★★★ Successfully Unlocked / Repaired / Flashed Phones by UnlockTool PLEASE POST HERE ★★★

GsmToto

Super Moderator
Jan 1, 2021
4,879
21,551
UK
Skype
gsmtoto
Sonork ID
100.1684601
[PRELOADER] FACTORY RESET + FRP Selected auth : VIVO [3]
Phone must have battery inside!
Waiting for device... COM4 [PRELOADER:0E8D:2000]
Handshaking... OK
Reading hardware info... OK
* Hardware : MT6765 [Helio G25|G35|P35] 0766 8A00 CA00 0000
* Security Config : SCB DAA
* MEID : 5CA098C6CDEA20D5B850015D4546813D
Sending Download-Agent... OK
Syncing with target... OK
Booting device (preloader auth)... OK
Bypassing auth... OK
Syncing with DA... OK
**Storage : EMMC - CID : 474E0113.52394A31.E2061038.29678EK5
**Vendor : Micron - Name : G1J9R8 - Serial : 2398151174 - Rev : 16
**Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 16 MiB - User Area : 58.24 GiB
Reading partition info... OK [46]
Reading device info... OK [super]
** Model Name : vivo 1938N
** Product Name : full_k65v1_64_bsp
** Manufacturer : vivo
** Platform : k65v1_64_bsp
** Android Version : 10
** Security Patch : 2022-06-01
** Build ID : QP1A.190711.020 release-keys
** Build : compiler08241240
** Build Date : Wed Aug 24 13:20:21 CST 2022
** Vivo Model : PD1987F_EXMA
** Vivo Version : PD1987F_EX_A_1.14.34
** OS Name : Funtouch
** OS Version : 11.0
** OS Build : Funtouch OS_10.0
Erasing FRP... OK
Erasing USERDATA (flash file)... OK
UNLOCKTOOL 2024.10.09.0
Elapsed time : 1 minute 24 seconds
 

GsmToto

Super Moderator
Jan 1, 2021
4,879
21,551
UK
Skype
gsmtoto
Sonork ID
100.1684601
[EDL] ERASE FRP Selected Model : Samsung Galaxy A52s 5G (BIT 8)
Code Name : SM-A528B | SM-A528B/DS (BIT8)
Operation : Erase FRP [1]
**Authenticating... OK
**Retrieving data... OK [421,69 KiB]
Initializing data... OK
Waiting for HS-USB QDLoader 9008... COM2
Connecting to device... OK
Writing flash programmer... OK
Connecting to flash programmer... OK
Configuring device... OK
**Firehose config : UFS [Sector:4096] [Target:0] [Host:1048576]
Reading partition map... OK - LU Count : 6
Reading software info... OK [super]
** Model Name : SM-A528B
** Product Name : a52sxqxx
** Manufacturer : samsung
** Platform : lahaina
** Android Version : 14
** Security Patch : 2024-07-01
** Build ID : UP1A.231005.007.A528BXXS9GXF9
** Build : A528BXXS9GXF8
** Build Date : Mon Jun 24 11:58:57 KST 2024
** Code Name : SM-A528B
** PDA : A528BXXS9GXF9
Erasing FRP... Read-Only
Switched to SMART Mode!
Erasing FRP... OK
Rebooting... OK
UNLOCKTOOL 2024.10.09.0
Elapsed time : 1 minute 17 seconds
 

GsmToto

Super Moderator
Jan 1, 2021
4,879
21,551
UK
Skype
gsmtoto
Sonork ID
100.1684601
[BROM] ERASE FRP Selected Model : Samsung Galaxy A03S
Code Name : SM-A037F | SM-A037M
Operation : Erase FRP [10]
**Authenticating... OK
**Retrieving data... OK [331.77 KiB]
Phone must have battery inside!
Waiting for device... COM5 [PRELOADER:0E8D:2000]
Phone must have battery inside!
Waiting for device... COM5 [PRELOADER:0E8D:2000]
Handshaking... OK
Reading hardware info... OK
* Hardware : MT6765 [Helio G25|G35|P35] 0766 8A00 CA00 0000
* Security Config : SCB DAA
* MEID : A3F0484563C874D84EDEB6DAE57DD35F
Sending Download-Agent... OK
Syncing with target... OK
Booting device... OK
Syncing with DA... OK
**Storage : EMMC - CID : 47000115.41423658.1BC30042.D9189996
**Vendor : Samsung - Name : GX6BAB - Serial : 2576751555 - Rev : 0
**Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 16 MiB - User Area : 29.12 GiB
Reading partition info... OK [50]
Erasing FRP... OK
UNLOCKTOOL 2024.10.09.0
Elapsed time : 25 seconds
 

