★★★ Post All Successfully Repaired Phones By Hydra Tool ★★★

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Oppo F9 CPH1825 Format Userdata With by Hydra Tool
888800000002_HydraTool.exe__04-01-2023-103825.jpeg

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Service Function
Format/Factory Reset/ScreenLock
Erase Userdata
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching for MTK Device...Found
MTK Port Type : Flashmode BROM
FriendlyName : MediaTek USB Port_V1632 (COM8)
Device : /5&33881217&0&2
SymbolicName : \\?\usb#vid_0e8d&pid_0003#5&33881217&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0
Service : wdm_usb

Openning Port [COM8] Ok
Reading Partition Table ..
ERAM Size : 0x0000000000039000-228 KB
IRAM Size : 0x0000000180000000-6 GB
EMMC Boot1 Size : 0x0000000000400000-4 MB
EMMC Boot2 Size : 0x0000000000400000-4 MB
EMMC RPMB Size : 0x0000000000400000-4 MB
EMMC USER Size : 0x0000000E8F800000-58.242 GB
EMMC CID : 90014A484347386134A51FB8C8A69543 - HCG8a4
HW-CODE : 0x788
HWSUB-CODE : 0x8A00
HW-VERSION : 0xCA00
SW-VERSION : 0x0
CHIP-EVOLUTION : 0x0
DA-VERSION : 1.0
Speed : high-speed
Partition Count : 48
--------------- Reading build.prop content ---------------
Product : oppo6771
ID : QP1A.190711.020
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6771-user 10 QP1A.190711.020 1558958041 release-keys
Display ID : QP1A.190711.020 release-keys
Security Patch : 2021-04-05
StorageType : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
IMEI1 : 8665***********
IMEI2 : 8665***********
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------
------------------------------
Factory Reset Flash Mode..
------------------------------
Operation : Uni_FMFRP_Erase
Status: Ok

Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!

Elapsed Time : 00:00:17
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Honor 9A MOA-LX9N Frp Remove With by Hydra Tool
220400024429_HydraTool.exe__03-31-2023-192045.jpeg
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Service Function
Factory Reset Protection[FRP]
Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching for MTK Device...Found
MTK Port Type : Flashmode BROM
FriendlyName : USB Modem Driver (COM7)
Device : /5&e658374&0&1
SymbolicName : \\?\usb#vid_0e8d&pid_0003#5&e658374&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 10/15/2008,6.0.6000.16386
Service : usbser

Openning Port [COM7] Ok
Handshaking...Ok
HwCode : 0766 {MT6765/MT8768t}
Hwver : 0000
Target config : E5
SBC : 01 (True)
SLA : 00 (False)
DAA : 04 (True)
SWJTAG : 04 (True)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 20 (True)
MEMWRITE : 40 (True)
CMD_C8 : 80 (True)
Connection : BROM
HW Subcode : 8A00
HW Subcode : CA00
SW Ver : 0000
ME_ID : 34F03A87698716F792B3C661B9D5A839
SOC_ID : A5219A244A72B812CBA7A1CB2D4519480F8317C9C54B5A2497A0D3E52F6DBF70

Exploiting Device...
Successfully Exploited..
Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..Found @ 0x00200BC4
Starting to dump...
Prel Size : 0x0003EA0C
Successfully dump preloader..
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)
Connection : BROM

Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin]
Uploading Stage 1....
Successfully uploaded stage 1, jumping ..
Executing JUMP_DA Address @ 0x00200000
Jumping to 0x00200000 Ok 0xC0
Successfully received DA sync
ONNECTION_AGENT : brom
DRAM config needed for : 90014A6843386150
Sending auto preloader from dump... [preloader_k62v1_64_mexico.bin]
Sending emi data.. [DRAM setup passed.]
Sending emi data succeeded.
Uploading stage 2...
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
ERAM Size : 0x000000000003A000-232 KB
IRAM Size : 0x00000000C0000000-3 GB
EMMC Boot1 Size : 0x0000000000400000-4 MB
EMMC Boot2 Size : 0x0000000000400000-4 MB
EMMC RPMB Size : 0x0000000001000000-16 MB
EMMC USER Size : 0x0000000E8F800000-58.242 GB
EMMC CID : 90014A68433861503E010063D12177AF - hC8aP>
HW-CODE : 0x766
HWSUB-CODE : 0x8A00
HW-VERSION : 0xCA00
SW-VERSION : 0x0
CHIP-EVOLUTION : 0x0
DA-VERSION : 1.0
Speed : high-speed
Error: on sending data: DA hash mismatch
*DA Extensions failed to enable
Reading Partition Table ..
Partition Count : 57
--------------- Reading build.prop content ---------------
Unable to read system info..
--------------- end of build.prop content ---------------

Reading IMEI........
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------
Backing up Security..
- preloader(preloader.bin), 512 KB = Ok [preloader_k62v1_64_mex_a32.bin]
*Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0766_34F03A87698716F792B3C661B9D5A839\Auto\033123190427\6765_Android_scatter.txt
- pgpt(pgpt.bin), 32 KB = Ok
- nvram(nvram.bin), 5 MB = Ok
- nvdata(nvdata.bin), 16 MB = Ok
- frp(frp.bin), 1024 KB = Ok
- protect1(protect1.bin), 8 MB = Ok
- protect2(protect2.bin), 13.969 MB = Ok
- persist(persist.bin), 8 MB = Ok
- oeminfo(oeminfo.bin), 32 MB = Ok
- proinfo(proinfo.bin), 1024 KB = Ok
- nvcfg(nvcfg.bin), 8 MB = Ok
- seccfg(seccfg.bin), 8 MB = Ok
Backup Done!!!
Status: Ok

Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!

Elapsed Time : 00:17:07
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Oppo F9 Pro (CPH1825) Factory Reset & Frp Remove with by Hydra Tool

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Service Function
Format/Factory Reset/ScreenLock
Rebuild Userdata
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching for MTK Device...Found
MTK Port Type : Flashmode BROM
FriendlyName : MediaTek USB Port_V1632 (COM10)
Device : /6&1b9d221a&0&4
SymbolicName : \\?\usb#vid_0e8d&pid_0003#6&1b9d221a&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0
Service : wdm_usb

Openning Port [COM10] Ok
Reading Partition Table ..
ERAM Size : 0x0000000000039000-228 KB
IRAM Size : 0x0000000180000000-6 GB
EMMC Boot1 Size : 0x0000000000400000-4 MB
EMMC Boot2 Size : 0x0000000000400000-4 MB
EMMC RPMB Size : 0x0000000000400000-4 MB
EMMC USER Size : 0x0000000E8F800000-58.242 GB
EMMC CID : 90014A484347386134A51FB8C8A69543 - HCG8a4
HW-CODE : 0x788
HWSUB-CODE : 0x8A00
HW-VERSION : 0xCA00
SW-VERSION : 0x0
CHIP-EVOLUTION : 0x0
DA-VERSION : 1.0
Speed : high-speed
Partition Count : 48
--------------- Reading build.prop content ---------------
Vendor : OPPO
Manufacturer : OPPO
ID : O11019
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6771_18311-user 8.1.0 O11019 1551323885 release-keys
Security Patch : 2019-02-05
StorageType : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
IMEI1 : 866************
IMEI2 : 866************
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------
------------------------------
Factory Reset Flash Mode..
------------------------------
Operation : MTK_FUDRebuild
-userdata .....Ok
Done Writing...
Status: Ok

Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!

Elapsed Time : 00:00:18
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Mi 9T (davinci) BL Locked ENG Rom Flash With Temporary BL Unlock Method by Hydra Tool

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Qualcomm Flashing Function......
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching Device By Fastboot
Device Found...
- switch[0](dummy.img), 8 KB = Ok
- ssd[0](dummy.img), 8 KB = Ok
- misc[0](misc.img), 4 MB = Ok
- logfs[0](logfs_ufs_8mb.bin), 16 KB = Ok
- devinfo[0](dummy_devinfo.img), 4 KB = Ok
- metadata[0](metadata.img), 48,121 KB = Ok
- vendor[0](vendor.img), 1,111 GB = Ok
- system[0](system.img), 1,39 GB = Ok
- imagefv[0](imagefv.elf), 28 KB = Ok
- recovery[0](recovery.img), 64 MB = Ok
- cache[0](cache.img), 128,145 KB = Ok
- cust[0](cust.img), 15,172 MB = Ok
- userdata[0](userdata.img), 5,157 MB = Ok
- xbl_config[0](xbl_config.elf), 80,246 KB = Ok
- xbl[0](xbl.elf), 4,376 MB = Ok
- xbl_configbak[0](xbl_config.elf), 80,246 KB = Ok
- xblbak[0](xbl.elf), 4,376 MB = Ok
- ddr[0](dummy.img), 8 KB = Ok
- multiimgoem[0](multi_image.mbn), 32 KB = Ok
- secdata[0](sec_for_secureboot_use.elf), 12,465 KB = Ok
- qupfw[0](qupv3fw.elf), 48,045 KB = Ok
- qupfwbak[0](qupv3fw.elf), 48,045 KB = Ok
- vbmeta[0](vbmeta.img), 4 KB = Ok
- storsec[0](storsec.mbn), 19,95 KB = Ok
- devcfg[0](devcfg.mbn), 42,078 KB = Ok
- devcfgbak[0](devcfg.mbn), 42,078 KB = Ok
- aop[0](aop.mbn), 159,211 KB = Ok
- aopbak[0](aop.mbn), 159,211 KB = Ok
- cmnlib[0](cmnlib.mbn), 381,217 KB = Ok
- cmnlibbak[0](cmnlib.mbn), 381,217 KB = Ok
- cmnlib64[0](cmnlib64.mbn), 495,311 KB = Ok
- cmnlib64bak[0](cmnlib64.mbn), 495,311 KB = Ok
- keymaster[0](km4.mbn), 228,224 KB = Ok
- keymasterbak[0](km4.mbn), 228,224 KB = Ok
- bluetooth[0](BTFM.bin), 748 KB = Ok
- uefisecapp[0](uefi_sec.mbn), 123,464 KB = Ok
- uefisecappbak[0](uefi_sec.mbn), 123,464 KB = Ok
- abl[0](abl.elf), 148 KB = Ok
- ablbak[0](abl.elf), 148 KB = Ok
- tz[0](tz.mbn), 1,953 MB = Ok
- tzbak[0](tz.mbn), 1,953 MB = Ok
- hyp[0](hyp.mbn), 376,758 KB = Ok
- hypbak[0](hyp.mbn), 376,758 KB = Ok
- dtbo[0](dtbo.img), 32 MB = Ok
- logo[0](logo.img), 26,348 MB = Ok
- dsp[0](dspso.bin), 32 MB = Ok
- boot[0](boot.img), 128 MB = Ok
- modem[0](NON-HLOS.bin), 110,699 MB = Ok
- fsg[0](factory_nv.img), 8 MB Skipped
- fsc[0](dummy_fsc.img), 4 KB = Ok
- modemst1[0](dummy_modemst.img), 8 MB Skipped
- modemst2[0](dummy_modemst.img), 8 MB Skipped
- persist[0](persist.img), 64 MB Skipped
- persistbak[0](persist.img), 64 MB = Ok

Elapsed Time : 00:01:31
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
İnfinix Hot 10 Play FRP Remove With by Hydra Tool
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Service Function
Factory Reset Protection[FRP]
Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching for MTK Device...Found
MTK Port Type : Flashmode BROM
FriendlyName : MediaTek USB Port (COM8)
Device : /5&2191cfca&0&11
SymbolicName : \\?\usb#vid_0e8d&pid_0003#5&2191cfca&0&11#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2016,3.0.1504.0
Service : wdm_usb

Openning Port [COM8] Ok
Handshaking...Ok
HwCode : 0766 {MT6765/MT8768t}
Hwver : 0000
Target config : E5
SBC : 01 (True)
SLA : 00 (False)
DAA : 04 (True)
SWJTAG : 04 (True)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 20 (True)
MEMWRITE : 40 (True)
CMD_C8 : 80 (True)
Connection : BROM
HW Subcode : 8A00
HW Subcode : CA00
SW Ver : 0000
ME_ID : F47B8FC79B12507BF7FFDE79F7497E58
SOC_ID : 1963C919B0925C30751F5DBDE8A9D07DF5C5D2B4A2A5302D28B37CA70E50BD63

Exploiting Device...
Successfully Exploited..
Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..Found @ 0x00200BC4
Starting to dump...
Prel Size : 0x0003BF68
Successfully dump preloader.. [C:\Hydra Tool\Boot\PreloaderDump\preloader_x688b_h659.bin]
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)
Connection : BROM

Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin]
Patching da2 ... Ok
Uploading Stage 1....
Successfully uploaded stage 1, jumping ..
Executing JUMP_DA Address @ 0x00200000
Jumping to 0x00200000 Ok 0xC0
Successfully received DA sync
ONNECTION_AGENT : brom
DRAM config needed for : 1501004450364441
Sending auto preloader from dump... [preloader_x688b_h659.bin]
Sending emi data.. [DRAM setup passed.]
Sending emi data succeeded.
Uploading stage 2...
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
ERAM Size : 0x000000000003A000-232 KB
IRAM Size : 0x0000000100000000-4 GB
EMMC Boot1 Size : 0x0000000000400000-4 MB
EMMC Boot2 Size : 0x0000000000400000-4 MB
EMMC RPMB Size : 0x0000000001000000-16 MB
EMMC USER Size : 0x0000000E8F800000-58.242 GB
EMMC CID : 15010044503644414202FC9ECA8AC82D - DP6DAB
HW-CODE : 0x766
HWSUB-CODE : 0x8A00
HW-VERSION : 0xCA00
SW-VERSION : 0x0
CHIP-EVOLUTION : 0x0
DA-VERSION : 1.0
Speed : high-speed
Upload data was accepted. Jumping to stage 2...
DA Extensions successfully added
Reading Partition Table ..
Partition Count : 43
--------------- Reading build.prop content ---------------
--------------- end of build.prop content ---------------

Reading IMEI........
IMEI1 : 359************
IMEI2 : 359************
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------
Backing up Security..
- preloader(preloader.bin), 512 KB = Ok [preloader_x688b_h659.bin]
*Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0766_F47B8FC79B12507BF7FFDE79F7497E58\Auto\040523161337\6765_Android_scatter.txt
- pgpt(pgpt.bin), 32 KB = Ok
- nvram(nvram.bin), 64 MB = Ok
- nvdata(nvdata.bin), 71.867 MB = Ok
- frp(frp.bin), 1024 KB = Ok
- protect1(protect1.bin), 8 MB = Ok
- protect2(protect2.bin), 8 MB = Ok
- persist(persist.bin), 48 MB = Ok
- proinfo(proinfo.bin), 3 MB = Ok
- nvcfg(nvcfg.bin), 32 MB = Ok
- sec1(sec1.bin), 2 MB = Ok
- seccfg(seccfg.bin), 8 MB = Ok
Backup Done!!!
Status: Ok

Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!

Elapsed Time : 00:00:42
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Oppo A33 (CPH2137) EDL Format Userdata with by Hydra Tool

PreOperation Configuration
Brand : AUTO Model : AUTO Storage : Auto
Loader: Auto
Port : Auto

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM3)
SymbolicName :\\?\usb#vid_05c6&pid_9008#7&2b3e3b87&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/10/2020,5.1.1.2

Getting device info......
Serial No.: 0x222A3BB3
HW_ID : 007050E100000000
MSM ID : 0x007050E1, MSM8916-Qualcomm Snapdragon 410 /HAAAANAZA
MODEL_ID : 0x0000
OEM_ID : 0x0000 - QUALCOMM
PBL Ver : 00000000
PK HASH : cc3153a80293939b90d02d3bf8b23e0292e452fef662c74998421adad42a380f

Hydra Enable Auto search Firehose..
#Please wait...
#Search by filename filter.....
#Found 1 Compatible Files..Found match Firehose...

Firehose Loader[007050e10029001e_cc3153a80293939b_ae162be1_asus_qualcomm_peek_8916.fhprg]
--------------------------------------------------
Header Type : OLD
TargetMSM : 8916
Tag : _peek
Version : 3
Code_size : 96
Signature_size : 256
fhVendor : QUALCOMM
HW_ID : 007050E10029001E
Vendor : ASUS
OEM_ID : 0029
MODEL_ID : 001E
SW_ID : 0000000000000003
APP_ID :
pk_hash : cc3153a80293939b90d02d3bf8b23e0292e452fef662c74998421adad42a380f
OEM_VERSION :
IMAGE_VARIANT :
QC_VERSION :
--------------------------------------------------

SaharaBoot... Ok
Sending .....Ok
Connecting to Firehose...
Ping... Ok
Configuration.......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8916
Version : 1


Protocol : Universal
Running : Ok

Reading GPT[3]
Drive [0] 40 Items
Drive [1] 0 Items
Drive [2] 4 Items


Phone Information.....
Brand : OPPO
Vendor : OPPO
Model : OPPO A33
Product : A33
Manufacturer : OPPO
ID : LMY47V
SDK : 22
Release : 5.1.1
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Description : msm8916_64-user 5.1.1 LMY47V eng.root.20161012.042311 dev-keys
Device : A33
Display ID : A33_11_A.15_161012
Security Patch : 2015-10-01
Platform : msm8916
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : OPPO/A33/A33:5.1.1/LMY47V/1390465867:user/release-keys


Backup Security partitions...
Reading Security Items....
- modemst1(modemst1.bin), 1.5 MB = Ok
- modemst2(modemst2.bin), 1.5 MB = Ok
- fsg(fsg.bin), 1.5 MB = Ok
- fsc(fsc.bin), 512 Bytes = Ok
C:\Hydra Tool\Backup\QUALBackup\QUALCOMM\007050E100000000_222A3BB3\Security_Backup\040523144054.sec
Backup Security Success....
Formatting Userdata...
Method : Auto
Processing...
- Formatting Userdata
Executing ...
- Formatting Userdata [Safe Format - eMMc] OkOk
Status : Ok

Rebooting Phone.... Ok
If not rebooted, Please Power on Manually

Elapsed Time : 00:00:07
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi 9A Dual imei Repair with by Hydra Tool

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
***IMEI REPAIR FUNCTION****
Xiaomi Dual
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching for MTK Device...Found
MTK Port Type : Flashmode BROM
FriendlyName : MediaTek USB Port (COM4)
Device : /5&1548b049&0&3
SymbolicName : \\?\usb#vid_0e8d&pid_0003#5&1548b049&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2016,3.0.1504.0
Service : wdm_usb

Openning Port [COM4] Ok
Reading Partition Table ..
ERAM Size : 0x000000000003A000-232 KB
IRAM Size : 0x0000000080000000-2 GB
EMMC Boot1 Size : 0x0000000000400000-4 MB
EMMC Boot2 Size : 0x0000000000400000-4 MB
EMMC RPMB Size : 0x0000000001000000-16 MB
EMMC USER Size : 0x0000000747C00000-29.121 GB
EMMC CID : 9B010059325030333200C11E397619BF - Y2P032
HW-CODE : 0x766
HWSUB-CODE : 0x8A00
HW-VERSION : 0xCA00
SW-VERSION : 0x0
CHIP-EVOLUTION : 0x0
DA-VERSION : 1.0
Speed : high-speed
Partition Count : 45
--------------- Reading build.prop content ---------------
Product : dandelion
Marketname : ro.product.systemRedmi 9A
ID : QP1A.190711.020
SDK : 29
Release : 10
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-GB
Description : dandelion-user 10 QP1A.190711.020 V12.0.20.0.QCDMIXM release-keys
Display ID : QP1A.190711.020
Security Patch : 2022-05-01
StorageType : mtp
--------------- end of build.prop content ---------------
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------

Xiaomi Flashmode Dual IMEI Repair
Backing up Security..
- nvram Ok
- nvdata Ok
- vbmeta Ok
- proinfo Ok
- vbmeta_vendor Ok
Step 1 Ok
Step 2 Ok
Step 3 Ok
Step 4 Ok
Operation Done!!!!

