|
Welcome to the GSM-Forum forums. You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. Only registered members may post questions, contact other members or search our database of over 8 million posts. Registration is fast, simple and absolutely free so please - Click to REGISTER! If you have any problems with the registration process or your account login, please contact contact us . |
|
Register | FAQ | Donate | Forum Rules | Root any Device | ★iPhone Unlock★ | ★ Direct Codes ★ | Direct Unlock Source | Mark Forums Read |
| LinkBack | Thread Tools | Display Modes |
01-03-2016, 05:50 | #1 (permalink) |
No Life Poster Join Date: Nov 2010
Posts: 7,669
Member: 1445819 Status: Offline Thanks Meter: 4,976 | Merapi Tool 1.4.0 Beta>>Added Read Info Extend{Bulid Info}Read Factory Flash Improved Lava Irish 510 Read Build Info & Read Factory Flash With Merapi Beta Read Info { Extend } Read Factory Flash Br Real ASH Team GPG WE ARE NOT FAKE. WE DON'T DELETE POST OF OUR USERS. WE DEVELOP OUR SOLUTIONS WHILE OTHERS JUST COPY / PASTE. Last edited by zoneofash; 01-03-2016 at 11:02. |
The Following 9 Users Say Thank You to zoneofash For This Useful Post: |
01-03-2016, 06:15 | #2 (permalink) |
No Life Poster Join Date: Nov 2010
Posts: 7,669
Member: 1445819 Status: Offline Thanks Meter: 4,976 | E-tel N3 MT6582 EMMC Read Info {Extended}Read / Write Flash & Format Done With Merap E-tel N3 MT6582 EMMC Read Info {Extended}Read / Write Flash & Format Done With Merap Read Info { Extend } Code: 10:12:15 Connecting... 10:12:15 CPU TYPE:MT6582 10:12:15 Hardware version:CA01 10:12:15 Software version:0001 10:12:15 SecCfgVal :0x00000000 10:12:15 BromVersion :0xFF 10:12:15 BLVersion :0x01 10:12:18 Boot downloading... 10:12:20 EMMC_ID:0x1501004E35585A4D4201C6475BDFB0C3 10:12:20 EMMC_PRODUCT_NAME: SAMSUNG :0x4E35585A4D42 10:12:20 EMMC_BOOT1_SIZE: 0x00400000 10:12:20 EMMC_BOOT2_SIZE: 0x00400000 10:12:20 EMMC_PRMB_SIZE: 0x00080000 10:12:20 EMMC_GP1_SIZE: 0x00000000 10:12:20 EMMC_GP2_SIZE: 0x00000000 10:12:20 EMMC_GP3_SIZE: 0x00000000 10:12:20 EMMC_GP4_SIZE: 0x00000000 10:12:20 EMMC_USER_SIZE: 0x0E9000000(3.64 G) 10:12:20 10:12:26 10:12:26 10:12:26 Analysis of system files... 10:12:26 PRELOADER:>>addr:0x000000 --length:0xC00000 10:12:26 MBR:>>addr:0xC00000 --length:0x080000 10:12:26 EBR1:>>addr:0xC80000 --length:0x080000 10:12:26 PRO_INFO:>>addr:0xD00000 --length:0x300000 10:12:26 NVRAM:>>addr:0x1000000 --length:0x500000 10:12:26 PROTECT_F:>>addr:0x1500000 --length:0xA00000 10:12:26 PROTECT_S:>>addr:0x1F00000 --length:0xA00000 10:12:26 SECCFG:>>addr:0x2900000 --length:0x020000 10:12:26 UBOOT:>>addr:0x2920000 --length:0x060000 10:12:26 BOOTIMG:>>addr:0x2980000 --length:0x600000 10:12:26 RECOVERY:>>addr:0x2F80000 --length:0x600000 10:12:26 SEC_RO:>>addr:0x3580000 --length:0x600000 10:12:26 MISC:>>addr:0x3B80000 --length:0x080000 10:12:26 LOGO:>>addr:0x3C00000 --length:0x300000 10:12:26 EBR2:>>addr:0x3F00000 --length:0x080000 