Support Models
✓ https://unlocktool.net - Home
✓ https://chuyenmobile.vn - Website order bypass sóng Việt Nam
✓ Vsmart - Factory Reset | Erase Frp One Click | Flash | Read File Backup | Read - Write Vnram via Meta Mode - Erase Vin ID via ADB One Click
✓ Oppo - Factory Reset MTK with Meta Mode 1, 2, 3, 4, 5 New Method , Possible Without Losing Storage Data (photo, music,...) | Remove Demo One Click No Need Flash File | Support Factory Reset All Realme - OPPO Chip MTK
✓ Oppo - Factory Reset Brom mode MTK new security format data safe | Flash frimware | Extract OFP File - Remove Knox | Wipe EFS - Backup/Backup NVRAM
✓ Vivo - Factory Reset | Erase Frp | Remove Demo | Wipe EFS | Factory Via Meta Mode | Safe Format Without Lost Data | Read - Write NVRAM - All One Click
✓ IOS - OFF iCloud With Token 1-Click Iphone 6S/6SP/7G/7P/8G/8P/X Iphone Need Jailbreak - Fake Ios / Restore Active ICCID
✓ IOS - Read Hw Info Address Wifi ,Bluetool With Phone Lost - Info Or Dead Hdd (6G/5SE/6S/6SP/7G/7P/8G/8P/X)

Successfully Nokia 3.1 Plus TA-1118_Android_8.1.0_Firmware_Read_in_Unlocktool_by_Shaiksha85

software9

Member
Member Forums
Credits
$0-USD
Gold
$456-G
Nokia 3.1 Plus TA-1118_Android_8.1.0_Firmware_Read_in_Unlocktool_by_Shaiksha85

Dm-verfication Failed Solved With This File

1118.jpg

Code:
READ BACK Authenticating... OK
Initializing usb... OK
Waiting for device... COM7
Bypassing authentication... OK
Analyzing preloader... preloader_roo.bin [EMI:9] [Internal]
Handshaking... OK
Reading hardware info... OK
  Hardware : MT6765 [Helio G25|G35|P35] 0766 8A00 CA00 0000
  Security Config : SCB SLA DAA
  MEID : 7EE57BCEEE24839E7C6FC3096C3392AE
Sending Download-Agent... OK
Syncing with target... OK
Booting device... OK
Syncing with DA... OK
  Storage : EMMC - CID : 47000115.4D423644.6A520142.51750C07
  Vendor : Samsung - Name : GD6BMB - Serial : 201812562 - Rev : 1
  Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 4 MiB - User Area : 29.12 GiB
Reading partition info... OK [55]
Reading device info... OK
   Model Name : ROO
   Product Name : ROO_00WW_FIH
   Manufacturer : alps
   Android Version : 8.1.0
   Security Patch : 2018-08-05
   Display ID : 00WW_1_24H
Reading preloader [512 KiB] -> preloader.bin... OK
Reading pgpt [32 KiB] -> pgpt.bin... OK
Reading boot_para [1 MiB] -> boot_para.bin... OK
Reading para [512 KiB] -> para.bin... OK
Reading expdb [20 MiB] -> expdb.bin... OK
Reading frp [1 MiB] -> frp.bin... OK
Reading nvcfg [32 MiB] -> nvcfg.img... OK
Reading nvdata [64 MiB] -> nvdata.img... OK
Reading metadata [32 MiB] -> metadata.img... OK
Reading nvram [64 MiB] -> nvram.img... OK
Reading protect1 [8 MiB] -> protect1.img... OK
Reading protect2 [9.47 MiB] -> protect2.img... OK
Reading seccfg [8 MiB] -> seccfg.bin... OK
Reading persist [48 MiB] -> persist.img... OK
Reading sec1 [2 MiB] -> sec1.bin... OK
Reading proinfo [3 MiB] -> proinfo.bin... OK
Reading fdp [16 KiB] -> fdp.img... OK
Reading efuse [512 KiB] -> efuse.img... OK
Reading box [8 MiB] -> box.img... OK
Reading sutinfo [128 KiB] -> sutinfo.img... OK
Reading elabel [16 MiB] -> elabel.img... OK
Reading logdump [16 MiB] -> logdump.img... OK
Reading logo_a [8 MiB] -> logo_a.img... OK
Reading systeminfo_a [1 MiB] -> systeminfo_a.img... OK
Reading hidden_a [32 MiB] -> hidden_a.img... OK
Reading cda_a [9.36 MiB] -> cda_a.img... OK
Reading md1img_a [100 MiB] -> md1img_a.img... OK
Reading spmfw_a [1 MiB] -> spmfw_a.img... OK
Reading scp_a [1 MiB] -> scp_a.img... OK
Reading sspm_a [1 MiB] -> sspm_a.img... OK
Reading gz_a [16 MiB] -> gz_a.img... OK
Reading lk_a [1 MiB] -> lk_a.img... OK
Reading boot_a [32 MiB] -> boot_a.img... OK
Reading odmdtbo_a [16 MiB] -> odmdtbo_a.img... OK
Reading tee_a [8 MiB] -> tee_a.img... OK
Reading vendor_a [800 MiB] -> vendor_a.img... OK
Reading system_a [2.5 GiB] -> system_a.img... OK
Reading vbmeta_a [8 MiB] -> vbmeta_a.img... OK
Reading logo_b [8 MiB] -> logo_b.img... OK
Reading systeminfo_b [1 MiB] -> systeminfo_b.img... OK
Reading hidden_b [32 MiB] -> hidden_b.img... OK
Reading cda_b [15 MiB] -> cda_b.img... OK
Reading md1img_b [100 MiB] -> md1img_b.img... OK
Reading spmfw_b [1 MiB] -> spmfw_b.img... OK
Reading scp_b [1 MiB] -> scp_b.img... OK
Reading sspm_b [1 MiB] -> sspm_b.img... OK
Reading gz_b [16 MiB] -> gz_b.img... OK
Reading lk_b [1 MiB] -> lk_b.img... OK
Reading boot_b [32 MiB] -> boot_b.img... OK
Reading odmdtbo_b [16 MiB] -> odmdtbo_b.img... OK
Reading tee_b [8 MiB] -> tee_b.img... OK
Reading vendor_b [800 MiB] -> vendor_b.img... OK
Reading system_b [2.5 GiB] -> system_b.img... OK
Reading vbmeta_b [8 MiB] -> vbmeta_b.img... OK
Reading userdata [21.71 GiB] -> userdata.img... OK
Reading otp [43 MiB] -> otp.img... OK
Reading flashinfo [16 MiB] -> flashinfo.img... OK

