All SMARTPHONE FLASH FILE All SAMSUNG NOKIA SONY LG HTC CHINA SYMPHONY LAVA IPHONE

Wednesday 13 January 2016

World Ist Q Mobile X30 Mtk6572 Formart/Write Firmware Done With Only Merapi Tool Successfully

World Ist Q Mobile X30 Mtk6572 Formart/Write Firmware Done With Only Merapi Tool


Once Again World Ist Q Mobile X30 Mtk6572 4.4 Kitkat Format/Write Firmware Done With PowerFull Merapi Tool.

Info Logs

Code:

16:52:52 > Connecting... 16:52:52 > CPU TYPE:MT6572 16:52:52 > Hardware version:CA01 16:52:52 > Software version:0000 16:52:52 > SecCfgVal :0x00000000 16:52:52 > BromVersion :0xFF 16:52:52 > BLVersion :0x01 >>Boot downloading complete! 16:52:57 > EMMC_ID:0x90014A48344732611101A3728E371221 16:52:57 > EMMC_PRODUCT_NAME: SAMSUNG :0x483447326111 16:52:57 > EMMC_BOOT1_SIZE: 0x00400000 16:52:57 > EMMC_BOOT2_SIZE: 0x00400000 16:52:57 > EMMC_PRMB_SIZE: 0x00400000 16:52:57 > EMMC_GP1_SIZE: 0x00000000 16:52:57 > EMMC_GP2_SIZE: 0x00000000 16:52:57 > EMMC_GP3_SIZE: 0x00000000 16:52:57 > EMMC_GP4_SIZE: 0x00000000 16:52:57 > EMMC_USER_SIZE: 0x0E9000000(3.64 G) 16:52:57 > 16:53:03 > 16:53:03 > 16:53:03 > Analysis of system files... 16:53:03 > PRELOADER:>>addr:0x000000 --length:0xC00000 16:53:03 > MBR:>>addr:0xC00000 --length:0x080000 16:53:03 > EBR1:>>addr:0xC80000 --length:0x080000 16:53:03 > PRO_INFO:>>addr:0xD00000 --length:0x300000 16:53:03 > NVRAM:>>addr:0x1000000 --length:0x500000 16:53:03 > PROTECT_F:>>addr:0x1500000 --length:0xA00000 16:53:03 > PROTECT_S:>>addr:0x1F00000 --length:0xA00000 16:53:03 > SECCFG:>>addr:0x2900000 --length:0x020000 16:53:03 > UBOOT:>>addr:0x2920000 --length:0x060000 16:53:03 > BOOTIMG:>>addr:0x2980000 --length:0x600000 16:53:03 > RECOVERY:>>addr:0x2F80000 --length:0x600000 16:53:03 > SEC_RO:>>addr:0x3580000 --length:0x040000 16:53:03 > MISC:>>addr:0x35C0000 --length:0x080000 16:53:03 > LOGO:>>addr:0x3640000 --length:0x300000 16:53:03 > EXPDB:>>addr:0x3940000 --length:0xA00000 16:53:03 > ANDROID:>>addr:0x4340000 --length:0x3D400000 16:53:03 > CACHE:>>addr:0x41740000 --length:0xE200000 16:53:03 > USRDATA:>>addr:0x4F940000 --length:0x98DC0000 16:53:03 > BMTPOOL:>>addr:0xFFFF00A8 --length:0x1500000 16:53:03 > 16:53:03 > 16:53:03 > >>Format addr:0x4F940000 --Format length:0x98DC0000 16:53:03 > Read phone information success.

Format Logs,

Code:

16:55:38 > Connecting... 16:55:38 > CPU TYPE:MT6572 16:55:38 > Hardware version:CA01 16:55:38 > Software version:0000 16:55:38 > SecCfgVal :0x00000000 16:55:38 > BromVersion :0xFF 16:55:38 > BLVersion :0x01 >>Boot downloading complete! 16:55:43 > EMMC_ID:0x90014A48344732611101A3728E371221 16:55:43 > EMMC_PRODUCT_NAME: SAMSUNG :0x483447326111 16:55:43 > EMMC_BOOT1_SIZE: 0x00400000 16:55:43 > EMMC_BOOT2_SIZE: 0x00400000 16:55:43 > EMMC_PRMB_SIZE: 0x00400000 16:55:43 > EMMC_GP1_SIZE: 0x00000000 16:55:43 > EMMC_GP2_SIZE: 0x00000000 16:55:43 > EMMC_GP3_SIZE: 0x00000000 16:55:43 > EMMC_GP4_SIZE: 0x00000000 16:55:43 > EMMC_USER_SIZE: 0x0E9000000(3.64 G) 16:55:43 > 16:55:50 > 16:55:50 > 16:55:50 > Analysis of system files... 16:55:50 > PRELOADER:>>addr:0x000000 --length:0xC00000 16:55:50 > MBR:>>addr:0xC00000 --length:0x080000 16:55:50 > EBR1:>>addr:0xC80000 --length:0x080000 16:55:50 > PRO_INFO:>>addr:0xD00000 --length:0x300000 16:55:50 > NVRAM:>>addr:0x1000000 --length:0x500000 16:55:50 > PROTECT_F:>>addr:0x1500000 --length:0xA00000 16:55:50 > PROTECT_S:>>addr:0x1F00000 --length:0xA00000 16:55:50 > SECCFG:>>addr:0x2900000 --length:0x020000 16:55:50 > UBOOT:>>addr:0x2920000 --length:0x060000 16:55:50 > BOOTIMG:>>addr:0x2980000 --length:0x600000 16:55:50 > RECOVERY:>>addr:0x2F80000 --length:0x600000 16:55:50 > SEC_RO:>>addr:0x3580000 --length:0x040000 16:55:50 > MISC:>>addr:0x35C0000 --length:0x080000 16:55:50 > LOGO:>>addr:0x3640000 --length:0x300000 16:55:50 > EXPDB:>>addr:0x3940000 --length:0xA00000 16:55:50 > ANDROID:>>addr:0x4340000 --length:0x3D400000 16:55:50 > CACHE:>>addr:0x41740000 --length:0xE200000 16:55:50 > USRDATA:>>addr:0x4F940000 --length:0x98DC0000 16:55:50 > BMTPOOL:>>addr:0xFFFF00A8 --length:0x1500000 16:55:50 > 16:55:50 > 16:55:50 > Read phone information success. 16:56:04 > Format range: Start Address: 0x4F941000,Format Length :0x98DBF000 >>Flash erasing complete! >>Check the data complete. 16:56:22 > 16:56:22 > Please take out SIM and Memory card from phone when power on first time, or it will have Memory Lock . 16:56:22 > If you meet Memory Lock,please take all cards from phone and restart phone again.

Screen Short

Write Firmware With merapi Tool

Code:

Phone must be off with battery inside. Please insert USB cable now... Detected : PreLoader USB VCOM Port (COM5) Phone detected...Please wait Sending DA agent, please wait... BBCHIP MT6572_S00 EMMC: (29Gb+4096Mb) HYNIX 0x483447326111 EMMC FW VERSION: 01:00:00:00:00:00:00:00 BOOT STYLE : EMMC BOOT Detecting high speed port, wait...... If driver not installed, install high speed port driver. Detected : MediaTek DA USB VCOM Port (COM9) Starting flash. Send preloader... Download firmware to flash now... MBR checksum is executing ... EBR1 checksum is executing ... UBOOT checksum is executing ... BOOTIMG checksum is executing ... RECOVERY checksum is executing ... SEC_RO checksum is executing ... LOGO checksum is executing ... ANDROID checksum is executing ... CACHE checksum is executing ... USRDATA checksum is executing ... After flash this firmware need to perform some aditional steps 1.Reinsert battery, keep VOL- and power on untill phone will come in factory mode 2.Select line EMMC, and after press home button. 3.Wait untill phone will restart and will stuck on logo(leave for 1 min in this stage). 4.If phone not power on, reinsert battery and perform direct unlock. If repair fail, please contact us or report in forum to provide help. Wait untill phone will start charging. All done.

Regard

FullFlashPak

0 comments:

Post a Comment

yllix pop

Popular Posts

Powered by Blogger.

Followers

statistics

Recent Posts