|
Welcome to the GSM-Forum forums. You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. Only registered members may post questions, contact other members or search our database of over 8 million posts. Registration is fast, simple and absolutely free so please - Click to REGISTER! If you have any problems with the registration process or your account login, please contact contact us . |
|
Register | FAQ | Donate | Forum Rules | Root any Device | ★iPhone Unlock★ | ★ Direct Codes ★ | Direct Unlock Source |
| LinkBack | Thread Tools | Display Modes |
09-12-2019, 16:27 | #1036 (permalink) |
No Life Poster Join Date: Sep 2013 Location: KERALA, INDIA
Posts: 1,053
Member: 2035802 Status: Offline Sonork: 100.1675827 Thanks Meter: 789 | A7000 play store added Code: EASY-TEAM Waiting For Android Device.......OK Reading Device Info.......OK Product: samsung Device Chipset: Qualcomm Device Model: SM-A7000 Device Serial: R28G43FZXMJ Android Version: 5.0.2 Android SDK: 21 Architecture: armeabi-v7a Free space in system disk: 180.9M Phone Mode: Normal Mode Checking Root Permission.......OK install gapps ............OK |
09-13-2019, 09:03 | #1037 (permalink) |
Freak Poster Join Date: Feb 2016 Location: Noitacol Age: 37
Posts: 130
Member: 2532428 Status: Offline Thanks Meter: 40 | Huawei dra-lx5 Unlock FRP Done ! Checking fastboot device.....OK Reading info.....OK Device Model: DRA-LX5 Device Serial: VUY9K18A15905177 Device IMEI2: 8665670****** Device Firmware: DRA-LX5 1.0.0.127(C10) Device Lock: Check root info is safe | Lock state is lock | Check System: PASS | Root State: UNROOT Waiting for server.....OK Reading data.....OK Posting data to server.....OK Waiting for server response.....OK Unlocking device.....OK Resetting FRP.....OK Operation ID: 014876BE77A928A6D29DD37BB3F20123 Elapsed time 00:14 -- Version 1.4 |
09-13-2019, 16:19 | #1040 (permalink) |
No Life Poster Join Date: Aug 2014
Posts: 658
Member: 2233266 Status: Offline Thanks Meter: 252 | samsung g532f one click frp done Opening Port COM5...........OK Verifying Download Mod OK Initialization.......OK Reading Phone Partitation Table........OK Partition Size : 8192 Unpak pit .......OK FLASHING FIRMWARE TO PHONE..... Sending data: ..........OK Sending data2: ........OK FLASHING DONE! Rebooting PDA TO NORMAL MODE........OK Please Enter your device into recovery mode Waiting Adb in Recovery Mode.....DONE Detecting Device Info.....DONE Device Model: SM-G532F Device CPU: armeabi-v7a Android SDK: 23 Android Version: 6.0.1 Resetting Samsung Account / Frp ..... Found protection1 Protection1 has been deleted Found protection2 Protection2 has been deleted..OK |
09-13-2019, 19:12 | #1041 (permalink) |
No Life Poster Join Date: Nov 2005
Posts: 947
Member: 198016 Status: Offline Sonork: 100.1602918 Thanks Meter: 408 | Huawei Mate 10 lite - RNE-L21 - FRP DONE Waiting for USB COM 1 port.....Detected {COM309} Connecting to device.....OK Writing data 1.....OK Writing data 3.....OK Rebooting device to fastboot.....OK Waiting for fastboot device.....OK Reading info.....OK Device Model: RNE-L21 Device Serial: FFY5T18424021346 Device IMEI: 8696760xxxxxxxx Device IMEI2: 8696760xxxxxxxx Device Firmware: :RNE-L21 8.0.0.339(C185) Device FB Lock: UNLOCKED Device USER Lock: LOCKED Device Lock: unlocked Resetting FRP.....OK Operation ID: A5A0B70EE721677B331A51E7C54E09BE Elapsed time 00:30 -- Version 1.4 |
09-14-2019, 08:18 | #1042 (permalink) |
Freak Poster Join Date: Oct 2015 Location: eArTh
Posts: 268
Member: 2470191 Status: Offline Sonork: 100.1652036 Thanks Meter: 308 | Y3 2018 (CAG-L22)Successfully Reset Done by Great EFT Tool Code: Wating Device..........OK CPU: MT6737M Chip Version: 0x0000ca00 Chip Ext Clock: EXT_26M Writing Mode..........OK Internal RAM: Internal SRAM Size: 128.00 KB External RAM: Type DRAM External Ram Size: 1.00 GB EMMC: EMMC PART BOOT1 Size: 4.00 MB EMMC PART BOOT2 Size: 4.00 MB EMMC PART RPMB Size: 512.00 KB EMMC PART USER Size: 7.28 GB Battery: Battery Voltage: 4051 Injection..........OK Detecting Parts info............OK [ID: 1] [preloader] BaseAddr(0x00000000) Size(0x00400000) [ID: 8] [pgpt] BaseAddr(0x00000000) Size(0x00080000) [ID: 8] [proinfo] BaseAddr(0x00080000) Size(0x00300000) [ID: 8] [nvram] BaseAddr(0x00380000) Size(0x00500000) [ID: 8] [protect1] BaseAddr(0x00880000) Size(0x00a00000) [ID: 8] [protect2] BaseAddr(0x01280000) Size(0x00a00000) [ID: 8] [para] BaseAddr(0x01c80000) Size(0x00080000) [ID: 8] [lk] BaseAddr(0x01d00000) Size(0x00100000) [ID: 8] [boot] BaseAddr(0x01e00000) Size(0x01000000) [ID: 8] [bfr] BaseAddr(0x02e00000) Size(0x000c0000) [ID: 8] [misc] BaseAddr(0x02ec0000) Size(0x00010000) [ID: 8] [bootfail_info] BaseAddr(0x02ed0000) Size(0x00200000) [ID: 8] [rrecord] BaseAddr(0x030d0000) Size(0x00800000) [ID: 8] [nff] BaseAddr(0x038d0000) Size(0x00200000) [ID: 8] [odmdtbo] BaseAddr(0x03ad0000) Size(0x00080000) [ID: 8] [reserved0] BaseAddr(0x03b50000) Size(0x00230000) [ID: 8] [logo] BaseAddr(0x03d80000) Size(0x00200000) [ID: 8] [expdb] BaseAddr(0x03f80000) Size(0x00a00000) [ID: 8] [seccfg] BaseAddr(0x04980000) Size(0x00080000) [ID: 8] [oemkeystore] BaseAddr(0x04a00000) Size(0x00200000) [ID: 8] [secro] BaseAddr(0x04c00000) Size(0x00200000) [ID: 8] [keystore] BaseAddr(0x04e00000) Size(0x00800000) [ID: 8] [tee1] BaseAddr(0x05600000) Size(0x00100000) [ID: 8] [tee2] BaseAddr(0x05700000) Size(0x00100000) [ID: 8] [bak] BaseAddr(0x05800000) Size(0x00800000) [ID: 8] [bakraw] BaseAddr(0x06000000) Size(0x00100000) [ID: 8] [dfx] BaseAddr(0x06100000) Size(0x00100000) [ID: 8] [recovery] BaseAddr(0x06200000) Size(0x02000000) [ID: 8] [erecovery] BaseAddr(0x08200000) Size(0x02000000) [ID: 8] [log] BaseAddr(0x0a200000) Size(0x02200000) [ID: 8] [frp] BaseAddr(0x0c400000) Size(0x00100000) [ID: 8] [oeminfo] BaseAddr(0x0c500000) Size(0x00800000) [ID: 8] [nvdata] BaseAddr(0x0cd00000) Size(0x02000000) [ID: 8] [metadata] BaseAddr(0x0ed00000) Size(0x02300000) [ID: 