|
Welcome to the GSM-Forum forums. You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. Only registered members may post questions, contact other members or search our database of over 8 million posts. Registration is fast, simple and absolutely free so please - Click to REGISTER! If you have any problems with the registration process or your account login, please contact contact us . |
|
Register | FAQ | Donate | Forum Rules | Root any Device | ★iPhone Unlock★ | ★ Direct Codes ★ | Direct Unlock Source |
| LinkBack | Thread Tools | Display Modes |
12-06-2019, 10:10 | #1112 (permalink) |
Freak Poster Join Date: May 2009 Location: san fernando city la union
Posts: 128
Member: 1028799 Status: Offline Thanks Meter: 49 | Cherry flare j3 lite frp done Cherry flare j3 lite frp done using eft dongle Run eft dongle latest version Select mtk Select brand = cherry Select model = cherry flare j3 lite Mark check frp reset(fast) Click start Phone in off mode, connect usb cable to pc Wait until all done |
12-09-2019, 07:52 | #1115 (permalink) |
Freak Poster Join Date: Feb 2016 Location: Noitacol Age: 37
Posts: 130
Member: 2532428 Status: Offline Thanks Meter: 40 | J530FM U7 FRP RESET DONE ! Analyzing file.....OK Searching for Samsung ODIN protocol.....Detected {COM166} Connecting to device.....OK Device Model.....SM-J530FM Reading PIT.....OK Flashing [data 1].....OK Rebooting device.....OK Waiting for device.....OK Reading device info.....OK Baseband Version: J530FMXXS7BSF1 Serial Number: RF8JA1ZMCKX Device Arch: exynos7870 Device bootloader: J530FMXXS7BSE1 Device selinux: enforcing Device warranty bit: 0 Device Firmware: J530FMXXS7BSE1 Android version: 8.1.0 Device SDK: 27 Device data encryption: encrypted Firmware Country: Central Asia Device Hardware: samsungexynos7870 Device CPU: armeabi-v7a Device Factory: samsung Device Model: SM-J530FM Device IMEI: Root status.....Rooted { Adb direct } Resetting FRP.....OK Operation {Reset [ScreenLock - FRP - MDM - Call Me - Samsung Account] -- FRP / OEM: ON} ID: B13D14DA5F047E135EA8007B2CD895D3 Elapsed time 01:25 -- Version 1.7.7 |
12-13-2019, 15:33 | #1117 (permalink) |
No Life Poster Join Date: Jun 2006 Location: Unlocking World.
Posts: 1,576
Member: 303336 Status: Offline Sonork: 100.1612298 Thanks Meter: 1,100 | Huawei Y7 Prime 2018 FRP Done By EFT Checking fastboot device.....OK Reading info.....OK Device Model: LDN-L21 Device Serial: 26EBB18803216938 Device IMEI: 864925042981418 Device Firmware: LDN-L21 8.0.0.163(C185) Device Lock: Image is origin | Verify mode is enforcing | Check root info is safe | Lock state is lock | Root State: UNROOT Waiting for server.....OK Reading data.....OK Posting data to server.....OK Waiting for server response.....OK Unlocking device.....OK Resetting FRP.....OK Operation {Reset FRP using server} ID: 0EDB8F8B0C0654C923DBFF8B93D19ED8 Elapsed time 00:17 -- Version 1.7.8 |
12-13-2019, 16:06 | #1118 (permalink) |
No Life Poster Join Date: Jun 2006 Location: Unlocking World.
