Offline
cuenta google oppo a1k frp con nck
oppo a1k frp done
[Reset FRP]
Waiting for device...Found
Port Info : MediaTek USB Port_V1632 (COM7) [\\?\usb#vid_0e8d&pid_0003#5&212ac8fc&0&7#{86e0d1e0-8089-11d0-9ce4-08003e301f73}]
: MediaTek Inc., 3.0.1504.0 [usb2ser.sys]
: BROM PORT
Hw ID : MT6765 [0766] Helio P35/G35
Details : 8A00,CA00,0000
Sec. Cfg : [SBA Active] [SLA Inactive] [DAA Active]
MEID : 1C3FD18FBC0341CDE5B7528F792F378E
SoC ID[0] : A945692EFC023825D23D4721AB178905
SoC ID[1] : DA2663FC9A1AF240592FFAC2E1B6B41D
Executing Exploit...Done
Reading Preloader...OK
Saved as : preloader_oppo6762_18540.bin
Loading EMI Config from Preloader...OK
Sec. Cfg : [SBA Inactive] [SLA Inactive] [DAA Inactive]
Sending DA1...OK
Running DA1...OK
Waiting DA SYNC Signal...OK
Setting Checksum Level...Done [Storage]
Connection : brom
Speed : HIGH-SPEED
Reading EMI Configuration...OK
EMMC CID : 150100515836334142093CBFD0DB57AF
Sending EMI Config...OK
Sending 2nd DA...OK
Activating DA Extension...OK
Int. RAM : 0x0000000000038000 [224.00 KB]
Ext. RAM : 0x0000000080000000 [2.00 GB]
Flash ID : QX63AB
CID : 150100515836334142093CBFD0DB57AF
BOOT1 : 0x0000000000400000 [4.00 MB]
BOOT2 : 0x0000000000400000 [4.00 MB]
RPMB : 0x0000000000400000 [4.00 MB]
USERAREA : 0x0000000747C00000 [29.12 GB]
Reading Parititon Info...OK
Manufacturer : OPPO
And. Ver. : 9
Locale : en-US
Patch : 2021-05-05
Reset FRP Data...Done
Process finished
[NCK MTK Exploit Tool v1.0]
LOG TXT : 20241029_205651.txt