★★★ Successfully Unlocked / Repaired / Flashed Phones by UnlockTool PLEASE POST HERE ★★★

GsmToto

Super Moderator
Jan 1, 2021
3,710
18,931
UK
Skype
gsmtoto
Sonork ID
100.1684601
ERASE FRP Selected auth : VIVO [3]
Phone must have battery inside!
Waiting for device... COM7 [PRELOADER:0E8D:2000]
Handshaking... OK
Reading hardware info... OK
* Hardware : MT6768 [Helio G70|G80|G85|P65] 0707 8A00 CA00 0000
* Security Config : SCB DAA
* MEID : 3537C5BE37876A680605AE47BFD7BCF7
Sending Download-Agent... OK
Syncing with target... OK
Booting device (preloader auth)... OK
Bypassing auth... OK
Syncing with DA... OK
**Storage : EMMC - CID : 474E0113.52394A31.290E1038.1918C802
**Vendor : Micron - Name : G1J9R8 - Serial : 3355584782 - Rev : 16
**Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 16 MiB - User Area : 58.24 GiB
Reading partition info... OK [48]
Reading device info... OK [super]
** Model Name : V2037
** Product Name : 2037i
** Manufacturer : vivo
** Platform : k69v1_64
** Android Version : 13
** Security Patch : 2023-11-01
** Build ID : TP1A.220624.014 release-keys
** Build : compiler11081141
** Build Date : Wed Nov 8 11:58:22 CST 2023
** Vivo Model : PD2066F_EXMA
** Vivo Version : PD2066F_EX_A_8.70.29
** OS Name : vos
** OS Version : 4.0
** OS Build : Funtouch OS 13 Global
Erasing FRP... OK
UNLOCKTOOL 2024.01.09.0
Elapsed time : 1 minute
 

GsmToto

Super Moderator
Jan 1, 2021
3,710
18,931
UK
Skype
gsmtoto
Sonork ID
100.1684601
[COM+ADB] READ INFO Scanning for device... COM5
Reading Info... OK
Model Number : SM-G781U1
Firmware ver:
**BL : G781U1UESCGWFC
**AP : G781U1UESCGWFC
**CP : G781U1UESCGWFC
**CSC : G781U1OYMCGWFC
Hidden ver:
**BL : G781U1UESCGWFC
**AP : G781U1UESCGWFC
**CP : G781U1UESCGWFC
**CSC : G781U1OYMCGWFC
Country Code : GCF
Serial Number : RFCNC03AQZL
IMEI ....
Unique Number : CE10204ACD0CD87A1E7E
LOCK : NONE
Capacity :
**Data:196609
**Cache:262145
**System:327681
UNLOCKTOOL 2024.01.27.0
Elapsed time : 7 seconds
 
  • Like
Reactions: tsui_thomas

MANISH ROY

Active Member
Sep 25, 2017
27
6
patna
Successfully Unlocked / Repaired / Flashed Phones by UnlockTool PLEASE POST HERE

unlock tool coder plzz add new moto mtk cpu frp and unlock new update
 
  • Like
Reactions: GsmToto

GsmToto

Super Moderator
Jan 1, 2021
3,710
18,931
UK
Skype
gsmtoto
Sonork ID
100.1684601
ERASE FRP Initializing usb... OK
Waiting for device... COM7 [PRELOADER:0E8D:2000]
Jumping to BROM... OK
Bypassing authentication... OK
Analyzing... preloader_o22.bin [MT6769:6:1072] [Internal]
Handshaking... OK
Reading hardware info... OK
* Hardware : MT6768 [Helio G70|G80|G85|P65] 0707 8A00 CA00 0000
* Security Config : SCB SLA DAA
* MEID : 630E9216C26F1BFF75DBC8FE321AE64C
Sending Download-Agent [1]... OK
Syncing with device... OK
Booting device... OK
Syncing with DA... OK
**Storage : EMMC - CID : 44000115.42443656.874D0042.1D3AACD2
**Vendor : Samsung - Name : DV6DBB - Serial : 2899478349 - Rev : 0
**Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 16 MiB - User Area : 116,48 GiB
Reading partition info... OK [52]
Reading device info... SKIP [EROFS]
Erasing FRP... OK
UNLOCKTOOL 2024.01.30.0
Elapsed time : 32 seconds
 

