- Joined
- Nov 29, 2017
- Messages
- 408
OPPO A16 CPH2269 SCATTER FILE BACKUP VIA UNLOCKTOOL
CLICK LOGO TO DOWNLOAD
:$PAALALA BACKUP MUNA BAGO MAGFLASH
FEEDBACK NAMAN KONG TESTED SA DEADBOOT O PROGRAM ISSUE

READ BACK
Initializing usb... OK
Waiting for device... COM5 [PRELOADER:0E8D:2000]
Jumping to BROM... OK
Bypassing authentication... OK
Analyzing... preloader_oppo6765.bin [MT6765:9:1552] [Internal]
Vendor : OPPO/REALME
Handshaking... OK
Reading hardware info... OK
Hardware : MT6765 [Helio G25|G35|P35] 0766 8A00 CA00 0000
Security Config : SCB SLA DAA
MEID : 1FCC2DFE7F29829E961D584EEF7E62D0
Sending Download-Agent... OK
Syncing with target... OK
Booting device... OK
Syncing with DA... OK
Storage : EMMC - CID : 474E0113.52394A31.4E131038.BB58E6B8
Vendor : Micron - Name : G1J9R8 - Serial : 3870838291 - Rev : 16
Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 16 MiB - User Area : 58.24 GiB
Reading partition info... OK [48]
Reading device info... OK
Model Name : oplus_mssi_64_cn
Product Name : OP4F97
Manufacturer : OPPO
Android Version : 11
Security Patch : 2022-09-05
Build ID : RP1A.200720.011 release-keys
Market Name : OPPO A16
OTA Version : CPH2269_11.A.01_001_202209022200
Reading preloader [512 KiB] -> preloader.bin... OK
Reading pgpt [32 KiB] -> pgpt.bin... OK
Reading boot_para [1 MiB] -> boot_para.bin... OK
Reading recovery [98 MiB] -> recovery.img... OK
Reading para [512 KiB] -> para.bin... OK
Reading opporeserve1 [8 MiB] -> opporeserve1.img... OK
Reading opporeserve2 [128 MiB] -> opporeserve2.img... OK
Reading opporeserve3 [64 MiB] -> opporeserve3.img... OK
Reading oppo_custom [1 MiB] -> oppo_custom.bin... OK
Reading expdb [20 MiB] -> expdb.bin... OK
Reading vbmeta_system [8 MiB] -> vbmeta_system.img... OK
Reading vbmeta_vendor [8 MiB] -> vbmeta_vendor.img... OK
Reading frp [1 MiB] -> frp.bin... OK
Reading nvcfg [32 MiB] -> nvcfg.img... OK
Reading nvdata [64 MiB] -> nvdata.img... OK
Reading md_udc [22.6 MiB] -> md_udc.bin... OK
Reading metadata [32 MiB] -> metadata.img... OK
Reading protect1 [8 MiB] -> protect1.img... OK
Reading protect2 [15.87 MiB] -> protect2.img... OK
Reading seccfg [8 MiB] -> seccfg.bin... OK
Reading persist [48 MiB] -> persist.img... OK
Reading sec1 [2 MiB] -> sec1.bin... OK
Reading proinfo [3 MiB] -> proinfo.bin... OK
Reading ocdt [8 MiB] -> ocdt.img... OK
Reading opporeserve5 [32 MiB] -> opporeserve5.img... OK
Reading opporeserve6 [64 MiB] -> opporeserve6.img... OK
Reading cdt_engineering [8 MiB] -> cdt_engineering.img... OK
Reading md1img [100 MiB] -> md1img.img... OK
Reading spmfw [1 MiB] -> spmfw.img... OK
Reading scp1 [1 MiB] -> scp1.img... OK
Reading scp2 [1 MiB] -> scp2.img... OK
Reading sspm_1 [1 MiB] -> sspm_1.img... OK
Reading sspm_2 [1 MiB] -> sspm_2.img... OK
Reading gz1 [16 MiB] -> gz1.bin... OK
Reading gz2 [16 MiB] -> gz2.img... OK
Reading nvram [64 MiB] -> nvram.img... OK
Reading lk [5 MiB] -> lk.bin... OK
Reading lk2 [5 MiB] -> lk2.bin... OK
Reading boot [32 MiB] -> boot.img... OK
Reading vendor_boot [64 MiB] -> vendor_boot.img... OK
Reading logo [16 MiB] -> logo.bin... OK
Reading dtbo [8 MiB] -> dtbo.img... OK
Reading tee1 [5 MiB] -> tee1.img... OK
Reading tee2 [11 MiB] -> tee2.img... OK
Reading super [8.05 GiB] -> super.img... OK
Reading vbmeta [8 MiB] -> vbmeta.img... OK
Reading cache [432 MiB] -> cache.img... OK
Reading userdata [48.69 GiB] -> userdata.img... OK
Reading otp [43 MiB] -> otp.img... OK
Reading flashinfo [16 MiB] -> flashinfo.img... OK
UNLOCKTOOL 2022.10.05.2
