Thursday 31 December 2015
Miracle Box 2.26 | Happy New Year Update | 1st January 2016 (TEXT)
Author: Unknown | 22:27 | No Comments |
Miracle Box 2.26 | Happy New Year Update | 1st January 2016 (TEXT)
MIRACLE BOX TRULY FOR CHINA MOBILE
RELEASED VERSION 2.26
1st January 2016
👊 NEW UPDATED FEATURES 👊
1.Android Add Motrola FRP Reset.
# Reset FRP Motrola & Various Other Mobile with Same Signature.
2.HTC Improve Reset FRP.
# Improved with More Power.
3.MTK Add 6735 New IC Add support.
# Read Firmware / Write Firmware (Bin).
# Read Firmware / Write Firmware (Scatter).
#Format / Reset / Other MTK Function Support.
# IMEI Repair / Read Pattern / Phone Book Export.
4.MTK Add 6580 New IC Add support.
# Read Firmware / Write Firmware (Bin).
# Read Firmware / Write Firmware (Scatter).
#Format / Reset / Other Mtk Function Support.
# Imei Repair / Read Pattern / Phone Book Export.
5.MTK Improve Read Info and Read Moblie Modle (EMMC).
# MTK Read Info & Read Flash More Fast.
6.SPD Add 7731 EMMC (New IC).
# Read/Write, Format Support.
# Read Pattern, Phone Book.
# Read Info,Reset User Code Support
# IMEI Repair.
7.SPD Add 7731GEA EMMC.
# Read/Write, Format Support.
# Read Pattern, Phone Book.
# Read Info, Reset User Code Support
# IMEI Repair.
8.SPD Improve Scan Mobile Port.
# Improved Detection Mobile Driver More Fast.
9.SPD Improve Android *.pac and Write Support.
# Improved .PAC Write Support.
10.SPD Improve Android Format Add Reset FRP Support.
# Improved SPD Format Function & Reset FRP.
11.Fix software TIP info and BUGS.
Miracle Team Wish You a Very Very
Happy New Year
2016
{FACEBOOK}
{Info About Miracle Key Dongle} |NO NEED CREDIT | NO NEED ACTIVATION|
Asansambox Version 3.0.1 Released Powered With HUA TEAM
Author: Unknown | 20:09 | No Comments |
Asansambox Version 3.0.1 Released Powered With HUA TEAM
Hi To All Asansam Users
Happy New Year
NEW ASANSAM VERSION 3.0.1 RELEASED
Improve FRP Unlock for Samsung Phones
Same J5 and J7
IMPORTANT Notice
-Reports is not enough please test more
-New Asansam Version is powered with hua team
-New Asansam Version is Free for Asansam users
-New Asansam Version is not free for HUA Users
-New Asansam file supporte released soon in next versions
-New Asansam tool Can also Activate on Infinity Team Products(Soon)
-New Asansam tool can also active on hua dongle(soon)
Hua team products list
***********New ASANSAM BOX/CARD/DONGLE -Distributors & Resellers*********************
NEW GUI
NEW TEAM
NEW TOOLS
NEW METHOD
NEW SOLUTION
NEW UPDATES
Download
new link for download
ASANSAMBOX_REV3.0.1_BETA - Download - 4shared
Download Link
Phaser ph801 MTK eMMC Read Pattern or Ffw File Read Done on Boot Mode by Merapi Tool
Author: Unknown | 00:37 | 5 Comments |
Phaser ph801 MTK eMMC Read Pattern or Ffw File Read Done on Boot Mode by Merapi Tool
Phaser ph801 MTK eMMC Read Pattern or Ffw File Read Done on Boot Mode by Merapi Tool
... Factory File Read ...
Phaser ph801 MTK eMMC Read Pattern or Ffw File Read Done on Boot Mode by Merapi Tool
... Factory File Read ...
Code:
>>Analysis of USB port,Please insert phone USB cable.
13:54:22 > Connecting...
13:54:22 > CPU TYPE:MT6572
13:54:22 > Hardware version:CA01
13:54:22 > Software version:0000
13:54:22 > SecCfgVal :0x00000000
13:54:22 > BromVersion :0xFF
13:54:22 > BLVersion :0x01
>>Boot downloading complete!
