UMT UMT Box / PRO Modules Updates Here

UMT Box

GsmToto

Super Moderator
Jan 1, 2021
5,020
21,657
UK
Skype
gsmtoto
Sonork ID
100.1684601
Vivo V11 Reset FRP Done.

USING PL_EXLOIT [VIVO V1]
Brand/Model : *Auto* / *Auto Detect*
Operation : Safe Format+FRP
Waiting for Device...Found
Port : MediaTek PreLoader USB VCOM_V1633 (Android) (COM5)
Device Path : \\?\usb#vid_0e8d&pid_2000#6&3378f16b&0&5#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver : MediaTek Inc., 3.0.1504.0 [usb2ser.sys]
Mode : PRELOADER
Hw ID : MT6771 [0788] Helio P60/P70/G80
Details : 8A00,CA00,0000
Sec. Config : [SBA:True] [SLA:False] [DAA:True]
MEID : 70F254B8301159A23DB6AEA62DF8D3F9
SoC ID[0] : BA1509949202D9020E2EBD7B36CD710D
SoC ID[1] : 3BD29C416ACBDE80D72502BDF1CEB504
Sending 1st DA..OK
Jump DA Address...OK
Syncing...OK
Checksum Level is Storage
Connection : preloader
Speed : HIGH-SPEED
Reading RAM Configuration...OK
Running PL_EXPLOIT [1]...Done
Sending 2nd DA...OK
Loading Extension...Done
Int. RAM : 0x0000000000040000 [256.00 KB]
Ext. RAM : 0x0000000100000000 [4.00 GB]
Flash ID : DV6DMB
CID : 150100445636444D4202AD7790E595DD
BOOT1 : 0x0000000000400000 [4.00 MB]
BOOT2 : 0x0000000000400000 [4.00 MB]
RPMB : 0x0000000001000000 [16.00 MB]
USERAREA : 0x0000001D1EC00000 [116.48 GB]
Connected to High-Speed DA Port
Reading Partition Table...OK
Manuf. : vivo
Ven. Model : vivo 1806
Platform : mt6771
And. Ver. : 10
Build Dt. : Sat Jun 25 19:11:42 CST 2022
Display ID : QP1A.190711.020 release-keys
Ver. Inc. : compiler06251838
Locale : en-US
Patch : 2021-05-01
Bootloader : LOCKED
Formatting Userdata (Safe Mode)...OK
If phone stuck on recovery, try [Fix Recovery].
Resetting FRP...OK
Operation Finished.
[UltimateMTK2 v1.0]
Log Saved : 20240108_1342244.log
 

GsmToto

Super Moderator
Jan 1, 2021
5,020
21,657
UK
Skype
gsmtoto
Sonork ID
100.1684601
OPPO A16S Frp Reset Done
Brand/Model : *Auto* / *Auto Detect*
Operation : Reset FRP
Waiting for Device...Found
Port : MediaTek PreLoader USB VCOM_V1633 (Android) (COM6)
Device Path : \\?\usb#vid_22d9&pid_0006#6&bbee48b&0&4#{86e0d1e0-8089-11d0-9ce4-08003e301f73}
Driver : MediaTek Inc., 3.0.1504.0 [usb2ser.sys]
Mode : PRELOADER
Force Enter BROM...OK
Hw ID : MT6765 [0766] Helio P35/G35
Details : 8A00,CA00,0000
Sec. Config : [SBA:True] [SLA:False] [DAA:True]
MEID : BCD9ED627C4418258E5CF8B1C596369B
SoC ID[0] : 9C8DBA61CC1F894B58589B4C4CD28F7B
SoC ID[1] : 63995F966048EFB9A09C8C6E51AF79D4
Running Exploit...Done
Downloading Preloader...OK
Saved as : preloader_k65v1_64_bsp.bin
Loading EMI Config from Preloader...OK
Sec. Config : [SBA:False] [SLA:False] [DAA:False]
Using Internal DA!
DA Security Patched
Sending 1st DA...OK
Jump DA Address...OK
Syncing...OK
Checksum Level is Storage
Connection : brom
Speed : HIGH-SPEED
Reading RAM Configuration...OK
Reading EMI Configuration...OK
CID : 15010044503644424202100FDCD5B8D9 [EMMC]
Initializing Storage...OK
Sending 2nd DA...OK
Initialize DA Extension...OK
Int. RAM : 0x0000000000038000 [224.00 KB]
Ext. RAM : 0x0000000100000000 [4.00 GB]
Flash ID : DP6DBB
CID : 15010044503644424202100FDCD5B8D9
BOOT1 : 0x0000000000400000 [4.00 MB]
BOOT2 : 0x0000000000400000 [4.00 MB]
RPMB : 0x0000000001000000 [16.00 MB]
USERAREA : 0x0000000E8F800000 [58.24 GB]
Connected to High-Speed DA Port
Reading Partition Table...OK
Bootloader : LOCKED
Resetting FRP...OK
Operation Finished.
[UltimateMTK2 v1.0]
Log Saved : 20240108_1224198.log
 

