GSM Shop GSM Shop
GSM-Forum  

Welcome to the GSM-Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features.
Only registered members may post questions, contact other members or search our database of over 8 million posts.

Registration is fast, simple and absolutely free so please - Click to REGISTER!

If you have any problems with the registration process or your account login, please contact contact us .

Go Back   GSM-Forum > Product Support Sections > Special Solutions / Services / WebShop > GSMFABRICA Products > HYDRA TOOL


Reply
 
LinkBack Thread Tools Display Modes
Old 04-21-2021, 02:06   #1726 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Oppo A37F (Neo 9) Formatted user data by Hydra. No VPN. No Credit. No need to login!


Oppo A37F (Neo 9) Formatted user data by Hydra. No VPN. No Credit. No need to login!

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : OPPO Model : A37F (Neo 9) Storage : Auto
Loader: 8916.mbn
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM52)
SymbolicName :\??\USB#VID_05C6&PID_9008#6&944c330&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/02/2017,2.1.2.7

Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok
Configuration.......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8916
Version : 1


Protocol : Universal
Running : Ok

Phone Information.....
Brand : OPPO
Vendor : OPPO
Model : A37f
ID : LMY47V
SDK : 22
Release : 5.1.1
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Description : msm8916_64-user 5.1.1 LMY47V eng.root.20180817.014458 release-keys
Board : msm8916
Display ID : A37fEX_11_180817
Security Patch : 2018-03-01
Platform : msm8916
FRPPST : /dev/block/bootdevice/by-name/config

Reading GPT[3]
Drive [0] 40 Items
Drive [1] 0 Items
Drive [2] 4 Items

Formatting Userdata...
Method :
Auto
Processing...
- Formatting Userdata
Executing ...
- Formatting Userdata [Safe method] OkOkOk

Rebooting Phone.... Ok
If not rebooted, Please Power on Manually

Elapsed Time : 00:00:06


No VPN. No Credit. No need to login to server. No need to flash Roms.



BR
Dipendra Pathak

  Reply With Quote
Old 04-21-2021, 02:12   #1727 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Xiaomi Redmi 8 Olive erased Security done by Hydra. No VPN. No Credit. No Login!

Xiaomi Redmi 8 Olive erased Security done by Hydra. No VPN. No Credit. No Login!

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : XIAOMI Model : Redmi 8 (olive) Storage : Auto
Loader: Xiaomi_Redmi_8_Olive.mbn
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM11)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&aea7634&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/31/2015,2.1.2.0

Getting device info......
Serial No.: 0xD9E1C16F
MSM ID : 0x000BF0E1, SDM439-Qualcomm Snapdragon 439
PBL Ver : 00000000
PK HASH : 57158EAF1814D78FD2B3105ECE4DB18A
817A08AC664A5782A925F3FF8403D39A

Firehose Loader[Xiaomi_Redmi_8_Olive.mbn]
SaharaBoot... Ok
Sending .......................Ok
Connecting to Firehose...
Ping... Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[QPWRrpXHbZtM1RsLxqjO3n98
Checking Internet connection....
- Hydra Is Online
Connecting to Hydra Xiaomi Server...

Signature @256bytes Authentication.... Accepted......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 19
Serial Number : 506150497
Firmware Version : 4
Product Name : S0J9N8
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 122142720[58,242 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok
Reading GPT[3]
Drive [0] 64 Items
Drive [1] 0 Items
Drive [2] 0 Items

Processing Erase Security....
Wipe Security ...

Backup Security partitions...
Reading Security Items....
> modemst1
> modemst2
> fsg
C:\Hydra Tool\Backup\Security_Backup\___Security_0420211505 01.sec
Backup Security Success....
Security Wipe Started..
> modemst1 Ok
> modemst2 Ok
> fsg Ok
Security Wipe Success...
Action Result : Ok

Elapsed Time : 00:00:21



Reset MI Lock No VPN. No Credit. No need to login to server. No need to flash Roms. Supported MIUI 8,9,10,11,12 versions, can be able to factory reset & reboot device after reset mi lock! All others services are also free of Cost!


BR
Dipendra Pathak

  Reply With Quote
Old 04-21-2021, 02:24   #1728 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
.Redmi Note 9 (merlin) Formatted selected partition by Hydra. No VPN. No Credit.

.Redmi Note 9 (merlin) Formatted selected partition by Hydra. No VPN. No Credit.

