EFT EFT Pro Dongle Update V4.7.6 Is released [Added Qualcomm Models Samsung V2]

EFT Dongle

GsmToto

Super Moderator
Jan 1, 2021
5,342
22,093
UK
Skype
gsmtoto
Sonork ID
100.1684601



EFT Pro Dongle Update V4.7.5 Build 001 is released :



What's New :





[Qualcomm]



Added Qualcomm Models Samsung V2






★ FRP

★ Factory Reset





[Qualcomm]
SM-A207F

SM-E025F

SM-F7110

SM-F711B

SM-F711BR

SM-F711D

SM-F711J

SM-F711N

SM-F711U

SM-F711U1

SM-F711W

SM-F711XU

SM-F721B

SM-F721BR

SM-F721U

SM-F721U1

SM-F721W

SM-F721XU

SM-G998U1
















Previous Version EFT Pro Dongle Feature
[MTK]

New design and Easy menu

Support Forced BROM (method 1)

Support Forced BROM (method 2)

Support Forced BROM without Test Point

Support Samsung forced BROM (PIT Method)

Support write Huawei (UPDATE APP) firmware

Support write Samsung (TAR) firmware

Support write Oppo/Realme (OFP) firmware

Support write EMMC Dump firmware

Support Vivo MT6765 PreLoader

Support direct unlock network MTK (BROM)

Support (Vivo) Disable MDM lock Supported for (2020 to Up)

Support (Vivo) Disable MDM lock Supported for (2019)

Support (Vivo) Disable MDM lock Supported for (Y15S PD2140EF)

Support (Vivo) Disable demo mode

Support (Vivo) Disable orange msg

Support (Vivo) Restore orange msg

Update Samsung Disable MDM Lock

Update Samsung change KG

Update Oppo disable MDM lock

Support Security 2022/2023 for MTK

Support Device for MTK devices

Support Device (MTK) Factory Reset/FRP Reset/Write Firmware

Update Write Samsung (TAR) Firmware

Device (MTK) Factory Reset/FRP

Fix Tool Dl Image Fail

Reset Frp Lock WriteFile

Protocol For MTK (V6)

Protocol MTK Devices Read Info / Flash / Format / FRP

Free Auth Tecno / Infinix / itel

Support Models on V6 Protocol Infinix / Tecno

Added Repair IMEI Generic (MT67XX) BROM

Added Repair Network Security 2020/2021 BROM

Added Repair Network Security 2022 BROM

Added Read IMEI

Added backup with CID number for MTK operations

Added Forced BROM SAMSUNG Download Mode

Added OPPO MT6771 Auth Free

Added Samsung Auth Free

Samsung Galaxy Wide5(SM-E426S) Auth Free

Samsung Galaxy A13 5G(SM-A136) Auth Free

Samsung Galaxy A22(SM-A225) Auth Free

Samsung Galaxy F42 (SM-E426)Auth Free

Added new DEVICE for mtk protocol (v6)

Update GENERIC MTK V5

Update GENERIC MTK 2023

Added META Read Info All MTK CPU

Added META Factory Reset All MTK CPU

Added META Factory Reset MT62XX

Added META Repair IMEI All MTK CPU

Added in META Mode ( Infinix - Tecno - Itel ) All Model With Auth

Added MTK Preloader

Added SAMSUNG Brom Models NEW

Added META Read Info

Added META Factory Reset Direct (INFINIX-TECNO-ITEL)

Added Enable/Disable Backup

Direct Factory Reset (INFINIX-TECNO-ITEL)


[SPD]

Support models apove 200+ model

Factory reset and FRP Reset

Added write PAC firmware for All SPD

Enter diag mode 2 methods

Read info and IMEI in diag mode

Factory reset in Diag mode ALL mode

Added RSA AUTH Itel/Tecno/Infinix/Realme and more

Added Spd Fix Wireless Test Assistant

Added New Device (SPD) Factory reset/FRP Reset/Write Firmware PAC

Read Info

Reset FRP/Factory Reset

Unlock Bootloader

Relock Bootloader

Added Info Boot Mode

Added Read Flash /Format Disk /Write Disk

Added Network Unlock Boot Mode

Added Repair IMEI Boot Mode

Added Remove MDM Boot Mode

Added New Boot SPD V2

Added GENERIC SPD V1


[SAMSUNG]

Fix Exynos Boot (Beta)

Bypass Knox Samsung Adb

Bypass Knox Samsung MTP

Remove FRP Direct (MTP) 2023

Enable ADB With Call Emergency #0#.

