Что нового
  • Скачивание файлов платно! Купить Доступ
  • язык форума русский и никакой другой! чем писать посты на английском, лучше вовсе не писать! для тех кто против, есть кнопка "Выйти"

UnlockTool успешное применение

region_04_russia

Великомученик
.
.
[COM] REMOVE FRP [2022] Scanning for device... COM69
Connecting to port... OK
Reading Info... OK
Model Number : SM-A013F
Country Code : SER
Serial Number : R58N74HNY7F
Unique Number : CFE00F652902247
Enabling ADB... OK
Model : SM-A013F
Manufacturer : samsung
Platform : mt6739
CPU Arch : armeabi-v7a
Android Serial : R58N74HNY7F
Manufacturing Date : 20200725
Security Patch : 2020-07-01
Connection : sec_charging,adb
Timezone : GMT
Android Version : 10
Android SDK : 29
Build : QP1A.190711.020.A013FPUU1ATI2
Build Date : Fri Sep 11 17:05:18 KST 2020
Product Code : SM-A013FZBDSER
Samsung Serial : R58N74HNY7F
Device Name : a01core
Product Name : a01coreser
Code Name : SM-A013FZBDSER
BL : A013FPUU1ATI2
PDA : A013FPUU1ATI2
CP : A013FXXU1ATG4,A013FXXU1ATG4
CSC : A013FSER1ATI2
Sales Code : SER
Removing FRP... OK
UNLOCKTOOL 2022.05.11.0
Elapsed time : 52 seconds

 
Последнее редактирование модератором:

machito

android unlock
.
.
[COM] REMOVE FRP [2022] Scanning for device... COM24
Connecting to port... OK
Reading Info... OK
Model Number : SM-A505FN
Country Code : SER
Serial Number : R58M66LVHJZ
Unique Number : CE051935A5570A18047E
Enabling ADB... OK
Please accept USB Debugging on your phone!
Model : SM-A505FN
Manufacturer : samsung
Platform : universal9610
CPU Arch : arm64-v8a
Android Serial : R58M66LVHJZ
Manufacturing Date : 20190624
Security Patch : 2021-12-01
Connection : mtp,adb
Timezone : GMT
Android Version : 11
Android SDK : 30
Build : RP1A.200720.012.A505FNPUS9CUK3
Build Date : Mon Nov 29 12:23:17 KST 2021
Product Code : SM-A505FZBUSER
Device Name : a50
Product Name : a50xser
Code Name : SM-A505FZBUSER
BL : A505FNPUS9CUK3
PDA : A505FNPUS9CUK3
CP : A505FXXS9CUK3,A505FXXS9CUK3
CSC : A505FNOEM9CUF1
Sales Code : SER
Removing FRP... OK
UNLOCKTOOL 2022.05.19.0
Elapsed time : 1 minute 37 seconds
 

M-Lee

.
19/9/13
137
36
Россия
P Smart Z FRP через TP

[USB 1.0] ERASE FRP Scanning port... COM4
Connecting to port... OK
Connection : USB 1.0 Full-Speed
USB Driver : [HUAWEI Incorporated] HSPL_usbvcom - Version : 2.0.5.0
Selected Model : HiSilicon Kirin 710F [FRP]
Code Name : Hi710F
Operation : Erase FRP [1]
Authenticating... OK
Retrieving data... OK [110,72 KiB]
Writing unlocktool1... OK 1,605s
Writing unlocktool2... OK 0,267s
Writing unlocktool3... OK 0,530s
Reading partition map... OK [71]
Searching FRP Lock... OK [0:524288:524288]
Erasing FRP... OK
UNLOCKTOOL 2022.05.27.2
Elapsed time : 19 seconds
 

