![]() ![]() ![]() ![]() |
![]() |
Welcome to the GSM-Forum forums. You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. Only registered members may post questions, contact other members or search our database of over 8 million posts. Registration is fast, simple and absolutely free so please - Click to REGISTER! If you have any problems with the registration process or your account login, please contact contact us . |
|
Register | FAQ | Donate | Forum Rules | Root any Device | ★iPhone Unlock★ | ★ Direct Codes ★ | Direct Unlock Source | Search | Today's Posts | Mark Forums Read |
![]() |
| LinkBack | Thread Tools | Display Modes |
![]() | #1186 (permalink) |
No Life Poster ![]() ![]() ![]() ![]() ![]() Join Date: Jan 2005 Location: Egypt_Cairo Age: 42
Posts: 728
Member: 111140 Status: Offline Thanks Meter: 75 | Samsung Galaxy Z Flip3 5G Qualcomm SM-F711B [COM] REMOVE FRP [2023] Method : [2] Scanning for device... COM59 Reading Info... FAIL Enabling ADB... OK Waiting for device... Model : SM-F711B Manufacturer : samsung Platform : lahaina CPU Arch : arm64-v8a Android Serial : R5CRC47MRKR Manufacturing Date : 2021.12.30 Security Patch : 2022-08-01 Connection : mtp,adb Timezone : Africa/Cairo Android Version : 12 Android SDK : 31 Build : SP1A.210812.016.F711BXXU2CVG8 Build Date : Thu Jul 21 08:59:10 KST 2022 Product Code : SM-F711BZEFKSA Device Name : b2q Product Name : b2qxxx Code Name : SM-F711BZEFKSA BL : F711BXXU2CVG8 PDA : F711BXXU2CVG8 CP : F711BXXU2CVG8,F711BXXU2CVG8 CSC : F711BOXM2CVG8 Sales Code : KSA Removing FRP... OK UNLOCKTOOL 2025.02.09.1 Elapsed time : 32 seconds UNLOCKTOOL Great TOOL Best Regards GsmOrient |
![]() |
![]() | #1187 (permalink) |
Freak Poster ![]() ![]() ![]() ![]() Join Date: May 2014 Location: Pakistan Age: 30
Posts: 225
Member: 2185050 Status: Offline Thanks Meter: 21 ![]() | Redmi 9C FRP Done [BROM] ERASE FRP Initializing usb... OK Waiting for device... COM6 [BOOTROM:0E8D:0003] Bypassing authentication... OK Analyzing... preloader_k65v1_64_bsp.bin [MT6765:10:1712] [Internal] Handshaking... OK Reading hardware info... OK * Hardware : MT6765 [Helio G25|G35|P35] 0766 8A00 CA00 0000 * Security Config : SCB SLA DAA * MEID : 6854D7FC9B04CF3631A4ABA033ED19ED Sending Download-Agent [1]... OK Syncing with device... OK Booting device... OK Syncing with DA... OK **Storage : EMMC - CID : 43000115.3444544A.127E0452.CFC7484C **Vendor : Samsung - Name : CJTD4R - Serial : 1212945022 - Rev : 4 **Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 4 MiB - User Area : 58.24 GiB Reading partition info... OK [43] Reading device info... OK [super] ** Model Name : M2006C3MG ** Product Name : angelica_global ** Manufacturer : Xiaomi ** Platform : angelica ** Android Version : 10 ** Security Patch : 2023-02-01 ** Build ID : QP1A.190711.020 ** Build : V12.0.23.0.QCRMIXM ** Build Date : Thu Mar 23 17:50:47 CST 2023 ** MIUI Version : V12 ** MIUI Build : V12.0.23.0.QCRMIXM ** MIUI Region : global ** MIUI Locale : en-GB Erasing FRP... OK UNLOCKTOOL 2025.02.09.1 Elapsed time : 18 seconds |
![]() |
![]() | #1189 (permalink) |
No Life Poster ![]() ![]() ![]() ![]() ![]() ![]() ![]() Join Date: Aug 2005 Location: MY
Posts: 2,500
Member: 172261 Status: Offline Thanks Meter: 382 | [USB 1.0] ERASE FRP Scanning port... COM22 Connecting to port... OK **Connection : USB 1.0 Full-Speed **USB Driver : [HUAWEI Incorporated] HSPL_usbvcom - Version : 2.0.7.1 Selected Model : HiSilicon Kirin 980 [Erase FRP] Code Name : Hi980 Operation : Erase FRP [1] **Authenticating... OK **Retrieving server data... OK [121.17 KiB] Writing unlocktool1... OK 1.670s Writing unlocktool2... OK 0.245s Writing unlocktool3... OK 1.030s Reading partition map... OK [3] Searching FRP Lock... OK [2:524288:524288] Erasing FRP... OK UNLOCKTOOL 2025.02.14.0 Elapsed time : 32 seconds |
![]() |
![]() | #1190 (permalink) |
No Life Poster ![]() ![]() ![]() ![]() ![]() Join Date: May 2008 Location: gsm city
Posts: 827
Member: 767786 Status: Offline Thanks Meter: 322 | Sm-a105f frp [COM] REMOVE FRP [2023] Scanning for device... COM106 Reading Info... OK Model Number : SM-A105F Bootloader : A105FDDU6CUH2 Country Code : XFV Serial Number : R58MB3AW Unique Number : CBJ005EF894EAA6 Connecting to device... OK Trying method [1]... OK Waiting for device... Model : SM-A105F Manufacturer : samsung Platform : universal7884B CPU Arch : armeabi-v7a Android Serial : R58MB3AW Manufacturing Date : 20191115 Security Patch : 2021-06-01 Connection : mtp,adb Timezone : Africa/Johannesburg Android Version : 11 Android SDK : 30 Build : RP1A.200720.012.A105FDDU6CUH2 Build Date : Thu Aug 5 16:48:42 KST 2021 Product Code : SM-A105FZBEXFV Device Name : a10 Product Name : a10dd Code Name : SM-A105FZBEXFV BL : A105FDDU6CUH2 PDA : A105FDDU6CUH2 CP : A105FDDU6CUH2 CSC : A105FOJM6CUH3 Sales Code : XFV Removing FRP... OK UNLOCKTOOL 2025.02.14.0 Elapsed time : 35 seconds |
![]() |
![]() | #1191 (permalink) |
No Life Poster ![]() ![]() ![]() ![]() ![]() ![]() ![]() Join Date: Aug 2005 Location: MY
Posts: 2,500
Member: 172261 Status: Offline Thanks Meter: 382 | [BROM] FACTORY RESET Selected Model : Xiaomi Redmi 9A / 9T / 9i Code Name : Dandelion Operation : Factory Reset [2] **Authenticating... OK **Retrieving server data... OK [484.18 KiB] Initializing data... OK Waiting for device... COM15 Bypassing authentication... OK Connecting to BROM... OK Sending DA... OK [229.48 KiB] Syncing with DA... OK **HW Chip : MT6765 [6765] - HW Ver : 0xCA00 - SW Ver : 0x0000 **Bootloader Ver : 0x00 - Secure Ver : 0x00 **Internal RAM Size : 232 KiB **External RAM Size : 2 GiB **Storage : EMMC - CID : 44000145.33303441.CDB30132.5D684487 **Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 16 MiB - User Area : 29.12 GiB Formatting USERDATA... OK UNLOCKTOOL 2025.02.14.0 Elapsed time : 26 seconds [BROM] ERASE FRP Initializing usb... OK Waiting for device... COM15 [BOOTROM:0E8D:0003] Bypassing authentication... OK Analyzing... preloader_k62v1_64_bsp.bin [MT6765:10:1712] [Internal] Handshaking... OK Reading hardware info... OK * Hardware : MT6765 [Helio G25|G35|P35] 