GsmToto

Super Moderator
Jan 1, 2021
4,879
21,551
UK
Skype
gsmtoto
Sonork ID
100.1684601
[ODIN] [MTK] ERASE FRP 2023 Scanning port... OK
Reading Info... OK
Model : SM-A245F
Storage Capacity : 128G
Manufacturer : SAMSUNG
Firmware Version : 0002
CSC : XME
AP : A245FXXS4BXD8
Device ID : 20a85e71d2599a11
Connecting to device... OK
Device Platform : MEDIATEK
Backup : \SAMSUNG_FRP\SM-A245F_CE04237848325876377E_A245FXXS4BXD7_2024-10-18_17-47-01
Patching FRP... OK
Waiting for device... OK
Connecting to device... OK
Erasing protection... OK
Erasing FRP... OK
UNLOCKTOOL 2024.10.09.0
Elapsed time : 35 second
 

GsmToto

Super Moderator
Jan 1, 2021
4,879
21,551
UK
Skype
gsmtoto
Sonork ID
100.1684601
[SPRD] ERASE FRP Selected Platform : SC9863A_32_Bypass
Connect Testpoint or hold VOL DOWN! Instruction here!
Waiting for device... COM5 (SPRD U2S Diag)
USB : USB\VID_1782&PID_4D00\6&1A9ED337&0&3
Initializing loader... OK
Protocol : SPRD3
Sending payload... OK
Sending auth data... OK
Sending preloader1... OK
Sending preloader2... OK
Booting loader, please wait... OK
Boot ver: Spreadtrum Boot Block version 1.1
Sending FDL1... OK
Sending FDL2... OK
Reading Serial Number... N.A
Reading partitions info... OK [56] [1024]
Reading device info... OK [super]
** Model Name : SM-A032F
** Product Name : a3corexx
** Manufacturer : samsung
** Android Version : 11
** Security Patch : 2022-05-01
** Build ID : RP1A.201005.001.A032FXXU1AVE9
** Build Date : Thu May 12 19:43:52 KST 2022
** Code Name : SM-A032F
** PDA : A032FXXU1AVE8
Erasing FRP... OK
Erasing FRP... OK
UNLOCKTOOL 2024.10.09.0
Elapsed time : 1 minute 47 seconds
 

GsmToto

Super Moderator
Jan 1, 2021
4,879
21,551
UK
Skype
gsmtoto
Sonork ID
100.1684601
Selected Platform : SC9863A_32_Bypass
Connect Testpoint or hold VOL DOWN! Instruction here!
Waiting for device... COM4 (SPRD U2S Diag)
USB : USB\VID_1782&PID_4D00\1&79F5D87&1&0000
Initializing loader... OK
Protocol : SPRD3
Sending payload... OK
Sending auth data... OK
Sending preloader1... OK
Sending preloader2... OK
Booting loader, please wait... OK
Boot ver: Spreadtrum Boot Block version 1.1
Sending FDL1... OK
Sending FDL2... OK
Reading Serial Number... N.A
Reading partitions info... OK [56] [1024]
Reading device info... OK [super]
Model Name : SM-A032F
Product Name : a3corexx
Manufacturer : samsung
Android Version : 13
Security Patch : 2024-06-01
Build ID : TP1A.220624.014.A032FXXS6CXE6
Build Date : Tue May 28 10:49:15 +07 2024
Code Name : SM-A032F
PDA : A032FXXS6CXE1
Erasing FRP... OK
Erasing FRP... OK
 

GsmToto

Super Moderator
Jan 1, 2021
4,879
21,551
UK
Skype
gsmtoto
Sonork ID
100.1684601
SamFw Tool 4.9

