★★★ Successfully Unlocked / Repaired / Flashed Phones by UnlockTool PLEASE POST HERE ★★★

Jan 2, 2018
5
3
mansehra
Skype
naseer_mansehra
Sonork ID
100.1603246
PSMART FRP REMOVE DONE
SB 1.0] ERASE FRP Scanning port... COM38
Connecting to port... OK
Connection : USB 1.0 Full-Speed
USB Driver : [HUAWEI Incorporated] HSPL_usbvcom
Selected Model : HiSilicon Kirin 659
Code Name : Hi659
Operation : Kirin Testpoint [1]
Authenticating... OK
Retrieving data... OK [1.04 MiB]
Platform : HiSilicon Kirin 659
Writing sec_usb_xloader... OK 0.473s
Writing sec_fastboot... OK 24.193s
Waiting for fastboot... OK
Product Model : FIG-LA1
Erasing FRP... OK
 

GsmToto

Super Moderator
Jan 1, 2021
5,040
21,686
UK
Skype
gsmtoto
Sonork ID
100.1684601
FMI OFF [READ BACKUP] Decrypting backup... OK
Found token data [0] : XXXXXXXXXXX gmail.com
Checking server status... FAIL
FMI Off with token [XXXXXXXXXXX gmail.com]... OK

Model: iPhone XR
Device Name: iPhone
Lost Mode: No
Status: OFFLINE
Status Code: 200
FMI Off: Success
========================
Model: iPhone XR
Device Name: iPhone
Lost Mode: No
Status: OFFLINE
Status Code: 200
FMI Off: Success
========================
Model: iPad Air 2
Device Name: iPad
Lost Mode: No
Status: OFFLINE
Status Code: 200
FMI Off: Success
========================
Tips : Now check your device FMI state before perform a restoration!

UNLOCKTOOL 2024.05.29.0
Elapsed time : 57 seconds
 

GsmToto

Super Moderator
Jan 1, 2021
5,040
21,686
UK
Skype
gsmtoto
Sonork ID
100.1684601
Selected Platform : Tiger T310_64_Bypass
Connect Testpoint or hold VOL DOWN! Instruction here!

Waiting for device... COM2 (SPRD U2S Diag)
USB : USB\VID_1782&PID_4D00\7&E7C15FD&0&3
Initializing loader... OK
Protocol : SPRD3
Sending payload... OK
Sending auth data... OK
Sending preloader1... OK
Sending preloader2... OK
Booting loader, please wait...
OK
Boot ver: Spreadtrum Boot Block version 1.1
Sending FDL1... OK
Sending FDL2... OK
Reading Serial Number... N.A
Reading partitions info... OK [70] [1024]
Dual boot-slot : B
Reading device info... SKIP [EROFS]
Reading trust security... OK
Checking trust security... FAIL
No support method!
Device brand is not support!
UNLOCKTOOL
2024.05.29.0
Elapsed time : 29 second
 
Jan 2, 2018
5
3
mansehra
Skype
naseer_mansehra
Sonork ID
100.1603246
:Y:
Code Name : CPH1701
Operation : Factory Reset [1]
Authenticating... OK
Retrieving data... OK [234.6 KiB]
Initializing data... OK
Waiting for HS-USB QDLoader 9008... COM28
Connecting to device... OK
Handshaking... OK
Reading bootloader info... OK
Serial : 1057382389 SoC : [Snapdragon 430] [MSM8937] [0x0006B0E1]
OEM : Qualcomm [0x0000] Model : Unknown [0x0000]
PK_HASH[0] : 77A22B92A1BCD0C4D3AAA10AA9F1B2C3
PK_HASH[1] : 6D51C0CA7429B5201D0FD1D5F5B53BBC
Writing flash programmer... OK
Connecting to flash programmer... OK
Configuring device... OK
Firehose config : eMMC [Sector:512] [Target:4096] [Host:1048576]
Reading partition map... OK - LU Count : 1
Reading software info... FAIL
Erasing FRP... OK
Total sector : 64
Erasing USERDATA... OK
Rebooting... OK
UNLOCKTOOL 2024.05.29.0
Elapsed time : 38 seconds
 

