★★★ Successfully Unlocked / Repaired / Flashed Phones by UnlockTool PLEASE POST HERE ★★★

GsmToto

Super Moderator
Jan 1, 2021
5,050
21,732
UK
Skype
gsmtoto
Sonork ID
100.1684601
[SIDELOAD] RESET | DISABLE MI CLOUD Starting ADB Interface... OK
Connecting to device... OK
Connection Mode : sideload
Product Model : Gauguin
Product Name : gauguin_eea
Device Name : gauguin
Device Name : gauguin_eea_global
Firmware Version : V12.0.8.0.QJSEUXM
Android Version : 10
Language : hr
Region : HR
Recovery Version : 2
Device Serial : 0x0bbacb29
ROM Zone : 2
Initializing... OK
Reseting MiCloud... FAIL
Failed to read MiCloud! Firmware is not support!
Disabling MiCloud... FAIL
Failed to read SEC data!
UNLOCKTOOL 2024.01.27.0
Elapsed time : 17 seconds
 

GsmToto

Super Moderator
Jan 1, 2021
5,050
21,732
UK
Skype
gsmtoto
Sonork ID
100.1684601
[ODIN] [MTK] ERASE FRP 2023 Scanning port... OK
Reading Info... OK
Model : SM-A045F
Storage Capacity : 32G
Manufacturer : SAMSUNG
Firmware Version : 4
CSC : MID
AP : A045FXXS4CWK2
Device ID : 9ac356bd02d5
Connecting to device... OK
Device Platform : MEDIATEK
Backup : \SAMSUNG_FRP\SM-A045F_W153458300C5E9D03689_A045FXXS4CWK2_2024-02-13_16-38-46
Patching FRP... OK
Waiting for device... OK
Connecting to device... OK
Erasing protection... OK
Erasing FRP... OK
UNLOCKTOOL 2024.01.27.0
Elapsed time : 19 seconds
 

GsmToto

Super Moderator
Jan 1, 2021
5,050
21,732
UK
Skype
gsmtoto
Sonork ID
100.1684601
[COM] REMOVE FRP [2023] Method : [2]
Scanning for device... COM7
Reading Info... OK
Model Number : SM-A310F
Bootloader : A310FXXU4CRB1
Country Code : VD2
Serial Number : R28HB0STGWK
Unique Number : CAJ0358A5EA1FA3
Enabling ADB... OK
Waiting for device...
Model : SM-A310F
Manufacturer : samsung
Platform : exynos5
CPU Arch : armeabi-v7a
Android Serial : 520358a5ea1fa338
Manufacturing Date : 20161107
Security Patch : 2018-02-01
Connection : mtp,adb
Timezone : Asia/Karachi
Knox Warranty : 0 - valid
Android Version : 7.0
Android SDK : 24
Build : NRD90M.A310FXXU4CRB1
Build Date : Fri Feb 2 12:36:03 KST 2018
Product Code : SM2A310FZKAVD2
Samsung Serial : R28HB0STGWK
Device Name : a3xelte
Product Name : a3xeltexx
Code Name : SM2A310FZKAVD5
**BL : A310FXXU4CRB1
**PDA : A310FXXU4CRB6
**CP : A310FXXU4ARB4
**CSC : A310FVFG4CRB9
Sales Code : VD2
Removing FRP... OK
UNLOCKTOOL 2024.01.27.0
Elapsed time : 48 seconds
 

