|
Welcome to the GSM-Forum forums. You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. Only registered members may post questions, contact other members or search our database of over 8 million posts. Registration is fast, simple and absolutely free so please - Click to REGISTER! If you have any problems with the registration process or your account login, please contact contact us . |
|
Register | FAQ | Donate | Forum Rules | Root any Device | ★iPhone Unlock★ | ★ Direct Codes ★ | Direct Unlock Source | Search | Today's Posts | Mark Forums Read |
| LinkBack | Thread Tools | Display Modes |
08-01-2019, 15:47 | #961 (permalink) |
No Life Poster Join Date: Oct 2006 Location: pakistan
Posts: 669
Member: 361094 Status: Offline Sonork: 100.1597521 Thanks Meter: 173 | y6 prime 2018 frp done Connecting Fastboot .......Ok Model Phone: ATU-L31 SW: ATU-L31 8.0.0.152(C185) Connecting Server .....RECEIVED Connecting Server .....READY Erase Done , The Device Will Reboot And Factory Reset Reboot ...............OK By EFT Dongle OK |
08-02-2019, 07:11 | #962 (permalink) |
No Life Poster Join Date: Aug 2014
Posts: 658
Member: 2233266 Status: Offline Thanks Meter: 252 | samsung j710f frp done Opening Port COM15...........OK Verifying Download Mod OK Initialization.......OK Reading Phone Partitation Table........OK Partition Size : 8192 Unpak pit .......OK FLASHING FIRMWARE TO PHONE..... Sending data: ..........OK FLASHING DONE! Rebooting PDA TO NORMAL MODE........OK Waiting For ADB Device.....Detecting Device Info.....DONE Device Model: SM-J710F Device CPU: armeabi-v7a Android SDK: 24 Android Version: 7.0 Resetting Samsung Account / Frp .......OK |
The Following User Says Thank You to Yahia_Sb For This Useful Post: |
08-03-2019, 04:06 | #963 (permalink) |
No Life Poster Join Date: Aug 2014
Posts: 658
Member: 2233266 Status: Offline Thanks Meter: 252 | samsung j701f-j7nex no data lose. pattern lock remove done 100% Opening Port COM15...........OK Verifying Download Mod OK Initialization.......OK Reading Phone Partitation Table........OK Partition Size : 8192 Unpak pit .......OK FLASHING FIRMWARE TO PHONE..... Sending data: ..........OK FLASHING DONE! Rebooting PDA TO NORMAL MODE........OK Waiting For ADB Device.....Detecting Device Info.....DONE Device Model: SM-J701F Device CPU: armeabi-v7a Android SDK: 27 Android Version: 8.1.0 Screen Lock reset .......OK |
The Following User Says Thank You to Yahia_Sb For This Useful Post: |
08-03-2019, 04:12 | #964 (permalink) |
No Life Poster Join Date: Aug 2014
Posts: 658
Member: 2233266 Status: Offline Thanks Meter: 252 | samsung j701f j7 nex no data lose by eft dongle done 100% Opening Port COM15...........OK Verifying Download Mod OK Initialization.......OK Reading Phone Partitation Table........OK Partition Size : 8192 Unpak pit .......OK FLASHING FIRMWARE TO PHONE..... Sending data: ..........OK FLASHING DONE! Rebooting PDA TO NORMAL MODE........OK Waiting For ADB Device.....Detecting Device Info.....DONE Device Model: SM-J701F Device CPU: armeabi-v7a Android SDK: 27 Android Version: 8.1.0 Screen Lock reset .......OK |
