Post here successfully operations via NCK BOX / Dongle PREMIUM v2

Fast Unlocking

Administrator
Admin
Hot 10 Play FRP Remove Done

[Reset FRP]
Waiting for device...Found
Port Info : MediaTek USB Port_V1632 (COM9) [\\?\usb#vid_0e8d&pid_0003#5&212ac8fc&0&4#{86e0d1e0-8089-11d0-9ce4-08003e301f73}]
: MediaTek Inc., 3.0.1504.0 [usb2ser.sys]
: BROM PORT
Hw ID : MT6765 [0766] Helio P35/G35
Details : 8A00,CA00,0000
Sec. Cfg : [SBA Active] [SLA Inactive] [DAA Active]
MEID : FDC110E535085E85A6FFCBA2FAF45196
SoC ID[0] : F07D647A9AD7EB26DD7188117C1C9C92
SoC ID[1] : 58C3846B6CFE2F04AC2A932482C806C8
Executing Exploit...Done
Reading Preloader...OK
Saved as : preloader_x688b_h659.bin
Loading EMI Config from Preloader...OK
Sec. Cfg : [SBA Inactive] [SLA Inactive] [DAA Inactive]
Sending DA1...OK
Running DA1...OK
Waiting DA SYNC Signal...OK
Setting Checksum Level...Done [Storage]
Connection : brom
Speed : HIGH-SPEED
Reading EMI Configuration...OK
EMMC CID : 150100444836444142024758D04138BD
Sending EMI Config...OK
Sending 2nd DA...OK
Activating DA Extension...OK
HRID : B95AFA33D42DF11494EC84A5D63E55BB
Int. RAM : 0x0000000000038000 [224.00 KB]
Ext. RAM : 0x0000000100000000 [4.00 GB]
Flash ID : DH6DAB
CID : 150100444836444142024758D04138BD
BOOT1 : 0x0000000000400000 [4.00 MB]
BOOT2 : 0x0000000000400000 [4.00 MB]
RPMB : 0x0000000001000000 [16.00 MB]
USERAREA : 0x0000000E8F800000 [58.24 GB]
Reading Parititon Info...OK
And. Ver. : 11
Build Dt. : Wed Dec 14 11:16:20 CST 2022
Display ID : INFINIX-R-64-221213V561
Ver. Inc. : 221214V856
Locale : en-US
Patch : 2022-12-05
Reset FRP Data...Done
Process finished
[NCK MTK Exploit Tool v1.2]
LOG TXT : 20241123_120702.txt
 
symphony Z33 Frp unlock done

SELECTED: Tiger T700
ACTION: Erase FRP
Start Detect phone...
Phone must be off with battery inside.
Long press "VOL -" key and insert usb cable.
For some phones need to
Long press "VOL -"+ "VOL +" key and insert usb cable.
Detected: SPRD U2S Diag (COM10)
Sending payload, keep boot key untill loader start.
Exploiting phone.....
Sending preloader 1
Sending preloader 2
Sending FDL 1.....
Sending FDL 2.....
New flash metod detected.
[5f] 801587 [5e] E04521E
UID: P1F770_17_36_30
FileSystem: EMMC
Read partition info is supported by loader.
***************
Manufacturer: Symphony
Brand: Symphony
Device: Z33
Model: Z33
Build ID: RP1A.201005.001
CPU arhitecture: arm64-v8a
Build product name: Z33
Build description: Z33-user 11 RP1A.201005.001 190 release-keys
Build Id: RP1A.201005.001
Android Release: 11
Android Version: Z33_HW3_V21
Security patch: 2024-01-05
CPU NAME: T700
Removing frp, wait...
[1]FRP: persist
Done.
[can take 0-10 sec]Wait untill phone restart.
Exe version: Unisoc Module 2.3.1
Log saved:
C:\nckdongle\spreadtrum_module\spreadtrum_module_b ackup_folder\Saved_Logs\Symphony_Z33_HW3_V21_erase _frp.txt
Total Time: 00:00:33
Done.
 
