★★★ Post All Successfully Repaired Phones By Hydra Tool ★★★

BISMILLAH786

Active Member
Aug 23, 2021
40
23
PAKISTAN
oppo cph2239 imei repair done but after factory rest imei null.!!! what happens team..?

***IMEI REPAIR FUNCTION****
Oppo Flash Mode
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port_V1633 (COM7)
Device :6&2a0f59d2&0&4
SymbolicName :\??\USB#VID_0E8D&PID_0003#6&2a0f59d2&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0

Trying to Open Port [COM7] Ok
Reading Partition Table ..
ERAM Size: 0x0000000000080000-512 KB
IRAM Size: 0x0000000100000000-4 GB
EMMC Boot1 Size: 0x0000000000400000-4 MB
EMMC Boot2 Size: 0x0000000000400000-4 MB
EMMC RPMB Size : 0x0000000001000000-16 MB
EMMC USER Size : 0x0000001D1F000000-116.484 GB
EMMC CID : 13014E53304A394B39102740929C58E9 - S0J9K9
HW-CODE : 0x766
HWSUB-CODE : 0x8A00
HW-VERSION : 0xCA00
SW-VERSION : 0x0
CHIP-EVOLUTION : 0x0
DA-VERSION : 1.0
Speed : high-speed
Partition Count : 49
--------------- Reading build.prop content ---------------
Brand : OPPO
Vendor : OPPO
Model : oppoEffectModel
Product : oppo6765
Manufacturer : OPPO
ID : QP1A.190711.020
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6765-user 10 QP1A.190711.020 bedd37e98646d3a1 release-keys
Display ID : QP1A.190711.020 release-keys
Security Patch : 2021-04-05
StorageType : mtp
--------------- end of build.prop content ---------------
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------
---------------------------
Oppo Method Auto
---------------------------
Backing up Security..
- boot Ok
- nvram Ok
- nvdata Ok
- vbmeta Ok
- seccfg Ok
- md1img Ok
Writing certificate and IMEI..
Please wait...
Step 1
Trying Method 1
Has been patched already... Ok
Step 2 Ok
Step 3 Ok
Step 4 Ok
Step 5 Ok
Writing IMEI Done!!!
IMEI1 : 86810xxxxxxxxxxx
IMEI2 : 86810xxxxxxxxxxx
Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!



Elapsed Time : 00:00:42
 

BISMILLAH786

Active Member
Aug 23, 2021
40
23
PAKISTAN
oppo cph2239 imei repair done but after factory rest imei null.!!! what happens team..?

***IMEI REPAIR FUNCTION****
Oppo Flash Mode
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port_V1633 (COM7)
Device :6&2a0f59d2&0&4
SymbolicName :\??\USB#VID_0E8D&PID_0003#6&2a0f59d2&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0

Trying to Open Port [COM7] Ok
Reading Partition Table ..
ERAM Size: 0x0000000000080000-512 KB
IRAM Size: 0x0000000100000000-4 GB
EMMC Boot1 Size: 0x0000000000400000-4 MB
EMMC Boot2 Size: 0x0000000000400000-4 MB
EMMC RPMB Size : 0x0000000001000000-16 MB
EMMC USER Size : 0x0000001D1F000000-116.484 GB
EMMC CID : 13014E53304A394B39102740929C58E9 - S0J9K9
HW-CODE : 0x766
HWSUB-CODE : 0x8A00
HW-VERSION : 0xCA00
SW-VERSION : 0x0
CHIP-EVOLUTION : 0x0
DA-VERSION : 1.0
Speed : high-speed
Partition Count : 49
--------------- Reading build.prop content ---------------
Brand : OPPO
Vendor : OPPO
Model : oppoEffectModel
Product : oppo6765
Manufacturer : OPPO
ID : QP1A.190711.020
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6765-user 10 QP1A.190711.020 bedd37e98646d3a1 release-keys
Display ID : QP1A.190711.020 release-keys
Security Patch : 2021-04-05
StorageType : mtp
--------------- end of build.prop content ---------------
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------
---------------------------
Oppo Method Auto
---------------------------
Backing up Security..
- boot Ok
- nvram Ok
- nvdata Ok
- vbmeta Ok
- seccfg Ok
- md1img Ok
Writing certificate and IMEI..
Please wait...
Step 1
Trying Method 1
Has been patched already... Ok
Step 2 Ok
Step 3 Ok
Step 4 Ok
Step 5 Ok
Writing IMEI Done!!!
IMEI1 : 86810xxxxxxxxxxx
IMEI2 : 86810xxxxxxxxxxx
Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!



