|
Welcome to the GSM-Forum forums. You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. Only registered members may post questions, contact other members or search our database of over 8 million posts. Registration is fast, simple and absolutely free so please - Click to REGISTER! If you have any problems with the registration process or your account login, please contact contact us . |
|
Register | FAQ | Donate | Forum Rules | Root any Device | ★iPhone Unlock★ | ★ Direct Codes ★ | Direct Unlock Source | Search | Today's Posts | Mark Forums Read |
Ultimate Multi Tool Box Multi GSM & CDMA Box |
| LinkBack | Thread Tools | Display Modes |
03-20-2023, 12:43 | #1 (permalink) |
No Life Poster Join Date: Mar 2013
Posts: 552
Member: 1892312 Status: Offline Sonork: 100.1651296 Thanks Meter: 76 | Redmi 10a The system Distroy after repair security Operation : Read Info Waiting for Device...Found Port : USB Single Port (COM96) Device Path : \\?\usb#vid_0e8d&pid_0003#5&14eb737d&0&6#{86e0d1e0-8089-11d0-9ce4-08003e301f73} Driver : ZTE Corporation, 1.1352.0.1 [usb2sersv3.sys] Mode : BROM Hw ID : MT6765 [0766] Helio P35/G35 Details : 8A00,CA00,0000 Sec. Config : [SBA:True] [SLA:True] [DAA:True] MEID : FE08FBF9AF57941E188DB42FB8630DB9 SoC ID[0] : 0B81533B99DDD2A7403945D8AC11F993 SoC ID[1] : 6747B8C4F0F58C33049812F2CD7DFAA0 Running Exploit...Done Downloading Preloader...OK Saved as : preloader_k62v1_64_bsp.bin Loading EMI Config from Preloader...OK Sec. Config : [SBA:False] [SLA:False] [DAA:False] Using DA : MTK_AllInOne_DA.bin DA Security Patched Sending 1st DA...OK Jump DA Address...OK Syncing...OK Checksum Level is Storage Connection : brom Speed : HIGH-SPEED Reading RAM Configuration...OK Reading EMI Configuration...OK CID : 9B0100593250303634002C354F188921 [EMMC] Initializing Storage...OK Sending 2nd DA...OK Initialize DA Extension...OK Int. RAM : 0x000000000003A000 [232.00 KB] Ext. RAM : 0x0000000100000000 [4.00 GB] Flash ID : Y2P064 CID : 9B0100593250303634002C354F188921 BOOT1 : 0x0000000000400000 [4.00 MB] BOOT2 : 0x0000000000400000 [4.00 MB] RPMB : 0x0000000001000000 [16.00 MB] USERAREA : 0x0000000E8F800000 [58.24 GB] Connected to High-Speed DA Port Reading Partition Table...OK Manuf. : Xiaomi Ven. Model : 220233L2I Platform : mt6765 And. Ver. : 11 Build Dt. : Tue Sep 20 19:05:00 CST 2022 Display ID : RP1A.200720.011 Ver. Inc. : V12.5.8.0.RCZINXM Locale : en-GB Mod. Dev. : dandelion_c3l2_in_global Patch : 2022-09-01 Operation Finished. [UltimateMTK2 v0.3] Operation : Unlock Bootloader Waiting for Device...Found Port : USB Single Port (COM96) Device Path : \\?\usb#vid_0e8d&pid_0003#5&14eb737d&0&6#{86e0d1e0-8089-11d0-9ce4-08003e301f73} Driver : ZTE Corporation, 1.1352.0.1 [usb2sersv3.sys] Mode : BROM Hw ID : MT6765 [0766] Helio P35/G35 Details : 8A00,CA00,0000 Sec. Config : [SBA:True] [SLA:True] [DAA:True] MEID : FE08FBF9AF57941E188DB42FB8630DB9 SoC ID[0] : 0B81533B99DDD2A7403945D8AC11F993 SoC ID[1] : 6747B8C4F0F58C33049812F2CD7DFAA0 Running Exploit...Done Downloading Preloader...OK Saved as : preloader_k62v1_64_bsp.bin Loading EMI Config from Preloader...OK Sec. Config : [SBA:False] [SLA:False] [DAA:False] DA Security Patched Sending 1st DA...OK Jump DA Address...OK Syncing...OK Checksum Level is Storage Connection : brom Speed : HIGH-SPEED Reading RAM Configuration...OK Reading EMI Configuration...OK CID : 9B0100593250303634002C354F188921 [EMMC] Initializing Storage...OK Sending 2nd DA...OK Initialize DA Extension...OK Int. RAM : 0x0000000000038000 [224.00 KB] Ext. RAM : 0x0000000100000000 [4.00 GB] Flash ID : Y2P064 CID : 9B0100593250303634002C354F188921 BOOT1 : 0x0000000000400000 [4.00 MB] BOOT2 : 0x0000000000400000 [4.00 MB] RPMB : 0x0000000001000000 [16.00 MB] USERAREA : 0x0000000E8F800000 [58.24 GB] Connected to High-Speed DA Port Reading Partition Table...OK Manuf. : Xiaomi Ven. Model : 220233L2I Platform : mt6765 And. Ver. : 11 Build Dt. : Tue Sep 20 19:05:00 CST 2022 Display ID : RP1A.200720.011 Ver. Inc. : V12.5.8.0.RCZINXM Locale : en-GB Mod. Dev. : dandelion_c3l2_in_global Patch : 2022-09-01 Reading Bootloader Data...OK Bootloader : LOCKED Unlocking Bootloader...OK Operation Finished. [UltimateMTK2 v0.3] Operation : IMEI Repair (Xiaomi Method) Waiting for Device...Found Port : USB Single Port (COM96) Device Path : \\?