GSM Shop  
GSM Shop GSM Shop
GSM-Forum  

Welcome to the GSM-Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features.
Only registered members may post questions, contact other members or search our database of over 8 million posts.

Registration is fast, simple and absolutely free so please - Click to REGISTER!

If you have any problems with the registration process or your account login, please contact contact us .

Go Back   GSM-Forum > Product Support Sections > Special Solutions / Services / WebShop > GSMFABRICA Products > HYDRA TOOL

Reply
 
LinkBack Thread Tools Display Modes
Old 05-20-2021, 12:35   #1891 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,626
Huawei FRL-L22(Y9A 2021) Removing Account successfully done by Hydra Tool


Huawei FRL-L22(Y9A 2021) Removing Account successfully done by Hydra Tool


1. Run Hydra MTK Module and choose Sosc.
2. Choose Brand and Module.
3. Go to "Service"-->"Tool" Tab.
4. Choose "Huawei"
5. Choose "|Remove Account" from "Module / Option" of drop down menu.
6. Click on "Execute"
8. connect device to the computer with USB Data cable
7. Wait until the process is completed.



Screen Shorts




Logs


Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port (COM4)
Device :5&215197d9&0&2
SymbolicName :\??\USB#VID_0E8D&PID_0003#5&215197d9&0&2#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2016,3.2


Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : CAB41B4BBD1D04803C178183E02F771C
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000001D1F000000 -116.484 GB
eMMC CID : 90014A6844456150330110290B457745 - hDEaP3

Reading GPT-EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Remove Account
Processing...
Backing up Partition for safety...
-oeminfo_052021114618.bin[0x09600000]32 MB ->oeminfo_052021114618.bin...Ok Ok

Elapsed Time : 00:00:08
BR
Dipendra Pathak
  Reply With Quote
Old 05-20-2021, 13:08   #1892 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,626
Oppo A12 (CPH 2083) formatting user data successfully done by Hydra Tool

Oppo A12 (CPH 2083) formatting user data successfully done by Hydra Tool


1. Run Hydra MTK Tool.
2. Choose Module and Brand.
3. Go to "Service"--> "Tool"
4. Choose "Factory Format / Format user data"
5. Choose "Auto" from Module / Option from deop down menu.
6. Click on "Execute"
7. Connect device with computer using Data Cable.
8. Wait Operation is completed.



Screen Shorts




Logs


Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port_V1632 (COM35)
Device :5&15e2f4ed&0&4
SymbolicName :\??\USB#VID_0E8D&PID_0003#5&15e2f4ed&0&4#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0


Reading Device UniqueID, RAM and Flash Chip Info...
ERROR : ACK : 0xC0010004[STATUS_UNSUPPORT_CTRL_CODE]

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Vendor : OPPO
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6765_19451-user 9 PPR1.180610.011 eng.root.20210403.000938 release-keys
Security Patch : 2021-04-05
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Erase Userdata
Processing...
Erasing FRP Partition...
Formatting Userdata... Ok

Elapsed Time : 00:00:05
BR
Dipendra Pathak
  Reply With Quote
The Following User Says Thank You to Dipendra Pathak For This Useful Post:
Old 05-21-2021, 11:54   #1893 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,626
Another Xiaomi Redmi 6a Mi Account successfully Removed by Hydra Tool

Another Xiaomi Redmi 6a Mi Account successfully Removed by Hydra Tool


1. Run Hydra MTK Module and choose "Sosc"
2. Select Brand and Model as "Auto"
3. Go to Service-->Tools-->Xiaoami
4. Choose "Remove Mi Account + FRP" from "Method / Option" drop down menu
5. Execute and connect the device to the computer with data cable
6. wait until the process is completed
.


Screen Shorts




Logs


Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port_V1632 (COM4)
SymbolicName :\??\USB#VID_0E8D&PID_0003#5&319c6900&0&2#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0766MT6765[6765]
BROM HW_SW_VER : 8A00 CA00 0000 0000
getMTKPayloadExploit : 0766
#Executing Exploit..
#SUCCESS..
Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0766MT6765[6765]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
SECURE VERSION : 05
BL VERSION : FE
BR Secured : E0

Preparing Download Agent..
DA : 6765_SWSEC_56EC405E9E.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2018/04/19.10:40_426269
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_cactus.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 92494D2C8EFDE5B91ADCD27475479A6A
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000020000000 -512 MB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003A3E00000 -14.561 GB
eMMC CID : 150100514536334D4203B3CAC6387579 - QE63MB

DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi 6A
ID : O11019
SDK : 27
Release : 8.1.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : zh-CN
Description : cactus-user 8.1.0 O11019 V9.6.11.0.OCBCNFD release-keys
Miui Ver : V9
Device : cactus
Display ID : O11019
Security Patch : 2018-07-01
Fingerprint : xiaomi/cactus/cactus:8.1.0/O11019/V9.6.11.0.OCBCNFD:user/release-keys
StorageType : mtp
Userdata State : Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_cactus.bin
Creating Scatter file... C:\HydraTool\\Backup\Auto\0766_xiaomi_cactus_cactu s_8.1.0_O11019_V9.6.11.0.OCBCNFD_052121112404\MT67 65_Android_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x05588000]1024 KB ->frp.bin...Ok
-nvdata[0x07688000]64 MB ->nvdata.bin...Ok
-persist[0x0F000000]64 MB ->persist.bin...Ok
-nvram[0x1BE80000]64 MB ->nvram.bin...Ok
Done!!!
C:\HydraTool\\Backup\Auto\0766_xiaomi_cactus_cactu s_8.1.0_O11019_V9.6.11.0.OCBCNFD_052121112404
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 92494D2C8EFDE5B91ADCD27475479A6A
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000020000000 -512 MB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003A3E00000 -14.561 GB
eMMC CID : 150100514536334D4203B3CAC6387579 - QE63MB

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi 6A
ID : O11019
SDK : 27
Release : 8.1.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : zh-CN
Description : cactus-user 8.1.0 O11019 V9.6.11.0.OCBCNFD release-keys
Miui Ver : V9
Device : cactus
Display ID : O11019
Security Patch : 2018-07-01
Fingerprint : xiaomi/cactus/cactus:8.1.0/O11019/V9.6.11.0.OCBCNFD:user/release-keys
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Remove MiAccount[Erase Method] + FRP
Processing...
-persist.bin[0x0F000000]64 MB ->persist.bin...Ok
-frp.bin[0x05588000]1024 KB ->frp.bin...Ok
Redmi 6A_8.1.0_052121112500
Backing up Partition for safety...
-Redmi 6A_8.1.0_052121112500[0x0F000000]64 MB ->persist.img...OkOk
Saved to :
C:\HydraTool\Backup\Persist\Redmi 6A_8.1.0_052121112500.bin
Erasing FRP Partition...
-persist.bin[0x0F000000]64 MB ->persist.bin...Ok
-frp.bin[0x05588000]1024 KB ->frp.bin...Ok Ok

Elapsed Time : 00:01:45
BR
Dipendra Pathak
  Reply With Quote
The Following User Says Thank You to Dipendra Pathak For This Useful Post:
Old 05-21-2021, 12:10   #1894 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,626
Huawei MRD-LX2 (Y6 2019) Removing account successfully done by Hydra Tool

Huawei MRD-LX2 (Y6 2019) Removing account successfully done by Hydra Tool


1. Run Hydra MTK Module and choose Sosc.
2. Choose Brand and Module.
3. Go to "Service"-->"Tool" Tab.
4. Choose "Huawei"
5. Choose "Remove Account" from "Module / Option" of drop down menu.
6. Click on "Execute"
8. connect device to the computer with USB Data cable
7. Wait until the process is completed.




Screen Shorts




Logs


Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port_V1632 (COM38)
SymbolicName :\??\USB#VID_0E8D&PID_0003#6&16afa01a&0&2#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0717MT6761[6761]
BROM HW_SW_VER : 8A00 CA01 0200 0000
getMTKPayloadExploit : 0717
#Executing Exploit..
#SUCCESS..
Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0717MT6761[6761]
BROM HW_SW_VER : 8A00 CA01 0200 0000
FUSEID : 00000000
SECURE VERSION : 05
BL VERSION : FE
BR Secured : E0

Preparing Download Agent..
DA : Huawei_Y9Pro_6761_DA.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2018/10/18.17:38_452898
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_k61v1_64_mexico.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 33326FE746F4F1E997E86EF041AE3317
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 150100474436424D42024C576AF2C573 - GD6BMB

DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_k61v1_64_mexico.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0717__052121145455\MT6761_Androi d_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x00108000]1024 KB ->frp.bin...Ok
-nvdata[0x00A08000]16 MB ->nvdata.bin...Ok
-persist[0x03800000]8 MB ->persist.bin...Ok
-nvram[0x04400000]5 MB ->nvram.bin...Ok
-oeminfo[0x04900000]32 MB ->oeminfo.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0717__052121145455
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 33326FE746F4F1E997E86EF041AE3317
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 150100474436424D42024C576AF2C573 - GD6BMB

Reading GPT-EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Remove Account
Processing...
Backing up Partition for safety...
-oeminfo_052121145527.bin[0x04900000]32 MB ->oeminfo_052121145527.bin...Ok Ok

Elapsed Time : 00:01:03
BR
Dipendra Pathak
  Reply With Quote
The Following User Says Thank You to Dipendra Pathak For This Useful Post:
Old 05-21-2021, 12:26   #1895 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,626
Huawei MED-L49 (Y6P) restore OEM info successfully done by Hydra Tool

Huawei MED-L49 (Y6P) restore OEM info successfully done by Hydra Tool



1. Run MTK Hydra Tool.
2. Choose "Brand" and "Module".
3. Go to "Service"--> "Tool"
4. Choose "Huawei"
5. Chose "Restore OEM Info" from "Method/ Option" drop down option.
6. Click "Execute".
7. Connect Device to computer using USB Data Cable.
8. Wait until the operation is completed.


Screen Shorts




Logs


Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port_V1632 (COM71)
Device :5&dc4a972&0&9
SymbolicName :\??\USB#VID_0E8D&PID_0003#5&dc4a972&0&9#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0766MT6765 [6765]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : E5
SB : 01 (True)
SLA : 00 (False)
DAA : 04 (True)

Exploiting Device...
Exploit Sent..
Successfully Exploited...

Handshaking...Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0766MT6765 [6765]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : 00
SB : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
FUSEID : 00000000
SECURE VERSION : 00
BL VERSION : FE
NORMAL BOOT

Preparing Download Agent..
DA : MT6765_Huawei_MED.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2018/10/18.17:38_452898
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...[ERROR]- NOT SYNC
=============================================
Reasons why it fails due to the following"
1. Harware problem/issues
2. If you did Testpoint Kindly check the parts you Touch/TP
3. Powershortage, try to connect Battery
4. Check or replace usb cable and plug directly to your pc usb port.
=============================================
SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_k62v1_64_mexico.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : F25DE6B194AFA41F929758AE0466F85F
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 150100525036344D4201A15597BE87C3 - RP64MB

DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_k62v1_64_mex_a32.bin
Creating Scatter file... D:\hydra tool\HydraTool_Fullpackage_05-06-2021\\Backup\Auto\0766__052121130235\MT6765_Androi d_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x00108000]1024 KB ->frp.bin...Ok
-nvdata[0x00A08000]16 MB ->nvdata.bin...Ok
-protect1[0x01A08000]8 MB ->protect1.bin...Ok
-protect2[0x02208000]13.969 MB ->protect2.bin...Ok
-persist[0x03800000]8 MB ->persist.bin...Ok
-nvram[0x04400000]5 MB ->nvram.bin...Ok
-oeminfo[0x04900000]32 MB ->oeminfo.bin...Ok
Done!!!
D:\hydra tool\HydraTool_Fullpackage_05-06-2021\\Backup\Auto\0766__052121130235
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : F25DE6B194AFA41F929758AE0466F85F
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 150100525036344D4201A15597BE87C3 - RP64MB

Reading GPT-EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Restore OEM Info
Processing... Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:03:00
BR
Dipendra Pathak
  Reply With Quote
Old 05-21-2021, 12:39   #1896 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,626
Huawei DRA-LX9 (Y5P 2020) account successfully removed by Hydra Tool

Huawei DRA-LX9 (Y5P 2020) account successfully removed by Hydra Tool


1. Run Hydra MTK Module and choose Sosc.
2. Choose Brand and Module.
3. Go to "Service"-->"Tool" Tab.
4. Choose "Huawei"
5. Choose "Remove Account" from "Module / Option" of drop down menu.
6. Click on "Execute"
8. connect device to the computer with USB Data cable
7. Wait until the process is completed.


Screen Shorts




Logs


Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port (COM13)
Device :5&10190957&0&2
SymbolicName :\??\USB#VID_0E8D&PID_0003#5&10190957&0&2#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2016,3.2

Handshaking...Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0766MT6765 [6765]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : E5
SB : 01 (True)
SLA : 00 (False)
DAA : 04 (True)

Exploiting Device...
Exploit Sent..
Successfully Exploited...

Handshaking...Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0766MT6765 [6765]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : 00
SB : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
FUSEID : 00000000
SECURE VERSION : 05
BL VERSION : FE
NORMAL BOOT

Preparing Download Agent..
DA : MT6765_Huawei_MED.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2018/10/18.17:38_452898
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...[ERROR]- NOT SYNC
=============================================
Reasons why it fails due to the following"
1. Harware problem/issues
2. If you did Testpoint Kindly check the parts you Touch/TP
3. Powershortage, try to connect Battery
4. Check or replace usb cable and plug directly to your pc usb port.
=============================================
SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_k62v1_64_mexico.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 56B83ACAACBA141F3FD881E73E629A00
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29,121 GB
eMMC CID : 90014A68423861503E01002E73F8575F - hB8aP>

DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_k62v1_64_mex_a32.bin
Creating Scatter file... C:\Users\Servipcell-1\Downloads\Compressed\HydraTool_Fullpackage_1-30-2021\\Backup\Auto\0766__052021203458\MT6765_Androi d_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x00108000]1024 KB ->frp.bin...Ok
-nvdata[0x00A08000]16 MB ->nvdata.bin...Ok
-protect1[0x01A08000]8 MB ->protect1.bin...Ok
-protect2[0x02208000]13,969 MB ->protect2.bin...Ok
-persist[0x03800000]8 MB ->persist.bin...Ok
-nvram[0x04400000]5 MB ->nvram.bin...Ok
-oeminfo[0x04900000]32 MB ->oeminfo.bin...Ok
Done!!!
C:\Users\Servipcell-1\Downloads\Compressed\HydraTool_Fullpackage_1-30-2021\\Backup\Auto\0766__052021203458
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 56B83ACAACBA141F3FD881E73E629A00
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29,121 GB
eMMC CID : 90014A68423861503E01002E73F8575F - hB8aP>

Reading GPT-EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Remove Account
Processing...
Backing up Partition for safety...
-oeminfo_052021203520.bin[0x04900000]32 MB ->oeminfo_052021203520.bin...Ok Ok

Elapsed Time : 00:02:10
BR
Dipendra Pathak
  Reply With Quote
Old 05-21-2021, 12:52   #1897 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,626
Huawei FRL-L23 (Y9A 2021) restoring OEM info successfully done by Hydra Tool

Huawei FRL-L23 (Y9A 2021) restoring OEM info successfully done by Hydra Tool


1. Run MTK Hydra Tool.
2. Choose "Brand" and "Module".
3. Go to "Service"--> "Tool"
4. Choose "Huawei"
5. Chose "Restore OEM Info" from "Method/ Option" drop down option.
6. Click "Execute".
7. Connect Device to computer using USB Data Cable.
8. Wait until the operation is completed.




Screen Shorts




Logs


Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port (COM47)
Device :6&6f0c48d&0&1
SymbolicName :\??\USB#VID_0E8D&PID_0003#6&6f0c48d&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2016,3.2


Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : DC7A8B076F924BBB04ED4F16443C7FBC
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000001D1EC00000 -116,48 GB
eMMC CID : 1501004455544234320201DC5ADC1743 - DUTB42

Reading GPT-EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Restore OEM Info
Processing... Ok

Elapsed Time : 00:00:56
BR
Dipendra Pathak
  Reply With Quote
Old 05-21-2021, 13:10   #1898 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,626
Huawei ATU-L22(Y6 2018) EDL FRP successfully removed by Hydra Tool

Huawei ATU-L22(Y6 2018) EDL FRP successfully removed by Hydra Tool


- Run Hydra Qualcomm Module
- Select Model of your device (cellphone / mobile)
- Select Flashmode
- Tick" FRP Remove"
- Join the TP or Short the TP of Device (you need to disassemble the device).
- Click Execute kay
- Connect USB Cable
- DONE



Screen Shorts





Test Point


Logs


Quote:
PreOperation Configuration
Brand : HUAWEI Model : ATU-L22 (Y6 2018) Storage : Auto
Loader: Huawei-ATU-Y6.mbn
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM7)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&1e7d8db7&0&5#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/31/2015,2.1.2.0

Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8917
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 847850672
Firmware Version : 858796104
Product Name : HAG4a2
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 30777344[14.676 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok

Phone Information.....
Vendor : unknown
ID : OPR6.170623.013
SDK : 26
Release : 8.0.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : generic_a53-user 8.0.0 OPR6.170623.013 eng.root.20200225.190715 test-keys
Display ID : System 8.0.0.073(091X)
Security Patch : 2020-02-01
Fingerprint : Huawei/generic_a53/generic_a53:8.0.0/OPR6.170623.013/root02251907:user/test-keys

Reading GPT[3]
Drive [0] 56 Items
Drive [1] 0 Items
Drive [2] 0 Items

Removing FRPta...
Method :
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOkOk

Elapsed Time : 00:00:04
BR
Dipendra Pathak
  Reply With Quote
Old 05-22-2021, 14:01   #1899 (permalink)
No Life Poster
 
Gsm-Ahmed's Avatar
 
Join Date: Jan 2020
Location: Algeria
Posts: 847
Member: 2944109
Status: Offline
Thanks Meter: 713
C-idea CM800 Remove Lock Without Data Loss

C-idea CM800 Remove Lock Without Data Loss



Code:
Brand : AUTO Model : AUTO Connection : Flash Mode

=====================================
Connection
 -Please wait...
 -Found...[COM5]

TPortConnection.Create...(COM5)..Opening...Ok


Reading System Info
  Brand          : alps
  Vendor         : alps
  Model          : CM800
  ID             : LRX21M
  SDK            : 21
  Release        : 6.1
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Description    : full_b906-user 5.1 LRX21M 1575957105 test-keys
  Device         : CM800
  Display ID     : LRX21M test-keys
  Platform       : mt6582
  Fingerprint    : alps/full_b906/b906:5.1/LRX21M/1575957105:user/test-keys
  StorageType    : mtp,mass_storage
  Userdata State : Not Encrypted

-------------------------------------
Operation : Remove Lock Without Data Loss
Processing...
Searching patching address.. [Ok].. [Ok].. [Ok].. [Ok].. [Ok] Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:04
  Reply With Quote
Old 05-22-2021, 14:02   #1900 (permalink)
No Life Poster
 
Gsm-Ahmed's Avatar
 
Join Date: Jan 2020
Location: Algeria
Posts: 847
Member: 2944109
Status: Offline
Thanks Meter: 713
OPPO A71 (2018) CPH1801 Format Userdata By HydraTool

OPPO A71 (2018) CPH1801 Format Userdata By HydraTool



Code:
PreOperation Configuration 
 Brand : OPPO Model : A71 (2018) CPH1801 Storage : Auto
 Loader: a71_firehose.bin
 Port  : Auto
 Connection  : 

Searching for Qualcomm 9008 Device...Found
 FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM20)
 SymbolicName :\??\USB#VID_05C6&PID_9008#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :08/02/2017,2.1.2.7

0x2011F9DC
Getting device info......
Serial No.: 0x2080D522
MSM ID : 0x0009A0E1, SDM450-Qualcomm Snapdragon 450
PBL Ver : 00000000
PK HASH : 05F06BA44EEB2ABDF14BB644AABC2E69
3DDF7B8711CC7CF07D4CD0EB2E1A8728

Firehose Loader[a71_firehose.bin]
SaharaBoot... Ok
Sending ..................Ok
Connecting to Firehose...
Ping... Ok
Configuration.
<?xml version="1.0" encoding="UTF-8" ?><data><log value="logbuf@0x0806CD20 fh@0x08069B88" /></data>.
<?xml version="1.0" encoding="UTF-8" ?><data><response value="ACK" MinVersionSupported="1" MemoryName="eMMC" MaxPayloadSizeFromTargetInBytes="4096" MaxPayloadSizeToTargetInBytes="1048576" MaxPayloadSizeToTargetInBytesSupported="1048576" MaxXMLSizeInBytes="4096" Version="1" TargetName="8953" /></data>.
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8953
Version : 1

Protocol : Universal
Running : Ok
Processing A71 Format Userdata....
Action Result : Ok

Rebooting Phone.... Ok

Elapsed Time : 00:00:04
  Reply With Quote
Old 05-22-2021, 14:03   #1901 (permalink)
No Life Poster
 
Gsm-Ahmed's Avatar
 
Join Date: Jan 2020
Location: Algeria
Posts: 847
Member: 2944109
Status: Offline
Thanks Meter: 713
Xiaomi Redmi Note 9 Ultra Power Option