Using port SAMSUNG Mobile USB Modem #2 (COM2)
Reading info mode MTP ... OK
Model : SM-A415F
CSC : AUT
AP version : A415FXXS5DWI7
BL version : A415FXXS5DWI7
CP version : A415FXXS5DWI7
CSC version : A415FOXM5DWI7
IMEI : 3506629754537899
SN : R58N668MR6N
Lock status : NONE
Country : CH
MCC : 218,
MNC : 90,
USB mode : AT,MTP
Unique number : CDH0025B00874356
Android version : 12
FRP status : LOCK
Firmware : https://samfw.com/firmware/SM-A415F/AUT
----------------------------------------------
----------------------------------------------
----------------------------------------------
UNLOCK TOOL

[COM] REMOVE FRP [2023] Scanning for device... COM2
Reading Info... FAIL
Connecting to device... OK
Trying method [1]... FAIL
Trying method [2]... FAIL
Trying method [3]... FAIL
Trying method [4]... FAIL
UNLOCKTOOL 2024.10.09.0
Elapsed time : 2 minutes 58 seconds
--------------------------------------------

[ODIN] READ INFO Scanning for device... COM3
Connecting to port... OK
Reading Info... OK
Model : SM-A415F
Unique No : CDH0025B045789843
Storage Capacity : 64G
Manufacturer : SAMSUNG
Firmware Version : 2
eMCP : DH6DAB
CSC : AUT
AP : A415FXXS5DWI7
Device ID : 28c5b3a08c9f
TMU_TEMP : 40
UNLOCKTOOL 2024.10.09.0
Elapsed time : 2 seconds
----------------------------------------------
[ODIN] [MTK] ERASE FRP 2023 Scanning port... OK
Reading Info... OK
Model : SM-A415F
Storage Capacity : 64G
Manufacturer : SAMSUNG
Firmware Version : 2
CSC : AUT
AP : A415FXXS5DWI7
Device ID : 28c5b3a08c9f
Connecting to device... OK
Device Platform : MEDIATEK
Backup : \SAMSUNG_FRP\SM-A415F_CDH0025B0067067_A415FXXS5DWI7_2024-10-21_21-56-21
Patching FRP... OK
Waiting for device... OK
Connecting to device... OK
Erasing protection... OK
Erasing FRP... OK
UNLOCKTOOL 2024.10.09.0
Elapsed time : 20 seconds
---------------------------------------
------------------------------------------
Task Starting ADB Interface... OK

Key Value
Model SM-A415F
Manufacturer samsung
Platform mt6768
CPU Arch arm64-v8a
Android Serial R58N668MR6N
Manufacturing Date 20200627
Security Patch 2023-09-01
Connection mtp,adb
Timezone Europe/Sarajevo
Android Version 12
Android SDK 31
Build SP1A.210812.016.A415FXXS5DWI7
Build Date Wed Sep 6 10:59:57 KST 2023
Product Code SM-A415FZKDAUT
Baseband A415FXXS5DWI1,A415FXXS5DWI7
RIL Samsung RIL v4.0
Device State locked
Device Name a41
Product Name a41xx
Code Name SM-A415FZKDAUT
BL A415FXXS5DWI8
PDA A415FXXS5DWI6
CP A415FXXS5DWI1,A415FXXS5DWI7
CSC A415FOXM5DWI7
Sales Code AUT
UNLOCKTOOL 2024.10.09.0
Elapsed time : 0 seconds
 

GsmToto

Super Moderator
Jan 1, 2021
4,879
21,551
UK
Skype
gsmtoto
Sonork ID
100.1684601
[EDL] ERASE FRP Selected Model : Samsung A05s (BIT 4)
Code Name : SM-A057G/DSN (BIT4)
Operation : Erase FRP [1]
**Authenticating... OK
**Retrieving data... OK [267,34 KiB]
Initializing data... OK
Waiting for HS-USB QDLoader 9008... COM3
Connecting to device... OK
Writing flash programmer... OK
Connecting to flash programmer... OK
Configuring device... OK
**Firehose config : UFS [Sector:4096] [Target:0] [Host:1048576]
Reading partition map... OK - LU Count : 6
Reading software info... OK [super]
** Model Name : SM-A057G_EUR_XX_QKEY1
** Manufacturer : SAMSUNG
** Build ID : A057GXXS4CXH4
Erasing FRP... OK
Rebooting... OK
UNLOCKTOOL 2024.10.09.0
Elapsed time : 1 minute 7 seconds
 