Tecno Kc1 FRP Remove Done

[Reset FRP]
Waiting for device...Found
Port Info : MediaTek USB Port_V1632 (COM79) [\\?\usb#vid_0e8d&pid_0003#5&212ac8fc&0&3#{86e0d1e0-8089-11d0-9ce4-08003e301f73}]
: MediaTek Inc., 3.0.1504.0 [usb2ser.sys]
: BROM PORT
Hw ID : MT6761 [0717] Helio A20/P22/A22/A25/G25
Details : 8A00,CA01,0200
Sec. Cfg : [SBA Active] [SLA Inactive] [DAA Active]
MEID : E1F5C10EE256D8170B8F9F890CBFB468
SoC ID[0] : 8347637A3D132423CE907A76005FB47C
SoC ID[1] : FFC5312055A74568E085336B7AE6ABBB
Executing Exploit...Done
Reading Preloader...OK
Saved as : preloader_kc1_h6114.bin
Loading EMI Config from Preloader...OK
Sec. Cfg : [SBA Inactive] [SLA Inactive] [DAA Inactive]
Sending DA1...OK
Running DA1...OK
Waiting DA SYNC Signal...OK
Setting Checksum Level...Done [Storage]
Connection : brom
Speed : HIGH-SPEED
Reading EMI Configuration...OK
EMMC CID : 90014A484147346132A52380392795CB
Sending EMI Config...OK
Sending 2nd DA...OK
Activating DA Extension...OK
HRID : 3BC5A5CA4EC5D3F7D4D867585639B0DB
Int. RAM : 0x0000000000039000 [228.00 KB]
Ext. RAM : 0x0000000080000000 [2.00 GB]
Flash ID : HAG4a2
CID : 90014A484147346132A52380392795CB
BOOT1 : 0x0000000000400000 [4.00 MB]
BOOT2 : 0x0000000000400000 [4.00 MB]
RPMB : 0x0000000000400000 [4.00 MB]
USERAREA : 0x00000003AB400000 [14.68 GB]
Reading Parititon Info...OK
Brand : TECNO
Manufacturer : TECNO MOBILE LIMITED
Model : TECNO KC1
Device : TECNO-KC1
And. Ver. : 9
Prod. Name : H6114A
Build Dt. : Thu May 13 16:36:01 UTC 2021
Display ID : KC1-H6114AL-P-210513V520
Ver. Inc. : AL-210513V520
Locale : en-US
Patch : 2021-05-05
Reset FRP Data...Done
Process finished
[NCK MTK Exploit Tool v1.2]
LOG TXT : 20241124_130342.txt
 
Realme C21Y FRP Remove Done

SELECTED: RMX3261
ACTION: Erase FRP
Start Detect phone.
Phone must be off with battery inside.
Long press "VOL -" key while inserting usb cable.
Keep key untill boot complete.
Detected: SPRD U2S Diag (COM10)
Sending payload, keep boot key untill loader start.
Exploiting phone.....
Sending preloader 1
Sending preloader 2
Sending FDL 1.....
Sending FDL 2.....
New flash metod detected.
[5f] 741885 [5e] 103D490C
UID: M1R587_21_18_12
FileSystem: EMMC
Read partition info is supported by loader.
***************
Manufacturer: realme
Brand: realme
Device: RMX3261
Model: RMX3261
Build ID: RP1A.201005.001
CPU arhitecture: arm64-v8a
Build product name: S19610AA1
Build description: S19610AA1_ctcc-user 11 RP1A.201005.001 17119 release-keys
Product name: RMX3261
Build Id: RP1A.201005.001
Android Release: 11
Android Version: RMX3261_11_A.119
Security patch: 2024-02-05
CPU NAME: UMS512
Removing frp, wait...
[1]FRP: persist
Done.
[can take 0-10 sec]Wait untill phone restart.
Exe version: Unisoc Module 2.3.1
Log saved:
C:\nckdongle\spreadtrum_module\spreadtrum_module_b ackup_folder\Saved_Logs\realme_RMX3261_11_A_119_er ase_frp.txt
Total Time: 00:00:33
Done.
 
oppo A15 frp remove done

[Reset FRP]
Waiting for device...Found
Port Info : MediaTek USB Port_V1632 (COM79) [\\?\usb#vid_0e8d&pid_0003#5&212ac8fc&0&3#{86e0d1e0-8089-11d0-9ce4-08003e301f73}]
: MediaTek Inc., 3.0.1504.0 [usb2ser.sys]
: BROM PORT
Hw ID : MT6765 [0766] Helio P35/G35
Details : 8A00,CA00,0000
Sec. Cfg : [SBA Active] [SLA Inactive] [DAA Active]
MEID : 9D7097C67CC9730E28E29264731E6E66
SoC ID[0] : C9640AA1A5AD2A6922DD5BB1D58C607A
SoC ID[1] : F3EBAAE7E04C642511130BF5167F2D05
Executing Exploit...Done
Reading Preloader...OK
Saved as : preloader_oppo6765.bin
Loading EMI Config from Preloader...OK
Sec. Cfg : [SBA Inactive] [SLA Inactive] [DAA Inactive]
Sending DA1...OK
Running DA1...OK
Waiting DA SYNC Signal...OK
Setting Checksum Level...Done [Storage]
Connection : brom
Speed : HIGH-SPEED
Reading EMI Configuration...OK
EMMC CID : 150100444836444142086C0EDC282899
Sending EMI Config...OK
Sending 2nd DA...OK
Activating DA Extension...OK
HRID : 90CFB4B2ED5C53BBAF7579FB5CB0E48F
Int. RAM : 0x0000000000038000 [224.00 KB]
Ext. RAM : 0x0000000100000000 [4.00 GB]
Flash ID : DH6DAB
CID : 150100444836444142086C0EDC282899
BOOT1 : 0x0000000000400000 [4.00 MB]
BOOT2 : 0x0000000000400000 [4.00 MB]
RPMB : 0x0000000001000000 [16.00 MB]
USERAREA : 0x0000000E8F800000 [58.24 GB]
Reading Parititon Info...OK
And. Ver. : 10
Build Dt. : Thu Feb 22 00:44:37 CST 2024
Display ID : QP1A.190711.020 release-keys
Locale : en-US
Patch : 2023-02-05
Reset FRP Data...Done
Process finished
[NCK MTK Exploit Tool v1.2]
LOG TXT : 20241125_171719.txt
 
