↑ ↓
  1. Faisal_Computer
    Offline

    Faisal_Computer Product Manager

    Tham gia ngày:
    28/6/16
    Bài viết:
    1,322
    Đã được thích:
    13
    Nơi ở:
    Pakistan
    Điện thoại:
    +923334684812
    Xolo A550S IPS

    Invalid IMEI repair Done




    [​IMG]
     
    Chỉnh sửa lần cuối: 27/7/16
  2. Faisal_Computer
    Offline

    Faisal_Computer Product Manager

    Tham gia ngày:
    28/6/16
    Bài viết:
    1,322
    Đã được thích:
    13
    Nơi ở:
    Pakistan
    Điện thoại:
    +923334684812
    Lenevo A319 hang on logo done....without flash..

    [​IMG]

    [​IMG]
     
  3. Faisal_Computer
    Offline

    Faisal_Computer Product Manager

    Tham gia ngày:
    28/6/16
    Bài viết:
    1,322
    Đã được thích:
    13
    Nơi ở:
    Pakistan
    Điện thoại:
    +923334684812
    Lenevo A319 hang on logo done....without flash..

    [​IMG]

    [​IMG]
     
  4. Faisal_Computer
    Offline

    Faisal_Computer Product Manager

    Tham gia ngày:
    28/6/16
    Bài viết:
    1,322
    Đã được thích:
    13
    Nơi ở:
    Pakistan
    Điện thoại:
    +923334684812
    Post here ALL Successfull Repaired Phone by Volcano / Inferno
    QMOBILE S2PRO READ FLASH FILE DONE WITH VolcanoBox_3.0_AKA_Inferno_Key [​IMG]
     
  5. Faisal_Computer
    Offline

    Faisal_Computer Product Manager

    Tham gia ngày:
    28/6/16
    Bài viết:
    1,322
    Đã được thích:
    13
    Nơi ở:
    Pakistan
    Điện thoại:
    +923334684812
    Post here ALL Successfull Repaired Phone by Volcano / Inferno
    QMOBILE S2PRO READ FLASH FILE DONE WITH VolcanoBox_3.0_AKA_Inferno_Key [​IMG]
     
  6. Faisal_Computer
    Offline

    Faisal_Computer Product Manager

    Tham gia ngày:
    28/6/16
    Bài viết:
    1,322
    Đã được thích:
    13
    Nơi ở:
    Pakistan
    Điện thoại:
    +923334684812
    Post here ALL Successfull Repaired Phone by Volcano / Inferno
    HTC One ME CLONE MT6572 EMMC PRIVACY PROTECTION RESET DONE USING INFERNO DONGLE

    [​IMG]
    [​IMG]

    Code:
    13:20:33 Operation:
    1. Power off the phone.
    2. Please insert USB cable within 20 seconds.
    13:20:33
    13:20:39 Connecting...
    13:20:40 CPU TYPE:MT6572
    13:20:40 Hardware version:CA01
    13:20:40 Software version:0000
    13:20:40 SecCfgVal :0x00000000
    13:20:40 BromVersion :0xFF
    13:20:40 BLVersion :0x01
    13:20:42 Boot downloading...
    13:20:46 EMMC_ID:0x15010053355530304D02B26230D48033
    13:20:46 EMMC_PRODUCT_NAME: SAMSUNG :0x53355530304D
    13:20:46 EMMC_BOOT1_SIZE: 0x00200000
    13:20:46 EMMC_BOOT2_SIZE: 0x00200000
    13:20:46 EMMC_PRMB_SIZE: 0x00020000
    13:20:46 EMMC_GP1_SIZE: 0x00000000
    13:20:46 EMMC_GP2_SIZE: 0x00000000
    13:20:46 EMMC_GP3_SIZE: 0x00000000
    13:20:46 EMMC_GP4_SIZE: 0x00000000
    13:20:46 EMMC_USER_SIZE: 0x0E9000000(3.64 G)
    13:20:46
    13:20:52
    13:20:53
    13:20:53 Analysis of system files...
    13:20:53 PRELOADER:>>addr:0x000000 --length:0x600000
    13:20:53 MBR:>>addr:0x600000 --length:0x080000
    13:20:53 EBR1:>>addr:0x680000 --length:0x080000
    13:20:53 PRO_INFO:>>addr:0x700000 --length:0x300000
    13:20:53 NVRAM:>>addr:0xA00000 --length:0x500000
    13:20:53 PROTECT_F:>>addr:0xF00000 --length:0xA00000
    13:20:53 PROTECT_S:>>addr:0x1900000 --length:0xA00000
    13:20:53 SECCFG:>>addr:0x2300000 --length:0x020000
    13:20:53 UBOOT:>>addr:0x2320000 --length:0x060000
    13:20:53 BOOTIMG:>>addr:0x2380000 --length:0x600000
    13:20:53 RECOVERY:>>addr:0x2980000 --length:0x600000
    13:20:53 SEC_RO:>>addr:0x2F80000 --length:0x040000
    13:20:53 MISC:>>addr:0x2FC0000 --length:0x080000
    13:20:53 LOGO:>>addr:0x3040000 --length:0x300000
    13:20:53 EXPDB:>>addr:0x3340000 --length:0xA00000
    13:20:53 ANDROID:>>addr:0x3D40000 --length:0x32000000
    13:20:53 CACHE:>>addr:0x35D40000 --length:0xE200000
    13:20:53 USRDATA:>>addr:0x43F40000 --length:0x32000000
    13:20:53 FAT:>>addr:0x75F40000 --length:0x71FE0000
    13:20:53 BMTPOOL:>>addr:0xFFFF00A8 --length:0x1500000
    13:20:53
    13:20:53
    13:20:53 >>Format addr:0x43F40000 --Format length:0x32000000
    13:20:53 Read phone information success.
    13:20:55 Analysis of system files...
    13:21:01 Successfully reset anti-theft lock
     
