|
Welcome to the GSM-Forum forums. You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. Only registered members may post questions, contact other members or search our database of over 8 million posts. Registration is fast, simple and absolutely free so please - Click to REGISTER! If you have any problems with the registration process or your account login, please contact contact us . |
|
Register | FAQ | Donate | Forum Rules | Root any Device | ★iPhone Unlock★ | ★ Direct Codes ★ | Direct Unlock Source |
| LinkBack | Thread Tools | Display Modes |
12-19-2015, 07:06 | #16 (permalink) |
No Life Poster Join Date: Feb 2011 Location: ( United States Of Islam ) Age: 35
Posts: 3,954
Member: 1519396 Status: Offline Sonork: 100.1612702 Thanks Meter: 1,951 | infinix CPU TYPE:MT6583/89 Clear virus complete. Code: Analysis of USB port,Please insert phone USB cable. Connecting... CPU TYPE:MT6583/89 Hardware version:CA01 Software version:0001 SecCfgVal :0x00000000 BromVersion :0xFF BLVersion :0x01 Boot downloading complete! EMMC_ID:0x110100303034473930108AE24D5750A1 EMMC_PRODUCT_NAME: SAMSUNG :0x303034473930 EMMC_BOOT1_SIZE: 0x00200000 EMMC_BOOT2_SIZE: 0x00200000 EMMC_PRMB_SIZE: 0x00080000 EMMC_GP1_SIZE: 0x00000000 EMMC_GP2_SIZE: 0x00000000 EMMC_GP3_SIZE: 0x00000000 EMMC_GP4_SIZE: 0x00000000 EMMC_USER_SIZE: 0x0EC000000(3.69 G) Analysis of system files... PRELOADER: addr:0x000000 --length:0x600000 MBR: addr:0x600000 --length:0x080000 EBR1: addr:0x680000 --length:0x080000 __NODL_PMT: addr:0x700000 --length:0x400000 __NODL_PRO_INFO: addr:0xB00000 --length:0x300000 __NODL_NVRAM: addr:0xE00000 --length:0x500000 __NODL_PROTECT_F__NODL_PROTECT_S__NODL_SECCFG: addr:0x1300000 --length:0xA00000 __NODL_PROTECT_S__NODL_SECCFG: addr:0x1D00000 --length:0xA00000 __NODL_SECCFG: addr:0x2700000 --length:0x020000 UBOOT: addr:0x2720000 --length:0x060000 BOOTIMG: addr:0x2780000 --length:0x600000 RECOVERY: addr:0x2D80000 --length:0x600000 SEC_RO: addr:0x3380000 --length:0x600000 __NODL_MISC: addr:0x3980000 --length:0x080000 LOGO: addr:0x3A00000 --length:0x300000 EBR2: addr:0x3D00000 --length:0x080000 TEST: addr:0x3D80000 --length:0xA00000 __NODL_EXPDB: addr:0x4780000 --length:0xA00000 ANDROID: addr:0x5180000 --length:0x28A00000 CACHE: addr:0x2DB80000 --length:0x7E00000 USRDATA: addr:0x35980000 --length:0x40000000 __NODL_FAT: addr:0x75980000 --length:0x75600000 __NODL_BMTPOOL: addr:0xFFFF00A8 --length:0x000000 Format addr:0x35980000 --Format length:0x40000000 Read phone information success. Check the data complete. Clear virus complete. >>Before power on the phone, please do a format, clear the user data... |
The Following User Says Thank You to niaz muhammad For This Useful Post: |
12-19-2015, 08:37 | #17 (permalink) |
No Life Poster Join Date: Jan 2011 Location: lullipapi
Posts: 8,670
Member: 1489030 Status: Offline Sonork: 100.1649409 Thanks Meter: 5,368 | Yapiii Qmobile X6 Factory File Read DoNe Qmobile X6 MT6571 FF Read Done Code: >>Analysis of USB port,Please insert phone USB cable. 12:26:32 > Connecting... 12:26:32 > CPU TYPE:MT6571 12:26:32 > Hardware version:CA00 12:26:32 > Software version:0000 12:26:32 > SecCfgVal :0x00000000 12:26:32 > BromVersion :0xFF 12:26:32 > BLVersion :0x01 >>Boot downloading complete! 12:26:43 > FlashID:009800BC00900066 12:26:43 > Flash Type: NAND_TYBC0A111236KC10 12:26:43 > FlashLen:20000000 12:26:43 > >preloader.bin read success. >lk.bin read success. >boot.img read success. >recovery.img read success. >secro.img read success. >logo.bin read success. >system.img read success. >userdata.img read success. >>Reading completed. 12:30:40 > File save path:C:\Users\Azher\Desktop\MerapiTool_v1.3.8_20151219\backup\MT6571-2015-12-19 15_26_43\ Bro AZHERGOGA007 |
