|
Welcome to the GSM-Forum forums. You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. Only registered members may post questions, contact other members or search our database of over 8 million posts. Registration is fast, simple and absolutely free so please - Click to REGISTER! If you have any problems with the registration process or your account login, please contact contact us . |
|
Register | FAQ | Donate | Forum Rules | Root any Device | ★iPhone Unlock★ | ★ Direct Codes ★ | Direct Unlock Source |
| LinkBack | Thread Tools | Display Modes |
07-30-2015, 16:23 | #1 (permalink) |
No Life Poster Join Date: May 2014 Location: D.I.Khan [KPK] Age: 34
Posts: 1,598
Member: 2192499 Status: Offline Sonork: Stopped using.. Thanks Meter: 1,763 | Callme (Spark S22) MTK6572-AntiTheft Lock Removed Callme Spark S22 Anti Theft Lock Removed Successfully using Volcano new Module. Code: Analysis of USB port,Please insert phone USB cable. Connecting... CPU TYPE:MT6572 Hardware version:CA01 Software version:0000 SecCfgVal :0x00000000 BromVersion :0xFF BLVersion :0x01 Boot downloading complete! EMMC_ID:0x7001004D4D43303447580E8C5A117167 EMMC_PRODUCT_NAME: SAMSUNG :0x4D4D43303447 EMMC_BOOT1_SIZE: 0x00200000 EMMC_BOOT2_SIZE: 0x00200000 EMMC_PRMB_SIZE: 0x00020000 EMMC_GP1_SIZE: 0x00000000 EMMC_GP2_SIZE: 0x00000000 EMMC_GP3_SIZE: 0x00000000 EMMC_GP4_SIZE: 0x00000000 EMMC_USER_SIZE: 0x0E6800000(3.60 G) Analysis of system files... PRELOADER: addr:0x000000 --length:0x600000 MBR: addr:0x600000 --length:0x080000 EBR1: addr:0x680000 --length:0x080000 PRO_INFO: addr:0x700000 --length:0x300000 NVRAM: addr:0xA00000 --length:0x500000 PROTECT_F: addr:0xF00000 --length:0xA00000 PROTECT_S: addr:0x1900000 --length:0xA00000 SECCFG: addr:0x2300000 --length:0x020000 UBOOT: addr:0x2320000 --length:0x060000 BOOTIMG: addr:0x2380000 --length:0x600000 RECOVERY: addr:0x2980000 --length:0x600000 SEC_RO: addr:0x2F80000 --length:0x040000 MISC: addr:0x2FC0000 --length:0x080000 LOGO: addr:0x3040000 --length:0x300000 EXPDB: addr:0x3340000 --length:0xA00000 ANDROID: addr:0x3D40000 --length:0x32000000 CACHE: addr:0x35D40000 --length:0xE200000 USRDATA: addr:0x43F40000 --length:0x52C00000 FAT: addr:0x96B40000 --length:0x4EBE0000 BMTPOOL: addr:0xFFFF00A8 --length:0x1500000 Format addr:0x43F40000 --Format length:0x52C00000 Read phone information success. Analysis of USB port,Please insert phone USB cable. Connecting... CPU TYPE:MT6572 Hardware version:CA01 Software version:0000 SecCfgVal :0x00000000 BromVersion :0xFF BLVersion :0x01 Boot downloading complete! EMMC_ID:0x7001004D4D43303447580E8C5A117167 EMMC_PRODUCT_NAME: SAMSUNG :0x4D4D43303447 EMMC_BOOT1_SIZE: 0x00200000 EMMC_BOOT2_SIZE: 0x00200000 EMMC_PRMB_SIZE: 0x00020000 EMMC_GP1_SIZE: 0x00000000 EMMC_GP2_SIZE: 0x00000000 EMMC_GP3_SIZE: 0x00000000 EMMC_GP4_SIZE: 0x00000000 EMMC_USER_SIZE: 0x0E6800000(3.60 G) Analysis of system files... PRELOADER: addr:0x000000 --length:0x600000 MBR: addr:0x600000 --length:0x080000 EBR1: addr:0x680000 --length:0x080000 PRO_INFO: addr:0x700000 --length:0x300000 NVRAM: addr:0xA00000 --length:0x500000 PROTECT_F: addr:0xF00000 --length:0xA00000 PROTECT_S: addr:0x1900000 --length:0xA00000 SECCFG: addr:0x2300000 --length:0x020000 UBOOT: addr:0x2320000 --length:0x060000 BOOTIMG: addr:0x2380000 --length:0x600000 RECOVERY: addr:0x2980000 --length:0x600000 SEC_RO: addr:0x2F80000 --length:0x040000 MISC: addr:0x2FC0000 --length:0x080000 LOGO: addr:0x3040000 --length:0x300000 EXPDB: addr:0x3340000 --length:0xA00000 ANDROID: addr:0x3D40000 --length:0x32000000 CACHE: addr:0x35D40000 --length:0xE200000 USRDATA: addr:0x43F40000 --length:0x52C00000 FAT: addr:0x96B40000 --length:0x4EBE0000 BMTPOOL: addr:0xFFFF00A8 --length:0x1500000 Format addr:0x43F40000 --Format length:0x52C00000 Read phone information success. >>Successfully reset anti-theft lock |
The Following 4 Users Say Thank You to EjazATF For This Useful Post: |
Bookmarks |
| |
|