Another 5049w unlock done Using library Brom_DLL_v7.1813.3 Searching phone in normal mode; [connect the phone powered off with volume down pressed to the usb cable] Phone detected (MediaTek USB Port (COM62)) Preparing to start flash mode; Preparing to open COM62 Requesting authorization; Connecting; Downloading DA; Initializing; Rid: 3b5577294cb6e00cda625ea3fcc2c6a7 Requesting baudrate change; Done; USB SPEED: USB_FULL_SPEED Switching to DA_HIGHSPEED_VCOM; Drivers location \usb_driver\Driver_Auto_Installer\SmartPhoneDriver \x86; If the detection fails, install manually the port from the device manager using usbvcom.inf; DA_HIGHSPEED_VCOM (@oem23.inf,%vcom_da%;MediaTek DA USB VCOM (Android)) TRYING TO OPEN COM157; DEVICE INFO: BB CHIP: MT6738 [CB00, 01, 6738, 00] HW_STORAGE_EMMC: 0x51000115 0x4D333158 0xE6EA0742 0xCBA4AED4 [SIZE=0x748800000] IMEI1 [OTP 0001]: 014976-00-362141-9 IMEI2 [OTP 0001]: 000000-00-000000-0 PROVIDER: 5049W-2ATBUS1 USRDATA INFO: 0x120000000 SIZE: 0x6240FBE00 Searching data; Checking server support license; Bruteforcing ... relax ;-) Buteforce took 00:10:49 Checking data integrity; Data integrity: OK; SIM_LOCK: ENABLED Rebuilding security; Phone unlocked; Remove battery and cable; Time needed - 00:11:08 |
Alcatel 5033X Unlocked Using library Brom_DLL_v7.1813.3 Searching phone; (insert the USB cable in the powered off phone or insert the USB cable in the powered off phone while keeping volume down pressed) Phone detected (MediaTek USB Port (COM160)) Preparing to start meta mode; Requesting authorization; Searching for debug port; (be sure drivers from support were installed) Meta mode entered; Baseband Chip: MT6739,S01 Sw version: Hw Version: alps-mp-o1.mp1-V1.54_k39tv1.bsp_P43 Baseband Chip: MT6739 Sw version: MOLY.LR12A.R2.MP.V18.P89 Hw Version: TK_MD_L4_HW Reading phone info; IMEI 1: 356270-09-xxxxxx-0 IMEI 2: 000000-00-000000-0 Loading config; Done; Working; Unlocking; Phone unlocked; Remove battery and cable; Time needed - 00:00:26 Log file saved to: LOG_15_03_2019_22_04_56.txt |
Vdf510 frp done HERE LOG https://i.imgur.com/47q93I1.png Code: Software engine version: 1.0.0.10780 |
Model: ANE-L01 MEID: 00000000000000 pESN: 00000000 IMEI: 863441046533958 IMEI2: 000000000000000 IMEI3: 863441046533958 IMEISV: 46 Firmware ver.: System 8.0.0.046(057B) SN: 89U4C18829013343 PCB SN: 4C4VYH188Y002048 WiFi MAC: A8:7D:12:CF:88:24 BlueTooth MAC: A8:7D:12:CF:8C:21 Vendor: hw Country: eu FASTBOOT:Chipset-dallas8.0.0.001(01LR)_FASTBOOT BOOT:System 8.0.0.046(057B)_BOOT RECOVERY:(unknow) SYSTEM:System 8.0.0.046(057B) MAINVER:System 8.0.0.046(057B) DATAVER:(unknow) APTIME:Tue Feb 13 13:37:01 CST 2018 RAM: 4G eMMC: 64G eMMC ID: 13014E53304A3338591005F3D0EF8500 HUN: EFD0F30500000000 IMEI 1 Sim Lock status: NET: unlocked NETSUB: unlocked SP: unlocked 2019-02-20 12:51:28.983 Phone info data backup saved to file D:\XXXXXXXXX 2019-02-20 12:51:55.411 Autodetect COM port and phone type start! 2019-02-20 12:51:58.188 Found COM port: COM159 2019-02-20 12:51:58.203 Found phone type: Huawei Android phone (HiSilicon CPU) Fixed IMEI CRC: 863566546465663 2019-02-20 12:51:58.359 Connecting to server... 