GSM Shop GSM Shop
GSM-Forum  

Welcome to the GSM-Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features.
Only registered members may post questions, contact other members or search our database of over 8 million posts.

Registration is fast, simple and absolutely free so please - Click to REGISTER!

If you have any problems with the registration process or your account login, please contact contact us .

Go Back   GSM-Forum > Product Support Sections > Special Solutions / Services / WebShop > GSMFABRICA Products > HYDRA TOOL

Reply
 
LinkBack Thread Tools Display Modes
Old 02-10-2021, 04:39   #1186 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,619
Xiaomi Redmi 6A (cactus) Mi Account removing erasing method successfully done by Hydr


Xiaomi Redmi 6A (cactus) Mi Account removing erasing method successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
Brand : XIAOMI Model : Redmi 6A (cactus) Connection : Flash Mode

=====================================
Connection
-Please wait...
-Found...[COM24]

TPortConnection.Create...(COM24)..Opening...Ok

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : ACB14B9139B5701BF7D20EE8EE3C0A5D
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000020000000 -512 MB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003A3E00000 -14.561 GB
eMMC CID : 150100514536334D420300399790B58F - QE63MB

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi 6A
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-GB
Description : cactus-user 9 PPR1.180610.011 V11.0.8.0.PCBMIXM release-keys
Miui Ver : V11
Device : cactus
Mod_device : cactus_global
Display ID : SW_S98506AE1_V009_M13_XM_C3C_USR
Security Patch : 2020-05-01
Fingerprint : xiaomi/cactus/cactus:9/PPR1.180610.011/V11.0.8.0.PCBMIXM:user/release-keys
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Remove MiAccount[Erase Method]
Processing...
-persist.bin[0x0F000000]64 MB ->persist.bin...Ok
-frp.bin[0x05588000]1024 KB ->frp.bin...Ok Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:15
BR
Dipendra Pathak

  Reply With Quote
Old 02-10-2021, 04:40   #1187 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,619
Oppo A57 (CPH1701) FRP successfully removed by Hydra Tool

Oppo A57 (CPH1701) FRP successfully removed by Hydra Tool

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : OPPO Model : A57 (CPH1701) Storage : Auto
Loader: Oppo_A57_8940.mbn
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM27)
SymbolicName :\??\USB#VID_05C6&PID_9008#7&11ee7dbc&0&4#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/02/2017,2.1.2.7

Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 2536294619
Firmware Version : 7
Product Name : RX1BMB
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 61071360[29.121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok

Phone Information.....
Brand : OPPO
Vendor : OPPO
Model : CPH1701
ID : MMB29M
SDK : 23
Release : 6.0.1
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : msm8937_64-user 6.0.1 MMB29M eng.root.20180806.181819 release-keys
Device : CPH1701
Board : QC_Reference_Phone
Display ID : CPH1701EX_11_A.34_180806
Security Patch : 2018-05-05
Emmc_size : 16GB
Platform : msm8937
FRPPST : /dev/block/bootdevice/by-name/config

Reading GPT[3]
Drive [0] 56 Items
Drive [1] 0 Items
Drive [2] 4 Items

Removing FRPta...
Method :
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOkOk

Elapsed Time : 00:00:05
BR
Dipendra Pathak

  Reply With Quote
Old 02-10-2021, 04:40   #1188 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,619
Wiko V3913 (Kenny) FRP successfully removed by Hydra Tool

Wiko V3913 (Kenny) FRP successfully removed by Hydra Tool

Screen Short:



Logs:

Quote:
Brand : WIKO Model : V3913 (Kenny) Connection : Flash Mode

=====================================
Connection
-Please wait...
-Connect Phone...
-Found...
-PreLoader...[COM13]

TPortConnection.Create...(COM13)..Opening...Ok

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0335 (0000)MT6737[6735]
BROM HW_SW_VER : 8A00 CA00 0000 0000

Handshaking...

Identifying Hardware ID.....
BROM CPUID : 0335 (0000)MT6737[6735]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
SECURE VERSION : 00
BL VERSION : 00
BR Secured : 00
NORMAL BOOT

Preparing Download Agent..
DA : 6735_SWSEC_Wiko.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.00.00
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : Old - eMMC
00000000000000000000
PRMMCCID : 460001154D32584EB2E80642A7B2CAF2
Init Configuration
Running DA 4.2 on BBID : 0x9B Ok

Initializing Loader [2]
Sending Loader [2] Accepted
Reading Flashchip data....
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000080000 -512 KB
eMMC USER : 0x00000001D2000000 -7,281 GB
ERAM Size : 0x0000000040000000 -1024 MB
IRAM Size : 0x0000000000020000 -128 KB
UNICAL RID : 20DB4AF6C8687B99898119E16D9363ED
eMMC CID : 460001154D32584EB2E80642A764CAF2
Change to HIGH SPEED...
5A
Connection
-Please wait...
-Found...[COM21]


Reading Partition Table
SIZE[0x00000898] 25 Items > Done

Reading System Info
Brand : WIKO
Vendor : WIKO
Model : KENNY
ID : NRD90M
SDK : 24
Release : 7.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Description : full_v3913-user 7.0 NRD90M 1488199004 release-keys
Device : v3913
Display ID : alps-mp-n0.mp1-V1.0.2_tinno6737m.35.n_P182
Security Patch : 2017-07-05
Platform : mt6737m
FRPPST : /dev/block/platform/mtk-msdc.0/11230000.msdc0/by-name/frp
Fingerprint : WIKO/v3913/v3913:7.0/NRD90M/1488199004:user/release-keys
StorageType : mtp
Userdata State : Not Encrypted

Autobackup Partitions
-preloader[0x00000000] 512 KB -> preloader.bin...Ok
-> Renaming Preloader.... preloader_v3913.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\WIKO_KENNY_0335-mt6737m-7.0_alps-mp-n0.mp1-V1.0.2_tinno6737m.35.n_P182_040221142055\MT6737_An droid_scatter.txt
-nvram[0x00380000] 5 MB -> nvram.bin...Ok
-frp[0x07E00000] 1024 KB -> frp.bin...Ok
-nvdata[0x07F00000] 32 MB -> nvdata.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\WIKO_KENNY_0335-mt6737m-7.0_alps-mp-n0.mp1-V1.0.2_tinno6737m.35.n_P182_040221142055
MTK Phone Loader is NOW RUNNING.


Reading System Info
Brand : WIKO
Vendor : WIKO
Model : KENNY
ID : NRD90M
SDK : 24
Release : 7.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Description : full_v3913-user 7.0 NRD90M 1488199004 release-keys
Device : v3913
Display ID : alps-mp-n0.mp1-V1.0.2_tinno6737m.35.n_P182
Security Patch : 2017-07-05
Platform : mt6737m
FRPPST : /dev/block/platform/mtk-msdc.0/11230000.msdc0/by-name/frp
Fingerprint : WIKO/v3913/v3913:7.0/NRD90M/1488199004:user/release-keys
StorageType : mtp
Userdata State : Not Encrypted

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition... [Ok] Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:18
BR
Dipendra Pathak

  Reply With Quote
Old 02-10-2021, 04:41   #1189 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,619
Xiaomi Redmi Note 7 Pro successfully flashed by Hydra Tool

Xiaomi Redmi Note 7 Pro successfully flashed by Hydra Tool

Screen Short:



Logs:

Quote:
Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM29)
SymbolicName :\??\USB#VID_05C6&PID_9008#6&15e088b1&0&8#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/31/2015,2.1.2.0

Getting device info......
Serial No.: 0xB748CB5D
MSM ID : 0x000950E1, SM6150-Qualcomm Snapdragon 675
PBL Ver : 00000000
PK HASH : 1BEBE3863A6781DB4B01086063007334
DE9E5CA14971C7C4F4358EC9D79CDA46

Firehose Loader[prog_emmc_firehose_Sm6150_ddr.elf]
SaharaBoot... Ok
Sending ...................................Ok
Connecting to Firehose...
Ping..................... Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[5AREnf
Checking Internet connection....
- Hydra Is Online
Connecting to Hydra Xiaomi Server...

Signature @256bytes Authentication.... Accepted........
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Jul 19 2019 - 01:12:10

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 3953945322
Firmware Version : 2
Product Name : 3V6CMB
Physical Partitions : 4
Total Logical Blocks:
Drive [0] 244277248[116.48 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Drive [3] 32768[16 MB]

Protocol : Universal
Running : Ok

Phone Information......
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi Note 7 Pro
ID : PKQ1.181203.001
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : zh-CN
Description : violet-user 9 PKQ1.181203.001 9.8.9 release-keys
Miui Ver : V10
Device : violet
Display ID : PKQ1.181203.001
Security Patch : 2019-08-01
Fingerprint : xiaomi/violet/violet:9/PKQ1.181203.001/9.8.9:user/release-keys


----------------------------
Flashing Selected Partitions....
- (0)[1.img] Ok
- PrimaryGPT(0)[gpt_main0.bin] Ok

Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-33.] OK
0 [CRC32(2,11264)] OK
0 [CRC32(NUM_DISK_SECTORS-33.,11264)] OK
0 [0] OK
0 [CRC32(1,92)] OK
0 [0] OK
0 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 0
Set bootable storage drive 0 Ok

Rebooting Phone.... Ok

Elapsed Time : 00:00:28
BR
Dipendra Pathak

  Reply With Quote
Old 02-10-2021, 04:52   #1190 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,619
Oppo Realme 3 (RMX1821) FRP successfully removed by Hydra Tool

Oppo Realme 3 (RMX1821) FRP successfully removed by Hydra Tool

Screen Short:



Logs:

Quote:
Brand : OPPO Model : Realme 3 (RMX1821) Connection : Flash Mode

=====================================
Connection
-Please wait...
-Found...[COM3]

TPortConnection.Create...(COM3)..Opening...Ok

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 9FFD4944C11B2E5CCDEA9CC6616E0530
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 150100475036424D4201E9229ADA3625 - GP6BMB

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Userdata State : Not Encrypted

-------------------------------------
Operation : Format/Erase
Processing...
Erasing FRP Partition... Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:08
BR
Dipendra Pathak

  Reply With Quote
Old 02-10-2021, 04:59   #1191 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,619
Xiaomi Poco M2 (shiva) FRP successfully removed by Hydra Tool

Xiaomi Poco M2 (shiva) FRP successfully removed by Hydra Tool

Screen Short:



Logs:

Quote:
Brand : XIAOMI Model : POCO M2 (shiva) Connection : Flash Mode

=====================================
Connection
-Please wait...
-Connect Phone...
-Found...[COM9]

TPortConnection.Create...(COM9)..Opening...Ok

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0707 (0000)MT6768[6768]
BROM HW_SW_VER : 8A00 CA00 0000 0000
getMTKPayloadExploit : 0707
#Executing Exploit..
#SUCCESS..

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0707 (0000)MT6768[6768]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
SECURE VERSION : 05
BL VERSION : FE
BR Secured : E0

Preparing Download Agent..
DA : [Not Exist]
Trying Default 6768.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2020-11-03.22:07_536568
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_shiva.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : AED0FCAF7B8AD468782B398164D7C6AF
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000001D1F000000 -116.484 GB
eMMC CID : 90014A68444561503303000B1155675F - hDEaP3

DA Speed : high-speed
DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_shiva.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\__0707--__040221152623\MT6768_Android_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x05508000]1024 KB ->frp.bin...Ok
-nvdata[0x0C4A2000]64 MB ->nvdata.bin...Ok
-persist[0x104A2000]48 MB ->persist.bin...Ok
-nvram[0x19F80000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\__0707--__040221152623
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : AED0FCAF7B8AD468782B398164D7C6AF
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000001D1F000000 -116.484 GB
eMMC CID : 90014A68444561503303000B1155675F - hDEaP3

Reading GPT-EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Remove MiAccount[Erase Method] + FRP
Processing...
-persist.bin[0x104A2000]48 MB ->persist.bin...Ok
-frp.bin[0x05508000]1024 KB ->frp.bin...Ok
__020421152646
Backing up Partition for safety...
-__020421152646[0x104A2000]48 MB ->persist.img...OkOk
Saved to :
C:\Hydra Tool\Backup\Persist\__020421152646.bin
Erasing FRP Partition...
-persist.bin[0x104A2000]48 MB ->persist.bin...Ok
-frp.bin[0x05508000]1024 KB ->frp.bin...Ok Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:01:37
BR
Dipendra Pathak

  Reply With Quote
Old 02-10-2021, 05:07   #1192 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,619
Vovo IQOO (PD1824) Successfully flashed by Hydra Tool

Vovo IQOO (PD1824) Successfully flashed by Hydra Tool

Screen Short:



Logs:

Quote:
Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM26)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&4ec4a96&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :12/06/2012,2.1.0.5

Getting device info......
Serial No.: 0x87D881BB
MSM ID : 0x000A50E1, SDM855-Qualcomm Snapdragon 855
PBL Ver : 00000000
PK HASH : A7DF36FFD7AB557C67A6C26675E2795C
922CF671308CFD7169BEDB84424C862B

Firehose Loader[Vivo_iQOONeo855.elf]
SaharaBoot... Ok
Sending .....................................Ok
Connecting to Firehose...
Ping...................... Ok
Configuration........
Identifying Chip........UFS
Ok
Chip Configuration :
MemoryName : UFS
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Oct 30 2020 - 10:53:30

*** STORAGE DEVICE INFO ***
Memory Type : UFS
Block Size in Bytes : 4096
Page Size : 4096
Manufacturer ID : 462
Serial Number : 1297306958
Firmware Version : 900
Product Name : KLUDG4U1EA-B0C1
Physical Partitions : 6
Total Logical Blocks:
Drive [0] 30947328[118.055 GB]
Drive [1] 2048[8 MB]
Drive [2] 2048[8 MB]
Drive [3] 8192[32 MB]
Drive [4] 262144[1024 MB]
Drive [5] 16384[64 MB]

Protocol : Universal
Running : Ok

Phone Information......
Brand : vivo
Vendor : vivo
Model : vivo
ID : PKQ1.181216.001
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : zh-CN
Description : msmnile-user 9 PKQ1.181216.001 compiler01102012 release-keys
Device : PD1824
Display ID : PKQ1.181216.001 release-keys
Security Patch : 2020-01-01
Platform : =SM8150
Fingerprint : vivo/PD1824/PD1824:9/PKQ1.181216.001/compiler01102012:user/release-keys

Reading GPT[6]
Drive [0] 32 Items
Drive [1] 32 Items
Drive [2] 32 Items
Drive [3] 32 Items
Drive [4] 64 Items
Drive [5] 32 Items


Backup Security partitions...
Reading Security Items....
> modemst1

> modemst2
No response from phone...
> fsg

C:\Hydra Tool\Backup\Security_Backup\vivo__9_Security_02042 1214213.sec
Backup Security Success....