Screen Short:



Logs:

Quote:
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port (COM5)
SymbolicName :\??\USB#VID_0E8D&PID_0003#6&67fe735&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/03/2016,3.0.1504.0


Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 2C102B1E1F77CA6761F13450121A3DD1
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000001D1F000000 -116.484 GB
eMMC CID : 90014A6844456150330310570A3B8771 - hDEaP3

Reading GPT-EMMC [0x00008000] 130 Items

Format Selected Partition
Wiping... [nvdata] Ok!
Wiping... [persist] Ok!
Wiping... [persistbak] Ok!
Wiping... [protect1] Ok!
Wiping... [protect2] Ok!
Wiping... [super] Ok!
=====================================

Elapsed Time : 00:11:03


Reset MI Lock No VPN. No Credit. No need to login to server. No need to flash Roms. Supported MIUI 8,9,10,11,12 versions, can be able to factory reset & reboot device after reset mi lock! All others services are also free of Cost!


BR
Dipendra Pathak

  Reply With Quote
Old 04-21-2021, 02:34   #1729 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Xiaomi Redmi 10X 4G (merlin) Repair IMEI Done by Hydra. No Credit. No VPN. No Login.

Xiaomi Redmi 10X 4G (merlin) Repair IMEI Done by Hydra. No Credit. No VPN. No Login.l

Screen Short:



Logs:

Quote:
=====================================
***IMEI REPAIR FUNCTION****
Xiaomi Flashmode
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port (COM114)
SymbolicName :\??\USB#VID_0E8D&PID_0003#6&35844985&0&3#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2016,3.2


Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 5CA570D1A4E480E054C8DF79C91DAAE2
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000001D1F000000 -116,484 GB
eMMC CID : 90014A68444561503303108C094787C9 - hDEaP3

Reading GPT-EMMC [0x00008000] 130 Items

IMEI INFO..
IMEI1 : *************80
IMEI2 : *************98
ERROR : CMD=07000400, ACK : 0x00200000[]
IMEI INFO..
IMEI1 : FFFFFFFFFFFFFFF
IMEI2 : ***************08

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:04


Reset MI Lock No VPN. No Credit. No need to login to server. No need to flash Roms. Supported MIUI 8,9,10,11,12 versions, can be able to factory reset & reboot device after reset mi lock! All others services are also free of Cost!


BR
Dipendra Pathak

  Reply With Quote
Old 04-21-2021, 15:02   #1730 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Huawei DRA-LX9 (Y5P 2020) Huawei ID Remove With USB Only

Huawei DRA-LX9 (Y5P 2020) Huawei Remove by USB Hydra
  1. Run Hydra MTK Module, Select Brand and Model
  2. Tick Huawei Option, Select Remove Account
  3. Click Execute and Connect usb cable
  4. Wait for Huawei ID Get removed



Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port (COM147)
SymbolicName :\??\USB#VID_0E8D&PID_0003#6&28c87a0b&0&3#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/03/2016,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0766MT6765[6765]
BROM HW_SW_VER : 8A00 CA00 0000 0000
getMTKPayloadExploit : 0766
#Executing Exploit..
#SUCCESS..
Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0766MT6765[6765]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
SECURE VERSION : 05
BL VERSION : FE
BR Secured : E0

Preparing Download Agent..
DA : MT6765_Huawei_MED.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2018/10/18.17:38_452898
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_k62v1_64_mexico.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 2DAEF2DA149824A92AFB7868E1D73F46
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29,121 GB
eMMC CID : 90014A68423861503E01C3E0CE0847AB - hB8aP>

DA Speed : high-speed

Reading GPTNot Valid GPT
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
ERROR : ACK : 0x00010009[]

Reading GPT-EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Remove Account
Processing...
Backing up Partition for safety...
-oeminfo_042121142318.bin[0x04900000]32 MB ->oeminfo_042121142318.bin...Ok Ok

Elapsed Time : 00:00:32

BR
Dipendra Pathak
  Reply With Quote
Old 04-24-2021, 03:35   #1731 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Xiaomi Redmi 6A (cactus) Mi Account removed with erased method

Xiaomi Redmi 6A (cactus) Mi Account removed with erased method


1. Run Hydra MTK Module, Select Brand and Model
2. Go to Service-->Tools-->Xioami
3. Choose "Remove Mi Account (Erase)Method" from Method / Option
4. Execute and connect the device to the computer
5. wait until the process is completed.

Screen Short:



Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port (COM9)
SymbolicName :\??\USB#VID_0E8D&PID_0003#5&fbed77c&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0766MT6765[6765]
BROM HW_SW_VER : 8A00 CA00 0000 0000
getMTKPayloadExploit : 0766
#Executing Exploit..
#SUCCESS..
Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0766MT6765[6765]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
SECURE VERSION : 05
BL VERSION : FE
BR Secured : E0

Preparing Download Agent..
DA : 6765_56EC405E9E.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2018/04/19.10:40_426269
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_cactus.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : ABD44605809C0B18C35057DADAADA74E
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000020000000 -512 MB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003AB400000 -14.676 GB
eMMC CID : 90014A484147346132A53ACA7003A55F - HAG4a2

DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi 6A
ID : O11019
SDK : 27
Release : 8.1.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : zh-CN
Description : cactus-user 8.1.0 O11019 V10.3.4.0.OCBCNXM release-keys
Miui Ver : V10
Device : cactus
Display ID : O11019
Security Patch : 2019-05-01
Fingerprint : xiaomi/cactus/cactus:8.1.0/O11019/V10.3.4.0.OCBCNXM:user/release-keys
StorageType : mtp
Userdata State : Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_cactus.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0766_xiaomi_cactus_cactus_8.1.0_ O11019_V10.3.4.0.OCBCNXM_042121184731\MT6765_Andro id_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x05588000]1024 KB ->frp.bin...Ok
-nvdata[0x07688000]64 MB ->nvdata.bin...Ok
-persist[0x0F000000]64 MB ->persist.bin...Ok
-nvram[0x1BE80000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0766_xiaomi_cactus_cactus_8.1.0_ O11019_V10.3.4.0.OCBCNXM_042121184731
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : ABD44605809C0B18C35057DADAADA74E
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000020000000 -512 MB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003AB400000 -14.676 GB
eMMC CID : 90014A484147346132A53ACA7003A55F - HAG4a2

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi 6A
ID : O11019
SDK : 27
Release : 8.1.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : zh-CN
Description : cactus-user 8.1.0 O11019 V10.3.4.0.OCBCNXM release-keys
Miui Ver : V10
Device : cactus
Display ID : O11019
Security Patch : 2019-05-01
Fingerprint : xiaomi/cactus/cactus:8.1.0/O11019/V10.3.4.0.OCBCNXM:user/release-keys
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Remove MiAccount[Erase Method]
Processing...
-persist.bin[0x0F000000]64 MB ->persist.bin...Ok
-frp.bin[0x05588000]1024 KB ->frp.bin...Ok Ok

Elapsed Time : 00:01:25
BR
Dipendra Pathak

  Reply With Quote
Old 04-24-2021, 03:45   #1732 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Xiaomi Redmi 7 (Onclite) Flashing Successfully Done by Hydra Tool

Xiaomi Redmi 7 (Onclite) Flashing Successfully Done by Hydra Tool

1. Run Hydra Qualcomm Module, Select Brand and Model
2. Go to Service-->Tools-->Xioami
3. Choose File Type and Image Path
4. Choose Flashing Mode (Flash /Fast mode etc.)
5. Execute and connect the device to the computer
6. wait until the process is completed.

Screen Short:



Logs:

Quote:
Searching Device By Fastboot
Device Found...

Reading Information...version: 0.5
Product : onc
version : 0.5
Secure : yes
Device Info:
Device tampered: false
Device unlocked: true
Device critical unlocked: true
Charger screen enabled: true
Display panel:
Device Verity Mode: enforcing
Debug policy enable: false
--------------------------
Fastboot Flashing...
-config(config.bin) Skipped
-lksecapp(lksecapp.mbn) Ok
-lksecappbak(lksecapp.mbn) Ok
-devcfg(devcfg.mbn) Ok
-devcfgbak(devcfg.mbn) Ok
-rpm(rpm.mbn) Ok
-rpmbak(rpm.mbn) Ok
-misc(misc.img) Ok
-sbl1(sbl1.mbn) Ok
-sbl1bak(sbl1.mbn) Ok
-cmnlib(cmnlib_30.mbn) Ok
-cmnlibbak(cmnlib_30.mbn) Ok
-cmnlib64(cmnlib64_30.mbn) Ok
-cmnlib64bak(cmnlib64_30.mbn) Ok
-keymaster(km4.mbn) Ok
-keymasterbak(km4.mbn) Ok
-aboot(emmc_appsboot.mbn) Ok
-abootbak(emmc_appsboot.mbn) Ok
-tz(tz.mbn) Ok
-tzbak(tz.mbn) Ok
-dsp(adspso.bin) Ok
-splash(splash.img) Ok
-persist(persist.img) Skipped
-boot(boot.img) Ok
-recovery(recovery.img) Ok
-modem(NON-HLOS.bin) Ok
-dtbo(dtbo.img) Ok
-vbmeta(vbmeta.img) Ok
-cache(cache.img) Ok
-cust(cust.img) Ok
-vendor(vendor.img) Ok
-system(system.img) Ok
-userdata(userdata.img) Ok
All Done
--------------------------

