GSM Shop
GSM-Forum  

Welcome to the GSM-Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features.
Only registered members may post questions, contact other members or search our database of over 8 million posts.

Registration is fast, simple and absolutely free so please - Click to REGISTER!

If you have any problems with the registration process or your account login, please contact contact us .

Go Back   GSM-Forum > Product Support Sections > Hard/Software Products (official support) > DC Unlocker

Reply
 
LinkBack Thread Tools Display Modes
Old 05-09-2020, 02:26   #1 (permalink)
Moderator
 
...:::::NP™:::::...'s Avatar
 
Join Date: Nov 2009
Location: Space in your heart
Posts: 10,230
Member: 1162626
Status: Online
Sonork: 100.1591727 QQ:2337938173
Thanks Meter: 10,201
EVA-L09/L19 Huawei P9 Dead/Unbrick | Umts Repair | Write SN | MAC | IMEI Recover Done









Start for repair, EVA-AL10_M00A085_Board Software_inc_testpoint + .App File Flash with Test Point.




Log:

Code:
DC Phoenix 0.0.0.115
user:0132501E


The file was loaded successfully
File size: 3,023,018,536  bytes
Current version(CURVER): EVA_C999B000EMUI5.0
Package Type: OFFLINE_UPDATE

Revision: 0
Checking partition: VERLIST
DC Phoenix 0.0.0.115
user:0132501E

Looking for a device in force upgrade mode
Device detected:
COM12: HUAWEI USB COM 1.0 (COM12)
5/8/2020 9:02:07 PM Starting to write device in FASTBOOT mode...
File to update: EVA-AL10_M00A085_Board Software_inc_testpoint.dgtks
Device detected:
COM12: HUAWEI USB COM 1.0 (COM12)

Process identifier:24323811


Writing bootloader...
Writing EVA-AL10_M00A085_Board Software_inc_testpoint_4.dtwork...
Writing EVA-AL10_M00A085_Board Software_inc_testpoint_5.dtwork...

Waiting for fastboot device...
Device found: JELJRO0262280311


Looking for a device in fastboot mode
Device found: JELJRO0262280311


Getting IMEI...

USB Device REMOVAL
Type: @oem74.inf,%qcomdevice00%;HUAWEI USB COM 1.0
VidPid: VID_12D1&PID_3609
Instance id: 6&24bf3d78&0&2

Getting build number...

USB Device INSERTION
Type: @oem66.inf,%hwfastboot%;Android Sooner Single ADB Interface
VidPid: VID_18D1&PID_D00D
Instance id: JELJRO0262280311

Getting model ...
Getting battery state...
Getting backdoor info...
Getting lock state info...
Getting lock boot info...

IMEI:868445025192632

IMEI1:868445025210855
Build number: :HLEVAAL10M00A061
Model: HUAWEI
Battery state: 3269mv
OEM lock state info:
 FB LockState: UNLOCKED
 USER LockState: LOCKED
OEM get bootinfo:
 unlocked


Erasing ver .. .
Cannot get FBlock info from device
Trying to unlock device...

Signing process may take few minutes

Trying to get data from server
Waiting in queue for signing service. Expected time 1 second(s) to get data from server

Trying to get data from server

Erasing ver .. .

Erasing nvme partition
Partition nvme erased

Erasing cust partition
Partition cust erased

Erasing misc partition
Partition misc erased

Erasing userdata partition
Partition userdata erased
xloaderpartition is not written because is in the APP file

Writing ptable partition
ptable partition UPDATE ...OK
fastbootpartition is not written because is in the APP file
dtspartition is not written because is in the APP file
fw_lpm3partition is not written because is in the APP file
sensorhubpartition is not written because is in the APP file
fw_hifipartition is not written because is in the APP file
teeospartition is not written because is in the APP file
recoverypartition is not written because is in the APP file
cachepartition is not written because is in the APP file
bootpartition is not written because is in the APP file

Writing nvme partition
nvme partition UPDATE ...OK
trustfirmwarepartition is not written because is in the APP file
modempartition is not written because is in the APP file
modem_dtbpartition is not written because is in the APP file
modemnvm_updatepartition is not written because is in the APP file
modem_dsppartition is not written because is in the APP file

Writing modem_om partition
modem_om partition UPDATE ...OK

Writing modemnvm_img partition
modemnvm_img partition UPDATE ...OK
3rdmodempartition is not written because is in the APP file

Writing 3rdmodemnvm partition
3rdmodemnvm partition UPDATE ...OK

Writing 3rdmodemnvmbkp partition
3rdmodemnvmbkp partition UPDATE ...OK
userdatapartition is not written because is in the APP file
systempartition is not written because is in the APP file

Writing splash2 partition
splash2 partition UPDATE ...OK

Writing frp partition
frp partition UPDATE ...OK

Erasing cust partition
Partition cust erased
Writing cust partition
cust partition UPDATE ...OK

Writing secure_storage partition
secure_storage partition UPDATE ...OK
Software written
5/8/2020 9:02:45 PM Writing device finished OK

Looking for a device in fastboot mode
Device found: JELJRO0262280311


Getting IMEI...
Getting build number...
Getting model ...
Getting battery state...
Getting backdoor info...
Getting lock state info...
Getting lock boot info...

IMEI:868445025192632

IMEI1:868445025210855
Build number: :HLEVAAL10M00A061
Model: HUAWEI
Battery state: 3290mv
OEM lock state info:
 FB LockState: UNLOCKED
 USER LockState: LOCKED
OEM get bootinfo:
 unlocked


5/8/2020 9:02:47 PM Starting to write device in FASTBOOT mode...
File size: 3,023,018,536  bytes
Current version(CURVER): EVA_C999B000EMUI5.0


Looking for a device in fastboot mode
Device found: JELJRO0262280311


Getting IMEI...
Getting build number...
Getting model ...
Getting battery state...
Getting backdoor info...
Getting lock state info...
Getting lock boot info...

IMEI:868445025192632

IMEI1:868445025210855
Build number: :HLEVAAL10M00A061
Model: HUAWEI
Battery state: 3301mv
OEM lock state info:
 FB LockState: UNLOCKED
 USER LockState: LOCKED
OEM get bootinfo:
 unlocked


Process identifier:24323825


Erasing ver .. .
Cannot get FBlock info from device
Trying to unlock device...

Signing process may take few minutes

Trying to get data from server
Waiting in queue for signing service. Expected time 1 second(s) to get data from server

Trying to get data from server

Erasing ver .. .

Writing XLOADER partition
XLOADER partition UPDATE ...OK

Writing FW_LPM3 partition
FW_LPM3 partition UPDATE ...OK

Writing FASTBOOT partition
FASTBOOT partition UPDATE ...OK

Writing MODEMNVM_UPDATE partition
MODEMNVM_UPDATE partition UPDATE ...OK

Writing TEEOS partition
TEEOS partition UPDATE ...OK

Writing TRUSTFIRMWARE partition
TRUSTFIRMWARE partition UPDATE ...OK

Writing SENSORHUB partition
SENSORHUB partition UPDATE ...OK

Writing FW_HIFI partition
FW_HIFI partition UPDATE ...OK

Writing BOOT partition
BOOT partition UPDATE ...OK

Writing RECOVERY partition
RECOVERY partition UPDATE ...OK

Writing RECOVERY2 partition
RECOVERY2 partition UPDATE ...OK

Writing DTS partition
DTS partition UPDATE ...OK

Writing MODEM partition
MODEM partition UPDATE ...OK

Writing MODEM_DSP partition
MODEM_DSP partition UPDATE ...OK

Writing 3RDMODEM partition
3RDMODEM partition UPDATE ...OK

Erasing CACHE partition
Partition CACHE erased
Writing CACHE partition
CACHE partition UPDATE ...OK

Writing SYSTEM partition
sending sparse file 468430804 bytes
Waiting for answer...
send sparse file OK
sending sparse file 470999444 bytes
Waiting for answer...
send sparse file OK
sending sparse file 450337680 bytes
Waiting for answer...
send sparse file OK
sending sparse file 466604900 bytes
Waiting for answer...
send sparse file OK
sending sparse file 153306396 bytes
Waiting for answer...
send sparse file OK
SYSTEM partition UPDATE ...OK

Writing MODEM_DTB partition
MODEM_DTB partition UPDATE ...OK

Erasing USERDATA partition
Partition USERDATA erased
Writing USERDATA partition
USERDATA partition UPDATE ...OK
Software written
5/8/2020 9:06:04 PM Writing device finished OK

Waiting for fastboot device...