  7. Faisal_Computer
    Offline

    Faisal_Computer Product Manager

    Tham gia ngày:
    28/6/16
    Bài viết:
    1,322
    Đã được thích:
    13
    Nơi ở:
    Pakistan
    Điện thoại:
    +923334684812
    Post here ALL Successfull Repaired Phone by Volcano / Inferno
    HTC One ME CLONE MT6572 EMMC PRIVACY PROTECTION RESET DONE USING INFERNO DONGLE

    [​IMG]
    [​IMG]

    Code:
    13:20:33 Operation:
    1. Power off the phone.
    2. Please insert USB cable within 20 seconds.
    13:20:33
    13:20:39 Connecting...
    13:20:40 CPU TYPE:MT6572
    13:20:40 Hardware version:CA01
    13:20:40 Software version:0000
    13:20:40 SecCfgVal :0x00000000
    13:20:40 BromVersion :0xFF
    13:20:40 BLVersion :0x01
    13:20:42 Boot downloading...
    13:20:46 EMMC_ID:0x15010053355530304D02B26230D48033
    13:20:46 EMMC_PRODUCT_NAME: SAMSUNG :0x53355530304D
    13:20:46 EMMC_BOOT1_SIZE: 0x00200000
    13:20:46 EMMC_BOOT2_SIZE: 0x00200000
    13:20:46 EMMC_PRMB_SIZE: 0x00020000
    13:20:46 EMMC_GP1_SIZE: 0x00000000
    13:20:46 EMMC_GP2_SIZE: 0x00000000
    13:20:46 EMMC_GP3_SIZE: 0x00000000
    13:20:46 EMMC_GP4_SIZE: 0x00000000
    13:20:46 EMMC_USER_SIZE: 0x0E9000000(3.64 G)
    13:20:46
    13:20:52
    13:20:53
    13:20:53 Analysis of system files...
    13:20:53 PRELOADER:>>addr:0x000000 --length:0x600000
    13:20:53 MBR:>>addr:0x600000 --length:0x080000
    13:20:53 EBR1:>>addr:0x680000 --length:0x080000
    13:20:53 PRO_INFO:>>addr:0x700000 --length:0x300000
    13:20:53 NVRAM:>>addr:0xA00000 --length:0x500000
    13:20:53 PROTECT_F:>>addr:0xF00000 --length:0xA00000
    13:20:53 PROTECT_S:>>addr:0x1900000 --length:0xA00000
    13:20:53 SECCFG:>>addr:0x2300000 --length:0x020000
    13:20:53 UBOOT:>>addr:0x2320000 --length:0x060000
    13:20:53 BOOTIMG:>>addr:0x2380000 --length:0x600000
    13:20:53 RECOVERY:>>addr:0x2980000 --length:0x600000
    13:20:53 SEC_RO:>>addr:0x2F80000 --length:0x040000
    13:20:53 MISC:>>addr:0x2FC0000 --length:0x080000
    13:20:53 LOGO:>>addr:0x3040000 --length:0x300000
    13:20:53 EXPDB:>>addr:0x3340000 --length:0xA00000
    13:20:53 ANDROID:>>addr:0x3D40000 --length:0x32000000
    13:20:53 CACHE:>>addr:0x35D40000 --length:0xE200000
    13:20:53 USRDATA:>>addr:0x43F40000 --length:0x32000000
    13:20:53 FAT:>>addr:0x75F40000 --length:0x71FE0000
    13:20:53 BMTPOOL:>>addr:0xFFFF00A8 --length:0x1500000
    13:20:53
    13:20:53
    13:20:53 >>Format addr:0x43F40000 --Format length:0x32000000
    13:20:53 Read phone information success.
    13:20:55 Analysis of system files...
    13:21:01 Successfully reset anti-theft lock
     
  8. Faisal_Computer
    Offline

    Faisal_Computer Product Manager

    Tham gia ngày:
    28/6/16
    Bài viết:
    1,322
    Đã được thích:
    13
    Nơi ở:
    Pakistan
    Điện thoại:
    +923334684812
    Post here ALL Successfull Repaired Phone by Volcano / Inferno
    HTC One ME CLONE MT6572 EMMC PRIVACY PROTECTION RESET DONE USING INFERNO DONGLE

    [​IMG]
    [​IMG]

    Code:
    13:20:33 Operation:
    1. Power off the phone.
    2. Please insert USB cable within 20 seconds.
    13:20:33
    13:20:39 Connecting...
    13:20:40 CPU TYPE:MT6572
    13:20:40 Hardware version:CA01
    13:20:40 Software version:0000
    13:20:40 SecCfgVal :0x00000000
    13:20:40 BromVersion :0xFF
    13:20:40 BLVersion :0x01
    13:20:42 Boot downloading...
    13:20:46 EMMC_ID:0x15010053355530304D02B26230D48033
    13:20:46 EMMC_PRODUCT_NAME: SAMSUNG :0x53355530304D
    13:20:46 EMMC_BOOT1_SIZE: 0x00200000
    13:20:46 EMMC_BOOT2_SIZE: 0x00200000
    13:20:46 EMMC_PRMB_SIZE: 0x00020000
    13:20:46 EMMC_GP1_SIZE: 0x00000000
    13:20:46 EMMC_GP2_SIZE: 0x00000000
    13:20:46 EMMC_GP3_SIZE: 0x00000000
    13:20:46 EMMC_GP4_SIZE: 0x00000000
    13:20:46 EMMC_USER_SIZE: 0x0E9000000(3.64 G)
    13:20:46
    13:20:52
    13:20:53
    13:20:53 Analysis of system files...
    13:20:53 PRELOADER:>>addr:0x000000 --length:0x600000
    13:20:53 MBR:>>addr:0x600000 --length:0x080000
    13:20:53 EBR1:>>addr:0x680000 --length:0x080000
    13:20:53 PRO_INFO:>>addr:0x700000 --length:0x300000
    13:20:53 NVRAM:>>addr:0xA00000 --length:0x500000
    13:20:53 PROTECT_F:>>addr:0xF00000 --length:0xA00000
    13:20:53 PROTECT_S:>>addr:0x1900000 --length:0xA00000
    13:20:53 SECCFG:>>addr:0x2300000 --length:0x020000
    13:20:53 UBOOT:>>addr:0x2320000 --length:0x060000
    13:20:53 BOOTIMG:>>addr:0x2380000 --length:0x600000
    13:20:53 RECOVERY:>>addr:0x2980000 --length:0x600000
    13:20:53 SEC_RO:>>addr:0x2F80000 --length:0x040000
    13:20:53 MISC:>>addr:0x2FC0000 --length:0x080000
    13:20:53 LOGO:>>addr:0x3040000 --length:0x300000
    13:20:53 EXPDB:>>addr:0x3340000 --length:0xA00000
    13:20:53 ANDROID:>>addr:0x3D40000 --length:0x32000000
    13:20:53 CACHE:>>addr:0x35D40000 --length:0xE200000
    13:20:53 USRDATA:>>addr:0x43F40000 --length:0x32000000
    13:20:53 FAT:>>addr:0x75F40000 --length:0x71FE0000
    13:20:53 BMTPOOL:>>addr:0xFFFF00A8 --length:0x1500000
    13:20:53
    13:20:53
    13:20:53 >>Format addr:0x43F40000 --Format length:0x32000000
    13:20:53 Read phone information success.
    13:20:55 Analysis of system files...
    13:21:01 Successfully reset anti-theft lock
     
  9. Faisal_Computer
    Offline

    Faisal_Computer Product Manager

    Tham gia ngày:
    28/6/16
    Bài viết:
    1,322
    Đã được thích:
    13
    Nơi ở:
    Pakistan
    Điện thoại:
    +923334684812
    Post here ALL Successfull Repaired Phone by Volcano / InfernoGTEL A704I READ PATTERN AND CLEAR LOCKS DONE USING INFERNO KEY

    READ PHONE INFO PATTERN
    Code:
    15:40:29 Operation:
    1. Power off the phone.
    2. Please insert USB cable within 20 seconds.
    15:40:29
    15:40:33 Connecting...
    15:40:33 CPU TYPE:MT6582
    15:40:33 Hardware version:CB00
    15:40:33 Software version:0001
    15:40:33 SecCfgVal :0x00000000
    15:40:33 BromVersion :0xFF
    15:40:33 BLVersion :0x01
    15:40:36 Boot downloading...
    15:40:39 EMMC_ID:0x1501004E35585A4D42018932B26F3207
    15:40:39 EMMC_PRODUCT_NAME: SAMSUNG :0x4E35585A4D42
    15:40:39 EMMC_BOOT1_SIZE: 0x00400000
    15:40:39 EMMC_BOOT2_SIZE: 0x00400000
    15:40:39 EMMC_PRMB_SIZE: 0x00080000
    15:40:39 EMMC_GP1_SIZE: 0x00000000
    15:40:39 EMMC_GP2_SIZE: 0x00000000
    15:40:39 EMMC_GP3_SIZE: 0x00000000
    15:40:39 EMMC_GP4_SIZE: 0x00000000
    15:40:40 EMMC_USER_SIZE: 0x0E9000000(3.64 G)
    15:40:40
    15:40:46
    15:40:46
    15:40:46 Analysis of system files...
    15:40:46 PRELOADER:>>addr:0x000000 --length:0x880000
    15:40:46 MBR:>>addr:0x880000 --length:0x080000
    15:40:47 EBR1:>>addr:0x900000 --length:0x080000
    15:40:47 PRO_INFO:>>addr:0x980000 --length:0x300000
    15:40:47 NVRAM:>>addr:0xC80000 --length:0x500000
    15:40:47 PROTECT_F:>>addr:0x1180000 --length:0xA00000
    15:40:47 PROTECT_S:>>addr:0x1B80000 --length:0xA00000
    15:40:47 SECCFG:>>addr:0x2580000 --length:0x020000
    15:40:47 UBOOT:>>addr:0x25A0000 --length:0x060000
    15:40:47 BOOTIMG:>>addr:0x2600000 --length:0x600000
    15:40:48 RECOVERY:>>addr:0x2C00000 --length:0x600000
    15:40:48 SEC_RO:>>addr:0x3200000 --length:0x040000
    15:40:48 MISC:>>addr:0x3240000 --length:0x080000
    15:40:48 LOGO:>>addr:0x32C0000 --length:0x300000
    15:40:48 EBR2:>>addr:0x35C0000 --length:0x080000
    15:40:48 EXPDB:>>addr:0x3640000 --length:0xA00000
    15:40:48 SPDATA:>>addr:0x4040000 --length:0x800000
    15:40:48 ANDROID:>>addr:0x4840000 --length:0x40000000
    15:40:49 CACHE:>>addr:0x44840000 --length:0x17800000
    15:40:49 USRDATA:>>addr:0x5C040000 --length:0x74000000
    15:40:49 FAT:>>addr:0xD0040000 --length:0x18340000
    15:40:49 BMTPOOL:>>addr:0xFFFF00A8 --length:0x000000
    15:40:49
    15:40:49
    15:40:49 >>Format addr:0x5C040000 --Format length:0x74000000
    15:40:49 Read phone information success.
    15:41:38 Reading phone info...


