Что нового

Успешно Разблокировано & Repaired & Перевод Телефоны

LLD-L31 версия андроида 9, через тест поинт 12сек)

Extracting files.....Done
Waiting for device to connect.....Found {COM220}
Opening Port.....OK
Writing xloader.....OK
Writing fastboot.....OK
Rebooting to fastboot.....OK
Connecting Fastboot .......
Connecting Fastboot .......Ok
Model Phone: LLD-L31
SW: :LLD-L319.1.0.116(C10E4R1P4)
Android Version: 9
SN: FPM4C185=========
IMEI: 869675=========
IMEI: IMEI1:869675=========
IMEI: MEID:00000000000000
Lock state: FBLockState:UNLOCKED USERLockState:LOCKED
Boot info: unlocked
battery: 0
Frp Erase ...............OK
Erase Done , The Device Will Reboot And Factory Reset
Reboot ...............OK
By EFT Dongle OK
 
A500H android 6.0.1 Графический ключ без потери данных (успешно)


Opening Port COM19...........OK
Verifying Download Mod
OK
Initialization.......OK
Reading Phone Partitation Table........OK
Partition Size : 8192
Unpak pit .......OK
FLASHING FIRMWARE TO PHONE.....
Writing: boot.img.......OK
FLASHING DONE!
Rebooting PDA TO NORMAL MODE........OK
 

Вложения

  • 227,5 КБ Просмотры: 87
Последнее редактирование:
Alcatel one touch 5015D frp

Код:
Wating Device..........OK
CPU: MT6580
Chip Version: 0x0000ca00
Chip Ext Clock: EXT_26M
Writing Mode..........OK
Internal RAM: 
Internal SRAM Size: 128.00 KB
External RAM: Type DRAM
External Ram Size: 1.00 GB
EMMC: 
EMMC PART BOOT1 Size: 4.00 MB
EMMC PART BOOT2 Size: 4.00 MB
EMMC PART RPMB Size: 512.00 KB
EMMC PART USER Size: 7.28 GB
Battery: 
Battery Voltage: 3689
Injection..........OK
Detecting Parts info............OK
[ID: 1] [preloader] BaseAddr(0x00000000) Size(0x00400000) 
[ID: 8] [pgpt] BaseAddr(0x00000000) Size(0x00800000) 
[ID: 8] [proinfo] BaseAddr(0x00800000) Size(0x00680000) 
[ID: 8] [nvram] BaseAddr(0x00e80000) Size(0x00500000) 
[ID: 8] [protect1] BaseAddr(0x01380000) Size(0x00a00000) 
[ID: 8] [protect2] BaseAddr(0x01d80000) Size(0x00a00000) 
[ID: 8] [para] BaseAddr(0x02780000) Size(0x00080000) 
[ID: 8] [lk] BaseAddr(0x02800000) Size(0x00800000) 
[ID: 8] [logo] BaseAddr(0x03000000) Size(0x00800000) 
[ID: 8] [boot] BaseAddr(0x03800000) Size(0x01000000) 
[ID: 8] [recovery] BaseAddr(0x04800000) Size(0x01000000) 
[ID: 8] [oemkeystore] BaseAddr(0x05800000) Size(0x00800000) 
[ID: 8] [secro] BaseAddr(0x06000000) Size(0x00800000) 
[ID: 8] [keystore] BaseAddr(0x06800000) Size(0x00800000) 
[ID: 8] [custpack] BaseAddr(0x07000000) Size(0x38000000) 
[ID: 8] [seccfg] BaseAddr(0x3f000000) Size(0x00800000) 
[ID: 8] [expdb] BaseAddr(0x3f800000) Size(0x01000000) 
[ID: 8] [mobile_info] BaseAddr(0x40800000) Size(0x00800000) 
[ID: 8] [frp] BaseAddr(0x41000000) Size(0x00800000) 
[ID: 8] [nvdata] BaseAddr(0x41800000) Size(0x02000000) 
[ID: 8] [metadata] BaseAddr(0x43800000) Size(0x02000000) 
[ID: 8] [system] BaseAddr(0x45800000) Size(0x4e800000) 
[ID: 8] [cache] BaseAddr(0x94000000) Size(0x07000000) 
[ID: 8] [userdata] BaseAddr(0x9b000000) Size(0x133480000) 
[ID: 8] [otp] BaseAddr(0x1ce480000) Size(0x02b00000) 
[ID: 8] [flashinfo] BaseAddr(0x1d0f80000) Size(0x01000000) 
[ID: 8] [sgpt] BaseAddr(0x1d1f80000) Size(0x00080000) 
FRP RESET... [FRP] .....OK
All Done By EFT Dongle
 
