○Remove FRP & Read Firmware HUAWE AMN-LX9 BY EFT ○

perata

Friend's Martview
Dec 21, 2016
1,810
1,503
morocco
• Peace, mercy and blessings of God

• Peace and blessings be upon our master Muhammad

• Remove FRP & Read Firmware HUAWE AMN-LX9 MT6761 9.1.0 232 C431 Read BY EFT Pro



♦ Test point:

11950

♦ Remove FRP:

11952

♦ info read:



Code:
Setting up.....OK
Loading files.....OK
Waiting for MTK port.....Detected {COM51}
Connecting to Brom.....OK
Sending DA.....OK
Reading partitions.....OK
Chip name: MT6761
Reading prop info.....OK
Device SDK: 28
Android version: 9
Device CPU: armeabi-v7a
Device Factory: unknown
Device CPU: armeabi-v7a
Device Factory: HUAWEI
Reading [preloader].....OK
Reading [pgpt].....OK
Reading [boot_para].....OK
Reading [frp].....OK
Reading [nvcfg].....OK
Reading [nvdata].....OK
Reading [protect1].....OK
Reading [protect2].....OK
Reading [seccfg].....OK
Reading [persist].....OK
Reading [proinfo].....OK
Reading [spmfw].....OK
Reading [scp1].....OK
Reading [sspm_1].....OK
Reading [nvram].....OK
Reading [oeminfo].....OK
Reading [misc].....OK
Reading [log].....OK
Reading [rrecord].....OK
Reading [expdb].....OK
Reading [bootfail_info].....OK
Reading [efuse].....OK
Reading [cache].....OK
Reading [recovery_vbmeta].....OK
Reading [erecovery_vbmeta].....OK
Reading [vbmeta].....OK
Reading [lk].....OK
Reading [tee1].....OK
Reading [md1img].....OK
Reading [recovery_ramdisk].....OK
Reading [recovery_vendor].....OK
Reading [erecovery_kernel].....OK
Reading [erecovery_ramdisk].....OK
Reading [erecovery_vendor].....OK
Reading [patch].....OK
Reading [dtbo].....OK
Reading [boot].....OK
Reading [eng_vendor].....OK
Reading [eng_system].....OK
Reading [preas].....OK
Reading [preavs].....OK
Reading [odm].....OK
Reading [vendor].....OK
Reading [cust].....OK
Reading [product].....OK
Reading [system].....OK
Reading [version].....OK
Reading [preload].....OK
Reading [userdata].....OK
Writing scatter.....OK
Operation {Read Scatter firmware} ID: 7F66AFD29E65EB68
Elapsed time 13:18 -- Version 1.9.4

♦ info:

Code:
Setting up.....OK
Loading files.....OK
Waiting for MTK port.....Detected {COM51}
Connecting to Brom.....OK
Sending DA.....OK
Reading partitions.....OK
Chip name: MT6761
Reading prop info.....OK
Device SDK: 28
Android version: 9
Device CPU: armeabi-v7a
Device Factory: unknown
Device CPU: armeabi-v7a
Device Factory: HUAWEI
-Part: [preloader]: ID=1 Address=0x0 Size=0x400000
-Part: [pgpt]: ID=8 Address=0x0 Size=0x8000
-Part: [boot_para]: ID=8 Address=0x8000 Size=0x100000
-Part: [frp]: ID=8 Address=0x108000 Size=0x100000
-Part: [nvcfg]: ID=8 Address=0x208000 Size=0x800000
-Part: [nvdata]: ID=8 Address=0xA08000 Size=0x1000000
-Part: [protect1]: ID=8 Address=0x1A08000 Size=0x800000
-Part: [protect2]: ID=8 Address=0x2208000 Size=0xDF8000
-Part: [seccfg]: ID=8 Address=0x3000000 Size=0x800000
-Part: [persist]: ID=8 Address=0x3800000 Size=0x800000
-Part: [proinfo]: ID=8 Address=0x4000000 Size=0x100000
-Part: [spmfw]: ID=8 Address=0x4100000 Size=0x100000
-Part: [scp1]: ID=8 Address=0x4200000 Size=0x100000
-Part: [sspm_1]: ID=8 Address=0x4300000 Size=0x100000
-Part: [nvram]: ID=8 Address=0x4400000 Size=0x500000
-Part: [oeminfo]: ID=8 Address=0x4900000 Size=0x2000000
-Part: [misc]: ID=8 Address=0x6900000 Size=0x200000
-Part: [log]: ID=8 Address=0x6B00000 Size=0x2000000
-Part: [rrecord]: ID=8 Address=0x8B00000 Size=0xC00000
-Part: [expdb]: ID=8 Address=0x9700000 Size=0x1400000
-Part: [bootfail_info]: ID=8 Address=0xAB00000 Size=0x500000
-Part: [efuse]: ID=8 Address=0xB000000 Size=0x800000
-Part: [cache]: ID=8 Address=0xB800000 Size=0x6800000
-Part: [recovery_vbmeta]: ID=8 Address=0x12000000 Size=0x100000
-Part: [erecovery_vbmeta]: ID=8 Address=0x12100000 Size=0x100000
-Part: [vbmeta]: ID=8 Address=0x12200000 Size=0x100000
-Part: [lk]: ID=8 Address=0x12300000 Size=0x300000
-Part: [tee1]: ID=8 Address=0x12600000 Size=0x500000
-Part: [md1img]: ID=8 Address=0x12B00000 Size=0x5A00000
-Part: [recovery_ramdisk]: ID=8 Address=0x18500000 Size=0x2000000
-Part: [recovery_vendor]: ID=8 Address=0x1A500000 Size=0x1000000
-Part: [erecovery_kernel]: ID=8 Address=0x1B500000 Size=0x1800000
-Part: [erecovery_ramdisk]: ID=8 Address=0x1CD00000 Size=0x2000000
-Part: [erecovery_vendor]: ID=8 Address=0x1ED00000 Size=0x1000000
-Part: [patch]: ID=8 Address=0x1FD00000 Size=0x2000000
-Part: [dtbo]: ID=8 Address=0x21D00000 Size=0x800000
-Part: [boot]: ID=8 Address=0x22500000 Size=0x1800000
-Part: [eng_vendor]: ID=8 Address=0x23D00000 Size=0xC00000
-Part: [eng_system]: ID=8 Address=0x24900000 Size=0xF00000
-Part: [preas]: ID=8 Address=0x25800000 Size=0x29800000
-Part: [preavs]: ID=8 Address=0x4F000000 Size=0x2000000
-Part: [odm]: ID=8 Address=0x51000000 Size=0x4000000
-Part: [vendor]: ID=8 Address=0x55000000 Size=0xA000000
-Part: [cust]: ID=8 Address=0x5F000000 Size=0x5800000
-Part: [product]: ID=8 Address=0x64800000 Size=0x1A000000
-Part: [system]: ID=8 Address=0x7E800000 Size=0x48000000
-Part: [version]: ID=8 Address=0xC6800000 Size=0x2000000
-Part: [preload]: ID=8 Address=0xC8800000 Size=0x25800000
-Part: [userdata]: ID=8 Address=0xEE000000 Size=0x2BD200000
Operation {Read info} ID: E339995037EC0CAC
Elapsed time 00:36 -- Version 1.9.4


Firmware: Here

Best regardis

I ask God Almighty, Lord of the Throne, to protect all of humanity
 
Top