GsmToto

Super Moderator
Jan 1, 2021
3,710
18,931
UK
Skype
gsmtoto
Sonork ID
100.1684601
ERASE FRP Initializing usb... OK
Waiting for device... COM6 [PRELOADER:0E8D:2000]
Jumping to BROM... OK
Bypassing authentication... OK
Analyzing... preloader_o22.bin [MT6769:6:1072] [Internal]
Handshaking... OK
Reading hardware info... OK
* Hardware : MT6768 [Helio G70|G80|G85|P65] 0707 8A00 CA00 0000
* Security Config : SCB SLA DAA
* MEID : 630E9216C26F1BFF75DBC8FE321AE64C
Sending Download-Agent [1]... OK
Syncing with device... OK
Booting device... OK
Syncing with DA... OK
**Storage : EMMC - CID : 44000115.42443656.874D0042.1D3AACD2
**Vendor : Samsung - Name : DV6DBB - Serial : 2899478349 - Rev : 0
**Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 16 MiB - User Area : 116,48 GiB
Reading partition info... OK [52]
Reading device info... SKIP [EROFS]
Erasing FRP... OK
UNLOCKTOOL 2024.01.27.0
Elapsed time : 28 seconds
 

GsmToto

Super Moderator
Jan 1, 2021
3,710
18,931
UK
Skype
gsmtoto
Sonork ID
100.1684601
[BROM] ERASE FRP Initializing usb... OK
Waiting for device... COM7 [BOOTROM:0E8D:0003]
Bypassing authentication... OK
Analyzing... preloader_ice.bin [MT6761:8:1392] [Internal]
Handshaking... OK
Reading hardware info... OK
* Hardware : MT6761 [Helio A20|A22|A25|G25|P22] 0717 8A00 CA01 0200
* Security Config : SCB SLA DAA
* MEID : 2BAAF1CC472E58DBB892E871CFA39D1E
Sending Download-Agent [1]... OK
Syncing with device... OK
Booting device... OK
Syncing with DA... OK
**Storage : EMMC - CID : 44000145.33303456.FF8A0132.5D69255D
**Vendor : Scandisk - Name : DV4032 - Serial : 626917258 - Rev : 1
**Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 16 MiB - User Area : 29,12 GiB
Reading partition info... OK [52]
Reading device info... SKIP [EROFS]
Erasing FRP... OK
UNLOCKTOOL 2024.01.27.0
Elapsed time : 9 seconds
 

GsmToto

Super Moderator
Jan 1, 2021
3,710
18,931
UK
Skype
gsmtoto
Sonork ID
100.1684601
[PRELOADER] REMOVE DEMO Selected auth : OPPO/REALME/ONEPLUS [1]
Phone must have battery inside!
Waiting for device... COM7 [PRELOADER:0E8D:2000]
Handshaking... OK
Reading hardware info... OK
Hardware : MT6833 [Dimensity 700|810|6020|6080] 0989 8A00 CA00 0000
Security Config : SCB DAA
MEID : 51BC2F5CAF56F010773501CE6A0F54C4
Sending Download-Agent... OK
Syncing with target... OK
Booting device (preloader auth)... OK
Bypassing auth... OK
Syncing with DA... OK
Storage : UFS - FWVer : A003 - CID : HN8T062EHKX039
Vendor ID : SKHynix [0x1AD]
UFS: LU0 Size : 4 MiB - LU1 Size : 4 MiB - LU2 Size : 119.17 GiB
Reading partition info... OK [65]
Reading device info... SKIP [EROFS]
Model : CPH2617IN
Erasing FRP... OK
Erasing USERDATA (flash file)... OK

