Saturday, November 26, 2022

File/Firmware Oppo A31 CPH2015 Backup Normal-Link Google Drive

Ketua Teknisi HP (Official)

File/Firmware Oppo A31  CPH2015 Backup Normal-Link Google Drive
MTK Sourch (RIBAK TOOL)
File/Firmware Oppo A31  CPH2015 Backup Normal-Link Google Drive.File kami backup menggunakan Ribak- Tool dalam kondisi smartphone normal jaya.manakala ini dibutuhkan untuk sesuatu,silahkan unduh filenya dengan gratis... 

Support Preloader:


EMIInfo{0x0}:150100444436384D42:0x15:Samsung:DD68MB:0x0:BGA (Discrete embedded):DRAM:MCP(eMMC+LPDR4X):3.00GB
EMIInfo{0x1}:13014E53304A394B39:0x13:Micron:S0J9K9:0x4e:BGA (Discrete embedded):DRAM:MCP(eMMC+LPDR4X):4.00GB
EMIInfo{0x2}:150100445636444D42:0x15:Samsung:DV6DMB:0x0:BGA (Discrete embedded):DRAM:MCP(eMMC+LPDR4X):4.00GB
EMIInfo{0x3}:13014E47314A395238:0x13:Micron:G1J9R8:0x4e:BGA (Discrete embedded):DRAM:MCP(eMMC+LPDR4X):4.00GB
EMIInfo{0x4}:90014A68423861503E:0x90:SkHynix:hB8aP>:0x4a:BGA (Discrete embedded):DRAM:MCP(eMMC+LPDR4X):3.00GB
EMIInfo{0x5}:90014A684339615033:0x90:SkHynix:hC9aP3:0x4a:BGA (Discrete embedded):DRAM:MCP(eMMC+LPDR4X):4.00GB
EMIInfo{0x6}:150100444836444142:0x15:Samsung:DH6DAB:0x0:BGA (Discrete embedded):DRAM:MCP(eMMC+LPDR4X):4.00GB
EMIInfo{0x7}:90014A684445615033:0x90:SkHynix:hDEaP3:0x4a:BGA (Discrete embedded):DRAM:MCP(eMMC+LPDR4X):6.00GB
EMIInfo{0x8}:150100335636434142:0x15:Samsung:3V6CAB:0x0:BGA (Discrete embedded):DRAM:MCP(eMMC+LPDR4X):6.00GB
EMIInfo{0x9}:13014E47314A395339:0x13:Micron:G1J9S9:0x4e:BGA (Discrete embedded):DRAM:MCP(eMMC+LPDR4X):4.00GB

Log Info:

Power Off ... 
Brom Mode : Press Hold [Vol Up] + [Vol Down]
Please USB Connect... 
 Waiting for Brom Mode...
 Status: Please Connect Mobile
... Device detected 
  CPU:   MT6765/MT8768t(Helio P35/G35)
  HW version: 0x0
  WDT: 0x10007000
  Uart: 0x11002000
  Brom payload addr: 0x100a00
  DA payload addr: 0x201000
  CQ_DMA addr: 0x10212000
  Var1: 0x25
 Disabling Watchdog...
 HW code: 0x766
 Target config: 0xe5
  SBC enabled: True
  SLA enabled: False
  DAA enabled: True
  SWJTAG enabled: True
  EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False
  Root cert required: False
  Mem read auth: True
  Mem write auth: True
  Cmd 0xC8 blocked: True
 Get Target info
 BROM mode detected.
  HW subcode: 0x8a00
  HW Ver: 0xca00
  SW Ver: 0x0
 ME_ID:   0A9071739589DA63CBDBB0EEDCCBAFCE
 SOC_ID:   B1D8ECF198BC8043625344474D97B14A67A33583369C79A6578DB9BF568680EA
 Device detected 
 Uploading xflash stage 1 from MTK_AllInOne_DA_5.2152.bin
 Successfully uploaded stage 1, jumping ..
 Jumping to 0x200000
 Jumping to 0x200000: ok.
 Successfully received DA sync
 DRAM config needed for : 13014e53304a394b
 Sending emi data ...
 DRAM setup passed.
 Sending emi data succeeded.
 Uploading stage 2...
 Upload data was accepted. Jumping to stage 2...
 Successfully uploaded stage 2
 EMMC FWVer:      0x0
 EMMC ID:         S0J9K9
 EMMC CID:        13014e53304a394b391017d6b7b71757
 EMMC Boot1 Size: 0x400000
 EMMC Boot2 Size: 0x400000
 EMMC GP1 Size:   0x0
 EMMC GP2 Size:   0x0
 EMMC GP3 Size:   0x0
 EMMC GP4 Size:   0x0
 EMMC RPMB Size:  0x1000000
 EMMC USER Size:  0x1d1f000000
 HW-CODE:          0x766
 HWSUB-CODE:       0x8A00
 HW-VERSION:       0xCA00
 SW-VERSION:       0x0
 CHIP-EVOLUTION:   0x0
 DA-VERSION:       1.0
 Upload data was accepted. Jumping to stage 2...
 DA Extensions successfully added
UserArea: 125074145280kb
Sectors: 244285440
MediaTek DA USB VCOM (Android) (COM25)
Get System Information...
BUILD ID : PPR1.180610.011
SECURITY PATCH : 2022-01-05
CPU ABI : arm64-v8a
CPU ABILIST : arm64-v8a,armeabi-v7a,armeabi
CPU ABILIST32 : armeabi-v7a,armeabi
CPU ABILIST64 : arm64-v8a
Manufacturer : OPPO
LOCALE : en-US
Build Description : full_oppo6765_19581-user 9 PPR1.180610.011 eng.root.20220107.130753 release-keys
BRAND : OPPO
MODEL : CPH2015
NAME : CPH2015
BUILD : OPPO/CPH2015/OP4C7D:9/PPR1.180610.011/1576852138:user/release-keys
Executing Finish
finished. total time: 0 minutes ~ 19 seconds
WARNING!!!
***************************
Backup Before Doing Any Work
Save To Folder: \\C:\Users\service emmc\Desktop\FILE BACKUPAN\Oppo A31
Power Off ... 
Brom Mode : Press Hold [Vol Up] + [Vol Down]
Please USB Connect... 
 Waiting for Brom Mode...
 Status: Please Connect Mobile
... Device detected 
  CPU:   MT6765/MT8768t(Helio P35/G35)
  HW version: 0x0
  WDT: 0x10007000
  Uart: 0x11002000
  Brom payload addr: 0x100a00
  DA payload addr: 0x201000
  CQ_DMA addr: 0x10212000
  Var1: 0x25
 Disabling Watchdog...
 HW code: 0x766
 Target config: 0xe5
  SBC enabled: True
  SLA enabled: False
  DAA enabled: True
  SWJTAG enabled: True
  EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False
  Root cert required: False
  Mem read auth: True
  Mem write auth: True
  Cmd 0xC8 blocked: True
 Get Target info
 BROM mode detected.
  HW subcode: 0x8a00
  HW Ver: 0xca00
  SW Ver: 0x0
 ME_ID:   0A9071739589DA63CBDBB0EEDCCBAFCE
 SOC_ID:   B1D8ECF198BC8043625344474D97B14A67A33583369C79A6578DB9BF568680EA
 Device detected 
 Uploading xflash stage 1 from MTK_AllInOne_DA_5.2152.bin
 Successfully uploaded stage 1, jumping ..
 Jumping to 0x200000
 Jumping to 0x200000: ok.
 Successfully received DA sync
 DRAM config needed for : 13014e53304a394b
 Sending emi data ...
 DRAM setup passed.
 Sending emi data succeeded.
 Uploading stage 2...
 Upload data was accepted. Jumping to stage 2...
 Successfully uploaded stage 2
 EMMC FWVer:      0x0
 EMMC ID:         S0J9K9
 EMMC CID:        13014e53304a394b391017d6b7b71757
 EMMC Boot1 Size: 0x400000
 EMMC Boot2 Size: 0x400000
 EMMC GP1 Size:   0x0
 EMMC GP2 Size:   0x0
 EMMC GP3 Size:   0x0
 EMMC GP4 Size:   0x0
 EMMC RPMB Size:  0x1000000
 EMMC USER Size:  0x1d1f000000
 HW-CODE:          0x766
 HWSUB-CODE:       0x8A00
 HW-VERSION:       0xCA00
 SW-VERSION:       0x0
 CHIP-EVOLUTION:   0x0
 DA-VERSION:       1.0
 Upload data was accepted. Jumping to stage 2...
 DA Extensions successfully added
Reading>>> boot_para ...  done
Reading>>> recovery ...  done
Reading>>> para ...  done
Reading>>> opporeserve1 ...  done
Reading>>> opporeserve2 ...  done
Reading>>> opporeserve3 ...  done
Reading>>> oppo_custom ...  done
Reading>>> expdb ...  done
Reading>>> frp ...  done
Reading>>> nvcfg ...  done
Reading>>> nvdata ...  done
Reading>>> metadata ...  done
Reading>>> protect1 ...  done
Reading>>> protect2 ...  done
Reading>>> seccfg ...  done
Reading>>> persist ...  done
Reading>>> sec1 ...  done
Reading>>> proinfo ...  done
Reading>>> md1img ...  done
Reading>>> spmfw ...  done
Reading>>> scp1 ...  done
Reading>>> scp2 ...  done
Reading>>> sspm_1 ...  done
Reading>>> sspm_2 ...  done
Reading>>> gz1 ...  done
Reading>>> gz2 ...  done
Reading>>> nvram ...  done
Reading>>> lk ...  done
Reading>>> lk2 ...  done
Reading>>> boot ...  done
Reading>>> logo ...  done
Reading>>> dtbo ...  done
Reading>>> tee1 ...  done
Reading>>> tee2 ...  done
Reading>>> odm ...  done
Reading>>> vendor ...  done
Reading>>> system ...  done
Reading>>> vbmeta ...  done
Reading>>> cache ...  done
Reading>>> otp ...  done
Reading>>> flashinfo ...  done