0766 8A00 CA00 0000 * Security Config : SCB SLA DAA * MEID : 7B07258AA5C808B4176EA5F2FFC08FC4 Sending Download-Agent [1]... OK Syncing with device... OK Booting device... OK Syncing with DA... OK **Storage : EMMC - CID : 44000145.33303441.CDB30132.5D684487 **Vendor : Scandisk - Name : DA4032 - Serial : 1149750707 - Rev : 1 **Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 16 MiB - User Area : 29.12 GiB Reading partition info... OK [43] Reading device info... OK [super] ** Model Name : M2006C3LG ** Product Name : dandelion_global ** Manufacturer : Xiaomi ** Platform : dandelion ** Android Version : 10 ** Security Patch : 2022-05-01 ** Build ID : QP1A.190711.020 ** Build : V12.0.20.0.QCDMIXM ** Build Date : Sat May 14 13:15:44 CST 2022 ** MIUI Version : V12 ** MIUI Build : V12.0.20.0.QCDMIXM ** MIUI Region : global ** MIUI Locale : en-GB Erasing FRP... OK UNLOCKTOOL 2025.02.14.0 Elapsed time : 11 seconds |
![]() |
![]() | #1192 (permalink) |
No Life Poster ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Join Date: Nov 2008 Location: RVIII
Posts: 11,772
Member: 890926 Status: Offline Thanks Meter: 2,088 | Vivo Y71 Flashed Code: EDL FLASH Waiting for HS-USB QDLoader 9008... COM10 Selected Model : Vivo Y71 (1724) Code Name : PD1731F/PD1731BF Operation : Auth Flash Authenticating... OK Retrieving server data... OK [191.1 KiB] Initializing data... OK Waiting for HS-USB QDLoader 9008... COM10 Connecting to device... OK Handshaking... OK Reading bootloader info... OK Serial : 3798259702 SoC : [Snapdragon 425] [MSM8917] [0x000560E1] OEM : Qualcomm [0x0000] Model : Unknown [0x0000] PK_HASH[0] : 60BA997FEF6DA9F05885FA11F1DD6D2A PK_HASH[1] : 90D052A257A09C2075D7246CC73C0D43 Writing flash programmer... OK Connecting to flash programmer... OK Configuring device... OK Firehose config : eMMC [Sector:512] [Target:4096] [Host:1048576] Processing LUN0 - rawprogram_unsparse.xml Writing NON-HLOS.bin [fat:128 MiB]->modem... OK 8.517s Writing sbl1.mbn [elf:289.72 KiB]->sbl1... OK 0.122s Writing sbl1.mbn [elf:289.72 KiB]->sbl1bak... OK 0.135s Writing rpm.mbn [elf:180.39 KiB]->rpm... OK 0.114s Writing rpm.mbn [elf:180.39 KiB]->rpmbak... OK 0.115s Writing tz.mbn [elf:1.48 MiB]->tz... OK 0.201s Writing tz.mbn [elf:1.48 MiB]->tzbak... OK 0.198s Writing devcfg.mbn [elf:60.17 KiB]->devcfg... OK 0.109s Writing devcfg.mbn [elf:60.17 KiB]->devcfgbak... OK 0.107s Writing adspso.bin [ext4:16 MiB]->dsp... OK 1.204s Writing sec.dat [raw:436 bytes]->sec... OK 0.088s Writing emmc_appsboot.mbn [elf:6.58 MiB]->aboot... OK 0.548s Writing emmc_appsboot.mbn [elf:6.58 MiB]->abootbak... OK 0.542s Writing boot.img [kernel:26.78 MiB]->boot... OK 1.964s Writing recovery.img [kernel:39.81 MiB]->recovery... OK 2.879s Writing system_1.img [ext4:128.01 MiB]->system... OK 8.786s Writing system_2.img [raw:8 KiB]->system... OK 0.139s Writing system_3.img [raw:125.15 MiB]->system... OK 8.543s Writing system_4.img [raw:126.03 MiB]->system... OK 8.704s Writing system_5.img [raw:8 KiB]->system... OK 0.093s Writing system_6.img [raw:125.15 