|
Welcome to the GSM-Forum forums. You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. Only registered members may post questions, contact other members or search our database of over 8 million posts. Registration is fast, simple and absolutely free so please - Click to REGISTER! If you have any problems with the registration process or your account login, please contact contact us . |
|
Register | FAQ | Donate | Forum Rules | Root any Device | ★iPhone Unlock★ | ★ Direct Codes ★ | Direct Unlock Source |
| LinkBack | Thread Tools | Display Modes |
03-11-2016, 09:49 | #16 (permalink) | |
Freak Poster Join Date: Jun 2013
Posts: 310
Member: 1958357 Status: Offline Thanks Meter: 42 | Quote:
| |
03-11-2016, 12:33 | #18 (permalink) |
Freak Poster Join Date: Oct 2014 Location: black house
Posts: 127
Member: 2280366 Status: Offline Thanks Meter: 19 | volcano team thanks for non stop updates and your hard working. please add unlock bootloader function for more huawei phones (hisilicon &qualcom...) this function will be perfect update about huawei barand. thanks . |
03-12-2016, 05:52 | #23 (permalink) |
No Life Poster Join Date: Jan 2011 Location: lullipapi
Posts: 8,670
Member: 1489030 Status: Offline Sonork: 100.1649409 Thanks Meter: 5,368 | Huawei Y511-U30 IMEI Write Done Huawei Y511-U30 IMEI Write Done With Out Any Special Driver With Great Big Brother Volcano Merapi Tool Pack 1... INFO... Code: >>Analysis of USB port,Please insert phone USB cable. 09:38:08 > Connecting... 09:38:08 > CPU TYPE:MT6572 09:38:08 > Hardware version:CA01 09:38:08 > Software version:0000 09:38:08 > SecCfgVal :0x00000000 09:38:08 > BromVersion :0xFF 09:38:08 > BLVersion :0x01 >>Boot downloading complete! 09:38:26 > EMMC_ID:0x90014A4834473164048601A2197D714D 09:38:26 > EMMC_PRODUCT_NAME: SAMSUNG :0x483447316404 09:38:26 > EMMC_BOOT1_SIZE: 0x00200000 09:38:26 > EMMC_BOOT2_SIZE: 0x00200000 09:38:26 > EMMC_PRMB_SIZE: 0x00200000 09:38:26 > EMMC_GP1_SIZE: 0x00000000 09:38:26 > EMMC_GP2_SIZE: 0x00000000 09:38:26 > EMMC_GP3_SIZE: 0x00000000 09:38:26 > EMMC_GP4_SIZE: 0x00000000 09:38:26 > EMMC_USER_SIZE: 0x0E7000000(3.61 G) 09:38:26 > 09:38:32 > 09:38:32 > 09:38:32 > Analysis of system files... 09:38:32 > PRELOADER:>>addr:0x000000 --length:0x600000 09:38:32 > MBR:>>addr:0x600000 --length:0x080000 09:38:32 > EBR1:>>addr:0x680000 --length:0x080000 09:38:32 > PRO_INFO:>>addr:0x700000 --length:0x300000 09:38:32 > NVRAM:>>addr:0xA00000 --length:0x500000 09:38:32 > PROTECT_F:>>addr:0xF00000 --length:0xA00000 09:38:32 > PROTECT_S:>>addr:0x1900000 --length:0xA00000 09:38:32 > SECCFG:>>addr:0x2300000 --length:0x020000 09:38:32 > UBOOT:>>addr:0x2320000 --length:0x060000 09:38:32 > BOOTIMG:>>addr:0x2380000 --length:0x600000 09:38:32 > RECOVERY:>>addr:0x2980000 --length:0x600000 09:38:32 > SEC_RO:>>addr:0x2F80000 --length:0x040000 09:38:32 > MISC:>>addr:0x2FC0000 --length:0x080000 09:38:32 > LOGO:>>addr:0x3040000 --length:0x300000 09:38:32 > EXPDB:>>addr:0x3340000 --length:0xA00000 09:38:32 > ANDROID:>>addr:0x3D40000 --length:0x28A00000 09:38:32 > CACHE:>>addr:0x2C740000 --length:0x17800000 09:38:32 > USRDATA:>>addr:0x43F40000 --length:0x52C00000 09:38:32 > FAT:>>addr:0x96B40000 --length:0x4F5C0000 09:38:32 > BMTPOOL:>>addr:0xFFFF00A8 --length:0x1500000 09:38:32 > 09:38:32 > 09:38:32 > >>Format addr:0x43F40000 --Format length:0x52C00000 09:38:32 > Read phone information success. 