|
Welcome to the GSM-Forum forums. You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. Only registered members may post questions, contact other members or search our database of over 8 million posts. Registration is fast, simple and absolutely free so please - Click to REGISTER! If you have any problems with the registration process or your account login, please contact contact us . |
|
Register | FAQ | Donate | Forum Rules | Root any Device | ★iPhone Unlock★ | ★ Direct Codes ★ | Direct Unlock Source |
| LinkBack | Thread Tools | Display Modes |
08-22-2020, 16:01 | #631 (permalink) |
No Life Poster Join Date: Apr 2016 Location: B A N G L A D E S H
Posts: 3,189
Member: 2556542 Status: Offline Thanks Meter: 1,790 | Redmi note 4x mido mi acount remove done downgrade miui 11 to miui 10 Code: Searching EDL Port..[COM57] TPortConnection.Create...(COM57)..Opening...Ok Getting device info....... Serial No.: 0x5319770E MSM ID : 0x000460E1, MSM8953-Qualcomm Snapdragon 625 PBL Ver : 00000000 PK HASH : 57158EAF1814D78FD2B3105ECE4DB18A 817A08AC664A5782A925F3FF8403D39A Firehose Loader[Xiaomi_S2y2_noauth_8953_ddr.mbn] Initializing SaharaBoot... Ok Sending ...................Ok Connecting to Firehose... Ping... Ok Configuration...... Identifying Chip....Ok Chip Configuration : MemoryName : eMMC MaxPayloadSizeToTargetInBytes : 1048576 MaxPayloadSizeToTargetInBytesSupported : 1048576 MaxPayloadSizeFromTargetInBytes : 4096 MaxXMLSizeInBytes : 4096 TargetName : 8953 Version : 1 *** STORAGE DEVICE INFO *** Memory Type : eMMC Block Size in Bytes : 512 Page Size : 512 Manufacturer ID : 144 Serial Number : 413735051 Firmware Version : 165 Product Name : HBG4a2 Physical Partitions : 3 Total Logical Blocks: Drive [0] 61071360[29.121 GB] Drive [1] 8192[4 MB] Drive [2] 8192[4 MB] Running : Ok Reading GPT[3], Partitions(52 Items) Ok Phone Information..... Model : Redmi Note 4 Brand : xiaomi Android Ver : 7.0 Miui Ver : V10 Manufacturer : Xiaomi Device : mido Mod_device : mido_global Board : msm8953 Display ID : AL1512-mido-build-20181220030859 Security Patch : 2018-10-01 Platform : msm8953 Kernel ID : 2018-10-01 FRPPST : /dev/block/bootdevice/by-name/config Fingerprint : xiaomi/mido/mido:7.0/NRD90M/8.12.20:user/release-keys ro_product_hardware : sys_hardware_version : ---------------------------- Flashing Selected Partitions >modem(0)[NON-HLOS.bin] Ok >sbl1(0)[sbl1.mbn] Ok >sbl1bak(0)[sbl1.mbn] Ok >rpm(0)[rpm.mbn] Ok >rpmbak(0)[rpm.mbn] Ok >tz(0)[tz.mbn] Ok >tzbak(0)[tz.mbn] Ok >devcfg(0)[devcfg.mbn] Ok >devcfgbak(0)[devcfg.mbn] Ok >dsp(0)[adspso.bin] Ok >fsg(0)[fs_image.tar.gz.mbn.img] Skipped >sec(0)[sec.dat] Skipped >splash(0)[splash.img] Ok >aboot(0)[emmc_appsboot.mbn] Ok >abootbak(0)[emmc_appsboot.mbn] Ok >boot(0)[boot.img] Ok >recovery(0)[recovery.img] Ok >system(0)[system.img] Ok >cache(0)[cache.img] Ok >persist(0)[persist.img] Skipped >misc(0)[misc.img] Ok >lksecapp(0)[lksecapp.mbn] Ok >lksecappbak(0)[lksecapp.mbn] Ok >cmnlib(0)[cmnlib.mbn] Ok >cmnlibbak(0)[cmnlib.mbn] Ok >cmnlib64(0)[cmnlib64.mbn] Ok ---------------------------- Done! Operation : Setbootablestoragedrive: Drive 0 Set bootable storage drive 0 Ok Rebooting Phone.... Ok TPortConnection.Destroy.....Closing...Ok.. Elapsed Time : 00:25:55 * patch0.xml 1 PatchXML Detected and Loaded 26 Items |
The Following 2 Users Say Thank You to kothamamun For This Useful Post: |
08-22-2020, 20:01 | #632 (permalink) |
Freak Poster Join Date: Jul 2009 Location: paraguay
Posts: 260
Member: 1086987 Status: Offline Sonork: 1617504 Thanks Meter: 109 | redmi 7a mi account and frp done Code: Searching EDL Port..[COM5] TPortConnection.Create...(COM5)..Opening...Ok Getting device info....... Serial No.: 0x52DD4825 MSM ID : 0x000BF0E1, SDM439-Qualcomm Snapdragon 439 PBL Ver : 00000001 PK HASH : 57158EAF1814D78FD2B3105ECE4DB18A 817A08AC664A5782A925F3FF8403D39A Firehose Loader[Xiaomi_Redmi_8_Olive.mbn] Initializing SaharaBoot... Ok Sending .......................Ok Connecting to Firehose... Ping... Ok Configuration. Xiaomi Authentication needed... Signature Request -> bob[AjNyt1Y7YrAWKuuZ6agobNd1MnW] Checking Internet connection.... - Hydra Is Online Connecting to Hydra Xiaomi Server... Signature @256bytes Authentication.... Accepted...... Identifying Chip....Ok Chip Configuration : MemoryName : eMMC MaxPayloadSizeToTargetInBytes : 1048576 MaxPayloadSizeToTargetInBytesSupported : 1048576 MaxPayloadSizeFromTargetInBytes : 4096 MaxXMLSizeInBytes : 4096 TargetName : 8937 Version : 1 *** STORAGE DEVICE INFO *** Memory Type : eMMC Block Size in Bytes : 512 Page Size : 512 Manufacturer ID : 144 Serial Number : 985860121 Firmware Version : 165 Product