Remove KG Lock Direct (MTP)

Translate ADB Android 13


[Qualcomm]

Enable Diag Mode Without Root

Added New List (Qualcomm New)

Added list Service For (Factory Reset /FRP )

Added list Service For (Factory Reset Oppo /FRP Oppo )

-Qualcomm device support automatic loader

-Support for Qualcomm devices. Select the model

Device Support for Qualcomm devices

Device (Qualcomm) Factory Reset/FRP

Qualcomm Protocol Update To Support More Devices And Brands

Fixed Read Chip Info Oppo Reno Devices

Unlock ID (Huawei)

Reset FRP/UserData Use Firmware (Vivo/Other)

Device Support for Qualcomm devices

Device (Qualcomm) Factory Reset/FRP

Added Read flash

Added Repair Chip damaged (Huawei)

Update Remove ID (Huawei)

Fix OLD loader

Support Automatic Loader [OPPO/VIVO/HUAWEI/XIAOMI/ONEPLUS]

Added NEW Device ALCATEL/TCL


[ APPLE ]

Added BOOT PASSCODE/HELLO IOS 16.4 IPHONE 8/8+/X

Added BOOT PASSCODE/HELLO IOS 16.4 IPAD

Generate Activation files ios 15.x/16.x (IPHONE/IPAD) (Without Change SN)

FIX Boot Passcode/Hello IOS 15.x/16.x (IPAD/IPhone)

FIX Mount Passcode/Hello IOS 11.x Up 16.x

BOOT PASSCODE/HELLO FOR (IPAD)

Read Account From Backup Folder

Boot Passcode/Hello IOS 11.x Up 16.x One Click

Change Test Signed Drivers to ON

Read iDevice Info (Recovery Mode)

Automatic Active Backup Restore built-in with One Click

supported by recovery and supported by DFU

Save info to txt file when Backup or reading from a file

Restore Passcode with Disable Update/Reset

Add option to format or restart if backup completes

Ipwnder restart in case of failure

Restore by bypass Setup and disabling Update

Added (Jailbreak) Backup Apple with Info

Added Disable Update/Reset/Skip Setup (One Click)

Added Disable Update/Reset/Skip Setup Ramdisk/HELLO



[ Rockchip ]

Update Read/Write Flash

Factory Reset & Frp






 

GsmToto

Super Moderator
Jan 1, 2021
5,342
22,093
UK
Skype
gsmtoto
Sonork ID
100.1684601
Wait for device...
Download port: Qualcomm HS-USB QDLoader 9008 (COM3)
Port: Qualcomm HS-USB QDLoader 9008 (COM3)
Manufacturer: Qualcomm Incorporated
Waiting for server........ OK
Connect to comport... OK
Read chip info... OK
OEM Private key: 0x74CF2DAB7E146C9F3D13106650D161E98876E1347693A05699997113C5C83Mt11
Vendor: GENERIC QUALCOMM
Load loader... OK
Send Loader... OK
Ping Device... OK
Load Config... OK
Server ... OK
Get Partition ...
Server ... OK
Get Partition ...
Server ... OK
Get Partition ...
Read Build Prop Info... OK
Brand: SAMSUNG
Model: SM-A207F
Product: A20SXX
Manufacturer: SAMSUNG
Android Version: 11 (Android 11)
Security Patch: 2021-12-01
Build ID: RP1A.200720.012
Build Date: FRI DEC 10 16:02:18 +07 2021
Display ID: RP1A.200720.012.A207FXXU3CUH5
Build: A207FXXU3CUL1
Read Internal Storage Info... OK
USERDATA: 22.94 GB
USERDATA: ENCRYPTED
Remove FRP Lock... OK
Reboot... OK
Elapsed Time: 1 min, 15secs, 677 msecs
 
