Blog
Direct Unlock Samsung J3 Star SM-J337T T-mobile by SamKey TMO
Searching for SAMSUNG Mobile USB Modem...OK
SAMSUNG USB Modem detected on [COM29]
Looking for DEVICE...OK
Reading USB MODEM information...OK
MODEL : SM-J337T
VER : J337TUVSAAUB2/J337TTMBAAUB2/J337TUVSAAUB2/J337TUVSAAUB2
IMEI : 354272096377947
S/N : R28KB0XSW8
U/N : CQE00E7BB060DA5
Loading ADB module............OK
Starting ADB module...OK
Searching for SAMSUNG ADB device...OK
Checking device authorization...OK
Device CodeName : J3TOPLTETMO
ADB Serial Number : 4200e7bb060da5ad
AP Version : J337TUVSAAUB2
CP Version : J337TUVSAAUB2
CSC Version : J337TTMBAAUB2
Android Version : 8.0.0
Algorithm : New 2021 SDK
SIM State : OK
IMEI : 354272096377947
Debug Level : 0x4f4c
Setting DEBUG level to HIGH.........OK
Waiting for Reboot...OK
Checking data validity...PASS
Executing RIL applet...OK
Starting RIL applet...OK
Creating CpDump data...OK
Rebooting device........OK
Waiting for Reboot...OK
Analysing CpDump data...[CHK:OK]...[CPY:OK]...OK
Sending data to SERVER...OK
Waiting for SERVER response...OK
Starting RIL applet...OK
Unlocking phone...OK
Operation successful.
PLEASE REBOOT PHONE MANUALLY TO FINISH UNLOCK!
SamKEY Team (2017)

FRP Samsung SM-J337T
Version:0.9 StartHTML:-1 EndHTML:-1 StartFragment:000128 EndFragment:002473 SourceURL:file%3a%2f%2f
[COM] REMOVE FRP [2023]
Scanning for device...
COM59
Reading Info...
FAIL
Trying method [1]...
OK
Waiting for device...
Please accept USB Debugging on your phone!
Model :
SM-J337T
Manufacturer :
samsung
Platform :
exynos5
CPU Arch :
armeabi-v7a
Android Serial :
4200e7bb060da5ad
Manufacturing Date :
20181109
Security Patch :
2021-01-01
Connection :
mtp,adb
Timezone :
America/Mexico_City
Knox Warranty :
0 - valid
Android Version :
8.0.0
Android SDK :
26
Build :
R16NW.J337TUVSAAUB2
Build Date :
Wed Feb 10 17:05:00 KST 2021
Product Code :
SM2J337TZDATMB
Samsung Serial :
R28KB0XSW8N
Device Name :
j3topltetmo
Product Name :
j3topltetmo
Code Name :
SM2J337TZDATMB
BL :
J337TUVSAAUB2
PDA :
J337TUVSAAUB2
CP :
J337TUVSAAUB2
CSC :
J337TTMBAAUB2
Sales Code :
TMB
Removing
FRP
...
OK
UNLOCKTOOL
2023.09.23.0
Elapsed time :
37 seconds

Direct Unlock Samsung A12 SM-A125U T-mobile by SamKey MTK
Searching for SAMSUNG USB Modem ...COM28
● Model ...SM-A125U
● Sw version ...A125USQU3BUG7/A125UOYN3BUG7/A125USQU3BUG7/A125USQU3BUG7
● Carrier ...TMB
● Serial Number ...R58R84LNFXH
● IMEI ...359011833379781
Checkig Security.......PASS
Waiting For ADB Device : OK
● Product Model ...SM-A125U
● Brand ...samsung
● Android ...11
● Manufacturer ...samsung
● Security Patch ...2021-07-01
● SDK Version ...30
● Encryption State ...encrypted
● Protection FRP ...PERSISTENT
● Hardware ...mt6765
● Platform ...mt6765
● Product locale ...en-US
Rebooting to Download Mode...OK
Searching for SAMSUNG USB Modem ...COM27
Writing custom bootloader...OK
Unlock Network
Waiting for bootrom usb device... ok
BootMode : BootRom[COM39]
● BBChip ID MT6765
● BBChip Inf 766:8A00:CA00:0
● Chip PID Helio P35
● Chip UID cervino
● Chip Ver CHIP_VER_E1
BRom::SEC:{0xe5}[SBC:ON:SLA:OFF:DAA:ON]
BRom stage Re-configuration
● BR_MEID:0xF261765D27361E720154FC2FAEB6339E
Sending registers
Dumping Dram data(0x6c8e0300)...
Re-connecting to BootROM...
BRom::SEC:{0x0}[SBC:OFF:SLA:OFF:DAA:OFF]
BRom::SEC:{0x0}[SBC:OFF:SLA:OFF:DAA:OFF]
Sending DA..
Successfully DA 1 Loaded
Successfully DA 2 Loaded
Ram Info
● Sram 224.00KB
● Dram 3.00GB
●●●●Hardware Info●●●●
● Storage eMMC
● BOOT1 4.00MB
● BOOT2 4.00MB
● RPMB 16.00MB
● USRDT 29.12GB
● CID 150100445836384D4200D858906988D7
● MFRID 0x15
● Vendor Samsung
● Card BGA BGA (Discrete embedded)
● OEMID 0x0
● Product DX68MB
● Revision 0.0
● Card SN 0xd8589069
● MFDate 8/2021
● EMCP KMDX60018M_B425
● Capacity 29.14GB
● RNID DE4287E9EC4A22170FCE2B83EBF60ABF
Trying to Connect to usb high-speed.
Waiting for bootrom usb device... ok
BootMode : DAVcom[COM21]
● USBSpeed high-speed
● ManfcID SAMSUNG
● MName A12USQ
● Model SM-A125U
● Product SAMSUNG
● Fw Ver RP1A.200720.012.A125USQU3BUG7
● BuildID RP1A.200720.012
● Android 11 (Red Velvet Cake)
● EMI ID A12USQ
● S Patch 2021-07-01
● Region EN-US
● CPUApi ARM64-V8A
● SVer A125USQU3BUG7
● Host 21DJF604
● BT Addr 00:00:46:00:00:01
Making Security Backup[#1] ...Success
Making Security Backup[#2] ...Success
Making Security Backup[#3] ...Success
Making Security Backup[#4] ...Success
Rebooting Device... [PLEASE POWER ON MANUALLY IF IS NOT DONE AUTO]
Rebooting.OK
Waiting For ADB Device : OK
Rebooting to Download Mode...OK
Searching for SAMSUNG USB Modem ...COM27
Writing custom bootloader...OK
Waiting for bootrom usb device... ok
BootMode : BootRom[COM39]
● BBChip ID MT6765
● BBChip Inf 766:8A00:CA00:0
● Chip PID Helio P35
● Chip UID cervino
● Chip Ver CHIP_VER_E1
BRom::SEC:{0xe5}[SBC:ON:SLA:OFF:DAA:ON]
BRom stage Re-configuration
● BR_MEID:0xF261765D27361E720154FC2FAEB6339E
Sending registers
Dumping Dram data(0x6c8e0300)...
Re-connecting to BootROM...
BRom::SEC:{0x0}[SBC:OFF:SLA:OFF:DAA:OFF]
BRom::SEC:{0x0}[SBC:OFF:SLA:OFF:DAA:OFF]
Sending DA..
Successfully DA 1 Loaded
Successfully DA 2 Loaded
Ram Info
● Sram 224.00KB
● Dram 3.00GB
●●●●Hardware Info●●●●
● Storage eMMC
● BOOT1 4.00MB
● BOOT2 4.00MB
● RPMB 16.00MB
● USRDT 29.12GB
● CID 150100445836384D4200D858906988D7
● MFRID 0x15
● Vendor Samsung
● Card BGA BGA (Discrete embedded)
● OEMID 0x0
● Product DX68MB
● Revision 0.0
● Card SN 0xd8589069
● MFDate 8/2021
● EMCP KMDX60018M_B425
● Capacity 29.14GB
● RNID DE4287E9EC4A22170FCE2B83EBF60ABF
Trying to Connect to usb high-speed.
Waiting for bootrom usb device... ok
BootMode : DAVcom[COM21]
● USBSpeed high-speed
● ManfcID SAMSUNG
● MName A12USQ
● Model SM-A125U
● Product SAMSUNG
● Fw Ver RP1A.200720.012.A125USQU3BUG7
● BuildID RP1A.200720.012
● Android 11 (Red Velvet Cake)
● EMI ID A12USQ
● S Patch 2021-07-01
● Region EN-US
● CPUApi ARM64-V8A
● SVer A125USQU3BUG7
● Host 21DJF604
● BT Addr 00:00:46:00:00:01
Restoring Security ...Done
Writing Security [#1] ...Success
Writing Security [#2] ...Success
Writing Security [#3] ...Success
Network Unlock Successfully Done!
Rebooting device... Done
● Time elapsed ...02:min:32:sec

Direct Unlock Samsung A12 SM-A125U T-mobile
Searching for SAMSUNG USB Modem ...COM22
● Model ...SM-A125U
● Sw version ...A125USQU3BVB1/A125UOYN3BVB1/A125USQU3BVB1/A125USQU3BVB1
● Carrier ...TMB
● Serial Number ...R58R90645QX
● IMEI ...359011836731004
Checkig Security.......PASS
Waiting For ADB Device : OK
● Product Model ...SM-A125U
● Brand ...samsung
● Android ...11
● Manufacturer ...samsung
● Security Patch ...2022-01-01
● SDK Version ...30
● Encryption State ...encrypted
● Protection FRP ...PERSISTENT
● Hardware ...mt6765
● Platform ...mt6765
● Product locale ...en-US
Rebooting to Download Mode...OK
Searching for SAMSUNG USB Modem ...COM27
fail get access to port
Unlock Network
Waiting for bootrom usb device... device not found!
Waiting For ADB Device : OK
Rebooting to Download Mode...OK
Searching for SAMSUNG USB Modem ...COM27
Writing custom bootloader...OK
Waiting for bootrom usb device... ok
BootMode : BootRom[COM39]
● BBChip ID MT6765
● BBChip Inf 766:8A00:CA00:0
● Chip PID Helio P35
● Chip UID cervino
● Chip Ver CHIP_VER_E1
BRom::SEC:{0xe5}[SBC:ON:SLA:OFF:DAA:ON]
BRom stage Re-configuration
● BR_MEID:0x096ABACB3B390775C421FE0330282E74
Sending registers
Dumping Dram data(0x9c8e0300)...
Re-connecting to BootROM...
BRom::SEC:{0x0}[SBC:OFF:SLA:OFF:DAA:OFF]
BRom::SEC:{0x0}[SBC:OFF:SLA:OFF:DAA:OFF]
Sending DA..
Successfully DA 1 Loaded
Successfully DA 2 Loaded
Ram Info
● Sram 224.00KB
● Dram 3.00GB
●●●●Hardware Info●●●●
● Storage eMMC
● BOOT1 4.00MB
● BOOT2 4.00MB
● RPMB 16.00MB
● USRDT 29.12GB
● CID 150100445836384D42008554905C68A9
● MFRID 0x15
● Vendor Samsung
● Card BGA BGA (Discrete embedded)
● OEMID 0x0
● Product DX68MB
● Revision 0.0
● Card SN 0x8554905c
● MFDate 6/2021
● EMCP KMDX60018M_B425
● Capacity 29.14GB
● RNID A4ABBDEFA576DCB1E28352C456F77FB2
Trying to Connect to usb high-speed.
Waiting for bootrom usb device... ok
BootMode : DAVcom[COM21]
● USBSpeed high-speed
● ManfcID SAMSUNG
● MName A12USQ
● Model SM-A125U
● Product SAMSUNG
● Fw Ver RP1A.200720.012.A125USQU3BVB1
● BuildID RP1A.200720.012
● Android 11 (Red Velvet Cake)
● EMI ID A12USQ
● S Patch 2022-01-01
● Region EN-US
● CPUApi ARM64-V8A
● SVer A125USQU3BVB1
● Host 21DJ6707
● BT Addr 00:00:46:00:00:01
Restoring Security ...Done
Network Unlock Successfully Done!
Rebooting device... Done
● Time elapsed ...05:min:11:sec

FRP Samsung Tablet SM-T580
- Shark Tool (V0.0.0.5)
- Operation : [Remove FRP]
- Detecting Samsung modem port : SAMSUNG Mobile USB Modem
- Selected ComPort : COM21
- Connecting : OK
- Reading info : OK
- Model: SM-T580
- Baseband: T580UEU4CSC1
- Software: T580UEU4CSC1
- Sales Code: XAR
- SN: R52KA02PXXP
- IMEI: NONE
- UN: CAJ033D4CEA67B4
- Software REV: BIT[4]
- Software Build Date: 2019-03-01
- Checking device lock : TRIGGERED
- Checking server data : OK
- This operation takes 5 credits. Continue? Confirmed
- Connecting to shark server : OK
- Work id : [594502]
- Requesting device data : OK
- Generating lock hash : OK
- Calculating phone data : OK
- Removing lock state : OK
- Verifying lock state : verified
- Rebooting : OK
- FRP-Account removed successfully
- Operation finished (00:07) 2023-09-22 01:04:54 PM

Remove Samsung Account Note 10 plus SM-N975U
Primer paso
Microsoft Windows [Versión 10.0.19045.3324]
(c) Microsoft Corporation. Todos los derechos reservados.
C:\Users\Celulares>cd \adb
C:\adb>adb shell
adb server version (39) doesn't match this client (41); killing...
* daemon started successfully
d2q:/ $ pm uninstall -k --user 0 com.osp.app.signin
Success
d2q:/ $ pm install-existing com.osp.app.signin
Package com.osp.app.signin installed for user: 0
d2q:/ $
Segundo Paso
[COM] REMOVE FRP [2023] Scanning for device... COM52
Reading Info... FAIL
Trying method [1]... OK
Waiting for device...
Model : SM-N975U
Manufacturer : samsung
Platform : msmnile
CPU Arch : arm64-v8a
Android Serial : RF8M838YD2F
Manufacturing Date : 2021.06.15
Security Patch : 2022-04-01
Connection : mtp,conn_gadget,adb
Timezone : America/Los_Angeles
Android Version : 12
Android SDK : 31
Build : SP1A.210812.016.N975USQS7HVCD
Build Date : Thu Mar 24 17:46:56 KST 2022
Product Code : SM-N975UZSATMB
Device Name : d2q
Product Name : d2qsq
Code Name : SM-N975UZSATMB
BL : N975USQS7HVCD
PDA : N975USQS7HVCD
CP : N975USQS7HVCD
CSC : N975UOYN7HVCD
Sales Code : TMB
Removing FRP... OK
UNLOCKTOOL 2023.09.14.0
Elapsed time : 21 seconds

FRP Samsung SM-A205U
Chimera Mobile Phone Utility version: 36.89.1322 @ 2023-09-13
Reset FRP lock started
Resetting FRP...
Model: SM-A205U
SW Version: A205USQSDBWC2/A205UOYNDBWC2/A205USQSDBWC2/A205USQSDBWC2
Serial: R58N141HRNJ
IMEI: 352741119001934
Product Code: TMK
Unique Number: CBJ00E6159479C6
Operation in progress. Be patient! Do NOT disconnect the phone!
Please 'Allow USB debugging' in the popup window
Waiting for ADB device...
Resetting FRP...
To complete resetting FRP, go to 'Settings/General management/Reset' then select 'Factory data reset'
Restarting phone
Successfully finished.
Finished at local time: [09.13.23 16:04:31]
WorkID: 234512950

FRP Samsung Tablet T580 by Z3X Box
Escribir firmware Combination para habilitar ADB
You must activate ADB before reset FRP Yes
Goto 'Terms and conditions' press 'NEXT' and 'AGREE' EULA Yes
Waiting ADB device... OK
Reading phone info...
Model: SM-T580
Android version: 6.0.1
PDA version: FA60_T580XXU4ARJ1
CSC version:
Phone version:
Product code:
CSC country code:
CSC sales code:
Phone SN: R52KA02PXXP
IMEI:
HW version:
RF cal date:
Chip name: EXYNOS7870
Modem board:
Security patch: 2016-05-01
Boot Warranty bit: 0
Bypass FRP... OK
For complete reset FRP, goto 'Backup and reset' and make 'Factory data reset'
Done with Samsung Tool PRO v.45.14 [SM-T580,Reset FRP]

Samsung S23 ULTRA Cuenta Samsung Account Eliminar
Aqui les dejo como quitar la cuenta Samsung
primero marcar *#0*# conectar con Unlocktool buscar cualquier samsung y dale FRP seleccionar - All Methods despues de habilitar adb ya podras quitar la cuenta para siempre
5. Now, type pm uninstall -k --user 0 com.osp.app.signin ( Don't worry it won't completely uninstall the Samsung Accounts app )
6. You will see that the Samsung Accounts app is gone from your phone and the account gets logged out too.
7. Now type pm install-existing com.osp.app.signin ( This will reinstall the Samsung Accounts app and you can login with any other account you want )
FRP Motorola E40 XT2159-3 SPD Tiger T700 64 by Unlocktool
FRP Motorola E40 SPD
Apagado Presionar volumen -
Conectar cable USB
ERASE FRP
Selected Platform :
Tiger T700_64_Bypass
Connect Testpoint or hold VOL DOWN!
Waiting for device...
COM23 (SPRD U2S Diag)
USB :
USB\VID_1782&PID_4D00\1&1A590E2C&0&0000
Initializing loader...
OK
Protocol :
SPRD3
Sending
payload
...
OK
Sending
auth data
...
OK
Sending
preloader1
...
OK
Sending
preloader2
...
OK
Booting loader, please wait...
OK
Boot ver:
Spreadtrum Boot Block version 1.1
Sending
FDL1
...
OK
Sending
FDL2
...
OK
Reading
partitions info
...
OK
Reading
device info
...
OK
[super]
Model Name :
cyprus64
Manufacturer :
motorola
Android Version :
11
Security Patch :
2023-07-05
Build ID :
ROQS31.166-87-9 release-keys
Build Date :
Thu Jul 13 23:07:42 CST 2023
Erasing
FRP
...
OK
UNLOCKTOOL
2023.09.03.2
Elapsed time :
33 seconds

Direct Unlock Model: G PLAY - 2023 XT2271-3
Direct Unlock Model: G PLAY - 2023 XT2271-3
Waiting for Device in Factory Mode.....Found!
Reading Data...Done
FSG: DFLT_FSG
Firmware: S3SG32.39-90-1
Android Version: 12
Model: G PLAY - 2023
SKU: XT2271-3
SN: ZY22GRKMMD
IMEI 1: 358390900429310
Carrier: attpre
Checking Device Connection ... Done
Checking Price for Device....Done
Creating Order ID....Done
Operation ID: 1688665
Erasing UTAG IMEI ... Done
Reading Device Configuration ... Done
Wiping IMEI ... Done
Writing IMEI ... Done
New IMEI 1: 358390900429310
Writing New Security (0C03)... Done.
Writing UTAG IMEI ... Done
Erasing Factory Mode ... Done
Rebooting to Fastboot ... Done
Elapsed Time: 2:05.06

Direct Unlock Motorola G STYLUS 5G XT2131-4
Motorola G STYLUS 5G XT2131-4
Waiting for Device in Factory Mode.....Found!
Reading Data...Done
FSG: DENVER_NA_CUST
Firmware: S2RES32.29-16-1-15
Android Version: 12
Model: G STYLUS 5G
SKU: XT2131-4
SN: ZY22DWR3BR
IMEI 1: 357160653042383
Carrier: cricket
Checking Device Connection ... Done
Checking Price for Device....Done
Creating Order ID....Done
Operation ID: 1688496
Erasing UTAG IMEI ... Done
Reading Device Configuration ... Done
Wiping IMEI ... Done
Writing New Security (0C03)... Done.
Writing IMEI ... Done
New IMEI 1: 357160653042383
Writing New Security (0C03)... Done.
Writing UTAG IMEI ... Done
Erasing Factory Mode ... Done
Rebooting to Fastboot ... Done
Elapsed Time: 0:46.84

Direct Unlock Samsung SM-S134DL Tracfone Straight Talk
Direct Unlock Samsung SM-S134DL
Operation : Unlock Network
Load Devices List : OK
Connect ADB Device [R9WW408MQRJ] : DONE
Model : SM-S134DL
Brand : samsung
AP/CP Version : S134DLUDU6CWB6/S134DLUDU6CWB6
Android Version : 13
CSC : TFV/TFV/TFN
Hardware ID : MT6765
SIM State : LOADED
Security Patch : 2022-12-01
USB Config : mtp,adb
Warranty Void Bit : 0
IMEI : 358880860372195
Checking if Model Supported : ok
Operation : Direct Unlock
User Agreetments [6 Credit] : OK
Searching For SAMSUNG Mobile USB Modem : DONE
Checking Phone Security : PASS
Searching For SAMSUNG Mobile USB Modem : DONE
Reading Phone Data : OK
Sending Data to Server : OK
Unlocking : OK
Network Unlock Successful! :
PLEASE TYPE #TFUNLOCK# (#83865625#) AND ENTER 0000000000000000 FOR CODE1 AND CODE2
Elapsed Time : (01:57)
#- SIM-UNLOCKER (PRO) 8.1.3 [Build:2023.08.18]
Saving Log[Logs/Unlock Network SM-S134DL-R9WW408MQRJ (2023_8_28 15.40.39).log] : DONE

Direct Unlock Motorola G(7) SUPRA XT1955-5 by MWORKER Tool
Direct Unlock Motorola G(7) SUPRA XT1955-5
Waiting for Device in Factory Mode.....Found!
Reading Data...Done
FSG: DFLT_FSG
Firmware: PCOS29.114-134-5
Android Version: 9
Model: G(7) SUPRA
SKU: XT1955-5
SN: ZY326XGGMD
IMEI 1: 359526093630896
Carrier: cricket
Checking Device Connection ... Done
Checking Price for Device....Done
Creating Order ID....Done
Operation ID: 1682335
Erasing UTAG IMEI ... Done
Reading Device Configuration ... Done
Wiping IMEI ... Done
Writing IMEI ... Done
New IMEI 1: 359526093630896
Writing UTAG IMEI ... Done
Erasing Factory Mode ... Done
Rebooting to Fastboot ... Done
Elapsed Time: 0:20.29

Direct Unlock SM-A326U By SAMKEY SPR
Direct Unlock SM-A326U SPRINT USA
Loading ADB module..............OK
Starting ADB module...OK
Searching for SAMSUNG ADB device...OK
Checking device authorization...OK
Reading device information via ADB...
ADB Serial Number : RFCR40WK42R
Model Name : SM-A326U
Serial Number : RFCR40WK42R
Android Version : 12
Security Patch : 2022-04-01
Carrier : SPR
This operation takes 5 credits with NO REFUND, Continue? YES
AP Version : A326USQU7BVD1
CP Version : A326USQU7BVD1
Warranty VOID : 0
Algorithm : FEB 2023 SDK
Debug Level : 0x4f4c
Rebooting phone.......OK
Waiting for Reboot...OK
Waiting for phone to initialize...OK
Loading RIL applet...OK
Starting RIL applet...RETRY
Loading RIL applet...OK
Starting RIL applet...RETRY
Loading RIL applet...OK
Starting RIL applet...OK
Reading CP information...OK
IMEI : 356017291222259
SimLock status : NETWORK LOCKED
Sending data to SERVER...OK
Waiting for SERVER response...OK
Unlocking phone...OK
Clearing ADB buffer...OK
Verifying SimLock Status...UNLOCKED
Rebooting device...OK
Operation successful.

