Thursday, March 23, 2017

Cara Unlock Bootloader Evercoss A65 One-X






Langkah-Langkah Unlock Bootloader ;
1.Download fastboot tool terlebih dahulu disini
2.Extract Fastboot tool
3.Open comand prompt didalam folder fastboot tool
4.Sekarang, matikan handphone kemudian tekan dan tahan vol up + power

5.Pilih Fastboot dan sambungkan hp ke pc

5.Biarkan driver terinstall dengan baik
6.Kembali ke cmd , ketik "fastboot oem unlock" seperti gambar dibawah ini


7.Maka reaksinya seperti dibawah ini ;

8.Setelah selesai, sekarang ketik "fastboot -w" seperti gambar dibawah ini
9.Setelah sukses, sekarang matikan handphone
10.Sambungkan handphone ke pc sambil tekan tombol vol down
11.Untuk memastikan anda bisa lihat di "device & printer" seperti gambar dibawah ini 
12.Sekarang handphone bisa diflash via flashtool



source from  https://firmwarepedia.blogspot.co.id/2016/06/cara-flash-evercoss-a65-one-x-via.html

Friday, March 17, 2017

unlock jaringan SM-J105Y

Searching Samsung modem... detected COM26
Reading phone info... Ok
Model: SM-J105Y
Version: J105YDVU0API2/J105YTLP0API2/J105YDVU0API2/J105YDVU0API2
Product code: SM-J105YZWATLP
Phone SN: R28H92D4Z2Z
IMEI: 359600070349000
Unique number: CFN00BCD6D61873
Unlocking... Ok
Rebooting phone... Ok
Unlock done

Done with Samsung Tool PRO v.27.8

Monday, March 13, 2017

flasing advan miki_s9710_advan_x7_v23_intel

Warning: Chip mismatch. HW is [Sofia_3G_R]  SW expects [Sofia_3G]
Device synchronized.
Injecting RPSI
Injecting EBL
Boot-loader is active
EBL version: SF_3GR_1546.300_MKEYSKEY 1546..300
Boot mode is: BB
Using: Faster CRC, Writing all blocks , Skip data CRC , Skip protocol CRC
Package length is 16384 - protocol: 3.32
Baud rate set to 921600
Get flash id.
Flash ID is: 00000000
Boot process finished

Start downloading item 'BOOT CORE PSI:psi_flash.fls'' from file 'C:\Users\fajr lab\Desktop\Image-sofia3gr\psi_flash.fls''.
Erasing all flash memory
Sending sec-pack.
  Load region 0
  - Sending data. (USB RAW mode)
Sending end-pack.
Checksum OK (0x0000)
Verify OK
Process time was 11.2 sec.

Start downloading item 'BOOT CORE SLB:slb.fls'' from file 'C:\Users\fajr lab\Desktop\Image-sofia3gr\slb.fls''.
Sending sec-pack.
  Load region 0
  - Sending data. (USB RAW mode)
Sending end-pack.
Checksum OK (0x0000)
Verify OK
Process time was 141 msec.

Start downloading item 'CODE:mobilevisor.fls'' from file 'C:\Users\fajr lab\Desktop\Image-sofia3gr\mobilevisor.fls''.
Sending sec-pack.
  Load region 0
  - Sending data. (USB RAW mode)
Sending end-pack.
Checksum OK (0x0000)
Verify OK
Process time was 110 msec.

Start downloading item 'CUST:boot.fls'' from file 'C:\Users\fajr lab\Desktop\Image-sofia3gr\boot.fls''.
Sending sec-pack.
  Load region 0
  - Sending data. (USB RAW mode)
Sending end-pack.
Checksum OK (0x0000)
Verify OK
Process time was 983 msec.

Start downloading item 'CUST:cache.fls'' from file 'C:\Users\fajr lab\Desktop\Image-sofia3gr\cache.fls''.
Sending sec-pack.
  Load region 0
  - Sending data. (USB RAW mode)
Sending end-pack.
Checksum OK (0x0000)
Verify OK
Process time was 1497 msec.

Start downloading item 'CUST:misc.fls'' from file 'C:\Users\fajr lab\Desktop\Image-sofia3gr\misc.fls''.
Sending sec-pack.
  Load region 0
  - Sending data. (USB RAW mode)
Sending end-pack.
Checksum OK (0x0000)
Verify OK
Process time was 47 msec.