GsmToto

Super Moderator
Jan 1, 2021
5,020
21,657
UK
Skype
gsmtoto
Sonork ID
100.1684601
Brand/Model : *Auto* / *Auto Detect*
Operation : Safe Format+FRP
Waiting for Device...Found
Port : MediaTek USB Port_V1632 (COM5)
Device Path : \\?\usb#vid_0e8d&pid_0003#6&10c694e1&0&2#{86e0d1e0-8089-11d0-9ce4-08003e301f73}
Driver : MediaTek Inc., 3.0.1504.0 [usb2ser.sys]
Mode : BROM
Hw ID : MT6765 [0766] Helio P35/G35
Details : 8A00,CA00,0000
Sec. Config : [SBA:True] [SLA:True] [DAA:True]
MEID : D2FDEC3BDAF94AE31C8CE5E5120ED7DC
SoC ID[0] : 906E6740407A139C590BF2C366C845CE
SoC ID[1] : 2189023D6C63C1F01025BF02EC6A8767
Running Exploit...Done
Preloader : preloader_k62v1_64_bsp.bin
Loading EMI Config from Preloader...OK
Sec. Config : [SBA:False] [SLA:False] [DAA:False]
Using Internal DA!
DA Security Patched
Sending 1st DA...OK
Jump DA Address...OK
Syncing...OK
Checksum Level is Storage
Connection : brom
Speed : HIGH-SPEED
Reading RAM Configuration...OK
Reading EMI Configuration...OK
CID : 150100424A5444345209F2444CA4A763 [EMMC]
Initializing Storage...OK
Sending 2nd DA...OK
Initialize DA Extension...OK
Int. RAM : 0x0000000000038000 [224,00 KB]
Ext. RAM : 0x0000000080000000 [2,00 GB]
Flash ID : BJTD4R
CID : 150100424A5444345209F2444CA4A763
BOOT1 : 0x0000000000400000 [4,00 MB]
BOOT2 : 0x0000000000400000 [4,00 MB]
RPMB : 0x0000000000400000 [4,00 MB]
USERAREA : 0x0000000747C00000 [29,12 GB]
Connected to High-Speed DA Port
Reading Partition Table...OK
Bootloader : LOCKED
Formatting Userdata (Safe Mode)...OK
If phone stuck on recovery, try [Fix Recovery].
Resetting FRP...OK
Operation Finished.
[UltimateMTK2 v1.0]
Log Saved : 20240110_140449.log
 

Bagusdewe

Active Member
Mar 16, 2023
18
6
indonesia
UMTv2 / UMT Pro
Innovative and Intelligent


UltimateMTK2 v1.0
The Ultimate MediaTek Tool






What's New:

Addded Support for:

