![]() ![]() ![]() ![]() |
![]() |
Welcome to the GSM-Forum forums. You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. Only registered members may post questions, contact other members or search our database of over 8 million posts. Registration is fast, simple and absolutely free so please - Click to REGISTER! If you have any problems with the registration process or your account login, please contact contact us . |
|
Register | FAQ | Donate | Forum Rules | Root any Device | ★iPhone Unlock★ | ★ Direct Codes ★ | Direct Unlock Source | Search | Today's Posts | Mark Forums Read |
![]() |
| LinkBack | Thread Tools | Display Modes |
![]() | #46 (permalink) |
Insane Poster ![]() ![]() ![]() Join Date: Mar 2016 Age: 32
Posts: 71
Member: 2544984 Status: Offline Sonork: Salatiel net Thanks Meter: 11 | Operation: Unlock network Software version: 1.6 Host Power Off... OK Switch virtual port to USB... OK Connect Type-C to BOX... OK Host Power On... OK Wait for device... OK Read usbhost speed... HIGH Read Device Descriptor... Get VID/PID...0E8D/0003 Send start cmd... OK Get HW code from device... 0717 Get HW & SW version from device... OK HW VER: CA01, SW VER: 0200, HW SUB CODE: 8A00 Detect chip [MT6761] Get sec config... OK [000000E7] Active sec flags: [SBC SLA DAA] Advanced Bypass Security... OK Disconnect virtual port... OK Connect Type-C to HUB... OK Wait for device connecting... OK Device found at COM37 [BROM] Open port... OK Send start cmd... OK Get HW code from device... 0717 Get HW & SW version from device... OK HW VER: CA01, SW VER: 0200, HW SUB CODE: 8A00 Detect chip [MT6761] Library Version [2] Select platform... OK Init BROM... OK Force Charge... OK Disable WatchDog Timer... OK Reopen port for libver2... OK Get ME ID... OK ME_ID = 0x50ACBA38, 0x87FF9E47, 0xB38CF83E, 0xB4EE72EC Get Chip ID... [MT6761] Get SOC ID... [D7CE7CE4806DFDB36EDD76BA489D02318A2B27136ED931C4E1 C4D8362D981AFD] Get sec config... OK [000000E0] Load DownloadAgent... OK Search DA... OK [30] Send preloader... OK Start preloader... OK Check preloader answer... OK Send bootloader... OK Start bootloader... OK Wait for answer from bootloader... OK Send SYNC signal... OK Setup device enviroment... OK Setup device parametres... OK Receive DA SYNC signal... OK Set DA parametres... OK Get device connection agent... [BROM] Get device info... OK EMMC_ID: 0x1501003458364B4D42030703DC8CA781 Load EMI config from database [DB VER: 47 DB DATE: 04-02-2021] OK [1] Trying EMI [44724C4B, 7CB86554, 9C47C7D7, C26ECB0F, CCFE52E9, 2E865ED1, 4C76F2A3] Init EXT RAM... OK Send 2nd DA... OK Get device info... OK EMMC INFO: EMMC_ID : 0x1501003458364B4D42030703DC8CA781 EMMC_BOOT1: 0x0000400000 (4.00Mb) EMMC_BOOT2: 0x0000400000 (4.00Mb) EMMC_RPMB : 0x0000400000 (4.00Mb) EMMC_USER : 0x0747C00000 (29.12Gb) RAM INFO: INT_SRAM: 0x0000039000 (228.00Kb) EXT_RAM : 0x0080000000 (2.00Gb) Check USB status... USB_HIGH_SPEED Read partitions info from phone... OK Read security partition from phone... OK Read security files... OK Read lock info... OK Write lock info... OK Write security partition to phone... OK Network Unlock done! Report Post |
![]() |
![]() | #47 (permalink) |
Junior Member Join Date: Dec 2010
Posts: 6