    CLEAR LOCKS


    Code:
    15:41:39 Operation:
    1. Power off the phone.
    2. Please insert USB cable within 20 seconds.
    15:41:39
    15:41:56 Connecting...
    15:41:56 CPU TYPE:MT6582
    15:41:56 Hardware version:CB00
    15:41:56 Software version:0001
    15:41:56 SecCfgVal :0x00000000
    15:41:56 BromVersion :0xFF
    15:41:56 BLVersion :0x01
    15:42:00 Boot downloading...
    15:42:03 EMMC_ID:0x1501004E35585A4D42018932B26F3207
    15:42:03 EMMC_PRODUCT_NAME: 0x4E35585A4D42
    15:42:03 EMMC_BOOT1_SIZE: 0x00400000
    15:42:03 EMMC_BOOT2_SIZE: 0x00400000
    15:42:03 EMMC_PRMB_SIZE: 0x00080000
    15:42:03 EMMC_GP1_SIZE: 0x00000000
    15:42:03 EMMC_GP2_SIZE: 0x00000000
    15:42:04 EMMC_GP3_SIZE: 0x00000000
    15:42:04 EMMC_GP4_SIZE: 0x00000000
    15:42:04 EMMC_USER_SIZE: 0x0E9000000(3.64 G)
    15:42:04
    15:42:04 Finding partition.
    15:42:13 Backup file,please wait a moment...
    15:42:15 BasicInfo :
    15:42:15 Brand : GTEL
    15:42:15 ProdName : GTEL
    15:42:15 ProdModel : A704i
    15:42:15 Device : GTEL
    15:42:15 AndroidVer: 4.2.2
    15:42:15 MTK CPU : MT6582
    15:42:15 MTK PRJ : ALPS.JB5.MP.V1.6
    15:42:15
    15:42:16 Read phone info OK.

    15:42:39
    15:42:39
    15:42:39
    15:42:39 Operation:
    1. Power off the phone.
    2. Please insert USB cable within 20 seconds.
    15:42:39
    15:42:44 Connecting...
    15:42:44 CPU TYPE:MT6582
    15:42:44 Hardware version:CB00
    15:42:44 Software version:0001
    15:42:44 SecCfgVal :0x00000000
    15:42:44 BromVersion :0xFF
    15:42:44 BLVersion :0x01
    15:42:47 Boot downloading...
    15:42:49 EMMC_ID:0x1501004E35585A4D42018932B26F3207
    15:42:49 EMMC_PRODUCT_NAME: SAMSUNG :0x4E35585A4D42
    15:42:49 EMMC_BOOT1_SIZE: 0x00400000
    15:42:49 EMMC_BOOT2_SIZE: 0x00400000
    15:42:49 EMMC_PRMB_SIZE: 0x00080000
    15:42:50 EMMC_GP1_SIZE: 0x00000000
    15:42:50 EMMC_GP2_SIZE: 0x00000000
    15:42:50 EMMC_GP3_SIZE: 0x00000000
    15:42:50 EMMC_GP4_SIZE: 0x00000000
    15:42:50 EMMC_USER_SIZE: 0x0E9000000(3.64 G)
    15:42:50
    15:42:56
    15:42:56
    15:42:57 Analysis of system files...
    15:42:57 PRELOADER:>>addr:0x000000 --length:0x880000
    15:42:57 MBR:>>addr:0x880000 --length:0x080000
    15:42:57 EBR1:>>addr:0x900000 --length:0x080000
    15:42:57 PRO_INFO:>>addr:0x980000 --length:0x300000
    15:42:57 NVRAM:>>addr:0xC80000 --length:0x500000
    15:42:57 PROTECT_F:>>addr:0x1180000 --length:0xA00000
    15:42:57 PROTECT_S:>>addr:0x1B80000 --length:0xA00000
    15:42:57 SECCFG:>>addr:0x2580000 --length:0x020000
    15:42:57 UBOOT:>>addr:0x25A0000 --length:0x060000
    15:42:57 BOOTIMG:>>addr:0x2600000 --length:0x600000
    15:42:58 RECOVERY:>>addr:0x2C00000 --length:0x600000
    15:42:58 SEC_RO:>>addr:0x3200000 --length:0x040000
    15:42:58 MISC:>>addr:0x3240000 --length:0x080000
    15:42:58 LOGO:>>addr:0x32C0000 --length:0x300000
    15:42:58 EBR2:>>addr:0x35C0000 --length:0x080000
    15:42:58 EXPDB:>>addr:0x3640000 --length:0xA00000
    15:42:58 SPDATA:>>addr:0x4040000 --length:0x800000
    15:42:58 ANDROID:>>addr:0x4840000 --length:0x40000000
    15:42:58 CACHE:>>addr:0x44840000 --length:0x17800000
    15:42:58 USRDATA:>>addr:0x5C040000 --length:0x74000000
    15:42:58 FAT:>>addr:0xD0040000 --length:0x18340000
    15:42:58 BMTPOOL:>>addr:0xFFFF00A8 --length:0x000000
    15:42:58
    15:42:59
    15:42:59 Read phone information success.
     
