★★★ Successfully Unlocked / Repaired / Flashed Phones by UnlockTool PLEASE POST HERE ★★★

GsmToto

Super Moderator
Jan 1, 2021
5,349
22,093
UK
Skype
gsmtoto
Sonork ID
100.1684601
Waiting for HS-USB QDLoader 9008... COM3
Selected Model : Samsung M14 4G (BIT 6)
Code Name : SM-M145F | SM-M145F/DS (BIT6)
Operation : Erase FRP [1]
Authenticating... OK
Retrieving server data... OK [267.33 KiB]
Initializing data... OK
Waiting for HS-USB QDLoader 9008... COM3
Connecting to device... OK
Writing flash programmer... OK
Connecting to flash programmer... OK
Configuring device... OK
Firehose config : UFS [Sector:4096] [Target:0] [Host:1048576]
Reading partition map... OK - LU Count : 6
Reading software info... OK [super]
Model Name : SM-M145F_SWA_INS_QKEY0
Manufacturer : SAMSUNG
Build ID : M145FXXU6CXK5
Erasing FRP... OK
Rebooting... OK
UNLOCKTOOL
2025.02.19.0
Elapsed time : 17 seconds
 

GsmToto

Super Moderator
Jan 1, 2021
5,349
22,093
UK
Skype
gsmtoto
Sonork ID
100.1684601
[BROM] ERASE FRP Initializing usb... OK
Waiting for device... COM29 [BOOTROM:0E8D:0003]
Bypassing authentication... OK
Analyzing... preloader_water.bin [MT6765:9:1552] [Internal]
Vendor : XIAOMI
Handshaking... OK
Reading hardware info... OK
Hardware : MT6765 [Helio G25|G35|P35] 0766 8A00 CA00 0000
Security Config : SCB SLA DAA
MEID : 13D196EC5144F56FAEFC4BF7BCA910AM
Sending Download-Agent [1]... OK
Syncing with device... OK
Booting device... OK
Syncing with DA... OK
Storage : EMMC - CID : 5900019B.36305330.733B0034.954A4188
Vendor : Samsung - Name : Y0S064 - Serial : 1095004987 - Rev : 0
Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 16 MiB - User Area : 58.25 GiB
Reading partition info... OK [56]
Reading device info... SKIP [EROFS]
Erasing FRP... OK

UNLOCKTOOL 2025.02.19.0
Elapsed time : 4 minutes 51 seconds
 

=-rebel-=

Moderator
Jan 22, 2020
1,351
1,107
Philippines
[PRELOADER] ERASE FRP Selected auth : SAMSUNG [1]
Phone must have battery inside!
Waiting for device... COM3 [BOOTROM:0E8D:0003]
Initializing usb... OK
Waiting for device... COM3 [BOOTROM:0E8D:0003]
Bypassing authentication... OK
Analyzing... preloader_hs03s.bin [MT6765:9:1552] [Internal]
Vendor : SAMSUNG
Handshaking... OK
Reading hardware info... OK
Hardware : MT6765 [Helio G25|G35|P35] 0766 8A00 CA00 0000
Security Config : SCB SLA DAA
MEID : B809DB7CE4C2E86184D55F6A92548F6E
Sending Download-Agent [1]... OK
Syncing with device... OK
Booting device... OK
Syncing with DA... OK
Storage : EMMC - CID : 52000115.41343650.C9D50042.E5A84CCC
Vendor : Samsung - Name : RP64AB - Serial : 1288489429 - Rev : 0
Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 16 MiB - User Area : 58.24 GiB
Reading partition info... OK [50]
Reading device info... OK [super]
Model Name : SM-A037F
Product Name : a03snnxx
Manufacturer : samsung
Platform : a03s
Android Version : 13
Security Patch : 2024-05-01
Build ID : TP1A.220624.014.A037FXXS6CXE2
Build : A037FXXS6CXE2
Build Date : Fri May 17 14:20:53 KST 2024
Code Name : SM-A037F
PDA : A037FXXS6CXE2
Connecting to device... OK
Erasing FRP... OK
UNLOCKTOOL 2025.03.01.0
Elapsed time : 27 seconds
 