Executing Finish
Oppo_A31_ CPH2015.Selamat mencoba dan semoga sukses.Download Juga Firmware Oppo A15 Cloning/Refurbish


Thursday, November 17, 2022

File eMMC/File Dump Realme Narzo 5a-Langsung ON

Ketua Teknisi HP (Official)


File eMMC/File Dump Realme Narzo  5a-Langsung ON
OPPO FIRMWARE & DUMP FILE

File eMMC/File Dump Realme Narzo  5a-Langsung ON.Dump bisa digunakan untuk melakukan pergantian/perbaikan ic emmc pada REALME Narzo...silahkan unduh dengan gratis.

Log:

Manufacturer ID: 0x90 (SK Hynix)
Product name: hC9aP3 (0x684339615033), rev: 0x01, serial number: 0x1039DFEF
Manufacturing date: Mar 2021
CID: 90014A68 43396150 33011039 DFEF381E
CSD: D0270032 8F5903FF FFFFFFEF 8E400042
Device version: 0x4303
Firmware version: 0x32303030
EXT_CSD revision: 1.8 (MMC v5.1) 
Partition info:
Boot1: 4 MiB
Boot2: 4 MiB
RPMB: 16 MiB 
User area: 58.24 GiB(62,537,072,640 bytes)

Info System:

SECURITY PATCH : 2022-05-05
CPU ABILIST : arm64-v8a,armeabi-v7a,armeabi
CPU ABILIST32 : armeabi-v7a,armeabi
CPU ABILIST64 : arm64-v8a
BOARD : oppo6769
PLATFORM : mt6768
FINGERPRINT : alps/vnd_oppo6769/oppo6769:11/RP1A.200720.011/0mp3k6833v164P6:user/release-keys
BRAND : alps
NAME : oppo6769
MODEL : oppo6769
oppo6769(RP1A.200720.011_release-keys-11-RP1A.200720.011)[hC9aP3_1039DFEF].Selamat mencoba dan semoga sukses

File Dump/File eMMC Galaxy A12 SM-A127F

Ketua Teknisi HP (Official).

File Dump/File eMMC Galaxy A12 SM-A127F
FILE EMMC SAMSUNG

File Dump/File eMMC Galaxy A12 SM-A127F.File bisa digunakan untuk melakukan pergantian maupun perbaikan emmc samsung A12  silahkan unduh file dumpnya dengan gratis...

Info System:

FINGERPRINT : samsung/a12snsxx/a12s:11/RP1A.200720.012/A127FXXU4AUK1:user/release-keys
Manufacturer : ro.a12s
BUILD ID : RP1A.200720.012
SECURITY PATCH : 2021-12-01
CPU ABI : arm64-v8a
CPU ABILIST : arm64-v8a,armeabi-v7a,armeabi
CPU ABILIST32 : armeabi-v7a,armeabi
CPU ABILIST64 : arm64-v8a
LOCALE : en-GB
Build Description : a12snsxx-user 11 RP1A.200720.012 A127FXXU4AUK1 release-keys
Platform : universal3830
BUILD : samsung/a12snsxx/a12s:11/RP1A.200720.012/A127FXXU4AUK1:user/release-keys
ODM NAME : a12snsxx
Untuk tata pengisian seperti pada biasanya saja,selamat mencoba dan semoga sukses

Monday, November 14, 2022

File SCATTER & PRELOADER Redmi K40 Gaming/POCO F3 GT (ares)

Ketua Teknisi HP (Official)

File SCATTER & PRELOADER Redmi K40 Gaming/POCO F3 GT (ares)
FILE REMOVE LOCK XIAOMI

File SCATTER & PRELOADER Redmi K40 Gaming/POCO F3 GT (ares).Salah satu fungsi dari pada file scatter dan preloader ini yaitu untuk melakukan Backup-Remove Lock/Pola-Frp (Akun Google)-Mi Cloud dan kebutuhan lain..dimana ketika melakukan eksekusi anda tidak perlu menggunakan Firmware Full.

File ini mempunyai ukuran yang sangat kecil yaitu kisaran 0KB-5MB,jika berkenan silahkan langsung diunduh

Support Preloader:


POCO F3 GT (ares).Download Juga Kumpulan PRELOADER & SCATTER Xiaomi Terbaru,Selamat mencoba dan semoga sukses

File Scatter & Preloader Xiaomi Poco M2 (Shiva)

Ketua Teknisi HP (Official)

File Scatter & Preloader Xiaomi Poco M2 (Shiva)
FILE REMOVE LOCK XIAOMI

File Scatter & Preloader Xiaomi Poco M2 (Shiva).Salah satu fungsi dari pada file scatter dan preloader ini yaitu untuk melakukan Backup-Remove Lock/Pola-Frp (Akun Google)-Mi Cloud dan kebutuhan lain..dimana ketika melakukan eksekusi anda tidak perlu menggunakan Firmware Full.