10:12:26 EXPDB:>>addr:0x3F80000 --length:0xA00000 10:12:26 KONKA:>>addr:0x4980000 --length:0x600000 10:12:26 ANDROID:>>addr:0x4F80000 --length:0x2BC00000 10:12:26 CACHE:>>addr:0x30B80000 --length:0x7E00000 10:12:26 USRDATA:>>addr:0x38980000 --length:0x40000000 10:12:26 FAT:>>addr:0x78980000 --length:0x6FA00000 10:12:26 BMTPOOL:>>addr:0xFFFF00A8 --length:0x000000 10:12:26 10:12:26 10:12:26 >>Format addr:0x38980000 --Format length:0x40000000 10:12:26 Read phone information success. 10:12:31 ro.product.brand=E-tel 10:12:31 ro.product.model=E-tel N3 10:12:31 ro.build.version.release=4.2.2 10:12:31 ro.mediatek.platform=MT6582 10:12:31 ro.custom.build.version=1392804069 Read Flash { BIN } Write Flash { BIN } Format Code: 10:15:37 Connecting... 10:15:37 CPU TYPE:MT6582 10:15:37 Hardware version:CA01 10:15:37 Software version:0001 10:15:37 SecCfgVal :0x00000000 10:15:37 BromVersion :0xFF 10:15:37 BLVersion :0x01 10:15:39 Boot downloading... 10:15:41 EMMC_ID:0x1501004E35585A4D4201C6475BDFB0C3 10:15:41 EMMC_PRODUCT_NAME: SAMSUNG :0x4E35585A4D42 10:15:41 EMMC_BOOT1_SIZE: 0x00400000 10:15:41 EMMC_BOOT2_SIZE: 0x00400000 10:15:41 EMMC_PRMB_SIZE: 0x00080000 10:15:41 EMMC_GP1_SIZE: 0x00000000 10:15:41 EMMC_GP2_SIZE: 0x00000000 10:15:41 EMMC_GP3_SIZE: 0x00000000 10:15:41 EMMC_GP4_SIZE: 0x00000000 10:15:41 EMMC_USER_SIZE: 0x0E9000000(3.64 G) 10:15:41 10:15:47 10:15:47 10:15:47 Analysis of system files... 10:15:47 PRELOADER:>>addr:0x000000 --length:0xC00000 10:15:47 MBR:>>addr:0xC00000 --length:0x080000 10:15:47 EBR1:>>addr:0xC80000 --length:0x080000 10:15:47 PRO_INFO:>>addr:0xD00000 --length:0x300000 10:15:47 NVRAM:>>addr:0x1000000 --length:0x500000 10:15:47 PROTECT_F:>>addr:0x1500000 --length:0xA00000 10:15:47 PROTECT_S:>>addr:0x1F00000 --length:0xA00000 10:15:47 SECCFG:>>addr:0x2900000 --length:0x020000 10:15:47 UBOOT:>>addr:0x2920000 --length:0x060000 10:15:47 BOOTIMG:>>addr:0x2980000 --length:0x600000 10:15:47 RECOVERY:>>addr:0x2F80000 --length:0x600000 10:15:47 SEC_RO:>>addr:0x3580000 --length:0x600000 10:15:47 MISC:>>addr:0x3B80000 --length:0x080000 10:15:47 LOGO:>>addr:0x3C00000 --length:0x300000 10:15:47 EBR2:>>addr:0x3F00000 --length:0x080000 10:15:47 EXPDB:>>addr:0x3F80000 --length:0xA00000 10:15:47 KONKA:>>addr:0x4980000 --length:0x600000 10:15:47 ANDROID:>>addr:0x4F80000 --length:0x2BC00000 10:15:47 CACHE:>>addr:0x30B80000 --length:0x7E00000 10:15:47 USRDATA:>>addr:0x38980000 --length:0x40000000 10:15:47 FAT:>>addr:0x78980000 --length:0x6FA00000 10:15:47 BMTPOOL:>>addr:0xFFFF00A8 --length:0x000000 10:15:47 10:15:47 10:15:47 Read phone information success. 10:15:53 Format range: Start Address: 0x38980000,Format Length :0x40000000 10:15:53 Flash erasing... 10:15:57 Start calibration data... Br Real ASH Team GPG |
The Following 4 Users Say Thank You to zoneofash For This Useful Post: |
01-03-2016, 06:43 | #4 (permalink) |
No Life Poster Join Date: Nov 2010
Posts: 7,669