8] [odm] BaseAddr(0x11000000) Size(0x01800000) [ID: 8] [vendor] BaseAddr(0x12800000) Size(0x0c000000) [ID: 8] [system] BaseAddr(0x1e800000) Size(0x5e000000) [ID: 8] [cache] BaseAddr(0x7c800000) Size(0x07800000) [ID: 8] [userdata] BaseAddr(0x84000000) Size(0x14cf80000) [ID: 8] [flashinfo] BaseAddr(0x1d0f80000) Size(0x01000000) [ID: 8] [sgpt] BaseAddr(0x1d1f80000) Size(0x00080000) Detecting Device info.......OK Product: HUAWEI Device Model: CAG-L22 ID: Sw Internal: Build Date: Fri Oct 12 17:53:31 CST 2018 Chip Ver: Android Version: 8.1.0 Architecture: armeabi-v7a Formating... [USERDATA] .....OK All Done By EFT Dongle |
09-14-2019, 13:23 | #1043 (permalink) |
Freak Poster Join Date: May 2015 Location: Pakistan
Posts: 334
Member: 2401943 Status: Offline Thanks Meter: 182 | Analyzing file.....OK Searching for Samsung ODIN protocol.....Detected {COM76} Connecting to device.....OK Device Model.....SM-G930A Reading PIT.....OK Flashing [data 1].....OK Rebooting device.....OK Waiting for device.....OK Reading device info.....OK Baseband Version: G930AUCUACSF1 Serial Number: R38H208P2HT Device Arch: msm8996 Device bootloader: G930AUCUACSF1 Device selinux: permissive Device warranty bit: 0 Device Firmware: G930AUCUACSF1 Android version: 8.0.0 Device SDK: 26 Device data encryption: encrypted Firmware Country: USA Device Hardware: qcom Device CPU: arm64-v8a Device Factory: samsung Device Model: SAMSUNG-SM-G930A Device IMEI: Root status.....Rooted { Adb direct } Resetting FRP.....OK Operation ID: CE5A82C5D886C8826ABCEDD49C204D66 Elapsed time 02:10 -- Version 1.4 |
09-16-2019, 07:22 | #1044 (permalink) |
Banned Join Date: Oct 2017 Location: pakistan kpk mansehra Age: 26
Posts: 1,273
Member: 2765424 Status: Offline Thanks Meter: 1,039 | samsung a750f u1 9.0 root done samsung a750f u1 9.0 root done EASY-TEAM Waiting For Android Device.......OK Reading Device Info.......OK Product: samsung Device Chipset: samsungexynos7885 Device Model: SM-A750F Device Serial: RF8M10L9GBV Android Version: 9 Android SDK: 28 Architecture: arm64-v8a Free space in system disk: 311M Phone Mode: Normal Mode Checking Root Permission.......Fail root done EASY-TEAM Waiting For Android Device.......OK Reading Device Info.......OK Product: samsung Device Chipset: samsungexynos7885 Device Model: SM-A750F Device Serial: RF8M10L9GBV Android Version: 9 Android SDK: 28 Architecture: arm64-v8a Free space in system disk: 311M Phone Mode: Normal Mode Checking Root Permission.......OK |
09-16-2019, 07:27 | #1045 (permalink) |
Banned Join Date: Oct 2017 Location: pakistan kpk mansehra Age: 26
Posts: 1,273
Member: 2765424 Status: Offline Thanks Meter: 1,039 | samsung j260g u2 root done thanks eft samsung j260g u2 root done EASY-TEAM Waiting For Android Device.......OK Reading Device Info.......OK Product: samsung Device Chipset: samsungexynos7570 Device Model: SM-J260G Device Serial: R28M30AC4DB Android Version: 8.1.0 Android SDK: 27 Architecture: armeabi-v7a Free space in system disk: 189M Phone Mode: Normal Mode Checking Root Permission.......OK |