  • Like
Reactions: tsui_thomas

iftikharrana

Friend's Martview
May 23, 2017
185
60
Pakistan
Sonork ID
1611265
iphone 6 fmi off done


Waiting for server.....OK

Checking iDevices.....OK

Reading iDevice info.....OK

Activation Status: Activated

BuildVersion: 16H81

CPU Arch: arm64

Device Class: iPhone

Device Name: iPhone

Firmware Version: iBoot-4513.270.14

Device IMEI: 359279067156304

Device MEID: 35927906715630

Product Name: iPhone OS

Product Type: iPhone 6

IOS Version: 12.5.7

SIM Status: kCTSIMSupportSIMStatusReady

Device Serial Number: F78PNAR0G5MN

DeviceID: f55588ba04d04d7a95ec921f7cd2fa4cd04750ef

MEID Status: Supported

Info.....Backup Successful.

Get Auth Info.....

OK



Apple ID:[email protected]

PET Token:GUkpOw9xOyP+x76D7IGo35uANFOYpP4Jp2ANJfKB5ItPpskTkTIdSxq+MAPVq//DbZ9V4z22/pr/kUoUXs5d03AUvu75CojveS7AkzmfC+CFOr78Bp5f6UqR2RTqpOYpEp7KTgTqYgK2ziChwbxxKzAtdvPaqIZzZHIkXHjP0eXiL1a3PRV71FPgn/l5NBQ0X/aBFo5uDguvhUCAd8eUdxL0j4WLc1DfwW1iK/DGuYKMVRCiCS9dt12UGxLpsMl0yvrhyuAQXj6o1k13xX5yfZ5356oYRz5hEKn1dku/oQkqEIwa/Xuo8DL+ZoMkKDDlx7/dLw+CWHOMG7d9NfjTRVbJy+FdHtB5spa4k4Bh8o7gylsMbTEGORYkGQwAskDv++uR4I6ATzDfsqOUqVn47GOrHNdgbGLTtsFQB0/owJ+UKlHpCqgmeUlbGsQn73U7yU/T0tE/F4zvpqYNMS1+JffDy27pPET

Model:iPhone 6

Device Name:iPhone

MODE:CLEAN

Status:OFFLINE

Status Code:200

Removed:Success ✅

========================

Model:AirPods

Device Name:i12-pe

MODE:CLEAN

Status:OFFLINE

Status Code:200

Removed:Success ✅

========================

1-Turn off Wi-Fi and mobile data directly through your phone's settings.2-Check your phone's IMEI and make sure icloud off.3-After that, proceed to format the device.

Operation {Remove Icloud Open Menu with BACKUP} ID: 1F10CC3DEB2DDA5A

Elapsed time 02:17 -- Version 4.7.6 Build 001
 
  • Like
Reactions: GsmToto

atishkhan

Active Member
Dec 21, 2016
24
0
pakistan
eft pro total fake updates evey time now these day server down by moldel select your jov not done evey upadate bla bla but honestly my advise dont waste your money on eft
 

