What's new
PinoyTechnician

This is a sample guest message. Register a free account today to become a member! Once signed in, you'll be able to participate on this site by adding your own topics and posts, as well as connect with other members through your own private inbox!

REFERENCE EFT Dongle Successfully Repaired Phones by FULLFLASH

FullFlash2014

Registered
Joined
Jun 12, 2014
Messages
4,477
Reaction score
241
Points
381
Location
Baguio City
EFT Dongle★=★=★ Successfully Repaired Phones by FULLFLASH


EVA-L19 FRP remove success

EFT Dongle
Connecting Fastboot .......
Connecting Fastboot .......Ok
Model Phone: EVA-L19
SW: :EVA-L19C636B390
Connecting Server .....
Connecting Server .....Ok
Erase Done , The Device Will Reboot And Factory Reset
By EFT Dongle OK
 
HUAWEI SCL-U31 FRP Done


EFT Dongle Connecting Fastboot .......
Connecting Fastboot .......Ok
Model Phone: HUAWEI SCL-U31
SW: SCL-U31C185B151
Connecting Server .....
Connecting Server .....Ok
Erase Done , The Device Will Reboot And Factory Reset
By EFT Dongle OK
 
Huawei RNE-L21 Done


EFT Dongle
Connecting Fastboot .......
Connecting Fastboot .......Ok
Model Phone: RNE-L21
SW: :RNE-L21C185B142
Connecting Server .....
Connecting Server .....Ok
Erase Done , The Device Will Reboot And Factory Reset
By EFT Dongle OK
 
Huawei P10 lite FRP reset done


EFT Dongle
Connecting Fastboot .......
Connecting Fastboot .......Ok
Model Phone: WAS-LX1
SW: :WAS-LX1C10B179
Connecting Server .....
Connecting Server .....Ok
Erase Done , The Device Will Reboot And Factory Reset
By EFT Dongle OK


1k lang done :)):)):)):))
 
j700h frp

j700h frp

Opening Port COM8...........OK
Verifying Download Mod
OK
Initialization.......OK
Reading Phone Partitation Table........OK
Partition Size : 8192
Unpak pit .......OK
FRP RESET.......OK
Rebooting PDA TO NORMAL MODE........OK


3 seconds lang wow magic



windows screenshot
 
[MTK] Supported more models for (Reset FRP - Flash - Read Flash Format)

- List of new MTK models supported:
HUAWEI:
Huawei DRA-L01 First In The World
Huawei DUA-AL00 First In The World
Huawei DRA-LX2 First In The World
Huawei DUA-LX3 First In The World
Huawei CAG-L22 First In The World
Huawei CAG-L02 First In The World
Huawei CAG-L03 First In The World
Huawei CAG-L23 First In The World
 
LG-K430 frp

LG-K430 frp

Opening Port LG..
OK
Model ID: LG-K430
IMEI: 357713071661612
Android version:
SW Version: K43010b
Resetting frp Lock..
Resetting frp lock successfully completed
 
J701fr binary 3 adb done

Frp reset ......OK



-- PRODUCT CODE : SM-J701FZKDMID
-- SERIAL NO. : RF8JA33YRJZ
-- SOFT VERSION : J701FXXU3ARA3
-- TIME ZONE : Asia/Manila


FLASH THEN RESET ADB


SM-J701F BINARY 3 7.0 ADB ENABLER
 
a520f frp Binary4

sisiw.......


Opening Port COM3...........OK
Verifying Download Mod
OK
Initialization.......OK
Reading Phone Partitation Table........OK
Partition Size : 8192
Unpak pit .......OK
FLASHING FIRMWARE TO PHONE.....
Writing: boot.img.......OK
FLASHING DONE!
Rebooting PDA TO NORMAL MODE........OK
 
Asus X008D 7.0 Frp Locked Reset DONE By EFT Dongle

Da File Here

https://www.4shared.com/rar/c2XKMwvzfi/da_online.html


Detecting Device info.......OK
Product: asus
Device Model: ASUS_X008D
ID: NRD90M.WW_Phone-14.10.1803.101-20180302
Sw Internal:
Build Date: Fri Mar 2 18:09:26 CST 2018
Chip Ver: WK3ME1B4-2
Android Version: 7.0
Architecture: arm64-v8a
FRP RESET... [FRP] .....OK
All Done By EFT Dongle
 
