Translate

File Berdonasi-Silahkan Klik Kontak Yang Telah Kami Sediakan

REALME C55 RMX3710 BACKUP ANDROID 14/13 AMT

FILE EMMC DAN FIRMWARE SEMUA ANDROID

REALME C55 RMX3710 BACKUP ANDROID 14/13 AMT
AMT TOOL


REALME C55 RMX3710 BACKUP ANDROID 14/13 AMT.File dibackup menggunkan AMT Tool dalam kondisi normal,file backup ini tersedia dengan 2 variant.yaitu android 14 dan android 13.untuk melihat versi lebih jelas,bisa membaca log.

Android 14 Log:

Searching USB Devices...  OK  ✓
Baseband Version :  [M_V3_P10,M_V3_P10]
Time Zone :  [Asia/Jakarta]
Sim Card :  []
Sim Card :  []
Platform :  [mt6768]
Board Platform :  [mt6768]
Serial Number :  [GYDMRKTOQWSOXO5P]
UTC :  [1743480625]
Display Id :  [RMX3710_14.0.0.1900(EX01)]
Fingerprint :  [realme/RMX3710/REE2ADL1:14/UKQ1.230924.001/T.R4T2.1d3e391-1:user/release-keys]
Code Name :  [RMX3710]
Version :  [T.R4T2.1d3e391-1]
Security Patch :  [2025-04-01]
Android Version :  [14_202411]
Crypto :  [encrypted]
Frp Pst :  [/dev/block/by-name/frp]
Hardware :  [mt6768]
Board :  [RM6769]
Brand :  [realme]
Cpu Abi :  [arm64-v8a]
Cpu Abilist :  [arm64-v8a,armeabi-v7a,armeabi]
Cpu Abilist32 : : [armeabi-v7a,armeabi]
Cpu Abilist64 :  [arm64-v8a]
Soc Model :  [MT6769H]
Platform Mediatek : : [MT6768]
Preload Enable :  [0]
Get Partition :  OK  ✓
Table Save To Folder: \\ Table
 Completed

Log Backup Amt:
Reading device partition information... Ok [128]

Reading [misc]... Ok
Reading [para]... Ok
Reading [oplusreserve1]... Ok
Reading [oplusreserve2]... Ok
Reading [oplusreserve3]... Ok
Reading [oplus_custom]... Ok
Reading [expdb]... Ok
Reading [frp]... Ok
Reading [vbmeta_a]... Ok
Reading [vbmeta_system_a]... Ok
Reading [vbmeta_vendor_a]... Ok
Reading [vbmeta_b]... Ok
Reading [vbmeta_system_b]... Ok
Reading [vbmeta_vendor_b]... Ok
Reading [md_udc]... Ok
Reading [metadata]... Ok
Reading [nvcfg]... Ok
Reading [nvdata]... Ok
Reading [persist]... Ok
Reading [protect1]... Ok
Reading [protect2]... Ok
Reading [seccfg]... Ok
Reading [md1img_a]... Ok
Reading [spmfw_a]... Ok
Reading [scp_a]... Ok
Reading [sspm_a]... Ok
Reading [gz_a]... Ok
Reading [lk_a]... Ok
Reading [boot_a]... Ok
Reading [vendor_boot_a]... Ok
Reading [init_boot_a]... Ok
Reading [dtbo_a]... Ok
Reading [cdt_engineering_a]... Ok
Reading [tee_a]... Ok
Reading [sec1]... Ok
Reading [proinfo]... Ok
Reading [boot_para]... Ok
Reading [nvram]... Ok
Reading [logo]... Ok
Reading [ocdt]... Ok
Reading [splash_odm]... Ok
Reading [md1img_b]... Ok
Reading [spmfw_b]... Ok
Reading [scp_b]... Ok
Reading [sspm_b]... Ok
Reading [gz_b]... Ok
Reading [lk_b]... Ok
Reading [boot_b]... Ok
Reading [vendor_boot_b]... Ok
Reading [init_boot_b]... Ok
Reading [dtbo_b]... Ok
Reading [cdt_engineering_b]... Ok
Reading [tee_b]... Ok
Reading [oplusreserve5]... Ok
Reading [oplusreserve6]... Ok
Reading [param]... Ok
Reading [super]... Ok
Reading [otp]... Ok
Reading [flashinfo]... Ok

Android 13 Log:

Searching USB Devices...  OK  ✓
Operator Gsm Sim :  [XL Axiata,TELKOMSEL]
Baseband Version :  [M_V3_P10,M_V3_P10]
Time Zone :  [Asia/Jakarta]
Sim Card :  [,Telkomsel]
Sim Card :  [,Telkomsel]
Platform :  [mt6768]
Board Platform :  [mt6768]
Serial Number :  [ROPFYLGI6XCUWKLN]
UTC :  [1705459263]
Display Id :  [RMX3710_11_A.65]
Fingerprint :  [realme/RMX3710/REE2ADL1:13/SP1A.210812.016/T.R4T2.15dd1ae_3e425:user/release-keys]
Code Name :  [RMX3710]
Version :  [T.R4T2.15dd1ae_3e425]
Security Patch :  [2024-01-05]
Android Version :  [13_202304]
Crypto :  [encrypted]
Frp Pst :  [/dev/block/by-name/frp]
Hardware :  [mt6768]
Board :  [RM6769]
Brand :  [realme]
Cpu Abi :  [arm64-v8a]
Cpu Abilist :  [arm64-v8a,armeabi-v7a,armeabi]
Cpu Abilist32 : : [armeabi-v7a,armeabi]
Cpu Abilist64 :  [arm64-v8a]
Soc Model :  [MT6769H]
Platform Mediatek : : [MT6768]
Preload Enable :  [0]
Get Partition :  OK  ✓
Table Save To Folder: \\ Table
 Completed

File backup realme c55 android 14 disni Link Google drive
File backup realme c55 android 13 disni Link Google drive
File tidak gratis ya,untuk mendapatkan password silahkan kontak kami disini 50K(Dapat file android 13 dan 14)


Popular posts from this blog

KUPAS TUNTAS GANTI IC EMMC/EMCP/UFS (NEW SECURITY) LANGSUNG ON

FILE KHUSUS GANTI EMMC XIAOMI LANGUNG ON

FILE PREMIUM VIVO Y17 REFURBISH