Elapsed Time : 00:00:42
Please hydra team we want solution for this.!

It's your responsibility to make customers happy
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
P13 Blue FRP Remove One Click With by Hydra Tool

Screenshot_11-16-2022-135610.jpeg
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port (COM100)
Device :6&3520cc6b&0&4
SymbolicName :\??\USB#VID_0E8D&PID_0003#6&3520cc6b&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :07/22/2022,3.0.1511.0

Trying to Open Port [COM100] Ok
Handshaking...Ok
HwCode : 0717 {MT6761/MT6762/MT3369/MT8766B}
Hwver : 0000
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)
Device Connection : BROM
HW Subcode: 8A00
HW Ver : CA01
SW Ver : 0200
ME_ID : 7B3733BE1AC57667F0EA62EF1517DC00
SOC_ID : 4FBE7E8E385D90AA5E2BCD9FDBBB6CC2D3023ECAD2ACC03DE48C741D51E32009
Exploiting Device...
Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..Found @ 0x00200BC4
Starting to dump...
Prel Size : 0x00037600
Successfully dump preloader.. [C:\Hydra Tool\Boot\PreloaderDump\preloader_k61v1_64_bsp.bin]
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)
Device Connection : BROM
Download Agent...
DA :MTK_AllInOne_DA_5.2152.bin
Patching da2 ... Ok
Uploading data
Successfully uploaded stage 1, jumping ..
Jumping to 0x00200000
Successfully received DA sync
CONNECTION_AGENT : brom
DRAM config needed for : 150100524531424D
Sending emi data..
DRAM setup passed.
Sending emi data succeeded.
Uploading stage 2...
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
ERAM Size: 0x000000000003A500-233.25 KB
IRAM Size: 0x00000000C0000000-3 GB
EMMC Boot1 Size: 0x0000000000400000-4 MB
EMMC Boot2 Size: 0x0000000000400000-4 MB
EMMC RPMB Size : 0x0000000000400000-4 MB
EMMC USER Size : 0x00000003A3E00000-14.561 GB
EMMC CID : 150100524531424D4207B30AAC1073FF - RE1BMB
HW-CODE : 0x717
HWSUB-CODE : 0x8A00
HW-VERSION : 0xCA01
SW-VERSION : 0x200
CHIP-EVOLUTION : 0x0
DA-VERSION : 1.0
Speed : high-speed
Upload data was accepted. Jumping to stage 2...
DA Extensions successfully added
Reading Partition Table ..
Partition Count : 39
--------------- Reading build.prop content ---------------
Brand : reeder
Vendor : reeder
Model : P13_Blue
Product : P13_Blue
Manufacturer : reeder
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : tr-TR
Description : full_k61v1_64_bsp-user 9 PPR1.180610.011 eng.releas.20211105.063800 release-keys
Device : P13_Blue
Display ID : reeder_P13Blue_2021.11.04V1.00G
Security Patch : 2021-11-05
Fingerprint : reeder/P13_Blue/P13_Blue:9/PPR1.180610.011/1636024484:user/release-keys
StorageType : mtp
--------------- end of build.prop content ---------------
Backing up Security..
-preloader .....Ok [preloader_k61v1_64_bsp.bin]
*Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0717_7B3733BE1AC57667F0EA62EF1517DC00\Auto\111622135459\6761_Android_scatter.txt
-pgpt .....Ok
-nvram .....Ok
-nvdata .....Ok
-frp .....Ok
-protect1 .....Ok
-protect2 .....Ok
-persist .....Ok
-proinfo .....Ok
-nvcfg .....Ok
-sec1 .....Ok
-seccfg .....Ok
Backup Done!!!
Reading Partition Table ..
ERAM Size: 0x000000000003A500-233.25 KB
IRAM Size: 0x00000000C0000000-3 GB
EMMC Boot1 Size: 0x0000000000400000-4 MB
EMMC Boot2 Size: 0x0000000000400000-4 MB
EMMC RPMB Size : 0x0000000000400000-4 MB
EMMC USER Size : 0x00000003A3E00000-14.561 GB
EMMC CID : 150100524531424D4207B30AAC1073FF - RE1BMB
HW-CODE : 0x717
HWSUB-CODE : 0x8A00
HW-VERSION : 0xCA01
SW-VERSION : 0x200
CHIP-EVOLUTION : 0x0
DA-VERSION : 1.0
Speed : high-speed
Partition Count : 39
--------------- Reading build.prop content ---------------
Brand : reeder
Vendor : reeder
Model : P13_Blue
Product : P13_Blue
Manufacturer : reeder
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : tr-TR
Description : full_k61v1_64_bsp-user 9 PPR1.180610.011 eng.releas.20211105.063800 release-keys
Device : P13_Blue
Display ID : reeder_P13Blue_2021.11.04V1.00G
Security Patch : 2021-11-05
Fingerprint : reeder/P13_Blue/P13_Blue:9/PPR1.180610.011/1636024484:user/release-keys
StorageType : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
IMEI1 : 358***************
IMEI2 : 358***************
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------
------------------------------
Removing FRP Flash Mode..
------------------------------
Operation : Uni_FMFRP_Erase
Status: Ok
Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Mi 11 Lite (courbet) İmei Repair With by Hydra
courbet_imei.png

-----------------------------------------
IMEIRepair Function...
-----------------------------------------
Searching Diag Port....
Reading Phone info - Diag Mode
Firmware ID : 4.3.c5-00069-0420_2332_30327fe
Build Date : pr 20 202123:36:31Aug 20 202012:00:00sm7150.g
IMEI1 :
IMEI2 :
Converting QCN to ENG QCN, Please Wait....
Anlyzze the QCN, Please Wait....

C:\Users\******\Downloads\mi11.qcn
Found IMEI ONE :861************
Found IMEI TWO :861************
Done...

C:\Users\******\Downloads\mi11.qcn
Generationg patch imei...
Patched QCN Saved to : C:\Users\*****\Downloads\mi11_358106056759692_patched.qcn

Writting QCN, Please Wait....
Diag Port Found ON : COM37
Writting File, Please Wait....
Sending SPC to Device....
SPC Send Success
Restoring File....
Restore File Success
Repair IMEI Success, Rebooting Device...

Elapsed Time : 00:01:12
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi 8 (olive) Mi Account Remove With by Hydra Tool

PreOperation Configuration
Brand : AUTO Model : AUTO Storage : Auto
Loader: Auto
Port : Auto

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM42)
SymbolicName :\??\USB#VID_05C6&PID_9008#6&2b113eed&0&5#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/02/2017,2.1.2.7

Getting device info......
Serial No.: 0x39C83FE2
HW_ID : 000BF0E100720000
MSM ID : 0x000BF0E1, SDM439-Qualcomm Snapdragon 439/FAADANAZA
MODEL_ID : 0x0000
OEM_ID : 0x0072 - XIAOMI
PBL Ver : 00000000
PK HASH : 57158eaf1814d78fd2b3105ece4db18a817a08ac664a5782a925f3ff8403d39a

Hydra Enable Auto search Firehose..
#Please wait...
#Search by filename filter.....
#Found 19 Compatible Files..Found match Firehose...

Firehose Loader[000bf0e100720000_57158eaf1814d78f_05ac3fce_xiaomi_auth_peek_8937.fhprg]
--------------------------------------------------
Header Type : OLD
TargetMSM : 8937
Tag : _auth_peek
Version : 3
Code_size : 320
Signature_size : 256
fhVendor : XIAOMI
HW_ID : 000BF0E100720000
Vendor : XIAOMI
OEM_ID : 0072
MODEL_ID : 0000
SW_ID : 0000000100000003
APP_ID :
pk_hash : 57158eaf1814d78fd2b3105ece4db18a817a08ac664a5782a925f3ff8403d39a
OEM_VERSION : c3-miui-ota-bd106.bj
IMAGE_VARIANT : FAADANAZA
QC_VERSION : BOOT.BF.3.3.2-00073
--------------------------------------------------

SaharaBoot... Ok
Sending .......................Ok
Connecting to Firehose...
Ping... Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[VXxlWLqMunrppCCs1yco2YgO6U0]
Signature @256bytes Authentication.... Accepted......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 1133861998
Firmware Version : 842018864
Product Name : hC9aP3
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 122142720[58,242 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok

Reading GPT[3]
Drive [0] 64 Items
Drive [1] 0 Items
Drive [2] 0 Items


Phone Information......
Vendor : Xiaomi
ID : QKQ1.191014.001
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Miui Ver : V125
Mod_device : olive_in_global
Security Patch : 2021-09-01
Emmc_size : 16GB


Backup Security partitions...
Reading Security Items....
> modemst1
> modemst2
> fsg
> fsc
C:\Hydra Tool\Backup\Security_Backup\__10_Security_110522171956.sec
Backup Security Success....
Processing Remove MiAccount[New Method]....
Backing up Partition for safety...Ok

Scanning Patching address...
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]Done!!
Total Items patched : 105
Successfully patched address..
Action Result : Ok

Elapsed Time : 00:00:25
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
P10 Lite WAS-LX1A FRP Remove by Testpoint

Searching Device By Fastboot
Device Found...

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Reading Device Information...
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
hotainfo......
#hotainfo_len :
#C_version :
#D_version :
#PLMN :
#BoardID :
#DeviceName :
Build number : WAS-LX1A 8.0.0.399(C185)
Product Model : WAS-LX1A
hwnff_ver : Ver2.3
key_version : huawei_key_v1
product : hi6250
system_update_state :
vendorcountry : hw/meafnaf
soc_id : 0.5
ro_build_fingerprint : 0.5
ro_build_version_full : 0.5
ro_build_version_qcom : 0.5
psid.........
#SN : 2XJ************
#IMEI1 : 866************
#IMEI2 : 866************

Security Info....
#Dongle_info : 0.5
#FB Lock State : UNLOCKED
#USER Lock State : LOCKED

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Huawei Fastboot Service...
Factory Reset Protection...
Removing....Ok

Elapsed Time : 00:00:02
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Nokia 5.1 plus TA-1061 FRP Remove With by Hydra Tool

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Service Function
Factory Reset Protection[FRP]
Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching for MTK Device...Found
MTK Port Type : Flashmode BROM
FriendlyName : MediaTek USB Port_V1632 (COM4)
Device : /6&29f11ef&0&8
SymbolicName : \\?\usb#vid_0e8d&pid_0003#6&29f11ef&0&8#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0
Service : wdm_usb

Openning Port [COM4] Ok
Reading Partition Table ..
ERAM Size : 0x0000000000039000-228 KB
IRAM Size : 0x00000000C0000000-3 GB
EMMC Boot1 Size : 0x0000000000400000-4 MB
EMMC Boot2 Size : 0x0000000000400000-4 MB
EMMC RPMB Size : 0x0000000000400000-4 MB
EMMC USER Size : 0x0000000747C00000-29,121 GB
EMMC CID : 150100444436384D42021FD7C6665503 - DD68MB
HW-CODE : 0x788
HWSUB-CODE : 0x8A00
HW-VERSION : 0xCA00
SW-VERSION : 0x0
CHIP-EVOLUTION : 0x0
DA-VERSION : 1.0
Speed : high-speed
Partition Count : 60
--------------- Reading build.prop content ---------------
Brand : FIH_GSI
Vendor : FIH
Model : GSI-00WW
Product : gsi_mt6771_64
Manufacturer : FIH
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : Panda_00WW-user 9 PPR1.180610.011 00WW_2_14A release-keys
Device : PDA_sprout
Display ID : 00WW_2_14A
Security Patch : 2019-02-05
Fingerprint : Nokia/Panda_00WW/PDA_sprout:9/PPR1.180610.011/00WW_2_14A:user/release-keys
--------------- end of build.prop content ---------------

Reading IMEI........
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------
Status: Ok

Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!

Elapsed Time : 00:00:06
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Cherry Mobile Flare J6 Mini Frp Remove With by Hydra Tool


- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Service Function
Factory Reset Protection[FRP]
Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching for MTK Device...Found
MTK Port Type : Flashmode Preloader
FriendlyName : MediaTek PreLoader USB VCOM (Android) (COM4)
Device : /5&1569471b&0&4
SymbolicName : \\?\usb#vid_0e8d&pid_2000#5&1569471b&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 07/22/2022,3.0.1511.0
Service : wdm_usb

Openning Port [COM4] Ok
Reading Partition Table ..
Partition Count : 28

Reading System Info
Brand : Cherry_Mobile
Vendor : Cherry Mobile
Model : Flare_J6_mini
Product : wd365bf3
Manufacturer : Cherry Mobile
ID : O11019
SDK : 27
Release : 8.1.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-US
Description : full_wd365bf3-user 8.1.0 O11019 20180821 release-keys
Device : Flare_J6_mini
Display ID : Cherry_Mobile_Flare_J6_mini_V05_08212018
Security Patch : 2018-08-05
Fingerprint : Cherry_Mobile/Flare_J6_mini/Flare_J6_mini:8.1.0/O11019/20180821:user/release-keys
StorageType : mtp

Reading IMEI........

IMEI Info....
IMEI1 : 3533**************
IMEI2 : 3533**************
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------
Status: Ok

Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Oppo A37 Format-Factory Reset With by Hydra Tool

Oppo A37 Format-Factory reset With by Hydra Tool



Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM34)
SymbolicName :\\?\usb#vid_05c6&pid_9008#6&15543235&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/02/2017,2.1.2.7

Getting device info......
Serial No.: 0x26DC76E8
HW_ID : 007050E100000000
MSM ID : 0x007050E1, MSM8916-Qualcomm Snapdragon 410 /HAAAANAZA
MODEL_ID : 0x0000
OEM_ID : 0x0000 - QUALCOMM
PBL Ver : 00000000
PK HASH : cc3153a80293939b90d02d3bf8b23e0292e452fef662c74998421adad42a380f

Hydra Enable Auto search Firehose..
#Please wait...
#Search by filename filter.....
#Found 1 Compatible Files..Found match Firehose...

Firehose Loader[007050e10029001e_cc3153a80293939b_ae162be1_asus_qualcomm_peek_8916.fhprg]
--------------------------------------------------
Header Type : OLD
TargetMSM : 8916
Tag : _peek
Version : 3
Code_size : 96
Signature_size : 256
fhVendor : QUALCOMM
HW_ID : 007050E10029001E
Vendor : ASUS
OEM_ID : 0029
MODEL_ID : 001E
SW_ID : 0000000000000003
APP_ID :
pk_hash : cc3153a80293939b90d02d3bf8b23e0292e452fef662c74998421adad42a380f
OEM_VERSION :
IMAGE_VARIANT :
QC_VERSION :
--------------------------------------------------

SaharaBoot... Ok
Sending .....Ok
Connecting to Firehose...
Ping... Ok
Configuration.......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8916
Version : 1


Protocol : Universal
Running : Ok

Reading GPT[3]
Drive [0] 40 Items
Drive [1] 0 Items
Drive [2] 4 Items


Phone Information.....
Brand : OPPO
Vendor : OPPO
Model : A37f
Product : A37f
Manufacturer : OPPO
ID : LMY47V
SDK : 22
Release : 5.1.1
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Description : msm8916_64-user 5.1.1 LMY47V eng.root.20190228.004112 release-keys
Display ID : A37fEX_11_190228
Security Patch : 2018-03-01
Platform : msm8916
FRPPST : /dev/block/bootdevice/by-name/config


Backup Security partitions...
Reading Security Items....
- modemst1(modemst1.bin), 1.5 MB = Ok
- modemst2(modemst2.bin), 1.5 MB = Ok
- fsg(fsg.bin), 1.5 MB = Ok
- fsc(fsc.bin), 512 Bytes = Ok
C:\Hydra Tool\Backup\QUALBackup\QUALCOMM\007050E100000000_26DC76E8\Security_Backup\032823144612.sec
Backup Security Success....
Processing Auto....
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOk
- Formatting Userdata
Executing ...
- Formatting Userdata [Safe Format - eMMc] OkOk
Action Result : Ok

Rebooting Phone.... Ok

Elapsed Time : 00:00:37
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi Note 8 (ginkgo) BL Lock FRP Remove in Sideload mode

Adb Handler [Console]
Starting ADB Server....
Searching Device By ADB
Device Found...
Sate : sideload
Product name : ginkgo
Product model : Redmi_Note_8
Product device : ginkgo


Model : ginkgo_global
Android VERSION : 11
OS Version : V12.5.2.0.RCOMIXM
Branch : F
Language :
Region : TR
Sideload Factory Reset...
Sideload Safe Format....
Processing...
Action Result : Ok

Elapsed Time : 00:00:00
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi 8 (olive) EDL Flashing with by Hydra Tool

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Qualcomm Flashing Function......
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

PreOperation Configuration
Brand : XIAOMI Model : Redmi 8 (olive) Storage : Auto
Loader: 000BF0E100720000_57158eaf1814d78f_e551cac5_XIAOMI_auth_peek_8937.fhprg
Port : Auto

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM4)
SymbolicName :\\?\usb#vid_05c6&pid_9008#6&28e0277e&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/02/2017,2.1.2.7

Getting device info......
Serial No.: 0xF59EA294
HW_ID : 000BF0E100720000
MSM ID : 0x000BF0E1, SDM439-Qualcomm Snapdragon 439/FAADANAZA
MODEL_ID : 0x0000
OEM_ID : 0x0072 - XIAOMI
PBL Ver : 00000000
PK HASH : 57158eaf1814d78fd2b3105ece4db18a817a08ac664a5782a925f3ff8403d39a

Firehose Loader[000BF0E100720000_57158eaf1814d78f_e551cac5_XIAOMI_auth_peek_8937.fhprg]
--------------------------------------------------
Header Type : OLD
TargetMSM : 8937
Tag : _auth_peek
Version : 3
Code_size : 320
Signature_size : 256
fhVendor : XIAOMI
HW_ID : 000BF0E100720000
Vendor : XIAOMI
OEM_ID : 0072
MODEL_ID : 0000
SW_ID : 0000000100000003
APP_ID :
pk_hash : 57158eaf1814d78fd2b3105ece4db18a817a08ac664a5782a925f3ff8403d39a
OEM_VERSION : c4-miui-ota-bd104.bj
IMAGE_VARIANT : FAADANAZA
QC_VERSION : BOOT.BF.3.3.2-00073
--------------------------------------------------

SaharaBoot... Ok
Sending .......................Ok
Connecting to Firehose...
Ping... Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[Z6sLWjgA
Signature @256bytes Authentication.... Accepted......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 19
Serial Number : 500034960
Firmware Version : 4
Product Name : S0J9N8
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 122142720[58,242 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok

Reading GPT[3]
Drive [0] 64 Items
Drive [1] 0 Items
Drive [2] 0 Items


Phone Information......
Vendor : Xiaomi
Manufacturer : Xiaomi
ID : QKQ1.191014.001
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Miui Ver : V12
Security Patch : 2020-12-01
Emmc_size : 16GB


Backup Security partitions...
Reading Security Items....
- modemst1(modemst1.bin), 8 MB = Ok
- modemst2(modemst2.bin), 8 MB = Ok
- fsg(fsg.bin), 8 MB = Ok
- fsc(fsc.bin), 7,5 KB = Ok
C:\Hydra Tool\Backup\QUALBackup\XIAOMI\000BF0E100720000_F59EA294\Security_Backup\032923112946.sec
Backup Security Success....

