GSM Shop GSM Shop
GSM-Forum  

Welcome to the GSM-Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features.
Only registered members may post questions, contact other members or search our database of over 8 million posts.

Registration is fast, simple and absolutely free so please - Click to REGISTER!

If you have any problems with the registration process or your account login, please contact contact us .

Go Back   GSM-Forum > Product Support Sections > Special Solutions / Services / WebShop > GSMFABRICA Products > HYDRA TOOL

Reply
 
LinkBack Thread Tools Display Modes
Old 07-16-2023, 06:50   #3211 (permalink)
Product Supporter
 
Hydra Supporter's Avatar
 
Join Date: Jan 2021
Location: ... Heart ...
Posts: 593
Member: 2977290
Status: Offline
Thanks Meter: 729
Samsung A11 (SM-A115M) FRP Lock Remove with Hydra Tool


Samsung A11 (SM-A115M) FRP Lock Remove with Hydra Tool



Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 
                   Qualcomm Service Tool
                  Factory Reset Protection
                            Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 

PreOperation Configuration 
 Brand : AUTO Model : AUTO Storage : Auto
 Loader: Auto
 Port  : Auto

 Searching for Qualcomm 9008 Device...Found
 FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM11)
 SymbolicName :\\?\usb#vid_05c6&pid_9008#5&521a615&0&9#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :08/02/2017,2.1.2.7

Getting device info. [Connected].....
Serial No.: 0x10DE0D5F
HW_ID     : 0009A0E100200000
MSM ID    : 0x0009A0E1, SDM450-Qualcomm Snapdragon 450/JAADANAZA
MODEL_ID  : 0x0000
OEM_ID    : 0x0020 - SAMSUNG
PBL Ver   : 00000000
PK HASH   : 084e868b048512d828c51a78a9251ece3c48313ff498fa6f18335e9f56c276bd

Hydra Enable Auto search Firehose..
 #Please wait...
 #Search by filename filter.....
 #Found 6 Compatible Files ..Found match Firehose...
 
Firehose Loader[0009a0e100200000_084e868b048512d8_1082a027_samsung_samsung corporation_8953.fhprg]
--------------------------------------------------
  Header Type    : OLD
  TargetMSM      : 8953
  Tag            : 
  Version        : 3
  Code_size      : 320
  Signature_size : 256
  fhVendor       : SAMSUNG CORPORATION
  HW_ID          : 0009A0E100200000
  Vendor         : SAMSUNG
  OEM_ID         : 0020
  MODEL_ID       : 0000
  SW_ID          : 0000000100000003
  APP_ID         : 
  pk_hash        : 084e868b048512d828c51a78a9251ece3c48313ff498fa6f18335e9f56c276bd
  OEM_VERSION    : 21HH1D11
  IMAGE_VARIANT  : JAADANAZA
  QC_VERSION     : BOOT.BF.3.3.2-00077
--------------------------------------------------

SaharaBoot... Ok
Sending ......................Ok
Connecting to Firehose...
Ping... Ok 
Configuration[FHProt_Auto]......
Identifying Chip....
Ok
Chip Configuration :
 MemoryName : eMMC
 MaxPayloadSizeToTargetInBytes : 1048576
 MaxPayloadSizeToTargetInBytesSupported : 1048576
 MaxPayloadSizeFromTargetInBytes : 4096
 MaxXMLSizeInBytes : 4096
 TargetName : 8953
 Version : 1

*** STORAGE DEVICE INFO ***
Memory Type         : eMMC
Block Size in Bytes : 512
Page Size           : 512
Manufacturer ID     : 21
Serial Number       : 143314151
Firmware Version    : 1
Product Name        : GP6BAB
Physical Partitions : 3
Total Logical Blocks:
          Drive [0]  122142720[58,242 GB]
          Drive [1]  8192[4 MB]
          Drive [2]  8192[4 MB]

Protocol : Universal
Running : Ok

Reading GPT[3]
          Drive [0] 128 Items
          Drive [1] 0 Items
          Drive [2] 0 Items

--------------- Reading build.prop content ---------------
build.prop
system
build.prop
  Product        : a11q
  ID             : RP1A.200720.012
  SDK            : 30
  Release        : 11
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Locale         : en-GB
  Description    : a11qub-user 11 RP1A.200720.012 A115MUBU2BVB2 release-keys
  Display ID     : RP1A.200720.012.A115MUBU2BVB2
  Security Patch : 2022-03-01
--------------- end of build.prop content ---------------

Auto Backup Security partitions...
Reading Security Items....
 - modemst1(modemst1.bin), 4 MB                        = Ok
 - modemst2(modemst2.bin), 4 MB                        = Ok
 - fsg(fsg.bin), 10 MB                                 = Ok
 - fsc(fsc.bin), 3,25 MB                               = Ok
 - persist(persist.bin), 32 MB                         = Ok

C:\Hydra Tool\Backup\QUALBackup\SAMSUNG\0009A0E100200000_10DE0D5F\Auto_Backup\0707231trt3918
Backup Security Success....
 - Removing FRP
Executing ...
 - Removing FRP [Zero Wipe] Ok
 - Removing FRP [Zero Wipe] OkOk
 - Removing FRP
Executing ...
 - Removing FRP [Zero Wipe] Ok
 - Removing FRP [Zero Wipe] OkOk

Rebooting Phone.... Ok

Action Result :  Ok

Elapsed Time : 00:00:20

Last edited by Hydra Supporter; 07-16-2023 at 07:12.
  Reply With Quote
Old 07-16-2023, 06:51   #3212 (permalink)
Product Supporter
 
Hydra Supporter's Avatar
 
Join Date: Jan 2021
Location: ... Heart ...
Posts: 593
Member: 2977290
Status: Offline
Thanks Meter: 729
Tecno Pop 5 LTE FRP Lock Remove with Hydra Tool

Tecno Pop 5 LTE FRP Lock Remove with Hydra Tool

Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 
                  Service Tool Function..
                  Factory Reset Protection
                       Factory Reset
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 

****************** PRESS BOOT KEY ******************
 VOL + OR VOL - , OR Combination Vol - +
 Feature Phone :  Call Button
 Please hold boot key until second boot.. 
*******************************************
Scanning Port....

Openning Port [COM6] Ok
Identifying... [SPRD3]
Sending Config Ok Ok
Spreadtrum Boot Block version 1.1
Sending To phone....
Unisoc Not Secured.... Ok
Successfully booted..Ready to go...

Reading System Info.
Reading IMEI...
BSL_REP_OPERATION_FAILED
BSL_REP_OPERATION_FAILED
BSL_REP_OPERATION_FAILED.
IMEI 1 : 000000000000000
IMEI 2 : 000000000000000
IMEI 3 : 000000000000000
IMEI 4 : 000000000000000
BSL_WRITE_ERROR
BSL_WRITE_ERROR
Rebooting Phone..Ok

Action Result :  Ok

Elapsed Time : 00:00:19

  Reply With Quote
Old 07-16-2023, 06:54   #3213 (permalink)
Product Supporter
 
Hydra Supporter's Avatar
 
Join Date: Jan 2021
Location: ... Heart ...
Posts: 593
Member: 2977290
Status: Offline
Thanks Meter: 729
Vivo Y81i (1812) Flashing done with Hydra Tool

Vivo Y81i (1812) Flashing done with Hydra Tool


- First Keep Press Boot Info
Code:
-------------------------------------------------------
To Enable BROM  Mode : 
     Method 1    - Bootkey (Vol + - Power) or any combination
     Method 2    - Enable Preloader to brom(crashing Method)
     Method 3    - Test Point Data0 + ground
To Enable Preloader  Mode : 
     Method 1    - Just Insert cable
-------------------------------------------------------

Searching for MTK Device...Found
  MTK Port Type   : Flashmode BROM 
  FriendlyName    : MediaTek USB Port_V1633 (COM4)
  Device          : /6&37254210&0&4
  SymbolicName    : \\?\usb#vid_0e8d&pid_0003#6&37254210&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 01/22/2015,3.0.1504.0
  Service         : wdm_usb

Openning Port [COM4] Ok
Handshaking...Ok
  HwCode          : 0717 {MT6761/MT6762/MT3369/MT8766B}
  Hwver           : 0000
  Target config   : E5
  SBC             : 01 (True)
  SLA             : 00 (False)
  DAA             : 04 (True)
  SWJTAG          : 04 (True)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 20 (True)
  MEMWRITE        : 40 (True)
  CMD_C8          : 80 (True)
  Connection      : BROM
  HW Subcode      : 8A00
  HW Subcode      : CA01
  SW Ver          : 0200
  ME_ID           : 820D42FD152D436532D17D77D6118563
  SOC_ID          : F4D91C36D3D43BA509BF9E2EBF5C5DDFA6CC7E1F565A7414884E8613CC43E70C

Exploiting Device...
Successfully Exploited..
Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..Found @ 0x00200BC4
Starting to dump...
Prel Size : 0x0003B72C
Successfully dump preloader..  [C:\Hydra Tool\Boot\PreloaderDump\preloader_k61v1_64_bsp.bin]
  Target config   : 00
  SBC             : 00 (False)
  SLA             : 00 (False)
  DAA             : 00 (False)
  SWJTAG          : 00 (False)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 00 (False)
  MEMWRITE        : 00 (False)
  CMD_C8          : 00 (False)
  Connection      : BROM

Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin]
Patching da2 ... Ok
Uploading Stage 1....
Successfully uploaded stage 1, jumping ..
Executing JUMP_DA Address @ 0x00200000
Jumping to 0x00200000 Ok 0xC0
Successfully received DA sync
  ONNECTION_AGENT : brom
  DRAM config needed for : 90014A4841473461
Sending auto preloader from dump...  [preloader_k61v1_64_bsp.bin]
Sending emi data.. [DRAM setup passed.]
Sending emi data succeeded.
Uploading stage 2...
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
  ERAM Size       : 0x000000000003A500-233.25 KB
  IRAM Size       : 0x0000000080000000-2 GB
  EMMC Boot1 Size : 0x0000000000400000-4 MB
  EMMC Boot2 Size : 0x0000000000400000-4 MB
  EMMC RPMB Size  : 0x0000000000400000-4 MB
  EMMC USER Size  : 0x00000003AB400000-14.676 GB
  EMMC CID        : 90014A484147346132A52EEB687D660D - HAG4a2
  HW-CODE         : 0x717
  HWSUB-CODE      : 0x8A00
  HW-VERSION      : 0xCA01
  SW-VERSION      : 0x200
  CHIP-EVOLUTION  : 0x0
  DA-VERSION      : 1.0
  Speed           : high-speed
Upload data was accepted. Jumping to stage 2...
DA Extensions successfully added 
Reading Partition Table .. 
Partition Count : 44
--------------- Reading build.prop content ---------------
  Brand          : vivo
  Vendor         : vivo
  Model          : vivo 1812
  Product        : k61v1_64_bsp
  Manufacturer   : vivo
  ID             : O11019
  SDK            : 27
  Release        : 8.1.0
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-US
  Description    : full_k61v1_64_bsp-user 8.1.0 O11019 1563630544 release-keys
  Device         : PD1917F_EX
  Display ID     : O11019 release-keys
  Security Patch : 2019-06-05
  Platform       : =MTK6761
  Fingerprint    : vivo/1812/1812:8.1.0/O11019/1563592353:user/release-keys
  StorageType    : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
 IMEI1 : 86352***********
 IMEI2 : 86352***********
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------

Elapsed Time : 00:00:16




- Select firmware and click execute
Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 
                  MTK Flash Function...               
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 

