- Joined
- Nov 29, 2017
- Messages
- 408
REALME C3 RMX2020 SCATTERFILE BACKUP VI UT- PAALALA BACKUP MUNA BAGO MAGFLASH
- FEEDBACK NAMAN KONG TESTED SA DEADBOOT O PROGRAM ISSUE
- MABUHAY PINOY TECHNICIAN...
READ BACK
Initializing usb... OK
Waiting for device... COM29 [BOOTROM:0E8D:0003]
Bypassing authentication... OK
Analyzing... preloader_oppo6769.bin [MT6769:13:2192] [Internal]
Vendor : OPPO/REALME
Handshaking... OK
Reading hardware info... OK
Hardware : MT6768 [Helio G70|G80|G85|P65] 0707 8A00 CA00 0000
Security Config : SCB SLA DAA
MEID : 104C5DC390FB4BF113FF3B0B7905242C
Sending Download-Agent... OK
Syncing with target... OK
Booting device... OK
Syncing with DA... OK
Storage : EMMC - CID : 44000115.4D383644.E8120242.85A630C2
Vendor : Samsung - Name : DD68MB - Serial : 818079762 - Rev : 2
Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 4 MiB - User Area : 29.12 GiB
Reading partition info... OK [48]
Reading device info... OK
Model Name : RMX2020
Manufacturer : realme
Android Version : 10
Security Patch : 2022-03-05
Build ID : QP1A.190711.020 release-keys
Market Name : realme C3i
OTA Version : RMX2020_11.A.73_0730_202203042038
Firmware ver : RMX2027_11_A.73_220304
Reading preloader [512 KiB] -> preloader.bin... OK
Reading pgpt [32 KiB] -> pgpt.bin... OK
Reading recovery_a [32 MiB] -> recovery_a.img... OK
Reading misc [512 KiB] -> misc.img... OK
Reading para [512 KiB] -> para.bin... OK
Reading opporeserve1 [8 MiB] -> opporeserve1.img... OK
Reading opporeserve2 [64 MiB] -> opporeserve2.img... OK
Reading opporeserve3 [64 MiB] -> opporeserve3.img... OK
Reading oppo_custom [1 MiB] -> oppo_custom.bin... OK
Reading expdb [20 MiB] -> expdb.bin... OK
Reading frp [1 MiB] -> frp.bin... OK
Reading vbmeta [8 MiB] -> vbmeta.img... OK
Reading vbmeta_system [8 MiB] -> vbmeta_system.img... OK
Reading vbmeta_vendor [8 MiB] -> vbmeta_vendor.img... OK
Reading md_udc [22.6 MiB] -> md_udc.bin... OK
Reading metadata [32 MiB] -> metadata.img... OK
Reading nvcfg [32 MiB] -> nvcfg.img... OK
Reading nvdata [64 MiB] -> nvdata.img... OK
Reading persist [48 MiB] -> persist.img... OK
Reading protect1 [8 MiB] -> protect1.img... OK
Reading protect2 [10.37 MiB] -> protect2.img... OK
Reading seccfg [8 MiB] -> seccfg.bin... OK
Reading sec1 [2 MiB] -> sec1.bin... OK
Reading proinfo [3 MiB] -> proinfo.bin... OK
Reading boot_para [26 MiB] -> boot_para.bin... OK
Reading nvram [64 MiB] -> nvram.img... OK
Reading cdt_engineering [8 MiB] -> cdt_engineering.img... OK
Reading logo [8 MiB] -> logo.bin... OK
Reading md1img [128 MiB] -> md1img.img... OK
Reading special_preload [768 MiB] -> special_preload.img... OK
Reading my_custom [256 MiB] -> my_custom.img... OK
Reading spmfw [1 MiB] -> spmfw.img... OK
Reading scp1 [6 MiB] -> scp1.img... OK
Reading scp2 [6 MiB] -> scp2.img... OK
Reading sspm_1 [1 MiB] -> sspm_1.img... OK
Reading sspm_2 [1 MiB] -> sspm_2.img... OK
Reading gz1 [16 MiB] -> gz1.bin... OK
Reading gz2 [16 MiB] -> gz2.img... OK
Reading lk [2 MiB] -> lk.bin... OK
Reading lk2 [2 MiB] -> lk2.bin... OK
Reading boot [32 MiB] -> boot.img... OK
Reading dtbo [8 MiB] -> dtbo.img... OK
Reading tee1 [5 MiB] -> tee1.img... OK
Reading tee2 [9 MiB] -> tee2.img... OK
Reading super [6.23 GiB] -> super.img... OK
Reading recovery [64 MiB] -> recovery.img... OK
Reading cache [432 MiB] -> cache.img... OK
Reading userdata [20.59 GiB] -> userdata.img... OK
Reading otp [43 MiB] -> otp.img... OK
Reading flashinfo [16 MiB] -> flashinfo.img... OK
UNLOCKTOOL 2022.10.23.0