GSM Shop GSM Shop
GSM-Forum  

Welcome to the GSM-Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features.
Only registered members may post questions, contact other members or search our database of over 8 million posts.

Registration is fast, simple and absolutely free so please - Click to REGISTER!

If you have any problems with the registration process or your account login, please contact contact us .

Go Back   GSM-Forum > Product Support Sections > Special Solutions / Services / WebShop > GSMFABRICA Products > HYDRA TOOL


Reply
 
LinkBack Thread Tools Display Modes
Old 01-23-2021, 07:56   #1006 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Vivo Y95 (V1807) FRP successfully Removed by Hydra Tool


Vivo Y95 (V1807) FRP successfully Removed by Hydra Tool

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : VIVO Model : Y93 (V1818) Storage : Auto
Loader: Vivo_Y95_8937.mbn
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM42)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&12cbda9c&0&3#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :07/08/2015,2.1.2.0

Getting device info......
Serial No.: 0x996F84A1
MSM ID : 0x000BF0E1, SDM439-Qualcomm Snapdragon 439
PBL Ver : 00000000
PK HASH : 60BA997FEF6DA9F05885FA11F1DD6D2A
90D052A257A09C2075D7246CC73C0D43

Firehose Loader[Vivo_Y95_8937.mbn]
SaharaBoot... Ok
Sending ...................Ok
Connecting to Firehose...
Ping... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 3732014917
Firmware Version : 7
Product Name : GD6BMB
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 61071360[29.121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok
Reading GPT[3]
Drive [0] 60 Items
Drive [1] 0 Items
Drive [2] 0 Items


Phone Information.....
Brand : vivo
Vendor : vivo
Model : vivo 1807
ID : OPM1.171019.026
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : msm8937_64-user 8.1.0 OPM1.171019.026 eng.compil.20201019.193627 release-keys
Device : msm8937_64
Display ID : OPM1.171019.026 release-keys
Security Patch : 2020-10-01
Emmc_size : 16GB
Platform : =SDM439
Fingerprint : vivo/1807/1807:8.1.0/OPM1.171019.026/compil10191936:user/release-keys

Processing Forced Erase....
- Removing FRP [Auto] Ok
- Forced Erase Userdata
Action Result : Ok

Elapsed Time : 00:00:15
BR
Dipendra Pathak

  Reply With Quote
The Following User Says Thank You to Dipendra Pathak For This Useful Post:
Old 01-23-2021, 08:00   #1007 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Oppo A71 (2018) CPH1801 Format userdata successfully done by Hydra Tool

Oppo A71 (2018) CPH1801 Format userdata successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : OPPO Model : A71 (2018) CPH1801 Storage : Auto
Loader: a71_firehose.bin
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM10)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&3478949&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :07/08/2015,2.1.2.0

Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok
Configuration.
<?xml version="1.0" encoding="UTF-8" ?><data><log value="logbuf@0x0806CD20 fh@0x08069B88" /></data>.
<?xml version="1.0" encoding="UTF-8" ?><data><response value="ACK" MinVersionSupported="1" MemoryName="eMMC" MaxPayloadSizeFromTargetInBytes="4096" MaxPayloadSizeToTargetInBytes="1048576" MaxPayloadSizeToTargetInBytesSupported="1048576" MaxXMLSizeInBytes="4096" Version="1" TargetName="8953" /></data>.
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8953
Version : 1

Protocol : Universal
Running : Ok
Processing A71 Format Userdata....
Action Result : Ok

Elapsed Time : 00:00:04
BR
Dipendra Pathak

  Reply With Quote
The Following User Says Thank You to Dipendra Pathak For This Useful Post:
Old 01-23-2021, 08:04   #1008 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Vivo Y71 (V1731B) EDL selected partitions is flashed by Hydra Tool

Vivo Y71 (V1731B) EDL selected partitions is flashed by Hydra Tool

Screen Short:



Logs:

Quote:
Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM4)
SymbolicName :\??\USB#VID_05C6&PID_9008#6&2a0c3696&0&4#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :03/25/2016,2.1.2.2

