|
Welcome to the GSM-Forum forums. You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. Only registered members may post questions, contact other members or search our database of over 8 million posts. Registration is fast, simple and absolutely free so please - Click to REGISTER! If you have any problems with the registration process or your account login, please contact contact us . |
|
Register | FAQ | Donate | Forum Rules | Root any Device | ★iPhone Unlock★ | ★ Direct Codes ★ | Direct Unlock Source | Search | Today's Posts | Mark Forums Read |
| LinkBack | Thread Tools | Display Modes |
07-24-2023, 05:52 | #3241 (permalink) |
No Life Poster Join Date: Jul 2012 Location: GSMFABRICA-Team
Posts: 3,400
Member: 1785930 Status: Offline Sonork: 100.1685640 Thanks Meter: 4,819 | - first keep press boot info Code: ------------------------------------------------------- To Enable BROM Mode : Method 1 - Bootkey (Vol + - Power) or any combination Method 2 - Enable Preloader to brom(crashing Method) Method 3 - Test Point Data0 + ground To Enable Preloader Mode : Method 1 - Just Insert cable ------------------------------------------------------- Searching for MTK Device...Found MTK Port Type : Flashmode BROM FriendlyName : MediaTek USB Port_V1632 (COM14) Device : /6&2ac3e851&0&4 SymbolicName : \\?\usb#vid_0e8d&pid_0003#6&2ac3e851&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver : 01/22/2015,3.0.1504.0 Service : wdm_usb Openning Port [COM14] Ok Handshaking...Ok HwCode : 0717 {MT6761/MT6762/MT3369/MT8766B} Hwver : 0000 Target config : E5 SBC : 01 (True) SLA : 00 (False) DAA : 04 (True) SWJTAG : 04 (True) EPP : 00 (False) CERT : 00 (False) MEMREAD : 20 (True) MEMWRITE : 40 (True) CMD_C8 : 80 (True) Connection : BROM HW Subcode : 8A00 HW Subcode : CA01 SW Ver : 0200 ME_ID : 9A1737F1895EEFA82ED80AD8591F2DD7 SOC_ID : 698D2DED9984C8540215FAA5B2D6C509ABD6F02F666AA0FAFE0E64EE004B3366 Exploiting Device... Successfully Exploited.. Handshaking...Ok Dumping Preloader from Bootrom.. Seeking preloader address..Found @ 0x00200BC4 Starting to dump... Prel Size : 0x00039310 Successfully dump preloader.. [C:\Hydra Tool\Boot\PreloaderDump\preloader_x657c_h6117.bin] Target config : 00 SBC : 00 (False) SLA : 00 (False) DAA : 00 (False) SWJTAG : 00 (False) EPP : 00 (False) CERT : 00 (False) MEMREAD : 00 (False) MEMWRITE : 00 (False) CMD_C8 : 00 (False) Connection : BROM Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin] Patching da2 ... Ok Uploading Stage 1.... Successfully uploaded stage 1, jumping .. Executing JUMP_DA Address @ 0x00200000 Jumping to 0x00200000 Ok 0xC0 Successfully received DA sync ONNECTION_AGENT : brom DRAM config needed for : 7001005441323833 Sending auto preloader from dump... [preloader_x657c_h6117.bin] Sending emi data.. [DRAM setup passed.] Sending emi data succeeded. Uploading stage 2... Upload data was accepted. Jumping to stage 2... Successfully uploaded stage 2 ERAM Size : 0x000000000003A500-233.25 KB IRAM Size : 0x0000000080000000-2 GB EMMC Boot1 Size : 0x0000000000400000-4 MB EMMC Boot2 Size : 0x0000000000400000-4 MB EMMC RPMB Size : 0x0000000000400000-4 MB EMMC USER Size : 0x000000074A000000-29.156 GB EMMC CID : 700100544132383332232587890E6873 - TA2832 HW-CODE : 0x717 HWSUB-CODE : 0x8A00 HW-VERSION : 0xCA01 SW-VERSION : 0x200 CHIP-EVOLUTION : 0x0 DA-VERSION : 1.0 Speed : high-speed Upload data was accepted. Jumping to stage 2... DA Extensions successfully added Reading Partition Table .. Partition Count : 43 --------------- Reading build.prop content --------------- Product : x657c_h6117 ID : QP1A.190711.020 SDK : 29 Release : 10 ABI : armeabi-v7a CPU abilist : armeabi-v7a,armeabi Locale : en-US Description : full_x657c_h6117-user 10 QP1A.190711.020 319582 release-keys Display ID : X657C-H6117GH-QGo-GL-220610V322 Security Patch : 2022-06-05 --------------- end of build.prop content --------------- Reading IMEI........ IMEI1 : 35991********* IMEI2 : 35991********* ------------------------------- Bootloader Status... Bootloader : Locked ------------------------------- Backing up Security.. - preloader(preloader.bin), 512 KB = Ok [preloader_x657c_h6117.bin] *Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0717_9A1737F18855FA82ED80AD8591F2DD7\Auto\072023095203\6761_Android_scatter.txt - pgpt(pgpt.bin), 32 KB = Ok - nvram(nvram.bin), 64 MB = Ok - nvdata(nvdata.bin), 71.867 MB = Ok - frp(frp.bin), 1024 KB = Ok - protect1(protect1.bin), 8 MB = Ok - protect2(protect2.bin), 8 MB = Ok - persist(persist.bin), 48 MB = Ok - proinfo(proinfo.bin), 3 MB = Ok - nvcfg(nvcfg.bin), 32 MB = Ok - sec1(sec1.bin), 2 MB = Ok - seccfg(seccfg.bin), 8 MB = Ok - lk(lk.bin), 1024 KB = Ok Backup Done!!! Elapsed Time : 00:01:38 - select ultra power auto and click execute Code: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Service Function Ultra Power Auto - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Searching for MTK Device...Found MTK Port Type : Flashmode BROM FriendlyName : MediaTek USB Port_V1632 (COM14) Device : /6&2ac3e851&0&4 SymbolicName : \\?\usb#vid_0e8d&pid_0003#6&2ac3e851&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver : 01/22/2015,3.0.1504.0 Service : wdm_usb Openning Port [COM14] Ok Reading Partition Table .. ERAM Size : 0x000000000003A500-233.25 KB IRAM Size : 0x0000000080000000-2 GB EMMC Boot1 Size : 0x0000000000400000-4 MB EMMC Boot2 Size : 0x0000000000400000-4 MB EMMC RPMB Size : 0x0000000000400000-4 MB EMMC USER Size : 0x000000074A000000-29.156 GB EMMC CID : 700100544132383332232587890E6873 - TA2832 HW-CODE : 0x717 HWSUB-CODE : 0x8A00 HW-VERSION : 0xCA01 SW-VERSION : 0x200 CHIP-EVOLUTION : 0x0 DA-VERSION : 1.0 Speed : high-speed Partition Count : 43 --------------- Reading build.prop content --------------- Product : x657c_h6117 ID : QP1A.190711.020 SDK : 29 Release : 10 ABI : armeabi-v7a CPU abilist : armeabi-v7a,armeabi Locale : en-US Description : full_x657c_h6117-user 10 QP1A.190711.020 319582 release-keys Display ID : X657C-H6117GH-QGo-GL-220610V322 Security Patch : 2022-06-05 --------------- end of build.prop content --------------- Reading IMEI........ IMEI1 : 3599122******** IMEI2 : 3599122******** ------------------------------- Bootloader Status... Bootloader : Locked ------------------------------- --------------------------- Ultra Power --------------------------- Formatting Userdata : Operation : Safeformat Universal... Ok Removing FRP : Ok Rebooting Device... Reboot Option : RebootToNormal Rebooting Operation Done!!!! Action Result : Ok Elapsed Time : 00:00:10 |
The Following User Says Thank You to Unlockinfo For This Useful Post: |
07-24-2023, 05:57 | #3242 (permalink) |
No Life Poster Join Date: Jul 2012 Location: GSMFABRICA-Team
Posts: 3,400
Member: 1785930 Status: Offline Sonork: 100.1685640 Thanks Meter: 4,819 | Samsung A10s (SM-A107F) FRP Lock Remove with Hydra Tool - keep press boot info - phone connect with test point Code: ------------------------------------------------------- To Enable BROM Mode : Method 1 - Bootkey (Vol + - Power) or any combination Method 2 - Enable Preloader to brom(crashing Method) Method 3 - Test Point Data0 + ground To Enable Preloader Mode : Method 1 - Just Insert cable ------------------------------------------------------- Searching for MTK Device...Found MTK Port Type : Flashmode Preloader FriendlyName : MediaTek PreLoader USB VCOM_V1633 (Android) (COM30) Device : /6&1afede88&0&3 SymbolicName : \\?\usb#vid_0e8d&pid_2000#6&1afede88&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver : 01/22/2015,3.0.1504.0 Service : wdm_usb Openning Port [COM30] Ok Handshaking...Ok HwCode : 0766 {MT6765/MT8768t} Hwver : 0000 Target config : 05 SBC : 01 (True) SLA : 00 (False) DAA : 04 (True) SWJTAG : 04 (True) EPP : 00 (False) CERT : 00 (False) MEMREAD : 00 (False) MEMWRITE : 00 (False) CMD_C8 : 00 (False) Connection : Preloader HW Subcode : 8A00 HW Subcode : CA00 SW Ver : 0000 ME_ID : 78CD7902746DFE21C8B1E3F96EAA7BBF - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Preloader To Brom Function..... - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Method 1 Exploit Executed..... [Successfully Crash Preloader.] Device now is BROM Port Device not yet filterd... Executing LibUSB Filter.. Device Now Filtered...Restarting Device Port.. Openning Port [COM5] Ok Exploiting Device... Successfully Exploited.. Handshaking...Ok Dumping Preloader from Bootrom.. Seeking preloader address..Found @ 0x00200BC4 Starting to dump... Prel Size : 0x0003BEC4 Successfully dump preloader.. [C:\Hydra Tool\Boot\PreloaderDump\preloader_s96116aa1.bin] Target config : 00 SBC : 00 (False) SLA : 00 (False) DAA : 00 (False) SWJTAG : 00 (False) EPP : 00 (False) CERT : 00 (False) MEMREAD : 00 (False) MEMWRITE : 00 (False) CMD_C8 : 00 (False) Connection : BROM Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin] Patching da2 ... Ok Uploading Stage 1.... Successfully uploaded stage 1, jumping .. Executing JUMP_DA Address @ 0x00200000 Jumping to 0x00200000 Ok 0xC0 Successfully received DA sync ONNECTION_AGENT : brom DRAM config needed for : 150100514436334D Sending auto preloader from dump... [preloader_s96116aa1.bin] Sending emi data.. [DRAM setup passed.] Sending emi data succeeded. Uploading stage 2... Upload data was accepted. Jumping to stage 2... Successfully uploaded stage 2 ERAM Size : 0x000000000003A000-232 KB IRAM Size : 0x0000000080000000-2 GB EMMC Boot1 Size : 0x0000000000400000-4 MB EMMC Boot2 Size : 0x0000000000400000-4 MB EMMC RPMB Size : 0x0000000001000000-16 MB EMMC USER Size : 0x0000000747C00000-29.121 GB EMMC CID : 150100514436334D42035A41D33BB6B3 - QD63MB HW-CODE : 0x766 HWSUB-CODE : 0x8A00 HW-VERSION : 0xCA00 SW-VERSION : 0x0 CHIP-EVOLUTION : 0x0 DA-VERSION : 1.0 Speed : high-speed Upload data was accepted. Jumping to stage 2... DA Extensions successfully added Reading Partition Table .. Partition Count : 41 --------------- Reading build.prop content --------------- Brand : samsung Vendor : samsung Model : SM-A107F Product : a10s Manufacturer : samsung ID : PPR1.180610.011 SDK : 28 Release : 9 ABI : armeabi-v7a CPU abilist : armeabi-v7a,armeabi Locale : en-GB Description : a10sxx-user 9 PPR1.180610.011 A107FXXU5ATA9 release-keys Device : a10s Display ID : PPR1.180610.011.A107FXXU5ATA9 Security Patch : 2020-01-01 Fingerprint : samsung/a10sxx/a10s:9/PPR1.180610.011/A107FXXU5ATA9:user/release-keys --------------- end of build.prop content --------------- Reading IMEI........ IMEI1 : AB8ADE********* IMEI2 : F7900E********* ------------------------------- Bootloader Status... Bootloader : Locked ------------------------------- Backing up Security.. - preloader(preloader.bin), 512 KB = Ok [preloader_s96116aa1.bin] *Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0766_78CD7ff746DFE21C8B1E3F96EAA7BBF\Auto\071923205444\6765_Android_scatter.txt - pgpt(pgpt.bin), 4 MB = Ok - nvram(nvram.bin), 64 MB = Ok - nvdata(nvdata.bin), 64 MB = Ok - frp(frp.bin), 1024 KB = Ok - persistent(persistent.bin), 512 KB = Ok - protect1(protect1.bin), 8 MB = Ok - protect2(protect2.bin), 8 MB = Ok - persist(persist.bin), 48 MB = Ok - proinfo(proinfo.bin), 3 MB = Ok - nvcfg(nvcfg.bin), 32 MB = Ok - sec1(sec1.bin), 2 MB = Ok - seccfg(seccfg.bin), 8 MB = Ok - lk(lk.bin), 2 MB = Ok Backup Done!!! Elapsed Time : 00:05:17 - go to pm tab and read patition files. - select persistent and erase Code: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - MTK Partition Manager Function... - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Searching for MTK Device...Found MTK Port Type : Flashmode BROM FriendlyName : MediaTek USB Port_V1633 (COM5) Device : /6&1afede88&0&3 SymbolicName : \\?\usb#vid_0e8d&pid_0003#6&1afede88&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver : 01/22/2015,3.0.1504.0 Service : wdm_usb Openning Port [COM5] Ok Reading Partition Table .. ERAM Size : 0x000000000003A000-232 KB IRAM Size : 0x0000000080000000-2 GB EMMC Boot1 Size : 0x0000000000400000-4 MB EMMC Boot2 Size : 0x0000000000400000-4 MB EMMC RPMB Size : 0x0000000001000000-16 MB EMMC USER Size : 0x0000000747C00000-29.121 GB EMMC CID : 150100514436334D42035A41D33BB6B3 - QD63MB HW-CODE : 0x766 HWSUB-CODE : 0x8A00 HW-VERSION : 0xCA00 SW-VERSION : 0x0 CHIP-EVOLUTION : 0x0 DA-VERSION : 1.0 Speed : high-speed Partition Count : 41 --------------- Reading build.prop content --------------- Brand : samsung Vendor : samsung Model : SM-A107F Product : a10s Manufacturer : samsung ID : PPR1.180610.011 SDK : 28 Release : 9 ABI : armeabi-v7a CPU abilist : armeabi-v7a,armeabi Locale : en-GB Description : a10sxx-user 9 PPR1.180610.011 A107FXXU5ATA9 release-keys Device : a10s Display ID : PPR1.180610.011.A107FXXU5ATA9 Security Patch : 2020-01-01 Fingerprint : samsung/a10sxx/a10s:9/PPR1.180610.011/A107FXXU5ATA9:user/release-keys --------------- end of build.prop content --------------- Reading IMEI........ IMEI1 : AB8AD*********** IMEI2 : F7900*********** ------------------------------- Bootloader Status... Bootloader : Locked ------------------------------- Format Selected Partitions.. -persistent .....Ok Done Format... Elapsed Time : 00:00:15 |
The Following User Says Thank You to Unlockinfo For This Useful Post: |
07-24-2023, 06:00 | #3243 (permalink) |
No Life Poster Join Date: Jul 2012 Location: GSMFABRICA-Team
Posts: 3,400
Member: 1785930 Status: Offline Sonork: 100.1685640 Thanks Meter: 4,819 | Tecno CAMON 18T FRP Lock Remove with Hydra Tool Code: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Service Function Factory Reset Protection[FRP] Auto - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Searching for MTK Device...Found MTK Port Type : Flashmode BROM FriendlyName : MediaTek USB Port (COM7) Device : /5&10dc9a0c&0&2 SymbolicName : \\?\usb#vid_0e8d&pid_0003#5&10dc9a0c&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver : 01/22/2015,3.0.1504.0 Service : wdm_usb Openning Port [COM7] Ok Handshaking...Ok HwCode : 0707 {MT6768} Hwver : 0000 Target config : E5 SBC : 01 (True) SLA : 00 (False) DAA : 04 (True) SWJTAG : 04 (True) EPP : 00 (False) CERT : 00 (False) MEMREAD : 20 (True) MEMWRITE : 40 (True) CMD_C8 : 80 (True) Connection : BROM HW Subcode : 8A00 HW Subcode : CA00 SW Ver : 0000 ME_ID : 71FA65D7F930FF0D7F9C9C307409D1FE SOC_ID : 10B84E9A0361F742AB9E722CD980F3E290B72F797E66998EE36AB0F45891C5BC Device not yet filterd... Executing LibUSB Filter.. Device Now Filtered...Restarting Device Port.. Openning Port [COM7] Ok Exploiting Device... Successfully Exploited.. Handshaking...Ok Dumping Preloader from Bootrom.. Seeking preloader address..Found @ 0x00200BC4 Starting to dump... Prel Size : 0x0004F77C Successfully dump preloader.. [C:\Hydra Tool\Boot\PreloaderDump\preloader_ch6h_h698.bin] Target config : 00 SBC : 00 (False) SLA : 00 (False) DAA : 00 (False) SWJTAG : 00 (False) EPP : 00 (False) CERT : 00 (False) MEMREAD : 00 (False) MEMWRITE : 00 (False) CMD_C8 : 00 (False) Connection : BROM Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin] Patching da2 ... Ok Uploading Stage 1.... Successfully uploaded stage 1, jumping .. Executing JUMP_DA Address @ 0x00200000 Jumping to 0x00200000 Ok 0xC0 Successfully received DA sync ONNECTION_AGENT : brom DRAM config needed for : 1501004456364441 Sending auto preloader from dump... [preloader_ch6h_h698.bin] Sending emi data.. [DRAM setup passed.] Sending emi data succeeded. Uploading stage 2... Upload data was accepted. Jumping to stage 2... Successfully uploaded stage 2 ERAM Size : 0x0000000000070000-448 KB IRAM Size : 0x0000000100000000-4 GB EMMC Boot1 Size : 0x0000000000400000-4 MB EMMC Boot2 Size : 0x0000000000400000-4 MB EMMC RPMB Size : 0x0000000001000000-16 MB EMMC USER Size : 0x0000001D1EC00000-116.48 GB EMMC CID : 150100445636444142025D1AD381989B - DV6DAB HW-CODE : 0x707 HWSUB-CODE : 0x8A00 HW-VERSION : 0xCA00 SW-VERSION : 0x0 CHIP-EVOLUTION : 0x1 DA-VERSION : 1.0 Speed : high-speed Upload data was accepted. Jumping to stage 2... DA Extensions successfully added Reading Partition Table .. Partition Count : 51 --------------- Reading build.prop content --------------- --------------- end of build.prop content --------------- Reading IMEI........ IMEI1 : 359384********* IMEI2 : 359384********* ------------------------------- Bootloader Status... Bootloader : Locked ------------------------------- Backing up Security.. - preloader(preloader.bin), 512 KB = Ok [preloader_ch6h_h698.bin] *Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0707_71FA65D7F9880FF0D7F9C9C307409D1FE\Auto\072023092992\6768_Android_scatter.txt - pgpt(pgpt.bin), 32 KB = Ok - nvram(nvram.bin), 70 MB = Ok - nvdata(nvdata.bin), 64 MB = Ok - frp(frp.bin), 1024 KB = Ok - protect1(protect1.bin), 8 MB = Ok - protect2(protect2.bin), 14.367 MB = Ok - persist(persist.bin), 48 MB = Ok - proinfo(proinfo.bin), 3 MB = Ok - nvcfg(nvcfg.bin), 32 MB = Ok - sec1(sec1.bin), 2 MB = Ok - seccfg(seccfg.bin), 8 MB = Ok Backup Done!!! Rebooting Device... Reboot Option : OperationDone Rebooting Operation Done!!!! Action Result : Ok Elapsed Time : 00:01:03 |
The Following User Says Thank You to Unlockinfo For This Useful Post: |
07-24-2023, 06:05 | #3244 (permalink) |
No Life Poster Join Date: Jul 2012 Location: GSMFABRICA-Team
Posts: 3,400
Member: 1785930 Status: Offline Sonork: 100.1685640 Thanks Meter: 4,819 | Vivo Y51 2020 (V2030) Pattern and Frp lock remove with Hydra Tool -- first keep press boot info -- phone connect with test point -- Factory Reset/Format Userdata safe format -- click execute Code: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Vivo Service Tool Factory Reset/Format Userdata Safety Erase Tag - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - PreOperation Configuration Brand : VIVO Model : Y51 2020 (V2030) Storage : Auto Loader: vivo_y51_2020.elf Port : Auto Searching for Qualcomm 9008 Device...Found FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM16) SymbolicName :\\?\usb#vid_05c6&pid_9008#5&2a3bd414&0&6#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver :03/19/2014,2.1.1.2 Getting device info. [Connected]..... Serial No.: 0x1D2B2D97 HW_ID : 0010A0E100730003 MSM ID : 0x0010A0E1, SM6125-Qualcomm Snapdragon 665/NicobarPkgLAA MODEL_ID : 0x0003 OEM_ID : 0x0073 - VIVO PBL Ver : 00000000 PK HASH : a7df36ffd7ab557c67a6c26675e2795c922cf671308cfd7169bedb84424c862b Assigned Loader Not Found... Hydra Enable Auto search Firehose.. #Please wait... #Search by filename filter..... #Found 14 Compatible Files ..Found match Firehose... Firehose Loader[0000000000730003_a7df36ffd7ab557c_3227f97c_vivo.fhprg] -------------------------------------------------- Header Type : New TargetMSM : Tag : Version : 6 Code_size : 816 Signature_size : 256 fhVendor : VIVO HW_ID : 0000000000730003 Vendor : VIVO OEM_ID : 0073 MODEL_ID : 0003 SW_ID : 00000003 APP_ID : 00000000 pk_hash : a7df36ffd7ab557c67a6c26675e2795c922cf671308cfd7169bedb84424c862bc7b646907dd79989578590fb6370a940 OEM_VERSION : compiler02024095 IMAGE_VARIANT : NicobarPkgLAA QC_VERSION : BOOT.XF.4.0-00210-NICOBARLAZ-1 -------------------------------------------------- SaharaBoot... Ok Sending ..............................Ok Connecting to Firehose... Ping..................... Ok Configuration[FHProt_Auto]........ Identifying Chip........UFS Ok Chip Configuration : MemoryName : UFS MaxPayloadSizeToTargetInBytes : 1048576 MaxPayloadSizeToTargetInBytesSupported : 1048576 MaxPayloadSizeFromTargetInBytes : MaxXMLSizeInBytes : 4096 TargetName : Version : 1 DateTime : Sep 9 2020 - 00:57:45 *** STORAGE DEVICE INFO *** Memory Type : UFS Block Size in Bytes : 4096 Page Size : 4096 Manufacturer ID : 300 Serial Number : 1129467726 Firmware Version : 109 Product Name : MT128GASAO4U21 0109 Physical Partitions : 6 Total Logical Blocks: Drive [0] 30955520[118.086 GB] Drive [1] 2048[8 MB] Drive [2] 2048[8 MB] Drive [3] 8192[32 MB] Drive [4] 262144[1024 MB] Drive [5] 8192[32 MB] Protocol : Universal Running : Ok Reading GPT[6] Drive [0] 32 Items Drive [1] 32 Items Drive [2] 32 Items Drive [3] 32 Items Drive [4] 64 Items Drive [5] 32 Items --------------- Reading build.prop content --------------- build.prop system build.prop ID : QP1A.190711.020 SDK : 29 Release : 10 ABI : arm64-v8a CPU abilist : arm64-v8a,armeabi-v7a,armeabi Locale : en-US Security Patch : 2022-09-01 Fingerprint : vivo/1920V/1920:10/QP1A.190711.020/compiler09051032:user/release-keys --------------- end of build.prop content --------------- Auto Backup Security partitions... Reading Security Items.... - modemst1(modemst1.bin), 1.996 MB = Ok - modemst2(modemst2.bin), 1.996 MB = Ok - fsg(fsg.bin), 1.996 MB = Ok - fsc(fsc.bin), 124 KB = Ok - persist(persist.bin), 31.996 MB = Ok C:\Hydra Tool\Backup\QUALBackup\VIVO\0010A0E100731003_1D2B2D97\Auto_Backup\072123173001 Backup Security Success.... Processing Safe Format New - UFS.... - Formatting Userdata [Safe Format - UFS] Ok Rebooting Phone.... Ok Action Result : Ok Elapsed Time : 00:00:19 -- select frp lock remove -- force erase and click execute Code: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Vivo Service Tool Factory Reset Protection(FRP)/Demo Remove Forced Erase - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - PreOperation Configuration Brand : VIVO Model : Y51 2020 (V2030) Storage : Auto Loader: c:\hydra tool\boot\hfirehose\0000000000730003_a7df36ffd7ab557c_3227f97c_vivo.fhprg Port : Auto Searching for Qualcomm 9008 Device...Found FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM16) SymbolicName :\\?\usb#vid_05c6&pid_9008#5&2a3bd414&0&6#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver :03/19/2014,2.1.1.2 Getting device info. [Connected]..... Serial No.: 0x1D2B2D97 HW_ID : 0010A0E100730003 MSM ID : 0x0010A0E1, SM6125-Qualcomm Snapdragon 665/NicobarPkgLAA MODEL_ID : 0x0003 OEM_ID : 0x0073 - VIVO PBL Ver : 00000000 PK HASH : a7df36ffd7ab557c67a6c26675e2795c922cf671308cfd7169bedb84424c862b Assigned Loader Not Found... Hydra Enable Auto search Firehose.. #Please wait... #Search by filename filter..... #Found 14 Compatible Files ..Found match Firehose... Firehose Loader[0000000000730003_a7df36ffd7ab557c_3227f97c_vivo.fhprg] -------------------------------------------------- Header Type : New TargetMSM : Tag : Version : 6 Code_size : 816 Signature_size : 256 fhVendor : VIVO HW_ID : 0000000000730003 Vendor : VIVO OEM_ID : 0073 MODEL_ID : 0003 SW_ID : 00000003 APP_ID : 00000000 pk_hash : a7df36ffd7ab557c67a6c26675e2795c922cf671308cfd7169bedb84424c862bc7b646907dd79989578590fb6370a940 OEM_VERSION : compiler02024095 IMAGE_VARIANT : NicobarPkgLAA QC_VERSION : BOOT.XF.4.0-00210-NICOBARLAZ-1 -------------------------------------------------- SaharaBoot... Ok Sending ..............................Ok Connecting to Firehose... Ping..................... Ok Configuration[FHProt_Auto]........ Ok Chip Configuration : MemoryName : UFS MaxPayloadSizeToTargetInBytes : 1048576 MaxPayloadSizeToTargetInBytesSupported : 1048576 MaxPayloadSizeFromTargetInBytes : MaxXMLSizeInBytes : 4096 TargetName : Version : 1 DateTime : Sep 9 2020 - 00:57:45 *** STORAGE DEVICE INFO *** Memory Type : UFS Block Size in Bytes : 4096 Page Size : 4096 Manufacturer ID : 300 Serial Number : 1129467726 Firmware Version : 109 Product Name : MT128GASAO4U21 0109 Physical Partitions : 6 Total Logical Blocks: Drive [0] 30955520[118.086 GB] Drive [1] 2048[8 MB] Drive [2] 2048[8 MB] Drive [3] 8192[32 MB] Drive [4] 262144[1024 MB] Drive [5] 8192[32 MB] Protocol : Universal Running : Ok Reading GPT[6] Drive [0] 32 Items Drive [1] 32 Items Drive [2] 32 Items Drive [3] 32 Items Drive [4] 64 Items Drive [5] 32 Items --------------- Reading build.prop content --------------- build.prop system build.prop ID : QP1A.190711.020 SDK : 29 Release : 10 ABI : arm64-v8a CPU abilist : arm64-v8a,armeabi-v7a,armeabi Locale : en-US Security Patch : 2022-09-01 Fingerprint : vivo/1920V/1920:10/QP1A.190711.020/compiler09051032:user/release-keys --------------- end of build.prop content --------------- Auto Backup Security partitions... Reading Security Items.... - modemst1(modemst1.bin), 1.996 MB = Ok - modemst2(modemst2.bin), 1.996 MB = Ok - fsg(fsg.bin), 1.996 MB = Ok - fsc(fsc.bin), 124 KB = Ok - persist(persist.bin), 31.996 MB = Ok C:\Hydra Tool\Backup\QUALBackup\VIVO\0010A0E144730003_1D2B2D97\Auto_Backup\072423173502 Backup Security Success.... Rebooting Phone.... Ok Action Result : Ok Elapsed Time : 00:00:19 |
The Following User Says Thank You to Unlockinfo For This Useful Post: |
07-24-2023, 06:08 | #3245 (permalink) |
No Life Poster Join Date: Jul 2012 Location: GSMFABRICA-Team
Posts: 3,400
Member: 1785930 Status: Offline Sonork: 100.1685640 Thanks Meter: 4,819 | Vivo Y83 Pro (PD1803F) Factoy Reset by MetaMode with Hdyra Tool - Reboot phone meta mode Code: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Reboot Function... - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Searching for MTK Device...Found MTK Port Type : Flashmode Preloader FriendlyName : MediaTek PreLoader USB VCOM_V1633 (Android) (COM30) Device : /6&1afede88&0&3 SymbolicName : \\?\usb#vid_0e8d&pid_2000#6&1afede88&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver : 01/22/2015,3.0.1504.0 Service : wdm_usb Openning Port [COM30] Ok Rebooting phone SWITCH TO : META MODE Done!!! Elapsed Time : 00:00:03 - Factory reset phone with metamode Code: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Service Function Format/Factory Reset/ScreenLock Factory Reset UFS 1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Searching for MTK Device...Found MTK Port Type : METAMODE Preloader FriendlyName : MediaTek USB VCOM (Android) (COM31) Device : VID_0E8D&PID_2007/6&1afede88&0&3 SymbolicName : \??\USB#VID_0E8D&PID_2007#6&1afede88&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver : 01/22/2015,3.0.1504.0 Service : wdm_usb Openning Port [COM31] Ok META Phone Info . . . MCUID: 8U ` mt6765,S01 ME_SO: S01 DATE : MODEL: ME_SWVER: alps-mp-o1.mp6.tc19sp-V2_k62v1.64.bsp_P293 Rebooting phone Reboot Done!!! Action Result : Ok Elapsed Time : 00:00:10 |
The Following User Says Thank You to Unlockinfo For This Useful Post: |
07-25-2023, 06:40 | #3246 (permalink) |
No Life Poster Join Date: Jul 2012 Location: GSMFABRICA-Team
Posts: 3,400
Member: 1785930 Status: Offline Sonork: 100.1685640 Thanks Meter: 4,819 | Oppo Reno 3 (CPH2043) FRP Lock Remove with Hydra Tool - keep press boot info Code: ------------------------------------------------------- To Enable BROM Mode : Method 1 - Bootkey (Vol + - Power) or any combination Method 2 - Enable Preloader to brom(crashing Method) Method 3 - Test Point Data0 + ground To Enable Preloader Mode : Method 1 - Just Insert cable ------------------------------------------------------- Searching for MTK Device...Found MTK Port Type : Flashmode BROM FriendlyName : MediaTek USB Port_V1632 (COM38) Device : /6&36559b33&0&3 SymbolicName : \\?\usb#vid_0e8d&pid_0003#6&36559b33&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver : 01/22/2015,3.0.1504.0 Service : wdm_usb Openning Port [COM38] Ok Handshaking...Ok HwCode : 0725 {MT6779} Hwver : 0000 Target config : E5 SBC : 01 (True) SLA : 00 (False) DAA : 04 (True) SWJTAG : 04 (True) EPP : 00 (False) CERT : 00 (False) MEMREAD : 20 (True) MEMWRITE : 40 (True) CMD_C8 : 80 (True) Connection : BROM HW Subcode : 8A00 HW Subcode : CA01 SW Ver : 0000 ME_ID : 2A2E3853A31B55A18D455DC262A9E685 SOC_ID : 83CCB0047AAC3A98CCF0016D67A487A14AE64148A58601EC1B9F161FECB50C82 Exploiting Device... Successfully Exploited.. Handshaking...Ok Dumping Preloader from Bootrom.. Seeking preloader address..Found @ 0x00200BC4 Starting to dump... Prel Size : 0x00054914 Successfully dump preloader.. [C:\Hydra Tool\Boot\PreloaderDump\preloader_k79v1_64.bin] Target config : 00 SBC : 00 (False) SLA : 00 (False) DAA : 00 (False) SWJTAG : 00 (False) EPP : 00 (False) CERT : 00 (False) MEMREAD : 00 (False) MEMWRITE : 00 (False) CMD_C8 : 00 (False) Connection : BROM Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin] Patching da2 ... Ok Uploading Stage 1.... Successfully uploaded stage 1, jumping .. Executing JUMP_DA Address @ 0x00200000 Jumping to 0x00200000 Ok 0xC0 Successfully received DA sync ONNECTION_AGENT : brom DRAM config needed for : 4B4D3856383030314A4D2D4238313300 Sending auto preloader from dump... [preloader_k79v1_64.bin] Sending emi data.. [DRAM setup passed.] Sending emi data succeeded. Uploading stage 2... Upload data was accepted. Jumping to stage 2... Successfully uploaded stage 2 ERAM Size : 0x0000000000080000-512 KB IRAM Size : 0x0000000200000000-8 GB UFS MID : 0x4B UFS FWVer : 0x1000 UFS Blocksize : 0x0000000000001000-4 KB UFS LU0 Size : 0x0000000000400000-4 MB UFS LU1 Size : 0x0000000000400000-4 MB UFS LU2 Size : 0x0000001DCB000000-119.172 GB UFS ID : 8 UFS CID : 4B4D3856383030314A4D2D423831330000000000 HW-CODE : 0x725 HWSUB-CODE : 0x8A00 HW-VERSION : 0xCA01 SW-VERSION : 0x0 CHIP-EVOLUTION : 0x0 DA-VERSION : 1.0 Speed : high-speed Upload data was accepted. Jumping to stage 2... DA Extensions successfully added Reading Partition Table .. Partition Count : 55 --------------- Reading build.prop content --------------- Unable to read system info.. --------------- end of build.prop content --------------- Reading IMEI........ ------------------------------- Bootloader Status... Bootloader : Locked ------------------------------- Backing up Security.. - preloader(preloader.bin), 512 KB = Ok [preloader_k79v1_64.bin] *Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0725_2A2E3853AACC##B55A18D455DC262A9E685\Auto\072023154815\6779_Android_scatter.txt - pgpt(pgpt.bin), 32 KB = Ok - nvram(nvram.bin), 64 MB = Ok - nvdata(nvdata.bin), 64 MB = Ok - frp(frp.bin), 1024 KB = Ok - protect1(protect1.bin), 8.969 MB = Ok - protect2(protect2.bin), 8 MB = Ok - persist(persist.bin), 55.5 MB = Ok - proinfo(proinfo.bin), 3 MB = Ok - oppo_custom(oppo_custom.bin), 1024 KB = Ok - opporeserve1(opporeserve1.bin), 8 MB = Ok - opporeserve2(opporeserve2.bin), 64 MB = Ok - nvcfg(nvcfg.bin), 32 MB = Ok - sec1(sec1.bin), 2 MB = Ok - seccfg(seccfg.bin), 512 KB = Ok - lk(lk.bin), 5 MB = Ok Backup Done!!! Elapsed Time : 00:01:46 - Remove frp lock Code: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Service Function Factory Reset Protection[FRP] Auto - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Searching for MTK Device...Found MTK Port Type : Flashmode BROM FriendlyName : MediaTek USB Port_V1632 (COM38) Device : /6&36559b33&0&3 SymbolicName : \\?\usb#vid_0e8d&pid_0003#6&36559b33&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver : 01/22/2015,3.0.1504.0 Service : wdm_usb Openning Port [COM38] Ok Reading Partition Table .. ERAM Size : 0x0000000000080000-512 KB IRAM Size : 0x0000000200000000-8 GB UFS MID : 0x4B UFS FWVer : 0x1000 UFS Blocksize : 0x0000000000001000-4 KB UFS LU0 Size : 0x0000000000400000-4 MB UFS LU1 Size : 0x0000000000400000-4 MB UFS LU2 Size : 0x0000001DCB000000-119.172 GB UFS ID : 8 UFS CID : 4B4D3856383030314A4D2D423831330000000000 HW-CODE : 0x725 HWSUB-CODE : 0x8A00 HW-VERSION : 0xCA01 SW-VERSION : 0x0 CHIP-EVOLUTION : 0x0 DA-VERSION : 1.0 Speed : high-speed Partition Count : 55 --------------- Reading build.prop content --------------- Unable to read system info.. --------------- end of build.prop content --------------- Reading IMEI........ ------------------------------- Bootloader Status... Bootloader : Locked ------------------------------- Rebooting Device... Reboot Option : RebootToNormal Rebooting Operation Done!!!! Action Result : Ok Elapsed Time : 00:00:23 |
The Following User Says Thank You to Unlockinfo For This Useful Post: |
07-25-2023, 06:43 | #3247 (permalink) |
No Life Poster Join Date: Jul 2012 Location: GSMFABRICA-Team
Posts: 3,400
Member: 1785930 Status: Offline Sonork: 100.1685640 Thanks Meter: 4,819 | Redmi 7A (pine) Mi Account Remove with Hydra Tool - keep press boot info Code: PreOperation Configuration Brand : XIAOMI Model : Redmi 7A (pine) Storage : Auto Loader: 000BF0E100720000_57158eaf1814d78f_e551cac5_XIAOMI_auth_peek_8937.fhprg Port : Auto Searching for Qualcomm 9008 Device...Found FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM10) SymbolicName :\\?\usb#vid_05c6&pid_9008#7&30cfde48&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver :03/25/2016,2.1.2.2 Getting device info. [Connected]..... Serial No.: 0x6C9D2F61 HW_ID : 000BF0E100720000 MSM ID : 0x000BF0E1, SDM439-Qualcomm Snapdragon 439/FAADANAZA MODEL_ID : 0x0000 OEM_ID : 0x0072 - XIAOMI PBL Ver : 00000000 PK HASH : 57158eaf1814d78fd2b3105ece4db18a817a08ac664a5782a925f3ff8403d39a Firehose Loader[000BF0E100720000_57158eaf1814d78f_e551cac5_XIAOMI_auth_peek_8937.fhprg] -------------------------------------------------- Header Type : OLD TargetMSM : 8937 Tag : _auth_peek Version : 3 Code_size : 320 Signature_size : 256 fhVendor : XIAOMI HW_ID : 000BF0E100720000 Vendor : XIAOMI OEM_ID : 0072 MODEL_ID : 0000 SW_ID : 0000000100000003 APP_ID : pk_hash : 57158eaf1814d78fd2b3105ece4db18a817a08ac664a5782a925f3ff8403d39a OEM_VERSION : c4-miui-ota-bd104.bj IMAGE_VARIANT : FAADANAZA QC_VERSION : BOOT.BF.3.3.2-00073 -------------------------------------------------- SaharaBoot... Ok Sending .......................Ok Connecting to Firehose... Ping... Ok Configuration[FHProt_Auto]. Xiaomi Authentication needed... Signature Request -> bob[tHIcqS9vSk7BNoMAWbTz1InesQt] Signature @256bytes Authentication.... Accepted...... Identifying Chip.... Ok Chip Configuration : MemoryName : eMMC MaxPayloadSizeToTargetInBytes : 1048576 MaxPayloadSizeToTargetInBytesSupported : 1048576 MaxPayloadSizeFromTargetInBytes : 4096 MaxXMLSizeInBytes : 4096 TargetName : 8937 Version : 1 *** STORAGE DEVICE INFO *** Memory Type : eMMC Block Size in Bytes : 512 Page Size : 512 Manufacturer ID : 21 Serial Number : 400805921 Firmware Version : 4 Product Name : QD63MB Physical Partitions : 3 Total Logical Blocks: Drive [0] 61071360[29.121 GB] Drive [1] 8192[4 MB] Drive [2] 8192[4 MB] Protocol : Universal Running : Ok Reading GPT[3] Drive [0] 60 Items Drive [1] 0 Items Drive [2] 0 Items --------------- Reading build.prop content --------------- build.prop system build.prop ID : QKQ1.191014.001 SDK : 29 Release : 10 ABI : armeabi-v7a CPU abilist : armeabi-v7a,armeabi Locale : en-GB Security Patch : 2021-11-01 --------------- end of build.prop content --------------- Auto Backup Security partitions... Reading Security Items.... - modemst1(modemst1.bin), 8 MB = Ok - modemst2(modemst2.bin), 8 MB = Ok - fsg(fsg.bin), 8 MB = Ok - fsc(fsc.bin), 7.5 KB = Ok - persist(persist.bin), 32 MB = Ok C:\Hydra Tool\Backup\QUALBackup\XIAOMI\000BF0E1EE20000_6C9D2F61\Auto_Backup\0720222195247 Backup Security Success.... Elapsed Time : 00:02:07 - Remove mi account Code: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Xiaomi Tool Mi Account Remove MiAccount[New Method] - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - PreOperation Configuration Brand : XIAOMI Model : Redmi 7A (pine) Storage : Auto Loader: 000BF0E100720000_57158eaf1814d78f_e551cac5_XIAOMI_auth_peek_8937.fhprg Port : Auto Searching for Qualcomm 9008 Device...Found FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM10) SymbolicName :\\?\usb#vid_05c6&pid_9008#7&30cfde48&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver :03/25/2016,2.1.2.2 Getting device info. [Connected]..... Serial No.: 0x6C9D2F61 HW_ID : 000BF0E100720000 MSM ID : 0x000BF0E1, SDM439-Qualcomm Snapdragon 439/FAADANAZA MODEL_ID : 0x0000 OEM_ID : 0x0072 - XIAOMI PBL Ver : 00000000 PK HASH : 57158eaf1814d78fd2b3105ece4db18a817a08ac664a5782a925f3ff8403d39a Firehose Loader[000BF0E100720000_57158eaf1814d78f_e551cac5_XIAOMI_auth_peek_8937.fhprg] -------------------------------------------------- Header Type : OLD TargetMSM : 8937 Tag : _auth_peek Version : 3 Code_size : 320 Signature_size : 256 fhVendor : XIAOMI HW_ID : 000BF0E100720000 Vendor : XIAOMI OEM_ID : 0072 MODEL_ID : 0000 SW_ID : 0000000100000003 APP_ID : pk_hash : 57158eaf1814d78fd2b3105ece4db18a817a08ac664a5782a925f3ff8403d39a OEM_VERSION : c4-miui-ota-bd104.bj IMAGE_VARIANT : FAADANAZA QC_VERSION : BOOT.BF.3.3.2-00073 -------------------------------------------------- SaharaBoot... Ok Sending .......................Ok Connecting to Firehose... Ping... Ok Configuration[FHProt_Auto]. Xiaomi Authentication needed... Signature Request -> bob[mk0Yyp5GlsfZU9u300 Signature @256bytes Authentication.... Accepted...... Ok Chip Configuration : MemoryName : eMMC MaxPayloadSizeToTargetInBytes : 1048576 MaxPayloadSizeToTargetInBytesSupported : 1048576 MaxPayloadSizeFromTargetInBytes : 4096 MaxXMLSizeInBytes : 4096 TargetName : 8937 Version : 1 *** STORAGE DEVICE INFO *** Memory Type : eMMC Block Size in Bytes : 512 Page Size : 512 Manufacturer ID : 21 Serial Number : 400805921 Firmware Version : 4 Product Name : QD63MB Physical Partitions : 3 Total Logical Blocks: Drive [0] 61071360[29.121 GB] Drive [1] 8192[4 MB] Drive [2] 8192[4 MB] Protocol : Universal Running : Ok Reading GPT[3] Drive [0] 60 Items Drive [1] 0 Items Drive [2] 0 Items --------------- Reading build.prop content --------------- build.prop system build.prop ID : QKQ1.191014.001 SDK : 29 Release : 10 ABI : armeabi-v7a CPU abilist : armeabi-v7a,armeabi Locale : en-GB Security Patch : 2021-11-01 --------------- end of build.prop content --------------- Auto Backup Security partitions... Reading Security Items.... - modemst1(modemst1.bin), 8 MB = Ok - modemst2(modemst2.bin), 8 MB = Ok - fsg(fsg.bin), 8 MB = Ok - fsc(fsc.bin), 7.5 KB = Ok - persist(persist.bin), 32 MB = Ok C:\Hydra Tool\Backup\QUALBackup\XIAOMI\000BF0E100720000_6C9D2F61\Auto_Backup\072023195429 Backup Security Success.... Reading GPT[3] Drive [0] 60 Items Drive [1] 0 Items Drive [2] 0 Items Backing up Partition for safety...Ok Scanning Patching address... > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED]Done!! Total Items patched : 74 Successfully patched address.. Action Result : Ok Elapsed Time : 00:01:34 |
The Following User Says Thank You to Unlockinfo For This Useful Post: |
07-25-2023, 06:46 | #3248 (permalink) |
No Life Poster Join Date: Jul 2012 Location: GSMFABRICA-Team
Posts: 3,400
Member: 1785930 Status: Offline Sonork: 100.1685640 Thanks Meter: 4,819 | Samsung A03s (SM-A037G) FRP Lock Remove with Hydra Tool - First keep press boot info Code: ------------------------------------------------------- To Enable BROM Mode : Method 1 - Bootkey (Vol + - Power) or any combination Method 2 - Enable Preloader to brom(crashing Method) Method 3 - Test Point Data0 + ground To Enable Preloader Mode : Method 1 - Just Insert cable ------------------------------------------------------- Searching for MTK Device...Found MTK Port Type : Flashmode Preloader FriendlyName : MediaTek PreLoader USB VCOM_V1632 (Android) (COM43) Device : /6&3a34e632&0&1 SymbolicName : \\?\usb#vid_0e8d&pid_2000#6&3a34e632&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver : 01/22/2015,3.0.1504.0 Service : wdm_usb Openning Port [COM43] Ok Handshaking...Ok HwCode : 0766 {MT6765/MT8768t} Hwver : 0000 Target config : 05 SBC : 01 (True) SLA : 00 (False) DAA : 04 (True) SWJTAG : 04 (True) EPP : 00 (False) CERT : 00 (False) MEMREAD : 00 (False) MEMWRITE : 00 (False) CMD_C8 : 00 (False) Connection : Preloader HW Subcode : 8A00 HW Subcode : CA00 SW Ver : 0000 ME_ID : 8AAB7E87A4E957A81EE459248D550FE5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Preloader To Brom Function..... - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Method 1 Exploit Executed..... [Successfully Crash Preloader.] Device now is BROM Port Device not yet filterd... Executing LibUSB Filter.. Device Now Filtered...Restarting Device Port.. Openning Port [COM57] Ok Exploiting Device... Successfully Exploited.. Handshaking...Ok Dumping Preloader from Bootrom.. Seeking preloader address..Found @ 0x00200BC4 Starting to dump... Prel Size : 0x0003DFA8 Successfully dump preloader.. [C:\Hydra Tool\Boot\PreloaderDump\preloader_hs03s.bin] Target config : 00 SBC : 00 (False) SLA : 00 (False) DAA : 00 (False) SWJTAG : 00 (False) EPP : 00 (False) CERT : 00 (False) MEMREAD : 00 (False) MEMWRITE : 00 (False) CMD_C8 : 00 (False) Connection : BROM Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin] Patching da2 ... Ok Uploading Stage 1.... Successfully uploaded stage 1, jumping .. Executing JUMP_DA Address @ 0x00200000 Jumping to 0x00200000 Ok 0xC0 Successfully received DA sync ONNECTION_AGENT : brom DRAM config needed for : 1501004758364241 Sending auto preloader from dump... [preloader_hs03s.bin] Sending emi data.. [DRAM setup passed.] Sending emi data succeeded. Uploading stage 2... Upload data was accepted. Jumping to stage 2... Successfully uploaded stage 2 ERAM Size : 0x000000000003A000-232 KB IRAM Size : 0x00000000C0000000-3 GB EMMC Boot1 Size : 0x0000000000400000-4 MB EMMC Boot2 Size : 0x0000000000400000-4 MB EMMC RPMB Size : 0x0000000001000000-16 MB EMMC USER Size : 0x0000000747C00000-29.121 GB EMMC CID : 15010047583642414200AF5F9B3A481B - GX6BAB HW-CODE : 0x766 HWSUB-CODE : 0x8A00 HW-VERSION : 0xCA00 SW-VERSION : 0x0 CHIP-EVOLUTION : 0x0 DA-VERSION : 1.0 Speed : high-speed Upload data was accepted. Jumping to stage 2... DA Extensions successfully added Reading Partition Table .. Partition Count : 52 --------------- Reading build.prop content --------------- Product : a03s ID : TP1A.220624.014 SDK : 33 Release : 13 ABI : arm64-v8a Locale : en-GB Description : a03snsxx-user 13 TP1A.220624.014 A037GXXS2CWA3 release-keys Display ID : TP1A.220624.014.A037GXXS2CWA3 Security Patch : 2023-01-01 StorageType : mtp --------------- end of build.prop content --------------- Reading IMEI........ IMEI1 : 1F6FF*********** IMEI2 : 6A3C4*********** ------------------------------- Bootloader Status... Bootloader : Locked ------------------------------- Backing up Security.. - preloader(preloader.bin), 512 KB = Ok [preloader_hs03s.bin] *Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0766_8AAB7EEE$$57A81EE459248D550FE5\Auto\072023090950\6765_Android_scatter.txt - pgpt(pgpt.bin), 4 MB = Ok - nvram(nvram.bin), 64 MB = Ok - nvdata(nvdata.bin), 64 MB = Ok - frp(frp.bin), 1024 KB = Ok - persistent(persistent.bin), 512 KB = Ok - protect1(protect1.bin), 8 MB = Ok - protect2(protect2.bin), 8 MB = Ok - persist(persist.bin), 48 MB = Ok - proinfo(proinfo.bin), 3 MB = Ok - nvcfg(nvcfg.bin), 32 MB = Ok - sec1(sec1.bin), 8 MB = Ok - seccfg(seccfg.bin), 8 MB = Ok - lk(lk.bin), 2 MB = Ok Backup Done!!! Elapsed Time : 00:00:46 - Remove FRP Lock Code: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Service Function Factory Reset Protection[FRP] Auto - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Searching for MTK Device...Found MTK Port Type : Flashmode BROM FriendlyName : MediaTek USB Port_V1632 (COM57) Device : /6&3a34e632&0&1 SymbolicName : \\?\usb#vid_0e8d&pid_0003#6&3a34e632&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver : 01/22/2015,3.0.1504.0 Service : wdm_usb Openning Port [COM57] Ok Reading Partition Table .. ERAM Size : 0x000000000003A000-232 KB IRAM Size : 0x00000000C0000000-3 GB EMMC Boot1 Size : 0x0000000000400000-4 MB EMMC Boot2 Size : 0x0000000000400000-4 MB EMMC RPMB Size : 0x0000000001000000-16 MB EMMC USER Size : 0x0000000747C00000-29.121 GB EMMC CID : 15010047583642414200AF5F9B3A481B - GX6BAB HW-CODE : 0x766 HWSUB-CODE : 0x8A00 HW-VERSION : 0xCA00 SW-VERSION : 0x0 CHIP-EVOLUTION : 0x0 DA-VERSION : 1.0 Speed : high-speed Partition Count : 52 --------------- Reading build.prop content --------------- Product : a03s ID : TP1A.220624.014 SDK : 33 Release : 13 ABI : arm64-v8a Locale : en-GB Description : a03snsxx-user 13 TP1A.220624.014 A037GXXS2CWA3 release-keys Display ID : TP1A.220624.014.A037GXXS2CWA3 Security Patch : 2023-01-01 StorageType : mtp --------------- end of build.prop content --------------- Reading IMEI........ IMEI1 : 1F6FF8********* IMEI2 : 6A3C44********* ------------------------------- Bootloader Status... Bootloader : Locked ------------------------------- Rebooting Device... Reboot Option : RebootToNormal Rebooting Operation Done!!!! Action Result : Ok Elapsed Time : 00:00:08 |
The Following User Says Thank You to Unlockinfo For This Useful Post: |
07-25-2023, 06:50 | #3249 (permalink) |
No Life Poster Join Date: Jul 2012 Location: GSMFABRICA-Team
Posts: 3,400
Member: 1785930 Status: Offline Sonork: 100.1685640 Thanks Meter: 4,819 | Tecno Pop 5 FRP Lock Remove with Hydra Tool - First Keep press Boot Info Code: ------------------------------------------------------- To Enable BROM Mode : Method 1 - Bootkey (Vol + - Power) or any combination Method 2 - Enable Preloader to brom(crashing Method) Method 3 - Test Point Data0 + ground To Enable Preloader Mode : Method 1 - Just Insert cable ------------------------------------------------------- Searching for MTK Device...Found MTK Port Type : Flashmode BROM FriendlyName : MediaTek USB Port_V1633 (COM7) Device : /5&15c311e1&0&6 SymbolicName : \\?\usb#vid_0e8d&pid_0003#5&15c311e1&0&6#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver : 01/22/2015,3.0.1504.0 Service : wdm_usb Openning Port [COM7] Ok Handshaking...Ok HwCode : 6580 {MT6580} Hwver : 0000 Target config : 05 SBC : 01 (True) SLA : 00 (False) DAA : 04 (True) SWJTAG : 04 (True) EPP : 00 (False) CERT : 00 (False) MEMREAD : 00 (False) MEMWRITE : 00 (False) CMD_C8 : 00 (False) Connection : BROM HW Subcode : 8A00 HW Subcode : CA00 SW Ver : 0000 ME_ID : C4B49E627088DC4B014245EE84E9B4A4 Exploiting Device... Successfully Exploited.. Handshaking...Ok Dumping Preloader from Bootrom.. Seeking preloader address..Found @ 0x00200B40 Starting to dump... Prel Size : 0x0001E6F8 Successfully dump preloader.. [C:\Hydra Tool\Boot\PreloaderDump\preloader_k80_bsp.bin] Target config : 00 SBC : 00 (False) SLA : 00 (False) DAA : 00 (False) SWJTAG : 00 (False) EPP : 00 (False) CERT : 00 (False) MEMREAD : 00 (False) MEMWRITE : 00 (False) CMD_C8 : 00 (False) Connection : BROM Uploading legacy da... DA :MTK_AllInOne_DA_5.2152.bin Legacy DA2 Patched.. Legacy DA2 CMD F0 is patched. Successfully uploaded stage 1, jumping .. Executing JUMP_DA Address @ 0x00200000 Jumping to 0x00200000 Ok Got loader sync ! Reading Nand Info.. Reading EMMC Info EMMC_INFO : 0x00000000 Uploading Stage 2 DRAM config needed for : 51000115413336587DEE034271982ECA Reading dram nand info ... Sending dram info ... RAM-Length: BC000000 5A Successfully upload stage 2 Flash and ram info..... m_int_sram_ret : 0x00000000 m_ext_ram_ret : 0x00000000 m_ext_ram_type : 0x02 m_ext_ram_chip_select : 0x00 m_int_sram_ret : 0x00000000 m_ext_ram_size : 0x0000000080000000-2 GB Randomid : 0xEEE0A041D2C130894F2BFD9D0FF66A6D m_emmc_ret : 0x00000000 m_emmc_boot1_size : 0x0000000000400000-4 MB m_emmc_boot2_size : 0x0000000000400000-4 MB m_emmc_rpmb_size : 0x0000000000400000-4 MB m_emmc_gp_size[0] : 0x0000000000000000-0 Bytes m_emmc_gp_size[1] : 0x0000000000000000-0 Bytes m_emmc_gp_size[2] : 0x0000000000000000-0 Bytes m_emmc_gp_size[3] : 0x0000000000000000-0 Bytes m_emmc_ua_size : 0x0000000747C00000-29.121 GB CID : 51000115413336587DEE034271982ECA Checking Connection Speed.. Configuration HighSpeed Switch : True Full Speed Detected.. Switching To High Speed... Connected to preloader... Reconnecting to preloader... Reading Partition Table .. Partition Count : 37 Reading IMEI........ IMEI Info.... IMEI1 : 353800******** IMEI2 : 353800******** ------------------------------- Bootloader Status... Bootloader : Locked ------------------------------- Backing up Security.. - preloader(preloader.bin), 512 KB = Ok [preloader_k80_bsp.bin] *Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\6580_C4B49E6270844KJ014245EE84E9B4A4\Auto\072023147770726\6580_Android_scatter.txt - pgpt(pgpt.bin), 512 KB = Ok - nvram(nvram.bin), 5 MB = Ok - nvdata(nvdata.bin), 32 MB = Ok - frp(frp.bin), 1024 KB = Ok - protect1(protect1.bin), 10 MB = Ok - protect2(protect2.bin), 10 MB = Ok - persist(persist.bin), 48 MB = Ok - proinfo(proinfo.bin), 3 MB = Ok - seccfg(seccfg.bin), 256 KB = Ok Backup Done!!! Elapsed Time : 00:01:15 - FRP Lock Remove Code: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Service Function Factory Reset Protection[FRP] Auto - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Searching for MTK Device...Found MTK Port Type : Flashmode Preloader FriendlyName : MediaTek DA USB VCOM (Android) (COM25) Device : /5&15c311e1&0&6 SymbolicName : \\?\usb#vid_0e8d&pid_2001#5&15c311e1&0&6#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver : 01/22/2015,3.0.1504.0 Service : wdm_usb Openning Port [COM25] Ok Reading Partition Table .. Partition Count : 37 Reading IMEI........ IMEI Info.... IMEI1 : 353800********* IMEI2 : 353800********* ------------------------------- Bootloader Status... Bootloader : Locked ------------------------------- Rebooting Device... Reboot Option : RebootToNormal Rebooting Operation Done!!!! Action Result : Ok Elapsed Time : 00:00:06 |
The Following User Says Thank You to Unlockinfo For This Useful Post: |
07-25-2023, 06:54 | #3250 (permalink) |
No Life Poster Join Date: Jul 2012 Location: GSMFABRICA-Team
Posts: 3,400
Member: 1785930 Status: Offline Sonork: 100.1685640 Thanks Meter: 4,819 | Xiaomi Redmi 9A Mi Account Remove with Hydra Tool - First Keep press Boot Info - Remove mi account new method - click execute Code: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Service Function Xiaomi Remove MiAccount [New Method] - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Searching for MTK Device...Found MTK Port Type Flashmode BROM FriendlyName MediaTek USB Port_V1633 (COM3) Device 5&2f1b43e3&0&1 SymbolicName usb#vid_0e8d&pid_0003#5&2f1b43e3&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver 01222015,3.0.1504.0 Service wdm_usb Openning Port [COM3] Ok Handshaking...Ok HwCode 0766 {MT6765MT8768t} Hwver 0000 Target config E7 SBC 01 (True) SLA 02 (True) DAA 04 (True) SWJTAG 06 (True) EPP 00 (False) CERT 00 (False) MEMREAD 20 (True) MEMWRITE 40 (True) CMD_C8 80 (True) Connection BROM HW Subcode 8A00 HW Subcode CA00 SW Ver 0000 ME_ID 0535D57D6EF57799447C38131582A8FF SOC_ID ED3C81239EF43C25108CB1333F15A1F17901ABEFA61D53DC96E4F7B613A88C58 Exploiting Device... Successfully Exploited.. Handshaking...Ok Dumping Preloader from Bootrom.. Seeking preloader address..Found @ 0x00200BC4 Starting to dump... Prel Size 0x0003B670 Successfully dump preloader.. [CHydra ToolBootPreloaderDumppreloader_k62v1_64_bsp.bin] Target config 00 SBC 00 (False) SLA 00 (False) DAA 00 (False) SWJTAG 00 (False) EPP 00 (False) CERT 00 (False) MEMREAD 00 (False) MEMWRITE 00 (False) CMD_C8 00 (False) Connection BROM Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin] Patching da2 ... Ok Uploading Stage 1.... Successfully uploaded stage 1, jumping .. Executing JUMP_DA Address @ 0x00200000 Jumping to 0x00200000 Ok 0xC0 Successfully received DA sync ONNECTION_AGENT brom DRAM config needed for 9B01005932503033 Sending auto preloader from dump... [preloader_k62v1_64_bsp.bin] Sending emi data.. [DRAM setup passed.] Sending emi data succeeded. Uploading stage 2... Upload data was accepted. Jumping to stage 2... Successfully uploaded stage 2 ERAM Size 0x000000000003A000-232 KB IRAM Size 0x0000000080000000-2 GB EMMC Boot1 Size 0x0000000000400000-4 MB EMMC Boot2 Size 0x0000000000400000-4 MB EMMC RPMB Size 0x0000000001000000-16 MB EMMC USER Size 0x0000000747C00000-29,121 GB EMMC CID 9B010059325030333200E400990B8883 - Y2P032 HW-CODE 0x766 HWSUB-CODE 0x8A00 HW-VERSION 0xCA00 SW-VERSION 0x0 CHIP-EVOLUTION 0x0 DA-VERSION 1.0 Speed high-speed Upload data was accepted. Jumping to stage 2... DA Extensions successfully added Reading Partition Table .. Partition Count 45 --------------- Reading build.prop content --------------- Product dandelion Marketname ro.product.systemRedmi 9A ID QP1A.190711.020 SDK 29 Release 10 ABI armeabi-v7a CPU abilist armeabi-v7a,armeabi Locale en-GB Description dandelion-user 10 QP1A.190711.020 V12.0.20.0.QCDEUXM release-keys Display ID QP1A.190711.020 Security Patch 2022-07-01 StorageType mtp --------------- end of build.prop content --------------- Reading IMEI........ IMEI1 86751********** IMEI2 86751********** ------------------------------- Bootloader Status... Bootloader Locked ------------------------------- Backing up Security.. - preloader(preloader.bin), 512 KB = Ok [preloader_k62v1_64_bsp.bin] Creating Scatter file... CHydra ToolBackupMTKBKUP0766_0535D57D6EF57799447C381344442A8FFAuto0720231916306765_Android_scatter.txt - pgpt(pgpt.bin), 32 KB = Ok - nvram(nvram.bin), 64 MB = Ok - nvdata(nvdata.bin), 64 MB = Ok - frp(frp.bin), 1024 KB = Ok - protect1(protect1.bin), 8 MB = Ok - protect2(protect2.bin), 10,867 MB = Ok - persist(persist.bin), 48 MB = Ok - proinfo(proinfo.bin), 3 MB = Ok - nvcfg(nvcfg.bin), 32 MB = Ok - sec1(sec1.bin), 2 MB = Ok - seccfg(seccfg.bin), 8 MB = Ok - lk(lk.bin), 2 MB = Ok Backup Done!!! ------------------------------ Xiaomi Operation Flash Mode.. ------------------------------ Backing up Security.. persist... Ok vbmeta_system... Ok vbmeta... Ok Patching Persist Scanning Patching address...Please wait... Patching address detected [PATCHED] Patching address detected [PATCHED] Patching address detected [PATCHED] Patching address detected [PATCHED] Patching address detected [PATCHED] Patching address detected [PATCHED] Patching address detected [PATCHED] Patching address detected [PATCHED] Patching address detected [PATCHED] Patching address detected [PATCHED] Patching address detected [PATCHED] Patching address detected [PATCHED] Patching address detected [PATCHED] Patching address detected [PATCHED] Patching address detected [PATCHED] Patching address detected [PATCHED] Patching address detected [PATCHED] Patching address detected [PATCHED] Patching address detected [PATCHED] Total Items patched 19 Successfully patched address.. -persist .....Ok Done Writing... -vbmeta .....Ok Done Writing... -vbmeta_system .....Ok Done Writing... Please wait, processing..... Status Ok Action Result Ok Elapsed Time 001028 |
The Following User Says Thank You to Unlockinfo For This Useful Post: |
07-26-2023, 06:10 | #3251 (permalink) |
No Life Poster Join Date: Jul 2012 Location: GSMFABRICA-Team
Posts: 3,400
Member: 1785930 Status: Offline Sonork: 100.1685640 Thanks Meter: 4,819 | Nokia 2.1 (TA-1080) FRP Lock Remove with Hydra Tool - first keep press boot info Code: PreOperation Configuration Brand : AUTO Model : AUTO Storage : Auto Loader: Auto Port : Auto Searching for Qualcomm 9008 Device...Found FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM35) SymbolicName :\\?\usb#vid_05c6&pid_9008#6&2e01eb57&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver :08/02/2017,2.1.2.7 Getting device info. [Connected]..... Serial No.: 0x5392420A HW_ID : 000560E100000000 MSM ID : 0x000560E1, MSM8917-Qualcomm Snapdragon 425/LAADANAZA MODEL_ID : 0x0000 OEM_ID : 0x0000 - QUALCOMM PBL Ver : 00000000 PK HASH : f5f4192a33b2830974b400119bab728cc9fe911011f928625c2aed0da441ac97 Hydra Enable Auto search Firehose.. #Please wait... #Search by filename filter..... #Found 6 Compatible Files ..Found match Firehose... Firehose Loader[000560e100000000_f5f4192a33b28309_14f05a5c_qualcomm_hmd_peek_8917.fhprg] -------------------------------------------------- Header Type : OLD TargetMSM : 8917 Tag : _peek Version : 3 Code_size : 288 Signature_size : 256 fhVendor : HMD HW_ID : 000560E100000000 Vendor : QUALCOMM OEM_ID : 0000 MODEL_ID : 0000 SW_ID : 0000000000000003 APP_ID : pk_hash : f5f4192a33b2830974b400119bab728cc9fe911011f928625c2aed0da441ac97 OEM_VERSION : cm-build-33 IMAGE_VARIANT : LAADANAZA QC_VERSION : BOOT.BF.3.3-00228 -------------------------------------------------- SaharaBoot... Ok Sending ...................Ok Connecting to Firehose... Ping... Ok Configuration[FHProt_Auto]...... Identifying Chip.... Ok Chip Configuration : MemoryName : eMMC MaxPayloadSizeToTargetInBytes : 1048576 MaxPayloadSizeToTargetInBytesSupported : 1048576 MaxPayloadSizeFromTargetInBytes : 4096 MaxXMLSizeInBytes : 4096 TargetName : 8917 Version : 1 *** STORAGE DEVICE INFO *** Memory Type : eMMC Block Size in Bytes : 512 Page Size : 512 Manufacturer ID : 144 Serial Number : 3262435661 Firmware Version : 165 Product Name : H8G4a2 Physical Partitions : 3 Total Logical Blocks: Drive [0] 15269888[7.281 GB] Drive [1] 8192[4 MB] Drive [2] 8192[4 MB] Protocol : Universal Running : Ok Reading GPT[3] Drive [0] 128 Items Drive [1] 0 Items Drive [2] 0 Items --------------- Reading build.prop content --------------- build.prop Brand : Nokia Vendor : HMD Global Model : Nokia 2.1 2.1 Product : E2M Manufacturer : HMD Global ID : OPM1.171019.019 SDK : 27 Release : 8.1.0 ABI : armeabi-v7a CPU abilist : armeabi-v7a,armeabi Locale : en-GB Description : Dynamo2_00WW-user 8.1.0 OPM1.171019.019 00WW_0_35D release-keys Device : E2M Display ID : 00WW_0_35D Security Patch : 2018-10-05 Fingerprint : Nokia/Dynamo2_00WW/E2M:8.1.0/OPM1.171019.019/00WW_0_35D:user/release-keys --------------- end of build.prop content --------------- Auto Backup Security partitions... Reading Security Items.... - modemst1(modemst1.bin), 1.5 MB = Ok - modemst2(modemst2.bin), 1.5 MB = Ok - fsg(fsg.bin), 1.5 MB = Ok - fsc(fsc.bin), 512 Bytes = Ok - persist(persist.bin), 28 MB = Ok C:\Hydra Tool\Backup\QUALBackup\QUALCOMM\000560E100000000_5392420A\Auto_Backup\072123145311 Backup Security Success.... Elapsed Time : 00:00:47 - FRP Lock Remove Code: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Qualcomm Service Tool Factory Reset Protection Auto - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - PreOperation Configuration Brand : AUTO Model : AUTO Storage : Auto Loader: Auto Port : Auto Searching for Qualcomm 9008 Device...Found FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM35) SymbolicName :\\?\usb#vid_05c6&pid_9008#6&2e01eb57&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver :08/02/2017,2.1.2.7 Getting device info. [Connected].Ok Device MODE : Firehose Connecting to Firehose... Ping.. Ok Configuration[FHProt_Auto]...... Ok Chip Configuration : MemoryName : eMMC MaxPayloadSizeToTargetInBytes : 1048576 MaxPayloadSizeToTargetInBytesSupported : 1048576 MaxPayloadSizeFromTargetInBytes : 4096 MaxXMLSizeInBytes : 4096 TargetName : 8917 Version : 1 *** STORAGE DEVICE INFO *** Memory Type : eMMC Block Size in Bytes : 512 Page Size : 512 Manufacturer ID : 144 Serial Number : 3262435661 Firmware Version : 165 Product Name : H8G4a2 Physical Partitions : 3 Total Logical Blocks: Drive [0] 15269888[7.281 GB] Drive [1] 8192[4 MB] Drive [2] 8192[4 MB] Protocol : Universal Running : Ok Reading GPT[3] Drive [0] 128 Items Drive [1] 0 Items Drive [2] 0 Items --------------- Reading build.prop content --------------- build.prop Brand : Nokia Vendor : HMD Global Model : Nokia 2.1 2.1 Product : E2M Manufacturer : HMD Global ID : OPM1.171019.019 SDK : 27 Release : 8.1.0 ABI : armeabi-v7a CPU abilist : armeabi-v7a,armeabi Locale : en-GB Description : Dynamo2_00WW-user 8.1.0 OPM1.171019.019 00WW_0_35D release-keys Device : E2M Display ID : 00WW_0_35D Security Patch : 2018-10-05 Fingerprint : Nokia/Dynamo2_00WW/E2M:8.1.0/OPM1.171019.019/00WW_0_35D:user/release-keys --------------- end of build.prop content --------------- - Removing FRP Executing ... - Removing FRP [Zero Wipe] OkOk Rebooting Phone.... Ok Action Result : Ok Elapsed Time : 00:00:09 |
The Following User Says Thank You to Unlockinfo For This Useful Post: |
07-26-2023, 06:14 | #3252 (permalink) |
No Life Poster Join Date: Jul 2012 Location: GSMFABRICA-Team
Posts: 3,400
Member: 1785930 Status: Offline Sonork: 100.1685640 Thanks Meter: 4,819 | Oppo A57 (CPH1701) Pattern and FRP Lock Remove with Hydra Tool - First keep press boot info Code: PreOperation Configuration Brand : AUTO Model : AUTO Storage : Auto Loader: Auto Port : Auto Searching for Qualcomm 9008 Device...Found FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM13) SymbolicName :\\?\usb#vid_05c6&pid_9008#6&2c3ff1f8&0&5#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver :03/19/2014,2.1.1.2 Getting device info. [Connected]..... Serial No.: 0xBBE4557A HW_ID : 0006B0E100000000 MSM ID : 0x0006B0E1, MSM8940-Qualcomm Snapdragon 435/FAADANAZA MODEL_ID : 0x0000 OEM_ID : 0x0000 - QUALCOMM PBL Ver : 00000000 PK HASH : 77a22b92a1bcd0c4d3aaa10aa9f1b2c36d51c0ca7429b5201d0fd1d5f5b53bbc Hydra Enable Auto search Firehose.. #Please wait... #Search by filename filter..... #Found 2 Compatible Files ..Found match Firehose... Firehose Loader[0006b0e100000000_77a22b92a1bcd0c4_08d850f8_qualcomm_oppo_peek_8937.fhprg] -------------------------------------------------- Header Type : OLD TargetMSM : 8937 Tag : _peek Version : 3 Code_size : 288 Signature_size : 256 fhVendor : OPPO HW_ID : 0006B0E100000000 Vendor : QUALCOMM OEM_ID : 0000 MODEL_ID : 0000 SW_ID : 0000000000000003 APP_ID : pk_hash : 77a22b92a1bcd0c4d3aaa10aa9f1b2c36d51c0ca7429b5201d0fd1d5f5b53bbc OEM_VERSION : ubuntu-121-238 IMAGE_VARIANT : FAADANAZA QC_VERSION : BOOT.BF.3.3-00184 -------------------------------------------------- SaharaBoot... Ok Sending ....................Ok Connecting to Firehose... Ping... Ok Configuration[FHProt_Auto]...... Identifying Chip.... Ok Chip Configuration : MemoryName : eMMC MaxPayloadSizeToTargetInBytes : 1048576 MaxPayloadSizeToTargetInBytesSupported : 1048576 MaxPayloadSizeFromTargetInBytes : 4096 MaxXMLSizeInBytes : 4096 TargetName : 8937 Version : 1 *** STORAGE DEVICE INFO *** Memory Type : eMMC Block Size in Bytes : 512 Page Size : 512 Manufacturer ID : 144 Serial Number : 849496369 Firmware Version : 165 Product Name : HBG4a2 Physical Partitions : 3 Total Logical Blocks: Drive [0] 61071360[29.121 GB] Drive [1] 8192[4 MB] Drive [2] 8192[4 MB] Protocol : Universal Running : Ok Reading GPT[3] Drive [0] 56 Items Drive [1] 0 Items Drive [2] 4 Items --------------- Reading build.prop content --------------- build.prop Brand : OPPO Vendor : OPPO Model : CPH1701 Product : CPH1701 Manufacturer : OPPO ID : MMB29M SDK : 23 Release : 6.0.1 ABI : arm64-v8a CPU abilist : arm64-v8a,armeabi-v7a,armeabi Locale : en-US Description : msm8937_64-user 6.0.1 MMB29M eng.root.20180806.181819 release-keys Device : CPH1701 Display ID : CPH1701EX_11_A.34_180806 Security Patch : 2018-05-05 Platform : msm8937 --------------- end of build.prop content --------------- Auto Backup Security partitions... Reading Security Items.... - modemst1(modemst1.bin), 1.5 MB = Ok - modemst2(modemst2.bin), 1.5 MB = Ok - fsg(fsg.bin), 1.5 MB = Ok - fsc(fsc.bin), 512 Bytes = Ok - oppodycnvbk(oppodycnvbk.bin), 10 MB = Ok - oppostanvbk(oppostanvbk.bin), 10 MB = Ok - persist(persist.bin), 32 MB = Ok C:\Hydra Tool\Backup\QUALBackup\QUALCOMM\0006B0E100000000_BBE4557A\Auto_Backup\072123103636 Backup Security Success.... Elapsed Time : 00:01:23 - select ultrapower (auto) and click execute Code: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Qualcomm Service Tool Ultra Power Auto - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - PreOperation Configuration Brand : AUTO Model : AUTO Storage : Auto Loader: Auto Port : Auto Searching for Qualcomm 9008 Device...Found FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM13) SymbolicName :\\?\usb#vid_05c6&pid_9008#6&2c3ff1f8&0&5#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver :03/19/2014,2.1.1.2 Getting device info. [Connected].Ok Device MODE : Firehose Connecting to Firehose... Ping.. Ok Configuration[FHProt_Auto]...... Ok Chip Configuration : MemoryName : eMMC MaxPayloadSizeToTargetInBytes : 1048576 MaxPayloadSizeToTargetInBytesSupported : 1048576 MaxPayloadSizeFromTargetInBytes : 4096 MaxXMLSizeInBytes : 4096 TargetName : 8937 Version : 1 *** STORAGE DEVICE INFO *** Memory Type : eMMC Block Size in Bytes : 512 Page Size : 512 Manufacturer ID : 144 Serial Number : 849496369 Firmware Version : 165 Product Name : HBG4a2 Physical Partitions : 3 Total Logical Blocks: Drive [0] 61071360[29.121 GB] Drive [1] 8192[4 MB] Drive [2] 8192[4 MB] Protocol : Universal Running : Ok Reading GPT[3] Drive [0] 56 Items Drive [1] 0 Items Drive [2] 4 Items --------------- Reading build.prop content --------------- build.prop Brand : OPPO Vendor : OPPO Model : CPH1701 Product : CPH1701 Manufacturer : OPPO ID : MMB29M SDK : 23 Release : 6.0.1 ABI : arm64-v8a CPU abilist : arm64-v8a,armeabi-v7a,armeabi Locale : en-US Description : msm8937_64-user 6.0.1 MMB29M eng.root.20180806.181819 release-keys Device : CPH1701 Display ID : CPH1701EX_11_A.34_180806 Security Patch : 2018-05-05 Platform : msm8937 --------------- end of build.prop content --------------- - Removing FRP Executing ... - Removing FRP [Zero Wipe] OkOk - Formatting Userdata Executing ... - Formatting Userdata [Safe Format - eMMc] OkOk Rebooting Phone.... Ok Action Result : Ok Elapsed Time : 00:00:06 |
The Following User Says Thank You to Unlockinfo For This Useful Post: |
07-26-2023, 06:16 | #3253 (permalink) |
No Life Poster Join Date: Jul 2012 Location: GSMFABRICA-Team
Posts: 3,400
Member: 1785930 Status: Offline Sonork: 100.1685640 Thanks Meter: 4,819 | Redmi Note 5A FRP Lock Remove with Hydra Tool - keep press boot info Code: PreOperation Configuration Brand : AUTO Model : AUTO Storage : Auto Loader: Auto Port : Auto Searching for Qualcomm 9008 Device...Found FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM21) SymbolicName :\\?\usb#vid_05c6&pid_9008#5&78a4f37&0&13#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver :08/02/2017,2.1.2.7 Getting device info. [Connected]..... Serial No.: 0x210D5962 HW_ID : 000560E100000000 MSM ID : 0x000560E1, MSM8917-Qualcomm Snapdragon 425/LAADANAZA MODEL_ID : 0x0000 OEM_ID : 0x0000 - QUALCOMM PBL Ver : 00000000 PK HASH : 57158eaf1814d78fd2b3105ece4db18a817a08ac664a5782a925f3ff8403d39a Hydra Enable Auto search Firehose.. #Please wait... #Search by filename filter..... #Found 42 Compatible Files ..Found match Firehose... Firehose Loader[000560e100000000_57158eaf1814d78f_01740d29_qualcomm_xiaomi_peek_8917.fhprg] -------------------------------------------------- Header Type : OLD TargetMSM : 8917 Tag : _peek Version : 3 Code_size : 288 Signature_size : 256 fhVendor : XIAOMI HW_ID : 000560E100000000 Vendor : QUALCOMM OEM_ID : 0000 MODEL_ID : 0000 SW_ID : 0000000000000003 APP_ID : pk_hash : 57158eaf1814d78fd2b3105ece4db18a817a08ac664a5782a925f3ff8403d39a OEM_VERSION : c3-miui-ota-bd102.bj IMAGE_VARIANT : LAADANAZA QC_VERSION : BOOT.BF.3.3-00214 -------------------------------------------------- SaharaBoot... Ok Sending ...................Ok Connecting to Firehose... Ping... Ok Configuration[FHProt_Auto]...... Identifying Chip.... Ok Chip Configuration : MemoryName : eMMC MaxPayloadSizeToTargetInBytes : 1048576 MaxPayloadSizeToTargetInBytesSupported : 1048576 MaxPayloadSizeFromTargetInBytes : 4096 MaxXMLSizeInBytes : 4096 TargetName : 8917 Version : 1 *** STORAGE DEVICE INFO *** Memory Type : eMMC Block Size in Bytes : 512 Page Size : 512 Manufacturer ID : 144 Serial Number : 862049366 Firmware Version : 165 Product Name : HAG4a2 Physical Partitions : 3 Total Logical Blocks: Drive [0] 30777344[14,676 GB] Drive [1] 8192[4 MB] Drive [2] 8192[4 MB] Protocol : Universal Running : Ok Reading GPT[3] Drive [0] 48 Items Drive [1] 0 Items Drive [2] 0 Items --------------- Reading build.prop content --------------- build.prop Brand : xiaomi Model : Redmi Note 5A Product : ugglite ID : N2G47H SDK : 25 Release : 7.1.2 ABI : arm64-v8a CPU abilist : arm64-v8a,armeabi-v7a,armeabi Locale : en-GB Description : ugglite-user 7.1.2 N2G47H V10.3.1.0.NDFMIXM release-keys Device : ugglite Display ID : N2G47H Security Patch : 2019-06-01 Platform : msm8937 Fingerprint : xiaomi/ugglite/ugglite:7.1.2/N2G47H/V10.3.1.0.NDFMIXM:user/release-keys --------------- end of build.prop content --------------- Auto Backup Security partitions... Reading Security Items.... - modemst1(modemst1.bin), 1,5 MB = Ok - modemst2(modemst2.bin), 1,5 MB = Ok - fsg(fsg.bin), 1,5 MB = Ok - fsc(fsc.bin), 512 Bytes = Ok - persist(persist.bin), 32 MB = Ok C:\Hydra Tool\Backup\QUALBackup\QUALCOMM\000560E100000000_210D5962\Auto_Backup\072123160643 Backup Security Success.... Elapsed Time : 00:00:09 - FRP Lock Remove Code: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Qualcomm Service Tool Factory Reset Protection Auto - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - PreOperation Configuration Brand : AUTO Model : AUTO Storage : Auto Loader: Auto Port : Auto Searching for Qualcomm 9008 Device...Found FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM21) SymbolicName :\\?\usb#vid_05c6&pid_9008#5&78a4f37&0&13#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver :08/02/2017,2.1.2.7 Getting device info. [Connected].Ok Device MODE : Firehose Connecting to Firehose... Ping.. Ok Configuration[FHProt_Auto]...... Ok Chip Configuration : MemoryName : eMMC MaxPayloadSizeToTargetInBytes : 1048576 MaxPayloadSizeToTargetInBytesSupported : 1048576 MaxPayloadSizeFromTargetInBytes : 4096 MaxXMLSizeInBytes : 4096 TargetName : 8917 Version : 1 *** STORAGE DEVICE INFO *** Memory Type : eMMC Block Size in Bytes : 512 Page Size : 512 Manufacturer ID : 144 Serial Number : 862049366 Firmware Version : 165 Product Name : HAG4a2 Physical Partitions : 3 Total Logical Blocks: Drive [0] 30777344[14,676 GB] Drive [1] 8192[4 MB] Drive [2] 8192[4 MB] Protocol : Universal Running : Ok Reading GPT[3] Drive [0] 48 Items Drive [1] 0 Items Drive [2] 0 Items --------------- Reading build.prop content --------------- build.prop Brand : xiaomi Model : Redmi Note 5A Product : ugglite ID : N2G47H SDK : 25 Release : 7.1.2 ABI : arm64-v8a CPU abilist : arm64-v8a,armeabi-v7a,armeabi Locale : en-GB Description : ugglite-user 7.1.2 N2G47H V10.3.1.0.NDFMIXM release-keys Device : ugglite Display ID : N2G47H Security Patch : 2019-06-01 Platform : msm8937 Fingerprint : xiaomi/ugglite/ugglite:7.1.2/N2G47H/V10.3.1.0.NDFMIXM:user/release-keys --------------- end of build.prop content --------------- - Removing FRP Executing ... - Removing FRP [Zero Wipe] OkOk Action Result : Ok Elapsed Time : 00:00:03 |
The Following User Says Thank You to Unlockinfo For This Useful Post: |
07-26-2023, 06:19 | #3254 (permalink) |
No Life Poster Join Date: Jul 2012 Location: GSMFABRICA-Team
Posts: 3,400
Member: 1785930 Status: Offline Sonork: 100.1685640 Thanks Meter: 4,819 | Redmi Note 8 Pro MI Account Remove with Hydra Tool - First keep press boot info - Mi Account remove (new Method) - Click Execute Code: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Service Function Xiaomi Remove MiAccount [New Method] - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Searching for MTK Device...Found MTK Port Type : Flashmode BROM FriendlyName : MediaTek USB Port (COM9) Device : /6&688a3b8&0&3 SymbolicName : \\?\usb#vid_0e8d&pid_0003#6&688a3b8&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver : 09/11/2014,3.0.1437.1 Service : wdm_usb Openning Port [COM9] Ok Handshaking...Ok HwCode : 0813 {MT6785} Hwver : 0000 Target config : E7 SBC : 01 (True) SLA : 02 (True) DAA : 04 (True) SWJTAG : 06 (True) EPP : 00 (False) CERT : 00 (False) MEMREAD : 20 (True) MEMWRITE : 40 (True) CMD_C8 : 80 (True) Connection : BROM HW Subcode : 8A00 HW Subcode : CA00 SW Ver : 0000 ME_ID : 42B030465B6BED58EBBEB5D9A9D77358 SOC_ID : 69B498F206FAC72468C7C721DE1BBFA7B73A41AC3D7EDF8446B552142A228152 Exploiting Device... Successfully Exploited.. Handshaking...Ok Dumping Preloader from Bootrom.. Seeking preloader address..Found @ 0x00200BC4 Starting to dump... Prel Size : 0x0004ED68 Successfully dump preloader.. [C:\Hydra Tool\Boot\PreloaderDump\preloader_begonia.bin] Target config : 00 SBC : 00 (False) SLA : 00 (False) DAA : 00 (False) SWJTAG : 00 (False) EPP : 00 (False) CERT : 00 (False) MEMREAD : 00 (False) MEMWRITE : 00 (False) CMD_C8 : 00 (False) Connection : BROM Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin] Patching da2 ... Ok Uploading Stage 1.... Successfully uploaded stage 1, jumping .. Executing JUMP_DA Address @ 0x00200000 Jumping to 0x00200000 Ok 0xC0 Successfully received DA sync ONNECTION_AGENT : brom DRAM config needed for : 4839485131364145434D4D4441520000 Sending auto preloader from dump... [preloader_begonia.bin] Sending emi data.. [DRAM setup passed.] Sending emi data succeeded. Uploading stage 2... Upload data was accepted. Jumping to stage 2... Successfully uploaded stage 2 ERAM Size : 0x0000000000080000-512 KB IRAM Size : 0x0000000180000000-6 GB UFS MID : 0x48 UFS FWVer : 0xA107 UFS Blocksize : 0x0000000000001000-4 KB UFS LU0 Size : 0x0000000000400000-4 MB UFS LU1 Size : 0x0000000000400000-4 MB UFS LU2 Size : 0x0000001DCB000000-119.172 GB UFS ID : H UFS CID : 4839485131364145434D4D444152000000000000 HW-CODE : 0x813 HWSUB-CODE : 0x8A00 HW-VERSION : 0xCA00 SW-VERSION : 0x0 CHIP-EVOLUTION : 0x0 DA-VERSION : 1.0 Speed : high-speed Upload data was accepted. Jumping to stage 2... DA Extensions successfully added Reading Partition Table .. Partition Count : 49 --------------- Reading build.prop content --------------- Product : begonia Marketname : ro.product.systemRedmi Note 8 Pro ID : RP1A.200720.011 SDK : 30 Release : 11 ABI : arm64-v8a CPU abilist : arm64-v8a,armeabi-v7a,armeabi Locale : en-GB Description : begonia-user 11 RP1A.200720.011 V12.5.4.0.RGGEUXM release-keys Display ID : RP1A.200720.011 Security Patch : 2021-10-01 StorageType : mtp --------------- end of build.prop content --------------- Reading IMEI........ IMEI1 : 866685********* IMEI2 : 866685********* ------------------------------- Bootloader Status... Bootloader : Unlocked ------------------------------- Backing up Security.. - preloader(preloader.bin), 512 KB = Ok [preloader_begonia.bin] *Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0813_42B030465B6CCDD33358EBBEB5D9A9D77358\Auto\072123160015\6785_Android_scatter.txt - pgpt(pgpt.bin), 32 KB = Ok - nvram(nvram.bin), 64 MB = Ok - nvdata(nvdata.bin), 64 MB = Ok - frp(frp.bin), 1024 KB = Ok - protect1(protect1.bin), 8 MB = Ok - protect2(protect2.bin), 8 MB = Ok - persist(persist.bin), 70.469 MB = Ok - proinfo(proinfo.bin), 3 MB = Ok - nvcfg(nvcfg.bin), 32 MB = Ok - sec1(sec1.bin), 2 MB = Ok - seccfg(seccfg.bin), 8 MB = Ok - lk(lk.bin), 2 MB = Ok Backup Done!!! ------------------------------ Xiaomi Operation Flash Mode.. ------------------------------ Backing up Security.. persist... Ok vbmeta... Ok Patching Persist Scanning Patching address...Please wait... > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] Total Items patched : 128 Successfully patched address.. -persist .....Ok Done Writing... -vbmeta .....Ok Done Writing... Please wait, processing..... Status: Ok Action Result : Ok Elapsed Time : 00:09:36 |
The Following User Says Thank You to Unlockinfo For This Useful Post: |
07-26-2023, 06:25 | #3255 (permalink) |
No Life Poster Join Date: Jul 2012 Location: GSMFABRICA-Team
Posts: 3,400
Member: 1785930 Status: Offline Sonork: 100.1685640 Thanks Meter: 4,819 | Vivo Y12 Pattern and FRP Lock Remove with Hydra Tool - Keep press boot info Code: ------------------------------------------------------- To Enable BROM Mode : Method 1 - Bootkey (Vol + - Power) or any combination Method 2 - Enable Preloader to brom(crashing Method) Method 3 - Test Point Data0 + ground To Enable Preloader Mode : Method 1 - Just Insert cable ------------------------------------------------------- Searching for MTK Device...Found MTK Port Type : Flashmode BROM FriendlyName : MediaTek USB Port_V1632 (COM30) Device : /7&d3e40fc&0&4 SymbolicName : \\?\usb#vid_0e8d&pid_0003#7&d3e40fc&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver : 01/22/2015,3.0.1504.0 Service : wdm_usb Openning Port [COM30] Ok Handshaking...Ok HwCode : 0766 {MT6765/MT8768t} Hwver : 0000 Target config : E5 SBC : 01 (True) SLA : 00 (False) DAA : 04 (True) SWJTAG : 04 (True) EPP : 00 (False) CERT : 00 (False) MEMREAD : 20 (True) MEMWRITE : 40 (True) CMD_C8 : 80 (True) Connection : BROM HW Subcode : 8A00 HW Subcode : CA00 SW Ver : 0000 ME_ID : 4C1C9483396F7B19FC5FCAE43EE9DA94 SOC_ID : C2ECB3A739701F253CAD1698A1A83C8713C057858DD82B3B48CCED68DEC55AD5 Exploiting Device... Successfully Exploited.. Handshaking...Ok Dumping Preloader from Bootrom.. Seeking preloader address.. Not Found Target config : 00 SBC : 00 (False) SLA : 00 (False) DAA : 00 (False) SWJTAG : 00 (False) EPP : 00 (False) CERT : 00 (False) MEMREAD : 00 (False) MEMWRITE : 00 (False) CMD_C8 : 00 (False) Connection : BROM Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin] Patching da2 ... Ok Uploading Stage 1.... Successfully uploaded stage 1, jumping .. Executing JUMP_DA Address @ 0x00200000 Jumping to 0x00200000 Ok 0xC0 Successfully received DA sync ONNECTION_AGENT : brom DRAM config needed for : 150100475036424D Sending auto preloader from dump... Hydra Auto Preloader Search Enabled.. Hydra will find compatible preloader files... ----------------------------- Found 14 Compatible Preloaders.. ----------------------------- 1-preloader_cereus.bin...Sending... [DRAM setup passed.] [Ok] ----------------------------- Sending emi data succeeded. Uploading stage 2... Upload data was accepted. Jumping to stage 2... Successfully uploaded stage 2 ERAM Size : 0x000000000003A000-232 KB IRAM Size : 0x00000000C0000000-3 GB EMMC Boot1 Size : 0x0000000000400000-4 MB EMMC Boot2 Size : 0x0000000000400000-4 MB EMMC RPMB Size : 0x0000000001000000-16 MB EMMC USER Size : 0x0000000E8F800000-58.242 GB EMMC CID : 150100475036424D42011247E4D5A6B3 - GP6BMB HW-CODE : 0x766 HWSUB-CODE : 0x8A00 HW-VERSION : 0xCA00 SW-VERSION : 0x0 CHIP-EVOLUTION : 0x0 DA-VERSION : 1.0 Speed : high-speed Upload data was accepted. Jumping to stage 2... DA Extensions successfully added Reading Partition Table .. Partition Count : 44 --------------- Reading build.prop content --------------- Product : k62v1_64_bsp ID : RP1A.200720.012 SDK : 30 Release : 11 ABI : arm64-v8a CPU abilist : arm64-v8a,armeabi-v7a,armeabi Locale : en-US Description : full_k62v1_64_bsp-user 11 RP1A.200720.012 eng.compil.20230322.112912 release-keys Display ID : RP1A.200720.012 release-keys Security Patch : 2022-05-01 StorageType : mtp --------------- end of build.prop content --------------- Reading IMEI........ IMEI1 : 86091********** IMEI2 : 86091********** ------------------------------- Bootloader Status... Bootloader : Locked ------------------------------- Backing up Security.. - preloader(preloader.bin), 512 KB = Ok [preloader_k62v1_64_bsp.bin] *Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0766_4C1C94996F7B19FC5FCAE43EE9DA94\Auto\07219205401\6765_Android_scatter.txt - pgpt(pgpt.bin), 32 KB = Ok - nvram(nvram.bin), 64 MB = Ok - nvdata(nvdata.bin), 64 MB = Ok - frp(frp.bin), 1024 KB = Ok - protect1(protect1.bin), 8 MB = Ok - protect2(protect2.bin), 13.469 MB = Ok - persist(persist.bin), 48 MB = Ok - proinfo(proinfo.bin), 3 MB = Ok - nvcfg(nvcfg.bin), 32 MB = Ok - sec1(sec1.bin), 2 MB = Ok - seccfg(seccfg.bin), 8 MB = Ok - lk(lk.bin), 5 MB = Ok Backup Done!!! Elapsed Time : 00:00:44 - Select factory reset and click execute Code: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Service Function Format/Factory Reset/ScreenLock Auto - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Searching for MTK Device...Found MTK Port Type : Flashmode BROM FriendlyName : MediaTek USB Port_V1632 (COM30) Device : /7&d3e40fc&0&4 SymbolicName : \\?\usb#vid_0e8d&pid_0003#7&d3e40fc&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver : 01/22/2015,3.0.1504.0 Service : wdm_usb Openning Port [COM30] Ok Reading Partition Table .. ERAM Size : 0x000000000003A000-232 KB IRAM Size : 0x00000000C0000000-3 GB EMMC Boot1 Size : 0x0000000000400000-4 MB EMMC Boot2 Size : 0x0000000000400000-4 MB EMMC RPMB Size : 0x0000000001000000-16 MB EMMC USER Size : 0x0000000E8F800000-58.242 GB EMMC CID : 150100475036424D42011247E4D5A6B3 - GP6BMB HW-CODE : 0x766 HWSUB-CODE : 0x8A00 HW-VERSION : 0xCA00 SW-VERSION : 0x0 CHIP-EVOLUTION : 0x0 DA-VERSION : 1.0 Speed : high-speed Partition Count : 44 --------------- Reading build.prop content --------------- Product : k62v1_64_bsp ID : RP1A.200720.012 SDK : 30 Release : 11 ABI : arm64-v8a CPU abilist : arm64-v8a,armeabi-v7a,armeabi Locale : en-US Description : full_k62v1_64_bsp-user 11 RP1A.200720.012 eng.compil.20230322.112912 release-keys Display ID : RP1A.200720.012 release-keys Security Patch : 2022-05-01 StorageType : mtp --------------- end of build.prop content --------------- Reading IMEI........ IMEI1 : 86091********** IMEI2 : 86091********** ------------------------------- Bootloader Status... Bootloader : Locked ------------------------------- ------------------------------ Factory Reset Flash Mode.. ------------------------------ Operation : Safeformat Universal... Action Result : Ok Elapsed Time : 00:00:04 - Select Remove FRP Lock and click Execute Code: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Service Function Factory Reset Protection[FRP] Auto - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Searching for MTK Device...Found MTK Port Type : Flashmode BROM FriendlyName : MediaTek USB Port_V1632 (COM30) Device : /7&d3e40fc&0&4 SymbolicName : \\?\usb#vid_0e8d&pid_0003#7&d3e40fc&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver : 01/22/2015,3.0.1504.0 Service : wdm_usb Openning Port [COM30] Ok Reading Partition Table .. ERAM Size : 0x000000000003A000-232 KB IRAM Size : 0x00000000C0000000-3 GB EMMC Boot1 Size : 0x0000000000400000-4 MB EMMC Boot2 Size : 0x0000000000400000-4 MB EMMC RPMB Size : 0x0000000001000000-16 MB EMMC USER Size : 0x0000000E8F800000-58.242 GB EMMC CID : 150100475036424D42011247E4D5A6B3 - GP6BMB HW-CODE : 0x766 HWSUB-CODE : 0x8A00 HW-VERSION : 0xCA00 SW-VERSION : 0x0 CHIP-EVOLUTION : 0x0 DA-VERSION : 1.0 Speed : high-speed Partition Count : 44 --------------- Reading build.prop content --------------- Product : k62v1_64_bsp ID : RP1A.200720.012 SDK : 30 Release : 11 ABI : arm64-v8a CPU abilist : arm64-v8a,armeabi-v7a,armeabi Locale : en-US Description : full_k62v1_64_bsp-user 11 RP1A.200720.012 eng.compil.20230322.112912 release-keys Display ID : RP1A.200720.012 release-keys Security Patch : 2022-05-01 StorageType : mtp --------------- end of build.prop content --------------- Reading IMEI........ IMEI1 : 860919********* IMEI2 : 860919********* ------------------------------- Bootloader Status... Bootloader : Locked ------------------------------- Rebooting Device... Reboot Option : RebootToNormal Rebooting Operation Done!!!! Action Result : Ok Elapsed Time : 00:00:05 |
The Following User Says Thank You to Unlockinfo For This Useful Post: |
Bookmarks |
Thread Tools | |
Display Modes | |
| |
|