File ini mempunyai ukuran yang sangat kecil yaitu kisaran 0KB-5MB,jika berkenan silahkan langsung diunduh

Support Preloader:

EMIInfo{0x0}:150100444436384D42:0x15:Samsung:DD68MB:0x0:BGA (Discrete embedded):DRAM:MCP(eMMC+LPDR4X):3.00GB
EMIInfo{0x1}:13014E53304A394A38:0x13:Micron:S0J9J8:0x4e:BGA (Discrete embedded):DRAM:MCP(eMMC+LPDR4X):3.00GB
EMIInfo{0x2}:150100445636444D42:0x15:Samsung:DV6DMB:0x0:BGA (Discrete embedded):DRAM:MCP(eMMC+LPDR4X):4.00GB
EMIInfo{0x3}:150100445036444142:0x15:Samsung:DP6DAB:0x0:BGA (Discrete embedded):DRAM:MCP(eMMC+LPDR4X):4.00GB
EMIInfo{0x4}:13014E47314A395238:0x13:Micron:G1J9R8:0x4e:BGA (Discrete embedded):DRAM:MCP(eMMC+LPDR4X):4.00GB
EMIInfo{0x5}:90014A684445615033:0x90:SkHynix:hDEaP3:0x4a:BGA (Discrete embedded):DRAM:MCP(eMMC+LPDR4X):6.00GB
EMIInfo{0x6}:150100335036434D42:0x15:Samsung:3P6CMB:0x0:BGA (Discrete embedded):DRAM:MCP(eMMC+LPDR4X):6.00GB
EMIInfo{0x7}:13014E47314A395339:0x13:Micron:G1J9S9:0x4e:BGA (Discrete embedded):DRAM:MCP(eMMC+LPDR4X):4.00GB
Poco_m2_(shiva).Download Juga Kumpulan PRELOADER & SCATTER Xiaomi Terbaru,Selamat mencoba dan semoga sukses

BIG PRELOADER Mediatek MT6768-Support Banyak ic eMMC/eMCP

Ketua Teknisi HP (Official)

BIG PRELOADER Mediatek MT6768-Support Banyak ic eMMC/eMCP
Big preloader mt-6765

BIG PRELOADER Mediatek MT6768-Support Banyak ic eMMC/eMCP.Berikut big preloader mediatek mt-MT6768 yang dapat digunakan untuk kegiatan flashing maupun untuk pergantian ic emmc,untuk penjelasan secara rinci tentang big preloader sudah kami jelaskan beberapa tahun lalu bisa menuju kemari Cara Ganti ic eMMC/eMCP Menggunakan Big Preloader Mt6572

Support Preloader

EMIInfo{0x0}:150100335636434D42:0x15:Samsung:3V6CMB:0x0:BGA (Discrete embedded):DRAM:MCP(eMMC+LPDR4X):6.00GB
EMIInfo{0x1}:90014A684445615033:0x90:SkHynix:hDEaP3:0x4a:BGA (Discrete embedded):DRAM:MCP(eMMC+LPDR4X):6.00GB
EMIInfo{0x2}:150100445636444D42:0x15:Samsung:DV6DMB:0x0:BGA (Discrete embedded):DRAM:MCP(eMMC+LPDR4X):4.00GB
EMIInfo{0x3}:13014E53304A394B39:0x13:Micron:S0J9K9:0x4e:BGA (Discrete embedded):DRAM:MCP(eMMC+LPDR4X):4.00GB
EMIInfo{0x4}:13014E47314A395139:0x13:Micron:G1J9Q9:0x4e:BGA (Discrete embedded):DRAM:MCP(eMMC+LPDR4X):6.00GB
EMIInfo{0x5}:13014E47314A395339:0x13:Micron:G1J9S9:0x4e:BGA (Discrete embedded):DRAM:MCP(eMMC+LPDR4X):4.00GB
EMIInfo{0x6}:150100445636444142:0x15:Samsung:DV6DAB:0x0:BGA (Discrete embedded):DRAM:MCP(eMMC+LPDR4X):4.00GB
EMIInfo{0x7}:150100445036444142:0x15:Samsung:DP6DAB:0x0:BGA (Discrete embedded):DRAM:MCP(eMMC+LPDR4X):4.00GB
EMIInfo{0x8}:13014E47314A395238:0x13:Micron:G1J9R8:0x4e:BGA (Discrete embedded):DRAM:MCP(eMMC+LPDR4X):4.00GB
EMIInfo{0x9}:13014E47314331324C:0x13:Micron:G1C12L:0x4e:BGA (Discrete embedded):DRAM:MCP(eMMC+LPDR4X):8.00GB
EMIInfo{0xa}:150100335636434142:0x15:Samsung:3V6CAB:0x0:BGA (Discrete embedded):DRAM:MCP(eMMC+LPDR4X):6.00GB
EMIInfo{0xb}:1501005756364A4D42:0x15:Samsung:WV6JMB:0x0:BGA (Discrete embedded):DRAM:MCP(eMMC+LPDR4X):8.00GB
EMIInfo{0xc}:90014A68433861503E:0x90:SkHynix:hC8aP>:0x4a:BGA (Discrete embedded):DRAM:MCP(eMMC+LPDR4X):4.00GB
EMIInfo{0xd}:150100445036444242:0x15:Samsung:DP6DBB:0x0:BGA (Discrete embedded):DRAM:MCP(eMMC+LPDR4X):4.00GB
EMIInfo{0xe}:150100445636444242:0x15:Samsung:DV6DBB:0x0:BGA (Discrete embedded):DRAM:MCP(eMMC+LPDR4X):4.00GB

Cara penggunaanya seperti biasa,buka spflashtool ( Versi Paling Baru ) masukan file scatter,lihat gambar
Big Preloader MT6765 BGA221 Support Banyak TYPE eMMC
SPFLASHTOOL MEDIATEK
Pilih preloadernya saja,kemudian write/download done,untuk file dan spflashtoolnya bisa di ambil di bawah ini
Sekian,big preloader MT6768 mediatek yang dapat di gunakan untuk kegiatan flashing maupun pergantian ic emmc.Selamat mencoba dan semoga sukses.BACA JUGA Tutorial Ganti ic eMMC/eMCP Tanpa BOX

File Mi Cloud Redmi 9T Globle (Lime)-Fix Sensor

Ketua Teknisi HP (Official)
File Mi Cloud Redmi 9T Globle (Lime)-Fix Sensor
FILE MI CLOUD REMOVE BYPASS CLEAN

File Mi Cloud Redmi 9T Globle (Lime).File bisa digunakan untuk kegiatan penghapusan mi cloud,selain itu file juga bisa digunakan untuk penghapusan frp (Akun Google).silahkan unduh filenya dengan gratis...

Redmi_9T_Globle_(Lime).flash menggunakan Ribak-Tool maupun tool lainya...download juga Kumpulan File Mi Cloud Terbaru.Selamat mencoba dan semoga sukses

File Scatter & Preloader Xiaomi Redmi 10 Prime(Selene)

Ketua Teknisi HP (Official)

File Scatter & Preloader Xiaomi Redmi 10 Prime(Selene)
FILE REMOVE LOCK XIAOMI

File Scatter & Preloader Xiaomi Redmi 10 Prime(Selene).Salah satu fungsi dari pada file scatter dan preloader ini yaitu untuk melakukan Backup-Remove Lock/Pola-Frp (Akun Google),Mi Cloud dan kebutuhan lain..dimana ketika melakukan eksekusi anda tidak perlu menggunakan Firmware Full.

