|
Welcome to the GSM-Forum forums. You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. Only registered members may post questions, contact other members or search our database of over 8 million posts. Registration is fast, simple and absolutely free so please - Click to REGISTER! If you have any problems with the registration process or your account login, please contact contact us . |
|
Register | FAQ | Donate | Forum Rules | Root any Device | ★iPhone Unlock★ | ★ Direct Codes ★ | Direct Unlock Source | Search | Today's Posts | Mark Forums Read |
| LinkBack | Thread Tools | Display Modes |
03-09-2016, 18:08 | #1 (permalink) |
No Life Poster Join Date: May 2013 Location: TkinterPy,Hex Cal,Ext2,Ext4,
Posts: 4,540
Member: 1937038 Status: Offline Sonork: QQ 2045657399 Thanks Meter: 4,492 | MerapiTool 1.4.7 Beta Start Huawei Qualcomm Frp World First|Imei Repair Engine Update WORLD FIRST HUAWEI Y560-L01 QUALCOMM FRP REMOVED DONE BY ONE CLICK WITHOUT ROOT OR WITHOUT ADB MODE BY REVOLUTIONARY MERAPI TOOL NOTE| Most of Qualcomm MSM8909 based devices Are supported in fastboot mode so as much as you can test any brand or any model EXCLUSIVE PROCEDURE FRP ACTIVATED DEVICE FRP REMOVE ONE CLICK IN FASTBOOT MODE AFTER REMOVE FRP DEVICE Disclaimer : This Produce Only Work on Boot loader Unlocked Phones Only , Will Add Boot loader Unlocker to Merapi ASAP Any Merapi User Have Qualcomm Based Phones With FRP Lock Contact us For Beta Test BR. FeeFi GPG Team Last edited by Faisal_Computer; 03-12-2016 at 16:10. |
The Following 44 Users Say Thank You to ij_cell For This Useful Post: |
03-10-2016, 07:00 | #3 (permalink) |
No Life Poster Join Date: Mar 2010 Location: Dubai
Posts: 1,297
Member: 1259046 Status: Offline Sonork: 100.1608453 Thanks Meter: 1,229 | Samsung S7582 MT6575 Read Info Extend and Factory File Done By Volcano Box Samsung S7582 MT6575 Read Info Extend and Factory File Done By Volcano Box Code: >>Analysis of USB port,Please insert phone USB cable. 10:47:24 > Connecting... 10:47:24 > CPU TYPE:MT6575 10:47:24 > Hardware version:CB00 10:47:24 > Software version:E201 10:47:27 > SecCfgVal :0x00000000 10:47:27 > BromVersion :0xFF 10:47:27 > BLVersion :0x01 >>Boot downloading complete! 10:47:39 > EMMC_ID:0x90014A48344731640486014D096C60F5 10:47:39 > EMMC_PRODUCT_NAME: SAMSUNG :0x483447316404 10:47:39 > EMMC_BOOT1_SIZE: 0x00200000 10:47:39 > EMMC_BOOT2_SIZE: 0x00200000 10:47:39 > EMMC_PRMB_SIZE: 0x00200000 10:47:39 > EMMC_GP1_SIZE: 0x00000000 10:47:39 > EMMC_GP2_SIZE: 0x00000000 10:47:39 > EMMC_GP3_SIZE: 0x00000000 10:47:39 > EMMC_GP4_SIZE: 0x00000000 10:47:39 > EMMC_USER_SIZE: 0x0E7000000(3.61 G) 10:47:39 > 10:47:45 > 10:47:45 > 10:47:45 > Analysis of system files... 