Benjie97
TechnicianNCK Box Dongle Tool
Get this tool on GsmZone
FRP Reset — TCL 4188S — Log
Job: Erase Userdata + FRP
Mode: Brom security bypass
Connect Device in BROM Mode using VOL UP + DOWN and insert cable.
New device need TESTPOINT for BROM Mode.
Waiting for device...Found
Port Info : MediaTek USB Port (COM30) [\\?\usb#vid_0e8d&pid_0003#5&d975007&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}]
: MediaTek Inc., 3.0.1511.0 [usb2ser.sys]
: BROM PORT
Hw ID : MT6761 [0717] Helio A20/P22/A22/A25/G25
Details : 8A00,CA01,0200
Sec. Cfg : [SBA Active] [SLA Active] [DAA Active]
MEID : DFBF1687EEE71D55A23803AB962F7393
SoC ID[0] : 4F96CAF12031628BB95C157D3180F7F9
SoC ID[1] : 84B94FFCD7C255F1A04A067482694735
Executing Exploit...Done
Reading Preloader...OK
Saved as : preloader_jetta_vzw.bin
Loading EMI Config from Preloader...OK
Sec. Cfg : [SBA Inactive] [SLA Inactive] [DAA Inactive]
Sending DA1...OK
Running DA1...OK
Waiting DA SYNC Signal...OK
Setting Checksum Level...Done [Storage]
Connection : brom
Speed : HIGH-SPEED
Reading EMI Configuration...OK
EMMC CID : D6010341334135353112603D0AD119BF
Sending EMI Config...OK
Sending 2nd DA...OK
Activating DA Extension...OK
HRID : F55866B6BAC5112415708DE4CC4B1290
Int. RAM : 0x0000000000039000 [228 KB]
Ext. RAM : 0x00000000C0000000 [3 GB]
Flash ID : A3A551
CID : D6010341334135353112603D0AD119BF
BOOT1 : 0x0000000000400000 [4 MB]
BOOT2 : 0x0000000000400000 [4 MB]
RPMB : 0x0000000001000000 [16 MB]
USERAREA : 0x000000073A000000 [28.91 GB]
Reading Parititon Info...OK
Reading info
***************
[S]Manufacturer: TCL
[S]Brand: TCL
[S]Device: Jetta_VZW
[S]Model: 4188S
[S]Name: 4188S
[S]Build ID: SP1A.210812.016
[S]Android Version: 12
[S]SDK: 31
Security Data Not Found!
Formating Userdata...Done
Reset FRP Data...Done
Process finished
[NCK Online MTK Exploit Tool v0.3.3] 0 10
Comments
No comments yet