- إنضم
- 16 سبتمبر 2012
- المشاركات
- 3,361
- مستوى التفاعل
- 3,122
- النقاط
- 113

كود:
[Reset FRP]
Waiting for device...Found
Port Info : MediaTek USB Port_V1633 (COM46) [\\?\usb#vid_0e8d&pid_0003#5&21e739f&0&3#{86e0d1e0-8089-11d0-9ce4-08003e301f73}]
: MediaTek Inc., 3.0.1504.0 [usb2ser.sys]
: BROM PORT
Hw ID : MT6765 [0766] Helio P35/G35
Details : 8A00,CA00,0000
Sec. Cfg : [SBA Active] [SLA Active] [DAA Active]
MEID : 074FF0E048B38CB24AFE38374642ABD7
SoC ID[0] : D901E3B406A92B31F5C1F260563150E1
SoC ID[1] : 6BCBB73321D1B99FBC03C0425042DA68
Executing Exploit...Done
Reading Preloader...OK
Saved as : preloader_k62v1_64_bsp.bin
Loading EMI Config from Preloader...OK
Sec. Cfg : [SBA Inactive] [SLA Inactive] [DAA Inactive]
Sending DA1...OK
Running DA1...OK
Waiting DA SYNC Signal...OK
Setting Checksum Level...Done [Storage]
Connection : brom
Speed : HIGH-SPEED
Reading EMI Configuration...OK
EMMC CID : 9B0100593250303634002A09449B5901
Sending EMI Config...OK
Sending 2nd DA...OK
Activating DA Extension...OK
Int. RAM : 0x0000000000038000 [224.00 KB]
Ext. RAM : 0x0000000100000000 [4.00 GB]
Flash ID : Y2P064
CID : 9B0100593250303634002A09449B5901
BOOT1 : 0x0000000000400000 [4.00 MB]
BOOT2 : 0x0000000000400000 [4.00 MB]
RPMB : 0x0000000001000000 [16.00 MB]
USERAREA : 0x0000000E8F800000 [58.24 GB]
Reading Parititon Info...OK
Manufacturer : Xiaomi
And. Ver. : 11
Build Dt. : Tue Apr 26 21:53:26 CST 2022
Display ID : RP1A.200720.011
Ver. Inc. : V12.5.5.0.RCZMIXM
Locale : en-GB
Mod. Dev. : dandelion_c3l2_global
Patch : 2022-04-01
Reset FRP Data...Done
Process finished
[NCK MTK Exploit Tool v1.0]
LOG TXT : 20240127_153639.txt