Start for repair, EVA-AL10_M00A085_Board Software_inc_testpoint + .App File Flash with Test Point. Log: Code:
DC Phoenix 0.0.0.115
user:0132501E
The file was loaded successfully
File size: 3,023,018,536 bytes
Current version(CURVER): EVA_C999B000EMUI5.0
Package Type: OFFLINE_UPDATE
Revision: 0
Checking partition: VERLIST
DC Phoenix 0.0.0.115
user:0132501E
Looking for a device in force upgrade mode
Device detected:
COM12: HUAWEI USB COM 1.0 (COM12)
5/8/2020 9:02:07 PM Starting to write device in FASTBOOT mode...
File to update: EVA-AL10_M00A085_Board Software_inc_testpoint.dgtks
Device detected:
COM12: HUAWEI USB COM 1.0 (COM12)
Process identifier:24323811
Writing bootloader...
Writing EVA-AL10_M00A085_Board Software_inc_testpoint_4.dtwork...
Writing EVA-AL10_M00A085_Board Software_inc_testpoint_5.dtwork...
Waiting for fastboot device...
Device found: JELJRO0262280311
Looking for a device in fastboot mode
Device found: JELJRO0262280311
Getting IMEI...
USB Device REMOVAL
Type: @oem74.inf,%qcomdevice00%;HUAWEI USB COM 1.0
VidPid: VID_12D1&PID_3609
Instance id: 6&24bf3d78&0&2
Getting build number...
USB Device INSERTION
Type: @oem66.inf,%hwfastboot%;Android Sooner Single ADB Interface
VidPid: VID_18D1&PID_D00D
Instance id: JELJRO0262280311
Getting model ...
Getting battery state...
Getting backdoor info...
Getting lock state info...
Getting lock boot info...
IMEI:868445025192632
IMEI1:868445025210855
Build number: :HLEVAAL10M00A061
Model: HUAWEI
Battery state: 3269mv
OEM lock state info:
FB LockState: UNLOCKED
USER LockState: LOCKED
OEM get bootinfo:
unlocked
Erasing ver .. .
Cannot get FBlock info from device
Trying to unlock device...
Signing process may take few minutes
Trying to get data from server
Waiting in queue for signing service. Expected time 1 second(s) to get data from server
Trying to get data from server
Erasing ver .. .
Erasing nvme partition
Partition nvme erased
Erasing cust partition
Partition cust erased
Erasing misc partition
Partition misc erased
Erasing userdata partition
Partition userdata erased
xloaderpartition is not written because is in the APP file
Writing ptable partition
ptable partition UPDATE ...OK
fastbootpartition is not written because is in the APP file
dtspartition is not written because is in the APP file
fw_lpm3partition is not written because is in the APP file
sensorhubpartition is not written because is in the APP file
fw_hifipartition is not written because is in the APP file
teeospartition is not written because is in the APP file
recoverypartition is not written because is in the APP file
cachepartition is not written because is in the APP file
bootpartition is not written because is in the APP file
Writing nvme partition
nvme partition UPDATE ...OK
trustfirmwarepartition is not written because is in the APP file
modempartition is not written because is in the APP file
modem_dtbpartition is not written because is in the APP file
modemnvm_updatepartition is not written because is in the APP file
modem_dsppartition is not written because is in the APP file
Writing modem_om partition
modem_om partition UPDATE ...OK
Writing modemnvm_img partition
modemnvm_img partition UPDATE ...OK
3rdmodempartition is not written because is in the APP file
Writing 3rdmodemnvm partition
3rdmodemnvm partition UPDATE ...OK
Writing 3rdmodemnvmbkp partition
3rdmodemnvmbkp partition UPDATE ...OK
userdatapartition is not written because is in the APP file
systempartition is not written because is in the APP file
Writing splash2 partition
splash2 partition UPDATE ...OK
Writing frp partition
frp partition UPDATE ...OK
Erasing cust partition
Partition cust erased
Writing cust partition
cust partition UPDATE ...OK
Writing secure_storage partition
secure_storage partition UPDATE ...OK
Software written
5/8/2020 9:02:45 PM Writing device finished OK
Looking for a device in fastboot mode
Device found: JELJRO0262280311
Getting IMEI...