File ini mempunyai ukuran yang sangat kecil yaitu kisaran 0KB-5MB,jika berkenan silahkan langsung diunduh

Support Preloader:

EMIInfo{0x0}:150100444436384D42:0x15:Samsung:DD68MB:0x0:BGA (Discrete embedded):DRAM:MCP(eMMC+LPDR4X):3.00GB
EMIInfo{0x1}:13014E53304A394A38:0x13:Micron:S0J9J8:0x4e:BGA (Discrete embedded):DRAM:MCP(eMMC+LPDR4X):3.00GB
EMIInfo{0x2}:150100445636444D42:0x15:Samsung:DV6DMB:0x0:BGA (Discrete embedded):DRAM:MCP(eMMC+LPDR4X):4.00GB
EMIInfo{0x3}:150100445036444142:0x15:Samsung:DP6DAB:0x0:BGA (Discrete embedded):DRAM:MCP(eMMC+LPDR4X):4.00GB
EMIInfo{0x4}:13014E47314A395238:0x13:Micron:G1J9R8:0x4e:BGA (Discrete embedded):DRAM:MCP(eMMC+LPDR4X):4.00GB
EMIInfo{0x5}:90014A684445615033:0x90:SkHynix:hDEaP3:0x4a:BGA (Discrete embedded):DRAM:MCP(eMMC+LPDR4X):6.00GB
EMIInfo{0x6}:150100335036434D42:0x15:Samsung:3P6CMB:0x0:BGA (Discrete embedded):DRAM:MCP(eMMC+LPDR4X):6.00GB
EMIInfo{0x7}:13014E47314A395339:0x13:Micron:G1J9S9:0x4e:BGA (Discrete embedded):DRAM:MCP(eMMC+LPDR4X):4.00GB
EMIInfo{0x8}:90014A68423861503E:0x90:SkHynix:hB8aP>:0x4a:BGA (Discrete embedded):DRAM:MCP(eMMC+LPDR4X):3.00GB
EMIInfo{0x9}:90014A68433861503E:0x90:SkHynix:hC8aP>:0x4a:BGA (Discrete embedded):DRAM:MCP(eMMC+LPDR4X):4.00GB
EMIInfo{0xa}:90014A68433861503E:0x90:SkHynix:hC8aP>:0x4a:BGA (Discrete embedded):DRAM:MCP(eMMC+LPDR4X):6.00GB
EMIInfo{0xb}:150100445636444142:0x15:Samsung:DV6DAB:0x0:BGA (Discrete embedded):DRAM:MCP(eMMC+LPDR4X):4.00GB
EMIInfo{0xc}:150100335636434142:0x15:Samsung:3V6CAB:0x0:BGA (Discrete embedded):DRAM:MCP(eMMC+LPDR4X):6.00GB
EMIInfo{0xd}:13014E53304A394B39:0x13:Micron:S0J9K9:0x4e:BGA (Discrete embedded):DRAM:MCP(eMMC+LPDR4X):4.00GB
Redmi_10_Prime(selene_in).Download Juga Kumpulan PRELOADER & SCATTER Xiaomi Terbaru,Selamat mencoba dan semoga sukses

File Mi CLoud Redmi Note 8 (Ginkgo)-Fix Sensor

Ketua Teknisi HP (Official)

File Mi CLoud Redmi Note 8 (Ginkgo)-Fix Sensor
FILE MI CLOUD REMOVE BYPASS CLEAN

File Mi CLoud Redmi Note 8 (Ginkgo)-Fix Sensor.File bisa digunakan untuk kegiatan penghapusan mi cloud,selain itu file juga bisa digunakan untuk penghapusan frp (Akun Google).silahkan unduh filenya dengan gratis...

Redmi_note_8_(ginkgo).flash menggunakan Ribak-Tool maupun tool lainya...download juga Kumpulan File Mi Cloud Terbaru.Selamat mencoba dan semoga sukses

File Mi Cloud Redmi Note 9s(Curtana)

Ketua Teknisi HP (Official)
File Mi Cloud Redmi Note 9s(Curtana)
FILE MI CLOUD REMOVE BYPASS CLEAN

File Mi Cloud Redmi Note 9s(Curtana).File bisa digunakan untuk kegiatan penghapusan mi cloud,selain itu file juga bisa digunakan untuk penghapusan frp (Akun Google).silahkan unduh filenya dengan gratis...

Redmi_Note_9s(curtana).flash menggunakan Ribak-Tool maupun tool lainya...download juga Kumpulan File Mi Cloud Terbaru.Selamat mencoba dan semoga sukses

File Mi Cloud Redmi Note 10 pro Max (sweetin)

Ketua Teknisi HP (Official)
File Mi Cloud Redmi Note 10 pro Max (sweetin)
FILE MI CLOUD REMOVE BYPASS CLEAN

File Mi Cloud Redmi Note 10 pro Max (sweetin).File bisa digunakan untuk kegiatan penghapusan mi cloud,selain itu file juga bisa digunakan untuk penghapusan frp (Akun Google).silahkan unduh filenya dengan gratis...

Redmi_Note_10_pro_Max(sweetin).flash menggunakan Ribak-Tool maupun tool lainya...download juga Kumpulan File Mi Cloud Terbaru.Selamat mencoba dan semoga sukses

Sunday, November 13, 2022

File Scatter & Preloader Vivo Y01 v2118-Link 2024

Ketua Teknisi HP (Official)
File Scatter & Preloader Vivo Y01 v2118
FILE SCATTER REMOVE LOCK

File Scatter & Preloader Vivo Y01 v2118.Fungsi dari pada file scatter dan preloader ini yaitu untuk melakukan Backup-Remove Lock/Pola-Frp (Akun Google) dan kebutuhan lain..dimana ketika melakukan eksekusi anda tidak perlu menggunakan Firmware Full.bisa menggunakan Ribak Tool.Sp Flash Tool...maupun tool mediatek lainya...

Support Preloader:

EMIInfo{0x1}:1501003458364B4D42:0x15:Samsung:4X6KMB:0x0:BGA (Discrete embedded):DRAM:MCP(eMMC+LPDR4X):2.00GB
EMIInfo{0x2}:150100445836384D42:0x15:Samsung:DX68MB:0x0:BGA (Discrete embedded):DRAM:MCP(eMMC+LPDR4X):3.00GB
EMIInfo{0x3}:90014A68423861503E:0x90:SkHynix:hB8aP>:0x4a:BGA (Discrete embedded):DRAM:MCP(eMMC+LPDR4X):3.00GB
EMIInfo{0x4}:150100475836424142:0x15:Samsung:GX6BAB:0x0:BGA (Discrete embedded):DRAM:MCP(eMMC+LPDDR3):3.00GB
EMIInfo{0x5}:150100475036424D42:0x15:Samsung:GP6BMB:0x0:BGA (Discrete embedded):DRAM:MCP(eMMC+LPDDR3):3.00GB
EMIInfo{0x6}:13014E47314A395238:0x13:Micron:G1J9R8:0x4e:BGA (Discrete embedded):DRAM:MCP(eMMC+LPDR4X):4.00GB

Info Scatter:

FINGERPRINT : vivo/2020/2120:11/RP1A.200720.012/compiler0119163829:user/release-keys
Manufacturer : ro.2120
BUILD ID : RP1A.200720.012
Build Description : full_k65v1_32_bsp_2g_ago-user 11 RP1A.200720.012 eng.compil.20220119.164147 release-keys
SECURITY PATCH : 2022-01-01
CPU ABI : armeabi-v7a
CPU ABILIST : armeabi-v7a,armeabi
CPU ABILIST32 : armeabi-v7a,armeabi
CPU ABILIST64 : 
LOCALE : en-US
OS : Funtouch OS 11.1 Global
Name : 2120
Model : 2020
Oem : PD2140F_EX PD2140BF_EX PD2140EF_EX PD2140HF_EX PD2140GF_EX PD2140LF_EX
System Product : PD2140F_EX_A_1.13.7
System Hardware : PD2140F_EXMA
Platform : mt6765
BUILD : vivo/2020/2120:11/RP1A.200720.012/compiler0119163829:user/release-keys
ODM NAME : 2020
Tutorial menggunakan ribak tool,bisa insert manual jika brand dan model tidak mendukung...

