★★★ Post All Successfully Repaired Phones By Hydra Tool ★★★

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi Note 7 (lavender) EDL Flashing by Hydra Tool
natali75.NF@gmail.com_HydraTool.exe_EDL_Flashing_06-02-2023-082410.jpeg

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Qualcomm Flashing Function......
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

PreOperation Configuration
Brand : AUTO Model : AUTO Storage : Auto
Loader: Auto
Port : Auto

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM21)
SymbolicName :\\?\usb#vid_05c6&pid_9008#5&1a93e808&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :12/17/2018,2.1.3.5

Getting device info. [Connected].....
Serial No.: 0xEACB3481
HW_ID : 0008C0E100000000
MSM ID : 0x0008C0E1, SDM660-Qualcomm Snapdragon 660/Sdm660LA
MODEL_ID : 0x0000
OEM_ID : 0x0000 - QUALCOMM
PBL Ver : 00000000
PK HASH : a7b8b82545a98eca23d6e9105fb464568d1b5828264903441bdef0cd57e3c370

Hydra Enable Auto search Firehose..
#Please wait...
#Search by filename filter.....
#Found 60 Compatible Files ..Found match Firehose...

Firehose Loader[0008c0e100010000_a7b8b82545a98eca_3e1fe8bf_generic_xiaomi.fhprg]
--------------------------------------------------
Header Type : OLD
TargetMSM :
Tag :
Version : 5
Code_size : 416
Signature_size : 256
fhVendor : XIAOMI
HW_ID : 3006000000010000
Vendor : GENERIC
OEM_ID : 0001
MODEL_ID : 0000
SW_ID : 000000000000000B
APP_ID :
pk_hash : a7b8b82545a98eca23d6e9105fb464568d1b5828264903441bdef0cd57e3c370
OEM_VERSION : c3-bsp-builder-job001.bj
IMAGE_VARIANT : Sdm660LA
QC_VERSION : BOOT.XF.1.4-00255-S660LZB-1
--------------------------------------------------

SaharaBoot... Ok
Sending ...............................Ok
Connecting to Firehose...
Ping......... Ok
Configuration[FHProt_Auto]......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : MSM8996
Version : 1
DateTime : Apr 4 2018 - 18:58:16

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 19
Serial Number : 81680511
Firmware Version : 5644752166968636211
Product Name : S0J97Y
Physical Partitions : 4
Total Logical Blocks:
Drive [0] 61071360[29,121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Drive [3] 8192[4 MB]

Protocol : Universal
Running : Ok

Reading GPT[4]
Drive [0] 68 Items
Drive [1] 0 Items
Drive [2] 0 Items
Drive [3]


Phone Information......
Vendor : Xiaomi
Manufacturer : Xiaomi
ID : QKQ1.190910.002
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Miui Ver : V125
Display ID : QKQ1.190910.002 V12.5.3.0.QFGMIXM
Security Patch : 2021-10-01


Backup Security partitions...
Reading Security Items....
- modemst1(modemst1.bin), 8 MB = Ok
- modemst2(modemst2.bin), 8 MB = Ok
- fsg(fsg.bin), 8 MB = Ok
- fsc(fsc.bin), 7,5 KB = Ok
C:\Hydra Tool\Backup\QUALBackup\QUALCOMM\0008C0E100000000_EACB3481\Security_Backup\060223081837.sec
Backup Security Success....

Backup Security partitions...
Reading Security Items....
- modemst1(modemst1.bin), 8 MB = Ok
- modemst2(modemst2.bin), 8 MB = Ok
- fsg(fsg.bin), 8 MB = Ok
- fsc(fsc.bin), 7,5 KB = Ok
C:\Hydra Tool\Backup\QUALBackup\QUALCOMM\0008C0E100000000_EACB3481\Security_Backup\060223081841.sec
Backup Security Success....
----------------------------
Flashing Selected Partitions....
- vbmeta[0](vbmeta.img), 4 KB = Ok
- vbmetabak[0](vbmeta.img), 4 KB = Ok
- storsec[0](storsec.mbn), 48,016 KB = Ok
- storsecbak[0](storsec.mbn), 48,016 KB = Ok
- rpm[0](rpm.mbn), 219,539 KB = Ok
- rpmbak[0](rpm.mbn), 219,539 KB = Ok
- hyp[0](hyp.mbn), 272 KB = Ok
- hypbak[0](hyp.mbn), 272 KB = Ok
- pmic[0](pmic.elf), 38,82 KB = Ok
- pmicbak[0](pmic.elf), 38,82 KB = Ok
- cmnlib[0](cmnlib.mbn), 216,977 KB = Ok
- cmnlibbak[0](cmnlib.mbn), 216,977 KB = Ok
- cmnlib64[0](cmnlib64.mbn), 267,68 KB = Ok
- cmnlib64bak[0](cmnlib64.mbn), 267,68 KB = Ok
- abl[0](abl.elf), 148 KB = Ok
- ablbak[0](abl.elf), 148 KB = Ok
- devcfgbak[0](devcfg.mbn), 47,918 KB = Ok
- devcfg[0](devcfg.mbn), 47,918 KB = Ok
- tz[0](tz.mbn), 1,879 MB = Ok
- tzbak[0](tz.mbn), 1,879 MB = Ok
- mdtpsecapp[0](mdtpsecapp.mbn), 1,029 MB = Ok
- mdtpsecappbak[0](mdtpsecapp.mbn), 1,029 MB = Ok
- keymaster[0](km4.mbn), 305,039 KB = Ok
- keymasterbak[0](km4.mbn), 305,039 KB = Ok
- bluetooth[0](BTFM.bin), 556 KB = Ok
- xbl[0](xbl.elf), 2,454 MB = Ok
- xblbak[0](xbl.elf), 2,454 MB = Ok
- misc[0](misc.img), 8 KB = Ok
- dsp[0](dspso.bin), 16 MB = Ok
- mdtp[0](mdtp.img), 16,983 MB = Ok
- dtbo[0](dtbo.img), 8 MB = Ok
- dtbobak[0](dtbo.img), 8 MB = Ok
- splash[0](splash.img), 25,971 MB = Ok
- persist[0](persist.img), 32 MB Skipped
- modem[0](NON-HLOS.bin), 109,626 MB = Ok
- boot[0](boot.img), 64 MB = Ok
- recovery[0](recovery.img), 64 MB = Ok
- cache[0](cache.img), 128,145 KB = Ok
- system[0](system.img), 2,9 GB = Ok
- vendor[0](vendor.img), 724,098 MB = Ok
- cust[0](cust.img), 692,805 MB = Ok
- userdata[0](userdata.img), 6,715 MB = Ok
- PrimaryGPT[0](gpt_main0.bin), 17 KB = Ok

Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-34.] = Ok
0 [NUM_DISK_SECTORS-34.] = Ok
0 [NUM_DISK_SECTORS-34.] = Ok
0 [NUM_DISK_SECTORS-34.] = Ok
0 [NUM_DISK_SECTORS-1.] = Ok
0 [NUM_DISK_SECTORS-1.] = Ok
0 [NUM_DISK_SECTORS-33.] = Ok
0 [CRC32(2,8704)] = Ok
0 [CRC32(NUM_DISK_SECTORS-33.,8704)] = Ok
0 [0] = Ok
0 [CRC32(1,92)] = Ok
0 [0] = Ok
0 [CRC32(NUM_DISK_SECTORS-1.,92)] = Ok
Operation : Setbootablestoragedrive: Drive 0
Set bootable storage drive 0 Ok

Rebooting Phone.... Ok

Elapsed Time : 00:06:01
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi Note 8 (ginkgo) Format Factory Reset by Hydra Tool
ursayaan1999@gmail.com_HydraTool.exe__06-02-2023-121758.jpeg

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Xiaomi Tool
Factory Reset
Safe Format - EMMC
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

PreOperation Configuration
Brand : AUTO Model : AUTO Storage : Auto
Loader: Auto
Port : Auto

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM3)
SymbolicName :\\?\usb#vid_05c6&pid_9008#6&1990268&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/02/2017,2.1.2.7

Getting device info. [Connected].....
Serial No.: 0x3911CEBB
HW_ID : 0010A0E100720000
MSM ID : 0x0010A0E1, SM6125-Qualcomm Snapdragon 665/NicobarPkgLAA
MODEL_ID : 0x0000
OEM_ID : 0x0072 - XIAOMI
PBL Ver : 00000000
PK HASH : 1bebe3863a6781db4b01086063007334de9e5ca14971c7c4f4358ec9d79cda46

Hydra Enable Auto search Firehose..
#Please wait...
#Search by filename filter.....
#Found 24 Compatible Files ..Found match Firehose...

Firehose Loader[0010a0e100720000_1bebe3863a6781db_17741425_xiaomi.fhprg]
--------------------------------------------------
Header Type : New
TargetMSM :
Tag :
Version : 6
Code_size : 816
Signature_size : 256
fhVendor : XIAOMI
HW_ID : 0010A0E100720000
Vendor : XIAOMI
OEM_ID : 0072
MODEL_ID : 0000
SW_ID : 00000003
APP_ID : 00000000
pk_hash : 1bebe3863a6781db4b01086063007334de9e5ca14971c7c4f4358ec9d79cda4692ce5e948c6fd409408f4c919fcadfe3
OEM_VERSION : cibuild
IMAGE_VARIANT : NicobarPkgLAA
QC_VERSION : BOOT.XF.4.0-00149-NICOBARLAZ-1
--------------------------------------------------

SaharaBoot... Ok
Sending ..............................Ok
Connecting to Firehose...
Ping..................... Ok
Configuration[FHProt_Auto].........
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Jul 3 2019 - 22:23:56


Protocol : Universal
Running : Ok

Reading GPT[1]
Drive [0] 88 Items

--------------- Reading build.prop content ---------------
build.prop
system
build.prop
Brand : xiaomi
Model : Redmi Note 8
Product : ginkgo
ID : PKQ1.190616.001
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : ginkgo-user 9 PKQ1.190616.001 V11.0.6.0.PCOINXM release-keys
Device : ginkgo
Display ID : PKQ1.190616.001
Security Patch : 2020-08-01
Fingerprint : xiaomi/ginkgo/ginkgo:9/PKQ1.190616.001/V11.0.6.0.PCOINXM:user/release-keys
--------------- end of build.prop content ---------------

Auto Backup Security partitions...
Reading Security Items....
- modemst1(modemst1.bin), 2 MB = Ok
- modemst2(modemst2.bin), 2 MB = Ok
- fsg(fsg.bin), 10 MB = Ok
- fsc(fsc.bin), 127.5 KB = Ok
- persist(persist.bin), 64 MB = Ok

C:\Hydra Tool\Backup\QUALBackup\XIAOMI\0010A0E100720000_3911CEBB\Auto_Backup\060223121710
Backup Security Success....
Processing Safe Format - EMMC....
- Removing FRP [Zero Wipe] Ok
- Formatting Userdata [Safe Format - eMMc] Ok

Rebooting Phone.... Ok


Action Result : Ok

Elapsed Time : 00:00:58
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi Note 9 (merlin) FRP Remove by Hydra Tool

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Service Function
Factory Reset Protection[FRP]
Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching for MTK Device...Found
MTK Port Type : Flashmode BROM
FriendlyName : MediaTek USB Port (COM48)
Device : /6&2838f1dc&0&4
SymbolicName : \\?\usb#vid_0e8d&pid_0003#6&2838f1dc&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2016,3.2
Service : wdm_usb

Openning Port [COM48] Ok
Handshaking...Ok
HwCode : 0707 {MT6768}
Hwver : 0000
Target config : E7
SBC : 01 (True)
SLA : 02 (True)
DAA : 04 (True)
SWJTAG : 06 (True)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 20 (True)
MEMWRITE : 40 (True)
CMD_C8 : 80 (True)
Connection : BROM
HW Subcode : 8A00
HW Subcode : CA00
SW Ver : 0000
ME_ID : E2DC1DC08484A06A48AC9084DF4DA989
SOC_ID : 01B74375924A4C846A5414A396141A6C1B94AFF17507E1B3A669845C2A852E30
Device not yet filterd...
Executing LibUSB Filter..
Device Now Filtered...Restarting Device Port..

Openning Port [COM48] Ok

Exploiting Device...
Successfully Exploited..
Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..Found @ 0x00200BC4
Starting to dump...
Prel Size : 0x000448B0
Successfully dump preloader.. [C:\Hydra Tool\Boot\PreloaderDump\preloader_merlin.bin]
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)
Connection : BROM

Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin]
Patching da2 ... Ok
Uploading Stage 1....
Successfully uploaded stage 1, jumping ..
Executing JUMP_DA Address @ 0x00200000
Jumping to 0x00200000 Ok 0xC0
Successfully received DA sync
ONNECTION_AGENT : brom
DRAM config needed for : 13014E47314A3953
Sending auto preloader from dump... [preloader_merlin.bin]
Sending emi data.. [DRAM setup passed.]
Sending emi data succeeded.
Uploading stage 2...
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
ERAM Size : 0x0000000000070000-448 KB
IRAM Size : 0x0000000100000000-4 GB
EMMC Boot1 Size : 0x0000000000400000-4 MB
EMMC Boot2 Size : 0x0000000000400000-4 MB
EMMC RPMB Size : 0x0000000001000000-16 MB
EMMC USER Size : 0x0000001D1F000000-116,484 GB
EMMC CID : 13014E47314A395339100FD2CF6528C5 - G1J9S9
HW-CODE : 0x707
HWSUB-CODE : 0x8A00
HW-VERSION : 0xCA00
SW-VERSION : 0x0
CHIP-EVOLUTION : 0x1
DA-VERSION : 1.0
Speed : high-speed
Upload data was accepted. Jumping to stage 2...
DA Extensions successfully added
Reading Partition Table ..
Partition Count : 50
--------------- Reading build.prop content ---------------
Product : merlin
Marketname : ro.product.systemRedmi Note 9
ID : RP1A.200720.011
SDK : 30
Release : 11
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : merlin-user 11 RP1A.200720.011 V12.5.6.0.RJOEUXM release-keys
Display ID : RP1A.200720.011
Security Patch : 2022-05-01
StorageType : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
IMEI1 : *****************
IMEI2 : *****************
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------
Backing up Security..
- preloader(preloader.bin), 512 KB = Ok [preloader_merlin.bin]
*Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0707_E2DC1DC08484A06A48AC9084DF4DA989\Auto\060323100735\6768_Android_scatter.txt
- pgpt(pgpt.bin), 32 KB = Ok
- nvram(nvram.bin), 64 MB = Ok
- nvdata(nvdata.bin), 64 MB = Ok
- frp(frp.bin), 1024 KB = Ok
- protect1(protect1.bin), 8 MB = Ok
- protect2(protect2.bin), 11,367 MB = Ok
- persist(persist.bin), 48 MB = Ok
- proinfo(proinfo.bin), 3 MB = Ok
- nvcfg(nvcfg.bin), 32 MB = Ok
- sec1(sec1.bin), 2 MB = Ok
- seccfg(seccfg.bin), 8 MB = Ok
- lk(lk.bin), 2 MB = Ok
Backup Done!!!

Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!

Action Result : Ok

Elapsed Time : 00:00:43
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Huawei Y6 Prime 2018 (ATU-L31) FRP Remove One Click by Hydra Tool

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Qualcomm Service Tool
Factory Reset Protection
Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

PreOperation Configuration
Brand : HUAWEI Model : ATU-L31 (Y6 Prime 2018) Storage : Auto
Loader: 000560E10015003A_6bc369511da9cadb_c0ba0f0a_HUAWEI_QUALCOMM_peek_8917.fhprg
Port : Auto

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM5)
SymbolicName :\\?\usb#vid_05c6&pid_9008#6&2838f1dc&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :03/19/2014,2.1.1.2

Getting device info. [Connected].Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok
Configuration[FHProt_Auto]......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8917
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 3552038434
Firmware Version : 4
Product Name : QE63MB
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 30535680[14,561 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok

Reading GPT[3]
Drive [0] 60 Items
Drive [1] 0 Items
Drive [2] 0 Items

--------------- Reading build.prop content ---------------
build.prop
Vendor : unknown
Manufacturer : unknown
ID : OPR6.170623.013
SDK : 26
Release : 8.0.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : generic_a53-user 8.0.0 OPR6.170623.013 eng.root.20201027.024155 test-keys
Display ID : System 8.0.0.073(09YO)
Security Patch : 2020-09-01
Fingerprint : Huawei/generic_a53/generic_a53:8.0.0/OPR6.170623.013/root10270241:user/test-keys
--------------- end of build.prop content ---------------
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOk

Rebooting Phone.... Ok

Action Result : Ok

Elapsed Time : 00:00:02
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi 8 (olive) EDL Flashing by Hydra Tool

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Qualcomm Flashing Function......
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

PreOperation Configuration
Brand : XIAOMI Model : Redmi 8 (olive) Storage : Auto
Loader: 000BF0E100720000_57158eaf1814d78f_e551cac5_XIAOMI_auth_peek_8937.fhprg
Port : Auto

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM5)
SymbolicName :\\?\usb#vid_05c6&pid_9008#6&259645f7&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/02/2017,2.1.2.7

Getting device info......
Serial No.: 0x85E7EF2D
HW_ID : 000BF0E100720000
MSM ID : 0x000BF0E1, SDM439-Qualcomm Snapdragon 439/FAADANAZA
MODEL_ID : 0x0000
OEM_ID : 0x0072 - XIAOMI
PBL Ver : 00000000
PK HASH : 57158eaf1814d78fd2b3105ece4db18a817a08ac664a5782a925f3ff8403d39a

Firehose Loader[000BF0E100720000_57158eaf1814d78f_e551cac5_XIAOMI_auth_peek_8937.fhprg]
--------------------------------------------------
Header Type : OLD
TargetMSM : 8937
Tag : _auth_peek
Version : 3
Code_size : 320
Signature_size : 256
fhVendor : XIAOMI
HW_ID : 000BF0E100720000
Vendor : XIAOMI
OEM_ID : 0072
MODEL_ID : 0000
SW_ID : 0000000100000003
APP_ID :
pk_hash : 57158eaf1814d78fd2b3105ece4db18a817a08ac664a5782a925f3ff8403d39a
OEM_VERSION : c4-miui-ota-bd104.bj
IMAGE_VARIANT : FAADANAZA
QC_VERSION : BOOT.BF.3.3.2-00073
--------------------------------------------------

SaharaBoot... Ok
Sending .......................Ok
Connecting to Firehose...
Ping... Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[w2Yv7UXLy7Y3st6Ko4HGxPfVOh5]
Signature @256bytes Authentication.... Accepted......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 397220
Firmware Version : 842018864
Product Name : hC9aP3
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 122142720[58.242 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok

Reading GPT[3]
Drive [0] 64 Items
Drive [1] 0 Items
Drive [2] 0 Items


Phone Information......
Vendor : Xiaomi
Manufacturer : Xiaomi
ID : QKQ1.191014.001
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Miui Ver : V125
Security Patch : 2022-02-01
Emmc_size : 16GB


Backup Security partitions...
Reading Security Items....
- modemst1(modemst1.bin), 8 MB = Ok
- modemst2(modemst2.bin), 8 MB = Ok
- fsg(fsg.bin), 8 MB = Ok
- fsc(fsc.bin), 7.5 KB = Ok
C:\Hydra Tool\Backup\QUALBackup\XIAOMI\000BF0E100720000_85E7EF2D\Security_Backup\060523111747.sec
Backup Security Success....

Backup Security partitions...
Reading Security Items....
- modemst1(modemst1.bin), 8 MB = Ok
- modemst2(modemst2.bin), 8 MB = Ok
- fsg(fsg.bin), 8 MB = Ok
- fsc(fsc.bin), 7.5 KB = Ok
C:\Hydra Tool\Backup\QUALBackup\XIAOMI\000BF0E100720000_85E7EF2D\Security_Backup\060523111749.sec
Backup Security Success....
----------------------------
Flashing Selected Partitions....
- sec[0](sec.dat), 80 Bytes Skipped
- config[0](config.bin), 32 KB Skipped
- vbmeta[0](vbmeta.img), 4 KB = Ok
- vbmetabak[0](vbmeta.img), 4 KB = Ok
- devcfg[0](devcfg.mbn), 37.184 KB = Ok
- devcfgbak[0](devcfg.mbn), 37.184 KB = Ok
- apdp[0](dummy.img), 8 KB = Ok
- msadp[0](dummy.img), 8 KB = Ok
- sbl1[0](sbl1.mbn), 399.457 KB = Ok
- sbl1bak[0](sbl1.mbn), 399.457 KB = Ok
- rpm[0](rpm.mbn), 165.129 KB = Ok
- rpmbak[0](rpm.mbn), 165.129 KB = Ok
- cmnlib[0](cmnlib_30.mbn), 200.852 KB = Ok
- cmnlibbak[0](cmnlib_30.mbn), 200.852 KB = Ok
- cmnlib64[0](cmnlib64_30.mbn), 258.805 KB = Ok
- cmnlib64bak[0](cmnlib64_30.mbn), 258.805 KB = Ok
- keymaster[0](km4.mbn), 312.281 KB = Ok
- keymasterbak[0](km4.mbn), 312.281 KB = Ok
- misc[0](misc.img), 8 KB = Ok
- aboot[0](emmc_appsboot.mbn), 761.191 KB = Ok
- abootbak[0](emmc_appsboot.mbn), 761.191 KB = Ok
- tz[0](tz.mbn), 1.457 MB = Ok
- tzbak[0](tz.mbn), 1.457 MB = Ok
- dtbo[0](dtbo.img), 8 MB = Ok
- dtbobak[0](dtbo.img), 8 MB = Ok
- splash[0](splash.img), 1.211 MB = Ok
- dsp[0](adspso.bin), 16 MB = Ok
- dspbak[0](adspso.bin), 16 MB = Ok
- persist[0](persist.img), 32 MB Skipped
- mdtp[0](mdtp.img), 16.983 MB = Ok
- mdtpbak[0](mdtp.img), 16.983 MB = Ok
- boot[0](boot.img), 64 MB = Ok
- recovery[0](recovery.img), 64 MB = Ok
- cache[0](cache.img), 152.145 KB = Ok
- modem[0](NON-HLOS.bin), 128 MB = Ok
- system[0](system.img), 3.715 GB = Ok
- vendor[0](vendor.img), 1.173 GB = Ok
- cust[0](cust.img), 658.528 MB = Ok
- userdata[0](userdata.img), 934.688 MB = Ok
- PrimaryGPT[0](gpt_main0.bin), 17 KB = Ok

Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-34.] = Ok
0 [NUM_DISK_SECTORS-34.] = Ok
0 [NUM_DISK_SECTORS-34.] = Ok
0 [NUM_DISK_SECTORS-34.] = Ok
0 [NUM_DISK_SECTORS-1.] = Ok
0 [NUM_DISK_SECTORS-1.] = Ok
0 [NUM_DISK_SECTORS-33.] = Ok
0 [CRC32(2,8192)] = Ok
0 [CRC32(NUM_DISK_SECTORS-33.,8192)] = Ok
0 [0] = Ok
0 [CRC32(1,92)] = Ok
0 [0] = Ok
0 [CRC32(NUM_DISK_SECTORS-1.,92)] = Ok
Operation : Setbootablestoragedrive: Drive 0
Set bootable storage drive 0 Ok

Rebooting Phone.... Ok

Elapsed Time : 00:11:35
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
İnfinix Hot 9 Play (X680F) FRP Remove With by Hydra Tool

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Service Function
Factory Reset Protection[FRP]
Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching for MTK Device...Found
MTK Port Type : Flashmode Preloader
FriendlyName : MediaTek PreLoader USB VCOM (Android) (COM40)
Device : /5&32474d1b&0&4
SymbolicName : \\?\usb#vid_0e8d&pid_2000#5&32474d1b&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2016,3.2
Service : wdm_usb

Openning Port [COM40] Ok
Reading Partition Table ..
ERAM Size : 0x000000000003A600-233,5 KB
IRAM Size : 0x0000000100000000-4 GB
EMMC Boot1 Size : 0x0000000000400000-4 MB
EMMC Boot2 Size : 0x0000000000400000-4 MB
EMMC RPMB Size : 0x0000000001000000-16 MB
EMMC USER Size : 0x0000000E67800000-57,617 GB
EMMC CID : D6010341334135363112DBE1C7D019E1 - A3A561
HW-CODE : 0x717
HWSUB-CODE : 0x8A00
HW-VERSION : 0xCA01
SW-VERSION : 0x200
CHIP-EVOLUTION : 0x0
DA-VERSION : 1.0
Speed : high-speed
Partition Count : 52
--------------- Reading build.prop content ---------------
Product : tssi_64_infinix
ID : SP1A.210812.016
SDK : 31
Release : 12
ABI : arm64-v8a
Locale : en-US
Description : sys_tssi_64_infinix-user 12 SP1A.210812.016 308959 release-keys
Display ID : INFINIX-S-64-230423V648
Security Patch : 2023-04-05
StorageType : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
IMEI1 :
IMEI2 :
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------

Action Result : Ok

Elapsed Time : 00:00:39
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Wiko P130 Remove FRP With by Hydra Tool

Service Function
Factory Reset Protection[FRP]
Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching for MTK Device...Found
MTK Port Type : Flashmode Preloader
FriendlyName : MediaTek PreLoader USB VCOM (Android) (COM31)
Device : /5&29404b24&0&4
SymbolicName : \\?\usb#vid_0e8d&pid_2000#5&29404b24&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2016,3.0.1504.0
Service : wdm_usb

Openning Port [COM31] Ok
Handshaking...Ok
HwCode : 0699 {MT6739/MT6731}
Hwver : 0000
Target config : 01
SBC : 01 (True)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)
Connection : Preloader
HW Subcode : 8A00
HW Subcode : CA00
SW Ver : 0000
ME_ID : 85407788DFD745D0CE70AD05D2D48224


- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Preloader To Brom Function.....
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- Method 1 Exploit Executed..... [Successfully Crash Preloader.]
Device now is BROM Port

Exploiting Device...
Successfully Exploited..
Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..Found @ 0x00200BC4
Starting to dump...
Prel Size : 0x0001D544
Successfully dump preloader.. [C:\Hydra Tool\Boot\PreloaderDump\preloader_p130.bin]
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)
Connection : BROM

Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin]
Patching da2 ... Ok
Uploading Stage 1....
Successfully uploaded stage 1, jumping ..
Executing JUMP_DA Address @ 0x00200000
Jumping to 0x00200000 Ok 0xC0
Successfully received DA sync
ONNECTION_AGENT : brom
Sending auto preloader from dump... [preloader_p130.bin]
Sending emi data.. [DRAM setup passed.]
Sending emi data succeeded.
Uploading stage 2...
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
ERAM Size : 0x0000000000020000-128 KB
IRAM Size : 0x0000000080000000-2 GB
EMMC Boot1 Size : 0x0000000000400000-4 MB
EMMC Boot2 Size : 0x0000000000400000-4 MB
EMMC RPMB Size : 0x0000000000400000-4 MB
EMMC USER Size : 0x00000003AB400000-14,676 GB
EMMC CID : 90014A484147346132A5219708D0C483 - HAG4a2
HW-CODE : 0x699
HWSUB-CODE : 0x8A00
HW-VERSION : 0xCA00
SW-VERSION : 0x0
CHIP-EVOLUTION : 0x0
DA-VERSION : 1.0
Speed : high-speed
Upload data was accepted. Jumping to stage 2...
DA Extensions successfully added
Reading Partition Table ..
Partition Count : 37
--------------- Reading build.prop content ---------------
Brand : WIKO
Vendor : WIKO
Model : W_P130
Product : W_P130
Manufacturer : WIKO
ID : O11019
SDK : 27
Release : 8.1.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Description : full_p130-user 8.1.0 O11019 1536907373 release-keys
Device : W_P130
Display ID : O11019 release-keys
Security Patch : 2018-09-05
Fingerprint : WIKO/W_P130/W_P130:8.1.0/O11019/1536907373:user/release-keys
StorageType : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
IMEI1 : ***************
IMEI2 : ***************
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------
Backing up Security..
- preloader(preloader.bin), 512 KB = Ok [preloader_p130.bin]
*Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0699_85407788DFD745D0CE70AD05D2D48224\Auto\060623111028\6739_Android_scatter.txt
- pgpt(pgpt.bin), 32 KB = Ok
- nvram(nvram.bin), 5 MB = Ok
- nvdata(nvdata.bin), 32 MB = Ok
- frp(frp.bin), 1024 KB = Ok
- protect1(protect1.bin), 8 MB = Ok
- protect2(protect2.bin), 9,469 MB = Ok
- proinfo(proinfo.bin), 3 MB = Ok
- nvcfg(nvcfg.bin), 8 MB = Ok
- sec1(sec1.bin), 2 MB = Ok
- seccfg(seccfg.bin), 8 MB = Ok
- lk(lk.bin), 1024 KB = Ok
Backup Done!!!

Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!

Action Result : Ok

Elapsed Time : 00:00:28
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi Note 9 (merlin) Dual Sım Repair With by Hydra Tool

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
***IMEI REPAIR FUNCTION****
Xiaomi Dual
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching for MTK Device...Found
MTK Port Type : Flashmode BROM
FriendlyName : MediaTek USB Port (COM10)
Device : /5&17c412cb&0&4
SymbolicName : \\?\usb#vid_0e8d&pid_0003#5&17c412cb&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2016,3.2
Service : wdm_usb

Openning Port [COM10] Ok
Reading Partition Table ..
ERAM Size : 0x0000000000070000-448 KB
IRAM Size : 0x0000000100000000-4 GB
EMMC Boot1 Size : 0x0000000000400000-4 MB
EMMC Boot2 Size : 0x0000000000400000-4 MB
EMMC RPMB Size : 0x0000000001000000-16 MB
EMMC USER Size : 0x0000001D1EC00000-116,48 GB
EMMC CID : 15010044563644414202BECEDC9357B1 - DV6DAB
HW-CODE : 0x707
HWSUB-CODE : 0x8A00
HW-VERSION : 0xCA00
SW-VERSION : 0x0
CHIP-EVOLUTION : 0x1
DA-VERSION : 1.0
Speed : high-speed
Partition Count : 49
--------------- Reading build.prop content ---------------
Product : merlin
Marketname : ro.product.systemRedmi Note 9
ID : RP1A.200720.011
SDK : 30
Release : 11
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : merlin-user 11 RP1A.200720.011 V12.5.4.0.RJOMIXM release-keys
Display ID : RP1A.200720.011
Security Patch : 2022-03-01
StorageType : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
IMEI1 : FFFF00000000000
IMEI2 : 862234057506232
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------

Xiaomi Flashmode Dual IMEI Repair
Backing up Security..
- nvram Ok
- nvdata Ok
- vbmeta Ok
- proinfo Ok
- vbmeta_vendor Ok
Step 1 Ok
Step 2 Ok
Step 3 Ok
Step 4 Ok
Operation Done!!!!

Reading IMEI........
IMEI1 : 862************
IMEI2 : 862************

Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!

Action Result : Ok

Elapsed Time : 00:00:23
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Oppo A1K (CPH1923) Dual SIM Repair With by Hydra Tool

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
***IMEI REPAIR FUNCTION****
Oppo Flash Mode
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching for MTK Device...Found
MTK Port Type : Flashmode BROM
FriendlyName : MediaTek USB Port_V1632 (COM32)
Device : /5&292b65ad&0&4
SymbolicName : \\?\usb#vid_0e8d&pid_0003#5&292b65ad&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0
Service : wdm_usb

Openning Port [COM32] Ok
Reading Partition Table ..
ERAM Size : 0x000000000003A000-232 KB
IRAM Size : 0x0000000080000000-2 GB
EMMC Boot1 Size : 0x0000000000400000-4 MB
EMMC Boot2 Size : 0x0000000000400000-4 MB
EMMC RPMB Size : 0x0000000001000000-16 MB
EMMC USER Size : 0x0000000747C00000-29.121 GB
EMMC CID : 150100514436334D420342BF9B48764D - QD63MB
HW-CODE : 0x766
HWSUB-CODE : 0x8A00
HW-VERSION : 0xCA00
SW-VERSION : 0x0
CHIP-EVOLUTION : 0x0
DA-VERSION : 1.0
Speed : high-speed
Partition Count : 44
--------------- Reading build.prop content ---------------
Vendor : OPPO
Manufacturer : OPPO
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6762_18540-user 9 PPR1.180610.011 eng.root.20210506.165532 release-keys
Security Patch : 2021-05-05
StorageType : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
IMEI1 : 354134160350244
IMEI2 : 354134160350251
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------

Oppo Flashmode IMEI Repair
---------------------------
Oppo Method Auto
---------------------------
Backing up Security..
- boot Ok
- nvram Ok
- nvdata Ok
- vbmeta Ok
- seccfg Ok
- md1img Ok
Writing certificate and IMEI..
Please wait...
Step 1
Trying Method 1
Trying Method 2
Has been patched already.. Ok
Step 2 Ok
Step 3 Ok
Step 4 Ok
Step 5 Ok
Writing IMEI Done!!!

Reading IMEI........
IMEI1 : 8660***********
IMEI2 : 8660***********

Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!

Action Result : Ok

Elapsed Time : 00:00:44
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi 9A (dandelion) FRP Remove Done by Hydra Tool

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Service Function
Factory Reset Protection[FRP]
Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching for MTK Device...Found
MTK Port Type : Flashmode BROM
FriendlyName : MediaTek USB Port_V1632 (COM13)
Device : /6&110a5bb4&0&2
SymbolicName : \\?\usb#vid_0e8d&pid_0003#6&110a5bb4&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0
Service : wdm_usb

Openning Port [COM13] Ok
Reading Partition Table ..
ERAM Size : 0x000000000003A000-232 KB
IRAM Size : 0x0000000080000000-2 GB
EMMC Boot1 Size : 0x0000000000400000-4 MB
EMMC Boot2 Size : 0x0000000000400000-4 MB
EMMC RPMB Size : 0x0000000001000000-16 MB
EMMC USER Size : 0x0000000747C00000-29,121 GB
EMMC CID : 45010044413430333201F354E9146747 - DA4032
HW-CODE : 0x766
HWSUB-CODE : 0x8A00
HW-VERSION : 0xCA00
SW-VERSION : 0x0
CHIP-EVOLUTION : 0x0
DA-VERSION : 1.0
Speed : high-speed
Partition Count : 45
--------------- Reading build.prop content ---------------
Product : dandelion
Marketname : ro.product.systemRedmi 9A
ID : QP1A.190711.020
SDK : 29
Release : 10
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-GB
Description : dandelion-user 10 QP1A.190711.020 V12.0.10.0.QCDMIXM release-keys
Display ID : QP1A.190711.020
Security Patch : 2020-12-01
StorageType : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
IMEI1 : ***************
IMEI2 : ***************
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------

Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!

Action Result : Ok

Elapsed Time : 00:00:07
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi Note 5 Pro (whyred) Mi Account Remove One Click by Hydra Tool

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Xiaomi Tool
Mi Account
Remove MiAccount[New Method]
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

PreOperation Configuration
Brand : XIAOMI Model : Redmi Note 5 Pro (Whyred) Storage : Auto
Loader: 0008C0E100010000_a7b8b82545a98eca_28f4dc3c_GENERIC_XIAOMI_auth.fhprg
Port : Auto

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM4)
SymbolicName :\\?\usb#vid_05c6&pid_9008#6&29e6b3c2&0&6#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/02/2017,2.1.2.7

Getting device info. [Connected].Ok
Device MODE : Firehose
Connecting to Firehose...
Ping...... Ok
Configuration[FHProt_Auto]......
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : MSM8996
Version : 1
DateTime : Aug 2 2018 - 22:27:53

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 19
Serial Number : 44873498
Firmware Version : 5644752166968636211
Product Name : S0J97Y
Physical Partitions : 4
Total Logical Blocks:
Drive [0] 61071360[29,121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Drive [3] 8192[4 MB]

Protocol : Universal
Running : Ok

Reading GPT[4]
Drive [0] 64 Items
Drive [1] 0 Items
Drive [2] 0 Items
Drive [3] 0 Items

--------------- Reading build.prop content ---------------
build.prop
Brand : xiaomi
Model : Redmi Note 5
Product : whyred
ID : PKQ1.180904.001
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : whyred-user 9 PKQ1.180904.001 V11.0.5.0.PEIMIXM release-keys
Device : whyred
Display ID : PKQ1.180904.001
Security Patch : 2020-08-05
Fingerprint : xiaomi/whyred/whyred:9/PKQ1.180904.001/V11.0.5.0.PEIMIXM:user/release-keys
--------------- end of build.prop content ---------------
Reading GPT[4]
Drive [0] 64 Items
Drive [1] 0 Items
Drive [2] 0 Items
Drive [3] 0 Items

Backing up Partition for safety...Ok

Scanning Patching address...
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]Done!!
Total Items patched : 67
Successfully patched address..

Action Result : Ok

Elapsed Time : 00:00:37
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Oppo A5s (CPH1909) DUAL SIM Repair by Hydra Tool

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
***IMEI REPAIR FUNCTION****
Oppo Flash Mode
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching for MTK Device...Found
MTK Port Type : Flashmode BROM
FriendlyName : MediaTek USB Port_V1632 (COM5)
Device : /5&1718df42&0&1
SymbolicName : \\?\usb#vid_0e8d&pid_0003#5&1718df42&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0
Service : wdm_usb

Openning Port [COM5] Ok
Reading Partition Table ..
ERAM Size : 0x000000000003A000-232 KB
IRAM Size : 0x00000000C0000000-3 GB
EMMC Boot1 Size : 0x0000000000400000-4 MB
EMMC Boot2 Size : 0x0000000000400000-4 MB
EMMC RPMB Size : 0x0000000001000000-16 MB
EMMC USER Size : 0x0000000747C00000-29.121 GB
EMMC CID : 90014A68423861503E03678274AC56CB - hB8aP>
HW-CODE : 0x766
HWSUB-CODE : 0x8A00
HW-VERSION : 0xCA00
SW-VERSION : 0x0
CHIP-EVOLUTION : 0x0
DA-VERSION : 1.0
Speed : high-speed
Partition Count : 42
--------------- Reading build.prop content ---------------
Vendor : OPPO
Manufacturer : OPPO
ID : O11019
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6765_18511-user 8.1.0 O11019 1616154336 release-keys
Security Patch : 2021-04-05
StorageType : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------

Oppo Flashmode IMEI Repair
---------------------------
Oppo Method Auto
---------------------------
Backing up Security..
- boot Ok
- nvram Ok
- nvdata Ok
- seccfg Ok
- md1img Ok
Writing certificate and IMEI..
Please wait...
Step 1
Trying Method 1 Failed
Trying Method 2
Has been patched already.. Ok
Step 2 Ok
Step 3 Ok
Step 4 Ok
Step 5 Ok
Writing IMEI Done!!!

Reading IMEI........
IMEI1 : ***************
IMEI2 : ***************

Reading IMEI........
IMEI1 : 8602***********
IMEI2 : 860************

Action Result : Ok

Elapsed Time : 00:01:47
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Mi Note 10 Lite (toco) IMEI Repair by Hydra Tool

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
IMEIRepair Function......
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Searching Diag Port....
Reading Phone info - Diag Mode

Openning Port [COM3] Ok
Firmware ID : 4.3.c5-00100-0521_0855_04aa332
Build Date : ay 21 202108:59:11Feb 11 202105:00:00sm7150.g
IMEI1 :
IMEI2 :
Converting QCN to ENG QCN, Please Wait....
Anlyzze the QCN, Please Wait....
C:\Users\benq6\Desktop\toco.qcn
Found IMEI TWO :352251066322648


Generationg patch imei...
Writting QCN, Please Wait....
Diag Port Found ON : COM3
Writting File, Please Wait....
Sending SPC to Device....
SPC Send Success
Restoring File....
Restore File Success
Repair IMEI Success, Rebooting Device...

Adb Handler [Console]
Starting ADB Server....
Searching Device By ADB [device]
Device Found...
Sate : device
Product name : toco_global
Product model : Mi_Note_10_Lite
Product device : toco


Elapsed Time : 00:00:32
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Huawei Y7 2019 (DUB-LX1) FRP Remove in EDL Mode by Hydra Tool

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Qualcomm Service Tool
Factory Reset Protection
Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

PreOperation Configuration
Brand : HUAWEI Model : DUB-LX1 (Y7 2019) Storage : Auto
Loader: 0009A0E100150065_6bc369511da9cadb_1a1074cf_HUAWEI_QUALCOMM_peek_8953.fhprg
Port : Auto

Searching for Qualcomm 9008 Device...Found
FriendlyName :HS-USB Diagnostics 9008 (COM175)
SymbolicName :\\?\usb#vid_05c6&pid_9008#5&29c21e6b&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/20/2017,2.1.2.2

Getting device info. [Connected].....
Serial No.: 0xA1BDDD08
HW_ID : 0009A0E100150065
MSM ID : 0x0009A0E1, SDM450-Qualcomm Snapdragon 450/JAADANAZA
MODEL_ID : 0x0065
OEM_ID : 0x0015 - HUAWEI
PBL Ver : 00000000
PK HASH : 6bc369511da9cadb3a7af61574f89db385003d6241bdd1ff573dba61bf6ae119

Firehose Loader[0009A0E100150065_6bc369511da9cadb_1a1074cf_HUAWEI_QUALCOMM_peek_8953.fhprg]
--------------------------------------------------
Header Type : OLD
TargetMSM : 8953
Tag : _peek
Version : 3
Code_size : 288
Signature_size : 256
fhVendor : QUALCOMM
HW_ID : 0009A0E100150065
Vendor : HUAWEI
OEM_ID : 0015
MODEL_ID : 0065
SW_ID : 0000000000000003
APP_ID :
pk_hash : 6bc369511da9cadb3a7af61574f89db385003d6241bdd1ff573dba61bf6ae119
OEM_VERSION : SIA1000073848
IMAGE_VARIANT : JAADANAZA
QC_VERSION : BOOT.BF.3.3.2-00019
--------------------------------------------------

SaharaBoot... Ok
Sending .............Ok
Connecting to Firehose...
Ping... Ok
Configuration[FHProt_Auto].......
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8953
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 1732840122
Firmware Version : 0
Product Name : hB8aP>
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 61071360[29,121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok

Reading GPT[3]
Drive [0] 60 Items
Drive [1] 0 Items
Drive [2] 0 Items

--------------- Reading build.prop content ---------------
build.prop
Vendor : unknown
Manufacturer : unknown
ID : OPM1.171019.011
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : generic_a53-user 8.1.0 OPM1.171019.011 eng.root.20210208.182738 test-keys
Display ID : System 8.2.0.036(1UWB)
Security Patch : 2020-09-01
--------------- end of build.prop content ---------------

Auto Backup Security partitions...
Reading Security Items....
- modemst1(modemst1.bin), 4 MB = Ok
- modemst2(modemst2.bin), 4 MB = Ok
- fsg(fsg.bin), 4 MB = Ok
- fsc(fsc.bin), 512 Bytes = Ok
- oeminfo(oeminfo.bin), 64 MB = Ok
- persist(persist.bin), 32 MB = Ok

D:\01-box\HydraTool\Hydra Tool\Backup\QUALBackup\HUAWEI\0009A0E100150065_A1BDDD08\Auto_Backup\060923200032
Backup Security Success....
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOk

Rebooting Phone.... Ok

Action Result : Ok

Elapsed Time : 00:02:06
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi Note 10 2022 (selene) FRP Remove With by Hydra Tool


- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Service Function
Factory Reset Protection[FRP]
Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching for MTK Device...Found
MTK Port Type : Flashmode BROM
FriendlyName : MediaTek USB Port_V1632 (COM3)
Device : /5&13fe7c4d&0&6
SymbolicName : \\?\usb#vid_0e8d&pid_0003#5&13fe7c4d&0&6#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0
Service : wdm_usb

Openning Port [COM3] Ok
Handshaking...Ok
HwCode : 0707 {MT6768}
Hwver : 0000
Target config : E7
SBC : 01 (True)
SLA : 02 (True)
DAA : 04 (True)
SWJTAG : 06 (True)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 20 (True)
MEMWRITE : 40 (True)
CMD_C8 : 80 (True)
Connection : BROM
HW Subcode : 8A00
HW Subcode : CA00
SW Ver : 0000
ME_ID : 02927747C2910E225C612279E825D481
SOC_ID : 19378A0601F2BB544F5515A0943B1E55C3D4D7668DE7F2FDEA335AB3824F3F45

Exploiting Device...
Successfully Exploited..
Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..Found @ 0x00200BC4
Starting to dump...
Prel Size : 0x00049E00
Successfully dump preloader.. [C:\Hydra Tool\Boot\PreloaderDump\preloader_selene.bin]
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)
Connection : BROM

Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin]
Uploading Stage 1....
Successfully uploaded stage 1, jumping ..
Executing JUMP_DA Address @ 0x00200000
Jumping to 0x00200000 Ok 0xC0
Successfully received DA sync
ONNECTION_AGENT : brom
DRAM config needed for : 9B01005932503132
Sending auto preloader from dump... [preloader_selene.bin]
Sending emi data.. [DRAM setup passed.]
Sending emi data succeeded.
Uploading stage 2...
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
ERAM Size : 0x0000000000070000-448 KB
IRAM Size : 0x0000000100000000-4 GB
EMMC Boot1 Size : 0x0000000000400000-4 MB
EMMC Boot2 Size : 0x0000000000400000-4 MB
EMMC RPMB Size : 0x0000000001000000-16 MB
EMMC USER Size : 0x0000001D1EC00000-116,48 GB
EMMC CID : 9B01005932503132380085363EE7C855 - Y2P128
HW-CODE : 0x707
HWSUB-CODE : 0x8A00
HW-VERSION : 0xCA00
SW-VERSION : 0x0
CHIP-EVOLUTION : 0x1
DA-VERSION : 1.0
Speed : high-speed
Error: on sending data: DA hash mismatch
*DA Extensions failed to enable
Reading Partition Table ..
Partition Count : 57
--------------- Reading build.prop content ---------------
Product : selene
Marketname : ro.product.systemRedmi 10
ID : RP1A.200720.011
SDK : 30
Release : 11
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : selene-user 11 RP1A.200720.011 V12.5.4.0.RKUTRXM release-keys
Display ID : AL5186-selene-build-20220224202826
Security Patch : 2022-02-01
StorageType : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
IMEI1 : 358************
IMEI2 : 358************
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------
Backing up Security..
- preloader(preloader.bin), 512 KB = Ok [preloader_selene.bin]
*Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0707_02927747C2910E225C612279E825D481\Auto\061123024157\6768_Android_scatter.txt
- pgpt(pgpt.bin), 32 KB = Ok
- nvram(nvram.bin), 64 MB = Ok
- nvdata(nvdata.bin), 64 MB = Ok
- frp(frp.bin), 1024 KB = Ok
- protect1(protect1.bin), 8 MB = Ok
- protect2(protect2.bin), 9,367 MB = Ok
- persist(persist.bin), 48 MB = Ok
- proinfo(proinfo.bin), 3 MB = Ok
- nvcfg(nvcfg.bin), 32 MB = Ok
- sec1(sec1.bin), 2 MB = Ok
- seccfg(seccfg.bin), 8 MB = Ok
Backup Done!!!

Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!

Action Result : Ok

Elapsed Time : 00:00:35
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi Note 10 2022 (selene) Downgrade Firmware For Stable Repair

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
MTK Flash Function...
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching for MTK Device...Found
MTK Port Type : Flashmode BROM
FriendlyName : MediaTek USB Port_V1632 (COM3)
Device : /5&13fe7c4d&0&6
SymbolicName : \\?\usb#vid_0e8d&pid_0003#5&13fe7c4d&0&6#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0
Service : wdm_usb

Openning Port [COM3] Ok
Reading Partition Table ..
ERAM Size : 0x0000000000070000-448 KB
IRAM Size : 0x0000000100000000-4 GB
EMMC Boot1 Size : 0x0000000000400000-4 MB
EMMC Boot2 Size : 0x0000000000400000-4 MB
EMMC RPMB Size : 0x0000000001000000-16 MB
EMMC USER Size : 0x0000001D1EC00000-116,48 GB
EMMC CID : 9B01005932503132380085363EE7C855 - Y2P128
HW-CODE : 0x707
HWSUB-CODE : 0x8A00
HW-VERSION : 0xCA00
SW-VERSION : 0x0
CHIP-EVOLUTION : 0x1
DA-VERSION : 1.0
Speed : high-speed
Partition Count : 57
--------------- Reading build.prop content ---------------
Vendor : Xiaomi
Product : selene
Manufacturer : Xiaomi
ID : SP1A.210812.016
SDK : 31
Release : 12
ABI : arm64-v8a
Locale : en-GB
Description : selene-user 12 SP1A.210812.016 V13.0.15.0.SKUMIXM release-keys
Display ID : AL5186-selene-build-20230320165855
Security Patch : 2023-03-01
StorageType : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
IMEI1 : 86845**********
IMEI2 : 86845**********

-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------

Write Selected Partitions..
- preloader(preloader_selene.bin), 295,5 KB[Erasing...Ok] Status :C0010001 Error= Failed
- vbmeta_a(vbmeta.img), 4 KB = Ok
- vbmeta_system_a(vbmeta_system.img), 4 KB = Ok
- vbmeta_vendor_a(vbmeta_vendor.img), 4 KB = Ok
- md1img_a(md1img.img), 55,622 MB = Ok
- spmfw_a(spmfw.img), 48,141 KB = Ok
- scp_a(scp.img), 345,531 KB = Ok
- sspm_a(sspm.img), 494,094 KB = Ok
- lk_a(lk.img), 1,503 MB = Ok
- boot_a(boot.img), 64 MB = Ok
- dtbo_a(dtbo.img), 270,484 KB = Ok
- tee_a(tee.img), 2,407 MB = Ok
- logo_a(logo.bin), 1,755 MB = Ok
- cust(cust.img), 709,012 MB = Ok
- rescue(rescue.img), 40,074 KB = Ok
- super(super.img), 5,615 GB = Ok
- userdata(userdata.img), 694,688 MB = Ok

Rebooting Device...

Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!! = Ok
----------------------------------

Elapsed Time : 00:03:56
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi 8A (olivelite) Factory Reset & FRP Remove by Hydra Tool

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Qualcomm Service Tool
Ultra Power
Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

PreOperation Configuration
Brand : AUTO Model : AUTO Storage : Auto
Loader: Auto
Port : Auto

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM77)
SymbolicName :\\?\usb#vid_05c6&pid_9008#6&27c7ce02&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/02/2017,2.1.2.7

Getting device info. [Connected].....
Serial No.: 0x47B2739D
HW_ID : 000BF0E100720000
MSM ID : 0x000BF0E1, SDM439-Qualcomm Snapdragon 439/FAADANAZA
MODEL_ID : 0x0000
OEM_ID : 0x0072 - XIAOMI
PBL Ver : 00000000
PK HASH : 57158eaf1814d78fd2b3105ece4db18a817a08ac664a5782a925f3ff8403d39a

Hydra Enable Auto search Firehose..
#Please wait...
#Search by filename filter.....
#Found 20 Compatible Files ..Found match Firehose...

Firehose Loader[000bf0e100720000_57158eaf1814d78f_05ac3fce_xiaomi_auth_peek_8937.fhprg]
--------------------------------------------------
Header Type : OLD
TargetMSM : 8937
Tag : _auth_peek
Version : 3
Code_size : 320
Signature_size : 256
fhVendor : XIAOMI
HW_ID : 000BF0E100720000
Vendor : XIAOMI
OEM_ID : 0072
MODEL_ID : 0000
SW_ID : 0000000100000003
APP_ID :
pk_hash : 57158eaf1814d78fd2b3105ece4db18a817a08ac664a5782a925f3ff8403d39a
OEM_VERSION : c3-miui-ota-bd106.bj
IMAGE_VARIANT : FAADANAZA
QC_VERSION : BOOT.BF.3.3.2-00073
--------------------------------------------------

SaharaBoot... Ok
Sending .......................Ok
Connecting to Firehose...
Ping. Ok
Configuration[FHProt_Auto].
Xiaomi Authentication needed...
Signature Request -> bob[9VBdkahQq1b2gvFW3iSasVJ-W37]
Signature @256bytes Authentication.... Accepted......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 1655754070
Firmware Version : 909127728
Product Name : hB8aP>
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 61071360[29.121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok

Reading GPT[3]
Drive [0] 64 Items
Drive [1] 0 Items
Drive [2] 0 Items

--------------- Reading build.prop content ---------------
build.prop
system
build.prop
Brand : Xiaomi
Vendor : Xiaomi
Model : Redmi 8A
Product : olivelite
Manufacturer : Xiaomi
ID : PKQ1.190319.001
SDK : 28
Release : 9
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-GB
Description : olivelite-user 9 PKQ1.190319.001 V11.20.1.7.EP.MCAAS.C3K release-keys
Device : olivelite
Display ID : ZQL2116-olivelite-build-20200103111537
Security Patch : 2019-12-01
Fingerprint : Xiaomi/olivelite/olivelite:9/PKQ1.190319.001/V11.20.1.7.EP.MCAAS.C3K:user/release-keys
--------------- end of build.prop content ---------------

Auto Backup Security partitions...
Reading Security Items....
- modemst1(modemst1.bin), 8 MB = Ok
- modemst2(modemst2.bin), 8 MB = Ok
- fsg(fsg.bin), 8 MB = Ok
- fsc(fsc.bin), 7.5 KB = Ok
- persist(persist.bin), 32 MB = Ok

C:\Hydra Tool\Backup\QUALBackup\XIAOMI\000BF0E100720000_47B2739D\Auto_Backup\061223160323
Backup Security Success....
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOk
- Formatting Userdata
Executing ...
- Formatting Userdata [Safe Format - eMMc] OkOk

Rebooting Phone.... Ok

Action Result : Ok

Elapsed Time : 00:00:21
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi Note 8 Pro (begonia) FRP Remove by Hydra Tool

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Service Function
Factory Reset Protection[FRP]
Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching for MTK Device...Found
MTK Port Type : Flashmode BROM
FriendlyName : MediaTek USB Port (COM17)
Device : /8&4fcde16&0&1
SymbolicName : \\?\usb#vid_0e8d&pid_0003#8&4fcde16&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0
Service : wdm_usb

Openning Port [COM17] Ok
Reading Partition Table ..
ERAM Size : 0x0000000000080000-512 KB
IRAM Size : 0x0000000180000000-6 GB
UFS MID : 0x48
UFS FWVer : 0x0005
UFS Blocksize : 0x0000000000001000-4 KB
UFS LU0 Size : 0x0000000000400000-4 MB
UFS LU1 Size : 0x0000000000400000-4 MB
UFS LU2 Size : 0x0000000EE5800000-59,586 GB
UFS ID : H
UFS CID : 4839485135334145434D4D444152000000000000
HW-CODE : 0x813
HWSUB-CODE : 0x8A00
HW-VERSION : 0xCA00
SW-VERSION : 0x0
CHIP-EVOLUTION : 0x0
DA-VERSION : 1.0
Speed : high-speed
Partition Count : 49
--------------- Reading build.prop content ---------------
Product : begonia
Marketname : ro.product.systemRedmi Note 8 Pro
ID : RP1A.200720.011
SDK : 30
Release : 11
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : begonia-user 11 RP1A.200720.011 V12.5.7.0.RGGEUXM release-keys
Display ID : RP1A.200720.011
Security Patch : 2022-04-01
StorageType : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
IMEI1 : ***************
IMEI2 : ***************
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------

Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!

Action Result : Ok

Elapsed Time : 00:00:04
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Huawei Y5 Prime 2018 (DRA-LX2) FRP Remove by Hydra Tool

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Service Function
Factory Reset Protection[FRP]
Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching for MTK Device...Found
MTK Port Type : Flashmode BROM
FriendlyName : MediaTek USB Port (COM5)
Device : /6&1b6f9c2d&0&3
SymbolicName : \\?\usb#vid_0e8d&pid_0003#6&1b6f9c2d&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0
Service : wdm_usb

Openning Port [COM5] Ok
Handshaking...Ok
HwCode : 0699 {MT6739/MT6731}
Hwver : 0000
Target config : E3
SBC : 01 (True)
SLA : 02 (True)
DAA : 00 (False)
SWJTAG : 02 (True)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 20 (True)
MEMWRITE : 40 (True)
CMD_C8 : 80 (True)
Connection : BROM
HW Subcode : 8A00
HW Subcode : CB00
SW Ver : 0002
ME_ID : E63E233CC4A2D5173FB8F487BE75ED98
SOC_ID : 9B68F5772A0B4CFA3C88CF82FC4FEEEC21537B536488D9688E89EF7316BD114A

Exploiting Device...
Successfully Exploited..
Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..Found @ 0x00200BC4
Starting to dump...
Prel Size : 0x0001DA38
Successfully dump preloader.. [C:\Hydra Tool\Boot\PreloaderDump\preloader_dura64.bin]
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)
Connection : BROM

Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin]
Uploading Stage 1....
Successfully uploaded stage 1, jumping ..
Executing JUMP_DA Address @ 0x00200000
Jumping to 0x00200000 Ok 0xC0
Successfully received DA sync
ONNECTION_AGENT : brom
Sending auto preloader from dump... [preloader_dura64.bin]
Sending emi data.. [DRAM setup passed.]
Sending emi data succeeded.
Uploading stage 2...
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
ERAM Size : 0x0000000000020000-128 KB
IRAM Size : 0x0000000080000000-2 GB
EMMC Boot1 Size : 0x0000000000400000-4 MB
EMMC Boot2 Size : 0x0000000000400000-4 MB
EMMC RPMB Size : 0x0000000000400000-4 MB
EMMC USER Size : 0x00000003AB400000-14.676 GB
EMMC CID : 90014A484147346132D4DF5138D01619 - HAG4a2
HW-CODE : 0x699
HWSUB-CODE : 0x8A00
HW-VERSION : 0xCB00
SW-VERSION : 0x2
CHIP-EVOLUTION : 0x0
DA-VERSION : 1.0
Speed : high-speed
Error: on sending data: DA hash mismatch
*DA Extensions failed to enable
Reading Partition Table ..
Partition Count : 47
--------------- Reading build.prop content ---------------
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Security Patch : 2020-02-05
StorageType : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
IMEI1 : ***************
IMEI2 : ***************
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------
Backing up Security..
- preloader(preloader.bin), 512 KB = Ok [preloader_dura64.bin]
*Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0699_E63E233CC4A2D5173FB8F487BE75ED98\Auto\061323103511\6739_Android_scatter.txt
- pgpt(pgpt.bin), 512 KB = Ok
- nvram(nvram.bin), 5 MB = Ok
- nvdata(nvdata.bin), 32 MB = Ok
- frp(frp.bin), 1024 KB = Ok
- protect1(protect1.bin), 8 MB = Ok
- protect2(protect2.bin), 16.938 MB = Ok
- oeminfo(oeminfo.bin), 8 MB = Ok
- proinfo(proinfo.bin), 3 MB = Ok
- nvcfg(nvcfg.bin), 8 MB = Ok
- sec1(sec1.bin), 2 MB = Ok
- seccfg(seccfg.bin), 8 MB = Ok
- lk(lk.bin), 1024 KB = Ok
Backup Done!!!

Action Result : Ok

Elapsed Time : 00:00:25
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi 9T (lime) Mi Account Remove in EDL Mode by Hydra Tool

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Xiaomi Tool
Mi Account
Remove MiAccount[New Method]
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

PreOperation Configuration
Brand : XIAOMI Model : Redmi 9T (lime) Storage : Auto
Loader: 0000000000720000_1bebe3863a6781db_159eb52f_XIAOMI.fhprg
Port : Auto

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM3)
SymbolicName :\\?\usb#vid_05c6&pid_9008#5&2e05d5bd&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/31/2015,2.1.2.0

Getting device info. [Connected].....
Serial No.: 0xC164C158
HW_ID : 0014D0E100720000
MSM ID : 0x0014D0E1, SM_KAMORTA_H-Qualcomm SM6115 Snapdragon 662 (11 nm)/KamortaPkgLAA
MODEL_ID : 0x0000
OEM_ID : 0x0072 - XIAOMI
PBL Ver : 00000000
PK HASH : 1bebe3863a6781db4b01086063007334de9e5ca14971c7c4f4358ec9d79cda46

Firehose Loader[0000000000720000_1bebe3863a6781db_159eb52f_XIAOMI.fhprg]
--------------------------------------------------
Header Type : New
TargetMSM :
Tag :
Version : 6
Code_size : 816
Signature_size : 256
fhVendor : XIAOMI
HW_ID : 0000000000720000
Vendor : XIAOMI
OEM_ID : 0072
MODEL_ID : 0000
SW_ID : 00000003
APP_ID : 00000000
pk_hash : 1bebe3863a6781db4b01086063007334de9e5ca14971c7c4f4358ec9d79cda4692ce5e948c6fd409408f4c919fcadfe3
OEM_VERSION : f2f760038334
IMAGE_VARIANT : KamortaPkgLAA
QC_VERSION : BOOT.XF.4.1-00187-KAMORTALAZ-2
--------------------------------------------------

SaharaBoot... Ok
Sending .................................Ok
Connecting to Firehose...
Ping...................... Ok
Configuration[FHProt_Auto]........
Identifying Chip........UFS
Ok
Chip Configuration :
MemoryName : UFS
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Nov 16 2020 - 01:25:39

*** STORAGE DEVICE INFO ***
Memory Type : UFS
Block Size in Bytes : 4096
Page Size : 4096
Manufacturer ID : 462
Serial Number : 1297306958
Firmware Version : 702
Product Name : KM2V8001CM-B707
Physical Partitions : 6
Total Logical Blocks:
Drive [0] 30119936[114.898 GB]
Drive [1] 2048[8 MB]
Drive [2] 2048[8 MB]
Drive [3] 32768[128 MB]
Drive [4] 1048576[4 GB]
Drive [5] 32768[128 MB]

Protocol : Universal
Running : Ok

Reading GPT[6]
Drive [0] 32 Items
Drive [1] 32 Items
Drive [2] 32 Items
Drive [3] 32 Items
Drive [4] 64 Items
Drive [5] 32 Items

--------------- Reading build.prop content ---------------
build.prop
system
build.prop
Vendor : Xiaomi
Manufacturer : Xiaomi
Marketname : ro.productRedmi 9T
ID : SKQ1.211202.001
SDK : 31
Release : 12
ABI : arm64-v8a
Locale : en-GB
Display ID : Android-Q-build-20221205011709
Security Patch : 2022-12-01
--------------- end of build.prop content ---------------

Auto Backup Security partitions...
Reading Security Items....
- modemst1(modemst1.bin), 1.996 MB = Ok
- modemst2(modemst2.bin), 1.996 MB = Ok
- fsg(fsg.bin), 1.996 MB = Ok
- fsc(fsc.bin), 124 KB = Ok
- persist(persist.bin), 31.996 MB = Ok

C:\Hydra Tool\Backup\QUALBackup\XIAOMI\0014D0E100720000_C164C158\Auto_Backup\061323113433
Backup Security Success....
Reading GPT[6]
Drive [0] 32 Items
Drive [1] 32 Items
Drive [2] 32 Items
Drive [3] 32 Items
Drive [4] 64 Items
Drive [5] 32 Items

Backing up Partition for safety...Ok

Scanning Patching address...
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]Done!!
Total Items patched : 7
Successfully patched address..

Action Result : Ok

Elapsed Time : 00:01:15
 
Top