Xiaomi Redmi Note 9 Ultra Power Option



Code:
Searching for MTK Device...Found
 Port Identification :Flashmode BROM 
 FriendlyName :MediaTek USB Port (COM38)
 SymbolicName :\??\USB#VID_0E8D&PID_0003#6&944c330&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
 BROM CPUID     : 0707MT6768[6768]
 BROM HW_SW_VER : 8A00 CA00 0000 0000 
 getMTKPayloadExploit : 0707
 #Executing Exploit..
 #SUCCESS..
Handshaking...Ok

Identifying Hardware ID.....
 BROM CPUID     : 0707MT6768[6768]
 BROM HW_SW_VER : 8A00 CA00 0000 0000 
 FUSEID         : 00000000
 SECURE VERSION : 05 
 BL VERSION     : FE 
 BR Secured     : E0

Preparing Download Agent..
 DA   : MT6768_Xiaomi_New.bin
 Agent: MTK_DOWNLOAD_AGENT -HYDRA
 Ver  : MTK_AllInOne_DA_v3.3001.2020/07/07.10:10_513994
 Init : Loader [1]
 Sending : Accepted

Identifying Protocol...
 Protocol : New
 Synchronization...SYNC
 Mode : brom
 Preloader Initialization...
 Parsing preloader_merlin.bin
 Init : Accepted

Execute Secondary Loader
 Init : Loader [2]
 Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
 UNIQUE ID  : B267EB411777C40E7CE767D3147026D9
 ERAM Size  : 0x0000000000070000 -448 KB
 IRAM Size  : 0x0000000100000000 -4 GB
 eMMC BOOT1 : 0x0000000000400000 -4 MB
 eMMC BOOT2 : 0x0000000000400000 -4 MB
 eMMC RPMB  : 0x0000000001000000 -16 MB
 eMMC USER  : 0x0000000E8F800000 -58,242 GB
 eMMC CID   : 13014E53304A394A38101EAFCF3E77C3 - S0J9J8

DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
   -> Renaming Preloader....  preloader_merlin.bin
   Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0707__050221173452\MT6768_Android_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x05508000]1024 KB ->frp.bin...Ok
-nvdata[0x0C4A2000]64 MB ->nvdata.bin...Ok
-persist[0x104A2000]48 MB ->persist.bin...Ok
-nvram[0x19F80000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0707__050221173452
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
 UNIQUE ID  : B267EB411777C40E7CE767D3147026D9
 ERAM Size  : 0x0000000000070000 -448 KB
 IRAM Size  : 0x0000000100000000 -4 GB
 eMMC BOOT1 : 0x0000000000400000 -4 MB
 eMMC BOOT2 : 0x0000000000400000 -4 MB
 eMMC RPMB  : 0x0000000001000000 -16 MB
 eMMC USER  : 0x0000000E8F800000 -58,242 GB
 eMMC CID   : 13014E53304A394A38101EAFCF3E77C3 - S0J9J8

Reading GPT-EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition...
Safeformat Universal... Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:44
  Reply With Quote
Old 05-22-2021, 14:04   #1902 (permalink)
No Life Poster
 
Gsm-Ahmed's Avatar
 
Join Date: Jan 2020
Location: Algeria
Posts: 847
Member: 2944109
Status: Offline
Thanks Meter: 713
Lenovo C2 (K10a40) Remove Lock Without Data Loss

Lenovo C2 (K10a40) Remove Lock Without Data Loss



Code:
Brand : LENOVO Model : K10a40 (Lenovo C2) Connection : Flash Mode

=====================================
How To Boot : Power off phone
 * BROM Mode : Press VOL +
 * Preloader Mode : Just Insert cable

Connection
 -Please wait...
 -Connect Phone...
 -Found...
 -PreLoader...[COM4]

TPortConnection.Create...(COM4)..Opening...Ok

Handshaking...Ok

Identifying Hardware ID.....
 BROM CPUID     : 0335 (0000)MT6737[6735]
 BROM HW_SW_VER : 8A00 CB00 0000 0000 

Handshaking...

