Job: Firmware Backup
SELECTED: Tiger T610(UMS512)
ACTION: Backup Firmware
Start Detect phone...
Phone must be off with battery inside.
Long press "VOL -" key and insert usb cable.
For some phones need to
Long press "VOL -"+ "VOL +" key and insert usb cable.
Detected: SPRD U2S Diag (COM9)
Sending payload, keep boot key untill loader start.
Exploiting phone.....
Sending preloader 1
Sending preloader 2
Sending FDL 1.....
Sending FDL 2.....
New flash metod detected.
FileSystem: EMMC
Read partition info is supported by loader.
Manufacturer: incar
Brand: AWOW
Device: CreaPad_1009_EEA
Model: CreaPad_1009_EEA
Build ID: RP1A.201005.001
CPU arhitecture: arm64-v8a
Fota platform: Sprd9863_11.0
Build product name: CreaPad_1009_EEA
Build description: CreaPad_1009_EEA-user 11 RP1A.201005.001 21506 release-keys
Build Id: RP1A.201005.001
Android Release: 11
Android Version: CreaPad_1009_EEA_CQS1093_V08_20211007
Security patch: 2021-04-05
CPU NAME: T610
Backup firmware by loader.
CPU NAME: T610
Found [l_fixnv1_a] [l_fixnv1_a] Size to download: 2 MB
IMEI: 867400020316612
Reading: splloader
[A]Reading: prodnv
[6]Reading: trustos_a
[1]Reading: sml_a
Reading: teecfg_a
Reading: uboot_a
[8]Reading: logo
[8]Reading: fbootlogo
Reading: l_fixnv1_a
[1]Reading: gnssmodem_a
[A]Reading: wcnmodem_a
Reading: persist
[19]Reading: l_modem_a
[1]Reading: l_deltanv_a
[A]Reading: l_gdsp_a
[14]Reading: l_ldsp_a
[6]Reading: l_agdsp_a
[1]Reading: l_cdsp_a
[1]Reading: pm_sys_a
Reading: teecfg_a
[40]Reading: boot_a
[64]Reading: vendor_boot_a
[8]Reading: dtb_a
[8]Reading: dtbo_a
[1004]Reading: super
[4B]Reading: socko_a
[19]Reading: odmko_a
[1]Reading: vbmeta_a
[1]Reading: vbmeta_system_a
[1]Reading: vbmeta_vendor_a
[1]Reading: vbmeta_system_ext_a
[1]Reading: vbmeta_product_a
[can take 0-10 sec]Wait untill phone restart.
SELECTED: Tiger T610(UMS512)
ACTION: Backup Firmware
Start Detect phone...
Phone must be off with battery inside.
Long press "VOL -" key and insert usb cable.
For some phones need to
Long press "VOL -"+ "VOL +" key and insert usb cable.
Detected: SPRD U2S Diag (COM9)
Sending payload, keep boot key untill loader start.
Exploiting phone.....
Sending preloader 1
Sending preloader 2
Sending FDL 1.....
Sending FDL 2.....
New flash metod detected.
FileSystem: EMMC
Read partition info is supported by loader.
Build ID: RP1A.201005.001
CPU arhitecture: arm64-v8a
Fota platform: Sprd9863_11.0
Build product name: CreaPad_1009_EEA
Build description: CreaPad_1009_EEA-user 11 RP1A.201005.001 21506 release-keys
Build Id: RP1A.201005.001
Android Release: 11
Android Version: CreaPad_1009_EEA_CQS1093_V08_20211007
Security patch: 2021-04-05
CPU NAME: T610
Backup firmware by loader.
CPU NAME: T610
Found [l_fixnv1_a] [l_fixnv1_a] Size to download: 2 MB
IMEI: 867400020316612
Reading: splloader
[A]Reading: prodnv
[6]Reading: trustos_a
[1]Reading: sml_a
Reading: teecfg_a
Reading: uboot_a
[8]Reading: logo
[8]Reading: fbootlogo
Reading: l_fixnv1_a
[1]Reading: gnssmodem_a
[A]Reading: wcnmodem_a
Reading: persist
[19]Reading: l_modem_a
[1]Reading: l_deltanv_a
[A]Reading: l_gdsp_a
[14]Reading: l_ldsp_a
[6]Reading: l_agdsp_a
[1]Reading: l_cdsp_a
[1]Reading: pm_sys_a
Reading: teecfg_a
[40]Reading: boot_a
[64]Reading: vendor_boot_a
[8]Reading: dtb_a
[8]Reading: dtbo_a
[1004]Reading: super
[4B]Reading: socko_a
[19]Reading: odmko_a
[1]Reading: vbmeta_a
[1]Reading: vbmeta_system_a
[1]Reading: vbmeta_vendor_a
[1]Reading: vbmeta_system_ext_a
[1]Reading: vbmeta_product_a
[can take 0-10 sec]Wait untill phone restart.