GsmToto

Super Moderator
Jan 1, 2021
5,040
21,686
UK
Skype
gsmtoto
Sonork ID
100.1684601
Initializing usb... OK
Waiting for device... COM2 [BOOTROM:0E8D:0003]
Bypassing authentication... OK
Analyzing... preloader_k62v1_64_mexico.bin [MT6765:30:4912] [Internal]
Vendor : HUAWEI
Handshaking... OK
Reading hardware info... OK
Hardware : MT6765 [Helio G25|G35|P35] 0766 8A00 CA00 0000
Security Config : SCB SLA DAA
MEID : E3780B29C9C81B2EBDF4DBB142A50AF9
Sending Download-Agent [1]... OK
Syncing with device... OK
Booting device... OK
Syncing with DA... OK
Storage : EMMC - CID : 47000115.40.D5110142.65870FD4D42365
Vendor : Samsung - Name : GP6BMB - Serial : 265606417 - Rev : 1
Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 16 MiB - User Area : 58,24 GiB
Reading partition info... OK [47]
Reading device info... OK [system]
Model Name : JAT-L29
 

GsmToto

Super Moderator
Jan 1, 2021
5,040
21,686
UK
Skype
gsmtoto
Sonork ID
100.1684601
FMI OFF [READ BACKUP] Decrypting backup... OK
Found token data [0] : gsavt***@hotmail.com
Found token data [1] : gsavt***@hotmail.com
Checking server status... OK
FMI Off with token [gsavt***@hotmail.com]... OK

Model: iPhone X
Device Name: iPhone
Lost Mode: No
Status: OFFLINE
Status Code: 200
FMI Off: Success
========================
Tips : Now check your device FMI state before perform a restoration!
FMI Off with token [gsavt***@hotmail.com]... FAIL
Failed to init FMI Client! Status Code:401

UNLOCKTOOL 2024.06.07.0
Elapsed time : 1 minute 58 seconds
 

GsmToto

Super Moderator
Jan 1, 2021
5,040
21,686
UK
Skype
gsmtoto
Sonork ID
100.1684601
Selected Platform : SC7731E_Bypass
Connect Testpoint or hold VOL DOWN! Instruction here!
Waiting for device... COM3 (SPRD U2S Diag)
USB : USB\VID_1782&PID_4D00\5&1AA452E9&0&2
Initializing loader... OK
Protocol : SPRD3
Sending payload... OK
Sending auth data... OK
Sending preloader1... OK
Sending preloader2... OK
Booting loader, please wait... OK
Boot ver: Spreadtrum Boot Block version 1.1
Sending FDL1... OK
Sending FDL2... OK
Reading Serial Number... N.A
Reading partitions info... OK [60] [1024]
Dual boot-slot : A
Reading device info... SKIP [EROFS]
Erasing FRP (persist)... OK
Erasing USERDATA... OK

UNLOCKTOOL 2024.06.07.0
 

GsmToto

Super Moderator
Jan 1, 2021
5,040
21,686
UK
Skype
gsmtoto
Sonork ID
100.1684601
[BROM] RESET | DISABLE MI CLOUD | OTA Initializing usb... OK
Waiting for device... COM2 [BOOTROM:0E8D:0003]
Bypassing authentication... OK
Analyzing... preloader_merlin.bin [MT6769:10:1712] [Internal]
Vendor : XIAOMI
Handshaking... OK
Reading hardware info... OK
* Hardware : MT6768 [Helio G70|G80|G85|P65] 0707 8A00 CA00 0000
* Security Config : SCB SLA DAA
* MEID : AA329E915E74DB626AE55A1156D051EB
Sending Download-Agent... OK
Syncing with target... OK
Booting device... OK
Syncing with DA... OK
**Storage : EMMC - CID : 684A0190.50614544.57100333.33A7088V
**Vendor : SK Hynix - Name : hDEaP3 - Serial : 143283984 - Rev : 3
**Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 16 MiB - User Area : 116,48 GiB
Reading partition info... OK [48]
Reading device info... OK
** Model Name : merlin
** Manufacturer : Xiaomi
** Platform : merlin
** Android Version : 12
** Security Patch : 2022-09-01
** Build ID : SP1A.210812.016
** Build : V13.0.2.0.SJOMIXM
** Build Date : Thu Oct 13 20:08:27 CST 2022
** Device : Redmi Note 9/Redmi 10X 4G
** MIUI Version : V130
** MIUI Build : V13.0.2.0.SJOMIXM
** MIUI Region : merlin_global
** MIUI Locale : en-GB
Checking lockstate... LOCKED
Reading unlock data... OK
Unlocking bootloader... OK
Disabling MiCloud... OK
Resetting MiCloud... OK
Erasing FRP... OK
Please do not relock bootloader after this operation!
UNLOCKTOOL 2024.06.07.0
Elapsed time : 37 seconds
 

