![]() ![]() ![]() ![]() |
![]() |
Welcome to the GSM-Forum forums. You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. Only registered members may post questions, contact other members or search our database of over 8 million posts. Registration is fast, simple and absolutely free so please - Click to REGISTER! If you have any problems with the registration process or your account login, please contact contact us . |
|
Register | FAQ | Donate | Forum Rules | Root any Device | ★iPhone Unlock★ | ★ Direct Codes ★ | Direct Unlock Source | Search | Today's Posts | Mark Forums Read |
![]() |
| LinkBack | Thread Tools | Display Modes |
![]() | #1906 (permalink) |
No Life Poster ![]() ![]() ![]() ![]() ![]() Join Date: Jan 2020 Location: Algeria
Posts: 847
Member: 2944109 Status: Offline Thanks Meter: 712 | Redmi Note 8 (ginkgo) No Service Fixed Fixed Fixed Writing Selected Partitions persist from firmware BY HYDRA TOOL ![]() ![]() Code: FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM10) SymbolicName :\??\USB#VID_05C6&PID_9008#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver :03/19/2014,2.1.1.2 Getting device info..Ok Device MODE : Firehose Connecting to Firehose... Ping..................... Ok Configuration......... Identifying Chip.... Ok Chip Configuration : MemoryName : eMMC MaxPayloadSizeToTargetInBytes : 16384 MaxPayloadSizeToTargetInBytesSupported : 16384 MaxPayloadSizeFromTargetInBytes : MaxXMLSizeInBytes : 4096 TargetName : Version : 1 DateTime : Jul 3 2019 - 22:23:56 *** STORAGE DEVICE INFO *** Memory Type : eMMC Block Size in Bytes : 512 Page Size : 512 Manufacturer ID : 19 Serial Number : 444241469 Firmware Version : 4 Product Name : S0J9K8 Physical Partitions : 4 Total Logical Blocks: Drive [0] 122142720[58,242 GB] Drive [1] 8192[4 MB] Drive [2] 8192[4 MB] Drive [3] 32768[16 MB] Protocol : UniversalOk Phone Information...... Brand : xiaomi Vendor : Xiaomi Model : Redmi Note 8 ID : PKQ1.190616.001 SDK : 28 Release : 9 ABI : arm64-v8a CPU abilist : arm64-v8a,armeabi-v7a,armeabi Locale : en-GB Description : ginkgo-user 9 PKQ1.190616.001 V11.0.9.0.PCOMIXM release-keys Miui Ver : V11 Device : ginkgo Mod_device : ginkgo_global Display ID : PKQ1.190616.001 Security Patch : 2020-05-01 Fingerprint : xiaomi/ginkgo/ginkgo:9/PKQ1.190616.001/V11.0.9.0.PCOMIXM:user/release-keys Reading GPT[4] Drive [0] 88 Items Drive [1] 0 Items Drive [2] 0 Items Drive [3] Writing Selected Partitions > persist Ok Done! Elapsed Time : 00:00:18 ![]() |
![]() |
![]() | #1907 (permalink) |
No Life Poster ![]() ![]() ![]() ![]() ![]() Join Date: Jan 2020 Location: Algeria
Posts: 847
Member: 2944109 Status: Offline Thanks Meter: 712 | Condor Plume L3 SP625 Dump Preloader Flash Init + Format/Erase FRP Condor Plume L3 SP625 Dump Preloader Flash Init + Format/Erase FRP Dump Preloader Flash Init ![]() Code: Searching for MTK Device...Found Port Identification :Flashmode BROM FriendlyName :MediaTek USB Port_V1632 (COM10) Device :6&12e3c9ed&0&1 SymbolicName :\??\USB#VID_0E8D&PID_0003#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver :01/22/2015,3.0.1504.0 Handshaking...Ok Reading Device hardware info.. hw code : 0699 hw subcode : 8A00 hw version : CA00 sw version : 0000 Target config : E5 SB : 01 (True) SLA : 00 (False) DAA : 04 (True) Exploiting BROM... Successfully Exploited.. Reading Flash Init... Flash init Size 0x02A4 Done!!! ---------------------------------------------------------- C:\Hydra Tool\Backup\Prel_FlashInit\0699_preloader_k39tv1_64_bsp_12D2D3FA78.bin ---------------------------------------------------------- ![]() Code: Searching for MTK Device...Found Port Identification :Flashmode BROM FriendlyName :MediaTek USB Port_V1632 (COM10) Device :6&12e3c9ed&0&1 SymbolicName :\??\USB#VID_0E8D&PID_0003#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver :01/22/2015,3.0.1504.0 Handshaking...Ok Identifying Hardware ID..... Reading Device hardware info.. hw code : 0699MT6739 [6739] hw subcode : 8A00 hw version : CA00 sw version : 0000 Target config : E5 SB : 01 (True) SLA : 00 (False) DAA : 04 (True) Exploiting Device... Successfully Exploited... Handshaking...Ok Identifying Hardware ID..... Reading Device hardware info.. hw code : 0699MT6739 [6739] hw subcode : 8A00 hw version : CA00 sw version : 0000 Target config : 00 SB : 00 (False) SLA : 00 (False) DAA : 00 (False) FUSEID : 00000000 SECURE VERSION : 00 BL VERSION : FE NORMAL BOOT Preparing Download Agent.. DA : [Not Exist] Trying Default 6739.bin Agent: MTK_DOWNLOAD_AGENT -HYDRA Ver : MTK_AllInOne_DA_v3.3001.2020-11-03.22:07_536568 Init : Loader [1] Sending : Accepted Identifying Protocol... Protocol : New Synchronization...SYNC Mode : brom Preloader Initialization... Parsing 0699_preloader_k39tv1_64_bsp_12D2D3FA78.bin Init : Accepted Execute Secondary Loader Init : Loader [2] Executing : SYNC Reading Device UniqueID, RAM and Flash Chip Info... UNIQUE ID : 376586D07153CD86069C5F4D3E8CB3E0 ERAM Size : 0x0000000000020000 -128 KB IRAM Size : 0x00000000C0000000 -3 GB eMMC BOOT1 : 0x0000000000400000 -4 MB eMMC BOOT2 : 0x0000000000400000 -4 MB eMMC RPMB : 0x0000000000400000 -4 MB eMMC USER : 0x0000000747C00000 -29,121 GB eMMC CID : 150100474436424D42018D7C979525DF - GD6BMB DA Speed : high-speed Reading GPT-EMMC [0x00008000] 130 Items Reading System Info Brand : Condor Vendor : SPA Condor Electronics Model : Plume L3 ID : O11019 SDK : 27 Release : 8.1.0 ABI : arm64-v8a CPU abilist : arm64-v8a,armeabi-v7a,armeabi Locale : en-US Description : full_k39tv1_64_bsp-user 8.1.0 O11019 1523506141 release-keys Device : Plume_L3 Board : CSW1705A Display ID : Plume_L3 Security Patch : 2018-05-05 Fingerprint : Condor/Plume_L3/Plume_L3:8.1.0/O11019/1523506141:user/release-keys StorageType : mtp Userdata State : Encrypted Autobackup Partitions -preloader[0x00000000]512 KB ->preloader.bin...Ok -> Renaming Preloader.... preloader_k39tv1_64_bsp.bin Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0699_Condor_Plume_L3_Plume_L3_8.1.0_O11019_1523506141_051521111252\MT6739_Android_scatter.txt -pgpt[0x00000000]32 KB ->pgpt.bin...Ok -frp[0x02D88000]1024 KB ->frp.bin...Ok -nvdata[0x03688000]32 MB ->nvdata.bin...Ok -persist[0x09000000]48 MB ->persist.bin...Ok -nvram[0x13780000]5 MB ->nvram.bin...Ok Done!!! C:\Hydra Tool\\Backup\Auto\0699_Condor_Plume_L3_Plume_L3_8.1.0_O11019_1523506141_051521111252 MTK Phone Loader is NOW RUNNING. Reading Device UniqueID, RAM and Flash Chip Info... UNIQUE ID : 376586D07153CD86069C5F4D3E8CB3E0 ERAM Size : 0x0000000000020000 -128 KB IRAM Size : 0x00000000C0000000 -3 GB eMMC BOOT1 : 0x0000000000400000 -4 MB eMMC BOOT2 : 0x0000000000400000 -4 MB eMMC RPMB : 0x0000000000400000 -4 MB eMMC USER : 0x0000000747C00000 -29,121 GB eMMC CID : 150100474436424D42018D7C979525DF - GD6BMB Reading GPT-EMMC [0x00008000] 130 Items Reading System Info Brand : Condor Vendor : SPA Condor Electronics Model : Plume L3 ID : O11019 SDK : 27 Release : 8.1.0 ABI : arm64-v8a CPU abilist : arm64-v8a,armeabi-v7a,armeabi Locale : en-US Description : full_k39tv1_64_bsp-user 8.1.0 O11019 1523506141 release-keys Device : Plume_L3 Board : CSW1705A Display ID : Plume_L3 Security Patch : 2018-05-05 Fingerprint : Condor/Plume_L3/Plume_L3:8.1.0/O11019/1523506141:user/release-keys StorageType : mtp Userdata State : Encrypted ------------------------------------- Operation : Format/Erase Processing... Erasing FRP Partition... Ok Rebooting Device [Reboot To Normal] Reboot Done!! Elapsed Time : 00:00:50 |
![]() |
![]() | #1909 (permalink) |
No Life Poster ![]() ![]() ![]() ![]() ![]() Join Date: Jan 2020 Location: Algeria
Posts: 847
Member: 2944109 Status: Offline Thanks Meter: 712 | Oppo A15 (CPH2185) Ultra Power Option (FRP+Factory Reset) Oppo A15 (CPH2185) Ultra Power Option (FRP+Factory Reset) ![]() Code: ===================================== Searching for MTK Device...Found Port Identification :Flashmode BROM FriendlyName :MediaTek USB Port_V1632 (COM10) Device :6&12e3c9ed&0&1 SymbolicName :\??\USB#VID_0E8D&PID_0003#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver :01/22/2015,3.0.1504.0 Handshaking...Ok Identifying Hardware ID..... Reading Device hardware info.. hw code : 0766MT6765 [6765] hw subcode : 8A00 hw version : CA00 sw version : 0000 Target config : E5 SB : 01 (True) SLA : 00 (False) DAA : 04 (True) Exploiting Device... Exploit Sent.. Successfully Exploited... Handshaking...Ok Identifying Hardware ID..... Reading Device hardware info.. hw code : 0766MT6765 [6765] hw subcode : 8A00 hw version : CA00 sw version : 0000 Target config : 00 SB : 00 (False) SLA : 00 (False) DAA : 00 (False) FUSEID : 00000000 SECURE VERSION : 05 BL VERSION : FE NORMAL BOOT Preparing Download Agent.. DA : [Not Exist] Trying Default 6765.bin Agent: MTK_DOWNLOAD_AGENT -HYDRA Ver : MTK_AllInOne_DA_v3.3001.2020/03/17.ÉIIç10:04_497508 Init : Loader [1] Sending : Accepted Identifying Protocol... Protocol : New Synchronization...SYNC Mode : brom Preloader Initialization... Parsing A15s_preloader_oppo6765.bin Init : Accepted Execute Secondary Loader Init : Loader [2] Executing : SYNC Reading Device UniqueID, RAM and Flash Chip Info... UNIQUE ID : 61B069BCE2498712BE2ACF0B95FBD285 ERAM Size : 0x0000000000080000 -512 KB IRAM Size : 0x0000000080000000 -2 GB eMMC BOOT1 : 0x0000000000400000 -4 MB eMMC BOOT2 : 0x0000000000400000 -4 MB eMMC RPMB : 0x0000000000400000 -4 MB eMMC USER : 0x0000000747C00000 -29,121 GB eMMC CID : 1501003458364B4D42035C3BD488A747 - 4X6KMB DA Speed : high-speed Reading GPT-EMMC [0x00008000] 130 Items Autobackup Partitions -preloader[0x00000000]512 KB ->preloader.bin...Ok -> Renaming Preloader.... preloader_oppo6765.bin Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0766__052121185538\MT6765_Android_scatter.txt -pgpt[0x00000000]32 KB ->pgpt.bin...Ok -frp[0x15088000]1024 KB ->frp.bin...Ok -nvdata[0x17188000]64 MB ->nvdata.bin...Ok -protect1[0x1E822000]8 MB ->protect1.bin...Ok -protect2[0x1F022000]15,867 MB ->protect2.bin...Ok -persist[0x20800000]48 MB ->persist.bin...Ok -nvram[0x2C600000]64 MB ->nvram.bin...Ok Done!!! C:\Hydra Tool\\Backup\Auto\0766__052121185538 MTK Phone Loader is NOW RUNNING. Reading Device UniqueID, RAM and Flash Chip Info... UNIQUE ID : 61B069BCE2498712BE2ACF0B95FBD285 ERAM Size : 0x0000000000080000 -512 KB IRAM Size : 0x0000000080000000 -2 GB eMMC BOOT1 : 0x0000000000400000 -4 MB eMMC BOOT2 : 0x0000000000400000 -4 MB eMMC RPMB : 0x0000000000400000 -4 MB eMMC USER : 0x0000000747C00000 -29,121 GB eMMC CID : 1501003458364B4D42035C3BD488A747 - 4X6KMB Reading GPT-EMMC [0x00008000] 130 Items ------------------------------------- Operation : Auto Processing... ZeroWipe FRP Partition... Safeformat Universal... Ok Rebooting Device [Reboot To Normal] Reboot Done!! Elapsed Time : 00:00:46 |
![]() |
![]() | #1910 (permalink) |
No Life Poster ![]() ![]() ![]() ![]() ![]() Join Date: Jan 2020 Location: Algeria
Posts: 847
Member: 2944109 Status: Offline Thanks Meter: 712 | Brandt BPRIME ZeroWipe FRP Partition Brandt BPRIME ZeroWipe FRP Partition ![]() Code: ===================================== Searching for MTK Device...Found Port Identification :Flashmode Preloader FriendlyName :MediaTek PreLoader USB VCOM_V1632 (Android) (COM4) Device :6&12e3c9ed&0&1 SymbolicName :\??\USB#VID_0E8D&PID_2000#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver :01/22/2015,3.0.1504.0 Reading Device UniqueID, RAM and Flash Chip Info... ERROR : ACK : 0x00010009[] Reading GPT-EMMC [0x00008000] 130 Items Reading System Info Brand : Brandt Vendor : Brandt Model : BPRIME ID : O11019 SDK : 27 Release : 8.1.0 ABI : arm64-v8a CPU abilist : arm64-v8a,armeabi-v7a,armeabi Locale : fr-DZ Description : full_d3966_2g-user 8.1.0 O11019 1540283952 release-keys Device : BPRIME Display ID : BTA57H8S_V1.03 Security Patch : 2018-10-05 Fingerprint : Brandt/BPRIME/BPRIME:8.1.0/O11019/1540283952:user/release-keys StorageType : mtp Userdata State : Encrypted ------------------------------------- Operation : Auto Processing... ZeroWipe FRP Partition... Ok Rebooting Device [Reboot To Normal] Reboot Done!! Elapsed Time : 00:00:03 |
![]() |
![]() | #1911 (permalink) |
No Life Poster ![]() ![]() ![]() ![]() ![]() Join Date: Jan 2020 Location: Algeria
Posts: 847
Member: 2944109 Status: Offline Thanks Meter: 712 | Doogee VOYAGER2 (DG310) Test EMMC ReadWrite Doogee VOYAGER2 (DG310) Test EMMC ReadWrite ![]() Code: Searching for MTK Device...Found Port Identification :Flashmode Preloader FriendlyName :MediaTek PreLoader USB VCOM_V1632 (Android) (COM4) Device :6&12e3c9ed&0&1 SymbolicName :\??\USB#VID_0E8D&PID_2000#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver :01/22/2015,3.0.1504.0 Handshaking...Ok Identifying Hardware ID..... Reading Device hardware info.. hw code : 6582MT6582 [6582] hw subcode : 8A00 hw version : CB00 sw version : 0001 Target config : 00 SB : 00 (False) SLA : 00 (False) DAA : 00 (False) FUSEID : 80030000 SECURE VERSION : FF BL VERSION : 01 Preparing Download Agent.. DA : 6582.bin Agent: MTK_DOWNLOAD_AGENT -HYDRA Ver : MTK_AllInOne_DA_v3.3001.2018-09-18.13:22_452898 Init : Loader [1] Sending : Accepted Identifying Protocol... Protocol : Old C4 - eMMC 0005 00000000000000000000 PRMMCCID : 90014A4838473165050764A1CCBA9257 Init Configuration Running DA 4.2 on BBID : 0x87 Ok Initializing Loader [2] Sending Loader [2] Accepted Reading Flashchip data.... eMMC BOOT1 : 0x0000000000400000 -4 MB eMMC BOOT2 : 0x0000000000400000 -4 MB eMMC RPMB : 0x0000000000400000 -4 MB eMMC USER : 0x00000001D2000000 -7,281 GB ERAM Size : 0x0000000040000000 -1024 MB IRAM Size : 0x0000000000020000 -128 KB UNICAL RID : BB46B8066263B7C7352A37905371718E eMMC CID : 484A019065314738A16407055792BACC Change to HIGH SPEED... 5A Searching for MTK Device...Found Port Identification :DA_HIGHSPEED_VCOM FriendlyName :MediaTek DA USB VCOM (Android) (COM5) Device :6&12e3c9ed&0&1 SymbolicName :\??\USB#VID_0E8D&PID_2001#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver :01/22/2015,3.0.1504.0 Reading Partition Table SIZE[0x000007E0] 21 Items > Done Reading System Info Brand : DOOGEE Vendor : DOOGEE Model : VOYAGER2_DG310 ID : LRX21M SDK : 21 Release : 5.0 ABI : armeabi-v7a CPU abilist : armeabi-v7a,armeabi Description : VOYAGER2_DG310-user 5.0 LRX21M 1444964272 release-keys Device : VOYAGER2_DG310 Board : dg_82 Display ID : DOOGEE-VOYAGER2_DG310-Android5.0-V35-20151016 Platform : mt6582 Fingerprint : DOOGEE/VOYAGER2_DG310/VOYAGER2_DG310:5.0/LRX21M/1444964272:user/release-keys StorageType : mtp,mass_storage Userdata State : Not Encrypted Autobackup Partitions -PRELOADER[0x00000000] 512 KB -> PRELOADER.bin...Ok -> Renaming Preloader.... preloader_dg_82.bin Creating Scatter file... C:\Hydra Tool\\Backup\Auto\6582_DOOGEE_VOYAGER2_DG310_VOYAGER2_DG310_5.0_LRX21M_1444964272_052221134335\MT6582_Android_scatter.txt -NVRAM[0x01800000] 5 MB -> NVRAM.bin...Ok Done!!! C:\Hydra Tool\\Backup\Auto\6582_DOOGEE_VOYAGER2_DG310_VOYAGER2_DG310_5.0_LRX21M_1444964272_052221134335 MTK Phone Loader is NOW RUNNING. Reading System Info Brand : DOOGEE Vendor : DOOGEE Model : VOYAGER2_DG310 ID : LRX21M SDK : 21 Release : 5.0 ABI : armeabi-v7a CPU abilist : armeabi-v7a,armeabi Description : VOYAGER2_DG310-user 5.0 LRX21M 1444964272 release-keys Device : VOYAGER2_DG310 Board : dg_82 Display ID : DOOGEE-VOYAGER2_DG310-Android5.0-V35-20151016 Platform : mt6582 Fingerprint : DOOGEE/VOYAGER2_DG310/VOYAGER2_DG310:5.0/LRX21M/1444964272:user/release-keys StorageType : mtp,mass_storage Userdata State : Not Encrypted ------------------------------------- Operation : ReadWrite Test Processing... [Ok] Verifying read write... [Ok] Ok Elapsed Time : 00:00:29 |
