- Nov 12, 2016
- 407
- 246
- Skype
- muzammal.mudassar
- Sonork ID
- 100.1648344
Qmobile X11 Read Pattern Done With Great Inferno Tool
Br
.::AMS2762::.
Code:
>>Current Task:
Read Information
>>
>>
>>
>>Operation:
1. Power off the phone.
2. Please insert USB cable within 20 seconds.
>>Analysis of USB port,Please insert phone USB cable.
>>Connecting...
>>CPU TYPE:MT6572
>>Hardware version:CA01
>>Software version:0000
>>SecCfgVal :0x00000000
>>BromVersion :0xFF
>>BLVersion :0x01
>>Boot downloading complete!
>>EMMC_ID:0x90014A4834473164040501A1FFD29171
>>EMMC_PRODUCT_NAME: SAMSUNG :0x483447316404
>>EMMC_BOOT1_SIZE: 0x00400000
>>EMMC_BOOT2_SIZE: 0x00400000
>>EMMC_PRMB_SIZE: 0x00400000
>>EMMC_GP1_SIZE: 0x00000000
>>EMMC_GP2_SIZE: 0x00000000
>>EMMC_GP3_SIZE: 0x00000000
>>EMMC_GP4_SIZE: 0x00000000
>>EMMC_USER_SIZE: 0x0E9000000(3.64 G)
>>
>>
>>
>>Analysis of system files...
>>PRELOADER:>>addr:0x000000 --length:0xC00000
>>MBR:>>addr:0xC00000 --length:0x080000
>>EBR1:>>addr:0xC80000 --length:0x080000
>>PRO_INFO:>>addr:0xD00000 --length:0x300000
>>NVRAM:>>addr:0x1000000 --length:0x500000
>>PROTECT_F:>>addr:0x1500000 --length:0xA00000
>>PROTECT_S:>>addr:0x1F00000 --length:0xA00000
>>SECCFG:>>addr:0x2900000 --length:0x020000
>>UBOOT:>>addr:0x2920000 --length:0x060000
>>BOOTIMG:>>addr:0x2980000 --length:0x600000
>>RECOVERY:>>addr:0x2F80000 --length:0x600000
>>SEC_RO:>>addr:0x3580000 --length:0x040000
>>MISC:>>addr:0x35C0000 --length:0x080000
>>LOGO:>>addr:0x3640000 --length:0x300000
>>EXPDB:>>addr:0x3940000 --length:0xA00000
>>ANDROID:>>addr:0x4340000 --length:0x40000000
>>CACHE:>>addr:0x44340000 --length:0xE200000
>>USRDATA:>>addr:0x52540000 --length:0x961C0000
>>BMTPOOL:>>addr:0xFFFF00A8 --length:0x000000
>>
>>
>>>>Format addr:0x52540000 --Format length:0x961C0000
>>
Br
.::AMS2762::.