FRP Motorola G Pure XT2163-4 by Magic Tool
FRP Motorola G Pure XT2163-4
Start FRP Unlock Task on 8/19/2023 12:34:51 PM -06:00
Waiting for device arrival.... OK
Model SKU: XT2163-4
Carrier: RETUS
Serial: ZY22H8Q5T7
Authorizing FRP Access...OK
Reboot bootloader...OK
Waiting for device arrival.... OK
Erasing FRP...OK
Erasing UserData...OK
Erasing Cache...OK
Final Step...OK
Rebooting...OK
FRP Unlock Task Successful!

FRP Hisense E50 Lite by Chimera Tool
FRP Cuenta Google Hisense E50 Lite
Abrir Chimera Tool presionar volumen + - Apagado y conectar cable USB
Seleccionar -> CPU Spectrum UNISOC -> SC9863A 64Bit


FRP ZTE V40 Smart
Select - > Tiger T606_64_Bypass
ERASE FRP Selected Platform : Tiger T606_64_Bypass
Connect Testpoint or hold VOL DOWN! Instruction here!
Waiting for device... COM7 (SPRD U2S Diag)
USB : USB\VID_1782&PID_4D00\5&390FD7C2&0&4
Initializing loader... OK
Protocol : SPRD3
Sending payload... OK
Sending auth data... OK
Sending preloader1... OK
Sending preloader2... OK
Booting loader, please wait... OK
Boot ver: Spreadtrum Boot Block version 1.1
Sending FDL1... OK
Sending FDL2... OK
Reading partitions info... OK
Reading device info... OK [super]
Model Name : ZTE A7040
Product Name : P606F01
Manufacturer : ZTE
Platform : ums9230_4h10
Android Version : 11
Security Patch : 2023-06-05
Build ID : MyOS11.0.8_A7040_TEL
Build Date : Fri Jun 16 19:38:47 CST 2023
Erasing FRP... OK
UNLOCKTOOL 2023.07.30.0
Elapsed time : 52 seconds

Unlock TCL T430W by Furious Gold Done
Using library Brom_DLL_v7.2116.0
Engine version 1.0.0.6279
Searching phone in normal mode;
[connect the phone powered off to the usb cable]
Phone detected (MediaTek PreLoader USB VCOM (Android) (COM26)) (Driver version: 3.2.0.0)
Preparing to start flash mode;
Preparing to open COM26
Connecting;
Downloading DA;
Initializing;
Checking server support license;
Done;
Rid: 8f3a26f36565536c360fb47c647b1c4c
Requesting baudrate change;
Done;
USB SPEED: USB_HIGH_SPEED
DEVICE INFO:
BB CHIP: MT6765 [CA00, 00, 6765, 00]
BB ID: REZDQ0JBQkMxQjUzQTFDMDJBRTdGQUMxNTg2ODI5OUI=
HW_STORAGE_EMMC: 0x44000115 0x4D383658 0x3B280942 0xBD6954D0 [SIZE=0x748800000]
IMEI1 [OTP 0001]: 016298-00-143442-4
IMEI2 [OTP 0001]: 000000-00-000000-0
PROVIDER: T430W-2ATBUS11
USRDATA INFO: 0x249000000 SIZE: 0x4FB0F8000
SPECIAL NOTE: If you are using windows 10 x64 be sure that the installed mtk driver version is 3.0.1504.0 . Any different drivers will create random read bugs on newer chipset phones.
As usual the correct drivers come inside OTSMart archive inside the "usb_driver" folder
Searching data;
Phone unlocked; Remove battery and cable;
Time needed - 00:00:00
Log file saved to: LOG_2_08_2023_10_24_38.txt

FRP Realme C21-Y RMX3263 by Unlocktool
FRP Realme C21-Y RMX3263 by Unlocktool
ERASE FRP Selected Platform : Tiger T610_64_Bypass
Connect Testpoint or hold VOL DOWN! Instruction here!
Waiting for device... COM23 (SPRD U2S Diag)
USB : USB\VID_1782&PID_4D00\1&1A590E2C&0&0000
Initializing loader... OK
Unlock.mx....Done
Protocol : SPRD3
Sending payload... OK
Sending auth data... OK
Sending preloader1... OK
Sending preloader2... OK
Booting loader, please wait... OK
Boot ver: Spreadtrum Boot Block version 1.1
Sending FDL1... OK
Sending FDL2... OK
Reading partitions info... OK
Reading device info... OK [super]
Model Name : RMX3261
Manufacturer : realme
Android Version : 11
Security Patch : 2022-03-05
Build ID : RMX3261_11_A.81
Build Date : Sun Apr 3 11:44:02 CST 2022
OTA Version : RMX3261_11_A.81_20220403103755
Erasing FRP... OK
UNLOCKTOOL 2023.07.22.0
Elapsed time : 28 seconds
Version:0.9 StartHTML:-1 EndHTML:-1 StartFragment:000128 EndFragment:002518 SourceURL:file%3a%2f%2f
FORMAT DATA
Selected Platform :
Tiger T610_64_Bypass
Connect Testpoint or hold VOL DOWN!
Waiting for device...
COM23 (SPRD U2S Diag)
USB :
USB\VID_1782&PID_4D00\1&1A590E2C&0&0000
Initializing loader...
OK
Unlock.mx....OK
Protocol :
SPRD3
Sending
payload
...
OK
Sending
auth data
...
OK
Sending
preloader1
...
OK
Sending
preloader2
...
OK
Booting loader, please wait...
OK
Boot ver:
Spreadtrum Boot Block version 1.1
Sending
FDL1
...
OK
Sending
FDL2
...
OK
Reading
partitions info
...
OK
Reading
device info
...
OK
[super]
Model Name :
RMX3261
Manufacturer :
realme
Android Version :
11
Security Patch :
2022-03-05
Build ID :
RMX3261_11_A.81
Build Date :
Sun Apr 3 11:44:02 CST 2022
OTA Version :
RMX3261_11_A.81_20220403103755
Erasing
FRP
...
OK
Erasing
USERDATA
...
OK
UNLOCKTOOL
2023.07.22.0
Elapsed time :
27 seconds

Unlock & Root Samsung J700p 7.1.1 Sprint
Unlock and Root
Unlock Service
- Connecting ... [ 3b0de722 ]
- Model: SM-J700P
- Serial Number: 00000000000
- Android Version: 7.1.1
- BL: J700PVPU2BQJ2
- CP: J700PVPU2BQJ2
- Board: MSM8929
- Hardware: qcom
- Knox: 1
- SELinux: Enforcing
- SIM: Samsung
- SIM Status: LOADED
- USB Config: mtp,adb
- Service Provider: BST/USA/BST
- This Operation Will Take 1 Credits
- Check Root : OK
- IMEI : 35562807409149
- Prepare Device : OK
- Check Data : OK
- Read Data : OK
- Unlock : OK
# Elapsed Time [00:15]
# Operation ID 2044547

ROOT Samsung J700P 7.1.1 ... Done
https://download.chainfire.eu/1152/CF-Root/CF-Auto-Root/CF-Auto-Root-j7ltespr-j7ltespr-smj700p.zip
<ID:0/036> Added!!
<OSM> Enter CS for MD5..
<OSM> Check MD5.. Do not unplug the cable..
<OSM> Please wait..
<OSM> CF-Auto-Root-j7ltespr-j7ltespr-smj700p.tar.md5 is valid.
<OSM> Checking MD5 finished Sucessfully..
<OSM> Leave CS..
<ID:0/036> Removed!!
<ID:0/011> Added!!
<ID:0/011> Odin engine v(ID:3.1005)..
<ID:0/011> File analysis..
<ID:0/011> SetupConnection..
<ID:0/011> Initialzation..
<ID:0/011> Get PIT for mapping..
<ID:0/011> Firmware update start..
<ID:0/011> SingleDownload.
<ID:0/011> recovery.img
<ID:0/011> NAND Write Start!!
<ID:0/011> cache.img.ext4
<ID:0/011> RQT_CLOSE !!
<ID:0/011> RES OK !!
<ID:0/011> Removed!!

Direct Unlock Octoplus Samsung SM-A037U A03s Carrier DSH con logo Bost Mobile
Full Señal TELCEL & LTE 4G
Primero hacer este paso
Change CSC a VERIZON
Work ID: 0000000002197594
Starting Change CSC
Selected model: SM-A037U
www.Unlock.MX.....Done
Turn on USB debugging on the phone.
Connect powered-on phone to PC using USB via ADB.
Searching ADB devices...
Press "OK" button on the device to allow USB debugging
OK
Reading info...
Detected model: SM-A037U
Fingerprint: samsung/a03susq/a03su:11/RP1A.200720.012/A037USQS2AVD3:user/release-keys
Firmware compiled date: Thu Apr 21 15:47:43 KST 2022
PDA version: A037USQS2AVD3
CSC version: A037UOYN2AVD3
SW version: A037USQS2AVD3
Build number: A03S_USA_SINGLE
Phone SN: R9WT70WMVAE
Android version: 11 (RP1A.200720.012)
Sales code: XAA
Carrier Id: DSH
Country: USA
HW platform: mt6765
HW Chip: mt6765
HW Modem: REV1.0
Security patch level: 2022-05-01
Warranty Void: 0
Codename: a03susq
SIM 1 status: ABSENT
SIM 2 status: ABSENT
Modem board: MT6765
Searching modem port...
OK
New CSC: VZW
Changing CSC...
Change CSC done
Execution time 1 minute(s) 17 second(s)
Performed by 4.2.4 Software version.
Work ID: 00000000021975D3
Starting Read Info (ADB)
Selected model: SM-A037U
Turn on USB debugging on the phone.
Connect powered-on phone to PC using USB via ADB.
Searching ADB devices...
Press "OK" button on the device to allow USB debugging
OK
Reading info...
Detected model: SM-A037U
Fingerprint: samsung/a03susq/a03su:11/RP1A.200720.012/A037USQS2AVD3:user/release-keys
Firmware compiled date: Thu Apr 21 15:47:43 KST 2022
PDA version: A037USQS2AVD3
CSC version: A037UOYN2AVD3
SW version: A037USQS2AVD3
Build number: A03S_USA_SINGLE
Phone SN: R9WT70WMVAE
Android version: 11 (RP1A.200720.012)
Sales code: VZW
Carrier Id: DSH
Country: USA
HW platform: mt6765
HW Chip: mt6765
HW Modem: REV1.0
Security patch level: 2022-05-01
Warranty Void: 0
Codename: a03susq
SIM 1 status: NETWORK_LOCKED
SIM 2 status: NETWORK_LOCKED
Modem board: MT6765
Read Info (ADB) done
Execution time 4 second(s)
Performed by 4.2.4 Software version.
Aqui viene el segundo paso
Presionar Unlock
Seleccionar Unlock (Jul.2022)
Work ID: 00000000019E5ECC
Starting Unlock (Jul.2022)
Selected model: SM-A037U
www.Unlock.MX.....Done
Turn on USB debugging on the phone.
For work with MTK devices install "MTK USB Driver"(How to install).
Connect powered-on phone to PC using USB via ADB.
Searching ADB devices...
Press "OK" button on the device to allow USB debugging
OK
Reading info...
Detected model: SM-A037U
Fingerprint: samsung/a03susq/a03su:11/RP1A.200720.012/A037USQS2AVD3:user/release-keys
Firmware compiled date: Thu Apr 21 15:47:43 KST 2022
PDA version: A037USQS2AVD3
CSC version: A037UOYN2AVD3
SW version: A037USQS2AVD3
Build number: A03S_USA_SINGLE
Phone SN: R9WT70WMVAE
Android version: 11 (RP1A.200720.012)
Sales code: VZW
Carrier Id: DSH
Country: USA
HW platform: mt6765
HW Chip: mt6765
HW Modem: REV1.0
Security patch level: 2022-05-01
Warranty Void: 0
Codename: a03susq
SIM 1 status: NETWORK_LOCKED
SIM 2 status: NETWORK_LOCKED
Modem board: MT6765
You will need to enter zero code ("0000000000000000") after every reboot
Searching modem port...
OK
Connecting to server...
Username: octopus038
Your balance: 150 credits
Sending device information..
OK
Your account will be charged for 60 credits. Do you want to continue?
Preparing to unlock...
Start unlocking operation.
Rebooting device...
OK
HW Chip : MT6765
HW Version : 8a00.ca00.0.0
Reconnecting...
OK
Reading preloader...
OK
Mobile Status: brom
Sending bootloader info...
Initializing memory flash...
Initializing successfully completed
Detected EMMC flash
Bypassing security...
Unlocking. Please wait...
You will need to enter zero code ("0000000000000000") after every reboot
OK
Unlock (Jul.2022) done
Execution time 1 minute(s) 38 second(s)
Performed by 4.2.4 Software version.

Unlock Motorola Moto G 5G XT2213-1 Cricket USA
Starting Factory Enabler process...
Unlock.mx....Done
Waiting for device in Fastboot Mode....Done.
Reading Data....Done
Firmware: S1SAS32.47-59-19
Android: 12
CPU: MT6833V/NZA
Model: XT2213-1
SN: ZD2228LNCN
IMEI: 351279771141293
Channel ID: 0x89
Carrier: cricket
Factory Mode: disabled
Reading Data ... Done
Creating Order ID....Done
Operation ID: 1631077
Sending Data to Server ... Done
Setting Factory Mode ... Done
Rebooting Phone ... Done
Elapsed Time: 0:13.91
Waiting for Device in Factory Mode.....Found!
Unlock.mx....Done
Reading Data...Done
FSG: DFLT_FSG
Firmware: S1SAS32.47-59-19
Android Version: 12
Model: G 5G (2022)
SKU: XT2213-1
SN: ZD2228LNCN
IMEI 1: 351279771141293
Carrier: cricket
Checking Price for Device....Done
Creating Order ID....Done
Operation ID: 1631080
Erasing UTAG IMEI ... Done
Reading Device Configuration ... Done
Wiping IMEI ... Done
Writing New Security ... Done.
Writing IMEI ... Done
New IMEI 1: 351279771141293
Writing New Security ... Done.
Writing UTAG IMEI ... Done
Erasing Factory Mode ... Done
Rebooting to Fastboot ... Done
Elapsed Time: 0:39.52


FRP Motorola Moto G GO G Pure XT2163-7
Starting Factory Enabler process...
Unlock.mx.....Done
Waiting for device in Fastboot Mode....Done.
Reading Data....Done
Firmware: RRHGS31.Q3-37-43-43-5-4-6
Android: 11
CPU: MT6762G
Model: XT2163-6
SN: ZY22G4HZ8B
IMEI: 357151881507388
Channel ID: 0x88
Carrier: attpre
Factory Mode: disabled
Reading Data ... Done
Creating Order ID....Done
Operation ID: 1630251
Sending Data to Server ... Done
Setting Factory Mode ... Done
Rebooting Phone ... Done
Elapsed Time: 6:47.07
Unlock.mx.....Done
FSG: MT6762_TC2.PR2.SP.V8.2.P89.01.66.119R
Firmware: RRHGS31.Q3-37-43-43-5-4-6
Model: G GO
SKU: XT2163-7
SN: ZY22G4HZ8B
IMEI 1: 357151881507388
Carrier: attpre
Checking Price for Device....Done
Wiping IMEI ... Done
Writing IMEI ... Done
New IMEI 1: 357151881507388
Writing New Security ... Done.
Elapsed Time: 0:38.79

FRP Samsung A32 SM-A325M by UnlockTool
[COM] REMOVE FRP [2023]
Scanning for device...
COM32
Reading Info...
FAIL
Trying method [1]...
OK
Waiting for device...
Please accept USB Debugging on your phone!
Model :
SM-A325M
Manufacturer :
samsung
Platform :
mt6768
CPU Arch :
arm64-v8a
Android Serial :
R58RB1VK5BK
Manufacturing Date :
20211109
Security Patch :
2021-09-01
Connection :
mtp,adb
Timezone :
GMT
Android Version :
11
Android SDK :
30
Build :
RP1A.200720.012.A325MUBU1AUH1
Build Date :
Sat Sep 4 05:01:13 KST 2021
Product Code :
SM-A325MZKMMXO
Device Name :
a32
Product Name :
a32ub
Code Name :
SM-A325MZKMMXO
BL :
A325MUBU1AUH1
PDA :
A325MUBU1AUH1
CP :
A325MUBU1AUH1
CSC :
A325MOWO1AUH1
Sales Code :
MXO
Removing
FRP
...
OK
UNLOCKTOOL
2023.07.12.0
Elapsed time :
42 seconds

FRP Samsung A23 SM-A235M by UnlockTool
[COM] REMOVE FRP [2023]
Unlock.mx...Done
Scanning for device...
COM31
Reading Info...
FAIL
Trying method [1]...
OK
Waiting for device...
Please accept USB Debugging on your phone!
Model :
SM-A235M
Manufacturer :
samsung
Platform :
bengal
CPU Arch :
arm64-v8a
Android Serial :
R58T30AWG2L
Manufacturing Date :
2022.03.03
Security Patch :
2022-03-01
Connection :
mtp,adb
Timezone :
GMT
Android Version :
12
Android SDK :
31
Build :
SP1A.210812.016.A235MUBU1AVB8
Build Date :
Wed Feb 23 14:41:14 KST 2022
Product Code :
SM-A235MZKDTPA
Device Name :
a23
Product Name :
a23ub
Code Name :
SM-A235MZKDTPA
BL :
A235MUBU1AVB8
PDA :
A235MUBU1AVB8
CP :
A235MUBU1AVB8,A235MUBU1AVB8
CSC :
A235MOWO1AVB9
Sales Code :
TPA
Removing
FRP
...
OK
UNLOCKTOOL
2023.07.12.0
Elapsed time :
57 seconds