MiB]->system... OK 8.662s Writing system_7.img [raw:126.03 MiB]->system... OK 8.740s Writing system_8.img [raw:8 KiB]->system... OK 0.104s Writing system_9.img [raw:125.15 MiB]->system... OK 8.521s Writing system_10.img [raw:126.03 MiB]->system... OK 8.664s Writing system_11.img [raw:8 KiB]->system... OK 0.130s Writing system_12.img [raw:125.15 MiB]->system... OK 8.682s Writing system_13.img [raw:126.03 MiB]->system... OK 8.740s Writing system_14.img [raw:8 KiB]->system... OK 0.126s Writing system_15.img [raw:125.15 MiB]->system... OK 8.673s Writing system_16.img [raw:126.03 MiB]->system... OK 8.759s Writing system_17.img [elf:126.03 MiB]->system... OK 8.697s Writing system_18.img [raw:2.98 MiB]->system... OK 0.305s Writing system_19.img [raw:8 KiB]->system... OK 0.103s Writing system_20.img [elf:126.03 MiB]->system... OK 8.512s Writing system_21.img [elf:126.03 MiB]->system... OK 9.617s Writing system_22.img [elf:126.03 MiB]->system... OK 8.408s Writing system_23.img [elf:126.03 MiB]->system... OK 8.042s Writing system_24.img [elf:168 KiB]->system... OK 0.115s Writing system_25.img [raw:8 KiB]->system... OK 0.106s Writing system_26.img [elf:126.03 MiB]->system... OK 7.379s Writing system_27.img [elf:126.03 MiB]->system... OK 7.529s Writing system_28.img [raw:126.03 MiB]->system... OK 8.179s Writing system_29.img [raw:126.03 MiB]->system... OK 8.645s Writing system_30.img [raw:126.03 MiB]->system... OK 8.249s Writing system_31.img [raw:126.03 MiB]->system... OK 8.344s Writing system_32.img [raw:126.03 MiB]->system... OK 8.437s Writing system_33.img [raw:8 KiB]->system... OK 0.104s Writing system_34.img [raw:125.15 MiB]->system... OK 8.496s Writing system_35.img [raw:67.53 MiB]->system... OK 4.646s Writing system_36.img [raw:8 KiB]->system... OK 0.102s Writing system_37.img [raw:8 KiB]->system... OK 0.102s Writing system_38.img [raw:125.14 MiB]->system... OK 8.487s Writing vendor_1.img [ext4:128.01 MiB]->vendor... OK 8.594s Writing vendor_2.img [raw:8 KiB]->vendor... OK 0.103s Writing vendor_3.img [raw:8 KiB]->vendor... OK 0.104s Writing vendor_4.img [elf:126.03 MiB]->vendor... OK 8.743s Writing vendor_5.img [raw:8 KiB]->vendor... OK 0.104s Writing vendor_6.img [elf:125.78 MiB]->vendor... OK 8.510s Writing vendor_7.img [elf:126.03 MiB]->vendor... OK 8.705s Writing vendor_8.img [raw:8 KiB]->vendor... OK 0.103s Writing vendor_9.img [elf:125.78 MiB]->vendor... OK 8.782s Writing vendor_10.img [elf:15.44 MiB]->vendor... OK 1.164s Writing vendor_11.img [raw:8 KiB]->vendor... OK 0.106s Writing vendor_12.img [raw:8 KiB]->vendor... OK 0.103s Writing vendor_13.img [raw:125.77 MiB]->vendor... OK 8.552s Writing cache_1.img [ext4:6.09 MiB]->cache... OK 0.514s Writing cache_2.img [raw:8 KiB]->cache... OK 0.104s Writing cache_3.img [raw:8 KiB]->cache... OK 0.106s Writing persist_1.img [ext4:4.69 MiB]->persist... OK 0.430s Writing oem_1.img [ext4:5.99 MiB]->oem... OK 0.519s Writing oem_2.img [raw:1.04 MiB]->oem... OK 0.284s Writing mdtp.img [raw:16.98 MiB]->mdtp... OK 1.262s Writing cmnlib_30.mbn [elf:208.84 KiB]->cmnlib... OK 0.122s Writing cmnlib_30.mbn [elf:208.84 KiB]->cmnlibbak... OK 0.117s Writing cmnlib64_30.mbn [elf:262.78 KiB]->cmnlib64... OK 0.120s Writing cmnlib64_30.mbn [elf:262.78 KiB]->cmnlib64bak... OK 0.123s Writing keymaster64.mbn [elf:265.12 KiB]->keymaster... OK 0.120s Writing keymaster64.mbn [elf:265.12 KiB]->keymasterbak... OK 0.122s Writing survival.img [kernel:42.95 MiB]->survival... OK 3.003s Writing userdata_1.img [ext4:127.8 MiB]->userdata... OK 8.944s Writing userdata_2.img [raw:8 KiB]->userdata... OK 0.105s Writing userdata_3.img [raw:8 KiB]->userdata... OK 0.102s Writing userdata_4.img [raw:8 KiB]->userdata... OK 0.108s Writing userdata_5.img [raw:126 MiB]->userdata... OK 9.355s Writing userdata_6.img [raw:8 KiB]->userdata... OK 0.104s Writing userdata_7.img [raw:8 KiB]->userdata... OK 0.102s Writing userdata_8.img [raw:126 MiB]->userdata... OK 8.607s Writing userdata_9.img [raw:8 KiB]->userdata... OK 0.121s Writing userdata_10.img [raw:8 KiB]->userdata... OK 0.125s Writing userdata_11.img [raw:42.89 MiB]->userdata... OK 3.030s Writing userdata_12.img [raw:8 KiB]->userdata... OK 0.104s Writing userdata_13.img [raw:8 KiB]->userdata... OK 0.104s Writing userdata_14.img [raw:114.22 MiB]->userdata... OK 7.911s Writing userdata_15.img [raw:8 KiB]->userdata... OK 0.146s Writing userdata_16.img [raw:8 KiB]->userdata... OK 0.103s Writing userdata_17.img [raw:8 KiB]->userdata... OK 0.103s Writing userdata_18.img [raw:124.97 MiB]->userdata... OK 8.669s Writing userdata_19.img [raw:8 KiB]->userdata... OK 0.104s Writing userdata_20.img [raw:8 KiB]->userdata... OK 0.102s Writing userdata_21.img [raw:8 KiB]->userdata... OK 0.103s Writing userdata_22.img [raw:8 KiB]->userdata... OK 0.103s Writing userdata_23.img [raw:8 KiB]->userdata... OK 0.105s Writing userdata_24.img [raw:8 KiB]->userdata... OK 0.104s Writing userdata_25.img [raw:8 KiB]->userdata... OK 0.104s Writing userdata_26.img [raw:8 KiB]->userdata... OK 0.103s Writing userdata_27.img [raw:8 KiB]->userdata... OK 0.103s Writing userdata_28.img [raw:8 KiB]->userdata... OK 0.104s Writing userdata_29.img [raw:8 KiB]->userdata... OK 0.103s Writing userdata_30.img [raw:8 KiB]->userdata... OK 0.101s Writing userdata_31.img [raw:8 KiB]->userdata... OK 0.102s Writing userdata_32.img [raw:8 KiB]->userdata... OK 0.105s Writing userdata_33.img [raw:8 KiB]->userdata... OK 0.108s Writing userdata_34.img [raw:8 KiB]->userdata... OK 0.102s Writing userdata_35.img [raw:8 KiB]->userdata... OK 0.104s Writing userdata_36.img [raw:125 MiB]->userdata... OK 8.421s Writing userdata_37.img [raw:8 KiB]->userdata... OK 0.118s Writing userdata_38.img [raw:8 KiB]->userdata... OK 0.105s Writing userdata_39.img [raw:124.87 MiB]->userdata... OK 8.505s Writing userdata_40.img [raw:8 KiB]->userdata... OK 0.104s Writing userdata_41.img [raw:8 KiB]->userdata... OK 0.102s Writing userdata_42.img [raw:8 KiB]->userdata... OK 0.103s Writing userdata_43.img [raw:8 KiB]->userdata... OK 0.101s Writing athena.img [raw:150 MiB]->athena... OK 9.372s Writing gpt_main0.bin [raw:17 KiB]->PrimaryGPT... OK 0.103s Writing gpt_backup0.bin [raw:16.5 KiB]->BackupGPT... OK 0.103s Applying patch0.xml... OK Erasing FRP... OK Erasing USERDATA... OK Rebooting... OK Total transfer : 5.24 GiB Transfer Speed : 14.38 MiB/s UNLOCKTOOL 2025.02.14.0 |
