★★★ Successfully Unlocked / Repaired / Flashed Phones by UnlockTool PLEASE POST HERE ★★★

GsmToto

Super Moderator
Jan 1, 2021
5,050
21,732
UK
Skype
gsmtoto
Sonork ID
100.1684601
ERASE FRP Initializing usb... OK
Waiting for device... COM8 [PRELOADER:0E8D:2000]
Jumping to BROM... OK
Bypassing authentication... OK
Analyzing... preloader_x653c_h6114go.bin [MT6761:14:2352] [Internal]
Handshaking... OK
Reading hardware info... OK
* Hardware : MT6761 [Helio A20|A22|A25|G25|P22] 0717 8A00 CA01 0200
* Security Config : SCB SLA DAA
* MEID : D3A079BEA811E4E3E459FC874D4E5A6E
Sending Download-Agent [1]... OK
Syncing with device... OK
Booting device... OK
Syncing with DA... OK
**Storage : EMMC - CID : 51000115.4D333644.7E100142.ED178CD4
**Vendor : Samsung - Name : QD63MB - Serial : 2362736144 - Rev : 1
**Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 16 MiB - User Area : 29.12 GiB
Reading partition info... OK [38]
Reading device info... OK [system vendor]
** Model Name : Infinix X653C
** Product Name : H6114
** Manufacturer : INFINIX MOBILITY LIMITED
** Platform : Infinix-X653C
** Android Version : 9
** Security Patch : 2021-09-05
** Build ID : X653C-H6114GH-PGo-210831V271
** Build : GH-210831V271
** Build Date : Tue Aug 31 17:00:38 CST 2021
Erasing FRP... OK
UNLOCKTOOL 2023.12.31.0
Elapsed time : 9 seconds
 

GsmToto

Super Moderator
Jan 1, 2021
5,050
21,732
UK
Skype
gsmtoto
Sonork ID
100.1684601
Initializing usb... OK
Waiting for device... COM2 [BOOTROM:0E8D:0003]
Bypassing authentication... OK
Analyzing... preloader_k85v1_64.bin [MT6875/6781:5:912] [Internal]
Handshaking... OK
Reading hardware info... OK
* Hardware : MT6785 [Helio G90|G90T|G95] 0813 8A00 CA00 0000
* Security Config : SCB SLA DAA
* MEID : EBBCD055C071C51621AB9F0AD51D433D
Sending Download-Agent [1]... OK
Syncing with device... OK
Booting device... OK
Syncing with DA... OK
**Storage : UFS - FWVer : A043 - CID : H9HQ15AECMBDAR
**Vendor ID : SKHynix [0x1AD]
**UFS: LU0 Size : 4 MiB - LU1 Size : 4 MiB - LU2 Size : 119,17 GiB
Reading partition info... OK [62]
Reading device info... OK [super]
** Model Name : rosemary
** Product Name : rosemary_eea
** Manufacturer : Xiaomi
** Platform : rosemary
** Android Version : 11
** Security Patch : 2022-03-01
** Build ID : RP1A.200720.011
** Build : V12.5.17.0.RKLEUXM
** Build Date : Wed Apr 6 11:21:40 CST 2022
** Device : Redmi Note 10s
** MIUI Version : V125
** MIUI Build : V12.5.17.0.RKLEUXM
** MIUI Region : rosemary_eea_global
** MIUI Locale : en-GB
Erasing FRP... OK
UNLOCKTOOL 2023.12.31.0
Elapsed time : 11 seconds
 

GsmToto

Super Moderator
Jan 1, 2021
5,050
21,732
UK
Skype
gsmtoto
Sonork ID
100.1684601
ERASE FRP 2023 Scanning port... OK
Reading Info... OK
Model : SM-A346M
Storage Capacity : 256G
Manufacturer : SAMSUNG
Firmware Version : 0002
CSC : BVO
AP : A346MUBU4AWH1
Device ID : 2007401c2cc71711
Connecting to device... OK
Device Platform : MEDIATEK
Backup : \SAMSUNG_FRP\SM-A346M_CE03237389DDD95F107E_A346MUBU4AWH1_2023-12-21_14-32-22
Patching FRP... OK
Waiting for device... OK
Connecting to device... OK
Erasing protection... OK
Erasing FRP... OK
UNLOCKTOOL 2023.12.31.0
Elapsed time : 12 seconds
 