09-16-2019, 07:30 | #1046 (permalink) |
Banned Join Date: Oct 2017 Location: pakistan kpk mansehra Age: 26
Posts: 1,273
Member: 2765424 Status: Offline Thanks Meter: 1,039 | telenor i4 flash file read done telenor i4 flash file read done Wating Device..........OK CPU: MT6737M Chip Version: 0x0000ca00 Chip Ext Clock: EXT_26M Writing Mode..........OK Internal RAM: Internal SRAM Size: 128.00 KB External RAM: Type DRAM External Ram Size: 1.00 GB EMMC: EMMC PART BOOT1 Size: 4.00 MB EMMC PART BOOT2 Size: 4.00 MB EMMC PART RPMB Size: 4.00 MB EMMC PART USER Size: 14.63 GB Battery: Battery Voltage: 3761 Injection..........OK [preloader] BaseAddr(0x00000000) Size(0x00400000) [pgpt] BaseAddr(0x00000000) Size(0x00080000) [proinfo] BaseAddr(0x00080000) Size(0x00300000) [nvram] BaseAddr(0x00380000) Size(0x00500000) [protect1] BaseAddr(0x00880000) Size(0x00a00000) [protect2] BaseAddr(0x01280000) Size(0x00a00000) [lk] BaseAddr(0x01c80000) Size(0x00080000) [para] BaseAddr(0x01d00000) Size(0x00080000) [boot] BaseAddr(0x01d80000) Size(0x01000000) [recovery] BaseAddr(0x02d80000) Size(0x01000000) [logo] BaseAddr(0x03d80000) Size(0x00800000) [expdb] BaseAddr(0x04580000) Size(0x00a00000) [seccfg] BaseAddr(0x04f80000) Size(0x00080000) [oemkeystore] BaseAddr(0x05000000) Size(0x00200000) [secro] BaseAddr(0x05200000) Size(0x00600000) [keystore] BaseAddr(0x05800000) Size(0x00800000) [tee1] BaseAddr(0x06000000) Size(0x00500000) [tee2] BaseAddr(0x06500000) Size(0x00500000) [frp] BaseAddr(0x06a00000) Size(0x00100000) [nvdata] BaseAddr(0x06b00000) Size(0x02000000) [odmdtbo] BaseAddr(0x08b00000) Size(0x01000000) [metadata] BaseAddr(0x09b00000) Size(0x02500000) [vendor] BaseAddr(0x0c000000) Size(0x19800000) [system] BaseAddr(0x25800000) Size(0x55800000) [cache] BaseAddr(0x7b000000) Size(0x07000000) [userdata] BaseAddr(0x82000000) Size(0x323780000) [sdrpmb] BaseAddr(0x3a5780000) Size(0x01800000) [flashinfo] BaseAddr(0x3a6f80000) Size(0x01000000) [sgpt] BaseAddr(0x3a7f80000) Size(0x00080000) Reading: ... Reading: CACHE [Size:112.00 MB] .....OK Reading: USERDATA [Size:12.55 GB] .....OK Reading: preloader [Size:4.00 MB] .....OK Reading: pgpt [Size:512.00 KB] .....OK Reading: proinfo [Size:3.00 MB] .....OK Reading: nvram [Size:5.00 MB] .....OK Reading: protect1 [Size:10.00 MB] .....OK Reading: protect2 [Size:10.00 MB] .....OK Reading: lk [Size:512.00 KB] .....OK Reading: para [Size:512.00 KB] .....OK Reading: boot [Size:16.00 MB] .....OK Reading: recovery [Size:16.00 MB] .....OK Reading: logo [Size:8.00 MB] .....OK Reading: expdb [Size:10.00 MB] .....OK Reading: seccfg [Size:512.00 KB] .....OK Reading: oemkeystore [Size:2.00 MB] .....OK Reading: secro [Size:6.00 MB] .....OK Reading: keystore [Size:8.00 MB] .....OK Reading: tee1 [Size:5.00 MB] .....OK Reading: tee2 [Size:5.00 MB] .....OK Reading: frp [Size:1.00 MB] .....OK Reading: nvdata [Size:32.00 MB] .....OK Reading: odmdtbo [Size:16.00 MB] .....OK Reading: metadata [Size:37.00 MB] .....OK Reading: vendor [Size:408.00 MB] .....OK Reading: system [Size:1.34 GB] .....OK Reading: sdrpmb [Size:24.00 MB] .....OK Reading: flashinfo [Size:16.00 MB] .....OK ROM info.......OK Product: Device Model: ID: Sw Internal: Build Date: Chip Ver: Android Version: Architecture: Read Flash (Dump) Done By EFT Dongle |
