GSM Shop GSM Shop
GSM-Forum  

Welcome to the GSM-Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features.
Only registered members may post questions, contact other members or search our database of over 8 million posts.

Registration is fast, simple and absolutely free so please - Click to REGISTER!

If you have any problems with the registration process or your account login, please contact contact us .

Go Back   GSM-Forum > Product Support Sections > Hard/Software Products (official support) > Infinity-Box

Reply
 
LinkBack Thread Tools Display Modes
Old 04-06-2016, 11:22   #1 (permalink)
Freak Poster
 
Join Date: Jan 2011
Location: Algeria
Age: 40
Posts: 224
Member: 1501852
Status: Offline
Thanks Meter: 132
World First Polaroid MID4X10PJ MT8127 Factory File Read & Remove Monkey Test by Infin


World First Polaroid MID4X10PJ MT8127 Factory File Read & Remove Monkey Test By Infinity-Box

All Other Tool Field To remove Monkey Virus But The Only One Great Infinity-Box (c) Chinese Miracle II



Remove Viruses [SmartAV]
Code:
Start  at : [03-04-2016 / 15:46:03]
Operation : Remove Viruses [SmartAV] [ v1.44 ]
SmartAV Conf : 100/80/2000

1. Power Off Phone , Remove battery , Insert back
2. Insert USB cable. In some cases require hold BootKey

Wait for phone...
Phone found! [ 9 ]
Sync...
Inital Boot Ok!
BB_CPU_PID : 8127
BB_CPU_NME : [MediaTek] MT8127_S00
BB_CPU_EXT : 0xCA04 , 0x8A00 , 0x0000
Processing BROM stage
Settings for BROM configured!
SecCfgVal : 0x00000000
BromVer   : 0x00FF
BLVersion : 0x0001
PreLoader : Active [ Boot with PL ]
BootLdrSS : NORMAL with SPRELOADER
Processing DA stage
DA Select done, will use MTK_AllInOne_DA_v5.1552.01.01
Sending and initialize DA ...
Running DA ver.4.2 on BBID : 0x8D
NAND Flash : NOT INSTALLED
eMMC Flash : 8801034E4361726420202C5216578141
Initialize Memory ... 
DRAM already initialized by Preloader
eMMC FlashIC initialized
[eMMC] : FLASH_VEN : 0x88 , OEM : 0103
[eMMC] : FLASH_INF : [FORESEE] , draC
[eMMC] : FLASH_CID : 8801034E4361726420202C5216578141
[eMMC] : FLASH_BRT : 0x00200000 , 0x00200000 , 0x00020000
[eMMC] : FLASH_LEN : 0x000000039D000000
[eMMC] : FLASH_UCP : 14800 MiB [eMMC 16 GiB]
DEV RID    : C65C9B7A3BD9EB4CC8D13A302F393445
INT RAM    : 0x00020000
EXT RAM    : 0x40000000
BOOT TYPE  : EMMC_FLASH_BOOT
SOC VERIFY : C1
Boot Ok!

SmartAV Init Ok!
Scanning FileSystem now , please wait
Scan Done, infected files found : 38
Removing infected files and scripts ... 

SmartAV Report : Removed 38 infected files!

Making additional operations ... 
Special Op #1 : Clear Recovery Data Ok!
Special Op #2 : Clear UserData Ok!
Special Op #3 : PostFix Ok!

Done!

Done!
Elapsed: 00:01:15
Reconnect Power/Cable!

Finish at : [03-04-2016 / 15:47:19]

Read Flash
Code:
Start  at : [03-04-2016 / 15:39:41]
Operation : Read Flash [ v1.44 ]

1. Power Off Phone , Remove battery , Insert back
2. Insert USB cable. In some cases require hold BootKey

Start  at : [03-04-2016 / 15:39:59]
Operation : Read Flash [ v1.44 ]