Elapsed time : 9 minutes 34 seconds
CLICK LOGO TO DOWNLOAD
:$PAALALA BACKUP MUNA BAGO MAGFLASH
FEEDBACK NAMAN KONG TESTED SA DEADBOOT O PROGRAM ISSUE

READ BACK
Initializing usb... OK
Waiting for device... COM5 [PRELOADER:0E8D:2000]
Jumping to BROM... OK
Bypassing authentication... OK
Analyzing... preloader_oppo6765.bin [MT6765:9:1552] [Internal]
Vendor : OPPO/REALME
Handshaking... OK
Reading hardware info... OK
Hardware : MT6765 [Helio G25|G35|P35] 0766 8A00 CA00 0000
Security Config : SCB SLA DAA
MEID : 1FCC2DFE7F29829E961D584EEF7E62D0
Sending Download-Agent... OK
Syncing with target... OK
Booting device... OK
Syncing with DA... OK
Storage : EMMC - CID : 474E0113.52394A31.4E131038.BB58E6B8
Vendor : Micron - Name : G1J9R8 - Serial : 3870838291 - Rev : 16
Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 16 MiB - User Area : 58.24 GiB
Reading partition info... OK [48]
Reading device info... OK
Model Name : oplus_mssi_64_cn
Product Name : OP4F97
Manufacturer : OPPO
Android Version : 11
Security Patch : 2022-09-05
Build ID : RP1A.200720.011 release-keys
Market Name : OPPO A16
OTA Version : CPH2269_11.A.01_001_202209022200
Reading preloader [512 KiB] -> preloader.bin... OK
Reading pgpt [32 KiB] -> pgpt.bin... OK
Reading boot_para [1 MiB] -> boot_para.bin... OK
Reading recovery [98 MiB] -> recovery.img... OK
Reading para [512 KiB] -> para.bin... OK
Reading opporeserve1 [8 MiB] -> opporeserve1.img... OK
Reading opporeserve2 [128 MiB] -> opporeserve2.img... OK
Reading opporeserve3 [64 MiB] -> opporeserve3.img... OK
Reading oppo_custom [1 MiB] -> oppo_custom.bin... OK
Reading expdb [20 MiB] -> expdb.bin... OK
Reading vbmeta_system [8 MiB] -> vbmeta_system.img... OK
Reading vbmeta_vendor [8 MiB] -> vbmeta_vendor.img... OK
Reading frp [1 MiB] -> frp.bin... OK
Reading nvcfg [32 MiB] -> nvcfg.img... OK
Reading nvdata [64 MiB] -> nvdata.img... OK
Reading md_udc [22.6 MiB] -> md_udc.bin... OK
Reading metadata [32 MiB] -> metadata.img... OK
Reading protect1 [8 MiB] -> protect1.img... OK
Reading protect2 [15.87 MiB] -> protect2.img... OK
Reading seccfg [8 MiB] -> seccfg.bin... OK
Reading persist [48 MiB] -> persist.img... OK
Reading sec1 [2 MiB] -> sec1.bin... OK
Reading proinfo [3 MiB] -> proinfo.bin... OK
Reading ocdt [8 MiB] -> ocdt.img... OK
Reading opporeserve5 [32 MiB] -> opporeserve5.img... OK
Reading opporeserve6 [64 MiB] -> opporeserve6.img... OK
Reading cdt_engineering [8 MiB] -> cdt_engineering.img... OK
Reading md1img [100 MiB] -> md1img.img... OK
Reading spmfw [1 MiB] -> spmfw.img... OK
Reading scp1 [1 MiB] -> scp1.img... OK
Reading scp2 [1 MiB] -> scp2.img... OK
Reading sspm_1 [1 MiB] -> sspm_1.img... OK
Reading sspm_2 [1 MiB] -> sspm_2.img... OK
Reading gz1 [16 MiB] -> gz1.bin... OK
Reading gz2 [16 MiB] -> gz2.img... OK
Reading nvram [64 MiB] -> nvram.img... OK
Reading lk [5 MiB] -> lk.bin... OK
Reading lk2 [5 MiB] -> lk2.bin... OK
Reading boot [32 MiB] -> boot.img... OK
Reading vendor_boot [64 MiB] -> vendor_boot.img... OK
Reading logo [16 MiB] -> logo.bin... OK
Reading dtbo [8 MiB] -> dtbo.img... OK
Reading tee1 [5 MiB] -> tee1.img... OK
Reading tee2 [11 MiB] -> tee2.img... OK
Reading super [8.05 GiB] -> super.img... OK
Reading vbmeta [8 MiB] -> vbmeta.img... OK
Reading cache [432 MiB] -> cache.img... OK
Reading userdata [48.69 GiB] -> userdata.img... OK
Reading otp [43 MiB] -> otp.img... OK
Reading flashinfo [16 MiB] -> flashinfo.img... OK
UNLOCKTOOL 2022.10.05.2
Elapsed time : 9 minutes 34 seconds
Last edited: