UMT Arrow [01-11-23] UMTv2/UMTPro UltimateMTK2 v0.9 - Samsung Security, Infinix MDM and more...

UMT Box

GsmToto

Super Moderator
Jan 1, 2021
3,763
19,110
UK
Skype
gsmtoto
Sonork ID
100.1684601
UMTv2 / UMT Pro
UltimateMTK2 v0.9
The Ultimate MediaTek Tool







What's New:


Added Preloader Exploit
(Beta)
- Vivo MT6789 (Helio G99)
- Tecno MT6983 (Dimensity 9000+)


Added Xiaomi Security Repair (New Method)
- Repair make using this method is permanent
- Bootloader must be unlocked
- You can hardreset your device without any issue after repair
- This method needs NVRAM to be intact, if not, you can write NVRAM backup from same model
- This method works only till MIUI 11 (as per our tests)
- If device hangs after repair, you can format or reset it


Added Oppo Security Repair (New Method)
- Bootloader must be unlocked
- We recommend using this method
- This method needs NVRAM to be intact, if not, you can write NVRAM backup from same model
- If device hangs after repair, you can format or reset it


Added Samsung Security Repair
- No need bootloader unlock
- Repair made using this method is permanent
- Should work on all Samsung 4G devices


Added Generic Security Repair
- No need bootloader unlock.
- Repair made using this method is permanent.
- Should work on all Generic 4G devices including Infinix/Tecno etc.


Added Infinix MDM Reset Function
- Account/ID/MDM related functions are moved in a single group.


Added User Agreement at startup
- You must agree to be able to use IMEI/Security related functions


Updated Samsung KG Remove Function


Updated Helio Protocol to eliminate GET_PACKET_LENGTH error


Improved overall Read/Write speed


Fixed Calculation Error while unlocking Bootloader


Fixed rare RPMB Read/Write Error


Fixed DA Error in Infinix 2023 function

- However, we recommend using PL Exploit instead of this


Fixed issue where CUST_PL was selected but DA was not selected by user.


Fixed issue on model selection



Added Update Information in log window on startup





Important Notes:

- You can flash device with both BROM and Preloader mode
- If default DA does not work, use own DA in custom DA
- Force BROM may not work on new security, use Test Point instead
- When using Test Point, you must select Preloader in PL (not needed when flashing)
- If you need to connect device in Preloader mode, you must select PRELOADER in connection settings, otherwise software will try to Crash Preloader (may not work on new security devices)
- You can test PRELOADER EXPLOIT on any device with DA from Vendor even if that DA does not allow Write or Erase.



Note : Some features are device/OS specific and may not work on all devices.




WARNING:

ESN / MEID / IMEI REPAIR IS INTENDED TO REPAIR ESN / MEID / IMEI TO ORIGINAL ONE WRITTEN ON PHONE BACK LABEL / BOX. WE DO NOT ENDORSE OR ENCOURAGE ESN / MEID / IMEI CHANGING. ITS ILLEGAL. USER IS SOLE RESPONSIBLE FOR ANY ILLEGAL ACTIVITY DONE WITH USE OF FEATURES PROVIDED IN OUR SOFTWARE, NOT LIMITED TO ESN / MEID / IMEI.

ANY USER USING OUR SOFTWARE FOR ILLEGAL PURPOSE WILL BE SOLE RESPONSIBLE FOR HIS ACTS.

WE CONDEMN USE OF OUR SOFTWARE FOR ANY ILLEGAL PURPOSE.





Download using Support Access or Mirrors



Official Website:
Ultimate Multi Tool
UMT Pro


Br,
UMT
 

ShahbazKhanXTM

Junior Member
Nov 20, 2020
3
1
Pakistan Rawalpindi
UMTv2 / UMT Pro
UltimateMTK2 v0.9
The Ultimate MediaTek Tool








What's New:


Added Preloader Exploit
(Beta)
- Vivo MT6789 (Helio G99)
- Tecno MT6983 (Dimensity 9000+)


Added Xiaomi Security Repair (New Method)
- Repair make using this method is permanent
- Bootloader must be unlocked
- You can hardreset your device without any issue after repair
- This method needs NVRAM to be intact, if not, you can write NVRAM backup from same model
- This method works only till MIUI 11 (as per our tests)
- If device hangs after repair, you can format or reset it


Added Oppo Security Repair (New Method)
- Bootloader must be unlocked
- We recommend using this method
- This method needs NVRAM to be intact, if not, you can write NVRAM backup from same model
- If device hangs after repair, you can format or reset it


Added Samsung Security Repair
- No need bootloader unlock
- Repair made using this method is permanent
- Should work on all Samsung 4G devices


Added Generic Security Repair
- No need bootloader unlock.
- Repair made using this method is permanent.
- Should work on all Generic 4G devices including Infinix/Tecno etc.


Added Infinix MDM Reset Function
- Account/ID/MDM related functions are moved in a single group.