----------------------------
Flashing Selected Partitions....
- recovery(0)[recovery.img] Ok
- survival(0)[survival.img] Ok
- PrimaryGPT(0)[gpt_main0.bin] Ok
- xbl(1)[xbl.elf] Ok
- xbl_config(1)[xbl_config.elf] Ok
- PrimaryGPT(1)[gpt_main1.bin] Ok
- PrimaryGPT(2)[gpt_main2.bin] Ok
- PrimaryGPT(3)[gpt_main3.bin] Ok
- aop(4)[aop.mbn] Ok
- tz(4)[tz.mbn] Ok
- hyp(4)[hyp.mbn] Ok
- modem(4)[NON-HLOS.bin] Ok
- bluetooth(4)[BTFM.bin] Ok
- abl(4)[abl.elf] Ok
- dsp(4)[dspso.bin] Ok
- keymaster(4)[km4.mbn] Ok
- boot(4)[boot.img] Ok
- cmnlib(4)[cmnlib.mbn] Ok
- cmnlib64(4)[cmnlib64.mbn] Ok
- devcfg(4)[devcfg.mbn] Ok
- qupfw(4)[qupv3fw.elf] Ok
- vbmeta(4)[vbmeta.img] Ok
- dtbo(4)[dtbo.img] Ok
- uefisecapp(4)[uefi_sec.mbn] Ok
- imagefv(4)[imagefv.elf] Ok
- logfs(4)[logfs_ufs_8mb.bin] Ok
- storsec(4)[storsec.mbn] Ok
- multiimgoem(4)[multi_image.mbn] Ok
- secdata(4)[sec.elf] Ok
- PrimaryGPT(4)[gpt_main4.bin] Ok
- modemst1(5)[modemst.mbn] Skipped
- modemst2(5)[modemst.mbn] Skipped
- fsg(5)[PD1824_fs_image.tar.gz.mbn.img] Skipped
- PrimaryGPT(5)[gpt_main5.bin] Ok

Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-6.] OK
0 [NUM_DISK_SECTORS-6.] OK
0 [NUM_DISK_SECTORS-6.] OK
0 [NUM_DISK_SECTORS-6.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-5.] OK
0 [CRC32(2,4096)] OK
0 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
0 [0] OK
0 [CRC32(1,92)] OK
0 [0] OK
0 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
1 [NUM_DISK_SECTORS-6.] OK
1 [NUM_DISK_SECTORS-6.] OK
1 [NUM_DISK_SECTORS-6.] OK
1 [NUM_DISK_SECTORS-6.] OK
1 [NUM_DISK_SECTORS-1.] OK
1 [NUM_DISK_SECTORS-1.] OK
1 [NUM_DISK_SECTORS-5.] OK
1 [CRC32(2,4096)] OK
1 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
1 [0] OK
1 [CRC32(1,92)] OK
1 [0] OK
1 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
2 [NUM_DISK_SECTORS-6.] OK
2 [NUM_DISK_SECTORS-6.] OK
2 [NUM_DISK_SECTORS-6.] OK
2 [NUM_DISK_SECTORS-6.] OK
2 [NUM_DISK_SECTORS-1.] OK
2 [NUM_DISK_SECTORS-1.] OK
2 [NUM_DISK_SECTORS-5.] OK
2 [CRC32(2,4096)] OK
2 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
2 [0] OK
2 [CRC32(1,92)] OK
2 [0] OK
2 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
3 [NUM_DISK_SECTORS-6.] OK
3 [NUM_DISK_SECTORS-6.] OK
3 [NUM_DISK_SECTORS-6.] OK
3 [NUM_DISK_SECTORS-6.] OK
3 [NUM_DISK_SECTORS-1.] OK
3 [NUM_DISK_SECTORS-1.] OK
3 [NUM_DISK_SECTORS-5.] OK
3 [CRC32(2,4096)] OK
3 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
3 [0] OK
3 [CRC32(1,92)] OK
3 [0] OK
3 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
4 [NUM_DISK_SECTORS-6.] OK
4 [NUM_DISK_SECTORS-6.] OK
4 [NUM_DISK_SECTORS-6.] OK
4 [NUM_DISK_SECTORS-6.] OK
4 [NUM_DISK_SECTORS-1.] OK
4 [NUM_DISK_SECTORS-1.] OK
4 [NUM_DISK_SECTORS-5.] OK
4 [CRC32(2,8192)] OK
4 [CRC32(NUM_DISK_SECTORS-5.,8192)] OK
4 [0] OK
4 [CRC32(1,92)] OK
4 [0] OK
4 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
5 [NUM_DISK_SECTORS-6.] OK
5 [NUM_DISK_SECTORS-6.] OK
5 [NUM_DISK_SECTORS-6.] OK
5 [NUM_DISK_SECTORS-6.] OK
5 [NUM_DISK_SECTORS-1.] OK
5 [NUM_DISK_SECTORS-1.] OK
5 [NUM_DISK_SECTORS-5.] OK
5 [CRC32(2,4096)] OK
5 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
5 [0] OK
5 [CRC32(1,92)] OK
5 [0] OK
5 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 1
Set bootable storage drive 1 Ok

