GSM Shop GSM Shop
GSM-Forum  

Welcome to the GSM-Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features.
Only registered members may post questions, contact other members or search our database of over 8 million posts.

Registration is fast, simple and absolutely free so please - Click to REGISTER!

If you have any problems with the registration process or your account login, please contact contact us .

Go Back   GSM-Forum > Product Support Sections > Hard/Software Products (official support) > EFT Dongle


Reply
 
LinkBack Thread Tools Display Modes
Old 04-15-2019, 21:17   #796 (permalink)
Freak Poster
 
lolo24's Avatar
 
Join Date: May 2016
Location: CUBA
Age: 32
Posts: 457
Member: 2572618
Status: Offline
Sonork: no
Thanks Meter: 185
Donate money to this user
Blu D142K Dead Recover By flash King EFT


Wating Device..........OK
CPU: MT6571
Chip Version: 0x0000ca01
Chip Ext Clock: EXT_26M
Writing Mode..........OK
Internal RAM:
Internal SRAM Size: 128.00 KB
External RAM: Type DRAM
External Ram Size: 256.00 MB
NAND Flash:
Device Id: [Micron] NAND_MT29C4G48MAAHBAAKS_5WT 148
NAND Flash Size: 512.00 MB
Battery:
Battery Voltage: 3833
Injection..........OK
Flashing....Preloader.....OK
Flashing....Preloader.....OK
Flashing images.............OK
Checksum..........UBOOT.....OK
Checksum..........BOOTIMG.....OK
Checksum..........RECOVERY.....OK
Checksum..........SEC_RO.....OK
Checksum..........LOGO.....OK
Checksum..........ANDROID.....OK
Checksum..........USRDATA.....OK
All Done
Flash Done By EFT Dongle
  Reply With Quote
The Following User Says Thank You to lolo24 For This Useful Post:
Old 04-16-2019, 08:33   #797 (permalink)
Freak Poster
 
jaan_e_ahsan45's Avatar
 
Join Date: Jan 2008
Location: PAKISTAN
Age: 38
Posts: 193
Member: 689829
Status: Offline
Sonork: 100.1651716
Thanks Meter: 102
GT-S7562 Clone Screen Lock Reset...Done

Code:
Wating Device..........OK
CPU: MT6572
Chip Version: 0x0000ca00
Chip Ext Clock: EXT_26M
Writing Mode..........OK
Internal RAM: 
Internal SRAM Size: 128.00 KB
External RAM: Type DRAM
External Ram Size: 512.00 MB
EMMC: 
EMMC PART BOOT1 Size: 2.00 MB
EMMC PART BOOT2 Size: 2.00 MB
EMMC PART RPMB Size: 512.00 KB
EMMC PART USER Size: 3.64 GB
Battery: 
Battery Voltage: 3847
Injection..........OK
Detecting Parts info............OK
[ID: 255] [PRELOADER] BaseAddr(0x00000000) Size(0x00880000) 
[ID: 255] [MBR] BaseAddr(0x00880000) Size(0x00080000) 
[ID: 255] [EBR1] BaseAddr(0x00900000) Size(0x00080000) 
[ID: 255] [PRO_INFO] BaseAddr(0x00980000) Size(0x00300000) 
[ID: 255] [NVRAM] BaseAddr(0x00c80000) Size(0x00500000) 
[ID: 255] [PROTECT_F] BaseAddr(0x01180000) Size(0x00a00000) 
[ID: 255] [PROTECT_S] BaseAddr(0x01b80000) Size(0x00a00000) 
[ID: 255] [SECCFG] BaseAddr(0x02580000) Size(0x00020000) 
[ID: 255] [UBOOT] BaseAddr(0x025a0000) Size(0x00060000) 
[ID: 255] [BOOTIMG] BaseAddr(0x02600000) Size(0x00600000) 
[ID: 255] [RECOVERY] BaseAddr(0x02c00000) Size(0x00600000) 
[ID: 255] [SEC_RO] BaseAddr(0x03200000) Size(0x00040000) 
[ID: 255] [MISC] BaseAddr(0x03240000) Size(0x00080000) 
[ID: 255] [LOGO] BaseAddr(0x032c0000) Size(0x00300000) 
[ID: 255] [EXPDB] BaseAddr(0x035c0000) Size(0x00a00000) 
[ID: 255] [ANDROID] BaseAddr(0x03fc0000) Size(0x28a00000) 
[ID: 255] [CACHE] BaseAddr(0x2c9c0000) Size(0x17800000) 
[ID: 255] [USRDATA] BaseAddr(0x441c0000) Size(0x2c000000) 
[ID: 255] [FAT] BaseAddr(0x701c0000) Size(0x781c0000) 
[ID: 255] [BMTPOOL] BaseAddr(0xffff00a8) Size(0x01500000) 
Detecting Device info.......OK
Product: Samsung
Device Model: GT-S7562
ID: IMM76I.S7562ZCAME1
Sw Internal: 
Build Date: 2014年 07月 03日 星期四 02:24:51 CST
Chip Ver: S01
Android Version: 4.2.2
Architecture: armeabi-v7a
Screen Lock Reset:..........
Remove Security mth1........OK
Remove Security mth1........OK
Remove Security mth1........OK
Remove Security mth1........OK
Remove Security mth1........OK
Screen Lock Reset:.........OK
All Done By EFT Dongle
  Reply With Quote
The Following User Says Thank You to jaan_e_ahsan45 For This Useful Post:
Old 04-16-2019, 17:00   #798 (permalink)
No Life Poster
 