FRP ZTE L210 SC7731E
ERASE FRP
Selected Platform :
SC7731E_Bypass
Connect Testpoint or hold VOL DOWN!
Waiting for device...
COM23 (SPRD U2S Diag)
USB :
USB\VID_1782&PID_4D00\1&1A590E2C&0&0000
Initializing loader...
OK
Protocol :
SPRD3
Sending
payload
...
OK
Sending
auth data
...
OK
Sending
preloader1
...
OK
Sending
preloader2
...
OK
Booting loader, please wait...
OK
Boot ver:
Spreadtrum Boot Block version 1.1
Sending
FDL1
...
OK
Sending
FDL2
...
OK
Reading
partitions info
...
OK
Reading
device info
...
OK
[super]
Model Name :
ZTE Blade L210
Product Name :
P731F50
Manufacturer :
ZTE
Platform :
sp7731e_1h10
Android Version :
10
Security Patch :
2022-04-05
Build ID :
TEL_MX_ZTE_Blade_L210V2.2
Build Date :
Fri Apr 15 12:15:46 CST 2022
Erasing
FRP
...
OK
UNLOCKTOOL
2023.07.12.0
Elapsed time :
42 seconds
FORMAT DATA
Selected Platform :
SC7731E_Bypass
Connect Testpoint or hold VOL DOWN!
Waiting for device...
COM23 (SPRD U2S Diag)
USB :
USB\VID_1782&PID_4D00\1&1A590E2C&0&0000
Initializing loader...
OK
Protocol :
SPRD3
Sending
payload
...
OK
Sending
auth data
...
OK
Sending
preloader1
...
OK
Sending
preloader2
...
OK
Booting loader, please wait...
OK
Boot ver:
Spreadtrum Boot Block version 1.1
Sending
FDL1
...
OK
Sending
FDL2
...
OK
Reading
partitions info
...
OK
Reading
device info
...
OK
[super]
Model Name :
ZTE Blade L210
Product Name :
P731F50
Manufacturer :
ZTE
Platform :
sp7731e_1h10
Android Version :
10
Security Patch :
2022-04-05
Build ID :
TEL_MX_ZTE_Blade_L210V2.2
Build Date :
Fri Apr 15 12:15:46 CST 2022
Erasing
FRP
...
OK
Erasing
USERDATA
...
OK
UNLOCKTOOL
2023.07.12.0
Elapsed time :
37 seconds

FRP Motorola moto g power (2022) XT2165-5
Starting FRP Remove process...
Waiting for device in Fastboot Mode....Done.
Reading Data....Done
Unlock.mx....Done
Firmware: S3RQS32.20-42-10-14-3
Android: 12
CPU: MT6765H
Model: XT2165-5
SN: ZY22GHDC54
IMEI: 351024744081170
Channel ID: 0x80
CID: 0x0032
Carrier: retca
Reading Data ... Done
Creating Order ID....Done
Operation ID: 1627867
Setting Device Config ... Done
Unlocking Bootloader...Done
Verify Factory CID ... Done.
Reboot Bootloader ... Done.
Wait for Bootloader Reboot ... Done
Wait for Fastboot Mode ... Done
Erase FRP ... Done.
Wait for FRP Clear ... Done
Configuring Bootloader...Done
Erase User Data ... Done.
Erase MetaData ... Done.
Erase misc ... Error.
Clear Mode ... Done.
Fastboot Reboot ... Done.
Elapsed Time: 0:44.15

Motorola Moto G 5G (2022) XT2213-1 Direct Unlock
Motorola Moto G 5G (2022) XT2213-1 Direct Unlock
Waiting for Device in Factory Mode.....Found!
Unlock.mx......Done
Reading Data...Done
FSG: DFLT_FSG
Firmware: S1SAS32.47-59-13
Android Version: 12
Model: G 5G (2022)
SKU: XT2213-1
SN: ZD2228LCYY
IMEI 1: 351279771054843
Carrier: cricket
Checking Price for Device....Done
Creating Order ID....Done
Operation ID: 1625851
Erasing UTAG IMEI ... Done
Reading Device Configuration ... Done
Wiping IMEI ... Done
Writing New Security ... Done.
Writing IMEI ... Done
New IMEI 1: 351279771054843
Writing New Security ... Done.
Writing UTAG IMEI ... Done
Erasing Factory Mode ... Done
Rebooting to Fastboot ... Done
Elapsed Time: 0:50.55

FRP Motorola Moto C MT6737M by NCK BOX
Exe version: NCKBox AndroidMTK 2.9.7
Selected model: Motorola Moto C
[auto]Action: Reset FRP
Phone must be off with battery inside.
Battery must be charged
Please insert USB cable now...
For some phones need to keep "VOL-" button untill inserting USB cable.
For some phones need to keep "VOL+ and VOL-" button untill inserting USB cable.
For some phones need to keep "VOL+" button untill inserting USB cable.
Detected(161) : MediaTek PreLoader USB VCOM (Android) (COM161)
[161] \\?\usb#vid_0e8d&pid_2000#6&1bf12d6f&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Boot mode: Preloader
BBCHIP: 335 0 ca00
Using Algo 2.
Phone detected...Please wait
Sending DA agent, please wait...
----------------------------------------------------
BaseBand CPU :MT6737M
BaseBand CPU Secure Version : FF
BaseBand CPU Bootloader Version : 01
----------------------------------------------------
INT RAM: 128 KB SDRAM
EXT RAM: 1 GB DRAM
----------------------------------------------------
EMMC: (58Gb+8192Mb) SAMSUNG 0x464e36324d42
EMMC FW VERSION: 03:00:00:00:00:00:00:00
EMMC CID: 150100464E36324D42 : 00000000000000
EMMC UA SIZE: 0x1d2000000
BOOT STYLE: EMMC BOOT
FULL LENGTH: 0x1d2880000 [7.290 GB]
Checking data, wait...
Writing FRP, wait...
FRP Reset Done.
Wait untill phone will start charging.
[0]All done.

FRP Samsung A02 SM-A022M by UnlockTool
[COM] REMOVE FRP [2023]
Method :
[1]
Scanning for device...
COM22
Enabling
ADB
...
OK
Waiting for device...
Model :
SM-A022M
Manufacturer :
samsung
Platform :
mt6739
CPU Arch :
armeabi-v7a
Android Serial :
R58RA3YVH9K
Manufacturing Date :
20211028
Security Patch :
2021-09-01
Connection :
mtp,adb
Timezone :
America/Mexico_City
Android Version :
11
Android SDK :
30
Build :
RP1A.200720.012.A022MUBU2BUI2
Build Date :
Sat Sep 18 04:51:55 KST 2021
Product Code :
SM-A022MZKLMXO
Device Name :
a02
Product Name :
a02ub
Code Name :
SM-A022MZKLMXO
BL :
A022MUBU2BUI2
PDA :
A022MUBU2BUI2
CP :
A022MUBU2BUI2
CSC :
A022MOWO2BUI2
Sales Code :
MXO
Removing
FRP
...
OK
UNLOCKTOOL
2023.07.04.1
Elapsed time :
28 seconds

FRP Oppo Reno7 4G CPH2363 by UnlockTool
[EDL] FACTORY RESET Selected Model : Oppo Reno7 4G
Code Name : CPH2363
Operation : Factory Reset [4]
Authenticating... OK
Retrieving data... OK [276.42 KiB]
Initializing data... OK
Waiting for HS-USB QDLoader 9008... COM20
Connecting to device... OK
Handshaking... OK
Reading bootloader info... OK
Serial : 1342983630 SoC : [Snapdragon 680 4G] [SM6250] [0x001B80E1]
OEM : Oppo/Oneplus [0x0051] Model : Unknown [0x0000]
PK_HASH[0] : D53F19D28ED8CA4A5D9C5BD7DDB365DB
PK_HASH[1] : C9268CBDE3DFC8A151E70C8B0A0DFFC2
Writing flash programmer... OK
Connecting to flash programmer... OK
Configuring device... OK
Firehose config : UFS [Sector:4096] [Target:0] [Host:1048576]
Erasing FRP... OK
Erasing USERDATA... OK
Rebooting... OK
UNLOCKTOOL 2023.07.04.1
Elapsed time : 13 minutes 34 seconds

Revivir Samsung MTK dead boot Brickeado con pantalla Negra BROM mode
Bajar SamKEY MTK Edition ultima version
comprar Creditos para poder hacer Login
despues solo presionar boton RepairBROM
y en segundos enciende SAMSUNG
https://www.mediafire.com/file/h8lz92zdetia8hw/SamKEYMTK1096.zip/file
Password for ZIP = samkey

FRP Alcatel 4065F (Alcatel 1L Pro) cuenta google by Pandora Box
Alcatel 4065F (Alcatel 1L Pro) cuenta google
Pandora Box by Z3X
cpu SC9863A_64 con vol - y + sostenido
Selected model: Alcatel 4065F (Alcatel 1L Pro)
Operation: Erase FRP
Software version: 5.3
Work ID: 4047228
Connect phone in BROM mode. Use volume key buttons or testpoint.
Waiting for device... OK
Device found at COM14
Port: USB\VID_1782&PID_4D00\5&14A7B65B&0&1
Driver: [UNISOC Communications Inc.,sprdvcom,SPRD U2S Diag,sprdvcom.sys,4.19.38.134]
Port type: BROM
Connecting to device... OK
Selected processor: SC9863A_64
Load files... (universal) OK
Connect preloader 1... OK
Connect preloader 2... OK
Connect loader 1... OK
Connect loader 2... OK
Serial Number: JZNA06CGILE025X
Read partitions info... OK
Checking A/B state... OK [A]
Read product info... [EXT4] ... OK
Product Brand : Alcatel
Product Manufacturer : TCL
Product Model : 4065F
Product Name : Alcatel 4065F
Product Device : Jakarta_Mini
Product Board : s9863a1h10_go_32b
Board Platform : sp9863a
Build ID : RP1A.201005.001
Build Date : Thu Jul 22 22:05:27 EDT 2021
Display ID : 4065F_TGMX_1SIM_V2.2_20210723
Security Patch : 2021-07-05
Version SDK : 30
Version Release : 11
Version Codename : REL
Firmware Version : 4065F_TGMX_1SIM_V2.2
Userdata FS Type : F2FS
Backup partitions... OK
Formatting "persist" partition... OK
Done!

FRP Motorola Moto G20 XT2128-1 Pandora Box
Selected model: Motorola XT2128-1 (Motorola Moto G20)
Operation: Erase FRP
Software version: 5.3
Work ID: 4043978
Connect phone in BROM mode. Use volume key buttons or testpoint.
Waiting for device... OK
Device found at COM7
Port: USB\VID_1782&PID_4D00\5&390FD7C2&0&4
Driver: [UNISOC Communications Inc.,sprdvcom,SPRD U2S Diag,sprdvcom.sys,4.19.38.134]
Port type: BROM
Connecting to device... OK
Selected processor: Tiger_T700_64
Load files... (universal) OK
Connect preloader 1... OK
Connect preloader 2... OK
Connect loader 1... OK
Connect loader 2... OK
Serial Number: ZY32C5HLXP
Read partitions info... OK
Checking A/B state... OK [A]
Read product info... [EXT4] ... OK
Product Brand : motorola
Product Manufacturer : motorola
Product Model : moto g(20)
Product Name : java_retail
Product Device : java
Product Board : p352
Board Platform : ums512
Build ID : RTAS31.68-66-3
Build Date : Tue Feb 21 13:40:32 CST 2023
Display ID : RTAS31.68-66-3
Security Patch : 2023-03-01
Version SDK : 30
Version Release : 11
Version Codename : REL
Firmware Version : 66-3
Userdata FS Type : F2FS
Backup partitions... OK
Formatting "persist" partition... OK
Done!

Instalacion libusb win32 driver from Zadig
https://zadig.akeo.ie/#google_vignette
https://github.com/pbatard/libwdi/releases/download/v1.5.0/zadig-2.8.exe
https://github.com/pbatard/libwdi/wiki/Zadig

FRP Motorola E7 XT2095-1
FRP Motorola E7 XT2095-1

FRP Motorola XT2117-3 Moto G Power 2021 Verizon
FRP Motorola XT2117-3 Moto G Power 2021 Verizon
Presionar Volumen abajo + Insertar cable USB
Starting FRP Remove process...
Waiting for device in Fastboot Mode....Done.
Reading Data....Done
UNLOCK.MX ..... Done
Firmware: RZBS31.Q2-143-27-4
Android: 11
CPU: SM_KAMORTA_H 1.0
Model: XT2117-3
SN: ZY22D3NP6Z
IMEI: 356898111296981
Channel ID: 0x83
CID: 0x0002
Carrier: vzw
Reading Data ... Done
Creating Order ID....Done
Operation ID: 1602505
Setting Device Config ... Done
Unlocking Bootloader...Done
Reboot Bootloader ... Done.
Wait for Bootloader Reboot ... Done
Wait for Fastboot Mode ... Done
Verify Factory CID ... Done.
Erase FRP ... Done.
Wait 3 Seconds for FRP ... Done
Erase User Data ... Done.
Erase Cache ... Done.
Wait for erase cache ... Done
Configuring Bootloader...Done
Wait for CID ... Done
Erase Modem1 ... Done.
Erase Modem2 ... Done.
Clear Mode ... Done.
Fastboot Reboot ... Done.
Elapsed Time: 0:49.19

Direct Unlock SM-J260T1 J260T1UVS4ATA1 Samsung Metro Pcs
Poner en Modo desarrollador
marcar *#0808# y seleccionar DM+ACM+ADB
Searching for SAMSUNG Mobile USB Modem...OK
UNLOCK.MX ..... OK
SAMSUNG USB Modem detected on [COM48]
Looking for DEVICE...OK
Reading USB MODEM information...OK
MODEL : SM-J260T1
VER : J260T1UVS4ATA1/J260T1TMK4ATA1/J260T1UVS4ATA1/J260T1UVS4ATA1
VER : J260T1UVS5ATD1
IMEI : 352436112732490
S/N : RF8N214K13
U/N : CQE001E620729B6
Loading ADB module............OK
Loading ADB module.OK
Searching for SAMSUNG ADB device...OK
Checking device authorization...OK
Reading ADB device information...
ADB Serial Number : 42001E620729B6CB
SIM State : OK
AP Version : J260T1UVS4ATA1
CP Version : J260T1UVS4ATA1
Debug Level : OK
Android Version : 8.1.0
Warranty VOID : 0
Setting USB Settings to [dm,acm,adb] automatically...OK
Searching for SAMSUNG Diagnostic Port...[COM47]...OK
Connecting to phone via DIAG port...OK
Reading CP registers.....OK
Executing exploit...[CPRAM:OK]...[BUFF:OK]...OK
Loading RIL applet...OK
Starting RIL applet...OK
Reading RADIO information...
IMEI : 352436112732490
MSL address : RF8N214K13
Initializing RIL applet...OK
Starting exploit...[SHL:OK]...OK
Reading HW signature...OK
Signature status : VALID
Sending data to SERVER...OK
Waiting for SERVER response...OK
Loading RIL applet...[SHL:OK]...OK
Unlocking phone...[OEM:OK]...OK
Operation successful.
PLEASE REBOOT PHONE MANUALLY TO FINISH UNLOCK!
SamKEY Team (2017)
UNLOCK.MX & MULTI-UNLOCK.COM

Lanix X860 flash phone write firmware freeze logo start up
Me llego este Lanix X860 se quedaba atorado en el logo
Lanix X860 Mexico Telcel Movistar at&t
https://www.needrom.com/download/lanix-x860/
baja este ROM LANIX X860 - Update SW_03
Open PAC File
Firmware Settings y dejar seleccionadas solo las casillas que tienen palomitas todas las demas desmarquelas
Despues presionar FLASH PHONE en segundos queda prendido y jalando al 100 %


ACTION: Flash Firmware.
Selected firmware: X860_OPEN_SW_03.pac
NV: Default Mode (protect calibration)
Device Storage: EMMC
Start Detect phone...
Unlock.mx ... Done
Phone must be off with battery inside.
Long press "VOL -" key and insert usb cable.
For some phones need to
Long press "VOL -"+ "VOL +" key and insert usb cable.
Detected: SPRD U2S Diag (COM38)
[00:00:00] Sending loader.
BOOT: SPRD3
Sending loader, keep boot key untill loader start.
[00:00:05] Loader ok
[00:00:05] Wait for loader....
Loader OK: ~"Spreadtrum Boot Block version 1.1
Changing bautrate OK.
[00:00:06] [1]First boot done.
[00:00:06] Sending second loader.
[00:00:13] Second loader sent ok.
New flash protocol detected.
[00:00:13] Reading: system
Error while read flash(1).
[00:00:34] Reading: super
System name: super
Phone and firmware have same android
[00:00:34] Reading: miscdata
[00:00:34] Reading: w_fixnv1_a
NVRAM saved to: C:\Users\Montreal\Documents\spreadtrum_module\flashmode_nvram_backup\_352171890429486\_352171890429486_nvram_backup.tar
Phone have super partition.
[00:00:46] Making flash ic repartition.
NV_COMM disabled by user, skip
[uboot_a]Format disabled, skip.
[uboot_log]Format disabled, skip.
[00:00:46] Start write: cache
[00:00:46] Start write: userdata
[w_runtimenv1]Format disabled, skip.
[misc]Format disabled, skip.
[sysdumpdb]Format disabled, skip.
[00:01:02] Start write: persist
[00:01:04] Format: metadata
[00:01:04] [metadata]Format OK.
Flashing done.
[can take 0-10 sec]Wait untill phone restart.
Exe version: NckBox Spreadtrum Module 2.1.8_bugfix
Log saved:
C:\Users\Montreal\Documents\spreadtrum_module\Saved_Logs\_writepac__1.txt
Total Time: 00:01:15
Done.
UNLOCK.MX & MULTI-UNLOCK.COM

FRP Hot Pepper HPP-L55B Serrano MT6739
Aqui le dejo como quitar cuenta FRP
Waiting for mtk usb device... ok
BootMode : Preloader[COM13]
DriverDesc : MediaTek PreLoader USB VCOM_V1633 (Android)
DriverPath : usb\vid_0e8d&pid_2000\6&1a9a519a&0&1
DriverSRV : wdm_usb
DriverVersion : 3.0.1504.0
DriverDate : 1-22-2015
DriverCFG : oem43.inf
DriverOEM : MediaTek Inc.
Start handshake with Preloader...
PreloaderCmd::CMD_BootAsMETA(): Receive READY succeed!
Send BootMode Switch Request...
reboot to meta mode success!
Wait for meta mode usb device...
Init meta mode api...
Connect to SP_META mode...
connect to meta mode success!
Reading device information...
RNID 9c2c80e918a22bac5f7b8e28be708c5100000000
Bluetooth C4:74:F8:21:7C:A5
WIFIMac C4:74:F8:21:4D:4D
Chip ID MT6739
SW Ver alps-mp-q0.mp1-V9.196.1_xthink.q0mp1.k61v1.64.bsp_P10
● Manufacturer Hot Pepper Inc
● Brand HotPepper
● Model HPP-L55B
● DevName HPP-L55B
● Name Serrano
● Board HotPepper
● Build ID HPP-L55B-M-1.0.7
● Android Ver 10 (Quince Tart)
● EMI ID Serrano-user
● Sec Patch 2022-04-05
● UsbConf mtp
● Branch ID alps-mp-q0.mp1
● Build Type user
● Hardware mt6739
● Device State locked
● VerifiedBootState green
● Flash_locked 1
● Veritymode enforcing
● Base android-chinoe
● CryptState encrypted
● CryptType File Based Encryption (FBE) is present.
● SDKVer 29
● FRP Pst /dev/block/platform/bootdevice/by-name/frp
Format frp success
Rebooting from meta mode...success!
UNLOCK.MX & MULTI-UNLOCK.COM

