Offline
Realme C55 RMX3710 OSv13 FRP Success Via NCK Tool
Log:
[Reset FRP]
Connect USB Calble to turned off device without pressing any key.
Some device may need you to hold VOL UP/DOWN while connecting.
Waiting for device...Found
Port Info : MediaTek PreLoader USB VCOM_V2023 (Android) (COM97) [\\?\usb#vid_22d9&pid_0006#5&c39147&0&5#{86e0d1e0-8089-11d0-9ce4-08003e301f73}]
: MediaTek Inc., 3.0.1512.0 [usb2ser_mtk.sys]
: PRELOADER PORT
HW ID : MT6768 [0707] Helio P65/G85 k68v1
HW VER : 8A00,CA00,0000
Sec. Cfg : [SBA Active] [SLA Inactive] [DAA Active]
MEID : 856D9300D15F7B0485DD5B714C6924C4
SoC ID[0] : 287B0E22AFDE47186A6D904D5A7DE3B5
SoC ID[1] : 16EADA2CFF6492F16ECDEBFCC5CF92EA
Sending DA1...Done
Running DA1...Done
Waiting DA SYNC Signal...OK
Setting Checksum Level...Done [Storage]
Connection : preloader
Speed : high-speed
Running Exploit (Old)...Done
Sending DA2...OK
Activating DA Extension...Done
HRID : 1BB347206A186D2BEA50675F4729261D
SRAM : 0x0000000000070000 [448.00 KB]
DRAM : 0x0000000100000000 [4.00 GB]
EMMC ID : Y0S256
EMMC CID : 9B010059305332353600FD8D28E25A49
BOOT[1] : 0x0000000000400000 [4.00 MB]
BOOT[2] : 0x0000000000400000 [4.00 MB]
RPMB : 0x0000000001000000 [16.00 MB]
USERAREA : 0x0000003A3E000000 [232.97 GB]
Reading Parititon Info...OK
Reset FRP Data...Done
Process finished
[NCK MTK Exploit Tool v1.5]
LOG TXT : 20250315_165440.txt
Log:
[Reset FRP]
Connect USB Calble to turned off device without pressing any key.
Some device may need you to hold VOL UP/DOWN while connecting.
Waiting for device...Found
Port Info : MediaTek PreLoader USB VCOM_V2023 (Android) (COM97) [\\?\usb#vid_22d9&pid_0006#5&c39147&0&5#{86e0d1e0-8089-11d0-9ce4-08003e301f73}]
: MediaTek Inc., 3.0.1512.0 [usb2ser_mtk.sys]
: PRELOADER PORT
HW ID : MT6768 [0707] Helio P65/G85 k68v1
HW VER : 8A00,CA00,0000
Sec. Cfg : [SBA Active] [SLA Inactive] [DAA Active]
MEID : 856D9300D15F7B0485DD5B714C6924C4
SoC ID[0] : 287B0E22AFDE47186A6D904D5A7DE3B5
SoC ID[1] : 16EADA2CFF6492F16ECDEBFCC5CF92EA
Sending DA1...Done
Running DA1...Done
Waiting DA SYNC Signal...OK
Setting Checksum Level...Done [Storage]
Connection : preloader
Speed : high-speed
Running Exploit (Old)...Done
Sending DA2...OK
Activating DA Extension...Done
HRID : 1BB347206A186D2BEA50675F4729261D
SRAM : 0x0000000000070000 [448.00 KB]
DRAM : 0x0000000100000000 [4.00 GB]
EMMC ID : Y0S256
EMMC CID : 9B010059305332353600FD8D28E25A49
BOOT[1] : 0x0000000000400000 [4.00 MB]
BOOT[2] : 0x0000000000400000 [4.00 MB]
RPMB : 0x0000000001000000 [16.00 MB]
USERAREA : 0x0000003A3E000000 [232.97 GB]
Reading Parititon Info...OK
Reset FRP Data...Done
Process finished
[NCK MTK Exploit Tool v1.5]
LOG TXT : 20250315_165440.txt