★★★ Successfully Unlocked / Repaired / Flashed Phones by UnlockTool PLEASE POST HERE ★★★

GsmToto

Super Moderator
Jan 1, 2021
4,871
21,546
UK
Skype
gsmtoto
Sonork ID
100.1684601
PRELOADER] ERASE FRP Selected auth : CUSTOM DA
**Retrieving data... OK [619,61 KiB]
Phone must have battery inside!
Waiting for device... COM4 [PRELOADER:0E8D:2000]
Handshaking... OK
Reading hardware info... OK
* Hardware : MT6768 [Helio G70|G80|G85|P65] 0707 8A00 CA00 0000
* Security Config : SCB SLA DAA
* MEID : 6B61BEC8930C504BCG13CAA1D0DF54CM
Custom DA : Redmi_13C_Gale_V14.0.6.0
DA Ver : MTK_AllInOne_DA_v5.5001.2023-12-18.20:13_10/19/2023_628998
 

GsmToto

Super Moderator
Jan 1, 2021
4,871
21,546
UK
Skype
gsmtoto
Sonork ID
100.1684601
[EDL] ERASE FRP Selected Model : Samsung A05s (BIT 5)
Code Name : SM-A057F | SM-A057F/DS (BIT5)
Operation : Erase FRP [1]
Authenticating... OK
Retrieving data... OK [264,11 KiB]
Initializing data... OK
Waiting for HS-USB QDLoader 9008... COM5
Connecting to device... OK
Writing flash programmer... OK
Connecting to flash programmer... OK
Configuring device... OK
Firehose config : UFS [Sector:4096] [Target:0]

[Host:1048576]
Reading partition map... OK - LU Count : 6
Reading software info... OK [super]
Model Name : SM-A057F_SEA_XXV_QKEY0
Manufacturer : SAMSUNG
Build ID : A057FXXS2AWL5
Erasing FRP... OK
Rebooting... OK
UNLOCKTOOL 2024.10.24.0
Elapsed time : 19 seconds
 

GsmToto

Super Moderator
Jan 1, 2021
4,871
21,546
UK
Skype
gsmtoto
Sonork ID
100.1684601
[USB 1.0] ERASE FRP Scanning port... COM4
Connecting to port... OK
Connection : USB 1.0 Full-Speed
USB Driver : [HUAWEI Incorporated] HSPL_usbvcom - Version : 2.0.7.1
Selected Model : HiSilicon Kirin 710F Emmc [Erase FRP]
Code Name : Hi710F_Emmc
Operation : Erase FRP [1]
Authenticating... OK
Retrieving data... OK [110,72 KiB]
Writing unlocktool1... OK 1,528s
Writing unlocktool2... OK 0,224s
Writing unlocktool3... OK 0,443s
Reading partition map... OK [71]
Searching FRP Lock... OK [0:524288:524288]
Erasing FRP... OK
UNLOCKTOOL 2024.10.24.0
Elapsed time : 29seconds
 

=-rebel-=

Moderator
Jan 22, 2020
1,313
1,028
Philippines
[SPRD] FACTORY RESET Selected Platform : SC7731E_Bypass
Connect Testpoint or hold VOL DOWN! Instruction here!
Waiting for device... COM5 (SPRD U2S Diag)
USB : USB\VID_1782&PID_4D00\5&21C1C54A&0&3
Initializing loader... OK
Protocol : SPRD3
Sending payload... OK
Sending auth data... OK
Sending preloader1... OK
Sending preloader2... OK
Booting loader, please wait... OK
Boot ver: Spreadtrum Boot Block version 1.1
Sending FDL1... OK
Sending FDL2... OK
Reading Serial Number... N.A
Reading partitions info... OK [74] [1024]
Dual boot-slot : A
Reading device info... OK [super]
Model Name : Nokia C10
Product Name : Mantis_00WW
Manufacturer : Nokia
Android Version : 11
Security Patch : 2023-08-05
Build ID : 00WW_1_89B
Build Date : Tue Aug 8 03:57:32 UTC 2023
Erasing FRP (persist)... OK
Erasing USERDATA... OK
UNLOCKTOOL 2024.10.24.0
Elapsed time : 39 seconds
 

