Brand/Model : *Auto* / *Auto Detect*
Operation : Reset FRP
Waiting for Device...Found
Port : MediaTek PreLoader USB VCOM_V1632 (Android) (COM39)
Device Path : \\?\usb#vid_22d9&pid_0006#5&66d5322&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver : MediaTek Inc., 3.0.1504.0 [usb2ser.sys]
Mode : PRELOADER
Force Enter BROM...OK
Hw ID : MT6768 [0707] Helio P65/G85 k68v1
Details : 8A00,CA00,0000
Sec. Config : [SBA:True] [SLA:False] [DAA:True]
MEID : BA653CA660EE7DAECBC8E606CF742E4C
SoC ID[0] : 2215C68226234D54710738F4D1D861A6
SoC ID[1] : F5E4F4FDC24D077AC0C28BF8F7206281
Running Exploit...Done
Downloading Preloader...OK
Saved as : preloader_k69v1_64_k419.bin
Loading EMI Config from Preloader...OK
Sec. Config : [SBA:False] [SLA:False] [DAA:False]
Using DA : MTK_AllInOne_DA.bin
DA Security Patched
Sending 1st DA...OK
Jump DA Address...OK
Syncing...OK
Checksum Level is Storage
Connection : brom
Speed : HIGH-SPEED
Reading RAM Configuration...OK
Reading EMI Configuration...OK
CID : 150100435554423432022400BA7A890B [EMMC]
Initializing Storage...OK
Sending 2nd DA...OK
Initialize DA Extension...OK
Int. RAM : 0x0000000000070000 [448.00 KB]
Ext. RAM : 0x0000000100000000 [4.00 GB]
Flash ID : CUTB42
CID : 150100435554423432022400BA7A890B
BOOT1 : 0x0000000000400000 [4.00 MB]
BOOT2 : 0x0000000000400000 [4.00 MB]
RPMB : 0x0000000001000000 [16.00 MB]
USERAREA : 0x0000000E8F800000 [58.24 GB]
Connected to High-Speed DA Port
Reading Partition Table...OK
Resetting FRP...OK
Operation Finished.
[UltimateMTK2 v0.5]
Log Saved : 20230501_150235.log
Operation : Reset FRP
Waiting for Device...Found
Port : MediaTek PreLoader USB VCOM_V1632 (Android) (COM39)
Device Path : \\?\usb#vid_22d9&pid_0006#5&66d5322&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver : MediaTek Inc., 3.0.1504.0 [usb2ser.sys]
Mode : PRELOADER
Force Enter BROM...OK
Hw ID : MT6768 [0707] Helio P65/G85 k68v1
Details : 8A00,CA00,0000
Sec. Config : [SBA:True] [SLA:False] [DAA:True]
MEID : BA653CA660EE7DAECBC8E606CF742E4C
SoC ID[0] : 2215C68226234D54710738F4D1D861A6
SoC ID[1] : F5E4F4FDC24D077AC0C28BF8F7206281
Running Exploit...Done
Downloading Preloader...OK
Saved as : preloader_k69v1_64_k419.bin
Loading EMI Config from Preloader...OK
Sec. Config : [SBA:False] [SLA:False] [DAA:False]
Using DA : MTK_AllInOne_DA.bin
DA Security Patched
Sending 1st DA...OK
Jump DA Address...OK
Syncing...OK
Checksum Level is Storage
Connection : brom
Speed : HIGH-SPEED
Reading RAM Configuration...OK
Reading EMI Configuration...OK
CID : 150100435554423432022400BA7A890B [EMMC]
Initializing Storage...OK
Sending 2nd DA...OK
Initialize DA Extension...OK
Int. RAM : 0x0000000000070000 [448.00 KB]
Ext. RAM : 0x0000000100000000 [4.00 GB]
Flash ID : CUTB42
CID : 150100435554423432022400BA7A890B
BOOT1 : 0x0000000000400000 [4.00 MB]
BOOT2 : 0x0000000000400000 [4.00 MB]
RPMB : 0x0000000001000000 [16.00 MB]
USERAREA : 0x0000000E8F800000 [58.24 GB]
Connected to High-Speed DA Port
Reading Partition Table...OK
Resetting FRP...OK
Operation Finished.
[UltimateMTK2 v0.5]
Log Saved : 20230501_150235.log