View Single Post
Old 03-10-2016, 16:31   #11 (permalink)
azhergoga007
No Life Poster
 
azhergoga007's Avatar
 
Join Date: Jan 2011
Location: lullipapi
Posts: 8,670
Member: 1489030
Status: Offline
Sonork: 100.1649409
Thanks Meter: 5,368
Qmobile A900 Virus Scan Done

Qmobile A900 Virus Scan Done With Great Volcano Box MErapi Tool PAck 1..
[IMG]**************************************/images?q=tbn:ANd9GcQClq9trvb1WWqb5sO8DTofFErvSzKGP 3sZ7yq_46HCBXRd51YaeQ[/IMG]

Info..
Code:
 > 
 15:45:37 > 
 15:45:37 > 
>>Analysis of USB port,Please insert phone USB cable.
 15:45:56 > Connecting...
 15:45:56 > CPU TYPE:MT6583/89
 15:45:56 > Hardware version:CA01
 15:45:56 > Software version:0001
 15:45:56 > SecCfgVal :0x00000000
 15:45:56 > BromVersion :0xFF
 15:45:56 > BLVersion :0x01
>>Boot downloading complete!
 15:46:05 > EMMC_ID:0xFE014E5030585858F358109010A28290
 15:46:05 > EMMC_PRODUCT_NAME: SAMSUNG :0x5030585858F3
 15:46:05 > EMMC_BOOT1_SIZE: 0x00100000
 15:46:05 > EMMC_BOOT2_SIZE: 0x00100000
 15:46:05 > EMMC_PRMB_SIZE: 0x00100000
 15:46:05 > EMMC_GP1_SIZE: 0x00000000
 15:46:05 > EMMC_GP2_SIZE: 0x00000000
 15:46:05 > EMMC_GP3_SIZE: 0x00000000
 15:46:05 > EMMC_GP4_SIZE: 0x00000000
 15:46:05 > EMMC_USER_SIZE: 0x0E9000000(3.64 G)
 15:46:05 >  
 15:46:12 >   
 15:46:12 >   
 15:46:12 > Analysis of system files...
 15:46:12 > PRELOADER:>>addr:0x000000 --length:0x600000
 15:46:12 > MBR:>>addr:0x600000 --length:0x080000
 15:46:12 > EBR1:>>addr:0x680000 --length:0x080000
 15:46:12 > __NODL_PMT:>>addr:0x700000 --length:0x400000
 15:46:12 > __NODL_PRO_INFO:>>addr:0xB00000 --length:0x300000
 15:46:12 > __NODL_NVRAM:>>addr:0xE00000 --length:0x500000
 15:46:12 > __NODL_PROTECT_F__NODL_PROTECT_S__NODL_SECCFG:>>addr:0x1300000 --length:0xA00000
 15:46:12 > __NODL_PROTECT_S__NODL_SECCFG:>>addr:0x1D00000 --length:0xA00000
 15:46:12 > __NODL_SECCFG:>>addr:0x2700000 --length:0x020000
 15:46:12 > UBOOT:>>addr:0x2720000 --length:0x060000
 15:46:12 > BOOTIMG:>>addr:0x2780000 --length:0x600000
 15:46:12 > RECOVERY:>>addr:0x2D80000 --length:0x600000
 15:46:12 > SEC_RO:>>addr:0x3380000 --length:0x600000
 15:46:12 > __NODL_MISC:>>addr:0x3980000 --length:0x080000
 15:46:12 > LOGO:>>addr:0x3A00000 --length:0x300000
 15:46:12 > EBR2:>>addr:0x3D00000 --length:0x080000
 15:46:12 > __NODL_EXPDB:>>addr:0x3D80000 --length:0xA00000
 15:46:12 > ANDROID:>>addr:0x4780000 --length:0x40000000
 15:46:12 > CACHE:>>addr:0x44780000 --length:0x7E00000
 15:46:12 > USRDATA:>>addr:0x4C580000 --length:0x40000000
 15:46:12 > FAT:>>addr:0x8C580000 --length:0x5B880000
 15:46:12 > __NODL_BMTPOOL:>>addr:0xFFFF00A8 --length:0x000000
 15:46:12 >  
 15:46:12 >  
 15:46:12 > >>Format addr:0x4C580000 --Format length:0x40000000
 15:46:12 > Read phone information success.
 15:46:17 > brand=QMobile
 15:46:17 > model=A900
 15:46:17 > Android version=4.2.1
 15:46:17 > MTK platform=MT6589
 15:46:17 > Custom build version=1386137382
 15:46:19 > CUSTOM_KERNEL_LCM = nt35582_mcu_6575
 15:46:19 > LCM_HEIGHT = 1280
 15:46:19 > LCM_WIDTH = 720
 15:46:19 > CUSTOM_KERNEL_TOUCHPANEL = generic
 15:46:19 > CUSTOM_HAL_MAIN_IMGSENSOR = imx073_mipi_raw
 15:46:19 > CUSTOM_HAL_SUB_IMGSENSOR = hi704_yuv
 15:46:19 > CUSTOM_MODEM = GBW192_gionee89_dwe_jb2_md1_hspa
 15:46:19 > MTK_PRODUCT_LOCALES = en_US ar_EG fa_IR ur_PK xhdpi hdpi ldpi mdpi