13:54:29 > EMMC_ID:0x90014A483447316404860FA2EC2F9077
13:54:29 > EMMC_PRODUCT_NAME: SAMSUNG :0x483447316404
13:54:29 > EMMC_BOOT1_SIZE: 0x00200000
13:54:29 > EMMC_BOOT2_SIZE: 0x00200000
13:54:29 > EMMC_PRMB_SIZE: 0x00200000
13:54:29 > EMMC_GP1_SIZE: 0x00000000
13:54:29 > EMMC_GP2_SIZE: 0x00000000
13:54:29 > EMMC_GP3_SIZE: 0x00000000
13:54:29 > EMMC_GP4_SIZE: 0x00000000
13:54:29 > EMMC_USER_SIZE: 0x0E7000000(3.61 G)
13:54:29 >
>preloader.bin read success.
>MBR read success.
>EBR1 read success.
>lk.bin read success.
>boot.img read success.
>recovery.img read success.
>secro.img read success.
>logo.bin read success.
>system.img read success.
>Pass cache.img
>Pass userdata.img
>>Reading completed.
13:56:47 > File save path:G:\MerapiTool\MerapiTool_v1.3.2_20150916\backup\MT6572-2015-12-24 16_24_37\
MOBICEL RETRO MT6572 4GB EMMC DEAD ALIVE BY READ FULL FACTORY FILE FROM SAME WORKING PHONE WITH MERAPI TOOL.
Author: Unknown | 00:36 | 6 Comments |
Swip Helo Fone 3G Fablet Factory File Read Done on Boot Mode by Merapi Tool
Author: Unknown | 00:35 | No Comments |
Swip Helo Fone 3G Fablet Factory File Read Done on Boot Mode by Merapi Tool
Swip Helo Fone 3G Fablet Factory File Read Done on Boot Mode by Merapi Tool
Swip Helo Fone 3G Fablet Factory File Read Done on Boot Mode by Merapi Tool
Code:
>>Analysis of USB port,Please insert phone USB cable.
11:55:19 > Connecting...
11:55:19 > CPU TYPE:MT6582
11:55:19 > Hardware version:CA01
11:55:19 > Software version:0001
11:55:19 > SecCfgVal :0x00000000
11:55:19 > BromVersion :0xFF
11:55:19 > BLVersion :0x01
>>Boot downloading complete!
11:55:28 > EMMC_ID:0x110100303034473930101CE56A5041F3
11:55:28 > EMMC_PRODUCT_NAME: SAMSUNG :0x303034473930
11:55:28 > EMMC_BOOT1_SIZE: 0x00200000
11:55:28 > EMMC_BOOT2_SIZE: 0x00200000
11:55:28 > EMMC_PRMB_SIZE: 0x00080000
11:55:28 > EMMC_GP1_SIZE: 0x00000000
11:55:28 > EMMC_GP2_SIZE: 0x00000000
11:55:28 > EMMC_GP3_SIZE: 0x00000000
11:55:28 > EMMC_GP4_SIZE: 0x00000000
11:55:28 > EMMC_USER_SIZE: 0x0EC000000(3.69 G)
11:55:28 >
>preloader.bin read success.
>MBR read success.
>EBR1 read success.
>lk.bin read success.
>boot.img read success.
>recovery.img read success.
>secro.img read success.
>logo.bin read success.
>EBR2 read success.
>system.img read success.
>Pass cache.img
>Pass userdata.img
>>Reading completed.
11:58:37 > File save path:G:\MerapiTool\MerapiTool_v1.3.2_20150916\backup\MT6582-2015-12-24 14_25_36\
Hi-Tech S410 MTK eMMC Read Pattern Done on Boot Mode by Merapi Tool
Author: Unknown | 00:33 | No Comments |
Micromax A37B MT6572 Read / Write Flash , Clean Virus & Format Done With Merpai Beta
Author: Unknown | 00:33 | No Comments |
Micromax A37B MT6572 Read / Write Flash , Clean Virus & Format Done With Merpai Beta
Micromax A37B MT6572 Read / Write Flash , Clean Virus & Format Done With Merpai Beta
Remove Virus
Format
Read Factory Flash
Write File With Factory Tool
Read Flash ( BIN )
Write Flash ( BIN )
Remove Virus
Format
Read Factory Flash
Write File With Factory Tool
Read Flash ( BIN )
Write Flash ( BIN )
PROTOZ TAB MT6572 4GB EMMC READ FULL FACTORY FILE READ BIN FILE WRITE BIN FILE FORMAT DONE.
Author: Unknown | 00:28 | 2 Comments |
Samsung n9006 stop on logo solve
Author: Unknown | 00:27 | No Comments |
world first Samsung 9060i MTk 6572 Nand Success on Merapi cm2 fail
Author: Unknown | 00:26 | No Comments |
world first Samsung 9060i MTk 6572 Nand Success on Merapi cm2 fail
Merapi read info Success
Code:
>>Analysis of USB port,Please insert phone USB cable.
