GSM Shop GSM Shop
GSM-Forum  

Welcome to the GSM-Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features.
Only registered members may post questions, contact other members or search our database of over 8 million posts.

Registration is fast, simple and absolutely free so please - Click to REGISTER!

If you have any problems with the registration process or your account login, please contact contact us .

Go Back   GSM-Forum > Product Support Sections > Special Solutions / Services / WebShop > GSMFABRICA Products > HYDRA TOOL


Reply
 
LinkBack Thread Tools Display Modes
Old 11-10-2021, 09:04   #2716 (permalink)
No Life Poster
 
Join Date: May 2011
Posts: 1,322
Member: 1576733
Status: Offline
Thanks Meter: 622
Vivo Y91i Factory Reset done by Hydra


Vivo Y91i Factory Reset done by Hydra



Quote:
=====================================
Searching for MTK Device... Found
Port Identification : Flashmode Preloader
FriendlyName : MediaTek PreLoader USB VCOM (Android) (COM5)
Device : 6&1f400921&0&5
SymbolicName :??USB#VID_0E8D&PID_2000#6&1f400921&0&5#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2016,3.0.1504.0

Opened handle..
Handshaking... Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0766 MT6765 [6765]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : 05
SBC : 01 (True)
SLA : 00 (False)
DAA : 04 (True)
SWJTAG : 04 (True)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)
FUSEID : 00000000
SECURE VERSION : FF
BL VERSION : 03

Preing Download Agent..
DA : 6765_SWSEC_9FAA6CBA20.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2018/03/20.21:08_402229+403250
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization... SYNC
Mode : preloader

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : EF9E05CD1008259A7B3F0D5F7E7D4725
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000020000000 -512 MB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 90014A68423861503E03A6B9F00F8673 - hB8aP>

DA Speed : high-speed

Reading GPT0 -EMMC [0x00008000] 0 130 Items

Reading System Info
Brand : vivo
Vendor : vivo
Model : vivo 1820
ID : O11019
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_k62v1_64_bsp-user 8.1.0 O11019 1589614643 release-keys
Device : PD1818HF_EX
Display ID : O11019 release-keys
Security Patch : 2020-04-05
Platform : =MTK6765
Fingerprint : vivo/1820/1820:8.1.0/O11019/1589614643:user/release-keys
StorageType : mtp
Userdata State : Encrypted
0
Autobackup titions
-preloader [0x00000000] 512 KB -> preloader.bin... Ok0
-> Renaming Preloader.... preloader_k62v1_64_bsp.bin0
Creating Scatter file... C:Hydra ToolBackupAuto0766_vivo_1820_1820_8.1.0_O11019_158 9614643_111021114626MT6765_Android_scatter.txt
-pgpt [0x00000000] 32 KB -> pgpt.bin... Ok
-frp [0x05588000] 1024 KB -> frp.bin... Ok
-nvdata [0x07688000] 64 MB -> nvdata.bin... Ok
-protect1 [0x16A88000] 8 MB -> protect1.bin... Ok
-protect2 [0x17288000] 13.469 MB -> protect2.bin... Ok
-persist [0x18800000] 48 MB -> persist.bin... Ok
-nvram [0x25680000] 64 MB -> nvram.bin... Ok
Done!!!0
C:Hydra ToolBackupAuto0766_vivo_1820_1820_8.1.0_O11019_158 9614643_111021114626
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 1 EF9E05CD1008259A7B3F0D5F7E7D4725
ERAM Size : 1 0x0000000000040000 -256 KB
IRAM Size : 1 0x0000000020000000 -512 MB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 90014A68423861503E03A6B9F00F8673 - hB8aP>

Reading GPT0 -EMMC [0x00008000] 0 130 Items
0

Reading System Info
Brand : vivo
Vendor : vivo
Model : vivo 1820
ID : O11019
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_k62v1_64_bsp-user 8.1.0 O11019 1589614643 release-keys
Device : PD1818HF_EX
Display ID : O11019 release-keys
Security Patch : 2020-04-05
Platform : =MTK6765
Fingerprint : vivo/1820/1820:8.1.0/O11019/1589614643:user/release-keys
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Erase Userdata
Processing...
Formatting Userdata...
Action Result : 0 Ok

Elapsed Time : 00:00:48
  Reply With Quote
Old 11-11-2021, 09:06   #2717 (permalink)
No Life Poster
 
Join Date: May 2011
Posts: 1,322
Member: 1576733
Status: Offline
Thanks Meter: 622
Oppo A15 (CPH2185) Format Userdata & Frp Remove done by Hydra Tool

Oppo A15 (CPH2185) Format Userdata & Frp Remove done by Hydra Tool



Quote:
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port_V1633 (COM3)
Device : 6&944c330&0&5
SymbolicName :??USB#VID_0E8D&PID_0003#6&944c330&0&5#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0

Opened handle..

