Online
frp Oppo A55 cph 2325 cuenta google con umt
Brand/Model : *Auto* / *Auto Detect*
Operation : Reset FRP
Waiting for Device...Found
Port : MediaTek PreLoader USB VCOM_V1632 (Android) (COM5)
Device Path : \\?\usb#vid_22d9&pid_0006#5&390692d&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver : MediaTek Inc., 3.0.1504.0 [usb2ser.sys]
Mode : PRELOADER
Force Enter BROM...OK
Hw ID : MT6765 [0766] Helio P35/G35
Details : 8A00,CA00,0000
Sec. Config : [SBA:True] [SLA:False] [DAA:True]
MEID : 1469DDEFC20888F96EBF1594E052A574
SoC ID[0] : 0C8964A9043B906C8B1610B2C291FD0A
SoC ID[1] : B4ADBD3D571DD5A05240A9A76E8B84C4
Running Exploit...Done
Downloading Preloader...OK
Saved as : preloader_k65v1_64_bsp.bin
Loading EMI Config from Preloader...OK
Sec. Config : [SBA:False] [SLA:False] [DAA:False]
Using Internal DA!
DA Security Patched
Sending 1st DA...OK
Jump DA Address...OK
Syncing...OK
Checksum Level is Storage
Connection : brom
Speed : HIGH-SPEED
Reading RAM Configuration...OK
Reading EMI Configuration...OK
CID : 15010044503644424202DB5BCACEB8EB [EMMC]
Initializing Storage...OK
Sending 2nd DA...OK
Initialize DA Extension...OK
Int. RAM : 0x0000000000038000 [224.00 KB]
Ext. RAM : 0x0000000100000000 [4.00 GB]
Flash ID : DP6DBB
CID : 15010044503644424202DB5BCACEB8EB
BOOT1 : 0x0000000000400000 [4.00 MB]
BOOT2 : 0x0000000000400000 [4.00 MB]
RPMB : 0x0000000001000000 [16.00 MB]
USERAREA : 0x0000000E8F800000 [58.24 GB]
PRE EOL : NORMAL
Life. Est.A : 50%-60% LIFE TIME USED
Life. Est.B : 20%-30% LIFE TIME USED
Reading Partition Table...OK
Bootloader : LOCKED
Resetting FRP...OK
Operation Finished.
[UltimateMTK2 v1.1]
Log Saved : 20240225_152338.log
Brand/Model : *Auto* / *Auto Detect*
Operation : Reset FRP
Waiting for Device...Found
Port : MediaTek PreLoader USB VCOM_V1632 (Android) (COM5)
Device Path : \\?\usb#vid_22d9&pid_0006#5&390692d&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver : MediaTek Inc., 3.0.1504.0 [usb2ser.sys]
Mode : PRELOADER
Force Enter BROM...OK
Hw ID : MT6765 [0766] Helio P35/G35
Details : 8A00,CA00,0000
Sec. Config : [SBA:True] [SLA:False] [DAA:True]
MEID : 1469DDEFC20888F96EBF1594E052A574
SoC ID[0] : 0C8964A9043B906C8B1610B2C291FD0A
SoC ID[1] : B4ADBD3D571DD5A05240A9A76E8B84C4
Running Exploit...Done
Downloading Preloader...OK
Saved as : preloader_k65v1_64_bsp.bin
Loading EMI Config from Preloader...OK
Sec. Config : [SBA:False] [SLA:False] [DAA:False]
Using Internal DA!
DA Security Patched
Sending 1st DA...OK
Jump DA Address...OK
Syncing...OK
Checksum Level is Storage
Connection : brom
Speed : HIGH-SPEED
Reading RAM Configuration...OK
Reading EMI Configuration...OK
CID : 15010044503644424202DB5BCACEB8EB [EMMC]
Initializing Storage...OK
Sending 2nd DA...OK
Initialize DA Extension...OK
Int. RAM : 0x0000000000038000 [224.00 KB]
Ext. RAM : 0x0000000100000000 [4.00 GB]
Flash ID : DP6DBB
CID : 15010044503644424202DB5BCACEB8EB
BOOT1 : 0x0000000000400000 [4.00 MB]
BOOT2 : 0x0000000000400000 [4.00 MB]
RPMB : 0x0000000001000000 [16.00 MB]
USERAREA : 0x0000000E8F800000 [58.24 GB]
PRE EOL : NORMAL
Life. Est.A : 50%-60% LIFE TIME USED
Life. Est.B : 20%-30% LIFE TIME USED
Reading Partition Table...OK
Bootloader : LOCKED
Resetting FRP...OK
Operation Finished.
[UltimateMTK2 v1.1]
Log Saved : 20240225_152338.log