Offline
Eliminar FRP Cuenta Google A Tecno Camon 12 Air KC3 con Nck
Código:
Job: Reset FRP
Mode: Brom security bypass
Connect Device in BROM Mode using VOL UP + DOWN and insert cable.
New device need TESTPOINT for BROM Mode.
Waiting for device...Found
Port Info : MediaTek USB Port (COM85) [\\?\usb#vid_0e8d&pid_0003#5&212ac8fc&0&3#{86e0d1e0-8089-11d0-9ce4-08003e301f73}]
: MediaTek Inc., 3.0.1504.0 [usb2ser.sys]
: BROM PORT
Hw ID : MT6765 [0766] Helio P35/G35
Details : 8A00,CA00,0000
Sec. Cfg : [SBA Active] [SLA Inactive] [DAA Active]
MEID : F1C9408BC68FAE7951111CB7DB13FA03
SoC ID[0] : D86BABFE27AFB4D72C53CB6F0BE63F23
SoC ID[1] : 47333F461939606C7315213370849E74
Executing Exploit...Done
Reading Preloader...OK
Saved as : preloader_kc3_h627mt62.bin
Loading EMI Config from Preloader...OK
Sec. Cfg : [SBA Inactive] [SLA Inactive] [DAA Inactive]
Sending DA1...OK
Running DA1...OK
Waiting DA SYNC Signal...OK
Setting Checksum Level...Done [Storage]
Connection : brom
Speed : HIGH-SPEED
Reading EMI Configuration...OK
EMMC CID : 90014A68433961503301092B6C258699
Sending EMI Config...OK
Sending 2nd DA...OK
Activating DA Extension...OK
HRID : 31E575509376AD5870D005F21741E0B8
Int. RAM : 0x0000000000038000 [224.00 KB]
Ext. RAM : 0x0000000100000000 [4.00 GB]
Flash ID : hC9aP3
CID : 90014A68433961503301092B6C258699
BOOT1 : 0x0000000000400000 [4.00 MB]
BOOT2 : 0x0000000000400000 [4.00 MB]
RPMB : 0x0000000001000000 [16.00 MB]
USERAREA : 0x0000000E8F800000 [58.24 GB]
Reading Parititon Info...OK
Brand : TECNO
Manufacturer : TECNO MOBILE LIMITED
Model : TECNO KC3
Name : H627
Device : TECNO-KC3
Cpu Abi : arm64-v8a
And. Ver. : 9
Security Patch : 2021-08-05
Prod. Name : H627
Build Dt. : Thu Jul 22 12:34:29 CST 2021
Display ID : KC3-H627G-P-210722V331
Ver. Inc. : G-210722V331
Locale : en-US
Patch : 2021-08-05
IMEI 1: 359*******
Reset FRP Data...Done
If FRP remain on Phone, Then Try Reset FRP 2025
Process finished
[NCK MTK Exploit Tool v2.3]
LOG TXT : 20251021_121256.txt