UNLOCKTOOL 2024.01.27.0
Elapsed time : 57 seconds
 

GsmToto

Super Moderator
Jan 1, 2021
3,710
18,931
UK
Skype
gsmtoto
Sonork ID
100.1684601
[EDL] ERASE FRP Selected Model : Samsung Galaxy A23
Code Name : M-A235F | SM-A235F/DS | SM-A235F/DSN
Operation : Erase FRP [1]
**Authenticating... OK
**Retrieving data... OK [264,98 KiB]
Initializing data... OK
Waiting for HS-USB QDLoader 9008... COM7
Connecting to device... OK
Writing flash programmer... OK
Connecting to flash programmer... OK
Configuring device... OK
**Firehose config : UFS [Sector:4096] [Target:0] [Host:1048576]
Reading partition map... OK - LU Count : 6
Reading software info... FAIL
[EXT4] Invalid header magic!
Erasing FRP... FAIL
Switched to SMART Mode!
Erasing FRP... OK
Rebooting... OK
UNLOCKTOOL 2024.01.27.0
Elapsed time : 55 seconds
 

GsmToto

Super Moderator
Jan 1, 2021
3,710
18,931
UK
Skype
gsmtoto
Sonork ID
100.1684601
[EDL] ERASE FRP Selected Model : Samsung Galaxy M11
Code Name : SM-M115F
Operation : Erase FRP [1]
**Authenticating... OK
**Retrieving data... OK [233.19 KiB]
Initializing data... OK
Waiting for HS-USB QDLoader 9008... COM6
Connecting to device... OK
Handshaking... OK
Reading bootloader info... OK
**Serial : 1425072915 SoC : [Snapdragon 450] [SDM450] [0x0009A0E1]
**OEM : Samsung [0x0020] Model : Unknown [0x0000]
**PK_HASH[0] : 11AC510C97C59FAD3C04611B6AFFD671
**PK_HASH[1] : A9A60A53E35BBAECAA55A985CC21F07D
Writing flash programmer... OK
Connecting to flash programmer... OK
Configuring device... OK
**Firehose config : eMMC [Sector:512] [Target:4096] [Host:1048576]
Reading partition map... OK - LU Count : 1
Reading software info... OK [super]
** Model Name : SM-M115F
** Product Name : m11qnsxx
** Manufacturer : samsung
** Platform : QC_Reference_Phone
** Android Version : 12
** Security Patch : 2023-11-01
** Build ID : SP1A.210812.016.M115FXXS5CWK3
** Build : M115FXXS5CWK3
** Build Date : Wed Nov 15 15:38:32 +07 2023
** Code Name : SM-M115F
** PDA : M115FXXS5CWK3
Erasing FRP... OK
Rebooting... OK
UNLOCKTOOL 2024.01.27.0
Elapsed time : 1 minute 22 seconds
 

GsmToto

Super Moderator
Jan 1, 2021
3,710
18,931
UK
Skype
gsmtoto
Sonork ID
100.1684601
Initializing usb... OK
Waiting for device... COM5 [BOOTROM:0E8D:0003]
Bypassing authentication... OK
Analyzing... preloader_ice.bin [MT6761:8:1392] [Internal]
Handshaking... OK
Reading hardware info... OK
Hardware : MT6761 [Helio A20|A22|A25|G25|P22] 0717 8A00 CA01 0200
Security Config : SCB SLA DAA
MEID : 3ECF52B4D5BCCB074248B664AA0DC243
Sending Download-Agent [1]... OK
Syncing with device... OK
Booting device... OK
Syncing with DA... OK
Storage : EMMC - CID : 5900019B.33305032.EEED0032.F3890520
Vendor : Samsung - Name : Y2P032 - Serial : 86044397 - Rev : 0
Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 16 MiB - User Area : 29.12 GiB
Reading partition info... OK [52]
Reading device info... SKIP [EROFS]
Erasing FRP... OK

