103s
*Writing userdata_25.img [raw:8 KiB]->userdata... OK 0.103s
*Writing userdata_26.img [raw:8 KiB]->userdata... OK 0.103s
*Writing userdata_27.img [raw:8 KiB]->userdata... OK 0.104s
*Writing userdata_28.img [raw:8 KiB]->userdata... OK 0.103s
*Writing userdata_29.img [raw:8 KiB]->userdata... OK 0.103s
*Writing userdata_30.img [raw:8 KiB]->userdata... OK 0.103s
*Writing userdata_31.img [raw:8 KiB]->userdata... OK 0.103s
*Writing userdata_32.img [raw:8 KiB]->userdata... OK 0.103s
*Writing userdata_33.img [raw:8 KiB]->userdata... OK 0.103s
*Writing userdata_34.img [raw:8 KiB]->userdata... OK 0.103s
*Writing userdata_35.img [raw:8 KiB]->userdata... OK 0.102s
*Writing userdata_36.img [raw:8 KiB]->userdata... OK 0.103s
*Writing userdata_37.img [raw:105.96 MiB]->userdata... OK 5.634s
*Writing userdata_38.img [raw:8 KiB]->userdata... OK 0.104s
*Writing userdata_39.img [raw:8 KiB]->userdata... OK 0.103s
*Writing userdata_40.img [raw:8 KiB]->userdata... OK 0.103s
*Writing userdata_41.img [raw:124.72 MiB]->userdata... OK 6.331s
*Writing userdata_42.img [raw:8 KiB]->userdata... OK 0.104s
*Writing userdata_43.img [raw:8 KiB]->userdata... OK 0.113s
*Writing userdata_44.img [raw:8 KiB]->userdata... OK 0.104s
*Writing userdata_45.img [raw:8 KiB]->userdata... OK 0.103s
*Writing athena.img [raw:150 MiB]->athena... OK 7.024s
*Writing gpt_main0.bin [raw:17 KiB]->PrimaryGPT... OK 0.104s
*Writing gpt_backup0.bin [raw:16.5 KiB]->BackupGPT... OK 0.103s
*Applying patch0.xml... OK
Rebooting... OK
Total transfer : 5.78 GiB
Transfer Speed : 18.68 MiB/s
UNLOCKTOOL 2023.11.05.0
Elapsed time : 6 minutes 10 seconds
  Reply With Quote
Old 11-07-2023, 16:10   #764 (permalink)
No Life Poster
 
Unlocker AL's Avatar
 
Join Date: Mar 2001
Location: ALBANIA(Tirana)
Age: 52
Posts: 5,359
Member: 3617
Status: Offline
Thanks Meter: 594
Samsung Tablet A7 lite T220 FRP removed ok

Samsung Tablet A7 lite T220 FRP removed ok
Attached Images
File Type: png T220.png (114.8 KB, 9 views)
  Reply With Quote
Old 11-08-2023, 07:37   #765 (permalink)
No Life Poster
 
Join Date: Feb 2006
Location: Anywhere
Posts: 2,888
Member: 233142
Status: Offline
Sonork: 100.1595099
Thanks Meter: 535
Donate money to this user
Meizu note 8 format done

[EDL] FACTORY RESET Selected Model : Meizu Note 8
Code Name : M1822
Operation : Factory Reset [6]
**Authenticating... OK
**Retrieving data... OK [232,06 KiB]
Initializing data... OK
Waiting for HS-USB QDLoader 9008... COM9
Connecting to device... OK
Handshaking... OK
Reading bootloader info... OK
**Serial : 215403414 SoC : [Snapdragon 632] [SDM632] [0x000BA0E1]
**OEM : Qualcomm [0x0000] Model : Unknown [0x0000]
**PK_HASH[0] : C451A1168EF5C7C73B87B91090AA11D8
**PK_HASH[1] : B61425E61CC46C94EC311AC0C51FC5CC
Writing flash programmer... OK
Connecting to flash programmer... OK
Configuring device... OK
**Firehose config : eMMC [Sector:512] [Target:4096] [Host:1048576]
Reading partition map... OK - LU Count : 1
Reading software info... OK [system]
** Model Name : meizu note8
** Product Name : meizu_note8
** Manufacturer : Meizu
** Platform : M1822
** Android Version : 8.1.0
** Security Patch : 2018-09-01
** Build ID : Flyme 7.1.6.0G
** Build Date : Tue Nov 13 18:14:00 CST 2018
** Meizu Model : meizu note8
** Flyme Account : true
Initializing... OK
Erasing USERDATA... OK
Rebooting... OK
UNLOCKTOOL 2023.11.05.0
Elapsed time : 42 seconds
  Reply With Quote
Reply

Bookmarks

Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


 



All times are GMT +1. The time now is 13:28.



Powered by Searchlight © 2025 Axivo Inc.
vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2025 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2023 -
Page generated in 0.19199 seconds with 9 queries

SEO by vBSEO