|
Welcome to the GSM-Forum forums. You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. Only registered members may post questions, contact other members or search our database of over 8 million posts. Registration is fast, simple and absolutely free so please - Click to REGISTER! If you have any problems with the registration process or your account login, please contact contact us . |
|
Register | FAQ | Donate | Forum Rules | Root any Device | ★iPhone Unlock★ | ★ Direct Codes ★ | Direct Unlock Source |
| LinkBack | Thread Tools | Display Modes |
03-18-2016, 14:50 | #8986 (permalink) |
No Life Poster Join Date: May 2009 Location: mumbai wadala
Posts: 747
Member: 1037372 Status: Offline Thanks Meter: 557 | I ball leader 2.8h read write formate done Detection initiated... Vcc: null Gnd: 7 Analyzing D+ and D-... D+ = 4, D- = 3 Detection D+/D- with 0.84 seconds. Continue to detect BOOT pin... Found [SPD] USB device: SCI USB2Serial,(VID_1782&PID_4D00) BOOT(Pull Down) = 5 Setting... Find USB device:SPRD U2S Diag (COM70), (VID_1782&PID_4D00) Pinouts setting complete! Internal version: SPRD3 Boot downloaded. Start boot please wait a moment.... Spreadtrum Boot Block version 1.2 CPU TYPE:SC6531 [65310001] FLASH ID: 00EF004000160000 Flash Type: SF_W25Q32BV Size:0x400000(4MB) Reading completed. The data has been saved in E:\i ball\leader 2.8h\_20160318_190848_FullFlash.bin, size: 4 M. Detection initiated... Vcc: null Gnd: 7 Analyzing D+ and D-... D+ = 4, D- = 3 Detection D+/D- with 0.86 seconds. Continue to detect BOOT pin... Found [SPD] USB device: SCI USB2Serial,(VID_1782&PID_4D00) BOOT(Pull Down) = 5 Setting... Find USB device:SPRD U2S Diag (COM70), (VID_1782&PID_4D00) Pinouts setting complete! Internal version: SPRD3 Boot downloaded. Start boot please wait a moment.... Spreadtrum Boot Block version 1.2 CPU TYPE:SC6531 [65310001] FLASH ID: 00EF004000160000 Flash Type: SF_W25Q32BV Size:0x400000(4MB) Writing completed. Flash file E:\i ball\leader 2.8h\_20160318_190848_FullFlash.bin has been written. Detection initiated... Vcc: null Gnd: 7 Analyzing D+ and D-... D+ = 4, D- = 3 Detection D+/D- with 0.89 seconds. Continue to detect BOOT pin... Found [SPD] USB device: SCI USB2Serial,(VID_1782&PID_4D00) BOOT(Pull Down) = 5 Setting... Find USB device:SPRD U2S Diag (COM70), (VID_1782&PID_4D00) Pinouts setting complete! Internal version: SPRD3 Boot downloaded. Start boot please wait a moment.... Spreadtrum Boot Block version 1.2 CPU TYPE:SC6531 [65310001] FLASH ID: 00EF004000160000 Flash Type: SF_W25Q32BV Size:0x400000(4MB) >>Set to Factory successfully. FLASH FILE LINK https://www.4shared.com/archive/nZVR...FullFlash.html |
03-18-2016, 15:18 | #8987 (permalink) |
No Life Poster Join Date: Sep 2006 Location: Dhaka Bangladesh Age: 33
Posts: 3,491
Member: 348877 Status: Offline Sonork: 1601289 Thanks Meter: 1,178 | Analysis of USB port,Please insert phone USB cable. Connecting... CPU TYPE:MT6572 Hardware version:CA01 Software version:0000 SecCfgVal :0x00000000 BromVersion :0xFF BLVersion :0x01 Boot downloading complete! EMMC_ID:0x11010030303447393051CDA2C7DBB1AD EMMC_PRODUCT_NAME: SAMSUNG :0x303034473930 EMMC_BOOT1_SIZE: 0x00200000 EMMC_BOOT2_SIZE: 0x00200000 EMMC_PRMB_SIZE: 0x00080000 EMMC_GP1_SIZE: 0x00000000 EMMC_GP2_SIZE: 0x00000000 EMMC_GP3_SIZE: 0x00000000 EMMC_GP4_SIZE: 0x00000000 EMMC_USER_SIZE: 0x0EC000000(3.69 G) Analysis of system files... PRELOADER: addr:0x000000 --length:0x880000 MBR: addr:0x880000 --length:0x080000 EBR1: addr:0x900000 --length:0x080000 PRO_INFO: addr:0x980000 --length:0x300000 NVRAM: addr:0xC80000 --length:0x500000 PROTECT_F: addr:0x1180000 --length:0xA00000 PROTECT_S: addr:0x1B80000 --length:0xA00000 SECCFG: addr:0x2580000 --length:0x020000 UBOOT: addr:0x25A0000 --length:0x060000 BOOTIMG: addr:0x2600000 --length:0x600000 RECOVERY: addr:0x2C00000 --length:0x600000 SEC_RO: addr:0x3200000 --length:0x040000 MISC: addr:0x3240000 --length:0x080000 LOGO: addr:0x32C0000 --length:0x300000 EXPDB: addr:0x35C0000 --length:0xA00000 ANDROID: addr:0x3FC0000 --length:0x32000000 CACHE: addr:0x35FC0000 --length:0xE200000 USRDATA: addr:0x441C0000 --length:0x52C00000 FAT: addr:0x96DC0000 --length:0x541C0000 BMTPOOL: addr:0xFFFF00A8 --length:0x1500000 Format addr:0x441C0000 --Format length:0x52C00000 Read phone information success. >>Successfully reset anti-theft lock |
03-19-2016, 11:09 | #8989 (permalink) |
Freak Poster Join Date: Mar 2009 Location: venezula, maracaibo
Posts: 305
Member: 991599 Status: Offline Thanks Meter: 85 | susccesfully clean virus i9500 mt 6572 Read info extended 04:55:03 > CPU TYPE:MT6572 04:55:03 > Hardware version:CA01 04:55:03 > Software version:0000 04:55:04 > SecCfgVal :0x00000000 04:55:04 > BromVersion :0xFF 04:55:04 > BLVersion :0x01 >>Boot downloading complete! 04:55:08 > EMMC_ID:0x1501004E35575A4D420155FEC89BA0B7 04:55:08 > EMMC_PRODUCT_NAME: SAMSUNG :0x4E35575A4D42 04:55:08 > EMMC_BOOT1_SIZE: 0x00200000 04:55:08 > EMMC_BOOT2_SIZE: 0x00200000 04:55:08 > EMMC_PRMB_SIZE: 0x00080000 04:55:08 > EMMC_GP1_SIZE: 0x00000000 04:55:08 > EMMC_GP2_SIZE: 0x00000000 04:55:08 > EMMC_GP3_SIZE: 0x00000000 04:55:08 > EMMC_GP4_SIZE: 0x00000000 04:55:08 > EMMC_USER_SIZE: 0x0E9000000(3.64 G) 04:55:08 > 04:55:15 > 04:55:15 > 04:55:15 > Analysis of system files... 04:55:15 > PRELOADER:>>addr:0x000000 --length:0x600000 04:55:15 > MBR:>>addr:0x600000 --length:0x080000 04:55:15 > EBR1:>>addr:0x680000 --length:0x080000 04:55:15 > PRO_INFO:>>addr:0x700000 --length:0x300000 04:55:15 > NVRAM:>>addr:0xA00000 --length:0x500000 04:55:15 > PROTECT_F:>>addr:0xF00000 --length:0xA00000 04:55:15 > PROTECT_S:>>addr:0x1900000 --length:0xA00000 04:55:15 > SECCFG:>>addr:0x2300000 --length:0x020000 04:55:15 > UBOOT:>>addr:0x2320000 --length:0x060000 04:55:15 > BOOTIMG:>>addr:0x2380000 --length:0x600000 04:55:15 > RECOVERY:>>addr:0x2980000 --length:0x600000 04:55:15 > SEC_RO:>>addr:0x2F80000 --length:0x040000 04:55:15 > MISC:>>addr:0x2FC0000 --length:0x080000 04:55:15 > LOGO:>>addr:0x3040000 --length:0x300000 04:55:15 > EXPDB:>>addr:0x3340000 --length:0xA00000 04:55:15 > ANDROID:>>addr:0x3D40000 --length:0x2B200000 04:55:15 > CACHE:>>addr:0x2EF40000 --length:0x17800000 04:55:15 > USRDATA:>>addr:0x46740000 --length:0x52C00000 04:55:15 > FAT:>>addr:0x99340000 --length:0x4EC40000 04:55:15 > BMTPOOL:>>addr:0xFFFF00A8 --length:0x000000 04:55:15 > 04:55:15 > 04:55:15 > >>Format addr:0x46740000 --Format length:0x52C00000 04:55:15 > Read phone information success. 04:55:20 > brand=samsung 04:55:20 > model=Samsung Galaxy S IV(I950X) 04:55:20 > Android version=4.2.2 04:55:20 > MTK platform=MT6572 04:55:20 > Custom build version=I9500.V106En20140108 04:55:22 > CUSTOM_KERNEL_LCM = nt35582_mcu_6575 04:55:22 > LCM_HEIGHT = 854 04:55:22 > LCM_WIDTH = 480 04:55:22 > CUSTOM_KERNEL_TOUCHPANEL = generic 04:55:22 > CUSTOM_HAL_MAIN_IMGSENSOR = imx073_mipi_raw 04:55:22 > CUSTOM_HAL_SUB_IMGSENSOR = hi704_yuv 04:55:22 > CUSTOM_MODEM = lcsh72_we_jb3_hspa_gps_co_clock 04:55:22 > MTK_PRODUCT_LOCALES = en_US zh_CN zh_TW es_ES hi_IN bn_BD fa_IR ru_RU pt_BR fr_FR de_DE tr_TR it_IT in_ID ms_MY vi_VN ar_EG th_ clean virus Analysis of USB port,Please insert phone USB cable. Connecting... CPU TYPE:MT6572 Hardware version:CA01 Software version:0000 SecCfgVal :0x00000000 BromVersion :0xFF BLVersion :0x01 Boot downloading complete! EMMC_ID:0x1501004E35575A4D420155FEC89BA0B7 EMMC_PRODUCT_NAME: SAMSUNG :0x4E35575A4D42 EMMC_BOOT1_SIZE: 0x00200000 EMMC_BOOT2_SIZE: 0x00200000 EMMC_PRMB_SIZE: 0x00080000 EMMC_GP1_SIZE: 0x00000000 EMMC_GP2_SIZE: 0x00000000 EMMC_GP3_SIZE: 0x00000000 EMMC_GP4_SIZE: 0x00000000 EMMC_USER_SIZE: 0x0E9000000(3.64 G) Analysis of system files... PRELOADER: addr:0x000000 --length:0x600000 MBR: addr:0x600000 --length:0x080000 EBR1: addr:0x680000 --length:0x080000 PRO_INFO: addr:0x700000 --length:0x300000 NVRAM: addr:0xA00000 --length:0x500000 PROTECT_F: addr:0xF00000 --length:0xA00000 PROTECT_S: addr:0x1900000 --length:0xA00000 SECCFG: addr:0x2300000 --length:0x020000 UBOOT: addr:0x2320000 --length:0x060000 BOOTIMG: addr:0x2380000 --length:0x600000 RECOVERY: addr:0x2980000 --length:0x600000 SEC_RO: addr:0x2F80000 --length:0x040000 MISC: addr:0x2FC0000 --length:0x080000 LOGO: addr:0x3040000 --length:0x300000 EXPDB: addr:0x3340000 --length:0xA00000 ANDROID: addr:0x3D40000 --length:0x2B200000 CACHE: addr:0x2EF40000 --length:0x17800000 USRDATA: addr:0x46740000 --length:0x52C00000 FAT: addr:0x99340000 --length:0x4EC40000 BMTPOOL: addr:0xFFFF00A8 --length:0x000000 Format addr:0x46740000 --Format length:0x52C00000 Read phone information success. Check the data complete. Clear virus complete. >>Before power on the phone, please do a format, clear the user data... thanks volcano merapi team |
03-19-2016, 13:00 | #8991 (permalink) | |
Freak Poster Join Date: May 2011 Location: B A N G L A D E S H Age: 40
Posts: 397