![]() |
![]() | #1193 (permalink) |
Freak Poster ![]() ![]() ![]() ![]() Join Date: Jul 2021 Location: Nigeria
Posts: 483
Member: 2993572 Status: Offline Thanks Meter: 210 ![]() | Redmi a3x frp reset done [SPRD] ERASE FRP Selected Platform : SC9863A_64_Bypass Connect Testpoint or hold VOL DOWN! Instruction here! Waiting for device... COM19 (SPRD U2S Diag) USB : USB\VID_1782&PID_4D00\5&28062471&0&3 Initializing loader... OK Protocol : SPRD3 Sending payload... OK Sending auth data... OK Sending preloader1... OK Sending preloader2... OK Booting loader, please wait... OK Boot ver: Spreadtrum Boot Block version 1.1 Sending FDL1... OK Sending FDL2... OK Reading Serial Number... N.A Reading partitions info... OK [77] [1024] Dual boot-slot : A Reading device info... SKIP [EROFS] Erasing FRP... OK UNLOCKTOOL 2025.02.15.0 Elapsed time : 29 seconds |
![]() |
![]() | #1194 (permalink) |
No Life Poster ![]() ![]() ![]() ![]() ![]() Join Date: Jan 2005 Location: Egypt_Cairo Age: 42
Posts: 728
Member: 111140 Status: Offline Thanks Meter: 75 | Samsung A137f FRP TestPoint Samsung A137f FRP TestPoint [BROM] ERASE FRP Initializing usb... OK Waiting for device... COM29 [BOOTROM:0E8D:0003] Bypassing authentication... OK Analyzing... preloader_k69v1_64_titan_bengal_tiger_k419.bin [MT6769:17:2832] [Internal] Vendor : SAMSUNG Handshaking... OK Reading hardware info... OK Hardware : MT6768 [Helio G70|G80|G85|P65] 0707 8A00 CA00 0000 Security Config : SCB SLA DAA MEID : xxxxxxxxxxxxxxxxxxxxxxxxxxx Sending Download-Agent [1]... OK Syncing with device... OK Booting device... OK Syncing with DA... OK Storage : EMMC - CID : 44000115.42443650.9DF00042.3769E8CC Vendor : Samsung - Name : DP6DBB - Serial : 3905723888 - Rev : 0 Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 16 MiB - User Area : 58.24 GiB Reading partition info... OK [49] Reading device info... FAIL [EXT4] Invalid header magic! Erasing FRP... OK UNLOCKTOOL Elapsed time : 20 seconds UNLOCKTOOL Great Tool BestRegards GsmOrient |
![]() |
![]() | #1195 (permalink) |
No Life Poster ![]() ![]() ![]() ![]() ![]() Join Date: Jan 2005 Location: Egypt_Cairo Age: 42
Posts: 728
Member: 111140 Status: Offline Thanks Meter: 75 | ![]() Samsung A137f frp TestPoint [BROM] ERASE FRP Initializing usb... OK Waiting for device... COM29 [BOOTROM:0E8D:0003] Bypassing authentication... OK Analyzing... preloader_k69v1_64_titan_bengal_tiger_k419.bin [MT6769:17:2832] [Internal] Vendor : SAMSUNG Handshaking... OK Reading hardware info... OK Hardware : MT6768 [Helio G70|G80|G85|P65] 0707 8A00 CA00 0000 Security Config : SCB SLA DAA MEID : F21999A81E5171B43C8275501EA1D157 Sending Download-Agent [1]... OK Syncing with device... OK Booting device... OK Syncing with DA... OK Storage : EMMC - CID : 44000115.42443650.9DF00042.3769E8CC Vendor : Samsung - Name : DP6DBB - Serial : 3905723888 - Rev : 0 Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 16 MiB - User Area : 58.24 GiB Reading partition info... OK [49] Reading device info... FAIL [EXT4] Invalid header magic! Erasing FRP... OK UNLOCKTOOL Elapsed time : 20 seconds UNLOCKTOOL Great Tool lBestRegards GsmOrient Last edited by GsmOrient; 02-16-2025 at 19:33. |