The Following 5 Users Say Thank You to azhergoga007 For This Useful Post: |
12-19-2015, 08:51 | #18 (permalink) | |
No Life Poster Join Date: Nov 2012 Location: Ek India Happy Wala.. :-)
Posts: 2,828
Member: 1834832 Status: Offline Thanks Meter: 1,450 | Quote:
Don't Spam All Brands Supported In Merapi... Test Yourself If You Face Any Problem Post With Screenshot Here Some Reports By Me http://forum.gsmhosting.com/vbb/f723.../#post11469785 http://forum.gsmhosting.com/vbb/f723.../#post11465666 http://forum.gsmhosting.com/vbb/f723.../#post11460546 | |
12-19-2015, 09:16 | #19 (permalink) | |
No Life Poster Join Date: Oct 2012 Location: india
Posts: 507
Member: 1825795 Status: Offline Sonork: 100.1621021:98 Thanks Meter: 183 | hi Quote:
| |
12-19-2015, 09:21 | #20 (permalink) |
No Life Poster Join Date: May 2013 Location: TkinterPy,Hex Cal,Ext2,Ext4,
Posts: 4,540
Member: 1937038 Status: Offline Sonork: QQ 2045657399 Thanks Meter: 4,492 | AG CHROME SELFIE MT6571 NAND FULL FACTORY FILE READ DONE IN BOOT MODE. READING FULL FACTORY FILE IN BOOT MODE. |
The Following 3 Users Say Thank You to ij_cell For This Useful Post: |
12-19-2015, 09:23 | #21 (permalink) |
No Life Poster Join Date: May 2008 Location: hall road pakistan
Posts: 9,397
Member: 782530 Status: Offline Thanks Meter: 8,136 | Q MOBILE X5 NAND MTK6571 READ FACTORY WITH MEAPI TOOL & Write Done WITH SP TOOL NOw Nand Phone Factory File Read With Merapi Tool Very Safe and Perfact After Read Write With Sp Tool but After Write phone Working Well No Any Tesnion , Problem Face Nand Factory Writing Soon Add In Merapi Tool Also Read Factory File With Merapi Tool Write Factory File With Sp Tool ( We are Soon Add Write Nand Factory File With Merapi Tool ) Br FullFlashPak |
The Following 6 Users Say Thank You to FullFlashPak For This Useful Post: |
12-19-2015, 12:49 | #25 (permalink) |
No Life Poster Join Date: May 2013 Location: TkinterPy,Hex Cal,Ext2,Ext4,
Posts: 4,540
Member: 1937038 Status: Offline Sonork: QQ 2045657399 Thanks Meter: 4,492 | SAMSUNG S6 CLONE MT6572 8GB EMMC FULL FACTORY FILE READ AND PRIVACY PIN(ANTI THEFT) REMOVE DONE WITHOUT ANY TENSION OR WITHOUT BRICKED OR HANG ON LOGO. FULL FACTORY FILE READING IN BOOT MODE. NO NEED ROOT. NO NEED USB DEBUGGING. PRIVACY PIN(ANTI THEFT) LOCK REMOVE WITH ONE CLICK. |
The Following 2 Users Say Thank You to ij_cell For This Useful Post: |
12-19-2015, 13:24 | #26 (permalink) |
No Life Poster Join Date: Nov 2010
Posts: 7,669
Member: 1445819 Status: Offline Thanks Meter: 4,976 | Zigo Eon 52I MT6582 EMMC 8GB Read Factory Flash & Write Done With Merapi Beta Zigo Eon 52I MT6582 EMMC 8GB Read Factory Flash & Write Done With Merapi Beta Read Factory Flash Write Flash Br Real ASH Team GPG |
The Following User Says Thank You to zoneofash For This Useful Post: |
12-19-2015, 14:03 | #28 (permalink) |
No Life Poster Join Date: May 2008 Location: hall road pakistan