Tuesday, November 8, 2022

File Backup Mi Pad 4 Clover Sudah UBL

Ketua Teknisi HP (Official)

File Backup Mi Pad 4 Clover Sudah UBL
RIBAK TOOL


File Backup Mi Pad 4 Clover Sudah UBL.File kami backup dari smartphone yang normal jaya yang sudah dalam kondisi ubl mengggunakan Ribak Tool,manakala untuk perbaikan tertentu,silahkan download filenya dengan gratis...

Log:

Operation: Runing
Phone Mode: Edl Mode
Ribak Tool Server: OK
Register: OK
Start Modul: OK
___________________________

Searching Device...OK
Port Device Detect : 11
Connection Status : USB High Speed
Driver Manufacturer : Qualcomm Incorporated

Programmer...
Selected Programmer: CUSTOM XIAOMI
Status>>>... Checking DEVICE


HW Info...
Sending Boot...Device Already On Boot Programing Mode
Authentication Running..
Continue
Authentication

Storage Info
Get System Information...
BUILD : Xiaomi/clover/clover:8.1.0/OPM1.171019.019/V10.3.2.0.ODJCNXM:user/release-keys
BUILD ID : OPM1.171019.019
SECURITY PATCH : 2019-04-01
MODEL : MI PAD 4
BRAND : Xiaomi
NAME : clover
CPU ABI : arm64-v8a
CPU ABILIST : arm64-v8a,armeabi-v7a,armeabi
CPU ABILIST32 : armeabi-v7a,armeabi
CPU ABILIST64 : arm64-v8a
LOCALE : zh-CN
Build Description : clover-user 8.1.0 OPM1.171019.019 V10.3.2.0.ODJCNXM release-keys
Miui Version : V10
Manufacturer : Xiaomi
Platform : sdm660
SIM State : unknown
Scan partition... OK
Identify Succes

Auto Backup Gpt = OK>>> Save To Folder: \\Gpt

finished. total time: 0 minutes ~ 17 seconds

WARNING!!!

***************************
Backup Before Doing Any Work
Operation: Runing
Phone Mode: Edl Mode
Ribak Tool Server: OK
Register: OK
Start Modul: OK
___________________________

Researching Device...OK
Port Device Detect : 11
Connection Status : USB High Speed
Driver Manufacturer : Qualcomm Incorporated

Programmer...
Selected Programmer: CUSTOM XIAOMI
Status>>>... Read Partition


HW Info...
Sending Boot...Device Already On Boot Programing Mode
Authentication Running..
Continue
Authentication
Save To Folder: \\C:\Users\service emmc\Desktop\CLOVER\BACKUP PARTITION
Reading>>> PrimaryGPT ...  OK
finished. total time: 0 minutes ~ 0 seconds
Reading>>> xbl ...  OK
finished. total time: 0 minutes ~ 0 seconds
Reading>>> xblbak ...  OK
finished. total time: 0 minutes ~ 0 seconds
Reading>>> tz ...  OK
finished. total time: 0 minutes ~ 0 seconds
Reading>>> tzbak ...  OK
finished. total time: 0 minutes ~ 0 seconds
Reading>>> rpm ...  OK
finished. total time: 0 minutes ~ 0 seconds
Reading>>> rpmbak ...  OK
finished. total time: 0 minutes ~ 0 seconds
Reading>>> hyp ...  OK
finished. total time: 0 minutes ~ 0 seconds
Reading>>> hypbak ...  OK
finished. total time: 0 minutes ~ 0 seconds
Reading>>> pmic ...  OK
finished. total time: 0 minutes ~ 0 seconds
Reading>>> pmicbak ...  OK
finished. total time: 0 minutes ~ 0 seconds
Reading>>> fsg ...  OK
finished. total time: 0 minutes ~ 0 seconds
Reading>>> boot ...  OK
finished. total time: 0 minutes ~ 2 seconds
Reading>>> system ...  OK
finished. total time: 1 minutes ~ 48 seconds
Reading>>> vendor ...  OK
finished. total time: 1 minutes ~ 10 seconds
Reading>>> keymaster ...  OK
finished. total time: 0 minutes ~ 1 seconds
Reading>>> keymasterbak ...  OK
finished. total time: 0 minutes ~ 0 seconds
Reading>>> cmnlib ...  OK
finished. total time: 0 minutes ~ 0 seconds
Reading>>> cmnlib64 ...  OK
finished. total time: 0 minutes ~ 0 seconds
Reading>>> cmnlibbak ...  OK
finished. total time: 0 minutes ~ 0 seconds
Reading>>> cmnlib64bak ...  OK
finished. total time: 0 minutes ~ 0 seconds
Reading>>> mdtpsecapp ...  OK
finished. total time: 0 minutes ~ 0 seconds
Reading>>> mdtpsecappbak ...  OK
finished. total time: 0 minutes ~ 0 seconds
Reading>>> mdtp ...  OK
finished. total time: 0 minutes ~ 1 seconds
Reading>>> mdtpbak ...  OK
finished. total time: 0 minutes ~ 1 seconds
Reading>>> modem ...  OK
finished. total time: 0 minutes ~ 9 seconds
Reading>>> modembak ...  OK
finished. total time: 0 minutes ~ 9 seconds
Reading>>> dsp ...  OK
finished. total time: 0 minutes ~ 0 seconds
Reading>>> dspbak ...  OK
finished. total time: 0 minutes ~ 0 seconds
Reading>>> abl ...  OK
finished. total time: 0 minutes ~ 0 seconds
Reading>>> ablbak ...  OK
finished. total time: 0 minutes ~ 0 seconds
Reading>>> dip ...  OK
finished. total time: 0 minutes ~ 0 seconds
Reading>>> devinfo ...  OK
finished. total time: 0 minutes ~ 0 seconds
Reading>>> apdp ...  OK
finished. total time: 0 minutes ~ 0 seconds
Reading>>> msadp ...  OK
finished. total time: 0 minutes ~ 0 seconds
Reading>>> dpo ...  OK
finished. total time: 0 minutes ~ 0 seconds
Reading>>> splash ...  OK
finished. total time: 0 minutes ~ 1 seconds
Reading>>> limits ...  OK
finished. total time: 0 minutes ~ 0 seconds
Reading>>> toolsfv ...  OK
finished. total time: 0 minutes ~ 0 seconds
Reading>>> logfs ...  OK
finished. total time: 0 minutes ~ 0 seconds
Reading>>> ddr ...  OK
finished. total time: 0 minutes ~ 0 seconds
Reading>>> sec ...  OK
finished. total time: 0 minutes ~ 0 seconds
Reading>>> bluetooth ...  OK
finished. total time: 0 minutes ~ 0 seconds
Reading>>> bluetoothbak ...  OK
finished. total time: 0 minutes ~ 0 seconds
Reading>>> fsc ...  OK
finished. total time: 0 minutes ~ 0 seconds
Reading>>> ssd ...  OK
finished. total time: 0 minutes ~ 0 seconds
Reading>>> modemst1 ...  OK
finished. total time: 0 minutes ~ 0 seconds
Reading>>> modemst2 ...  OK
finished. total time: 0 minutes ~ 0 seconds
Reading>>> persist ...  OK
finished. total time: 0 minutes ~ 1 seconds
Reading>>> cache ...  OK
finished. total time: 0 minutes ~ 9 seconds
Reading>>> misc ...  OK
finished. total time: 0 minutes ~ 0 seconds
Reading>>> recovery ...  OK
finished. total time: 0 minutes ~ 2 seconds
Reading>>> keystore ...  OK
finished. total time: 0 minutes ~ 0 seconds
Reading>>> devcfg ...  OK
finished. total time: 0 minutes ~ 0 seconds
Reading>>> devcfgbak ...  OK
finished. total time: 0 minutes ~ 0 seconds
Reading>>> frp ...  OK
finished. total time: 0 minutes ~ 0 seconds
Reading>>> logdump ...  OK
finished. total time: 0 minutes ~ 2 seconds
Reading>>> sti ...  OK
finished. total time: 0 minutes ~ 0 seconds
Reading>>> storsec ...  OK
finished. total time: 0 minutes ~ 0 seconds
Reading>>> rawdump ...  OK
finished. total time: 0 minutes ~ 4 seconds
Reading>>> vbmeta ...  OK
finished. total time: 0 minutes ~ 0 seconds
Reading>>> vbmetabak ...  OK
finished. total time: 0 minutes ~ 0 seconds
Reading>>> cust ...  OK
finished. total time: 0 minutes ~ 28 seconds
Reading>>> logo ...  OK
finished. total time: 0 minutes ~ 1 seconds
Created rawprogram xml... OK

