2 2 1 2
21 32 32

: & Repaired &

  1. #21
    EFT-Dongle
    23.03.2017
    ..
    25
    157
    164
    : 253 80 ()
    1

    Xiaomi Mi A2

    Xiaomi Mi A2


  2. Sanginmurod.gsm :

    Casper2233 (09.03.2019)

  3. #22
    EFT-Dongle
    23.03.2017
    ..
    25
    157
    164
    : 253 80 ()
    1

    Samsung SM N9109W

    Samsung SM N9109W


  4. Sanginmurod.gsm :

    Casper2233 (09.03.2019)

  5. #23

    17.01.2017
    ,
    14
    8
    : 6 4 ()
    0
    10 ! HUAWEI HONOR 8
    EFT Dongle
    Connecting Fastboot .......
    Connecting Fastboot .......Ok
    Model Phone: FRD-L09
    SW: :FRD-L09C432B399
    Connecting Server .....RECEIVED
    Connecting Server .....READY
    Erase Done , The Device Will Reboot And Factory Reset
    Reboot ...............OK
    By EFT Dongle OK
    octopus lg+samsung, medusa pro, mrt dongle, infinity box , 4setool, BEST, UFS+HWK, BST

  6. #24
      Meret83
    15.05.2009
    .
    36
    484
    96
    : 59 46 ()
    1
    BLU vivo 5 mini frp

    :
    Wating Device..........OK
    CPU: MT6580
    Chip Version: 0x0000ca00
    Chip Ext Clock: EXT_26M
    Writing Mode..........OK
    Internal RAM: 
    Internal SRAM Size: 128.00 KB
    External RAM: Type DRAM
    External Ram Size: 512.00 MB
    EMMC: 
    EMMC PART BOOT1 Size: 4.00 MB
    EMMC PART BOOT2 Size: 4.00 MB
    EMMC PART RPMB Size: 4.00 MB
    EMMC PART USER Size: 7.13 GB
    Battery: 
    Battery Voltage: 3740
    Injection..........OK
    Detecting Parts info............OK
    [ID: 1] [preloader] BaseAddr(0x00000000) Size(0x00400000) 
    [ID: 8] [pgpt] BaseAddr(0x00000000) Size(0x00080000) 
    [ID: 8] [proinfo] BaseAddr(0x00080000) Size(0x00300000) 
    [ID: 8] [nvram] BaseAddr(0x00380000) Size(0x00500000) 
    [ID: 8] [protect1] BaseAddr(0x00880000) Size(0x00a00000) 
    [ID: 8] [protect2] BaseAddr(0x01280000) Size(0x00a00000) 
    [ID: 8] [seccfg] BaseAddr(0x01c80000) Size(0x00040000) 
    [ID: 8] [lk] BaseAddr(0x01cc0000) Size(0x00060000) 
    [ID: 8] [boot] BaseAddr(0x01d20000) Size(0x01000000) 
    [ID: 8] [recovery] BaseAddr(0x02d20000) Size(0x01000000) 
    [ID: 8] [para] BaseAddr(0x03d20000) Size(0x00080000) 
    [ID: 8] [logo] BaseAddr(0x03da0000) Size(0x00800000) 
    [ID: 8] [expdb] BaseAddr(0x045a0000) Size(0x00a00000) 
    [ID: 8] [frp] BaseAddr(0x04fa0000) Size(0x00100000) 
    [ID: 8] [nvdata] BaseAddr(0x050a0000) Size(0x02000000) 
    [ID: 8] [metadata] BaseAddr(0x070a0000) Size(0x02760000) 
    [ID: 8] [oemkeystore] BaseAddr(0x09800000) Size(0x00200000) 
    [ID: 8] [secro] BaseAddr(0x09a00000) Size(0x00600000) 
    [ID: 8] [keystore] BaseAddr(0x0a000000) Size(0x00800000) 
    [ID: 8] [system] BaseAddr(0x0a800000) Size(0x80000000) 
    [ID: 8] [cache] BaseAddr(0x8a800000) Size(0x10000000) 
    [ID: 8] [userdata] BaseAddr(0x9a800000) Size(0x12c780000) 
    [ID: 8] [flashinfo] BaseAddr(0x1c6f80000) Size(0x01000000) 
    [ID: 8] [sgpt] BaseAddr(0x1c7f80000) Size(0x00080000) 
    Detecting Device info.......OK
    Product: BLU
    Device Model: Vivo 5 Mini
    ID: MRA58K
    Sw Internal: 
    Build Date: Thu Dec 22 21:36:11 CST 2016
    Chip Ver: S01
    Android Version: 6.0
    Architecture: armeabi-v7a
    FRP RESET... [FRP] .....OK
    All Done By EFT Dongle

  7. #25
      Meret83
    15.05.2009
    .
    36
    484
    96
    : 59 46 ()
    1
    Alcatel one touch 5010D frp