Added User Agreement at startup
- You must agree to be able to use IMEI/Security related functions


Updated Samsung KG Remove Function


Updated Helio Protocol to eliminate GET_PACKET_LENGTH error


Improved overall Read/Write speed


Fixed Calculation Error while unlocking Bootloader


Fixed rare RPMB Read/Write Error


Fixed DA Error in Infinix 2023 function

- However, we recommend using PL Exploit instead of this


Fixed issue where CUST_PL was selected but DA was not selected by user.


Fixed issue on model selection



Added Update Information in log window on startup





Important Notes:

- You can flash device with both BROM and Preloader mode
- If default DA does not work, use own DA in custom DA
- Force BROM may not work on new security, use Test Point instead
- When using Test Point, you must select Preloader in PL (not needed when flashing)
- If you need to connect device in Preloader mode, you must select PRELOADER in connection settings, otherwise software will try to Crash Preloader (may not work on new security devices)
- You can test PRELOADER EXPLOIT on any device with DA from Vendor even if that DA does not allow Write or Erase.



Note : Some features are device/OS specific and may not work on all devices.




WARNING:

ESN / MEID / IMEI REPAIR IS INTENDED TO REPAIR ESN / MEID / IMEI TO ORIGINAL ONE WRITTEN ON PHONE BACK LABEL / BOX. WE DO NOT ENDORSE OR ENCOURAGE ESN / MEID / IMEI CHANGING. ITS ILLEGAL. USER IS SOLE RESPONSIBLE FOR ANY ILLEGAL ACTIVITY DONE WITH USE OF FEATURES PROVIDED IN OUR SOFTWARE, NOT LIMITED TO ESN / MEID / IMEI.

ANY USER USING OUR SOFTWARE FOR ILLEGAL PURPOSE WILL BE SOLE RESPONSIBLE FOR HIS ACTS.

WE CONDEMN USE OF OUR SOFTWARE FOR ANY ILLEGAL PURPOSE.





Download using Support Access or Mirrors



Official Website:
Ultimate Multi Tool
UMT Pro


Br,
UMT
Oppo A5s cph1909 No supported yet, after repair Null


Brand/Model : Oppo / A5s (CPH1909)
Operation : IMEI Repair (Oppo New Method)
Waiting for Device...Found
Port : MediaTek USB Port_V1633 (COM3)
Device Path : \\?\usb#vid_0e8d&pid_0003#5&6d49e1f&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver : MediaTek Inc., 3.0.1504.0 [usb2ser.sys]
Mode : BROM
Hw ID : MT6765 [0766] Helio P35/G35
Details : 8A00,CA00,0000
Sec. Config : [SBA:True] [SLA:False] [DAA:True]
MEID : 95F1C3465046E2E4FABFA846E865929F
SoC ID[0] : 8D3ECC2A243F135B82F2D9244F92F42A
SoC ID[1] : 8CFD062DDC4E4C1C5E341F58AE448271
Running Exploit...Done
Loading EMI Config from Preloader...OK
Sec. Config : [SBA:False] [SLA:False] [DAA:False]
Using Internal DA!
DA Security Patched
Sending 1st DA...OK
Jump DA Address...OK
Syncing...OK
Checksum Level is Storage
Connection : brom
Speed : HIGH-SPEED
Reading RAM Configuration...OK
Reading EMI Configuration...OK
CID : 150100524836344142050CE4685A6695 [EMMC]
Initializing Storage...OK
Sending 2nd DA...OK
Initialize DA Extension...OK
Int. RAM : 0x0000000000038000 [224.00 KB]
Ext. RAM : 0x0000000100000000 [4.00 GB]
Flash ID : RH64AB
CID : 150100524836344142050CE4685A6695
BOOT1 : 0x0000000000400000 [4.00 MB]
BOOT2 : 0x0000000000400000 [4.00 MB]
RPMB : 0x0000000000400000 [4.00 MB]
USERAREA : 0x0000000E8F800000 [58.24 GB]
Connected to High-Speed DA Port
Reading Partition Table...OK
Manuf. : OPPO
Platform : mt6765
And. Ver. : 8.1.0
Ven. Date : Fri Mar 19 19:45:31 CST 2021
Locale : en-US
Patch : 2021-04-05
Bootloader : UNLOCKED
Reading Data...OK
IMEI1 : 111111111111119
IMEI2 : 222222222222228
Preparing Data...OK
Repairing Security...OK
Fixing Network Data...Not Found!
Possibly already patched.
Operation Finished.
[UltimateMTK2 v0.9]
 
Last edited:

Ajeet tanty

Active Member
Sep 20, 2020
27
5
Assam
UMTv2 / UMT Pro
UltimateMTK2 v0.9
The Ultimate MediaTek Tool








What's New:


Added Preloader Exploit
(Beta)
- Vivo MT6789 (Helio G99)
- Tecno MT6983 (Dimensity 9000+)


