GSM Shop GSM Shop
GSM-Forum  

Welcome to the GSM-Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features.
Only registered members may post questions, contact other members or search our database of over 8 million posts.

Registration is fast, simple and absolutely free so please - Click to REGISTER!

If you have any problems with the registration process or your account login, please contact contact us .

Go Back   GSM-Forum > Product Support Sections > Special Solutions / Services / WebShop > GSMFABRICA Products > HYDRA TOOL

Reply
 
LinkBack Thread Tools Display Modes
Old 07-24-2023, 05:52   #3241 (permalink)
No Life Poster
 
Unlockinfo's Avatar
 
Join Date: Jul 2012
Location: GSMFABRICA-Team
Posts: 3,400
Member: 1785930
Status: Offline
Sonork: 100.1685640
Thanks Meter: 4,819

Infinix Smart 5 (X657C) Pattern and FRP Lock Remove with Hdyra Tool

- first keep press boot info
Code:
-------------------------------------------------------
To Enable BROM  Mode : 
     Method 1    - Bootkey (Vol + - Power) or any combination
     Method 2    - Enable Preloader to brom(crashing Method)
     Method 3    - Test Point Data0 + ground
To Enable Preloader  Mode : 
     Method 1    - Just Insert cable
-------------------------------------------------------

Searching for MTK Device...Found
  MTK Port Type   : Flashmode BROM 
  FriendlyName    : MediaTek USB Port_V1632 (COM14)
  Device          : /6&2ac3e851&0&4
  SymbolicName    : \\?\usb#vid_0e8d&pid_0003#6&2ac3e851&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 01/22/2015,3.0.1504.0
  Service         : wdm_usb

Openning Port [COM14] Ok
Handshaking...Ok
  HwCode          : 0717 {MT6761/MT6762/MT3369/MT8766B}
  Hwver           : 0000
  Target config   : E5
  SBC             : 01 (True)
  SLA             : 00 (False)
  DAA             : 04 (True)
  SWJTAG          : 04 (True)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 20 (True)
  MEMWRITE        : 40 (True)
  CMD_C8          : 80 (True)
  Connection      : BROM
  HW Subcode      : 8A00
  HW Subcode      : CA01
  SW Ver          : 0200
  ME_ID           : 9A1737F1895EEFA82ED80AD8591F2DD7
  SOC_ID          : 698D2DED9984C8540215FAA5B2D6C509ABD6F02F666AA0FAFE0E64EE004B3366

Exploiting Device...
Successfully Exploited..
Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..Found @ 0x00200BC4
Starting to dump...
Prel Size : 0x00039310
Successfully dump preloader..  [C:\Hydra Tool\Boot\PreloaderDump\preloader_x657c_h6117.bin]
  Target config   : 00
  SBC             : 00 (False)
  SLA             : 00 (False)
  DAA             : 00 (False)
  SWJTAG          : 00 (False)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 00 (False)
  MEMWRITE        : 00 (False)
  CMD_C8          : 00 (False)
  Connection      : BROM

Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin]
Patching da2 ... Ok
Uploading Stage 1....
Successfully uploaded stage 1, jumping ..
Executing JUMP_DA Address @ 0x00200000
Jumping to 0x00200000 Ok 0xC0
Successfully received DA sync
  ONNECTION_AGENT : brom
  DRAM config needed for : 7001005441323833
Sending auto preloader from dump...  [preloader_x657c_h6117.bin]
Sending emi data.. [DRAM setup passed.]
Sending emi data succeeded.
Uploading stage 2...
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
  ERAM Size       : 0x000000000003A500-233.25 KB
  IRAM Size       : 0x0000000080000000-2 GB
  EMMC Boot1 Size : 0x0000000000400000-4 MB
  EMMC Boot2 Size : 0x0000000000400000-4 MB
  EMMC RPMB Size  : 0x0000000000400000-4 MB
  EMMC USER Size  : 0x000000074A000000-29.156 GB
  EMMC CID        : 700100544132383332232587890E6873 - TA2832
  HW-CODE         : 0x717
  HWSUB-CODE      : 0x8A00
  HW-VERSION      : 0xCA01
  SW-VERSION      : 0x200
  CHIP-EVOLUTION  : 0x0
  DA-VERSION      : 1.0
  Speed           : high-speed
Upload data was accepted. Jumping to stage 2...
DA Extensions successfully added 
Reading Partition Table .. 
Partition Count : 43
--------------- Reading build.prop content ---------------
  Product        : x657c_h6117
  ID             : QP1A.190711.020
  SDK            : 29
  Release        : 10
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Locale         : en-US
  Description    : full_x657c_h6117-user 10 QP1A.190711.020 319582 release-keys
  Display ID     : X657C-H6117GH-QGo-GL-220610V322
  Security Patch : 2022-06-05
--------------- end of build.prop content ---------------

Reading IMEI........
 IMEI1 : 35991*********
 IMEI2 : 35991*********
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------
Backing up Security..
 - preloader(preloader.bin), 512 KB                    = Ok  [preloader_x657c_h6117.bin]
  *Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0717_9A1737F18855FA82ED80AD8591F2DD7\Auto\072023095203\6761_Android_scatter.txt
 - pgpt(pgpt.bin), 32 KB                               = Ok
 - nvram(nvram.bin), 64 MB                             = Ok
 - nvdata(nvdata.bin), 71.867 MB                       = Ok
 - frp(frp.bin), 1024 KB                               = Ok
 - protect1(protect1.bin), 8 MB                        = Ok
 - protect2(protect2.bin), 8 MB                        = Ok
 - persist(persist.bin), 48 MB                         = Ok
 - proinfo(proinfo.bin), 3 MB                          = Ok
 - nvcfg(nvcfg.bin), 32 MB                             = Ok
 - sec1(sec1.bin), 2 MB                                = Ok
 - seccfg(seccfg.bin), 8 MB                            = Ok
 - lk(lk.bin), 1024 KB                                 = Ok
Backup Done!!!

Elapsed Time : 00:01:38




- select ultra power auto and click execute
Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 
                      Service Function
                        Ultra Power
                            Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 

Searching for MTK Device...Found
  MTK Port Type   : Flashmode BROM 
  FriendlyName    : MediaTek USB Port_V1632 (COM14)
  Device          : /6&2ac3e851&0&4
  SymbolicName    : \\?\usb#vid_0e8d&pid_0003#6&2ac3e851&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 01/22/2015,3.0.1504.0
  Service         : wdm_usb

Openning Port [COM14] Ok
Reading Partition Table .. 
  ERAM Size       : 0x000000000003A500-233.25 KB
  IRAM Size       : 0x0000000080000000-2 GB
  EMMC Boot1 Size : 0x0000000000400000-4 MB
  EMMC Boot2 Size : 0x0000000000400000-4 MB
  EMMC RPMB Size  : 0x0000000000400000-4 MB
  EMMC USER Size  : 0x000000074A000000-29.156 GB
  EMMC CID        : 700100544132383332232587890E6873 - TA2832
  HW-CODE         : 0x717
  HWSUB-CODE      : 0x8A00
  HW-VERSION      : 0xCA01
  SW-VERSION      : 0x200
  CHIP-EVOLUTION  : 0x0
  DA-VERSION      : 1.0
  Speed           : high-speed
Partition Count : 43
--------------- Reading build.prop content ---------------
  Product        : x657c_h6117
  ID             : QP1A.190711.020
  SDK            : 29
  Release        : 10
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Locale         : en-US
  Description    : full_x657c_h6117-user 10 QP1A.190711.020 319582 release-keys
  Display ID     : X657C-H6117GH-QGo-GL-220610V322
  Security Patch : 2022-06-05
--------------- end of build.prop content ---------------

Reading IMEI........
 IMEI1 : 3599122********
 IMEI2 : 3599122********
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------
---------------------------
        Ultra Power    
---------------------------
Formatting Userdata : 
Operation : Safeformat Universal... Ok
Removing FRP :  Ok

Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!

Action Result :  Ok

Elapsed Time : 00:00:10
  Reply With Quote
The Following User Says Thank You to Unlockinfo For This Useful Post:
Old 07-24-2023, 05:57   #3242 (permalink)
No Life Poster
 
Unlockinfo's Avatar
 
Join Date: Jul 2012
Location: GSMFABRICA-Team
Posts: 3,400
Member: 1785930
Status: Offline
Sonork: 100.1685640
Thanks Meter: 4,819
Samsung A10s (SM-A107F) FRP Lock Remove with Hydra Tool

- keep press boot info
- phone connect with test point

Code:
-------------------------------------------------------
To Enable BROM  Mode : 
     Method 1    - Bootkey (Vol + - Power) or any combination
     Method 2    - Enable Preloader to brom(crashing Method)
     Method 3    - Test Point Data0 + ground
To Enable Preloader  Mode : 
     Method 1    - Just Insert cable
-------------------------------------------------------

Searching for MTK Device...Found
  MTK Port Type   : Flashmode Preloader
  FriendlyName    : MediaTek PreLoader USB VCOM_V1633 (Android) (COM30)
  Device          : /6&1afede88&0&3
  SymbolicName    : \\?\usb#vid_0e8d&pid_2000#6&1afede88&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 01/22/2015,3.0.1504.0
  Service         : wdm_usb

Openning Port [COM30] Ok
Handshaking...Ok
  HwCode          : 0766 {MT6765/MT8768t}
  Hwver           : 0000
  Target config   : 05
  SBC             : 01 (True)
  SLA             : 00 (False)
  DAA             : 04 (True)
  SWJTAG          : 04 (True)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 00 (False)
  MEMWRITE        : 00 (False)
  CMD_C8          : 00 (False)
  Connection      : Preloader
  HW Subcode      : 8A00
  HW Subcode      : CA00
  SW Ver          : 0000
  ME_ID           : 78CD7902746DFE21C8B1E3F96EAA7BBF


- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 
                  Preloader To Brom Function.....               
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 
 - Method 1  Exploit Executed..... [Successfully Crash Preloader.]
Device now is BROM Port
Device not yet filterd...
Executing LibUSB Filter..
Device Now Filtered...Restarting Device Port..

Openning Port [COM5] Ok

Exploiting Device...
Successfully Exploited..
Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..Found @ 0x00200BC4
Starting to dump...
Prel Size : 0x0003BEC4
Successfully dump preloader..  [C:\Hydra Tool\Boot\PreloaderDump\preloader_s96116aa1.bin]
  Target config   : 00
  SBC             : 00 (False)
  SLA             : 00 (False)
  DAA             : 00 (False)
  SWJTAG          : 00 (False)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 00 (False)
  MEMWRITE        : 00 (False)
  CMD_C8          : 00 (False)
  Connection      : BROM

Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin]
Patching da2 ... Ok
Uploading Stage 1....
Successfully uploaded stage 1, jumping ..
Executing JUMP_DA Address @ 0x00200000
Jumping to 0x00200000 Ok 0xC0
Successfully received DA sync
  ONNECTION_AGENT : brom
  DRAM config needed for : 150100514436334D
Sending auto preloader from dump...  [preloader_s96116aa1.bin]
Sending emi data.. [DRAM setup passed.]
Sending emi data succeeded.
Uploading stage 2...
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
  ERAM Size       : 0x000000000003A000-232 KB
  IRAM Size       : 0x0000000080000000-2 GB
  EMMC Boot1 Size : 0x0000000000400000-4 MB
  EMMC Boot2 Size : 0x0000000000400000-4 MB
  EMMC RPMB Size  : 0x0000000001000000-16 MB
  EMMC USER Size  : 0x0000000747C00000-29.121 GB
  EMMC CID        : 150100514436334D42035A41D33BB6B3 - QD63MB
  HW-CODE         : 0x766
  HWSUB-CODE      : 0x8A00
  HW-VERSION      : 0xCA00
  SW-VERSION      : 0x0
  CHIP-EVOLUTION  : 0x0
  DA-VERSION      : 1.0
  Speed           : high-speed
Upload data was accepted. Jumping to stage 2...
DA Extensions successfully added 
Reading Partition Table .. 
Partition Count : 41
--------------- Reading build.prop content ---------------
  Brand          : samsung
  Vendor         : samsung
  Model          : SM-A107F
  Product        : a10s
  Manufacturer   : samsung
  ID             : PPR1.180610.011
  SDK            : 28
  Release        : 9
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Locale         : en-GB
  Description    : a10sxx-user 9 PPR1.180610.011 A107FXXU5ATA9 release-keys
  Device         : a10s
  Display ID     : PPR1.180610.011.A107FXXU5ATA9
  Security Patch : 2020-01-01
  Fingerprint    : samsung/a10sxx/a10s:9/PPR1.180610.011/A107FXXU5ATA9:user/release-keys
--------------- end of build.prop content ---------------

Reading IMEI........
 IMEI1 : AB8ADE*********
 IMEI2 : F7900E*********
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------
Backing up Security..
 - preloader(preloader.bin), 512 KB                    = Ok  [preloader_s96116aa1.bin]
  *Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0766_78CD7ff746DFE21C8B1E3F96EAA7BBF\Auto\071923205444\6765_Android_scatter.txt
 - pgpt(pgpt.bin), 4 MB                                = Ok
 - nvram(nvram.bin), 64 MB                             = Ok
 - nvdata(nvdata.bin), 64 MB                           = Ok
 - frp(frp.bin), 1024 KB                               = Ok
 - persistent(persistent.bin), 512 KB                  = Ok
 - protect1(protect1.bin), 8 MB                        = Ok
 - protect2(protect2.bin), 8 MB                        = Ok
 - persist(persist.bin), 48 MB                         = Ok
 - proinfo(proinfo.bin), 3 MB                          = Ok
 - nvcfg(nvcfg.bin), 32 MB                             = Ok
 - sec1(sec1.bin), 2 MB                                = Ok
 - seccfg(seccfg.bin), 8 MB                            = Ok
 - lk(lk.bin), 2 MB                                    = Ok
Backup Done!!!