09-16-2019, 07:57 | #1047 (permalink) |
Banned Join Date: Oct 2017 Location: pakistan kpk mansehra Age: 26
Posts: 1,273
Member: 2765424 Status: Offline Thanks Meter: 1,039 | samsung a105f u3 root and modem downgrade done thanks eft pro samsung a105f u3 root and modem downgrade done thanks eft pro Connecting to device.....OK Reading device info.....OK Baseband Version: A105FDDU3ASH1,A105FDDU3ASH1 Serial Number: RF8M51AVQDX Device Arch: exynos7885 Device bootloader: A105FDDU3ASH1 Device selinux: enforcing Device warranty bit: 0 Device Firmware: A105FDDU3ASH1 Android version: 9 Device SDK: 28 Device data encryption: encrypted Firmware Country: India Device Hardware: exynos7885 Device CPU: armeabi-v7a Device Factory: samsung Device Model: SM-A105F Device IMEI: 357*********22 Root status.....Rooted { 19.4-087b451e:MAGISKSU } Analyzing file.....OK Extracting files.....OK Sending files to device.....OK Reading data.....OK Writing data 1.....OK Writing data 2.....OK Operation ID: 692BA2647E3241B11D8B43FD5E176119 Elapsed time 00:35 -- Version 1.4 |
09-18-2019, 08:46 | #1048 (permalink) |
No Life Poster Join Date: Oct 2006 Location: pakistan
Posts: 669
Member: 361094 Status: Offline Sonork: 100.1597521 Thanks Meter: 172 | g532f frp done Opening Port COM372...........OK Verifying Download Mod OK Initialization.......OK Reading Phone Partitation Table........OK Partition Size : 8192 Unpak pit .......OK FLASHING FIRMWARE TO PHONE..... Sending data: ..........OK Sending data2: ........OK FLASHING DONE! Rebooting PDA TO NORMAL MODE........OK Please Enter your device into recovery mode Waiting Adb in Recovery Mode.....DONE Detecting Device Info.....DONE Device Model: SM-G532F Device CPU: armeabi-v7a Android SDK: 23 Android Version: 6.0.1 Resetting Samsung Account / Frp ..... Found protection1 Protection1 has been deleted Found protection2 Protection2 has been deleted..OK |
09-19-2019, 14:41 | #1050 (permalink) |
Junior Member Join Date: Apr 2015
Posts: 37
Member: 2378224 Status: Offline Thanks Meter: 6 | Checking fastboot device.....OK Reading info.....OK Device Model: DRA-LX2 Device Serial: 5LX9K1851------ Device IMEI2: 8693----- Device Firmware: DRA-LX2 1.0.0.160(C185) Device Lock: Check root info is safe | Lock state is lock | Root State: UNROOT Waiting for server.....OK Reading data.....OK Posting data to server.....OK Waiting for server response.....OK Unlocking device.....OK Resetting FRP.....OK Operation ID: 9FE966D6859E57D420A34A4ADE7A4625 Elapsed time 00:18 -- Version 1.4 |
Bookmarks |
| |
|