GSM-Forum

GSM-Forum (https://forum.gsmhosting.com/vbb/)
-   FuriousGold (https://forum.gsmhosting.com/vbb/f272/)
-   -   FuriousGold Successfully Unlocked / Repaired / Flashed Phones !!! (https://forum.gsmhosting.com/vbb/f272/furiousgold-successfully-unlocked-repaired-flashed-phones-661803/)

ziggywong0305 03-15-2019 20:43

Another 5049w unlock done
 
Using library Brom_DLL_v7.1813.3
Searching phone in normal mode;
[connect the phone powered off with volume down pressed to the usb cable]
Phone detected (MediaTek USB Port (COM62))
Preparing to start flash mode;
Preparing to open COM62
Requesting authorization;
Connecting;
Downloading DA;
Initializing;
Rid: 3b5577294cb6e00cda625ea3fcc2c6a7
Requesting baudrate change;
Done;
USB SPEED: USB_FULL_SPEED
Switching to DA_HIGHSPEED_VCOM;

Drivers location \usb_driver\Driver_Auto_Installer\SmartPhoneDriver \x86;
If the detection fails, install manually the port from the device manager using usbvcom.inf;

DA_HIGHSPEED_VCOM (@oem23.inf,%vcom_da%;MediaTek DA USB VCOM (Android))
TRYING TO OPEN COM157;
DEVICE INFO:
BB CHIP: MT6738 [CB00, 01, 6738, 00]
HW_STORAGE_EMMC: 0x51000115 0x4D333158 0xE6EA0742 0xCBA4AED4 [SIZE=0x748800000]
IMEI1 [OTP 0001]: 014976-00-362141-9
IMEI2 [OTP 0001]: 000000-00-000000-0
PROVIDER: 5049W-2ATBUS1
USRDATA INFO: 0x120000000 SIZE: 0x6240FBE00



Searching data;
Checking server support license;
Bruteforcing ... relax ;-)
Buteforce took 00:10:49
Checking data integrity;
Data integrity: OK;
SIM_LOCK: ENABLED
Rebuilding security;

Phone unlocked; Remove battery and cable;

Time needed - 00:11:08

Seedy 03-15-2019 23:06

Alcatel 5033X Unlocked
Using library Brom_DLL_v7.1813.3
Searching phone;
(insert the USB cable in the powered off phone
or
insert the USB cable in the powered off phone while keeping volume down pressed)
Phone detected (MediaTek USB Port (COM160))
Preparing to start meta mode;
Requesting authorization;
Searching for debug port; (be sure drivers from support were installed)
Meta mode entered;
Baseband Chip: MT6739,S01
Sw version:
Hw Version: alps-mp-o1.mp1-V1.54_k39tv1.bsp_P43

Baseband Chip: MT6739
Sw version: MOLY.LR12A.R2.MP.V18.P89
Hw Version: TK_MD_L4_HW
Reading phone info;
IMEI 1: 356270-09-xxxxxx-0
IMEI 2: 000000-00-000000-0
Loading config;
Done;
Working;
Unlocking;

Phone unlocked; Remove battery and cable;

Time needed - 00:00:26

Log file saved to: LOG_15_03_2019_22_04_56.txt

CHAUDHRAY ARSHAD 03-16-2019 09:51

Vdf510 frp done
 
HERE LOG


https://i.imgur.com/47q93I1.png

Code:

Software engine version: 1.0.0.10780
Searching phone ...

MODEL :        QCOM SERIES 51
COMPILED DATE :    Oct 13 2018 02:02:00
RELEASE DATE :    Sep 2 2018 22:00:00
FIRMWARE INFO :    MPSS.JO.3.0-00291-8909_GEN_PACK-1.97872.1.166896.1
IMEI :        35224909417209-2
BLUETOOTH ADDR :    00 00 00 00 00 00