GsmToto

Super Moderator
Jan 1, 2021
4,879
21,551
UK
Skype
gsmtoto
Sonork ID
100.1684601
[BROM] ERASE FRP Initializing usb... OK
Waiting for device... COM3 [BOOTROM:0E8D:0003]
Bypassing authentication... OK
Analyzing... preloader_fleur.bin [MT6875/6781:8:784] [Internal]
Reading hardware info... OK
* Hardware : MT6781 [Helio G96] 1066 8A00 CA00 0000
* Security Config : SCB SLA DAA
* MEID : DF6E3DB6167C61LBM9717FC31A569F4KS
Sending Download-Agent [1]... OK
Syncing with device... OK
Booting device... OK
Syncing with DA... OK
**Storage : UFS - FWVer : 0300 - CID : KM8L9001JM-B624
**Vendor ID : Samsung [0x1CE]
**UFS: LU0 Size : 4 MiB - LU1 Size : 4 MiB - LU2 Size : 119,17 GiB
Reading partition info... OK [60]
Reading device info... OK [super]
** Model Name : fleur
** Manufacturer : Xiaomi
** Platform : fleur
** Android Version : 13
** Security Patch : 2024-07-01
** Build ID : TP1A.220624.014
** Build : V816.0.3.0SE68EMIXM
** Build Date : Wed Aug 21 17:48:12 CST 2024
** MIUI Build : V816.0.3.0SE68EMIXM
** MIUI Region : fleur_global
** MIUI Locale : en-GB
Erasing FRP... OK
UNLOCKTOOL 2024.10.24.0
Elapsed time : 27 seconds
 

GsmToto

Super Moderator
Jan 1, 2021
4,879
21,551
UK
Skype
gsmtoto
Sonork ID
100.1684601
ERASE FRP Selected Platform : Tiger T616_64_2_Bypass
Connect Testpoint or hold VOL DOWN! Instruction here!
Waiting for device... COM3 (SPRD U2S Diag)
USB : USB\VID_1782&PID_4D00\6&1DDC1F8E&2&2
Initializing loader... OK
Protocol : SPRD3
Sending payload... OK
Sending auth data... OK
Sending preloader1... OK
Sending preloader2... OK
Booting loader, please wait... OK
Boot ver: Spreadtrum Boot Block version 1.1
Sending FDL1... OK
Sending FDL2... OK
Reading Serial Number... FAIL
[0x84] Operation failed!
Reading partitions info... OK [1] [1024]
Reading device info... FAIL
Failed to read metadata!
Erasing FRP... FAIL
[0xA2] Write error!
Erasing FRP... FAIL
[0xA2] Write error!

