J510fnxxu2bre4 u2 os 7.1.1 Frp Reset Done!!!
/* */
J510fnxxu2bre4 u2 os 7.1.1 Frp Reset Done!!!
Deagle (23.11.2018),Dilshod1985 (25.04.2019),Faruxchik (23.11.2018),Ulugbek (23.11.2018),Usmonov Rustam (23.11.2018)
HUAWEI TIT-L01 reset frp
Sanginmurod.gsm (02.01.2019)
GT-I9128E Русификация
Product: samsung
Device Chipset: Qualcomm
Device Model: GT-I9128E
Device Serial: RV1F12YYV6K
Android Version: 4.2.2
Скрытый текст
EASY-TEAM
Waiting For Android Device.......OK
Reading Device Info.......OK
Product: samsung
Device Chipset: Qualcomm
Device Model: GT-I9128E
Device Serial: RV1F12YYV6K
Android Version: 4.2.2
Android SDK: 17
Architecture: armeabi-v7a
Free space in system disk: 77.4M
Phone Mode: Normal Mode
Checking Root Permission.......OK
Preparing device.......OK
Wait fixing........OK
First Install........OK
backup: framework-res.apk........OK
backup: SystemUI.apk........OK
backup: SMemo2China.apk........OK
backup: SetDefaultLauncher.apk........OK
backup: SecSetupWizard2013.apk........OK
backup: SecSettings.apk........OK
backup: SecNoteMyFiles.apk........OK
backup: SecMms.apk........OK
backup: SecLauncher3.apk........OK
backup: SecGallery2013.apk........OK
backup: SecExchange.apk........OK
backup: SecEmail_J.apk........OK
backup: SecContacts.apk........OK
backup: SecCalendar_SPen_China.apk........OK
backup: SecCalculator2.apk........OK
backup: SBrowserTry_CHN.apk........OK
backup: SBrowser_CMCC.apk........OK
backup: SamsungCamera2.apk........OK
backup: PackageInstaller.apk........OK
backup: MusicPlayerWT.apk........OK
backup: MusicFX.apk........OK
backup: EasySettings.apk........OK
backup: EasyLauncher.apk........OK
backup: 2_1UCBrowserda.apk........OK
backup: 14_qqbrowser.apk........OK
Translating: framework-res.apk.......OK
Translating: SystemUI.apk.......OK
Translating: SMemo2China.apk.......OK
Translating: SetDefaultLauncher.apk.......OK
Translating: SecSetupWizard2013.apk.......OK
Translating: SecSettings.apk.......OK
Translating: SecNoteMyFiles.apk.......OK
Translating: SecMms.apk.......OK
Translating: SecLauncher3.apk.......OK
Translating: SecGallery2013.apk.......OK
Translating: SecExchange.apk.......OK
Translating: SecEmail_J.apk.......OK
Translating: SecContacts.apk.......OK
Translating: SecCalendar_SPen_China.apk.......OK
Translating: SecCalculator2.apk.......OK
Translating: SBrowserTry_CHN.apk.....
Translating: SBrowser_CMCC.apk.....
Translating: SamsungCamera2.apk.......OK
Translating: PackageInstaller.apk.......OK
Translating: MusicPlayerWT.apk.......OK
Translating: MusicFX.apk.......OK
Translating: EasySettings.apk.......OK
Translating: EasyLauncher.apk.......OK
Translating: 2_1UCBrowserda.apk......:.Skip. App contains language values-ru.:.Skip. App contains language
Translating: 14_qqbrowser.apk.......OK
Calculating size.....
Stock total Size: 134.634
Mod total Size: 143.825
Mod - stock =9.19017
Free Size in System: 83.5
Send to mobile framework-res.apk.....