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : AA4A2CEBA15F83582DC5C43B7C38D65B
ERAM Size : 0x0000000000038000 -224 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29,121 GB
eMMC CID : 90014A68423861503E0300692709686F - hB8aP>

Reading GPT -EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP tition...
Safeformat Universal...
Action Result : Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:02
  Reply With Quote
Old 11-11-2021, 09:13   #2718 (permalink)
No Life Poster
 
Join Date: May 2011
Posts: 1,322
Member: 1576733
Status: Offline
Thanks Meter: 622
Redmi 5 Plus (vince) Edl Frp Remove done by Hydra Tool

Redmi 5 Plus (vince) Edl Frp Remove done by Hydra Tool



Quote:
Brand : XIAOMI Model : Redmi 5 Plus (vince) Storage : Auto
Loader: mi_3_1.mbn
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM37)
SymbolicName :??USB#VID_05C6&PID_9008#5&115a75a8&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed
Driver Ver : 08/02/2017,2.1.2.7

Getting device info .. Ok
Device MODE : Firehose
Connecting to Firehose...
Ping .. Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8953
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 1848760937
Firmware Version : 5
Product Name : RH64AB
Physical titions : 3
Total Logical Blocks:
Drive [0] 122142720 [58,242 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]

Protocol : Universal
Running : Ok

Phone Information .....
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi 5 Plus
ID : OPM1.171019.019
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : vince-user 8.1.0 OPM1.171019.019 V11.0.2.0.OEGMIXM release-keys
Miui Ver : V11
Device : vince
Mod_device : vince_global
Board : msm8953
Display ID : ZQL1711-vince-build-20191108142512
Security Patch : 2019-10-01
Emmc_size : 16GB
Platform : msm8953
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : xiaomi/vince/vince:8.1.0/OPM1.171019.019/V11.0.2.0.OEGMIXM:user/release-keys

Reading GPT[3]
Drive [0] 52 Items
Drive [1] 0 Items
Drive [2] 0 Items

Removing FRPta...
Method :
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOk Ok

Elapsed Time : 00:00:03

  Reply With Quote
Old 11-11-2021, 09:20   #2719 (permalink)
No Life Poster
 
Join Date: May 2011
Posts: 1,322
Member: 1576733
Status: Offline
Thanks Meter: 622
Oppo A15 (CPH2185) Bootloader Unlock With by Hydra

Oppo A15 (CPH2185) Bootloader Unlock With by Hydra



Quote:
=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port_V1633 (COM5)
Device : 5&36a3b657&0&4
SymbolicName :??USB#VID_0E8D&PID_0003#5&36a3b657&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0

Opened handle..

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : E021AEEB4EE8FB7390299824058F8850
ERAM Size : 0x0000000000038000 -224 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 90014A68423861503E03008F801EC763 - hB8aP>

Reading GPT -EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Unlock Bootloader
Processing...
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------

Verifying status after operation...
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------
Action Result : Ok

Elapsed Time : 00:00:02
  Reply With Quote
Old 11-12-2021, 09:18   #2720 (permalink)
No Life Poster
 
Join Date: May 2011
Posts: 1,322
Member: 1576733
Status: Offline
Thanks Meter: 622
Huawei Y6 2018 (ATU-L22) Edl Frp Remove

Huawei Y6 2018 (ATU-L22) Edl Frp Remove



Quote:
Brand : HUAWEI Model : ATU-L22 (Y6 2018) Storage : Auto
Loader: Huawei-ATU-Y6.mbn
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM12)
SymbolicName :??USB#VID_05C6&PID_9008#5&3b121705&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 08/02/2017,2.1.2.7

Getting device info .. Ok
Device MODE : Firehose
Connecting to Firehose...
Ping .. Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8917
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 1149325622
Firmware Version : 858796104
Product Name : HAG4a2
Physical titions : 3
Total Logical Blocks:
Drive [0] 30777344 [14.676 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]

Protocol : Universal
Running : Ok

Phone Information .....
Vendor : unknown
ID : OPR6.170623.013
SDK : 26
Release : 8.0.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : generic_a53-user 8.0.0 OPR6.170623.013 eng.root.20200707.022230 test-keys
Display ID : System 8.0.0.073(09LN)
Security Patch : 2020-02-01
Fingerprint : Huawei/generic_a53/generic_a53:8.0.0/OPR6.170623.013/root07070222:user/test-keys

Reading GPT[3]
Drive [0] 56 Items
Drive [1] 0 Items
Drive [2] 0 Items

Removing FRPta...
Method :
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOk Ok

Elapsed Time : 00:00:03
  Reply With Quote
Old 11-12-2021, 09:28   #2721 (permalink)
No Life Poster
 
Join Date: May 2011
Posts: 1,322
Member: 1576733
Status: Offline
Thanks Meter: 622
Redmi 9A (dandelion) Bootloader Unlock Done With by Hydra

Redmi 9A (dandelion) Bootloader Unlock Done With by Hydra



Quote:
=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port (COM4)
Device : 6&13c452c7&0&2
SymbolicName :??USB#VID_0E8D&PID_0003#6&13c452c7&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0

Opened handle..
Handshaking... Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0766 MT6765 [6765]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : E7
SBC : 01 (True)
SLA : 02 (True)
DAA : 04 (True)
SWJTAG : 06 (True)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 20 (True)
MEMWRITE : 40 (True)
CMD_C8 : 80 (True)

Exploiting Device...
Exploit Sent..
Successfully Exploited...
Handshaking... Ok

C:Hydra ToolBackupPreloader_dumpprel.tmp
Handshaking...

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0766 MT6765 [6765]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)

MEID : 41910650B0DFD3A9938B80BF960FBC47
Stage 1.. [Size:216440]
Sending : Please wait.. Accepted

Identifying Protocol...
Protocol : New
Synchronization... SYNC
Preloader Initialization...
sing prel.tmp
Init : Accepted
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 7AF5E6CE4B82E7C7BCA719A69D73092E
ERAM Size : 0x0000000000038000 -224 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 150100434A5444345204433A4D02C759 - CJTD4R
Executing : ACCEPTED...

