|
Welcome to the GSM-Forum forums. You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. Only registered members may post questions, contact other members or search our database of over 8 million posts. Registration is fast, simple and absolutely free so please - Click to REGISTER! If you have any problems with the registration process or your account login, please contact contact us . |
|
Register | FAQ | Donate | Forum Rules | Root any Device | ★iPhone Unlock★ | ★ Direct Codes ★ | Direct Unlock Source | Search | Today's Posts | Mark Forums Read |
| LinkBack | Thread Tools | Display Modes |
07-16-2023, 06:50 | #3211 (permalink) |
Product Supporter Join Date: Jan 2021 Location: ... Heart ...
Posts: 593
Member: 2977290 Status: Offline Thanks Meter: 729 | Samsung A11 (SM-A115M) FRP Lock Remove with Hydra Tool Code: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Qualcomm Service Tool Factory Reset Protection Auto - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - PreOperation Configuration Brand : AUTO Model : AUTO Storage : Auto Loader: Auto Port : Auto Searching for Qualcomm 9008 Device...Found FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM11) SymbolicName :\\?\usb#vid_05c6&pid_9008#5&521a615&0&9#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver :08/02/2017,2.1.2.7 Getting device info. [Connected]..... Serial No.: 0x10DE0D5F HW_ID : 0009A0E100200000 MSM ID : 0x0009A0E1, SDM450-Qualcomm Snapdragon 450/JAADANAZA MODEL_ID : 0x0000 OEM_ID : 0x0020 - SAMSUNG PBL Ver : 00000000 PK HASH : 084e868b048512d828c51a78a9251ece3c48313ff498fa6f18335e9f56c276bd Hydra Enable Auto search Firehose.. #Please wait... #Search by filename filter..... #Found 6 Compatible Files ..Found match Firehose... Firehose Loader[0009a0e100200000_084e868b048512d8_1082a027_samsung_samsung corporation_8953.fhprg] -------------------------------------------------- Header Type : OLD TargetMSM : 8953 Tag : Version : 3 Code_size : 320 Signature_size : 256 fhVendor : SAMSUNG CORPORATION HW_ID : 0009A0E100200000 Vendor : SAMSUNG OEM_ID : 0020 MODEL_ID : 0000 SW_ID : 0000000100000003 APP_ID : pk_hash : 084e868b048512d828c51a78a9251ece3c48313ff498fa6f18335e9f56c276bd OEM_VERSION : 21HH1D11 IMAGE_VARIANT : JAADANAZA QC_VERSION : BOOT.BF.3.3.2-00077 -------------------------------------------------- SaharaBoot... Ok Sending ......................Ok Connecting to Firehose... Ping... Ok Configuration[FHProt_Auto]...... Identifying Chip.... Ok Chip Configuration : MemoryName : eMMC MaxPayloadSizeToTargetInBytes : 1048576 MaxPayloadSizeToTargetInBytesSupported : 1048576 MaxPayloadSizeFromTargetInBytes : 4096 MaxXMLSizeInBytes : 4096 TargetName : 8953 Version : 1 *** STORAGE DEVICE INFO *** Memory Type : eMMC Block Size in Bytes : 512 Page Size : 512 Manufacturer ID : 21 Serial Number : 143314151 Firmware Version : 1 Product Name : GP6BAB Physical Partitions : 3 Total Logical Blocks: Drive [0] 122142720[58,242 GB] Drive [1] 8192[4 MB] Drive [2] 8192[4 MB] Protocol : Universal Running : Ok Reading GPT[3] Drive [0] 128 Items Drive [1] 0 Items Drive [2] 0 Items --------------- Reading build.prop content --------------- build.prop system build.prop Product : a11q ID : RP1A.200720.012 SDK : 30 Release : 11 ABI : armeabi-v7a CPU abilist : armeabi-v7a,armeabi Locale : en-GB Description : a11qub-user 11 RP1A.200720.012 A115MUBU2BVB2 release-keys Display ID : RP1A.200720.012.A115MUBU2BVB2 Security Patch : 2022-03-01 --------------- end of build.prop content --------------- Auto Backup Security partitions... Reading Security Items.... - modemst1(modemst1.bin), 4 MB = Ok - modemst2(modemst2.bin), 4 MB = Ok - fsg(fsg.bin), 10 MB = Ok - fsc(fsc.bin), 3,25 MB = Ok - persist(persist.bin), 32 MB = Ok C:\Hydra Tool\Backup\QUALBackup\SAMSUNG\0009A0E100200000_10DE0D5F\Auto_Backup\0707231trt3918 Backup Security Success.... - Removing FRP Executing ... - Removing FRP [Zero Wipe] Ok - Removing FRP [Zero Wipe] OkOk - Removing FRP Executing ... - Removing FRP [Zero Wipe] Ok - Removing FRP [Zero Wipe] OkOk Rebooting Phone.... Ok Action Result : Ok Elapsed Time : 00:00:20 Last edited by Hydra Supporter; 07-16-2023 at 07:12. |
07-16-2023, 06:51 | #3212 (permalink) |
Product Supporter Join Date: Jan 2021 Location: ... Heart ...
Posts: 593
Member: 2977290 Status: Offline Thanks Meter: 729 | Tecno Pop 5 LTE FRP Lock Remove with Hydra Tool Tecno Pop 5 LTE FRP Lock Remove with Hydra Tool Code: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Service Tool Function.. Factory Reset Protection Factory Reset - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - ****************** PRESS BOOT KEY ****************** VOL + OR VOL - , OR Combination Vol - + Feature Phone : Call Button Please hold boot key until second boot.. ******************************************* Scanning Port.... Openning Port [COM6] Ok Identifying... [SPRD3] Sending Config Ok Ok Spreadtrum Boot Block version 1.1 Sending To phone.... Unisoc Not Secured.... Ok Successfully booted..Ready to go... Reading System Info. Reading IMEI... BSL_REP_OPERATION_FAILED BSL_REP_OPERATION_FAILED BSL_REP_OPERATION_FAILED. IMEI 1 : 000000000000000 IMEI 2 : 000000000000000 IMEI 3 : 000000000000000 IMEI 4 : 000000000000000 BSL_WRITE_ERROR BSL_WRITE_ERROR Rebooting Phone..Ok Action Result : Ok Elapsed Time : 00:00:19 |
07-16-2023, 06:54 | #3213 (permalink) |
Product Supporter Join Date: Jan 2021 Location: ... Heart ...
Posts: 593
Member: 2977290 Status: Offline Thanks Meter: 729 | Vivo Y81i (1812) Flashing done with Hydra Tool Vivo Y81i (1812) Flashing done with Hydra Tool - First Keep Press Boot Info Code: ------------------------------------------------------- To Enable BROM Mode : Method 1 - Bootkey (Vol + - Power) or any combination Method 2 - Enable Preloader to brom(crashing Method) Method 3 - Test Point Data0 + ground To Enable Preloader Mode : Method 1 - Just Insert cable ------------------------------------------------------- Searching for MTK Device...Found MTK Port Type : Flashmode BROM FriendlyName : MediaTek USB Port_V1633 (COM4) Device : /6&37254210&0&4 SymbolicName : \\?\usb#vid_0e8d&pid_0003#6&37254210&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver : 01/22/2015,3.0.1504.0 Service : wdm_usb Openning Port [COM4] Ok Handshaking...Ok HwCode : 0717 {MT6761/MT6762/MT3369/MT8766B} Hwver : 0000 Target config : E5 SBC : 01 (True) SLA : 00 (False) DAA : 04 (True) SWJTAG : 04 (True) EPP : 00 (False) CERT : 00 (False) MEMREAD : 20 (True) MEMWRITE : 40 (True) CMD_C8 : 80 (True) Connection : BROM HW Subcode : 8A00 HW Subcode : CA01 SW Ver : 0200 ME_ID : 820D42FD152D436532D17D77D6118563 SOC_ID : F4D91C36D3D43BA509BF9E2EBF5C5DDFA6CC7E1F565A7414884E8613CC43E70C Exploiting Device... Successfully Exploited.. Handshaking...Ok Dumping Preloader from Bootrom.. Seeking preloader address..Found @ 0x00200BC4 Starting to dump... Prel Size : 0x0003B72C Successfully dump preloader.. [C:\Hydra Tool\Boot\PreloaderDump\preloader_k61v1_64_bsp.bin] Target config : 00 SBC : 00 (False) SLA : 00 (False) DAA : 00 (False) SWJTAG : 00 (False) EPP : 00 (False) CERT : 00 (False) MEMREAD : 00 (False) MEMWRITE : 00 (False) CMD_C8 : 00 (False) Connection : BROM Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin] Patching da2 ... Ok Uploading Stage 1.... Successfully uploaded stage 1, jumping .. Executing JUMP_DA Address @ 0x00200000 Jumping to 0x00200000 Ok 0xC0 Successfully received DA sync ONNECTION_AGENT : brom DRAM config needed for : 90014A4841473461 Sending auto preloader from dump... [preloader_k61v1_64_bsp.bin] Sending emi data.. [DRAM setup passed.] Sending emi data succeeded. Uploading stage 2... Upload data was accepted. Jumping to stage 2... Successfully uploaded stage 2 ERAM Size : 0x000000000003A500-233.25 KB IRAM Size : 0x0000000080000000-2 GB EMMC Boot1 Size : 0x0000000000400000-4 MB EMMC Boot2 Size : 0x0000000000400000-4 MB EMMC RPMB Size : 0x0000000000400000-4 MB EMMC USER Size : 0x00000003AB400000-14.676 GB EMMC CID : 90014A484147346132A52EEB687D660D - HAG4a2 HW-CODE : 0x717 HWSUB-CODE : 0x8A00 HW-VERSION : 0xCA01 SW-VERSION : 0x200 CHIP-EVOLUTION : 0x0 DA-VERSION : 1.0 Speed : high-speed Upload data was accepted. Jumping to stage 2... DA Extensions successfully added Reading Partition Table .. Partition Count : 44 --------------- Reading build.prop content --------------- Brand : vivo Vendor : vivo Model : vivo 1812 Product : k61v1_64_bsp Manufacturer : vivo ID : O11019 SDK : 27 Release : 8.1.0 ABI : arm64-v8a CPU abilist : arm64-v8a,armeabi-v7a,armeabi Locale : en-US Description : full_k61v1_64_bsp-user 8.1.0 O11019 1563630544 release-keys Device : PD1917F_EX Display ID : O11019 release-keys Security Patch : 2019-06-05 Platform : =MTK6761 Fingerprint : vivo/1812/1812:8.1.0/O11019/1563592353:user/release-keys StorageType : mtp --------------- end of build.prop content --------------- Reading IMEI........ IMEI1 : 86352*********** IMEI2 : 86352*********** ------------------------------- Bootloader Status... Bootloader : Locked ------------------------------- Elapsed Time : 00:00:16 - Select firmware and click execute Code: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - MTK Flash Function... - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Searching for MTK Device...Found MTK Port Type : Flashmode BROM FriendlyName : MediaTek USB Port_V1633 (COM4) Device : /6&37254210&0&4 SymbolicName : \\?\usb#vid_0e8d&pid_0003#6&37254210&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver : 01/22/2015,3.0.1504.0 Service : wdm_usb Openning Port [COM4] Ok Reading Partition Table .. ERAM Size : 0x000000000003A500-233.25 KB IRAM Size : 0x0000000080000000-2 GB EMMC Boot1 Size : 0x0000000000400000-4 MB EMMC Boot2 Size : 0x0000000000400000-4 MB EMMC RPMB Size : 0x0000000000400000-4 MB EMMC USER Size : 0x00000003AB400000-14.676 GB EMMC CID : 90014A484147346132A52EEB687D660D - HAG4a2 HW-CODE : 0x717 HWSUB-CODE : 0x8A00 HW-VERSION : 0xCA01 SW-VERSION : 0x200 CHIP-EVOLUTION : 0x0 DA-VERSION : 1.0 Speed : high-speed Partition Count : 44 --------------- Reading build.prop content --------------- Brand : vivo Vendor : vivo Model : vivo 1812 Product : k61v1_64_bsp Manufacturer : vivo ID : O11019 SDK : 27 Release : 8.1.0 ABI : arm64-v8a CPU abilist : arm64-v8a,armeabi-v7a,armeabi Locale : en-US Description : full_k61v1_64_bsp-user 8.1.0 O11019 1563630544 release-keys Device : PD1917F_EX Display ID : O11019 release-keys Security Patch : 2019-06-05 Platform : =MTK6761 Fingerprint : vivo/1812/1812:8.1.0/O11019/1563592353:user/release-keys StorageType : mtp --------------- end of build.prop content --------------- Reading IMEI........ IMEI1 : 86352********* IMEI2 : 86352********* ------------------------------- Bootloader Status... Bootloader : Locked ------------------------------- Write Selected Partitions.. - preloader(preloader_k61v1_64_bsp.bin), 237.793 KB[Erasing...Ok] Status :C0010001 Error= Failed - recovery(recovery-verified.img), 25.075 MB = Ok - survival(survival-verified.img), 32.07 MB = Ok - cust(oem.img), 7.08 MB = Ok - efuse(efuse.img), 512 Bytes = Ok - md1img(md1img-verified.img), 53.782 MB = Ok - spmfw(spmfw-verified.img), 51.125 KB = Ok - scp1(scp-verified.img), 553.703 KB = Ok - scp2(scp-verified.img), 553.703 KB = Ok - sspm_1(sspm-verified.img), 389.688 KB = Ok - sspm_2(sspm-verified.img), 389.688 = Ok - lk(lk-verified.img), 3.224 MB = Ok - lk2(lk-verified.img), 3.224 MB = Ok - boot(boot-verified.img), 10.95 MB = Ok - logo(logo-verified.bin), 439.906 KB = Ok - odmdtbo(odmdtbo-verified.img), 103.766 KB = Ok - tee1(tee-verified.img), 462.688 KB = Ok - tee2(tee-verified.img), 462.688 KB = Ok - vendor(vendor.img), 441.124 MB = Ok - system(system.img), 2.812 GB = Ok - cache(cache.img), 6.102 MB = Ok - userdata(userdata.img), 703.549 MB = Ok ---------------------------------- Elapsed Time : 00:02:46 |
07-17-2023, 11:52 | #3214 (permalink) |
Product Supporter Join Date: Jan 2021 Location: ... Heart ...
Posts: 593
Member: 2977290 Status: Offline Thanks Meter: 729 | Huawei Honor 9 Lite (LLD-L21) FRP Lock Remove with Hydra Tool Huawei Honor 9 Lite (LLD-L21) FRP Lock Remove with Hydra Tool - Connect phone with test point - Select Load Factory Fastboot and click execute Code: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Huawei Service Tool Factory Boot Load Factory Fastboot - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Searching for Hisilicon USB1 Port...Found FriendlyName : HUAWEI USB COM 1.0 (COM27) Device : /5&212ac8fc&0&1 SymbolicName : \\?\usb#vid_12d1&pid_3609#5&212ac8fc&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver : 11/06/2015,2.0.7.1 Service : HSPL_usbvcom Openning Port [COM27] Ok ================================ USB1 To Fastboot.... ================================ Sending Fastboot Loader... > Loader 1 ...Ok > Loader 2 ...Ok Wait few seconds.. phone will reboot in Fastboot Mode Action Result : Ok Elapsed Time : 00:00:37 - Select FRP Remove Fasbootmode method and click Execute Code: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Huawei Service Tool Factory Reset Protection/Account Remove FRP - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Searching Device By Fastboot Device Found... - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Reading Device Information... - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - hotainfo...... #hotainfo_len : #C_version : #D_version : #PLMN : #BoardID : #DeviceName : Build number : LLD-L21 9.1.0.189(C185E11R1P5) Product Model : LLD-L21 hwnff_ver : Ver2.3 key_version : huawei_key_v1 product : : hi6250 system_update_state : FAILED (remote: 'cannot system get update state in oeminfo') vendorcountry : : hw/meafnaf soc_id : : 0.5 ro_build_fingerprint : : 0.5 ro_build_version_full : : 0.5 ro_build_version_qcom : : 0.5 psid......... #SN : HCY4C18********* #IMEI1 : 869186********** #IMEI2 : 869186********** Security Info.... #Dongle_info : : 0.5 #FB Lock State : UNLOCKED #USER Lock State : LOCKED - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Huawei Fastboot Service... Factory Reset Protection... Removing.... Action Result : Ok Elapsed Time : 00:00:03 |
07-17-2023, 11:59 | #3215 (permalink) |
Product Supporter Join Date: Jan 2021 Location: ... Heart ...
Posts: 593
Member: 2977290 Status: Offline Thanks Meter: 729 | Redmi 6A Mi Account Remove with Hdyra Tool Redmi 6A Mi Account Remove with Hdyra Tool - Keep Press Boot Info Code: ------------------------------------------------------- To Enable BROM Mode : Method 1 - Bootkey (Vol + - Power) or any combination Method 2 - Enable Preloader to brom(crashing Method) Method 3 - Test Point Data0 + ground To Enable Preloader Mode : Method 1 - Just Insert cable ------------------------------------------------------- Searching for MTK Device...Found MTK Port Type : Flashmode BROM FriendlyName : MediaTek USB Port_V1632 (COM10) Device : /5&ebe48c4&0&3 SymbolicName : \\?\usb#vid_0e8d&pid_0003#5&ebe48c4&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver : 01/22/2015,3.0.1504.0 Service : wdm_usb Openning Port [COM10] Ok Handshaking...Ok HwCode : 0766 {MT6765/MT8768t} Hwver : 0000 Target config : E7 SBC : 01 (True) SLA : 02 (True) DAA : 04 (True) SWJTAG : 06 (True) EPP : 00 (False) CERT : 00 (False) MEMREAD : 20 (True) MEMWRITE : 40 (True) CMD_C8 : 80 (True) Connection : BROM HW Subcode : 8A00 HW Subcode : CA00 SW Ver : 0000 ME_ID : 97E446E48B0245B503158DFA0679FBE1 SOC_ID : 8A3B1D5E083BB3B242C91F4B15BA3034E773A315347A9C1513F0F6340826D77C Exploiting Device... Successfully Exploited.. Handshaking...Ok Dumping Preloader from Bootrom.. Seeking preloader address..Found @ 0x00200BC4 Starting to dump... Prel Size : 0x00039370 Successfully dump preloader.. [C:\Hydra Tool\Boot\PreloaderDump\preloader_cactus.bin] Target config : 00 SBC : 00 (False) SLA : 00 (False) DAA : 00 (False) SWJTAG : 00 (False) EPP : 00 (False) CERT : 00 (False) MEMREAD : 00 (False) MEMWRITE : 00 (False) CMD_C8 : 00 (False) Connection : BROM Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin] Patching da2 ... Ok Uploading Stage 1.... Successfully uploaded stage 1, jumping .. Executing JUMP_DA Address @ 0x00200000 Jumping to 0x00200000 Ok 0xC0 Successfully received DA sync ONNECTION_AGENT : brom DRAM config needed for : 90014A4841473461 Sending auto preloader from dump... [preloader_cactus.bin] Sending emi data.. [DRAM setup passed.] Sending emi data succeeded. Uploading stage 2... Upload data was accepted. Jumping to stage 2... Successfully uploaded stage 2 ERAM Size : 0x000000000003A000-232 KB IRAM Size : 0x0000000080000000-2 GB EMMC Boot1 Size : 0x0000000000400000-4 MB EMMC Boot2 Size : 0x0000000000400000-4 MB EMMC RPMB Size : 0x0000000000400000-4 MB EMMC USER Size : 0x00000003AB400000-14,676 GB EMMC CID : 90014A484147346132A53A369E62B54B - HAG4a2 HW-CODE : 0x766 HWSUB-CODE : 0x8A00 HW-VERSION : 0xCA00 SW-VERSION : 0x0 CHIP-EVOLUTION : 0x0 DA-VERSION : 1.0 Speed : high-speed Upload data was accepted. Jumping to stage 2... DA Extensions successfully added Reading Partition Table .. Partition Count : 43 --------------- Reading build.prop content --------------- Brand : xiaomi Model : Redmi 6A Product : cactus ID : PPR1.180610.011 SDK : 28 Release : 9 ABI : armeabi-v7a CPU abilist : armeabi-v7a,armeabi Locale : en-GB Description : cactus-user 9 PPR1.180610.011 V11.0.8.0.PCBMIXM release-keys Device : cactus Display ID : SW_S98506AE1_V009_M13_XM_C3C_USR Security Patch : 2020-05-01 Fingerprint : xiaomi/cactus/cactus:9/PPR1.180610.011/V11.0.8.0.PCBMIXM:user/release-keys StorageType : mtp --------------- end of build.prop content --------------- Reading IMEI........ IMEI1 : 3585********** IMEI2 : 3585********** ------------------------------- Bootloader Status... Bootloader : Locked ------------------------------- Backing up Security.. - preloader(preloader.bin), 512 KB = Ok [preloader_cactus.bin] *Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0766_97E446D38B0245B503158DFA0679FBE1\Auto\0707233214827\6765_Android_scatter.txt - pgpt(pgpt.bin), 32 KB = Ok - nvram(nvram.bin), 64 MB = Ok - nvdata(nvdata.bin), 64 MB = Ok - frp(frp.bin), 1024 KB = Ok - protect1(protect1.bin), 8 MB = Ok - protect2(protect2.bin), 9,469 MB = Ok - persist(persist.bin), 64 MB = Ok - proinfo(proinfo.bin), 3 MB = Ok - nvcfg(nvcfg.bin), 32 MB = Ok - sec1(sec1.bin), 2 MB = Ok - seccfg(seccfg.bin), 8 MB = Ok - lk(lk.bin), 1024 KB = Ok Backup Done!!! Elapsed Time : 00:00:40 - Remove Mi Account Patch Method Code: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Service Function Xiaomi Remove MiAccount [Patch Method] - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Searching for MTK Device...Found MTK Port Type : Flashmode BROM FriendlyName : MediaTek USB Port_V1632 (COM10) Device : /5&ebe48c4&0&3 SymbolicName : \\?\usb#vid_0e8d&pid_0003#5&ebe48c4&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver : 01/22/2015,3.0.1504.0 Service : wdm_usb Openning Port [COM10] Ok Handshaking...Ok HwCode : 0766 {MT6765/MT8768t} Hwver : 0000 Target config : E7 SBC : 01 (True) SLA : 02 (True) DAA : 04 (True) SWJTAG : 06 (True) EPP : 00 (False) CERT : 00 (False) MEMREAD : 20 (True) MEMWRITE : 40 (True) CMD_C8 : 80 (True) Connection : BROM HW Subcode : 8A00 HW Subcode : CA00 SW Ver : 0000 ME_ID : 97E446E48B0245B503158DFA0679FBE1 SOC_ID : 8A3B1D5E083BB3B242C91F4B15BA3034E773A315347A9C1513F0F6340826D77C Exploiting Device... Successfully Exploited.. Handshaking...Ok Dumping Preloader from Bootrom.. Seeking preloader address..Found @ 0x00200BC4 Starting to dump... Prel Size : 0x00039370 Successfully dump preloader.. [C:\Hydra Tool\Boot\PreloaderDump\preloader_cactus.bin] Target config : 00 SBC : 00 (False) SLA : 00 (False) DAA : 00 (False) SWJTAG : 00 (False) EPP : 00 (False) CERT : 00 (False) MEMREAD : 00 (False) MEMWRITE : 00 (False) CMD_C8 : 00 (False) Connection : BROM Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin] Patching da2 ... Ok Uploading Stage 1.... Successfully uploaded stage 1, jumping .. Executing JUMP_DA Address @ 0x00200000 Jumping to 0x00200000 Ok 0xC0 Successfully received DA sync ONNECTION_AGENT : brom DRAM config needed for : 90014A4841473461 Sending auto preloader from dump... [preloader_cactus.bin] Sending emi data.. [DRAM setup passed.] Sending emi data succeeded. Uploading stage 2... Upload data was accepted. Jumping to stage 2... Successfully uploaded stage 2 ERAM Size : 0x000000000003A000-232 KB IRAM Size : 0x0000000080000000-2 GB EMMC Boot1 Size : 0x0000000000400000-4 MB EMMC Boot2 Size : 0x0000000000400000-4 MB EMMC RPMB Size : 0x0000000000400000-4 MB EMMC USER Size : 0x00000003AB400000-14,676 GB EMMC CID : 90014A484147346132A53A369E62B54B - HAG4a2 HW-CODE : 0x766 HWSUB-CODE : 0x8A00 HW-VERSION : 0xCA00 SW-VERSION : 0x0 CHIP-EVOLUTION : 0x0 DA-VERSION : 1.0 Speed : high-speed Upload data was accepted. Jumping to stage 2... DA Extensions successfully added Reading Partition Table .. Partition Count : 43 --------------- Reading build.prop content --------------- Brand : xiaomi Model : Redmi 6A Product : cactus ID : PPR1.180610.011 SDK : 28 Release : 9 ABI : armeabi-v7a CPU abilist : armeabi-v7a,armeabi Locale : en-GB Description : cactus-user 9 PPR1.180610.011 V11.0.8.0.PCBMIXM release-keys Device : cactus Display ID : SW_S98506AE1_V009_M13_XM_C3C_USR Security Patch : 2020-05-01 Fingerprint : xiaomi/cactus/cactus:9/PPR1.180610.011/V11.0.8.0.PCBMIXM:user/release-keys StorageType : mtp --------------- end of build.prop content --------------- Reading IMEI........ IMEI1 : 3585*********** IMEI2 : 3585*********** ------------------------------- Bootloader Status... Bootloader : Locked ------------------------------- Backing up Security.. - preloader(preloader.bin), 512 KB = Ok [preloader_cactus.bin] *Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0766_97DD6E48B0245B503158DFA0679FBE1\Auto\0110723213907\6765_Android_scatter.txt - pgpt(pgpt.bin), 32 KB = Ok - nvram(nvram.bin), 64 MB = Ok - nvdata(nvdata.bin), 64 MB = Ok - frp(frp.bin), 1024 KB = Ok - protect1(protect1.bin), 8 MB = Ok - protect2(protect2.bin), 9,469 MB = Ok - persist(persist.bin), 64 MB = Ok - proinfo(proinfo.bin), 3 MB = Ok - nvcfg(nvcfg.bin), 32 MB = Ok - sec1(sec1.bin), 2 MB = Ok - seccfg(seccfg.bin), 8 MB = Ok - lk(lk.bin), 1024 KB = Ok Backup Done!!! ------------------------------ Xiaomi Operation Flash Mode.. ------------------------------ Backing up Security.. persist... Ok vbmeta... Ok Patching Persist Scanning Patching address...Please wait... > Patching address detected [PATCHED] > Patching address detected [PATCHED] Total Items patched : 2 Successfully patched address.. -persist .....Ok Done Writing... Status: Ok Action Result : Ok Elapsed Time : 00:04:26 |
07-17-2023, 12:02 | #3216 (permalink) |
Product Supporter Join Date: Jan 2021 Location: ... Heart ...
Posts: 593
Member: 2977290 Status: Offline Thanks Meter: 729 | Tecno Pop 4 LTE FRP Lock Remove with Hydra Tool Tecno Pop 4 LTE FRP Lock Remove with Hydra Tool - Keep Press Boot Info Code: ------------------------------------------------------- To Enable BROM Mode : Method 1 - Bootkey (Vol + - Power) or any combination Method 2 - Enable Preloader to brom(crashing Method) Method 3 - Test Point Data0 + ground To Enable Preloader Mode : Method 1 - Just Insert cable ------------------------------------------------------- Searching for MTK Device...Found MTK Port Type : Flashmode Preloader FriendlyName : MediaTek PreLoader USB VCOM_V1632 (Android) (COM9) Device : /5&33881217&0&2 SymbolicName : \\?\usb#vid_0e8d&pid_2000#5&33881217&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver : 01/22/2015,3.0.1504.0 Service : wdm_usb Openning Port [COM9] Ok Handshaking...Ok HwCode : 0699 {MT6739/MT6731} Hwver : 0000 Target config : 05 SBC : 01 (True) SLA : 00 (False) DAA : 04 (True) SWJTAG : 04 (True) EPP : 00 (False) CERT : 00 (False) MEMREAD : 00 (False) MEMWRITE : 00 (False) CMD_C8 : 00 (False) Connection : Preloader HW Subcode : 8A00 HW Subcode : CA00 SW Ver : 0000 ME_ID : E195965CE8086819E1A38D1FE762390B - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Preloader To Brom Function..... - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Method 1 Exploit Executed..... [Successfully Crash Preloader.] Device now is BROM Port Exploiting Device... Successfully Exploited.. Handshaking...Ok Dumping Preloader from Bootrom.. Seeking preloader address..Found @ 0x00200BC4 Starting to dump... Prel Size : 0x0001CC70 Successfully dump preloader.. [C:\Users\alvin\Desktop\hydra\Boot\PreloaderDump\preloader_k39tv1_bsp.bin] Target config : 00 SBC : 00 (False) SLA : 00 (False) DAA : 00 (False) SWJTAG : 00 (False) EPP : 00 (False) CERT : 00 (False) MEMREAD : 00 (False) MEMWRITE : 00 (False) CMD_C8 : 00 (False) Connection : BROM Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin] Patching da2 ... Ok Uploading Stage 1.... Successfully uploaded stage 1, jumping .. Executing JUMP_DA Address @ 0x00200000 Jumping to 0x00200000 Ok 0xC0 Successfully received DA sync ONNECTION_AGENT : brom Sending auto preloader from dump... [preloader_k39tv1_bsp.bin] Sending emi data.. [DRAM setup passed.] Sending emi data succeeded. Uploading stage 2... Upload data was accepted. Jumping to stage 2... Successfully uploaded stage 2 ERAM Size : 0x0000000000020000-128 KB IRAM Size : 0x0000000080000000-2 GB EMMC Boot1 Size : 0x0000000000400000-4 MB EMMC Boot2 Size : 0x0000000000400000-4 MB EMMC RPMB Size : 0x0000000001000000-16 MB EMMC USER Size : 0x0000000747C00000-29.121 GB EMMC CID : 150100514436334D4201202306D2688B - QD63MB HW-CODE : 0x699 HWSUB-CODE : 0x8A00 HW-VERSION : 0xCA00 SW-VERSION : 0x0 CHIP-EVOLUTION : 0x0 DA-VERSION : 1.0 Speed : high-speed Upload data was accepted. Jumping to stage 2... DA Extensions successfully added Reading Partition Table .. Partition Count : 40 --------------- Reading build.prop content --------------- Product : k39tv1_bsp ID : QP1A.190711.020 SDK : 29 Release : 10 ABI : armeabi-v7a CPU abilist : armeabi-v7a,armeabi Locale : en-US Description : full_k39tv1_bsp-user 10 QP1A.190711.020 1677044979 release-keys Device : TECNO-BC1s Display ID : BC1s-VQ653AB-QGo-OP-230221V021 Security Patch : 2023-02-05 Fingerprint : TECNO/BC1s-OP/TECNO-BC1s:10/QP1A.190711.020/AB-OP-230221V021:user/release-keys --------------- end of build.prop content --------------- Reading IMEI........ IMEI1 : 35082********** IMEI2 : 35082********** ------------------------------- Bootloader Status... Bootloader : Locked ------------------------------- Backing up Security.. - preloader(preloader.bin), 512 KB = Ok [preloader_k39tv1_bsp.bin] *Creating Scatter file... C:\Users\alvin\Desktop\hydra\Backup\MTKBKUP\0699_EWWW965CE8086819E1A38D1FE762390B\Auto\0707244083426\6739_Android_scatter.txt - pgpt(pgpt.bin), 32 KB = Ok - nvram(nvram.bin), 5 MB = Ok - nvdata(nvdata.bin), 32 MB = Ok - frp(frp.bin), 1024 KB = Ok - protect1(protect1.bin), 8 MB = Ok - protect2(protect2.bin), 10.867 MB = Ok - persist(persist.bin), 48 MB = Ok - proinfo(proinfo.bin), 3 MB = Ok - nvcfg(nvcfg.bin), 8 MB = Ok - sec1(sec1.bin), 2 MB = Ok - seccfg(seccfg.bin), 8 MB = Ok - lk(lk.bin), 1024 KB = Ok Backup Done!!! Elapsed Time : 00:00:36 - Select FRP Remove and Click Execute Code: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Service Function Factory Reset Protection[FRP] Auto - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Searching for MTK Device...Found MTK Port Type : Flashmode BROM FriendlyName : MediaTek USB Port_V1632 (COM6) Device : /5&33881217&0&2 SymbolicName : \\?\usb#vid_0e8d&pid_0003#5&33881217&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver : 01/22/2015,3.0.1504.0 Service : wdm_usb Openning Port [COM6] Ok Reading Partition Table .. ERAM Size : 0x0000000000020000-128 KB IRAM Size : 0x0000000080000000-2 GB EMMC Boot1 Size : 0x0000000000400000-4 MB EMMC Boot2 Size : 0x0000000000400000-4 MB EMMC RPMB Size : 0x0000000001000000-16 MB EMMC USER Size : 0x0000000747C00000-29.121 GB EMMC CID : 150100514436334D4201202306D2688B - QD63MB HW-CODE : 0x699 HWSUB-CODE : 0x8A00 HW-VERSION : 0xCA00 SW-VERSION : 0x0 CHIP-EVOLUTION : 0x0 DA-VERSION : 1.0 Speed : high-speed Partition Count : 40 --------------- Reading build.prop content --------------- Product : k39tv1_bsp ID : QP1A.190711.020 SDK : 29 Release : 10 ABI : armeabi-v7a CPU abilist : armeabi-v7a,armeabi Locale : en-US Description : full_k39tv1_bsp-user 10 QP1A.190711.020 1677044979 release-keys Device : TECNO-BC1s Display ID : BC1s-VQ653AB-QGo-OP-230221V021 Security Patch : 2023-02-05 Fingerprint : TECNO/BC1s-OP/TECNO-BC1s:10/QP1A.190711.020/AB-OP-230221V021:user/release-keys --------------- end of build.prop content --------------- Reading IMEI........ IMEI1 : 35082********* IMEI2 : 35082********* ------------------------------- Bootloader Status... Bootloader : Locked ------------------------------- Rebooting Device... Reboot Option : RebootToNormal Rebooting Operation Done!!!! Action Result : Ok Elapsed Time : 00:00:06 |
07-17-2023, 12:06 | #3217 (permalink) |
Product Supporter Join Date: Jan 2021 Location: ... Heart ...
Posts: 593
Member: 2977290 Status: Offline Thanks Meter: 729 | Vivo Y71 (1724) pattern and frp lock remove with Hydra Tool Vivo Y71 (1724) pattern and frp lock remove with Hydra Tool - First Keep Press Boot Info Code: PreOperation Configuration Brand : AUTO Model : AUTO Storage : Auto Loader: Auto Port : Auto Searching for Qualcomm 9008 Device...Found FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM4) SymbolicName :\\?\usb#vid_05c6&pid_9008#5&29e81f4d&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver :01/25/2014,2.1.1.0 Getting device info. [Connected]..... Serial No.: 0x1AE8541A HW_ID : 000560E100000000 MSM ID : 0x000560E1, MSM8917-Qualcomm Snapdragon 425/LAADANAZA MODEL_ID : 0x0000 OEM_ID : 0x0000 - QUALCOMM PBL Ver : 00000000 PK HASH : 60ba997fef6da9f05885fa11f1dd6d2a90d052a257a09c2075d7246cc73c0d43 Hydra Enable Auto search Firehose.. #Please wait... #Search by filename filter..... #Found 21 Compatible Files ..Found match Firehose... Firehose Loader[000560e100000000_60ba997fef6da9f0_1600b30c_qualcomm_vivo_peek_8917.fhprg] -------------------------------------------------- Header Type : OLD TargetMSM : 8917 Tag : _peek Version : 3 Code_size : 288 Signature_size : 256 fhVendor : VIVO HW_ID : 000560E100000000 Vendor : QUALCOMM OEM_ID : 0000 MODEL_ID : 0000 SW_ID : 0000000000000003 APP_ID : pk_hash : 60ba997fef6da9f05885fa11f1dd6d2a90d052a257a09c2075d7246cc73c0d43 OEM_VERSION : compiler026 IMAGE_VARIANT : LAADANAZA QC_VERSION : BOOT.BF.3.3-00199 -------------------------------------------------- SaharaBoot... Ok Sending .................Ok Connecting to Firehose... Ping... Ok Configuration[FHProt_Auto]...... Identifying Chip.... Ok Chip Configuration : MemoryName : eMMC MaxPayloadSizeToTargetInBytes : 1048576 MaxPayloadSizeToTargetInBytesSupported : 1048576 MaxPayloadSizeFromTargetInBytes : 4096 MaxXMLSizeInBytes : 4096 TargetName : 8917 Version : 1 *** STORAGE DEVICE INFO *** Memory Type : eMMC Block Size in Bytes : 512 Page Size : 512 Manufacturer ID : 21 Serial Number : 217974681 Firmware Version : 3 Product Name : QE63MB Physical Partitions : 3 Total Logical Blocks: Drive [0] 30535680[14.561 GB] Drive [1] 8192[4 MB] Drive [2] 8192[4 MB] Protocol : Universal Running : Ok Reading GPT[3] Drive [0] 56 Items Drive [1] 0 Items Drive [2] 0 Items --------------- Reading build.prop content --------------- build.prop Brand : vivo Vendor : vivo Model : vivo 1724 Product : msm8937_64 Manufacturer : vivo ID : OPM1.171019.011 SDK : 27 Release : 8.1.0 ABI : arm64-v8a CPU abilist : arm64-v8a,armeabi-v7a,armeabi Locale : en-US Description : msm8937_64-user 8.1.0 OPM1.171019.011 eng.compil.20210507.114116 release-keys Device : msm8937_64 Display ID : OPM1.171019.011 release-keys Security Patch : 2021-03-01 Fingerprint : vivo/1724/1724:8.1.0/OPM1.171019.011/compil05071141:user/release-keys --------------- end of build.prop content --------------- Auto Backup Security partitions... Reading Security Items.... - modemst1(modemst1.bin), 2.5 MB = Ok - modemst2(modemst2.bin), 2.5 MB = Ok - fsg(fsg.bin), 2.5 MB = Ok - fsc(fsc.bin), 512 Bytes = Ok - persist(persist.bin), 32 MB = Ok C:\Hydra Tool\Backup\QUALBackup\QUALCOMM\000560E100000000_1AE8541A\Auto_Backup\070723193739 Backup Security Success.... Elapsed Time : 00:00:13 - Select Factory Reset safeformat and click execute Code: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Vivo Service Tool Factory Reset/Format Userdata Auto - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - PreOperation Configuration Brand : AUTO Model : AUTO Storage : Auto Loader: Auto Port : Auto Searching for Qualcomm 9008 Device...Found FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM4) SymbolicName :\\?\usb#vid_05c6&pid_9008#5&29e81f4d&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver :01/25/2014,2.1.1.0 Getting device info. [Connected].Ok Device MODE : Firehose Connecting to Firehose... Ping.. Ok Configuration[FHProt_Auto]...... Ok Chip Configuration : MemoryName : eMMC MaxPayloadSizeToTargetInBytes : 1048576 MaxPayloadSizeToTargetInBytesSupported : 1048576 MaxPayloadSizeFromTargetInBytes : 4096 MaxXMLSizeInBytes : 4096 TargetName : 8917 Version : 1 *** STORAGE DEVICE INFO *** Memory Type : eMMC Block Size in Bytes : 512 Page Size : 512 Manufacturer ID : 21 Serial Number : 217974681 Firmware Version : 3 Product Name : QE63MB Physical Partitions : 3 Total Logical Blocks: Drive [0] 30535680[14.561 GB] Drive [1] 8192[4 MB] Drive [2] 8192[4 MB] Protocol : Universal Running : Ok Reading GPT[3] Drive [0] 56 Items Drive [1] 0 Items Drive [2] 0 Items --------------- Reading build.prop content --------------- build.prop Brand : vivo Vendor : vivo Model : vivo 1724 Product : msm8937_64 Manufacturer : vivo ID : OPM1.171019.011 SDK : 27 Release : 8.1.0 ABI : arm64-v8a CPU abilist : arm64-v8a,armeabi-v7a,armeabi Locale : en-US Description : msm8937_64-user 8.1.0 OPM1.171019.011 eng.compil.20210507.114116 release-keys Device : msm8937_64 Display ID : OPM1.171019.011 release-keys Security Patch : 2021-03-01 Fingerprint : vivo/1724/1724:8.1.0/OPM1.171019.011/compil05071141:user/release-keys --------------- end of build.prop content --------------- Processing Safe Format - Auto.... - Formatting Userdata Executing ... - Formatting Userdata [Safe Format - eMMc] OkOk Rebooting Phone.... Ok Action Result : Ok Elapsed Time : 00:00:05 - Select FRP Remove and click execute Code: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Vivo Service Tool Factory Reset Protection(FRP)/Demo Remove Auto - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - PreOperation Configuration Brand : AUTO Model : AUTO Storage : Auto Loader: Auto Port : Auto Searching for Qualcomm 9008 Device...Found FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM4) SymbolicName :\\?\usb#vid_05c6&pid_9008#5&29e81f4d&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver :01/25/2014,2.1.1.0 Getting device info. [Connected].Ok Device MODE : Firehose Connecting to Firehose... Ping.. Ok Configuration[FHProt_Auto]...... Ok Chip Configuration : MemoryName : eMMC MaxPayloadSizeToTargetInBytes : 1048576 MaxPayloadSizeToTargetInBytesSupported : 1048576 MaxPayloadSizeFromTargetInBytes : 4096 MaxXMLSizeInBytes : 4096 TargetName : 8917 Version : 1 *** STORAGE DEVICE INFO *** Memory Type : eMMC Block Size in Bytes : 512 Page Size : 512 Manufacturer ID : 21 Serial Number : 217974681 Firmware Version : 3 Product Name : QE63MB Physical Partitions : 3 Total Logical Blocks: Drive [0] 30535680[14.561 GB] Drive [1] 8192[4 MB] Drive [2] 8192[4 MB] Protocol : Universal Running : Ok Reading GPT[3] Drive [0] 56 Items Drive [1] 0 Items Drive [2] 0 Items --------------- Reading build.prop content --------------- build.prop Brand : vivo Vendor : vivo Model : vivo 1724 Product : msm8937_64 Manufacturer : vivo ID : OPM1.171019.011 SDK : 27 Release : 8.1.0 ABI : arm64-v8a CPU abilist : arm64-v8a,armeabi-v7a,armeabi Locale : en-US Description : msm8937_64-user 8.1.0 OPM1.171019.011 eng.compil.20210507.114116 release-keys Device : msm8937_64 Display ID : OPM1.171019.011 release-keys Security Patch : 2021-03-01 Fingerprint : vivo/1724/1724:8.1.0/OPM1.171019.011/compil05071141:user/release-keys --------------- end of build.prop content --------------- Rebooting Phone.... Ok Rebooting Phone.... Ok Action Result : Ok Elapsed Time : 00:00:06 |
07-17-2023, 12:09 | #3218 (permalink) |
Product Supporter Join Date: Jan 2021 Location: ... Heart ...
Posts: 593
Member: 2977290 Status: Offline Thanks Meter: 729 | Xiaomi Redmi 9 (lancelot) Flashing Done with Hydra Tool Xiaomi Redmi 9 (lancelot) Flashing Done with Hydra Tool Code: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - MTK Partition Manager Function... - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Searching for MTK Device...Found MTK Port Type : Flashmode BROM FriendlyName : MediaTek USB Port_V1632 (COM15) Device : /7&3b5abdfa&0&2 SymbolicName : \\?\usb#vid_0e8d&pid_0003#7&3b5abdfa&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver : 01/22/2015,3.0.1504.0 Service : wdm_usb Openning Port [COM15] Ok Reading Partition Table .. ERAM Size : 0x0000000000070000-448 KB IRAM Size : 0x0000000100000000-4 GB EMMC Boot1 Size : 0x0000000000400000-4 MB EMMC Boot2 Size : 0x0000000000400000-4 MB EMMC RPMB Size : 0x0000000001000000-16 MB EMMC USER Size : 0x0000000E8F800000-58,242 GB EMMC CID : 1501004450364441420333ECD0633879 - DP6DAB HW-CODE : 0x707 HWSUB-CODE : 0x8A00 HW-VERSION : 0xCA00 SW-VERSION : 0x0 CHIP-EVOLUTION : 0x1 DA-VERSION : 1.0 Speed : high-speed Partition Count : 50 --------------- Reading build.prop content --------------- Product : lancelot Marketname : ro.product.systemRedmi 9 ID : RP1A.200720.011 SDK : 30 Release : 11 ABI : arm64-v8a CPU abilist : arm64-v8a,armeabi-v7a,armeabi Locale : en-GB Description : lancelot-user 11 RP1A.200720.011 V12.5.5.0.RJCMIXM release-keys Display ID : RP1A.200720.011 Security Patch : 2022-04-01 StorageType : mtp --------------- end of build.prop content --------------- Reading IMEI........ IMEI1 : 86531********** IMEI2 : 86531************ ------------------------------- Bootloader Status... Bootloader : Unlocked ------------------------------- Reading Selected Partitions.. - preloader(preloader.bin), 512 KB = Ok [preloader_lancelot.bin] *Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0707_C960385BF4879DD4D48EEF7D3BC438\Selected\070725532457\6768_Android_scatter.txt - pgpt(pgpt.bin), 32 KB = Ok - recovery(recovery.bin), 64 MB = Ok - misc(misc.bin), 512 KB = Ok - para(para.bin), 512 KB = Ok - expdb(expdb.bin), 20 MB = Ok - frp(frp.bin), 1024 KB = Ok - vbmeta(vbmeta.bin), 8 MB = Ok - vbmeta_system(vbmeta_system.bin), 8 MB = Ok - vbmeta_vendor(vbmeta_vendor.bin), 8 MB = Ok - md_udc(md_udc.bin), 22,602 MB = Ok - metadata(metadata.bin), 32 MB = Ok - nvcfg(nvcfg.bin), 32 MB = Ok - nvdata(nvdata.bin), 64 MB = Ok - persist(persist.bin), 48 MB = Ok - persistbak(persistbak.bin), 48 MB = Ok - protect1(protect1.bin), 8 MB = Ok - protect2(protect2.bin), 11,367 MB = Ok - seccfg(seccfg.bin), 8 MB = Ok - sec1(sec1.bin), 2 MB = Ok - proinfo(proinfo.bin), 3 MB = Ok - efuse(efuse.bin), 512 KB = Ok - boot_para(boot_para.bin), 26 MB = Ok - nvram(nvram.bin), 64 MB = Ok - logo(logo.bin), 8 MB = Ok - md1img(md1img.bin), 128 MB = Ok - spmfw(spmfw.bin), 1024 KB = Ok - scp1(scp1.bin), 6 MB = Ok - scp2(scp2.bin), 6 MB = Ok - sspm_1(sspm_1.bin), 1024 KB = Ok - sspm_2(sspm_2.bin), 1024 KB = Ok - gz1(gz1.bin), 16 MB = Ok - gz2(gz2.bin), 16 MB = Ok - lk(lk.bin), 2 MB = Ok - lk2(lk2.bin), 2 MB = Ok - boot(boot.bin), 64 MB = Ok - dtbo(dtbo.bin), 16 MB = Ok - tee1(tee1.bin), 5 MB = Ok - tee2(tee2.bin), 5 MB = Ok - gsort(gsort.bin), 16 MB = Ok - minidump(minidump.bin), 128 MB = Ok - exaid(exaid.bin), 384 MB = Ok - cust(cust.bin), 1024 MB = Ok - devinfo(devinfo.bin), 8 MB = Ok - ffu(ffu.bin), 11,5 MB = Ok - cache(cache.bin), 432 MB = Ok - otp(otp.bin), 43 MB = Ok - flashinfo(flashinfo.bin), 16 MB = Ok Done Reading... Elapsed Time : 00:05:52 |
07-18-2023, 06:19 | #3219 (permalink) |
Product Supporter Join Date: Jan 2021 Location: ... Heart ...
Posts: 593
Member: 2977290 Status: Offline Thanks Meter: 729 | Huawei P20 lite (ANE-L01) FRP Lock Remove with Hydra Tool Huawei P20 lite (ANE-L01) FRP Lock Remove with Hydra Tool - Unlock Bootloader temp with testpoint Code: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Huawei Service Tool Bootloader Temporary Unlock - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Searching for Hisilicon USB1 Port...Found FriendlyName : Android Adapter PCUI (COM64) Device : /5&2108ad5d&0&12 SymbolicName : \\?\usb#vid_12d1&pid_3609#5&2108ad5d&0&12#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver : 11/28/2016,2.0.6.725 Service : HWHandSet Openning Port [COM64] Ok ================================ USB1 To Fastboot.... ================================ Sending Fastboot Loader... > Loader 1 ...Ok > Loader 2 ...Ok Wait few seconds.. phone will reboot in Fastboot Mode Action Result : Ok Elapsed Time : 00:01:23 - Now remove frp lock fastboot mode Code: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Huawei Service Tool Factory Reset Protection/Account Remove FRP - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Searching Device By Fastboot Device Found... - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Reading Device Information... - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - hotainfo...... #hotainfo_len : #C_version : #D_version : #PLMN : #BoardID : #DeviceName : Build number : ANE-LX1 9.1.0.401(C432E13R1P7) Product Model : ANE-LX1 hwnff_ver : Ver2.3 key_version : huawei_key_v1 product : : hi6250 system_update_state : FAILED (remote: 'cannot system get update state in oeminfo') vendorcountry : : hw/eu soc_id : : 0.5 ro_build_fingerprint : : 0.5 ro_build_version_full : : 0.5 ro_build_version_qcom : : 0.5 psid......... #SN : 89U4C*********** #IMEI1 : 867440********** #IMEI2 : 000000********** Security Info.... #Dongle_info : : 0.5 #FB Lock State : UNLOCKED #USER Lock State : LOCKED - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Huawei Fastboot Service... Factory Reset Protection... Removing.... Action Result : Ok Elapsed Time : 00:00:03 |
07-18-2023, 06:21 | #3220 (permalink) |
Product Supporter Join Date: Jan 2021 Location: ... Heart ...
Posts: 593
Member: 2977290 Status: Offline Thanks Meter: 729 | Huawei Y6s Frp Lock Remove with Hydra Tool Huawei Y6s Frp Lock Remove with Hydra Tool Code: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Service Function Factory Reset Protection[FRP] Auto - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Searching for MTK Device...Found MTK Port Type : Flashmode BROM FriendlyName : MediaTek USB Port (COM25) Device : /7&33c1e99c&0&1 SymbolicName : \\?\usb#vid_0e8d&pid_0003#7&33c1e99c&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver : 01/22/2015,3.0.1504.0 Service : wdm_usb Openning Port [COM25] Ok Handshaking...Ok HwCode : 0766 {MT6765/MT8768t} Hwver : 0000 Target config : E5 SBC : 01 (True) SLA : 00 (False) DAA : 04 (True) SWJTAG : 04 (True) EPP : 00 (False) CERT : 00 (False) MEMREAD : 20 (True) MEMWRITE : 40 (True) CMD_C8 : 80 (True) Connection : BROM HW Subcode : 8A00 HW Subcode : CA00 SW Ver : 0000 ME_ID : EBF2D31655B5FF41E5BB5342E1A4410B SOC_ID : 903EC0F0478A0A8AC8755A7CA229FF2DFA7B31F4F93C373B49CF0E7F9F7D7A01 Device not yet filterd... Executing LibUSB Filter.. Device Now Filtered...Restarting Device Port.. Openning Port [COM25] Ok Exploiting Device... Successfully Exploited.. Handshaking...Ok Dumping Preloader from Bootrom.. Seeking preloader address..Found @ 0x00200BC4 Starting to dump... Prel Size : 0x0003D85C Successfully dump preloader.. [C:\Hydra Tool\Boot\PreloaderDump\preloader_k62v1_64_mexico.bin] Target config : 00 SBC : 00 (False) SLA : 00 (False) DAA : 00 (False) SWJTAG : 00 (False) EPP : 00 (False) CERT : 00 (False) MEMREAD : 00 (False) MEMWRITE : 00 (False) CMD_C8 : 00 (False) Connection : BROM Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin] Patching da2 ... Ok Uploading Stage 1.... Successfully uploaded stage 1, jumping .. Executing JUMP_DA Address @ 0x00200000 Jumping to 0x00200000 Ok 0xC0 Successfully received DA sync ONNECTION_AGENT : brom DRAM config needed for : 90014A6843386150 Sending auto preloader from dump... [preloader_k62v1_64_mexico.bin] Sending emi data.. [DRAM setup passed.] Sending emi data succeeded. Uploading stage 2... Upload data was accepted. Jumping to stage 2... Successfully uploaded stage 2 ERAM Size : 0x000000000003A000-232 KB IRAM Size : 0x00000000C0000000-3 GB EMMC Boot1 Size : 0x0000000000400000-4 MB EMMC Boot2 Size : 0x0000000000400000-4 MB EMMC RPMB Size : 0x0000000001000000-16 MB EMMC USER Size : 0x0000000E8F800000-58/242 GB EMMC CID : 90014A68433861503E01000E604767A3 - hC8aP> HW-CODE : 0x766 HWSUB-CODE : 0x8A00 HW-VERSION : 0xCA00 SW-VERSION : 0x0 CHIP-EVOLUTION : 0x0 DA-VERSION : 1.0 Speed : high-speed Upload data was accepted. Jumping to stage 2... DA Extensions successfully added Reading Partition Table .. Partition Count : 49 --------------- Reading build.prop content --------------- Unable to read system info.. --------------- end of build.prop content --------------- Reading IMEI........ IMEI1 : 861244********* IMEI2 : 861244********* ------------------------------- Bootloader Status... Bootloader : Locked ------------------------------- Backing up Security.. - preloader(preloader.bin), 512 KB = Ok [preloader_k62v1_64_mexico.bin] *Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0766_EBF2D31655B5FF4VCC5BB5342E1A4410B\Auto\070823011101\6765_Android_scatter.txt - pgpt(pgpt.bin), 32 KB = Ok - nvram(nvram.bin), 5 MB = Ok - nvdata(nvdata.bin), 16 MB = Ok - frp(frp.bin), 1024 KB = Ok - protect1(protect1.bin), 8 MB = Ok - protect2(protect2.bin), 13/969 MB = Ok - persist(persist.bin), 8 MB = Ok - oeminfo(oeminfo.bin), 32 MB = Ok - proinfo(proinfo.bin), 1024 KB = Ok - nvcfg(nvcfg.bin), 8 MB = Ok - seccfg(seccfg.bin), 8 MB = Ok - lk(lk.bin), 3 MB = Ok Backup Done!!! Rebooting Device... Reboot Option : RebootToNormal Rebooting Operation Done!!!! Action Result : Ok Elapsed Time : 00:00:38 |
07-18-2023, 06:24 | #3221 (permalink) |
Product Supporter Join Date: Jan 2021 Location: ... Heart ...
Posts: 593
Member: 2977290 Status: Offline Thanks Meter: 729 | Oppo A5s (CPH1809) Pattern and FRP Lock remove with Hdyra Tool Oppo A5s (CPH1809) Pattern and FRP Lock remove with Hdyra Tool - First Keep press boot info Code: ------------------------------------------------------- To Enable BROM Mode : Method 1 - Bootkey (Vol + - Power) or any combination Method 2 - Enable Preloader to brom(crashing Method) Method 3 - Test Point Data0 + ground To Enable Preloader Mode : Method 1 - Just Insert cable ------------------------------------------------------- Searching for MTK Device...Found MTK Port Type : Flashmode BROM FriendlyName : MediaTek USB Port_V1632 (COM5) Device : /5&13a213fa&0&2 SymbolicName : \\?\usb#vid_0e8d&pid_0003#5&13a213fa&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver : 01/22/2015,3.0.1504.0 Service : wdm_usb Openning Port [COM5] Ok Handshaking...Ok HwCode : 0766 {MT6765/MT8768t} Hwver : 0000 Target config : E5 SBC : 01 (True) SLA : 00 (False) DAA : 04 (True) SWJTAG : 04 (True) EPP : 00 (False) CERT : 00 (False) MEMREAD : 20 (True) MEMWRITE : 40 (True) CMD_C8 : 80 (True) Connection : BROM HW Subcode : 8A00 HW Subcode : CA00 SW Ver : 0000 ME_ID : B573FAD9936F8C45384C3CB81C707C51 SOC_ID : AFA3E4DEB00D65E31CE09144A75D49AD2332C9C0230910642366F0D052773838 Exploiting Device... Successfully Exploited.. Handshaking...Ok Dumping Preloader from Bootrom.. Seeking preloader address..Found @ 0x00200BC4 Starting to dump... Prel Size : 0x0003A958 Successfully dump preloader.. [C:\Users\user\Downloads\Hydra Tool_FullPackage_02-21-2023\Boot\PreloaderDump\preloader_oppo6765_18511.bin] Target config : 00 SBC : 00 (False) SLA : 00 (False) DAA : 00 (False) SWJTAG : 00 (False) EPP : 00 (False) CERT : 00 (False) MEMREAD : 00 (False) MEMWRITE : 00 (False) CMD_C8 : 00 (False) Connection : BROM Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin] Patching da2 ... Ok Uploading Stage 1.... Successfully uploaded stage 1, jumping .. Executing JUMP_DA Address @ 0x00200000 Jumping to 0x00200000 Ok 0xC0 Successfully received DA sync ONNECTION_AGENT : brom DRAM config needed for : 150100474436424D Sending auto preloader from dump... [preloader_oppo6765_18511.bin] Sending emi data.. [DRAM setup passed.] Sending emi data succeeded. Uploading stage 2... Upload data was accepted. Jumping to stage 2... Successfully uploaded stage 2 ERAM Size : 0x000000000003A000-232 KB IRAM Size : 0x00000000C0000000-3 GB EMMC Boot1 Size : 0x0000000000400000-4 MB EMMC Boot2 Size : 0x0000000000400000-4 MB EMMC RPMB Size : 0x0000000000400000-4 MB EMMC USER Size : 0x0000000747C00000-29.121 GB EMMC CID : 150100474436424D42010D350633C537 - GD6BMB HW-CODE : 0x766 HWSUB-CODE : 0x8A00 HW-VERSION : 0xCA00 SW-VERSION : 0x0 CHIP-EVOLUTION : 0x0 DA-VERSION : 1.0 Speed : high-speed Upload data was accepted. Jumping to stage 2... DA Extensions successfully added Reading Partition Table .. Partition Count : 42 --------------- Reading build.prop content --------------- Vendor : OPPO Manufacturer : OPPO ID : O11019 SDK : 27 Release : 8.1.0 ABI : arm64-v8a CPU abilist : arm64-v8a,armeabi-v7a,armeabi Locale : en-US Description : full_oppo6765_18511-user 8.1.0 O11019 1616154336 release-keys Security Patch : 2021-04-05 StorageType : mtp --------------- end of build.prop content --------------- Reading IMEI........ ------------------------------- Bootloader Status... Bootloader : Locked ------------------------------- Backing up Security.. - preloader(preloader.bin), 512 KB = Ok [preloader_oppo6765_18511.bin] *Creating Scatter file... C:\Users\user\Downloads\Hydra Tool_FullPackage_02-21-2023\Backup\MTKBKUP\0766_B573FAD9936F8C45384C3CB81C707C51\Auto\0707234444354\6765_Android_scatter.txt - pgpt(pgpt.bin), 32 KB = Ok - nvram(nvram.bin), 64 MB = Ok - nvdata(nvdata.bin), 64 MB = Ok - frp(frp.bin), 1024 KB = Ok - protect1(protect1.bin), 8 MB = Ok - protect2(protect2.bin), 8.469 MB = Ok - persist(persist.bin), 48 MB = Ok - proinfo(proinfo.bin), 3 MB = Ok - oppo_custom(oppo_custom.bin), 1024 KB = Ok - opporeserve1(opporeserve1.bin), 8 MB = Ok - opporeserve2(opporeserve2.bin), 64 MB = Ok - nvcfg(nvcfg.bin), 32 MB = Ok - sec1(sec1.bin), 2 MB = Ok - seccfg(seccfg.bin), 8 MB = Ok - lk(lk.bin), 5 MB = Ok Backup Done!!! Elapsed Time : 00:01:07 - select ultrapower opration and click execute Code: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Service Function Ultra Power Auto - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Searching for MTK Device...Found MTK Port Type : Flashmode BROM FriendlyName : MediaTek USB Port_V1632 (COM5) Device : /5&13a213fa&0&2 SymbolicName : \\?\usb#vid_0e8d&pid_0003#5&13a213fa&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver : 01/22/2015,3.0.1504.0 Service : wdm_usb Openning Port [COM5] Ok Reading Partition Table .. ERAM Size : 0x000000000003A000-232 KB IRAM Size : 0x00000000C0000000-3 GB EMMC Boot1 Size : 0x0000000000400000-4 MB EMMC Boot2 Size : 0x0000000000400000-4 MB EMMC RPMB Size : 0x0000000000400000-4 MB EMMC USER Size : 0x0000000747C00000-29.121 GB EMMC CID : 150100474436424D42010D350633C537 - GD6BMB HW-CODE : 0x766 HWSUB-CODE : 0x8A00 HW-VERSION : 0xCA00 SW-VERSION : 0x0 CHIP-EVOLUTION : 0x0 DA-VERSION : 1.0 Speed : high-speed Partition Count : 42 --------------- Reading build.prop content --------------- Vendor : OPPO Manufacturer : OPPO ID : O11019 SDK : 27 Release : 8.1.0 ABI : arm64-v8a CPU abilist : arm64-v8a,armeabi-v7a,armeabi Locale : en-US Description : full_oppo6765_18511-user 8.1.0 O11019 1616154336 release-keys Security Patch : 2021-04-05 StorageType : mtp --------------- end of build.prop content --------------- Reading IMEI........ ------------------------------- Bootloader Status... Bootloader : Locked ------------------------------- --------------------------- Ultra Power --------------------------- Formatting Userdata : Operation : Safeformat Universal... Ok Removing FRP : Ok Rebooting Device... Reboot Option : RebootToNormal Rebooting Operation Done!!!! Action Result : Ok Elapsed Time : 00:00:11 |
The Following User Says Thank You to Hydra Supporter For This Useful Post: |
07-18-2023, 06:30 | #3222 (permalink) |
Product Supporter Join Date: Jan 2021 Location: ... Heart ...
Posts: 593
Member: 2977290 Status: Offline Thanks Meter: 729 | Redmi Note 5 Pro (whyred) new v2 mi account remove with Hydra Tool Redmi Note 5 Pro (whyred) new v2 mi account remove with Hydra Tool - First Keep press Boot info Code: PreOperation Configuration Brand : XIAOMI Model : Redmi Note 5 Pro (Whyred) New V2 Storage : Auto Loader: 0008C0E100010000_a7b8b82545a98eca_384d4649_GENERIC_XIAOMI_auth.fhprg Port : Auto Searching for Qualcomm 9008 Device...Found FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM14) SymbolicName :\\?\usb#vid_05c6&pid_9008#6&29e6b3c2&0&7#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver :02/05/2018,3.0.0.0 Getting device info. [Connected].Ok Device MODE : Firehose Connecting to Firehose... Ping...... Ok Configuration[FHProt_Auto]...... Ok Chip Configuration : MemoryName : eMMC MaxPayloadSizeToTargetInBytes : 1048576 MaxPayloadSizeToTargetInBytesSupported : 1048576 MaxPayloadSizeFromTargetInBytes : 4096 MaxXMLSizeInBytes : 4096 TargetName : MSM8996 Version : 1 DateTime : Aug 2 2018 - 22:27:53 *** STORAGE DEVICE INFO *** Memory Type : eMMC Block Size in Bytes : 512 Page Size : 512 Manufacturer ID : 144 Serial Number : 1150398153 Firmware Version : 162 Product Name : HCG8a4 Physical Partitions : 4 Total Logical Blocks: Drive [0] 122142720[58,242 GB] Drive [1] 8192[4 MB] Drive [2] 8192[4 MB] Drive [3] 8192[4 MB] Protocol : Universal Running : Ok Reading GPT[4] Drive [0] 64 Items Drive [1] 0 Items Drive [2] 0 Items Drive [3] 0 Items --------------- Reading build.prop content --------------- build.prop Brand : xiaomi Model : Redmi Note 5 Product : whyred ID : PKQ1.180904.001 SDK : 28 Release : 9 ABI : arm64-v8a CPU abilist : arm64-v8a,armeabi-v7a,armeabi Locale : en-GB Description : whyred-user 9 PKQ1.180904.001 V11.0.3.0.PEIMIXM release-keys Device : whyred Display ID : PKQ1.180904.001 Security Patch : 2019-11-05 Fingerprint : xiaomi/whyred/whyred:9/PKQ1.180904.001/V11.0.3.0.PEIMIXM:user/release-keys --------------- end of build.prop content --------------- Elapsed Time : 00:00:06 - Remove mi account new mthod Code: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Xiaomi Tool Mi Account Remove MiAccount[New Method] - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - PreOperation Configuration Brand : XIAOMI Model : Redmi Note 5 Pro (Whyred) New V2 Storage : Auto Loader: 0008C0E100010000_a7b8b82545a98eca_384d4649_GENERIC_XIAOMI_auth.fhprg Port : Auto Searching for Qualcomm 9008 Device...Found FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM14) SymbolicName :\\?\usb#vid_05c6&pid_9008#6&29e6b3c2&0&7#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver :02/05/2018,3.0.0.0 Getting device info. [Connected].Ok Device MODE : Firehose Connecting to Firehose... Ping...... Ok Configuration[FHProt_Auto]...... Ok Chip Configuration : MemoryName : eMMC MaxPayloadSizeToTargetInBytes : 1048576 MaxPayloadSizeToTargetInBytesSupported : 1048576 MaxPayloadSizeFromTargetInBytes : 4096 MaxXMLSizeInBytes : 4096 TargetName : MSM8996 Version : 1 DateTime : Aug 2 2018 - 22:27:53 *** STORAGE DEVICE INFO *** Memory Type : eMMC Block Size in Bytes : 512 Page Size : 512 Manufacturer ID : 144 Serial Number : 1150398153 Firmware Version : 162 Product Name : HCG8a4 Physical Partitions : 4 Total Logical Blocks: Drive [0] 122142720[58,242 GB] Drive [1] 8192[4 MB] Drive [2] 8192[4 MB] Drive [3] 8192[4 MB] Protocol : Universal Running : Ok Reading GPT[4] Drive [0] 64 Items Drive [1] 0 Items Drive [2] 0 Items Drive [3] 0 Items --------------- Reading build.prop content --------------- build.prop Brand : xiaomi Model : Redmi Note 5 Product : whyred ID : PKQ1.180904.001 SDK : 28 Release : 9 ABI : arm64-v8a CPU abilist : arm64-v8a,armeabi-v7a,armeabi Locale : en-GB Description : whyred-user 9 PKQ1.180904.001 V11.0.3.0.PEIMIXM release-keys Device : whyred Display ID : PKQ1.180904.001 Security Patch : 2019-11-05 Fingerprint : xiaomi/whyred/whyred:9/PKQ1.180904.001/V11.0.3.0.PEIMIXM:user/release-keys --------------- end of build.prop content --------------- Reading GPT[4] Drive [0] 64 Items Drive [1] 0 Items Drive [2] 0 Items Drive [3] 0 Items Backing up Partition for safety...Ok Scanning Patching address... > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED]Done!! Total Items patched : 33 Successfully patched address.. Rebooting Phone.... Ok Action Result : Ok Elapsed Time : 00:00:39 |
The Following User Says Thank You to Hydra Supporter For This Useful Post: |
07-18-2023, 06:32 | #3223 (permalink) |
Product Supporter Join Date: Jan 2021 Location: ... Heart ...
Posts: 593
Member: 2977290 Status: Offline Thanks Meter: 729 | Redmi Note 10 (sunny) Flashing done with Hydra Tool Redmi Note 10 (sunny) Flashing done with Hydra Tool Code: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Qualcomm Flashing Function...... - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - PreOperation Configuration Brand XIAOMI Model Redmi Note 10 (sunny) Storage Auto Loader 000950E100720000_1bebe3863a6781db_404ab4f2_XIAOMI_auth.fhprg Port Auto Searching for Qualcomm 9008 Device...Found FriendlyName Qualcomm HS-USB QDLoader 9008 (COM3) SymbolicName usb#vid_05c6&pid_9008#6&182a12da&0&7#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver 08022017,2.1.2.7 Getting device info. [Connected].Ok Device MODE Firehose Connecting to Firehose... Ping..................... Ok Configuration[FHProt_Auto]........ Ok Chip Configuration MemoryName UFS MaxPayloadSizeToTargetInBytes 1048576 MaxPayloadSizeToTargetInBytesSupported 1048576 MaxPayloadSizeFromTargetInBytes MaxXMLSizeInBytes 4096 TargetName Version 1 DateTime Mar 7 2019 - 230629 STORAGE DEVICE INFO Memory Type UFS Block Size in Bytes 4096 Page Size 4096 Manufacturer ID 300 Serial Number 1129467726 Firmware Version 605 Product Name MT128GASAO4U21 0605 Physical Partitions 6 Total Logical Blocks Drive [0] 30119936[114.898 GB] Drive [1] 2048[8 MB] Drive [2] 2048[8 MB] Drive [3] 32768[128 MB] Drive [4] 1048576[4 GB] Drive [5] 32768[128 MB] Protocol Universal Running Ok Reading GPT[6] Drive [0] 32 Items Drive [1] 32 Items Drive [2] 32 Items Drive [3] 32 Items Drive [4] 64 Items Drive [5] 32 Items --------------- Reading build.prop content --------------- build.prop system build.prop Marketname ro.product.system ID RKQ1.201022.002 SDK 30 Release 11 ABI arm64-v8a CPU abilist arm64-v8a,armeabi-v7a,armeabi Locale en-GB Security Patch 2021-02-01 --------------- end of build.prop content --------------- Auto Backup Security partitions... Reading Security Items.... - modemst1(modemst1.bin), 2.496 MB = Ok - modemst2(modemst2.bin), 2.496 MB = Ok - fsg(fsg.bin), 2.496 MB = Ok - fsc(fsc.bin), 124 KB = Ok - persist(persist.bin), 31.996 MB = Ok CHydra ToolBackupQUALBackupXIAOMI000950E100720000_416AC6D3Auto_Backup070723233523 Backup Security Success.... ---------------------------- Flashing Selected Partitions.... - persist[0](persist.img), 32 MB = Ok - misc[0](misc.img), 85 Bytes = Ok - super[0](super_1.img), 396 KB = Ok - super[0](super_2.img), 994.848 MB = Ok - super[0](super_3.img), 341.324 MB = Ok - super[0](super_4.img), 203.25 MB = Ok - super[0](super_5.img), 605.445 MB = Ok - vbmeta_system_a[0](vbmeta_system.img), 4 KB = Ok - metadata[0](metadata_1.img), 20 KB = Ok - metadata[0](metadata_2.img), 24 KB = Ok - userdata[0](userdata_1.img), 8 KB = Ok - userdata[0](userdata_2.img), 32 KB = Ok - userdata[0](userdata_3.img), 54.043 MB = Ok - userdata[0](userdata_4.img), 4 KB = Ok - userdata[0](userdata_5.img), 4 KB = Ok - userdata[0](userdata_6.img), 12 KB = Ok - userdata[0](userdata_7.img), 20 KB = Ok - userdata[0](userdata_8.img), 24 KB = Ok - userdata[0](userdata_9.img), 44 KB = Ok - userdata[0](userdata_10.img), 3.332 MB = Ok - ffu[0](ffu.img), 4 MB = Ok - PrimaryGPT[0](gpt_main0.bin), 24 KB = Ok - xbl_a[1](xbl.elf), 3.452 MB = Ok - xbl_config_a[1](xbl_config.elf), 71.324 KB = Ok - PrimaryGPT[1](gpt_main1.bin), 24 KB = Ok - xbl_b[2](xbl.elf), 3.452 MB = Ok - xbl_config_b[2](xbl_config.elf), 71.324 KB = Ok - PrimaryGPT[2](gpt_main2.bin), 24 KB = Ok - PrimaryGPT[3](gpt_main3.bin), 24 KB = Ok - aop_a[4](aop.mbn), 157.574 KB = Ok - tz_a[4](tz.mbn), 1.965 MB = Ok - hyp_a[4](hyp.mbn), 368.547 KB = Ok - modem_a[4](NON-HLOS.bin), 115.074 MB = Ok - bluetooth_a[4](BTFM.bin), 908 KB = Ok - abl_a[4](abl.elf), 204 KB = Ok - dsp_a[4](dspso.bin), 32 MB = Ok - keymaster_a[4](km41.mbn), 237.132 KB = Ok - boot_a[4](boot.img), 128 MB = Ok - cmnlib_a[4](cmnlib.mbn), 389.521 KB = Ok - cmnlib64_a[4](cmnlib64.mbn), 507.959 KB = Ok - devcfg_a[4](devcfg.mbn), 42.867 KB = Ok - qupfw_a[4](qupv3fw.elf), 48.081 KB = Ok - vbmeta_a[4](vbmeta.img), 4 KB = Ok - dtbo_a[4](dtbo.img), 8 MB = Ok - imagefv_a[4](imagefv.elf), 20 KB = Ok - uefisecapp_a[4](uefi_sec.mbn), 123.772 KB = Ok - vendor_boot_a[4](vendor_boot.img), 96 MB = Ok - aop_b[4](aop.mbn), 157.574 KB = Ok - tz_b[4](tz.mbn), 1.965 MB = Ok - hyp_b[4](hyp.mbn), 368.547 KB = Ok - modem_b[4](NON-HLOS.bin), 115.074 MB = Ok - bluetooth_b[4](BTFM.bin), 908 KB = Ok - abl_b[4](abl.elf), 204 KB = Ok - dsp_b[4](dspso.bin), 32 MB = Ok - keymaster_b[4](km41.mbn), 237.132 KB = Ok - boot_b[4](boot.img), 128 MB = Ok - cmnlib_b[4](cmnlib.mbn), 389.521 KB = Ok - cmnlib64_b[4](cmnlib64.mbn), 507.959 KB = Ok - devcfg_b[4](devcfg.mbn), 42.867 KB = Ok - qupfw_b[4](qupv3fw.elf), 48.081 KB = Ok - vbmeta_b[4](vbmeta.img), 4 KB = Ok - dtbo_b[4](dtbo.img), 8 MB = Ok - imagefv_b[4](imagefv.elf), 20 KB = Ok - uefisecapp_b[4](uefi_sec.mbn), 123.772 KB = Ok - devinfo[4](devinfo.img), 25 Bytes = Ok - logfs[4](logfs_ufs_8mb.bin), 16 KB = Ok - storsec[4](storsec.mbn), 20.091 KB = Ok - secdata[4](sec.elf), 12.465 KB = Ok - PrimaryGPT[4](gpt_main4.bin), 24 KB = Ok - PrimaryGPT[5](gpt_main5.bin), 24 KB = Ok Flashing Patch Configuration.. 0 [NUM_DISK_SECTORS-6.] = Ok 0 [NUM_DISK_SECTORS-6.] = Ok 0 [NUM_DISK_SECTORS-6.] = Ok 0 [NUM_DISK_SECTORS-6.] = Ok 0 [NUM_DISK_SECTORS-1.] = Ok 0 [NUM_DISK_SECTORS-1.] = Ok 0 [NUM_DISK_SECTORS-5.] = Ok 0 [CRC32(2,4096)] = Ok 0 [CRC32(NUM_DISK_SECTORS-5.,4096)] = Ok 0 [0] = Ok 0 [CRC32(1,92)] = Ok 0 [0] = Ok 0 [CRC32(NUM_DISK_SECTORS-1.,92)] = Ok 1 [NUM_DISK_SECTORS-6.] = Ok 1 [NUM_DISK_SECTORS-6.] = Ok 1 [NUM_DISK_SECTORS-6.] = Ok 1 [NUM_DISK_SECTORS-6.] = Ok 1 [NUM_DISK_SECTORS-1.] = Ok 1 [NUM_DISK_SECTORS-1.] = Ok 1 [NUM_DISK_SECTORS-5.] = Ok 1 [CRC32(2,4096)] = Ok 1 [CRC32(NUM_DISK_SECTORS-5.,4096)] = Ok 1 [0] = Ok 1 [CRC32(1,92)] = Ok 1 [0] = Ok 1 [CRC32(NUM_DISK_SECTORS-1.,92)] = Ok 2 [NUM_DISK_SECTORS-6.] = Ok 2 [NUM_DISK_SECTORS-6.] = Ok 2 [NUM_DISK_SECTORS-6.] = Ok 2 [NUM_DISK_SECTORS-6.] = Ok 2 [NUM_DISK_SECTORS-1.] = Ok 2 [NUM_DISK_SECTORS-1.] = Ok 2 [NUM_DISK_SECTORS-5.] = Ok 2 [CRC32(2,4096)] = Ok 2 [CRC32(NUM_DISK_SECTORS-5.,4096)] = Ok 2 [0] = Ok 2 [CRC32(1,92)] = Ok 2 [0] = Ok 2 [CRC32(NUM_DISK_SECTORS-1.,92)] = Ok 3 [NUM_DISK_SECTORS-6.] = Ok 3 [NUM_DISK_SECTORS-6.] = Ok 3 [NUM_DISK_SECTORS-6.] = Ok 3 [NUM_DISK_SECTORS-6.] = Ok 3 [NUM_DISK_SECTORS-1.] = Ok 3 [NUM_DISK_SECTORS-1.] = Ok 3 [NUM_DISK_SECTORS-5.] = Ok 3 [CRC32(2,4096)] = Ok 3 [CRC32(NUM_DISK_SECTORS-5.,4096)] = Ok 3 [0] = Ok 3 [CRC32(1,92)] = Ok 3 [0] = Ok 3 [CRC32(NUM_DISK_SECTORS-1.,92)] = Ok 4 [NUM_DISK_SECTORS-6.] = Ok 4 [NUM_DISK_SECTORS-6.] = Ok 4 [NUM_DISK_SECTORS-6.] = Ok 4 [NUM_DISK_SECTORS-6.] = Ok 4 [NUM_DISK_SECTORS-1.] = Ok 4 [NUM_DISK_SECTORS-1.] = Ok 4 [NUM_DISK_SECTORS-5.] = Ok 4 [CRC32(2,8192)] = Ok 4 [CRC32(NUM_DISK_SECTORS-5.,8192)] = Ok 4 [0] = Ok 4 [CRC32(1,92)] = Ok 4 [0] = Ok 4 [CRC32(NUM_DISK_SECTORS-1.,92)] = Ok 5 [NUM_DISK_SECTORS-6.] = Ok 5 [NUM_DISK_SECTORS-6.] = Ok 5 [NUM_DISK_SECTORS-6.] = Ok 5 [NUM_DISK_SECTORS-6.] = Ok 5 [NUM_DISK_SECTORS-1.] = Ok 5 [NUM_DISK_SECTORS-1.] = Ok 5 [NUM_DISK_SECTORS-5.] = Ok 5 [CRC32(2,4096)] = Ok 5 [CRC32(NUM_DISK_SECTORS-5.,4096)] = Ok 5 [0] = Ok 5 [CRC32(1,92)] = Ok 5 [0] = Ok 5 [CRC32(NUM_DISK_SECTORS-1.,92)] = Ok Operation Setbootablestoragedrive Drive 1 Set bootable storage drive 1 Ok Rebooting Phone.... Ok Elapsed Time 000242 |
The Following User Says Thank You to Hydra Supporter For This Useful Post: |
07-18-2023, 06:34 | #3224 (permalink) |
Product Supporter Join Date: Jan 2021 Location: ... Heart ...
Posts: 593
Member: 2977290 Status: Offline Thanks Meter: 729 | Xiaomi POCO X3 Pro (vayu) Safe Format with Hydra Tool Xiaomi POCO X3 Pro (vayu) Safe Format with Hydra Tool - Safe format phone with Mi Assistant mode Code: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Xiaomi Tool Factory Reset Safe Format - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Adb Handler [Console] Starting ADB Server.... Searching Device By ADB [sideload] Device Found... Sate : sideload Product name : vayu_global Product model : vayu_global Product device : vayu Model : vayu_global Android VERSION : 11 OS Version : V12.5.7.0.RJUMIXM Branch : F Language : Region : GB Sideload Factory Reset... Sideload Safe Format.... Processing... Action Result : Ok Elapsed Time : 00:00:00 Action Result : Ok Elapsed Time : 00:00:02 |
The Following User Says Thank You to Hydra Supporter For This Useful Post: |
07-18-2023, 12:26 | #3225 (permalink) |
No Life Poster Join Date: Apr 2008 Location: Heart of Islam Age: 41
Posts: 2,220
Member: 762034 Status: Offline Sonork: 100.1585274 Thanks Meter: 1,451 | Sparks Neo 7 pro FRP done Sparkx Neo 7 pro FRP done Code: Hydra Tool Ver 2023.6.30.0 Windows 10 (Version 22H2, OS Build 19045.3208, 64-bit Edition) Intel(R) Core(TM) i5-6400 CPU @ 2.70GHz Intel(R) HD Graphics 530 Ram Installed : 8 GB Windows Access Right : Admin Software Run As Admnistrator ******* Dongle Info ******* Version : Hydra Tool v 1.2 Serial : 190400000868 Initialize : OKAY Status : Activated Life : 0 [0-0-0-0-1] - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Service Function Factory Reset Protection[FRP] Auto - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Searching for MTK Device...Found MTK Port Type : Flashmode BROM FriendlyName : MediaTek USB Port_V1632 (COM33) Device : /5&1ece9816&0&2 SymbolicName : \\?\usb#vid_0e8d&pid_0003#5&1ece9816&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver : 01/22/2015,3.0.1504.0 Service : wdm_usb Openning Port [COM33] Ok Handshaking...Ok HwCode : 0766 {MT6765/MT8768t} Hwver : 0000 Target config : 00 SBC : 00 (False) SLA : 00 (False) DAA : 00 (False) SWJTAG : 00 (False) EPP : 00 (False) CERT : 00 (False) MEMREAD : 00 (False) MEMWRITE : 00 (False) CMD_C8 : 00 (False) Connection : BROM HW Subcode : 8A00 HW Subcode : CA00 SW Ver : 0000 ME_ID : B14C28524AEFEA2DD7AE0F5473283CA8 SOC_ID : F068261EA0ED41B37D09A814F21ED912E41CCD82E1C1593AFB35EAED689E267F Exploiting Device... Successfully Exploited.. Handshaking...Ok Dumping Preloader from Bootrom.. Seeking preloader address..Found @ 0x00200BC0 Starting to dump... Prel Size : 0x0003E1F4 Successfully dump preloader.. [C:\Hydra Tool\Boot\PreloaderDump\preloader_k62v1_64_bsp.bin] Target config : 00 SBC : 00 (False) SLA : 00 (False) DAA : 00 (False) SWJTAG : 00 (False) EPP : 00 (False) CERT : 00 (False) MEMREAD : 00 (False) MEMWRITE : 00 (False) CMD_C8 : 00 (False) Connection : BROM Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin] Patching da2 ... Ok Uploading Stage 1.... Successfully uploaded stage 1, jumping .. Executing JUMP_DA Address @ 0x00200000 Jumping to 0x00200000 Ok 0xC0 Successfully received DA sync ONNECTION_AGENT : brom DRAM config needed for : D601034133413536 Sending auto preloader from dump... [preloader_k62v1_64_bsp.bin] Sending emi data.. [DRAM setup passed.] Sending emi data succeeded. Uploading stage 2... Upload data was accepted. Jumping to stage 2... Successfully uploaded stage 2 ERAM Size : 0x000000000003A000-232 KB IRAM Size : 0x0000000100000000-4 GB EMMC Boot1 Size : 0x0000000000400000-4 MB EMMC Boot2 Size : 0x0000000000400000-4 MB EMMC RPMB Size : 0x0000000001000000-16 MB EMMC USER Size : 0x0000000E67800000-57.617 GB EMMC CID : D6010341334135363112C613D920198F - A3A561 HW-CODE : 0x766 HWSUB-CODE : 0x8A00 HW-VERSION : 0xCA00 SW-VERSION : 0x0 CHIP-EVOLUTION : 0x0 DA-VERSION : 1.0 Speed : high-speed Upload data was accepted. Jumping to stage 2... DA Extensions successfully added Reading Partition Table .. Partition Count : 48 --------------- Reading build.prop content --------------- Brand : Sparx Vendor : Deploy PVT LTD Model : Sparx Neo 7 Pro Product : Neo_7_Pro Manufacturer : Deploy PVT LTD ID : SP1A.210812.016 SDK : 31 Release : 12 ABI : arm64-v8a CPU abilist : arm64-v8a,armeabi-v7a,armeabi Locale : en-US Description : Neo_7_Pro-user 12 SP1A.210812.016 165 release-keys Device : Neo_7_Pro Display ID : Sparx_Neo_7_Pro_V09_20230513 Security Patch : 2023-04-05 Fingerprint : Sparx/Neo_7_Pro/Neo_7_Pro:12/SP1A.210812.016/165:user/release-keys StorageType : mtp --------------- end of build.prop content --------------- Reading IMEI........ ------------------------------- Bootloader Status... Bootloader : Locked ------------------------------- Rebooting Device... Reboot Option : RebootToNormal Rebooting Operation Done!!!! Action Result : Ok Elapsed Time : 00:00:26 |
Bookmarks |
Thread Tools | |
Display Modes | |
| |
|