    :
    Wating Device..........OK
    CPU: MT6580
    Chip Version: 0x0000ca00
    Chip Ext Clock: EXT_26M
    Writing Mode..........OK
    Internal RAM: 
    Internal SRAM Size: 128.00 KB
    External RAM: Type DRAM
    External Ram Size: 1.00 GB
    EMMC: 
    EMMC PART BOOT1 Size: 4.00 MB
    EMMC PART BOOT2 Size: 4.00 MB
    EMMC PART RPMB Size: 512.00 KB
    EMMC PART USER Size: 7.28 GB
    Battery: 
    Battery Voltage: 4076
    Injection..........OK
    Detecting Parts info............OK
    [ID: 1] [preloader] BaseAddr(0x00000000) Size(0x00400000) 
    [ID: 8] [pgpt] BaseAddr(0x00000000) Size(0x00800000) 
    [ID: 8] [proinfo] BaseAddr(0x00800000) Size(0x00680000) 
    [ID: 8] [nvram] BaseAddr(0x00e80000) Size(0x00500000) 
    [ID: 8] [protect1] BaseAddr(0x01380000) Size(0x00a00000) 
    [ID: 8] [protect2] BaseAddr(0x01d80000) Size(0x00a00000) 
    [ID: 8] [para] BaseAddr(0x02780000) Size(0x00080000) 
    [ID: 8] [lk] BaseAddr(0x02800000) Size(0x00800000) 
    [ID: 8] [logo] BaseAddr(0x03000000) Size(0x00800000) 
    [ID: 8] [boot] BaseAddr(0x03800000) Size(0x01000000) 
    [ID: 8] [recovery] BaseAddr(0x04800000) Size(0x01000000) 
    [ID: 8] [oemkeystore] BaseAddr(0x05800000) Size(0x00800000) 
    [ID: 8] [secro] BaseAddr(0x06000000) Size(0x00800000) 
    [ID: 8] [keystore] BaseAddr(0x06800000) Size(0x00800000) 
    [ID: 8] [seccfg] BaseAddr(0x07000000) Size(0x00800000) 
    [ID: 8] [expdb] BaseAddr(0x07800000) Size(0x01000000) 
    [ID: 8] [mobile_info] BaseAddr(0x08800000) Size(0x00800000) 
    [ID: 8] [frp] BaseAddr(0x09000000) Size(0x00800000) 
    [ID: 8] [nvdata] BaseAddr(0x09800000) Size(0x02000000) 
    [ID: 8] [metadata] BaseAddr(0x0b800000) Size(0x02000000) 
    [ID: 8] [system] BaseAddr(0x0d800000) Size(0x6b800000) 
    [ID: 8] [cache] BaseAddr(0x79000000) Size(0x10000000) 
    [ID: 8] [userdata] BaseAddr(0x89000000) Size(0x145480000) 
    [ID: 8] [otp] BaseAddr(0x1ce480000) Size(0x02b00000) 
    [ID: 8] [flashinfo] BaseAddr(0x1d0f80000) Size(0x01000000) 
    [ID: 8] [sgpt] BaseAddr(0x1d1f80000) Size(0x00080000) 
    FRP RESET... [FRP] .....OK
    All Done By EFT Dongle

  8. #26

    10.12.2007
    401
    108
    : 71 46 ()
    1
    LLD-L31 9, 12)

    Extracting files.....Done
    Waiting for device to connect.....Found {COM220}
    Opening Port.....OK
    Writing xloader.....OK
    Writing fastboot.....OK
    Rebooting to fastboot.....OK
    Connecting Fastboot .......
    Connecting Fastboot .......Ok
    Model Phone: LLD-L31
    SW: :LLD-L319.1.0.116(C10E4R1P4)
    Android Version: 9
    SN: FPM4C185=========
    IMEI: 869675=========
    IMEI: IMEI1:869675=========
    IMEI: MEID:00000000000000
    Lock state: FBLockState:UNLOCKED USERLockState:LOCKED
    Boot info: unlocked
    battery: 0
    Frp Erase ...............OK
    Erase Done , The Device Will Reboot And Factory Reset
    Reboot ...............OK
    By EFT Dongle OK

  9. estagent :

    Sanginmurod.gsm (21.07.2019)

  10. #27
      Meret83
    15.05.2009
    .
    36
    484
    96
    : 59 46 ()
    1
    A500H android 6.0.1 ()


    Opening Port COM19...........OK
    Verifying Download Mod
    OK
    Initialization.......OK
    Reading Phone Partitation Table........OK
    Partition Size : 8192
    Unpak pit .......OK
    FLASHING FIRMWARE TO PHONE.....
    Writing: boot.img.......OK
    FLASHING DONE!
    Rebooting PDA TO NORMAL MODE........OK
    eft.jpg  
    Meret83; 13.07.2019 12:09.

