>>> Searching Mobile Com Port...
Get Mobile Port: COM27
>>> Driver Identifying name:
MediaTek PreLoader USB VCOM_V1632 (Android)
>>> Get Mobile Aleady...
CPU_NAME: MT6853
>>> Reading Mobile Hardware info...Success
HW_Inf: 8A00 SW_Inf: CA00
>>>>> downloading boot1 to device...
>>> Initializing Mobile Phone...
Success
>>>>> Selected Oppo 2023 Preloader exploit ....
>>>>> Boot1_Size: 0x00053318
>>>>> Calling Magic Key ,,,,,,
>>>> downloading boot2 to device...
>>>> Bypassing Preloader ...
>>>>> downloading0x00067ABC =====================Flash Type(UFS)==============
Flash Size: 0x0000001DCB000000 -> 122032M
Flash ID: 00350032006100300032006100640064
Flash Code: KM8V8001JM-B813>>> switch hight speed re,wr port...
>>> Searching Mobile Com Port...
Get Mobile Port: COM12
>>> Driver Identifying name:
MediaTek DA USB VCOM (Android)
Get Com Port is: COM12
>>> Driver name:
MediaTek DA USB VCOM (Android)
>>> Reading Mobile GPT data...Success
>>>>erasing frp...
Start Add : 0x0015E08000 Length: 0x0000100000
Operation Completed !!!
Tested Cpu
Oppo & Realme
MTK 6765
MTK 6885
MTK 6889
MTK 6853