GsmToto

Super Moderator
Jan 1, 2021
4,871
21,546
UK
Skype
gsmtoto
Sonork ID
100.1684601
Selected Platform : SC9863A_32_Bypass
Connect Testpoint or hold VOL DOWN! Instruction here!
Waiting for device... COM3 (SPRD U2S Diag)
USB : USB\VID_1782&PID_4D00\5&15C311E1&0&4
Initializing loader... OK
Protocol : SPRD3
Sending payload... OK
Sending auth data... OK
Sending preloader1... OK
Sending preloader2... OK
Booting loader, please wait... OK
Boot ver: Spreadtrum Boot Block version 1.1
Sending FDL1... OK
Sending FDL2... OK
Reading Serial Number... N.A
Reading partitions info... OK [56] [1024]
Reading device info... OK [super]
Model Name : SM-A032F
Product Name : a3corexx
Manufacturer : samsung
Android Version : 13
Security Patch : 2024-06-01
Build ID : TP1A.220624.014.A032FXXS6CXGM
Build Date : Wed May 29 11:13:01 +07 2024
Code Name : SM-A032F
PDA : A032FXXS6CFM1
Erasing FRP... OK
Erasing FRP... OK
 

GsmToto

Super Moderator
Jan 1, 2021
4,871
21,546
UK
Skype
gsmtoto
Sonork ID
100.1684601
[PRELOADER] FACTORY RESET + FRP Selected auth : OPPO/REALME/ONEPLUS [2]
Phone must have battery inside!
Waiting for device... COM2 [PRELOADER:0E8D:2000]
Handshaking... OK
Reading hardware info... OK
* Hardware : MT6835 [Dimensity 6100+] 1209 8A00 CB00 0000
* Security Config : SCB DAA
* MEID : A01DD12E686CCE8015C078A75A3A8604
Sending Download-Agent... OK
Syncing with target... OK
Booting device (preloader auth)... OK
Authenticating SLA... OK
Syncing with DA... OK
**Storage : UFS - CID : 4B4C5545473230463100000000004523144452D4
**UFS: LU0 Size : 4 MiB - LU1 Size : 4 MiB - LU2 Size : 238.34 GiB
Reading partition info... OK [79]
Erasing FRP... OK
Erasing USERDATA (quick format)... OK
UNLOCKTOOL 2024.10.24.0
Elapsed time : 34 seconds
 

GsmToto

Super Moderator
Jan 1, 2021
4,871
21,546
UK
Skype
gsmtoto
Sonork ID
100.1684601
[COM] REMOVE FRP [2023] Scanning for device... COM3
Reading Info... OK
Model Number : SM-A135F
Bootloader : A135FXXU1AVF1
Country Code : XFV
Serial Number : RZ8T71AE***
Unique Number : CDC0045CFD2BD69
Connecting to device... OK
Trying method [1]... OK
Waiting for device...
Please accept USB Debugging on your phone!
Model : SM-A135F
Manufacturer : samsung
Platform : universal3830
CPU Arch : armeabi-v7a
Android Serial : RZ8T71FRMUIN
Manufacturing Date : 20220722
Security Patch : 2022-06-01
Connection : mtp,adb
Timezone : Africa/Johannesburg
Android Version : 12
Android SDK : 31
Build : SP1A.210812.016.A135FXXW3UMTTHGD
Build Date : Tue Jun 7 10:10:36 KST 2022
Product Code : SM-A135FLBDTMY
Device Name : a13
Product Name : a13nnxx
Code Name : SM-A135FLSEBIKLZ
BL : A135FXXU1AVF1
PDA : A135FXXU1AVF1
CP : A135FXXU1AVF1,A135FXXU5FHMK
CSC : A135FOJM1AVF2
Sales Code : XFV
Removing FRP... OK
UNLOCKTOOL 2024.10.24.0
Elapsed time : 38 seconds
 

