|
Welcome to the GSM-Forum forums. You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. Only registered members may post questions, contact other members or search our database of over 8 million posts. Registration is fast, simple and absolutely free so please - Click to REGISTER! If you have any problems with the registration process or your account login, please contact contact us . |
|
Register | FAQ | Donate | Forum Rules | Root any Device | ★iPhone Unlock★ | ★ Direct Codes ★ | Direct Unlock Source |
| LinkBack | Thread Tools | Display Modes |
08-12-2022, 07:39 | #3031 (permalink) |
Freak Poster Join Date: Feb 2017 Location: Alipur
Posts: 151
Member: 2683134 Status: Offline Thanks Meter: 59 | itel a26 a571l frp done by hydra spd tool Code: Port : [Auto] Scanning...COM11 Opening Port...(COM11)Ok ------------------------------------------ Service_FRP_Flashmode... ------------------------------------------ Reading IMEI.... IMEI 1 : 354744xxxxxxxxx IMEI 2 : 867400xxxxxxxxx IMEI 3 : 867400xxxxxxxxx IMEI 4 : 354744xxxxxxxxx Reading System Info. Removing FRP...Ok Rebooting Phone..Ok Closing Port...Ok.. Elapsed Time : 00:00:03 |
The Following 2 Users Say Thank You to Love_InsPeXtor For This Useful Post: |
08-23-2022, 16:49 | #3036 (permalink) |
Product Manager Join Date: Aug 2018 Location: Ukraine / Harkov
Posts: 1,986
Member: 2857401 Status: Offline Thanks Meter: 6,861 | Redmi 10 (Selene) Dual Sim IMEI Repair and Network Repair Success by Hydra Too Xiaomi Redmi 10 (Selene) Dual Sim IMEI Repair and Network Repair Success by Hydra Tool |
The Following 4 Users Say Thank You to Hydra Tool For This Useful Post: |
08-27-2022, 09:58 | #3038 (permalink) |
No Life Poster Join Date: Dec 2020 Location: ph Age: 48
Posts: 594
Member: 2974628 Status: Offline Sonork: 11223344 Thanks Meter: 178 | Oppo A53 CPH2127 Password Pattern Google Account Reset SUCCESS Oppo A53 CPH2127 Password Pattern Google Account Reset SUCCESS Last edited by Hydra Tool; 08-27-2022 at 16:23. |
The Following User Says Thank You to TeamBobParts For This Useful Post: |
08-27-2022, 17:19 | #3039 (permalink) |
No Life Poster Join Date: Jan 2013 Location: gsmhosting Age: 29
Posts: 1,148
Member: 1876736 Status: Offline Thanks Meter: 735 | redmi 9 mi account remove done Code: earching for MTK Device...Found Port Identification :Flashmode BROM FriendlyName :MediaTek USB Port_V1633 (COM31) Device :5&15c311e1&0&2 SymbolicName :\??\USB#VID_0E8D&PID_0003#5&15c311e1&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver :01/22/2015,3.0.1504.0 Trying to Open Port [COM31] Ok Handshaking...Ok HwCode : 0707 {MT6768} Hwver : 0000 Target config : E7 SBC : 01 (True) SLA : 02 (True) DAA : 04 (True) SWJTAG : 06 (True) EPP : 00 (False) CERT : 00 (False) MEMREAD : 20 (True) MEMWRITE : 40 (True) CMD_C8 : 80 (True) Device Connection : BROM HW Subcode: 8A00 HW Ver : CA00 SW Ver : 0000 ME_ID : AC90E6FAE70E2A40E88DFD0A9046BA3A SOC_ID : DBE289B73F0ED0862650B3C3A1CFB46F412BAB58E61F002087746BE5B439E1FD Exploiting Device... Handshaking...Ok Dumping Preloader from Bootrom.. Seeking preloader address..Found @ 0x00200BC4 Starting to dump... Prel Size : 0x00044798 Successfully dump preloader.. [H:\Hydra Tool\Boot\PreloaderDump\preloader_lancelot.bin] Target config : 00 SBC : 00 (False) SLA : 00 (False) DAA : 00 (False) SWJTAG : 00 (False) EPP : 00 (False) CERT : 00 (False) MEMREAD : 00 (False) MEMWRITE : 00 (False) CMD_C8 : 00 (False) Device Connection : BROM Download Agent... DA :MTK_AllInOne_DA_5.2152.bin Patching da2 ... Ok Uploading data Successfully uploaded stage 1, jumping .. Jumping to 0x00200000 Successfully received DA sync CONNECTION_AGENT : brom DRAM config needed for : 150100444436384D Sending emi data.. DRAM setup passed. Sending emi data succeeded. Uploading stage 2... Upload data was accepted. Jumping to stage 2... Successfully uploaded stage 2 ERAM Size: 0x0000000000070000-448 KB IRAM Size: 0x0000000100000000-4 GB EMMC Boot1 Size: 0x0000000000400000-4 MB EMMC Boot2 Size: 0x0000000000400000-4 MB EMMC RPMB Size : 0x0000000000400000-4 MB EMMC USER Size : 0x0000000747C00000-29.121 GB EMMC CID : 150100444436384D4202F137D8F7C653 - DD68MB HW-CODE : 0x707 HWSUB-CODE : 0x8A00 HW-VERSION : 0xCA00 SW-VERSION : 0x0 CHIP-EVOLUTION : 0x1 DA-VERSION : 1.0 Speed : high-speed Upload data was accepted. Jumping to stage 2... DA Extensions successfully added Reading Partition Table .. Partition Count : 50 --------------- Reading build.prop content --------------- Brand : Redmi Vendor : Xiaomi Model : lancelot Product : lancelot Manufacturer : Xiaomi Marketname : Redmi 9 ID : RP1A.200720.011 SDK : 30 Release : 11 ABI : arm64-v8a CPU abilist : arm64-v8a,armeabi-v7a,armeabi Locale : en-GB Description : lancelot-user 11 RP1A.200720.011 V12.5.3.0.RJCMIXM release-keys Display ID : RP1A.200720.011 Security Patch : 2021-10-01 StorageType : mtp --------------- end of build.prop content --------------- Reading IMEI........ IMEI1 : 865 IMEI2 : 865 ------------------------------- Bootloader Status... Bootloader : Locked ------------------------------- Backing up Security.. -preloader .....Ok [preloader_lancelot.bin] *Creating Scatter file... H:\Hydra Tool\Backup\MTKBKUP\0707_AC90E6FAE70E2A40E88DFD0A9046BA3A\Auto\082722204117\6768_Android_scatter.txt -pgpt .....Ok -nvram .....Ok -nvdata .....Ok -frp .....Ok -protect1 .....Ok -protect2 .....Ok -persist .....Ok -proinfo .....Ok -nvcfg .....Ok -sec1 .....Ok -seccfg .....Ok Backup Done!!! ------------------------------ Xiaomi Operation Flash Mode.. ------------------------------ Backing up Security.. persist... Ok vbmeta_system... Ok vbmeta... Ok Patching Persist Scanning Patching address...Please wait... > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] Total Items patched : 98 Successfully patched address.. -persist .....Ok Done Writing... -vbmeta .....Ok Done Writing... -vbmeta_system .....Ok Done Writing... Please wait, processing..... Status: Ok |
The Following User Says Thank You to sky73 For This Useful Post: |
08-29-2022, 11:46 | #3040 (permalink) |
Product Manager Join Date: Aug 2018 Location: Ukraine / Harkov
Posts: 1,986
Member: 2857401 Status: Offline Thanks Meter: 6,861 | Redmi Note 9 (Merlin) Dual IMEI Repair by Hydra Tool Xiaomi Redmi Note 9 (Merlin) Dual IMEI Repair by Hydra Tool After repair imei if you has imei null or same imei may you need factory reset after repair dual imei Best Regards | Hydra Team |
09-06-2022, 17:21 | #3042 (permalink) |
No Life Poster Join Date: Jan 2020 Location: Algeria
Posts: 814
Member: 2944109 Status: Offline Thanks Meter: 656 | Redmi Note 10 5G (camellia) IMEI REPAIR Xiaomi Dual By Hydra Tool Redmi Note 10 5G (camellia) IMEI REPAIR Xiaomi Dual By Hydra Tool Code: ***IMEI REPAIR FUNCTION**** Xiaomi Dual Searching for MTK Device...Found Port Identification :Flashmode BROM FriendlyName :MediaTek USB Port_V1632 (COM13) Device :5&15c311e1&0&9 SymbolicName :\??\USB#VID_0E8D&PID_0003#5&15c311e1&0&9#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver :01/22/2015,3.0.1504.0 Trying to Open Port [COM13] Ok Reading Partition Table .. ERAM Size: 0x0000000000070000-448 KB IRAM Size: 0x0000000100000000-4 GB UFS FWVer : 0x00002020 UFS Blocksize : 0x0000000000001000-4 KB UFS LU0 Size : 0x0000000000400000-4 MB UFS LU1 Size : 0x0000000000400000-4 MB UFS LU2 Size : 0x0000001DCB000000-119.172 GB UFS ID : MT12\ê UFS CID : 2C014D54313238474153414F34553231 HW-CODE : 0x989 HWSUB-CODE : 0x8A00 HW-VERSION : 0xCA00 SW-VERSION : 0x0 CHIP-EVOLUTION : 0x1 DA-VERSION : 1.0 Speed : high-speed Partition Count : 62 --------------- Reading build.prop content --------------- Brand : Redmi Vendor : Xiaomi Model : M2103K19C Product : camellia Manufacturer : Xiaomi Marketname : Redmi Note 10 ID : RP1A.200720.011 SDK : 30 Release : 11 ABI : arm64-v8a CPU abilist : arm64-v8a,armeabi-v7a,armeabi Locale : en-GB Description : camellia-user 11 RP1A.200720.011 V12.0.7.0.RKSMIXM release-keys Display ID : AN3516-camellia-build-20210818193224 Security Patch : 2021-07-01 StorageType : mtp --------------- end of build.prop content --------------- Reading IMEI........ IMEI1 : Unable To decrypt Unknown Keys[5G] IMEI2 : Unable To decrypt Unknown Keys[5G] ------------------------------- Bootloader Status... Bootloader : Unlocked ------------------------------- Backing up Security.. - nvram Ok - nvdata Ok - vbmeta_a Ok - vbmeta_b Ok - proinfo Ok Step 1 Ok Step 2 Ok Step 3 Ok Step 4 Ok Operation Done!!!! Rebooting Device... Reboot Option : RebootToNormal Rebooting Operation Done!!!! Elapsed Time : 00:00:24 |
The Following User Says Thank You to Gsm-Ahmed For This Useful Post: |
09-06-2022, 17:21 | #3043 (permalink) |
No Life Poster Join Date: Jan 2020 Location: Algeria
Posts: 814
Member: 2944109 Status: Offline Thanks Meter: 656 | OPPO A1k (CPH1923) Pattern/FRP Lock Remove By Hydra Tool OPPO A1k (CPH1923) Pattern/FRP Lock Remove By Hydra Tool Code: Searching for MTK Device...Found Port Identification :Flashmode BROM FriendlyName :MediaTek USB Port_V1632 (COM28) Device :5&15c311e1&0&10 SymbolicName :\??\USB#VID_0E8D&PID_0003#5&15c311e1&0&10#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver :01/22/2015,3.0.1504.0 Trying to Open Port [COM28] Ok Reading Partition Table .. ERAM Size: 0x000000000003A000-232 KB IRAM Size: 0x0000000080000000-2 GB EMMC Boot1 Size: 0x0000000000400000-4 MB EMMC Boot2 Size: 0x0000000000400000-4 MB EMMC RPMB Size : 0x0000000001000000-16 MB EMMC USER Size : 0x0000000747C00000-29.121 GB EMMC CID : 150100514436334D42039116D8B016E3 - QD63MB HW-CODE : 0x766 HWSUB-CODE : 0x8A00 HW-VERSION : 0xCA00 SW-VERSION : 0x0 CHIP-EVOLUTION : 0x0 DA-VERSION : 1.0 Speed : high-speed Partition Count : 44 --------------- Reading build.prop content --------------- Vendor : OPPO Manufacturer : OPPO ID : PPR1.180610.011 SDK : 28 Release : 9 ABI : arm64-v8a CPU abilist : arm64-v8a,armeabi-v7a,armeabi Locale : en-US Description : full_oppo6762_18540-user 9 PPR1.180610.011 eng.root.20210506.165532 release-keys Security Patch : 2021-05-05 StorageType : mtp --------------- end of build.prop content --------------- Reading IMEI........ ------------------------------- Bootloader Status... Bootloader : Unlocked ------------------------------- --------------------------- Ultra Power --------------------------- Formatting Userdata : Operation : Safeformat Universal... Ok Removing FRP : Operation : Uni_FMFRP_Erase Ok Rebooting Device... Reboot Option : RebootToNormal Rebooting Operation Done!!!! |
