Online
cuenta google oppo A18 frp con nck
oppo A18 FRP remove done
[Reset FRP]
Waiting for device...Found
Port Info : MediaTek PreLoader USB VCOM_V1632 (Android) (COM54) [\\?\usb#vid_22d9&pid_0006#5&212ac8fc&0&4#{86e0d1e0-8089-11d0-9ce4-08003e301f73}]
: MediaTek Inc., 3.0.1504.0 [usb2ser.sys]
: PRELOADER PORT
CUST_DA : INT:OPPO V1
HW ID : MT6768 [0707] Helio P65/G85 k68v1
HW VER : 8A00,CA00,0000
Sec. Cfg : [SBA Active] [SLA Inactive] [DAA Active]
MEID : 3E99D8A0216C0FA7D59578BC7E9DB027
SoC ID[0] : 8298A9A3B487A8FB1E730C86993DF535
SoC ID[1] : A02C79AA342D445C41C58685750C9969
Sending DA1...Done
Running DA1...Done
Waiting DA SYNC Signal...OK
Setting Checksum Level...Done [Storage]
Connection : preloader
Speed : high-speed
Running Exploit (Old)...Done
Sending DA2...OK
Activating DA Extension...Done
HRID : 65846F887DABD7D0D4A46583C985475D
SRAM : 0x0000000000070000 [448.00 KB]
DRAM : 0x0000000100000000 [4.00 GB]
EMMC ID : DUTB42
EMMC CID : 15010044555442343202F37DF4208AB5
BOOT[1] : 0x0000000000400000 [4.00 MB]
BOOT[2] : 0x0000000000400000 [4.00 MB]
RPMB : 0x0000000001000000 [16.00 MB]
USERAREA : 0x0000001D1EC00000 [116.48 GB]
Reading Parititon Info...OK
Reset FRP Data...Done
Process finished
[NCK MTK Exploit Tool v1.2]
LOG TXT : 20241129_185626.txt