Reading GPT -EMMC [0x00008000] 130 Items

Autobackup titions
-preloader [0x00000000] 512 KB -> preloader.bin...0 Ok
-> Renaming Preloader.... preloader_k62v1_64_bsp.bin
Creating Scatter file... C:Hydra ToolBackupAuto0766__111221092201MT6765_Android_sca tter.txt
-pgpt [0x00000000] 32 KB -> pgpt.bin...0 Ok
-frp [0x3BD88000] 1024 KB -> frp.bin...0 Ok
-nvdata [0x3DE88000] 64 MB -> nvdata.bin...0 Ok
-protect1 [0x45522000] 8 MB -> protect1.bin...0 Ok
-protect2 [0x45D22000] 10.867 MB -> protect2.bin...0 Ok
-persist [0x47000000] 48 MB -> persist.bin...0 Ok
-nvram [0x52E80000] 64 MB -> nvram.bin...0 Ok
Done!!!
C:Hydra ToolBackupAuto0766__111221092201
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 1 7AF5E6CE4B82E7C7BCA719A69D73092E
ERAM Size : 1 0x0000000000038000 -224 KB
IRAM Size : 1 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 150100434A5444345204433A4D02C759 - CJTD4R

Reading GPT -EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Unlock Bootloader
Processing...
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------

Verifying status after operation...
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------
Action Result : Ok

Elapsed Time : 00:00:41

  Reply With Quote
Old 11-12-2021, 09:35   #2722 (permalink)
No Life Poster
 
Join Date: May 2011
Posts: 1,322
Member: 1576733
Status: Offline
Thanks Meter: 622
Samsung B105E Read Screen Security Code done Hydra Tool

Samsung B105E Read Screen Security Code done Hydra Tool



Quote:

Port : [Auto] Scanning... COM7
Opening Port... (COM7) Ok
------------------------------------------
Screenlock Security...
------------------------------------------
Executing... Read Code/Passwords [NOR]
FlashID : [C81760] Size : 0x00800000
IMEI [1] : ***************
IMEI [2] : ***************
IMEI [3] : ***************
IMEI [4] : ***************

Scanning.....
Code[E8] : '02

Code[3C] : u134?tab
Code[E4] : u156?tab
Code[A4] : '03

Code[D4] : 'db'03
Code[64] : '04

Code[DC] : '04

Code[00] : '04'
Code[00] : '03'19
Code[00] : 09555277
Code[01] : 09555277
Code[00] : 09555277
Code[00] : 09555277
Code[01] : 09555277
Code[00] : 09555277
Code[00] : 09555277
Code[01] : 09555277

Action Result.. Ok

Elapsed Time : 00:00:37
  Reply With Quote
Old 11-13-2021, 09:08   #2723 (permalink)
No Life Poster
 
Join Date: May 2011
Posts: 1,322
Member: 1576733
Status: Offline
Thanks Meter: 622
Huawei Y7 2019 (DUB-LX3) Edl Frp Remove One Click With Hydra

Huawei Y7 2019 (DUB-LX3) Edl Frp Remove One Click With Hydra



Quote:
Brand : HUAWEI Model : DUB-LX3 (Y7 2019) Storage : Auto
Loader: 0009A0E100150065_6bc369511da9cadb_1a1074cf_HUAWEI_ QUALCOMM_peek_8953.fhprg
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM37)
SymbolicName :??USB#VID_05C6&PID_9008#6&2e2f5def&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 08/31/2015,2.1.2.0

Getting device info .. . ...
Serial No.: 0x49179709
HW_ID : 0009A0E100150065
MSM ID : 0x0009A0E1, SDM450-Qualcomm Snapdragon 450
MODEL_ID : 0x0065
OEM_ID : 0x0015 - HUAWEI
PBL Ver : 00000000
PK HASH : 6bc369511da9cadb3a7af61574f89db385003d6241bdd1ff57 3dba61bf6ae119

Firehose Loader [0009A0E100150065_6bc369511da9cadb_1a1074cf_HUAWEI_ QUALCOMM_peek_8953.fhprg]
--------------------------------------------------
Header Type : OLD
TargetMSM : 8953
Tag : _peek
Version : 3
Code_size : 288
Signature_size : 256
fhVendor : QUALCOMM
HW_ID : 0009A0E100150065
Vendor : HUAWEI
OEM_ID : 0015
MODEL_ID : 0065
SW_ID : 0000000000000003
APP_ID :
pk_hash : 6bc369511da9cadb3a7af61574f89db385003d6241bdd1ff57 3dba61bf6ae119
OEM_VERSION : SIA1000073848
IMAGE_VARIANT : JAADANAZA
QC_VERSION : BOOT.BF.3.3.2-00019
--------------------------------------------------

SaharaBoot... Ok
Sending .............b Okb0
Connecting to Firehose...
Ping ... Ok
Configuration.......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8953
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 2699913271
Firmware Version : 0
Product Name : RP64MB
Physical titions : 3
Total Logical Blocks:
Drive [0] 122142720 [58.242 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]

Protocol : Universal
Running : Ok

Phone Information .....
Vendor : unknown
ID : OPM1.171019.011
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : generic_a53-user 8.1.0 OPM1.171019.011 eng.jenkin.20201010.193302 test-keys
Display ID : System 8.2.0.036(0FCP)
Security Patch : 2020-09-01

