Www.iremmc.com
898 subscribers
1.03K photos
29 videos
170 files
1.44K links
مرجع فروش دامپ و فایل های تست شده
لینک گروه عمومی 👇👇
@Iremmc_team

وب سایت رسمی تیم 👇👇👇


Www.iremmc.com
Download Telegram
InfinityBox_install_CM2MT2_v2.29.7z
133.7 MB
فایل نصبی اپدیت جدید CM2MT2 ورژن 2.29

pas : 12345678
Vivo Security Repair,RPMB Read/Write etc
24-11-2021
====================
MTK One Click
No need to select any model
No need to select any DA/preloader
Simply tick required options and execute

Added RPMB Read/Write

Added Vivo IMEI/MEID/Serial Repair

Added Permanent Bootloader Unlock (Redmi6/6A)

Updated Bootloader Unlock/Relock Functions
Should be faster and more reliable now

Updated SLA/DAA Auth Bypass
Now no need of UsbDk, libusb0 is good enough
Please remove UsbDk and Install filter driver from software

Updated MTK One Click functions
Format FS should now use another method automatically if normal method failed
Reset FRP improved to work more better
Added second method for Vivo Factory Reset

Updated Flash Function
Flashing should work more stable now
Fixed issue with cust partition flashing on Xiaomi Devices

Fixed Crash Preloader Bug in last version

MTK One Click supports most phones regardless of Brand and Model

Important
Features introduced may work on other devices too, which are not listed here
User needs to untick By Model checkbox to be able to select Platform manually
For manual work, just select Platform and DA
For new secured devices, use Disable Auth, and select Preloader
Rest operations will work same
umt mtk verion 4.5
new face
Printing phone history

Repair IMEI
30.06.2021
15:24

Root/Unroot
30.06.2021
15:19

Patch certificate started
Gathering phone info...
Collecting information. Be patient! Do NOT disconnect the phone!
Model: SM-J600F
Carrier ID: MID
Sales Code: SEK
Country Code: Ukraine
Timezone: Europe/Istanbul
Android Version: 10 [QP1A.190711.020] [SDK 29]
Build Date: Mon Feb 22 17:21:20 +07 2021
PDA Version: J600FXXUACUB1 [february 2021, rev1]
Phone Version: J600FXXUACUB1 [february 2021, rev1]
CSC Version: J600FOEMACUB1 [february 2021, rev1]
Board Platform: UNIVERSAL7870
Modem Platform: SHANNON315
Serial Number: RZ8KA0QGR1E
Imei: 35******************
Imei2: 35****************
Network Type: GSM
SIM Status: ABSENT,LOADED
Multisim Config: DSDS
Knox Version: v30
Warranty Bit: 1
Security Patch: 2021-02-01
Em Did: 0535F784F7D4
Preparing...
Checking root access.
The phone is rooted by: 3.19:EFTSU
Previously installed patchcert detected.
Reading data...
The operation is in progress. Be patient! Do NOT disconnect the phone!
Patching certificate...
Checking root access.
About 30-180 seconds after the phone starts, the signal strength indicator turns OFF and then turns ON again after a few seconds.
You can check the status of the imei using: *#0011#
The patchcert can be removed by repeating the process.
After installing new firmware, the patchcert process must be repeated.
Successfully finished.
Finished at local time: [06.30.21 18:30:48]
WorkID: 140315692
Erase partition Ok!

Operation finished!

Operation : Erase Memory

Erase selected partitions [2]
[0] Erase partition : NVDATA
Erase partition Ok!
[1] Erase partition : NVRAM
Erase partition Ok!

Operation finished!


Close MemoryTool session

Done!
Elapsed: 00:02:21

Reconnect Power/Cable!

Operation : Repair Security [ v2.27 ]
Mode : FLASH

1. Make sure device is powered off. Power off, if need. Wait 20 seconds after
2. Insert USB cable in phone
Waiting for device connection ...

PTFN : MediaTek USB Port (COM17)
MODE : BOOTROM
PORT : 17
Waiting BOOT ack ...
BROM : Skip ACK verify
BROM : Init BROM
BROM init passed!
CHIP : MT6833 , SBID : 0x8A00 , HWVR : 0xCA00 , SWVR : 0x0000
CODE : Palmer
TYPE : MODERN [RAPHAEL]
BROM : MEID : 1DAAA8315A0664385D04821C3E589216
BROM : SecLevel : 0x000000E7
BROM : SecMode : SBC+SLA+SDA+EXT
BROM : BROM|BL : 0x05|0xFE
BROM : BOOTROM
BROM : SOCID : 9F25435887F9C20CE5EBD4F0271ED4080D0B99716A481CBE7D28D78E884D6C55
BROM : SLA : Local Auth
BROM : SLA : Auth Started!
BROM : SLA : Auth Passed!
BROM : SLA : 0x0000001F
AGENT : 0_base : BASE_v2112 | Manual : Disabled
AGENT : Look for suitable BootChain in DA ...
AGENT : MTK_AllInOne_DA.bin
AGENT : Found MT6833
AGENT : MTK_DOWNLOAD_AGENT
BROM : Sending 1st DA ...
BROM : DA sent
BROM :Transfer control to DA ...
DA : AGENT started!
DA : SYNC
DA : MODE : BROM
DA : EXT_RAM NOT initialized!
EMI : DEV : FireFly
EMI : SRC : preloader_camellia.bin
EMI : CNT : 0007
EMI : Init EMI from INTERNAL DB
EMI : EXT_RAM CFG Passed!
DA : BOOT to 2nd DA ...
DA : 2ND stage confirmed!
DA : SYNC with DA passed!
DA : Receiving HW info

