All SMARTPHONE FLASH FILE All SAMSUNG NOKIA SONY LG HTC CHINA SYMPHONY LAVA IPHONE

Showing posts with label Volcano Box Successfully. Show all posts
Showing posts with label Volcano Box Successfully. Show all posts

Wednesday, 17 February 2016

How to Qmobile B260 Read Code 100% Tested Here


read code done easly

 

 

 v2.24
1.Samsung FRP Unlock Added More Models.
2.Samsung Improve Read PIT and Write Flash
3.MTK Add Meta Mode New Method (Support 6595,6732,6735,6795).
4.MTK Improve IMEI Repair In Meta Mode.
5.MTK Improve Network Unlock (6572).
6.MTK EMMC Add Remove Virus (No ADB, No Root).
7.SPD Add SP Unlock (Beta).
8.SPD Improve EMMC Read.
9.Android Add Virus Cleaner (Take Time So Need Wait).

v2.23
1.SPD Add 7715 EMMC Read,Write, Format Support.
2.SPD Add 7715 EMMC Read Pattern,PhoneBook,.
3.SPD Add 7715 EMMC Read Info,Reset Usercode Support.
4.MTK Add Nokia RM-1133,1136 Read,Write Support.
5.MTK Add Nokia RM-1133,1136 Read Code and format support.
6.CDMA Add Haeir CG550 SP-Unlock Support.
7.MTK Improve EMMC Read.
8.Android Improve Monkey Virus Cleaner.
9. Other Small Problem Fixed.

v2.22
1.Samsung Add Reset Factory Reset Protection (FRP).
2.Samsung Improve Read PIT.
3.Samsung Improve Write Flash.
4.Samunsung Reboot Download Mode Added.
5.MTK Improve EMMC Read (Save as Scatter File).
6.MTK Improve Read Flash.
7.MTK Improve Format add Advanced Mode.
8.CDMA Improve LAVA-C180 Flash.
9.SPD Add SC6815/7731/30/15/8830 Format (Advanced).
10.SPD Improve SC6815/7731/30/15/8830 Read info.

v2.21
1.MTK Add EMMC Read Sim Lock Code New Algorithms
2.MTK Add IMEI Add New Algorithms (NEW )(BT)).
3.MTK Add IMEI Add New Method (Factory Mode).
4.MTK Improve MTK EMMC Read (Save as Scatter File).
5.CDMA Add CDMA LAVA-C181 SP-Unlock.
6.CDMA Add CDMA LAVA-CG142J SP-Unlock.
7.CDMA Add CDMA LAVA-C180 SP-Unlock.
8.CDMA Add LAVA-C180 Flash.
9.Fix Software some BUGS.

v2.20 (9th October 2015)
1.MTK Add 6795/6752 EMMC Read Sim Lock Code (World's First).
2.MTK Improve IMEI Method (NEW).
3.MTK Improve 6572/6571 Nand Read Phonebook/Pattern.
4.Android Add  Monkey Virus Cleaner (World First).
5.SPD Improve SC7715 Nand Read Phonebook/Pattern (World's First).
6.Improve Registration Function.
7.Fix Software Some BUGS.
8. CDMA Tab Added.
9. Download Support Improved.

