GSM-Forum

GSM-Forum (https://forum.gsmhosting.com/vbb/)
-   Volcano Box (https://forum.gsmhosting.com/vbb/f723/)
-   -   MerapiTool 1.4.7 Beta Start Huawei Qualcomm Frp World First|Imei Repair Engine Update (https://forum.gsmhosting.com/vbb/f723/merapitool-1-4-7-beta-start-huawei-qualcomm-frp-world-first-imei-repair-engine-update-2063230/)

ij_cell 03-09-2016 18:08

MerapiTool 1.4.7 Beta Start Huawei Qualcomm Frp World First|Imei Repair Engine Update
 
WORLD FIRST HUAWEI Y560-L01 QUALCOMM FRP REMOVED DONE BY ONE CLICK WITHOUT ROOT OR WITHOUT ADB MODE BY REVOLUTIONARY MERAPI TOOL


NOTE| Most of Qualcomm MSM8909 based devices Are supported in fastboot mode so as much as you can test any brand or any model:):)

EXCLUSIVE PROCEDURE:D

http://oi66.tinypic.com/kafv35.jpg



FRP ACTIVATED DEVICE

http://i67.tinypic.com/2cp22yt.png



FRP REMOVE ONE CLICK IN FASTBOOT MODE

http://i67.tinypic.com/2ezif5y.png


http://i67.tinypic.com/o5w4fr.png


AFTER REMOVE FRP DEVICE :D:D

http://i65.tinypic.com/10sf2hc.png


http://i65.tinypic.com/t729ax.png



Disclaimer : This Produce Only Work on Boot loader Unlocked Phones Only , Will Add Boot loader Unlocker to Merapi ASAP


Any Merapi User Have Qualcomm Based Phones With FRP Lock Contact us For Beta Test







BR.
FeeFi

GPG Team


zoneofash 03-10-2016 05:09

Quote:

Originally Posted by muzammilrashdi (Post 11682760)
hello br
any news for spd 7730/31 in next update?????

When SPD Update Ready Will Release ASAP ,

im3022 03-10-2016 07:00

Samsung S7582 MT6575 Read Info Extend and Factory File Done By Volcano Box
 
Samsung S7582 MT6575 Read Info Extend and Factory File Done By Volcano Box



Code:

>>Analysis of USB port,Please insert phone USB cable.
 10:47:24 > Connecting...
 10:47:24 > CPU TYPE:MT6575
 10:47:24 > Hardware version:CB00
 10:47:24 > Software version:E201
 10:47:27 > SecCfgVal :0x00000000
 10:47:27 > BromVersion :0xFF
 10:47:27 > BLVersion :0x01
>>Boot downloading complete!
 10:47:39 > EMMC_ID:0x90014A48344731640486014D096C60F5
 10:47:39 > EMMC_PRODUCT_NAME: SAMSUNG :0x483447316404
 10:47:39 > EMMC_BOOT1_SIZE: 0x00200000
 10:47:39 > EMMC_BOOT2_SIZE: 0x00200000
 10:47:39 > EMMC_PRMB_SIZE: 0x00200000
 10:47:39 > EMMC_GP1_SIZE: 0x00000000
 10:47:39 > EMMC_GP2_SIZE: 0x00000000
 10:47:39 > EMMC_GP3_SIZE: 0x00000000
 10:47:39 > EMMC_GP4_SIZE: 0x00000000
 10:47:39 > EMMC_USER_SIZE: 0x0E7000000(3.61 G)
 10:47:39 > 
 10:47:45 > 
 10:47:45 > 
 10:47:45 > Analysis of system files...
 10:47:45 > PRELOADER:>>addr:0x000000 --length:0x040000
 10:47:45 > DSP_BL:>>addr:0x040000 --length:0x5C0000
 10:47:45 > MBR:>>addr:0x600000 --length:0x004000
 10:47:45 > EBR1:>>addr:0x604000 --length:0x05C000
 10:47:45 > __NODL_PMT:>>addr:0x660000 --length:0x400000
 10:47:45 > __NODL_NVRAM:>>addr:0xA60000 --length:0x300000
 10:47:45 > __NODL_SECCFG:>>addr:0xD60000 --length:0x020000
 10:47:45 > UBOOT:>>addr:0xD80000 --length:0x060000
 10:47:45 > BOOTIMG:>>addr:0xDE0000 --length:0x600000
 10:47:45 > RECOVERY:>>addr:0x13E0000 --length:0x600000
 10:47:45 > SEC_RO:>>addr:0x19E0000 --length:0x600000
 10:47:45 > __NODL_MISC:>>addr:0x1FE0000 --length:0x060000
 10:47:45 > LOGO:>>addr:0x2040000 --length:0x300000
 10:47:45 > __NODL_EXPDB:>>addr:0x2340000 --length:0x0A0000
 10:47:45 > EBR2:>>addr:0x23E0000 --length:0x004000
 10:47:45 > ANDROID:>>addr:0x23E4000 --length:0x20000000
 10:47:45 > CACHE:>>addr:0x223E4000 --length:0x20000000
 10:47:45 > USRDATA:>>addr:0x423E4000 --length:0x40000000
 10:47:45 > __NODL_FAT:>>addr:0x823E4000 --length:0x6481C000
 10:47:45 > __NODL_BMTPOOL:>>addr:0xFFFF0050 --length:0x000000
 10:47:45 > 
 10:47:45 > 
 10:47:45 > >>Format addr:0x423E4000 --Format length:0x40000000
 10:47:45 > Read phone information success.
 10:47:51 > model=GT-S7582
 10:47:51 > Android version=4.2.2
 10:47:51 > MTK platform=MT6575
 10:47:51 > Custom build version=1419925871