Member: 1578627 Status: Offline Sonork: 100.1623412 Thanks Meter: 501 | Lenovo A316i Write IMEI successfully_Volcano MerapiTool Lenovo A316i Write IMEI successfully Volcano MerapiTool Quote:
Bro Shohag_bd | |
The Following User Says Thank You to Shohag_bd For This Useful Post: |
03-21-2016, 08:35 | #8993 (permalink) | |
Insane Poster Join Date: Apr 2014
Posts: 76
Member: 2171504 Status: Offline Thanks Meter: 51 | Samsung Clone J100H MT6572 Nand Read FF Samusng Clone J100H MT6572 Nand Read FF With Userdata And Cache File Just One Click Logs Quote:
| |
The Following 2 Users Say Thank You to rajpootkhoaf For This Useful Post: |
03-22-2016, 05:58 | #8994 (permalink) |
No Life Poster Join Date: Nov 2010
Posts: 7,669
Member: 1445819 Status: Offline Thanks Meter: 4,976 | Micromax A37B Read Pattern Lock Done With Merapi , Just One Click Micromax A37B Read Pattern Lock Done With Merapi , Just One Click |
The Following 2 Users Say Thank You to zoneofash For This Useful Post: |
03-22-2016, 07:19 | #8995 (permalink) |
No Life Poster Join Date: Dec 2009 Location: INDIA Age: 36
Posts: 3,135
Member: 1195083 Status: Offline Sonork: QQ:3208821449 Thanks Meter: 1,348 | Lava X8 clean virus done [IMG][/IMG] Analysis of USB port,Please insert phone USB cable. Connecting... CPU TYPE:MT6592 Hardware version:CA00 Software version:0000 SecCfgVal :0x00000000 BromVersion :0xFF BLVersion :0x01 Boot downloading complete! EMMC_ID:0x150100523832314D42006F6BECBF1237 EMMC_PRODUCT_NAME: SAMSUNG :0x523832314D42 EMMC_BOOT1_SIZE: 0x00400000 EMMC_BOOT2_SIZE: 0x00400000 EMMC_PRMB_SIZE: 0x00400000 EMMC_GP1_SIZE: 0x00000000 EMMC_GP2_SIZE: 0x00000000 EMMC_GP3_SIZE: 0x00000000 EMMC_GP4_SIZE: 0x00000000 EMMC_USER_SIZE: 0x3A3E00000(14.56 G) Analysis of system files... PRELOADER: addr:0x000000 --length:0x040000 MBR: addr:0x000000 --length:0x080000 EBR1: addr:0x080000 --length:0x080000 PRO_INFO: addr:0x100000 --length:0x300000 NVRAM: addr:0x400000 --length:0x500000 PROTECT_F: addr:0x900000 --length:0xA00000 PROTECT_S: addr:0x1300000 --length:0xA00000 SECCFG: addr:0x1D00000 --length:0x040000 UBOOT: addr:0x1D40000 --length:0x060000 BOOTIMG: addr:0x1DA0000 --length:0xA00000 RECOVERY: addr:0x27A0000 --length:0xA00000 SEC_RO: addr:0x31A0000 --length:0x600000 MISC: addr:0x37A0000 --length:0x080000 LOGO: addr:0x3820000 --length:0x800000 EXPDB: addr:0x4020000 --length:0xFE0000 ANDROID: addr:0x5000000 --length:0x46800000 CACHE: addr:0x4B800000 --length:0x8000000 USRDATA: addr:0x53800000 --length:0x4F100000 BMTPOOL: addr:0xFFFF00A8 --length:0x1500000 Format addr:0x53800000 --Format length:0x4F100000 Read phone information success. Check the data complete. Clear virus complete. >>Before power on the phone, please do a format, clear the user data... |
03-22-2016, 11:12 | #8996 (permalink) |
Insane Poster Join Date: Apr 2014 Location: Pakistan
Posts: 68