GsmToto

Super Moderator
Jan 1, 2021
4,871
21,546
UK
Skype
gsmtoto
Sonork ID
100.1684601
[EDL] ERASE FRP Selected Model : Vivo V9 | V9 Pro
Code Name : PD1730F
Operation : Erase FRP [1]
**Authenticating... OK
**Retrieving data... OK [245.32 KiB]
Initializing data... OK
Waiting for HS-USB QDLoader 9008... COM4
Connecting to device... OK
Handshaking... OK
Reading bootloader info... OK
**Serial : 1983019482 SoC : [Snapdragon 625] [MSM8953] [0x000460E1]
**OEM : Qualcomm [0x0000] Model : Unknown [0x0000]
**PK_HASH[0] : 60BA9905885FA11F1DD6D2A7FEF6DA9F
**PK_HASH[1] : 90D052A7246CC73C0D43257A09C2075D
Writing flash programmer... OK
Connecting to flash programmer... OK
Configuring device... OK
**Firehose config : eMMC [Sector:512] [Target:4096] [Host:1048576]
Reading partition map... OK - LU Count : 1
Reading software info... OK [system]
** Model Name : vivo 1723
** Product Name : PD1730F_EX
** Manufacturer : vivo
** Platform : msm8953
** Android Version : 9
** Security Patch : 2021-05-01
** Build ID : PKQ1.190118.001 release-keys
** Build Date : Mon May 17 16:25:08 CST 2021
** Vivo Model : PD1730F_EXMA
** OS Name : Funtouch
** OS Version : 9
** OS Build : Funtouch OS_9
Erasing FRP... OK
Rebooting... OK
UNLOCKTOOL 2024.11.06.0
Elapsed time : 59 seconds
 

GsmToto

Super Moderator
Jan 1, 2021
4,871
21,546
UK
Skype
gsmtoto
Sonork ID
100.1684601
elected Model : Samsung S24 Ultra (BIT 3)
Code Name : SM-S928B, SM-S928B/DS (BIT3)
Operation : Erase FRP [1]
Authenticating... OK
Retrieving data... OK [698,75 KiB]
Initializing data... OK
Waiting for HS-USB QDLoader 9008... COM3
Connecting to device... OK
Writing flash programmer... FAIL
[Sahara] Unknown command!
Trying to connect to FIREHOSE Mode!

Connecting to flash programmer... OK
Configuring device... OK
Firehose config : UFS [Sector:4096] [Target:0] [Host:1048576]
Reading partition map... OK - LU Count : 4
Reading software info... OK [super]
Model Name : SM-S928B_EUR_XX_QKEY2
Manufacturer : SAMSUNG
Build ID : S928B3AXI7XXS
Erasing FRP... OK
Rebooting... OK
 

GsmToto

Super Moderator
Jan 1, 2021
4,871
21,546
UK
Skype
gsmtoto
Sonork ID
100.1684601
[ODIN] ERASE FRP Scanning port... OK
Reading Info... OK
Model : SM-A155F
Storage Capacity : 128G
Manufacturer : SAMSUNG
Firmware Version : 0003
CSC : ECT
AP : A155FXDU1AWKD
Device ID : 303fad5606405c11
Connecting to device... OK
Device Platform : MEDIATEK
Backup : \SAMSUNG_FRP\SM-A155M_CE10237A38F7243D2C7M_A155FDXU1AWKM_2024-11-14_16-47-16
Patching FRP... OK
Waiting for device... OK
Connecting to device... OK
Erasing protection... OK
Erasing FRP... OK
UNLOCKTOOL 2024.11.06.0
Elapsed time : 17 seconds
 

GsmToto

Super Moderator
Jan 1, 2021
4,871
21,546
UK
Skype
gsmtoto
Sonork ID
100.1684601
[EDL] ERASE FRP Selected Model : Xiaomi Redmi 5 Plus
Code Name : vince
Operation : Erase FRP [1]
**Authenticating... OK
**Retrieving data... OK [476,86 KiB]
Initializing data... OK
Waiting for HS-USB QDLoader 9008... COM3
Connecting to device... OK
Handshaking... OK
Reading bootloader info... OK
**Serial : 290339832 SoC : [Snapdragon 625] [MSM8953] [0x000460E1]
**OEM : Qualcomm [0x0000] Model : Unknown [0x0000]
**PK_HASH[0] : 57158EAFG814DE4DB18A78FD2B3105EG
**PK_HASH[1] : 817A08AC6G3FF8403D39A64A5782A92M
Writing flash programmer... OK
Connecting to flash programmer... OK
Configuring device... OK
**Firehose config : eMMC [Sector:512] [Target:4096] [Host:1048576]
Reading partition map... OK - LU Count : 1
Reading software info... OK [system]
** Model Name : Redmi 5 Plus
** Product Name : vince
** Manufacturer : Xiaomi
** Platform : msm8953
** Android Version : 8.1.0
** Security Patch : 2018-06-05
** Build ID : ZQL1711-vince-build-20180748644819
** MIUI Version : V10
** MIUI Build : 8.7.3
** MIUI Region : vince_global
** MIUI Locale : en-GB
Erasing FRP... OK
Rebooting... OK
UNLOCKTOOL 2024.11.06.0
Elapsed time : 35 seconds
 
  • Like
Reactions: .::Gorbagy::.

