|
Welcome to the GSM-Forum forums. You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. Only registered members may post questions, contact other members or search our database of over 8 million posts. Registration is fast, simple and absolutely free so please - Click to REGISTER! If you have any problems with the registration process or your account login, please contact contact us . |
|
Register | FAQ | Donate | Forum Rules | Root any Device | ★iPhone Unlock★ | ★ Direct Codes ★ | Direct Unlock Source | Search | Today's Posts | Mark Forums Read |
| LinkBack | Thread Tools | Display Modes |
02-09-2019, 08:37 | #676 (permalink) |
Banned Join Date: Oct 2017 Location: pakistan kpk mansehra Age: 26
Posts: 1,273
Member: 2765424 Status: Offline Thanks Meter: 1,039 | Qmobile x6 dead recover done QMOBILE X6 DEAD RECOVER DONE Wating Device..........OK CPU: MT6571 Chip Version: 0x0000ca01 Chip Ext Clock: EXT_26M Writing Mode..... Wating Device..........OK Internal RAM: Internal SRAM Size: 128.00 KB External RAM: Type DRAM External Ram Size: 256.00 MB NAND Flash: Device Id: [KINGSTON] KTN0403CS_TCR1 17 NAND Flash Size: 512.00 MB Battery: Battery Voltage: 3745 Injection..........OK Flashing....Preloader.....OK Flashing....Preloader.....OK Flashing images.............OK All Done Flash Done By EFT Dongle |
The Following User Says Thank You to taimur-ahmad For This Useful Post: |
02-09-2019, 08:41 | #677 (permalink) |
Banned Join Date: Oct 2017 Location: pakistan kpk mansehra Age: 26
Posts: 1,273
Member: 2765424 Status: Offline Thanks Meter: 1,039 | Huawei tit-al00 frp reset done HUAWEI TIT-AL00 FRP RESET DONE EFT Dongle Connecting Fastboot ....... Connecting Fastboot .......Ok Model Phone: HUAWEI TIT-AL00 SW: TIT-AL00C328B129 Connecting Server .....RECEIVED Connecting Server .....READY Erase Done , The Device Will Reboot And Factory Reset Reboot ...............OK By EFT Dongle OK |
The Following User Says Thank You to taimur-ahmad For This Useful Post: |
02-09-2019, 08:46 | #678 (permalink) |
Banned Join Date: Oct 2017 Location: pakistan kpk mansehra Age: 26
Posts: 1,273
Member: 2765424 Status: Offline Thanks Meter: 1,039 | HUAWEI MATE 9 mha-l29 FLASH DONE HUAWEI MATE 9 mha-l29 FLASH DONE Connecting Fastboot .......... Connecting Fastboot .......Ok Model Phone: MHA-L29 SW: :MHA-L29 8.0.0.383(C185) Writing: curver.img..... Skip: curver.img:OKAY Writing: verlist.img..... Skip: verlist.img:OKAY Writing: package_type.img..... Skip: package_type.img:OKAY Writing: xloader.img..... Skip: xloader.img:OKAY Writing: fw_lpm3.img..... Skip: fw_lpm3.img:OKAY Writing: fastboot.img..... Skip: fastboot.img:OKAY Writing: vector.img..... Skip: vector.img:OKAY Writing: modemnvm_update.img..... Skip: modemnvm_update.img:OKAY Writing: teeos.img..... Skip: teeos.img:OKAY Writing: trustfirmware.img..... Skip: trustfirmware.img:OKAY Writing: sensorhub.img..... Skip: sensorhub.img:OKAY Writing: fw_hifi.img..... Skip: fw_hifi.img:OKAY Writing: boot.img..... Skip: boot.img:OKAY Writing: recovery.img..... Skip: recovery.img:OKAY Writing: recovery2.img..... Skip: recovery2.img:OKAY Writing: dts.img..... Skip: dts.img:OKAY Writing: system.img..... Skip: system.img:OKAY Writing: isp_firmware.img..... Skip: isp_firmware.img:OKAY Writing: modem_fw.img..... Skip: modem_fw.img:OKAY Writing: hisee_img.img..... Skip: hisee_img.img:OKAY Writing: hisee_fs.img..... Skip: hisee_fs.img:OKAY Writing: vendor.img..... Skip: vendor.img:OKAY Writing: product.img..... Skip: product.img:OKAY Writing: ufsfw.img..... Skip: ufsfw.img:OKAY Flash Done By EFT Dongle |