Send to mobile SystemUI.apk.......Success
Send to mobile SMemo2China.apk.......Success
Send to mobile SetDefaultLauncher.apk.......Success
Send to mobile SecSetupWizard2013.apk.......Success
Send to mobile SecSettings.apk.......Success
Send to mobile SecNoteMyFiles.apk.......Success
Send to mobile SecMms.apk.......Success
Send to mobile SecLauncher3.apk.......Success
Send to mobile SecGallery2013.apk.......Success
Send to mobile SecExchange.apk.......Success
Send to mobile SecEmail_J.apk.......Success
Send to mobile SecContacts.apk.......Success
Send to mobile SecCalendar_SPen_China.apk.......Success
Send to mobile SecCalculator2.apk.......Success
Send to mobile SBrowserTry_CHN.apk.......Fail
Send to mobile SBrowser_CMCC.apk.......Fail
Send to mobile SamsungCamera2.apk.......Success
Send to mobile PackageInstaller.apk.......Success
Send to mobile MusicPlayerWT.apk.......Success
Send to mobile MusicFX.apk.......Success
Send to mobile EasySettings.apk.......Success
Send to mobile EasyLauncher.apk.......Success
Send to mobile 14_qqbrowser.apk.......Success
send (framework-res.apk) .......Success
try fix: SecContacts.apk........Success
Finished
Translated[свернуть]
Бахтияр (12.02.2019)
Бахтияр (12.02.2019)
HUAWEI LUA-U22 Reset FRP
[Only registered and activated users can see links. ]Скрытый текст
Wating Device..........OK
CPU: MT6582
Chip Version: 0x0000ca01
Chip Ext Clock: EXT_26M
Writing Mode..........OK
Internal RAM:
Internal SRAM Size: 128.00 KB
External RAM: Type DRAM
External Ram Size: 1.00 GB
EMMC:
EMMC PART BOOT1 Size: 4.00 MB
EMMC PART BOOT2 Size: 4.00 MB
EMMC PART RPMB Size: 4.00 MB
EMMC PART USER Size: 7.28 GB
Battery:
Battery Voltage: 3914
Injection..........OK
Detecting Parts info............OK
[ID: 255] [PRELOADER] BaseAddr(0x00000000) Size(0x00c00000)
[ID: 255] [MBR] BaseAddr(0x00c00000) Size(0x00080000)
[ID: 255] [EBR1] BaseAddr(0x00c80000) Size(0x00080000)
[ID: 255] [PRO_INFO] BaseAddr(0x00d00000) Size(0x00300000)
[ID: 255] [NVRAM] BaseAddr(0x01000000) Size(0x00500000)
[ID: 255] [PROTECT_F] BaseAddr(0x01500000) Size(0x00a00000)
[ID: 255] [PROTECT_S] BaseAddr(0x01f00000) Size(0x00a00000)
[ID: 255] [SECCFG] BaseAddr(0x02900000) Size(0x00020000)
[ID: 255] [UBOOT] BaseAddr(0x02920000) Size(0x00060000)
[ID: 255] [BOOTIMG] BaseAddr(0x02980000) Size(0x00600000)
[ID: 255] [RECOVERY] BaseAddr(0x02f80000) Size(0x00600000)
[ID: 255] [SEC_RO] BaseAddr(0x03580000) Size(0x00600000)
[ID: 255] [MISC] BaseAddr(0x03b80000) Size(0x00080000)
[ID: 255] [LOGO] BaseAddr(0x03c00000) Size(0x00300000)
[ID: 255] [EBR2] BaseAddr(0x03f00000) Size(0x00080000)
[ID: 255] [CUSTOM] BaseAddr(0x03f80000) Size(0x19000000)
[ID: 255] [EXPDB] BaseAddr(0x1cf80000) Size(0x00a00000)
[ID: 255] [ROOTM] BaseAddr(0x1d980000) Size(0x00400000)
[ID: 255] [FRP] BaseAddr(0x1dd80000) Size(0x00100000)
[ID: 255] [ANDROID] BaseAddr(0x1de80000) Size(0x93300000)
[ID: 255] [CACHE] BaseAddr(0xb1180000) Size(0x0f000000)
[ID: 255] [USRDATA] BaseAddr(0xc0180000) Size(0x111580000)
[ID: 255] [BMTPOOL] BaseAddr(0xffff00a8) Size(0x01500000)