  • Like
Reactions: GsmToto

GsmToto

Super Moderator
Jan 1, 2021
5,349
22,093
UK
Skype
gsmtoto
Sonork ID
100.1684601
[EDL] ERASE FRP Waiting for HS-USB QDLoader 9008... COM5
Selected Model : Samsung S20 FE 5G (BIT-D)
Code Name : SM-G780G (BIT-D)
Operation : Erase FRP [1]
**Authenticating... OK
**Retrieving server data... OK [367,8 KiB]
Initializing data... OK
Waiting for HS-USB QDLoader 9008... COM5
Connecting to device... OK
Writing flash programmer... OK
Connecting to flash programmer... OK
Configuring device... OK
**Firehose config : UFS [Sector:4096] [Target:0] [Host:1048576]
Reading partition map... OK - LU Count : 4
Reading software info... OK [super]
** Model Name : SM-G780G
** Product Name : r8qxx
** Manufacturer : samsung
** Platform : kona
** Android Version : 13
** Security Patch : 2024-09-01
** Build ID : TP1A.220624.014.G780GXXSCEXI7
** Build : G780GXXSCEXI1
** Build Date : Mon Aug 26 18:46:17 KST 2024
** Code Name : SM-G780G
** PDA : G780GXXSCEXI1
Erasing FRP... Read-Only
Switched to SMART Mode!
Erasing FRP... OK
Rebooting... OK
UNLOCKTOOL 2025.03.01.0
Elapsed time : 47 seconds
 

GsmToto

Super Moderator
Jan 1, 2021
5,349
22,093
UK
Skype
gsmtoto
Sonork ID
100.1684601
[BROM] ERASE FRP Initializing usb... OK
Waiting for device... COM3 [BOOTROM:0E8D:0003]
Bypassing authentication... OK
Analyzing... preloader_ruby.bin [MT6877:9:868] [Internal]
Vendor : XIAOMI
Reading hardware info... OK
* Hardware : MT6877 [Dimensity 900|920|1080|7050] 0959 8A00 CA00 0000
* Security Config : SCB SLA DAA
* MEID : D1699B644A47F1EC7DAC4E6FD0D0B87B
Sending Download-Agent [1]... OK
Syncing with device... OK
Booting device... OK
Syncing with DA... OK
**Storage : UFS - FWVer : A003 - CID : H9QT1G6DN6X132
**Vendor ID : SKHynix [0x1AD]
**UFS: LU0 Size : 4 MiB - LU1 Size : 4 MiB - LU2 Size : 238.34 GiB
Reading partition info... OK [77]
Reading device info... SKIP [EROFS]
Erasing FRP... OK
UNLOCKTOOL 2025.03.01.0
Elapsed time : 26 seconds
 

GsmToto

Super Moderator
Jan 1, 2021
5,349
22,093
UK
Skype
gsmtoto
Sonork ID
100.1684601
[EDL] ERASE FRP Waiting for HS-USB QDLoader 9008... COM3
Selected Model : Oppo A3 / A3X
Code Name : CPH2641/ CPH2669
Operation : Erase FRP [4]
Authenticating... OK
Retrieving server data... OK [273.62 KiB]
Initializing data... OK
Waiting for HS-USB QDLoader 9008... COM3
Connecting to device... OK
Handshaking... OK
Reading bootloader info... OK
Serial : 376781800 SoC : [Snapdragon 662] [SM6115] [0x0014D0E1]
OEM : Oppo/Realme/Oneplus [0x0051] Model : Unknown [0x0000]
PK_HASH[0] : 49445E14621312DFECCD4389F267E6B7
PK_HASH[1] : 1674DDD36B1BC41D1F605AA991D14AD6
Writing flash programmer... OK
Connecting to flash programmer... OK
Configuring device... OK
Firehose config : eMMC [Sector:512] [Target:0] [Host:1048576]
Erasing FRP... OK
Rebooting... OK
UNLOCKTOOL 2025.03.07.0
Elapsed time : 49 seconds
 

