GSM-Forum

GSM-Forum (https://forum.gsmhosting.com/vbb/)
-   HYDRA TOOL (https://forum.gsmhosting.com/vbb/f1065/)
-   -   ★★★ Post All Successfully Repaired Phones by Hydra Tool ★★★ (https://forum.gsmhosting.com/vbb/f1065/post-all-successfully-repaired-phones-hydra-tool-2506626/)

bulutiletisim 05-05-2022 12:28

n920c frp reset ok new method 2022
 
https://i.ibb.co/MRbtn9p/Screenshot-...022-142410.jpg

sky73 05-10-2022 17:46

redmi 6a flash done

Code:


Searching for MTK Device...Found
 Port Identification :Flashmode BROM
 FriendlyName :MediaTek USB Port_V1633 (COM10)
 Device      :5&15c311e1&0&4
 SymbolicName :\??\USB#VID_0E8D&PID_0003#5&15c311e1&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver  :01/22/2015,3.0.1504.0

Trying to Open Port [COM10] Ok
Reading Partition Table ..
ERAM Size: 0x0000000000038000-224 KB
IRAM Size: 0x0000000080000000-2 GB
EMMC Boot1 Size: 0x0000000000400000-4 MB
EMMC Boot2 Size: 0x0000000000400000-4 MB
EMMC RPMB Size : 0x0000000000400000-4 MB
EMMC USER Size : 0x00000003AB400000-14.676 GB
EMMC CID      :  90014A484147346132A5C7AB4481B5D5 - HAG4a2
HW-CODE        : 0x766
HWSUB-CODE      : 0x8A00
HW-VERSION      : 0xCA00
SW-VERSION      : 0x0
CHIP-EVOLUTION  : 0x0
DA-VERSION      :  1.0
Partition Count : 43
--------------- Reading build.prop content ---------------
Unable to read system info..
--------------- end of build.prop content ---------------
IMEI1 : F0DBF69A6A36089
IMEI2 : F0DBF69A6A36089
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------

Write Selected Partitions..
 -preloader .....Ok
 -recovery .....Ok
 -efuse .....Ok
 -md1img .....Ok
 -spmfw .....Ok
 -scp1 .....Ok
 -scp2 .....Ok
 -sspm_1 .....Ok
 -sspm_2 .....Ok
 -vbmeta .....Ok
 -lk .....Ok
 -lk2 .....Ok
 -boot .....Ok
 -logo .....Ok
 -odmdtbo .....Ok
 -cust .....Ok
 -tee1 .....Ok
 -tee2 .....Ok
 -vendor .....Ok
 -system .....Ok
 -cache .....Ok
 -userdata .....Ok
Rebooting Device...
Reboot Option : OperationDone
Rebooting Operation Done!!!!
Done Writing...
=====================================

Elapsed Time : 00:02:06


Abul Basher 05-15-2022 16:38

vivo y12s frp pinlock done
 
vivo y12s frp pinlock done

Code:

Hydra MediaTeK Tool  Ver 1.0.4.64 @parthona
Windows 10 (Version 21H2, OS Build 19044.1706, 64-bit Edition)
Intel(R) Core(TM) i5-4310U CPU @ 2.00GHz
Intel(R) HD Graphics Family
Ram Installed : 8 GB
Windows Access Right : Admin
Software Run As Admnistrator

******* Dongle Info *******
Version    : Hydra Tool v 1.2
Serial    : 210300013303
Initialize : OKAY
Status    : Activated
Life      : 0 [0-0-0-0-0]

Searching for MTK Device...Found
 Port Identification :Flashmode Preloader
 FriendlyName :MediaTek PreLoader USB VCOM_V1633 (Android) (COM6)
 Device      :6&124cbd84&0&3
 SymbolicName :\??\USB#VID_0E8D&PID_2000#6&124cbd84&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver  :01/22/2015,3.0.1504.0

Trying to Open Port [COM6] Ok
Handshaking...Ok
HwCode    : 0766 {MT6765/MT8768t}
Hwver    : 0000
 Target config : 05
 SBC          : 01 (True)
 SLA          : 00 (False)
 DAA          : 04 (True)
 SWJTAG        : 04 (True)
 EPP          : 00 (False)
 CERT          : 00 (False)
 MEMREAD      : 00 (False)
 MEMWRITE      : 00 (False)
 CMD_C8        : 00 (False)
Device Connection : Preloader
HW Subcode: 8A00
HW Ver    : CA00
SW Ver    : 0000
ME_ID    : 5081B602D29D70A8C0392C67F664287A
Crashing da...
Uploading data

Trying to Open Port [COM6] Ok
Handshaking...Ok
Device Connection : Preloader
Crashing da...


Trying to Open Port [COM6] Ok
Handshaking...
Device Connection : Preloader
Crashing da...
Uploading data

Trying to Open Port [COM6] Ok
Handshaking...Ok
Device Connection : Preloader
Preloader still in preloader mode...
Device Connection : Preloader
Download Agent...
DA :6765_9FAA6CBA20.bin
Uploading data
Successfully uploaded stage 1, jumping ..
Jumping to 0x00200000
Successfully received DA sync
CONNECTION_AGENT : preloader
Uploading stage 2...
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
ERAM Size: 0x0000000000040000-256 KB
IRAM Size: 0x0000000030000000-768 MB
EMMC Boot1 Size: 0x0000000000400000-4 MB
EMMC Boot2 Size: 0x0000000000400000-4 MB
EMMC RPMB Size : 0x0000000000400000-4 MB
EMMC USER Size : 0x0000000747C00000-29.121 GB
EMMC CID      :  150100444436384D42026864C270B68F - DD68MB
HW-CODE        : 0x766
HWSUB-CODE      : 0x8A00
HW-VERSION      : 0xCA00
SW-VERSION      : 0x0
CHIP-EVOLUTION  : 0x0
DA-VERSION      :  1.0
 *DA Extensions failed to enable
Reading Partition Table ..
ERAM Size: 0x0000000000040000-256 KB
IRAM Size: 0x0000000030000000-768 MB
EMMC Boot1 Size: 0x0000000000400000-4 MB
EMMC Boot2 Size: 0x0000000000400000-4 MB
EMMC RPMB Size : 0x0000000000400000-4 MB
EMMC USER Size : 0x0000000747C00000-29.121 GB
EMMC CID      :  150100444436384D42026864C270B68F - DD68MB
HW-CODE        : 0x766
HWSUB-CODE      : 0x8A00
HW-VERSION      : 0xCA00
SW-VERSION      : 0x0
CHIP-EVOLUTION  : 0x0
DA-VERSION      :  1.0
Partition Count : 49
--------------- Reading build.prop content ---------------
  ID            : RP1A.200720.012
  SDK            : 30
  Release        : 11
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale        : en-US
  Description    : full_k65v1_64_bsp-user 11 RP1A.200720.012 eng.compil.20220307.105042 release-keys
  Display ID    : RP1A.200720.012 release-keys
  Security Patch : 2022-03-01
  StorageType    : mtp
--------------- end of build.prop content ---------------
IMEI1 : 869809051630238
IMEI2 : 869809051630220
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------
Backing up Security..
 -preloader .....Ok
 -pgpt .....Ok
 -nvram .....Ok
 -nvdata .....Ok
 -frp .....Ok
 -protect1 .....Ok
 -protect2 .....Ok
 -persist .....Ok
 -proinfo .....Ok
Backup Done!!!
Reading Partition Table ..
ERAM Size: 0x0000000000040000-256 KB
IRAM Size: 0x0000000030000000-768 MB
EMMC Boot1 Size: 0x0000000000400000-4 MB
EMMC Boot2 Size: 0x0000000000400000-4 MB
EMMC RPMB Size : 0x0000000000400000-4 MB
EMMC USER Size : 0x0000000747C00000-29.121 GB
EMMC CID      :  150100444436384D42026864C270B68F - DD68MB
HW-CODE        : 0x766
HWSUB-CODE      : 0x8A00
HW-VERSION      : 0xCA00
SW-VERSION      : 0x0
CHIP-EVOLUTION  : 0x0
DA-VERSION      :  1.0
Partition Count : 49
--------------- Reading build.prop content ---------------
  ID            : RP1A.200720.012
  SDK            : 30
  Release        : 11
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale        : en-US
  Description    : full_k65v1_64_bsp-user 11 RP1A.200720.012 eng.compil.20220307.105042 release-keys
  Display ID    : RP1A.200720.012 release-keys
  Security Patch : 2022-03-01
  StorageType    : mtp
--------------- end of build.prop content ---------------
------------------------------
  Removing FRP Flash Mode.. 
------------------------------
Operation : Uni_FMFRP_Erase
Status:  Ok
Rebooting Device...
Reboot Option : OperationDone
Rebooting Operation Done!!!!


xerraco 05-18-2022 04:06

Vivo Y11 password
 
Forced Erase

Code:


******* Dongle Info *******
Version    : Hydra Tool v 1.2
Serial    : 201100009512
Initialize : OKAY
Status    : Activated
Life      : 0 [0-0-0-0-0]

PreOperation Configuration
 Brand : VIVO Model : Y11 (1906) Storage : Auto
 Loader: 000BF0E100000000_60ba997fef6da9f0_d8fbe714_QUALCOMM_VIVO_wut_peek_8937.fhprg
 Port  : Auto

 Searching for Qualcomm 9008 Device...Found
 FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM7)
 SymbolicName :\??\USB#VID_05C6&PID_9008#5&1cbdcd65&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver  :07/29/2015,1.03.00.00

Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
 MemoryName : eMMC
 MaxPayloadSizeToTargetInBytes : 1048576
 MaxPayloadSizeToTargetInBytesSupported : 1048576
 MaxPayloadSizeFromTargetInBytes : 4096
 MaxXMLSizeInBytes : 4096
 TargetName : 8937
 Version : 1

*** STORAGE DEVICE INFO ***
Memory Type        : eMMC
Block Size in Bytes : 512
Page Size          : 512
Manufacturer ID    : 21
Serial Number      : 1806998526
Firmware Version    : 8
Product Name        : GD6BMB
Physical Partitions : 3
Total Logical Blocks:
          Drive [0]  61071360[29.121 GB]
          Drive [1]  8192[4 MB]
          Drive [2]  8192[4 MB]

Protocol : Universal
Running : Ok
Reading GPT[3]
          Drive [0] 60 Items
          Drive [1] 0 Items
          Drive [2] 0 Items

 
Phone Information......
  ID            : RP1A.200720.012
  SDK            : 30
  Release        : 11
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale        : en-US
  Security Patch : 2021-06-01
  Emmc_size      : 16GB
  Platform      : =SDM439

Processing Forced Erase....
 - Removing FRP [Zero Wipe] **WARNING  Unauthorized tag '' <?xml version="1.0" encoding="UTF-8" ?><data><response value="NAK" /></data>Failed
 - Removing FRP [Auto] Ok
 - Forced Erase Userdata
Action Result : Ok

Elapsed Time : 00:00:13

Br,
xerraco

bulutiletisim 05-21-2022 11:00

huawei p30 lite (mra-lx1) frp reset ok via factory method
 
https://i.ibb.co/W6hZd96/Screenshot-...022-125838.jpg

xerraco 05-23-2022 09:27

Vivo Y55 logo
 
Hydra Qualcomm Tool Ver 1.0.3 Build 13
Windows 10 (Version 10.0, Build 19044, 64-bit Edition)
Intel(R) Core(TM) i3-4005U CPU @ 1.70GHz
Intel(R) HD Graphics Family
Ram Installed : 4 GB
Windows Access Right : Admin
Software Run As Admnistrator

******* Dongle Info *******
Version : Hydra Tool v 1.2
Serial : 20110012345
Initialize : OKAY
Status : Activated
Life : 0 [0-0-0-0-0]

PreOperation Configuration
Brand : VIVO Model : Y53 Storage : Auto
Loader: 000560E100000000_60ba997fef6da9f0_203cb924_QUALCOM M_VIVO_peek_8917.fhprg
Port : Auto

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM7)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&1cbdcd65&0&3#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :07/29/2015,1.03.00.00

Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8917
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 3181757547
Firmware Version : 13
Product Name : RE1BMB
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 30535680[14.561 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok

Phone Information.....
Brand : vivo
Vendor : vivo
Model : vivo 1610
ID : MMB29M
SDK : 23
Release : 6.0.1
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-US
Description : msm8937_32-user 6.0.1 MMB29M eng.compiler.20190227.121058 release-keys
Device : PD1613BF_EX
Board : QC_Reference_Phone
Display ID : MMB29M release-keys
Security Patch : 2018-08-01
Emmc_size : 16GB
Platform : msm8937
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : vivo/1610/1610:6.0.1/MMB29M/compiler02271214:user/release-keys

Reading GPT[3]
Drive [0] 52 Items
Drive [1] 0 Items
Drive [2] 0 Items

Formatting Userdata...
Method :
Auto
Processing...
- Formatting Userdata
Executing ...
- Formatting Userdata [Safe Format - eMMc] OkOkOk

Elapsed Time : 00:00:05


Br,
xerraco

ceza031 05-23-2022 12:25

Redmi 9C İmei Repair One Click With bu Hydra
 
Redmi 9C İmei Repair One Click With bu Hydra

https://i.hizliresim.com/trjjnha.jpeg

Quote:

******* Dongle Info *******
Version : Hydra Tool v 1.2
Serial : ***********
Initialize : OKAY
Status : Activated
Life : 0 [0-0-0-0-0]


=====================================
***IMEI REPAIR FUNCTION****
Xiaomi 2nd IMEI
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port_V1633 (COM6)
Device :5&225b7e07&0&4
SymbolicName :\??\USB#VID_0E8D&PID_0003#5&225b7e07&0&4#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0

Trying to Open Port [COM6] Ok
Reading Partition Table ..
ERAM Size: 0x0000000000070000-448 KB
IRAM Size: 0x0000000100000000-4 GB
UFS FWVer : 0x00000000
UFS Blocksize : 0x0000000000001000-4 KB
UFS LU0 Size : 0x0000000000400000-4 MB
UFS LU1 Size : 0x0000000000400000-4 MB
UFS LU2 Size : 0x0000001DCB000000-119,172 GB
UFS ID : H9HQğ¯
UFS CID : AD014839485131354145434D42444152
HW-CODE : 0x989
HWSUB-CODE : 0x8A00
HW-VERSION : 0xCA00
SW-VERSION : 0x0
CHIP-EVOLUTION : 0x1
DA-VERSION : 1.0
Partition Count : 62
--------------- Reading build.prop content ---------------
IMEI1 : A1339D8********
IMEI2 : 40F9828********
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------
IMEI1 : FFFFFFFFFFFFFFF
IMEI2 : 351************
Rebooting Device...
Reboot Option : OperationDone
Rebooting Operation Done!!!!

Elapsed Time : 00:00:03

xerraco 05-26-2022 03:53

A015f frp
 
Hydra Qualcomm Tool Ver 1.0.3 Build 13
Windows 10 (Version 10.0, Build 19044, 64-bit Edition)
Intel(R) Core(TM) i3-4005U CPU @ 1.70GHz
Intel(R) HD Graphics Family
Ram Installed : 4 GB
Windows Access Right : Admin
Software Run As Admnistrator

******* Dongle Info *******
Version : Hydra Tool v 1.2
Serial : 2011000000000
Initialize : OKAY
Status : Activated
Life : 0 [0-0-0-0-0]

PreOperation Configuration
Brand : SAMSUNG Model : Galaxy A01 Storage : Auto
Loader: 000BF0E100200000_3cc959ac5b3364a4_2ead7cbd_SAMSUNG _SAMSUNG CORPORATION_8937.fhprg
Port : Auto

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM7)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&1cbdcd65&0&3#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :07/29/2015,1.03.00.00

Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 2909366930
Firmware Version : 3
Product Name : QE63MB
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 30777344[14.676 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok

Failed to read information from phone.

Reading GPT[3]
Drive [0] 128 Items
Drive [1] 0 Items
Drive [2] 0 Items

Removing FRPta...
Method :
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] Ok
- Removing FRP [Zero Wipe] OkOk
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] Ok
- Removing FRP [Zero Wipe] OkOkOk

Elapsed Time : 00:00:06

xerraco 05-27-2022 19:29

Redmi 7a System destroyed
 
Code:

******* Dongle Info *******
Version    : Hydra Tool v 1.2
Serial    : 201100000000
Initialize : OKAY
Status    : Activated
Life      : 0 [0-0-0-0-0]

 Searching for Qualcomm 9008 Device...Found
 FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM7)
 SymbolicName :\??\USB#VID_05C6&PID_9008#5&1cbdcd65&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver  :07/29/2015,1.03.00.00

Getting device info......
Serial No.: 0xB301B1DB
HW_ID    : 000BF0E100720000
MSM ID    : 0x000BF0E1, SDM439-Qualcomm Snapdragon 439/FAADANAZA
MODEL_ID  : 0x0000
OEM_ID    : 0x0072 - XIAOMI
PBL Ver  : 00000000
PK HASH  : 57158eaf1814d78fd2b3105ece4db18a817a08ac664a5782a925f3ff8403d39a
 
Firehose Loader[000BF0E100720000_57158eaf1814d78f_e551cac5_XIAOMI_auth_peek_8937.fhprg]
--------------------------------------------------
  Header Type    : OLD
  TargetMSM      : 8937
  Tag            : _auth_peek
  Version        : 3
  Code_size      : 320
  Signature_size : 256
  fhVendor      : XIAOMI
  HW_ID          : 000BF0E100720000
  Vendor        : XIAOMI
  OEM_ID        : 0072
  MODEL_ID      : 0000
  SW_ID          : 0000000100000003
  APP_ID        :
  pk_hash        : 57158eaf1814d78fd2b3105ece4db18a817a08ac664a5782a925f3ff8403d39a
  OEM_VERSION    : c4-miui-ota-bd104.bj
  IMAGE_VARIANT  : FAADANAZA
  QC_VERSION    : BOOT.BF.3.3.2-00073
--------------------------------------------------

SaharaBoot... Ok
Sending .......................Ok
Connecting to Firehose...
Ping... Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[ygcwCgPo
Signature @256bytes Authentication.... Accepted......
Identifying Chip....
Ok
Chip Configuration :
 MemoryName : eMMC
 MaxPayloadSizeToTargetInBytes : 1048576
 MaxPayloadSizeToTargetInBytesSupported : 1048576
 MaxPayloadSizeFromTargetInBytes : 4096
 MaxXMLSizeInBytes : 4096
 TargetName : 8937
 Version : 1

*** STORAGE DEVICE INFO ***
Memory Type        : eMMC
Block Size in Bytes : 512
Page Size          : 512
Manufacturer ID    : 144
Serial Number      : 79142057
Firmware Version    : 165
Product Name        : HAG4a2
Physical Partitions : 3
Total Logical Blocks:
          Drive [0]  30777344[14.676 GB]
          Drive [1]  8192[4 MB]
          Drive [2]  8192[4 MB]

Protocol : Universal
Running : Ok
 
Phone Information......
  Vendor        : Xiaomi
  ID            : QKQ1.191014.001
  SDK            : 29
  Release        : 10
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Locale        : en-GB
  Miui Ver      : V12
  Mod_device    : pine_global
  Security Patch : 2021-01-01
  Emmc_size      : 16GB

Reading GPT[3]
          Drive [0] 60 Items
          Drive [1] 0 Items
          Drive [2] 0 Items


Backup Security partitions...
Reading Security Items....
 > modemst1
 > modemst2
 > fsg
 > fsc
C:\Hydra Tool\Backup\Security_Backup\__10_Security_052822015229.sec
Backup Security Success....

----------------------------
Flashing Selected Partitions....
 - sec(0)[sec.dat]  Skipped
 - config(0)[config.bin]  Ok
 - vbmeta(0)[vbmeta.img]  Ok
 - vbmetabak(0)[vbmeta.img]  Ok
 - devcfg(0)[devcfg.mbn]  Ok
 - devcfgbak(0)[devcfg.mbn]  Ok
 - apdp(0)[dummy.img]  Ok
 - msadp(0)[dummy.img]  Ok
 - sbl1(0)[sbl1.mbn]  Ok
 - sbl1bak(0)[sbl1.mbn]  Ok
 - rpm(0)[rpm.mbn]  Ok
 - rpmbak(0)[rpm.mbn]  Ok
 - cmnlib(0)[cmnlib_30.mbn]  Ok
 - cmnlibbak(0)[cmnlib_30.mbn]  Ok
 - cmnlib64(0)[cmnlib64_30.mbn]  Ok
 - cmnlib64bak(0)[cmnlib64_30.mbn]  Ok
 - keymaster(0)[km4.mbn]  Ok
 - keymasterbak(0)[km4.mbn]  Ok
 - misc(0)[misc.img]  Ok
 - aboot(0)[emmc_appsboot.mbn]  Ok
 - abootbak(0)[emmc_appsboot.mbn]  Ok
 - tz(0)[tz.mbn]  Ok
 - tzbak(0)[tz.mbn]  Ok
 - dtbo(0)[dtbo.img]  Ok
 - dtbobak(0)[dtbo.img]  Ok
 - splash(0)[splash.img]  Ok
 - dsp(0)[adspso.bin]  Ok
 - dspbak(0)[adspso.bin]  Ok
 - persist(0)[persist.img]  Ok
 - mdtp(0)[mdtp.img]  Ok
 - mdtpbak(0)[mdtp.img]  Ok
 - boot(0)[boot.img]  Ok
 - recovery(0)[recovery.img]  Ok
 - cache(0)[cache.img]  Ok
 - modem(0)[NON-HLOS.bin]  Ok
 - system(0)[system.img]  Ok
 - vendor(0)[vendor.img]  Ok
 - cust(0)[cust.img]  Ok
 - userdata(0)[userdata.img]  Ok
 - PrimaryGPT(0)[gpt_main0.bin]  Ok

Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-34.]  OK
0 [NUM_DISK_SECTORS-34.]  OK
0 [NUM_DISK_SECTORS-34.]  OK
0 [NUM_DISK_SECTORS-34.]  OK
0 [NUM_DISK_SECTORS-1.]  OK
0 [NUM_DISK_SECTORS-1.]  OK
0 [NUM_DISK_SECTORS-33.]  OK
0 [CRC32(2,7680)]  OK
0 [CRC32(NUM_DISK_SECTORS-33.,7680)]  OK
0 [0]  OK
0 [CRC32(1,92)]  OK
0 [0]  OK
0 [CRC32(NUM_DISK_SECTORS-1.,92)]  OK
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 0
Set bootable storage drive 0 Ok

Rebooting Phone.... Ok

Elapsed Time : 00:05:08


Br,
xerraco

Gsm-Ahmed 05-28-2022 18:47

Condor Griffe T8 Plus (SP641) Removing FRP Done
 
1 Attachment(s)
Condor Griffe T8 Plus (SP641) Removing FRP Done




Code:

Searching for MTK Device...Found
 Port Identification :Flashmode Preloader
 FriendlyName :MediaTek PreLoader USB VCOM_V1632 (Android) (COM5)
 Device      :5&15c311e1&0&10
 SymbolicName :\??\USB#VID_0E8D&PID_2000#5&15c311e1&0&10#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver  :01/22/2015,3.0.1504.0