GsmToto

Super Moderator
Jan 1, 2021
5,050
21,732
UK
Skype
gsmtoto
Sonork ID
100.1684601
[PRELOADER] ERASE FRP Selected auth : VIVO [2]
Phone must have battery inside!
Waiting for device... COM33 [PRELOADER:0E8D:2000]
Handshaking... OK
Reading hardware info... OK
* Hardware : MT6765 [Helio G25|G35|P35] 0766 8A00 CA00 0000
* Security Config : SCB SLA DAA
* MEID : 4141E4F5A1C4EDD8F774D5E2EEE9193F
Sending Download-Agent... OK
Syncing with target... OK
Booting device (preloader auth)... OK
Bypassing auth... OK
Syncing with DA... OK
**Storage : EMMC - CID : 52000115.4D343143.519D0742.ED63FAC4
**Vendor : Samsung - Name : RC14MB - Serial : 4207169949 - Rev : 7
**Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 4 MiB - User Area : 58,24 GiB
Reading partition info... OK [40]
Reading device info... OK [super]
** Model Name : BV5200 Pro
** Product Name : BV5200_Pro_EEA
** Manufacturer : Blackview
** Platform : te105_dk_dk038p_65_s0_eea
** Android Version : 12
** Security Patch : 2022-10-05
** Build ID : BV5200_Pro_EEA_TE105_V1.0_20221103V05
** Build : 1667407745
** Build Date : Thu Nov 3 00:49:38 CST 2022
Erasing FRP... OK
UNLOCKTOOL 2024.01.27.0
Elapsed time : 9 second
 

nnawellwisher

Member
Jun 19, 2022
6
5
pakistan
Redmi dandelion frp Success

ERASE FRP

Initializing usb... OK
Waiting for device... COM159 [BOOTROM:0E8D:0003]
Bypassing authentication... OK
Analyzing... preloader_k62v1_64_bsp.bin [MT6765:10:1712] [Internal]
Handshaking... OK
Reading hardware info... OK
Hardware : MT6765 [Helio G25|G35|P35] 0766 8A00 CA00 0000
Security Config : SCB SLA DAA
MEID : A6F6C71DD30830A367D78B9B7E268EDD
Sending Download-Agent [1]... OK
Syncing with device... OK
Booting device... OK
Syncing with DA... OK
Storage : EMMC - CID : 44000145.36303446.E5420134.C57452EE
Vendor : Scandisk - Name : DF4064 - Serial : 1391387970 - Rev : 1
Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 4 MiB - User Area : 58.24 GiB
Reading partition info... OK [43]
Reading device info... OK [super]
Model Name : 220233L2G
Product Name : dandelion_global2
Manufacturer : Xiaomi
Platform : dandelion
Android Version : 11
Security Patch : 2022-04-01
Build ID : RP1A.200720.011
Build : V12.5.5.0.RCZMIXM
Build Date : Tue Apr 26 21:53:26 CST 2022
MIUI Version : V125
MIUI Build : V12.5.5.0.RCZMIXNM
MIUI Region : dandelion_c3l2_global
MIUI Locale : zh-CN
Checking Find Device Status... SKIP (not found)
Erasing FRP... OK
 
  • Like
Reactions: GsmToto

nnawellwisher

Member
Jun 19, 2022
6
5
pakistan
Samsung A125f U4 frp done

[ODIN] [MTK] ERASE FRP 2023

Scanning port... OK
Reading Info... OK
Model : SM-A125F
Storage Capacity : 128G
Manufacturer : SAMSUNG
Firmware Version : 1
CSC : PAK
AP : A125FXXS4CWK3
Device ID : c14ec4eaf4b6
Connecting to device... OK
Device Platform : MEDIATEK
Backup : \SAMSUNG_FRP\SM-A125F_CDV00AAC9D0E0B7_A125FXXS4CWK3_2024-02-20_12-05-26
Patching FRP... OK
Waiting for device... OK
Connecting to device... OK
Erasing protection... OK
Erasing FRP... OK
 
  • Like
Reactions: GsmToto

nnawellwisher

Member
Jun 19, 2022
6
5
pakistan
Samsung A325f U6 Frp bypass done

[ODIN] [MTK] ERASE FRP 2023

Scanning port... OK
Reading Info... OK
Model : SM-A325F
Storage Capacity : 128G
Manufacturer : SAMSUNG
Firmware Version : 2
CSC : PKD
AP : A325FXXU6DWH3
Device ID : 20f723ae2dc80011
Connecting to device... OK
Device Platform : MEDIATEK
Backup : \SAMSUNG_FRP\SM-A325F_C3V0027046A4898_A325FXXU6DWH3_2024-02-19_17-31-07
Patching FRP... OK
Waiting for device... OK
Connecting to device... OK
Erasing protection... OK
Erasing FRP... OK
 
  • Like
Reactions: GsmToto

nnawellwisher

Member
Jun 19, 2022
6
5
pakistan
VIVO Y15s frp done

[PRELOADER] ERASE FRP

Selected auth : VIVO [2]
Phone must have battery inside!

