02-06-2023, 12:32
|
#3 (permalink)
|
Freak Poster
Join Date: Aug 2003 Location: lithuania ,kedainiai Age: 60
Posts: 366
Member: 36262
Status: Offline
Thanks Meter: 26 | i found Redmi Note 11 Pro+ pissarro Nv File
write him
then try repire imei Quote:
Hydra Tool Ver 2023.2.5.1 -
Windows 11 (Version 22H2, OS Build 22621.819, 64-bit Edition)
Intel(R) Core(TM) i5-10400F CPU @ 2.90GHz
NVIDIA GeForce GT 430
Ram Installed : 8 GB
Windows Access Right : Admin
Software Run As Admnistrator
******* Dongle Info *******
Version : Hydra Tool v 1.1
Serial : 191100002670
Initialize : OKAY
Status : Activated
Life : 0 [0-0-0-0-0]
=====================================
***IMEI REPAIR FUNCTION****
Xiaomi Dual
Searching for MTK Device...Found
MTK Port Type : Flashmode BROM
FriendlyName : MediaTek USB Port (COM41)
Device : /5&288afdf&0&9
SymbolicName : \\?\usb#vid_0e8d&pid_0003#5&288afdf&0&9#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 09/11/2014,3.0.1437.1
Service : wdm_usb
Openning Port [COM41] Ok
Handshaking...Ok
HwCode : 0959 {MT6877}
Hwver : 0000
Target config : E7
SBC : 01 (True)
SLA : 02 (True)
DAA : 04 (True)
SWJTAG : 06 (True)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 20 (True)
MEMWRITE : 40 (True)
CMD_C8 : 80 (True)
Connection : BROM
HW Subcode : 8A00
HW Subcode : CA00
SW Ver : 0000
ME_ID : DB37A159B30A781E3CAD22E9200D9D84
SOC_ID : B919F63C193FB8D33301FA64D6A9CA8A1773CCDC82370C34C8 EF5522B3D595FA
Exploiting Device...
Successfully Exploited..
Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..Found @ 0x00200BC4
Starting to dump...
Prel Size : 0x00070FC4
Successfully dump preloader.. [C:\Hydra Tool\Boot\PreloaderDump\preloader_pissarro.bin]
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)
Connection : BROM
Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin]
Patching da2 ... Ok
Uploading Stage 1....
Successfully uploaded stage 1, jumping ..
Executing JUMP_DA Address @ 0x00200000
Jumping to 0x00200000 Ok C0
Successfully received DA sync
ONNECTION_AGENT : brom
DRAM config needed for : 4839485131354145434D424441520000
Sending auto preloader from dump... [preloader_pissarro.bin]
Sending emi data.. [DRAM setup passed.]
Sending emi data succeeded.
Uploading stage 2...
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
ERAM Size : 0x0000000000070000-448 KB
IRAM Size : 0x0000000180000000-6 GB
UFS MID : 0x48
UFS FWVer : 0xA043
UFS Blocksize : 0x0000000000001000-4 KB
UFS LU0 Size : 0x0000000000400000-4 MB
UFS LU1 Size : 0x0000000000400000-4 MB
UFS LU2 Size : 0x0000001DCB000000-119,172 GB
UFS ID : H
UFS CID : 4839485131354145434D42444152000000000000
HW-CODE : 0x959
HWSUB-CODE : 0x8A00
HW-VERSION : 0xCA00
SW-VERSION : 0x0
CHIP-EVOLUTION : 0x2
DA-VERSION : 1.0
Speed : high-speed
Upload data was accepted. Jumping to stage 2...
DA Extensions successfully added
Reading Partition Table ..
Partition Count : 77
--------------- Reading build.prop content ---------------
Brand : redmi
Vendor : xiaomi
Model : missi
Product : missi
Manufacturer : xiaomi
ID : SP1A.210812.016
SDK : 31
Release : 12
ABI : arm64-v8a
Locale : en-GB
Description : missi-user 12 SP1A.210812.016 V13.0.7.0.SKTMIXM release-keys
Display ID : SP1A.210812.016
Security Patch : 2022-11-01
StorageType : mtp
--------------- end of build.prop content ---------------
Reading IMEI........
IMEI1 : Unable To decrypt Unknown Keys[5G]
IMEI2 : Unable To decrypt Unknown Keys[5G]
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------
Backing up Security..
- preloader(preloader.bin), 512 KB = Ok [preloader_pissarro.bin]
*Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0959_DB37A159B30A781E3CAD22E92 00D9D84\Auto\020623132613\6877_Android_scatter.txt
- pgpt(pgpt.bin), 32 KB = Ok
- nvram(nvram.bin), 64 MB = Ok
- nvdata(nvdata.bin), 64 MB = Ok
- frp(frp.bin), 1024 KB = Ok
- protect1(protect1.bin), 8 MB = Ok
- protect2(protect2.bin), 8 MB = Ok
- persist(persist.bin), 66,469 MB = Ok
- proinfo(proinfo.bin), 3 MB = Ok
- nvcfg(nvcfg.bin), 32 MB = Ok
- sec1(sec1.bin), 2 MB = Ok
- seccfg(seccfg.bin), 8 MB = Ok
Backup Done!!!
Backing up Security..
- nvram Ok
- nvdata Ok
- vbmeta_a Ok
- vbmeta_b Ok
- proinfo Ok
Step 1 Ok
Step 2 Ok
Step 3 Ok
Step 4 Ok
Operation Done!!!!
Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!
Elapsed Time : 00:00:38
| after dm-verrity corruption
hydra tool need your help
thank you |
| |