Identifying Hardware ID.....
 BROM CPUID     : 0335 (0000)MT6737[6735]
 BROM HW_SW_VER : 8A00 CB00 0000 0000 
 FUSEID         : 00000000
 SECURE VERSION : 00 
 BL VERSION     : 00 
 BR Secured     : 01
NORMAL BOOT

Preparing Download Agent..
 DA   : 6735_SWSEC_Lenovo_3.bin
 Agent: MTK_DOWNLOAD_AGENT -HYDRA
 Ver  : MTK_AllInOne_DA_v3.3001.00.00
 Init : Loader [1]
 Sending : Accepted

Identifying Protocol...
 Protocol : Old - eMMC
00000000000000000000
PRMMCCID   : 460001154D3232377C890042658E39D6
Init Configuration
Running DA 4.2 on BBID : 0x93 Ok

Initializing Loader [2]
Sending Loader [2] Accepted
Reading Flashchip data....
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB  : 0x0000000000080000 -512 KB
eMMC USER  : 0x00000001D2000000 -7,281 GB
ERAM Size  : 0x0000000040000000 -1024 MB
IRAM Size  : 0x0000000000020000 -128 KB
UNICAL RID : CDD0FC3DCAFE19F4C9E5085B62911777
eMMC CID   : 460001154D3232377C890042658339D6
Change to HIGH SPEED...
5A
Connection
 -Please wait...
 -Found...[COM5]


Reading Partition Table
SIZE[0x000007E8] 23 Items > Done

Reading System Info
  Brand          : Lenovo
  Vendor         : LENOVO
  Model          : Lenovo K10a40
  ID             : MRA58K
  SDK            : 23
  Release        : 6.0
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Locale         : en-US
  Description    : full_lcsh6735m_35u_m-user 6.0 MRA58K 1472611130 release-keys
  Device         : K10a40
  Display ID     : K10a40_S003_160809_ROW_DJEZZY
  Security Patch : 2016-09-05
  Platform       : mt6735m
  FRPPST         : /dev/block/platform/mtk-msdc.0/11230000.msdc0/by-name/frp
  Fingerprint    : Lenovo/K10a40/K10a40:6.0/MRA58K/K10a40_S003_160831_ROW_DJEZZY:user/release-keys
  StorageType    : mtp,mass_storage
  Userdata State : Not Encrypted

Autobackup Partitions
 -preloader[0x00000000] 512 KB -> preloader.bin...Ok
   -> Renaming Preloader....  preloader_lcsh6735m_35u_m.bin
   Creating Scatter file... C:\Hydra 1.0.2.60\Hydra Tool\\Backup\Auto\Lenovo_Lenovo K10a40_0335-mt6735m-6.0_K10a40_S003_160809_ROW_DJEZZY_030521114015\MT6737_Android_scatter.txt
 -nvram[0x00380000] 5 MB -> nvram.bin...Ok
 -frp[0x06A00000] 1024 KB -> frp.bin...Ok
 -nvdata[0x06B00000] 32 MB -> nvdata.bin...Ok
Done!!!
C:\Hydra 1.0.2.60\Hydra Tool\\Backup\Auto\Lenovo_Lenovo K10a40_0335-mt6735m-6.0_K10a40_S003_160809_ROW_DJEZZY_030521114015
MTK Phone Loader is NOW RUNNING.

TPortConnection.Destroy.....Closing...Ok..
=====================================

Elapsed Time : 00:00:19



Code:
Brand : LENOVO Model : K10a40 (Lenovo C2) Connection : Flash Mode

=====================================
Connection
 -Please wait...
 -Found...[COM5]

TPortConnection.Create...(COM5)..Opening...Ok


Reading System Info
  Brand          : Lenovo
  Vendor         : LENOVO
  Model          : Lenovo K10a40
  ID             : MRA58K
  SDK            : 23
  Release        : 6.0
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Locale         : en-US
  Description    : full_lcsh6735m_35u_m-user 6.0 MRA58K 1472611130 release-keys
  Device         : K10a40
  Display ID     : K10a40_S003_160809_ROW_DJEZZY
  Security Patch : 2016-09-05
  Platform       : mt6735m
  FRPPST         : /dev/block/platform/mtk-msdc.0/11230000.msdc0/by-name/frp
  Fingerprint    : Lenovo/K10a40/K10a40:6.0/MRA58K/K10a40_S003_160831_ROW_DJEZZY:user/release-keys
  StorageType    : mtp,mass_storage
  Userdata State : Not Encrypted

-------------------------------------
Operation : Remove Lock Without Data Loss
Processing...
Searching patching address.. [Ok].. [Ok].. [Ok].. [Ok].. [Ok] Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:04
  Reply With Quote
Old 05-22-2021, 14:05   #1903 (permalink)
No Life Poster
 