Name : HAG4a2 Physical Partitions : 3 Total Logical Blocks: Drive [0] 30777344[14.676 GB] Drive [1] 8192[4 MB] Drive [2] 8192[4 MB] Running : Ok Reading GPT[3], Partitions(60 Items) Ok Phone Information...... Model : Brand : Android Ver : 10 Miui Ver : V11 Manufacturer : Xiaomi Device : Mod_device : pine_global Display ID : Security Patch : 2020-07-01 Kernel ID : 2020-07-01 Fingerprint : ro_product_hardware : sys_hardware_version : Reading GPT[3], Partitions(60 Items) Ok *** FRP Reset *** Resetting FRP... Auto Processing... Executing ... [Zero Wipe] Ok Elapsed Time : 00:00:14 TPortConnection.Destroy.....Closing...Ok.. Code: 14:30:12 : PreOperation Configuration 14:30:12 : Brand : XIAOMI Model : Redmi 7A (pine) Storage : Auto 14:30:12 : Loader: Xiaomi_Redmi_8_Olive.mbn 14:30:12 : Port : Auto 14:30:12 : Connection : Flash Mode 14:30:12 : 14:30:12 : Searching EDL Port..[COM5] 14:30:23 : TPortConnection.Create...(COM5)..Opening...Ok 14:30:24 : Getting device info....... 14:30:27 : Serial No.: 0x52DD4825 14:30:27 : MSM ID : 0x000BF0E1, SDM439-Qualcomm Snapdragon 439 14:30:27 : PBL Ver : 00000001 14:30:27 : PK HASH : 57158EAF1814D78FD2B3105ECE4DB18A 14:30:27 : 817A08AC664A5782A925F3FF8403D39A 14:30:27 : 14:30:27 : Firehose Loader[Xiaomi_Redmi_8_Olive.mbn] 14:30:27 : Initializing SaharaBoot... Ok 14:30:27 : Sending .......................Ok 14:30:29 : 14:30:30 : Connecting to Firehose... 14:30:31 : Ping... Ok 14:30:31 : Configuration. 14:30:31 : Xiaomi Authentication needed... 14:30:33 : Signature Request -> bob[4UjvUmCk4u6OfBYYhflKk5xUTf6] 14:30:33 : Checking Internet connection.... 14:30:33 : - Hydra Is Online 14:30:34 : Connecting to Hydra Xiaomi Server... 14:30:35 : 14:30:35 : Signature @256bytes Authentication.... Accepted...... 14:30:37 : Identifying Chip....Ok 14:30:37 : Chip Configuration : 14:30:37 : MemoryName : eMMC 14:30:37 : MaxPayloadSizeToTargetInBytes : 1048576 14:30:37 : MaxPayloadSizeToTargetInBytesSupported : 1048576 14:30:37 : MaxPayloadSizeFromTargetInBytes : 4096 14:30:37 : MaxXMLSizeInBytes : 4096 14:30:37 : TargetName : 8937 14:30:37 : Version : 1 14:30:37 : 14:30:38 : *** STORAGE DEVICE INFO *** 14:30:38 : Memory Type : eMMC 14:30:38 : Block Size in Bytes : 512 14:30:38 : Page Size : 512 14:30:38 : Manufacturer ID : 144 14:30:38 : Serial Number : 985860121 14:30:38 : Firmware Version : 165 14:30:38 : Product Name : HAG4a2 14:30:38 : Physical Partitions : 3 14:30:38 : Total Logical Blocks: 14:30:38 : Drive [0] 30777344[14.676 GB] 14:30:38 : Drive [1] 8192[4 MB] 14:30:38 : Drive [2] 8192[4 MB] 14:30:38 : Running : Ok 14:30:38 : 14:30:38 : Reading GPT[3], Partitions(60 Items) Ok 14:30:38 : Phone Information...... 14:30:38 : Model : 14:30:38 : Brand : 14:30:38 : Android Ver : 10 14:30:38 : Miui Ver : V11 14:30:38 : Manufacturer : Xiaomi 14:30:38 : Device : 14:30:38 : Mod_device : pine_global 14:30:38 : Display ID : 14:30:38 : Security Patch : 2020-07-01 14:30:38 : Kernel ID : 2020-07-01 14:30:38 : Fingerprint : 14:30:38 : ro_product_hardware : 14:30:38 : sys_hardware_version : 14:30:38 : 14:30:38 : Reading GPT[3], Partitions(60 Items) Ok 14:30:39 : Operation : MiAccount 14:30:39 : Remove MiAccount[Erase Method] 14:30:39 : Processing... 14:30:39 : Backing up Partition for safety...Ok 14:30:42 : 14:30:42 : Scanning Patching address... 14:30:43 : > Patching address detected [PATCHED] 14:30:43 : > Patching address detected [PATCHED] 14:30:43 : > Patching address detected [PATCHED] 14:30:43 : > Patching address detected [PATCHED] 14:30:43 : > Patching address detected [PATCHED] 14:30:43 : > Patching address detected [PATCHED] 14:30:43 : > Patching address detected [PATCHED] 14:30:43 : > Patching address detected [PATCHED] 14:30:43 : > Patching address detected [PATCHED] 14:30:43 : > Patching address detected [PATCHED] 14:30:43 : > Patching address detected [PATCHED] 14:30:43 : > Patching address detected [PATCHED] 14:30:43 : > Patching address detected [PATCHED] 14:30:43 : > Patching address detected [PATCHED] 14:30:43 : > Patching address detected [PATCHED] 14:30:43 : > Patching address detected [PATCHED] 14:30:43 : > Patching address detected [PATCHED] 14:30:43 : > Patching address detected [PATCHED] 14:30:43 : > Patching address detected [PATCHED] 14:30:43 : > Patching address detected [PATCHED] 14:30:43 : > Patching address detected [PATCHED] 14:30:43 : > Patching address detected [PATCHED] 14:30:43 : > Patching address detected [PATCHED] 14:30:44 : > Patching address detected [PATCHED] 14:30:44 : > Patching address detected [PATCHED] 14:30:44 : > Patching address detected [PATCHED] 14:30:44 : > Patching address detected [PATCHED] 14:30:44 : > Patching address detected [PATCHED] 14:30:44 : > Patching address detected [PATCHED] 14:30:44 : > Patching address detected [PATCHED] 14:30:44 : > Patching address detected [PATCHED] 14:30:44 : > Patching address detected [PATCHED] 14:30:44 : > Patching address detected [PATCHED] 14:30:44 : > Patching address detected [PATCHED] 14:30:44 : > Patching address detected [PATCHED] 14:30:44 : > Patching address detected [PATCHED] 14:30:44 : > Patching address detected [PATCHED] 14:30:44 : > Patching address detected [PATCHED]Done!! 14:30:44 : Total Items patched : 38 14:30:44 : Successfully patched address..Ok 14:30:48 : 14:30:48 : Elapsed Time : 00:00:25 |