Member: 1475689 Status: Offline Thanks Meter: 2 | Selected model: Nokia TA-1221 (Nokia 2V) Operation: Unlock network Software version: 2.2 Host Power Off... OK Switch virtual port to USB... OK Connect Type-C to BOX... OK Host Power On... OK Wait for device... OK Read usbhost speed... HIGH Read Device Descriptor... Get VID/PID...0E8D/0003 Send start cmd... OK Get HW code from device... 0717 Get HW & SW version from device... OK HW VER: CA01, SW VER: 0200, HW SUB CODE: 8A00 Detect chip [MT6761] Get sec config... OK [000000E3] Active sec flags: [SBC SLA] Advanced Bypass Security... OK Disconnect virtual port... OK Connect Type-C to HUB... OK Wait for device connecting... OK Device found at COM241 [BROM] Open port... OK Send start cmd... OK Get HW code from device... 0717 Get HW & SW version from device... OK HW VER: CA01, SW VER: 0200, HW SUB CODE: 8A00 Detect chip [MT6761] Library Version [2] Select platform... OK Init BROM... OK Force Charge... OK Disable WatchDog Timer... OK Reopen port for libver2... OK Get ME ID... OK ME_ID = 0xA19B5C7F, 0xE872A725, 0x93344411, 0x8799C993 Get Chip ID... [MT6761] Get SOC ID... [BBE10A7BFE2C4075C509CB3355A4BB794FC9C59EA7A6A70E16 7E66EAF04624BB] Get sec config... OK [000000E0] Load DownloadAgent... OK Search DA... OK [24] Send preloader... OK Start preloader... OK Check preloader answer... OK Send bootloader... OK Start bootloader... OK Wait for answer from bootloader... OK Send SYNC signal... OK Setup device enviroment... OK Setup device parametres... OK Receive DA SYNC signal... OK Set DA parametres... OK Get device connection agent... [BROM] Get device info... OK EMMC_ID: 0x700100474D41474441700570004E27D5 Load EMI config from database [DB VER: 164 DB DATE: 07-17-2021] OK [1] Trying EMI [1BB1F176, EB371E79, A29F3633, 92392267, 9C47C7D7, 0F6B3A76, A58FA23E, 4CA98027, C26ECB0F] Init EXT RAM... OK Send 2nd DA... OK Get device info... OK EMMC INFO: EMMC_ID : 0x700100474D41474441700570004E27D5 EMMC_BOOT1: 0x0000400000 (4.00Mb) EMMC_BOOT2: 0x0000400000 (4.00Mb) EMMC_RPMB : 0x0000400000 (4.00Mb) EMMC_USER : 0x03A6800000 (14.60Gb) RAM INFO: INT_SRAM: 0x0000039000 (228.00Kb) EXT_RAM : 0x0080000000 (2.00Gb) Check USB status... USB_HIGH_SPEED Read partitions info from phone... OK Read security partition from phone... OK Read security files... OK Read security files... OK Read lock info... OK Write lock info... OK Write security partition to phone... OK Network Unlock done! |
![]() |
![]() | #48 (permalink) | |
No Life Poster ![]() ![]() ![]() ![]() ![]() ![]() Join Date: Apr 2008 Location: -=Cellulare Zone Europ-EGYPT=-
Posts: 1,227
Member: 762055 Status: Online Sonork: -=664053=- Thanks Meter: 781 ![]() | -=Samsung SM-A125F (Galaxy A12) Operation: Read PTT =-[SUCCESS REPORT] ( Read Flash ) ( Dumping Partitions ) With testpoint connected done! Quote:
BR, -=MR_Gsm=- | |
![]() |
![]() | #49 (permalink) | |
No Life Poster ![]() ![]() ![]() ![]() ![]() ![]() Join Date: Apr 2008 Location: -=Cellulare Zone Europ-EGYPT=-
Posts: 1,227
Member: 762055 Status: Online Sonork: -=664053=- Thanks Meter: 781 ![]() | -=Xiaomi M2003J15SG (Redmi Note 9) Operation: Flash (Upgrade)=-[SUCCESS REPORT] Quote:
BR, -=MR_Gsm=- | |
![]() |
![]() | #50 (permalink) |
Junior Member Join Date: Nov 2017
Posts: 7