Getting build number...
Getting model ...
Getting battery state...
Getting backdoor info...
Getting lock state info...
Getting lock boot info...
IMEI:868445025192632
IMEI1:868445025210855
Build number: :HLEVAAL10M00A061
Model: HUAWEI
Battery state: 3290mv
OEM lock state info:
FB LockState: UNLOCKED
USER LockState: LOCKED
OEM get bootinfo:
unlocked
5/8/2020 9:02:47 PM Starting to write device in FASTBOOT mode...
File size: 3,023,018,536 bytes
Current version(CURVER): EVA_C999B000EMUI5.0
Looking for a device in fastboot mode
Device found: JELJRO0262280311
Getting IMEI...
Getting build number...
Getting model ...
Getting battery state...
Getting backdoor info...
Getting lock state info...
Getting lock boot info...
IMEI:868445025192632
IMEI1:868445025210855
Build number: :HLEVAAL10M00A061
Model: HUAWEI
Battery state: 3301mv
OEM lock state info:
FB LockState: UNLOCKED
USER LockState: LOCKED
OEM get bootinfo:
unlocked
Process identifier:24323825
Erasing ver .. .
Cannot get FBlock info from device
Trying to unlock device...
Signing process may take few minutes
Trying to get data from server
Waiting in queue for signing service. Expected time 1 second(s) to get data from server
Trying to get data from server
Erasing ver .. .
Writing XLOADER partition
XLOADER partition UPDATE ...OK
Writing FW_LPM3 partition
FW_LPM3 partition UPDATE ...OK
Writing FASTBOOT partition
FASTBOOT partition UPDATE ...OK
Writing MODEMNVM_UPDATE partition
MODEMNVM_UPDATE partition UPDATE ...OK
Writing TEEOS partition
TEEOS partition UPDATE ...OK
Writing TRUSTFIRMWARE partition
TRUSTFIRMWARE partition UPDATE ...OK
Writing SENSORHUB partition
SENSORHUB partition UPDATE ...OK
Writing FW_HIFI partition
FW_HIFI partition UPDATE ...OK
Writing BOOT partition
BOOT partition UPDATE ...OK
Writing RECOVERY partition
RECOVERY partition UPDATE ...OK
Writing RECOVERY2 partition
RECOVERY2 partition UPDATE ...OK
Writing DTS partition
DTS partition UPDATE ...OK
Writing MODEM partition
MODEM partition UPDATE ...OK
Writing MODEM_DSP partition
MODEM_DSP partition UPDATE ...OK
Writing 3RDMODEM partition
3RDMODEM partition UPDATE ...OK
Erasing CACHE partition
Partition CACHE erased
Writing CACHE partition
CACHE partition UPDATE ...OK
Writing SYSTEM partition
sending sparse file 468430804 bytes
Waiting for answer...
send sparse file OK
sending sparse file 470999444 bytes
Waiting for answer...
send sparse file OK
sending sparse file 450337680 bytes
Waiting for answer...
send sparse file OK
sending sparse file 466604900 bytes
Waiting for answer...
send sparse file OK
sending sparse file 153306396 bytes
Waiting for answer...
send sparse file OK
SYSTEM partition UPDATE ...OK
Writing MODEM_DTB partition
MODEM_DTB partition UPDATE ...OK
Erasing USERDATA partition
Partition USERDATA erased
Writing USERDATA partition
USERDATA partition UPDATE ...OK
Software written
5/8/2020 9:06:04 PM Writing device finished OK
Waiting for fastboot device...
