Mtk, nvdata, imei backup, all share

ở topic này dành cho ae mobile lưu trử file backup imei , các dòng máy cpu mtk.

  1. ae đăng cái log của unlock tool, mục đích để lấy id cpu
  2. backup nv bằng unlock tool
  3. ném file backup vào bài viết

file được lưu trử vĩnh viễn trên hệ thống không sợ mất hay bị lộn tên nha ae

BOOT DEVICE Authenticating... OK
Initializing usb... OK
Waiting for device... COM46
  Connection : USB 1.0 High-Speed 
  USB Driver : [MediaTek Inc.] wdm_usb - Version : 3.0.1504.0
  Boot Mode : BOOTROM [0E8D:0003]
Bypassing authentication... OK
Analyzing preloader... preloader_k68v1_64_titan.bin [EMI:12] [Internal]
Vendor : SAMSUNG
Handshaking... OK
Reading hardware info... OK
  Hardware : MT6768 [Helio G70|G80|G85|P65] [0x707] 8A00 CA00 0000
  Security Config : SCB SLA DAA 
  MEID : D96CA7E80520FC472B0A6DA9D1E45FA1
Sending Download-Agent... OK
Syncing with target... OK
Booting device... OK
Syncing with DA...
  Storage : EMMC - CID : 33000115.4D433656.18000042.FD3755DC 
  Vendor : Samsung - Name : 3V6CMB - Serial : 1440487424 - Rev : 0
  Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 16 MiB - User Area : 116.48 GiB 
Reading partition info... OK [52]
Reading device info... OK
   Model Name : SM-A315G
   Product Name : a31nsdx
   Manufacturer : samsung
   Platform : k68v1_64_titan
   Android Version : 10
   Security Patch : 2020-10-01
   Display ID : QP1A.190711.020.A315GDXS1ATJ1
   Build : A315GDXS1ATJ1
   Build Date : Wed Sep 30 12:56:15 KST 2020
   PDA : A315GDXS1ATJ1
UNLOCKTOOL 2021.12.12.0
Elapsed time : 1 minute 13 seconds

NVBACKUP.zip (1.8 MB)

BOOT DEVICE Authenticating... OK
Initializing usb... OK
Waiting for device... COM56
Bypassing authentication... OK
Analyzing preloader... preloader_k65v1_64_bsp_titan_rat.bin [EMI:10] [Internal]
Vendor : SAMSUNG
Handshaking... OK
Reading hardware info... OK
  Hardware : MT6765 [Helio G25|G35|P35] [0x766] 8A00 CA00 0000
  Security Config : SCB SLA DAA 
  MEID : E6E8D780984343467279545FC925F1B7
Sending Download-Agent... OK
Syncing with target... OK
Booting device... OK
Syncing with DA...
  Storage : EMMC - CID : 474E0113.53394A31.87111039.95387442 
  Vendor : Micron - Name : G1J9S9 - Serial : 1950517009 - Rev : 16
  Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 16 MiB - User Area : 116,48 GiB 
Reading partition info... OK [53]
Reading device info... OK
   Model Name : SM-A125F
   Product Name : a12nsxx
   Manufacturer : samsung
   Platform : k65v1_64_bsp_titan_rat
   Android Version : 11
   Security Patch : 2021-09-01
   Display ID : RP1A.200720.012.A125FXXU1BUI3
   Build : A125FXXU1BUI3
   Build Date : Wed Sep 15 19:10:48 KST 2021
   PDA : A125FXXU1BUI3
UNLOCKTOOL 2021.12.22.0
Elapsed time : 9 seconds

nvbackup.zip (1.5 MB)

