GSM Shop GSM Shop
GSM-Forum  

Welcome to the GSM-Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features.
Only registered members may post questions, contact other members or search our database of over 8 million posts.

Registration is fast, simple and absolutely free so please - Click to REGISTER!

If you have any problems with the registration process or your account login, please contact contact us .

Go Back   GSM-Forum > Product Support Sections > Special Solutions / Services / WebShop > GSMFABRICA Products > HYDRA TOOL

Reply
 
LinkBack Thread Tools Display Modes
Old 03-19-2021, 05:47   #1486 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,624
Vivo S1 Pro (PD1945F) Successfully formatted by Hydra Tool


Vivo S1 Pro (PD1945F) Successfully formatted by Hydra Tool

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : VIVO Model : S1 Pro (PD1945F) Storage : Auto
Loader: Vivo_S1Pro_Final.elf
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM14)
SymbolicName :\??\USB#VID_05C6&PID_9008#6&1e3c5ed9&0&1#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :05/18/2016,2.0.6.725

Getting device info......
Serial No.: 0x9E8B0E26
MSM ID : 0x0010A0E1, SM6125-Qualcomm Snapdragon 665
PBL Ver : 00000000
PK HASH : A7DF36FFD7AB557C67A6C26675E2795C
922CF671308CFD7169BEDB84424C862B

Firehose Loader[Vivo_S1Pro_Final.elf]
SaharaBoot... Ok
Sending ..............................Ok
Connecting to Firehose...
Ping..................... Ok
Configuration........
Identifying Chip........UFS
Ok
Chip Configuration :
MemoryName : UFS
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Sep 9 2020 - 00:57:45

*** STORAGE DEVICE INFO ***
Memory Type : UFS
Block Size in Bytes : 4096
Page Size : 4096
Manufacturer ID : 429
Serial Number : 2037279096
Firmware Version : 110
Product Name : H9HQ16AFAMMDAR
Physical Partitions : 6
Total Logical Blocks:
Drive [0] 30939136[118.023 GB]
Drive [1] 2048[8 MB]
Drive [2] 2048[8 MB]
Drive [3] 16384[64 MB]
Drive [4] 262144[1024 MB]
Drive [5] 16384[64 MB]

Protocol : Universal
Running : Ok

Phone Information......
ID : QP1A.190711.020
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Security Patch : 2021-02-01
Platform : =SM6125
Fingerprint : vivo/1920N/1920:10/QP1A.190711.020/compiler02031009:user/release-keys

Reading GPT[6]
Drive [0] 32 Items
Drive [1] 32 Items
Drive [2] 32 Items
Drive [3] 32 Items
Drive [4] 64 Items
Drive [5] 32 Items

Formatting Userdata...
Method :
Auto
Processing...
- Formatting Userdata
Executing ...
- Formatting Userdata [Safe method] OkOkOk

Elapsed Time : 00:00:11
BR
Dipendra Pathak

  Reply With Quote
Old 03-19-2021, 05:53   #1487 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,624
Oppo F9 (CPH1823) System File successfully flashed by Hydra Tool

Oppo F9 (CPH1823) System File successfully flashed by Hydra Tool

Screen Short:



Logs:

Quote:
Brand : OPPO Model : F9 (CPH1823) Connection : Flash Mode

=====================================
How To Boot : Power off phone
* BROM Mode : Press VOL + or Press VOL -+
* Preloader Mode : Just Insert cable

Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port (COM77)
SymbolicName :\??\USB#VID_0E8D&PID_0003#5&346af9c5&0&1#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2016,3.0.1504.0


Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0788MT6771[6771]
BROM HW_SW_VER : 8A00 CA00 0000 0000
getMTKPayloadExploit : 0788
#Executing Exploit..
#SUCCESS..
Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0788MT6771[6771]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
SECURE VERSION : 00
BL VERSION : FE
BR Secured : E0

Preparing Download Agent..
DA : 6771.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2020-11-03.22:07_536568
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_oppo6771_18311_F9.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 3C26E9EAE9F517C128980F4D7BCFFD79
ERAM Size : 0x0000000000039000 -228 KB
IRAM Size : 0x0000000180000000 -6 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 90014A484347386134A51FC7B4DE9501 - HCG8a4

DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_oppo6771.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0788__031921083923\MT6771_Androi d_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x07C88000]1024 KB ->frp.bin...Ok
-nvdata[0x09D88000]64 MB ->nvdata.bin...Ok
-persist[0x11800000]48 MB ->persist.bin...Ok
-nvram[0x20D00000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0788__031921083923
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 3C26E9EAE9F517C128980F4D7BCFFD79
ERAM Size : 0x0000000000039000 -228 KB
IRAM Size : 0x0000000180000000 -6 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 90014A484347386134A51FC7B4DE9501 - HCG8a4

Reading GPT-EMMC [0x00008000] 130 Items

Flashing Selected Partitions....
- system[system.bin] 4.203 GB Flash -> = Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!
=====================================

Elapsed Time : 00:04:12
BR
Dipendra Pathak

  Reply With Quote
Old 03-19-2021, 06:03   #1488 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,624
Xiaomi Redmi 5A (riva) Zero Wipe FRP successfully removed by Hydra Tool

Xiaomi Redmi 5A (riva) Zero Wipe FRP successfully removed by Hydra Tool

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : XIAOMI Model : Redmi 5A (riva) Storage : Auto
Loader: mi_1_8.mbn
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM56)
SymbolicName :\??\USB#VID_05C6&PID_9008#6&24310f37&0&3#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :03/25/2016,2.1.2.2

Getting device info......
Serial No.: 0x7EFF20C6
MSM ID : 0x000560E1, MSM8917-Qualcomm Snapdragon 425
PBL Ver : 00000000
PK HASH : 57158EAF1814D78FD2B3105ECE4DB18A
817A08AC664A5782A925F3FF8403D39A

Firehose Loader[mi_1_8.mbn]
SaharaBoot... Ok
Sending ...................Ok
Connecting to Firehose...
Ping... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8917
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 705790174
Firmware Version : 165
Product Name : HBG4a2
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 61071360[29.121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok

Phone Information.....
Brand : Xiaomi
Vendor : Xiaomi
Model : Redmi 5A
ID : N2G47H
SDK : 25
Release : 7.1.2
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : riva-user 7.1.2 N2G47H V10.1.1.0.NCKMIFI release-keys
Miui Ver : V10
Device : riva
Mod_device : riva_global
Board : QC_Reference_Phone
Display ID : N2G47H
Security Patch : 2018-07-01
Emmc_size : 16GB
Platform : msm8937
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : Xiaomi/riva/riva:7.1.2/N2G47H/V10.1.1.0.NCKMIFI:user/release-keys

Reading GPT[3]
Drive [0] 52 Items
Drive [1] 0 Items
Drive [2] 0 Items

Removing FRPta...
Method :
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOkOk

Elapsed Time : 00:00:08
BR
Dipendra Pathak

  Reply With Quote
Old 03-19-2021, 06:17   #1489 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,624
Xiaomi Redmi Note 9 Merlin Removed Mi Account Successfully Done by Hydra Tool

Xiaomi Redmi Note 9 Merlin Removed Mi Account Successfully Done by Hydra Tool

Screen Short:



Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port (COM21)
SymbolicName :\??\USB#VID_0E8D&PID_0003#5&170ffd21&0&2#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/03/2016,3.0.1504.0


Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : BD66FE500411A0028599CF54175BB110
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000001D1EC00000 -116,48 GB
eMMC CID : 150100445636444142025BB3CA286707 - DV6DAB

Reading GPT-EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Remove MiAccount[Erase Method]
Processing...
-persist.bin[0x104A2000]48 MB ->persist.bin...Ok
-frp.bin[0x05508000]1024 KB ->frp.bin...Ok Ok

Elapsed Time : 00:00:14
BR
Dipendra Pathak

  Reply With Quote
Old 03-20-2021, 04:38   #1490 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,624
Xiomi Mi CC 9 Successfully Flashed by Hydra Tool

Xiomi Mi CC 9 Successfully Flashed by Hydra Tool

Screen Short:



Logs:

Quote:
Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM15)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&1b75157d&0&1#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :03/25/2016,2.1.2.2

Getting device info......
Serial No.: 0x43FC9B6B
MSM ID : 0x000DB0E1, SDM710-Qualcomm Snapdragon 710
PBL Ver : 00000000
PK HASH : C924A35F39CE1CDD1B8D5A9F3B8E3C51
317930431D7A9DD5A55028CF6965FE65

Firehose Loader[prog_emmc_firehose_sdm670_ddr.elf]
SaharaBoot... Ok
Sending .....................................Ok
Connecting to Firehose...
Ping..................... Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[CQdPYhRvRw7lZzVF7Vg8dARetTN]
Checking Internet connection....
- Hydra Is Online
Connecting to Hydra Xiaomi Server...

Signature @256bytes Authentication.... Accepted........
Identifying Chip........UFS
Ok
Chip Configuration :
MemoryName : UFS
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Aug 24 2018 - 20:05:37

*** STORAGE DEVICE INFO ***
Memory Type : UFS
Block Size in Bytes : 4096
Page Size : 4096
Manufacturer ID : 462
Serial Number : 1297306958
Firmware Version : 600
Product Name : KM8B8001JM-BC01
Physical Partitions : 6
Total Logical Blocks:
Drive [0] 62162944[237.133 GB]
Drive [1] 2048[8 MB]
Drive [2] 2048[8 MB]
Drive [3] 8192[32 MB]
Drive [4] 262144[1024 MB]
Drive [5] 40960[160 MB]

Protocol : Universal
Running : Ok

Phone Information......
Brand : Xiaomi
Vendor : Xiaomi
Model : MI CC 9
ID : PKQ1.181121.001
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : zh-CN
Description : pyxis-user 9 PKQ1.181121.001 V10.3.5.0.PFCCNXM release-keys
Miui Ver : V10
Device : pyxis
Display ID : PKQ1.181121.001
Security Patch : 2019-05-01
Fingerprint : Xiaomi/pyxis/pyxis:9/PKQ1.181121.001/V10.3.5.0.PFCCNXM:user/release-keys


----------------------------
Flashing Selected Partitions....
- switch(0)[dummy.img] Ok
- misc(0)[misc.img] Ok
- logfs(0)[logfs_ufs_8mb.bin] Ok
- vendor(0)[vendor.img] Ok
- system(0)[system.img] Ok
- imagefv(0)[imagefv.elf] Ok
- recovery(0)[recovery.img] Ok
- cache(0)[cache.img] Ok
- cust(0)[cust.img] Ok
- userdata(0)[userdata.img] Ok
- PrimaryGPT(0)[gpt_main0.bin] Ok
- xbl_config(1)[xbl_config.elf] Ok
- xbl(1)[xbl.elf] Ok
- PrimaryGPT(1)[gpt_main1.bin] Ok
- xbl_configbak(2)[xbl_config.elf] Ok
- xblbak(2)[xbl.elf] Ok
- PrimaryGPT(2)[gpt_main2.bin] Ok
- PrimaryGPT(3)[gpt_main3.bin] Ok
- qupfw(4)[qupv3fw.elf] Ok
- qupfwbak(4)[qupv3fw.elf] Ok
- vbmeta(4)[vbmeta.img] Ok
- storsec(4)[storsec.mbn] Ok
- storsecbak(4)[storsec.mbn] Ok
- devcfg(4)[devcfg.mbn] Ok
- devcfgbak(4)[devcfg.mbn] Ok
- aop(4)[aop.mbn] Ok
- aopbak(4)[aop.mbn] Ok
- cmnlib(4)[cmnlib.mbn] Ok
- cmnlibbak(4)[cmnlib.mbn] Ok
- cmnlib64(4)[cmnlib64.mbn] Ok
- cmnlib64bak(4)[cmnlib64.mbn] Ok
- keymaster(4)[keymaster64.mbn] Ok
- keymasterbak(4)[keymaster64.mbn] Ok
- bluetooth(4)[BTFM.bin] Ok
- abl(4)[abl.elf] Ok
- ablbak(4)[abl.elf] Ok
- tz(4)[tz.mbn] Ok
- tzbak(4)[tz.mbn] Ok
- hyp(4)[hyp.mbn] Ok
- hypbak(4)[hyp.mbn] Ok
- dtbo(4)[dtbo.img] Ok
- logo(4)[logo.img] Ok
- dsp(4)[dspso.bin] Ok
- boot(4)[boot.img] Ok
- modem(4)[NON-HLOS.bin] Ok
- PrimaryGPT(4)[gpt_main4.bin] Ok
- persist(5)[persist.img] Ok
- PrimaryGPT(5)[gpt_main5.bin] Ok

Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-6.] OK
0 [NUM_DISK_SECTORS-6.] OK
0 [NUM_DISK_SECTORS-6.] OK
0 [NUM_DISK_SECTORS-6.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-5.] OK
0 [CRC32(2,4096)] OK
0 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
0 [0] OK
0 [CRC32(1,92)] OK
0 [0] OK
0 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
1 [NUM_DISK_SECTORS-6.] OK
1 [NUM_DISK_SECTORS-6.] OK
1 [NUM_DISK_SECTORS-6.] OK
1 [NUM_DISK_SECTORS-6.] OK
1 [NUM_DISK_SECTORS-1.] OK
1 [NUM_DISK_SECTORS-1.] OK
1 [NUM_DISK_SECTORS-5.] OK
1 [CRC32(2,4096)] OK
1 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
1 [0] OK
1 [CRC32(1,92)] OK
1 [0] OK
1 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
2 [NUM_DISK_SECTORS-6.] OK
2 [NUM_DISK_SECTORS-6.] OK
2 [NUM_DISK_SECTORS-6.] OK
2 [NUM_DISK_SECTORS-6.] OK
2 [NUM_DISK_SECTORS-1.] OK
2 [NUM_DISK_SECTORS-1.] OK
2 [NUM_DISK_SECTORS-5.] OK
2 [CRC32(2,4096)] OK
2 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
2 [0] OK
2 [CRC32(1,92)] OK
2 [0] OK
2 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
3 [NUM_DISK_SECTORS-6.] OK
3 [NUM_DISK_SECTORS-6.] OK
3 [NUM_DISK_SECTORS-6.] OK
3 [NUM_DISK_SECTORS-6.] OK
3 [NUM_DISK_SECTORS-1.] OK
3 [NUM_DISK_SECTORS-1.] OK
3 [NUM_DISK_SECTORS-5.] OK
3 [CRC32(2,4096)] OK
3 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
3 [0] OK
3 [CRC32(1,92)] OK
3 [0] OK
3 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
4 [NUM_DISK_SECTORS-6.] OK
4 [NUM_DISK_SECTORS-6.] OK
4 [NUM_DISK_SECTORS-6.] OK
4 [NUM_DISK_SECTORS-6.] OK
4 [NUM_DISK_SECTORS-1.] OK
4 [NUM_DISK_SECTORS-1.] OK
4 [NUM_DISK_SECTORS-5.] OK
4 [CRC32(2,8192)] OK
4 [CRC32(NUM_DISK_SECTORS-5.,8192)] OK
4 [0] OK
4 [CRC32(1,92)] OK
4 [0] OK
4 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
5 [NUM_DISK_SECTORS-6.] OK
5 [NUM_DISK_SECTORS-6.] OK
5 [NUM_DISK_SECTORS-6.] OK
5 [NUM_DISK_SECTORS-6.] OK
5 [NUM_DISK_SECTORS-1.] OK
5 [NUM_DISK_SECTORS-1.] OK
5 [NUM_DISK_SECTORS-5.] OK
5 [CRC32(2,4096)] OK
5 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
5 [0] OK
5 [CRC32(1,92)] OK
5 [0] OK
5 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
----------------------------
Done!

Rebooting Phone.... Ok

Elapsed Time : 00:03:43
BR
Dipendra Pathak

  Reply With Quote
Old 03-20-2021, 05:08   #1491 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,624
Xiaomi Redmi Note 7 Pro (Violet) Prisist flashed successfully by Hydra Tool

Xiaomi Redmi Note 7 Pro (Violet) Prisist flashed successfully by Hydra Tool

Screen Short:



Logs:

Quote:
Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM15)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&1b75157d&0&1#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :03/25/2016,2.1.2.2

Getting device info......
Serial No.: 0xE10AE8D7
MSM ID : 0x000950E1, SM6150-Qualcomm Snapdragon 675
PBL Ver : 00000000
PK HASH : 1BEBE3863A6781DB4B01086063007334
DE9E5CA14971C7C4F4358EC9D79CDA46

Firehose Loader[Xiaomi_Redmi Note 7 Pro_Sdm6150_ddr.elf]
SaharaBoot... Ok
Sending ...................................Ok
Connecting to Firehose...
Ping..................... Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[Ei7pmG0TKoimZyac5qxjNSTlLy]
Checking Internet connection....
- Hydra Is Online
Connecting to Hydra Xiaomi Server...

Signature @256bytes Authentication.... Accepted........
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Jul 19 2019 - 01:12:10

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 3215747137
Firmware Version : 2
Product Name : 3V6CMB
Physical Partitions : 4
Total Logical Blocks:
Drive [0] 244277248[116.48 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Drive [3] 32768[16 MB]

Protocol : Universal
Running : Ok

Phone Information......
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi Note 7 Pro
ID : PKQ1.181203.001
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : zh-CN
Description : violet-user 9 PKQ1.181203.001 V11.0.8.0.PFHCNXM release-keys
Miui Ver : V11
Device : violet
Display ID : PKQ1.181203.001
Security Patch : 2020-02-01
Fingerprint : xiaomi/violet/violet:9/PKQ1.181203.001/V11.0.8.0.PFHCNXM:user/release-keys


----------------------------
Flashing Selected Partitions....
- persist(0)[persist.img] Ok
----------------------------
Done!

Rebooting Phone.... Ok

Elapsed Time : 00:00:22
BR
Dipendra Pathak

  Reply With Quote
The Following User Says Thank You to Dipendra Pathak For This Useful Post:
Old 03-20-2021, 05:32   #1492 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,624
Oppo A37m (Neo 9) Rebuilding user Data successfully Done by Hydra Tool

Oppo A37m (Neo 9) Rebuilding user Data successfully Done by Hydra Tool

Screen Short:



Logs:

Quote:
Brand : OPPO Model : A37m (Neo 9) Connection : Flash Mode

=====================================
How To Boot : Power off phone
* BROM Mode : Press VOL + or Press VOL -+
* Preloader Mode : Just Insert cable

Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port_V1632 (COM42)
SymbolicName :\??\USB#VID_0E8D&PID_0003#6&da7c698&0&6#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0326MT6750T[6755]
BROM HW_SW_VER : 8A00 CB00 0001 0000
FUSEID : 421C0000
SECURE VERSION : 00
BL VERSION : FE
BR Secured : 00
NORMAL BOOT

Preparing Download Agent..
DA : 6755_SWSEC_2B23567CB4.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.00.00
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_oppo6750_15127.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 483D02F999C686592A665B8FF458D363
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003AB400000 -14.676 GB
eMMC CID : 90014A484147346132A550301D9A731B - HAG4a2

DA Speed :
Change to HIGH SPEED...
Searching for MTK Device...Found
Port Identification A_HIGHSPEED_VCOM
FriendlyName :MediaTek DA USB VCOM (Android) (COM62)
SymbolicName :\??\USB#VID_0E8D&PID_2001#6&da7c698&0&6#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0


Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info
Brand : OPPO
Vendor : OPPO
Model : OPPO A37m
ID : LMY47I
SDK : 22
Release : 5.1
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Description : full_oppo6750_15127-user 5.1 LMY47I 1488448383 dev-keys
Device : A37
Board : full_oppo6750_15127
Display ID : A37m_11_A.18_170302
Security Patch : 2016-09-05
Platform : mt6750
FRPPST : /dev/block/platform/mtk-msdc.0/by-name/frp
Fingerprint : OPPO/A37m/A37:5.1/LMY47I/1474447292:user/release-keys
StorageType : mtp,mass_storage
Userdata State : Not Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_oppo6750_15127.bin
Creating Scatter file... D:\HydraTool_Fullpackage_7-04-20\\Backup\Auto\0326_OPPO_A37m_A37_5.1_LMY47I_1474 447292_031921104758\MT6750T_Android_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x03F88000]1024 KB ->frp.bin...Ok
-nvdata[0x04088000]32 MB ->nvdata.bin...Ok
-nvram[0x0CF00000]5 MB ->nvram.bin...Ok
Done!!!
D:\HydraTool_Fullpackage_7-04-20\\Backup\Auto\0326_OPPO_A37m_A37_5.1_LMY47I_1474 447292_031921104758
MTK Phone Loader is NOW RUNNING.
=====================================

Elapsed Time : 00:00:25
BR
Dipendra Pathak

  Reply With Quote
The Following User Says Thank You to Dipendra Pathak For This Useful Post:
Old 03-20-2021, 06:08   #1493 (permalink)
No Life Poster
 
malka4u's Avatar
 
Join Date: Aug 2011
Location: bagmati pradesh
Posts: 3,340
Member: 1626780
Status: Offline
Thanks Meter: 1,309
---------------------------------
Searching for MTK Device...Found
Port Identification :METAMODE Preloader
FriendlyName :MediaTek USB VCOM (Android) (COM55)
SymbolicName :\??\USB#VID_0E8D&PID_2007#5&147efee4&0&2#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0


META Phone Info . . .
MCUID: 8U ` mt6771
ME_SO:
DATE : Tue Jan 26 23:59:16 CST 2021
MODEL: CPH1823EX_11_F.17
ME_SWVER: CPH1823_11_F.17_210126_cc65c34e


Reset to Factory Default Ok
Rebooting....
Done!!!


Elapsed Time : 00:00:01
  Reply With Quote
The Following User Says Thank You to malka4u For This Useful Post:
Old 03-21-2021, 03:07   #1494 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,624
Oppo A37m (Neo 9) Rebuilding user Data successfully Done by Hydra Tool

Oppo A37m (Neo 9) Rebuilding user Data successfully Done by Hydra Tool

Screen Short:



Logs:

Quote:
Brand : OPPO Model : A37m (Neo 9) Connection : Flash Mode

=====================================
How To Boot : Power off phone
* BROM Mode : Press VOL + or Press VOL -+
* Preloader Mode : Just Insert cable

Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port_V1632 (COM42)
SymbolicName :\??\USB#VID_0E8D&PID_0003#6&da7c698&0&6#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0326MT6750T[6755]
BROM HW_SW_VER : 8A00 CB00 0001 0000
FUSEID : 421C0000
SECURE VERSION : 00
BL VERSION : FE
BR Secured : 00
NORMAL BOOT

Preparing Download Agent..
DA : 6755_SWSEC_2B23567CB4.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.00.00
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_oppo6750_15127.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 483D02F999C686592A665B8FF458D363
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003AB400000 -14.676 GB
eMMC CID : 90014A484147346132A550301D9A731B - HAG4a2

DA Speed :
Change to HIGH SPEED...
Searching for MTK Device...Found
Port Identification A_HIGHSPEED_VCOM
FriendlyName :MediaTek DA USB VCOM (Android) (COM62)
SymbolicName :\??\USB#VID_0E8D&PID_2001#6&da7c698&0&6#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0


Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info
Brand : OPPO
Vendor : OPPO
Model : OPPO A37m
ID : LMY47I
SDK : 22
Release : 5.1
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Description : full_oppo6750_15127-user 5.1 LMY47I 1488448383 dev-keys
Device : A37
Board : full_oppo6750_15127
Display ID : A37m_11_A.18_170302
Security Patch : 2016-09-05
Platform : mt6750
FRPPST : /dev/block/platform/mtk-msdc.0/by-name/frp
Fingerprint : OPPO/A37m/A37:5.1/LMY47I/1474447292:user/release-keys
StorageType : mtp,mass_storage
Userdata State : Not Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_oppo6750_15127.bin
Creating Scatter file... D:\HydraTool_Fullpackage_7-04-20\\Backup\Auto\0326_OPPO_A37m_A37_5.1_LMY47I_1474 447292_031921104758\MT6750T_Android_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x03F88000]1024 KB ->frp.bin...Ok
-nvdata[0x04088000]32 MB ->nvdata.bin...Ok
-nvram[0x0CF00000]5 MB ->nvram.bin...Ok
Done!!!
D:\HydraTool_Fullpackage_7-04-20\\Backup\Auto\0326_OPPO_A37m_A37_5.1_LMY47I_1474 447292_031921104758
MTK Phone Loader is NOW RUNNING.
=====================================

Elapsed Time : 00:00:25
BR
Dipendra Pathak

  Reply With Quote
Old 03-21-2021, 07:20   #1495 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,624
Vivo Y91 FRP successfully removed by Hydra Tool

Vivo Y91 FRP successfully removed by Hydra Tool

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : AUTO Model : AUTO Storage : Auto
Loader: Auto
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM4)
SymbolicName :\??\USB#VID_05C6&PID_9008#6&182a12da&0&5#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/02/2017,2.1.2.7

Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 3225646360
Firmware Version : 165
Product Name : HAG4a2
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 30777344[14,676 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok
Reading GPT[3]
Drive [0] 60 Items
Drive [1] 0 Items
Drive [2] 0 Items


Phone Information.....
Brand : vivo
Vendor : vivo
Model : vivo 1817
ID : OPM1.171019.026
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : msm8937_64-user 8.1.0 OPM1.171019.026 eng.compil.20200730.192449 release-keys
Device : msm8937_64
Display ID : OPM1.171019.026 release-keys
Security Patch : 2020-08-01
Emmc_size : 16GB
Platform : =SDM439
Fingerprint : vivo/1817/1817:8.1.0/OPM1.171019.026/compil07301924:user/release-keys

Processing Forced Erase....
- Removing FRP [Auto] Ok
- Forced Erase Userdata
Action Result : Ok

Elapsed Time : 00:00:09
BR
Dipendra Pathak

  Reply With Quote
Old 03-21-2021, 07:25   #1496 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,624
Oppo Realme 6 (RMX2001) Safe Format Master Clear 1 Successfully done by Hydra Tool

Oppo Realme 6 (RMX2001) Safe Format Master Clear 1 Successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port_V1632 (COM6)
SymbolicName :\??\USB#VID_0E8D&PID_0003#7&1d2facea&0&2#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0813MT6785[6785]
BROM HW_SW_VER : 8A00 CA00 0000 0000
getMTKPayloadExploit : 0813
#Executing Exploit..
#SUCCESS..
Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0813MT6785[6785]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
SECURE VERSION : 05
BL VERSION : FE
BR Secured : E0

Preparing Download Agent..
DA : [Not Exist]
Trying Default 6785.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2019/12/14.17:56_491164
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_oppo6785.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 114E05CCA52DC034EDA88C1B74E8968B
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x0000000200000000 -8 GB
UFS LU0 Size: 0x0000000000400000 -4 MB
UFS LU1 Size: 0x0000000000400000 -4 MB
UFS LU2 Size: 0x0000001DCB000000 -119.172 GB
UFS CID : I?KM8V8001JM-B813
UFS UNIQID : 00340035006100390066003000640034

DA Speed : high-speed

Reading GPT-UFS [0x00008000] 130 Items

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_oppo6785.bin
Creating Scatter file... I:\HydraTool\HydraTool_Fullpackage_1-30-2021\HydraTool_Fullpackage_1-30-2021\\Backup\Auto\0813__032121094959\MT6785_Androi d_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x0BE08000]1024 KB ->frp.bin...Ok
-nvdata[0x0F708000]64 MB ->nvdata.bin...Ok
-persist[0x16DA2000]50.367 MB ->persist.bin...Ok
-nvram[0x1ED00000]64 MB ->nvram.bin...Ok
Done!!!
I:\HydraTool\HydraTool_Fullpackage_1-30-2021\HydraTool_Fullpackage_1-30-2021\\Backup\Auto\0813__032121094959
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 114E05CCA52DC034EDA88C1B74E8968B
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x0000000200000000 -8 GB
UFS LU0 Size: 0x0000000000400000 -4 MB
UFS LU1 Size: 0x0000000000400000 -4 MB
UFS LU2 Size: 0x0000001DCB000000 -119.172 GB
UFS CID : I?KM8V8001JM-B813
UFS UNIQID : 00340035006100390066003000640034

Reading GPT-UFS [0x00008000] 130 Items


-------------------------------------
Operation : Safe Format Master Clear 1
Processing...
Safeformat Master Clear 1... Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:01:11
BR
Dipendra Pathak

  Reply With Quote
Old 03-21-2021, 10:43   #1497 (permalink)
No Life Poster
 
Gsm-Ahmed's Avatar
 
Join Date: Jan 2020
Location: Algeria
Posts: 825
Member: 2944109
Status: Offline
Thanks Meter: 670
Condor Plume H1 (SP620) Ultra Power Option

Condor Plume H1 (SP620) Ultra Power Option successfully done by Hydra Tool




Code:
PreOperation Configuration 
 Brand : AUTO Model : AUTO Storage : Auto
 Loader: Auto
 Port  : Auto
 Connection  : 

Searching for Qualcomm 9008 Device...Found
 FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM9)
 SymbolicName :\??\USB#VID_05C6&PID_9008#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :08/02/2017,2.1.2.7

Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok 
Configuration......
Identifying Chip....
Ok
Chip Configuration :
 MemoryName : eMMC
 MaxPayloadSizeToTargetInBytes : 1048576
 MaxPayloadSizeToTargetInBytesSupported : 1048576
 MaxPayloadSizeFromTargetInBytes : 4096
 MaxXMLSizeInBytes : 4096
 TargetName : 8953
 Version : 1

*** STORAGE DEVICE INFO ***
Memory Type         : eMMC
Block Size in Bytes : 512
Page Size           : 512
Manufacturer ID     : 144
Serial Number       : 934817224
Firmware Version    : 165
Product Name        : HAG4a2
Physical Partitions : 3
Total Logical Blocks:
          Drive [0]  30777344[14,676 GB]
          Drive [1]  8192[4 MB]
          Drive [2]  8192[4 MB]

Protocol : Universal
Running : Ok
Reading GPT[3]
          Drive [0] 48 Items
          Drive [1] 0 Items
          Drive [2] 0 Items

 
Phone Information.....
  Brand          : Condor
  Vendor         : SPA Condor Electronics
  Model          : Plume H1
  ID             : N2G47H
  SDK            : 25
  Release        : 7.1.2
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-US
  Description    : msm8953_64-user 7.1.2 N2G47H 2578 release-keys
  Device         : SP620
  Board          : SP620
  Display ID     : N2G47H release-keys
  Security Patch : 2018-03-01
  Emmc_size      : 16GB
  Platform       : msm8953
  FRPPST         : /dev/block/bootdevice/by-name/config
  Fingerprint    : Condor/SP620/SP620:7.1.2/N2G47H/SP620_V11.0_20170925:user/release-keys

Processing Auto....
 - Removing FRP
Executing ...
 - Removing FRP [Zero Wipe] OkOk
 - Formatting Userdata
Executing ...
 - Formatting Userdata  [Safe method] OkOk
Action Result : Ok

Rebooting Phone.... Ok

Elapsed Time : 00:00:07
  Reply With Quote
Old 03-21-2021, 10:44   #1498 (permalink)
No Life Poster
 
Gsm-Ahmed's Avatar
 
Join Date: Jan 2020
Location: Algeria
Posts: 825
Member: 2944109
Status: Offline
Thanks Meter: 670
Ace Buzz 2 lite Ultra Power Option

Ace Buzz 2 lite Ultra Power Option successfully done by Hydra Tool




Code:
Port : [Auto] Scanning...COM7
TPortConnection.Create...(COM7)..Opening...Ok
Reading IMEI...
Error : 84.
IMEI 1 : 35725XXXXXXX426
IMEI 2 : 35725XXXXXXX434

Reading System Info.
*** Flash Mode #Ultra Power  ***
Resetting FRP...Ok
Formatting userdata...Failed
Rebooting Phone..Failed

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:01:43
  Reply With Quote
The Following User Says Thank You to Gsm-Ahmed For This Useful Post:
Old 03-21-2021, 10:46   #1499 (permalink)
No Life Poster
 
Gsm-Ahmed's Avatar
 
Join Date: Jan 2020
Location: Algeria
Posts: 825
Member: 2944109
Status: Offline
Thanks Meter: 670
Oppo A1k CPH1923 Pin Unlock MetaMode