HUAWIE BG2-U01 frp

HUAWIE BG2-U01 frp


Device Model: BG2-U01
Device CPU: armeabi-v7a
Android SDK: 24
Android Version: 7.0
Resetting FRP.......OK
That's all. Now the phone boot bypassed to home screen. Enable developer option, enable oem unlock & usb debugging. Then do factory reset.This will clear frp from phone.
All done. Now Setup phone which will not ask account details.
 
Cam-l21 frp 2 seconds lang

CAM-L21 FRP 2 SECONDS LANG

HUAWEI Y6 Cam-L21


EFT Dongle
Connecting Fastboot .......
Connecting Fastboot .......Ok
Model Phone: CAM-L21
SW: :CAM-L21C636B249
Connecting Server .....RECEIVED
Connecting Server .....READY
Erase Done , The Device Will Reboot And Factory Reset
Reboot ...............OK
By EFT Dongle OK
 
Sm-n910c null imei unknown baseband

Sm-n910c null imei unknown baseband


Waiting For Android Device.....Done
Reading Device Info...
Device Model: SM-N910C
Device Manufacturer: samsung
Device Firmware: N910CXXS2CPI1
Device Serial: RF8FB0MPBYJ
Device Chipset: Exynos
Device IMEI: iRequREA005f0045
Android Version: 5.1.1
Android SDK: 22
Firmware Country: THAILAND
Firmware Code: THL
Checking Root.....Done
Resetting EFS.....Done
Operation Completed


THEN WRITE CERTIFICATE NALANG
DONE..
 
Bll-l22

EFT Dongle






BLL-L22 frp DONE















Connecting Fastboot .......
Connecting Fastboot .......Ok
Model Phone: BLL-L22
SW: :BLL-L22C636B389
Connecting Server .....RECEIVED
Connecting Server .....READY
Erase Done , The Device Will Reboot And Factory Reset
Reboot ...............OK
By EFT Dongle OK
 
Huawei Nova 2i RNE-L22 7.0 FRP LOCK

EFT Dongle
Connecting Fastboot .......
Connecting Fastboot .......Ok
Model Phone: RNE-L22
SW: :RNE-L22 8.0.0.322(C636)
Connecting Server .....RECEIVED
Connecting Server .....READY
Erase Done , The Device Will Reboot And Factory Reset
Reboot ...............OK
By EFT Dongle OK

Huawei Nova 2i ( RNE-L22 ) 7.0 FRP LOCK
 
Sm-g935f 7.0 frp done

SM-G935F 7.0 S2 U2 FRP DONE


Waiting For Bootloader Device.....Done
Reading Data From Bootloader.....Done
Release All Buttons NOW...
Matched Model.....
Resetting FRP.....Done
 
ATU-L22 frp DONE in 5 seconds Lang

ATU-L22 frp DONE in 5 seconds Lang

EFT Dongle
Connecting Fastboot .......
Connecting Fastboot .......Ok
Model Phone: ATU-L22
SW: ATU-L22 8.0.0.142(C636)
Connecting Server .....RECEIVED
Connecting Server .....READY
Erase Done , The Device Will Reboot And Factory Reset
Reboot ...............OK
By EFT Dongle OK
 
Huawei VNS L62 frp

Huawei VNS L62 frp

world first done


EFT Dongle
Connecting Fastboot .......
Connecting Fastboot .......Ok
Model Phone: HUAWEI VNS-L62
SW: VNS-L62C710B230
Connecting Server .....RECEIVED
Connecting Server .....READY
Factory Reset
Reboot ...............OK
 