GsmToto

Super Moderator
Jan 1, 2021
5,349
22,093
UK
Skype
gsmtoto
Sonork ID
100.1684601
[EDL] ERASE FRP Waiting for HS-USB QDLoader 9008... COM3
Selected Model : Samsung Note10+ 5G (BIT 8)
Code Name : SM-N976V (BIT8)
Operation : Erase FRP [1]
Authenticating... OK
Retrieving server data... OK [298.7 KiB]
Initializing data... OK
Waiting for HS-USB QDLoader 9008... COM3
Connecting to device... OK
Writing flash programmer... OK
Connecting to flash programmer... OK
Configuring device... OK
Firehose config : UFS [Sector:4096] [Target:0] [Host:1048576]
Reading partition map... OK - LU Count : 4
Reading software info... OK [system]
Model Name : SM-N976V
Product Name : d2xqvzw
Manufacturer : samsung
Platform : msmnile
Android Version : 10
Security Patch : 2020-04-01
Build ID : QP1A.190711.020.N976VVRU3CTC9
Build : N976VVRU3CTC9
Build Date : Fri Mar 20 21:44:40 KST 2020
Code Name : SM-N976V
PDA : N976VVRU3CTC9
Erasing FRP... Read-Only
Switched to SMART Mode!
Erasing FRP... OK
Rebooting... OK

UNLOCKTOOL 2025.03.10.0
Elapsed time : 56 seconds
 
  • Like
Reactions: =-rebel-=

GsmToto

Super Moderator
Jan 1, 2021
5,349
22,093
UK
Skype
gsmtoto
Sonork ID
100.1684601
Selected model: OPPO CPH2185 (OPPO A15)
Operation: Erase FRP And Wipe
Software version: 8.2
Erasing of partitions can damage your device.
Make sure that you have a backup created. Continue? YES


Connect phone in BROM Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1511.0]
You are using driver version 3.0.1511.0, we recommend using version 3.0.1504.0 for proper operation. You can install the correct driver from the program directory.
Device found at COM3 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
LibUSB installed
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Release testpoint, waiting 2 seconds
Advanced Bypass Security... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1511.0]
You are using driver version 3.0.1511.0, we recommend using version 3.0.1504.0 for proper operation. You can install the correct driver from the program directory.
Device found at COM3 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0xC9CDA13B, 0x6073A122, 0x1A81A004, 0xD41BB8AD
Get Chip ID... [MT6765]
Get SOC ID... [5B70399C2581684622E26ECEE20FFEB2918D1AE9F625BB3848 2E6AE4E4A088F4]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [7]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x90014A68423861503E03001A9E09C783
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_CNAME: hB8aP>
EMMC_ID : 0x90014A68423861503E03001A9E09C783
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0001000000 (16.00Mb)
EMMC_USER : 0x0747C00000 (29.12Gb)
RAM INFO:
INT_SRAM: 0x000003A000 (232.00Kb)
EXT_RAM : 0x0080000000 (2.00Gb)
HEALTH:
Pre EOL Info: normal
DeviceLifeTimeEstA: info not available
DeviceLifeTimeEstB: 60% - 70% device life time used
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... [EXT4] ... OK
Product Brand : OPPO
Product Manufacturer : OPPO
Product Model : CPH2185
Product Device : OP4F2F
Product Board : oppo6765
Board Platform : mt6765
Build ID : QP1A.190711.020
Build Date : Fri Nov 29 11:24:41 CST 2024
Display ID : CPH2185_11_A.71
Security Patch : 2023-02-05
Version SDK : 29
Version Release : 10
Version Codename : REL
Userdata FS Type : EXT4
Read partition "frp"... OK
Format FRP... [P1] OK
Writting FRP data... OK
Formatting "userdata" partition... OK
Formatting "cache" partition... OK
Formatting "metadata" partition... OK
Formatting "md_udc" partition... OK
Wipe data done!
 
