GSM Shop GSM Shop
GSM-Forum  

Welcome to the GSM-Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features.
Only registered members may post questions, contact other members or search our database of over 8 million posts.

Registration is fast, simple and absolutely free so please - Click to REGISTER!

If you have any problems with the registration process or your account login, please contact contact us .

Go Back   GSM-Forum > Product Support Sections > Special Solutions / Services / WebShop > GSMFABRICA Products > HYDRA TOOL

Reply
 
LinkBack Thread Tools Display Modes
Old 06-11-2023, 05:32   #3151 (permalink)
Freak Poster
 
Join Date: Jul 2005
Location: Colombia, Bogota
Age: 54
Posts: 122
Member: 160595
Status: Offline
Thanks Meter: 6
Redmi Note 9s (curtana) Full Flash


redmi note 9s the system has been destroyed

curtana_global V13.0.2.0.

Hydra Tool Ver 2023.6.6.4
Windows 10 (Version 22H2, OS Build 19045.2965, 64-bit Edition)
Intel(R) Core(TM) i5-5200U CPU @ 2.20GHz
Intel(R) HD Graphics 5500
Ram Installed : 8 GB
Windows Access Right : Admin
Software Run As Admnistrator

Email :
DateTime Activated : 2023-06-01 23:19:38
DateTime Expired : 2024-06-01 23:19:38

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Qualcomm Flashing Function......
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching Device By Fastboot
Device Found...
- persist[0](persist.img), 32 MB Skipped
- misc[0](misc.img), 8 KB = Ok
- cust[0](cust.img), 469,922 MB = Ok
- recovery[0](recovery.img), 128 MB = Ok
- recoverybak[0](recovery.img), 128 MB = Ok
- vbmeta_system[0](vbmeta_system.img), 4 KB = Ok
- vbmeta_systembak[0](vbmeta_system.img), 4 KB = Ok
- metadata[0](metadata.img), 44,074 KB = Ok
- cache[0](cache.img), 56,145 KB = Ok
- ffu[0](ffu.img), 7 MB = Ok
- super[0](super.img), 5,432 GB = Ok
- userdata[0](userdata.img), 1,605 GB = Ok
- xbl[0](xbl.elf), 3,493 MB = Ok
- xbl_config[0](xbl_config.elf), 70,074 KB = Ok
- xblbak[0](xbl.elf), 3,493 MB = Ok
- xbl_configbak[0](xbl_config.elf), 70,074 KB = Ok
- aop[0](aop.mbn), 159,18 KB = Ok
- tz[0](tz.mbn), 2,875 MB = Ok
- hyp[0](hyp.mbn), 390,172 KB = Ok
- modem[0](NON-HLOS.bin), 127,809 MB = Ok
- bluetooth[0](BTFM.bin), 940 KB = Ok
- abl[0](abl.elf), 204 KB = Ok
- dsp[0](dspso.bin), 32 MB = Ok
- keymaster[0](km4.mbn), 232,458 KB = Ok
- cmnlib[0](cmnlib.mbn), 389,521 KB = Ok
- cmnlib64[0](cmnlib64.mbn), 507,959 KB = Ok
- devcfg[0](devcfg.mbn), 42,723 KB = Ok
- qupfw[0](qupv3fw.elf), 52,39 KB = Ok
- imagefv[0](imagefv.elf), 20 KB = Ok
- uefisecapp[0](uefi_sec.mbn), 123,906 KB = Ok
- aopbak[0](aop.mbn), 159,18 KB = Ok
- tzbak[0](tz.mbn), 2,875 MB = Ok
- hypbak[0](hyp.mbn), 390,172 KB = Ok
- modembak[0](NON-HLOS.bin), 127,809 MB = Ok
- bluetoothbak[0](BTFM.bin), 940 KB = Ok
- ablbak[0](abl.elf), 204 KB = Ok
- dspbak[0](dspso.bin), 32 MB = Ok
- keymasterbak[0](km4.mbn), 232,458 KB = Ok
- cmnlibbak[0](cmnlib.mbn), 389,521 KB = Ok
- cmnlib64bak[0](cmnlib64.mbn), 507,959 KB = Ok
- devcfgbak[0](devcfg.mbn), 42,723 KB = Ok
- qupfwbak[0](qupv3fw.elf), 52,39 KB = Ok
- imagefvbak[0](imagefv.elf), 20 KB = Ok
- uefisecappbak[0](uefi_sec.mbn), 123,906 KB = Ok
- logfs[0](logfs_ufs_8mb.bin), 16 KB = Ok
- storsec[0](storsec.mbn), 20,091 KB = Ok
- vbmeta[0](vbmeta.img), 4 KB = Ok
- boot[0](boot.img), 128 MB = Ok
- dtbo[0](dtbo.img), 8 MB = Ok
- vbmetabak[0](vbmeta.img), 4 KB = Ok
- dtbobak[0](dtbo.img), 8 MB = Ok
- bootbak[0](boot.img), 128 MB = Ok

Elapsed Time : 00:12:28
Attached Images
File Type: jpg FullFlash Redmi 9s.jpg (246.4 KB, 6 views)
  Reply With Quote
Old 06-11-2023, 08:46   #3152 (permalink)
No Life Poster
 
ceza031's Avatar
 
Join Date: Feb 2012
Age: 39
Posts: 1,395
Member: 1724862
Status: Offline
Thanks Meter: 450
Redmi Note 10 2022 (selene) Dual SIM Repair by Hydra Tool 💻📲


Redmi Note 10 2022 (selene) Dual SIM Repair by Hydra Tool 💻📲




Quote:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
***IMEI REPAIR FUNCTION****
Xiaomi Dual
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching for MTK Device...Found
MTK Port Type : Flashmode BROM
FriendlyName : MediaTek USB Port_V1632 (COM3)
Device : /5&13fe7c4d&0&6
SymbolicName : \\?\usb#vid_0e8d&pid_0003#5&13fe7c4d&0&6#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0
Service : wdm_usb

Openning Port [COM3] Ok
Reading Partition Table ..
ERAM Size : 0x0000000000070000-448 KB
IRAM Size : 0x0000000100000000-4 GB
EMMC Boot1 Size : 0x0000000000400000-4 MB
EMMC Boot2 Size : 0x0000000000400000-4 MB
EMMC RPMB Size : 0x0000000001000000-16 MB
EMMC USER Size : 0x0000001D1EC00000-116,48 GB
EMMC CID : 9B01005932503132380085363EE7C855 - Y2P128
HW-CODE : 0x707
HWSUB-CODE : 0x8A00
HW-VERSION : 0xCA00
SW-VERSION : 0x0
CHIP-EVOLUTION : 0x1
DA-VERSION : 1.0
Speed : high-speed
Partition Count : 57
--------------- Reading build.prop content ---------------
Product : selene
Marketname : ro.product.systemRedmi 10
ID : RP1A.200720.011
SDK : 30
Release : 11
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : selene-user 11 RP1A.200720.011 V12.5.4.0.RKUTRXM release-keys
Display ID : AL5186-selene-build-20220224202826
Security Patch : 2022-02-01
StorageType : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
IMEI1 : 868************
IMEI2 : 868************
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------

Xiaomi Flashmode Dual IMEI Repair
Backing up Security..
- nvram Ok
- nvdata Ok
- vbmeta_a Ok
- vbmeta_b Ok
- proinfo Ok
Step 1 Ok
Step 2 Ok
Step 3 Ok
Step 4 Ok
Operation Done!!!!

Reading IMEI........
IMEI1 : 3585************
IMEI2 : 3585************

Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!

