Online
Xiaomi Redmi A1 hacer f4 imei con umt
Credicto
canguiri
Primero, es necesario quitar la resistencia de protección por hardware.
Segundo, es necesario abrir bootloader para realizar el procedimiento
Brand/Model : *Auto* / *Auto Detect*
Operation : Unlock Bootloader
Waiting for Device...Found
Port : MediaTek USB Port (COM43)
Device Path : \\?\usb#vid_0e8d&pid_0003#5&109d12e&0&2#{86e0d1e0-8089-11d0-9ce4-08003e301f73}
Driver : MediaTek Inc., 3.0.1504.0 [usb2ser.sys]
Mode : BROM
Hw ID : MT6761 [0717] Helio A20/P22/A22/A25/G25
Details : 8A00,CA01,0200
Sec. Config : [SBA:True] [SLA:True] [DAA:True]
MEID : E4F5F4BA4055A14C96720ADB2E2CBB71
SoC ID[0] : 3725B1DB42DFF646775B97FDC5B2801E
SoC ID[1] : 4C467CE4CF05F9DDE904567D14F929D2
Running Exploit...Done
Downloading Preloader...OK
Saved as : preloader_ice.bin
Loading EMI Config from Preloader...OK
Sec. Config : [SBA:False] [SLA:False] [DAA:False]
Using Internal DA!
DA Security Patched
Sending 1st DA...OK
Jump DA Address...OK
Syncing...OK
Checksum Level is Storage
Connection : brom
Speed : HIGH-SPEED
Reading RAM Configuration...OK
Reading EMI Configuration...OK
CID : 9B0100593250303332008B0B20DB69C9 [EMMC]
Initializing Storage...OK
Sending 2nd DA...OK
Initialize DA Extension...OK
Int. RAM : 0x0000000000039000 [228.00 KB]
Ext. RAM : 0x0000000080000000 [2.00 GB]
Flash ID : Y2P032
CID : 9B0100593250303332008B0B20DB69C9
BOOT1 : 0x0000000000400000 [4.00 MB]
BOOT2 : 0x0000000000400000 [4.00 MB]
RPMB : 0x0000000001000000 [16.00 MB]
USERAREA : 0x0000000747C00000 [29.12 GB]
Connected to High-Speed DA Port
Reading Partition Table...OK
Bootloader : LOCKED
Reading Bootloader Data...OK
Bootloader : LOCKED
Unlocking Bootloader...OK
Operation Finished.
[UltimateMTK2 v0.9]
ya que quitaron la resistencia y abrieron el bootloader, abrimos UMT en UMTv2 - UltimateMTK2 y realizamos un backup de los security items.
MEID : E4F5F4BA4055A14C96720ADB2E2CBB71
SoC ID[0] : 3725B1DB42DFF646775B97FDC5B2801E
SoC ID[1] : 4C467CE4CF05F9DDE904567D14F929D2
Running Exploit...Done
Downloading Preloader...OK
Saved as : preloader_ice.bin
Loading EMI Config from Preloader...OK
Sec. Config : [SBA:False] [SLA:False] [DAA:False]
Using Internal DA!
DA Security Patched
Sending 1st DA...OK
Jump DA Address...OK
Syncing...OK
Checksum Level is Storage
Connection : brom
Speed : HIGH-SPEED
Reading RAM Configuration...OK
Reading EMI Configuration...OK
CID : 9B0100593250303332008B0B20DB69C9 [EMMC]
Initializing Storage...OK
Sending 2nd DA...OK
Initialize DA Extension...OK
Int. RAM : 0x0000000000039000 [228.00 KB]
Ext. RAM : 0x0000000080000000 [2.00 GB]
Flash ID : Y2P032
CID : 9B0100593250303332008B0B20DB69C9
BOOT1 : 0x0000000000400000 [4.00 MB]
BOOT2 : 0x0000000000400000 [4.00 MB]
RPMB : 0x0000000001000000 [16.00 MB]
USERAREA : 0x0000000747C00000 [29.12 GB]
Connected to High-Speed DA Port
Reading Partition Table...OK
Bootloader : UNLOCKED
Reading nvcfg...OK
Reading nvdata...OK
Reading nvram...OK
Reading protect1...OK
Reading protect2...OK
Reading persist...OK
Reading proinfo...OK
Reading md1img_a...OK
Reading md1img_b...OK
Backup : SECURITY ITEMS.zip
Operation Finished.
[UltimateMTK2 v0.9]
Cerramos el modulo y abrimos el modulo viejo de Ultimate Multi Tool - MTK
Ya en el modulo vamos a la pestaña de Tools / FRP, en el apartado de IMEI Repair seleccionamos META (New) y escribimos los 2 imei.
daremos a reparar y conectamos el celular con los dos botones de volumen presionados para que entre en modo BROM, la herramienta pasara el equipo a meta mode, si da error revisar en el administrador de dispositivos si el celular ya esta en meta mode, si es asi, solo volvemos a dar repair y esperamos a que termine.
Operation : IMEI Reapir [META (New)]
Checking for existing META ports...
Found MediaTek USB VCOM (Android) (COM50) on COM50
Device Path : usb\vid_0e8d&pid_200e&rev_0419&mi_01
Configuring Communication Channel...
Reading phone information...
CPU : MT6761
SW Ver. : MOLY.LR12A.R3.MP.V219.3.P16
HW Ver. : LCSH_XM_S0MP1_K6761V1_32_HW
IMEI1 : 861525060000000
IMEI2 : 181312219900000
Reading data from phone...
Repairing IMEI1 to 86152506010000...
Repairing IMEI2 to 86152506010000...
Syncing Data...
Operation Finished.
[UltimateMTK Ver. 5.1]
Credicto
canguiri
Primero, es necesario quitar la resistencia de protección por hardware.
Debes estar registrado para ver imágenes adjuntar
Segundo, es necesario abrir bootloader para realizar el procedimiento
Brand/Model : *Auto* / *Auto Detect*
Operation : Unlock Bootloader
Waiting for Device...Found
Port : MediaTek USB Port (COM43)
Device Path : \\?\usb#vid_0e8d&pid_0003#5&109d12e&0&2#{86e0d1e0-8089-11d0-9ce4-08003e301f73}
Driver : MediaTek Inc., 3.0.1504.0 [usb2ser.sys]
Mode : BROM
Hw ID : MT6761 [0717] Helio A20/P22/A22/A25/G25
Details : 8A00,CA01,0200
Sec. Config : [SBA:True] [SLA:True] [DAA:True]
MEID : E4F5F4BA4055A14C96720ADB2E2CBB71
SoC ID[0] : 3725B1DB42DFF646775B97FDC5B2801E
SoC ID[1] : 4C467CE4CF05F9DDE904567D14F929D2
Running Exploit...Done
Downloading Preloader...OK
Saved as : preloader_ice.bin
Loading EMI Config from Preloader...OK
Sec. Config : [SBA:False] [SLA:False] [DAA:False]
Using Internal DA!
DA Security Patched
Sending 1st DA...OK
Jump DA Address...OK
Syncing...OK
Checksum Level is Storage
Connection : brom
Speed : HIGH-SPEED
Reading RAM Configuration...OK
Reading EMI Configuration...OK
CID : 9B0100593250303332008B0B20DB69C9 [EMMC]
Initializing Storage...OK
Sending 2nd DA...OK
Initialize DA Extension...OK
Int. RAM : 0x0000000000039000 [228.00 KB]
Ext. RAM : 0x0000000080000000 [2.00 GB]
Flash ID : Y2P032
CID : 9B0100593250303332008B0B20DB69C9
BOOT1 : 0x0000000000400000 [4.00 MB]
BOOT2 : 0x0000000000400000 [4.00 MB]
RPMB : 0x0000000001000000 [16.00 MB]
USERAREA : 0x0000000747C00000 [29.12 GB]
Connected to High-Speed DA Port
Reading Partition Table...OK
Bootloader : LOCKED
Reading Bootloader Data...OK
Bootloader : LOCKED
Unlocking Bootloader...OK
Operation Finished.
[UltimateMTK2 v0.9]
ya que quitaron la resistencia y abrieron el bootloader, abrimos UMT en UMTv2 - UltimateMTK2 y realizamos un backup de los security items.
MEID : E4F5F4BA4055A14C96720ADB2E2CBB71
SoC ID[0] : 3725B1DB42DFF646775B97FDC5B2801E
SoC ID[1] : 4C467CE4CF05F9DDE904567D14F929D2
Running Exploit...Done
Downloading Preloader...OK
Saved as : preloader_ice.bin
Loading EMI Config from Preloader...OK
Sec. Config : [SBA:False] [SLA:False] [DAA:False]
Using Internal DA!
DA Security Patched
Sending 1st DA...OK
Jump DA Address...OK
Syncing...OK
Checksum Level is Storage
Connection : brom
Speed : HIGH-SPEED
Reading RAM Configuration...OK
Reading EMI Configuration...OK
CID : 9B0100593250303332008B0B20DB69C9 [EMMC]
Initializing Storage...OK
Sending 2nd DA...OK
Initialize DA Extension...OK
Int. RAM : 0x0000000000039000 [228.00 KB]
Ext. RAM : 0x0000000080000000 [2.00 GB]
Flash ID : Y2P032
CID : 9B0100593250303332008B0B20DB69C9
BOOT1 : 0x0000000000400000 [4.00 MB]
BOOT2 : 0x0000000000400000 [4.00 MB]
RPMB : 0x0000000001000000 [16.00 MB]
USERAREA : 0x0000000747C00000 [29.12 GB]
Connected to High-Speed DA Port
Reading Partition Table...OK
Bootloader : UNLOCKED
Reading nvcfg...OK
Reading nvdata...OK
Reading nvram...OK
Reading protect1...OK
Reading protect2...OK
Reading persist...OK
Reading proinfo...OK
Reading md1img_a...OK
Reading md1img_b...OK
Backup : SECURITY ITEMS.zip
Operation Finished.
[UltimateMTK2 v0.9]
Cerramos el modulo y abrimos el modulo viejo de Ultimate Multi Tool - MTK
Ya en el modulo vamos a la pestaña de Tools / FRP, en el apartado de IMEI Repair seleccionamos META (New) y escribimos los 2 imei.
daremos a reparar y conectamos el celular con los dos botones de volumen presionados para que entre en modo BROM, la herramienta pasara el equipo a meta mode, si da error revisar en el administrador de dispositivos si el celular ya esta en meta mode, si es asi, solo volvemos a dar repair y esperamos a que termine.
Debes estar registrado para ver imágenes adjuntar
Operation : IMEI Reapir [META (New)]
Checking for existing META ports...
Found MediaTek USB VCOM (Android) (COM50) on COM50
Device Path : usb\vid_0e8d&pid_200e&rev_0419&mi_01
Configuring Communication Channel...
Reading phone information...
CPU : MT6761
SW Ver. : MOLY.LR12A.R3.MP.V219.3.P16
HW Ver. : LCSH_XM_S0MP1_K6761V1_32_HW
IMEI1 : 861525060000000
IMEI2 : 181312219900000
Reading data from phone...
Repairing IMEI1 to 86152506010000...
Repairing IMEI2 to 86152506010000...
Syncing Data...
Operation Finished.
[UltimateMTK Ver. 5.1]
Archivos adjuntos
Debes estar registrado para ver la lista de archivos adjuntos.