The Following 2 Users Say Thank You to miguelcpm22 For This Useful Post: |
08-22-2020, 20:05 | #633 (permalink) |
Freak Poster Join Date: Jul 2009 Location: paraguay
Posts: 260
Member: 1086987 Status: Offline Sonork: 1617504 Thanks Meter: 109 | mi a2 bootloop fix and reset frp done Code: 12:13:26 : Reading System Image Info .......... 12:13:26 : Model : Mi A2 12:13:26 : Brand : xiaomi 12:13:26 : Android Ver : 8.1.0 12:13:26 : Manufacturer : Xiaomi 12:13:26 : Device : jasmine_sprout 12:13:26 : Display ID : OPM1.171019.011.V9.6.17.0.ODIMIFE 12:13:26 : Security Patch : 2018-11-05 12:13:26 : Kernel ID : 2018-11-05 12:13:26 : 12:13:26 : ****** CHECK IF MATCH WITH YOUR PHONE ********* 12:13:26 : 12:13:27 : * patch0.xml 12:13:27 : 1 PatchXML Detected and Loaded 26 ItemsHydra Qualcomm Tool Ver 1.0.2 Build 5 12:13:48 : Windows 10 (Version 10.0, Build 19041, 64-bit Edition) 12:13:48 : Intel(R) Core(TM) i5-2500 CPU @ 3.30GHz 12:13:49 : NVIDIA GeForce GT 520 12:13:49 : Ram Installed : 4 GB 12:13:49 : Windows Access Right Admin 12:13:50 : ******* Dongle Info ******* 12:13:50 : Version : Hydra Tool v 1.2 12:13:50 : Serial : 12:13:51 : Initialize : OKAY 12:13:51 : Status : Activated 12:13:51 : Life : 0 [0-0-0-0-0] 12:13:51 : 12:13:51 : Searching EDL Port..[COM5] 12:14:08 : TPortConnection.Create...(COM5)..Opening...Ok 12:14:10 : Getting device info....... 12:14:12 : Serial No.: 0x46396BB4 12:14:12 : MSM ID : 0x0008C0E1, SDM660-Qualcomm Snapdragon 660 12:14:13 : PBL Ver : 00000002 12:14:13 : PK HASH : A7B8B82545A98ECA23D6E9105FB46456 12:14:13 : 8D1B5828264903441BDEF0CD57E3C370 12:14:13 : 12:14:13 : Firehose Loader[prog_emmc_firehose_Sdm660_ddr.elf] 12:14:13 : Initializing SaharaBoot... Ok 12:14:13 : Sending .................................Ok 12:14:19 : 12:14:19 : Connecting to Firehose... 12:14:20 : Ping...... Ok 12:14:20 : Configuration. 12:14:20 : Xiaomi Authentication needed... 12:14:22 : Signature Request -> bob[ByxQx2r 12:14:22 : Checking Internet connection.... 12:14:22 : - Hydra Is Online 12:14:23 : Connecting to Hydra Xiaomi Server... 12:14:25 : 12:14:25 : Signature @256bytes Authentication.... Accepted...................... 12:14:27 : Identifying Chip....Ok 12:14:27 : Chip Configuration : 12:14:27 : MemoryName : eMMC 12:14:27 : MaxPayloadSizeToTargetInBytes : 8192 12:14:27 : MaxPayloadSizeToTargetInBytesSupported : 8192 12:14:27 : MaxPayloadSizeFromTargetInBytes : 4096 12:14:27 : MaxXMLSizeInBytes : 4096 12:14:27 : TargetName : MSM8996 12:14:27 : Version : 1 12:14:27 : DateTime : Aug 16 2019 - 17:22:13 12:14:27 : 12:14:28 : *** STORAGE DEVICE INFO *** 12:14:28 : Memory Type : eMMC 12:14:28 : Block Size in Bytes : 512 12:14:28 : Page Size : 512 12:14:28 : Manufacturer ID : 19 12:14:28 : Serial Number : 139270123 12:14:28 : Firmware Version : 4 12:14:28 : Product Name : S0J9D8 12:14:28 : Physical Partitions : 4 12:14:28 : Total Logical Blocks: 12:14:28 : Drive [0] 122142720[58.242 GB] 12:14:28 : Drive [1] 8192[4 MB] 12:14:28 : Drive [2] 8192[4 MB] 12:14:28 : Drive [3] 8192[4 MB] 12:14:28 : Running : Ok 12:14:28 : 12:14:28 : Reading GPT[4], Partitions(72 Items) Ok 12:14:28 : Phone Information...... 12:14:29 : Model : Mi A2 12:14:29 : Brand : xiaomi 12:14:29 : Android Ver : 8.1.0 12:14:29 : Manufacturer : Xiaomi 12:14:29 : Device : jasmine_sprout 12:14:29 : Display ID : OPM1.171019.011.V9.6.9.0.ODIMIFE 12:14:29 : Security Patch : 2018-06-05 12:14:29 : Kernel ID : 2018-06-05 12:14:29 : Fingerprint : xiaomi/jasmine/jasmine_sprout:8.1.0/OPM1.171019.011/V9.6.9.0.ODIMIFE:user/release-keys 12:14:29 : ro_product_hardware : 12:14:29 : sys_hardware_version : 12:14:29 : 12:14:29 : 12:14:29 : ---------------------------- 12:14:29 : Flashing Selected Partitions 12:14:29 : >storsec(0)[storsec.mbn] Ok 12:14:29 : >oops(0)[storsec.mbn] Ok 12:14:29 : >rpm_a(0)[rpm.img] Ok 12:14:30 : >rpm_b(0)[rpm.img] Ok 12:14:30 : >hyp_a(0)[hyp.img] Ok 12:14:30 : >hyp_b(0)[hyp.img] Ok 12:14:30 : >pmic_a(0)[pmic.img] Ok 12:14:30 : >pmic_b(0)[pmic.img] Ok 12:14:31 : >cmnlib_a(0)[cmnlib.img] Ok 12:14:31 : >cmnlib64_a(0)[cmnlib64.img] Ok 12:14:31 : >cmnlib_b(0)[cmnlib.img] Ok 12:14:31 : >cmnlib64_b(0)[cmnlib64.img] Ok 12:14:31 : >abl_a(0)[abl.elf] Ok 12:14:32 : >abl_b(0)[abl.elf] Ok 12:14:32 : >devcfg_a(0)[devcfg.img] Ok 12:14:32 : >devcfg_b(0)[devcfg.img] Ok 12:14:32 : >tz_a(0)[tz.img] Ok 12:14:33 : >tz_b(0)[tz.img] Ok 12:14:33 : >mdtpsecapp_a(0)[mdtpsecapp.img] Ok 12:14:34 : >mdtpsecapp_b(0)[mdtpsecapp.img] Ok 12:14:34 : >keymaster_a(0)[keymaster.img] Ok 12:14:34 : >keymaster_b(0)[keymaster.img] Ok 12:14:34 : >bluetooth_a(0)[bluetooth.img] Ok 12:14:35 : >xbl_a(0)[xbl.img] Ok 12:14:35 : >xbl_b(0)[xbl.img] Ok 12:14:38 : >misc(0)[misc.img] Ok 12:14:38 : >dsp_a(0)[dsp.img] Ok 12:14:42 : >dsp_b(0)[dsp.img] Ok 12:14:45 : >bluetooth_b(0)[bluetooth.img] Ok 12:14:45 : >mdtp_a(0)[mdtp.img] Ok 12:14:49 : >mdtp_b(0)[mdtp.img] Ok 12:14:52 : >splash(0)[splash.img] Ok 12:14:57 : >persist(0)[persist.img] Skipped 12:14:57 : >persistbak(0)[persist.img] Ok 12:14:58 : >modem_a(0)[modem.img] Ok 12:15:20 : >modem_b(0)[modem.img] Ok 12:15:41 : >boot_a(0)[boot.img] Ok 12:15:47 : >boot_b(0)[boot.img] Ok 12:15:53 : >system_a(0)[system.img] Ok 12:20:24 : >system_b(0)[system.img] Ok 12:24:57 : >vendor_a(0)[vendor.img] Ok 12:26:44 : >vendor_b(0)[vendor.img] Ok 12:28:28 : >userdata(0)[userdata.img] Ok 12:28:56 : >PrimaryGPT(0)[gpt_main0.bin] Ok 12:28:56 : 12:28:56 : Flashing Patch Configuration.. 12:28:56 : 0 [NUM_DISK_SECTORS-34.] OK 12:28:57 : 0 [NUM_DISK_SECTORS-34.] OK 12:28:57 : 0 [NUM_DISK_SECTORS-34.] OK 12:28:57 : 0 [NUM_DISK_SECTORS-34.] OK 12:28:57 : 0 [NUM_DISK_SECTORS-1.] OK 12:28:57 : 0 [NUM_DISK_SECTORS-1.] OK 12:28:57 : 0 [NUM_DISK_SECTORS-33.] OK 12:28:58 : 0 [CRC32(2,9216)] OK 12:28:58 : 0 [CRC32(NUM_DISK_SECTORS-33.,9216)] OK 12:28:58 : 0 [0] OK 12:28:58 : 0 [CRC32(1,92)] OK 12:28:58 : 0 [0] OK 12:28:58 : 0 [CRC32(NUM_DISK_SECTORS-1.,92)] OK 12:28:59 : ---------------------------- 12:28:59 : Done! 12:28:59 : Operation : Setbootablestoragedrive: Drive 0 12:28:59 : Set bootable storage drive 0 Ok 12:28:59 : Rebooting Phone.... Ok 12:28:59 : 12:28:59 : TPortConnection.Destroy.....Closing...Ok.. 12:28:59 : 12:28:59 : Elapsed Time : 00:15:07 12:28:59 : Hydra Qualcomm Tool Ver 1.0.2 Build 5 12:38:03 : Windows 10 (Version 10.0, Build 19041, 64-bit Edition) 12:38:03 : Intel(R) Core(TM) i5-2500 CPU @ 3.30GHz 12:38:03 : NVIDIA GeForce GT 520 12:38:03 : Ram Installed : 4 GB 12:38:03 : Windows Access Right Admin 12:38:08 : ******* Dongle Info ******* 12:38:08 : Version : Hydra Tool v 1.2 12:38:08 : Serial : 200300003526 12:38:09 : Initialize : OKAY 12:38:09 : Status : Activated 12:38:09 : Life : 0 [0-0-0-0-0] 12:38:09 : 12:38:09 : PreOperation Configuration 12:38:09 : Brand : XIAOMI Model : Mi A2 (Jasmine) Storage : Auto 12:38:09 : Loader: prog_emmc_firehose_Sdm660_ddr.elf 12:38:09 : Port : Auto 12:38:09 : Connection : Flash Mode 12:38:09 : 12:38:09 : Searching EDL Port..[COM5] 12:38:13 : TPortConnection.Create...(COM5)..Opening...Ok 12:38:14 : Getting device info....... 12:38:17 : Serial No.: 0x46396BB4 12:38:17 : MSM ID : 0x0008C0E1, SDM660-Qualcomm Snapdragon 660 12:38:17 : PBL Ver : 00000002 12:38:17 : PK HASH : A7B8B82545A98ECA23D6E9105FB46456 12:38:17 : 8D1B5828264903441BDEF0CD57E3C370 12:38:17 : 12:38:17 : Firehose Loader[prog_emmc_firehose_Sdm660_ddr.elf] 12:38:17 : Initializing SaharaBoot... Ok 12:38:17 : Sending .................................Ok 12:38:23 : 12:38:24 : Connecting to Firehose... 12:38:25 : Ping...... Ok 12:38:25 : Configuration. 12:38:25 : Xiaomi Authentication needed... 12:38:28 : Signature Request -> bob[WTocxS 12:38:28 : Checking Internet connection.... 12:38:28 : - Hydra Is Online 12:38:28 : Connecting to Hydra Xiaomi Server... 12:38:30 : 12:38:30 : Signature @256bytes Authentication.... Accepted...................... 12:38:32 : Identifying Chip....Ok 12:38:32 : Chip Configuration : 12:38:32 : MemoryName : eMMC 12:38:32 : MaxPayloadSizeToTargetInBytes : 8192 12:38:32 : MaxPayloadSizeToTargetInBytesSupported : 8192 12:38:32 : MaxPayloadSizeFromTargetInBytes : 4096 12:38:32 : MaxXMLSizeInBytes : 4096 12:38:32 : TargetName : MSM8996 12:38:32 : Version : 1 12:38:32 : DateTime : Aug 16 2019 - 17:22:13 12:38:32 : 12:38:33 : *** STORAGE DEVICE INFO *** 12:38:33 : Memory Type : eMMC 12:38:33 : Block Size in Bytes : 512 12:38:33 : Page Size : 512 12:38:33 : Manufacturer ID : 19 12:38:33 : Serial Number : 139270123 12:38:33 : Firmware Version : 4 12:38:33 : Product Name : S0J9D8 12:38:33 : Physical Partitions : 4 12:38:33 : Total Logical Blocks: 12:38:33 : Drive [0] 122142720[58.242 GB] 12:38:33 : Drive [1] 8192[4 MB] 12:38:33 : Drive [2] 8192[4 MB] 12:38:33 : Drive [3] 8192[4 MB] 12:38:33 : Running : Ok 12:38:33 : 12:38:33 : Reading GPT[4], Partitions(72 Items) Ok 12:38:34 : Phone Information...... 