machito

android unlock
.
.
[BROM] ERASE FRP Initializing usb... OK
Waiting for device... COM7 [BOOTROM:0E8D:0003]
Bypassing authentication... OK
Analyzing preloader... preloader_k62v1_64_mexico.bin [MT6765:30:4912] [Internal]
Vendor : HUAWEI
Handshaking... OK
Reading hardware info... OK
Hardware : MT6765 [Helio G25|G35|P35] 0766 8A00 CA00 0000
Security Config : SCB SLA DAA
MEID : 22A5E039BA40D39A758E1723D10466D8
Sending Download-Agent... OK
Syncing with target... OK
Booting device... OK
Syncing with DA... OK
Storage : EMMC - CID : 534E0113.41394A30.790B1037.2316689F
Vendor : Micron - Name : S0J9A7 - Serial : 1755281675 - Rev : 16
Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 4 MiB - User Area : 29,12 GiB
Reading partition info... OK [47]
Reading device info... FAIL
Invalid header magic!
Erasing FRP... OK
UNLOCKTOOL 2022.05.27.2
Elapsed time : 11 minutes 45 seconds
 
7/12/20
6
3
Россия
[BROM] FACTORY RESET + FRP Initializing usb... OK
Waiting for device... COM111 [BOOTROM:0E8D:0003]
Bypassing authentication... OK
Analyzing preloader... preloader_oppo6765.bin [MT6765:12:2032] [Internal]
Vendor : OPPO/REALME
Handshaking... OK
Reading hardware info... OK
Hardware : MT6765 [Helio G25|G35|P35] 0766 8A00 CA00 0000
Security Config : SCB SLA DAA
MEID : 3A772DE443460738E268EC07989737AC
Sending Download-Agent... OK
Syncing with target... OK
Booting device... OK
Syncing with DA... OK
Storage : EMMC - CID : 44000115.41443648.36870842.8D1828D4
Vendor : Samsung - Name : DH6DAB - Serial : 684996231 - Rev : 8
Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 16 MiB - User Area : 58,24 GiB
Reading partition info... OK [47]
Reading device info... OK
Model Name : oppo6765
Manufacturer : OPPO
Android Version : 10
Security Patch : 2022-04-05
Build ID : QP1A.190711.020 release-keys
Market Name : OPPO A15s
OTA Version : CPH2179PU_11.A.41_0410_202204121955
Erasing FRP... OK
Erasing USERDATA... FAIL
Failed to recv read control code!

UNLOCKTOOL 2022.05.27.2
Elapsed time : 1 minute 36 seconds
 

machito

android unlock
.
.
Снос FRP Самсунг А022 *#0*#
REMOVE FRP [2022] Scanning for device... COM24
Connecting to port... OK
Reading Info... FAIL
Enabling ADB... OK
Please accept USB Debugging on your phone!
Model : SM-A022G
Manufacturer : samsung
Platform : mt6739
CPU Arch : armeabi-v7a
Android Serial : R58R71Z1C0D
Security Patch : 2022-05-01
Connection : mtp,adb
Timezone : GMT
Android Version : 11
Android SDK : 30
Build : RP1A.200720.012.A022GDXU3BVE1
Build Date : Wed May 11 18:23:22 KST 2022
Product Code : SM-A022GZKBSER
Device Name : a02
Product Name : a02cisser
Code Name : SM-A022GZKBSER
BL : A022GDXU3BVE1
PDA : A022GDXU3BVE1
CSC : A022GOXM3BVE1
Sales Code : SER
Removing FRP... OK
UNLOCKTOOL 2022.05.27.2
Elapsed time : 1 minute 31 seconds
к моему сожалению samsung octoplus ничего не хочет делать, уже с какой моделью и в какой рас убеждаюсь. Хоть с впн хоть без него.
 
Последнее редактирование:

mdev

.
.
16/6/12
305
105
Gorno-Altaysk
Nokia 105 TA-1174 FACTORY RESET
[SPRD] FACTORY RESET Power off phone then plug in usb cable!
Waiting for device... COM20
Handshaking with device... OK
Waiting for device... COM20
Reading device info... OK
Platform Version : MOCOR_16A.MP_FIH_W19.32.2_Release
BASE Version : BASE_SVN
HW Version : SC6531EFM_BAR
Initializing... OK
Removing password... OK
UNLOCKTOOL 2022.06.11.0
Elapsed time : 3 seconds
 