Posts: 9,397
Member: 782530 Status: Offline Thanks Meter: 8,136 | World Ist Club A225 Mtk6571 Read FACTORY FILE & Format Done Only With Merapi Tool No Need Found Firmware No Need Wast Time No Need Ist Read Backup No Face Any Problem After Format Problem Solved With One Click We are Care Our User Phone Hang On Logo Problem Solved With One Click Only Format After PHone Format PHone Working Good Now Read Factory File Read Factory File With Merapi Tool BR FullFlashPak |
The Following User Says Thank You to FullFlashPak For This Useful Post: |
12-19-2015, 14:05 | #29 (permalink) |
No Life Poster Join Date: Feb 2011 Location: Pakistan & UAE (Dubai) Age: 34
Posts: 3,011
Member: 1526738 Status: Offline Sonork: 100.1607644 Thanks Meter: 6,688 | Samsung Clone S7582 MTK6575 Other not support Only Merapi Tool Done Virus Remove Done where all other failed Samsung clone Format Done Code: Analysis of USB port,Please insert phone USB cable. Connecting... CPU TYPE:MT6575 Hardware version:CB00 Software version:E201 SecCfgVal :0x00000000 BromVersion :0xFF BLVersion :0x01 Boot downloading complete! EMMC_ID:0x1501004E355530304D0252582075BF9F EMMC_PRODUCT_NAME: SAMSUNG :0x4E355530304D EMMC_BOOT1_SIZE: 0x00200000 EMMC_BOOT2_SIZE: 0x00200000 EMMC_PRMB_SIZE: 0x00020000 EMMC_GP1_SIZE: 0x00000000 EMMC_GP2_SIZE: 0x00000000 EMMC_GP3_SIZE: 0x00000000 EMMC_GP4_SIZE: 0x00000000 EMMC_USER_SIZE: 0x0E9000000(3.64 G) Analysis of system files... PRELOADER: addr:0x000000 --length:0x040000 DSP_BL: addr:0x040000 --length:0x5C0000 MBR: addr:0x600000 --length:0x004000 EBR1: addr:0x604000 --length:0x05C000 __NODL_PMT: addr:0x660000 --length:0x400000 __NODL_NVRAM: addr:0xA60000 --length:0x300000 __NODL_SECCFG: addr:0xD60000 --length:0x020000 UBOOT: addr:0xD80000 --length:0x060000 BOOTIMG: addr:0xDE0000 --length:0x600000 RECOVERY: addr:0x13E0000 --length:0x600000 SEC_RO: addr:0x19E0000 --length:0x600000 __NODL_MISC: addr:0x1FE0000 --length:0x060000 LOGO: addr:0x2040000 --length:0x300000 __NODL_EXPDB: addr:0x2340000 --length:0x0A0000 EBR2: addr:0x23E0000 --length:0x004000 ANDROID: addr:0x23E4000 --length:0x20000000 CACHE: addr:0x223E4000 --length:0x20000000 USRDATA: addr:0x423E4000 --length:0x20000000 __NODL_FAT: addr:0x623E4000 --length:0x8663C000 __NODL_BMTPOOL: addr:0xFFFF0050 --length:0x000000 Format addr:0x423E4000 --Format length:0x20000000 Read phone information success. Check the data complete. Clear virus complete. >>Before power on the phone, please do a format, clear the user data... Code: 13:06:22 > >>Analysis of USB port,Please insert phone USB cable. 13:06:31 > Connecting... 13:06:31 > CPU TYPE:MT6575 13:06:31 > Hardware version:CB00 13:06:31 > Software version:E201 13:06:34 > SecCfgVal :0x00000000 13:06:34 > BromVersion :0xFF 13:06:34 > BLVersion :0x01 >>Boot downloading complete! 13:06:55 > EMMC_ID:0x1501004E355530304D0252582075BF9F 13:06:55 > EMMC_PRODUCT_NAME: SAMSUNG :0x4E355530304D 13:06:55 > EMMC_BOOT1_SIZE: 0x00200000 13:06:55 > EMMC_BOOT2_SIZE: 0x00200000 13:06:55 > EMMC_PRMB_SIZE: 0x00020000 13:06:55 > EMMC_GP1_SIZE: 0x00000000 13:06:55 > EMMC_GP2_SIZE: 0x00000000 13:06:55 > EMMC_GP3_SIZE: 0x00000000 13:06:55 > EMMC_GP4_SIZE: 0x00000000 13:06:55 > EMMC_USER_SIZE: 0x0E9000000(3.64 G) 13:06:55 > 13:07:01 > 13:07:01 > 13:07:01 > Analysis of system files... 