GSM Shop GSM Shop
GSM-Forum  

Welcome to the GSM-Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features.
Only registered members may post questions, contact other members or search our database of over 8 million posts.

Registration is fast, simple and absolutely free so please - Click to REGISTER!

If you have any problems with the registration process or your account login, please contact contact us .

Go Back   GSM-Forum > Product Support Sections > Special Solutions / Services / WebShop > GSMFABRICA Products > HYDRA TOOL


Reply
 
LinkBack Thread Tools Display Modes
Old 02-19-2021, 12:27   #1276 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Cherry Mobile Flare S8 safe format successfully done by Hydra Tool


Cherry Mobile Flare S8 safe format successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
Brand : AUTO Model : AUTO Connection : Flash Mode

=====================================
Connection
-Please wait...
-Found...
-PreLoader...[COM5]

TPortConnection.Create...(COM5)..Opening...Ok

Handshaking...

Identifying Hardware ID.....
BROM CPUID : 0690MT6763T[6763]
BROM HW_SW_VER : 8A00 CA01 0001 0000

Handshaking...

Identifying Hardware ID.....
BROM CPUID : 0690MT6763T[6763]
BROM HW_SW_VER : 8A00 CA01 0001 0000
SECURE VERSION : FF
BL VERSION : 03
BR Secured : 00

Preparing Download Agent..
DA : 6763.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2020-11-03.22:07_536568
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : preloader

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : AB4C54FB2FC306EFFFAC458B07809974
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 90014A68423861503E020F4C414D44C7 - hB8aP>

DA Speed : high-speed
DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info
Brand : Cherry_Mobile
Vendor : Cherry_Mobile
Model : Flare S8
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_g1860ps_v2_gh_fng_g33scr_p-user 9 PPR1.180610.011 1112183724 release-keys
Device : X930
Display ID : Cherry_X930_Flare_S8_11122020_v1
Security Patch : 2020-11-05
FRPPST : /dev/block/platform/bootdevice/by-name/frp
Fingerprint : Cherry_Mobile/Flare_S8/X930:9/PPR1.180610.011/1112183724:user/release-keys
StorageType : mtp
Userdata State : Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_g1860ps_v2_gh_fng_g33scr_p.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\Cherry_Mobile_Flare S8_0690--9_Cherry_X930_Flare_S8_11122020_v1_180221145258\MT 6763T_Android_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x03588000]1024 KB ->frp.bin...Ok
-nvdata[0x05688000]64 MB ->nvdata.bin...Ok
-persist[0x0D000000]48 MB ->persist.bin...Ok
-nvram[0x17800000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\Cherry_Mobile_Flare S8_0690--9_Cherry_X930_Flare_S8_11122020_v1_180221145258
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : AB4C54FB2FC306EFFFAC458B07809974
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 90014A68423861503E020F4C414D44C7 - hB8aP>

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Brand : Cherry_Mobile
Vendor : Cherry_Mobile
Model : Flare S8
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_g1860ps_v2_gh_fng_g33scr_p-user 9 PPR1.180610.011 1112183724 release-keys
Device : X930
Display ID : Cherry_X930_Flare_S8_11122020_v1
Security Patch : 2020-11-05
FRPPST : /dev/block/platform/bootdevice/by-name/frp
Fingerprint : Cherry_Mobile/Flare_S8/X930:9/PPR1.180610.011/1112183724:user/release-keys
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition...
Safeformat Universal... Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:21
BR
Dipendra Pathak

  Reply With Quote
The Following User Says Thank You to Dipendra Pathak For This Useful Post:
Old 02-19-2021, 19:45   #1277 (permalink)
No Life Poster
 
Join Date: Mar 2010
Location: Algeria
Posts: 513
Member: 1263652
Status: Offline
Thanks Meter: 42
Xiaomi Redmi 9 FRP Remove by Hydra Tool

Xiaomi Redmi 9 FRP Remove by Hydra Tool

  Reply With Quote
The Following User Says Thank You to moulaha For This Useful Post:
Old 02-20-2021, 14:13   #1278 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
OPPO F11 Pro (CPH1969) Pattern successfully Removed by Hydra Dongle

OPPO F11 Pro (CPH1969) Pattern successfully Removed by Hydra Dongle


Logs:




Quote:
Brand : OPPO Model : F11 Pro (CPH1969) Connection : Flash Mode

=====================================
Connection
-Please wait...
-Found...[COM5]

TPortConnection.Create...(COM5)..Opening...Ok

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : FFAF7043BCADEB981EDE8D7759E67762
ERAM Size : 0x0000000000039000 -228 KB
IRAM Size : 0x0000000180000000 -6 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 90014A68433861503E030BD4C488B525 - hC8aP>

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Vendor : OPPO
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6771_18531-user 9 PPR1.180610.011 eng.root.20191108.032104 release-keys
Security Patch : 2019-10-05
StorageType : mtp
Userdata State : Not Encrypted

-------------------------------------
Operation : Auto
Processing...
Safeformat Universal...[C002004B-]
Formatting Userdata... Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:07
BR
Dipendra Pathak

  Reply With Quote
Old 02-20-2021, 14:22   #1279 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
OPPO Realme C15 RMX2180 Pin Lock successfully Removed Flash Mode by Hydra Tool

OPPO Realme C15 RMX2180 Pin Lock successfully Removed Flash Mode by Hydra Tool




Screen Short:




Logs:


Quote:
Brand : OPPO Model : Realme C15 (RMX2180) Connection : Flash Mode

=====================================
Connection
-Please wait...
-Found...[COM5]

TPortConnection.Create...(COM5)..Opening...Ok

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 3F564ECBC580B26A2884141CFC2CC5CC
ERAM Size : 0x000000000003A000 -232 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 150100445836384D4209A676DCBF6747 - DX68MB

Reading GPT-EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Auto
Processing...
Safeformat Universal...[C002004B-]
Formatting Userdata... Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:10
BR
Dipendra Pathak

  Reply With Quote
Old 02-20-2021, 14:31   #1280 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Xiaomi Redmi Note 8 Pro (begonia) Android 10 FRP Reset by Hydra

Xiaomi Redmi Note 8 Pro (begonia) Android 10 FRP Reset by Hydra

Screen Short:



Logs:

Quote:
Brand : XIAOMI Model : Redmi Note 8 Pro (begonia) Connection : Flash Mode

=====================================
Connection
-Please wait...
-Connect Phone...
-Found...[COM49]

TPortConnection.Create...(COM49)..Opening...Ok

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0813MT6785[6785]
BROM HW_SW_VER : 8A00 CA00 0000 0000
getMTKPayloadExploit : 0813
#Executing Exploit..
#SUCCESS..

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0813MT6785[6785]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
SECURE VERSION : 05
BL VERSION : FE
BR Secured : E0

Preparing Download Agent..
DA : 6785.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2020-11-03.22:07_536568
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_begonia.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 2CCAE27306139D698BDAC3B771B22835
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x0000000180000000 -6 GB
UFS LU0 Size: 0x0000000000400000 -4 MB
UFS LU1 Size: 0x0000000000400000 -4 MB
UFS LU2 Size: 0x0000001DCB000000 -119,172 GB
UFS CID : I?KM2V8001CM-B707
UFS UNIQID : 00330062003500620033003500370064

DA Speed : high-speed
DA Speed : high-speed

Reading GPT-UFS [0x00008000] 130 Items

Reading System Info
Vendor : Xiaomi
ID : QP1A.190711.020
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : begonia-user 10 QP1A.190711.020 V12.0.2.0.QGGEUXM release-keys
Miui Ver : V12
Mod_device : begonia_eea_global
Display ID : QP1A.190711.020
Security Patch : 2020-09-01
StorageType : mtp
Userdata State : Not Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader....
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x05888000]1024 KB ->frp.bin...Ok
-nvdata[0x08188000]64 MB ->nvdata.bin...Ok
-persist[0x0E188000]70,469 MB ->persist.bin...Ok
-nvram[0x17580000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\__0813--10_QP1A.190711.020_190221133314
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 2CCAE27306139D698BDAC3B771B22835
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x0000000180000000 -6 GB
UFS LU0 Size: 0x0000000000400000 -4 MB
UFS LU1 Size: 0x0000000000400000 -4 MB
UFS LU2 Size: 0x0000001DCB000000 -119,172 GB
UFS CID : I?KM2V8001CM-B707
UFS UNIQID : 00330062003500620033003500370064

Reading GPT-UFS [0x00008000] 130 Items


Reading System Info
Vendor : Xiaomi
ID : QP1A.190711.020
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : begonia-user 10 QP1A.190711.020 V12.0.2.0.QGGEUXM release-keys
Miui Ver : V12
Mod_device : begonia_eea_global
Display ID : QP1A.190711.020
Security Patch : 2020-09-01
StorageType : mtp
Userdata State : Not Encrypted

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition...[C002002A-STATUS_SEC_IMG_TYPE_MISMATCH]
Erasing FRP Partition... Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:56
BR
Dipendra Pathak

  Reply With Quote
Old 02-20-2021, 14:41   #1281 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Xiaomi Redmi Note 9 (merlin) MTK Dead Port successfully fixed & flashed to give life

Xiaomi Redmi Note 9 (merlin) MTK Dead Port successfully fixed and flashed and give life to device by Hydra Tool

Logs:

Quote:
Brand : XIAOMI Model : Redmi Note 9 (merlin) Connection : Flash Mode

=====================================
How To Boot : Power off phone
* BROM Mode : Press VOL + or Press VOL -+
* Preloader Mode : Just Insert cable

Connection
-Please wait...
-Connect Phone...
-Found...[COM13]

TPortConnection.Create...(COM13)..Opening...Ok


Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0707MT6768[6768]
BROM HW_SW_VER : 8A00 CA00 0000 0000
getMTKPayloadExploit : 0707
#Executing Exploit..
#SUCCESS..