Oppo A1k CPH1923 Pin Unlock MetaMode Done Hydra Tool






Code:
---------------------------------
Searching for MTK Device...Found
 Port Identification :METAMODE Preloader
 FriendlyName :MediaTek PreLoader USB VCOM_V1632 (Android) (COM11)
 SymbolicName :\??\USB#VID_22D9&PID_0006#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0


META Phone Info . . .
MCUID: 8U  `    mt6765
ME_SO: 
DATE : Mon Dec 21 13:37:55 CST 2020
MODEL: CPH1923EX_11_A.38
ME_SWVER: CPH1923_11_A.38_201221_de900167
MANUFACTURER : OPPO
BOARD : oppo6762_18540
MODEL : CPH1923
NAME : unknown
BUILD.DISPLAY.ID : CPH1923EX_11_A.38
USB.MODEL : unknown
BUILD.VERSION.RELEASE : 9
BUILD.VERSION.SECURITY_PATCH : 2021-01-05
DEVICE : unknown
BRAND : OPPO
SERVICE CALL IPHONESUBINFO 1 : unknown
PERSIST.MTK.WCN.COMBO.CHIPID : unknown
SERIALNO : unknown
MEDIATEK.PLATFORM : unknown
MEDIATEK.CHIP_VER : unknown
HARDWARE : mt6765
MEDIATEK.VERSION.RELEASE : CPH1923_11_A.38_201221
OEM_UNLOCK_SUPPORTED : unknown
EXPECT.RECOVERY_ID : unknown
FRP.PST : /dev/block/platform/bootdevice/by-name/frp
BUILD.FINGERPRINT : unknown
GSM.VERSION.BASEBAND : unknown
SW.BUILDID : unknown
RIL.IMEI : unknown
SYS.USB.CONFIG : unknown

IMEI 1 : 
IMEI 2 : 


Elapsed Time : 00:00:03


Code:
---------------------------------
Searching for MTK Device...Found
 Port Identification :METAMODE Preloader
 FriendlyName :MediaTek PreLoader USB VCOM_V1632 (Android) (COM11)
 SymbolicName :\??\USB#VID_22D9&PID_0006#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0


META Phone Info . . .
MCUID: 8U  `    mt6765
ME_SO: 
DATE : Mon Dec 21 13:37:55 CST 2020
MODEL: CPH1923EX_11_A.38
ME_SWVER: CPH1923_11_A.38_201221_de900167


Reset to Factory Default Ok
Rebooting....
Done!!!

Elapsed Time : 00:00:01

  Reply With Quote
The Following User Says Thank You to Gsm-Ahmed For This Useful Post:
Old 03-21-2021, 10:47   #1500 (permalink)
No Life Poster
 
Gsm-Ahmed's Avatar
 
Join Date: Jan 2020
Location: Algeria
Posts: 825
Member: 2944109
Status: Offline
Thanks Meter: 670
Wiko Tommy 3 FRP Remove

Wiko Tommy 3 FRP Remove Successfully done by Hydra Tool




Code:
=====================================
Searching for MTK Device...Found
 Port Identification :Flashmode Preloader
 FriendlyName :MediaTek PreLoader USB VCOM (Android) (COM4)
 SymbolicName :\??\USB#VID_0E8D&PID_2000#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0


Reading Device UniqueID, RAM and Flash Chip Info...
 UNIQUE ID  : F67CAE3861FF9F9B8CB719C4559E0C8B
 ERAM Size  : 0x0000000000040000 -256 KB
 IRAM Size  : 0x0000000040000000 -1024 MB
 eMMC BOOT1 : 0x0000000000400000 -4 MB
 eMMC BOOT2 : 0x0000000000400000 -4 MB
 eMMC RPMB  : 0x0000000000400000 -4 MB
 eMMC USER  : 0x00000003A3E00000 -14,561 GB
 eMMC CID   : 150100464536324D42038B57D3A23541 - FE62MB

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
  Brand          : WIKO
  Vendor         : WIKO
  Model          : Tommy3
  ID             : O11019
  SDK            : 27
  Release        : 8.1.0
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Locale         : en-US
  Description    : full_c201-user 8.1.0 O11019 1539335613 release-keys
  Device         : W_C201
  Display ID     : O11019 release-keys
  Security Patch : 2018-10-05
  Fingerprint    : WIKO/W_C201/W_C201:8.1.0/O11019/1540972848:user/release-keys
  StorageType    : mtp
  Userdata State : Encrypted

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition...[C002002A-STATUS_SEC_IMG_TYPE_MISMATCH]
Erasing FRP Partition... Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:05
  Reply With Quote
The Following User Says Thank You to Gsm-Ahmed For This Useful Post:
Reply

Bookmarks

Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


 



All times are GMT +1. The time now is 08:22.



Powered by Searchlight © 2024 Axivo Inc.
vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2024 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2023 -
Page generated in 0.38250 seconds with 9 queries

SEO by vBSEO