GSM Shop GSM Shop
GSM-Forum  

Welcome to the GSM-Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features.
Only registered members may post questions, contact other members or search our database of over 8 million posts.

Registration is fast, simple and absolutely free so please - Click to REGISTER!

If you have any problems with the registration process or your account login, please contact contact us .

Go Back   GSM-Forum > Product Support Sections > Special Solutions / Services / WebShop > GSMFABRICA Products > HYDRA TOOL


Reply
 
LinkBack Thread Tools Display Modes
Old 01-22-2021, 04:09   #991 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,623
Auss X01BD (Zenfone Max M2 ZB633KL) sero wipe successfully done by Hydra Tool


Auss X01BD (Zenfone Max M2 ZB633KL) sero wipe successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : ASUS Model : X01BD (Zenfone Max M2 ZB633KL) Storage : Auto
Loader: asus_5_2.mbn
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM7)
SymbolicName :\??\USB#VID_05C6&PID_9008#6&3950927a&0&2#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/02/2017,2.1.2.7

Getting device info......
Serial No.: 0xC89025C4
MSM ID : 0x0008C0E1, SDM660-Qualcomm Snapdragon 660
PBL Ver : 00000000
PK HASH : 54736AEBEAAF4167A56D97D6D0C5F52F
A3FCE66E28B2B377B52EDF6E53490B65

Firehose Loader[asus_5_2.mbn]
SaharaBoot... Ok
Sending ...............................Ok
Connecting to Firehose...
Ping......... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : MSM8996
Version : 1
DateTime : Dec 7 2018 - 17:09:09

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 19
Serial Number : 84112126
Firmware Version : 4
Product Name : S0J9G8
Physical Partitions : 4
Total Logical Blocks:
Drive [0] 122142720[58.242 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Drive [3] 8192[4 MB]

Protocol : Universal
Running : Ok
Reading GPT[4]
Drive [0] 68 Items
Drive [1] 0 Items
Drive [2] 0 Items
Drive [3]


Phone Information.....
Brand : asus
Vendor : asus
Model : ASUS_X01BD
ID : PKQ1
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : sdm660_64-user 9 PKQ1 111 release-keys
Device : ASUS_X01BD
Display ID : PKQ1.WW_Phone-16.2017.2010.101-20201127
Security Patch : 2020-10-05
Fingerprint : Android/sdm660_64/sdm660_64:9/PKQ1/16.2017.2010.101-20201127:user/release-keys

Processing Auto....
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOk
- Formatting Userdata
Executing ...
- Formatting Userdata [Safe method] OkOk
Action Result : Ok

Elapsed Time : 00:00:07
BR
Dipendra Pathak

  Reply With Quote
Old 01-22-2021, 04:17   #992 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,623
Huawei DUB-LX3 (Y7 2019) FRP successfully Removed by Hydra Tool

Huawei DUB-LX3 (Y7 2019) FRP successfully Removed by Hydra Tool

Screen Short:



Logs:

[LEFT]
Quote:
PreOperation Configuration
Brand : HUAWEI Model : DUB-LX3 (Y7 2019) Storage : Auto
Loader: DUB-LX1_Loader_T-Tool-Team_1.mbn
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM5)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&d1b615&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/25/2014,2.1.1.0

Getting device info......
Serial No.: 0x18D9742E
MSM ID : 0x0009A0E1, SDM450-Qualcomm Snapdragon 450
PBL Ver : 00000000
PK HASH : 6BC369511DA9CADB3A7AF61574F89DB3
85003D6241BDD1FF573DBA61BF6AE119

Firehose Loader[DUB-LX1_Loader_T-Tool-Team_1.mbn]
SaharaBoot... Ok
Sending .............Ok
Connecting to Firehose...
Ping... Ok
Configuration.......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8953
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 19
Serial Number : 400857480
Firmware Version : 0
Product Name : S0J9N8
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 122142720[58.242 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok
Reading GPT[3]
Drive [0] 60 Items
Drive [1] 0 Items
Drive [2] 0 Items

Processing Remove FRP....
- Removing FRP [Zero Wipe] Ok
Action Result : Ok

Rebooting Phone.... Ok

Elapsed Time : 00:00:28
BR
Dipendra Pathak

[/LEFT
  Reply With Quote
Old 01-22-2021, 04:25   #993 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,623
Samsung SM-J500F (J5) factory reset successfully done by Hydra Tool

Samsung SM-J500F (J5) factory reset successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
Scanning port....
TPortConnection.Create...(COM16)..Opening...Ok
Device Mode : Download Mode
CPU : QUALCOMM
Format Userdata
Auto
SamFormatUDAuto
Total Binary Size is 0.25MB
Initialize Phone : Ok
Partition Information Table(PIT)
- Backup
Backup PIT (COM_TAR2MSM8916) Ok
- Reading.. Ok
- Mapping..Ok
Successfully Formatted!!!