Join Date: Aug 2014
Posts: 658
Member: 2233266
Status: Offline
Thanks Meter: 252
SAMSUNG J50F FRP DONE 100% SOLUTION EFT DONGLE
Opening Port COM11...........OK
Verifying Download Mod
OK
Initialization.......OK
Reading Phone Partitation Table........OK
Partition Size : 8192
Unpak pit .......OK
FLASHING FIRMWARE TO PHONE.....
Sending data: ..........OK
FLASHING DONE!
Rebooting PDA TO NORMAL MODE........OK
Waiting For ADB Device.....Detecting Device Info.....DONE
Device Model: SM-J530F
Device CPU: armeabi-v7a
Android SDK: 27
Android Version: 8.1.0
Resetting Samsung Account / Frp .......OK
  Reply With Quote
The Following User Says Thank You to Yahia_Sb For This Useful Post:
Old 04-16-2019, 17:24   #799 (permalink)
No Life Poster
 
ribbentrop's Avatar
 
Join Date: Sep 2003
Location: Ukraine
Age: 51
Posts: 4,615
Member: 40400
Status: Online
Thanks Meter: 1,250
Huawei DRA-L21 FRP reset done

Code:
EFT Dongle
Connecting Fastboot .......
Connecting Fastboot .......Ok
Model Phone: DRA-L21
SW: DRA-L21 1.0.0.148(C432)
Connecting Server .....RECEIVED
Connecting Server .....READY
Erase Done , The Device Will Reboot And Factory Reset
Reboot ...............OK
By EFT Dongle OK
  Reply With Quote
The Following User Says Thank You to ribbentrop For This Useful Post:
Old 04-17-2019, 16:49   #800 (permalink)
Freak Poster
 
mahif's Avatar
 
Join Date: Sep 2015
Location: maroc
Posts: 133
Member: 2462820
Status: Offline
Sonork: hi
Thanks Meter: 21
ONE CLIUCK reset FRP J7Core (J701F) done by EFT Dongle

  Reply With Quote
The Following User Says Thank You to mahif For This Useful Post:
Old 04-18-2019, 17:11   #801 (permalink)
No Life Poster
 
Tanha0321's Avatar
 
Join Date: Jul 2006
Location: Pakistan karachi
Posts: 9,756
Member: 314003
Status: Offline
Thanks Meter: 2,999
Huawei CRO-U00 Frp Reset

Code:
Wating Device..........OK
CPU: MT6580
Chip Version: 0x0000ca00
Chip Ext Clock: EXT_26M
Writing Mode..........OK
Internal RAM: 
Internal SRAM Size: 128.00 KB
External RAM: Type DRAM
External Ram Size: 1.00 GB
EMMC: 
EMMC PART BOOT1 Size: 4.00 MB
EMMC PART BOOT2 Size: 4.00 MB
EMMC PART RPMB Size: 512.00 KB
EMMC PART USER Size: 7.28 GB
Battery: 
Battery Voltage: 3842
Injection..........OK
Detecting Parts info............OK
[ID: 1] [preloader] BaseAddr(0x00000000) Size(0x00400000) 
[ID: 8] [pgpt] BaseAddr(0x00000000) Size(0x00080000) 
[ID: 8] [proinfo] BaseAddr(0x00080000) Size(0x00300000) 
[ID: 8] [nvram] BaseAddr(0x00380000) Size(0x00500000) 
[ID: 8] [protect1] BaseAddr(0x00880000) Size(0x00a00000) 
[ID: 8] [protect2] BaseAddr(0x01280000) Size(0x00a00000) 
[ID: 8] [seccfg] BaseAddr(0x01c80000) Size(0x00080000) 
[ID: 8] [lk] BaseAddr(0x01d00000) Size(0x00080000) 
[ID: 8] [boot] BaseAddr(0x01d80000) Size(0x01000000) 
[ID: 8] [recovery] BaseAddr(0x02d80000) Size(0x01000000) 
[ID: 8] [para] BaseAddr(0x03d80000) Size(0x00080000) 
[ID: 8] [logo] BaseAddr(0x03e00000) Size(0x00800000) 
[ID: 8] [bak] BaseAddr(0x04600000) Size(0x00800000) 
[ID: 8] [bakraw] BaseAddr(0x04e00000) Size(0x00200000) 
[ID: 8] [simlock] BaseAddr(0x05000000) Size(0x00800000) 
[ID: 8] [custom] BaseAddr(0x05800000) Size(0x0c800000) 
[ID: 8] [expdb] BaseAddr(0x12000000) Size(0x00a00000) 
[ID: 8] [frp] BaseAddr(0x12a00000) Size(0x00100000) 
[ID: 8] [nvdata] BaseAddr(0x12b00000) Size(0x02000000) 
[ID: 8] [metadata] BaseAddr(0x14b00000) Size(0x02500000) 
[ID: 8] [oemkeystore] BaseAddr(0x17000000) Size(0x00200000) 
[ID: 8] [secro] BaseAddr(0x17200000) Size(0x00600000) 
[ID: 8] [keystore] BaseAddr(0x17800000) Size(0x00800000) 
[ID: 8] [system] BaseAddr(0x18000000) Size(0x9c800000) 
[ID: 8] [cache] BaseAddr(0xb4800000) Size(0x0f000000) 
[ID: 8] [userdata] BaseAddr(0xc3800000) Size(0x10d780000) 
[ID: 8] [flashinfo] BaseAddr(0x1d0f80000) Size(0x01000000) 
[ID: 8] [sgpt] BaseAddr(0x1d1f80000) Size(0x00080000) 
Detecting Device info.......OK
Product: HUAWEI
Device Model: CRO-U00
ID: Cairo-U00C185B127
Sw Internal: 
Build Date: Fri Dec 22 15:10:26 CST 2017
Chip Ver: S01
Android Version: 6.0
Architecture: armeabi-v7a
FRP RESET... [FRP] .....OK
All Done By EFT Dongle
  Reply With Quote
The Following User Says Thank You to Tanha0321 For This Useful Post:
Old 04-18-2019, 17:12   #802 (permalink)
No Life Poster
 
Tanha0321's Avatar
 
Join Date: Jul 2006
Location: Pakistan karachi
Posts: 9,756
Member: 314003
Status: Offline
Thanks Meter: 2,999
HUAWEI SCL-U31 Frp Reset

