GSMYOLOYUAN INFINIX HOT10i X569B SCATTER FILE BACKUP VIA UT
CLICK LOGO TO DOWNLOAD
pass: yoloyuangsm&*&
PAALALA BACKUP MUNA BAGO MAGFLASH
FEEDBACK NAMAN KONG TESTED SA DEADBOOT O PROGRAM ISSUE

READ BACK
Initializing usb... OK
Waiting for device... COM29 [BOOTROM:0E8D:0003]
Bypassing authentication... OK
Analyzing... preloader_x659b_h696.bin [MT6769:15:2512] [Internal]
Handshaking... OK
Reading hardware info... OK
Hardware : MT6768 [Helio G70|G80|G85|P65] 0707 8A00 CA00 0000
Security Config : SCB SLA DAA
MEID : 56314491A8CB2FDC094AA3CD6935DECE
Sending Download-Agent... OK
Syncing with target... OK
Booting device... OK
Syncing with DA... OK
Storage : EMMC - CID : 44000115.41443656.E9870242.AB586490
Vendor : Samsung - Name : DV6DAB - Serial : 1687218567 - Rev : 2
Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 16 MiB - User Area : 116.48 GiB
Reading partition info... OK [51]
Reading device info... OK
Model Name : Infinix X659B
Product Name : X659B-OP
Manufacturer : INFINIX MOBILITY LIMITED
Platform : Infinix-X659B
Android Version : 11
Security Patch : 2021-06-05
Build ID : INFINIX-R-64-210709V135
Build : 210709V183
Build Date : Fri Jul 9 00:48:50 CST 2021
Reading preloader [512 KiB] -> preloader.bin... OK
Reading pgpt [32 KiB] -> pgpt.bin... OK
Reading boot_para [26 MiB] -> boot_para.bin... OK
Reading proinfo [3 MiB] -> proinfo.bin... OK
Reading misc [512 KiB] -> misc.img... OK
Reading para [512 KiB] -> para.bin... OK
Reading expdb [20 MiB] -> expdb.bin... OK
Reading frp [1 MiB] -> frp.bin... OK
Reading tkv_a [1 MiB] -> tkv_a.img... OK
Reading vbmeta_a [8 MiB] -> vbmeta_a.img... OK
Reading vbmeta_system_a [8 MiB] -> vbmeta_system_a.img... OK
Reading vbmeta_vendor_a [8 MiB] -> vbmeta_vendor_a.img... OK
Reading tkv_b [1 MiB] -> tkv_b.img... OK
Reading vbmeta_b [8 MiB] -> vbmeta_b.img... OK
Reading vbmeta_system_b [8 MiB] -> vbmeta_system_b.img... OK
Reading vbmeta_vendor_b [8 MiB] -> vbmeta_vendor_b.img... OK
Reading md_udc [22.6 MiB] -> md_udc.bin... OK
Reading metadata [32 MiB] -> metadata.img... OK
Reading nvcfg [32 MiB] -> nvcfg.img... OK
Reading nvdata [64 MiB] -> nvdata.img... OK
Reading persist [48 MiB] -> persist.img... OK
Reading protect1 [8 MiB] -> protect1.img... OK
Reading protect2 [12.37 MiB] -> protect2.img... OK
Reading seccfg [8 MiB] -> seccfg.bin... OK
Reading md1img_a [128 MiB] -> md1img_a.img... OK
Reading spmfw_a [1 MiB] -> spmfw_a.img... OK
Reading scp_a [6 MiB] -> scp_a.img... OK
Reading sspm_a [1 MiB] -> sspm_a.img... OK
Reading gz_a [16 MiB] -> gz_a.img... OK
Reading lk_a [2 MiB] -> lk_a.img... OK
Reading logo_a [8 MiB] -> logo_a.img... OK
Reading boot_a [32 MiB] -> boot_a.img... OK
Reading vendor_boot_a [64 MiB] -> vendor_boot_a.img... OK
Reading dtbo_a [8 MiB] -> dtbo_a.img... OK
Reading tee_a [6 MiB] -> tee_a.img... OK
Reading sec1 [2 MiB] -> sec1.bin... OK
Reading nvram [70 MiB] -> nvram.img... OK
Reading md1img_b [128 MiB] -> md1img_b.img... OK
Reading spmfw_b [1 MiB] -> spmfw_b.img... OK
Reading scp_b [6 MiB] -> scp_b.img... OK
Reading sspm_b [1 MiB] -> sspm_b.img... OK
Reading gz_b [16 MiB] -> gz_b.img... OK
Reading lk_b [2 MiB] -> lk_b.img... OK
Reading logo_b [8 MiB] -> logo_b.img... OK
Reading boot_b [32 MiB] -> boot_b.img... OK
Reading vendor_boot_b [64 MiB] -> vendor_boot_b.img... OK
Reading dtbo_b [8 MiB] -> dtbo_b.img... OK
Reading tee_b [6 MiB] -> tee_b.img... OK
Reading super [6 GiB] -> super.img... OK
Reading tranfs [306.78 MiB] -> tranfs.img... OK
Reading userdata [109.2 GiB] -> userdata.img... OK
Reading otp [43 MiB] -> otp.img... OK
Reading flashinfo [16 MiB] -> flashinfo.img... OK
UNLOCKTOOL 2022.10.21.0