\usb#vid_0e8d&pid_0003#5&14eb737d&0&6#{86e0d1e0-8089-11d0-9ce4-08003e301f73} Driver : ZTE Corporation, 1.1352.0.1 [usb2sersv3.sys] Mode : BROM Hw ID : MT6765 [0766] Helio P35/G35 Details : 8A00,CA00,0000 Sec. Config : [SBA:True] [SLA:True] [DAA:True] MEID : FE08FBF9AF57941E188DB42FB8630DB9 SoC ID[0] : 0B81533B99DDD2A7403945D8AC11F993 SoC ID[1] : 6747B8C4F0F58C33049812F2CD7DFAA0 Running Exploit...Done Downloading Preloader...OK Saved as : preloader_k62v1_64_bsp.bin Loading EMI Config from Preloader...OK Sec. Config : [SBA:False] [SLA:False] [DAA:False] Using DA : MTK_AllInOne_DA.bin DA Security Patched Sending 1st DA...OK Jump DA Address...OK Syncing...OK Checksum Level is Storage Connection : brom Speed : HIGH-SPEED Reading RAM Configuration...OK Reading EMI Configuration...OK CID : 9B0100593250303634002C354F188921 [EMMC] Initializing Storage...OK Sending 2nd DA...OK Initialize DA Extension...OK Int. RAM : 0x000000000003A000 [232.00 KB] Ext. RAM : 0x0000000100000000 [4.00 GB] Flash ID : Y2P064 CID : 9B0100593250303634002C354F188921 BOOT1 : 0x0000000000400000 [4.00 MB] BOOT2 : 0x0000000000400000 [4.00 MB] RPMB : 0x0000000001000000 [16.00 MB] USERAREA : 0x0000000E8F800000 [58.24 GB] Connected to High-Speed DA Port Reading Partition Table...OK Manuf. : Xiaomi Ven. Model : 220233L2I Platform : mt6765 And. Ver. : 11 Build Dt. : Tue Sep 20 19:05:00 CST 2022 Display ID : RP1A.200720.011 Ver. Inc. : V12.5.8.0.RCZINXM Locale : en-GB Mod. Dev. : dandelion_c3l2_in_global Patch : 2022-09-01 Reading Data...OK IMEI1 : 864***********99 IMEI2 : 862***********48 Repairing Security..OK Disabling Signature Check..OK Operation Finished. [UltimateMTK2 v0.3] Operation : Cert Patch - Redmi 10A Waiting for Device...Found Port : USB Single Port (COM96) Device Path : \\?\usb#vid_0e8d&pid_0003#5&14eb737d&0&6#{86e0d1e0-8089-11d0-9ce4-08003e301f73} Driver : ZTE Corporation, 1.1352.0.1 [usb2sersv3.sys] Mode : BROM Hw ID : MT6765 [0766] Helio P35/G35 Details : 8A00,CA00,0000 Sec. Config : [SBA:True] [SLA:True] [DAA:True] MEID : FE08FBF9AF57941E188DB42FB8630DB9 SoC ID[0] : 0B81533B99DDD2A7403945D8AC11F993 SoC ID[1] : 6747B8C4F0F58C33049812F2CD7DFAA0 Running Exploit...Done Downloading Preloader...OK Saved as : preloader_k62v1_64_bsp.bin Loading EMI Config from Preloader...OK Sec. Config : [SBA:False] [SLA:False] [DAA:False] Using DA : MTK_AllInOne_DA.bin DA Security Patched Sending 1st DA...OK Jump DA Address...OK Syncing...OK Checksum Level is Storage Connection : brom Speed : HIGH-SPEED Reading RAM Configuration...OK Reading EMI Configuration...OK CID : 9B0100593250303634002C354F188921 [EMMC] Initializing Storage...OK Sending 2nd DA...OK Initialize DA Extension...OK Int. RAM : 0x000000000003A000 [232.00 KB] Ext. RAM : 0x0000000100000000 [4.00 GB] Flash ID : Y2P064 CID : 9B0100593250303634002C354F188921 BOOT1 : 0x0000000000400000 [4.00 MB] BOOT2 : 0x0000000000400000 [4.00 MB] RPMB : 0x0000000001000000 [16.00 MB] USERAREA : 0x0000000E8F800000 [58.24 GB] Connected to High-Speed DA Port Reading Partition Table...OK Manuf. : Xiaomi Ven. Model : 220233L2I Platform : mt6765 And. Ver. : 11 Build Dt. : Tue Sep 20 19:05:00 CST 2022 Display ID : RP1A.200720.011 Ver. Inc. : V12.5.8.0.RCZINXM Locale : en-GB Mod. Dev. : dandelion_c3l2_in_global Patch : 2022-09-01 Patching Data.......OK Operation Finished. [UltimateMTK2 v0.3] |
Bookmarks |
Thread Tools | |
Display Modes | |
| |
|