FIRMWARE: ZA_MR2_VDF_P809V51V1.0.0B03

close_event_report: OK;
close_log_report: OK;
close_message_report: OK;
closing_com_port: OK;
Starting the backup process;
connect_server: OK;
backup in progress: OK;
Backup saved to: E:\FG SOFTWARE\QCOM_SMART_TOOL_v1.0.0.10780\35224909417209_16_03_2019_10_46_45.bkp
switching_download_mode: OK;
closing_com_port: OK;
Preparing to open COM10
Connecting;
Loading;
Init;
Port opened;
Hello Received;
BOOT Loaded;
Getting config;
Getting mem info;
Found an eMMC memory 22CD
start_frp_reset: OK;
frp_reset: OK;

Log file saved to: LOG_16_03_2019_10_49_31.txt

Time needed - 00:02:50


..::GMSR::.. 03-16-2019 14:24

Model: ANE-L01
MEID: 00000000000000
pESN: 00000000
IMEI: 863441046533958
IMEI2: 000000000000000
IMEI3: 863441046533958
IMEISV: 46
Firmware ver.: System 8.0.0.046(057B)
SN: 89U4C18829013343
PCB SN: 4C4VYH188Y002048
WiFi MAC: A8:7D:12:CF:88:24
BlueTooth MAC: A8:7D:12:CF:8C:21
Vendor: hw
Country: eu
FASTBOOT:Chipset-dallas8.0.0.001(01LR)_FASTBOOT
BOOT:System 8.0.0.046(057B)_BOOT
RECOVERY:(unknow)
SYSTEM:System 8.0.0.046(057B)
MAINVER:System 8.0.0.046(057B)
DATAVER:(unknow)
APTIME:Tue Feb 13 13:37:01 CST 2018
RAM: 4G
eMMC: 64G
eMMC ID: 13014E53304A3338591005F3D0EF8500
HUN: EFD0F30500000000

IMEI 1 Sim Lock status:
NET: unlocked
NETSUB: unlocked
SP: unlocked

2019-02-20 12:51:28.983 Phone info data backup saved to file D:\XXXXXXXXX

2019-02-20 12:51:55.411 Autodetect COM port and phone type start!
2019-02-20 12:51:58.188 Found COM port: COM159
2019-02-20 12:51:58.203 Found phone type: Huawei Android phone (HiSilicon CPU)
Fixed IMEI CRC: 863566546465663
2019-02-20 12:51:58.359 Connecting to server...
2019-02-20 12:52:05.582 Connect fail!
2019-02-20 12:52:05.582 Connecting to server...
2019-02-20 12:52:12.665 Connect fail!
2019-02-20 12:52:12.665 Connecting to server...
2019-02-20 12:52:19.607 Connect fail!
2019-02-20 12:52:19.607 Testing servers...
2019-02-20 12:52:30.963 Testing servers Done!
2019-02-20 12:52:31.229 Connecting to server...
2019-02-20 12:52:31.837 Connected!
2019-02-20 12:52:31.837 Open COM port COM159 (Android Adapter PCUI (COM159))...
2019-02-20 12:52:41.696 CP State: ready
2019-02-20 12:52:41.696 Read phone basic info...
2019-02-20 12:52:42.617 Read phone secure info...

2019-02-20 12:52:48.826 Phone info data backup saved to file D:\XXXXXXx

2019-02-20 12:52:49.496 Repairing start
New IMEI 1 : 863566546465663
2019-02-20 12:52:49.512 Read from server...
2019-02-20 12:52:50.027 Read from server success!
2019-02-20 12:52:53.084 Phone secure identify start
2019-02-20 12:52:56.392 Waiting for server responce (up to 61 seconds left)...
2019-02-20 12:52:57.530 Phone secure identify success!
2019-02-20 12:52:57.546 Writing IMEI 1 start
2019-02-20 12:52:57.546 Reading from server...
2019-02-20 12:52:59.090 Read from server success!
2019-02-20 12:53:00.136 Write IMEI success!
2019-02-20 12:53:03.334 Synchronize NV...
2019-02-20 12:53:03.926 Synchronize NV success!
2019-02-20 12:53:03.926 Factory reset...
2019-02-20 12:53:06.578 Factory reset success!
2019-02-20 12:53:06.594 Finished!