  11. Meret83 :

    Sanginmurod.gsm (21.07.2019)

  12. #28
      Meret83
    15.05.2009
    .
    36
    484
    96
    : 59 46 ()
    1
    Alcatel one touch 5015D frp

    :
    Wating Device..........OK
    CPU: MT6580
    Chip Version: 0x0000ca00
    Chip Ext Clock: EXT_26M
    Writing Mode..........OK
    Internal RAM: 
    Internal SRAM Size: 128.00 KB
    External RAM: Type DRAM
    External Ram Size: 1.00 GB
    EMMC: 
    EMMC PART BOOT1 Size: 4.00 MB
    EMMC PART BOOT2 Size: 4.00 MB
    EMMC PART RPMB Size: 512.00 KB
    EMMC PART USER Size: 7.28 GB
    Battery: 
    Battery Voltage: 3689
    Injection..........OK
    Detecting Parts info............OK
    [ID: 1] [preloader] BaseAddr(0x00000000) Size(0x00400000) 
    [ID: 8] [pgpt] BaseAddr(0x00000000) Size(0x00800000) 
    [ID: 8] [proinfo] BaseAddr(0x00800000) Size(0x00680000) 
    [ID: 8] [nvram] BaseAddr(0x00e80000) Size(0x00500000) 
    [ID: 8] [protect1] BaseAddr(0x01380000) Size(0x00a00000) 
    [ID: 8] [protect2] BaseAddr(0x01d80000) Size(0x00a00000) 
    [ID: 8] [para] BaseAddr(0x02780000) Size(0x00080000) 
    [ID: 8] [lk] BaseAddr(0x02800000) Size(0x00800000) 
    [ID: 8] [logo] BaseAddr(0x03000000) Size(0x00800000) 
    [ID: 8] [boot] BaseAddr(0x03800000) Size(0x01000000) 
    [ID: 8] [recovery] BaseAddr(0x04800000) Size(0x01000000) 
    [ID: 8] [oemkeystore] BaseAddr(0x05800000) Size(0x00800000) 
    [ID: 8] [secro] BaseAddr(0x06000000) Size(0x00800000) 
    [ID: 8] [keystore] BaseAddr(0x06800000) Size(0x00800000) 
    [ID: 8] [custpack] BaseAddr(0x07000000) Size(0x38000000) 
    [ID: 8] [seccfg] BaseAddr(0x3f000000) Size(0x00800000) 
    [ID: 8] [expdb] BaseAddr(0x3f800000) Size(0x01000000) 
    [ID: 8] [mobile_info] BaseAddr(0x40800000) Size(0x00800000) 
    [ID: 8] [frp] BaseAddr(0x41000000) Size(0x00800000) 
    [ID: 8] [nvdata] BaseAddr(0x41800000) Size(0x02000000) 
    [ID: 8] [metadata] BaseAddr(0x43800000) Size(0x02000000) 
    [ID: 8] [system] BaseAddr(0x45800000) Size(0x4e800000) 
    [ID: 8] [cache] BaseAddr(0x94000000) Size(0x07000000) 
    [ID: 8] [userdata] BaseAddr(0x9b000000) Size(0x133480000) 
    [ID: 8] [otp] BaseAddr(0x1ce480000) Size(0x02b00000) 
    [ID: 8] [flashinfo] BaseAddr(0x1d0f80000) Size(0x01000000) 
    [ID: 8] [sgpt] BaseAddr(0x1d1f80000) Size(0x00080000) 
    FRP RESET... [FRP] .....OK
    All Done By EFT Dongle

  13. Meret83 :

    Sanginmurod.gsm (21.07.2019)

  14. #29
      Meret83
    15.05.2009
    .
    36
    484
    96
    : 59 46 ()
    1
    Samsung J120H frp J120f

    Opening Port COM19...........OK
    Verifying Download Mod
    OK
    Initialization.......OK
    Reading Phone Partitation Table........OK
    Partition Size : 8192
    Unpak pit .......OK
    FRP RESET.......OK
    Rebooting PDA TO NORMAL MODE........OK

  15. 2 Meret83 :

    Sanginmurod.gsm (21.07.2019), xonzo (21.07.2019)

  16. #30
      Meret83
    15.05.2009
    .
    36
    484
    96
    : 59 46 ()
    1
    G900H android 4.4.2 ()

        . 

:	02.jpg 
:	26 
:	233.8  
ID:	334640

  17. #31
      zaya86
    10.04.2010
    ,
    33
    893
    374
    : 90 79 ()
    1
    Samsung A310F U3 ()
        . 

:	A310F U3.png 
:	27 
:	70.8  
ID:	334778
    zaya86; 12.08.2019 13:25.
    : MX-key Z3XBOX-SAM Easy-Jtag OCTOPLUS SAM OCTOPLUS-LG OCTOPLUS-SONY MEDUZA-PRO-JTAG Octoplus FRP Tool Octoplus Huawei Tool SETool ATF CM2 EFT

  18. #32
      Meret83
    15.05.2009
    .
    36
    484
    96
    : 59 46 ()
    1
    Samsung J320h (frp off)

        . 

:	eft2.jpg 
:	11 
:	181.5  
ID:	335720

2 2 1 2

,

: 1 (: 0 , : 1)

  •  
   Rambler's Top100 PageRank Checking Icon .