Huawei P30 Pro Build Ver VOG-L29 11.0.0.173(C10E5R5P3) через тестпоинт и кабель с резистором.
[USB 1.0] ERASE FRP Scanning port... COM4
Connecting to port... OK
Connection : USB 1.0 Full-Speed
USB Driver : [HUAWEI Incorporated] HSPL_usbvcom - Version : 2.0.7.1
Selected Model : HiSilicon Kirin 980 [FRP]
Code Name : Hi980
Operation : Erase FRP [1]
Authenticating... OK
Retrieving data... OK [121,17 KiB]
Writing unlocktool1... OK 1,761s
Writing unlocktool2... FAIL 1,040s
Failed to send start frame! No response!
UNLOCKTOOL 2022.06.11.0
Elapsed time : 9 seconds
не работает программа
упс это я не работаю, все окей кабель надо использовать с тремя резисторами а не с одним!!!
 
Последнее редактирование модератором:

mdev

.
.
16/6/12
305
105
Gorno-Altaysk
Lenovo Tab 4 A8 Plus FRP
ERASE FRP Selected Model : Lenovo Tab 4 A8 Plus
Code Name : TB-8704V | TB-8704X
Operation : Erase FRP [1]
Authenticating... OK
Retrieving data... OK [216,14 KiB]
Initializing data... OK
Waiting for HS-USB QDLoader 9008... COM5
Connecting to device... OK
Handshaking... OK
Reading bootloader info... OK
Serial : 4047981894 SoC : [Snapdragon 625] [MSM8953] [0x000460E1]
OEM : Qualcomm [0x0000] Model : Unknown [0x0000]
PK_HASH[0] : DDB33F2A320B3536FFA2026554DAB19C
PK_HASH[1] : F903D207BFB0AE9EE1D39847828740C1
Writing flash programmer... OK
Connecting to flash programmer... OK
Configuring device... OK
Firehose config : eMMC [Sector:512] [Target:4096] [Host:1048576]
Reading partition map... OK - LU Count : 1
Reading software info... OK
Model Name : Lenovo TB-8704X
Product Name : TB-8704X
Manufacturer : LENOVO
Platform : msm8953
Android Version : 7.1.1
Security Patch : 2018-07-05
Build ID : TB-8704X_S000042_180906_ROW
Erasing FRP... OK
Rebooting... OK
UNLOCKTOOL 2022.06.11.0
Elapsed time : 31 seconds
 

mdev

.
.
16/6/12
305
105
Gorno-Altaysk
Поднятие кирпича ZTE Axon 7 [A2017G]
EDL FLASH Selected Model : ZTE Axon 7 [A2017G]
Code Name : A2017G
Operation : Auth Flash
Authenticating... OK
Retrieving data... OK [196,98 KiB]
Initializing data... OK
Waiting for HS-USB QDLoader 9008... COM6
Connecting to device... OK
Writing flash programmer... OK
Connecting to flash programmer... OK
Configuring device... OK
Setting boot LUN1... OK
Firehose config : UFS [Sector:4096] [Target:4096] [Host:1048576]

Processing LUN0 - rawprogram0.xml
Writing devcfg.mbn [elf:128 KiB]->devcfg... OK 0,071s
Writing fastboot.img [kernel:128 KiB]->fbop... OK 0,115s
Writing gpt_main0.bin [raw:24 KiB]->PrimaryGPT... OK 0,062s
Writing gpt_backup0.bin [raw:20 KiB]->BackupGPT... OK 0,061s
Applying patch0.xml... OK

Processing LUN1 - rawprogram1.xml
Writing xbl.elf [elf:3,96 MiB]->xbl... OK 0,224s
Writing gpt_main1.bin [raw:24 KiB]->PrimaryGPT... OK 0,112s
Writing gpt_backup1.bin [raw:20 KiB]->BackupGPT... OK 0,112s
Applying patch1.xml... OK

Processing LUN2 - rawprogram2.xml
Writing xblbak.elf [elf:3,96 MiB]->xblbak... OK 0,223s
Writing gpt_main2.bin [raw:24 KiB]->PrimaryGPT... OK 0,112s
Writing gpt_backup2.bin [raw:20 KiB]->BackupGPT... OK 0,111s
Applying patch2.xml... OK