BOOT DEVICE Authenticating... OK
Initializing usb... OK
Waiting for device... COM3
Bypassing authentication... OK
Analyzing preloader... preloader_k69v1_64_titan_marmot.bin [EMI:8] [Internal]
Vendor : SAMSUNG
Handshaking... OK
Reading hardware info... OK
  Hardware : MT6768 [Helio G70|G80|G85|P65] [0x707] 8A00 CA00 0000
  Security Config : SCB SLA DAA 
  MEID : 6A20EAA2D150F91A73F738A6562D0664
Sending Download-Agent... OK
Syncing with target... OK
Booting device... OK
Syncing with DA...
  Storage : EMMC - CID : 33000115.41433656.94680042.A7380BD0 
  Vendor : Samsung - Name : 3V6CAB - Serial : 198218856 - Rev : 0
  Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 16 MiB - User Area : 116.48 GiB 
Reading partition info... OK [49]
Reading device info... OK
   Model Name : SM-A325F
   Product Name : a32xx
   Manufacturer : samsung
   Platform : k69v1_64_titan_marmot
   Android Version : 11
   Security Patch : 2021-03-01
   Display ID : RP1A.200720.012.A325FXXU1AUCB
   Build : A325FXXU1AUCB
   Build Date : Wed Mar 24 01:28:15 KST 2021
   PDA : A325FXXU1AUCB
UNLOCKTOOL 2021.12.22.0
Elapsed time : 25 seconds

nvbackup.zip (1.9 MB)

BOOT DEVICE Authenticating... OK
Initializing usb... OK
Waiting for device... COM23
Bypassing authentication... OK
Analyzing preloader... preloader_oppo6771.bin [EMI:26] [Internal]
Vendor : OPPO/REALME
Handshaking... OK
Reading hardware info... OK
  Hardware : MT6771 [Helio P60|P70] [0x788] 8A00 CA00 0000
  Security Config : SCB SLA DAA 
  MEID : DF328D70A3FBB4646D2A6DA2FCC38011
Sending Download-Agent... OK
Syncing with target... OK
Booting device... OK
Syncing with DA...
  Storage : EMMC - CID : 684A0190.50614544.E42F0333.E7460272 
  Vendor : SK Hynix - Name : hDEaP3 - Serial : 41083951 - Rev : 3
  Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 16 MiB - User Area : 116.48 GiB 
Reading partition info... OK [44]
Reading device info...UNLOCKTOOL 2021.12.22.0
Elapsed time : 17 seconds

imei backup.zip (1.6 MB)

BOOT DEVICE Authenticating... OK
Initializing usb... OK
Waiting for device... COM46
Bypassing authentication... OK
Analyzing preloader... preloader_k69v1_64_titan_marmot.bin [EMI:8] [Internal]
Vendor : SAMSUNG
Handshaking... OK
Reading hardware info... OK
  Hardware : MT6768 [Helio G70|G80|G85|P65] 0707 8A00 CA00 0000
  Security Config : SCB SLA DAA 
  MEID : E668DA798D2BB10BF8CD378AF82CC792
Sending Download-Agent... OK
Syncing with target... OK
Booting device... OK
Syncing with DA... OK
  Storage : EMMC - CID : 33000115.41433656.85D0042.15382BD0 
  Vendor : Samsung - Name : 3V6CAB - Serial : 735053917 - Rev : 0
  Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 16 MiB - User Area : 116.48 GiB 
Reading partition info... OK [49]
Reading device info... OK
   Model Name : SM-A325F
   Product Name : a32xx
   Manufacturer : samsung
   Platform : k69v1_64_titan_marmot
   Android Version : 11
   Security Patch : 2021-03-01
   Display ID : RP1A.200720.012.A325FXXU1AUCB
   Build : A325FXXU1AUCB
   Build Date : Wed Mar 24 01:28:15 KST 2021
   PDA : A325FXXU1AUCB
UNLOCKTOOL 2021.12.29.0
Elapsed time : 24 seconds

nvbackup.zip (2.0 MB)

BOOT DEVICE Authenticating... OK
Initializing usb... OK
Waiting for device... COM15
Bypassing authentication... OK
Analyzing preloader... preloader_k65v1_64_bsp_titan_rat.bin [EMI:10] [Internal]
Vendor : SAMSUNG
Handshaking... OK
Reading hardware info... OK
  Hardware : MT6765 [Helio G25|G35|P35] 0766 8A00 CA00 0000
  Security Config : SCB SLA DAA 
  MEID : 233AD2F150E0B2C22041202B48B0D2A2
Sending Download-Agent... OK
Syncing with target... OK
Booting device... OK
Syncing with DA... OK
  Storage : EMMC - CID : 44000115.41443656.3EAE0042.6B38A7BE 
  Vendor : Samsung - Name : DV6DAB - Serial : 2814262958 - Rev : 0
  Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 16 MiB - User Area : 116.48 GiB 
Reading partition info... OK [49]
Reading device info... OK
   Model Name : SM-A125F
   Product Name : a12nsxx
   Manufacturer : samsung
   Platform : k65v1_64_bsp_titan_rat
   Android Version : 11
   Security Patch : 2021-10-01
   Display ID : RP1A.200720.012.A125FXXU1BUJ4
   Build : A125FXXU1BUJ4
   Build Date : Fri Oct 22 21:10:50 KST 2021
   PDA : A125FXXU1BUJ4
UNLOCKTOOL 2021.12.29.0
Elapsed time : 10 seconds

nvbackup.zip (1.4 MB)

