Thursday, 7 March 2019

Firmware Lava Iris 88 2/16 Tested Backup MRT

     Oke selamat pagi para pengujung, bertemu lagi dengan saya ..kali ini saya akan share file firmware lava iris 88 2/16 backup MRT, dan file ini sudah tested ya. asal jangan dipakai selain 2/16,karena sangat beresiko matot/brick jika tetap dilakukan.
     Untuk deteil file firmware-nya silahkan simak dibawah ini


*Read Info By MRT :

   
    Disconnect Mobile...
    Re-Put the Mobile Bettery...
    Then Connect your Phone to Computer again....
    Please Make sure Mobile better has Power...
>>> Searching Mobile Port...
    Get Mobile Port is:  COM17
>>> Device driver identification:
    MediaTek USB Port
>>> Mobile Has Connect...
    CPU_NAME: MT6739
>>> Reading Mobile Hardware Info...Success
    HW_Inf:  8A00    SW_Inf:  CB00
>>> Initialization Mobile ...>>> Sending Auth File To Mobile...Success
>>> Downloading Boot1 To Mobile Phone...Success
    Mobile phone status:SYNC...
    Mobile phone status swtich to :brom...Success
    Make sure Mobile status has in :brom...
    Init Mobile BOOT2 ...
    =====================Flash Type(eMMC)==============
    Flash   Size: 0x00000003A3E00000 -> 14910M
    Flash     ID: 0x150100514536334D
    Flash   Name: Samsung_Unknow
    Flash symbol: QE63MB
>>> Reading Mobile Map Data...Success
>>>>Geting Mobile info data...
    ADD(HEX):0x0041000000    Size(HEX):0x00A6000000   
    ʶ±ðµ½ext4Îļþϵͳ....
    ro.build.id=O11019
   
    ro.build.display.id=LAVA_iris88_2_16_S109_IDR_18I10
   
    ro.build.version.release=8.1.0
   
    ro.product.model=iris88
   
    ro.product.brand=LAVA
   
    ro.product.name=iris88
   
    ro.product.device=iris88
   
    ro.product.manufacturer=LAVA
 
    Corresponding operation completed!!!

*Read firmware by MRT :

    Disconnect Mobile...
    Re-Put the Mobile Bettery...
    Then Connect your Phone to Computer again....
    Please Make sure Mobile better has Power...
>>> Searching Mobile Port...
    Get Mobile Port is:  COM17
>>> Device driver identification:
    MediaTek USB Port
>>> Mobile Has Connect...
    CPU_NAME: MT6739
>>> Reading Mobile Hardware Info...Success
    HW_Inf:  8A00    SW_Inf:  CB00
>>> Initialization Mobile ...>>> Sending Auth File To Mobile...Success
>>> Downloading Boot1 To Mobile Phone...Success
    Mobile phone status:SYNC...
    Mobile phone status swtich to :brom...Success
    Make sure Mobile status has in :brom...
    Init Mobile BOOT2 ...
    =====================Flash Type(eMMC)==============
    Flash   Size: 0x00000003A3E00000 -> 14910M
    Flash     ID: 0x150100514536334D
    Flash   Name: Samsung_Unknow
    Flash symbol: QE63MB
>>> Reading Mobile Map Data...Success
>>>>Back Up Preloader Data...
    Start: 0x00000800    Size: 0x003FF800
+page=0x00200000
+page=0x001FF800
>>>>Backup Backup Mobile boot_para Block Data...
    Start: 0x0000008000    Size: 0x0000100000
>>>>Backup Backup Mobile recovery Block Data...
    Start: 0x0000108000    Size: 0x0001800000
>>>>Backup Backup Mobile para Block Data...
    Start: 0x0001908000    Size: 0x0000080000
>>>>Backup Backup Mobile expdb Block Data...
    Start: 0x0001988000    Size: 0x0001400000
>>>>Backup Backup Mobile frp Block Data...
    Start: 0x0002D88000    Size: 0x0000100000
>>>>Backup Backup Mobile nvcfg Block Data...
    Start: 0x0002E88000    Size: 0x0000800000
>>>>Backup Backup Mobile nvdata Block Data...
    Start: 0x0003688000    Size: 0x0002000000
>>>>Backup Backup Mobile metadata Block Data...
    Start: 0x0005688000    Size: 0x0002000000
>>>>Backup Backup Mobile protect1 Block Data...
    Start: 0x0007688000    Size: 0x0000800000
>>>>Backup Backup Mobile protect2 Block Data...
    Start: 0x0007E88000    Size: 0x0000978000
>>>>Backup Backup Mobile seccfg Block Data...
    Start: 0x0008800000    Size: 0x0000800000
>>>>Backup Backup Mobile persist Block Data...
    Start: 0x0009000000    Size: 0x0003000000
>>>>Backup Backup Mobile sec1 Block Data...
    Start: 0x000C000000    Size: 0x0000200000
>>>>Backup Backup Mobile proinfo Block Data...
    Start: 0x000C200000    Size: 0x0000300000
>>>>Backup Backup Mobile md1img Block Data...
    Start: 0x000C500000    Size: 0x0004000000
>>>>Backup Backup Mobile md1dsp Block Data...
    Start: 0x0010500000    Size: 0x0001000000
>>>>Backup Backup Mobile spmfw Block Data...
    Start: 0x0011500000    Size: 0x0000100000
>>>>Backup Backup Mobile mcupmfw Block Data...
    Start: 0x0011600000    Size: 0x0000100000
>>>>Backup Backup Mobile gz1 Block Data...
    Start: 0x0011700000    Size: 0x0001000000
>>>>Backup Backup Mobile gz2 Block Data...
    Start: 0x0012700000    Size: 0x0001000000
>>>>Backup Backup Mobile nvram Block Data...
    Start: 0x0013700000    Size: 0x0000500000
>>>>Backup Backup Mobile lk Block Data...
    Start: 0x0013C00000    Size: 0x0000100000
>>>>Backup Backup Mobile lk2 Block Data...
    Start: 0x0013D00000    Size: 0x0000100000
>>>>Backup Backup Mobile loader_ext1 Block Data...
    Start: 0x0013E00000    Size: 0x0000010000
>>>>Backup Backup Mobile loader_ext2 Block Data...
    Start: 0x0013E10000    Size: 0x0000010000
>>>>Backup Backup Mobile boot Block Data...
    Start: 0x0013E20000    Size: 0x0001800000
>>>>Backup Backup Mobile logo Block Data...
    Start: 0x0015620000    Size: 0x0000800000
>>>>Backup Backup Mobile odmdtbo Block Data...
    Start: 0x0015E20000    Size: 0x0001000000
>>>>Backup Backup Mobile tee1 Block Data...
    Start: 0x0016E20000    Size: 0x0000500000
>>>>Backup Backup Mobile tee2 Block Data...
    Start: 0x0017320000    Size: 0x0000CE0000
>>>>Backup Backup Mobile vendor Block Data...
    Start: 0x0018000000    Size: 0x0029000000
>>>>Backup Backup Mobile system Block Data...
    Start: 0x0041000000    Size: 0x00A6000000
>>>>Backup Backup Mobile cache Block Data...
    Start: 0x00E7000000    Size: 0x001B000000
    You Has Select not ReadBack Flash UserData...
>>>>Backup Backup Mobile userdata Block Data...
    Start: 0x0102000000    Size: 0x0040000000
>>>>Backup Backup Mobile flashinfo Block Data...
    Start: 0x03A2DFBE00    Size: 0x0001000000
    Corresponding operation completed!!!

