UMT vivo y12 1click pattern and frp remove letest security with test point

UMT Box

zashish5213

Active Member
Jul 7, 2021
70
11
211008
vivo y12 pattern with frp one click using test point method
Brand/Model : Vivo / Y15 (PD1901FB)
Operation : Safe Format+FRP
Waiting for Device...Found
Port : MediaTek USB Port (COM3)
Device Path : \\?\usb#vid_0e8d&pid_0003#6&12e668e6&0&2#{86e0d1e0-8089-11d0-9ce4-08003e301f73}
Driver : MediaTek Inc., 3.2.0.0 [usb2ser.sys]
Mode : BROM
Hw ID : MT6765 [0766] Helio P35/G35
Details : 8A00,CA00,0000
Sec. Config : [SBA:True] [SLA:False] [DAA:True]
MEID : 3CA2178AF82FF64EB38FF4680486D2B1
SoC ID[0] : E75F532338379F83EBF008A3552957E5
SoC ID[1] : 092D198C7FB62CC2AAD8EA26BC60F546
Running Exploit...Done
Loading EMI Config from Preloader...OK
Sec. Config : [SBA:False] [SLA:False] [DAA:False]
Using DA : MTK_AllInOne_DA.bin
DA Security Patched
Sending 1st DA...OK
Jump DA Address...OK
Syncing...OK
Checksum Level is Storage
Connection : brom
Speed : HIGH-SPEED
Reading RAM Configuration...OK
Reading EMI Configuration...OK
CID : 90014A68433861503E0363754870B605 [EMMC]
Initializing Storage...OK
Sending 2nd DA...OK
Initialize DA Extension...OK
Int. RAM : 0x000000000003A000 [232.00 KB]
Ext. RAM : 0x00000000C0000000 [3.00 GB]
Flash ID : hC8aP>
CID : 90014A68433861503E0363754870B605
BOOT1 : 0x0000000000400000 [4.00 MB]
BOOT2 : 0x0000000000400000 [4.00 MB]
RPMB : 0x0000000001000000 [16.00 MB]
USERAREA : 0x0000000E8F800000 [58.24 GB]
Connected to High-Speed DA Port
Reading Partition Table...OK
Manuf. : vivo
Ven. Model : vivo 1901
Platform : mt6765
And. Ver. : 11
Build Dt. : Mon Aug 22 17:41:18 CST 2022
Display ID : RP1A.200720.012 release-keys
Ver. Inc. : eng.compil.20220822.174609
Locale : en-US
Patch : 2022-05-01
Bootloader : LOCKED
Formatting Userdata (Safe Mode)...OK
Resetting FRP...OK
Operation Finished.
[UltimateMTK2 v0.6]
Log Saved : 20230715_133220.log
 
Top