Getting device info......
Serial No.: 0x89F12AD5
MSM ID : 0x000560E1, MSM8917-Qualcomm Snapdragon 425
PBL Ver : 00000000
PK HASH : 60BA997FEF6DA9F05885FA11F1DD6D2A
90D052A257A09C2075D7246CC73C0D43

Firehose Loader[vivo_2_8.mbn]
SaharaBoot... Ok
Sending ..................Ok
Connecting to Firehose...
Ping... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8917
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 1116259429
Firmware Version : 165
Product Name : HBG4a2
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 61071360[29.121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok

Phone Information.....
Brand : vivo
Vendor : vivo
Model : vivo 1724
ID : OPM1.171019.011
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : msm8937_64-user 8.1.0 OPM1.171019.011 eng.compil.20201019.202120 release-keys
Device : msm8937_64
Display ID : OPM1.171019.011 release-keys
Security Patch : 2020-10-01
Emmc_size : 16GB
Platform : =QCOM8917
Fingerprint : vivo/1724/1724:8.1.0/OPM1.171019.011/compil10192021:user/release-keys

Reading GPT[3]
Drive [0] 56 Items
Drive [1] 0 Items
Drive [2] 0 Items


Backup Security partitions...
Reading Security Items....
> modemst1
> modemst2
> fsg
C:\Hydra Tool\Backup\Security_Backup\vivo 1724__8.1.0_Security_012221105539.sec
Backup Security Success....

----------------------------
Flashing Selected Partitions....
- config(0)[zeros_1sector.bin] Skipped
- userdata(0)[userdata.img] **WARNING Unauthorized tag '' Failed
Operation : Setbootablestoragedrive: Drive 0
Set bootable storage drive 0 Ok

Rebooting Phone.... Ok

Elapsed Time : 00:00:16
BR
Dipendra Pathak

  Reply With Quote
The Following User Says Thank You to Dipendra Pathak For This Useful Post:
Old 01-24-2021, 13:50   #1009 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Xiaomi Mi 5 (Tiffany) FIND MY DEVICE successfully OFF by Hydra Tool

Xiaomi Mi 5 (Tiffany) FIND MY DEVICE successfully OFF by Hydra Tool

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : XIAOMI Model : Mi 5X (Tiffany) Storage : Auto
Loader: Xiaomi_S2y2_noauth_8953_ddr.mbn
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM45)
SymbolicName :\??\USB#VID_05C6&PID_9008#7&123ef79&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/02/2017,2.1.2.7

Getting device info......
Serial No.: 0x9077931B
MSM ID : 0x000460E1, MSM8953-Qualcomm Snapdragon 625
PBL Ver : 00000000
PK HASH : 57158EAF1814D78FD2B3105ECE4DB18A
817A08AC664A5782A925F3FF8403D39A

Firehose Loader[Xiaomi_S2y2_noauth_8953_ddr.mbn]
SaharaBoot... Ok
Sending ...................Ok
Connecting to Firehose...
Ping... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8953
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 250745953
Firmware Version : 165
Product Name : HBG4a2
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 61071360[29,121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok
Reading GPT[3]
Drive [0] 52 Items
Drive [1] 0 Items
Drive [2] 0 Items


Phone Information.....
Brand : xiaomi
Vendor : Xiaomi
Model : MI 5X
ID : OPM1.171019.019
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : zh-CN
Description : tiffany-user 8.1.0 OPM1.171019.019 V10.3.1.0.ODBCNXM release-keys
Miui Ver : V10
Device : tiffany
Board : msm8953
Display ID : ZQL1711-tiffany-build-20190328162032
Security Patch : 2019-03-01
Emmc_size : 16GB
Platform : msm8953
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : xiaomi/tiffany/tiffany:8.1.0/OPM1.171019.019/V10.3.1.0.ODBCNXM:user/release-keys

Processing Find Device Disable.........
InodeNo : 3939.
ZQL1711-tiffany-build-20190328162032_FindDevice
Action Result : Ok

Elapsed Time : 00.00.14
BR
Dipendra Pathak

  Reply With Quote
The Following User Says Thank You to Dipendra Pathak For This Useful Post:
Old 01-24-2021, 13:56   #1010 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Xiaomi Redmi Note 7 (Lavender) Micron back up security successfully done by Hydra