Waiting for device... COM8 [PRELOADER:0E8D:2000]
Handshaking... OK
Reading hardware info... OK
Hardware : MT6765 [Helio G25|G35|P35] 0766 8A00 CA00 0000
Security Config : SCB DAA
MEID : DA8A9A9B46F16B5FD97A8ADBD0F43407
Sending Download-Agent... OK
Syncing with target... OK
Booting device (preloader auth)... OK
Bypassing auth... OK
Syncing with DA... OK
Storage : EMMC - CID : 34000115.4D4B3658.3DE20942.59583AD0
Vendor : Samsung - Name : 4X6KMB - Serial : 986725858 - Rev : 9
Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 4 MiB - User Area : 29.12 GiB
Reading partition info... OK [47]
Reading device info... OK [super]
Model Name : V2120
Product Name : 2020
Manufacturer : vivo
Platform : k65v1_32_bsp_2g_ago
Android Version : 12
Security Patch : 2023-10-01
Build ID : SP1A.210812.003 release-keys
Build : compiler10201610
Build Date : Fri Oct 20 16:07:00 CST 2023
Vivo Model : PD2140F_EXMA
Vivo Version : PD2140F_EX_A_6.37.2
OS Name : vos
OS Version : 3.0
OS Build : Funtouch OS 12 Global
Erasing FRP... OK
 
  • Like
Reactions: GsmToto

GsmToto

Super Moderator
Jan 1, 2021
5,050
21,732
UK
Skype
gsmtoto
Sonork ID
100.1684601
[EDL] ERASE FRP Selected Model : Xiaomi Redmi 4A
Code Name : Rolex
Operation : Erase FRP [1]
**Authenticating... OK
**Retrieving data... OK [221.33 KiB]
Initializing data... OK
Waiting for HS-USB QDLoader 9008... COM4
Connecting to device... OK
Handshaking... OK
Reading bootloader info... OK
**Serial : 4073329854 SoC : [Snapdragon 425] [MSM8917] [0x000560E1]
**OEM : Qualcomm [0x0000] Model : Unknown [0x0000]
**PK_HASH[0] : 57158EAF1814D78FD2B3105ECE4DB18A
**PK_HASH[1] : 817A08AC664A5782A925F3FF8403D39A
Writing flash programmer... OK
Connecting to flash programmer... OK
Configuring device... OK
**Firehose config : eMMC [Sector:512] [Target:4096] [Host:1048576]
Reading partition map... OK - LU Count : 1
Reading software info... OK [system]
** Model Name : Redmi 4A
** Product Name : rolex
** Manufacturer : Xiaomi
** Platform : QC_Reference_Phone
** Android Version : 7.1.2
** Security Patch : 2018-07-01
** Build ID : N2G47H
** MIUI Version : V10
** MIUI Build : V10.2.3.0.NCCMIXM
** MIUI Region : rolex_global
** MIUI Locale : en-GB
Erasing FRP... OK
Rebooting... OK
UNLOCKTOOL 2024.02.26.0
Elapsed time : 22 seconds
 