Member: 2163020 Status: Offline Sonork: 100.1671413 Thanks Meter: 10 | G Right Inspire A380mini G Right Inspire A380mini read flash done by merapi. Code: 14:57:43 > Merapi Updated: 2016-03-09 14:57:43 > Connecting... 14:57:48 > Connection successful,connected state! 14:57:48 > Version: V3.8 14:57:48 > SN: 414-325-778 14:57:56 > Connecting to server... 14:57:59 > Connecting to server...OK! 14:57:59 > Getting function information from server... 14:58:00 > Getting function information from server...OK! 14:58:36 > Access to functional permissions from server... 14:58:38 > Access to functional permissions from server...OK! 14:58:38 > 14:58:38 > 14:58:38 > >>Analysis of USB port,Please insert phone USB cable. 14:58:44 > Connecting... 14:58:44 > CPU TYPE:MT6572 14:58:44 > Hardware version:CA01 14:58:44 > Software version:0000 14:58:44 > SecCfgVal :0x00000000 14:58:44 > BromVersion :0xFF 14:58:44 > BLVersion :0x01 >>Boot downloading complete! 14:58:50 > EMMC_ID:0x7001004D4D43303447580B8B1BF41153 14:58:50 > EMMC_PRODUCT_NAME: SAMSUNG :0x4D4D43303447 14:58:50 > EMMC_BOOT1_SIZE: 0x00200000 14:58:50 > EMMC_BOOT2_SIZE: 0x00200000 14:58:50 > EMMC_PRMB_SIZE: 0x00020000 14:58:50 > EMMC_GP1_SIZE: 0x00000000 14:58:50 > EMMC_GP2_SIZE: 0x00000000 14:58:50 > EMMC_GP3_SIZE: 0x00000000 14:58:50 > EMMC_GP4_SIZE: 0x00000000 14:58:50 > EMMC_USER_SIZE: 0x0E6800000(3.60 G) 14:58:50 > >preloader.bin read success. >MBR read success. >EBR1 read success. >lk.bin read success. >boot.img read success. >recovery.img read success. >secro.img read success. >logo.bin read success. >system.img read success. >Pass cache.img >Pass userdata.img >>Reading completed. 15:01:11 > File save path:C:\Users\YA.ALLAH.MADAAD\Desktop\Merapi\backup\MT6572-2016-03-22 17_58_59\ |
The Following 2 Users Say Thank You to shahbazsuper For This Useful Post: |
03-22-2016, 11:36 | #8997 (permalink) |
No Life Poster Join Date: Sep 2006 Location: Dhaka Bangladesh Age: 33
Posts: 3,491
Member: 348877 Status: Offline Sonork: 1601289 Thanks Meter: 1,178 | Analysis of USB port,Please insert phone USB cable. Connecting... CPU TYPE:MT6582 Hardware version:CA01 Software version:0001 SecCfgVal :0x00000000 BromVersion :0xFF BLVersion :0x01 Boot downloading complete! EMMC_ID:0x1501005138585341420597CEFCE0522B EMMC_PRODUCT_NAME: SAMSUNG :0x513858534142 EMMC_BOOT1_SIZE: 0x00400000 EMMC_BOOT2_SIZE: 0x00400000 EMMC_PRMB_SIZE: 0x00400000 EMMC_GP1_SIZE: 0x00000000 EMMC_GP2_SIZE: 0x00000000 EMMC_GP3_SIZE: 0x00000000 EMMC_GP4_SIZE: 0x00000000 EMMC_USER_SIZE: 0x3A3E00000(14.56 G) Analysis of system files... PRELOADER: addr:0x000000 --length:0x1400000 MBR: addr:0x1400000 --length:0x080000 EBR1: addr:0x1480000 --length:0x080000 PRO_INFO: addr:0x1500000 --length:0x300000 NVRAM: addr:0x1800000 --length:0x500000 PROTECT_F: addr:0x1D00000 --length:0xA00000 PROTECT_S: addr:0x2700000 --length:0xA00000 SECCFG: addr:0x3100000 --length:0x020000 UBOOT: addr:0x3120000 --length:0x060000 BOOTIMG: addr:0x3180000 --length:0x600000 RECOVERY: addr:0x3780000 --length:0x600000 SEC_RO: addr:0x3D80000 --length:0x600000 MISC: addr:0x4380000 --length:0x080000 LOGO: addr:0x4400000 --length:0x300000 EXPDB: addr:0x4700000 --length:0xA00000 ANDROID: addr:0x5100000 --length:0x5F400000 CACHE: addr:0x64500000 --length:0x7E00000 USRDATA: addr:0x6C300000 --length:0x37200000 BMTPOOL: addr:0xFFFF00A8 --length:0x1500000 Format addr:0x6C300000 --Format length:0x37200000 Read phone information success. Check the data complete. >>Successfully reset pattern lock is Z |
