|
Welcome to the GSM-Forum forums. You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. Only registered members may post questions, contact other members or search our database of over 8 million posts. Registration is fast, simple and absolutely free so please - Click to REGISTER! If you have any problems with the registration process or your account login, please contact contact us . |
|
Register | FAQ | Donate | Forum Rules | Root any Device | ★iPhone Unlock★ | ★ Direct Codes ★ | Direct Unlock Source |
| LinkBack | Thread Tools | Display Modes |
02-16-2019, 16:35 | #692 (permalink) |
No Life Poster Join Date: May 2014 Location: UGANDA
Posts: 801
Member: 2185549 Status: Offline Thanks Meter: 535 | J730F SCREN LOCK RESET BY A CLICK Opening Port COM28...........OK Verifying Download Mod OK Initialization.......OK Reading Phone Partitation Table........OK Partition Size : 8192 Unpak pit .......OK FLASHING FIRMWARE TO PHONE..... Sending data: ..........OK FLASHING DONE! Rebooting PDA TO NORMAL MODE........OK Waiting For ADB Device.....Detecting Device Info.....DONE Device Model: SM-J730F Device CPU: armeabi-v7a Android SDK: 24 Android Version: 7.0 Screen Lock reset .......OK |
The Following User Says Thank You to ferouz kassim For This Useful Post: |
02-19-2019, 15:46 | #693 (permalink) |
No Life Poster Join Date: Oct 2015 Location: Unknown
Posts: 695
Member: 2469611 Status: Offline Thanks Meter: 389 | SCL-L32 Frp Done Code: EFT Dongle Connecting Fastboot ....... Connecting Fastboot .......Ok Model Phone: HW-SCL-L32 SW: SCL-L32C627B150 Connecting Server .....RECEIVED Connecting Server .....READY Erase Done , The Device Will Reboot And Factory Reset Reboot ...............OK By EFT Dongle OK |
The Following User Says Thank You to CYB3R GSM For This Useful Post: |
02-24-2019, 08:58 | #694 (permalink) |
Freak Poster Join Date: Jan 2008 Location: PAKISTAN Age: 38
Posts: 193
Member: 689829 Status: Offline Sonork: 100.1651716 Thanks Meter: 102 | Nokia 1 TA-1047 Hang On Logo Done with erase UserData... Code: Wating Device..........OK CPU: MT6737M Chip Version: 0x0000ca00 Chip Ext Clock: EXT_26M Writing Mode..........OK Internal RAM: Internal SRAM Size: 128.00 KB External RAM: Type DRAM External Ram Size: 1.00 GB EMMC: EMMC PART BOOT1 Size: 4.00 MB EMMC PART BOOT2 Size: 4.00 MB EMMC PART RPMB Size: 512.00 KB EMMC PART USER Size: 7.28 GB Battery: Battery Voltage: 4317 Injection..........OK Detecting Parts info............OK [ID: 1] [preloader] BaseAddr(0x00000000) Size(0x00400000) [ID: 8] [pgpt] BaseAddr(0x00000000) Size(0x00080000) [ID: 8] [proinfo] BaseAddr(0x00080000) Size(0x00300000) [ID: 8] [nvram] BaseAddr(0x00380000) Size(0x00500000) [ID: 8] [protect1] BaseAddr(0x00880000) Size(0x00a00000) [ID: 8] [protect2] BaseAddr(0x01280000) Size(0x00a00000) [ID: 8] [lk] BaseAddr(0x01c80000) Size(0x00100000) [ID: 8] [para] BaseAddr(0x01d80000) Size(0x00080000) [ID: 8] [boot] BaseAddr(0x01e00000) Size(0x01000000) [ID: 8] [recovery] BaseAddr(0x02e00000) Size(0x01000000) [ID: 8] [logo] BaseAddr(0x03e00000) Size(0x00200000) [ID: 