Member: 2776035 Status: Offline Thanks Meter: 0 | a502dl desbloqueado listo Selected model: TCL A502DL (TCL LX) Operation: Unlock network Software version: 2.3 Host Power Off... OK Switch virtual port to USB... OK Connect Type-C to BOX... OK Host Power On... OK Wait for device... OK Read usbhost speed... HIGH Read Device Descriptor... Get VID/PID...0E8D/0003 Send start cmd... OK Get HW code from device... 0699 Get HW & SW version from device... OK HW VER: CB00, SW VER: 0002, HW SUB CODE: 8A00 Detect chip [MT6739] Get sec config... OK [000000E7] Active sec flags: [SBC SLA DAA] Advanced Bypass Security... OK Disconnect virtual port... OK Connect Type-C to HUB... OK Wait for device connecting... OK Device found at COM0 [BROM] Open port... OK Send start cmd... OK Get HW code from device... 0699 Get HW & SW version from device... OK HW VER: CB00, SW VER: 0002, HW SUB CODE: 8A00 Detect chip [MT6739] Library Version [2] Select platform... OK Init BROM... OK Force Charge... OK Disable WatchDog Timer... OK Reopen port for libver2... OK Get ME ID... OK ME_ID = 0xF9E65CF7, 0xDABC0138, 0xE0C16049, 0xE1AE7910 Get Chip ID... [MT6739] Get SOC ID... [497956A7D459C13F899311C906C960AE2816514D2D327A42BE 8103B162385DEF] Get sec config... OK [000000E0] Load DownloadAgent... OK Search DA... OK [0] Send preloader... OK Start preloader... OK Check preloader answer... OK Send bootloader... OK Start bootloader... OK Wait for answer from bootloader... OK Send SYNC signal... OK Setup device enviroment... OK Setup device parametres... OK Receive DA SYNC signal... OK Set DA parametres... OK Get device connection agent... [BROM] Get device info... OK EMMC_ID: 0x150100514536334D42033219ACA9167B Load EMI config from database [DB VER: 164 DB DATE: 07-17-2021] OK [3] Trying EMI [A04CDABF, 0BFBC345, 8FABA264] Init EXT RAM... OK Send 2nd DA... OK Get device info... OK EMMC INFO: EMMC_ID : 0x150100514536334D42033219ACA9167B EMMC_BOOT1: 0x0000400000 (4.00Mb) EMMC_BOOT2: 0x0000400000 (4.00Mb) EMMC_RPMB : 0x0000400000 (4.00Mb) EMMC_USER : 0x03A3E00000 (14.56Gb) RAM INFO: INT_SRAM: 0x0000020000 (128.00Kb) EXT_RAM : 0x0080000000 (2.00Gb) Check USB status... USB_HIGH_SPEED Read partitions info from phone... OK Read security partition from phone... OK Read security files... OK Read security files... OK Read lock info... OK Write lock info... OK Write security partition to phone... OK Network Unlock done! |
![]() |
![]() | #51 (permalink) |
Product Supporter ![]() ![]() ![]() Join Date: Feb 2012 Location: KB GSM STORE
Posts: 1,151
Member: 1727711 Status: Offline Sonork: 100.1590443 Thanks Meter: 1,331 | TCL A502DL Network Unlock Done TCL A502DL Network Unlock Done Code: Selected model: TCL A502DL (TCL LX) Operation: Unlock network Software version: 2.3 Host Power Off... OK Switch virtual port to USB... OK Connect Type-C to BOX... OK Host Power On... OK Wait for device... OK Read usbhost speed... HIGH Read Device Descriptor... Get VID/PID...0E8D/0003 Send start cmd... OK Get HW code from device... 0699 Get HW & SW version from device... OK HW VER: CB00, SW VER: 0002, HW SUB CODE: 8A00 Detect chip [MT6739] Get sec config... OK [000000E7] Active sec flags: [SBC SLA DAA] Advanced Bypass Security... OK Disconnect virtual port... OK Connect Type-C to HUB... OK Wait for device connecting... OK Device found at COM26 [BROM] Open port... OK Send start cmd... OK Get HW code from device... 