The Following User Says Thank You to Yahia_Sb For This Useful Post: |
08-03-2019, 06:20 | #965 (permalink) |
No Life Poster Join Date: Dec 2004 Location: Amoude-syria Age: 49
Posts: 1,164
Member: 98928 Status: Offline Thanks Meter: 474 | j700h u2 FRP ON reset screen lock ok her is the log: Code: Opening Port COM2659...........OK Verifying Download Mod OK Initialization.......OK Reading Phone Partitation Table........OK Partition Size : 8192 Unpak pit .......OK FLASHING FIRMWARE TO PHONE..... Writing: Fix Patch1.......OK Writing: Fix Patch2.......OK FLASHING DONE! Rebooting PDA TO NORMAL MODE........OK |
08-04-2019, 14:41 | #966 (permalink) |
Product Supporter Join Date: Jul 2008 Location: iran-shiraz
Posts: 735
Member: 814775 Status: Offline Sonork: 100.1587334 Thanks Meter: 973 | Remove Screen Lock Encrypted Data Huawei Y5 2017 MYA-L22 Remove Screen Lock Encrypted Data Huawei Y5 2017 MYA-L22 Code: Wating Device..........OK CPU: MT6737T Chip Version: 0x0000ca00 Chip Ext Clock: EXT_26M Writing Mode..........OK Internal RAM: Internal SRAM Size: 128.00 KB External RAM: Type DRAM External Ram Size: 2.00 GB EMMC: EMMC PART BOOT1 Size: 4.00 MB EMMC PART BOOT2 Size: 4.00 MB EMMC PART RPMB Size: 4.00 MB EMMC PART USER Size: 14.68 GB Battery: Battery Voltage: 3958 Injection..........OK Detecting Parts info............OK [ID: 1] [preloader] BaseAddr(0x00000000) Size(0x00400000) [ID: 8] [pgpt] BaseAddr(0x00000000) Size(0x00080000) [ID: 8] [proinfo] BaseAddr(0x00080000) Size(0x00300000) [ID: 8] [nvram] BaseAddr(0x00380000) Size(0x00c80000) [ID: 8] [protect1] BaseAddr(0x01000000) Size(0x00a00000) [ID: 8] [protect2] BaseAddr(0x01a00000) Size(0x00e00000) [ID: 8] [lk] BaseAddr(0x02800000) Size(0x00080000) [ID: 8] [lk2] BaseAddr(0x02880000) Size(0x00080000) [ID: 8] [para] BaseAddr(0x02900000) Size(0x00080000) [ID: 8] [boot] BaseAddr(0x02980000) Size(0x01000000) [ID: 8] [recovery] BaseAddr(0x03980000) Size(0x04000000) [ID: 8] [logo] BaseAddr(0x07980000) Size(0x00800000) [ID: 8] [expdb] BaseAddr(0x08180000) Size(0x00a00000) [ID: 8] [ROOTM] BaseAddr(0x08b80000) Size(0x00480000) [ID: 8] [seccfg] BaseAddr(0x09000000) Size(0x00800000) [ID: 8] [oemkeystore] BaseAddr(0x09800000) Size(0x00800000) [ID: 8] [secro] BaseAddr(0x0a000000) Size(0x00800000) [ID: 8] [keystore] BaseAddr(0x0a800000) Size(0x00800000) [ID: 8] [tee1] BaseAddr(0x0b000000) Size(0x00500000) [ID: 8] [tee2] BaseAddr(0x0b500000) Size(0x00500000) [ID: 8] [log] BaseAddr(0x0ba00000) Size(0x04000000) [ID: 8] [oeminfo] BaseAddr(0x0fa00000) Size(0x04800000) [ID: 8] [erecovery] BaseAddr(0x14200000) Size(0x04000000) [ID: 8] [frp] BaseAddr(0x18200000) Size(0x00100000) [ID: 8] [nvdata] BaseAddr(0x18300000) Size(0x02000000) [ID: 8] [metadata] BaseAddr(0x1a300000) Size(0x02500000) [ID: 8] [system] BaseAddr(0x1c800000) Size(0xc0000000) [ID: 8] [cust] BaseAddr(0xdc800000) Size(0x19000000) [ID: 8] [cache] BaseAddr(0xf5800000) Size(0x0c800000) [ID: 8] [userdata] BaseAddr(0x102000000) Size(0x2a8380000) [ID: 