  • Like
Reactions: =-rebel-=

GsmToto

Super Moderator
Jan 1, 2021
5,349
22,093
UK
Skype
gsmtoto
Sonork ID
100.1684601
[EDL] FACTORY RESET Waiting for HS-USB QDLoader 9008... COM5
Selected Model : Vivo Y20 | Y20i | Y20s
Code Name : PD2034F | PD2034AM | V2029
Operation : Factory Reset [5]
**Authenticating... OK
**Retrieving server data... OK [270,22 KiB]
Initializing data... OK
Waiting for HS-USB QDLoader 9008... COM5
Connecting to device... OK
Handshaking... OK
Reading bootloader info... OK
**Serial : 3934862704 SoC : [Snapdragon 460] [SM4250-AA] [0x001360E1]
**OEM : Vivo [0x0073] Model : Unknown [0x0000]
**PK_HASH[0] : A7DF36FFD7AB557C67A6C26675E2795C
**PK_HASH[1] : 922CF671308CFD7169BEDB84424C862B
Writing flash programmer... OK
Connecting to flash programmer... OK
Configuring device... OK
**Firehose config : UFS [Sector:4096] [Target:0] [Host:1048576]
Erasing FRP... OK
Erasing USERDATA... OK
Rebooting... OK
UNLOCKTOOL 2025.03.10.0
Elapsed time : 24 seconds
 

GsmToto

Super Moderator
Jan 1, 2021
5,349
22,093
UK
Skype
gsmtoto
Sonork ID
100.1684601
[EDL] ERASE FRP Waiting for HS-USB QDLoader 9008... COM3
Selected Model : Samsung A72 (BIT 6)
Code Name : SM-A725F | SM-A725F/DS (BIT6)
Operation : Erase FRP [1]
**Authenticating... OK
**Retrieving server data... OK [297.51 KiB]
Initializing data... OK
Waiting for HS-USB QDLoader 9008... COM3
Connecting to device... OK
Writing flash programmer... OK
Connecting to flash programmer... OK
Configuring device... OK
**Firehose config : UFS [Sector:4096] [Target:0] [Host:1048576]
Reading partition map... OK - LU Count : 6
Reading software info... OK [super]
** Model Name : SM-A725F
** Product Name : a72qnsxx
** Manufacturer : samsung
** Platform : atoll
** Android Version : 13
** Security Patch : 2023-09-01
** Build ID : TP1A.220624.014.A725FXXU6DWH2
** Build : A725FXXU6DWH2
** Build Date : Mon Aug 21 16:26:42 KST 2023
** Code Name : SM-A725F
** PDA : A725FXXU6DWH2
Erasing FRP... Read-Only
Switched to SMART Mode!
Erasing FRP... OK
Rebooting... OK
UNLOCKTOOL 2025.03.18.0
Elapsed time : 2 minutes 19 seconds
 