0699 Get HW & SW version from device... OK HW VER: CB00, SW VER: 0002, HW SUB CODE: 8A00 Detect chip [MT6739] Library Version [2] Select platform... OK Init BROM... OK Force Charge... OK Disable WatchDog Timer... OK Reopen port for libver2... OK Get ME ID... OK ME_ID = 0xCB57DD5F, 0x01B0300F, 0x43ADBD46, 0xFE6988D2 Get Chip ID... [MT6739] Get SOC ID... [8FB27F672C3576B8341617B94E811CD67439EA69B21C485215A236E07761DFDA] Get sec config... OK [000000E0] Load DownloadAgent... OK Search DA... OK [0] Send preloader... OK Start preloader... OK Check preloader answer... OK Send bootloader... OK Start bootloader... OK Wait for answer from bootloader... OK Send SYNC signal... OK Setup device enviroment... OK Setup device parametres... OK Receive DA SYNC signal... OK Set DA parametres... OK Get device connection agent... [BROM] Get device info... OK EMMC_ID: 0x150100514536334D4203485FAA031609 Load EMI config from database [DB VER: 164 DB DATE: 07-17-2021] OK [3] Trying EMI [A04CDABF, 0BFBC345, 8FABA264] Init EXT RAM... OK Send 2nd DA... OK Get device info... OK EMMC INFO: EMMC_ID : 0x150100514536334D4203485FAA031609 EMMC_BOOT1: 0x0000400000 (4.00Mb) EMMC_BOOT2: 0x0000400000 (4.00Mb) EMMC_RPMB : 0x0000400000 (4.00Mb) EMMC_USER : 0x03A3E00000 (14.56Gb) RAM INFO: INT_SRAM: 0x0000020000 (128.00Kb) EXT_RAM : 0x0080000000 (2.00Gb) Check USB status... USB_HIGH_SPEED Read partitions info from phone... OK Read security partition from phone... OK Read security files... OK Read security files... OK Read lock info... OK Write lock info... OK Write security partition to phone... OK Network Unlock done! ![]() BR |
![]() |
The Following User Says Thank You to .:Abdul-Basit:. For This Useful Post: |
![]() | #53 (permalink) |
Freak Poster ![]() ![]() ![]() ![]() Join Date: Aug 2021 Location: Pakistan
Posts: 118
Member: 2993836 Status: Offline Thanks Meter: 12 | ![]() Xiaomi Redmi 9A MI Account Removed Just One Click Log: Code: Selected model: Xiaomi M2006C3LG (Redmi 9A) Operation: Wipe Partitions Software version: 2.3 Erasing of partitions can damage your device. Make sure that you have a backup created. Continue? YES Host Power Off... OK Switch virtual port to USB... OK Connect Type-C to BOX... OK Host Power On... OK Wait for device... OK Read usbhost speed... HIGH Read Device Descriptor... Get VID/PID...0E8D/0003 Send start cmd... OK Get HW code from device... 0766 Get HW & SW version from device... OK HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6765] Get sec config... OK [000000E7] Active sec flags: [SBC SLA DAA] Advanced Bypass Security... OK Disconnect virtual port... OK Connect Type-C to HUB... OK Wait for device connecting... OK Device found at COM10 [BROM] Open port... OK Send start cmd... OK Get HW code from device... 0766 Get HW & SW version from device... OK HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6765] Library Version [2] Select platform... OK Init BROM... OK Force Charge... OK Disable WatchDog Timer... OK Reopen port for libver2... OK Get ME ID... OK ME_ID = 0xAEBE887A, 0xD6E615B2, 0xADBBF255, 0x059E8F3D Get Chip ID... [MT6765] Get SOC ID... [ED535D5190162BD9C16D5890636FED0F07FF863A8342DBA7F5DC5811BB67A4DD] Get sec config... OK [000000E0] Load DownloadAgent... OK Search DA... OK [23] Send preloader... OK Start preloader... OK Check preloader answer... OK Send bootloader... OK Start bootloader... OK Wait for answer from bootloader... OK Send SYNC signal... OK Setup device enviroment... OK Setup device parametres... OK Receive DA SYNC signal... OK Set DA parametres... OK Get device connection agent... [BROM] Get device info... OK EMMC_ID: 0x45010044413430333201D1DD6D134733 Load EMI config from database [DB VER: 164 DB DATE: 07-17-2021] OK [1] Trying EMI [46F6F1CA, 22BA5289, 92392267, EB371E79, C3498624, 