Searching for MTK Device...Found
  MTK Port Type   : Flashmode BROM 
  FriendlyName    : MediaTek USB Port_V1633 (COM4)
  Device          : /6&37254210&0&4
  SymbolicName    : \\?\usb#vid_0e8d&pid_0003#6&37254210&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 01/22/2015,3.0.1504.0
  Service         : wdm_usb

Openning Port [COM4] Ok
Reading Partition Table .. 
  ERAM Size       : 0x000000000003A500-233.25 KB
  IRAM Size       : 0x0000000080000000-2 GB
  EMMC Boot1 Size : 0x0000000000400000-4 MB
  EMMC Boot2 Size : 0x0000000000400000-4 MB
  EMMC RPMB Size  : 0x0000000000400000-4 MB
  EMMC USER Size  : 0x00000003AB400000-14.676 GB
  EMMC CID        : 90014A484147346132A52EEB687D660D - HAG4a2
  HW-CODE         : 0x717
  HWSUB-CODE      : 0x8A00
  HW-VERSION      : 0xCA01
  SW-VERSION      : 0x200
  CHIP-EVOLUTION  : 0x0
  DA-VERSION      : 1.0
  Speed           : high-speed
Partition Count : 44
--------------- Reading build.prop content ---------------
  Brand          : vivo
  Vendor         : vivo
  Model          : vivo 1812
  Product        : k61v1_64_bsp
  Manufacturer   : vivo
  ID             : O11019
  SDK            : 27
  Release        : 8.1.0
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-US
  Description    : full_k61v1_64_bsp-user 8.1.0 O11019 1563630544 release-keys
  Device         : PD1917F_EX
  Display ID     : O11019 release-keys
  Security Patch : 2019-06-05
  Platform       : =MTK6761
  Fingerprint    : vivo/1812/1812:8.1.0/O11019/1563592353:user/release-keys
  StorageType    : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
 IMEI1 : 86352*********
 IMEI2 : 86352*********
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------

Write Selected Partitions..
 - preloader(preloader_k61v1_64_bsp.bin), 237.793 KB[Erasing...Ok]  Status  :C0010001 Error= Failed
 - recovery(recovery-verified.img), 25.075 MB          = Ok
 - survival(survival-verified.img), 32.07 MB           = Ok
 - cust(oem.img), 7.08 MB                              = Ok
 - efuse(efuse.img), 512 Bytes                         = Ok
 - md1img(md1img-verified.img), 53.782 MB              = Ok
 - spmfw(spmfw-verified.img), 51.125 KB                = Ok
 - scp1(scp-verified.img), 553.703 KB                  = Ok
 - scp2(scp-verified.img), 553.703 KB                  = Ok
 - sspm_1(sspm-verified.img), 389.688 KB               = Ok
 - sspm_2(sspm-verified.img), 389.688 = Ok
 - lk(lk-verified.img), 3.224 MB                       = Ok
 - lk2(lk-verified.img), 3.224 MB                      = Ok
 - boot(boot-verified.img), 10.95 MB                   = Ok
 - logo(logo-verified.bin), 439.906 KB                 = Ok
 - odmdtbo(odmdtbo-verified.img), 103.766 KB           = Ok
 - tee1(tee-verified.img), 462.688 KB                  = Ok
 - tee2(tee-verified.img), 462.688 KB                  = Ok
 - vendor(vendor.img), 441.124 MB                      = Ok
 - system(system.img), 2.812 GB                        = Ok
 - cache(cache.img), 6.102 MB                          = Ok
 - userdata(userdata.img), 703.549 MB                  = Ok
----------------------------------

Elapsed Time : 00:02:46
  Reply With Quote
Old 07-17-2023, 11:52   #3214 (permalink)
Product Supporter
 
Hydra Supporter's Avatar
 
Join Date: Jan 2021
Location: ... Heart ...
Posts: 593
Member: 2977290
Status: Offline
Thanks Meter: 729
Huawei Honor 9 Lite (LLD-L21) FRP Lock Remove with Hydra Tool

Huawei Honor 9 Lite (LLD-L21) FRP Lock Remove with Hydra Tool

- Connect phone with test point
- Select Load Factory Fastboot and click execute

Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 
                    Huawei Service Tool
                        Factory Boot
                   Load Factory Fastboot
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 


Searching for Hisilicon USB1 Port...Found
  FriendlyName    : HUAWEI USB COM 1.0 (COM27)
  Device          : /5&212ac8fc&0&1
  SymbolicName    : \\?\usb#vid_12d1&pid_3609#5&212ac8fc&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 11/06/2015,2.0.7.1
  Service         : HSPL_usbvcom

Openning Port [COM27] Ok
================================
   USB1 To Fastboot....
================================
Sending Fastboot Loader...
 > Loader 1 ...Ok
 > Loader 2 ...Ok

Wait few seconds.. phone will reboot in Fastboot Mode

Action Result :  Ok

Elapsed Time : 00:00:37





- Select FRP Remove Fasbootmode method and click Execute

Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 
                    Huawei Service Tool
              Factory Reset Protection/Account
                         Remove FRP
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 

Searching Device By Fastboot
Device Found...

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                  Reading Device Information...               
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
hotainfo...... 
  #hotainfo_len       : 
  #C_version          : 
  #D_version          : 
  #PLMN               : 
  #BoardID            : 
  #DeviceName         : 
Build number          : LLD-L21 9.1.0.189(C185E11R1P5)
Product Model         : LLD-L21
hwnff_ver             : Ver2.3
key_version           : huawei_key_v1
product               : : hi6250
system_update_state   : FAILED (remote: 'cannot system get update state in oeminfo')
vendorcountry         : : hw/meafnaf
soc_id                : : 0.5
ro_build_fingerprint  : : 0.5
ro_build_version_full : : 0.5
ro_build_version_qcom : : 0.5
psid.........
  #SN                 : HCY4C18*********
  #IMEI1              : 869186**********
  #IMEI2              : 869186**********
Security Info....
 #Dongle_info         : : 0.5
 #FB Lock State       : UNLOCKED
 #USER Lock State     : LOCKED

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Huawei Fastboot Service...
Factory Reset Protection...
Removing....

Action Result :  Ok

Elapsed Time : 00:00:03
  Reply With Quote
Old 07-17-2023, 11:59   #3215 (permalink)
Product Supporter
 
Hydra Supporter's Avatar
 
Join Date: Jan 2021
Location: ... Heart ...
Posts: 593
Member: 2977290
Status: Offline
Thanks Meter: 729
Redmi 6A Mi Account Remove with Hdyra Tool

Redmi 6A Mi Account Remove with Hdyra Tool


- Keep Press Boot Info
Code:
-------------------------------------------------------
To Enable BROM  Mode : 
     Method 1    - Bootkey (Vol + - Power) or any combination
     Method 2    - Enable Preloader to brom(crashing Method)
     Method 3    - Test Point Data0 + ground
To Enable Preloader  Mode : 
     Method 1    - Just Insert cable
-------------------------------------------------------

Searching for MTK Device...Found
  MTK Port Type   : Flashmode BROM 
  FriendlyName    : MediaTek USB Port_V1632 (COM10)
  Device          : /5&ebe48c4&0&3
  SymbolicName    : \\?\usb#vid_0e8d&pid_0003#5&ebe48c4&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 01/22/2015,3.0.1504.0
  Service         : wdm_usb

Openning Port [COM10] Ok
Handshaking...Ok
  HwCode          : 0766 {MT6765/MT8768t}
  Hwver           : 0000
  Target config   : E7
  SBC             : 01 (True)
  SLA             : 02 (True)
  DAA             : 04 (True)
  SWJTAG          : 06 (True)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 20 (True)
  MEMWRITE        : 40 (True)
  CMD_C8          : 80 (True)
  Connection      : BROM
  HW Subcode      : 8A00
  HW Subcode      : CA00
  SW Ver          : 0000
  ME_ID           : 97E446E48B0245B503158DFA0679FBE1
  SOC_ID          : 8A3B1D5E083BB3B242C91F4B15BA3034E773A315347A9C1513F0F6340826D77C

Exploiting Device...
Successfully Exploited..
Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..Found @ 0x00200BC4
Starting to dump...
Prel Size : 0x00039370
Successfully dump preloader..  [C:\Hydra Tool\Boot\PreloaderDump\preloader_cactus.bin]
  Target config   : 00
  SBC             : 00 (False)
  SLA             : 00 (False)
  DAA             : 00 (False)
  SWJTAG          : 00 (False)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 00 (False)
  MEMWRITE        : 00 (False)
  CMD_C8          : 00 (False)
  Connection      : BROM

Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin]
Patching da2 ... Ok
Uploading Stage 1....
Successfully uploaded stage 1, jumping ..
Executing JUMP_DA Address @ 0x00200000
Jumping to 0x00200000 Ok 0xC0
Successfully received DA sync
  ONNECTION_AGENT : brom
  DRAM config needed for : 90014A4841473461
Sending auto preloader from dump...  [preloader_cactus.bin]
Sending emi data.. [DRAM setup passed.]
Sending emi data succeeded.
Uploading stage 2...
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
  ERAM Size       : 0x000000000003A000-232 KB
  IRAM Size       : 0x0000000080000000-2 GB
  EMMC Boot1 Size : 0x0000000000400000-4 MB
  EMMC Boot2 Size : 0x0000000000400000-4 MB
  EMMC RPMB Size  : 0x0000000000400000-4 MB
  EMMC USER Size  : 0x00000003AB400000-14,676 GB
  EMMC CID        : 90014A484147346132A53A369E62B54B - HAG4a2
  HW-CODE         : 0x766
  HWSUB-CODE      : 0x8A00
  HW-VERSION      : 0xCA00
  SW-VERSION      : 0x0
  CHIP-EVOLUTION  : 0x0
  DA-VERSION      : 1.0
  Speed           : high-speed
Upload data was accepted. Jumping to stage 2...
DA Extensions successfully added 
Reading Partition Table .. 
Partition Count : 43
--------------- Reading build.prop content ---------------
  Brand          : xiaomi
  Model          : Redmi 6A
  Product        : cactus
  ID             : PPR1.180610.011
  SDK            : 28
  Release        : 9
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Locale         : en-GB
  Description    : cactus-user 9 PPR1.180610.011 V11.0.8.0.PCBMIXM release-keys
  Device         : cactus
  Display ID     : SW_S98506AE1_V009_M13_XM_C3C_USR
  Security Patch : 2020-05-01
  Fingerprint    : xiaomi/cactus/cactus:9/PPR1.180610.011/V11.0.8.0.PCBMIXM:user/release-keys
  StorageType    : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
 IMEI1 : 3585**********
 IMEI2 : 3585**********
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------
Backing up Security..
 - preloader(preloader.bin), 512 KB                    = Ok  [preloader_cactus.bin]
  *Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0766_97E446D38B0245B503158DFA0679FBE1\Auto\0707233214827\6765_Android_scatter.txt
 - pgpt(pgpt.bin), 32 KB                               = Ok
 - nvram(nvram.bin), 64 MB                             = Ok
 - nvdata(nvdata.bin), 64 MB                           = Ok
 - frp(frp.bin), 1024 KB                               = Ok
 - protect1(protect1.bin), 8 MB                        = Ok
 - protect2(protect2.bin), 9,469 MB                    = Ok
 - persist(persist.bin), 64 MB                         = Ok
 - proinfo(proinfo.bin), 3 MB                          = Ok
 - nvcfg(nvcfg.bin), 32 MB                             = Ok
 - sec1(sec1.bin), 2 MB                                = Ok
 - seccfg(seccfg.bin), 8 MB                            = Ok
 - lk(lk.bin), 1024 KB                                 = Ok
Backup Done!!!

Elapsed Time : 00:00:40




- Remove Mi Account Patch Method
Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 
                      Service Function
                           Xiaomi
              Remove MiAccount [Patch Method]
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 

Searching for MTK Device...Found
  MTK Port Type   : Flashmode BROM 
  FriendlyName    : MediaTek USB Port_V1632 (COM10)
  Device          : /5&ebe48c4&0&3
  SymbolicName    : \\?\usb#vid_0e8d&pid_0003#5&ebe48c4&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 01/22/2015,3.0.1504.0
  Service         : wdm_usb

Openning Port [COM10] Ok
Handshaking...Ok
  HwCode          : 0766 {MT6765/MT8768t}
  Hwver           : 0000
  Target config   : E7
  SBC             : 01 (True)
  SLA             : 02 (True)
  DAA             : 04 (True)
  SWJTAG          : 06 (True)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 20 (True)
  MEMWRITE        : 40 (True)
  CMD_C8          : 80 (True)
  Connection      : BROM
  HW Subcode      : 8A00
  HW Subcode      : CA00
  SW Ver          : 0000
  ME_ID           : 97E446E48B0245B503158DFA0679FBE1
  SOC_ID          : 8A3B1D5E083BB3B242C91F4B15BA3034E773A315347A9C1513F0F6340826D77C

Exploiting Device...
Successfully Exploited..
Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..Found @ 0x00200BC4
Starting to dump...
Prel Size : 0x00039370
Successfully dump preloader..  [C:\Hydra Tool\Boot\PreloaderDump\preloader_cactus.bin]
  Target config   : 00
  SBC             : 00 (False)
  SLA             : 00 (False)
  DAA             : 00 (False)
  SWJTAG          : 00 (False)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 00 (False)
  MEMWRITE        : 00 (False)
  CMD_C8          : 00 (False)
  Connection      : BROM

Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin]
Patching da2 ... Ok
Uploading Stage 1....
Successfully uploaded stage 1, jumping ..
Executing JUMP_DA Address @ 0x00200000
Jumping to 0x00200000 Ok 0xC0
Successfully received DA sync
  ONNECTION_AGENT : brom
  DRAM config needed for : 90014A4841473461
Sending auto preloader from dump...  [preloader_cactus.bin]
Sending emi data.. [DRAM setup passed.]
Sending emi data succeeded.
Uploading stage 2...
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
  ERAM Size       : 0x000000000003A000-232 KB
  IRAM Size       : 0x0000000080000000-2 GB
  EMMC Boot1 Size : 0x0000000000400000-4 MB
  EMMC Boot2 Size : 0x0000000000400000-4 MB
  EMMC RPMB Size  : 0x0000000000400000-4 MB
  EMMC USER Size  : 0x00000003AB400000-14,676 GB
  EMMC CID        : 90014A484147346132A53A369E62B54B - HAG4a2
  HW-CODE         : 0x766
  HWSUB-CODE      : 0x8A00
  HW-VERSION      : 0xCA00
  SW-VERSION      : 0x0
  CHIP-EVOLUTION  : 0x0
  DA-VERSION      : 1.0
  Speed           : high-speed
Upload data was accepted. Jumping to stage 2...
DA Extensions successfully added 
Reading Partition Table .. 
Partition Count : 43
--------------- Reading build.prop content ---------------
  Brand          : xiaomi
  Model          : Redmi 6A
  Product        : cactus
  ID             : PPR1.180610.011
  SDK            : 28
  Release        : 9
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Locale         : en-GB
  Description    : cactus-user 9 PPR1.180610.011 V11.0.8.0.PCBMIXM release-keys
  Device         : cactus
  Display ID     : SW_S98506AE1_V009_M13_XM_C3C_USR
  Security Patch : 2020-05-01
  Fingerprint    : xiaomi/cactus/cactus:9/PPR1.180610.011/V11.0.8.0.PCBMIXM:user/release-keys
  StorageType    : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
 IMEI1 : 3585***********
 IMEI2 : 3585***********
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------
Backing up Security..
 - preloader(preloader.bin), 512 KB                    = Ok  [preloader_cactus.bin]
  *Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0766_97DD6E48B0245B503158DFA0679FBE1\Auto\0110723213907\6765_Android_scatter.txt
 - pgpt(pgpt.bin), 32 KB                               = Ok
 - nvram(nvram.bin), 64 MB                             = Ok
 - nvdata(nvdata.bin), 64 MB                           = Ok
 - frp(frp.bin), 1024 KB                               = Ok
 - protect1(protect1.bin), 8 MB                        = Ok
 - protect2(protect2.bin), 9,469 MB                    = Ok
 - persist(persist.bin), 64 MB                         = Ok
 - proinfo(proinfo.bin), 3 MB                          = Ok
 - nvcfg(nvcfg.bin), 32 MB                             = Ok
 - sec1(sec1.bin), 2 MB                                = Ok
 - seccfg(seccfg.bin), 8 MB                            = Ok
 - lk(lk.bin), 1024 KB                                 = Ok
Backup Done!!!
------------------------------
   Xiaomi Operation Flash Mode..  
------------------------------
Backing up Security..
persist... Ok
vbmeta... Ok
Patching Persist

Scanning Patching address...Please wait...
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
Total Items patched : 2
Successfully patched address..
 -persist .....Ok
Done Writing...
Status:  Ok

Action Result :  Ok

Elapsed Time : 00:04:26
  Reply With Quote
Old 07-17-2023, 12:02   #3216 (permalink)
Product Supporter
 
Hydra Supporter's Avatar
 
Join Date: Jan 2021
Location: ... Heart ...
Posts: 593
Member: 2977290
Status: Offline
Thanks Meter: 729
Tecno Pop 4 LTE FRP Lock Remove with Hydra Tool

Tecno Pop 4 LTE FRP Lock Remove with Hydra Tool

- Keep Press Boot Info

Code:
-------------------------------------------------------
To Enable BROM  Mode : 
     Method 1    - Bootkey (Vol + - Power) or any combination
     Method 2    - Enable Preloader to brom(crashing Method)
     Method 3    - Test Point Data0 + ground
To Enable Preloader  Mode : 
     Method 1    - Just Insert cable
-------------------------------------------------------

Searching for MTK Device...Found
  MTK Port Type   : Flashmode Preloader
  FriendlyName    : MediaTek PreLoader USB VCOM_V1632 (Android) (COM9)
  Device          : /5&33881217&0&2
  SymbolicName    : \\?\usb#vid_0e8d&pid_2000#5&33881217&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 01/22/2015,3.0.1504.0
  Service         : wdm_usb

Openning Port [COM9] Ok
Handshaking...Ok
  HwCode          : 0699 {MT6739/MT6731}
  Hwver           : 0000
  Target config   : 05
  SBC             : 01 (True)
  SLA             : 00 (False)
  DAA             : 04 (True)
  SWJTAG          : 04 (True)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 00 (False)
  MEMWRITE        : 00 (False)
  CMD_C8          : 00 (False)
  Connection      : Preloader
  HW Subcode      : 8A00
  HW Subcode      : CA00
  SW Ver          : 0000
  ME_ID           : E195965CE8086819E1A38D1FE762390B


- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 
                  Preloader To Brom Function.....               
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 
 - Method 1  Exploit Executed..... [Successfully Crash Preloader.]
Device now is BROM Port

Exploiting Device...
Successfully Exploited..
Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..Found @ 0x00200BC4
Starting to dump...
Prel Size : 0x0001CC70
Successfully dump preloader..  [C:\Users\alvin\Desktop\hydra\Boot\PreloaderDump\preloader_k39tv1_bsp.bin]
  Target config   : 00
  SBC             : 00 (False)
  SLA             : 00 (False)
  DAA             : 00 (False)
  SWJTAG          : 00 (False)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 00 (False)
  MEMWRITE        : 00 (False)
  CMD_C8          : 00 (False)
  Connection      : BROM

Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin]
Patching da2 ... Ok
Uploading Stage 1....
Successfully uploaded stage 1, jumping ..
Executing JUMP_DA Address @ 0x00200000
Jumping to 0x00200000 Ok 0xC0
Successfully received DA sync
  ONNECTION_AGENT : brom
Sending auto preloader from dump...  [preloader_k39tv1_bsp.bin]
Sending emi data.. [DRAM setup passed.]
Sending emi data succeeded.
Uploading stage 2...
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
  ERAM Size       : 0x0000000000020000-128 KB
  IRAM Size       : 0x0000000080000000-2 GB
  EMMC Boot1 Size : 0x0000000000400000-4 MB
  EMMC Boot2 Size : 0x0000000000400000-4 MB
  EMMC RPMB Size  : 0x0000000001000000-16 MB
  EMMC USER Size  : 0x0000000747C00000-29.121 GB
  EMMC CID        : 150100514436334D4201202306D2688B - QD63MB
  HW-CODE         : 0x699
  HWSUB-CODE      : 0x8A00
  HW-VERSION      : 0xCA00
  SW-VERSION      : 0x0
  CHIP-EVOLUTION  : 0x0
  DA-VERSION      : 1.0
  Speed           : high-speed
Upload data was accepted. Jumping to stage 2...
DA Extensions successfully added 
Reading Partition Table .. 
Partition Count : 40
--------------- Reading build.prop content ---------------
  Product        : k39tv1_bsp
  ID             : QP1A.190711.020
  SDK            : 29
  Release        : 10
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Locale         : en-US
  Description    : full_k39tv1_bsp-user 10 QP1A.190711.020 1677044979 release-keys
  Device         : TECNO-BC1s
  Display ID     : BC1s-VQ653AB-QGo-OP-230221V021
  Security Patch : 2023-02-05
  Fingerprint    : TECNO/BC1s-OP/TECNO-BC1s:10/QP1A.190711.020/AB-OP-230221V021:user/release-keys
--------------- end of build.prop content ---------------

Reading IMEI........
 IMEI1 : 35082**********
 IMEI2 : 35082**********
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------
Backing up Security..
 - preloader(preloader.bin), 512 KB                    = Ok  [preloader_k39tv1_bsp.bin]
  *Creating Scatter file... C:\Users\alvin\Desktop\hydra\Backup\MTKBKUP\0699_EWWW965CE8086819E1A38D1FE762390B\Auto\0707244083426\6739_Android_scatter.txt
 - pgpt(pgpt.bin), 32 KB                               = Ok
 - nvram(nvram.bin), 5 MB                              = Ok
 - nvdata(nvdata.bin), 32 MB                           = Ok
 - frp(frp.bin), 1024 KB                               = Ok
 - protect1(protect1.bin), 8 MB                        = Ok
 - protect2(protect2.bin), 10.867 MB                   = Ok
 - persist(persist.bin), 48 MB                         = Ok
 - proinfo(proinfo.bin), 3 MB                          = Ok
 - nvcfg(nvcfg.bin), 8 MB                              = Ok
 - sec1(sec1.bin), 2 MB                                = Ok
 - seccfg(seccfg.bin), 8 MB                            = Ok
 - lk(lk.bin), 1024 KB                                 = Ok
Backup Done!!!

Elapsed Time : 00:00:36


- Select FRP Remove and Click Execute
Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 
                      Service Function
               Factory Reset Protection[FRP]
                            Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 

Searching for MTK Device...Found
  MTK Port Type   : Flashmode BROM 
  FriendlyName    : MediaTek USB Port_V1632 (COM6)
  Device          : /5&33881217&0&2
  SymbolicName    : \\?\usb#vid_0e8d&pid_0003#5&33881217&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 01/22/2015,3.0.1504.0
  Service         : wdm_usb

Openning Port [COM6] Ok
Reading Partition Table .. 
  ERAM Size       : 0x0000000000020000-128 KB
  IRAM Size       : 0x0000000080000000-2 GB
  EMMC Boot1 Size : 0x0000000000400000-4 MB
  EMMC Boot2 Size : 0x0000000000400000-4 MB
  EMMC RPMB Size  : 0x0000000001000000-16 MB
  EMMC USER Size  : 0x0000000747C00000-29.121 GB
  EMMC CID        : 150100514436334D4201202306D2688B - QD63MB
  HW-CODE         : 0x699
  HWSUB-CODE      : 0x8A00
  HW-VERSION      : 0xCA00
  SW-VERSION      : 0x0
  CHIP-EVOLUTION  : 0x0
  DA-VERSION      : 1.0
  Speed           : high-speed
Partition Count : 40
--------------- Reading build.prop content ---------------
  Product        : k39tv1_bsp
  ID             : QP1A.190711.020
  SDK            : 29
  Release        : 10
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Locale         : en-US
  Description    : full_k39tv1_bsp-user 10 QP1A.190711.020 1677044979 release-keys
  Device         : TECNO-BC1s
  Display ID     : BC1s-VQ653AB-QGo-OP-230221V021
  Security Patch : 2023-02-05
  Fingerprint    : TECNO/BC1s-OP/TECNO-BC1s:10/QP1A.190711.020/AB-OP-230221V021:user/release-keys
--------------- end of build.prop content ---------------

Reading IMEI........
 IMEI1 : 35082*********
 IMEI2 : 35082*********
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------

Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!

Action Result :  Ok

Elapsed Time : 00:00:06
  Reply With Quote
Old 07-17-2023, 12:06   #3217 (permalink)
Product Supporter
 
Hydra Supporter's Avatar
 
Join Date: Jan 2021
Location: ... Heart ...
Posts: 593
Member: 2977290
Status: Offline
Thanks Meter: 729
Vivo Y71 (1724) pattern and frp lock remove with Hydra Tool

Vivo Y71 (1724) pattern and frp lock remove with Hydra Tool


- First Keep Press Boot Info
Code:
PreOperation Configuration 
 Brand : AUTO Model : AUTO Storage : Auto
 Loader: Auto
 Port  : Auto

 Searching for Qualcomm 9008 Device...Found
 FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM4)
 SymbolicName :\\?\usb#vid_05c6&pid_9008#5&29e81f4d&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/25/2014,2.1.1.0

Getting device info. [Connected].....
Serial No.: 0x1AE8541A
HW_ID     : 000560E100000000
MSM ID    : 0x000560E1, MSM8917-Qualcomm Snapdragon 425/LAADANAZA
MODEL_ID  : 0x0000
OEM_ID    : 0x0000 - QUALCOMM
PBL Ver   : 00000000
PK HASH   : 60ba997fef6da9f05885fa11f1dd6d2a90d052a257a09c2075d7246cc73c0d43

Hydra Enable Auto search Firehose..
 #Please wait...
 #Search by filename filter.....
 #Found 21 Compatible Files ..Found match Firehose...
 
Firehose Loader[000560e100000000_60ba997fef6da9f0_1600b30c_qualcomm_vivo_peek_8917.fhprg]
--------------------------------------------------
  Header Type    : OLD
  TargetMSM      : 8917
  Tag            : _peek
  Version        : 3
  Code_size      : 288
  Signature_size : 256
  fhVendor       : VIVO
  HW_ID          : 000560E100000000
  Vendor         : QUALCOMM
  OEM_ID         : 0000
  MODEL_ID       : 0000
  SW_ID          : 0000000000000003
  APP_ID         : 
  pk_hash        : 60ba997fef6da9f05885fa11f1dd6d2a90d052a257a09c2075d7246cc73c0d43
  OEM_VERSION    : compiler026
  IMAGE_VARIANT  : LAADANAZA
  QC_VERSION     : BOOT.BF.3.3-00199
--------------------------------------------------

SaharaBoot... Ok
Sending .................Ok
Connecting to Firehose...
Ping... Ok 
Configuration[FHProt_Auto]......
Identifying Chip....
Ok
Chip Configuration :
 MemoryName : eMMC
 MaxPayloadSizeToTargetInBytes : 1048576
 MaxPayloadSizeToTargetInBytesSupported : 1048576
 MaxPayloadSizeFromTargetInBytes : 4096
 MaxXMLSizeInBytes : 4096
 TargetName : 8917
 Version : 1

*** STORAGE DEVICE INFO ***
Memory Type         : eMMC
Block Size in Bytes : 512
Page Size           : 512
Manufacturer ID     : 21
Serial Number       : 217974681
Firmware Version    : 3
Product Name        : QE63MB
Physical Partitions : 3
Total Logical Blocks:
          Drive [0]  30535680[14.561 GB]
          Drive [1]  8192[4 MB]
          Drive [2]  8192[4 MB]

Protocol : Universal
Running : Ok

Reading GPT[3]
          Drive [0] 56 Items
          Drive [1] 0 Items
          Drive [2] 0 Items

--------------- Reading build.prop content ---------------
build.prop
  Brand          : vivo
  Vendor         : vivo
  Model          : vivo 1724
  Product        : msm8937_64
  Manufacturer   : vivo
  ID             : OPM1.171019.011
  SDK            : 27
  Release        : 8.1.0
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-US
  Description    : msm8937_64-user 8.1.0 OPM1.171019.011 eng.compil.20210507.114116 release-keys
  Device         : msm8937_64
  Display ID     : OPM1.171019.011 release-keys
  Security Patch : 2021-03-01
  Fingerprint    : vivo/1724/1724:8.1.0/OPM1.171019.011/compil05071141:user/release-keys
--------------- end of build.prop content ---------------

Auto Backup Security partitions...
Reading Security Items....
 - modemst1(modemst1.bin), 2.5 MB                      = Ok
 - modemst2(modemst2.bin), 2.5 MB                      = Ok
 - fsg(fsg.bin), 2.5 MB                                = Ok
 - fsc(fsc.bin), 512 Bytes                             = Ok
 - persist(persist.bin), 32 MB                         = Ok

C:\Hydra Tool\Backup\QUALBackup\QUALCOMM\000560E100000000_1AE8541A\Auto_Backup\070723193739
Backup Security Success....

Elapsed Time : 00:00:13





- Select Factory Reset safeformat and click execute
Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 
                     Vivo Service Tool
               Factory Reset/Format Userdata
                            Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 

PreOperation Configuration 
 Brand : AUTO Model : AUTO Storage : Auto
 Loader: Auto
 Port  : Auto

 Searching for Qualcomm 9008 Device...Found
 FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM4)
 SymbolicName :\\?\usb#vid_05c6&pid_9008#5&29e81f4d&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/25/2014,2.1.1.0

Getting device info. [Connected].Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok 
Configuration[FHProt_Auto]......
Ok
Chip Configuration :
 MemoryName : eMMC
 MaxPayloadSizeToTargetInBytes : 1048576
 MaxPayloadSizeToTargetInBytesSupported : 1048576
 MaxPayloadSizeFromTargetInBytes : 4096
 MaxXMLSizeInBytes : 4096
 TargetName : 8917
 Version : 1

*** STORAGE DEVICE INFO ***
Memory Type         : eMMC
Block Size in Bytes : 512
Page Size           : 512
Manufacturer ID     : 21
Serial Number       : 217974681
Firmware Version    : 3
Product Name        : QE63MB
Physical Partitions : 3
Total Logical Blocks:
          Drive [0]  30535680[14.561 GB]
          Drive [1]  8192[4 MB]
          Drive [2]  8192[4 MB]

Protocol : Universal
Running : Ok

Reading GPT[3]
          Drive [0] 56 Items
          Drive [1] 0 Items
          Drive [2] 0 Items

--------------- Reading build.prop content ---------------
build.prop
  Brand          : vivo
  Vendor         : vivo
  Model          : vivo 1724
  Product        : msm8937_64
  Manufacturer   : vivo
  ID             : OPM1.171019.011
  SDK            : 27
  Release        : 8.1.0
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-US
  Description    : msm8937_64-user 8.1.0 OPM1.171019.011 eng.compil.20210507.114116 release-keys
  Device         : msm8937_64
  Display ID     : OPM1.171019.011 release-keys
  Security Patch : 2021-03-01
  Fingerprint    : vivo/1724/1724:8.1.0/OPM1.171019.011/compil05071141:user/release-keys
--------------- end of build.prop content ---------------
Processing Safe Format  - Auto....
 - Formatting Userdata
Executing ...
 - Formatting Userdata  [Safe Format - eMMc] OkOk

Rebooting Phone.... Ok

Action Result :  Ok

Elapsed Time : 00:00:05



- Select FRP Remove and click execute
Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 
                     Vivo Service Tool
         Factory Reset Protection(FRP)/Demo Remove
                            Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 

PreOperation Configuration 
 Brand : AUTO Model : AUTO Storage : Auto
 Loader: Auto
 Port  : Auto

 Searching for Qualcomm 9008 Device...Found
 FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM4)
 SymbolicName :\\?\usb#vid_05c6&pid_9008#5&29e81f4d&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/25/2014,2.1.1.0

Getting device info. [Connected].Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok 
Configuration[FHProt_Auto]......
Ok
Chip Configuration :
 MemoryName : eMMC
 MaxPayloadSizeToTargetInBytes : 1048576
 MaxPayloadSizeToTargetInBytesSupported : 1048576
 MaxPayloadSizeFromTargetInBytes : 4096
 MaxXMLSizeInBytes : 4096
 TargetName : 8917
 Version : 1

*** STORAGE DEVICE INFO ***
Memory Type         : eMMC
Block Size in Bytes : 512
Page Size           : 512
Manufacturer ID     : 21
Serial Number       : 217974681
Firmware Version    : 3
Product Name        : QE63MB
Physical Partitions : 3
Total Logical Blocks:
          Drive [0]  30535680[14.561 GB]
          Drive [1]  8192[4 MB]
          Drive [2]  8192[4 MB]

Protocol : Universal
Running : Ok

Reading GPT[3]
          Drive [0] 56 Items
          Drive [1] 0 Items
          Drive [2] 0 Items

--------------- Reading build.prop content ---------------
build.prop
  Brand          : vivo
  Vendor         : vivo
  Model          : vivo 1724
  Product        : msm8937_64
  Manufacturer   : vivo
  ID             : OPM1.171019.011
  SDK            : 27
  Release        : 8.1.0
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-US
  Description    : msm8937_64-user 8.1.0 OPM1.171019.011 eng.compil.20210507.114116 release-keys
  Device         : msm8937_64
  Display ID     : OPM1.171019.011 release-keys
  Security Patch : 2021-03-01
  Fingerprint    : vivo/1724/1724:8.1.0/OPM1.171019.011/compil05071141:user/release-keys
--------------- end of build.prop content ---------------

Rebooting Phone.... Ok

Rebooting Phone.... Ok

Action Result :  Ok

Elapsed Time : 00:00:06
  Reply With Quote
Old 07-17-2023, 12:09   #3218 (permalink)
Product Supporter
 
Hydra Supporter's Avatar
 
Join Date: Jan 2021
Location: ... Heart ...
Posts: 593
Member: 2977290
Status: Offline
Thanks Meter: 729
Xiaomi Redmi 9 (lancelot) Flashing Done with Hydra Tool

Xiaomi Redmi 9 (lancelot) Flashing Done with Hydra Tool

Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 
                  MTK Partition Manager Function...               
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 

Searching for MTK Device...Found
  MTK Port Type   : Flashmode BROM 
  FriendlyName    : MediaTek USB Port_V1632 (COM15)
  Device          : /7&3b5abdfa&0&2
  SymbolicName    : \\?\usb#vid_0e8d&pid_0003#7&3b5abdfa&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 01/22/2015,3.0.1504.0
  Service         : wdm_usb

Openning Port [COM15] Ok
Reading Partition Table .. 
  ERAM Size       : 0x0000000000070000-448 KB
  IRAM Size       : 0x0000000100000000-4 GB
  EMMC Boot1 Size : 0x0000000000400000-4 MB
  EMMC Boot2 Size : 0x0000000000400000-4 MB
  EMMC RPMB Size  : 0x0000000001000000-16 MB
  EMMC USER Size  : 0x0000000E8F800000-58,242 GB
  EMMC CID        : 1501004450364441420333ECD0633879 - DP6DAB
  HW-CODE         : 0x707
  HWSUB-CODE      : 0x8A00
  HW-VERSION      : 0xCA00
  SW-VERSION      : 0x0
  CHIP-EVOLUTION  : 0x1
  DA-VERSION      : 1.0
  Speed           : high-speed
Partition Count : 50
--------------- Reading build.prop content ---------------
  Product        : lancelot
  Marketname   : ro.product.systemRedmi 9
  ID             : RP1A.200720.011
  SDK            : 30
  Release        : 11
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-GB
  Description    : lancelot-user 11 RP1A.200720.011 V12.5.5.0.RJCMIXM release-keys
  Display ID     : RP1A.200720.011
  Security Patch : 2022-04-01
  StorageType    : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
 IMEI1 : 86531**********
 IMEI2 : 86531************
-------------------------------
Bootloader Status...
  Bootloader : Unlocked
-------------------------------

Reading Selected Partitions..
 - preloader(preloader.bin), 512 KB                    = Ok  [preloader_lancelot.bin]
  *Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0707_C960385BF4879DD4D48EEF7D3BC438\Selected\070725532457\6768_Android_scatter.txt
 - pgpt(pgpt.bin), 32 KB                               = Ok
 - recovery(recovery.bin), 64 MB                       = Ok
 - misc(misc.bin), 512 KB                              = Ok
 - para(para.bin), 512 KB                              = Ok
 - expdb(expdb.bin), 20 MB                             = Ok
 - frp(frp.bin), 1024 KB                               = Ok
 - vbmeta(vbmeta.bin), 8 MB                            = Ok
 - vbmeta_system(vbmeta_system.bin), 8 MB              = Ok
 - vbmeta_vendor(vbmeta_vendor.bin), 8 MB              = Ok
 - md_udc(md_udc.bin), 22,602 MB                       = Ok
 - metadata(metadata.bin), 32 MB                       = Ok
 - nvcfg(nvcfg.bin), 32 MB                             = Ok
 - nvdata(nvdata.bin), 64 MB                           = Ok
 - persist(persist.bin), 48 MB                         = Ok
 - persistbak(persistbak.bin), 48 MB                   = Ok
 - protect1(protect1.bin), 8 MB                        = Ok
 - protect2(protect2.bin), 11,367 MB                   = Ok
 - seccfg(seccfg.bin), 8 MB                            = Ok
 - sec1(sec1.bin), 2 MB                                = Ok
 - proinfo(proinfo.bin), 3 MB                          = Ok
 - efuse(efuse.bin), 512 KB                            = Ok
 - boot_para(boot_para.bin), 26 MB                     = Ok
 - nvram(nvram.bin), 64 MB                             = Ok
 - logo(logo.bin), 8 MB                                = Ok
 - md1img(md1img.bin), 128 MB                          = Ok
 - spmfw(spmfw.bin), 1024 KB                           = Ok
 - scp1(scp1.bin), 6 MB                                = Ok
 - scp2(scp2.bin), 6 MB                                = Ok
 - sspm_1(sspm_1.bin), 1024 KB                         = Ok
 - sspm_2(sspm_2.bin), 1024 KB                         = Ok
 - gz1(gz1.bin), 16 MB                                 = Ok
 - gz2(gz2.bin), 16 MB                                 = Ok
 - lk(lk.bin), 2 MB                                    = Ok
 - lk2(lk2.bin), 2 MB                                  = Ok
 - boot(boot.bin), 64 MB                               = Ok
 - dtbo(dtbo.bin), 16 MB                               = Ok
 - tee1(tee1.bin), 5 MB                                = Ok
 - tee2(tee2.bin), 5 MB                                = Ok
 - gsort(gsort.bin), 16 MB                             = Ok
 - minidump(minidump.bin), 128 MB                      = Ok
 - exaid(exaid.bin), 384 MB                            = Ok
 - cust(cust.bin), 1024 MB                             = Ok
 - devinfo(devinfo.bin), 8 MB                          = Ok
 - ffu(ffu.bin), 11,5 MB                               = Ok
 - cache(cache.bin), 432 MB                            = Ok
 - otp(otp.bin), 43 MB                                 = Ok
 - flashinfo(flashinfo.bin), 16 MB                     = Ok
Done Reading...

Elapsed Time : 00:05:52
  Reply With Quote
Old 07-18-2023, 06:19   #3219 (permalink)
Product Supporter
 
Hydra Supporter's Avatar
 
Join Date: Jan 2021
Location: ... Heart ...
Posts: 593
Member: 2977290
Status: Offline
Thanks Meter: 729
Huawei P20 lite (ANE-L01) FRP Lock Remove with Hydra Tool

Huawei P20 lite (ANE-L01) FRP Lock Remove with Hydra Tool


- Unlock Bootloader temp with testpoint
Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 
                    Huawei Service Tool
                         Bootloader
                      Temporary Unlock
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 


Searching for Hisilicon USB1 Port...Found
  FriendlyName    : Android Adapter PCUI (COM64)
  Device          : /5&2108ad5d&0&12
  SymbolicName    : \\?\usb#vid_12d1&pid_3609#5&2108ad5d&0&12#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 11/28/2016,2.0.6.725
  Service         : HWHandSet

Openning Port [COM64] Ok
================================
   USB1 To Fastboot....
================================
Sending Fastboot Loader...
 > Loader 1 ...Ok
 > Loader 2 ...Ok

Wait few seconds.. phone will reboot in Fastboot Mode

Action Result :  Ok

Elapsed Time : 00:01:23



- Now remove frp lock fastboot mode
Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 
                    Huawei Service Tool
              Factory Reset Protection/Account
                         Remove FRP
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 

Searching Device By Fastboot
Device Found...

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                  Reading Device Information...               
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
hotainfo...... 
  #hotainfo_len       : 
  #C_version          : 
  #D_version          : 
  #PLMN               : 
  #BoardID            : 
  #DeviceName         : 
Build number          : ANE-LX1 9.1.0.401(C432E13R1P7)
Product Model         : ANE-LX1
hwnff_ver             : Ver2.3
key_version           : huawei_key_v1
product               : : hi6250
system_update_state   : FAILED (remote: 'cannot system get update state in oeminfo')
vendorcountry         : : hw/eu
soc_id                : : 0.5
ro_build_fingerprint  : : 0.5
ro_build_version_full : : 0.5
ro_build_version_qcom : : 0.5
psid.........
  #SN                 : 89U4C***********
  #IMEI1              : 867440**********
  #IMEI2              : 000000**********
Security Info....
 #Dongle_info         : : 0.5
 #FB Lock State       : UNLOCKED
 #USER Lock State     : LOCKED

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Huawei Fastboot Service...
Factory Reset Protection...
Removing....

Action Result :  Ok

Elapsed Time : 00:00:03
  Reply With Quote
Old 07-18-2023, 06:21   #3220 (permalink)
Product Supporter
 
Hydra Supporter's Avatar
 
Join Date: Jan 2021
Location: ... Heart ...
Posts: 593
Member: 2977290
Status: Offline
Thanks Meter: 729
Huawei Y6s Frp Lock Remove with Hydra Tool

Huawei Y6s Frp Lock Remove with Hydra Tool

Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 
                      Service Function
               Factory Reset Protection[FRP]
                            Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 

Searching for MTK Device...Found
  MTK Port Type   : Flashmode BROM 
  FriendlyName    : MediaTek USB Port (COM25)
  Device          : /7&33c1e99c&0&1
  SymbolicName    : \\?\usb#vid_0e8d&pid_0003#7&33c1e99c&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 01/22/2015,3.0.1504.0
  Service         : wdm_usb

Openning Port [COM25] Ok
Handshaking...Ok
  HwCode          : 0766 {MT6765/MT8768t}
  Hwver           : 0000
  Target config   : E5
  SBC             : 01 (True)
  SLA             : 00 (False)
  DAA             : 04 (True)
  SWJTAG          : 04 (True)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 20 (True)
  MEMWRITE        : 40 (True)
  CMD_C8          : 80 (True)
  Connection      : BROM
  HW Subcode      : 8A00
  HW Subcode      : CA00
  SW Ver          : 0000
  ME_ID           : EBF2D31655B5FF41E5BB5342E1A4410B
  SOC_ID          : 903EC0F0478A0A8AC8755A7CA229FF2DFA7B31F4F93C373B49CF0E7F9F7D7A01
Device not yet filterd...
Executing LibUSB Filter..
Device Now Filtered...Restarting Device Port..

Openning Port [COM25] Ok

Exploiting Device...
Successfully Exploited..
Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..Found @ 0x00200BC4
Starting to dump...
Prel Size : 0x0003D85C
Successfully dump preloader..  [C:\Hydra Tool\Boot\PreloaderDump\preloader_k62v1_64_mexico.bin]
  Target config   : 00
  SBC             : 00 (False)
  SLA             : 00 (False)
  DAA             : 00 (False)
  SWJTAG          : 00 (False)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 00 (False)
  MEMWRITE        : 00 (False)
  CMD_C8          : 00 (False)
  Connection      : BROM

Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin]
Patching da2 ... Ok
Uploading Stage 1....
Successfully uploaded stage 1, jumping ..
Executing JUMP_DA Address @ 0x00200000
Jumping to 0x00200000 Ok 0xC0
Successfully received DA sync
  ONNECTION_AGENT : brom
  DRAM config needed for : 90014A6843386150
Sending auto preloader from dump...  [preloader_k62v1_64_mexico.bin]
Sending emi data.. [DRAM setup passed.]
Sending emi data succeeded.
Uploading stage 2...
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
  ERAM Size       : 0x000000000003A000-232 KB
  IRAM Size       : 0x00000000C0000000-3 GB
  EMMC Boot1 Size : 0x0000000000400000-4 MB
  EMMC Boot2 Size : 0x0000000000400000-4 MB
  EMMC RPMB Size  : 0x0000000001000000-16 MB
  EMMC USER Size  : 0x0000000E8F800000-58/242 GB
  EMMC CID        : 90014A68433861503E01000E604767A3 - hC8aP>
  HW-CODE         : 0x766
  HWSUB-CODE      : 0x8A00
  HW-VERSION      : 0xCA00
  SW-VERSION      : 0x0
  CHIP-EVOLUTION  : 0x0
  DA-VERSION      : 1.0
  Speed           : high-speed
Upload data was accepted. Jumping to stage 2...
DA Extensions successfully added 
Reading Partition Table .. 
Partition Count : 49
--------------- Reading build.prop content ---------------
Unable to read system info..
--------------- end of build.prop content ---------------

Reading IMEI........
 IMEI1 : 861244*********
 IMEI2 : 861244*********
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------
Backing up Security..
 - preloader(preloader.bin), 512 KB                    = Ok  [preloader_k62v1_64_mexico.bin]
  *Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0766_EBF2D31655B5FF4VCC5BB5342E1A4410B\Auto\070823011101\6765_Android_scatter.txt
 - pgpt(pgpt.bin), 32 KB                               = Ok
 - nvram(nvram.bin), 5 MB                              = Ok
 - nvdata(nvdata.bin), 16 MB                           = Ok
 - frp(frp.bin), 1024 KB                               = Ok
 - protect1(protect1.bin), 8 MB                        = Ok
 - protect2(protect2.bin), 13/969 MB                   = Ok
 - persist(persist.bin), 8 MB                          = Ok
 - oeminfo(oeminfo.bin), 32 MB                         = Ok
 - proinfo(proinfo.bin), 1024 KB                       = Ok
 - nvcfg(nvcfg.bin), 8 MB                              = Ok
 - seccfg(seccfg.bin), 8 MB                            = Ok
 - lk(lk.bin), 3 MB                                    = Ok
Backup Done!!!

Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!

Action Result :  Ok

Elapsed Time : 00:00:38
  Reply With Quote
Old 07-18-2023, 06:24   #3221 (permalink)
Product Supporter
 
Hydra Supporter's Avatar
 
Join Date: Jan 2021
Location: ... Heart ...
Posts: 593
Member: 2977290
Status: Offline
Thanks Meter: 729
Oppo A5s (CPH1809) Pattern and FRP Lock remove with Hdyra Tool

Oppo A5s (CPH1809) Pattern and FRP Lock remove with Hdyra Tool



- First Keep press boot info
Code:
-------------------------------------------------------
To Enable BROM  Mode : 
     Method 1    - Bootkey (Vol + - Power) or any combination
     Method 2    - Enable Preloader to brom(crashing Method)
     Method 3    - Test Point Data0 + ground
To Enable Preloader  Mode : 
     Method 1    - Just Insert cable
-------------------------------------------------------

Searching for MTK Device...Found
  MTK Port Type   : Flashmode BROM 
  FriendlyName    : MediaTek USB Port_V1632 (COM5)
  Device          : /5&13a213fa&0&2
  SymbolicName    : \\?\usb#vid_0e8d&pid_0003#5&13a213fa&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 01/22/2015,3.0.1504.0
  Service         : wdm_usb

Openning Port [COM5] Ok
Handshaking...Ok
  HwCode          : 0766 {MT6765/MT8768t}
  Hwver           : 0000
  Target config   : E5
  SBC             : 01 (True)
  SLA             : 00 (False)
  DAA             : 04 (True)
  SWJTAG          : 04 (True)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 20 (True)
  MEMWRITE        : 40 (True)
  CMD_C8          : 80 (True)
  Connection      : BROM
  HW Subcode      : 8A00
  HW Subcode      : CA00
  SW Ver          : 0000
  ME_ID           : B573FAD9936F8C45384C3CB81C707C51
  SOC_ID          : AFA3E4DEB00D65E31CE09144A75D49AD2332C9C0230910642366F0D052773838

Exploiting Device...
Successfully Exploited..
Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..Found @ 0x00200BC4
Starting to dump...
Prel Size : 0x0003A958
Successfully dump preloader..  [C:\Users\user\Downloads\Hydra Tool_FullPackage_02-21-2023\Boot\PreloaderDump\preloader_oppo6765_18511.bin]
  Target config   : 00
  SBC             : 00 (False)
  SLA             : 00 (False)
  DAA             : 00 (False)
  SWJTAG          : 00 (False)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 00 (False)
  MEMWRITE        : 00 (False)
  CMD_C8          : 00 (False)
  Connection      : BROM

Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin]
Patching da2 ... Ok
Uploading Stage 1....
Successfully uploaded stage 1, jumping ..
Executing JUMP_DA Address @ 0x00200000
Jumping to 0x00200000 Ok 0xC0
Successfully received DA sync
  ONNECTION_AGENT : brom
  DRAM config needed for : 150100474436424D
Sending auto preloader from dump...  [preloader_oppo6765_18511.bin]
Sending emi data.. [DRAM setup passed.]
Sending emi data succeeded.
Uploading stage 2...
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
  ERAM Size       : 0x000000000003A000-232 KB
  IRAM Size       : 0x00000000C0000000-3 GB
  EMMC Boot1 Size : 0x0000000000400000-4 MB
  EMMC Boot2 Size : 0x0000000000400000-4 MB
  EMMC RPMB Size  : 0x0000000000400000-4 MB
  EMMC USER Size  : 0x0000000747C00000-29.121 GB
  EMMC CID        : 150100474436424D42010D350633C537 - GD6BMB
  HW-CODE         : 0x766
  HWSUB-CODE      : 0x8A00
  HW-VERSION      : 0xCA00
  SW-VERSION      : 0x0
  CHIP-EVOLUTION  : 0x0
  DA-VERSION      : 1.0
  Speed           : high-speed
Upload data was accepted. Jumping to stage 2...
DA Extensions successfully added 
Reading Partition Table .. 
Partition Count : 42
--------------- Reading build.prop content ---------------
  Vendor         : OPPO
  Manufacturer   : OPPO
  ID             : O11019
  SDK            : 27
  Release        : 8.1.0
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-US
  Description    : full_oppo6765_18511-user 8.1.0 O11019 1616154336 release-keys
  Security Patch : 2021-04-05
  StorageType    : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------
Backing up Security..
 - preloader(preloader.bin), 512 KB                    = Ok  [preloader_oppo6765_18511.bin]
  *Creating Scatter file... C:\Users\user\Downloads\Hydra Tool_FullPackage_02-21-2023\Backup\MTKBKUP\0766_B573FAD9936F8C45384C3CB81C707C51\Auto\0707234444354\6765_Android_scatter.txt
 - pgpt(pgpt.bin), 32 KB                               = Ok
 - nvram(nvram.bin), 64 MB                             = Ok
 - nvdata(nvdata.bin), 64 MB                           = Ok
 - frp(frp.bin), 1024 KB                               = Ok
 - protect1(protect1.bin), 8 MB                        = Ok
 - protect2(protect2.bin), 8.469 MB                    = Ok
 - persist(persist.bin), 48 MB                         = Ok
 - proinfo(proinfo.bin), 3 MB                          = Ok
 - oppo_custom(oppo_custom.bin), 1024 KB               = Ok
 - opporeserve1(opporeserve1.bin), 8 MB                = Ok
 - opporeserve2(opporeserve2.bin), 64 MB               = Ok
 - nvcfg(nvcfg.bin), 32 MB                             = Ok
 - sec1(sec1.bin), 2 MB                                = Ok
 - seccfg(seccfg.bin), 8 MB                            = Ok
 - lk(lk.bin), 5 MB                                    = Ok
Backup Done!!!

Elapsed Time : 00:01:07





- select ultrapower opration and click execute
Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 
                      Service Function
                        Ultra Power
                            Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 

Searching for MTK Device...Found
  MTK Port Type   : Flashmode BROM 
  FriendlyName    : MediaTek USB Port_V1632 (COM5)
  Device          : /5&13a213fa&0&2
  SymbolicName    : \\?\usb#vid_0e8d&pid_0003#5&13a213fa&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 01/22/2015,3.0.1504.0
  Service         : wdm_usb

Openning Port [COM5] Ok
Reading Partition Table .. 
  ERAM Size       : 0x000000000003A000-232 KB
  IRAM Size       : 0x00000000C0000000-3 GB
  EMMC Boot1 Size : 0x0000000000400000-4 MB
  EMMC Boot2 Size : 0x0000000000400000-4 MB
  EMMC RPMB Size  : 0x0000000000400000-4 MB
  EMMC USER Size  : 0x0000000747C00000-29.121 GB
  EMMC CID        : 150100474436424D42010D350633C537 - GD6BMB
  HW-CODE         : 0x766
  HWSUB-CODE      : 0x8A00
  HW-VERSION      : 0xCA00
  SW-VERSION      : 0x0
  CHIP-EVOLUTION  : 0x0
  DA-VERSION      : 1.0
  Speed           : high-speed
Partition Count : 42
--------------- Reading build.prop content ---------------
  Vendor         : OPPO
  Manufacturer   : OPPO
  ID             : O11019
  SDK            : 27
  Release        : 8.1.0
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-US
  Description    : full_oppo6765_18511-user 8.1.0 O11019 1616154336 release-keys
  Security Patch : 2021-04-05
  StorageType    : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------
---------------------------
        Ultra Power    
---------------------------
Formatting Userdata : 
Operation : Safeformat Universal... Ok
Removing FRP :  Ok

Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!

Action Result :  Ok

Elapsed Time : 00:00:11
  Reply With Quote
The Following User Says Thank You to Hydra Supporter For This Useful Post:
Old 07-18-2023, 06:30   #3222 (permalink)
Product Supporter
 
Hydra Supporter's Avatar
 
Join Date: Jan 2021
Location: ... Heart ...
Posts: 593
Member: 2977290
Status: Offline
Thanks Meter: 729
Redmi Note 5 Pro (whyred) new v2 mi account remove with Hydra Tool

Redmi Note 5 Pro (whyred) new v2 mi account remove with Hydra Tool

- First Keep press Boot info

Code:
PreOperation Configuration 
 Brand : XIAOMI Model : Redmi Note 5 Pro (Whyred) New V2 Storage : Auto
 Loader: 0008C0E100010000_a7b8b82545a98eca_384d4649_GENERIC_XIAOMI_auth.fhprg
 Port  : Auto

 Searching for Qualcomm 9008 Device...Found
 FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM14)
 SymbolicName :\\?\usb#vid_05c6&pid_9008#6&29e6b3c2&0&7#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :02/05/2018,3.0.0.0

Getting device info. [Connected].Ok
Device MODE : Firehose
Connecting to Firehose...
Ping...... Ok 
Configuration[FHProt_Auto]......
Ok
Chip Configuration :
 MemoryName : eMMC
 MaxPayloadSizeToTargetInBytes : 1048576
 MaxPayloadSizeToTargetInBytesSupported : 1048576
 MaxPayloadSizeFromTargetInBytes : 4096
 MaxXMLSizeInBytes : 4096
 TargetName : MSM8996
 Version : 1
 DateTime : Aug  2 2018 - 22:27:53

*** STORAGE DEVICE INFO ***
Memory Type         : eMMC
Block Size in Bytes : 512
Page Size           : 512
Manufacturer ID     : 144
Serial Number       : 1150398153
Firmware Version    : 162
Product Name        : HCG8a4
Physical Partitions : 4
Total Logical Blocks:
          Drive [0]  122142720[58,242 GB]
          Drive [1]  8192[4 MB]
          Drive [2]  8192[4 MB]
          Drive [3]  8192[4 MB]

Protocol : Universal
Running : Ok

Reading GPT[4]
          Drive [0] 64 Items
          Drive [1] 0 Items
          Drive [2] 0 Items
          Drive [3] 0 Items

--------------- Reading build.prop content ---------------
build.prop
  Brand          : xiaomi
  Model          : Redmi Note 5
  Product        : whyred
  ID             : PKQ1.180904.001
  SDK            : 28
  Release        : 9
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-GB
  Description    : whyred-user 9 PKQ1.180904.001 V11.0.3.0.PEIMIXM release-keys
  Device         : whyred
  Display ID     : PKQ1.180904.001
  Security Patch : 2019-11-05
  Fingerprint    : xiaomi/whyred/whyred:9/PKQ1.180904.001/V11.0.3.0.PEIMIXM:user/release-keys
--------------- end of build.prop content ---------------

Elapsed Time : 00:00:06


- Remove mi account new mthod

Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 
                        Xiaomi Tool
                         Mi Account
                Remove MiAccount[New Method]
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 

PreOperation Configuration 
 Brand : XIAOMI Model : Redmi Note 5 Pro (Whyred) New V2 Storage : Auto
 Loader: 0008C0E100010000_a7b8b82545a98eca_384d4649_GENERIC_XIAOMI_auth.fhprg
 Port  : Auto

 Searching for Qualcomm 9008 Device...Found
 FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM14)
 SymbolicName :\\?\usb#vid_05c6&pid_9008#6&29e6b3c2&0&7#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :02/05/2018,3.0.0.0

Getting device info. [Connected].Ok
Device MODE : Firehose
Connecting to Firehose...
Ping...... Ok 
Configuration[FHProt_Auto]......
Ok
Chip Configuration :
 MemoryName : eMMC
 MaxPayloadSizeToTargetInBytes : 1048576
 MaxPayloadSizeToTargetInBytesSupported : 1048576
 MaxPayloadSizeFromTargetInBytes : 4096
 MaxXMLSizeInBytes : 4096
 TargetName : MSM8996
 Version : 1
 DateTime : Aug  2 2018 - 22:27:53

*** STORAGE DEVICE INFO ***
Memory Type         : eMMC
Block Size in Bytes : 512
Page Size           : 512
Manufacturer ID     : 144
Serial Number       : 1150398153
Firmware Version    : 162
Product Name        : HCG8a4
Physical Partitions : 4
Total Logical Blocks:
          Drive [0]  122142720[58,242 GB]
          Drive [1]  8192[4 MB]
          Drive [2]  8192[4 MB]
          Drive [3]  8192[4 MB]

Protocol : Universal
Running : Ok

Reading GPT[4]
          Drive [0] 64 Items
          Drive [1] 0 Items
          Drive [2] 0 Items
          Drive [3] 0 Items

--------------- Reading build.prop content ---------------
build.prop
  Brand          : xiaomi
  Model          : Redmi Note 5
  Product        : whyred
  ID             : PKQ1.180904.001
  SDK            : 28
  Release        : 9
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-GB
  Description    : whyred-user 9 PKQ1.180904.001 V11.0.3.0.PEIMIXM release-keys
  Device         : whyred
  Display ID     : PKQ1.180904.001
  Security Patch : 2019-11-05
  Fingerprint    : xiaomi/whyred/whyred:9/PKQ1.180904.001/V11.0.3.0.PEIMIXM:user/release-keys
--------------- end of build.prop content ---------------
Reading GPT[4]
          Drive [0] 64 Items
          Drive [1] 0 Items
          Drive [2] 0 Items
          Drive [3] 0 Items

Backing up Partition for safety...Ok

Scanning Patching address...
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]Done!!
Total Items patched : 33
Successfully patched address..

Rebooting Phone.... Ok

Action Result :  Ok

Elapsed Time : 00:00:39
  Reply With Quote
The Following User Says Thank You to Hydra Supporter For This Useful Post:
Old 07-18-2023, 06:32   #3223 (permalink)
Product Supporter
 
Hydra Supporter's Avatar
 
Join Date: Jan 2021
Location: ... Heart ...
Posts: 593
Member: 2977290
Status: Offline
Thanks Meter: 729
Redmi Note 10 (sunny) Flashing done with Hydra Tool

Redmi Note 10 (sunny) Flashing done with Hydra Tool


Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 
                  Qualcomm Flashing Function......               
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 

PreOperation Configuration 
 Brand  XIAOMI Model  Redmi Note 10 (sunny) Storage  Auto
 Loader 000950E100720000_1bebe3863a6781db_404ab4f2_XIAOMI_auth.fhprg
 Port   Auto

 Searching for Qualcomm 9008 Device...Found
 FriendlyName Qualcomm HS-USB QDLoader 9008 (COM3)
 SymbolicName usb#vid_05c6&pid_9008#6&182a12da&0&7#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   08022017,2.1.2.7

Getting device info. [Connected].Ok
Device MODE  Firehose
Connecting to Firehose...
Ping..................... Ok 
Configuration[FHProt_Auto]........
Ok
Chip Configuration 
 MemoryName  UFS
 MaxPayloadSizeToTargetInBytes  1048576
 MaxPayloadSizeToTargetInBytesSupported  1048576
 MaxPayloadSizeFromTargetInBytes  
 MaxXMLSizeInBytes  4096
 TargetName  
 Version  1
 DateTime  Mar  7 2019 - 230629

 STORAGE DEVICE INFO 
Memory Type          UFS
Block Size in Bytes  4096
Page Size            4096
Manufacturer ID      300
Serial Number        1129467726
Firmware Version     605
Product Name         MT128GASAO4U21  0605
Physical Partitions  6
Total Logical Blocks
          Drive [0]  30119936[114.898 GB]
          Drive [1]  2048[8 MB]
          Drive [2]  2048[8 MB]
          Drive [3]  32768[128 MB]
          Drive [4]  1048576[4 GB]
          Drive [5]  32768[128 MB]

Protocol  Universal
Running  Ok

Reading GPT[6]
          Drive [0] 32 Items
          Drive [1] 32 Items
          Drive [2] 32 Items
          Drive [3] 32 Items
          Drive [4] 64 Items
          Drive [5] 32 Items

--------------- Reading build.prop content ---------------
build.prop
system
build.prop
  Marketname    ro.product.system
  ID              RKQ1.201022.002
  SDK             30
  Release         11
  ABI             arm64-v8a
  CPU abilist     arm64-v8a,armeabi-v7a,armeabi
  Locale          en-GB
  Security Patch  2021-02-01
--------------- end of build.prop content ---------------

Auto Backup Security partitions...
Reading Security Items....
 - modemst1(modemst1.bin), 2.496 MB                    = Ok
 - modemst2(modemst2.bin), 2.496 MB                    = Ok
 - fsg(fsg.bin), 2.496 MB                              = Ok
 - fsc(fsc.bin), 124 KB                                = Ok
 - persist(persist.bin), 31.996 MB                     = Ok

CHydra ToolBackupQUALBackupXIAOMI000950E100720000_416AC6D3Auto_Backup070723233523
Backup Security Success....
----------------------------
Flashing Selected Partitions....
 - persist[0](persist.img), 32 MB                      = Ok
 - misc[0](misc.img), 85 Bytes                         = Ok
 - super[0](super_1.img), 396 KB                       = Ok
 - super[0](super_2.img), 994.848 MB                   = Ok
 - super[0](super_3.img), 341.324 MB                   = Ok
 - super[0](super_4.img), 203.25 MB                    = Ok
 - super[0](super_5.img), 605.445 MB                   = Ok
 - vbmeta_system_a[0](vbmeta_system.img), 4 KB         = Ok
 - metadata[0](metadata_1.img), 20 KB                  = Ok
 - metadata[0](metadata_2.img), 24 KB                  = Ok
 - userdata[0](userdata_1.img), 8 KB                   = Ok
 - userdata[0](userdata_2.img), 32 KB                  = Ok
 - userdata[0](userdata_3.img), 54.043 MB              = Ok
 - userdata[0](userdata_4.img), 4 KB                   = Ok
 - userdata[0](userdata_5.img), 4 KB                   = Ok
 - userdata[0](userdata_6.img), 12 KB                  = Ok
 - userdata[0](userdata_7.img), 20 KB                  = Ok
 - userdata[0](userdata_8.img), 24 KB                  = Ok
 - userdata[0](userdata_9.img), 44 KB                  = Ok
 - userdata[0](userdata_10.img), 3.332 MB              = Ok
 - ffu[0](ffu.img), 4 MB                               = Ok
 - PrimaryGPT[0](gpt_main0.bin), 24 KB                 = Ok
 - xbl_a[1](xbl.elf), 3.452 MB                         = Ok
 - xbl_config_a[1](xbl_config.elf), 71.324 KB          = Ok
 - PrimaryGPT[1](gpt_main1.bin), 24 KB                 = Ok
 - xbl_b[2](xbl.elf), 3.452 MB                         = Ok
 - xbl_config_b[2](xbl_config.elf), 71.324 KB          = Ok
 - PrimaryGPT[2](gpt_main2.bin), 24 KB                 = Ok
 - PrimaryGPT[3](gpt_main3.bin), 24 KB                 = Ok
 - aop_a[4](aop.mbn), 157.574 KB                       = Ok
 - tz_a[4](tz.mbn), 1.965 MB                           = Ok
 - hyp_a[4](hyp.mbn), 368.547 KB                       = Ok
 - modem_a[4](NON-HLOS.bin), 115.074 MB                = Ok
 - bluetooth_a[4](BTFM.bin), 908 KB                    = Ok
 - abl_a[4](abl.elf), 204 KB                           = Ok
 - dsp_a[4](dspso.bin), 32 MB                          = Ok
 - keymaster_a[4](km41.mbn), 237.132 KB                = Ok
 - boot_a[4](boot.img), 128 MB                         = Ok
 - cmnlib_a[4](cmnlib.mbn), 389.521 KB                 = Ok
 - cmnlib64_a[4](cmnlib64.mbn), 507.959 KB             = Ok
 - devcfg_a[4](devcfg.mbn), 42.867 KB                  = Ok
 - qupfw_a[4](qupv3fw.elf), 48.081 KB                  = Ok
 - vbmeta_a[4](vbmeta.img), 4 KB                       = Ok
 - dtbo_a[4](dtbo.img), 8 MB                           = Ok
 - imagefv_a[4](imagefv.elf), 20 KB                    = Ok
 - uefisecapp_a[4](uefi_sec.mbn), 123.772 KB           = Ok
 - vendor_boot_a[4](vendor_boot.img), 96 MB            = Ok
 - aop_b[4](aop.mbn), 157.574 KB                       = Ok
 - tz_b[4](tz.mbn), 1.965 MB                           = Ok
 - hyp_b[4](hyp.mbn), 368.547 KB                       = Ok
 - modem_b[4](NON-HLOS.bin), 115.074 MB                = Ok
 - bluetooth_b[4](BTFM.bin), 908 KB                    = Ok
 - abl_b[4](abl.elf), 204 KB                           = Ok
 - dsp_b[4](dspso.bin), 32 MB                          = Ok
 - keymaster_b[4](km41.mbn), 237.132 KB                = Ok
 - boot_b[4](boot.img), 128 MB                         = Ok
 - cmnlib_b[4](cmnlib.mbn), 389.521 KB                 = Ok
 - cmnlib64_b[4](cmnlib64.mbn), 507.959 KB             = Ok
 - devcfg_b[4](devcfg.mbn), 42.867 KB                  = Ok
 - qupfw_b[4](qupv3fw.elf), 48.081 KB                  = Ok
 - vbmeta_b[4](vbmeta.img), 4 KB                       = Ok
 - dtbo_b[4](dtbo.img), 8 MB                           = Ok
 - imagefv_b[4](imagefv.elf), 20 KB                    = Ok
 - uefisecapp_b[4](uefi_sec.mbn), 123.772 KB           = Ok
 - devinfo[4](devinfo.img), 25 Bytes                   = Ok
 - logfs[4](logfs_ufs_8mb.bin), 16 KB                  = Ok
 - storsec[4](storsec.mbn), 20.091 KB                  = Ok
 - secdata[4](sec.elf), 12.465 KB                      = Ok
 - PrimaryGPT[4](gpt_main4.bin), 24 KB                 = Ok
 - PrimaryGPT[5](gpt_main5.bin), 24 KB                 = Ok

Flashing Patch Configuration.. 
0 [NUM_DISK_SECTORS-6.]                                = Ok
0 [NUM_DISK_SECTORS-6.]                                = Ok
0 [NUM_DISK_SECTORS-6.]                                = Ok
0 [NUM_DISK_SECTORS-6.]                                = Ok
0 [NUM_DISK_SECTORS-1.]                                = Ok
0 [NUM_DISK_SECTORS-1.]                                = Ok
0 [NUM_DISK_SECTORS-5.]                                = Ok
0 [CRC32(2,4096)]                                      = Ok
0 [CRC32(NUM_DISK_SECTORS-5.,4096)]                    = Ok
0 [0]                                                  = Ok
0 [CRC32(1,92)]                                        = Ok
0 [0]                                                  = Ok
0 [CRC32(NUM_DISK_SECTORS-1.,92)]                      = Ok
1 [NUM_DISK_SECTORS-6.]                                = Ok
1 [NUM_DISK_SECTORS-6.]                                = Ok
1 [NUM_DISK_SECTORS-6.]                                = Ok
1 [NUM_DISK_SECTORS-6.]                                = Ok
1 [NUM_DISK_SECTORS-1.]                                = Ok
1 [NUM_DISK_SECTORS-1.]                                = Ok
1 [NUM_DISK_SECTORS-5.]                                = Ok
1 [CRC32(2,4096)]                                      = Ok
1 [CRC32(NUM_DISK_SECTORS-5.,4096)]                    = Ok
1 [0]                                                  = Ok
1 [CRC32(1,92)]                                        = Ok
1 [0]                                                  = Ok
1 [CRC32(NUM_DISK_SECTORS-1.,92)]                      = Ok
2 [NUM_DISK_SECTORS-6.]                                = Ok
2 [NUM_DISK_SECTORS-6.]                                = Ok
2 [NUM_DISK_SECTORS-6.]                                = Ok
2 [NUM_DISK_SECTORS-6.]                                = Ok
2 [NUM_DISK_SECTORS-1.]                                = Ok
2 [NUM_DISK_SECTORS-1.]                                = Ok
2 [NUM_DISK_SECTORS-5.]                                = Ok
2 [CRC32(2,4096)]                                      = Ok
2 [CRC32(NUM_DISK_SECTORS-5.,4096)]                    = Ok
2 [0]                                                  = Ok
2 [CRC32(1,92)]                                        = Ok
2 [0]                                                  = Ok
2 [CRC32(NUM_DISK_SECTORS-1.,92)]                      = Ok
3 [NUM_DISK_SECTORS-6.]                                = Ok
3 [NUM_DISK_SECTORS-6.]                                = Ok
3 [NUM_DISK_SECTORS-6.]                                = Ok
3 [NUM_DISK_SECTORS-6.]                                = Ok
3 [NUM_DISK_SECTORS-1.]                                = Ok
3 [NUM_DISK_SECTORS-1.]                                = Ok
3 [NUM_DISK_SECTORS-5.]                                = Ok
3 [CRC32(2,4096)]                                      = Ok
3 [CRC32(NUM_DISK_SECTORS-5.,4096)]                    = Ok
3 [0]                                                  = Ok
3 [CRC32(1,92)]                                        = Ok
3 [0]                                                  = Ok
3 [CRC32(NUM_DISK_SECTORS-1.,92)]                      = Ok
4 [NUM_DISK_SECTORS-6.]                                = Ok
4 [NUM_DISK_SECTORS-6.]                                = Ok
4 [NUM_DISK_SECTORS-6.]                                = Ok
4 [NUM_DISK_SECTORS-6.]                                = Ok
4 [NUM_DISK_SECTORS-1.]                                = Ok
4 [NUM_DISK_SECTORS-1.]                                = Ok
4 [NUM_DISK_SECTORS-5.]                                = Ok
4 [CRC32(2,8192)]                                      = Ok
4 [CRC32(NUM_DISK_SECTORS-5.,8192)]                    = Ok
4 [0]                                                  = Ok
4 [CRC32(1,92)]                                        = Ok
4 [0]                                                  = Ok
4 [CRC32(NUM_DISK_SECTORS-1.,92)]                      = Ok
5 [NUM_DISK_SECTORS-6.]                                = Ok
5 [NUM_DISK_SECTORS-6.]                                = Ok
5 [NUM_DISK_SECTORS-6.]                                = Ok
5 [NUM_DISK_SECTORS-6.]                                = Ok
5 [NUM_DISK_SECTORS-1.]                                = Ok
5 [NUM_DISK_SECTORS-1.]                                = Ok
5 [NUM_DISK_SECTORS-5.]                                = Ok
5 [CRC32(2,4096)]                                      = Ok
5 [CRC32(NUM_DISK_SECTORS-5.,4096)]                    = Ok
5 [0]                                                  = Ok
5 [CRC32(1,92)]                                        = Ok
5 [0]                                                  = Ok
5 [CRC32(NUM_DISK_SECTORS-1.,92)]                      = Ok
Operation  Setbootablestoragedrive Drive 1
Set bootable storage drive 1 Ok

Rebooting Phone.... Ok

Elapsed Time  000242
  Reply With Quote
The Following User Says Thank You to Hydra Supporter For This Useful Post:
Old 07-18-2023, 06:34   #3224 (permalink)
Product Supporter
 
Hydra Supporter's Avatar
 
Join Date: Jan 2021
Location: ... Heart ...
Posts: 593
Member: 2977290
Status: Offline
Thanks Meter: 729
Xiaomi POCO X3 Pro (vayu) Safe Format with Hydra Tool

Xiaomi POCO X3 Pro (vayu) Safe Format with Hydra Tool


- Safe format phone with Mi Assistant mode

Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 
                        Xiaomi Tool
                       Factory Reset
                        Safe Format
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 

Adb Handler [Console]
Starting ADB Server....
Searching Device By ADB [sideload]
Device Found...
Sate           : sideload
Product name   : vayu_global
Product model  : vayu_global
Product device : vayu


Model                	   :  	vayu_global
Android VERSION      	   :  	11
OS Version           	   :  	V12.5.7.0.RJUMIXM
Branch               	   :  	F
Language             	   :  	
Region               	   :  	GB
Sideload Factory Reset...
Sideload Safe Format....
Processing... 
Action Result : Ok

Elapsed Time : 00:00:00




Action Result :  Ok

Elapsed Time : 00:00:02
  Reply With Quote
The Following User Says Thank You to Hydra Supporter For This Useful Post:
Old 07-18-2023, 12:26   #3225 (permalink)
No Life Poster
 
guljee786's Avatar
 
Join Date: Apr 2008
Location: Heart of Islam
Age: 41
Posts: 2,220
Member: 762034
Status: Offline
Sonork: 100.1585274
Thanks Meter: 1,451
Sparks Neo 7 pro FRP done

Sparkx Neo 7 pro FRP done

Code:
Hydra Tool  Ver 2023.6.30.0
Windows 10 (Version 22H2, OS Build 19045.3208, 64-bit Edition)
Intel(R) Core(TM) i5-6400 CPU @ 2.70GHz
Intel(R) HD Graphics 530
Ram Installed : 8 GB
Windows Access Right : Admin
Software Run As Admnistrator


******* Dongle Info *******
Version    : Hydra Tool v 1.2
Serial     : 190400000868
Initialize : OKAY
Status     : Activated
Life       : 0 [0-0-0-0-1]

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 
                      Service Function
               Factory Reset Protection[FRP]
                            Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 

Searching for MTK Device...Found
  MTK Port Type   : Flashmode BROM 
  FriendlyName    : MediaTek USB Port_V1632 (COM33)
  Device          : /5&1ece9816&0&2
  SymbolicName    : \\?\usb#vid_0e8d&pid_0003#5&1ece9816&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 01/22/2015,3.0.1504.0
  Service         : wdm_usb

Openning Port [COM33] Ok
Handshaking...Ok
  HwCode          : 0766 {MT6765/MT8768t}
  Hwver           : 0000
  Target config   : 00
  SBC             : 00 (False)
  SLA             : 00 (False)
  DAA             : 00 (False)
  SWJTAG          : 00 (False)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 00 (False)
  MEMWRITE        : 00 (False)
  CMD_C8          : 00 (False)
  Connection      : BROM
  HW Subcode      : 8A00
  HW Subcode      : CA00
  SW Ver          : 0000
  ME_ID           : B14C28524AEFEA2DD7AE0F5473283CA8
  SOC_ID          : F068261EA0ED41B37D09A814F21ED912E41CCD82E1C1593AFB35EAED689E267F

Exploiting Device...
Successfully Exploited..
Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..Found @ 0x00200BC0
Starting to dump...
Prel Size : 0x0003E1F4
Successfully dump preloader..  [C:\Hydra Tool\Boot\PreloaderDump\preloader_k62v1_64_bsp.bin]
  Target config   : 00
  SBC             : 00 (False)
  SLA             : 00 (False)
  DAA             : 00 (False)
  SWJTAG          : 00 (False)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 00 (False)
  MEMWRITE        : 00 (False)
  CMD_C8          : 00 (False)
  Connection      : BROM

Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin]
Patching da2 ... Ok
Uploading Stage 1....
Successfully uploaded stage 1, jumping ..
Executing JUMP_DA Address @ 0x00200000
Jumping to 0x00200000 Ok 0xC0
Successfully received DA sync
  ONNECTION_AGENT : brom
  DRAM config needed for : D601034133413536
Sending auto preloader from dump...  [preloader_k62v1_64_bsp.bin]
Sending emi data.. [DRAM setup passed.]
Sending emi data succeeded.
Uploading stage 2...
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
  ERAM Size       : 0x000000000003A000-232 KB
  IRAM Size       : 0x0000000100000000-4 GB
  EMMC Boot1 Size : 0x0000000000400000-4 MB
  EMMC Boot2 Size : 0x0000000000400000-4 MB
  EMMC RPMB Size  : 0x0000000001000000-16 MB
  EMMC USER Size  : 0x0000000E67800000-57.617 GB
  EMMC CID        : D6010341334135363112C613D920198F - A3A561
  HW-CODE         : 0x766
  HWSUB-CODE      : 0x8A00
  HW-VERSION      : 0xCA00
  SW-VERSION      : 0x0
  CHIP-EVOLUTION  : 0x0
  DA-VERSION      : 1.0
  Speed           : high-speed
Upload data was accepted. Jumping to stage 2...
DA Extensions successfully added 
Reading Partition Table .. 
Partition Count : 48
--------------- Reading build.prop content ---------------
  Brand          : Sparx
  Vendor         : Deploy PVT LTD
  Model          : Sparx Neo 7 Pro
  Product        : Neo_7_Pro
  Manufacturer   : Deploy PVT LTD
  ID             : SP1A.210812.016
  SDK            : 31
  Release        : 12
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-US
  Description    : Neo_7_Pro-user 12 SP1A.210812.016 165 release-keys
  Device         : Neo_7_Pro
  Display ID     : Sparx_Neo_7_Pro_V09_20230513
  Security Patch : 2023-04-05
  Fingerprint    : Sparx/Neo_7_Pro/Neo_7_Pro:12/SP1A.210812.016/165:user/release-keys
  StorageType    : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------

Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!

Action Result :  Ok

Elapsed Time : 00:00:26
Attached Images
File Type: jpg Untitled.jpg (155.8 KB, 1 views)
  Reply With Quote
Reply

Bookmarks

Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


 



All times are GMT +1. The time now is 15:36.



Powered by Searchlight © 2024 Axivo Inc.
vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2024 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2023 -
Page generated in 0.18394 seconds with 9 queries

SEO by vBSEO