Member: 1445819 Status: Offline Thanks Meter: 4,976 | Huawei Y221-U22 Read Factory Flash , Clean Virus Done With Merapi Beta Huawei Y221-U22 Read Factory Flash , Clean Virus Done With Merapi Beta Read Info { Extend } Read Factory Flash Clean Virus { XXX Virus } Format Br Real ASH Team GPG |
The Following 3 Users Say Thank You to zoneofash For This Useful Post: |
01-03-2016, 07:13 | #6 (permalink) |
Product Supporter Join Date: Jun 2009 Location: eMMC & UFS
Posts: 4,600
Member: 1045758 Status: Offline Sonork: 100.1613661(Offline) Thanks Meter: 4,307 | Lenovo K50a40 MT6752 eMMC Read info Extend by Merapi Tool Lenovo K50a40 MT6752 eMMC Read info Extend by Merapi Tool Code: >>Analysis of USB port,Please insert phone USB cable. 20:17:10 > Connecting... 20:17:10 > CPU TYPE:MT6752 20:17:10 > Hardware version:CA01 20:17:10 > Software version:0001 20:17:10 > SecCfgVal :0x00000000 20:17:10 > BromVersion :0xFF 20:17:10 > BLVersion :0x01 >>Boot downloading complete! 20:17:20 > EMMC_ID:0x150100523832314D4200B21AC82C92F9 20:17:20 > EMMC_PRODUCT_NAME: SAMSUNG :0x523832314D42 20:17:20 > EMMC_BOOT1_SIZE: 0x00400000 20:17:20 > EMMC_BOOT2_SIZE: 0x00400000 20:17:20 > EMMC_PRMB_SIZE: 0x00400000 20:17:20 > EMMC_GP1_SIZE: 0x00000000 20:17:20 > EMMC_GP2_SIZE: 0x00000000 20:17:20 > EMMC_GP3_SIZE: 0x00000000 20:17:20 > EMMC_GP4_SIZE: 0x00000000 20:17:20 > EMMC_USER_SIZE: 0x3A3E00000(14.56 G) 20:17:20 > 20:17:26 > 20:17:26 > 20:17:26 > Analysis of system files... 20:17:26 > proinfo:>>addr:0x080000 --length:0x300000 20:17:26 > nvram:>>addr:0x380000 --length:0x500000 20:17:26 > protect1:>>addr:0x880000 --length:0xA00000 20:17:26 > protect2:>>addr:0x1280000 --length:0xA00000 20:17:26 > seccfg:>>addr:0x1C80000 --length:0x040000 20:17:26 > lk:>>addr:0x1CC0000 --length:0x060000 20:17:26 > boot:>>addr:0x1D20000 --length:0x1000000 20:17:26 > recovery:>>addr:0x2D20000 --length:0x1000000 20:17:26 > secro:>>addr:0x3D20000 --length:0x600000 20:17:26 > para:>>addr:0x4320000 --length:0x080000 20:17:26 > logo:>>addr:0x43A0000 --length:0x800000 20:17:26 > expdb:>>addr:0x4BA0000 --length:0xA00000 20:17:26 > tee1:>>addr:0x55A0000 --length:0x500000 20:17:26 > tee2:>>addr:0x5AA0000 --length:0x500000 20:17:26 > metadata:>>addr:0x5FA0000 --length:0x2000000 20:17:26 > frp:>>addr:0x7FA0000 --length:0x860000 20:17:26 > system:>>addr:0x8800000 --length:0xA0000000 20:17:26 > cache:>>addr:0xA8800000 --length:0x1A800000 20:17:26 > userdata:>>addr:0xC3000000 --length:0xDFD80000 20:17:26 > flashinfo:>>addr:0xA2D80000 --length:0x1000000 20:17:26 > 20:17:26 > 20:17:26 > >>Format addr:0xC3000000 --Format length:0xDFD80000 20:17:26 > Read phone information success. 