GsmToto

Super Moderator
Jan 1, 2021
5,040
21,686
UK
Skype
gsmtoto
Sonork ID
100.1684601
EDL] ERASE FRP Selected Model : Samsung Galaxy A20s (BIT 4)
Code Name : SM-A207M (BIT4)
Operation : Erase FRP [1]
**Authenticating... OK
**Retrieving data... OK [233.59 KiB]
Initializing data... OK
Waiting for HS-USB QDLoader 9008... COM2
Connecting to device... OK
Writing flash programmer... OK
Connecting to flash programmer... OK
Configuring device... OK
**Firehose config : eMMC [Sector:512] [Target:4096] [Host:1048576]
Reading partition map... OK - LU Count : 1
Reading software info... OK [system]
** Model Name : SM-A207M
** Product Name : a20sub
** Manufacturer : samsung
** Platform : msm8953
** Android Version : 11
** Security Patch : 2022-12-01
** Build ID : RP1A.200720.012.A207MUBS3CWC1
** Build : A207MUBS3CWC1
** Build Date : Thu Mar 23 13:26:55 KST 2023
** Code Name : SM-A207M
** PDA : A207MUBS3JVU6
Erasing FRP... OK
Rebooting... OK
UNLOCKTOOL 2024.06.07.0
Elapsed time : 17 seconds
 

GsmToto

Super Moderator
Jan 1, 2021
5,040
21,686
UK
Skype
gsmtoto
Sonork ID
100.1684601
Reading info mode MTP ... OK
Model : SM-A025G
CSC : EUY
AP version : A025GXX4DRHU64
BL version : A025GXX4DRHU64
CP version : A025GXX4DRHU64
CSC version : A025GOX4DRHU64
IMEI : 3541XXXXXXXXX
SN : R9PXXXXXXXXX
Unique number : H1547583002344DG56HY6
Android version : 12
FRP status : TRIGGERED


----------------------------------------------------
-----------------------------------------------------

[ODIN] READ INFO Scanning for device... COM2
Connecting to port... OK
Reading Info... OK
Model : SM-A025G
Unique No : H15475830077A37564GE
Storage Capacity : 32G
Manufacturer : SAMSUNG
Firmware Version : 3
eMCP : GX6BMB
CSC : VZW
AP : A025GXX4DRHU64
Device ID : 00005fa89eFr5
UNLOCKTOOL 2024.06.07.0
Elapsed time : 5 seconds
-------------------------------------
-------------------------------------
[EDL] ERASE FRP Selected Model : Samsung Galaxy A02s (BIT 7)
Code Name : SM-A025G | SM-A025G/DS(BIT7)
Operation : Erase FRP [1]
**Authenticating... OK
**Retrieving data... OK [234,69 KiB]
Initializing data... OK
Waiting for HS-USB QDLoader 9008... COM2
Connecting to device... OK
Writing flash programmer... OK
Connecting to flash programmer... OK
Configuring device... OK
**Firehose config : eMMC [Sector:512] [Target:4096] [Host:1048576]
Reading partition map... OK - LU Count : 1
Reading software info... OK [super]
** Model Name : SM-A025G
** Product Name : a02qnaxx
** Manufacturer : samsung
** Platform : QC_Reference_Phone
** Android Version : 12
** Security Patch : 2024-03-01
** Build ID : SP1A.210812.016.A025GXX4DRHU64
** Build : A025GXX4DRHU64
** Build Date : Tue Mar 12 11:22:39 +07 2024
** Code Name : SM-A025G
** PDA : A025GXX4DRHU64
Erasing FRP... OK
Rebooting... OK
UNLOCKTOOL 2024.06.07.0
Elapsed time : 18 seconds
 