Added Xiaomi Security Repair (New Method)
- Repair make using this method is permanent
- Bootloader must be unlocked
- You can hardreset your device without any issue after repair
- This method needs NVRAM to be intact, if not, you can write NVRAM backup from same model
- This method works only till MIUI 11 (as per our tests)
- If device hangs after repair, you can format or reset it


Added Oppo Security Repair (New Method)
- Bootloader must be unlocked
- We recommend using this method
- This method needs NVRAM to be intact, if not, you can write NVRAM backup from same model
- If device hangs after repair, you can format or reset it


Added Samsung Security Repair
- No need bootloader unlock
- Repair made using this method is permanent
- Should work on all Samsung 4G devices


Added Generic Security Repair
- No need bootloader unlock.
- Repair made using this method is permanent.
- Should work on all Generic 4G devices including Infinix/Tecno etc.


Added Infinix MDM Reset Function
- Account/ID/MDM related functions are moved in a single group.


Added User Agreement at startup
- You must agree to be able to use IMEI/Security related functions


Updated Samsung KG Remove Function


Updated Helio Protocol to eliminate GET_PACKET_LENGTH error


Improved overall Read/Write speed


Fixed Calculation Error while unlocking Bootloader


Fixed rare RPMB Read/Write Error


Fixed DA Error in Infinix 2023 function

- However, we recommend using PL Exploit instead of this


Fixed issue where CUST_PL was selected but DA was not selected by user.


Fixed issue on model selection



Added Update Information in log window on startup





Important Notes:

- You can flash device with both BROM and Preloader mode
- If default DA does not work, use own DA in custom DA
- Force BROM may not work on new security, use Test Point instead
- When using Test Point, you must select Preloader in PL (not needed when flashing)
- If you need to connect device in Preloader mode, you must select PRELOADER in connection settings, otherwise software will try to Crash Preloader (may not work on new security devices)
- You can test PRELOADER EXPLOIT on any device with DA from Vendor even if that DA does not allow Write or Erase.



Note : Some features are device/OS specific and may not work on all devices.




WARNING:

ESN / MEID / IMEI REPAIR IS INTENDED TO REPAIR ESN / MEID / IMEI TO ORIGINAL ONE WRITTEN ON PHONE BACK LABEL / BOX. WE DO NOT ENDORSE OR ENCOURAGE ESN / MEID / IMEI CHANGING. ITS ILLEGAL. USER IS SOLE RESPONSIBLE FOR ANY ILLEGAL ACTIVITY DONE WITH USE OF FEATURES PROVIDED IN OUR SOFTWARE, NOT LIMITED TO ESN / MEID / IMEI.

ANY USER USING OUR SOFTWARE FOR ILLEGAL PURPOSE WILL BE SOLE RESPONSIBLE FOR HIS ACTS.

WE CONDEMN USE OF OUR SOFTWARE FOR ANY ILLEGAL PURPOSE.





Download using Support Access or Mirrors



Official Website:
Ultimate Multi Tool
UMT Pro


Br,
UMT
Poco m4 pro after unlock #fix fastboot problem
 

GsmToto

Super Moderator
Jan 1, 2021
3,763
19,110
UK
Skype
gsmtoto
Sonork ID
100.1684601
Brand/Model : *Auto* / *Auto Detect*
Operation : IMEI Repair (Xiaomi Method-Redmi 10A (dandelion_c3l2))
Waiting for Device...Found
Port : MediaTek USB Port_V1632 (COM13)
Device Path : \\?\usb#vid_0e8d&pid_0003#6&10c694e1&0&2#{86e0d1e0-8089-11d0-9ce4-08003e301f73}
Driver : MediaTek Inc., 3.0.1504.0 [usb2ser.sys]
Mode : BROM
Hw ID : MT6765 [0766] Helio P35/G35
Details : 8A00,CA00,0000
Sec. Config : [SBA:True] [SLA:True] [DAA:True]
MEID : E0A9125D2236A67CD63F9CE86C70DCAA
SoC ID[0] : 1A6497DF9F08E6568535E2CE3AB6E38B
SoC ID[1] : ED10D15D743E4AC59F00877493208C3E
Running Exploit...Done
Downloading Preloader...OK
Saved as : preloader_k62v1_64_bsp.bin
Loading EMI Config from Preloader...OK
Sec. Config : [SBA:False] [SLA:False] [DAA:False]
Using Internal DA!
DA Security Patched
Sending 1st DA...OK
Jump DA Address...OK
Syncing...OK
Checksum Level is Storage
Connection : brom
Speed : HIGH-SPEED
Reading RAM Configuration...OK
Reading EMI Configuration...OK
CID : 150100434A544434520422464C9EC793 [EMMC]
Initializing Storage...OK
Sending 2nd DA...OK
Initialize DA Extension...OK
Int. RAM : 0x0000000000038000 [224,00 KB]
Ext. RAM : 0x0000000080000000 [2,00 GB]
Flash ID : CJTD4R
CID : 150100434A544434520422464C9EC793
BOOT1 : 0x0000000000400000 [4,00 MB]
BOOT2 : 0x0000000000400000 [4,00 MB]
RPMB : 0x0000000000400000 [4,00 MB]
USERAREA : 0x0000000E8F800000 [58,24 GB]
Connected to High-Speed DA Port
Reading Partition Table...OK
Manuf. : Xiaomi
Ven. Model : 220233L2G
Platform : mt6765
And. Ver. : 11
Build Dt. : Mon Oct 30 20:51:06 CST 2023
Display ID : RP1A.200720.011
Ver. Inc. : V12.5.14.0.RCZMIXM
Locale : en-GB
Mod. Dev. : dandelion_c3l2_global
Patch : 2023-11-01
Bootloader : UNLOCKED
Reading Data...OK
IMEI1 : 867504
IMEI2 : 867504
Fetching Data...OK
Writing Data...OK
Fixing Cert...OK
Disabling Signature Check..OK
Operation Finished.
[UltimateMTK2 v0.9]
Log Saved : 20231129_133606.log
 

