View Single Post
Old 09-25-2021, 14:03   #2584 (permalink)
Gsm-Ahmed
No Life Poster
 
Gsm-Ahmed's Avatar
 
Join Date: Jan 2020
Location: Algeria
Posts: 814
Member: 2944109
Status: Offline
Thanks Meter: 656
Xiaomi Redmi 9a (dandelion) Ultra Power Option

Xiaomi Redmi 9a (dandelion) Ultra Power Option





Code:
Searching for MTK Device...Found
 Port Identification :Flashmode BROM 
 FriendlyName :MediaTek USB Port_V1633 (COM21)
 Device       :6&12e3c9ed&0&1
 SymbolicName :\??\USB#VID_0E8D&PID_0003#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0

Opened handle..
Handshaking...Ok

Identifying Hardware ID.....
Reading Device hardware info..
 hw code       : 0766MT6765 [6765]
 hw subcode    : 8A00
 hw version    : CA00
 sw version    : 0000
 Target config : E7
 SBC           : 01 (True)
 SLA           : 02 (True)
 DAA           : 04 (True)
 SWJTAG        : 06 (True)
 EPP           : 00 (False)
 CERT          : 00 (False)
 MEMREAD       : 20 (True)
 MEMWRITE      : 40 (True)
 CMD_C8        : 80 (True)

Exploiting Device...
Exploit Sent..
Successfully Exploited...
Handshaking...Ok

C:\Hydra Tool\Backup\Preloader_dump\prel.tmp
Handshaking...

Identifying Hardware ID.....
Reading Device hardware info..
 hw code       : 0766MT6765 [6765]
 hw subcode    : 8A00
 hw version    : CA00
 sw version    : 0000
 Target config : 00
 SBC           : 00 (False)
 SLA           : 00 (False)
 DAA           : 00 (False)
 SWJTAG        : 00 (False)
 EPP           : 00 (False)
 CERT          : 00 (False)
 MEMREAD       : 00 (False)
 MEMWRITE      : 00 (False)
 CMD_C8        : 00 (False)

MEID : E2E4E225A8924384B84CE31F0F10041A
Stage 1..[Size:216440]
 Sending :  Please wait.. Accepted

Identifying Protocol...
 Protocol : New
 Synchronization...SYNC
 Preloader Initialization...
 Parsing prel.tmp
 Init : Accepted
 Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
 UNIQUE ID  : CA9D407118507F70DD498F4E8606FA5A
 ERAM Size  : 0x0000000000038000 -224 KB
 IRAM Size  : 0x0000000080000000 -2 GB
 eMMC BOOT1 : 0x0000000000400000 -4 MB
 eMMC BOOT2 : 0x0000000000400000 -4 MB
 eMMC RPMB  : 0x0000000001000000 -16 MB
 eMMC USER  : 0x0000000747C00000 -29.121 GB
 eMMC CID   : 4501004441343033320195F43E1337F9 - DA4032
 Executing : ACCEPTED...

Reading GPT-EMMC [0x00008000] 130 Items

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
   -> Renaming Preloader....  preloader_k62v1_64_bsp.bin
   Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0766__092521105711\MT6765_Android_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x3BD88000]1024 KB ->frp.bin...Ok
-nvdata[0x3DE88000]64 MB ->nvdata.bin...Ok
-protect1[0x45522000]8 MB ->protect1.bin...Ok
-protect2[0x45D22000]10.867 MB ->protect2.bin...Ok
-persist[0x47000000]48 MB ->persist.bin...Ok
-nvram[0x52E80000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0766__092521105711
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
 UNIQUE ID  : CA9D407118507F70DD498F4E8606FA5A
 ERAM Size  : 0x0000000000038000 -224 KB
 IRAM Size  : 0x0000000080000000 -2 GB
 eMMC BOOT1 : 0x0000000000400000 -4 MB
 eMMC BOOT2 : 0x0000000000400000 -4 MB
 eMMC RPMB  : 0x0000000001000000 -16 MB
 eMMC USER  : 0x0000000747C00000 -29.121 GB
 eMMC CID   : 4501004441343033320195F43E1337F9 - DA4032

Reading GPT-EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Safe Format Method 1
Processing...
Erasing FRP Partition...
Safeformat Universal...
Action Result :  Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:48
  Reply With Quote
 
Page generated in 0.06879 seconds with 7 queries