The Following User Says Thank You to taimur-ahmad For This Useful Post: |
02-10-2019, 14:09 | #681 (permalink) |
Freak Poster Join Date: Aug 2009 Location: Algeria
Posts: 165
Member: 1106514 Status: Offline Thanks Meter: 133 | SAMSUNG J5 PRIME SM-G570F Restore Original IMEI done SAMSUNG J5 PRIME SM-G570F Restore Original IMEI done |
The Following User Says Thank You to soulay For This Useful Post: |
02-12-2019, 06:18 | #682 (permalink) |
Freak Poster Join Date: Jul 2016
Posts: 440
Member: 2604648 Status: Offline Thanks Meter: 346 | Star mobile_UP Prime Screen Lock Wating Device..........OK CPU: MT6737M Chip Version: 0x0000ca00 Chip Ext Clock: EXT_26M Writing Mode..........OK Internal RAM: Internal SRAM Size: 128.00 KB External RAM: Type DRAM External Ram Size: 1.00 GB EMMC: EMMC PART BOOT1 Size: 4.00 MB EMMC PART BOOT2 Size: 4.00 MB EMMC PART RPMB Size: 4.00 MB EMMC PART USER Size: 14.25 GB Battery: Battery Voltage: 3990 Injection..........OK Detecting Parts info............OK [ID: 1] [preloader] BaseAddr(0x00000000) Size(0x00400000) [ID: 8] [pgpt] BaseAddr(0x00000000) Size(0x00080000) [ID: 8] [proinfo] BaseAddr(0x00080000) Size(0x00300000) [ID: 8] [nvram] BaseAddr(0x00380000) Size(0x00500000) [ID: 8] [protect1] BaseAddr(0x00880000) Size(0x00a00000) [ID: 8] [protect2] BaseAddr(0x01280000) Size(0x00a00000) [ID: 8] [lk] BaseAddr(0x01c80000) Size(0x00080000) [ID: 8] [para] BaseAddr(0x01d00000) Size(0x00080000) [ID: 8] [boot] BaseAddr(0x01d80000) Size(0x01000000) [ID: 8] [recovery] BaseAddr(0x02d80000) Size(0x01000000) [ID: 8] [logo] BaseAddr(0x03d80000) Size(0x00800000) [ID: 8] [expdb] BaseAddr(0x04580000) Size(0x00a00000) [ID: 8] [seccfg] BaseAddr(0x04f80000) Size(0x00080000) [ID: 8] [oemkeystore] BaseAddr(0x05000000) Size(0x00200000) [ID: 8] [secro] BaseAddr(0x05200000) Size(0x00600000) [ID: 8] [keystore] BaseAddr(0x05800000) Size(0x00800000) [ID: 8] [tee1] BaseAddr(0x06000000) Size(0x00500000) [ID: 8] [tee2] BaseAddr(0x06500000) Size(0x00500000) [ID: 8] [frp] BaseAddr(0x06a00000) Size(0x00100000) [ID: 8] [nvdata] BaseAddr(0x06b00000) Size(0x02000000) [ID: 8] [metadata] BaseAddr(0x08b00000) Size(0x02500000) [ID: 8] [system] BaseAddr(0x0b000000) Size(0xce800000) [ID: 8] [cache] BaseAddr(0xd9800000) Size(0x19000000) [ID: 8] [userdata] BaseAddr(0xf2800000) Size(0x29c780000) [ID: 8] [flashinfo] BaseAddr(0x38ef80000) Size(0x01000000) [ID: 8] [sgpt] BaseAddr(0x38ff80000) Size(0x00080000) Detecting Device info.......OK Product: Starmobile Device Model: UP Prime ID: Starmobile_UPPrime_v13_06292017 Sw Internal: Build Date: 2017年 06月 29日 星期四 13:58:16 CST Chip Ver: S01 Android Version: 7.0 Architecture: armeabi-v7a Screen Lock Reset:.......... Screen Lock Reset:.........OK All Done By EFT Dongle |
The Following User Says Thank You to buffer2k11 For This Useful Post: |
02-13-2019, 05:58 | #687 (permalink) |
Freak Poster Join Date: Jan 2008 Location: PAKISTAN Age: 38
Posts: 193