2019-02-20 12:52:05.582 Connect fail! 2019-02-20 12:52:05.582 Connecting to server... 2019-02-20 12:52:12.665 Connect fail! 2019-02-20 12:52:12.665 Connecting to server... 2019-02-20 12:52:19.607 Connect fail! 2019-02-20 12:52:19.607 Testing servers... 2019-02-20 12:52:30.963 Testing servers Done! 2019-02-20 12:52:31.229 Connecting to server... 2019-02-20 12:52:31.837 Connected! 2019-02-20 12:52:31.837 Open COM port COM159 (Android Adapter PCUI (COM159))... 2019-02-20 12:52:41.696 CP State: ready 2019-02-20 12:52:41.696 Read phone basic info... 2019-02-20 12:52:42.617 Read phone secure info... 2019-02-20 12:52:48.826 Phone info data backup saved to file D:\XXXXXXx 2019-02-20 12:52:49.496 Repairing start New IMEI 1 : 863566546465663 2019-02-20 12:52:49.512 Read from server... 2019-02-20 12:52:50.027 Read from server success! 2019-02-20 12:52:53.084 Phone secure identify start 2019-02-20 12:52:56.392 Waiting for server responce (up to 61 seconds left)... 2019-02-20 12:52:57.530 Phone secure identify success! 2019-02-20 12:52:57.546 Writing IMEI 1 start 2019-02-20 12:52:57.546 Reading from server... 2019-02-20 12:52:59.090 Read from server success! 2019-02-20 12:53:00.136 Write IMEI success! 2019-02-20 12:53:03.334 Synchronize NV... 2019-02-20 12:53:03.926 Synchronize NV success! 2019-02-20 12:53:03.926 Factory reset... 2019-02-20 12:53:06.578 Factory reset success! 2019-02-20 12:53:06.594 Finished! |
alcatel 5026d frp remove done Using library Brom_DLL_v7.1813.3 Searching phone in normal mode; [connect the phone powered off to the usb cable] Phone detected (MTK USB Port (COM6)) Preparing to start flash mode; Preparing to open COM6 Requesting authorization; Connecting; Downloading DA; Initializing; Rid: 17a1643cf9f750addcfea24fb08064cf Requesting baudrate change; Done; USB SPEED: USB_FULL_SPEED Switching to DA_HIGHSPEED_VCOM; Drivers location \usb_driver\Driver_Auto_Installer\SmartPhoneDriver \x86; If the detection fails, install manually the port from the device manager using usbvcom.inf; DA_HIGHSPEED_VCOM (@oem131.inf,%mtk_sp_da%;DA USB VCOM Port) TRYING TO OPEN COM5; DEVICE INFO: BB CHIP: MT6580 [CA00, 00, 6580, 05] HW_STORAGE_EMMC: 0x45000170 0x45454148 0x9C160138 0xFBB4E490 [SIZE=0x390C00000] IMEI1 [OTP 0001]: 353441xxxxxxx70-9 IMEI2 [OTP 0001]: 35344xxxxxxxx71-7 PROVIDER: 5026D-2BALWE1 USRDATA INFO: 0xF7800000 SIZE: 0x294C80000 Factory Reset Protection successfully removed ! Time needed - 00:00:00 |
Connect the phone powered off with both volume down and up pressed or connect the phone powered off and leave it connected to the usb till it shows the battery/charging screen ; Phone detected (@usb.inf,%usb\composite.devicedesc%;USB Composite Device) Preparing to enter download mode; Preparing to open COM4 Connecting; Init; Port opened; Phone detected (@oem224.inf,%qcomserialportdesc90080%;Android HS-USB QDLoader 9008) Preparing to start flash mode; Preparing to open COM6 Connecting; Loading; Init; Port opened; Hello Received; BOOT Loaded; Getting config; Getting mem info; Found an eMMC memory 22CD size 7.3 GB IMEI: 01470500127**** PTH: 03 PTS: N5S PROV_ID: 5065N-2CE4US1 SBTADDR: 28:BE:03:05:28:D0 SWIFIADDR: 28:BE:03:08:85:DA HS_PN: SAA34NBAA10C SSN: 98KJ10BDLK*** Work id: 068A3B9C Done; Stype: 00000001 SECURITY: X2N0UP00CL10 Size: 000002C3 Backup saved to: 01470500127987-4 Unlocking; SIM_LOCK REMOVED ! Log file saved to: LOG_16_03_2019_19_25_28.txt Time needed - 00:01:11 |
