Operation : Reset FRP
Waiting for Device...Found
Port : MediaTek USB Port_V1632 (COM26)
Device Path : \\?\usb#vid_0e8d&pid_0003#5&3b0d2cff&0&6#{86e0d1e0-8089-11d0-9ce4-08003e301f73}
Driver : MediaTek Inc., 3.0.1504.0 [usb2ser.sys]
Mode : BROM
Hw ID : MT6765 [0766] Helio P35/G35
Details : 8A00,CA00,0000
Sec. Config : [SBA:True] [SLA:True] [DAA:True]
MEID : 01E009F2BA08576FDA3572DC03689F61
SoC ID[0] : E7C2A2E5F39584AAD9B14C0BDED08AD6
SoC ID[1] : C823DBF1DD37FF6A7130E22812485600
Running Exploit...Done
Downloading Preloader...OK
Saved as : preloader_k65v1_64_bsp.bin
Loading EMI Config from Preloader...OK
Sec. Config : [SBA:False] [SLA:False] [DAA:False]
Using DA : MTK_AllInOne_DA.bin
DA Security Patched
Sending 1st DA...OK
Jump DA Address...OK
Syncing...OK
Checksum Level is Storage
Connection : brom
Speed : HIGH-SPEED
Reading RAM Configuration...OK
Reading EMI Configuration...OK
CID : 9B0100593250303634002A729855C851 [EMMC]
Initializing Storage...OK
Sending 2nd DA...OK
Initialize DA Extension...OK
Int. RAM : 0x000000000003A000 [232.00 KB]
Ext. RAM : 0x00000000C0000000 [3.00 GB]
Flash ID : Y2P064
CID : 9B0100593250303634002A729855C851
BOOT1 : 0x0000000000400000 [4.00 MB]
BOOT2 : 0x0000000000400000 [4.00 MB]
RPMB : 0x0000000001000000 [16.00 MB]
USERAREA : 0x0000000E8F800000 [58.24 GB]
Connected to High-Speed DA Port
Reading Partition Table...OK
Manuf. : Xiaomi
Ven. Model : M2006C3MG
Platform : mt6765
And. Ver. : 10
Build Dt. : Fri Aug 6 00:36:51 CST 2021
Display ID : QP1A.190711.020
Ver. Inc. : V12.0.9.0.QCREUXM
Locale : en-GB
Mod. Dev. : angelica_eea_global
Patch : 2021-08-01
Resetting FRP...OK
Operation Finished.
[UltimateMTK2 v0.3]
Log Saved : 20230306_170753.log
Waiting for Device...Found
Port : MediaTek USB Port_V1632 (COM26)
Device Path : \\?\usb#vid_0e8d&pid_0003#5&3b0d2cff&0&6#{86e0d1e0-8089-11d0-9ce4-08003e301f73}
Driver : MediaTek Inc., 3.0.1504.0 [usb2ser.sys]
Mode : BROM
Hw ID : MT6765 [0766] Helio P35/G35
Details : 8A00,CA00,0000
Sec. Config : [SBA:True] [SLA:True] [DAA:True]
MEID : 01E009F2BA08576FDA3572DC03689F61
SoC ID[0] : E7C2A2E5F39584AAD9B14C0BDED08AD6
SoC ID[1] : C823DBF1DD37FF6A7130E22812485600
Running Exploit...Done
Downloading Preloader...OK
Saved as : preloader_k65v1_64_bsp.bin
Loading EMI Config from Preloader...OK
Sec. Config : [SBA:False] [SLA:False] [DAA:False]
Using DA : MTK_AllInOne_DA.bin
DA Security Patched
Sending 1st DA...OK
Jump DA Address...OK
Syncing...OK
Checksum Level is Storage
Connection : brom
Speed : HIGH-SPEED
Reading RAM Configuration...OK
Reading EMI Configuration...OK
CID : 9B0100593250303634002A729855C851 [EMMC]
Initializing Storage...OK
Sending 2nd DA...OK
Initialize DA Extension...OK
Int. RAM : 0x000000000003A000 [232.00 KB]
Ext. RAM : 0x00000000C0000000 [3.00 GB]
Flash ID : Y2P064
CID : 9B0100593250303634002A729855C851
BOOT1 : 0x0000000000400000 [4.00 MB]
BOOT2 : 0x0000000000400000 [4.00 MB]
RPMB : 0x0000000001000000 [16.00 MB]
USERAREA : 0x0000000E8F800000 [58.24 GB]
Connected to High-Speed DA Port
Reading Partition Table...OK
Manuf. : Xiaomi
Ven. Model : M2006C3MG
Platform : mt6765
And. Ver. : 10
Build Dt. : Fri Aug 6 00:36:51 CST 2021
Display ID : QP1A.190711.020
Ver. Inc. : V12.0.9.0.QCREUXM
Locale : en-GB
Mod. Dev. : angelica_eea_global
Patch : 2021-08-01
Resetting FRP...OK
Operation Finished.
[UltimateMTK2 v0.3]
Log Saved : 20230306_170753.log