Detecting Device info.......OK
Product: HUAWEI
Device Model: HUAWEI LUA-U22
ID: LUA-U22C479B006
Sw Internal: LUA-U22C479B006
Build Date: Tue May 9 16:59:17 CST 2017
Chip Ver: S01
Android Version: 5.1
Architecture: armeabi-v7a
FRP RESET... [FRP] .....OK
All Done By EFT Dongle[свернуть]
[Only registered and activated users can see links. ]
[Only registered and activated users can see links. ]
Бахтияр (12.02.2019)
Samsung SM J727P Translation without root
Samsung SM N9109W русификация
besr13rr (08.02.2019),GSM-RADUGA (08.02.2019)
HUAWEI TAG-L21 FRP Reset
Скрытый текст
Wating Device..........OK
CPU: MT6753
Chip Version: 0x0000ca00
Chip Ext Clock: EXT_26M
Writing Mode..........OK
Internal RAM:
Internal SRAM Size: 128.00 KB
External RAM: Type DRAM
External Ram Size: 2.00 GB
EMMC:
EMMC PART BOOT1 Size: 4.00 MB
EMMC PART BOOT2 Size: 4.00 MB
EMMC PART RPMB Size: 4.00 MB
EMMC PART USER Size: 14.56 GB
Battery:
Battery Voltage: 3533
Injection..........OK
Detecting Parts info............OK
[ID: 1] [preloader] BaseAddr(0x00000000) Size(0x00400000)
[ID: 8] [pgpt] BaseAddr(0x00000000) Size(0x00080000)
[ID: 8] [proinfo] BaseAddr(0x00080000) Size(0x00300000)
[ID: 8] [nvram] BaseAddr(0x00380000) Size(0x00500000)
[ID: 8] [protect1] BaseAddr(0x00880000) Size(0x00a00000)
[ID: 8] [protect2] BaseAddr(0x01280000) Size(0x00a00000)
[ID: 8] [lk] BaseAddr(0x01c80000) Size(0x00080000)
[ID: 8] [para] BaseAddr(0x01d00000) Size(0x00080000)
[ID: 8] [boot] BaseAddr(0x01d80000) Size(0x01000000)
[ID: 8] [recovery] BaseAddr(0x02d80000) Size(0x01000000)
[ID: 8] [logo] BaseAddr(0x03d80000) Size(0x00800000)
[ID: 8] [log] BaseAddr(0x04580000) Size(0x04000000)
[ID: 8] [expdb] BaseAddr(0x08580000) Size(0x00a00000)
[ID: 8] [ROOTM] BaseAddr(0x08f80000) Size(0x00400000)
[ID: 8] [seccfg] BaseAddr(0x09380000) Size(0x00080000)
[ID: 8] [oemkeystore] BaseAddr(0x09400000) Size(0x00200000)
[ID: 8] [secro] BaseAddr(0x09600000) Size(0x00600000)
[ID: 8] [keystore] BaseAddr(0x09c00000) Size(0x00800000)
[ID: 8] [tee1] BaseAddr(0x0a400000) Size(0x00500000)
[ID: 8] [tee2] BaseAddr(0x0a900000) Size(0x00500000)
[ID: 8] [frp] BaseAddr(0x0ae00000) Size(0x00100000)
[ID: 8] [nvdata] BaseAddr(0x0af00000) Size(0x02000000)
[ID: 8] [metadata] BaseAddr(0x0cf00000) Size(0x02100000)
[ID: 8] [system] BaseAddr(0x0f000000) Size(0xe6800000)
[ID: 8] [cache] BaseAddr(0xf5800000) Size(0x19000000)
[ID: 8] [userdata] BaseAddr(0x10e800000) Size(0x294580000)
[ID: 8] [flashinfo] BaseAddr(0x3a2d80000) Size(0x01000000)
[ID: 8] [sgpt] BaseAddr(0x3a3d80000) Size(0x00080000)
Detecting Device info.......OK
Product: HUAWEI
Device Model: HUAWEI TAG-L21
ID: TAG-L21C479B130
Sw Internal:
Build Date: Wed Aug 3 10:38:24 CST 2016
Chip Ver: S01
Android Version: 5.1
Architecture: arm64-v8a
FRP RESET... [FRP] .....OK
All Done By EFT Dongle[свернуть]
[Only registered and activated users can see links. ]
[Only registered and activated users can see links. ]
[Only registered and activated users can see links. ]
HUAWEI Y6 Prime 2018 ATU-L31 Reset FRP
EFT Dongle
Connecting Fastboot .......