GsmToto

Super Moderator
Jan 1, 2021
3,763
19,110
UK
Skype
gsmtoto
Sonork ID
100.1684601
Brand/Model : *Auto* / *Auto Detect*
Operation : Reset FRP
Waiting for Device...Found
Port : MediaTek PreLoader USB VCOM (Android) (COM7)
Device Path : \\?\usb#vid_0e8d&pid_2000#6&10c694e1&0&3#{86e0d1e0-8089-11d0-9ce4-08003e301f73}
Driver : MediaTek Inc., 3.0.1504.0 [usb2ser.sys]
Mode : PRELOADER
Force Enter BROM...OK
Hw ID : MT6765 [0766] Helio P35/G35
Details : 8A00,CA00,0000
Sec. Config : [SBA:True] [SLA:False] [DAA:True]
MEID : 32B248F6030B89A141D37C9790AC99E1
SoC ID[0] : 94E2C6E97B4D4A2FE1F9CDE3D57E735B
SoC ID[1] : E0C6043562746788960C2D5EDE72996A
Running Exploit...Done
Downloading Preloader...OK
Saved as : preloader_s96116ra1.bin
Loading EMI Config from Preloader...OK
Sec. Config : [SBA:False] [SLA:False] [DAA:False]
Using Internal DA!
DA Security Patched
Sending 1st DA...OK
Jump DA Address...OK
Syncing...OK
Checksum Level is Storage
Connection : brom
Speed : HIGH-SPEED
Reading RAM Configuration...OK
Reading EMI Configuration...OK
CID : 150100515836334D42003B8B07CE9711 [EMMC]
Initializing Storage...OK
Sending 2nd DA...OK
Initialize DA Extension...OK
Int. RAM : 0x0000000000038000 [224,00 KB]
Ext. RAM : 0x0000000080000000 [2,00 GB]
Flash ID : QX63MB
CID : 150100515836334D42003B8B07CE9711
BOOT1 : 0x0000000000400000 [4,00 MB]
BOOT2 : 0x0000000000400000 [4,00 MB]
RPMB : 0x0000000001000000 [16,00 MB]
USERAREA : 0x0000000747C00000 [29,12 GB]
Connected to High-Speed DA Port
Reading Partition Table...OK
Manuf. : samsung
Ven. Model : SM-A107M
Platform : mt6765
And. Ver. : 11
Build Dt. : Fri Sep 10 08:15:12 KST 2021
Display ID : RP1A.200720.012.A107MUBU5CUI1
Ver. Inc. : A107MUBU5CUI1
Locale : en-GB
Patch : 2021-09-01
Bootloader : LOCKED
Resetting FRP...OK
Operation Finished.
[UltimateMTK2 v0.9]
Log Saved : 20231205_112824.log
 

