What's new
Welcome

Welcome to frpvn . Sign up as a member today

Online Vivo Y11 | Vivo 1906 Remove PassCode FRP - Gmail Online

Joined
18 September 2022
Messages
579
  1. >>>>Auto Identify 9008 Port...
    Get 9008 Port;Is:COM12
    >>>>Reading Mobile Hardware Info...Succes
    CPU_SN: 0xBC59802C
    MSM_ID: 0x000BF0E1

    >>>Initialize Boot Mobile...Success
    >>>>Download Boot1 to Mobile...Success
    >>>>Downloading Boot2 to Mobile...Success
    >>>>Switch Mobile to re/wr mode...Success
    >>>>Connecting Mobile...Success
    Flash Type:eMMC
    CPU Type: 8937
    >>>>Reading Mobile GPT Block Data...Success
    Eraseing Mobile userdata...
    after erase all the data will lost...
    Format address:ADD:0x0183282000 Size:0x05C4979E00
    Eraseing Mobile userdata...
    after erase all the data will lost...
    Format address:ADD:0x016D180000 Size:0x0000008000
    Rebooting Mobile...
    all is done!!!
 
Joined
18 September 2022
Messages
579
Code Name : PD1930F/PD1930CF
Operation : Factory Reset [2]
Authenticating... OK
Retrieving data... OK [218.7 KiB]
Initializing data... OK
Searching for HS-USB QDLoader 9008... COM41
Connection : USB 2.0 High-Speed
USB Driver : [Qualcomm Incorporated] qcusbser - Version : 2.1.3.7
Connecting to device... OK
Handshaking... OK
Reading bootloader info... OK
Serial : 1175002246 SoC : [Snapdragon 439] [SDM439] [0x000BF0E1]
OEM : Qualcomm [0x0000] Model : Unknown [0x0000]
PK_HASH[0] :60BA997FEF6DA9F05885FA11F1DD6D2A
PK_HASH[1] :90D052A257A09C2075D7246CC73C0D43
Writing flash programmer... OK
Connecting to flash programmer... OK
Configuring device... OK
Firehose config : eMMC [Sector:512] [Target:4096] [Host:1048576]
Reading partition map... OK
LU Count : 1
Reading info... OK
Model Name : vivo 1906
Product Name : PD1930F_EX
Manufacturer : vivo
Android Version : 9
Security Patch : 2021-02-01
Display ID : PKQ1.190616.001 release-keys
Formatting data... OK
Erasing FRP... OK
 
Joined
18 September 2022
Messages
579
03:22:17 PM - Waiting Qualcomm 9008 Port... COM13
03:22:17 PM - Connecting to SAHARA Protocol...Ok
03:22:17 PM - Identifying Device Mode...Ok ( SAHARA MODE )
03:22:18 PM - Getting Device Information...Ok

SAHARA INFORMATION

* Serial No. ... 0xD13B19AD
* MSM ID ... 0x000BF0E1
* Pk Hash ... 0x60BA997FEF6DA9F05885FA11F1DD6D2A
* Chipset name ... MSM8937
* Chipset code ... Snapdragon-430

03:22:20 PM - Getting loader from database... Ok

* Chipset type ... 32 bit chipset

03:22:22 PM - Sending Firehose Programmer Loader...Ok
03:22:28 PM - Connecting to firehose mode... Ok

DEVICE INFORMATION

* Memory Type... Embedded MultiMediaCard (eMMC)
* MaxPayloadSizeFromTargetInBytes ... 4096
* MaxPayloadSizeToTargetInBytes ... 1048576
* Firmware Version ... 9
* eMMC Name ... GX6BAB
* Internal Storage ... 29.12 GB
* Mfr Id ... 21
* Physical Memory ... 3
* Serial Number ... 1973343326


* Android Version... 11 ( ANDROID 11 )
* Brand... VIVO
* Build Date... WEDMAR1616:43:37CST2022
* Chipset Type... ARM64-V8A
* Emmc Size... 16GB
* Funtouch OS Version... 11.5
* Incremental... ENG.COMPIL.20220316.164614
* Local language... EN-US
* Model... VIVO 1906
* Sdk Version... 30
* Security Patch... 2022-03-01

03:22:30 PM - Searching Job Sequence...Ok
03:22:30 PM - Decrypting Security...Ok

03:22:30 PM - Reseting Factory Reset Protection Lock...Ok

03:22:30 PM - Resetting to Factory...Ok

03:22:33 PM - Rebooting device... Ok
03:22:34 PM - Elapsed Time... 00:00:04
03:22:34 PM - Finished at local time: [16.11.22 15:22:34]
 
Top