GSM Shop GSM Shop
GSM-Forum  

Welcome to the GSM-Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features.
Only registered members may post questions, contact other members or search our database of over 8 million posts.

Registration is fast, simple and absolutely free so please - Click to REGISTER!

If you have any problems with the registration process or your account login, please contact contact us .

Go Back   GSM-Forum > Product Support Sections > Special Solutions / Services / WebShop > GSMFABRICA Products > HYDRA TOOL

Reply
 
LinkBack Thread Tools Display Modes
Old 02-06-2021, 05:57   #1156 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,624
Xiaomi Redmi Note 5A (UGG) some partition successfully Flashed by Hydra Tool


Xiaomi Redmi Note 5A (UGG) some partition successfully Flashed by Hydra Tool

Screen Short:



Logs:

Quote:
Hydra Qualcomm Tool Ver 1.0.2 Build 72
Windows 7 Service Pack 1 (Version 6.1, Build 7601, 64-bit Edition)
Intel(R) Core(TM)2 Duo CPU E7500 @ 2.93GHz
Intel(R) G33/G31 Express Chipset Family
Ram Installed : 4 GB
Windows Access Right Admin
******* Dongle Info *******
Version : Hydra Tool v 1.1
Serial : *************
Initialize : OKAY
Status : Activated
Life : 0 [8-0-0-0-0]

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM3)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&21e739f&0&5#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/02/2017,2.1.2.7

Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8917
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 2996176509
Firmware Version : 7
Product Name : QE13MB
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 30535680[14,561 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok

Phone Information.....
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi Note 5A
ID : N2G47H
SDK : 25
Release : 7.1.2
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : ugglite-user 7.1.2 N2G47H V9.5.8.0.NDFMIFA release-keys
Miui Ver : V9
Device : ugglite
Mod_device : ugglite_global
Board : QC_Reference_Phone
Display ID : N2G47H
Security Patch : 2018-04-01
Emmc_size : 16GB
Platform : msm8937
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : xiaomi/ugglite/ugglite:7.1.2/N2G47H/V9.5.8.0.NDFMIFA:user/release-keys

Reading GPT[3]
Drive [0] 48 Items
Drive [1] 0 Items
Drive [2] 0 Items


Backup Security partitions...
Reading Security Items....
> modemst1
> modemst2
> fsg
C:\Hydra Tool\Backup\Security_Backup\Redmi Note 5A_QC_Reference_Phone_7.1.2_Security_020121210658. sec
Backup Security Success....

----------------------------
Flashing Selected Partitions....
- devinfo(0)[devinfo.img] Ok
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 0
Set bootable storage drive 0 Ok

Rebooting Phone.... Ok

Elapsed Time : 00:00:09
BR
Dipendra Pathak

  Reply With Quote
Old 02-06-2021, 06:08   #1157 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,624
Oppo R15 (PACT00) Factory Reset successfully done by Hydra Tool

Oppo R15 (PACT00) Factory Reset successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
Hydra MediaTeK Tool Ver 1.0.2 Build 62
Windows 10 (Version 10.0, Build 18362, 64-bit Edition)
Genuine Intel(R) CPU U7300 @ 1.30GHz
Mobile Intel(R) 4 Series Express Chipset Family (Microsoft Corporation - WDDM 1.1)
Ram Installed : 6 GB
Windows Access Right Admin
******* Dongle Info *******
Version : Hydra Tool v 1.2
Serial : **************
Initialize : OKAY
Status : Activated
Life : 0 [0-0-0-0-0]


Brand : AUTO Model : R15 (PACT00) Connection : Meta Mode

---------------------------------
TPortConnection.Create...(COM19)..Opening...Ok

META Phone Info . . .
MCUID: 8U ` mt6771,S01
ME_SO: S01
DATE : Mon May 6 16:58:35 CST 2019
MODEL: PACT00_11_A.28
ME_SWVER: PACT00_11_A.28_190506_00000000


Reset to Factory Default Ok
Rebooting....
Done!!!

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:01:03
BR
Dipendra Pathak

  Reply With Quote
The Following User Says Thank You to Dipendra Pathak For This Useful Post:
Old 02-06-2021, 06:56   #1158 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,624
OPPO A31 (CPH 2015) Successfully Flashed by Hydra Tool Screen Short:

OPPO A31 (CPH 2015) Successfully Flashed by Hydra Tool

Screen Short:



Logs:

Quote:
Connection
-Please wait...
-Found...[COM11]

TPortConnection.Create...(COM11)..Opening...Ok

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 6D8572A80175FB679EB5F7F7376D05C9
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000001D1F000000 -116.484 GB
eMMC CID : 13014E53304A394B391017C73CE817F7 - S0J9K9

Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info
Vendor : OPPO
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6765_19581-user 9 PPR1.180610.011 eng.root.20201127.205442 release-keys
Security Patch : 2020-11-05
StorageType : mtp
Userdata State : Not Encrypted

Reading Selected Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_oppo6765_19581.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Selected\MTK__010221175215\MT6765_And roid_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-boot_para[0x00008000]1024 KB ->boot_para.bin...Ok
-recovery[0x00108000]32 MB ->recovery.bin...Ok
-para[0x02108000]512 KB ->para.bin...Ok
-opporeserve1[0x02188000]8 MB ->opporeserve1.bin...Ok
-opporeserve2[0x02988000]64 MB ->opporeserve2.bin...Ok
-opporeserve3[0x06988000]64 MB ->opporeserve3.bin...Ok
-oppo_custom[0x0A988000]1024 KB ->oppo_custom.bin...Ok
-expdb[0x0AA88000]20 MB ->expdb.bin...Ok
-frp[0x0BE88000]1024 KB ->frp.bin...Ok
-nvcfg[0x0BF88000]32 MB ->nvcfg.bin...Ok
-nvdata[0x0DF88000]64 MB ->nvdata.bin...Ok
-metadata[0x11F88000]32 MB ->metadata.bin...Ok
-protect1[0x13F88000]8 MB ->protect1.bin...Ok
-protect2[0x14788000]8.469 MB ->protect2.bin...Ok
-seccfg[0x15000000]8 MB ->seccfg.bin...Ok
-persist[0x15800000]48 MB ->persist.bin...Ok
-sec1[0x18800000]2 MB ->sec1.bin...Ok
-proinfo[0x18A00000]3 MB ->proinfo.bin...Ok
-md1img[0x18D00000]100 MB ->md1img.bin...Ok
-spmfw[0x1F100000]1024 KB ->spmfw.bin...Ok
-scp1[0x1F200000]1024 KB ->scp1.bin...Ok
-scp2[0x1F300000]1024 KB ->scp2.bin...Ok
-sspm_1[0x1F400000]1024 KB ->sspm_1.bin...Ok
-sspm_2[0x1F500000]1024 KB ->sspm_2.bin...Ok
-gz1[0x1F600000]16 MB ->gz1.bin...Ok
-gz2[0x20600000]16 MB ->gz2.bin...Ok
-nvram[0x21600000]64 MB ->nvram.bin...Ok
-lk[0x25600000]5 MB ->lk.bin...Ok
-lk2[0x25B00000]5 MB ->lk2.bin...Ok
-boot[0x26000000]32 MB ->boot.bin...Ok
-logo[0x28000000]16 MB ->logo.bin...Ok
-dtbo[0x29000000]16 MB ->dtbo.bin...Ok
-tee1[0x2A000000]5 MB ->tee1.bin...Ok
-tee2[0x2A500000]11 MB ->tee2.bin...Ok
-odm[0x2B000000]256 MB ->odm.bin...Ok
-vendor[0x3B000000]1.094 GB ->vendor.bin...Ok
-system[0x81000000]6 GB ->system.bin...Ok
-vbmeta[0x201000000]8 MB ->vbmeta.bin...Ok
-cache[0x201800000]432 MB ->cache.bin...Ok
-otp[0x1D1B4FBE00]43 MB ->otp.bin...Ok
-flashinfo[0x1D1DFFBE00]16 MB ->flashinfo.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Selected\MTK__010221175215

TPortConnection.Destroy.....Closing...Ok..
=====================================

Elapsed Time : 00:09:48
BR
Dipendra Pathak

  Reply With Quote
The Following User Says Thank You to Dipendra Pathak For This Useful Post:
Old 02-06-2021, 07:09   #1159 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,624
Huawei ATU-L42 (Y6 2018) FRP successfylly removed by Hydra Tool

Huawei ATU-L42 (Y6 2018) FRP successfylly removed by Hydra Tool

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : HUAWEI Model : DUB-LX1 (Y7 2019) Storage : Auto
Loader: DUB-LX1_Loader_T-Tool-Team_1.mbn
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM43)
SymbolicName :\??\USB#VID_05C6&PID_9008#7&147361cc&0&3#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/31/2015,2.1.2.0

Getting device info......
Serial No.: 0xEA3B529E
MSM ID : 0x0009A0E1, SDM450-Qualcomm Snapdragon 450
PBL Ver : 00000000
PK HASH : 6BC369511DA9CADB3A7AF61574F89DB3
85003D6241BDD1FF573DBA61BF6AE119

Firehose Loader[DUB-LX1_Loader_T-Tool-Team_1.mbn]
SaharaBoot... Ok
Sending .............Ok
Connecting to Firehose...
Ping... Ok
Configuration.......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8953
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 750676207
Firmware Version : 0
Product Name : GD6BMB
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 61071360[29,121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok

Phone Information.....
Vendor : unknown
ID : OPM1.171019.011
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : generic_a53-user 8.1.0 OPM1.171019.011 eng.jenkin.20200930.175207 test-keys
Display ID : System 8.2.0.036(0FBW)
Security Patch : 2020-09-01

Reading GPT[3]
Drive [0] 60 Items
Drive [1] 0 Items
Drive [2] 0 Items

Removing FRPta...
Method :
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOkOk

Rebooting Phone.... Ok
If not rebooted, Please Power on Manually

Elapsed Time : 00:00:20
BR
Dipendra Pathak

  Reply With Quote
The Following User Says Thank You to Dipendra Pathak For This Useful Post:
Old 02-06-2021, 07:37   #1160 (permalink)
No Life Poster
 
pintu_das's Avatar
 
Join Date: Jan 2015
Location: Narsingdi, Dhaka, Bangladesh
Age: 28
Posts: 2,211
Member: 2325851
Status: Offline
Sonork: 100.1680491
Thanks Meter: 2,378
Donate money to this user
xiaomi Redmi Note 8 Pro (begonia) Remove MiAccount[Erase Method] + FRP Done

xiaomi Redmi Note 8 Pro (begonia) Remove MiAccount[Erase Method] + FRP Done










Hydra MediaTeK Tool Ver 1.0.2 Build 77
Windows 10 (Version 10.0, Build 18362, 64-bit Edition)
Intel(R) Core(TM) i7-8700 CPU @ 3.20GHz
Intel(R) UHD Graphics 630
Ram Installed : 8 GB
Windows Access Right Admin
Software Run As Admnistrator
******* Dongle Info *******
Version : Hydra Tool v 1.2
Serial : 200300003558
Initialize : OKAY
Status : Activated
Life : 0 [0-0-0-0-0]


Brand : AUTO Model : AUTO Connection : Flash Mode

=====================================
Connection
-Please wait...
-Connect Phone...
-Found...[COM18]

TPortConnection.Create...(COM18)..Opening...Ok

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0813 (0000)MT6785[6785]
BROM HW_SW_VER : 8A00 CA00 0000 0000
getMTKPayloadExploit : 0813
#Executing Exploit..
#SUCCESS..

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0813 (0000)MT6785[6785]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
SECURE VERSION : 05
BL VERSION : FE
BR Secured : E0

Preparing Download Agent..
DA : 6785.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2019/12/14.17:56_491164
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_begonia.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : F6D615C3BEA38890D39BE4FF904758FE
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x0000000180000000 -6 GB
UFS LU0 Size: 0x0000000000400000 -4 MB
UFS LU1 Size: 0x0000000000400000 -4 MB
UFS LU2 Size: 0x0000001DCB000000 -119.172 GB
UFS CID : I☺KM2V8001CM-B707
UFS UNIQID : 00330039003400310036003800360039

DA Speed : high-speed
DA Speed : high-speed

Reading GPT-UFS [0x00008000] 130 Items

Reading System Info
Brand : Redmi
Vendor : Xiaomi
Model : Redmi Note 8 Pro
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : begonia-user 9 PPR1.180610.011 V11.0.2.0.PGGMIXM release-keys
Miui Ver : V11
Device : begonia
Mod_device : begonia_global
Display ID : PPR1.180610.011
Security Patch : 2019-11-01
Fingerprint : Redmi/begonia/begonia:9/PPR1.180610.011/V11.0.2.0.PGGMIXM:user/release-keys
StorageType : mtp
Userdata State : Not Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader....
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x05888000]1024 KB ->frp.bin...Ok
-nvdata[0x08188000]64 MB ->nvdata.bin...Ok
-persist[0x0E188000]70.469 MB ->persist.bin...Ok
-nvram[0x17580000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\Redmi_Redmi Note 8 Pro_0813--9_PPR1.180610.011_060221122522
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : F6D615C3BEA38890D39BE4FF904758FE
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x0000000180000000 -6 GB
UFS LU0 Size: 0x0000000000400000 -4 MB
UFS LU1 Size: 0x0000000000400000 -4 MB
UFS LU2 Size: 0x0000001DCB000000 -119.172 GB
UFS CID : I☺KM2V8001CM-B707
UFS UNIQID : 00330039003400310036003800360039

Reading GPT-UFS [0x00008000] 130 Items


Reading System Info
Brand : Redmi
Vendor : Xiaomi
Model : Redmi Note 8 Pro
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : begonia-user 9 PPR1.180610.011 V11.0.2.0.PGGMIXM release-keys
Miui Ver : V11
Device : begonia
Mod_device : begonia_global
Display ID : PPR1.180610.011
Security Patch : 2019-11-01
Fingerprint : Redmi/begonia/begonia:9/PPR1.180610.011/V11.0.2.0.PGGMIXM:user/release-keys
StorageType : mtp
Userdata State : Not Encrypted

-------------------------------------
Operation : Remove MiAccount[Erase Method] + FRP
Processing...
-persist.bin[0x0E188000]70.469 MB ->persist.bin...Ok
-frp.bin[0x05888000]1024 KB ->frp.bin...Ok
Redmi Note 8 Pro_9_020621122535
Backing up Partition for safety...
-Redmi Note 8 Pro_9_020621122535[0x0E188000]70.469 MB ->persist.img...OkOk
Saved to :
C:\Hydra Tool\Backup\Persist\Redmi Note 8 Pro_9_020621122535.bin
Erasing FRP Partition...
-persist.bin[0x0E188000]70.469 MB ->persist.bin...Ok
-frp.bin[0x05888000]1024 KB ->frp.bin...Ok[] Failed

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:01:03



Thanks hydra team....
  Reply With Quote
The Following User Says Thank You to pintu_das For This Useful Post:
Old 02-06-2021, 07:42   #1161 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,624
Vivo v15 Pro (PD1832F) Safe and Zero wipe FRP successfully done by Hudra Tool

Vivo v15 Pro (PD1832F) Safe and Zero wipe FRP successfully done by Hudra Tool

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : VIVO Model : V15 Pro (PD1832F) Storage : Auto
Loader: Vivo_V17_Pro_SDM675.elf
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM41)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&4f9223b&0&6#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/02/2017,2.1.2.7

Getting device info......
Serial No.: 0xD47F13CD
MSM ID : 0x000950E1, SM6150-Qualcomm Snapdragon 675
PBL Ver : 00000000
PK HASH : A7DF36FFD7AB557C67A6C26675E2795C
922CF671308CFD7169BEDB84424C862B

Firehose Loader[Vivo_V17_Pro_SDM675.elf]
SaharaBoot... Ok
Sending .................................Ok
Connecting to Firehose...
Ping..................... Ok
Configuration........
Identifying Chip........UFS
Ok
Chip Configuration :
MemoryName : UFS
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Jul 2 2020 - 22:00:29

*** STORAGE DEVICE INFO ***
Memory Type : UFS
Block Size in Bytes : 4096
Page Size : 4096
Manufacturer ID : 462
Serial Number : 1297306958
Firmware Version : 900
Product Name : KM2V7001CM-B706
Physical Partitions : 6
Total Logical Blocks:
Drive [0] 30947328[118.055 GB]
Drive [1] 2048[8 MB]
Drive [2] 2048[8 MB]
Drive [3] 8192[32 MB]
Drive [4] 262144[1024 MB]
Drive [5] 16384[64 MB]

Protocol : Universal
Running : Ok
Reading GPT[6]
Drive [0] 32 Items
Drive [1] 32 Items
Drive [2] 32 Items
Drive [3] 32 Items
Drive [4] 64 Items
Drive [5] 32 Items


Phone Information......
ID : QP1A.190711.020
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Security Patch : 2020-10-01
Platform : =SM6150
Fingerprint : vivo/1818/1818:10/QP1A.190711.020/compiler11032032:user/release-keys

Processing Safe Format New - UFS....
- Removing FRP [Zero Wipe] Ok
- Formatting Userdata [Safe Vivo New] Ok
Action Result : Ok

Elapsed Time : 00:00:08
BR
Dipendra Pathak

  Reply With Quote
The Following User Says Thank You to Dipendra Pathak For This Useful Post:
Old 02-06-2021, 07:47   #1162 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,624
Vivo S1 Pro (PD1945F) Zero wipe successfully done by Hydra Tool

Vivo S1 Pro (PD1945F) Zero wipe successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : VIVO Model : S1 Pro (PD1945F) Storage : Auto
Loader: Vivo_S1Pro_Final.elf
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM56)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&4f9223b&0&8#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/02/2017,2.1.2.7

Getting device info......
Serial No.: 0x1ED7BB75
MSM ID : 0x0010A0E1, SM6125-Qualcomm Snapdragon 665
PBL Ver : 00000000
PK HASH : A7DF36FFD7AB557C67A6C26675E2795C
922CF671308CFD7169BEDB84424C862B

Firehose Loader[Vivo_S1Pro_Final.elf]
SaharaBoot... Ok
Sending ..............................Ok
Connecting to Firehose...
Ping..................... Ok
Configuration........
Identifying Chip........UFS
Ok
Chip Configuration :
MemoryName : UFS
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Sep 9 2020 - 00:57:45

*** STORAGE DEVICE INFO ***
Memory Type : UFS
Block Size in Bytes : 4096
Page Size : 4096
Manufacturer ID : 429
Serial Number : 2037279096
Firmware Version : 110
Product Name : H9HQ16AFAMMDAR
Physical Partitions : 6
Total Logical Blocks:
Drive [0] 30939136[118.023 GB]
Drive [1] 2048[8 MB]
Drive [2] 2048[8 MB]
Drive [3] 16384[64 MB]
Drive [4] 262144[1024 MB]
Drive [5] 16384[64 MB]

Protocol : Universal
Running : Ok
Reading GPT[6]
Drive [0] 32 Items
Drive [1] 32 Items
Drive [2] 32 Items
Drive [3] 32 Items
Drive [4] 64 Items
Drive [5] 32 Items


Phone Information......
ID : QP1A.190711.020
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Security Patch : 2020-10-01
Platform : =SM6125
Fingerprint : vivo/1920N/1920:10/QP1A.190711.020/compiler10282311:user/release-keys

Processing Safe Format New - UFS....
- Removing FRP [Zero Wipe] Ok
- Formatting Userdata [Safe Vivo New] Ok
Action Result : Ok

Elapsed Time : 00:00:08
BR
Dipendra Pathak

  Reply With Quote
The Following User Says Thank You to Dipendra Pathak For This Useful Post:
Old 02-06-2021, 14:52   #1163 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,624
World First Solution to repair IMEI of Redmi Note 9 (Merlin) & more by Hydra Tool ;)

How to repaired IMEI of Redmi Note 9 (Merlin) which has has higher version MIUI such as MIUI 12.0.6


Screen Short:






How to do this ?

We can not repair IMEI of Note 9 (Merlin) which has higher version MIUI such as MIUI 12.0.6 which has no preloader. For this, we need to write loawer version MIUI which has preloader. After this, you can repair IMEI without auth using our Hydra Tool.



Quote:
How to repair IMEI of Xiomi Redmi Modules
--------------------------------------------------------
we can devide IMEI device of xiomi devices into two steps as below:

Step 1 - Writing SYS0 Preloader (Steps 1 to 10 )
Step 2 - Repairing IMEI (Steps 11 to 23 )

1. Run Mediatek (MTK) Tool of Hydra Dongle.
2. Choose Platform as "SOCs"
3. Choose Brand as "Xiaomi" and Choose Model as "Redmi Note 9 (merlin)
(NOTE : This is example of repairing Xiomi Redmi Note 9 (merlin).
4. Tick "Enable BROM Exploit" (This is Important to tick)
5. Download firmware for Xiomi Redmi Note 9 (merlin)
(NOTE : This is example of repairing Xiomi Redmi Note 9 (merlin)
6. Choose "Flash" tab.
7. Click on the flsh file icon just below "BOOT / INFO" menu to choose "flash file" and load it.
8. Just tick "SYS0" preloader (Untik all others except "SYS0" preloader).
9. Tick "Enable Write Preloader" just before "Execute" button.
10. Click "Execute" button.
11. Turn off device (cellphone / mobile) and insert USB cable to the device (Cellphone / Mobile).
12. Wait few seconds until the operation is completed.
13. Now, Click on "Service" Tab.
14. Click on "Repair IMEI" sub-tab just below "service" tab.
15. Tick "IMEI Changing is ILLEGAL is some countries, Would you like to enable IMEI repair Oprion ?"
16. Click on "Xiaomi IMEI - Meta"
17. Choose Model as "Redmi Note 9 (merlin)" drop down menu.
18. Tick "Select" to active IMEI BOX.
19. Type your desire IMEI
20. Click "Repair IMEI"
21. Wait until it is completed.
22. Turn off device (Cellphone / Mobile) and insert USB cable
23. Wait until operation is completed.
24. That's All. Good Luck!

BR
Dipendra Pathak

  Reply With Quote
Old 02-08-2021, 04:56   #1164 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,624
Xiomi Redmi 6A (Cactus) FRP removed successfully using Fast Boot Mode by Hydra Tool

Xiomi Redmi 6A (Cactus) FRP removed successfully using Fast Boot Mode by Hydra Tool

Screen Short:



Logs:

Quote:
Hydra MediaTeK Tool Ver 1.0.2 Build 72
Windows 10 (Version 10.0, Build 18362, 64-bit Edition)
AMD A10-7800 Radeon R7, 12 Compute Cores 4C+8G
AMD Radeon R7 240
Ram Installed : 8 GB
Windows Access Right Admin
******* Dongle Info *******
Version : Hydra Tool v 1.1
Serial : *************
Initialize : OKAY
Status : Activated
Life : 0 [0-0-0-0-0]


Brand : XIAOMI Model : Redmi 6A (cactus) Connection : Fastboot

=====================================
Fastboot Service Operation....
=====================================
Searching Device By Fastboot
Device Found...

Reading Information...version: 0.5
Product : cactus
version : 0.5
Secure : no
Device Info:
---------------------------------------
Operation : FB FRP
Removing FRP ... Ok
---------------------------------------

Elapsed Time : 00:00:01
BR
Dipendra Pathak

  Reply With Quote
Old 02-08-2021, 05:09   #1165 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,624
Xiaomi PocoPhonene F1 (beryllium) Mi account successfully Patched by Hydra Tool

Xiaomi PocoPhonene F1 (beryllium) Mi account successfully Patched by Hydra Tool

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : XIAOMI Model : PocoPhone F1 (beryllium) Storage : Auto
Loader: Xiaomi_beryllium_PocoF1.elf
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM24)
SymbolicName :\??\USB#VID_05C6&PID_9008#6&39a21ec6&0&1#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :09/10/2015,2.1.2.0

Getting device info......
Serial No.: 0xB5F91858
MSM ID : 0x0008B0E1, SDM845-Qualcomm Snapdragon 845
PBL Ver : 00000000
PK HASH : C924A35F39CE1CDD1B8D5A9F3B8E3C51
317930431D7A9DD5A55028CF6965FE65

Firehose Loader[Xiaomi_beryllium_PocoF1.elf]
SaharaBoot... Ok
Sending ....................................Ok
Connecting to Firehose...
Ping..................... Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[hqGz0ourZdR1rsU47yRaQGIre-F]
Checking Internet connection....
- Hydra Is Online
Connecting to Hydra Xiaomi Server...

Signature @256bytes Authentication.... Accepted........
Identifying Chip........UFS
Ok
Chip Configuration :
MemoryName : UFS
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Oct 10 2018 - 22:42:48

*** STORAGE DEVICE INFO ***
Memory Type : UFS
Block Size in Bytes : 4096
Page Size : 4096
Manufacturer ID : 462
Serial Number : 1297306958
Firmware Version : 500
Product Name : KLUDG4U1EA-B0C1
Physical Partitions : 6
Total Logical Blocks:
Drive [0] 30038016[114.586 GB]
Drive [1] 2048[8 MB]
Drive [2] 2048[8 MB]
Drive [3] 8192[32 MB]
Drive [4] 1179648[4.5 GB]
Drive [5] 8192[32 MB]

Protocol : Universal
Running : Ok
Reading GPT[6]
Drive [0] 32 Items
Drive [1] 32 Items
Drive [2] 32 Items
Drive [3] 32 Items
Drive [4] 64 Items
Drive [5] 32 Items


Phone Information......
Vendor : Xiaomi
ID : QKQ1.190828.002
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Miui Ver : V12
Mod_device : beryllium_global
Security Patch : 2020-09-01

Processing Remove MiAccount[Patch Method]....
Backing up Partition for safety...Ok

Scanning Patching address...
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]Done!!
Total Items patched : 5
Successfully patched address..
Action Result : Ok

Rebooting Phone.... Ok

Elapsed Time : 00:00:57
BR
Dipendra Pathak

  Reply With Quote
Old 02-08-2021, 05:17   #1166 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,624
Oppo A12 CPH2083 FRP successfully Removed by Hydra Tool

Oppo A12 CPH2083 FRP successfully Removed by Hydra Tool

Screen Short:



Logs:

Quote:
Brand : OPPO Model : A12 cph2083 Connection : Flash Mode

=====================================
Connection
-Please wait...
-Found...[COM36]

TPortConnection.Create...(COM36)..Opening...Ok

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 33B58ABD1D59AD91F5DBA1F70CA076D4
ERAM Size : 0x000000000003A000 -232 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 90014A68423861503E035829C487C629 - hB8aP>

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Vendor : OPPO
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6765_19451-user 9 PPR1.180610.011 eng.root.20201126.014332 release-keys
Security Patch : 2020-11-05
StorageType : mtp
Userdata State : Not Encrypted

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition...[C002002A-STATUS_SEC_IMG_TYPE_MISMATCH]
Erasing FRP Partition...
Formatting Userdata... Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:11
BR
Dipendra Pathak

  Reply With Quote
Old 02-08-2021, 05:28   #1167 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,624
Asus X00DD FRP successfully removed by Hydra Tool

Asus X00DD FRP successfully removed by Hydra Tool

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : AUTO Model : AUTO Storage : Auto
Loader: Auto
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM9)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&5a33bf9&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/02/2017,2.1.2.7

Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 564628661
Firmware Version : 164
Product Name : HBG4a2
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 61071360[29.121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok

Phone Information.....
Brand : asus
Vendor : asus
Model : ASUS_X00DD
ID : OPM1.171019.011
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : msm8937_64-user 8.1.0 OPM1.171019.011 15.0200.1812.503-0 release-keys
Device : ASUS_X00DD
Board : QC_Reference_Phone
Display ID : OPM1.171019.011.WW_Phone-15.0200.1812.503-0
Security Patch : 2018-12-05
Emmc_size : 16GB
Platform : msm8937
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : asus/WW_Phone/ASUS_X00DD:8.1.0/OPM1.171019.011/15.0200.1812.503-0:user/release-keys

Reading GPT[3]
Drive [0] 68 Items
Drive [1] 0 Items
Drive [2] 0 Items

Removing FRPta...
Method :
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] Ok
- Removing FRP [Zero Wipe] OkOk
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] Ok
- Removing FRP [Zero Wipe] OkOkOk

Rebooting Phone.... Ok
If not rebooted, Please Power on Manually

Elapsed Time : 00:00:07
BR
Dipendra Pathak

  Reply With Quote
Old 02-08-2021, 05:59   #1168 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,624
Xiomi Mi 3W successfully flashed by Hydra Tool

Xiomi Mi 3W successfully flashed by Hydra Tool

Screen Short:



Logs:

Quote:
Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM10)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&376aba2d&0&8#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/02/2017,2.1.2.7

Getting device info.....
Serial No.: 0x0AA260E9
MSM ID : 0x007B90E1, MSM8674_AB-
PBL Ver : 00000000
PK HASH : CC3153A80293939B90D02D3BF8B23E02
92E452FEF662C74998421ADAD42A380F

Firehose Loader[8974.mbn]
SaharaBoot... Ok
Sending ....Ok
Connecting to Firehose...
Ping. Ok
Configuration........
Identifying Chip..........eMMC
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 131072
MaxPayloadSizeToTargetInBytesSupported : 131072
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8974
Version : 1


Protocol : Universal
Running : Ok

Phone Information.....
Brand : Xiaomi
Vendor : Xiaomi
Model : MI 3W
ID : MMB29M
SDK : 23
Release : 6.0.1
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-GB
Description : cancro-user 6.0.1 MMB29M V8.1.4.0.MXDMIDI release-keys
Miui Ver : V8
Device : cancro
Mod_device : cancro_global
Board : MSM8974
Display ID : MMB29M
Security Patch : 2016-11-01
Platform : msm8974
Fingerprint : Xiaomi/cancro/cancro:6.0.1/MMB29M/V8.1.4.0.MXDMIDI:user/release-keys

Reading GPT[1]
Drive [0] 28 Items


Backup Security partitions...
Reading Security Items....
> modemst1
> modemst2
> fsg
C:\Users\Ghost\hydra tool\HydraTool_Fullpackage_01-25-2021\Backup\Security_Backup\MI 3W_MSM8974_6.0.1_Security_020521183756.sec
Backup Security Success....

----------------------------
Flashing Selected Partitions....
- sbl1(0)[sbl1.mbn] Ok
- rpm(0)[rpm.mbn] Ok
- tz(0)[tz.mbn] Ok
- aboot(0)[emmc_appsboot.mbn] Ok
- misc(0)[dummy.img] Ok
- logo(0)[dummy.img] Ok
- boot(0)[boot.img] Ok
- recovery(0)[recovery.img] Ok
- persist(0)[persist.img] Skipped
- modem(0)[NON-HLOS.bin] Ok
- system(0)[system.img] Ok
- cache(0)[cache.img] Ok
- userdata(0)[userdata.img] Ok
- PrimaryGPT(0)[gpt_main0.bin] Ok

Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-33.] OK
0 [CRC32(2,3584)] OK
0 [CRC32(NUM_DISK_SECTORS-33.,3584)] OK
0 [0] OK
0 [CRC32(1,92)] OK
0 [0] OK
0 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 0
Set bootable storage drive 0 Ok

Rebooting Phone.... Ok

Elapsed Time : 00:05:13
BR
Dipendra Pathak

  Reply With Quote
Old 02-08-2021, 06:08   #1169 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,624
Xiaomi Mi 6X (wayne) successfully removed by Hydra Tool

Xiaomi Mi 6X (wayne) successfully removed by Hydra Tool

Screen Short:



Logs:

Quote:
Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM10)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&385d8a3&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/10/2020,5.1.1.2

Getting device info......
Serial No.: 0x89457D7C
MSM ID : 0x0008C0E1, SDM660-Qualcomm Snapdragon 660
PBL Ver : 00000000
PK HASH : A7B8B82545A98ECA23D6E9105FB46456
8D1B5828264903441BDEF0CD57E3C370

Firehose Loader[mi_2_9.elf]
SaharaBoot... Ok
Sending ...............................Ok
Connecting to Firehose...
Ping......... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : MSM8996
Version : 1
DateTime : Aug 2 2018 - 22:27:53

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 521263136
Firmware Version : 162
Product Name : HCG8a4
Physical Partitions : 4
Total Logical Blocks:
Drive [0] 122142720[58.242 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Drive [3] 8192[4 MB]

Protocol : Universal
Running : Ok

Phone Information.....
Brand : xiaomi
Vendor : Xiaomi
Model : MI 6X
ID : OPM1.171019.011
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : zh-CN
Description : wayne-user 8.1.0 OPM1.171019.011 V10.2.5.0.ODCCNXM release-keys
Miui Ver : V10
Device : wayne
Display ID : OPM1.171019.011
Security Patch : 2019-03-01
Fingerprint : xiaomi/wayne/wayne:8.1.0/OPM1.171019.011/V10.2.5.0.ODCCNXM:user/release-keys


----------------------------
Flashing Selected Partitions....
- storsec(0)[storsec.mbn] Ok
- storsecbak(0)[storsec.mbn] Ok
- rpm(0)[rpm.mbn] Ok
- rpmbak(0)[rpm.mbn] Ok
- hyp(0)[hyp.mbn] Ok
- hypbak(0)[hyp.mbn] Ok
- pmic(0)[pmic.elf] Ok
- pmicbak(0)[pmic.elf] Ok
- cmnlib(0)[cmnlib.mbn] Ok
- cmnlibbak(0)[cmnlib.mbn] Ok
- cmnlib64(0)[cmnlib64.mbn] Ok
- cmnlib64bak(0)[cmnlib64.mbn] Ok
- abl(0)[abl.elf] Ok
- ablbak(0)[abl.elf] Ok
- devcfgbak(0)[devcfg.mbn] Ok
- devcfg(0)[devcfg.mbn] Ok
- tz(0)[tz.mbn] Ok
- tzbak(0)[tz.mbn] Ok
- mdtpsecapp(0)[mdtpsecapp.mbn] Ok
- mdtpsecappbak(0)[mdtpsecapp.mbn] Ok
- keymaster(0)[keymaster64.mbn] Ok
- keymasterbak(0)[keymaster64.mbn] Ok
- bluetooth(0)[BTFM.bin] Ok
- xbl(0)[xbl.elf] Ok
- xblbak(0)[xbl.elf] Ok
- misc(0)[misc.img] Ok
- dsp(0)[dspso.bin] Ok
- mdtp(0)[mdtp.img] Ok
- splash(0)[splash.img] Ok
- persist(0)[persist.img] Ok
- modem(0)[NON-HLOS.bin] Ok
- boot(0)[boot.img] Ok
- recovery(0)[recovery.img] Ok
- cache(0)[cache.img] Ok
- system(0)[system.img] Ok
- vendor(0)[vendor.img] Ok
- cust(0)[cust.img] Ok
- userdata(0)[userdata.img] Ok
- PrimaryGPT(0)[gpt_main0.bin] Ok

Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-33.] OK
0 [CRC32(2,8192)] OK
0 [CRC32(NUM_DISK_SECTORS-33.,8192)] OK
0 [0] OK
0 [CRC32(1,92)] OK
0 [0] OK
0 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 0
Set bootable storage drive 0 Ok

Rebooting Phone.... Ok

Elapsed Time : 00:02:27
BR
Dipendra Pathak

  Reply With Quote
Old 02-08-2021, 06:22   #1170 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,624
Vivo Y66 (PD1621) Successfully erased user data by Hydra Tool

Vivo Y66 (PD1621) Successfully erased user data by Hydra Tool

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : VIVO Model : Y66 (PD1621) Storage : Auto
Loader: Vivo_8937.mbn
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM8)
SymbolicName :\??\USB#VID_05C6&PID_9008#6&8208cd3&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :03/19/2014,2.1.1.2

Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 3112229463
Firmware Version : 18
Product Name : RX1BMB
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 61071360[29.121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok
Reading GPT[3]
Drive [0] 52 Items
Drive [1] 0 Items
Drive [2] 0 Items


Phone Information.....
Brand : vivo
Vendor : vivo
Model : vivo
ID : MMB29M
SDK : 23
Release : 6.0.1
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-US
Description : msm8937_32-user 6.0.1 MMB29M eng.compiler.20190124.120610 release-keys
Device : PD1621
Board : QC_Reference_Phone
Display ID : MMB29M release-keys
Security Patch : 2018-08-01
Emmc_size : 16GB
Platform : msm8937
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : vivo/PD1621/PD1621:6.0.1/MMB29M/compiler01241209:user/release-keys

Processing Forced Erase....
- Removing FRP [Auto] Ok
- Forced Erase Userdata
Action Result : Ok

Elapsed Time : 00:00:16
BR
Dipendra Pathak

  Reply With Quote
Reply

Bookmarks

Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


 



All times are GMT +1. The time now is 02:48.



Powered by Searchlight © 2024 Axivo Inc.
vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2024 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2023 -
Page generated in 0.38777 seconds with 9 queries

SEO by vBSEO