Posts

INFO BACKUP

FILE EMMC DAN FIRMWARE SEMUA ANDROID INFO BACKUP. File dibackup menggunakan UFI BOX , CM2 DONGLE , UNLOCK TOOL , MTK CLIENT dan tool lainya,,, untuk file scatter hasil backup UNLOCK TOOL tidak bisa digunakan tool lain maka solusinya lakukan edit pada scatternya,jika kesulitan bisa langsung menghubungi kami ADMIN

Translate

File Berdonasi-Silahkan Klik Kontak Yang Telah Kami Sediakan

UNBRICK SAMSUNG A02S EDL MODE

Image
FILE EMMC DAN FIRMWARE SEMUA ANDROID FILE SAMSUNG A02S EDL MODE UNBRICK SAMSUNG A02S EDL MODE. File backupan normal yang bisa digunakan untuk perbaikan Mati total detect port qualcomm 9008,maupun keperluan lain LOG Power Off ...  Edl Mode : Press Hold [Vol Up] + [Vol Down] [or Methode Test Point] Please USB Connect...  Waiting for Edl Mode...  Mode detected: sahara HWID:  0x0009a0e100200000 (MSM_ID:0x0009a0e1,OEM_ID:0x0020,MODEL_ID:0x0000) CPU:  "SDM450" PK HASH:  0xc8c8dd565bf1d8407777a58f8a8e580e00207116e0222c9ab19f3e1f88599034 Serial:  0x7a9c3f03  Storage report: Total Block:  61071360 Block Size:  512 Page Size:  512 Num Physical:  3 Firmware Version:  3 Memory Type:  eMMC PROD NAME:  GX6BAB User Area:  31268536320Bytes Analyzing System,Please WAIT....  Manufacturer : ro.a02q FINGERPRINT : samsung/a02qnnxx/a02q:12/SP1A.210812.016/A025FXXU6CWE2:user/release-keys BUILD ID : SP1A.210812.016 SECURITY PATCH  : 2023-04-01 CPU ABI : armeabi-v7a LOCALE : en-GB Build Description :

FILE PREMIUM OPPO A17 REFURBISH ORI

Image
FILE EMMC DAN FIRMWARE SEMUA ANDROID FILE OPPO A17 READ CM2 DONGLE FILE PREMIUM OPPO A17 REFURBISH ORI. File backup cm2 dongle dalam kondisi normal jaya/original file.bisa digunakan untuk segala kebutuhan seperti smartphone Mati Total,Hang Logo,Bootloop karena permasalah perangkat lunak ( Software ) LOG Manufacturer : ro.ossi FINGERPRINT : oplus/ossi/ossi:12/SP1A.210812.016/1662403365115:user/release-keys BUILD ID : SP1A.210812.016 SECURITY PATCH  : 2022-08-05 CPU ABI : arm64-v8a LOCALE : en-US Build Description : vnd_k65v1_64_bsp-user 12 SP1A.210812.016 1662403365115 release-keys Platform : mt6765 ODM NAME : ossi Manufacturer : ro.ossi CPU ABI : arm64-v8a LOCALE : en-US Build Description : vnd_k65v1_64_bsp-user 12 SP1A.210812.016 1662403365115 release-keys FILE PREMIUM OPPO A17 REFURBISH ORI .Kontak Admin

FILE PREMIUM VIVO Y17 REFURBISH

Image
FILE EMMC DAN FIRMWARE SEMUA ANDROID UFI BOX FILE PREMIUM VIVO Y17 REFURBISH .File kami backup menggunakan ufibox dalam kondisi normal ( OLD SECURITY ) bisa digunakan untuk segala kebutuhan seperti smartphone Mati Total,Hang Logo,Bootloop karena permasalah perangkat lunak ( Software ) LOG AUTH info: MTK, version: 1 Firmware package: Vivo Y17 PD1901F BROM version[1]: 7.2137.0.0 Scanning BootROM or Preloader port... Connecting to BootROM...  Power off the phone, disconnect and reconnect the battery(if possible) and connect USB cable...  Hold the VOL UP to force MediaTek BootROM.  Scanning BootROM or Preloader port... Done  Detected [BootROM]  [VID: 0E8D, PID: 0003] MediaTek USB Port_V1632 (COM6) Connection status: EHCI:HUB:HUB[#1]:USB 1.10 High-Speed   USB Driver: [MediaTek Inc.] wdm_usb:usb2ser.sys, version: 3.0.1504.0, date: 1-22-2015 Connecting Bootrom...  Sending Download Agent...   Keep pressig VOL DOWN + VOL UP until the device sucessfully connected.  DA: MTK_AllInOne_DA.bin   hash

