|
Welcome to the GSM-Forum forums. You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. Only registered members may post questions, contact other members or search our database of over 8 million posts. Registration is fast, simple and absolutely free so please - Click to REGISTER! If you have any problems with the registration process or your account login, please contact contact us . |
|
Register | FAQ | Donate | Forum Rules | Root any Device | ★iPhone Unlock★ | ★ Direct Codes ★ | Direct Unlock Source | Search | Today's Posts | Mark Forums Read |
| LinkBack | Thread Tools | Display Modes |
07-31-2023, 06:14 | #3271 (permalink) |
No Life Poster Join Date: Jul 2012 Location: GSMFABRICA-Team
Posts: 3,400
Member: 1785930 Status: Offline Sonork: 100.1685640 Thanks Meter: 4,821 | - Keep press boot info Code: ------------------------------------------------------- To Enable BROM Mode : Method 1 - Bootkey (Vol + - Power) or any combination Method 2 - Enable Preloader to brom(crashing Method) Method 3 - Test Point Data0 + ground To Enable Preloader Mode : Method 1 - Just Insert cable ------------------------------------------------------- Searching for MTK Device...Found MTK Port Type : Flashmode BROM FriendlyName : MediaTek USB Port_V1632 (COM40) Device : /6&2bbff36a&0&3 SymbolicName : \\?\usb#vid_0e8d&pid_0003#6&2bbff36a&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver : 01/22/2015,3.0.1504.0 Service : wdm_usb Openning Port [COM40] Ok Handshaking...Ok HwCode : 0766 {MT6765/MT8768t} Hwver : 0000 Target config : E5 SBC : 01 (True) SLA : 00 (False) DAA : 04 (True) SWJTAG : 04 (True) EPP : 00 (False) CERT : 00 (False) MEMREAD : 20 (True) MEMWRITE : 40 (True) CMD_C8 : 80 (True) Connection : BROM HW Subcode : 8A00 HW Subcode : CA00 SW Ver : 0000 ME_ID : 0D397390757A15D9DA5B64964B4E57D5 SOC_ID : 2C30B820CC9EA73B49DE936F8ACC58EB8D0D8CC8CEB4C45FFC8EFA20D25558D0 Exploiting Device... Successfully Exploited.. Handshaking...Ok Dumping Preloader from Bootrom.. Seeking preloader address.. Not Found Target config : 00 SBC : 00 (False) SLA : 00 (False) DAA : 00 (False) SWJTAG : 00 (False) EPP : 00 (False) CERT : 00 (False) MEMREAD : 00 (False) MEMWRITE : 00 (False) CMD_C8 : 00 (False) Connection : BROM Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin] Patching da2 ... Ok Uploading Stage 1.... Successfully uploaded stage 1, jumping .. Executing JUMP_DA Address @ 0x00200000 Jumping to 0x00200000 Ok 0xC0 Successfully received DA sync ONNECTION_AGENT : brom DRAM config needed for : 150100524436344D Sending auto preloader from dump... Hydra Auto Preloader Search Enabled.. Hydra will find compatible preloader files... ----------------------------- Found 10 Compatible Preloaders.. ----------------------------- 1-preloader_blackjack_64.bin...Sending... [DRAM setup passed.] [Ok] ----------------------------- Sending emi data succeeded. Uploading stage 2... Upload data was accepted. Jumping to stage 2... Successfully uploaded stage 2 ERAM Size : 0x000000000003A000-232 KB IRAM Size : 0x0000000100000000-4 GB EMMC Boot1 Size : 0x0000000000400000-4 MB EMMC Boot2 Size : 0x0000000000400000-4 MB EMMC RPMB Size : 0x0000000000400000-4 MB EMMC USER Size : 0x0000000747C00000-29.121 GB EMMC CID : 150100524436344D42017128CEE61511 - RD64MB HW-CODE : 0x766 HWSUB-CODE : 0x8A00 HW-VERSION : 0xCA00 SW-VERSION : 0x0 CHIP-EVOLUTION : 0x0 DA-VERSION : 1.0 Speed : high-speed Upload data was accepted. Jumping to stage 2... DA Extensions successfully added Reading Partition Table .. Partition Count : 45 --------------- Reading build.prop content --------------- Brand : vivo Vendor : vivo Model : vivo 1726 Product : k62v1_64_bsp Manufacturer : vivo ID : O11019 SDK : 27 Release : 8.1.0 ABI : arm64-v8a CPU abilist : arm64-v8a,armeabi-v7a,armeabi Locale : en-US Description : full_k62v1_64_bsp-user 8.1.0 O11019 1661156809 release-keys Device : PD1803F_EX Display ID : O11019 release-keys Security Patch : 2021-03-01 Platform : =MTK6765 Fingerprint : vivo/1726/1726:8.1.0/O11019/1661156809:user/release-keys StorageType : mtp --------------- end of build.prop content --------------- Reading IMEI........ IMEI1 : 8699380********* IMEI2 : 8699380********* ------------------------------- Bootloader Status... Bootloader : Locked ------------------------------- Backing up Security.. - preloader(preloader.bin), 512 KB = Ok [preloader_k62v1_64_bsp.bin] *Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0766_0D397390757A15D9DVVDDD64964B4E57D5\Auto\072423173411\6765_Android_scatter.txt - pgpt(pgpt.bin), 32 KB = Ok - nvram(nvram.bin), 64 MB = Ok - nvdata(nvdata.bin), 64 MB = Ok - frp(frp.bin), 1024 KB = Ok - protect1(protect1.bin), 8 MB = Ok - protect2(protect2.bin), 15.469 MB = Ok - persist(persist.bin), 48 MB = Ok - proinfo(proinfo.bin), 3 MB = Ok - nvcfg(nvcfg.bin), 32 MB = Ok - sec1(sec1.bin), 2 MB = Ok - seccfg(seccfg.bin), 8 MB = Ok - lk(lk.bin), 5 MB = Ok Backup Done!!! Elapsed Time : 00:01:21 - Service Function - Ultra Power - Rebuild Userdata Code: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Service Function Ultra Power Rebuild Userdata - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Searching for MTK Device...Found MTK Port Type : Flashmode BROM FriendlyName : MediaTek USB Port_V1632 (COM40) Device : /6&2bbff36a&0&3 SymbolicName : \\?\usb#vid_0e8d&pid_0003#6&2bbff36a&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver : 01/22/2015,3.0.1504.0 Service : wdm_usb Openning Port [COM40] Ok Reading Partition Table .. EMMC Boot1 Size : 0x0000000000400000-4 MB EMMC Boot2 Size : 0x0000000000400000-4 MB EMMC RPMB Size : 0x0000000000400000-4 MB EMMC USER Size : 0x0000000747C00000-29.121 GB EMMC CID : 150100524436344D42017128CEE61511 - RD64MB HW-CODE : 0x766 HWSUB-CODE : 0x8A00 HW-VERSION : 0xCA00 SW-VERSION : 0x0 CHIP-EVOLUTION : 0x0 DA-VERSION : 1.0 Speed : high-speed Partition Count : 45 --------------- Reading build.prop content --------------- Brand : vivo Vendor : vivo Model : vivo 1726 Product : k62v1_64_bsp Manufacturer : vivo ID : O11019 SDK : 27 Release : 8.1.0 ABI : arm64-v8a CPU abilist : arm64-v8a,armeabi-v7a,armeabi Locale : en-US Description : full_k62v1_64_bsp-user 8.1.0 O11019 1661156809 release-keys Device : PD1803F_EX Display ID : O11019 release-keys Security Patch : 2021-03-01 Platform : =MTK6765 Fingerprint : vivo/1726/1726:8.1.0/O11019/1661156809:user/release-keys StorageType : mtp --------------- end of build.prop content --------------- Reading IMEI........ IMEI1 : 86993********** IMEI2 : 86993********** ------------------------------- Bootloader Status... Bootloader : Locked ------------------------------- --------------------------- Ultra Power --------------------------- Formatting Userdata : Operation : MTK_FUDRebuild Ok Removing FRP : Ok Rebooting Device... Reboot Option : RebootToNormal Rebooting Operation Done!!!! Action Result : Ok Elapsed Time : 00:00:08 |
The Following User Says Thank You to Unlockinfo For This Useful Post: |
08-01-2023, 06:24 | #3272 (permalink) |
No Life Poster Join Date: Jul 2012 Location: GSMFABRICA-Team
Posts: 3,400
