Offline
cuenta google TCLl 30z FRP (4188c) nck
TCLl 30z FRP DONE (4188c)
Exe version: Nck Box Premium V2 AndroidMTK 1.0
Selected model: 0-By CPU AUTO
[auto]Action: Reset FRP
Phone must be off with battery inside.
Battery must be charged
Please insert USB cable now...
Keep "VOL-" button untill inserting USB cable.
For some phones need to keep "VOL+ and VOL-" button untill inserting USB cable.
For some phones need to keep "VOL+" button untill inserting USB cable.
Detected(3) : MediaTek USB Port (COM3)
[3] \\?\usb#vid_0e8d&pid_0003#5&105fb9be&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
CPU: MT6761 CPU code: 717 Target config: e7
***********************
Secure boot enabled: true
Need serial link authorization: true
Need download agent authorization: true
SWJTAG enabled: true
EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: false
Root cert required: false
Memory read authorization: true
Memory write authorization: true
Cmd 0xC8 blocked: true
***********************
Executing exploit, do not disconnect phone
Exploit has been executed successfully.
[3ba00]Dumping phone preloader.
Preloader: C:\nckbox\android_mtk\Android_MTK_Backup_Folder\pr eloader_backup\preloader_jettaatt_61.bin
Waiting for handle to become active......
Reseived active handle repply from phone......
Booting phone
Detected(3) : MediaTek USB Port (COM3)
[3] \\?\usb#vid_0e8d&pid_0003#5&105fb9be&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Boot mode: Brom
Phone detected...Please wait
BBCHIP: 6761 200 ca01
Using Algo 1.
Helio MT6761 phone detected, swithing to helio api
Helio enabled DRAM in First Da: FALSE
Sending loader.....
BBCHIP MT6761
[1]Storage EMMC
Block size: 512
EMMC FW VERSION: 00:00:00:00:00:00:00:00
EMMC CID: F4012241524A31 : 000000000000000000
EMMC UA SIZE: 0x748000000
BOOT STYLE: EMMC BOOT
FULL LENGTH: 0x748c00000 [29.137 GB]
[EMMC]FORMAT
[0]FRP Reset Done.
[helio]Wait untill phone will start charging.
[0]All done.
TCLl 30z FRP DONE (4188c)
Exe version: Nck Box Premium V2 AndroidMTK 1.0
Selected model: 0-By CPU AUTO
[auto]Action: Reset FRP
Phone must be off with battery inside.
Battery must be charged
Please insert USB cable now...
Keep "VOL-" button untill inserting USB cable.
For some phones need to keep "VOL+ and VOL-" button untill inserting USB cable.
For some phones need to keep "VOL+" button untill inserting USB cable.
Detected(3) : MediaTek USB Port (COM3)
[3] \\?\usb#vid_0e8d&pid_0003#5&105fb9be&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
CPU: MT6761 CPU code: 717 Target config: e7
***********************
Secure boot enabled: true
Need serial link authorization: true
Need download agent authorization: true
SWJTAG enabled: true
EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: false
Root cert required: false
Memory read authorization: true
Memory write authorization: true
Cmd 0xC8 blocked: true
***********************
Executing exploit, do not disconnect phone
Exploit has been executed successfully.
[3ba00]Dumping phone preloader.
Preloader: C:\nckbox\android_mtk\Android_MTK_Backup_Folder\pr eloader_backup\preloader_jettaatt_61.bin
Waiting for handle to become active......
Reseived active handle repply from phone......
Booting phone
Detected(3) : MediaTek USB Port (COM3)
[3] \\?\usb#vid_0e8d&pid_0003#5&105fb9be&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Boot mode: Brom
Phone detected...Please wait
BBCHIP: 6761 200 ca01
Using Algo 1.
Helio MT6761 phone detected, swithing to helio api
Helio enabled DRAM in First Da: FALSE
Sending loader.....
BBCHIP MT6761
[1]Storage EMMC
Block size: 512
EMMC FW VERSION: 00:00:00:00:00:00:00:00
EMMC CID: F4012241524A31 : 000000000000000000
EMMC UA SIZE: 0x748000000
BOOT STYLE: EMMC BOOT
FULL LENGTH: 0x748c00000 [29.137 GB]
[EMMC]FORMAT
[0]FRP Reset Done.
[helio]Wait untill phone will start charging.
[0]All done.