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0707MT6768[6768]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
SECURE VERSION : 05
BL VERSION : FE
BR Secured : E0

Preparing Download Agent..
DA : 6768.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2020/07/07.10:10_513994
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_merlin.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 4CE68BB6AABAE4C42FBE0C17086FF010
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58,242 GB
eMMC CID : 13014E53304A394A38101ADDD88C4727 - S0J9J8

DA Speed : high-speed
DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_merlin.bin
Creating Scatter file... C:\HydraTool\\Backup\Auto\__0707--__190221100233\MT6768_Android_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x05508000]1024 KB ->frp.bin...Ok
-nvdata[0x0C4A2000]64 MB ->nvdata.bin...Ok
-persist[0x104A2000]48 MB ->persist.bin...Ok
-nvram[0x19F80000]64 MB ->nvram.bin...Ok
Done!!!
C:\HydraTool\\Backup\Auto\__0707--__190221100233
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 4CE68BB6AABAE4C42FBE0C17086FF010
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58,242 GB
eMMC CID : 13014E53304A394A38101ADDD88C4727 - S0J9J8

Reading GPT-EMMC [0x00008000] 130 Items

Flashing Selected Partitions....
- preloader[preloader_merlin.bin] 512 KB Skipped
- recovery[recovery.img] 64 MB Flash -> = Ok
- vbmeta[vbmeta.img] 8 MB Flash -> = Ok
- vbmeta_system[vbmeta_system.img] 8 MB Flash ->= Ok
- vbmeta_vendor[vbmeta_vendor.img] 8 MB Flash ->= Ok
- efuse[efuse.img] 512 KB Flash -> = Ok
- logo[logo.bin] 8 MB Flash -> = Ok
- md1img[md1img-verified.img] 128 MB Flash ->= Ok
- spmfw[spmfw-verified.img] 1024 KB Flash ->= Ok
- scp1[scp-verified.img] 6 MB Flash -> = Ok
- scp2[scp-verified.img] 6 MB Flash -> = Ok
- sspm_1[sspm-verified.img] 1024 KB Flash ->= Ok
- sspm_2[sspm-verified.img] 1024 KB Flash ->= Ok
- lk[lk-verified.img] 2 MB Flash -> = Ok
- lk2[lk-verified.img] 2 MB Flash -> = Ok
- boot[boot.img] 64 MB Flash -> = Ok
- dtbo[dtbo-verified.img] 16 MB Flash -> = Ok
- tee1[tee-verified.img] 5 MB Flash -> = Ok
- tee2[tee-verified.img] 5 MB Flash -> = Ok
- exaid[exaid.img] 384 MB Flash -> = Ok
- cust[cust.img] 1024 MB Flash -> = Ok
- super[super.img] 7 GB Flash -> = Ok
- cache[cache.img] 432 MB Flash -> = Ok
- userdata[userdata.img] 3 GB Flash -> = Ok

TPortConnection.Destroy.....Closing...Ok..
=====================================

Elapsed Time : 00:02:33
BR
Dipendra Pathak

  Reply With Quote
Old 02-21-2021, 07:57   #1282 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Huawei MD-LX1F (Y6 2019) FRP successfully removed by Hydra Tool

Huawei MD-LX1F (Y6 2019) FRP successfully removed by Hydra Tool

Screen Short:



Logs:

Quote:
Brand : HUAWEI Model : MRD-LX1F (Y6 2019) Connection : Flash Mode

=====================================
Connection
-Please wait...
-Connect Phone...
-Found...[COM9]

TPortConnection.Create...(COM9)..Opening...Ok

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0717MT6761[6761]
BROM HW_SW_VER : 8A00 CA01 0200 0000

Handshaking...

Identifying Hardware ID.....
BROM CPUID : 0717MT6761[6761]
BROM HW_SW_VER : 8A00 CA01 0200 0000
FUSEID : 00000000
SECURE VERSION : 05
BL VERSION : FE
BR Secured : E5[SBC+SDA+SEL]

Security Authorization....
Sending[Huawei_auth_sv5_.auth] Accepted

Preparing Download Agent..
DA : Huawei_6761_8A00CA0000000000_00001000_00030000.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2018/10/18.17:38_452898
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_k61v1_64_mexico.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 5461A70E7A696712447787507EBD0B57
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 150100514436334D4201C7899AFE46A9 - QD63MB

DA Speed : high-speed
DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info
ERROR reading system image [corrupted/erased]

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_k61v1_64_mexico.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\__0717--__200221003622\MT6761_Android_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x00108000]1024 KB ->frp.bin...Ok
-nvdata[0x00A08000]16 MB ->nvdata.bin...Ok
-persist[0x03800000]8 MB ->persist.bin...Ok
-nvram[0x04400000]5 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\__0717--__200221003622
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 5461A70E7A696712447787507EBD0B57
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 150100514436334D4201C7899AFE46A9 - QD63MB

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
ERROR reading system image [corrupted/erased]

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition...[C002002A-STATUS_SEC_IMG_TYPE_MISMATCH]
Erasing FRP Partition... Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:40
BR
Dipendra Pathak

  Reply With Quote
Old 02-21-2021, 07:59   #1283 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Lenevo K8 Note formatting user data successfully done by Hydra Tool

Lenevo K8 Note formatting user data successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
Brand : LENOVO Model : K8 Note Connection : Flash Mode

=====================================
Connection
-Please wait...
-Connect Phone...
-Found...
-PreLoader...[COM4]

TPortConnection.Create...(COM4)..Opening...Ok

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0279MT6797[6797]
BROM HW_SW_VER : 8A00 CA01 0000 0000

Handshaking...

Identifying Hardware ID.....
BROM CPUID : 0279MT6797[6797]
BROM HW_SW_VER : 8A00 CA01 0000 0000
SECURE VERSION : FF
BL VERSION : 02
BR Secured : 01

Preparing Download Agent..
DA : [Not Exist]
Trying Default 6797_SP.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.00.00
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : preloader

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 8A5D45E1F9AC68A00E2BCF1CD6C6F7FE
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 45010044463430363401ABCDDF225441 - DF4064

DA Speed : high-speed
DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info
Brand : lenovo
Vendor : lenovo
Model : Lenovo K8 Note
ID : OMB27.43-68
SDK : 26
Release : 8.0.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : manning_retail-user 8.0.0 OMB27.43-68 74 release-keys
Device : manning
Display ID : OMB27.43-68
Security Patch : 2018-11-05
Platform : mt6797
FRPPST : /dev/block/platform/mtk-msdc.0/11230000.msdc0/by-name/frp
Fingerprint : lenovo/manning_retail/manning:8.0.0/OMB27.43-68/74:user/release-keys
StorageType : mtp
Userdata State : Not Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_manning.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\lenovo_Lenovo K8 Note_0279-mt6797-8.0.0_OMB27.43-68_200221194039\MT6797_Android_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x01A88000]1024 KB ->frp.bin...Ok
-nvdata[0x02388000]32 MB ->nvdata.bin...Ok
-nvram[0x0AB00000]5 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\lenovo_Lenovo K8 Note_0279-mt6797-8.0.0_OMB27.43-68_200221194039
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 8A5D45E1F9AC68A00E2BCF1CD6C6F7FE
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 45010044463430363401ABCDDF225441 - DF4064

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Brand : lenovo
Vendor : lenovo
Model : Lenovo K8 Note
ID : OMB27.43-68
SDK : 26
Release : 8.0.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : manning_retail-user 8.0.0 OMB27.43-68 74 release-keys
Device : manning
Display ID : OMB27.43-68
Security Patch : 2018-11-05
Platform : mt6797
FRPPST : /dev/block/platform/mtk-msdc.0/11230000.msdc0/by-name/frp
Fingerprint : lenovo/manning_retail/manning:8.0.0/OMB27.43-68/74:user/release-keys
StorageType : mtp
Userdata State : Not Encrypted

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition...[C002002A-STATUS_SEC_IMG_TYPE_MISMATCH]
Erasing FRP Partition...
Safeformat Universal...[C0010007-STATUS_INSUFFICIENT_BUFFER]
Formatting Userdata... Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:57
BR
Dipendra Pathak

  Reply With Quote
Old 02-21-2021, 08:07   #1284 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Vivo Y91i (1820) Formatting user data successfully done by Hydra Tool

Vivo Y91i (1820) Formatting user data successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
Brand : VIVO Model : Y91i (1820) Connection : Flash Mode

=====================================
Connection
-Please wait...
-Connect Phone...
-Found...
-PreLoader...[COM7]

TPortConnection.Create...(COM7)..Opening...Ok

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0766 (0000)MT6765[6765]
BROM HW_SW_VER : 8A00 CA00 0000 0000

Handshaking...