Processing LUN3 - rawprogram3.xml
Writing ddr.img [raw:1 MiB]->ddr... OK 0,138s
Writing gpt_main3.bin [raw:24 KiB]->PrimaryGPT... OK 0,061s
Writing gpt_backup3.bin [raw:20 KiB]->BackupGPT... OK 0,062s
Applying patch3.xml... OK

Processing LUN4 - rawprogram4.xml
Writing rpm.mbn [elf:512 KiB]->rpm... OK 0,126s
Writing tz.mbn [elf:2 MiB]->tz... OK 0,164s
Writing hyp.mbn [elf:512 KiB]->hyp... OK 0,128s
Writing sec.dat [raw:16 KiB]->sec... OK 0,061s
Writing pmic.elf [elf:512 KiB]->pmic... OK 0,126s
Writing NON-HLOS.bin [fat:95 MiB]->modem... OK 2,858s
Writing adspso.bin [ext4:16 MiB]->dsp... OK 0,570s
Writing mdtp.img [raw:32 MiB]->mdtp... OK 1,031s
Writing emmc_appsboot.mbn [elf:1 MiB]->aboot... OK 0,139s
Writing boot.img [kernel:64 MiB]->boot... OK 1,951s
Writing system_1.raw.img [ext4:2 GiB]->system... OK 60,257s
Writing system_2.raw.img [raw:2 GiB]->system... OK 60,522s
Writing system_3.raw.img [raw:2 GiB]->system... OK 63,429s
Writing recovery.img [kernel:64 MiB]->recovery... OK 2,027s
Writing BTFM.bin [fat:1 MiB]->bluetooth... OK 0,139s
Writing lksecapp.mbn [elf:128 KiB]->lksecapp... OK 0,115s
Writing keymaster.mbn [elf:256 KiB]->keymaster... OK 0,119s
Writing cmnlib.mbn [elf:256 KiB]->cmnlib... OK 0,119s
Writing cmnlib64.mbn [elf:256 KiB]->cmnlib64... OK 0,119s
Writing apdp.bin [raw:256 KiB]->apdp... OK 0,118s
Writing msadp.bin [raw:256 KiB]->msadp... OK 0,119s
Writing splash.img [raw:32,64 MiB]->splash... OK 1,084s
Writing echarge.img [raw:40 MiB]->echarge... OK 1,314s
Writing gpt_main4.bin [raw:24 KiB]->PrimaryGPT... OK 0,113s
Writing gpt_backup4.bin [raw:20 KiB]->BackupGPT... OK 0,112s
Applying patch4.xml... OK

Processing LUN5 - rawprogram5.xml
Writing ztecfg.bin [raw:512 KiB]->ztecfg... OK 0,126s
Writing gpt_main5.bin [raw:24 KiB]->PrimaryGPT... OK 0,113s
Writing gpt_backup5.bin [raw:20 KiB]->BackupGPT... OK 0,113s
Applying patch5.xml... OK
Rebooting... OK
Total transfer : 6,35 GiB
Transfer Speed : 32,69 MiB/s
UNLOCKTOOL 2022.06.29.0
Elapsed time : 3 minutes 54 seconds
 

mdev

.
.
16/6/12
305
105
Gorno-Altaysk
Vsmart Star FRP

[EDL] ERASE FRP Authenticating... OK
Selected Model : Vsmart Star
Code Name : V320A
Operation : Erase FRP [1]
Authenticating... OK
Retrieving data... OK [232,19 KiB]
Initializing data... OK
Waiting for HS-USB QDLoader 9008... COM5
Connecting to device... OK
Handshaking... OK
Reading bootloader info... OK
Serial : 4262118089 SoC : [Snapdragon 215] [QM215] [0x001060E1]
OEM : VSmart [0x016E] Model : Unknown [0x0000]
PK_HASH[0] : 15E7119B24228246FC6A165557A02E8E
PK_HASH[1] : B88148856FD138C83E947792D9AF2805
Writing flash programmer... OK
Connecting to flash programmer... OK
Configuring device... OK
Firehose config : eMMC [Sector:512] [Target:4096] [Host:1048576]
Reading partition map... OK - LU Count : 1
Reading software info... OK
Model Name : Star
Product Name : V320A_rus
Manufacturer : vsmart
Platform : QC_Reference_Phone
Android Version : 9
Security Patch : 2019-08-01
Build ID : PKQ1.190319.001.V320A_RUS_U_M1_20190911
Build Date : Wed Sep 11 20:09:40 +07 2019
Erasing FRP... OK
Rebooting... OK
UNLOCKTOOL 2022.07.14.0
Elapsed time : 20 seconds

