New Tecno Spark 4 Pattern/FRP Lock Remove With Marvel Tool

Ko Lin

Active Member
Oct 5, 2021
77
49
Thailand
Skype
live:.cid.779abfe56546fb6c

How to use :​

  • Open Marvel Tool
  • Click on MTK Tab
  • Click on “Format Userdata ” Button
  • Vol+ & Vol– And Connect .


[#] Operation {Format Userdata},

{#} Press Vol+ & Vol- And Connect Cable ~

Waiting For MTK Device …
Port – Device detected

  • CPU:MT6761/MT6762/MT3369/MT8766B(Helio A20/P22/A22/A25/G25)
  • HW version:0x0
  • WDT:0x10007000
  • Uart:0x11002000
  • Brom payload addr:0x100a00
  • DA payload addr:0x201000
  • CQ_DMA addr:0x10212000
  • Var1:0x25
  • Disabling Watchdog…
  • HW code:0x717
  • Target config:0xe5
  • SBC enabled:True
  • SLA enabled:False
  • DAA enabled:True
  • SWJTAG enabled:True
  • EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT:False
  • Root cert required:False
  • Mem read auth:True
  • Mem write auth:True
  • Cmd 0xC8 blocked:True
  • Get Target info
  • BROM mode detected.
  • HW subcode:0x8a00
  • HW Ver:0xca01
  • SW Ver:0x200
  • ME_ID:88DE1E85574B482F552566226E437D7C
  • SOC_ID:A88EDDE43CE5CC61BA62A026BC54E422C9E8648EEF892CE3F3E5BAD896915A99
    PLTools – Loading payload from mt6761_payload.bin, 0x264 bytes
    PLTools – Kamakiri / DA Run
    Kamakiri – Trying kamakiri2..
    Kamakiri – Done sending payload…
    PLTools – Successfully sent payload: C:\Program Files (x86)\Marvel Tool\mtkclient\payloads\mt6761_payload.bin
    Port – Device detected
    DA_handler – Device is protected.
    DA_handler – Device is in BROM mode. Trying to dump preloader, Please Wait This May Take A While …
    Successfully extracted preloader for this device to: preloader_kc2_h6113.bin
  • Uploading xflash stage 1 from MTK_AllInOne_DA_5.2152.bin
    xflashext – Patching da1 …
    xflashext – Patching da2 …
  • Successfully uploaded stage 1, jumping ..
  • Jumping to 0x200000
  • Jumping to 0x200000: ok.
  • Successfully received DA sync
  • DRAM config needed for : 90014a6842386150
  • Sending emi data …
  • DRAM setup passed.
  • Sending emi data succeeded.
  • Uploading stage 2…
  • Upload data was accepted. Jumping to stage 2…
  • Successfully uploaded stage 2
  • EMMC FWVer: 0x0
  • EMMC ID: hB8aP>
  • EMMC CID: 90014a68423861503e02a9dfc2ab5603
  • EMMC Boot1 Size: 0x400000
  • EMMC Boot2 Size: 0x400000
  • EMMC GP1 Size: 0x0
  • EMMC GP2 Size: 0x0
  • EMMC GP3 Size: 0x0
  • EMMC GP4 Size: 0x0
  • EMMC RPMB Size: 0x1000000
  • EMMC USER Size: 0x747c00000
  • HW-CODE : 0x717
  • HWSUB-CODE : 0x8A00
  • HW-VERSION : 0xCA01
  • SW-VERSION : 0x200
  • CHIP-EVOLUTION : 0x0
  • DA-VERSION : 1.0
  • Upload data was accepted. Jumping to stage 2…
  • DA Extensions successfully added
  • Formatting addr 0x140800000 with length 0x6038fbe00, please standby….
    Done |————————————————–| 0.0% Erasing (Sector 0x0 of 0x301C7DF) 0.00 MB/s
    Progress: |██████████████████████████████████████████████████| 100.0% Erasing (Sector 0x301C7DF of 0x301C7DF, ) 29222.15 MB/s
  • Successsfully formatted addr 0x140800000 with length 25829555712.
    Formatted sector 10502144 with sector count 50448351.
Success ^_^
Please Reboot Device Manualy…
 

Attachments

  • 1.png
    1.png
    283.6 KB · Views: 7
Top