Ayuda A136u Unlock? (solucionado) |
Bienvenido, invitado ( Identificarse | Registrarse )
Ayuda A136u Unlock? (solucionado) |
Jun 25 2024, 12:11 PM
Publicado:
#101
|
|
Miembro del Clan Grupo: Miembros Mensajes: 3 Agradecimientos: 0 Registrado: 7-February 24 Miembro No.: 1,271,286 Pais: |
|
|
|
Anunciante Autorizado |
Jun 25 2024, 12:11 PM
Publicado:
#
|
Estas ofertas pudieran interesarte. |
|
|
|
Aug 28 2024, 05:37 PM
Publicado:
#102
|
|
Miembro del Clan Grupo: Miembros Mensajes: 9 Agradecimientos: 21 Registrado: 23-November 15 Miembro No.: 773,641 Pais: |
PANDORA CON 5 CREDITOS
Selected model: Samsung SM-A136U (Samsung Galaxy A13 5G) Operation: Unlock network (Server) Software version: 7.1 Work ID: 40371879 Checking Login and Password... OK Balance: 7 crd. Le quedan 7 crédito(s). Esta operación consume 5 créditos. ¿Continuar? Yes Searching Samsung modem... detected COM18 Reading phone info... OK Model: SM-A136U AP version: A136USQS9DXE4 CSC version: A136UOYN9DXE4 CP version: A136USQS9DXE4 OS version: 13 Product code: GCF Carrier ID: XAA Phone SN: R5CTA1KQDDX Unique number: CDC0065B2DC6379 IMEI: 351082126060915 IMEI Certi: PASS Powering off... OK Connect phone in BROM Mode Waiting for device... OK Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0] Device found at COM7 [BROM] Open port... OK Send start cmd... OK Get HW code from device... 0989 Get sec config... OK [000000E5] Active sec flags: [SBC DAA] Get HW & SW version from device... OK HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6833] LibUSB installed Library Version [2] Select platform... OK Init BROM... OK Force Charge... OK Disable WatchDog Timer... OK Release testpoint, waiting 2 seconds Advanced Bypass Security... OK Waiting for device... OK Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0] Device found at COM7 [BROM] Open port... OK Send start cmd... OK Get HW code from device... 0989 Get sec config... OK [000000E0] Active sec flags: [] Get HW & SW version from device... OK HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6833] Library Version [2] Select platform... OK Init BROM... OK Force Charge... OK Disable WatchDog Timer... OK Reopen port for libver2... OK Get ME ID... OK ME_ID = 0x511CA886, 0x4C32683C, 0xAF2F9450, 0xCAA9B885 Get Chip ID... [MT6833] Get SOC ID... [06DEF9FB7392021D700E0C73556AC8395FA1BCE4F17D5CBBB24CAE4E61BFD3BF] Get sec config... OK [000000E0] Load DownloadAgent... OK Search DA... OK [14] Send preloader... OK Start preloader... OK Checking preloader answer... OK Send bootloader... OK Start bootloader... OK Wait for answer from bootloader... OK Send SYNC signal... OK Setup device enviroment... OK Setup device parametres... OK Receive DA SYNC signal... OK Set DA parametres... OK Get device connection agent... [BROM] Get device info... OK EMMC_ID: 0x150100444336444D420065B2DC63794D Load EMI from phone... OK Parse EMI config... OK Init EXT RAM... OK Send 2nd DA... OK Get device info... OK EMMC INFO: EMMC_CNAME: DC6DMB EMMC_ID : 0x150100444336444D420065B2DC63794D EMMC_BOOT1: 0x0000400000 (4.00Mb) EMMC_BOOT2: 0x0000400000 (4.00Mb) EMMC_RPMB : 0x0001000000 (16.00Mb) EMMC_USER : 0x0E8F800000 (58.24Gb) RAM INFO: INT_SRAM: 0x0000070000 (448.00Kb) EXT_RAM : 0x0100000000 (4.00Gb) Checking USB status... USB_HIGH_SPEED Read partitions info from phone... OK Checking A/B state... OK Read product info... [EXT4] ... OK Product Brand : samsung Product Manufacturer : samsung Product Model : SM-A136U Product Name : a13xsq Product Device : a13x Product Board : a13x Board Platform : mt6833 Build ID : SP1A.210812.016 Build Date : Tue May 14 19:39:09 KST 2024 Display ID : TP1A.220624.014.A136USQS9DXE4 Security Patch : 2024-05-01 Version SDK : 33 Version Release : 13 Version Codename : REL Firmware Version : A136USQS9DXE4 Userdata FS Type : F2FS Read security partition from phone... OK Read security files... OK Calculating... OK Read lock info... OK Searching server... OK Waiting for server answer... OK Unlocking ... [1] ... OK Write lock info... OK Write security partition to phone... OK Network Unlock done! |
