-->

We are support for all mobile flashing Box And Dongle Software


Sep 27, 2017

OPPO A37F read pettern code Solution Via CM2 Dongle


OPPO A37F read pettern code by Solution Via CM2 Dongle

OPPO A37F read pettern code success Card found : D912215B , v0134

Infinity-Box Chinese Miracle Qualcomm Module [QLM] v 1.08


Operation : Identify [ v1.08 ]

1. Power Off Phone , Remove battery , Insert back
2. PRESS and HOLD BOTH VOLUME KEYS!
3. Insert USB cable. In some cases require use EDL cable or TP to force EDL mode!

Wait for phone...

Device not found!
Check cable, connection and drivers!

Reconnect Power/Cable!

Operation : Identify [ v1.08 ]

1. Power Off Phone , Remove battery , Insert back
2. PRESS and HOLD BOTH VOLUME KEYS!
3. Insert USB cable. In some cases require use EDL cable or TP to force EDL mode!

Wait for phone...

Device not found!
Check cable, connection and drivers!

Reconnect Power/Cable!

Operation : Identify [ v1.08 ]

1. Power Off Phone , Remove battery , Insert back
2. PRESS and HOLD BOTH VOLUME KEYS!
3. Insert USB cable. In some cases require use EDL cable or TP to force EDL mode!

Wait for phone...
Device Found!
Initialize ...
Handshake passed!
BB_IDC_CPU : SnapDragon 410 [MSM8916]
ID_BLOCK_S : 1B39ADA7
ID_BLOCK_I : 007050E1
ID_BLOCK_L : 3CC4BE58F763689B4439DBC4035ED6F6
ID_BLOCK_L : 10632D7C71E04ADBFE39924B59544289
Use CM2 Internal Loader
Loader Sent! Initializing ...
Running FireHose on BBID : MSM8916 , FLASH : eMMC , mVER : 1
MemInfo : 0x0003 / 0x0200 / 0x00000003A3E00000 [ eMMC 16 GiB ]
ExtInfo : 0x00004000/00004000/00001000/00001000
Boot Ok!


Brand : OPPO
ProdName : A37f
ProdModel : A37f
AndroidVer: 5.1.1
Manufact. : OPPO
QLMxCPU : MSM8916

Done!
Elapsed: 00:00:37

Reconnect Power/Cable!

Operation : Read PatternLock [ v1.08 ]

1. Power Off Phone , Remove battery , Insert back
2. PRESS and HOLD BOTH VOLUME KEYS!
3. Insert USB cable. In some cases require use EDL cable or TP to force EDL mode!

Wait for phone...
Device Found!
Initialize ...
Handshake passed!
BB_IDC_CPU : SnapDragon 410 [MSM8916]
ID_BLOCK_S : 1B39ADA7
ID_BLOCK_I : 007050E1
ID_BLOCK_L : 3CC4BE58F763689B4439DBC4035ED6F6
ID_BLOCK_L : 10632D7C71E04ADBFE39924B59544289
Use CM2 Internal Loader
Loader Sent! Initializing ...
Running FireHose on BBID : MSM8916 , FLASH : eMMC , mVER : 1
MemInfo : 0x0003 / 0x0200 / 0x00000003A3E00000 [ eMMC 16 GiB ]
ExtInfo : 0x00004000/00004000/00001000/00001000
Boot Ok!

Read Ok! Trying decrypt ...
PatternLock sequence : 247896531

Done!
Elapsed: 00:00:19

Reconnect Power/Cable!

Whatsapp Group Play Store App

0 comments:

Post a Comment

Search This Blog

Popular Posts

Translate