|
Welcome to the GSM-Forum forums. You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. Only registered members may post questions, contact other members or search our database of over 8 million posts. Registration is fast, simple and absolutely free so please - Click to REGISTER! If you have any problems with the registration process or your account login, please contact contact us . |
|
Register | FAQ | Donate | Forum Rules | Root any Device | ★iPhone Unlock★ | ★ Direct Codes ★ | Direct Unlock Source |
| LinkBack | Thread Tools | Display Modes |
03-08-2016, 07:50 | #1 (permalink) |
No Life Poster Join Date: Jan 2011 Location: lullipapi
Posts: 8,670
Member: 1489030 Status: Offline Sonork: 100.1649409 Thanks Meter: 5,368 | Jazzz Haier JS300 Read /Formate/Scan Done [SUCCESS REPORT] Jazzz Haier JS300 Read /Formate/Scan Done With Great Big Brother Volcano Merapi Tool Pack 1. Feel The Reail Power. Info Logs... Code: >>Analysis of USB port,Please insert phone USB cable. 10:52:22 > Connecting... 10:52:22 > CPU TYPE:MT6572 10:52:22 > Hardware version:CA01 10:52:22 > Software version:0000 10:52:22 > SecCfgVal :0x00000000 10:52:22 > BromVersion :0xFF 10:52:22 > BLVersion :0x01 >>Boot downloading complete! 10:52:34 > EMMC_ID:0x700100533130303034082521FF86B28D 10:52:34 > EMMC_PRODUCT_NAME: SAMSUNG :0x533130303034 10:52:34 > EMMC_BOOT1_SIZE: 0x00400000 10:52:34 > EMMC_BOOT2_SIZE: 0x00400000 10:52:34 > EMMC_PRMB_SIZE: 0x00400000 10:52:34 > EMMC_GP1_SIZE: 0x00000000 10:52:34 > EMMC_GP2_SIZE: 0x00000000 10:52:34 > EMMC_GP3_SIZE: 0x00000000 10:52:34 > EMMC_GP4_SIZE: 0x00000000 10:52:34 > EMMC_USER_SIZE: 0x0E4000000(3.56 G) 10:52:34 > 10:52:41 > 10:52:41 > 10:52:41 > Analysis of system files... 10:52:41 > PRELOADER:>>addr:0x000000 --length:0xC00000 10:52:41 > MBR:>>addr:0xC00000 --length:0x080000 10:52:41 > EBR1:>>addr:0xC80000 --length:0x080000 10:52:41 > PRO_INFO:>>addr:0xD00000 --length:0x300000 10:52:41 > NVRAM:>>addr:0x1000000 --length:0x500000 10:52:41 > PROTECT_F:>>addr:0x1500000 --length:0xA00000 10:52:41 > PROTECT_S:>>addr:0x1F00000 --length:0xA00000 10:52:41 > SECCFG:>>addr:0x2900000 --length:0x020000 10:52:41 > UBOOT:>>addr:0x2920000 --length:0x060000 10:52:41 > BOOTIMG:>>addr:0x2980000 --length:0x600000 10:52:41 > RECOVERY:>>addr:0x2F80000 --length:0x600000 10:52:41 > SEC_RO:>>addr:0x3580000 --length:0x040000 10:52:41 > MISC:>>addr:0x35C0000 --length:0x080000 10:52:41 > LOGO:>>addr:0x3640000 --length:0x300000 10:52:41 > EXPDB:>>addr:0x3940000 --length:0xA00000 10:52:41 > ANDROID:>>addr:0x4340000 --length:0x3B600000 10:52:41 > CACHE:>>addr:0x3F940000 --length:0xE200000 10:52:41 > USRDATA:>>addr:0x4DB40000 --length:0x95BC0000 10:52:41 > BMTPOOL:>>addr:0xFFFF00A8 --length:0x1500000 10:52:41 > 10:52:41 > 10:52:41 > >>Format addr:0x4DB40000 --Format length:0x95BC0000 10:52:41 > Read phone information success. 