Connecting Fastboot .......Ok
Model Phone: ATU-L31
SW: ATU-L31 8.0.0.143(C10)
Connecting Server .....RECEIVED
Connecting Server .....READY
Erase Done , The Device Will Reboot And Factory Reset
Reboot ...............OK
By EFT Dongle OK
[Only registered and activated users can see links. ]
[Only registered and activated users can see links. ]
islom (29.03.2019)
Sanginmurod.gsm (19.05.2019),UO5OQ (19.05.2019)
Opening Port COM6...........OK
Verifying Download Mod
OK
Initialization.......OK
Reading Phone Partitation Table........OK
Partition Size : 8192
Unpak pit .......OK
FLASHING FIRMWARE TO PHONE.....
Sending data: ..........OK
FLASHING DONE!
Rebooting PDA TO NORMAL MODE........OK
Waiting For ADB Device.....Detecting Device Info.....DONE
Device Model: SM-G930F
Device CPU: arm64-v8a
Android SDK: 26
Android Version: 8.0.0
Screen Lock reset .......OK
?мею в наличие : SETool MX-key ATF Z3XBOX-SAM Easy-Jtag OCTOPLUS SAM OCTOPLUS-LG OCTOPLUS-SONY Octoplus FRP Tool Octoplus Huawei MEDUZA-PRO-JTAG Octoplus FRP Tool Octoplus Huawei Tool EFT CM2 BEST BEST-2
- Boot Your Device To Download Mode Then Plug UART Cable In It
- And Hold 'Vol Down' With 'Power Button'
Waiting For Bootloader Device.....Done
Booting To Upload Mode.....Done
- Now Release All Buttons And Disconnect All Android Devices From Computer
- Then Connect Only Your Device Via USB Cable
Waiting For USB Modem Connect.....Done
Bypassing ReActive Secure.....Done
- Disconnect Your Device From USB Cable And Re-Connect It Via UART
- Then Press And Hold 'Vol Down' With 'Power Button'
- If The Device Has Black Screen For More Than 7-8 Seconds
- Then Release The Buttons And Re-Press Them
Waiting For Bootloader Device....Done
Release All Buttons Now
Matched Model.....SM-G570F
Resetting FRP.....Done
Operation Completed, Check FRP Status In Download Mode.