10:47:45 > PRELOADER:>>addr:0x000000 --length:0x040000 10:47:45 > DSP_BL:>>addr:0x040000 --length:0x5C0000 10:47:45 > MBR:>>addr:0x600000 --length:0x004000 10:47:45 > EBR1:>>addr:0x604000 --length:0x05C000 10:47:45 > __NODL_PMT:>>addr:0x660000 --length:0x400000 10:47:45 > __NODL_NVRAM:>>addr:0xA60000 --length:0x300000 10:47:45 > __NODL_SECCFG:>>addr:0xD60000 --length:0x020000 10:47:45 > UBOOT:>>addr:0xD80000 --length:0x060000 10:47:45 > BOOTIMG:>>addr:0xDE0000 --length:0x600000 10:47:45 > RECOVERY:>>addr:0x13E0000 --length:0x600000 10:47:45 > SEC_RO:>>addr:0x19E0000 --length:0x600000 10:47:45 > __NODL_MISC:>>addr:0x1FE0000 --length:0x060000 10:47:45 > LOGO:>>addr:0x2040000 --length:0x300000 10:47:45 > __NODL_EXPDB:>>addr:0x2340000 --length:0x0A0000 10:47:45 > EBR2:>>addr:0x23E0000 --length:0x004000 10:47:45 > ANDROID:>>addr:0x23E4000 --length:0x20000000 10:47:45 > CACHE:>>addr:0x223E4000 --length:0x20000000 10:47:45 > USRDATA:>>addr:0x423E4000 --length:0x40000000 10:47:45 > __NODL_FAT:>>addr:0x823E4000 --length:0x6481C000 10:47:45 > __NODL_BMTPOOL:>>addr:0xFFFF0050 --length:0x000000 10:47:45 > 10:47:45 > 10:47:45 > >>Format addr:0x423E4000 --Format length:0x40000000 10:47:45 > Read phone information success. 10:47:51 > model=GT-S7582 10:47:51 > Android version=4.2.2 10:47:51 > MTK platform=MT6575 10:47:51 > Custom build version=1419925871 Factory File Done Code: >>Analysis of USB port,Please insert phone USB cable. 10:49:52 > Connecting... 10:49:52 > CPU TYPE:MT6575 10:49:52 > Hardware version:CB00 10:49:52 > Software version:E201 10:49:55 > SecCfgVal :0x00000000 10:49:55 > BromVersion :0xFF 10:49:55 > BLVersion :0x01 >>Boot downloading complete! 10:50:07 > EMMC_ID:0x90014A48344731640486014D096C60F5 10:50:07 > EMMC_PRODUCT_NAME: SAMSUNG :0x483447316404 10:50:07 > EMMC_BOOT1_SIZE: 0x00200000 10:50:07 > EMMC_BOOT2_SIZE: 0x00200000 10:50:07 > EMMC_PRMB_SIZE: 0x00200000 10:50:07 > EMMC_GP1_SIZE: 0x00000000 10:50:07 > EMMC_GP2_SIZE: 0x00000000 10:50:07 > EMMC_GP3_SIZE: 0x00000000 10:50:07 > EMMC_GP4_SIZE: 0x00000000 10:50:07 > EMMC_USER_SIZE: 0x0E7000000(3.61 G) 10:50:07 > >preloader.bin read success. >DSP_BL read success. >MBR read success. >EBR1 read success. >uboot.bin read success. >boot.img read success. >recovery.img read success. >secro.img read success. >logo.bin read success. >EBR2 read success. >system.img read success. >Pass cache.img >Pass userdata.img >>Reading completed. 10:51:56 > File save path:C:\Users\FactoryFilePak\MerapiTool\backup\MT6575-2016-03-10 13_50_15\ Br IM3022 |
The Following 9 Users Say Thank You to im3022 For This Useful Post: |
03-10-2016, 11:23 | #4 (permalink) |
No Life Poster Join Date: Mar 2010 Location: Dubai
Posts: 1,297