Read PreLoader mt6739 BROM Mode HotPepper HPP-L55B-M-1.0.7 Serrano
Waiting for mtk usb device... ok
BootMode : Preloader[COM13]
DriverDesc : MediaTek PreLoader USB VCOM_V1633 (Android)
DriverPath : usb\vid_0e8d&pid_2000\6&1a9a519a&0&1
DriverSRV : wdm_usb
DriverVersion : 3.0.1504.0
DriverDate : 1-22-2015
DriverCFG : oem43.inf
DriverOEM : MediaTek Inc.
Start handshake with Preloader...
PreloaderCmd::CMD_BootAsMETA(): Receive READY succeed!
Send BootMode Switch Request...
reboot to meta mode success!
Wait for meta mode usb device...
Init meta mode api...
Connect to SP_META mode...
connect to meta mode success!
Reading device information...
RNID 9c2c80e918a22bac5f7b8e28be708c5100000000
Bluetooth C4:74:F8:21:7C:A5
WIFIMac C4:74:F8:21:4D:4D
Chip ID MT6739
SW Ver alps-mp-q0.mp1-V9.196.1_xthink.q0mp1.k61v1.64.bsp_P10
● Manufacturer Hot Pepper Inc
● Brand HotPepper
● Model HPP-L55B
● DevName HPP-L55B
● Name Serrano
● Board HotPepper
● Build ID HPP-L55B-M-1.0.7
● Android Ver 10 (Quince Tart)
● EMI ID Serrano-user
● Sec Patch 2022-04-05
● UsbConf mtp
● Branch ID alps-mp-q0.mp1
● Build Type user
● Hardware mt6739
● Device State locked
● VerifiedBootState green
● Flash_locked 1
● Veritymode enforcing
● Base android-chinoe
● CryptState encrypted
● CryptType File Based Encryption (FBE) is present.
● SDKVer 29
● FRP Pst /dev/block/platform/bootdevice/by-name/frp
Rebooting from meta mode...success!
●●● Log file saved to => C:/Users/UNLOCK.MX/Downloads/Android_Utility_v106/AndroidUtility.v106/Logs/2023_05_27_18_36_41.log
Waiting for mtk usb device... ok
BootMode : Preloader[COM13]
DriverDesc : MediaTek PreLoader USB VCOM_V1633 (Android)
DriverPath : usb\vid_0e8d&pid_2000\6&1a9a519a&0&1
DriverSRV : wdm_usb
DriverVersion : 3.0.1504.0
DriverDate : 1-22-2015
DriverCFG : oem43.inf
DriverOEM : MediaTek Inc.
Connecting to BootROM......
● Chipset MT6739
● Info 8A00_CB00_0002_zion
Force preloader to BootROM(0)...crash succeed!
Waiting for mtk brom usb device... ok
BootMode : BootRom[COM13]
DriverDesc : MediaTek USB Port_V1633
DriverPath : usb\vid_0e8d&pid_0003\6&1a9a519a&0&1
DriverSRV : wdm_usb
DriverVersion : 3.0.1504.0
DriverDate : 1-22-2015
DriverCFG : oem43.inf
DriverOEM : MediaTek Inc.
Connecting to BootROM......
● Chipset MT6739
● Info 8A00_CB00_0002_zion
● MEID:959ECB9F12C47D1D5B4B71E514B95F6F
● SecCFG SBC+SDA
Dumping preloader from memory...
BootROM::UsbSendDevCtrl:Begin(Dym)!
Preloader file saved to
C:/Users/ UNLOCK.MX/Downloads/Android_Utility_v106/AndroidUtility.v106//2023_05_27_18_38_20_preloader_x038_k39tv1_bsp.bin
Bloader Info Version = (MTK_BLOADER_INFO_v32)●●● Log file saved to => C:/Users/UNLOCK.MX/Downloads/Android_Utility_v106/AndroidUtility.v106/Logs/2023_05_27_18_38_22.log
Moto G60 XT2135-2 Remove FRP Payjoy MDM Remove DONE
The Magic Tool
Start MDM Unlock Task on 5/27/2023 11:55:33 AM -07:00
Waiting for device arrival.... OK
UNLOCK.MX.... OK
Model SKU: XT2135-2
Carrier: RETEU
Serial: ZY22DWP5BK
Authorizing MDM Access...OK
Reboot bootloader...OK
Waiting for device arrival.... OK
Erasing MDM...OK
Erasing FRP...OK
Erasing UserData...OK
Erasing Cache...OK
Final Step...OK
Rebooting...OK
MDM Unlock Task Successful!
UNLOCK.MX
FRP Motorola XT1772 E4 PLUS Done
Se conecta apagado con volumen + / volumen -
Exe version: NCKBox AndroidMTK 2.9.7
Selected model: Motorola XT1773
[auto]Action: Reset FRP
Phone must be off with battery inside.
Battery must be charged
Please insert USB cable now...
For some phones need to keep "VOL-" button untill inserting USB cable.
For some phones need to keep "VOL+ and VOL-" button untill inserting USB cable.
For some phones need to keep "VOL+" button untill inserting USB cable.
Detected(26) : MediaTek PreLoader USB VCOM (Android) (COM26)
[26] \\?\usb#vid_0e8d&pid_2000#6&3492803a&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Boot mode: Preloader
BBCHIP: 335 0 ca00
Using Algo 2.
Phone detected...Please wait
Sending DA agent, please wait...
----------------------------------------------------
BaseBand CPU :MT6737M
BaseBand CPU Secure Version : FF
BaseBand CPU Bootloader Version : 01
----------------------------------------------------
INT RAM: 128 KB SDRAM
EXT RAM: 2 GB DRAM
----------------------------------------------------
EMMC: (117Gb+16384Mb) HYNIX 0x484147346132
EMMC FW VERSION: a5:00:00:00:00:00:00:00
EMMC CID: 90014A484147346132 : 00000000000000
EMMC UA SIZE: 0x3ab400000
BOOT STYLE: EMMC BOOT
FULL LENGTH: 0x3ac000000 [14.688 GB]
Resetting userdata.
Checking data, wait...
Writing FRP, wait...
FRP Reset Done.
Wait untill phone will start charging.
[0]All done.
UNLOCK.MX & MULTI-UNLOCK.COM

ANDROID UTILITY V106:22.05.2023
ANDROID UTILITY V106:22.05.2023
Link descarga
https://mega.nz/file/h5QVRCpY#VQFVejVWHecQSRvhlh7xOaARQeGpsypDB3HUbT_QnxA