GsmToto

Super Moderator
Jan 1, 2021
3,763
19,110
UK
Skype
gsmtoto
Sonork ID
100.1684601
USING PL_EXLOIT [VIVO V3]
Brand/Model : *Auto* / *Auto Detect*
Operation : Reset FRP
Waiting for Device...Found
Port : MediaTek PreLoader USB VCOM_V1632 (Android) (COM11)
Device Path : \\?\usb#vid_0e8d&pid_2000#6&2e29fa0f&0&5#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver : MediaTek Inc., 3.0.1504.0 [usb2ser.sys]
Mode : PRELOADER
Hw ID : MT6765 [0766] Helio P35/G35
Details : 8A00,CA00,0000
Sec. Config : [SBA:True] [SLA:False] [DAA:True]
MEID : 255F1C54BEFD84310D04B078D5E506DD
SoC ID[0] : 6826D5130E93EB80946CE108E75C438E
SoC ID[1] : 758687527D710035635AA425621396DD
WARNING! DA Auth is Enabled! Only Special DA will work!
Sending 1st DA..OK
Jump DA Address...OK
Syncing...OK
Checksum Level is Storage
Connection : preloader
Speed : HIGH-SPEED
Reading RAM Configuration...OK
Sending 2nd DA...OK
Running PL_EXPLOIT [2]...Done
Int. RAM : 0x000000000003A000 [232.00 KB]
Ext. RAM : 0x0000000100000000 [4.00 GB]
Flash ID : DP6DAB
CID : 150100445036444142026DFABA2AA863
BOOT1 : 0x0000000000400000 [4.00 MB]
BOOT2 : 0x0000000000400000 [4.00 MB]
RPMB : 0x0000000001000000 [16.00 MB]
USERAREA : 0x0000000E8F800000 [58.24 GB]
Connected to High-Speed DA Port
Reading Partition Table...OK
Prod. Model : PD2139F_EX
And. Ver. : 12
Prod. Ver. : PD2139F_EX_A_6.25.5
Hw. Ver. : PD2139F_EXMA
Build Dt. : Fri Oct 20 16:40:07 CST 2023
Display ID : SP1A.210812.003 release-keys
Ver. Inc. : compiler10201643
Locale : en-US
Patch : 2023-10-01
Bootloader : LOCKED
Resetting FRP...OK
Operation Finished.
[UltimateMTK2 v0.9b]
Log Saved : 20231333_172147.log
 

GsmToto

Super Moderator
Jan 1, 2021
3,763
19,110
UK
Skype
gsmtoto
Sonork ID
100.1684601
Brand/Model : *Auto* / *Auto Detect*
Operation : Safe Format+FRP
Waiting for Device...Found
Port : MediaTek USB Port_V1632 (COM7)
Device Path : \\?\usb#vid_0e8d&pid_0003#6&10c694e1&0&2#{86e0d1e0-8089-11d0-9ce4-08003e301f73}
Driver : MediaTek Inc., 3.0.1504.0 [usb2ser.sys]
Mode : BROM
Hw ID : MT6761 [0717] Helio A20/P22/A22/A25/G25
Details : 8A00,CA01,0200
Sec. Config : [SBA:True] [SLA:False] [DAA:True]
MEID : F7A340D4A24994BEB668BC2BE756AE61
SoC ID[0] : C989B573EA8F80203EB2FE6598A8170A
SoC ID[1] : 1FF79D3B0BE5543E5CAA19226BC02F39
Running Exploit...Done
Downloading Preloader...OK
Saved as : preloader_kg5j_h6126.bin
Loading EMI Config from Preloader...OK
Sec. Config : [SBA:False] [SLA:False] [DAA:False]
Using Internal DA!
DA Security Patched
Sending 1st DA...OK
Jump DA Address...OK
Syncing...OK
Checksum Level is Storage
Connection : brom
Speed : HIGH-SPEED
Reading RAM Configuration...OK
Reading EMI Configuration...OK
CID : 150100435554413432051F53C03E68E1 [EMMC]
Initializing Storage...OK
Sending 2nd DA...OK
Initialize DA Extension...OK
Int. RAM : 0x0000000000039000 [228,00 KB]
Ext. RAM : 0x0000000080000000 [2,00 GB]
Flash ID : CUTA42
CID : 150100435554413432051F53C03E68E1
BOOT1 : 0x0000000000400000 [4,00 MB]
BOOT2 : 0x0000000000400000 [4,00 MB]
RPMB : 0x0000000001000000 [16,00 MB]
USERAREA : 0x0000000E8F800000 [58,24 GB]
Connected to High-Speed DA Port
Reading Partition Table...OK
Manuf. : TECNO MOBILE LIMITED
Ven. Model : TECNO KG5j
Platform : mt6761
Ven. Date : Tue Mar 8 10:06:28 CST 2022
Ver. Inc. : 220308V262
Bootloader : LOCKED
Formatting Userdata (Safe Mode)...OK
If phone stuck on recovery, try [Fix Recovery].
Resetting FRP...OK
Operation Finished.
[UltimateMTK2 v0.9]
Log Saved : 20231222_10997.log
 

