Erase FRP Reset FRP HEYOU20PLUS via USB By EDL

.:: Sebti _ Gsm ::.

:: مراقب قسم بوكسات الجيتاق JTAG ::
إنضم
30 ديسمبر 2015
المشاركات
1,758
مستوى التفاعل
3,235
النقاط
113
الإقامة
Ghardaïa
bK7fjsY.png


Reset FRP EssentielB HEYOU 20 PLUS via USB By EDL
Essentielb HeYou 20 PLUS.webp
Qualcomm QM215 Snapdragon 215 (28 nm)
MSM ID : 0x001060E1

باستخدام كابل EDL معدل
1-1729560178.webp


على واجهة الـ Medusa Pro ندرج يدويا اللودر loader _ 0x001060E1.bin
2025-12-31_22-00-15.webp
PHP:
Welcome to Medusa Pro Software version 2.2.5.1.

Activation type:
Used the activation PRO

Started.


Model Settings:
Interface : USB
Loading custom loader C:/Users/Sebti_Gsm/Downloads/loader.bin file...
Core      : Custom Loader
Loader    : loader.bin

Connecting...
Please, connect your phone to PC via EDL Mode.
Cancelled.
Connect unsuccessful.

Model Settings:
Interface : USB
Loading custom loader C:/Users/Sebti_Gsm/Downloads/loader.bin file...
Core      : Custom Loader
Loader    : loader.bin

Connecting...
CpuID     : 0x001060E1
HW_ID     : 0x1060E100420051
CpuHASH   : 0x5F9C14F9A6E480E903466336100DB7AE8EA358263F0D14CEDF468ED43FF9AFAD
Finished calculating
Sending loader...OK.
Loader successfully initialized.