Vivo Y91c Password unlock done

[Erase Userdata]
Waiting for device...Found
Port Info : MediaTek PreLoader USB VCOM_V1632 (Android) (COM19) [\\?\usb#vid_0e8d&pid_2000#5&212ac8fc&0&7#{86e0d1e0-8089-11d0-9ce4-08003e301f73}]
: MediaTek Inc., 3.0.1504.0 [usb2ser.sys]
: PRELOADER PORT
CUST_DA : INT:VIVO V1
HW ID : MT6765 [0766] Helio P35/G35
HW VER : 8A00,CA00,0000
Sec. Cfg : [SBA Active] [SLA Inactive] [DAA Active]
MEID : 2AF6C0F8750363522E939587E8AE4586
SoC ID[0] : E66EA63C3DCE2F21A1F3D30AFD93913B
SoC ID[1] : 702C880E80E8373A5A9BC6E17D8DCF00
Sending DA1...Done
Running DA1...Done
Waiting DA SYNC Signal...OK
Setting Checksum Level...Done [Storage]
Connection : preloader
Speed : high-speed
Running Exploit (Old)...Done
Sending DA2...OK
Activating DA Extension...Done
HRID : 77D9C914119310031ABDC67ED54EB73E
SRAM : 0x000000000003A000 [232.00 KB]
DRAM : 0x0000000080000000 [2.00 GB]
EMMC ID : QD63MB
EMMC CID : 150100514436334D4201D2A3D3B217AB
BOOT[1] : 0x0000000000400000 [4.00 MB]
BOOT[2] : 0x0000000000400000 [4.00 MB]
RPMB : 0x0000000001000000 [16.00 MB]
USERAREA : 0x0000000747C00000 [29.12 GB]
Reading Parititon Info...OK
Brand : vivo
Manufacturer : vivo
Model : vivo 1820
Device : PD1818HF_EX
And. Ver. : 8.1.0
Prod. Ver. : PD1818HF_EX_A_1.22.6
Prod. Name : PD1818HF_EX
Build Dt. : Mon Mar 27 23:01:23 CST 2023
Display ID : O11019 release-keys
Ver. Inc. : 1679929289
Locale : en-US
Patch : 2021-10-01
Formating Userdata...Done
Process finished
[NCK MTK Exploit Tool v1.2]
LOG TXT : 20241126_152244.txt
 
UNLOCK iPro Wave 4.0 II SUCCESS

1- ENTER DIAG PHONE OFF

2- REVOME SIMLOCK

ACTION: Direct Unlock
Detecting phone, wait...
Using connection mode 1
Detected: SPRD U2S Diag (COM20)

Platform Version: MOCORTM_Pike_W15.18_Debug
Project Version: sc7731g_CP0_modem
BASE Version: TM_BASE_15B_W16.04.3_P5
HW Version: sc7731g_CP0_modem
05-04-2016 16:42:48
Build number: I9408_IPRO_VIVA_W125_V1.4_20170705

IMEI 1: 352070082101236
IMEI 2: 352070082101244
IMEI 3: 358570010103893
IMEI 4: 910575601400468
BT: 0881BC3EA260
WIFI: 0881BC3EB229
Reading simlock backup, wait....
Saved to: C:\nckdongle\spreadtrum_module\spreadtrum_module_b ackup_folder\sml_security_backup\I9408_IPRO_VIVA_W 125_V1_4_20170705_352070082101236__security_backup .tar

Simlock Status:
SIMLOCK: ACTIVE
NETWORK SUBNET: INACTIVE
SP LOCK: INACTIVE
CORPORATE: INACTIVE
USER LOCK: INACTIVE
[3]Simlock Type: 0 0
Sim 1 Unlock Code: 82783153
Sim 2 Unlock Code: 82783163
Warning, this is factory key, some opperators can modify factory key.
Unlock is supported for this phone
Phone have empty sign array, can be empty efuse or erased nv.
Writing simlock...
Writing simlock ok
Done.
Exe version: Unisoc Module 2.3.1
Log saved:
C:\nckdongle\spreadtrum_module\spreadtrum_module_b ackup_folder\Saved_Logs\I9408_IPRO_VIVA_W125_V1_4_ 20170705_352070082101236_diag_simlock_unlock.txt
 