Posts: 1,576
Member: 303336 Status: Offline Sonork: 100.1612298 Thanks Meter: 1,100 | QMobile J1 FRP Done By EFT Wating Device..........OK CPU: MT6737M Chip Version: 0x0000ca00 Chip Ext Clock: EXT_26M Writing Mode..........OK Internal RAM: Internal SRAM Size: 128.00 KB External RAM: Type DRAM External Ram Size: 1.00 GB EMMC: EMMC PART BOOT1 Size: 4.00 MB EMMC PART BOOT2 Size: 4.00 MB EMMC PART RPMB Size: 4.00 MB EMMC PART USER Size: 7.28 GB Battery: Battery Voltage: 3766 Injection..........OK Detecting Parts info............OK [ID: 1] [preloader] BaseAddr(0x00000000) Size(0x00400000) [ID: 8] [pgpt] BaseAddr(0x00000000) Size(0x00080000) [ID: 8] [proinfo] BaseAddr(0x00080000) Size(0x00300000) [ID: 8] [nvram] BaseAddr(0x00380000) Size(0x00500000) [ID: 8] [protect1] BaseAddr(0x00880000) Size(0x00a00000) [ID: 8] [protect2] BaseAddr(0x01280000) Size(0x00a00000) [ID: 8] [lk] BaseAddr(0x01c80000) Size(0x00080000) [ID: 8] [para] BaseAddr(0x01d00000) Size(0x00080000) [ID: 8] [boot] BaseAddr(0x01d80000) Size(0x01000000) [ID: 8] [recovery] BaseAddr(0x02d80000) Size(0x01000000) [ID: 8] [logo] BaseAddr(0x03d80000) Size(0x00800000) [ID: 8] [expdb] BaseAddr(0x04580000) Size(0x00a00000) [ID: 8] [seccfg] BaseAddr(0x04f80000) Size(0x00080000) [ID: 8] [oemkeystore] BaseAddr(0x05000000) Size(0x00200000) [ID: 8] [secro] BaseAddr(0x05200000) Size(0x00600000) [ID: 8] [keystore] BaseAddr(0x05800000) Size(0x00800000) [ID: 8] [tee1] BaseAddr(0x06000000) Size(0x00500000) [ID: 8] [tee2] BaseAddr(0x06500000) Size(0x00500000) [ID: 8] [frp] BaseAddr(0x06a00000) Size(0x00100000) [ID: 8] [nvdata] BaseAddr(0x06b00000) Size(0x02000000) [ID: 8] [metadata] BaseAddr(0x08b00000) Size(0x02500000) [ID: 8] [system] BaseAddr(0x0b000000) Size(0xc0000000) [ID: 8] [cache] BaseAddr(0xcb000000) Size(0x19000000) [ID: 8] [userdata] BaseAddr(0xe4000000) Size(0xecf80000) [ID: 8] [flashinfo] BaseAddr(0x1d0f80000) Size(0x01000000) [ID: 8] [sgpt] BaseAddr(0x1d1f80000) Size(0x00080000) Detecting Device info.......OK Product: QMobile Device Model: QMobile J1 ID: alps-mp-n0.mp1-V1.0.2_tinno6737m.35.n_P126 Sw Internal: Build Date: Mon Jun 5 20:06:23 CST 2017 Chip Ver: S01 Android Version: 7.0 Architecture: armeabi-v7a All Done By EFT Dongle |
12-14-2019, 09:55 | #1119 (permalink) |
No Life Poster Join Date: Jun 2006 Location: Unlocking World.
Posts: 1,576
Member: 303336 Status: Offline Sonork: 100.1612298 Thanks Meter: 1,100 | Huawei P9 Lite FRP Done By EFT Checking fastboot device.....OK Reading info.....OK Device Model: HUAWEI VNS-L21 Device Serial: BUC4C16729006151 Device IMEI: 862+++++++++ Device Firmware: :VNS-L21C185B360 Device FB Lock: LOCKED Device USER Lock: LOCKED Device Lock: locked Waiting for server.....OK Reading data.....OK Posting data to server.....OK Waiting for server response.....OK Unlocking device.....OK Resetting FRP.....OK Operation {Reset FRP using server} ID: 0EDB8F8B0C0654C923DBFF8B93D19ED8 Elapsed time 00:10 -- Version 1.7.8 |
12-15-2019, 17:14 | #1120 (permalink) |
No Life Poster Join Date: Jun 2006 Location: Unlocking World.