Samsung J120H frp в списке моделей выбрат J120f

Opening Port COM19...........OK
Verifying Download Mod
OK
Initialization.......OK
Reading Phone Partitation Table........OK
Partition Size : 8192
Unpak pit .......OK
FRP RESET.......OK
Rebooting PDA TO NORMAL MODE........OK
 
A320F U4 Андроид 8 screenlock снял Успешно eft screenlock.jpg

Код:
[B][I]Analyzing file.....OK 
Searching for Samsung ODIN protocol.....Detected {COM19} 
Connecting to device.....OK 
Device Model.....SM-A320F 
Reading PIT.....OK 
Flashing [data 1].....OK
Rebooting device.....OK 
Waiting for device.....OK 
Reading device info.....OK 
Baseband Version: A320FXXU4CRJ1 
Serial Number: RF8J42AGHLT 
Device Arch: exynos7870 
Device bootloader: A320FXXS4CRJ1 
Device selinux: enforcing 
Device warranty bit: 0 
Device Firmware: A320FXXS4CRJ1 
Android version: 8.0.0 
Device SDK: 26 
Device data encryption: encrypted 
Firmware Country: UAE 
Device Hardware: samsungexynos7870 
Device CPU: armeabi-v7a 
Device Factory: samsung 
Device Model: SM-A320F 
Device IMEI: 
Root status.....Rooted { Adb direct } 
Resetting ScreenLock.....OK 
Operation {Reset [ScreenLock - FRP - MDM - Call Me - Samsung Account] -- FRP / OEM: ON} ID: F6942E80273C1147F47ADAD4252CF7F3 
Elapsed time 01:31 -- Version 1.7.2[/I][/B]
 
Я извиняюсь заранее,не хотел создавать отдельную тему,так как это простой проблема,при регистрации на сайте eft активационный письмо не приходить на электронный адрес,нужна помощь
 
J200G root Успешно

Код:
[B][I]Analyzing file.....OK 
Searching for Samsung ODIN protocol.....Detected {COM25} 
Connecting to device.....OK 
Device Model.....SM-J200G 
Reading PIT.....OK 
Flashing [data 1].....OK
Rebooting device.....OK 
Waiting for device.....OK 
Reading device info.....OK 
Baseband Version: J200GDDU2ARK1 
Serial Number: RZ8H60RFDYY 
Device Arch: exynos3475 
Device bootloader: J200GDDU2ARL1 
Device selinux: enforcing 
Device warranty bit: 1 
Device Firmware: J200GDDU2ARL1 
Android version: 5.1.1 
Device SDK: 22 
Device data encryption: unencrypted 
Firmware Country: India 
Device Hardware: universal3475 
Device CPU: armeabi-v7a 
Device Factory: samsung 
Device Model: SM-J200G 
Device IMEI: 
Root status.....Rooted { Adb direct } 
Operation {Reset [ScreenLock - FRP - MDM - Call Me - Samsung Account] -- FRP / OEM: ON} ID: F6942E80273C1147F47ADAD4252CF7F3 
Elapsed time 00:56 -- Version 1.7.2[/I][/B]
 