http://dc586.4shared.com/download/Ek...696a&lgfp=3000

Factory File Done



Code:

>>Analysis of USB port,Please insert phone USB cable.
 10:49:52 > Connecting...
 10:49:52 > CPU TYPE:MT6575
 10:49:52 > Hardware version:CB00
 10:49:52 > Software version:E201
 10:49:55 > SecCfgVal :0x00000000
 10:49:55 > BromVersion :0xFF
 10:49:55 > BLVersion :0x01
>>Boot downloading complete!
 10:50:07 > EMMC_ID:0x90014A48344731640486014D096C60F5
 10:50:07 > EMMC_PRODUCT_NAME: SAMSUNG :0x483447316404
 10:50:07 > EMMC_BOOT1_SIZE: 0x00200000
 10:50:07 > EMMC_BOOT2_SIZE: 0x00200000
 10:50:07 > EMMC_PRMB_SIZE: 0x00200000
 10:50:07 > EMMC_GP1_SIZE: 0x00000000
 10:50:07 > EMMC_GP2_SIZE: 0x00000000
 10:50:07 > EMMC_GP3_SIZE: 0x00000000
 10:50:07 > EMMC_GP4_SIZE: 0x00000000
 10:50:07 > EMMC_USER_SIZE: 0x0E7000000(3.61 G)
 10:50:07 > 
  >preloader.bin read success.
  >DSP_BL read success.
  >MBR read success.
  >EBR1 read success.
  >uboot.bin read success.
  >boot.img read success.
  >recovery.img read success.
  >secro.img read success.
  >logo.bin read success.
  >EBR2 read success.
  >system.img read success.
  >Pass cache.img
  >Pass userdata.img
>>Reading completed.
 10:51:56 > File save path:C:\Users\FactoryFilePak\MerapiTool\backup\MT6575-2016-03-10 13_50_15\

http://dc586.4shared.com/download/U3...a&lgfp=3000%20

Br
IM3022

im3022 03-10-2016 11:23

Samsung I8552 MT6572 invalid imei Write Done By Volcano Box
 
Samsung I8552 MT6572 invalid imei Write Done By Volcano Box



COM port searching and preloader handshake.
Connect port COM67.