Rebooting Phone.... Ok

Elapsed Time : 00:01:01
BR
Dipendra Pathak

  Reply With Quote
Old 02-10-2021, 05:09   #1193 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,619
Asus X00RD (ZenFone Lite L1 ZA551KL) Zero FRP successfully Done by Hydra Tool

Asus X00RD (ZenFone Lite L1 ZA551KL) Zero FRP successfully Done by Hydra Tool

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : ASUS Model : X00RD (ZenFone Lite L1 ZA551KL) Storage : Auto
Loader: asus_5_0.mbn
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM19)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&21340359&0&3#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :03/25/2016,2.1.2.2

Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 3672171725
Firmware Version : 6
Product Name : QE63MB
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 30535680[14.561 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok

Phone Information.....
Brand : asus
Vendor : asus
Model : ZA550KL
ID : OPR1.170623.032
SDK : 26
Release : 8.0.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : A306-user 8.0.0 OPR1.170623.032 9 release-keys
Display ID : WW_Phone-15.07.2007.57-20200619
Security Patch : 2020-07-05
Emmc_size : 16GB

Reading GPT[3]
Drive [0] 56 Items
Drive [1] 0 Items
Drive [2] 0 Items

Removing FRPta...
Method :
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOkOk

Elapsed Time : 00:00:09
BR
Dipendra Pathak

  Reply With Quote
Old 02-11-2021, 10:08   #1194 (permalink)
No Life Poster
 
Gsm-Ahmed's Avatar
 
Join Date: Jan 2020
Location: Algeria
Posts: 814
Member: 2944109
Status: Offline
Thanks Meter: 655
Condor Plume P6 Pro LTE PGN528 Remove FRP




Code:
Brand : AUTO Model : AUTO Connection : Flash Mode

=====================================
Connection
 -Please wait...
 -Found...[COM16]

TPortConnection.Create...(COM16)..Opening...Ok


Reading System Info
  Brand          : condor
  Vendor         : SPA Condor Electronics
  Model          : PGN528
  ID             : NRD90M
  SDK            : 24
  Release        : 7.0
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : fr-FR
  Description    : full_gnsz6737t_66_n-user 7.0 NRD90M 1533873701 release-keys
  Device         : PGN528
  Board          : PGN528
  Display ID     : PGN528
  Security Patch : 2018-08-05
  Platform       : mt6737t
  FRPPST         : /dev/block/platform/mtk-msdc.0/11230000.msdc0/by-name/frp
  Fingerprint    : condor/PGN528/PGN528:7.0/NRD90M/1533873701:user/release-keys
  StorageType    : mtp
  Userdata State : Encrypted

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition... [Ok] Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:03
  Reply With Quote
Old 02-11-2021, 10:08   #1195 (permalink)
No Life Poster
 
Gsm-Ahmed's Avatar
 
Join Date: Jan 2020
Location: Algeria
Posts: 814
Member: 2944109
Status: Offline
Thanks Meter: 655
Tab Condor TFX711G Flash Done




Code:
Brand : AUTO Model : AUTO Connection : Flash Mode

=====================================
How To Boot : Power off phone
 * BROM Mode : Press VOL + or Press VOL -+
 * Preloader Mode : Just Insert cable

Connection
 -Please wait...
 -Found...[COM16]

TPortConnection.Create...(COM16)..Opening...Ok



Reading Partition Table
SIZE[0x00000790] 22 Items > Done

Preparing to flash selected partitions
Flashing....
 preloader(preloader_elink8321_tb_m.bin) Ok
 lk(lk.bin)245,828 KB Ok
 ITEMS(items.img)16 KB Ok
 boot(boot.img)8,332 MB Ok
 recovery(recovery.img)9,012 MB Ok
 logo(logo.bin)810,21 KB Ok
 secro(secro.img)132 KB Ok
 system(system.img)2,344 GB Ok
 cache(cache.img)6,102 MB Ok
 userdata(userdata.img)74,587 MB
Unable to read phone ack FAILED

