Brand/Model : *Auto* / *Auto Detect*
Operation : Erase Data + FRP
Waiting for Device...Found
Port : MediaTek USB Port (COM6)
Device Path : \\?\usb#vid_0e8d&pid_0003#5&dc4a972&0&8#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver : MediaTek Inc., 3.2.0.0 [usb2ser.sys]
Mode : BROM
Hw ID : MT6768 [0707] Helio P65/G85 k68v1
Details : 8A00,CA00,0000
Sec. Config : [SBA:True] [SLA:False] [DAA:True]
MEID : F3373E60F773F44F17EB77C9E3E0FCC0
SoC ID[0] : D8AE0B2FF48382EA6EC7C25A6B0030C4
SoC ID[1] : 8D20F99B448D8DA85C93659D0798AA26
Running Exploit...Done
Downloading Preloader...OK
Saved as : preloader_k68v1_64.bin
Loading EMI Config from Preloader...OK
Sec. Config : [SBA:False] [SLA:False] [DAA:False]
Using Internal DA!
DA Security Patched
Sending 1st DA...OK
Jump DA Address...OK
Syncing...OK
Checksum Level is Storage
Connection : brom
Speed : HIGH-SPEED
Reading RAM Configuration...OK
Reading EMI Configuration...OK
CID : 150100445636444D42028D2090D16693 [EMMC]
Initializing Storage...OK
Sending 2nd DA...OK
Initialize DA Extension...OK
Int. RAM : 0x0000000000070000 [448.00 KB]
Ext. RAM : 0x0000000100000000 [4.00 GB]
Flash ID : DV6DMB
CID : 150100445636444D42028D2090D16693
BOOT1 : 0x0000000000400000 [4.00 MB]
BOOT2 : 0x0000000000400000 [4.00 MB]
RPMB : 0x0000000001000000 [16.00 MB]
USERAREA : 0x0000001D1EC00000 [116.48 GB]
PRE EOL : NORMAL
Life. Est.A : 10%-20% LIFE TIME USED
Life. Est.B : 10%-20% LIFE TIME USED
Reading Partition Table...OK
And. Ver. : 11
Build Dt. : Mon May 17 18:21:13 CST 2021
Display ID : RP1A.200720.012 release-keys
Ver. Inc. : eng.compil.20210517.182331
Locale : en-US
Patch : 2021-05-01
Bootloader : LOCKED
Erasing Userdata...OK
Resetting FRP...OK
Operation Finished.
[UltimateMTK2 v1.1]
Log Saved : 28522441_18422336.log
Operation : Erase Data + FRP
Waiting for Device...Found
Port : MediaTek USB Port (COM6)
Device Path : \\?\usb#vid_0e8d&pid_0003#5&dc4a972&0&8#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver : MediaTek Inc., 3.2.0.0 [usb2ser.sys]
Mode : BROM
Hw ID : MT6768 [0707] Helio P65/G85 k68v1
Details : 8A00,CA00,0000
Sec. Config : [SBA:True] [SLA:False] [DAA:True]
MEID : F3373E60F773F44F17EB77C9E3E0FCC0
SoC ID[0] : D8AE0B2FF48382EA6EC7C25A6B0030C4
SoC ID[1] : 8D20F99B448D8DA85C93659D0798AA26
Running Exploit...Done
Downloading Preloader...OK
Saved as : preloader_k68v1_64.bin
Loading EMI Config from Preloader...OK
Sec. Config : [SBA:False] [SLA:False] [DAA:False]
Using Internal DA!
DA Security Patched
Sending 1st DA...OK
Jump DA Address...OK
Syncing...OK
Checksum Level is Storage
Connection : brom
Speed : HIGH-SPEED
Reading RAM Configuration...OK
Reading EMI Configuration...OK
CID : 150100445636444D42028D2090D16693 [EMMC]
Initializing Storage...OK
Sending 2nd DA...OK
Initialize DA Extension...OK
Int. RAM : 0x0000000000070000 [448.00 KB]
Ext. RAM : 0x0000000100000000 [4.00 GB]
Flash ID : DV6DMB
CID : 150100445636444D42028D2090D16693
BOOT1 : 0x0000000000400000 [4.00 MB]
BOOT2 : 0x0000000000400000 [4.00 MB]
RPMB : 0x0000000001000000 [16.00 MB]
USERAREA : 0x0000001D1EC00000 [116.48 GB]
PRE EOL : NORMAL
Life. Est.A : 10%-20% LIFE TIME USED
Life. Est.B : 10%-20% LIFE TIME USED
Reading Partition Table...OK
And. Ver. : 11
Build Dt. : Mon May 17 18:21:13 CST 2021
Display ID : RP1A.200720.012 release-keys
Ver. Inc. : eng.compil.20210517.182331
Locale : en-US
Patch : 2021-05-01
Bootloader : LOCKED
Erasing Userdata...OK
Resetting FRP...OK
Operation Finished.
[UltimateMTK2 v1.1]
Log Saved : 28522441_18422336.log