*Screenshoot :
How To Flash
About Phone By Sticker Label
About Phone

Penjelasan :
*Untuk kolom :OPERATION OPTION ceklis write flash
*Untuk kolom :OTHER OPERATION pilih boot GN5003_Only
*Untuk kolom :GLOBAL OPTION contreng sama seperti yang di gambar pertama


Oke untuk file-nya silahkan kalian unduh dibawah ini :
LAVA_iris_2_16__S109_idr_18i10


NOTE :
  • File ini tidak gratis/berbayar,jika membutuhkan segera hubungi admin
  • Segera saja laporkan jika link diatas mati/rusak
  • Apabila berkenan tolong tinggalkan sedikit komentar secukup-nya saja

Tuesday, 12 February 2019

Firmware Advan T1X Plus Barca Backup CM2 [Tested]

Untuk deteil info nya simak dibawah ini !!


*Read Info By CM2 :
Operation : Check / Read Info [ v1.58 ]

1. Power Off Phone , Remove battery , Insert back
2. Insert USB cable. In some cases require hold BootKey

Wait for phone...
Phone found! [ 8 ]
Sync...
Inital Boot Ok!
BB_CPU_PID : 6592
BB_CPU_NME : [MediaTek] MT6592_S00
BB_CPU_EXT : 0xCA00 , 0x8A00 , 0x0000
Processing BROM stage
Settings for BROM configured!
SecCfgVal : 0x00000000
BromVer   : 0x00FF
BLVersion : 0x0001
PreLoader : Active [ Boot with PL ]
BootLdrSS : NORMAL with PRELOADER
Processing DA stage
DA Select done, will use MTK_AllInOne_DA_v5.1624.16.07
Sending and initialize DA ...
Running DA ver.4.2 on BBID : 0x8A
NAND Flash : NOT INSTALLED
eMMC Flash : 8801034E436172642034C557024081BD
Initialize Memory ... 
DRAM already initialized by Preloader
DAgent sent , init HW now
eMMC FlashIC initialized
[eMMC] : FLASH_VEN : 0x88 , OEM : 0103
[eMMC] : FLASH_INF : [FORESEE] , draC
[eMMC] : FLASH_CID : 8801034E436172642034C557024081BD
[eMMC] : FLASH_BRT : 0x00200000 , 0x00200000 , 0x00000000
[eMMC] : FLASH_LEN : 0x00000001CE100000
[eMMC] : FLASH_UCP : 7393 MiB [eMMC 8 GiB]
DEV RID    : 0xF0205F828989AEB0047C935BB8CA35F9
INT RAM    : 0x00020000
EXT RAM    : 0x40000000 [1 GiB]
BOOT TYPE  : EMMC_FLASH_BOOT
SOC VERIFY : C1
Boot Ok!

[AP] : Initial info read Ok!

Brand     : ADVAN
ProdName  : Vandroid
ProdModel : T1X Plus
Device    : advan92_6922
AndroidVer: 4.4.2
MTKxCPU   : MT6592
MTKxPRJ   : ALPS.KK1.MP1.V2.22

Done!
Elapsed: 00:00:07
Reconnect Power/Cable!

*Read Firmware By CM2 :
Operation : Read Flash [ v1.58 ]