20:17:31 > ro.product.brand=Lenovo 20:17:31 > ro.product.model=Lenovo K50a40 20:17:31 > ro.build.version.release=5.0 20:17:31 > ro.mediatek.platform=MT6752 20:17:31 > ro.product.sw.internal.version=K50a40_USR_S121_1508132120_MP6.V3_LENOVO6752_ROW 20:17:31 > ro.product.hw.version=H201 20:17:32 > CUSTOM_KERNEL_LCM = nt35595_fhd_dsi_cmd_truly_nt50358 20:17:32 > LCM_HEIGHT = 1920 20:17:32 > LCM_WIDTH = 1080 20:17:32 > CUSTOM_KERNEL_TOUCHPANEL = GT9XX_hotknot 20:17:32 > CUSTOM_HAL_MAIN_IMGSENSOR = ov13850sunny_mipi_raw 20:17:32 > CUSTOM_HAL_SUB_IMGSENSOR = ov5670_mipi_raw 20:17:32 > CUSTOM_MODEM = mt6752k52_md1_lttg_dsds_prod mt6752k52_md1_lwg_dsds_prod 20:17:32 > MTK_PRODUCT_LOCALES = en_US zh_CN zh_TW es_ES pt_BR ru_RU fr_FR de_DE tr_TR vi_VN ms_MY in_ID th_TH it_IT ar_EG hi_IN bn_IN ur_P Wbr' AniAXN |
The Following 2 Users Say Thank You to AniAxn For This Useful Post: |
01-03-2016, 07:18 | #7 (permalink) |
Product Supporter Join Date: Jun 2009 Location: eMMC & UFS
Posts: 4,600
Member: 1045758 Status: Offline Sonork: 100.1613661(Offline) Thanks Meter: 4,307 | Micromax A106 MT6582 eMMC Read info Extend By Merapi Tool 1.4.0 Micromax A106 MT6582 eMMC Read info Extend By Merapi Tool 1.4.0 Beta Code: >>Analysis of USB port,Please insert phone USB cable. 14:56:46 > Connecting... 14:56:46 > CPU TYPE:MT6582 14:56:46 > Hardware version:CA01 14:56:46 > Software version:0001 14:56:46 > SecCfgVal :0x00000000 14:56:46 > BromVersion :0xFF 14:56:46 > BLVersion :0x01 >>Boot downloading complete! 14:56:51 > EMMC_ID:0x1101003030344739305124D14D4B21CD 14:56:51 > EMMC_PRODUCT_NAME: SAMSUNG :0x303034473930 14:56:51 > EMMC_BOOT1_SIZE: 0x00200000 14:56:51 > EMMC_BOOT2_SIZE: 0x00200000 14:56:51 > EMMC_PRMB_SIZE: 0x00080000 14:56:51 > EMMC_GP1_SIZE: 0x00000000 14:56:51 > EMMC_GP2_SIZE: 0x00000000 14:56:51 > EMMC_GP3_SIZE: 0x00000000 14:56:51 > EMMC_GP4_SIZE: 0x00000000 14:56:51 > EMMC_USER_SIZE: 0x0EC000000(3.69 G) 14:56:51 > 14:56:57 > 14:56:57 > 14:56:57 > Analysis of system files... 14:56:58 > PRELOADER:>>addr:0x000000 --length:0xC00000 14:56:58 > MBR:>>addr:0xC00000 --length:0x080000 14:56:58 > EBR1:>>addr:0xC80000 --length:0x080000 14:56:58 > PRO_INFO:>>addr:0xD00000 --length:0x300000 14:56:58 > NVRAM:>>addr:0x1000000 --length:0x500000 14:56:58 > PROTECT_F:>>addr:0x1500000 --length:0xA00000 14:56:58 > PROTECT_S:>>addr:0x1F00000 --length:0xA00000 14:56:58 > SECCFG:>>addr:0x2900000 --length:0x020000 14:56:58 > UBOOT:>>addr:0x2920000 --length:0x060000 14:56:58 > BOOTIMG:>>addr:0x2980000 --length:0x1000000 14:56:58 > RECOVERY:>>addr:0x3980000 --length:0x1000000 14:56:58 > SEC_RO:>>addr:0x4980000 --length:0x600000 14:56:58 > MISC:>>addr:0x4F80000 --length:0x080000 14:56:58 > LOGO:>>addr:0x5000000 --length:0x300000 14:56:58 > EBR2:>>addr:0x5300000 --length:0x080000 14:56:58 > EXPDB:>>addr:0x5380000 --length:0xA00000 14:56:58 > ANDROID:>>addr:0x5D80000 --length:0x38400000 14:56:58 > CACHE:>>addr:0x3E180000 --length:0x7E00000 14:56:58 > USRDATA:>>addr:0x45F80000 --length:0x39C00000 14:56:58 > FAT:>>addr:0x7FB80000 --length:0x6B400000 14:56:58 > BMTPOOL:>>addr:0xFFFF00A8 --length:0x000000 14:56:58 > 14:56:58 > 14:56:58 > >>Format addr:0x45F80000 --Format length:0x39C00000 14:56:58 > Read phone information success. 14:57:02 > ro.product.brand=Micromax 14:57:02 > ro.product.model=Micromax A106 14:57:02 > ro.build.version.release=5.0 14:57:02 > ro.mediatek.platform=MT6582 14:57:02 > ro.custom.build.version=MMX_A106_SW_V10_HW_V1.1_24042015 14:57:04 > CUSTOM_KERNEL_LCM = hx8369b_wvga_dsi_vdo_tinno hx8369b_wvga_dsi_vdo_tinno_txd hx8369b_wvga_dsi_vdo_tinno_boe 14:57:04 > LCM_HEIGHT = 800 14:57:04 > LCM_WIDTH = 480 14:57:04 > CUSTOM_KERNEL_TOUCHPANEL = ektf2k Goodix9xx 14:57:04 > CUSTOM_HAL_MAIN_IMGSENSOR = ov5648_mipi_raw_darling ov5648_mipi_raw_truly ov5648_mipi_raw_sunwin ov5648_mipi_raw_darling_zl 14:57:04 > CUSTOM_HAL_SUB_IMGSENSOR = hi258_mipi_yuv_cmk 14:57:04 > CUSTOM_MODEM = mt6582_hspa_gemini_gms4_b1b8 14:57:04 > MTK_PRODUCT_LOCALES = en_US en_IN hi_IN mr_IN bn_IN kn_IN te_IN ta_IN ml_IN de_DE fr_FR es_ES in_ID it_IT ms_MY pt_BR vi_VN tr_T Wbr' AniAXN |
01-03-2016, 07:20 | #8 (permalink) |
No Life Poster Join Date: Nov 2010
Posts: 7,669
Member: 1445819 Status: Offline Thanks Meter: 4,976 | E-tel N4 Mt6582 Dead Phone Alive With BIN File Writing By Merapi Beta E-tel N4 Mt6582 Dead Phone Alive With BIN File Writing By Merapi Beta Read Info { Extend } Code: 14:44:41 CPU TYPE:MT6582 14:44:41 Hardware version:CA01 14:44:41 Software version:0001 14:44:41 SecCfgVal :0x00000000 14:44:41 BromVersion :0xFF 14:44:41 BLVersion :0x01 14:44:43 Boot downloading... 14:44:45 EMMC_ID:0x70010056313030303806977306333785 14:44:45 EMMC_PRODUCT_NAME: SAMSUNG :0x563130303038 14:44:45 EMMC_BOOT1_SIZE: 0x00400000 14:44:45 EMMC_BOOT2_SIZE: 0x00400000 14:44:45 EMMC_PRMB_SIZE: 0x00400000 14:44:45 EMMC_GP1_SIZE: 0x00000000 14:44:45 EMMC_GP2_SIZE: 0x00000000 14:44:45 EMMC_GP3_SIZE: 0x00000000 14:44:45 EMMC_GP4_SIZE: 0x00000000 14:44:45 EMMC_USER_SIZE: 0x1C3000000(7.05 G) 14:44:45 14:44:51 14:44:51 14:44:51 Analysis of system files... 14:44:51 PRELOADER:>>addr:0x000000 --length:0xC00000 14:44:51 MBR:>>addr:0xC00000 --length:0x080000 14:44:51 EBR1:>>addr:0xC80000 --length:0x080000 14:44:51 PRO_INFO:>>addr:0xD00000 --length:0x300000 14:44:51 NVRAM:>>addr:0x1000000 --length:0x500000 14:44:51 PROTECT_F:>>addr:0x1500000 --length:0xA00000 14:44:51 PROTECT_S:>>addr:0x1F00000 --length:0xA00000 14:44:51 SECCFG:>>addr:0x2900000 --length:0x020000 14:44:51 UBOOT:>>addr:0x2920000 --length:0x060000 14:44:51 BOOTIMG:>>addr:0x2980000 --length:0x1000000 14:44:51 RECOVERY:>>addr:0x3980000 --length:0x1000000 14:44:51 SEC_RO:>>addr:0x4980000 --length:0x600000 14:44:51 MISC:>>addr:0x4F80000 --length:0x080000 14:44:51 LOGO:>>addr:0x5000000 --length:0x300000 14:44:51 EBR2:>>addr:0x5300000 --length:0x080000 14:44:51 TEST:>>addr:0x5380000 --length:0xA00000 14:44:51 EXPDB:>>addr:0x5D80000 --length:0xA00000 14:44:51 ANDROID:>>addr:0x6780000 --length:0x51400000 14:44:51 CACHE:>>addr:0x57B80000 --length:0x7E00000 14:44:51 USRDATA:>>addr:0x5F980000 --length:0x62D80000 14:44:51 BMTPOOL:>>addr:0xFFFF00A8 --length:0x1500000 14:44:51 14:44:51 14:44:51 >>Format addr:0x5F980000 --Format length:0x62D80000 14:44:51 Read phone information success. 14:44:56 ro.product.brand=E-tel 14:44:56 ro.product.model=N4 14:44:56 ro.build.version.release=4.4.2 14:44:56 ro.mediatek.platform=MT6582 14:44:56 ro.custom.build.version=E_TEL_N4_L102 Read Flash { From Working Phone } Write Flash Format Br Real ASH Team GPG |
01-03-2016, 07:35 | #10 (permalink) |
No Life Poster Join Date: Nov 2010
Posts: 7,669
Member: 1445819 Status: Offline Thanks Meter: 4,976 | Agtel A80 MT6572 EMMC Read Info { Build Info } & Read Pattern Done With Merapi Beta Agtel A80 MT6572 EMMC Read Info { Build Info } & Read Pattern Done With Merapi Beta Read Info { Extend } Read Pattern Lock { Read Info } Br Real ASH Team GPG |
The Following User Says Thank You to zoneofash For This Useful Post: |
01-03-2016, 07:43 | #11 (permalink) |
Product Manager Join Date: Jul 2009 Location: GsmGenesis
Posts: 5,427
Member: 1084080 Status: Offline Thanks Meter: 8,141 | Spice Coolpad Mi 515 MTK 6583 Hard Viruses Removed by Volcano Merapi Tool Spice Coolpad Mi 515 MTK 6583 Hard Viruses Removed And Format Done by Volcano Merapi Tool Read Info Remove Viruses Format Done Regards MUKESH RAJ Last edited by zoneofash; 01-03-2016 at 08:57. |
The Following User Says Thank You to MUKESH RAJ For This Useful Post: |
01-03-2016, 07:46 | #12 (permalink) |
Product Supporter Join Date: Jun 2009 Location: eMMC & UFS
Posts: 4,600
Member: 1045758 Status: Offline Sonork: 100.1613661(Offline) Thanks Meter: 4,307 | Micromax A200 MT6582 eMMC Read info Extend & Virus Remove Done by Merapi Tool 1.4.0 B Micromax A200 MT6582 eMMC Read info Extend & Virus Remove Done by Merapi Tool 1.4.0 Beta Wbr' AniAXN |
01-03-2016, 07:47 | #13 (permalink) |
No Life Poster Join Date: May 2013 Location: TkinterPy,Hex Cal,Ext2,Ext4,
Posts: 4,540
Member: 1937038 Status: Offline Sonork: QQ 2045657399 Thanks Meter: 4,492 | ZTE BLADE L2 EXTEND INFO AND FULL FFW READ IN BOOT MODE DONE. EXTEND INFO . READING FULL FFW IN BOOT MODE.NOW VERY FAST AND IMPROVED. BR. FeeFi GPG Team |
The Following User Says Thank You to ij_cell For This Useful Post: |
01-03-2016, 08:11 | #14 (permalink) |
No Life Poster Join Date: May 2013 Location: TkinterPy,Hex Cal,Ext2,Ext4,
Posts: 4,540
Member: 1937038 Status: Offline Sonork: QQ 2045657399 Thanks Meter: 4,492 | NETSURFER MT6582 EXTEND INFORMATION READ DONE. EXTEND information. BR. FeeFi GPG Team |
The Following User Says Thank You to ij_cell For This Useful Post: |
01-03-2016, 08:11 | #15 (permalink) |
No Life Poster Join Date: May 2013 Location: Far From Home..:(
Posts: 2,001
Member: 1948608 Status: Offline Thanks Meter: 1,743 | Still pending...............!!!!!!!!! When Merapi Become Multiple Tool in reality ? Unknown Baseband (?) Preloader Init(?) dl Fix (?) SPD 7730\31 (?) RDA-Quelcomm-Allwiner (?) And Also When we expect Motorola-LG FRP.....? |
The Following 4 Users Say Thank You to -Mosin- For This Useful Post: |
Bookmarks |
Thread Tools | |
Display Modes | |
| |
|