BOOT DEVICE Authenticating... OK
Initializing usb... OK
Waiting for device... COM46
Bypassing authentication... OK
Analyzing preloader... preloader_k69v1_64_titan_marmot.bin [EMI:8] [Internal]
Vendor : SAMSUNG
Handshaking... OK
Reading hardware info... OK
  Hardware : MT6768 [Helio G70|G80|G85|P65] 0707 8A00 CA00 0000
  Security Config : SCB SLA DAA 
  MEID : E3EBA77B0258BBA193FF1064239D4D4C
Sending Download-Agent... OK
Syncing with target... OK
Booting device... OK
Syncing with DA... OK
  Storage : EMMC - CID : 33000115.41433656.BAA0042.792897CA 
  Vendor : Samsung - Name : 3V6CAB - Serial : 2546600874 - Rev : 0
  Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 16 MiB - User Area : 116.48 GiB 
Reading partition info... OK [49]
Reading device info... OK
   Model Name : SM-A325F
   Product Name : a32xx
   Manufacturer : samsung
   Platform : k69v1_64_titan_marmot
   Android Version : 11
   Security Patch : 2021-03-01
   Display ID : RP1A.200720.012.A325FXXU1AUCB
   Build : A325FXXU1AUCB
   Build Date : Wed Mar 24 01:28:15 KST 2021
   PDA : A325FXXU1AUCB
UNLOCKTOOL 2021.12.29.0
Elapsed time : 1 minute 39 seconds

nvbackup.zip (1.8 MB)

BOOT DEVICE Authenticating... OK
Initializing usb... OK
Waiting for device... COM105
Jumping to BROM... OK
Bypassing authentication... OK
Analyzing preloader... preloader_k62v1_64_bsp.bin [EMI:12] [Internal]
Handshaking... OK
Reading hardware info... OK
  Hardware : MT6765 [Helio G25|G35|P35] [0x766] 8A00 CA00 0000
  Security Config : SCB SLA DAA 
  MEID : 7A0FCADCEB029C2A12B18477AB00E9D7
Sending Download-Agent... OK
Syncing with target... OK
Booting device... OK
Syncing with DA...
  Storage : EMMC - CID : 51000115.4D333644.A67D0142.D526F607 
  Vendor : Samsung - Name : QD63MB - Serial : 4127696509 - Rev : 1
  Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 16 MiB - User Area : 29.12 GiB 
Reading partition info... OK [42]
Reading device info... OK
   Model Name : vivo 1820
   Product Name : PD1818HF_EX
   Manufacturer : vivo
   Platform : k62v1_64_bsp
   Android Version : 8.1.0
   Security Patch : 2021-07-01
   Display ID : O11019 release-keys
   Build Date : Thu Jul 15 19:04:44 CST 2021
   Vivo Model : PD1818HF_EXMA
   Vivo Version : PD1818HF_EX_A_1.21.16
   OS Name : Funtouch
   OS Version : 4.5
   OS Build : Funtouch OS_4.5
UNLOCKTOOL 2021.12.22.0
Elapsed time : 1 minute 59 seconds

nvbackup.zip (1.3 MB)

Authenticating...  OK
Initializing usb... OK
Waiting for device... COM13
Bypassing authentication... OK
Analyzing preloader... preloader_k69v1_64_titan_marmot.bin [EMI:12] [Internal]
Vendor : SAMSUNG
Handshaking... OK
Reading hardware info... OK
  Hardware : MT6768 [Helio G70|G80|G85|P65] 0707 8A00 CA00 0000
  Security Config : SCB SLA DAA 
  MEID : 93136B315E66AE677D474163A746D84B
Sending Download-Agent... OK
Syncing with target... OK
Booting device... OK
Syncing with DA... OK
  Storage : EMMC - CID : 33000115.41433656.F97C0042.513859D0 
  Vendor : Samsung - Name : 3V6CAB - Serial : 1506867580 - Rev : 0
  Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 16 MiB - User Area : 116.48 GiB 
Reading partition info... OK [49]
Reading device info... OK
   Model Name : SM-A325F
   Product Name : a32xx
   Manufacturer : samsung
   Platform : k69v1_64_titan_marmot
   Android Version : 11
   Security Patch : 2021-11-01
   Display ID : RP1A.200720.012.A325FXXU2AUJ4
   Build : A325FXXU2AUJ4
   Build Date : Mon Oct 18 13:18:40 KST 2021
   PDA : A325FXXU2AUJ4