12:38:35 : Model : Mi A2 12:38:35 : Brand : xiaomi 12:38:35 : Android Ver : 8.1.0 12:38:35 : Manufacturer : Xiaomi 12:38:35 : Device : jasmine_sprout 12:38:35 : Display ID : OPM1.171019.011.V9.6.17.0.ODIMIFE 12:38:35 : Security Patch : 2018-11-05 12:38:35 : Kernel ID : 2018-11-05 12:38:35 : Fingerprint : xiaomi/jasmine/jasmine_sprout:8.1.0/OPM1.171019.011/V9.6.17.0.ODIMIFE:user/release-keys 12:38:35 : ro_product_hardware : 12:38:35 : sys_hardware_version : 12:38:35 : 12:38:35 : Reading GPT[4], Partitions(72 Items) Ok 12:38:35 : *** FRP Reset *** 12:38:35 : Resetting FRP... 12:38:35 : Auto 12:38:35 : Processing... 12:38:35 : Executing ... 12:38:35 : [Zero Wipe] Ok |
The Following 2 Users Say Thank You to miguelcpm22 For This Useful Post: |
08-23-2020, 05:44 | #634 (permalink) |
No Life Poster Join Date: Apr 2016 Location: B A N G L A D E S H
Posts: 3,189
Member: 2556542 Status: Offline Thanks Meter: 1,790 | Symphony p7 frp Code: Brand : AUTO Model : AUTO Connection : Flash Mode ===================================== How To Boot : Power off phone * BROM Mode : Press VOL + * Preloader Mode : Just Insert cable Connection[WAITING]Found[PreLoader][COM8] Status[Opened] Identifying Hardware ID BROM CPUID : 6580 (0000)MT6580[6580] BROM HW_SW_VER : 8A00 CA00 0000 0000 FUSEID : 00001002 FUSEID : 00000000 SECURE VERSION : FF BL VERSION : 01 BR Secured : 00 Preparing Download Agent.. Download Agent : 6580.bin MTK_DOWNLOAD_AGENT -HYDRA MTK_AllInOne_DA_v3.3001.2018-09-18.13:22_452898 Initializing Loader [1] Sending Loader [1] Accepted PROTOCOL[OLD] - eMMC PRMMCCID : 150100513832334D420019B790989317 Running DA 4.2 on BBID : 0x9C Init Configuration Ok Initializing Loader [2] Sending Loader [2] Accepted Reading Flashchip data.... eMMC BOOT1 : 0x0000000000400000 -4 MB eMMC BOOT2 : 0x0000000000400000 -4 MB eMMC RPMB : 0x0000000000400000 -4 MB eMMC USER : 0x00000003A3E00000 -14.561 GB ERAM Size : 0x0000000080000000 -2 GB IRAM Size : 0x0000000000020000 -128 KB UNICAL RID : 58DC24368E6F7CA8560EC1182CE6ECA5 eMMC CID : 510001154D333238B719004217939890 Change to HIGH SPEED... Connection[WAITING]Found[COM37] Status[Opened] Reading Partition Table SIZE[0x00000738] 21 Items > Done Reading System Info Model : Symphony P7 Brand : Symphony Android Ver : 6.0 Manufacturer : Symphony Device : P7 Board : P7 Display ID : P7_HW1_V10 Security Patch : 2016-09-05 Platform : mt6580 Kernel ID : 2016-09-05 FRPPST : /dev/block/platform/mtk-msdc.0/11120000.msdc0/by-name/frp Fingerprint : Symphony/P7/Symphony_P7:6.0/MRA58K/1472210484:user/release-keys ro_product_hardware : sys_hardware_version : Autobackup Partitions -preloader[0x00000000] 512 KB -> preloader.bin...Ok -> Renaming Preloader.... preloader_m3679.bin Creating Scatter file... C:\Hydra Tool\\Backup\Auto\Symphony_Symphony P7_6580-mt6580-6.0(P7_HW1_V10)_220820030901\MT6580_Android_scatter.txt -nvram[0x00380000] 5 MB -> nvram.bin...Ok -nvdata[0x050A0000] 32 MB -> nvdata.bin...Ok Done!!! C:\Hydra Tool\\Backup\Auto\Symphony_Symphony P7_6580-mt6580-6.0(P7_HW1_V10)_220820030901 MTK Phone Loader is NOW RUNNING. Reading System Info Model : Symphony P7 Brand : Symphony Android Ver : 6.0 Manufacturer : Symphony Device : P7 Board : P7 Display ID : P7_HW1_V10 Security Patch : 2016-09-05 Platform : mt6580 Kernel ID : 2016-09-05 FRPPST : /dev/block/platform/mtk-msdc.0/11120000.msdc0/by-name/frp Fingerprint : Symphony/P7/Symphony_P7:6.0/MRA58K/1472210484:user/release-keys ro_product_hardware : sys_hardware_version : ------------------------------------- Operation : Auto Processing... ZeroWipe FRP Partition... [Ok] Ok Elapsed Time : 00:00:28 |
The Following 2 Users Say Thank You to kothamamun For This Useful Post: |
08-25-2020, 10:33 | #635 (permalink) |
Product Manager Join Date: Aug 2018 Location: Ukraine / Harkov
Posts: 1,986
Member: 2857401 Status: Offline Thanks Meter: 6,861 | Xiaomi BlackShark SKR-A0 UFS Chip Unbrick Success Xiaomi Black Shark SKR-A0 UFS Chip Unbrick Success BlackShark SKR-A0 Downgrade Android 8.1.0 by Hydra Tool EDL Mode |
The Following 3 Users Say Thank You to Hydra Tool For This Useful Post: |
08-29-2020, 13:08 | #638 (permalink) |
Freak Poster Join Date: Dec 2009 Location: jind
Posts: 219
