- Oct 16, 2019
- 4
- 1
Job: Reset FRP Exploit: INFINIX V4 Expected connection: PRELOADER Connect USB Cable to turned off device without pressing any key. Waiting for device...Found Port Info : MediaTek PreLoader USB VCOM (Android) (COM9) [\\?\usb#vid_0e8d&pid_2000#6&186afa3&0&3#{f9f3ff14-ae21-48a0-8a25-8011a7a931d9}] : MediaTek Inc., 3.0.1504.0 [usb2ser.sys] : PRELOADER PORT Helio Boot PL Xiaomi Exploit HW ID : MT6761 [0717] Helio A20/P22/A22/A25/G25 HW VER : 8A00,CA01,0200 Sec. Cfg : [SBA Active] [SLA Inactive] [DAA Active] MEID :bc1qnmz2l8lr0yzj9eun48dyds7rlzg6t6hk5vw5ztSoC ID[0] : 758CA56E3469AC3E68162584E295D19D SoC ID[1] : 5118500E635C7281D10995262910B1D1 Sending DA1...Done Running DA1...Done Waiting DA SYNC Signal...OK Setting Checksum Level...Done [Storage] Connection : preloader Speed : high-speed Sending DA2...OK Authenticating 2nd DA([1]XIAOMI_HyperOS) HRID : FFD68B841CE32146A7D0796BC2A6E325 SRAM : 0x000000000003A600 [233.50 KB] DRAM : 0x00000000C0000000 [3.00 GB] EMMC ID : MMC32G EMMC CID : D62D004D4D433332475101874EF75AE5 BOOT[1] : 0x0000000000400000 [4.00 MB] BOOT[2] : 0x0000000000400000 [4.00 MB] RPMB : 0x0000000000400000 [4.00 MB] USERAREA : 0x0000000747C00000 [29.12 GB] Reading Parititon Info...OK SuperPartList: product_a begin: 0x34100000 SuperPartList: system_a begin: 0xD0E00000 SuperPartList: system_ext_a begin: 0x116900000 SuperPartList: vendor_a begin: 0x17DC00000 SuperPartList: product_a-cow begin: 0x19C639000 Brand : TECNO Manufacturer : TECNO Name : TSSI Cpu Abi : arm64-v8a And. Ver. : 12 Security Patch : 2023-11-05 Build Dt. : Tue Nov 14 18:45:57 CST 2023 Display ID : TECNO-S-64-231114V1096 Ver. Inc. : 231114V1900 Locale : en-US Patch : 2023-11-05 IMEI 1: 351714230758444 IMEI 2: 351714230758451 Reset FRP Data...Done If FRP remain on Phone, Then Try Reset FRP 2025 Process finished [Avengers MTK Exploit Tool v2.3] LOG TXT : 20260101_124750.txt