Realme C53 FRP Remove Done

SELECTED: C53
ACTION: Erase FRP
Start Detect phone...
Phone must be off with battery inside.
Long press "VOL -" key and insert usb cable.
For some phones need to
Long press "VOL -"+ "VOL +" key and insert usb cable.
Detected: SPRD U2S Diag (COM10)
Sending payload, keep boot key untill loader start.
Exploiting phone.....
Sending preloader 1
Sending preloader 2
Sending FDL 1.....
Sending FDL 2.....
New flash metod detected.
[5f] 743789 [5e] C2D458C
UID: M3N965_21_11_12
FileSystem: EMMC
Read partition info is supported by loader.
CPU NAME: T616
Removing frp, wait...
[1]FRP: persist
Done.
[can take 0-10 sec]Wait untill phone restart.
Exe version: Unisoc Module 2.3.1
Log saved:
C:\nckdongle\spreadtrum_module\spreadtrum_module_b ackup_folder\Saved_Logs\_erase_frp_22.txt
Total Time: 00:00:35
Done.
 
oppo A18 FRP remove done

[Reset FRP]
Waiting for device...Found
Port Info : MediaTek PreLoader USB VCOM_V1632 (Android) (COM54) [\\?\usb#vid_22d9&pid_0006#5&212ac8fc&0&4#{86e0d1e0-8089-11d0-9ce4-08003e301f73}]
: MediaTek Inc., 3.0.1504.0 [usb2ser.sys]
: PRELOADER PORT
CUST_DA : INT:OPPO V1
HW ID : MT6768 [0707] Helio P65/G85 k68v1
HW VER : 8A00,CA00,0000
Sec. Cfg : [SBA Active] [SLA Inactive] [DAA Active]
MEID : 3E99D8A0216C0FA7D59578BC7E9DB027
SoC ID[0] : 8298A9A3B487A8FB1E730C86993DF535
SoC ID[1] : A02C79AA342D445C41C58685750C9969
Sending DA1...Done
Running DA1...Done
Waiting DA SYNC Signal...OK
Setting Checksum Level...Done [Storage]
Connection : preloader
Speed : high-speed
Running Exploit (Old)...Done
Sending DA2...OK
Activating DA Extension...Done
HRID : 65846F887DABD7D0D4A46583C985475D
SRAM : 0x0000000000070000 [448.00 KB]
DRAM : 0x0000000100000000 [4.00 GB]
EMMC ID : DUTB42
EMMC CID : 15010044555442343202F37DF4208AB5
BOOT[1] : 0x0000000000400000 [4.00 MB]
BOOT[2] : 0x0000000000400000 [4.00 MB]
RPMB : 0x0000000001000000 [16.00 MB]
USERAREA : 0x0000001D1EC00000 [116.48 GB]
Reading Parititon Info...OK
Reset FRP Data...Done
Process finished
[NCK MTK Exploit Tool v1.2]
LOG TXT : 20241129_185626.txt
 
Samsung A03 FRP Remove Success

SELECTED: SM-A035F
ACTION: Erase FRP
Start Detect phone.
Testpoint image link for this model is located in utils tab
Phone must be off with battery inside.
Connect Testpoint while inserting usb cable.
After booting, testpoint can be removed.
Detected: SPRD U2S Diag (COM93)
Sending payload, keep boot key untill loader start.
Exploiting phone.....
Sending preloader 1
Sending preloader 2
Sending FDL 1.....
Sending FDL 2.....
New flash metod detected.
[5f] 741887 [5e] A4C929C
UID: M1R759_18_37_28
FileSystem: EMMC
Read partition info is supported by loader.
***************
Manufacturer: samsung
Brand: samsung
Device: a03
Model: SM-A035F
Build ID: TP1A.220624.014
CPU arhitecture: arm64-v8a
Build product name: a03
Build description: a03nnxx-user 13 TP1A.220624.014 A035FXXS6CXA3 release-keys
Build Id: TP1A.220624.014
Android Release: 13
Android Version: TP1A.220624.014.A035FXXS6CXA3
Security patch: 2024-01-01
Bootloader can be unlocked: 1
CPU NAME: T606
Removing frp, wait...
Found [persistent] [persistent] Size to download: 1024 KB
[1]FRP: persistent
Done.
[can take 0-10 sec]Wait untill phone restart.
Exe version: Unisoc Module 2.3.1
Log saved:
C:\nckdongle\spreadtrum_module\spreadtrum_module_b ackup_folder\Saved_Logs\samsung_TP1A_220624_014_A0 35FXXS6CXA3_erase_frp.txt
Total Time: 00:00:44
Done.
 