Xiaomi Redmi Note 7 (Lavender) Micron back up security successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : XIAOMI Model : Redmi Note 7 (lavender) Micron Storage : Auto
Loader: Redmi_Note_7_lavender_Micron.elf
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM244)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&1607d61b&0&7#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/02/2017,2.1.2.7

Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping....... Ok
Configuration.......................
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 8192
MaxPayloadSizeToTargetInBytesSupported : 8192
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : MSM8996
Version : 1
DateTime : Feb 10 2020 - 19:28:52

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 19
Serial Number : 92767646
Firmware Version : 5644752166968636211
Product Name : S0J97Y
Physical Partitions : 4
Total Logical Blocks:
Drive [0] 61071360[29,121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Drive [3] 8192[4 MB]

Protocol : Universal
Running : Ok
Reading GPT[4]
Drive [0] 68 Items
Drive [1] 0 Items
Drive [2] 0 Items
Drive [3]

Processing Backup Security....

Backup Security partitions...
Reading Security Items....
> modemst1
> modemst2
> fsg
D:\Hydra Tool\Backup\Security_Backup\___Security_0123211617 31.sec
Backup Security Success....
Action Result : Ok

Elapsed Time : 00:01:49
BR
Dipendra Pathak

  Reply With Quote
The Following User Says Thank You to Dipendra Pathak For This Useful Post:
Old 01-24-2021, 14:04   #1011 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Xioami Redmi Note 6 Pro 8.1 disabling MI Account successfully done by Hydra Tool

Xioami Redmi Note 6 Pro 8.1 disabling MI Account successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
Starting ADB Server....
Searching Device By ADB
Device Found...
Model : Redmi Note 6 Pro
Brand : Xiaomi
Android Ver : 8.1.0
CPU abi : arm64-v8a
Software Version :
CSC Version :
Bootloader :
Board : sdm636
Display ID : OPM1.171019.011
Security Patch : 2018-10-01
Emmc_size :
Platform : sdm660
Kernel ID : 2018-10-01
Marketname :
OTA Version Name :
SYS USB CONFIG : persist.adb
FRPPST : /dev/block/bootdevice/by-name/frp
FingerPrint : xiaomi/tulip/tulip:8.1.0/OPM1.171019.011/V10.0.5.0.OEKMIFH:user/release-keys

Checking Root Status....
Root Status : Not Rooted

ADB MiAccount...

Processing...
Disbaling MI Account
Please wait...
Disabled Mi Account Success
Action Result : Ok

Elapsed Time : 00:00:03
BR
Dipendra Pathak

  Reply With Quote
The Following User Says Thank You to Dipendra Pathak For This Useful Post:
Old 01-24-2021, 14:09   #1012 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Nobby S300 repair IMEI successfully done by Hydra Tool

Nobby S300 repair IMEI successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
=====================================
***IMEI REPAIR FUNCTION****
Connection
-Please wait...
-Connect Phone...
-Found...
-PreLoader...[COM8]

TPortConnection.Create...(COM8)..Opening...Ok

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 6580 (0000)MT6580[6580]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 40001002
FUSEID : 40001002
SECURE VERSION : 00
BL VERSION : 00
BR Secured : 00
NORMAL BOOT

Preparing Download Agent..
DA : 6580.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2018-09-18.13:22_452898
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : Old - eMMC
0000000000000000000000000000
PRMMCCID : F40122426977696E201000008722A5D1
Init Configuration
Running DA 4.2 on BBID : 0x9C Ok

Initializing Loader [2]
Sending Loader [2] Accepted
Reading Flashchip data....
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000001CD000000 -7,203 GB
ERAM Size : 0x0000000040000000 -1024 MB
IRAM Size : 0x0000000000020000 -128 KB
UNICAL RID : 8DF294EE6117D57DF0FFAEADF2B369D1
eMMC CID : 422201F46E69776900001020D1A52287
Change to HIGH SPEED...
5A
Connection
-Please wait...
-Found...[COM15]