A32.zip (1.4 MB)

BOOT DEVICE Authenticating... OK
Initializing usb... OK
Waiting for device... COM105
Jumping to BROM... OK
Bypassing authentication... OK
Analyzing preloader... preloader_s96116ca1.bin [EMI:8] [Internal]
Vendor : SAMSUNG
Handshaking... OK
Reading hardware info... OK
  Hardware : MT6765 [Helio G25|G35|P35] 0766 8A00 CA00 0000
  Security Config : SCB SLA DAA 
  MEID : 3154DA3B1C73C850428EE57657F7E273
Sending Download-Agent... OK
Syncing with target... OK
Booting device... OK
Syncing with DA... OK
  Storage : EMMC - CID : 51000115.4D333644.80E30342.9BA68206 
  Vendor : Samsung - Name : QD63MB - Serial : 2181464291 - Rev : 3
  Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 16 MiB - User Area : 29.12 GiB 
Reading partition info... OK [39]
Reading device info... OK
   Model Name : SM-A107F
   Product Name : a10sxx
   Manufacturer : samsung
   Platform : S96116CA1
   Android Version : 10
   Security Patch : 2021-03-01
   Display ID : QP1A.190711.020.A107FXXS8BUC1
   Build : A107FXXS8BUC1
   Build Date : Tue Mar 9 10:31:35 KST 2021
   PDA : A107FXXS8BUC1
UNLOCKTOOL 2021.12.29.0
Elapsed time : 20 seconds

nvbackup.zip (1.3 MB)

BOOT DEVICE Authenticating... OK
Initializing usb... OK
Waiting for device... COM105
Jumping to BROM... OK
Bypassing authentication... OK
Analyzing preloader... preloader_s96116aa1.bin [EMI:3] [Internal]
Vendor : SAMSUNG
Handshaking... OK
Reading hardware info... OK
  Hardware : MT6765 [Helio G25|G35|P35] 0766 8A00 CA00 0000
  Security Config : SCB SLA DAA 
  MEID : 680443FE9C87732F6F44AFE688EC8A8C
Sending Download-Agent... OK
Syncing with target... OK
Booting device... OK
Syncing with DA... OK
  Storage : EMMC - CID : 51000115.4D333644.CAAB0342.BDA6E406 
  Vendor : Samsung - Name : QD63MB - Serial : 3825650347 - Rev : 3
  Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 16 MiB - User Area : 29.12 GiB 
Reading partition info... OK [39]
Reading device info... OK
   Model Name : SM-A107F
   Product Name : a10sxx
   Manufacturer : samsung
   Platform : S96116AA1
   Android Version : 9
   Security Patch : 2020-01-01
   Display ID : PPR1.180610.011.A107FXXU5ATA9
   Build Date : Tue Jan 21 21:19:18 KST 2020
   PDA : A107FXXU5ATA9
UNLOCKTOOL 2021.12.29.0
Elapsed time : 8 seconds

nvbackup.zip (1.5 MB)

BOOT DEVICE Authenticating... OK
Initializing usb... OK
Waiting for device... COM4
Bypassing authentication... OK
Analyzing preloader... preloader_k39tv1_bsp_titan_hamster.bin [EMI:7] [Internal]
Vendor : SAMSUNG
Handshaking... OK
Reading hardware info... OK
  Hardware : MT6739 0699 8A00 CA00 0000
  Security Config : SCB SLA DAA 
  MEID : F3D062A138177641D2696FF89F98CF1E
Sending Download-Agent... OK
Syncing with target... OK
Booting device... OK
Syncing with DA... OK
  Storage : EMMC - CID : 51000115.41333658.D2D30042.EF58B396 
  Vendor : Samsung - Name : QX63AB - Serial : 3013006035 - Rev : 0
  Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 16 MiB - User Area : 29.12 GiB 
Reading partition info... OK [50]
Reading device info... OK
   Model Name : SM-M022F
   Product Name : a02dx
   Manufacturer : samsung
   Platform : k39tv1_bsp_titan_hamster
   Android Version : 10
   Security Patch : 2021-05-01
   Display ID : QP1A.190711.020.M022FXXU2AUF1
   Build : M022FXXU2AUF1
   Build Date : Tue Jun 1 19:54:16 KST 2021
   PDA : M022FXXU2AUF1
UNLOCKTOOL 2022.01.08.0
Elapsed time : 31 seconds

