UMT [08-01-24] UMTv2/UMTPro UltimateMTK2 v1.0 - Vivo New Security, Motorola and more...

UMT Box

GsmToto

Super Moderator
Jan 1, 2021
3,710
18,934
UK
Skype
gsmtoto
Sonork ID
100.1684601
Brand/Model : *Auto* / *Auto Detect*
Operation : Flash Scatter
Using Preloader from Firmware
Waiting for Device...Found
Port : MediaTek PreLoader USB VCOM_V1632 (Android) (COM4)
Device Path : \\?\usb#vid_22d9&pid_0006#6&17706c76&0&1
#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver : MediaTek Inc., 3.0.1504.0 [usb2ser.sys]
Mode : PRELOADER
Force Enter BROM...OK
Hw ID : MT6768 [0707] Helio P65/G85 k68v1
Details : 8A00,CA00,0000
Sec. Config : [SBA:True] [SLA:False] [DAA:True]
MEID : 08B29A5046F895E91E8DE6C14F60BA4C
SoC ID[0] : B9A52BF93E8447A03B87E0A270D8817D
SoC ID[1] : 07CA1224780C36FA291D5EDB63E3B991
Running Exploit...
Installing LibUsb Filter Driver...OKDone
Preloader : preloader.bin
Loading EMI Config from Preloader...OK
Sec. Config : [SBA:False] [SLA:False] [DAA:False]
Using Internal DA!
DA Security Patched
Sending 1st DA...OK
Jump DA Address...OK
Syncing...OK
Checksum Level is Storage
Connection : brom
Speed : HIGH-SPEED
Reading RAM Configuration...OK
Reading EMI Configuration...OK
CID : 9B0100593053323536008BC129624A31 [EMMC]
Initializing Storage...OK
Sending 2nd DA...OK
Initialize DA Extension...OK
Int. RAM : 0x0000000000070000 [448,00 KB]
Ext. RAM : 0x0000000100000000 [4,00 GB]
Flash ID : Y0S256
CID : 9B0100593053323536008BC129624A31
BOOT1 : 0x0000000000400000 [4,00 MB]
BOOT2 : 0x0000000000400000 [4,00 MB]
RPMB : 0x0000000001000000 [16,00 MB]
USERAREA : 0x0000003A3E000000 [232,97 GB]
Connected to High-Speed DA Port
Reading Partition Table...OK
Bootloader : LOCKED
Writing preloader [preloader.bin]...OK
Writing pgpt [pgpt.bin]...OK
Writing misc [misc.img]...OK
Writing para [para.bin]...OK
Writing oplusreserve1 [oplusreserve1.img]...OK
Writing oplusreserve2 [oplusreserve2.img]...OK
Writing oplusreserve3 [oplusreserve3.img]...OK
Writing oplus_custom [oplus_custom.img]...OK
Writing expdb [expdb.bin]...OK
Writing frp [frp.bin]...OK
Writing vbmeta_a [vbmeta_a.img]...OK
Writing vbmeta_system_a [vbmeta_system_a.img]...OK
Writing vbmeta_vendor_a [vbmeta_vendor_a.img]...OK
Writing vbmeta_b [vbmeta_b.img]...OK
Writing vbmeta_system_b [vbmeta_system_b.img]...OK
Writing vbmeta_vendor_b [vbmeta_vendor_b.img]...OK
Writing md_udc [md_udc.bin]...OK
Writing metadata [metadata.img]...OK
Writing nvcfg [nvcfg.img]...OK
Writing nvdata [nvdata.img]...OK
Writing persist [persist.img]...OK
Writing protect1 [protect1.img]...OK
Writing protect2 [protect2.img]...OK
Writing seccfg [seccfg.bin]...OK
Writing md1img_a [md1img_a.img]...OK
Writing spmfw_a [spmfw_a.img]...OK
Writing scp_a [scp_a.img]...OK
Writing sspm_a [sspm_a.img]...OK
Writing gz_a [gz_a.img]...OK
Writing lk_a [lk_a.img]...OK
Writing boot_a [boot_a.img]...OK
Writing vendor_boot_a [vendor_boot_a.img]...OK
Writing init_boot_a [init_boot_a.img]...OK
Writing dtbo_a [dtbo_a.img]...OK
Writing cdt_engineering_a [cdt_engineering_a.img]...OK
Writing tee_a [tee_a.img]...OK
Writing sec1 [sec1.bin]...OK
Writing proinfo [proinfo.bin]...OK
Writing boot_para [boot_para.bin]...OK
Writing nvram [nvram.img]...OK
Writing logo [logo.bin]...OK
Writing ocdt [ocdt.img]...OK
Writing splash_odm [splash_odm.img]...OK
Writing md1img_b [md1img_b.img]...OK
Writing spmfw_b [spmfw_b.img]...OK
Writing scp_b [scp_b.img]...OK
Writing sspm_b [sspm_b.img]...OK
Writing gz_b [gz_b.img]...OK
Writing lk_b [lk_b.img]...OK
Writing boot_b [boot_b.img]...OK
Writing vendor_boot_b [vendor_boot_b.img]...OK
Writing init_boot_b [init_boot_b.img]...OK
Writing dtbo_b [dtbo_b.img]...OK
Writing cdt_engineering_b [cdt_engineering_b.img]...OK
Writing tee_b [tee_b.img]...OK
Writing oplusreserve5 [oplusreserve5.img]...OK
Writing oplusreserve6 [oplusreserve6.img]...OK
Writing param [param.img]...OK
Writing super [super.img]...OK
Writing userdata [userdata.img]...OK
Writing otp [otp.img]...OK
Writing flashinfo [flashinfo.img]...OK
Operation Finished.
[UltimateMTK2 v1.0]
Log Saved : 202407896_1774553.log
 