Elapsed Time : 00:02:46
BR
Dipendra Pathak

  Reply With Quote
Old 04-24-2021, 03:55   #1733 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Oppo A83 (cph1729) fIX Dead From TP 1 successfully done by Hydra Tool

Oppo A83 (cph1729) fIX Dead From TP 1 successfully done by Hydra Tool

1. Run Hydra MTK Module,
2. Select Brand and Model
3. Go to Service-->Tools-->Oppo
4. Choose "Fixed Dead from TP 1" from Method / Option
5. Execute and connect the device to the computer
6. wait until the process is completed.

Screen Short:



Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port_V1632 (COM7)
SymbolicName :\??\USB#VID_0E8D&PID_0003#5&1cebd10&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0690MT6763T[6763]
BROM HW_SW_VER : 8A00 CA01 0001 0000
SECURE VERSION : 05
BL VERSION : FE
BR Secured : E5[SBC+SDA+SEL]

Security Authorization....
Sending[Oppo_A83.auth] Accepted

Preparing Download Agent..
DA : 6763_F156FF6B3D.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2017/09/22.09:22
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...[ERROR]- NOT SYNC
=============================================
Reasons why it fails due to the following"
1. Harware problem/issues
2. If you did Testpoint Kindly check the parts you Touch/TP
3. Powershortage, try to connect Battery
4. Check or replace usb cable and plug directly to your pc usb port.
=============================================
SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_oppo6763_17101.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : E9D210FB66A5AE2B603DD24F05E7AAEE
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 90014A484247346132A543A0CD6FC4C5 - HBG4a2

DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info
Brand : OPPO
Vendor : OPPO
Model : OPPO A83js
ID : N6F26Q
SDK : 25
Release : 7.1.1
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6763_17101-user 7.1.1 N6F26Q 1599151965 release-keys
Device : M6763D
Board : full_oppo6763_17101
Display ID : A83jsEX_11_A.35_200903
Security Patch : 2019-10-05
Platform : mt6763
FRPPST : /dev/block/platform/bootdevice/by-name/frp
StorageType : mtp
Userdata State : Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_oppo6763_17101.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0690__042121094419\MT6763T_Andro id_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x05A88000]1024 KB ->frp.bin...Ok
-nvdata[0x07B88000]64 MB ->nvdata.bin...Ok
-persist[0x0F800000]48 MB ->persist.bin...Ok
-nvram[0x1A000000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0690__042121094419
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : E9D210FB66A5AE2B603DD24F05E7AAEE
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 90014A484247346132A543A0CD6FC4C5 - HBG4a2

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Brand : OPPO
Vendor : OPPO
Model : OPPO A83js
ID : N6F26Q
SDK : 25
Release : 7.1.1
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6763_17101-user 7.1.1 N6F26Q 1599151965 release-keys
Device : M6763D
Board : full_oppo6763_17101
Display ID : A83jsEX_11_A.35_200903
Security Patch : 2019-10-05
Platform : mt6763
FRPPST : /dev/block/platform/bootdevice/by-name/frp
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Fix Dead From TP-1
Processing...
-preloader[0x00000000]512 KB ->preloader...Ok... Ok

Elapsed Time : 00:01:40
BR
Dipendra Pathak

  Reply With Quote
Old 04-24-2021, 04:04   #1734 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Oppo F7 (CPH1819) Fix Dead from TP 1 successfuly done by Hydra Tool

Oppo F7 (CPH1819) Fix Dead from TP 1 successfuly done by Hydra Tool

1. Run Hydra MTK Module,
2. Select Brand and Model
3. Go to Service-->Tools-->Oppo
4. Choose "Fixed Dead from TP 1" from Method / Option
5. Execute and connect the device to the computer
6. wait until the process is completed.