Elapsed time : 9 minutes 33 seconds
CLICK LOGO TO DOWNLOAD
pass: yoloyuangsm&*&
PAALALA BACKUP MUNA BAGO MAGFLASH
FEEDBACK NAMAN KONG TESTED SA DEADBOOT O PROGRAM ISSUE

READ BACK
Initializing usb... OK
Waiting for device... COM29 [BOOTROM:0E8D:0003]
Bypassing authentication... OK
Analyzing... preloader_x659b_h696.bin [MT6769:15:2512] [Internal]
Handshaking... OK
Reading hardware info... OK
Hardware : MT6768 [Helio G70|G80|G85|P65] 0707 8A00 CA00 0000
Security Config : SCB SLA DAA
MEID : 56314491A8CB2FDC094AA3CD6935DECE
Sending Download-Agent... OK
Syncing with target... OK
Booting device... OK
Syncing with DA... OK
Storage : EMMC - CID : 44000115.41443656.E9870242.AB586490
Vendor : Samsung - Name : DV6DAB - Serial : 1687218567 - Rev : 2
Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 16 MiB - User Area : 116.48 GiB
Reading partition info... OK [51]
Reading device info... OK
Model Name : Infinix X659B
Product Name : X659B-OP
Manufacturer : INFINIX MOBILITY LIMITED
Platform : Infinix-X659B
Android Version : 11
Security Patch : 2021-06-05
Build ID : INFINIX-R-64-210709V135
Build : 210709V183
Build Date : Fri Jul 9 00:48:50 CST 2021
Reading preloader [512 KiB] -> preloader.bin... OK
Reading pgpt [32 KiB] -> pgpt.bin... OK
Reading boot_para [26 MiB] -> boot_para.bin... OK
Reading proinfo [3 MiB] -> proinfo.bin... OK
Reading misc [512 KiB] -> misc.img... OK
Reading para [512 KiB] -> para.bin... OK
Reading expdb [20 MiB] -> expdb.bin... OK
Reading frp [1 MiB] -> frp.bin... OK
Reading tkv_a [1 MiB] -> tkv_a.img... OK
Reading vbmeta_a [8 MiB] -> vbmeta_a.img... OK
Reading vbmeta_system_a [8 MiB] -> vbmeta_system_a.img... OK
Reading vbmeta_vendor_a [8 MiB] -> vbmeta_vendor_a.img... OK
Reading tkv_b [1 MiB] -> tkv_b.img... OK
Reading vbmeta_b [8 MiB] -> vbmeta_b.img... OK
Reading vbmeta_system_b [8 MiB] -> vbmeta_system_b.img... OK
Reading vbmeta_vendor_b [8 MiB] -> vbmeta_vendor_b.img... OK
Reading md_udc [22.6 MiB] -> md_udc.bin... OK
Reading metadata [32 MiB] -> metadata.img... OK
Reading nvcfg [32 MiB] -> nvcfg.img... OK
Reading nvdata [64 MiB] -> nvdata.img... OK
Reading persist [48 MiB] -> persist.img... OK
Reading protect1 [8 MiB] -> protect1.img... OK
Reading protect2 [12.37 MiB] -> protect2.img... OK
Reading seccfg [8 MiB] -> seccfg.bin... OK
Reading md1img_a [128 MiB] -> md1img_a.img... OK
Reading spmfw_a [1 MiB] -> spmfw_a.img... OK
Reading scp_a [6 MiB] -> scp_a.img... OK
Reading sspm_a [1 MiB] -> sspm_a.img... OK
Reading gz_a [16 MiB] -> gz_a.img... OK
Reading lk_a [2 MiB] -> lk_a.img... OK
Reading logo_a [8 MiB] -> logo_a.img... OK
Reading boot_a [32 MiB] -> boot_a.img... OK
Reading vendor_boot_a [64 MiB] -> vendor_boot_a.img... OK
Reading dtbo_a [8 MiB] -> dtbo_a.img... OK
Reading tee_a [6 MiB] -> tee_a.img... OK
Reading sec1 [2 MiB] -> sec1.bin... OK
Reading nvram [70 MiB] -> nvram.img... OK
Reading md1img_b [128 MiB] -> md1img_b.img... OK
Reading spmfw_b [1 MiB] -> spmfw_b.img... OK
Reading scp_b [6 MiB] -> scp_b.img... OK
Reading sspm_b [1 MiB] -> sspm_b.img... OK
Reading gz_b [16 MiB] -> gz_b.img... OK
Reading lk_b [2 MiB] -> lk_b.img... OK
Reading logo_b [8 MiB] -> logo_b.img... OK
Reading boot_b [32 MiB] -> boot_b.img... OK
Reading vendor_boot_b [64 MiB] -> vendor_boot_b.img... OK
Reading dtbo_b [8 MiB] -> dtbo_b.img... OK
Reading tee_b [6 MiB] -> tee_b.img... OK
Reading super [6 GiB] -> super.img... OK
Reading tranfs [306.78 MiB] -> tranfs.img... OK
Reading userdata [109.2 GiB] -> userdata.img... OK
Reading otp [43 MiB] -> otp.img... OK
Reading flashinfo [16 MiB] -> flashinfo.img... OK
UNLOCKTOOL 2022.10.21.0
Elapsed time : 9 minutes 33 seconds
Last edited: