La visita de invitados es limitada
Instala la aplicación
How to install the app on iOS

Follow along with the video below to see how to install our site as a web app on your home screen.

Nota: This feature may not be available in some browsers.

  • ⚠ Queda Prohibido comentario que no aporten nada a los temas como por ejemplo me quedo full sin pegar registro ni nada o comentario que solo contaminan los tema haga comentario de interes comentario que encuentre que no tienen sentido comentario borrado⚡
  • ⚠️ frp cuenga google nvdata combination todo lo que necesites Hostingunlock firmware rom sboot ⚠️
  • ⚠️ Por favor leer el Reglamento para evitar sanciones e inconvenientes con la página⚠️
  • ⚠ No está permitido decir GRACIAS en los temas; no contamine los temas con gracias y gracias; si no hace toma en cuenta estas reglas, su cuenta será suspendida por un mes.⚠️
  • ⚠️ si quiere descargar alguna archivo leea la seccion de tutoriales⚠️

📶Imei/F4 hacer f4 imei Note 11 Pro 4G (Viva) con pandora box

Procesos y métodos para reparar o restaurar el IMEI en dispositivos móviles. Incluye solución de errores F4 y procedimientos con herramientas técnicas.
Estado
Cerrado para nuevas respuestas.

servergsm

Heròico
Staff Miembro
Administrador
Moderador
Usuario VIP
Online
Note 11 Pro 4G (Viva) hacer f4 imei con pandora box
[SVGSUCCESS]
Selected model: Xiaomi Redmi Note 11 Pro 4G (Viva)

[/SVGSUCCESS]

[SVGSUCCESS]
Operation: Repair
[/SVGSUCCESS]

Software version: 6.8

Connect Type-C to NONE... OK
Host Power Off... OK
Connect phone to [PC] in BROM/PRELOADER Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V2023,usb2ser_mtk.sys,3.0.1512.0]
You are using driver version 3.0.1512.0, we recommend using version 3.0.1504.0 for proper operation. You can install the correct driver from the program directory.
Device found at COM4 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 1066
Get sec config... OK [000000E7]
Active sec flags: [SBC SLA DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6781]
LibUSB installed
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Release testpoint, waiting 2 seconds
Advanced Bypass Security... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V2023,usb2ser_mtk.sys,3.0.1512.0]
You are using driver version 3.0.1512.0, we recommend using version 3.0.1504.0 for proper operation. You can install the correct driver from the program directory.
Device found at COM4 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 1066
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6781]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x78768D27, 0xE8CEF360, 0xEA01C712, 0x420B2CBF
Get Chip ID... [MT6781]
Get SOC ID... [E5C2F53DAA8CA6D50B675FE1DC5E3B59734F240B4503097D8E 96F8C9FED19662]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [11]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
UFS CID (FW VER): KM8L9001JM-B624 (0300)
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
UFS INFO:
UFS_CID : KM8L9001JM-B624
UFS_FWVER : 0300
BLOCK_SIZE: 0x0000001000 (4.00Kb)
UFS_LU0 : 0x0000400000 (4.00Mb)
UFS_LU1 : 0x0000400000 (4.00Mb)
UFS_LU2 : 0x1DCB000000 (119.17Gb)
RAM INFO:
INT_SRAM: 0x0000060000 (384.00Kb)
EXT_RAM : 0x0200000000 (8.00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK [A]
Read product info... [EXT4] ... OK
Product Brand : Redmi
Product Manufacturer : Xiaomi
Product Model : viva
Product Name : viva_global
Product Device : viva
Product Board : viva
Board Platform : mt6781
Build ID : SP1A.210812.016
Build Date : Fri Mar 1 08:58:06 UTC 2024
Display ID : TP1A.220624.014
Security Patch : 2024-02-01
Version SDK : 33
Version Release : 13
Version Codename : REL
Firmware Version : V816.0.3.0.TGDMIXM
Read security partition from phone...
Decrypting security data... OK
Encrypt security data... OK
Read partition "nvdata"... OK
Read partition "protect1"... OK
Read partition "nvram"... OK
Read NVDATA files... OK
Read NVRAM files... OK
Read security files... OK
Calculating... OK
Read IMEI... OK
IMEI 1: 867359060504828
IMEI 2: 867359060504836
Repairing IMEI...
IMEI 1: 350000000000021
IMEI 2: 350000000000013
Write IMEI and patch CERT [NVDATA]... OK
Load partiton for patching... OK
Patching... OK
Selected "Auto unlock bootloader"
Read security partition from phone... OK
Write security partition to phone... OK
Unlock bootloader done!
Selected "Disable VBMETA verification"
Read security partition from phone... OK
Write security partition to phone... OK
Write IMEI and patch CERT [NVRAM]... OK
Write partition "nvdata"... OK
Write partition "nvram"... OK
Repair Security and Patch cert done!
If your phone after repair keeps rebooting - use wipe data option.
Report Post
 
Estado
Cerrado para nuevas respuestas.

Usuarios que están viendo este hilo.

Atrás
Arriba