- Mar 16, 2017
- 2,151
- 7,272
- Skype
- GSMKINGMAKER
- Sonork ID
- 9655528882
OPPO K10 5G ( CPH2337 ) PATTERN Lock Removed Done !
BY
MRST Dongle
.
PATTERN Lock Removed Done
.
.
.
BY
MRST Dongle
.
PATTERN Lock Removed Done
.
.
.
>>> Connecting Mobile Com Port...
Get Mobile Port: COM22
>>> Driver Identifying name:
MediaTek PreLoader USB VCOM_V2023 (Android)
>>> Mobile Connection is Normal...
CPU_NAME: MT6833
>>> Reading Mobile Hardware info...Success
HW_Inf: 8A00 SW_Inf: CA00
>>>>> downloading boot1 to device...
>>> Triggering Mobile Phone...
Success
>>>>> Selected Oppo 2023 Preloader exploit V1 ....
>>>>> Device Boot1_Size: 0x000528B8
>>>>> Calling Magic Key ,,,,,,
>>>>> Device meid:
00000000000000000000000000000000
>>>> Downloading boot2 to Device...
>>>> Bypassing Preloader ...
>>>>> Device Boot1_Add: 0x0023B568
>>>>> Downloading 0x000641FC
get the cloud has news,downloading...
loading file : userdata.img
>>>>>>>Flash Type(UFS)<<<<<<<<
Flash Size: 0x0000001DCB000000 -> 122032M
Flash ID: Flash Code: MT128GASAO4U21
>>> Transferring high speed re/wr port .....
>>> Connecting Mobile Com Port...
Get Mobile Port: COM19
>>> Driver Identifying name:
MediaTek DA USB VCOM (Android)
Get Com Port is: COM19
>>> Driver name:
MediaTek DA USB VCOM (Android)
>>> Reading Mobile GPT data...Success
>>>>Erasing Devices data...
Start Add : 0x341800000 Size : 0x1A887F8000
>>>>Erasing userdata...
Start Add : 0x0341800000 Length: 0x1A887F8000
>>>>Task Finished<<<<
>>>>Report Us Logs Click Log Send<<<<
>>>>Join us Telegram Group<<<<
MRST SUPPORT
.