?мею в наличие : SETool MX-key ATF Z3XBOX-SAM Easy-Jtag OCTOPLUS SAM OCTOPLUS-LG OCTOPLUS-SONY Octoplus FRP Tool Octoplus Huawei MEDUZA-PRO-JTAG Octoplus FRP Tool Octoplus Huawei Tool EFT CM2 BEST BEST-2
Wating Device..........OK
CPU: MT6582
Chip Version: 0x0000ca01
Chip Ext Clock: EXT_26M
Writing Mode..........OK
Internal RAM:
Internal SRAM Size: 128.00 KB
External RAM: Type DRAM
External Ram Size: 512.00 MB
EMMC:
EMMC PART BOOT1 Size: 2.00 MB
EMMC PART BOOT2 Size: 2.00 MB
EMMC PART RPMB Size: 128.00 KB
EMMC PART USER Size: 3.60 GB
Battery:
Battery Voltage: 4109
Injection..........OK
Detecting Parts info............OK
[ID: 255] [PRELOADER] BaseAddr(0x00000000) Size(0x00c00000)
[ID: 255] [MBR] BaseAddr(0x00c00000) Size(0x00080000)
[ID: 255] [EBR1] BaseAddr(0x00c80000) Size(0x00080000)
[ID: 255] [PRO_INFO] BaseAddr(0x00d00000) Size(0x00300000)
[ID: 255] [NVRAM] BaseAddr(0x01000000) Size(0x00500000)
[ID: 255] [PROTECT_F] BaseAddr(0x01500000) Size(0x00a00000)
[ID: 255] [PROTECT_S] BaseAddr(0x01f00000) Size(0x00a00000)
[ID: 255] [SECCFG] BaseAddr(0x02900000) Size(0x00020000)
[ID: 255] [UBOOT] BaseAddr(0x02920000) Size(0x00060000)
[ID: 255] [BOOTIMG] BaseAddr(0x02980000) Size(0x01000000)
[ID: 255] [RECOVERY] BaseAddr(0x03980000) Size(0x01000000)
[ID: 255] [SEC_RO] BaseAddr(0x04980000) Size(0x00600000)
[ID: 255] [MISC] BaseAddr(0x04f80000) Size(0x00080000)
[ID: 255] [LOGO] BaseAddr(0x05000000) Size(0x00300000)
[ID: 255] [EBR2] BaseAddr(0x05300000) Size(0x00080000)
[ID: 255] [EXPDB] BaseAddr(0x05380000) Size(0x00a00000)
[ID: 255] [ANDROID] BaseAddr(0x05d80000) Size(0x38400000)
[ID: 255] [CACHE] BaseAddr(0x3e180000) Size(0x07e00000)
[ID: 255] [USRDATA] BaseAddr(0x45f80000) Size(0x39c00000)
[ID: 255] [FAT] BaseAddr(0x7fb80000) Size(0x65ba0000)
[ID: 255] [BMTPOOL] BaseAddr(0xffff00a8) Size(0x01500000)
Detecting Device info.......OK
Product: GFIVE
Device Model: GFIVE President G10 Life
ID: GFIVE President G10 Life 20140924-145255
Sw Internal:
Build Date: Wed Sep 24 14:52:55 CST 2014
Chip Ver: S01
Android Version: 4.4.2
Architecture: armeabi-v7a
Screen Lock Reset (Encrypted Data).............OK
Screen Lock Reset (Encrypted Data).............OK
Screen Lock Reset (Encrypted Data).............OK
Screen Lock Reset (Encrypted Data).............OK
Screen Lock Reset (Encrypted Data).............OK
Screen Lock Reset (Encrypted Data).............OK
Screen Lock Reset (Encrypted Data).............OK
Screen Lock Reset (Encrypted Data).............OK
Screen Lock Reset (Encrypted Data).............OK
Screen Lock Reset (Encrypted Data).............OK
Screen Lock Reset (Encrypted Data).............OK
Screen Lock Reset (Encrypted Data).............OK
Screen Lock Reset (Encrypted Data).............OK
Screen Lock Reset (Encrypted Data).............OK
Screen Lock Reset (Encrypted Data).............OK
Screen Lock Reset (Encrypted Data).............OK
Screen Lock Reset (Encrypted Data).............OK
Screen Lock Reset (Encrypted Data).............OK
Screen Lock Reset (Encrypted Data).............OK