UNLOCK.MX
Necesitas ayuda puedes contactarnos
adb device info
Device connected
Brand: HotPepper
Model: HPP-L55B
Android: 10
Serial NO: MA95M2208005964
Extended information
Searching device ...
Device connected
[Build.BRAND]: [MTK]
[camera.disable_zsl_mode]: [1]
[dalvik.vm.appimageformat]: [lz4]
[dalvik.vm.dex2oat-Xms]: [64m]
[dalvik.vm.dex2oat-Xmx]: [512m]
[dalvik.vm.dex2oat-max-image-block-size]: [524288]
[dalvik.vm.dex2oat-minidebuginfo]: [true]
[dalvik.vm.dex2oat-resolve-startup-strings]: [true]
[dalvik.vm.dexopt.secondary]: [true]
[dalvik.vm.heapgrowthlimit]: [256m]
[dalvik.vm.heapsize]: [512m]
[dalvik.vm.image-dex2oat-Xms]: [64m]
[dalvik.vm.image-dex2oat-Xmx]: [64m]
[dalvik.vm.isa.arm.features]: [default]
[dalvik.vm.isa.arm.variant]: [cortex-a53]
[dalvik.vm.minidebuginfo]: [true]
[dalvik.vm.mtk-stack-trace-file]: [/data/anr/mtk_traces.txt]
[dalvik.vm.usejit]: [true]
[dalvik.vm.usejitprofiles]: [true]
[debug.atrace.tags.enableflags]: [0]
[debug.force_rtl]: [false]
[debug.sf.disable_backpressure]: [1]
[dev.bootcomplete]: [1]
[dev.mnt.blk.product]: [dm-5]
[dev.mnt.blk.root]: [dm-3]
[dev.mnt.blk.vendor]: [dm-4]
[drm.service.enabled]: [true]
[gsm.current.phone-type]: [1]
[gsm.network.type]: [Unknown]
[gsm.operator.alpha]: []
[gsm.operator.iso-country]: [mx]
[gsm.operator.isroaming]: [false]
[gsm.operator.numeric]: []
[gsm.sim.num.pin]: [3]
[gsm.sim.num.pin2]: [3]
[gsm.sim.num.puk]: [10]
[gsm.sim.num.puk2]: [10]
[gsm.sim.operator.alpha]: [U.S. Cellular]
[gsm.sim.operator.iso-country]: [us]
[gsm.sim.operator.numeric]: [20404]
[gsm.sim.preiccid_0]: [8901580]
[gsm.sim.state]: [LOADED]
[gsm.sim1.type]: [-1]
[gsm.version.baseband]: [MOLY.LR12A.R3.MP.V140.8.P7]
[gsm.version.ril-impl]: [android reference-ril 1.0]
[hwservicemanager.ready]: [true]
[init.svc.adbd]: [running]
[init.svc.agpsd]: [running]
[init.svc.apexd]: [running]
[init.svc.apexd-bootstrap]: [stopped]
[init.svc.ashmemd]: [running]
[init.svc.audioserver]: [running]
[init.svc.batterywarning]: [running]
[init.svc.bluetooth-1-0]: [running]
[init.svc.bootanim]: [stopped]
[init.svc.bootlogoupdater]: [stopped]
[init.svc.bpfloader]: [stopped]
[init.svc.camerahalserver]: [running]
[init.svc.cameraserver]: [running]
[init.svc.ccci3_mdinit]: [stopped]
[init.svc.ccci_mdinit]: [running]
[init.svc.drm]: [running]
[init.svc.flash_recovery]: [stopped]
[init.svc.fuelgauged]: [running]
[init.svc.fuelgauged_nvram]: [stopped]
[init.svc.gatekeeperd]: [running]
[init.svc.gnss_service]: [running]
[init.svc.gpu]: [running]
[init.svc.gpu-1-0]: [running]
[init.svc.gsid]: [stopped]
[init.svc.health-hal-2-0]: [running]
[init.svc.hidl_memory]: [running]
[init.svc.hwservicemanager]: [running]
[init.svc.idmap2d]: [stopped]
[init.svc.incidentd]: [running]
[init.svc.installd]: [running]
[init.svc.iorapd]: [stopped]
[init.svc.ipsec_mon]: [running]
[init.svc.keystore]: [running]
[init.svc.lbs_dbg]: [running]
[init.svc.lbs_hidl_service]: [running]
[init.svc.light-hal-2-0]: [running]
[init.svc.lmkd]: [running]
[init.svc.logd]: [running]
[init.svc.logd-auditctl]: [stopped]
[init.svc.logd-reinit]: [stopped]
[init.svc.media]: [running]
[init.svc.media.swcodec]: [running]
[init.svc.mediacodec]: [running]
[init.svc.mediadrm]: [running]
[init.svc.mediaextractor]: [running]
[init.svc.mediametrics]: [running]
[init.svc.mnld]: [running]
[init.svc.mobile_log_d]: [running]
[init.svc.mtk_secure_element_hal_service]: [running]
[init.svc.mtkcodecservice-1-1]: [stopped]
[init.svc.netd]: [running]
[init.svc.netdagent]: [running]
[init.svc.netdiag]: [running]
[init.svc.nvram-hidl-1-1]: [running]
[init.svc.nvram_daemon]: [stopped]
[init.svc.power-hal-1-0]: [running]
[init.svc.pq-2-2]: [running]
[init.svc.rcs_volte_stack]: [running]
[init.svc.servicemanager]: [running]
[init.svc.statsd]: [running]
[init.svc.storaged]: [running]
[init.svc.surfaceflinger]: [running]
[init.svc.system_suspend]: [running]
[init.svc.tee_check_keybox]: [stopped]
[init.svc.teed]: [running]
[init.svc.terservice]: [stopped]
[init.svc.thermal]: [running]
[init.svc.thermal_manager]: [stopped]
[init.svc.thermald]: [running]
[init.svc.thermalloadalgod]: [running]
[init.svc.tombstoned]: [running]
[init.svc.ueventd]: [running]
[init.svc.usbd]: [stopped]
[init.svc.vendor.audio-hal-2-0]: [running]
[init.svc.vendor.bip]: [running]
[init.svc.vendor.cas-hal-1-1]: [running]
[init.svc.vendor.ccci3_fsd]: [stopped]
[init.svc.vendor.ccci_fsd]: [running]
[init.svc.vendor.ccci_rpcd]: [running]
[init.svc.vendor.configstore-hal]: [running]
[init.svc.vendor.drm-clearkey-hal-1-2]: [running]
[init.svc.vendor.drm-hal-1-0]: [running]
[init.svc.vendor.drm-widevine-hal-1-2]: [running]
[init.svc.vendor.epdg_wod]: [running]
[init.svc.vendor.gatekeeper-1-0]: [running]
[init.svc.vendor.gralloc-2-0]: [running]
[init.svc.vendor.gsm0710muxd]: [running]
[init.svc.vendor.hwcomposer-2-1]: [running]
[init.svc.vendor.keymaster-4-0-trustkernel]: [running]
[init.svc.vendor.memtrack-hal-1-0]: [running]
[init.svc.vendor.ril-daemon-mtk]: [running]
[init.svc.vendor.sensors-hal-2-0]: [running]
[init.svc.vendor.thermal-hal-1-0]: [running]
[init.svc.vendor.usb-hal-1-1]: [running]
[init.svc.vendor.vibrator-1-0]: [running]
[init.svc.vendor.volte_imcb]: [running]
[init.svc.vendor.volte_stack]: [running]
[init.svc.vendor.volte_ua]: [running]
[init.svc.vendor.wifi_hal_legacy]: [running]
[init.svc.vndservicemanager]: [running]
[init.svc.vold]: [running]
[init.svc.volte_imsm_93]: [running]
[init.svc.volte_md_status]: [running]
[init.svc.volte_rcs_ua]: [running]
[init.svc.vtservice]: [running]
[init.svc.vtservice_hidl]: [running]
[init.svc.wfca]: [running]
[init.svc.wificond]: [running]
[init.svc.wlan_assistant]: [running]
[init.svc.wmt_launcher]: [running]
[init.svc.wmt_loader]: [stopped]
[init.svc.wpa_supplicant]: [running]
[init.svc.xthink_factory]: [stopped]
[init.svc.zygote]: [running]
[log.tag]: [M]
[log.tag.APM_AudioPolicyManager]: [D]
[log.tag.stats_log]: [I]
[media.stagefright.thumbnail.prefer_hw_codecs]: [true]
[mediatek.wlan.ctia]: [0]
[net.bt.name]: [Android]
[net.lte.data.roaming.setting1]: [true]
[net.qtaguid_enabled]: [1]
[net.tcp.default_init_rwnd]: [60]
[persist.adb.nonblocking_ffs]: [0]
[persist.log.tag.APM-KpiMonitor]: [I]
[persist.log.tag.APM-ServiceJ]: [I]
[persist.log.tag.APM-SessionJ]: [I]
[persist.log.tag.APM-SessionN]: [I]
[persist.log.tag.APM-Subscriber]: [I]
[persist.log.tag.AT]: [I]
[persist.log.tag.AdnRecord]: [I]
[persist.log.tag.AdnRecordCache]: [I]
[persist.log.tag.AdnRecordLoader]: [I]
[persist.log.tag.AirplaneHandler]: [I]
[persist.log.tag.AutoRegSmsFwk]: [I]
[persist.log.tag.C2K_RIL-DATA]: [I]
[persist.log.tag.CapaSwitch]: [I]
[persist.log.tag.CarrierExpressServiceImpl]: [I]
[persist.log.tag.CarrierExpressServiceImplExt]: [I]
[persist.log.tag.CdmaMoSms]: [I]
[persist.log.tag.CdmaMtSms]: [I]
[persist.log.tag.ConSmsFwkExt]: [I]
[persist.log.tag.CountryDetector]: [I]
[persist.log.tag.DC-C-1]: [I]
[persist.log.tag.DC-C-2]: [I]
[persist.log.tag.DCT-C-0]: [I]
[persist.log.tag.DCT-C-1]: [I]
[persist.log.tag.DCT-I-0]: [I]
[persist.log.tag.DCT-I-1]: [I]
[persist.log.tag.DMC-ApmService]: [I]
[persist.log.tag.DMC-Core]: [I]
[persist.log.tag.DMC-DmcService]: [I]
[persist.log.tag.DMC-EventsSubscriber]: [I]
[persist.log.tag.DMC-ReqQManager]: [I]
[persist.log.tag.DMC-SessionManager]: [I]
[persist.log.tag.DMC-TranslatorLoader]: [I]
[persist.log.tag.DMC-TranslatorUtils]: [I]
[persist.log.tag.DSSelector]: [I]
[persist.log.tag.DSSelectorOP01]: [I]
[persist.log.tag.DSSelectorOP02]: [I]
[persist.log.tag.DSSelectorOP09]: [I]
[persist.log.tag.DSSelectorOP18]: [I]
[persist.log.tag.DSSelectorOm]: [I]
[persist.log.tag.DSSelectorUtil]: [I]
[persist.log.tag.DataDispatcher]: [I]
[persist.log.tag.DataOnlySmsFwk]: [I]
[persist.log.tag.DcFcMgr]: [I]
[persist.log.tag.DupSmsFilterExt]: [I]
[persist.log.tag.ExternalSimMgr]: [I]
[persist.log.tag.GsmCallTkrHlpr]: [I]
[persist.log.tag.GsmCdmaConn]: [I]
[persist.log.tag.GsmCdmaPhone]: [I]
[persist.log.tag.IMSRILRequest]: [I]
[persist.log.tag.IMS_RILA]: [I]
[persist.log.tag.IccCardProxy]: [I]
[persist.log.tag.IccPhoneBookIM]: [I]
[persist.log.tag.IccProvider]: [I]
[persist.log.tag.ImsApp]: [I]
[persist.log.tag.ImsBaseCommands]: [I]
[persist.log.tag.ImsCall]: [I]
[persist.log.tag.ImsCallProfile]: [I]
[persist.log.tag.ImsCallSession]: [I]
[persist.log.tag.ImsEcbm]: [I]
[persist.log.tag.ImsEcbmProxy]: [I]
[persist.log.tag.ImsManager]: [I]
[persist.log.tag.ImsPhone]: [I]
[persist.log.tag.ImsPhoneBase]: [I]
[persist.log.tag.ImsPhoneCall]: [I]
[persist.log.tag.ImsService]: [I]
[persist.log.tag.ImsVTProvider]: [I]
[persist.log.tag.IsimFileHandler]: [I]
[persist.log.tag.IsimRecords]: [I]
[persist.log.tag.LCM-Subscriber]: [I]
[persist.log.tag.MAPI-CommandProcessor]: [I]
[persist.log.tag.MAPI-MdiRedirector]: [I]
[persist.log.tag.MAPI-MdiRedirectorCtrl]: [I]
[persist.log.tag.MAPI-NetworkSocketConnection]: [I]
[persist.log.tag.MAPI-SocketConnection]: [I]
[persist.log.tag.MAPI-SocketListener]: [I]
[persist.log.tag.MAPI-TranslatorManager]: [I]
[persist.log.tag.MDM-Subscriber]: [I]
[persist.log.tag.MDMI-CommandProcessor]: [I]
[persist.log.tag.MDMI-CoreSession]: [I]
[persist.log.tag.MDMI-MdmiRedirector]: [I]
[persist.log.tag.MDMI-MdmiRedirectorCtrl]: [I]
[persist.log.tag.MDMI-NetworkSocketConnection]: [I]
[persist.log.tag.MDMI-Permission]: [I]
[persist.log.tag.MDMI-Provider]: [I]
[persist.log.tag.MDMI-SocketConnection]: [I]
[persist.log.tag.MDMI-SocketListener]: [I]
[persist.log.tag.MDMI-TranslatorManager]: [I]
[persist.log.tag.MGsmSMSDisp]: [I]
[persist.log.tag.MSimSmsIStatus]: [I]
[persist.log.tag.MSmsStorageMtr]: [I]
[persist.log.tag.MSmsUsageMtr]: [I]
[persist.log.tag.MTKSST]: [D]
[persist.log.tag.MtkAdnRecord]: [I]
[persist.log.tag.MtkConSmsFwk]: [I]
[persist.log.tag.MtkCsimFH]: [I]
[persist.log.tag.MtkDupSmsFilter]: [I]
[persist.log.tag.MtkEmbmsAdaptor]: [I]
[persist.log.tag.MtkFactory]: [I]
[persist.log.tag.MtkGsmCdmaConn]: [I]
[persist.log.tag.MtkIccCardProxy]: [I]
[persist.log.tag.MtkIccPHBIM]: [I]
[persist.log.tag.MtkIccProvider]: [I]
[persist.log.tag.MtkIccSmsIntMgr]: [I]
[persist.log.tag.MtkImsManager]: [I]
[persist.log.tag.MtkImsService]: [I]
[persist.log.tag.MtkIsimFH]: [I]
[persist.log.tag.MtkPhoneNotifr]: [I]
[persist.log.tag.MtkPhoneNumberUtils]: [I]
[persist.log.tag.MtkPhoneSwitcher]: [D]
[persist.log.tag.MtkRecordLoader]: [I]
[persist.log.tag.MtkRetryManager]: [I]
[persist.log.tag.MtkRuimFH]: [I]
[persist.log.tag.MtkSIMFH]: [I]
[persist.log.tag.MtkSIMRecords]: [I]
[persist.log.tag.MtkSmsCbHeader]: [I]
[persist.log.tag.MtkSmsManager]: [I]
[persist.log.tag.MtkSmsMessage]: [I]
[persist.log.tag.MtkSpnOverride]: [I]
[persist.log.tag.MtkSubCtrl]: [I]
[persist.log.tag.MtkUiccCard]: [I]
[persist.log.tag.MtkUiccCardApp]: [I]
[persist.log.tag.MtkUiccCtrl]: [I]
[persist.log.tag.MtkUsimFH]: [I]
[persist.log.tag.Mtk_RIL_ImsSms]: [I]
[persist.log.tag.MwiRIL]: [I]
[persist.log.tag.NetAgentService]: [I]
[persist.log.tag.NetAgent_IO]: [I]
[persist.log.tag.NetLnkEventHdlr]: [I]
[persist.log.tag.NetworkPolicy]: [I]
[persist.log.tag.NetworkStats]: [I]
[persist.log.tag.OperatorUtils]: [I]
[persist.log.tag.PKM-Lib]: [I]
[persist.log.tag.PKM-MDM]: [I]
[persist.log.tag.PKM-Monitor]: [I]
[persist.log.tag.PKM-SA]: [I]
[persist.log.tag.PKM-Service]: [I]
[persist.log.tag.Phone]: [I]
[persist.log.tag.PhoneConfigurationSettings]: [I]
[persist.log.tag.PhoneFactory]: [I]
[persist.log.tag.PowerHalAddressUitls]: [I]
[persist.log.tag.PowerHalMgrImpl]: [I]
[persist.log.tag.PowerHalMgrServiceImpl]: [I]
[persist.log.tag.PowerHalWifiMonitor]: [I]
[persist.log.tag.PowerWrap]: [I]
[persist.log.tag.ProxyController]: [I]
[persist.log.tag.RFX]: [I]
[persist.log.tag.RIL]: [I]
[persist.log.tag.RIL-CC]: [I]
[persist.log.tag.RIL-DATA]: [I]
[persist.log.tag.RIL-Fusion]: [I]
[persist.log.tag.RIL-Netlink]: [I]
[persist.log.tag.RIL-OEM]: [I]
[persist.log.tag.RIL-PHB]: [I]
[persist.log.tag.RIL-Parcel]: [I]
[persist.log.tag.RIL-RP]: [I]
[persist.log.tag.RIL-SIM]: [I]
[persist.log.tag.RIL-SMS]: [I]
[persist.log.tag.RIL-SocListen]: [I]
[persist.log.tag.RIL-Socket]: [I]
[persist.log.tag.RILC]: [I]
[persist.log.tag.RILC-MTK]: [I]
[persist.log.tag.RILC-OP]: [I]
[persist.log.tag.RILC-RP]: [I]
[persist.log.tag.RILD]: [I]
[persist.log.tag.RILMD2-SS]: [I]
[persist.log.tag.RILMUXD]: [I]
[persist.log.tag.RIL_Mux]: [I]
[persist.log.tag.RIL_UIM_SOCKET]: [I]
[persist.log.tag.RP_DAC]: [I]
[persist.log.tag.RP_DC]: [I]
[persist.log.tag.RP_IMS]: [I]
[persist.log.tag.RTC_DAC]: [I]
[persist.log.tag.RadioManager]: [I]
[persist.log.tag.RetryManager]: [I]
[persist.log.tag.RfxAction]: [I]
[persist.log.tag.RfxChannelMgr]: [I]
[persist.log.tag.RfxCloneMgr]: [I]
[persist.log.tag.RfxContFactory]: [I]
[persist.log.tag.RfxController]: [I]
[persist.log.tag.RfxDT]: [I]
[persist.log.tag.RfxDebugInfo]: [I]
[persist.log.tag.RfxDefDestUtils]: [I]
[persist.log.tag.RfxDisThread]: [I]
[persist.log.tag.RfxFragEnc]: [I]
[persist.log.tag.RfxHandlerMgr]: [I]
[persist.log.tag.RfxIdToMsgId]: [I]
[persist.log.tag.RfxIdToStr]: [I]
[persist.log.tag.RfxMainThread]: [I]
[persist.log.tag.RfxMclDisThread]: [I]
[persist.log.tag.RfxMclMessenger]: [I]
[persist.log.tag.RfxMclStatusMgr]: [I]
[persist.log.tag.RfxMessage]: [I]
[persist.log.tag.RfxObject]: [I]
[persist.log.tag.RfxOpUtils]: [I]
[persist.log.tag.RfxRilAdapter]: [I]
[persist.log.tag.RfxRilUtils]: [I]
[persist.log.tag.RfxRoot]: [I]
[persist.log.tag.RfxSM]: [I]
[persist.log.tag.RfxSocketSM]: [I]
[persist.log.tag.RfxStatusMgr]: [I]
[persist.log.tag.RfxTimer]: [I]
[persist.log.tag.RfxTransUtils]: [I]
[persist.log.tag.RilClient]: [I]
[persist.log.tag.RilMalClient]: [I]
[persist.log.tag.RilOemClient]: [I]
[persist.log.tag.RilOpProxy]: [I]
[persist.log.tag.RmcCapa]: [I]
[persist.log.tag.RmcCdmaSimRequest]: [I]
[persist.log.tag.RmcCdmaSimUrc]: [I]
[persist.log.tag.RmcCommSimOpReq]: [I]
[persist.log.tag.RmcCommSimReq]: [I]
[persist.log.tag.RmcCommSimUrc]: [I]
[persist.log.tag.RmcDcCommon]: [I]
[persist.log.tag.RmcDcDefault]: [I]
[persist.log.tag.RmcDcPdnManager]: [I]
[persist.log.tag.RmcDcReqHandler]: [I]
[persist.log.tag.RmcDcUtility]: [I]
[persist.log.tag.RmcEccNumberUrcHandler]: [D]
[persist.log.tag.RmcEmbmsReq]: [I]
[persist.log.tag.RmcEmbmsUrc]: [I]
[persist.log.tag.RmcGsmSimRequest]: [I]
[persist.log.tag.RmcGsmSimUrc]: [I]
[persist.log.tag.RmcImsCtlReqHdl]: [I]
[persist.log.tag.RmcImsCtlUrcHdl]: [I]
[persist.log.tag.RmcNwHdlr]: [D]
[persist.log.tag.RmcNwRTReqHdlr]: [D]
[persist.log.tag.RmcNwReqHdlr]: [D]
[persist.log.tag.RmcOemHandler]: [I]
[persist.log.tag.RmcOpRadioReq]: [I]
[persist.log.tag.RmcPhbReq]: [I]
[persist.log.tag.RmcPhbUrc]: [I]
[persist.log.tag.RmcRadioReq]: [I]
[persist.log.tag.RmcRatSwHdlr]: [D]
[persist.log.tag.RmcWp]: [I]
[persist.log.tag.RpAudioControl]: [I]
[persist.log.tag.RpCallControl]: [I]
[persist.log.tag.RpCdmaOemCtrl]: [I]
[persist.log.tag.RpCdmaRadioCtrl]: [I]
[persist.log.tag.RpFOUtils]: [I]
[persist.log.tag.RpMDCtrl]: [I]
[persist.log.tag.RpMalController]: [I]
[persist.log.tag.RpModemMessage]: [I]
[persist.log.tag.RpPhbController]: [I]
[persist.log.tag.RpPhoneNumberController]: [D]
[persist.log.tag.RpRadioCtrl]: [I]
[persist.log.tag.RpRadioMessage]: [I]
[persist.log.tag.RpRilClientCtrl]: [I]
[persist.log.tag.RpSimController]: [I]
[persist.log.tag.RtcCapa]: [I]
[persist.log.tag.RtcCommSimCtrl]: [I]
[persist.log.tag.RtcDC]: [I]
[persist.log.tag.RtcEccNumberController]: [D]
[persist.log.tag.RtcEmbmsAt]: [I]
[persist.log.tag.RtcEmbmsUtil]: [I]
[persist.log.tag.RtcIms]: [I]
[persist.log.tag.RtcImsConference]: [I]
[persist.log.tag.RtcImsDialog]: [I]
[persist.log.tag.RtcModeCont]: [I]
[persist.log.tag.RtcNwCtrl]: [I]
[persist.log.tag.RtcPhb]: [I]
[persist.log.tag.RtcRadioCont]: [I]
[persist.log.tag.RtcRatSwCtrl]: [D]
[persist.log.tag.RtcWp]: [I]
[persist.log.tag.SIMRecords]: [I]
[persist.log.tag.SimSwitchOP01]: [I]
[persist.log.tag.SimSwitchOP02]: [I]
[persist.log.tag.SimSwitchOP18]: [I]
[persist.log.tag.SlotQueueEntry]: [I]
[persist.log.tag.SmsPlusCode]: [I]
[persist.log.tag.SpnOverride]: [I]
[persist.log.tag.Telecom]: [I]
[persist.log.tag.UiccCard]: [I]
[persist.log.tag.UiccController]: [I]
[persist.log.tag.UxUtility]: [I]
[persist.log.tag.VT]: [I]
[persist.log.tag.VsimAdaptor]: [I]
[persist.log.tag.WORLDMODE]: [I]
[persist.log.tag.WfoApp]: [I]
[persist.log.tag.legacy_power@2.1-impl]: [I]
[persist.log.tag.libPowerHal]: [I]
[persist.log.tag.mtkperf_client]: [I]
[persist.log.tag.mtkpower@1.0-impl]: [I]
[persist.log.tag.power@1.3-impl]: [I]
[persist.log.tag.powerd]: [I]
[persist.qiku.operators.isabroad]: [1]
[persist.radio.multisim.config]: [ss]
[persist.radio.voice.domain.prefer]: [3]
[persist.sys.alarm.test]: [true]
[persist.sys.boot.reason]: []
[persist.sys.boot.reason.history]: [cold,powerkey,1262304008
reboot,mtk,1651291951
cold,powerkey,1262304068
reboot,1262304147]
[persist.sys.dalvik.vm.lib.2]: [libart.so]
[persist.sys.device_provisioned]: [1]
[persist.sys.displayinset.top]: [0]
[persist.sys.gps.lpp]: [0]
[persist.sys.isolated_storage]: [true]
[persist.sys.locale]: [en-US]
[persist.sys.timezone]: [America/New_York]
[persist.sys.usb.config]: [adb]
[persist.vendor.audiohal.besloudness_state]: [1]
[persist.vendor.audiohal.firstboot]: [0]
[persist.vendor.camera3.pipeline.bufnum.base.imgo]: [5]
[persist.vendor.camera3.pipeline.bufnum.base.lcso]: [5]
[persist.vendor.camera3.pipeline.bufnum.base.rrzo]: [5]
[persist.vendor.camera3.pipeline.bufnum.base.rsso]: [5]
[persist.vendor.camera3.pipeline.bufnum.min.high_ram.fdyuv]: [8]
[persist.vendor.camera3.pipeline.bufnum.min.high_ram.imgo]: [8]
[persist.vendor.camera3.pipeline.bufnum.min.high_ram.lcso]: [8]
[persist.vendor.camera3.pipeline.bufnum.min.high_ram.rrzo]: [8]
[persist.vendor.camera3.pipeline.bufnum.min.high_ram.rsso]: [8]
[persist.vendor.camera3.pipeline.bufnum.min.low_ram.fdyuv]: [6]
[persist.vendor.camera3.pipeline.bufnum.min.low_ram.imgo]: [6]
[persist.vendor.camera3.pipeline.bufnum.min.low_ram.lcso]: [6]
[persist.vendor.camera3.pipeline.bufnum.min.low_ram.rrzo]: [6]
[persist.vendor.camera3.pipeline.bufnum.min.low_ram.rsso]: [6]
[persist.vendor.connsys.chipid]: [0x6739]
[persist.vendor.connsys.dynamic.dump]: [0]
[persist.vendor.connsys.fm_chipid]: [mt6627]
[persist.vendor.connsys.patch.version]: [20200629194517a]
[persist.vendor.duraspeed.app.on]: [1]
[persist.vendor.duraspeed.support]: [1]
[persist.vendor.ims_support]: [1]
[persist.vendor.log.tel_log_ctrl]: [1]
[persist.vendor.mims_support]: [2]
[persist.vendor.mtk.provision.int.01]: [26,0;27,1;66,0;]
[persist.vendor.mtk.vilte.enable]: [0]
[persist.vendor.mtk.viwifi.enable]: [0]
[persist.vendor.mtk.volte.enable]: [1]
[persist.vendor.mtk.wfc.enable]: [0]
[persist.vendor.mtk_ct_volte_support]: [1]
[persist.vendor.mtk_dynamic_ims_switch]: [1]
[persist.vendor.mtk_rcs_ua_support]: [1]
[persist.vendor.mtk_sim_switch_policy]: [2]
[persist.vendor.mtk_wfc_support]: [1]
[persist.vendor.radio.airplane.mode.on]: [false]
[persist.vendor.radio.c_capability_slot]: [0]
[persist.vendor.radio.fd.counter]: [150]
[persist.vendor.radio.fd.off.counter]: [50]
[persist.vendor.radio.fd.off.r8.counter]: [50]
[persist.vendor.radio.fd.r8.counter]: [150]
[persist.vendor.radio.msimmode]: [ss]
[persist.vendor.radio.mtk_dsbp_support]: [1]
[persist.vendor.radio.mtk_ps2_rat]: [L/W/G]
[persist.vendor.radio.mtk_ps3_rat]: [G]
[persist.vendor.radio.pendcapswt]: [0]
[persist.vendor.radio.raf1]: [81930]
[persist.vendor.radio.rilj_nw_type1]: [20]
[persist.vendor.radio.signal_band]: [2]
[persist.vendor.radio.sim.mode]: [1]
[persist.vendor.radio.simswitch]: [1]
[persist.vendor.radio.smart.data.switch]: [1]
[persist.vendor.radio.terminal-based.clir_m]: [4]
[persist.vendor.radio.terminal-based.clir_n]: [0]
[persist.vendor.radio.terminal-based.cw]: [disabled_tbcw]
[persist.vendor.radio.volte_state]: [1]
[persist.vendor.radio.wfc_state]: [0]
[persist.vendor.ss.modem_version]: [0]
[persist.vendor.sys.pq.adl.idx]: [0]