GsmToto

Super Moderator
Jan 1, 2021
5,050
21,732
UK
Skype
gsmtoto
Sonork ID
100.1684601
REMOVE FRP [2023] Method : [2]
Scanning for device... COM7
Reading Info... FAIL
Enabling ADB... OK
Waiting for device...
Model : SM-G610F
Manufacturer : samsung
Platform : exynos5
CPU Arch : armeabi-v7a
Android Serial : 5203ecb3ee9ba4d1
Manufacturing Date : 20180113
Security Patch : 2020-07-01
Connection : mtp,adb
Timezone : Asia/Karachi
Knox Warranty : 0 - valid
Android Version : 8.1.0
Android SDK : 27
Build : M1AJQ.G610FDDU1CTG2
Build Date : Wed Jul 15 18:56:02 KST 2020
Product Code : SM-G610FZDDXSG
Samsung Serial : R28K11VDKDN
Device Name : on7xelte
Product Name : on7xeltedd
Code Name : SM-G610FZDDXSG
**BL : G610FDDU1CTG2
**PDA : G610FDDU1CTG2
**CP : G610FDDU1CTG2
**CSC : G610FOJV1CTH1
Sales Code : XSG
Removing FRP... OK
UNLOCKTOOL 2023.12.31.0
Elapsed time : 22 seconds
 

GsmToto

Super Moderator
Jan 1, 2021
5,050
21,732
UK
Skype
gsmtoto
Sonork ID
100.1684601
ERASE FRP Selected Platform : SC9863A_32_Bypass
Connect Testpoint or hold VOL DOWN! Instruction here!
Waiting for device... COM50 (SPRD U2S Diag)
USB : USB\VID_1782&PID_4D00\5&237D5C64&0&3
Initializing loader... OK
Protocol : SPRD3
Sending payload... OK
Sending auth data... OK
Sending preloader1... OK
Sending preloader2... OK
Booting loader, please wait... OK
Boot ver: Spreadtrum Boot Block version 1.1
Sending FDL1... OK
Sending FDL2... OK
Reading partitions info... OK [56] [1024]
Reading device info... OK [super]
** Model Name : SM-A032M
** Product Name : a3coreub
** Manufacturer : samsung
** Android Version : 13
** Security Patch : 2023-11-01
** Build ID : TP1A.220624.014.A032MUBS3CWK2
** Build Date : Sat Nov 11 06:32:07 KST 2023
** Code Name : SM-A032M
** PDA : A032MUBS3CWK2
Erasing FRP... OK
Erasing FRP... OK
UNLOCKTOOL 2024.01.05.0
Elapsed time : 18 seconds
 

GsmToto

Super Moderator
Jan 1, 2021
5,050
21,732
UK
Skype
gsmtoto
Sonork ID
100.1684601
READ BACK Initializing usb... OK
Waiting for device... COM5 [PRELOADER:0E8D:2000]
Jumping to BROM... OK
Bypassing authentication... OK
Analyzing... preloader_hs03s.bin [MT6765:9:1552] [Internal]
Vendor : SAMSUNG
Handshaking... OK
Reading hardware info... OK
* Hardware : MT6765 [Helio G25|G35|P35] 0766 8A00 CA00 0000
* Security Config : SCB SLA DAA
* MEID : 8CE9589092517A3DB2FF69D1070D2B33
Sending Download-Agent [1]... OK
Syncing with device... OK
Booting device... OK
Syncing with DA... OK
**Storage : EMMC - CID : 47000115.41423658.CB730042.3C84B68
**Vendor : Samsung - Name : GX6BAB - Serial : 1265159027 - Rev : 0
**Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 16 MiB - User Area : 29,12 GiB
Reading partition info... OK [50]
Reading device info... OK [super]
** Model Name : SM-A037F
** Product Name : a03snnxx
** Manufacturer : samsung
** Platform : a03s
** Android Version : 13
** Security Patch : 2023-11-01
** Build ID : TP1A.220624.014.A037FXXS5CWK3
** Build : A037FXXS5CWK3
** Build Date : Fri Nov 17 15:31:52 +07 2023
** Code Name : SM-A037F
** PDA : A037FXXS5CWK3
Reading preloader [512 KiB] -> preloader.bin... OK
Reading pgpt [4 MiB] -> pgpt.bin... OK
Reading efs [8 MiB] -> efs.img... OK
Reading sec_efs [8 MiB] -> sec_efs.img... OK
Reading steady [4 MiB] -> steady.img... OK
Reading nvram [64 MiB] -> nvram.img... OK
Reading spmfw [1 MiB] -> spmfw.img... OK
Reading scp1 [1 MiB] -> scp1.img... OK
Reading sspm_1 [1 MiB] -> sspm_1.img... OK
Reading tee1 [2 MiB] -> tee1.img... OK
Reading tzar [4 MiB] -> tzar.img... OK
Reading gz1 [16 MiB] -> gz1.bin... OK
Reading lk [2 MiB] -> lk.bin... OK
Reading dtbo [8 MiB] -> dtbo.img... OK
Reading vbmeta [64 KiB] -> vbmeta.img... OK
Reading btd [4,94 MiB] -> btd.img... OK
Reading protect1 [8 MiB] -> protect1.img... OK
Reading protect2 [8 MiB] -> protect2.img... OK
Reading seccfg [8 MiB] -> seccfg.bin... OK
Reading bota [45 MiB] -> bota.img... OK
Reading boot_para [1 MiB] -> boot_para.bin... OK
Reading para [512 KiB] -> para.bin... OK
Reading misc [512 KiB] -> misc.img... OK
Reading expdb [20 MiB] -> expdb.bin... OK
Reading frp [1 MiB] -> frp.bin... OK
Reading nvcfg [32 MiB] -> nvcfg.img... OK
Reading nvdata [64 MiB] -> nvdata.img... OK
Reading metadata [32 MiB] -> metadata.img... OK
Reading keyrefuge [16 MiB] -> keyrefuge.img... OK
Reading keydata [16 MiB] -> keydata.img... OK
Reading md_udc [22,6 MiB] -> md_udc.bin... OK
Reading persistent [512 KiB] -> persistent.img... OK
Reading proinfo [3 MiB] -> proinfo.bin... OK
Reading md1img [100 MiB] -> md1img.img... OK
Reading logo [8 MiB] -> logo.bin... OK
Reading param [4 MiB] -> param.img... OK
Reading up_param [4 MiB] -> up_param.bin... OK
Reading persist [48 MiB] -> persist.img... OK
Reading boot [32 MiB] -> boot.img... OK
Reading recovery [37 MiB] -> recovery.img... OK
Reading vbmeta_system [64 KiB] -> vbmeta_system.img... OK
Reading vbmeta_vendor [64 KiB] -> vbmeta_vendor.img... OK
Reading efuse [512 KiB] -> efuse.img... OK
Reading rsv1 [280 KiB] -> rsv1.img... OK
Reading sec1 [8 MiB] -> sec1.bin... OK
Reading super [5,69 GiB] -> super.img... OK
Reading prism [296 MiB] -> prism.img... OK
Reading optics [24 MiB] -> optics.img... OK
Reading cache [200 MiB] -> cache.img... OK
Reading omr [50 MiB] -> omr.img... OK
Reading spu [50 MiB] -> spu.img... OK
Reading userdata [22,19 GiB] -> userdata.img... OK
UNLOCKTOOL 2024.01.08.0
Elapsed time : 8 minutes 36 seconds
 

GsmToto

Super Moderator
Jan 1, 2021
5,050
21,732
UK
Skype
gsmtoto
Sonork ID
100.1684601
A015f FRP reset via Testpoint Done

Selected Model : Samsung Galaxy A01
Code Name : A015F
Operation : Erase FRP [1]
Authenticating... OK
Retrieving data... OK [245.27 KiB]
Initializing data... OK
Waiting for HS-USB QDLoader 9008... COM23
Connecting to device... OK
Handshaking... OK
Reading bootloader info... OK
Serial : 2643875909 SoC : [Snapdragon 439] [SDM439] [0x000BF0E1]
OEM : Samsung [0x0020] Model : Unknown [0x0000]
PK_HASH[0] : 3CC959AC5B3364A42EC3CB40C091C90F
PK_HASH[1] : 2A8101F1C1207C5C9ED1D2348AA10082
Writing flash programmer... OK
Connecting to flash programmer... OK
Configuring device... OK
Firehose config : eMMC [Sector:512] [Target:4096] [Host:1048576]
Reading partition map... OK - LU Count : 1
Reading software info... OK [super]
Model Name : SM-A015F
Product Name : a01qxx
Manufacturer : samsung
Platform : QC_Reference_Phone
Android Version : 10
Security Patch : 2020-11-01
Build ID : QP1A.190711.020.A015FXXS3ATL1
Build : A015FXXS3ATL1
Build Date : Wed Dec 2 12:32:56 KST 2020
Code Name : SM-A015F
PDA : A015FXXS3ATL1
Erasing FRP... OK
Rebooting... OK
 