zaya86

.
11/4/10
906
33
37
Туркменистан
A 320F FRP ON Screen Lock reset

Analyzing file.....OK
Searching for Samsung ODIN protocol.....Detected {COM21}
Connecting to device.....OK
Device Model.....SM-A320F
Reading PIT.....OK
Flashing [data 1].....OK
Rebooting device.....OK
Waiting for device.....OK
Reading device info.....OK
Baseband Version: A320FXXU3CRD3
Serial Number: RF8JB3AW0NE
Device Arch: exynos7870
Device bootloader: A320FXXU3CRD4
Device selinux: enforcing
Device warranty bit: 0
Device Firmware: A320FXXU3CRD4
Android version: 8.0.0
Device SDK: 26
Device data encryption: encrypted
Firmware Country: Central Asia
Device Hardware: samsungexynos7870
Device CPU: armeabi-v7a
Device Factory: samsung
Device Model: SM-A320F
Device IMEI:
Root status.....Rooted { Adb direct }
Resetting ScreenLock.....OK
Operation {Reset [ScreenLock - FRP - MDM - Call Me - Samsung Account] -- FRP / OEM: ON} ID: 0B639A739559676E
Elapsed time 03:10 -- Version 1.8.2
 

Вложения

zaya86

.
11/4/10
906
33
37
Туркменистан
Bypass DRK - DM-Verity error 2 -- FRP / OEM: ON BUT2

Searching for Samsung ODIN protocol.....Detected {COM21}
Total flash size: 2,75 GB
Connecting to device.....OK
Device Model.....SM-G570F
Reading PIT.....OK
Flashing [boot.img].....OK
Flashing [recovery.img].....OK
Flashing [system.img].....OK
Rebooting device.....OK
Operation {Bypass DRK - DM-Verity error 2 -- FRP / OEM: ON} ID: E126A727A33F846C
Elapsed time 02:14 -- Version 1.9.3
 

Вложения

zaya86

.
11/4/10
906
33
37
Туркменистан
Vivo 5 Mini ScreenLock без потери данных

Setting up.....OK
Loading files.....OK
Waiting for MTK port.....Detected {COM12}
Connecting to Brom.....OK
Sending DA.....OK
Chip name: MT6580
Reading prop info.....OK
Device Firmware: MRA58K
Device SDK: 23
Android version: 6.0
Device Model: Vivo 5 Mini
Device Factory: BLU
Device CPU: armeabi-v7a
Device Factory: BLU
Reading data.....OK
Patching data.....OK
Operation {ScreenLock} ID: 3BFC080F490233B0
Elapsed time 03:57 -- Version 1.9.6
 

Вложения

G610F FRP

Analyzing file.....OK
Searching for Samsung ODIN protocol.....Detected {COM7}
Connecting to device.....OK
Reading PIT.....OK
Flashing [data 1].....OK
Rebooting device.....OK
Waiting for device.....OK
Reading device info.....OK
Baseband Version: G610FDDU1CSB1
Serial Number: R58J466Q7JM
Device Arch: exynos7870
Device bootloader: G610FDDU1CSB3
Device selinux: enforcing
Device warranty bit: 0
Device Firmware: G610FDDU1CSB3
Android version: 8.1.0
Device SDK: 27
Device data encryption: encrypted
Firmware Country: Iraq
Device Hardware: samsungexynos7870
Device CPU: armeabi-v7a
Device Factory: samsung
Device Model: SM-G610F
Device IMEI:
Root status.....Rooted { Adb direct }
Resetting FRP.....OK
Operation {Reset [ScreenLock - FRP - MDM - Call Me - Samsung Account] -- FRP / OEM: ON} ID: 29D9D569FA421A62
Elapsed time 04:54 -- Version 2.6
 
G610f android 7 frp успешно

Analyzing file.....OK
Searching for Samsung ODIN protocol.....Detected {COM7}
Connecting to device.....OK
Reading PIT.....OK
Flashing [data 1].....OK
Rebooting device.....OK
Waiting for device.....OK
Reading device info.....OK
Baseband Version: G610FDDU1BRF2
Serial Number: R58J30V9A7H
Device Arch: exynos7870
Device bootloader: G610FDDU1BRG1
Device selinux: enforcing
Device warranty bit: 0
Device Firmware: G610FDDU1BRG1
Android version: 7.0
Device SDK: 24
Device data encryption: encrypted
Firmware Country: UAE
Device Hardware: samsungexynos7870
Device CPU: armeabi-v7a
Device Factory: samsung
Device Model: SM-G610F
Device IMEI:
Root status.....Rooted { Adb direct }
Resetting FRP.....OK
Operation {Reset [ScreenLock - FRP - MDM - Call Me - Samsung Account] -- FRP / OEM: ON} ID: EF36CCF2BB2D393B
Elapsed time 01:11 -- Version 3.4.3
 