7770139F, C0129602, E6CB89A3, CB03FF37, 11593C4B, 33A1CDBE, 7805E65B, DB7E1DC4, E055C125, 6526FBD5] Init EXT RAM... OK Send 2nd DA... OK Get device info... OK EMMC INFO: EMMC_ID : 0x45010044413430333201D1DD6D134733 EMMC_BOOT1: 0x0000400000 (4.00Mb) EMMC_BOOT2: 0x0000400000 (4.00Mb) EMMC_RPMB : 0x0001000000 (16.00Mb) EMMC_USER : 0x0747C00000 (29.12Gb) RAM INFO: INT_SRAM: 0x000003A000 (232.00Kb) EXT_RAM : 0x0080000000 (2.00Gb) Check USB status... USB_HIGH_SPEED Read partitions info from phone... OK Format "persist" partition... OK Format Partitions done! BR, GSMCity |
![]() |
![]() | #55 (permalink) |
Freak Poster ![]() ![]() ![]() ![]() Join Date: Aug 2021 Location: Pakistan
Posts: 118
Member: 2993836 Status: Offline Thanks Meter: 12 | Nokia 1 TA-1047 FRP Removed Successfully! Pandora Box Nokia 1 Ta-1047 FRP Removed Successfully Just One Click Log: Code: Selected model: Nokia TA-1047 (Nokia 1) Operation: Erase FRP Software version: 2.2 Host Power Off... OK Switch virtual port to USB... OK Connect Type-C to BOX... OK Host Power On... OK Wait for device... OK Read usbhost speed... FULL Read Device Descriptor... Get VID/PID...0E8D/0003 Send start cmd... OK Get HW code from device... 0335 Get HW & SW version from device... OK HW VER: CB00, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6735] Get sec config... OK [00000001] Active sec flags: [SBC] Advanced Bypass Security... OK Disconnect virtual port... OK Connect Type-C to HUB... OK Wait for device connecting... OK Device found at COM10 [BROM] Open port... OK Send start cmd... OK Get HW code from device... 0335 Get HW & SW version from device... OK HW VER: CB00, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6735] Library Version [1] Select platform... OK Init BROM... OK Force Charge... OK Disable WatchDog Timer... OK Load DownloadAgent... OK ME_ID = 0x9A10A66C, 0x631E3BA3, 0x38442797, 0x1B7D64E1 Get sec config... OK [00000000] Get BROM version... OK Search DA... OK [10] Send preloader... OK Start preloader... OK Check preloader answer... OK Send bootloader... OK Start bootloader... OK Check bootloader answer... OK Wait for answer from bootloader... OK Wait for hw detection... OK Wait DA version... v4.2 Send BROM version... OK Send storage config... OK SyncBmtInfoWithDA... OK Set params... OK Read flash info... OK EMMC_ID: 0x150100464E36324D4203EC2AE4541583 Load EMI config from database [DB VER: 164 DB DATE: 07-17-2021] OK [1] Trying EMI [49120D13, 8F23A064, 87405777, 45F0C626, 369EC3D6, 8563CCE3, 8AF57810, 51032BB4, 14A4834B] Init DRAM... OK Enable DRAM... OK Sync with DA... OK Wait for DA H/W detection... OK EMMC INFO: EMMC_ID : 0x150100464E36324D4203EC2AE4541683 EMMC_BOOT1: 0x0000400000 (4.00Mb) EMMC_BOOT2: 0x0000400000 (4.00Mb) EMMC_RPMB : 0x0000080000 (512.00Kb) EMMC_USER : 0x01D2000000 (7.28Gb) RAM INFO: INT_SRAM: 0x0000020000 (128.00Kb) EXT_RAM : 0x0040000000 (1.00Gb) Check USB status... USB_FULL_SPEED Switching to USB high speed... OK Wait for device... OK High Speed USB detected at COM0 Open port... OK Check USB status... USB_HIGH_SPEED Read partitions info from phone... OK Read partition frp... OK Format EMMC_USER partition... OK Writting FRP data... OK Erase FRP done! GSMCity |
![]() |
![]() | #56 (permalink) |
Insane Poster ![]() ![]() ![]() Join Date: Dec 2016 Location: Uzbekistan Age: 32
Posts: 92