13:07:01 > PRELOADER:>>addr:0x000000 --length:0x040000 13:07:01 > DSP_BL:>>addr:0x040000 --length:0x5C0000 13:07:01 > MBR:>>addr:0x600000 --length:0x004000 13:07:01 > EBR1:>>addr:0x604000 --length:0x05C000 13:07:01 > __NODL_PMT:>>addr:0x660000 --length:0x400000 13:07:01 > __NODL_NVRAM:>>addr:0xA60000 --length:0x300000 13:07:01 > __NODL_SECCFG:>>addr:0xD60000 --length:0x020000 13:07:01 > UBOOT:>>addr:0xD80000 --length:0x060000 13:07:01 > BOOTIMG:>>addr:0xDE0000 --length:0x600000 13:07:01 > RECOVERY:>>addr:0x13E0000 --length:0x600000 13:07:01 > SEC_RO:>>addr:0x19E0000 --length:0x600000 13:07:01 > __NODL_MISC:>>addr:0x1FE0000 --length:0x060000 13:07:01 > LOGO:>>addr:0x2040000 --length:0x300000 13:07:01 > __NODL_EXPDB:>>addr:0x2340000 --length:0x0A0000 13:07:01 > EBR2:>>addr:0x23E0000 --length:0x004000 13:07:01 > ANDROID:>>addr:0x23E4000 --length:0x20000000 13:07:01 > CACHE:>>addr:0x223E4000 --length:0x20000000 13:07:01 > USRDATA:>>addr:0x423E4000 --length:0x20000000 13:07:01 > __NODL_FAT:>>addr:0x623E4000 --length:0x8663C000 13:07:01 > __NODL_BMTPOOL:>>addr:0xFFFF0050 --length:0x000000 13:07:01 > 13:07:01 > 13:07:01 > Read phone information success. 13:07:06 > Format range: Start Address: 0x423E4000,Format Length :0x20000000 >>Flash erasing complete! >>Check the data complete. 13:07:19 > 13:07:19 > Please take out SIM and Memory card from phone when power on first time, or it will have Memory Lock . 13:07:19 > If you meet Memory Lock,please take all cards from phone and restart phone again. Volcano GPG Team |
12-19-2015, 14:15 | #30 (permalink) |
No Life Poster Join Date: Feb 2011 Location: Pakistan & UAE (Dubai) Age: 34
Posts: 3,011
Member: 1526738 Status: Offline Sonork: 100.1607644 Thanks Meter: 6,688 | Samsung S3 MTK6577 Read factory file done Merapi Great Tool Samsung S3 I9300 MTK6577 Read Scatter File Done with Merapi Tool Code: 21:29:48 > Access to functional permissions from server... 21:29:59 > Access to functional permissions from server...OK! 21:29:59 > 21:29:59 > 21:29:59 > >>Analysis of USB port,Please insert phone USB cable. 21:32:36 > Connecting... 21:32:36 > CPU TYPE:MT6577 21:32:36 > Hardware version:CB00 21:32:36 > Software version:E201 21:32:43 > SecCfgVal :0x00000000 21:32:43 > BromVersion :0xFF 21:32:43 > BLVersion :0x01 >>Boot downloading complete! 21:32:58 > EMMC_ID:0x1501004E355530304D02BEFC20BDCF33 21:32:58 > EMMC_PRODUCT_NAME: SAMSUNG :0x4E355530304D 21:32:58 > EMMC_BOOT1_SIZE: 0x00200000 21:32:58 > EMMC_BOOT2_SIZE: 0x00200000 21:32:58 > EMMC_PRMB_SIZE: 0x00020000 21:32:58 > EMMC_GP1_SIZE: 0x00000000 21:32:58 > EMMC_GP2_SIZE: 0x00000000 21:32:58 > EMMC_GP3_SIZE: 0x00000000 21:32:58 > EMMC_GP4_SIZE: 0x00000000 21:32:58 > EMMC_USER_SIZE: 0x0E9000000(3.64 G) 21:32:58 > >preloader.bin read success. >DSP_BL read success. >MBR read success. >EBR1 read success. >uboot.bin read success. >boot.img read success. >recovery.img read success. >secro.img read success. >logo.bin read success. >system.img read success. >cache.img read success. >userdata.img read success. >>Reading completed. 21:38:13 > File save path:L:\ALL BOXES\Volcano BOX\New folder\backup\MT6577-2015-12-19 00_33_06\ Great Volcano GPG Team |
The Following User Says Thank You to Gsm.Universal For This Useful Post: |
Bookmarks |
| |
|