nvbackup.zip (946.2 KB)

1 Likes
BOOT DEVICE Authenticating... OK
Initializing usb... OK
Waiting for device... COM76
Bypassing authentication... OK
Analyzing preloader... preloader_k69v1_64_titan_marmot.bin [EMI:8] [Internal]
Vendor : SAMSUNG
Handshaking... OK
Reading hardware info... OK
  Hardware : MT6768 [Helio G70|G80|G85|P65] 0707 8A00 CA00 0000
  Security Config : SCB SLA DAA 
  MEID : 354C68DE18420C46063476748BE2A569
Sending Download-Agent... OK
Syncing with target... OK
Booting device... OK
Syncing with DA... OK
  Storage : EMMC - CID : 33000115.41433656.1C690042.D73826D0 
  Vendor : Samsung - Name : 3V6CAB - Serial : 651172969 - Rev : 0
  Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 16 MiB - User Area : 116.48 GiB 
Reading partition info... OK [49]
Reading device info... OK
   Model Name : SM-A325F
   Product Name : a32xx
   Manufacturer : samsung
   Platform : k69v1_64_titan_marmot
   Android Version : 11
   Security Patch : 2021-04-01
   Display ID : RP1A.200720.012.A325FXXU1AUD7
   Build : A325FXXU1AUD7
   Build Date : Mon Apr 26 19:48:23 KST 2021
   PDA : A325FXXU1AUD7
UNLOCKTOOL 2022.01.08.0
Elapsed time : 19 seconds

nvbackup.zip (1.9 MB)

1 Likes
BOOT DEVICE Authenticating... OK
Initializing usb... OK
Waiting for device... COM14
Bypassing authentication... OK
Analyzing preloader... preloader_k39tv1_bsp_titan_hamster.bin [EMI:7] [Internal]
Vendor : SAMSUNG
Handshaking... OK
Reading hardware info... OK
  Hardware : MT6739 0699 8A00 CA00 0000
  Security Config : SCB SLA DAA 
  MEID : 9EA3C000164447CC51EE26709091930E
Sending Download-Agent... OK
Syncing with target... OK
Booting device... OK
Syncing with DA... OK
  Storage : EMMC - CID : 51000115.41333658.477E0042.D158086A 
  Vendor : Samsung - Name : QX63AB - Serial : 141182846 - Rev : 0
  Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 16 MiB - User Area : 29.12 GiB 
Reading partition info... OK [50]
Reading device info... OK
   Model Name : SM-M022F
   Product Name : a02dx
   Manufacturer : samsung
   Platform : k39tv1_bsp_titan_hamster
   Android Version : 10
   Security Patch : 2021-05-01
   Display ID : QP1A.190711.020.M022FXXU2AUF1
   Build : M022FXXU2AUF1
   Build Date : Tue Jun 1 19:54:16 KST 2021
   PDA : M022FXXU2AUF1
UNLOCKTOOL 2022.01.19.0
Elapsed time : 1 minute 53 seconds

nvbackup.zip (1.0 MB)