J120H remove screen lock Done By EFT Dongle


700 SUPER IMPORTANTE DAW LAMAN NG UNIT



Opening Port COM7...........OK
Verifying Download Mod
OK
Initialization.......OK
Reading Phone Partitation Table........OK
Partition Size : 8192
Unpak pit .......OK
FLASHING FIRMWARE TO PHONE.....
Writing: boot.img.......OK
FLASHING DONE!
Rebooting PDA TO NORMAL MODE........OK
 
SM-G532G remove screen lock Done By EFT Dongle

1,000 SUPER IMPORTANTE DAW LAMAN NG UNIT


Opening Port COM7...........OK
Verifying Download Mod
OK
Initialization.......OK
Reading Phone Partitation Table........OK
Partition Size : 8192
Unpak pit .......OK
FLASHING FIRMWARE TO PHONE.....
Sending data: ..........OK
Sending data2: ........OK
FLASHING DONE!
Rebooting PDA TO NORMAL MODE........OK
Waiting For ADB Device.....
Enter into recovery mode...
Please Enter your device into recovery mode
Waiting Adb in Recovery Mode.....DONE
Detecting Device Info.....DONE
Device Model: SM-G532G
Device CPU: armeabi-v7a
Android SDK: 23
Android Version: 6.0.1
Screen Lock reset Encripted.......OK
Please Flash Official Boot.img Same Bulid Version



Opening Port COM7...........OK
Verifying Download Mod
OK
Initialization.......OK
Reading Phone Partitation Table........OK
Partition Size : 8192
Unpak pit .......OK
FLASHING FIRMWARE TO PHONE.....
Writing: boot.img.......OK
FLASHING DONE!
Rebooting PDA TO NORMAL MODE........OK
 
EFT Dongle
Connecting Fastboot .......
Connecting Fastboot .......Ok
Model Phone: ATU-L22
SW: ATU-L22 8.0.0.131(C636)
Connecting Server .....RECEIVED
Connecting Server .....READY
Erase Done , The Device Will Reboot And Factory Reset
Reboot ...............OK
By EFT Dongle OK


bilis ng 1k pesos:)):)):)):))
 
password +frp Done..

Opening Port COM7...........OK
Verifying Download Mod
OK
Initialization.......OK
Reading Phone Partitation Table........OK
Partition Size : 8192
Unpak pit .......OK
FLASHING FIRMWARE TO PHONE.....
Sending data: ..........OK
FLASHING DONE!
Rebooting PDA TO NORMAL MODE........OK
Waiting For ADB Device.....Detecting Device Info.....DONE
Device Model: SM-G935S
Device CPU: arm64-v8a
Android SDK: 26
Android Version: 8.0.0
Screen Lock reset .......OK
 
Huawei mha-l29 frp 8.0 done

Huawei mha-l29


EFT Dongle
Connecting Fastboot .......
Connecting Fastboot .......Ok
Model Phone: MHA-L29
SW: :MHA-L29 8.0.0.373(C636)
Connecting Server .....RECEIVED
Connecting Server .....READY
Erase Done , The Device Will Reboot And Factory Reset
Reboot ...............OK
By EFT Dongle OK


:)):)):)):)):))
 
c7100 5 seconds done by eft

Opening Port COM54...........OK
Verifying Download Mod
OK
Initialization.......OK
Reading Phone Partitation Table........OK
Partition Size : 8192
Unpak pit .......OK
FLASHING FIRMWARE TO PHONE.....
Sending data: ..........OK
FLASHING DONE!
Rebooting PDA TO NORMAL MODE........OK
Waiting For ADB Device.....Detecting Device Info.....DONE
Device Model: SM-C7100
Device CPU: armeabi-v7a
Android SDK: 25
Android Version: 7.1.1
Resetting FRP.......OK
 
Huawei VTR-L29 FRP Reset Done By EFT in one Click

EFT Dongle
Connecting Fastboot .......
Connecting Fastboot .......Ok
Model Phone: VTR-L29
SW: :VTR-L29 8.0.0.370(C636)
Connecting Server .....RECEIVED
DONE..
 