GsmToto

Super Moderator
Jan 1, 2021
5,342
22,093
UK
Skype
gsmtoto
Sonork ID
100.1684601
VIVO Y15S FRP SUCCESFULLY REMOVED:
Waiting For Device Connection...
USB PORT: MediaTek PreLoader USB VCOM (Android) (COM3)
Port: MediaTek PreLoader USB VCOM (Android) (COM12)
Manufacturer: MediaTek Inc.
OPEN COM PORT... OK
Handshake... OK
Waiting for server........ OK
Read CHIP ID... OK
HW-CODE: 0X766
CPU: MT6765
Read Chip Version... OK
HW-SUBCODE: 0X8A00
HW-VERSION: 0XCA00
SW-VERSION: 0X0000
Read Phone Configuration... OK
Waiting for server........ OK
Send Protection Files BROM... OK
Check BROM status... OK
Setup DEVICE... OK
Init HARDWARE... OK
Setup DEVICE... OK
Read DEVICE Status... PRELOADER
Send Download Agent... OK
Read Device Info... OK
EMMC INFO:
EMMC Boot1 Size: 4.00 MB
EMMC Boot2 Size: 4.00 MB
EMMC RPMB Size: 4.00 MB
EMMC USER Size: 29.12 GB
EMMC CID: 1501004458362384D42093A36CE073811
RAM INFO:
SRAM Size: 224.00 KB
DRAM Size: 3.00 GB
CHANGE TO HIGH-SPEED PORT... OK
Server ... OK
Get Partition ... OK
Read Build Prop Info... OK
Brand: VIVO
Model: V2120
Product: 2020
Manufacturer: VIVO
Android Version: 12
Security Patch: 2022-07-01
Build ID: SP1A.210812.003
Build Date: TUE JUL 5 15:16:24 CST 2022
Display ID: SP1A.210812.003 RELEASE-KEYS
Vivo OS: FUNTOUCH OS 12 GLOBAL
Vivo Version: PD2140F_EX PD2140BF_EX PD4340EF_EX PD4340HF_EX PD4340GF_EX PD2140LF_EX
Vivo Name: 2120
Vivo Model: 2020
Read Internal Storage Info... OK
USERDATA: 22.40 GB
USERDATA: ENCRYPTED
Prepare data... OK
Waiting for server........ OK
RESET FRP... OK
Finalize... OK
Reboot... OK
Elapsed Time: 17 secs, 492 msecs
 
  • Like
Reactions: tsui_thomas

GsmToto

Super Moderator
Jan 1, 2021
5,342
22,093
UK
Skype
gsmtoto
Sonork ID
100.1684601
Waiting For Device Connection...
USB PORT: SPRD U2S Diag (COM2)
Port: SPRD U2S Diag (COM7)
Manufacturer: UNISOC Communications Inc.
OPEN COM PORT... OK
Waiting for server........ OK
Handshake NAND_FDL... OK
Boot version: SPRD3
Sending payload... OK
Sending preloader... OK
Sending nand_fdl loader... OK
Read Build Prop Info... OK
Brand: ITEL
Model: ITEL L6501
Product: F6311
Manufacturer: ITEL
Android Version: 9 (Pie)
Security Patch: 2022-01-05
Build ID: PPR1.180610.011
Build Date: THU DEC 23 18:01:05 CST 2021
Display ID: L6501-F6311-9.0-OP-V051-20211223
Build: OP-V051-20211223
Read Internal Storage Info... OK
USERDATA: 24.97 GB
USERDATA: ENCRYPTED
Waiting for server........ OK
RESET FRP... OK
Rebooting... OK
Elapsed Time: 15 secs, 691 msecs
 

GsmToto

Super Moderator
Jan 1, 2021
5,342
22,093
UK
Skype
gsmtoto
Sonork ID
100.1684601
Wait for device...
Download port: Qualcomm HS-USB QDLoader 9008 (COM3)
Port: Qualcomm HS-USB QDLoader 9008 (COM3)
Manufacturer: Qualcomm Incorporated
Waiting for server........ OK
Connect to comport... OK
Read chip info... OK
Hardware ID: 0x1B80E1
OEM Private key: 0x1816101F1302CF634F7002490E6742134F5FCDE05A7EAFF5 BA7029AA0E69F911
Load loader... OK
Send Loader... OK
Ping Device... OK
Load Config... OK
Server ... OK
Get Partition ...
Server ... OK
Get Partition ...
Server ... OK
Get Partition ...
Server ... OK
Get Partition ...
Server ... OK
Get Partition ...
Server ... OK
Get Partition ...
Read Build Prop Info... FAIL
[FS ERR] FAILED TO MOUNT /VENDOR_A/
Read Internal Storage Info... OK
USERDATA: 106.84 GB
USERDATA: ENCRYPTED
Remove FRP Lock... OK
Reboot... OK
Elapsed Time: 19 secs, 94 msecs
 

nobel1976

Member
Sep 11, 2017
8
1
pakistan
Skype
nobal1976
i am facing problem to unlock Huawei id
proses don but id not remove
here is log


