UMT UMT Box / PRO Modules Updates Here

UMT Box

GsmToto

Super Moderator
Jan 1, 2021
5,020
21,657
UK
Skype
gsmtoto
Sonork ID
100.1684601
Job: Firmware Backup
SELECTED: Tiger T610(UMS512)
ACTION: Backup Firmware
Start Detect phone...
Phone must be off with battery inside.
Long press "VOL -" key and insert usb cable.
For some phones need to
Long press "VOL -"+ "VOL +" key and insert usb cable.
Detected: SPRD U2S Diag (COM9)
Sending payload, keep boot key untill loader start.
Exploiting phone.....
Sending preloader 1
Sending preloader 2
Sending FDL 1.....
Sending FDL 2.....
New flash metod detected.
FileSystem: EMMC
Read partition info is supported by loader.
Manufacturer: incar
Brand: AWOW
Device: CreaPad_1009_EEA
Model: CreaPad_1009_EEA
Build ID: RP1A.201005.001
CPU arhitecture: arm64-v8a
Fota platform: Sprd9863_11.0
Build product name: CreaPad_1009_EEA
Build description: CreaPad_1009_EEA-user 11 RP1A.201005.001 21506 release-keys
Build Id: RP1A.201005.001
Android Release: 11
Android Version: CreaPad_1009_EEA_CQS1093_V08_20211007
Security patch: 2021-04-05
CPU NAME: T610
Backup firmware by loader.
CPU NAME: T610
Found [l_fixnv1_a] [l_fixnv1_a] Size to download: 2 MB
IMEI: 867400020316612
Reading: splloader
[A]Reading: prodnv
[6]Reading: trustos_a
[1]Reading: sml_a
Reading: teecfg_a
Reading: uboot_a
[8]Reading: logo
[8]Reading: fbootlogo
Reading: l_fixnv1_a
[1]Reading: gnssmodem_a
[A]Reading: wcnmodem_a
Reading: persist
[19]Reading: l_modem_a
[1]Reading: l_deltanv_a
[A]Reading: l_gdsp_a
[14]Reading: l_ldsp_a
[6]Reading: l_agdsp_a
[1]Reading: l_cdsp_a
[1]Reading: pm_sys_a
Reading: teecfg_a
[40]Reading: boot_a
[64]Reading: vendor_boot_a
[8]Reading: dtb_a
[8]Reading: dtbo_a
[1004]Reading: super
[4B]Reading: socko_a
[19]Reading: odmko_a
[1]Reading: vbmeta_a
[1]Reading: vbmeta_system_a
[1]Reading: vbmeta_vendor_a
[1]Reading: vbmeta_system_ext_a
[1]Reading: vbmeta_product_a
[can take 0-10 sec]Wait untill phone restart.
 

GsmToto

Super Moderator
Jan 1, 2021
5,020
21,657
UK
Skype
gsmtoto
Sonork ID
100.1684601
Brand/Model : *Auto* / *Auto Detect*
Operation : Reset FRP
Waiting for Device...Found
Port : MediaTek USB Port_V1632 (COM9)
Device Path : \\?\usb#vid_0e8d&pid_0003#6&10c694e1&0&3#{86e0d1e0-8089-11d0-9ce4-08003e301f73}
Driver : MediaTek Inc., 3.0.1504.0 [usb2ser.sys]
Mode : BROM
Hw ID : MT6765 [0766] Helio P35/G35
Details : 8A00,CA00,0000
Sec. Config : [SBA:True] [SLA:False] [DAA:True]
MEID : C2822483A350FB946628F72DF0728BB4
SoC ID[0] : 6021518622ED97D8A1E3FC4BF08890D7
SoC ID[1] : F27B7A6ABBF94B6F501833C6F6FCD045
Running Exploit...Done
Preloader : preloader_muse6762_dh30x_q.bin
Loading EMI Config from Preloader...OK
Sec. Config : [SBA:False] [SLA:False] [DAA:False]
Using Internal DA!
DA Security Patched
Sending 1st DA...OK
Jump DA Address...OK
Syncing...OK
Checksum Level is Storage
Connection : brom
Speed : HIGH-SPEED
Reading RAM Configuration...OK
Reading EMI Configuration...OK
CID : 15010047583642414209EB53E257B74F [EMMC]
Initializing Storage...OK
Sending 2nd DA...OK
Initialize DA Extension...OK
Int. RAM : 0x0000000000038000 [224,00 KB]
Ext. RAM : 0x00000000C0000000 [3,00 GB]
Flash ID : GX6BAB
CID : 15010047583642414209EB53E257B74F
BOOT1 : 0x0000000000400000 [4,00 MB]
BOOT2 : 0x0000000000400000 [4,00 MB]
RPMB : 0x0000000000400000 [4,00 MB]
USERAREA : 0x0000000747C00000 [29,12 GB]
Connected to High-Speed DA Port
Reading Partition Table...OK
Manuf. : LGE
Ven. Model : LM-K500
Platform : mt6765
And. Ver. : 12
Build Dt. : Wed Jan 11 15:37:33 KST 2023
Ver. Inc. : 230111539466b
Locale : en-US
Patch : 2023-01-01
Bootloader : LOCKED
Resetting FRP...OK
Operation Finished.
[UltimateMTK2 v1.0]


After de FRP Need Format FS (Safe)


Brand/Model : *Auto* / *Auto Detect*
Operation : Format FS (Safe)
Waiting for Device...Found
Port : MediaTek USB Port_V1632 (COM9)
Device Path : \\?\usb#vid_0e8d&pid_0003#6&10c694e1&0&3#{86e0d1e0-8089-11d0-9ce4-08003e301f73}
Driver : MediaTek Inc., 3.0.1504.0 [usb2ser.sys]
Mode : BROM
Hw ID : MT6765 [0766] Helio P35/G35
Details : 8A00,CA00,0000
Sec. Config : [SBA:True] [SLA:False] [DAA:True]
MEID : C2822483A350FB946628F72DF0728BB4
SoC ID[0] : 6021518622ED97D8A1E3FC4BF08890D7
SoC ID[1] : F27B7A6ABBF94B6F501833C6F6FCD045
Running Exploit...Done
Preloader : preloader_muse6762_dh30x_q.bin
Loading EMI Config from Preloader...OK
Sec. Config : [SBA:False] [SLA:False] [DAA:False]
Using Internal DA!
DA Security Patched
Sending 1st DA...OK
Jump DA Address...OK
Syncing...OK
Checksum Level is Storage
Connection : brom
Speed : HIGH-SPEED
Reading RAM Configuration...OK
Reading EMI Configuration...OK
CID : 15010047583642414209EB53E257B74F [EMMC]
Initializing Storage...OK
Sending 2nd DA...OK
Initialize DA Extension...OK
Int. RAM : 0x0000000000038000 [224,00 KB]
Ext. RAM : 0x00000000C0000000 [3,00 GB]
Flash ID : GX6BAB
CID : 15010047583642414209EB53E257B74F
BOOT1 : 0x0000000000400000 [4,00 MB]
BOOT2 : 0x0000000000400000 [4,00 MB]
RPMB : 0x0000000000400000 [4,00 MB]
USERAREA : 0x0000000747C00000 [29,12 GB]
Connected to High-Speed DA Port
Reading Partition Table...OK
Manuf. : LGE
Ven. Model : LM-K500
Platform : mt6765
And. Ver. : 12
Build Dt. : Wed Jan 11 15:37:33 KST 2023
Ver. Inc. : 230111539466b
Locale : en-US
Patch : 2023-01-01
Bootloader : LOCKED
Formatting Userdata (Safe Mode)...OK
If phone stuck on recovery, try [Fix Recovery].
Operation Finished.
[UltimateMTK2 v1.0]
Log Saved : 20240543_188548.log
 

GsmToto

Super Moderator
Jan 1, 2021
5,020
21,657
UK
Skype
gsmtoto
Sonork ID
100.1684601
USING PL_EXLOIT [VIVO V2]
Brand/Model : Vivo / *Auto Detect*
Operation : Reset FRP
Waiting for Device...Found
Port : MediaTek PreLoader USB VCOM (Android) (COM9)
Device Path : \\?\usb#vid_0e8d&pid_2000#6&5dcb3f8&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver : MediaTek Inc., 3.0.1504.0 [usb2ser.sys]
Mode : PRELOADER
Hw ID : MT6765 [0766] Helio P35/G35
Details : 8A00,CA00,0000
Sec. Config : [SBA:True] [SLA:False] [DAA:True]
MEID : CEA461B40BA858F56A653E6144C0768A
SoC ID[0] : 3779D02ECC966BB7EACDF254FA407336
SoC ID[1] : 123BE51A8735E66DFB8EF3123CE25019
Sending 1st DA..OK
Jump DA Address...OK
Syncing...OK
Checksum Level is Storage
Connection : preloader
Speed : HIGH-SPEED
Reading RAM Configuration...OK
Sending 2nd DA...OK
Running PL_EXPLOIT [2]...Done
Int. RAM : 0x000000000003A000 [232.00 KB]
Ext. RAM : 0x0000000100000000 [4.00 GB]
Flash ID : G1J9R8
CID : 13014E47314A395238101B74B47429BB
BOOT1 : 0x0000000000400000 [4.00 MB]
BOOT2 : 0x0000000000400000 [4.00 MB]
RPMB : 0x0000000001000000 [16.00 MB]
USERAREA : 0x0000000E8F800000 [58.24 GB]
Connected to High-Speed DA Port
Reading Partition Table...OK
Prod. Model : PD2140JF_EX
And. Ver. : 12
Prod. Ver. : PD2140JF_EX_A_1.13.6
Hw. Ver. : PD2140JF_EXMA
Build Dt. : Fri Dec 1 16:34:02 CST 2023
Display ID : SP1A.210812.003 release-keys
Ver. Inc. : compiler12011639
Locale : en-US
Patch : 2023-12-01
Bootloader : LOCKED
Resetting FRP...OK
Operation Finished.
[UltimateMTK2 v1.0]
Log Saved : 20240889_1844563.log
 

GsmToto

Super Moderator
Jan 1, 2021
5,020
21,657
UK
Skype
gsmtoto
Sonork ID
100.1684601
Brand/Model : *Auto* / *Auto Detect*
Operation : Flash Scatter
Using Preloader from Firmware
Waiting for Device...Found
Port : MediaTek PreLoader USB VCOM_V1632 (Android) (COM4)
Device Path : \\?\usb#vid_22d9&pid_0006#6&17706c76&0&1
#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver : MediaTek Inc., 3.0.1504.0 [usb2ser.sys]
Mode : PRELOADER
Force Enter BROM...OK
Hw ID : MT6768 [0707] Helio P65/G85 k68v1
Details : 8A00,CA00,0000
Sec. Config : [SBA:True] [SLA:False] [DAA:True]
MEID : 08B29A5046F895E91E8DE6C14F60BA4C
SoC ID[0] : B9A52BF93E8447A03B87E0A270D8817D
SoC ID[1] : 07CA1224780C36FA291D5EDB63E3B991
Running Exploit...
Installing LibUsb Filter Driver...OKDone
Preloader : preloader.bin
Loading EMI Config from Preloader...OK
Sec. Config : [SBA:False] [SLA:False] [DAA:False]
Using Internal DA!
DA Security Patched
Sending 1st DA...OK
Jump DA Address...OK
Syncing...OK
Checksum Level is Storage
Connection : brom
Speed : HIGH-SPEED
Reading RAM Configuration...OK
Reading EMI Configuration...OK
CID : 9B0100593053323536008BC129624A31 [EMMC]
Initializing Storage...OK
Sending 2nd DA...OK
Initialize DA Extension...OK
Int. RAM : 0x0000000000070000 [448,00 KB]
Ext. RAM : 0x0000000100000000 [4,00 GB]
Flash ID : Y0S256
CID : 9B0100593053323536008BC129624A31
BOOT1 : 0x0000000000400000 [4,00 MB]
BOOT2 : 0x0000000000400000 [4,00 MB]
RPMB : 0x0000000001000000 [16,00 MB]
USERAREA : 0x0000003A3E000000 [232,97 GB]
Connected to High-Speed DA Port
Reading Partition Table...OK
Bootloader : LOCKED
Writing preloader [preloader.bin]...OK
Writing pgpt [pgpt.bin]...OK
Writing misc [misc.img]...OK
Writing para [para.bin]...OK
Writing oplusreserve1 [oplusreserve1.img]...OK
Writing oplusreserve2 [oplusreserve2.img]...OK
Writing oplusreserve3 [oplusreserve3.img]...OK
Writing oplus_custom [oplus_custom.img]...OK
Writing expdb [expdb.bin]...OK
Writing frp [frp.bin]...OK
Writing vbmeta_a [vbmeta_a.img]...OK
Writing vbmeta_system_a [vbmeta_system_a.img]...OK
Writing vbmeta_vendor_a [vbmeta_vendor_a.img]...OK
Writing vbmeta_b [vbmeta_b.img]...OK
Writing vbmeta_system_b [vbmeta_system_b.img]...OK
Writing vbmeta_vendor_b [vbmeta_vendor_b.img]...OK
Writing md_udc [md_udc.bin]...OK
Writing metadata [metadata.img]...OK
Writing nvcfg [nvcfg.img]...OK
Writing nvdata [nvdata.img]...OK
Writing persist [persist.img]...OK
Writing protect1 [protect1.img]...OK
Writing protect2 [protect2.img]...OK
Writing seccfg [seccfg.bin]...OK
Writing md1img_a [md1img_a.img]...OK
Writing spmfw_a [spmfw_a.img]...OK
Writing scp_a [scp_a.img]...OK
Writing sspm_a [sspm_a.img]...OK
Writing gz_a [gz_a.img]...OK
Writing lk_a [lk_a.img]...OK
Writing boot_a [boot_a.img]...OK
Writing vendor_boot_a [vendor_boot_a.img]...OK
Writing init_boot_a [init_boot_a.img]...OK
Writing dtbo_a [dtbo_a.img]...OK
Writing cdt_engineering_a [cdt_engineering_a.img]...OK
Writing tee_a [tee_a.img]...OK
Writing sec1 [sec1.bin]...OK
Writing proinfo [proinfo.bin]...OK
Writing boot_para [boot_para.bin]...OK
Writing nvram [nvram.img]...OK
Writing logo [logo.bin]...OK
Writing ocdt [ocdt.img]...OK
Writing splash_odm [splash_odm.img]...OK
Writing md1img_b [md1img_b.img]...OK
Writing spmfw_b [spmfw_b.img]...OK
Writing scp_b [scp_b.img]...OK
Writing sspm_b [sspm_b.img]...OK
Writing gz_b [gz_b.img]...OK
Writing lk_b [lk_b.img]...OK
Writing boot_b [boot_b.img]...OK
Writing vendor_boot_b [vendor_boot_b.img]...OK
Writing init_boot_b [init_boot_b.img]...OK
Writing dtbo_b [dtbo_b.img]...OK
Writing cdt_engineering_b [cdt_engineering_b.img]...OK
Writing tee_b [tee_b.img]...OK
Writing oplusreserve5 [oplusreserve5.img]...OK
Writing oplusreserve6 [oplusreserve6.img]...OK
Writing param [param.img]...OK
Writing super [super.img]...OK
Writing userdata [userdata.img]...OK
Writing otp [otp.img]...OK
Writing flashinfo [flashinfo.img]...OK
Operation Finished.
[UltimateMTK2 v1.0]
Log Saved : 202407896_1774553.log
 

GsmToto

Super Moderator
Jan 1, 2021
5,020
21,657
UK
Skype
gsmtoto
Sonork ID
100.1684601
USING PL_EXLOIT [OPPO V2]
Brand/Model : *Auto* / *Auto Detect*
Operation : Reset FRP
Waiting for Device...Found
Port : MediaTek PreLoader USB VCOM_V1632 (Android) (COM5)
Device Path : \\?\usb#vid_22d9&pid_0006#5&155d656&0&2#{86e0d1e0-8089-11d0-9ce4-08003e301f73}
Driver : MediaTek Inc., 3.0.1504.0 [usb2ser.sys]
Mode : PRELOADER
Hw ID : MT6765 [0766] Helio P35/G35
Details : 8A00,CA00,0000
Sec. Config : [SBA:True] [SLA:False] [DAA:True]
MEID : 703F169C020649E5743367ABEE8DD762
SoC ID[0] : B09DA3B135B941B34AF7DE8E6A3C95D8
SoC ID[1] : A1BADE1A9E7E93994695445F3E62C46F
HWID not supported by this Exploit! Select another Exploit.
Operation Finished.
[UltimateMTK2 v1.0]
 

GsmToto

Super Moderator
Jan 1, 2021
5,020
21,657
UK
Skype
gsmtoto
Sonork ID
100.1684601
Brand/Model : *Auto* / *Auto Detect*
Operation : Reset FRP
Waiting for Device...Found
Port : MediaTek PreLoader USB VCOM_V1632 (Android) (COM11)
Device Path : \\?\usb#vid_0e8d&pid_2000#5&1e6a4af9&0&2#{86e0d1e0-8089-11d0-9ce4-08003e301f73}
Driver : MediaTek Inc., 3.0.1504.0 [usb2ser.sys]
Mode : PRELOADER
Force Enter BROM...OK
Hw ID : MT6768 [0707] Helio P65/G85 k68v1
Details : 8A00,CA00,0000
Sec. Config : [SBA:True] [SLA:False] [DAA:True]
MEID : 73F83A737DAEFCECC92E4B939D5CC26F
SoC ID[0] : 84D93782FB30074AB3BD4E1F7B2A88FB
SoC ID[1] : 7592E58ECE2774F0E64B61DB0480246B
Running Exploit...Done
Downloading Preloader...OK
Saved as : preloader_s96818aa1.bin
Loading EMI Config from Preloader...OK
Sec. Config : [SBA:False] [SLA:False] [DAA:False]
Using Internal DA!
DA Security Patched
Sending 1st DA...OK
Jump DA Address...OK
Syncing...OK
Checksum Level is Storage
Connection : brom
Speed : HIGH-SPEED
Reading RAM Configuration...OK
Reading EMI Configuration...OK
CID : 15010044503644424200FE3DD3498A47 [EMMC]
Initializing Storage...OK
Sending 2nd DA...OK
Initialize DA Extension...OK
Int. RAM : 0x0000000000070000 [448.00 KB]
Ext. RAM : 0x0000000100000000 [4.00 GB]
Flash ID : DP6DBB
CID : 15010044503644424200FE3DD3498A47
BOOT1 : 0x0000000000400000 [4.00 MB]
BOOT2 : 0x0000000000400000 [4.00 MB]
RPMB : 0x0000000001000000 [16.00 MB]
USERAREA : 0x0000000E8F800000 [58.24 GB]
Connected to High-Speed DA Port
Reading Partition Table...OK
Bootloader : LOCKED
Resetting FRP...OK
Operation Finished.
[UltimateMTK2 v1.0]
Log Saved : 20240124_1944332.log
 
  • Like
Reactions: wasil AMP

GsmToto

Super Moderator
Jan 1, 2021
5,020
21,657
UK
Skype
gsmtoto
Sonork ID
100.1684601
Brand/Model : *Auto* / *Auto Detect*
Operation : Reset FRP
Waiting for Device...Found
Port : MediaTek USB Port_V1632 (COM7)
Device Path : \\?\usb#vid_0e8d&pid_0003#6&24b900dc&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver : MediaTek Inc., 3.0.1504.0 [usb2ser.sys]
Mode : BROM
Hw ID : MT6761 [0717] Helio A20/P22/A22/A25/G25
Details : 8A00,CA01,0200
Sec. Config : [SBA:True] [SLA:False] [DAA:True]
MEID : 6F4000503466D3D8C40136974E8EA892
SoC ID[0] : BF26DD30373A1AF7E4F7223A43E113A8
SoC ID[1] : ED6C2ED327EF3ACBFCABE6B4AD92A116
Running Exploit...
Installing LibUsb Filter Driver...OKDone
Downloading Preloader...Failed!
Please select preloader!
Loading EMI Config from Preloader...OK
Sec. Config : [SBA:False] [SLA:False] [DAA:False]
Using Internal DA!
DA Security Patched
Sending 1st DA...OK
Jump DA Address...OK
Syncing...OK
Checksum Level is Storage
Connection : brom
Speed : HIGH-SPEED
Reading RAM Configuration...OK
Reading EMI Configuration...OK
CID : D601034133413536311244E0E92D3A13 [EMMC]
Initializing Storage...OK
Sending 2nd DA...OK
Initialize DA Extension...OK
Int. RAM : 0x0000000000039000 [228.00 KB]
Ext. RAM : 0x0000000100000000 [4.00 GB]
Flash ID : A3A561
CID : D601034133413536311244E0E92D3A13
BOOT1 : 0x0000000000400000 [4.00 MB]
BOOT2 : 0x0000000000400000 [4.00 MB]
RPMB : 0x0000000001000000 [16.00 MB]
USERAREA : 0x0000000E67800000 [57.62 GB]
Connected to High-Speed DA Port
Reading Partition Table...OK
Bootloader : LOCKED
Resetting FRP...OK
Operation Finished.
[UltimateMTK2 v1.0]
Log Saved : 20240126_1343211.log
 
  • Like
Reactions: wasil AMP

GsmToto

Super Moderator
Jan 1, 2021
5,020
21,657
UK
Skype
gsmtoto
Sonork ID
100.1684601
Brand/Model : *Auto* / *Auto Detect*
Operation : Reset FRP
Waiting for Device...Found
Port : MediaTek PreLoader USB VCOM (Android) (COM7)
Device Path : \\?\usb#vid_0e8d&pid_2000#6&df2ee03&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver : MediaTek Inc., 3.0.1504.0 [usb2ser.sys]
Mode : PRELOADER
Force Enter BROM...OK
Hw ID : MT6833 [0989] Dimensity 700 5G k6833
Details : 8A00,CA00,0000
Sec. Config : [SBA:True] [SLA:False] [DAA:True]
MEID : F6A797CDA081AB4885CE8734366F8DC7
SoC ID[0] : 9AD35ABA365C1B77AF731CB10B3B39A2
SoC ID[1] : E411D773A7273519F97A853518E2E99B
Running Exploit...Done
Downloading Preloader...OK
Saved as : preloader_s96801aa2.bin
Loading EMI Config from Preloader...OK
Sec. Config : [SBA:False] [SLA:False] [DAA:False]
Using Internal DA!
DA Security Patched
Sending 1st DA...OK
Jump DA Address...OK
Syncing...OK
Checksum Level is Storage
Connection : brom
Speed : HIGH-SPEED
Reading RAM Configuration...OK
Reading EMI Configuration...OK
CID : 150100445636444242002DDFD0A73901 [EMMC]
Initializing Storage...OK
Sending 2nd DA...OK
Initialize DA Extension...OK
Int. RAM : 0x0000000000070000 [448,00 KB]
Ext. RAM : 0x0000000100000000 [4,00 GB]
Flash ID : DV6DBB
CID : 150100445636444242002DDFD0A73901
BOOT1 : 0x0000000000400000 [4,00 MB]
BOOT2 : 0x0000000000400000 [4,00 MB]
RPMB : 0x0000000001000000 [16,00 MB]
USERAREA : 0x0000001D1F000000 [116,48 GB]
Connected to High-Speed DA Port
Reading Partition Table...OK
And. Ver. : 12
Build Dt. : Thu Jun 30 03:02:51 KST 2022
Display ID : SP1A.210812.016.A226BRUBU3BVF7
Ver. Inc. : A226BRUBU3BVF7
Locale : en-GB
Patch : 2022-07-01
Bootloader : LOCKED
Resetting FRP...OK
Operation Finished.
[UltimateMTK2 v1.0]
Log Saved : 20240126_1666223.log
 
  • Like
Reactions: wasil AMP

GsmToto

Super Moderator
Jan 1, 2021
5,020
21,657
UK
Skype
gsmtoto
Sonork ID
100.1684601
Model : MediaTek FRP
Operation : All MediaTek 2023
Searching for Phone...Found
Port: : COM3 : SAMSUNG Mobile USB Modem
Checking for Device...Found [Download Mode]
Reading Data from Phone...Done
Chipset : MT6833 [HiSpeed]
Closing Session...Done
Port: : COM3 : SAMSUNG Mobile USB Modem
Checking for Device...Found [Download Mode]
Resetting FRP Data...Done
Closing Session...Done
Operation Finished.
Elapsed Time 00:23
[UltimateSams v0.7]
Saved to Logs\240126_1997582.log
 

GsmToto

Super Moderator
Jan 1, 2021
5,020
21,657
UK
Skype
gsmtoto
Sonork ID
100.1684601
USING PL_EXLOIT [MOTO XT2331]
Brand/Model : Motorola / *Auto Detect*
Operation : Read Info
Waiting for Device...Found
Port : MediaTek PreLoader USB VCOM_V1632 (Android) (COM5)
Device Path : \\?\usb#vid_0e8d&pid_2000#5&1e4121f5&0&7#{86e0d1e0-8089-11d0-9ce4-08003e301f73}
Driver : MediaTek Inc., 3.0.1504.0 [usb2ser.sys]
Mode : PRELOADER
Hw ID : MT6768 [0707] Helio P65/G85 k68v1
Details : 8A00,CA00,0000
Sec. Config : [SBA:True] [SLA:False] [DAA:True]
MEID : 62191FAB92B31E87D2D20954B300680E
SoC ID[0] : 438FE8B79F42CCFE3E1E679FF2975F75
SoC ID[1] : 0622E6AB919AAB5D4C301FC6E4F3F501
Sending 1st DA..OK
Jump DA Address...OK
Syncing...OK
Checksum Level is Storage
Connection : preloader
Speed : HIGH-SPEED
Reading RAM Configuration...OK
Running PL_EXPLOIT [1]...Done
Sending 2nd DA...OK
Loading Extension...Done
Int. RAM : 0x0000000000070000 [448,00 KB]
Ext. RAM : 0x0000000100000000 [4,00 GB]
Flash ID : A3A562
CID : D6010341334135363211F48FB92D99ED
BOOT1 : 0x0000000000400000 [4,00 MB]
BOOT2 : 0x0000000000400000 [4,00 MB]
RPMB : 0x0000000001000000 [16,00 MB]
USERAREA : 0x0000001CCF000000 [115,23 GB]
Connected to High-Speed DA Port
Reading Partition Table...OK
Operation Finished.
[UltimateMTK2 v1.0]


Brand/Model : Motorola / *Auto Detect*
Operation : Read Scatter
Reading preloader...Done
Reading pgpt...Done
Reading misc...Done
Reading para...Done
Reading expdb...Done
Reading frp...Done
Reading hw...Done
Reading utags...Done
Reading utagsbackup...Done
Reading vbmeta_a...Done
Reading vbmeta_system_a...Done
Reading vbmeta_vendor_a...Done
Reading vbmeta_b...Done
Reading vbmeta_system_b...Done
Reading vbmeta_vendor_b...Done
Reading md_udc...Done
Reading metadata...Done
Reading nvcfg...Done
Reading nvdata...Done
Reading persist...Done
Reading protect1...Done
Reading protect2...Done
Reading seccfg...Done
Reading md1img_a...Done
Reading spmfw_a...Done
Reading scp_a...Done
Reading sspm_a...Done
Reading gz_a...Done
Reading lk_a...Done
Reading boot_a...Done
Reading vendor_boot_a...Done
Reading dtbo_a...Done
Reading tee_a...Done
Reading sec1...Done
Reading proinfo...Done
Reading boot_para...Done
Reading nvram...Done
Reading rfcal...Done
Reading cid...Done
Reading sp...Done
Reading elable...Done
Reading prodper...Done
Reading kpan...Done
Reading logs...Done
Reading carrier...Done
Reading pad5...Done
Reading pad4...Done
Reading pad1...Done
Reading pad0...Done
Reading kdebuginfo...Done
Reading logo...Done
Reading pad2...Done
Reading md1img_b...Done
Reading spmfw_b...Done
Reading scp_b...Done
Reading sspm_b...Done
Reading gz_b...Done
Reading lk_b...Done
Reading boot_b...Done
Reading vendor_boot_b...Done
Reading dtbo_b...Done
Reading tee_b...Done
Reading pad3...Done
Reading super...Done
Reading otp...Done
Reading flashinfo...Done
Scatter saved as C:\Users\bio hazard\Desktop\g13 yedek\MT6768_Anrdoid_scatter.txt
Operation Finished.
[UltimateMTK2 v1.0]
Log Saved : 20240126_277334.log
 
  • Like
Reactions: wasil AMP

GsmToto

Super Moderator
Jan 1, 2021
5,020
21,657
UK
Skype
gsmtoto
Sonork ID
100.1684601
Brand/Model : *Auto* / *Auto Detect*
Operation : Reset FRP
Waiting for Device...Found
Port : MediaTek PreLoader USB VCOM_V1632 (Android) (COM11)
Device Path : \\?\usb#vid_22d9&pid_0006#5&151fc306&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver : MediaTek Inc., 3.0.1504.0 [usb2ser.sys]
Mode : PRELOADER
Force Enter BROM...OK
Hw ID : MT6768 [0707] Helio P65/G85 k68v1
Details : 8A00,CA00,0000
Sec. Config : [SBA:True] [SLA:False] [DAA:True]
MEID : 9B8DDD0B8F995FEFA3AB7FA0766D0590
SoC ID[0] : 4F7D41F07B10DC983F105E4935D31951
SoC ID[1] : C3EF385484AF70799952516E4E00DC8F
Running Exploit...
Installing LibUsb Filter Driver...OKDone
Downloading Preloader...OK
Saved as : preloader_k69v1_64_k419.bin
Loading EMI Config from Preloader...OK
Sec. Config : [SBA:False] [SLA:False] [DAA:False]
Using Internal DA!
DA Security Patched
Sending 1st DA...OK
Jump DA Address...OK
Syncing...OK
Checksum Level is Storage
Connection : brom
Speed : HIGH-SPEED
Reading RAM Configuration...OK
Reading EMI Configuration...OK
CID : 150100445554423432022913537F4A1B [EMMC]
Initializing Storage...OK
Sending 2nd DA...OK
Initialize DA Extension...OK
Int. RAM : 0x0000000000070000 [448.00 KB]
Ext. RAM : 0x0000000100000000 [4.00 GB]
Flash ID : DUTB42
CID : 150100445554423432022913537F4A1B
BOOT1 : 0x0000000000400000 [4.00 MB]
BOOT2 : 0x0000000000400000 [4.00 MB]
RPMB : 0x0000000001000000 [16.00 MB]
USERAREA : 0x0000001D1EC00000 [116.48 GB]
Connected to High-Speed DA Port
Reading Partition Table...OK
Bootloader : LOCKED
Resetting FRP...OK
Operation Finished.
[UltimateMTK2 v1.0]
Log Saved : 20240124_19883348.log
 
  • Like
Reactions: wasil AMP

SPYROS

Product Supporter
Jan 27, 2023
251
782
PK
We are pleased to announce
UMTv2 / UMT Pro
Innovative and Intelligent



UltimateMTK2 v1.1
The Ultimate MediaTek Tool







What's New:

Updated Infinix/iTel/Tecno V3 (Nov'23) in Preloder Mode
- Supported Chipsets:
- MT6761
- MT6765
- MT6768
- MT6781
- MT6785
- MT6833
- MT6877
- MT6893


Added Storage Health Check on Boot
- It will show PreEOL, LifeTime Estimate A, and LifeTime Estimate B when possible.


Updated Xiaomi Mi Account Relok Fix Function
- Tested on MIUI 14


Added Safe Format (Oppo) Option
- We still recommend using Erase Data to Format
- If device is stuck in recovery, use Fix Recovery only
- Do not do anything except Fix Recovery


Added Erase Data + FRP Option


Updated Fix Recovery Function


Revised Format Functions List


Updated Read Information on devices with Dynamic Partitions and A/B Slots


Disabled "SWITCH HI-SPEED" Option by default
- Using Hi-Speed connection may cause issue with poor quality cable
- If you want to use Hi-Speed connection, please tick "SWITCH HI-SPEED" checkbox


Fixed Minor GUI Issues





Important Notes:

- You can flash device with both BROM and Preloader mode
- If default DA does not work, use own DA in custom DA
- Force BROM may not work on new security, use Test Point instead
- When using Test Point, you must select Preloader in PL (not needed when flashing)
- If you need to connect device in Preloader mode, you must select PRELOADER in connection settings, otherwise software will try to Crash Preloader (may not work on new security devices)
- You can test PRELOADER EXPLOIT on any device with DA from Vendor even if that DA does not allow Write or Erase.



Note : Some features are device/OS specific and may not work on all devices.




WARNING:

ESN / MEID / IMEI REPAIR IS INTENDED TO REPAIR ESN / MEID / IMEI TO ORIGINAL ONE WRITTEN ON PHONE BACK LABEL / BOX. WE DO NOT ENDORSE OR ENCOURAGE ESN / MEID / IMEI CHANGING. ITS ILLEGAL. USER IS SOLE RESPONSIBLE FOR ANY ILLEGAL ACTIVITY DONE WITH USE OF FEATURES PROVIDED IN OUR SOFTWARE, NOT LIMITED TO ESN / MEID / IMEI.

ANY USER USING OUR SOFTWARE FOR ILLEGAL PURPOSE WILL BE SOLE RESPONSIBLE FOR HIS ACTS.

WE CONDEMN USE OF OUR SOFTWARE FOR ANY ILLEGAL PURPOSE.





Download using Support Access or Mirrors



Official Website:
Ultimate Multi Tool
UMT Pro


Br,
UMT
 

GsmToto

Super Moderator
Jan 1, 2021
5,020
21,657
UK
Skype
gsmtoto
Sonork ID
100.1684601
Brand/Model : *Auto* / *Auto Detect*
Operation : Reset FRP
Waiting for Device...Found
Port : MediaTek USB Port (COM7)
Device Path : \\?\usb#vid_0e8d&pid_0003#5&dc4a972&0&8#{86e0d1e0-8089-11d0-9ce4-08003e301f73}
Driver : MediaTek Inc., 1.0.0.0 [USBSER.sys]
Mode : BROM
Hw ID : MT6761 [0717] Helio A20/P22/A22/A25/G25
Details : 8A00,CA01,0200
Sec. Config : [SBA:True] [SLA:False] [DAA:True]
MEID : C77E8D623008602FB78211D63C4B1E3F
SoC ID[0] : 4A3BC519D371A8E5A3BCDAF645BB2D92
SoC ID[1] : 78D2B62A09CBD88D3485ACF782531CAC
Running Exploit...Done
Downloading Preloader...OK
Saved as : preloader_x627_h624.bin
Loading EMI Config from Preloader...OK
Sec. Config : [SBA:False] [SLA:False] [DAA:False]
Using Internal DA!
DA Security Patched
Sending 1st DA...OK
Jump DA Address...OK
Syncing...OK
Checksum Level is Storage
Connection : brom
Speed : FULL-SPEED
Reading RAM Configuration...OK
Reading EMI Configuration...OK
CID : 700100544132383332232682B1DD762B [EMMC]
Initializing Storage...OK
Sending 2nd DA...OK
Initialize DA Extension...OK
Int. RAM : 0x0000000000039000 [228.00 KB]
Ext. RAM : 0x0000000080000000 [2.00 GB]
Flash ID : TA2832
CID : 700100544132383332232682B1DD762B
BOOT1 : 0x0000000000400000 [4.00 MB]
BOOT2 : 0x0000000000400000 [4.00 MB]
RPMB : 0x0000000000400000 [4.00 MB]
USERAREA : 0x000000074A000000 [29.16 GB]
PRE EOL : NORMAL
Life. Est.A : 80%-90% LIFE TIME USED
Life. Est.B : 90%-100% LIFE TIME USED
Reading Partition Table...OK
Brand : Infinix
Manuf. : INFINIX MOBILITY LIMITED
Model : Infinix X627
Device : Infinix-X627STU
And. Ver. : 9
Prod. Name : H624
Build Dt. : Mon Dec 7 23:10:17 CST 2020
Display ID : X627-H624STXYZAa-P-201207V337
Ver. Inc. : STXYZAa-201207V337
Locale : en-US
Patch : 2020-12-05
Bootloader : LOCKED
Resetting FRP...OK
Operation Finished.
[UltimateMTK2 v1.1]
Log Saved : 20240128_29667277.log
 

MANISH ROY

Active Member
Sep 25, 2017
27
6
patna
We are pleased to announce
UMTv2 / UMT Pro
Innovative and Intelligent



UltimateMTK2 v1.1
The Ultimate MediaTek Tool








What's New:

Updated Infinix/iTel/Tecno V3 (Nov'23) in Preloder Mode
- Supported Chipsets:

- MT6761
- MT6765
- MT6768
- MT6781
- MT6785
- MT6833
- MT6877
- MT6893


Added Storage Health Check on Boot
- It will show PreEOL, LifeTime Estimate A, and LifeTime Estimate B when possible.


Updated Xiaomi Mi Account Relok Fix Function
- Tested on MIUI 14


Added Safe Format (Oppo) Option
- We still recommend using Erase Data to Format
- If device is stuck in recovery, use Fix Recovery only
- Do not do anything except Fix Recovery


Added Erase Data + FRP Option


Updated Fix Recovery Function


Revised Format Functions List


Updated Read Information on devices with Dynamic Partitions and A/B Slots


Disabled "SWITCH HI-SPEED" Option by default

- Using Hi-Speed connection may cause issue with poor quality cable
- If you want to use Hi-Speed connection, please tick "SWITCH HI-SPEED" checkbox


Fixed Minor GUI Issues





Important Notes:

- You can flash device with both BROM and Preloader mode
- If default DA does not work, use own DA in custom DA
- Force BROM may not work on new security, use Test Point instead
- When using Test Point, you must select Preloader in PL (not needed when flashing)
- If you need to connect device in Preloader mode, you must select PRELOADER in connection settings, otherwise software will try to Crash Preloader (may not work on new security devices)
- You can test PRELOADER EXPLOIT on any device with DA from Vendor even if that DA does not allow Write or Erase.



Note : Some features are device/OS specific and may not work on all devices.




WARNING:
ESN / MEID / IMEI REPAIR IS INTENDED TO REPAIR ESN / MEID / IMEI TO ORIGINAL ONE WRITTEN ON PHONE BACK LABEL / BOX. WE DO NOT ENDORSE OR ENCOURAGE ESN / MEID / IMEI CHANGING. ITS ILLEGAL. USER IS SOLE RESPONSIBLE FOR ANY ILLEGAL ACTIVITY DONE WITH USE OF FEATURES PROVIDED IN OUR SOFTWARE, NOT LIMITED TO ESN / MEID / IMEI.

ANY USER USING OUR SOFTWARE FOR ILLEGAL PURPOSE WILL BE SOLE RESPONSIBLE FOR HIS ACTS.

WE CONDEMN USE OF OUR SOFTWARE FOR ANY ILLEGAL PURPOSE.





Download using Support Access or Mirrors



Official Website:
Ultimate Multi Tool
UMT Pro


Br,
UMT
hello sir plzz add this Motorola Moto G54 (XT2343-5 128GB/8GB) cpu type mt6855 frp reset plzz add next upadte
 
  • Like
Reactions: GsmToto

GsmToto

Super Moderator
Jan 1, 2021
5,020
21,657
UK
Skype
gsmtoto
Sonork ID
100.1684601
Brand/Model : *Auto* / *Auto Detect*
Operation : Reset FRP
Waiting for Device...Found
Port : MediaTek PreLoader USB VCOM (Android) (COM7)
Device Path : \\?\usb#vid_0e8d&pid_2000#5&19490860&0&6#{86e0d1e0-8089-11d0-9ce4-08003e301f73}
Driver : MediaTek Inc., 3.0.1504.0 [usb2ser.sys]
Mode : PRELOADER
Force Enter BROM...Failed!
Please use TP for BROM, or untick Force BROM to work in preloader mode.
Operation Finished.
[UltimateMTK2 v1.1]
Log Saved : 20240130_1955324.log
 

MANISH ROY

Active Member
Sep 25, 2017
27
6
patna
We are pleased to announce
UMTv2 / UMT Pro
Innovative and Intelligent



UltimateMTK2 v1.1
The Ultimate MediaTek Tool








What's New:

Updated Infinix/iTel/Tecno V3 (Nov'23) in Preloder Mode
- Supported Chipsets:

- MT6761
- MT6765
- MT6768
- MT6781
- MT6785
- MT6833
- MT6877
- MT6893


Added Storage Health Check on Boot
- It will show PreEOL, LifeTime Estimate A, and LifeTime Estimate B when possible.


Updated Xiaomi Mi Account Relok Fix Function
- Tested on MIUI 14


Added Safe Format (Oppo) Option
- We still recommend using Erase Data to Format
- If device is stuck in recovery, use Fix Recovery only
- Do not do anything except Fix Recovery


Added Erase Data + FRP Option


Updated Fix Recovery Function


Revised Format Functions List


Updated Read Information on devices with Dynamic Partitions and A/B Slots


Disabled "SWITCH HI-SPEED" Option by default

- Using Hi-Speed connection may cause issue with poor quality cable
- If you want to use Hi-Speed connection, please tick "SWITCH HI-SPEED" checkbox


Fixed Minor GUI Issues





Important Notes:

- You can flash device with both BROM and Preloader mode
- If default DA does not work, use own DA in custom DA
- Force BROM may not work on new security, use Test Point instead
- When using Test Point, you must select Preloader in PL (not needed when flashing)
- If you need to connect device in Preloader mode, you must select PRELOADER in connection settings, otherwise software will try to Crash Preloader (may not work on new security devices)
- You can test PRELOADER EXPLOIT on any device with DA from Vendor even if that DA does not allow Write or Erase.



Note : Some features are device/OS specific and may not work on all devices.




WARNING:
ESN / MEID / IMEI REPAIR IS INTENDED TO REPAIR ESN / MEID / IMEI TO ORIGINAL ONE WRITTEN ON PHONE BACK LABEL / BOX. WE DO NOT ENDORSE OR ENCOURAGE ESN / MEID / IMEI CHANGING. ITS ILLEGAL. USER IS SOLE RESPONSIBLE FOR ANY ILLEGAL ACTIVITY DONE WITH USE OF FEATURES PROVIDED IN OUR SOFTWARE, NOT LIMITED TO ESN / MEID / IMEI.

ANY USER USING OUR SOFTWARE FOR ILLEGAL PURPOSE WILL BE SOLE RESPONSIBLE FOR HIS ACTS.

WE CONDEMN USE OF OUR SOFTWARE FOR ANY ILLEGAL PURPOSE.





Download using Support Access or Mirrors



Official Website:
Ultimate Multi Tool
UMT Pro


Br,
UMT
hello sir plzz add this Motorola Moto G54 (XT2343-5 128GB/8GB) cpu type mt6855 frp reset plzz add next upadte
 
Top