8] [flashinfo] BaseAddr(0x3aa380000) Size(0x01000000) [ID: 8] [sgpt] BaseAddr(0x3ab380000) Size(0x00080000) Detecting Device info.......OK Product: HUAWEI Device Model: MYA-L22 ID: Maya-L22C185B123 Sw Internal: Build Date: Mon Aug 14 12:04:40 CST 2017 Chip Ver: S01 Android Version: 6.0 Architecture: arm64-v8a Screen Lock Restore (Encrypted Data).............OK Screen Lock Restore (Encrypted Data).............OK Screen Lock Restore (Encrypted Data).............OK All Done By EFT Dongle |
The Following User Says Thank You to dr_moosavi For This Useful Post: |
08-06-2019, 13:33 | #967 (permalink) |
Insane Poster Join Date: May 2009 Location: pakistan
Posts: 61
Member: 1024226 Status: Offline Thanks Meter: 6 | g5510 play store fix firmware 7.1 1 EASY-TEAM Waiting For Android Device.......OK Reading Device Info.......OK Product: samsung Device Chipset: Qualcomm Device Model: SM-G5510 Device Serial: R28HB1PCRXL Android Version: 7.1.1 Android SDK: 25 Architecture: armeabi-v7a Free space in system disk: 650M Phone Mode: Normal Mode Checking Root Permission.......OK install gapps ............OK |
08-07-2019, 16:30 | #968 (permalink) |
Freak Poster Join Date: Jun 2010 Location: Denmark
Posts: 196
Member: 1329373 Status: Offline Thanks Meter: 87 | Gigaset FRP one click done Wating Device..........OK CPU: MT6737M Chip Version: 0x0000ca00 Chip Ext Clock: EXT_26M Writing Mode..........OK Internal RAM: Internal SRAM Size: 128.00 KB External RAM: Type DRAM External Ram Size: 1.00 GB EMMC: EMMC PART BOOT1 Size: 4.00 MB EMMC PART BOOT2 Size: 4.00 MB EMMC PART RPMB Size: 4.00 MB EMMC PART USER Size: 14.56 GB Battery: Battery Voltage: 3828 Injection..........OK Detecting Parts info............OK [ID: 1] [preloader] BaseAddr(0x00000000) Size(0x00400000) [ID: 8] [pgpt] BaseAddr(0x00000000) Size(0x00080000) [ID: 8] [proinfo] BaseAddr(0x00080000) Size(0x00300000) [ID: 8] [nvram] BaseAddr(0x00380000) Size(0x00500000) [ID: 8] [protect1] BaseAddr(0x00880000) Size(0x00a00000) [ID: 8] [protect2] BaseAddr(0x01280000) Size(0x00a00000) [ID: 8] [lk] BaseAddr(0x01c80000) Size(0x00080000) [ID: 8] [para] BaseAddr(0x01d00000) Size(0x00080000) [ID: 8] [boot] BaseAddr(0x01d80000) Size(0x01000000) [ID: 8] [recovery] BaseAddr(0x02d80000) Size(0x01000000) [ID: 8] [logo] BaseAddr(0x03d80000) Size(0x00800000) [ID: 8] [expdb] BaseAddr(0x04580000) Size(0x00a00000) [ID: 8] [seccfg] BaseAddr(0x04f80000) Size(0x00080000) [ID: 8] [oemkeystore] BaseAddr(0x05000000) Size(0x00200000) [ID: 8] [secro] BaseAddr(0x05200000) Size(0x00600000) [ID: 8] [keystore] BaseAddr(0x05800000) Size(0x00800000) [ID: 8] [tee1] BaseAddr(0x06000000) Size(0x00500000) [ID: 8] [tee2] BaseAddr(0x06500000) Size(0x00500000) [ID: 8] [frp] BaseAddr(0x06a00000) Size(0x00100000) [ID: 8] [nvdata] BaseAddr(0x06b00000) Size(0x02000000) [ID: 8] [metadata] BaseAddr(0x08b00000) Size(0x02500000) [ID: 8] [system] BaseAddr(0x0b000000) Size(0xa0000000) [ID: 8] [cache] BaseAddr(0xab000000) Size(0x19000000) [ID: 8] [userdata] BaseAddr(0xc4000000) Size(0x2ded80000) [ID: 8] [flashinfo] BaseAddr(0x3a2d80000) Size(0x01000000) [ID: 8] [sgpt] BaseAddr(0x3a3d80000) Size(0x00080000) Detecting Device info.......OK Product: Gigaset Device Model: Gigaset GS160 ID: GIG_GS160_S111 Sw Internal: Build Date: Sun Dec 25 14:26:31 EST 2016 Chip Ver: S01 Android Version: 6.0 Architecture: armeabi-v7a FRP RESET... [FRP] .....OK All Done By EFT Dongle |