TESTPOINT
 

Вложения

machito

android unlock
.
.
Xiaomi Redmi Note 7 FRP
[EDL] ERASE FRP Selected Model : Xiaomi Redmi Note 7/7S
Code Name : Lavender
Operation : Erase FRP [1]
Authenticating... OK
Retrieving data... OK [2,34 MiB]
Initializing data... OK
Waiting for HS-USB QDLoader 9008... COM25
Connecting to device... OK
Handshaking... OK
Reading bootloader info... OK
Serial : 3378028167 SoC : [Snapdragon 660] [SDM660] [0x0008C0E1]
OEM : Qualcomm [0x0000] Model : Unknown [0x0000]
PK_HASH[0] : A7B8B82545A98ECA23D6E9105FB46456
PK_HASH[1] : 8D1B5828264903441BDEF0CD57E3C370
Writing flash programmer... OK
Connecting to flash programmer... OK
Configuring device... OK
Firehose config : eMMC [Sector:512] [Target:4096] [Host:1048576]
Reading partition map... OK - LU Count : 1
Reading software info... OK
Model Name : Redmi Note 7
Product Name : lavender
Manufacturer : Xiaomi
Platform : sdm660
Android Version : 10
Security Patch : 2021-10-01
Build ID : QKQ1.190910.002 V12.5.3.0.QFGMIXM
Build : V12.5.3.0.QFGMIXM
Build Date : Fri Dec 10 13:05:00 WIB 2021
MIUI Version : V125
MIUI Build : V12.5.3.0.QFGMIXM
MIUI Region : global
MIUI Locale : en-GB
Erasing FRP... OK
Rebooting... OK
 
G570F frp

[COM] REMOVE FRP [2022] Scanning for device... COM64
Connecting to port... OK
Reading Info... OK
Model Number : SM-G570F
Country Code : SER
Serial Number : R28HA0SSNSD
Unique Number : CQ3002D00DABBA3
Method : [1]
Enabling ADB... OK
Model : SM-G570F
Manufacturer : samsung
Platform : exynos5
CPU Arch : armeabi-v7a
Android Serial : 42002d00dabba3c7
Manufacturing Date : 20161018
Security Patch : 2017-12-01
Connection : mtp,adb
Timezone : Europe/Moscow
Knox Warranty : 0 - valid
Android Version : 7.0
Android SDK : 24
Build : NRD90M.G570FXXU1BQL2
Build Date : Thu Dec 14 14:05:51 KST 2017
Product Code : SM-G570FZDDSER
Samsung Serial : R28HA0SSNSD
Device Name : on5xelte
Product Name : on5xeltejv
Code Name : SM-G570FZDDSER
BL : G570FXXU1BQL2
PDA : G570FXXU1BQL2
CP : G570FXXU1BQI9
CSC : G570FOXE1BQI9
Sales Code : SER
Removing FRP... OK
UNLOCKTOOL 2022.12.13.0
Elapsed time : 28 seconds
 
Последнее редактирование модератором:

machito

android unlock
.
.

Huawei Mate 20 Lite FRP​

[USB 1.0] ERASE FRP Selected Model : HiSilicon Kirin 710
Code Name : Hi710_Unlocked
Operation : Kirin Testpoint [2]
Authenticating... OK
Retrieving data... OK [4,69 MiB]
Scanning port... COM3
Connecting to port... OK
Connection : USB 1.0 Full-Speed
USB Driver : [Huawei Incorporated] HWHandSet - Version : 2.0.6.725
Initializing... OK
Writing patch1... OK 1,925s
Writing patch2... OK 0,229s
Writing patch3... OK 0,453s
Reading partition map... OK [71]
Searching for bootloader key... OK [0:18874368:5242880]
Patching bootloader... OK
Please disconnect device and enter testpoint again!
Scanning port... COM3
Connecting to port... OK
Connection : USB 1.0 Full-Speed
USB Driver : [Huawei Incorporated] HWHandSet - Version : 2.0.6.725
Writing sec_usb_xloader... OK 1,159s
Writing sec_usb_xloader2... OK 0,289s
Writing sec_unlock2... OK 0,009s
Writing sec_unlock3... OK 0,115s
Writing sec_fastboot... OK 32,198s
Waiting for fastboot... OK
Product Model : SNE-LX1
Erasing FRP... OK
UNLOCKTOOL 2022.12.11.0
 

