EFT Oppo A12 USERDATA: ENCRYPTED done

EFT Dongle

GsmToto

Super Moderator
Jan 1, 2021
4,756
21,320
UK
Skype
gsmtoto
Sonork ID
100.1684601


Waiting For Device Connection...
USB PORT: MediaTek USB Port (COM68)
Port: MediaTek USB Port (COM68)
Manufacturer: MediaTek Inc.
OPEN COM PORT... OK
Handshake... OK
Analyzing server data...... OK
Read CHIP ID... OK
HW-CODE: 0X766
CPU: MT6765
Read Chip Version... OK
HW-SUBCODE: 0X8A00
HW-VERSION: 0XCA00
SW-VERSION: 0X0000
Read Phone Configuration... OK
Bypass Security Protection... OK
Dump EMI Config... OK
Send Protection Files BROM... OK
Check BROM status... OK
Setup DEVICE... OK
Init HARDWARE... OK
Setup DEVICE... OK
Read DEVICE Status... BROM
Load emi config from customize model... OK
Init EXT RAM... OK
Send Download Agent... OK
Send Download Agent Extended... OK
Random key: 00000000000000000000000000000000
Sla Version: 12345678 >> 2018915346
Read Device Info... OK
EMMC INFO:
EMMC Boot1 Size: 4.00 MB
EMMC Boot2 Size: 4.00 MB
EMMC RPMB Size: 16.00 MB
EMMC USER Size: 58.24 GB
EMMC CID: 150100444836444142021FAF905117F1
RAM INFO:
SRAM Size: 224.00 KB
DRAM Size: 4.00 GB
CHANGE TO HIGH-SPEED PORT... OK
Server ... OK
Get Partition ... OK
Read Build Prop Info... OK
Manufacturer: OPPO
Android Version: 9 (Pie)
Security Patch: 2022-01-05
Build ID: PPR1.180610.011
Build: b
Read Internal Storage Info... OK
USERDATA: 49.71 GB
USERDATA: ENCRYPTED
Prepare data... OK
RESET FRP... OK
READ MISC PARTITION... OK
Patch misc partition to format data... OK
Finalize... OK
Reboot... OK
Elapsed Time: 17 secs, 615 msecs
 
Top