asimsudanchamira

Junior Member
Jan 10, 2024
2
1
Addiss Ababa
dear Brothers
please when you upload the operation that was success please write the Brand and the Model and the operation type weather it is FRP, IMEI Repaer or what ever it was so we can understand in good way
 
  • Like
Reactions: maxsystem

GsmToto

Super Moderator
Jan 1, 2021
5,050
21,732
UK
Skype
gsmtoto
Sonork ID
100.1684601
[PRELOADER] SAFE FORMAT Selected auth : VIVO [1]
Phone must have battery inside!
Waiting for device... COM12 [PRELOADER:0E8D:2000]
Handshaking... OK
Reading hardware info... OK
Hardware : MT6765 [Helio G25|G35|P35] 0766 8A00 CA00 0000
Security Config : SCB DAA
MEID : DAA8B964D635C1707DAE929B70F6D310
Sending Download-Agent... OK
Syncing with target... OK
Booting device (preloader auth)... OK
Bypassing auth... OK
Syncing with DA... OK
Storage : EMMC - CID : 44000115.4D383658.56390942.8138A7CE
Vendor : Samsung - Name : DX68MB - Serial : 2815317561 - Rev : 9
Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 4 MiB - User Area : 29.12 GiB
Reading partition info... OK [47]
Reading device info... OK [super]
Model Name : V2120
Product Name : 2020
Manufacturer : vivo
Platform : k65v1_32_bsp_2g_ago
Android Version : 12
Security Patch : 2023-05-01
Build ID : SP1A.210812.003 release-keys
Build : compiler05041753
Build Date : Thu May 4 17:49:55 CST 2023
Vivo Model : PD2140F_EXMA
Vivo Version : PD2140F_EX_A_6.32.1
OS Name : vos
OS Version : 3.0
OS Build : Funtouch OS 12 Global
Erasing FRP... OK
Erasing USERDATA (recovery wipe)... OK

UNLOCKTOOL 2024.01.09.0
Elapsed time : 19 seconds
 

GsmToto

Super Moderator
Jan 1, 2021
5,050
21,732
UK
Skype
gsmtoto
Sonork ID
100.1684601
[EDL] RESET | DISABLE MI CLOUD Selected Model : Xiaomi Redmi Note 6 Pro
Code Name : tulip
Operation : Reset MiCloud [2]
**Authenticating... OK
**Retrieving data... OK [2,18 MiB]
Initializing data... OK
Waiting for HS-USB QDLoader 9008... COM13
Connecting to device... OK
Handshaking... OK
Reading bootloader info... OK
**Serial : 1158640240 SoC : [Snapdragon 636] [SDM636] [0x000CC0E1]
**OEM : Qualcomm [0x0000] Model : Unknown [0x0000]
**PK_HASH[0] : A7B8B82545A98ECA23D6E9105FB46456
**PK_HASH[1] : 8D1B5828264903441BDEF0CD57E3C370
Writing flash programmer... OK
Connecting to flash programmer... OK
Configuring device... OK
**Firehose config : eMMC [Sector:512] [Target:4096] [Host:1048576]
Reading partition map... OK - LU Count : 1
Reading software info... OK [system]
** Model Name : Redmi Note 6 Pro
** Product Name : tulip
** Manufacturer : Xiaomi
** Platform : sdm636
** Android Version : 9
** Security Patch : 2020-11-05
** Build ID : PKQ1.180904.001
** Build Date : Tue Dec 29 21:10:11 WIB 2020
** MIUI Version : V12
** MIUI Build : V12.0.1.0.PEKMIXM
** MIUI Region : global
** MIUI Locale : en-GB
Erasing lock data... OK
Erasing USERDATA... OK
Disabling MiCloud... OK
Erasing FRP... OK
Rebooting... OK
UNLOCKTOOL 2024.01.09.0
Elapsed time : 34 seconds
 