USB Device REMOVAL
Type: @oem66.inf,%hwfastboot%;Android Sooner Single ADB Interface
VidPid: VID_18D1&PID_D00D
Instance id: JELJRO0262280311
USB Device INSERTION
Type: @oem66.inf,%hwfastboot%;Android Sooner Single ADB Interface
VidPid: VID_18D1&PID_D00D
Instance id: JELJRO0262280311
Device found: JELJRO0262280311
File size: 3,023,018,536 bytes
Current version(CURVER): EVA_C999B000EMUI5.0
Writing rescue_recovery partition
rescue_recovery partition UPDATE ...OK
USB Device REMOVAL
Type: @oem66.inf,%hwfastboot%;Android Sooner Single ADB Interface
VidPid: VID_18D1&PID_D00D
Instance id: JELJRO0262280311
Looking for device in upgrade mode...
USB Device INSERTION
Type: @oem70.inf,%busfilter.devicedesc%;USB Composite Device
VidPid: VID_12D1&PID_107E
Instance id: JELJRO0262280311
Looking for device in upgrade mode...
COM15: Android Adapter PCUI (COM15)
COM13: DBAdapter Reserved Interface (COM13)
5/8/2020 9:07:40 PM Starting to write device in UPGRADE mode...
Device found: JELJRO0262280311
Old slow algo NOT selected
5/8/2020 9:07:43 PM start to write update APP file
File to update: EVA-L19C185B403 .APP
File size: 3,023,018,536 bytes
Current version(CURVER): EVA_C999B000EMUI5.0
Process identifier:24323880
Validating file...
Looking for attached port...
Preparing to write...
Writing file 1 of 27: SHA256RSA...
Writing file 1 of 27: SHA256RSA...OK
Writing file 2 of 27: CRC...
Writing file 2 of 27: CRC...OK
Writing file 3 of 27: CURVER...
Writing file 3 of 27: CURVER...OK
Writing file 4 of 27: VERLIST...
Writing file 4 of 27: VERLIST...OK
Writing file 5 of 27: PACKAGE_TYPE...
Writing file 5 of 27: PACKAGE_TYPE...OK
Writing file 6 of 27: EFI...
Writing file 6 of 27: EFI...OK
Writing file 7 of 27: XLOADER...
Writing file 7 of 27: XLOADER...OK
Writing file 8 of 27: FW_LPM3...
Writing file 8 of 27: FW_LPM3...OK
Writing file 9 of 27: FASTBOOT...
Writing file 9 of 27: FASTBOOT...OK
Writing file 10 of 27: MODEMNVM_UPDATE...
Writing file 10 of 27: MODEMNVM_UPDATE...OK
Writing file 11 of 27: TEEOS...
Writing file 11 of 27: TEEOS...OK
Writing file 12 of 27: TRUSTFIRMWARE...
Writing file 12 of 27: TRUSTFIRMWARE...OK
Writing file 13 of 27: SENSORHUB...
Writing file 13 of 27: SENSORHUB...OK
Writing file 14 of 27: FW_HIFI...
Writing file 14 of 27: FW_HIFI...OK
Writing file 15 of 27: BOOT...
Writing file 15 of 27: BOOT...OK
Writing file 16 of 27: RECOVERY...
Writing file 16 of 27: RECOVERY...OK
Writing file 17 of 27: RECOVERY2...
Writing file 17 of 27: RECOVERY2...OK
Writing file 18 of 27: DTS...
Writing file 18 of 27: DTS...OK
Writing file 19 of 27: MODEM...
Writing file 19 of 27: MODEM...OK
Writing file 20 of 27: MODEM_DSP...
Writing file 20 of 27: MODEM_DSP...OK
Writing file 21 of 27: 3RDMODEM...
Writing file 21 of 27: 3RDMODEM...OK
Writing file 22 of 27: CACHE...
Writing file 22 of 27: CACHE...OK
Writing file 23 of 27: SYSTEM...
Writing file 23 of 27: SYSTEM...OK
Writing file 24 of 27: MODEM_DTB...
Writing file 24 of 27: MODEM_DTB...OK
Writing file 25 of 27: VENDOR...
Writing file 25 of 27: VENDOR...OK
Writing file 26 of 27: PRODUCT...
Writing file 26 of 27: PRODUCT...OK
Writing file 27 of 27: USERDATA...
Writing file 27 of 27: USERDATA...OK
Software written
5/8/2020 9:11:58 PM Writing device finished OK
Must be completely Umts Repair. Log:
Code:
5/8/2020 9:34:26 PM
HCU Client v1.0.0.0353
Account: 0132501E
Before detection connect cable to usb and enable Manufacture mode !
Qualcomm and HiSilicon: *#*#2846579#*#*
MTK: *#*#14789632#*#*
Windows: ##2846579#
ProjectMenu
1.Background setting
2.USB ports setting
Select Manufacture mode
Repair
2020-05-08 21:34:26.947 Autodetect COM port and phone type start!
2020-05-08 21:34:29.724 Found COM port: COM15
2020-05-08 21:34:29.724 Found phone type: Huawei Android phone (HiSilicon CPU)
New IMEI 1 : 868445025192632
New IMEI 2 : 868445025210855
New Bluetooth MAC : 54:BA:D6:22:AE:79
New WiFi MAC : 54:BA:D6:22:AA:7C
New SN : DYN6R19827000640
New PCB SN : JELJRO0262280311
New Vendor : hw
New Country : meafnaf
New Model : EVA-L19
2020-05-08 21:34:30.036 Open COM port COM15 (Android Adapter PCUI (COM15))...
2020-05-08 21:34:30.239 Connecting to server...
2020-05-08 21:34:31.019 Connected!
2020-05-08 21:34:37.477 CP State: ready
2020-05-08 21:34:37.477 Read phone basic info...
2020-05-08 21:34:39.303 Read phone secure info...
2020-05-08 21:34:49.645 Phone info data backup saved to file D:\Software\DC unlocker\HCU_322\Backup\20200508_213449_868445025192632.BAK
2020-05-08 21:34:50.176 Read from server...
2020-05-08 21:34:50.737 Read from server success!
2020-05-08 21:34:53.764 Read from server...
2020-05-08 21:34:54.138 Read from server success!
2020-05-08 21:34:54.154 Writing SN...
2020-05-08 21:34:54.201 Write SN success!
2020-05-08 21:34:54.575 Phone secure identify start
2020-05-08 21:35:01.751 Phone secure identify success!
2020-05-08 21:35:01.767 Writing MAC...
2020-05-08 21:35:04.372 Read from server...
2020-05-08 21:35:04.855 Read from server success!
2020-05-08 21:35:05.323 Write MAC success!
2020-05-08 21:35:05.401 Writing IMEI 1 start
2020-05-08 21:35:06.010 Reading from server...
2020-05-08 21:35:08.866 Read from server success!
2020-05-08 21:35:09.880 Write IMEI success!
2020-05-08 21:35:09.895 Writing IMEI 2 start
2020-05-08 21:35:12.126 Reading from server...
2020-05-08 21:35:13.187 Read from server success!
2020-05-08 21:35:14.185 Write IMEI success!
2020-05-08 21:35:16.806 Writing Vendor and Country...
2020-05-08 21:35:16.806 Read from server...
2020-05-08 21:35:17.258 Read from server success!
2020-05-08 21:35:17.695 Writing Vendor and Country success!
2020-05-08 21:35:17.695 Writing device model...
2020-05-08 21:35:17.711 Read from server...
2020-05-08 21:35:18.101 Read from server success!
2020-05-08 21:35:18.506 Write device model success!
2020-05-08 21:35:18.522 Write SIMCARD mode not supported for this model, skipped!
2020-05-08 21:35:19.130 Synchronize NV...
2020-05-08 21:35:19.630 Synchronize NV success!
2020-05-08 21:35:19.630 Factory reset...