8] [expdb] BaseAddr(0x04000000) Size(0x00a00000) [ID: 8] [seccfg] BaseAddr(0x04a00000) Size(0x00080000) [ID: 8] [oemkeystore] BaseAddr(0x04a80000) Size(0x00200000) [ID: 8] [secro] BaseAddr(0x04c80000) Size(0x00200000) [ID: 8] [keystore] BaseAddr(0x04e80000) Size(0x00800000) [ID: 8] [tee1] BaseAddr(0x05680000) Size(0x00200000) [ID: 8] [tee2] BaseAddr(0x05880000) Size(0x00200000) [ID: 8] [frp] BaseAddr(0x05a80000) Size(0x00100000) [ID: 8] [nvdata] BaseAddr(0x05b80000) Size(0x02000000) [ID: 8] [odmdtbo] BaseAddr(0x07b80000) Size(0x00200000) [ID: 8] [metadata] BaseAddr(0x07d80000) Size(0x02000000) [ID: 8] [box] BaseAddr(0x09d80000) Size(0x00800000) [ID: 8] [systeminfo] BaseAddr(0x0a580000) Size(0x00020000) [ID: 8] [sutinfo] BaseAddr(0x0a5a0000) Size(0x00020000) [ID: 8] [cda] BaseAddr(0x0a5c0000) Size(0x00800000) [ID: 8] [deviceinfo] BaseAddr(0x0adc0000) Size(0x00100000) [ID: 8] [elabel] BaseAddr(0x0aec0000) Size(0x00140000) [ID: 8] [vendor] BaseAddr(0x0b000000) Size(0x14000000) [ID: 8] [system] BaseAddr(0x1f000000) Size(0x57000000) [ID: 8] [cache] BaseAddr(0x76000000) Size(0x09800000) [ID: 8] [userdata] BaseAddr(0x7f800000) Size(0x151780000) [ID: 8] [flashinfo] BaseAddr(0x1d0f80000) Size(0x01000000) [ID: 8] [sgpt] BaseAddr(0x1d1f80000) Size(0x00080000) Detecting Device info.......OK Product: alps Device Model: Nokia 1 ID: 00WW_1_33A Sw Internal: Build Date: Tue Sep 11 18:33:00 CST 2018 Chip Ver: Android Version: 8.1.0 Architecture: armeabi-v7a Formating... [USERDATA] .....OK All Done By EFT Dongle |
The Following User Says Thank You to jaan_e_ahsan45 For This Useful Post: |
02-24-2019, 09:08 | #695 (permalink) |
Freak Poster Join Date: Jan 2008 Location: PAKISTAN Age: 38
Posts: 193
Member: 689829 Status: Offline Sonork: 100.1651716 Thanks Meter: 102 | Nokia 1 Ta-1047 FRP Reset Done... Code: Wating Device..........OK CPU: MT6737M Chip Version: 0x0000ca00 Chip Ext Clock: EXT_26M Writing Mode..........OK Internal RAM: Internal SRAM Size: 128.00 KB External RAM: Type DRAM External Ram Size: 1.00 GB EMMC: EMMC PART BOOT1 Size: 4.00 MB EMMC PART BOOT2 Size: 4.00 MB EMMC PART RPMB Size: 512.00 KB EMMC PART USER Size: 7.28 GB Battery: Battery Voltage: 4254 Injection..........OK Detecting Parts info............OK [ID: 1] [preloader] BaseAddr(0x00000000) Size(0x00400000) [ID: 8] [pgpt] BaseAddr(0x00000000) Size(0x00080000) [ID: 8] [proinfo] BaseAddr(0x00080000) Size(0x00300000) [ID: 8] [nvram] BaseAddr(0x00380000) Size(0x00500000) [ID: 8] [protect1] BaseAddr(0x00880000) Size(0x00a00000) [ID: 8] [protect2] BaseAddr(0x01280000) Size(0x00a00000) [ID: 8] [lk] BaseAddr(0x01c80000) Size(0x00100000) [ID: 8] [para] BaseAddr(0x01d80000) Size(0x00080000) [ID: 8] [boot] BaseAddr(0x01e00000) Size(0x01000000) [ID: 8] [recovery] BaseAddr(0x02e00000) Size(0x01000000) [ID: 8] [logo] BaseAddr(0x03e00000) Size(0x00200000) [ID: 8] [expdb] BaseAddr(0x04000000) Size(0x00a00000) [ID: 8] [seccfg] BaseAddr(0x04a00000) Size(0x00080000) [ID: 8] [oemkeystore] BaseAddr(0x04a80000) Size(0x00200000) [ID: 8] [secro] BaseAddr(0x04c80000) Size(0x00200000) [ID: 8] [keystore] BaseAddr(0x04e80000) Size(0x00800000) [ID: 