Reading Partition Table
SIZE[0x000008F0] 26 Items > Done

Reading System Info
Brand : Nobby
Vendor : Nobby
Model : Nobby S300
ID : O11019
SDK : 27
Release : 8.1.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : ru-RU
Description : full_wd365bf3-user 8.1.0 O11019 20181226 release-keys
Device : Nobby_S300
Display ID : Nobby_S300_V06_28-12-2018
Security Patch : 2018-12-05
Fingerprint : Nobby/Nobby_S300_RU/Nobby_S300:8.1.0/O11019/20181226:user/release-keys
StorageType : mtp
Userdata State : Encrypted

Autobackup Partitions
-preloader[0x00000000] 512 KB -> preloader.bin...Ok
-> Renaming Preloader.... preloader_wd365bf3.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\Nobby_Nobby S300_6580--8.1.0_Nobby_S300_V06_28-12-2018_230121194716\MT6580_Android_scatter.txt
-nvram[0x00380000] 5 MB -> nvram.bin...Ok
-frp[0x18000000] 1024 KB -> frp.bin...Ok
-nvdata[0x18B00000] 32 MB -> nvdata.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\Nobby_Nobby S300_6580--8.1.0_Nobby_S300_V06_28-12-2018_230121194716
MTK Phone Loader is NOW RUNNING.


Reading System Info
Brand : Nobby
Vendor : Nobby
Model : Nobby S300
ID : O11019
SDK : 27
Release : 8.1.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : ru-RU
Description : full_wd365bf3-user 8.1.0 O11019 20181226 release-keys
Device : Nobby_S300
Display ID : Nobby_S300_V06_28-12-2018
Security Patch : 2018-12-05
Fingerprint : Nobby/Nobby_S300_RU/Nobby_S300:8.1.0/O11019/20181226:user/release-keys
StorageType : mtp
Userdata State : Encrypted

IMEI INFO [OLD]..
IMEI1 : FFFFFFFFFFFFFFF
IMEI2 : FFFFFFFFFFFFFFF [Ok]

IMEI INFO..
IMEI1 : 354532100******
IMEI2 : 354532100******

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:44
BR
Dipendra Pathak

  Reply With Quote
The Following User Says Thank You to Dipendra Pathak For This Useful Post:
Old 01-24-2021, 14:15   #1013 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Oppo A37 Formatting user data successfully done by Hydra Tool

Oppo A37 Formatting user data successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : OPPO Model : A37 Storage : Auto
Loader: 8916.mbn
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM42)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&12cbda9c&0&3#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :07/08/2015,2.1.2.0

Getting device info.....
Serial No.: 0x25A43FAB
MSM ID : 0x007050E1, MSM8916-Qualcomm Snapdragon 410
PBL Ver : 00000000
PK HASH : CC3153A80293939B90D02D3BF8B23E02
92E452FEF662C74998421ADAD42A380F

Firehose Loader[8916.mbn]
SaharaBoot... Ok
Sending .....Ok
Connecting to Firehose...
Ping. Ok
Configuration........
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8916
Version : 1


Protocol : Universal
Running : Ok

Phone Information.....
Brand : OPPO
Vendor : OPPO
Model : A37f
ID : LMY47V
SDK : 22
Release : 5.1.1
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Description : msm8916_64-user 5.1.1 LMY47V eng.root.20190711.032745 release-keys
Board : msm8916
Display ID : A37fEX_11_190711
Security Patch : 2018-03-01
Platform : msm8916
FRPPST : /dev/block/bootdevice/by-name/config

Reading GPT[3]
Drive [0] 40 Items
Drive [1] 0 Items
Drive [2] 4 Items

Formatting Userdata...
Method :
Auto
Processing...
- Formatting Userdata
Executing ...
- Formatting Userdata [Safe method] OkOkOk

Elapsed Time : 00:00:09
BR
Dipendra Pathak

  Reply With Quote
The Following User Says Thank You to Dipendra Pathak For This Useful Post:
Old 01-24-2021, 18:00   #1014 (permalink)
No Life Poster
 
Malik Shani G's Avatar
 
Join Date: Jul 2020
Location: pakistan daska
Age: 29
Posts: 672
Member: 2963610
Status: Offline
Thanks Meter: 560
qmobile i6i pattern lock read done by hydra tool
  Reply With Quote
The Following User Says Thank You to Malik Shani G For This Useful Post:
Old 01-25-2021, 02:08   #1015 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Oppo A37F (Neo 9) Format user data successfully done by Hydra Tool

Oppo A37F (Neo 9) Format user data successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : OPPO Model : A37F (Neo 9) Storage : Auto
Loader: 8916.mbn
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM10)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&1ad8e564&0&1#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/25/2014,2.1.1.0

Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok
Configuration.
<?xml version="1.0" encoding="UTF-8" ?><data><log value="Host's payload to target size is too large" /></data>.
<?xml version="1.0" encoding="UTF-8" ?><data><log value="logbuf@0x0801BE50 fh@0x08018CB8" /></data>.
<?xml version="1.0" encoding="UTF-8" ?><data><response value="NAK" MinVersionSupported="1" MemoryName="eMMC" MaxPayloadSizeFromTargetInBytes="4096" MaxPayloadSizeToTargetInBytes="16384" MaxPayloadSizeToTargetInBytesSupported="16384" MaxXMLSizeInBytes="4096" Version="1" TargetName="8916" /></data>.
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8916
Version : 1

Protocol : Universal
Running : Ok
Processing A71 Format Userdata....
Action Result : Ok

Rebooting Phone.... Ok

Elapsed Time : 00:00:03
BR
Dipendra Pathak

  Reply With Quote
Old 01-25-2021, 02:12   #1016 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Oppo F7 (CPH1819) formatting successfully done by Hydra Tool

Oppo F7 (CPH1819) formatting successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
Brand : OPPO Model : F7 (CPH1819) Connection : Flash Mode

=====================================
Connection
-Please wait...
-Found...[COM11]

TPortConnection.Create...(COM11)..Opening...Ok

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : B8B3F56EC3E3093FEFF4C5BF603632D4
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 150100444836444D42050E8BC6BFB46B - DH6DMB

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
ID : QP1A.190711.020
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6771-user 10 QP1A.190711.020 7604ad4e2b1328a1 release-keys
Display ID : QP1A.190711.020 release-keys
Security Patch : 2020-09-05
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Rebuild Userdata
Processing...
Rebuilding Userdata... Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:08
BR
Dipendra Pathak

  Reply With Quote
Old 01-25-2021, 02:17   #1017 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Oppo A83 (CPH1729) FRP successfully Removed by Hydra Tool

Oppo A83 (CPH1729) FRP successfully Removed by Hydra Tool

Screen Short:



Logs:

Quote:
Brand : OPPO Model : A83 (CPH1729) Connection : Flash Mode

=====================================
Connection
-Please wait...
-Found...[COM11]

TPortConnection.Create...(COM11)..Opening...Ok

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 4D922C4F3075459842AA3CC073F47481
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003A3E00000 -14.561 GB
eMMC CID : 150100514536334D4203E9EA960735F5 - QE63MB

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Brand : OPPO
Vendor : OPPO
Model : OPPO A83js
ID : N6F26Q
SDK : 25
Release : 7.1.1
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6763_17101-user 7.1.1 N6F26Q 1594262242 release-keys
Device : M6763E
Board : full_oppo6763_17101
Display ID : A83jsEX_11_A.34_200709
Security Patch : 2019-10-05
Platform : mt6763
FRPPST : /dev/block/platform/bootdevice/by-name/frp
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition...[C002002A-STATUS_SEC_IMG_TYPE_MISMATCH]
Erasing FRP Partition... Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:09
BR
Dipendra Pathak

  Reply With Quote
Old 01-25-2021, 02:22   #1018 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Oppo F5 Youth (CPH1725) Fromatting user data successfully done by Hydra Tool

Oppo F5 Youth (CPH1725) Fromatting user data successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
Brand : OPPO Model : F5 Youth (CPH1725) Connection : Flash Mode

=====================================
Connection
-Please wait...
-Connect Phone...
-Found...[COM8]

TPortConnection.Create...(COM8)..Opening...Ok

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0690 (0000)MT6763T[6763]
BROM HW_SW_VER : 8A00 CA01 0001 0000
SECURE VERSION : 05
BL VERSION : FE
BR Secured : E5[SBC+SDA+SEL]

