GSM SHIELD BOX Successful operations (Logs & Videos)

The Shield Of GSM Is here,Oneplus 6T Frp reset Done By Great GSMshieldBox


ceSmqHE.png



Code:
Process : Format / FRP
Looking for Device Connected in EDL Mode...No Device Found
Use Volume Key/EDL Cable or TP for EDL Mode.
Port : Qualcomm HS-USB QDLoader 9008 (COM13)
Connecting to Device on COM13....OK
Getting Hardware Details...OK
Hw_ID : E1B008009B455100 [SD845]
Hash_H : DD7C5F2E53176BEE91747B53900CCEC3
Hash_L : 3DD30FA4DED0DFE9BAF9156E6910862F
Switching to Firehose...OK
Loading Programmer...OK
Sending Programmer [cHJvZ19maXJlaG9zZV9kZHIuZWxm].....OK
Memory Type : UFS
Payload Data Request...
Target : SD845
Memory : UFS
Size : 256 GB
PH_Part : 6 [0x03AD2000] [0x00000400] [0x00000400] [0x00002000] [0x000C0000] [0x00002000]
Payload Data : From_Target: 65536 [65536], To_Target: 1048576
Sector Size : 4096
Reading Partition Info...OK
Reading Device Information...OK
Brand : OnePlus
Device : OnePlus6T
CPU Abi : arm64-v8a,armeabi-v7a,armeabi
Build Date : Thu Aug 1 20:11:35 CST 2019
Android Ver. : 9
Security Patch : 2019-08-01
Process Finished
GSMShield Qualcomm 1.0
Feel The Power Of GsmShieldBox

Regards
 
Xiaomi Redmi 5A Write Firmware Done By Great GSMShieldBox.

3OryUCc.png


Code:
Process : Flash
Looking for Device Connected in EDL Mode...No Device Found
Use Volume Key/EDL Cable or TP for EDL Mode.
Port : Qualcomm HS-USB QDLoader 9008 (COM13)
Connecting to Device on COM13....OK
Getting Hardware Details...OK
Hw_ID : E160050000000000 [8917]
Hash_H : 57158EAF1814D78FD2B3105ECE4DB18A
Hash_L : 817A08AC664A5782A925F3FF8403D39A
Switching to Firehose...OK
Selecting Internal Programmer...Match [1] Found
Loading Programmer...OK
Sending Programmer [ODkxNy5lbGZ=].....OK
Initializing Storage...OK
Target : 8917
Memory : eMMC
Size : 16 GB
PH_Part : 1 [0x01D1F000]
Payload Data : From_Target: 65536 [4096], To_Target: 1048576
Sector Size : 512
Programming [0][modem], Image [NON-HLOS.bin]...OK
Programming [0][sbl1], Image [sbl1.mbn]...OK
Programming [0][sbl1bak], Image [sbl1.mbn]...OK
Programming [0][rpm], Image [rpm.mbn]...OK
Programming [0][rpmbak], Image [rpm.mbn]...OK
Programming [0][tz], Image [tz.mbn]...OK
Programming [0][tzbak], Image [tz.mbn]...OK
Programming [0][devcfg], Image [devcfg.mbn]...OK
Programming [0][devcfgbak], Image [devcfg.mbn]...OK
Programming [0][dsp], Image [adspso.bin]...OK
Programming [0][splash], Image [splash.img]...OK
Programming [0][aboot], Image [emmc_appsboot.mbn]...OK
Programming [0][abootbak], Image [emmc_appsboot.mbn]...OK
Programming [0][boot], Image [boot.img]...OK
Programming [0][recovery], Image [recovery.img]...OK
Programming [0][system], Image [system.img]...OK
Programming [0][cache], Image [cache.img]...OK
Programming [0][persist], Image [persist.img]...OK
Programming [0][lksecapp], Image [lksecapp.mbn]...OK
Programming [0][lksecappbak], Image [lksecapp.mbn]...OK
Programming [0][cmnlib], Image [cmnlib.mbn]...OK
Programming [0][cmnlibbak], Image [cmnlib.mbn]...OK
Programming [0][cmnlib64], Image [cmnlib64.mbn]...OK
Programming [0][cmnlib64bak], Image [cmnlib64.mbn]...OK
Programming [0][keymaster], Image [keymaster.mbn]...OK
Programming [0][keymasterbak], Image [keymaster.mbn]...OK
Programming [0][cust], Image [cust.img]...OK
Programming [0][userdata], Image [userdata.img]...OK
Programming [0][PrimaryGPT], Image [gpt_main0.bin]...OK
Programming [0][BackupGPT], Image [gpt_backup0.bin]...OK
Patching [disk0]................OK
Rebooting Device...OK
Process Finished
GSMShield Qualcomm 1.0
The Shield Of GSM Is Here.