Reading IMEI........
IMEI1 : 343************
IMEI2 : 32467**********

Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!

Action Result : Ok

Elapsed Time : 00:00:37
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi Note 9S (curtana) Temporary BL Unlock With by Hydra Tool

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Xiaomi Tool
Bootloader
Temporary Unlock
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Adb Handler [Console]
Starting ADB Server....
Searching Device By ADB
Device Found...
Sate : sideload
Product name : curtana_global
Product model : Redmi_Note_9S
Product device : curtana


Model : curtana_global
Android VERSION : 11
OS Version : V12.5.5.0.RJWMIXM
Branch : F
Language :
Region : IR

Processing...

Action Result : Ok

Elapsed Time : 00:00:12
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
A51 (A515F) Frp Remove With by Hydra Tool

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Samsung Service Tool
Factory Reset Protection
FRP Offline Method 2
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Scanning Port....

Openning Port [COM226] Ok
Init Samsung Device..... Ok

Adb Handler [Console]
Starting ADB Server....
Searching Device By ADB
Device Not Found !!
Check Cable or Driver Please...

Scanning Port....

Openning Port [COM226] Ok
Init Samsung Device..... Ok

Adb Handler [Console]
Starting ADB Server....
Searching Device By ADB
Device Found...
Sate : device
Product name : a51nsser
Product model : SM_A515F
Product device : a51


Adb Handler [Console]
Starting ADB Server....
Searching Device By ADB
Device Found...
Sate : device
Product name : a51nsser
Product model : SM_A515F
Product device : a51

Read Buildprop....
Brand : samsung
Model : SM-A515F
ABI : arm64-v8a
Display ID : RP1A.200720.012.A515FXXU5EUL3
Security Patch : 2022-01-01
Platform : universal9611
FRPPST : /dev/block/persistent
Fingerprint : samsung/a51nsser/a51:11/RP1A.200720.012/A515FXXU5EUL3:user/release-keys

Action Result : Success!!


Elapsed Time : 00:01:45
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
INE-LX1 Psmart Plus Frp Remove with by Hydra Tool

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Huawei Service Tool
Factory Reset Protection/Account
Remove FRP
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -


Searching for Hisilicon USB1 Port...Found
FriendlyName : HUAWEI USB COM 1.0 (COM3)
Device : /5&10dc9a0c&0&3
SymbolicName : \\?\usb#vid_12d1&pid_3609#5&10dc9a0c&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 11/06/2015,2.0.7.1
Service : HSPL_usbvcom

Openning Port [COM3] Ok
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Factory Mode Operation....
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Removing FRP....

Action Result : Ok

Elapsed Time : 00:00:03
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye

Redmi Note 7 (lavender) Remove Mi Account in EDL mode with by Hydra Tool

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Xiaomi Tool
Mi Account
Remove MiAccount[New Method]
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

PreOperation Configuration
Brand : AUTO Model : AUTO Storage : Auto
Loader: Auto
Port : Auto

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM61)
SymbolicName :\\?\usb#vid_05c6&pid_9008#7&2dc1c7b0&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :03/25/2016,2.1.2.2

Getting device info......
Serial No.: 0xBB9FBB2E
HW_ID : 0008C0E100000000
MSM ID : 0x0008C0E1, SDM660-Qualcomm Snapdragon 660/Sdm660LA
MODEL_ID : 0x0000
OEM_ID : 0x0000 - QUALCOMM
PBL Ver : 00000000
PK HASH : a7b8b82545a98eca23d6e9105fb464568d1b5828264903441bdef0cd57e3c370

Hydra Enable Auto search Firehose..
#Please wait...
#Search by filename filter.....
#Found 60 Compatible Files..Found match Firehose...

Firehose Loader[0008c0e100010000_a7b8b82545a98eca_3e1fe8bf_generic_xiaomi.fhprg]
--------------------------------------------------
Header Type : OLD
TargetMSM :
Tag :
Version : 5
Code_size : 416
Signature_size : 256
fhVendor : XIAOMI
HW_ID : 3006000000010000
Vendor : GENERIC
OEM_ID : 0001
MODEL_ID : 0000
SW_ID : 000000000000000B
APP_ID :
pk_hash : a7b8b82545a98eca23d6e9105fb464568d1b5828264903441bdef0cd57e3c370
OEM_VERSION : c3-bsp-builder-job001.bj
IMAGE_VARIANT : Sdm660LA
QC_VERSION : BOOT.XF.1.4-00255-S660LZB-1
--------------------------------------------------

SaharaBoot... Ok
Sending ...............................Ok
Connecting to Firehose...
Ping......... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : MSM8996
Version : 1
DateTime : Apr 4 2018 - 18:58:16

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 1346201684
Firmware Version : 2
Product Name : DV6DMB
Physical Partitions : 4
Total Logical Blocks:
Drive [0] 244277248[116.48 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Drive [3] 32768[16 MB]

Protocol : Universal
Running : Ok

Reading GPT[4]
Drive [0] 68 Items
Drive [1] 0 Items
Drive [2] 0 Items
Drive [3]


Phone Information......
Vendor : Xiaomi
Manufacturer : Xiaomi
ID : QKQ1.190910.002
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Miui Ver : V125
Display ID : QKQ1.190910.002 V12.5.3.0.QFGMIXM
Security Patch : 2021-10-01


Backup Security partitions...
Reading Security Items....
- modemst1(modemst1.bin), 8 MB = Ok
- modemst2(modemst2.bin), 8 MB = Ok
- fsg(fsg.bin), 8 MB = Ok
- fsc(fsc.bin), 7.5 KB = Ok
C:\Hydra Tool\Backup\QUALBackup\QUALCOMM\0008C0E100000000_BB9FBB2E\Security_Backup\041223044341.sec
Backup Security Success....
Processing Remove MiAccount[New Method]....
Reading GPT[4]
Drive [0] 68 Items
Drive [1] 0 Items
Drive [2] 0 Items
Drive [3]

Backing up Partition for safety...Ok

Scanning Patching address...
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]Done!!
Total Items patched : 7
Successfully patched address..
Action Result : Ok

Action Result : Ok

Elapsed Time : 00:00:40
 

Attachments

  • 210900018732_HydraTool.exe__04-12-2023-044455.jpeg
    210900018732_HydraTool.exe__04-12-2023-044455.jpeg
    193.7 KB · Views: 0

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi Note 7 (lavender) Remove FRP With by Hydra Tool

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Qualcomm Service Tool
Factory Reset Protection
Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

PreOperation Configuration
Brand : AUTO Model : AUTO Storage : Auto
Loader: Auto
Port : Auto

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM61)
SymbolicName :\\?\usb#vid_05c6&pid_9008#7&2dc1c7b0&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :03/25/2016,2.1.2.2

Getting device info......
Serial No.: 0xBB9FBB2E
HW_ID : 0008C0E100000000
MSM ID : 0x0008C0E1, SDM660-Qualcomm Snapdragon 660/Sdm660LA
MODEL_ID : 0x0000
OEM_ID : 0x0000 - QUALCOMM
PBL Ver : 00000000
PK HASH : a7b8b82545a98eca23d6e9105fb464568d1b5828264903441bdef0cd57e3c370

Hydra Enable Auto search Firehose..
#Please wait...
#Search by filename filter.....
#Found 60 Compatible Files..Found match Firehose...

Firehose Loader[0008c0e100010000_a7b8b82545a98eca_3e1fe8bf_generic_xiaomi.fhprg]
--------------------------------------------------
Header Type : OLD
TargetMSM :
Tag :
Version : 5
Code_size : 416
Signature_size : 256
fhVendor : XIAOMI
HW_ID : 3006000000010000
Vendor : GENERIC
OEM_ID : 0001
MODEL_ID : 0000
SW_ID : 000000000000000B
APP_ID :
pk_hash : a7b8b82545a98eca23d6e9105fb464568d1b5828264903441bdef0cd57e3c370
OEM_VERSION : c3-bsp-builder-job001.bj
IMAGE_VARIANT : Sdm660LA
QC_VERSION : BOOT.XF.1.4-00255-S660LZB-1
--------------------------------------------------

SaharaBoot... Ok
Sending ...............................Ok
Connecting to Firehose...
Ping......... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : MSM8996
Version : 1
DateTime : Apr 4 2018 - 18:58:16

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 1346201684
Firmware Version : 2
Product Name : DV6DMB
Physical Partitions : 4
Total Logical Blocks:
Drive [0] 244277248[116.48 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Drive [3] 32768[16 MB]

Protocol : Universal
Running : Ok

Reading GPT[4]
Drive [0] 68 Items
Drive [1] 0 Items
Drive [2] 0 Items
Drive [3]


Phone Information......
Vendor : Xiaomi
Manufacturer : Xiaomi
ID : QKQ1.190910.002
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Miui Ver : V125
Display ID : QKQ1.190910.002 V12.5.3.0.QFGMIXM
Security Patch : 2021-10-01


Backup Security partitions...
Reading Security Items....
- modemst1(modemst1.bin), 8 MB = Ok
- modemst2(modemst2.bin), 8 MB = Ok
- fsg(fsg.bin), 8 MB = Ok
- fsc(fsc.bin), 7.5 KB = Ok
C:\Hydra Tool\Backup\QUALBackup\QUALCOMM\0008C0E100000000_BB9FBB2E\Security_Backup\041223044454.sec
Backup Security Success....
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOk

Rebooting Phone.... Ok

Action Result : Ok

Elapsed Time : 00:00:18
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye

Redmi Note 8 Pro (begonia) Dual Sim Repair With by Hydra Tool

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
***IMEI REPAIR FUNCTION****
Xiaomi Dual
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching for MTK Device...Found
MTK Port Type : Flashmode BROM
FriendlyName : MediaTek USB Port_V1632 (COM11)
Device : /5&c72d3e8&0&3
SymbolicName : \\?\usb#vid_0e8d&pid_0003#5&c72d3e8&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0
Service : wdm_usb

Openning Port [COM11] Ok
Reading Partition Table ..
ERAM Size : 0x0000000000080000-512 KB
IRAM Size : 0x0000000180000000-6 GB
UFS MID : 0x48
UFS FWVer : 0xA107
UFS Blocksize : 0x0000000000001000-4 KB
UFS LU0 Size : 0x0000000000400000-4 MB
UFS LU1 Size : 0x0000000000400000-4 MB
UFS LU2 Size : 0x0000001DCB000000-119.172 GB
UFS ID : H
UFS CID : 4839485131364145434D4D444152000000000000
HW-CODE : 0x813
HWSUB-CODE : 0x8A00
HW-VERSION : 0xCA00
SW-VERSION : 0x0
CHIP-EVOLUTION : 0x0
DA-VERSION : 1.0
Speed : high-speed
Partition Count : 49
--------------- Reading build.prop content ---------------
Product : begoniain
Marketname : ro.product.systemRedmi Note 8 Pro
ID : RP1A.200720.011
SDK : 30
Release : 11
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : begoniain-user 11 RP1A.200720.011 V12.5.10.0.RGGINXM release-keys
Display ID : RP1A.200720.011
Security Patch : 2022-04-01
StorageType : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
IMEI1 : 8661***********
IMEI2 : 86616**********
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------

Xiaomi Flashmode Dual IMEI Repair
Backing up Security..
- nvram Ok
- nvdata Ok
- vbmeta Ok
- proinfo Ok
Step 1 Ok
Step 2 Ok
Step 3 Ok
Step 4 Ok
Operation Done!!!!

Reading IMEI........
IMEI1 : 3545***********
IMEI2 : 3545***********

Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!

Action Result : Ok

Elapsed Time : 00:00:23
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi 10 (selene) Format Factory Reset in EDL Mode With by Hydra

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Service Function
Format/Factory Reset/ScreenLock
Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching for MTK Device...Found
MTK Port Type : Flashmode BROM
FriendlyName : MediaTek USB Port_V1632 (COM77)
Device : /7&859f3e&0&1
SymbolicName : \\?\usb#vid_0e8d&pid_0003#7&859f3e&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0
Service : wdm_usb

Openning Port [COM77] Ok
Reading Partition Table ..
ERAM Size : 0x0000000000070000-448 KB
IRAM Size : 0x0000000100000000-4 GB
EMMC Boot1 Size : 0x0000000000400000-4 MB
EMMC Boot2 Size : 0x0000000000400000-4 MB
EMMC RPMB Size : 0x0000000001000000-16 MB
EMMC USER Size : 0x0000001D1EC00000-116.48 GB
EMMC CID : 9B010059325031323800DC0F23449819 - Y2P128
HW-CODE : 0x707
HWSUB-CODE : 0x8A00
HW-VERSION : 0xCA00
SW-VERSION : 0x0
CHIP-EVOLUTION : 0x1
DA-VERSION : 1.0
Speed : high-speed
Partition Count : 57
--------------- Reading build.prop content ---------------
Product : selene
Marketname : ro.product.systemRedmi 10
ID : RP1A.200720.011
SDK : 30
Release : 11
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : selene-user 11 RP1A.200720.011 V12.5.8.0.RKUMIXM release-keys
Display ID : AL5186-selene-build-20211026114728
Security Patch : 2021-10-01
StorageType : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
IMEI1 : 866************
IMEI2 : 866************
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------
------------------------------
Factory Reset Flash Mode..
------------------------------
Operation : Safeformat Universal...
Status: Ok

Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!

Elapsed Time : 00:00:05
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Pocophone M3 (citrus) EDL Flashing With by Hydra Tool

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Qualcomm Flashing Function......
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

PreOperation Configuration
Brand : XIAOMI Model : Poco M3 (citrus) Storage : Auto
Loader: 0000000000720000_1bebe3863a6781db_159eb52f_XIAOMI.fhprg
Port : COM25

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM17)
SymbolicName :\\?\usb#vid_05c6&pid_9008#6&2953c98d&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/31/2015,2.1.2.0

Getting device info......
Serial No.: 0xD00C540A
HW_ID : 0014D0E100720000
MSM ID : 0x0014D0E1, SM_KAMORTA_H- /
MODEL_ID : 0x0000
OEM_ID : 0x0072 - XIAOMI
PBL Ver : 00000000
PK HASH : 1bebe3863a6781db4b01086063007334de9e5ca14971c7c4f4358ec9d79cda46

Firehose Loader[0000000000720000_1bebe3863a6781db_159eb52f_XIAOMI.fhprg]
--------------------------------------------------
Header Type : New
TargetMSM :
Tag :
Version : 6
Code_size : 816
Signature_size : 256
fhVendor : XIAOMI
HW_ID : 0000000000720000
Vendor : XIAOMI
OEM_ID : 0072
MODEL_ID : 0000
SW_ID : 00000003
APP_ID : 00000000
pk_hash : 1bebe3863a6781db4b01086063007334de9e5ca14971c7c4f4358ec9d79cda4692ce5e948c6fd409408f4c919fcadfe3
OEM_VERSION : f2f760038334
IMAGE_VARIANT : KamortaPkgLAA
QC_VERSION : BOOT.XF.4.1-00187-KAMORTALAZ-2
--------------------------------------------------

SaharaBoot... Ok
Sending .................................Ok
Connecting to Firehose...
Ping...................... Ok
Configuration........
Identifying Chip........UFS
Ok
Chip Configuration :
MemoryName : UFS
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Nov 16 2020 - 01:25:39

*** STORAGE DEVICE INFO ***
Memory Type : UFS
Block Size in Bytes : 4096
Page Size : 4096
Manufacturer ID : 300
Serial Number : 1129467726
Firmware Version : 605
Product Name : MT064GASAO2U21 0605
Physical Partitions : 6
Total Logical Blocks:
Drive [0] 14499840[55.313 GB]
Drive [1] 2048[8 MB]
Drive [2] 2048[8 MB]
Drive [3] 32768[128 MB]
Drive [4] 1048576[4 GB]
Drive [5] 32768[128 MB]

Protocol : Universal
Running : Ok

Reading GPT[6]
Drive [0] 32 Items
Drive [1] 32 Items
Drive [2] 32 Items
Drive [3] 32 Items
Drive [4] 64 Items
Drive [5] 32 Items


Failed to read information from phone.


Backup Security partitions...
Reading Security Items....
- modemst1(modemst1.bin), 1.996 MB = Ok
- modemst2(modemst2.bin), 1.996 MB = Ok
- fsg(fsg.bin), 1.996 MB = Ok
- fsc(fsc.bin), 124 KB = Ok
C:\Hydra Tool\Backup\QUALBackup\XIAOMI\0014D0E100720000_D00C540A\Security_Backup\041423141951.sec
Backup Security Success....

Backup Security partitions...
Reading Security Items....
- modemst1(modemst1.bin), 1.996 MB = Ok
- modemst2(modemst2.bin), 1.996 MB = Ok
- fsg(fsg.bin), 1.996 MB = Ok
- fsc(fsc.bin), 124 KB = Ok
C:\Hydra Tool\Backup\QUALBackup\XIAOMI\0014D0E100720000_D00C540A\Security_Backup\041423141952.sec
Backup Security Success....
----------------------------
Flashing Selected Partitions....
- vbmeta_system[0](vbmeta_system.img), 4 KB = Ok
- metadata[0](metadata.img), 44.074 KB = Ok
- persist[0](persist.img), 32 MB Skipped
- recovery[0](recovery.img), 128 MB = Ok
- super[0](super.img), 5.451 GB = Ok
- userdata[0](userdata.img), 286.266 MB = Ok
- PrimaryGPT[0](gpt_main0.bin), 24 KB = Ok
- xbl_config[1](xbl_config.elf), 42.043 KB = Ok
- xbl[1](xbl.elf), 3.795 MB = Ok
- PrimaryGPT[1](gpt_main1.bin), 24 KB = Ok
- xbl_configbak[2](xbl_config.elf), 42.043 KB = Ok
- xblbak[2](xbl.elf), 3.795 MB = Ok
- PrimaryGPT[2](gpt_main2.bin), 24 KB = Ok
- PrimaryGPT[3](gpt_main3.bin), 24 KB = Ok
- multiimgoem[4](multi_image.mbn), 32 KB = Ok
- vbmeta[4](vbmeta.img), 4 KB = Ok
- qupfw[4](qupv3fw.elf), 52.517 KB = Ok
- devcfg[4](devcfg.mbn), 41.938 KB = Ok
- storsec[4](storsec.mbn), 20.025 KB = Ok
- hyp[4](hyp.mbn), 379.758 KB = Ok
- hypbak[4](hyp.mbn), 379.758 KB = Ok
- cmnlib[4](cmnlib.mbn), 391.973 KB = Ok
- cmnlibbak[4](cmnlib.mbn), 391.973 KB = Ok
- cmnlib64[4](cmnlib64.mbn), 516.297 KB = Ok
- cmnlib64bak[4](cmnlib64.mbn), 516.297 KB = Ok
- keymaster[4](km4.mbn), 232.527 KB = Ok
- keymasterbak[4](km4.mbn), 232.527 KB = Ok
- bluetooth[4](BTFM.bin), 924 KB = Ok
- abl[4](abl.elf), 204 KB = Ok
- ablbak[4](abl.elf), 204 KB = Ok
- imagefv[4](imagefv.elf), 1.996 MB = Ok
- imagefvbak[4](imagefv.elf), 1.996 MB = Ok
- uefisecapp[4](uefi_sec.mbn), 121.435 KB = Ok
- uefisecappbak[4](uefi_sec.mbn), 121.435 KB = Ok
- featenabler[4](featenabler.mbn), 84.282 KB = Ok
- featenablerbak[4](featenabler.mbn), 84.282 KB = Ok
- misc[4](misc.img), 8 KB = Ok
- rpm[4](rpm.mbn), 220.063 KB = Ok
- rpmbak[4](rpm.mbn), 220.063 KB = Ok
- tz[4](tz.mbn), 3.145 MB = Ok
- tzbak[4](tz.mbn), 3.145 MB = Ok
- logfs[4](logfs_ufs_8mb.bin), 16 KB = Ok
- dtbo[4](dtbo.img), 8 MB = Ok
- dsp[4](dspso.bin), 32 MB = Ok
- boot[4](boot.img), 96 MB = Ok
- modem[4](NON-HLOS.bin), 119.324 MB = Ok
- cache[4](cache.img), 56.121 KB = Ok
- cust[4](cust.img), 179.465 MB = Ok
- PrimaryGPT[4](gpt_main4.bin), 24 KB = Ok
- PrimaryGPT[5](gpt_main5.bin), 24 KB = Ok

Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-6.] = Ok
0 [NUM_DISK_SECTORS-6.] = Ok
0 [NUM_DISK_SECTORS-6.] = Ok
0 [NUM_DISK_SECTORS-6.] = Ok
0 [NUM_DISK_SECTORS-1.] = Ok
0 [NUM_DISK_SECTORS-1.] = Ok
0 [NUM_DISK_SECTORS-5.] = Ok
0 [CRC32(2,4096)] = Ok
0 [CRC32(NUM_DISK_SECTORS-5.,4096)] = Ok
0 [0] = Ok
0 [CRC32(1,92)] = Ok
0 [0] = Ok
0 [CRC32(NUM_DISK_SECTORS-1.,92)] = Ok
1 [NUM_DISK_SECTORS-6.] = Ok
1 [NUM_DISK_SECTORS-6.] = Ok
1 [NUM_DISK_SECTORS-6.] = Ok
1 [NUM_DISK_SECTORS-6.] = Ok
1 [NUM_DISK_SECTORS-1.] = Ok
1 [NUM_DISK_SECTORS-1.] = Ok
1 [NUM_DISK_SECTORS-5.] = Ok
1 [CRC32(2,4096)] = Ok
1 [CRC32(NUM_DISK_SECTORS-5.,4096)] = Ok
1 [0] = Ok
1 [CRC32(1,92)] = Ok
1 [0] = Ok
1 [CRC32(NUM_DISK_SECTORS-1.,92)] = Ok
2 [NUM_DISK_SECTORS-6.] = Ok
2 [NUM_DISK_SECTORS-6.] = Ok
2 [NUM_DISK_SECTORS-6.] = Ok
2 [NUM_DISK_SECTORS-6.] = Ok
2 [NUM_DISK_SECTORS-1.] = Ok
2 [NUM_DISK_SECTORS-1.] = Ok
2 [NUM_DISK_SECTORS-5.] = Ok
2 [CRC32(2,4096)] = Ok
2 [CRC32(NUM_DISK_SECTORS-5.,4096)] = Ok
2 [0] = Ok
2 [CRC32(1,92)] = Ok
2 [0] = Ok
2 [CRC32(NUM_DISK_SECTORS-1.,92)] = Ok
3 [NUM_DISK_SECTORS-6.] = Ok
3 [NUM_DISK_SECTORS-6.] = Ok
3 [NUM_DISK_SECTORS-6.] = Ok
3 [NUM_DISK_SECTORS-6.] = Ok
3 [NUM_DISK_SECTORS-1.] = Ok
3 [NUM_DISK_SECTORS-1.] = Ok
3 [NUM_DISK_SECTORS-5.] = Ok
3 [CRC32(2,4096)] = Ok
3 [CRC32(NUM_DISK_SECTORS-5.,4096)] = Ok
3 [0] = Ok
3 [CRC32(1,92)] = Ok
3 [0] = Ok
3 [CRC32(NUM_DISK_SECTORS-1.,92)] = Ok
4 [NUM_DISK_SECTORS-6.] = Ok
4 [NUM_DISK_SECTORS-6.] = Ok
4 [NUM_DISK_SECTORS-6.] = Ok
4 [NUM_DISK_SECTORS-6.] = Ok
4 [NUM_DISK_SECTORS-1.] = Ok
4 [NUM_DISK_SECTORS-1.] = Ok
4 [NUM_DISK_SECTORS-5.] = Ok
4 [CRC32(2,8192)] = Ok
4 [CRC32(NUM_DISK_SECTORS-5.,8192)] = Ok
4 [0] = Ok
4 [CRC32(1,92)] = Ok
4 [0] = Ok
4 [CRC32(NUM_DISK_SECTORS-1.,92)] = Ok
5 [NUM_DISK_SECTORS-6.] = Ok
5 [NUM_DISK_SECTORS-6.] = Ok
5 [NUM_DISK_SECTORS-6.] = Ok
5 [NUM_DISK_SECTORS-6.] = Ok
5 [NUM_DISK_SECTORS-1.] = Ok
5 [NUM_DISK_SECTORS-1.] = Ok
5 [NUM_DISK_SECTORS-5.] = Ok
5 [CRC32(2,4096)] = Ok
5 [CRC32(NUM_DISK_SECTORS-5.,4096)] = Ok
5 [0] = Ok
5 [CRC32(1,92)] = Ok
5 [0] = Ok
5 [CRC32(NUM_DISK_SECTORS-1.,92)] = Ok
Operation : Setbootablestoragedrive: Drive 1
Set bootable storage drive 1 Ok

Rebooting Phone.... Ok

Elapsed Time : 00:04:59
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi 10 (selene) Dual imei repair with by Hydra Tool

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
***IMEI REPAIR FUNCTION****
Xiaomi Dual
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching for MTK Device...Found
MTK Port Type : Flashmode BROM
FriendlyName : MediaTek USB Port (COM17)
Device : /6&4a9a4d9&0&3
SymbolicName : \\?\usb#vid_0e8d&pid_0003#6&4a9a4d9&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2016,3.2
Service : wdm_usb

Openning Port [COM17] Ok
Handshaking...Ok
HwCode : 0707 {MT6768}
Hwver : 0000
Target config : E7
SBC : 01 (True)
SLA : 02 (True)
DAA : 04 (True)
SWJTAG : 06 (True)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 20 (True)
MEMWRITE : 40 (True)
CMD_C8 : 80 (True)
Connection : BROM
HW Subcode : 8A00
HW Subcode : CA00
SW Ver : 0000
ME_ID : D55BBC412EE264A840EF9ABCBB650097
SOC_ID : A649E5062C441FF4072C2E66B6EBCE56ADECA6982D1BFFF29B6144EB1D1140A1

Exploiting Device...
Successfully Exploited..
Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..Found @ 0x00200BC4
Starting to dump...
Prel Size : 0x0004A19C
Successfully dump preloader.. [C:\Hydra Tool\Boot\PreloaderDump\preloader_selene.bin]
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)
Connection : BROM

Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin]
Uploading Stage 1....
Successfully uploaded stage 1, jumping ..
Executing JUMP_DA Address @ 0x00200000
Jumping to 0x00200000 Ok 0xC0
Successfully received DA sync
ONNECTION_AGENT : brom
DRAM config needed for : 13014E47314A3953
Sending auto preloader from dump... [preloader_selene.bin]
Sending emi data.. [DRAM setup passed.]
Sending emi data succeeded.
Uploading stage 2...
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
ERAM Size : 0x0000000000070000-448 KB
IRAM Size : 0x0000000100000000-4 GB
EMMC Boot1 Size : 0x0000000000400000-4 MB
EMMC Boot2 Size : 0x0000000000400000-4 MB
EMMC RPMB Size : 0x0000000001000000-16 MB
EMMC USER Size : 0x0000001D1F000000-116,484 GB
EMMC CID : 13014E47314A3953391014C145B478E1 - G1J9S9
HW-CODE : 0x707
HWSUB-CODE : 0x8A00
HW-VERSION : 0xCA00
SW-VERSION : 0x0
CHIP-EVOLUTION : 0x1
DA-VERSION : 1.0
Speed : high-speed
Error: on sending data: DA hash mismatch
*DA Extensions failed to enable
Reading Partition Table ..
Partition Count : 57
--------------- Reading build.prop content ---------------
Vendor : Xiaomi
Product : selene
Manufacturer : Xiaomi
ID : SP1A.210812.016
SDK : 31
Release : 12
ABI : arm64-v8a
Locale : en-GB
Description : selene-user 12 SP1A.210812.016 V13.0.4.0.SKULMCR release-keys
Display ID : AL5186-selene-build-20230307165618
Security Patch : 2023-03-01
StorageType : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
IMEI1 : 862389051427288
IMEI2 : 862389051427296
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------
Backing up Security..
- preloader(preloader.bin), 512 KB = Ok [preloader_selene.bin]
*Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0707_D55BBC412EE264A840EF9ABCBB650097\Auto\041323232919\6768_Android_scatter.txt
- pgpt(pgpt.bin), 32 KB = Ok
- nvram(nvram.bin), 64 MB = Ok
- nvdata(nvdata.bin), 64 MB = Ok
- frp(frp.bin), 1024 KB = Ok
- protect1(protect1.bin), 8 MB = Ok
- protect2(protect2.bin), 9,367 MB = Ok
- persist(persist.bin), 48 MB = Ok
- proinfo(proinfo.bin), 3 MB = Ok
- nvcfg(nvcfg.bin), 32 MB = Ok
- sec1(sec1.bin), 2 MB = Ok
- seccfg(seccfg.bin), 8 MB = Ok
Backup Done!!!

Xiaomi Flashmode Dual IMEI Repair
Backing up Security..
- nvram Ok
- nvdata Ok
- vbmeta_a Ok
- vbmeta_b Ok
- proinfo Ok
Step 1 Ok
Step 2 Ok
Step 3 Ok
Step 4 Ok
Operation Done!!!!

Reading IMEI........
IMEI1 : 8623***********
IMEI2 : 8623***********

Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!

Action Result : Ok

Elapsed Time : 00:01:12
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
TECNO Pop 5 LTE Frp Remove With by Hydra Tool

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Service Tool Function..
Factory Reset Protection
Factory Reset
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

****************** PRESS BOOT KEY ******************
VOL + OR VOL - , OR Combination Vol - +
Feature Phone : Call Button
Please hold boot key until second boot..
*******************************************
Scanning Port....

Openning Port [COM32] Ok
Identifying... [SPRD3]
Sending Config Ok Ok
Spreadtrum Boot Block version 1.1
Sending To phone....
Phone is Secured and need Authentication....
Sending Challenge Key To Server....
Please wait....
Token Received.......
Writing to phone...
Token verified successfully... Ok
Successfully booted..Ready to go...

Reading System Info.
Reading IMEI...
BSL_REP_OPERATION_FAILED
BSL_REP_OPERATION_FAILED.
IMEI 1 : ***************
IMEI 2 : ***************
IMEI 3 : ***************
IMEI 4 : ***************
Rebooting Phone..Ok

Action Result : Ok

Elapsed Time : 00:00:16
 

Attachments

  • 888800000021_HydraTool.exe__04-15-2023-183048.jpeg
    888800000021_HydraTool.exe__04-15-2023-183048.jpeg
    200.7 KB · Views: 0

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi Note 9 (merlin) Format Factory Reset With by Hydra Tool

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Service Function
Format/Factory Reset/ScreenLock
Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching for MTK Device...Found
MTK Port Type : Flashmode BROM
FriendlyName : MediaTek USB Port_V1633 (COM6)
Device : /5&376aba2d&0&10
SymbolicName : \\?\usb#vid_0e8d&pid_0003#5&376aba2d&0&10#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Service : wdm_usb

Openning Port [COM6] Ok
Reading Partition Table ..
ERAM Size : 0x0000000000070000-448 KB
IRAM Size : 0x0000000100000000-4 GB
EMMC Boot1 Size : 0x0000000000400000-4 MB
EMMC Boot2 Size : 0x0000000000400000-4 MB
EMMC RPMB Size : 0x0000000001000000-16 MB
EMMC USER Size : 0x0000001D1F000000-116.484 GB
EMMC CID : 13014E47314A3953391003124E8147C3 - G1J9S9
HW-CODE : 0x707
HWSUB-CODE : 0x8A00
HW-VERSION : 0xCA00
SW-VERSION : 0x0
CHIP-EVOLUTION : 0x1
DA-VERSION : 1.0
Speed : high-speed
Partition Count : 49
--------------- Reading build.prop content ---------------
Product : merlin
Marketname : ro.product.systemRedmi Note 9
ID : RP1A.200720.011
SDK : 30
Release : 11
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : merlin-user 11 RP1A.200720.011 V12.5.6.0.RJOINXM release-keys
Display ID : RP1A.200720.011
Security Patch : 2022-06-01
StorageType : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------
------------------------------
Factory Reset Flash Mode..
------------------------------
Operation : Safeformat Universal...
Status: Ok

Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!

Action Result : Ok

Elapsed Time : 00:00:08
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi Note 10 Pro (sweet) BL Locked Format Factory Reset & FRP Remove by Hydra Tool

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Xiaomi Tool
Factory Reset
Safe Format
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Adb Handler [Console]
Starting ADB Server....
Searching Device By ADB
Device Found...
Sate : sideload
Product name : sweet_eea
Product model : M2101K6G
Product device : sweet


Model : sweet_eea_global
Android VERSION : 11
OS Version : V12.5.7.0.RKFEUXM
Branch : F
Language :
Region : IT
Sideload Factory Reset...
Sideload Safe Format....
Processing...
Action Result : Ok

Elapsed Time : 00:00:00




Action Result : Ok

Elapsed Time : 00:00:01
 
Top