|
|
Aug 30 2024, 10:02 PM
Publicado:
#103
|
|
Miembro del Clan Grupo: Miembros Mensajes: 71 Agradecimientos: 137 Registrado: 29-November 17 Miembro No.: 1,006,352 Pais: |
PANDORA CON 5 CREDITOS Selected model: Samsung SM-A136U (Samsung Galaxy A13 5G) Operation: Unlock network (Server) Software version: 7.1 Work ID: 40371879 Checking Login and Password... OK Balance: 7 crd. Le quedan 7 crédito(s). Esta operación consume 5 créditos. ¿Continuar? Yes Searching Samsung modem... detected COM18 Reading phone info... OK Model: SM-A136U AP version: A136USQS9DXE4 CSC version: A136UOYN9DXE4 CP version: A136USQS9DXE4 OS version: 13 Product code: GCF Carrier ID: XAA Phone SN: R5CTA1KQDDX Unique number: CDC0065B2DC6379 IMEI: 351082126060915 IMEI Certi: PASS Powering off... OK Connect phone in BROM Mode Waiting for device... OK Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0] Device found at COM7 [BROM] Open port... OK Send start cmd... OK Get HW code from device... 0989 Get sec config... OK [000000E5] Active sec flags: [SBC DAA] Get HW & SW version from device... OK HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6833] LibUSB installed Library Version [2] Select platform... OK Init BROM... OK Force Charge... OK Disable WatchDog Timer... OK Release testpoint, waiting 2 seconds Advanced Bypass Security... OK Waiting for device... OK Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0] Device found at COM7 [BROM] Open port... OK Send start cmd... OK Get HW code from device... 0989 Get sec config... OK [000000E0] Active sec flags: [] Get HW & SW version from device... OK HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6833] Library Version [2] Select platform... OK Init BROM... OK Force Charge... OK Disable WatchDog Timer... OK Reopen port for libver2... OK Get ME ID... OK ME_ID = 0x511CA886, 0x4C32683C, 0xAF2F9450, 0xCAA9B885 Get Chip ID... [MT6833] Get SOC ID... [06DEF9FB7392021D700E0C73556AC8395FA1BCE4F17D5CBBB24CAE4E61BFD3BF] Get sec config... OK [000000E0] Load DownloadAgent... OK Search DA... OK [14] Send preloader... OK Start preloader... OK Checking preloader answer... OK Send bootloader... OK Start bootloader... OK Wait for answer from bootloader... OK Send SYNC signal... OK Setup device enviroment... OK Setup device parametres... OK Receive DA SYNC signal... OK Set DA parametres... OK Get device connection agent... [BROM] Get device info... OK EMMC_ID: 0x150100444336444D420065B2DC63794D Load EMI from phone... OK Parse EMI config... OK Init EXT RAM... OK Send 2nd DA... OK Get device info... OK EMMC INFO: EMMC_CNAME: DC6DMB EMMC_ID : 0x150100444336444D420065B2DC63794D EMMC_BOOT1: 0x0000400000 (4.00Mb) EMMC_BOOT2: 0x0000400000 (4.00Mb) EMMC_RPMB : 0x0001000000 (16.00Mb) EMMC_USER : 0x0E8F800000 (58.24Gb) RAM INFO: INT_SRAM: 0x0000070000 (448.00Kb) EXT_RAM : 0x0100000000 (4.00Gb) Checking USB status... USB_HIGH_SPEED Read partitions info from phone... OK Checking A/B state... OK Read product info... [EXT4] ... OK Product Brand : samsung Product Manufacturer : samsung Product Model : SM-A136U Product Name : a13xsq Product Device : a13x Product Board : a13x Board Platform : mt6833 Build ID : SP1A.210812.016 Build Date : Tue May 14 19:39:09 KST 2024 Display ID : TP1A.220624.014.A136USQS9DXE4 Security Patch : 2024-05-01 Version SDK : 33 Version Release : 13 Version Codename : REL Firmware Version : A136USQS9DXE4 Userdata FS Type : F2FS Read security partition from phone... OK Read security files... OK Calculating... OK Read lock info... OK Searching server... OK Waiting for server answer... OK Unlocking ... [1] ... OK Write lock info... OK Write security partition to phone... OK Network Unlock done! Saludos colega, hice ese procediento pero el equipo no entra en MODO BROM, cual es la forma -------------------- Octopus LG GcProkey z3x Samsung Xtc2Clip OctopusFRP Dongle SigmaKey Medusa Pro Xtc2 POWER adactor |
|
|
Ver Visitas | Fecha y Hora actual: 14th November 2024 - 08:52 AM |