GsmToto

Super Moderator
Jan 1, 2021
5,050
21,732
UK
Skype
gsmtoto
Sonork ID
100.1684601
ERASE FRP Initializing usb... OK
Waiting for device... COM5 [BOOTROM:0E8D:0003]
Bypassing authentication... OK
Analyzing... preloader_k62v1_64_bsp.bin [MT6765:11:1872] [Cust]
Handshaking... OK
Reading hardware info... OK
Hardware : MT6765 [Helio G25|G35|P35] 0766 8A00 CA00 0000
Security Config : SCB SLA DAA
MEID : 8EEA2D7B1FC05609EB3BD12111EDD11F
Sending Download-Agent [1]... OK
Syncing with device... OK
Booting device... OK
Syncing with DA... OK
Storage : EMMC - CID : 42000115.3444544A.EF670952.C177BDBC
Vendor : Samsung - Name : BJTD4R - Serial : 3183275879 - Rev : 9
Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 4 MiB - User Area : 29,12 GiB
Reading partition info... OK [43]
Reading device info... OK [super]
Model Name : M2006C3LG
Product Name : dandelion_eea
Manufacturer : Xiaomi
Platform : dandelion
Android Version : 11
Security Patch : 2022-10-01
Build ID : RP1A.200720.011
Build : V12.5.3.0.RCDEUTI
Build Date : Tue Oct 25 21:04:33 CST 2022
MIUI Version : V125
MIUI Build : V12.5.3.0.RCDEUTI
MIUI Region : dandelion_eea_ti_global
MIUI Locale : en-GB
Checking Find Device Status... OK
status: off
session_expire: -1
created_server_time: -1
Erasing FRP... OK
 

GsmToto

Super Moderator
Jan 1, 2021
5,050
21,732
UK
Skype
gsmtoto
Sonork ID
100.1684601
[BROM] ERASE FRP Initializing usb... OK
Waiting for device... COM5 [BOOTROM:0E8D:0003]
Bypassing authentication... OK
Analyzing... preloader_x695_h854.bin [MT6875/6781:10:1712] [Internal]
Handshaking... OK
Reading hardware info... OK
* Hardware : MT6785 [Helio G90|G90T|G95] 0813 8A00 CA00 0000
* Security Config : SCB SLA DAA
* MEID : 6FC917A4501A1E7B88F4AC205DE98D5D
Sending Download-Agent [1]... OK
Syncing with device... OK
Booting device... OK
Syncing with DA... OK
**Storage : UFS - FWVer : A002 - CID : H9HQ15AFAMBDAZ
**Vendor ID : SKHynix [0x1AD]
**UFS: LU0 Size : 4 MiB - LU1 Size : 4 MiB - LU2 Size : 119.17 GiB
Reading partition info... OK [57]
Reading device info... OK [super]
** Model Name : Infinix X695
** Product Name : X695-GL
** Manufacturer : INFINIX MOBILITY LIMITED
** Platform : Infinix-X695
** Android Version : 11
** Security Patch : 2023-03-05
** Build ID : INFINIX-R-64-230301V899
** Build : 230301V1030
** Build Date : Wed Mar 1 12:07:19 CST 2023
Erasing FRP... OK
UNLOCKTOOL 2024.02.27.0
Elapsed time : 15 seconds
 

GsmToto

Super Moderator
Jan 1, 2021
5,050
21,732
UK
Skype
gsmtoto
Sonork ID
100.1684601
FACTORY RESET Selected Model : Vivo Y55
Code Name : Y55L-PD1613F
Operation : Factory Reset [1]
**Authenticating... OK
**Retrieving data... OK [232.92 KiB]
Initializing data... OK
Waiting for HS-USB QDLoader 9008... COM4
Connecting to device... OK
Handshaking... OK
Reading bootloader info... OK
**Serial : 1696237004 SoC : [Snapdragon 430] [MSM8937] [0x0004F0E1]
**OEM : Qualcomm [0x0000] Model : Unknown [0x0000]
**PK_HASH[0] : 60BA997FEF6DA9F05885FA11F1DD6D2D
**PK_HASH[1] : 90D052A257A09C2075D7246CC73C0D4X
Writing flash programmer... OK
Connecting to flash programmer... OK
Configuring device... OK
**Firehose config : eMMC [Sector:512] [Target:4096] [Host:1048576]
Reading partition map... OK - LU Count : 1
Reading software info... OK [system]
** Model Name : vivo
** Product Name : PD1621
** Manufacturer : vivo
** Platform : QC_Reference_Phone
** Android Version : 6.0.1
** Security Patch : 2018-08-01
** Build ID : MMB29M release-keys
** Baseband : MDM9x15.161034
** Vivo Model : PD1621MA
** OS Name : Funtouch
** OS Version : 3.0
** OS Build : Funtouch OS_3.0
Erasing FRP... OK
Total sector : 64
Erasing USERDATA... OK
Rebooting... OK
UNLOCKTOOL 2024.03.01.0
Elapsed time : 8 minutes 45 seconds
 