13:31:41 > Connecting...
13:31:41 > CPU TYPE:MT6572
13:31:41 > Hardware version:CA01
13:31:41 > Software version:0000
13:31:41 > SecCfgVal :0x00000000
13:31:41 > BromVersion :0xFF
13:31:41 > BLVersion :0x01
>>Boot downloading complete!
13:31:50 > FlashID:00EC00BC00000055
13:31:50 > Flash Type: NAND_K9K4G16Q0M
13:31:50 > FlashLen:20000000
13:31:50 >
13:31:50 >
13:31:50 >
13:31:50 > Analysis of system files...
13:31:50 > PRELOADER:>>addr:0x000000 --length:0x080000
13:31:50 > PRO_INFO:>>addr:0x080000 --length:0x100000
13:31:50 > NVRAM:>>addr:0x180000 --length:0x180000
13:31:50 > PROTECT_F:>>addr:0x300000 --length:0x180000
13:31:50 > PROTECT_S:>>addr:0x480000 --length:0x180000
13:31:50 > SECCFG:>>addr:0x600000 --length:0x020000
13:31:50 > UBOOT:>>addr:0x620000 --length:0x060000
13:31:50 > BOOTIMG:>>addr:0x680000 --length:0x600000
13:31:50 > RECOVERY:>>addr:0xC80000 --length:0x600000
13:31:50 > SEC_RO:>>addr:0x1280000 --length:0x040000
13:31:50 > MISC:>>addr:0x12C0000 --length:0x060000
13:31:50 > LOGO:>>addr:0x1320000 --length:0x100000
13:31:50 > EXPDB:>>addr:0x1420000 --length:0x200000
13:31:50 > FAT:>>addr:0x1620000 --length:0x1E00000
13:31:50 > ANDROID:>>addr:0x3420000 --length:0x14000000
13:31:50 > CACHE:>>addr:0x17420000 --length:0x700000
13:31:50 > USRDATA:>>addr:0x17B20000 --length:0x7AA0000
13:31:50 > BMTPOOL:>>addr:0xFFFF0050 --length:0x000000
13:31:50 >
13:31:50 >
13:31:50 > Format addr:0x17B20000 --Format length:0x7AA0000
Read factory file 100% Success
Read Bin file Success
Merapi Format 100% safe and Success
VolcanoBox 1.3.9 MerapiTool !! Added hot Things inside !! Check it out
Author: Unknown | 00:24 | No Comments |
VolcanoBox 1.3.9 MerapiTool !! Added hot Things inside !! Check it out
Gionee P2 MT6572 Full Test Report With Merapi Upcoming Version 1.3.9 Beta
Read Factory Flash File
Write Factory Flash
Read Flash ( BIN )
Write Flash ( BIN )
Read Factory Flash File
Write Factory Flash
Read Flash ( BIN )
Write Flash ( BIN )
Uber 794Q
Mt-6582 8gb Emmc
!Scatter Backup Success!
Mt-6582 8gb Emmc
!Scatter Backup Success!
Code:
11:44:01 Access to functional permissions from server...OK! 11:44:01 11:44:01 11:44:01 11:44:01 11:44:04 Connecting... 11:44:05 CPU TYPE:MT6582 11:44:05 Hardware version:CB00 11:44:05 Software version:0001 11:44:05 SecCfgVal :0x00000000 11:44:05 BromVersion :0xFF 11:44:05 BLVersion :0x01 11:44:09 Boot downloading... 11:44:11 EMMC_ID:0x7901004D4D433038474505B9529B51D7 11:44:11 EMMC_PRODUCT_NAME: SAMSUNG :0x4D4D43303847 11:44:11 EMMC_BOOT1_SIZE: 0x00200000 11:44:11 EMMC_BOOT2_SIZE: 0x00200000 11:44:11 EMMC_PRMB_SIZE: 0x00200000 11:44:11 EMMC_GP1_SIZE: 0x00000000 11:44:11 EMMC_GP2_SIZE: 0x00000000 11:44:11 EMMC_GP3_SIZE: 0x00000000 11:44:11 EMMC_GP4_SIZE: 0x00000000 11:44:11 EMMC_USER_SIZE: 0x1CD000000(7.20 G) 11:44:11 11:44:17 11:44:17 11:44:17 Analysis of system files... 