USB Device REMOVAL
Type: @oem66.inf,%hwfastboot%;Android Sooner Single ADB Interface
VidPid: VID_18D1&PID_D00D
Instance id: JELJRO0262280311


USB Device INSERTION
Type: @oem66.inf,%hwfastboot%;Android Sooner Single ADB Interface
VidPid: VID_18D1&PID_D00D
Instance id: JELJRO0262280311

Device found: JELJRO0262280311

File size: 3,023,018,536  bytes
Current version(CURVER): EVA_C999B000EMUI5.0
Writing rescue_recovery partition
rescue_recovery partition UPDATE ...OK

USB Device REMOVAL
Type: @oem66.inf,%hwfastboot%;Android Sooner Single ADB Interface
VidPid: VID_18D1&PID_D00D
Instance id: JELJRO0262280311

Looking for device in upgrade mode...

USB Device INSERTION
Type: @oem70.inf,%busfilter.devicedesc%;USB Composite Device
VidPid: VID_12D1&PID_107E
Instance id: JELJRO0262280311

Looking for device in upgrade mode...
COM15: Android Adapter PCUI (COM15)
COM13: DBAdapter Reserved Interface (COM13)

5/8/2020 9:07:40 PM Starting to write device in UPGRADE mode...
Device found: JELJRO0262280311


Old slow algo NOT selected

5/8/2020 9:07:43 PM start to write update APP file
File to update: EVA-L19C185B403 .APP
File size: 3,023,018,536  bytes
Current version(CURVER): EVA_C999B000EMUI5.0

Process identifier:24323880

Validating file...
Looking for attached port...
Preparing to write...
Writing file 1 of 27: SHA256RSA...
Writing file 1 of 27: SHA256RSA...OK
Writing file 2 of 27: CRC...
Writing file 2 of 27: CRC...OK
Writing file 3 of 27: CURVER...
Writing file 3 of 27: CURVER...OK
Writing file 4 of 27: VERLIST...
Writing file 4 of 27: VERLIST...OK
Writing file 5 of 27: PACKAGE_TYPE...
Writing file 5 of 27: PACKAGE_TYPE...OK
Writing file 6 of 27: EFI...
Writing file 6 of 27: EFI...OK
Writing file 7 of 27: XLOADER...
Writing file 7 of 27: XLOADER...OK
Writing file 8 of 27: FW_LPM3...
Writing file 8 of 27: FW_LPM3...OK
Writing file 9 of 27: FASTBOOT...
Writing file 9 of 27: FASTBOOT...OK
Writing file 10 of 27: MODEMNVM_UPDATE...
Writing file 10 of 27: MODEMNVM_UPDATE...OK
Writing file 11 of 27: TEEOS...
Writing file 11 of 27: TEEOS...OK
Writing file 12 of 27: TRUSTFIRMWARE...
Writing file 12 of 27: TRUSTFIRMWARE...OK
Writing file 13 of 27: SENSORHUB...
Writing file 13 of 27: SENSORHUB...OK
Writing file 14 of 27: FW_HIFI...
Writing file 14 of 27: FW_HIFI...OK
Writing file 15 of 27: BOOT...
Writing file 15 of 27: BOOT...OK
Writing file 16 of 27: RECOVERY...
Writing file 16 of 27: RECOVERY...OK
Writing file 17 of 27: RECOVERY2...
Writing file 17 of 27: RECOVERY2...OK
Writing file 18 of 27: DTS...
Writing file 18 of 27: DTS...OK
Writing file 19 of 27: MODEM...
Writing file 19 of 27: MODEM...OK
Writing file 20 of 27: MODEM_DSP...
Writing file 20 of 27: MODEM_DSP...OK
Writing file 21 of 27: 3RDMODEM...
Writing file 21 of 27: 3RDMODEM...OK
Writing file 22 of 27: CACHE...
Writing file 22 of 27: CACHE...OK
Writing file 23 of 27: SYSTEM...
Writing file 23 of 27: SYSTEM...OK
Writing file 24 of 27: MODEM_DTB...
Writing file 24 of 27: MODEM_DTB...OK
Writing file 25 of 27: VENDOR...
Writing file 25 of 27: VENDOR...OK
Writing file 26 of 27: PRODUCT...
Writing file 26 of 27: PRODUCT...OK
Writing file 27 of 27: USERDATA...
Writing file 27 of 27: USERDATA...OK
Software written
5/8/2020 9:11:58 PM Writing device finished OK



Must be completely Umts Repair.