UNLOCKTOOL 2022.03.12.0
Elapsed time : 5 minutes 24 seconds
Nokia 3.1 Plus TA-1118_Android_8.1.0_Firmware_Read_in_Unlocktool_by_Shaiksha85
 

Attachments

https://forum.unlocktool.net/
UnlockTool
Version   : 2023.02.04.0
UnlockTool_2023.02.04.0 Released Update !
Apple
- Hidden icloud can logout and log in to your icloud account supported for ramdisk iphone 6G -> iphone X
- Now added drivers cable magico and anothers change sn
Samsung Mediatek
- Erase frp | factory resset via download mode (force download mode to brom)
- Samsung Galaxy Tab A7 Lite (SM-T225N)
- Samsung Galaxy Tab A7 Lite (SM-T227U)
- Samsung Galaxy A02 (SM-A022F, SM-A022G, SM-A022M)
- Samsung Galaxy A04 (SM-A045F)
- Samsung Galaxy A04e (SM-A042F)
- Samsung Galaxy A12 (SM-A125F, SM-A125M, SM-A125N....)
- Samsung Galaxy A13 (SM-A137F)
- Samsung Galaxy A13 5G (SM-A136B, SM-A136U.....)
- Samsung Galaxy A22 (SM-A225F, SM-A225M, SM-A225N)
- Samsung Galaxy A22 5G (SM-A226B, SM-A226BR, SM-A226L)
- Samsung Galaxy A31 (SM-A315F, SM-A315G, SM-A315N)
- Samsung Galaxy A32 (SM-A325F, SM-A325M, SM-A325N)
- Samsung galaxy A32 5G (SM-A326B, SM-A326BR, SM-A326K....)
- Samsung Galaxy M02 (SM-M022F, SM-M022FV...)
- Samsung Galaxy M22 (SM-M225FV)
- Samsung Galaxy M32 (SM-M325F, SM-M325FV)
Top