Post here ALL Successfull Repaired Phone by Volcano / Inferno QMOBILE S2PRO READ FLASH FILE DONE WITH VolcanoBox_3.0_AKA_Inferno_Key
Post here ALL Successfull Repaired Phone by Volcano / Inferno QMOBILE S2PRO READ FLASH FILE DONE WITH VolcanoBox_3.0_AKA_Inferno_Key
Post here ALL Successfull Repaired Phone by Volcano / Inferno HTC One ME CLONE MT6572 EMMC PRIVACY PROTECTION RESET DONE USING INFERNO DONGLE Code: 13:20:33 Operation: 1. Power off the phone. 2. Please insert USB cable within 20 seconds. 13:20:33 13:20:39 Connecting... 13:20:40 CPU TYPE:MT6572 13:20:40 Hardware version:CA01 13:20:40 Software version:0000 13:20:40 SecCfgVal :0x00000000 13:20:40 BromVersion :0xFF 13:20:40 BLVersion :0x01 13:20:42 Boot downloading... 13:20:46 EMMC_ID:0x15010053355530304D02B26230D48033 13:20:46 EMMC_PRODUCT_NAME: SAMSUNG :0x53355530304D 13:20:46 EMMC_BOOT1_SIZE: 0x00200000 13:20:46 EMMC_BOOT2_SIZE: 0x00200000 13:20:46 EMMC_PRMB_SIZE: 0x00020000 13:20:46 EMMC_GP1_SIZE: 0x00000000 13:20:46 EMMC_GP2_SIZE: 0x00000000 13:20:46 EMMC_GP3_SIZE: 0x00000000 13:20:46 EMMC_GP4_SIZE: 0x00000000 13:20:46 EMMC_USER_SIZE: 0x0E9000000(3.64 G) 13:20:46 13:20:52 13:20:53 13:20:53 Analysis of system files... 13:20:53 PRELOADER>addr:0x000000 --length:0x600000 13:20:53 MBR>addr:0x600000 --length:0x080000 13:20:53 EBR1>addr:0x680000 --length:0x080000 13:20:53 PRO_INFO>addr:0x700000 --length:0x300000 13:20:53 NVRAM>addr:0xA00000 --length:0x500000 13:20:53 PROTECT_F>addr:0xF00000 --length:0xA00000 13:20:53 PROTECT_S>addr:0x1900000 --length:0xA00000 13:20:53 SECCFG>addr:0x2300000 --length:0x020000 13:20:53 UBOOT>addr:0x2320000 --length:0x060000 13:20:53 BOOTIMG>addr:0x2380000 --length:0x600000 13:20:53 RECOVERY>addr:0x2980000 --length:0x600000 13:20:53 SEC_RO>addr:0x2F80000 --length:0x040000 13:20:53 MISC>addr:0x2FC0000 --length:0x080000 13:20:53 LOGO>addr:0x3040000 --length:0x300000 13:20:53 EXPDB>addr:0x3340000 --length:0xA00000 13:20:53 ANDROID>addr:0x3D40000 --length:0x32000000 13:20:53 CACHE>addr:0x35D40000 --length:0xE200000 13:20:53 USRDATA>addr:0x43F40000 --length:0x32000000 13:20:53 FAT>addr:0x75F40000 --length:0x71FE0000 13:20:53 BMTPOOL>addr:0xFFFF00A8 --length:0x1500000 13:20:53 13:20:53 13:20:53 >>Format addr:0x43F40000 --Format length:0x32000000 13:20:53 Read phone information success. 13:20:55 Analysis of system files... 13:21:01 Successfully reset anti-theft lock
Post here ALL Successfull Repaired Phone by Volcano / Inferno HTC One ME CLONE MT6572 EMMC PRIVACY PROTECTION RESET DONE USING INFERNO DONGLE Code: 13:20:33 Operation: 1. Power off the phone. 2. Please insert USB cable within 20 seconds. 13:20:33 13:20:39 Connecting... 13:20:40 CPU TYPE:MT6572 13:20:40 Hardware version:CA01 13:20:40 Software version:0000 13:20:40 SecCfgVal :0x00000000 13:20:40 BromVersion :0xFF 13:20:40 BLVersion :0x01 13:20:42 Boot downloading... 13:20:46 EMMC_ID:0x15010053355530304D02B26230D48033 13:20:46 EMMC_PRODUCT_NAME: SAMSUNG :0x53355530304D 13:20:46 EMMC_BOOT1_SIZE: 0x00200000 13:20:46 EMMC_BOOT2_SIZE: 0x00200000 13:20:46 EMMC_PRMB_SIZE: 0x00020000 13:20:46 EMMC_GP1_SIZE: 0x00000000 13:20:46 EMMC_GP2_SIZE: 0x00000000 13:20:46 EMMC_GP3_SIZE: 0x00000000 13:20:46 EMMC_GP4_SIZE: 0x00000000 13:20:46 EMMC_USER_SIZE: 0x0E9000000(3.64 G) 13:20:46 13:20:52 13:20:53 13:20:53 Analysis of system files... 13:20:53 PRELOADER>addr:0x000000 --length:0x600000 13:20:53 MBR>addr:0x600000 --length:0x080000 13:20:53 EBR1>addr:0x680000 --length:0x080000 13:20:53 PRO_INFO>addr:0x700000 --length:0x300000 13:20:53 NVRAM>addr:0xA00000 --length:0x500000 13:20:53 PROTECT_F>addr:0xF00000 --length:0xA00000 13:20:53 PROTECT_S>addr:0x1900000 --length:0xA00000 13:20:53 SECCFG>addr:0x2300000 --length:0x020000 13:20:53 UBOOT>addr:0x2320000 --length:0x060000 13:20:53 BOOTIMG>addr:0x2380000 --length:0x600000 13:20:53 RECOVERY>addr:0x2980000 --length:0x600000 13:20:53 SEC_RO>addr:0x2F80000 --length:0x040000 13:20:53 MISC>addr:0x2FC0000 --length:0x080000 13:20:53 LOGO>addr:0x3040000 --length:0x300000 13:20:53 EXPDB>addr:0x3340000 --length:0xA00000 13:20:53 ANDROID>addr:0x3D40000 --length:0x32000000 13:20:53 CACHE>addr:0x35D40000 --length:0xE200000 13:20:53 USRDATA>addr:0x43F40000 --length:0x32000000 13:20:53 FAT>addr:0x75F40000 --length:0x71FE0000 13:20:53 BMTPOOL>addr:0xFFFF00A8 --length:0x1500000 13:20:53 13:20:53 13:20:53 >>Format addr:0x43F40000 --Format length:0x32000000 13:20:53 Read phone information success. 13:20:55 Analysis of system files... 13:21:01 Successfully reset anti-theft lock
Post here ALL Successfull Repaired Phone by Volcano / Inferno HTC One ME CLONE MT6572 EMMC PRIVACY PROTECTION RESET DONE USING INFERNO DONGLE Code: 13:20:33 Operation: 1. Power off the phone. 2. Please insert USB cable within 20 seconds. 13:20:33 13:20:39 Connecting... 13:20:40 CPU TYPE:MT6572 13:20:40 Hardware version:CA01 13:20:40 Software version:0000 13:20:40 SecCfgVal :0x00000000 13:20:40 BromVersion :0xFF 13:20:40 BLVersion :0x01 13:20:42 Boot downloading... 13:20:46 EMMC_ID:0x15010053355530304D02B26230D48033 13:20:46 EMMC_PRODUCT_NAME: SAMSUNG :0x53355530304D 13:20:46 EMMC_BOOT1_SIZE: 0x00200000 13:20:46 EMMC_BOOT2_SIZE: 0x00200000 13:20:46 EMMC_PRMB_SIZE: 0x00020000 13:20:46 EMMC_GP1_SIZE: 0x00000000 13:20:46 EMMC_GP2_SIZE: 0x00000000 13:20:46 EMMC_GP3_SIZE: 0x00000000 13:20:46 EMMC_GP4_SIZE: 0x00000000 13:20:46 EMMC_USER_SIZE: 0x0E9000000(3.64 G) 13:20:46 13:20:52 13:20:53 13:20:53 Analysis of system files... 13:20:53 PRELOADER>addr:0x000000 --length:0x600000 13:20:53 MBR>addr:0x600000 --length:0x080000 13:20:53 EBR1>addr:0x680000 --length:0x080000 13:20:53 PRO_INFO>addr:0x700000 --length:0x300000 13:20:53 NVRAM>addr:0xA00000 --length:0x500000 13:20:53 PROTECT_F>addr:0xF00000 --length:0xA00000 13:20:53 PROTECT_S>addr:0x1900000 --length:0xA00000 13:20:53 SECCFG>addr:0x2300000 --length:0x020000 13:20:53 UBOOT>addr:0x2320000 --length:0x060000 13:20:53 BOOTIMG>addr:0x2380000 --length:0x600000 13:20:53 RECOVERY>addr:0x2980000 --length:0x600000 13:20:53 SEC_RO>addr:0x2F80000 --length:0x040000 13:20:53 MISC>addr:0x2FC0000 --length:0x080000 13:20:53 LOGO>addr:0x3040000 --length:0x300000 13:20:53 EXPDB>addr:0x3340000 --length:0xA00000 13:20:53 ANDROID>addr:0x3D40000 --length:0x32000000 13:20:53 CACHE>addr:0x35D40000 --length:0xE200000 13:20:53 USRDATA>addr:0x43F40000 --length:0x32000000 13:20:53 FAT>addr:0x75F40000 --length:0x71FE0000 13:20:53 BMTPOOL>addr:0xFFFF00A8 --length:0x1500000 13:20:53 13:20:53 13:20:53 >>Format addr:0x43F40000 --Format length:0x32000000 13:20:53 Read phone information success. 13:20:55 Analysis of system files... 13:21:01 Successfully reset anti-theft lock
Post here ALL Successfull Repaired Phone by Volcano / InfernoGTEL A704I READ PATTERN AND CLEAR LOCKS DONE USING INFERNO KEY READ PHONE INFO PATTERN Code: 15:40:29 Operation: 1. Power off the phone. 2. Please insert USB cable within 20 seconds. 15:40:29 15:40:33 Connecting... 15:40:33 CPU TYPE:MT6582 15:40:33 Hardware version:CB00 15:40:33 Software version:0001 15:40:33 SecCfgVal :0x00000000 15:40:33 BromVersion :0xFF 15:40:33 BLVersion :0x01 15:40:36 Boot downloading... 15:40:39 EMMC_ID:0x1501004E35585A4D42018932B26F3207 15:40:39 EMMC_PRODUCT_NAME: SAMSUNG :0x4E35585A4D42 15:40:39 EMMC_BOOT1_SIZE: 0x00400000 15:40:39 EMMC_BOOT2_SIZE: 0x00400000 15:40:39 EMMC_PRMB_SIZE: 0x00080000 15:40:39 EMMC_GP1_SIZE: 0x00000000 15:40:39 EMMC_GP2_SIZE: 0x00000000 15:40:39 EMMC_GP3_SIZE: 0x00000000 15:40:39 EMMC_GP4_SIZE: 0x00000000 15:40:40 EMMC_USER_SIZE: 0x0E9000000(3.64 G) 15:40:40 15:40:46 15:40:46 15:40:46 Analysis of system files... 15:40:46 PRELOADER>addr:0x000000 --length:0x880000 15:40:46 MBR>addr:0x880000 --length:0x080000 15:40:47 EBR1>addr:0x900000 --length:0x080000 15:40:47 PRO_INFO>addr:0x980000 --length:0x300000 15:40:47 NVRAM>addr:0xC80000 --length:0x500000 15:40:47 PROTECT_F>addr:0x1180000 --length:0xA00000 15:40:47 PROTECT_S>addr:0x1B80000 --length:0xA00000 15:40:47 SECCFG>addr:0x2580000 --length:0x020000 15:40:47 UBOOT>addr:0x25A0000 --length:0x060000 15:40:47 BOOTIMG>addr:0x2600000 --length:0x600000 15:40:48 RECOVERY>addr:0x2C00000 --length:0x600000 15:40:48 SEC_RO>addr:0x3200000 --length:0x040000 15:40:48 MISC>addr:0x3240000 --length:0x080000 15:40:48 LOGO>addr:0x32C0000 --length:0x300000 15:40:48 EBR2>addr:0x35C0000 --length:0x080000 15:40:48 EXPDB>addr:0x3640000 --length:0xA00000 15:40:48 SPDATA>addr:0x4040000 --length:0x800000 15:40:48 ANDROID>addr:0x4840000 --length:0x40000000 15:40:49 CACHE>addr:0x44840000 --length:0x17800000 15:40:49 USRDATA>addr:0x5C040000 --length:0x74000000 15:40:49 FAT>addr:0xD0040000 --length:0x18340000 15:40:49 BMTPOOL>addr:0xFFFF00A8 --length:0x000000 15:40:49 15:40:49 15:40:49 >>Format addr:0x5C040000 --Format length:0x74000000 15:40:49 Read phone information success. 15:41:38 Reading phone info... CLEAR LOCKS Code: 15:41:39 Operation: 1. Power off the phone. 