v2.19C (Internal) (7th October 2015)
WORLD'S FIRST FEATURES IN CHINA BOX.
1.SPD Add SC6815 EMMC Read / Write Support.
2.SPD Add SC6815 EMMC Format, IMEI NV Read/  Write Support.
3.SPD Add SC6815 EMMC Read Phonebook / Pattern.
4.SPD Add SC6815 / 7731 / 30 / 15 / 8830 Reset User Code (World First).
5.MTK Add 6573 / 6575 / 6577 Nand Read Phonebook / Pattern.
6.MTK Add 6573 / 6575 / 6577 Reset User Code (World First).
7.MTK Add MT6795 / 6580 EMMC Read / Write Support.
8.MTK Add MT6795 / 6580 EMMC Format, IMEI.
9.MTK Add MT6795 EMMC Reset Code,Read Pattern.
10.MTK Add New IMEI Method (NEW).
11.MTK Add Android NV Read / Write.
12.CDMA Add ZTE-183 Unlock (World First) in China Box.
13.CDMA Add ZTE-D286 Unlock (World First) in China Box.
14.CDMA Add Haier-C381 Unlock (World First) in China Box.
15.CDMA Add ZTE-S194 Unlock (World First) in China Box.
16.Samsung More More Support Flashing.
17.Server Change.
18.Add Registration Function.
19.Some Internal Algo Updates.
20.GUI and BUG Fix.
21.Connectivity Bug Solved.
22.CDMA TAB Added.
23.Download Support Working.

Sunday, 24 January 2016

All Mtk Updated Tools Free MTK6276 Reall Update Support XYZ Tool Say We Are Support Before 2 year But.

World Ist MTK6276 Reall Update Support XYZ Tool Say We Are Support Before 2 year But.


World Ist Only With Volcano Merapi Tool Fully Supported Mtk6276

We Are Always Give Best and Perfact Solution For Volcano Merapi Tool User.

Some XYZ Tool Say We are Supported This Cpu Before 2year But One Question Please Show Any One Post for Write Firmware ?
Baby Tool Also Supported But No Write Yet.
Just Read,Format,and Imei Repair .

But Your Lovely Volcano Merapi Tool Fully Supported This Cpu.

Read,Write,Format Fully Supported

No Need Waiting Long For Writing Firmware .
No Any Problem After Write PHone Dead,
No Any Tension After Format PHone hang On Logo
no Any Tension After Write PHone Hang On Logo.

Why

Because We are Care Our User Always

AGAIN AND AGAIN WORLD FIRST… WHILE OTHER LOOSING TIME TO MAKE GOSSIP WE WORK HARD AND GIVING YOU MORE AND MORE WORLD FIRST DAY BY SAY…
MERAPI OFFLINE IS COMING SOON….MERAPI DONGLE ( FOR NON VOLCANO USERS ) IS COMINg SOON…

.

More Very Big News Coming Soon In Beta Thread.

CREATORS NEVER FOLLOW

Br

FullFlashPak

GPG Volcano Merapi Tool Team

Friday, 22 January 2016

Thursday, 21 January 2016

Volcano Box Merapi Tool Sucess Storys By CHAUDHRAY ARSHAD

Volcano Box Merapi Tool Sucess Storys By CHAUDHRAY ARSHAD


here log

http://i.imgur.com/xXkv9Ww.png

14:42:21 > Merapi Updated: 2016-01-07

>

14:43:08 > Analysis of system files...