1 Likes
BOOT DEVICE Authenticating... OK
Initializing usb... OK
Waiting for device... COM3
Bypassing authentication... OK
Analyzing preloader... preloader_k65v1_64_bsp_titan_rat.bin [EMI:10] [Internal]
Vendor : SAMSUNG
Handshaking... OK
Reading hardware info... OK
  Hardware : MT6765 [Helio G25|G35|P35] 0766 8A00 CA00 0000
  Security Config : SCB SLA DAA 
  MEID : 2592B3DFB149FBB95BFEB19BDA6A0E32
Sending Download-Agent... OK
Syncing with target... OK
Booting device... OK
Syncing with DA... OK
  Storage : EMMC - CID : 44000115.41443656.1BCA0042.85B71FE8 
  Vendor : Samsung - Name : DV6DAB - Serial : 535305162 - Rev : 0
  Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 16 MiB - User Area : 116.48 GiB 
Reading partition info... OK [49]
Reading device info... OK
   Model Name : SM-A125F
   Product Name : a12nsxx
   Manufacturer : samsung
   Platform : k65v1_64_bsp_titan_rat
   Android Version : 10
   Security Patch : 2021-02-01
   Display ID : QP1A.190711.020.A125FXXU1AUC3
   Build : A125FXXU1AUC3
   Build Date : Mon Mar 15 11:00:46 KST 2021
   PDA : A125FXXU1AUC3
UNLOCKTOOL 2022.01.19.0
Elapsed time : 17 seconds

nvbackup.zip (1.2 MB)

1 Likes
BOOT DEVICE Authenticating... OK
Initializing usb... OK
Waiting for device... COM3
Bypassing authentication... OK
Analyzing preloader... preloader_k69v1_64_titan_marmot.bin [EMI:12] [Internal]
Vendor : SAMSUNG
Handshaking... OK
Reading hardware info... OK
  Hardware : MT6768 [Helio G70|G80|G85|P65] 0707 8A00 CA00 0000
  Security Config : SCB SLA DAA 
  MEID : AE1914699E8F25D47CF22CD195C70339
Sending Download-Agent... OK
Syncing with target... OK
Booting device... OK
Syncing with DA... OK
  Storage : EMMC - CID : 33000115.41433656.95830042.5D2861D4 
  Vendor : Samsung - Name : 3V6CAB - Serial : 1641321859 - Rev : 0
  Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 16 MiB - User Area : 116.48 GiB 
Reading partition info... OK [49]
Reading device info... OK
   Model Name : SM-A325F
   Product Name : a32xx
   Manufacturer : samsung
   Platform : k69v1_64_titan_marmot
   Android Version : 11
   Security Patch : 2021-11-01
   Display ID : RP1A.200720.012.A325FXXU2AUJ4
   Build : A325FXXU2AUJ4
   Build Date : Mon Oct 18 13:18:40 KST 2021
   PDA : A325FXXU2AUJ4
UNLOCKTOOL 2022.03.26.0
Elapsed time : 8 seconds

backup.zip (2.1 MB)

BOOT DEVICE Authenticating... OK
Initializing usb... OK
Waiting for device... COM3
Bypassing authentication... OK
Analyzing preloader... preloader_k68v1_64_titan.bin [EMI:12] [Internal]
Vendor : SAMSUNG
Handshaking... OK
Reading hardware info... OK
  Hardware : MT6768 [Helio G70|G80|G85|P65] 0707 8A00 CA00 0000
  Security Config : SCB SLA DAA 
  MEID : 485FBB85CDBADB5F8120BD3C7FF0A257
Sending Download-Agent... OK
Syncing with target... OK
Booting device... OK
Syncing with DA... OK
  Storage : EMMC - CID : 33000115.4D433656.D9D00042.1B4760DC 
  Vendor : Samsung - Name : 3V6CMB - Serial : 1625086416 - Rev : 0
  Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 16 MiB - User Area : 116.48 GiB 
Reading partition info... OK [52]
Reading device info... OK
   Model Name : SM-A315G
   Product Name : a31nsdx
   Manufacturer : samsung
   Platform : k68v1_64_titan
   Android Version : 10
   Security Patch : 2020-11-01
   Display ID : QP1A.190711.020.A315GDXU1BTK3
   Build : A315GDXU1BTK3
   Build Date : Fri Nov 27 10:29:02 +07 2020
   PDA : A315GDXU1BTK3
UNLOCKTOOL 2022.03.26.0
Elapsed time : 8 seconds

backup.zip (1.8 MB)

Z3X EasyJtag Software ver. 3.7.0.23
UFS Socket Info.
Serial: 0123664F7D205BD7EE 
Description: EasyJTAG UFS Socket BGA-153 by EasyJTAG 25.11.20

Identify UFS Chip.
UFS Chip Voltage: Low
VCC: 3336mV
VCCQ2: 1856mV

Chip Info:
Manufacturer: SAMSUNG
ProductName: KLUDG4UHDC-B0E1
SerialNumber: 0x5288F731491E7EAD7708CEB6E181534242415630314F
OemID: SAMSUNG_OEM_ID
Firmware Version: 0.05
UFS Version: 3.1