Reading GPT[3]
Drive [0] 60 Items
Drive [1] 0 Items
Drive [2] 0 Items

Removing FRPta...
Method : 0
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOk Ok

Elapsed Time : 00:00:07
  Reply With Quote
Old 11-13-2021, 09:21   #2724 (permalink)
No Life Poster
 
Join Date: May 2011
Posts: 1,322
Member: 1576733
Status: Offline
Thanks Meter: 622
Vivo S1 Pro Edl Format Userdata -New UFS Chip

Vivo S1 Pro Edl Format Userdata -New UFS Chip



Quote:
Brand : VIVO Model : S1 Pro (PD1945F) Storage : Auto
Loader: Vivo_S1Pro_Final.elf
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM13)
SymbolicName :??USB#VID_05C6&PID_9008#6&8208cd3&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 08/02/2017,2.1.2.7

Getting device info .. Ok
Device MODE : Firehose
Connecting to Firehose...
Ping ..................... Ok
Configuration........
Identifying Chip.... ....UFS
Ok
Chip Configuration :
MemoryName : UFS
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Sep 9 2020 - 00:57:45

*** STORAGE DEVICE INFO ***
Memory Type : UFS
Block Size in Bytes : 4096
Page Size : 4096
Manufacturer ID : 462
Serial Number : 1297306958
Firmware Version : 900
Product Name : KM8V7001JA-B813
Physical titions : 6
Total Logical Blocks:
Drive [0] 30939136 [118.023 GB]
Drive [1] 2048 [8 MB]
Drive [2] 2048 [8 MB]
Drive [3] 16384 [64 MB]
Drive [4] 262144 [1024 MB]
Drive [5] 16384 [64 MB]

Protocol : Universal
Running : Ok

Phone Information ......
ID : RP1A.200720.012
SDK : 30
Release : 11
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Security Patch : 2021-07-01
Platform : =SM6125

Reading GPT[6]
Drive [0] 32 Items
Drive [1] 32 Items
Drive [2] 32 Items
Drive [3] 32 Items
Drive [4] 64 Items
Drive [5] 32 Items

Formatting Userdata...
Method :
Safe Format New - UFS
Processing...
- Formatting Userdata [Safe Format - UFS] Ok Ok

Elapsed Time : 00:00:06
  Reply With Quote
Old 11-13-2021, 09:47   #2725 (permalink)
No Life Poster
 
Join Date: May 2011
Posts: 1,322
Member: 1576733
Status: Offline
Thanks Meter: 622
Oppo A15s Factory Reset With by Hydra

Oppo A15s Factory Reset With by Hydra



Quote:
=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port (COM26)
Device : 6&17891eea&3&8
SymbolicName :??USB#VID_0E8D&PID_0003#6&17891eea&3&8#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2016,3.0.1504.0

Opened handle..
Handshaking... Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0766 MT6765 [6765]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : E5
SBC : 01 (True)
SLA : 00 (False)
DAA : 04 (True)
SWJTAG : 04 (True)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 20 (True)
MEMWRITE : 40 (True)
CMD_C8 : 80 (True)

Exploiting Device...
Exploit Sent..
Successfully Exploited...
Handshaking... Ok

C:Hydra ToolBackupPreloader_dumpprel.tmp
Handshaking...

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0766 MT6765 [6765]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)

MEID : 7D9D1FE7EAF33861D77B397BF06D66AB
Stage 1.. [Size:216440]
Sending : Please wait.. Accepted

Identifying Protocol...
Protocol : New
Synchronization... SYNC
Preloader Initialization...
sing prel.tmp
Init : Accepted
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 98646B560FAADEF8CC61FA718ABD2714
ERAM Size : 0x0000000000038000 -224 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58,242 GB
eMMC CID : 1501004448364441420861EECCAE280D - DH6DAB
Executing : ACCEPTED...

Reading GPT -EMMC [0x00008000] 130 Items
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 0 98646B560FAADEF8CC61FA718ABD2714
ERAM Size : 0 0x0000000000038000 -224 KB
IRAM Size : 0 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58,242 GB
eMMC CID : 1501004448364441420861EECCAE280D - DH6DAB

Reading GPT -EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Erase Userdata
Processing...
Formatting Userdata...
Action Result : Ok

Elapsed Time : 00:00:46
  Reply With Quote
Old 11-14-2021, 06:33   #2726 (permalink)
Freak Poster
 
Abul Basher's Avatar
 
Join Date: Oct 2011
Location: Rangpur,Bangladesh
Posts: 367
Member: 1675107
Status: Offline
Sonork: n/a
Thanks Meter: 145
Samsung a107f only mtk port flash done or alive phone

Samsung a107f only mtk port flash done or alive phone


Code:
{\rtf1\ansi\ansicpg1252\deff0\deflang1033{\fonttbl{\f0\fnil\fcharset0 Consolas;}}
{\colortbl ;\red204\green204\blue204;\red0\green156\blue193;\red58\green150\blue221;\red19\green161\blue14;\red255\green255\blue255;\red255\green255\blue0;\red128\green128\blue128;\red0\green120\blue215;\red128\green36\blue103;\red192\green192\blue192;\red140\green245\blue83;\red72\green61\blue139;}
\viewkind4\uc1\pard\cf1\f0\fs20 Hydra MediaTeK Tool  Ver 1.0.3 Build 77\par
Windows 10 (Version 10.0, Build 19042, 64-bit Edition)\par
Intel(R) Core(TM) i5-4310U CPU @ 2.00GHz\par
Intel(R) HD Graphics Family\par
Ram Installed : \cf2 8 GB\cf1\par
Windows Access Right : \cf2 Admin\cf3\par
Software Run As Admnistrator\cf1\par
\cf4\par
******* Dongle Info *******\cf1\par
Version    : \cf2\b Hydra Tool v 1.2\cf1\b0\par
Serial     : \cf2\b 210300013303\cf1\b0\par
Initialize : \cf2 OKAY\cf1\par
Status     : \cf2 Activated\par
Life       : 0 [0-0-0-0-0]\cf1\par
\par
\cf4\par
Brand : \cf5 SAMSUNG\cf4  Model : \cf5 SM-A107F (A10s)\cf4  Connection : \cf5 Flash Mode\cf1\par
\cf4\par
=====================================\par
How To Boot : Power off phone\par
 * BROM Mode : Press VOL + or Press VOL -+\par
 * Preloader Mode : Just Insert cable\cf1\par
\par
Searching for MTK Device...\cf3 Found\cf1\par
 Port Identification :\cf3 Flashmode Preloader\cf1\par
 FriendlyName :\cf3 MediaTek PreLoader USB VCOM_V1633 (Android) (COM3)\cf1\par
 Device       :\cf3 6&124cbd84&0&3\cf1\par
 SymbolicName :\cf3\\??\\USB#VID_0E8D&PID_2000#6&124cbd84&0&3#\{a5dcbf10-6530-11d2-901f-00c04fb951ed\}\cf1\par
 Driver Ver   :\cf3 01/22/2015,3.0.1504.0\cf1\par
\par
Opened handle..\par
Handshaking...\cf4 Ok\cf1\par
Searching for MTK Device...\cf3 Found\cf1\par
 Port Identification :\cf3 Flashmode BROM \cf1\par
 FriendlyName :\cf3 MediaTek USB Port_V1633 (COM6)\cf1\par
 Device       :\cf3 6&124cbd84&0&3\cf1\par
 SymbolicName :\cf3\\??\\USB#VID_0E8D&PID_0003#6&124cbd84&0&3#\{a5dcbf10-6530-11d2-901f-00c04fb951ed\}\cf1\par
 Driver Ver   :\cf3 01/22/2015,3.0.1504.0\cf1\par
\cf3\par
\cf1\par
Handshaking...\cf4 Ok\cf1\par
\par
Identifying Hardware ID.....\par
Reading Device hardware info..\par
 hw code       : 0766\cf6 MT6765\cf7  [6765]\cf1\par
 hw subcode    : 8A00\par
 hw version    : CA00\par
 sw version    : 0000\par
 Target config : E5\par
 SBC           : 01 (True)\par
 SLA           : 00 (False)\par
 DAA           : 04 (True)\par
 SWJTAG        : 04 (True)\par
 EPP           : 00 (False)\par
 CERT          : 00 (False)\par
 MEMREAD       : 20 (True)\par
 MEMWRITE      : 40 (True)\par
 CMD_C8        : 80 (True)\par
\par
Exploiting Device...\par
Exploit Sent..\par
Successfully Exploited...\par
Handshaking...\cf4 Ok\cf1\par
\par
Handshaking...\par
\par
Identifying Hardware ID.....\par
Reading Device hardware info..\par
 hw code       : 0766\cf6 MT6765\cf7  [6765]\cf1\par
 hw subcode    : 8A00\par
 hw version    : CA00\par
 sw version    : 0000\par
 Target config : 00\par
 SBC           : 00 (False)\par
 SLA           : 00 (False)\par
 DAA           : 00 (False)\par
 SWJTAG        : 00 (False)\par
 EPP           : 00 (False)\par
 CERT          : 00 (False)\par
 MEMREAD       : 00 (False)\par
 MEMWRITE      : 00 (False)\par
 CMD_C8        : 00 (False)\par
\par
MEID : 33F4AB539A9CD61EA0E459ACF3F4A78E\par
Stage 1..\cf3 [Size:216440]\par
 Sending :  Please wait.. \cf1 Accepted\par
