حصري سحب فلاشه كوندور l2 sp623 عن طريق eft dongle

amirtech07

عضو
إنضم
31 جويلية 2016
المشاركات
17
مستوى التفاعل
9
النقاط
3
الإقامة
Boumerdes Isserville
بيانات عملية القراءة

كود:
[INDENT][CENTER][FONT=Arial Black][CENTER]Wating Device..........OK
CPU: MT6737T
Chip Version: 0x0000ca00
Chip Ext Clock: EXT_26M
Writing Mode.....
Wating Device..........OK
Internal RAM: 
Internal SRAM Size: 128.00 KB
External RAM: Type DRAM
External Ram Size: 3.00 GB
EMMC: 
EMMC PART BOOT1 Size: 4.00 MB
EMMC PART BOOT2 Size: 4.00 MB
EMMC PART RPMB Size: 4.00 MB
EMMC PART USER Size: 29.12 GB
Battery: 
Battery Voltage: 4309
Injection..........OK
[preloader] BaseAddr(0x00000000) Size(0x00400000)
[pgpt] BaseAddr(0x00000000) Size(0x00080000)
[proinfo] BaseAddr(0x00080000) Size(0x00300000)
[nvram] BaseAddr(0x00380000) Size(0x00500000)
[protect1] BaseAddr(0x00880000) Size(0x00a00000)
[protect2] BaseAddr(0x01280000) Size(0x00a00000)
[lk] BaseAddr(0x01c80000) Size(0x00080000)
[para] BaseAddr(0x01d00000) Size(0x00080000)
[boot] BaseAddr(0x01d80000) Size(0x01000000)
[recovery] BaseAddr(0x02d80000) Size(0x01000000)
[logo] BaseAddr(0x03d80000) Size(0x00800000)
[expdb] BaseAddr(0x04580000) Size(0x00a00000)
[seccfg] BaseAddr(0x04f80000) Size(0x00080000)
[oemkeystore] BaseAddr(0x05000000) Size(0x00200000)
[secro] BaseAddr(0x05200000) Size(0x00600000)
[keystore] BaseAddr(0x05800000) Size(0x00800000)
[tee1] BaseAddr(0x06000000) Size(0x00500000)
[tee2] BaseAddr(0x06500000) Size(0x00500000)
[lk2] BaseAddr(0x06a00000) Size(0x00080000)
[efuse] BaseAddr(0x06a80000) Size(0x00080000)
[frp] BaseAddr(0x06b00000) Size(0x00100000)
[nvdata] BaseAddr(0x06c00000) Size(0x02000000)
[odmdtbo] BaseAddr(0x08c00000) Size(0x01000000)
[metadata] BaseAddr(0x09c00000) Size(0x02400000)
[vendor] BaseAddr(0x0c000000) Size(0x20000000)
[system] BaseAddr(0x2c000000) Size(0x100000000)
[cache] BaseAddr(0x12c000000) Size(0x19000000)
[userdata] BaseAddr(0x145000000) Size(0x601b80000)
[flashinfo] BaseAddr(0x746b80000) Size(0x01000000)
[sgpt] BaseAddr(0x747b80000) Size(0x00080000)
Reading: ...
Reading: CACHE [Size:400.00 MB] .....OK
Reading: USERDATA [Size:24.03 GB] .....OK
Reading: preloader [Size:4.00 MB] .....OK
Reading: pgpt [Size:512.00 KB] .....OK
Reading: proinfo [Size:3.00 MB] .....OK
Reading: nvram [Size:5.00 MB] .....OK
Reading: protect1 [Size:10.00 MB] .....OK
Reading: protect2 [Size:10.00 MB] .....OK
Reading: lk [Size:512.00 KB] .....OK
Reading: para [Size:512.00 KB] .....OK
Reading: boot [Size:16.00 MB] .....OK
Reading: recovery [Size:16.00 MB] .....OK
Reading: logo [Size:8.00 MB] .....OK
Reading: expdb [Size:10.00 MB] .....OK
Reading: seccfg [Size:512.00 KB] .....OK
Reading: oemkeystore [Size:2.00 MB] .....OK
Reading: secro [Size:6.00 MB] .....OK
Reading: keystore [Size:8.00 MB] .....OK
Reading: tee1 [Size:5.00 MB] .....OK
Reading: tee2 [Size:5.00 MB] .....OK
Reading: lk2 [Size:512.00 KB] .....OK
Reading: efuse [Size:512.00 KB] .....OK
Reading: frp [Size:1.00 MB] .....OK
Reading: nvdata [Size:32.00 MB] .....OK
Reading: odmdtbo [Size:16.00 MB] .....OK
Reading: metadata [Size:36.00 MB] .....OK
Reading: vendor [Size:512.00 MB] .....OK
Reading: system [Size:4.00 GB] .....OK
Reading: flashinfo [Size:16.00 MB] .....OK
ROM info.......OK
Product: SPA Condor Electronics
Device Model: Plume L2
ID: Plume_L2
Sw Internal: 
Build Date: Sun Apr 8 18:17:34 CST 2018
Chip Ver: 
Android Version: 8.0.0
Architecture: arm64-v8a
Read Flash (Dump) Done By EFT Dongle[INDENT][INDENT][/INDENT][/INDENT][/CENTER][/FONT][/CENTER][/INDENT]
 