Identifying Hardware ID.....
BROM CPUID : 0766 (0000)MT6765[6765]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
SECURE VERSION : FF
BL VERSION : 03
BR Secured : 05
NORMAL BOOT

Preparing Download Agent..
DA : 6765_SWSEC_9FAA6CBA20.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2018/03/20.21:08_402229+403250
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : preloader

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 7B7B46445A1872733AA9F8CD629F41ED
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000020000000 -512 MB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 90014A68423861503E0397AB429AB6B3 - hB8aP>

DA Speed : high-speed
DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info
Brand : vivo
Vendor : vivo
Model : vivo 1820
ID : O11019
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_k62v1_64_bsp-user 8.1.0 O11019 1589614643 release-keys
Device : PD1818HF_EX
Display ID : O11019 release-keys
Security Patch : 2020-04-05
Platform : =MTK6765
Fingerprint : vivo/1820/1820:8.1.0/O11019/1589614643:user/release-keys
StorageType : mtp
Userdata State : Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_k62v1_64_bsp.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\vivo_vivo 1820_0766-=MTK6765-8.1.0_O11019 release-keys_200221173352\MT6765_Android_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x05588000]1024 KB ->frp.bin...Ok
-nvdata[0x07688000]64 MB ->nvdata.bin...Ok
-persist[0x18800000]48 MB ->persist.bin...Ok
-nvram[0x25680000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\vivo_vivo 1820_0766-=MTK6765-8.1.0_O11019 release-keys_200221173352
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 7B7B46445A1872733AA9F8CD629F41ED
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000020000000 -512 MB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 90014A68423861503E0397AB429AB6B3 - hB8aP>

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Brand : vivo
Vendor : vivo
Model : vivo 1820
ID : O11019
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_k62v1_64_bsp-user 8.1.0 O11019 1589614643 release-keys
Device : PD1818HF_EX
Display ID : O11019 release-keys
Security Patch : 2020-04-05
Platform : =MTK6765
Fingerprint : vivo/1820/1820:8.1.0/O11019/1589614643:user/release-keys
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Auto
Processing...
Formatting Userdata... Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:35
BR
Dipendra Pathak

  Reply With Quote
Old 02-21-2021, 08:10   #1285 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Xiaomi Redmi Note 9 (merlin) Zero wipe FRP successfully done by Hydra Tool

Xiaomi Redmi Note 9 (merlin) Zero wipe FRP successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
Brand : XIAOMI Model : Redmi Note 9 (merlin) Connection : Flash Mode

=====================================
Connection
-Please wait...
-Found...
-PreLoader...[COM7]

TPortConnection.Create...(COM7)..Opening...Ok

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : FBD6C445899A68978FC39324250FB4F2
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
UFS LU0 Size: 0x0000000000000000 -0 Bytes
UFS LU1 Size: 0x0000000000000000 -0 Bytes
UFS LU2 Size: 0x0000000000000000 -0 Bytes
UFS CID :
UFS UNIQID :

Reading GPT-EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition... Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:06
BR
Dipendra Pathak

  Reply With Quote
Old 02-21-2021, 08:16   #1286 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Infinizx X622 (Hot S3X) flashing successfully done by Hydra Tool

Infinizx X622 (Hot S3X) flashing successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
Searching for Qualcomm 9008 Device...Found
FriendlyName :HS-USB Diagnostics 9008 (COM12)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&2dfffc1d&0&2#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/20/2017,2.1.2.2

Getting device info......
Serial No.: 0x1DB3C80C
MSM ID : 0x0004F0E1, MSM8937-Qualcomm Snapdragon 430
PBL Ver : 00000000
PK HASH : CC3153A80293939B90D02D3BF8B23E02
92E452FEF662C74998421ADAD42A380F

Firehose Loader[Infinix_8937.mbn]
SaharaBoot... Ok
Sending .....................Ok
Connecting to Firehose...
Ping... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 4062840326
Firmware Version : 1
Product Name : GD6BMB
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 61071360[29,121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok

Phone Information.....
Brand : Infinix
Vendor : INFINIX MOBILITY LIMITED
Model : Infinix X622
ID : OPM1.171019.019
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : QL1818-user 8.1.0 OPM1.171019.019 BCDE-190425V64 release-keys
Device : Infinix-X622
Display ID : X622-QL1818BCDE-O-190425V64
Security Patch : 2019-05-01
Emmc_size : 16GB
Fingerprint : Infinix/QL1818/Infinix-X622:8.1.0/OPM1.171019.019/BCDE-190425V64:user/release-keys

Reading GPT[3]
Drive [0] 52 Items
Drive [1] 0 Items
Drive [2] 0 Items


Backup Security partitions...
Reading Security Items....
> modemst1
> modemst2
> fsg
C:\Hydra Tool\Backup\Security_Backup\Infinix X622__8.1.0_Security_022021163227.sec
Backup Security Success....