  • Like
Reactions: contasion

GsmToto

Super Moderator
Jan 1, 2021
3,710
18,934
UK
Skype
gsmtoto
Sonork ID
100.1684601
USING PL_EXLOIT [OPPO V2]
Brand/Model : *Auto* / *Auto Detect*
Operation : Reset FRP
Waiting for Device...Found
Port : MediaTek PreLoader USB VCOM_V1632 (Android) (COM5)
Device Path : \\?\usb#vid_22d9&pid_0006#5&155d656&0&2#{86e0d1e0-8089-11d0-9ce4-08003e301f73}
Driver : MediaTek Inc., 3.0.1504.0 [usb2ser.sys]
Mode : PRELOADER
Hw ID : MT6765 [0766] Helio P35/G35
Details : 8A00,CA00,0000
Sec. Config : [SBA:True] [SLA:False] [DAA:True]
MEID : 703F169C020649E5743367ABEE8DD762
SoC ID[0] : B09DA3B135B941B34AF7DE8E6A3C95D8
SoC ID[1] : A1BADE1A9E7E93994695445F3E62C46F
HWID not supported by this Exploit! Select another Exploit.
Operation Finished.
[UltimateMTK2 v1.0]
 
  • Like
Reactions: contasion

GsmToto

Super Moderator
Jan 1, 2021
3,710
18,934
UK
Skype
gsmtoto
Sonork ID
100.1684601
Brand/Model : *Auto* / *Auto Detect*
Operation : Reset FRP
Waiting for Device...Found
Port : MediaTek PreLoader USB VCOM_V1632 (Android) (COM11)
Device Path : \\?\usb#vid_0e8d&pid_2000#5&1e6a4af9&0&2#{86e0d1e0-8089-11d0-9ce4-08003e301f73}
Driver : MediaTek Inc., 3.0.1504.0 [usb2ser.sys]
Mode : PRELOADER
Force Enter BROM...OK
Hw ID : MT6768 [0707] Helio P65/G85 k68v1
Details : 8A00,CA00,0000
Sec. Config : [SBA:True] [SLA:False] [DAA:True]
MEID : 73F83A737DAEFCECC92E4B939D5CC26F
SoC ID[0] : 84D93782FB30074AB3BD4E1F7B2A88FB
SoC ID[1] : 7592E58ECE2774F0E64B61DB0480246B
Running Exploit...Done
Downloading Preloader...OK
Saved as : preloader_s96818aa1.bin
Loading EMI Config from Preloader...OK
Sec. Config : [SBA:False] [SLA:False] [DAA:False]
Using Internal DA!
DA Security Patched
Sending 1st DA...OK
Jump DA Address...OK
Syncing...OK
Checksum Level is Storage
Connection : brom
Speed : HIGH-SPEED
Reading RAM Configuration...OK
Reading EMI Configuration...OK
CID : 15010044503644424200FE3DD3498A47 [EMMC]
Initializing Storage...OK
Sending 2nd DA...OK
Initialize DA Extension...OK
Int. RAM : 0x0000000000070000 [448.00 KB]
Ext. RAM : 0x0000000100000000 [4.00 GB]
Flash ID : DP6DBB
CID : 15010044503644424200FE3DD3498A47
BOOT1 : 0x0000000000400000 [4.00 MB]
BOOT2 : 0x0000000000400000 [4.00 MB]
RPMB : 0x0000000001000000 [16.00 MB]
USERAREA : 0x0000000E8F800000 [58.24 GB]
Connected to High-Speed DA Port
Reading Partition Table...OK
Bootloader : LOCKED
Resetting FRP...OK
Operation Finished.
[UltimateMTK2 v1.0]
Log Saved : 20240124_1944332.log
 