14:43:08 > PRELOADER:>>addr:0x000000 --length:0x880000

14:43:08 > MBR:>>addr:0x880000 --length:0x080000

14:43:08 > EBR1:>>addr:0x900000 --length:0x080000

14:43:08 > PRO_INFO:>>addr:0x980000 --length:0x300000

14:43:08 > NVRAM:>>addr:0xC80000 --length:0x500000

14:43:08 > PROTECT_F:>>addr:0x1180000 --length:0xA00000

14:43:08 > PROTECT_S:>>addr:0x1B80000 --length:0xA00000

14:43:08 > SECCFG:>>addr:0x2580000 --length:0x020000

14:43:08 > UBOOT:>>addr:0x25A0000 --length:0x060000

14:43:08 > BOOTIMG:>>addr:0x2600000 --length:0x600000

14:43:08 > RECOVERY:>>addr:0x2C00000 --length:0x600000

14:43:08 > SEC_RO:>>addr:0x3200000 --length:0x040000

14:43:08 > MISC:>>addr:0x3240000 --length:0x080000

14:43:08 > LOGO:>>addr:0x32C0000 --length:0x300000

14:43:08 > EXPDB:>>addr:0x35C0000 --length:0xA00000

14:43:08 > ANDROID:>>addr:0x3FC0000 --length:0x3E800000

14:43:08 > CACHE:>>addr:0x427C0000 --length:0xE200000

14:43:08 > USRDATA:>>addr:0x509C0000 --length:0x979C0000

14:43:08 > BMTPOOL:>>addr:0xFFFF00A8 --length:0x000000

14:43:08 >

14:43:08 >

14:43:08 > >>Format addr:0x509C0000 --Format length:0x979C0000

>>

14:44:18 > Access to functional permissions from server...

14:44:21 > Access to functional permissions from server...OK!

14:44:21 >

14:44:21 >

14:44:21 >

>>Analysis of USB port,Please insert phone USB cable.

14:44:24 > Connecting...

14:44:24 > CPU TYPE:MT6572

14:44:24 > Hardware version:CA01

14:44:24 > Software version:0000

14:44:24 > SecCfgVal :0x00000000

14:44:24 > BromVersion :0xFF

14:44:24 > BLVersion :0x01

>>Boot downloading complete!

14:44:33 > EMMC_ID:0x150100463558354342017644C04512C5

14:44:33 > EMMC_PRODUCT_NAME: SAMSUNG :0x463558354342

14:44:33 > EMMC_BOOT1_SIZE: 0x00400000

14:44:33 > EMMC_BOOT2_SIZE: 0x00400000

14:44:33 > EMMC_PRMB_SIZE: 0x00080000

14:44:33 > EMMC_GP1_SIZE: 0x00000000

14:44:33 > EMMC_GP2_SIZE: 0x00000000

14:44:33 > EMMC_GP3_SIZE: 0x00000000

14:44:33 > EMMC_GP4_SIZE: 0x00000000

14:44:33 > EMMC_USER_SIZE: 0x0E9000000(3.64 G)

14:44:33 >

14:44:39 >

14:44:39 >

14:44:39 > Analysis of system files...

14:44:39 > PRELOADER:>>addr:0x000000 --length:0x880000

14:44:39 > MBR:>>addr:0x880000 --length:0x080000

14:44:39 > EBR1:>>addr:0x900000 --length:0x080000

14:44:39 > PRO_INFO:>>addr:0x980000 --length:0x300000

14:44:39 > NVRAM:>>addr:0xC80000 --length:0x500000

14:44:39 > PROTECT_F:>>addr:0x1180000 --length:0xA00000

14:44:39 > PROTECT_S:>>addr:0x1B80000 --length:0xA00000

14:44:39 > SECCFG:>>addr:0x2580000 --length:0x020000

14:44:39 > UBOOT:>>addr:0x25A0000 --length:0x060000

14:44:39 > BOOTIMG:>>addr:0x2600000 --length:0x600000

14:44:39 > RECOVERY:>>addr:0x2C00000 --length:0x600000

14:44:39 > SEC_RO:>>addr:0x3200000 --length:0x040000

14:44:39 > MISC:>>addr:0x3240000 --length:0x080000

14:44:39 > LOGO:>>addr:0x32C0000 --length:0x300000

14:44:39 > EXPDB:>>addr:0x35C0000 --length:0xA00000

14:44:39 > ANDROID:>>addr:0x3FC0000 --length:0x3E800000

14:44:39 > CACHE:>>addr:0x427C0000 --length:0xE200000

14:44:39 > USRDATA:>>addr:0x509C0000 --length:0x979C0000

14:44:39 > BMTPOOL:>>addr:0xFFFF00A8 --length:0x000000

14:44:39 >

14:44:39 >

14:44:39 > >>Format addr:0x509C0000 --Format length:0x979C0000

>>

14:45:06 > Access to functional permissions from server...

14:45:08 > Access to functional permissions from server...OK!

14:45:08 >

14:45:08 >

14:45:08 >

>>Analysis of USB port,Please insert phone USB cable.

