11111111
*********************************************************************
All Phone Solution Please Click All Phone Tip


***************************************************************************

Saturday, November 2, 2024

Full read backup scatter and Dump files Tecno Spark 10 pro (Ki7) by Unlock Tool file tested 100% Android 13

 Full read backup scatter and Dump files 

Tecno Spark 10 pro (Ki7)

by Unlock Tool  file tested 100% 

         Android 13 



#1-Check and Start Back Scatter file  via Unlock-Tool 

READ BACK Reading preloader [512 KiB] -> preloader.bin... OK
Reading pgpt [32 KiB] -> pgpt.bin... OK
Reading boot_para [26 MiB] -> boot_para.bin... OK
Reading proinfo [3 MiB] -> proinfo.bin... OK
Reading misc [512 KiB] -> misc.img... OK
Reading para [512 KiB] -> para.bin... OK
Reading expdb [20 MiB] -> expdb.bin... OK
Reading frp [1023 KiB] -> frp.bin... OK
Reading tkv_a [1 MiB] -> tkv_a.img... OK
Reading vbmeta_a [8 MiB] -> vbmeta_a.img... OK
Reading vbmeta_system_a [8 MiB] -> vbmeta_system_a.img... OK
Reading vbmeta_vendor_a [8 MiB] -> vbmeta_vendor_a.img... OK
Reading tkv_b [1 MiB] -> tkv_b.img... OK
Reading vbmeta_b [8 MiB] -> vbmeta_b.img... OK
Reading vbmeta_system_b [8 MiB] -> vbmeta_system_b.img... OK
Reading vbmeta_vendor_b [8 MiB] -> vbmeta_vendor_b.img... OK
Reading md_udc [22.6 MiB] -> md_udc.bin... OK
Reading metadata [32 MiB] -> metadata.img... OK
Reading nvcfg [32 MiB] -> nvcfg.img... OK
Reading nvdata [64 MiB] -> nvdata.img... OK
Reading persist [48 MiB] -> persist.img... OK
Reading protect1 [8 MiB] -> protect1.img... OK
Reading protect2 [12.37 MiB] -> protect2.img... OK
Reading seccfg [8 MiB] -> seccfg.bin... OK
Reading md1img_a [128 MiB] -> md1img_a.img... OK
Reading spmfw_a [1 MiB] -> spmfw_a.img... OK
Reading scp_a [6 MiB] -> scp_a.img... OK
Reading sspm_a [1 MiB] -> sspm_a.img... OK
Reading gz_a [16 MiB] -> gz_a.img... OK
Reading lk_a [2 MiB] -> lk_a.img... OK
Reading logo_a [8 MiB] -> logo_a.img... OK
Reading boot_a [32 MiB] -> boot_a.img... OK
Reading vendor_boot_a [64 MiB] -> vendor_boot_a.img... OK
Reading init_boot_a [8 MiB] -> init_boot_a.img... OK
Reading dtbo_a [8 MiB] -> dtbo_a.img... OK
Reading tee_a [6 MiB] -> tee_a.img... OK
Reading sec1 [2 MiB] -> sec1.bin... OK
Reading nvram [70 MiB] -> nvram.img... OK
Reading md1img_b [128 MiB] -> md1img_b.img... OK
Reading spmfw_b [1 MiB] -> spmfw_b.img... OK
Reading scp_b [6 MiB] -> scp_b.img... OK
Reading sspm_b [1 MiB] -> sspm_b.img... OK
Reading gz_b [16 MiB] -> gz_b.img... OK
Reading lk_b [2 MiB] -> lk_b.img... OK
Reading logo_b [8 MiB] -> logo_b.img... OK
Reading boot_b [32 MiB] -> boot_b.img... OK
Reading vendor_boot_b [64 MiB] -> vendor_boot_b.img... OK
Reading init_boot_b [8 MiB] -> init_boot_b.img... OK
Reading dtbo_b [8 MiB] -> dtbo_b.img... OK
Reading tee_b [6 MiB] -> tee_b.img... OK
Reading super [9.8 GiB] -> super.img... OK
Reading tranfs [300.8 MiB] -> tranfs.img... OK
Reading userdata [105.42 GiB] -> userdata.img... OK
Reading otp [43 MiB] -> otp.img... OK
Reading flashinfo [16 MiB] -> flashinfo.img... OK
UNLOCKTOOL 2024.10.24.0
Elapsed time : 7 minutes 53 seconds