UNLOCKTOOL 2024.01.27.0
Elapsed time : 10 seconds
 

GsmToto

Super Moderator
Jan 1, 2021
3,710
18,931
UK
Skype
gsmtoto
Sonork ID
100.1684601
Mobicel GLO FRP RESET Done

Selected Model : Unisoc SC7731E V1
Code Name : Spreadtrum SC7731E_1
Operation : Erase FRP [1]
Authenticating... OK
Retrieving data... OK [233.55 KiB]
Hold VOL DOWN then plug-in USB cable!
Waiting for device... COM5 (SPRD U2S Diag)
USB : USB\VID_1782&PID_4D00\5&744228E&0&1
Protocol : SPRD3
Sending FDL1... OK [29.34 KiB]
Boot ver: Spreadtrum Boot Block version 1.1
Sending FDL2... OK [407.34 KiB]
Reading device info... OK [system]
Model Name : GLO
Manufacturer : Mobicel
Platform : cm22_32v8_v1.1.0
Android Version : 8.1.0
Security Patch : 2020-10-05
Build ID : GLO_v9.0_user_20201116
Erasing FRP... OK

UNLOCKTOOL 2024.01.27.0
Elapsed time : 16 seconds
 

GsmToto

Super Moderator
Jan 1, 2021
3,710
18,931
UK
Skype
gsmtoto
Sonork ID
100.1684601
[COM] REMOVE FRP [2023] Method : [2]
Scanning for device... COM8
Reading Info... OK
Model Number : SM-A530F
Bootloader : A530FXXS4BSA8
Country Code : OMN
Serial Number : R58KA4JRQ4L
Unique Number : CBJ00002B4EA795
Enabling ADB... OK
Waiting for device...
Please accept USB Debugging on your phone!
Model : SM-A530F
Manufacturer : samsung
Platform : exynos5
CPU Arch : arm64-v8a
Android Serial : 5200002b4ea79595
Manufacturing Date : 20181018
Security Patch : 2019-02-01
Connection : mtp,adb
Timezone : Asia/Karachi
Knox Warranty : 0 - valid
Android Version : 8.0.0
Android SDK : 26
Build : R16NW.A530FXXS4BSA8
Build Date : Tue Jan 29 14:03:00 KST 2019
Product Code : SM-A530FZKAOMN
Samsung Serial : R58KA4JRQ4L
Device Name : jackpotlte
Product Name : jackpotltexx
Code Name : SM-A530FZKAOMN
**BL : A530FXXS4BSA8
**PDA : A530FXXS4BSA8
**CP : A530FXXU4BRL8
**CSC : A530FOVF4BRL8
Sales Code : OMN
Removing FRP... OK
UNLOCKTOOL 2024.01.27.0
Elapsed time : 43 seconds
 

GsmToto

Super Moderator
Jan 1, 2021
3,710
18,931
UK
Skype
gsmtoto
Sonork ID
100.1684601
[BROM] ERASE FRP Selected Model : Infinix Hot 20i
Code Name : X665E
Operation : Erase FRP [10]
**Authenticating... OK
**Retrieving data... OK [3,71 MiB]
Phone must have battery inside!
Waiting for device... COM10[PRELOADER:0E8D:2000]
Phone must have battery inside!
Waiting for device... COM10 [PRELOADER:0E8D:2000]
Handshaking... OK
Reading hardware info... OK
* Hardware : MT6768 [Helio G70|G80|G85|P65] 0707 8A00 CA00 0000
* Security Config : SCB DAA
* MEID : EF2498F9165178D140A1084D500A9F94
Sending Download-Agent... OK
Syncing with target... OK
Booting device... OK
Syncing with DA... OK
**Storage : EMMC - CID : 33000115.41433656.3EEA0242.DB29E86A
**Vendor : Samsung - Name : 3V6CAB - Serial : 3899277034 - Rev : 2
**Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 16 MiB - User Area : 116,48 GiB
Reading partition info... OK [51]
Erasing FRP... OK
UNLOCKTOOL 2024.01.27.0
Elapsed time : 5 seconds
 