----------------------------
Flashing Selected Partitions....
- modem(0)[NON-HLOS.bin] Ok
- sbl1(0)[sbl1.mbn] Ok
- sbl1bak(0)[sbl1.mbn] Ok
- rpm(0)[rpm.mbn] Ok
- rpmbak(0)[rpm.mbn] Ok
- tz(0)[tz.mbn] Ok
- tzbak(0)[tz.mbn] Ok
- devcfg(0)[devcfg.mbn] Ok
- devcfgbak(0)[devcfg.mbn] Ok
- dsp(0)[adspso.bin] Ok
- modemst1(0)[st1] Skipped
- modemst2(0)[st2] Skipped
- DDR(0)[DDR.bin] Ok
- fsgall(0)[fsall_image.tar.gz.mbn.img] Ok
- aboot(0)[emmc_appsboot.mbn] Ok
- abootbak(0)[emmc_appsboot.mbn] Ok
- boot(0)[boot.img] Ok
- recovery(0)[recovery.img] Ok
- devinfo(0)[devinfo.bin] Ok
- persist(0)[persist_1.img] Skipped
- config(0)[config.bin] Skipped
- mdtp(0)[mdtp.img] Ok
- cmnlib(0)[cmnlib_30.mbn] Ok
- cmnlibbak(0)[cmnlib_30.mbn] Ok
- cmnlib64(0)[cmnlib64_30.mbn] Ok
- cmnlib64bak(0)[cmnlib64_30.mbn] Ok
- keymaster(0)[keymaster64.mbn] Ok
- keymasterbak(0)[keymaster64.mbn] Ok
- oem(0)[oem.bin] Ok
- cache(0)[cache_1.img] Ok
- cache(0)[cache_2.img] Ok
- cache(0)[cache_3.img] Ok
- splash(0)[splash.img] Ok
- vendor(0)[vendor_1.img] Ok
- vendor(0)[vendor_2.img] Ok
- vendor(0)[vendor_3.img] Ok
- vendor(0)[vendor_4.img] Ok
- vendor(0)[vendor_5.img] Ok
- vendor(0)[vendor_6.img] Ok
- vendor(0)[vendor_7.img] Ok
- vendor(0)[vendor_8.img] Ok
- vendor(0)[vendor_9.img] Ok
- vendor(0)[vendor_10.img] Ok
- vendor(0)[vendor_11.img] Ok
- vendor(0)[vendor_12.img] Ok
- vendor(0)[vendor_13.img] Ok
- system(0)[system_1.img] Ok
- system(0)[system_2.img] Ok
- system(0)[system_3.img] Ok
- system(0)[system_4.img] Ok
- system(0)[system_5.img] Ok
- system(0)[system_6.img] Ok
- system(0)[system_7.img] Ok
- system(0)[system_8.img] Ok
- system(0)[system_9.img] Ok
- system(0)[system_10.img] Ok
- system(0)[system_11.img] Ok
- system(0)[system_12.img] Ok
- system(0)[system_13.img] Ok
- system(0)[system_14.img] Ok
- system(0)[system_15.img] Ok
- system(0)[system_16.img] Ok
- system(0)[system_17.img] Ok
- system(0)[system_18.img] Ok
- system(0)[system_19.img] Ok
- system(0)[system_20.img] Ok
- system(0)[system_21.img] Ok
- system(0)[system_22.img] Ok
- system(0)[system_23.img] Ok
- system(0)[system_24.img] Ok
- system(0)[system_25.img] Ok
- system(0)[system_26.img] Ok
- system(0)[system_27.img] Ok
- system(0)[system_28.img] Ok
- system(0)[system_29.img] Ok
- system(0)[system_30.img] Ok
- system(0)[system_31.img] Ok
- system(0)[system_32.img] Ok
- system(0)[system_33.img] Ok
- system(0)[system_34.img] Ok
- system(0)[system_35.img] Ok
- system(0)[system_36.img] Ok
- system(0)[system_37.img] Ok
- system(0)[system_38.img] Ok
- system(0)[system_39.img] Ok
- system(0)[system_40.img] Ok
- system(0)[system_41.img] Ok
- system(0)[system_42.img] Ok
- system(0)[system_43.img] Ok
- system(0)[system_44.img] Ok
- system(0)[system_45.img] Ok
- system(0)[system_46.img] Ok
- system(0)[system_47.img] Ok
- system(0)[system_48.img] Ok
- userdata(0)[userdata_1.img] Ok
- userdata(0)[userdata_2.img] Ok
- userdata(0)[userdata_3.img] Ok
- userdata(0)[userdata_4.img] Ok
- userdata(0)[userdata_5.img] Ok
- userdata(0)[userdata_6.img] Ok
- userdata(0)[userdata_7.img] Ok
- userdata(0)[userdata_8.img] Ok
- userdata(0)[userdata_9.img] Ok
- userdata(0)[userdata_10.img] Ok
- userdata(0)[userdata_11.img] Ok
- userdata(0)[userdata_12.img] Ok
- userdata(0)[userdata_13.img] Ok
- userdata(0)[userdata_14.img] Ok
- userdata(0)[userdata_15.img] Ok
- userdata(0)[userdata_16.img] Ok
- userdata(0)[userdata_17.img] Ok
- userdata(0)[userdata_18.img] Ok
- userdata(0)[userdata_19.img] Ok
- userdata(0)[userdata_20.img] Ok
- userdata(0)[userdata_21.img] Ok
- userdata(0)[userdata_22.img] Ok
- userdata(0)[userdata_23.img] Ok
- userdata(0)[userdata_24.img] Ok
- userdata(0)[userdata_25.img] Ok
- userdata(0)[userdata_26.img] Ok
- userdata(0)[userdata_27.img] Ok
- userdata(0)[userdata_28.img] Ok
- userdata(0)[userdata_29.img] Ok
- userdata(0)[userdata_30.img] Ok
- userdata(0)[userdata_31.img] Ok
- userdata(0)[userdata_32.img] Ok
- userdata(0)[userdata_33.img] Ok
- userdata(0)[userdata_34.img] Ok
- userdata(0)[userdata_35.img] Ok
- PrimaryGPT(0)[gpt_main0.bin] Ok

Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-33.] OK
0 [CRC32(2,6656)] OK
0 [CRC32(NUM_DISK_SECTORS-33.,6656)] OK
0 [0] OK
0 [CRC32(1,92)] OK
0 [0] OK
0 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 0
Set bootable storage drive 0 Ok

Rebooting Phone.... Ok

Elapsed Time : 00:05:18
BR
Dipendra Pathak

  Reply With Quote
Old 02-21-2021, 08:21   #1287 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
A83 u2 Cellphone successfully flashed by Hydra tool

A83 u2 Cellphone successfully flashed by Hydra tool

Screen Short:



Logs:

Quote:
Brand : AUTO Model : AUTO Connection : Flash Mode

=====================================
How To Boot : Power off phone
* BROM Mode : Press VOL + or Press VOL -+
* Preloader Mode : Just Insert cable

Connection
-Please wait...
-Connect Phone...
-Found...
-PreLoader...[COM7]

TPortConnection.Create...(COM7)..Opening...Ok


Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 6580MT6580[6580]
BROM HW_SW_VER : 8A00 CA00 0000 0000

Handshaking...

Identifying Hardware ID.....
BROM CPUID : 6580MT6580[6580]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 40001002
FUSEID : 40001002
SECURE VERSION : FF
BL VERSION : 01
BR Secured : 00

Preparing Download Agent..
DA : 6580.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2020-11-03.22:07_536568
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : Old - eMMC
0000000000000000000000000000
PRMMCCID : 45010053454D3034473A039720CE12F7
Init Configuration
Running DA 4.2 on BBID : 0x9C Ok

Initializing Loader [2]
Sending Loader [2] Accepted
Reading Flashchip data....
eMMC BOOT1 : 0x0000000000200000 -2 MB
eMMC BOOT2 : 0x0000000000200000 -2 MB
eMMC RPMB : 0x0000000000200000 -2 MB
eMMC USER : 0x00000000EC000000 -3.688 GB
ERAM Size : 0x0000000020000000 -512 MB
IRAM Size : 0x0000000000020000 -128 KB
UNICAL RID : 32C3DDED5C877A27BD726E899A03E82F
eMMC CID : 5300014534304D4597033A47F712CE20
Change to HIGH SPEED...
5A
Connection
-Please wait...
-Found...[COM14]


Reading Partition Table
SIZE[0x00000738] 21 Items > Done

Reading System Info
Brand : A83
Vendor : A83
Model : U2
ID : LMY47I
SDK : 22
Release : 5.1
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Description : full_yuanda6580_weg_l-user 5.1 LMY47I 1531133596 release-keys
Device : A83
Board : MTK
Display ID : C5P_80L_WEG_3GW_B15_EMMC_A83_20180709.185445
Platform : mt6580
FRPPST : /dev/block/platform/mtk-msdc.0/by-name/frp
Fingerprint : alps/full_yuanda6580_weg_l/yuanda6580_weg_l:5.1/LMY47I/1531133596:user/release-keys
StorageType : mtp,mass_storage
Userdata State : Not Encrypted
MTK Phone Loader is NOW RUNNING.


Reading Partition Table
SIZE[0x00000738] 21 Items > Done

Preparing to flash selected partitions
Flashing....
preloader(preloader_yuanda6580_weg_l.bin) Ok
lk(lk.bin)245.047 KB Ok
boot(boot.img)6.398 MB Ok
recovery(recovery.img)7.07 MB Ok
logo(logo.bin)1.247 MB Ok
secro(secro.img)132 KB Ok
system(system.img)1.027 GB Ok
cache(cache.img)6.102 MB Ok
userdata(userdata.img)30.633 MB Ok
Done!!!!

Rebooting Device [Reboot To Normal]
Reboot Done!!