Trying to Open Port [COM5] Ok
Reading Partition Table ..
ERAM Size: 0x0000000000020000-128 KB
IRAM Size: 0x0000000040000000-1024 MB
EMMC Boot1 Size: 0x0000000000400000-4 MB
EMMC Boot2 Size: 0x0000000000400000-4 MB
EMMC RPMB Size : 0x0000000000400000-4 MB
EMMC USER Size : 0x00000003AB400000-14,676 GB
EMMC CID      :  13014E53304A394836100186C4C1252D - S0J9H6
HW-CODE        : 0x699
HWSUB-CODE      : 0x8A00
HW-VERSION      : 0xCB00
SW-VERSION      : 0x2
CHIP-EVOLUTION  : 0x0
DA-VERSION      :  1.0
Speed          : high-speed
Partition Count : 37
--------------- Reading build.prop content ---------------
  Brand          : Condor
  Vendor        : SPA Condor Electronics
  Model          : Griffe T8 Plus
  Product        : Griffe_T8_Plus
  Manufacturer  : SPA Condor Electronics
  ID            : O11019
  SDK            : 27
  Release        : 8.1.0
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Locale        : en-US
  Description    : full_k602-user 8.1.0 O11019 1560328254 release-keys
  Device        : SP641
  Display ID    : O11019 release-keys
  Security Patch : 2019-06-05
  Fingerprint    : Condor/SP641/SP641:8.1.0/O11019/1560328254:user/release-keys
  StorageType    : mtp
--------------- end of build.prop content ---------------
IMEI1 : 35542XXXXXXXXX
IMEI2 : 35542XXXXXXXXX
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------
------------------------------
  Removing FRP Flash Mode.. 
------------------------------
Operation : Uni_FMFRP_Erase
Status:  Ok
Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!

https://www8.0zz0.com/2022/05/28/17/620544538.png

SRASHED 06-04-2022 11:46

Mi Play system has been destroyed successfully recovered done...


Quote:

Hydra MediaTeK Tool Ver 1.0.5.8 @MSR
Windows 10 (Version 21H1, OS Build 19043.1706, 64-bit Edition)
Intel(R) Core(TM) i3-6100 CPU @ 3.70GHz
Intel(R) HD Graphics 530
Ram Installed : 8 GB
Windows Access Right : Admin
Software Run As Admnistrator

******* Dongle Info *******
Version : Hydra Tool v 1.2
Serial : 210600015221
Initialize : OKAY
Status : Activated
Life : 0 [0-0-0-0-0]

Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port_V1632 (COM19)
Device :5&521a615&0&3
SymbolicName :\??\USB#VID_0E8D&PID_0003#5&521a615&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0

Trying to Open Port [COM19] Ok
Handshaking...Ok
HwCode : 0766 {MT6765/MT8768t}
Hwver : 0000
Target config : E7
SBC : 01 (True)
SLA : 02 (True)
DAA : 04 (True)
SWJTAG : 06 (True)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 20 (True)
MEMWRITE : 40 (True)
CMD_C8 : 80 (True)
Device Connection : BROM
HW Subcode: 8A00
HW Ver : CA00
SW Ver : 0000
ME_ID : 02C4C42A2E92EEC759E555D5493B54EA
SOC_ID : FD625ACFBF2A033B5EC8B54FF6C59769E715743EED16E9E77F 0240C0B963D62F
Exploiting Device...
Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..Found @ 0x00200BC4
Starting to dump...
Prel Size : 0x00038C2C
Successfully dump preloader.. [C:\Hydra Tool\Boot\PreloaderDump\preloader_lotus.bin]
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)
Device Connection : BROM
Download Agent...
DA :6765_Xiaomi_wb.bin
Uploading data
Successfully uploaded stage 1, jumping ..
Jumping to 0x00200000
Successfully received DA sync
CONNECTION_AGENT : brom
DRAM config needed for : 90014A6843386150
Sending emi data..
DRAM setup passed.
Sending emi data succeeded.
Uploading stage 2...
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
ERAM Size: 0x0000000000080000-512 KB
IRAM Size: 0x0000000100000000-4 GB
EMMC Boot1 Size: 0x0000000000400000-4 MB
EMMC Boot2 Size: 0x0000000000400000-4 MB
EMMC RPMB Size : 0x0000000001000000-16 MB
EMMC USER Size : 0x0000000E8F800000-58.242 GB
EMMC CID : 90014A68433861503E034862184A1645 - hC8aP>
HW-CODE : 0x766
HWSUB-CODE : 0x8A00
HW-VERSION : 0xCA00
SW-VERSION : 0x0
CHIP-EVOLUTION : 0x0
DA-VERSION : 1.0
Speed : high-speed
Error on sending data: DA hash mismatch
*DA Extensions failed to enable
Reading Partition Table ..
Partition Count : 42
--------------- Reading build.prop content ---------------
Brand : xiaomi
Model : MI PLAY
Product : lotus
ID : O11019
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : lotus-user 8.1.0 O11019 V11.0.10.0.OFIMIXM release-keys
Miui Ver : V11
Device : lotus
Display ID : ZAL1722-lotus-build-20210108214352
Security Patch : 2021-01-01
Fingerprint : xiaomi/lotus/lotus:8.1.0/O11019/V11.0.10.0.OFIMIXM:user/release-keys
StorageType : mtp
--------------- end of build.prop content ---------------
IMEI1 : 863728046192151
IMEI2 : 863728046192169
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------
Backing up Security..
-preloader .....Ok [preloader_lotus.bin]
*Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0766_02C4C42A2E92EEC759E555D54 93B54EA\Auto\060422162413\6765_Android_scatter.txt
-pgpt .....Ok
-nvram .....Ok
-nvdata .....Ok
-frp .....Ok
-protect1 .....Ok
-protect2 .....Ok
-persist .....Ok
-proinfo .....Ok
-nvcfg .....Ok
-sec1 .....Ok
-seccfg .....Ok
Backup Done!!!