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:10
BR
Dipendra Pathak

  Reply With Quote
Old 01-22-2021, 04:35   #994 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,623
Vivo Y53 FRP Zero Wipe successfully done by Hydra Tool

Vivo Y53 FRP Zero Wipe successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : VIVO Model : Y53 Storage : Auto
Loader: 8917.mbn
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM5)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&212ac8fc&0&4#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/02/2017,2.1.2.7

Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8917
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 932780292
Firmware Version : 165
Product Name : HAG4a2
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 30777344[14.676 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok
Reading GPT[3]
Drive [0] 52 Items
Drive [1] 0 Items
Drive [2] 0 Items


Phone Information.....
Brand : vivo
Vendor : vivo
Model : vivo PD1628F_EX
ID : MMB29M
SDK : 23
Release : 6.0.1
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-US
Description : msm8937_32-user 6.0.1 MMB29M eng.compiler.20190105.211334 release-keys
Device : PD1628F_EX
Board : QC_Reference_Phone
Display ID : MMB29M release-keys
Security Patch : 2018-08-01
Emmc_size : 16GB
Platform : msm8937
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : vivo/PD1628F_EX/PD1628F_EX:6.0.1/MMB29M/compiler01052117:user/release-keys

Processing Safe Format - EMMC....
- Removing FRP [Zero Wipe] Ok
- Formatting Userdata [Safe method] Ok
Action Result : Ok

Elapsed Time : 00:00:05
BR
Dipendra Pathak

  Reply With Quote
Old 01-22-2021, 15:23   #995 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,623
Xiaomi Redmi 4X Zero Wipe and removing FRP successfully Done by Hydra Tool

Xiaomi Redmi 4X Zero Wipe and removing FRP successfully Done by Hydra Tool

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : AUTO Model : AUTO Storage : Auto
Loader: Auto
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM3)
SymbolicName :\??\USB#VID_05C6&PID_9008#6&37369825&0&3#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :

Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 1943066838
Firmware Version : 5
Product Name : RH64AB
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 122142720[58.242 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok
Reading GPT[3]
Drive [0] 52 Items
Drive [1] 0 Items
Drive [2] 0 Items


Phone Information.....
Brand : Xiaomi
Vendor : Xiaomi
Model : Redmi 4X
ID : N2G47H
SDK : 25
Release : 7.1.2
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : santoni-user 7.1.2 N2G47H V11.0.2.0.NAMMIXM release-keys
Miui Ver : V11
Device : santoni
Mod_device : santoni_global
Board : QC_Reference_Phone
Display ID : N2G47H
Security Patch : 2018-10-01
Emmc_size : 16GB
Platform : msm8937
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : Xiaomi/santoni/santoni:7.1.2/N2G47H/V11.0.2.0.NAMMIXM:user/release-keys

Processing Safe Format - EMMC....
- Removing FRP [Zero Wipe] Ok
- Formatting Userdata [Safe method] Ok
Action Result : Ok

Rebooting Phone.... Ok

Elapsed Time : 00:00:05
BR
Dipendra Pathak

  Reply With Quote
Old 01-22-2021, 15:29   #996 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,623
Xiaomi Mi 5X (Tiffany) removing frp successfully done by Hydra Tool

Xiaomi Mi 5X (Tiffany) removing frp successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : XIAOMI Model : Mi 5X (Tiffany) Storage : Auto
Loader: Xiaomi_S2y2_noauth_8953_ddr.mbn
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM3)
SymbolicName :\??\USB#VID_05C6&PID_9008#6&1aa098dc&0&2#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/02/2017,2.1.2.7

Getting device info......
Serial No.: 0x6D602FC7
MSM ID : 0x000460E1, MSM8953-Qualcomm Snapdragon 625
PBL Ver : 00000000
PK HASH : 57158EAF1814D78FD2B3105ECE4DB18A
817A08AC664A5782A925F3FF8403D39A

Firehose Loader[Xiaomi_S2y2_noauth_8953_ddr.mbn]
SaharaBoot... Ok
Sending ...................Ok
Connecting to Firehose...
Ping... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8953
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 3463170168
Firmware Version : 5
Product Name : RH64AB
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 122142720[58.242 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok
Reading GPT[3]
Drive [0] 52 Items
Drive [1] 0 Items
Drive [2] 0 Items


Phone Information.....
Brand : xiaomi
Vendor : Xiaomi
Model : MI 5X
ID : OPM1.171019.019
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : whyred-user 8.1.0 OPM1.171019.011 V10.2.2.0.OEIMIXM release-keys
Miui Ver : V10
Device : tiffany
Mod_device : tiffany_global
Board : msm8953
Display ID : ZQL1711-tiffany-build-20181221204409
Security Patch : 2018-12-01
Emmc_size : 16GB
Platform : msm8953
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : xiaomi/whyred/whyred:8.1.0/OPM1.171019.011/V10.2.2.0.OEIMIXM:user/release-keys

Processing Safe Format - EMMC....
- Removing FRP [Zero Wipe] Ok
- Formatting Userdata [Safe method] Ok
Action Result : Ok

Rebooting Phone.... Ok

Elapsed Time : 00:00:15
BR
Dipendra Pathak

  Reply With Quote
Old 01-22-2021, 15:39   #997 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,623
Xiaomi Redmi 5A (riva) write persist successfully done by Hydra Tool

Xiaomi Redmi 5A (riva) write persist successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
Searching Device By Fastboot
Device Found...

Reading Information...version: 0.5
Product : cactus
version : 0.5
Secure : no
Device Info:

Fastboot Persist ...
Processing...
Action Result : Ok

Elapsed Time : 00:00:04
BR
Dipendra Pathak

  Reply With Quote
Old 01-22-2021, 16:05   #998 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,623
Xiaomi Redmi Note 8 (Ginkgo) removed MI Account successfully done by Hydra Tool

Xiaomi Redmi Note 8 (Ginkgo) removed MI Account successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : XIAOMI Model : Redmi Note 8 (ginkgo) Storage : Auto
Loader: Xiaomi_redminote8_loader.elf
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM34)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&39a40d66&0&2#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :03/25/2016,2.1.2.2

Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping..................... Ok
Configuration.........
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Jul 3 2019 - 22:23:56

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 19
Serial Number : 329747001
Firmware Version : 4
Product Name : S0J9K8
Physical Partitions : 4
Total Logical Blocks:
Drive [0] 122142720[58.242 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Drive [3] 32768[16 MB]

Protocol : Universal
Running : Ok
Reading GPT[4]
Drive [0] 88 Items
Drive [1] 0 Items
Drive [2] 0 Items
Drive [3]


Phone Information......
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi Note 8
ID : PKQ1.190616.001
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : ginkgo-user 9 PKQ1.190616.001 V11.0.8.0.PCOMIXM release-keys
Miui Ver : V11
Device : ginkgo
Mod_device : ginkgo_global
Display ID : PKQ1.190616.001
Security Patch : 2020-03-01
Fingerprint : xiaomi/ginkgo/ginkgo:9/PKQ1.190616.001/V11.0.8.0.PCOMIXM:user/release-keys

Processing Remove MiAccount[Patch Method]....
Backing up Partition for safety...Ok

Scanning Patching address...
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]Done!!
Total Items patched : 3
Successfully patched address..
Action Result : Ok

Elapsed Time : 00:05:31
BR
Dipendra Pathak

  Reply With Quote
Old 01-22-2021, 16:16   #999 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,623
COL DSR R7 FRP successfully removed by Hydra Tool

COL DSR R7 FRP successfully removed by Hydra Tool

Screen Short:



Logs:

Quote:
Brand : AUTO Model : Connection : Flash Mode

=====================================
How To Boot : Power off phone
* BROM Mode : Press VOL +
* Preloader Mode : Just Insert cable

Connection
-Please wait...
-Connect Phone...
-Found...
-PreLoader...[COM7]

TPortConnection.Create...(COM7)..Opening...Ok

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0335 (0000)MT6737[6735]
BROM HW_SW_VER : 8A00 CB00 0000 0000
FUSEID : 00000000
SECURE VERSION : 00
BL VERSION : 00
BR Secured : 00
NORMAL BOOT

Preparing Download Agent..
DA : 6735.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2018-09-18.13:22_452898
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : Old - eMMC
00000000000000000000
PRMMCCID : 514E011336334A326200104389649001
Init Configuration
Running DA 4.2 on BBID : 0x9B Ok

