![]() ![]() ![]() ![]() |
![]() |
Welcome to the GSM-Forum forums. You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. Only registered members may post questions, contact other members or search our database of over 8 million posts. Registration is fast, simple and absolutely free so please - Click to REGISTER! If you have any problems with the registration process or your account login, please contact contact us . |
|
Register | FAQ | Donate | Forum Rules | Root any Device | ★iPhone Unlock★ | ★ Direct Codes ★ | Direct Unlock Source | Search | Today's Posts | Mark Forums Read |
![]() |
| LinkBack | Thread Tools | Display Modes |
![]() | #887 (permalink) |
Freak Poster ![]() ![]() ![]() ![]() Join Date: Jun 2011 Location: galaxy
Posts: 347
Member: 1589971 Status: Offline Thanks Meter: 151 | samsung M11 Frp done [EDL] ERASE FRP Selected Model : Samsung Galaxy M11 Code Name : SM-M115F Operation : Erase FRP [1] **Authenticating... OK **Retrieving data... OK [233.19 KiB] Initializing data... OK Waiting for HS-USB QDLoader 9008... COM125 Connecting to device... OK Handshaking... OK Reading bootloader info... OK **Serial : 1425072915 SoC : [Snapdragon 450] [SDM450] [0x0009A0E1] **OEM : Samsung [0x0020] Model : Unknown [0x0000] **PK_HASH[0] : 11AC510C97C59FAD3C04611B6AFFD671 **PK_HASH[1] : A9A60A53E35BBAECAA55A985CC21F07D Writing flash programmer... OK Connecting to flash programmer... OK Configuring device... OK **Firehose config : eMMC [Sector:512] [Target:4096] [Host:1048576] Reading partition map... OK - LU Count : 1 Reading software info... OK [super] ** Model Name : SM-M115F ** Product Name : m11qnsxx ** Manufacturer : samsung ** Platform : QC_Reference_Phone ** Android Version : 12 ** Security Patch : 2023-11-01 ** Build ID : SP1A.210812.016.M115FXXS5CWK3 ** Build : M115FXXS5CWK3 ** Build Date : Wed Nov 15 15:38:32 +07 2023 ** Code Name : SM-M115F ** PDA : M115FXXS5CWK3 Erasing FRP... OK Rebooting... OK UNLOCKTOOL 2024.01.27.0 Elapsed time : 1 minute 19 seconds |
![]() |
![]() | #888 (permalink) |
No Life Poster ![]() ![]() ![]() ![]() ![]() Join Date: Apr 2008 Location: South Africa
Posts: 736
Member: 746586 Status: Offline Thanks Meter: 216 ![]() | Redmi A1 frp reset Initializing usb... OK Waiting for device... COM78 [BOOTROM:0E8D:0003] Bypassing authentication... OK Analyzing... preloader_ice.bin [MT6761:8:1392] [Internal] Handshaking... OK Reading hardware info... OK Hardware : MT6761 [Helio A20|A22|A25|G25|P22] 0717 8A00 CA01 0200 Security Config : SCB SLA DAA MEID : 3ECF52B4D5BCCB074248B664AA0DC243 Sending Download-Agent [1]... OK Syncing with device... OK Booting device... OK Syncing with DA... OK Storage : EMMC - CID : 5900019B.33305032.EEED0032.F3890520 Vendor : Samsung - Name : Y2P032 - Serial : 86044397 - Rev : 0 Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 16 MiB - User Area : 29.12 GiB Reading partition info... OK [52] Reading device info... SKIP [EROFS] Erasing FRP... OK UNLOCKTOOL 2024.01.27.0 Elapsed time : 8 seconds |
![]() |
![]() | #889 (permalink) |
