Offline
cuenta google Oppo A5s frp con nck
Código:
Oppo A5s FRP Remove Done
[Reset FRP]
Waiting for device...Found
Port Info : MediaTek USB Port_V1632 (COM79) [\\?\usb#vid_0e8d&pid_0003#5&212ac8fc&0&3#{86e0d1e0-8089-11d0-9ce4-08003e301f73}]
: MediaTek Inc., 3.0.1504.0 [usb2ser.sys]
: BROM PORT
Hw ID : MT6765 [0766] Helio P35/G35
Details : 8A00,CA00,0000
Sec. Cfg : [SBA Active] [SLA Inactive] [DAA Active]
MEID : C5D70199D7986821FD3310CFB35623F7
SoC ID[0] : 7C95F8BE341FFDDB2FBD30006BBF3A04
SoC ID[1] : 5AA3FEF356B046789798B5FFEAEE3355
Executing Exploit...Done
Reading Preloader...OK
Saved as : preloader_oppo6765_18511.bin
Loading EMI Config from Preloader...OK
Sec. Cfg : [SBA Inactive] [SLA Inactive] [DAA Inactive]
Sending DA1...OK
Running DA1...OK
Waiting DA SYNC Signal...OK
Setting Checksum Level...Done [Storage]
Connection : brom
Speed : HIGH-SPEED
Reading EMI Configuration...OK
EMMC CID : 90014A68423861503E0363B3CEC39657
Sending EMI Config...OK
Sending 2nd DA...OK
Activating DA Extension...OK
HRID : C1E0873338736A28A47CD6409D2761DC
Int. RAM : 0x0000000000038000 [224.00 KB]
Ext. RAM : 0x00000000C0000000 [3.00 GB]
Flash ID : hB8aP>
CID : 90014A68423861503E0363B3CEC39657
BOOT1 : 0x0000000000400000 [4.00 MB]
BOOT2 : 0x0000000000400000 [4.00 MB]
RPMB : 0x0000000001000000 [16.00 MB]
USERAREA : 0x0000000747C00000 [29.12 GB]
Reading Parititon Info...OK
Manufacturer : OPPO
And. Ver. : 8.1.0
Locale : en-US
Patch : 2021-04-05
Reset FRP Data...Done
Process finished
[NCK MTK Exploit Tool v1.2]
LOG TXT : 20250108_122350.txt