Realme C3/C3i readback RMX2020 Firmware tested RMX2027 Support File Repair Patch imei
Ditulis pada
views
Daftar Isi
Firmware Readback RMX2020 RMX2027
Alhamdulillah , selamat siang temen temen asc files , selamat datang kembali di website tercinta ❤️pada artikel kali ini kami bagikan file firmware fix realme c3/c3i rmx2020 /rmx2027 hasil read normal
datang customers membawa handphone dalam ke adaan lupa kunci , tanya kelengkapan lengkap
baik bisa di tunggu kami bilang , berhubung ini unit normal tanpa kendala kami read firmware nya
firmware hasil read ini sangat tested di jamin untuk mengatasi bootlop akibat software
brick akibat software red stated ingin kembali ke system original nya,
dan bahkan bisa untuk file penggantian emmc juga,
untuk cara flashing nya kami recomendasikan menggunakan unlocktool ,
lalu bagaimana jika tidak ada tool tersebut , untuk tipe ini menggunakan chipset mediatek
bisa menggunakan tool lainya seperti ufi android tool emt umt mrt spflashtool dan lainya...
Download link Firmware
Unduh firmware scatter :RMX2020_11.A.69_0690_Readback
File Patch imei RMX2020 RMX2027
File ini dapat mengatasi masalah imei null akibat salah format atau setelah ganti eMMC,Untuk menggunakan file ini harus unlockbootloader, kemudian flash file patch imei di bawah ini
!C3 C3i Patch imei indonesia.rar
log readback:
PATCH DM-VERIFY Authenticating... OK
Initializing usb... OK
Waiting for device... COM97
Bypassing authentication... OK
Analyzing preloader... preloader_oppo6769.bin [EMI:13] [Internal]
Vendor : OPPO/REALME
Handshaking... OK
Reading hardware info... OK
Hardware : MT6768 [Helio G70|G80|G85|P65] 0707 8A00 CA00 0000
Security Config : SCB SLA DAA
MEID : D5141FF082F79B3A506654BCACB1AF9E
Sending Download-Agent... OK
Syncing with target... OK
Booting device... OK
Syncing with DA... OK
Storage : EMMC - CID : 44000115.4D383644.FC9A0242.69B667C2
Vendor : Samsung - Name : DD68MB - Serial : 1740831898 - Rev : 2
Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 4 MiB - User Area : 29.12 GiB
Reading partition info... OK [48]
Reading device info... OK
Model Name : RMX2020
Manufacturer : realme
Android Version : 10
Security Patch : 2021-11-05
Display ID : QP1A.190711.020 release-keys
Market Name : realme C3i
OTA Version : RMX2020_11.A.69_0690_202111042254
Firmware ver : RMX2027_11_A.69_211104
READ BACK Authenticating... OK
Initializing usb... OK
Waiting for device... COM97
Bypassing authentication... OK
Analyzing preloader... preloader_oppo6769.bin [EMI:13] [Internal]
Vendor : OPPO/REALME
Handshaking... OK
Reading hardware info... OK
Hardware : MT6768 [Helio G70|G80|G85|P65] 0707 8A00 CA00 0000
Security Config : SCB SLA DAA
MEID : D5141FF082F79B3A506654BCACB1AF9E
Sending Download-Agent... OK
Syncing with target... OK
Booting device... OK
Syncing with DA... OK
Storage : EMMC - CID : 44000115.4D383644.FC9A0242.69B667C2
Vendor : Samsung - Name : DD68MB - Serial : 1740831898 - Rev : 2
Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 4 MiB - User Area : 29.12 GiB
Reading partition info... OK [48]
Reading device info... OK
Model Name : RMX2020
Manufacturer : realme
Android Version : 10
Security Patch : 2021-11-05
Display ID : QP1A.190711.020 release-keys
Market Name : realme C3i
OTA Version : RMX2020_11.A.69_0690_202111042254
Firmware ver : RMX2027_11_A.69_211104
Reading preloader [512 KiB] -> preloader.bin... OK
Reading pgpt [32 KiB] -> pgpt.bin... OK
Reading recovery_a [32 MiB] -> recovery_a.img... OK
Reading misc [512 KiB] -> misc.img... OK
Reading para [512 KiB] -> para.bin... OK
Reading opporeserve1 [8 MiB] -> opporeserve1.img... OK
Reading opporeserve2 [64 MiB] -> opporeserve2.img... OK
Reading opporeserve3 [64 MiB] -> opporeserve3.img... OK
Reading oppo_custom [1 MiB] -> oppo_custom.bin... OK
Reading expdb [20 MiB] -> expdb.bin... OK
Reading frp [1 MiB] -> frp.bin... OK
Reading vbmeta [8 MiB] -> vbmeta.img... OK
Reading vbmeta_system [8 MiB] -> vbmeta_system.img... OK
Reading vbmeta_vendor [8 MiB] -> vbmeta_vendor.img... OK
Reading md_udc [22.6 MiB] -> md_udc.bin... OK
Reading metadata [32 MiB] -> metadata.img... OK
Reading nvcfg [32 MiB] -> nvcfg.img... OK
Reading nvdata [64 MiB] -> nvdata.img... OK
Reading persist [48 MiB] -> persist.img... OK
Reading protect1 [8 MiB] -> protect1.img... OK
Reading protect2 [10.37 MiB] -> protect2.img... OK
Reading seccfg [8 MiB] -> seccfg.bin... OK
Reading sec1 [2 MiB] -> sec1.bin... OK
Reading proinfo [3 MiB] -> proinfo.bin... OK
Reading boot_para [26 MiB] -> boot_para.bin... OK
Reading nvram [64 MiB] -> nvram.img... OK
Reading cdt_engineering [8 MiB] -> cdt_engineering.img... OK
Reading logo [8 MiB] -> logo.bin... OK
Reading md1img [128 MiB] -> md1img.img... OK
Reading special_preload [768 MiB] -> special_preload.img... OK
Reading my_custom [256 MiB] -> my_custom.img... OK
Reading spmfw [1 MiB] -> spmfw.img... OK
Reading scp1 [6 MiB] -> scp1.img... OK
Reading scp2 [6 MiB] -> scp2.img... OK
Reading sspm_1 [1 MiB] -> sspm_1.img... OK
Reading sspm_2 [1 MiB] -> sspm_2.img... OK
Reading gz1 [16 MiB] -> gz1.bin... OK
Reading gz2 [16 MiB] -> gz2.img... OK
Reading lk [2 MiB] -> lk.bin... OK
Reading lk2 [2 MiB] -> lk2.bin... OK
Reading boot [32 MiB] -> boot.img... OK
Reading dtbo [8 MiB] -> dtbo.img... OK
Reading tee1 [5 MiB] -> tee1.img... OK
Reading tee2 [9 MiB] -> tee2.img... OK
Reading super [6.23 GiB] -> super.img... OK
Reading recovery [64 MiB] -> recovery.img... OK
Reading cache [432 MiB] -> cache.img... OK
Reading userdata [20.59 GiB] -> userdata.img... OK
Reading otp [43 MiB] -> otp.img... OK
Reading flashinfo [16 MiB] -> flashinfo.img... OK
UNLOCKTOOL 2022.01.08.0
Elapsed time : 10 minutes 13 seconds