#2 -Start Back Full Dump file  via Unlock-Tool 

BOOT1
BOOT2
MT6768.map
USERAREA

#3

Testing flashing  file via Unlock-Tool 

FLASH Selected auth : INFINIX/TECNO/ITEL [1]
Phone must have battery inside!
Waiting for device... COM8 [BOOTROM:0E8D:0003]
Initializing usb... OK
Waiting for device... COM8 [BOOTROM:0E8D:0003]
Bypassing authentication... OK
Analyzing... preloader_ki7_v7510.bin [MT6769:9:1552] [Internal]
Handshaking... OK
Reading hardware info... OK
  Hardware : MT6768 [Helio G70|G80|G85|P65] 0707 8A00 CA00 0000
  Security Config : SCB SLA DAA 
  MEID : 401D25F1714F4915CF44CBB37FA8EE6D
Sending Download-Agent [1]... OK
Syncing with device... OK
Booting device... OK
Syncing with DA... OK
  Storage : EMMC - CID : 4D002DD6.3231434D.2F105138.372ABBCC 
  Vendor : Samsung - Name : MMC128 - Serial : 3150720784 - Rev : 81
  Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 4 MiB - User Area : 116.5 GiB 
Tips : GPT not initialized! Using scatter as partition map!
Writing preloader.bin [322.5 KiB] -> preloader [512 KiB]... OK
Writing preloader.bin [322.5 KiB] -> preloader_backup [512 KiB]... OK
Writing tkv_a.img [1 MiB] -> tkv_a [1 MiB]... OK
Writing vbmeta_a.img [8 MiB] -> vbmeta_a [8 MiB]... OK
Writing vbmeta_system_a.img [8 MiB] -> vbmeta_system_a [8 MiB]... OK
Writing vbmeta_vendor_a.img [8 MiB] -> vbmeta_vendor_a [8 MiB]... OK
Writing md1img_a.img [128 MiB] -> md1img_a [128 MiB]... OK
Writing spmfw_a.img [1 MiB] -> spmfw_a [1 MiB]... OK
Writing scp_a.img [6 MiB] -> scp_a [6 MiB]... OK
Writing sspm_a.img [1 MiB] -> sspm_a [1 MiB]... OK
Writing gz_a.img [16 MiB] -> gz_a [16 MiB]... OK
Writing lk_a.img [2 MiB] -> lk_a [2 MiB]... OK
Writing logo_a.img [8 MiB] -> logo_a [8 MiB]... OK
Writing boot_a.img [32 MiB] -> boot_a [32 MiB]... OK
Writing vendor_boot_a.img [64 MiB] -> vendor_boot_a [64 MiB]... OK
Writing init_boot_a.img [8 MiB] -> init_boot_a [8 MiB]... OK
Writing dtbo_a.img [8 MiB] -> dtbo_a [8 MiB]... OK
Writing tee_a.img [6 MiB] -> tee_a [6 MiB]... OK
Writing super.img [9.8 GiB] -> super [9.8 GiB]... OK
Writing tranfs.img [300.8 MiB] -> tranfs [300.8 MiB]... OK
Writing userdata.img [141.09 MiB] -> userdata [105.42 GiB]... OK
UNLOCKTOOL 2024.10.24.0
Elapsed time : 7 minutes 49 seconds


Video Details 

All this file backup is very important help while your phone hang on logo/ stuck on logo and suddently rebooting and can  fix pin lock / pattern lock that forgotten also can frp remove and give any solution more. 

This file for Tecno Spark 10 pro (Ki7) 

Device Name :TECNO SPARK 10 PRO 

MODEL Name: TECNO KI7

Android  Version : 13

CPU : Helio 

Frunt Camera: 32 M

Rear Camera 50M DUAL Camera 

RAM :8.00GB (5+.00GB)

8GB expandabled

ROM(Storage):128.00GB

Battery :5000 mAh

Screen: 1080x2460

HiOS version: HiOS V12.6.0(OS12.6-T-P102-230213)

Build number KI7-v7510AACDGHJKLMN-T-G230712V3121

Chip set MTK ( MediaTekMT6768.

(Atenstionning)

Befor starting flashing Scatter file or Dump File to your device, DON'T forget read bacup your iMEI or NV first, for save for your phone lost imei You can restoring it back. 

#Tecno_Spark_10Pro_KI7,

#highSecurytipatch,

#OrangFix,

#logoFix,

#smartphonelogofix,

#infinityTecno,

#allandroidphonesolution,

#bdm007,

#UnlockTool,

   Please DONATE for Coffee









0 Comments:

Post a Comment

22222

 
0000000