14:45:13 > Connecting...

14:45:13 > CPU TYPE:MT6572

14:45:13 > Hardware version:CA01

14:45:13 > Software version:0000

14:45:13 > SecCfgVal :0x00000000

14:45:13 > BromVersion :0xFF

14:45:13 > BLVersion :0x01

>>Boot downloading complete!

14:45:22 > EMMC_ID:0x150100463558354342017644C04512C5

14:45:22 > EMMC_PRODUCT_NAME: SAMSUNG :0x463558354342

14:45:22 > EMMC_BOOT1_SIZE: 0x00400000

14:45:22 > EMMC_BOOT2_SIZE: 0x00400000

14:45:22 > EMMC_PRMB_SIZE: 0x00080000

14:45:22 > EMMC_GP1_SIZE: 0x00000000

14:45:22 > EMMC_GP2_SIZE: 0x00000000

14:45:22 > EMMC_GP3_SIZE: 0x00000000

14:45:22 > EMMC_GP4_SIZE: 0x00000000

14:45:22 > EMMC_USER_SIZE: 0x0E9000000(3.64 G)

14:45:22 >

>>Flash reading complete!

Tuesday, 19 January 2016

Samsung S6 Clone Mt6572 Read Bin/Read FFW/Write Bin/Clear Virus/Format By Merapi Tool

Samsung S6 Clone Mt6572 Read Bin/Read FFW/Write Bin/Clear Virus/Format By Merapi Tool


SAMSUNG S6 CLONE MT6572 4GB EMMC READ BIN READ FFW WRITE BIN CLEAR VIRUS AND FORMAT DONE BY GREAT MERAPI TOOL

NO NEED TO SCARRED ABOUT CLONE SAMSUNG PHONES BECAUSE MERAPI TOOL HAVE SECURE AND SAFE SYSTEM ABOUT ALL FEATURES.




EXTENDED INFO





READING BIN







FFW READ





BIN FILE WRITING




CLEAR VIRUS





FORMAT





STILL NEED MORE TEST FOR SATISFACTION?






CREATORS NEVER FOLLOW










Wednesday, 13 January 2016

Q Mobile E880 Rx Tx Flash Done With Volcano Box Successfully

Q Mobile E880 Flash Done With Volcano ..........


Q Mobile E880 Flash Done With Volcano ..........

Here Is Tested pin Out Me Ok ....................



Flash Image Here ......................



Flash File Here ...............

http://www.mediafire.com/?tw5gnan7gctso6w

Flash Log Here ....................

After format or Flash you have to press & hold power button for at least 1.30 mins.
Available Ports:COM1 COM2 COM37
Detection initiated, connect the phone and power on it...
Vcc: null
Gnd: null
Analyzing Rx and Tx...
MT625A, RX: 17, TX: 12
Setting...
Pinouts setting complete!
File versiTINNO50_12864_W1224_11B_PCB01_gprs_MT6250_S00 .F7100B_PP_F4_PK_F2_02_V9.bin
Searching for passwords...
Could not find any potential passwords.
[Privacy Lock]0000

Connecting...
Hardware version:CA01
Software version:0001
CPU TYPE:625A
Internal version:8000
Boot downloading complete!
Flash ID: 00C20025
Flash Type: SF_MX25U12835FZNI_10G
Chip Capacity: 0x1000000(16MB)
Baud adjust...complete.
This detected file is not encrypted and it¡¯s safe to write data.
Flash writing MTKFile4...100%
>>Flash file C:\Documents and Settings\Naeem123e\My Documents\Downloads\Compressed\Qmobile e880\Qmobile e880\TINNO50_12864_W1224_11B_PCB01_gprs_MT6250_S00 .F7100B_PP_F4_PK_F2_02_V9.bin has been written.