Elapsed Time : 00:05:17



- go to pm tab and read patition files.
- select persistent and erase

Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 
                  MTK Partition Manager Function...               
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 

Searching for MTK Device...Found
  MTK Port Type   : Flashmode BROM 
  FriendlyName    : MediaTek USB Port_V1633 (COM5)
  Device          : /6&1afede88&0&3
  SymbolicName    : \\?\usb#vid_0e8d&pid_0003#6&1afede88&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 01/22/2015,3.0.1504.0
  Service         : wdm_usb

Openning Port [COM5] Ok
Reading Partition Table .. 
  ERAM Size       : 0x000000000003A000-232 KB
  IRAM Size       : 0x0000000080000000-2 GB
  EMMC Boot1 Size : 0x0000000000400000-4 MB
  EMMC Boot2 Size : 0x0000000000400000-4 MB
  EMMC RPMB Size  : 0x0000000001000000-16 MB
  EMMC USER Size  : 0x0000000747C00000-29.121 GB
  EMMC CID        : 150100514436334D42035A41D33BB6B3 - QD63MB
  HW-CODE         : 0x766
  HWSUB-CODE      : 0x8A00
  HW-VERSION      : 0xCA00
  SW-VERSION      : 0x0
  CHIP-EVOLUTION  : 0x0
  DA-VERSION      : 1.0
  Speed           : high-speed
Partition Count : 41
--------------- Reading build.prop content ---------------
  Brand          : samsung
  Vendor         : samsung
  Model          : SM-A107F
  Product        : a10s
  Manufacturer   : samsung
  ID             : PPR1.180610.011
  SDK            : 28
  Release        : 9
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Locale         : en-GB
  Description    : a10sxx-user 9 PPR1.180610.011 A107FXXU5ATA9 release-keys
  Device         : a10s
  Display ID     : PPR1.180610.011.A107FXXU5ATA9
  Security Patch : 2020-01-01
  Fingerprint    : samsung/a10sxx/a10s:9/PPR1.180610.011/A107FXXU5ATA9:user/release-keys
--------------- end of build.prop content ---------------

Reading IMEI........
 IMEI1 : AB8AD***********
 IMEI2 : F7900***********
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------

Format Selected Partitions..
 -persistent .....Ok
Done Format...

Elapsed Time : 00:00:15
  Reply With Quote
The Following User Says Thank You to Unlockinfo For This Useful Post:
Old 07-24-2023, 06:00   #3243 (permalink)
No Life Poster
 
Unlockinfo's Avatar
 
Join Date: Jul 2012
Location: GSMFABRICA-Team
Posts: 3,400
Member: 1785930
Status: Offline
Sonork: 100.1685640
Thanks Meter: 4,819
Tecno CAMON 18T FRP Lock Remove with Hydra Tool


Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 
                      Service Function
               Factory Reset Protection[FRP]
                            Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 

Searching for MTK Device...Found
  MTK Port Type   : Flashmode BROM 
  FriendlyName    : MediaTek USB Port (COM7)
  Device          : /5&10dc9a0c&0&2
  SymbolicName    : \\?\usb#vid_0e8d&pid_0003#5&10dc9a0c&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 01/22/2015,3.0.1504.0
  Service         : wdm_usb

Openning Port [COM7] Ok
Handshaking...Ok
  HwCode          : 0707 {MT6768}
  Hwver           : 0000
  Target config   : E5
  SBC             : 01 (True)
  SLA             : 00 (False)
  DAA             : 04 (True)
  SWJTAG          : 04 (True)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 20 (True)
  MEMWRITE        : 40 (True)
  CMD_C8          : 80 (True)
  Connection      : BROM
  HW Subcode      : 8A00
  HW Subcode      : CA00
  SW Ver          : 0000
  ME_ID           : 71FA65D7F930FF0D7F9C9C307409D1FE
  SOC_ID          : 10B84E9A0361F742AB9E722CD980F3E290B72F797E66998EE36AB0F45891C5BC
Device not yet filterd...
Executing LibUSB Filter..
Device Now Filtered...Restarting Device Port..

Openning Port [COM7] Ok

Exploiting Device...
Successfully Exploited..
Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..Found @ 0x00200BC4
Starting to dump...
Prel Size : 0x0004F77C
Successfully dump preloader..  [C:\Hydra Tool\Boot\PreloaderDump\preloader_ch6h_h698.bin]
  Target config   : 00
  SBC             : 00 (False)
  SLA             : 00 (False)
  DAA             : 00 (False)
  SWJTAG          : 00 (False)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 00 (False)
  MEMWRITE        : 00 (False)
  CMD_C8          : 00 (False)
  Connection      : BROM

Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin]
Patching da2 ... Ok
Uploading Stage 1....
Successfully uploaded stage 1, jumping ..
Executing JUMP_DA Address @ 0x00200000
Jumping to 0x00200000 Ok 0xC0
Successfully received DA sync
  ONNECTION_AGENT : brom
  DRAM config needed for : 1501004456364441
Sending auto preloader from dump...  [preloader_ch6h_h698.bin]
Sending emi data.. [DRAM setup passed.]
Sending emi data succeeded.
Uploading stage 2...
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
  ERAM Size       : 0x0000000000070000-448 KB
  IRAM Size       : 0x0000000100000000-4 GB
  EMMC Boot1 Size : 0x0000000000400000-4 MB
  EMMC Boot2 Size : 0x0000000000400000-4 MB
  EMMC RPMB Size  : 0x0000000001000000-16 MB
  EMMC USER Size  : 0x0000001D1EC00000-116.48 GB
  EMMC CID        : 150100445636444142025D1AD381989B - DV6DAB
  HW-CODE         : 0x707
  HWSUB-CODE      : 0x8A00
  HW-VERSION      : 0xCA00
  SW-VERSION      : 0x0
  CHIP-EVOLUTION  : 0x1
  DA-VERSION      : 1.0
  Speed           : high-speed
Upload data was accepted. Jumping to stage 2...
DA Extensions successfully added 
Reading Partition Table .. 
Partition Count : 51
--------------- Reading build.prop content ---------------
--------------- end of build.prop content ---------------

Reading IMEI........
 IMEI1 : 359384*********
 IMEI2 : 359384*********
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------
Backing up Security..
 - preloader(preloader.bin), 512 KB                    = Ok  [preloader_ch6h_h698.bin]
  *Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0707_71FA65D7F9880FF0D7F9C9C307409D1FE\Auto\072023092992\6768_Android_scatter.txt
 - pgpt(pgpt.bin), 32 KB                               = Ok
 - nvram(nvram.bin), 70 MB                             = Ok
 - nvdata(nvdata.bin), 64 MB                           = Ok
 - frp(frp.bin), 1024 KB                               = Ok
 - protect1(protect1.bin), 8 MB                        = Ok
 - protect2(protect2.bin), 14.367 MB                   = Ok
 - persist(persist.bin), 48 MB                         = Ok
 - proinfo(proinfo.bin), 3 MB                          = Ok
 - nvcfg(nvcfg.bin), 32 MB                             = Ok
 - sec1(sec1.bin), 2 MB                                = Ok
 - seccfg(seccfg.bin), 8 MB                            = Ok
Backup Done!!!

Rebooting Device...
Reboot Option : OperationDone
Rebooting Operation Done!!!!

Action Result :  Ok

Elapsed Time : 00:01:03
  Reply With Quote
The Following User Says Thank You to Unlockinfo For This Useful Post:
Old 07-24-2023, 06:05   #3244 (permalink)
No Life Poster
 
Unlockinfo's Avatar
 
Join Date: Jul 2012
Location: GSMFABRICA-Team
Posts: 3,400
Member: 1785930
Status: Offline
Sonork: 100.1685640
Thanks Meter: 4,819
Vivo Y51 2020 (V2030) Pattern and Frp lock remove with Hydra Tool


-- first keep press boot info
-- phone connect with test point
-- Factory Reset/Format Userdata safe format
-- click execute

Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 
                     Vivo Service Tool
               Factory Reset/Format Userdata
                      Safety Erase Tag
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 

PreOperation Configuration 
 Brand : VIVO Model : Y51 2020 (V2030) Storage : Auto
 Loader: vivo_y51_2020.elf
 Port  : Auto

 Searching for Qualcomm 9008 Device...Found
 FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM16)
 SymbolicName :\\?\usb#vid_05c6&pid_9008#5&2a3bd414&0&6#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :03/19/2014,2.1.1.2

Getting device info. [Connected].....
Serial No.: 0x1D2B2D97
HW_ID     : 0010A0E100730003
MSM ID    : 0x0010A0E1, SM6125-Qualcomm Snapdragon 665/NicobarPkgLAA
MODEL_ID  : 0x0003
OEM_ID    : 0x0073 - VIVO
PBL Ver   : 00000000
PK HASH   : a7df36ffd7ab557c67a6c26675e2795c922cf671308cfd7169bedb84424c862b
Assigned Loader Not Found...
Hydra Enable Auto search Firehose..
 #Please wait...
 #Search by filename filter.....
 #Found 14 Compatible Files ..Found match Firehose...
 
Firehose Loader[0000000000730003_a7df36ffd7ab557c_3227f97c_vivo.fhprg]
--------------------------------------------------
  Header Type    : New
  TargetMSM      : 
  Tag            : 
  Version        : 6
  Code_size      : 816
  Signature_size : 256
  fhVendor       : VIVO
  HW_ID          : 0000000000730003
  Vendor         : VIVO
  OEM_ID         : 0073
  MODEL_ID       : 0003
  SW_ID          : 00000003
  APP_ID         : 00000000
  pk_hash        : a7df36ffd7ab557c67a6c26675e2795c922cf671308cfd7169bedb84424c862bc7b646907dd79989578590fb6370a940
  OEM_VERSION    : compiler02024095
  IMAGE_VARIANT  : NicobarPkgLAA
  QC_VERSION     : BOOT.XF.4.0-00210-NICOBARLAZ-1
--------------------------------------------------

SaharaBoot... Ok
Sending ..............................Ok
Connecting to Firehose...
Ping..................... Ok 
Configuration[FHProt_Auto]........
Identifying Chip........UFS 
Ok
Chip Configuration :
 MemoryName : UFS
 MaxPayloadSizeToTargetInBytes : 1048576
 MaxPayloadSizeToTargetInBytesSupported : 1048576
 MaxPayloadSizeFromTargetInBytes : 
 MaxXMLSizeInBytes : 4096
 TargetName : 
 Version : 1
 DateTime : Sep  9 2020 - 00:57:45

*** STORAGE DEVICE INFO ***
Memory Type         : UFS
Block Size in Bytes : 4096
Page Size           : 4096
Manufacturer ID     : 300
Serial Number       : 1129467726
Firmware Version    : 109
Product Name        : MT128GASAO4U21  0109
Physical Partitions : 6
Total Logical Blocks:
          Drive [0]  30955520[118.086 GB]
          Drive [1]  2048[8 MB]
          Drive [2]  2048[8 MB]
          Drive [3]  8192[32 MB]
          Drive [4]  262144[1024 MB]
          Drive [5]  8192[32 MB]

Protocol : Universal
Running : Ok

Reading GPT[6]
          Drive [0] 32 Items
          Drive [1] 32 Items
          Drive [2] 32 Items
          Drive [3] 32 Items
          Drive [4] 64 Items
          Drive [5] 32 Items

--------------- Reading build.prop content ---------------
build.prop
system
build.prop
  ID             : QP1A.190711.020
  SDK            : 29
  Release        : 10
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-US
  Security Patch : 2022-09-01
  Fingerprint    : vivo/1920V/1920:10/QP1A.190711.020/compiler09051032:user/release-keys
--------------- end of build.prop content ---------------

Auto Backup Security partitions...
Reading Security Items....
 - modemst1(modemst1.bin), 1.996 MB                    = Ok
 - modemst2(modemst2.bin), 1.996 MB                    = Ok
 - fsg(fsg.bin), 1.996 MB                              = Ok
 - fsc(fsc.bin), 124 KB                                = Ok
 - persist(persist.bin), 31.996 MB                     = Ok

C:\Hydra Tool\Backup\QUALBackup\VIVO\0010A0E100731003_1D2B2D97\Auto_Backup\072123173001
Backup Security Success....
Processing Safe Format New - UFS....
 - Formatting Userdata  [Safe Format - UFS] Ok

Rebooting Phone.... Ok

Action Result :  Ok

Elapsed Time : 00:00:19





-- select frp lock remove
-- force erase and click execute

Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 
                     Vivo Service Tool
         Factory Reset Protection(FRP)/Demo Remove
                        Forced Erase
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 

PreOperation Configuration 
 Brand : VIVO Model : Y51 2020 (V2030) Storage : Auto
 Loader: c:\hydra tool\boot\hfirehose\0000000000730003_a7df36ffd7ab557c_3227f97c_vivo.fhprg
 Port  : Auto

 Searching for Qualcomm 9008 Device...Found
 FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM16)
 SymbolicName :\\?\usb#vid_05c6&pid_9008#5&2a3bd414&0&6#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :03/19/2014,2.1.1.2

Getting device info. [Connected].....
Serial No.: 0x1D2B2D97
HW_ID     : 0010A0E100730003
MSM ID    : 0x0010A0E1, SM6125-Qualcomm Snapdragon 665/NicobarPkgLAA
MODEL_ID  : 0x0003
OEM_ID    : 0x0073 - VIVO
PBL Ver   : 00000000
PK HASH   : a7df36ffd7ab557c67a6c26675e2795c922cf671308cfd7169bedb84424c862b
Assigned Loader Not Found...
Hydra Enable Auto search Firehose..
 #Please wait...
 #Search by filename filter.....
 #Found 14 Compatible Files ..Found match Firehose...
 
Firehose Loader[0000000000730003_a7df36ffd7ab557c_3227f97c_vivo.fhprg]
--------------------------------------------------
  Header Type    : New
  TargetMSM      : 
  Tag            : 
  Version        : 6
  Code_size      : 816
  Signature_size : 256
  fhVendor       : VIVO
  HW_ID          : 0000000000730003
  Vendor         : VIVO
  OEM_ID         : 0073
  MODEL_ID       : 0003
  SW_ID          : 00000003
  APP_ID         : 00000000
  pk_hash        : a7df36ffd7ab557c67a6c26675e2795c922cf671308cfd7169bedb84424c862bc7b646907dd79989578590fb6370a940
  OEM_VERSION    : compiler02024095
  IMAGE_VARIANT  : NicobarPkgLAA
  QC_VERSION     : BOOT.XF.4.0-00210-NICOBARLAZ-1
--------------------------------------------------

SaharaBoot... Ok
Sending ..............................Ok
Connecting to Firehose...
Ping..................... Ok 
Configuration[FHProt_Auto]........
Ok
Chip Configuration :
 MemoryName : UFS
 MaxPayloadSizeToTargetInBytes : 1048576
 MaxPayloadSizeToTargetInBytesSupported : 1048576
 MaxPayloadSizeFromTargetInBytes : 
 MaxXMLSizeInBytes : 4096
 TargetName : 
 Version : 1
 DateTime : Sep  9 2020 - 00:57:45

*** STORAGE DEVICE INFO ***
Memory Type         : UFS
Block Size in Bytes : 4096
Page Size           : 4096
Manufacturer ID     : 300
Serial Number       : 1129467726
Firmware Version    : 109
Product Name        : MT128GASAO4U21  0109
Physical Partitions : 6
Total Logical Blocks:
          Drive [0]  30955520[118.086 GB]
          Drive [1]  2048[8 MB]
          Drive [2]  2048[8 MB]
          Drive [3]  8192[32 MB]
          Drive [4]  262144[1024 MB]
          Drive [5]  8192[32 MB]

Protocol : Universal
Running : Ok

Reading GPT[6]
          Drive [0] 32 Items
          Drive [1] 32 Items
          Drive [2] 32 Items
          Drive [3] 32 Items
          Drive [4] 64 Items
          Drive [5] 32 Items

--------------- Reading build.prop content ---------------
build.prop
system
build.prop
  ID             : QP1A.190711.020
  SDK            : 29
  Release        : 10
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-US
  Security Patch : 2022-09-01
  Fingerprint    : vivo/1920V/1920:10/QP1A.190711.020/compiler09051032:user/release-keys
--------------- end of build.prop content ---------------

Auto Backup Security partitions...
Reading Security Items....
 - modemst1(modemst1.bin), 1.996 MB                    = Ok
 - modemst2(modemst2.bin), 1.996 MB                    = Ok
 - fsg(fsg.bin), 1.996 MB                              = Ok
 - fsc(fsc.bin), 124 KB                                = Ok
 - persist(persist.bin), 31.996 MB                     = Ok

C:\Hydra Tool\Backup\QUALBackup\VIVO\0010A0E144730003_1D2B2D97\Auto_Backup\072423173502
Backup Security Success....

Rebooting Phone.... Ok

Action Result :  Ok

Elapsed Time : 00:00:19
  Reply With Quote
The Following User Says Thank You to Unlockinfo For This Useful Post:
Old 07-24-2023, 06:08   #3245 (permalink)
No Life Poster
 
Unlockinfo's Avatar
 
Join Date: Jul 2012
Location: GSMFABRICA-Team
Posts: 3,400
Member: 1785930
Status: Offline
Sonork: 100.1685640
Thanks Meter: 4,819
Vivo Y83 Pro (PD1803F) Factoy Reset by MetaMode with Hdyra Tool

- Reboot phone meta mode
Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 
                  Reboot Function...               
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 

Searching for MTK Device...Found
  MTK Port Type   : Flashmode Preloader
  FriendlyName    : MediaTek PreLoader USB VCOM_V1633 (Android) (COM30)
  Device          : /6&1afede88&0&3
  SymbolicName    : \\?\usb#vid_0e8d&pid_2000#6&1afede88&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 01/22/2015,3.0.1504.0
  Service         : wdm_usb

Openning Port [COM30] Ok

Rebooting phone 
SWITCH TO : META MODE
Done!!!


Elapsed Time : 00:00:03





- Factory reset phone with metamode
Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 
                      Service Function
              Format/Factory Reset/ScreenLock
                    Factory Reset UFS 1 
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 

Searching for MTK Device...Found
  MTK Port Type   : METAMODE Preloader
  FriendlyName    : MediaTek USB VCOM (Android) (COM31)
  Device          : VID_0E8D&PID_2007/6&1afede88&0&3
  SymbolicName    : \??\USB#VID_0E8D&PID_2007#6&1afede88&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 01/22/2015,3.0.1504.0
  Service         : wdm_usb

Openning Port [COM31] Ok

META Phone Info . . .
MCUID: 8U  `    mt6765,S01
ME_SO: S01 
DATE : 
MODEL: 
ME_SWVER: alps-mp-o1.mp6.tc19sp-V2_k62v1.64.bsp_P293 


Rebooting phone
Reboot Done!!!

Action Result :  Ok

Elapsed Time : 00:00:10
  Reply With Quote
The Following User Says Thank You to Unlockinfo For This Useful Post:
Old 07-25-2023, 06:40   #3246 (permalink)
No Life Poster
 
Unlockinfo's Avatar
 
Join Date: Jul 2012
Location: GSMFABRICA-Team
Posts: 3,400
Member: 1785930
Status: Offline
Sonork: 100.1685640
Thanks Meter: 4,819
Oppo Reno 3 (CPH2043) FRP Lock Remove with Hydra Tool


- keep press boot info
Code:
-------------------------------------------------------
To Enable BROM  Mode : 
     Method 1    - Bootkey (Vol + - Power) or any combination
     Method 2    - Enable Preloader to brom(crashing Method)
     Method 3    - Test Point Data0 + ground
To Enable Preloader  Mode : 
     Method 1    - Just Insert cable
-------------------------------------------------------

Searching for MTK Device...Found
  MTK Port Type   : Flashmode BROM 
  FriendlyName    : MediaTek USB Port_V1632 (COM38)
  Device          : /6&36559b33&0&3
  SymbolicName    : \\?\usb#vid_0e8d&pid_0003#6&36559b33&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 01/22/2015,3.0.1504.0
  Service         : wdm_usb

Openning Port [COM38] Ok
Handshaking...Ok
  HwCode          : 0725 {MT6779}
  Hwver           : 0000
  Target config   : E5
  SBC             : 01 (True)
  SLA             : 00 (False)
  DAA             : 04 (True)
  SWJTAG          : 04 (True)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 20 (True)
  MEMWRITE        : 40 (True)
  CMD_C8          : 80 (True)
  Connection      : BROM
  HW Subcode      : 8A00
  HW Subcode      : CA01
  SW Ver          : 0000
  ME_ID           : 2A2E3853A31B55A18D455DC262A9E685
  SOC_ID          : 83CCB0047AAC3A98CCF0016D67A487A14AE64148A58601EC1B9F161FECB50C82

Exploiting Device...
Successfully Exploited..
Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..Found @ 0x00200BC4
Starting to dump...
Prel Size : 0x00054914
Successfully dump preloader..  [C:\Hydra Tool\Boot\PreloaderDump\preloader_k79v1_64.bin]
  Target config   : 00
  SBC             : 00 (False)
  SLA             : 00 (False)
  DAA             : 00 (False)
  SWJTAG          : 00 (False)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 00 (False)
  MEMWRITE        : 00 (False)
  CMD_C8          : 00 (False)
  Connection      : BROM

Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin]
Patching da2 ... Ok
Uploading Stage 1....
Successfully uploaded stage 1, jumping ..
Executing JUMP_DA Address @ 0x00200000
Jumping to 0x00200000 Ok 0xC0
Successfully received DA sync
  ONNECTION_AGENT : brom
  DRAM config needed for : 4B4D3856383030314A4D2D4238313300
Sending auto preloader from dump...  [preloader_k79v1_64.bin]
Sending emi data.. [DRAM setup passed.]
Sending emi data succeeded.
Uploading stage 2...
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
  ERAM Size       : 0x0000000000080000-512 KB
  IRAM Size       : 0x0000000200000000-8 GB
  UFS MID         : 0x4B
  UFS FWVer       : 0x1000
  UFS Blocksize   : 0x0000000000001000-4 KB
  UFS LU0 Size    : 0x0000000000400000-4 MB
  UFS LU1 Size    : 0x0000000000400000-4 MB
  UFS LU2 Size    : 0x0000001DCB000000-119.172 GB
  UFS ID          : 8
  UFS CID         : 4B4D3856383030314A4D2D423831330000000000
  HW-CODE         : 0x725
  HWSUB-CODE      : 0x8A00
  HW-VERSION      : 0xCA01
  SW-VERSION      : 0x0
  CHIP-EVOLUTION  : 0x0
  DA-VERSION      : 1.0
  Speed           : high-speed
Upload data was accepted. Jumping to stage 2...
DA Extensions successfully added 
Reading Partition Table .. 
Partition Count : 55
--------------- Reading build.prop content ---------------
Unable to read system info..
--------------- end of build.prop content ---------------

Reading IMEI........
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------
Backing up Security..
 - preloader(preloader.bin), 512 KB                    = Ok  [preloader_k79v1_64.bin]
  *Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0725_2A2E3853AACC##B55A18D455DC262A9E685\Auto\072023154815\6779_Android_scatter.txt
 - pgpt(pgpt.bin), 32 KB                               = Ok
 - nvram(nvram.bin), 64 MB                             = Ok
 - nvdata(nvdata.bin), 64 MB                           = Ok
 - frp(frp.bin), 1024 KB                               = Ok
 - protect1(protect1.bin), 8.969 MB                    = Ok
 - protect2(protect2.bin), 8 MB                        = Ok
 - persist(persist.bin), 55.5 MB                       = Ok
 - proinfo(proinfo.bin), 3 MB                          = Ok
 - oppo_custom(oppo_custom.bin), 1024 KB               = Ok
 - opporeserve1(opporeserve1.bin), 8 MB                = Ok
 - opporeserve2(opporeserve2.bin), 64 MB               = Ok
 - nvcfg(nvcfg.bin), 32 MB                             = Ok
 - sec1(sec1.bin), 2 MB                                = Ok
 - seccfg(seccfg.bin), 512 KB                          = Ok
 - lk(lk.bin), 5 MB                                    = Ok
Backup Done!!!

Elapsed Time : 00:01:46




- Remove frp lock
Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 
                      Service Function
               Factory Reset Protection[FRP]
                            Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 

Searching for MTK Device...Found
  MTK Port Type   : Flashmode BROM 
  FriendlyName    : MediaTek USB Port_V1632 (COM38)
  Device          : /6&36559b33&0&3
  SymbolicName    : \\?\usb#vid_0e8d&pid_0003#6&36559b33&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 01/22/2015,3.0.1504.0
  Service         : wdm_usb

Openning Port [COM38] Ok
Reading Partition Table .. 
  ERAM Size       : 0x0000000000080000-512 KB
  IRAM Size       : 0x0000000200000000-8 GB
  UFS MID         : 0x4B
  UFS FWVer       : 0x1000
  UFS Blocksize   : 0x0000000000001000-4 KB
  UFS LU0 Size    : 0x0000000000400000-4 MB
  UFS LU1 Size    : 0x0000000000400000-4 MB
  UFS LU2 Size    : 0x0000001DCB000000-119.172 GB
  UFS ID          : 8
  UFS CID         : 4B4D3856383030314A4D2D423831330000000000
  HW-CODE         : 0x725
  HWSUB-CODE      : 0x8A00
  HW-VERSION      : 0xCA01
  SW-VERSION      : 0x0
  CHIP-EVOLUTION  : 0x0
  DA-VERSION      : 1.0
  Speed           : high-speed
Partition Count : 55
--------------- Reading build.prop content ---------------
Unable to read system info..
--------------- end of build.prop content ---------------

Reading IMEI........
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------

Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!

Action Result :  Ok

Elapsed Time : 00:00:23

  Reply With Quote
The Following User Says Thank You to Unlockinfo For This Useful Post:
Old 07-25-2023, 06:43   #3247 (permalink)
No Life Poster
 
Unlockinfo's Avatar
 
Join Date: Jul 2012
Location: GSMFABRICA-Team
Posts: 3,400
Member: 1785930
Status: Offline
Sonork: 100.1685640
Thanks Meter: 4,819
Redmi 7A (pine) Mi Account Remove with Hydra Tool



- keep press boot info


Code:
PreOperation Configuration 
 Brand : XIAOMI Model : Redmi 7A (pine) Storage : Auto
 Loader: 000BF0E100720000_57158eaf1814d78f_e551cac5_XIAOMI_auth_peek_8937.fhprg
 Port  : Auto

 Searching for Qualcomm 9008 Device...Found
 FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM10)
 SymbolicName :\\?\usb#vid_05c6&pid_9008#7&30cfde48&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :03/25/2016,2.1.2.2

Getting device info. [Connected].....
Serial No.: 0x6C9D2F61
HW_ID     : 000BF0E100720000
MSM ID    : 0x000BF0E1, SDM439-Qualcomm Snapdragon 439/FAADANAZA
MODEL_ID  : 0x0000
OEM_ID    : 0x0072 - XIAOMI
PBL Ver   : 00000000
PK HASH   : 57158eaf1814d78fd2b3105ece4db18a817a08ac664a5782a925f3ff8403d39a
 
Firehose Loader[000BF0E100720000_57158eaf1814d78f_e551cac5_XIAOMI_auth_peek_8937.fhprg]
--------------------------------------------------
  Header Type    : OLD
  TargetMSM      : 8937
  Tag            : _auth_peek
  Version        : 3
  Code_size      : 320
  Signature_size : 256
  fhVendor       : XIAOMI
  HW_ID          : 000BF0E100720000
  Vendor         : XIAOMI
  OEM_ID         : 0072
  MODEL_ID       : 0000
  SW_ID          : 0000000100000003
  APP_ID         : 
  pk_hash        : 57158eaf1814d78fd2b3105ece4db18a817a08ac664a5782a925f3ff8403d39a
  OEM_VERSION    : c4-miui-ota-bd104.bj
  IMAGE_VARIANT  : FAADANAZA
  QC_VERSION     : BOOT.BF.3.3.2-00073
--------------------------------------------------

SaharaBoot... Ok
Sending .......................Ok
Connecting to Firehose...
Ping... Ok 
Configuration[FHProt_Auto].
Xiaomi Authentication needed...
Signature Request -> bob[tHIcqS9vSk7BNoMAWbTz1InesQt]
Signature @256bytes Authentication.... Accepted......
Identifying Chip....
Ok
Chip Configuration :
 MemoryName : eMMC
 MaxPayloadSizeToTargetInBytes : 1048576
 MaxPayloadSizeToTargetInBytesSupported : 1048576
 MaxPayloadSizeFromTargetInBytes : 4096
 MaxXMLSizeInBytes : 4096
 TargetName : 8937
 Version : 1

*** STORAGE DEVICE INFO ***
Memory Type         : eMMC
Block Size in Bytes : 512
Page Size           : 512
Manufacturer ID     : 21
Serial Number       : 400805921
Firmware Version    : 4
Product Name        : QD63MB
Physical Partitions : 3
Total Logical Blocks:
          Drive [0]  61071360[29.121 GB]
          Drive [1]  8192[4 MB]
          Drive [2]  8192[4 MB]

Protocol : Universal
Running : Ok

Reading GPT[3]
          Drive [0] 60 Items
          Drive [1] 0 Items
          Drive [2] 0 Items

--------------- Reading build.prop content ---------------
build.prop
system
build.prop
  ID             : QKQ1.191014.001
  SDK            : 29
  Release        : 10
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Locale         : en-GB
  Security Patch : 2021-11-01
--------------- end of build.prop content ---------------

Auto Backup Security partitions...
Reading Security Items....
 - modemst1(modemst1.bin), 8 MB                        = Ok
 - modemst2(modemst2.bin), 8 MB                        = Ok
 - fsg(fsg.bin), 8 MB                                  = Ok
 - fsc(fsc.bin), 7.5 KB                                = Ok
 - persist(persist.bin), 32 MB                         = Ok

C:\Hydra Tool\Backup\QUALBackup\XIAOMI\000BF0E1EE20000_6C9D2F61\Auto_Backup\0720222195247
Backup Security Success....

Elapsed Time : 00:02:07







- Remove mi account
Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 
                        Xiaomi Tool
                         Mi Account
                Remove MiAccount[New Method]
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 

PreOperation Configuration 
 Brand : XIAOMI Model : Redmi 7A (pine) Storage : Auto
 Loader: 000BF0E100720000_57158eaf1814d78f_e551cac5_XIAOMI_auth_peek_8937.fhprg
 Port  : Auto

 Searching for Qualcomm 9008 Device...Found
 FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM10)
 SymbolicName :\\?\usb#vid_05c6&pid_9008#7&30cfde48&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :03/25/2016,2.1.2.2

Getting device info. [Connected].....
Serial No.: 0x6C9D2F61
HW_ID     : 000BF0E100720000
MSM ID    : 0x000BF0E1, SDM439-Qualcomm Snapdragon 439/FAADANAZA
MODEL_ID  : 0x0000
OEM_ID    : 0x0072 - XIAOMI
PBL Ver   : 00000000
PK HASH   : 57158eaf1814d78fd2b3105ece4db18a817a08ac664a5782a925f3ff8403d39a
 
Firehose Loader[000BF0E100720000_57158eaf1814d78f_e551cac5_XIAOMI_auth_peek_8937.fhprg]
--------------------------------------------------
  Header Type    : OLD
  TargetMSM      : 8937
  Tag            : _auth_peek
  Version        : 3
  Code_size      : 320
  Signature_size : 256
  fhVendor       : XIAOMI
  HW_ID          : 000BF0E100720000
  Vendor         : XIAOMI
  OEM_ID         : 0072
  MODEL_ID       : 0000
  SW_ID          : 0000000100000003
  APP_ID         : 
  pk_hash        : 57158eaf1814d78fd2b3105ece4db18a817a08ac664a5782a925f3ff8403d39a
  OEM_VERSION    : c4-miui-ota-bd104.bj
  IMAGE_VARIANT  : FAADANAZA
  QC_VERSION     : BOOT.BF.3.3.2-00073
--------------------------------------------------

SaharaBoot... Ok
Sending .......................Ok
Connecting to Firehose...
Ping... Ok 
Configuration[FHProt_Auto].
Xiaomi Authentication needed...
Signature Request -> bob[mk0Yyp5GlsfZU9u300
Signature @256bytes Authentication.... Accepted......
Ok
Chip Configuration :
 MemoryName : eMMC
 MaxPayloadSizeToTargetInBytes : 1048576
 MaxPayloadSizeToTargetInBytesSupported : 1048576
 MaxPayloadSizeFromTargetInBytes : 4096
 MaxXMLSizeInBytes : 4096
 TargetName : 8937
 Version : 1

*** STORAGE DEVICE INFO ***
Memory Type         : eMMC
Block Size in Bytes : 512
Page Size           : 512
Manufacturer ID     : 21
Serial Number       : 400805921
Firmware Version    : 4
Product Name        : QD63MB
Physical Partitions : 3
Total Logical Blocks:
          Drive [0]  61071360[29.121 GB]
          Drive [1]  8192[4 MB]
          Drive [2]  8192[4 MB]

Protocol : Universal
Running : Ok

Reading GPT[3]
          Drive [0] 60 Items
          Drive [1] 0 Items
          Drive [2] 0 Items

--------------- Reading build.prop content ---------------
build.prop
system
build.prop
  ID             : QKQ1.191014.001
  SDK            : 29
  Release        : 10
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Locale         : en-GB
  Security Patch : 2021-11-01
--------------- end of build.prop content ---------------

Auto Backup Security partitions...
Reading Security Items....
 - modemst1(modemst1.bin), 8 MB                        = Ok
 - modemst2(modemst2.bin), 8 MB                        = Ok
 - fsg(fsg.bin), 8 MB                                  = Ok
 - fsc(fsc.bin), 7.5 KB                                = Ok
 - persist(persist.bin), 32 MB                         = Ok

C:\Hydra Tool\Backup\QUALBackup\XIAOMI\000BF0E100720000_6C9D2F61\Auto_Backup\072023195429
Backup Security Success....
Reading GPT[3]
          Drive [0] 60 Items
          Drive [1] 0 Items
          Drive [2] 0 Items

Backing up Partition for safety...Ok

Scanning Patching address...
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]Done!!
Total Items patched : 74
Successfully patched address..

Action Result :  Ok

Elapsed Time : 00:01:34
  Reply With Quote
The Following User Says Thank You to Unlockinfo For This Useful Post:
Old 07-25-2023, 06:46   #3248 (permalink)
No Life Poster
 
Unlockinfo's Avatar
 
Join Date: Jul 2012
Location: GSMFABRICA-Team
Posts: 3,400
Member: 1785930
Status: Offline
Sonork: 100.1685640
Thanks Meter: 4,819
Samsung A03s (SM-A037G) FRP Lock Remove with Hydra Tool



- First keep press boot info
Code:
-------------------------------------------------------
To Enable BROM  Mode : 
     Method 1    - Bootkey (Vol + - Power) or any combination
     Method 2    - Enable Preloader to brom(crashing Method)
     Method 3    - Test Point Data0 + ground
To Enable Preloader  Mode : 
     Method 1    - Just Insert cable
-------------------------------------------------------

Searching for MTK Device...Found
  MTK Port Type   : Flashmode Preloader
  FriendlyName    : MediaTek PreLoader USB VCOM_V1632 (Android) (COM43)
  Device          : /6&3a34e632&0&1
  SymbolicName    : \\?\usb#vid_0e8d&pid_2000#6&3a34e632&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 01/22/2015,3.0.1504.0
  Service         : wdm_usb

Openning Port [COM43] Ok
Handshaking...Ok
  HwCode          : 0766 {MT6765/MT8768t}
  Hwver           : 0000
  Target config   : 05
  SBC             : 01 (True)
  SLA             : 00 (False)
  DAA             : 04 (True)
  SWJTAG          : 04 (True)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 00 (False)
  MEMWRITE        : 00 (False)
  CMD_C8          : 00 (False)
  Connection      : Preloader
  HW Subcode      : 8A00
  HW Subcode      : CA00
  SW Ver          : 0000
  ME_ID           : 8AAB7E87A4E957A81EE459248D550FE5


- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 
                  Preloader To Brom Function.....               
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 
 - Method 1  Exploit Executed..... [Successfully Crash Preloader.]
Device now is BROM Port
Device not yet filterd...
Executing LibUSB Filter..
Device Now Filtered...Restarting Device Port..

Openning Port [COM57] Ok

Exploiting Device...
Successfully Exploited..
Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..Found @ 0x00200BC4
Starting to dump...
Prel Size : 0x0003DFA8
Successfully dump preloader..  [C:\Hydra Tool\Boot\PreloaderDump\preloader_hs03s.bin]
  Target config   : 00
  SBC             : 00 (False)
  SLA             : 00 (False)
  DAA             : 00 (False)
  SWJTAG          : 00 (False)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 00 (False)
  MEMWRITE        : 00 (False)
  CMD_C8          : 00 (False)
  Connection      : BROM

Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin]
Patching da2 ... Ok
Uploading Stage 1....
Successfully uploaded stage 1, jumping ..
Executing JUMP_DA Address @ 0x00200000
Jumping to 0x00200000 Ok 0xC0
Successfully received DA sync
  ONNECTION_AGENT : brom
  DRAM config needed for : 1501004758364241
Sending auto preloader from dump...  [preloader_hs03s.bin]
Sending emi data.. [DRAM setup passed.]
Sending emi data succeeded.
Uploading stage 2...
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
  ERAM Size       : 0x000000000003A000-232 KB
  IRAM Size       : 0x00000000C0000000-3 GB
  EMMC Boot1 Size : 0x0000000000400000-4 MB
  EMMC Boot2 Size : 0x0000000000400000-4 MB
  EMMC RPMB Size  : 0x0000000001000000-16 MB
  EMMC USER Size  : 0x0000000747C00000-29.121 GB
  EMMC CID        : 15010047583642414200AF5F9B3A481B - GX6BAB
  HW-CODE         : 0x766
  HWSUB-CODE      : 0x8A00
  HW-VERSION      : 0xCA00
  SW-VERSION      : 0x0
  CHIP-EVOLUTION  : 0x0
  DA-VERSION      : 1.0
  Speed           : high-speed
Upload data was accepted. Jumping to stage 2...
DA Extensions successfully added 
Reading Partition Table .. 
Partition Count : 52
--------------- Reading build.prop content ---------------
  Product        : a03s
  ID             : TP1A.220624.014
  SDK            : 33
  Release        : 13
  ABI            : arm64-v8a
  Locale         : en-GB
  Description    : a03snsxx-user 13 TP1A.220624.014 A037GXXS2CWA3 release-keys
  Display ID     : TP1A.220624.014.A037GXXS2CWA3
  Security Patch : 2023-01-01
  StorageType    : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
 IMEI1 : 1F6FF***********
 IMEI2 : 6A3C4***********
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------
Backing up Security..
 - preloader(preloader.bin), 512 KB                    = Ok  [preloader_hs03s.bin]
  *Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0766_8AAB7EEE$$57A81EE459248D550FE5\Auto\072023090950\6765_Android_scatter.txt
 - pgpt(pgpt.bin), 4 MB                                = Ok
 - nvram(nvram.bin), 64 MB                             = Ok
 - nvdata(nvdata.bin), 64 MB                           = Ok
 - frp(frp.bin), 1024 KB                               = Ok
 - persistent(persistent.bin), 512 KB                  = Ok
 - protect1(protect1.bin), 8 MB                        = Ok
 - protect2(protect2.bin), 8 MB                        = Ok
 - persist(persist.bin), 48 MB                         = Ok
 - proinfo(proinfo.bin), 3 MB                          = Ok
 - nvcfg(nvcfg.bin), 32 MB                             = Ok
 - sec1(sec1.bin), 8 MB                                = Ok
 - seccfg(seccfg.bin), 8 MB                            = Ok
 - lk(lk.bin), 2 MB                                    = Ok
Backup Done!!!

Elapsed Time : 00:00:46



- Remove FRP Lock

Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 
                      Service Function
               Factory Reset Protection[FRP]
                            Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 

Searching for MTK Device...Found
  MTK Port Type   : Flashmode BROM 
  FriendlyName    : MediaTek USB Port_V1632 (COM57)
  Device          : /6&3a34e632&0&1
  SymbolicName    : \\?\usb#vid_0e8d&pid_0003#6&3a34e632&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 01/22/2015,3.0.1504.0
  Service         : wdm_usb

Openning Port [COM57] Ok
Reading Partition Table .. 
  ERAM Size       : 0x000000000003A000-232 KB
  IRAM Size       : 0x00000000C0000000-3 GB
  EMMC Boot1 Size : 0x0000000000400000-4 MB
  EMMC Boot2 Size : 0x0000000000400000-4 MB
  EMMC RPMB Size  : 0x0000000001000000-16 MB
  EMMC USER Size  : 0x0000000747C00000-29.121 GB
  EMMC CID        : 15010047583642414200AF5F9B3A481B - GX6BAB
  HW-CODE         : 0x766
  HWSUB-CODE      : 0x8A00
  HW-VERSION      : 0xCA00
  SW-VERSION      : 0x0
  CHIP-EVOLUTION  : 0x0
  DA-VERSION      : 1.0
  Speed           : high-speed
Partition Count : 52
--------------- Reading build.prop content ---------------
  Product        : a03s
  ID             : TP1A.220624.014
  SDK            : 33
  Release        : 13
  ABI            : arm64-v8a
  Locale         : en-GB
  Description    : a03snsxx-user 13 TP1A.220624.014 A037GXXS2CWA3 release-keys
  Display ID     : TP1A.220624.014.A037GXXS2CWA3
  Security Patch : 2023-01-01
  StorageType    : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
 IMEI1 : 1F6FF8*********
 IMEI2 : 6A3C44*********
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------

Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!

Action Result :  Ok

Elapsed Time : 00:00:08

  Reply With Quote
The Following User Says Thank You to Unlockinfo For This Useful Post:
Old 07-25-2023, 06:50   #3249 (permalink)
No Life Poster
 
Unlockinfo's Avatar
 
Join Date: Jul 2012
Location: GSMFABRICA-Team
Posts: 3,400
Member: 1785930
Status: Offline
Sonork: 100.1685640
Thanks Meter: 4,819
Tecno Pop 5 FRP Lock Remove with Hydra Tool

- First Keep press Boot Info
Code:
-------------------------------------------------------
To Enable BROM  Mode : 
     Method 1    - Bootkey (Vol + - Power) or any combination
     Method 2    - Enable Preloader to brom(crashing Method)
     Method 3    - Test Point Data0 + ground
To Enable Preloader  Mode : 
     Method 1    - Just Insert cable
-------------------------------------------------------

Searching for MTK Device...Found
  MTK Port Type   : Flashmode BROM 
  FriendlyName    : MediaTek USB Port_V1633 (COM7)
  Device          : /5&15c311e1&0&6
  SymbolicName    : \\?\usb#vid_0e8d&pid_0003#5&15c311e1&0&6#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 01/22/2015,3.0.1504.0
  Service         : wdm_usb

Openning Port [COM7] Ok
Handshaking...Ok
  HwCode          : 6580 {MT6580}
  Hwver           : 0000
  Target config   : 05
  SBC             : 01 (True)
  SLA             : 00 (False)
  DAA             : 04 (True)
  SWJTAG          : 04 (True)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 00 (False)
  MEMWRITE        : 00 (False)
  CMD_C8          : 00 (False)
  Connection      : BROM
  HW Subcode      : 8A00
  HW Subcode      : CA00
  SW Ver          : 0000
  ME_ID           : C4B49E627088DC4B014245EE84E9B4A4

Exploiting Device...
Successfully Exploited..
Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..Found @ 0x00200B40
Starting to dump...
Prel Size : 0x0001E6F8
Successfully dump preloader..  [C:\Hydra Tool\Boot\PreloaderDump\preloader_k80_bsp.bin]
  Target config   : 00
  SBC             : 00 (False)
  SLA             : 00 (False)
  DAA             : 00 (False)
  SWJTAG          : 00 (False)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 00 (False)
  MEMWRITE        : 00 (False)
  CMD_C8          : 00 (False)
  Connection      : BROM
Uploading legacy da...
DA :MTK_AllInOne_DA_5.2152.bin
Legacy DA2 Patched..
Legacy DA2 CMD F0 is patched.
Successfully uploaded stage 1, jumping ..
Executing JUMP_DA Address @ 0x00200000
Jumping to 0x00200000 Ok
Got loader sync !
Reading Nand Info..
Reading EMMC Info
EMMC_INFO     : 0x00000000
Uploading Stage 2
DRAM config needed for : 51000115413336587DEE034271982ECA
Reading dram nand info ...
Sending dram info ...
RAM-Length:  BC000000
5A
Successfully upload stage 2

Flash and ram info.....
  m_int_sram_ret    : 0x00000000
  m_ext_ram_ret     : 0x00000000
  m_ext_ram_type    : 0x02
  m_ext_ram_chip_select : 0x00
  m_int_sram_ret    : 0x00000000
  m_ext_ram_size    : 0x0000000080000000-2 GB
  Randomid          : 0xEEE0A041D2C130894F2BFD9D0FF66A6D
  m_emmc_ret        : 0x00000000
  m_emmc_boot1_size : 0x0000000000400000-4 MB
  m_emmc_boot2_size : 0x0000000000400000-4 MB
  m_emmc_rpmb_size  : 0x0000000000400000-4 MB
  m_emmc_gp_size[0] : 0x0000000000000000-0 Bytes
  m_emmc_gp_size[1] : 0x0000000000000000-0 Bytes
  m_emmc_gp_size[2] : 0x0000000000000000-0 Bytes
  m_emmc_gp_size[3] : 0x0000000000000000-0 Bytes
  m_emmc_ua_size    : 0x0000000747C00000-29.121 GB
  CID               : 51000115413336587DEE034271982ECA

Checking Connection Speed..
Configuration HighSpeed Switch : True
Full Speed Detected..
Switching To High Speed...
Connected to preloader...
Reconnecting to preloader...
Reading Partition Table .. 
Partition Count : 37

Reading IMEI........

IMEI Info....
 IMEI1 : 353800********
 IMEI2 : 353800********
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------
Backing up Security..
 - preloader(preloader.bin), 512 KB                    = Ok  [preloader_k80_bsp.bin]
  *Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\6580_C4B49E6270844KJ014245EE84E9B4A4\Auto\072023147770726\6580_Android_scatter.txt
 - pgpt(pgpt.bin), 512 KB                              = Ok
 - nvram(nvram.bin), 5 MB                              = Ok
 - nvdata(nvdata.bin), 32 MB                           = Ok
 - frp(frp.bin), 1024 KB                               = Ok
 - protect1(protect1.bin), 10 MB                       = Ok
 - protect2(protect2.bin), 10 MB                       = Ok
 - persist(persist.bin), 48 MB                         = Ok
 - proinfo(proinfo.bin), 3 MB                          = Ok
 - seccfg(seccfg.bin), 256 KB                          = Ok
Backup Done!!!

Elapsed Time : 00:01:15



- FRP Lock Remove
Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 
                      Service Function
               Factory Reset Protection[FRP]
                            Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 

Searching for MTK Device...Found
  MTK Port Type   : Flashmode Preloader
  FriendlyName    : MediaTek DA USB VCOM (Android) (COM25)
  Device          : /5&15c311e1&0&6
  SymbolicName    : \\?\usb#vid_0e8d&pid_2001#5&15c311e1&0&6#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 01/22/2015,3.0.1504.0
  Service         : wdm_usb

Openning Port [COM25] Ok
Reading Partition Table .. 
Partition Count : 37

Reading IMEI........

IMEI Info....
 IMEI1 : 353800*********
 IMEI2 : 353800*********
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------

Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!

Action Result :  Ok

Elapsed Time : 00:00:06

  Reply With Quote
The Following User Says Thank You to Unlockinfo For This Useful Post:
Old 07-25-2023, 06:54   #3250 (permalink)
No Life Poster
 
Unlockinfo's Avatar
 
Join Date: Jul 2012
Location: GSMFABRICA-Team
Posts: 3,400
Member: 1785930
Status: Offline
Sonork: 100.1685640
Thanks Meter: 4,819
Xiaomi Redmi 9A Mi Account Remove with Hydra Tool

- First Keep press Boot Info
- Remove mi account new method
- click execute


Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 
                      Service Function
                           Xiaomi
               Remove MiAccount [New Method]
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 

Searching for MTK Device...Found
  MTK Port Type    Flashmode BROM 
  FriendlyName     MediaTek USB Port_V1633 (COM3)
  Device           5&2f1b43e3&0&1
  SymbolicName     usb#vid_0e8d&pid_0003#5&2f1b43e3&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver       01222015,3.0.1504.0
  Service          wdm_usb

Openning Port [COM3] Ok
Handshaking...Ok
  HwCode           0766 {MT6765MT8768t}
  Hwver            0000
  Target config    E7
  SBC              01 (True)
  SLA              02 (True)
  DAA              04 (True)
  SWJTAG           06 (True)
  EPP              00 (False)
  CERT             00 (False)
  MEMREAD          20 (True)
  MEMWRITE         40 (True)
  CMD_C8           80 (True)
  Connection       BROM
  HW Subcode       8A00
  HW Subcode       CA00
  SW Ver           0000
  ME_ID            0535D57D6EF57799447C38131582A8FF
  SOC_ID           ED3C81239EF43C25108CB1333F15A1F17901ABEFA61D53DC96E4F7B613A88C58

Exploiting Device...
Successfully Exploited..
Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..Found @ 0x00200BC4
Starting to dump...
Prel Size  0x0003B670
Successfully dump preloader..  [CHydra ToolBootPreloaderDumppreloader_k62v1_64_bsp.bin]
  Target config    00
  SBC              00 (False)
  SLA              00 (False)
  DAA              00 (False)
  SWJTAG           00 (False)
  EPP              00 (False)
  CERT             00 (False)
  MEMREAD          00 (False)
  MEMWRITE         00 (False)
  CMD_C8           00 (False)
  Connection       BROM

Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin]
Patching da2 ... Ok
Uploading Stage 1....
Successfully uploaded stage 1, jumping ..
Executing JUMP_DA Address @ 0x00200000
Jumping to 0x00200000 Ok 0xC0
Successfully received DA sync
  ONNECTION_AGENT  brom
  DRAM config needed for  9B01005932503033
Sending auto preloader from dump...  [preloader_k62v1_64_bsp.bin]
Sending emi data.. [DRAM setup passed.]
Sending emi data succeeded.
Uploading stage 2...
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
  ERAM Size        0x000000000003A000-232 KB
  IRAM Size        0x0000000080000000-2 GB
  EMMC Boot1 Size  0x0000000000400000-4 MB
  EMMC Boot2 Size  0x0000000000400000-4 MB
  EMMC RPMB Size   0x0000000001000000-16 MB
  EMMC USER Size   0x0000000747C00000-29,121 GB
  EMMC CID         9B010059325030333200E400990B8883 - Y2P032
  HW-CODE          0x766
  HWSUB-CODE       0x8A00
  HW-VERSION       0xCA00
  SW-VERSION       0x0
  CHIP-EVOLUTION   0x0
  DA-VERSION       1.0
  Speed            high-speed
Upload data was accepted. Jumping to stage 2...
DA Extensions successfully added 
Reading Partition Table .. 
Partition Count  45
--------------- Reading build.prop content ---------------
  Product         dandelion
  Marketname    ro.product.systemRedmi 9A
  ID              QP1A.190711.020
  SDK             29
  Release         10
  ABI             armeabi-v7a
  CPU abilist     armeabi-v7a,armeabi
  Locale          en-GB
  Description     dandelion-user 10 QP1A.190711.020 V12.0.20.0.QCDEUXM release-keys
  Display ID      QP1A.190711.020
  Security Patch  2022-07-01
  StorageType     mtp
--------------- end of build.prop content ---------------

Reading IMEI........
 IMEI1  86751**********
 IMEI2  86751**********
-------------------------------
Bootloader Status...
  Bootloader  Locked
-------------------------------
Backing up Security..
 - preloader(preloader.bin), 512 KB                    = Ok  [preloader_k62v1_64_bsp.bin]
  Creating Scatter file... CHydra ToolBackupMTKBKUP0766_0535D57D6EF57799447C381344442A8FFAuto0720231916306765_Android_scatter.txt
 - pgpt(pgpt.bin), 32 KB                               = Ok
 - nvram(nvram.bin), 64 MB                             = Ok
 - nvdata(nvdata.bin), 64 MB                           = Ok
 - frp(frp.bin), 1024 KB                               = Ok
 - protect1(protect1.bin), 8 MB                        = Ok
 - protect2(protect2.bin), 10,867 MB                   = Ok
 - persist(persist.bin), 48 MB                         = Ok
 - proinfo(proinfo.bin), 3 MB                          = Ok
 - nvcfg(nvcfg.bin), 32 MB                             = Ok
 - sec1(sec1.bin), 2 MB                                = Ok
 - seccfg(seccfg.bin), 8 MB                            = Ok
 - lk(lk.bin), 2 MB                                    = Ok
Backup Done!!!
------------------------------
   Xiaomi Operation Flash Mode..  
------------------------------
Backing up Security..
persist... Ok
vbmeta_system... Ok
vbmeta... Ok
Patching Persist

Scanning Patching address...Please wait...
   Patching address detected [PATCHED]
   Patching address detected [PATCHED]
   Patching address detected [PATCHED]
   Patching address detected [PATCHED]
   Patching address detected [PATCHED]
   Patching address detected [PATCHED]
   Patching address detected [PATCHED]
   Patching address detected [PATCHED]
   Patching address detected [PATCHED]
   Patching address detected [PATCHED]
   Patching address detected [PATCHED]
   Patching address detected [PATCHED]
   Patching address detected [PATCHED]
   Patching address detected [PATCHED]
   Patching address detected [PATCHED]
   Patching address detected [PATCHED]
   Patching address detected [PATCHED]
   Patching address detected [PATCHED]
   Patching address detected [PATCHED]
Total Items patched  19
Successfully patched address..
 -persist .....Ok
Done Writing...
 -vbmeta .....Ok
Done Writing...
 -vbmeta_system .....Ok
Done Writing...
Please wait, processing.....
Status  Ok

Action Result   Ok

Elapsed Time  001028

  Reply With Quote
The Following User Says Thank You to Unlockinfo For This Useful Post:
Old 07-26-2023, 06:10   #3251 (permalink)
No Life Poster
 
Unlockinfo's Avatar
 
Join Date: Jul 2012
Location: GSMFABRICA-Team
Posts: 3,400
Member: 1785930
Status: Offline
Sonork: 100.1685640
Thanks Meter: 4,819
Nokia 2.1 (TA-1080) FRP Lock Remove with Hydra Tool


- first keep press boot info

Code:
PreOperation Configuration 
 Brand : AUTO Model : AUTO Storage : Auto
 Loader: Auto
 Port  : Auto

 Searching for Qualcomm 9008 Device...Found
 FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM35)
 SymbolicName :\\?\usb#vid_05c6&pid_9008#6&2e01eb57&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :08/02/2017,2.1.2.7

Getting device info. [Connected].....
Serial No.: 0x5392420A
HW_ID     : 000560E100000000
MSM ID    : 0x000560E1, MSM8917-Qualcomm Snapdragon 425/LAADANAZA
MODEL_ID  : 0x0000
OEM_ID    : 0x0000 - QUALCOMM
PBL Ver   : 00000000
PK HASH   : f5f4192a33b2830974b400119bab728cc9fe911011f928625c2aed0da441ac97

Hydra Enable Auto search Firehose..
 #Please wait...
 #Search by filename filter.....
 #Found 6 Compatible Files ..Found match Firehose...
 
Firehose Loader[000560e100000000_f5f4192a33b28309_14f05a5c_qualcomm_hmd_peek_8917.fhprg]
--------------------------------------------------
  Header Type    : OLD
  TargetMSM      : 8917
  Tag            : _peek
  Version        : 3
  Code_size      : 288
  Signature_size : 256
  fhVendor       : HMD
  HW_ID          : 000560E100000000
  Vendor         : QUALCOMM
  OEM_ID         : 0000
  MODEL_ID       : 0000
  SW_ID          : 0000000000000003
  APP_ID         : 
  pk_hash        : f5f4192a33b2830974b400119bab728cc9fe911011f928625c2aed0da441ac97
  OEM_VERSION    : cm-build-33
  IMAGE_VARIANT  : LAADANAZA
  QC_VERSION     : BOOT.BF.3.3-00228
--------------------------------------------------

SaharaBoot... Ok
Sending ...................Ok
Connecting to Firehose...
Ping... Ok 
Configuration[FHProt_Auto]......
Identifying Chip....
Ok
Chip Configuration :
 MemoryName : eMMC
 MaxPayloadSizeToTargetInBytes : 1048576
 MaxPayloadSizeToTargetInBytesSupported : 1048576
 MaxPayloadSizeFromTargetInBytes : 4096
 MaxXMLSizeInBytes : 4096
 TargetName : 8917
 Version : 1

*** STORAGE DEVICE INFO ***
Memory Type         : eMMC
Block Size in Bytes : 512
Page Size           : 512
Manufacturer ID     : 144
Serial Number       : 3262435661
Firmware Version    : 165
Product Name        : H8G4a2
Physical Partitions : 3
Total Logical Blocks:
          Drive [0]  15269888[7.281 GB]
          Drive [1]  8192[4 MB]
          Drive [2]  8192[4 MB]

Protocol : Universal
Running : Ok

Reading GPT[3]
          Drive [0] 128 Items
          Drive [1] 0 Items
          Drive [2] 0 Items

--------------- Reading build.prop content ---------------
build.prop
  Brand          : Nokia
  Vendor         : HMD Global
  Model          : Nokia 2.1 2.1
  Product        : E2M
  Manufacturer   : HMD Global
  ID             : OPM1.171019.019
  SDK            : 27
  Release        : 8.1.0
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Locale         : en-GB
  Description    : Dynamo2_00WW-user 8.1.0 OPM1.171019.019 00WW_0_35D release-keys
  Device         : E2M
  Display ID     : 00WW_0_35D
  Security Patch : 2018-10-05
  Fingerprint    : Nokia/Dynamo2_00WW/E2M:8.1.0/OPM1.171019.019/00WW_0_35D:user/release-keys
--------------- end of build.prop content ---------------

Auto Backup Security partitions...
Reading Security Items....
 - modemst1(modemst1.bin), 1.5 MB                      = Ok
 - modemst2(modemst2.bin), 1.5 MB                      = Ok
 - fsg(fsg.bin), 1.5 MB                                = Ok
 - fsc(fsc.bin), 512 Bytes                             = Ok
 - persist(persist.bin), 28 MB                         = Ok

C:\Hydra Tool\Backup\QUALBackup\QUALCOMM\000560E100000000_5392420A\Auto_Backup\072123145311
Backup Security Success....

Elapsed Time : 00:00:47




- FRP Lock Remove
Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 
                   Qualcomm Service Tool
                  Factory Reset Protection
                            Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 

PreOperation Configuration 
 Brand : AUTO Model : AUTO Storage : Auto
 Loader: Auto
 Port  : Auto

 Searching for Qualcomm 9008 Device...Found
 FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM35)
 SymbolicName :\\?\usb#vid_05c6&pid_9008#6&2e01eb57&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :08/02/2017,2.1.2.7

Getting device info. [Connected].Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok 
Configuration[FHProt_Auto]......
Ok
Chip Configuration :
 MemoryName : eMMC
 MaxPayloadSizeToTargetInBytes : 1048576
 MaxPayloadSizeToTargetInBytesSupported : 1048576
 MaxPayloadSizeFromTargetInBytes : 4096
 MaxXMLSizeInBytes : 4096
 TargetName : 8917
 Version : 1

*** STORAGE DEVICE INFO ***
Memory Type         : eMMC
Block Size in Bytes : 512
Page Size           : 512
Manufacturer ID     : 144
Serial Number       : 3262435661
Firmware Version    : 165
Product Name        : H8G4a2
Physical Partitions : 3
Total Logical Blocks:
          Drive [0]  15269888[7.281 GB]
          Drive [1]  8192[4 MB]
          Drive [2]  8192[4 MB]

Protocol : Universal
Running : Ok

Reading GPT[3]
          Drive [0] 128 Items
          Drive [1] 0 Items
          Drive [2] 0 Items

--------------- Reading build.prop content ---------------
build.prop
  Brand          : Nokia
  Vendor         : HMD Global
  Model          : Nokia 2.1 2.1
  Product        : E2M
  Manufacturer   : HMD Global
  ID             : OPM1.171019.019
  SDK            : 27
  Release        : 8.1.0
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Locale         : en-GB
  Description    : Dynamo2_00WW-user 8.1.0 OPM1.171019.019 00WW_0_35D release-keys
  Device         : E2M
  Display ID     : 00WW_0_35D
  Security Patch : 2018-10-05
  Fingerprint    : Nokia/Dynamo2_00WW/E2M:8.1.0/OPM1.171019.019/00WW_0_35D:user/release-keys
--------------- end of build.prop content ---------------
 - Removing FRP
Executing ...
 - Removing FRP [Zero Wipe] OkOk

Rebooting Phone.... Ok

Action Result :  Ok

Elapsed Time : 00:00:09
  Reply With Quote
The Following User Says Thank You to Unlockinfo For This Useful Post:
Old 07-26-2023, 06:14   #3252 (permalink)
No Life Poster
 
Unlockinfo's Avatar
 
Join Date: Jul 2012
Location: GSMFABRICA-Team
Posts: 3,400
Member: 1785930
Status: Offline
Sonork: 100.1685640
Thanks Meter: 4,819
Oppo A57 (CPH1701) Pattern and FRP Lock Remove with Hydra Tool


- First keep press boot info
Code:
PreOperation Configuration 
 Brand : AUTO Model : AUTO Storage : Auto
 Loader: Auto
 Port  : Auto

 Searching for Qualcomm 9008 Device...Found
 FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM13)
 SymbolicName :\\?\usb#vid_05c6&pid_9008#6&2c3ff1f8&0&5#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :03/19/2014,2.1.1.2

Getting device info. [Connected].....
Serial No.: 0xBBE4557A
HW_ID     : 0006B0E100000000
MSM ID    : 0x0006B0E1, MSM8940-Qualcomm Snapdragon 435/FAADANAZA
MODEL_ID  : 0x0000
OEM_ID    : 0x0000 - QUALCOMM
PBL Ver   : 00000000
PK HASH   : 77a22b92a1bcd0c4d3aaa10aa9f1b2c36d51c0ca7429b5201d0fd1d5f5b53bbc

Hydra Enable Auto search Firehose..
 #Please wait...
 #Search by filename filter.....
 #Found 2 Compatible Files ..Found match Firehose...
 
Firehose Loader[0006b0e100000000_77a22b92a1bcd0c4_08d850f8_qualcomm_oppo_peek_8937.fhprg]
--------------------------------------------------
  Header Type    : OLD
  TargetMSM      : 8937
  Tag            : _peek
  Version        : 3
  Code_size      : 288
  Signature_size : 256
  fhVendor       : OPPO
  HW_ID          : 0006B0E100000000
  Vendor         : QUALCOMM
  OEM_ID         : 0000
  MODEL_ID       : 0000
  SW_ID          : 0000000000000003
  APP_ID         : 
  pk_hash        : 77a22b92a1bcd0c4d3aaa10aa9f1b2c36d51c0ca7429b5201d0fd1d5f5b53bbc
  OEM_VERSION    : ubuntu-121-238
  IMAGE_VARIANT  : FAADANAZA
  QC_VERSION     : BOOT.BF.3.3-00184
--------------------------------------------------

SaharaBoot... Ok
Sending ....................Ok
Connecting to Firehose...
Ping... Ok 
Configuration[FHProt_Auto]......
Identifying Chip....
Ok
Chip Configuration :
 MemoryName : eMMC
 MaxPayloadSizeToTargetInBytes : 1048576
 MaxPayloadSizeToTargetInBytesSupported : 1048576
 MaxPayloadSizeFromTargetInBytes : 4096
 MaxXMLSizeInBytes : 4096
 TargetName : 8937
 Version : 1

*** STORAGE DEVICE INFO ***
Memory Type         : eMMC
Block Size in Bytes : 512
Page Size           : 512
Manufacturer ID     : 144
Serial Number       : 849496369
Firmware Version    : 165
Product Name        : HBG4a2
Physical Partitions : 3
Total Logical Blocks:
          Drive [0]  61071360[29.121 GB]
          Drive [1]  8192[4 MB]
          Drive [2]  8192[4 MB]

Protocol : Universal
Running : Ok

Reading GPT[3]
          Drive [0] 56 Items
          Drive [1] 0 Items
          Drive [2] 4 Items

--------------- Reading build.prop content ---------------
build.prop
  Brand          : OPPO
  Vendor         : OPPO
  Model          : CPH1701
  Product        : CPH1701
  Manufacturer   : OPPO
  ID             : MMB29M
  SDK            : 23
  Release        : 6.0.1
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-US
  Description    : msm8937_64-user 6.0.1 MMB29M eng.root.20180806.181819 release-keys
  Device         : CPH1701
  Display ID     : CPH1701EX_11_A.34_180806
  Security Patch : 2018-05-05
  Platform       : msm8937
--------------- end of build.prop content ---------------

Auto Backup Security partitions...
Reading Security Items....
 - modemst1(modemst1.bin), 1.5 MB                      = Ok
 - modemst2(modemst2.bin), 1.5 MB                      = Ok
 - fsg(fsg.bin), 1.5 MB                                = Ok
 - fsc(fsc.bin), 512 Bytes                             = Ok
 - oppodycnvbk(oppodycnvbk.bin), 10 MB                 = Ok
 - oppostanvbk(oppostanvbk.bin), 10 MB                 = Ok
 - persist(persist.bin), 32 MB                         = Ok

C:\Hydra Tool\Backup\QUALBackup\QUALCOMM\0006B0E100000000_BBE4557A\Auto_Backup\072123103636
Backup Security Success....

Elapsed Time : 00:01:23





- select ultrapower (auto) and click execute

Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 
                   Qualcomm Service Tool
                        Ultra Power
                            Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 

PreOperation Configuration 
 Brand : AUTO Model : AUTO Storage : Auto
 Loader: Auto
 Port  : Auto

 Searching for Qualcomm 9008 Device...Found
 FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM13)
 SymbolicName :\\?\usb#vid_05c6&pid_9008#6&2c3ff1f8&0&5#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :03/19/2014,2.1.1.2

Getting device info. [Connected].Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok 
Configuration[FHProt_Auto]......
Ok
Chip Configuration :
 MemoryName : eMMC
 MaxPayloadSizeToTargetInBytes : 1048576
 MaxPayloadSizeToTargetInBytesSupported : 1048576
 MaxPayloadSizeFromTargetInBytes : 4096
 MaxXMLSizeInBytes : 4096
 TargetName : 8937
 Version : 1

*** STORAGE DEVICE INFO ***
Memory Type         : eMMC
Block Size in Bytes : 512
Page Size           : 512
Manufacturer ID     : 144
Serial Number       : 849496369
Firmware Version    : 165
Product Name        : HBG4a2
Physical Partitions : 3
Total Logical Blocks:
          Drive [0]  61071360[29.121 GB]
          Drive [1]  8192[4 MB]
          Drive [2]  8192[4 MB]

Protocol : Universal
Running : Ok

Reading GPT[3]
          Drive [0] 56 Items
          Drive [1] 0 Items
          Drive [2] 4 Items

--------------- Reading build.prop content ---------------
build.prop
  Brand          : OPPO
  Vendor         : OPPO
  Model          : CPH1701
  Product        : CPH1701
  Manufacturer   : OPPO
  ID             : MMB29M
  SDK            : 23
  Release        : 6.0.1
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-US
  Description    : msm8937_64-user 6.0.1 MMB29M eng.root.20180806.181819 release-keys
  Device         : CPH1701
  Display ID     : CPH1701EX_11_A.34_180806
  Security Patch : 2018-05-05
  Platform       : msm8937
--------------- end of build.prop content ---------------
 - Removing FRP
Executing ...
 - Removing FRP [Zero Wipe] OkOk
 - Formatting Userdata
Executing ...
 - Formatting Userdata  [Safe Format - eMMc] OkOk

Rebooting Phone.... Ok

Action Result :  Ok

Elapsed Time : 00:00:06

  Reply With Quote
The Following User Says Thank You to Unlockinfo For This Useful Post:
Old 07-26-2023, 06:16   #3253 (permalink)
No Life Poster
 
Unlockinfo's Avatar
 
Join Date: Jul 2012
Location: GSMFABRICA-Team
Posts: 3,400
Member: 1785930
Status: Offline
Sonork: 100.1685640
Thanks Meter: 4,819
Redmi Note 5A FRP Lock Remove with Hydra Tool



- keep press boot info

Code:
PreOperation Configuration 
 Brand : AUTO Model : AUTO Storage : Auto
 Loader: Auto
 Port  : Auto

 Searching for Qualcomm 9008 Device...Found
 FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM21)
 SymbolicName :\\?\usb#vid_05c6&pid_9008#5&78a4f37&0&13#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :08/02/2017,2.1.2.7

Getting device info. [Connected].....
Serial No.: 0x210D5962
HW_ID     : 000560E100000000
MSM ID    : 0x000560E1, MSM8917-Qualcomm Snapdragon 425/LAADANAZA
MODEL_ID  : 0x0000
OEM_ID    : 0x0000 - QUALCOMM
PBL Ver   : 00000000
PK HASH   : 57158eaf1814d78fd2b3105ece4db18a817a08ac664a5782a925f3ff8403d39a

Hydra Enable Auto search Firehose..
 #Please wait...
 #Search by filename filter.....
 #Found 42 Compatible Files ..Found match Firehose...
 
Firehose Loader[000560e100000000_57158eaf1814d78f_01740d29_qualcomm_xiaomi_peek_8917.fhprg]
--------------------------------------------------
  Header Type    : OLD
  TargetMSM      : 8917
  Tag            : _peek
  Version        : 3
  Code_size      : 288
  Signature_size : 256
  fhVendor       : XIAOMI
  HW_ID          : 000560E100000000
  Vendor         : QUALCOMM
  OEM_ID         : 0000
  MODEL_ID       : 0000
  SW_ID          : 0000000000000003
  APP_ID         : 
  pk_hash        : 57158eaf1814d78fd2b3105ece4db18a817a08ac664a5782a925f3ff8403d39a
  OEM_VERSION    : c3-miui-ota-bd102.bj
  IMAGE_VARIANT  : LAADANAZA
  QC_VERSION     : BOOT.BF.3.3-00214
--------------------------------------------------

SaharaBoot... Ok
Sending ...................Ok
Connecting to Firehose...
Ping... Ok 
Configuration[FHProt_Auto]......
Identifying Chip....
Ok
Chip Configuration :
 MemoryName : eMMC
 MaxPayloadSizeToTargetInBytes : 1048576
 MaxPayloadSizeToTargetInBytesSupported : 1048576
 MaxPayloadSizeFromTargetInBytes : 4096
 MaxXMLSizeInBytes : 4096
 TargetName : 8917
 Version : 1

*** STORAGE DEVICE INFO ***
Memory Type         : eMMC
Block Size in Bytes : 512
Page Size           : 512
Manufacturer ID     : 144
Serial Number       : 862049366
Firmware Version    : 165
Product Name        : HAG4a2
Physical Partitions : 3
Total Logical Blocks:
          Drive [0]  30777344[14,676 GB]
          Drive [1]  8192[4 MB]
          Drive [2]  8192[4 MB]

Protocol : Universal
Running : Ok

Reading GPT[3]
          Drive [0] 48 Items
          Drive [1] 0 Items
          Drive [2] 0 Items

--------------- Reading build.prop content ---------------
build.prop
  Brand          : xiaomi
  Model          : Redmi Note 5A
  Product        : ugglite
  ID             : N2G47H
  SDK            : 25
  Release        : 7.1.2
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-GB
  Description    : ugglite-user 7.1.2 N2G47H V10.3.1.0.NDFMIXM release-keys
  Device         : ugglite
  Display ID     : N2G47H
  Security Patch : 2019-06-01
  Platform       : msm8937
  Fingerprint    : xiaomi/ugglite/ugglite:7.1.2/N2G47H/V10.3.1.0.NDFMIXM:user/release-keys
--------------- end of build.prop content ---------------

Auto Backup Security partitions...
Reading Security Items....
 - modemst1(modemst1.bin), 1,5 MB                      = Ok
 - modemst2(modemst2.bin), 1,5 MB                      = Ok
 - fsg(fsg.bin), 1,5 MB                                = Ok
 - fsc(fsc.bin), 512 Bytes                             = Ok
 - persist(persist.bin), 32 MB                         = Ok

C:\Hydra Tool\Backup\QUALBackup\QUALCOMM\000560E100000000_210D5962\Auto_Backup\072123160643
Backup Security Success....

Elapsed Time : 00:00:09





- FRP Lock Remove
Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 
                   Qualcomm Service Tool
                  Factory Reset Protection
                            Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 

PreOperation Configuration 
 Brand : AUTO Model : AUTO Storage : Auto
 Loader: Auto
 Port  : Auto

 Searching for Qualcomm 9008 Device...Found
 FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM21)
 SymbolicName :\\?\usb#vid_05c6&pid_9008#5&78a4f37&0&13#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :08/02/2017,2.1.2.7

Getting device info. [Connected].Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok 
Configuration[FHProt_Auto]......
Ok
Chip Configuration :
 MemoryName : eMMC
 MaxPayloadSizeToTargetInBytes : 1048576
 MaxPayloadSizeToTargetInBytesSupported : 1048576
 MaxPayloadSizeFromTargetInBytes : 4096
 MaxXMLSizeInBytes : 4096
 TargetName : 8917
 Version : 1

*** STORAGE DEVICE INFO ***
Memory Type         : eMMC
Block Size in Bytes : 512
Page Size           : 512
Manufacturer ID     : 144
Serial Number       : 862049366
Firmware Version    : 165
Product Name        : HAG4a2
Physical Partitions : 3
Total Logical Blocks:
          Drive [0]  30777344[14,676 GB]
          Drive [1]  8192[4 MB]
          Drive [2]  8192[4 MB]

Protocol : Universal
Running : Ok

Reading GPT[3]
          Drive [0] 48 Items
          Drive [1] 0 Items
          Drive [2] 0 Items

--------------- Reading build.prop content ---------------
build.prop
  Brand          : xiaomi
  Model          : Redmi Note 5A
  Product        : ugglite
  ID             : N2G47H
  SDK            : 25
  Release        : 7.1.2
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-GB
  Description    : ugglite-user 7.1.2 N2G47H V10.3.1.0.NDFMIXM release-keys
  Device         : ugglite
  Display ID     : N2G47H
  Security Patch : 2019-06-01
  Platform       : msm8937
  Fingerprint    : xiaomi/ugglite/ugglite:7.1.2/N2G47H/V10.3.1.0.NDFMIXM:user/release-keys
--------------- end of build.prop content ---------------
 - Removing FRP
Executing ...
 - Removing FRP [Zero Wipe] OkOk

Action Result :  Ok

Elapsed Time : 00:00:03
  Reply With Quote
The Following User Says Thank You to Unlockinfo For This Useful Post:
Old 07-26-2023, 06:19   #3254 (permalink)
No Life Poster
 
Unlockinfo's Avatar
 
Join Date: Jul 2012
Location: GSMFABRICA-Team
Posts: 3,400
Member: 1785930
Status: Offline
Sonork: 100.1685640
Thanks Meter: 4,819
Redmi Note 8 Pro MI Account Remove with Hydra Tool


- First keep press boot info
- Mi Account remove (new Method)
- Click Execute

Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 
                      Service Function
                           Xiaomi
               Remove MiAccount [New Method]
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 

Searching for MTK Device...Found
  MTK Port Type   : Flashmode BROM 
  FriendlyName    : MediaTek USB Port (COM9)
  Device          : /6&688a3b8&0&3
  SymbolicName    : \\?\usb#vid_0e8d&pid_0003#6&688a3b8&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 09/11/2014,3.0.1437.1
  Service         : wdm_usb

Openning Port [COM9] Ok
Handshaking...Ok
  HwCode          : 0813 {MT6785}
  Hwver           : 0000
  Target config   : E7
  SBC             : 01 (True)
  SLA             : 02 (True)
  DAA             : 04 (True)
  SWJTAG          : 06 (True)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 20 (True)
  MEMWRITE        : 40 (True)
  CMD_C8          : 80 (True)
  Connection      : BROM
  HW Subcode      : 8A00
  HW Subcode      : CA00
  SW Ver          : 0000
  ME_ID           : 42B030465B6BED58EBBEB5D9A9D77358
  SOC_ID          : 69B498F206FAC72468C7C721DE1BBFA7B73A41AC3D7EDF8446B552142A228152

Exploiting Device...
Successfully Exploited..
Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..Found @ 0x00200BC4
Starting to dump...
Prel Size : 0x0004ED68
Successfully dump preloader..  [C:\Hydra Tool\Boot\PreloaderDump\preloader_begonia.bin]
  Target config   : 00
  SBC             : 00 (False)
  SLA             : 00 (False)
  DAA             : 00 (False)
  SWJTAG          : 00 (False)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 00 (False)
  MEMWRITE        : 00 (False)
  CMD_C8          : 00 (False)
  Connection      : BROM

Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin]
Patching da2 ... Ok
Uploading Stage 1....
Successfully uploaded stage 1, jumping ..
Executing JUMP_DA Address @ 0x00200000
Jumping to 0x00200000 Ok 0xC0
Successfully received DA sync
  ONNECTION_AGENT : brom
  DRAM config needed for : 4839485131364145434D4D4441520000
Sending auto preloader from dump...  [preloader_begonia.bin]
Sending emi data.. [DRAM setup passed.]
Sending emi data succeeded.
Uploading stage 2...
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
  ERAM Size       : 0x0000000000080000-512 KB
  IRAM Size       : 0x0000000180000000-6 GB
  UFS MID         : 0x48
  UFS FWVer       : 0xA107
  UFS Blocksize   : 0x0000000000001000-4 KB
  UFS LU0 Size    : 0x0000000000400000-4 MB
  UFS LU1 Size    : 0x0000000000400000-4 MB
  UFS LU2 Size    : 0x0000001DCB000000-119.172 GB
  UFS ID          : H
  UFS CID         : 4839485131364145434D4D444152000000000000
  HW-CODE         : 0x813
  HWSUB-CODE      : 0x8A00
  HW-VERSION      : 0xCA00
  SW-VERSION      : 0x0
  CHIP-EVOLUTION  : 0x0
  DA-VERSION      : 1.0
  Speed           : high-speed
Upload data was accepted. Jumping to stage 2...
DA Extensions successfully added 
Reading Partition Table .. 
Partition Count : 49
--------------- Reading build.prop content ---------------
  Product        : begonia
  Marketname   : ro.product.systemRedmi Note 8 Pro
  ID             : RP1A.200720.011
  SDK            : 30
  Release        : 11
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-GB
  Description    : begonia-user 11 RP1A.200720.011 V12.5.4.0.RGGEUXM release-keys
  Display ID     : RP1A.200720.011
  Security Patch : 2021-10-01
  StorageType    : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
 IMEI1 : 866685*********
 IMEI2 : 866685*********
-------------------------------
Bootloader Status...
  Bootloader : Unlocked
-------------------------------
Backing up Security..
 - preloader(preloader.bin), 512 KB                    = Ok  [preloader_begonia.bin]
  *Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0813_42B030465B6CCDD33358EBBEB5D9A9D77358\Auto\072123160015\6785_Android_scatter.txt
 - pgpt(pgpt.bin), 32 KB                               = Ok
 - nvram(nvram.bin), 64 MB                             = Ok
 - nvdata(nvdata.bin), 64 MB                           = Ok
 - frp(frp.bin), 1024 KB                               = Ok
 - protect1(protect1.bin), 8 MB                        = Ok
 - protect2(protect2.bin), 8 MB                        = Ok
 - persist(persist.bin), 70.469 MB                     = Ok
 - proinfo(proinfo.bin), 3 MB                          = Ok
 - nvcfg(nvcfg.bin), 32 MB                             = Ok
 - sec1(sec1.bin), 2 MB                                = Ok
 - seccfg(seccfg.bin), 8 MB                            = Ok
 - lk(lk.bin), 2 MB                                    = Ok
Backup Done!!!
------------------------------
   Xiaomi Operation Flash Mode..  
------------------------------
Backing up Security..
persist... Ok
vbmeta... Ok
Patching Persist

Scanning Patching address...Please wait...
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
Total Items patched : 128
Successfully patched address..
 -persist .....Ok
Done Writing...
 -vbmeta .....Ok
Done Writing...
Please wait, processing.....
Status:  Ok

Action Result :  Ok

Elapsed Time : 00:09:36
  Reply With Quote
The Following User Says Thank You to Unlockinfo For This Useful Post:
Old 07-26-2023, 06:25   #3255 (permalink)
No Life Poster
 
Unlockinfo's Avatar
 
Join Date: Jul 2012
Location: GSMFABRICA-Team
Posts: 3,400
Member: 1785930
Status: Offline
Sonork: 100.1685640
Thanks Meter: 4,819
Vivo Y12 Pattern and FRP Lock Remove with Hydra Tool



- Keep press boot info
Code:
-------------------------------------------------------
To Enable BROM  Mode : 
     Method 1    - Bootkey (Vol + - Power) or any combination
     Method 2    - Enable Preloader to brom(crashing Method)
     Method 3    - Test Point Data0 + ground
To Enable Preloader  Mode : 
     Method 1    - Just Insert cable
-------------------------------------------------------

Searching for MTK Device...Found
  MTK Port Type   : Flashmode BROM 
  FriendlyName    : MediaTek USB Port_V1632 (COM30)
  Device          : /7&d3e40fc&0&4
  SymbolicName    : \\?\usb#vid_0e8d&pid_0003#7&d3e40fc&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 01/22/2015,3.0.1504.0
  Service         : wdm_usb

Openning Port [COM30] Ok
Handshaking...Ok
  HwCode          : 0766 {MT6765/MT8768t}
  Hwver           : 0000
  Target config   : E5
  SBC             : 01 (True)
  SLA             : 00 (False)
  DAA             : 04 (True)
  SWJTAG          : 04 (True)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 20 (True)
  MEMWRITE        : 40 (True)
  CMD_C8          : 80 (True)
  Connection      : BROM
  HW Subcode      : 8A00
  HW Subcode      : CA00
  SW Ver          : 0000
  ME_ID           : 4C1C9483396F7B19FC5FCAE43EE9DA94
  SOC_ID          : C2ECB3A739701F253CAD1698A1A83C8713C057858DD82B3B48CCED68DEC55AD5

Exploiting Device...
Successfully Exploited..
Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..
Not Found
  Target config   : 00
  SBC             : 00 (False)
  SLA             : 00 (False)
  DAA             : 00 (False)
  SWJTAG          : 00 (False)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 00 (False)
  MEMWRITE        : 00 (False)
  CMD_C8          : 00 (False)
  Connection      : BROM

Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin]
Patching da2 ... Ok
Uploading Stage 1....
Successfully uploaded stage 1, jumping ..
Executing JUMP_DA Address @ 0x00200000
Jumping to 0x00200000 Ok 0xC0
Successfully received DA sync
  ONNECTION_AGENT : brom
  DRAM config needed for : 150100475036424D
Sending auto preloader from dump... 
Hydra Auto Preloader Search Enabled..
Hydra will find compatible preloader files...
-----------------------------
Found 14 Compatible Preloaders..
-----------------------------
 1-preloader_cereus.bin...Sending... [DRAM setup passed.] [Ok]
-----------------------------
Sending emi data succeeded.
Uploading stage 2...
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
  ERAM Size       : 0x000000000003A000-232 KB
  IRAM Size       : 0x00000000C0000000-3 GB
  EMMC Boot1 Size : 0x0000000000400000-4 MB
  EMMC Boot2 Size : 0x0000000000400000-4 MB
  EMMC RPMB Size  : 0x0000000001000000-16 MB
  EMMC USER Size  : 0x0000000E8F800000-58.242 GB
  EMMC CID        : 150100475036424D42011247E4D5A6B3 - GP6BMB
  HW-CODE         : 0x766
  HWSUB-CODE      : 0x8A00
  HW-VERSION      : 0xCA00
  SW-VERSION      : 0x0
  CHIP-EVOLUTION  : 0x0
  DA-VERSION      : 1.0
  Speed           : high-speed
Upload data was accepted. Jumping to stage 2...
DA Extensions successfully added 
Reading Partition Table .. 
Partition Count : 44
--------------- Reading build.prop content ---------------
  Product        : k62v1_64_bsp
  ID             : RP1A.200720.012
  SDK            : 30
  Release        : 11
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-US
  Description    : full_k62v1_64_bsp-user 11 RP1A.200720.012 eng.compil.20230322.112912 release-keys
  Display ID     : RP1A.200720.012 release-keys
  Security Patch : 2022-05-01
  StorageType    : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
 IMEI1 : 86091**********
 IMEI2 : 86091**********
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------
Backing up Security..
 - preloader(preloader.bin), 512 KB                    = Ok  [preloader_k62v1_64_bsp.bin]
  *Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0766_4C1C94996F7B19FC5FCAE43EE9DA94\Auto\07219205401\6765_Android_scatter.txt
 - pgpt(pgpt.bin), 32 KB                               = Ok
 - nvram(nvram.bin), 64 MB                             = Ok
 - nvdata(nvdata.bin), 64 MB                           = Ok
 - frp(frp.bin), 1024 KB                               = Ok
 - protect1(protect1.bin), 8 MB                        = Ok
 - protect2(protect2.bin), 13.469 MB                   = Ok
 - persist(persist.bin), 48 MB                         = Ok
 - proinfo(proinfo.bin), 3 MB                          = Ok
 - nvcfg(nvcfg.bin), 32 MB                             = Ok
 - sec1(sec1.bin), 2 MB                                = Ok
 - seccfg(seccfg.bin), 8 MB                            = Ok
 - lk(lk.bin), 5 MB                                    = Ok
Backup Done!!!

Elapsed Time : 00:00:44




- Select factory reset and click execute
Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 
                      Service Function
              Format/Factory Reset/ScreenLock
                            Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 

Searching for MTK Device...Found
  MTK Port Type   : Flashmode BROM 
  FriendlyName    : MediaTek USB Port_V1632 (COM30)
  Device          : /7&d3e40fc&0&4
  SymbolicName    : \\?\usb#vid_0e8d&pid_0003#7&d3e40fc&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 01/22/2015,3.0.1504.0
  Service         : wdm_usb

Openning Port [COM30] Ok
Reading Partition Table .. 
  ERAM Size       : 0x000000000003A000-232 KB
  IRAM Size       : 0x00000000C0000000-3 GB
  EMMC Boot1 Size : 0x0000000000400000-4 MB
  EMMC Boot2 Size : 0x0000000000400000-4 MB
  EMMC RPMB Size  : 0x0000000001000000-16 MB
  EMMC USER Size  : 0x0000000E8F800000-58.242 GB
  EMMC CID        : 150100475036424D42011247E4D5A6B3 - GP6BMB
  HW-CODE         : 0x766
  HWSUB-CODE      : 0x8A00
  HW-VERSION      : 0xCA00
  SW-VERSION      : 0x0
  CHIP-EVOLUTION  : 0x0
  DA-VERSION      : 1.0
  Speed           : high-speed
Partition Count : 44
--------------- Reading build.prop content ---------------
  Product        : k62v1_64_bsp
  ID             : RP1A.200720.012
  SDK            : 30
  Release        : 11
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-US
  Description    : full_k62v1_64_bsp-user 11 RP1A.200720.012 eng.compil.20230322.112912 release-keys
  Display ID     : RP1A.200720.012 release-keys
  Security Patch : 2022-05-01
  StorageType    : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
 IMEI1 : 86091**********
 IMEI2 : 86091**********
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------
------------------------------
   Factory Reset Flash Mode..  
------------------------------
Operation : Safeformat Universal...

Action Result :  Ok

Elapsed Time : 00:00:04





- Select Remove FRP Lock and click Execute
Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 
                      Service Function
               Factory Reset Protection[FRP]
                            Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 

Searching for MTK Device...Found
  MTK Port Type   : Flashmode BROM 
  FriendlyName    : MediaTek USB Port_V1632 (COM30)
  Device          : /7&d3e40fc&0&4
  SymbolicName    : \\?\usb#vid_0e8d&pid_0003#7&d3e40fc&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 01/22/2015,3.0.1504.0
  Service         : wdm_usb

Openning Port [COM30] Ok
Reading Partition Table .. 
  ERAM Size       : 0x000000000003A000-232 KB
  IRAM Size       : 0x00000000C0000000-3 GB
  EMMC Boot1 Size : 0x0000000000400000-4 MB
  EMMC Boot2 Size : 0x0000000000400000-4 MB
  EMMC RPMB Size  : 0x0000000001000000-16 MB
  EMMC USER Size  : 0x0000000E8F800000-58.242 GB
  EMMC CID        : 150100475036424D42011247E4D5A6B3 - GP6BMB
  HW-CODE         : 0x766
  HWSUB-CODE      : 0x8A00
  HW-VERSION      : 0xCA00
  SW-VERSION      : 0x0
  CHIP-EVOLUTION  : 0x0
  DA-VERSION      : 1.0
  Speed           : high-speed
Partition Count : 44
--------------- Reading build.prop content ---------------
  Product        : k62v1_64_bsp
  ID             : RP1A.200720.012
  SDK            : 30
  Release        : 11
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-US
  Description    : full_k62v1_64_bsp-user 11 RP1A.200720.012 eng.compil.20230322.112912 release-keys
  Display ID     : RP1A.200720.012 release-keys
  Security Patch : 2022-05-01
  StorageType    : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
 IMEI1 : 860919*********
 IMEI2 : 860919*********
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------

Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!

Action Result :  Ok

Elapsed Time : 00:00:05

  Reply With Quote
The Following User Says Thank You to Unlockinfo For This Useful Post:
Reply

Bookmarks

Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


 



All times are GMT +1. The time now is 01:00.



Powered by Searchlight © 2024 Axivo Inc.
vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2024 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2023 -
Page generated in 0.51798 seconds with 9 queries

SEO by vBSEO