machito

android unlock
.
.
Honor 10i ( HRY-LX1T ) FRP

[USB 1.0] ERASE FRP Scanning port... COM3
Connecting to port... OK
Connection : USB 1.0 Full-Speed
USB Driver : [Huawei Incorporated] HWHandSet - Version : 2.0.6.725
Selected Model : HiSilicon Kirin 710F [FRP]
Code Name : Hi710F
Operation : Erase FRP [1]
Authenticating... OK
Retrieving data... OK [110,72 KiB]
Writing unlocktool1... OK 1,573s
Writing unlocktool2... OK 0,236s
Writing unlocktool3... OK 0,465s
Reading partition map... OK [71]
Searching FRP Lock... OK [0:524288:524288]
Erasing FRP... OK
UNLOCKTOOL 2022.12.21.0
Elapsed time : 17 seconds
 
Последнее редактирование модератором:
Nova 8i Huawei ID

Key Value
Name Huawei nova 8i
Build Ver NEN-L21CQ 11.0.1.212(C10E3R2P2)
Vendor/Country hw/ru
Custom Ver NEN-L21CQ-CUST 11.0.1.3(C10)
FB LockState locked
Dongle Info RSA-2048-PSS,0x9400,0x7400,0x6001,0x5101,0x5001
Base Ver NEN-LGRP2-OVS 11.0.1.212
Android Ver 10
Equipment Model NEN-L21CQ
Model NEN-LX1
Update State NO SYSTEM_UPDATE_STATE
Preload Ver NEN-L21CQ-PRELOAD 11.0.1.2(C10R2)
HWNFF Version Ver3.0
UNLOCKTOOL 2023.01.04.0

[EDL] ERASE HUAWEI ID Selected Model : Huawei Nova 8i
Code Name : NEN-L22 | NEN-LX1
Operation : Erase HWID [2]
Authenticating... OK
Retrieving data... OK [270,13 KiB]
Initializing data... OK
Waiting for HS-USB QDLoader 9008... COM6
Connecting to device... OK
Handshaking... OK
Reading bootloader info... OK
Serial : 2915996350 SoC : [Snapdragon 662] [SM6115] [0x0014D0E1]
OEM : Huawei [0x0015] Model : Unknown [0x0000]
PK_HASH[0] : B25DECD85D217F5D9B53DC3C42EF7846
PK_HASH[1] : DCEF59DD3E0AF4D12606199F5099FF23
Writing flash programmer... OK
Connecting to flash programmer... OK
Configuring device... OK
Firehose config : UFS [Sector:4096] [Target:0] [Host:1048576]
Reading partition map... OK - LU Count : 6
Reading software info... OK
Manufacturer : HUAWEI
Removing Huawei ID... OK
Rebooting... OK
UNLOCKTOOL 2023.01.04.0
Elapsed time : 18 seconds

[EDL] ERASE HUAWEI ID Selected Model : Huawei Nova 8i
Code Name : NEN-L22 | NEN-LX1
Operation : Erase HWID [2]
Authenticating... OK
Retrieving data... OK [270,13 KiB]
Initializing data... OK
Waiting for HS-USB QDLoader 9008... COM6
Connecting to device... OK
Handshaking... OK
Reading bootloader info... OK
Serial : 2915996350 SoC : [Snapdragon 662] [SM6115] [0x0014D0E1]
OEM : Huawei [0x0015] Model : Unknown [0x0000]
PK_HASH[0] : B25DECD85D217F5D9B53DC3C42EF7846
PK_HASH[1] : DCEF59DD3E0AF4D12606199F5099FF23
Writing flash programmer... OK
Connecting to flash programmer... OK
Configuring device... OK
Firehose config : UFS [Sector:4096] [Target:0] [Host:1048576]
Reading partition map... OK - LU Count : 6
Reading software info... OK
Manufacturer : HUAWEI
Repairing Huawei ID data... OK
Rebooting... OK
UNLOCKTOOL 2023.01.04.0
Elapsed time : 17 seconds
 
Последнее редактирование модератором:

machito

android unlock
.
.