Code:
EFT Dongle
Connecting Fastboot .......
Connecting Fastboot .......Ok
Model Phone: HUAWEI SCL-U31
SW: SCL-U31C185B151
Connecting Server .....RECEIVED
Connecting Server .....READY
Erase Done , The Device Will Reboot And Factory Reset
Reboot ...............OK
By EFT Dongle OK
  Reply With Quote
The Following User Says Thank You to Tanha0321 For This Useful Post:
Old 04-21-2019, 08:05   #803 (permalink)
No Life Poster
 
Join Date: Aug 2014
Posts: 658
Member: 2233266
Status: Offline
Thanks Meter: 252
samsung j730f one click frp doen- eft dongle

Opening Port COM11...........OK
Verifying Download Mod
OK
Initialization.......OK
Reading Phone Partitation Table........OK
Partition Size : 8192
Unpak pit .......OK
FLASHING FIRMWARE TO PHONE.....
Sending data: ..........OK
FLASHING DONE!
Rebooting PDA TO NORMAL MODE........OK
Waiting For ADB Device.....Detecting Device Info.....DONE
Device Model: SM-J730F
Device CPU: armeabi-v7a
Android SDK: 27
Android Version: 8.1.0
Resetting Samsung Account / Frp .......OK
  Reply With Quote
The Following User Says Thank You to Yahia_Sb For This Useful Post:
Old 04-21-2019, 10:13   #804 (permalink)
Insane Poster
 
Join Date: Jan 2016
Location: Derbent
Posts: 77
Member: 2516133
Status: Offline
Thanks Meter: 55
Cubot X18 Plus FRP

Wating Device..........OK
CPU: MT6755
Chip Version: 0x0000cb00
Chip Ext Clock: EXT_26M
Writing Mode..........OK
Internal RAM:
Internal SRAM Size: 256.00 KB
External RAM: Type DRAM
External Ram Size: 0.00 bytes
EMMC:
EMMC PART BOOT1 Size: 4.00 MB
EMMC PART BOOT2 Size: 4.00 MB
EMMC PART RPMB Size: 4.00 MB
EMMC PART USER Size: 57.62 GB
Battery:
Battery Voltage: 3711
Injection..........OK
Detecting Parts info............OK
[ID: 1] [preloader] BaseAddr(0x00000000) Size(0x00400000)
[ID: 8] [pgpt] BaseAddr(0x00000000) Size(0x00008000)
[ID: 8] [recovery] BaseAddr(0x00008000) Size(0x01000000)
[ID: 8] [para] BaseAddr(0x01008000) Size(0x00080000)
[ID: 8] [expdb] BaseAddr(0x01088000) Size(0x00a00000)
[ID: 8] [frp] BaseAddr(0x01a88000) Size(0x00100000)
[ID: 8] [ppl] BaseAddr(0x01b88000) Size(0x00040000)
[ID: 8] [nvdata] BaseAddr(0x01bc8000) Size(0x02000000)
[ID: 8] [metadata] BaseAddr(0x03bc8000) Size(0x02000000)
[ID: 8] [protect1] BaseAddr(0x05bc8000) Size(0x00800000)
[ID: 8] [protect2] BaseAddr(0x063c8000) Size(0x00c38000)
[ID: 8] [seccfg] BaseAddr(0x07000000) Size(0x00800000)
[ID: 8] [oemkeystore] BaseAddr(0x07800000) Size(0x00800000)
[ID: 8] [proinfo] BaseAddr(0x08000000) Size(0x00300000)
[ID: 8] [md1img] BaseAddr(0x08300000) Size(0x01800000)
[ID: 8] [md1dsp] BaseAddr(0x09b00000) Size(0x00400000)
[ID: 8] [md1arm7] BaseAddr(0x09f00000) Size(0x00300000)
[ID: 8] [md3img] BaseAddr(0x0a200000) Size(0x00500000)
[ID: 8] [nvram] BaseAddr(0x0a700000) Size(0x00500000)
[ID: 8] [lk] BaseAddr(0x0ac00000) Size(0x00100000)
[ID: 8] [lk2] BaseAddr(0x0ad00000) Size(0x00100000)
[ID: 8] [boot] BaseAddr(0x0ae00000) Size(0x01000000)
[ID: 8] [logo] BaseAddr(0x0be00000) Size(0x00800000)
[ID: 8] [odmdtbo] BaseAddr(0x0c600000) Size(0x01000000)
[ID: 8] [tee1] BaseAddr(0x0d600000) Size(0x00500000)
[ID: 8] [tee2] BaseAddr(0x0db00000) Size(0x00500000)
[ID: 8] [secro] BaseAddr(0x0e000000) Size(0x00600000)
[ID: 8] [keystore] BaseAddr(0x0e600000) Size(0x00a00000)
[ID: 8] [vendor] BaseAddr(0x0f000000) Size(0x20000000)
[ID: 8] [system] BaseAddr(0x2f000000) Size(0xa0000000)
[ID: 8] [cache] BaseAddr(0xcf000000) Size(0x1b000000)
[ID: 8] [userdata] BaseAddr(0xea000000) Size(0xd7affbe00)
[ID: 8] [sdrpmb] BaseAddr(0xe64ffbe00) Size(0x01800000)
[ID: 8] [flashinfo] BaseAddr(0xe667fbe00) Size(0x01000000)
[ID: 8] [sgpt] BaseAddr(0xe677fbe00) Size(0x00004200)
Data is encrypted
FRP RESET... [FRP] .....OK
All Done By EFT Dongle
  Reply With Quote
The Following User Says Thank You to ramsay05 For This Useful Post:
Old 04-22-2019, 16:48   #805 (permalink)
Insane Poster
 