Action Result : Ok

Elapsed Time : 00:00:19


  Reply With Quote
Old 06-11-2023, 09:04   #3153 (permalink)
No Life Poster
 
ceza031's Avatar
 
Join Date: Feb 2012
Age: 39
Posts: 1,395
Member: 1724862
Status: Offline
Thanks Meter: 450
Redmi Note 10 2022 (selene) FRP Remove With by Hydra Tool

Redmi Note 10 2022 (selene) FRP Remove With by Hydra Tool



Quote:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Service Function
Factory Reset Protection[FRP]
Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching for MTK Device...Found
MTK Port Type : Flashmode BROM
FriendlyName : MediaTek USB Port_V1632 (COM3)
Device : /5&13fe7c4d&0&6
SymbolicName : \\?\usb#vid_0e8d&pid_0003#5&13fe7c4d&0&6#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0
Service : wdm_usb

Openning Port [COM3] Ok
Handshaking...Ok
HwCode : 0707 {MT6768}
Hwver : 0000
Target config : E7
SBC : 01 (True)
SLA : 02 (True)
DAA : 04 (True)
SWJTAG : 06 (True)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 20 (True)
MEMWRITE : 40 (True)
CMD_C8 : 80 (True)
Connection : BROM
HW Subcode : 8A00
HW Subcode : CA00
SW Ver : 0000
ME_ID : 02927747C2910E225C612279E825D481
SOC_ID : 19378A0601F2BB544F5515A0943B1E55C3D4D7668DE7F2FDEA 335AB3824F3F45

Exploiting Device...
Successfully Exploited..
Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..Found @ 0x00200BC4
Starting to dump...
Prel Size : 0x00049E00
Successfully dump preloader.. [C:\Hydra Tool\Boot\PreloaderDump\preloader_selene.bin]
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)
Connection : BROM

Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin]
Uploading Stage 1....
Successfully uploaded stage 1, jumping ..
Executing JUMP_DA Address @ 0x00200000
Jumping to 0x00200000 Ok 0xC0
Successfully received DA sync
ONNECTION_AGENT : brom
DRAM config needed for : 9B01005932503132
Sending auto preloader from dump... [preloader_selene.bin]
Sending emi data.. [DRAM setup passed.]
Sending emi data succeeded.
Uploading stage 2...
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
ERAM Size : 0x0000000000070000-448 KB
IRAM Size : 0x0000000100000000-4 GB
EMMC Boot1 Size : 0x0000000000400000-4 MB
EMMC Boot2 Size : 0x0000000000400000-4 MB
EMMC RPMB Size : 0x0000000001000000-16 MB
EMMC USER Size : 0x0000001D1EC00000-116,48 GB
EMMC CID : 9B01005932503132380085363EE7C855 - Y2P128
HW-CODE : 0x707
HWSUB-CODE : 0x8A00
HW-VERSION : 0xCA00
SW-VERSION : 0x0
CHIP-EVOLUTION : 0x1
DA-VERSION : 1.0
Speed : high-speed
Error: on sending data: DA hash mismatch
*DA Extensions failed to enable
Reading Partition Table ..
Partition Count : 57
--------------- Reading build.prop content ---------------
Product : selene
Marketname : ro.product.systemRedmi 10
ID : RP1A.200720.011
SDK : 30
Release : 11
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : selene-user 11 RP1A.200720.011 V12.5.4.0.RKUTRXM release-keys
Display ID : AL5186-selene-build-20220224202826
Security Patch : 2022-02-01
StorageType : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
IMEI1 : 358************
IMEI2 : 358************
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------
Backing up Security..
- preloader(preloader.bin), 512 KB = Ok [preloader_selene.bin]
*Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0707_02927747C2910E225C612279E 825D481\Auto\061123024157\6768_Android_scatter.txt
- pgpt(pgpt.bin), 32 KB = Ok
- nvram(nvram.bin), 64 MB = Ok
- nvdata(nvdata.bin), 64 MB = Ok
- frp(frp.bin), 1024 KB = Ok
- protect1(protect1.bin), 8 MB = Ok
- protect2(protect2.bin), 9,367 MB = Ok
- persist(persist.bin), 48 MB = Ok
- proinfo(proinfo.bin), 3 MB = Ok
- nvcfg(nvcfg.bin), 32 MB = Ok
- sec1(sec1.bin), 2 MB = Ok
- seccfg(seccfg.bin), 8 MB = Ok
Backup Done!!!

Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!

Action Result : Ok

Elapsed Time : 00:00:35


  Reply With Quote
Old 06-11-2023, 09:20   #3154 (permalink)
No Life Poster
 
ceza031's Avatar
 
Join Date: Feb 2012
Age: 39
Posts: 1,395
Member: 1724862
Status: Offline
Thanks Meter: 450
Redmi Note 10 2022 (selene) Downgrade Firmware For Stable Repair 💻📲

Redmi Note 10 2022 (selene) Downgrade Firmware For Stable Repair 💻📲



Quote:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
MTK Flash Function...
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching for MTK Device...Found
MTK Port Type : Flashmode BROM
FriendlyName : MediaTek USB Port_V1632 (COM3)
Device : /5&13fe7c4d&0&6
SymbolicName : \\?\usb#vid_0e8d&pid_0003#5&13fe7c4d&0&6#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0
Service : wdm_usb

Openning Port [COM3] Ok
Reading Partition Table ..
ERAM Size : 0x0000000000070000-448 KB
IRAM Size : 0x0000000100000000-4 GB
EMMC Boot1 Size : 0x0000000000400000-4 MB
EMMC Boot2 Size : 0x0000000000400000-4 MB
EMMC RPMB Size : 0x0000000001000000-16 MB
EMMC USER Size : 0x0000001D1EC00000-116,48 GB
EMMC CID : 9B01005932503132380085363EE7C855 - Y2P128
HW-CODE : 0x707
HWSUB-CODE : 0x8A00
HW-VERSION : 0xCA00
SW-VERSION : 0x0
CHIP-EVOLUTION : 0x1
DA-VERSION : 1.0
Speed : high-speed
Partition Count : 57
--------------- Reading build.prop content ---------------
Vendor : Xiaomi
Product : selene
Manufacturer : Xiaomi
ID : SP1A.210812.016
SDK : 31
Release : 12
ABI : arm64-v8a
Locale : en-GB
Description : selene-user 12 SP1A.210812.016 V13.0.15.0.SKUMIXM release-keys
Display ID : AL5186-selene-build-20230320165855
Security Patch : 2023-03-01
StorageType : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
IMEI1 : 86845**********
IMEI2 : 86845**********

-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------

Write Selected Partitions..
- preloader(preloader_selene.bin), 295,5 KB[Erasing...Ok] Status :C0010001 Error= Failed
- vbmeta_a(vbmeta.img), 4 KB = Ok
- vbmeta_system_a(vbmeta_system.img), 4 KB = Ok
- vbmeta_vendor_a(vbmeta_vendor.img), 4 KB = Ok
- md1img_a(md1img.img), 55,622 MB = Ok
- spmfw_a(spmfw.img), 48,141 KB = Ok
- scp_a(scp.img), 345,531 KB = Ok
- sspm_a(sspm.img), 494,094 KB = Ok
- lk_a(lk.img), 1,503 MB = Ok
- boot_a(boot.img), 64 MB = Ok
- dtbo_a(dtbo.img), 270,484 KB = Ok
- tee_a(tee.img), 2,407 MB = Ok
- logo_a(logo.bin), 1,755 MB = Ok
- cust(cust.img), 709,012 MB = Ok
- rescue(rescue.img), 40,074 KB = Ok
- super(super.img), 5,615 GB = Ok
- userdata(userdata.img), 694,688 MB = Ok

Rebooting Device...

Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!! = Ok
----------------------------------

Elapsed Time : 00:03:56
  Reply With Quote
Old 06-12-2023, 12:16   #3155 (permalink)
No Life Poster
 
ceza031's Avatar
 
Join Date: Feb 2012
Age: 39
Posts: 1,395
Member: 1724862
Status: Offline
Thanks Meter: 450
Redmi 8A (olivelite) Factory Reset & FRP Remove by Hydra Tool

Redmi 8A (olivelite) Factory Reset & FRP Remove by Hydra Tool



Quote:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Qualcomm Service Tool
Ultra Power
Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

PreOperation Configuration
Brand : AUTO Model : AUTO Storage : Auto
Loader: Auto
Port : Auto

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM77)
SymbolicName :\\?\usb#vid_05c6&pid_9008#6&27c7ce02&0&2#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/02/2017,2.1.2.7

Getting device info. [Connected].....
Serial No.: 0x47B2739D
HW_ID : 000BF0E100720000
MSM ID : 0x000BF0E1, SDM439-Qualcomm Snapdragon 439/FAADANAZA
MODEL_ID : 0x0000
OEM_ID : 0x0072 - XIAOMI
PBL Ver : 00000000
PK HASH : 57158eaf1814d78fd2b3105ece4db18a817a08ac664a5782a9 25f3ff8403d39a

Hydra Enable Auto search Firehose..
#Please wait...
#Search by filename filter.....
#Found 20 Compatible Files ..Found match Firehose...