SRAM: 0x00070000 [ 448,00 KB ]
DRAM: 0x100000000 [ 4,00 GB ]

UFS: 2C014D54313238474153414F34553231
UFS:
VEN : 0x012C
VID : MT128GASAO4U21
IFW : 0605
LU0 : 0x00400000 [ 4,00 MB ]
LU1 : 0x00400000 [ 4,00 MB ]
LU2 : 0x1DCB000000 [ 119,17 GB ]
REG : 0x101010000

CHIP : MT6833 , SBID : 0x8A00 , HWVR : 0xCA00 , SWVR : 0x0001 , EVOL : 0x0000

RNID : 40E827CE885D560AA4283ED4B89F00

DA : USB : HIGH-SPEED

Boot done!

NVRAM check : Failed! NVRAM empty!


Done!
Elapsed: 00:00:35

Reconnect Power/Cable!

Operation : Repair Security [ v2.27 ]
Mode : META

1. Make sure device is powered off. Power off, if need. Wait 20 seconds after
2. Insert USB cable in phone
Waiting for device connection ...

PTFN : MediaTek USB Port (COM17)
MODE : BOOTROM
PORT : 17
Waiting BOOT ack ...
BROM : Skip ACK verify
BROM : Init BROM
BROM init passed!
CHIP : MT6833 , SBID : 0x8A00 , HWVR : 0xCA00 , SWVR : 0x0000
CODE : Palmer
TYPE : MODERN [RAPHAEL]
BROM : MEID : 1DAAA8315A0664385D04821C3E589216
BROM : SecLevel : 0x000000E7
BROM : SecMode : SBC+SLA+SDA+EXT
BROM : BROM|BL : 0x05|0xFE
BROM : BOOTROM
BROM : SOCID : 9F25435887F9C20CE5EBD4F0271ED4080D0B99716A481CBE7D28D78E884D6C55
BROM : SLA : Local Auth
BROM : SLA : Auth Started!
BROM : SLA : Auth Passed!
BROM : SLA : 0x0000001F
BROM : Configuring target for META

BROM : META configured!

INIT : META confirmed!

Boot done!

AP_CHIP : MT6833
AP_SWTM : Fri Apr 16 02:51:14 CST 2021
AP_DSPP : camelliagl
AP_SWVR : alps-mp-r0.mp3.tc8sp2-mt6833-V1.4_huaqin.r0mp3.k6833v1.64_P20
MD_CHIP : MT6833
MD_SWTM : 2000.00.00
MD_DSPV : 1.0
MD_DSPP : MOLY.NR15.R3.MP.V4.3.T13
MD_SWVR : HUAQIN_R0MP3_K6833V1_64_HW
MD_HWVR : Unknown

IMEI[0] : [ ERASED ]
IMEI[1] : [ ERASED ]

IMEI[1] : 3581******
Item : update Ok!

Done!
Elapsed: 00:00:55

Reconnect Power/Cable!
Welcome to Octoplus Samsung Software v.4.0.0.2 Loading account information.. Your balance: 120 credit(s) Work ID: 0000000001E5A74D Starting Repair Imei (Nov.2020) Selected model: SM-A507FN Searching ADB devices... Press "OK" button on the device to allow USB debugging Reading info... Detected model: SM-A507FN Fingerprint: samsung/a50sxx/a50s:11/RP1A.200720.012/A507FNXXU5DUG4:user/release-keys Firmware compiled date: Thu Jul 29 11:04:44 KST 2021 PDA version: A507FNXXU5DUG4 CSC version: A507FNOLM5DUG4 SW version: A507FNXXS5BTI1 Build number: QB16793210 Phone SN: RR8MA0FPZHB Android version: 11 (RP1A.200720.012) Sales code: XME Country: MALAYSIA HW platform: universal9611 HW Chip: exynos9611 HW Modem: MP0.100 Security patch level: 2021-08-01 Warranty Void: 1 Codename: a50sxx SIM 1 status: ABSENT SIM 2 status: ABSENT Modem board: SHANNON337 Connecting to server... Username: bqTGk0fZvX Checking network status... OK Device is rooted Starting exploit... Current IMEI A: Current IMEI B: Bypassing security 1... Bypassing security 2... Resetting MSL... Repairing IMEI A... New IMEI A: Repairing IMEI B... New IMEI B: After successful Repair IMEI, Repair Network operation needs to be done as well. Press "Yes" to perform Repair Network operation now, or "No" to perform it later. Repairing network... Rebooting device... Searching ADB devices... This could be a special phone where root can be included in the recovery partition. This means that the phone must be started in recovery mode with a key combo or restarted in recovery mode via adb. If you are sure that your phone is rooted and want to restart in recovery mode, click "Yes" Checking network status... OK Device is not rooted Execution time 5 minute(s) 42 second(s) Performed by 4.0.0.2 Software versi