2. Please insert USB cable within 20 seconds. 15:41:39 15:41:56 Connecting... 15:41:56 CPU TYPE:MT6582 15:41:56 Hardware version:CB00 15:41:56 Software version:0001 15:41:56 SecCfgVal :0x00000000 15:41:56 BromVersion :0xFF 15:41:56 BLVersion :0x01 15:42:00 Boot downloading... 15:42:03 EMMC_ID:0x1501004E35585A4D42018932B26F3207 15:42:03 EMMC_PRODUCT_NAME: 0x4E35585A4D42 15:42:03 EMMC_BOOT1_SIZE: 0x00400000 15:42:03 EMMC_BOOT2_SIZE: 0x00400000 15:42:03 EMMC_PRMB_SIZE: 0x00080000 15:42:03 EMMC_GP1_SIZE: 0x00000000 15:42:03 EMMC_GP2_SIZE: 0x00000000 15:42:04 EMMC_GP3_SIZE: 0x00000000 15:42:04 EMMC_GP4_SIZE: 0x00000000 15:42:04 EMMC_USER_SIZE: 0x0E9000000(3.64 G) 15:42:04 15:42:04 Finding partition. 15:42:13 Backup file,please wait a moment... 15:42:15 BasicInfo : 15:42:15 Brand : GTEL 15:42:15 ProdName : GTEL 15:42:15 ProdModel : A704i 15:42:15 Device : GTEL 15:42:15 AndroidVer: 4.2.2 15:42:15 MTK CPU : MT6582 15:42:15 MTK PRJ : ALPS.JB5.MP.V1.6 15:42:15 15:42:16 Read phone info OK. 15:42:39 15:42:39 15:42:39 15:42:39 Operation: 1. Power off the phone. 2. Please insert USB cable within 20 seconds. 15:42:39 15:42:44 Connecting... 15:42:44 CPU TYPE:MT6582 15:42:44 Hardware version:CB00 15:42:44 Software version:0001 15:42:44 SecCfgVal :0x00000000 15:42:44 BromVersion :0xFF 15:42:44 BLVersion :0x01 15:42:47 Boot downloading... 15:42:49 EMMC_ID:0x1501004E35585A4D42018932B26F3207 15:42:49 EMMC_PRODUCT_NAME: SAMSUNG :0x4E35585A4D42 15:42:49 EMMC_BOOT1_SIZE: 0x00400000 15:42:49 EMMC_BOOT2_SIZE: 0x00400000 15:42:49 EMMC_PRMB_SIZE: 0x00080000 15:42:50 EMMC_GP1_SIZE: 0x00000000 15:42:50 EMMC_GP2_SIZE: 0x00000000 15:42:50 EMMC_GP3_SIZE: 0x00000000 15:42:50 EMMC_GP4_SIZE: 0x00000000 15:42:50 EMMC_USER_SIZE: 0x0E9000000(3.64 G) 15:42:50 15:42:56 15:42:56 15:42:57 Analysis of system files... 15:42:57 PRELOADER>addr:0x000000 --length:0x880000 15:42:57 MBR>addr:0x880000 --length:0x080000 15:42:57 EBR1>addr:0x900000 --length:0x080000 15:42:57 PRO_INFO>addr:0x980000 --length:0x300000 15:42:57 NVRAM>addr:0xC80000 --length:0x500000 15:42:57 PROTECT_F>addr:0x1180000 --length:0xA00000 15:42:57 PROTECT_S>addr:0x1B80000 --length:0xA00000 15:42:57 SECCFG>addr:0x2580000 --length:0x020000 15:42:57 UBOOT>addr:0x25A0000 --length:0x060000 15:42:57 BOOTIMG>addr:0x2600000 --length:0x600000 15:42:58 RECOVERY>addr:0x2C00000 --length:0x600000 15:42:58 SEC_RO>addr:0x3200000 --length:0x040000 15:42:58 MISC>addr:0x3240000 --length:0x080000 15:42:58 LOGO>addr:0x32C0000 --length:0x300000 15:42:58 EBR2>addr:0x35C0000 --length:0x080000 15:42:58 EXPDB>addr:0x3640000 --length:0xA00000 15:42:58 SPDATA>addr:0x4040000 --length:0x800000 15:42:58 ANDROID>addr:0x4840000 --length:0x40000000 15:42:58 CACHE>addr:0x44840000 --length:0x17800000 15:42:58 USRDATA>addr:0x5C040000 --length:0x74000000 15:42:58 FAT>addr:0xD0040000 --length:0x18340000 15:42:58 BMTPOOL>addr:0xFFFF00A8 --length:0x000000 15:42:58 15:42:59 15:42:59 Read phone information success.