Waiting for USB COM 1 port.....Detected {COM300}

Reading data from server.....OK

Opening Port.....OK

Writing loaders.....OK

Reading GPT.....OK

-Part: [frp]: Address=524288 Size=524288 LUN=00000000

-Part: [persist]: Address=1048576 Size=2097152 LUN=00000000

-Part: [reserved1]: Address=3145728 Size=5242880 LUN=00000000

-Part: [reserved6]: Address=8388608 Size=524288 LUN=00000000

-Part: [vrl]: Address=8912896 Size=524288 LUN=00000000

-Part: [vrl_backup]: Address=9437184 Size=524288 LUN=00000000

-Part: [modem_secure]: Address=9961472 Size=8912896 LUN=00000000

-Part: [nvme]: Address=18874368 Size=5242880 LUN=00000000

-Part: [certification]: Address=24117248 Size=1048576 LUN=00000000

-Part: [oeminfo]: Address=25165824 Size=67108864 LUN=00000000

-Part: [secure_storage]: Address=92274688 Size=33554432 LUN=00000000

-Part: [modem_om]: Address=125829120 Size=33554432 LUN=00000000

-Part: [modemnvm_factory]: Address=159383552 Size=16777216 LUN=00000000

-Part: [modemnvm_backup]: Address=176160768 Size=16777216 LUN=00000000

-Part: [modemnvm_img]: Address=192937984 Size=35651584 LUN=00000000

-Part: [reserved7]: Address=228589568 Size=2097152 LUN=00000000

-Part: [hisee_encos]: Address=230686720 Size=4194304 LUN=00000000

-Part: [veritykey]: Address=234881024 Size=1048576 LUN=00000000

-Part: [ddr_para]: Address=235929600 Size=1048576 LUN=00000000

-Part: [modem_driver]: Address=236978176 Size=20971520 LUN=00000000

-Part: [ramdisk]: Address=257949696 Size=2097152 LUN=00000000

-Part: [vbmeta_system]: Address=260046848 Size=1048576 LUN=00000000

-Part: [vbmeta_vendor]: Address=261095424 Size=1048576 LUN=00000000

-Part: [vbmeta_odm]: Address=262144000 Size=1048576 LUN=00000000

-Part: [vbmeta_cust]: Address=263192576 Size=1048576 LUN=00000000

-Part: [vbmeta_hw_product]: Address=264241152 Size=1048576 LUN=00000000

-Part: [splash2]: Address=265289728 Size=83886080 LUN=00000000

-Part: [bootfail_info]: Address=349175808 Size=2097152 LUN=00000000

-Part: [misc]: Address=351272960 Size=2097152 LUN=00000000

-Part: [dfx]: Address=353370112 Size=16777216 LUN=00000000

-Part: [rrecord]: Address=370147328 Size=16777216 LUN=00000000

-Part: [fw_lpm3]: Address=386924544 Size=262144 LUN=00000000

-Part: [kpatch]: Address=387186688 Size=3932160 LUN=00000000

-Part: [hdcp]: Address=391118848 Size=1048576 LUN=00000000

-Part: [hisee_img]: Address=392167424 Size=4194304 LUN=00000000

-Part: [hhee]: Address=396361728 Size=4194304 LUN=00000000

-Part: [hisee_fs]: Address=400556032 Size=8388608 LUN=00000000

-Part: [fastboot]: Address=408944640 Size=12582912 LUN=00000000

-Part: [vector]: Address=421527552 Size=4194304 LUN=00000000

-Part: [isp_boot]: Address=425721856 Size=2097152 LUN=00000000

-Part: [isp_firmware]: Address=427819008 Size=14680064 LUN=00000000

-Part: [fw_hifi]: Address=442499072 Size=12582912 LUN=00000000