World Ist Q Mobile X30 Mtk6572 Formart/Write Firmware Done With Only Merapi Tool Successfully

World Ist Q Mobile X30 Mtk6572 Formart/Write Firmware Done With Only Merapi Tool


Once Again World Ist Q Mobile X30 Mtk6572 4.4 Kitkat Format/Write Firmware Done With PowerFull Merapi Tool.

Info Logs

Code:

16:52:52 > Connecting... 16:52:52 > CPU TYPE:MT6572 16:52:52 > Hardware version:CA01 16:52:52 > Software version:0000 16:52:52 > SecCfgVal :0x00000000 16:52:52 > BromVersion :0xFF 16:52:52 > BLVersion :0x01 >>Boot downloading complete! 16:52:57 > EMMC_ID:0x90014A48344732611101A3728E371221 16:52:57 > EMMC_PRODUCT_NAME: SAMSUNG :0x483447326111 16:52:57 > EMMC_BOOT1_SIZE: 0x00400000 16:52:57 > EMMC_BOOT2_SIZE: 0x00400000 16:52:57 > EMMC_PRMB_SIZE: 0x00400000 16:52:57 > EMMC_GP1_SIZE: 0x00000000 16:52:57 > EMMC_GP2_SIZE: 0x00000000 16:52:57 > EMMC_GP3_SIZE: 0x00000000 16:52:57 > EMMC_GP4_SIZE: 0x00000000 16:52:57 > EMMC_USER_SIZE: 0x0E9000000(3.64 G) 16:52:57 > 16:53:03 > 16:53:03 > 16:53:03 > Analysis of system files... 16:53:03 > PRELOADER:>>addr:0x000000 --length:0xC00000 16:53:03 > MBR:>>addr:0xC00000 --length:0x080000 16:53:03 > EBR1:>>addr:0xC80000 --length:0x080000 16:53:03 > PRO_INFO:>>addr:0xD00000 --length:0x300000 16:53:03 > NVRAM:>>addr:0x1000000 --length:0x500000 16:53:03 > PROTECT_F:>>addr:0x1500000 --length:0xA00000 16:53:03 > PROTECT_S:>>addr:0x1F00000 --length:0xA00000 16:53:03 > SECCFG:>>addr:0x2900000 --length:0x020000 16:53:03 > UBOOT:>>addr:0x2920000 --length:0x060000 16:53:03 > BOOTIMG:>>addr:0x2980000 --length:0x600000 16:53:03 > RECOVERY:>>addr:0x2F80000 --length:0x600000 16:53:03 > SEC_RO:>>addr:0x3580000 --length:0x040000 16:53:03 > MISC:>>addr:0x35C0000 --length:0x080000 16:53:03 > LOGO:>>addr:0x3640000 --length:0x300000 16:53:03 > EXPDB:>>addr:0x3940000 --length:0xA00000 16:53:03 > ANDROID:>>addr:0x4340000 --length:0x3D400000 16:53:03 > CACHE:>>addr:0x41740000 --length:0xE200000 16:53:03 > USRDATA:>>addr:0x4F940000 --length:0x98DC0000 16:53:03 > BMTPOOL:>>addr:0xFFFF00A8 --length:0x1500000 16:53:03 > 16:53:03 > 16:53:03 > >>Format addr:0x4F940000 --Format length:0x98DC0000 16:53:03 > Read phone information success.

Format Logs,

Code:

16:55:38 > Connecting... 16:55:38 > CPU TYPE:MT6572 16:55:38 > Hardware version:CA01 16:55:38 > Software version:0000 16:55:38 > SecCfgVal :0x00000000 16:55:38 > BromVersion :0xFF 16:55:38 > BLVersion :0x01 >>Boot downloading complete! 16:55:43 > EMMC_ID:0x90014A48344732611101A3728E371221 16:55:43 > EMMC_PRODUCT_NAME: SAMSUNG :0x483447326111 16:55:43 > EMMC_BOOT1_SIZE: 0x00400000 16:55:43 > EMMC_BOOT2_SIZE: 0x00400000 16:55:43 > EMMC_PRMB_SIZE: 0x00400000 16:55:43 > EMMC_GP1_SIZE: 0x00000000 16:55:43 > EMMC_GP2_SIZE: 0x00000000 16:55:43 > EMMC_GP3_SIZE: 0x00000000 16:55:43 > EMMC_GP4_SIZE: 0x00000000 16:55:43 > EMMC_USER_SIZE: 0x0E9000000(3.64 G) 16:55:43 > 16:55:50 > 16:55:50 > 16:55:50 > Analysis of system files... 16:55:50 > PRELOADER:>>addr:0x000000 --length:0xC00000 16:55:50 > MBR:>>addr:0xC00000 --length:0x080000 16:55:50 > EBR1:>>addr:0xC80000 --length:0x080000 16:55:50 > PRO_INFO:>>addr:0xD00000 --length:0x300000 16:55:50 > NVRAM:>>addr:0x1000000 --length:0x500000 16:55:50 > PROTECT_F:>>addr:0x1500000 --length:0xA00000 16:55:50 > PROTECT_S:>>addr:0x1F00000 --length:0xA00000 16:55:50 > SECCFG:>>addr:0x2900000 --length:0x020000 16:55:50 > UBOOT:>>addr:0x2920000 --length:0x060000 16:55:50 > BOOTIMG:>>addr:0x2980000 --length:0x600000 16:55:50 > RECOVERY:>>addr:0x2F80000 --length:0x600000 16:55:50 > SEC_RO:>>addr:0x3580000 --length:0x040000 16:55:50 > MISC:>>addr:0x35C0000 --length:0x080000 16:55:50 > LOGO:>>addr:0x3640000 --length:0x300000 16:55:50 > EXPDB:>>addr:0x3940000 --length:0xA00000 16:55:50 > ANDROID:>>addr:0x4340000 --length:0x3D400000 16:55:50 > CACHE:>>addr:0x41740000 --length:0xE200000 16:55:50 > USRDATA:>>addr:0x4F940000 --length:0x98DC0000 16:55:50 > BMTPOOL:>>addr:0xFFFF00A8 --length:0x1500000 16:55:50 > 16:55:50 > 16:55:50 > Read phone information success. 16:56:04 > Format range: Start Address: 0x4F941000,Format Length :0x98DBF000 >>Flash erasing complete! >>Check the data complete. 16:56:22 > 16:56:22 > Please take out SIM and Memory card from phone when power on first time, or it will have Memory Lock . 16:56:22 > If you meet Memory Lock,please take all cards from phone and restart phone again.

Screen Short

Write Firmware With merapi Tool

Code:

Phone must be off with battery inside. Please insert USB cable now... Detected : PreLoader USB VCOM Port (COM5) Phone detected...Please wait Sending DA agent, please wait... BBCHIP MT6572_S00 EMMC: (29Gb+4096Mb) HYNIX 0x483447326111 EMMC FW VERSION: 01:00:00:00:00:00:00:00 BOOT STYLE : EMMC BOOT Detecting high speed port, wait...... If driver not installed, install high speed port driver. Detected : MediaTek DA USB VCOM Port (COM9) Starting flash. Send preloader... Download firmware to flash now... MBR checksum is executing ... EBR1 checksum is executing ... UBOOT checksum is executing ... BOOTIMG checksum is executing ... RECOVERY checksum is executing ... SEC_RO checksum is executing ... LOGO checksum is executing ... ANDROID checksum is executing ... CACHE checksum is executing ... USRDATA checksum is executing ... After flash this firmware need to perform some aditional steps 1.Reinsert battery, keep VOL- and power on untill phone will come in factory mode 2.Select line EMMC, and after press home button. 3.Wait untill phone will restart and will stuck on logo(leave for 1 min in this stage). 4.If phone not power on, reinsert battery and perform direct unlock. If repair fail, please contact us or report in forum to provide help. Wait untill phone will start charging. All done.