Enabling ADB.....
Please Connect Phone MTP (Normal Mode)......
Please Disconnect Phone And Reboot Phone Manual ...
Waiting For ADB Device.....Detecting Device Info.....DONE
Device Model: VTR-L29
Device CPU: arm64-v8a
Android SDK: 26
Android Version: 8.0.0
Resetting FRP.......OK
That's all. Now the phone boot bypassed to home screen. Enable developer option, enable oem unlock & usb debugging. Then do factory reset.This will clear frp from phone.
All done. Now Setup phone which will not ask account details.
 
TIT-AL00 frp


EFT Dongle
Connecting Fastboot .......
Connecting Fastboot .......Ok
Model Phone: HUAWEI TIT-AL00
SW: TIT-AL00C567B111
Connecting Server .....
Connecting Server .....Ok
Erase Done , The Device Will Reboot And Factory Reset
Reboot ...............OK
By EFT Dongle OK
 
Huawei mediapad t3 10 frp unlock

huawei Mediapad T3 10 unlock frp (reset frp (1))



EFT Dongle
Connecting Fastboot .......
Connecting Fastboot .......Ok
Model Phone: AGS-L09
SW: AGS-L09C100B252
Connecting Server .....
Connecting Server .....Ok
Erase Done , The Device Will Reboot And Factory Reset
Reboot ...............OK
By EFT Dongle OK
 
Infinix_X521 format

Wating Device..........OK CPU: MT6753
Writing Mode..........OK
Internal RAM:
Size = 0x 20000 (128KB)
External RAM: Type DRAM
Size = 0x80000000 (2048MB/16384Mb)
EMMC:
EMMC_PART_BOOT1 Size = 0x0000000000400000(4MB) EMMC_PART_BOOT2 Size = 0x0000000000400000(4MB) EMMC_PART_RPMB Size = 0x0000000000400000(4MB) EMMC_PART_GP1 Size = 0x0000000000000000(0MB) EMMC_PART_GP2 Size = 0x0000000000000000(0MB) EMMC_PART_GP3 Size = 0x0000000000000000(0MB) EMMC_PART_GP4 Size = 0x0000000000000000(0MB) EMMC_PART_USER Size = 0x00000003a3e00000(14910MB)
Battery:
Battery Voltage: 4117
Injection..........OK
[proinfo] BaseAddr(0x00080000) Size(0x00300000)
[nvram] BaseAddr(0x00380000) Size(0x00500000)
[protect1] BaseAddr(0x00880000) Size(0x00a00000)
[protect2] BaseAddr(0x01280000) Size(0x00a00000)
[lk] BaseAddr(0x01c80000) Size(0x00080000)
[para] BaseAddr(0x01d00000) Size(0x00080000)
[boot] BaseAddr(0x01d80000) Size(0x01000000)
[recovery] BaseAddr(0x02d80000) Size(0x01000000)
[logo] BaseAddr(0x03d80000) Size(0x00800000)
[expdb] BaseAddr(0x04580000) Size(0x00a00000)
[seccfg] BaseAddr(0x04f80000) Size(0x00080000)
[oemkeystore] BaseAddr(0x05000000) Size(0x00200000)
[secro] BaseAddr(0x05200000) Size(0x00600000)
[keystore] BaseAddr(0x05800000) Size(0x00800000)
[tee1] BaseAddr(0x06000000) Size(0x00500000)
[tee2] BaseAddr(0x06500000) Size(0x00500000)
[frp] BaseAddr(0x06a00000) Size(0x00100000)
[nvdata] BaseAddr(0x06b00000) Size(0x02000000)
[metadata] BaseAddr(0x08b00000) Size(0x02500000)
[system] BaseAddr(0x0b000000) Size(0xda000000)
[cache] BaseAddr(0xe5000000) Size(0x19000000)
[userdata] BaseAddr(0xfe000000) Size(0x2a4d80000)
[flashinfo] BaseAddr(0x3a2d80000) Size(0x01000000)
Detecting Device info.......OK
Product: Infinix
Device Model: Infinix_X521
ID: X521-J5088A1-M-170323V153
Sw Internal:
Build Date: Thu Mar 23 00:13:16 CST 2017
Chip Ver: S01
Android Version: 6.0
Architecture: arm64-v8a
Formating... [USERDATA] .....OK
All Done By EFT Dongle
 

flare j2s ayaw pabura laman

700 done

Wating Device..........OK
CPU: MT6580
Chip Version: 0x0000ca00
Chip Ext Clock: EXT_26M
Writing Mode..........OK
Internal RAM:
Internal SRAM Size: 128.00 KB
External RAM: Type DRAM
External Ram Size: 1.00 GB
EMMC:
EMMC PART BOOT1 Size: 4.00 MB
EMMC PART BOOT2 Size: 4.00 MB
EMMC PART RPMB Size: 4.00 MB
EMMC PART USER Size: 7.13 GB
Battery:
Battery Voltage: 3768
Injection..........OK
Detecting Parts info............OK
[ID: 1] [preloader] BaseAddr(0x00000000) Size(0x00400000)
[ID: 8] [pgpt] BaseAddr(0x00000000) Size(0x00080000)
[ID: 8] [proinfo] BaseAddr(0x00080000) Size(0x00300000)
[ID: 8] [nvram] BaseAddr(0x00380000) Size(0x00500000)
[ID: 8] [protect1] BaseAddr(0x00880000) Size(0x00a00000)
[ID: 8] [protect2] BaseAddr(0x01280000) Size(0x00a00000)
[ID: 8] [seccfg] BaseAddr(0x01c80000) Size(0x00040000)
[ID: 8] [lk] BaseAddr(0x01cc0000) Size(0x00060000)
[ID: 8] [boot] BaseAddr(0x01d20000) Size(0x01000000)
[ID: 8] [recovery] BaseAddr(0x02d20000) Size(0x01000000)
[ID: 8] [para] BaseAddr(0x03d20000) Size(0x00080000)
[ID: 8] [logo] BaseAddr(0x03da0000) Size(0x00800000)
[ID: 8] [expdb] BaseAddr(0x045a0000) Size(0x00a00000)
[ID: 8] [frp] BaseAddr(0x04fa0000) Size(0x00100000)
[ID: 8] [nvdata] BaseAddr(0x050a0000) Size(0x02000000)
[ID: 8] [metadata] BaseAddr(0x070a0000) Size(0x02760000)
[ID: 8] [oemkeystore] BaseAddr(0x09800000) Size(0x00200000)
[ID: 8] [secro] BaseAddr(0x09a00000) Size(0x00600000)
[ID: 8] [keystore] BaseAddr(0x0a000000) Size(0x00800000)
[ID: 8] [system] BaseAddr(0x0a800000) Size(0xa0000000)
[ID: 8] [cache] BaseAddr(0xaa800000) Size(0x10000000)
[ID: 8] [userdata] BaseAddr(0xba800000) Size(0x10c780000)
[ID: 8] [flashinfo] BaseAddr(0x1c6f80000) Size(0x01000000)
[ID: 8] [sgpt] BaseAddr(0x1c7f80000) Size(0x00080000)
Detecting Device info.......OK
Product: Cherry Mobile
Device Model: Flare J2S
ID: Cherry_Flare_J2S_V01_11192016
Sw Internal:
Build Date: Sat Nov 19 12:31:54 CST 2016
Chip Ver: S01
Android Version: 6.0
Architecture: armeabi-v7a
Screen Lock Reset:..........
Remove Security........OK
Remove Security........OK
Remove Security........OK
Remove Security........OK
Remove Security........OK
Screen Lock Reset:.........OK
All Done By EFT Dongle
 
