ClanGSM.com

Bienvenido, invitado ( Identificarse | Registrarse )

6 Páginas: V  « < 4 5 6  
Reply to this topicStart new topic
Ayuda A136u Unlock? (solucionado)
miguel901
mensaje Jun 25 2024, 12:11 PM
Publicado: #101

Miembro del Clan
*

Grupo: Miembros
Mensajes: 3
Agradecimientos: 0
Registrado: 7-February 24
Miembro No.: 1,271,286
Pais:cu


CITA(chanfles66 @ Jul 21 2022, 06:58 PM) *
amigo trata de cambiar el Csc y verás q te agarra señal si tienes herramienta que soperote ese proceso saludos también soy de Venezuela
quien tiene el CSs para cambiarle alguien tiene un link de descarga
Go to the top of the page
 
+Quote Post
Anunciante Autorizado
mensaje Jun 25 2024, 12:11 PM
Publicado: #

Auspiciador de ClanGSM

Estas ofertas
pudieran interesarte.











Go to the top of the page
 
Quote Post
ramon_elburro
mensaje Aug 28 2024, 05:37 PM
Publicado: #102

Miembro del Clan
*

Grupo: Miembros
Mensajes: 8
Agradecimientos: 21
Registrado: 23-November 15
Miembro No.: 773,641
Pais:ad


PANDORA CON 5 CREDITOS
Selected model: Samsung SM-A136U (Samsung Galaxy A13 5G)
Operation: Unlock network (Server)
Software version: 7.1
Work ID: 40371879

Checking Login and Password... OK
Balance: 7 crd.
Le quedan 7 crédito(s). Esta operación consume 5 créditos. ¿Continuar? Yes
Searching Samsung modem... detected COM18
Reading phone info... OK
Model: SM-A136U
AP version: A136USQS9DXE4
CSC version: A136UOYN9DXE4
CP version: A136USQS9DXE4
OS version: 13
Product code: GCF
Carrier ID: XAA
Phone SN: R5CTA1KQDDX
Unique number: CDC0065B2DC6379
IMEI: 351082126060915
IMEI Certi: PASS
Powering off... OK
Connect phone in BROM Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM7 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0989
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6833]
LibUSB installed
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Release testpoint, waiting 2 seconds
Advanced Bypass Security... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM7 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0989
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6833]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x511CA886, 0x4C32683C, 0xAF2F9450, 0xCAA9B885
Get Chip ID... [MT6833]
Get SOC ID... [06DEF9FB7392021D700E0C73556AC8395FA1BCE4F17D5CBBB24CAE4E61BFD3BF]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [14]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x150100444336444D420065B2DC63794D
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_CNAME: DC6DMB
EMMC_ID : 0x150100444336444D420065B2DC63794D
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0001000000 (16.00Mb)
EMMC_USER : 0x0E8F800000 (58.24Gb)
RAM INFO:
INT_SRAM: 0x0000070000 (448.00Kb)
EXT_RAM : 0x0100000000 (4.00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... [EXT4] ... OK
Product Brand : samsung
Product Manufacturer : samsung
Product Model : SM-A136U
Product Name : a13xsq
Product Device : a13x
Product Board : a13x
Board Platform : mt6833
Build ID : SP1A.210812.016
Build Date : Tue May 14 19:39:09 KST 2024
Display ID : TP1A.220624.014.A136USQS9DXE4
Security Patch : 2024-05-01
Version SDK : 33
Version Release : 13
Version Codename : REL
Firmware Version : A136USQS9DXE4
Userdata FS Type : F2FS
Read security partition from phone... OK
Read security files... OK
Calculating... OK
Read lock info... OK
Searching server... OK
Waiting for server answer... OK
Unlocking ... [1] ... OK
Write lock info... OK
Write security partition to phone... OK
Network Unlock done!


Go to the top of the page
 
+Quote Post
gsm2200
mensaje Aug 30 2024, 10:02 PM
Publicado: #103

Miembro del Clan
*

Grupo: Miembros
Mensajes: 71
Agradecimientos: 137
Registrado: 29-November 17
Miembro No.: 1,006,352
Pais:ad


CITA(ramon_elburro @ Aug 28 2024, 06:37 PM) *
PANDORA CON 5 CREDITOS
Selected model: Samsung SM-A136U (Samsung Galaxy A13 5G)
Operation: Unlock network (Server)
Software version: 7.1
Work ID: 40371879

Checking Login and Password... OK
Balance: 7 crd.
Le quedan 7 crédito(s). Esta operación consume 5 créditos. ¿Continuar? Yes
Searching Samsung modem... detected COM18
Reading phone info... OK
Model: SM-A136U
AP version: A136USQS9DXE4
CSC version: A136UOYN9DXE4
CP version: A136USQS9DXE4
OS version: 13
Product code: GCF
Carrier ID: XAA
Phone SN: R5CTA1KQDDX
Unique number: CDC0065B2DC6379
IMEI: 351082126060915
IMEI Certi: PASS
Powering off... OK
Connect phone in BROM Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM7 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0989
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6833]
LibUSB installed
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Release testpoint, waiting 2 seconds
Advanced Bypass Security... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM7 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0989
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6833]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x511CA886, 0x4C32683C, 0xAF2F9450, 0xCAA9B885
Get Chip ID... [MT6833]
Get SOC ID... [06DEF9FB7392021D700E0C73556AC8395FA1BCE4F17D5CBBB24CAE4E61BFD3BF]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [14]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x150100444336444D420065B2DC63794D
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_CNAME: DC6DMB
EMMC_ID : 0x150100444336444D420065B2DC63794D
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0001000000 (16.00Mb)
EMMC_USER : 0x0E8F800000 (58.24Gb)
RAM INFO:
INT_SRAM: 0x0000070000 (448.00Kb)
EXT_RAM : 0x0100000000 (4.00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... [EXT4] ... OK
Product Brand : samsung
Product Manufacturer : samsung
Product Model : SM-A136U
Product Name : a13xsq
Product Device : a13x
Product Board : a13x
Board Platform : mt6833
Build ID : SP1A.210812.016
Build Date : Tue May 14 19:39:09 KST 2024
Display ID : TP1A.220624.014.A136USQS9DXE4
Security Patch : 2024-05-01
Version SDK : 33
Version Release : 13
Version Codename : REL
Firmware Version : A136USQS9DXE4
Userdata FS Type : F2FS
Read security partition from phone... OK
Read security files... OK
Calculating... OK
Read lock info... OK
Searching server... OK
Waiting for server answer... OK
Unlocking ... [1] ... OK
Write lock info... OK
Write security partition to phone... OK
Network Unlock done!


Saludos colega, hice ese procediento pero el equipo no entra en MODO BROM, cual es la forma


--------------------
Octopus LG GcProkey z3x Samsung Xtc2Clip OctopusFRP Dongle SigmaKey Medusa Pro Xtc2 POWER adactor
Go to the top of the page
 
+Quote Post

6 Páginas: V  « < 4 5 6
Reply to this topicStart new topic
10 usuario(s) está(n) leyendo este tema (10 invitado(s) y 0 usuario(s) anónimo(s))
0 usuarios(s) registrado(s):

 



Ver Visitas Fecha y Hora actual: 9th November 2024 - 11:52 AM
►Reglamento      ►Política de Privacidad
Este sitio web usa cookies, puedes ver la política de cookies, aquí -
Política de cookies +