![]() |
![]() | #1196 (permalink) |
No Life Poster ![]() ![]() ![]() ![]() ![]() Join Date: Jan 2005 Location: Egypt_Cairo Age: 42
Posts: 728
Member: 111140 Status: Offline Thanks Meter: 75 | ![]() Redmi Note8 Pro ( M1906G7G) FRP [BROM] ERASE FRP Initializing usb... OK Waiting for device... COM29 [BOOTROM:0E8D:0003] Bypassing authentication... OK Analyzing... preloader_begonia.bin [MT6875/6781:10:1712] [Internal] Vendor : XIAOMI Handshaking... OK Reading hardware info... OK Hardware : MT6785 [Helio G90|G90T|G95] 0813 8A00 CA00 0000 Security Config : SCB SLA DAA MEID : 6F1A5A58F9D1F17C8011AD65369A208D Sending Download-Agent [1]... OK Syncing with device... OK Booting device... OK Syncing with DA... OK Storage : UFS - FWVer : A107 - CID : H9HQ16AECMMDAR Vendor ID : SKHynix [0x1AD] UFS: LU0 Size : 4 MiB - LU1 Size : 4 MiB - LU2 Size : 119.17 GiB Reading partition info... OK [47] Reading device info... OK [system vendor] Model Name : Redmi Note 8 Pro Product Name : begonia Manufacturer : Xiaomi Platform : begonia Android Version : 11 Security Patch : 2022-04-01 Build ID : RP1A.200720.011 Build : V12.5.8.0.RGGMIXM Build Date : Wed May 25 19:51:20 WIB 2022 MIUI Version : V125 MIUI Build : V12.5.8.0.RGGMIXM MIUI Region : begonia_global MIUI Locale : en-GB Erasing FRP... OK UNLOCKTOOL Elapsed time : 30 seconds UNLOCKTOOL Great Tool BestRegards GsmOrient |
![]() |
![]() | #1197 (permalink) |
No Life Poster ![]() ![]() ![]() ![]() ![]() ![]() ![]() Join Date: Aug 2005 Location: MY
Posts: 2,500
Member: 172261 Status: Offline Thanks Meter: 382 | [COM] REMOVE FRP [2023] Scanning for device... COM27 Reading Info... OK Model Number : SM-A805F Bootloader : A805FXXU7DXE1 Country Code : XME Serial Number : R58M6888HGF Unique Number : CE08193819A799OUTRDF Connecting to device... OK Trying method [1]... OK Waiting for device... Model : SM-A805F Manufacturer : samsung Platform : sm6150 CPU Arch : arm64-v8a Android Serial : R58M672SDFG Manufacturing Date : 2019.09.08 Security Patch : 2023-05-01 Connection : mtp,adb Timezone : Asia/Kuala_Lumpur Android Version : 11 Android SDK : 30 Build : RP1A.200720.012.A805FXXU7DXE1 Build Date : Tue May 7 18:37:39 +07 2024 Product Code : SM-A805FZDDXME Device Name : r1q Product Name : r1qxx Code Name : SM-A805FZDDXME **BL : A805FXXU7DXE1 **PDA : A805FXXU7DXE1 **CP : A805FXXU7DXE1,A805FXXU7DXE1 **CSC : A805FLDT7DWE3 Sales Code : XME Removing FRP... OK UNLOCKTOOL 2025.02.15.0 Elapsed time : 27 seconds |
![]() |
![]() | #1198 (permalink) |
No Life Poster ![]() ![]() ![]() ![]() ![]() Join Date: Jan 2005 Location: Egypt_Cairo Age: 42
Posts: 728