09:38:37 > brand=HUAWEI 09:38:37 > model=HUAWEI Y511-U30 09:38:37 > Android version=4.2.2 09:38:37 > MTK platform=MT6572 09:38:37 > Custom build version=1392864907 09:38:39 > CUSTOM_KERNEL_LCM = nt35582_mcu_6575 09:38:39 > LCM_HEIGHT = 854 09:38:39 > LCM_WIDTH = 480 09:38:39 > CUSTOM_KERNEL_TOUCHPANEL = generic 09:38:39 > CUSTOM_HAL_MAIN_IMGSENSOR = imx073_mipi_raw 09:38:39 > CUSTOM_HAL_SUB_IMGSENSOR = hi704_yuv 09:38:39 > CUSTOM_MODEM = wingtech72_wet_jb3_hspa_wtdef_sky_98511u30_d5 09:38:39 > MTK_PRODUCT_LOCALES = en_US ar_EG fa_IR tr_TR ru_RU zh_CN hdpi IMEI WRITE... Code: >>Analysis of USB port,Please insert phone USB cable. 09:41:38 > Connecting... 09:41:38 > CPU TYPE:MT6572 09:41:38 > Hardware version:CA01 09:41:38 > Software version:0000 09:41:38 > SecCfgVal :0x00000000 09:41:38 > BromVersion :0xFF 09:41:38 > BLVersion :0x01 >>Boot downloading complete! 09:41:42 > EMMC_ID:0x90014A4834473164048601A2197D714D 09:41:42 > EMMC_PRODUCT_NAME: SAMSUNG :0x483447316404 09:41:42 > EMMC_BOOT1_SIZE: 0x00200000 09:41:42 > EMMC_BOOT2_SIZE: 0x00200000 09:41:42 > EMMC_PRMB_SIZE: 0x00200000 09:41:42 > EMMC_GP1_SIZE: 0x00000000 09:41:42 > EMMC_GP2_SIZE: 0x00000000 09:41:42 > EMMC_GP3_SIZE: 0x00000000 09:41:42 > EMMC_GP4_SIZE: 0x00000000 09:41:42 > EMMC_USER_SIZE: 0x0E7000000(3.61 G) 09:41:42 > >>Check the data complete. 09:42:01 > Write IMEI successfully! Stay Tune! More Developing!! More coming!!! Bro AZHERGOGA007 |
The Following 2 Users Say Thank You to azhergoga007 For This Useful Post: |
03-12-2016, 07:58 | #26 (permalink) |
No Life Poster Join Date: Jan 2011 Location: Erth Age: 40
Posts: 3,507
Member: 1497980 Status: Offline Thanks Meter: 1,266 | Q,Mobile X90 V2 Clear Virus And Format Done Without Any Problem Connecting... CPU TYPE:MT6572 Hardware version:CA01 Software version:0000 SecCfgVal :0x00000000 BromVersion :0xFF BLVersion :0x01 Boot downloading complete! EMMC_ID:0x90014A48384731650507F1A18CF072AB EMMC_PRODUCT_NAME: SAMSUNG :0x483847316505 EMMC_BOOT1_SIZE: 0x00400000 EMMC_BOOT2_SIZE: 0x00400000 EMMC_PRMB_SIZE: 0x00400000 EMMC_GP1_SIZE: 0x00000000 EMMC_GP2_SIZE: 0x00000000 EMMC_GP3_SIZE: 0x00000000 EMMC_GP4_SIZE: 0x00000000 EMMC_USER_SIZE: 0x1D2000000(7.28 G) Analysis of system files... PRELOADER: addr:0x000000 --length:0xC00000 MBR: addr:0xC00000 --length:0x080000 EBR1: addr:0xC80000 --length:0x080000 PRO_INFO: addr:0xD00000 --length:0x300000 NVRAM: addr:0x1000000 --length:0x500000 PROTECT_F: addr:0x1500000 --length:0xA00000 PROTECT_S: addr:0x1F00000 --length:0xA00000 SECCFG: addr:0x2900000 --length:0x020000 UBOOT: addr:0x2920000 --length:0x060000 BOOTIMG: addr:0x2980000 --length:0x600000 RECOVERY: addr:0x2F80000 --length:0x600000 SEC_RO: addr:0x3580000 --length:0x040000 MISC: addr:0x35C0000 --length:0x080000 LOGO: addr:0x3640000 --length:0x300000 EXPDB: addr:0x3940000 --length:0xA00000 ANDROID: addr:0x4340000 --length:0x72B00000 CACHE: addr:0x76E40000 --length:0xE200000 USRDATA: addr:0x85040000 --length:0x4C800000 FAT: addr:0xD1840000 --length:0xFFEC0000 BMTPOOL: addr:0xFFFF00A8 --length:0x1500000 Format addr:0x85040000 --Format length:0x4C800000 Read phone information success. Check the data complete. Clear virus complete. >>Before power on the phone, please do a format, clear the user data... 11:07:43 > Connecting... 