2020-05-08 21:35:22.282 Factory reset success!
2020-05-08 21:35:22.297 Finished!
Reset phone to factory default to complete operation. If reset failed, check if vendor id and country are correct and repeat operation.
Memo log saved to D:\Software\DC unlocker\HCU_322\Logs\20200508_213522_HCU_RepairUmts_ELJRO0262280311.txt
After Reflash App with customization file. Log
Code:
DC Phoenix 0.0.0.115
user:0132501E
Looking for a device in upgrade mode
COM18: DBAdapter Reserved Interface (COM18)
COM17: Android Adapter PCUI (COM17)
5/8/2020 9:44:37 PM Starting to write device in UPGRADE mode...
Device found: DYN6R19827000640
Old slow algo NOT selected
5/8/2020 9:44:40 PM start to write update file
File to update: EVA-L19C185B403 .APP
File size: 3,023,018,536 bytes
Current version(CURVER): EVA_C999B000EMUI5.0
Process identifier:24324357
Validating file...
Looking for attached port...
Preparing to write...
Writing file 1 of 27: SHA256RSA...OK
Writing file 2 of 27: CRC...OK
Writing file 3 of 27: CURVER...OK
Writing file 4 of 27: VERLIST...OK
Writing file 5 of 27: PACKAGE_TYPE...OK
Writing file 6 of 27: EFI...OK
Writing file 7 of 27: XLOADER...OK
Writing file 8 of 27: FW_LPM3...OK
Writing file 9 of 27: FASTBOOT...OK
Writing file 10 of 27: MODEMNVM_UPDATE...OK
Writing file 11 of 27: TEEOS...OK
Writing file 12 of 27: TRUSTFIRMWARE...OK
Writing file 13 of 27: SENSORHUB...OK
Writing file 14 of 27: FW_HIFI...OK
Writing file 15 of 27: BOOT...OK
Writing file 16 of 27: RECOVERY...OK
Writing file 17 of 27: RECOVERY2...OK
Writing file 18 of 27: DTS...OK
Writing file 19 of 27: MODEM...OK
Writing file 20 of 27: MODEM_DSP...OK
Writing file 21 of 27: 3RDMODEM...OK
Writing file 22 of 27: CACHE...OK
Writing file 23 of 27: SYSTEM...OK
Writing file 24 of 27: MODEM_DTB...OK
Writing file 25 of 27: VENDOR...OK
Writing file 26 of 27: PRODUCT...OK
Writing file 27 of 27: USERDATA...OK
Software written
5/8/2020 9:48:52 PM start to update cust file
File to update: update_EVA-L19_hw_meafnaf.app
File size: 1,501,650,960 bytes
Current version(CURVER): EVA_C999B000EMUI5.0
Process identifier:24324403
Validating file...
Looking for attached port...
Preparing to write...
Writing file 1 of 9: SHA256RSA...OK
Writing file 2 of 9: CRC...OK
Writing file 3 of 9: CURVER...OK
Writing file 4 of 9: VERLIST...OK
Writing file 5 of 9: PACKAGE_TYPE...OK
Writing file 6 of 9: EFI...OK
Writing file 7 of 9: CUST...OK
Writing file 8 of 9: VERSION...OK
Writing file 9 of 9: USERDATA...OK
Software written
5/8/2020 9:52:18 PM Writing device finished OK
Boot-loader Unlocked warning fixed
Log
Code:
5/8/2020 9:59:42 PM
HCU Client v1.0.0.0353
Account: 0132501E
Before detection connect cable to usb and enable Manufacture mode !
Qualcomm and HiSilicon: *#*#2846579#*#*
MTK: *#*#14789632#*#*
Windows: ##2846579#
ProjectMenu
1.Background setting
2.USB ports setting
Select Manufacture mode
Lock Bootloader
2020-05-08 21:59:42.529 Autodetect COM port and phone type start!