Member: 1259046 Status: Offline Sonork: 100.1608453 Thanks Meter: 1,229 | Samsung I8552 MT6572 invalid imei Write Done By Volcano Box Samsung I8552 MT6572 invalid imei Write Done By Volcano Box COM port searching and preloader handshake. Connect port COM67. COM port searching and preloader handshake. Connect successfully. CPU TYPE:MT6572, E00 DSP Firmware Version:2000.00.00 DSP Patch Version:1.0 Software Version:MOLY.WR8.W1315.MD.WG.MP.V1 Hardware Version:BIRD72_WET_B_JB3_HSPA_HW Audio Version:Unknown IMEI1:invalid. IMEI2:invalid. >>IMEI success. Br IM3022 |
The Following User Says Thank You to im3022 For This Useful Post: |
03-10-2016, 11:36 | #5 (permalink) |
No Life Poster Join Date: May 2013 Location: TkinterPy,Hex Cal,Ext2,Ext4,
Posts: 4,540
Member: 1937038 Status: Offline Sonork: QQ 2045657399 Thanks Meter: 4,492 | TELEFUNKEN TEL73G1 MT6573 4GB EMMC CLEAR ALL VIRUS AND FORMATE DONE BY AMAZING MERAPI TOOL EXTENDED INFO VIRUS CLEAR FORMAT BR. FeeFi GPG Team |
The Following 3 Users Say Thank You to ij_cell For This Useful Post: |
03-10-2016, 12:09 | #6 (permalink) |
No Life Poster Join Date: May 2013 Location: TkinterPy,Hex Cal,Ext2,Ext4,
Posts: 4,540
Member: 1937038 Status: Offline Sonork: QQ 2045657399 Thanks Meter: 4,492 | CETRUS BOLD MT6572 4GB EMMC FULL FLASH WRITE DONE WRITE FLASH BR. FeeFi GPG Team |
The Following 3 Users Say Thank You to ij_cell For This Useful Post: |
03-10-2016, 13:51 | #9 (permalink) |
No Life Poster Join Date: May 2013 Location: TkinterPy,Hex Cal,Ext2,Ext4,
Posts: 4,540
Member: 1937038 Status: Offline Sonork: QQ 2045657399 Thanks Meter: 4,492 | ALCATEL 4016X MT6572 4GB EMMC ROOT AND LETHAL XXXXXX APPS REMOVED IN ADB MODE VERY FAST VERY RELIABLE BY AMAZING MERAPI TOOL ROOT CLEAN VIRUS IN ADB MODE BR. FeeFi GPG Team |
The Following 4 Users Say Thank You to ij_cell For This Useful Post: |
03-10-2016, 16:18 | #10 (permalink) |
Freak Poster Join Date: Jan 2011 Location: Chennai
Posts: 319
Member: 1490564 Status: Offline Sonork: 100.1671685 Thanks Meter: 182 | Karbonn st72 mt6582 imei write done with out cdc driver always rocking tool merapi :) KARBONN ST72 MT6582 IMEI WRITE DONE WITH OUT CDC DRIVERS ALWAYS ROCKING TOOL MERAPI Read Info Extend Code: >>Analysis of USB port,Please insert phone USB cable. 17.29.18 > Connecting... 17.29.18 > CPU TYPE:MT6582 17.29.18 > Hardware version:CA01 17.29.18 > Software version:0001 17.29.18 > SecCfgVal :0x00000000 17.29.18 > BromVersion :0xFF 17.29.18 > BLVersion :0x01 >>Boot downloading complete! 17.29.23 > EMMC_ID:0x8801034E4361726420236F737559B1E1 17.29.23 > EMMC_PRODUCT_NAME: SAMSUNG :0x4E4361726420 17.29.23 > EMMC_BOOT1_SIZE: 0x00200000 17.29.23 > EMMC_BOOT2_SIZE: 0x00200000 17.29.23 > EMMC_PRMB_SIZE: 0x00020000 17.29.23 > EMMC_GP1_SIZE: 0x00000000 17.29.23 > EMMC_GP2_SIZE: 0x00000000 17.29.23 > EMMC_GP3_SIZE: 0x00000000 17.29.23 > EMMC_GP4_SIZE: 0x00000000 17.29.23 > EMMC_USER_SIZE: 0x0E7400000(3.61 G) 17.29.23 > 17.29.29 > 17.29.29 > 17.29.29 > Analysis of system files... 