08-08-2019, 13:13 | #969 (permalink) |
Freak Poster Join Date: Jun 2010 Location: Denmark
Posts: 196
Member: 1329373 Status: Offline Thanks Meter: 87 | Honor 9 stf-l09 HONOR 9 DONE BY TESTPOIN Extracting files.....Done Waiting for device to connect.....Found {COM36} Opening Port.....OK Writing xloader.....OK Writing usb xloader.....OK Writing fastboot.....OK Rebooting to fastboot.....OK Connecting Fastboot ....... Connecting Fastboot .......Ok Model Phone: STF-L09 SW: :STF-L099.0.1.179(xxxxxE2R1P5) Android Version: 9 SN: 7BKDU1XXXXXX384 IMEI: 8645xxxxxxxx80 IMEI: IMEI1:86459xxxxxx5 IMEI: MEID:00000000000000 Lock state: FBLockState:UNLOCKED USERLockState:LOCKED Boot info: unlocked battery: 0 Frp Erase ...............OK Erase Done , The Device Will Reboot And Factory Reset Reboot ...............OK By EFT Dongle OK Last edited by AL-KARAM MOBILE; 08-08-2019 at 13:19. |
08-09-2019, 07:42 | #973 (permalink) |
Crazy Poster Join Date: Mar 2014
Posts: 58
Member: 2138876 Status: Offline Sonork: nawaz Thanks Meter: 4 | EFT Dongle samsung m205f root error Opening Port COM30...........OK Verifying Download Mod OK Initialization.......OK Reading Phone Partitation Table........OK Partition Size : 8192 Unpak pit .......OK FLASHING FIRMWARE TO PHONE..... Writing: boot.img.......OK FLASHING DONE! Rebooting PDA TO NORMAL MODE...... ERROR : phone unable to accept data, wrong command sent..OK |
08-10-2019, 21:36 | #974 (permalink) |
Freak Poster Join Date: May 2016 Location: CUBA Age: 32
Posts: 461
Member: 2572618 Status: Offline Sonork: no Thanks Meter: 185 | Opening Port COM144...........OK Verifying Download Mod OK Initialization.......OK Reading Phone Partitation Table........OK Partition Size : 8192 Unpak pit .......OK FLASHING FIRMWARE TO PHONE..... Sending data: ..........OK FLASHING DONE! Rebooting PDA TO NORMAL MODE........OK Waiting For ADB Device.....Detecting Device Info.....DONE Device Model: SM-G930T1 Device CPU: arm64-v8a Android SDK: 26 Android Version: 8.0.0 Screen Lock reset .......OK |
08-11-2019, 12:59 | #975 (permalink) |
Freak Poster Join Date: Jan 2014 Location: Uzbekistan,Tashkent
Posts: 234
Member: 2111301 Status: Offline Sonork: 1651880:UzjavaAzizbek Thanks Meter: 65 | a510f u8 7.0 frp remove done EASY-TEAM Waiting For Android Device.......OK Reading Device Info.......OK Product: samsung Device Chipset: samsungexynos7580 Device Model: SM-A510F Device Serial: R58GC1QZM3P Android Version: 7.0 Android SDK: 24 Architecture: armeabi-v7a Free space in system disk: 118M Phone Mode: Normal Mode Checking Root Permission.......OK security policy update disable.......OK |
Bookmarks |
Thread Tools | |
Display Modes | |
| |
|