Posts: 1,576
Member: 303336 Status: Offline Sonork: 100.1612298 Thanks Meter: 1,100 | Honor 8C BKK-LX2 FRP Done By EFT Checking fastboot device.....OK Reading info.....OK Device Model: BKK-LX2 Device Firmware: BKK-LX2 8.2.0.135(C185) Device Lock: Image is origin | Verify mode is enforcing | Check root info is safe | Lock state is lock | Root State: UNROOT Waiting for server.....OK Reading data.....OK Posting data to server.....OK Waiting for server response.....OK Unlocking device.....OK Resetting FRP.....OK Operation {Reset FRP using server} ID: 0EDB8F8B0C0654C923DBFF8B93D19ED8 Elapsed time 00:26 -- Version 1.7.8 |
12-16-2019, 09:53 | #1121 (permalink) |
Registered User Join Date: Apr 2008
Posts: 27
Member: 760450 Status: Offline Thanks Meter: 4 | Wating Device..........OK CPU: MT6580 Chip Version: 0x0000ca00 Chip Ext Clock: EXT_26M Writing Mode..........OK Internal RAM: Internal SRAM Size: 128.00 KB External RAM: Type DRAM External Ram Size: 1.00 GB EMMC: EMMC PART BOOT1 Size: 4.00 MB EMMC PART BOOT2 Size: 4.00 MB EMMC PART RPMB Size: 4.00 MB EMMC PART USER Size: 7.22 GB Battery: Battery Voltage: 3560 Injection..........OK Detecting Parts info............OK [ID: 1] [preloader] BaseAddr(0x00000000) Size(0x00400000) [ID: 8] [pgpt] BaseAddr(0x00000000) Size(0x00080000) [ID: 8] [proinfo] BaseAddr(0x00080000) Size(0x00300000) [ID: 8] [nvram] BaseAddr(0x00380000) Size(0x00500000) [ID: 8] [protect1] BaseAddr(0x00880000) Size(0x00a00000) [ID: 8] [protect2] BaseAddr(0x01280000) Size(0x00a00000) [ID: 8] [seccfg] BaseAddr(0x01c80000) Size(0x00040000) [ID: 8] [lk] BaseAddr(0x01cc0000) Size(0x00060000) [ID: 8] [lk2] BaseAddr(0x01d20000) Size(0x00060000) [ID: 8] [boot] BaseAddr(0x01d80000) Size(0x01000000) [ID: 8] [recovery] BaseAddr(0x02d80000) Size(0x01000000) [ID: 8] [para] BaseAddr(0x03d80000) Size(0x00080000) [ID: 8] [logo] BaseAddr(0x03e00000) Size(0x00800000) [ID: 8] [odmdtbo] BaseAddr(0x04600000) Size(0x01000000) [ID: 8] [expdb] BaseAddr(0x05600000) Size(0x00a00000) [ID: 8] [vendor] BaseAddr(0x06000000) Size(0x12000000) [ID: 8] [frp] BaseAddr(0x18000000) Size(0x00100000) [ID: 8] [tee1] BaseAddr(0x18100000) Size(0x00500000) [ID: 8] [tee2] BaseAddr(0x18600000) Size(0x00500000) [ID: 8] [nvdata] BaseAddr(0x18b00000) Size(0x02000000) [ID: 8] [metadata] BaseAddr(0x1ab00000) Size(0x02500000) [ID: 8] [oemkeystore] BaseAddr(0x1d000000) Size(0x00200000) [ID: 8] [secro] BaseAddr(0x1d200000) Size(0x00600000) [ID: 8] [keystore] BaseAddr(0x1d800000) Size(0x00800000) [ID: 8] [system] BaseAddr(0x1e000000) Size(0x54800000) [ID: 8] [cache] BaseAddr(0x72800000) Size(0x07000000) [ID: 8] [userdata] BaseAddr(0x79800000) Size(0x152080000) [ID: 8] [sdrpmb] BaseAddr(0x1cb880000) Size(0x01800000) [ID: 8] [flashinfo] BaseAddr(0x1cd080000) Size(0x01000000) [ID: 8] [sgpt] BaseAddr(0x1ce080000) Size(0x00080000) Detecting Device info.......OK Product: Innovatech Device Model: X-Go ID: YFN_A177T_2J111212018 Sw Internal: Build Date: Wed Nov 21 14:36:30 CST 2018 Chip Ver: Android Version: 8.1.0 Architecture: armeabi-v7a Dump nvram:...............OK All Done By EFT Dongle |