unlockmachine44 03-16-2019 15:47

alcatel 5026d frp remove done

Using library Brom_DLL_v7.1813.3
Searching phone in normal mode;
[connect the phone powered off to the usb cable]
Phone detected (MTK USB Port (COM6))
Preparing to start flash mode;
Preparing to open COM6
Requesting authorization;
Connecting;
Downloading DA;
Initializing;
Rid: 17a1643cf9f750addcfea24fb08064cf
Requesting baudrate change;
Done;
USB SPEED: USB_FULL_SPEED
Switching to DA_HIGHSPEED_VCOM;

Drivers location \usb_driver\Driver_Auto_Installer\SmartPhoneDriver \x86;
If the detection fails, install manually the port from the device manager using usbvcom.inf;

DA_HIGHSPEED_VCOM (@oem131.inf,%mtk_sp_da%;DA USB VCOM Port)
TRYING TO OPEN COM5;
DEVICE INFO:
BB CHIP: MT6580 [CA00, 00, 6580, 05]
HW_STORAGE_EMMC: 0x45000170 0x45454148 0x9C160138 0xFBB4E490 [SIZE=0x390C00000]
IMEI1 [OTP 0001]: 353441xxxxxxx70-9
IMEI2 [OTP 0001]: 35344xxxxxxxx71-7
PROVIDER: 5026D-2BALWE1
USRDATA INFO: 0xF7800000 SIZE: 0x294C80000


Factory Reset Protection successfully removed !


Time needed - 00:00:00

Dzomega 03-17-2019 01:47

Connect the phone powered off with both volume down and up pressed or connect the phone powered off and leave it connected to the usb till it shows the battery/charging screen ;
Phone detected (@usb.inf,%usb\composite.devicedesc%;USB Composite Device)
Preparing to enter download mode;
Preparing to open COM4
Connecting;
Init;
Port opened;
Phone detected (@oem224.inf,%qcomserialportdesc90080%;Android HS-USB QDLoader 9008)
Preparing to start flash mode;
Preparing to open COM6
Connecting;
Loading;
Init;
Port opened;
Hello Received;
BOOT Loaded;
Getting config;
Getting mem info;
Found an eMMC memory 22CD size 7.3 GB

IMEI: 01470500127****
PTH: 03
PTS: N5S
PROV_ID: 5065N-2CE4US1
SBTADDR: 28:BE:03:05:28:D0
SWIFIADDR: 28:BE:03:08:85:DA
HS_PN: SAA34NBAA10C
SSN: 98KJ10BDLK***

Work id: 068A3B9C
Done;
Stype: 00000001
SECURITY: X2N0UP00CL10 Size: 000002C3
Backup saved to: 01470500127987-4
Unlocking;
SIM_LOCK REMOVED !

Log file saved to: LOG_16_03_2019_19_25_28.txt

Time needed - 00:01:11

JMJ ALBERT 03-18-2019 09:01

zte 223 unlock qcom smart tool module v1.0.0.10780

Software engine version: 1.0.0.10780
Searching phone ...

MODEL : QCOM SERIES 10
COMPILED DATE : Sep 12 2016 12:29:00
RELEASE DATE : Dec 30 2011 06:00:00
FIRMWARE INFO : ROG_CA_Z223V1.0.0B04-S
IMEI : 86119003878654-4
BLUETOOTH ADDR : DC 7A 86 BC 73 60

FON;

INIT NAND ROUTINES;
NAND INIT MADE;
PHONE CODE: 0000

READING;
CALCULATING;
BEFORE BACKUP: 6FBDD434DB8E7D5F287A734142DFAE0C.bin
ERASING;
WRITING;
READING;
AFTER BACKUP: 894FAC31C04161FF03FD9CCD1548A741.bin
UNLOCKED;
FOFF;
RESET !