GsmToto

Super Moderator
Jan 1, 2021
3,710
18,931
UK
Skype
gsmtoto
Sonork ID
100.1684601
Mobicel PX10 frp reset

Selected Platform : SC7731E_Bypass
Connect Testpoint or hold VOL DOWN! Instruction here!
Waiting for device... COM4 (SPRD U2S Diag)
USB : USB\VID_1782&PID_4D00\5&744228E&0&2
Initializing loader... OK
Protocol : SPRD3
Sending payload... OK
Sending auth data... OK
Sending preloader1... OK
Sending preloader2... OK
Booting loader, please wait... OK
Boot ver: Spreadtrum Boot Block version 1.1
Sending FDL1... OK
Sending FDL2... OK
Reading Serial Number... N.A
Reading partitions info... OK [71] [1024]
Dual boot-slot : A
Reading device info... OK [super]
Model Name : PX10
Manufacturer : Mobicel
Android Version : 11
Security Patch : 2022-10-05
Build ID : RP1A.201005.001
Build Date : Thu Aug 21 34:12:06 CST 2023
Erasing FRP... OK
 

GsmToto

Super Moderator
Jan 1, 2021
3,710
18,931
UK
Skype
gsmtoto
Sonork ID
100.1684601
FACTORY RESET Selected Model : Vivo Y20 | Y20i | Y20s
Code Name : PD2034F | PD2034AM | V2029
Operation : Factory Reset [5]
**Authenticating... OK
**Retrieving data... OK [270.22 KiB]
Initializing data... OK
Waiting for HS-USB QDLoader 9008... COM6
Connecting to device... OK
Handshaking... OK
Reading bootloader info... OK
**Serial : 219919815 SoC : [Snapdragon 460] [SM4250-AA] [0x001360E1]
**OEM : Vivo [0x0073] Model : Unknown [0x0000]
**PK_HASH[0] : A7DF36FFD7AB557C67A6C26675E2795C
**PK_HASH[1] : 922CF671308CFD7169BEDB84424C862B
Writing flash programmer... OK
Connecting to flash programmer... OK
Configuring device... OK
**Firehose config : UFS [Sector:4096] [Target:0] [Host:1048576]
Erasing FRP... OK
Erasing USERDATA... OK
Rebooting... OK
UNLOCKTOOL 2024.01.27.0
Elapsed time : 7 minutes 37 seconds
 

GsmToto

Super Moderator
Jan 1, 2021
3,710
18,931
UK
Skype
gsmtoto
Sonork ID
100.1684601
[BROM] ERASE FRP Initializing usb... OK
Waiting for device... COM5 [BOOTROM:0E8D:0003]
Bypassing authentication... OK
Analyzing... preloader_ice.bin [MT6761:8:1392] [Internal]
Handshaking... OK
Reading hardware info... OK
* Hardware : MT6761 [Helio A20|A22|A25|G25|P22] 0717 8A00 CA01 0200
* Security Config : SCB SLA DAA
* MEID : F3213940A40293353F65E4444E26EF
Sending Download-Agent [1]... OK
Syncing with device... OK
Booting device... OK
Syncing with DA... OK
**Storage : EMMC - CID : 5900019B.33305032.E4F50032.238971
**Vendor : Samsung - Name : Y2P032 - Serial : 1898898677 - Rev : 0
**Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 16 MiB - User Area : 29,12 GiB
Reading partition info... OK [52]
Reading device info... SKIP [EROFS]
Erasing FRP... OK
UNLOCKTOOL 2024.01.27.0
Elapsed time : 48 seconds
 