1. Power Off Phone , Remove battery , Insert back
2. Insert USB cable. In some cases require hold BootKey

Wait for phone...
Phone found! [ 9 ]
Sync...
Inital Boot Ok!
BB_CPU_PID : 8127
BB_CPU_NME : [MediaTek] MT8127_S00
BB_CPU_EXT : 0xCA04 , 0x8A00 , 0x0000
Processing BROM stage
Settings for BROM configured!
SecCfgVal : 0x00000000
BromVer   : 0x00FF
BLVersion : 0x0001
PreLoader : Active [ Boot with PL ]
BootLdrSS : NORMAL with SPRELOADER
Processing DA stage
DA Select done, will use MTK_AllInOne_DA_v5.1552.01.01
Sending and initialize DA ...
Running DA ver.4.2 on BBID : 0x8D
NAND Flash : NOT INSTALLED
eMMC Flash : 8801034E4361726420202C5216578141
Initialize Memory ... 
DRAM already initialized by Preloader
eMMC FlashIC initialized
[eMMC] : FLASH_VEN : 0x88 , OEM : 0103
[eMMC] : FLASH_INF : [FORESEE] , draC
[eMMC] : FLASH_CID : 8801034E4361726420202C5216578141
[eMMC] : FLASH_BRT : 0x00200000 , 0x00200000 , 0x00020000
[eMMC] : FLASH_LEN : 0x000000039D000000
[eMMC] : FLASH_UCP : 14800 MiB [eMMC 16 GiB]
DEV RID    : C65C9B7A3BD9EB4CC8D13A302F393445
INT RAM    : 0x00020000
EXT RAM    : 0x40000000
BOOT TYPE  : EMMC_FLASH_BOOT
SOC VERIFY : C1
Boot Ok!

Reading Flash Content now ... 

Brand     : MID4X10PJ
ProdName  : MID4X10PJ
ProdModel : MID4X10PJ
Device    : MID4X10PJ
AndroidVer: 4.4.2
MTKxCPU   : MT8127
MTKxPRJ   : MID4X10PJ_2014-09-24

[Read Ok] : preloader_mid4x10pj.bin
[Read Ok] : MBR
[Read Ok] : EBR1
[Read Ok] : lk.bin
[Read Ok] : boot.img
[Read Ok] : recovery.img
[Read Ok] : secro.img
[Read Ok] : logo.bin
[Read Ok] : EBR2
[Read Ok] : tz1.img
[Read Ok] : tz2.img
[Read Ok] : system.img
[Make Ok] : cache.img
[Make Ok] : userdata.img

[ScatCFG] : MT8127 / V1.1.2 / mid4x10pj / EMMC
Android Info saved
HWConfig Info saved
FW Size : 950 MiB
Scatter saved to : C:\Users\Bekhiti_Info\Desktop\MT8127__MID4X10PJ__MID4X10PJ__MID4X10PJ__4.4.2__MID4X10PJ_2014-09-24\

All done!

Done!
Elapsed: 00:05:23
Reconnect Power/Cable!

Finish at : [03-04-2016 / 15:45:23]

  Reply With Quote
The Following User Says Thank You to bek4ever For This Useful Post:
Old 02-07-2017, 20:30   #2 (permalink)
Freak Poster
 
Join Date: Apr 2006
Location: algerie
Posts: 349
Member: 259512
Status: Offline
Thanks Meter: 33
please can u upload this firmware i need it thanks

Quote:
Originally Posted by bek4ever View Post
World First Polaroid MID4X10PJ MT8127 Factory File Read & Remove Monkey Test By Infinity-Box

All Other Tool Field To remove Monkey Virus But The Only One Great Infinity-Box (c) Chinese Miracle II



Remove Viruses [SmartAV]
Code:
Start  at : [03-04-2016 / 15:46:03]
Operation : Remove Viruses [SmartAV] [ v1.44 ]
SmartAV Conf : 100/80/2000

1. Power Off Phone , Remove battery , Insert back
2. Insert USB cable. In some cases require hold BootKey

Wait for phone...
Phone found! [ 9 ]
Sync...
Inital Boot Ok!
BB_CPU_PID : 8127
BB_CPU_NME : [MediaTek] MT8127_S00
BB_CPU_EXT : 0xCA04 , 0x8A00 , 0x0000
Processing BROM stage
Settings for BROM configured!
SecCfgVal : 0x00000000
BromVer   : 0x00FF
BLVersion : 0x0001
PreLoader : Active [ Boot with PL ]
BootLdrSS : NORMAL with SPRELOADER
Processing DA stage
DA Select done, will use MTK_AllInOne_DA_v5.1552.01.01
Sending and initialize DA ...
Running DA ver.4.2 on BBID : 0x8D
NAND Flash : NOT INSTALLED
eMMC Flash : 8801034E4361726420202C5216578141
Initialize Memory ... 
DRAM already initialized by Preloader
eMMC FlashIC initialized
[eMMC] : FLASH_VEN : 0x88 , OEM : 0103
[eMMC] : FLASH_INF : [FORESEE] , draC
[eMMC] : FLASH_CID : 8801034E4361726420202C5216578141
[eMMC] : FLASH_BRT : 0x00200000 , 0x00200000 , 0x00020000
[eMMC] : FLASH_LEN : 0x000000039D000000
[eMMC] : FLASH_UCP : 14800 MiB [eMMC 16 GiB]
DEV RID    : C65C9B7A3BD9EB4CC8D13A302F393445
INT RAM    : 0x00020000
EXT RAM    : 0x40000000
BOOT TYPE  : EMMC_FLASH_BOOT
SOC VERIFY : C1
Boot Ok!