Firehose Loader[000bf0e100720000_57158eaf1814d78f_05ac3fce_xiaomi_ auth_peek_8937.fhprg]
--------------------------------------------------
Header Type : OLD
TargetMSM : 8937
Tag : _auth_peek
Version : 3
Code_size : 320
Signature_size : 256
fhVendor : XIAOMI
HW_ID : 000BF0E100720000
Vendor : XIAOMI
OEM_ID : 0072
MODEL_ID : 0000
SW_ID : 0000000100000003
APP_ID :
pk_hash : 57158eaf1814d78fd2b3105ece4db18a817a08ac664a5782a9 25f3ff8403d39a
OEM_VERSION : c3-miui-ota-bd106.bj
IMAGE_VARIANT : FAADANAZA
QC_VERSION : BOOT.BF.3.3.2-00073
--------------------------------------------------

SaharaBoot... Ok
Sending .......................Ok
Connecting to Firehose...
Ping. Ok
Configuration[FHProt_Auto].
Xiaomi Authentication needed...
Signature Request -> bob[9VBdkahQq1b2gvFW3iSasVJ-W37]
Signature @256bytes Authentication.... Accepted......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 1655754070
Firmware Version : 909127728
Product Name : hB8aP>
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 61071360[29.121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok

Reading GPT[3]
Drive [0] 64 Items
Drive [1] 0 Items
Drive [2] 0 Items

--------------- Reading build.prop content ---------------
build.prop
system
build.prop
Brand : Xiaomi
Vendor : Xiaomi
Model : Redmi 8A
Product : olivelite
Manufacturer : Xiaomi
ID : PKQ1.190319.001
SDK : 28
Release : 9
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-GB
Description : olivelite-user 9 PKQ1.190319.001 V11.20.1.7.EP.MCAAS.C3K release-keys
Device : olivelite
Display ID : ZQL2116-olivelite-build-20200103111537
Security Patch : 2019-12-01
Fingerprint : Xiaomi/olivelite/olivelite:9/PKQ1.190319.001/V11.20.1.7.EP.MCAAS.C3K:user/release-keys
--------------- end of build.prop content ---------------

Auto Backup Security partitions...
Reading Security Items....
- modemst1(modemst1.bin), 8 MB = Ok
- modemst2(modemst2.bin), 8 MB = Ok
- fsg(fsg.bin), 8 MB = Ok
- fsc(fsc.bin), 7.5 KB = Ok
- persist(persist.bin), 32 MB = Ok

C:\Hydra Tool\Backup\QUALBackup\XIAOMI\000BF0E100720000_47B 2739D\Auto_Backup\061223160323
Backup Security Success....
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOk
- Formatting Userdata
Executing ...
- Formatting Userdata [Safe Format - eMMc] OkOk

Rebooting Phone.... Ok

Action Result : Ok

Elapsed Time : 00:00:21
  Reply With Quote
Old 06-13-2023, 06:28   #3156 (permalink)
No Life Poster
 
ceza031's Avatar
 
Join Date: Feb 2012
Age: 39
Posts: 1,395
Member: 1724862
Status: Offline
Thanks Meter: 450
Huawei Y5 Prime 2018 (DRA-LX2) FRP Remove by Hydra Tool

Huawei Y5 Prime 2018 (DRA-LX2) FRP Remove by Hydra Tool



Quote:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Service Function
Factory Reset Protection[FRP]
Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching for MTK Device...Found
MTK Port Type : Flashmode BROM
FriendlyName : MediaTek USB Port (COM5)
Device : /6&1b6f9c2d&0&3
SymbolicName : \\?\usb#vid_0e8d&pid_0003#6&1b6f9c2d&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0
Service : wdm_usb

Openning Port [COM5] Ok
Handshaking...Ok
HwCode : 0699 {MT6739/MT6731}
Hwver : 0000
Target config : E3
SBC : 01 (True)
SLA : 02 (True)
DAA : 00 (False)
SWJTAG : 02 (True)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 20 (True)
MEMWRITE : 40 (True)
CMD_C8 : 80 (True)
Connection : BROM
HW Subcode : 8A00
HW Subcode : CB00
SW Ver : 0002
ME_ID : E63E233CC4A2D5173FB8F487BE75ED98
SOC_ID : 9B68F5772A0B4CFA3C88CF82FC4FEEEC21537B536488D9688E 89EF7316BD114A

Exploiting Device...
Successfully Exploited..
Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..Found @ 0x00200BC4
Starting to dump...
Prel Size : 0x0001DA38
Successfully dump preloader.. [C:\Hydra Tool\Boot\PreloaderDump\preloader_dura64.bin]
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)
Connection : BROM

Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin]
Uploading Stage 1....
Successfully uploaded stage 1, jumping ..
Executing JUMP_DA Address @ 0x00200000
Jumping to 0x00200000 Ok 0xC0
Successfully received DA sync
ONNECTION_AGENT : brom
Sending auto preloader from dump... [preloader_dura64.bin]
Sending emi data.. [DRAM setup passed.]
Sending emi data succeeded.
Uploading stage 2...
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
ERAM Size : 0x0000000000020000-128 KB
IRAM Size : 0x0000000080000000-2 GB
EMMC Boot1 Size : 0x0000000000400000-4 MB
EMMC Boot2 Size : 0x0000000000400000-4 MB
EMMC RPMB Size : 0x0000000000400000-4 MB
EMMC USER Size : 0x00000003AB400000-14.676 GB
EMMC CID : 90014A484147346132D4DF5138D01619 - HAG4a2
HW-CODE : 0x699
HWSUB-CODE : 0x8A00
HW-VERSION : 0xCB00
SW-VERSION : 0x2
CHIP-EVOLUTION : 0x0
DA-VERSION : 1.0
Speed : high-speed
Error: on sending data: DA hash mismatch
*DA Extensions failed to enable
Reading Partition Table ..
Partition Count : 47
--------------- Reading build.prop content ---------------
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Security Patch : 2020-02-05
StorageType : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
IMEI1 : ***************
IMEI2 : ***************
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------
Backing up Security..
- preloader(preloader.bin), 512 KB = Ok [preloader_dura64.bin]
*Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0699_E63E233CC4A2D5173FB8F487B E75ED98\Auto\061323103511\6739_Android_scatter.txt
- pgpt(pgpt.bin), 512 KB = Ok
- nvram(nvram.bin), 5 MB = Ok
- nvdata(nvdata.bin), 32 MB = Ok
- frp(frp.bin), 1024 KB = Ok
- protect1(protect1.bin), 8 MB = Ok
- protect2(protect2.bin), 16.938 MB = Ok
- oeminfo(oeminfo.bin), 8 MB = Ok
- proinfo(proinfo.bin), 3 MB = Ok
- nvcfg(nvcfg.bin), 8 MB = Ok
- sec1(sec1.bin), 2 MB = Ok
- seccfg(seccfg.bin), 8 MB = Ok
- lk(lk.bin), 1024 KB = Ok
Backup Done!!!

Action Result : Ok

Elapsed Time : 00:00:25
  Reply With Quote
Old 06-13-2023, 06:39   #3157 (permalink)
No Life Poster
 
ceza031's Avatar
 
Join Date: Feb 2012
Age: 39
Posts: 1,395
Member: 1724862
Status: Offline
Thanks Meter: 450
Redmi 9T (lime) Mi Account Remove in EDL Mode by Hydra Tool

Redmi 9T (lime) Mi Account Remove in EDL Mode by Hydra Tool



Quote:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Xiaomi Tool
Mi Account
Remove MiAccount[New Method]
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

PreOperation Configuration
Brand : XIAOMI Model : Redmi 9T (lime) Storage : Auto
Loader: 0000000000720000_1bebe3863a6781db_159eb52f_XIAOMI. fhprg
Port : Auto

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM3)
SymbolicName :\\?\usb#vid_05c6&pid_9008#5&2e05d5bd&0&2#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/31/2015,2.1.2.0

Getting device info. [Connected].....
Serial No.: 0xC164C158
HW_ID : 0014D0E100720000
MSM ID : 0x0014D0E1, SM_KAMORTA_H-Qualcomm SM6115 Snapdragon 662 (11 nm)/KamortaPkgLAA
MODEL_ID : 0x0000
OEM_ID : 0x0072 - XIAOMI
PBL Ver : 00000000
PK HASH : 1bebe3863a6781db4b01086063007334de9e5ca14971c7c4f4 358ec9d79cda46