03-22-2016, 12:07 | #8998 (permalink) |
No Life Poster Join Date: Dec 2009 Location: INDIA Age: 36
Posts: 3,135
Member: 1195083 Status: Offline Sonork: QQ:3208821449 Thanks Meter: 1,348 | Gionee M3 clean virus And format done [IMG][/IMG] Analysis of USB port,Please insert phone USB cable. Connecting... CPU TYPE:MT6582 Hardware version:CA01 Software version:0001 SecCfgVal :0x00000000 BromVersion :0xFF BLVersion :0x01 Boot downloading complete! EMMC_ID:0x150100513758534142017F19E89F9147 EMMC_PRODUCT_NAME: SAMSUNG :0x513758534142 EMMC_BOOT1_SIZE: 0x00400000 EMMC_BOOT2_SIZE: 0x00400000 EMMC_PRMB_SIZE: 0x00080000 EMMC_GP1_SIZE: 0x00000000 EMMC_GP2_SIZE: 0x00000000 EMMC_GP3_SIZE: 0x00000000 EMMC_GP4_SIZE: 0x00000000 EMMC_USER_SIZE: 0x1D2000000(7.28 G) Analysis of system files... PRELOADER: addr:0x000000 --length:0x880000 MBR: addr:0x880000 --length:0x080000 EBR1: addr:0x900000 --length:0x080000 PRO_INFO: addr:0x980000 --length:0x300000 NVRAM: addr:0xC80000 --length:0x500000 PROTECT_F: addr:0x1180000 --length:0xA00000 PROTECT_S: addr:0x1B80000 --length:0xA00000 SECCFG: addr:0x2580000 --length:0x020000 UBOOT: addr:0x25A0000 --length:0x060000 BOOTIMG: addr:0x2600000 --length:0x1000000 RECOVERY: addr:0x3600000 --length:0x1000000 SEC_RO: addr:0x4600000 --length:0x600000 MISC: addr:0x4C00000 --length:0x080000 LOGO: addr:0x4C80000 --length:0x300000 EBR2: addr:0x4F80000 --length:0x080000 EXPDB: addr:0x5000000 --length:0xA00000 SPDATA: addr:0x5A00000 --length:0x800000 ANDROID: addr:0x6200000 --length:0x53000000 CACHE: addr:0x59200000 --length:0x18000000 USRDATA: addr:0x71200000 --length:0xC0000000 FAT: addr:0x31200000 --length:0xA0180000 BMTPOOL: addr:0xFFFF00A8 --length:0x1500000 Format addr:0x71200000 --Format length:0xC0000000 Read phone information success. Check the data complete. Clear virus complete. >>Before power on the phone, please do a format, clear the user data... [IMG][/IMG] |
03-22-2016, 13:51 | #8999 (permalink) |
Insane Poster Join Date: Apr 2014
Posts: 76
Member: 2171504 Status: Offline Thanks Meter: 51 | Qmobile A300 MT6572 Imei Write One Click QMobile A300 MT6572 Ver 4.2.2 Imei Write Done Without Cdc Drivers Just One Click And Repair both Imei Feel The Real Power Of Volcano Merapi |
The Following User Says Thank You to rajpootkhoaf For This Useful Post: |
03-22-2016, 14:22 | #9000 (permalink) |
No Life Poster Join Date: Nov 2007 Location: ☆I-LOVE Pakistan☆
Posts: 1,567
Member: 627475 Status: Offline Sonork: 100.1594828 Thanks Meter: 1,144 | Q mobile A6 Baseband unknown imei null Solve By MERAPI TOOL |
The Following User Says Thank You to rafi_5217705 For This Useful Post: |
Bookmarks |
| |
|