1. Power Off Phone , Remove battery , Insert back
2. Insert USB cable. In some cases require hold BootKey

Wait for phone...
Phone found! [ 8 ]
Sync...
Inital Boot Ok!
BB_CPU_PID : 6592
BB_CPU_NME : [MediaTek] MT6592_S00
BB_CPU_EXT : 0xCA00 , 0x8A00 , 0x0000
Processing BROM stage
Settings for BROM configured!
SecCfgVal : 0x00000000
BromVer   : 0x00FF
BLVersion : 0x0001
PreLoader : Active [ Boot with PL ]
BootLdrSS : NORMAL with PRELOADER
Processing DA stage
DA Select done, will use MTK_AllInOne_DA_v5.1624.16.07
Sending and initialize DA ...
Running DA ver.4.2 on BBID : 0x8A
NAND Flash : NOT INSTALLED
eMMC Flash : 8801034E436172642034C557024081BD
Initialize Memory ... 
DRAM already initialized by Preloader
DAgent sent , init HW now
eMMC FlashIC initialized
[eMMC] : FLASH_VEN : 0x88 , OEM : 0103
[eMMC] : FLASH_INF : [FORESEE] , draC
[eMMC] : FLASH_CID : 8801034E436172642034C557024081BD
[eMMC] : FLASH_BRT : 0x00200000 , 0x00200000 , 0x00000000
[eMMC] : FLASH_LEN : 0x00000001CE100000
[eMMC] : FLASH_UCP : 7393 MiB [eMMC 8 GiB]
DEV RID    : 0xF0205F828989AEB0047C935BB8CA35F9
INT RAM    : 0x00020000
EXT RAM    : 0x40000000 [1 GiB]
BOOT TYPE  : EMMC_FLASH_BOOT
SOC VERIFY : C1
Boot Ok!

Reading Flash Content now ... 

Brand     : ADVAN
ProdName  : Vandroid
ProdModel : T1X Plus
Device    : advan92_6922
AndroidVer: 4.4.2
MTKxCPU   : MT6592
MTKxPRJ   : ALPS.KK1.MP1.V2.22

[Read Ok] : preloader_advan92_6922.bin
[Read Ok] : MBR
[Read Ok] : EBR1
[Read Ok] : lk.bin
[Read Ok] : boot.img
[Read Ok] : recovery.img
[Read Ok] : secro.img
[Read Ok] : logo.bin
[Read Ok] : EBR2
[Read Ok] : system.img
[Read Ok] : cache.img
[Read Ok] : userdata.img

[ScatCFG] : MT6592 / V1.1.2 / advan92_6922 / EMMC
Android Info saved
MAUI Meta DB saved
HWConfig Info saved
FW Size : 1109 MiB
Scatter saved to : D:\FIRMWARE\Advan\T1\MT6592__ADVAN__T1X_Plus__advan92_6922__4.4.2__ALPS.KK1.MP1.V2.22\

All done!

Done!
Elapsed: 00:06:04
Reconnect Power/Cable!

*Read NV By CM2 :
Operation : Read NVRAM [ v1.58 ]

1. Power Off Phone , Remove battery , Insert back
2. Insert USB cable. In some cases require hold BootKey

Wait for phone...
Phone found! [ 8 ]
Sync...
Inital Boot Ok!
BB_CPU_PID : 6592
BB_CPU_NME : [MediaTek] MT6592_S00
BB_CPU_EXT : 0xCA00 , 0x8A00 , 0x0000
Processing BROM stage
Settings for BROM configured!
SecCfgVal : 0x00000000
BromVer   : 0x00FF
BLVersion : 0x0001
PreLoader : Active [ Boot with PL ]
BootLdrSS : NORMAL with PRELOADER
Processing DA stage
DA Select done, will use MTK_AllInOne_DA_v5.1624.16.07
Sending and initialize DA ...
Running DA ver.4.2 on BBID : 0x8A
NAND Flash : NOT INSTALLED
eMMC Flash : 8801034E436172642034C557024081BD
Initialize Memory ... 
DRAM already initialized by Preloader
DAgent sent , init HW now
eMMC FlashIC initialized
[eMMC] : FLASH_VEN : 0x88 , OEM : 0103
[eMMC] : FLASH_INF : [FORESEE] , draC
[eMMC] : FLASH_CID : 8801034E436172642034C557024081BD
[eMMC] : FLASH_BRT : 0x00200000 , 0x00200000 , 0x00000000
[eMMC] : FLASH_LEN : 0x00000001CE100000
[eMMC] : FLASH_UCP : 7393 MiB [eMMC 8 GiB]
DEV RID    : 0xF0205F828989AEB0047C935BB8CA35F9
INT RAM    : 0x00020000
EXT RAM    : 0x40000000 [1 GiB]
BOOT TYPE  : EMMC_FLASH_BOOT
SOC VERIFY : C1
Boot Ok!

[Info] : BaseBand : MT6592_S00_MOLY_WR8_W1315_MD_WG_MP_V42_P3_1_wg_n

NVM Read Ok, MT6592_S00_MOLY_WR8_W1315_MD_WG_MP_V42_P3_1_wg_n_eMMC.spnv

Done!
Elapsed: 00:00:18
Reconnect Power/Cable!

*Screenshoot Image :
Read Info By CM2
Read Firmware By CM2
Read NV By CM2
About Sticker Label
Backcover Model
About Phone

Oke untuk file-nya silahkan download dibawah ini :
MT6592__ADVAN__T1X_Plus__advan92_6922__4.4.2__ALPS.KK1.MP1.V2.22

NOTE :
  • Untuk konfirmasi password file silahkan hubungi admin
  • Segera laporkan,jika link di atas mati/rusak
  • Apabila berkenan tolong tinggalkan sedikit komentar secukup-nya saja

Saturday, 9 February 2019

Firmware Lenovo K6 Note [K53a48] Backup UfiBox Tested

Deteil info mengenai file ini :