2020-05-08 21:59:45.305 Found COM port: COM17
2020-05-08 21:59:45.321 Found phone type: Huawei Android phone (HiSilicon CPU)
2020-05-08 21:59:45.586 Open COM port COM17 (Android Adapter PCUI (COM17))...
2020-05-08 21:59:48.035 Connecting to server...
2020-05-08 21:59:48.862 Connected!
2020-05-08 22:00:06.755 CP State: ready
2020-05-08 22:00:06.755 Read phone basic info...
2020-05-08 22:00:08.659 Read phone secure info...
2020-05-08 22:00:18.970 Phone info data backup saved to file D:\Software\DC unlocker\HCU_322\Backup\20200508_220018_868445025192632.BAK
2020-05-08 22:00:19.111 Locking bootloader...
2020-05-08 22:00:19.111 Read from server...
2020-05-08 22:00:19.594 Read from server success!
2020-05-08 22:00:19.594 Locking bootloader...
2020-05-08 22:00:22.246 Locking bootloader success!
2020-05-08 22:00:22.621 Lock bootloader success!
Done!
Memo log saved to D:\Software\DC unlocker\HCU_322\Logs\20200508_220022_HCU_LockBoot_868445025192632.txt
Finally repaired & Completely Read Phone info. Code:
5/8/2020 10:19:40 PM
HCU Client v1.0.0.0353
Account: 0132501E
Before detection connect cable to usb and enable Manufacture mode !
Qualcomm and HiSilicon: *#*#2846579#*#*
MTK: *#*#14789632#*#*
Windows: ##2846579#
ProjectMenu
1.Background setting
2.USB ports setting
Select Manufacture mode
Read phone info
2020-05-08 22:19:40.498 Autodetect COM port and phone type start!
2020-05-08 22:19:41.262 Found COM port: COM17
2020-05-08 22:19:41.262 Found phone type: Huawei Android phone (HiSilicon CPU)
2020-05-08 22:19:41.262 Open COM port COM17 (Android Adapter PCUI (COM17))...
2020-05-08 22:19:41.418 Start read phone info!
2020-05-08 22:19:44.008 Connecting to server...
2020-05-08 22:19:44.772 Connected!
2020-05-08 22:19:57.549 CP State: ready
2020-05-08 22:19:57.549 Read phone basic info...
2020-05-08 22:19:59.452 Read phone secure info...
2020-05-08 22:20:09.779 Read phone info done!
Model: EVA-L19
IMEI: 868445025192632
IMEI2: 868445025210855
IMEI3: 868445025192632
IMEISV: 03
Firmware ver.: NRD90M test-keys
Dataver: EVA-L19C185B403_DATA_EVA-L19_hw_meafnaf
SN: DYN6R19827000640
PCB SN: JELJRO0262280311
WiFi MAC: 54:BA:D6:22:AA:7C
BlueTooth MAC: 54:BA:D6:22:AE:79
Vendor: hw
Country: meafnaf
FASTBOOT:Chipset-austin 5.0.0.3(0GS7)_FASTBOOT
BOOT:Chipset-austin 5.0.0.3(0GS7)_BOOT
RECOVERY:(unknow)
SYSTEM:System 5.0.0.57(1FPN)
MAINVER:NRD90M test-keys
DATAVER:EVA-L19C185B403_DATA_EVA-L19_hw_meafnaf
APTIME:Wed Aug 1 11:18:43 CST 2018
RAM: 3G
eMMC: 32G
eMMC ID: 00000000000000000000000000000000
HUN: 0000000000000000
IMEI 1 Sim Lock status:
NET: unlocked
NETSUB: unlocked
SP: unlocked
2020-05-08 22:20:09.904 Phone info data backup saved to file D:\Software\DC unlocker\HCU_322\Backup\20200508_222009_868445025192632.BAK
Memo log saved to D:\Software\DC unlocker\HCU_322\Logs\20200508_222009_HCU_ReadInfo_868445025192632.txt