- Vivo S10e
- Vivo S12 Pro
- Vivo S7e 5G
- Vivo S7e 5G
- Vivo T2x
- Vivo V17 Neo
- Vivo V21 5G
- Vivo V21 5G
- Vivo V21e 5G
- Vivo V23 5G
- Vivo V23e
- Vivo V25 5G
- Vivo V25 Pro 5G
- Vivo X70
- Vivo X70 Pro 5G
- Vivo Y01
- Vivo Y02
- Vivo Y02A
- Vivo Y02T
- Vivo Y100
- Vivo Y12
- Vivo Y12s
- Vivo Y15
- Vivo Y15s
- Vivo Y16
- Vivo Y17
- Vivo Y17s
- Vivo Y1S
- Vivo Y20
- Vivo Y20G
- Vivo Y21
- Vivo Y21S
- Vivo Y22
- Vivo Y27 4G
- Vivo Y30
- Vivo Y30G
- Vivo Y33s
- Vivo Y36 5G
- Vivo Y3s
- Vivo Y52 5G
- Vivo Y52 5G
- Vivo Y52s 5G
- Vivo Y52s 5G
- Vivo Y53s 4G
- Vivo Y54s
- Vivo Y55s 5G
- Vivo Y56 5G
- Vivo Y56 5G
- Vivo Y5s
- Vivo Y72 5G
- Vivo Y73s 5G
- Vivo Y75 5G
- Vivo Y76 5G
- Vivo Y77 5G etc.


Added Preloader Exploit for Vivo New Security Patch (V2/V3)
- MT6765
- MT6768
- MT6781
- MT6833
- MT6853
- MT6877
- MT6893

Updated Preloader Exploit for Oppo (V1/V2)
- MT6765
- MT6768
- MT6771
- MT6833
- MT6853
- MT6877
- MT6885
- MT6893

Added Preloader Exploit for Motorola
- MOTO XT2025
- MOTO XT2029
- MOTO XT2053
- MOTO XT2055
- MOTO XT2095
- MOTO XT2097
- MOTO XT2331
- MOTO XT2333


Added Bootloader Unlock/Relock for Vivo V2/V3 Exploit

Added RPMB Read/Write/Erase for Vivo V2/V3 Exploit

Added Both IMEI Repair Support for Redmi 9 (lancelot)

Updated Preloader Exploit Menu for Ease of Use

Updated BROM Exploit, should be faster now

Some Cosmetic Changes to GUI






Important Notes:

- You can flash device with both BROM and Preloader mode
- If default DA does not work, use own DA in custom DA
- Force BROM may not work on new security, use Test Point instead
- When using Test Point, you must select Preloader in PL (not needed when flashing)
- If you need to connect device in Preloader mode, you must select PRELOADER in connection settings, otherwise software will try to Crash Preloader (may not work on new security devices)




Note : Some features are device/OS specific and may not work on all devices.




WARNING:
ESN / MEID / IMEI REPAIR IS INTENDED TO REPAIR ESN / MEID / IMEI TO ORIGINAL ONE WRITTEN ON PHONE BACK LABEL / BOX. WE DO NOT ENDORSE OR ENCOURAGE ESN / MEID / IMEI CHANGING. ITS ILLEGAL. USER IS SOLE RESPONSIBLE FOR ANY ILLEGAL ACTIVITY DONE WITH USE OF FEATURES PROVIDED IN OUR SOFTWARE, NOT LIMITED TO ESN / MEID / IMEI.

ANY USER USING OUR SOFTWARE FOR ILLEGAL PURPOSE WILL BE SOLE RESPONSIBLE FOR HIS ACTS.

WE CONDEMN USE OF OUR SOFTWARE FOR ANY ILLEGAL PURPOSE.