A510F U8 ROOT успешно

Analyzing file.....OK
Searching for Samsung ODIN protocol.....Detected {COM17}
Connecting to device.....OK
Reading PIT.....OK
Flashing [data 1].....OK
Rebooting device.....OK
Waiting for device.....OK
Reading device info.....OK
Baseband Version: A510FXXS8CSC2
Serial Number: R58H33PBNWV
Device Arch: exynos7580
Device bootloader: A510FXXS8CSC2
Device selinux: enforcing
Device warranty bit: 1
Device Firmware: A510FXXS8CSC2
Android version: 7.0
Device SDK: 24
Device data encryption: unencrypted
Firmware Country: Russia
Device Hardware: samsungexynos7580
Device CPU: armeabi-v7a
Device Factory: samsung
Device Model: SM-A510F
Device IMEI:
Root status.....Rooted { Adb direct }
Operation {Reset [ScreenLock - FRP - MDM - Call Me - Samsung Account] -- FRP / OEM: ON} ID: FB0FC15AF90459C8
Elapsed time 01:28 -- Version 3.4.3
 
P20 lite (ane-lx1) frp успешно

Waiting for USB COM 1 port.....Detected {COM173}
Connecting to device.....OK
Writing data 1.....OK
Writing data 3.....OK
Rebooting device to fastboot.....OK
Waiting for fastboot device.....OK
Reading info.....OK
Device Model: ANE-LX1
Device Serial: 9WVDU18C170ххх
Device IMEI: 8662370450ххх
Device IMEI2: 8662370450ххх
Device Firmware: :ANE-LX1 8.0.0.146(C461)
Device FB Lock: UNLOCKED
Device USER Lock: LOCKED
Device Lock: unlocked
Resetting FRP.....OK
Operation {Reset FRP [Test Point]} ID: 9540433AF8589372
Elapsed time 00:52 -- Version 3.5.0
 
VIWA_X5 восстановления родного imei успешно

Waiting for server.....OK

Loading files.....OK

Setting up.....OK

Waiting for MTK port.....Detected {COM30}

Switching to Meta Mode.....OK

Waiting for Meta port.....Detected {COM167}

Connecting to Meta port.....OK

Reading info.....OK

Device Firmware: VIWA_X5_R11_20160906

Device SDK: 23

Android version: 6.0

Device Model: X5

Device Factory: VIWA_X5

Device CPU: arm64-v8a

Device Factory: VIWA_X5

Reading Modem info.....OK

Preparing Modem.....OK

Reading NVRAM database.....OK

Pulling database.....OK

Loading database.....OK

Reading NVRAM.....OK

Writing IMEI 1.....OK

Writing IMEI 2.....OK

Operation {Repair IMEI META} ID: 82FA49111FAD12AE

Elapsed time 01:06 -- Version 3.9.1
 
Последнее редактирование:
Alcatel TCl 9003X frp Успешно
Setting up.....OK

Loading files.....OK

Waiting for MTK port.....Detected {COM30}

Connecting to Brom.....OK

Sending DA.....OK

Reading partitions.....OK

Chip name: MT6580

Reading prop info.....OK

Device Firmware: MRA58K release-keys

Device SDK: 23

Android version: 6.0

Device Model: 9003X

Device Factory: TCL

Device CPU: armeabi-v7a

Device Factory: TCL

Baseband Version: 6582

Resetting frp.....OK

Operation {Reset FRP} ID: 82D0219ECDBC21EB

Elapsed time 00:24 -- Version 3.9.1
 

Кто читал эту тему (всего: 233) Детально

Верх Низ