tarrfulanno
FREE Access
Infinity-Box Chinese Miracle Qualcomm Module [QLM] v 1.16
Operation : Identify [ v1.16 ]
1. Power Off Phone , Remove battery , Insert back
2. PRESS and HOLD BOTH VOLUME KEYS!
3. Insert USB cable. In some cases require use EDL cable or TP to force EDL mode!
Wait for phone...
Device Found!
Initialize ...
Handshake passed!
ID_BLOCK_I : SnapDragon 410 [MSM8916]
ID_BLOCK_S : 20BB9DD0
ID_BLOCK_L : D52F45B11C8AB7B26DC23213DCA72F1F
ID_BLOCK_L : 96ED53FAFF66C85D70BF10C9DB2AC407
Use CM2 Internal Loader
Loader Sent! Initializing ...
Running FireHose on BBID : MSM8916 , FLASH : eMMC , mVER : 1
MemInfo : 0x0003 / 0x0200 / 0x00000003A3E00000 [ eMMC 16 GiB ]
ExtInfo : 0x00004000/00004000/00001000/00001000/00000200
Boot Ok!
Brand : OPPO
ProdName : A33f
ProdModel : A33f
Device : A33f
AndroidVer: 5.1.1
SWVersion : A33fEX_11.A.19_INT_019_201609261248
Manufact. : OPPO
SysPatch : LMY47V
DevComTime: 9/26/2016 7:14:09 AM
QLMxCPU : MSM8916
USERData : NORMAL
GCSec : EMPTY
Done!
Elapsed: 00:00:21
Reconnect Power/Cable!
Operation : Read PatternLock [ v1.16 ]
1. Power Off Phone , Remove battery , Insert back
2. PRESS and HOLD BOTH VOLUME KEYS!
3. Insert USB cable. In some cases require use EDL cable or TP to force EDL mode!
Wait for phone...
Device Found!
Initialize ...
Handshake passed!
ID_BLOCK_I : SnapDragon 410 [MSM8916]
ID_BLOCK_S : 20BB9DD0
ID_BLOCK_L : D52F45B11C8AB7B26DC23213DCA72F1F
ID_BLOCK_L : 96ED53FAFF66C85D70BF10C9DB2AC407
Use CM2 Internal Loader
Loader Sent! Initializing ...
Running FireHose on BBID : MSM8916 , FLASH : eMMC , mVER : 1
MemInfo : 0x0003 / 0x0200 / 0x00000003A3E00000 [ eMMC 16 GiB ]
ExtInfo : 0x00004000/00004000/00001000/00001000/00000200
Boot Ok!
Read Ok! Trying decrypt ...
PatternLock sequence : 48523
Done!
Elapsed: 00:00:30
Reconnect Power/Cable!
e
Operation : Identify [ v1.16 ]
1. Power Off Phone , Remove battery , Insert back
2. PRESS and HOLD BOTH VOLUME KEYS!
3. Insert USB cable. In some cases require use EDL cable or TP to force EDL mode!
Wait for phone...
Device Found!
Initialize ...
Handshake passed!
ID_BLOCK_I : SnapDragon 410 [MSM8916]
ID_BLOCK_S : 20BB9DD0
ID_BLOCK_L : D52F45B11C8AB7B26DC23213DCA72F1F
ID_BLOCK_L : 96ED53FAFF66C85D70BF10C9DB2AC407
Use CM2 Internal Loader
Loader Sent! Initializing ...
Running FireHose on BBID : MSM8916 , FLASH : eMMC , mVER : 1
MemInfo : 0x0003 / 0x0200 / 0x00000003A3E00000 [ eMMC 16 GiB ]
ExtInfo : 0x00004000/00004000/00001000/00001000/00000200
Boot Ok!
Brand : OPPO
ProdName : A33f
ProdModel : A33f
Device : A33f
AndroidVer: 5.1.1
SWVersion : A33fEX_11.A.19_INT_019_201609261248
Manufact. : OPPO
SysPatch : LMY47V
DevComTime: 9/26/2016 7:14:09 AM
QLMxCPU : MSM8916
USERData : NORMAL
GCSec : EMPTY
Done!
Elapsed: 00:00:21
Reconnect Power/Cable!
Operation : Read PatternLock [ v1.16 ]
1. Power Off Phone , Remove battery , Insert back
2. PRESS and HOLD BOTH VOLUME KEYS!
3. Insert USB cable. In some cases require use EDL cable or TP to force EDL mode!
Wait for phone...
Device Found!
Initialize ...
Handshake passed!
ID_BLOCK_I : SnapDragon 410 [MSM8916]
ID_BLOCK_S : 20BB9DD0
ID_BLOCK_L : D52F45B11C8AB7B26DC23213DCA72F1F
ID_BLOCK_L : 96ED53FAFF66C85D70BF10C9DB2AC407
Use CM2 Internal Loader
Loader Sent! Initializing ...
Running FireHose on BBID : MSM8916 , FLASH : eMMC , mVER : 1
MemInfo : 0x0003 / 0x0200 / 0x00000003A3E00000 [ eMMC 16 GiB ]
ExtInfo : 0x00004000/00004000/00001000/00001000/00000200
Boot Ok!
Read Ok! Trying decrypt ...
PatternLock sequence : 48523
Done!
Elapsed: 00:00:30
Reconnect Power/Cable!