Huawei Y3 2017 Cro-U00 Frp Remove Successfully! By Volcano InfernoTool

Admin

https://www.facebook.com/sohan.telecom
https://www.facebook.com/groups/1927537257262063/
http://sohan-tel.blogspot.com/

https://youtu.be/xE6zXyJDexc
Boot File Link 
FREE

Read phone info OK.
Elapsed time: 00:01:25.
Available Ports:COM1 COM2 COM39 
Current Port:Com0
Current Task:
Read Information(Extend)
21:14:17 Ver:1.4.2
CUSTOM BOOT
DA File:ManFile_0
DA Ver.:MTK_AllInOne_DA_v3.3001.00.00
Operation:
1. Power off the phone.
2. Please insert USB cable within 40 seconds.
PreLoader USB VCOM Port (COM31)
Connecting...
CPU TYPE:MT6580
Hardware version:CA00
Software version:0000
SecCfgVal :0x05000000
BromVersion :0xFF
BLVersion :0x01
Boot downloading...
EMMC_ID:0x150100464E58324D420625F9F0F3247D
EMMC_PRODUCT_NAME: 0x464E58324D42
EMMC_BOOT1_SIZE: 0x00400000
EMMC_BOOT2_SIZE: 0x00400000
EMMC_PRMB_SIZE: 0x00080000
EMMC_GP1_SIZE: 0x00000000
EMMC_GP2_SIZE: 0x00000000
EMMC_GP3_SIZE: 0x00000000
EMMC_GP4_SIZE: 0x00000000
EMMC_USER_SIZE: 0x1D2000000(7.28 G)
INT RAM: 128KB SDRAM    EXT RAM: 1GB DRAM
Finding partition.
Total partition entries found: 28
preloader:>>addr:0x000000  -- length:0x040000
pgpt:>>addr:0x000000  -- length:0x080000
proinfo:>>addr:0x080000  -- length:0x300000
nvram:>>addr:0x380000  -- length:0x500000
protect1:>>addr:0x880000  -- length:0xA00000
protect2:>>addr:0x1280000  -- length:0xA00000
seccfg:>>addr:0x1C80000  -- length:0x080000
lk:>>addr:0x1D00000  -- length:0x080000
boot:>>addr:0x1D80000  -- length:0x1000000
recovery:>>addr:0x2D80000  -- length:0x1000000
para:>>addr:0x3D80000  -- length:0x080000
logo:>>addr:0x3E00000  -- length:0x800000
bak:>>addr:0x4600000  -- length:0x800000
bakraw:>>addr:0x4E00000  -- length:0x200000
simlock:>>addr:0x5000000  -- length:0x800000
custom:>>addr:0x5800000  -- length:0xC800000
expdb:>>addr:0x12000000  -- length:0xA00000
frp:>>addr:0x12A00000  -- length:0x100000
nvdata:>>addr:0x12B00000  -- length:0x2000000
metadata:>>addr:0x14B00000  -- length:0x2500000
oemkeystore:>>addr:0x17000000  -- length:0x200000
secro:>>addr:0x17200000  -- length:0x600000
keystore:>>addr:0x17800000  -- length:0x800000
system:>>addr:0x18000000  -- length:0x9C800000
cache:>>addr:0xB4800000  -- length:0xF000000
userdata:>>addr:0xC3800000  -- length:0x10D780000
flashinfo:>>addr:0xFFFF0084  -- length:0x1000000
sgpt:>>addr:0xFFFF0004  -- length:0x080000
BasicInfo :
Brand     : HUAWEI
ProdName  : CRO-U00
ProdModel : CRO-U00
Device    : HWCRO-U6580M
AndroidVer: 6.0
MTK CPU   : MT6580
MTK PRJ   : alps-mp-m0.mp1-V2.39_ot6580.weg.y33.m_P117
Display ID: Cairo-U00C636B125
Board ID  : CRO-U00
Build Date: Tue Jul 18 10:46:59 CST 2017
IMEI_1    :  863608030XXXXXX
IMEI_2    :  863608033XXXXXX
 CUSTOM BOOT
DA File:ManFile_0
DA Ver.:MTK_AllInOne_DA_v3.3001.00.00
Operation:
1. Power off the phone.
2. Please insert USB cable within 40 seconds.
PreLoader USB VCOM Port (COM31)
Connecting...
CPU TYPE:MT6580
Hardware version:CA00
Software version:0000
SecCfgVal :0x05000000
BromVersion :0xFF
BLVersion :0x01
Boot downloading...
EMMC_ID:0x150100464E58324D420625F9F0F3247D
EMMC_PRODUCT_NAME: 0x464E58324D42
EMMC_BOOT1_SIZE: 0x00400000
EMMC_BOOT2_SIZE: 0x00400000
EMMC_PRMB_SIZE: 0x00080000
EMMC_GP1_SIZE: 0x00000000
EMMC_GP2_SIZE: 0x00000000
EMMC_GP3_SIZE: 0x00000000
EMMC_GP4_SIZE: 0x00000000
EMMC_USER_SIZE: 0x1D2000000(7.28 G)
INT RAM: 128KB SDRAM    EXT RAM: 1GB DRAM
Finding partition.
Clear FRP successfully!
Sigma Box
How to enter fastboot mode on this phone:
1) Enter boot mode menu (Vol+ and power on)
2) Select "Fastboot" mode (vol+) and confirm with "vol -" button
Quote:
SigmaKey 2.26.04 MTK: Remove FRP
Phone model: HUAWEI CRO-U00
Version: Cairo-U00C10B101
Removing FRP lock.....Done