Screen Lock Reset (Encrypted Data).............OK
Screen Lock Reset (Encrypted Data).............OK
Screen Lock Reset (Encrypted Data).............OK
Screen Lock Reset (Encrypted Data).............OK
Screen Lock Reset (Encrypted Data).............OK
Screen Lock Reset (Encrypted Data).............OK
Screen Lock Reset (Encrypted Data).............OK
Screen Lock Reset (Encrypted Data).............OK
Screen Lock Reset (Encrypted Data).............OK
Screen Lock Reset (Encrypted Data).............OK
Screen Lock Reset (Encrypted Data).............OK
Screen Lock Reset (Encrypted Data).............OK
Screen Lock Reset (Encrypted Data).............OK
Screen Lock Reset (Encrypted Data).............OK
Screen Lock Reset (Encrypted Data).............OK
Screen Lock Reset (Encrypted Data).............OK
Screen Lock Reset (Encrypted Data).............OK
All Done By EFT Dongle
?мею в наличие : SETool MX-key ATF Z3XBOX-SAM Easy-Jtag OCTOPLUS SAM OCTOPLUS-LG OCTOPLUS-SONY Octoplus FRP Tool Octoplus Huawei MEDUZA-PRO-JTAG Octoplus FRP Tool Octoplus Huawei Tool EFT CM2 BEST BEST-2
Setting up.....OK
Loading files.....OK
Waiting for MTK port.....Detected {COM12}
Connecting to Brom.....OK
Sending DA.....OK
Reading partitions.....OK
Chip name: MT6580
Reading prop info.....OK
Device Firmware: MRA58K release-keys
Device SDK: 23
Android version: 6.0
Device Model: BLU DASH M2
Device Factory: BLU
Device CPU: armeabi-v7a
Device Factory: BLU
Resetting frp.....OK
Operation {Reset FRP} ID: 93124B664B17AC80
Elapsed time 01:11 -- Version 1.8.2
?мею в наличие : SETool MX-key ATF Z3XBOX-SAM Easy-Jtag OCTOPLUS SAM OCTOPLUS-LG OCTOPLUS-SONY Octoplus FRP Tool Octoplus Huawei MEDUZA-PRO-JTAG Octoplus FRP Tool Octoplus Huawei Tool EFT CM2 BEST BEST-2
Setting up.....OK
Loading files.....OK
Waiting for MTK port.....Detected {COM12}
Connecting to Brom.....OK
Sending DA.....OK
Reading partitions.....OK
Chip name: MT6580
Reading prop info.....OK
Device Firmware: MRA58K release-keys
Device SDK: 23
Android version: 6.0
Device Model: BLU DASH M2
Device Factory: BLU
Device CPU: armeabi-v7a
Device Factory: BLU
Reading [preloader].....OK
Reading [pgpt].....OK
Reading [proinfo].....OK
Reading [nvram].....OK
Reading [protect1].....OK
Reading [protect2].....OK
Reading [seccfg].....OK
Reading [lk].....OK
Reading [boot].....OK
Reading [recovery].....OK
Reading [para].....OK
Reading [logo].....OK
Reading [expdb].....OK
Reading [frp].....OK
Reading [nvdata].....OK
Reading [metadata].....OK
Reading [oemkeystore].....OK
Reading [secro].....OK
Reading [keystore].....OK
Reading [system].....OK
Reading [cache].....OK
Reading [userdata].....OK
Reading [flashinfo].....OK
Writing scatter.....OK
Operation {Read Scatter firmware} ID: 314346A0ABA2210C
Elapsed time 13:35 -- Version 1.8.2
?мею в наличие : SETool MX-key ATF Z3XBOX-SAM Easy-Jtag OCTOPLUS SAM OCTOPLUS-LG OCTOPLUS-SONY Octoplus FRP Tool Octoplus Huawei MEDUZA-PRO-JTAG Octoplus FRP Tool Octoplus Huawei Tool EFT CM2 BEST BEST-2
UO5OQ (31.01.2020)
Analyzing file.....OK