Security Authorization....
Sending[Oppo_F5.auth] Accepted

Preparing Download Agent..
DA : 6763_F156FF6B3D.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2017/09/22.09:22
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...[ERROR]- NOT SYNC
=============================================
Reasons why it fails due to the following"
1. Harware problem/issues
2. If you did Testpoint Kindly check the parts you Touch/TP
3. Powershortage, try to connect Battery
4. Check or replace usb cable and plug directly to your pc usb port.
=============================================

Mode : brom
Preloader Initialization...
Parsing preloader_oppo6763_17031.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 8BBE38A5A8ED3ED003F502AE6580969A
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 90014A484247346132A52884A428B427 - HBG4a2

DA Speed : high-speed
DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info
Brand : OPPO
Vendor : OPPO
Model : OPPO CPH1723
ID : N6F26Q
SDK : 25
Release : 7.1.1
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6763_17031-user 7.1.1 N6F26Q 1599146577 release-keys
Device : M6763A
Board : full_oppo6763_17031
Display ID : CPH1723EX_11_A.45_200903
Security Patch : 2019-10-05
Platform : mt6763
FRPPST : /dev/block/platform/bootdevice/by-name/frp
StorageType : mtp
Userdata State : Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_oppo6763_17031.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\OPPO_OPPO CPH1723_0690-mt6763-7.1.1_CPH1723EX_11_A.45_200903_230121184340\MT6763 T_Android_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x05A88000]1024 KB ->frp.bin...Ok
-nvdata[0x07B88000]64 MB ->nvdata.bin...Ok
-persist[0x0F800000]48 MB ->persist.bin...Ok
-nvram[0x1A000000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\OPPO_OPPO CPH1723_0690-mt6763-7.1.1_CPH1723EX_11_A.45_200903_230121184340
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 8BBE38A5A8ED3ED003F502AE6580969A
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 90014A484247346132A52884A428B427 - HBG4a2

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Brand : OPPO
Vendor : OPPO
Model : OPPO CPH1723
ID : N6F26Q
SDK : 25
Release : 7.1.1
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6763_17031-user 7.1.1 N6F26Q 1599146577 release-keys
Device : M6763A
Board : full_oppo6763_17031
Display ID : CPH1723EX_11_A.45_200903
Security Patch : 2019-10-05
Platform : mt6763
FRPPST : /dev/block/platform/bootdevice/by-name/frp
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Rebuild Userdata
Processing...
Rebuilding Userdata... Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:47
BR
Dipendra Pathak

  Reply With Quote
Old 01-25-2021, 02:27   #1019 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Huawei MRD-LX2 (Y6 2019) FRP successfully removed by Hydra Tool

Huawei MRD-LX2 (Y6 2019) FRP successfully removed by Hydra Tool

Screen Short:





BR
Dipendra Pathak

  Reply With Quote
Old 01-25-2021, 02:31   #1020 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Oppo F1F Removing FRP successfully Done by Hydra Tool

Oppo F1F Removing FRP successfully Done by Hydra Tool

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : OPPO Model : F1F Storage : Auto
Loader: Oppo_A53_8936.mbn
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM59)
SymbolicName :\??\USB#VID_05C6&PID_9008#6&2e243d13&0&2#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :03/25/2016,2.1.2.2

Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok
Configuration.......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8936
Version : 1


Protocol : Universal
Running : Ok
Reading GPT[3]
Drive [0] 40 Items
Drive [1] 0 Items
Drive [2] 4 Items


Phone Information.....
Brand : OPPO
Vendor : OPPO
Model : F1f
ID : LMY47V
SDK : 22
Release : 5.1.1
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Description : msm8916_64-user 5.1.1 LMY47V eng.root.20190307.154315 release-keys
Device : F1f
Board : msm8916
Display ID : F1EX_11_190307
Security Patch : 2017-12-01
Platform : msm8916
FRPPST : /dev/block/bootdevice/by-name/config

Processing Auto....
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOk
- Formatting Userdata
Executing ...
- Formatting Userdata [Safe method] OkOk
Action Result : Ok

Elapsed Time : 00:00:07
BR
Dipendra Pathak

  Reply With Quote
Reply

Bookmarks


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


 



All times are GMT +1. The time now is 17:52.



Powered by Searchlight © 2024 Axivo Inc.
vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2024 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2023 -
Page generated in 0.39088 seconds with 9 queries

SEO by vBSEO