  10. Faisal_Computer
    Offline

    Faisal_Computer Product Manager

    Tham gia ngày:
    28/6/16
    Bài viết:
    1,322
    Đã được thích:
    13
    Nơi ở:
    Pakistan
    Điện thoại:
    +923334684812
    ..::: Micromax Q414 Report..::


    ..::: Micromax Q414 Extend InFo..::

    ..::: Micromax Q414 1 Click Frp Remove..::

    1 Click , Few Second, With Out Any Error Only Great Inferno Tool

    [​IMG]

    [​IMG]

    ..:: Read Extend InFo ::...

    [​IMG]

    [​IMG]

    ..:: Remove FRP ::...

    [​IMG]
     
  11. Faisal_Computer
    Offline

    Faisal_Computer Product Manager

    Tham gia ngày:
    28/6/16
    Bài viết:
    1,322
    Đã được thích:
    13
    Nơi ở:
    Pakistan
    Điện thoại:
    +923334684812
    ..::: Micromax Q414 Report..::


    ..::: Micromax Q414 Extend InFo..::

    ..::: Micromax Q414 1 Click Frp Remove..::

    1 Click , Few Second, With Out Any Error Only Great Inferno Tool

    [​IMG]

    [​IMG]

    ..:: Read Extend InFo ::...

    [​IMG]

    [​IMG]

    ..:: Remove FRP ::...

    [​IMG]
     
  12. Faisal_Computer
    Offline

    Faisal_Computer Product Manager

    Tham gia ngày:
    28/6/16
    Bài viết:
    1,322
    Đã được thích:
    13
    Nơi ở:
    Pakistan
    Điện thoại:
    +923334684812
    Micromax Q338
    FRP Reset Done[USB MODE]


    Read Info Extend
    Code:
    >>Analysis of USB port,Please insert phone USB cable.
    20:36:49 > Connecting...
    20:36:49 > CPU TYPE:MT6580
    20:36:49 > Hardware version:CA00
    20:36:49 > Software version:0000
    20:36:49 > SecCfgVal :0x00000000
    20:36:49 > BromVersion :0xFF
    20:36:49 > BLVersion :0x01
    >>Boot downloading complete!
    20:36:55 > EMMC_ID:0x90014A4838473165050793B0A5219211
    20:36:55 > EMMC_PRODUCT_NAME: SAMSUNG :0x483847316505
    20:36:55 > EMMC_BOOT1_SIZE: 0x00400000
    20:36:55 > EMMC_BOOT2_SIZE: 0x00400000
    20:36:55 > EMMC_PRMB_SIZE: 0x00400000
    20:36:55 > EMMC_GP1_SIZE: 0x00000000
    20:36:55 > EMMC_GP2_SIZE: 0x00000000
    20:36:55 > EMMC_GP3_SIZE: 0x00000000
    20:36:55 > EMMC_GP4_SIZE: 0x00000000
    20:36:55 > EMMC_USER_SIZE: 0x1D2000000(7.28 G)
    20:36:55 >
    20:37:01 >
    20:37:01 >
    20:37:01 > Analysis of system files...
    20:37:01 > proinfo:>>addr:0x080000 --length:0x300000
    20:37:01 > nvram:>>addr:0x380000 --length:0x500000
    20:37:01 > protect1:>>addr:0x880000 --length:0xA00000
    20:37:01 > protect2:>>addr:0x1280000 --length:0xA00000
    20:37:01 > seccfg:>>addr:0x1C80000 --length:0x040000
    20:37:01 > lk:>>addr:0x1CC0000 --length:0x060000
    20:37:01 > boot:>>addr:0x1D20000 --length:0x1000000
    20:37:01 > recovery:>>addr:0x2D20000 --length:0x1000000
    20:37:01 > para:>>addr:0x3D20000 --length:0x080000
    20:37:01 > logo:>>addr:0x3DA0000 --length:0x800000
    20:37:01 > expdb:>>addr:0x45A0000 --length:0xA00000
    20:37:01 > frp:>>addr:0x4FA0000 --length:0x100000
    20:37:01 > nvdata:>>addr:0x50A0000 --length:0x2000000
    20:37:01 > metadata:>>addr:0x70A0000 --length:0x2760000
    20:37:01 > oemkeystore:>>addr:0x9800000 --length:0x200000
    20:37:01 > secro:>>addr:0x9A00000 --length:0x600000
    20:37:01 > keystore:>>addr:0xA000000 --length:0x800000
    20:37:01 > system:>>addr:0xA800000 --length:0x80000000
    20:37:01 > cache:>>addr:0x8A800000 --length:0x10000000
    20:37:01 > userdata:>>addr:0x9A800000 --length:0x36780000
    20:37:01 > flashinfo:>>addr:0xD0F80000 --length:0x1000000
    20:37:01 >
    20:37:01 >
    20:37:01 > >>Format addr:0x9A800000 --Format length:0x36780000
    20:37:01 > Read phone information success.
    20:37:06 > brand=Micromax
    20:37:06 > model=Micromax Q338
    20:37:06 > Android version=5.1
    20:37:06 > MTK platform=MT6580
    20:37:06 > Custom build version=MMX_Q338_SW_V09_HW_V1.0_16102015
    20:37:08 > LCM_HEIGHT = 960
    20:37:08 > LCM_WIDTH = 540
    20:37:08 > CUSTOM_KERNEL_TOUCHPANEL = GT9XX_hotknot synaptics_s5250
    20:37:08 > CUSTOM_HAL_MAIN_IMGSENSOR = s5k4h5yc_mipi_raw ov8858_mipi_raw
    20:37:08 > CUSTOM_HAL_SUB_IMGSENSOR = ov5648_mipi_raw_darling ov5648_mipi_raw_sunwin
    20:37:08 > MTK_PRODUCT_LOCALES = en_US en_IN hi_IN mr_IN bn_IN kn_IN te_IN ta_IN ml_IN gu_IN pa_IN or_IN zh_CN zh_TW es_ES pt_BR ru_RU fr_F
    FRP Reset[USB MODE]