GsmToto

Super Moderator
Jan 1, 2021
3,710
18,931
UK
Skype
gsmtoto
Sonork ID
100.1684601
FLASH Selected Model : Xiaomi Redmi 9A / 9T / 9i
Code Name : Dandelion
Operation : Auth Flash
**Authenticating... OK
**Retrieving data... OK [484,18 KiB]
Initializing data... OK
Waiting for device... COM3
Bypassing authentication... OK
Connecting to BROM... OK
Sending DA... OK [229,48 KiB]
Syncing with DA... OK
**HW Chip : MT6765 [6765] - HW Ver : 0xCA00 - SW Ver : 0x0000
**Bootloader Ver : 0x00 - Secure Ver : 0x00
**Internal RAM Size : 232 KiB
**External RAM Size : 4 GiB
**Storage : EMMC - CID : 44000145.36303441.38850134.A9381C9B
**Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 16 MiB - User Area : 58,24 GiB
Downloading bootloader... OK [229,47 KiB]
Downloading bootloader... OK [229,47 KiB]
Writing recovery... OK [64 MiB] 1,785s
Writing vbmeta_system... OK [4 KiB] 0,003s
Writing vbmeta_vendor... OK [4 KiB] 0,003s
Writing md1img... OK [57,98 MiB] 1,595s
Writing spmfw... OK [62,58 KiB] 0,004s
Writing scp1... OK [597,64 KiB] 0,018s
Writing scp2... OK [597,64 KiB] 0,018s
Writing sspm_1... OK [425,03 KiB] 0,013s
Writing sspm_2... OK [425,03 KiB] 0,013s
Writing lk... OK [947,38 KiB] 0,027s
Writing lk2... OK [947,38 KiB] 0,027s
Writing boot... OK [64 MiB] 1,771s
Writing logo... OK [2,76 MiB] 0,076s
Writing dtbo... OK [145,22 KiB] 0,006s
Writing tee1... OK [2,13 MiB] 0,060s
Writing tee2... OK [2,13 MiB] 0,060s
Writing super... OK [3,27 GiB] 97,880s
Writing vbmeta... OK [4 KiB] 0,003s
Writing cache... OK [68,17 KiB] 0,006s
Writing userdata... OK [1,71 GiB] 49,707s
Rebooting device... OK
UNLOCKTOOL 2024.01.27.0
Elapsed time : 2 minutes 37 seconds
 

GsmToto

Super Moderator
Jan 1, 2021
3,710
18,931
UK
Skype
gsmtoto
Sonork ID
100.1684601
[PRELOADER] ERASE FRP Selected auth : OPPO/REALME/ONEPLUS [1]
Phone must have battery inside!
Waiting for device... COM82 [PRELOADER:0E8D:2000]
Handshaking... OK
Reading hardware info... OK
Hardware : MT6765 [Helio G25|G35|P35] 0766 8A00 CA00 0000
Security Config : SCB DAA
MEID : BB4A9D3A5D4DFEF3B8A7E0F2821E0E05
Sending Download-Agent... OK
Syncing with target... OK
Booting device (preloader auth)... OK
Bypassing auth... OK
Syncing with DA... OK
Storage : EMMC - CID : 474E0113.52394A31.FC121038.D3584F
Vendor : Micron - Name : G1J9R8 - Serial : 1338833938 - Rev : 16
Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 16 MiB - User Area : 58.24 GiB
Reading partition info... OK [48]
Reading device info... OK [super]
Model Name : oppo6765
Product Name : vnd_oppo6765
Manufacturer : alps
Platform : oppo6765
Android Version : 11
Security Patch : 2022-06-05
Build ID : RP1A.200720.011 release-keys
Build : 1654152843290
Build Date : Thu Jun 2 15:13:09 CST 2022
Erasing FRP... OK

UNLOCKTOOL 2024.01.27.0
Elapsed time : 19 seconds
 
Top