10:52:46 > brand=Mobilink 10:52:46 > model=JS 300 10:52:46 > Android version=4.4.2 10:52:46 > MTK platform=MT6572 10:52:46 > Custom build version=JS 300-H05-S005-PK 10:52:47 > CUSTOM_KERNEL_LCM = nt35582_mcu_6575 10:52:47 > LCM_HEIGHT = 480 10:52:47 > LCM_WIDTH = 320 10:52:47 > CUSTOM_KERNEL_TOUCHPANEL = generic 10:52:47 > CUSTOM_HAL_MAIN_IMGSENSOR = imx073_mipi_raw 10:52:47 > CUSTOM_HAL_SUB_IMGSENSOR = hi704_yuv 10:52:47 > CUSTOM_MODEM = RATECH72_CWET_KK_3G_BAND1 10:52:47 > MTK_PRODUCT_LOCALES = en_US fa_IR ur_PK Virus Scan... Code: Analysis of USB port,Please insert phone USB cable. Connecting... CPU TYPE:MT6572 Hardware version:CA01 Software version:0000 SecCfgVal :0x00000000 BromVersion :0xFF BLVersion :0x01 Boot downloading complete! EMMC_ID:0x700100533130303034082521FF86B28D EMMC_PRODUCT_NAME: SAMSUNG :0x533130303034 EMMC_BOOT1_SIZE: 0x00400000 EMMC_BOOT2_SIZE: 0x00400000 EMMC_PRMB_SIZE: 0x00400000 EMMC_GP1_SIZE: 0x00000000 EMMC_GP2_SIZE: 0x00000000 EMMC_GP3_SIZE: 0x00000000 EMMC_GP4_SIZE: 0x00000000 EMMC_USER_SIZE: 0x0E4000000(3.56 G) Analysis of system files... PRELOADER: addr:0x000000 --length:0xC00000 MBR: addr:0xC00000 --length:0x080000 EBR1: addr:0xC80000 --length:0x080000 PRO_INFO: addr:0xD00000 --length:0x300000 NVRAM: addr:0x1000000 --length:0x500000 PROTECT_F: addr:0x1500000 --length:0xA00000 PROTECT_S: addr:0x1F00000 --length:0xA00000 SECCFG: addr:0x2900000 --length:0x020000 UBOOT: addr:0x2920000 --length:0x060000 BOOTIMG: addr:0x2980000 --length:0x600000 RECOVERY: addr:0x2F80000 --length:0x600000 SEC_RO: addr:0x3580000 --length:0x040000 MISC: addr:0x35C0000 --length:0x080000 LOGO: addr:0x3640000 --length:0x300000 EXPDB: addr:0x3940000 --length:0xA00000 ANDROID: addr:0x4340000 --length:0x3B600000 CACHE: addr:0x3F940000 --length:0xE200000 USRDATA: addr:0x4DB40000 --length:0x95BC0000 BMTPOOL: addr:0xFFFF00A8 --length:0x1500000 Format addr:0x4DB40000 --Format length:0x95BC0000 Read phone information success. Check the data complete. Clear virus complete. >>Before power on the phone, please do a format, clear the user data... Read File ... Code: >>Analysis of USB port,Please insert phone USB cable. 11:03:56 > Connecting... 11:03:56 > CPU TYPE:MT6572 11:03:56 > Hardware version:CA01 11:03:56 > Software version:0000 11:03:56 > SecCfgVal :0x00000000 11:03:56 > BromVersion :0xFF 11:03:56 > BLVersion :0x01 >>Boot downloading complete! 