Maximum Number of LUs: 8
Number of LUs found: 5
   LUN 0:
      Block size: 0x1000
      Size: 0x1DC9400000 / 119,148,000,000B / 119GB
   LUN 1 (Boot A):
      Block size: 0x1000
      Size: 0x400000 / 0,004,000,000B / 4MB
   LUN 2 (Boot B):
      Block size: 0x1000
      Size: 0x400000 / 0,004,000,000B / 4MB
   LUN 3:
      Block size: 0x1000
      Size: 0x800000 / 0,008,000,000B / 8MB
   LUN 4:
      Block size: 0x1000
      Size: 0x1400000 / 0,020,000,000B / 20MB
Number of W-LUs found: 1
   W-LUN 0xC4 (RPMB):
      Block size: 0x100
      Size: 0x1000000 / 0,016,000,000B / 16MB
Full size: 0x1DCC800000 / 119,200,000,000B / 119GB

RPMB:
 Counter: 5295

Health:
 Device life time method A: 0x01 (0%-10% device life time used)
 Device life time method B: 0x01 (0%-10% device life time used)
 Pre End of Life: 0x01 (Used less then 80% of reserved blocks)

Chip config is OTP

Checking LU0 for partitioning
LUN0 Have 34 partitions
LUN1 Have no partitions
LUN2 Have no partitions
LUN3 Have 1 partitions
LUN4 Have no partitions
------ Detected 35 partitions ------
LUN0 (EFS) [0x400000 0x1400000] Size: 20.0MB
LUN0 (SEC_EFS) [0x1800000 0x1400000] Size: 20.0MB
LUN0 (STEADY) [0x2c00000 0x400000] Size: 4.0MB
LUN0 (PARAM) [0x3000000 0x800000] Size: 8.0MB
LUN0 (UP_PARAM) [0x3800000 0x800000] Size: 8.0MB
LUN0 (KEYSTORAGE) [0x4000000 0x80000] Size: 512.0KB
LUN0 (BOTA) [0x4080000 0x2800000] Size: 40.0MB
LUN0 (HARX) [0x6880000 0x300000] Size: 3.0MB
LUN0 (UH) [0x6b80000 0x200000] Size: 2.0MB
LUN0 (UHCFG) [0x6d80000 0x400000] Size: 4.0MB
LUN0 (DTBO) [0x7180000 0x800000] Size: 8.0MB
LUN0 (BLCMD) [0x7980000 0x10000] Size: 64.0KB
LUN0 (BOOT) [0x7990000 0x4000000] Size: 64.0MB
LUN0 (VENDOR_BOOT) [0xb990000 0x4000000] Size: 64.0MB
LUN0 (RECOVERY) [0xf990000 0x4000000] Size: 64.0MB
LUN0 (RADIO) [0x13990000 0x4600000] Size: 70.0MB
LUN0 (CP_DEBUG) [0x17f90000 0x780000] Size: 7.500MB
LUN0 (NAD_REFER) [0x18710000 0x100000] Size: 1.0MB
LUN0 (PERSISTENT) [0x18810000 0x80000] Size: 512.0KB
LUN0 (MISC) [0x18890000 0x100000] Size: 1.0MB
LUN0 (KEYREFUGE) [0x18990000 0x3400000] Size: 52.0MB
LUN0 (DQMDBG) [0x1bd90000 0x1000000] Size: 16.0MB
LUN0 (VBMETA) [0x1cd90000 0x10000] Size: 64.0KB
LUN0 (VBMETA_SYSTEM) [0x1cda0000 0x10000] Size: 64.0KB
LUN0 (METADATA) [0x1cdb0000 0x2000000] Size: 32.0MB
LUN0 (FMP_SELFTEST) [0x1edb0000 0x1000] Size: 4.0KB
LUN0 (RESERVED) [0x1edb1000 0x4f000] Size: 316.0KB
LUN0 (SUPER) [0x1ee00000 0x2a9400000] Size: 10.644GB
   subpartition (SUPER_metadata) [0x1ee00000 0x4000] Size: 16.0KB
   subpartition (system) [0x1ef00000 0x188b25000] Size: 6.135GB
   subpartition (vendor) [0x1a7b00000 0x5ed1d000] Size: 1.481GB
   subpartition (product) [0x206900000 0x48113000] Size: 1.125GB
   subpartition (odm) [0x24eb00000 0x426000] Size: 4.148MB
LUN0 (PRISM) [0x2c8200000 0x44c00000] Size: 1.74GB
LUN0 (OPTICS) [0x30ce00000 0x1e00000] Size: 30.0MB
LUN0 (CACHE) [0x30ec00000 0x25800000] Size: 600.0MB
LUN0 (OMR) [0x334400000 0x3200000] Size: 50.0MB
LUN0 (SPU) [0x337600000 0x3200000] Size: 50.0MB
LUN0 (USERDATA) [0x33a800000 0x1a8e800000] Size: 106.226GB
LUN3 (CPEFS) [0x6000 0x600000] Size: 6.0MB
------------------------------------
Read SYSTEM from LUN0.
------ Android information ------
Detected LINUX(Android) system : 0x001EF00000 (6.135GB)
Short EXT fs info:
Size: 6.38GB
Block size: 4.0KB
Inode size: 256
Inodes: 7056
Short Android info:
Device Brand:  samsung
Device Name B:  essi
Device Manufacturer:  samsung
Device Model:  SM-G996B
Device Name A:  t2sxxx
Build ID:  SP1A.210812.016
Display Build ID:  SP1A.210812.016.G996BXXU4CVC4
Release Incremental ID:  G996BXXU4CVC4
Release Base ID:  12
Security Path:  2022-03-01
Architecture ABI:  arm64-v8a
Product ID:  essi
Build Description:  t2sxxx-user 12 SP1A.210812.016 G996BXXU4CVC4 release-keys
PDA ver.:  G996BXXU4CVC4
Backup saved: BuildProp_20220329_2001.txt
---------------------------------------------
Read USERDATA from LUN0.
Detected USERDATA USERDATA : 0x033A800000 (106.226GB)
Unable to mount USERDATA , code : 95
Userdata Superblock contents::
 04000000 208D7A76 80817A76 30000000 00000000 04000000 F1834C77 40AD870D     .... .zv..zv0...........ñƒLw@­‡.;
 00000000 30000000 00000000 280C0000 48844C77 00000000 00000000 00000000     ....0.......(...H„Lw............;
 00000000 B4817A76 00000000 00000000 00000000 04000000 00000000 00000000     ....´.zv........................;
 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000     ................................;
 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000     ................................;
 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000     ................................;
 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000     ................................;
 00000000 03010000 E0AC870D 00000000 90AD870D 500A7076 15767144 FEFFFFFF     ........ଇ......­‡.P.pv.vqDþÿÿÿ;
Done.


