|
Welcome to the GSM-Forum forums. You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. Only registered members may post questions, contact other members or search our database of over 8 million posts. Registration is fast, simple and absolutely free so please - Click to REGISTER! If you have any problems with the registration process or your account login, please contact contact us . |
|
Register | FAQ | Donate | Forum Rules | Root any Device | ★iPhone Unlock★ | ★ Direct Codes ★ | Direct Unlock Source |
| LinkBack | Thread Tools | Display Modes |
08-28-2021, 02:18 | #2446 (permalink) |
Product Manager Join Date: Apr 2008 Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989 Status: Offline Sonork: 100.1593052 Thanks Meter: 8,621 | Xiaomi Redmi 9T (Lime) successfully flashed by Hydra Tool Xiaomi Redmi 9T (Lime) successfully flashed by Hydra Tool 1. Run Hydra Qualcomm Module and Sosc. 2. Choose Brand and Module or leave it as "Auto" 3. Go to "Flash Tool" Tab. 4. Choose Flash file and its location. 5. Dissemble the device and find its test point (Google for its test point). 6. Click on "Flash" 7. Connect Test Points with Twiser or short them together. 8. connect device to the computer with USB Data cable 9. Wait until the process is completed. Screen Short: BR Dipenda Pathak |
08-28-2021, 02:27 | #2447 (permalink) |
Product Manager Join Date: Apr 2008 Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989 Status: Offline Sonork: 100.1593052 Thanks Meter: 8,621 | Xiaomi Redmi 4X Find Device is successfully Disable by Hydra Tool Xiaomi Redmi 4X Find Device is successfully Disable by Hydra Tool 1. Run Hydra Qualcomm Module and Sosc. 2. Choose Brand and Module or leave it as "Auto" 3. Go to "Service"--> "Xiaomi" Tab. 4. Choose "Mi Account" from drop down menu. 5. Choose "Find device disable" from Flash Mode. 6. Tick "include FRP" 7. Dissemble the device and find its test point (Google for its test point). 8. Click on "Execute" 9. Connect Test Points with Twiser or short them together. 10. connect device to the computer with USB Data cable 11. Wait until the process is completed. Screen Short: BR Dipenda Pathak |
08-28-2021, 02:32 | #2448 (permalink) |
Product Manager Join Date: Apr 2008 Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989 Status: Offline Sonork: 100.1593052 Thanks Meter: 8,621 | Samsung SM-A107M (A10s) formatting Specific Partition to remover FRP done by Hydra Samsung SM-A107M (A10s) formatting Specific Partition to remover FRP done by Hydra Tool 1. Run MTK tool of Hydra Dongle. 2. Choose Correct Module and Brand. 3. Choose "Auto Broom Exploit" 4. Click on "Boot / Info" and wait it reads all. 5. Go to "PM" Tab 6. Skip "preloader" 7. Click on "Partition" button. 8. Now connect device to computer with Data Cable. 9. Wait it shows the different partition. 10. Choose "Presistent" 11. Click on "Erase" 12. Wait until the process is completed Screen Short: BR Dipenda Pathak |
08-28-2021, 08:34 | #2449 (permalink) |