12-16-2019, 11:07 | #1122 (permalink) |
Registered User Join Date: Apr 2008
Posts: 27
Member: 760450 Status: Offline Thanks Meter: 4 | hoffmann x-prime frp done by eft Wating Device..........OK CPU: MT6580 Chip Version: 0x0000ca00 Chip Ext Clock: EXT_26M Writing Mode..........OK Internal RAM: Internal SRAM Size: 128.00 KB External RAM: Type DRAM External Ram Size: 2.00 GB EMMC: EMMC PART BOOT1 Size: 4.00 MB EMMC PART BOOT2 Size: 4.00 MB EMMC PART RPMB Size: 4.00 MB EMMC PART USER Size: 14.45 GB Battery: Battery Voltage: 3712 Injection..........OK Detecting Parts info............OK [ID: 1] [preloader] BaseAddr(0x00000000) Size(0x00400000) [ID: 8] [pgpt] BaseAddr(0x00000000) Size(0x00080000) [ID: 8] [proinfo] BaseAddr(0x00080000) Size(0x00300000) [ID: 8] [nvram] BaseAddr(0x00380000) Size(0x00500000) [ID: 8] [protect1] BaseAddr(0x00880000) Size(0x00a00000) [ID: 8] [protect2] BaseAddr(0x01280000) Size(0x00a00000) [ID: 8] [seccfg] BaseAddr(0x01c80000) Size(0x00040000) [ID: 8] [lk] BaseAddr(0x01cc0000) Size(0x00060000) [ID: 8] [lk2] BaseAddr(0x01d20000) Size(0x00060000) [ID: 8] [boot] BaseAddr(0x01d80000) Size(0x01000000) [ID: 8] [recovery] BaseAddr(0x02d80000) Size(0x01000000) [ID: 8] [para] BaseAddr(0x03d80000) Size(0x00080000) [ID: 8] [logo] BaseAddr(0x03e00000) Size(0x00800000) [ID: 8] [odmdtbo] BaseAddr(0x04600000) Size(0x01000000) [ID: 8] [expdb] BaseAddr(0x05600000) Size(0x00a00000) [ID: 8] [vendor] BaseAddr(0x06000000) Size(0x20000000) [ID: 8] [frp] BaseAddr(0x26000000) Size(0x00100000) [ID: 8] [tee1] BaseAddr(0x26100000) Size(0x00500000) [ID: 8] [tee2] BaseAddr(0x26600000) Size(0x00500000) [ID: 8] [nvdata] BaseAddr(0x26b00000) Size(0x02000000) [ID: 8] [metadata] BaseAddr(0x28b00000) Size(0x02500000) [ID: 8] [oemkeystore] BaseAddr(0x2b000000) Size(0x00200000) [ID: 8] [secro] BaseAddr(0x2b200000) Size(0x00600000) [ID: 8] [keystore] BaseAddr(0x2b800000) Size(0x00800000) [ID: 8] [system] BaseAddr(0x2c000000) Size(0x74000000) [ID: 8] [cache] BaseAddr(0xa0000000) Size(0x10000000) [ID: 8] [userdata] BaseAddr(0xb0000000) Size(0x2ebf80000) [ID: 8] [flashinfo] BaseAddr(0x39bf80000) Size(0x01000000) [ID: 8] [sgpt] BaseAddr(0x39cf80000) Size(0x00080000) Detecting Device info.......OK Product: HOFFMANN Device Model: HOFFMANN X-Prime ID: HOFFMANN_X-Prime_OS4.0_20180913 Sw Internal: Build Date: 2018年 10月 16日 星期二 23:31:32 CST Chip Ver: Android Version: 8.1.0 Architecture: armeabi-v7a FRP RESET... [FRP] .....OK All Done By EFT Dongle |