GsmToto

Super Moderator
Jan 1, 2021
5,050
21,732
UK
Skype
gsmtoto
Sonork ID
100.1684601
[PRELOADER] FACTORY RESET + FRP Selected auth : VIVO [2]
Phone must have battery inside!
Waiting for device... COM7 [PRELOADER:0E8D:2000]
Handshaking... OK
Reading hardware info... OK
Hardware : MT6768 [Helio G70|G80|G85|P65] 0707 8A00 CA00 0006
Security Config : SCB DAA
MEID : 72F044111FCDF3410EFEF0F3F2B53B2Z
Sending Download-Agent... OK
Syncing with target... OK
Booting device (preloader auth)... OK
Bypassing auth... OK
Syncing with DA... OK
Storage : EMMC - CID : 474E0113.53394A31.4F141039.B9787606
Vendor : Micron - Name : G1J9S9 - Serial : 1979928340 - Rev : 16
Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 16 MiB - User Area : 116,48 GiB
Reading partition info... OK [50]
Reading device info... OK [super]
Model Name : V2110
Product Name : 2110_EEA
Manufacturer : vivo
Platform : k69v1_64
Android Version : 12
Security Patch : 2022-05-01
Build ID : SP1A.210812.003 release-keys
Build : compiler05121956
Build Date : Thu May 12 19:55:10 CST 2023
Vivo Model : PD2138F_EXMA
Vivo Version : PD2138F_EX_A_36.15.1
OS Name : vos
OS Version : 3.0
OS Build : Funtouch OS 12 Global
Erasing FRP... OK
Erasing USERDATA (flash file)... OK

UNLOCKTOOL 2024.03.08.0
Elapsed time : 23 seconds
 

GsmToto

Super Moderator
Jan 1, 2021
5,050
21,732
UK
Skype
gsmtoto
Sonork ID
100.1684601
FORMAT DATA Initializing usb... OK
Waiting for device... COM2 [BOOTROM:0E8D:0003]
Bypassing authentication... OK
Analyzing... preloader_k6781v1_64.bin [MT6875/6781:12:1120] [Internal]
Reading hardware info... OK
* Hardware : MT6781 [Helio G96] 1066 8A00 CA00 0000
* Security Config : SCB SLA DAA
* MEID : 9D448A1815E87E0B9D5271385A7C607F
Sending Download-Agent [1]... OK
Syncing with device... OK
Booting device... OK
Syncing with DA... OK
**Storage : UFS - FWVer : A043 - CID : H9HQ15ACPMBDAR
**Vendor ID : SKHynix [0x1AD]
**UFS: LU0 Size : 4 MiB - LU1 Size : 4 MiB - LU2 Size : 119,17 GiB
Reading partition info... OK [50]
Reading device info... OK [super]
** Manufacturer : REALME
** Build : RMX3151GDPR_11_A.20_2021090407580000
Erasing FRP... OK
Erasing USERDATA (quick format)... OK
UNLOCKTOOL 2024.03.09.0
Elapsed time : 36 seconds
 