Start downloading item 'CUST:mvconfig_smp.fls'' from file 'C:\Users\fajr lab\Desktop\Image-sofia3gr\mvconfig_smp.fls''.
Sending sec-pack.
  Load region 0
  - Sending data. (USB RAW mode)
Sending end-pack.
Checksum OK (0x0000)
Verify OK
Process time was 63 msec.

Start downloading item 'CUST:nvm_fix_feid_285.fls'' from file 'C:\Users\fajr lab\Desktop\Image-sofia3gr\nvm_fix_feid_285.fls''.
Sending sec-pack.
  Load region 0
  - Sending data. (USB RAW mode)
Sending end-pack.
Checksum OK (0x0000)
Verify OK
Process time was 156 msec.

Start downloading item 'CUST:recovery.fls'' from file 'C:\Users\fajr lab\Desktop\Image-sofia3gr\recovery.fls''.
Sending sec-pack.
  Load region 0
  - Sending data. (USB RAW mode)
Sending end-pack.
Checksum OK (0x0000)
Verify OK
Process time was 1326 msec.

Start downloading item 'CUST:secvm.fls'' from file 'C:\Users\fajr lab\Desktop\Image-sofia3gr\secvm.fls''.
Sending sec-pack.
  Load region 0
  - Sending data. (USB RAW mode)
Sending end-pack.
Checksum OK (0x0000)
Verify OK
Process time was 110 msec.

Start downloading item 'CUST:splash_img.fls'' from file 'C:\Users\fajr lab\Desktop\Image-sofia3gr\splash_img.fls''.
Sending sec-pack.
  Load region 0
  - Sending data. (USB RAW mode)
Sending end-pack.
Checksum OK (0x0000)
Verify OK
Process time was 1077 msec.

Start downloading item 'CUST:system.fls'' from file 'C:\Users\fajr lab\Desktop\Image-sofia3gr\system.fls''.
Sending sec-pack.
  Load region 0
  - Sending data. (USB RAW mode)
Sending end-pack.
Checksum OK (0x0000)
Verify OK
Process time was 2 min 23  sec.

Start downloading item 'CUST:ucode_patch.fls'' from file 'C:\Users\fajr lab\Desktop\Image-sofia3gr\ucode_patch.fls''.
Sending sec-pack.
  Load region 0
  - Sending data. (USB RAW mode)
Sending end-pack.
Checksum OK (0x0000)
Verify OK
Process time was 1435 msec.

Start downloading item 'CUST:userdata.fls'' from file 'C:\Users\fajr lab\Desktop\Image-sofia3gr\userdata.fls''.
Sending sec-pack.
  Load region 0
  - Sending data. (USB RAW mode)
Sending end-pack.
Checksum OK (0x0000)
Verify OK
Process time was 12.0 sec.

Total time was 2 min 55  sec.
Channel 1 is succesfully closed.




jtag samsung gt-s7270 done with easy jtag tools

Initialising: SAMSUNG GT-S7270 Config ver.:1.00
I/O Level set to : 2200 mV
Box S/N: 1616110C5BA0F627 ,FW Ver.: 01.58
Connecting to Target...
JTAG device: BCM21654
CPU IDCODE : 0x4BA00477 Mfg.: 0x23b, Part: 0xba00, Ver.: 0x4
CPU Manufacturer: QUALCOMM , CPU Name: CORTEX A9
Halting CPU...
Init target ...
Starting target communication...
Detecting emmc memory parameters of bank (0) ...
EMMC #0 : ID : 0x01000015 Name : M00U5K Size : 3.6 G , (7634944) Blocks
EMMC #1 : ID : 0x01000015 Name : M00U5K Size : 2.0 M , (4096) Blocks
eMMC flash device(s) found, Device ID : 0x00150000
NAND Writing BOOT, PIT, MD5...
eMMC Write OK! Elapsed time: 0.467027s (548.148 KiB/s)
NAND Writing CAL...
eMMC Write OK! Elapsed time: 0.965055s (1061.079 KiB/s)
NAND Writing SYSPARM_DEP...
eMMC Write OK! Elapsed time: 0.774044s (330.731 KiB/s)
NAND Writing PARM_SPML...
eMMC Write OK! Elapsed time: 0.390022s (656.373 KiB/s)
NAND Writing RF_CAL...
eMMC Write OK! Elapsed time: 0.482028s (531.089 KiB/s)
NAND Writing SBL1...
eMMC Write OK! Elapsed time: 8.916510s (229.686 KiB/s)
NAND Writing SBL2...
eMMC Write OK! Elapsed time: 1.685097s (1215.360 KiB/s)
NAND Writing PARAM...
eMMC Write OK! Elapsed time: 13.222756s (619.538 KiB/s)
NAND Writing DTS...
eMMC Write OK! Elapsed time: 0.454026s (1127.689 KiB/s)
All Done.

Sunday, March 12, 2017

flasing lg d686 done with ufi android tool

BROM version: 7.1324.0.0
Loading DA: MTK_AllInOne_DA.bin (1.20 MiB)
 version: 7.1328.0.0.1005, start addr: 0x40000800
Connecting to BootROM...
Power off the phone, disconnect and reconnect the battery(if possible) and connect USB cable...
 Scanning BootROM or Preloader port... Done.
 Detected LGE AndroidNet USB Serial Port (COM10)
Sending download agent... Done.
USB speed: USB_HIGH_SPEED
Platform: MT6577_S00, Hw ver: 0xCA00, Sw ver: 0xE100
 Secure ver: 0xFF, BL ver: 0x01
 SRAM size: 128 KiB
DRAM size: 1 GiB
Card/BGA: BGA (Discrete embedded)
Manufacturer ID: 0x90 (SK Hynix)
Product name: H8G2d (0x483847326404), rev: 0x03, serial number: 0x01A591C5
Manufacturing date: Nov 2013
CID: 90014A48 38473264 040301A5 91C5B099
Capacity: 7.29 GiB(7,830,765,568 bytes)
 Boot1: 4096 KiB
 Boot2: 4096 KiB
 RPMB: 4096 KiB
 User area: 7.28 GiB(7,818,182,656 bytes)

MTK SoC validation: passed
eMMC CID validation: passed
Flashing bootloader... Done.
Flashing images... Done.

Completed in 4 mins 42.247 s



Thursday, March 9, 2017

asiafone af10 (aho) "spd sc7715" infinity firmware backup

Card found: S/N : 1005CE30 , v0134
Chinese Miracle II  [SPD module] v 1.24

Operation : Check/Read Info [ v1.24 ]

1. Remove battery. Insert battery back
2. Press and hold 'VolumeUp' and 'VolumeDown' keys
3. Insert cable

 ====  Wait for phone...

Phone found! [ 24 ]
Port Opened
Sync...
InitBoot Done [ 0x81 ] , Ver : SPRD3
Sync...
Sending FDL
[Info] : If SW freeze here more, than 15 seconds - remove cable
FDL Ready!
Boot Ver : SC7715 Loader NAND v1.1 Infinity
Sending FLASH FDL
FLASH FDL Ready!
Boot Ok!

FLASH : NAND Flash , Structure : Ok!

Reading extended info ...

Model Name  : w138_alf_052
Model Brand : Spreadtrum
Model Device: w138_alf_052
AndrVersion : 4.4.2
BaseBand CPU: W138_ALF_052
CompileDate : 9/1/2015 12:25:51 PM
Project Ver : MocorDroid test-keys
Model Ext   : ASIADROID_AF10

ExtraInfo : HWInfo not exists, normal phone
ExtraInfo : NAND PageType : Blk 256k , Page 4k

Elapsed: 00:00:28

Reconnect Power/Cable!


Operation : Format File System / Reset Settings [ v1.24 ]
Settings : SmartFormat is On

1. Remove battery. Insert battery back
2. Press and hold 'VolumeUp' and 'VolumeDown' keys
3. Insert cable

 ====  Wait for phone...

Phone found! [ 24 ]
Port Opened
Sync...
InitBoot Done [ 0x81 ] , Ver : SPRD3
Sync...
Sending FDL
[Info] : If SW freeze here more, than 15 seconds - remove cable
FDL Ready!
Boot Ver : SC7715 Loader NAND v1.1 Infinity
Sending FLASH FDL
FLASH FDL Ready!
Boot Ok!

FlashMode Set : Ok!
Checking Structure ...
Detected NAND Flash , Structure detect Ok!

Formatting NAND Flash
Format UserData
Format Ok!
Format Cache
Format Ok!

Done!

Elapsed: 00:00:16

Reconnect Power/Cable!


Operation : Read FullFlash [ v1.24 ]

1. Remove battery. Insert battery back
2. Press and hold 'VolumeUp' and 'VolumeDown' keys
3. Insert cable

 ====  Wait for phone...

Phone found! [ 24 ]
Port Opened
Sync...
InitBoot Done [ 0x81 ] , Ver : SPRD3
Sync...
Sending FDL
[Info] : If SW freeze here more, than 15 seconds - remove cable
FDL Ready!
Boot Ver : SC7715 Loader NAND v1.1 Infinity
Sending FLASH FDL
FLASH FDL Ready!
Boot Ok!

FlashMode Set : Ok!
Detected NAND Flash , Structure detect Ok!

[FW_READER] : Step #1 Passed!
[FW_READER] : Step #2 Passed!
[FW_READER] : Initialize Ok ,  0x13 , NAND : b256k
[FW_READER] : Step #3 Passed!
Model Name  : w138_alf_052
Model Brand : Spreadtrum
Model Device: w138_alf_052
AndrVersion : 4.4.2
BaseBand CPU: W138_ALF_052
Project Ver : MocorDroid test-keys
Model Ext   : ASIADROID_AF10

[Read Mode] : HSUSB : 0x3000

[FW_READER] : Reading Firmware Now ...

[Read Ok] : u-boot-spl-16k.bin
[Read Ok] : u-boot.bin
[Read Ok] : prodnv_b256k.img
[Read Ok] : nvitem_w.bin
[Read Ok] : nvitem_wcn.bin
[Read Ok] : sc7715_modem.bin
[Read Ok] : DSP_DM_Gx.bin
[Read Ok] : CP2._CP2_WCN_14C_W14.51_Release.bin
[Read Ok] : logo_480x800.bin
[Read Ok] : boot.img
[Read Ok] : system_b256k.img
[Read Ok] : cache_b256k.img
[Read Ok] : recovery.img
[Read Ok] : userdata_b256k.img

AndroidInfo created
Firmware Size : 317 MiB
Saved to : C:\Users\MT-M 3227\Desktop\W138_ALF_052_[NAND_b256k]_w138_alf_052_4.4.2_MocorDroid_test-keys_ASIADROID_AF10\
Done!

Elapsed: 00:06:55

Reconnect Power/Cable!


DOWNLOAD

Saturday, March 4, 2017

done wit z3xpro unlock jaringan sm-g532f

Searching Samsung modem... detected COM14
Reading phone info... Ok
Model: SM-G532F
AP version: G532FXWU1APJ3
CSC version: G532FOJV1APJ4
CP version: G532FXXU1APJ7
Product code: SM-G532FZKDKSA
Phone SN: R58J107R6ER
Unique number: CQN00C0A8ECBBC3
Reading IMEI... Ok
IMEI: 556230867935448
IMEI 2: 556230867935448

Done with Samsung Tool PRO v.27.7

Waiting ADB device... Ok
Reading phone info...
Model: SM-G532F
Android version: 6.0.1
Product code: SM-G532FZKDKSA
Phone version: G532FXXU1APJ7
PDA version: G532FXWU1APJ3
CSC version: G532FOJV1APJ4
CSC country code: KSA
CSC sales code: KSA
HW version: MP 0.300
Phone SN: R58J107R6ER
Chip name: MT6737T
Modem board: MT6737T
RF cal date: 20170105
IMEI:
Checking Super user right... true
Reading security... Ok
Unlocking... Ok
Writing security... Ok
Rebooting phone... Ok
Unlock done