Log Saved at: 11/8/2022 2:10:26 PM
Full_Backup_Mi_Pad4_Ribak_Tool.Silahkan flash menggunakan tool qualcomm masing-masing.Selamat mencoba dan semoga sukses

    VIDEO BACKUP MI PAD 4 RIBAK TOOL


Saturday, November 5, 2022

Nvram,Nvdata Vivo Y12S PD2036F Fix BaseBand Fix Sinyal

Ketua Teknisi HP (Official)

Nvram,Nvdata Vivo Y12S PD2036F Fix BaseBand Fix Sinyal
RIBAK TOOL
Nvram,Nvdata Vivo Y12S PD2036F Fix BaseBand Fix Sinyal.File bisa digunakan untuk perbaikan masalah persinyalan seperti Baseband Unknown-Sinyal Tidak ADA dan masalah lain.silahkan unduh dengan gratis...

Support Preloader:

EMIInfo{0x0}:150100445836384D42:0x15:Samsung:DX68MB:0x0:BGA (Discrete embedded):DRAM:MCP(eMMC+LPDR4X):3.00GB
EMIInfo{0x1}:13014E47314A395339:0x13:Micron:G1J9S9:0x4e:BGA (Discrete embedded):DRAM:MCP(eMMC+LPDR4X):4.00GB
EMIInfo{0x2}:150100445636444D42:0x15:Samsung:DV6DMB:0x0:BGA (Discrete embedded):DRAM:MCP(eMMC+LPDR4X):4.00GB
EMIInfo{0x3}:150100444436384D42:0x15:Samsung:DD68MB:0x0:BGA (Discrete embedded):DRAM:MCP(eMMC+LPDR4X):3.00GB
EMIInfo{0x4}:150100444836444142:0x15:Samsung:DH6DAB:0x0:BGA (Discrete embedded):DRAM:MCP(eMMC+LPDR4X):4.00GB
EMIInfo{0x5}:90014A684339615033:0x90:SkHynix:hC9aP3:0x4a:BGA (Discrete embedded):DRAM:MCP(eMMC+LPDR4X):4.00GB
EMIInfo{0x6}:150100445636444142:0x15:Samsung:DV6DAB:0x0:BGA (Discrete embedded):DRAM:MCP(eMMC+LPDR4X):4.00GB
EMIInfo{0x7}:150100445036444142:0x15:Samsung:DP6DAB:0x0:BGA (Discrete embedded):DRAM:MCP(eMMC+LPDR4X):4.00GB

Info Firmware:

Info Rom Target....
FINGERPRINT : vivo/2026/2026:11/RP1A.200720.012/compiler1012154357:user/release-keys
Manufacturer : ro.2026
BUILD ID : RP1A.200720.012
Build Description : full_k65v1_64_bsp-user 11 RP1A.200720.012 eng.compil.20211012.154701 release-keys
SECURITY PATCH : 2021-10-01
CPU ABI : arm64-v8a
CPU ABILIST : arm64-v8a,armeabi-v7a,armeabi
CPU ABILIST32 : armeabi-v7a,armeabi
CPU ABILIST64 : arm64-v8a
LOCALE : en-US
OS : Funtouch OS 11 Global
Name : 2026
Model : 2026
Oem : PD2036F_EX PD2036CF_EX PD2036DF_EX PD2036BF_EX PD2036EF_EX PD2036GF_EX PD2036HF_EX
System Product : PD2036F_EX_A_6.11.0
System Hardware : PD2036F_EXMA
Platform : mt6765
BUILD : vivo/2026/2026:11/RP1A.200720.012/compiler1012154357:user/release-keys
ODM NAME : 2026
NV_Vivo_Y12S PD2036F.Selamat mencoba dan semoga sukses

Friday, November 4, 2022

File Scatter & Big Preloader Vivo Y20G MT-6768

Ketua Teknisi HP (Official)
File Scatter & Big Preloader Vivo Y20G MT-6768
FILE SCATTER REMOVE LOCK

File Scatter & Big Preloader Vivo Y20G MT-6768.File multifungsi yang bisa anda gunakan untuk kegiatan Backup Firmware,Buka Kunci Pola,FRP Akun Google Dan pergantian ic eMMCNYA.., pada list preloader terdapat banyak dukungan jenis emmc,silahkan unduh filenya dengan gratis...

Support Preloader:

EMIInfo{0x0}:150100335636434D42:0x15:Samsung:3V6CMB:0x0:BGA (Discrete embedded):DRAM:MCP(eMMC+LPDR4X):6.00GB
EMIInfo{0x1}:90014A684445615033:0x90:SkHynix:hDEaP3:0x4a:BGA (Discrete embedded):DRAM:MCP(eMMC+LPDR4X):6.00GB
EMIInfo{0x2}:150100445636444D42:0x15:Samsung:DV6DMB:0x0:BGA (Discrete embedded):DRAM:MCP(eMMC+LPDR4X):4.00GB
EMIInfo{0x3}:13014E53304A394B39:0x13:Micron:S0J9K9:0x4e:BGA (Discrete embedded):DRAM:MCP(eMMC+LPDR4X):4.00GB
EMIInfo{0x4}:13014E47314A395139:0x13:Micron:G1J9Q9:0x4e:BGA (Discrete embedded):DRAM:MCP(eMMC+LPDR4X):6.00GB
EMIInfo{0x5}:13014E47314A395339:0x13:Micron:G1J9S9:0x4e:BGA (Discrete embedded):DRAM:MCP(eMMC+LPDR4X):4.00GB
EMIInfo{0x6}:150100445636444142:0x15:Samsung:DV6DAB:0x0:BGA (Discrete embedded):DRAM:MCP(eMMC+LPDR4X):4.00GB
EMIInfo{0x7}:150100445036444142:0x15:Samsung:DP6DAB:0x0:BGA (Discrete embedded):DRAM:MCP(eMMC+LPDR4X):4.00GB
EMIInfo{0x8}:13014E47314A395238:0x13:Micron:G1J9R8:0x4e:BGA (Discrete embedded):DRAM:MCP(eMMC+LPDR4X):4.00GB
EMIInfo{0x9}:13014E47314331324C:0x13:Micron:G1C12L:0x4e:BGA (Discrete embedded):DRAM:MCP(eMMC+LPDR4X):8.00GB
EMIInfo{0xa}:150100335636434142:0x15:Samsung:3V6CAB:0x0:BGA (Discrete embedded):DRAM:MCP(eMMC+LPDR4X):6.00GB
EMIInfo{0xb}:1501005756364A4D42:0x15:Samsung:WV6JMB:0x0:BGA (Discrete embedded):DRAM:MCP(eMMC+LPDR4X):8.00GB
EMIInfo{0xc}:90014A68433861503E:0x90:SkHynix:hC8aP>:0x4a:BGA (Discrete embedded):DRAM:MCP(eMMC+LPDR4X):4.00GB
EMIInfo{0xd}:150100445036444242:0x15:Samsung:DP6DBB:0x0:BGA (Discrete embedded):DRAM:MCP(eMMC+LPDR4X):4.00GB
EMIInfo{0xe}:150100445636444242:0x15:Samsung:DV6DBB:0x0:BGA (Discrete embedded):DRAM:MCP(eMMC+LPDR4X):4.00GB
File Scatter & Big Preloader Vivo Y20G MT-6768 File Download