GsmToto

Super Moderator
Jan 1, 2021
3,710
18,934
UK
Skype
gsmtoto
Sonork ID
100.1684601
Brand/Model : *Auto* / *Auto Detect*
Operation : Reset FRP
Waiting for Device...Found
Port : MediaTek USB Port_V1632 (COM7)
Device Path : \\?\usb#vid_0e8d&pid_0003#6&24b900dc&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver : MediaTek Inc., 3.0.1504.0 [usb2ser.sys]
Mode : BROM
Hw ID : MT6761 [0717] Helio A20/P22/A22/A25/G25
Details : 8A00,CA01,0200
Sec. Config : [SBA:True] [SLA:False] [DAA:True]
MEID : 6F4000503466D3D8C40136974E8EA892
SoC ID[0] : BF26DD30373A1AF7E4F7223A43E113A8
SoC ID[1] : ED6C2ED327EF3ACBFCABE6B4AD92A116
Running Exploit...
Installing LibUsb Filter Driver...OKDone
Downloading Preloader...Failed!
Please select preloader!
Loading EMI Config from Preloader...OK
Sec. Config : [SBA:False] [SLA:False] [DAA:False]
Using Internal DA!
DA Security Patched
Sending 1st DA...OK
Jump DA Address...OK
Syncing...OK
Checksum Level is Storage
Connection : brom
Speed : HIGH-SPEED
Reading RAM Configuration...OK
Reading EMI Configuration...OK
CID : D601034133413536311244E0E92D3A13 [EMMC]
Initializing Storage...OK
Sending 2nd DA...OK
Initialize DA Extension...OK
Int. RAM : 0x0000000000039000 [228.00 KB]
Ext. RAM : 0x0000000100000000 [4.00 GB]
Flash ID : A3A561
CID : D601034133413536311244E0E92D3A13
BOOT1 : 0x0000000000400000 [4.00 MB]
BOOT2 : 0x0000000000400000 [4.00 MB]
RPMB : 0x0000000001000000 [16.00 MB]
USERAREA : 0x0000000E67800000 [57.62 GB]
Connected to High-Speed DA Port
Reading Partition Table...OK
Bootloader : LOCKED
Resetting FRP...OK
Operation Finished.
[UltimateMTK2 v1.0]
Log Saved : 20240126_1343211.log
 