8] [tee1] BaseAddr(0x05680000) Size(0x00200000) [ID: 8] [tee2] BaseAddr(0x05880000) Size(0x00200000) [ID: 8] [frp] BaseAddr(0x05a80000) Size(0x00100000) [ID: 8] [nvdata] BaseAddr(0x05b80000) Size(0x02000000) [ID: 8] [odmdtbo] BaseAddr(0x07b80000) Size(0x00200000) [ID: 8] [metadata] BaseAddr(0x07d80000) Size(0x02000000) [ID: 8] [box] BaseAddr(0x09d80000) Size(0x00800000) [ID: 8] [systeminfo] BaseAddr(0x0a580000) Size(0x00020000) [ID: 8] [sutinfo] BaseAddr(0x0a5a0000) Size(0x00020000) [ID: 8] [cda] BaseAddr(0x0a5c0000) Size(0x00800000) [ID: 8] [deviceinfo] BaseAddr(0x0adc0000) Size(0x00100000) [ID: 8] [elabel] BaseAddr(0x0aec0000) Size(0x00140000) [ID: 8] [vendor] BaseAddr(0x0b000000) Size(0x14000000) [ID: 8] [system] BaseAddr(0x1f000000) Size(0x57000000) [ID: 8] [cache] BaseAddr(0x76000000) Size(0x09800000) [ID: 8] [userdata] BaseAddr(0x7f800000) Size(0x151780000) [ID: 8] [flashinfo] BaseAddr(0x1d0f80000) Size(0x01000000) [ID: 8] [sgpt] BaseAddr(0x1d1f80000) Size(0x00080000) Detecting Device info.......OK Product: alps Device Model: Nokia 1 ID: 00WW_1_33A Sw Internal: Build Date: Tue Sep 11 18:33:00 CST 2018 Chip Ver: Android Version: 8.1.0 Architecture: armeabi-v7a FRP RESET... [FRP] .....OK All Done By EFT Dongle |
The Following User Says Thank You to jaan_e_ahsan45 For This Useful Post: |
02-25-2019, 08:51 | #696 (permalink) |
No Life Poster Join Date: Jul 2011 Location: Great India
Posts: 1,646
Member: 1615596 Status: Offline Sonork: 100.160704? Thanks Meter: 760 | N920c Screen Lock done. Code: Opening Port COM464...........OK Verifying Download Mod OK Initialization.......OK Reading Phone Partitation Table........OK Partition Size : 8192 Unpak pit .......OK FLASHING FIRMWARE TO PHONE..... Sending data: ..........OK FLASHING DONE! Rebooting PDA TO NORMAL MODE........OK Waiting For ADB Device.....Detecting Device Info.....DONE Device Model: SM-N920C Device CPU: arm64-v8a Android SDK: 24 Android Version: 7.0 Screen Lock reset .......OK |
The Following User Says Thank You to .::Gsm-Play::. For This Useful Post: |
02-26-2019, 13:18 | #697 (permalink) |
Freak Poster Join Date: Jan 2008 Location: PAKISTAN Age: 38
Posts: 193
Member: 689829 Status: Offline Sonork: 100.1651716 Thanks Meter: 102 | LG G3 Clone MT6582 Bootloop Done with erase UserData... Code: Wating Device..........OK CPU: MT6582 Chip Version: 0x0000ca01 Chip Ext Clock: EXT_26M Writing Mode..........OK Internal RAM: Internal SRAM Size: 128.00 KB External RAM: Type DRAM External Ram Size: 1.00 GB EMMC: EMMC PART BOOT1 Size: 4.00 MB EMMC PART BOOT2 Size: 4.00 MB EMMC PART RPMB Size: 4.00 MB EMMC PART USER Size: 14.68 GB Battery: Battery Voltage: 3567 Injection..........OK Detecting Parts info............OK [ID: 255] [PRELOADER] BaseAddr(0x00000000) Size(0x00c00000) [ID: 255] [MBR] BaseAddr(0x00c00000) Size(0x00080000) [ID: 255] [EBR1] BaseAddr(0x00c80000) Size(0x00080000) [ID: 255] [PRO_INFO] BaseAddr(0x00d00000) Size(0x00300000) [ID: 255] [NVRAM] BaseAddr(0x01000000) Size(0x00500000) [ID: 255] [PROTECT_F] BaseAddr(0x01500000) Size(0x00a00000) [ID: 