|
Welcome to the GSM-Forum forums. You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. Only registered members may post questions, contact other members or search our database of over 8 million posts. Registration is fast, simple and absolutely free so please - Click to REGISTER! If you have any problems with the registration process or your account login, please contact contact us . |
|
Register | FAQ | Donate | Forum Rules | Root any Device | ★iPhone Unlock★ | ★ Direct Codes ★ | Direct Unlock Source |
| LinkBack | Thread Tools | Display Modes |
09-23-2015, 07:40 | #1 (permalink) |
No Life Poster Join Date: Jan 2011 Location: lullipapi
Posts: 8,670
Member: 1489030 Status: Offline Sonork: 100.1649409 Thanks Meter: 5,368 | Qmobile X35 Pattern lock Done { User Success Report } Qmobile X35 Pettron lock DOne Graet Team Great Work No lose Any Data With 5sec Lock open. Amazing Opition ,Only Click Info Sea ur Lock YYYYAAAAAHHHOO Code: >>Analysis of USB port,Please insert phone USB cable. 11:10:20 > Connecting... 11:10:20 > CPU TYPE:MT6572 11:10:20 > Hardware version:CA01 11:10:20 > Software version:0000 11:10:20 > SecCfgVal :0x00000000 11:10:20 > BromVersion :0xFF 11:10:20 > BLVersion :0x01 >>Boot downloading complete! 11:10:26 > EMMC_ID:0x7001004D4D4330344758418158AE5591 11:10:26 > EMMC_PRODUCT_NAME: SAMSUNG :0x4D4D43303447 11:10:26 > EMMC_BOOT1_SIZE: 0x00200000 11:10:26 > EMMC_BOOT2_SIZE: 0x00200000 11:10:26 > EMMC_PRMB_SIZE: 0x00020000 11:10:26 > EMMC_GP1_SIZE: 0x00000000 11:10:26 > EMMC_GP2_SIZE: 0x00000000 11:10:26 > EMMC_GP3_SIZE: 0x00000000 11:10:26 > EMMC_GP4_SIZE: 0x00000000 11:10:26 > EMMC_USER_SIZE: 0x0E6800000(3.60 G) 11:10:26 > 11:10:32 > 11:10:32 > 11:10:32 > Analysis of system files... 11:10:32 > PRELOADER:>>addr:0x000000 --length:0x600000 11:10:32 > MBR:>>addr:0x600000 --length:0x080000 11:10:32 > EBR1:>>addr:0x680000 --length:0x080000 11:10:32 > PRO_INFO:>>addr:0x700000 --length:0x300000 11:10:32 > NVRAM:>>addr:0xA00000 --length:0x500000 11:10:32 > PROTECT_F:>>addr:0xF00000 --length:0xA00000 11:10:32 > PROTECT_S:>>addr:0x1900000 --length:0xA00000 11:10:32 > SECCFG:>>addr:0x2300000 --length:0x020000 11:10:32 > UBOOT:>>addr:0x2320000 --length:0x060000 11:10:32 > BOOTIMG:>>addr:0x2380000 --length:0x600000 11:10:32 > RECOVERY:>>addr:0x2980000 --length:0x600000 11:10:32 > SEC_RO:>>addr:0x2F80000 --length:0x040000 11:10:32 > MISC:>>addr:0x2FC0000 --length:0x080000 11:10:32 > LOGO:>>addr:0x3040000 --length:0x300000 11:10:32 > EXPDB:>>addr:0x3340000 --length:0xA00000 11:10:32 > ANDROID:>>addr:0x3D40000 --length:0x35200000 11:10:32 > CACHE:>>addr:0x38F40000 --length:0xE200000 11:10:32 > USRDATA:>>addr:0x47140000 --length:0x4C800000 11:10:32 > FAT:>>addr:0x93940000 --length:0x51DE0000 11:10:32 > BMTPOOL:>>addr:0xFFFF00A8 --length:0x000000 11:10:32 > 11:10:32 > 11:10:32 > >>Format addr:0x47140000 --Format length:0x4C800000 11:10:32 > Read phone information success. |
The Following 5 Users Say Thank You to azhergoga007 For This Useful Post: |
Bookmarks |
| |
|