17.29.29 > PRELOADER:>>addr:0x000000 --length:0x1400000 17.29.29 > MBR:>>addr:0x1400000 --length:0x080000 17.29.29 > EBR1:>>addr:0x1480000 --length:0x080000 17.29.29 > PRO_INFO:>>addr:0x1500000 --length:0x300000 17.29.29 > NVRAM:>>addr:0x1800000 --length:0x500000 17.29.29 > PROTECT_F:>>addr:0x1D00000 --length:0xA00000 17.29.29 > PROTECT_S:>>addr:0x2700000 --length:0xA00000 17.29.29 > SECCFG:>>addr:0x3100000 --length:0x020000 17.29.29 > UBOOT:>>addr:0x3120000 --length:0x060000 17.29.29 > BOOTIMG:>>addr:0x3180000 --length:0x600000 17.29.29 > RECOVERY:>>addr:0x3780000 --length:0x600000 17.29.29 > SEC_RO:>>addr:0x3D80000 --length:0x600000 17.29.29 > MISC:>>addr:0x4380000 --length:0x080000 17.29.29 > LOGO:>>addr:0x4400000 --length:0x300000 17.29.29 > EBR2:>>addr:0x4700000 --length:0x080000 17.29.29 > EXPDB:>>addr:0x4780000 --length:0xA00000 17.29.29 > ANDROID:>>addr:0x5180000 --length:0x40000000 17.29.29 > CACHE:>>addr:0x45180000 --length:0x7E00000 17.29.29 > USRDATA:>>addr:0x4CF80000 --length:0x60000000 17.29.29 > FAT:>>addr:0xACF80000 --length:0x393A0000 17.29.29 > BMTPOOL:>>addr:0xFFFF00A8 --length:0x000000 17.29.29 > 17.29.29 > 17.29.29 > >>Format addr:0x4CF80000 --Format length:0x60000000 17.29.29 > Read phone information success. 17.29.34 > brand=Karbonn 17.29.34 > model=Karbonn ST72 17.29.34 > Android version=4.4.2 17.29.34 > MTK platform=MT6582 17.29.34 > Custom build version=2.26_20141201 17.29.36 > CUSTOM_KERNEL_LCM = nt35582_mcu_6575 17.29.36 > LCM_HEIGHT = 1024 17.29.36 > LCM_WIDTH = 600 17.29.36 > CUSTOM_KERNEL_TOUCHPANEL = generic 17.29.36 > CUSTOM_HAL_MAIN_IMGSENSOR = imx073_mipi_raw 17.29.36 > CUSTOM_HAL_SUB_IMGSENSOR = hi704_yuv 17.29.36 > CUSTOM_MODEM = elink82_mz_tb_kk_hspa_W1 17.29.36 > MTK_PRODUCT_LOCALES = en_US es_ES zh_CN zh_TW ru_RU pt_BR fr_FR de_DE tr_TR it_IT in_ID ms_MY vi_VN ar_EG th_TH pt_PT nl_NL Imei Write Done |
The Following 6 Users Say Thank You to babudatabase For This Useful Post: |
03-10-2016, 16:31 | #11 (permalink) |
No Life Poster Join Date: Jan 2011 Location: lullipapi
Posts: 8,670
Member: 1489030 Status: Offline Sonork: 100.1649409 Thanks Meter: 5,368 | Qmobile A900 Virus Scan Done Qmobile A900 Virus Scan Done With Great Volcano Box MErapi Tool PAck 1.. [IMG]**************************************/images?q=tbn:ANd9GcQClq9trvb1WWqb5sO8DTofFErvSzKGP 3sZ7yq_46HCBXRd51YaeQ[/IMG] Info.. Code: > 15:45:37 > 15:45:37 > >>Analysis of USB port,Please insert phone USB cable. 15:45:56 > Connecting... 15:45:56 > CPU TYPE:MT6583/89 15:45:56 > Hardware version:CA01 15:45:56 > Software version:0001 15:45:56 > SecCfgVal :0x00000000 15:45:56 > BromVersion :0xFF 15:45:56 > BLVersion :0x01 >>Boot downloading complete! 15:46:05 > EMMC_ID:0xFE014E5030585858F358109010A28290 15:46:05 > EMMC_PRODUCT_NAME: SAMSUNG :0x5030585858F3 15:46:05 > EMMC_BOOT1_SIZE: 0x00100000 15:46:05 > EMMC_BOOT2_SIZE: 0x00100000 15:46:05 > EMMC_PRMB_SIZE: 0x00100000 15:46:05 > EMMC_GP1_SIZE: 0x00000000 15:46:05 > EMMC_GP2_SIZE: 0x00000000 15:46:05 > EMMC_GP3_SIZE: 0x00000000 15:46:05 > EMMC_GP4_SIZE: 0x00000000 15:46:05 > EMMC_USER_SIZE: 0x0E9000000(3.64 G) 15:46:05 > 15:46:12 > 15:46:12 > 15:46:12 > Analysis of system files... 