Member: 111140 Status: Offline Thanks Meter: 75 | ![]() OPPO CPH2591 FRP DONE PRELOADER Auth Oppo Realme V2 [PRELOADER] FACTORY RESET + FRP Selected auth : OPPO/REALME/ONEPLUS [2] Phone must have battery inside! Waiting for device... COM58 [PRELOADER:0E8D:2000] Handshaking... OK Reading hardware info... OK Hardware : MT6768 [Helio G70|G80|G85|P65] 0707 8A00 CA00 0000 Security Config : SCB DAA MEID : 8F1761AB15D91AE8B94E9E80432B5E16 Sending Download-Agent... OK Syncing with target... OK Booting device (preloader auth)... OK Bypassing auth... OK Syncing with DA... OK Storage : EMMC - CID : 474E0113.31324D32.152F2032.5F9A1363 Vendor : Micron - Name : G2M212 - Serial : 325260591 - Rev : 32 Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 16 MiB - User Area : 116.48 GiB Reading partition info... OK [61] Connecting to device... OK Erasing FRP... OK Erasing USERDATA (flash file)... FAIL Failed to recv read control code! UNLOCKTOOL 2025.02.15.0 Elapsed time : 1 minute 1 second UnlockTool Great Tool Best Regards, GsmOrient. Last edited by GsmOrient; 02-18-2025 at 21:40. |
![]() |
![]() | #1199 (permalink) |
No Life Poster ![]() ![]() ![]() ![]() ![]() Join Date: Jan 2005 Location: Egypt_Cairo Age: 42
Posts: 728
Member: 111140 Status: Offline Thanks Meter: 75 | ![]() Oppo F7 CPH1819 Format and FRP [PRELOADER] FACTORY RESET + FRP Selected auth : OPPO/REALME/ONEPLUS [2] Phone must have battery inside! Waiting for device... COM58 [PRELOADER:0E8D:2000] Handshaking... OK Reading hardware info... OK Hardware : MT6771 [Helio P60|P70] 0788 8A00 CA00 0000 Security Config : SCB DAA MEID : 16994945D2B3088258ABE354BBEBE2DE Sending Download-Agent... OK Syncing with target... OK Booting device (preloader auth)... OK Bypassing auth... OK Syncing with DA... OK Storage : EMMC - CID : 484A0190.61384743.3908A534.47152DA1 Vendor : SK Hynix - Name : HCG8a4 - Serial : 765540616 - Rev : 165 Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 4 MiB - User Area : 58.24 GiB Reading partition info... OK [46] Connecting to device... OK Erasing FRP... OK Erasing USERDATA (flash file)... OK UNLOCKTOOL 2025.02.15.0 Elapsed time : 39 seconds UnlockTool Great Tool Best Regards, GsmOrient. |
![]() |
![]() | #1200 (permalink) |
No Life Poster ![]() ![]() ![]() ![]() ![]() Join Date: May 2008 Location: gsm city
Posts: 827
Member: 767786 Status: Offline Thanks Meter: 322 | Nokia C10 FRP [SPRD] ERASE FRP Selected Platform : SC7731E_Bypass Connect Testpoint or hold VOL DOWN! Instruction here! Waiting for device... COM25 (SPRD U2S Diag) USB : USB\VID_1782&PID_4D00\6&252A31E1&0&1 Initializing loader... OK Protocol : SPRD3 Sending payload... OK Sending auth data... OK Sending preloader1... OK Sending preloader2... OK Booting loader, please wait... OK Boot ver: Spreadtrum Boot Block version 1.1 Sending FDL1... OK Sending FDL2... OK Reading Serial Number... N.A Reading partitions info... OK [74] [1024] Dual boot-slot : A Erasing FRP... OK UNLOCKTOOL 2025.02.19.0 Elapsed time : 35 seconds |
![]() |
![]() |
Bookmarks |
Thread Tools | |
Display Modes | |
| |
|