Offline
Tecno Spark 6 KE7 FRP Done
Operation : Reset FRP
Waiting for Device...Found
Port : MediaTek PreLoader USB VCOM_V1633 (Android) (COM9)
Device Path : \\?\usb#vid_0e8d&pid_2000#6&1b0d304&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver : MediaTek Inc., 3.0.1504.0 [usb2ser.sys]
Mode : PRELOADER
Force Enter BROM...OK
Hw ID : MT6768 [0707] Helio P65/G85 k68v1
Details : 8A00,CA00,0000
Sec. Config : [SBA:True] [SLA:False] [DAA:True]
MEID : 057DB3836BB34248F50E06499AE69D0E
SoC ID[0] : 34AB48870C8751B46A20A5F1E9BF0A4B
SoC ID[1] : 3B6BBB9EA0FB57756683805B8791BCDF
Running Exploit...Done
Downloading Preloader...OK
Saved as : preloader_ke7_h693.bin
Loading EMI Config from Preloader...OK
Sec. Config : [SBA:False] [SLA:False] [DAA:False]
Using DA : MTK_AllInOne_DA.bin
DA Security Patched
Sending 1st DA...OK
Jump DA Address...OK
Syncing...OK
Checksum Level is Storage
Connection : brom
Speed : HIGH-SPEED
Reading RAM Configuration...OK
Reading EMI Configuration...OK
CID : 90014A684339615033010071193E87A3 [EMMC]
Initializing Storage...OK
Sending 2nd DA...OK
Initialize DA Extension...OK
Int. RAM : 0x0000000000070000 [448.00 KB]
Ext. RAM : 0x0000000100000000 [4.00 GB]
Flash ID : hC9aP3
CID : 90014A684339615033010071193E87A3
BOOT1 : 0x0000000000400000 [4.00 MB]
BOOT2 : 0x0000000000400000 [4.00 MB]
RPMB : 0x0000000001000000 [16.00 MB]
USERAREA : 0x0000000E8F800000 [58.24 GB]
Connected to High-Speed DA Port
Reading Partition Table...OK
Resetting FRP...OK
Operation Finished.
[UltimateMTK2 v0.3]
Log Saved : 20230321_213948.log
Operation : Reset FRP
Waiting for Device...Found
Port : MediaTek PreLoader USB VCOM_V1633 (Android) (COM9)
Device Path : \\?\usb#vid_0e8d&pid_2000#6&1b0d304&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver : MediaTek Inc., 3.0.1504.0 [usb2ser.sys]
Mode : PRELOADER
Force Enter BROM...OK
Hw ID : MT6768 [0707] Helio P65/G85 k68v1
Details : 8A00,CA00,0000
Sec. Config : [SBA:True] [SLA:False] [DAA:True]
MEID : 057DB3836BB34248F50E06499AE69D0E
SoC ID[0] : 34AB48870C8751B46A20A5F1E9BF0A4B
SoC ID[1] : 3B6BBB9EA0FB57756683805B8791BCDF
Running Exploit...Done
Downloading Preloader...OK
Saved as : preloader_ke7_h693.bin
Loading EMI Config from Preloader...OK
Sec. Config : [SBA:False] [SLA:False] [DAA:False]
Using DA : MTK_AllInOne_DA.bin
DA Security Patched
Sending 1st DA...OK
Jump DA Address...OK
Syncing...OK
Checksum Level is Storage
Connection : brom
Speed : HIGH-SPEED
Reading RAM Configuration...OK
Reading EMI Configuration...OK
CID : 90014A684339615033010071193E87A3 [EMMC]
Initializing Storage...OK
Sending 2nd DA...OK
Initialize DA Extension...OK
Int. RAM : 0x0000000000070000 [448.00 KB]
Ext. RAM : 0x0000000100000000 [4.00 GB]
Flash ID : hC9aP3
CID : 90014A684339615033010071193E87A3
BOOT1 : 0x0000000000400000 [4.00 MB]
BOOT2 : 0x0000000000400000 [4.00 MB]
RPMB : 0x0000000001000000 [16.00 MB]
USERAREA : 0x0000000E8F800000 [58.24 GB]
Connected to High-Speed DA Port
Reading Partition Table...OK
Resetting FRP...OK
Operation Finished.
[UltimateMTK2 v0.3]
Log Saved : 20230321_213948.log