GsmToto

Super Moderator
Jan 1, 2021
5,040
21,686
UK
Skype
gsmtoto
Sonork ID
100.1684601
[EDL] FACTORY RESET Selected Model : Oppo R11S/R11ST (Global)
Code Name : CPH1719
Operation : Factory Reset [1]
**Authenticating... OK
**Retrieving data... OK [246,32 KiB]
Initializing data... OK
Waiting for HS-USB QDLoader 9008... COM3
Connecting to device... OK
Handshaking... OK
Reading bootloader info... OK
**Serial : 484849107 SoC : [Snapdragon 660] [SDM660] [0x0008C0E1]
**OEM : Oppo/Realme/Oneplus [0x0051] Model : Unknown [0x0000]
**PK_HASH[0] : 0CF6C9FF1F442F67F9BC35CE73E7368A
**PK_HASH[1] : 372162C6EE2E43C5177553B8561716C0
Writing flash programmer... OK
Validating programmer... OK
Connecting to flash programmer... OK
Configuring device... OK
**Firehose config : eMMC [Sector:512] [Target:4096] [Host:1048576]
Erasing USERDATA... OK
Please reboot phone normaly then select RESET PHONEUNLOCKTOOL 2024.06.07.0
Elapsed time : 42 seconds
 

GsmToto

Super Moderator
Jan 1, 2021
5,040
21,686
UK
Skype
gsmtoto
Sonork ID
100.1684601
[EDL] FACTORY RESET Selected Model : Oppo R11S/R11ST (Global)
Code Name : CPH1719
Operation : Factory Reset [1]
**Authenticating... OK
**Retrieving data... OK [246,32 KiB]
Initializing data... OK
Waiting for HS-USB QDLoader 9008... COM3
Connecting to device... OK
Handshaking... OK
Reading bootloader info... OK
**Serial : 484849107 SoC : [Snapdragon 660] [SDM660] [0x0008C0E1]
**OEM : Oppo/Realme/Oneplus [0x0051] Model : Unknown [0x0000]
**PK_HASH[0] : 0CF6C9FF1F442F67F9BC35CE73E7368A
**PK_HASH[1] : 372162C6EE2E43C5177553B8561716C0
Writing flash programmer... OK
Validating programmer... OK
Connecting to flash programmer... OK
Configuring device... OK
**Firehose config : eMMC [Sector:512] [Target:4096] [Host:1048576]
Erasing USERDATA... OK
Please reboot phone normaly then select RESET PHONEUNLOCKTOOL 2024.06.07.0
Elapsed time : 42 seconds
 

GsmToto

Super Moderator
Jan 1, 2021
5,040
21,686
UK
Skype
gsmtoto
Sonork ID
100.1684601
[EDL] FACTORY RESET Selected Model : Oppo R11S/R11ST (Global)
Code Name : CPH1719
Operation : Factory Reset [1]
**Authenticating... OK
**Retrieving data... OK [246,32 KiB]
Initializing data... OK
Waiting for HS-USB QDLoader 9008... COM3
Connecting to device... OK
Handshaking... OK
Reading bootloader info... OK
**Serial : 484849107 SoC : [Snapdragon 660] [SDM660] [0x0008C0E1]
**OEM : Oppo/Realme/Oneplus [0x0051] Model : Unknown [0x0000]
**PK_HASH[0] : 0CF6C9FF1F442F67F9BC35CE73E7368A
**PK_HASH[1] : 372162C6EE2E43C5177553B8561716C0
Writing flash programmer... OK
Validating programmer... OK
Connecting to flash programmer... OK
Configuring device... OK
**Firehose config : eMMC [Sector:512] [Target:4096] [Host:1048576]
Erasing USERDATA... OK
Please reboot phone normaly then select RESET PHONEUNLOCKTOOL 2024.06.07.0
Elapsed time : 42 seconds
 