=-rebel-=

Moderator
Jan 22, 2020
1,351
1,107
Philippines
[PRELOADER] FACTORY RESET Selected auth : VIVO [3]
Phone must have battery inside!
Waiting for device... COM7 [PRELOADER:0E8D:2000]
Handshaking... OK
Reading hardware info... OK
Hardware : MT6771 [Helio P60|P70] 0788 8A00 CA00 0000
Security Config : SCB DAA
MEID : 4F5CF6889079BAF8FD006AF2A3DBFB4B
Sending Download-Agent... OK
Syncing with target... OK
Booting device (preloader auth)... OK
Bypassing auth... OK
Syncing with DA... OK
Storage : EMMC - CID : 44000115.4D443656.E4660242.5759DD6
Vendor : Samsung - Name : DV6DMB - Serial : 2648106086 - Rev : 2
Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 16 MiB - User Area : 116.48 GiB
Reading partition info... OK [44]
Reading device info... OK [system vendor]
Model Name : vivo 1806
Product Name : full_k71v1_64_bsp
Manufacturer : vivo
Platform : k71v1_64_bsp
Android Version : 10
Security Patch : 2021-05-01
Build ID : QP1A.190711.020 release-keys
Build : compiler10211630
Build Date : Mon Oct 21 16:43:20 CST 2024
Vivo Model : PD1813F_EXMA
OS Name : Funtouch
OS Version : 11.0
OS Build : Funtouch OS_10
Connecting to device... OK
Erasing USERDATA (recovery wipe)... OK
UNLOCKTOOL 2025.03.18.0
Elapsed time : 31 seconds
 

=-rebel-=

Moderator
Jan 22, 2020
1,351
1,107
Philippines
[META] FACTORY RESET Make sure phone battery level is at least 10%!
Waiting for device... COM7 [PRELOADER:0E8D:2000]
Connection : USB 2.0 High-Speed
USB Driver : [MediaTek Inc.] wdm_usb - Version : 3.0.1504.0
Boot Mode : PRELOADER [0E8D:2000]
Handshaking... OK
Booting META mode... OK
Make sure phone battery level is at least 10%!
Waiting for device... COM118 [META:0E8D:20XX]
Connection : USB 2.0 High-Speed
USB Driver : [MediaTek Inc.] wdm_usb - Version : 3.0.1504.0
Boot Mode : META [0E8D:2007]
Initializing META... OK
Reading META Info...
Chip ver : mt6768
Build date : Tue Feb 18 20:39:31 CST 2025
Build number : alps-mp-s0.mp1.rc-V16.49_reallytek.wsr.s0mp1rc.k61v1.64.bsp_P11
Software ver : KL5-XK678KLMN-U-OPPJ-PJ-250218V2013
Reading SW Info...
Manufacturer : TECNO
Board : TECNO-KL5
Model : TECNO KL5
Build Number : KL5-XK678KLMN-U-OPPJ-PJ-250218V2013
USB Model : unknown
Android Version : 14
Platform : unknown
Factory resetting [recovery]... OK
Rebooting... OK
UNLOCKTOOL 2025.03.22.0
Elapsed time : 1 minute 45 seconds
 

=-rebel-=

Moderator
Jan 22, 2020
1,351
1,107
Philippines
[META] ERASE FRP Make sure phone battery level is at least 10%!
Waiting for device... COM7 [PRELOADER:0E8D:2000]
Connection : USB 2.0 High-Speed
USB Driver : [MediaTek Inc.] wdm_usb - Version : 3.0.1504.0
Boot Mode : PRELOADER [0E8D:2000]
Handshaking... OK
Booting META mode... OK
Make sure phone battery level is at least 10%!
Waiting for device... COM118 [META:0E8D:20XX]
Connection : USB 2.0 High-Speed
USB Driver : [MediaTek Inc.] wdm_usb - Version : 3.0.1504.0
Boot Mode : META [0E8D:2007]
Initializing META... OK
Reading META Info...
Chip ver : mt6761
Build date : Wed Jul 19 16:58:42 CST 2023
Build number : alps-mp-s0.mp1.rc-V14.105_reallytek.s0mp1rc.k61v1.64.bsp_P21
Software ver : BF7-H6127ABCDSTUAdAeAfArAs-S-GL-230719V1503
Reading SW Info...
Manufacturer : TECNO
Board : TECNO-BF7
Model : TECNO BF7
Build Number : BF7-H6127ABCDSTUAdAeAfArAs-S-GL-230719V1503
USB Model : unknown
Android Version : 12
Platform : unknown
Enabling ADB Interface... OK
Device bootloader must be locked!
Rebooting... OK
ADB : Waiting for device...
ADB Interface connected!
ADB : Waiting for boot... OK
Model : TECNO BF7
Manufacturer : TECNO
Platform : mt6761
CPU Arch : arm64-v8a
Android Serial : 096413734D006898
Security Patch : 2023-06-05
Connection : adb
Timezone : Africa/Brazzaville
Android Version : 12
Android SDK : 31
Build : BF7-H6127ABCDSTUAdAeAfArAs-S-GL-230719V1503
Build Date : Wed Jul 19 16:58:42 CST 2023
Device Name : TECNO-BF7
Product Name : BF7-GL
CP : MOLY.LR12A.R3.MP.V241.4.P16
Removing FRP... OK
UNLOCKTOOL 2025.03.22.0
Elapsed time : 5 minutes 48 seconds
 