TPortConnection.Destroy.....Closing...Ok..
=====================================

Elapsed Time : 00:02:14
BR
Dipendra Pathak

  Reply With Quote
Old 02-21-2021, 08:24   #1288 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Oppo A57 (CPH1701) formatted user data succussfully done by Hydra Tool

Oppo A57 (CPH1701) formatted user data succussfully done by Hydra Tool

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : OPPO Model : A57 (CPH1701) Storage : Auto
Loader: Oppo_A57_8940.mbn
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM14)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&37162be&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/02/2017,2.1.2.7

Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 157534226
Firmware Version : 7
Product Name : RX1BMB
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 61071360[29.121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok

Phone Information.....
Brand : OPPO
Vendor : OPPO
Model : CPH1701
ID : MMB29M
SDK : 23
Release : 6.0.1
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : msm8937_64-user 6.0.1 MMB29M eng.root.20180806.181819 release-keys
Device : CPH1701
Board : QC_Reference_Phone
Display ID : CPH1701EX_11_A.34_180806
Security Patch : 2018-05-05
Emmc_size : 16GB
Platform : msm8937
FRPPST : /dev/block/bootdevice/by-name/config

Reading GPT[3]
Drive [0] 56 Items
Drive [1] 0 Items
Drive [2] 4 Items

Formatting Userdata...
Method :
Auto
Processing...
- Formatting Userdata
Executing ...
- Formatting Userdata [Safe method] OkOkOk

Elapsed Time : 00:00:07
BR
Dipendra Pathak

  Reply With Quote
Old 02-21-2021, 08:35   #1289 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Vivo Y11 (1906) Successfully Flashed by Hydra Tool

Vivo Y11 (1906) Successfully Flashed by Hydra Tool

Screen Short:



Logs:

Quote:
Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM49)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&28e4b4e4&0&1#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :12/28/2015,2.00.05.00

Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 545220615
Firmware Version : 8
Product Name : GD6BMB
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 61071360[29.121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok

Phone Information......
Brand : vivo
Vendor : vivo
Model : vivo 1906
ID : PKQ1.190616.001
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : msm8937_64-user 9 PKQ1.190616.001 compiler01140016 release-keys
Device : PD1930F_EX
Display ID : PKQ1.190616.001 release-keys
Security Patch : 2021-01-01
Emmc_size : 16GB
Platform : =SDM439
Fingerprint : vivo/1906/1906:9/PKQ1.190616.001/compiler01140016:user/release-keys

Reading GPT[3]
Drive [0] 60 Items
Drive [1] 0 Items
Drive [2] 0 Items


Backup Security partitions...
Reading Security Items....
> modemst1
> modemst2
> fsg
C:\Hydra Tool\Backup\Security_Backup\vivo 1906__9_Security_022021133744.sec
Backup Security Success....

----------------------------
Flashing Selected Partitions....
- boot(0)[boot.img] **WARNING Unauthorized tag '' Failed
Operation : Setbootablestoragedrive: Drive 0
Set bootable storage drive 0 Ok

Rebooting Phone.... Ok

Elapsed Time : 00:00:08
BR
Dipendra Pathak

  Reply With Quote
Old 02-21-2021, 08:40   #1290 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Xiaomi Mi A1 (Tissot) zero wipe successfully removed by Hydra Tool

Xiaomi Mi A1 (Tissot) zero wipe successfully removed by Hydra Tool

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : XIAOMI Model : Mi A1 (Tissot) Storage : Auto
Loader: Mi_8953.mbn
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM6)
SymbolicName :\??\USB#VID_05C6&PID_9008#6&1f283aba&0&5#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/02/2017,2.1.2.7

Getting device info......
Serial No.: 0xFD092D91
MSM ID : 0x000460E1, MSM8953-Qualcomm Snapdragon 625
PBL Ver : 00000000
PK HASH : 57158EAF1814D78FD2B3105ECE4DB18A
817A08AC664A5782A925F3FF8403D39A

Firehose Loader[Mi_8953.mbn]
SaharaBoot... Ok
Sending ..................Ok
Connecting to Firehose...
Ping... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8953
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 1004654933
Firmware Version : 162
Product Name : HCG8a4
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 122142720[58.242 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok

Phone Information......
Brand : xiaomi
Vendor : Xiaomi
Model : Mi A1
ID : PKQ1.180917.001
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : tissot-user 9 PKQ1.180917.001 V10.0.24.0.PDHMIXM release-keys
Device : tissot_sprout
Display ID : PKQ1.180917.001.V10.0.24.0.PDHMIXM
Security Patch : 2020-08-01
Emmc_size : 16GB
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : xiaomi/tissot/tissot_sprout:9/PKQ1.180917.001/V10.0.24.0.PDHMIXM:user/release-keys

Reading GPT[3]
Drive [0] 52 Items
Drive [1] 0 Items
Drive [2] 0 Items

Formatting Userdata...
Method :
Zero Wipe
Processing...
- Formatting Userdata [Zero Wipe] OkOk

Elapsed Time : 00:00:06
BR
Dipendra Pathak

  Reply With Quote
Reply

Bookmarks


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


 



All times are GMT +1. The time now is 14:35.



Powered by Searchlight © 2024 Axivo Inc.
vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2024 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2023 -
Page generated in 0.65355 seconds with 9 queries

SEO by vBSEO