GsmToto

Super Moderator
Jan 1, 2021
3,710
18,934
UK
Skype
gsmtoto
Sonork ID
100.1684601
Brand/Model : *Auto* / *Auto Detect*
Operation : Reset FRP
Waiting for Device...Found
Port : MediaTek PreLoader USB VCOM (Android) (COM7)
Device Path : \\?\usb#vid_0e8d&pid_2000#6&df2ee03&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver : MediaTek Inc., 3.0.1504.0 [usb2ser.sys]
Mode : PRELOADER
Force Enter BROM...OK
Hw ID : MT6833 [0989] Dimensity 700 5G k6833
Details : 8A00,CA00,0000
Sec. Config : [SBA:True] [SLA:False] [DAA:True]
MEID : F6A797CDA081AB4885CE8734366F8DC7
SoC ID[0] : 9AD35ABA365C1B77AF731CB10B3B39A2
SoC ID[1] : E411D773A7273519F97A853518E2E99B
Running Exploit...Done
Downloading Preloader...OK
Saved as : preloader_s96801aa2.bin
Loading EMI Config from Preloader...OK
Sec. Config : [SBA:False] [SLA:False] [DAA:False]
Using Internal DA!
DA Security Patched
Sending 1st DA...OK
Jump DA Address...OK
Syncing...OK
Checksum Level is Storage
Connection : brom
Speed : HIGH-SPEED
Reading RAM Configuration...OK
Reading EMI Configuration...OK
CID : 150100445636444242002DDFD0A73901 [EMMC]
Initializing Storage...OK
Sending 2nd DA...OK
Initialize DA Extension...OK
Int. RAM : 0x0000000000070000 [448,00 KB]
Ext. RAM : 0x0000000100000000 [4,00 GB]
Flash ID : DV6DBB
CID : 150100445636444242002DDFD0A73901
BOOT1 : 0x0000000000400000 [4,00 MB]
BOOT2 : 0x0000000000400000 [4,00 MB]
RPMB : 0x0000000001000000 [16,00 MB]
USERAREA : 0x0000001D1F000000 [116,48 GB]
Connected to High-Speed DA Port
Reading Partition Table...OK
And. Ver. : 12
Build Dt. : Thu Jun 30 03:02:51 KST 2022
Display ID : SP1A.210812.016.A226BRUBU3BVF7
Ver. Inc. : A226BRUBU3BVF7
Locale : en-GB
Patch : 2022-07-01
Bootloader : LOCKED
Resetting FRP...OK
Operation Finished.
[UltimateMTK2 v1.0]
Log Saved : 20240126_1666223.log
 

GsmToto

Super Moderator
Jan 1, 2021
3,710
18,934
UK
Skype
gsmtoto
Sonork ID
100.1684601
USING PL_EXLOIT [MOTO XT2331]
Brand/Model : Motorola / *Auto Detect*
Operation : Read Info
Waiting for Device...Found
Port : MediaTek PreLoader USB VCOM_V1632 (Android) (COM5)
Device Path : \\?\usb#vid_0e8d&pid_2000#5&1e4121f5&0&7#{86e0d1e0-8089-11d0-9ce4-08003e301f73}
Driver : MediaTek Inc., 3.0.1504.0 [usb2ser.sys]
Mode : PRELOADER
Hw ID : MT6768 [0707] Helio P65/G85 k68v1
Details : 8A00,CA00,0000
Sec. Config : [SBA:True] [SLA:False] [DAA:True]
MEID : 62191FAB92B31E87D2D20954B300680E
SoC ID[0] : 438FE8B79F42CCFE3E1E679FF2975F75
SoC ID[1] : 0622E6AB919AAB5D4C301FC6E4F3F501
Sending 1st DA..OK
Jump DA Address...OK
Syncing...OK
Checksum Level is Storage
Connection : preloader
Speed : HIGH-SPEED
Reading RAM Configuration...OK
Running PL_EXPLOIT [1]...Done
Sending 2nd DA...OK
Loading Extension...Done
Int. RAM : 0x0000000000070000 [448,00 KB]
Ext. RAM : 0x0000000100000000 [4,00 GB]
Flash ID : A3A562
CID : D6010341334135363211F48FB92D99ED
BOOT1 : 0x0000000000400000 [4,00 MB]
BOOT2 : 0x0000000000400000 [4,00 MB]
RPMB : 0x0000000001000000 [16,00 MB]
USERAREA : 0x0000001CCF000000 [115,23 GB]
Connected to High-Speed DA Port
Reading Partition Table...OK
Operation Finished.
[UltimateMTK2 v1.0]