Log:


Code:
5/8/2020 9:34:26 PM
HCU Client   v1.0.0.0353
Account: 0132501E

Before detection connect cable to usb and enable Manufacture mode !

Qualcomm and HiSilicon: *#*#2846579#*#*
MTK: *#*#14789632#*#*
Windows: ##2846579#

ProjectMenu
1.Background setting
2.USB ports setting
Select Manufacture mode

Repair

2020-05-08 21:34:26.947 Autodetect COM port and phone type start!
2020-05-08 21:34:29.724 Found COM port: COM15
2020-05-08 21:34:29.724 Found phone type: Huawei Android phone (HiSilicon CPU)
New IMEI 1 : 868445025192632
New IMEI 2 : 868445025210855
New Bluetooth MAC : 54:BA:D6:22:AE:79
New WiFi MAC : 54:BA:D6:22:AA:7C
New SN : DYN6R19827000640
New PCB SN : JELJRO0262280311
New Vendor : hw
New Country : meafnaf
New Model : EVA-L19
2020-05-08 21:34:30.036 Open COM port COM15 (Android Adapter PCUI (COM15))...
2020-05-08 21:34:30.239 Connecting to server...
2020-05-08 21:34:31.019 Connected!
2020-05-08 21:34:37.477 CP State: ready
2020-05-08 21:34:37.477 Read phone basic info...
2020-05-08 21:34:39.303 Read phone secure info...

2020-05-08 21:34:49.645 Phone info data backup saved to file D:\Software\DC unlocker\HCU_322\Backup\20200508_213449_868445025192632.BAK

2020-05-08 21:34:50.176 Read from server...
2020-05-08 21:34:50.737 Read from server success!
2020-05-08 21:34:53.764 Read from server...
2020-05-08 21:34:54.138 Read from server success!
2020-05-08 21:34:54.154 Writing SN...
2020-05-08 21:34:54.201 Write SN success!
2020-05-08 21:34:54.575 Phone secure identify start
2020-05-08 21:35:01.751 Phone secure identify success!
2020-05-08 21:35:01.767 Writing MAC...
2020-05-08 21:35:04.372 Read from server...
2020-05-08 21:35:04.855 Read from server success!
2020-05-08 21:35:05.323 Write MAC success!
2020-05-08 21:35:05.401 Writing IMEI 1 start
2020-05-08 21:35:06.010 Reading from server...
2020-05-08 21:35:08.866 Read from server success!
2020-05-08 21:35:09.880 Write IMEI  success!
2020-05-08 21:35:09.895 Writing IMEI 2 start
2020-05-08 21:35:12.126 Reading from server...
2020-05-08 21:35:13.187 Read from server success!
2020-05-08 21:35:14.185 Write IMEI  success!
2020-05-08 21:35:16.806 Writing Vendor and Country...
2020-05-08 21:35:16.806 Read from server...
2020-05-08 21:35:17.258 Read from server success!
2020-05-08 21:35:17.695 Writing Vendor and Country success!
2020-05-08 21:35:17.695 Writing device model...
2020-05-08 21:35:17.711 Read from server...
2020-05-08 21:35:18.101 Read from server success!
2020-05-08 21:35:18.506 Write device model success!
2020-05-08 21:35:18.522 Write SIMCARD mode not supported for this model, skipped!
2020-05-08 21:35:19.130 Synchronize NV...
2020-05-08 21:35:19.630 Synchronize NV success!
2020-05-08 21:35:19.630 Factory reset...
2020-05-08 21:35:22.282 Factory reset success!
2020-05-08 21:35:22.297 Finished!

Reset phone to factory default to complete operation. If reset failed, check if vendor id and country are correct and repeat operation.

Memo log saved to D:\Software\DC unlocker\HCU_322\Logs\20200508_213522_HCU_RepairUmts_ELJRO0262280311.txt

After Reflash App with customization file.


Log


Code:
DC Phoenix 0.0.0.115
user:0132501E

Looking for a device in upgrade mode
COM18: DBAdapter Reserved Interface (COM18)
COM17: Android Adapter PCUI (COM17)

5/8/2020 9:44:37 PM Starting to write device in UPGRADE mode...
Device found: DYN6R19827000640


Old slow algo NOT selected

5/8/2020 9:44:40 PM start to write update file
File to update: EVA-L19C185B403 .APP
File size: 3,023,018,536  bytes
Current version(CURVER): EVA_C999B000EMUI5.0

Process identifier:24324357

Validating file...
Looking for attached port...
Preparing to write...
Writing file 1 of 27: SHA256RSA...OK
Writing file 2 of 27: CRC...OK
Writing file 3 of 27: CURVER...OK
Writing file 4 of 27: VERLIST...OK
Writing file 5 of 27: PACKAGE_TYPE...OK
Writing file 6 of 27: EFI...OK
Writing file 7 of 27: XLOADER...OK
Writing file 8 of 27: FW_LPM3...OK
Writing file 9 of 27: FASTBOOT...OK
Writing file 10 of 27: MODEMNVM_UPDATE...OK
Writing file 11 of 27: TEEOS...OK
Writing file 12 of 27: TRUSTFIRMWARE...OK
Writing file 13 of 27: SENSORHUB...OK
Writing file 14 of 27: FW_HIFI...OK
Writing file 15 of 27: BOOT...OK
Writing file 16 of 27: RECOVERY...OK
Writing file 17 of 27: RECOVERY2...OK
Writing file 18 of 27: DTS...OK
Writing file 19 of 27: MODEM...OK
Writing file 20 of 27: MODEM_DSP...OK
Writing file 21 of 27: 3RDMODEM...OK
Writing file 22 of 27: CACHE...OK
Writing file 23 of 27: SYSTEM...OK
Writing file 24 of 27: MODEM_DTB...OK
Writing file 25 of 27: VENDOR...OK
Writing file 26 of 27: PRODUCT...OK
Writing file 27 of 27: USERDATA...OK
Software written

5/8/2020 9:48:52 PM start to update cust file
File to update: update_EVA-L19_hw_meafnaf.app
File size: 1,501,650,960  bytes
Current version(CURVER): EVA_C999B000EMUI5.0

Process identifier:24324403

Validating file...
Looking for attached port...
Preparing to write...
Writing file 1 of 9: SHA256RSA...OK
Writing file 2 of 9: CRC...OK
Writing file 3 of 9: CURVER...OK
Writing file 4 of 9: VERLIST...OK
Writing file 5 of 9: PACKAGE_TYPE...OK
Writing file 6 of 9: EFI...OK
Writing file 7 of 9: CUST...OK
Writing file 8 of 9: VERSION...OK
Writing file 9 of 9: USERDATA...OK
Software written
5/8/2020 9:52:18 PM Writing device finished OK








Boot-loader Unlocked warning fixed





Log



Code:
5/8/2020 9:59:42 PM
HCU Client   v1.0.0.0353
Account: 0132501E

Before detection connect cable to usb and enable Manufacture mode !

Qualcomm and HiSilicon: *#*#2846579#*#*
MTK: *#*#14789632#*#*
Windows: ##2846579#

ProjectMenu
1.Background setting
2.USB ports setting
Select Manufacture mode

Lock Bootloader

2020-05-08 21:59:42.529 Autodetect COM port and phone type start!
2020-05-08 21:59:45.305 Found COM port: COM17
2020-05-08 21:59:45.321 Found phone type: Huawei Android phone (HiSilicon CPU)
2020-05-08 21:59:45.586 Open COM port COM17 (Android Adapter PCUI (COM17))...
2020-05-08 21:59:48.035 Connecting to server...
2020-05-08 21:59:48.862 Connected!
2020-05-08 22:00:06.755 CP State: ready
2020-05-08 22:00:06.755 Read phone basic info...
2020-05-08 22:00:08.659 Read phone secure info...

