How to hard reset Micromax D320? If you forgot the password and pattern lock for the Micromax D320 then you can solve the problem using Volcano Utility, the below is the process to flash or format or hard reset Micromax D320. This process will also helps you to remove Privacy protection password of Micromax D320. Follow the below steps to hard reset Micromax D320.
Micromax D320 Hard Reset
- Open volcano utility
- Select Android Tab -> USB Mode
- Select Unlock Theft
- Click on Start
- Now connect switched off mobile to Computer Using USB Cable
Unlock Privacy Protection Password D320 Volcano tool |
Micromax D320 Volcano Tool Log:
Analysis of USB port,Please insert phone USB cable.
Connecting...
CPU TYPE:MT6572
Hardware version:CA01
Software version:0000
SecCfgVal :0x00000000
BromVersion :0xFF
BLVersion :0x01
Boot downloading complete!
EMMC_ID:0x90014A483447316404050AA2A7F01247
EMMC_PRODUCT_NAME: SAMSUNG :0x483447316404
EMMC_BOOT1_SIZE: 0x00400000
EMMC_BOOT2_SIZE: 0x00400000
EMMC_PRMB_SIZE: 0x00400000
EMMC_GP1_SIZE: 0x00000000
EMMC_GP2_SIZE: 0x00000000
EMMC_GP3_SIZE: 0x00000000
EMMC_GP4_SIZE: 0x00000000
EMMC_USER_SIZE: 0x0E9000000(3.64 G)
Analysis of system files...
PRELOADER: addr:0x000000 --length:0xC00000
MBR: addr:0xC00000 --length:0x080000
EBR1: addr:0xC80000 --length:0x080000
PRO_INFO: addr:0xD00000 --length:0x300000
NVRAM: addr:0x1000000 --length:0x500000
PROTECT_F: addr:0x1500000 --length:0xA00000
PROTECT_S: addr:0x1F00000 --length:0xA00000
SECCFG: addr:0x2900000 --length:0x020000
UBOOT: addr:0x2920000 --length:0x060000
BOOTIMG: addr:0x2980000 --length:0x600000
RECOVERY: addr:0x2F80000 --length:0x600000
SEC_RO: addr:0x3580000 --length:0x040000
MISC: addr:0x35C0000 --length:0x080000
LOGO: addr:0x3640000 --length:0x300000
EBR2: addr:0x3940000 --length:0x080000
EXPDB: addr:0x39C0000 --length:0xA00000
ANDROID: addr:0x43C0000 --length:0x3E800000
CACHE: addr:0x42BC0000 --length:0xE200000
USRDATA: addr:0x50DC0000 --length:0x52C00000
BYTCFG: addr:0xA39C0000 --length:0x600000
FAT: addr:0xA3FC0000 --length:0x44740000
BMTPOOL: addr:0xFFFF00A8 --length:0x000000
Format addr:0x50DC0000 --Format length:0x52C00000
Read phone information success.
Successfully reset anti-theft lock
Connecting...
CPU TYPE:MT6572
Hardware version:CA01
Software version:0000
SecCfgVal :0x00000000
BromVersion :0xFF
BLVersion :0x01
Boot downloading complete!
EMMC_ID:0x90014A483447316404050AA2A7F01247
EMMC_PRODUCT_NAME: SAMSUNG :0x483447316404
EMMC_BOOT1_SIZE: 0x00400000
EMMC_BOOT2_SIZE: 0x00400000
EMMC_PRMB_SIZE: 0x00400000
EMMC_GP1_SIZE: 0x00000000
EMMC_GP2_SIZE: 0x00000000
EMMC_GP3_SIZE: 0x00000000
EMMC_GP4_SIZE: 0x00000000
EMMC_USER_SIZE: 0x0E9000000(3.64 G)
Analysis of system files...
PRELOADER: addr:0x000000 --length:0xC00000
MBR: addr:0xC00000 --length:0x080000
EBR1: addr:0xC80000 --length:0x080000
PRO_INFO: addr:0xD00000 --length:0x300000
NVRAM: addr:0x1000000 --length:0x500000
PROTECT_F: addr:0x1500000 --length:0xA00000
PROTECT_S: addr:0x1F00000 --length:0xA00000
SECCFG: addr:0x2900000 --length:0x020000
UBOOT: addr:0x2920000 --length:0x060000
BOOTIMG: addr:0x2980000 --length:0x600000
RECOVERY: addr:0x2F80000 --length:0x600000
SEC_RO: addr:0x3580000 --length:0x040000
MISC: addr:0x35C0000 --length:0x080000
LOGO: addr:0x3640000 --length:0x300000
EBR2: addr:0x3940000 --length:0x080000
EXPDB: addr:0x39C0000 --length:0xA00000
ANDROID: addr:0x43C0000 --length:0x3E800000
CACHE: addr:0x42BC0000 --length:0xE200000
USRDATA: addr:0x50DC0000 --length:0x52C00000
BYTCFG: addr:0xA39C0000 --length:0x600000
FAT: addr:0xA3FC0000 --length:0x44740000
BMTPOOL: addr:0xFFFF00A8 --length:0x000000
Format addr:0x50DC0000 --Format length:0x52C00000
Read phone information success.
Successfully reset anti-theft lock
THANKS
ReplyDeleteTHANKS.....
ReplyDeletethanks
ReplyDeletethanks
ReplyDeleteWelcome All....
ReplyDelete