The Following User Says Thank You to Gsm-Ahmed For This Useful Post: |
09-08-2022, 11:37 | #3044 (permalink) | |
No Life Poster Join Date: Feb 2012 Age: 39
Posts: 1,395
Member: 1724862 Status: Offline Thanks Meter: 448 | Redmi Note 9 (merlin) Dual Sim IMEI Repair by Hydra Tool Redmi Note 9 (merlin) Dual Sim IMEI Repair by Hydra Tool Xiaomi Redmi note 9 merlin imei repair and patch network dual sim imei fix. 1.) Go to MTK Module, Select Brand and Model 2.) Click BOOT INFO And waiting Booting the device 3.) Go to Repair IMEI tab, Select " Xiaomi Dual " Option 4.) Type IMEI 1 and IMEI 2 and Click Execute Button. Quote:
| |
09-10-2022, 07:41 | #3045 (permalink) |
No Life Poster Join Date: Nov 2013 Location: pakistan P G L Age: 39
Posts: 1,127
Member: 2067643 Status: Offline Sonork: 1611265 Thanks Meter: 474 | redmi 9 imei repair done Hydra MediaTeK Tool Ver 1.0.5.23 @iftik Windows 10 (Version 21H2, OS Build 19044.1645, 64-bit Edition) Intel(R) Core(TM)2 Duo CPU E8400 @ 3.00GHz Intel(R) G45/G43 Express Chipset (Microsoft Corporation - WDDM 1.1) Ram Installed : 8 GB Windows Access Right : Admin Software Run As Admnistrator ******* Dongle Info ******* Version : Hydra Tool v 1.2 Serial : 210700015413 Initialize : OKAY Status : Activated Life : 0 [0-0-0-0-0] ===================================== ***IMEI REPAIR FUNCTION**** Xiaomi 2nd IMEI Searching for MTK Device...Found Port Identification :Flashmode BROM FriendlyName :MediaTek USB Port (COM3) Device :5&c3261bf&0&6 SymbolicName :\??\USB#VID_0E8D&PID_0003#5&c3261bf&0&6 #{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver :01/22/2015,3.0.1504.0 Trying to Open Port [COM3] Ok Reading Partition Table .. ERAM Size: 0x0000000000070000-448 KB IRAM Size: 0x0000000100000000-4 GB EMMC Boot1 Size: 0x0000000000400000-4 MB EMMC Boot2 Size: 0x0000000000400000-4 MB EMMC RPMB Size : 0x0000000001000000-16 MB EMMC USER Size : 0x0000000E8F800000-58.242 GB EMMC CID : 150100445036444142032B81F432776B - DP6DAB HW-CODE : 0x707 HWSUB-CODE : 0x8A00 HW-VERSION : 0xCA00 SW-VERSION : 0x0 CHIP-EVOLUTION : 0x1 DA-VERSION : 1.0 Speed : high-speed Partition Count : 49 --------------- Reading build.prop content --------------- Brand : Redmi Vendor : Xiaomi Model : lancelot Product : lancelot Manufacturer : Xiaomi Marketname : Redmi 9 ID : QP1A.190711.020 SDK : 29 Release : 10 ABI : arm64-v8a CPU abilist : arm64-v8a,armeabi-v7a,armeabi Locale : en-GB Description : lancelot-user 10 QP1A.190711.020 V11.0.7.0.QJCMIXM release-keys Display ID : build-20200821172404 Security Patch : 2020-08-05 StorageType : mtp --------------- end of build.prop content --------------- Enc: 4AB96D2F1A7925C700DB7E7F217756793F086BADD56D9FA38E BF8856D4AEA0A7 Dec: FFFFFFFFFFFFFFFFFFFF21364F4123FC17C100000000000000 00000000000000 Enc: E3511B7323226E892EB41F686B8477642A1607B2105CD6DAC6 FBBE65DCFE7DA8 Dec: 53641650919586F300000DD29B81BEF06F6600000000000000 00000000000000 IMEI1 : FFFFFFFFFFFFFFF IMEI2 : 354661051959683 ------------------------------- Bootloader Status... Bootloader : Locked ------------------------------- Access violation at address 009A5F9B in module 'HMTKTool.exe'. Read of address 00000000 Elapsed Time : 00:00:04 |
Bookmarks |
| |
|