UNLOCKTOOL 2024.10.24.0
Elapsed time*:*28*seconds
 

GsmToto

Super Moderator
Jan 1, 2021
4,879
21,551
UK
Skype
gsmtoto
Sonork ID
100.1684601
FLASH Selected Platform : Tiger T616_64_2_Bypass
Connect Testpoint or hold VOL DOWN! Instruction here!
Waiting for device... COM4 (SPRD U2S Diag)
USB : USB\VID_1782&PID_4D00\6&1DDC1F8E&2&2
Initializing loader... OK
Protocol : SPRD3
Sending payload... OK
Sending auth data... OK
Sending preloader1... OK
Sending preloader2... OK
Booting loader, please wait... OK
Boot ver: Spreadtrum Boot Block version 1.1
Sending FDL1... OK
Sending FDL2... OK
Reading Serial Number... N.A
Reading partitions info... OK [71] [8192]
Reading device info... SKIP [EROFS]
Writing avbmeta_rs_a.bin [1 MiB] -> avbmeta_rs_a [1 MiB]... OK
Writing avbmeta_rs_b.bin [1 MiB] -> avbmeta_rs_b [1 MiB]... OK
Writing blackbox.bin [500 MiB] -> blackbox [500 MiB]... OK
Writing boot_a.bin [64 MiB] -> boot_a [64 MiB]... OK
Writing boot_b.bin [64 MiB] -> boot_b [64 MiB]... OK
Writing cache.bin [64 MiB] -> cache [64 MiB]... OK
Writing common_rs1_a.bin [8 MiB] -> common_rs1_a [8 MiB]... OK
Writing common_rs1_b.bin [8 MiB] -> common_rs1_b [8 MiB]... OK
Writing common_rs2_a.bin [16 MiB] -> common_rs2_a [16 MiB]... OK
Writing common_rs2_b.bin [16 MiB] -> common_rs2_b [16 MiB]... OK
Writing dtbo_a.bin [8 MiB] -> dtbo_a [8 MiB]... OK
Writing dtbo_b.bin [8 MiB] -> dtbo_b [8 MiB]... OK
Writing dtb_a.bin [8 MiB] -> dtb_a [8 MiB]... OK
Writing dtb_b.bin [8 MiB] -> dtb_b [8 MiB]... OK
Writing elabel.bin [20 MiB] -> elabel [20 MiB]... OK
Writing fbootlogo.bin [8 MiB] -> fbootlogo [8 MiB]... OK
Writing hypervsior_a.bin [10 MiB] -> hypervsior_a [10 MiB]... OK
Writing hypervsior_b.bin [10 MiB] -> hypervsior_b [10 MiB]... OK
Writing init_boot_a.bin [8 MiB] -> init_boot_a [8 MiB]... OK
Writing init_boot_b.bin [8 MiB] -> init_boot_b [8 MiB]... OK
Writing logo.bin [8 MiB] -> logo [8 MiB]... OK
Writing l_agdsp_a.bin [6 MiB] -> l_agdsp_a [6 MiB]... OK
Writing l_agdsp_b.bin [6 MiB] -> l_agdsp_b [6 MiB]... OK
Writing l_deltanv_a.bin [1 MiB] -> l_deltanv_a [1 MiB]... OK
Writing l_deltanv_b.bin [1 MiB] -> l_deltanv_b [1 MiB]... OK
Writing l_fixnv1_a.bin [1 MiB] -> l_fixnv1_a [1 MiB]... OK
Writing l_fixnv1_b.bin [854.03 KiB] -> l_fixnv1_b [854.03 KiB]... OK
Writing l_fixnv2_a.bin [1 MiB] -> l_fixnv2_a [1 MiB]... OK
Writing l_gdsp_a.bin [10 MiB] -> l_gdsp_a [10 MiB]... OK
Writing l_gdsp_b.bin [10 MiB] -> l_gdsp_b [10 MiB]... OK
Writing l_ldsp_a.bin [20 MiB] -> l_ldsp_a [20 MiB]... OK
Writing l_ldsp_b.bin [20 MiB] -> l_ldsp_b [20 MiB]... OK
Writing l_modem_a.bin [25 MiB] -> l_modem_a [25 MiB]... OK
Writing l_modem_b.bin [25 MiB] -> l_modem_b [25 MiB]... OK
Writing l_runtimenv1.bin [1.13 MiB] -> l_runtimenv1 [1.13 MiB]... OK
Writing l_runtimenv2.bin [1.13 MiB] -> l_runtimenv2 [1.13 MiB]... OK
Writing metadata.bin [64 MiB] -> metadata [64 MiB]... OK
Writing misc.bin [1 MiB] -> misc [1 MiB]... OK
Writing miscdata.bin [1 MiB] -> miscdata [1 MiB]... OK
Writing persist.bin [2 MiB] -> persist [2 MiB]... OK
Writing pgpt.bin [5.2 KiB] -> pgpt [5.2 KiB]... FAIL
[0x8A] Download size error!
Writing phone_info.txt [547 bytes] -> phone_info [547 bytes]... FAIL
[0x8A] Download size error!
Writing pm_sys_a.bin [1 MiB] -> pm_sys_a [1 MiB]... OK
Writing pm_sys_b.bin [1 MiB] -> pm_sys_b [1 MiB]... OK
Writing prodnv.bin [64 MiB] -> prodnv [64 MiB]... OK
Writing sml_a.bin [1 MiB] -> sml_a [1 MiB]... OK
Writing sml_b.bin [1 MiB] -> sml_b [1 MiB]... OK
Writing splloader.bin [4 MiB] -> splloader [4 MiB]... OK
Writing splloader_bak.bin [4 MiB] -> splloader_bak [4 MiB]... FAIL
[0x8A] Download size error!
Writing sysdumpdb.bin [10 MiB] -> sysdumpdb [10 MiB]... OK
Writing teecfg_a.bin [1 MiB] -> teecfg_a [1 MiB]... OK
Writing teecfg_b.bin [1 MiB] -> teecfg_b [1 MiB]... OK
Writing trustos_a.bin [6 MiB] -> trustos_a [6 MiB]... OK
Writing trustos_b.bin [6 MiB] -> trustos_b [6 MiB]... OK
Writing uboot_a.bin [3 MiB] -> uboot_a [3 MiB]... OK
Writing uboot_b.bin [3 MiB] -> uboot_b [3 MiB]... OK
Writing uboot_log.bin [16 MiB] -> uboot_log [16 MiB]... OK
Writing vbmeta_a.bin [1 MiB] -> vbmeta_a [1 MiB]... OK
Writing vbmeta_b.bin [1 MiB] -> vbmeta_b [1 MiB]... OK
Writing vbmeta_odm_a.bin [1 MiB] -> vbmeta_odm_a [1 MiB]... OK
Writing vbmeta_odm_b.bin [1 MiB] -> vbmeta_odm_b [1 MiB]... OK
Writing vbmeta_product_a.bin [1 MiB] -> vbmeta_product_a [1 MiB]... OK
Writing vbmeta_product_b.bin [1 MiB] -> vbmeta_product_b [1 MiB]... OK
Writing vbmeta_system_a.bin [1 MiB] -> vbmeta_system_a [1 MiB]... OK
Writing vbmeta_system_b.bin [1 MiB] -> vbmeta_system_b [1 MiB]... OK
Writing vbmeta_system_ext_a.bin [1 MiB] -> vbmeta_system_ext_a [1 MiB]... OK
Writing vbmeta_system_ext_b.bin [1 MiB] -> vbmeta_system_ext_b [1 MiB]... OK
Writing vbmeta_vendor_a.bin [1 MiB] -> vbmeta_vendor_a [1 MiB]... OK
Writing vbmeta_vendor_b.bin [1 MiB] -> vbmeta_vendor_b [1 MiB]... OK
Writing vendor_boot_a.bin [100 MiB] -> vendor_boot_a [100 MiB]... OK
Writing vendor_boot_b.bin [100 MiB] -> vendor_boot_b [100 MiB]... OK
Total files : 71
Total size : 1.34 GiB