Initializing Loader [2]
Sending Loader [2] Accepted
Reading Flashchip data....
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003AB400000 -14.676 GB
ERAM Size : 0x0000000080000000 -2 GB
IRAM Size : 0x0000000000020000 -128 KB
UNICAL RID : 0E5107658FF9F4F1300E2632EFA68D02
eMMC CID : 514E011336334A326200104389729001
Change to HIGH SPEED...
5A
Connection
-Please wait...
-Found...[COM10]


Reading Partition Table
SIZE[0x000007E8] 23 Items > Done

Reading System Info
Brand : COL
Vendor : COL
Model : DSR_R7
ID : NRD90M
SDK : 24
Release : 7.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_kon6737m_r8_65_n-user 7.0 NRD90M 1492565615 release-keys
Device : DSR_R7
Board : DSR_R7
Display ID : DSR_R7_V1.4_0417
Security Patch : 2017-04-05
Platform : mt6737m
FRPPST : /dev/block/platform/mtk-msdc.0/11230000.msdc0/by-name/frp
Fingerprint : COL/DSR_R7/DSR_R7:7.0/NRD90M/1492565615:user/release-keys
StorageType : mtp
Userdata State : Encrypted

Autobackup Partitions
-preloader[0x00000000] 512 KB -> preloader.bin...Ok
-> Renaming Preloader.... preloader_kon6737m_r8_65_n.bin
Creating Scatter file... D:\GSM Tools\HydraTool_Fullpackage_01-03-2021\\Backup\Auto\COL_DSR_R7_0335-mt6737m-7.0_DSR_R7_V1.4_0417_220121033500\MT6737_Android_s catter.txt
-nvram[0x00380000] 5 MB -> nvram.bin...Ok
-frp[0x06A00000] 1024 KB -> frp.bin...Ok
-nvdata[0x06B00000] 32 MB -> nvdata.bin...Ok
Done!!!
D:\GSM Tools\HydraTool_Fullpackage_01-03-2021\\Backup\Auto\COL_DSR_R7_0335-mt6737m-7.0_DSR_R7_V1.4_0417_220121033500
MTK Phone Loader is NOW RUNNING.

TPortConnection.Destroy.....Closing...Ok..
=====================================

Elapsed Time : 00:00:32
BR
Dipendra Pathak

  Reply With Quote
Old 01-23-2021, 07:15   #1000 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,623
Vivo Y91 (1916) FRP successfully Removed by Hydra Tool

Vivo Y91 (1916) FRP successfully Removed by Hydra Tool

Screen Short:



Logs:

Quote:
=====================================
Connection
-Please wait...
-Found...
-PreLoader...[COM80]

TPortConnection.Create...(COM80)..Opening...Ok

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0766 (0000)MT6765[6765]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
SECURE VERSION : FF
BL VERSION : 03
BR Secured : 05
NORMAL BOOT

Preparing Download Agent..
DA : [Not Exist]
Trying Default 6765_PL.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2018/03/20.21:09_402229+403250
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : preloader

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 6589942D5BBA0CE34600CFFE4CEF922D
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000020000000 -512 MB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 90014A68423861503E0396E72201B691 - hB8aP>

DA Speed : high-speed
DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info
Brand : vivo
Vendor : vivo
Model : vivo 1820
ID : O11019
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_k62v1_64_bsp-user 8.1.0 O11019 1608551238 release-keys
Device : PD1818HF_EX
Display ID : O11019 release-keys
Security Patch : 2020-12-01
Platform : =MTK6765
Fingerprint : vivo/1820/1820:8.1.0/O11019/1608551238:user/release-keys
StorageType : mtp
Userdata State : Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_k62v1_64_bsp.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\vivo_vivo 1820_0766-=MTK6765-8.1.0_O11019 release-keys_220121164828\MT6765_Android_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x05588000]1024 KB ->frp.bin...Ok
-nvdata[0x07688000]64 MB ->nvdata.bin...Ok
-persist[0x18800000]48 MB ->persist.bin...Ok
-nvram[0x25680000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\vivo_vivo 1820_0766-=MTK6765-8.1.0_O11019 release-keys_220121164828
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 6589942D5BBA0CE34600CFFE4CEF922D
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000020000000 -512 MB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 90014A68423861503E0396E72201B691 - hB8aP>

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Brand : vivo
Vendor : vivo
Model : vivo 1820
ID : O11019
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_k62v1_64_bsp-user 8.1.0 O11019 1608551238 release-keys
Device : PD1818HF_EX
Display ID : O11019 release-keys
Security Patch : 2020-12-01
Platform : =MTK6765
Fingerprint : vivo/1820/1820:8.1.0/O11019/1608551238:user/release-keys
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition...[C002002A-STATUS_SEC_IMG_TYPE_MISMATCH]
Erasing FRP Partition... Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:24
BR
Dipendra Pathak

  Reply With Quote
Old 01-23-2021, 07:33   #1001 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,623
Oppo F7 (CPH1918) FRP successfully removed by Hydra Tool

Oppo F7 (CPH1918) FRP successfully removed by Hydra Tool

Screen Short:



Logs:

Quote:
Brand : OPPO Model : F7 (CPH1819) Connection : Flash Mode

=====================================
Connection
-Please wait...
-Found...[COM12]

TPortConnection.Create...(COM12)..Opening...Ok

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0788 (0000)MT6771[6771]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
SECURE VERSION : 05
BL VERSION : FE
BR Secured : E5[SBC+SDA+SEL]

Security Authorization....
Sending[Oppo_F7.auth] Accepted

Preparing Download Agent..
DA : 6771_SWSEC_E0871E87F0.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.00.00
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_oppo6771_17197.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 44CAB856E392A881ABE3008E4E64F5CE
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 90014A484347386134A50887909615CD - HCG8a4

DA Speed : high-speed
DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info
Vendor : OPPO
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6771_17331-user 9 PPR1.180610.011 eng.root.20200710.230657 release-keys
Security Patch : 2020-07-05
StorageType : mtp
Userdata State : Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_oppo6771_17331.bin
Creating Scatter file... C:\HydraTool\\Backup\Auto\__0788--9__220121124018\MT6771_Android_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x07C88000]1024 KB ->frp.bin...Ok
-nvdata[0x09D88000]64 MB ->nvdata.bin...Ok
-persist[0x11800000]48 MB ->persist.bin...Ok
-nvram[0x20D00000]64 MB ->nvram.bin...Ok
Done!!!
C:\HydraTool\\Backup\Auto\__0788--9__220121124018
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 44CAB856E392A881ABE3008E4E64F5CE
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 90014A484347386134A50887909615CD - HCG8a4

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Vendor : OPPO
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6771_17331-user 9 PPR1.180610.011 eng.root.20200710.230657 release-keys
Security Patch : 2020-07-05
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Rebuild Userdata
Processing...
Erasing FRP Partition...
Rebuilding Userdata... Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:38
BR
Dipendra Pathak

  Reply With Quote
Old 01-23-2021, 07:37   #1002 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,623
Vivo Y20 PD2034F QCN restore successfully done by Hydra Tool

Vivo Y20 PD2034F QCN restore successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
Selected Comport : [FOUND](COM75)

Firmware ID : MPSS.HA.1.0.c1.1-00015-KAMORTA_GEN_PACK-1.330601.2
Build Date : ov 27 202022:21:21Sep 18 202005:00:00kamorta.
IMEI1 : 862310057******
IMEI2 : 862310057******

Enabling MultiSim....
Sending SPC Code... OK
Restoring Qcn....
Restoring Qcn Success
Elapsed Time : 00:01:03
BR
Dipendra Pathak

  Reply With Quote
Old 01-23-2021, 07:43   #1003 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,623
Cherry Mobile Flare J3 Lite FRP successfully Removed by Hydra Tool

Cherry Mobile Flare J3 Lite FRP successfully Removed by Hydra Tool

Screen Short:



Logs:

Quote:
Brand : AUTO Model : AUTO Connection : Flash Mode

=====================================
Connection
-Please wait...
-Connect Phone...
-Found...
-PreLoader...[COM6]

TPortConnection.Create...(COM6)..Opening...Ok

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 6580 (0000)MT6580[6580]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
FUSEID : 00000000
SECURE VERSION : 00
BL VERSION : 00
BR Secured : 05
NORMAL BOOT

Preparing Download Agent..
DA : 6580_PL.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.00.00
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : Old - eMMC
0000000000000000000000000000
PRMMCCID : 8801034E4361726420508E02B5223531
Init Configuration
Running DA 4.2 on BBID : 0x9C Ok

Initializing Loader [2]
Sending Loader [2] Accepted
Reading Flashchip data....
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000001CE100000 -7.22 GB
ERAM Size : 0x0000000040000000 -1024 MB
IRAM Size : 0x0000000000020000 -128 KB
UNICAL RID : 250CDF4000DCCE6BB72450944B1D2170
eMMC CID : 4E03018864726143028E5020313522B5
Change to HIGH SPEED...
5A
Connection
-Please wait...
-Found...[COM7]


Reading Partition Table
SIZE[0x00000790] 22 Items > Done

Reading System Info
Brand : Cherry_Mobile
Vendor : Cherry Mobile
Model : Flare_J3_Lite
ID : NRD90M
SDK : 24
Release : 7.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-US
Description : full_t960w_v1_w_frog_m05c_h1240_fw-user 7.0 NRD90M 1531471020 release-keys
Device : Flare_J3_Lite
Display ID : Cherry_H1240_PH_FlareJ3Lite_07132018_V2.5
Security Patch : 2018-07-05
Platform : mt6580
FRPPST : /dev/block/platform/mtk-msdc.0/11120000.msdc0/by-name/frp
Fingerprint : Cherry_Mobile/Flare_J3_Lite/Flare_J3_Lite:7.0/NRD90M/1531471020:user/release-keys
StorageType : mtp
Userdata State : Not Encrypted

Autobackup Partitions
-preloader[0x00000000] 512 KB -> preloader.bin...Ok
-> Renaming Preloader.... preloader_t960w_v1_w_frog_m05c_h1240_fw.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\Cherry_Mobile_Flare_J3_Lite_6580-mt6580-7.0_Cherry_H1240_PH_FlareJ3Lite_07132018_V2.5_2201 21173525\MT6580_Android_scatter.txt
-nvram[0x00380000] 5 MB -> nvram.bin...Ok
-frp[0x04FA0000] 1024 KB -> frp.bin...Ok
-nvdata[0x050A0000] 32 MB -> nvdata.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\Cherry_Mobile_Flare_J3_Lite_6580-mt6580-7.0_Cherry_H1240_PH_FlareJ3Lite_07132018_V2.5_2201 21173525
MTK Phone Loader is NOW RUNNING.


Reading System Info
Brand : Cherry_Mobile
Vendor : Cherry Mobile
Model : Flare_J3_Lite
ID : NRD90M
SDK : 24
Release : 7.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-US
Description : full_t960w_v1_w_frog_m05c_h1240_fw-user 7.0 NRD90M 1531471020 release-keys
Device : Flare_J3_Lite
Display ID : Cherry_H1240_PH_FlareJ3Lite_07132018_V2.5
Security Patch : 2018-07-05
Platform : mt6580
FRPPST : /dev/block/platform/mtk-msdc.0/11120000.msdc0/by-name/frp
Fingerprint : Cherry_Mobile/Flare_J3_Lite/Flare_J3_Lite:7.0/NRD90M/1531471020:user/release-keys
StorageType : mtp
Userdata State : Not Encrypted

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition... [Ok] Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:35
BR
Dipendra Pathak

  Reply With Quote
Old 01-23-2021, 07:47   #1004 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,623
Vivo Y71 Successfully Flashed by Hydra Tool

Vivo Y71 Successfully Flashed by Hydra Tool

Screen Short:



Logs:

Quote:
Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM17)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&1f66f1ac&0&1#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :03/27/2013,1.0.8.2

Getting device info......
Serial No.: 0x080FC142
MSM ID : 0x000560E1, MSM8917-Qualcomm Snapdragon 425
PBL Ver : 00000000
PK HASH : 60BA997FEF6DA9F05885FA11F1DD6D2A
90D052A257A09C2075D7246CC73C0D43

Firehose Loader[8917.mbn]
SaharaBoot... Ok
Sending .................Ok
Connecting to Firehose...
Ping... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8917
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 3326636100
Firmware Version : 165
Product Name : HBG4a2
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 61071360[29.121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok

Phone Information.....
Brand : vivo
Vendor : vivo
Model : vivo 1724
ID : OPM1.171019.011
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : msm8937_64-user 8.1.0 OPM1.171019.011 eng.compil.20201019.202120 release-keys
Device : msm8937_64
Display ID : OPM1.171019.011 release-keys
Security Patch : 2020-10-01
Emmc_size : 16GB
Platform : =QCOM8917
Fingerprint : vivo/1724/1724:8.1.0/OPM1.171019.011/compil10192021:user/release-keys

Reading GPT[3]
Drive [0] 56 Items
Drive [1] 0 Items
Drive [2] 0 Items


Backup Security partitions...
Reading Security Items....
> modemst1
> modemst2
> fsg
C:\Hydra Tool\Backup\Security_Backup\vivo 1724__8.1.0_Security_012221124923.sec
Backup Security Success....