Log file saved to: LOG_18_03_2019_15_54_55.txt

Time needed - 00:01:09

Dzomega 03-18-2019 15:11

Using library Brom_DLL_v7.1813.3
Searching phone in normal mode;
[connect the phone powered off to the usb cable]
Phone detected (MediaTek USB Port (COM3))
Preparing to start flash mode;
Preparing to open COM3
Requesting authorization;
Connecting;
Downloading DA;
Initializing;
Rid: 5ca9fad2c5ebcbeed4f313647b5591fa
Requesting baudrate change;
Done;
USB SPEED: USB_HIGH_SPEED
DEVICE INFO:
BB CHIP: MT6763 [CA01, 01, 6763, 00]
HW_STORAGE_EMMC: 0x51000115 0x4D333158 0xFC740742 0x6D55ABD4 [SIZE=0x748800000]
IMEI1 [OTP 0001]: 015126-00-2******
IMEI2 [OTP 0001]: 000000-00-000000-0
PROVIDER: 6062W-2BTBUS7
USRDATA INFO: 0x13B800000 SIZE: 0x6088FBE00



Searching data;
Checking server support license;
Bruteforcing ... relax ;-)
Buteforce took 00:12:18
Checking data integrity;
Data integrity: OK;
SIM_LOCK: ENABLED
Rebuilding security;

Phone unlocked; Remove battery and cable;

Time needed - 00:12:31

Log file saved to: LOG_18_03_2019_10_00_19.txt

soulgsm 03-19-2019 14:09

Huawei VIA_L09 aka P9 Plus REBOOT ISSUE AFTER OFFICIAL UPDATE!

SUccess with fGOld

Looking for a device in upgrade mode
No devices detected in upgrade mode
Device found: N9Q7N16329000314


19.03.2019 14:58:59 Starting to write device in FASTBOOT mode...

Looking for a device in fastboot mode
Device found: N9Q7N16329000314

SN:N9Q7N16329000314
IMEI:860865030253889

IMEI1:860865030253889
Build number: :VIE-L09C432B370
Model: VIE-L09
Battery state: 4276mv


Extracting partition XLOADER...
Writing XLOADER partition
XLOADER partition UPDATE ...OK

Extracting partition FW_LPM3...
Writing FW_LPM3 partition
FW_LPM3 partition UPDATE ...OK

Extracting partition FASTBOOT...
Writing FASTBOOT partition
FASTBOOT partition UPDATE ...OK

Extracting partition MODEMNVM_UPDATE...
Writing MODEMNVM_UPDATE partition
MODEMNVM_UPDATE partition UPDATE ...OK

Extracting partition TEEOS...
Writing TEEOS partition
TEEOS partition UPDATE ...OK

Extracting partition TRUSTFIRMWARE...
Writing TRUSTFIRMWARE partition
TRUSTFIRMWARE partition UPDATE ...OK

Extracting partition SENSORHUB...
Writing SENSORHUB partition
SENSORHUB partition UPDATE ...OK

Extracting partition FW_HIFI...
Writing FW_HIFI partition
FW_HIFI partition UPDATE ...OK

Extracting partition BOOT...
Writing BOOT partition
BOOT partition UPDATE ...OK

Extracting partition RECOVERY...
Writing RECOVERY partition
RECOVERY partition UPDATE ...OK

Extracting partition RECOVERY2...
Writing RECOVERY2 partition
RECOVERY2 partition UPDATE ...OK

Extracting partition DTS...
Writing DTS partition
DTS partition UPDATE ...OK

Extracting partition MODEM...
Writing MODEM partition
MODEM partition UPDATE ...OK

Extracting partition MODEM_DSP...
Writing MODEM_DSP partition
MODEM_DSP partition UPDATE ...OK

Extracting partition 3RDMODEM...
Writing 3RDMODEM partition
3RDMODEM partition UPDATE ...OK

Extracting partition CACHE...
Erasing CACHE partition
Partition CACHE erased
Writing CACHE partition
CACHE partition UPDATE ...OK

Extracting partition SYSTEM...
Writing SYSTEM partition
sending sparse file 469762048 bytes
send sparse file OK
sending sparse file 469762048 bytes
send sparse file OK
sending sparse file 469762048 bytes
send sparse file OK
sending sparse file 469762048 bytes
send sparse file OK
sending sparse file 59666736 bytes
send sparse file OK
SYSTEM partition UPDATE ...OK

Extracting partition MODEM_DTB...
Writing MODEM_DTB partition
MODEM_DTB partition UPDATE ...OK