11:04:06 > EMMC_ID:0x700100533130303034082521FF86B28D 11:04:06 > EMMC_PRODUCT_NAME: SAMSUNG :0x533130303034 11:04:06 > EMMC_BOOT1_SIZE: 0x00400000 11:04:06 > EMMC_BOOT2_SIZE: 0x00400000 11:04:06 > EMMC_PRMB_SIZE: 0x00400000 11:04:06 > EMMC_GP1_SIZE: 0x00000000 11:04:06 > EMMC_GP2_SIZE: 0x00000000 11:04:06 > EMMC_GP3_SIZE: 0x00000000 11:04:06 > EMMC_GP4_SIZE: 0x00000000 11:04:06 > EMMC_USER_SIZE: 0x0E4000000(3.56 G) 11:04:06 > >>Flash reading complete! Formate... Code: >>Analysis of USB port,Please insert phone USB cable. 11:19:11 > Connecting... 11:19:11 > CPU TYPE:MT6572 11:19:11 > Hardware version:CA01 11:19:11 > Software version:0000 11:19:11 > SecCfgVal :0x00000000 11:19:11 > BromVersion :0xFF 11:19:11 > BLVersion :0x01 >>Boot downloading complete! 11:19:22 > EMMC_ID:0x700100533130303034082521FF86B28D 11:19:22 > EMMC_PRODUCT_NAME: SAMSUNG :0x533130303034 11:19:22 > EMMC_BOOT1_SIZE: 0x00400000 11:19:22 > EMMC_BOOT2_SIZE: 0x00400000 11:19:22 > EMMC_PRMB_SIZE: 0x00400000 11:19:22 > EMMC_GP1_SIZE: 0x00000000 11:19:22 > EMMC_GP2_SIZE: 0x00000000 11:19:22 > EMMC_GP3_SIZE: 0x00000000 11:19:22 > EMMC_GP4_SIZE: 0x00000000 11:19:22 > EMMC_USER_SIZE: 0x0E4000000(3.56 G) 11:19:22 > 11:19:28 > 11:19:28 > 11:19:28 > Analysis of system files... 11:19:28 > PRELOADER:>>addr:0x000000 --length:0xC00000 11:19:28 > MBR:>>addr:0xC00000 --length:0x080000 11:19:28 > EBR1:>>addr:0xC80000 --length:0x080000 11:19:28 > PRO_INFO:>>addr:0xD00000 --length:0x300000 11:19:28 > NVRAM:>>addr:0x1000000 --length:0x500000 11:19:28 > PROTECT_F:>>addr:0x1500000 --length:0xA00000 11:19:28 > PROTECT_S:>>addr:0x1F00000 --length:0xA00000 11:19:28 > SECCFG:>>addr:0x2900000 --length:0x020000 11:19:28 > UBOOT:>>addr:0x2920000 --length:0x060000 11:19:28 > BOOTIMG:>>addr:0x2980000 --length:0x600000 11:19:28 > RECOVERY:>>addr:0x2F80000 --length:0x600000 11:19:28 > SEC_RO:>>addr:0x3580000 --length:0x040000 11:19:28 > MISC:>>addr:0x35C0000 --length:0x080000 11:19:28 > LOGO:>>addr:0x3640000 --length:0x300000 11:19:28 > EXPDB:>>addr:0x3940000 --length:0xA00000 11:19:28 > ANDROID:>>addr:0x4340000 --length:0x3B600000 11:19:28 > CACHE:>>addr:0x3F940000 --length:0xE200000 11:19:28 > USRDATA:>>addr:0x4DB40000 --length:0x95BC0000 11:19:28 > BMTPOOL:>>addr:0xFFFF00A8 --length:0x1500000 11:19:28 > 11:19:28 > 11:19:28 > Read phone information success. 11:19:34 > Format range: Start Address: 0x4DB40000,Format Length :0x95BC0000 >>Flash erasing complete! >>Check the data complete. 11:19:41 > 11:19:41 > Please take out SIM and Memory card from phone when power on first time, or it will have Memory Lock . 11:19:41 > If you meet Memory Lock,please take all cards from phone and restart phone again. Stay Tune! More Developing!! More coming!!! Bro AZHERGOGA007 |
The Following 5 Users Say Thank You to azhergoga007 For This Useful Post: |
Bookmarks |
| |
|