Member: 1785930 Status: Offline Sonork: 100.1685640 Thanks Meter: 4,821 | Lenovo TB-8505X FRP Lock Remove With Hydra Tool - First Keep press boot info Code: ------------------------------------------------------- To Enable BROM Mode : Method 1 - Bootkey (Vol + - Power) or any combination Method 2 - Enable Preloader to brom(crashing Method) Method 3 - Test Point Data0 + ground To Enable Preloader Mode : Method 1 - Just Insert cable ------------------------------------------------------- Searching for MTK Device...Found MTK Port Type : Flashmode BROM FriendlyName : MediaTek USB Port_V1632 (COM12) Device : /6&2e01eb57&0&3 SymbolicName : \\?\usb#vid_0e8d&pid_0003#6&2e01eb57&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver : 01/22/2015,3.0.1504.0 Service : wdm_usb Openning Port [COM12] Ok Handshaking...Ok HwCode : 0717 {MT6761/MT6762/MT3369/MT8766B} Hwver : 0000 Target config : E5 SBC : 01 (True) SLA : 00 (False) DAA : 04 (True) SWJTAG : 04 (True) EPP : 00 (False) CERT : 00 (False) MEMREAD : 20 (True) MEMWRITE : 40 (True) CMD_C8 : 80 (True) Connection : BROM HW Subcode : 8A00 HW Subcode : CA01 SW Ver : 0200 ME_ID : 93D1A6B02D18898A1A09FC266ADD9D6D SOC_ID : D3F6399C6DB30E02435157090A7871E263CC1276D3700D8BBFDC647E31E1A33E Exploiting Device... Successfully Exploited.. Handshaking...Ok Dumping Preloader from Bootrom.. Seeking preloader address..Found @ 0x00200BC4 Starting to dump... Prel Size : 0x00037F68 Successfully dump preloader.. [C:\Hydra Tool\Boot\PreloaderDump\preloader_akita_row_call.bin] Target config : 00 SBC : 00 (False) SLA : 00 (False) DAA : 00 (False) SWJTAG : 00 (False) EPP : 00 (False) CERT : 00 (False) MEMREAD : 00 (False) MEMWRITE : 00 (False) CMD_C8 : 00 (False) Connection : BROM Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin] Patching da2 ... Ok Uploading Stage 1.... Successfully uploaded stage 1, jumping .. Executing JUMP_DA Address @ 0x00200000 Jumping to 0x00200000 Ok 0xC0 Successfully received DA sync ONNECTION_AGENT : brom DRAM config needed for : 1501005158363341 Sending auto preloader from dump... [preloader_akita_row_call.bin] Sending emi data.. [DRAM setup passed.] Sending emi data succeeded. Uploading stage 2... Upload data was accepted. Jumping to stage 2... Successfully uploaded stage 2 ERAM Size : 0x000000000003A500-233.25 KB IRAM Size : 0x0000000080000000-2 GB EMMC Boot1 Size : 0x0000000000400000-4 MB EMMC Boot2 Size : 0x0000000000400000-4 MB EMMC RPMB Size : 0x0000000000400000-4 MB EMMC USER Size : 0x0000000747C00000-29.121 GB EMMC CID : 150100515836334142039863D41C28EB - QX63AB HW-CODE : 0x717 HWSUB-CODE : 0x8A00 HW-VERSION : 0xCA01 SW-VERSION : 0x200 CHIP-EVOLUTION : 0x0 DA-VERSION : 1.0 Speed : high-speed Upload data was accepted. Jumping to stage 2... DA Extensions successfully added Reading Partition Table .. Partition Count : 42 --------------- Reading build.prop content --------------- Product : akita_row_call ID : QP1A.190711.020 SDK : 29 Release : 10 ABI : arm64-v8a CPU abilist : arm64-v8a,armeabi-v7a,armeabi Description : full_akita_row_call-user 10 QP1A.190711.020 TB-8505X_U release-keys Display ID : TB-8505X_S300686_220706_BMP Security Patch : 2022-07-05 StorageType : mtp --------------- end of build.prop content --------------- Reading IMEI........ IMEI1 : ************ IMEI2 : ************ ------------------------------- Bootloader Status... Bootloader : Locked ------------------------------- Backing up Security.. - preloader(preloader.bin), 512 KB = Ok [preloader_akita_row_call.bin] *Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0717_93D1A6B02DDSSWW33R8A1A09FC266ADD9D6D\Auto\072523093020\6761_Android_scatter.txt - pgpt(pgpt.bin), 32 KB = Ok - nvram(nvram.bin), 64 MB = Ok - nvdata(nvdata.bin), 64 MB = Ok - frp(frp.bin), 1024 KB = Ok - protect1(protect1.bin), 8 MB = Ok - protect2(protect2.bin), 9.469 MB = Ok - persist(persist.bin), 48 MB = Ok - proinfo(proinfo.bin), 3 MB = Ok - nvcfg(nvcfg.bin), 32 MB = Ok - sec1(sec1.bin), 2 MB = Ok - seccfg(seccfg.bin), 8 MB = Ok - lk(lk.bin), 1024 KB = Ok Backup Done!!! Elapsed Time : 00:01:24 - Service Function - Factory Reset Protection[FRP] - Auto Code: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Service Function Factory Reset Protection[FRP] Auto - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Searching for MTK Device...Found MTK Port Type : Flashmode BROM FriendlyName : MediaTek USB Port_V1632 (COM12) Device : /6&2e01eb57&0&3 SymbolicName : \\?\usb#vid_0e8d&pid_0003#6&2e01eb57&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver : 01/22/2015,3.0.1504.0 Service : wdm_usb Openning Port [COM12] Ok Reading Partition Table .. ERAM Size : 0x000000000003A500-233.25 KB IRAM Size : 0x0000000080000000-2 GB EMMC Boot1 Size : 0x0000000000400000-4 MB EMMC Boot2 Size : 0x0000000000400000-4 MB EMMC RPMB Size : 0x0000000000400000-4 MB EMMC USER Size : 0x0000000747C00000-29.121 GB EMMC CID : 150100515836334142039863D41C28EB - QX63AB HW-CODE : 0x717 HWSUB-CODE : 0x8A00 HW-VERSION : 0xCA01 SW-VERSION : 0x200 CHIP-EVOLUTION : 0x0 DA-VERSION : 1.0 Speed : high-speed Partition Count : 42 --------------- Reading build.prop content --------------- Product : akita_row_call ID : QP1A.190711.020 SDK : 29 Release : 10 ABI : arm64-v8a CPU abilist : arm64-v8a,armeabi-v7a,armeabi Description : full_akita_row_call-user 10 QP1A.190711.020 TB-8505X_U release-keys Display ID : TB-8505X_S300686_220706_BMP Security Patch : 2022-07-05 StorageType : mtp --------------- end of build.prop content --------------- Reading IMEI........ IMEI1 : ************** IMEI2 : ************** ------------------------------- Bootloader Status... Bootloader : Locked ------------------------------- Action Result : Ok Elapsed Time : 00:00:07 |
The Following User Says Thank You to Unlockinfo For This Useful Post: |
08-01-2023, 06:26 | #3273 (permalink) |
No Life Poster Join Date: Jul 2012 Location: GSMFABRICA-Team
Posts: 3,400
Member: 1785930 Status: Offline Sonork: 100.1685640 Thanks Meter: 4,821 | Realme C2 (RMX1941) Pattern and frp lock remove with Hydra Tool Code: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Service Function Ultra Power Auto - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Searching for MTK Device...Found MTK Port Type : Flashmode BROM FriendlyName : MediaTek USB Port_V1632 (COM15) Device : /5&78a4f37&0&13 SymbolicName : \\?\usb#vid_0e8d&pid_0003#5&78a4f37&0&13#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver : 01/22/2015,3.0.1504.0 Service : wdm_usb Openning Port [COM15] Ok Reading Partition Table .. ERAM Size : 0x000000000003A000-232 KB IRAM Size : 0x00000000C0000000-3 GB EMMC Boot1 Size : 0x0000000000400000-4 MB EMMC Boot2 Size : 0x0000000000400000-4 MB EMMC RPMB Size : 0x0000000000400000-4 MB EMMC USER Size : 0x0000000747C00000-29,121 GB EMMC CID : 150100444436384D420296F5DE0A6617 - DD68MB HW-CODE : 0x766 HWSUB-CODE : 0x8A00 HW-VERSION : 0xCA00 SW-VERSION : 0x0 CHIP-EVOLUTION : 0x0 DA-VERSION : 1.0 Speed : high-speed Partition Count : 44 --------------- Reading build.prop content --------------- Vendor : OPPO Manufacturer : OPPO ID : PPR1.180610.011 SDK : 28 Release : 9 ABI : arm64-v8a CPU abilist : arm64-v8a,armeabi-v7a,armeabi Locale : en-US Description : full_oppo6765_19581-user 9 PPR1.180610.011 eng.root.20210309.210105 release-keys Security Patch : 2021-03-05 StorageType : mtp --------------- end of build.prop content --------------- Reading IMEI........ IMEI1 : 86160******** IMEI2 : 86160******** ------------------------------- Bootloader Status... Bootloader : Locked ------------------------------- --------------------------- Ultra Power --------------------------- Formatting Userdata : Operation : Safeformat Universal... Ok Removing FRP : Ok Rebooting Device... Reboot Option : OperationDone Rebooting Operation Done!!!! Action Result : Ok Elapsed Time : 00:00:04 |
The Following User Says Thank You to Unlockinfo For This Useful Post: |
08-01-2023, 06:30 | #3274 (permalink) |
No Life Poster Join Date: Jul 2012 Location: GSMFABRICA-Team
Posts: 3,400
Member: 1785930 Status: Offline Sonork: 100.1685640 Thanks Meter: 4,821 | Ulefone Note 9P FRP Lock Remove with Hydra Tool - First Keep press boot info Code: ------------------------------------------------------- To Enable BROM Mode : Method 1 - Bootkey (Vol + - Power) or any combination Method 2 - Enable Preloader to brom(crashing Method) Method 3 - Test Point Data0 + ground To Enable Preloader Mode : Method 1 - Just Insert cable ------------------------------------------------------- Searching for MTK Device...Found MTK Port Type : Flashmode Preloader FriendlyName : MediaTek PreLoader USB VCOM (Android) (COM31) Device : /5&1c6a400a&0&8 SymbolicName : \\?\usb#vid_0e8d&pid_2000#5&1c6a400a&0&8#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver : 01/22/2016,3.2 Service : wdm_usb Openning Port [COM31] Ok Handshaking...Ok HwCode : 0766 {MT6765/MT8768t} Hwver : 0000 Target config : 00 SBC : 00 (False) SLA : 00 (False) DAA : 00 (False) SWJTAG : 00 (False) EPP : 00 (False) CERT : 00 (False) MEMREAD : 00 (False) MEMWRITE : 00 (False) CMD_C8 : 00 (False) Connection : Preloader HW Subcode : 8A00 HW Subcode : CA00 SW Ver : 0000 ME_ID : FF114F221CAC3C9B8DDB75D1370F418C - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Preloader To Brom Function..... - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Method 1 Exploit Executed..... [Failed] - Method 2 Exploit Executed..... [Failed] - Method 3 Exploit Executed..... [Failed] Preloader still in preloader mode... Connection : Preloader Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin] Uploading Stage 1.... Successfully uploaded stage 1, jumping .. Executing JUMP_DA Address @ 0x00200000 Jumping to 0x00200000 Ok 0xC0 Successfully received DA sync ONNECTION_AGENT : preloader DRAM config needed for : 13014E53304A394B Uploading stage 2... Upload data was accepted. Jumping to stage 2... Successfully uploaded stage 2 ERAM Size : 0x000000000003A000-232 KB IRAM Size : 0x0000000100000000-4 GB EMMC Boot1 Size : 0x0000000000400000-4 MB EMMC Boot2 Size : 0x0000000000400000-4 MB EMMC RPMB Size : 0x0000000001000000-16 MB EMMC USER Size : 0x0000000E8F800000-58.242 GB EMMC CID : 13014E53304A394B3810003600DE7591 - S0J9K8 HW-CODE : 0x766 HWSUB-CODE : 0x8A00 HW-VERSION : 0xCA00 SW-VERSION : 0x0 CHIP-EVOLUTION : 0x0 DA-VERSION : 1.0 Speed : high-speed Reading Partition Table .. Partition Count : 41 --------------- Reading build.prop content --------------- Product : Note_9P_EEA ID : QP1A.190711.020 SDK : 29 Release : 10 ABI : arm64-v8a CPU abilist : arm64-v8a,armeabi-v7a,armeabi Locale : en-US Description : full_k62v1_64_bsp-user 10 QP1A.190711.020 mp1V9176 release-keys Display ID : Note_9P_SH1_EEA_V01 Security Patch : 2020-06-05 StorageType : mtp --------------- end of build.prop content --------------- Reading IMEI........ IMEI1 : 3520*********** IMEI2 : 3520*********** ------------------------------- Bootloader Status... Bootloader : Locked ------------------------------- Backing up Security.. - preloader(preloader.bin), 512 KB = Ok [preloader_k62v1_64_bsp.bin] *Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0766_FF114F22SSDD22343C9B8DDB75D1370F418C\Auto\072523102719\6765_Android_scatter.txt - pgpt(pgpt.bin), 32 KB = Ok - nvram(nvram.bin), 64 MB = Ok - nvdata(nvdata.bin), 64 MB = Ok - frp(frp.bin), 1024 KB = Ok - protect1(protect1.bin), 8 MB = Ok - protect2(protect2.bin), 10.867 MB = Ok - persist(persist.bin), 48 MB = Ok - proinfo(proinfo.bin), 3 MB = Ok - nvcfg(nvcfg.bin), 32 MB = Ok - sec1(sec1.bin), 2 MB = Ok - seccfg(seccfg.bin), 8 MB = Ok - lk(lk.bin), 1024 KB = Ok Backup Done!!! Elapsed Time : 00:00:29 - FRP Lock Remove Code: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Service Function Factory Reset Protection[FRP] Auto - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Searching for MTK Device...Found MTK Port Type : Flashmode Preloader FriendlyName : MediaTek PreLoader USB VCOM (Android) (COM31) Device : /5&1c6a400a&0&8 SymbolicName : \\?\usb#vid_0e8d&pid_2000#5&1c6a400a&0&8#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver : 01/22/2016,3.2 Service : wdm_usb Openning Port [COM31] Ok Reading Partition Table .. ERAM Size : 0x000000000003A000-232 KB IRAM Size : 0x0000000100000000-4 GB EMMC Boot1 Size : 0x0000000000400000-4 MB EMMC Boot2 Size : 0x0000000000400000-4 MB EMMC RPMB Size : 0x0000000001000000-16 MB EMMC USER Size : 0x0000000E8F800000-58.242 GB EMMC CID : 13014E53304A394B3810003600DE7591 - S0J9K8 HW-CODE : 0x766 HWSUB-CODE : 0x8A00 HW-VERSION : 0xCA00 SW-VERSION : 0x0 CHIP-EVOLUTION : 0x0 DA-VERSION : 1.0 Speed : high-speed Partition Count : 41 --------------- Reading build.prop content --------------- Product : Note_9P_EEA ID : QP1A.190711.020 SDK : 29 Release : 10 ABI : arm64-v8a CPU abilist : arm64-v8a,armeabi-v7a,armeabi Locale : en-US Description : full_k62v1_64_bsp-user 10 QP1A.190711.020 mp1V9176 release-keys Display ID : Note_9P_SH1_EEA_V01 Security Patch : 2020-06-05 StorageType : mtp --------------- end of build.prop content --------------- Reading IMEI........ IMEI1 : 3520********** IMEI2 : 3520********** ------------------------------- Bootloader Status... Bootloader : Locked ------------------------------- Rebooting Device... Reboot Option : RebootToNormal Rebooting Operation Done!!!! Action Result : Ok Elapsed Time : 00:00:04 |
The Following User Says Thank You to Unlockinfo For This Useful Post: |
08-01-2023, 06:33 | #3275 (permalink) |
No Life Poster Join Date: Jul 2012 Location: GSMFABRICA-Team
Posts: 3,400
Member: 1785930 Status: Offline Sonork: 100.1685640 Thanks Meter: 4,821 | Vivo V7 Plus (PD1708F) FRP Lock Remove with Hydra Tool Code: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Vivo Service Tool Factory Reset Protection(FRP)/Demo Remove Zero Wipe - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - PreOperation Configuration Brand : VIVO Model : V7 Plus (PD1708F) Storage : Auto Loader: 0009a0e100000000_60ba997fef6da9f0_e66632e0_qualcomm_vivo_peek_8953.fhprg Port : Auto Searching for Qualcomm 9008 Device...Found FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM6) SymbolicName :\\?\usb#vid_05c6&pid_9008#5&1f3e3f24&0&9#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver :08/02/2017,2.1.2.7 Getting device info. [Connected]..... Serial No.: 0xFFD4C203 HW_ID : 0009A0E100000000 MSM ID : 0x0009A0E1, SDM450-Qualcomm Snapdragon 450/JAADANAZA MODEL_ID : 0x0000 OEM_ID : 0x0000 - QUALCOMM PBL Ver : 00000000 PK HASH : 60ba997fef6da9f05885fa11f1dd6d2a90d052a257a09c2075d7246cc73c0d43 Firehose Loader[0009a0e100000000_60ba997fef6da9f0_e66632e0_qualcomm_vivo_peek_8953.fhprg] -------------------------------------------------- Header Type : OLD TargetMSM : 8953 Tag : _peek Version : 3 Code_size : 288 Signature_size : 256 fhVendor : VIVO HW_ID : 0009A0E100000000 Vendor : QUALCOMM OEM_ID : 0000 MODEL_ID : 0000 SW_ID : 0000000000000003 APP_ID : pk_hash : 60ba997fef6da9f05885fa11f1dd6d2a90d052a257a09c2075d7246cc73c0d43 OEM_VERSION : compiler033 IMAGE_VARIANT : JAADANAZA QC_VERSION : BOOT.BF.3.3-00221 -------------------------------------------------- SaharaBoot... Ok Sending ..................Ok Connecting to Firehose... Ping... Ok Configuration[FHProt_Auto]...... Identifying Chip.... Ok Chip Configuration : MemoryName : eMMC MaxPayloadSizeToTargetInBytes : 1048576 MaxPayloadSizeToTargetInBytesSupported : 1048576 MaxPayloadSizeFromTargetInBytes : 4096 MaxXMLSizeInBytes : 4096 TargetName : 8953 Version : 1 *** STORAGE DEVICE INFO *** Memory Type : eMMC Block Size in Bytes : 512 Page Size : 512 Manufacturer ID : 21 Serial Number : 1288621082 Firmware Version : 21 Product Name : RH64AB Physical Partitions : 3 Total Logical Blocks: Drive [0] 122142720[58,242 GB] Drive [1] 8192[4 MB] Drive [2] 8192[4 MB] Protocol : Universal Running : Ok Reading GPT[3] Drive [0] 56 Items Drive [1] 0 Items Drive [2] 0 Items --------------- Reading build.prop content --------------- build.prop Brand : vivo Vendor : vivo Model : vivo 1716 Product : msm8953_64 Manufacturer : vivo ID : OPM1.171019.026 SDK : 27 Release : 8.1.0 ABI : arm64-v8a CPU abilist : arm64-v8a,armeabi-v7a,armeabi Locale : en-US Description : msm8953_64-user 8.1.0 OPM1.171019.026 eng.compil.20210507.122248 release-keys Device : msm8953_64 Display ID : OPM1.171019.026 release-keys Security Patch : 2021-03-01 Platform : msm8953 Fingerprint : vivo/1716/1716:8.1.0/OPM1.171019.026/compil05071222:user/release-keys --------------- end of build.prop content --------------- Auto Backup Security partitions... Reading Security Items.... - modemst1(modemst1.bin), 1,5 MB = Ok - modemst2(modemst2.bin), 1,5 MB = Ok - fsg(fsg.bin), 1,5 MB = Ok - fsc(fsc.bin), 512 Bytes = Ok - persist(persist.bin), 32 MB = Ok C:\Hydra Tool\Backup\QUALBackup\QUALCOMM\0009A0E100000000_FFD4C203\Auto_Backup\072523210600 Backup Security Success.... Rebooting Phone.... Ok Action Result : Ok Elapsed Time : 00:00:07 |
The Following User Says Thank You to Unlockinfo For This Useful Post: |
08-01-2023, 06:34 | #3276 (permalink) |
No Life Poster Join Date: Jul 2012 Location: GSMFABRICA-Team
Posts: 3,400
Member: 1785930 Status: Offline Sonork: 100.1685640 Thanks Meter: 4,821 | Xiaomi Redmi Note 12 Flashing Done with Hydra Tool - Connect phone fastboot mode - select firmware and write fastboot method Code: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Qualcomm Flashing Function...... - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Searching Device By Fastboot Device Found... - persist[0](persist.img), 32 MB Skipped - super[0](super.img), 6.903 GB = Ok - vbmeta_system_a[0](vbmeta_system.img), 4 KB = Ok - metadata[0](metadata.img), 44.074 KB = Ok - rescue[0](rescue.img), 40.074 KB = Ok - opcust[0](opcust.img), 60.098 KB = Ok - opconfig[0](opconfig.img), 40.074 KB = Ok - userdata[0](userdata.img), 670.317 MB = Ok - xbl_a[0](xbl.elf), 2.965 MB = Ok - xbl_config_a[0](xbl_config.elf), 63.895 KB = Ok - xbl_b[0](xbl.elf), 2.965 MB = Ok - xbl_config_b[0](xbl_config.elf), 63.895 KB = Ok - rpm_a[0](rpm.mbn), 246.758 KB = Ok - tz_a[0](tz.mbn), 3.309 MB = Ok - hyp_a[0](hyp.mbn), 386.383 KB = Ok - modem_a[0](NON-HLOS.bin), 164.863 MB = Ok - bluetooth_a[0](BTFM.bin), 908 KB = Ok - abl_a[0](abl.elf), 204 KB = Ok - dsp_a[0](dspso.bin), 32 MB = Ok - keymaster_a[0](km41.mbn), 261.201 KB = Ok - boot_a[0](boot.img), 128 MB = Ok - devcfg_a[0](devcfg.mbn), 46.055 KB = Ok - qupfw_a[0](qupv3fw.elf), 55.927 KB = Ok - vbmeta_a[0](vbmeta.img), 8 KB = Ok - dtbo_a[0](dtbo.img), 8 MB = Ok - imagefv_a[0](imagefv.elf), 1.996 MB = Ok - core_nhlos_a[0](Core_NON-HLOS.bin), 122.061 MB = Ok - uefisecapp_a[0](uefi_sec.mbn), 121.771 KB = Ok - featenabler_a[0](featenabler.mbn), 84.282 KB = Ok - vendor_boot_a[0](vendor_boot.img), 96 MB = Ok - featenabler_b[0](featenabler.mbn), 84.282 KB = Ok - cust[0](cust.img), 1.443 GB = Ok - logfs[0](logfs_ufs_8mb.bin), 16 KB = Ok - storsec[0](storsec.mbn), 20.088 KB = Ok - fsgall[0](fsgall.img), 4.669 MB = Ok Elapsed Time : 00:11:49 |
The Following User Says Thank You to Unlockinfo For This Useful Post: |
08-02-2023, 04:50 | #3277 (permalink) |
No Life Poster Join Date: Jul 2012 Location: GSMFABRICA-Team
Posts: 3,400
Member: 1785930 Status: Offline Sonork: 100.1685640 Thanks Meter: 4,821 | Casper VIA P3 FRP Lock Remove with Hydra Tool - first keep press boot info - after boot info never disconnect phone - select frp lock and click execute Code: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Service Function Factory Reset Protection[FRP] Auto - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Searching for MTK Device...Found MTK Port Type : Flashmode BROM FriendlyName : MediaTek USB Port_V1633 (COM16) Device : /7&a154d4e&0&2 SymbolicName : \\?\usb#vid_0e8d&pid_0003#7&a154d4e&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver : 01/22/2015,3.0.1504.0 Service : wdm_usb Openning Port [COM16] Ok Handshaking...Ok HwCode : 0788 {MT6771/MT8385/MT8183/MT8666} Hwver : 0000 Target config : 00 SBC : 00 (False) SLA : 00 (False) DAA : 00 (False) SWJTAG : 00 (False) EPP : 00 (False) CERT : 00 (False) MEMREAD : 00 (False) MEMWRITE : 00 (False) CMD_C8 : 00 (False) Connection : BROM HW Subcode : 8A00 HW Subcode : CA00 SW Ver : 0000 ME_ID : 846F1D336D0C21DC41A97FA344848DB3 SOC_ID : 939F416E234531D8A59AA8730E6FD7EF51723D658084BA2F6447C1FCED3DC75D Exploiting Device... Successfully Exploited.. Handshaking...Ok Dumping Preloader from Bootrom.. Seeking preloader address..Found @ 0x00200BC4 Starting to dump... Prel Size : 0x00042270 Successfully dump preloader.. [C:\Hydra Tool\Boot\PreloaderDump\preloader_x005_k71v1_64_bsp.bin] Target config : 00 SBC : 00 (False) SLA : 00 (False) DAA : 00 (False) SWJTAG : 00 (False) EPP : 00 (False) CERT : 00 (False) MEMREAD : 00 (False) MEMWRITE : 00 (False) CMD_C8 : 00 (False) Connection : BROM Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin] Patching da2 ... Ok Uploading Stage 1.... Successfully uploaded stage 1, jumping .. Executing JUMP_DA Address @ 0x00200000 Jumping to 0x00200000 Ok 0xC0 Successfully received DA sync ONNECTION_AGENT : brom DRAM config needed for : 13014E53304A3937 Sending auto preloader from dump... [preloader_x005_k71v1_64_bsp.bin] Sending emi data.. [DRAM setup passed.] Sending emi data succeeded. Uploading stage 2... Upload data was accepted. Jumping to stage 2... Successfully uploaded stage 2 ERAM Size : 0x0000000000039000-228 KB IRAM Size : 0x00000000C0000000-3 GB EMMC Boot1 Size : 0x0000000000400000-4 MB EMMC Boot2 Size : 0x0000000000400000-4 MB EMMC RPMB Size : 0x0000000000400000-4 MB EMMC USER Size : 0x0000000747C00000-29,121 GB EMMC CID : 13014E53304A39375910010292C1C4EF - S0J97Y HW-CODE : 0x788 HWSUB-CODE : 0x8A00 HW-VERSION : 0xCA00 SW-VERSION : 0x0 CHIP-EVOLUTION : 0x0 DA-VERSION : 1.0 Speed : high-speed Upload data was accepted. Jumping to stage 2... DA Extensions successfully added Reading Partition Table .. Partition Count : 41 --------------- Reading build.prop content --------------- Brand : Casper Vendor : Casper Model : VIA_P3 Product : VIA_P3 Manufacturer : Casper ID : PPR1.180610.011 SDK : 28 Release : 9 ABI : arm64-v8a CPU abilist : arm64-v8a,armeabi-v7a,armeabi Locale : tr-TR Description : VIA_P3-user 9 PPR1.180610.011 133 release-keys Device : VIA_P3 Display ID : VIA_P3_20191204_c1.01 Security Patch : 2019-11-05 Fingerprint : Casper/VIA_P3/VIA_P3:9/PPR1.180610.011/133:user/release-keys StorageType : mtp --------------- end of build.prop content --------------- Reading IMEI........ IMEI1 : 351958********* IMEI2 : 351958********* ------------------------------- Bootloader Status... Bootloader : Locked ------------------------------- Backing up Security.. - preloader(preloader.bin), 512 KB = Ok [preloader_x005_k71v1_64_bsp.bin] *Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0788_846F1D33DDFF477C21DC41A97FA344848DB3\Auto\072823170940\6771_Android_scatter.txt - pgpt(pgpt.bin), 32 KB = Ok - nvram(nvram.bin), 64 MB = Ok - nvdata(nvdata.bin), 64 MB = Ok - frp(frp.bin), 1024 KB = Ok - protect1(protect1.bin), 8 MB = Ok - protect2(protect2.bin), 9,469 MB = Ok - persist(persist.bin), 48 MB = Ok - proinfo(proinfo.bin), 3 MB = Ok - nvcfg(nvcfg.bin), 32 MB = Ok - sec1(sec1.bin), 2 MB = Ok - seccfg(seccfg.bin), 8 MB = Ok - lk(lk.bin), 1024 KB = Ok Backup Done!!! Rebooting Device... Reboot Option : RebootToNormal Rebooting Operation Done!!!! Action Result : Ok Elapsed Time : 00:00:44 |
08-02-2023, 04:54 | #3278 (permalink) |
No Life Poster Join Date: Jul 2012 Location: GSMFABRICA-Team
Posts: 3,400
Member: 1785930 Status: Offline Sonork: 100.1685640 Thanks Meter: 4,821 | Huawei Y7 Prime (LDN-L21) FRP Lock Remove with Hydra Tool Code: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Qualcomm Service Tool Factory Reset Protection Auto - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - PreOperation Configuration Brand AUTO Model AUTO Storage Auto Loader Auto Port Auto Searching for Qualcomm 9008 Device...Found FriendlyName Qualcomm HS-USB QDLoader 9008 (COM4) SymbolicName usb#vid_05c6&pid_9008#6&2e01eb57&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver 08022017,2.1.2.7 Getting device info. [Connected]..... Serial No. 0xDCBB6EA7 HW_ID 0004F0E100150041 MSM ID 0x0004F0E1, MSM8937-Qualcomm Snapdragon 430FAADANAZA MODEL_ID 0x0041 OEM_ID 0x0015 - HUAWEI PBL Ver 00000000 PK HASH 6bc369511da9cadb3a7af61574f89db385003d6241bdd1ff573dba61bf6ae119 Hydra Enable Auto search Firehose.. #Please wait... #Search by filename filter..... #Found 8 Compatible Files ..Found match Firehose... Firehose Loader[0004f0e100150041_6bc369511da9cadb_2f9ef3a5_huawei_qualcomm_peek_8937.fhprg] -------------------------------------------------- Header Type OLD TargetMSM 8937 Tag _peek Version 3 Code_size 288 Signature_size 256 fhVendor QUALCOMM HW_ID 0004F0E100150041 Vendor HUAWEI OEM_ID 0015 MODEL_ID 0041 SW_ID 0000000000000003 APP_ID pk_hash 6bc369511da9cadb3a7af61574f89db385003d6241bdd1ff573dba61bf6ae119 OEM_VERSION SIA1000073869 IMAGE_VARIANT FAADANAZA QC_VERSION BOOT.BF.3.3-00221 -------------------------------------------------- SaharaBoot... Ok Sending ...........Ok Connecting to Firehose... Ping... Ok Configuration[FHProt_Auto]....... Ok Chip Configuration MemoryName eMMC MaxPayloadSizeToTargetInBytes 16384 MaxPayloadSizeToTargetInBytesSupported 16384 MaxPayloadSizeFromTargetInBytes 4096 MaxXMLSizeInBytes 4096 TargetName 8937 Version 1 STORAGE DEVICE INFO Memory Type eMMC Block Size in Bytes 512 Page Size 512 Manufacturer ID 144 Serial Number 3324283128 Firmware Version 0 Product Name HAG4a2 Physical Partitions 3 Total Logical Blocks Drive [0] 30777344[14.676 GB] Drive [1] 8192[4 MB] Drive [2] 8192[4 MB] Protocol Universal Running Ok Reading GPT[3] Drive [0] 56 Items Drive [1] 0 Items Drive [2] 0 Items --------------- Reading build.prop content --------------- build.prop Vendor unknown Manufacturer unknown ID OPR6.170623.013 SDK 26 Release 8.0.0 ABI arm64-v8a CPU abilist arm64-v8a,armeabi-v7a,armeabi Locale en-US Description generic_a53-user 8.0.0 OPR6.170623.013 eng.root.20180901.015728 test-keys Display ID System 8.0.0.072(000K) Security Patch 2018-09-01 Fingerprint Huaweigeneric_a53generic_a538.0.0OPR6.170623.013root09010157usertest-keys --------------- end of build.prop content --------------- - Removing FRP Executing ... - Removing FRP [Zero Wipe] OkOk Rebooting Phone.... Ok Action Result Ok Elapsed Time 000017 |
08-02-2023, 04:58 | #3279 (permalink) |
No Life Poster Join Date: Jul 2012 Location: GSMFABRICA-Team
Posts: 3,400
Member: 1785930 Status: Offline Sonork: 100.1685640 Thanks Meter: 4,821 | Oppo A83 Pattern and FRP Lock Remove with Hydra Tool - first keep press boot info Code: ------------------------------------------------------- To Enable BROM Mode : Method 1 - Bootkey (Vol + - Power) or any combination Method 2 - Enable Preloader to brom(crashing Method) Method 3 - Test Point Data0 + ground To Enable Preloader Mode : Method 1 - Just Insert cable ------------------------------------------------------- Searching for MTK Device...Found MTK Port Type : Flashmode BROM FriendlyName : MediaTek USB Port_V1633 (COM4) Device : /6&299c7bb&0&1 SymbolicName : \\?\usb#vid_0e8d&pid_0003#6&299c7bb&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver : 01/22/2015,3.0.1504.0 Service : wdm_usb Openning Port [COM4] Ok Handshaking...Ok HwCode : 0690 {MT6763} Hwver : 0000 Target config : E5 SBC : 01 (True) SLA : 00 (False) DAA : 04 (True) SWJTAG : 04 (True) EPP : 00 (False) CERT : 00 (False) MEMREAD : 20 (True) MEMWRITE : 40 (True) CMD_C8 : 80 (True) Connection : BROM HW Subcode : 8A00 HW Subcode : CA01 SW Ver : 0001 ME_ID : 5B26A76B463E98656D76AEE6E234A69D SOC_ID : 118B2B4D26BFB93B14444D5F4BEB3F9DD2B2870F357BD4AB48DA0404A68E2C30 Exploiting Device... Successfully Exploited.. Handshaking...Ok Dumping Preloader from Bootrom.. Seeking preloader address.. Not Found Target config : 00 SBC : 00 (False) SLA : 00 (False) DAA : 00 (False) SWJTAG : 00 (False) EPP : 00 (False) CERT : 00 (False) MEMREAD : 00 (False) MEMWRITE : 00 (False) CMD_C8 : 00 (False) Connection : BROM Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin] Patching da2 ... Ok Uploading Stage 1.... Successfully uploaded stage 1, jumping .. Executing JUMP_DA Address @ 0x00200000 Jumping to 0x00200000 Ok 0xC0 Successfully received DA sync ONNECTION_AGENT : brom DRAM config needed for : 90014A4842473461 Sending auto preloader from dump... Hydra Auto Preloader Search Enabled.. Hydra will find compatible preloader files... ----------------------------- Found 3 Compatible Preloaders.. ----------------------------- 1-preloader_k63v2_64_bsp_ulax5.bin...Sending... [DRAM setup passed.] [Ok] ----------------------------- Sending emi data succeeded. Uploading stage 2... Upload data was accepted. Jumping to stage 2... Successfully uploaded stage 2 ERAM Size : 0x0000000000040000-256 KB IRAM Size : 0x00000000C0000000-3 GB EMMC Boot1 Size : 0x0000000000400000-4 MB EMMC Boot2 Size : 0x0000000000400000-4 MB EMMC RPMB Size : 0x0000000000400000-4 MB EMMC USER Size : 0x0000000747C00000-29.121 GB EMMC CID : 90014A484247346132A51F70E83715ED - HBG4a2 HW-CODE : 0x690 HWSUB-CODE : 0x8A00 HW-VERSION : 0xCA01 SW-VERSION : 0x1 CHIP-EVOLUTION : 0x0 DA-VERSION : 1.0 Speed : high-speed Upload data was accepted. Jumping to stage 2... DA Extensions successfully added Reading Partition Table .. Partition Count : 42 --------------- Reading build.prop content --------------- Brand : OPPO Vendor : OPPO Model : OPPO A83js Product : oppo6763_17101 Manufacturer : OPPO ID : N6F26Q SDK : 25 Release : 7.1.1 ABI : arm64-v8a CPU abilist : arm64-v8a,armeabi-v7a,armeabi Locale : en-US Description : full_oppo6763_17101-user 7.1.1 N6F26Q 1599151965 release-keys Device : M6763D Display ID : A83jsEX_11_A.35_200903 Security Patch : 2019-10-05 Platform : mt6763 StorageType : mtp --------------- end of build.prop content --------------- Reading IMEI........ ------------------------------- Bootloader Status... Bootloader : Locked ------------------------------- Backing up Security.. - preloader(preloader.bin), 512 KB = Ok [preloader_oppo6763_17101.bin] *Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0690_5B26A76B463E98656D76AEE6E234A69D\Auto\072823170059\6763_Android_scatter.txt - pgpt(pgpt.bin), 32 KB = Ok - nvram(nvram.bin), 64 MB = Ok - nvdata(nvdata.bin), 64 MB = Ok - frp(frp.bin), 1024 KB = Ok - protect1(protect1.bin), 8 MB = Ok - protect2(protect2.bin), 12.469 MB = Ok - persist(persist.bin), 48 MB = Ok - proinfo(proinfo.bin), 3 MB = Ok - oppo_custom(oppo_custom.bin), 1024 KB = Ok - nvcfg(nvcfg.bin), 32 MB = Ok - sec1(sec1.bin), 2 MB = Ok - seccfg(seccfg.bin), 8 MB = Ok - lk(lk.bin), 1024 KB = Ok Backup Done!!! Elapsed Time : 00:01:14 - Service Function - Format/Factory Reset/ScreenLock - Auto Code: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Service Function Format/Factory Reset/ScreenLock Auto - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Searching for MTK Device...Found MTK Port Type : Flashmode BROM FriendlyName : MediaTek USB Port_V1633 (COM4) Device : /6&299c7bb&0&1 SymbolicName : \\?\usb#vid_0e8d&pid_0003#6&299c7bb&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver : 01/22/2015,3.0.1504.0 Service : wdm_usb Openning Port [COM4] Ok Reading Partition Table .. ERAM Size : 0x0000000000040000-256 KB IRAM Size : 0x00000000C0000000-3 GB EMMC Boot1 Size : 0x0000000000400000-4 MB EMMC Boot2 Size : 0x0000000000400000-4 MB EMMC RPMB Size : 0x0000000000400000-4 MB EMMC USER Size : 0x0000000747C00000-29.121 GB EMMC CID : 90014A484247346132A51F70E83715ED - HBG4a2 HW-CODE : 0x690 HWSUB-CODE : 0x8A00 HW-VERSION : 0xCA01 SW-VERSION : 0x1 CHIP-EVOLUTION : 0x0 DA-VERSION : 1.0 Speed : high-speed Partition Count : 42 --------------- Reading build.prop content --------------- Brand : OPPO Vendor : OPPO Model : OPPO A83js Product : oppo6763_17101 Manufacturer : OPPO ID : N6F26Q SDK : 25 Release : 7.1.1 ABI : arm64-v8a CPU abilist : arm64-v8a,armeabi-v7a,armeabi Locale : en-US Description : full_oppo6763_17101-user 7.1.1 N6F26Q 1599151965 release-keys Device : M6763D Display ID : A83jsEX_11_A.35_200903 Security Patch : 2019-10-05 Platform : mt6763 StorageType : mtp --------------- end of build.prop content --------------- Reading IMEI........ ------------------------------- Bootloader Status... Bootloader : Locked ------------------------------- ------------------------------ Factory Reset Flash Mode.. ------------------------------ Operation : Safeformat Universal... Action Result : Ok Elapsed Time : 00:00:12 - Select FRP Lock Remove Code: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Service Function Factory Reset Protection[FRP] Auto - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Searching for MTK Device...Found MTK Port Type : Flashmode BROM FriendlyName : MediaTek USB Port_V1633 (COM4) Device : /6&299c7bb&0&1 SymbolicName : \\?\usb#vid_0e8d&pid_0003#6&299c7bb&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver : 01/22/2015,3.0.1504.0 Service : wdm_usb Openning Port [COM4] Ok Reading Partition Table .. ERAM Size : 0x0000000000040000-256 KB IRAM Size : 0x00000000C0000000-3 GB EMMC Boot1 Size : 0x0000000000400000-4 MB EMMC Boot2 Size : 0x0000000000400000-4 MB EMMC RPMB Size : 0x0000000000400000-4 MB EMMC USER Size : 0x0000000747C00000-29.121 GB EMMC CID : 90014A484247346132A51F70E83715ED - HBG4a2 HW-CODE : 0x690 HWSUB-CODE : 0x8A00 HW-VERSION : 0xCA01 SW-VERSION : 0x1 CHIP-EVOLUTION : 0x0 DA-VERSION : 1.0 Speed : high-speed Partition Count : 42 --------------- Reading build.prop content --------------- Brand : OPPO Vendor : OPPO Model : OPPO A83js Product : oppo6763_17101 Manufacturer : OPPO ID : N6F26Q SDK : 25 Release : 7.1.1 ABI : arm64-v8a CPU abilist : arm64-v8a,armeabi-v7a,armeabi Locale : en-US Description : full_oppo6763_17101-user 7.1.1 N6F26Q 1599151965 release-keys Device : M6763D Display ID : A83jsEX_11_A.35_200903 Security Patch : 2019-10-05 Platform : mt6763 StorageType : mtp --------------- end of build.prop content --------------- Reading IMEI........ ------------------------------- Bootloader Status... Bootloader : Locked ------------------------------- Rebooting Device... Reboot Option : OperationDone Rebooting Operation Done!!!! Action Result : Ok Elapsed Time : 00:00:13 |
08-02-2023, 05:03 | #3280 (permalink) |
No Life Poster Join Date: Jul 2012 Location: GSMFABRICA-Team
Posts: 3,400
Member: 1785930 Status: Offline Sonork: 100.1685640 Thanks Meter: 4,821 | Redmi 6A Pattern and FRP lock remove with Hydra Tool - First keep press boot info Code: ------------------------------------------------------- To Enable BROM Mode : Method 1 - Bootkey (Vol + - Power) or any combination Method 2 - Enable Preloader to brom(crashing Method) Method 3 - Test Point Data0 + ground To Enable Preloader Mode : Method 1 - Just Insert cable ------------------------------------------------------- Searching for MTK Device...Found MTK Port Type : Flashmode BROM FriendlyName : MediaTek USB Port_V1632 (COM30) Device : /7&d3e40fc&0&4 SymbolicName : \\?\usb#vid_0e8d&pid_0003#7&d3e40fc&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver : 01/22/2015,3.0.1504.0 Service : wdm_usb Openning Port [COM30] Ok Handshaking...Ok HwCode : 0766 {MT6765/MT8768t} Hwver : 0000 Target config : E7 SBC : 01 (True) SLA : 02 (True) DAA : 04 (True) SWJTAG : 06 (True) EPP : 00 (False) CERT : 00 (False) MEMREAD : 20 (True) MEMWRITE : 40 (True) CMD_C8 : 80 (True) Connection : BROM HW Subcode : 8A00 HW Subcode : CA00 SW Ver : 0000 ME_ID : F745FFA71BE7DB7F9B1DF620A71B312C SOC_ID : 27CFC4DA1E3D356D16B7CA80BE72A37069BA4DF3476C076237537FB9651A0A5C Exploiting Device... Successfully Exploited.. Handshaking...Ok Dumping Preloader from Bootrom.. Seeking preloader address..Found @ 0x00200BC4 Starting to dump... Prel Size : 0x00039370 Successfully dump preloader.. [C:\Hydra Tool\Boot\PreloaderDump\preloader_cactus.bin] Target config : 00 SBC : 00 (False) SLA : 00 (False) DAA : 00 (False) SWJTAG : 00 (False) EPP : 00 (False) CERT : 00 (False) MEMREAD : 00 (False) MEMWRITE : 00 (False) CMD_C8 : 00 (False) Connection : BROM Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin] Patching da2 ... Ok Uploading Stage 1.... Successfully uploaded stage 1, jumping .. Executing JUMP_DA Address @ 0x00200000 Jumping to 0x00200000 Ok 0xC0 Successfully received DA sync ONNECTION_AGENT : brom DRAM config needed for : 90014A4841473461 Sending auto preloader from dump... [preloader_cactus.bin] Sending emi data.. [DRAM setup passed.] Sending emi data succeeded. Uploading stage 2... Upload data was accepted. Jumping to stage 2... Successfully uploaded stage 2 ERAM Size : 0x000000000003A000-232 KB IRAM Size : 0x0000000080000000-2 GB EMMC Boot1 Size : 0x0000000000400000-4 MB EMMC Boot2 Size : 0x0000000000400000-4 MB EMMC RPMB Size : 0x0000000000400000-4 MB EMMC USER Size : 0x00000003AB400000-14.676 GB EMMC CID : 90014A484147346132A50309E49265FF - HAG4a2 HW-CODE : 0x766 HWSUB-CODE : 0x8A00 HW-VERSION : 0xCA00 SW-VERSION : 0x0 CHIP-EVOLUTION : 0x0 DA-VERSION : 1.0 Speed : high-speed Upload data was accepted. Jumping to stage 2... DA Extensions successfully added Reading Partition Table .. Partition Count : 43 --------------- Reading build.prop content --------------- Brand : xiaomi Model : Redmi 6A Product : cactus ID : PPR1.180610.011 SDK : 28 Release : 9 ABI : armeabi-v7a CPU abilist : armeabi-v7a,armeabi Locale : en-GB Description : cactus-user 9 PPR1.180610.011 V11.0.8.0.PCBMIXM release-keys Device : cactus Display ID : SW_S98506AE1_V009_M13_XM_C3C_USR Security Patch : 2020-05-01 Fingerprint : xiaomi/cactus/cactus:9/PPR1.180610.011/V11.0.8.0.PCBMIXM:user/release-keys StorageType : mtp --------------- end of build.prop content --------------- Reading IMEI........ IMEI1 : 862953********* IMEI2 : 862953********* ------------------------------- Bootloader Status... Bootloader : Locked ------------------------------- Backing up Security.. - preloader(preloader.bin), 512 KB = Ok [preloader_cactus.bin] *Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0766_F745FFA71B222EEEF9B1DF620A71B312C\Auto\072823191851\6765_Android_scatter.txt - pgpt(pgpt.bin), 32 KB = Ok - nvram(nvram.bin), 64 MB = Ok - nvdata(nvdata.bin), 64 MB = Ok - frp(frp.bin), 1024 KB = Ok - protect1(protect1.bin), 8 MB = Ok - protect2(protect2.bin), 9.469 MB = Ok - persist(persist.bin), 64 MB = Ok - proinfo(proinfo.bin), 3 MB = Ok - nvcfg(nvcfg.bin), 32 MB = Ok - sec1(sec1.bin), 2 MB = Ok - seccfg(seccfg.bin), 8 MB = Ok - lk(lk.bin), 1024 KB = Ok Backup Done!!! Elapsed Time : 00:00:37 - Factory Reset Phone Code: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Service Function Format/Factory Reset/ScreenLock Auto - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Searching for MTK Device...Found MTK Port Type : Flashmode BROM FriendlyName : MediaTek USB Port_V1632 (COM30) Device : /7&d3e40fc&0&4 SymbolicName : \\?\usb#vid_0e8d&pid_0003#7&d3e40fc&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver : 01/22/2015,3.0.1504.0 Service : wdm_usb Openning Port [COM30] Ok Reading Partition Table .. ERAM Size : 0x000000000003A000-232 KB IRAM Size : 0x0000000080000000-2 GB EMMC Boot1 Size : 0x0000000000400000-4 MB EMMC Boot2 Size : 0x0000000000400000-4 MB EMMC RPMB Size : 0x0000000000400000-4 MB EMMC USER Size : 0x00000003AB400000-14.676 GB EMMC CID : 90014A484147346132A50309E49265FF - HAG4a2 HW-CODE : 0x766 HWSUB-CODE : 0x8A00 HW-VERSION : 0xCA00 SW-VERSION : 0x0 CHIP-EVOLUTION : 0x0 DA-VERSION : 1.0 Speed : high-speed Partition Count : 43 --------------- Reading build.prop content --------------- Brand : xiaomi Model : Redmi 6A Product : cactus ID : PPR1.180610.011 SDK : 28 Release : 9 ABI : armeabi-v7a CPU abilist : armeabi-v7a,armeabi Locale : en-GB Description : cactus-user 9 PPR1.180610.011 V11.0.8.0.PCBMIXM release-keys Device : cactus Display ID : SW_S98506AE1_V009_M13_XM_C3C_USR Security Patch : 2020-05-01 Fingerprint : xiaomi/cactus/cactus:9/PPR1.180610.011/V11.0.8.0.PCBMIXM:user/release-keys StorageType : mtp --------------- end of build.prop content --------------- Reading IMEI........ IMEI1 : 862953******** IMEI2 : 862953******** ------------------------------- Bootloader Status... Bootloader : Locked ------------------------------- ------------------------------ Factory Reset Flash Mode.. ------------------------------ Operation : Safeformat Universal... Action Result : Ok Elapsed Time : 00:00:04 - FRP Lock Remove Code: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Service Function Factory Reset Protection[FRP] Auto - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Searching for MTK Device...Found MTK Port Type : Flashmode BROM FriendlyName : MediaTek USB Port_V1632 (COM30) Device : /7&d3e40fc&0&4 SymbolicName : \\?\usb#vid_0e8d&pid_0003#7&d3e40fc&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver : 01/22/2015,3.0.1504.0 Service : wdm_usb Openning Port [COM30] Ok Reading Partition Table .. ERAM Size : 0x000000000003A000-232 KB IRAM Size : 0x0000000080000000-2 GB EMMC Boot1 Size : 0x0000000000400000-4 MB EMMC Boot2 Size : 0x0000000000400000-4 MB EMMC RPMB Size : 0x0000000000400000-4 MB EMMC USER Size : 0x00000003AB400000-14.676 GB EMMC CID : 90014A484147346132A50309E49265FF - HAG4a2 HW-CODE : 0x766 HWSUB-CODE : 0x8A00 HW-VERSION : 0xCA00 SW-VERSION : 0x0 CHIP-EVOLUTION : 0x0 DA-VERSION : 1.0 Speed : high-speed Partition Count : 43 --------------- Reading build.prop content --------------- Brand : xiaomi Model : Redmi 6A Product : cactus ID : PPR1.180610.011 SDK : 28 Release : 9 ABI : armeabi-v7a CPU abilist : armeabi-v7a,armeabi Locale : en-GB Description : cactus-user 9 PPR1.180610.011 V11.0.8.0.PCBMIXM release-keys Device : cactus Display ID : SW_S98506AE1_V009_M13_XM_C3C_USR Security Patch : 2020-05-01 Fingerprint : xiaomi/cactus/cactus:9/PPR1.180610.011/V11.0.8.0.PCBMIXM:user/release-keys StorageType : mtp --------------- end of build.prop content --------------- Reading IMEI........ IMEI1 : 862953********* IMEI2 : 862953********* ------------------------------- Bootloader Status... Bootloader : Locked ------------------------------- Action Result : Ok Elapsed Time : 00:00:05 |
08-02-2023, 05:05 | #3281 (permalink) |
No Life Poster Join Date: Jul 2012 Location: GSMFABRICA-Team
Posts: 3,400
Member: 1785930 Status: Offline Sonork: 100.1685640 Thanks Meter: 4,821 | ZTE A3 Lite FRP Lock Remove with Hdyra Tool Code: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Service Tool Function.. Factory Reset Protection Factory Reset - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - ****************** PRESS BOOT KEY ****************** VOL + OR VOL - , OR Combination Vol - + Feature Phone : Call Button Please hold boot key until second boot.. ******************************************* Scanning Port.... Openning Port [COM4] Ok Identifying... [SPRD3] Sending Config Ok Ok Spreadtrum Boot Block version 1.1 Sending To phone.... Unisoc Not Secured.... Ok Successfully booted..Ready to go... Reading System Info.. Vendor : ZTE Model : ZTE Blade A3 Lite Device : P932F20 Display ID : GEN_LA_D_A3_Lite_V1.9 Security Patch : 2021-10-05 FRPPST : /dev/block/platform/soc/soc:ap-ahb/20600000.sdio/by-name/persist Fingerprint : ZTE/P932F20/P932F20:9/PPR1.180610.011/20211014.175519:user/release-keys Reading IMEI... BSL_REP_OPERATION_FAILED BSL_REP_OPERATION_FAILED. IMEI 1 : 86916*********** IMEI 2 : 86740*********** IMEI 3 : 86740*********** IMEI 4 : 86916*********** BSL_WRITE_ERROR BSL_WRITE_ERROR Rebooting Phone..Ok Action Result : Ok Elapsed Time : 00:00:10 |
08-03-2023, 11:56 | #3282 (permalink) |
No Life Poster Join Date: Jul 2012 Location: GSMFABRICA-Team
Posts: 3,400
Member: 1785930 Status: Offline Sonork: 100.1685640 Thanks Meter: 4,821 | Oppo F5 (cph1723) factory reset with Hydra Tool Code: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Service Function Format/Factory Reset/ScreenLock Safe Format Master Clear 1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Searching for MTK Device...Found MTK Port Type : Flashmode BROM FriendlyName : MediaTek USB Port_V1632 (COM34) Device : /5&fe88cf0&0&2 SymbolicName : \\?\usb#vid_0e8d&pid_0003#5&fe88cf0&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver : 01/22/2015,3.0.1504.0 Service : wdm_usb Openning Port [COM34] Ok Handshaking...Ok HwCode : 0690 {MT6763} Hwver : 0000 Target config : 00 SBC : 00 (False) SLA : 00 (False) DAA : 00 (False) SWJTAG : 00 (False) EPP : 00 (False) CERT : 00 (False) MEMREAD : 00 (False) MEMWRITE : 00 (False) CMD_C8 : 00 (False) Connection : BROM HW Subcode : 8A00 HW Subcode : CA01 SW Ver : 0001 ME_ID : 2779AA02BEA8BD678CE7B72E762169E1 SOC_ID : BA75FAEB822A3D1AEEFB86973669BFD0A0B8B782853D1CB8A2CD2E1FA1A25E84 Exploiting Device... Successfully Exploited.. Handshaking...Ok Dumping Preloader from Bootrom.. Seeking preloader address.. Not Found Target config : 00 SBC : 00 (False) SLA : 00 (False) DAA : 00 (False) SWJTAG : 00 (False) EPP : 00 (False) CERT : 00 (False) MEMREAD : 00 (False) MEMWRITE : 00 (False) CMD_C8 : 00 (False) Connection : BROM Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin] Patching da2 ... Ok Uploading Stage 1.... Successfully uploaded stage 1, jumping .. Executing JUMP_DA Address @ 0x00200000 Jumping to 0x00200000 Ok 0xC0 Successfully received DA sync ONNECTION_AGENT : brom DRAM config needed for : 90014A4843473861 Sending auto preloader from dump... Hydra Auto Preloader Search Enabled.. Hydra will find compatible preloader files... ----------------------------- Found 4 Compatible Preloaders.. ----------------------------- 1-Coolpad_Cool_X_Preloader.bin...Sending... Status: 0xC0070005 = DA exceed max num 2-preloader_e959_oq_s70_63_p0.bin...Sending... Status: 0xC0070005 = DA exceed max num 3-preloader_k63v2_64_bsp_cs6062.bin...Sending... Status: 0xC0070005 = DA exceed max num 4-preloader_q930.bin...Sending... Status: 0xC0070005 = DA exceed max num ----------------------------- Selected File : D:\preloader_oppo6763_17031.bin Sending EMI Data... [DRAM setup passed.] Sending emi data succeeded. Sending emi data succeeded. Uploading stage 2... Upload data was accepted. Jumping to stage 2... Successfully uploaded stage 2 ERAM Size : 0x0000000000040000-256 KB IRAM Size : 0x0000000100000000-4 GB EMMC Boot1 Size : 0x0000000000400000-4 MB EMMC Boot2 Size : 0x0000000000400000-4 MB EMMC RPMB Size : 0x0000000000400000-4 MB EMMC USER Size : 0x0000000E8F800000-58.242 GB EMMC CID : 90014A484347386134A228A02535658F - HCG8a4 HW-CODE : 0x690 HWSUB-CODE : 0x8A00 HW-VERSION : 0xCA01 SW-VERSION : 0x1 CHIP-EVOLUTION : 0x0 DA-VERSION : 1.0 Speed : high-speed Upload data was accepted. Jumping to stage 2... DA Extensions successfully added Reading Partition Table .. Partition Count : 42 --------------- Reading build.prop content --------------- Brand : OPPO Vendor : OPPO Model : OPPO CPH1723 Product : oppo6763_17031 Manufacturer : OPPO ID : N6F26Q SDK : 25 Release : 7.1.1 ABI : arm64-v8a CPU abilist : arm64-v8a,armeabi-v7a,armeabi Locale : en-US Description : full_oppo6763_17031-user 7.1.1 N6F26Q 1559583323 release-keys Device : M6763A Display ID : CPH1723EX_11_A.36_190604 Security Patch : 2019-06-05 Platform : mt6763 --------------- end of build.prop content --------------- Reading IMEI........ ------------------------------- Bootloader Status... Bootloader : Unlocked ------------------------------- ------------------------------ Factory Reset Flash Mode.. ------------------------------ Operation : Safeformat Master Clear 1 Rebooting Device... Reboot Option : RebootToNormal Rebooting Operation Done!!!! Action Result : Ok Elapsed Time : 00:01:16 |
08-03-2023, 11:57 | #3283 (permalink) |
No Life Poster Join Date: Jul 2012 Location: GSMFABRICA-Team
Posts: 3,400
Member: 1785930 Status: Offline Sonork: 100.1685640 Thanks Meter: 4,821 | Oppo F5 (cph1723) factory reset with Hydra Tool Oppo F5 (cph1723) factory reset with Hydra Tool Code: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Service Function Format/Factory Reset/ScreenLock Safe Format Master Clear 1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Searching for MTK Device...Found MTK Port Type : Flashmode BROM FriendlyName : MediaTek USB Port_V1632 (COM34) Device : /5&fe88cf0&0&2 SymbolicName : \\?\usb#vid_0e8d&pid_0003#5&fe88cf0&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver : 01/22/2015,3.0.1504.0 Service : wdm_usb Openning Port [COM34] Ok Handshaking...Ok HwCode : 0690 {MT6763} Hwver : 0000 Target config : 00 SBC : 00 (False) SLA : 00 (False) DAA : 00 (False) SWJTAG : 00 (False) EPP : 00 (False) CERT : 00 (False) MEMREAD : 00 (False) MEMWRITE : 00 (False) CMD_C8 : 00 (False) Connection : BROM HW Subcode : 8A00 HW Subcode : CA01 SW Ver : 0001 ME_ID : 2779AA02BEA8BD678CE7B72E762169E1 SOC_ID : BA75FAEB822A3D1AEEFB86973669BFD0A0B8B782853D1CB8A2CD2E1FA1A25E84 Exploiting Device... Successfully Exploited.. Handshaking...Ok Dumping Preloader from Bootrom.. Seeking preloader address.. Not Found Target config : 00 SBC : 00 (False) SLA : 00 (False) DAA : 00 (False) SWJTAG : 00 (False) EPP : 00 (False) CERT : 00 (False) MEMREAD : 00 (False) MEMWRITE : 00 (False) CMD_C8 : 00 (False) Connection : BROM Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin] Patching da2 ... Ok Uploading Stage 1.... Successfully uploaded stage 1, jumping .. Executing JUMP_DA Address @ 0x00200000 Jumping to 0x00200000 Ok 0xC0 Successfully received DA sync ONNECTION_AGENT : brom DRAM config needed for : 90014A4843473861 Sending auto preloader from dump... Hydra Auto Preloader Search Enabled.. Hydra will find compatible preloader files... ----------------------------- Found 4 Compatible Preloaders.. ----------------------------- 1-Coolpad_Cool_X_Preloader.bin...Sending... Status: 0xC0070005 = DA exceed max num 2-preloader_e959_oq_s70_63_p0.bin...Sending... Status: 0xC0070005 = DA exceed max num 3-preloader_k63v2_64_bsp_cs6062.bin...Sending... Status: 0xC0070005 = DA exceed max num 4-preloader_q930.bin...Sending... Status: 0xC0070005 = DA exceed max num ----------------------------- Selected File : D:\preloader_oppo6763_17031.bin Sending EMI Data... [DRAM setup passed.] Sending emi data succeeded. Sending emi data succeeded. Uploading stage 2... Upload data was accepted. Jumping to stage 2... Successfully uploaded stage 2 ERAM Size : 0x0000000000040000-256 KB IRAM Size : 0x0000000100000000-4 GB EMMC Boot1 Size : 0x0000000000400000-4 MB EMMC Boot2 Size : 0x0000000000400000-4 MB EMMC RPMB Size : 0x0000000000400000-4 MB EMMC USER Size : 0x0000000E8F800000-58.242 GB EMMC CID : 90014A484347386134A228A02535658F - HCG8a4 HW-CODE : 0x690 HWSUB-CODE : 0x8A00 HW-VERSION : 0xCA01 SW-VERSION : 0x1 CHIP-EVOLUTION : 0x0 DA-VERSION : 1.0 Speed : high-speed Upload data was accepted. Jumping to stage 2... DA Extensions successfully added Reading Partition Table .. Partition Count : 42 --------------- Reading build.prop content --------------- Brand : OPPO Vendor : OPPO Model : OPPO CPH1723 Product : oppo6763_17031 Manufacturer : OPPO ID : N6F26Q SDK : 25 Release : 7.1.1 ABI : arm64-v8a CPU abilist : arm64-v8a,armeabi-v7a,armeabi Locale : en-US Description : full_oppo6763_17031-user 7.1.1 N6F26Q 1559583323 release-keys Device : M6763A Display ID : CPH1723EX_11_A.36_190604 Security Patch : 2019-06-05 Platform : mt6763 --------------- end of build.prop content --------------- Reading IMEI........ ------------------------------- Bootloader Status... Bootloader : Unlocked ------------------------------- ------------------------------ Factory Reset Flash Mode.. ------------------------------ Operation : Safeformat Master Clear 1 Rebooting Device... Reboot Option : RebootToNormal Rebooting Operation Done!!!! Action Result : Ok Elapsed Time : 00:01:16 |
08-03-2023, 11:59 | #3284 (permalink) |
No Life Poster Join Date: Jul 2012 Location: GSMFABRICA-Team
Posts: 3,400
Member: 1785930 Status: Offline Sonork: 100.1685640 Thanks Meter: 4,821 | Realme Pad 2K FRP lock remove with Hydra Tool Code: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Service Function Factory Reset Protection[FRP] Auto - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Searching for MTK Device...Found MTK Port Type : Flashmode BROM FriendlyName : MediaTek USB Port (COM68) Device : /5&2e786fd2&0&1 SymbolicName : \\?\usb#vid_0e8d&pid_0003#5&2e786fd2&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver : 01/22/2016,3.0.1504.0 Service : wdm_usb Openning Port [COM68] Ok Reading Partition Table .. ERAM Size : 0x0000000000070000-448 KB IRAM Size : 0x0000000100000000-4 GB EMMC Boot1 Size : 0x0000000000400000-4 MB EMMC Boot2 Size : 0x0000000000400000-4 MB EMMC RPMB Size : 0x0000000000400000-4 MB EMMC USER Size : 0x0000000747C00000-29.121 GB EMMC CID : 6B01014D4D4333324751DA999A9A78C1 - MMC32G HW-CODE : 0x707 HWSUB-CODE : 0x8A00 HW-VERSION : 0xCA00 SW-VERSION : 0x0 CHIP-EVOLUTION : 0x1 DA-VERSION : 1.0 Speed : high-speed Partition Count : 50 --------------- Reading build.prop content --------------- Brand : realme Vendor : realme Model : RMP2103 Product : RMP2103 Manufacturer : realme ID : RP1A.200720.011 SDK : 30 Release : 11 ABI : arm64-v8a CPU abilist : arm64-v8a,armeabi-v7a,armeabi Locale : en-US Description : full_oppo8786_wlan-user 11 RP1A.200720.011 326 release-keys Device : RMP2103 Security Patch : 2022-01-05 --------------- end of build.prop content --------------- Reading IMEI........ ------------------------------- Bootloader Status... Bootloader : Locked ------------------------------- Rebooting Device... Reboot Option : RebootToNormal Rebooting Operation Done!!!! Action Result : Ok Elapsed Time : 00:00:09 |
08-03-2023, 11:59 | #3285 (permalink) |
No Life Poster Join Date: Jul 2012 Location: GSMFABRICA-Team
Posts: 3,400
Member: 1785930 Status: Offline Sonork: 100.1685640 Thanks Meter: 4,821 | Realme Pad 2K FRP lock remove with Hydra Tool Code: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Service Function Factory Reset Protection[FRP] Auto - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Searching for MTK Device...Found MTK Port Type : Flashmode BROM FriendlyName : MediaTek USB Port (COM68) Device : /5&2e786fd2&0&1 SymbolicName : \\?\usb#vid_0e8d&pid_0003#5&2e786fd2&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver : 01/22/2016,3.0.1504.0 Service : wdm_usb Openning Port [COM68] Ok Reading Partition Table .. ERAM Size : 0x0000000000070000-448 KB IRAM Size : 0x0000000100000000-4 GB EMMC Boot1 Size : 0x0000000000400000-4 MB EMMC Boot2 Size : 0x0000000000400000-4 MB EMMC RPMB Size : 0x0000000000400000-4 MB EMMC USER Size : 0x0000000747C00000-29.121 GB EMMC CID : 6B01014D4D4333324751DA999A9A78C1 - MMC32G HW-CODE : 0x707 HWSUB-CODE : 0x8A00 HW-VERSION : 0xCA00 SW-VERSION : 0x0 CHIP-EVOLUTION : 0x1 DA-VERSION : 1.0 Speed : high-speed Partition Count : 50 --------------- Reading build.prop content --------------- Brand : realme Vendor : realme Model : RMP2103 Product : RMP2103 Manufacturer : realme ID : RP1A.200720.011 SDK : 30 Release : 11 ABI : arm64-v8a CPU abilist : arm64-v8a,armeabi-v7a,armeabi Locale : en-US Description : full_oppo8786_wlan-user 11 RP1A.200720.011 326 release-keys Device : RMP2103 Security Patch : 2022-01-05 --------------- end of build.prop content --------------- Reading IMEI........ ------------------------------- Bootloader Status... Bootloader : Locked ------------------------------- Rebooting Device... Reboot Option : RebootToNormal Rebooting Operation Done!!!! Action Result : Ok Elapsed Time : 00:00:09 |
Bookmarks |
Thread Tools | |
Display Modes | |
| |
|