GSM Shop GSM Shop
GSM-Forum  

Welcome to the GSM-Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features.
Only registered members may post questions, contact other members or search our database of over 8 million posts.

Registration is fast, simple and absolutely free so please - Click to REGISTER!

If you have any problems with the registration process or your account login, please contact contact us .

Go Back   GSM-Forum > Product Support Sections > Special Solutions / Services / WebShop > GSMFABRICA Products > HYDRA TOOL

Reply
 
LinkBack Thread Tools Display Modes
Old 02-13-2021, 07:42   #1231 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,599
ASUS Z01HD successfully flashed by Hydra Tool


ASUS Z01HD successfully flashed by Hydra Tool

Logs:

Quote:
Hydra Qualcomm Tool Ver 1.0.2 Build 72
Windows 10 (Version 10.0, Build 19041, 64-bit Edition)
AMD FX(tm)-4300Quad-Core Processor
NVIDIA GeForce GT 630
Ram Installed : 8 GB
Windows Access Right Admin
******* Dongle Info *******
Version : Hydra Tool v 1.2
Serial :**************
Initialize : OKAY
Status : Activated
Life : 0 [0-0-0-0-0]

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM22)
SymbolicName :\??\USB#VID_05C6&PID_9008#6&21794986&0&3#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/02/2017,2.1.2.7

Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8953
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 875874309
Firmware Version : 161
Product Name : HCG8a4
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 122142720[58,242 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok

Phone Information.....
Brand : asus
Vendor : asus
Model : ASUS_Z01HD
ID : MMB29M
SDK : 23
Release : 6.0.1
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : Z01H-eng 6.0.1 MMB29M WW_eng_1.2.1.191_20170703 test-keys
Device : ASUS_Z01H_1
Board : msm8953
Display ID : Z01H-eng 6.0.1 MMB29M WW_eng_1.2.1.191_20170703 test-keys
Security Patch : 2016-05-01
Emmc_size : 16GB
Platform : msm8953
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : asus/WW_Z01H/ASUS_Z01H_1:6.0.1/MMB29M/WW_eng_1.2.1.191_20170703:eng/test-keys

Reading GPT[3]
Drive [0] 64 Items
Drive [1] 0 Items
Drive [2] 0 Items


Backup Security partitions...
Reading Security Items....
> modemst1
> modemst2
> fsg
C:\Hydra Tool\Backup\Security_Backup\ASUS_Z01HD_msm8953_6.0 .1_Security_021121152436.sec
Backup Security Success....

----------------------------
Flashing Selected Partitions....
- sbl1(0)[sbl1.mbn] Ok
- sbl1bak(0)[sbl1.mbn] Ok
- rpm(0)[rpm.mbn] Ok
- rpmbak(0)[rpm.mbn] Ok
- tz(0)[tz.mbn] Ok
- tzbak(0)[tz.mbn] Ok
- devcfg(0)[devcfg.mbn] Ok
- devcfgbak(0)[devcfg.mbn] Ok
- dsp(0)[adspso.bin] Ok
- lksecapp(0)[lksecapp.mbn] Ok
- lksecappbak(0)[lksecapp.mbn] Ok
- cmnlib(0)[cmnlib.mbn] Ok
- cmnlibbak(0)[cmnlib.mbn] Ok
- cmnlib64(0)[cmnlib64.mbn] Ok
- cmnlib64bak(0)[cmnlib64.mbn] Ok
- keymaster(0)[keymaster.mbn] Ok
- keymasterbak(0)[keymaster.mbn] Ok
- absolute(0)[absolute.img] Ok
- PrimaryGPT(0)[gpt_main0.bin] Ok

Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-33.] OK
0 [CRC32(2,8192)] OK
0 [CRC32(NUM_DISK_SECTORS-33.,8192)] OK
0 [0] OK
0 [CRC32(1,92)] OK
0 [0] OK
0 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 0
Set bootable storage drive 0 Ok

Rebooting Phone.... Ok

Elapsed Time : 00:00:18
BR
Dipendra Pathak

  Reply With Quote
Old 02-13-2021, 21:09   #1232 (permalink)
No Life Poster
 
blinet's Avatar
 
Join Date: Nov 2002
Location: Slovakia
Age: 38
Posts: 1,007
Member: 17405
Status: Offline
Thanks Meter: 322
CAT S41 IMEI Fixed with meta mode

Quote:
Waiting for device...
Please wait..Searching for META Port..
Rebooting Phone into META Mode...Ok

Waiting for device in META mode...
Connecting to META Device...Ok
Getting Device Information...
Brand : BullittGroupLimited
Product Board : unknown
Model : unknown
Model Code : unknown
Android Version : 7.0
CPU : mt6757
Security Patch : unknown
ARM CPU : arm64-v8a
Read Information Succes...

Loading MDDB From Phone...Ok

IMEI1 : 111111111111119
IMEI1 : 222222222222228

Writing IMEI 1Ok
Writing IMEI 2Ok
Done

Last edited by blinet; 02-13-2021 at 21:14.
  Reply With Quote
Old 02-14-2021, 03:11   #1233 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,599
Xiaomi Redmi 4x (Santoni) Mi Account removed with Patched Method - No need credit

Xiaomi Redmi 4x (Santoni) Mi Account removed with Patched Method - No need credit by Hydra Tool

Screen Short:



Logs:

Quote:
Hydra Qualcomm Tool Ver 1.0.2 Build 72
Windows 10 (Version 10.0, Build 19041, 64-bit Edition)
Intel(R) Core(TM) i5-5200U CPU @ 2.20GHz
Intel(R) HD Graphics 5500
Ram Installed : 3 GB
Windows Access Right Admin
******* Dongle Info *******
Version : Hydra Tool v 1.2
Serial :**************
Initialize : OKAY
Status : Activated
Life : 0 [0-0-0-0-0]

PreOperation Configuration
Brand : XIAOMI Model : Redmi 4X (Santoni) Storage : Auto
Loader: mi_1_9.mbn
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM17)
SymbolicName :\??\USB#VID_05C6&PID_9008#8&5b06240&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :05/29/2019,2.1.3.7

Getting device info......
Serial No.: 0x87EDEA26
MSM ID : 0x0006B0E1, MSM8940-Qualcomm Snapdragon 435
PBL Ver : 00000000
PK HASH : 57158EAF1814D78FD2B3105ECE4DB18A
817A08AC664A5782A925F3FF8403D39A

Firehose Loader[mi_1_9.mbn]
SaharaBoot... Ok
Sending .....................Ok
Connecting to Firehose...
Ping... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 592667855
Firmware Version : 165
Product Name : HBG4a2
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 61071360[29,121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok
Reading GPT[3]
Drive [0] 52 Items
Drive [1] 0 Items
Drive [2] 0 Items


Phone Information.....
Brand : Xiaomi
Vendor : Xiaomi
Model : Redmi 4X
ID : N2G47H
SDK : 25
Release : 7.1.2
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : santoni-user 7.1.2 N2G47H V11.0.2.0.NAMMIXM release-keys
Miui Ver : V11
Device : santoni
Mod_device : santoni_global
Board : QC_Reference_Phone
Display ID : N2G47H
Security Patch : 2018-10-01
Emmc_size : 16GB
Platform : msm8937
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : Xiaomi/santoni/santoni:7.1.2/N2G47H/V11.0.2.0.NAMMIXM:user/release-keys

Processing Remove MiAccount[Patch Method]....
Backing up Partition for safety...Ok

Scanning Patching address...
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]Done!!
Total Items patched : 25
Successfully patched address..
Failed to find persistbakpartition
Action Result : Ok

Rebooting Phone.... Ok

Elapsed Time : 00:00:23
BR
Dipendra Pathak

  Reply With Quote
Old 02-14-2021, 03:14   #1234 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,599
Xiaomi Redmi 5A disabling Find Device Successfully done by Hydra Tool

Xiaomi Redmi 5A disabling Find Device Successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
Hydra Qualcomm Tool Ver 1.0.2 Build 72
Windows 10 (Version 10.0, Build 19041, 64-bit Edition)
Intel(R) Core(TM) i5-2400 CPU @ 3.10GHz
AMD Radeon R7 200 Series
Ram Installed : 8 GB
Windows Access Right Admin
Software Run As Admnistrator
******* Dongle Info *******
Version : Hydra Tool v 1.2
Serial : **************
Initialize : OKAY
Status : Activated
Life : 0 [0-0-0-0-0]

PreOperation Configuration
Brand : AUTO Model : AUTO Storage : Auto
Loader: Auto
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM7)
SymbolicName :\??\USB#VID_05C6&PID_9008#6&df2ee03&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/02/2017,2.1.2.7

Getting device info......
Serial No.: 0x5A6A8AC7
MSM ID : 0x000560E1, MSM8917-Qualcomm Snapdragon 425
PBL Ver : 00000000
PK HASH : 57158EAF1814D78FD2B3105ECE4DB18A
817A08AC664A5782A925F3FF8403D39A

Firehose Loader[Redmi_8917.mbn]
SaharaBoot... Ok
Sending ...................Ok
Connecting to Firehose...
Ping... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8917
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 3751975836
Firmware Version : 3
Product Name : QE63MB
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 30535680[14.561 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok
Reading GPT[3]
Drive [0] 52 Items
Drive [1] 0 Items
Drive [2] 0 Items


Phone Information.....
Brand : Xiaomi
Vendor : Xiaomi
Model : Redmi 5A
ID : N2G47H
SDK : 25
Release : 7.1.2
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : riva-user 7.1.2 N2G47H V9.1.6.0.NCKMIEI release-keys
Miui Ver : V9
Device : riva
Mod_device : riva_global
Board : QC_Reference_Phone
Display ID : N2G47H
Security Patch : 2017-10-01
Emmc_size : 16GB
Platform : msm8937
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : Xiaomi/riva/riva:7.1.2/N2G47H/V9.1.6.0.NCKMIEI:user/release-keys

Processing Find Device Disable.........
InodeNo : 3963.
N2G47H_FindDevice
Action Result : Ok

Elapsed Time : 00:00:08
BR
Dipendra Pathak

  Reply With Quote
Old 02-14-2021, 03:21   #1235 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,599
Xiaomi Redmi Note 3 (Kenzo) bypass Mi Account using adb (not locking again) by Hydra

Xiaomi Redmi Note 3 (Kenzo) bypass Mi Account using adb (not locking again) by Hydra Tool

Screen Short:



Logs:

Quote:
Hydra Qualcomm Tool Ver 1.0.2 Build 72
Windows 10 (Version 10.0, Build 17763, 64-bit Edition)
Intel(R) Core(TM) i3-2100 CPU @ 3.10GHz
Intel(R) HD Graphics
Ram Installed : 4 GB
Windows Access Right Admin
Software Run As Admnistrator
******* Dongle Info *******
Version : Hydra Tool v 1.2
Serial : **************
Initialize : OKAY
Status : Activated
Life : 0 [0-0-0-0-0]


Starting ADB Server....
Searching Device By ADB
Device Found...
Model : Redmi Note 3
Brand : Xiaomi
Android Ver : 5.1.1
CPU abi : arm64-v8a
Software Version :
CSC Version :
Bootloader :
Board : msm8952
Display ID : LMY47V
Security Patch : 2016-08-01
Emmc_size :
Platform : msm8952
Kernel ID : 2016-08-01
Marketname :
OTA Version Name :
SYS USB CONFIG : persist.mtp,adb
FRPPST : /dev/block/bootdevice/by-name/config
FingerPrint : Xiaomi/kenzo/kenzo:5.1.1/LMY47V/V8.0.1.0.LHOMIDG:user/release-keys

Checking Root Status....
Root Status : Not Rooted

ADB MiAccount...

Processing...
Disbaling MI Account
Please wait...
Disabled Mi Account Success
Action Result : Ok

Elapsed Time : 00:00:04
BR
Dipendra Pathak

  Reply With Quote
Old 02-14-2021, 03:25   #1236 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,599
Samsung i9128E FRP successfully removed by Hydra Tool

Samsung i9128E FRP successfully removed by Hydra Tool

Screen Short:



Logs:

Quote:
Hydra Main Tool Ver 1.0.1 Build 11 -
Windows 10 (Version 10.0, Build 19041, 64-bit Edition)
Intel(R) Core(TM) i3-2100 CPU @ 3.10GHz
Intel(R) HD Graphics
Ram Installed : 4 GB
Windows Access Right Admin
******* Dongle Info *******
Version : Hydra Tool v 1.2
Serial : *************
Initialize : OKAY
Status : Activated
Life : 0 [0-0-0-0-0]

Scanning port....
TPortConnection.Create...(COM5)..Opening...Ok
Device Mode : Download Mode
CPU : EXYNOS
Factory Reset Protection
Removing...
Total Binary Size is 0,25MB
Initialize Phone : Ok
Partition Information Table(PIT)
- Backup
Backup PIT (COM_TAR2LSI7870) Ok
- Reading.. Ok
- Mapping..Ok
Remove FRP Successfully!!!