GsmToto

Super Moderator
Jan 1, 2021
5,040
21,686
UK
Skype
gsmtoto
Sonork ID
100.1684601
BOOT DEVICE Selected Platform : Tiger T606_64_Bypass
Connect Testpoint or hold VOL DOWN! Instruction here!
Waiting for device... COM2 (SPRD U2S Diag)
USB : USB\VID_1782&PID_4D00\6&6F1B3AB&0&5
Initializing loader... OK
Protocol : SPRD3
Sending payload... OK
Sending auth data... OK
Sending preloader1... OK
Sending preloader2... OK
Booting loader, please wait... OK
Boot ver: Spreadtrum Boot Block version 1.1
Sending FDL1... OK
Sending FDL2... OK
Reading Serial Number... 6063042A3B3056321
Reading partitions info... OK [73] [1024]
Dual boot-slot : A
Reading device info... SKIP [EROFS]
UNLOCKTOOL 2024.06.18.0
Elapsed time : 28 seconds
---------------------------
---------------------------
READBACK Reading [1/73] splloader [4 MiB]... OK
Reading [2/73] prodnv [64 MiB]... OK
Reading [3/73] miscdata [1 MiB]... OK
Reading [4/73] misc [1 MiB]... OK
Reading [5/73] trustos_a [6 MiB]... OK
Reading [6/73] trustos_b [6 MiB]... OK
Reading [7/73] sml_a [1 MiB]... OK
Reading [8/73] sml_b [1 MiB]... OK
Reading [9/73] uboot_a [3 MiB]... OK
Reading [10/73] uboot_b [3 MiB]... OK
Reading [11/73] uboot_log [16 MiB]... OK
Reading [12/73] logo_a [20 MiB]... OK
Reading [13/73] logo_b [20 MiB]... OK
Reading [14/73] fbootlogo [8 MiB]... OK
Reading [15/73] l_fixnv1_a [2 MiB]... OK
Reading [16/73] l_fixnv2_a [2 MiB]... OK
Reading [17/73] l_fixnv1_b [2 MiB]... OK
Reading [18/73] l_fixnv2_b [2 MiB]... OK
Reading [19/73] l_runtimenv1 [2 MiB]... OK
Reading [20/73] l_runtimenv2 [2 MiB]... OK
Reading [21/73] persist [2 MiB]... OK
Reading [22/73] ztecfg [8 MiB]... OK
Reading [23/73] ztepersist [32 MiB]... OK
Reading [24/73] l_modem_a [25 MiB]... OK
Reading [25/73] l_modem_b [25 MiB]... OK
Reading [26/73] l_deltanv_a [1 MiB]... OK
Reading [27/73] l_deltanv_b [1 MiB]... OK
Reading [28/73] l_gdsp_a [10 MiB]... OK
Reading [29/73] l_gdsp_b [10 MiB]... OK
Reading [30/73] l_ldsp_a [20 MiB]... OK
Reading [31/73] l_ldsp_b [20 MiB]... OK
Reading [32/73] l_agdsp_a [6 MiB]... OK
Reading [33/73] l_agdsp_b [6 MiB]... OK
Reading [34/73] pm_sys_a [1 MiB]... OK
Reading [35/73] pm_sys_b [1 MiB]... OK
Reading [36/73] teecfg_a [1 MiB]... OK
Reading [37/73] teecfg_b [1 MiB]... OK
Reading [38/73] hypervsior_a [10 MiB]... OK
Reading [39/73] hypervsior_b [10 MiB]... OK
Reading [40/73] boot_a [64 MiB]... OK
Reading [41/73] boot_b [64 MiB]... OK
Reading [42/73] vendor_boot_a [100 MiB]... OK
Reading [43/73] vendor_boot_b [100 MiB]... OK
Reading [44/73] init_boot_a [8 MiB]... OK
Reading [45/73] init_boot_b [8 MiB]... OK
Reading [46/73] dtb_a [8 MiB]... OK
Reading [47/73] dtb_b [8 MiB]... OK
Reading [48/73] dtbo_a [8 MiB]... OK
Reading [49/73] dtbo_b [8 MiB]... OK
Reading [50/73] super [5,76 GiB]... OK
Reading [51/73] cache [64 MiB]... OK
Reading [52/73] blackbox [500 MiB]... OK
Reading [53/73] vbmeta_a [1 MiB]... OK
Reading [54/73] vbmeta_b [1 MiB]... OK
Reading [55/73] metadata [64 MiB]... OK
Reading [56/73] sysdumpdb [10 MiB]... OK
Reading [57/73] vbmeta_system_a [1 MiB]... OK
Reading [58/73] vbmeta_system_b [1 MiB]... OK
Reading [59/73] vbmeta_vendor_a [1 MiB]... OK
Reading [60/73] vbmeta_vendor_b [1 MiB]... OK
Reading [61/73] vbmeta_system_ext_a [1 MiB]... OK
Reading [62/73] vbmeta_system_ext_b [1 MiB]... OK
Reading [63/73] vbmeta_product_a [1 MiB]... OK
Reading [64/73] vbmeta_product_b [1 MiB]... OK
Reading [65/73] vbmeta_odm_a [1 MiB]... OK
Reading [66/73] vbmeta_odm_b [1 MiB]... OK
Reading [67/73] avbmeta_rs_a [1 MiB]... OK
Reading [68/73] avbmeta_rs_b [1 MiB]... OK
Reading [69/73] common_rs1_a [8 MiB]... OK
Reading [70/73] common_rs1_b [8 MiB]... OK
Reading [71/73] common_rs2_a [16 MiB]... OK
Reading [72/73] common_rs2_b [16 MiB]... OK
Reading [73/73] userdata [108,09 GiB]... OK
Total files : 73
Total size : 7,16 GiB
UNLOCKTOOL 2024.06.18.0
Elapsed time : 41 minutes 39 seconds
 