رد: سحب فلاشه كوندور l2 sp623 عن طريق eft dongle

حبذا لو رفعت الفلاشة اخي الكريم لانها مفقودة
 
رد: سحب فلاشه كوندور l2 sp623 عن طريق eft dongle

حبذا لو رفعت الفلاشة اخي الكريم لانها مفقودة

شكرا على عرض التجربة و كما قال الاخ حبدا لو ترفعها
 
رد: سحب فلاشه كوندور l2 sp623 عن طريق eft dongle

ساقوم برفعها اخي على الميديا فاير و هي فول دامب ايضا
 
رد: سحب فلاشه كوندور l2 sp623 عن طريق eft dongle

ربي يجازيك على المجهود المميز
 
رد: سحب فلاشه كوندور l2 sp623 عن طريق eft dongle

Wating Device..........OK
CPU: MT6737T
Chip Version: 0x0000ca00
Chip Ext Clock: EXT_26M
Writing Mode.....
Wating Device..........OK
Internal RAM:
Internal SRAM Size: 128.00 KB
External RAM: Type DRAM
External Ram Size: 3.00 GB
EMMC:
EMMC PART BOOT1 Size: 4.00 MB
EMMC PART BOOT2 Size: 4.00 MB
EMMC PART RPMB Size: 4.00 MB
EMMC PART USER Size: 29.12 GB
Battery:
Battery Voltage: 4309
Injection..........OK
[preloader] BaseAddr(0x00000000) Size(0x00400000)
[pgpt] BaseAddr(0x00000000) Size(0x00080000)
[proinfo] BaseAddr(0x00080000) Size(0x00300000)
[nvram] BaseAddr(0x00380000) Size(0x00500000)
[protect1] BaseAddr(0x00880000) Size(0x00a00000)
[protect2] BaseAddr(0x01280000) Size(0x00a00000)
[lk] BaseAddr(0x01c80000) Size(0x00080000)
[para] BaseAddr(0x01d00000) Size(0x00080000)
[boot] BaseAddr(0x01d80000) Size(0x01000000)
[recovery] BaseAddr(0x02d80000) Size(0x01000000)
[logo] BaseAddr(0x03d80000) Size(0x00800000)
[expdb] BaseAddr(0x04580000) Size(0x00a00000)
[seccfg] BaseAddr(0x04f80000) Size(0x00080000)
[oemkeystore] BaseAddr(0x05000000) Size(0x00200000)
[secro] BaseAddr(0x05200000) Size(0x00600000)
[keystore] BaseAddr(0x05800000) Size(0x00800000)
[tee1] BaseAddr(0x06000000) Size(0x00500000)
[tee2] BaseAddr(0x06500000) Size(0x00500000)
[lk2] BaseAddr(0x06a00000) Size(0x00080000)
[efuse] BaseAddr(0x06a80000) Size(0x00080000)
[frp] BaseAddr(0x06b00000) Size(0x00100000)
[nvdata] BaseAddr(0x06c00000) Size(0x02000000)
[odmdtbo] BaseAddr(0x08c00000) Size(0x01000000)
[metadata] BaseAddr(0x09c00000) Size(0x02400000)
[vendor] BaseAddr(0x0c000000) Size(0x20000000)
[system] BaseAddr(0x2c000000) Size(0x100000000)
[cache] BaseAddr(0x12c000000) Size(0x19000000)
[userdata] BaseAddr(0x145000000) Size(0x601b80000)
[flashinfo] BaseAddr(0x746b80000) Size(0x01000000)
[sgpt] BaseAddr(0x747b80000) Size(0x00080000)
Reading: ...
Reading: CACHE [Size:400.00 MB] .....OK
Reading: USERDATA [Size:24.03 GB] .....OK
Reading: preloader [Size:4.00 MB] .....OK
Reading: pgpt [Size:512.00 KB] .....OK
Reading: proinfo [Size:3.00 MB] .....OK
Reading: nvram [Size:5.00 MB] .....OK
Reading: protect1 [Size:10.00 MB] .....OK
Reading: protect2 [Size:10.00 MB] .....OK
Reading: lk [Size:512.00 KB] .....OK
Reading: para [Size:512.00 KB] .....OK
Reading: boot [Size:16.00 MB] .....OK
Reading: recovery [Size:16.00 MB] .....OK
Reading: logo [Size:8.00 MB] .....OK
Reading: expdb [Size:10.00 MB] .....OK
Reading: seccfg [Size:512.00 KB] .....OK
Reading: oemkeystore [Size:2.00 MB] .....OK
Reading: secro [Size:6.00 MB] .....OK
Reading: keystore [Size:8.00 MB] .....OK
Reading: tee1 [Size:5.00 MB] .....OK
Reading: tee2 [Size:5.00 MB] .....OK
Reading: lk2 [Size:512.00 KB] .....OK
Reading: efuse [Size:512.00 KB] .....OK
Reading: frp [Size:1.00 MB] .....OK
Reading: nvdata [Size:32.00 MB] .....OK
Reading: odmdtbo [Size:16.00 MB] .....OK
Reading: metadata [Size:36.00 MB] .....OK
Reading: vendor [Size:512.00 MB] .....OK
Reading: system [Size:4.00 GB] .....OK
Reading: flashinfo [Size:16.00 MB] .....OK
ROM info.......OK
Product: SPA Condor Electronics
Device Model: Plume L2
ID: Plume_L2
Sw Internal:
Build Date: Sun Apr 8 18:17:34 CST 2018
Chip Ver:
Android Version: 8.0.0
Architecture: arm64-v8a
Read Flash (Dump) Done By EFT Dongle