Join Date: Jan 2016
Location: Derbent
Posts: 77
Member: 2516133
Status: Offline
Thanks Meter: 55
Fly FS526 Power Plus 2 FRP reset

Wating Device..........OK
CPU: MT6737M
Chip Version: 0x0000ca00
Chip Ext Clock: EXT_26M
Writing Mode..........OK
Internal RAM:
Internal SRAM Size: 128.00 KB
External RAM: Type DRAM
External Ram Size: 1.00 GB
EMMC:
EMMC PART BOOT1 Size: 4.00 MB
EMMC PART BOOT2 Size: 4.00 MB
EMMC PART RPMB Size: 4.00 MB
EMMC PART USER Size: 7.13 GB
Battery:
Battery Voltage: 3938
Injection..........OK
Detecting Parts info............OK
[ID: 1] [preloader] BaseAddr(0x00000000) Size(0x00400000)
[ID: 8] [pgpt] BaseAddr(0x00000000) Size(0x00080000)
[ID: 8] [proinfo] BaseAddr(0x00080000) Size(0x00300000)
[ID: 8] [nvram] BaseAddr(0x00380000) Size(0x00500000)
[ID: 8] [protect1] BaseAddr(0x00880000) Size(0x00a00000)
[ID: 8] [protect2] BaseAddr(0x01280000) Size(0x00a00000)
[ID: 8] [lk] BaseAddr(0x01c80000) Size(0x00080000)
[ID: 8] [para] BaseAddr(0x01d00000) Size(0x00080000)
[ID: 8] [boot] BaseAddr(0x01d80000) Size(0x01000000)
[ID: 8] [recovery] BaseAddr(0x02d80000) Size(0x01000000)
[ID: 8] [logo] BaseAddr(0x03d80000) Size(0x00800000)
[ID: 8] [expdb] BaseAddr(0x04580000) Size(0x00a00000)
[ID: 8] [seccfg] BaseAddr(0x04f80000) Size(0x00080000)
[ID: 8] [oemkeystore] BaseAddr(0x05000000) Size(0x00200000)
[ID: 8] [secro] BaseAddr(0x05200000) Size(0x00600000)
[ID: 8] [keystore] BaseAddr(0x05800000) Size(0x00800000)
[ID: 8] [tee1] BaseAddr(0x06000000) Size(0x00500000)
[ID: 8] [tee2] BaseAddr(0x06500000) Size(0x00500000)
[ID: 8] [frp] BaseAddr(0x06a00000) Size(0x00100000)
[ID: 8] [nvdata] BaseAddr(0x06b00000) Size(0x02000000)
[ID: 8] [metadata] BaseAddr(0x08b00000) Size(0x02500000)
[ID: 8] [system] BaseAddr(0x0b000000) Size(0xa4000000)
[ID: 8] [cache] BaseAddr(0xaf000000) Size(0x19000000)
[ID: 8] [userdata] BaseAddr(0xc8000000) Size(0xfef80000)
[ID: 8] [flashinfo] BaseAddr(0x1c6f80000) Size(0x01000000)
[ID: 8] [sgpt] BaseAddr(0x1c7f80000) Size(0x00080000)
Detecting Device info.......OK
Product: Fly
Device Model: FS526
ID: SW17_FLY_FS526_2018_05_25
Sw Internal:
Build Date: Fri May 25 10:53:23 CST 2018
Chip Ver: S01
Android Version: 7.0
Architecture: armeabi-v7a
FRP RESET... [FRP] .....OK
All Done By EFT Dongle
  Reply With Quote
The Following User Says Thank You to ramsay05 For This Useful Post:
Old 04-23-2019, 12:53   #806 (permalink)
Freak Poster
 