\cf4\par
Identifying Protocol...\cf3\par
 Protocol : \cf1 New\cf3\par
 Synchronization...\cf1 SYNC\par
 Preloader Initialization...\par
 Parsing \cf4 0766_preloader_s96116ca1_B430EEA477.bin\cf1\par
 Init : \cf4 Accepted\cf3\par
 Executing : \cf1 SYNC\par
\cf4\par
Reading Device UniqueID, RAM and Flash Chip Info...\cf8\par
 UNIQUE ID  : \cf9 71EEE3A3977BF036A0D31085BCF5732C\cf8\par
 ERAM Size  : \cf9 0x0000000000038000\cf7  -224 KB\cf8\par
 IRAM Size  : \cf9 0x0000000080000000\cf7  -2 GB\cf8\par
 eMMC BOOT1 : \cf1 0x0000000000400000\cf7  -4 MB\cf8\par
 eMMC BOOT2 : \cf1 0x0000000000400000\cf7  -4 MB\cf8\par
 eMMC RPMB  : \cf1 0x0000000001000000\cf7  -16 MB\cf8\par
 eMMC USER  : \cf1 0x0000000747C00000\cf7  -29.121 GB\cf8\par
 eMMC CID   : \cf1 150100514436334D420380B807AD37AB\cf6  - QD63MB\cf3\par
 Executing : \cf1 ACCEPTED...\par
\cf3\par
Reading GPT\cf10 -EMMC \cf7 [0x00008000] \cf10 130 Items\cf8\par
\cf10\par
Autobackup Partitions\cf1\par
ERROR : ACK : 0x00010005[]\cf5\par
Done!!!\cf10\par
C:\\HydraTool\\\\Backup\\Auto\\0766__111421111246\cf1\par
MTK Phone Loader is NOW RUNNING.\par
\cf4\par
Reading Device UniqueID, RAM and Flash Chip Info...\cf8\par
 UNIQUE ID  : \cf11 71EEE3A3977BF036A0D31085BCF5732C\cf8\par
 ERAM Size  : \cf11 0x0000000000038000\cf7  -224 KB\cf8\par
 IRAM Size  : \cf11 0x0000000080000000\cf7  -2 GB\cf8\par
 eMMC BOOT1 : \cf1 0x0000000000400000\cf7  -4 MB\cf8\par
 eMMC BOOT2 : \cf1 0x0000000000400000\cf7  -4 MB\cf8\par
 eMMC RPMB  : \cf1 0x0000000001000000\cf7  -16 MB\cf8\par
 eMMC USER  : \cf1 0x0000000747C00000\cf7  -29.121 GB\cf8\par
 eMMC CID   : \cf1 150100514436334D420380B807AD37AB\cf6  - QD63MB\cf1\par
\cf3\par
Reading GPT\cf10 -EMMC \cf7 [0x00008000] \cf10 130 Items\cf1\par
\cf4\par
Flashing Selected Partitions....\cf12\par
 - \cf3 preloader\cf1\b [preloader_s96116ca1.bin] \cf7\b0 256 KB \cf3 Erasing..\cf4 Ok\cf3  Flash ->= \cf4 Ok\cf12\par
 - \cf3 md1img\cf1\b [md1img.img] \cf7\b0 100 MB \cf3  Flash ->       = \cf4 Ok\cf12\par
 - \cf3 spmfw\cf1\b [spmfw.img] \cf7\b0 1024 KB \cf3  Flash ->        = \cf4 Ok\cf12\par
 - \cf3 scp1\cf1\b [scp.img] \cf7\b0 1024 KB \cf3  Flash ->           = \cf4 Ok\cf12\par
 - \cf3 sspm_1\cf1\b [sspm.img] \cf7\b0 1024 KB \cf3  Flash ->        = \cf4 Ok\cf12\par
 - \cf3 lk\cf1\b [lk.img] \cf7\b0 2 MB \cf3  Flash ->                 = \cf4 Ok\cf12\par
 - \cf3 boot\cf1\b [boot.img] \cf7\b0 32 MB \cf3  Flash ->            = \cf4 Ok\cf12\par
 - \cf3 recovery\cf1\b [recovery.img] \cf7\b0 32 MB \cf3  Flash ->    = \cf4 Ok\cf12\par
 - \cf3 dtbo\cf1\b [dtbo.img] \cf7\b0 8 MB \cf3  Flash ->             = \cf4 Ok\cf12\par
 - \cf3 tee1\cf1\b [tee.img] \cf7\b0 6 MB \cf3  Flash ->              = \cf4 Ok\cf12\par
 - \cf3 vendor\cf1\b [vendor.img] \cf7\b0 448 MB \cf3  Flash ->       = \cf4 Ok\cf12\par
 - \cf3 product\cf1\b [product.img] \cf7\b0 432 MB \cf3  Flash ->     = \cf4 Ok\cf12\par
 - \cf3 system\cf1\b [system.img] \cf7\b0 3.422 GB \cf3  Flash ->     = \cf4 Ok\cf12\par
 - \cf3 vbmeta\cf1\b [vbmeta.img] \cf7\b0 8 MB \cf3  Flash ->         = \cf4 Ok\cf12\par
 - \cf3 cache\cf1\b [cache.img] \cf7\b0 400 MB \cf3  Flash ->         = \cf4 Ok\cf12\par
 - \cf3 userdata\cf1\b [userdata.img] \cf7\b0 23.867 GB \cf3  Flash ->= \cf4 Ok\par
=====================================\par
\cf3\par
Elapsed Time : 00:04:30\cf4\par
\cf1\par
}
  Reply With Quote
Old 11-15-2021, 09:50   #2727 (permalink)
No Life Poster
 