![]() |
![]() | #1912 (permalink) |
No Life Poster ![]() ![]() ![]() ![]() ![]() Join Date: Jan 2020 Location: Algeria
Posts: 847
Member: 2944109 Status: Offline Thanks Meter: 712 | Condor Plume H1 (SP620) FRP Remove Condor Plume H1 (SP620) FRP Remove ![]() Code: PreOperation Configuration Brand : CONDOR Model : Plume H1 Storage : Auto Loader: Mi_8953.mbn Port : Auto Connection : Searching for Qualcomm 9008 Device...Found FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM10) SymbolicName :\??\USB#VID_05C6&PID_9008#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver :08/02/2017,2.1.2.7 Getting device info..Ok Device MODE : Firehose Connecting to Firehose... Ping.. Ok Configuration...... Identifying Chip.... Ok Chip Configuration : MemoryName : eMMC MaxPayloadSizeToTargetInBytes : 1048576 MaxPayloadSizeToTargetInBytesSupported : 1048576 MaxPayloadSizeFromTargetInBytes : 4096 MaxXMLSizeInBytes : 4096 TargetName : 8953 Version : 1 *** STORAGE DEVICE INFO *** Memory Type : eMMC Block Size in Bytes : 512 Page Size : 512 Manufacturer ID : 144 Serial Number : 397414501 Firmware Version : 165 Product Name : HAG4a2 Physical Partitions : 3 Total Logical Blocks: Drive [0] 30777344[14,676 GB] Drive [1] 8192[4 MB] Drive [2] 8192[4 MB] Protocol : Universal Running : Ok Phone Information..... Brand : Condor Vendor : SPA Condor Electronics Model : Plume H1 ID : N2G47H SDK : 25 Release : 7.1.2 ABI : arm64-v8a CPU abilist : arm64-v8a,armeabi-v7a,armeabi Locale : fr-FR Description : msm8953_64-user 7.1.2 N2G47H 9022 release-keys Device : SP620 Board : SP620 Display ID : N2G47H release-keys Security Patch : 2017-09-01 Emmc_size : 16GB Platform : msm8953 FRPPST : /dev/block/bootdevice/by-name/config Fingerprint : Condor/SP620/SP620:7.1.2/N2G47H/SP620_V11.0_20170925:user/release-keys Reading GPT[3] Drive [0] 48 Items Drive [1] 0 Items Drive [2] 0 Items Removing FRPta... Method : Auto Processing... - Removing FRP Executing ... - Removing FRP [Zero Wipe] OkOkOk Rebooting Phone.... Ok If not rebooted, Please Power on Manually Elapsed Time : 00:00:06 |
![]() |
![]() | #1914 (permalink) | |
Product Manager ![]() ![]() ![]() ![]() ![]() Join Date: Apr 2008 Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989 Status: Offline Sonork: 100.1593052 Thanks Meter: 8,625 | Huawei JAT-L41 (Honor Play 8A) Account remove successfully done by Hydra Tool Huawei JAT-L41 (Honor Play 8A) Account remove successfully done by Hydra Tool 1. Run Hydra MTK Tool 2. Choose Brand and Module 3. Go to "Service"--> "Tool" 4. Choose "Huawei" 5. Choose "Remove Account" from 'Method / OPtion" drop down menu 6. Click on "Execute" 7. Connect cellphone with computer using USB Data Cable. 8. Wait until the operation is completed. Screen Shorts ![]() Logs Quote:
Dipendra Pathak | |
![]() |
![]() | #1915 (permalink) | |
Product Manager ![]() ![]() ![]() ![]() ![]() Join Date: Apr 2008 Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989 Status: Offline Sonork: 100.1593052 Thanks Meter: 8,625 | Xiaomi Redmi 5A Bootloader unlock successfully done by Hydra Tool Xiaomi Redmi 5A Bootloader unlock successfully done by Hydra Tool 1. Run Hydra Qualcomm Module and choose "Sosc" 2. Select Brand and Model as "Auto" 3. Go to Service-->Xiaoami 4. Choose "Bootloader" from drop down menu 5. Choose "Unlock Universal Auto" 6. Execute and connect the device to the computer with data cable 7. wait until the process is completed. Screen Shorts ![]() Logs Quote:
Dipendra Pathak | |
![]() |
![]() | #1916 (permalink) | |
Product Manager ![]() ![]() ![]() ![]() ![]() Join Date: Apr 2008 Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989 Status: Offline Sonork: 100.1593052 Thanks Meter: 8,625 | Huawei FRL-L22 (Y9A) Repair 2 IMEI successfully done by Hydra Tool Huawei FRL-L22 (Y9A) Repair 2 IMEI successfully done by Hydra Tool 1. Run Hydra MTK Tool 2. Choose Brand and Module 3. Go to "Service"--> "Repair IMEI" 4. Tick "IMEI change....Illigal...... 5. Choose "Huawei Flash Mode" from drop down menu. 6. Tick both IMEI to active box and type both IMEI as written in battery housing of the cellphone. 7. Click on "Repair IMEI" 8. Connect cellphone with computer using USB Data Cable. 9. Wait until the operation is completed. Screen Shorts ![]() Logs Quote:
Dipendra Pathak | |
![]() |
![]() | #1919 (permalink) | |
Product Manager ![]() ![]() ![]() ![]() ![]() Join Date: Apr 2008 Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989 Status: Offline Sonork: 100.1593052 Thanks Meter: 8,625 | Huawei KOB2-W09 (Mated Pad T8) restoring OEM Infor successfully done by Hydra Tool 1. Run MTK Hydra Tool. Screen Short:2. Choose "Brand" and "Module". 3. Go to "Service"--> "Tool" 4. Choose "Huawei" 5. Chose "Restore OEM Info" from "Method/ Option" drop down option. 6. Click "Execute". 7. Connect Device to computer using USB Data Cable. 8. Wait until the operation is completed. ![]() Logs: Quote:
Dipendra Pathak | |
![]() |
![]() | #1920 (permalink) | |
Product Manager ![]() ![]() ![]() ![]() ![]() Join Date: Apr 2008 Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989 Status: Offline Sonork: 100.1593052 Thanks Meter: 8,625 | Huawei MED-LX9 (Y6P 2020) restoreing OEM info successfully done by Hydra Tool Huawei MED-LX9 (Y6P 2020) restoreing OEM info successfully done by Hydra Tool 1. Run MTK Hydra Tool. 2. Choose "Brand" and "Module". 3. Go to "Service"--> "Tool" 4. Choose "Huawei" 5. Chose "Restore OEM Info" from "Method/ Option" drop down option. 6. Click "Execute". 7. Connect Device to computer using USB Data Cable. 8. Wait until the operation is completed. Screen Short: ![]() Logs: Quote:
Dipendra Pathak | |
![]() |
![]() |
Bookmarks |
Thread Tools | |
Display Modes | |
| |
|