UNLOCKTOOL 2024.10.24.0
Elapsed time : 1 minute 36 seconds
 

GsmToto

Super Moderator
Jan 1, 2021
4,879
21,551
UK
Skype
gsmtoto
Sonork ID
100.1684601
 

GsmToto

Super Moderator
Jan 1, 2021
4,879
21,551
UK
Skype
gsmtoto
Sonork ID
100.1684601
Selected auth : XIAOMI [2]
Phone must have battery inside!

Waiting for device... COM2 [BOOTROM:0E8D:0003]
Initializing usb... OK
Waiting for device... COM2 [BOOTROM:0E8D:0003]
Bypassing authentication... OK
Analyzing... preloader_water.bin [MT6765:9:1552] [Internal]
Vendor : XIAOMI
Handshaking... OK
Reading hardware info... OK
Hardware : MT6765 [Helio G25|G35|P35] 0766 8A00 CA00 0000
Security Config : SCB SLA DAA
MEID : DDGHD9A4A179746A351C0JGCD467B94M
Sending Download-Agent [1]... OK
Syncing with device... OK
Booting device... OK
Syncing with DA... OK
Storage : EMMC - CID : 4DG02DD6.34G6434D.CC1A5147.43AA551M
Vendor : Samsung - Name : MMC64G - Serial : 1427950618 - Rev : 81
Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 4 MiB - User Area : 58.24 GiB
Reading partition info... OK [56]
Reading device info... SKIP [EROFS]
Erasing USERDATA (recovery wipe)... OK
UNLOCKTOOL
2024.10.09.0
Elapsed time : 19 seconds
 