SmartAV Init Ok!
Scanning FileSystem now , please wait
Scan Done, infected files found : 38
Removing infected files and scripts ... 

SmartAV Report : Removed 38 infected files!

Making additional operations ... 
Special Op #1 : Clear Recovery Data Ok!
Special Op #2 : Clear UserData Ok!
Special Op #3 : PostFix Ok!

Done!

Done!
Elapsed: 00:01:15
Reconnect Power/Cable!

Finish at : [03-04-2016 / 15:47:19]

Read Flash
Code:
Start  at : [03-04-2016 / 15:39:41]
Operation : Read Flash [ v1.44 ]

1. Power Off Phone , Remove battery , Insert back
2. Insert USB cable. In some cases require hold BootKey

Start  at : [03-04-2016 / 15:39:59]
Operation : Read Flash [ v1.44 ]

1. Power Off Phone , Remove battery , Insert back
2. Insert USB cable. In some cases require hold BootKey

Wait for phone...
Phone found! [ 9 ]
Sync...
Inital Boot Ok!
BB_CPU_PID : 8127
BB_CPU_NME : [MediaTek] MT8127_S00
BB_CPU_EXT : 0xCA04 , 0x8A00 , 0x0000
Processing BROM stage
Settings for BROM configured!
SecCfgVal : 0x00000000
BromVer   : 0x00FF
BLVersion : 0x0001
PreLoader : Active [ Boot with PL ]
BootLdrSS : NORMAL with SPRELOADER
Processing DA stage
DA Select done, will use MTK_AllInOne_DA_v5.1552.01.01
Sending and initialize DA ...
Running DA ver.4.2 on BBID : 0x8D
NAND Flash : NOT INSTALLED
eMMC Flash : 8801034E4361726420202C5216578141
Initialize Memory ... 
DRAM already initialized by Preloader
eMMC FlashIC initialized
[eMMC] : FLASH_VEN : 0x88 , OEM : 0103
[eMMC] : FLASH_INF : [FORESEE] , draC
[eMMC] : FLASH_CID : 8801034E4361726420202C5216578141
[eMMC] : FLASH_BRT : 0x00200000 , 0x00200000 , 0x00020000
[eMMC] : FLASH_LEN : 0x000000039D000000
[eMMC] : FLASH_UCP : 14800 MiB [eMMC 16 GiB]
DEV RID    : C65C9B7A3BD9EB4CC8D13A302F393445
INT RAM    : 0x00020000
EXT RAM    : 0x40000000
BOOT TYPE  : EMMC_FLASH_BOOT
SOC VERIFY : C1
Boot Ok!

Reading Flash Content now ... 

Brand     : MID4X10PJ
ProdName  : MID4X10PJ
ProdModel : MID4X10PJ
Device    : MID4X10PJ
AndroidVer: 4.4.2
MTKxCPU   : MT8127
MTKxPRJ   : MID4X10PJ_2014-09-24

[Read Ok] : preloader_mid4x10pj.bin
[Read Ok] : MBR
[Read Ok] : EBR1
[Read Ok] : lk.bin
[Read Ok] : boot.img
[Read Ok] : recovery.img
[Read Ok] : secro.img
[Read Ok] : logo.bin
[Read Ok] : EBR2
[Read Ok] : tz1.img
[Read Ok] : tz2.img
[Read Ok] : system.img
[Make Ok] : cache.img
[Make Ok] : userdata.img

[ScatCFG] : MT8127 / V1.1.2 / mid4x10pj / EMMC
Android Info saved
HWConfig Info saved
FW Size : 950 MiB
Scatter saved to : C:\Users\Bekhiti_Info\Desktop\MT8127__MID4X10PJ__MID4X10PJ__MID4X10PJ__4.4.2__MID4X10PJ_2014-09-24\

All done!

Done!
Elapsed: 00:05:23
Reconnect Power/Cable!

Finish at : [03-04-2016 / 15:45:23]

please can u upload this firmware i need it thanks
  Reply With Quote
The Following User Says Thank You to msitfa For This Useful Post:
Reply

Bookmarks

Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


 



All times are GMT +1. The time now is 17:21.



Powered by Searchlight © 2024 Axivo Inc.
vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2024 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2023 -
Page generated in 0.18581 seconds with 8 queries

SEO by vBSEO