[persist.vendor.sys.pq.bluelight.default]: [128]
[persist.vendor.sys.pq.hdr.en]: [1]
[persist.vendor.sys.pq.hfg.en]: [2]
[persist.vendor.sys.pq.iso.shp.en]: [2]
[persist.vendor.sys.pq.mdp.ccorr.en]: [0]
[persist.vendor.sys.pq.mdp.color.dbg]: [1]
[persist.vendor.sys.pq.mdp.color.idx]: [0]
[persist.vendor.sys.pq.mdp.dre.en]: [2]
[persist.vendor.sys.pq.mdp.hdrvp.dre.en]: [2]
[persist.vendor.sys.pq.mdp.vp.dre.en]: [1]
[persist.vendor.sys.pq.shp.idx]: [2]
[persist.vendor.sys.pq.ultrares.en]: [2]
[persist.vendor.vilte_support]: [1]
[persist.vendor.viwifi_support]: [1]
[persist.vendor.volte_support]: [1]
[persist.vendor.vt.RTPInfo]: [1]
[pm.boot.disable_package_cache]: [true]
[pm.dexopt.ab-ota]: [speed-profile]
[pm.dexopt.bg-dexopt]: [speed-profile]
[pm.dexopt.boot]: [verify]
[pm.dexopt.first-boot]: [quicken]
[pm.dexopt.inactive]: [verify]
[pm.dexopt.install]: [speed-profile]
[pm.dexopt.shared]: [speed]
[qemu.hw.mainkeys]: [0]
[ril.ecclist]: [911,112,*911,#911,*272911]
[ro.actionable_compatible_property.enabled]: [false]
[ro.adb.secure]: [1]
[ro.allow.mock.location]: [0]
[ro.apex.updatable]: [true]
[ro.audio.silent]: [0]
[ro.audio.usb.period_us]: [16000]
[ro.base_build]: [noah]
[ro.baseband]: [unknown]
[ro.bionic.2nd_arch]: []
[ro.bionic.2nd_cpu_variant]: [cortex-a53]
[ro.bionic.arch]: [arm]
[ro.bionic.cpu_variant]: [cortex-a53]
[ro.board.platform]: [mt6739]
[ro.boot.atm]: [disabled]
[ro.boot.avb_version]: [1.1]
[ro.boot.boot_devices]: [bootdevice,11230000.mmc]
[ro.boot.bootlogo_number]: [A95M]
[ro.boot.bootreason]: [PowerKey]
[ro.boot.dtb_idx]: [0]
[ro.boot.dtbo_idx]: [0]
[ro.boot.dynamic_partitions]: [true]
[ro.boot.efuse_status]: [1]
[ro.boot.flash.locked]: [1]
[ro.boot.hardware]: [mt6739]
[ro.boot.hardware.revision]: [A95_P0]
[ro.boot.meta_log_disable]: [0]
[ro.boot.mode]: [normal]
[ro.boot.serialno]: [MA95M2208005964]
[ro.boot.vbmeta.avb_version]: [1.1]
[ro.boot.vbmeta.device_state]: [locked]
[ro.boot.vbmeta.digest]: [02215227ffd4a9fee5636e9241682f57c2b62955d9a5a12d8f1a904bb3bed8ac]
[ro.boot.vbmeta.hash_alg]: [sha256]
[ro.boot.vbmeta.size]: [10176]
[ro.boot.verifiedbootstate]: [green]
[ro.boot.veritymode]: [enforcing]
[ro.boot.veritymode.managed]: [yes]
[ro.bootimage.build.date]: [Sat Apr 30 11:59:13 CST 2022]
[ro.bootimage.build.date.utc]: [1651291153]
[ro.bootimage.build.fingerprint]: [HotPepper/Serrano/HPP-L55B:10/QP1A.190711.020/581:user/release-keys]
[ro.bootloader]: [unknown]
[ro.bootmode]: [normal]
[ro.build.branch.name]: []
[ro.build.characteristics]: [default]
[ro.build.date]: [Sat Apr 30 11:59:13 CST 2022]
[ro.build.date.utc]: [1651291153]
[ro.build.description]: [Serrano-user 10 QP1A.190711.020 581 release-keys]
[ro.build.display.id]: [HPP-L55B-M-1.0.7]
[ro.build.fingerprint]: [HotPepper/Serrano/HPP-L55B:10/QP1A.190711.020/581:user/release-keys]
[ro.build.flavor]: [Serrano-user]
[ro.build.host]: [xx]
[ro.build.id]: [QP1A.190711.020]
[ro.build.product]: [Serrano]
[ro.build.system_root_image]: [false]
[ro.build.tags]: [release-keys]
[ro.build.type]: [user]
[ro.build.user]: [xx]
[ro.build.version.all_codenames]: [REL]
[ro.build.version.base_os]: [HotPepper/Serrano/HPP-L55B:10/QP1A.190711.020/566:user/release-keys]
[ro.build.version.codename]: [REL]
[ro.build.version.incremental]: [581]
[ro.build.version.min_supported_target_sdk]: [23]
[ro.build.version.preview_sdk]: [0]
[ro.build.version.preview_sdk_fingerprint]: [REL]
[ro.build.version.release]: [10]
[ro.build.version.sdk]: [29]
[ro.build.version.security_patch]: [2022-04-05]
[ro.build.x.display.id]: [HPP-L55B-M-1.0.7.2022043012]
[ro.camera.sound.forced]: [0]
[ro.carrier]: [unknown]
[ro.com.android.dataroaming]: [true]
[ro.com.android.mobiledata]: [true]
[ro.com.google.acsa]: [true]
[ro.com.google.clientidbase]: [android-chinoe]
[ro.com.google.clientidbase.am]: [android-uscellular-us]
[ro.com.google.clientidbase.ms]: [android-uscellular-us-revc]
[ro.com.google.gmsversion]: [10_202102]
[ro.config.alarm_alert]: [Alarm_Classic.ogg]
[ro.config.max_starting_bg]: [4]
[ro.config.notification_sound]: [OnTheHunt.ogg]
[ro.config.per_app_memcg]: [false]
[ro.config.ringtone]: [Ring_Synth_04.ogg]
[ro.control_privapp_permissions]: [enforce]
[ro.crypto.state]: [encrypted]
[ro.crypto.type]: [file]
[ro.crypto.volume.filenames_mode]: [aes-256-cts]
[ro.dalvik.vm.native.bridge]: [0]
[ro.debuggable]: [0]
[ro.device_owner]: [false]
[ro.frp.pst]: [/dev/block/platform/bootdevice/by-name/frp]
[ro.hardware]: [mt6739]
[ro.hardware.egl]: [mtk]
[ro.hwui.use_vulkan]: []
[ro.iorapd.enable]: [false]
[ro.kernel.zio]: [38,108,105,16]
[ro.lmk.downgrade_pressure]: [60]
[ro.lmk.kill_heaviest_task]: [true]
[ro.lmk.kill_timeout_ms]: [100]
[ro.lmk.upgrade_pressure]: [30]
[ro.lmk.use_minfree_levels]: [true]
[ro.logd.kernel]: [false]
[ro.logd.size.stats]: [64K]
[ro.mediatek.rsc_name]: [default]
[ro.mediatek.version.branch]: [alps-mp-q0.mp1]
[ro.mediatek.version.release]: [alps-mp-q0.mp1-V9.196.1_xthink.q0mp1.k61v1.64.bsp_P10]
[ro.mediatek.wlan.p2p]: [1]
[ro.mediatek.wlan.wsc]: [1]
[ro.mtk_modem_monitor_support]: [1]
[ro.mtk_perf_fast_start_win]: [1]
[ro.mtk_perf_response_time]: [1]
[ro.mtk_perf_simple_start_win]: [1]
[ro.odm.build.date]: [Sat Apr 30 11:59:13 CST 2022]
[ro.odm.build.date.utc]: [1651291153]
[ro.odm.build.fingerprint]: [HotPepper/Serrano/HPP-L55B:10/QP1A.190711.020/581:user/release-keys]
[ro.odm.build.id]: [QP1A.190711.020]
[ro.odm.build.tags]: [release-keys]
[ro.odm.build.type]: [user]
[ro.odm.build.version.incremental]: [581]
[ro.odm.build.version.release]: [10]
[ro.odm.build.version.sdk]: [29]
[ro.odm.product.cpu.abilist]: [armeabi-v7a,armeabi]
[ro.odm.product.cpu.abilist32]: [armeabi-v7a,armeabi]
[ro.odm.product.cpu.abilist64]: []
[ro.oem_unlock_supported]: [1]
[ro.opa.eligible_device]: [true]
[ro.opengles.version]: [196610]
[ro.postinstall.fstab.prefix]: [/system]
[ro.product.board]: [HotPepper]
[ro.product.brand]: [HotPepper]
[ro.product.build.date]: [Sat Apr 30 11:59:13 CST 2022]
[ro.product.build.date.utc]: [1651291153]
[ro.product.build.fingerprint]: [HotPepper/Serrano/HPP-L55B:10/QP1A.190711.020/581:user/release-keys]
[ro.product.build.id]: [QP1A.190711.020]
[ro.product.build.tags]: [release-keys]
[ro.product.build.type]: [user]
[ro.product.build.version.incremental]: [581]
[ro.product.build.version.release]: [10]
[ro.product.build.version.sdk]: [29]
[ro.product.cpu.abi]: [armeabi-v7a]
[ro.product.cpu.abi2]: [armeabi]
[ro.product.cpu.abilist]: [armeabi-v7a,armeabi]
[ro.product.cpu.abilist32]: [armeabi-v7a,armeabi]
[ro.product.cpu.abilist64]: []
[ro.product.device]: [HPP-L55B]
[ro.product.first_api_level]: [28]
[ro.product.locale]: [en-US]
[ro.product.manufacturer]: [Hot Pepper Inc]
[ro.product.model]: [HPP-L55B]
[ro.product.name]: [Serrano]
[ro.product.odm.brand]: [HotPepper]
[ro.product.odm.device]: [HPP-L55B]
[ro.product.odm.manufacturer]: [Hot Pepper Inc]
[ro.product.odm.model]: [HPP-L55B]
[ro.product.odm.name]: [Serrano]
[ro.product.product.brand]: [HotPepper]
[ro.product.product.device]: [HPP-L55B]
[ro.product.product.manufacturer]: [Hot Pepper Inc]
[ro.product.product.model]: [HPP-L55B]
[ro.product.product.name]: [Serrano]
[ro.product.property_source_order]: [odm,vendor,product,system]
[ro.product.system.brand]: [HotPepper]
[ro.product.system.device]: [HPP-L55B]
[ro.product.system.manufacturer]: [Hot Pepper Inc]
[ro.product.system.model]: [HPP-L55B]
[ro.product.system.name]: [Serrano]
[ro.product.vendor.brand]: [HotPepper]
[ro.product.vendor.device]: [HPP-L55B]
[ro.product.vendor.manufacturer]: [Hot Pepper Inc]
[ro.product.vendor.model]: [HPP-L55B]
[ro.product.vendor.name]: [Serrano]
[ro.product.xdev_model]: [x038_k39tv1_bsp]
[ro.property_service.version]: [2]
[ro.revision]: [0]
[ro.secure]: [1]
[ro.serialno]: [MA95M2208005964]
[ro.setupwizard.rotation_locked]: [true]
[ro.sf.lcd_density]: [240]
[ro.surface_flinger.primary_display_orientation]: [0]
[ro.sys.usb.bicr]: [no]
[ro.sys.usb.charging.only]: [yes]
[ro.sys.usb.mtp.whql.enable]: [0]
[ro.sys.usb.storage.type]: [mtp]
[ro.system.build.date]: [Sat Apr 30 11:59:13 CST 2022]
[ro.system.build.date.utc]: [1651291153]
[ro.system.build.fingerprint]: [HotPepper/Serrano/HPP-L55B:10/QP1A.190711.020/581:user/release-keys]
[ro.system.build.id]: [QP1A.190711.020]
[ro.system.build.tags]: [release-keys]
[ro.system.build.type]: [user]
[ro.system.build.version.incremental]: [581]
[ro.system.build.version.release]: [10]
[ro.system.build.version.sdk]: [29]
[ro.telephony.default_network]: [9,9,9,9]
[ro.telephony.iwlan_operation_mode]: [default]
[ro.telephony.sim.count]: [1]
[ro.treble.enabled]: [true]
[ro.vendor.ap_info_monitor]: [0]
[ro.vendor.build.date]: [Sat Apr 30 11:59:13 CST 2022]
[ro.vendor.build.date.utc]: [1651291153]
[ro.vendor.build.fingerprint]: [HotPepper/Serrano/HPP-L55B:10/QP1A.190711.020/581:user/release-keys]
[ro.vendor.build.id]: [QP1A.190711.020]
[ro.vendor.build.security_patch]: [2022-04-05]
[ro.vendor.build.tags]: [release-keys]
[ro.vendor.build.type]: [user]
[ro.vendor.build.version.incremental]: [581]
[ro.vendor.build.version.release]: [10]
[ro.vendor.build.version.sdk]: [29]
[ro.vendor.camera.isp-version.major]: [3]
[ro.vendor.camera3.zsl.default]: [150]
[ro.vendor.enable.geo.fencing]: [1]
[ro.vendor.md_apps.load_date]: [2022/04/30 11:51:12 GMT +08:00]
[ro.vendor.md_apps.load_gencfg]: [GEN93_USER]
[ro.vendor.md_apps.load_type]: [user]
[ro.vendor.md_apps.load_verno]: [MOLY.LR12A.R3.MP.V140.8.P7]
[ro.vendor.md_apps.support]: [1]
[ro.vendor.md_auto_setup_ims]: [1]
[ro.vendor.md_mims_support]: [2]
[ro.vendor.md_prop_ver]: [1]
[ro.vendor.mediatek.rsc_name]: [default]
[ro.vendor.mediatek.version.branch]: [alps-mp-q0.mp1]
[ro.vendor.mediatek.version.release]: [alps-mp-q0.mp1-V9.196.1_xthink.q0mp1.k61v1.64.bsp_P10]
[ro.vendor.mtk.bt_sap_enable]: [true]
[ro.vendor.mtk_aal_support]: [1]
[ro.vendor.mtk_agps_app]: [1]
[ro.vendor.mtk_audio_alac_support]: [1]
[ro.vendor.mtk_audio_ape_support]: [1]
[ro.vendor.mtk_audio_tuning_tool_ver]: [V2.2]
[ro.vendor.mtk_besloudness_support]: [1]
[ro.vendor.mtk_blulight_def_support]: [1]
[ro.vendor.mtk_c2k_lte_mode]: [0]
[ro.vendor.mtk_camera_app_version]: [2]
[ro.vendor.mtk_config_max_dram_size]: [0x80000000]
[ro.vendor.mtk_data_config]: [1]
[ro.vendor.mtk_eccci_c2k]: [1]
[ro.vendor.mtk_embms_support]: [1]
[ro.vendor.mtk_emmc_support]: [1]
[ro.vendor.mtk_exchange_support]: [1]
[ro.vendor.mtk_external_sim_only_slots]: [0]
[ro.vendor.mtk_f2fs_enable]: [1]
[ro.vendor.mtk_fd_support]: [1]
[ro.vendor.mtk_flv_playback_support]: [1]
[ro.vendor.mtk_gps_support]: [1]
[ro.vendor.mtk_log_hide_gps]: [1]
[ro.vendor.mtk_lte_support]: [1]
[ro.vendor.mtk_md1_support]: [9]
[ro.vendor.mtk_md_world_mode_support]: [1]
[ro.vendor.mtk_mdmi_support]: [1]
[ro.vendor.mtk_omacp_support]: [1]
[ro.vendor.mtk_pq_color_mode]: [1]
[ro.vendor.mtk_pq_support]: [2]
[ro.vendor.mtk_protocol1_rat_config]: [Lf/Lt/W/G]
[ro.vendor.mtk_ps1_rat]: [Lf/Lt/W/G]
[ro.vendor.mtk_ril_mode]: [c6m_1rild]
[ro.vendor.mtk_rild_read_imsi]: [1]
[ro.vendor.mtk_telephony_add_on_policy]: [0]
[ro.vendor.mtk_wappush_support]: [1]
[ro.vendor.mtk_wfd_support]: [1]
[ro.vendor.mtk_widevine_drm_l3_support]: [1]
[ro.vendor.mtk_world_phone_policy]: [0]
[ro.vendor.net.upload.benchmark.default]: [blocking]
[ro.vendor.num_md_protocol]: [2]
[ro.vendor.product.cpu.abilist]: [armeabi-v7a,armeabi]
[ro.vendor.product.cpu.abilist32]: [armeabi-v7a,armeabi]
[ro.vendor.product.cpu.abilist64]: []
[ro.vendor.radio.max.multisim]: [ss]
[ro.vendor.rc]: [/vendor/etc/init/hw/]
[ro.vendor.sim_me_lock_mode]: [0]
[ro.vendor.sim_refresh_reset_by_modem]: [1]
[ro.vendor.sys.current_rsc_path]: [/system/etc/rsc/default]
[ro.vendor.system.mtk_dmc_support]: [1]
[ro.vendor.system.mtk_mapi_support]: [1]
[ro.vendor.system.mtk_mdmi_support]: [1]
[ro.vendor.vnd.current_rsc_path]: [/vendor/etc/rsc/default]
[ro.vendor.wfd.dummy.enable]: [1]
[ro.vendor.wfd.iframesize.level]: [0]
[ro.vendor.wifi.sap.interface]: [ap0]
[ro.vendor.wlan.gen]: [gen2]
[ro.vndk.version]: [29]
[ro.wifi.channels]: []
[ro.x.code.branch]: [cellular]
[ro.x.config.dev_pro]: [5,4,5,4,5,48,12.0,#,#,#,2]
[ro.x.product.model]: [A95M]
[ro.zygote]: [zygote32]
[ro.zygote.preload.enable]: [0]
[security.perf_harden]: [1]
[selinux.restorecon_recursive]: [/data/misc_ce/0]
[service.bootanim.exit]: [1]
[service.sf.present_timestamp]: [1]
[setupwizard.theme]: [glif_v3_light]
[sys.boot.reason]: [cold,powerkey]
[sys.boot.reason.last]: [bootloader]
[sys.boot_completed]: [1]
[sys.factory.hardware.info]: [true]
[sys.ipo.disable]: [1]
[sys.ipo.pwrdncap]: [2]
[sys.isolated_storage_snapshot]: [true]
[sys.logbootcomplete]: [1]
[sys.oem_unlock_allowed]: [1]
[sys.rescue_boot_count]: [1]
[sys.retaildemo.enabled]: [0]
[sys.sysctl.extra_free_kbytes]: [5400]
[sys.system_server.start_count]: [1]
[sys.system_server.start_elapsed]: [12462]
[sys.system_server.start_uptime]: [12462]
[sys.usb.config]: [adb]
[sys.usb.configfs]: [1]
[sys.usb.controller]: [musb-hdrc]
[sys.usb.ffs.aio_compat]: [1]
[sys.usb.ffs.ready]: [1]
[sys.usb.state]: [adb]
[sys.use_memfd]: [false]
[sys.user.0.ce_available]: [true]
[sys.wifitracing.started]: [1]
[sys.x.screenoff.timeout]: [1]
[vendor.MB.running]: [0]
[vendor.audiohal.speech.shm_init]: [1]
[vendor.camera.mdp.cz.enable]: [0]
[vendor.camera.mdp.dre.enable]: [0]
[vendor.connsys.driver.ready]: [yes]
[vendor.connsys.formeta.ready]: [yes]
[vendor.debug.pq.acaltm.dbg]: [0]
[vendor.debug.pq.adl.dbg]: [0]
[vendor.debug.pq.cz.isp.tuning]: [0]
[vendor.debug.pq.dre.dbg]: [0]
[vendor.debug.pq.dre.demowin.x]: [536805376]
[vendor.debug.pq.dre.isp.tuning]: [0]
[vendor.debug.pq.dredriver.blk]: [0]
[vendor.debug.pq.dredriver.dbg]: [0]
[vendor.debug.pq.dshp.en]: [2]
[vendor.debug.pq.hdr.dbg]: [0]
[vendor.debug.pq.hdrdriver.dbg]: [0]
[vendor.debug.pq.hfg.isp.tuning]: [0]
[vendor.debug.pq.shp.en]: [2]
[vendor.gsm.gcf.testmode]: [0]
[vendor.gsm.project.baseband]: [TK_MD_BASIC(LWCTG_R3_6739)]
[vendor.gsm.ril.ct3g]: [0]
[vendor.gsm.ril.eboot]: [0]
[vendor.gsm.ril.fulluicctype]: [USIM]
[vendor.gsm.ril.uicc.mccmnc]: [20404]
[vendor.gsm.ril.uicctype]: [USIM]
[vendor.gsm.serial]: [MQXXA95M220810186E MA95M2208005964 PPP10P]
[vendor.gsm.sim.extended.format1]: [0]
[vendor.gsm.sim.retry.pin1]: [3]
[vendor.gsm.sim.retry.pin2]: [3]
[vendor.gsm.sim.retry.puk1]: [10]
[vendor.gsm.sim.retry.puk2]: [10]
[vendor.gsm.sim.ril.phbready]: [true]
[vendor.gsm.sim.ril.testsim]: [0]
[vendor.gsm.sim.slot.lock.card.valid]: [0]
[vendor.gsm.sim.slot.lock.policy]: [0]
[vendor.gsm.sim.slot.lock.service.capability]: [0]
[vendor.gsm.sim.slot.lock.state]: [1]
[vendor.ims.eims.pdn.info]: []
[vendor.mtk.atci.boot_completed]: [1]
[vendor.mtk.md1.status]: [ready]
[vendor.mtk.nvram.ready]: [1]
[vendor.mtk.vdec.waitkeyframeforplay]: [9]
[vendor.mtk_thumbnail_optimization]: [true]
[vendor.mtkcamapp.cshot.platform]: [-1]
[vendor.net.ims.ipsec.version]: [2.0]
[vendor.ril.active.md]: [9]
[vendor.ril.apc.support]: [1]
[vendor.ril.call.emci_support]: [0]
[vendor.ril.cdma.3g.dualact]: [0]
[vendor.ril.cdma.card.type.1]: [2]
[vendor.ril.data.allow_data_slot]: [0]
[vendor.ril.data.gsm_mcc_mnc0]: [20404]
[vendor.ril.data.gsm_spn0]: [00552E532E2043656C6C756C6172FFFFFF]
[vendor.ril.data.legacy_allow_mode]: [-1]
[vendor.ril.data.pdn_info0]: []
[vendor.ril.data.pnn0]: [430D8555D7D4051A96D9EC3A3B2C07]
[vendor.ril.data.preferred_data_mode]: [1]
[vendor.ril.data.ssc.mode]: [3]
[vendor.ril.disable.eboot]: [0]
[vendor.ril.ecc.service.category.list]: []
[vendor.ril.fd.mode]: [1]
[vendor.ril.ipo.radiooff]: [0]
[vendor.ril.mtk]: [1]
[vendor.ril.mux.ee.md1]: [0]
[vendor.ril.mux.report.case]: [0]
[vendor.ril.mux.start]: [0]
[vendor.ril.muxreport.run]: [0]
[vendor.ril.nw.signalstrength.lte.1]: [2147483647,214748364]
[vendor.ril.nw.worldmode.activemode]: [1]
[vendor.ril.nw.worldmode.keep_3g_mode]: [0]
[vendor.ril.rc.session.id1]: [-1]
[vendor.ril.sim.onoff.state1]: [11]
[vendor.ril.sim.onoff.support]: [1]
[vendor.ril.simswitch.no_reset_support]: [1]
[vendor.ril.simswitch.tpluswsupport]: [1]
[vendor.ril.special.ecclist]: []
[vendor.rild.libargs]: [-d /dev/ttyC0]
[vendor.rild.libpath]: [mtk-ril.so]
[vendor.service.nvram_init]: [Ready]
[vendor.trustkernel.fs.mode]: [3]
[vendor.trustkernel.fs.state]: [ready]
[vendor.trustkernel.keybox.deployed]: [true]
[vendor.trustkernel.log.state]: [enable]
[vendor.trustkernel.productionline.state]: [ready]
[vendor.trustkernel.ready]: [true]
[vold.has_adoptable]: [1]
[vold.has_quota]: [1]
[vold.has_reserved]: [1]
[vold.post_fs_data_done]: [1]
[wifi.direct.interface]: [p2p0]
[wifi.interface]: [wlan0]
[wifi.tethering.interface]: [ap0]
[xthink.factorytest.camera_main2_info]: [
]
[xthink.factorytest.camera_main_info]: [
]
[xthink.factorytest.camera_sub2_info]: [
]
[xthink.factorytest.camera_sub_info]: [
]
[xthink.factorytest.chip]: [FT6336d003
]
[xthink.factorytest.emmcvendor]: [1501005145363342420]
[xthink.factorytest.firmware]: [0x05
]
[xthink.factorytest.mtk_fb_panel_name]: [GC9503_CMI
]
Current Battery Service state:
AC powered: false
USB powered: true
Wireless powered: false
Max charging current: 500000
Max charging voltage: 5000000
Charge counter: 998200
status: 2
health: 2
present: true
level: 46
scale: 100
voltage: 4108
temperature: 351
technology: Li-ion
UNLOCK.MX
comando adb # ls - la
Comandos adb
Serrano
C:\adb
λ adb shell
1|HPP-L55B:/ $ ls -la
ls: ./init.rc: Permission denied
ls: ./init.usb.rc: Permission denied
ls: ./ueventd.rc: Permission denied
ls: ./init.zygote32.rc: Permission denied
ls: ./init: Permission denied
ls: ./init.environ.rc: Permission denied
ls: ./init.usb.configfs.rc: Permission denied
ls: ./metadata: Permission denied
total 68
drwxr-xr-x 21 root root 4096 2008-12-31 19:00 .
drwxr-xr-x 21 root root 4096 2008-12-31 19:00 ..
dr-xr-xr-x 80 root root 0 2009-12-31 19:01 acct
drwxr-xr-x 16 root root 320 2009-12-31 19:01 apex
lrw-r--r-- 1 root root 11 2008-12-31 19:00 bin -> /system/bin
lrw-r--r-- 1 root root 50 2008-12-31 19:00 bugreports -> /data/user_de/0/com.android.shell/files/bugreports
drwxrwx--- 6 system cache 4096 2022-04-30 00:16 cache
lrw-r--r-- 1 root root 19 2008-12-31 19:00 charger -> /system/bin/charger
drwxr-xr-x 4 root root 0 1969-12-31 19:00 config
lrw-r--r-- 1 root root 17 2008-12-31 19:00 d -> /sys/kernel/debug
drwxrwx--x 52 system system 4096 2022-04-29 23:59 data
drwxr-xr-x 2 root root 4096 2008-12-31 19:00 debug_ramdisk
lrw------- 1 root root 23 2008-12-31 19:00 default.prop -> system/etc/prop.default
drwxr-xr-x 21 root root 4360 2009-12-31 19:01 dev
lrw-r--r-- 1 root root 11 2008-12-31 19:00 etc -> /system/etc
drwx------ 2 root root 16384 2008-12-31 19:00 lost+found
drwxr-xr-x 13 root system 280 2009-12-31 19:01 mnt
drwxr-xr-x 2 root root 4096 2008-12-31 19:00 odm
drwxr-xr-x 2 root root 4096 2008-12-31 19:00 oem
dr-xr-xr-x 467 root root 0 1969-12-31 19:00 proc
drwxr-xr-x 11 root root 4096 2008-12-31 19:00 product
lrw-r--r-- 1 root root 24 2008-12-31 19:00 product_services -> /system/product_services
drwxr-x--- 2 root shell 4096 2008-12-31 19:00 sbin
lrw-r--r-- 1 root root 21 2008-12-31 19:00 sdcard -> /storage/self/primary
drwxr-xr-x 4 root root 100 2022-04-29 23:59 storage
dr-xr-xr-x 15 root root 0 2009-12-31 19:01 sys
drwxr-xr-x 13 root root 4096 2008-12-31 19:00 system
drwxr-xr-x 12 root shell 4096 2008-12-31 19:00 vendor
Best Regard
UNLOCK.MX
MWORKER Tool Motorola G POWER 2021 XT2117-1 Cricket Unlock Done
Unlock Done
35 Creditos - MWORKER TOOL
Motorola G POWER 2021 XT2117-1 Cricket
Starting Factory Enabler process...
Waiting for device in Fastboot Mode....Done.
Reading Data....Done
UNLOCK.MX....Done
Firmware: RZBS31.Q2-143-27-4
Android: 11
CPU: SM_KAMORTA_H 1.0
Model: XT2117-1
SN: ZD2223P8JP
IMEI: 3510165622XXXXX
Channel ID: 0x89
Carrier: cricket
Factory Mode: disabled
Reading Data ... Done
Creating Order ID....Done
Operation ID: 1591488
Sending Data to Server ... Done
Setting Factory Mode ... Done
Rebooting Phone ... Done
Elapsed Time: 0:15.08