Write Selected Partitions..
-preloader .....
-recovery .....Ok
-efuse .....Ok
-md1img .....Ok
-spmfw .....Ok
-scp1 .....Ok
-scp2 .....Ok
-sspm_1 .....Ok
-sspm_2 .....Ok
-lk .....Ok
-lk2 .....Ok
-boot .....Ok
-logo .....Ok
-odmdtbo .....Ok
-tee1 .....Ok
-tee2 .....Ok
-vendor .....Ok
-cust .....Ok
-system .....Ok
-vbmeta .....Ok
-cache .....Ok
-userdata .....Ok
Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!
Done Writing...


=====================================

Elapsed Time : 00:02:41
https://i.imgur.com/NCGHllJ.jpg

shahidjanu 06-08-2022 09:29

oppo a5s orang message remove done
 
https://i.postimg.cc/Sxv5Y554/oppo.jpg

Megavee 06-13-2022 06:24

Thanks HYDRA you make it Possible while others were making it drama
 
Hydra Unisoc Tool Ver 1.0.1 Build 50
Windows 10 (Version 10.0, Build 19044, 64-bit Edition)
Intel(R) Core(TM) i7-6700T CPU @ 2.80GHz
NVIDIA GeForce GTX 950
Ram Installed : 12 GB
Windows Access Right : Admin
Software Run As Admnistrator

******* Dongle Info *******
Version : Hydra Tool v 1.2
Serial : 2**********3
Initialize : OKAY
Status : Activated
Life : 0 [0-0-0-0-0]

Port : [Auto] Scanning...COM4
Opening Port...(COM4)Ok
------------------------------------------
Service_FRP_Flashmode...
------------------------------------------
Reading IMEI....
IMEI 1 : 355**********82
IMEI 2 : 867**********38
IMEI 3 : 867**********46
IMEI 4 : 355**********90

Reading System Info..
Vendor : BRAVE
Model : BT7X1
Android Ver : 9
Device : BT7X1
Display ID : BT7X1-BRAVE-20200518
Security Patch : 2019-05-05
FRPPST : /dev/block/platform/soc/soc:ap-ahb/20600000.sdio/by-name/persist
Fingerprint : BRAVE/BT7X1/BT7X1:9/PPR1.180610.011/18402:user/release-keys
ro_product_hardware : sp9832e_1h10

Removing FRP...Ok
Rebooting Phone..Ok

Closing Port...

Elapsed Time : 00:00:03

bulutiletisim 06-14-2022 09:11

mate 20 lite remove frp
 
https://i.ibb.co/dmkpyNF/Screenshot-...022-103702.jpg

turkcellgsm 06-15-2022 10:20

vivo Y11S PD2042F 2028 frp reset ok thanks hydratool team :D

look image setting frp :eek:

https://i.hizliresim.com/u5kquqx.jpg


All times are GMT +1. The time now is 11:56.


vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2024 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2023 -

Page generated in 0.30770 seconds with 6 queries

SEO by vBSEO