TPortConnection.Destroy.....Closing...Ok..
=====================================

Elapsed Time : 00:07:56
  Reply With Quote
Old 02-11-2021, 10:11   #1196 (permalink)
No Life Poster
 
Gsm-Ahmed's Avatar
 
Join Date: Jan 2020
Location: Algeria
Posts: 814
Member: 2944109
Status: Offline
Thanks Meter: 655
Xiaomi Redmi Note 8 Ultra Power+ Remove MiAccount

Xiaomi Redmi Note 8
Ultra Power Option + Remove MiAccount [Patch Method]



Code:
PreOperation Configuration 
 Brand : XIAOMI Model : Redmi Note 8 (ginkgo) Storage : Auto
 Loader: Xiaomi_redminote8_loader.elf
 Port  : Auto
 Connection  : 

Searching for Qualcomm 9008 Device...Found
 FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM14)
 SymbolicName :\??\USB#VID_05C6&PID_9008#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :08/02/2017,2.1.2.7

Getting device info......
Serial No.: 0x0CF764A4
MSM ID    : 0x0010A0E1, SM6125-Qualcomm Snapdragon 665
PBL Ver   : 00000000
PK HASH   : 1BEBE3863A6781DB4B01086063007334
            DE9E5CA14971C7C4F4358EC9D79CDA46
 
Firehose Loader[Xiaomi_redminote8_loader.elf]
SaharaBoot... Ok
Sending ..............................Ok
Connecting to Firehose...
Ping..................... Ok 
Configuration.........
Identifying Chip....
Ok
Chip Configuration :
 MemoryName : eMMC
 MaxPayloadSizeToTargetInBytes : 16384
 MaxPayloadSizeToTargetInBytesSupported : 16384
 MaxPayloadSizeFromTargetInBytes : 
 MaxXMLSizeInBytes : 4096
 TargetName : 
 Version : 1
 DateTime : Jul  3 2019 - 22:23:56

*** STORAGE DEVICE INFO ***
Memory Type         : eMMC
Block Size in Bytes : 512
Page Size           : 512
Manufacturer ID     : 19
Serial Number       : 326211206
Firmware Version    : 4
Product Name        : S0J9K8
Physical Partitions : 4
Total Logical Blocks:
          Drive [0]  122142720[58,242 GB]
          Drive [1]  8192[4 MB]
          Drive [2]  8192[4 MB]
          Drive [3]  32768[16 MB]

Protocol : Universal
Running : Ok
Reading GPT[4]
          Drive [0] 88 Items
          Drive [1] 0 Items
          Drive [2] 0 Items
          Drive [3] 

 
Phone Information......
  Brand          : xiaomi
  Vendor         : Xiaomi
  Model          : Redmi Note 8
  ID             : PKQ1.190616.001
  SDK            : 28
  Release        : 9
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-GB
  Description    : ginkgo-user 9 PKQ1.190616.001 V11.0.9.0.PCOMIXM release-keys
  Miui Ver       : V11
  Device         : ginkgo
  Mod_device     : ginkgo_global
  Display ID     : PKQ1.190616.001
  Security Patch : 2020-05-01
  Fingerprint    : xiaomi/ginkgo/ginkgo:9/PKQ1.190616.001/V11.0.9.0.PCOMIXM:user/release-keys

Processing Auto....
 - Removing FRP
Executing ...
 - Removing FRP [Zero Wipe] OkOk
 - Formatting Userdata
Executing ...
 - Formatting Userdata  [Safe method] OkOk
Action Result : Ok

Rebooting Phone.... Ok

Elapsed Time : 00:00:10



Code:
PreOperation Configuration 
 Brand : XIAOMI Model : Redmi Note 8 (ginkgo) Storage : Auto
 Loader: Xiaomi_redminote8_loader.elf
 Port  : Auto
 Connection  : 

Searching for Qualcomm 9008 Device...Found
 FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM14)
 SymbolicName :\??\USB#VID_05C6&PID_9008#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :08/02/2017,2.1.2.7

Getting device info......
Serial No.: 0x0CF764A4
MSM ID    : 0x0010A0E1, SM6125-Qualcomm Snapdragon 665
PBL Ver   : 00000000
PK HASH   : 1BEBE3863A6781DB4B01086063007334
            DE9E5CA14971C7C4F4358EC9D79CDA46
 
Firehose Loader[Xiaomi_redminote8_loader.elf]
SaharaBoot... Ok
Sending ..............................Ok
Connecting to Firehose...
Ping..................... Ok 
Configuration.........
Identifying Chip....
Ok
Chip Configuration :
 MemoryName : eMMC
 MaxPayloadSizeToTargetInBytes : 16384
 MaxPayloadSizeToTargetInBytesSupported : 16384
 MaxPayloadSizeFromTargetInBytes : 
 MaxXMLSizeInBytes : 4096
 TargetName : 
 Version : 1
 DateTime : Jul  3 2019 - 22:23:56

