View Single Post
Old 07-30-2021, 17:03   #2293 (permalink)
a_1st
Freak Poster
 
a_1st's Avatar
 
Join Date: Apr 2008
Location: A_1st™ Support
Age: 38
Posts: 393
Member: 758981
Status: Offline
Sonork: 100.1592091
Thanks Meter: 232
Donate money to this user
Wink Xiaomi Redmi 9 (Lancelot) Unlock BootLoader Success

Xiaomi Redmi 9 (Lancelot) Unlock BootLoader Success

Code:
Searching for MTK Device...Found
 Port Identification :Flashmode BROM 
 FriendlyName :MediaTek USB Port (COM22)
 Device       :6&2b93e363&0&1
 SymbolicName :\??\USB#VID_0E8D&PID_0003#6&2b93e363&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2016,3.2

Handshaking...Ok

Identifying Hardware ID.....
Reading Device hardware info..
 hw code       : 0707MT6768 [6768]
 hw subcode    : 8A00
 hw version    : CA00
 sw version    : 0000
 Target config : E7
 SBC           : 01 (True)
 SLA           : 02 (True)
 DAA           : 04 (True)
 SWJTAG        : 06 (True)
 EPP           : 00 (False)
 CERT          : 00 (False)
 MEMREAD       : 20 (True)
 MEMWRITE      : 40 (True)
 CMD_C8        : 80 (True)

Exploiting Device...
Exploit Sent..
Successfully Exploited...

Handshaking...Ok

Identifying Hardware ID.....
Reading Device hardware info..
 hw code       : 0707MT6768 [6768]
 hw subcode    : 8A00
 hw version    : CA00
 sw version    : 0000
 Target config : 00
 SBC           : 00 (False)
 SLA           : 00 (False)
 DAA           : 00 (False)
 SWJTAG        : 00 (False)
 EPP           : 00 (False)
 CERT          : 00 (False)
 MEMREAD       : 00 (False)
 MEMWRITE      : 00 (False)
 CMD_C8        : 00 (False)

MEID : 4FF873B7D5374A183BEF9F4D112132FE
Stage 1..[Size:256504]
 Sending :  Please wait.. Accepted

Identifying Protocol...
 Protocol : New
 Synchronization...SYNC
 Preloader Initialization...
 Parsing preloader_lancelot.bin
 Init : Accepted
 Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
 UNIQUE ID  : A5E956D37B12E49DCF95D2605813FEB5
 ERAM Size  : 0x0000000000070000 -448 KB
 IRAM Size  : 0x0000000100000000 -4 GB
 eMMC BOOT1 : 0x0000000000400000 -4 MB
 eMMC BOOT2 : 0x0000000000400000 -4 MB
 eMMC RPMB  : 0x0000000001000000 -16 MB
 eMMC USER  : 0x0000000E8F800000 -58.242 GB
 eMMC CID   : 1501004450364441420356AF681847C5 - DP6DAB
 Executing : ACCEPTED...

Reading GPT-EMMC [0x00008000] 130 Items

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
   -> Renaming Preloader....  preloader_lancelot.bin
   Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0707__073021180027\MT6768_Android_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x05508000]1024 KB ->frp.bin...Ok
-nvdata[0x0C4A2000]64 MB ->nvdata.bin...Ok
-persist[0x104A2000]48 MB ->persist.bin...Ok
-protect1[0x164A2000]8 MB ->protect1.bin...Ok
-protect2[0x16CA2000]11.367 MB ->protect2.bin...Ok
-nvram[0x19F80000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0707__073021180027
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
 UNIQUE ID  : A5E956D37B12E49DCF95D2605813FEB5
 ERAM Size  : 0x0000000000070000 -448 KB
 IRAM Size  : 0x0000000100000000 -4 GB
 eMMC BOOT1 : 0x0000000000400000 -4 MB
 eMMC BOOT2 : 0x0000000000400000 -4 MB
 eMMC RPMB  : 0x0000000001000000 -16 MB
 eMMC USER  : 0x0000000E8F800000 -58.242 GB
 eMMC CID   : 1501004450364441420356AF681847C5 - DP6DAB

Reading GPT-EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Unlock Bootloader
Processing...
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------

Verifying status after operation...
-------------------------------
Bootloader Status...
  Bootloader : Unlocked
-------------------------------
Action Result :  Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:01:48
  Reply With Quote
 
Page generated in 0.07046 seconds with 7 queries