zte 223 unlock qcom smart tool module v1.0.0.10780 Software engine version: 1.0.0.10780 Searching phone ... MODEL : QCOM SERIES 10 COMPILED DATE : Sep 12 2016 12:29:00 RELEASE DATE : Dec 30 2011 06:00:00 FIRMWARE INFO : ROG_CA_Z223V1.0.0B04-S IMEI : 86119003878654-4 BLUETOOTH ADDR : DC 7A 86 BC 73 60 FON; INIT NAND ROUTINES; NAND INIT MADE; PHONE CODE: 0000 READING; CALCULATING; BEFORE BACKUP: 6FBDD434DB8E7D5F287A734142DFAE0C.bin ERASING; WRITING; READING; AFTER BACKUP: 894FAC31C04161FF03FD9CCD1548A741.bin UNLOCKED; FOFF; RESET ! Log file saved to: LOG_18_03_2019_15_54_55.txt Time needed - 00:01:09 |
Using library Brom_DLL_v7.1813.3 Searching phone in normal mode; [connect the phone powered off to the usb cable] Phone detected (MediaTek USB Port (COM3)) Preparing to start flash mode; Preparing to open COM3 Requesting authorization; Connecting; Downloading DA; Initializing; Rid: 5ca9fad2c5ebcbeed4f313647b5591fa Requesting baudrate change; Done; USB SPEED: USB_HIGH_SPEED DEVICE INFO: BB CHIP: MT6763 [CA01, 01, 6763, 00] HW_STORAGE_EMMC: 0x51000115 0x4D333158 0xFC740742 0x6D55ABD4 [SIZE=0x748800000] IMEI1 [OTP 0001]: 015126-00-2****** IMEI2 [OTP 0001]: 000000-00-000000-0 PROVIDER: 6062W-2BTBUS7 USRDATA INFO: 0x13B800000 SIZE: 0x6088FBE00 Searching data; Checking server support license; Bruteforcing ... relax ;-) Buteforce took 00:12:18 Checking data integrity; Data integrity: OK; SIM_LOCK: ENABLED Rebuilding security; Phone unlocked; Remove battery and cable; Time needed - 00:12:31 Log file saved to: LOG_18_03_2019_10_00_19.txt |
Huawei VIA_L09 aka P9 Plus REBOOT ISSUE AFTER OFFICIAL UPDATE! SUccess with fGOld Looking for a device in upgrade mode No devices detected in upgrade mode Device found: N9Q7N16329000314 19.03.2019 14:58:59 Starting to write device in FASTBOOT mode... Looking for a device in fastboot mode Device found: N9Q7N16329000314 SN:N9Q7N16329000314 IMEI:860865030253889 IMEI1:860865030253889 Build number: :VIE-L09C432B370 Model: VIE-L09 Battery state: 4276mv Extracting partition XLOADER... Writing XLOADER partition XLOADER partition UPDATE ...OK Extracting partition FW_LPM3... Writing FW_LPM3 partition FW_LPM3 partition UPDATE ...OK Extracting partition FASTBOOT... Writing FASTBOOT partition FASTBOOT partition UPDATE ...OK Extracting partition MODEMNVM_UPDATE... Writing MODEMNVM_UPDATE partition MODEMNVM_UPDATE partition UPDATE ...OK Extracting partition TEEOS... Writing TEEOS partition TEEOS partition UPDATE ...OK Extracting partition TRUSTFIRMWARE... Writing TRUSTFIRMWARE partition TRUSTFIRMWARE partition UPDATE ...OK Extracting partition SENSORHUB... Writing SENSORHUB partition SENSORHUB partition UPDATE ...OK Extracting partition FW_HIFI... Writing FW_HIFI partition FW_HIFI