..::: Micromax Q414 Report..:: ..::: Micromax Q414 Extend InFo..:: ..::: Micromax Q414 1 Click Frp Remove..:: 1 Click , Few Second, With Out Any Error Only Great Inferno Tool ..:: Read Extend InFo ::... ..:: Remove FRP ::...
..::: Micromax Q414 Report..:: ..::: Micromax Q414 Extend InFo..:: ..::: Micromax Q414 1 Click Frp Remove..:: 1 Click , Few Second, With Out Any Error Only Great Inferno Tool ..:: Read Extend InFo ::... ..:: Remove FRP ::...
Micromax Q338 FRP Reset Done[USB MODE] Read Info Extend Code: >>Analysis of USB port,Please insert phone USB cable. 20:36:49 > Connecting... 20:36:49 > CPU TYPE:MT6580 20:36:49 > Hardware version:CA00 20:36:49 > Software version:0000 20:36:49 > SecCfgVal :0x00000000 20:36:49 > BromVersion :0xFF 20:36:49 > BLVersion :0x01 >>Boot downloading complete! 20:36:55 > EMMC_ID:0x90014A4838473165050793B0A5219211 20:36:55 > EMMC_PRODUCT_NAME: SAMSUNG :0x483847316505 20:36:55 > EMMC_BOOT1_SIZE: 0x00400000 20:36:55 > EMMC_BOOT2_SIZE: 0x00400000 20:36:55 > EMMC_PRMB_SIZE: 0x00400000 20:36:55 > EMMC_GP1_SIZE: 0x00000000 20:36:55 > EMMC_GP2_SIZE: 0x00000000 20:36:55 > EMMC_GP3_SIZE: 0x00000000 20:36:55 > EMMC_GP4_SIZE: 0x00000000 20:36:55 > EMMC_USER_SIZE: 0x1D2000000(7.28 G) 20:36:55 > 20:37:01 > 20:37:01 > 20:37:01 > Analysis of system files... 20:37:01 > proinfo>addr:0x080000 --length:0x300000 20:37:01 > nvram>addr:0x380000 --length:0x500000 20:37:01 > protect1>addr:0x880000 --length:0xA00000 20:37:01 > protect2>addr:0x1280000 --length:0xA00000 20:37:01 > seccfg>addr:0x1C80000 --length:0x040000 20:37:01 > lk>addr:0x1CC0000 --length:0x060000 20:37:01 > boot>addr:0x1D20000 --length:0x1000000 20:37:01 > recovery>addr:0x2D20000 --length:0x1000000 20:37:01 > para>addr:0x3D20000 --length:0x080000 20:37:01 > logo>addr:0x3DA0000 --length:0x800000 20:37:01 > expdb>addr:0x45A0000 --length:0xA00000 20:37:01 > frp>addr:0x4FA0000 --length:0x100000 20:37:01 > nvdata>addr:0x50A0000 --length:0x2000000 20:37:01 > metadata>addr:0x70A0000 --length:0x2760000 20:37:01 > oemkeystore>addr:0x9800000 --length:0x200000 20:37:01 > secro>addr:0x9A00000 --length:0x600000 20:37:01 > keystore>addr:0xA000000 --length:0x800000 20:37:01 > system>addr:0xA800000 --length:0x80000000 20:37:01 > cache>addr:0x8A800000 --length:0x10000000 20:37:01 > userdata>addr:0x9A800000 --length:0x36780000 20:37:01 > flashinfo>addr:0xD0F80000 --length:0x1000000 20:37:01 > 20:37:01 > 20:37:01 > >>Format addr:0x9A800000 --Format length:0x36780000 20:37:01 > Read phone information success. 20:37:06 > brand=Micromax 20:37:06 > model=Micromax Q338 20:37:06 > Android version=5.1 20:37:06 > MTK platform=MT6580 20:37:06 > Custom build version=MMX_Q338_SW_V09_HW_V1.0_16102015 20:37:08 > LCM_HEIGHT = 960 20:37:08 > LCM_WIDTH = 540 20:37:08 > CUSTOM_KERNEL_TOUCHPANEL = GT9XX_hotknot synaptics_s5250 20:37:08 > CUSTOM_HAL_MAIN_IMGSENSOR = s5k4h5yc_mipi_raw ov8858_mipi_raw 20:37:08 > CUSTOM_HAL_SUB_IMGSENSOR = ov5648_mipi_raw_darling ov5648_mipi_raw_sunwin 20:37:08 > MTK_PRODUCT_LOCALES = en_US en_IN hi_IN mr_IN bn_IN kn_IN te_IN ta_IN ml_IN gu_IN pa_IN or_IN zh_CN zh_TW es_ES pt_BR ru_RU fr_F FRP Reset[USB MODE]