2020-05-08 22:00:18.970 Phone info data backup saved to file D:\Software\DC unlocker\HCU_322\Backup\20200508_220018_868445025192632.BAK

2020-05-08 22:00:19.111 Locking bootloader...
2020-05-08 22:00:19.111 Read from server...
2020-05-08 22:00:19.594 Read from server success!
2020-05-08 22:00:19.594 Locking bootloader...
2020-05-08 22:00:22.246 Locking bootloader success!
2020-05-08 22:00:22.621 Lock bootloader success!

Done!

Memo log saved to D:\Software\DC unlocker\HCU_322\Logs\20200508_220022_HCU_LockBoot_868445025192632.txt




Finally repaired & Completely Read Phone info.


Code:
 

5/8/2020 10:19:40 PM
HCU Client   v1.0.0.0353
Account: 0132501E

Before detection connect cable to usb and enable Manufacture mode !

Qualcomm and HiSilicon: *#*#2846579#*#*
MTK: *#*#14789632#*#*
Windows: ##2846579#

ProjectMenu
1.Background setting
2.USB ports setting
Select Manufacture mode

Read phone info

2020-05-08 22:19:40.498 Autodetect COM port and phone type start!
2020-05-08 22:19:41.262 Found COM port: COM17
2020-05-08 22:19:41.262 Found phone type: Huawei Android phone (HiSilicon CPU)
2020-05-08 22:19:41.262 Open COM port COM17 (Android Adapter PCUI (COM17))...
2020-05-08 22:19:41.418 Start read phone info!
2020-05-08 22:19:44.008 Connecting to server...
2020-05-08 22:19:44.772 Connected!
2020-05-08 22:19:57.549 CP State: ready
2020-05-08 22:19:57.549 Read phone basic info...
2020-05-08 22:19:59.452 Read phone secure info...
2020-05-08 22:20:09.779 Read phone info done!

Model: EVA-L19
IMEI: 868445025192632
IMEI2: 868445025210855
IMEI3: 868445025192632
IMEISV: 03
Firmware ver.: NRD90M test-keys
Dataver: EVA-L19C185B403_DATA_EVA-L19_hw_meafnaf
SN: DYN6R19827000640
PCB SN: JELJRO0262280311
WiFi MAC: 54:BA:D6:22:AA:7C
BlueTooth MAC: 54:BA:D6:22:AE:79
Vendor: hw
Country: meafnaf
FASTBOOT:Chipset-austin 5.0.0.3(0GS7)_FASTBOOT
BOOT:Chipset-austin 5.0.0.3(0GS7)_BOOT
RECOVERY:(unknow)
SYSTEM:System 5.0.0.57(1FPN)
MAINVER:NRD90M test-keys
DATAVER:EVA-L19C185B403_DATA_EVA-L19_hw_meafnaf
APTIME:Wed Aug  1 11:18:43 CST 2018
RAM: 3G
eMMC: 32G
eMMC ID: 00000000000000000000000000000000
HUN: 0000000000000000

IMEI 1 Sim Lock status:
NET: unlocked
NETSUB: unlocked
SP: unlocked

2020-05-08 22:20:09.904 Phone info data backup saved to file D:\Software\DC unlocker\HCU_322\Backup\20200508_222009_868445025192632.BAK


Memo log saved to D:\Software\DC unlocker\HCU_322\Logs\20200508_222009_HCU_ReadInfo_868445025192632.txt
__________________
--------------------------

Use Search Button to get Instant Result | Follow Forum Rules
Avoid Spams in the forum to prevent ban your account.

Last edited by ...:::::NP™:::::...; 05-09-2020 at 02:32.
  Reply With Quote
The Following 4 Users Say Thank You to ...:::::NP™:::::... For This Useful Post:
Show/Hide list of the thanked
Reply

Bookmarks

Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


 



All times are GMT +1. The time now is 11:15.



Powered by Searchlight © 2020 Axivo Inc.
vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2020 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2017 -
Page generated in 0.26095 seconds with 7 queries

SEO by vBSEO