GsmToto

Super Moderator
Jan 1, 2021
5,050
21,732
UK
Skype
gsmtoto
Sonork ID
100.1684601
ERASE FRP Selected Platform : Tiger T606_64_2_Bypass
Connect Testpoint or hold VOL DOWN! Instruction here!
Waiting for device... COM3 (SPRD U2S Diag)
USB : USB\VID_1782&PID_4D00\5&237D5C64&0&8
Initializing loader... OK
Protocol : SPRD3
Sending payload... OK
Sending auth data... OK
Sending preloader1... OK
Sending preloader2... OK
Booting loader, please wait... OK
Boot ver: Spreadtrum Boot Block version 1.1
Sending FDL1... OK
Sending FDL2... OK
Reading Serial Number... N.A
Reading partitions info... OK [74] [8192]
Dual boot-slot : A
Reading device info... SKIP [EROFS]
Erasing FRP... OK
UNLOCKTOOL 2024.03.10.0
Elapsed time : 28 seconds
 

GsmToto

Super Moderator
Jan 1, 2021
5,050
21,732
UK
Skype
gsmtoto
Sonork ID
100.1684601
Phone must have battery inside!
Waiting for device... COM6 [PRELOADER:0E8D:2000]
Handshaking... OK
Reading hardware info... OK
* Hardware : MT6761 [Helio A20|A22|A25|G25|P22] 0717 8A00 CA01 0206
* Security Config : SCB DAA
* MEID : D96EF183B26690341021C3D6758AB40Z
Sending Download-Agent... OK
Syncing with target... FAIL
Failed to setup device environment!
Failed to setup device environment!
UNLOCKTOOL 2024.03.01.0
Elapsed time : 1 minute 23 seconds
 

GsmToto

Super Moderator
Jan 1, 2021
5,050
21,732
UK
Skype
gsmtoto
Sonork ID
100.1684601
Samsung A022F FRP reset

[ODIN] [MTK] ERASE FRP 2023
Scanning port... OK
Reading Info... OK
Model : SM-A022F
Storage Capacity : 32G
Manufacturer : SAMSUNG
Firmware Version : 3
CSC : VZW
AP : A022FXXS3BWH1
Device ID : 9f8284cfb553
Connecting to device... OK
Device Platform : MEDIATEK
Backup : \SAMSUNG_FRP\SM-A022F_CQX00502F97D698_A022FXXS3BWH1_2024-03-12_15-33-21
Patching FRP... OK
Waiting for device... OK
Connecting to device... OK
Erasing protection... OK
Erasing FRP... OK

UNLOCKTOOL 2024.03.10.0
Elapsed time : 21 seconds
 

GsmToto

Super Moderator
Jan 1, 2021
5,050
21,732
UK
Skype
gsmtoto
Sonork ID
100.1684601
[PRELOADER] FACTORY RESET + FRP Selected auth : VIVO [2]
Phone must have battery inside!
Waiting for device... COM89 [PRELOADER:0E8D:2000]
Handshaking... OK
Reading hardware info... OK
* Hardware : MT6765 [Helio G25|G35|P35] 0766 8A00 CA00 0000
* Security Config : SCB DAA
* MEID : 5E0C398D18BDFA5878737EA4D7A7A6A4
Sending Download-Agent... OK
Syncing with target... OK
Booting device (preloader auth)... OK
Bypassing auth... OK
Syncing with DA... OK
**Storage : EMMC - CID : 684A0190.50613842.AE00033E.53C7F9A4
**Vendor : SK Hynix - Name : hB8aP> - Serial : 4188319232 - Rev : 3
**Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 16 MiB - User Area : 29.12 GiB
Reading partition info... OK [47]
Reading device info... OK [super]
** Model Name : V2026
** Product Name : 2026
** Manufacturer : vivo
** Platform : k65v1_64_bsp
** Android Version : 11
** Security Patch : 2023-03-01
** Build ID : RP1A.200720.012 release-keys
** Build : eng.compil.20230316.214053
** Build Date : Thu Mar 16 21:38:28 CST 2023
** Vivo Model : PD2036F_EXMA
** Vivo Version : PD2036F_EX_A_6.16.8
** OS Name : vos
** OS Version : 2.0
** OS Build : Funtouch OS 11 Global
Erasing FRP... OK
Erasing USERDATA (flash file)... OK
UNLOCKTOOL 2024.03.10.0
Elapsed time : 48 seconds
 
Top