Scanning for Qualcomm HS-USB QDLoader 9008 device...
Download Port: Qualcomm HS-USB QDLoader 9008 (COM3)
 Connection status: XHCI:HUB3:USB 2.0 High-Speed
 USB Driver: [Qualcomm Incorporated] qcusbser, version: 2.1.2.0, date: 7-8-2015
Initializing...
 MSM Serial number: 0x31f8f0e9
 MSM HW ID: 0x0004f0e1 (MSM8937)
 OEM Public Key Hash: 0x99c8c13e374c34d8f9afb065ea4c733e6b1b21cbc5a78705f041eb24acdd5fe5
 SBL SW version: 0
 Firehose: prog_emmc_firehose_8937_ddr.mbn
  sha1: 1d188226d210e796e19e926926d8af4f91713159, size: 398.06 KiB
  QC_IMAGE_VERSION: BOOT.BF.3.3-00177
  IMAGE_VARIANT: FAADANAZA
  OEM_IMAGE_VERSION: njbs14
 Sending firehose loader... Done.
 Handshaking...
 Sending ping... Done.
 Sending configurations...
  TargetName: 8937
  MemoryName: eMMC
  Version: 1
 Firehose configured.
Storage type: eMMC
Manufacturer ID: 0x15 (Samsung)
Product name: RX14MB (0x525831344d42), rev: 0x07, serial number: 0x00000000
Capacity: 29.13 GiB(31,281,119,232 bytes)
 Boot1: 4096 KiB
 Boot2: 4096 KiB
 RPMB: 4096 KiB
 User area: 29.12 GiB(31,268,536,320 bytes)

platform: msm8937, cpu abi: arm64-v8a
manufacturer: LENOVO
board: QC_Reference_Phone, name: karatep
brand: Lenovo, model: Lenovo K53
build id: MMB29M, version: 6.0.1 Marshmallow (K53_S123_170216_ROW)
build description: karatep-user 6.0.1 MMB29M K53_S123_170216_ROW release-keys

Reading gpt_main0 at 0x00000000-0x000043FF size: 17 KiB...  Done.
Reading modem at 0x01000000-0x063FFFFF size: 84 MiB...  Done.
Reading sec at 0x06400000-0x06403FFF size: 16 KiB...  Done.
Reading lksecapp at 0x06404000-0x06423FFF size: 128 KiB...  Done.
Reading lksecappbak at 0x06424000-0x06443FFF size: 128 KiB...  Done.
Reading cmnlib at 0x06444000-0x06483FFF size: 256 KiB...  Done.
Reading cmnlibbak at 0x06484000-0x064C3FFF size: 256 KiB...  Done.
Reading cmnlib64 at 0x064C4000-0x06503FFF size: 256 KiB...  Done.
Reading cmnlib64bak at 0x06504000-0x06543FFF size: 256 KiB...  Done.
Reading keymaster at 0x06544000-0x06583FFF size: 256 KiB...  Done.
Reading keymasterbak at 0x06584000-0x065C3FFF size: 256 KiB...  Done.
Reading aboot at 0x065C4000-0x067C3FFF size: 2 MiB...  Done.
Reading abootbak at 0x067C4000-0x069C3FFF size: 2 MiB...  Skipped
Reading devinfo at 0x069C4000-0x06AC3FFF size: 1 MiB...  Done.
Reading limits at 0x06AC4000-0x06ACBFFF size: 32 KiB...  Done.
Reading prov32 at 0x06ACC000-0x06B0BFFF size: 256 KiB...  Done.
Reading prov32bak at 0x06B0C000-0x06B4BFFF size: 256 KiB...  Done.
Reading kpadA at 0x06B4C000-0x06FFFFFF size: 4.70 MiB...  Done.
Reading fsc at 0x07000000-0x070003FF size: 1 KiB...  Done.
Reading ssd at 0x07000400-0x070023FF size: 8 KiB...  Done.
Reading sbl1 at 0x07002400-0x070823FF size: 512 KiB...  Done.
Reading sbl1bak at 0x07082400-0x071023FF size: 512 KiB...  Skipped
Reading rpm at 0x07102400-0x071823FF size: 512 KiB...  Done.
Reading rpmbak at 0x07182400-0x072023FF size: 512 KiB...  Skipped
Reading tz at 0x07202400-0x074023FF size: 2 MiB...  Done.
Reading tzbak at 0x07402400-0x076023FF size: 2 MiB...  Skipped
Reading devcfg at 0x07602400-0x076423FF size: 256 KiB...  Done.
Reading devcfgbak at 0x07642400-0x076823FF size: 256 KiB...  Done.
Reading dsp at 0x07682400-0x086823FF size: 16 MiB...  Done.
Reading modemst1 at 0x08682400-0x088023FF size: 1.50 MiB...  Done.
Reading modemst2 at 0x08802400-0x089823FF size: 1.50 MiB...  Done.
Reading DDR at 0x08982400-0x0898A3FF size: 32 KiB...  Done.
Reading fsg at 0x0898A400-0x08B0A3FF size: 1.50 MiB...  Done.
Reading kpadB at 0x08B0A400-0x08FFFFFF size: 4.96 MiB...  Done.
Reading boot at 0x09000000-0x0CFFFFFF size: 64 MiB...  Done.
Reading recovery at 0x0D000000-0x10FFFFFF size: 64 MiB...  Done.
Reading apdp at 0x11000000-0x1103FFFF size: 256 KiB...  Done.
Reading msadp at 0x11040000-0x1107FFFF size: 256 KiB...  Done.
Reading dpo at 0x11080000-0x11081FFF size: 8 KiB...  Done.
Reading splash at 0x11082000-0x11B81FFF size: 11 MiB...  Done.
Reading misc at 0x11B82000-0x11C81FFF size: 1 MiB...  Done.
Reading keystore at 0x11C82000-0x11D01FFF size: 512 KiB...  Done.
Reading config at 0x11D02000-0x11D09FFF size: 32 KiB...  Done.
Reading oem at 0x11D0A000-0x15D09FFF size: 64 MiB...  Done.
Reading mota at 0x15D0A000-0x15D89FFF size: 512 KiB...  Done.
Reading dip at 0x15D8A000-0x15E89FFF size: 1 MiB...  Done.
Reading mdtp at 0x15E8A000-0x17E89FFF size: 32 MiB...  Done.
Reading syscfg at 0x17E8A000-0x17F09FFF size: 512 KiB...  Done.
Reading mcfg at 0x17F0A000-0x18309FFF size: 4 MiB...  Done.
Reading persist at 0x1830A000-0x1A309FFF size: 32 MiB...  Done.
Reading cache at 0x1A30A000-0x2A309FFF size: 256 MiB...  Done.
Reading mrd at 0x2B000000-0x2EFFFFFF size: 64 MiB...  Done.
Reading system at 0x2F000000-0x10EFFFFFF size: 3.50 GiB...  Done.
Reading preload at 0x10F000000-0x127FFFFFF size: 400 MiB...  Done.
Files saved to \\%BACKUPS%\Lenovo\K53a48\karatep-user%206.0.1%20MMB29M%20K53_S123_170216_ROW%20release-keys\


