Online
Redmi A3 android 14 FRP New Sec. Success via NCK v1.5
Redmi A3 android 14 FRP New Sec. Success via NCK v1.5
[Erase UD + FRP]
Connect USB Calble to turned off device without pressing any key.
Some device may need you to hold VOL UP/DOWN while connecting.
Waiting for device...Found
Port Info : MediaTek PreLoader USB VCOM_V2023 (Android) (COM30) [\\?\usb#vid_0e8d&pid_2000#5&28023838&0&3#{86e0d1e0-8089-11d0-9ce4-08003e301f73}]
: MediaTek Inc., 3.0.1512.0 [usb2ser_mtk.sys]
: PRELOADER PORT
HW ID : MT6765 [0766] Helio P35/G35
HW VER : 8A00,CA00,0000
Sec. Cfg : [SBA Active] [SLA Active] [DAA Active]
MEID : ADF2FA4956B080BA7BDA8DA29F08A35A
SoC ID[0] : 34DAD80E1EC761937609C5C4DD0228CA
SoC ID[1] : EB18319A158A080CBF32496A8EC030C9
Sending DA1...Done
Running DA1...Done
Waiting DA SYNC Signal...OK
Setting Checksum Level...Done [Storage]
Connection : preloader
Speed : high-speed
Sending DA2...OK
HRID : 7D90F9645030A69E1B5E3BD3CF648147
SRAM : 0x000000000003A000 [232.00 KB]
DRAM : 0x0000000100000000 [4.00 GB]
EMMC ID : C09F00
EMMC CID : D62D00433039463030510E2A5D736B3F
BOOT[1] : 0x0000000000400000 [4.00 MB]
BOOT[2] : 0x0000000000400000 [4.00 MB]
RPMB : 0x0000000000400000 [4.00 MB]
USERAREA : 0x0000001D25D80000 [116.59 GB]
Reading Parititon Info...OK
Formating Userdata...Done
Reset FRP Data...Done
Process finished
[NCK MTK Exploit Tool v1.5]
LOG TXT : 20250310_193733.txt
Redmi A3 android 14 FRP New Sec. Success via NCK v1.5
[Erase UD + FRP]
Connect USB Calble to turned off device without pressing any key.
Some device may need you to hold VOL UP/DOWN while connecting.
Waiting for device...Found
Port Info : MediaTek PreLoader USB VCOM_V2023 (Android) (COM30) [\\?\usb#vid_0e8d&pid_2000#5&28023838&0&3#{86e0d1e0-8089-11d0-9ce4-08003e301f73}]
: MediaTek Inc., 3.0.1512.0 [usb2ser_mtk.sys]
: PRELOADER PORT
HW ID : MT6765 [0766] Helio P35/G35
HW VER : 8A00,CA00,0000
Sec. Cfg : [SBA Active] [SLA Active] [DAA Active]
MEID : ADF2FA4956B080BA7BDA8DA29F08A35A
SoC ID[0] : 34DAD80E1EC761937609C5C4DD0228CA
SoC ID[1] : EB18319A158A080CBF32496A8EC030C9
Sending DA1...Done
Running DA1...Done
Waiting DA SYNC Signal...OK
Setting Checksum Level...Done [Storage]
Connection : preloader
Speed : high-speed
Sending DA2...OK
HRID : 7D90F9645030A69E1B5E3BD3CF648147
SRAM : 0x000000000003A000 [232.00 KB]
DRAM : 0x0000000100000000 [4.00 GB]
EMMC ID : C09F00
EMMC CID : D62D00433039463030510E2A5D736B3F
BOOT[1] : 0x0000000000400000 [4.00 MB]
BOOT[2] : 0x0000000000400000 [4.00 MB]
RPMB : 0x0000000000400000 [4.00 MB]
USERAREA : 0x0000001D25D80000 [116.59 GB]
Reading Parititon Info...OK
Formating Userdata...Done
Reset FRP Data...Done
Process finished
[NCK MTK Exploit Tool v1.5]
LOG TXT : 20250310_193733.txt