12-16-2019, 18:24 | #1123 (permalink) |
No Life Poster Join Date: Apr 2008 Location: South Africa
Posts: 708
Member: 746586 Status: Offline Thanks Meter: 205 | Checking fastboot device.....OK Reading info.....OK Device Model: DUB-LX1 Device Firmware: DUB-LX1 8.2.0.132(C316) Device Lock: Image is origin | Verify mode is enforcing | Check root info is safe | Lock state is lock | Root State: UNROOT Waiting for server.....OK Reading data.....OK Posting data to server.....OK Waiting for server response.....OK Unlocking device.....OK Resetting FRP.....OK Operation {Reset FRP using server} ID: 5608F98E796B9E4E155A558981E791D3 Elapsed time 01:42 -- Version 1.7.8 |
12-17-2019, 07:30 | #1125 (permalink) |
Registered User Join Date: Apr 2008
Posts: 27
Member: 760450 Status: Offline Thanks Meter: 4 | P30 lite MAR-LX1M downgrade by eft pro Waiting for Upgrade Mode port.....OK Connecting to device.....OK Start processing file [UPDATE.APP] 4,44 GB: Firmware version: Marie-LGRP2-OVS 9.1.0.241 Flashing [sha256rsa.img].....OK Flashing [crc.img].....OK Flashing [base_verlist.img].....OK Flashing [base_ver.img].....OK Flashing [package_type.img].....OK Flashing [hisiufs_gpt.img].....OK Flashing [xloader.img].....OK Flashing [fastboot.img].....OK Flashing [hhee.img].....OK Flashing [dts.img].....OK Flashing [trustfirmware.img].....OK Flashing [fw_lpm3.img].....OK Flashing [dto.img].....OK Flashing [kernel.img].....OK Flashing [teeos.img].....OK Flashing [isp_firmware.img].....OK Flashing [vector.img].....OK Flashing [sensorhub.img].....OK Flashing [fw_hifi.img].....OK Flashing [vbmeta.img].....OK Flashing [modemnvm_update.img].....OK Flashing [modemnvm_cust.img].....OK Flashing [recovery_ramdisk.img].....OK Flashing [recovery_vendor.img].....OK Flashing [recovery_vbmeta.img].....OK Flashing [preas.img].....OK Flashing [preavs.img].....OK Flashing [erecovery_kernel.img].....OK Flashing [erecovery_ramdisk.img].....OK Flashing [erecovery_vendor.img].....OK Flashing [erecovery_vbmeta.img].....OK Flashing [eng_vendor.img].....OK Flashing [eng_system.img].....OK Flashing [cache.img].....OK Flashing [system.img].....OK Flashing [cust.img].....OK Flashing [modem_fw.img].....OK Flashing [hisee_img.img].....OK Flashing [hisee_fs.img].....OK Flashing [vendor.img].....OK Flashing [odm.img].....OK Flashing [product.img].....OK Flashing [patch.img].....OK Flashing [userdata.img].....OK Flashing [version.img].....OK Flashing [preload.img].....OK Rebooting device.....OK Operation {Flash APP Firmware} ID: 01887F861153D0F712686EB93E614F21 Elapsed time 05:28 -- Version 1.7.9 |
Bookmarks |
| |
|