Wating Device..........OK
CPU: MT6753
Chip Version: 0x0000ca00
Chip Ext Clock: EXT_26M
Writing Mode..........OK
Internal RAM:
Internal SRAM Size: 128.00 KB
External RAM: Type DRAM
External Ram Size: 3.00 GB
EMMC:
EMMC PART BOOT1 Size: 4.00 MB
EMMC PART BOOT2 Size: 4.00 MB
EMMC PART RPMB Size: 4.00 MB
EMMC PART USER Size: 14.56 GB
Battery:
Battery Voltage: 3594
Injection..........OK
Detecting Parts info............OK
[ID: 1] [preloader] BaseAddr(0x00000000) Size(0x00400000)
[ID: 8] [pgpt] BaseAddr(0x00000000) Size(0x00080000)
[ID: 8] [proinfo] BaseAddr(0x00080000) Size(0x00300000)
[ID: 8] [nvram] BaseAddr(0x00380000) Size(0x00500000)
[ID: 8] [protect1] BaseAddr(0x00880000) Size(0x00a00000)
[ID: 8] [protect2] BaseAddr(0x01280000) Size(0x00a00000)
[ID: 8] [lk] BaseAddr(0x01c80000) Size(0x00080000)
[ID: 8] [para] BaseAddr(0x01d00000) Size(0x00080000)
[ID: 8] [boot] BaseAddr(0x01d80000) Size(0x01000000)
[ID: 8] [recovery] BaseAddr(0x02d80000) Size(0x01000000)
[ID: 8] [logo] BaseAddr(0x03d80000) Size(0x00800000)
[ID: 8] [expdb] BaseAddr(0x04580000) Size(0x00a00000)
[ID: 8] [seccfg] BaseAddr(0x04f80000) Size(0x00080000)
[ID: 8] [oemkeystore] BaseAddr(0x05000000) Size(0x00200000)
[ID: 8] [secro] BaseAddr(0x05200000) Size(0x00600000)
[ID: 8] [keystore] BaseAddr(0x05800000) Size(0x00800000)
[ID: 8] [tee1] BaseAddr(0x06000000) Size(0x00a00000)
[ID: 8] [tee2] BaseAddr(0x06a00000) Size(0x00a00000)
[ID: 8] [persist] BaseAddr(0x07400000) Size(0x03000000)
[ID: 8] [efuse] BaseAddr(0x0a400000) Size(0x00080000)
[ID: 8] [frp] BaseAddr(0x0a480000) Size(0x00100000)
[ID: 8] [nvdata] BaseAddr(0x0a580000) Size(0x02000000)
[ID: 8] [metadata] BaseAddr(0x0c580000) Size(0x02000000)
[ID: 8] [preload] BaseAddr(0x0e580000) Size(0x20280000)
[ID: 8] [system] BaseAddr(0x2e800000) Size(0xa0000000)
[ID: 8] [cache] BaseAddr(0xce800000) Size(0x19000000)
[ID: 8] [userdata] BaseAddr(0xe7800000) Size(0x2bb580000)
[ID: 8] [flashinfo] BaseAddr(0x3a2d80000) Size(0x01000000)
[ID: 8] [sgpt] BaseAddr(0x3a3d80000) Size(0x00080000)
Detecting Device info.......OK
Product: LENOVO
Device Model: Lenovo A7010a48
ID: A7010a48_S147_160113_ROW

Sw Internal: A7010a48_USR_S147_1601132105_MP3.V2.21_LENOVO6753_ROW
Build Date: Wed Jan 13 21:25:24 CST 2016
Chip Ver: S01
Android Version: 5.1
Architecture: arm64-v8a
FRP RESET... [FRP] .....OK
All Done By EFT Dongle
 
Huawei MediaPad T3 10 AGS-L09

Huawei MediaPad T3 10
AGS-L09



EFT Dongle
Connecting Fastboot .......
Connecting Fastboot .......Ok
Model Phone: AGS-L09
SW: AGS-L09C199B280
Connecting Server .....RECEIVED
Connecting Server .....READY
Erase Done , The Device Will Reboot And Factory Reset
Reboot ...............OK
By EFT Dongle OK
 
Huawei MediaPad T3 10 AGS-L09

Huawei MediaPad T3 10
AGS-L09




EFT Dongle
Connecting Fastboot .......
Connecting Fastboot .......Ok
Model Phone: AGS-L09
SW: AGS-L09C199B280
Connecting Server .....RECEIVED
Connecting Server .....READY
Erase Done , The Device Will Reboot And Factory Reset
Reboot ...............OK
By EFT Dongle OK
may firmware ka po nito boss
 
Back
Top