GSM Shop GSM Shop
GSM-Forum  

Welcome to the GSM-Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features.
Only registered members may post questions, contact other members or search our database of over 8 million posts.

Registration is fast, simple and absolutely free so please - Click to REGISTER!

If you have any problems with the registration process or your account login, please contact contact us .

Go Back   GSM-Forum > Product Support Sections > Special Solutions / Services / WebShop > GSMFABRICA Products > HYDRA TOOL


Reply
 
LinkBack Thread Tools Display Modes
Old 08-12-2022, 07:39   #3031 (permalink)
Freak Poster
 
Love_InsPeXtor's Avatar
 
Join Date: Feb 2017
Location: Alipur
Posts: 151
Member: 2683134
Status: Offline
Thanks Meter: 59
itel a26 a571l frp done by hydra spd tool


here aree log

Code:
Port : [Auto] Scanning...COM11
Opening Port...(COM11)Ok
------------------------------------------
Service_FRP_Flashmode...
------------------------------------------
Reading IMEI....
IMEI 1 : 354744xxxxxxxxx
IMEI 2 : 867400xxxxxxxxx
IMEI 3 : 867400xxxxxxxxx
IMEI 4 : 354744xxxxxxxxx

Reading System Info.
Removing FRP...Ok
Rebooting Phone..Ok

Closing Port...Ok..

Elapsed Time : 00:00:03

  Reply With Quote
The Following 2 Users Say Thank You to Love_InsPeXtor For This Useful Post:
Old 08-15-2022, 06:37   #3032 (permalink)
Product Supporter
 
Hydra Supporter's Avatar
 
Join Date: Jan 2021
Location: ... Heart ...
Posts: 567
Member: 2977290
Status: Offline
Thanks Meter: 702
OPPO F7 (CPH1819) Pattern Remove with MetaMode

OPPO F7 (CPH1819) Pattern Remove with MetaMode





  Reply With Quote
The Following User Says Thank You to Hydra Supporter For This Useful Post:
Old 08-15-2022, 10:28   #3033 (permalink)
Product Supporter
 
Hydra Supporter's Avatar
 
Join Date: Jan 2021
Location: ... Heart ...
Posts: 567
Member: 2977290
Status: Offline
Thanks Meter: 702
Y6 SCL U31 FRP Remove By Hydra Tool

Y6 SCL U31 FRP Remove By Hydra Tool






  Reply With Quote
The Following User Says Thank You to Hydra Supporter For This Useful Post:
Old 08-19-2022, 10:40   #3034 (permalink)
Freak Poster
 
Join Date: Jun 2014
Location: Turkiye-Konya
Posts: 316
Member: 2199727
Status: Offline
Thanks Meter: 217
Huawei p30 frp reset ok by Hydra dongle

  Reply With Quote
The Following User Says Thank You to bulutiletisim For This Useful Post:
Old 08-22-2022, 16:59   #3035 (permalink)
Freak Poster
 
Join Date: Jun 2006
Location: nagaur
Posts: 162
Member: 293284
Status: Offline
Thanks Meter: 105
pd2185f add this model frp
  Reply With Quote
Old 08-23-2022, 16:49   #3036 (permalink)
Product Manager
 
Hydra Tool's Avatar
 
Join Date: Aug 2018
Location: Ukraine / Harkov
Posts: 1,986
Member: 2857401
Status: Offline
Thanks Meter: 6,861
Redmi 10 (Selene) Dual Sim IMEI Repair and Network Repair Success by Hydra Too

Xiaomi Redmi 10 (Selene) Dual Sim IMEI Repair and Network Repair Success by Hydra Tool

  Reply With Quote
The Following 4 Users Say Thank You to Hydra Tool For This Useful Post:
Show/Hide list of the thanked
Old 08-24-2022, 20:21   #3037 (permalink)
Freak Poster
 
Join Date: Sep 2019
Location: sarbandar
Age: 29
Posts: 142
Member: 2927435
Status: Offline
Sonork: valid
Thanks Meter: 16
Smile

Quote:
Originally Posted by Hydra Tool View Post
Xiaomi Redmi 10 (Selene) Dual Sim IMEI Repair and Network Repair Success by Hydra Tool


hello best update team but how about factory reset or flashing will be got no imei or what?
  Reply With Quote
Old 08-27-2022, 09:58   #3038 (permalink)
No Life Poster
 
Join Date: Dec 2020
Location: ph
Age: 48
Posts: 594
Member: 2974628
Status: Offline
Sonork: 11223344
Thanks Meter: 178
Oppo A53 CPH2127 Password Pattern Google Account Reset SUCCESS

Oppo A53 CPH2127 Password Pattern Google Account Reset SUCCESS

http://www.youtube.com/watch?v=DmJ3Nr9vGgo

Last edited by Hydra Tool; 08-27-2022 at 16:23.
  Reply With Quote
The Following User Says Thank You to TeamBobParts For This Useful Post:
Old 08-27-2022, 17:19   #3039 (permalink)
No Life Poster
 
sky73's Avatar
 
Join Date: Jan 2013
Location: gsmhosting
Age: 29
Posts: 1,148
Member: 1876736
Status: Offline
Thanks Meter: 735
redmi 9 mi account remove done

Code:
earching for MTK Device...Found
 Port Identification :Flashmode BROM 
 FriendlyName :MediaTek USB Port_V1633 (COM31)
 Device       :5&15c311e1&0&2
 SymbolicName :\??\USB#VID_0E8D&PID_0003#5&15c311e1&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0

Trying to Open Port [COM31] Ok
Handshaking...Ok
HwCode    : 0707 {MT6768}
Hwver     : 0000
 Target config : E7
 SBC           : 01 (True)
 SLA           : 02 (True)
 DAA           : 04 (True)
 SWJTAG        : 06 (True)
 EPP           : 00 (False)
 CERT          : 00 (False)
 MEMREAD       : 20 (True)
 MEMWRITE      : 40 (True)
 CMD_C8        : 80 (True)
Device Connection : BROM
HW Subcode: 8A00
HW Ver    : CA00
SW Ver    : 0000
ME_ID     : AC90E6FAE70E2A40E88DFD0A9046BA3A
SOC_ID    : DBE289B73F0ED0862650B3C3A1CFB46F412BAB58E61F002087746BE5B439E1FD
Exploiting Device...
Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..Found @ 0x00200BC4
Starting to dump...
Prel Size : 0x00044798
Successfully dump preloader..  [H:\Hydra Tool\Boot\PreloaderDump\preloader_lancelot.bin]
 Target config : 00
 SBC           : 00 (False)
 SLA           : 00 (False)
 DAA           : 00 (False)
 SWJTAG        : 00 (False)
 EPP           : 00 (False)
 CERT          : 00 (False)
 MEMREAD       : 00 (False)
 MEMWRITE      : 00 (False)
 CMD_C8        : 00 (False)
Device Connection : BROM
Download Agent...
DA :MTK_AllInOne_DA_5.2152.bin
Patching da2 ... Ok
Uploading data
Successfully uploaded stage 1, jumping ..
Jumping to 0x00200000
Successfully received DA sync
CONNECTION_AGENT : brom
DRAM config needed for : 150100444436384D
Sending emi data.. 
DRAM setup passed.
Sending emi data succeeded.
Uploading stage 2...
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
ERAM Size: 0x0000000000070000-448 KB
IRAM Size: 0x0000000100000000-4 GB
EMMC Boot1 Size: 0x0000000000400000-4 MB
EMMC Boot2 Size: 0x0000000000400000-4 MB
EMMC RPMB Size : 0x0000000000400000-4 MB
EMMC USER Size : 0x0000000747C00000-29.121 GB
EMMC CID       :  150100444436384D4202F137D8F7C653 - DD68MB
HW-CODE         : 0x707
HWSUB-CODE      : 0x8A00
HW-VERSION      : 0xCA00
SW-VERSION      : 0x0
CHIP-EVOLUTION  : 0x1
DA-VERSION      :  1.0
Speed          : high-speed
Upload data was accepted. Jumping to stage 2...
DA Extensions successfully added 
Reading Partition Table .. 
Partition Count : 50
--------------- Reading build.prop content ---------------
  Brand          : Redmi
  Vendor         : Xiaomi
  Model          : lancelot
  Product        : lancelot
  Manufacturer   : Xiaomi
  Marketname   : Redmi 9
  ID             : RP1A.200720.011
  SDK            : 30
  Release        : 11
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-GB
  Description    : lancelot-user 11 RP1A.200720.011 V12.5.3.0.RJCMIXM release-keys
  Display ID     : RP1A.200720.011
  Security Patch : 2021-10-01
  StorageType    : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
 IMEI1 : 865
 IMEI2 : 865
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------
Backing up Security..
 -preloader .....Ok  [preloader_lancelot.bin]
  *Creating Scatter file... H:\Hydra Tool\Backup\MTKBKUP\0707_AC90E6FAE70E2A40E88DFD0A9046BA3A\Auto\082722204117\6768_Android_scatter.txt
 -pgpt .....Ok
 -nvram .....Ok
 -nvdata .....Ok
 -frp .....Ok
 -protect1 .....Ok
 -protect2 .....Ok
 -persist .....Ok
 -proinfo .....Ok
 -nvcfg .....Ok
 -sec1 .....Ok
 -seccfg .....Ok
Backup Done!!!
------------------------------
   Xiaomi Operation Flash Mode..  
------------------------------
Backing up Security..
persist... Ok
vbmeta_system... Ok
vbmeta... Ok
Patching Persist

Scanning Patching address...Please wait...
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
Total Items patched : 98
Successfully patched address..
 -persist .....Ok
Done Writing...
 -vbmeta .....Ok
Done Writing...
 -vbmeta_system .....Ok
Done Writing...
Please wait, processing.....
Status:  Ok
  Reply With Quote
The Following User Says Thank You to sky73 For This Useful Post:
Old 08-29-2022, 11:46   #3040 (permalink)
Product Manager
 
Hydra Tool's Avatar
 
Join Date: Aug 2018
Location: Ukraine / Harkov
Posts: 1,986
Member: 2857401
Status: Offline
Thanks Meter: 6,861
Redmi Note 9 (Merlin) Dual IMEI Repair by Hydra Tool

Xiaomi Redmi Note 9 (Merlin) Dual IMEI Repair by Hydra Tool

After repair imei if you has imei null or same imei may you need factory reset after repair dual imei

http://www.youtube.com/watch?v=UR4kySB1w6s

Best Regards | Hydra Team
  Reply With Quote
Old 09-04-2022, 00:37   #3041 (permalink)
No Life Poster
 
Join Date: Oct 2006
Location: Republica Dominicana
Age: 40
Posts: 1,065
Member: 381487
Status: Offline
Sonork: 100.1659930
Thanks Meter: 160
Motorola G22 XT2231-5 remove frp and full firmware backup...thanks hydra team...


http://www.youtube.com/watch?v=6_XeERt6WoM
  Reply With Quote
Old 09-06-2022, 17:21   #3042 (permalink)
No Life Poster
 
Gsm-Ahmed's Avatar
 
Join Date: Jan 2020
Location: Algeria
Posts: 814
Member: 2944109
Status: Offline
Thanks Meter: 656
Redmi Note 10 5G (camellia) IMEI REPAIR Xiaomi Dual By Hydra Tool

Redmi Note 10 5G (camellia) IMEI REPAIR Xiaomi Dual By Hydra Tool


Code:
***IMEI REPAIR FUNCTION****
Xiaomi Dual
Searching for MTK Device...Found
 Port Identification :Flashmode BROM 
 FriendlyName :MediaTek USB Port_V1632 (COM13)
 Device       :5&15c311e1&0&9
 SymbolicName :\??\USB#VID_0E8D&PID_0003#5&15c311e1&0&9#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0

Trying to Open Port [COM13] Ok
Reading Partition Table .. 
ERAM Size: 0x0000000000070000-448 KB
IRAM Size: 0x0000000100000000-4 GB
UFS FWVer     : 0x00002020
UFS Blocksize : 0x0000000000001000-4 KB
UFS LU0 Size  : 0x0000000000400000-4 MB
UFS LU1 Size  : 0x0000000000400000-4 MB
UFS LU2 Size  : 0x0000001DCB000000-119.172 GB
UFS ID        : MT12\ê
UFS CID       : 2C014D54313238474153414F34553231
HW-CODE         : 0x989
HWSUB-CODE      : 0x8A00
HW-VERSION      : 0xCA00
SW-VERSION      : 0x0
CHIP-EVOLUTION  : 0x1
DA-VERSION      :  1.0
Speed          : high-speed
Partition Count : 62
--------------- Reading build.prop content ---------------
  Brand          : Redmi
  Vendor         : Xiaomi
  Model          : M2103K19C
  Product        : camellia
  Manufacturer   : Xiaomi
  Marketname   : Redmi Note 10
  ID             : RP1A.200720.011
  SDK            : 30
  Release        : 11
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-GB
  Description    : camellia-user 11 RP1A.200720.011 V12.0.7.0.RKSMIXM release-keys
  Display ID     : AN3516-camellia-build-20210818193224
  Security Patch : 2021-07-01
  StorageType    : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
 IMEI1 : Unable To decrypt Unknown Keys[5G]
 IMEI2 : Unable To decrypt Unknown Keys[5G]
-------------------------------
Bootloader Status...
  Bootloader : Unlocked
-------------------------------
Backing up Security..
 - nvram Ok
 - nvdata Ok
 - vbmeta_a Ok
 - vbmeta_b Ok
 - proinfo Ok
Step 1 Ok
Step 2 Ok
Step 3 Ok
Step 4 Ok
Operation Done!!!!
Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!



Elapsed Time : 00:00:24
  Reply With Quote
The Following User Says Thank You to Gsm-Ahmed For This Useful Post:
Old 09-06-2022, 17:21   #3043 (permalink)
No Life Poster
 
Gsm-Ahmed's Avatar
 
Join Date: Jan 2020
Location: Algeria
Posts: 814
Member: 2944109
Status: Offline
Thanks Meter: 656
OPPO A1k (CPH1923) Pattern/FRP Lock Remove By Hydra Tool

OPPO A1k (CPH1923) Pattern/FRP Lock Remove By Hydra Tool


Code:
Searching for MTK Device...Found
 Port Identification :Flashmode BROM 
 FriendlyName :MediaTek USB Port_V1632 (COM28)
 Device       :5&15c311e1&0&10
 SymbolicName :\??\USB#VID_0E8D&PID_0003#5&15c311e1&0&10#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0

Trying to Open Port [COM28] Ok
Reading Partition Table .. 
ERAM Size: 0x000000000003A000-232 KB
IRAM Size: 0x0000000080000000-2 GB
EMMC Boot1 Size: 0x0000000000400000-4 MB
EMMC Boot2 Size: 0x0000000000400000-4 MB
EMMC RPMB Size : 0x0000000001000000-16 MB
EMMC USER Size : 0x0000000747C00000-29.121 GB
EMMC CID       :  150100514436334D42039116D8B016E3 - QD63MB
HW-CODE         : 0x766
HWSUB-CODE      : 0x8A00
HW-VERSION      : 0xCA00
SW-VERSION      : 0x0
CHIP-EVOLUTION  : 0x0
DA-VERSION      :  1.0
Speed          : high-speed
Partition Count : 44
--------------- Reading build.prop content ---------------
  Vendor         : OPPO
  Manufacturer   : OPPO
  ID             : PPR1.180610.011
  SDK            : 28
  Release        : 9
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-US
  Description    : full_oppo6762_18540-user 9 PPR1.180610.011 eng.root.20210506.165532 release-keys
  Security Patch : 2021-05-05
  StorageType    : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
-------------------------------
Bootloader Status...
  Bootloader : Unlocked
-------------------------------
---------------------------
        Ultra Power    
---------------------------
Formatting Userdata : 
Operation : Safeformat Universal... Ok
Removing FRP : 
Operation : Uni_FMFRP_Erase Ok
Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!
  Reply With Quote
The Following User Says Thank You to Gsm-Ahmed For This Useful Post:
Old 09-08-2022, 11:37   #3044 (permalink)
No Life Poster
 
ceza031's Avatar
 
Join Date: Feb 2012
Age: 39
Posts: 1,395
Member: 1724862
Status: Offline
Thanks Meter: 448
Redmi Note 9 (merlin) Dual Sim IMEI Repair by Hydra Tool

Redmi Note 9 (merlin) Dual Sim IMEI Repair by Hydra Tool

Xiaomi Redmi note 9 merlin imei repair and patch network dual sim imei fix.

1.) Go to MTK Module, Select Brand and Model
2.) Click BOOT INFO And waiting Booting the device
3.) Go to Repair IMEI tab, Select " Xiaomi Dual " Option
4.) Type IMEI 1 and IMEI 2 and Click Execute Button.



Quote:
=====================================
***IMEI REPAIR FUNCTION****
Xiaomi Dual
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port (COM29)
Device :6&35844985&0&3
SymbolicName :\??\USB#VID_0E8D&PID_0003#6&35844985&0&3#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2016,3.2

Trying to Open Port [COM29] Ok
Reading Partition Table ..
ERAM Size: 0x0000000000070000-448 KB
IRAM Size: 0x0000000100000000-4 GB
EMMC Boot1 Size: 0x0000000000400000-4 MB
EMMC Boot2 Size: 0x0000000000400000-4 MB
EMMC RPMB Size : 0x0000000001000000-16 MB
EMMC USER Size : 0x0000001D1F000000-116,484 GB
EMMC CID : 13014E47314A3953391011F8096148DD - G1J9S9
HW-CODE : 0x707
HWSUB-CODE : 0x8A00
HW-VERSION : 0xCA00
SW-VERSION : 0x0
CHIP-EVOLUTION : 0x1
DA-VERSION : 1.0
Speed : high-speed
Partition Count : 50
--------------- Reading build.prop content ---------------
Brand : Redmi
Vendor : Xiaomi
Model : M2003J15SC
Product : merlin
Manufacturer : Xiaomi
Marketname : Redmi Note 9
ID : RP1A.200720.011
SDK : 30
Release : 11
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : merlin-user 11 RP1A.200720.011 V12.5.4.0.RJOMIXM release-keys
Display ID : RP1A.200720.011
Security Patch : 2022-03-01
StorageType : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
IMEI1 : FFFFFFFFFFFFFFF
IMEI2 : 358156060039516
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------
Backing up Security..
- nvram Ok
- nvdata Ok
- vbmeta Ok
- proinfo Ok
- vbmeta_vendor Ok
Step 1 Ok
Step 2 Ok
Step 3 Ok
Step 4 Ok
Operation Done!!!!
Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!



Elapsed Time : 00:00:19
  Reply With Quote
Old 09-10-2022, 07:41   #3045 (permalink)
No Life Poster
 
Join Date: Nov 2013
Location: pakistan P G L
Age: 39
Posts: 1,127
Member: 2067643
Status: Offline
Sonork: 1611265
Thanks Meter: 474
redmi 9 imei repair done

Hydra MediaTeK Tool Ver 1.0.5.23 @iftik
Windows 10 (Version 21H2, OS Build 19044.1645, 64-bit Edition)
Intel(R) Core(TM)2 Duo CPU E8400 @ 3.00GHz
Intel(R) G45/G43 Express Chipset (Microsoft Corporation - WDDM 1.1)
Ram Installed : 8 GB
Windows Access Right : Admin
Software Run As Admnistrator

******* Dongle Info *******
Version : Hydra Tool v 1.2
Serial : 210700015413
Initialize : OKAY
Status : Activated
Life : 0 [0-0-0-0-0]


=====================================
***IMEI REPAIR FUNCTION****
Xiaomi 2nd IMEI
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port (COM3)
Device :5&c3261bf&0&6
SymbolicName :\??\USB#VID_0E8D&PID_0003#5&c3261bf&0&6
#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0

Trying to Open Port [COM3] Ok
Reading Partition Table ..
ERAM Size: 0x0000000000070000-448 KB
IRAM Size: 0x0000000100000000-4 GB
EMMC Boot1 Size: 0x0000000000400000-4 MB
EMMC Boot2 Size: 0x0000000000400000-4 MB
EMMC RPMB Size : 0x0000000001000000-16 MB
EMMC USER Size : 0x0000000E8F800000-58.242 GB
EMMC CID : 150100445036444142032B81F432776B - DP6DAB
HW-CODE : 0x707
HWSUB-CODE : 0x8A00
HW-VERSION : 0xCA00
SW-VERSION : 0x0
CHIP-EVOLUTION : 0x1
DA-VERSION : 1.0
Speed : high-speed
Partition Count : 49
--------------- Reading build.prop content ---------------
Brand : Redmi
Vendor : Xiaomi
Model : lancelot
Product : lancelot
Manufacturer : Xiaomi
Marketname : Redmi 9
ID : QP1A.190711.020
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : lancelot-user 10 QP1A.190711.020 V11.0.7.0.QJCMIXM
release-keys
Display ID : build-20200821172404
Security Patch : 2020-08-05
StorageType : mtp
--------------- end of build.prop content ---------------
Enc: 4AB96D2F1A7925C700DB7E7F217756793F086BADD56D9FA38E BF8856D4AEA0A7
Dec: FFFFFFFFFFFFFFFFFFFF21364F4123FC17C100000000000000 00000000000000
Enc: E3511B7323226E892EB41F686B8477642A1607B2105CD6DAC6 FBBE65DCFE7DA8
Dec: 53641650919586F300000DD29B81BEF06F6600000000000000 00000000000000
IMEI1 : FFFFFFFFFFFFFFF
IMEI2 : 354661051959683
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------
Access violation at address 009A5F9B in module 'HMTKTool.exe'. Read
of address 00000000



Elapsed Time : 00:00:04
  Reply With Quote
Reply

Bookmarks


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


 



All times are GMT +1. The time now is 18:42.



Powered by Searchlight © 2024 Axivo Inc.
vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2024 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2023 -
Page generated in 0.35148 seconds with 9 queries

SEO by vBSEO