No Life Poster Join Date: Jan 2020 Location: Algeria
Posts: 814
Member: 2944109 Status: Offline Thanks Meter: 656 | ACE BUZZ 1 Factory Reset + Removing FRP ACE BUZZ 1 Factory Reset + Removing FRP Factory Reset/Format Userdata Code: Port : [Auto] Scanning...COM35 Opening Port...(COM35)Ok ------------------------------------------ Factory Reset/Format Userdata... ------------------------------------------ Reading IMEI.... IMEI 1 : 3518XXXXXXXXX14 IMEI 2 : 3518XXXXXXXXX22 Executing... Factory Reset Reading System Info.. Vendor : ACE France Model : BUZZ 1 Android Ver : 8.1.0 Device : AS0218 Display ID : AS0218_V08_20181214 Security Patch : 2018-12-05 FRPPST : /dev/block/platform/soc/soc:ap-ahb/20600000.sdio/by-name/persist Fingerprint : ACE/AS0218/AS0218:8.1.0/OPM2.171019.012/90:user/release-keys ro_product_hardware : sp9832e_1h10_go Action Result..Ok Elapsed Time : 00:00:39 Code: Port : [Auto] Scanning...COM35 Opening Port...(COM35)Ok ------------------------------------------ Service_FRP_Flashmode... ------------------------------------------ Reading IMEI.... IMEI 1 : 3518XXXXXXXXX14 IMEI 2 : 3518XXXXXXXXX22 Reading System Info.. Vendor : ACE France Model : BUZZ 1 Android Ver : 8.1.0 Device : AS0218 Display ID : AS0218_V08_20181214 Security Patch : 2018-12-05 FRPPST : /dev/block/platform/soc/soc:ap-ahb/20600000.sdio/by-name/persist Fingerprint : ACE/AS0218/AS0218:8.1.0/OPM2.171019.012/90:user/release-keys ro_product_hardware : sp9832e_1h10_go Removing FRP...Ok Elapsed Time : 00:00:01 |
08-28-2021, 08:35 | #2450 (permalink) |
No Life Poster Join Date: Jan 2020 Location: Algeria
Posts: 814
Member: 2944109 Status: Offline Thanks Meter: 656 | IRIS TAB G7060 ZeroWipe FRP IRIS TAB G7060 ZeroWipe FRP Code: Searching for MTK Device...Found Port Identification :Flashmode Preloader FriendlyName :MediaTek PreLoader USB VCOM_V1632 (Android) (COM4) Device :6&12e3c9ed&0&1 SymbolicName :\??\USB#VID_0E8D&PID_2000#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver :01/22/2015,3.0.1504.0 Opened handle.. Reading System Info Brand : IRIS Vendor : IRIS Model : G7060 ID : O11019 SDK : 27 Release : 8.1.0 ABI : armeabi-v7a CPU abilist : armeabi-v7a,armeabi Locale : fr-FR Description : full_tb8735ba1_bsp-user 8.1.0 O11019 1562753373 release-keys Device : G7060 Board : G7060 Display ID : G7060-IRIS-V1-20190711 Security Patch : 2019-07-05 Fingerprint : IRIS/G7060/G7060:8.1.0/O11019/1562753373:user/release-keys StorageType : mtp Userdata State : Encrypted ------------------------------------- Operation : Auto Processing... ZeroWipe FRP Partition... [Ok] Action Result : Ok Rebooting Device [Reboot To Normal] Reboot Done!! Elapsed Time : 00:00:02 |
08-28-2021, 08:36 | #2451 (permalink) |
No Life Poster Join Date: Jan 2020 Location: Algeria
Posts: 814
