Online
cuenta google RMX3242 frp con nck
[Reset FRP]
Waiting for device...Found
Port Info : MediaTek USB Port_V1632 (COM20) [\\?\usb#vid_0e8d&pid_0003#5&237d5c64&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}]
: MediaTek Inc., 3.0.1504.0 [usb2ser.sys]
: BROM PORT
Hw ID : MT6833 [0989] Dimensity 700 5G k6833
Details : 8A00,CA00,0000
Sec. Cfg : [SBA Active] [SLA Inactive] [DAA Active]
MEID : 9A71F0D2ED46E2C1FA9DE365D6F318FC
SoC ID[0] : 9D8C752E16FEB90AB95E55EB4C717F0D
SoC ID[1] : 6B8D6527D2CB9972C4DFA41759AE3ADF
Executing Exploit...Done
Reading Preloader...OK
Saved as : preloader_oppo6833.bin
Loading EMI Config from Preloader...OK
Sec. Cfg : [SBA Inactive] [SLA Inactive] [DAA Inactive]
Sending DA1...OK
Running DA1...OK
Waiting DA SYNC Signal...OK
Setting Checksum Level...Done [Storage]
Connection : brom
Speed : HIGH-SPEED
Reading EMI Configuration...OK
UFS CID : AD014839485131354143504D42444152
Sending EMI Config...OK
Sending 2nd DA...OK
Activating DA Extension...OK
HRID : D054D87F2B7DCEE32001EC68414FE980
Int. RAM : 0x0000000000070000 [448,00 KB]
Ext. RAM : 0x0000000100000000 [4,00 GB]
Flash ID : H9HQ15ACPMBDAR
CID : AD014839485131354143504D42444152
BOOT1 : 0x0000000000400000 [4,00 MB]
BOOT2 : 0x0000000000400000 [4,00 MB]
RPMB : 0x0000000000400000 [4,00 MB]
USERAREA : 0x0000001DCB000000 [119,17 GB]
Reading Parititon Info...OK
And. Ver. : 11
Build Dt. : Mon Jul 11 12:48:28 CST 2022
Display ID : RP1A.200720.011 release-keys
Ver. Inc. : 1629009929020
Locale : en-US
Patch : 2022-07-05
Reset FRP Data...Done
Process finished
[NCK Online MTK Exploit Tool v0.2.2]
LOG TXT : 20250205_121009.txt