Xiaomi Redmi 6 сброс Mi Cloud

[MI] DISABLE MICLOUD Initializing usb... OK
Waiting for device... COM10 [BOOTROM:0E8D:0003]
Bypassing authentication... OK
Analyzing... preloader_cereus.bin [MT6765:8:1392] [Internal]
Vendor : XIAOMI
Handshaking... OK
Reading hardware info... OK
Hardware : MT6765 [Helio G25|G35|P35] 0766 8A00 CA00 0000
Security Config : SCB SLA DAA
MEID : B905141023AA7ACBDBE35600E37D8CD1
Sending Download-Agent... OK
Syncing with target... OK
Booting device... OK
Syncing with DA... OK
Storage : EMMC - CID : 47000115.4D423644.CD040142.AD555597
Vendor : Samsung - Name : GD6BMB - Serial : 1436011780 - Rev : 1
Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 4 MiB - User Area : 29,12 GiB
Reading partition info... OK [41]
Reading device info... OK
Model Name : Redmi 6
Product Name : cereus_ru
Manufacturer : Xiaomi
Platform : cereus
Android Version : 9
Security Patch : 2020-08-01
Build ID : SW_S98507AE1_V009_M13_XM_C3D_USR
Build Date : Mon Sep 14 19:21:22 WIB 2020
MIUI Version : V11
MIUI Build : V11.0.5.0.PCGRUXM
MIUI Region : cereus_ru_global
MIUI Locale : en-GB
Checking lockstate... LOCKED
Reading unlock data... OK
Unlocking bootloader... OK
Permanent unlocking device... OK
Disabling MiCloud... OK
Resetting MiCloud... OK
Erasing FRP... OK
Please do not relock bootloader after this operation!
UNLOCKTOOL 2023.01.13.1
Elapsed time : 51 seconds
 

machito

android unlock
.
.
Vivo Y11 Сброс настроек с забытым паролем.
[EDL] FACTORY RESET Selected Model : Vivo Y11 (1906)
Code Name : PD1930F/PD1930CF
Operation : Factory Reset [2]
Authenticating... OK
Retrieving data... OK [218,7 KiB]
Initializing data... OK
Waiting for HS-USB QDLoader 9008... COM5
Connecting to device... OK
Handshaking... OK
Reading bootloader info... OK
Serial : 4163857872 SoC : [Snapdragon 439] [SDM439] [0x000BF0E1]
OEM : Qualcomm [0x0000] Model : Unknown [0x0000]
PK_HASH[0] : 60BA997FEF6DA9F05885FA11F1DD6D2A
PK_HASH[1] : 90D052A257A09C2075D7246CC73C0D43
Writing flash programmer... OK
Connecting to flash programmer... OK
Configuring device... OK
Firehose config : eMMC [Sector:512] [Target:4096] [Host:1048576]
Reading partition map... OK - LU Count : 1
Reading software info... OK
Model Name : vivo 1906
Product Name : 1906
Manufacturer : vivo
Platform : QC_Reference_Phone
Android Version : 11
Security Patch : 2022-03-01
Build : eng.compil.20220316.164614
Build Date : Wed Mar 16 16:43:37 CST 2022
Vivo Model : 1906
Vivo Version : PD1930F_EX_A_6.8.55
OS Name : Funtouch
OS Version : 11.5
OS Build : Funtouch OS_10.5
OEM Version : PD1930F_EX_CN-ZH_FULL_SC_NULL
Erasing USERDATA... OK
Erasing FRP... OK
Total sector : 64
Rebooting to FASTBOOT... OK
 
Верх Низ