Done with Samsung Tool PRO v.27.7

flash mi 4i ferrari done via ufibox fastboot mode

Processing fastboot flashing on ASUS Android Bootloader Interface[94f8de31]
Flashing in progress. Do not turn off the device !!!
Flashing tz: tz.mbn (496.31 KiB)
target reported max download size of 268435456 bytes
sending 'tz' (496 KB)... OKAY [  0.020s]
writing 'tz'... OKAY [  0.026s]
finished. total time: 0.046s
Flashing tzbak: tz.mbn (496.31 KiB)
target reported max download size of 268435456 bytes
sending 'tzbak' (496 KB)... OKAY [  0.021s]
writing 'tzbak'... OKAY [  0.011s]
finished. total time: 0.032s
Flashing hyp: hyp.mbn (72 KiB)
target reported max download size of 268435456 bytes
sending 'hyp' (72 KB)... OKAY [  0.006s]
writing 'hyp'... OKAY [  0.005s]
finished. total time: 0.011s
Flashing hypbak: hyp.mbn (72 KiB)
target reported max download size of 268435456 bytes
sending 'hypbak' (72 KB)... OKAY [  0.006s]
writing 'hypbak'... OKAY [  0.003s]
finished. total time: 0.009s
Flashing sbl1: sbl1.mbn (281.48 KiB)
target reported max download size of 268435456 bytes
sending 'sbl1' (281 KB)... OKAY [  0.011s]
writing 'sbl1'... OKAY [  0.008s]
finished. total time: 0.019s
Flashing sbl1bak: sbl1.mbn (281.48 KiB)
target reported max download size of 268435456 bytes
sending 'sbl1bak' (281 KB)... OKAY [  0.013s]
writing 'sbl1bak'... OKAY [  0.009s]
finished. total time: 0.022s
Flashing rpm: rpm.mbn (155.06 KiB)
target reported max download size of 268435456 bytes
sending 'rpm' (155 KB)... OKAY [  0.008s]
writing 'rpm'... OKAY [  0.007s]
finished. total time: 0.015s
Flashing rpmbak: rpm.mbn (155.06 KiB)
target reported max download size of 268435456 bytes
sending 'rpmbak' (155 KB)... OKAY [  0.009s]
writing 'rpmbak'... OKAY [  0.005s]
finished. total time: 0.014s
Flashing modem: NON-HLOS.bin (50.17 MiB)
target reported max download size of 268435456 bytes
sending 'modem' (51377 KB)... OKAY [  1.905s]
writing 'modem'... OKAY [  0.673s]
finished. total time: 2.578s
Flashing aboot: emmc_appsboot.mbn (2.07 MiB)
target reported max download size of 268435456 bytes
sending 'aboot' (2117 KB)... OKAY [  0.080s]
writing 'aboot'... OKAY [  0.032s]
finished. total time: 0.112s
Flashing abootbak: emmc_appsboot.mbn (2.07 MiB)
target reported max download size of 268435456 bytes
sending 'abootbak' (2117 KB)... OKAY [  0.077s]
writing 'abootbak'... OKAY [  0.034s]
finished. total time: 0.111s
erase boot
erasing 'boot'... OKAY [  0.017s]
finished. total time: 0.017s
erase sec
erasing 'sec'... OKAY [  0.021s]
finished. total time: 0.021s
erase config
erasing 'config'... OKAY [  0.003s]
finished. total time: 0.003s
Flashing misc: misc.img (8 KiB)
target reported max download size of 268435456 bytes
sending 'misc' (8 KB)... OKAY [  0.004s]
writing 'misc'... OKAY [  0.003s]
finished. total time: 0.007s
Flashing system: system.img (1.52 GiB)
target reported max download size of 268435456 bytes
erasing 'system'... OKAY [  0.263s]
sending sparse 'system' (260922 KB)... OKAY [ 10.195s]
writing 'system'... OKAY [  3.601s]
sending sparse 'system' (256402 KB)... OKAY [ 10.253s]
writing 'system'... OKAY [  3.931s]
sending sparse 'system' (262108 KB)... OKAY [ 10.675s]
writing 'system'... OKAY [  4.172s]
sending sparse 'system' (253166 KB)... OKAY [ 10.062s]
writing 'system'... OKAY [  3.782s]
sending sparse 'system' (257630 KB)... OKAY [  9.908s]
writing 'system'... OKAY [  3.539s]
sending sparse 'system' (257287 KB)... OKAY [ 10.507s]
writing 'system'... OKAY [  4.039s]
sending sparse 'system' (44268 KB)... OKAY [  1.736s]
writing 'system'... OKAY [  0.586s]
finished. total time: 87.248s
Flashing cache: cache.img (8.14 MiB)
target reported max download size of 268435456 bytes
erasing 'cache'... OKAY [  0.014s]
sending 'cache' (8336 KB)... OKAY [  0.309s]
writing 'cache'... OKAY [  0.116s]
finished. total time: 0.439s
Flashing userdata: userdata.img (562.31 MiB)
target reported max download size of 268435456 bytes
erasing 'userdata'... OKAY [  1.178s]
sending sparse 'userdata' (259448 KB)... OKAY [ 10.295s]
writing 'userdata'... OKAY [  3.498s]
sending sparse 'userdata' (249106 KB)... OKAY [  9.770s]
writing 'userdata'... OKAY [  3.332s]
sending sparse 'userdata' (67247 KB)... OKAY [  2.782s]
writing 'userdata'... OKAY [  0.977s]
finished. total time: 31.832s
Flashing recovery: recovery.img (24.08 MiB)
target reported max download size of 268435456 bytes
sending 'recovery' (24658 KB)... OKAY [  0.915s]
writing 'recovery'... OKAY [  0.329s]
finished. total time: 1.244s
Flashing boot: boot.img (21.66 MiB)
target reported max download size of 268435456 bytes
sending 'boot' (22180 KB)... OKAY [  0.826s]
writing 'boot'... OKAY [  0.291s]
finished. total time: 1.117s
reboot
rebooting... finished. total time: 0.001s
Fastboot flashing completed in 2 mins 38.628 s