​اخي نصيحة مني قبل الرفع تاكد من ان الفلاشة سحبت بشكل سليم ثم حدد نوع الفلاشة 16gbام 32gb
 
رد: سحب فلاشه كوندور l2 sp623 عن طريق eft dongle

Wating Device..........OK
CPU: MT6737T
Chip Version: 0x0000ca00
Chip Ext Clock: EXT_26M
Writing Mode.....
Wating Device..........OK
Internal RAM:
Internal SRAM Size: 128.00 KB
External RAM: Type DRAM
External Ram Size: 3.00 GB
EMMC:
EMMC PART BOOT1 Size: 4.00 MB
EMMC PART BOOT2 Size: 4.00 MB
EMMC PART RPMB Size: 4.00 MB
EMMC PART USER Size: 29.12 GB
Battery:
Battery Voltage: 4309
Injection..........OK
[preloader] BaseAddr(0x00000000) Size(0x00400000)
[pgpt] BaseAddr(0x00000000) Size(0x00080000)
[proinfo] BaseAddr(0x00080000) Size(0x00300000)
[nvram] BaseAddr(0x00380000) Size(0x00500000)
[protect1] BaseAddr(0x00880000) Size(0x00a00000)
[protect2] BaseAddr(0x01280000) Size(0x00a00000)
[lk] BaseAddr(0x01c80000) Size(0x00080000)
[para] BaseAddr(0x01d00000) Size(0x00080000)
[boot] BaseAddr(0x01d80000) Size(0x01000000)
[recovery] BaseAddr(0x02d80000) Size(0x01000000)
[logo] BaseAddr(0x03d80000) Size(0x00800000)
[expdb] BaseAddr(0x04580000) Size(0x00a00000)
[seccfg] BaseAddr(0x04f80000) Size(0x00080000)
[oemkeystore] BaseAddr(0x05000000) Size(0x00200000)
[secro] BaseAddr(0x05200000) Size(0x00600000)
[keystore] BaseAddr(0x05800000) Size(0x00800000)
[tee1] BaseAddr(0x06000000) Size(0x00500000)
[tee2] BaseAddr(0x06500000) Size(0x00500000)
[lk2] BaseAddr(0x06a00000) Size(0x00080000)
[efuse] BaseAddr(0x06a80000) Size(0x00080000)
[frp] BaseAddr(0x06b00000) Size(0x00100000)
[nvdata] BaseAddr(0x06c00000) Size(0x02000000)
[odmdtbo] BaseAddr(0x08c00000) Size(0x01000000)
[metadata] BaseAddr(0x09c00000) Size(0x02400000)
[vendor] BaseAddr(0x0c000000) Size(0x20000000)
[system] BaseAddr(0x2c000000) Size(0x100000000)
[cache] BaseAddr(0x12c000000) Size(0x19000000)
[userdata] BaseAddr(0x145000000) Size(0x601b80000)
[flashinfo] BaseAddr(0x746b80000) Size(0x01000000)
[sgpt] BaseAddr(0x747b80000) Size(0x00080000)
Reading: ...
Reading: CACHE [Size:400.00 MB] .....OK
Reading: USERDATA [Size:24.03 GB] .....OK
Reading: preloader [Size:4.00 MB] .....OK
Reading: pgpt [Size:512.00 KB] .....OK
Reading: proinfo [Size:3.00 MB] .....OK
Reading: nvram [Size:5.00 MB] .....OK
