d/Model : *Auto* / *Auto Detect*
Operation : Reset FRP
Waiting for Device...Found
Port : MediaTek PreLoader USB VCOM (Android) (COM18)
Device Path : \\?\usb#vid_0e8d&pid_2000#5&136f0554&0&7#{86e0d1e0-8089-11d0-9ce4-08003e301f73}
Driver : MediaTek Inc., 3.2.0.0 [usb2ser.sys]
Mode : PRELOADER
Force Enter BROM...OK
Hw ID : MT6765 [0766] Helio P35/G35
Details : 8A00,CA00,0000
Sec. Config : [SBA:True] [SLA:False] [DAA:True]
MEID : 95B893D1B61FC4C53F063439B80BAC5C
SoC ID[0] : 4A3014570EDA8A75A70072701BCEE909
SoC ID[1] : AE6A5DD01B45985B87C6B8268057DF41
Running Exploit...Done
Downloading Preloader...OK
Saved as : preloader_s96717ra1.bin
Loading EMI Config from Preloader...OK
Sec. Config : [SBA:False] [SLA:False] [DAA:False]
Using DA : MTK_AllInOne_DA.bin
DA Security Patched
Sending 1st DA...OK
Jump DA Address...OK
Syncing...OK
Checksum Level is Storage
Connection : brom
Speed : HIGH-SPEED
Reading RAM Configuration...OK
Reading EMI Configuration...OK
CID : 150100445836384D4200619ECA68571F [EMMC]
Initializing Storage...OK
Sending 2nd DA...OK
Initialize DA Extension...OK
Int. RAM : 0x000000000003A000 [232.00 KB]
Ext. RAM : 0x00000000C0000000 [3.00 GB]
Flash ID : DX68MB
CID : 150100445836384D4200619ECA68571F
BOOT1 : 0x0000000000400000 [4.00 MB]
BOOT2 : 0x0000000000400000 [4.00 MB]
RPMB : 0x0000000001000000 [16.00 MB]
USERAREA : 0x0000000747C00000 [29.12 GB]
Connected to High-Speed DA Port
Reading Partition Table...OK
And. Ver. : 11
Build Dt. : Fri Apr 29 15:24:22 KST 2022
Display ID : RP1A.200720.012.A215USQU7BVD3
Ver. Inc. : A215USQU7BVD3
Locale : en-US
Patch : 2022-05-01
Resetting FRP...OK
Operation Finished.
[UltimateMTK2 v0.5]
Log Saved : 20230518_140501.log
Operation : Reset FRP
Waiting for Device...Found
Port : MediaTek PreLoader USB VCOM (Android) (COM18)
Device Path : \\?\usb#vid_0e8d&pid_2000#5&136f0554&0&7#{86e0d1e0-8089-11d0-9ce4-08003e301f73}
Driver : MediaTek Inc., 3.2.0.0 [usb2ser.sys]
Mode : PRELOADER
Force Enter BROM...OK
Hw ID : MT6765 [0766] Helio P35/G35
Details : 8A00,CA00,0000
Sec. Config : [SBA:True] [SLA:False] [DAA:True]
MEID : 95B893D1B61FC4C53F063439B80BAC5C
SoC ID[0] : 4A3014570EDA8A75A70072701BCEE909
SoC ID[1] : AE6A5DD01B45985B87C6B8268057DF41
Running Exploit...Done
Downloading Preloader...OK
Saved as : preloader_s96717ra1.bin
Loading EMI Config from Preloader...OK
Sec. Config : [SBA:False] [SLA:False] [DAA:False]
Using DA : MTK_AllInOne_DA.bin
DA Security Patched
Sending 1st DA...OK
Jump DA Address...OK
Syncing...OK
Checksum Level is Storage
Connection : brom
Speed : HIGH-SPEED
Reading RAM Configuration...OK
Reading EMI Configuration...OK
CID : 150100445836384D4200619ECA68571F [EMMC]
Initializing Storage...OK
Sending 2nd DA...OK
Initialize DA Extension...OK
Int. RAM : 0x000000000003A000 [232.00 KB]
Ext. RAM : 0x00000000C0000000 [3.00 GB]
Flash ID : DX68MB
CID : 150100445836384D4200619ECA68571F
BOOT1 : 0x0000000000400000 [4.00 MB]
BOOT2 : 0x0000000000400000 [4.00 MB]
RPMB : 0x0000000001000000 [16.00 MB]
USERAREA : 0x0000000747C00000 [29.12 GB]
Connected to High-Speed DA Port
Reading Partition Table...OK
And. Ver. : 11
Build Dt. : Fri Apr 29 15:24:22 KST 2022
Display ID : RP1A.200720.012.A215USQU7BVD3
Ver. Inc. : A215USQU7BVD3
Locale : en-US
Patch : 2022-05-01
Resetting FRP...OK
Operation Finished.
[UltimateMTK2 v0.5]
Log Saved : 20230518_140501.log