Member: 689829 Status: Offline Sonork: 100.1651716 Thanks Meter: 103 | Lava Iris X9 Read Flash Dump Code: Wating Device..........OK CPU: MT6582 Chip Version: 0x0000ca01 Chip Ext Clock: EXT_26M Writing Mode..........OK Internal RAM: Internal SRAM Size: 128.00 KB External RAM: Type DRAM External Ram Size: 1.00 GB EMMC: EMMC PART BOOT1 Size: 4.00 MB EMMC PART BOOT2 Size: 4.00 MB EMMC PART RPMB Size: 4.00 MB EMMC PART USER Size: 14.56 GB Battery: Battery Voltage: 4072 Injection..........OK [PRELOADER] BaseAddr(0x00000000) Size(0x00c00000) [MBR] BaseAddr(0x00c00000) Size(0x00080000) [EBR1] BaseAddr(0x00c80000) Size(0x00080000) [PRO_INFO] BaseAddr(0x00d00000) Size(0x00300000) [NVRAM] BaseAddr(0x01000000) Size(0x00500000) [PROTECT_F] BaseAddr(0x01500000) Size(0x00a00000) [PROTECT_S] BaseAddr(0x01f00000) Size(0x00a00000) [SECCFG] BaseAddr(0x02900000) Size(0x00020000) [UBOOT] BaseAddr(0x02920000) Size(0x00060000) [BOOTIMG] BaseAddr(0x02980000) Size(0x01000000) [RECOVERY] BaseAddr(0x03980000) Size(0x01000000) [SEC_RO] BaseAddr(0x04980000) Size(0x00600000) [MISC] BaseAddr(0x04f80000) Size(0x00080000) [LOGO] BaseAddr(0x05000000) Size(0x00300000) [EXPDB] BaseAddr(0x05300000) Size(0x00a00000) [ANDROID] BaseAddr(0x05d00000) Size(0x70800000) [CACHE] BaseAddr(0x76500000) Size(0x07e00000) [USRDATA] BaseAddr(0x7e300000) Size(0x325200000) [BMTPOOL] BaseAddr(0x3a3500000) Size(0x01500000) Reading: ... Reading: CACHE [Size:126.00 MB] .....OK Reading: USERDATA [Size:12.58 GB] .....OK Reading: PRELOADER [Size:12.00 MB] .....OK Reading: MBR [Size:512.00 KB] .....OK Reading: EBR1 [Size:512.00 KB] .....OK Reading: PRO_INFO [Size:3.00 MB] .....OK Reading: NVRAM [Size:5.00 MB] .....OK Reading: PROTECT_F [Size:10.00 MB] .....OK Reading: PROTECT_S [Size:10.00 MB] .....OK Reading: SECCFG [Size:128.00 KB] .....OK Reading: UBOOT [Size:384.00 KB] .....OK Reading: BOOTIMG [Size:16.00 MB] .....OK Reading: RECOVERY [Size:16.00 MB] .....OK Reading: SEC_RO [Size:6.00 MB] .....OK Reading: MISC [Size:512.00 KB] .....OK Reading: LOGO [Size:3.00 MB] .....OK Reading: EXPDB [Size:10.00 MB] .....OK Reading: ANDROID [Size:1.76 GB] .....OK ROM info.......OK Product: alps Device Model: iris X9 ID: LAVA_IrisX9_INT_S110_20150919 Sw Internal: Build Date: 2015年 09月 19日 星期六 17:18:34 CST Chip Ver: S01 Android Version: 5.0 Architecture: armeabi-v7a Read Flash (Dump) Done By EFT Dongle |
The Following User Says Thank You to jaan_e_ahsan45 For This Useful Post: |
02-15-2019, 20:54 | #688 (permalink) |
Freak Poster Join Date: Aug 2017 Location: Ukraine
Posts: 202
Member: 2750401 Status: Offline Thanks Meter: 134 | ERGO A503-Optima frp done Wating Device..........OK CPU: MT6580 Chip Version: 0x0000ca00 Chip Ext Clock: EXT_26M Writing Mode..........OK Internal RAM: Internal SRAM Size: 128.00 KB External RAM: Type DRAM External Ram Size: 1.00 GB EMMC: EMMC PART BOOT1 Size: 4.00 MB EMMC PART BOOT2 Size: 4.00 MB EMMC PART RPMB Size: 4.00 MB EMMC PART USER Size: 7.32 GB Battery: Battery Voltage: 3855 Injection..........OK Detecting Parts info............OK [ID: 1] [preloader] BaseAddr(0x00000000) Size(0x00400000) [ID: 8] [pgpt] BaseAddr(0x00000000) Size(0x00080000) [ID: 8] [proinfo] BaseAddr(0x00080000) Size(0x00300000) [ID: 8] [nvram] BaseAddr(0x00380000) Size(0x00500000) [ID: 8] [protect1] BaseAddr(0x00880000) Size(0x00a00000) [ID: 8] [protect2] BaseAddr(0x01280000) Size(0x00a00000) [ID: 8] [seccfg] BaseAddr(0x01c80000) Size(0x00040000) [ID: 