GsmToto

Super Moderator
Jan 1, 2021
4,871
21,546
UK
Skype
gsmtoto
Sonork ID
100.1684601
[EDL] ERASE FRP Selected Model : Samsung M11 (BIT3)
Code Name : SM-M115F (BIT3)
Operation : Erase FRP [1]
Authenticating... OK
Retrieving data... OK [233.19 KiB]
Initializing data... OK
Waiting for HS-USB QDLoader 9008... COM4
Connecting to device... OK
Handshaking... OK
Reading bootloader info... OK
Serial : 2932559893 SoC : [Snapdragon 450] [SDM450] [0x0009A0E1]
OEM : Samsung [0x0020] Model : Unknown [0x0000]
PK_HASH[0] : 11AC510C4611B6AFFD67197C59FAD3CM
PK_HASH[1] : A9A60A5A985CC21F07D3E35BBAECAA5F
Writing flash programmer... OK
Connecting to flash programmer... OK
Configuring device... OK
Firehose config : eMMC [Sector:512] [Target:4096] [Host:1048576]
Reading partition map... OK - LU Count : 1
Reading software info... OK [super]
Model Name : SM-M115F
Product Name : m11qnsxx
Manufacturer : samsung
Platform : QC_Reference_Phone
Android Version : 10
Security Patch : 2020-05-01
Build ID : QP1A.190711.020.M115FXYU1ATFM
Build : M115FXYU1ATF5
Build Date : Wed Jun 17 23:19:23 KST 2020
Code Name : SM-M115F
PDA : M115FXYU1ATFM
Erasing FRP... OK
Rebooting... OK

UNLOCKTOOL 2024.11.06.0
Elapsed time : 29 seconds
 
  • Like
Reactions: .::Gorbagy::.

GsmToto

Super Moderator
Jan 1, 2021
4,871
21,546
UK
Skype
gsmtoto
Sonork ID
100.1684601
[BROM] ERASE FRP Initializing usb... OK
Waiting for device... COM3 [BOOTROM:0E8D:0003]
Bypassing authentication... OK
Analyzing... preloader_selene.bin [MT6769:20:3312] [Internal]
Vendor : XIAOMI
Handshaking... OK
Reading hardware info... OK
* Hardware : MT6768 [Helio G70|G80|G85|P65] 0707 8A00 CA00 0000
* Security Config : SCB SLA DAA
* MEID : 9AE548CEAFG5D50A34704VB2CBB369BM
Sending Download-Agent [1]... OK
Syncing with device... OK
Booting device... OK
Syncing with DA... OK
**Storage : EMMC - CID : 474ED113.5339MA31.9B151039.858814BM
**Vendor : Micron - Name : G1J9S9 - Serial : 347839253 - Rev : 16
**Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 16 MiB - User Area : 116,48 GiB
Reading partition info... OK [55]
Reading device info... OK [super]
** Model Name : 21061119AG
** Product Name : selene
** Manufacturer : Xiaomi
** Platform : selene
** Android Version : 13
** Security Patch : 2024-03-01
** Build ID : TP1A.220624.014
** Build : V14.0.6.045784UEUOR
** Build Date : Mon Mar 18 15:03:30 UTC 2024
** MIUI Build : V14.0.6.057336UEUOR
** MIUI Region : selene_eea_or_global
** MIUI Locale : en-GB
Erasing FRP... OK
UNLOCKTOOL 2024.11.06.0
Elapsed time : 39 seconds
 
  • Like
Reactions: .::Gorbagy::.