Regards
 
Samsung Galaxy A2 Core SM-A260G Write Firmware Done By great GSMShieldBox.


IV7LV5e.png



The Shield Of GSM is Here

Regards.
 
Xiaomi Mi A1 Write Firmware Done By Great GsmShieldBox.


waWXZnB.png


Code:
Process : Flash
Looking for Device Connected in EDL Mode...No Device Found
Use Volume Key/EDL Cable or TP for EDL Mode.
Port : Qualcomm HS-USB QDLoader 9008 (COM13)
Connecting to Device on COM13....OK
Getting Hardware Details...OK
Hw_ID : E160040000000000 [8953]
Hash_H : 57158EAF1814D78FD2B3105ECE4DB18A
Hash_L : 817A08AC664A5782A925F3FF8403D39A
Switching to Firehose...OK
Selecting Internal Programmer...Match [1] Found
Loading Programmer...OK
Sending Programmer [ODk1My5lbGZ=].....OK
Initializing Storage...OK
Target : 8953
Memory : eMMC
Size : 64 GB
PH_Part : 1 [0x0747C000]
Payload Data : From_Target: 65536 [4096], To_Target: 1048576
Sector Size : 512
Programming [0][modem_a], Image [modem.img]...OK
Programming [0][modem_b], Image [modem.img]...OK
Programming [0][sbl1], Image [sbl1.img]...OK
Programming [0][sbl1bak], Image [sbl1.img]...OK
Programming [0][rpm], Image [rpm.img]...OK
Programming [0][rpmbak], Image [rpm.img]...OK
Programming [0][tz], Image [tz.img]...OK
Programming [0][tzbak], Image [tz.img]...OK
Programming [0][devcfg], Image [devcfg.img]...OK
Programming [0][devcfgbak], Image [devcfg.img]...OK
Programming [0][dsp], Image [adspso.bin]...OK
Programming [0][DDR], Image [zeros_1sector.bin]...OK
Programming [0][fsg], Image [fs_image.tar.gz.mbn.img]...OK
Programming [0][sec], Image [sec.dat]...OK
Programming [0][splash], Image [splash.img]...OK
Programming [0][aboot], Image [emmc_appsboot.mbn]...OK
Programming [0][abootbak], Image [emmc_appsboot.mbn]...OK
Programming [0][boot_a], Image [boot.img]...OK
Programming [0][boot_b], Image [boot.img]...OK
Programming [0][system_a], Image [system.img]...OK
Programming [0][system_b], Image [system.img]...OK
Programming [0][persist], Image [persist.img]...OK
Programming [0][misc], Image [misc.img]...OK
Programming [0][config], Image [zeros_1sector.bin]...OK
Programming [0][lksecapp], Image [lksecapp.img]...OK
Programming [0][lksecappbak], Image [lksecapp.img]...OK
Programming [0][cmnlib], Image [cmnlib.img]...OK
Programming [0][cmnlibbak], Image [cmnlib.img]...OK
Programming [0][cmnlib64], Image [cmnlib64.img]...OK
Programming [0][cmnlib64bak], Image [cmnlib64.img]...OK
Programming [0][keymaster], Image [keymaster.img]...OK
Programming [0][keymasterbak], Image [keymaster.img]...OK
Programming [0][userdata], Image [userdata.img]...OK
Programming [0][PrimaryGPT], Image [gpt_main0.bin]...OK
Programming [0][BackupGPT], Image [gpt_backup0.bin]...OK
Patching [disk0]................OK
Rebooting Device...OK
Process Finished
GSMShield Qualcomm 1.0
The Shield Of GSM is Here

