Offline
Unlock Bootloader A136U
Brand/Model : *Auto* / *Auto Detect*
Operation : Unlock Bootloader
Waiting for Device...Found
Port : MediaTek USB Port_V1632 (COM5)
Device Path : \\?\usb#vid_0e8d&pid_0003#6&10c694e1&0&3#{86e0d1e0-8089-11d0-9ce4-08003e301f73}
Driver : MediaTek Inc., 3.0.1504.0 [usb2ser.sys]
Mode : BROM
Hw ID : MT6833 [0989] Dimensity 700 5G k6833
Details : 8A00,CA00,0000
Sec. Config : [SBA:True] [SLA:False] [DAA:True]
MEID : C52AE9E3814D745B850FA970C8E0BFB4
SoC ID[0] : 8E29F85725E82EBD4B65AAC977ACE98E
SoC ID[1] : 06050B5BE54FE87B6AFF473A625596D7
Running Exploit...Done
Downloading Preloader...OK
Saved as : preloader_k6833v1_64_titan_hinterwald.bin
Loading EMI Config from Preloader...OK
Sec. Config : [SBA:False] [SLA:False] [DAA:False]
Using Internal DA!
DA...
Por favor inicie sesión para ver el contenido completo. Conéctate o regístrate ahora.