Reading: protect1 [Size:10.00 MB] .....OK
Reading: protect2 [Size:10.00 MB] .....OK
Reading: lk [Size:512.00 KB] .....OK
Reading: para [Size:512.00 KB] .....OK
Reading: boot [Size:16.00 MB] .....OK
Reading: recovery [Size:16.00 MB] .....OK
Reading: logo [Size:8.00 MB] .....OK
Reading: expdb [Size:10.00 MB] .....OK
Reading: seccfg [Size:512.00 KB] .....OK
Reading: oemkeystore [Size:2.00 MB] .....OK
Reading: secro [Size:6.00 MB] .....OK
Reading: keystore [Size:8.00 MB] .....OK
Reading: tee1 [Size:5.00 MB] .....OK
Reading: tee2 [Size:5.00 MB] .....OK
Reading: lk2 [Size:512.00 KB] .....OK
Reading: efuse [Size:512.00 KB] .....OK
Reading: frp [Size:1.00 MB] .....OK
Reading: nvdata [Size:32.00 MB] .....OK
Reading: odmdtbo [Size:16.00 MB] .....OK
Reading: metadata [Size:36.00 MB] .....OK
Reading: vendor [Size:512.00 MB] .....OK
Reading: system [Size:4.00 GB] .....OK
Reading: flashinfo [Size:16.00 MB] .....OK
ROM info.......OK
Product: SPA Condor Electronics
Device Model: Plume L2
ID: Plume_L2
Sw Internal:
Build Date: Sun Apr 8 18:17:34 CST 2018
Chip Ver:
Android Version: 8.0.0
Architecture: arm64-v8a
Read Flash (Dump) Done By EFT Dongle

​اخي نصيحة مني قبل الرفع تاكد من ان الفلاشة سحبت بشكل سليم ثم حدد نوع الفلاشة 16gbام 32gb

EMMC PART USER Size: 29.12 GB 32go
 
رد: سحب فلاشه كوندور l2 sp623 عن طريق eft dongle

السلام عليكم

بارك الله فيك الله يرحم والديك الكريمين شكراً لك
 
رد: سحب فلاشه كوندور l2 sp623 عن طريق eft dongle

جزاك الله خيرا اخي في انتضار الرفع
 
رد: سحب فلاشه كوندور l2 sp623 عن طريق eft dongle

بارك الله فيك أخي
 
رد: سحب فلاشه كوندور l2 sp623 عن طريق eft dongle

السلام عليكم

مشكور لمرة الثانية بارك الله فيك يا أخي
 
رد: سحب فلاشه كوندور l2 sp623 عن طريق eft dongle

بارك الله فيك على الفلاشة جاري التجريب
 
رد: سحب فلاشه كوندور l2 sp623 عن طريق eft dongle

كلمة السر من فضلك
 
رد: سحب فلاشه كوندور l2 sp623 عن طريق eft dongle

كلمة السر : Mobilecity
 
التعديل الأخير:
رد: سحب فلاشه كوندور l2 sp623 عن طريق eft dongle

بارك الله فيك اخي الكريم على الموضوع الحصري و المميز
 
رد: سحب فلاشه كوندور l2 sp623 عن طريق eft dongle

السلام عليكم

بارك الله فيك

لقد تم تصحيح الباسورد

كلمة السر

Condor Plume L2 MT6737T 32 GB

مشاهدة المرفق كلمة السر.txt
 
التعديل الأخير:
عودة
أعلى