Oppo A16 FRP Remove Done

[Reset FRP]
Waiting for device...Found
Port Info : MediaTek PreLoader USB VCOM_V1632 (Android) (COM54) [\\?\usb#vid_22d9&pid_0006#5&212ac8fc&0&4#{86e0d1e0-8089-11d0-9ce4-08003e301f73}]
: MediaTek Inc., 3.0.1504.0 [usb2ser.sys]
: PRELOADER PORT
CUST_DA : INT:OPPO V1
HW ID : MT6765 [0766] Helio P35/G35
HW VER : 8A00,CA00,0000
Sec. Cfg : [SBA Active] [SLA Inactive] [DAA Active]
MEID : 7AA680FC6E18E4531EED23CB51892A83
SoC ID[0] : 9719553218D03C07A6A99F0C77150417
SoC ID[1] : C6AFDC03C92AA011960C169CAABF9320
Sending DA1...Done
Running DA1...Done
Waiting DA SYNC Signal...OK
Setting Checksum Level...Done [Storage]
Connection : preloader
Speed : high-speed
Running Exploit (Old)...Done
Sending DA2...OK
Activating DA Extension...Done
HRID : C4A55408B5039379DFAD304870A96683
SRAM : 0x0000000000038000 [224.00 KB]
DRAM : 0x0000000100000000 [4.00 GB]
EMMC ID : G1J9R8
EMMC CID : 13014E47314A39523810164BC57A98ED
BOOT[1] : 0x0000000000400000 [4.00 MB]
BOOT[2] : 0x0000000000400000 [4.00 MB]
RPMB : 0x0000000001000000 [16.00 MB]
USERAREA : 0x0000000E8F800000 [58.24 GB]
Reading Parititon Info...OK
And. Ver. : 11
Build Dt. : Thu Jun 2 15:13:11 CST 2022
Display ID : RP1A.200720.011 release-keys
Ver. Inc. : 1654152843290
Locale : en-US
Patch : 2022-06-05
Reset FRP Data...Done
Process finished
[NCK MTK Exploit Tool v1.2]
LOG TXT : 20241129_213124.txt
 
Symphony Z60 Plus FRP Remove

SELECTED: Tiger T606
ACTION: Erase FRP
Start Detect phone...
Phone must be off with battery inside.
Long press "VOL -" key and insert usb cable.
For some phones need to
Long press "VOL -"+ "VOL +" key and insert usb cable.
Detected: SPRD U2S Diag (COM10)
Sending payload, keep boot key untill loader start.
Exploiting phone.....
Sending preloader 1
Sending preloader 2
Sending FDL 1.....
Sending FDL 2.....
New flash metod detected.
[5f] 7429C9 [5e] 12150D07
UID: M2W992_20_26_7
FileSystem: UFS
Read partition info is supported by loader.
CPU NAME: T606
Removing frp, wait...
[1]FRP: persist
Done.
[can take 0-10 sec]Wait untill phone restart.
Exe version: Unisoc Module 2.3.1
Log saved:
C:\nckdongle\spreadtrum_module\spreadtrum_module_b ackup_folder\Saved_Logs\_erase_frp_25.txt
Total Time: 00:00:33
Done.
 
Helio 50 Frp remove done

[Reset FRP]
Waiting for device...Found
Port Info : MediaTek USB Port_V1632 (COM79) [\\?\usb#vid_0e8d&pid_0003#5&212ac8fc&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}]
: MediaTek Inc., 3.0.1504.0 [usb2ser.sys]
: BROM PORT
Hw ID : MT6768 [0707] Helio P65/G85 k68v1
Details : 8A00,CA00,0000
Sec. Cfg : [SBA Active] [SLA Inactive] [DAA Inactive]
MEID : F68FD4061B15422146AE3D3985CC23DF
SoC ID[0] : EF16B090D4318E1AC0B03389EBA21AEB
SoC ID[1] : 97756CD0315471F5ABA13D90A069A07F
Executing Exploit...Done
Reading Preloader...OK
Saved as : preloader_k69v1_64_k510.bin
Loading EMI Config from Preloader...OK
Sec. Cfg : [SBA Inactive] [SLA Inactive] [DAA Inactive]
Sending DA1...OK
Running DA1...OK
Waiting DA SYNC Signal...OK
Setting Checksum Level...Done [Storage]
Connection : brom
Speed : HIGH-SPEED
Reading EMI Configuration...OK
EMMC CID : 7001005932393132385B2F17A713CA37
Sending EMI Config...OK
Sending 2nd DA...OK
Activating DA Extension...OK
HRID : 727420593D7DC262D2921686F88873F1
Int. RAM : 0x0000000000070000 [448.00 KB]
Ext. RAM : 0x0000000100000000 [4.00 GB]
Flash ID : Y29128
CID : 7001005932393132385B2F17A713CA37
BOOT1 : 0x0000000000400000 [4.00 MB]
BOOT2 : 0x0000000000400000 [4.00 MB]
RPMB : 0x0000000000400000 [4.00 MB]
USERAREA : 0x0000001D29800000 [116.65 GB]
Reading Parititon Info...OK
Brand : helio
Manufacturer : helio
Model : helio 50
Device : helio_50
And. Ver. : 14
Prod. Name : helio_50
Build Dt. : Wed Nov 6 21:12:56 CST 2024
Display ID : helio 50_HW1_V16
Ver. Inc. : 168
Locale : en-US
Patch : 2024-10-05
Reset FRP Data...Done
Process finished
[NCK MTK Exploit Tool v1.2]
LOG TXT : 20241130_213841.txt
 
vortex zg65 pro unlock done


Exe version: NCKBox AndroidMTK 3.0.3
Selected model: 0-By CPU AUTO
Action: Unlock
Phone must be off with battery inside.
Battery must be charged
Please insert USB cable now...
For some phones need to keep "VOL-" button untill inserting USB cable.
For some phones need to keep "VOL+ and VOL-" button untill inserting USB cable.
For some phones need to keep "VOL+" button untill inserting USB cable.
Detected(8) : MediaTek PreLoader USB VCOM (Android) (COM8)
[8] \\?\usb#vid_0e8d&pid_2000#6&7243136&0&6#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Starting META mode, wait...
Restarting to meta,wait....
If drivers missing, please install CDC drivers.
This can take up to 5 min on slow phones.
If take too long, check device manager for drivers.
[18]META Port Detected: MediaTek USB VCOM (Android) (COM18)
USB\VID_0E8D&PID_2007\6&7243136&0&6
Start sync target, waiting responce.....
ChipID: MT6739
[MT6739]Using Algo 5
Start sync target, waiting responce.....
[META]BaseBand CPU : MT6739
[META]SW_VER : MOLY.LR12A.R3.MP.V276.5.T1616
[META]HW_VER : TK_MD_BASIC_HW
[helio]Read simlock info.
IMEI Location: NVRAM
Phone imei[1] : 351844360338020
Phone imei[2] : 351844360338038
Start direct unlock[SIM1]
Simlock checksum is ok.
Direct unlock done
Start direct unlock[SIM2]
Simlock checksum is ok.
Direct unlock done
Simlock checksum is ok.
Direct unlock done
Simlock checksum is ok.
Direct unlock done
[0]All done.
 
TECNO KB3 frp remove done

[Reset FRP]
Waiting for device...Found
Port Info : MediaTek USB Port_V1632 (COM7) [\\?\usb#vid_0e8d&pid_0003#5&212ac8fc&0&7#{86e0d1e0-8089-11d0-9ce4-08003e301f73}]
: MediaTek Inc., 3.0.1504.0 [usb2ser.sys]
: BROM PORT
Hw ID : MT6761 [0717] Helio A20/P22/A22/A25/G25
Details : 8A00,CA01,0200
Sec. Cfg : [SBA Active] [SLA Inactive] [DAA Active]
MEID : BD1D7EE3DA5998FB4D230D100CAFB62D
SoC ID[0] : 25C63930C399320413E7F3CD6112BA00
SoC ID[1] : 253962F0E6B41102231E4D976F2450DD
Executing Exploit...Done
Reading Preloader...OK
Saved as : preloader_kb3_h623.bin
Loading EMI Config from Preloader...OK
Sec. Cfg : [SBA Inactive] [SLA Inactive] [DAA Inactive]
Sending DA1...OK
Running DA1...OK
Waiting DA SYNC Signal...OK
Setting Checksum Level...Done [Storage]
Connection : brom
Speed : HIGH-SPEED
Reading EMI Configuration...OK
EMMC CID : 700100544132383332230BFF1B23562B
Sending EMI Config...OK
Sending 2nd DA...OK
Activating DA Extension...OK
HRID : 6F4554A8C895ECD0344DE5C5E3CD6D77
Int. RAM : 0x0000000000039000 [228.00 KB]
Ext. RAM : 0x0000000080000000 [2.00 GB]
Flash ID : TA2832
CID : 700100544132383332230BFF1B23562B
BOOT1 : 0x0000000000400000 [4.00 MB]
BOOT2 : 0x0000000000400000 [4.00 MB]
RPMB : 0x0000000000400000 [4.00 MB]
USERAREA : 0x000000074A000000 [29.16 GB]
Reading Parititon Info...OK
Brand : TECNO
Manufacturer : TECNO MOBILE LIMITED
Model : TECNO KB3
Device : TECNO-KB3
And. Ver. : 9
Prod. Name : H624
Build Dt. : Wed Feb 13 20:00:38 CST 2019
Display ID : KB3-H624A-P-190213V209
Ver. Inc. : A-190213V209
Locale : en-US
Patch : 2019-01-05
Reset FRP Data...Done
Process finished
[NCK MTK Exploit Tool v1.2]
LOG TXT : 20241204_190057.txt
 
FRP Redmi Note 11 pro plus done!