Read-Info-Firmware-By-UfiBox
About Phone 1
About Phone 2

Untuk file-nya silahkan download dibawah ini secara gratis :
karatep-user 6.0.1 MMB29M K53_S123_170216_ROW release-keys
NOTE :
  • Untuk password file-nya: k6note-oke
  • Segera laporkan jika link diatas mati/rusak
  • Apabila berkenan tolong tinggalkan sedikit komentar secukupnya saja

Saturday, 2 February 2019

Firmware Nokia 6 TA-1021 Backup UfiBox [Tested]



    Oke kali ini saya akan share file backup by UfiBox yang mana ,file ini saya ambil dari backup ponsel normal , yang bisa kalian pake menggunakan Qfil,UfiBox,SFT dll tool lain yang anda punya, karena pada dasarnya file original nya tidak bisa di flashing dg menggunakan tool yang biasa biasa , karena di dalam file original tersebut struktur file nya tidak ada file Firehose Programmer seperti file qualqom pada umumnya dan file original tersebut hanya bisa di flashing dg tool yang tentunya sudah support dg nokia android model model terbaru baru ini, misal nya Nokia Dongle Best Infinity,UfiBox dll.

    Dan untuk cara flashing nya wajib via EDL , anda bisa menggunakan kabel EDL buatan sendiri ataupun kabel bawaan profesional tool seperti kabel boot sniper MRT .tinggal pencet tombol volume atas dan bawah secara bersamaan dan colokkan kabel usb nya .. cara ini hanya berlaku untuk OS 7.1(nougat) patch update lama dan bukan terbaru , untuk OS 8.1(Oreo) cara ini tidak berlaku dan tidak bisa, dan wajib harus melakukan TESTPOINT terlebih dahulu untuk ke boot EDL nya, jika setelah flashing nyangkut di FRP ,silahkan boot EDL lagi dan remove via UfiBox, untuk cara manual nya bisa menggunakan metode TALKBACK,silahkan cari sendiri di YOUTUBE.

Langsung saja ke deteilnya mengenai file ini :


*Read Info By UfiBox:
Scanning for Qualcomm HS-USB QDLoader 9008 device...
Download Port: Qualcomm HS-USB QDLoader 9008 (COM3)
 Connection status: EHCI:HUB:HUB:USB 2.0 High-Speed
 USB Driver: [Qualcomm Incorporated] qcusbser, version: 2.1.2.0, date: 7-8-2015
Initializing... 
 MSM Serial number: 0x191792bc
 MSM HW ID: 0x0004f0e1 (MSM8937)
 OEM Public Key Hash: 0xf5f4192a33b2830974b400119bab728cc9fe911011f928625c2aed0da441ac97
 SBL SW version: 0
 Firehose: prog_emmc_firehose_8937.mbn
  sha1: a96c3624a7447d6e457d0b7b296d4026bc64ea87, size: 214.53 KiB
  QC_IMAGE_VERSION: BOOT.BF.3.3-00211
  IMAGE_VARIANT: FAADANAZA
  OEM_IMAGE_VERSION: cm-build-c14
 Sending firehose loader... Done.
 Handshaking... 
 Sending ping... Done.
 Sending configurations... 
  TargetName: 8937
  MemoryName: eMMC
  Version: 1
 Firehose configured.
Storage type: eMMC
Manufacturer ID: 0x90 (SK Hynix)
Product name: HBG4a2 (0x484247346132), rev: 0x00, serial number: 0x204290B5
Capacity: 29.13 GiB(31,281,119,232 bytes)
 Boot1: 4096 KiB
 Boot2: 4096 KiB
 RPMB: 4096 KiB
 User area: 29.12 GiB(31,268,536,320 bytes)
crypto state: encrypted