partition UPDATE ...OK Extracting partition BOOT... Writing BOOT partition BOOT partition UPDATE ...OK Extracting partition RECOVERY... Writing RECOVERY partition RECOVERY partition UPDATE ...OK Extracting partition RECOVERY2... Writing RECOVERY2 partition RECOVERY2 partition UPDATE ...OK Extracting partition DTS... Writing DTS partition DTS partition UPDATE ...OK Extracting partition MODEM... Writing MODEM partition MODEM partition UPDATE ...OK Extracting partition MODEM_DSP... Writing MODEM_DSP partition MODEM_DSP partition UPDATE ...OK Extracting partition 3RDMODEM... Writing 3RDMODEM partition 3RDMODEM partition UPDATE ...OK Extracting partition CACHE... Erasing CACHE partition Partition CACHE erased Writing CACHE partition CACHE partition UPDATE ...OK Extracting partition SYSTEM... Writing SYSTEM partition sending sparse file 469762048 bytes send sparse file OK sending sparse file 469762048 bytes send sparse file OK sending sparse file 469762048 bytes send sparse file OK sending sparse file 469762048 bytes send sparse file OK sending sparse file 59666736 bytes send sparse file OK SYSTEM partition UPDATE ...OK Extracting partition MODEM_DTB... Writing MODEM_DTB partition MODEM_DTB partition UPDATE ...OK Extracting partition USERDATA... Erasing USERDATA partition Partition USERDATA erased Writing USERDATA partition USERDATA partition UPDATE ...OK Software written 19.03.2019 15:02:42 Writing device finished OK |
RIU R1 UserLock Code Removed Done World First Code: Searching phone; |
Alcatel 5049w T mobile unlocked ok 1 Attachment(s) Alcatel 5049w T mobile unlocked ok |
alcatel 9001x unlock done Phone detected (@oem227.inf,%vendordevice90080%;Qualcomm HS-USB QDLoader 9008) Preparing to start flash mode; Preparing to open COM162 Connecting; Loading; Init; Port opened; Hello Received; BOOT Loaded; Getting config; Getting mem info; Found an eMMC memory 22CD size 14.6 GB IMEI: 35834607075360-8 PTH: 07 PTS: D2A PROV_ID: 9001X-2ATWGB1 SBTADDR: CC:FD:17:DC:3B:F6 SWIFIADDR: CC:FD:17:CA:3A:A7 HS_PN: SAA1FA0AA10C SSN: H6KE11CP2EA003X Bruteforcing data; This operation can take up to 30 minutes !!! Done; Work id: 0872DE08 Done; Stype: 00000001 SECURITY: XMD0CD00BR00 Size: 00000322 Backup saved to: 35834607075360-8 Unlocking; SIM_LOCK REMOVED ! |
Navon Classic L (three sim version) succesfull unlocked Searching phone; For an successful connection do the following: 1. Power on the phone and power it off and leave the battery inside 2. Keep pressed firmly the boot key 3. Insert the usb cable inside the phone while keeping pressed the boot key Phone detected (SCI USB2Serial) Preparing to sync; Port opened [COM53]; Mobile type: SPRD3 Connected; Starting; FDL sent; Syncing; Loader version: Spreadtrum Boot Block version 1.2 Starting FDL2; FDL2 sent; Chip type: 6562:0001 Starting auth; HW IMEI : 000000-00-000000-0 Memory [CS0]: 00C8:0060:0016 - SIZE : 00400000 [00006180349A9D80:0000] Reading phone info; PHONE INFO: NONE BT ADDR: 24:54:14:13:81:38 SW IMEI[0]: 359118-05-226xxxx-x SW IMEI[1]: 359118-05-226xxxx-x SW IMEI[2]: 358570-01-010xxxx-x SW IMEI[3]: 910575-60-140xxxx-x SIMLOCK FLAG: ON FIXED NV BASE: 103A8000 Uncompressing; Done; Re-programming; FLS programmed; Done; Remove battery and cable; Log file saved to: LOG_21_03_2019_12_34_51.txt Time needed - 00:02:56 Thx for quick work! :) |