Searching for Samsung ODIN protocol.....Detected {COM21}
Connecting to device.....OK
Device Model.....SM-A320F
Reading PIT.....OK
Flashing [data 1].....OK
Rebooting device.....OK
Waiting for device.....OK
Reading device info.....OK
Baseband Version: A320FXXU3CRD3
Serial Number: RF8JB3AW0NE
Device Arch: exynos7870
Device bootloader: A320FXXU3CRD4
Device selinux: enforcing
Device warranty bit: 0
Device Firmware: A320FXXU3CRD4
Android version: 8.0.0
Device SDK: 26
Device data encryption: encrypted
Firmware Country: Central Asia
Device Hardware: samsungexynos7870
Device CPU: armeabi-v7a
Device Factory: samsung
Device Model: SM-A320F
Device IMEI:
Root status.....Rooted { Adb direct }
Resetting ScreenLock.....OK
Operation {Reset [ScreenLock - FRP - MDM - Call Me - Samsung Account] -- FRP / OEM: ON} ID: 0B639A739559676E
Elapsed time 03:10 -- Version 1.8.2
?мею в наличие : SETool MX-key ATF Z3XBOX-SAM Easy-Jtag OCTOPLUS SAM OCTOPLUS-LG OCTOPLUS-SONY Octoplus FRP Tool Octoplus Huawei MEDUZA-PRO-JTAG Octoplus FRP Tool Octoplus Huawei Tool EFT CM2 BEST BEST-2
Ulugbek (15.02.2020)
Searching for Samsung ODIN protocol.....Detected {COM21}
Total flash size: 2,75 GB
Connecting to device.....OK
Device Model.....SM-G570F
Reading PIT.....OK
Flashing [boot.img].....OK
Flashing [recovery.img].....OK
Flashing [system.img].....OK
Rebooting device.....OK
Operation {Bypass DRK - DM-Verity error 2 -- FRP / OEM: ON} ID: E126A727A33F846C
Elapsed time 02:14 -- Version 1.9.3
?мею в наличие : SETool MX-key ATF Z3XBOX-SAM Easy-Jtag OCTOPLUS SAM OCTOPLUS-LG OCTOPLUS-SONY Octoplus FRP Tool Octoplus Huawei MEDUZA-PRO-JTAG Octoplus FRP Tool Octoplus Huawei Tool EFT CM2 BEST BEST-2
shamil_9191 (17.02.2020),Ulugbek (15.02.2020)
Setting up.....OK
Loading files.....OK
Waiting for MTK port.....Detected {COM12}
Connecting to Brom.....OK
Sending DA.....OK
Chip name: MT6580
Reading prop info.....OK
Device Firmware: MRA58K
Device SDK: 23
Android version: 6.0
Device Model: Vivo 5 Mini
Device Factory: BLU
Device CPU: armeabi-v7a
Device Factory: BLU
Reading data.....OK
Patching data.....OK
Operation {ScreenLock} ID: 3BFC080F490233B0
Elapsed time 03:57 -- Version 1.9.6
?мею в наличие : SETool MX-key ATF Z3XBOX-SAM Easy-Jtag OCTOPLUS SAM OCTOPLUS-LG OCTOPLUS-SONY Octoplus FRP Tool Octoplus Huawei MEDUZA-PRO-JTAG Octoplus FRP Tool Octoplus Huawei Tool EFT CM2 BEST BEST-2
Reset ScreenLock
Checking fastboot device.....OK
Reading info.....OK
Device Model: BLL-L21
Device Serial: 2WGDU17215000533
Device IMEI: 8624970ххххх
Device IMEI2: 862497031ххххх
Device Firmware: :BLL-L21C10B388
Device FB Lock: LOCKED
Device USER Lock: LOCKED
Device Lock: locked
Waiting for server.....OK
Reading data.....OK
Posting data to server.....OK
Waiting for server response.....OK
Unlocking device.....OK
Extracting data.....2,86 GB
Converting.....3,15 GB
Sparsing.....2,86 GB
Writing data.....100%
Operation {Reset ScreenLock} ID: FE44EBC459F6DAC5
Elapsed time 06:27 -- Version 3.5.0
Эту тему просматривают: 1 (пользователей: 0 , гостей: 1)