Micromax Q338 FRP Reset Done[USB MODE] Read Info Extend Code: >>Analysis of USB port,Please insert phone USB cable. 20:36:49 > Connecting... 20:36:49 > CPU TYPE:MT6580 20:36:49 > Hardware version:CA00 20:36:49 > Software version:0000 20:36:49 > SecCfgVal :0x00000000 20:36:49 > BromVersion :0xFF 20:36:49 > BLVersion :0x01 >>Boot downloading complete! 20:36:55 > EMMC_ID:0x90014A4838473165050793B0A5219211 20:36:55 > EMMC_PRODUCT_NAME: SAMSUNG :0x483847316505 20:36:55 > EMMC_BOOT1_SIZE: 0x00400000 20:36:55 > EMMC_BOOT2_SIZE: 0x00400000 20:36:55 > EMMC_PRMB_SIZE: 0x00400000 20:36:55 > EMMC_GP1_SIZE: 0x00000000 20:36:55 > EMMC_GP2_SIZE: 0x00000000 20:36:55 > EMMC_GP3_SIZE: 0x00000000 20:36:55 > EMMC_GP4_SIZE: 0x00000000 20:36:55 > EMMC_USER_SIZE: 0x1D2000000(7.28 G) 20:36:55 > 20:37:01 > 20:37:01 > 20:37:01 > Analysis of system files... 20:37:01 > proinfo>addr:0x080000 --length:0x300000 20:37:01 > nvram>addr:0x380000 --length:0x500000 20:37:01 > protect1>addr:0x880000 --length:0xA00000 20:37:01 > protect2>addr:0x1280000 --length:0xA00000 20:37:01 > seccfg>addr:0x1C80000 --length:0x040000 20:37:01 > lk>addr:0x1CC0000 --length:0x060000 20:37:01 > boot>addr:0x1D20000 --length:0x1000000 20:37:01 > recovery>addr:0x2D20000 --length:0x1000000 20:37:01 > para>addr:0x3D20000 --length:0x080000 20:37:01 > logo>addr:0x3DA0000 --length:0x800000 20:37:01 > expdb>addr:0x45A0000 --length:0xA00000 20:37:01 > frp>addr:0x4FA0000 --length:0x100000 20:37:01 > nvdata>addr:0x50A0000 --length:0x2000000 20:37:01 > metadata>addr:0x70A0000 --length:0x2760000 20:37:01 > oemkeystore>addr:0x9800000 --length:0x200000 20:37:01 > secro>addr:0x9A00000 --length:0x600000 20:37:01 > keystore>addr:0xA000000 --length:0x800000 20:37:01 > system>addr:0xA800000 --length:0x80000000 20:37:01 > cache>addr:0x8A800000 --length:0x10000000 20:37:01 > userdata>addr:0x9A800000 --length:0x36780000 20:37:01 > flashinfo>addr:0xD0F80000 --length:0x1000000 20:37:01 > 20:37:01 > 20:37:01 > >>Format addr:0x9A800000 --Format length:0x36780000 20:37:01 > Read phone information success. 20:37:06 > brand=Micromax 20:37:06 > model=Micromax Q338 20:37:06 > Android version=5.1 20:37:06 > MTK platform=MT6580 20:37:06 > Custom build version=MMX_Q338_SW_V09_HW_V1.0_16102015 20:37:08 > LCM_HEIGHT = 960 20:37:08 > LCM_WIDTH = 540 20:37:08 > CUSTOM_KERNEL_TOUCHPANEL = GT9XX_hotknot synaptics_s5250 20:37:08 > CUSTOM_HAL_MAIN_IMGSENSOR = s5k4h5yc_mipi_raw ov8858_mipi_raw 20:37:08 > CUSTOM_HAL_SUB_IMGSENSOR = ov5648_mipi_raw_darling ov5648_mipi_raw_sunwin 20:37:08 > MTK_PRODUCT_LOCALES = en_US en_IN hi_IN mr_IN bn_IN kn_IN te_IN ta_IN ml_IN gu_IN pa_IN or_IN zh_CN zh_TW es_ES pt_BR ru_RU fr_F FRP Reset[USB MODE]