GsmToto

Super Moderator
Jan 1, 2021
3,763
19,110
UK
Skype
gsmtoto
Sonork ID
100.1684601
USING PL_EXLOIT [VIVO]
Brand/Model : Vivo / *Auto Detect*
Operation : Format FS (Safe)
Waiting for Device...Found
Port : MediaTek PreLoader USB VCOM (Android) (COM4)
Device Path : \\?\usb#vid_0e8d&pid_2000#6&5dcb3f8&0&4#{86e0d1e0-8089-11d0-9ce4-08003e301f73}
Driver : MediaTek Inc., 2.0.1136.0 [USBSER.sys]
Mode : PRELOADER
Hw ID : MT6765 [0766] Helio P35/G35
Details : 8A00,CA00,0000
Sec. Config : [SBA:True] [SLA:False] [DAA:True]
MEID : 49EEFDBD18346014C52D87975DC6F155
SoC ID[0] : FC10F8A2139B22F0AC98BA08EC34D711
SoC ID[1] : 8D878A089BE0F5CF31631E600FBC93D1
WARNING! DA Auth is Enabled! Only Special DA will work!
Sending 1st DA..OK
Jump DA Address...OK
Syncing...OK
Checksum Level is Storage
Connection : preloader
Speed : HIGH-SPEED
Reading RAM Configuration...OK
Running PL_EXPLOIT...Done
Sending 2nd DA...OK
Loading Extension...Done
Int. RAM : 0x000000000003A000 [232.00 KB]
Ext. RAM : 0x0000000100000000 [4.00 GB]
Flash ID : RP64MB
CID : 150100525036344D4201EEC2E4ABB6D9
BOOT1 : 0x0000000000400000 [4.00 MB]
BOOT2 : 0x0000000000400000 [4.00 MB]
RPMB : 0x0000000001000000 [16.00 MB]
USERAREA : 0x0000000E8F800000 [58.24 GB]
Connected to High-Speed DA Port
Reading Partition Table...OK
Manuf. : vivo
Ven. Model : vivo 1901
Platform : mt6765
And. Ver. : 11
Build Dt. : Wed Mar 22 11:25:23 CST 2023
Display ID : RP1A.200720.012 release-keys
Ver. Inc. : eng.compil.20230322.112912
Locale : en-US
Patch : 2022-05-01
Bootloader : LOCKED
Formatting Userdata (Safe Mode)...OK
If phone stuck on recovery, try [Fix Recovery].
Operation Finished.
[UltimateMTK2 v0.9]
Log Saved : 20231226_171615.log
 

GsmToto

Super Moderator
Jan 1, 2021
3,763
19,110
UK
Skype
gsmtoto
Sonork ID
100.1684601
vivo y21s nov security successfully frp done
USING PL_EXLOIT [VIVO V3]
Brand/Model : *Auto* / *Auto Detect*
Operation : Reset FRP
Waiting for Device...Found
Port : MediaTek PreLoader USB VCOM_V1633 (Android) (COM23)
Device Path : \\?\usb#vid_0e8d&pid_2000#5&3364a3d5&0&3
#{86e0d1e0-8089-11d0-9ce4-08003e301f73}
Driver : MediaTek Inc., 3.0.1504.0 [usb2ser.sys]
Mode : PRELOADER
Hw ID : MT6768 [0707] Helio P65/G85 k68v1
Details : 8A00,CA00,0000
Sec. Config : [SBA:True] [SLA:False] [DAA:True]
MEID : 8AFDEAACD2119728C4B99C70BEB798FE
SoC ID[0] : 535062DA0FDFF38EAE792AF85661BCC6
SoC ID[1] : 72C0AF69EE2B35433D326E7FDAE11347
WARNING! DA Auth is Enabled! Only Special DA will work!
Sending 1st DA..OK
Jump DA Address...OK
Syncing...OK
Checksum Level is Storage
Connection : preloader
Speed : HIGH-SPEED
Reading RAM Configuration...OK
Sending 2nd DA...OK
Running PL_EXPLOIT [2]...Done
Int. RAM : 0x0000000000070000 [448.00 KB]
Ext. RAM : 0x0000000100000000 [4.00 GB]
Flash ID : DP6DBB
CID : 150100445036444242022363C0312997
BOOT1 : 0x0000000000400000 [4.00 MB]
BOOT2 : 0x0000000000400000 [4.00 MB]
RPMB : 0x0000000001000000 [16.00 MB]
USERAREA : 0x0000000E8F800000 [58.24 GB]
Connected to High-Speed DA Port
Reading Partition Table...OK
Manuf. : vivo
Ven. Model : V2110
Prod. Model : PD2138F_EX
Platform : mt6768
And. Ver. : 13
Prod. Ver. : PD2138F_EX_A_38.21.1
Hw. Ver. : PD2138F_EXMA
Build Dt. : Mon Nov 6 11:54:45 CST 2023
Display ID : TP1A.220624.014 release-keys
Ver. Inc. : eng.compil.20231106.115851
Locale : en-US
Patch : 2023-11-01
Bootloader : LOCKED
Resetting FRP...OK
Operation Finished.
[UltimateMTK2 v0.9b]
Log Saved : 20231228_12233.log
 

