|
Welcome to the GSM-Forum forums. You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. Only registered members may post questions, contact other members or search our database of over 8 million posts. Registration is fast, simple and absolutely free so please - Click to REGISTER! If you have any problems with the registration process or your account login, please contact contact us . |
|
Register | FAQ | Donate | Forum Rules | Root any Device | ★iPhone Unlock★ | ★ Direct Codes ★ | Direct Unlock Source |
AVATOR BOX (China Phones Service Tool) |
| LinkBack | Thread Tools | Display Modes |
08-19-2014, 05:02 | #1 (permalink) |
No Life Poster Join Date: Jan 2013 Location: (Tech land)
Posts: 2,019
Member: 1864000 Status: Offline Thanks Meter: 2,893 | Qmobile A34 root ,Read pattern done by AvatorDongle Using factory mode[IF DEBUGG OFF] Qmobile model A34 mtk 6572 Root ,Read pattern done by Avator Dongle ,using factory mode.All data safe ,No contacts and sms lose ,No fear of signal droping ,very safe job by Avator Dongle. Code: Application: 1.0.0.11 Model: Autodetect Searching Phone... Device Found Reading info... Manufacturer: QMobile Model: s6030 ID: JDQ39 Baseband ver: MOLY.WR8.W1315.MD.WG.MP.V1.P3, 2013/07/10 09:33 Android ver: 4.2.2 CPU type: armeabi-v7a Region: US Locale: en Chipset: HW version: mt6572 CPU: ARMv7 CPU implementer: 0x41 CPU architecture: 7 CPU variant: 0x0 CPU part: 0xc07 Kernel ver: 3.4.5 Root status: Off Rooting... Method-5: Android 4.x Checking System... Pushing Exploit... 1988284 Bytes Executing Exploit... Please Wait Taking Over... Rooting Device... Access Granted Searching Phone... Device Found Root status: On Done Wbr ..:\\lucky//:.. |
The Following User Says Thank You to ..:\\lucky//:.. For This Useful Post: |
08-19-2014, 07:25 | #3 (permalink) |
No Life Poster Join Date: Jan 2013 Location: (Tech land)
Posts: 2,019
Member: 1864000 Status: Offline Thanks Meter: 2,893 | |
Bookmarks |
| |
|