Brand/Model : *Auto* / *Auto Detect*
Operation : IMEI Repair (Xiaomi Method-Poco C31 (angelicain))
Waiting for Device...Found
Port : MediaTek USB Port_V1641 (COM12)
Device Path : \\?\usb#vid_0e8d&pid_0003#5&2108ad5d&0&1#{f9f3ff14-ae21-48a0-8a25-8011a7a931d9}
Driver : MediaTek Inc., 3.0.1504.0 [usb2ser.sys]
Mode : BROM
Hw ID : MT6765 [0766] Helio P35/G35
Details : 8A00,CA00,0000
Sec. Config : [SBA:True] [SLA:True] [DAA:True]
MEID : 619A651B3B442C4EAFBDF01CAEC2C5BE
SoC ID[0] : 90A69E9270E8CC823409F6E42C2B0ADE
SoC ID[1] : C141560B81A997CDEF425FEF0494707C
Running Exploit...Done
Downloading Preloader...OK
Saved as : preloader_k65v1_64_bsp.bin
Loading EMI Config from Preloader...OK
Sec. Config : [SBA:False] [SLA:False] [DAA:False]
Using DA : MTK_AllInOne_DA.bin
DA Security Patched
Sending 1st DA...OK
Jump DA Address...OK
Syncing...OK
Checksum Level is Storage
Connection : brom
Speed : HIGH-SPEED
Reading RAM Configuration...OK
Reading EMI Configuration...OK
CID : 150100424A5444345209683BE8CD184F [EMMC]
Initializing Storage...OK
Sending 2nd DA...OK
Initialize DA Extension...OK
Int. RAM : 0x000000000003A000 [232.00 KB]
Ext. RAM : 0x00000000C0000000 [3.00 GB]
Flash ID : BJTD4R
CID : 150100424A5444345209683BE8CD184F
BOOT1 : 0x0000000000400000 [4.00 MB]
BOOT2 : 0x0000000000400000 [4.00 MB]
RPMB : 0x0000000000400000 [4.00 MB]
USERAREA : 0x0000000747C00000 [29.12 GB]
Connected to High-Speed DA Port
Reading Partition Table...OK
Manuf. : Xiaomi
Ven. Model : M2006C3MI
Platform : mt6765
And. Ver. : 10
Build Dt. : Fri Aug 26 15:00:36 CST 2022
Display ID : QP1A.190711.020
Ver. Inc. : V12.0.19.0.QCRINXM
Locale : en-GB
Mod. Dev. : angelicain_in_global
Patch : 2022-09-01
Bootloader : UNLOCKED
Reading Data...OK
IMEI1 :
IMEI2 :
Fetching Data...OK
Writing Data...OK
Fixing Cert...OK
Disabling Signature Check..OK
Operation Finished.
[UltimateMTK2 v0.7]
Log Saved : 20230909_115214.log
Operation : IMEI Repair (Xiaomi Method-Poco C31 (angelicain))
Waiting for Device...Found
Port : MediaTek USB Port_V1641 (COM12)
Device Path : \\?\usb#vid_0e8d&pid_0003#5&2108ad5d&0&1#{f9f3ff14-ae21-48a0-8a25-8011a7a931d9}
Driver : MediaTek Inc., 3.0.1504.0 [usb2ser.sys]
Mode : BROM
Hw ID : MT6765 [0766] Helio P35/G35
Details : 8A00,CA00,0000
Sec. Config : [SBA:True] [SLA:True] [DAA:True]
MEID : 619A651B3B442C4EAFBDF01CAEC2C5BE
SoC ID[0] : 90A69E9270E8CC823409F6E42C2B0ADE
SoC ID[1] : C141560B81A997CDEF425FEF0494707C
Running Exploit...Done
Downloading Preloader...OK
Saved as : preloader_k65v1_64_bsp.bin
Loading EMI Config from Preloader...OK
Sec. Config : [SBA:False] [SLA:False] [DAA:False]
Using DA : MTK_AllInOne_DA.bin
DA Security Patched
Sending 1st DA...OK
Jump DA Address...OK
Syncing...OK
Checksum Level is Storage
Connection : brom
Speed : HIGH-SPEED
Reading RAM Configuration...OK
Reading EMI Configuration...OK
CID : 150100424A5444345209683BE8CD184F [EMMC]
Initializing Storage...OK
Sending 2nd DA...OK
Initialize DA Extension...OK
Int. RAM : 0x000000000003A000 [232.00 KB]
Ext. RAM : 0x00000000C0000000 [3.00 GB]
Flash ID : BJTD4R
CID : 150100424A5444345209683BE8CD184F
BOOT1 : 0x0000000000400000 [4.00 MB]
BOOT2 : 0x0000000000400000 [4.00 MB]
RPMB : 0x0000000000400000 [4.00 MB]
USERAREA : 0x0000000747C00000 [29.12 GB]
Connected to High-Speed DA Port
Reading Partition Table...OK
Manuf. : Xiaomi
Ven. Model : M2006C3MI
Platform : mt6765
And. Ver. : 10
Build Dt. : Fri Aug 26 15:00:36 CST 2022
Display ID : QP1A.190711.020
Ver. Inc. : V12.0.19.0.QCRINXM
Locale : en-GB
Mod. Dev. : angelicain_in_global
Patch : 2022-09-01
Bootloader : UNLOCKED
Reading Data...OK
IMEI1 :
IMEI2 :
Fetching Data...OK
Writing Data...OK
Fixing Cert...OK
Disabling Signature Check..OK
Operation Finished.
[UltimateMTK2 v0.7]
Log Saved : 20230909_115214.log