Freak Poster ![]() ![]() ![]() ![]() Join Date: Jun 2011 Location: galaxy
Posts: 347
Member: 1589971 Status: Offline Thanks Meter: 151 | vivo y15s Frp done [PRELOADER] ERASE FRP Selected auth : VIVO [2] Phone must have battery inside! Waiting for device... COM11 [PRELOADER:0E8D:2000] Handshaking... OK Reading hardware info... OK * Hardware : MT6765 [Helio G25|G35|P35] 0766 8A00 CA00 0000 * Security Config : SCB DAA * MEID : 846FFD9489365ED70F80CA866816F080 Sending Download-Agent... OK Syncing with target... OK Booting device (preloader auth)... OK Bypassing auth... OK Syncing with DA... OK **Storage : EMMC - CID : 44000115.4D383658.D3390942.4338C9BE **Vendor : Samsung - Name : DX68MB - Serial : 3384726329 - Rev : 9 **Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 4 MiB - User Area : 29.12 GiB Reading partition info... OK [47] Reading device info... OK [super] ** Model Name : V2120 ** Product Name : 2020 ** Manufacturer : vivo ** Platform : k65v1_32_bsp_2g_ago ** Android Version : 12 ** Security Patch : 2023-08-01 ** Build ID : SP1A.210812.003 release-keys ** Build : compiler08011808 ** Build Date : Tue Aug 1 18:00:46 CST 2023 ** Vivo Model : PD2140F_EXMA ** Vivo Version : PD2140F_EX_A_6.35.0 ** OS Name : vos ** OS Version : 3.0 ** OS Build : Funtouch OS 12 Global Erasing FRP... OK UNLOCKTOOL 2024.01.27.0 Elapsed time : 19 seconds |
![]() |
![]() | #891 (permalink) |
No Life Poster ![]() ![]() ![]() ![]() ![]() Join Date: Apr 2008 Location: South Africa
Posts: 736
Member: 746586 Status: Offline Thanks Meter: 216 ![]() | Mobicel GLO FRP RESET Selected Model : Unisoc SC7731E V1 Code Name : Spreadtrum SC7731E_1 Operation : Erase FRP [1] Authenticating... OK Retrieving data... OK [233.55 KiB] Hold VOL DOWN then plug-in USB cable! Waiting for device... COM73 (SPRD U2S Diag) USB : USB\VID_1782&PID_4D00\5&744228E&0&1 Protocol : SPRD3 Sending FDL1... OK [29.34 KiB] Boot ver: Spreadtrum Boot Block version 1.1 Sending FDL2... OK [407.34 KiB] Reading device info... OK [system] Model Name : GLO Manufacturer : Mobicel Platform : cm22_32v8_v1.1.0 Android Version : 8.1.0 Security Patch : 2020-10-05 Build ID : GLO_v9.0_user_20201116 Erasing FRP... OK UNLOCKTOOL 2024.01.27.0 Elapsed time : 14 seconds |
![]() |
![]() | #892 (permalink) |
Freak Poster ![]() ![]() ![]() ![]() Join Date: Jun 2011 Location: galaxy
Posts: 347
Member: 1589971 Status: Offline Thanks Meter: 151 | samsung a8 2018 Frp done [COM] REMOVE FRP [2023] Method : [2] Scanning for device... COM130 Reading Info... OK Model Number : SM-A530F Bootloader : A530FXXS4BSA8 Country Code : OMN Serial Number : R58KA4JRQ4L Unique Number : CBJ00002B4EA795 Enabling ADB... OK Waiting for device... Please accept USB Debugging on your phone! Model : SM-A530F Manufacturer : samsung Platform : exynos5 CPU Arch : arm64-v8a Android Serial : 5200002b4ea79595 Manufacturing Date : 20181018 Security Patch : 2019-02-01 Connection : mtp,adb Timezone : Asia/Karachi Knox Warranty : 0 - valid Android Version : 8.0.0 Android SDK : 26 Build : R16NW.A530FXXS4BSA8 Build Date : Tue Jan 29 14:03:00 KST 2019 Product Code : SM-A530FZKAOMN Samsung Serial : R58KA4JRQ4L Device Name : jackpotlte Product Name : jackpotltexx Code Name : SM-A530FZKAOMN **BL : A530FXXS4BSA8 **PDA : A530FXXS4BSA8 **CP : A530FXXU4BRL8 **CSC : A530FOVF4BRL8 Sales Code : OMN Removing FRP... OK UNLOCKTOOL 2024.01.27.0 Elapsed time : 39 seconds |
![]() |
![]() | #893 (permalink) |
Freak Poster ![]() ![]() ![]() ![]() Join Date: Apr 2019 Location: TR Age: 29
Posts: 173
Member: 2904920 Status: Offline Thanks Meter: 112 | FRP Honor x7 bypass Unlocktool | EDL mode CMA-LX1 CMA-LX2 CMA-LX3 https://www.youtube.com/watch?v=tQHPHWpClkE youtube.com/channel/UC8z2M6qHhUDZ2B_MAwVvXzw?sub_confirmation=1 |
![]() |
![]() | #894 (permalink) |
Freak Poster ![]() ![]() ![]() ![]() Join Date: Jun 2011 Location: galaxy
Posts: 347
Member: 1589971 Status: Offline Thanks Meter: 151 | tecno spark 7 Frp done ERASE FRP Selected Platform : SC9863A_64_Bypass Connect Testpoint or hold VOL DOWN! Instruction here! Waiting for device... COM135 (SPRD U2S Diag) USB : USB\VID_1782&PID_4D00\6&55CE37D&0&5 Initializing loader... OK Protocol : SPRD3 Sending payload... OK Sending auth data... OK Sending preloader1... OK Sending preloader2... OK Booting loader, please wait... OK Boot ver: Spreadtrum Boot Block version 1.1 Sending FDL1... OK Sending FDL2... OK Reading Serial Number... N.A Reading partitions info... OK [75] [1024] Dual boot-slot : A Reading device info... OK [super] ** Model Name : TECNO PR651 ** Product Name : F6317 ** Manufacturer : TECNO ** Android Version : 11 ** Security Patch : 2023-05-05 ** Build ID : PR651-F6317-11.0-OP-V97-20230602 ** Build Date : Fri Jun 2 17:37:15 CST 2023 Erasing FRP... OK UNLOCKTOOL 2024.01.27.0 Elapsed time : 32 seconds |
![]() |
![]() | #895 (permalink) |
Freak Poster ![]() ![]() ![]() ![]() Join Date: Jun 2011 Location: galaxy
Posts: 347
Member: 1589971 Status: Offline Thanks Meter: 151 | oppo A1k pattern and Frp done [BROM] FACTORY RESET + FRP Initializing usb... OK Waiting for device... COM31 [BOOTROM:0E8D:0003] Bypassing authentication... OK Analyzing... preloader_oppo6762_18540.bin [MT6765:9:1552] [Internal] Vendor : OPPO/REALME Handshaking... OK Reading hardware info... OK * Hardware : MT6765 [Helio G25|G35|P35] 0766 8A00 CA00 0000 * Security Config : SCB SLA DAA * MEID : FE10564C8911F24C4EB8434EF8E976AA Sending Download-Agent [1]... OK Syncing with device... OK Booting device... OK Syncing with DA... OK **Storage : EMMC - CID : 51000115.4D333644.A7900342.5B764C6A **Vendor : Samsung - Name : QD63MB - Serial : 1282058128 - Rev : 3 **Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 16 MiB - User Area : 29.12 GiB Reading partition info... OK [42] Reading device info... OK [system vendor] ** Model Name : CPH1923 ** Manufacturer : OPPO ** Platform : oppo6762_18540 ** Android Version : 9 ** Security Patch : 2021-05-05 ** Build ID : CPH1923EX_11_A.40 ** Build Date : Thu May 6 16:55:21 CST 2021 ** Market Name : OPPO A1k ** OTA Version : CPH1923EX_11.A.40_0400_202105061633 Erasing FRP... OK Erasing USERDATA (flash file)... OK UNLOCKTOOL 2024.01.27.0 Elapsed time : 6 minutes 2 seconds |
![]() |
![]() | #896 (permalink) |
No Life Poster ![]() ![]() ![]() ![]() ![]() Join Date: Apr 2008 Location: South Africa
Posts: 736
Member: 746586 Status: Offline Thanks Meter: 216 ![]() | itel P37 Pro(Vision2 Plus) frp reset FORMAT DATA Selected Platform : SC9863A_64_Bypass Connect Testpoint or hold VOL DOWN! Instruction here! Waiting for device... COM73 (SPRD U2S Diag) USB : USB\VID_1782&PID_4D00\5&744228E&0&1 Initializing loader... OK Protocol : SPRD3 Sending payload... OK Sending auth data... OK Sending preloader1... OK Sending preloader2... OK Booting loader, please wait... OK Boot ver: Spreadtrum Boot Block version 1.1 Sending FDL1... OK Sending FDL2... OK Reading Serial Number... N.A Reading partitions info... OK [45] [1024] Reading device info... OK [super] ** Model Name : itel P681L ** Product Name : F6315 ** Manufacturer : Itel ** Platform : s9863a1h10_go_32b ** Android Version : 10 ** Security Patch : 2023-02-05 ** Build ID : P681L-F6315-10.0-OP-V66-20230223 ** Build Date : Thu Feb 23 18:08:36 CST 2023 ** Market Name : itel P37 Pro(Vision2 Plus) Erasing FRP (persist)... OK Erasing USERDATA... OK UNLOCKTOOL 2024.01.27.0 Elapsed time : 56 seconds |
![]() |
![]() | #897 (permalink) |
No Life Poster ![]() ![]() ![]() ![]() ![]() Join Date: Apr 2008 Location: South Africa
Posts: 736
Member: 746586 Status: Offline Thanks Meter: 216 ![]() | Mobicel PX10 frp reset Selected Platform : SC7731E_Bypass Connect Testpoint or hold VOL DOWN! Instruction here! Waiting for device... COM20 (SPRD U2S Diag) USB : USB\VID_1782&PID_4D00\5&744228E&0&2 Initializing loader... OK Protocol : SPRD3 Sending payload... OK Sending auth data... OK Sending preloader1... OK Sending preloader2... OK Booting loader, please wait... OK Boot ver: Spreadtrum Boot Block version 1.1 Sending FDL1... OK Sending FDL2... OK Reading Serial Number... N.A Reading partitions info... OK [71] [1024] Dual boot-slot : A Reading device info... OK [super] Model Name : PX10 Manufacturer : Mobicel Android Version : 11 Security Patch : 2022-10-05 Build ID : RP1A.201005.001 Build Date : Thu Aug 17 11:14:06 CST 2023 Erasing FRP... OK |
![]() |
![]() | #898 (permalink) |
No Life Poster ![]() ![]() ![]() ![]() ![]() ![]() ![]() Join Date: Dec 2005 Location: mt brazil
Posts: 3,396
Member: 211017 Status: Offline Thanks Meter: 313 | flash redmi 9a FLASH Selected Model : Xiaomi Redmi 9A / 9T / 9i Code Name : Dandelion Operation : Auth Flash **Authenticating... OK **Retrieving data... OK [484,18 KiB] Initializing data... OK Waiting for device... COM7 Bypassing authentication... OK Connecting to BROM... OK Sending DA... OK [229,48 KiB] Syncing with DA... OK **HW Chip : MT6765 [6765] - HW Ver : 0xCA00 - SW Ver : 0x0000 **Bootloader Ver : 0x00 - Secure Ver : 0x00 **Internal RAM Size : 232 KiB **External RAM Size : 4 GiB **Storage : EMMC - CID : 44000145.36303441.38850134.A9381C9B **Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 16 MiB - User Area : 58,24 