Offline
cuenta google Realme C55 frp con nck
Código:
Realme C55 FRP Remove Done
[Reset FRP]
Waiting for device...Found
Port Info : MediaTek PreLoader USB VCOM_V1632 (Android) (COM115) [\\?\usb#vid_22d9&pid_0006#5&212ac8fc&0&3#{86e0d1e0-8089-11d0-9ce4-08003e301f73}]
: MediaTek Inc., 3.0.1504.0 [usb2ser.sys]
: PRELOADER PORT
CUST_DA : INT:OPPO V1
HW ID : MT6768 [0707] Helio P65/G85 k68v1
HW VER : 8A00,CA00,0000
Sec. Cfg : [SBA Active] [SLA Inactive] [DAA Active]
MEID : D63F5D9ADE46AC06D8F3A2F6B7984ED7
SoC ID[0] : BF6999D8DE8F9FBCD5F8DDF2F2950284
SoC ID[1] : F69FC67796E08C90B76D211E2D858666
Sending DA1...Done
Running DA1...Done
Waiting DA SYNC Signal...OK
Setting Checksum Level...Done [Storage]
Connection : preloader
Speed : high-speed
Running Exploit (Old)...Done
Sending DA2...OK
Activating DA Extension...Done
HRID : 9A16E0A6065A9D1B85AE0A02569FDEC2
SRAM : 0x0000000000070000 [448.00 KB]
DRAM : 0x0000000100000000 [4.00 GB]
EMMC ID : Y0S256
EMMC CID : 9B010059305332353600F1A857293A75
BOOT[1] : 0x0000000000400000 [4.00 MB]
BOOT[2] : 0x0000000000400000 [4.00 MB]
RPMB : 0x0000000001000000 [16.00 MB]
USERAREA : 0x0000003A3E000000 [232.97 GB]
Reading Parititon Info...OK
Reset FRP Data...Done
Process finished
[NCK MTK Exploit Tool v1.2]
LOG TXT : 20250107_202809.txt