GsmToto

Super Moderator
Jan 1, 2021
4,871
21,546
UK
Skype
gsmtoto
Sonork ID
100.1684601
Selected Platform : Tiger T606_64_5_Bypass
Connect Testpoint or hold VOL DOWN! Instruction here!
Waiting for device... COM5 (SPRD U2S Diag)
USB : USB\VID_1782&PID_4D50\6&60E2A05&0&3
Initializing loader... OK
Protocol : SPRD3
Sending payload... OK
Sending auth data... OK
Sending preloader1... OK
Sending preloader2... OK
Booting loader, please wait... OK
Boot ver: Spreadtrum Boot Block version 1.1
Sending FDL1... OK
Sending FDL2... OK
Reading Serial Number... N.A
Reading partitions info... OK [56] [1024]
Reading device info... OK [super]
Model Name : SM-A035M
Product Name : a03ub
Manufacturer : samsung
Android Version : 11
Security Patch : 2021-12-01
Build ID : RP1A.200720.012.A035MUBU5AVA5
Build Date : Mon Jan 5 09:34:59 KST 2022
Code Name : SM-A035M
PDA : A035MUBU5AVA5
Erasing FRP... OK
Erasing FRP... OK
 
  • Like
Reactions: .::Gorbagy::.

GsmToto

Super Moderator
Jan 1, 2021
4,871
21,546
UK
Skype
gsmtoto
Sonork ID
100.1684601
Initializing usb... OK
Waiting for device... COM2 [BOOTROM:0E8D:0003]
Bypassing authentication... OK
Analyzing... preloader_k6877ttv1_64_titan_black_tiger.bin [MT6877:12:1120] [Internal]
Vendor : SAMSUNG
Reading hardware info... OK
Hardware : MT6877 [Dimensity 900|920|1080|7050] 0959 8A00 CA00 0000
Security Config : SCB SLA DAA
MEID : 9015F8F32194538673A53C834741E795D
Sending Download-Agent [1]... OK
Syncing with device... OK
Booting device... Done
Failed to receive STAGE2 SYNC! Code : 0xFFFF

UNLOCKTOOL 2024.11.06.0
Elapsed time : 1 minute 38 seconds
 

GsmToto

Super Moderator
Jan 1, 2021
4,871
21,546
UK
Skype
gsmtoto
Sonork ID
100.1684601
Initializing usb... OK
Waiting for device... COM2 [BOOTROM:0E8D:0003]
Bypassing authentication... OK
Analyzing... preloader_k6877ttv1_64_titan_black_tiger.bin [MT6877:12:1120] [Internal]
Vendor : SAMSUNG
Reading hardware info... OK
Hardware : MT6877 [Dimensity 900|920|1080|7050] 0959 8A00 CA00 0000
Security Config : SCB SLA DAA
MEID : 9015F8F32194538673A53C834741E795D
Sending Download-Agent [1]... OK
Syncing with device... OK
Booting device... FAIL
Failed to receive STAGE2 SYNC! Code : 0xFFFF

UNLOCKTOOL 2024.11.06.0
Elapsed time : 1 minute 38 seconds
 
  • Like
Reactions: .::Gorbagy::.

GsmToto

Super Moderator
Jan 1, 2021
4,871
21,546
UK
Skype
gsmtoto
Sonork ID
100.1684601
[PRELOADER] SAFE FORMAT Selected auth : VIVO [3]
Phone must have battery inside!
Waiting for device... COM4 [PRELOADER:0E8D:2000]
Handshaking... OK
Reading hardware info... OK
* Hardware : MT6765 [Helio G25|G35|P35] 0766 8A00 CA00 0000
* Security Config : SCB DAA
* MEID : 089824FB3D8B17DDB99C94E6B4F26677
Sending Download-Agent... OK
Syncing with target... OK
Booting device (preloader auth)... OK
Bypassing auth... OK
Syncing with DA... OK
**Storage : EMMC - CID : 534E0113.4B394A30.A6184039.8727686F
**Vendor : Micron - Name : S0J9K9 - Serial : 1752147480 - Rev : 16
**Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 16 MiB - User Area : 116.48 GiB
Reading partition info... OK [46]
Reading device info... OK [super]
** Model Name : vivo 1938
** Product Name : 1938N
** Manufacturer : vivo
** Platform : k65v1_64_bsp
** Android Version : 12
** Security Patch : 2023-04-01
** Build ID : SP1A.210812.003 release-keys
** Build : compiler10211406
** Build Date : Mon Oct 21 14:02:28 CST 2024
** Vivo Model : PD1987F_EXMA
** Vivo Version : PD1987F_EX_A_6.20.17
** OS Name : Funtouch
** OS Version : 11.5
** OS Build : Funtouch OS_10.5
Erasing FRP... OK
Erasing USERDATA (recovery wipe)... OK
UNLOCKTOOL 2024.11.06.0
Elapsed time : 3 minutes 34 seconds
 