GsmToto

Super Moderator
Jan 1, 2021
5,050
21,732
UK
Skype
gsmtoto
Sonork ID
100.1684601
[BROM] ERASE FRP Selected Model : Infinix Hot 2
Code Name : X510
Operation : Erase FRP [2]
**Authenticating... OK
**Retrieving data... OK [269,47 KiB]
Initializing data... OK
1. Power Phone OFF
2.Press And Hold "Vol+" And "Vol-" And Insert USB Cable !
Waiting for device... COM7
Connecting to BROM... OK
Sending DA... OK [68,88 KiB]
Syncing with DA... OK
**HW Chip : MT6580 [6580] - HW Ver : 0xCA00 - SW Ver : 0x0000
**Bootloader Ver : 0x01 - Secure Ver : 0xFF
**Internal RAM Size : 128 KiB
**External RAM Size : 512 MiB
**Storage : EMMC - CID : 45000170.44453848.53100134.A5445C8D
**Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 4 MiB - User Area : 7,13 GiB
Reading partition info... OK [21]
Erasing FRP... OK
UNLOCKTOOL 2024.01.09.0
Elapsed time : 33 seconds
 

GsmToto

Super Moderator
Jan 1, 2021
5,050
21,732
UK
Skype
gsmtoto
Sonork ID
100.1684601
[BROM] ERASE FRP Initializing usb... OK
Waiting for device... COM7 [PRELOADER:0E8D:2000]
Jumping to BROM... OK
Bypassing authentication... OK
Analyzing... preloader_x653c_h6114go.bin [MT6761:14:2352] [Internal]
Handshaking... OK
Reading hardware info... OK
* Hardware : MT6761 [Helio A20|A22|A25|G25|P22] 0717 8A00 CA01 0200
* Security Config : SCB SLA DAA
* MEID : D3A079BEA811E4E3E459FC874D4E5A6E
Sending Download-Agent [1]... OK
Syncing with device... OK
Booting device... OK
Syncing with DA... OK
**Storage : EMMC - CID : 51000115.4D333644.7E100142.ED178CD4
**Vendor : Samsung - Name : QD63MB - Serial : 2362736144 - Rev : 1
**Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 16 MiB - User Area : 29.12 GiB
Reading partition info... OK [38]
Reading device info... OK [system vendor]
** Model Name : Infinix X653C
** Product Name : H6114
** Manufacturer : INFINIX MOBILITY LIMITED
** Platform : Infinix-X653C
** Android Version : 9
** Security Patch : 2021-09-05
** Build ID : X653C-H6114GH-PGo-210831V271
** Build : GH-210831V271
** Build Date : Tue Aug 31 17:00:38 CST 2021
Erasing FRP... OK
UNLOCKTOOL 2024.1.9.0
Elapsed time : 16 seconds
 

GsmToto

Super Moderator
Jan 1, 2021
5,050
21,732
UK
Skype
gsmtoto
Sonork ID
100.1684601
Redmi Note 11 Pro 4G mi account bypass

Initializing usb... OK
Waiting for device... COM4 [BOOTROM:0E8D:0003]
Bypassing authentication... OK
Analyzing... preloader_viva.bin [MT6875/6781:8:784] [Internal]
Vendor : XIAOMI
Reading hardware info... OK
Hardware : MT6781 [Helio G96] 1066 8A00 CA00 0000
Security Config : SCB SLA DAA
MEID : EE93A18E6AE9CDBCA757D5ECD02F945A
Sending Download-Agent [1]... OK
Syncing with device... OK
Booting device... OK
Syncing with DA... OK
Storage : UFS - FWVer : 0300 - CID : KM8L9001JM-B624
Vendor ID : Samsung [0x1CE]
UFS: LU0 Size : 4 MiB - LU1 Size : 4 MiB - LU2 Size : 119.17 GiB
Reading partition info... OK [58]
Reading device info... OK [super]
Model Name : viva
Product Name : viva_global
Manufacturer : Xiaomi
Platform : viva
Android Version : 13
Security Patch : 2023-12-01
Build ID : TP1A.220624.014
Build : V14.0.5.0.TGDMIXM
Build Date : Wed Nov 22 09:45:12 UTC 2023
Device : Redmi Note 11 Pro 4G
MIUI Build : V14.0.5.0.TGDMIXM
MIUI Region : viva_global
MIUI Locale : en-GB
Checking Find Device Status... SKIP (not found)
Checking lockstate... LOCKED
Reading unlock data... OK
Unlocking bootloader... OK
Disabling MiCloud... OK
Resetting MiCloud... SKIP (not found)
Erasing FRP... OK
Please do not relock bootloader after this operation!
 