*** STORAGE DEVICE INFO ***
Memory Type         : eMMC
Block Size in Bytes : 512
Page Size           : 512
Manufacturer ID     : 19
Serial Number       : 326211206
Firmware Version    : 4
Product Name        : S0J9K8
Physical Partitions : 4
Total Logical Blocks:
          Drive [0]  122142720[58,242 GB]
          Drive [1]  8192[4 MB]
          Drive [2]  8192[4 MB]
          Drive [3]  32768[16 MB]

Protocol : Universal
Running : Ok
Reading GPT[4]
          Drive [0] 88 Items
          Drive [1] 0 Items
          Drive [2] 0 Items
          Drive [3] 

 
Phone Information......
  Brand          : xiaomi
  Vendor         : Xiaomi
  Model          : Redmi Note 8
  ID             : PKQ1.190616.001
  SDK            : 28
  Release        : 9
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-GB
  Description    : ginkgo-user 9 PKQ1.190616.001 V11.0.9.0.PCOMIXM release-keys
  Miui Ver       : V11
  Device         : ginkgo
  Mod_device     : ginkgo_global
  Display ID     : PKQ1.190616.001
  Security Patch : 2020-05-01
  Fingerprint    : xiaomi/ginkgo/ginkgo:9/PKQ1.190616.001/V11.0.9.0.PCOMIXM:user/release-keys

Processing Remove MiAccount[Patch Method]....
Backing up Partition for safety...Ok

Scanning Patching address...
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]Done!!
Total Items patched : 56
Successfully patched address..
Action Result : Ok

Rebooting Phone.... Ok

Elapsed Time : 00:02:02
  Reply With Quote
Old 02-11-2021, 10:12   #1197 (permalink)
No Life Poster
 
Gsm-Ahmed's Avatar
 
Join Date: Jan 2020
Location: Algeria
Posts: 814
Member: 2944109
Status: Offline
Thanks Meter: 655
XIAOMI Redmi 6A (cactus) Remove MiAccount

XIAOMI Redmi 6A (cactus) Remove MiAccount[Erase Method]





Code:
Brand : XIAOMI Model : Redmi 6A (cactus) Connection : Flash Mode

=====================================
Connection
-Please wait...
-Found...[COM16]

TPortConnection.Create...(COM16)..Opening...Ok

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : AB502B485654254FF684D00224E88A46
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000020000000 -512 MB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003AB400000 -14.676 GB
eMMC CID : 161000800036880002AE170D9FA34731 - HAG4a2

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi 6A
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-GB
Description : cactus-user 9 PPR1.180610.011 V11.0.9.0.PCBMIXM release-keys
Miui Ver : V11
Device : cactus
Mod_device : cactus_global
Display ID : SW_S98506AE1_V009_M13_XM_C3C_USR
Security Patch : 2020-08-01
Fingerprint : xiaomi/cactus/cactus:9/PPR1.180610.011/V11.0.9.0.PCBMIXM:user/release-keys
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Remove MiAccount[Erase Method]
Processing...
-persist.bin[0x0F000000]64 MB ->persist.bin...Ok
-frp.bin[0x05588000]1024 KB ->frp.bin...Ok Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:20
  Reply With Quote
Old 02-11-2021, 14:35   #1198 (permalink)
No Life Poster
 
Gsm-Ahmed's Avatar
 
Join Date: Jan 2020
Location: Algeria
Posts: 814
Member: 2944109
Status: Offline
Thanks Meter: 655
Redmi Note 8 Pro Bypass MiAccount

Xiaomi Redmi Note 8 Pro (begonia)
Bypass MiAccount
Remove FRP

By Hydra Tool

NO Testpoint
NO auth
NO Server




Find My Device ON
install Drony APK and dont fectory reset the Phone
  Reply With Quote
Old 02-11-2021, 14:53   #1199 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,619
Oppo F5 (CPH1723) Fixing from Dead using TP successfully done by Hydra Tool

Oppo F5 (CPH1723) Fixing from Dead using TP successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
Brand : OPPO Model : F5 (CPH1723) Connection : Flash Mode

=====================================
Connection
-Please wait...
-Connect Phone...
-Found...[COM7]

TPortConnection.Create...(COM7)..Opening...Ok

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0690MT6763T[6763]
BROM HW_SW_VER : 8A00 CA01 0001 0000

Handshaking...

