What's new
PinoyTechnician

This is a sample guest message. Register a free account today to become a member! Once signed in, you'll be able to participate on this site by adding your own topics and posts, as well as connect with other members through your own private inbox!

Oppo a33fw remove pattern without deleting files done via cm2 qlm module

tarrfulanno

FREE Access
Joined
Jun 2, 2017
Messages
370
Reaction score
78
Points
31
Location
Iloilo
Infinity-Box Chinese Miracle Qualcomm Module [QLM] v 1.16
e​

Operation : Identify [ v1.16 ]

1. Power Off Phone , Remove battery , Insert back
2. PRESS and HOLD BOTH VOLUME KEYS!
3. Insert USB cable. In some cases require use EDL cable or TP to force EDL mode!

Wait for phone...
Device Found!
Initialize ...
Handshake passed!
ID_BLOCK_I : SnapDragon 410 [MSM8916]
ID_BLOCK_S : 20BB9DD0
ID_BLOCK_L : D52F45B11C8AB7B26DC23213DCA72F1F
ID_BLOCK_L : 96ED53FAFF66C85D70BF10C9DB2AC407
Use CM2 Internal Loader
Loader Sent! Initializing ...
Running FireHose on BBID : MSM8916 , FLASH : eMMC , mVER : 1
MemInfo : 0x0003 / 0x0200 / 0x00000003A3E00000 [ eMMC 16 GiB ]
ExtInfo : 0x00004000/00004000/00001000/00001000/00000200
Boot Ok!


Brand : OPPO
ProdName : A33f
ProdModel : A33f
Device : A33f
AndroidVer: 5.1.1
SWVersion : A33fEX_11.A.19_INT_019_201609261248
Manufact. : OPPO
SysPatch : LMY47V
DevComTime: 9/26/2016 7:14:09 AM
QLMxCPU : MSM8916

USERData : NORMAL
GCSec : EMPTY

Done!
Elapsed: 00:00:21

Reconnect Power/Cable!

Operation : Read PatternLock [ v1.16 ]

1. Power Off Phone , Remove battery , Insert back
2. PRESS and HOLD BOTH VOLUME KEYS!
3. Insert USB cable. In some cases require use EDL cable or TP to force EDL mode!

Wait for phone...
Device Found!
Initialize ...
Handshake passed!
ID_BLOCK_I : SnapDragon 410 [MSM8916]
ID_BLOCK_S : 20BB9DD0
ID_BLOCK_L : D52F45B11C8AB7B26DC23213DCA72F1F
ID_BLOCK_L : 96ED53FAFF66C85D70BF10C9DB2AC407
Use CM2 Internal Loader
Loader Sent! Initializing ...
Running FireHose on BBID : MSM8916 , FLASH : eMMC , mVER : 1
MemInfo : 0x0003 / 0x0200 / 0x00000003A3E00000 [ eMMC 16 GiB ]
ExtInfo : 0x00004000/00004000/00001000/00001000/00000200
Boot Ok!

Read Ok! Trying decrypt ...
PatternLock sequence : 48523

Done!
Elapsed: 00:00:30

Reconnect Power/Cable!
 
Back
Top