Member: 1181899 Status: Offline Thanks Meter: 79 | redmi 7a pine full flash problem solve the system has been dystroyed. Hydra Qualcomm Tool Ver 1.0.2 Build 10 Windows 10 (Version 10.0, Build 18362, 64-bit Edition) Intel(R) Core(TM) i7-6500U CPU @ 2.50GHz Intel(R) HD Graphics 520 Ram Installed : 8 GB Windows Access Right Admin ******* Dongle Info ******* Version : Hydra Tool v 1.2 Serial : 200 Initialize : OKAY Status : Activated Life : 0 [0-0-0-0-0] Searching EDL Port..[COM77] TPortConnection.Create...(COM77)..Opening...Ok Getting device info....... Serial No.: 0x86FE14FD MSM ID : 0x000BF0E1, SDM439-Qualcomm Snapdragon 439 PBL Ver : 00000001 PK HASH : 57158EAF1814D78FD2B3105ECE4DB18A 817A08AC664A5782A925F3FF8403D39A Firehose Loader[Xiaomi_Redmi_8_Olive.mbn] Initializing SaharaBoot... Ok Sending .......................Ok Connecting to Firehose... Ping... Ok Configuration. Xiaomi Authentication needed... Signature Request -> bob[Zl-0PTRVQS9gLqAWHQ6-ExMVxes] Checking Internet connection.... - Hydra Is Online Connecting to Hydra Xiaomi Server... Signature @256bytes Authentication.... Accepted...... Identifying Chip....Ok Chip Configuration : MemoryName : eMMC MaxPayloadSizeToTargetInBytes : 1048576 MaxPayloadSizeToTargetInBytesSupported : 1048576 MaxPayloadSizeFromTargetInBytes : 4096 MaxXMLSizeInBytes : 4096 TargetName : 8937 Version : 1 *** STORAGE DEVICE INFO *** Memory Type : eMMC Block Size in Bytes : 512 Page Size : 512 Manufacturer ID : 144 Serial Number : 2937262277 Firmware Version : 909127728 Product Name : hB8aP> Physical Partitions : 3 Total Logical Blocks: Drive [0] 61071360[29.121 GB] Drive [1] 8192[4 MB] Drive [2] 8192[4 MB] Running : Ok Reading GPT[3], Partitions(60 Items) Ok Phone Information...... Model : Brand : Android Ver : 10 Miui Ver : V11 Manufacturer : Xiaomi Device : Mod_device : pine_in_global Display ID : Security Patch : 2020-05-01 Kernel ID : 2020-05-01 Fingerprint : ro_product_hardware : sys_hardware_version : Reading GPT[3], Partitions(60 Items) Ok Backup Security partitions... Reading Security Items.... > modemst1 > modemst2 > fsg D:\HYDRA TOOL\HydraTool_Fullpackage_8-27-2020\Backup\Security_Backup\__10_Security_08292014 0440.sec Backup Security Success.... ---------------------------- Flashing Selected Partitions >sec(0)[sec.dat] Skipped >config(0)[config.bin] Skipped >vbmeta(0)[vbmeta.img] Ok >vbmetabak(0)[vbmeta.img] Ok >devcfg(0)[devcfg.mbn] Ok >devcfgbak(0)[devcfg.mbn] Ok >apdp(0)[dummy.img] Ok >msadp(0)[dummy.img] Ok >sbl1(0)[sbl1.mbn] Ok >sbl1bak(0)[sbl1.mbn] Ok >rpm(0)[rpm.mbn] Ok >rpmbak(0)[rpm.mbn] Ok >cmnlib(0)[cmnlib_30.mbn] Ok >cmnlibbak(0)[cmnlib_30.mbn] Ok >cmnlib64(0)[cmnlib64_30.mbn] Ok >cmnlib64bak(0)[cmnlib64_30.mbn] Ok >keymaster(0)[km4.mbn] Ok >keymasterbak(0)[km4.mbn] Ok >misc(0)[misc.img] Ok >aboot(0)[emmc_appsboot.mbn] Ok >abootbak(0)[emmc_appsboot.mbn] Ok >tz(0)[tz.mbn] Ok >tzbak(0)[tz.mbn] Ok >dtbo(0)[dtbo.img] Ok >dtbobak(0)[dtbo.img] Ok >splash(0)[splash.img] Ok >dsp(0)[adspso.bin] Ok >dspbak(0)[adspso.bin] Ok >persist(0)[persist.img] Skipped >mdtp(0)[mdtp.img] Ok >mdtpbak(0)[mdtp.img] Ok >boot(0)[boot.img] Ok >recovery(0)[recovery.img] Ok >cache(0)[cache.img] Ok >modem(0)[NON-HLOS.bin] Ok >system(0)[system.img] Ok >vendor(0)[vendor.img] Ok >cust(0)[cust.img] Ok >userdata(0)[userdata.img] Ok >PrimaryGPT(0)[gpt_main0.bin] Ok Flashing Patch Configuration.. 0 [NUM_DISK_SECTORS-34.] OK 0 [NUM_DISK_SECTORS-34.] OK 0 [NUM_DISK_SECTORS-34.] OK 0 [NUM_DISK_SECTORS-34.] OK 0 [NUM_DISK_SECTORS-1.] OK 0 [NUM_DISK_SECTORS-1.] OK 0 [NUM_DISK_SECTORS-33.] OK 0 [CRC32(2,7680)] OK 0 [CRC32(NUM_DISK_SECTORS-33.,7680)] OK 0 [0] OK 0 [CRC32(1,92)] OK 0 [0] OK 0 [CRC32(NUM_DISK_SECTORS-1.,92)] OK ---------------------------- Done! Operation : Setbootablestoragedrive: Drive 0 Set bootable storage drive 0 Ok Rebooting Phone.... Ok TPortConnection.Destroy.....Closing...Ok.. Elapsed Time : 00:06:34 |
The Following 2 Users Say Thank You to prince2047 For This Useful Post: |
08-29-2020, 14:00 | #639 (permalink) |
No Life Poster Join Date: Apr 2016 Location: B A N G L A D E S H
Posts: 3,189
Member: 2556542 Status: Offline Thanks Meter: 1,790 | oppo a57 password unlock done Code: PreOperation Configuration Brand : AUTO Model : AUTO Storage : Auto Loader: Auto Port : Auto Connection : Flash Mode Searching EDL Port..[COM57] TPortConnection.Create...(COM57)..Opening...Ok Getting device info....... Serial No.: 0x63981E5F MSM ID : 0x0006B0E1, PBL Ver : 00000000 PK HASH : 77A22B92A1BCD0C4D3AAA10AA9F1B2C3 6D51C0CA7429B5201D0FD1D5F5B53BBC Firehose Loader[Oppo_A57_8940.mbn] Initializing SaharaBoot... Ok Sending ....................Ok Connecting to Firehose... Ping... Ok Configuration...... Identifying Chip....Ok Chip Configuration : MemoryName : eMMC MaxPayloadSizeToTargetInBytes : 1048576 MaxPayloadSizeToTargetInBytesSupported : 1048576 MaxPayloadSizeFromTargetInBytes : 4096 MaxXMLSizeInBytes : 4096 TargetName : 8937 Version : 1 *** STORAGE DEVICE INFO *** Memory Type : eMMC Block Size in Bytes : 512 Page Size : 512 Manufacturer ID : 21 Serial Number : 2277426271 Firmware Version : 7 Product Name : RX1BMB Physical Partitions : 3 Total Logical Blocks: Drive [0] 61071360[29.121 GB] Drive [1] 8192[4 MB] Drive [2] 8192[4 MB] Running : Ok Reading GPT[3], Partitions(60 Items) Ok Phone Information..... Model : CPH1701 Brand : OPPO Android Ver : 6.0.1 Manufacturer : OPPO Device : CPH1701 Board : QC_Reference_Phone Display ID : CPH1701EX_11_A.11_170421 Security Patch : 2017-03-05 Platform : msm8937 Kernel ID : 2017-03-05 FRPPST : /dev/block/bootdevice/by-name/config Fingerprint : ro_product_hardware : sys_hardware_version : Reading GPT[3], Partitions(60 Items) Ok Formatting Userdata... Method : Auto Processing... Executing ... [Safe method] Ok TPortConnection.Destroy.....Closing...Ok.. Elapsed Time : 00:00:10 |
The Following 2 Users Say Thank You to kothamamun For This Useful Post: |
08-30-2020, 10:39 | #640 (permalink) |
No Life Poster Join Date: Apr 2016 Location: B A N G L A D E S H
Posts: 3,189
Member: 2556542 Status: Offline Thanks Meter: 1,790 | redmi 5 rosy dead recover done Code: Searching EDL Port..[COM57] TPortConnection.Create...(COM57)..Opening...Ok Getting device info....... Serial No.: 0xE83567A0 MSM ID : 0x0009A0E1, SDM450-Qualcomm Snapdragon 450 PBL Ver : 00000000 PK HASH : 57158EAF1814D78FD2B3105ECE4DB18A 817A08AC664A5782A925F3FF8403D39A Firehose Loader[PROG_E~1.MBN] Initializing SaharaBoot... Ok Sending ...................Ok Connecting to Firehose... Ping... Ok Configuration......Ok Chip Configuration : MemoryName : eMMC MaxPayloadSizeToTargetInBytes : 1048576 MaxPayloadSizeToTargetInBytesSupported : 1048576 MaxPayloadSizeFromTargetInBytes : 4096 MaxXMLSizeInBytes : 4096 TargetName : 8953 Version : 1 *** STORAGE DEVICE INFO *** Memory Type : eMMC Block Size in Bytes : 512 Page Size : 512 Manufacturer ID : 144 Serial Number : 928726214 Firmware Version : 165 Product Name : HAG4a2 Physical Partitions : 3 Total Logical Blocks: Drive [0] 30777344[14.676 GB] Drive [1] 8192[4 MB] Drive [2] 8192[4 MB] Running : Ok Reading GPT[3], Partitions(52 Items) Ok Phone Information..... Model : Redmi 5 Brand : Xiaomi Android Ver : 8.1.0 Miui Ver : V11 Manufacturer : Xiaomi Device : rosy Mod_device : rosy_global Board : msm8953 Display ID : CUSTOMER_VERSION_rosy Security Patch : 2019-10-01 Platform : msm8953 Kernel ID : 2019-10-01 FRPPST : /dev/block/bootdevice/by-name/config Fingerprint : Xiaomi/rosy/rosy:8.1.0/OPM1.171019.026/V11.0.1.0.ODAMIXM:user/release-keys ro_product_hardware : sys_hardware_version : Reading GPT[3], Partitions(52 Items) Ok Backup Security partitions... Reading Security Items.... > modemst1 > modemst2 > fsg C:\Hydra Tool\Backup\Security_Backup\Redmi 5_msm8953_8.1.0_Security_082920050558.sec Backup Security Success.... ---------------------------- Flashing Selected Partitions >modem(0)[NON-HLOS.bin] Ok >sbl1(0)[sbl1.mbn] Ok >sbl1bak(0)[sbl1.mbn] Ok >rpm(0)[rpm.mbn] Ok >rpmbak(0)[rpm.mbn] Ok >tz(0)[tz.mbn] Ok >tzbak(0)[tz.mbn] Ok >devcfg(0)[devcfg.mbn] Ok >devcfgbak(0)[devcfg.mbn] Ok >dsp(0)[adspso.bin] Ok >splash(0)[splash.img] Ok >boot(0)[boot.img] Ok >recovery(0)[recovery.img] Ok >system(0)[system.img] Ok >cache(0)[cache.img] Ok >persist(0)[persist.img] Skipped >misc(0)[misc.img] Ok >lksecapp(0)[lksecapp.mbn] Ok >lksecappbak(0)[lksecapp.mbn] Ok >cmnlib(0)[cmnlib_30.mbn] Ok >cmnlibbak(0)[cmnlib_30.mbn] Ok >keymaster(0)[keymaster.mbn] Ok >keymasterbak(0)[keymaster.mbn] Ok >cust(0)[cust.img] Ok >userdata(0)[userdata.img] Ok >PrimaryGPT(0)[gpt_main0.bin] Ok Flashing Patch Configuration.. 0 [NUM_DISK_SECTORS-34.] OK 0 [NUM_DISK_SECTORS-34.] OK 0 [NUM_DISK_SECTORS-34.] OK 0 [NUM_DISK_SECTORS-34.] OK 0 [NUM_DISK_SECTORS-1.] OK 0 [NUM_DISK_SECTORS-1.] OK 0 [NUM_DISK_SECTORS-33.] OK 0 [CRC32(2,6656)] OK 0 [CRC32(NUM_DISK_SECTORS-33.,6656)] OK 0 [0] OK 0 [CRC32(1,92)] OK 0 [0] OK 0 [CRC32(NUM_DISK_SECTORS-1.,92)] OK ---------------------------- Done! Operation : Setbootablestoragedrive: Drive 0 Set bootable storage drive 0 Ok Rebooting Phone.... Ok TPortConnection.Destroy.....Closing...Ok.. Elapsed Time : 00:32:35 |
The Following 2 Users Say Thank You to kothamamun For This Useful Post: |
08-31-2020, 11:11 | #641 (permalink) | |
No Life Poster Join Date: Feb 2012 Age: 39
Posts: 1,395
Member: 1724862 Status: Offline Thanks Meter: 448 | Redmi Note 8 IMEI Repair Bootloader Locked, Without Root, Without Credit Redmi Note 8 IMEI Repair Bootloader Locked, Without Root, Without Credit Xiaomi Redmi Note 8 (ginkgo) Repair IMEI Without Root, Without Unlock BL, Without Credit, Without Auth by Hydra Tool steps.
Quote:
| |
The Following 2 Users Say Thank You to ceza031 For This Useful Post: |
09-02-2020, 13:36 | #642 (permalink) |
No Life Poster Join Date: Apr 2016 Location: B A N G L A D E S H
Posts: 3,189
Member: 2556542 Status: Offline Thanks Meter: 1,790 | vivo y55 password and frp Code: PreOperation Configuration Brand : VIVO Model : Y55 (1610) Storage : Auto Loader: vivo_2_6.mbn Port : Auto Connection : Flash Mode Searching EDL Port..[COM57] TPortConnection.Create...(COM57)..Opening...Ok Getting device info....... Serial No.: 0x2CA34AD6 MSM ID : 0x000560E1, MSM8917-Qualcomm Snapdragon 425 PBL Ver : 00000000 PK HASH : 60BA997FEF6DA9F05885FA11F1DD6D2A 90D052A257A09C2075D7246CC73C0D43 Firehose Loader[vivo_2_6.mbn] Initializing SaharaBoot... Ok Sending .................Ok Connecting to Firehose... Ping... Ok Configuration...... Identifying Chip....Ok Chip Configuration : MemoryName : eMMC MaxPayloadSizeToTargetInBytes : 1048576 MaxPayloadSizeToTargetInBytesSupported : 1048576 MaxPayloadSizeFromTargetInBytes : 4096 MaxXMLSizeInBytes : 4096 TargetName : 8917 Version : 1 *** STORAGE DEVICE INFO *** Memory Type : eMMC Block Size in Bytes : 512 Page Size : 512 Manufacturer ID : 21 Serial Number : 4071271085 Firmware Version : 3 Product Name : GE6BMB Physical Partitions : 3 Total Logical Blocks: Drive [0] 30535680[14.561 GB] Drive [1] 8192[4 MB] Drive [2] 8192[4 MB] Running : Ok Reading GPT[3], Partitions(52 Items) Ok Phone Information..... Model : vivo 1610 Brand : vivo Android Ver : 6.0.1 Manufacturer : vivo Device : PD1613BF_EX Board : QC_Reference_Phone Display ID : MMB29M release-keys Security Patch : 2017-04-01 Platform : msm8937 Kernel ID : 2017-04-01 FRPPST : /dev/block/bootdevice/by-name/config Fingerprint : vivo/1610/1610:6.0.1/MMB29M/compiler05252021:user/release-keys ro_product_hardware : sys_hardware_version : Reading GPT[3], Partitions(52 Items) Ok Formatting Userdata... Method : Auto Processing... Executing ... [Safe method] Ok TPortConnection.Destroy.....Closing...Ok.. Elapsed Time : 00:00:11 Code: PreOperation Configuration Brand : VIVO Model : Y55 (1610) Storage : Auto Loader: vivo_2_6.mbn Port : Auto Connection : Flash Mode Searching EDL Port..[COM57] TPortConnection.Create...(COM57)..Opening...Ok Getting device info....... Serial No.: 0x2CA34AD6 MSM ID : 0x000560E1, MSM8917-Qualcomm Snapdragon 425 PBL Ver : 00000000 PK HASH : 60BA997FEF6DA9F05885FA11F1DD6D2A 90D052A257A09C2075D7246CC73C0D43 Firehose Loader[vivo_2_6.mbn] Initializing SaharaBoot... Ok Sending .................Ok Connecting to Firehose... Ping... Ok Configuration...... Identifying Chip....Ok Chip Configuration : MemoryName : eMMC MaxPayloadSizeToTargetInBytes : 1048576 MaxPayloadSizeToTargetInBytesSupported : 1048576 MaxPayloadSizeFromTargetInBytes : 4096 MaxXMLSizeInBytes : 4096 TargetName : 8917 Version : 1 *** STORAGE DEVICE INFO *** Memory Type : eMMC Block Size in Bytes : 512 Page Size : 512 Manufacturer ID : 21 Serial Number : 4071271085 Firmware Version : 3 Product Name : GE6BMB Physical Partitions : 3 Total Logical Blocks: Drive [0] 30535680[14.561 GB] Drive [1] 8192[4 MB] Drive [2] 8192[4 MB] Running : Ok Reading GPT[3], Partitions(52 Items) Ok Phone Information..... Model : vivo 1610 Brand : vivo Android Ver : 6.0.1 Manufacturer : vivo Device : PD1613BF_EX Board : QC_Reference_Phone Display ID : MMB29M release-keys Security Patch : 2017-04-01 Platform : msm8937 Kernel ID : 2017-04-01 FRPPST : /dev/block/bootdevice/by-name/config Fingerprint : vivo/1610/1610:6.0.1/MMB29M/compiler05252021:user/release-keys ro_product_hardware : sys_hardware_version : Reading GPT[3], Partitions(52 Items) Ok *** FRP Reset *** Resetting FRP... Auto Processing... Executing ... [Zero Wipe] Ok TPortConnection.Destroy.....Closing...Ok.. Elapsed Time : 00:00:12 |
The Following 2 Users Say Thank You to kothamamun For This Useful Post: |
09-08-2020, 10:56 | #643 (permalink) |
Freak Poster Join Date: Apr 2011 Location: Armenia Yerevan
Posts: 134
Member: 1559514 Status: Offline Thanks Meter: 49 | xiaomi redmi note 4 nikel mtk disable screenlock is done by Hydra mtk tool Last edited by Varazdat; 09-08-2020 at 11:04. |
The Following 2 Users Say Thank You to Varazdat For This Useful Post: |
09-09-2020, 13:42 | #645 (permalink) |
No Life Poster Join Date: Apr 2016 Location: B A N G L A D E S H
Posts: 3,189
Member: 2556542 Status: Offline Thanks Meter: 1,790 | oppo a37f password unlock Code: PreOperation Configuration Brand : OPPO Model : A37FW Storage : Auto Loader: 8916.mbn Port : Auto Connection : Flash Mode Searching EDL Port..[COM57] TPortConnection.Create...(COM57)..Opening...Ok Getting device info....... Serial No.: 0x2686FB51 MSM ID : 0x007050E1, MSM8916-Qualcomm Snapdragon 410 PBL Ver : 00000000 PK HASH : CC3153A80293939B90D02D3BF8B23E02 92E452FEF662C74998421ADAD42A380F Firehose Loader[8916.mbn] Initializing SaharaBoot... Ok Sending .....Ok Connecting to Firehose... Ping... Ok Configuration...... Identifying Chip....Ok Chip Configuration : MemoryName : eMMC MaxPayloadSizeToTargetInBytes : 16384 MaxPayloadSizeToTargetInBytesSupported : 16384 MaxPayloadSizeFromTargetInBytes : 4096 MaxXMLSizeInBytes : 4096 TargetName : 8916 Version : 1 Running : Ok Reading GPT[3], Partitions(44 Items) Ok Phone Information..... Vendor : OPPO Model : A37f Android Ver : 5.1.1 Board : msm8916 Display ID : A37fEX_11_190711 Security Patch : 2018-03-01 Platform : msm8916 Kernel ID : 2018-03-01 FRPPST : /dev/block/bootdevice/by-name/config Reading GPT[3], Partitions(44 Items) Ok Formatting Userdata... Method : Auto Processing... Executing ... [Safe method] Ok TPortConnection.Destroy.....Closing...Ok.. Elapsed Time : 00:00:10 |
The Following User Says Thank You to kothamamun For This Useful Post: |
Bookmarks |
| |
|