Member: 2944109 Status: Offline Thanks Meter: 656 | Starlight Star Plus Plus ZeroWipe FRP Starlight Star Plus Plus ZeroWipe FRP Code: Searching for MTK Device...Found Port Identification :Flashmode Preloader FriendlyName :MediaTek PreLoader USB VCOM_V1632 (Android) (COM4) Device :6&12e3c9ed&0&1 SymbolicName :\??\USB#VID_0E8D&PID_2000#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver :01/22/2015,3.0.1504.0 Opened handle.. Reading Device UniqueID, RAM and Flash Chip Info... UNIQUE ID : B26F2A486683C16A49CA20EA44F39298 ERAM Size : 0x0000000000020000 -128 KB IRAM Size : 0x0000000040000000 -1024 MB eMMC BOOT1 : 0x0000000000400000 -4 MB eMMC BOOT2 : 0x0000000000400000 -4 MB eMMC RPMB : 0x0000000000400000 -4 MB eMMC USER : 0x00000001D2000000 -7.281 GB eMMC CID : 90014A48384731650507F0A1721F923B - H8G1e Reading GPT-EMMC [0x00008000] 130 Items Reading System Info Brand : starlight Vendor : starlight Model : star_plus_plus ID : O11019 SDK : 27 Release : 8.1.0 ABI : armeabi-v7a CPU abilist : armeabi-v7a,armeabi Locale : en-US Description : full_bird6739tv1_bsp_1g-user 8.1.0 O11019 1547111980 release-keys Device : star_plus_plus Board : star_plus_plus Display ID : 8140TQF_GA02E.MV88.P1.V00.A1.AD81.1.132.HD.20190110.TST.EN Security Patch : 2018-12-05 Fingerprint : starlight/star_plus_plus/star_plus_plus:8.1.0/O11019/1547111980:user/release-keys StorageType : mtp Userdata State : Encrypted ------------------------------------- Operation : Auto Processing... ZeroWipe FRP Partition... Action Result : Ok Rebooting Device [Reboot To Normal] Reboot Done!! Elapsed Time : 00:00:02 |
08-28-2021, 08:43 | #2454 (permalink) |
No Life Poster Join Date: Jan 2020 Location: Algeria
Posts: 814
Member: 2944109 Status: Offline Thanks Meter: 656 | Xiaomi Poco M3 (citrus) DEAD Flashing + Removing FRP Xiaomi Poco M3 (citrus) DEAD Flashing + Removing FRP Done By Hydra Tool Flashing Done Code: Searching for Qualcomm 9008 Device...Found FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM5) SymbolicName :\??\USB#VID_05C6&PID_9008#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver :03/25/2016,2.1.2.2 Getting device info...... Serial No.: 0xE4880CC3 HW_ID : 0014D0E100720000 MSM ID : 0x0014D0E1, SM_KAMORTA_H- MODEL_ID : 0x0000 OEM_ID : 0x0072 - XIAOMI PBL Ver : 00000001 PK HASH : 1bebe3863a6781db4b01086063007334de9e5ca14971c7c4f4358ec9d79cda46 Firehose Loader[0000000000720000_1bebe3863a6781db_159eb52f_XIAOMI.fhprg] -------------------------------------------------- Header Type : New TargetMSM : Tag : Version : 6 Code_size : 816 Signature_size : 256 fhVendor : XIAOMI HW_ID : 0000000000720000 Vendor : XIAOMI OEM_ID : 0072 MODEL_ID : 0000 SW_ID : 00000003 APP_ID : 00000000 pk_hash : 1bebe3863a6781db4b01086063007334de9e5ca14971c7c4f4358ec9d79cda4692ce5e948c6fd409408f4c919fcadfe3 OEM_VERSION : f2f760038334 IMAGE_VARIANT : KamortaPkgLAA QC_VERSION : BOOT.XF.4.1-00187-KAMORTALAZ-2 -------------------------------------------------- SaharaBoot... Ok Sending .................................Ok Connecting to Firehose... Ping...................... Ok Configuration........ Identifying Chip........UFS Ok Chip Configuration : MemoryName : UFS MaxPayloadSizeToTargetInBytes : 1048576 MaxPayloadSizeToTargetInBytesSupported : 1048576 MaxPayloadSizeFromTargetInBytes : MaxXMLSizeInBytes : 4096 TargetName : Version : 1 DateTime : Nov 16 2020 - 01:25:39 *** STORAGE DEVICE INFO *** Memory Type : UFS Block Size in Bytes : 4096 Page Size : 4096 Manufacturer ID : 429 Serial Number : 2037279096 Firmware Version : 002 Product Name : H9HQ15ACPMBDAR Physical Partitions : 6 Total Logical Blocks: Drive [0] 30119936[114.898 GB] Drive [1] 2048[8 MB] Drive [2] 2048[8 MB] Drive [3] 32768[128 MB] Drive [4] 1048576[4 GB] Drive [5] 32768[128 MB] Protocol : Universal Running : Ok Failed to read information from phone. Reading GPT[6] Drive [0] 32 Items Drive [1] 32 Items Drive [2] 32 Items Drive [3] 32 Items Drive [4] 64 Items Drive [5] 32 Items Backup Security partitions... Reading Security Items.... > modemst1 > modemst2 > fsg > fsc C:\Hydra Tool\Backup\Security_Backup\___Security_082721140440.sec Backup Security Success.... ---------------------------- Flashing Selected Partitions.... - vbmeta_system(0)[vbmeta_system.img] Ok - metadata(0)[metadata.img] Ok - persist(0)[persist.img] Ok - recovery(0)[recovery.img] Ok - super(0)[super.img] Ok - userdata(0)[userdata.img] Ok - PrimaryGPT(0)[gpt_main0.bin] Ok - xbl_config(1)[xbl_config.elf] Ok - xbl(1)[xbl.elf] Ok - PrimaryGPT(1)[gpt_main1.bin] Ok - xbl_configbak(2)[xbl_config.elf] Ok - xblbak(2)[xbl.elf] Ok - PrimaryGPT(2)[gpt_main2.bin] Ok - PrimaryGPT(3)[gpt_main3.bin] Ok - multiimgoem(4)[multi_image.mbn] Ok - vbmeta(4)[vbmeta.img] Ok - qupfw(4)[qupv3fw.elf] Ok - devcfg(4)[devcfg.mbn] Ok - storsec(4)[storsec.mbn] Ok - hyp(4)[hyp.mbn] Ok - hypbak(4)[hyp.mbn] Ok - cmnlib(4)[cmnlib.mbn] Ok - cmnlibbak(4)[cmnlib.mbn] Ok - cmnlib64(4)[cmnlib64.mbn] Ok - cmnlib64bak(4)[cmnlib64.mbn] Ok - keymaster(4)[km4.mbn] Ok - keymasterbak(4)[km4.mbn] Ok - bluetooth(4)[BTFM.bin] Ok - abl(4)[abl.elf] Ok - ablbak(4)[abl.elf] Ok - imagefv(4)[imagefv.elf] Ok - imagefvbak(4)[imagefv.elf] Ok - uefisecapp(4)[uefi_sec.mbn] Ok - uefisecappbak(4)[uefi_sec.mbn] Ok - featenabler(4)[featenabler.mbn] Ok - featenablerbak(4)[featenabler.mbn] Ok - misc(4)[misc.img] Ok - rpm(4)[rpm.mbn] Ok - rpmbak(4)[rpm.mbn] Ok - tz(4)[tz.mbn] Ok - tzbak(4)[tz.mbn] Ok - logfs(4)[logfs_ufs_8mb.bin] Ok - dtbo(4)[dtbo.img] Ok - dsp(4)[dspso.bin] Ok - boot(4)[boot.img] Ok - modem(4)[NON-HLOS.bin] Ok - cache(4)[cache.img] Ok - cust(4)[cust.img] Ok - PrimaryGPT(4)[gpt_main4.bin] Ok - PrimaryGPT(5)[gpt_main5.bin] Ok Flashing Patch Configuration.. 0 [NUM_DISK_SECTORS-6.] OK 0 [NUM_DISK_SECTORS-6.] OK 0 [NUM_DISK_SECTORS-6.] OK 0 [NUM_DISK_SECTORS-6.] OK 0 [NUM_DISK_SECTORS-1.] OK 0 [NUM_DISK_SECTORS-1.] OK 0 [NUM_DISK_SECTORS-5.] OK 0 [CRC32(2,4096)] OK 0 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK 0 [0] OK 0 [CRC32(1,92)] OK 0 [0] OK 0 [CRC32(NUM_DISK_SECTORS-1.,92)] OK 1 [NUM_DISK_SECTORS-6.] OK 1 [NUM_DISK_SECTORS-6.] OK 1 [NUM_DISK_SECTORS-6.] OK 1 [NUM_DISK_SECTORS-6.] OK 1 [NUM_DISK_SECTORS-1.] OK 1 [NUM_DISK_SECTORS-1.] OK 1 [NUM_DISK_SECTORS-5.] OK 1 [CRC32(2,4096)] OK 1 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK 1 [0] OK 1 [CRC32(1,92)] OK 1 [0] OK 1 [CRC32(NUM_DISK_SECTORS-1.,92)] OK 2 [NUM_DISK_SECTORS-6.] OK 2 [NUM_DISK_SECTORS-6.] OK 2 [NUM_DISK_SECTORS-6.] OK 2 [NUM_DISK_SECTORS-6.] OK 2 [NUM_DISK_SECTORS-1.] OK 2 [NUM_DISK_SECTORS-1.] OK 2 [NUM_DISK_SECTORS-5.] OK 2 [CRC32(2,4096)] OK 2 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK 2 [0] OK 2 [CRC32(1,92)] OK 2 [0] OK 2 [CRC32(NUM_DISK_SECTORS-1.,92)] OK 3 [NUM_DISK_SECTORS-6.] OK 3 [NUM_DISK_SECTORS-6.] OK 3 [NUM_DISK_SECTORS-6.] OK 3 [NUM_DISK_SECTORS-6.] OK 3 [NUM_DISK_SECTORS-1.] OK 3 [NUM_DISK_SECTORS-1.] OK 3 [NUM_DISK_SECTORS-5.] OK 3 [CRC32(2,4096)] OK 3 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK 3 [0] OK 3 [CRC32(1,92)] OK 3 [0] OK 3 [CRC32(NUM_DISK_SECTORS-1.,92)] OK 4 [NUM_DISK_SECTORS-6.] OK 4 [NUM_DISK_SECTORS-6.] OK 4 [NUM_DISK_SECTORS-6.] OK 4 [NUM_DISK_SECTORS-6.] OK 4 [NUM_DISK_SECTORS-1.] OK 4 [NUM_DISK_SECTORS-1.] OK 4 [NUM_DISK_SECTORS-5.] OK 4 [CRC32(2,8192)] OK 4 [CRC32(NUM_DISK_SECTORS-5.,8192)] OK 4 [0] OK 4 [CRC32(1,92)] OK 4 [0] OK 4 [CRC32(NUM_DISK_SECTORS-1.,92)] OK 5 [NUM_DISK_SECTORS-6.] OK 5 [NUM_DISK_SECTORS-6.] OK 5 [NUM_DISK_SECTORS-6.] OK 5 [NUM_DISK_SECTORS-6.] OK 5 [NUM_DISK_SECTORS-1.] OK 5 [NUM_DISK_SECTORS-1.] OK 5 [NUM_DISK_SECTORS-5.] OK 5 [CRC32(2,4096)] OK 5 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK 5 [0] OK 5 [CRC32(1,92)] OK 5 [0] OK 5 [CRC32(NUM_DISK_SECTORS-1.,92)] OK ---------------------------- Done! Operation : Setbootablestoragedrive: Drive 1 Set bootable storage drive 1 Ok Rebooting Phone.... Ok Elapsed Time : 00:08:14 Removing FRP Done Code: PreOperation Configuration Brand : XIAOMI Model : Poco M3 (citrus) Storage : Auto Loader: 0000000000720000_1bebe3863a6781db_159eb52f_XIAOMI.fhprg Port : Auto Searching for Qualcomm 9008 Device...Found FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM5) SymbolicName :\??\USB#VID_05C6&PID_9008#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver :03/25/2016,2.1.2.2 Getting device info...... Serial No.: 0xE4880CC3 HW_ID : 0014D0E100720000 MSM ID : 0x0014D0E1, SM_KAMORTA_H- MODEL_ID : 0x0000 OEM_ID : 0x0072 - XIAOMI PBL Ver : 00000001 PK HASH : 1bebe3863a6781db4b01086063007334de9e5ca14971c7c4f4358ec9d79cda46 Firehose Loader[0000000000720000_1bebe3863a6781db_159eb52f_XIAOMI.fhprg] -------------------------------------------------- Header Type : New TargetMSM : Tag : Version : 6 Code_size : 816 Signature_size : 256 fhVendor : XIAOMI HW_ID : 0000000000720000 Vendor : XIAOMI OEM_ID : 0072 MODEL_ID : 0000 SW_ID : 00000003 APP_ID : 00000000 pk_hash : 1bebe3863a6781db4b01086063007334de9e5ca14971c7c4f4358ec9d79cda4692ce5e948c6fd409408f4c919fcadfe3 OEM_VERSION : f2f760038334 IMAGE_VARIANT : KamortaPkgLAA QC_VERSION : BOOT.XF.4.1-00187-KAMORTALAZ-2 -------------------------------------------------- SaharaBoot... Ok Sending .................................Ok Connecting to Firehose... Ping...................... Ok Configuration........ Identifying Chip........UFS Ok Chip Configuration : MemoryName : UFS MaxPayloadSizeToTargetInBytes : 1048576 MaxPayloadSizeToTargetInBytesSupported : 1048576 MaxPayloadSizeFromTargetInBytes : MaxXMLSizeInBytes : 4096 TargetName : Version : 1 DateTime : Nov 16 2020 - 01:25:39 *** STORAGE DEVICE INFO *** Memory Type : UFS Block Size in Bytes : 4096 Page Size : 4096 Manufacturer ID : 429 Serial Number : 2037279096 Firmware Version : 002 Product Name : H9HQ15ACPMBDAR Physical Partitions : 6 Total Logical Blocks: Drive [0] 30119936[114.898 GB] Drive [1] 2048[8 MB] Drive [2] 2048[8 MB] Drive [3] 32768[128 MB] Drive [4] 1048576[4 GB] Drive [5] 32768[128 MB] Protocol : Universal Running : Ok Failed to read information from phone. Reading GPT[6] Drive [0] 32 Items Drive [1] 32 Items Drive [2] 32 Items Drive [3] 32 Items Drive [4] 64 Items Drive [5] 32 Items Removing FRPta... Method : Auto Processing... - Removing FRP Executing ... - Removing FRP [Zero Wipe] OkOkOk Elapsed Time : 00:00:07 |
08-29-2021, 02:16 | #2455 (permalink) |
Product Manager Join Date: Apr 2008 Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989 Status: Offline Sonork: 100.1593052 Thanks Meter: 8,621 | Huawei Hisilicon RNE-Aloo (Maimang 6) Huawei Account successfully removed by Hydra Tool 1. Run Hydra Main Tool. 2. Choose "Hisilicon" Tab. 3. Choose "Module" 4. Tick "Auto Boot" 5. Choose "Service" Tab 6. Choose "Factory Reset Protection / Account" from drop down menu. 7. Choose "Remove Huawei ID" 8. Click on "Execute" 9. Connect the device to the compute with the help of Data Cable. 10. Wait until the operation is completed. Screen Short: BR Dipenda Pathak |
08-29-2021, 02:17 | #2456 (permalink) |
Product Manager Join Date: Apr 2008 Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989 Status: Offline Sonork: 100.1593052 Thanks Meter: 8,621 | Huawei Hisilicon RNE-Aloo (Maiming 6) Huawei Account successfully removed by Hydra To Huawei Hisilicon RNE-Aloo (Maimang 6) Huawei Account successfully removed by Hydra Tool 1. Run Hydra Main Tool. 2. Choose "Hisilicon" Tab. 3. Choose "Module" 4. Tick "Auto Boot" 5. Choose "Service" Tab 6. Choose "Factory Reset Protection / Account" from drop down menu. 7. Choose "Remove Huawei ID" 8. Click on "Execute" 9. Connect the device to the compute with the help of Data Cable. 10. Wait until the operation is completed. Screen Short: BR Dipenda Pathak |
08-29-2021, 02:21 | #2457 (permalink) |
Product Manager Join Date: Apr 2008 Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989 Status: Offline Sonork: 100.1593052 Thanks Meter: 8,621 | Huawei Hisilicon RNE-L22-(Nova 2i) FRP successfully removed by Hydra Tool Huawei Hisilicon RNE-L22-(Nova 2i) FRP successfully removed by Hydra Tool 1. Run Hydra Main Tool. 2. Choose "Hisilicon" Tab. 3. Choose "Module" 4. Tick "Auto Boot" 5. Choose "Service" Tab 6. Choose "Factory Reset Protection / Account" from drop down menu. 7. Choose "Remove FRP" 8. Click on "Execute" 9. Connect the device to the compute with the help of Data Cable. 10. Wait until the operation is completed. Screen Short: BR Dipenda Pathak |