Member: 2657592 Status: Offline Thanks Meter: 20 | Selected model: Alcatel 5010D (Pixi 4 (5)) Operation: Repair Software version: 2.4 Host Power Off... OK Switch virtual port to USB... OK Connect Type-C to BOX... OK Host Power On... OK Wait for device... OK Read usbhost speed... FULL Read Device Descriptor... Get VID/PID...0E8D/0003 Send start cmd... OK Get HW code from device... 6580 Get HW & SW version from device... OK HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6580] Get sec config... OK [00000000] Disconnect virtual port... OK Connect Type-C to HUB... OK Wait for device connecting... OK Device found at COM284 [BROM] Open port... OK Get HW code from device... 6580 Get HW & SW version from device... OK HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6580] Library Version [1] Select platform... OK Init BROM... OK Force Charge... OK Disable WatchDog Timer... OK Load DownloadAgent... OK ME_ID = 0x8C7EA7E6, 0x1980E4DF, 0xB3CBDE04, 0x7E42511A Get sec config... OK [00000000] Get BROM version... OK Search DA... OK [11] Send preloader... OK Start preloader... OK Check preloader answer... OK Send bootloader... OK Start bootloader... OK Check bootloader answer... OK Wait for answer from bootloader... OK Wait for hw detection... OK Wait DA version... v4.2 Send BROM version... OK Send storage config... OK SyncBmtInfoWithDA... OK Set params... OK Read flash info... OK EMMC_ID: 0x460001154D323237374B0042C573C5E4 Load EMI from phone... OK Init DRAM... OK Enable DRAM... OK Sync with DA... OK Wait for DA H/W detection... OK EMMC INFO: EMMC_ID : 0x150100463732324D42004B37E4C573C5 EMMC_BOOT1: 0x0000400000 (4,00Mb) EMMC_BOOT2: 0x0000400000 (4,00Mb) EMMC_RPMB : 0x0000080000 (512,00Kb) EMMC_USER : 0x01D2000000 (7,28Gb) RAM INFO: INT_SRAM: 0x0000020000 (128,00Kb) EXT_RAM : 0x0040000000 (1,00Gb) Check USB status... USB_FULL_SPEED Switching to USB high speed... OK Wait for device... OK High Speed USB detected at COM285 Open port... OK Check USB status... USB_HIGH_SPEED Read partitions info from phone... OK Get OTP size... OK [0x00800000] Read OTP... OK IMEI 1: 357652075364379 IMEI 2: 357652075364395 Set new IMEI to: IMEI 1: 358511029552373 Check OTP status... [S_DA_OTP_LOCKED] Write OTP... error(S_ERROR) Repair Security done! sofware fixx |
![]() |
![]() | #57 (permalink) |
Insane Poster ![]() ![]() ![]() Join Date: Jan 2011
Posts: 62
Member: 1485943 Status: Offline Thanks Meter: 55 | Selected model: Samsung SM-A125F (Galaxy A12) Operation: Read Flash Info Software version: 2.4 Host Power Off... OK Switch virtual port to USB... OK Connect Type-C to BOX... OK Host Power On... OK Wait for device... OK Read usbhost speed... HIGH Read Device Descriptor... Get VID/PID...0E8D/0003 Send start cmd... OK Get HW code from device... 0766 Get HW & SW version from device... OK HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6765] Get sec config... OK [000000E5] Active sec flags: [SBC DAA] Advanced Bypass Security... OK Disconnect virtual port... OK Connect Type-C to HUB... OK Wait for device connecting... OK Device found at COM17 [BROM] Open port... OK Send start cmd... OK Get HW code from device... 