Regard

FullFlashPak

Tuesday, 12 January 2016

How to Samsung S7582 Monkey Clear Done Successful Report

How to Samsung S7582 Monkey Clear Done Successful Report

Samsung S7582 Monkey Clear Done


Analysis of USB port,Please insert phone USB cable.

Connecting...

CPU TYPE:MT6575

Hardware version:CB00

Software version:E201

SecCfgVal :0x00000000

BromVersion :0xFF

BLVersion :0x01

Boot downloading complete!

EMMC_ID:0x90014A2058494E594816A1F4562CCFEB

EMMC_PRODUCT_NAME: SAMSUNG :0x2058494E5948

EMMC_BOOT1_SIZE: 0x00200000

EMMC_BOOT2_SIZE: 0x00200000

EMMC_PRMB_SIZE: 0x00200000

EMMC_GP1_SIZE: 0x00000000

EMMC_GP2_SIZE: 0x00000000

EMMC_GP3_SIZE: 0x00000000

EMMC_GP4_SIZE: 0x00000000

EMMC_USER_SIZE: 0x0E7000000(3.61 G)

Analysis of system files...

PRELOADER: addr:0x000000 --length:0x040000

DSP_BL: addr:0x040000 --length:0x5C0000

MBR: addr:0x600000 --length:0x004000

EBR1: addr:0x604000 --length:0x05C000

__NODL_PMT: addr:0x660000 --length:0x400000

__NODL_NVRAM: addr:0xA60000 --length:0x300000

__NODL_SECCFG: addr:0xD60000 --length:0x020000

UBOOT: addr:0xD80000 --length:0x060000

BOOTIMG: addr:0xDE0000 --length:0x600000

RECOVERY: addr:0x13E0000 --length:0x600000

SEC_RO: addr:0x19E0000 --length:0x600000

__NODL_MISC: addr:0x1FE0000 --length:0x060000

LOGO: addr:0x2040000 --length:0x300000

__NODL_EXPDB: addr:0x2340000 --length:0x0A0000

EBR2: addr:0x23E0000 --length:0x004000

ANDROID: addr:0x23E4000 --length:0x20000000

CACHE: addr:0x223E4000 --length:0x20000000

USRDATA: addr:0x423E4000 --length:0x20000000

__NODL_FAT: addr:0x623E4000 --length:0x8481C000

__NODL_BMTPOOL: addr:0xFFFF0050 --length:0xA00000

Format addr:0x423E4000 --Format length:0x20000000

Read phone information success.

Check the data complete.

Clear virus complete.

>>Before power on the phone, please do a format, clear the user data...

IM3022

How to vgo tel i100 pasword code read done Free Successfully 2016

vgo tel i100 pasword code read done


vgo tel i100 pasword code read done

[url=http://postimage.org/]20mb image hosting[/url

PHP Code:

  Internal version: SPRD3
  Boot downloaded.
  Start boot please wait a moment....
  Spreadtrum Boot Block version 1.2
  CPU TYPE:SC6531 [65310001]
  FLASH ID: 00EF004000160000
  Flash Type: SF_W25Q32BV                
  Size:0x400000(4MB)
  Reading completed.
  The data has been saved in C:\Documents and Settings\asif\Desktop\_20150216_142337_FullFlash vgo tel i100.bin, size: 4 M.
  Screen Lock input order:
    ¢Ù ¢Ú ¢Û
    ¢Ü ¢Ý ¢Þ
    ¢ß ¢à ¢á
   
  Software has two ways to find password, it may have different results to click button again.
  Simple search:
  [theft-proof lock]:999999
  Looking for passwords,please wait...
  [Phone Lock]  1234
  [Phone Lock]  5522
>>Looking for passwords complete. 

yllix pop

Popular Posts

Powered by Blogger.

Followers

statistics

Recent Posts