-Part: [teeos]: Address=455081984 Size=8388608 LUN=00000000

-Part: [sensorhub]: Address=463470592 Size=16777216 LUN=00000000

-Part: [erecovery_kernel]: Address=480247808 Size=25165824 LUN=00000000

-Part: [erecovery_ramdisk]: Address=505413632 Size=33554432 LUN=00000000

-Part: [erecovery_vendor]: Address=538968064 Size=16777216 LUN=00000000

-Part: [kernel]: Address=555745280 Size=25165824 LUN=00000000

-Part: [eng_system]: Address=580911104 Size=12582912 LUN=00000000

-Part: [recovery_ramdisk]: Address=593494016 Size=33554432 LUN=00000000

-Part: [recovery_vendor]: Address=627048448 Size=16777216 LUN=00000000

-Part: [dts]: Address=643825664 Size=8388608 LUN=00000000

-Part: [dto]: Address=652214272 Size=25165824 LUN=00000000

-Part: [trustfirmware]: Address=677380096 Size=2097152 LUN=00000000

-Part: [modem_fw]: Address=679477248 Size=58720256 LUN=00000000

-Part: [eng_vendor]: Address=738197504 Size=12582912 LUN=00000000

-Part: [modem_patch_nv]: Address=750780416 Size=4194304 LUN=00000000

-Part: [reserved4]: Address=754974720 Size=8388608 LUN=00000000

-Part: [recovery_vbmeta]: Address=763363328 Size=2097152 LUN=00000000

-Part: [erecovery_vbmeta]: Address=765460480 Size=2097152 LUN=00000000

-Part: [vbmeta]: Address=767557632 Size=4194304 LUN=00000000

-Part: [modemnvm_update]: Address=771751936 Size=16777216 LUN=00000000

-Part: [modemnvm_cust]: Address=788529152 Size=16777216 LUN=00000000

-Part: [patch]: Address=805306368 Size=33554432 LUN=00000000

-Part: [cache]: Address=838860800 Size=109051904 LUN=00000000

-Part: [preas]: Address=947912704 Size=1375731712 LUN=00000000

-Part: [preavs]: Address=2323644416 Size=33554432 LUN=00000000

-Part: [super]: Address=2357198848 Size=4555014144 LUN=00000000

-Part: [version]: Address=6912212992 Size=33554432 LUN=00000000

-Part: [preload]: Address=6945767424 Size=981467136 LUN=00000000

-Part: [userdata]: Address=7927234560 Size=54609838080 LUN=00000000

Reading Data from server.....OK

Writing Data.....OK

- Please ReEnter device to USB COM 1.0 Again

Waiting device to disconnect.....OK

Waiting device to connect.....OK

Writing loaders.....OK

Waiting for fastboot device.....OK

Reading info.....OK

Device Model: ART-L29

Device Serial: HYJNW18A27001862

Device Firmware: :ARTH-L29 10.1.0.227(C185E2R2P1)

Base Firmware: :ART-LGRP2-OVS 10.1.0.227

Custom Firmware: :ARTH-L29-CUST 10.1.0.2(C185)

Preload Firmware: :ARTH-L29-PRELOAD 10.1.0.1(C185R2)

Device FB Lock: UNLOCKED

Device USER Lock: LOCKED

Device Lock: unlocked

Waiting for server.....OK

Erasing HuaweiID.....OK

Operation {Unlock Huawei ID TestPoint} ID: 20993EE3F1E90977

Elapsed time 03:06 -- Version 4.7.6 Build 001
 
  • Like
Reactions: GsmToto

nobel1976

Member
Sep 11, 2017
8
1
pakistan
Skype
nobal1976
i am facing problem to unlock Huawei id
proses don but id not remove
here is log


