I have it in /system/priv-app/DocumentsUI

    Can someone extract that apk and post it here, I want to do a bit of reverse engineering and see if we can figure out why it was removed

      i only have updated phones but more are coming next week

      darth A bit off topic, but you are able to successfully deodex apps from LG Classic? can you deodex fphome? I want to modify it. Send it to [Login to see the link]

      I made a mess of mine. See final pic: [Login to see the link]
      Maybe I will find an exposed pin but otherwise I don't expect to buy another unless I can help darth get into the bootloader. just looking it seems KCOL0 does go to the DRAM chip but I can't find it's layout. It's KMFN60012B-B214
      edit: seems KCOL0 is already grounded but also I could've ruined it.

        Oh I had my picture upside down. and I was looking at a 6735 datasheet. Not finding 6739 layout

          One test point below the volume buttons does go to vol down. I tried seeing where the other went as it's likely the key. it's circuitry is right above it though. having a hard time testing it without a magnifying glass but perhaps just have to ground other side of the diode just above it? :/

            • darthLevel 6 - Platinum Elite Member

              neutronscott Oh I had my picture upside down. and I was looking at a 6735 datasheet. Not finding 6739 layout

              Are you looking for [Login to see the link] [Login to see the link]?

              neutronscott One test point below the volume buttons does go to vol down. I tried seeing where the other went as it's likely the key. it's circuitry is right above it though. having a hard time testing it without a magnifying glass but perhaps just have to ground other side of the diode just above it? :/

              Can you be more specific about which point I should try?

                Have anyone tried mtkclient to exploit this phone?

                  • darthLevel 6 - Platinum Elite Member

                    EnriqueMcquade Yes. But no one has been able to get a successful handshake (as far as I know) which is why we are trying to figure out the testpoints

                    darth I have furious gold, but it's a different phone.

                    I actually messaged Hack3r2k about adding this phone, and he was working with me to, but because of
                    Using library Brom_DLL_v7.1813.3
                    Engine version 1.0.0.5737
                    Searching phone in normal mode;
                    [connect the phone powered off with volume down and up pressed to the usb cable]
                    Phone detected (MediaTek PreLoader USB VCOM (Android) (COM167)) (Driver version: 3.0.1504.0)
                    Preparing to start flash mode;
                    Preparing to open COM167
                    Device hw code: 0699
                    Device hw sub code: 8A00
                    Device hw version: CB00
                    Device sw version: 0002
                    Device secure boot: True
                    Device serial link authorization: True
                    Device download agent authorization: True
                    Disabling watchdog timer;
                    ERROR: Timeout waiting !
                    ERROR: BOOT_PHONE;

                    He isn't adding it

                      OH nvm it seems it's the same phone. I'll look into it. I'm downloading the update now