Firehose Loader[0000000000720000_1bebe3863a6781db_159eb52f_XIAOMI. fhprg]
--------------------------------------------------
Header Type : New
TargetMSM :
Tag :
Version : 6
Code_size : 816
Signature_size : 256
fhVendor : XIAOMI
HW_ID : 0000000000720000
Vendor : XIAOMI
OEM_ID : 0072
MODEL_ID : 0000
SW_ID : 00000003
APP_ID : 00000000
pk_hash : 1bebe3863a6781db4b01086063007334de9e5ca14971c7c4f4 358ec9d79cda4692ce5e948c6fd409408f4c919fcadfe3
OEM_VERSION : f2f760038334
IMAGE_VARIANT : KamortaPkgLAA
QC_VERSION : BOOT.XF.4.1-00187-KAMORTALAZ-2
--------------------------------------------------

SaharaBoot... Ok
Sending .................................Ok
Connecting to Firehose...
Ping...................... Ok
Configuration[FHProt_Auto]........
Identifying Chip........UFS
Ok
Chip Configuration :
MemoryName : UFS
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Nov 16 2020 - 01:25:39

*** STORAGE DEVICE INFO ***
Memory Type : UFS
Block Size in Bytes : 4096
Page Size : 4096
Manufacturer ID : 462
Serial Number : 1297306958
Firmware Version : 702
Product Name : KM2V8001CM-B707
Physical Partitions : 6
Total Logical Blocks:
Drive [0] 30119936[114.898 GB]
Drive [1] 2048[8 MB]
Drive [2] 2048[8 MB]
Drive [3] 32768[128 MB]
Drive [4] 1048576[4 GB]
Drive [5] 32768[128 MB]

Protocol : Universal
Running : Ok

Reading GPT[6]
Drive [0] 32 Items
Drive [1] 32 Items
Drive [2] 32 Items
Drive [3] 32 Items
Drive [4] 64 Items
Drive [5] 32 Items

--------------- Reading build.prop content ---------------
build.prop
system
build.prop
Vendor : Xiaomi
Manufacturer : Xiaomi
Marketname : ro.productRedmi 9T
ID : SKQ1.211202.001
SDK : 31
Release : 12
ABI : arm64-v8a
Locale : en-GB
Display ID : Android-Q-build-20221205011709
Security Patch : 2022-12-01
--------------- end of build.prop content ---------------

Auto Backup Security partitions...
Reading Security Items....
- modemst1(modemst1.bin), 1.996 MB = Ok
- modemst2(modemst2.bin), 1.996 MB = Ok
- fsg(fsg.bin), 1.996 MB = Ok
- fsc(fsc.bin), 124 KB = Ok
- persist(persist.bin), 31.996 MB = Ok

C:\Hydra Tool\Backup\QUALBackup\XIAOMI\0014D0E100720000_C16 4C158\Auto_Backup\061323113433
Backup Security Success....
Reading GPT[6]
Drive [0] 32 Items
Drive [1] 32 Items
Drive [2] 32 Items
Drive [3] 32 Items
Drive [4] 64 Items
Drive [5] 32 Items

Backing up Partition for safety...Ok

Scanning Patching address...
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]Done!!
Total Items patched : 7
Successfully patched address..

Action Result : Ok

Elapsed Time : 00:01:15
  Reply With Quote
Old 06-15-2023, 15:56   #3158 (permalink)
No Life Poster
 
ceza031's Avatar
 
Join Date: Feb 2012
Age: 39
Posts: 1,395
Member: 1724862
Status: Offline
Thanks Meter: 450
Redmi 8A (olivelite) Remove Mi Account by Hydra Tool

Redmi 8A (olivelite) Remove Mi Account by Hydra Tool




Quote:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Xiaomi Tool
Mi Account
Remove MiAccount[Patch Method]
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

PreOperation Configuration
Brand : AUTO Model : AUTO Storage : Auto
Loader: Auto
Port : Auto

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM5)
SymbolicName :\\?\usb#vid_05c6&pid_9008#5&fade7a0&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :03/19/2014,2.1.1.2

Getting device info. [Connected].Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok
Configuration[FHProt_Auto].
Xiaomi Authentication needed...
Signature Request -> bob[IFgePCNoKVD7acDcVqdf-SPoQRT]
Signature @256bytes Authentication.... Accepted......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 2925834609
Firmware Version : 909127728
Product Name : hB8aP>
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 61071360[29,121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok

Reading GPT[3]
Drive [0] 64 Items
Drive [1] 0 Items
Drive [2] 0 Items

--------------- Reading build.prop content ---------------
build.prop
system
build.prop
ID : QKQ1.191014.001
SDK : 29
Release : 10
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-GB
Security Patch : 2021-09-01
--------------- end of build.prop content ---------------
Reading GPT[3]
Drive [0] 64 Items
Drive [1] 0 Items
Drive [2] 0 Items

Backing up Partition for safety...Ok

Scanning Patching address...
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]Done!!
Total Items patched : 217
Successfully patched address..

Action Result : Ok

Elapsed Time : 00:00:22
  Reply With Quote
Old 06-15-2023, 16:19   #3159 (permalink)
No Life Poster
 
ceza031's Avatar
 
Join Date: Feb 2012
Age: 39
Posts: 1,395
Member: 1724862
Status: Offline
Thanks Meter: 450
Redmi Note 9 (merlin) IMEI Repair by Hydra Tool

Redmi Note 9 (merlin) IMEI Repair by Hydra Tool



Quote:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
***IMEI REPAIR FUNCTION****
Xiaomi 2nd IMEI
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching for MTK Device...Found
MTK Port Type : Flashmode BROM
FriendlyName : MediaTek USB Port (COM4)
Device : /6&3520cc6b&0&7
SymbolicName : \\?\usb#vid_0e8d&pid_0003#6&3520cc6b&0&7#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0
Service : wdm_usb

Openning Port [COM4] Ok
Handshaking...Ok
HwCode : 0707 {MT6768}
Hwver : 0000
Target config : E7
SBC : 01 (True)
SLA : 02 (True)
DAA : 04 (True)
SWJTAG : 06 (True)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 20 (True)
MEMWRITE : 40 (True)
CMD_C8 : 80 (True)
Connection : BROM
HW Subcode : 8A00
HW Subcode : CA00
SW Ver : 0000
ME_ID : D1A645774A096059F0F89F0F6687F42D
SOC_ID : F8E9791BBF068E85DB418565C0C6F630B06B8C6B6ECB7F5357 0C0FCF58DAEFB8

Exploiting Device...
Successfully Exploited..
Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..Found @ 0x00200BC4
Starting to dump...
Prel Size : 0x00043830
Successfully dump preloader.. [C:\Hydra Tool\Boot\PreloaderDump\preloader_merlin.bin]
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)
Connection : BROM

Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin]
Patching da2 ... Ok
Uploading Stage 1....
Successfully uploaded stage 1, jumping ..
Executing JUMP_DA Address @ 0x00200000
Jumping to 0x00200000 Ok 0xC0
Successfully received DA sync
ONNECTION_AGENT : brom
DRAM config needed for : 13014E47314A3953
Sending auto preloader from dump... [preloader_merlin.bin]
Sending emi data.. [DRAM setup passed.]
Sending emi data succeeded.
Uploading stage 2...
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
ERAM Size : 0x0000000000070000-448 KB
IRAM Size : 0x0000000100000000-4 GB
EMMC Boot1 Size : 0x0000000000400000-4 MB
EMMC Boot2 Size : 0x0000000000400000-4 MB
EMMC RPMB Size : 0x0000000001000000-16 MB
EMMC USER Size : 0x0000001D1F000000-116.484 GB
EMMC CID : 13014E47314A3953391012CBE6185867 - G1J9S9
HW-CODE : 0x707
HWSUB-CODE : 0x8A00
HW-VERSION : 0xCA00
SW-VERSION : 0x0
CHIP-EVOLUTION : 0x1
DA-VERSION : 1.0
Speed : high-speed
Upload data was accepted. Jumping to stage 2...
DA Extensions successfully added
Reading Partition Table ..
Partition Count : 50
--------------- Reading build.prop content ---------------
Product : merlin
Marketname : ro.product.systemRedmi Note 9
ID : QP1A.190711.020
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : merlin-user 10 QP1A.190711.020 V12.0.8.0.QJOMIXM release-keys
Display ID : AL2522-Merlin-V101-Q-0517
Security Patch : 2021-05-01
StorageType : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
IMEI1 : FFFFFFFFFFFFFFF
IMEI2 : **************
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------
Backing up Security..
- preloader(preloader.bin), 512 KB = Ok [preloader_merlin.bin]
*Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0707_D1A645774A096059F0F89F0F6 687F42D\Auto\060123174939\6768_Android_scatter.txt
- pgpt(pgpt.bin), 32 KB = Ok
- nvram(nvram.bin), 64 MB = Ok
- nvdata(nvdata.bin), 64 MB = Ok
- frp(frp.bin), 1024 KB = Ok
- protect1(protect1.bin), 8 MB = Ok
- protect2(protect2.bin), 11.367 MB = Ok
- persist(persist.bin), 48 MB = Ok
- proinfo(proinfo.bin), 3 MB = Ok
- nvcfg(nvcfg.bin), 32 MB = Ok
- sec1(sec1.bin), 2 MB = Ok
- seccfg(seccfg.bin), 8 MB = Ok
- lk(lk.bin), 2 MB = Ok
Backup Done!!!