Brand/Model : Motorola / *Auto Detect*
Operation : Read Scatter
Reading preloader...Done
Reading pgpt...Done
Reading misc...Done
Reading para...Done
Reading expdb...Done
Reading frp...Done
Reading hw...Done
Reading utags...Done
Reading utagsbackup...Done
Reading vbmeta_a...Done
Reading vbmeta_system_a...Done
Reading vbmeta_vendor_a...Done
Reading vbmeta_b...Done
Reading vbmeta_system_b...Done
Reading vbmeta_vendor_b...Done
Reading md_udc...Done
Reading metadata...Done
Reading nvcfg...Done
Reading nvdata...Done
Reading persist...Done
Reading protect1...Done
Reading protect2...Done
Reading seccfg...Done
Reading md1img_a...Done
Reading spmfw_a...Done
Reading scp_a...Done
Reading sspm_a...Done
Reading gz_a...Done
Reading lk_a...Done
Reading boot_a...Done
Reading vendor_boot_a...Done
Reading dtbo_a...Done
Reading tee_a...Done
Reading sec1...Done
Reading proinfo...Done
Reading boot_para...Done
Reading nvram...Done
Reading rfcal...Done
Reading cid...Done
Reading sp...Done
Reading elable...Done
Reading prodper...Done
Reading kpan...Done
Reading logs...Done
Reading carrier...Done
Reading pad5...Done
Reading pad4...Done
Reading pad1...Done
Reading pad0...Done
Reading kdebuginfo...Done
Reading logo...Done
Reading pad2...Done
Reading md1img_b...Done
Reading spmfw_b...Done
Reading scp_b...Done
Reading sspm_b...Done
Reading gz_b...Done
Reading lk_b...Done
Reading boot_b...Done
Reading vendor_boot_b...Done
Reading dtbo_b...Done
Reading tee_b...Done
Reading pad3...Done
Reading super...Done
Reading otp...Done
Reading flashinfo...Done
Scatter saved as C:\Users\bio hazard\Desktop\g13 yedek\MT6768_Anrdoid_scatter.txt
Operation Finished.
[UltimateMTK2 v1.0]
Log Saved : 20240126_277334.log
 

GsmToto

Super Moderator
Jan 1, 2021
3,710
18,934
UK
Skype
gsmtoto
Sonork ID
100.1684601
Brand/Model : *Auto* / *Auto Detect*
Operation : Reset FRP
Waiting for Device...Found
Port : MediaTek PreLoader USB VCOM_V1632 (Android) (COM11)
Device Path : \\?\usb#vid_22d9&pid_0006#5&151fc306&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver : MediaTek Inc., 3.0.1504.0 [usb2ser.sys]
Mode : PRELOADER
Force Enter BROM...OK
Hw ID : MT6768 [0707] Helio P65/G85 k68v1
Details : 8A00,CA00,0000
Sec. Config : [SBA:True] [SLA:False] [DAA:True]
MEID : 9B8DDD0B8F995FEFA3AB7FA0766D0590
SoC ID[0] : 4F7D41F07B10DC983F105E4935D31951
SoC ID[1] : C3EF385484AF70799952516E4E00DC8F
Running Exploit...
Installing LibUsb Filter Driver...OKDone
Downloading Preloader...OK
Saved as : preloader_k69v1_64_k419.bin
Loading EMI Config from Preloader...OK
Sec. Config : [SBA:False] [SLA:False] [DAA:False]
Using Internal DA!
DA Security Patched
Sending 1st DA...OK
Jump DA Address...OK
Syncing...OK
Checksum Level is Storage
Connection : brom
Speed : HIGH-SPEED
Reading RAM Configuration...OK
Reading EMI Configuration...OK
CID : 150100445554423432022913537F4A1B [EMMC]
Initializing Storage...OK
Sending 2nd DA...OK
Initialize DA Extension...OK
Int. RAM : 0x0000000000070000 [448.00 KB]
Ext. RAM : 0x0000000100000000 [4.00 GB]
Flash ID : DUTB42
CID : 150100445554423432022913537F4A1B
BOOT1 : 0x0000000000400000 [4.00 MB]
BOOT2 : 0x0000000000400000 [4.00 MB]
RPMB : 0x0000000001000000 [16.00 MB]
USERAREA : 0x0000001D1EC00000 [116.48 GB]
Connected to High-Speed DA Port
Reading Partition Table...OK
Bootloader : LOCKED
Resetting FRP...OK
Operation Finished.
[UltimateMTK2 v1.0]
Log Saved : 20240124_19883348.log
 
Top