Offline
Unlock Bootloader A136U
Brand/Model : *Auto* / *Auto Detect*
Operation : Unlock Bootloader
Waiting for Device...Found
Port : MediaTek USB Port_V1632 (COM5)
Device Path : \\?\usb#vid_0e8d&pid_0003#6&10c694e1&0&3#{86e0d1e0-8089-11d0-9ce4-08003e301f73}
Driver : MediaTek Inc., 3.0.1504.0 [usb2ser.sys]
Mode : BROM
Hw ID : MT6833 [0989] Dimensity 700 5G k6833
Details : 8A00,CA00,0000
Sec. Config : [SBA:True] [SLA:False] [DAA:True]
MEID : C52AE9E3814D745B850FA970C8E0BFB4
SoC ID[0] : 8E29F85725E82EBD4B65AAC977ACE98E
SoC ID[1] : 06050B5BE54FE87B6AFF473A625596D7
Running Exploit...Done
Downloading Preloader...OK
Saved as : preloader_k6833v1_64_titan_hinterwald.bin
Loading EMI Config from Preloader...OK
Sec. Config : [SBA:False] [SLA:False] [DAA:False]
Using Internal DA!
DA Security Patched
Sending 1st DA...OK
Jump DA Address...OK
Syncing...OK
Checksum Level is Storage
Connection : brom
Speed : HIGH-SPEED
Reading RAM Configuration...OK
Reading EMI Configuration...OK
CID : 150100444336444D4200BADDD4BC298D [EMMC]
Initializing Storage...OK
Sending 2nd DA...OK
Initialize DA Extension...OK
Int. RAM : 0x0000000000070000 [448,00 KB]
Ext. RAM : 0x0000000100000000 [4,00 GB]
Flash ID : DC6DMB
CID : 150100444336444D4200BADDD4BC298D
BOOT1 : 0x0000000000400000 [4,00 MB]
BOOT2 : 0x0000000000400000 [4,00 MB]
RPMB : 0x0000000001000000 [16,00 MB]
USERAREA : 0x0000000E8F800000 [58,24 GB]
PRE EOL : NORMAL
Life. Est.A : 0%-10% LIFE TIME USED
Life. Est.B : 0%-10% LIFE TIME USED
Reading Partition Table...OK
And. Ver. : 11
Build Dt. : Thu Feb 3 09:25:47 KST 2022
Display ID : RP1A.200720.012.A136USQU2AVB1
Ver. Inc. : A136USQU2AVB1
Locale : en-US
Patch : 2022-02-01
Bootloader : LOCKED
Reading Bootloader Data...OK
Bootloader : LOCKED
Unlocking Bootloader...OK
Operation Finished.
[UltimateMTK2 v1.1]
Log Saved : 20240224_133501.log