    [​IMG]
     
  13. Faisal_Computer
    Offline

    Faisal_Computer Product Manager

    Tham gia ngày:
    28/6/16
    Bài viết:
    1,322
    Đã được thích:
    13
    Nơi ở:
    Pakistan
    Điện thoại:
    +923334684812
    Micromax Q338
    FRP Reset Done[USB MODE]


    Read Info Extend
    Code:
    >>Analysis of USB port,Please insert phone USB cable.
    20:36:49 > Connecting...
    20:36:49 > CPU TYPE:MT6580
    20:36:49 > Hardware version:CA00
    20:36:49 > Software version:0000
    20:36:49 > SecCfgVal :0x00000000
    20:36:49 > BromVersion :0xFF
    20:36:49 > BLVersion :0x01
    >>Boot downloading complete!
    20:36:55 > EMMC_ID:0x90014A4838473165050793B0A5219211
    20:36:55 > EMMC_PRODUCT_NAME: SAMSUNG :0x483847316505
    20:36:55 > EMMC_BOOT1_SIZE: 0x00400000
    20:36:55 > EMMC_BOOT2_SIZE: 0x00400000
    20:36:55 > EMMC_PRMB_SIZE: 0x00400000
    20:36:55 > EMMC_GP1_SIZE: 0x00000000
    20:36:55 > EMMC_GP2_SIZE: 0x00000000
    20:36:55 > EMMC_GP3_SIZE: 0x00000000
    20:36:55 > EMMC_GP4_SIZE: 0x00000000
    20:36:55 > EMMC_USER_SIZE: 0x1D2000000(7.28 G)
    20:36:55 >
    20:37:01 >
    20:37:01 >
    20:37:01 > Analysis of system files...
    20:37:01 > proinfo:>>addr:0x080000 --length:0x300000
    20:37:01 > nvram:>>addr:0x380000 --length:0x500000
    20:37:01 > protect1:>>addr:0x880000 --length:0xA00000
    20:37:01 > protect2:>>addr:0x1280000 --length:0xA00000
    20:37:01 > seccfg:>>addr:0x1C80000 --length:0x040000
    20:37:01 > lk:>>addr:0x1CC0000 --length:0x060000
    20:37:01 > boot:>>addr:0x1D20000 --length:0x1000000
    20:37:01 > recovery:>>addr:0x2D20000 --length:0x1000000
    20:37:01 > para:>>addr:0x3D20000 --length:0x080000
    20:37:01 > logo:>>addr:0x3DA0000 --length:0x800000
    20:37:01 > expdb:>>addr:0x45A0000 --length:0xA00000
    20:37:01 > frp:>>addr:0x4FA0000 --length:0x100000
    20:37:01 > nvdata:>>addr:0x50A0000 --length:0x2000000
    20:37:01 > metadata:>>addr:0x70A0000 --length:0x2760000
    20:37:01 > oemkeystore:>>addr:0x9800000 --length:0x200000
    20:37:01 > secro:>>addr:0x9A00000 --length:0x600000
    20:37:01 > keystore:>>addr:0xA000000 --length:0x800000
    20:37:01 > system:>>addr:0xA800000 --length:0x80000000
    20:37:01 > cache:>>addr:0x8A800000 --length:0x10000000
    20:37:01 > userdata:>>addr:0x9A800000 --length:0x36780000
    20:37:01 > flashinfo:>>addr:0xD0F80000 --length:0x1000000
    20:37:01 >
    20:37:01 >
    20:37:01 > >>Format addr:0x9A800000 --Format length:0x36780000
    20:37:01 > Read phone information success.
    20:37:06 > brand=Micromax
    20:37:06 > model=Micromax Q338
    20:37:06 > Android version=5.1
    20:37:06 > MTK platform=MT6580
    20:37:06 > Custom build version=MMX_Q338_SW_V09_HW_V1.0_16102015
    20:37:08 > LCM_HEIGHT = 960
    20:37:08 > LCM_WIDTH = 540
    20:37:08 > CUSTOM_KERNEL_TOUCHPANEL = GT9XX_hotknot synaptics_s5250
    20:37:08 > CUSTOM_HAL_MAIN_IMGSENSOR = s5k4h5yc_mipi_raw ov8858_mipi_raw
    20:37:08 > CUSTOM_HAL_SUB_IMGSENSOR = ov5648_mipi_raw_darling ov5648_mipi_raw_sunwin
    20:37:08 > MTK_PRODUCT_LOCALES = en_US en_IN hi_IN mr_IN bn_IN kn_IN te_IN ta_IN ml_IN gu_IN pa_IN or_IN zh_CN zh_TW es_ES pt_BR ru_RU fr_F
    FRP Reset[USB MODE]