[Reset FRP]
Waiting for device...Found
Port Info : MediaTek USB Port_V1632 (COM33) [\\?\usb#vid_0e8d&pid_0003#5&237d5c64&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}]
: MediaTek Inc., 3.0.1504.0 [usb2ser.sys]
: BROM PORT
Hw ID : MT6877 [0959] Dimensity 900/1080
Details : 8A00,CA00,0000
Sec. Cfg : [SBA Active] [SLA Active] [DAA Active]
MEID : AB66A764BF2AF13522EA109A777991B6
SoC ID[0] : 748168AB3F3823090D4209D814D8579D
SoC ID[1] : FEBBF73A42BE80513DCF1572F62B087A
Executing Exploit...Done
Reading Preloader...OK
Saved as : preloader_pissarro.bin
Loading EMI Config from Preloader...OK
Sec. Cfg : [SBA Inactive] [SLA Inactive] [DAA Inactive]
Sending DA1...OK
Running DA1...OK
Waiting DA SYNC Signal...OK
Setting Checksum Level...Done [Storage]
Connection : brom
Speed : HIGH-SPEED
Reading EMI Configuration...OK
UFS CID : CE014B4D3846393030314A4D2D423831
Sending EMI Config...OK
Sending 2nd DA...OK
Activating DA Extension...OK
HRID : 79BC3027E7C9531558A5BC33FFAD62E6
Int. RAM : 0x0000000000070000 [448,00 KB]
Ext. RAM : 0x0000000200000000 [8,00 GB]
Flash ID : KM8F9001JM-B81
CID : CE014B4D3846393030314A4D2D423831
BOOT1 : 0x0000000000400000 [4,00 MB]
BOOT2 : 0x0000000000400000 [4,00 MB]
RPMB : 0x0000000000400000 [4,00 MB]
USERAREA : 0x0000003B96000000 [238,34 GB]
Reading Parititon Info...OK
And. Ver. : 13
Build Dt. : Mon Jul 15 12:28:56 UTC 2024
Display ID : TP1A.220624.014
Ver. Inc. : V816.0.4.0****TMIXM
Locale : en-GB
Patch : 2024-07-01
Reset FRP Data...Done
Process finished
[NCK Online MTK Exploit Tool v0.2.1]
LOG TXT : 20241205_140159.txt
 
redmi A3 frp done.


[Reset FRP]
Waiting for device...Found
Port Info : MediaTek PreLoader USB VCOM_V1632 (Android) (COM13) [\\?\usb#vid_0e8d&pid_2000#7&4e2a85e&0&2#{86e0d1e0-8089-11d0-9ce4-08003e301f73}]
: MediaTek Inc., 3.0.1504.0 [usb2ser.sys]
: PRELOADER PORT
CUST_DA : INT:XIAOMI/blue_V816.0.X.bin
HW ID : MT6765 [0766] Helio P35/G35
HW VER : 8A00,CA00,0000
Sec. Cfg : [SBA Active] [SLA Active] [DAA Active]
MEID : 3031BC90AE85107F55F3E202F829C192
SoC ID[0] : B12FA04DE02D9DF31AC513A286D33087
SoC ID[1] : 32F03B346D0430BE7BE7B5749C383E1D
Sending DA1...Done
Running DA1...Done
Waiting DA SYNC Signal...OK
Setting Checksum Level...Done [Storage]
Connection : preloader
Speed : high-speed
Sending DA2...OK
HRID : BEB9BA7B99113D7BF7372CC30FB385C7
SRAM : 0x000000000003A000 [232.00 KB]
DRAM : 0x00000000C0000000 [3.00 GB]
EMMC ID : C09E00
EMMC CID : D62D00433039453030512966C4C31B43
BOOT[1] : 0x0000000000400000 [4.00 MB]
BOOT[2] : 0x0000000000400000 [4.00 MB]
RPMB : 0x0000000000400000 [4.00 MB]
USERAREA : 0x0000000E92EC0000 [58.30 GB]
Reading Parititon Info...OK
Reset FRP Data...Done
Process finished
[NCK MTK Exploit Tool v1.2]
 
A032F Frp Done

SELECTED: SM-A032F
ACTION: Wipe Userdata(misc)
Start Detect phone.
Testpoint image link for this model is located in utils tab
Phone must be off(you can service this phone without battery also).
Connect Testpoint while inserting usb cable.
After booting, testpoint can be removed.
Detected: SPRD U2S Diag (COM244)
Sending payload, keep boot key untill loader start.
Exploiting phone.....
Sending preloader 1
Sending preloader 2
Sending FDL 1.....
Sending FDL 2.....
New flash metod detected.
[5f] 6290E1F [5e] 7426C5
UID: M2K535_4_28_31
FileSystem: EMMC
Read partition info is supported by loader.
Build product name: a3core
Build description: a3corexx-user 11 RP1A.201005.001 A032FXXU2AVH2 release-keys
Build Id: RP1A.201005.001
Android Release: 11
Android Version: RP1A.201005.001.A032FXXU2AVH2
Security patch: 2022-07-01
[misc]Formating userdata, wait...
[can take 0-10 sec]Wait untill phone restart.
Exe version: Unisoc Module 2.3.0
Log saved:
C:\nckDongle\spreadtrum_module\spreadtrum_module_b ackup_folder\Saved_Logs\RP1A_201005_001_A032FXXU2A VH2_format_userdata_misc.txt
Total Time: 00:00:33
Done.
 
Pop 6 Pro FRP Remove Done

[Reset FRP]
Waiting for device...Found
Port Info : MediaTek PreLoader USB VCOM_V1632 (Android) (COM19) [\\?\usb#vid_0e8d&pid_2000#5&212ac8fc&0&7#{86e0d1e0-8089-11d0-9ce4-08003e301f73}]
: MediaTek Inc., 3.0.1504.0 [usb2ser.sys]
: PRELOADER PORT
CUST_DA : INT:INFINIX V1
HW ID : MT6761 [0717] Helio A20/P22/A22/A25/G25
HW VER : 8A00,CA01,0200
Sec. Cfg : [SBA Active] [SLA Inactive] [DAA Active]
MEID : 30ECE29A528A49467992ADBBDB4AEA0D
SoC ID[0] : C5A741607B35D45F7ED2A56DCB5E1460
SoC ID[1] : E64FD1C0CC5E080B7F82CBF2F777280E
Sending DA1...Done
Running DA1...Done
Waiting DA SYNC Signal...OK
Setting Checksum Level...Done [Storage]
Connection : preloader
Speed : high-speed
Running Exploit (Old)...Done
Sending DA2...OK
Activating DA Extension...Done
HRID : 3663ED1E9DA3D3ED4C569A4F8A035723
SRAM : 0x000000000003A600 [233.50 KB]
DRAM : 0x0000000080000000 [2.00 GB]
EMMC ID : MMC32G
EMMC CID : D62D004D4D4333324751008604AD794D
BOOT[1] : 0x0000000000400000 [4.00 MB]
BOOT[2] : 0x0000000000400000 [4.00 MB]
RPMB : 0x0000000000400000 [4.00 MB]
USERAREA : 0x0000000747C00000 [29.12 GB]
Reading Parititon Info...OK
And. Ver. : 12
Build Dt. : Thu Jul 13 17:24:06 CST 2023
Display ID : TECNO-SGo-32-230713V507
Ver. Inc. : 230713V965
Locale : en-US
Patch : 2023-07-05
Reset FRP Data...Done
Process finished
[NCK MTK Exploit Tool v1.2]
LOG TXT : 20241218_190747.txt
 
Exe Version: NCK Samsung Online Tool v0.6
Brand: Samsung QC
Model: Galaxy A01 (SM-A015M) BIT5
Operation: Reset FRP
How to connect phone:
1. With phone off enter edl mode keep pressing vol+ and vol- buttons and insert usb cable
2. If this metod not work, use edl cable to force emergenty download mode.
3. If this metod not work, use testpoint to force emergenty download mode.
Searching for phone.....
Qualcomm HS-USB QDLoader 9008 (COM25) detected.
Firehose protocol: 2
HW ID: 00002000E1F00B00
PK HASH: B9D0DD5F5A3A9494EB7F47A9702F9FB91D7A9FD8125A1CE3A8 4E3D17781821C1
using loader: prog_emmc_firehose_8937_ddr_A015M_BIT5.mbn
Arhitecture:32 bits
[32]Sending loader, please wait..
Waiting for loader to start...
[1] Send NOP ok, loader start.
CPU: MSM8937
MaxPayloadSizeFromTargetInBytes: 4096
MaxPayloadSizeToTargetInBytes: 8192
Reading partition info, wait.
Volume[0] Size: 29,12 GB Partitions count: 80
[03032FD8]Userdata Size: 24,1 GB
FRP: config
Erasing Samsung FRP, wait.....
Erasing FRP, finished
Restarting phone.....
Total Time: 00:00:06
Done.
 
Back
Top