0766 Get HW & SW version from device... OK HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6765] Library Version [2] Select platform... OK Init BROM... OK Force Charge... OK Disable WatchDog Timer... OK Reopen port for libver2... OK Get ME ID... OK ME_ID = 0x2D42B746, 0xCD4F05F7, 0xC62822D6, 0x5F0E172D Get Chip ID... [MT6765] Get SOC ID... [7F02D418DC3615F044495CD3212FFF5A32E5D6018DBF474F64 CCDB205C097D53] Get sec config... OK [000000E0] Load DownloadAgent... OK Search DA... OK [23] Send preloader... OK Start preloader... OK Check preloader answer... OK Send bootloader... OK Start bootloader... OK Wait for answer from bootloader... OK Send SYNC signal... OK Setup device enviroment... OK Setup device parametres... OK Receive DA SYNC signal... OK Set DA parametres... OK Get device connection agent... [BROM] Get device info... OK EMMC_ID: 0x150100445036444142002C14E8013827 Load EMI from phone... OK Parse EMI config... OK Init EXT RAM... OK Send 2nd DA... OK Get device info... OK EMMC INFO: EMMC_ID : 0x150100445036444142002C14E8013827 EMMC_BOOT1: 0x0000400000 (4,00Mb) EMMC_BOOT2: 0x0000400000 (4,00Mb) EMMC_RPMB : 0x0001000000 (16,00Mb) EMMC_USER : 0x0E8F800000 (58,24Gb) RAM INFO: INT_SRAM: 0x000003A000 (232,00Kb) EXT_RAM : 0x0100000000 (4,00Gb) Read Flash Info done! |
![]() |
![]() | #58 (permalink) |
Insane Poster ![]() ![]() ![]() Join Date: Jan 2011
Posts: 62
Member: 1485943 Status: Offline Thanks Meter: 55 | Selected model: Samsung SM-A125F (Galaxy A12) Operation: Read Flash Info Software version: 2.4 Host Power Off... OK Switch virtual port to USB... OK Connect Type-C to BOX... OK Host Power On... OK Wait for device... OK Read usbhost speed... HIGH Read Device Descriptor... Get VID/PID...0E8D/0003 Send start cmd... OK Get HW code from device... 0766 Get HW & SW version from device... OK HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6765] Get sec config... OK [000000E5] Active sec flags: [SBC DAA] Advanced Bypass Security... OK Disconnect virtual port... OK Connect Type-C to HUB... OK Wait for device connecting... OK Device found at COM17 [BROM] Open port... OK Send start cmd... OK Get HW code from device... 0766 Get HW & SW version from device... OK HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6765] Library Version [2] Select platform... OK Init BROM... OK Force Charge... OK Disable WatchDog Timer... OK Reopen port for libver2... OK Get ME ID... OK ME_ID = 0x2D42B746, 0xCD4F05F7, 0xC62822D6, 0x5F0E172D Get Chip ID... [MT6765] Get SOC ID... [7F02D418DC3615F044495CD3212FFF5A32E5D6018DBF474F64 CCDB205C097D53] Get sec config... OK [000000E0] Load DownloadAgent... OK Search DA... OK [23] Send preloader... OK Start preloader... OK Check preloader answer... OK Send bootloader... OK Start bootloader... OK Wait for answer from bootloader... OK Send SYNC signal... OK Setup device enviroment... OK Setup device parametres... OK Receive DA SYNC signal... OK Set DA parametres... OK Get device connection agent... [BROM] Get device info... OK EMMC_ID: 0x150100445036444142002C14E8013827 Load EMI from phone... OK Parse EMI config... OK Init EXT RAM... OK Send 2nd DA... OK Get device info... OK EMMC INFO: EMMC_ID : 0x150100445036444142002C14E8013827 EMMC_BOOT1: 0x0000400000 (4,00Mb) EMMC_BOOT2: 0x0000400000 (4,00Mb) EMMC_RPMB : 0x0001000000 (16,00Mb) EMMC_USER : 0x0E8F800000 (58,24Gb) RAM INFO: INT_SRAM: 0x000003A000 (232,00Kb) EXT_RAM : 0x0100000000 (4,00Gb) Read Flash Info done! |
![]() |
![]() | #59 (permalink) | |
No Life Poster ![]() ![]() ![]() ![]() ![]() ![]() ![]() Join Date: Feb 2007 Location: Georgetown
Posts: 2,039
Member: 455304 Status: Offline Thanks Meter: 417 ![]() | Quote:
remove or bypass if connect to the internet lock back>? | |
![]() |
![]() |
Bookmarks |
Thread Tools | |
Display Modes | |
| |
|