Backup Security partitions...
Reading Security Items....
- modemst1(modemst1.bin), 8 MB = Ok
- modemst2(modemst2.bin), 8 MB = Ok
- fsg(fsg.bin), 8 MB = Ok
- fsc(fsc.bin), 7,5 KB = Ok
C:\Hydra Tool\Backup\QUALBackup\XIAOMI\000BF0E100720000_F59EA294\Security_Backup\032923112949.sec
Backup Security Success....
----------------------------
Flashing Selected Partitions....
- sec[0](sec.dat), 80 Bytes Skipped
- config[0](config.bin), 32 KB Skipped
- vbmeta[0](vbmeta.img), 4 KB = Ok
- vbmetabak[0](vbmeta.img), 4 KB = Ok
- devcfg[0](devcfg.mbn), 37,184 KB = Ok
- devcfgbak[0](devcfg.mbn), 37,184 KB = Ok
- apdp[0](dummy.img), 8 KB = Ok
- msadp[0](dummy.img), 8 KB = Ok
- sbl1[0](sbl1.mbn), 399,457 KB = Ok
- sbl1bak[0](sbl1.mbn), 399,457 KB = Ok
- rpm[0](rpm.mbn), 165,129 KB = Ok
- rpmbak[0](rpm.mbn), 165,129 KB = Ok
- cmnlib[0](cmnlib_30.mbn), 200,852 KB = Ok
- cmnlibbak[0](cmnlib_30.mbn), 200,852 KB = Ok
- cmnlib64[0](cmnlib64_30.mbn), 258,805 KB = Failed
Operation : Setbootablestoragedrive: Drive 0
Set bootable storage drive 0
No response from phone... Failed

Rebooting Phone.... Ok

Elapsed Time : 00:00:21
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
TECNO SPARK 6 GO Format Factory Reset & Frp remove with by Hydra Tool

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Service Function
Ultra Power
Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching for MTK Device...Found
MTK Port Type : Flashmode BROM
FriendlyName : MediaTek USB Port_V1633 (COM13)
Device : /6&2bf858fa&0&4
SymbolicName : \\?\usb#vid_0e8d&pid_0003#6&2bf858fa&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0
Service : wdm_usb

Openning Port [COM13] Ok
Reading Partition Table ..
ERAM Size : 0x000000000003A500-233.25 KB
IRAM Size : 0x0000000080000000-2 GB
EMMC Boot1 Size : 0x0000000000400000-4 MB
EMMC Boot2 Size : 0x0000000000400000-4 MB
EMMC RPMB Size : 0x0000000000400000-4 MB
EMMC USER Size : 0x0000000747C00000-29.121 GB
EMMC CID : 15010051583633414203B761E2A1C7E9 - QX63AB
HW-CODE : 0x717
HWSUB-CODE : 0x8A00
HW-VERSION : 0xCA01
SW-VERSION : 0x200
CHIP-EVOLUTION : 0x0
DA-VERSION : 1.0
Speed : high-speed
Partition Count : 43
--------------- Reading build.prop content ---------------
Product : ke5_h6123go
ID : QP1A.190711.020
SDK : 29
Release : 10
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-US
Description : full_ke5_h6123go-user 10 QP1A.190711.020 324453 release-keys
Display ID : KE5-H6123ABC-QGo-GL-220616V541
Security Patch : 2022-06-05
--------------- end of build.prop content ---------------

Reading IMEI........
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------
---------------------------
Ultra Power
---------------------------
Formatting Userdata :
Operation : Safeformat Universal... Ok
Removing FRP : Ok

Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!

Elapsed Time : 00:00:06
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Huawei Y7 2019 (DUB-LX3) EDL Frp Remove With by Hydra Tool


PreOperation Configuration
Brand : HUAWEI Model : DUB-LX3 (Y7 2019) Storage : Auto
Loader: 0009A0E100150065_6bc369511da9cadb_1a1074cf_HUAWEI_QUALCOMM_peek_8953.fhprg
Port : Auto

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM4)
SymbolicName :\\?\usb#vid_05c6&pid_9008#6&2bf858fa&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :06/27/2014,1.03.00.00

Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok
Configuration.......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8953
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 19
Serial Number : 400309962
Firmware Version : 0
Product Name : S0J9N8
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 122142720[58.242 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok

Reading GPT[3]
Drive [0] 60 Items
Drive [1] 0 Items
Drive [2] 0 Items


Phone Information.....
Vendor : unknown
Manufacturer : unknown
ID : OPM1.171019.011
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : generic_a53-user 8.1.0 OPM1.171019.011 eng.root.20210812.153059 test-keys
Display ID : System 8.2.0.036(2E2Y)
Security Patch : 2020-09-01

Removing FRPta...
Method :
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOkOk

Rebooting Phone.... Ok
If not rebooted, Please Power on Manually

Elapsed Time : 00:00:07
 
Top