08-29-2021, 02:32 | #2458 (permalink) |
Product Manager Join Date: Apr 2008 Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989 Status: Offline Sonork: 100.1593052 Thanks Meter: 8,621 | Huawei Hisilicon PRA-LX2 (Y7A) FRP successsfully removed by Hydra Tool Huawei Hisilicon PRA-LX2 (Y7A) FRP successsfully removed by Hydra Tooll This operation goes from FasbBoot Mode: 1. Run Main Tool" 2. Choose Brand and Module or leave as "Auto" 3. Go to "HiSilicon" 4. Choose "Module" 5. Untick "Auto Boot" Choose: CPUID "kirin 655" Loader: LODER "kirin655.fb" 6. Go to "Service" 7. Choose "Factory Reset Protection / Account" 8. Choose "Remove FRP" from Fastboot. 9. Click "Execute" 10. Connect device to computer using USB Data Cable. 11. Wait until the operation is completed. Screen Short: BR Dipenda Pathak |
08-29-2021, 02:37 | #2459 (permalink) |
Product Manager Join Date: Apr 2008 Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989 Status: Offline Sonork: 100.1593052 Thanks Meter: 8,621 | Huawei L23 ( Y9A 2021) Restore OEM info successfully done by Hydra Tool Huawei L23 ( Y9A 2021) Restore OEM info successfully done by Hydra Tool 1. Run MTK Hydra Tool. 2. Choose "Brand" and "Module". 3. Go to "Service"--> "Tool" 4. Choose "Huawei" 5. Chose "Restore OEM Info" from "Method/ Option" drop down option. 6. Click "Execute". 7. Connect Device to computer using USB Data Cable. 8. Wait until the operation is completed. Screen Short: BR Dipenda Pathak |
08-29-2021, 14:43 | #2460 (permalink) |
No Life Poster Join Date: Jan 2013 Location: gsmhosting Age: 29
Posts: 1,148
Member: 1876736 Status: Offline Thanks Meter: 735 | redmi note 9 unlock bootloader done Code: ===================================== Searching for MTK Device...Found Port Identification :Flashmode BROM FriendlyName :MediaTek USB Port (COM3) Device :5&15c311e1&0&9 SymbolicName :\??\USB#VID_0E8D&PID_0003#5&15c311e1&0&9#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver :01/22/2016,3.0.1504.0 Opened handle.. Reading Device UniqueID, RAM and Flash Chip Info... UNIQUE ID : B7983B4E0F329B353D27BEEB38FD6E71 ERAM Size : 0x0000000000070000 -448 KB IRAM Size : 0x0000000100000000 -4 GB eMMC BOOT1 : 0x0000000000400000 -4 MB eMMC BOOT2 : 0x0000000000400000 -4 MB eMMC RPMB : 0x0000000001000000 -16 MB eMMC USER : 0x0000001D1F000000 -116.484 GB eMMC CID : 90014A68444561503303108B0CFA8721 - hDEaP3 Reading GPT-EMMC [0x00008000] 130 Items ------------------------------------- Operation : Unlock Bootloader Processing... ------------------------------- Bootloader Status... Bootloader : Locked ------------------------------- Verifying status after operation... ------------------------------- Bootloader Status... Bootloader : Unlocked ------------------------------- Action Result : Ok Rebooting Device [Reboot To Normal] Reboot Done!! Elapsed Time : 00:00:03 |
Bookmarks |
| |
|