- Joined
- Jun 13, 2014
- Messages
- 67
share ko lang po tong nagawa ko....
kata f1
history nakalimutan daw
first try hard reset but still there (no luck)
open vocano tap andoird tap usb tap unlock theft done..
heres the log...
Available Ports:COM1 COM3 COM4 COM26
Current Port:COM26
Analysis of USB port,Please insert phone USB cable.
Connecting...
CPU TYPE:MT6572
Hardware version:CA01
Software version:0000
SecCfgVal :0x00000000
BromVersion :0xFF
BLVersion :0x01
Boot downloading complete!
EMMC_ID:0x7001004D4D4330344758ECB9D13571E5
EMMC_PRODUCT_NAME: SAMSUNG :0x4D4D43303447
EMMC_BOOT1_SIZE: 0x00200000
EMMC_BOOT2_SIZE: 0x00200000
EMMC_PRMB_SIZE: 0x00020000
EMMC_GP1_SIZE: 0x00000000
EMMC_GP2_SIZE: 0x00000000
EMMC_GP3_SIZE: 0x00000000
EMMC_GP4_SIZE: 0x00000000
EMMC_USER_SIZE: 0x0E6800000(3.60 G)
Analysis of system files...
PRELOADER: addr:0x000000 --length:0x600000
MBR: addr:0x600000 --length:0x080000
EBR1: addr:0x680000 --length:0x080000
PRO_INFO: addr:0x700000 --length:0x300000
NVRAM: addr:0xA00000 --length:0x500000
PROTECT_F: addr:0xF00000 --length:0xA00000
PROTECT_S: addr:0x1900000 --length:0xA00000
SECCFG: addr:0x2300000 --length:0x020000
UBOOT: addr:0x2320000 --length:0x060000
BOOTIMG: addr:0x2380000 --length:0x600000
RECOVERY: addr:0x2980000 --length:0x600000
SEC_RO: addr:0x2F80000 --length:0x040000
MISC: addr:0x2FC0000 --length:0x080000
LOGO: addr:0x3040000 --length:0x300000
EXPDB: addr:0x3340000 --length:0xA00000
ANDROID: addr:0x3D40000 --length:0x32000000
CACHE: addr:0x35D40000 --length:0xE200000
USRDATA: addr:0x43F40000 --length:0x52C00000
FAT: addr:0x96B40000 --length:0x4EBE0000
BMTPOOL: addr:0xFFFF00A8 --length:0x1500000
Format addr:0x43F40000 --Format length:0x52C00000
Read phone information success.
>>Successfully reset anti-theft lock
senxa n po at wala pong screen shot
kata f1
history nakalimutan daw
first try hard reset but still there (no luck)
open vocano tap andoird tap usb tap unlock theft done..
heres the log...
Available Ports:COM1 COM3 COM4 COM26
Current Port:COM26
Analysis of USB port,Please insert phone USB cable.
Connecting...
CPU TYPE:MT6572
Hardware version:CA01
Software version:0000
SecCfgVal :0x00000000
BromVersion :0xFF
BLVersion :0x01
Boot downloading complete!
EMMC_ID:0x7001004D4D4330344758ECB9D13571E5
EMMC_PRODUCT_NAME: SAMSUNG :0x4D4D43303447
EMMC_BOOT1_SIZE: 0x00200000
EMMC_BOOT2_SIZE: 0x00200000
EMMC_PRMB_SIZE: 0x00020000
EMMC_GP1_SIZE: 0x00000000
EMMC_GP2_SIZE: 0x00000000
EMMC_GP3_SIZE: 0x00000000
EMMC_GP4_SIZE: 0x00000000
EMMC_USER_SIZE: 0x0E6800000(3.60 G)
Analysis of system files...
PRELOADER: addr:0x000000 --length:0x600000
MBR: addr:0x600000 --length:0x080000
EBR1: addr:0x680000 --length:0x080000
PRO_INFO: addr:0x700000 --length:0x300000
NVRAM: addr:0xA00000 --length:0x500000
PROTECT_F: addr:0xF00000 --length:0xA00000
PROTECT_S: addr:0x1900000 --length:0xA00000
SECCFG: addr:0x2300000 --length:0x020000
UBOOT: addr:0x2320000 --length:0x060000
BOOTIMG: addr:0x2380000 --length:0x600000
RECOVERY: addr:0x2980000 --length:0x600000
SEC_RO: addr:0x2F80000 --length:0x040000
MISC: addr:0x2FC0000 --length:0x080000
LOGO: addr:0x3040000 --length:0x300000
EXPDB: addr:0x3340000 --length:0xA00000
ANDROID: addr:0x3D40000 --length:0x32000000
CACHE: addr:0x35D40000 --length:0xE200000
USRDATA: addr:0x43F40000 --length:0x52C00000
FAT: addr:0x96B40000 --length:0x4EBE0000
BMTPOOL: addr:0xFFFF00A8 --length:0x1500000
Format addr:0x43F40000 --Format length:0x52C00000
Read phone information success.
>>Successfully reset anti-theft lock
senxa n po at wala pong screen shot