    [​IMG]
     
  14. Faisal_Computer
    Offline

    Faisal_Computer Product Manager

    Tham gia ngày:
    28/6/16
    Bài viết:
    1,322
    Đã được thích:
    13
    Nơi ở:
    Pakistan
    Điện thoại:
    +923334684812
    :::..huawei Y360-U61 Report...:::

    :::..huawei Y360-U61 Extend InFo...:::


    :::..huawei Y360-U61 Remove Virus..:::
    Other Cm Fool Show Remove 72 Virus But Not Remove Fake Team [​IMG]
    [​IMG]
    [​IMG]

    ..:: Extend InFo ::..
    [​IMG]

    [​IMG]
    ..:: Remove Virus ::..

    [​IMG]
     
  15. Faisal_Computer
    Offline

    Faisal_Computer Product Manager

    Tham gia ngày:
    28/6/16
    Bài viết:
    1,322
    Đã được thích:
    13
    Nơi ở:
    Pakistan
    Điện thoại:
    +923334684812
    .::Nand King VolcanoBox::.
    GT-I9060 Nand MT6572

    Hang On logo Done[Only Format]
    Merapi Tool

    Read Info

    Code:
    >>Analysis of USB port,Please insert phone USB cable.
    21:25:59 > Connecting...
    21:25:59 > CPU TYPE:MT6572
    21:25:59 > Hardware version:CA01
    21:25:59 > Software version:0000
    21:25:59 > SecCfgVal :0x00000000
    21:25:59 > BromVersion :0xFF
    21:25:59 > BLVersion :0x01
    >>Boot downloading complete!
    21:26:08 > FlashID:002C00BC00900066
    21:26:08 > Flash Type: NAND_MT29C4G48MAZAPAKD
    21:26:08 > FlashLen:20000000
    21:26:08 >
    21:26:08 > It will take severl minutes to Unlock,please wait...
    21:26:08 >
    21:26:08 >
    21:26:08 > Analysis of system files...
    21:26:08 > PRELOADER:>>addr:0x000000 --length:0x100000
    21:26:08 > PRO_INFO:>>addr:0x100000 --length:0x100000
    21:26:08 > NVRAM:>>addr:0x200000 --length:0x300000
    21:26:08 > PROTECT_F:>>addr:0x500000 --length:0x300000
    21:26:08 > PROTECT_S:>>addr:0x800000 --length:0x300000
    21:26:08 > SECCFG:>>addr:0xB00000 --length:0x040000
    21:26:08 > UBOOT:>>addr:0xB40000 --length:0x080000
    21:26:08 > BOOTIMG:>>addr:0xBC0000 --length:0x600000
    21:26:08 > RECOVERY:>>addr:0x11C0000 --length:0x600000
    21:26:08 > SEC_RO:>>addr:0x17C0000 --length:0x040000
    21:26:08 > MISC:>>addr:0x1800000 --length:0x0C0000
    21:26:08 > LOGO:>>addr:0x18C0000 --length:0x100000
    21:26:08 > EXPDB:>>addr:0x19C0000 --length:0x200000
    21:26:08 > FAT:>>addr:0x1BC0000 --length:0x1E00000
    21:26:08 > ANDROID:>>addr:0x39C0000 --length:0x14000000
    21:26:08 > CACHE:>>addr:0x179C0000 --length:0x700000
    21:26:08 > USRDATA:>>addr:0x180C0000 --length:0x6AC0000
    21:26:08 > BMTPOOL:>>addr:0xFFFF0050 --length:0x000000
    21:26:08 >
    21:26:08 >
    21:26:08 > Format addr:0x180C0000 --Format length:0x6AC0000
    Format
    Code:
    >>Analysis of USB port,Please insert phone USB cable.
    21:20:39 > Connecting...
    21:20:39 > CPU TYPE:MT6572
    21:20:39 > Hardware version:CA01
    21:20:39 > Software version:0000
    21:20:39 > SecCfgVal :0x00000000
    21:20:39 > BromVersion :0xFF
    21:20:39 > BLVersion :0x01
    >>Boot downloading complete!
    21:20:47 > FlashID:002C00BC00900066
    21:20:47 > Flash Type: NAND_MT29C4G48MAZAPAKD
    21:20:47 > FlashLen:20000000
    21:20:47 >
    21:20:47 >
    21:20:47 >
    21:20:47 > Analysis of system files...
    21:20:47 > PRELOADER:>>addr:0x000000 --length:0x100000
    21:20:47 > PRO_INFO:>>addr:0x100000 --length:0x100000
    21:20:47 > NVRAM:>>addr:0x200000 --length:0x300000
    21:20:47 > PROTECT_F:>>addr:0x500000 --length:0x300000
    21:20:47 > PROTECT_S:>>addr:0x800000 --length:0x300000
    21:20:47 > SECCFG:>>addr:0xB00000 --length:0x040000
    21:20:47 > UBOOT:>>addr:0xB40000 --length:0x080000
    21:20:47 > BOOTIMG:>>addr:0xBC0000 --length:0x600000
    21:20:47 > RECOVERY:>>addr:0x11C0000 --length:0x600000
    21:20:47 > SEC_RO:>>addr:0x17C0000 --length:0x040000
    21:20:48 > MISC:>>addr:0x1800000 --length:0x0C0000
    21:20:48 > LOGO:>>addr:0x18C0000 --length:0x100000
    21:20:48 > EXPDB:>>addr:0x19C0000 --length:0x200000
    21:20:48 > FAT:>>addr:0x1BC0000 --length:0x1E00000
    21:20:48 > ANDROID:>>addr:0x39C0000 --length:0x14000000
    21:20:48 > CACHE:>>addr:0x179C0000 --length:0x700000
    21:20:48 > USRDATA:>>addr:0x180C0000 --length:0x6AC0000
    21:20:48 > BMTPOOL:>>addr:0xFFFF0050 --length:0x000000
    21:20:48 >
    21:20:48 >
    21:20:48 > Format addr:0x180C0000 --Format length:0x6AC0000
    21:20:50 > Format range: Start Address: 0x180C0000,Format Length :0x6AC0000
    >>Flash erasing complete!