Using library Brom_DLL_v7.1813.3 Searching phone in normal mode; [connect the phone powered off to the usb cable] Phone detected (MediaTek USB Port (COM7)) Preparing to start flash mode; Preparing to open COM7 Requesting authorization; Connecting; Downloading DA; Initializing; Rid: df057ecc7137b2ccf68b74238730250a Requesting baudrate change; Done; USB SPEED: USB_HIGH_SPEED DEVICE INFO: BB CHIP: MT6739 [CB00, 02, 6739, 00] HW_STORAGE_EMMC: 0x51000115 0x4D333644 0x70CA0142 0x3DB583DE [SIZE=0x749400000] IMEI1 [OTP 0001]: 015246-00-132*** IMEI2 [OTP 0001]: 000000-00-000000-0 PROVIDER: 5052W-2ATBUSE USRDATA INFO: 0x133800000 SIZE: 0x6108FBE00 Searching data; Checking server support license; Bruteforcing ... relax ;-) Buteforce took 00:03:25 Checking data integrity; Data integrity: OK; Rebuilding security; Phone unlocked; Remove battery and cable; Time needed - 00:03:37 Log file saved to: LOG_21_03_2019_21_29_37.txt Cooool Thx frg sigma is **** thx again |
alcatel ot 4034D unlock succefull , one of the word after try a lot of box for unlock my alcatel 4034D, only furious PACK 6 succed it this is the log Using library Brom_DLL_v7.1813.3 Searching phone in normal mode; [connect the phone powered off to the usb cable] Phone detected (MediaTek PreLoader USB VCOM (Android) (COM23)) Preparing to start flash mode; Preparing to open COM23 Connecting; Downloading DA; Initializing; Rid: 28482d6f9b8c901794b944adce4fd70e Requesting baudrate change; Done; USB SPEED: USB_HIGH_SPEED DEVICE INFO: BB CHIP: MT6580 [CA00, 00, 6580, FF] HW_STORAGE_EMMC: 0x504E01FE 0x34394A31 0xD733124D 0xF17497D9 [SIZE=0xE9B00000] IMEI1 [OTP 0001]: 354442-08-781734-8 IMEI2 [OTP 0001]: 354442-08-781735-5 PROVIDER: 4034D-2ARGWCC USRDATA INFO: 0x58800000 SIZE: 0x60000000 Searching data; Locked to [SIM1]: 602-01 code_cat_n: 0471721459508473 enabled: yes tries: 9 code_cat_ns: 0455176205312999 enabled: no tries: 10 code_cat_sp: 5167562046681854 enabled: no tries: 10 code_cat_c: 3623500025310847 enabled: no tries: 10 code_cat_sim: 5655524823120493 enabled: no tries: 10 code_cat_ns_sp: 6618292588446991 enabled: no tries: 5 code_cat_sim_c: 9202050477396076 enabled: no tries: 5 Locked to [SIM2]: 602-01 code_cat_n: 3236631011340633 enabled: yes tries: 10 code_cat_ns: 0421249488173969 enabled: no tries: 10 code_cat_sp: 5941140490336252 enabled: no tries: 10 code_cat_c: 2362429983166998 enabled: no tries: 10 code_cat_sim: 7986397728714011 enabled: no tries: 10 code_cat_ns_sp: 1047473532077133 enabled: no tries: 5 code_cat_sim_c: 1095456220312365 enabled: no tries: 5 Phone unlocked; Remove battery and cable; Time needed - 00:00:16 Log file saved to: LOG_25_03_2019_18_06_15.txt thk furious team |
All times are GMT +1. The time now is 07:41. |
vBulletin Optimisation provided by
vB Optimise (Pro) -
vBulletin Mods & Addons Copyright © 2024 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2023 -