Waiting for USB COM 1 port.....Detected {COM300}

Reading data from server.....OK

Opening Port.....OK

Writing loaders.....OK

Reading GPT.....OK

-Part: [frp]: Address=524288 Size=524288 LUN=00000000

-Part: [persist]: Address=1048576 Size=2097152 LUN=00000000

-Part: [reserved1]: Address=3145728 Size=5242880 LUN=00000000

-Part: [reserved6]: Address=8388608 Size=524288 LUN=00000000

-Part: [vrl]: Address=8912896 Size=524288 LUN=00000000

-Part: [vrl_backup]: Address=9437184 Size=524288 LUN=00000000

-Part: [modem_secure]: Address=9961472 Size=8912896 LUN=00000000

-Part: [nvme]: Address=18874368 Size=5242880 LUN=00000000

-Part: [certification]: Address=24117248 Size=1048576 LUN=00000000

-Part: [oeminfo]: Address=25165824 Size=67108864 LUN=00000000

-Part: [secure_storage]: Address=92274688 Size=33554432 LUN=00000000

-Part: [modem_om]: Address=125829120 Size=33554432 LUN=00000000

-Part: [modemnvm_factory]: Address=159383552 Size=16777216 LUN=00000000

-Part: [modemnvm_backup]: Address=176160768 Size=16777216 LUN=00000000

-Part: [modemnvm_img]: Address=192937984 Size=35651584 LUN=00000000

-Part: [reserved7]: Address=228589568 Size=2097152 LUN=00000000

-Part: [hisee_encos]: Address=230686720 Size=4194304 LUN=00000000

-Part: [veritykey]: Address=234881024 Size=1048576 LUN=00000000

-Part: [ddr_para]: Address=235929600 Size=1048576 LUN=00000000

-Part: [modem_driver]: Address=236978176 Size=20971520 LUN=00000000

-Part: [ramdisk]: Address=257949696 Size=2097152 LUN=00000000

-Part: [vbmeta_system]: Address=260046848 Size=1048576 LUN=00000000

-Part: [vbmeta_vendor]: Address=261095424 Size=1048576 LUN=00000000

-Part: [vbmeta_odm]: Address=262144000 Size=1048576 LUN=00000000

-Part: [vbmeta_cust]: Address=263192576 Size=1048576 LUN=00000000

-Part: [vbmeta_hw_product]: Address=264241152 Size=1048576 LUN=00000000

-Part: [splash2]: Address=265289728 Size=83886080 LUN=00000000

-Part: [bootfail_info]: Address=349175808 Size=2097152 LUN=00000000

-Part: [misc]: Address=351272960 Size=2097152 LUN=00000000

-Part: [dfx]: Address=353370112 Size=16777216 LUN=00000000

-Part: [rrecord]: Address=370147328 Size=16777216 LUN=00000000

-Part: [fw_lpm3]: Address=386924544 Size=262144 LUN=00000000

-Part: [kpatch]: Address=387186688 Size=3932160 LUN=00000000

-Part: [hdcp]: Address=391118848 Size=1048576 LUN=00000000

-Part: [hisee_img]: Address=392167424 Size=4194304 LUN=00000000

-Part: [hhee]: Address=396361728 Size=4194304 LUN=00000000

-Part: [hisee_fs]: Address=400556032 Size=8388608 LUN=00000000

-Part: [fastboot]: Address=408944640 Size=12582912 LUN=00000000

-Part: [vector]: Address=421527552 Size=4194304 LUN=00000000

-Part: [isp_boot]: Address=425721856 Size=2097152 LUN=00000000

-Part: [isp_firmware]: Address=427819008 Size=14680064 LUN=00000000

-Part: [fw_hifi]: Address=442499072 Size=12582912 LUN=00000000

-Part: [teeos]: Address=455081984 Size=8388608 LUN=00000000

-Part: [sensorhub]: Address=463470592 Size=16777216 LUN=00000000

-Part: [erecovery_kernel]: Address=480247808 Size=25165824 LUN=00000000

-Part: [erecovery_ramdisk]: Address=505413632 Size=33554432 LUN=00000000