Wednesday, November 2, 2022

File/Firmware Backup Y19 1915-Link Google Drive

Ketua Teknisi HP (Official)

File/Firmware Backup Y19 1915-Link Google Drive
RIBAK TOOL


File/Firmware Backup Y19 1915-Link Google Drive.File backupan yang bisa anda gunakan untuk perbaikan masalah software seperti Bootloop Permanen,Hang Logo,Mati Total Baseband Unknown-Sinyal masalah dan lainya..Silahkan flash menggunakan Ribak Tool maupun flash menggunakan tool mediatek lainya...

Support Preloader:

EMIInfo{0x1}:90014A68423861503E:0x90:SkHynix:hB8aP>:0x4a:BGA (Discrete embedded):DRAM:MCP(eMMC+LPDDR3):3.00GB
EMIInfo{0x2}:150100335636434D42:0x15:Samsung:3V6CMB:0x0:BGA (Discrete embedded):DRAM:MCP(eMMC+LPDR4X):6.00GB
EMIInfo{0x3}:150100445636444D42:0x15:Samsung:DV6DMB:0x0:BGA (Discrete embedded):DRAM:MCP(eMMC+LPDR4X):4.00GB
EMIInfo{0x4}:90014A684445615033:0x90:SkHynix:hDEaP3:0x4a:BGA (Discrete embedded):DRAM:MCP(eMMC+LPDR4X):6.00GB
EMIInfo{0x5}:13014E53304A394B39:0x13:Micron:S0J9K9:0x4e:BGA (Discrete embedded):DRAM:MCP(eMMC+LPDR4X):4.00GB
EMIInfo{0x6}:13014E47314A395139:0x13:Micron:G1J9Q9:0x4e:BGA (Discrete embedded):DRAM:MCP(eMMC+LPDR4X):6.00GB
EMIInfo{0x7}:13014E47314331324C:0x13:Micron:G1C12L:0x4e:BGA (Discrete embedded):DRAM:MCP(eMMC+LPDR4X):8.00GB

Info Firmware:

CHIP NAME: MT6768 ,Storage: EMMC
Da Select: Da Default Ribak Tool
Auth Select: Auth Not Select
Info Rom Target....
Manufacturer : ro.1915
FINGERPRINT : vivo/1915N/1915:12/SP1A.210812.003/compiler03291903:user/release-keys
BUILD ID : SP1A.210812.003
SECURITY PATCH : 2022-03-01
CPU ABI : arm64-v8a
LOCALE : en-US
Build Description : full_k68v1_64-user 12 SP1A.210812.003 compiler03291903 release-keys
OS : Funtouch OS_10.5
Name : 1915
Model : 1915N
Oem : PD1934F_EX
System Product : PD1934F_EX_A_8.9.15
System Hardware : PD1934F_EXMA
Platform : mt6768
SIM State : unknown
ODM NAME : 1915N

File Scatter & Prelaoder VIVO Y20 2021 PD2036DF

Ketua Teknisi HP (Official)

File Scatter & Prelaoder VIVO Y20 2021 PD2036DF
FILE SCATTER REMOVE LOCK

File Scatter & Prelaoder VIVO Y20 2021 PD2036DF.Fungsi dari pada file scatter dan preloader ini yaitu untuk melakukan Backup-Remove Lock/Pola-Frp (Akun Google) dan kebutuhan lain..dimana ketika melakukan eksekusi anda tidak perlu menggunakan Firmware Full.bisa menggunakan Ribak Tool.Sp Flash Tool...maupun tool mediatek lainya...

Support Preloader:

EMIInfo{0x0}:150100445836384D42:0x15:Samsung:DX68MB:0x0:BGA (Discrete embedded):DRAM:MCP(eMMC+LPDR4X):3.00GB
EMIInfo{0x1}:13014E47314A395339:0x13:Micron:G1J9S9:0x4e:BGA (Discrete embedded):DRAM:MCP(eMMC+LPDR4X):4.00GB
EMIInfo{0x2}:150100445636444D42:0x15:Samsung:DV6DMB:0x0:BGA (Discrete embedded):DRAM:MCP(eMMC+LPDR4X):4.00GB
EMIInfo{0x3}:150100444436384D42:0x15:Samsung:DD68MB:0x0:BGA (Discrete embedded):DRAM:MCP(eMMC+LPDR4X):3.00GB
EMIInfo{0x4}:150100444836444142:0x15:Samsung:DH6DAB:0x0:BGA (Discrete embedded):DRAM:MCP(eMMC+LPDR4X):4.00GB
EMIInfo{0x5}:90014A684339615033:0x90:SkHynix:hC9aP3:0x4a:BGA (Discrete embedded):DRAM:MCP(eMMC+LPDR4X):4.00GB
EMIInfo{0x6}:150100445636444142:0x15:Samsung:DV6DAB:0x0:BGA (Discrete embedded):DRAM:MCP(eMMC+LPDR4X):4.00GB
EMIInfo{0x7}:150100445036444142:0x15:Samsung:DP6DAB:0x0:BGA (Discrete embedded):DRAM:MCP(eMMC+LPDR4X):4.00GB

Tutorial menggunakan ribak tool,bisa insert manual jika brand dan model tidak mendukung...


Tuesday, November 1, 2022

Backup File Partition Oppo A54 Cph2239-Link Google Drive

Ketua Teknisi HP (Official)

Backup File Partition Oppo A54 Cph2239-Link Google Drive
FILE BACKUP OPPO A54


Backup File Partition Oppo A54 Cph2239-Link Google Drive.File kami backup menggunakan Ribak Tool, bisa digunakan untuk mengatasi masalah Mati Total-Hang Logo-Bootloop-Baseband Unknown-Jaringan dan lainya.silahkan unduh dengan Gratis

Support Preloader:

EMIInfo{0x0}:13014E47314A395238:0x13:Micron:G1J9R8:0x4e:BGA (Discrete embedded):DRAM:MCP(eMMC+LPDR4X):4.00GB
EMIInfo{0x1}:13014E47314A395339:0x13:Micron:G1J9S9:0x4e:BGA (Discrete embedded):DRAM:MCP(eMMC+LPDR4X):4.00GB
EMIInfo{0x2}:90014A684445615033:0x90:SkHynix:hDEaP3:0x4a:BGA (Discrete embedded):DRAM:MCP(eMMC+LPDR4X):6.00GB
EMIInfo{0x3}:90014A68433861503E:0x90:SkHynix:hC8aP>:0x4a:BGA (Discrete embedded):DRAM:MCP(eMMC+LPDR4X):4.00GB
EMIInfo{0x4}:150100445636444142:0x15:Samsung:DV6DAB:0x0:BGA (Discrete embedded):DRAM:MCP(eMMC+LPDR4X):4.00GB
EMIInfo{0x5}:13014E53304A394B39:0x13:Micron:S0J9K9:0x4e:BGA (Discrete embedded):DRAM:MCP(eMMC+LPDR4X):4.00GB