Scan...
Code:
Analysis of USB port,Please insert phone USB cable.
  Connecting...
  CPU TYPE:MT6583/89
  Hardware version:CA01
  Software version:0001
  SecCfgVal :0x00000000
  BromVersion :0xFF
  BLVersion :0x01
  Boot downloading complete!
  EMMC_ID:0xFE014E5030585858F358109010A28290
  EMMC_PRODUCT_NAME: SAMSUNG :0x5030585858F3
  EMMC_BOOT1_SIZE: 0x00100000
  EMMC_BOOT2_SIZE: 0x00100000
  EMMC_PRMB_SIZE: 0x00100000
  EMMC_GP1_SIZE: 0x00000000
  EMMC_GP2_SIZE: 0x00000000
  EMMC_GP3_SIZE: 0x00000000
  EMMC_GP4_SIZE: 0x00000000
  EMMC_USER_SIZE: 0x0E9000000(3.64 G)
   
    
    
  Analysis of system files...
  PRELOADER:  addr:0x000000 --length:0x600000
  MBR:  addr:0x600000 --length:0x080000
  EBR1:  addr:0x680000 --length:0x080000
  __NODL_PMT:  addr:0x700000 --length:0x400000
  __NODL_PRO_INFO:  addr:0xB00000 --length:0x300000
  __NODL_NVRAM:  addr:0xE00000 --length:0x500000
  __NODL_PROTECT_F__NODL_PROTECT_S__NODL_SECCFG:  addr:0x1300000 --length:0xA00000
  __NODL_PROTECT_S__NODL_SECCFG:  addr:0x1D00000 --length:0xA00000
  __NODL_SECCFG:  addr:0x2700000 --length:0x020000
  UBOOT:  addr:0x2720000 --length:0x060000
  BOOTIMG:  addr:0x2780000 --length:0x600000
  RECOVERY:  addr:0x2D80000 --length:0x600000
  SEC_RO:  addr:0x3380000 --length:0x600000
  __NODL_MISC:  addr:0x3980000 --length:0x080000
  LOGO:  addr:0x3A00000 --length:0x300000
  EBR2:  addr:0x3D00000 --length:0x080000
  __NODL_EXPDB:  addr:0x3D80000 --length:0xA00000
  ANDROID:  addr:0x4780000 --length:0x40000000
  CACHE:  addr:0x44780000 --length:0x7E00000
  USRDATA:  addr:0x4C580000 --length:0x40000000
  FAT:  addr:0x8C580000 --length:0x5B880000
  __NODL_BMTPOOL:  addr:0xFFFF00A8 --length:0x000000
   
   
    Format addr:0x4C580000 --Format length:0x40000000
  Read phone information success.
  Check the data complete.
  Clear virus complete.
>>Before power on the phone, please do a format, clear the user data...





IMEI WRITE ....



Stay Tune!
More Developing!!
More coming!!!

Bro
AZHERGOGA007
 
The Following 3 Users Say Thank You to azhergoga007 For This Useful Post:
Show/Hide list of the thanked
 
Page generated in 0.11301 seconds with 7 queries