*Read Firmware By UfiBox
Scanning for Qualcomm HS-USB QDLoader 9008 device...
Download Port: Qualcomm HS-USB QDLoader 9008 (COM3)
 Connection status: EHCI:HUB:HUB:USB 2.0 High-Speed
 USB Driver: [Qualcomm Incorporated] qcusbser, version: 2.1.2.0, date: 7-8-2015
Initializing... 
Reading gpt_main0 at 0x00000000-0x000043FF size: 17 KiB...  Done.
Reading modemst1 at 0x00200000-0x0037FFFF size: 1.50 MiB...  Done.
Reading modemst2 at 0x00400000-0x0057FFFF size: 1.50 MiB...  Done.
Reading fsg at 0x00600000-0x0077FFFF size: 1.50 MiB...  Done.
Reading fsc at 0x00800000-0x008003FF size: 1 KiB...  Done.
Reading securefs at 0x00800400-0x010003FF size: 8 MiB...  Done.
Reading rf_nv at 0x01000400-0x012003FF size: 2 MiB...  Done.
Reading deviceinfo at 0x01200400-0x013003FF size: 1 MiB...  Done.
Reading modem at 0x04000000-0x093FFFFF size: 84 MiB...  Done.
Reading ssd at 0x0C000000-0x0C001FFF size: 8 KiB...  Done.
Reading sbl1 at 0x0C002000-0x0C081FFF size: 512 KiB...  Done.
Reading sbl1bak at 0x0C082000-0x0C101FFF size: 512 KiB...  Skipped
Reading rpm at 0x0C102000-0x0C181FFF size: 512 KiB...  Done.
Reading rpmbak at 0x0C182000-0x0C201FFF size: 512 KiB...  Skipped
Reading tz at 0x0C202000-0x0C401FFF size: 2 MiB...  Done.
Reading tzbak at 0x0C402000-0x0C601FFF size: 2 MiB...  Skipped
Reading devcfg at 0x0C602000-0x0C641FFF size: 256 KiB...  Done.
Reading devcfgbak at 0x0C642000-0x0C681FFF size: 256 KiB...  Done.
Reading dsp at 0x0C682000-0x0D681FFF size: 16 MiB...  Done.
Reading DDR at 0x10000000-0x10007FFF size: 32 KiB...  Done.
Reading sec at 0x10008000-0x1000BFFF size: 16 KiB...  Done.
Reading splash at 0x14000000-0x14AFFFFF size: 11 MiB...  Done.
Reading aboot at 0x18000000-0x180FFFFF size: 1 MiB...  Done.
Reading abootbak at 0x18100000-0x181FFFFF size: 1 MiB...  Skipped
Reading boot at 0x18200000-0x1C1FFFFF size: 64 MiB...  Done.
Reading recovery at 0x1C200000-0x201FFFFF size: 64 MiB...  Done.
Reading devinfo at 0x20200000-0x202FFFFF size: 1 MiB...  Done.
Reading reserved at 0x24000000-0x24FFFFFF size: 16 MiB...  Done.
Reading ftmboot at 0x25000000-0x28FFFFFF size: 64 MiB...  Done.
Reading cust_nv at 0x29000000-0x291FFFFF size: 2 MiB...  Done.
Reading default_nv at 0x29200000-0x293FFFFF size: 2 MiB...  Done.
Reading hwcfg at 0x29400000-0x294FFFFF size: 1 MiB...  Done.
Reading sutinfo at 0x29500000-0x295003FF size: 1 KiB...  Done.
Reading systeminfo at 0x29500400-0x295403FF size: 256 KiB...  Done.
Reading ftmlog at 0x29540400-0x2B5403FF size: 32 MiB...  Done.
Reading box at 0x2B540400-0x2BD403FF size: 8 MiB...  Done.
Reading multi_splash at 0x2BD40400-0x2CD403FF size: 16 MiB...  Done.
Reading hidden at 0x2CD40400-0x2F5403FF size: 40 MiB...  Done.
Reading cda at 0x2F540400-0x2FD403FF size: 8 MiB...  Done.
Reading reserved_bak at 0x2FD40400-0x30D403FF size: 16 MiB...  Done.
Reading persist at 0x30D40400-0x32D403FF size: 32 MiB...  Done.
Reading misc at 0x32D40400-0x32E403FF size: 1 MiB...  Done.
Reading keystore at 0x32E40400-0x32EC03FF size: 512 KiB...  Done.
Reading config at 0x32EC0400-0x32EC83FF size: 32 KiB...  Done.
Reading oem at 0x32EC8400-0x42EC83FF size: 256 MiB...  Done.
Reading limits at 0x44000000-0x44007FFF size: 32 KiB...  Done.
Reading mota at 0x48000000-0x4807FFFF size: 512 KiB...  Done.
Reading dip at 0x48080000-0x4817FFFF size: 1 MiB...  Done.
Reading mdtp at 0x48180000-0x4A17FFFF size: 32 MiB...  Done.
Reading syscfg at 0x4A180000-0x4A1FFFFF size: 512 KiB...  Done.
Reading mcfg at 0x4A200000-0x4A5FFFFF size: 4 MiB...  Done.
Reading cmnlib at 0x4C000000-0x4C03FFFF size: 256 KiB...  Done.
Reading cmnlibbak at 0x4C040000-0x4C07FFFF size: 256 KiB...  Done.
Reading cmnlib64 at 0x4C080000-0x4C0BFFFF size: 256 KiB...  Done.
Reading cmnlib64bak at 0x4C0C0000-0x4C0FFFFF size: 256 KiB...  Done.
Reading keymaster at 0x4C100000-0x4C13FFFF size: 256 KiB...  Done.
Reading keymasterbak at 0x4C140000-0x4C17FFFF size: 256 KiB...  Done.
Reading apdp at 0x50000000-0x5003FFFF size: 256 KiB...  Done.
Reading msadp at 0x50040000-0x5007FFFF size: 256 KiB...  Done.
Reading dpo at 0x50080000-0x50081FFF size: 8 KiB...  Done.
Reading system at 0x54000000-0x185EFFFFF size: 4.78 GiB...  Done.
Reading cache at 0x188000000-0x197FFFFFF size: 256 MiB...  Done.
Reading logdump at 0x198000000-0x19BFFFFFF size: 64 MiB...  Done.
Files saved to \\%BACKUPS%\Nokia\Nokia%206(Plate)\

*Screenshoot :
Read Info By UfiBox
Read Firmware By UfiBox
About Phone
Model Type

Oke langsung saja ke file download nya ,silahkan ambil di bawah ini :
NOKIA__6__TA-1021_00WW__3_320

NOTE :
  • Untuk konfirmasi password silahkan hubungi facebook admin
  • Laporkan segera jika link diatas mati/rusak
  • Apabila berkenan tolong tinggalkan sedikit komentar secukup-nya saja

Saturday, 12 January 2019

Dump Files Samsung Galaxy J2 PRO [SM-J250F/DS] Tested


      Oke kali ini saya akan share file dump samsung galaxy j2 pro [sm-j250f/ds],dimana file ini adalah hasil backup dari ponsel normal., dan file ini juga bisa anda gunakan untuk penggantian emmc

