UNCOMMON FILE SIDE

google logogoogle logogoogle logogoogle logogoogle logogoogle logogoogle logogoogle logogoogle logogoogle logogoogle logogoogle logogoogle logogoogle logogoogle logogoogle logogoogle logo

Thursday 22 November 2018

COPY HUAWEI IQ3540 6.0 FILE OFFICIAL FIRMWARE BY MAJEDUL MOBAIL SCX15_SP7715GA_[NAND_b256k]_scx15_sp7715ga_4.4.2_RJ095_P108_IQ3540_HP_DY-V1.0_20180312_IQ3540 MT6572_NAND_WELCOME__IQ3540___6.0__MP.V1.0



COPY HUAWEI IQ3540 6.0 SP7715GA PAC FILE







Boot Ok!

FlashMode Set : Ok!
Detected NAND Flash , Structure detect Ok!

[FW_READER] : Step #1 Passed!
[FW_READER] : Step #2 Passed!
[FW_READER] : Initialize Ok ,  0x1C , NAND : b256k
[FW_READER] : Step #3 Passed!
Model Name  : project_public
Model Brand : welcome
Model Device: scx15_sp7715ga
AndrVersion : 4.4.2
BaseBand CPU: SCX15_SP7715GA
Project Ver : RJ095_P108_IQ3540_HP_DY-V1.0_20180312
Model Ext   : IQ3540

[Read Mode] : HSUSB : 0x3000

[FW_READER] : Reading Firmware Now ... 

[Read Ok] : u-boot-spl-16k.bin
[Read Ok] : u-boot.bin
[Read Ok] : prodnv_b256k.img
[Read Ok] : nvitem_w.bin
[Read Ok] : nvitem_wcn.bin
[Read Ok] : sc7715_modem.bin
[Read Ok] : DSP_DM_Gx.bin
[Read Ok] : CP2._CP2_WCN_14C_W15.34.2_Release.bin
[Read Ok] : logo_480x854.bin
[Read Ok] : logo2.bin
[Read Ok] : logo3.bin
[Read Ok] : logo4.bin
[Read Ok] : logo5.bin
[Read Ok] : logo6.bin
[Read Ok] : logo7.bin
[Read Ok] : logo8.bin
[Read Ok] : logo9.bin
[Read Ok] : logo10.bin
[Read Ok] : boot.img
[Read Ok] : system_b256k.img
[Read Ok] : cache_b256k.img
[Read Ok] : recovery.img
[Read Ok] : userdata_b256k.img

AndroidInfo created
Firmware Size : 307 MiB
Saved to : C:\Users\GSM MAJEDUL ISLAM\Desktop\SCX15_SP7715GA_[NAND_b256k]_scx15_sp7715ga_4.4.2_RJ095_P108_IQ3540_HP_DY-V1.0_20180312_IQ3540\
Done!





 MT6572_NAND_WELCOME__IQ3540___6.0__MP.V1.0
https://drive.google.com/file/d/1qjN4sK9beti6ii5LNkG8boUHLkCsYJWy/view?usp=sharing

SCX15_SP7715GA_[NAND_b256k]_scx15_sp7715ga_4.4.2_RJ095_P108_IQ3540_HP_DY-V1.0_20180312_IQ3540
https://drive.google.com/file/d/1yN8IvmeWEqWQeRS05gB70FwjeglYqmJ0/view?usp=sharing