-Part: [erecovery_vendor]: Address=538968064 Size=16777216 LUN=00000000

-Part: [kernel]: Address=555745280 Size=25165824 LUN=00000000

-Part: [eng_system]: Address=580911104 Size=12582912 LUN=00000000

-Part: [recovery_ramdisk]: Address=593494016 Size=33554432 LUN=00000000

-Part: [recovery_vendor]: Address=627048448 Size=16777216 LUN=00000000

-Part: [dts]: Address=643825664 Size=8388608 LUN=00000000

-Part: [dto]: Address=652214272 Size=25165824 LUN=00000000

-Part: [trustfirmware]: Address=677380096 Size=2097152 LUN=00000000

-Part: [modem_fw]: Address=679477248 Size=58720256 LUN=00000000

-Part: [eng_vendor]: Address=738197504 Size=12582912 LUN=00000000

-Part: [modem_patch_nv]: Address=750780416 Size=4194304 LUN=00000000

-Part: [reserved4]: Address=754974720 Size=8388608 LUN=00000000

-Part: [recovery_vbmeta]: Address=763363328 Size=2097152 LUN=00000000

-Part: [erecovery_vbmeta]: Address=765460480 Size=2097152 LUN=00000000

-Part: [vbmeta]: Address=767557632 Size=4194304 LUN=00000000

-Part: [modemnvm_update]: Address=771751936 Size=16777216 LUN=00000000

-Part: [modemnvm_cust]: Address=788529152 Size=16777216 LUN=00000000

-Part: [patch]: Address=805306368 Size=33554432 LUN=00000000

-Part: [cache]: Address=838860800 Size=109051904 LUN=00000000

-Part: [preas]: Address=947912704 Size=1375731712 LUN=00000000

-Part: [preavs]: Address=2323644416 Size=33554432 LUN=00000000

-Part: [super]: Address=2357198848 Size=4555014144 LUN=00000000

-Part: [version]: Address=6912212992 Size=33554432 LUN=00000000

-Part: [preload]: Address=6945767424 Size=981467136 LUN=00000000

-Part: [userdata]: Address=7927234560 Size=54609838080 LUN=00000000

Reading Data from server.....OK

Writing Data.....OK

- Please ReEnter device to USB COM 1.0 Again

Waiting device to disconnect.....OK

Waiting device to connect.....OK

Writing loaders.....OK

Waiting for fastboot device.....OK

Reading info.....OK

Device Model: ART-L29

Device Serial: HYJNW18A27001862

Device Firmware: :ARTH-L29 10.1.0.227(C185E2R2P1)

Base Firmware: :ART-LGRP2-OVS 10.1.0.227

Custom Firmware: :ARTH-L29-CUST 10.1.0.2(C185)

Preload Firmware: :ARTH-L29-PRELOAD 10.1.0.1(C185R2)

Device FB Lock: UNLOCKED

Device USER Lock: LOCKED

Device Lock: unlocked

Waiting for server.....OK

Erasing HuaweiID.....OK

Operation {Unlock Huawei ID TestPoint} ID: 20993EE3F1E90977

Elapsed time 03:06 -- Version 4.7.6 Build 001
eft dongle team plz update about this
 

GsmToto

Super Moderator
Jan 1, 2021
5,342
22,093
UK
Skype
gsmtoto
Sonork ID
100.1684601
Waiting for USB COM 1 port.....Detected {COM2}
Connecting to device.....OK
Writing data 1.....OK
Writing data 2.....OK
Writing data 3.....OK
Rebooting device to fastboot.....OK
Waiting for fastboot device.....OK
Reading info.....OK
Device Model: VCE
Device Serial: JPF4C19124030112
Device Firmware: :VCE-AL00 2.0.0.268(C00E230)
Device FB Lock: UNLOCKED
Device USER Lock: LOCKED
Device Lock: unlocked
Waiting for server.....OK
Erasing HuaweiID.....OK
Operation {Unlock Huawei ID TestPoint} ID: 236624AFF63C133M
Elapsed time 00:58 -- Version 4.7.6 Build 001
 
Top