Download using Support Access or Mirrors



Official Website:
Ultimate Multi Tool
UMT Pro


Br,
UMT
oppo preloder failed oppo v1 & V2 IMG-20240111-WA0016.jpg
 
  • Like
Reactions: GsmToto

GsmToto

Super Moderator
Jan 1, 2021
5,020
21,657
UK
Skype
gsmtoto
Sonork ID
100.1684601
Vivo Y17s New security FRP Remove Done

USING PL_EXLOIT [VIVO V3]
Brand/Model : *Auto* / *Auto Detect*
Operation : Reset FRP
Waiting for Device...Found
Port : MediaTek PreLoader USB VCOM_V1632 (Android) (COM8)
Device Path : \\?\usb#vid_0e8d&pid_2000#5&212ac8fc&0&7#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver : MediaTek Inc., 3.0.1504.0 [usb2ser.sys]
Mode : PRELOADER
Hw ID : MT6768 [0707] Helio P65/G85 k68v1
Details : 8A00,CA00,0000
Sec. Config : [SBA:True] [SLA:False] [DAA:True]
MEID : FDB680505E95AC67390EF0B6FB4D20CE
SoC ID[0] : 133B3075D9D43FDFBFF688BDEF518D5A
SoC ID[1] : B6C8421A45833B03BB01D32AEE21250E
Sending 1st DA..OK
Jump DA Address...OK
Syncing...OK
Checksum Level is Storage
Connection : preloader
Speed : HIGH-SPEED
Reading RAM Configuration...OK
Sending 2nd DA...OK
Running PL_EXPLOIT [2]...Done
Int. RAM : 0x0000000000070000 [448.00 KB]
Ext. RAM : 0x0000000100000000 [4.00 GB]
Flash ID : Y0S128
CID : 9B0100593053313238004BDC28207AC1
BOOT1 : 0x0000000000400000 [4.00 MB]
BOOT2 : 0x0000000000400000 [4.00 MB]
RPMB : 0x0000000001000000 [16.00 MB]
USERAREA : 0x0000001D1F000000 [116.48 GB]
Connected to High-Speed DA Port
Reading Partition Table...OK
Bootloader : LOCKED
Resetting FRP...OK
Operation Finished.
[UltimateMTK2 v1.0]
Log Saved : 20240111_1553487.log
 

GsmToto

Super Moderator
Jan 1, 2021
5,020
21,657
UK
Skype
gsmtoto
Sonork ID
100.1684601
Model : Samsung
Operation : FRP Bypass [2023 New Method]
Searching for Phone...Found
Hw ID : USB\VID_04E8&PID_6860&REV_0504&Modem
Port: : COM11 : SAMSUNG Mobile USB Modem #4
Checking for Device...Found [Normal Mode]
Reading Phone Information...OK
Model: : SM-A528B
IMEI: : 359260xxxxxxxxxxxxx
Software: : A528BXXU1AUK4/A528BOLM1AUK4/A528BXXU1AUK4/A528BXXU1AUK4
Product : XME
Enabling ADB (2023 New Method)...OK
Searching for Device...Found
Brand : samsung
Model : SM-A528B
Product : a52sxq
Device : a52sxq
Andriod Ver. : 11
Patch Level : 2021-11-01
PDA : A528BXXU1AUK4
Bootloader : A528BXXU1AUK4
Build ID : RP1A.200720.012.A528BXXU1AUK4
Build Date : Fri Nov 5 16:34:10 KST 2021
Checking Root Status...Done
Root : No Root
Resetting FRP Lock...Done
HINT : This method work for QC/Exynos model with Security Patch < June 2023
Elapsed Time 18:33
[UltimateSams v0.7]
 

GsmToto

Super Moderator
Jan 1, 2021
5,020
21,657
UK
Skype
gsmtoto
Sonork ID
100.1684601
Model : Samsung
Operation : FRP Bypass [2023 New Method]
Searching for Phone...Found
Hw ID : USB\VID_04E8&PID_6860&REV_0400&Modem
Port: : COM7 : SAMSUNG Mobile USB Modem #20
Checking for Device...Not Found
Could not check, ignoring!
Enabling ADB (2023 New Method)...OK
Searching for Device...Found
Brand : samsung
Model : SM-A105F
Product : a10
Device : a10
Andriod Ver. : 11
Patch Level : 2023-02-01
PDA : A105FDDS9CWD1
Bootloader : A105FDDS9CWD1
Build ID : RP1A.200720.012.A105FDDS9CWD1
Build Date : Tue Apr 11 19:36:08 KST 2023
Checking Root Status...Done
Root : No Root
Resetting FRP Lock...Done
HINT : This method work for QC/Exynos model with Security Patch < June 2023
Elapsed Time 12:58
[UltimateSams v0.7]
Saved to Logs\240111_1627713.log
 

GsmToto

Super Moderator
Jan 1, 2021
5,020
21,657
UK
Skype
gsmtoto
Sonork ID
100.1684601
Model : MediaTek FRP
Operation : All MediaTek 2023
Searching for Phone...Found
Port: : COM5 : SAMSUNG Mobile USB Modem #3
Checking for Device...Found [Download Mode]
Reading Data from Phone...Done
Chipset : MT6853 [HiSpeed]
Closing Session...Done
Port: : COM5 : SAMSUNG Mobile USB Modem #3
Checking for Device...Found [Download Mode]
Resetting FRP Data...Done
Closing Session...Done
Operation Finished.
Elapsed Time 00:23
[UltimateSams v0.7]
Saved to Logs\240112_196411.log
 

GsmToto

Super Moderator
Jan 1, 2021
5,020
21,657
UK
Skype
gsmtoto
Sonork ID
100.1684601
Vivo Y1 New security Frp Done By UMT

USING PL_EXLOIT [VIVO V3]
Brand/Model : *Auto* / *Auto Detect*
Operation : Reset FRP
Waiting for Device...Found
Port : MediaTek PreLoader USB VCOM_V1633 (Android) (COM7)
Device Path : \\?\usb#vid_0e8d&pid_2000#6&387bc9e2&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver : MediaTek Inc., 3.0.1504.0 [usb2ser.sys]
Mode : PRELOADER
Hw ID : MT6765 [0766] Helio P35/G35
Details : 8A00,CA00,0000
Sec. Config : [SBA:True] [SLA:False] [DAA:True]
MEID : 1E4A18899B30127574B7F04A4A5DADC4
SoC ID[0] : 70E1EA6E1CCBD8D8907ED134D80E33F2
SoC ID[1] : C7E0A32B0220D16937274B42F6B6F7AF
Sending 1st DA..OK
Jump DA Address...OK
Syncing...OK
Checksum Level is Storage
Connection : preloader
Speed : HIGH-SPEED
Reading RAM Configuration...OK
Sending 2nd DA...OK
Running PL_EXPLOIT [2]...Done
Int. RAM : 0x000000000003A000 [232.00 KB]
Ext. RAM : 0x0000000080000000 [2.00 GB]
Flash ID : 4X6KMB
CID : 1501003458364B4D420959C2CA737765
BOOT1 : 0x0000000000400000 [4.00 MB]
BOOT2 : 0x0000000000400000 [4.00 MB]
RPMB : 0x0000000000400000 [4.00 MB]
USERAREA : 0x0000000747C00000 [29.12 GB]
Connected to High-Speed DA Port
Reading Partition Table...OK
Prod. Model : PD2140F_EX
And. Ver. : 12
Prod. Ver. : PD2140F_EX_A_6.39.0
Hw. Ver. : PD2140F_EXMA
Build Dt. : Mon Dec 4 11:12:20 CST 2023
Display ID : SP1A.210812.003 release-keys
Ver. Inc. : compiler12041115
Locale : en-US
Patch : 2023-12-01
Bootloader : LOCKED
Resetting FRP...OK
Operation Finished.
[UltimateMTK2 v1.0]
 

GsmToto

Super Moderator
Jan 1, 2021
5,020
21,657
UK
Skype
gsmtoto
Sonork ID
100.1684601
Original IMEI Repair Redmi 9A Done By UMT

Brand/Model : Xiaomi / *Auto Detect*
Operation : IMEI Repair (Xiaomi Method-Redmi 9A (dandelion))
Waiting for Device...Found
Port : MediaTek USB Port_V1632 (COM8)
Device Path : \\?\usb#vid_0e8d&pid_0003#6&10c694e1&0&2#{86e0d1e0-8089-11d0-9ce4-08003e301f73}
Driver : MediaTek Inc., 3.0.1504.0 [usb2ser.sys]
Mode : BROM
Hw ID : MT6765 [0766] Helio P35/G35
Details : 8A00,CA00,0000
Sec. Config : [SBA:True] [SLA:True] [DAA:True]
MEID : B409B99E5B89617F4387EC7D388EF61A
SoC ID[0] : 3F7CF8BECE3D92E66A2E410E01AAEE08
SoC ID[1] : C9BD276831166D38A984DCBDA7A33361
Running Exploit...Done
Preloader : preloader_k62v1_64_bsp.bin
Loading EMI Config from Preloader...OK
Sec. Config : [SBA:False] [SLA:False] [DAA:False]
Using Internal DA!
DA Security Patched
Sending 1st DA...OK
Jump DA Address...OK
Syncing...OK
Checksum Level is Storage
Connection : brom
Speed : HIGH-SPEED
Reading RAM Configuration...OK
Reading EMI Configuration...OK
CID : 9B010059325030363400490B433D3975 [EMMC]
Initializing Storage...OK
Sending 2nd DA...OK
Initialize DA Extension...OK
Int. RAM : 0x0000000000038000 [224,00 KB]
Ext. RAM : 0x0000000100000000 [4,00 GB]
Flash ID : Y2P064
CID : 9B010059325030363400490B433D3975
BOOT1 : 0x0000000000400000 [4,00 MB]
BOOT2 : 0x0000000000400000 [4,00 MB]
RPMB : 0x0000000001000000 [16,00 MB]
USERAREA : 0x0000000E8F800000 [58,24 GB]
Connected to High-Speed DA Port
Reading Partition Table...OK
Manuf. : Xiaomi
Ven. Model : M2006C3LG
Platform : mt6765
And. Ver. : 10
Build Dt. : Mon Jan 17 19:19:46 CST 2022
Display ID : QP1A.190711.020
Ver. Inc. : V12.0.18.0.QCDMIXM
Locale : en-GB
Mod. Dev. : dandelion_global
Patch : 2021-12-01
Bootloader : UNLOCKED
Reading nvdata..OK
Reading nvram..OK
Backup saved as E:\Cell\Xiaomi\Redmi 9A\00000000000000.zip
IMEI1 : 8668
IMEI2 : 8668
Fetching Data...OK
Writing Data...OK
Fixing Cert...OK
Disabling Signature Check..OK
Operation Finished.
[UltimateMTK2 v1.0]
Log Saved : 20240113_159987.log
 

GsmToto

Super Moderator
Jan 1, 2021
5,020
21,657
UK
Skype
gsmtoto
Sonork ID
100.1684601
Original IMEI Repair Redmi 9A Done By UMT

Brand/Model : Xiaomi / *Auto Detect*
Operation : IMEI Repair (Xiaomi Method-Redmi 9A (dandelion))
Waiting for Device...Found
Port : MediaTek USB Port_V1632 (COM8)
Device Path : \\?\usb#vid_0e8d&pid_0003#6&10c694e1&0&2#{86e0d1e0-8089-11d0-9ce4-08003e301f73}
Driver : MediaTek Inc., 3.0.1504.0 [usb2ser.sys]
Mode : BROM
Hw ID : MT6765 [0766] Helio P35/G35
Details : 8A00,CA00,0000
Sec. Config : [SBA:True] [SLA:True] [DAA:True]
MEID : B409B99E5B89617F4387EC7D388EF61A
SoC ID[0] : 3F7CF8BECE3D92E66A2E410E01AAEE08
SoC ID[1] : C9BD276831166D38A984DCBDA7A33361
Running Exploit...Done
Preloader : preloader_k62v1_64_bsp.bin
Loading EMI Config from Preloader...OK
Sec. Config : [SBA:False] [SLA:False] [DAA:False]
Using Internal DA!
DA Security Patched
Sending 1st DA...OK
Jump DA Address...OK
Syncing...OK
Checksum Level is Storage
Connection : brom
Speed : HIGH-SPEED
Reading RAM Configuration...OK
Reading EMI Configuration...OK
CID : 9B010059325030363400490B433D3975 [EMMC]
Initializing Storage...OK
Sending 2nd DA...OK
Initialize DA Extension...OK
Int. RAM : 0x0000000000038000 [224,00 KB]
Ext. RAM : 0x0000000100000000 [4,00 GB]
Flash ID : Y2P064
CID : 9B010059325030363400490B433D3975
BOOT1 : 0x0000000000400000 [4,00 MB]
BOOT2 : 0x0000000000400000 [4,00 MB]
RPMB : 0x0000000001000000 [16,00 MB]
USERAREA : 0x0000000E8F800000 [58,24 GB]
Connected to High-Speed DA Port
Reading Partition Table...OK
Manuf. : Xiaomi
Ven. Model : M2006C3LG
Platform : mt6765
And. Ver. : 10
Build Dt. : Mon Jan 17 19:19:46 CST 2022
Display ID : QP1A.190711.020
Ver. Inc. : V12.0.18.0.QCDMIXM
Locale : en-GB
Mod. Dev. : dandelion_global
Patch : 2021-12-01
Bootloader : UNLOCKED
Reading nvdata..OK
Reading nvram..OK
Backup saved as C:\Cell\Xiaomi\Redmi 9A\00000000000000.zip
IMEI1 : 8668
IMEI2 : 8668
Fetching Data...OK
Writing Data...OK
Fixing Cert...OK
Disabling Signature Check..OK
Operation Finished.
[UltimateMTK2 v1.0]
Log Saved : 20240113_159987.log
 

GsmToto

Super Moderator
Jan 1, 2021
5,020
21,657
UK
Skype
gsmtoto
Sonork ID
100.1684601
Original IMEI Repair Redmi 9A Done By UMT

Brand/Model : Xiaomi / *Auto Detect*
Operation : IMEI Repair (Xiaomi Method-Redmi 9A (dandelion))
Waiting for Device...Found
Port : MediaTek USB Port_V1632 (COM8)
Device Path : \\?\usb#vid_0e8d&pid_0003#6&10c694e1&0&2#{86e0d1e0-8089-11d0-9ce4-08003e301f73}
Driver : MediaTek Inc., 3.0.1504.0 [usb2ser.sys]
Mode : BROM
Hw ID : MT6765 [0766] Helio P35/G35
Details : 8A00,CA00,0000
Sec. Config : [SBA:True] [SLA:True] [DAA:True]
MEID : B409B99E5B89617F4387EC7D388EF61A
SoC ID[0] : 3F7CF8BECE3D92E66A2E410E01AAEE08
SoC ID[1] : C9BD276831166D38A984DCBDA7A33361
Running Exploit...Done
Preloader : preloader_k62v1_64_bsp.bin
Loading EMI Config from Preloader...OK
Sec. Config : [SBA:False] [SLA:False] [DAA:False]
Using Internal DA!
DA Security Patched
Sending 1st DA...OK
Jump DA Address...OK
Syncing...OK
Checksum Level is Storage
Connection : brom
Speed : HIGH-SPEED
Reading RAM Configuration...OK
Reading EMI Configuration...OK
CID : 9B010059325030363400490B433D3975 [EMMC]
Initializing Storage...OK
Sending 2nd DA...OK
Initialize DA Extension...OK
Int. RAM : 0x0000000000038000 [224,00 KB]
Ext. RAM : 0x0000000100000000 [4,00 GB]
Flash ID : Y2P064
CID : 9B010059325030363400490B433D3975
BOOT1 : 0x0000000000400000 [4,00 MB]
BOOT2 : 0x0000000000400000 [4,00 MB]
RPMB : 0x0000000001000000 [16,00 MB]
USERAREA : 0x0000000E8F800000 [58,24 GB]
Connected to High-Speed DA Port
Reading Partition Table...OK
Manuf. : Xiaomi
Ven. Model : M2006C3LG
Platform : mt6765
And. Ver. : 10
Build Dt. : Mon Jan 17 19:19:46 CST 2022
Display ID : QP1A.190711.020
Ver. Inc. : V12.0.18.0.QCDMIXM
Locale : en-GB
Mod. Dev. : dandelion_global
Patch : 2021-12-01
Bootloader : UNLOCKED
Reading nvdata..OK
Reading nvram..OK
Backup saved as C:\Cell\Xiaomi\Redmi 9A\00000000000000.zip
IMEI1 : 8668
IMEI2 : 8668
Fetching Data...OK
Writing Data...OK
Fixing Cert...OK
Disabling Signature Check..OK
Operation Finished.
[UltimateMTK2 v1.0]
Log Saved : 20240113_159987.log
 

GsmToto

Super Moderator
Jan 1, 2021
5,020
21,657
UK
Skype
gsmtoto
Sonork ID
100.1684601
Nokia 2.3 ta-1209 pattern&frp remove done by UMT

Brand/Model : *Auto* / *Auto Detect*
Operation : Safe Format+FRP
Waiting for Device...Found
Port : MediaTek USB Port (COM3)
Device Path : \\?\usb#vid_0e8d&pid_0003#6&22aa4dca&0&3#{86e0d1e0-8089-11d0-9ce4-08003e301f73}
Driver : MediaTek Inc., 3.0.1511.0 [usb2ser.sys]
Mode : BROM
Hw ID : MT6761 [0717] Helio A20/P22/A22/A25/G25
Details : 8A00,CA01,0200
Sec. Config : [SBA:True] [SLA:True] [DAA:True]
MEID : 2532FF826F18C2404D8EC39508FDB182
SoC ID[0] : 8D048C05D67C25F8176ACE8071089BAA
SoC ID[1] : 73219654523F65058E77FD7FEE7E0572
Running Exploit...Done
Downloading Preloader...OK
Saved as : preloader_t99621aa3.bin
Loading EMI Config from Preloader...OK
Sec. Config : [SBA:False] [SLA:False] [DAA:False]
Using Internal DA!
DA Security Patched
Sending 1st DA...OK
Jump DA Address...OK
Syncing...OK
Checksum Level is Storage
Connection : brom
Speed : HIGH-SPEED
Reading RAM Configuration...OK
Reading EMI Configuration...OK
CID : 7001005441323833322031C2CB03C6F9 [EMMC]
Initializing Storage...OK
Sending 2nd DA...OK
Initialize DA Extension...OK
Int. RAM : 0x0000000000039000 [228.00 KB]
Ext. RAM : 0x0000000080000000 [2.00 GB]
Flash ID : TA2832
CID : 7001005441323833322031C2CB03C6F9
BOOT1 : 0x0000000000400000 [4.00 MB]
BOOT2 : 0x0000000000400000 [4.00 MB]
RPMB : 0x0000000000400000 [4.00 MB]
USERAREA : 0x000000074A000000 [29.16 GB]
Connected to High-Speed DA Port
Reading Partition Table...OK
Device : IRM_sprout
And. Ver. : 11
Build Dt. : Thu Aug 18 12:19:34 CST 2022
Display ID : 00WW_3_310_SP05
Ver. Inc. : 00WW_3_31F
Locale : en-GB
Patch : 2022-08-05
Bootloader : LOCKED
Formatting Userdata (Safe Mode)...OK
If phone stuck on recovery, try [Fix Recovery].
Resetting FRP...OK
Operation Finished.
[UltimateMTK2 v1.0]
Log Saved : 20240114_1945883.log
 
Top