GsmToto

Super Moderator
Jan 1, 2021
5,349
22,093
UK
Skype
gsmtoto
Sonork ID
100.1684601
[COM] REMOVE FRP [2023] Scanning for device... COM5
Reading Info... OK
Model Number : SM-G970U
Bootloader : G970USQU9IXE3
Country Code : SPR
Serial Number : R58M20PL0MJ
Unique Number : 988E89353632424A3834
Connecting to device... OK
Trying method [1]... FAIL
Trying method [2]... OK
Waiting for device...
Please accept USB Debugging on your phone!
Model : SM-G970U
Manufacturer : samsung
Platform : msmnile
CPU Arch : arm64-v8a
Android Serial : R58M20PL0MJ
Manufacturing Date : 2024.05.29
Security Patch : 2023-03-01
Connection : mtp,conn_gadget,adb
Timezone : Africa/Lagos
Android Version : 12
Android SDK : 31
Build : SP1A.210812.016.G970USQU9IXE3
Build Date : Thu May 9 14:25:30 KST 2024
Product Code : SM-G970UZKESPR
Device Name : beyond0q
Product Name : beyond0qltesq
Code Name : SM-G970UZKESPR
**BL : G970USQU9IXE3
**PDA : G970USQU9IXE3
**CP : G970USQU9IXE3
**CSC : G970UOYN9IXE3
Sales Code : SPR
Removing FRP... OK
UNLOCKTOOL 2025.03.22.0
Elapsed time : 54 seconds
 

=-rebel-=

Moderator
Jan 22, 2020
1,351
1,107
Philippines
FORMAT DATA Initializing usb... OK
Waiting for device... COM7 [PRELOADER:0E8D:2000]
Jumping to BROM... OK
Bypassing authentication... OK
Analyzing... preloader_v673.bin [MT6761:7:1232] [Internal]
Handshaking... OK
Reading hardware info... OK
Hardware : MT6761 [Helio A20|A22|A25|G25|P22] 0717 8A00 CA01 0200
Security Config : SCB SLA DAA
MEID : 1381B97B749751D581DF0BF91862AA53
Sending Download-Agent [1]... OK
Syncing with device... OK
Booting device... OK
Syncing with DA... OK
Storage : EMMC - CID : 350301D6.34344138.E5131031.31682399
Vendor : Samsung - Name : 58A441 - Serial : 597288211 - Rev : 16
Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 4 MiB - User Area : 57.62 GiB
Reading partition info... OK [49]
Reading device info... OK [super]
Model Name : WIKO T10
Product Name : W-V673
Manufacturer : WIKO
Platform : v673
Android Version : 11
Security Patch : 2023-08-05
Build ID : RP1A.200720.011 release-keys
Build : 1691470420
Build Date : Tue Aug 8 12:51:50 CST 2023
Erasing FRP... OK
Erasing USERDATA (recovery wipe)... OK
UNLOCKTOOL 2025.03.28.0
Elapsed time : 26 seconds
 
Top