GsmToto

Super Moderator
Jan 1, 2021
5,040
21,686
UK
Skype
gsmtoto
Sonork ID
100.1684601
[PRELOADER] FACTORY RESET + FRP Selected auth : VIVO [2]
Phone must have battery inside!
Waiting for device... COM3 [PRELOADER:0E8D:2000]
Handshaking... OK
Reading hardware info... OK
* Hardware : MT6765 [Helio G25|G35|P35] 0766 8A00 CA00 0000
* Security Config : SCB DAA
* MEID : CAC356FE8F3A390567F7E0EB0266E5BD
Sending Download-Agent... OK
Syncing with target... OK
Booting device (preloader auth)... OK
Bypassing auth... OK
Syncing with DA... OK
**Storage : EMMC - CID : 684A0190.50613943.98000133.F767F870
**Vendor : SK Hynix - Name : hC9aP3 - Serial : 4168128512 - Rev : 1
**Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 16 MiB - User Area : 58.24 GiB
Reading partition info... OK [42]
Reading device info... OK [system vendor]
** Model Name : vivo 1901
** Product Name : 1901
** Manufacturer : vivo
** Platform : k62v1_64_bsp
** Android Version : 11
** Security Patch : 2022-05-01
** Build ID : RP1A.200720.012 release-keys
** Build : eng.compil.20220822.174609
** Build Date : Mon Aug 22 17:41:18 CST 2022
** Vivo Model : PD1901BF_EXMA
** OS Name : Funtouch
** OS Version : 9.0
** OS Build : Funtouch OS_9
Erasing FRP... OK
Erasing USERDATA (flash file)... OK
UNLOCKTOOL 2024.06.18.0
Elapsed time : 29 seconds
 

GsmToto

Super Moderator
Jan 1, 2021
5,040
21,686
UK
Skype
gsmtoto
Sonork ID
100.1684601
[EDL] FACTORY RESET

Selected Model : Oppo A3s
Code Name : CPH1803 | CPH1805
Operation : Factory Reset [1]
Authenticating... OK
Retrieving data... OK [232.69 KiB]
Initializing data... OK
Tips : Please boot to edl on recovery mode, press the text "Ver 1.2" many times then select OK phone will go to download mode !
Waiting for HS-USB QDLoader 9008... COM2
Connecting to device... OK
Handshaking... FAIL
[Sahara] Reading Hello - Failed to handshake with device PBL!
Trying to connect to FIREHOSE Mode!