Waiting for Device in Factory Mode.....Found!
Reading Data...Done
UNLOCK.MX....Done
FSG: BORNEO_NA_CUST
Firmware: RZBS31.Q2-143-27-4
Android Version: 11
Model: G POWER (2021)
SKU: XT2117-1
SN: ZD2223P8JP
IMEI 1: 3510165622XXXXX
Carrier: cricket
Creating Order ID....Done
Operation ID: 1591492
Erasing UTAG IMEI ... Done
Reading Device Configuration ... Done
Wiping IMEI ... Done
Writing New Security ... Done.
Writing IMEI ... Done
New IMEI 1: 3510165622XXXXX
Writing New Security ... Done.
Writing UTAG IMEI ... Done
Erasing Factory Mode ... Done
Rebooting to Fastboot ... Done
Elapsed Time: 0:38.88
UNLOCK.MX & MULTI-UNLOCK.COM


Motorola E32 XT2227-1 FRP al Instante by Unlocktool
FORMAT DATA Selected Platform : Tiger T606_64_Bypass
Waiting for device... COM14 (SPRD U2S Diag)
USB : USB\VID_1782&PID_4D00\5&14A7B65B&0&1
Initializing loader... OK
Protocol : SPRD3
Unlock.Mx .... OK
Sending payload... OK
Sending auth data... OK
Sending preloader1... OK
Sending preloader2... OK
Booting loader, please wait... OK
Boot ver: Spreadtrum Boot Block version 1.1
Sending FDL1... OK
Sending FDL2... OK
Reading partitions info... OK
Reading device info... OK
Model Name : moto e32
Product Name : hawaii
Manufacturer : motorola
Android Version : 11
Security Patch : 2023-01-05
Build ID : RORS31.335-20-2 release-keys
Build Date : Tue Jan 3 15:58:16 CST 2023
Erasing FRP... OK
Erasing USERDATA... OK
UNLOCKTOOL 2023.05.25.0
Elapsed time : 22 seconds
Venta de creditos y Activaciones
UNLOCK.MX & MULTI-UNLOCK.COM
Desde 2006
Whatsapp: +523781040103

FRP Motorola MOTO G PLAY 2023 XT2271-5 al instante
Aqui les dejo como quitar cuenta google en segundos
Presionar volumen abajo + Insertar cable USB para ponerlo en fastboot
Start FRP Unlock Task on 25/05/2023 3:47:41 PM -07:00
Waiting for device arrival.... OK
Model SKU: XT2271-5
Carrier: RETUS
Serial: ZY22GJSLVX
Authorizing FRP Access...OK
Reboot bootloader...OK
Waiting for device arrival.... OK
Erasing FRP...OK
Erasing UserData...OK
Erasing Cache...OK
Final Step...OK
Rebooting...OK
FRP Unlock Task Successful!
Venta de creditos en WWW.UNLOCK.MX para quitar cuenta google

Samsung SM-G950U S8 Read Unlock Code by Samkey al Instante
Venta de Codigos para Sameky en Unlock.mx
Searching for SAMSUNG Mobile USB Modem...OK
SAMSUNG USB Modem detected on [COM17]
Looking for DEVICE.....OK
Reading USB MODEM information...OK
MODEL : SM-G950U
VER : G950USQS8DTJ1/G950UOYN8DTJ1/G950USQS8DTJ1/G950USQS8DTJ1
IMEI : 35772308000XXXX
S/N : R38J307AX7
U/N : 988829344639364
Algorithm : MSM Crypto Engine
Loading ADB module.OK
Starting ADB module...OK
Searching for SAMSUNG ADB device...OK
Checking device authorization...OK
Reading ADB device information...
Device Model : SM-G950U
ADB Serial Number : 988829344639364538
AP Ver : G950USQS8DTJ1
CP Ver : G950USQS8DTJ1
CSC Ver : G950UOYN8DTJ1
Carrier : ATT
Android Ver : 9
RIL Type : Android 9 New SDK
Country : USA
Shipping : ATT
IMEI : 35772308000XXXX
Debug Level : HIGH [0X4948]
CP Debug Level : OK [0X5500]
Setting USB Settings to [diag,acm,adb] automatically...OK
Searching for SAMSUNG Diagnostic Port...[COM19]...OK
QC SW Rev : MPSS.AT.2.0.c5-00769-8998_GEN_PACK-1.327187.1
Release : Oct 7 202010:07:26Aug 25 202007:00:008998
Checking DIAG security...[COM19]...OK
Waiting for UPLOAD MODE...[COM21]...OK
Preparing to read data...OK
Reading RAM data...[S1:OK]..[N3:OK]....[N4:OK]...OK
Rebooting device to NORMAL mode...OK
Searching HASH signature...[HSU:NA]...SKIP
Searching security HMAC...[CRT:NA]...OK
Calculating...[IDX0:OK]...[HASH:OK]...[PLN:NA]...OK
Validating security data...OK
Sending data to SERVER...OK
Waiting for SERVER response (May take few minutes)...OK
SamKEY Team (2017-2022)

MULTI-UNLOCK.COM & UNLOCK.MX
FRP Samsung *#0*#
Bajar Software desde este links de cualquiera de los dos pueden
https://www.mediafire.com/file/552rnm5hzqrw2lw/SamFwToolSetup_v4.4.zip/file
Despues de instalar el software ocupan ir a esta url
C:\SamFwTool\data
buscar el archivo adb.exe lo seleccionan copiar y pegar lo van a renombrar la copia en adbsl.exe para que pueda abrir el software SamFwTool
SamFw Tool 4.4
[XIAOMI]
[EDL 9008] - Add support Blackshark 3, Mi Max 2, Mi Max 3, Mi 6, Mi 6X, Mi 8, Mi Mix 2, Mi Pad 4, Redmi Note 5/6/7, Redmi S2
- Add support Factory reset/Reset FRP/Reset Micloud
- Fix Windows 7 error
- Optimize execute size
- Update new C++ download links
- Fix some bugs
No device selected
Using port SAMSUNG Mobile USB Modem #6 (COM16)
Reading info mode MTP ... OK
Model : SM-J327T1
CSC : TMK
AP version : J327T1UVS4ASH2
BL version : J327T1UVS4ASH2
CP version : J327T1UVS4ASH2
CSC version : J327T1TMK4ASH2
IMEI : 3556030888XXXXX
SN : R28J527RSPT
Lock status : NONE
MCC : 334
MNC : 020
USB mode : AT,MTP
Unique number : CQ300934BE0BE44
Android version : 7.0
FRP status : LOCKED
Firmware : https://samfw.com/firmware/SM-J327T1/TMK
Using port SAMSUNG Mobile USB Modem #6 (COM16)
Sending ADB exploit (normal)... OK
Sending ADB exploit (normal)... OK
Sending ADB exploit (normal)... OK
Sending ADB exploit (normal)... The port 'COM16' does not exist.
OK
Please click to the allow USB Debugging on the screen. If not apprear, unplug and replug the cable
Waiting for device
Removing... OK

MULTI-UNLOCK.COM & UNLOCK.MX
UnlockTool Licencia al Instante 3 Meses - 6 Meses - 12 Meses
Activacion de UnlockTool al Instante
Licencia
- 3 Meses $ 422.08 MXN
- 6 Meses $ 609.08 MXN
- 12 Meses $ 938.81 MXN
El Mejor precio lo encontraras con nosotros

UNLOCK.MX & MULTI-UNLOCK.COM
IMSI CODE FULL LIST
IMSI CODE
MAIN COUNTRIES CARRIER IMSI CODE LIST
Spectrum 2040438 or 3115803 or 3134500 Viaero 3104500 Sprint(CDMA) 3160101 3160100 Gci 3113700 Cable&Wireless Lime 3461401 GSM/vzw 3101500 Sprint 3101200 Cricket 3101500 Virgin 3160101 Straight Talk 2040400 T-Mobile iPhone5 3102605 Wireless Alaska 3113700 T-Mobile 3102620 Tracfone 3114801 MetroPCS 3102600 Total Wireless 3114803 Consumer Celullar 3115804 Straight Talk 3114801 Boost Mobile 3160101 3160100 Xfinity2040438 US Cellular 3115801 TracFone/Straight talk 3114801 At&t USA 3104101 Cricket 3101508 T-Mobile 3102605 Sprint 3101200 Verizon/Xfinity 2040400,2040438 GCI 3113700 Claro puerto rico 3301104 | |||||
COUNTRY | NETWORK | IMSI 1 | IMSI 2 | IMSI 3 | IMSI 4 |
Albania | Albanian Mobile | 2760111 | |||
Albania | Eagle Mobile | 2760311 | |||
Albania | Vodafone | 2760211 | |||
Albania | Plus Al | 2760411 | |||
Algeria | AlgeTel | 6030111 | |||
Algeria | Nedjma | 6030311 | |||
Algeria | Orascom | 6030211 | |||
Andorra | mobiland | 2130311 | |||
Angola | Unitel | 6310211 | |||
Anguilla | Cabl&wi | 3654011 | |||
Anguilla | Mossel | 3650511 | |||
Anguilla | Weblink | 3651011 | |||
Argentina | Claro | 7161003 | |||
Argentina | compala | 7161003 | |||
Argentina | CTI | 7223101 | |||
Argentina | Movistar | 7220104 | |||
Argentina | Nextel | 7220211 | |||
Argentina | Nextel2 | 7222011 | |||
Argentina | Telecom | 7223411 | |||
Argentina | Telefoni | 7220711 | |||
Argentina | Telfonic | 7227011 | |||
Armenia | Armentel | 2830134 | |||
Armenia | Karabakh | 2830434 | |||
Armenia | Orange | 2831034 | |||
Armenia | Vivacell | 2830534 | |||
Australia | 3 | 5050610 | |||
Australia | Optus | 5050210 | |||
Australia | Vodafone | 5050390 | |||
Australia | 3GIS | 5051570 | |||
Australia | AAPT | 5051470 | |||
Australia | Advan | 5052470 | |||
Australia | Localstar | 5058870 | |||
Australia | One | 5050870 | |||
Australia | OZITEL | 5050534 | |||
Australia | Telstra71 | 5057170 | |||
Australia | Telstra72 | 5057270 | |||
Australia | Telstra11 | 5051170 | |||
Australia | Telstra | 5050134 | |||
Austria | 3Hutch | 2321070 | |||
Austria | A1 Telekom | 2320170 | 2320100 | 2320186 | |
Austria | Barabl | 2321570 | |||
Austria | BobA1 | 2321170 | |||
Austria | OneOra | 2320570 | |||
Austria | Teleri | 2320770 | |||
Austria | T-mobi le | 2320370 | 2320328 | ||
Austria | yesOra | 2321270 | |||
Austria | Orange | 2320588 | |||
Austria | Three | 2321069 | |||
Aux-Airnet | Airnet | 5050970 | |||
Aux-Depart | Depart | 5050434 | |||
Belarus | Best | 2570434 | |||
Belarus | MDC | 2570134 | |||
Belarus | MTS | 2270234 | |||
Belgium | Base | 2061034 | |||
Belgium | Globul | 2060534 | |||
Belgium | mobistar | 2061034 | |||
Belgium | Proximus | 2060134 | 2060122 | ||
Belgium | Ortel | 2062050 | |||
Bulgaria | MTel | 2840179 | 2840189 | ||
Bulgaria | Vivacom | 2840310 | |||
Bulgaria | Globul | 2840510 | 2840500 | ||
Canada | BELL610 | 3026104 | |||
Canada | Bellpacific | 3101703 | 3026103 | ||
Canada | Fido | 3023704 | 3023703 | ||
Canada | Rogers | 3027204 | 3027203 | ||
Canada | Telus220 | 3022204 | 3022203 | ||
Canada | MTS | 3026600 | |||
Canada | Virgin | 3026102 | |||
CGI | USA | 3113700 | |||
Chile | Claro | 7300304 | |||
Chile | Entel | 7300104 | |||
Chile | Entel10 | 7301004 | |||
Chile | Movistar | 7300204 | |||
China | Mobile | 4600202 | |||
China | Unicom | 4600158 | |||
China | Telecom China | 2040438 | |||
Colombia | ColomTel | 7320014 | |||
Colombia | Comcel | 7321014 | |||
Colombia | Edatel | 7320024 | |||
Colombia | Movista3 | 7321234 | |||
Colombia | Movistar | 7321024 | |||
Colombia | Tigo1 | 7321114 | |||
Colombia | Tigo3 | 7321034 | |||
Croatia | T-Mobile | 2190199 | |||
Croatia | VIP | 2191065 | |||
Czech | Mobikom | 2300434 | |||
Czech | O2telefh | 2300234 | |||
Czech | Sprava | 2309834 | |||
Czech | Tmobi | 2300134 | |||
Czech | Vodafone | 2300334 | |||
Czech | Vodaf2 | 2309934 | |||
Denmark | TM | 2620125 | |||
Denmark | Demark | 2382010 | |||
Denmark | APS | 2380534 | |||
Denmark | Barablu | 2380734 | 2380734 | ||
Denmark | H3G | 2380634 | |||
Denmark | 3 | 2380632 | |||
Denmark | Telen | 2380241 | |||
Denmark | MiGway | 2380334 | |||
Denmark | TDC | 2380134 | |||
Denmark | TDC2 | 2381034 | |||
Denmark | Telenor | 2387734 | 2380234 | ||
Denmark | Telia | 2382034 | |||
Denmark | Telia30 | 2383034 | |||
Dominican | Movil | 7321234 | |||
Ecuador | Alegro | 7400234 | |||
Ecuador | Movista | 7400034 | |||
Ecuador | Porta | 7400134 | |||
Egypt | Mobinil | 6020111 | 8920016 | ||
Egypt | Vodafone | 6020211 | |||
Egypt | Etisalat | 6020311 | |||
El Salvador | Claro/CTE | 7061034 | |||
El Salvador | CTE/Claro | 7060134 | |||
El Salvador | Digice | 7060234 | |||
El Salvador | Movita | 7060434 | |||
El Salvador | Telemo | 7060334 | |||
Estonia | EMT | 2480134 | |||
Finland | NDA | 2440311 | 2441211 | 2440367 | |
Finland | Sonera | 2449111 | |||
France | Bouygues | 2082136 | 2082015 | ||
France | BT | 2082031 | |||
France | Orange | 2080189 | 2080131 | ||
France | Bouygues20 | 2082011 | |||
France | Bouygues21 | 2082111 | |||
France | Bouygues88 | 2088811 | |||
France | Orange01 | 2080111 | |||
France | Orange02 | 2080211 | |||
France | SFR10 | 2081011 | |||
France | SFR11 | 2081111 | |||
France | SFR | 2081031 | |||
France | SFR | 2081003 | |||
France | Virgin | 2080191 | |||
Germany | T-mobile | 2620111 | 2620125 | 2620155 | 2620166 |
Germany | Vodafone | 2620208 | |||
Greece | Cosmote | 2020134 | |||
Greece | QTelecom | 2020934 | |||
Greece | Vodafone | 2020534 | |||
Greece | Wind | 2021034 | |||
Honduras | Claro | 7080111 | |||
Hungary | T-mobile | 2163011 | 2163000 | ||
Hungary | Vodafone | 2167000 | |||
India | Airtel02 | 4040211 | |||
India | Vodaf01 | 4040111 | |||
India | Vodaf05 | 4040511 | |||
India | Vodaf46 | 4044611 | |||
Ireland | Vodafone | 2720110 | 2720172 | ||
Ireland | O2 | 2720211 | 2720231 | ||
Ireland | E-Mobile | 2720320 | |||
Ireland | Meteor | 2720303 | |||
Ireland | 3 | 2720500 | 272536 | ||
Italy | Blu | 2229834 | |||
Italy | Elsacom | 2220234 | |||
Italy | H3G | 2229934 | |||
Italy | IPSE | 2227734 | |||
Italy | Telecom | 2220134 | |||
Italy | TIM | 2220134 | 2220195 | ||
Italy | Vodafone | 2221034 | |||
Italy | Wind | 2228834 | |||
Japan | AU Kiddi 4s | 4540492 | |||
Japan | AU Kiddi 5g | 4405000 | |||
Japan | Softbank 4s/5g | 4402081 | |||
JAPAN | AU KDDI iPhone5 | 4405014 | 4405000 | ||
Jordan | Orange | 4167711 | |||
Korea | Telecome | 4500826 | |||
Liechtenstein | Orange | 2950211 | |||
Liechtenstein | Swisco | 2950111 | |||
Lithuania | OMNITEL | 2460165 | |||
Lithuania | OMNITEL | 2460165 | |||
Luxembourg | Luxgsm | 2700101 | |||
Luxembourg | Tango | 2707701 | |||
Luxembourg | Voxmobi | 2709901 | |||
Macao | China | 4550234 | |||
Macao | CMT | 4550134 | |||
Macao | Hutchis | 4550534 | |||
Macao | SmartT | 4550034 | |||
Macedonia | Vip | 2940387 | |||
Macedonia | One(Ex-Cosmofon) | 2940200 | |||
Macedonia | T-Mobile | 2940102 | |||
Mexico | Telcel | 3340202 | 3340200 | 3340300 | |
Mexico | Nextel | 3340100 | |||
Mexico | Lusacell | 3340500 | |||
Mexico | Movistar | 3340300 | |||
Mexico | America Movil | 3340202 | |||
Moldova | Orange | 2590101 | |||
Montenegro | T-Mobile | 2970200 | |||
Netherland | T-Mobile | 2041611 | |||
Netherland | Reserve | 5300134 | |||
Netherland | Vodafone | 2040438 | |||
New Zeland | Econet | 5302834 | |||
New Zeland | Nzcomunic | 5302434 | |||
New Zeland | Telecom | 5300534 | |||
New Zeland | Teltracle | 5300434 | |||
New Zeland | Vodafone | 5300134 | 5300166 | ||
New Zeland | Woosh | 5300334 | |||
Norway | Netcom | 2420211 | |||
Norway | Telenor | 2420111 | |||
Norway | Tele2 | 2400768 | |||
Peru | Claro | 7161011 | |||
Peru | TIM | 7161011 | |||
Philipine | GB | 5150220 | |||
Philipine | SM | 5150303 | |||
Philipine | Sun | 5150509 | |||
Philipine | Globe | 5150211 | |||
Poland | Era | 2600211 | |||
Poland | Orange | 2600311 | 2600300 | ||
Poland | T-Mobile | 2600200 | |||
Portugal | Optimus | 2680311 | |||
Portugal | Vodafone | 2680111 | |||
Portugal | TMN | 2680611 | |||
Romania | Vodafone | 2260107 | |||
Romania | Orange | 2261007 | |||
Romania | Cosmote | 2260307 | |||
Romania | ZAPP | 2260407 | |||
Russian | Beeline28 | 2502834 | |||
Russian | Beeline99 | 2509934 | |||
Russian | Megafon | 2500234 | |||
Russian | MTS10 | 2501034 | |||
Russian | Telecom | 2509334 | |||
SaudiArabia | EAE | 4200734 | |||
SaudiArabia | Mobily | 4200334 | |||
SaudiArabia | STC | 4200134 | |||
SaudiArabia | ZainSA | 4200434 | |||
Slovakia | T-Mobile 2 | 2310411 | |||
Slovakia | Eurotel 2 | 2310234 | |||
Slovakia | Orange | 2310134 | |||
Slovakia | Orange UMT | 2310534 | |||
Slovakia | Orange UMT2 | 2311534 | |||
Slovakia | TeleficO2 | 2310634 | |||
Slovakia | Vodacom | 6550134 | |||
Slovenia | Si-Mobile | 2934001 | |||
Spain | Movistar | 2140711 | 2140785 | ||
Spain | Orange | 2140333 | |||
Spain | Vodafone | 2140198 | 2140130 | ||
Spain | Yoigo | 2140401 | |||
Sweden | 3 | 2400200 | 2400232 | ||
Sweden | Telia | 2400111 | |||
Sweden | Tele2 | 2400700 | 2400782 | ||
Sweden | Telia | 2400100 | 2400111 | ||
Sweden | Telenor | 2400885 | |||
Switzerland | Swisscom | 2280167 | |||
Switzerland | Orange | 2280311 | 2280300 | ||
Switzerland | Sunrise | 2280200 | |||
Switzerland | Swiscom | 2280111 | |||
Switzerland | Sunrise | 2280211 | 2280167 | 2280203 | |
Switzerland | Swiscom (unoffical) | 2280121 | |||
Taiwan | Chungwa | 4669234 | |||
Turkey | Turcell | 2860134 | |||
Turkey | Vodafone | 2860211 | |||
Turkey | Vodafone | 2862034 | |||
UAE | DU | 4240334 | |||
UAE | ETisal | 4240234 | |||
UK | 3 | 2342091 | 2342073 | ||
UK | O2 | 2341091 | |||
UK | Orange/T-Mobile | 2343320 | 2343091 | 2343302 | |
UK | Vodafone 2 | 2341590 | |||
UK | O2 – 2 | 2340211 | |||
UK | Orange33 | 2343334 | |||
UK | T-Mobile | 2343091 | 2343302 | ||
UK | Orange | 2343091 | 2343302 | ||
UK | EE | 2343091 | 2343302 | ||
UK | Vectone | 2340100 | |||
Uruguay | CTimov | 7481011 | |||
Uruguay | Movistar | 7480711 | |||
Uruguay | Antel | 7480111 | |||
USA | AT&T | 3104101 | |||
USA | Verizon | 2040400 | |||
USA | Sprint(CDMA) | 3160101 | 3160100 | ||
USA | Cable&Wireless Lime | 3461401 | |||
USA | Sprint iPhone5 | 3101200 | |||
USA | Cricket | 2040400 | |||
USA | Virgin iPhone5 | 3101200 | 3160101 | ||
USA | Straight Talk | 2040400 | |||
USA | T-Mobile iPhone5 | 3102605 | |||
USA | Wireless Alaska | 3113700 | |||
USA | T-Mobile | 3102620 | |||
USA | Tracfone | 3114801 | |||
USA | MetroPCS | 3102600 | |||
USA | Total Wireless | 3114801 | |||
USA | Consumer Celullar | 3104101 | 3102620 | ||
USA | Straight Talk | 3114801 | |||
USA | Boost Mobile | 3160101 | 3160100 | ||
USA | Xfinity | 2040400 | |||
Venezuela | Movistar | 7340486 | |||
Venezuela | Digitel | 7340100 | 7340200 | 7340300 | |
Venezuela | Movilnet | 7340600 | |||
Venezuela | Telefonica | 7340400 |
KEY Tool creditos al instante
Venta de creditos para Key Tool Samsung
KEY-TOOL [ Samsung ] Direct UnLock / Change CSC
MULTI-UNLOCK.COM & UNLOCK.MX
Z3X Box Server Creditos al instante
Venta de creditos para liberar via SERVER
- Refill credits
- 30 Credits Packs
- 50 Credits Packs
Z3X BOX Server Credits Powered by Z3X [30,50 Credits Packs]
MULTI-UNLOCK.COM & UNLOCK.MX
General Unlocker Creditos al Intante
General Unlocker Venta de creditos al instate
GENERAL UNLOCKER PRO
MULTI-UNLOCK.COM & UNLOCK.MX
NCK BOX DONGLE Activation al Instante
Venta de activation 12 Meses NCK BOX & DONGLE
NCK BOX/DONGLE 1 YEAR ACTIVATION
MULTI-UNLOCK.COM & UNLOCK.MX
UMT ULTIMATE MULTI TOOL Activation al Instante
Venta de Activacion 12 Meses
UMT [ULTIMATE MULTI TOOL 1 YEAR ACTIVATION]
MULTI-UNLOCK.COM & UNLOCK.MX
MAGICTOOL Creditos al Instante
Magic Tool Creditos
TOOL PRICES
- REPAIR IMEI 15 CRD
- NETWORK UNLOCK 15 CRD
- FACTORY ENABLE FREE
- FRP PHONE 5 CRD
- MDM PHONE 5 CRD
- READ NCK 1 CRD
- FIX IMEI 0 FREE
- WRITE SKU FREE
MAGICTOOL CREDITS - [ Repair IMEI, Factory Enable, MDM ,FRP , UNLOCK]
MULTI-UNLOCK.COM & UNLOCK.MX
GuerraTool Creditos al Instante
Necesitas creditos en unlock.mx te los entregamos al instante
Guerra Tool
Motorola MTK/SPD
- Repair IMEI
- Frp Phone
- Network Unlock
- Read Nck
- MDM Phone
MULTI-UNLOCK.COM & UNLOCK.MX
EVTOOL Activation al Instante
Activación Software EVTOOL al instante
- Licencia 3 Meses
- Licencia 6 Meses
- Licencia 12 Meses
EVTOOL ACTIVATION - XIAMOI,OPPO,REALME,VIVO [ERASE FRP,UNLOCK BOOTLOADER,FACTORY RESET,REAPIR NETWORK]
MULTI-UNLOCK.COM & UNLOCK.MX
Global Unlocker Pro Creditos al Instante
Venta de creditos Global Unlocker Pro entregamos al instante
- Samsung
- LG
- Motorola
- Alcatel
- TINNO
- Google Pixel
- 1+ ONEPLUS
- ZTE
- CooldPad
- Wiko
- MEDIATEK
- FIH
- DISH
- XIAOMI
- T-MOBILE
- NOKIA
Unlock , Repair , Bypass
Just One Click
professional skills Not needed.
MULTI-UNLOCK.COM & UNLOCK.MX
T-Unlock Creditos al Instante
Venta de Creditos al instante T-Unlock Software
- TINNO
- LG
- MOTOROLA
- SAMSUNG
- ZTE
- 1+ ONE PLUS
★★★★★Direct UnLock★★★★★
MULTI-UNLOCK.COM & UNLOCK.MX
Lista de Herramientas JTAG ★★★★★
- EASY JTAG PLUS
- RIFF BOX V2 BY LEGIJA
- Octoplus Pro Jtag
- Medusa Pro Jtag
- ORT JTAG Pro Edition
- UFI UFS ToolBox
eMMC, Jtag, ISP, SPI, NAND protocols, UFS Chip, forensic tools.
MULTI-UNLOCK.COM & UNLOCK.MX
Contactanos
Ing. Francisco Morales
Celular/WhatsApp: 3781040103
Location: Jalisco
Ventas Unlock.mx : 3471111348
+ 15,000 Clientes atendidos desde 2006 en todo México - América del Sur - USA - Canadá - Europa - Asia
MULTI-UNLOCK.COM desde 2006
UNLOCK.MX desde 2009
SamKEY MTK Direct Unlock and Repair Dead Phones by one click
Venta de Creditos en www.unlock.mx registrate para poder comprar
SamKEY MTK Does NOT Require TestPoint Anymore
ALL SUPPORTED MODELS WITHOUT TESTPOINT
SAFE & UP TO DATE
What's New v1.08.5
- Added definition for NEW UNSUPPORTED DEVICES/FIRMWARES:
- S127DL : S127DLUDU6CVG4, S127DLUDS7CVI1 and newer...
- S326DL : S326DLUDU7BVI1 and newer...
- A037U : A037USQS3BVI2 and newer (XAU, APP, AIO Only)
- A136U : A136USQS3BVI1 and newer (XAU, APP, AIO Only)
- A215U : A215USQS8CVI6 and newer (XAU, APP, AIO Only)
What's New v1.07.5
- Added support for A326U, A326U1, S326DL WITHOUT TESTPOINT
What's New v1.06.5
- Added support for S326DL (Galaxy A32 5G) FULL PERMANENT UNLOCK
- Added support for A326U, A326U1 (Galaxy A32 5G) ATT, CHA, CCT FULL PERMANENT UNLOCK
- Added support for A326U, A326U1 (Galaxy A32 5G) TMB, TMK, APP, VZW, AIO, BST, SPR, DSH (MUST ENTER 16 ZERO's AT EVERY POWER UP)
- Added support for A037F, A037M (Galaxy A03s) FULL PERMANENT UNLOCK
- Added support for A136U, A136U1 (Galaxy A13 5G) TMB, TMK, APP, VZW, AIO (MUST ENTER 0000000000000000 CODE AT EVERY POWER UP)
- Added support for A215U, A215U1 (Galaxy A21) TMB, TMK, APP, VZW, AIO (MUST ENTER 0000000000000000 CODE AT EVERY POWER UP)
- Added support for A037U, A037U1 (Galaxy A03s) TMB, TMK, APP, VZW, DSH, AIO (MUST ENTER 0000000000000000 CODE AT EVERY POWER UP)
- Added support for T227U (Galaxy Tab A7 Lite) XAU, TMB, TMK, AIO, DSH, VZW (MUST ENTER 0000000000000000 CODE AT EVERY POWER UP!
History:
- Added support for A136U (Galaxy A13) CCT, ATT, CHA FULL PERMANENT UNLOCK
- Added support for T227U (Galaxy Tab A7 Lite) CCT, ATT, CHA FULL PERMANENT UNLOCK
- Added support for A037U (Galaxy A03s) CCT, ATT, CHA FULL PERMANENT UNLOCK
- Added support for A037U1 (Galaxy A03s) CCT, ATT, CHA, BAA FULL PERMANENT UNLOCK
- Added support for A125U (Galaxy A12) ALL CARRIERS FULL PERMANENT UNLOCK
- Added support for A125U1 (Galaxy A12) ALL CARRIERS FULL PERMANENT UNLOCK
- Added support for A215U (Galaxy A21) CCT, ATT, CHA FULL PERMANENT UNLOCK
- Added support for A215U1 (Galaxy A21) CCT, ATT, CHA, BAA FULL PERMANENT UNLOCK
- Added support for S127DL (Galaxy A12) FULL PERMANENT UNLOCK
- Added support for S215DL (Galaxy A21) FULL PERMANENT UNLOCK
Attention : NEVER DELETE BACKUP FOLDER! SamKEY Team take no responsibility if BACKUP folder delete!
Attention :
It is obligatory to keep minimum of 5 credits in your account in order to use Restore and Repair functions, But they consume 0 credit.
WARNING : IF YOU TRY UN-SUPPORTED MODEL BY SAMKEY MTK, WE WILL NEVER REFUND!
DOWNLOAD TUTORIAL (How to Fix MTK Drivers)
(LibUsb - Automatic Installation)
(INF Files - Manual Installation or Repair Drivers)
Password for ZIP = samkey
MULTI-UNLOCK.COM & UNLOCK.MX
Que necesito para reparar un celular
- Cautin con punta delgada
- Pistola de Calor que regule el aire y temperatura
- Soldadura muy delgada
- Flux
- Alcohol Isopropilico
- Cepillo antiestatico
- Juego de desarmadores
- Malla para desoldar
- Extractor de Soldadura
- Multimetro
- Cinta termica para soldar
- Fuente de poder
- Microscopio con luz
- Tapete antiestatico
MULTI-UNLOCK.COM & UNLOCK.MX
Como Instalar DC Unlocker ★★★★★
Link para descargar software
Distribuidor Oficial en Mexico = MULTI-UNLOCK
Liberar Modem y Celulares
Costos https://www.dc-unlocker.com/buy/user_prices