Gsm-Ahmed's Avatar
 
Join Date: Jan 2020
Location: Algeria
Posts: 847
Member: 2944109
Status: Offline
Thanks Meter: 713
Condor P8 Lite [PGN-610] Ultra Power Option

Condor P8 Lite [PGN-610] Ultra Power Option



Code:
Searching for MTK Device...Found
 Port Identification :DA_HIGHSPEED_VCOM
 FriendlyName :MediaTek DA USB VCOM (Android) (COM5)
 SymbolicName :\??\USB#VID_0E8D&PID_2001#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0



Reading System Info
  Brand          : condor
  Vendor         : SPA Condor Electronics
  Model          : PGN610
  ID             : NRD90M
  SDK            : 24
  Release        : 7.0
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : fr-FR
  Description    : full_gnsz6737t_66_n-user 7.0 NRD90M 1535626513 release-keys
  Device         : PGN610
  Board          : PGN610
  Display ID     : PGN610
  Security Patch : 2018-08-05
  Platform       : mt6737t
  FRPPST         : /dev/block/platform/mtk-msdc.0/11230000.msdc0/by-name/frp
  Fingerprint    : condor/PGN610/PGN610:7.0/NRD90M/1535626513:user/release-keys
  StorageType    : mtp
  Userdata State : Not Encrypted

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition... [Ok]
Safeformat Universal...(tmp.bin)512 Bytes Ok Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:03
  Reply With Quote
Old 05-22-2021, 14:06   #1904 (permalink)
No Life Poster
 
Gsm-Ahmed's Avatar
 
Join Date: Jan 2020
Location: Algeria
Posts: 847
Member: 2944109
Status: Offline
Thanks Meter: 713
OPPO A33F (Neo 7) Read Pattern Code

OPPO A33F (Neo 7) Read Pattern Code



Code:
PreOperation Configuration 
 Brand : OPPO Model : A33F (Neo 7) Storage : Auto
 Loader: 8916.mbn
 Port  : Auto
 Connection  : 

Searching for Qualcomm 9008 Device...Found
 FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM10)
 SymbolicName :\??\USB#VID_05C6&PID_9008#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/04/2013,2.1.0.5

Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok 
Configuration.......
Identifying Chip....
Ok
Chip Configuration :
 MemoryName : eMMC
 MaxPayloadSizeToTargetInBytes : 16384
 MaxPayloadSizeToTargetInBytesSupported : 16384
 MaxPayloadSizeFromTargetInBytes : 4096
 MaxXMLSizeInBytes : 4096
 TargetName : 8916
 Version : 1


Protocol : Universal
Running : Ok
 
Phone Information.....
  Brand          : OPPO
  Vendor         : OPPO
  Model          : A33f
  ID             : LMY47V
  SDK            : 22
  Release        : 5.1.1
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Description    : msm8916_32-user 5.1.1 LMY47V eng.root.20170531 release-keys
  Device         : A33
  Board          : msm8916
  Display ID     : A33fEX_11_170531
  Security Patch : 2017-04-01
  Platform       : msm8916
  FRPPST         : /dev/block/bootdevice/by-name/config

Reading GPT[3]
          Drive [0] 40 Items
          Drive [1] 0 Items
          Drive [2] 4 Items

Operation : ScreenLock Security
Read Pattern 
Processing... 
Trying to search : gatekeeper.pattern.key
Trying to search :  personalpattern.key
Trying to search : cm_gesture.key
Trying to search : gesture.key FOUND
Gesture Data : 0AE21E5011AC665E93189D7700251654222C5A78
Bruteforcing pattern hash..Please wait for few seconds
Pattern Code : 14752369
1 2 3
4 5 6
7 8 9


Ok

Elapsed Time : 00:00:05
  Reply With Quote
Old 05-22-2021, 14:07   #1905 (permalink)
No Life Poster
 
Gsm-Ahmed's Avatar
 
Join Date: Jan 2020
Location: Algeria
Posts: 847
Member: 2944109
Status: Offline
Thanks Meter: 713
Condor P8 Lite (PGN-610) Flash system.img Partition Done

Condor P8 Lite (PGN-610) Flash system.img Partition Done




BOOT/INFO

  Reply With Quote
Reply

Bookmarks

Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


 



All times are GMT +1. The time now is 05:38.



Powered by Searchlight © 2025 Axivo Inc.
vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2025 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2023 -
Page generated in 0.40912 seconds with 9 queries

SEO by vBSEO