Join Date: May 2011
Posts: 1,322
Member: 1576733
Status: Offline
Thanks Meter: 622
Oppo A71 (CPH1801) Edl Format Userdata With by Hydra

Oppo A71 (CPH1801) Edl Format Userdata With by Hydra



Quote:
Brand : OPPO Model : A71 (2018) CPH1801 Storage : Auto
Loader: a71_firehose.bin
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM8)
SymbolicName :??USB#VID_05C6&PID_9008#5&3478949&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 08/02/2017,2.1.2.7

Getting device info .. . ...
Serial No.: 0xB95B2E3C
HW_ID : 0009A0E100000000
MSM ID : 0x0009A0E1, SDM450-Qualcomm Snapdragon 450
MODEL_ID : 0x0000
OEM_ID : 0x0000 - QUALCOMM
PBL Ver : 00000000
PK HASH : 05f06ba44eeb2abdf14bb644aabc2e693ddf7b8711cc7cf07d 4cd0eb2e1a8728

Firehose Loader [a71_firehose.bin]
--------------------------------------------------
Header Type : OLD
TargetMSM : 8953
Tag : _peek
Version : 3
Code_size : 288
Signature_size : 256
fhVendor : OPPO
HW_ID : 0009A0E100000000
Vendor : QUALCOMM
OEM_ID : 0000
MODEL_ID : 0000
SW_ID : 0000000000000003
APP_ID :
pk_hash : 05f06ba44eeb2abdf14bb644aabc2e693ddf7b8711cc7cf07d 4cd0eb2e1a8728
OEM_VERSION : ubuntu-121-238
IMAGE_VARIANT : JAADANAZA
QC_VERSION : BOOT.BF.3.3-00216
--------------------------------------------------

SaharaBoot... Ok
Sending ..................b Okb0
Connecting to Firehose...
Ping ... Ok
Configuration... Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8953
Version : 1

Protocol : Oppo
Running : Ok
Processing A71 (CPH1801) Format Userdata....
Action Result : Ok

Rebooting Phone.... Ok

Elapsed Time : 00:00:04
  Reply With Quote
Old 11-15-2021, 10:27   #2728 (permalink)
No Life Poster
 
Join Date: May 2011
Posts: 1,322
Member: 1576733
Status: Offline
Thanks Meter: 622
Redmi 8a Dual (olivewood) Edl Frp Remove done by Hydra

Redmi 8a Dual (olivewood) Edl Frp Remove done by Hydra



Quote:
Brand : XIAOMI Model : Redmi 8A Dual (olivewood) Storage : Auto
Loader: 000BF0E100720000_57158eaf1814d78f_e551cac5_XIAOMI_ auth_peek_8937.fhprg
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM11)
SymbolicName :??USB#VID_05C6&PID_9008#6&61bf49f&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/10/2020,5.1.1.2

Getting device info .. Ok
Device MODE : Firehose
Connecting to Firehose...
Ping .. Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 2546991559
Firmware Version : 909127728
Product Name : hB8aP>
Physical titions : 3
Total Logical Blocks:
Drive [0] 61071360 [29.121 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]

Protocol : Universal
Running : Ok

Phone Information ......
Vendor : Xiaomi
ID : QKQ1.191014.001
SDK : 29
Release : 10
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-GB
Miui Ver : V125
Mod_device : olivewood_in_global
Security Patch : 2021-07-01
Emmc_size : 16GB

Reading GPT[3]
Drive [0] 64 Items
Drive [1] 0 Items
Drive [2] 0 Items

Removing FRPta...
Method :
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOk Ok

Elapsed Time : 00:00:04
  Reply With Quote
Old 11-15-2021, 10:36   #2729 (permalink)
No Life Poster
 
Join Date: May 2011
Posts: 1,322
Member: 1576733
Status: Offline
Thanks Meter: 622
Redmi 6A (cactus) Bootloader Unlock With by Hydra

Redmi 6A (cactus) Bootloader Unlock With by Hydra



Quote:
=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port_V1633 (COM42)
Device : 5&201b4142&0&4
SymbolicName :??USB#VID_0E8D&PID_0003#5&201b4142&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0

Opened handle..
Handshaking... Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0766 MT6765 [6765]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : E7
SBC : 01 (True)
SLA : 02 (True)
DAA : 04 (True)
SWJTAG : 06 (True)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 20 (True)
MEMWRITE : 40 (True)
CMD_C8 : 80 (True)

Exploiting Device...
Exploit Sent..
Successfully Exploited...
Handshaking... Ok

Handshaking...

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0766 MT6765 [6765]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)

MEID : FC9ADF630C7F4D269617DA0B05
Stage 1.. [Size:216440]
Sending : Please wait.. Accepted

Identifying Protocol...
Protocol : New
Synchronization... SYNC
Preloader Initialization...
sing preloader_cactus.bin
Init : Accepted
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : BCACA78C61EAAA92740BC47B5D80D288
ERAM Size : 0x0000000000038000 -224 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003AB400000 -14.676 GB
eMMC CID : 90014A484147346132A54B48809A1671 - HAG4a2
Executing : ACCEPTED...

Reading GPT -EMMC [0x00008000] 130 Items

Reading System Info
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi 6A
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-GB
Description : cactus-user 9 PPR1.180610.011 V11.0.9.0.PCBMIXM release-keys
Miui Ver : V11
Device : cactus
Mod_device : cactus_global
Display ID : SW_S98506AE1_V009_M13_XM_C3C_USR
Security Patch : 2020-08-01
Fingerprint : xiaomi/cactus/cactus:9/PPR1.180610.011/V11.0.9.0.PCBMIXM:user/release-keys
StorageType : mtp
Userdata State : Encrypted