Device       : CoreID_001060E1
Core         : Custom Loader
Page size    : 512 B
Block size   : 512 B
Block count  : 61071360
Size         : 29.12 GB (29820.00 MB)
Connect successful.
---------------------------------------------------------------
SW: 2.2.5.1; FW: .
P00: GPT              (00000000, 00004000)    8 MB
P01: modem            (00004000, 0002C000)    88 MB
P02: traceability     (00030000, 00001000)    2048 KB
P03: study            (00031000, 00001800)    3072 KB
P04: padding0         (00034000, 00001800)    3072 KB
P05: sbl1             (00035800, 00000400)    512 KB
P06: sbl1bak          (00035C00, 00000400)    512 KB
P07: rpm              (00036000, 00000400)    512 KB
P08: rpmbak           (00036400, 00000400)    512 KB
P09: tz               (00036800, 00001000)    2048 KB
P10: tzbak            (00037800, 00001000)    2048 KB
P11: aboot            (00038800, 00000800)    1024 KB
P12: abootbak         (00039000, 00000800)    1024 KB
P13: boot             (00039800, 00010000)    32 MB
P14: bootbak          (00049800, 00010000)    32 MB
P15: DDR              (00059800, 00000040)    32 KB
P16: recovery         (0005C000, 00010000)    32 MB
P17: recoverybak      (0006C000, 00010000)    32 MB
P18: oembin           (0007C000, 00001000)    2048 KB
P19: swversion        (0007D000, 00000800)    1024 KB
P20: padding1         (0007D800, 00001840)    3104 KB
P21: fsg              (0007F040, 00001800)    3072 KB
P22: splash           (00084000, 00002000)    4 MB
P23: simlock          (00086000, 00000800)    1024 KB
P24: sec              (00086800, 00000020)    16 KB
P25: dtbo             (00086820, 00004000)    8 MB
P26: dtbobak          (0008A820, 00004000)    8 MB
P27: vbmeta           (0008E820, 00000080)    64 KB
P28: vbmetabak        (0008E8A0, 00000080)    64 KB
P29: vbmeta_system    (0008E920, 00000080)    64 KB
P30: vbmeta_systembak (0008E9A0, 00000080)    64 KB
P31: devinfo          (0008EA20, 00000800)    1024 KB
P32: limits           (0008F220, 00000040)    32 KB
P33: cmnlib           (0008F260, 00000800)    1024 KB
P34: cmnlibbak        (0008FA60, 00000800)    1024 KB
P35: cmnlib64         (00090260, 00000800)    1024 KB
P36: cmnlib64bak      (00090A60, 00000800)    1024 KB
P37: keymaster        (00091260, 00000800)    1024 KB
P38: keymasterbak     (00091A60, 00000800)    1024 KB
P39: padding2         (00092260, 00000040)    32 KB
P40: smart            (00094000, 00008000)    16 MB
P41: tctpersist       (0009C000, 00004000)    8 MB
P42: devcfg           (000A0000, 00000200)    256 KB
P43: devcfgbak        (000A0200, 00000200)    256 KB
P44: dsp              (000A0400, 00008000)    16 MB
P45: dspbak           (000A8400, 00008000)    16 MB
P46: modemst1         (000B0400, 00001800)    3072 KB
P47: modemst2         (000B1C00, 00001800)    3072 KB
P48: fsc              (000B3400, 00000002)    1024 b
P49: ssd              (000B3408, 00000010)    8 KB
P50: persist          (000B3418, 00010000)    32 MB
P51: misc             (000C3418, 00000800)    1024 KB
P52: keystore         (000C3C18, 00000400)    512 KB
P53: config           (000C4018, 00000040)    32 KB
P54: mota             (000C4058, 00000400)    512 KB
P55: dip              (000C4458, 00000800)    1024 KB
P56: mdtp             (000C4C58, 00010000)    32 MB
P57: mdtpbak          (000D4C58, 00010000)    32 MB
P58: syscfg           (000E4C58, 00000400)    512 KB
P59: mcfg             (000E5058, 00002000)    4 MB
P60: apdp             (000E7058, 00000200)    256 KB
P61: msadp            (000E7258, 00000200)    256 KB
P62: dpo              (000E7458, 00000010)    8 KB
P63: metadata         (000E7468, 00008000)    16 MB
P64: super            (000F0000, 00550000)    2720 MB
P65: cache            (00640000, 00047000)    142 MB
P66: userdata         (00687000, 033B6FDF)    25.86 GB
Backuping fsg partition...
Opening C:/Program Files (x86)/Medusa Pro Software/Backups/_fsg_0x7f040_0x1800_31_12_2025_21_59_06.bin file...
Reading. Please wait... Done.
Elapsed time 00:00:00
SW: 2.2.5.1; FW: .
Backuping modemst1 partition...
Opening C:/Program Files (x86)/Medusa Pro Software/Backups/_modemst1_0xb0400_0x1800_31_12_2025_21_59_06.bin file...
Reading. Please wait... Done.
Elapsed time 00:00:00
SW: 2.2.5.1; FW: .
Backuping modemst2 partition...
Opening C:/Program Files (x86)/Medusa Pro Software/Backups/_modemst2_0xb1c00_0x1800_31_12_2025_21_59_06.bin file...
Reading. Please wait... Done.
Elapsed time 00:00:00
SW: 2.2.5.1; FW: .

---------------------------------------------------------------
Searching Android build info...
Not found
---------------------------------------------------------------
Backuping FRP data...
Opening C:/Program Files (x86)/Medusa Pro Software/Backups/FRP_0xc4018_0x40_31_12_2025_21_59_28.bin file...
Reading. Please wait... Done.
Elapsed time 00:00:00
SW: 2.2.5.1; FW: .
Removing FRP. Please wait... Done.
Perform a Factory data reset from the phone menu.
SW: 2.2.5.1; FW: .

انتهاء العملية
Screenshot_2022-01-01-00-19-10-358.webp



5vkXjC2.png
 

المرفقات

عودة
أعلى