----------------------------
Flashing Selected Partitions....
- modem(0)[NON-HLOS.bin] Ok
- sbl1(0)[sbl1.mbn] Ok
- sbl1bak(0)[sbl1.mbn] Ok
- rpm(0)[rpm.mbn] Ok
- rpmbak(0)[rpm.mbn] Ok
- tz(0)[tz.mbn] Ok
- tzbak(0)[tz.mbn] Ok
- devcfg(0)[devcfg.mbn] Ok
- devcfgbak(0)[devcfg.mbn] Ok
- dsp(0)[adspso.bin] Ok
- modemst1(0)[modemst.mbn] Skipped
- modemst2(0)[modemst.mbn] Skipped
- fsg(0)[PD1731F_EX_fs_image.tar.gz.mbn.img] Skipped
- sec(0)[sec.dat] Skipped
- aboot(0)[emmc_appsboot.mbn] Ok
- abootbak(0)[emmc_appsboot.mbn] Ok
- boot(0)[boot.img] Ok
- recovery(0)[recovery.img] Ok
- system(0)[system_1.img] Ok
- system(0)[system_2.img] Ok
- system(0)[system_3.img] Ok
- system(0)[system_4.img] Ok
- system(0)[system_5.img] Ok
- system(0)[system_6.img] Ok
- system(0)[system_7.img] Ok
- system(0)[system_8.img] Ok
- system(0)[system_9.img] Ok
- system(0)[system_10.img] Ok
- system(0)[system_11.img] Ok
- system(0)[system_12.img] Ok
- system(0)[system_13.img] Ok
- system(0)[system_14.img] Ok
- system(0)[system_15.img] Ok
- system(0)[system_16.img] Ok
- system(0)[system_17.img] Ok
- system(0)[system_18.img] Ok
- system(0)[system_19.img] Ok
- system(0)[system_20.img] Ok
- system(0)[system_21.img] Ok
- system(0)[system_22.img] Ok
- system(0)[system_23.img] Ok
- system(0)[system_24.img] Ok
- system(0)[system_25.img] Ok
- system(0)[system_26.img] Ok
- system(0)[system_27.img] Ok
- system(0)[system_28.img] Ok
- system(0)[system_29.img] Ok
- system(0)[system_30.img] Ok
- system(0)[system_31.img] Ok
- system(0)[system_32.img] Ok
- system(0)[system_33.img] Ok
- system(0)[system_34.img] Ok
- system(0)[system_35.img] Ok
- system(0)[system_36.img] Ok
- system(0)[system_37.img] Ok
- system(0)[system_38.img] Ok
- vendor(0)[vendor_1.img] Ok
- vendor(0)[vendor_2.img] Ok
- vendor(0)[vendor_3.img] Ok
- vendor(0)[vendor_4.img] Ok
- vendor(0)[vendor_5.img] Ok
- vendor(0)[vendor_6.img] Ok
- vendor(0)[vendor_7.img] Ok
- vendor(0)[vendor_8.img] Ok
- vendor(0)[vendor_9.img] Ok
- vendor(0)[vendor_10.img] Ok
- vendor(0)[vendor_11.img] Ok
- vendor(0)[vendor_12.img] Ok
- vendor(0)[vendor_13.img] Ok
- vendor(0)[vendor_14.img] Ok
- cache(0)[cache_1.img] Ok
- cache(0)[cache_2.img] Ok
- cache(0)[cache_3.img] Ok
- persist(0)[persist_1.img] Skipped
- oem(0)[oem_PD1731BF_EX_TH_NULL_DTAC_1.img] Ok
- oem(0)[oem_PD1731BF_EX_TH_NULL_DTAC_2.img] Ok
- mdtp(0)[mdtp.img] Ok
- cmnlib(0)[cmnlib_30.mbn] Ok
- cmnlibbak(0)[cmnlib_30.mbn] Ok
- cmnlib64(0)[cmnlib64_30.mbn] Ok
- cmnlib64bak(0)[cmnlib64_30.mbn] Ok
- keymaster(0)[keymaster64.mbn] Ok
- keymasterbak(0)[keymaster64.mbn] Ok
- survival(0)[survival.img] Ok
- userdata(0)[userdata_1.img] Ok
- userdata(0)[userdata_2.img] Ok
- userdata(0)[userdata_3.img] Ok
- userdata(0)[userdata_4.img] Ok
- userdata(0)[userdata_5.img] Ok
- userdata(0)[userdata_6.img] Ok
- userdata(0)[userdata_7.img] Ok
- userdata(0)[userdata_8.img] Ok
- userdata(0)[userdata_9.img] Ok
- userdata(0)[userdata_10.img] Ok
- userdata(0)[userdata_11.img] Ok
- userdata(0)[userdata_12.img] Ok
- userdata(0)[userdata_13.img] Ok
- userdata(0)[userdata_14.img] Ok
- userdata(0)[userdata_15.img] Ok
- userdata(0)[userdata_16.img] Ok
- userdata(0)[userdata_17.img] Ok
- userdata(0)[userdata_18.img] Ok
- userdata(0)[userdata_19.img] Ok
- userdata(0)[userdata_20.img] Ok
- userdata(0)[userdata_21.img] Ok
- userdata(0)[userdata_22.img] Ok
- userdata(0)[userdata_23.img] Ok
- userdata(0)[userdata_24.img] Ok
- userdata(0)[userdata_25.img] Ok
- userdata(0)[userdata_26.img] Ok
- userdata(0)[userdata_27.img] Ok
- userdata(0)[userdata_28.img] Ok
- userdata(0)[userdata_29.img] Ok
- userdata(0)[userdata_30.img] Ok
- userdata(0)[userdata_31.img] Ok
- userdata(0)[userdata_32.img] Ok
- userdata(0)[userdata_33.img] Ok
- userdata(0)[userdata_34.img] Ok
- userdata(0)[userdata_35.img] Ok
- userdata(0)[userdata_36.img] Ok
- userdata(0)[userdata_37.img] Ok
- userdata(0)[userdata_38.img] Ok
- userdata(0)[userdata_39.img] Ok
- userdata(0)[userdata_40.img] Ok
- userdata(0)[userdata_41.img] Ok
- userdata(0)[userdata_42.img] Ok
- userdata(0)[userdata_43.img] Ok
- userdata(0)[userdata_44.img] Ok
- athena(0)[athena.img] Ok
- PrimaryGPT(0)[gpt_main0.bin] Ok

Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-33.] OK
0 [CRC32(2,7168)] OK
0 [CRC32(NUM_DISK_SECTORS-33.,7168)] OK
0 [0] OK
0 [CRC32(1,92)] OK
0 [0] OK
0 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 0
Set bootable storage drive 0 Ok

Rebooting Phone.... Ok

Elapsed Time : 00:08:12
BR
Dipendra Pathak

  Reply With Quote
Old 01-23-2021, 07:51   #1005 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,623
Vivo Y71 (1724) FRP successfully removed by Hydra Tool

Vivo Y71 (1724) FRP successfully removed by Hydra Tool

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : VIVO Model : Y71 (V1731B) Storage : Auto
Loader: vivo_2_8.mbn
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM20)
SymbolicName :\??\USB#VID_05C6&PID_9008#7&2f235100&0&4#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :03/25/2016,2.1.2.2

Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8917
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 1141573315
Firmware Version : 3
Product Name : QE63MB
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 30535680[14.561 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok
Reading GPT[3]
Drive [0] 56 Items
Drive [1] 0 Items
Drive [2] 0 Items


Phone Information.....
Brand : vivo
Vendor : vivo
Model : vivo 1724
ID : OPM1.171019.011
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : msm8937_64-user 8.1.0 OPM1.171019.011 eng.compil.20180912.162539 release-keys
Device : msm8937_64
Display ID : OPM1.171019.011 release-keys
Security Patch : 2018-09-01
Emmc_size : 16GB
Platform : =QCOM8917
Fingerprint : vivo/1724/1724:8.1.0/OPM1.171019.011/compil09121625:user/release-keys

Processing Forced Erase....
- Removing FRP [Auto] Ok
- Forced Erase Userdata
Action Result : Ok

Elapsed Time : 00:00:11
BR
Dipendra Pathak

  Reply With Quote
Reply

Bookmarks


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


 



All times are GMT +1. The time now is 19:59.



Powered by Searchlight © 2024 Axivo Inc.
vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2024 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2023 -
Page generated in 0.49003 seconds with 9 queries

SEO by vBSEO