Goodnight. I have a problem with a Xiaomi Redmi Note 8 Pro. Perform an operation to unlock the Bootloader to unbrick the phone. But I did not carry out the process and I consumed credits. What should I do to get my credits refunded and redo the process. I attach the log of the process. If you need photos, I can also send them
UFI Software version: 1.5.0.1818
PC Info: 832A,PGNELM3NM87DRG
User Info: UFIBox/0011-8841-9131,0011-8553-3153
Processor: Intel(R) Core(TM) i5-7200U CPU 2.71 GHz (4 CPUs)
Memory: 7.92 GiB (59 % free)
OS: Windows 10 (Build 17763, Version: 1809, 64-bit)
---------
AUTH info: MTK, version: 1
> Credit confirmation status: 1
BROM version[1]: 7.1922.6.0
DA: MTK_AllInOne_DA[1].bin
hash: 29541b6af15c397977fb6c85df452c0add11ca18, size: 1.01 MiB
version: 3.3001.2019/06/02020/12/04 01:11:36, start addr: 0x40000800
Connecting to BootROM...
Power off the phone, disconnect and reconnect the battery(if possible) and connect USB cable...
Hold the VOL DOWN or VOL UP + DOWN(for newer model) to force MediaTek BootROM.
Scanning BootROM or Preloader port(30 s)... Done
Detected [BootROM] MediaTek USB Port_V1632 (COM56)
Connection status: XHCI:HUB3:USB 2.00 High-Speed
USB Driver: [MediaTek Inc.] wdm_usb, version: 3.0.1504.0, date: 1-22-2015
Connecting Bootrom...
> Session confirmation status: 1
Requesting flash signature from server...
[SERVER] XIAOMI_FL [begonia,b660eb0d005a5434] ref id: XF06413122162, cost: 4, your balance: 2
Sending Download Agent...
Platform: MT6785, Hw ver: 0xCA00, Sw ver: 0x0000
Secure ver: 0x00, BL ver: 0x00
SRAM size: 512 KiB
DRAM size: 6 GiB
SOC ID: b660eb0d005a5434909aab13432ef8a668fdf50b9028b64eea80736ab7b23207
ME ID: 0a8a739179614fc5290d29e280d40e84
Storage type: UFS
Storage id: H9HQ16AECMMDAR
Fw version:
Capacity: 119.18 GiB(127,968,215,040 bytes)
LUN0: 4096 KiB
LUN1: 4096 KiB
LUN2: 119.17 GiB(127,959,826,432 bytes)
USB speed: High-Speed
Verifying Soc: passed
Verifying Storage ID: passed
Writing preloader: preloader_begonia.bin, size: 313.57 KiB
Writing recovery: recovery.img, size: 64 MiB
Writing vbmeta: vbmeta.img, size: 4 KiB
Writing efuse: efuse.img, size: 512 bytes
Writing md1img: md1img.img, size: 58.93 MiB
Writing spmfw: spmfw.img, size: 14.97 KiB
Writing audio_dsp: audio_dsp.img, size: 1.26 MiB
Writing scp1: scp.img, size: 1.68 MiB
Writing scp2: scp.img, size: 1.68 MiB
Writing sspm_1: sspm.img, size: 645.44 KiB
Writing sspm_2: sspm.img, size: 645.44 KiB
Writing cam_vpu1: cam_vpu1.img, size: 1.10 MiB
Writing cam_vpu2: cam_vpu2.img, size: 8.53 MiB
Writing cam_vpu3: cam_vpu3.img, size: 6.05 MiB
Writing gz1: gz.img, size: 13.79 MiB
Writing gz2: gz.img, size: 13.79 MiB
Writing lk: lk.img, size: 1.16 MiB
Writing lk2: lk.img, size: 1.16 MiB
Writing boot: boot.img, size: 64 MiB
Writing logo: logo.bin, size: 2.73 MiB
Writing dtbo: dtbo.img, size: 32 MiB
Writing tee1: tee.img, size: 2.42 MiB
Writing tee2: tee.img, size: 2.42 MiB
Writing vendor: vendor.img, size: 894.71 MiB
Writing system: system.img, size: 3.32 GiB
Writing cache: cache.img, size: 176.19 KiB
Writing gsort: gsort.img, size: 16 KiB
Writing oem_misc1: oem_misc1.img, size: 16 KiB
Writing exaid: exaid.img, size: 16 KiB
Writing userdata: userdata.img, size: 811.29 MiB
Completed in 3 mins 38.110 s