Screen Short:



Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port_V1632 (COM15)
SymbolicName :\??\USB#VID_0E8D&PID_0003#6&129ddb08&0&2#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0


Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 66906B574EC78AA86F27318B2EAEA7C0
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 90014A484347386134A508262C49B4FD - HCG8a4

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
ID : QP1A.190711.020
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6771-user 10 QP1A.190711.020 7604ad4e2b1328a1 release-keys
Display ID : QP1A.190711.020 release-keys
Security Patch : 2021-02-05
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Fix Dead From TP-1
Processing...
-preloader[0x00000000]512 KB ->preloader...Ok... Ok

Elapsed Time : 00:00:15
BR
Dipendra Pathak

  Reply With Quote
Old 04-24-2021, 04:45   #1735 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Huawei MED-LX9 (Y6P 2020) Restoring OEM info successfully done by Hydra Tool

Huawei MED-LX9 (Y6P 2020) Restoring OEM info successfully done by Hydra Tool

1. Run Hydra MTK Module,
2. Select Brand and Model
3. Go to Service-->Tools-->Huawei
4. Choose "Restore OEM Info" from Method / Option
5. Execute and connect the device to the computer
6. wait until the process is completed.

Screen Short:



Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port_V1633 (COM5)
SymbolicName :\??\USB#VID_0E8D&PID_0003#5&369cb5db&0&4#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0


Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 48A12AEF8D13EA3A3AF44E5F66F3D299
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58,242 GB
eMMC CID : 90014A68433861503E0100354EA557BF - hC8aP>

Reading GPT-EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Restore OEM Info
Processing... Ok

Elapsed Time : 00:00:42
BR
Dipendra Pathak

  Reply With Quote
Old 04-24-2021, 05:03   #1736 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Huawei DRA-LX5 (Y5 Lite) 2018 formatting user data successfully done by Hydra Tool

Huawei DRA-LX5 (Y5 Lite) 2018 formatting user data successfully done by Hydra Tool

1. Run Hydra MTK Module,
2. Select Brand and Model
3. Go to Service-->Tools-->Ultra Power Option
4. Choose "Erase UserData" from Method / Option
5. Execute and connect the device to the computer
6. wait until the process is completed.

Screen Short:



Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port_V1632 (COM4)
SymbolicName :\??\USB#VID_0E8D&PID_0003#6&35cc635f&0&6#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0


Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 3DBD65531C06F12EE914A65C0F16909C
ERAM Size : 0x0000000000020000 -128 KB
IRAM Size : 0x0000000040000000 -1024 MB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003A3E00000 -14.561 GB
eMMC CID : 150100464536324D4206312E975AA6DB - FE62MB

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Brand : HUAWEI
Vendor : HUAWEI
Model : DRA-LX5
ID : HUAWEIDRA-LX5
SDK : 27
Release : 8.1.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-US
Description : "DRA-LX5-user 8.1.0 HUAWEIDRA-LX5 1.0.0.149(C636) release-keys"
Device : HWDRA-MG
Board : DRA-LX5
Display ID : DRA-LX5 1.0.0.149(C636)
Security Patch : 2020-08-01
Fingerprint : HUAWEI/DRA-LX5/HWDRA-MG:8.1.0/HUAWEIDRA-LX5/1.0.0.149(C636):user/release-keys
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Erase Userdata
Processing...
Erasing FRP Partition...
Formatting Userdata... Ok

Elapsed Time : 00:00:05
BR
Dipendra Pathak

  Reply With Quote
Old 04-24-2021, 05:15   #1737 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Oppo F9 (CPH1823) Rebuilding User Data successfuly Done by Hydra Tool

Oppo F9 (CPH1823) Rebuilding User Data successfuly Done by Hydra Tool

1. Run Hydra MTK Module,
2. Select Brand and Model
3. Go to Service-->Tools-->Ultra Power Option
4. Choose "Rebiod User Data" from Method / Option
5. Execute and connect the device to the computer
6. wait until the process is completed.

Screen Short:



Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port_V1632 (COM9)
SymbolicName :\??\USB#VID_0E8D&PID_0003#5&297258bb&0&1#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0788MT6771[6771]
BROM HW_SW_VER : 8A00 CA00 0000 0000
getMTKPayloadExploit : 0788
#Executing Exploit..
#SUCCESS..
Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0788MT6771[6771]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
SECURE VERSION : 05
BL VERSION : FE
BR Secured : E0

Preparing Download Agent..
DA : 6771_SWSEC_E0871E87F0.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.00.00
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_oppo6771_18311_F9.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 803E93DF73A04EFB27F7141D4724B747
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 90014A484347386134A51FE1E41F95C9 - HCG8a4

DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info
ID : QP1A.190711.020
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6771-user 10 QP1A.190711.020 7604ad4e2b1328a1 release-keys
Display ID : QP1A.190711.020 release-keys
Security Patch : 2021-02-05
StorageType : mtp
Userdata State : Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_oppo6771.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0788__042421103513\MT6771_Androi d_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x07C88000]1024 KB ->frp.bin...Ok
-nvdata[0x09D88000]64 MB ->nvdata.bin...Ok
-persist[0x11800000]48 MB ->persist.bin...Ok
-nvram[0x20D00000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0788__042421103513
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 803E93DF73A04EFB27F7141D4724B747
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 90014A484347386134A51FE1E41F95C9 - HCG8a4

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
ID : QP1A.190711.020
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6771-user 10 QP1A.190711.020 7604ad4e2b1328a1 release-keys
Display ID : QP1A.190711.020 release-keys
Security Patch : 2021-02-05
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Rebuild Userdata
Processing...
Erasing FRP Partition...
Rebuilding Userdata... Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:01:20
BR
Dipendra Pathak

  Reply With Quote
Old 04-24-2021, 05:57   #1738 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Huawei FRL-L22 (Y9A 2021) Repair IMEI successfully done by Hydra Tool

Huawei FRL-L22 (Y9A 2021) Repair IMEI successfully done by Hydra Tool

1. Run Hydra MTK Module,
2. Select Brand and Model
3. Go to Service-->Repair IMEI
4. Choose The device FLASH MODE and type IMEI written on Battery Housing
5. Execute and connect the device to the computer
6. wait until the process is completed.

Screen Short:



Logs:

Quote:
====================================
***IMEI REPAIR FUNCTION****
Huawei Flashmode
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port_V1632 (COM13)
SymbolicName :\??\USB#VID_0E8D&PID_0003#6&2e98c2b&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0707MT6768[6768]
BROM HW_SW_VER : 8A00 CA00 0000 0000
getMTKPayloadExploit : 0707
#Executing Exploit..
#SUCCESS..
Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0707MT6768[6768]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
SECURE VERSION : 00
BL VERSION : FE
BR Secured : E0

Preparing Download Agent..
DA : MT6768_Xiaomi_New.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2020/07/07.10:10_513994
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_k69v1_64.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 17CE85AC20B355900F99D799BF81DD03
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000001D1F000000 -116.484 GB
eMMC CID : 90014A684445615033011018630C87FD - hDEaP3

DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_k69v1_64.bin
Creating Scatter file... D:\Hydra Tool\\Backup\Auto\0707__042421054308\MT6768_Androi d_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x01A08000]1024 KB ->frp.bin...Ok
-nvdata[0x03B08000]32 MB ->nvdata.bin...Ok
-persist[0x07800000]8 MB ->persist.bin...Ok
-nvram[0x08100000]21 MB ->nvram.bin...Ok
-oeminfo[0x09600000]32 MB ->oeminfo.bin...Ok
Done!!!
D:\Hydra Tool\\Backup\Auto\0707__042421054308
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 17CE85AC20B355900F99D799BF81DD03
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000001D1F000000 -116.484 GB
eMMC CID : 90014A684445615033011018630C87FD - hDEaP3

Reading GPT-EMMC [0x00008000] 130 Items
IMEI INFO..
IMEI1 : *************97
IMEI2 : *************00
Repairing HUWEI IMEI....

OLD IMEI..
IMEI1 : *************97
IMEI2 : *************00

NEW IMEI..
IMEI1 : *************98
IMEI2 : *************47
Done!!!!

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:57
BR
Dipendra Pathak

  Reply With Quote
Old 04-25-2021, 00:34   #1739 (permalink)
Super Moderator
 
Join Date: Jul 2008
Location: Villa del rosario/Nsd Colombia
Posts: 3,605
Member: 813309
Status: Offline
Thanks Meter: 1,912
Redmi note 9 imei done ;)