FILE PREMIUM VIVO Y33S REFURBISH,REPLIKA

Image
FILE EMMC DAN FIRMWARE SEMUA ANDROID FILE VIVO Y33S REFURBISH FILE PREMIUM VIVO Y33S REFURBISH,REPLIKA .File backup langsung dari smartphonenya dalam kondisi normal ( OLD SECURITY ) bisa digunakan untuk segala kebutuhan seperti smartphone Mati Total,Hang Logo,Bootloop karena permasalah perangkat lunak ( Software ) LOG Power Off ...  Brom Mode : Press Hold [Vol Up] + [Vol Down] Please USB Connect...   Waiting for Brom Mode....  CPU :  MT6765/MT8768t(Helio P35/G35) HW code:  0x766 ME ID :  D7EA3F148C4B8256C09288F8161E5B2B SOC ID:  78C1394B54D661DBCC0122DD60ABA311CB468083F060B05AD6F90C612F5162AA Loading Payload From :   mt6765_payload.bin, 0x264 bytes   Da Handle :  [LIB]: Device is in BROM mode No preloader given, trying to dump preloader from ram Uploading DA 1 From :   MTK_AllInOne_DA_5.2152.bin Status :  Successfully received DA sync DRAM Config :  1501004448364441 DA Xflash :  DRAM setup passed Sending Emi Data...   Sending emi data succeeded DA Xflash :  Uploading stage 2

FILE PREMIUM VIVO Y30i BACKUP UFI BOX

Image
FILE EMMC DAN FIRMWARE SEMUA ANDROID FILE VIVO Y30I BACKUP UFI FILE PREMIUM VIVO Y30i BACKUP UFI BOX. File kami backup menggunakan ufibox dalam kondisi normal ( OLD SECURITY ) bisa digunakan untuk segala kebutuhan seperti smartphone Mati Total,Hang Logo,Bootloop karena permasalah perangkat lunak ( Software ) Log AUTH info: MTK, version: 1 Firmware package: Y30_PD1987F BROM version[1]: 7.2137.0.0 DA: MTK_AllInOne_DA.bin hash: f5b40a757b95c0d4e4ab1a1fdbb2522750568e6c, size: 528.48 KiB version: 3.3001.2018/03/22022/01/20 00:46:38, start addr: 0x40000800 Connecting to BootROM... Power off the phone, disconnect and reconnect the battery(if possible) and connect USB cable... Hold the VOL UP to force MediaTek BootROM. Scanning BootROM or Preloader port... Done Detected [BootROM]  [VID: 0E8D, PID: 0003] MediaTek USB Port (COM8) Connection status: EHCI:HUB:HUB[#5]:USB 1.10 High-Speed USB Driver: [MediaTek Inc.] wdm_usb, version: 3.0.1504.0, date: 1-22-2016 Connecting Bootrom...  Sending Downloa

FILE PREMIUM OPPO A31 CPH2015(FILE ORI)

Image
FILE EMMC DAN FIRMWARE SEMUA ANDROID FIRMWARE ORI OPPO A31 FILE PREMIUM OPPO A31 CPH2015(FILE ORI). File backupan langsung dari hpnya,yang bisa digunakan untuk perbaikan masalah software. Log: Power Off ...  Brom Mode : Press Hold [Vol Up] + [Vol Down] Please USB Connect...   Waiting for Brom Mode...  Status: Please Connect Mobile ... Device detected    CPU:   MT6765/MT8768t(Helio P35/G35)   HW version: 0x0   WDT: 0x10007000   Uart: 0x11002000   Brom payload addr: 0x100a00   DA payload addr: 0x201000   CQ_DMA addr: 0x10212000   Var1: 0x25  Disabling Watchdog...  HW code: 0x766  Target config: 0xe5   SBC enabled: True   SLA enabled: False   DAA enabled: True   SWJTAG enabled: True   EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False   Root cert required: False   Mem read auth: True   Mem write auth: True   Cmd 0xC8 blocked: True  Get Target info  BROM mode detected.   HW subcode: 0x8a00   HW