GsmToto

Super Moderator
Jan 1, 2021
5,050
21,732
UK
Skype
gsmtoto
Sonork ID
100.1684601
Scanning for device... COM134
Connecting to port... OK
Reading Info... OK
Model Number : SM-A135F
Firmware ver:
BL : A135FXXU4CWF1
AP : A135FXXU4CWF1
CP : A135FXXU4CWD2
CSC : A135FODM4CWE2
Hidden ver:
BL : A135FXXU4CWF1
AP : A135FXXU4CWF1
CP : A135FXXU4CWD2
CSC : A135FODM4CWE2
Country Code : INS
Serial Number : RZ8W10X4S6A
IMEI : 354*********1806
Unique Number : CDV0000FAD468C9
LOCK : NONE
Capacity :
Data:196609
Cache:262145
System:327681


----------------------------------------------------



[COLOR=#444444;][COM] REMOVE FRP [2023][/COLOR]

Scanning for device... COM5
Reading Info... FAIL
Connecting to device... OK
Trying method [1]... FAIL
Trying method [2]... OK
Waiting for device...
Model : SM-A135F
Manufacturer : samsung
Platform : universal3830
CPU Arch : armeabi-v7a
Android Serial : RZ8W10X4S6A
Manufacturing Date : 20230128
Security Patch : 2023-05-01
Connection : mtp,adb
Timezone : Asia/Kolkata
Android Version : 13
Android SDK : 33
Build : TP1A.220624.014.A135FXXU4CWF1
Build Date : Thu Jun 1 14:16:40 KST 2023
Product Code : SM-A135FLBHINS
Device Name : a13
Product Name : a13nnxx
Code Name : SM-A135FLBHINS
BL : A135FXXU4CWF1
PDA : A135FXXU4CWF1
CP : A135FXXU4CWD2,A135FXXU4CW
CSC : A135FODM4CW
Sales Code : INS
Removing FRP... OK
 

GsmToto

Super Moderator
Jan 1, 2021
5,050
21,732
UK
Skype
gsmtoto
Sonork ID
100.1684601
[ODIN] [MTK] ERASE FRP 2023 Scanning port... OK
Reading Info... OK
Model : SM-A145R
Storage Capacity : 128G
Manufacturer : MICRON
Firmware Version : 1
CSC : EUX
AP : A145RXXS3AWH2
Device ID : 0887112b7fb4
Connecting to device... OK
Device Platform : MEDIATEK
Backup : \SAMSUNG_FRP\SM-A145R_H13473241029AEE69E1A_A145RXXS3AWH2_2024-01-13_08-22-00
Patching FRP... OK
Waiting for device... OK
Connecting to device... OK
Erasing protection... OK
Erasing FRP... OK
UNLOCKTOOL 2024.01.14.0
Elapsed time : 19 seconds
 

GsmToto

Super Moderator
Jan 1, 2021
5,050
21,732
UK
Skype
gsmtoto
Sonork ID
100.1684601
ERASE FRP Selected Model : Unisoc SC9863A V2
Code Name : Spreadtrum SC9863A V2
Operation : Erase FRP [1]
**Authenticating... OK
**Retrieving data... OK [280.79 KiB]
Hold VOL DOWN then plug-in USB cable!
Waiting for device... COM7 (SPRD U2S Diag)
USB : USB\VID_1782&PID_4D00\6&55CE37D&0&6
Protocol : SPRD3
Sending FDL1... OK [50.46 KiB]
Boot ver: Spreadtrum Boot Block version 1.1
Sending FDL2... OK [491.27 KiB]
Reading device info... FAIL