Log:

Operation: Runing
Phone Mode: Mediatek Port
Ribak Tool Server: OK
Register: OK
Start Modul: OK
___________________________
Power Off ... 
Brom Mode : Press Hold [Vol Up] + [Vol Down]
Please USB Connect... 
 Waiting for Brom Mode...
 Status: Please Ronnect Mobile
.... Device detected 
  CPU:   MT6765/MT8768t(Helio P35/G35)
  HW version: 0x0
  WDT: 0x10007000
  Uart: 0x11002000
  Brom payload addr: 0x100a00
  DA payload addr: 0x201000
  CQ_DMA addr: 0x10212000
  Var1: 0x25
 Disabling Watchdog...
 HW code: 0x766
 Target config: 0xe5
  SBC enabled: True
  SLA enabled: False
  DAA enabled: True
  SWJTAG enabled: True
  EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False
  Root cert required: False
  Mem read auth: True
  Mem write auth: True
  Cmd 0xC8 blocked: True
 Get Target info
 BROM mode detected.
  HW subcode: 0x8a00
  HW Ver: 0xca00
  SW Ver: 0x0
 ME_ID:   67B2B11E2D7B9822AC853C463A29A329
 SOC_ID:   1E842B14DD7A07B7B4A86B1753244F9F7DF9244C7FD89FFC4B4CB49D348AFD8C
 Device detected 
 Uploading xflash stage 1 from MTK_AllInOne_DA_5.2152.bin
 Successfully uploaded stage 1, jumping ..
 Jumping to 0x200000
 Jumping to 0x200000: ok.
 Successfully received DA sync
 DRAM config needed for : 1501004456364441
 Sending emi data ...
 DRAM setup passed.
 Sending emi data succeeded.
 Uploading stage 2...
 Upload data was accepted. Jumping to stage 2...
 Successfully uploaded stage 2
 EMMC FWVer:      0x0
 EMMC ID:         DV6DAB
 EMMC CID:        15010044563644414202f8d3cee93885
 EMMC Boot1 Size: 0x400000
 EMMC Boot2 Size: 0x400000
 EMMC GP1 Size:   0x0
 EMMC GP2 Size:   0x0
 EMMC GP3 Size:   0x0
 EMMC GP4 Size:   0x0
 EMMC RPMB Size:  0x1000000
 EMMC USER Size:  0x1d1ec00000
 HW-CODE:          0x766
 HWSUB-CODE:       0x8A00
 HW-VERSION:       0xCA00
 SW-VERSION:       0x0
 CHIP-EVOLUTION:   0x0
 DA-VERSION:       1.0
 Upload data was accepted. Jumping to stage 2...
 DA Extensions successfully added
UserArea: 125069950976kb
Sectors: 244277248
Executing Finish
finished. total time: 0 minutes ~ 37 seconds
WARNING!!!
***************************
Backup Before Doing Any Work
Save To Folder: \\C:\Users\service emmc\Desktop\FILE BACKUPAN\Oppo_A54
Operation: Runing
Phone Mode: Mediatek Port
Ribak Tool Server: OK
Register: OK
Start Modul: OK
___________________________
Power Off ... 
Brom Mode : Press Hold [Vol Up] + [Vol Down]
Please USB Connect... 
 Waiting for Brom Mode...
 Status: Please Ronnect Mobile
 Device detected 
  CPU:   MT6765/MT8768t(Helio P35/G35)
  HW version: 0x0
  WDT: 0x10007000
  Uart: 0x11002000
  Brom payload addr: 0x100a00
  DA payload addr: 0x201000
  CQ_DMA addr: 0x10212000
  Var1: 0x25
 Disabling Watchdog...
 HW code: 0x766
 Target config: 0xe5
  SBC enabled: True
  SLA enabled: False
  DAA enabled: True
  SWJTAG enabled: True
  EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False
  Root cert required: False
  Mem read auth: True
  Mem write auth: True
  Cmd 0xC8 blocked: True
 Get Target info
 BROM mode detected.
  HW subcode: 0x8a00
  HW Ver: 0xca00
  SW Ver: 0x0
 ME_ID:   67B2B11E2D7B9822AC853C463A29A329
 SOC_ID:   1E842B14DD7A07B7B4A86B1753244F9F7DF9244C7FD89FFC4B4CB49D348AFD8C
 Device detected 
 Uploading xflash stage 1 from MTK_AllInOne_DA_5.2152.bin
 Successfully uploaded stage 1, jumping ..
 Jumping to 0x200000
 Jumping to 0x200000: ok.
 Successfully received DA sync
 DRAM config needed for : 1501004456364441
 Sending emi data ...
 DRAM setup passed.
 Sending emi data succeeded.
 Uploading stage 2...
 Upload data was accepted. Jumping to stage 2...
 Successfully uploaded stage 2
 EMMC FWVer:      0x0
 EMMC ID:         DV6DAB
 EMMC CID:        15010044563644414202f8d3cee93885
 EMMC Boot1 Size: 0x400000
 EMMC Boot2 Size: 0x400000
 EMMC GP1 Size:   0x0
 EMMC GP2 Size:   0x0
 EMMC GP3 Size:   0x0
 EMMC GP4 Size:   0x0
 EMMC RPMB Size:  0x1000000
 EMMC USER Size:  0x1d1ec00000
 HW-CODE:          0x766
 HWSUB-CODE:       0x8A00
 HW-VERSION:       0xCA00
 SW-VERSION:       0x0
 CHIP-EVOLUTION:   0x0
 DA-VERSION:       1.0
 Upload data was accepted. Jumping to stage 2...
 DA Extensions successfully added
Reading>>> boot_para ...  done
Reading>>> recovery ...  done
Reading>>> para ...  done
Reading>>> opporeserve1 ...  done
Reading>>> opporeserve2 ...  done
Reading>>> opporeserve3 ...  done
Reading>>> oppo_custom ...  done
Reading>>> expdb ...  done
Reading>>> vbmeta_system ...  done
Reading>>> vbmeta_vendor ...  done
Reading>>> frp ...  done
Reading>>> nvcfg ...  done
Reading>>> nvdata ...  done
Reading>>> md_udc ...  done
Reading>>> metadata ...  done
Reading>>> protect1 ...  done
Reading>>> protect2 ...  done
Reading>>> seccfg ...  done
Reading>>> persist ...  done
Reading>>> sec1 ...  done
Reading>>> proinfo ...  done
Reading>>> md1img ...  done
Reading>>> spmfw ...  done
Reading>>> scp1 ...  done
Reading>>> scp2 ...  done
Reading>>> sspm_1 ...  done
Reading>>> sspm_2 ...  done
Reading>>> gz1 ...  done
Reading>>> gz2 ...  done
Reading>>> nvram ...  done
Reading>>> cdt_engineering ...  done
Reading>>> ocdt ...  done
Reading>>> special_preload ...  done
Reading>>> my_custom ...  done
Reading>>> lk ...  done
Reading>>> lk2 ...  done
Reading>>> boot ...  done
Reading>>> logo ...  done
Reading>>> dtbo ...  done
Reading>>> tee1 ...  done
Reading>>> tee2 ...  done
Reading>>> vbmeta ...  done
Reading>>> cache ...  done
Reading>>> otp ...  done
Reading>>> flashinfo ...  done


Executing Finish
finished. total time: 5 minutes ~ 25 seconds

WARNING!!!

***************************
Backup Before Doing Any Work
File Full Flash Oppo_A54_Cph2239