Regards
 
Xiaomi Redmi 5(ROSY)Safe Format+Frp Done By Great GSMShieldBox.

Very Safe Format,no hang on logo,no storage corruption after format

1lZxNjz.png


Code:
Process : Format / FRP
Looking for Device Connected in EDL Mode...No Device Found
Use Volume Key/EDL Cable or TP for EDL Mode.
Port : Qualcomm HS-USB QDLoader 9008 (COM13)
Connecting to Device on COM13....OK
Getting Hardware Details...OK
Hw_ID : E1A0090000000000 [8953]
Hash_H : 57158EAF1814D78FD2B3105ECE4DB18A
Hash_L : 817A08AC664A5782A925F3FF8403D39A
Switching to Firehose...OK
Selecting Internal Programmer...Match [1] Found
Loading Programmer...OK
Sending Programmer [ODk1M18wMDkuZWxm].....OK
Initializing Storage...OK
Target : 8953
Memory : eMMC
Size : 64 GB
PH_Part : 1 [0x0747C000]
Payload Data : From_Target: 65536 [4096], To_Target: 1048576
Sector Size : 512
Reading Partition Info...OK
Reading Device Information...OK
Brand : Xiaomi
Model : Redmi 5
Device : rosy
Board : msm8953
CPU Abi : arm64-v8a,armeabi-v7a,armeabi
Software Ver. : Android_7.1_8
Build Date : Tue Nov 6 20:22:29 WIB 2018
Android Ver. : 7.1.2
Security Patch : 2018-07-01
FRP PST : /dev/block/bootdevice/by-name/config
Safe Format Userdata...OK
Process Finished
GSMShield Qualcomm 1.0
The Shield Of GSM is Here

Regards
 
Xiaomi Redmi s2/y2 FRP Reset Done By GSMShieldBox

JuD8MTx.png


Code:
Process : Format / FRP
Looking for Device Connected in EDL Mode...No Device Found
Use Volume Key/EDL Cable or TP for EDL Mode.
Port : Qualcomm HS-USB QDLoader 9008 (COM13)
Connecting to Device on COM13....OK
Getting Hardware Details...OK
Hw_ID : E160040000000000 [8953]
Hash_H : 57158EAF1814D78FD2B3105ECE4DB18A
Hash_L : 817A08AC664A5782A925F3FF8403D39A
Switching to Firehose...OK
Selecting Internal Programmer...Match [1] Found
Loading Programmer...OK
Sending Programmer [ODk1My5lbGZ=].....OK
Initializing Storage...OK
Target : 8953
Memory : eMMC
Size : 32 GB
PH_Part : 1 [0x03A3E000]
Payload Data : From_Target: 65536 [4096], To_Target: 1048576
Sector Size : 512
Reading Partition Info...OK
Reading Device Information...OK
Brand : xiaomi
Model : Redmi S2
Device : ysl
CPU Abi : armeabi-v7a,armeabi
Software Ver. : Android8.1.0_10
Build Date : Thu Apr 25 14:02:51 WIB 2019
Android Ver. : 8.1.0
Security Patch : 2019-04-01
Process Finished
GSMShield Qualcomm 1.0
The Shield Of GSM is Here
biggrin.gif


Regards
 
Back
Top