Erasing FRP... OK
UNLOCKTOOL 2024.01.15.0
Elapsed time : 15 seconds
 

GsmToto

Super Moderator
Jan 1, 2021
5,050
21,732
UK
Skype
gsmtoto
Sonork ID
100.1684601
[PRELOADER] SAFE FORMAT Selected auth : VIVO [1]
Phone must have battery inside!
Waiting for device... COM7 [PRELOADER:0E8D:2000]
Handshaking... OK
Reading hardware info... OK
Hardware : MT6765 [Helio G25|G35|P35] 0766 8A00 CA00 0000
Security Config : SCB DAA
MEID : DF1D0193DD7AF91BD752B7822D5E2E4C
Sending Download-Agent... OK
Syncing with target... OK
Booting device (preloader auth)... OK
Bypassing auth... OK
Syncing with DA... OK
Storage : EMMC - CID : 52000115.41343648.89EE0542.4B556F9A
Vendor : Samsung - Name : RH64AB - Serial : 1872398830 - Rev : 5
Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 4 MiB - User Area : 58.24 GiB
Reading partition info... OK [43]
Reading device info... OK [system vendor]
Model Name : vivo Y83
Product Name : PD1803BF_EX
Manufacturer : vivo
Platform : k62v1_64_bsp
Android Version : 8.1.0
Security Patch : 2019-11-05
Build ID : O11019 release-keys
Build Date : Sat Nov 16 11:57:55 CST 2019
Vivo Model : PD1803BF_EXMA
Vivo Version : PD1803BF_EX_A_9.9.9
OS Name : Funtouch
OS Version : 4.0
OS Build : Funtouch OS_4.0
Erasing FRP... OK
Erasing USERDATA (recovery wipe)... OK

UNLOCKTOOL 2024.01.09.0
Elapsed time : 15 seconds
 

GsmToto

Super Moderator
Jan 1, 2021
5,050
21,732
UK
Skype
gsmtoto
Sonork ID
100.1684601
Selected auth : INFINIX/TECNO/ITEL [2]
Phone must have battery inside!
Waiting for device... COM8 [PRELOADER:0E8D:2000]
Handshaking... OK
Reading hardware info... OK
Hardware : MT6761 [Helio A20|A22|A25|G25|P22] 0717 8A00 CA01 0200
Security Config : SCB DAA
MEID : 2CA2780997CBED60ADFA1CE5307DDFF0
Sending Download-Agent... OK
Syncing with target... OK
Booting device (preloader auth)... OK
Bypassing auth... OK
Syncing with DA... OK
Storage : EMMC - CID : 412201F4.31315652.38461358.973ABD09
Vendor : Samsung - Name : ARV11X - Serial : 3171498054 - Rev : 19
Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 4 MiB - User Area : 58,25 GiB
Reading partition info... OK [50]
Reading device info... OK [super]
Model Name : Infinix X6515
Product Name : X6515-OP
Manufacturer : INFINIX
Platform : Infinix-X6515
Android Version : 12
Security Patch : 2023-06-05
Build ID : INFINIX-S-64-230620V739
Build : 230620V925
Build Date : Tue Jun 20 14:42:10 CST 2023
Erasing FRP... OK
UNLOCKTOOL 2024.01.09.0
Elapsed time : 56 seconds
 

GsmToto

Super Moderator
Jan 1, 2021
5,050
21,732
UK
Skype
gsmtoto
Sonork ID
100.1684601
[COM] REMOVE FRP [2023] Method : [2]
Scanning for device... COM7
Reading Info... FAIL
List index out of bounds (-1). TStringList object range is 0..33
Enabling ADB... OK
Waiting for device...
Please accept USB Debugging on your phone!
Model : SM-J510F
Manufacturer : samsung
Platform : msm8916
CPU Arch : armeabi-v7a
Android Serial : 244eecc3
Manufacturing Date : 2017.02.10
Security Patch : 2019-10-01
Connection : mtp,adb
Timezone : Asia/Karachi
Knox Warranty : 0 - valid
Android Version : 7.1.1
Android SDK : 25
Build : NMF26X.J510FXXU3BSI2
Build Date : Tue Sep 24 17:19:32 KST 2019
Product Code : SM-J510FZDDKSA
Samsung Serial : RV8J20EWBZD
Device Name : j5xnlte
Product Name : j5xnltejv
Code Name : SM-J510FZDDKSA
**BL : J510FXXU3BSI2
**PDA : J510FXXU3BSI2
**CP : J510FXXU3BSE1
**CSC : J510FOJV3BSI1
Sales Code : KSA
Removing FRP... OK
UNLOCKTOOL 2024.01.09.0
Elapsed time : 17 minutes 23 seconds
 
Top