255] [PROTECT_S] BaseAddr(0x01f00000) Size(0x00a00000) [ID: 255] [SECCFG] BaseAddr(0x02900000) Size(0x00020000) [ID: 255] [UBOOT] BaseAddr(0x02920000) Size(0x00060000) [ID: 255] [BOOTIMG] BaseAddr(0x02980000) Size(0x01000000) [ID: 255] [RECOVERY] BaseAddr(0x03980000) Size(0x01000000) [ID: 255] [SEC_RO] BaseAddr(0x04980000) Size(0x00600000) [ID: 255] [MISC] BaseAddr(0x04f80000) Size(0x00080000) [ID: 255] [LOGO] BaseAddr(0x05000000) Size(0x00300000) [ID: 255] [EXPDB] BaseAddr(0x05300000) Size(0x00a00000) [ID: 255] [ANDROID] BaseAddr(0x05d00000) Size(0x3e800000) [ID: 255] [CACHE] BaseAddr(0x44500000) Size(0x07e00000) [ID: 255] [USRDATA] BaseAddr(0x4c300000) Size(0x35ec00000) [ID: 255] [BMTPOOL] BaseAddr(0xffff00a8) Size(0x01500000) Detecting Device info.......OK Product: alps Device Model: lcsh82_cwet_kk ID: ALPS.KK1.MP1.V2.10 Sw Internal: Build Date: 2015年 05月 21日 星期四 16:13:20 CST Chip Ver: S01 Android Version: 4.4.2 Architecture: armeabi-v7a Formating... [USERDATA] All Done By EFT Dongle |
The Following User Says Thank You to jaan_e_ahsan45 For This Useful Post: |
03-01-2019, 16:02 | #705 (permalink) |
Insane Poster Join Date: Feb 2010
Posts: 73
Member: 1230788 Status: Offline Sonork: YOONUSMOHAMMED Thanks Meter: 25 | Wating Device..........OK CPU: MT6582 Chip Version: 0x0000ca01 Chip Ext Clock: EXT_26M Writing Mode..........OK Internal RAM: Internal SRAM Size: 128.00 KB External RAM: Type DRAM External Ram Size: 1.00 GB EMMC: EMMC PART BOOT1 Size: 4.00 MB EMMC PART BOOT2 Size: 4.00 MB EMMC PART RPMB Size: 4.00 MB EMMC PART USER Size: 7.28 GB Battery: Battery Voltage: 3864 Injection..........OK Detecting Parts info............OK [ID: 255] [PRELOADER] BaseAddr(0x00000000) Size(0x00c00000) [ID: 255] [MBR] BaseAddr(0x00c00000) Size(0x00080000) [ID: 255] [EBR1] BaseAddr(0x00c80000) Size(0x00080000) [ID: 255] [PRO_INFO] BaseAddr(0x00d00000) Size(0x00300000) [ID: 255] [NVRAM] BaseAddr(0x01000000) Size(0x00500000) [ID: 255] [PROTECT_F] BaseAddr(0x01500000) Size(0x00a00000) [ID: 255] [PROTECT_S] BaseAddr(0x01f00000) Size(0x00a00000) [ID: 255] [SECCFG] BaseAddr(0x02900000) Size(0x00020000) [ID: 255] [UBOOT] BaseAddr(0x02920000) Size(0x00060000) [ID: 255] [BOOTIMG] BaseAddr(0x02980000) Size(0x01000000) [ID: 255] [RECOVERY] BaseAddr(0x03980000) Size(0x01000000) [ID: 255] [SEC_RO] BaseAddr(0x04980000) Size(0x00600000) [ID: 255] [MISC] BaseAddr(0x04f80000) Size(0x00080000) [ID: 255] [LOGO] BaseAddr(0x05000000) Size(0x00300000) [ID: 255] [EXPDB] BaseAddr(0x05300000) Size(0x00a00000) [ID: 255] [ANDROID] BaseAddr(0x05d00000) Size(0x3e800000) [ID: 255] [CACHE] BaseAddr(0x44500000) Size(0x07e00000) [ID: 255] [USRDATA] BaseAddr(0x4c300000) Size(0x185400000) [ID: 255] [BMTPOOL] BaseAddr(0xffff00a8) Size(0x01500000) Detecting Device info.......OK Product: Micromax Device Model: Micromax Q371 ID: KOT49H release-keys Sw Internal: Build Date: 2015年 01月 16日 星期五 17:48:50 CST Chip Ver: S01 Android Version: 4.4.2 Architecture: armeabi-v7a Formating... [USERDATA] .....OK All Done By EFT Dongle |
The Following User Says Thank You to MOHAMMED001 For This Useful Post: |
Bookmarks |
| |
|