Offline
cuenta google xiaomi a1 frp con nck
Código:
xiaomi a1 frp unlock by nck tool
[ATTACH type="full" size="640x542"]29547[/ATTACH]
[Reset FRP]
Waiting for device...Found
Port Info : MediaTek USB Port_V1633 (COM7) [\\?\usb#vid_0e8d&pid_0003#6&124176f9&0&4#{86e0d1e0-8089-11d0-9ce4-08003e301f73}]
: MediaTek Inc., 3.0.1504.0 [usb2ser.sys]
: BROM PORT
Hw ID : MT6761 [0717] Helio A20/P22/A22/A25/G25
Details : 8A00,CA01,0200
Sec. Cfg : [SBA Active] [SLA Active] [DAA Active]
MEID : 915547E7C46A208E79BA87E08099465E
SoC ID[0] : 500DC4484EF2A8AB0102E99B2A3E3067
SoC ID[1] : 60BE8924DC5913A697C750DD45D83606
Executing Exploit...Done
Reading Preloader...OK
Saved as : preloader_ice.bin
Loading EMI Config from Preloader...OK
Sec. Cfg : [SBA Inactive] [SLA Inactive] [DAA Inactive]
Sending DA1...OK
Running DA1...OK
Waiting DA SYNC Signal...OK
Setting Checksum Level...Done [Storage]
Connection : brom
Speed : HIGH-SPEED
Reading EMI Configuration...OK
EMMC CID : 9B0100593250303332005A73412E79C7
Sending EMI Config...OK
Sending 2nd DA...OK
Activating DA Extension...OK
HRID : 0ECDA49AAD368D55BB89870A3AB12315
Int. RAM : 0x0000000000039000 [228.00 KB]
Ext. RAM : 0x0000000080000000 [2.00 GB]
Flash ID : Y2P032
CID : 9B0100593250303332005A73412E79C7
BOOT1 : 0x0000000000400000 [4.00 MB]
BOOT2 : 0x0000000000400000 [4.00 MB]
RPMB : 0x0000000001000000 [16.00 MB]
USERAREA : 0x0000000747C00000 [29.12 GB]
Reading Parititon Info...OK
Reset FRP Data...Done
Process finished
[NCK MTK Exploit Tool v1.3]
LOG TXT : 20250304_175302.txt
Archivos adjuntos
Debes estar registrado para ver la lista de archivos adjuntos.