GsmToto

Super Moderator
Jan 1, 2021
4,879
21,551
UK
Skype
gsmtoto
Sonork ID
100.1684601
USB 1.0] ERASE FRP Scanning port... COM3
Connecting to port... OK
Connection : USB 1.0 Full-Speed
USB Driver : [HUAWEI Incorporated] HSPL_usbvcom
Selected Model : HiSilicon Kirin 659
Code Name : Hi659
Operation : Kirin Testpoint [1]
Authenticating... OK
Retrieving data... OK [1,04 MiB]
Platform : HiSilicon Kirin 659
Writing sec_usb_xloader... OK 0,484s
Writing sec_fastboot... OK 24,487s
Waiting for fastboot... OK
Product Model : ANE-LX1
Erasing FRP... OK
UNLOCKTOOL 2024.10.24.0
Elapsed time : 43 seconds
 

GsmToto

Super Moderator
Jan 1, 2021
4,879
21,551
UK
Skype
gsmtoto
Sonork ID
100.1684601
[SIDELOAD] ERASE FRP Starting ADB Interface... OK
Connecting to device... OK
Connection Mode : sideload
Product Model : M2010J19NG
Product Name : citrus_global
Device Name : citrus
Device Name : citrus_global
Firmware Version : V12.5.10.0.RJFDYMV
Android Version : 11
Language : en
Region : GB
Recovery Version : 2
Device Serial : 0xf8067I79
ROM Zone : 2
Initializing... OK
Erasing FRP... OK
 

GsmToto

Super Moderator
Jan 1, 2021
4,879
21,551
UK
Skype
gsmtoto
Sonork ID
100.1684601
[BROM] ERASE FRP Initializing usb... OK
Waiting for device... COM4[BOOTROM:0E8D:0003]
Bypassing authentication... FAIL
Failed to read EMI from device!
Handshaking... OK
Reading hardware info... OK
Hardware : MT6765 [Helio G25|G35|P35] 0766 8A00 CA00 0000
Security Config : SCB SLA DAA
MEID : FCDA2DA52C60FAB621D064M47097E2FM
Sending Download-Agent [1]... OK
Syncing with device... OK
Loading EMI... OK
Booting device... OK
Syncing with DA... OK
Storage : EMMC - CID : 684A0190.50613842.1F10013E.13842EA
Vendor : SK Hynix - Name : hB8aP> - Serial : 1122639632 - Rev : 1
Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 16 MiB - User Area : 29.12 GiB
Reading partition info... OK [54]
Reading device info... OK [super]
Model Name : VNA-LX2
Manufacturer : HONOR
Platform : HNVNA-M
Android Version : 12
Security Patch : 2023-06-01
Build ID : VNA-LX2 6.1.0.272
Build : mp1k6983v164P475
Build Date : Tue Jun 13 17:35:22 CST 2023
Erasing FRP... OK

UNLOCKTOOL 2024.10.24.0
Elapsed time : 38 seconds
 

GsmToto

Super Moderator
Jan 1, 2021
4,879
21,551
UK
Skype
gsmtoto
Sonork ID
100.1684601
[PRELOADER] ERASE FRP Selected auth : CUSTOM DA
**Retrieving data... OK [619.61 KiB]
Phone must have battery inside!
Waiting for device... COM3 [PRELOADER:0E8D:2000]
Handshaking... OK
Reading hardware info... OK
* Hardware : MT6768 [Helio G70|G80|G85|P65] 0707 8A00 CA00 0000
* Security Config : SCB SLA DAA
* MEID : E4CA9F0AB7224C61BEF600847436F2DF
Custom DA : Redmi_13C_Gale_OS1.0.2.0
DA Ver : MTK_AllInOne_DA_v5.5001.2023-11-15.20:17_10/19/2023_626809
 
  • Like
Reactions: .::Gorbagy::.
Top