15:46:12 > PRELOADER:>>addr:0x000000 --length:0x600000 15:46:12 > MBR:>>addr:0x600000 --length:0x080000 15:46:12 > EBR1:>>addr:0x680000 --length:0x080000 15:46:12 > __NODL_PMT:>>addr:0x700000 --length:0x400000 15:46:12 > __NODL_PRO_INFO:>>addr:0xB00000 --length:0x300000 15:46:12 > __NODL_NVRAM:>>addr:0xE00000 --length:0x500000 15:46:12 > __NODL_PROTECT_F__NODL_PROTECT_S__NODL_SECCFG:>>addr:0x1300000 --length:0xA00000 15:46:12 > __NODL_PROTECT_S__NODL_SECCFG:>>addr:0x1D00000 --length:0xA00000 15:46:12 > __NODL_SECCFG:>>addr:0x2700000 --length:0x020000 15:46:12 > UBOOT:>>addr:0x2720000 --length:0x060000 15:46:12 > BOOTIMG:>>addr:0x2780000 --length:0x600000 15:46:12 > RECOVERY:>>addr:0x2D80000 --length:0x600000 15:46:12 > SEC_RO:>>addr:0x3380000 --length:0x600000 15:46:12 > __NODL_MISC:>>addr:0x3980000 --length:0x080000 15:46:12 > LOGO:>>addr:0x3A00000 --length:0x300000 15:46:12 > EBR2:>>addr:0x3D00000 --length:0x080000 15:46:12 > __NODL_EXPDB:>>addr:0x3D80000 --length:0xA00000 15:46:12 > ANDROID:>>addr:0x4780000 --length:0x40000000 15:46:12 > CACHE:>>addr:0x44780000 --length:0x7E00000 15:46:12 > USRDATA:>>addr:0x4C580000 --length:0x40000000 15:46:12 > FAT:>>addr:0x8C580000 --length:0x5B880000 15:46:12 > __NODL_BMTPOOL:>>addr:0xFFFF00A8 --length:0x000000 15:46:12 > 15:46:12 > 15:46:12 > >>Format addr:0x4C580000 --Format length:0x40000000 15:46:12 > Read phone information success. 15:46:17 > brand=QMobile 15:46:17 > model=A900 15:46:17 > Android version=4.2.1 15:46:17 > MTK platform=MT6589 15:46:17 > Custom build version=1386137382 15:46:19 > CUSTOM_KERNEL_LCM = nt35582_mcu_6575 15:46:19 > LCM_HEIGHT = 1280 15:46:19 > LCM_WIDTH = 720 15:46:19 > CUSTOM_KERNEL_TOUCHPANEL = generic 15:46:19 > CUSTOM_HAL_MAIN_IMGSENSOR = imx073_mipi_raw 15:46:19 > CUSTOM_HAL_SUB_IMGSENSOR = hi704_yuv 15:46:19 > CUSTOM_MODEM = GBW192_gionee89_dwe_jb2_md1_hspa 15:46:19 > MTK_PRODUCT_LOCALES = en_US ar_EG fa_IR ur_PK xhdpi hdpi ldpi mdpi Scan... Code: Analysis of USB port,Please insert phone USB cable. Connecting... CPU TYPE:MT6583/89 Hardware version:CA01 Software version:0001 SecCfgVal :0x00000000 BromVersion :0xFF BLVersion :0x01 Boot downloading complete! EMMC_ID:0xFE014E5030585858F358109010A28290 EMMC_PRODUCT_NAME: SAMSUNG :0x5030585858F3 EMMC_BOOT1_SIZE: 0x00100000 EMMC_BOOT2_SIZE: 0x00100000 EMMC_PRMB_SIZE: 0x00100000 EMMC_GP1_SIZE: 0x00000000 EMMC_GP2_SIZE: 0x00000000 EMMC_GP3_SIZE: 0x00000000 EMMC_GP4_SIZE: 0x00000000 EMMC_USER_SIZE: 0x0E9000000(3.64 G) Analysis of system files... PRELOADER: addr:0x000000 --length:0x600000 MBR: addr:0x600000 --length:0x080000 EBR1: addr:0x680000 --length:0x080000 __NODL_PMT: addr:0x700000 --length:0x400000 __NODL_PRO_INFO: addr:0xB00000 --length:0x300000 __NODL_NVRAM: addr:0xE00000 --length:0x500000 __NODL_PROTECT_F__NODL_PROTECT_S__NODL_SECCFG: addr:0x1300000 --length:0xA00000 __NODL_PROTECT_S__NODL_SECCFG: addr:0x1D00000 --length:0xA00000 __NODL_SECCFG: addr:0x2700000 --length:0x020000 UBOOT: addr:0x2720000 --length:0x060000 BOOTIMG: addr:0x2780000 --length:0x600000 RECOVERY: addr:0x2D80000 --length:0x600000 SEC_RO: addr:0x3380000 --length:0x600000 __NODL_MISC: addr:0x3980000 --length:0x080000 LOGO: addr:0x3A00000 --length:0x300000 EBR2: addr:0x3D00000 --length:0x080000 __NODL_EXPDB: addr:0x3D80000 --length:0xA00000 ANDROID: addr:0x4780000 --length:0x40000000 CACHE: addr:0x44780000 --length:0x7E00000 USRDATA: addr:0x4C580000 --length:0x40000000 FAT: addr:0x8C580000 --length:0x5B880000 __NODL_BMTPOOL: addr:0xFFFF00A8 --length:0x000000 Format addr:0x4C580000 --Format length:0x40000000 Read phone information success. Check the data complete. Clear virus complete. >>Before power on the phone, please do a format, clear the user data... IMEI WRITE .... Stay Tune! More Developing!! More coming!!! Bro AZHERGOGA007 |
The Following 3 Users Say Thank You to azhergoga007 For This Useful Post: |
03-10-2016, 16:42 | #12 (permalink) |
Insane Poster Join Date: Apr 2014
Posts: 76
Member: 2171504 Status: Offline Thanks Meter: 51 | Qmobile X6 MT6571 Hang on Logo Qmobile X6 MT6571 Hang At Noire Logo Solved By Just One Click With Great merapi Tool Formet Feel The power Of Volcano |
The Following User Says Thank You to rajpootkhoaf For This Useful Post: |
03-11-2016, 06:29 | #13 (permalink) |
No Life Poster Join Date: Feb 2011 Location: ( United States Of Islam ) Age: 35
Posts: 3,954
Member: 1519396 Status: Offline Sonork: 100.1612702 Thanks Meter: 1,951 | S7582 read ff remove virus and format don |
The Following 2 Users Say Thank You to niaz muhammad For This Useful Post: |
03-11-2016, 09:39 | #15 (permalink) |
Freak Poster Join Date: Jan 2011 Location: Chennai
Posts: 319
Member: 1490564 Status: Offline Sonork: 100.1671685 Thanks Meter: 182 | One plus x model - e1003 qualcom frp lock remove done the only one great merapi tool ONE PLUS X MODEL - E1003 QUALCOM FRP LOCK REMOVE DONE THE ONLY ONE GREAT MERAPI TOOL ALWAYS DO ROCKING PERFORMANCE Enable Usb Debugging Watch Video (A) AFTER GO TO SETTINGS SELECT ABOUT (B) CLICK 7 TIMES BUILD NUMBER GO BACK (POP UP SCREEN SHOW DEVELOPER MODE ON) (C)OPEN DEVELOPER OPTIONS ENABLE USB DEBUGGING (D) CONNECT PHONE OPEN MERAPI TOOL (E) SELECT MULTI BRAND (F) SELECT MOTOROLA (G) CLICK REMOVE FRP (H) MONEY IN YOUR POCKET FRP REMOVE DONE Last edited by ij_cell; 03-11-2016 at 10:36. |
The Following 7 Users Say Thank You to babudatabase For This Useful Post: |
Bookmarks |
Thread Tools | |
Display Modes | |
| |
|