Extracting partition USERDATA...
Erasing USERDATA partition
Partition USERDATA erased
Writing USERDATA partition
USERDATA partition UPDATE ...OK
Software written
19.03.2019 15:02:42 Writing device finished OK

Shensohau 03-19-2019 19:22

RIU R1 UserLock Code Removed Done World First
 
Code:

Searching phone;
For an successful connection do the following:
1. Power on the phone and power it off and leave the battery inside
2. Keep pressed firmly the boot key
3. Insert the usb cable inside the phone while keeping pressed the boot key
Phone detected (@oem117.inf,%dvcdsc%;SCI USB2Serial)
Preparing to sync;
Port opened [COM33];
Mobile type: SPRD3
Connected;
Starting;
FDL sent;
Syncing;
Loader version: Spreadtrum Boot Block version 1.2
Starting FDL2;
FDL2 sent;
Chip type: 6562 FdlStat: 0001
Starting auth;
HW IMEI : 000000-00-000000-0

Memory [CS0]: 00C8:0060:0016 - SIZE : 00400000 [000030432E9A5B54:0000]
Reading phone info;
PHONE INFO: NONE
BT ADDR: 81:08:72:86:00:19
SW IMEI[0]: 359190-08-672087-3
SW IMEI[1]: 359190-08-672088-1
SW IMEI[2]: 358570-01-010389-3
SW IMEI[3]: 910575-60-140046-8

SIMLOCK FLAG: ON
FIXED NV BASE: 103B0000
Searching fs start and end addr;
Formatting 103B8000-10400000;
Starting format;
Formatted;
Done;

Remove battery and cable;


Unlocker AL 03-20-2019 13:58

Alcatel 5049w T mobile unlocked ok
 
1 Attachment(s)
Alcatel 5049w T mobile unlocked ok

kamranas 03-20-2019 16:30

alcatel 9001x unlock done
 
Phone detected (@oem227.inf,%vendordevice90080%;Qualcomm HS-USB QDLoader 9008)
Preparing to start flash mode;
Preparing to open COM162
Connecting;
Loading;
Init;
Port opened;
Hello Received;
BOOT Loaded;
Getting config;
Getting mem info;
Found an eMMC memory 22CD size 14.6 GB

IMEI: 35834607075360-8
PTH: 07
PTS: D2A
PROV_ID: 9001X-2ATWGB1
SBTADDR: CC:FD:17:DC:3B:F6
SWIFIADDR: CC:FD:17:CA:3A:A7
HS_PN: SAA1FA0AA10C
SSN: H6KE11CP2EA003X

Bruteforcing data; This operation can take up to 30 minutes !!!
Done;
Work id: 0872DE08
Done;
Stype: 00000001
SECURITY: XMD0CD00BR00 Size: 00000322
Backup saved to: 35834607075360-8
Unlocking;
SIM_LOCK REMOVED !

roniri 03-21-2019 12:45

Navon Classic L (three sim version) succesfull unlocked
 
Searching phone;
For an successful connection do the following:
1. Power on the phone and power it off and leave the battery inside
2. Keep pressed firmly the boot key
3. Insert the usb cable inside the phone while keeping pressed the boot key
Phone detected (SCI USB2Serial)
Preparing to sync;
Port opened [COM53];
Mobile type: SPRD3
Connected;
Starting;
FDL sent;
Syncing;
Loader version: Spreadtrum Boot Block version 1.2
Starting FDL2;
FDL2 sent;
Chip type: 6562:0001
Starting auth;
HW IMEI : 000000-00-000000-0

Memory [CS0]: 00C8:0060:0016 - SIZE : 00400000 [00006180349A9D80:0000]
Reading phone info;
PHONE INFO: NONE
BT ADDR: 24:54:14:13:81:38
SW IMEI[0]: 359118-05-226xxxx-x
SW IMEI[1]: 359118-05-226xxxx-x
SW IMEI[2]: 358570-01-010xxxx-x
SW IMEI[3]: 910575-60-140xxxx-x

SIMLOCK FLAG: ON
FIXED NV BASE: 103A8000
Uncompressing;
Done;
Re-programming;
FLS programmed;
Done;