Identifying Hardware ID.....
BROM CPUID : 0690MT6763T[6763]
BROM HW_SW_VER : 8A00 CA01 0001 0000
SECURE VERSION : 05
BL VERSION : FE
BR Secured : E5[SBC+SDA+SEL]

Security Authorization....
Sending[Oppo_F5.auth] Accepted

Preparing Download Agent..
DA : 6763_SWSEC_F156FF6B3D.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2017/09/22.09:22
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_oppo6763_17031.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 6AEE33DDCD00735ED32683A2DDB43541
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 90014A484247346132A5295070F5A4C3 - HBG4a2

DA Speed : high-speed
DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_oppo6763_17031.bin
Creating Scatter file... C:\Users\Downloads\HydraTool_Fullpackage_01-25-2021\\Backup\Auto\__0690--__100221200641\MT6763T_Android_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x05A88000]1024 KB ->frp.bin...Ok
-nvdata[0x07B88000]64 MB ->nvdata.bin...Ok
-persist[0x0F800000]48 MB ->persist.bin...Ok
-nvram[0x1A000000]64 MB ->nvram.bin...Ok
Done!!!
C:\Users\Downloads\HydraTool_Fullpackage_01-25-2021\\Backup\Auto\__0690--__100221200641
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 6AEE33DDCD00735ED32683A2DDB43541
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 90014A484247346132A5295070F5A4C3 - HBG4a2

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info

-------------------------------------
Operation : Fix Dead From TP-1
Processing...
-preloader[0x00000000]512 KB ->preloader...Ok... Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:44

BR
Dipendra Pathak

  Reply With Quote
Old 02-11-2021, 14:58   #1200 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,619
Oppo Realme C2 (RMX1945) Flashing successfully done by Hydra Tool

Oppo Realme C2 (RMX1945) Flashing successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
Brand : OPPO Model : Realme C2 (RMX1945) Connection : Flash Mode

=====================================
How To Boot : Power off phone
* BROM Mode : Press VOL + or Press VOL -+
* Preloader Mode : Just Insert cable

Connection
-Please wait...
-Connect Phone...
-Found...[COM54]

TPortConnection.Create...(COM54)..Opening...Ok


Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0766MT6765[6765]
BROM HW_SW_VER : 8A00 CA00 0000 0000
getMTKPayloadExploit : 0766
#Executing Exploit..
#SUCCESS..

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0766MT6765[6765]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
SECURE VERSION : 05
BL VERSION : FE
BR Secured : E0

Preparing Download Agent..
DA : [Not Exist]
Trying Default 6765.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2020-11-03.22:07_536568
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_oppo6762_18540.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : C4A76F31FDECEE2950FB06FB19B3AA46
ERAM Size : 0x000000000003A000 -232 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003AB400000 -14.676 GB
eMMC CID : 90014A484147346132A53D75681A465F - HAG4a2

DA Speed : high-speed
DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_oppo6762_18540.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\__0766--__100221190931\MT6765_Android_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x0BE88000]1024 KB ->frp.bin...Ok
-nvdata[0x0E788000]64 MB ->nvdata.bin...Ok
-persist[0x16000000]48 MB ->persist.bin...Ok
-nvram[0x21E00000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\__0766--__100221190931
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : C4A76F31FDECEE2950FB06FB19B3AA46
ERAM Size : 0x000000000003A000 -232 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003AB400000 -14.676 GB
eMMC CID : 90014A484147346132A53D75681A465F - HAG4a2

Reading GPT-EMMC [0x00008000] 130 Items

Flashing Selected Partitions....
- preloader[preloader_oppo6762_18540.bin] 256 KB Skipped
- recovery[recovery.img] 32 MB Flash -> = Ok
- vbmeta[vbmeta.img] 8 MB Flash -> = Ok
- md1img[md1img.img] 100 MB Flash -> = Ok
- spmfw[spmfw.img] 1024 KB Flash -> = Ok
- scp1[scp.img] 1024 KB Flash -> = Ok
- scp2[scp.img] 1024 KB Flash -> = Ok
- sspm_1[sspm.img] 1024 KB Flash -> = Ok
- sspm_2[sspm.img] 1024 KB Flash -> = Ok
- lk[lk.img] 1024 KB Flash -> = Ok
- lk2[lk.img] 1024 KB Flash -> = Ok
- boot[boot.img] 32 MB Flash -> = Ok
- logo[logo.bin] 16 MB Flash -> = Ok
- dtbo[dtbo.img] 16 MB Flash -> = Ok
- tee1[tee.img] 5 MB Flash -> = Ok
- tee2[tee.img] 11 MB Flash -> = Ok
- odm[odm.img] 32 MB Flash -> = Ok
- vendor[vendor.img] 816 MB Flash -> = Ok
- system[system.img] 3.602 GB Flash -> = Ok
- cache[cache.img] 328 MB Flash -> = Ok
- userdata[userdata.img] 6.188 GB Flash -> = Ok

TPortConnection.Destroy.....Closing...Ok..
=====================================

Elapsed Time : 00:05:39
BR
Dipendra Pathak

  Reply With Quote
Reply

Bookmarks

Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


 



All times are GMT +1. The time now is 09:01.



Powered by Searchlight © 2024 Axivo Inc.
vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2024 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2023 -
Page generated in 0.39244 seconds with 9 queries

SEO by vBSEO