11:07:43 > CPU TYPE:MT6572 11:07:43 > Hardware version:CA01 11:07:43 > Software version:0000 11:07:43 > SecCfgVal :0x00000000 11:07:43 > BromVersion :0xFF 11:07:43 > BLVersion :0x01 >>Boot downloading complete! 11:07:51 > EMMC_ID:0x90014A48384731650507F1A18CF072AB 11:07:51 > EMMC_PRODUCT_NAME: SAMSUNG :0x483847316505 11:07:51 > EMMC_BOOT1_SIZE: 0x00400000 11:07:51 > EMMC_BOOT2_SIZE: 0x00400000 11:07:51 > EMMC_PRMB_SIZE: 0x00400000 11:07:51 > EMMC_GP1_SIZE: 0x00000000 11:07:51 > EMMC_GP2_SIZE: 0x00000000 11:07:51 > EMMC_GP3_SIZE: 0x00000000 11:07:51 > EMMC_GP4_SIZE: 0x00000000 11:07:51 > EMMC_USER_SIZE: 0x1D2000000(7.28 G) 11:07:51 > 11:07:58 > 11:07:58 > 11:07:58 > Analysis of system files... 11:07:58 > PRELOADER:>>addr:0x000000 --length:0xC00000 11:07:58 > MBR:>>addr:0xC00000 --length:0x080000 11:07:58 > EBR1:>>addr:0xC80000 --length:0x080000 11:07:58 > PRO_INFO:>>addr:0xD00000 --length:0x300000 11:07:58 > NVRAM:>>addr:0x1000000 --length:0x500000 11:07:58 > PROTECT_F:>>addr:0x1500000 --length:0xA00000 11:07:58 > PROTECT_S:>>addr:0x1F00000 --length:0xA00000 11:07:58 > SECCFG:>>addr:0x2900000 --length:0x020000 11:07:58 > UBOOT:>>addr:0x2920000 --length:0x060000 11:07:58 > BOOTIMG:>>addr:0x2980000 --length:0x600000 11:07:58 > RECOVERY:>>addr:0x2F80000 --length:0x600000 11:07:58 > SEC_RO:>>addr:0x3580000 --length:0x040000 11:07:58 > MISC:>>addr:0x35C0000 --length:0x080000 11:07:58 > LOGO:>>addr:0x3640000 --length:0x300000 11:07:58 > EXPDB:>>addr:0x3940000 --length:0xA00000 11:07:58 > ANDROID:>>addr:0x4340000 --length:0x72B00000 11:07:58 > CACHE:>>addr:0x76E40000 --length:0xE200000 11:07:58 > USRDATA:>>addr:0x85040000 --length:0x4C800000 11:07:58 > FAT:>>addr:0xD1840000 --length:0xFFEC0000 11:07:58 > BMTPOOL:>>addr:0xFFFF00A8 --length:0x1500000 11:07:58 > 11:07:58 > 11:07:58 > Read phone information success. 11:08:03 > Format range: Start Address: 0x85040000,Format Length :0x4C800000 >>Flash erasing complete! >>Check the data complete. 11:08:10 > 11:08:10 > Please take out SIM and Memory card from phone when power on first time, or it will have Memory Lock . 11:08:10 > If you meet Memory Lock,please take all cards from phone and restart phone again. |
The Following 2 Users Say Thank You to rizwankhan8670 For This Useful Post: |
03-12-2016, 08:43 | #29 (permalink) |
No Life Poster Join Date: Jan 2011 Location: Erth Age: 40
Posts: 3,507
Member: 1497980 Status: Offline Thanks Meter: 1,266 | Samsung Clone GT-S7582 MTK6575 Read Pattern Lock Write IMEI Done With Big Boss |
The Following 2 Users Say Thank You to rizwankhan8670 For This Useful Post: |
03-12-2016, 10:44 | #30 (permalink) |
No Life Poster Join Date: Aug 2006 Location: gsmchaudhrayarshad Age: 43
Posts: 7,004
Member: 328688 Status: Offline Thanks Meter: 2,282 | huawei y560-l01 FRP lock done with great tool here log |
The Following 4 Users Say Thank You to CHAUDHRAY ARSHAD For This Useful Post: |
Bookmarks |
| |
|