How to Pattern unlock Lenovo A6000 Solution With CM2 Dongle
How to Pattern unlock Lenovo A6000 Solution With CM2 Dongle
Lenovo A6000 Read FFW & Read Pattern lock Done With CM2 King Of China
Operation : Read Flash [ v1.10 ]
1. Power Off Phone , Remove battery , Insert back
2. PRESS and HOLD BOTH VOLUME KEYS!
3. Insert USB cable. In some cases require use EDL cable or TP to force EDL mode!
Wait for phone...
Device Found!
Initialize ...
Handshake passed!
BB_IDC_CPU : SnapDragon 410 [MSM8916]
ID_BLOCK_S : 0FF5544E
ID_BLOCK_I : 007050E1
ID_BLOCK_L : 5BADC73F9E04313CEB40B09D5A21B199
ID_BLOCK_L : ACA769C0B55C8E07BA755E979D100E4D
Use CM2 Internal Loader
Loader Sent! Initializing ...
Running FireHose on BBID : MSM8916 , FLASH : eMMC , mVER : 1
MemInfo : 0x0003 / 0x0200 / 0x00000001D2000000 [ eMMC 8 GiB ]
ExtInfo : 0x00004000/00004000/00001000/00001000
Boot Ok!
Brand : Lenovo
ProdName : Kraft-A6000
ProdModel : Lenovo A6000
Device : Kraft-A6000
AndroidVer: 4.4.4
Manufact. : LENOVO
QLMxCPU : MSM8916
DevInfo : MSM8916__LENOVO__Lenovo__ANDR_v4.4.4__Lenovo_A6000 __Kraft-A6000__Kraft-A6000
Reading Flash Content ...
[Read Ok] : gpt_main0.bin
[Read Ok] : NON-HLOS.bin
[Read Ok] : sbl1.mbn
[Read Ok] : emmc_appsboot.mbn
[Read Ok] : rpm.mbn
[Read Ok] : tz.mbn
[Read Ok] : hyp.mbn
[Read Ok] : misc.img
[Read Ok] : splash.img
[Read Ok] : fs_gc.img
[Read Ok] : sec.dat
[Read Ok] : boot.img
[Read Ok] : system.img
[Read Ok] : persist.img
[Read Ok] : cache.img
[Read Ok] : recovery.img
[Read Ok] : userdata.img
[Read Ok] : gpt_backup0.bin
Android Info saved!
Read finished!
Configuration : MSM8916 / eMMC
Firmware Size : 1632 MiB
Done!
Operation : Read PatternLock [ v1.10 ]
1. Power Off Phone , Remove battery , Insert back
2. PRESS and HOLD BOTH VOLUME KEYS!
3. Insert USB cable. In some cases require use EDL cable or TP to force EDL mode!
Wait for phone...
Device Found!
Initialize ...
Handshake passed!
BB_IDC_CPU : SnapDragon 410 [MSM8916]
ID_BLOCK_S : 0FF5544E
ID_BLOCK_I : 007050E1
ID_BLOCK_L : 5BADC73F9E04313CEB40B09D5A21B199
ID_BLOCK_L : ACA769C0B55C8E07BA755E979D100E4D
Use CM2 Internal Loader
Loader Sent! Initializing ...
Running FireHose on BBID : MSM8916 , FLASH : eMMC , mVER : 1
MemInfo : 0x0003 / 0x0200 / 0x00000001D2000000 [ eMMC 8 GiB ]
ExtInfo : 0x00004000/00004000/00001000/00001000
Boot Ok!
Read Ok! Trying decrypt ...
PatternLock sequence : 47596
Done!
Elapsed: 00:00:13
0 comments:
Post a Comment