GiB Downloading bootloader... OK [229,47 KiB] Downloading bootloader... OK [229,47 KiB] Writing recovery... OK [64 MiB] 1,785s Writing vbmeta_system... OK [4 KiB] 0,003s Writing vbmeta_vendor... OK [4 KiB] 0,003s Writing md1img... OK [57,98 MiB] 1,595s Writing spmfw... OK [62,58 KiB] 0,004s Writing scp1... OK [597,64 KiB] 0,018s Writing scp2... OK [597,64 KiB] 0,018s Writing sspm_1... OK [425,03 KiB] 0,013s Writing sspm_2... OK [425,03 KiB] 0,013s Writing lk... OK [947,38 KiB] 0,027s Writing lk2... OK [947,38 KiB] 0,027s Writing boot... OK [64 MiB] 1,771s Writing logo... OK [2,76 MiB] 0,076s Writing dtbo... OK [145,22 KiB] 0,006s Writing tee1... OK [2,13 MiB] 0,060s Writing tee2... OK [2,13 MiB] 0,060s Writing super... OK [3,27 GiB] 97,880s Writing vbmeta... OK [4 KiB] 0,003s Writing cache... OK [68,17 KiB] 0,006s Writing userdata... OK [1,71 GiB] 49,707s Rebooting device... OK UNLOCKTOOL 2024.01.27.0 Elapsed time : 2 minutes 46 seconds |
![]() |
![]() | #899 (permalink) |
Freak Poster ![]() ![]() ![]() ![]() Join Date: Jun 2011 Location: galaxy
Posts: 347
Member: 1589971 Status: Offline Thanks Meter: 151 | vivo y20i Frp done FACTORY RESET Selected Model : Vivo Y20 | Y20i | Y20s Code Name : PD2034F | PD2034AM | V2029 Operation : Factory Reset [5] **Authenticating... OK **Retrieving data... OK [270.22 KiB] Initializing data... OK Waiting for HS-USB QDLoader 9008... COM137 Connecting to device... OK Handshaking... OK Reading bootloader info... OK **Serial : 219919815 SoC : [Snapdragon 460] [SM4250-AA] [0x001360E1] **OEM : Vivo [0x0073] Model : Unknown [0x0000] **PK_HASH[0] : A7DF36FFD7AB557C67A6C26675E2795C **PK_HASH[1] : 922CF671308CFD7169BEDB84424C862B Writing flash programmer... OK Connecting to flash programmer... OK Configuring device... OK **Firehose config : UFS [Sector:4096] [Target:0] [Host:1048576] Erasing FRP... OK Erasing USERDATA... OK Rebooting... OK UNLOCKTOOL 2024.01.27.0 Elapsed time : 7 minutes 33 seconds |
![]() |
![]() | #900 (permalink) |
No Life Poster ![]() ![]() ![]() ![]() ![]() Join Date: Mar 2020 Location: bolivia
Posts: 607
Member: 2951556 Status: Offline Thanks Meter: 903 | frp redmi a1 done! [BROM] ERASE FRP Initializing usb... OK Waiting for device... COM16 [BOOTROM:0E8D:0003] Bypassing authentication... OK Analyzing... preloader_ice.bin [MT6761:8:1392] [Internal] Handshaking... OK Reading hardware info... OK * Hardware : MT6761 [Helio A20|A22|A25|G25|P22] 0717 8A00 CA01 0200 * Security Config : SCB SLA DAA * MEID : F3213940A40293353F65E4444E26EFA0 Sending Download-Agent [1]... OK Syncing with device... OK Booting device... OK Syncing with DA... OK **Storage : EMMC - CID : 5900019B.33305032.E4F50032.2389712E **Vendor : Samsung - Name : Y2P032 - Serial : 1898898677 - Rev : 0 **Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 16 MiB - User Area : 29,12 GiB Reading partition info... OK [52] Reading device info... SKIP [EROFS] Erasing FRP... OK UNLOCKTOOL 2024.01.27.0 Elapsed time : 43 seconds |
![]() |
![]() |
Bookmarks |
Thread Tools | |
Display Modes | |
| |
|