Code:
22:39:45 : ***IMEI REPAIR FUNCTION****
22:39:45 : Xiaomi Flashmode
22:39:46 : Searching for MTK Device...
22:39:50 : Found
22:39:50 :  Port Identification :
22:39:50 : Flashmode BROM 
22:39:50 :  FriendlyName :
22:39:50 : MediaTek USB Port (COM3)
22:39:50 :  SymbolicName :
22:39:50 : \??\USB#VID_0E8D&PID_0003#6&2cb255bd&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
22:39:50 :  Driver Ver   :
22:39:50 : 01/22/2016,3.2
22:39:50 : 
22:39:51 : Handshaking...
22:39:51 : Ok
22:39:51 : 
22:39:51 : Identifying Hardware ID.....
22:39:51 :  BROM CPUID     : 
22:39:51 : 0707
22:39:52 : MT6768
22:39:52 : [6768]
22:39:52 :  BROM HW_SW_VER : 
22:39:52 : 8A00 
22:39:52 : CA00 
22:39:52 : 0000 
22:39:52 : 0000 
22:39:52 :  getMTKPayloadExploit : 0707
22:39:52 :  #Executing Exploit..
22:39:53 :  #SUCCESS..
22:39:54 : Handshaking...
22:39:54 : Ok
22:39:54 : 
22:39:54 : Identifying Hardware ID.....
22:39:54 :  BROM CPUID     : 
22:39:54 : 0707
22:39:55 : MT6768
22:39:55 : [6768]
22:39:55 :  BROM HW_SW_VER : 
22:39:55 : 8A00 
22:39:55 : CA00 
22:39:55 : 0000 
22:39:55 : 0000 
22:39:55 :  FUSEID         : 
22:39:55 : 00000000
22:39:55 :  SECURE VERSION : 
22:39:55 : 05 
22:39:56 :  BL VERSION     : 
22:39:56 : FE 
22:39:56 :  BR Secured     : 
22:39:56 : E0
22:39:56 : 
22:39:57 : Preparing Download Agent..
22:39:57 :  DA   : 
22:39:57 : MT6768_Xiaomi_New.bin
22:39:57 :  Agent: 
22:39:57 : MTK_DOWNLOAD_AGENT -HYDRA
22:39:57 :  Ver  : 
22:39:58 : MTK_AllInOne_DA_v3.3001.2020/07/07.10:10_513994
22:39:58 :  Init : 
22:39:58 : Loader [1]
22:39:58 :  Sending : 
22:39:58 : Accepted
22:39:58 : 
22:39:58 : Identifying Protocol...
22:39:58 :  Protocol : 
22:39:59 : New
22:39:59 :  Synchronization...
22:40:00 : SYNC
22:40:00 :  Mode : 
22:40:00 : brom
22:40:00 :  Preloader Initialization...
22:40:00 :  Parsing 
22:40:00 : preloader_merlin.bin
22:40:00 :  Init : 
22:40:01 : Accepted
22:40:02 : 
22:40:02 : Execute Secondary Loader
22:40:02 :  Init : 
22:40:02 : Loader [2]
22:40:02 :  Executing : 
22:40:02 : SYNC
22:40:03 : 
22:40:03 : Reading Device UniqueID, RAM and Flash Chip Info...
22:40:03 :  UNIQUE ID  : 
22:40:04 : DED9682F9E37BBC166EAD63ACE4F12BB
22:40:04 :  ERAM Size  : 
22:40:04 : 0x0000000000070000
22:40:04 :  -448 KB
22:40:04 :  IRAM Size  : 
22:40:04 : 0x0000000100000000
22:40:04 :  -4 GB
22:40:04 :  eMMC BOOT1 : 
22:40:04 : 0x0000000000400000
22:40:04 :  -4 MB
22:40:04 :  eMMC BOOT2 : 
22:40:04 : 0x0000000000400000
22:40:05 :  -4 MB
22:40:05 :  eMMC RPMB  : 
22:40:05 : 0x0000000001000000
22:40:05 :  -16 MB
22:40:05 :  eMMC USER  : 
22:40:05 : 0x0000001D1F000000
22:40:05 :  -116,484 GB
22:40:05 :  eMMC CID   : 
22:40:05 : 13014E47314A39533910061B7AC05773
22:40:05 :  - G1J9S9
22:40:05 : 
22:40:06 : DA Speed : 
22:40:06 : high-speed
22:40:06 : 
22:40:06 : Reading GPT
22:40:06 : -EMMC 
22:40:06 : [0x00008000] 
22:40:06 : 130 Items
22:40:06 : 
22:40:06 : Autobackup Partitions
22:40:06 : -preloader
22:40:07 : [0x00000000]
22:40:07 : 512 KB ->
22:40:07 : preloader.bin...
22:40:08 : Ok
22:40:08 :    -> Renaming Preloader....  
22:40:08 : preloader_merlin.bin
22:40:08 :    Creating Scatter file...
22:40:09 :  C:\Hydra Tool\\Backup\Auto\0707__042421224006\MT6768_Android_scatter.txt
22:40:09 : -pgpt
22:40:09 : [0x00000000]
22:40:09 : 32 KB ->
22:40:10 : pgpt.bin...
22:40:11 : Ok
22:40:11 : -frp
22:40:11 : [0x05508000]
22:40:11 : 1024 KB ->
22:40:11 : frp.bin...
22:40:13 : Ok
22:40:13 : -nvdata
22:40:13 : [0x0C4A2000]
22:40:13 : 64 MB ->
22:40:13 : nvdata.bin...
22:40:21 : Ok
22:40:22 : -persist
22:40:22 : [0x104A2000]
22:40:22 : 48 MB ->
22:40:22 : persist.bin...
22:40:38 : Ok
22:40:38 : -nvram
22:40:38 : [0x19F80000]
22:40:38 : 64 MB ->
22:40:38 : nvram.bin...
22:40:59 : Ok
22:40:59 : Done!!!
22:41:00 : C:\Hydra Tool\\Backup\Auto\0707__042421224006
22:41:00 : MTK Phone Loader is NOW RUNNING.
22:41:00 : 
22:41:00 : Reading Device UniqueID, RAM and Flash Chip Info...
22:41:01 :  UNIQUE ID  : 
22:41:01 : DED9682F9E37BBC166EAD63ACE4F12BB
22:41:01 :  ERAM Size  : 
22:41:01 : 0x0000000000070000
22:41:01 :  -448 KB
22:41:01 :  IRAM Size  : 
22:41:01 : 0x0000000100000000
22:41:01 :  -4 GB
22:41:01 :  eMMC BOOT1 : 
22:41:01 : 0x0000000000400000
22:41:01 :  -4 MB
22:41:02 :  eMMC BOOT2 : 
22:41:02 : 0x0000000000400000
22:41:02 :  -4 MB
22:41:02 :  eMMC RPMB  : 
22:41:02 : 0x0000000001000000
22:41:02 :  -16 MB
22:41:02 :  eMMC USER  : 
22:41:02 : 0x0000001D1F000000
22:41:02 :  -116,484 GB
22:41:02 :  eMMC CID   : 
22:41:02 : 13014E47314A39533910061B7AC05773
22:41:02 :  - G1J9S9
22:41:03 : 
22:41:03 : Reading GPT
22:41:03 : -EMMC 
22:41:03 : [0x00008000] 
22:41:03 : 130 Items
22:41:03 : 
22:41:04 : IMEI INFO..
22:41:04 :   IMEI1        
22:41:04 :  : 
22:41:05 : 8602400xxxxxxxx
22:41:05 :   IMEI2        
22:41:05 :  : 
22:41:05 : 8602400xxxxxxxx
22:41:06 : [0000FEEE-]
22:41:07 : IMEI INFO..
22:41:07 :   IMEI1        
22:41:07 :  : 
22:41:07 : FFFFFFFFFFFFFFF
22:41:07 :   IMEI2        
22:41:07 :  : 
22:41:07 : 8602400xxxxxxxx
22:41:08 : 
22:41:08 : Rebooting Device 
22:41:08 : [Reboot To Normal]
22:41:08 : Reboot Done!!
22:41:08 : 
22:41:08 : Elapsed Time : 00:01:22
22:41:08 :
__________________