      Adapun emmc yang support untuk seri ini yaitu KMQE,JTMC,KMQ82,KMR31 untuk type yang lain silahkan di testing saja sendiri, untuk sedikit screenshoot-nya silahkan lihat dibawah ini :


Read Info By UfiBox
About Phone


Oke, untuk file download-nya silahkan download dibawah ini :
SM-J250F(NMF26X.J250FDXS2ARF4-7.1.1-NMF26X)[QE66MB_3EB2C672]


Jika setelah habis penggantiaan emmc ingin bersih/clean dari root,maka lanjutkan dengan flash file dibawah ini :
J250FXXU2ARD3_J250FOJV2ARD4_XSG

NOTE :
  • Untuk password file-nya adalah : dump_sm-j250f/ds
  • Segera laporkan jika link diatas mati/rusak
  • Apabila berkenan tolong tinggalkan sedikit komentar secukup-nya saja

Wednesday, 26 December 2018

Firmware Xiaomi Redmi Note 5A MDT6S [UGG) 4/64 Backup UfiBox

          Oke kali ini saya akan share file backup dari ponsel normal yaitu Xiaomi Redmi Note 5A [UGG]  4/64 , mungkin file ini bisa dipakai untuk mengatasi MI-CLOUD .. softbricked , hang logo dll,, silahkan dicoba sendiri

Untuk deteilnya adalah sebagai berikut :

OS Versi               : 7.1.2

Bootloader Status : Unlocked [Terbuka]
MI-Cloud              : Not Use 
MIUI Versi            : MIUI 9


*Read Info By UfiBox :
Scanning for Qualcomm HS-USB QDLoader 9008 device...
Download Port: Qualcomm HS-USB QDLoader 9008 (COM3)
 Connection status: XHCI:HUB3:USB 2.0 High-Speed
 USB Driver: [Qualcomm Incorporated] qcusbser, version: 2.1.2.0, date: 7-8-2015
Initializing... 
 MSM Serial number: 0x56e3b73d
 MSM HW ID: 0x0006b0e1 (MSM8940)
 OEM Public Key Hash: 0x57158eaf1814d78fd2b3105ece4db18a817a08ac664a5782a925f3ff8403d39a
 SBL SW version: 0
 Firehose: prog_emmc_firehose_8937_ddr.mbn
  sha1: a807fe1f859949f7024932b148586d5b2fc085dd, size: 402.86 KiB
  QC_IMAGE_VERSION: BOOT.BF.3.3-71345
  IMAGE_VARIANT: FAADANAZA
  OEM_IMAGE_VERSION: modem-ci
 Sending firehose loader... Done.
 Handshaking... 
 Sending ping... Done.
 Sending configurations... 
  TargetName: 8937
  MemoryName: eMMC
  Version: 1
 Firehose configured.
Storage type: eMMC
Manufacturer ID: 0x90 (SK Hynix)
Product name: HCG8a4 (0x484347386134), rev: 0xA2, serial number: 0x28E4418E
Capacity: 58.25 GiB(62,549,655,552 bytes)
 Boot1: 4096 KiB
 Boot2: 4096 KiB
 RPMB: 4096 KiB
 User area: 58.24 GiB(62,537,072,640 bytes)
platform: msm8937, cpu abi: arm64-v8a
manufacturer: Xiaomi
board: QC_Reference_Phone, name: ugg
brand: xiaomi, model: Redmi Note 5A
build id: N2G47H, version: 7.1.2 Nougat (N2G47H) (MIUI9)
build description: ugg-user 7.1.2 N2G47H V9.6.2.0.NDKMIFD release-keys
Mi account info:
 status: off
 user id: 
 lost mode: no
crypto state: encrypted

