Redmi 10 Bypass Mi Cloud | Unlock FRP Via Sp Flash Tool Free


Redmi 10 Bypass Mi Cloud & FRP One Click Via Sp Flash Tool

Mi Cloud is an inbuilt data protection feature for all present-day Xiaomi Android smartphones, It protects phones from unauthorized access. After performing a factory reset, If you forget the last active Gmail or MI associated account which was used on your phone, then, you have to find a solution to unlock your phone. Here, more especially, I share a most detailed process with Xiaomi Redmi 10 [MIUI 12.5] Mi Account Remove File to Unlock Mi Cloud in just One-click Sp Flash Tool. So, follow the below process carefully.
 

Include File

  1. Redmi 10 Unlock File
  2. SP Flash Tool  
  3. DA mt6765_mt6785.bin
  4. Driver IibUBS Driver / MTK Driver
  5. Mediatek Auth Bypass Tool V12
  6. Unlock Address.txt


How to Unlock Mi Cloud & Frp Lock Redmi 10

  • Download all are files from the above links 
  • Extract all file 
  • First Install libusb win32 devel filter 1.2.6.0 OR MediaTek USB Driver 
  • Open MCT MediaTek USB Driver Tool Click on BYPASS
  • Turn OFF Phone Press and hold Volume Up + Down and Insert USB Cable
  • Wait Until Completed

  • Open SP flash tool click on Scatter-loading choose button and select MT6765_Android_scatter.txt file 
  • Click on Download-Agent and Select MTK_AllInOne_DA_mt6765_mt6785.bin File from Flash Tool Folder
  • Click on Authentication File and Select auth_sv5.auth File from Flash Tool Folder

  • Go to Option  Connection and Set Com Port (COM:..) and Baud Rate (921600)
  • Now Open Device Manager and Check Your Phone Com Port

  • Now go to Format Tab and click to Manual Format flash
  • Copy 0xdea2000 code and paste to Begin Address[HEX]
  • Copy 0x300000000 code and paste to Format Length[HEX]

  • FRP Unlock Code Manual Format Flash.
  • Copy 1708000 code and paste to Begin Address[HEX]
  • Copy 0x100000 code and paste to Format Length[HEX]

  • Click on the Start button
  • Wait Until Completed
  • Done

Download

Android Service Tool

Welcome To My Blogs....... https://androidsevicetool.blogspot.com

Post a Comment

Previous Post Next Post