MULTI-UNLOCK.COM & UNLOCK.MX
Como instalar Hcu Client ★★★★★
Link para bajar software
Distribuidor Oficial en Mexico = MULTI-UNLOCK
venta de creditos al instante
Features
Supported models list
- Supported 500+ Huawei models and modifications
- Supported Hisilicon, Quallcom, MTK CPU’s
- Repair IMEI, IMEI2
- Repair CDMA MEID, SUB IMEI
- Repair WIFI, Bluetooth
- Repair SN
- Repair Vendor, Country
- Read unlock codes,Unlock
- Read bootloader code, Lock bootloader
- Unlock FRP
- Repair/Flash by DC Phoenix with HCU license
- Full supported models list

MULTI-UNLOCK.COM & UNLOCK.MX
Liberar Samsung SamKEY MTK SPR TMO CodeReader
Link para bajar los software
Creditos disponibles para entrega al instante
SamKEY MTK
SamKEY SPR
SamKEY TMO
SamKEY CodeReader

MULTI-UNLOCK.COM & UNLOCK.MX
Sim Unlocker Pro
Link para descargar Software y Drivers
https://mega.nz/folder/PXARXYgT#yd6wqbEAn88WaFsdPhvrCw
venta de creditos y crear cuenta para empezar a liberar celulares en Unlock.Mx
Buscar Servicio - Sim-Unlocker Pro Credit Create New Account
si ya tienes cuenta y solo requieres mas creditos
Buscar Servicio - Sim-Unlocker Pro Credit Refill / ReCharge Old Account
Venta desde = 1 Credito

MULTI-UNLOCK.COM & UNLOCK.MX
2004-2023
Bruteforce Nokia SL3 by GPU and Hashcat
Link descarga Hashcat
C:\hashcat-6.2.6>hashcat -w3 -m110 -O --status --hex-salt --hex-charset DCDE46BD98086DEBA61254DB538A9B8447EFBE80:003570050475173200 -a3 -1 00010203040506070809 ?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1 --force --outfile=357005047517329\357005047517329_COD.txt --session=SL3
Session..........: SL3 by Unlock.Mx
Status...........: Running
Hash.Mode........: 110 (sha1($pass.$salt))
Hash.Target......: dcde46bd98086deba61254db538a9b8447efbe80:003570050475173200
Time.Started.....: Sun Feb 19 14:09:19 2023, (10 secs)
Time.Estimated...: Tue May 30 14:55:45 2023, (99 days, 23 hours)
Kernel.Feature...: Optimized Kernel
Guess.Mask.......: ?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1 [15]
Guess.Charset....: -1 00010203040506070809, -2 Undefined, -3 Undefined, -4 Undefined
Guess.Queue......: 1/1 (100.00%)
Speed.#1.........: 115.8 MH/s (65.51ms) @ Accel:32 Loops:500 Thr:256 Vec:1
Recovered........: 0/1 (0.00%) Digests (total), 0/1 (0.00%) Digests (new)
Progress.........: 1179648000/1000000000000000 (0.00%)
Rejected.........: 0/1179648000 (0.00%)
Restore.Point....: 1179648/1000000000000 (0.00%)
Restore.Sub.#1...: Salt:0 Amplifier:0-500 Iteration:0-500
Candidate.Engine.: Device Generator
Candidates.#1....: $HEX[080200010406090701010000000000] -> $HEX[010904080300060901010000000000]
[s]tatus [p]ause [b]ypass [c]heckpoint [f]inish [q]uit =>
Una vez que sale el código se tiene que calcular este fue el .cod obtenido por fuerza bruta 000109080905030306040306000209 este es el hash SHA1 ea928d1bd4eba4fe50b99f40605878f48183cd21
356945030661793,ea928d1bd4eba4fe50b99f40605878f48183cd21:003569450306617900:000109080905030306040306000209
#pw+001975189427989+1#
#pw+768347019273132+2#
#pw+698234671637288+3#
#pw+218261635481666+4#
#pw+762990465607815+5#
#pw+727942383108765+6#
#pw+221653143073865+7#
Requieres ayuda o soporte contactanos
MULTI-UNLOCK.COM & UNLOCK.MX
Nokia SL3 Modelos
2690 (RM-635) - Cable 2690 2700 Classic (RM-561) 2730 Classic (RM-578/579) 3600 Slide (RM-352) 3720 Classic (RM-518) 5130 XpressMusic (RM-495) - Cable 5130 5310 XpressMusic (RM-303) - Cable 5310 6300 (RM-217) 6303 Classic (RM-443) 6500 Slide (RM-240) 6500 Classic (RM-265) C6 (RM-612) label= - Cable C6 E63 (RM-437) - Cable E66 (RM-343) - Cable E71-1 (RM-346) - Cable E71 5250 (RM-684) - Cable 5230-1b (RM-593) - Cable 5800d 5230-1b (RM-594) - Cable 5800d 5230 (RM-588) - Cable 5800d 5530 (RM-504) - Cable 5530 5730s XpressMusic (RM-465) - Cable 5800d-1 (RM-356) - Cable 5800d 6120C (RM-243) 6760s (RM-573) 6790s (RM-492) N97-1 (RM-505) - Cable N97 N97-3 (RM-506) - Cable N97 N97-4 (RM-507) - Cable N97 N86 (RM-484/485/486) N97mini (RM-555) - Cable N97mini X6 (RM-551/559) C3-01 (RM-640) - Cable C3-01 C5 (RM-645) - Cable C5 C5-03 (RM-697) - Cable C5 C6-01 (RM-601) - Cable C6 C7-00 (RM-675) - Cable C7 E52 (RM-469) E55 (RM-482) E5-00 (RM-632) E72 (RM-529) E72 (RM-530) E73 mode E7-00 (RM-626) 5630d (RM-431) 5730s XpressMusic (RM-465) - Cable E75 or 5730s 6700s (RM-576) 6720 Classic(RM-424) 6730 Classic (RM-547) 6730 Classic (RM-566) 6710 Navigator (RM-491) 6700 Classic (RM-470) 6750 Classic (RM-381) N8 (RM-596) - Cable N8 X3-02 (RM-639) - Cable X3-02 X5-01 (RM-627) - Cable X5 X7-00 (RM-707) - Cable X7 C2-01 (RM-721) - Cable C2-01 3710a-1 (RM-509) 3710a-1b (RM-510) 3711a-1 (RM-511) 5330 (RM-479/478) 6303ci (RM-638) 7230 (RM-604) X3-00 (RM-540) - Cable X3-00
Mayoreo TCL 20 XE Nuevo Liberado de fabrica $ 1699
Se requiere mínimo de piezas
Incluye caja y accesorios
hasta agotar existencias

FRP Lanix Ilium M9V by NckBox Spreadtrum
Como quitar cuenta google FRP Lanix Ilium M9V
Bajar Software desde este link se tiene que pagar para bajarlo
https://www.needrom.com/download/lanix-ilium-m9v/

Pestaña Firmware Flasher
Open Pac File
seleccionar archivo - Ilium_M9V_OPEN_SW_09.pac
Dar click Firmware Settings
Seleccionar solamente estos archivos
- FDL
- FDL2
- Cache
- UserData
- Persist = esta es la area donde se guarda el FRP en los Spreadtrum
- EraseMetadata
Dar Boton OK
Dar Click Flash Phone
Presiionar Volumen + mas Volumen - conectar el cable no soltar los botones hasta que termine de hacer el boot
esperan un momento a que termine el proceso aqui dejo el log
ACTION: Flash Firmware.
Selected firmware: Ilium_M9V_OPEN_SW_09.pac
NV: Default Mode (protect calibration)
Device Storage: EMMC
Start Detect phone...
Phone must be off with battery inside.
Long press "VOL -" key and insert usb cable.
For some phones need to
Long press "VOL -"+ "VOL +" key and insert usb cable.
Detected: SPRD U2S Diag (COM6)
[00:00:00] Sending loader.
BOOT: SPRD3
Sending loader, keep boot key untill loader start.
[00:00:03] Loader ok
[00:00:03] Wait for loader....
Loader OK: ~"Spreadtrum Boot Block version 1.1
Changing bautrate OK.
[00:00:04] [1]First boot done.
[00:00:04] Sending second loader.
[00:00:11] Second loader sent ok.
New flash protocol detected.
[00:00:11] Reading: system
Error while read flash(1).
[00:00:31] Reading: super
System name: super
Phone and firmware have same android
[00:00:31] Reading: miscdata
[00:00:31] Reading: l_fixnv1_a
NVRAM saved to: C:\Users\Montreal\Documents\spreadtrum_module\flashmode_nvram_backup\_354717960063320\_354717960063320_nvram_backup.tar
Phone have super partition.
[00:00:43] Making flash ic repartition.
NV_COMM disabled by user, skip
[uboot_a]Format disabled, skip.
[uboot_log]Format disabled, skip.
[00:00:43] Start write: cache
[00:00:44] Start write: userdata
[l_runtimenv1]Format disabled, skip.
[misc]Format disabled, skip.
[sysdumpdb]Format disabled, skip.
[00:01:21] Start write: persist
[00:01:22] Format: metadata
[00:01:22] [metadata]Format OK.
Flashing done.
[can take 0-10 sec]Wait untill phone restart.
Exe version: NckBox Spreadtrum Module 2.1.8_bugfix
Log saved:
C:\Users\Montreal\Documents\spreadtrum_module\Saved_Logs\_writepac_.txt
Total Time: 00:01:32
Done.
MULTI-UNLOCK & UNLOCK.MX
Best Regard