Code:
READ BACK Initializing usb... OK
Waiting for device... COM55 [BOOTROM:0E8D:0003]
Bypassing authentication... OK
Analyzing... preloader_k61v1_64_bsp.bin [MT6761:3:592] [Internal]
Handshaking... OK
Reading hardware info... OK
Hardware : MT6761 [Helio A20|A22|A25|G25|P22] 0717 8A00 CA01 0200
Security Config : SCB SLA DAA
MEID : 77CAFAC4BDACAD16C6E196FA510C5633
Sending Download-Agent... OK
Syncing with target... OK
Booting device... OK
Syncing with DA... OK
Storage : EMMC - CID : 410301D6.35354133.64AB1031.31782A13
Vendor : Samsung - Name : A3A551 - Serial : 705914027 - Rev : 16
Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 16 MiB - User Area : 28.91 GiB
Reading partition info... OK [46]
Reading device info... OK
Model Name : LAVA LZG403
Product Name : LZG403
Manufacturer : LAVA
Platform : k61v1_64_bsp
Android Version : 11
Security Patch : 2023-01-05
Build ID : LAVA_LZG403_SW_V16_HW_V2.0_20230118
Build : 300
Build Date : Wed Jan 18 15:08:28 CST 2023
Reading preloader [512 KiB] -> preloader.bin... OK
Reading pgpt [32 KiB] -> pgpt.bin... OK
Reading boot_para [1 MiB] -> boot_para.bin... OK
Reading para [512 KiB] -> para.bin... OK
Reading expdb [20 MiB] -> expdb.bin... OK
Reading frp [1 MiB] -> frp.bin... OK
Reading nvcfg [32 MiB] -> nvcfg.img... OK
Reading nvdata [64 MiB] -> nvdata.img... OK
Reading md_udc [22.6 MiB] -> md_udc.bin... OK
Reading metadata [32 MiB] -> metadata.img... OK
Reading protect1 [8 MiB] -> protect1.img... OK
Reading protect2 [10.87 MiB] -> protect2.img... OK
Reading seccfg [8 MiB] -> seccfg.bin... OK
Reading persist [48 MiB] -> persist.img... OK
Reading sec1 [2 MiB] -> sec1.bin... OK
Reading proinfo [3 MiB] -> proinfo.bin... OK
Reading nvram [64 MiB] -> nvram.img... OK
Reading logo [11 MiB] -> logo.bin... OK
Reading md1img_a [100 MiB] -> md1img_a.img... OK
Reading spmfw_a [1 MiB] -> spmfw_a.img... OK
Reading scp_a [1 MiB] -> scp_a.img... OK
Reading sspm_a [1 MiB] -> sspm_a.img... OK
Reading gz_a [16 MiB] -> gz_a.img... OK
Reading lk_a [1 MiB] -> lk_a.img... OK
Reading boot_a [32 MiB] -> boot_a.img... OK
Reading vendor_boot_a [64 MiB] -> vendor_boot_a.img... OK
Reading dtbo_a [8 MiB] -> dtbo_a.img... OK
Reading tee_a [8 MiB] -> tee_a.img... OK
Reading vbmeta_a [8 MiB] -> vbmeta_a.img... OK
Reading vbmeta_system_a [8 MiB] -> vbmeta_system_a.img... OK
Reading vbmeta_vendor_a [8 MiB] -> vbmeta_vendor_a.img... OK
Reading md1img_b [100 MiB] -> md1img_b.img... OK
Reading spmfw_b [1 MiB] -> spmfw_b.img... OK
Reading scp_b [1 MiB] -> scp_b.img... OK
Reading sspm_b [1 MiB] -> sspm_b.img... OK
Reading gz_b [16 MiB] -> gz_b.img... OK
Reading lk_b [1 MiB] -> lk_b.img... OK
Reading boot_b [32 MiB] -> boot_b.img... OK
Reading vendor_boot_b [64 MiB] -> vendor_boot_b.img... OK
Reading dtbo_b [8 MiB] -> dtbo_b.img... OK
Reading tee_b [8 MiB] -> tee_b.img... OK
Reading super [4 GiB] -> super.img... OK
Reading vbmeta_b [8 MiB] -> vbmeta_b.img... OK
Reading vbmeta_system_b [8 MiB] -> vbmeta_system_b.img... OK
Reading vbmeta_vendor_b [8 MiB] -> vbmeta_vendor_b.img... OK
Reading userdata [24.03 GiB] -> userdata.img... OK
Reading otp [43 MiB] -> otp.img... OK
Reading flashinfo [16 MiB] -> flashinfo.img... OK
UNLOCKTOOL 2023.04.09.0
Elapsed time : 3 minutes 35 seconds
Attachments
-
235 bytes Views: 49