COM port searching and preloader handshake.
Connect successfully.
CPU TYPE:MT6572, E00
DSP Firmware Version:2000.00.00
DSP Patch Version:1.0
Software Version:MOLY.WR8.W1315.MD.WG.MP.V1
Hardware Version:BIRD72_WET_B_JB3_HSPA_HW
Audio Version:Unknown
IMEI1:invalid.
IMEI2:invalid.
>>IMEI success.
http://dc611.4shared.com/download/Kz...a96a&lgfp=3000

Br
IM3022

ij_cell 03-10-2016 11:36

TELEFUNKEN TEL73G1 MT6573 4GB EMMC CLEAR ALL VIRUS AND FORMATE DONE BY AMAZING MERAPI TOOL




EXTENDED INFO

http://i65.tinypic.com/17pc86.png


VIRUS CLEAR

http://i66.tinypic.com/1es0h5.png


FORMAT

http://i68.tinypic.com/22jb6b.png





BR.
FeeFi

GPG Team

ij_cell 03-10-2016 12:09

CETRUS BOLD MT6572 4GB EMMC FULL FLASH WRITE DONE


WRITE FLASH

http://i66.tinypic.com/24nk6ch.png






BR.
FeeFi

GPG Team

rizwankhan8670 03-10-2016 12:54

Q,Mobile i9 Hang ON Logo Done Only Format
http://i68.tinypic.com/e6dgr8.png
http://i68.tinypic.com/34xqgj8.png

rizwankhan8670 03-10-2016 13:36

HUAWEI Y511-U30 Read FFW With Merapi Tool And Write With Sp Tool Without Any Tens

http://i67.tinypic.com/25it91i.png
http://i65.tinypic.com/2hsbrlw.png
http://i67.tinypic.com/153ust2.png

ij_cell 03-10-2016 13:51

ALCATEL 4016X MT6572 4GB EMMC ROOT AND LETHAL XXXXXX APPS REMOVED IN ADB MODE VERY FAST VERY RELIABLE BY AMAZING MERAPI TOOL




ROOT

http://i64.tinypic.com/10or334.png


CLEAN VIRUS IN ADB MODE


http://i63.tinypic.com/24o1rao.png




BR.
FeeFi

GPG Team


babudatabase 03-10-2016 16:18

Karbonn st72 mt6582 imei write done with out cdc driver always rocking tool merapi :)
 
KARBONN ST72 MT6582 IMEI WRITE DONE WITH OUT CDC DRIVERS ALWAYS ROCKING TOOL MERAPI :)


http://i.imgur.com/z3u099c.jpg

Read Info Extend
http://i.imgur.com/aHFFRuj.png

Code:

>>Analysis of USB port,Please insert phone USB cable.
 17.29.18 > Connecting...
 17.29.18 > CPU TYPE:MT6582
 17.29.18 > Hardware version:CA01
 17.29.18 > Software version:0001
 17.29.18 > SecCfgVal :0x00000000
 17.29.18 > BromVersion :0xFF
 17.29.18 > BLVersion :0x01
>>Boot downloading complete!
 17.29.23 > EMMC_ID:0x8801034E4361726420236F737559B1E1
 17.29.23 > EMMC_PRODUCT_NAME: SAMSUNG :0x4E4361726420
 17.29.23 > EMMC_BOOT1_SIZE: 0x00200000
 17.29.23 > EMMC_BOOT2_SIZE: 0x00200000
 17.29.23 > EMMC_PRMB_SIZE: 0x00020000
 17.29.23 > EMMC_GP1_SIZE: 0x00000000
 17.29.23 > EMMC_GP2_SIZE: 0x00000000
 17.29.23 > EMMC_GP3_SIZE: 0x00000000
 17.29.23 > EMMC_GP4_SIZE: 0x00000000
 17.29.23 > EMMC_USER_SIZE: 0x0E7400000(3.61 G)
 17.29.23 > 
 17.29.29 > 
 17.29.29 > 
 17.29.29 > Analysis of system files...
 17.29.29 > PRELOADER:>>addr:0x000000 --length:0x1400000
 17.29.29 > MBR:>>addr:0x1400000 --length:0x080000
 17.29.29 > EBR1:>>addr:0x1480000 --length:0x080000
 17.29.29 > PRO_INFO:>>addr:0x1500000 --length:0x300000
 17.29.29 > NVRAM:>>addr:0x1800000 --length:0x500000
 17.29.29 > PROTECT_F:>>addr:0x1D00000 --length:0xA00000
 17.29.29 > PROTECT_S:>>addr:0x2700000 --length:0xA00000
 17.29.29 > SECCFG:>>addr:0x3100000 --length:0x020000
 17.29.29 > UBOOT:>>addr:0x3120000 --length:0x060000
 17.29.29 > BOOTIMG:>>addr:0x3180000 --length:0x600000
 17.29.29 > RECOVERY:>>addr:0x3780000 --length:0x600000
 17.29.29 > SEC_RO:>>addr:0x3D80000 --length:0x600000
 17.29.29 > MISC:>>addr:0x4380000 --length:0x080000
 17.29.29 > LOGO:>>addr:0x4400000 --length:0x300000
 17.29.29 > EBR2:>>addr:0x4700000 --length:0x080000
 17.29.29 > EXPDB:>>addr:0x4780000 --length:0xA00000
 17.29.29 > ANDROID:>>addr:0x5180000 --length:0x40000000
 17.29.29 > CACHE:>>addr:0x45180000 --length:0x7E00000
 17.29.29 > USRDATA:>>addr:0x4CF80000 --length:0x60000000
 17.29.29 > FAT:>>addr:0xACF80000 --length:0x393A0000
 17.29.29 > BMTPOOL:>>addr:0xFFFF00A8 --length:0x000000
 17.29.29 > 
 17.29.29 > 
 17.29.29 > >>Format addr:0x4CF80000 --Format length:0x60000000
 17.29.29 > Read phone information success.
 17.29.34 > brand=Karbonn
 17.29.34 > model=Karbonn ST72
 17.29.34 > Android version=4.4.2
 17.29.34 > MTK platform=MT6582
 17.29.34 > Custom build version=2.26_20141201
 17.29.36 > CUSTOM_KERNEL_LCM = nt35582_mcu_6575
 17.29.36 > LCM_HEIGHT = 1024
 17.29.36 > LCM_WIDTH = 600
 17.29.36 > CUSTOM_KERNEL_TOUCHPANEL = generic
 17.29.36 > CUSTOM_HAL_MAIN_IMGSENSOR = imx073_mipi_raw
 17.29.36 > CUSTOM_HAL_SUB_IMGSENSOR = hi704_yuv
 17.29.36 > CUSTOM_MODEM = elink82_mz_tb_kk_hspa_W1
 17.29.36 > MTK_PRODUCT_LOCALES = en_US es_ES zh_CN zh_TW ru_RU pt_BR fr_FR de_DE tr_TR it_IT in_ID ms_MY vi_VN ar_EG  th_TH  pt_PT  nl_NL


Imei Write Done


azhergoga007 03-10-2016 16:31

Qmobile A900 Virus Scan Done
 
Qmobile A900 Virus Scan Done With Great Volcano Box MErapi Tool PAck 1..
[IMG]**************************************/images?q=tbn:ANd9GcQClq9trvb1WWqb5sO8DTofFErvSzKGP 3sZ7yq_46HCBXRd51YaeQ[/IMG]
http://i64.tinypic.com/2m2jmg4.jpg
Info..
Code:

>
 15:45:37 >
 15:45:37 >
>>Analysis of USB port,Please insert phone USB cable.
 15:45:56 > Connecting...
 15:45:56 > CPU TYPE:MT6583/89
 15:45:56 > Hardware version:CA01
 15:45:56 > Software version:0001
 15:45:56 > SecCfgVal :0x00000000
 15:45:56 > BromVersion :0xFF
 15:45:56 > BLVersion :0x01
>>Boot downloading complete!
 15:46:05 > EMMC_ID:0xFE014E5030585858F358109010A28290
 15:46:05 > EMMC_PRODUCT_NAME: SAMSUNG :0x5030585858F3
 15:46:05 > EMMC_BOOT1_SIZE: 0x00100000
 15:46:05 > EMMC_BOOT2_SIZE: 0x00100000
 15:46:05 > EMMC_PRMB_SIZE: 0x00100000
 15:46:05 > EMMC_GP1_SIZE: 0x00000000
 15:46:05 > EMMC_GP2_SIZE: 0x00000000
 15:46:05 > EMMC_GP3_SIZE: 0x00000000
 15:46:05 > EMMC_GP4_SIZE: 0x00000000
 15:46:05 > EMMC_USER_SIZE: 0x0E9000000(3.64 G)
 15:46:05 > 
 15:46:12 > 
 15:46:12 > 
 15:46:12 > Analysis of system files...
 15:46:12 > PRELOADER:>>addr:0x000000 --length:0x600000
 15:46:12 > MBR:>>addr:0x600000 --length:0x080000
 15:46:12 > EBR1:>>addr:0x680000 --length:0x080000
 15:46:12 > __NODL_PMT:>>addr:0x700000 --length:0x400000
 15:46:12 > __NODL_PRO_INFO:>>addr:0xB00000 --length:0x300000
 15:46:12 > __NODL_NVRAM:>>addr:0xE00000 --length:0x500000
 15:46:12 > __NODL_PROTECT_F__NODL_PROTECT_S__NODL_SECCFG:>>addr:0x1300000 --length:0xA00000
 15:46:12 > __NODL_PROTECT_S__NODL_SECCFG:>>addr:0x1D00000 --length:0xA00000
 15:46:12 > __NODL_SECCFG:>>addr:0x2700000 --length:0x020000
 15:46:12 > UBOOT:>>addr:0x2720000 --length:0x060000
 15:46:12 > BOOTIMG:>>addr:0x2780000 --length:0x600000
 15:46:12 > RECOVERY:>>addr:0x2D80000 --length:0x600000
 15:46:12 > SEC_RO:>>addr:0x3380000 --length:0x600000
 15:46:12 > __NODL_MISC:>>addr:0x3980000 --length:0x080000
 15:46:12 > LOGO:>>addr:0x3A00000 --length:0x300000
 15:46:12 > EBR2:>>addr:0x3D00000 --length:0x080000
 15:46:12 > __NODL_EXPDB:>>addr:0x3D80000 --length:0xA00000
 15:46:12 > ANDROID:>>addr:0x4780000 --length:0x40000000
 15:46:12 > CACHE:>>addr:0x44780000 --length:0x7E00000
 15:46:12 > USRDATA:>>addr:0x4C580000 --length:0x40000000
 15:46:12 > FAT:>>addr:0x8C580000 --length:0x5B880000
 15:46:12 > __NODL_BMTPOOL:>>addr:0xFFFF00A8 --length:0x000000
 15:46:12 > 
 15:46:12 > 
 15:46:12 > >>Format addr:0x4C580000 --Format length:0x40000000
 15:46:12 > Read phone information success.
 15:46:17 > brand=QMobile
 15:46:17 > model=A900
 15:46:17 > Android version=4.2.1
 15:46:17 > MTK platform=MT6589
 15:46:17 > Custom build version=1386137382
 15:46:19 > CUSTOM_KERNEL_LCM = nt35582_mcu_6575
 15:46:19 > LCM_HEIGHT = 1280
 15:46:19 > LCM_WIDTH = 720
 15:46:19 > CUSTOM_KERNEL_TOUCHPANEL = generic
 15:46:19 > CUSTOM_HAL_MAIN_IMGSENSOR = imx073_mipi_raw
 15:46:19 > CUSTOM_HAL_SUB_IMGSENSOR = hi704_yuv
 15:46:19 > CUSTOM_MODEM = GBW192_gionee89_dwe_jb2_md1_hspa
 15:46:19 > MTK_PRODUCT_LOCALES = en_US ar_EG fa_IR ur_PK xhdpi hdpi ldpi mdpi

http://mars.workupload.com/image/m4JVjfro

Scan...
Code:

Analysis of USB port,Please insert phone USB cable.
  Connecting...
  CPU TYPE:MT6583/89
  Hardware version:CA01
  Software version:0001
  SecCfgVal :0x00000000
  BromVersion :0xFF
  BLVersion :0x01
  Boot downloading complete!
  EMMC_ID:0xFE014E5030585858F358109010A28290
  EMMC_PRODUCT_NAME: SAMSUNG :0x5030585858F3
  EMMC_BOOT1_SIZE: 0x00100000
  EMMC_BOOT2_SIZE: 0x00100000
  EMMC_PRMB_SIZE: 0x00100000
  EMMC_GP1_SIZE: 0x00000000
  EMMC_GP2_SIZE: 0x00000000
  EMMC_GP3_SIZE: 0x00000000
  EMMC_GP4_SIZE: 0x00000000
  EMMC_USER_SIZE: 0x0E9000000(3.64 G)
 
   
   
  Analysis of system files...
  PRELOADER:  addr:0x000000 --length:0x600000
  MBR:  addr:0x600000 --length:0x080000
  EBR1:  addr:0x680000 --length:0x080000
  __NODL_PMT:  addr:0x700000 --length:0x400000
  __NODL_PRO_INFO:  addr:0xB00000 --length:0x300000
  __NODL_NVRAM:  addr:0xE00000 --length:0x500000
  __NODL_PROTECT_F__NODL_PROTECT_S__NODL_SECCFG:  addr:0x1300000 --length:0xA00000
  __NODL_PROTECT_S__NODL_SECCFG:  addr:0x1D00000 --length:0xA00000
  __NODL_SECCFG:  addr:0x2700000 --length:0x020000
  UBOOT:  addr:0x2720000 --length:0x060000
  BOOTIMG:  addr:0x2780000 --length:0x600000
  RECOVERY:  addr:0x2D80000 --length:0x600000
  SEC_RO:  addr:0x3380000 --length:0x600000
  __NODL_MISC:  addr:0x3980000 --length:0x080000
  LOGO:  addr:0x3A00000 --length:0x300000
  EBR2:  addr:0x3D00000 --length:0x080000
  __NODL_EXPDB:  addr:0x3D80000 --length:0xA00000
  ANDROID:  addr:0x4780000 --length:0x40000000
  CACHE:  addr:0x44780000 --length:0x7E00000
  USRDATA:  addr:0x4C580000 --length:0x40000000
  FAT:  addr:0x8C580000 --length:0x5B880000
  __NODL_BMTPOOL:  addr:0xFFFF00A8 --length:0x000000
 
 
    Format addr:0x4C580000 --Format length:0x40000000
  Read phone information success.
  Check the data complete.
  Clear virus complete.
>>Before power on the phone, please do a format, clear the user data...

http://mars.workupload.com/image/S5hHFLm9
http://mars.workupload.com/image/LjfMQm1V

http://i68.tinypic.com/35l6t92.gif

IMEI WRITE ....
http://jupiter.workupload.com/image/Hl9HeIMn


Stay Tune!
More Developing!!
More coming!!!

Bro
AZHERGOGA007

rajpootkhoaf 03-10-2016 16:42

Qmobile X6 MT6571 Hang on Logo
 
Qmobile X6 MT6571 Hang At Noire Logo Solved By Just One Click With Great merapi Tool

Formet

http://i.imgur.com/OpjHD21.png

http://i.imgur.com/P1AuJUd.png

Feel The power Of Volcano

niaz muhammad 03-11-2016 06:29

3 Attachment(s)
S7582 read ff
http://forum.gsmhosting.com/vbb/atta...1&d=1457674068
remove virus
http://forum.gsmhosting.com/vbb/atta...1&d=1457674068
and format don
http://forum.gsmhosting.com/vbb/atta...1&d=1457674068

niaz muhammad 03-11-2016 06:45

1 Attachment(s)
I9060 6572 WRITE FF DON
http://forum.gsmhosting.com/vbb/atta...1&d=1457675130

babudatabase 03-11-2016 09:39

One plus x model - e1003 qualcom frp lock remove done the only one great merapi tool
 
ONE PLUS X MODEL - E1003 QUALCOM FRP LOCK REMOVE DONE THE ONLY ONE GREAT MERAPI TOOL ALWAYS DO ROCKING PERFORMANCE :D


http://i.imgur.com/7WEoOdU.jpg

Enable Usb Debugging Watch Video

(A) AFTER GO TO SETTINGS SELECT ABOUT

(B) CLICK 7 TIMES BUILD NUMBER GO BACK (POP UP SCREEN SHOW DEVELOPER MODE ON)

(C)OPEN DEVELOPER OPTIONS ENABLE USB DEBUGGING

(D) CONNECT PHONE OPEN MERAPI TOOL

(E) SELECT MULTI BRAND

(F) SELECT MOTOROLA

(G) CLICK REMOVE FRP

(H) MONEY IN YOUR POCKET :D


FRP REMOVE DONE



All times are GMT +1. The time now is 18:04.


vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2024 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2023 -

Page generated in 0.56221 seconds with 6 queries

SEO by vBSEO