Remove battery and cable;

Log file saved to: LOG_21_03_2019_12_34_51.txt


Time needed - 00:02:56


Thx for quick work! :)

Dzomega 03-22-2019 02:31

Using library Brom_DLL_v7.1813.3
Searching phone in normal mode;
[connect the phone powered off to the usb cable]
Phone detected (MediaTek USB Port (COM7))
Preparing to start flash mode;
Preparing to open COM7
Requesting authorization;
Connecting;
Downloading DA;
Initializing;
Rid: df057ecc7137b2ccf68b74238730250a
Requesting baudrate change;
Done;
USB SPEED: USB_HIGH_SPEED
DEVICE INFO:
BB CHIP: MT6739 [CB00, 02, 6739, 00]
HW_STORAGE_EMMC: 0x51000115 0x4D333644 0x70CA0142 0x3DB583DE [SIZE=0x749400000]
IMEI1 [OTP 0001]: 015246-00-132***
IMEI2 [OTP 0001]: 000000-00-000000-0
PROVIDER: 5052W-2ATBUSE
USRDATA INFO: 0x133800000 SIZE: 0x6108FBE00



Searching data;
Checking server support license;
Bruteforcing ... relax ;-)
Buteforce took 00:03:25
Checking data integrity;
Data integrity: OK;
Rebuilding security;

Phone unlocked; Remove battery and cable;

Time needed - 00:03:37

Log file saved to: LOG_21_03_2019_21_29_37.txt


Cooool Thx frg sigma is ****

thx again

roni2 03-25-2019 18:24

alcatel ot 4034D unlock succefull , one of the word
 
after try a lot of box for unlock my alcatel 4034D, only furious PACK 6 succed it this is the log

Using library Brom_DLL_v7.1813.3
Searching phone in normal mode;
[connect the phone powered off to the usb cable]
Phone detected (MediaTek PreLoader USB VCOM (Android) (COM23))
Preparing to start flash mode;
Preparing to open COM23
Connecting;
Downloading DA;
Initializing;
Rid: 28482d6f9b8c901794b944adce4fd70e
Requesting baudrate change;
Done;
USB SPEED: USB_HIGH_SPEED
DEVICE INFO:
BB CHIP: MT6580 [CA00, 00, 6580, FF]
HW_STORAGE_EMMC: 0x504E01FE 0x34394A31 0xD733124D 0xF17497D9 [SIZE=0xE9B00000]
IMEI1 [OTP 0001]: 354442-08-781734-8
IMEI2 [OTP 0001]: 354442-08-781735-5
PROVIDER: 4034D-2ARGWCC
USRDATA INFO: 0x58800000 SIZE: 0x60000000



Searching data;


Locked to [SIM1]: 602-01
code_cat_n: 0471721459508473 enabled: yes tries: 9
code_cat_ns: 0455176205312999 enabled: no tries: 10
code_cat_sp: 5167562046681854 enabled: no tries: 10
code_cat_c: 3623500025310847 enabled: no tries: 10
code_cat_sim: 5655524823120493 enabled: no tries: 10
code_cat_ns_sp: 6618292588446991 enabled: no tries: 5
code_cat_sim_c: 9202050477396076 enabled: no tries: 5


Locked to [SIM2]: 602-01
code_cat_n: 3236631011340633 enabled: yes tries: 10
code_cat_ns: 0421249488173969 enabled: no tries: 10
code_cat_sp: 5941140490336252 enabled: no tries: 10
code_cat_c: 2362429983166998 enabled: no tries: 10
code_cat_sim: 7986397728714011 enabled: no tries: 10
code_cat_ns_sp: 1047473532077133 enabled: no tries: 5
code_cat_sim_c: 1095456220312365 enabled: no tries: 5

Phone unlocked; Remove battery and cable;

Time needed - 00:00:16

Log file saved to: LOG_25_03_2019_18_06_15.txt


thk furious team


All times are GMT +1. The time now is 07:41.


vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2024 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2023 -

Page generated in 0.52932 seconds with 6 queries

SEO by vBSEO