*Read Firmware By UfiBox :
Scanning for Qualcomm HS-USB QDLoader 9008 device...
Download Port: Qualcomm HS-USB QDLoader 9008 (COM3)
 Connection status: XHCI:HUB3:USB 2.0 High-Speed
 USB Driver: [Qualcomm Incorporated] qcusbser, version: 2.1.2.0, date: 7-8-2015
Initializing... 
 MSM Serial number: 0x56e3b73d
 MSM HW ID: 0x0006b0e1 (MSM8940)
 OEM Public Key Hash: 0x57158eaf1814d78fd2b3105ece4db18a817a08ac664a5782a925f3ff8403d39a
 SBL SW version: 0
 Firehose: prog_emmc_firehose_8937_ddr.mbn
  sha1: a807fe1f859949f7024932b148586d5b2fc085dd, size: 402.86 KiB
  QC_IMAGE_VERSION: BOOT.BF.3.3-71345
  IMAGE_VARIANT: FAADANAZA
  OEM_IMAGE_VERSION: modem-ci
 Sending firehose loader... Done.
 Handshaking... 
 Sending ping... Done.
 Sending configurations... 
  TargetName: 8937
  MemoryName: eMMC
  Version: 1
 Firehose configured.
Storage type: eMMC
Manufacturer ID: 0x90 (SK Hynix)
Product name: HCG8a4 (0x484347386134), rev: 0xA2, serial number: 0x28E4418E
Capacity: 58.25 GiB(62,549,655,552 bytes)
 Boot1: 4096 KiB
 Boot2: 4096 KiB
 RPMB: 4096 KiB
 User area: 58.24 GiB(62,537,072,640 bytes)
platform: msm8937, cpu abi: arm64-v8a
manufacturer: Xiaomi
board: QC_Reference_Phone, name: ugg
brand: xiaomi, model: Redmi Note 5A
build id: N2G47H, version: 7.1.2 Nougat (N2G47H) (MIUI9)
build description: ugg-user 7.1.2 N2G47H V9.6.2.0.NDKMIFD release-keys
Mi account info:
 status: off
 user id: 
 lost mode: no
crypto state: encrypted
Scanning for Qualcomm HS-USB QDLoader 9008 device...
Download Port: Qualcomm HS-USB QDLoader 9008 (COM3)
 Connection status: XHCI:HUB3:USB 2.0 High-Speed
 USB Driver: [Qualcomm Incorporated] qcusbser, version: 2.1.2.0, date: 7-8-2015
Initializing... 
platform: msm8937, cpu abi: arm64-v8a
manufacturer: Xiaomi
board: QC_Reference_Phone, name: ugg
brand: xiaomi, model: Redmi Note 5A
build id: N2G47H, version: 7.1.2 Nougat (N2G47H) (MIUI9)
build description: ugg-user 7.1.2 N2G47H V9.6.2.0.NDKMIFD release-keys
Reading gpt_main0 at 0x00000000-0x000043FF size: 17 KiB...  Done.
Reading modem at 0x04000000-0x093FFFFF size: 84 MiB...  Done.
Reading fsc at 0x0C000000-0x0C0003FF size: 1 KiB...  Done.
Reading ssd at 0x0C000400-0x0C0023FF size: 8 KiB...  Done.
Reading sbl1 at 0x0C002400-0x0C0823FF size: 512 KiB...  Done.
Reading sbl1bak at 0x0C082400-0x0C1023FF size: 512 KiB...  Skipped
Reading rpm at 0x0C102400-0x0C1823FF size: 512 KiB...  Done.
Reading rpmbak at 0x0C182400-0x0C2023FF size: 512 KiB...  Skipped
Reading tz at 0x0C202400-0x0C4023FF size: 2 MiB...  Done.
Reading tzbak at 0x0C402400-0x0C6023FF size: 2 MiB...  Skipped
Reading devcfg at 0x0C602400-0x0C6423FF size: 256 KiB...  Done.
Reading devcfgbak at 0x0C642400-0x0C6823FF size: 256 KiB...  Done.
Reading dsp at 0x0C682400-0x0D6823FF size: 16 MiB...  Done.
Reading modemst1 at 0x0D682400-0x0D8023FF size: 1.50 MiB...  Done.
Reading modemst2 at 0x0D802400-0x0D9823FF size: 1.50 MiB...  Done.
Reading DDR at 0x10000000-0x10007FFF size: 32 KiB...  Done.
Reading fsg at 0x10008000-0x10187FFF size: 1.50 MiB...  Done.
Reading sec at 0x10188000-0x1018BFFF size: 16 KiB...  Done.
Reading splash at 0x14000000-0x14AFFFFF size: 11 MiB...  Done.
Reading aboot at 0x18000000-0x180FFFFF size: 1 MiB...  Done.
Reading abootbak at 0x18100000-0x181FFFFF size: 1 MiB...  Skipped
Reading boot at 0x18200000-0x1C1FFFFF size: 64 MiB...  Done.
Reading recovery at 0x1C200000-0x201FFFFF size: 64 MiB...  Done.
Reading devinfo at 0x20200000-0x202FFFFF size: 1 MiB...  Done.
Reading system at 0x20300000-0xE02FFFFF size: 3 GiB...  Done.
Reading cache at 0xE4000000-0xF3FFFFFF size: 256 MiB...  Done.
Reading persist at 0xF4000000-0xF5FFFFFF size: 32 MiB...  Skipped
Reading misc at 0xF6000000-0xF60FFFFF size: 1 MiB...  Done.
Reading keystore at 0xF6100000-0xF617FFFF size: 512 KiB...  Done.
Reading config at 0xF6180000-0xF6187FFF size: 32 KiB...  Done.
Reading oem at 0xF6188000-0x106187FFF size: 256 MiB...  Done.
Reading limits at 0x108000000-0x108007FFF size: 32 KiB...  Done.
Reading mota at 0x10C000000-0x10C07FFFF size: 512 KiB...  Done.
Reading dip at 0x10C080000-0x10C17FFFF size: 1 MiB...  Done.
Reading mdtp at 0x10C180000-0x10E17FFFF size: 32 MiB...  Done.
Reading syscfg at 0x10E180000-0x10E1FFFFF size: 512 KiB...  Done.
Reading mcfg at 0x10E200000-0x10E5FFFFF size: 4 MiB...  Done.
Reading cmnlib at 0x110000000-0x11003FFFF size: 256 KiB...  Done.
Reading cmnlibbak at 0x110040000-0x11007FFFF size: 256 KiB...  Done.
Reading cmnlib64 at 0x110080000-0x1100BFFFF size: 256 KiB...  Done.
Reading cmnlib64bak at 0x1100C0000-0x1100FFFFF size: 256 KiB...  Done.
Reading keymaster at 0x110100000-0x11013FFFF size: 256 KiB...  Done.
Reading keymasterbak at 0x110140000-0x11017FFFF size: 256 KiB...  Done.
Reading apdp at 0x114000000-0x11403FFFF size: 256 KiB...  Done.
Reading msadp at 0x114040000-0x11407FFFF size: 256 KiB...  Done.
Reading dpo at 0x114080000-0x114081FFF size: 8 KiB...  Done.
Reading logdump at 0x114082000-0x118081FFF size: 64 MiB...  Done.
Reading cust at 0x11C000000-0x14FFFFFFF size: 832 MiB...  Done.


*Screenshoot :
Read Info By UfiBox


Read Firmware By UfiBox

Oke untuk file-nya silahkan download dibawah ini :
ugg-user 7.1.2 N2G47H V9.6.2.0.NDKMIFD release-keys

NOTE :
  • File diatas gratis tanpa password
  • Segera laporkan jika link diatas mati atau rusak
  • Apabila berkenan tolong tinggalkan sedikit komentar secukup-nya saja