11:44:17 PRELOADER:>>addr:0x000000 --length:0xC00000 11:44:17 MBR:>>addr:0xC00000 --length:0x080000 11:44:17 EBR1:>>addr:0xC80000 --length:0x080000 11:44:17 PRO_INFO:>>addr:0xD00000 --length:0x300000 11:44:17 NVRAM:>>addr:0x1000000 --length:0x500000 11:44:17 PROTECT_F:>>addr:0x1500000 --length:0xA00000 11:44:17 PROTECT_S:>>addr:0x1F00000 --length:0xA00000 11:44:17 SECCFG:>>addr:0x2900000 --length:0x020000 11:44:17 UBOOT:>>addr:0x2920000 --length:0x060000 11:44:17 BOOTIMG:>>addr:0x2980000 --length:0x1000000 11:44:17 RECOVERY:>>addr:0x3980000 --length:0x1000000 11:44:17 SEC_RO:>>addr:0x4980000 --length:0x600000 11:44:17 MISC:>>addr:0x4F80000 --length:0x080000 11:44:17 LOGO:>>addr:0x5000000 --length:0x300000 11:44:17 EXPDB:>>addr:0x5300000 --length:0xA00000 11:44:17 ANDROID:>>addr:0x5D00000 --length:0x3E800000 11:44:17 CACHE:>>addr:0x44500000 --length:0x7E00000 11:44:17 USRDATA:>>addr:0x4C300000 --length:0x7FE00000 11:44:17 BMTPOOL:>>addr:0xFFFF00A8 --length:0x1500000 11:44:17 11:44:17 11:44:17 >>Format addr:0x4C300000 --Format length:0x7FE00000 11:44:17 Read phone information success. 11:44:17 It will take severl minutes to Unlock,please wait... 11:44:22 Not find lock data .
Code:
11:44:36 Access to functional permissions from server...OK! 11:44:36 11:44:36 11:44:36 11:44:36 11:44:40 Connecting... 11:44:40 CPU TYPE:MT6582 11:44:40 Hardware version:CB00 11:44:40 Software version:0001 11:44:40 SecCfgVal :0x00000000 11:44:40 BromVersion :0xFF 11:44:40 BLVersion :0x01 11:44:43 Boot downloading... 11:44:45 EMMC_ID:0x7901004D4D433038474505B9529B51D7 11:44:45 EMMC_PRODUCT_NAME: SAMSUNG :0x4D4D43303847 11:44:45 EMMC_BOOT1_SIZE: 0x00200000 11:44:45 EMMC_BOOT2_SIZE: 0x00200000 11:44:45 EMMC_PRMB_SIZE: 0x00200000 11:44:45 EMMC_GP1_SIZE: 0x00000000 11:44:45 EMMC_GP2_SIZE: 0x00000000 11:44:45 EMMC_GP3_SIZE: 0x00000000 11:44:45 EMMC_GP4_SIZE: 0x00000000 11:44:45 EMMC_USER_SIZE: 0x1CD000000(7.20 G) 11:44:45 11:44:53 Reading preloader.bin . 11:44:56 Reading MBR . 11:44:56 Reading EBR1 . 11:44:56 Reading lk.bin . 11:44:56 Reading boot.img . 11:44:59 Reading recovery.img . 11:45:02 Reading secro.img . 11:45:03 Reading logo.bin . 11:45:03 Reading system.img . 11:48:02 pass 11:48:02 pass 11:48:02 11:48:04 File save path:E:\D\Box setup\Merapi\MerapiTool_v1.3.2_20150921\backup\MT6582-2015-12-23 14_14_53\
yllix pop
Popular Posts
-
All Vivo Official Stock Firmwares Flash File 100% Free Download Now All official Stock Firmwares Vivo V1: PD1502F_EX_A_1.15....
-
QMobile Noir X30 MT6572 Hang on Logo Solve Done With Avengers Box Flash files count is :3 Action : Firmware update. Selected Mod...
-
Samsung J500F ORG FRP Reset Done 2016 Security Reset Done By Great Octoplus Samsung J500F ORG FRP Reset Done 2016 Security Reset Done By...
-
samsung sm-j700f frp lock problem samsung sm-j700f frp lock problem Operation: Reset FRP/React/EE Se...
-
Samsung J120f Unlock Done Read Info Code: Platform: Samsung Android Selected port: COM1 Selected model: SM-...
-
I have j500f that I write to it cert and everything was running smoothly but the IMEI is /01 now and i tried to flash new firmware and to ...
-
It possible to perform this operation with octopus box?if yes,where are the cert file for this model?in the area support th...
-
merapi tool forgot user name and password my device id : 851-327-878 I forgot my user name and password pleas...
Powered by Blogger.