GsmToto

Super Moderator
Jan 1, 2021
3,763
19,110
UK
Skype
gsmtoto
Sonork ID
100.1684601
USING PL_EXLOIT [VIVO V3]
Brand/Model : *Auto* / *Auto Detect*
Operation : Reset FRP
Waiting for Device...Found
Port : MediaTek PreLoader USB VCOM_V1633 (Android) (COM33)
Device Path : \\?\usb#vid_0e8d&pid_2000#5&3364a3d5&0&3
#{86e0d1e0-8089-11d0-9ce4-08003e301f73}
Driver : MediaTek Inc., 3.0.1504.0 [usb2ser.sys]
Mode : PRELOADER
Hw ID : MT6768 [0707] Helio P65/G85 k68v1
Details : 8A00,CA00,0000
Sec. Config : [SBA:True] [SLA:False] [DAA:True]
MEID : 8AFDEAACD2119728C4B99C70BEB798FE
SoC ID[0] : 535062DA0FDFF38EAE792AF85661BCC6
SoC ID[1] : 72C0AF69EE2B35433D326E7FDAE11347
WARNING! DA Auth is Enabled! Only Special DA will work!
Sending 1st DA..OK
Jump DA Address...OK
Syncing...OK
Checksum Level is Storage
Connection : preloader
Speed : HIGH-SPEED
Reading RAM Configuration...OK
Sending 2nd DA...OK
Running PL_EXPLOIT [2]...Done
Int. RAM : 0x0000000000070000 [448.00 KB]
Ext. RAM : 0x0000000100000000 [4.00 GB]
Flash ID : DP6DBB
CID : 150100445036444242022363C0312997
BOOT1 : 0x0000000000400000 [4.00 MB]
BOOT2 : 0x0000000000400000 [4.00 MB]
RPMB : 0x0000000001000000 [16.00 MB]
USERAREA : 0x0000000E8F800000 [58.24 GB]
Connected to High-Speed DA Port
Reading Partition Table...OK
Manuf. : vivo
Ven. Model : V2110
Prod. Model : PD2138F_EX
Platform : mt6768
And. Ver. : 13
Prod. Ver. : PD2138F_EX_A_38.21.1
Hw. Ver. : PD2138F_EXMA
Build Dt. : Mon Nov 6 11:54:45 CST 2023
Display ID : TP1A.220624.014 release-keys
Ver. Inc. : eng.compil.20231106.115851
Locale : en-US
Patch : 2023-11-01
Bootloader : LOCKED
Resetting FRP...OK
Operation Finished.
[UltimateMTK2 v0.9b]
Log Saved : 20231228_1441122.log
 

GsmToto

Super Moderator
Jan 1, 2021
3,763
19,110
UK
Skype
gsmtoto
Sonork ID
100.1684601
Brand/Model : *Auto* / *Auto Detect*
Operation : Reset FRP
Waiting for Device...Found
Port : MediaTek PreLoader USB VCOM_V1632 (Android) (COM11)
Device Path : \\?\usb#vid_22d9&pid_0006#5&1e6a4af9&0&2#{86e0d1e0-8089-11d0-9ce4-08003e301f73}
Driver : MediaTek Inc., 3.0.1504.0 [usb2ser.sys]
Mode : PRELOADER
Force Enter BROM...OK
Hw ID : MT6768 [0707] Helio P65/G85 k68v1
Details : 8A00,CA00,0000
Sec. Config : [SBA:True] [SLA:False] [DAA:True]
MEID : 9EA61CF5244BA7C9EB71BAA347FD4D22
SoC ID[0] : 1F295F45A6FDA98D27D56CB46B1BD221
SoC ID[1] : 71EF449F9114CE8879BE2927D4E1F233
Running Exploit...Done
Downloading Preloader...OK
Saved as : preloader_k69v1_64_k419.bin
Loading EMI Config from Preloader...OK
Sec. Config : [SBA:False] [SLA:False] [DAA:False]
Using Internal DA!
DA Security Patched
Sending 1st DA...OK
Jump DA Address...OK
Syncing...OK
Checksum Level is Storage
Connection : brom
Speed : HIGH-SPEED
Reading RAM Configuration...OK
Reading EMI Configuration...OK
CID : 15010044555442343202B7FEE8BD8A91 [EMMC]
Initializing Storage...OK
Sending 2nd DA...OK
Initialize DA Extension...OK
Int. RAM : 0x0000000000070000 [448.00 KB]
Ext. RAM : 0x0000000100000000 [4.00 GB]
Flash ID : DUTB42
CID : 15010044555442343202B7FEE8BD8A91
BOOT1 : 0x0000000000400000 [4.00 MB]
BOOT2 : 0x0000000000400000 [4.00 MB]
RPMB : 0x0000000001000000 [16.00 MB]
USERAREA : 0x0000001D1EC00000 [116.48 GB]
Connected to High-Speed DA Port
Reading Partition Table...OK
Bootloader : LOCKED
Resetting FRP...OK
Operation Finished.
[UltimateMTK2 v0.9]
Log Saved : 20240104_0772321.log
 