Please do not Personal Message me for help or troubleshooting. They will be ignored. Use the forums!
  Reply With Quote
Old 04-25-2021, 04:01   #1740 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Oppo A5s (CPH 1909) formatting user data successfully done by Hydra Tool

Oppo A5s (CPH 1909) formatting user data successfully done by Hydra Tool

1. Run MTK Module of Hydra Tool
2. Choose Brand and Model
3. Go to Service-->Tools-->Ultra Power Option
4. Choose "Erase User Data" from drop down menu of Method / Option
5. Execute and insert the USB Data Cable
6. Wait until the operation is completed.

Screen Short:



Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port_V1632 (COM29)
SymbolicName :\??\USB#VID_0E8D&PID_0003#6&dc60f3b&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0


Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : BD6570B7A558B7346D5252AC1FD7B7C3
ERAM Size : 0x000000000003A000 -232 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 1501005248363441420591069A7CA60F - RH64AB

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info

-------------------------------------
Operation : Erase Userdata
Processing...
Erasing FRP Partition...
Formatting Userdata... Ok

Elapsed Time : 00:00:15
BR
Dipendra Pathak

  Reply With Quote
Reply

Bookmarks


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


 



All times are GMT +1. The time now is 05:57.



Powered by Searchlight © 2024 Axivo Inc.
vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2024 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2023 -
Page generated in 0.44802 seconds with 10 queries

SEO by vBSEO