-->

We are support for all mobile flashing Box And Dongle Software


Dec 12, 2017

How to Pattern unlock Lenovo A6000 Solution With CM2 Dongle

How to Pattern unlock Lenovo A6000 Solution With CM2 Dongle

Lenovo A6000 Read FFW & Read Pattern lock Done With CM2 King Of China

Operation : Read Flash [ v1.10 ]
1. Power Off Phone , Remove battery , Insert back
2. PRESS and HOLD BOTH VOLUME KEYS!
3. Insert USB cable. In some cases require use EDL cable or TP to force EDL mode!

Wait for phone...
Device Found!
Initialize ... 
Handshake passed!
BB_IDC_CPU : SnapDragon 410 [MSM8916]
ID_BLOCK_S : 0FF5544E
ID_BLOCK_I : 007050E1
ID_BLOCK_L : 5BADC73F9E04313CEB40B09D5A21B199
ID_BLOCK_L : ACA769C0B55C8E07BA755E979D100E4D
Use CM2 Internal Loader
Loader Sent! Initializing ... 
Running FireHose on BBID : MSM8916 , FLASH : eMMC , mVER : 1
MemInfo : 0x0003 / 0x0200 / 0x00000001D2000000 [ eMMC 8 GiB ] 
ExtInfo : 0x00004000/00004000/00001000/00001000
Boot Ok!


Brand : Lenovo
ProdName : Kraft-A6000
ProdModel : Lenovo A6000
Device : Kraft-A6000
AndroidVer: 4.4.4
Manufact. : LENOVO
QLMxCPU : MSM8916

DevInfo : MSM8916__LENOVO__Lenovo__ANDR_v4.4.4__Lenovo_A6000 __Kraft-A6000__Kraft-A6000

Reading Flash Content ... 
[Read Ok] : gpt_main0.bin
[Read Ok] : NON-HLOS.bin
[Read Ok] : sbl1.mbn
[Read Ok] : emmc_appsboot.mbn
[Read Ok] : rpm.mbn
[Read Ok] : tz.mbn
[Read Ok] : hyp.mbn
[Read Ok] : misc.img
[Read Ok] : splash.img
[Read Ok] : fs_gc.img
[Read Ok] : sec.dat
[Read Ok] : boot.img
[Read Ok] : system.img
[Read Ok] : persist.img
[Read Ok] : cache.img
[Read Ok] : recovery.img
[Read Ok] : userdata.img
[Read Ok] : gpt_backup0.bin

Android Info saved!
Read finished!
Configuration : MSM8916 / eMMC
Firmware Size : 1632 MiB

Done!
Elapsed: 00:02:55

Operation : Read PatternLock [ v1.10 ]

1. Power Off Phone , Remove battery , Insert back
2. PRESS and HOLD BOTH VOLUME KEYS!
3. Insert USB cable. In some cases require use EDL cable or TP to force EDL mode!

Wait for phone...
Device Found!
Initialize ... 
Handshake passed!
BB_IDC_CPU : SnapDragon 410 [MSM8916]
ID_BLOCK_S : 0FF5544E
ID_BLOCK_I : 007050E1
ID_BLOCK_L : 5BADC73F9E04313CEB40B09D5A21B199
ID_BLOCK_L : ACA769C0B55C8E07BA755E979D100E4D
Use CM2 Internal Loader
Loader Sent! Initializing ... 
Running FireHose on BBID : MSM8916 , FLASH : eMMC , mVER : 1
MemInfo : 0x0003 / 0x0200 / 0x00000001D2000000 [ eMMC 8 GiB ] 
ExtInfo : 0x00004000/00004000/00001000/00001000
Boot Ok!

Read Ok! Trying decrypt ... 
PatternLock sequence : 47596

Done!
Elapsed: 00:00:13

Whatsapp Group Play Store App

0 comments:

Post a Comment

Search This Blog

Popular Posts

Translate