Autobackup titions
-preloader [0x00000000] 512 KB -> preloader.bin...0 Ok
-> Renaming Preloader.... preloader_cactus.bin
Creating Scatter file... C:Hydra ToolBackupAuto0766_xiaomi_cactus_cactus_9_PPR1.180 610.011_V11.0.9.0.PCBMIXM_111521114626MT6765_Andro id_scatter.txt
-pgpt [0x00000000] 32 KB -> pgpt.bin...0 Ok
-frp [0x05588000] 1024 KB -> frp.bin...0 Ok
-nvdata [0x07688000] 64 MB -> nvdata.bin...0 Ok
-protect1 [0x0D688000] 8 MB -> protect1.bin...0 Ok
-protect2 [0x0DE88000] 9.469 MB -> protect2.bin...0 Ok
-persist [0x0F000000] 64 MB -> persist.bin...0 Ok
-nvram [0x1BE80000] 64 MB -> nvram.bin...0 Ok
Done!!!
C:Hydra ToolBackupAuto0766_xiaomi_cactus_cactus_9_PPR1.180 610.011_V11.0.9.0.PCBMIXM_111521114626
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 1 BCACA78C61EAAA92740BC47B5D80D288
ERAM Size : 1 0x0000000000038000 -224 KB
IRAM Size : 1 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003AB400000 -14.676 GB
eMMC CID : 90014A484147346132A54B48809A1671 - HAG4a2

Reading GPT -EMMC [0x00008000] 130 Items


Reading System Info
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi 6A
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-GB
Description : cactus-user 9 PPR1.180610.011 V11.0.9.0.PCBMIXM release-keys
Miui Ver : V11
Device : cactus
Mod_device : cactus_global
Display ID : SW_S98506AE1_V009_M13_XM_C3C_USR
Security Patch : 2020-08-01
Fingerprint : xiaomi/cactus/cactus:9/PPR1.180610.011/V11.0.9.0.PCBMIXM:user/release-keys
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Unlock Bootloader
Processing...
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------

Verifying status after operation...
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------
Action Result : Ok

Elapsed Time : 00:00:50
  Reply With Quote
Old 11-15-2021, 17:53   #2730 (permalink)
Freak Poster
 
XxTQxX's Avatar
 
Join Date: Jul 2009
Location: In The World
Posts: 403
Member: 1068286
Status: Offline
Thanks Meter: 182
XIAOMI Redmi Note 7 FRP Done

Hydra Qualcomm Tool Ver 1.0.3 Build 7
Windows 10 (Version 10.0, Build 18363, 64-bit Edition)
Intel(R) Core(TM) i5-5300U CPU @ 2.30GHz
Intel(R) HD Graphics 5500
Ram Installed : 8 GB
Windows Access Right : Admin
Software Run As Admnistrator

******* Dongle Info *******
Version : Hydra Tool v 1.2
Serial : 190100000XXX
Initialize : OKAY
Status : Activated
Life : 0 [0-0-0-0-0]

PreOperation Configuration
Brand : XIAOMI Model : (lavender) Micron Storage : Auto
Loader: 0008C0E100010000_a7b8b82545a98eca_384d4649_GENERIC _XIAOMI_auth.fhprg
Port : Auto

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM7)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&355194c5&0&1#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :03/25/2016,2.1.2.2

Getting device info......
Serial No.: 0xDEA94E74
HW_ID : 0008C0E100000000
MSM ID : 0x0008C0E1, SDM660-Qualcomm Snapdragon 660
MODEL_ID : 0x0000
OEM_ID : 0x0000 - QUALCOMM
PBL Ver : 00000000
PK HASH : a7b8b82545a98eca23d6e9105fb464568d1b5828264903441b def0cd57e3c370

Firehose Loader[0008C0E100010000_a7b8b82545a98eca_384d4649_GENERIC _XIAOMI_auth.fhprg]
--------------------------------------------------
Header Type : OLD
TargetMSM :
Tag : _auth
Version : 5
Code_size : 416
Signature_size : 256
fhVendor : XIAOMI
HW_ID : 3006000000010000
Vendor : GENERIC
OEM_ID : 0001
MODEL_ID : 0000
SW_ID : 000000000000000B
APP_ID :
pk_hash : a7b8b82545a98eca23d6e9105fb464568d1b5828264903441b def0cd57e3c370
OEM_VERSION : c3-bsp-builder-job007.bj
IMAGE_VARIANT : Sdm660LA
QC_VERSION : BOOT.XF.1.4-00262-S660LZB-1
--------------------------------------------------

SaharaBoot... Ok
Sending .................................Ok
Connecting to Firehose...
Ping......... Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[6hg
Signature @256bytes Authentication.... Accepted......................
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 8192
MaxPayloadSizeToTargetInBytesSupported : 8192
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : MSM8996
Version : 1
DateTime : Feb 10 2020 - 19:28:52

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 19
Serial Number : 259111703
Firmware Version : 4
Product Name : S0J9K8
Physical Partitions : 4
Total Logical Blocks:
Drive [0] 122142720[58,242 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Drive [3] 32768[16 MB]

Protocol : Universal
Running : Ok
Reading GPT[4]
Drive [0] 68 Items
Drive [1] 0 Items
Drive [2] 0 Items
Drive [3]


Phone Information......
Vendor : Xiaomi
ID : QKQ1.190910.002
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Miui Ver : V125
Mod_device : lavender_eea_global
Display ID : QKQ1.190910.002 V12.5.1.0.QFGEUXM
Security Patch : 2021-08-01

Processing Safe Format - EMMC....
- Removing FRP [Zero Wipe] Ok
- Formatting Userdata [Safe Format - eMMc] Ok
Action Result : Ok

Elapsed Time : 00:00:08
  Reply With Quote
Reply

Bookmarks


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


 



All times are GMT +1. The time now is 16:10.



Powered by Searchlight © 2024 Axivo Inc.
vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2024 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2023 -
Page generated in 0.40192 seconds with 9 queries

SEO by vBSEO