GsmToto

Super Moderator
Jan 1, 2021
4,871
21,546
UK
Skype
gsmtoto
Sonork ID
100.1684601
[COM+ADB] READ INFO Scanning for device... COM3
Reading Info... OK
Model Number : SM-A515F
Firmware ver:
**BL : A515FXXU8HWI5
**AP : A515FXXU8HWI5
**CP : A515FXXU8HWI5
**CSC : A515FOXM8HWI1
Hidden ver:
**BL : A515FXXU8HWI5
**AP : A515FXXU8HWI5
**CP : A515FXXU8HWI5
**CSC : A515FOXM8HWI5
Country Code : SEE
Serial Number : R58N355Q48P
IMEI : 355462116621296
Unique Number : CE022042A8E498587F7E
LOCK : NONE
Capacity :
**Data:196609
**Cache:262145
**System:327649
UNLOCKTOOL 2024.11.15.0
Elapsed time : 8 seconds
 
  • Like
Reactions: .::Gorbagy::.

GsmToto

Super Moderator
Jan 1, 2021
4,871
21,546
UK
Skype
gsmtoto
Sonork ID
100.1684601
FORMAT DATA Selected Platform : Tiger T606_64_Bypass
Connect Testpoint or hold VOL DOWN! Instruction here!
Waiting for device... COM2 (SPRD U2S Diag)
USB : USB\VID_1782&PID_4D00\5&1AA452E9&0&1
Initializing loader... OK
Protocol : SPRD3
Sending payload... OK
Sending auth data... OK
Sending preloader1... OK
Sending preloader2... OK
Booting loader, please wait... OK
Boot ver: Spreadtrum Boot Block version 1.1
Sending FDL1... OK
Sending FDL2... OK
Reading Serial Number... b80K0230925055844
Reading partitions info... OK [70] [1024]
Dual boot-slot : B
Reading device info... SKIP [EROFS]
Erasing FRP (persist)... OK
Erasing USERDATA... OK

UNLOCKTOOL 2024.11.15.0
Elapsed time : 1 minute 28 seconds
 
  • Like
Reactions: .::Gorbagy::.

GsmToto

Super Moderator
Jan 1, 2021
4,871
21,546
UK
Skype
gsmtoto
Sonork ID
100.1684601
Initializing usb... OK
Waiting for device... COM3 [BOOTROM:0E8D:0003]
Bypassing authentication... OK
Analyzing... preloader_viva.bin [MT6875/6781:8:784] [Internal]
Vendor : XIAOMI
Reading hardware info... OK
Hardware : MT6781 [Helio G96] 1066 8A00 CA00 0000
Security Config : SCB SLA DAA
MEID : EDA5FC0DED5BCDDA0FD4158078C3C39D
Sending Download-Agent [1]... OK
Syncing with device... OK
Booting device... OK
Syncing with DA... OK
Storage : UFS - FWVer : 0300 - CID : KM8L9001JM-B624
Vendor ID : Samsung [0x1CE]
UFS: LU0 Size : 4 MiB - LU1 Size : 4 MiB - LU2 Size : 119.17 GiB
Reading partition info... OK [58]
Reading device info... OK [super]
Model Name : viva
Product Name : viva_global
Manufacturer : Xiaomi
Platform : viva
Android Version : 13
Security Patch : 2024-02-01
Build ID : TP1A.220624.014
Build : V816.0.3.0.TGDMIXM
Build Date : Fri Mar 1 09:04:37 UTC 2024
Device : Redmi Note 11 Pro 4G
MIUI Build : V816.0.3.0.TGDMIXM
MIUI Region : viva_global
MIUI Locale : en-GB
Selected Model : Xiaomi Redmi Note 11 Pro
Code Name : pissarro_Miui14
Operation : Unlock Bootloader [2]
Authenticating... OK
Retrieving server data... OK [1.07 MiB]
Writing security data... OK
Reading unlock data... OK
Unlocking bootloader... OK
Checking for lock data... OK [unlocked]
Checking lockstate... UNLOCKED
Disabling MiCloud... OK
Resetting MiCloud... OK
Erasing FRP... OK
Please do not relock bootloader after this operation!
UNLOCKTOOL
2024.11.15.0
Elapsed time : 4 minutes 33 seconds
 
Top