G996BXXU4CVC4 release-keys.zip (1.7 MB)

BOOT DEVICE Authenticating... OK
Initializing usb... OK
Waiting for device... COM3
Bypassing authentication... OK
Analyzing preloader... preloader_k65v1_64_bsp_titan_rat.bin [EMI:10] [Internal]
Vendor : SAMSUNG
Handshaking... OK
Reading hardware info... OK
  Hardware : MT6765 [Helio G25|G35|P35] 0766 8A00 CA00 0000
  Security Config : SCB SLA DAA 
  MEID : BA20F9E356B86C394FB20D28FF65F53A
Sending Download-Agent... OK
Syncing with target... OK
Booting device... OK
Syncing with DA... OK
  Storage : EMMC - CID : 44000115.41443656.D6A0042.2BC7CCE8 
  Vendor : Samsung - Name : DV6DAB - Serial : 3437759850 - Rev : 0
  Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 16 MiB - User Area : 116.48 GiB 
Reading partition info... OK [49]
Reading device info... OK
   Model Name : SM-A125F
   Product Name : a12nsxx
   Manufacturer : samsung
   Platform : k65v1_64_bsp_titan_rat
   Android Version : 11
   Security Patch : 2021-05-01
   Display ID : RP1A.200720.012.A125FXXU1BUE3
   Build : A125FXXU1BUE3
   Build Date : Thu May 6 20:50:31 KST 2021
   PDA : A125FXXU1BUE3
UNLOCKTOOL 2022.04.01.0
Elapsed time : 5 seconds

backup.zip (1.3 MB)