  • Like
Reactions: cxara
May 16, 2020
11
1
Eygpt
Brand/Model : *Auto* / *Auto Detect*
Operation : Reset FRP
Waiting for Device...Found
Port : MediaTek PreLoader USB VCOM_V1632 (Android) (COM11)
Device Path : \\?\usb#vid_22d9&pid_0006#5&1e6a4af9&0&2#{86e0d1e0-8089-11d0-9ce4-08003e301f73}
Driver : MediaTek Inc., 3.0.1504.0 [usb2ser.sys]
Mode : PRELOADER
Force Enter BROM...OK
Hw ID : MT6768 [0707] Helio P65/G85 k68v1
Details : 8A00,CA00,0000
Sec. Config : [SBA:True] [SLA:False] [DAA:True]
MEID : 9EA61CF5244BA7C9EB71BAA347FD4D22
SoC ID[0] : 1F295F45A6FDA98D27D56CB46B1BD221
SoC ID[1] : 71EF449F9114CE8879BE2927D4E1F233
Running Exploit...Done
Downloading Preloader...OK
Saved as : preloader_k69v1_64_k419.bin
Loading EMI Config from Preloader...OK
Sec. Config : [SBA:False] [SLA:False] [DAA:False]
Using Internal DA!
DA Security Patched
Sending 1st DA...OK
Jump DA Address...OK
Syncing...OK
Checksum Level is Storage
Connection : brom
Speed : HIGH-SPEED
Reading RAM Configuration...OK
Reading EMI Configuration...OK
CID : 15010044555442343202B7FEE8BD8A91 [EMMC]
Initializing Storage...OK
Sending 2nd DA...OK
Initialize DA Extension...OK
Int. RAM : 0x0000000000070000 [448.00 KB]
Ext. RAM : 0x0000000100000000 [4.00 GB]
Flash ID : DUTB42
CID : 15010044555442343202B7FEE8BD8A91
BOOT1 : 0x0000000000400000 [4.00 MB]
BOOT2 : 0x0000000000400000 [4.00 MB]
RPMB : 0x0000000001000000 [16.00 MB]
USERAREA : 0x0000001D1EC00000 [116.48 GB]
Connected to High-Speed DA Port
Reading Partition Table...OK
Bootloader : LOCKED
Resetting FRP...OK
Operation Finished.
[UltimateMTK2 v0.9]
Log Saved : 20240104_0772321.log
USING PL_EXLOIT [VIVO V3]
Brand/Model : *Auto* / *Auto Detect*
Operation : Reset FRP
Waiting for Device...Found
Port : MediaTek PreLoader USB VCOM_V1633 (Android) (COM33)
Device Path : \\?\usb#vid_0e8d&pid_2000#5&3364a3d5&0&3
#{86e0d1e0-8089-11d0-9ce4-08003e301f73}
Driver : MediaTek Inc., 3.0.1504.0 [usb2ser.sys]
Mode : PRELOADER
Hw ID : MT6768 [0707] Helio P65/G85 k68v1
Details : 8A00,CA00,0000
Sec. Config : [SBA:True] [SLA:False] [DAA:True]
MEID : 8AFDEAACD2119728C4B99C70BEB798FE
SoC ID[0] : 535062DA0FDFF38EAE792AF85661BCC6
SoC ID[1] : 72C0AF69EE2B35433D326E7FDAE11347
WARNING! DA Auth is Enabled! Only Special DA will work!
Sending 1st DA..OK
Jump DA Address...OK
Syncing...OK
Checksum Level is Storage
Connection : preloader
Speed : HIGH-SPEED
Reading RAM Configuration...OK
Sending 2nd DA...OK
Running PL_EXPLOIT [2]...Done
Int. RAM : 0x0000000000070000 [448.00 KB]
Ext. RAM : 0x0000000100000000 [4.00 GB]
Flash ID : DP6DBB
CID : 150100445036444242022363C0312997
BOOT1 : 0x0000000000400000 [4.00 MB]
BOOT2 : 0x0000000000400000 [4.00 MB]
RPMB : 0x0000000001000000 [16.00 MB]
USERAREA : 0x0000000E8F800000 [58.24 GB]
Connected to High-Speed DA Port
Reading Partition Table...OK
Manuf. : vivo
Ven. Model : V2110
Prod. Model : PD2138F_EX
Platform : mt6768
And. Ver. : 13
Prod. Ver. : PD2138F_EX_A_38.21.1
Hw. Ver. : PD2138F_EXMA
Build Dt. : Mon Nov 6 11:54:45 CST 2023
Display ID : TP1A.220624.014 release-keys
Ver. Inc. : eng.compil.20231106.115851
Locale : en-US
Patch : 2023-11-01
Bootloader : LOCKED
Resetting FRP...OK
Operation Finished.
[UltimateMTK2 v0.9b]
Log Saved : 20231228_1441122.log
pro i need this ver how can i download it ?
 
Top