8] [lk] BaseAddr(0x01cc0000) Size(0x00060000) [ID: 8] [boot] BaseAddr(0x01d20000) Size(0x01000000) [ID: 8] [recovery] BaseAddr(0x02d20000) Size(0x01000000) [ID: 8] [para] BaseAddr(0x03d20000) Size(0x00080000) [ID: 8] [logo] BaseAddr(0x03da0000) Size(0x00800000) [ID: 8] [expdb] BaseAddr(0x045a0000) Size(0x00a00000) [ID: 8] [frp] BaseAddr(0x04fa0000) Size(0x00100000) [ID: 8] [nvdata] BaseAddr(0x050a0000) Size(0x02000000) [ID: 8] [metadata] BaseAddr(0x070a0000) Size(0x02760000) [ID: 8] [oemkeystore] BaseAddr(0x09800000) Size(0x00200000) [ID: 8] [secro] BaseAddr(0x09a00000) Size(0x00600000) [ID: 8] [keystore] BaseAddr(0x0a000000) Size(0x00800000) [ID: 8] [system] BaseAddr(0x0a800000) Size(0x73000000) [ID: 8] [cache] BaseAddr(0x7d800000) Size(0x10000000) [ID: 8] [userdata] BaseAddr(0x8d800000) Size(0x145b80000) [ID: 8] [flashinfo] BaseAddr(0x1d3380000) Size(0x01000000) [ID: 8] [sgpt] BaseAddr(0x1d4380000) Size(0x00080000) Detecting Device info.......OK Product: ERGO Device Model: A503-Optima ID: M8_HT16_V9_A503_Android_6.0_V9.0.5 Sw Internal: Build Date: Fri Aug 25 09:09:22 CST 2017 Chip Ver: S01 Android Version: 6.0 Architecture: armeabi-v7a FRP RESET... [FRP] .....OK All Done By EFT Dongle |
The Following User Says Thank You to dimasc For This Useful Post: |
02-16-2019, 07:38 | #689 (permalink) |
Freak Poster Join Date: Jan 2008 Location: PAKISTAN Age: 38
Posts: 193
Member: 689829 Status: Offline Sonork: 100.1651716 Thanks Meter: 103 | FRD-L19 Bootloop Done by Flashing... Code: Connecting Fastboot .......... Model Phone: FRD-L19 SW: :FRD-L19C636B380 Connecting Server .....RECEIVED Connecting Server .....READY Writing: curver.img..... Skip: curver.img:OKAY Writing: verlist.img..... Skip: verlist.img:OKAY Writing: package_type.img..... Skip: package_type.img:OKAY Writing: efi.img..... Skip: efi.img:OKAY Writing: xloader.img..... Writing: xloader.img OKAY Writing: fw_lpm3.img..... Writing: fw_lpm3.img OKAY Writing: fastboot.img..... Writing: fastboot.img OKAY Writing: modemnvm_update.img..... Writing: modemnvm_update.img OKAY Writing: teeos.img..... Writing: teeos.img OKAY Writing: trustfirmware.img..... Writing: trustfirmware.img OKAY Writing: sensorhub.img..... Writing: sensorhub.img OKAY Writing: fw_hifi.img..... Writing: fw_hifi.img OKAY Writing: boot.img..... Writing: boot.img OKAY Writing: recovery.img..... Writing: recovery.img OKAY Writing: recovery2.img..... Writing: recovery2.img OKAY Writing: dts.img..... Writing: dts.img OKAY Writing: modem.img..... Writing: modem.img OKAY Writing: modem_dsp.img..... Writing: modem_dsp.img OKAY Writing: 3rdmodem.img..... Writing: 3rdmodem.img OKAY Writing: system.img..... Writing: system.img OKAY Writing: modem_dtb.img..... Writing: modem_dtb.img OKAY Writing: vendor.img..... Writing: vendor.img OKAY Writing: product.img..... Writing: product.img OKAY Flash Done By EFT Dongle |
The Following User Says Thank You to jaan_e_ahsan45 For This Useful Post: |
02-16-2019, 11:30 | #690 (permalink) |
Freak Poster Join Date: Jan 2008 Location: PAKISTAN Age: 38
Posts: 193
Member: 689829 Status: Offline Sonork: 100.1651716 Thanks Meter: 103 | Another FRD-L19 BootLoop Done.. Rolled Back From B380 to B360 |
The Following User Says Thank You to jaan_e_ahsan45 For This Useful Post: |
Bookmarks |
Thread Tools | |
Display Modes | |
| |
|