Connecting to flash programmer... OK
Configuring device... OK
Firehose config : eMMC [Sector:512] [Target:4096] [Host:1048576]
Reading partition map... OK - LU Count : 1
Reading software info... OK [system]
Model Name : CPH1829
Manufacturer : OPPO
Platform : msm8953
Android Version : 8.1.0
Security Patch : 2020-12-05
Build ID : CPH1829EX_11_A.81
Build Date : Sun Dec 27 21:27:30 CST 2020
OTA Version : CPH1829EX_11.A.39_0390_202012273398
Erasing FRP... OK
Total sector : 64
Erasing USERDATA... OK
Rebooting... OK
 

GsmToto

Super Moderator
Jan 1, 2021
5,040
21,686
UK
Skype
gsmtoto
Sonork ID
100.1684601
[EDL] ERASE FRP Selected Model : LG Winglm
Code Name : F100N
Operation : Erase FRP [1]
Authenticating... OK
Retrieving data... OK [278.45 KiB]
Initializing data... OK
Waiting for HS-USB QDLoader 9008... COM3
Connecting to device... OK
Writing flash programmer... OK
Connecting to flash programmer... OK
Configuring device... OK
Firehose config : UFS [Sector:4096] [Target:0] [Host:1048576]
Reading partition map... OK - LU Count : 7
Reading software info... FAIL
[EXT4] Invalid header magic!
Erasing FRP... OK
Rebooting... OK

UNLOCKTOOL 2024.06.18.0
 

GsmToto

Super Moderator
Jan 1, 2021
5,040
21,686
UK
Skype
gsmtoto
Sonork ID
100.1684601
[BROM] FACTORY RESET + FRP Initializing usb... OK
Waiting for device... COM3 [BOOTROM:0E8D:0003]
Bypassing authentication... OK
Analyzing... preloader_oppo6769.bin [MT6769:17:2832] [Internal]
Vendor : OPPO/REALME
Handshaking... OK
Reading hardware info... OK
* Hardware : MT6768 [Helio G70|G80|G85|P65] 0707 8A00 CA00 0000
* Security Config : SCB SLA DAA
* MEID : 1ACE484101BD858A36FAD69F79DF969D
Sending Download-Agent [1]... OK
Syncing with device... OK
Booting device... OK
Syncing with DA... OK
**Storage : EMMC - CID : 684A0190.50613943.35000133.69576301
**Vendor : SK Hynix - Name : hC9aP3 - Serial : 1661023488 - Rev : 1
**Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 16 MiB - User Area : 58.24 GiB
Reading partition info... OK [47]
Erasing FRP... OK
Erasing USERDATA (flash file)... OK
UNLOCKTOOL 2024.06.18.0
Elapsed time : 1 minute 27 seconds
 

GsmToto

Super Moderator
Jan 1, 2021
5,040
21,686
UK
Skype
gsmtoto
Sonork ID
100.1684601
RASE FRP Initializing usb... OK
Waiting for device... COM2 [BOOTROM:0E8D:0003]
Bypassing authentication... OK
Analyzing... preloader_k62v1_64_bsp.bin [MT6765:11:1872] [Cust]
Handshaking... OK
Reading hardware info... OK
* Hardware : MT6765 [Helio G25|G35|P35] 0766 8A00 CA00 0000
* Security Config : SCB SLA DAA
* MEID : 8090375AAB3E39BEE4F41A046SB6G
Sending Download-Agent [1]... OK
Syncing with device... OK
Booting device... OK
Syncing with DA... OK
**Storage : EMMC - CID : 44000115.239A0942.4D383658
**Vendor : Samsung - Name : DX68MB - Serial : 1154622362 - Rev : 9
**Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 4 MiB - User Area : 29.12 GiB
Reading partition info... OK [44]
Reading device info... OK [super]
** Model Name : 5102L
** Manufacturer : TCL
** Platform : bangkok_USCC
** Android Version : 11
** Security Patch : 2023-10-05
** Build ID : RP1A.200720.011 release-keys
** Build : vFQ6T
** Build Date : Tue Oct 10 22:19:36 CST 2023
Checking Find Device Status... SKIP (not found)
Erasing FRP... OK
UNLOCKTOOL 2024.07.02.1
Elapsed time : 57 seconds
 
Top