View Single Post
Old 08-19-2014, 06:02   #1 (permalink)
..:\\lucky//:..
Product Supporter
 
..:\\lucky//:..'s Avatar
 
Join Date: Jan 2013
Location: (Tech land)
Posts: 2,019
Member: 1864000
Status: Offline
Thanks Meter: 2,892
Qmobile A34 root ,Read pattern done by AvatorDongle Using factory mode[IF DEBUGG OFF]

Qmobile model A34 mtk 6572 Root ,Read pattern done by Avator Dongle ,using factory mode.All data safe ,No contacts and sms lose ,No fear of signal droping ,very safe job by Avator Dongle.













Code:
Application: 1.0.0.11
Model:  Autodetect
Searching Phone...
Device Found
Reading info...
Manufacturer: QMobile
Model: s6030
ID: JDQ39
Baseband ver: MOLY.WR8.W1315.MD.WG.MP.V1.P3, 2013/07/10 09:33
Android ver: 4.2.2
CPU type: armeabi-v7a
Region: US
Locale: en
Chipset: 
HW version: mt6572
CPU: ARMv7
CPU implementer: 0x41
CPU architecture: 7
CPU variant: 0x0
CPU part: 0xc07
Kernel ver: 3.4.5 
Root status: Off
Rooting...
Method-5: Android 4.x
Checking System...
Pushing Exploit...
1988284 Bytes
Executing Exploit...
Please Wait
Taking Over...
Rooting Device...
Access Granted
Searching Phone...
Device Found
Root status: On
Done



Wbr
..:\\lucky//:..

  Reply With Quote
The Following User Says Thank You to ..:\\lucky//:.. For This Useful Post:
 
Page generated in 0.11005 seconds with 6 queries