:::..huawei Y360-U61 Report...::: :::..huawei Y360-U61 Extend InFo...::: :::..huawei Y360-U61 Remove Virus..::: Other Cm Fool Show Remove 72 Virus But Not Remove Fake Team ..:: Extend InFo ::.. ..:: Remove Virus ::..
.::Nand King VolcanoBox::. GT-I9060 Nand MT6572 Hang On logo Done[Only Format] Merapi Tool Read Info Code: >>Analysis of USB port,Please insert phone USB cable. 21:25:59 > Connecting... 21:25:59 > CPU TYPE:MT6572 21:25:59 > Hardware version:CA01 21:25:59 > Software version:0000 21:25:59 > SecCfgVal :0x00000000 21:25:59 > BromVersion :0xFF 21:25:59 > BLVersion :0x01 >>Boot downloading complete! 21:26:08 > FlashID:002C00BC00900066 21:26:08 > Flash Type: NAND_MT29C4G48MAZAPAKD 21:26:08 > FlashLen:20000000 21:26:08 > 21:26:08 > It will take severl minutes to Unlock,please wait... 21:26:08 > 21:26:08 > 21:26:08 > Analysis of system files... 21:26:08 > PRELOADER>addr:0x000000 --length:0x100000 21:26:08 > PRO_INFO>addr:0x100000 --length:0x100000 21:26:08 > NVRAM>addr:0x200000 --length:0x300000 21:26:08 > PROTECT_F>addr:0x500000 --length:0x300000 21:26:08 > PROTECT_S>addr:0x800000 --length:0x300000 21:26:08 > SECCFG>addr:0xB00000 --length:0x040000 21:26:08 > UBOOT>addr:0xB40000 --length:0x080000 21:26:08 > BOOTIMG>addr:0xBC0000 --length:0x600000 21:26:08 > RECOVERY>addr:0x11C0000 --length:0x600000 21:26:08 > SEC_RO>addr:0x17C0000 --length:0x040000 21:26:08 > MISC>addr:0x1800000 --length:0x0C0000 21:26:08 > LOGO>addr:0x18C0000 --length:0x100000 21:26:08 > EXPDB>addr:0x19C0000 --length:0x200000 21:26:08 > FAT>addr:0x1BC0000 --length:0x1E00000 21:26:08 > ANDROID>addr:0x39C0000 --length:0x14000000 21:26:08 > CACHE>addr:0x179C0000 --length:0x700000 21:26:08 > USRDATA>addr:0x180C0000 --length:0x6AC0000 21:26:08 > BMTPOOL>addr:0xFFFF0050 --length:0x000000 21:26:08 > 21:26:08 > 21:26:08 > Format addr:0x180C0000 --Format length:0x6AC0000 Format Code: >>Analysis of USB port,Please insert phone USB cable. 21:20:39 > Connecting... 21:20:39 > CPU TYPE:MT6572 21:20:39 > Hardware version:CA01 21:20:39 > Software version:0000 21:20:39 > SecCfgVal :0x00000000 21:20:39 > BromVersion :0xFF 21:20:39 > BLVersion :0x01 >>Boot downloading complete! 21:20:47 > FlashID:002C00BC00900066 21:20:47 > Flash Type: NAND_MT29C4G48MAZAPAKD 21:20:47 > FlashLen:20000000 21:20:47 > 21:20:47 > 21:20:47 > 21:20:47 > Analysis of system files... 21:20:47 > PRELOADER>addr:0x000000 --length:0x100000 21:20:47 > PRO_INFO>addr:0x100000 --length:0x100000 21:20:47 > NVRAM>addr:0x200000 --length:0x300000 21:20:47 > PROTECT_F>addr:0x500000 --length:0x300000 21:20:47 > PROTECT_S>addr:0x800000 --length:0x300000 21:20:47 > SECCFG>addr:0xB00000 --length:0x040000 21:20:47 > UBOOT>addr:0xB40000 --length:0x080000 21:20:47 > BOOTIMG>addr:0xBC0000 --length:0x600000 21:20:47 > RECOVERY>addr:0x11C0000 --length:0x600000 21:20:47 > SEC_RO>addr:0x17C0000 --length:0x040000 21:20:48 > MISC>addr:0x1800000 --length:0x0C0000 21:20:48 > LOGO>addr:0x18C0000 --length:0x100000 21:20:48 > EXPDB>addr:0x19C0000 --length:0x200000 21:20:48 > FAT>addr:0x1BC0000 --length:0x1E00000 21:20:48 > ANDROID>addr:0x39C0000 --length:0x14000000 21:20:48 > CACHE>addr:0x179C0000 --length:0x700000 21:20:48 > USRDATA>addr:0x180C0000 --length:0x6AC0000 21:20:48 > BMTPOOL>addr:0xFFFF0050 --length:0x000000 21:20:48 > 21:20:48 > 21:20:48 > Format addr:0x180C0000 --Format length:0x6AC0000 21:20:50 > Format range: Start Address: 0x180C0000,Format Length :0x6AC0000 >>Flash erasing complete! Backup Working Factory File Code: >>Analysis of USB port,Please insert phone USB cable. 21:27:13 > Connecting... 21:27:13 > CPU TYPE:MT6572 21:27:13 > Hardware version:CA01 21:27:13 > Software version:0000 21:27:13 > SecCfgVal :0x00000000 21:27:13 > BromVersion :0xFF 21:27:13 > BLVersion :0x01 >>Boot downloading complete! 21:27:21 > FlashID:002C00BC00900066 21:27:21 > Flash Type: NAND_MT29C4G48MAZAPAKD 21:27:21 > FlashLen:20000000 21:27:21 > >preloader.bin read success. >lk.bin read success. >boot.img read success. >recovery.img read success. >secro.img read success. >logo.bin read success. >system.img read success. >userdata.img read success. >>Reading completed. 21:30:14 > File save path:C:\Merapi Tool\backup\MT6572-2016-07-26 23_5
Micromax A069 Write Factory Firmware Done Micromax A069 Write Factory Firmware Done Logs: Code: Flash files count is :11 Action : Firmware update. Selected Acer: Liquid Z110 Phone must be off with battery inside. Please insert USB cable now... Detected : MediaTek PreLoader USB VCOM (Android) (COM41) Phone detected...Please wait Sending DA agent, please wait... BBCHIP MT6572_S00 EMMC: (29Gb+4096Mb) HYNIX 0x483447316404 EMMC FW VERSION: 05:00:00:00:00:00:00:00 BOOT STYLE : EMMC BOOT Detecting high speed port, wait...... If driver not installed, install high speed port driver. Detected : MediaTek DA USB VCOM (Android) (COM42) Warning, flashing preloader disabled! If you change android version, preloader must be flashed. Starting flash. Download firmware to flash now... MBR checksum is executing ... EBR1 checksum is executing ... UBOOT checksum is executing ... BOOTIMG checksum is executing ... RECOVERY checksum is executing ... SEC_RO checksum is executing ... LOGO checksum is executing ... ANDROID checksum is executing ... CACHE checksum is executing ... USRDATA checksum is executing ... After flash this firmware need to perform some aditional steps 1.Reinsert battery, keep VOL- and power on untill phone will come in factory mode 2.Select line EMMC, and after press home button. 3.Wait untill phone will restart and will stuck on logo(leave for 1 min in this stage). 4.If phone not power on, reinsert battery and perform direct unlock. If repair fail, please contact us or report in forum to provide help. Wait untill phone will start charging. All done.