    Backup Working Factory File

    Code:
    >>Analysis of USB port,Please insert phone USB cable.
    21:27:13 > Connecting...
    21:27:13 > CPU TYPE:MT6572
    21:27:13 > Hardware version:CA01
    21:27:13 > Software version:0000
    21:27:13 > SecCfgVal :0x00000000
    21:27:13 > BromVersion :0xFF
    21:27:13 > BLVersion :0x01
    >>Boot downloading complete!
    21:27:21 > FlashID:002C00BC00900066
    21:27:21 > Flash Type: NAND_MT29C4G48MAZAPAKD
    21:27:21 > FlashLen:20000000
    21:27:21 >
    >preloader.bin read success.
    >lk.bin read success.
    >boot.img read success.
    >recovery.img read success.
    >secro.img read success.
    >logo.bin read success.
    >system.img read success.
    >userdata.img read success.
    >>Reading completed.
    21:30:14 > File save path:C:\Merapi Tool\backup\MT6572-2016-07-26 23_5
     
  16. Faisal_Computer
    Offline

    Faisal_Computer Product Manager

    Tham gia ngày:
    28/6/16
    Bài viết:
    1,322
    Đã được thích:
    13
    Nơi ở:
    Pakistan
    Điện thoại:
    +923334684812
    Micromax A069 Write Factory Firmware Done
    Micromax A069

    Write Factory Firmware Done

    [​IMG]


    Logs:
    Code:
    Flash files count is :11
    Action : Firmware update.
    Selected Acer: Liquid Z110
    Phone must be off with battery inside.
    Please insert USB cable now...
    Detected : MediaTek PreLoader USB VCOM (Android) (COM41)
    Phone detected...Please wait
    Sending DA agent, please wait...
    BBCHIP MT6572_S00
    EMMC: (29Gb+4096Mb) HYNIX 0x483447316404
    EMMC FW VERSION: 05:00:00:00:00:00:00:00
    BOOT STYLE : EMMC BOOT
    Detecting high speed port, wait......
    If driver not installed, install high speed port driver.
    Detected : MediaTek DA USB VCOM (Android) (COM42)
    Warning, flashing preloader disabled!
    If you change android version, preloader must be flashed.
    Starting flash.
    Download firmware to flash now...
    MBR checksum is executing ...
    EBR1 checksum is executing ...
    UBOOT checksum is executing ...
    BOOTIMG checksum is executing ...
    RECOVERY checksum is executing ...
    SEC_RO checksum is executing ...
    LOGO checksum is executing ...
    ANDROID checksum is executing ...
    CACHE checksum is executing ...
    USRDATA checksum is executing ...
    After flash this firmware need to perform some aditional steps
    1.Reinsert battery, keep VOL- and power on untill phone will come in factory mode
    2.Select line EMMC, and after press home button.
    3.Wait untill phone will restart and will stuck on logo(leave for 1 min in this stage).
    4.If phone not power on, reinsert battery and perform direct unlock.
    If repair fail, please contact us or report in forum to provide help.
    Wait untill phone will start charging.
    All done.
     
  17. Faisal_Computer
    Offline

    Faisal_Computer Product Manager

    Tham gia ngày:
    28/6/16
    Bài viết:
    1,322
    Đã được thích:
    13
    Nơi ở:
    Pakistan
    Điện thoại:
    +923334684812
    Post here ALL Successfull Repaired Phone by Volcano / Inferno

    [​IMG]
    Full Flash
    [​IMG]
     
  18. Faisal_Computer
    Offline

    Faisal_Computer Product Manager

    Tham gia ngày:
    28/6/16
    Bài viết:
    1,322
    Đã được thích:
    13
    Nơi ở:
    Pakistan
    Điện thoại:
    +923334684812
    Post here ALL Successfull Repaired Phone by Volcano / Inferno
    [​IMG]
    Full Flash
    [​IMG]
     
  19. Faisal_Computer
    Offline

    Faisal_Computer Product Manager

    Tham gia ngày:
    28/6/16
    Bài viết:
    1,322
    Đã được thích:
    13
    Nơi ở:
    Pakistan
    Điện thoại:
    +923334684812
    Micromax A40 pattern lock remove in fastboot mode


    [​IMG]
     
  20. Faisal_Computer
    Offline

    Faisal_Computer Product Manager

    Tham gia ngày:
    28/6/16
    Bài viết:
    1,322
    Đã được thích:
    13
    Nơi ở:
    Pakistan
    Điện thoại:
    +923334684812
    Micromax A40 pattern lock remove in fastboot mode

    [​IMG]
     

Chia sẻ trang này

Google+