Select "MTK" platform from the tab menu in the upper left side of the software
Go to "Service" tab
Turn the phone OFF
Set the phone to FastBoot mode:
press and hold “VOL-“ button and connect the phone to PC, using USB cable (or use any other method)
Select “Android ADB interface” port
Press “Remove FRP” button
The message "Removing FRP lock...OK" indicates that procedure has been completed successfully
Disconnect the device
Warning: This feature will erase all phone’s data and accounts
If after FRP removal user data was not wiped automatically, perform this procedure manually in the recovery mode.
Share:

Huawei Y625-U32 B110 FREE Firmware Flash File 100% Tested

Admin

Update Failed (Error )
SD Update Fix
Y625-U32V100R001C567B110 
Huawei Y625-U32 B110 FREE Firmware Flash File 100% Tested
Y625-U32V100R001C567B110 FREE
Huawei Y625-u32 B110 Firmware  Flash File FREE
Huawei Y625-u32 B110  Flash Firmware  File FREE
Huawei Y625-u32 B110 Firmware  Stock Rom Flash File FREE
Huawei Y625-u32 B110 Firmware  FREE
Huawei Y625-u32 B110  Flash FREE
Breack Phone Fixed,Dead Fixed,Boot Repiar Fixed,All Problem Fixed Tested


Share:

Symphony I20_HW2_V11 FREE LCD FIX Frp FIX Flash File Firmware Dead Boot

Admin
 Symphony i20 MT6580_6.0__i20_HW2_V11

i20-HW2 DEAD PHONE,HANG LOGO,LCD BLANK,CAMERA FIX,MONKEY VIRUS CLEAN DONE FLASH FILE BY Sohan-Telecom

Brand     : Symphony
ProdName  : i20
ProdModel : i20
Device    : i20
AndroidVer: 6.0
MTKxCPU   : MT6580
MTKxPRJ   : i20_HW2_V11
PassWord Sohan-Telecom

Share:

Symphony H400 HW2 V17 FREE Flash File MT6735 6.0 100% Tested Android Firmware

Admin Md Shohel

 Reading Project Property ...
 Brand          : Symphony
 Phone Model    : H400
 Android Ver    : 6.0
 CPU/Processor  : MT6735
 MTK Project ver: alps-mp-m0.mp1-V2.39.1_pri6735.65u.m0_P23
 SW Version     : H400_HW2_V17

H400-HW2 DEAD PHONE,HANG LOGO,LCD BLANK,CAMERA FIX,MONKEY VIRUS CLEAN DONE FLASH FILE BY Sohan-Telecom

Password Sohan-Telecom


Share:

Symphony V75 HW2 FREE Flash File Stock Rom Firmware Frp Fix

Admin

V75-HW2 DEAD PHONE,HANG LOGO,LCD BLANK,CAMERA FIX,MONKEY VIRUS CLEAN DONE FLASH FILE BY Sohan-Telecom

Reading Project Property ...
 Brand           : Symphony
 Phone Model     : V75
 Android Ver     : 6.0
 CPU/Processor   : v2808_V1.0.0
 SPD Project ver : v2808-user 6.0 MRA58K eng.android.1482838674 release-keys
 SW Version      : MRA58K release-keys
 Making dir: C:\Users\Sohan-Tel\Desktop\spd_7731C_EMMC_Symphony_V75_Android6.0_MRA58K release-keys_20171012_
202450\...[ok]...[ok]...[ok]
 Dumping Flash Image Now...
 Reading splloader...ok
 Reading uboot...ok
 Reading recovery...ok
 Reading system...ok
 Reading userdata...ok
 Reading cache...ok
 Reading misc...ok
 Reading boot...ok
 Reading wmodem...ok
 Reading wdsp...ok
 Reading wfixnv1...ok
 Reading wcnfixnv1...ok
 Reading wcnmodem...ok
 Reading prodnv...ok
 Reading sysinfo...ok
 Reading logo...ok
 Reading fbootlogo...ok
 Packing ...
 Copying file: splloader...ok
 Copying file: uboot...ok
 Copying file: recovery...ok
 Copying file: system...ok
 Copying file: userdata...ok
 Copying file: cache...ok
 Copying file: boot...ok
 Copying file: wmodem...ok
 Copying file: wdsp...ok
 Copying file: wfixnv1...ok
 Copying file: wcnfixnv1...ok
 Copying file: wcnmodem...ok
 Copying file: prodnv...ok
 Copying file: sysinfo...ok
 Copying file: logo...ok
 Copying file: fbootlogo...ok
 Creating XML Settings ...ok
 Rebuilding Packet Header ...ok
 Deleting TmpDir...ok
 BinPacket saved to: C:\Users\Sohan-Tel\Desktop\CSTool_spd_7731C_EMMC_Symphony_V75_Android6.0_MRA58K release-
keys_20171012_202450.pac
 All done
Password Sohan-Telecom


Share:

SAMSUNG SM-J910F J900FN MT6572 4.2.2 FLASH FILE FREE DEAD RECOVER LCD CAMERA FIX UPDATE VERSION TESTED FIRMWARE

Admin



 Reading Project Property ...

 done.
 Making dir: C:\Users\Sohan-Tel\Desktop\MT6572_Samsung_SM-J900FN_Android4.2.2_J7209_J9_6.0.1_V1.2_20171008_142343\...[ok]
 Reading preloader ......ok
 Reading mbr ......ok
 Reading ebr1 ......ok
 Reading nvram ......ok
 Reading uboot ......ok
 Reading bootimg ......ok
 Reading recovery ......ok
 Reading sec_ro ......ok
 Reading logo ......ok
 Reading android ......ok
 Reading cache ......ok
 Reading usrdata ......ok
 All done.
 Files saved to: C:\Users\Sohan-Tel\Desktop\MT6572_Samsung_SM-J900FN_Android4.2.2_J7209_J9_6.0.1_V1.2_20171008_142343\

Password Sohan-telecom

version  J7209_J9_6.0.1_V1.2

version J7209_J9_6.0.1_V1.11
Share:

WE L6 FREE FIRMWARE FLASH FILE SPD 7731 7.0 (PAC) 100% TESTED

Admin 




WE L6 DEAD PHONE,HANG LOGO,LCD BLANK,CAMERA FIX,MONKEY VIRUS CLEAN DONE FLASH FILE BY Sohan-Telecom
Model Name  : c385_sma_241
Model Brand : SPRD
Model Device: c385_sma_241
AndrVersion : 7.0
BaseBand CPU: C385_SMA_241
Project Ver : NRD90M release-keys
Model Ext   : WE L6
[Read Mode] : HSUSB : 0x3000
[FW_READER] : Reading Firmware Now … 
[Read Ok] : u-boot-spl-16k.bin
[Read Ok] : u-boot.bin
[Read Ok] : prodnv.img
[Read Ok] : sc7731C_CP0_modem.bin
[Read Ok] : DSP_DM_Gx.bin
[Read Ok] : nvitem_w.bin
[Read Ok] : sc8830g_modem_CP2_WCN_Trunk_W17.13.6_Release.bin
[Read Ok] : nvitem_wcn.bin
[Read Ok] : logo_480x854.bin
[Read Ok] : fblogo_480x854.bin
[Read Ok] : boot.img
[Read Ok] : system.img
[Read Ok] : trustos.bin
[Read Ok] : vmm.bin
[Read Ok] : sysinfo.img
[Build Ok] : cache.img
[Read Ok] : recovery.img
[Build Ok] : userdata.img
AndroidInfo created
Firmware Size : 2332 MiB
Saved to : C:\Users\Sohan-Tel\Desktop\NEW UPLOAD FILE\C385_SMA_241_c385_sma_241_7.0_NRD90M_release-keys_WE_L6\
Done!
Flash Tools
Password Sohan-Telecom


Share:

FREE KINGSTAR KS-i15 SPD7731 Official Firmware 100% Tested



 Action : Read PAC
 Boot : SC7731C-EMMC
 Tips:
 1.Remove Battery, Insert usb cable, Insert battery
 2.power off Phone, Remove & Reinsert Battery , insert USB Cable
 (In Case Some Phone Required to hold bootkey)
 Waiting for Phone Usb....
 Phone found : SPRD U2S Diag (COM12)
 Connecting...
 Bootstrap: SPRD3
 Connected done.
 sending 1st boot...
 waiting for ack...
 1st boot done.
 Sending 2nd boot...
 2nd boot done.
 Checking H/W report info...
 Read info is done.

 Reading Project Property ...

 Brand           : SPRD
 Phone Model     : KINGSTAR i15
 Android Ver     : 5.1
 CPU/Processor   : SP7731C_V1.0.0
 SPD Project ver : c7359_fwvga_lm_dt_oversea_multi-user 5.1 LMY47D S release-keys
 SW Version      : KINGSTAR_i15_user_V08A_20160922
 Making dir: C:\Users\Sohan-Tel\Desktop\spd_7731C_EMMC_SPRD_KINGSTAR i15_Android5.1_KINGSTAR_i15_user_V08A_20160922_20171004_134420\...[ok]...[ok]...[ok]

 Dumping Flash Image Now...
 Reading splloader...ok
 Reading uboot...ok
 Reading recovery...ok
 Reading system...ok
 Reading userdata...ok
 Reading cache...ok
 Reading misc...ok
 Reading boot...ok
 Reading wmodem...ok
 Reading wdsp...ok
 Reading wfixnv1...ok
 Reading wcnfixnv1...ok
 Reading wcnmodem...ok
 Reading prodnv...ok
 Reading oem...ok
 Reading logo...ok
 Reading fbootlogo...ok
 Reading sysinfo...ok
 Packing ...
 Copying file: splloader...ok
 Copying file: uboot...ok
 Copying file: recovery...ok
 Copying file: system...ok
 Copying file: userdata...ok
 Copying file: cache...ok
 Copying file: boot...ok
 Copying file: wmodem...ok
 Copying file: wdsp...ok
 Copying file: wfixnv1...ok
 Copying file: wcnfixnv1...ok
 Copying file: wcnmodem...ok
 Copying file: prodnv...ok
 Copying file: oem...ok
 Copying file: logo...ok
 Copying file: fbootlogo...ok
 Copying file: sysinfo...ok
 Creating XML Settings ...ok
 Rebuilding Packet Header ...ok
 Deleting TmpDir...ok
 BinPacket saved to: C:\Users\Sohan-Tel\Desktop\CSTool_spd_7731C_EMMC_SPRD_KINGSTAR i15_Android5.1_KINGSTAR_i15_user_V08A_20160922_20171004_134420.pac
 All done

Password Sohan-Telecom

Share:

Update Posts

Admin

My photo
dhaka, bangladesh, Bangladesh
Md Shohel. Powered by Blogger.

Featured post

Huawei Y3 2017 Cro-U00 Frp Remove Successfully! By Volcano InfernoTool

Admin https://www.facebook.com/sohan.telecom https://www.facebook.com/groups/1927537257262063/ http://sohan-tel.blogspot.com/ ...