jaan_e_ahsan45's Avatar
 
Join Date: Jan 2008
Location: PAKISTAN
Age: 38
Posts: 193
Member: 689829
Status: Offline
Sonork: 100.1651716
Thanks Meter: 102
LUA-U22 Hang on Logo Done by Erasing UserData, and Reset FRP Done...

Code:
Wating Device..........OK
CPU: MT6582
Chip Version: 0x0000ca01
Chip Ext Clock: EXT_26M
Writing Mode..........OK
Internal RAM: 
Internal SRAM Size: 128.00 KB
External RAM: Type DRAM
External Ram Size: 1.00 GB
EMMC: 
EMMC PART BOOT1 Size: 4.00 MB
EMMC PART BOOT2 Size: 4.00 MB
EMMC PART RPMB Size: 4.00 MB
EMMC PART USER Size: 7.28 GB
Battery: 
Battery Voltage: 3565
Injection..........OK
Detecting Parts info............OK
[ID: 255] [PRELOADER] BaseAddr(0x00000000) Size(0x00c00000) 
[ID: 255] [MBR] BaseAddr(0x00c00000) Size(0x00080000) 
[ID: 255] [EBR1] BaseAddr(0x00c80000) Size(0x00080000) 
[ID: 255] [PRO_INFO] BaseAddr(0x00d00000) Size(0x00300000) 
[ID: 255] [NVRAM] BaseAddr(0x01000000) Size(0x00500000) 
[ID: 255] [PROTECT_F] BaseAddr(0x01500000) Size(0x00a00000) 
[ID: 255] [PROTECT_S] BaseAddr(0x01f00000) Size(0x00a00000) 
[ID: 255] [SECCFG] BaseAddr(0x02900000) Size(0x00020000) 
[ID: 255] [UBOOT] BaseAddr(0x02920000) Size(0x00060000) 
[ID: 255] [BOOTIMG] BaseAddr(0x02980000) Size(0x00600000) 
[ID: 255] [RECOVERY] BaseAddr(0x02f80000) Size(0x00600000) 
[ID: 255] [SEC_RO] BaseAddr(0x03580000) Size(0x00600000) 
[ID: 255] [MISC] BaseAddr(0x03b80000) Size(0x00080000) 
[ID: 255] [LOGO] BaseAddr(0x03c00000) Size(0x00300000) 
[ID: 255] [EBR2] BaseAddr(0x03f00000) Size(0x00080000) 
[ID: 255] [CUSTOM] BaseAddr(0x03f80000) Size(0x19000000) 
[ID: 255] [EXPDB] BaseAddr(0x1cf80000) Size(0x00a00000) 
[ID: 255] [ROOTM] BaseAddr(0x1d980000) Size(0x00400000) 
[ID: 255] [FRP] BaseAddr(0x1dd80000) Size(0x00100000) 
[ID: 255] [ANDROID] BaseAddr(0x1de80000) Size(0x93300000) 
[ID: 255] [CACHE] BaseAddr(0xb1180000) Size(0x0f000000) 
[ID: 255] [USRDATA] BaseAddr(0xc0180000) Size(0x111580000) 
[ID: 255] [BMTPOOL] BaseAddr(0xffff00a8) Size(0x01500000) 
Detecting Device info.......OK
Product: HUAWEI
Device Model: HUAWEI LUA-U22
ID: LUA-U22C567B014
Sw Internal: LUA-U22C567B014
Build Date: Wed Dec 27 10:09:04 CST 2017
Chip Ver: S01
Android Version: 5.1
Architecture: armeabi-v7a
FRP RESET... [FRP] .....OK
All Done By EFT Dongle

  Reply With Quote
The Following User Says Thank You to jaan_e_ahsan45 For This Useful Post:
Old 04-23-2019, 18:52   #807 (permalink)
No Life Poster
 
Join Date: Dec 2016
Location: .
Posts: 869
Member: 2659717
Status: Offline
Thanks Meter: 487
Wx3 frp done

  Reply With Quote
The Following User Says Thank You to mickeybrown026 For This Useful Post:
Old 04-24-2019, 07:24   #808 (permalink)
Junior Member
 
Join Date: Jul 2008
Location: Faisalabad
Posts: 38
Member: 806294
Status: Offline
Thanks Meter: 32
Motorola xt1254 FRP Done With #EFT Dongle

Motorola xt1254 FRP Done With #EFT Dongle...
  Reply With Quote
The Following User Says Thank You to SAJID338 For This Useful Post:
Old 04-24-2019, 11:45   #809 (permalink)
Freak Poster
 
jaan_e_ahsan45's Avatar
 
Join Date: Jan 2008
Location: PAKISTAN
Age: 38
Posts: 193
Member: 689829
Status: Offline
Sonork: 100.1651716
Thanks Meter: 102
LG X-Power (LS755) Permanent Unlock (invalid sim) Done with Great EFT...

Done by writing Flash Dump.
No invalid sim After Factory Reset

  Reply With Quote
The Following 2 Users Say Thank You to jaan_e_ahsan45 For This Useful Post:
Old 04-25-2019, 06:39   #810 (permalink)
Banned
 
Join Date: Oct 2017
Location: pakistan kpk mansehra
Age: 26
Posts: 1,273
Member: 2765424
Status: Offline
Thanks Meter: 1,039
Donate money to this user
samsung g615f u2 reset screen lock don without data lose

samsung g615f u2 reset screen lock don without data lose


Opening Port COM9...........OK
Verifying Download Mod
OK
Initialization.......OK
Reading Phone Partitation Table........OK
Partition Size : 8192
Unpak pit .......OK
FLASHING FIRMWARE TO PHONE.....
Sending data: ..........OK
FLASHING DONE!
Rebooting PDA TO NORMAL MODE........OK
Waiting For ADB Device.....Detecting Device Info.....DONE
Device Model: SM-G615F
Device CPU: armeabi-v7a
Android SDK: 24
Android Version: 7.0
Screen Lock reset .......OK
  Reply With Quote
The Following User Says Thank You to taimur-ahmad For This Useful Post:
Reply

Bookmarks


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


 



All times are GMT +1. The time now is 12:22.



Powered by Searchlight © 2024 Axivo Inc.
vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2024 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2023 -
Page generated in 0.74601 seconds with 9 queries

SEO by vBSEO