- إنضم
- 16 سبتمبر 2012
- المشاركات
- 3,312
- مستوى التفاعل
- 3,092
- النقاط
- 113
كود:
[Userdata + FRP]
Waiting for device...Found
Port Info : MediaTek USB Port_V1633 (COM46) [\\?\usb#vid_0e8d&pid_0003#5&21e739f&0&3#{f9f3ff14-ae21-48a0-8a25-8011a7a931d9}]
: MediaTek Inc., 3.0.1504.0 [usb2ser.sys]
: BROM PORT
Hw ID : MT6765 [0766] Helio P35/G35
Details : 8A00,CA00,0000
Sec. Cfg : [SBA Active] [SLA Inactive] [DAA Active]
MEID : D5059A1A6B236E75782E0DB6B4F6FF1D
SoC ID[0] : 3B46EBBAA44BA820FF43425C67FD1DA3
SoC ID[1] : 7B00CC3BAE7FB9E3AF6D8977B8CEF19E
Executing Exploit...Done
Reading Preloader...OK
Saved as : preloader_oppo6765.bin
Loading EMI Config from Preloader...OK
Sec. Cfg : [SBA Inactive] [SLA Inactive] [DAA Inactive]
Sending DA1...OK
Running DA1...OK
Waiting DA SYNC Signal...OK
Setting Checksum Level...Done [Storage]
Connection : brom
Speed : HIGH-SPEED
Reading EMI Configuration...OK
EMMC CID : 90014A68423861503E03004C3438583F
Sending EMI Config...OK
Sending 2nd DA...OK
Activating DA Extension...OK
Int. RAM : 0x0000000000038000 [224.00 KB]
Ext. RAM : 0x00000000C0000000 [3.00 GB]
Flash ID : hB8aP>
CID : 90014A68423861503E03004C3438583F
BOOT1 : 0x0000000000400000 [4.00 MB]
BOOT2 : 0x0000000000400000 [4.00 MB]
RPMB : 0x0000000001000000 [16.00 MB]
USERAREA : 0x0000000747C00000 [29.12 GB]
Reading Parititon Info...OK
And. Ver. : 10
Build Dt. : Wed Apr 26 14:39:43 CST 2023
Display ID : QP1A.190711.020 release-keys
Locale : en-US
Patch : 2023-02-05
Formating Userdata...Done
Reset FRP Data...Done
Process finished
[NCK MTK Exploit Tool v1.0]
LOG TXT : 20240130_174044.txt
Screenshot : Screenshot_24-01-30-174155