Xiaomi Flashmode Second IMEI Repair
IMEI1 : FFFFFFFFFFFFFFF
IMEI2 : 359************

Reading IMEI........
IMEI1 : FFFFFFFFFFFFFFF
IMEI2 : 359************

Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!

Action Result : Ok

Elapsed Time : 00:00:39
  Reply With Quote
Old 06-17-2023, 12:43   #3160 (permalink)
No Life Poster
 
ceza031's Avatar
 
Join Date: Feb 2012
Age: 39
Posts: 1,395
Member: 1724862
Status: Offline
Thanks Meter: 450
Redmi 9T (lime) Mi Account Remove by Hydra Tool

Redmi 9T (lime) Mi Account Remove by Hydra Tool





Quote:

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Xiaomi Tool
Mi Account
Remove MiAccount[New Method]
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

PreOperation Configuration
Brand : XIAOMI Model : Redmi 9T (lime) Storage : Auto
Loader: 0000000000720000_1bebe3863a6781db_159eb52f_XIAOMI. fhprg
Port : Auto

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM9)
SymbolicName :\\?\usb#vid_05c6&pid_9008#5&1d73674e&0&8#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :12/17/2018,2.1.3.5

Getting device info. [Connected].....
Serial No.: 0x6F07A257
HW_ID : 0014D0E100720000
MSM ID : 0x0014D0E1, SM_KAMORTA_H-Qualcomm SM6115 Snapdragon 662 (11 nm)/KamortaPkgLAA
MODEL_ID : 0x0000
OEM_ID : 0x0072 - XIAOMI
PBL Ver : 00000000
PK HASH : 1bebe3863a6781db4b01086063007334de9e5ca14971c7c4f4 358ec9d79cda46

Firehose Loader[0000000000720000_1bebe3863a6781db_159eb52f_XIAOMI. fhprg]
--------------------------------------------------
Header Type : New
TargetMSM :
Tag :
Version : 6
Code_size : 816
Signature_size : 256
fhVendor : XIAOMI
HW_ID : 0000000000720000
Vendor : XIAOMI
OEM_ID : 0072
MODEL_ID : 0000
SW_ID : 00000003
APP_ID : 00000000
pk_hash : 1bebe3863a6781db4b01086063007334de9e5ca14971c7c4f4 358ec9d79cda4692ce5e948c6fd409408f4c919fcadfe3
OEM_VERSION : f2f760038334
IMAGE_VARIANT : KamortaPkgLAA
QC_VERSION : BOOT.XF.4.1-00187-KAMORTALAZ-2
--------------------------------------------------

SaharaBoot... Ok
Sending .................................Ok
Connecting to Firehose...
Ping...................... Ok
Configuration[FHProt_Auto]........
Ok
Chip Configuration :
MemoryName : UFS
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Nov 16 2020 - 01:25:39

*** STORAGE DEVICE INFO ***
Memory Type : UFS
Block Size in Bytes : 4096
Page Size : 4096
Manufacturer ID : 462
Serial Number : 1297306958
Firmware Version : 800
Product Name : KM5C7001DM-B622
Physical Partitions : 6
Total Logical Blocks:
Drive [0] 14501888[55,32 GB]
Drive [1] 2048[8 MB]
Drive [2] 2048[8 MB]
Drive [3] 32768[128 MB]
Drive [4] 1048576[4 GB]
Drive [5] 32768[128 MB]

Protocol : Universal
Running : Ok

Reading GPT[6]
Drive [0] 32 Items
Drive [1] 32 Items
Drive [2] 32 Items
Drive [3] 32 Items
Drive [4] 64 Items
Drive [5] 32 Items

--------------- Reading build.prop content ---------------
build.prop
system
build.prop
Marketname : ro.product.system
ID : QKQ1.200830.002
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Display ID : Android-Q-build-20210802221113
Security Patch : 2021-07-01
--------------- end of build.prop content ---------------

Auto Backup Security partitions...
Reading Security Items....
- modemst1(modemst1.bin), 1,996 MB = Ok
- modemst2(modemst2.bin), 1,996 MB = Ok
- fsg(fsg.bin), 1,996 MB = Ok
- fsc(fsc.bin), 124 KB = Ok
- persist(persist.bin), 31,996 MB = Ok

C:\Hydra Tool\Backup\QUALBackup\XIAOMI\0014D0E100720000_6F0 7A257\Auto_Backup\061623112250
Backup Security Success....
Reading GPT[6]
Drive [0] 32 Items
Drive [1] 32 Items
Drive [2] 32 Items
Drive [3] 32 Items
Drive [4] 64 Items
Drive [5] 32 Items

Backing up Partition for safety...Ok

Scanning Patching address...Done!!
No patching address available...
Seems like device has no Mi Account added....

Rebooting Phone.... Ok

Action Result : Ok

Elapsed Time : 00:00:32
  Reply With Quote
Old 06-19-2023, 15:09   #3161 (permalink)
No Life Poster
 
ceza031's Avatar
 
Join Date: Feb 2012
Age: 39
Posts: 1,395
Member: 1724862
Status: Offline
Thanks Meter: 450
Redmi 8A Pro (olivewood) Remove Mi Account by Hydra Tool

Redmi 8A Pro (olivewood) Remove Mi Account by Hydra Tool



Quote:

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Xiaomi Tool
Mi Account
Remove MiAccount[New Method]
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

PreOperation Configuration
Brand : XIAOMI Model : Redmi 8A Pro (olivewood) Storage : Auto
Loader: 000BF0E100720000_57158eaf1814d78f_e551cac5_XIAOMI_ auth_peek_8937.fhprg
Port : Auto

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM18)
SymbolicName :\\?\usb#vid_05c6&pid_9008#6&33d1b76f&0&5#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :05/29/2019,2.1.3.7

Getting device info. [Connected].Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok
Configuration[FHProt_Auto]......
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 1655959819
Firmware Version : 909127728
Product Name : hB8aP>
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 61071360[29.121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok

Reading GPT[3]
Drive [0] 64 Items
Drive [1] 0 Items
Drive [2] 0 Items

--------------- Reading build.prop content ---------------
build.prop
system
build.prop
ID : QKQ1.191014.001
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Security Patch : 2021-09-01
--------------- end of build.prop content ---------------
Reading GPT[3]
Drive [0] 64 Items
Drive [1] 0 Items
Drive [2] 0 Items

Backing up Partition for safety...Ok

Scanning Patching address...
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]Done!!
Total Items patched : 35
Successfully patched address..

