Offline
FRP Redmi A3 android 15 (patch: 02/2025) Cuenta Google con Nck
Código:
FRP Redmi A3 android 15 (patch: 02/2025) done!
Job: Reset FRP
Exploit: XIAOMI
Mode : blue_V816.0.X.bin
Expected connection: PRELOADER
Connect USB Cable to turned off device without pressing any key.
Waiting for device...Found
Port Info : MediaTek PreLoader USB VCOM (Android) (COM9) [\\?\usb#vid_0e8d&pid_2000#5&1ab8cf4a&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}]
: MediaTek Inc., 3.0.1512.0 [usb2ser.sys]
: PRELOADER PORT
Helio Boot PL Xiaomi Exploit
HW ID : MT6765 [0766] Helio P35/G35
HW VER : 8A00,CA00,0000
Sec. Cfg : [SBA Active] [SLA Active] [DAA Active]
MEID : 14E418876919D6AB513F133BD9DADD06
SoC ID[0] : 30448F4561925A7C0A305E269286923B
SoC ID[1] : F3C615F8F021B4C22FC2DF65F3416007
Sending DA1...Done
Running DA1...Done
Waiting DA SYNC Signal...OK
Setting Checksum Level...Done [Storage]
Connection : preloader
Speed : high-speed
Sending DA2...OK
Authenticating 2nd DA([1]XIAOMI_HyperOS)
HRID : 361B8B972821785016AAAC547858C8CB
SRAM : 0x000000000003A000 [232,00 KB]
DRAM : 0x00000000C0000000 [3,00 GB]
EMMC ID : Y0S064
EMMC CID : 9B010059305330363400D26C4DD6BA29
BOOT[1] : 0x0000000000400000 [4,00 MB]
BOOT[2] : 0x0000000000400000 [4,00 MB]
RPMB : 0x0000000001000000 [16,00 MB]
USERAREA : 0x0000000E90000000 [58,25 GB]
Reading Parititon Info...OK
SuperPartList: product_a begin: 0x3A100000
SuperPartList: system_a begin: 0xA8200000
SuperPartList: system_ext_a begin: 0x101200000
SuperPartList: vendor_a begin: 0x11D900000
SuperPartList: product_a-cow begin: 0xFA633000
IMEI 1: 866XXXXXXXXXXXX
IMEI 2: 866XXXXXXXXXXXX
Reset FRP Data...Done
If FRP remain on Phone, Then Try Reset FRP 2025
Process finished
[NCK Online MTK Exploit Tool v0.3.2]
LOG TXT : 20250907_121041.txt