Action Result : Ok

Elapsed Time : 00:01:05
  Reply With Quote
Old 06-20-2023, 13:11   #3162 (permalink)
No Life Poster
 
ceza031's Avatar
 
Join Date: Feb 2012
Age: 39
Posts: 1,395
Member: 1724862
Status: Offline
Thanks Meter: 450
Oppo A15s (CPH2179) Removed Screen Lock With Data Loss by Hydra Tool

Oppo A15s (CPH2179) Removed Screen Lock With Data Loss by Hydra Tool



Quote:

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Service Function
Format/Factory Reset/ScreenLock
Safe Format
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching for MTK Device...Found
MTK Port Type : Flashmode BROM
FriendlyName : MediaTek USB Port (COM3)
Device : /5&21111b0c&0&2
SymbolicName : \\?\usb#vid_0e8d&pid_0003#5&21111b0c&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 07/22/2022,3.0.1511.0
Service : wdm_usb

Openning Port [COM3] Ok
Handshaking...Ok
HwCode : 0766 {MT6765/MT8768t}
Hwver : 0000
Target config : E5
SBC : 01 (True)
SLA : 00 (False)
DAA : 04 (True)
SWJTAG : 04 (True)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 20 (True)
MEMWRITE : 40 (True)
CMD_C8 : 80 (True)
Connection : BROM
HW Subcode : 8A00
HW Subcode : CA00
SW Ver : 0000
ME_ID : C44B328FC89514D4D3A31AB05118C79C
SOC_ID : 47AD0A453AD2E0F0E631F088B3062E5D4D254B96BE39457A94 759F5319B94C7B

Exploiting Device...
Successfully Exploited..
Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..Found @ 0x00200BC4
Starting to dump...
Prel Size : 0x0003DB1C
Successfully dump preloader.. [C:\Hydra Tool\Boot\PreloaderDump\preloader_oppo6765.bin]
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)
Connection : BROM

Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin]
Patching da2 ... Ok
Uploading Stage 1....
Successfully uploaded stage 1, jumping ..
Executing JUMP_DA Address @ 0x00200000
Jumping to 0x00200000 Ok 0xC0
Successfully received DA sync
ONNECTION_AGENT : brom
DRAM config needed for : 1501003458364B4D
Sending auto preloader from dump... [preloader_oppo6765.bin]
Sending emi data.. [DRAM setup passed.]
Sending emi data succeeded.
Uploading stage 2...
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
ERAM Size : 0x000000000003A000-232 KB
IRAM Size : 0x0000000080000000-2 GB
EMMC Boot1 Size : 0x0000000000400000-4 MB
EMMC Boot2 Size : 0x0000000000400000-4 MB
EMMC RPMB Size : 0x0000000000400000-4 MB
EMMC USER Size : 0x0000000747C00000-29.121 GB
EMMC CID : 1501003458364B4D420362AECED857A3 - 4X6KMB
HW-CODE : 0x766
HWSUB-CODE : 0x8A00
HW-VERSION : 0xCA00
SW-VERSION : 0x0
CHIP-EVOLUTION : 0x0
DA-VERSION : 1.0
Speed : high-speed
Upload data was accepted. Jumping to stage 2...
DA Extensions successfully added
Reading Partition Table ..
Partition Count : 49
--------------- Reading build.prop content ---------------
Product : oppo6765
ID : QP1A.190711.020
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6765-user 10 QP1A.190711.020 bedd37e98646d3a1 release-keys
Display ID : QP1A.190711.020 release-keys
Security Patch : 2021-10-05
StorageType : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------
Backing up Security..
- preloader(preloader.bin), 512 KB = Ok [preloader_oppo6765.bin]
*Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0766_C44B328FC89514D4D3A31AB05 118C79C\Auto\062023102514\6765_Android_scatter.txt
- pgpt(pgpt.bin), 32 KB = Ok
- nvram(nvram.bin), 64 MB = Ok
- nvdata(nvdata.bin), 64 MB = Ok
- frp(frp.bin), 1024 KB = Ok
- protect1(protect1.bin), 8 MB = Ok
- protect2(protect2.bin), 15.867 MB = Ok
- persist(persist.bin), 48 MB = Ok
- proinfo(proinfo.bin), 3 MB = Ok
- oppo_custom(oppo_custom.bin), 1024 KB = Ok
- opporeserve1(opporeserve1.bin), 8 MB = Ok
- opporeserve2(opporeserve2.bin), 128 MB = Ok
- nvcfg(nvcfg.bin), 32 MB = Ok
- sec1(sec1.bin), 2 MB = Ok
- seccfg(seccfg.bin), 8 MB = Ok
- lk(lk.bin), 4 MB = Ok
Backup Done!!!
------------------------------
Factory Reset Flash Mode..
------------------------------
Operation : Safeformat Universal...

Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!

Action Result : Ok

Elapsed Time : 00:01:04
  Reply With Quote
Old 06-20-2023, 13:16   #3163 (permalink)
No Life Poster
 
ceza031's Avatar
 
Join Date: Feb 2012
Age: 39
Posts: 1,395
Member: 1724862
Status: Offline
Thanks Meter: 450
Oppo A15s (CPH2179) Remove FRP by Hydra Tool

Oppo A15s (CPH2179) Remove FRP by Hydra Tool



Quote:

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Service Function
Factory Reset Protection[FRP]
Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching for MTK Device...Found
MTK Port Type : Flashmode BROM
FriendlyName : MediaTek USB Port (COM3)
Device : /5&21111b0c&0&2
SymbolicName : \\?\usb#vid_0e8d&pid_0003#5&21111b0c&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 07/22/2022,3.0.1511.0
Service : wdm_usb

Openning Port [COM3] Ok
Handshaking...Ok
HwCode : 0766 {MT6765/MT8768t}
Hwver : 0000
Target config : E5
SBC : 01 (True)
SLA : 00 (False)
DAA : 04 (True)
SWJTAG : 04 (True)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 20 (True)
MEMWRITE : 40 (True)
CMD_C8 : 80 (True)
Connection : BROM
HW Subcode : 8A00
HW Subcode : CA00
SW Ver : 0000
ME_ID : C44B328FC89514D4D3A31AB05118C79C
SOC_ID : 47AD0A453AD2E0F0E631F088B3062E5D4D254B96BE39457A94 759F5319B94C7B

Exploiting Device...
Successfully Exploited..
Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..Found @ 0x00200BC4
Starting to dump...
Prel Size : 0x0003DB1C
Successfully dump preloader.. [C:\Hydra Tool\Boot\PreloaderDump\preloader_oppo6765.bin]
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)
Connection : BROM

Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin]
Patching da2 ... Ok
Uploading Stage 1....
Successfully uploaded stage 1, jumping ..
Executing JUMP_DA Address @ 0x00200000
Jumping to 0x00200000 Ok 0xC0
Successfully received DA sync
ONNECTION_AGENT : brom
DRAM config needed for : 1501003458364B4D
Sending auto preloader from dump... [preloader_oppo6765.bin]
Sending emi data.. [DRAM setup passed.]
Sending emi data succeeded.
Uploading stage 2...
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
ERAM Size : 0x000000000003A000-232 KB
IRAM Size : 0x0000000080000000-2 GB
EMMC Boot1 Size : 0x0000000000400000-4 MB
EMMC Boot2 Size : 0x0000000000400000-4 MB
EMMC RPMB Size : 0x0000000000400000-4 MB
EMMC USER Size : 0x0000000747C00000-29.121 GB
EMMC CID : 1501003458364B4D420362AECED857A3 - 4X6KMB
HW-CODE : 0x766
HWSUB-CODE : 0x8A00
HW-VERSION : 0xCA00
SW-VERSION : 0x0
CHIP-EVOLUTION : 0x0
DA-VERSION : 1.0
Speed : high-speed
Upload data was accepted. Jumping to stage 2...
DA Extensions successfully added
Reading Partition Table ..
Partition Count : 49
--------------- Reading build.prop content ---------------
Product : oppo6765
ID : QP1A.190711.020
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6765-user 10 QP1A.190711.020 bedd37e98646d3a1 release-keys
Display ID : QP1A.190711.020 release-keys
Security Patch : 2021-10-05
StorageType : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------
Backing up Security..
- preloader(preloader.bin), 512 KB = Ok [preloader_oppo6765.bin]
*Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0766_C44B328FC89514D4D3A31AB05 118C79C\Auto\062023103213\6765_Android_scatter.txt
- pgpt(pgpt.bin), 32 KB = Ok
- nvram(nvram.bin), 64 MB = Ok
- nvdata(nvdata.bin), 64 MB = Ok
- frp(frp.bin), 1024 KB = Ok
- protect1(protect1.bin), 8 MB = Ok
- protect2(protect2.bin), 15.867 MB = Ok
- persist(persist.bin), 48 MB = Ok
- proinfo(proinfo.bin), 3 MB = Ok
- oppo_custom(oppo_custom.bin), 1024 KB = Ok
- opporeserve1(opporeserve1.bin), 8 MB = Ok
- opporeserve2(opporeserve2.bin), 128 MB = Ok
- nvcfg(nvcfg.bin), 32 MB = Ok
- sec1(sec1.bin), 2 MB = Ok
- seccfg(seccfg.bin), 8 MB = Ok
- lk(lk.bin), 4 MB = Ok
Backup Done!!!

Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!

Action Result : Ok

Elapsed Time : 00:01:00
  Reply With Quote
Old 06-20-2023, 13:25   #3164 (permalink)
No Life Poster
 
ceza031's Avatar
 
Join Date: Feb 2012
Age: 39
Posts: 1,395
Member: 1724862
Status: Offline
Thanks Meter: 450
Poco X3 Pro (vayu) Brick Solution With Fastboot Flashing by Hydra Tool

Poco X3 Pro (vayu) Brick Solution With Fastboot Flashing by Hydra Tool



Quote:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Qualcomm Flashing Function......
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching Device By Fastboot
Device Found...
- switch[0](dummy.img), 8 KB = Ok
- misc[0](misc.img), 4 MB = Ok
- logfs[0](logfs_ufs_8mb.bin), 16 KB = Ok
- metadata[0](metadata.img), 48,074 KB = Ok
- super[0](super.img), 7,348 GB = Ok
- imagefv[0](imagefv.elf), 140 KB = Ok
- recovery[0](recovery.img), 128 MB = Ok
- cache[0](cache.img), 152,145 KB = Ok
- cust[0](cust.img), 507,965 MB = Ok
- userdata[0](userdata.img), 790,18 MB = Ok
- xbl_config[0](xbl_config.elf), 120,641 KB = Ok
- xbl[0](xbl.elf), 3,96 MB = Ok
- xbl_configbak[0](xbl_config.elf), 120,641 KB = Ok
- xblbak[0](xbl.elf), 3,96 MB = Ok
- multiimgoem[0](multi_image.mbn), 32 KB = Ok
- qupfw[0](qupv3fw.elf), 69,072 KB = Ok
- qupfwbak[0](qupv3fw.elf), 69,072 KB = Ok
- vbmeta[0](vbmeta.img), 8 KB = Ok
- storsec[0](storsec.mbn), 20,083 KB = Ok
- vbmeta_system[0](vbmeta_system.img), 4 KB = Ok
- devcfg[0](devcfg.mbn), 53,012 KB = Ok
- devcfgbak[0](devcfg.mbn), 53,012 KB = Ok
- aop[0](aop.mbn), 195,992 KB = Ok
- aopbak[0](aop.mbn), 195,992 KB = Ok
- cmnlib[0](cmnlib.mbn), 385,748 KB = Ok
- cmnlibbak[0](cmnlib.mbn), 385,748 KB = Ok
- cmnlib64[0](cmnlib64.mbn), 503,607 KB = Ok
- cmnlib64bak[0](cmnlib64.mbn), 503,607 KB = Ok
- keymaster[0](km41.mbn), 273,663 KB = Ok
- keymasterbak[0](km41.mbn), 273,663 KB = Ok
- bluetooth[0](BTFM.bin), 860 KB = Ok
- uefisecapp[0](uefi_sec.mbn), 122,616 KB = Ok
- uefisecappbak[0](uefi_sec.mbn), 122,616 KB = Ok
- abl[0](abl.elf), 204 KB = Ok
- ablbak[0](abl.elf), 204 KB = Ok
- tz[0](tz.mbn), 3,043 MB = Ok
- tzbak[0](tz.mbn), 3,043 MB = Ok
- hyp[0](hyp.mbn), 476,883 KB = Ok
- hypbak[0](hyp.mbn), 476,883 KB = Ok
- dtbo[0](dtbo.img), 32 MB = Ok
- logo[0](logo.img), 29,504 MB = Ok
- dsp[0](dspso.bin), 64 MB = Ok
- boot[0](boot.img), 128 MB = Ok
- modem[0](NON-HLOS.bin), 195,309 MB = Ok
- persist[0](persist.img), 64 MB Skipped

Elapsed Time : 00:02:31
  Reply With Quote
Old 06-21-2023, 19:23   #3165 (permalink)
No Life Poster
 
ceza031's Avatar
 
Join Date: Feb 2012
Age: 39
Posts: 1,395
Member: 1724862
Status: Offline
Thanks Meter: 450
Redmi Note 10 (sunny) EDL Flasing by Hydra Tool

Redmi Note 10 (sunny) EDL Flasing by Hydra Tool



Quote:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Qualcomm Flashing Function......
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

PreOperation Configuration
Brand : XIAOMI Model : Redmi Note 10 (sunny) Storage : Auto
Loader: 000950E100720000_1bebe3863a6781db_404ab4f2_XIAOMI_ auth.fhprg
Port : Auto

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM26)
SymbolicName :\\?\usb#vid_05c6&pid_9008#5&1946a98f&0&4#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/02/2017,2.1.2.7

Getting device info. [Connected].....
Serial No.: 0x95843824
HW_ID : 000950E100720000
MSM ID : 0x000950E1, SM6150-Qualcomm Snapdragon 675 /SDM6150LA
MODEL_ID : 0x0000
OEM_ID : 0x0072 - XIAOMI
PBL Ver : 00000000
PK HASH : 1bebe3863a6781db4b01086063007334de9e5ca14971c7c4f4 358ec9d79cda46

Firehose Loader[000950E100720000_1bebe3863a6781db_404ab4f2_XIAOMI_ auth.fhprg]
--------------------------------------------------
Header Type : New
TargetMSM :
Tag : _auth
Version : 6
Code_size : 816
Signature_size : 256
fhVendor : XIAOMI
HW_ID : 000950E100720000
Vendor : XIAOMI
OEM_ID : 0072
MODEL_ID : 0000
SW_ID : 00000003
APP_ID : 00000000
pk_hash : 1bebe3863a6781db4b01086063007334de9e5ca14971c7c4f4 358ec9d79cda4692ce5e948c6fd409408f4c919fcadfe3
OEM_VERSION : c3-bsp-builder-job004.bj
IMAGE_VARIANT : SDM6150LA
QC_VERSION : BOOT.XF.3.1-00157-SM6150LZB-1
--------------------------------------------------

SaharaBoot... Ok
Sending ..................................Ok
Connecting to Firehose...
Ping..................... Ok
Configuration[FHProt_Auto].
Xiaomi Authentication needed...
Signature Request -> bob[3XkvVhPLrg6cxMvsLNdU9f2cZUs]
Signature @256bytes Authentication.... Accepted........
Identifying Chip........UFS
Ok
Chip Configuration :
MemoryName : UFS
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Mar 7 2019 - 23:06:29

*** STORAGE DEVICE INFO ***
Memory Type : UFS
Block Size in Bytes : 4096
Page Size : 4096
Manufacturer ID : 429
Serial Number : 2037279096
Firmware Version : 002
Product Name : H9HQ15AECMBDAR
Physical Partitions : 6
Total Logical Blocks:
Drive [0] 30119936[114,898 GB]
Drive [1] 2048[8 MB]
Drive [2] 2048[8 MB]
Drive [3] 32768[128 MB]
Drive [4] 1048576[4 GB]
Drive [5] 32768[128 MB]

Protocol : Universal
Running : Ok

Reading GPT[6]
Drive [0] 32 Items
Drive [1] 32 Items
Drive [2] 32 Items
Drive [3] 32 Items
Drive [4] 64 Items
Drive [5] 32 Items

--------------- Reading build.prop content ---------------
build.prop
system
build.prop
Marketname : ro.product.system
ID : RKQ1.201022.002
SDK : 30
Release : 11
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Security Patch : 2021-02-01
--------------- end of build.prop content ---------------

Auto Backup Security partitions...
Reading Security Items....
- modemst1(modemst1.bin), 2,496 MB = Ok
- modemst2(modemst2.bin), 2,496 MB = Ok
- fsg(fsg.bin), 2,496 MB = Ok
- fsc(fsc.bin), 124 KB = Ok
- persist(persist.bin), 31,996 MB = Ok

C:\Hydra Tool\Backup\QUALBackup\XIAOMI\000950E100720000_958 43824\Auto_Backup\062123091625
Backup Security Success....

Auto Backup Security partitions...
Reading Security Items....
- modemst1(modemst1.bin), 2,496 MB = Ok
- modemst2(modemst2.bin), 2,496 MB = Ok
- fsg(fsg.bin), 2,496 MB = Ok
- fsc(fsc.bin), 124 KB = Ok
- persist(persist.bin), 31,996 MB = Ok

C:\Hydra Tool\Backup\QUALBackup\XIAOMI\000950E100720000_958 43824\Auto_Backup\062123091634
Backup Security Success....
----------------------------
Flashing Selected Partitions....
- misc[0](misc.img), 8 KB = Ok
- cust[0](cust.img), 917,2 MB = Ok
- super[0](super.img), 5,401 GB = Ok
- vbmeta_system_a[0](vbmeta_system.img), 4 KB = Ok
- metadata[0](metadata.img), 44,074 KB = Ok
- rescue[0](rescue.img), 40,074 KB = Ok
- ffu[0](ffu.img), 4 MB = Ok
- userdata[0](userdata.img), 716,657 MB = Ok
- PrimaryGPT[0](gpt_main0.bin), 24 KB = Ok
- xbl_a[1](xbl.elf), 3,446 MB = Ok
- xbl_config_a[1](xbl_config.elf), 71,324 KB = Ok
- PrimaryGPT[1](gpt_main1.bin), 24 KB = Ok
- xbl_b[2](xbl.elf), 3,446 MB = Ok
- xbl_config_b[2](xbl_config.elf), 71,324 KB = Ok
- PrimaryGPT[2](gpt_main2.bin), 24 KB = Ok
- PrimaryGPT[3](gpt_main3.bin), 24 KB = Ok
- aop_a[4](aop.mbn), 156,949 KB = Ok
- tz_a[4](tz.mbn), 1,965 MB = Ok
- hyp_a[4](hyp.mbn), 368,547 KB = Ok
- bluetooth_a[4](BTFM.bin), 908 KB = Ok
- abl_a[4](abl.elf), 204 KB = Ok
- dsp_a[4](dspso.bin), 32 MB = Ok
- keymaster_a[4](km41.mbn), 237,155 KB = Ok
- boot_a[4](boot.img), 128 MB = Ok
- cmnlib_a[4](cmnlib.mbn), 389,521 KB = Ok
- cmnlib64_a[4](cmnlib64.mbn), 507,959 KB = Ok
- devcfg_a[4](devcfg.mbn), 42,867 KB = Ok
- qupfw_a[4](qupv3fw.elf), 48,081 KB = Ok
- vbmeta_a[4](vbmeta.img), 4 KB = Ok
- dtbo_a[4](dtbo.img), 8 MB = Ok
- imagefv_a[4](imagefv.elf), 20 KB = Ok
- uefisecapp_a[4](uefi_sec.mbn), 123,772 KB = Ok
- vendor_boot_a[4](vendor_boot.img), 96 MB = Ok
- aop_b[4](aop.mbn), 156,949 KB = Ok
- tz_b[4](tz.mbn), 1,965 MB = Ok
- hyp_b[4](hyp.mbn), 368,547 KB = Ok
- bluetooth_b[4](BTFM.bin), 908 KB = Ok
- abl_b[4](abl.elf), 204 KB = Ok
- dsp_b[4](dspso.bin), 32 MB = Ok
- keymaster_b[4](km41.mbn), 237,155 KB = Ok
- boot_b[4](boot.img), 128 MB = Ok
- cmnlib_b[4](cmnlib.mbn), 389,521 KB = Ok
- cmnlib64_b[4](cmnlib64.mbn), 507,959 KB = Ok
- devcfg_b[4](devcfg.mbn), 42,867 KB = Ok
- qupfw_b[4](qupv3fw.elf), 48,081 KB = Ok
- vbmeta_b[4](vbmeta.img), 4 KB = Ok
- dtbo_b[4](dtbo.img), 8 MB = Ok
- imagefv_b[4](imagefv.elf), 20 KB = Ok
- uefisecapp_b[4](uefi_sec.mbn), 123,772 KB = Ok
- logfs[4](logfs_ufs_8mb.bin), 16 KB = Ok
- storsec[4](storsec.mbn), 20,091 KB = Ok
- PrimaryGPT[4](gpt_main4.bin), 24 KB = Ok
- PrimaryGPT[5](gpt_main5.bin), 24 KB = Ok

Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-6.] = Ok
0 [NUM_DISK_SECTORS-6.] = Ok
0 [NUM_DISK_SECTORS-6.] = Ok
0 [NUM_DISK_SECTORS-6.] = Ok
0 [NUM_DISK_SECTORS-1.] = Ok
0 [NUM_DISK_SECTORS-1.] = Ok
0 [NUM_DISK_SECTORS-5.] = Ok
0 [CRC32(2,4096)] = Ok
0 [CRC32(NUM_DISK_SECTORS-5.,4096)] = Ok
0 [0] = Ok
0 [CRC32(1,92)] = Ok
0 [0] = Ok
0 [CRC32(NUM_DISK_SECTORS-1.,92)] = Ok
1 [NUM_DISK_SECTORS-6.] = Ok
1 [NUM_DISK_SECTORS-6.] = Ok
1 [NUM_DISK_SECTORS-6.] = Ok
1 [NUM_DISK_SECTORS-6.] = Ok
1 [NUM_DISK_SECTORS-1.] = Ok
1 [NUM_DISK_SECTORS-1.] = Ok
1 [NUM_DISK_SECTORS-5.] = Ok
1 [CRC32(2,4096)] = Ok
1 [CRC32(NUM_DISK_SECTORS-5.,4096)] = Ok
1 [0] = Ok
1 [CRC32(1,92)] = Ok
1 [0] = Ok
1 [CRC32(NUM_DISK_SECTORS-1.,92)] = Ok
2 [NUM_DISK_SECTORS-6.] = Ok
2 [NUM_DISK_SECTORS-6.] = Ok
2 [NUM_DISK_SECTORS-6.] = Ok
2 [NUM_DISK_SECTORS-6.] = Ok
2 [NUM_DISK_SECTORS-1.] = Ok
2 [NUM_DISK_SECTORS-1.] = Ok
2 [NUM_DISK_SECTORS-5.] = Ok
2 [CRC32(2,4096)] = Ok
2 [CRC32(NUM_DISK_SECTORS-5.,4096)] = Ok
2 [0] = Ok
2 [CRC32(1,92)] = Ok
2 [0] = Ok
2 [CRC32(NUM_DISK_SECTORS-1.,92)] = Ok
3 [NUM_DISK_SECTORS-6.] = Ok
3 [NUM_DISK_SECTORS-6.] = Ok
3 [NUM_DISK_SECTORS-6.] = Ok
3 [NUM_DISK_SECTORS-6.] = Ok
3 [NUM_DISK_SECTORS-1.] = Ok
3 [NUM_DISK_SECTORS-1.] = Ok
3 [NUM_DISK_SECTORS-5.] = Ok
3 [CRC32(2,4096)] = Ok
3 [CRC32(NUM_DISK_SECTORS-5.,4096)] = Ok
3 [0] = Ok
3 [CRC32(1,92)] = Ok
3 [0] = Ok
3 [CRC32(NUM_DISK_SECTORS-1.,92)] = Ok
4 [NUM_DISK_SECTORS-6.] = Ok
4 [NUM_DISK_SECTORS-6.] = Ok
4 [NUM_DISK_SECTORS-6.] = Ok
4 [NUM_DISK_SECTORS-6.] = Ok
4 [NUM_DISK_SECTORS-1.] = Ok
4 [NUM_DISK_SECTORS-1.] = Ok
4 [NUM_DISK_SECTORS-5.] = Ok
4 [CRC32(2,8192)] = Ok
4 [CRC32(NUM_DISK_SECTORS-5.,8192)] = Ok
4 [0] = Ok
4 [CRC32(1,92)] = Ok
4 [0] = Ok
4 [CRC32(NUM_DISK_SECTORS-1.,92)] = Ok
5 [NUM_DISK_SECTORS-6.] = Ok
5 [NUM_DISK_SECTORS-6.] = Ok
5 [NUM_DISK_SECTORS-6.] = Ok
5 [NUM_DISK_SECTORS-6.] = Ok
5 [NUM_DISK_SECTORS-1.] = Ok
5 [NUM_DISK_SECTORS-1.] = Ok
5 [NUM_DISK_SECTORS-5.] = Ok
5 [CRC32(2,4096)] = Ok
5 [CRC32(NUM_DISK_SECTORS-5.,4096)] = Ok
5 [0] = Ok
5 [CRC32(1,92)] = Ok
5 [0] = Ok
5 [CRC32(NUM_DISK_SECTORS-1.,92)] = Ok
Operation : Setbootablestoragedrive: Drive 1
Set bootable storage drive 1 Ok

Rebooting Phone.... Ok

Elapsed Time : 00:14:03
  Reply With Quote
Reply

Bookmarks

Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


 



All times are GMT +1. The time now is 14:26.



Powered by Searchlight © 2024 Axivo Inc.
vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2024 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2023 -
Page generated in 0.50699 seconds with 9 queries

SEO by vBSEO