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:09
BR
Dipendra Pathak

  Reply With Quote
Old 02-14-2021, 03:37   #1237 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,599
Wiko Kenny Zero wipe FRP successfully done by Hydra Tool

Wiko Kenny Zero wipe FRP successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
Brand : WIKO Model : V3913 (Kenny) Connection : Flash Mode

=====================================
Connection
-Please wait...
-Connect Phone...
-Found...
-PreLoader...[COM42]

TPortConnection.Create...(COM42)..Opening...Ok

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0335MT6737[6735]
BROM HW_SW_VER : 8A00 CB00 0000 0000

Handshaking...

Identifying Hardware ID.....
BROM CPUID : 0335MT6737[6735]
BROM HW_SW_VER : 8A00 CB00 0000 0000
FUSEID : 00000000
SECURE VERSION : 00
BL VERSION : 00
BR Secured : 00
NORMAL BOOT

Preparing Download Agent..
DA : 6735_SWSEC_Wiko.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.00.00
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : Old - eMMC
00000000000000000000
PRMMCCID : 460001154D32584E83D50642398A29DA
Init Configuration
Running DA 4.2 on BBID : 0x9B Ok

Initializing Loader [2]
Sending Loader [2] Accepted
Reading Flashchip data....
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000080000 -512 KB
eMMC USER : 0x00000001D2000000 -7,281 GB
ERAM Size : 0x0000000040000000 -1024 MB
IRAM Size : 0x0000000000020000 -128 KB
UNICAL RID : 75AB759B8A9C7FEB92E16E25D2996020
eMMC CID : 460001154D32584E83D50642395429DA
Change to HIGH SPEED...
5A
Connection
-Please wait...
-Found...[COM85]


Reading Partition Table
SIZE[0x00000898] 25 Items > Done

Reading System Info
Brand : WIKO
Vendor : WIKO
Model : KENNY
ID : NRD90M
SDK : 24
Release : 7.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Description : full_v3913-user 7.0 NRD90M 1488199004 release-keys
Device : v3913
Display ID : alps-mp-n0.mp1-V1.0.2_tinno6737m.35.n_P182
Security Patch : 2017-07-05
Platform : mt6737m
FRPPST : /dev/block/platform/mtk-msdc.0/11230000.msdc0/by-name/frp
Fingerprint : WIKO/v3913/v3913:7.0/NRD90M/1488199004:user/release-keys
StorageType : mtp
Userdata State : Not Encrypted

Autobackup Partitions
-preloader[0x00000000] 512 KB -> preloader.bin...Ok
-> Renaming Preloader.... preloader_v3913.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\WIKO_KENNY_0335-mt6737m-7.0_alps-mp-n0.mp1-V1.0.2_tinno6737m.35.n_P182_110221112317\MT6737_An droid_scatter.txt
-nvram[0x00380000] 5 MB -> nvram.bin...Ok
-frp[0x07E00000] 1024 KB -> frp.bin...Ok
-nvdata[0x07F00000] 32 MB -> nvdata.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\WIKO_KENNY_0335-mt6737m-7.0_alps-mp-n0.mp1-V1.0.2_tinno6737m.35.n_P182_110221112317
MTK Phone Loader is NOW RUNNING.


Reading System Info
Brand : WIKO
Vendor : WIKO
Model : KENNY
ID : NRD90M
SDK : 24
Release : 7.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Description : full_v3913-user 7.0 NRD90M 1488199004 release-keys
Device : v3913
Display ID : alps-mp-n0.mp1-V1.0.2_tinno6737m.35.n_P182
Security Patch : 2017-07-05
Platform : mt6737m
FRPPST : /dev/block/platform/mtk-msdc.0/11230000.msdc0/by-name/frp
Fingerprint : WIKO/v3913/v3913:7.0/NRD90M/1488199004:user/release-keys
StorageType : mtp
Userdata State : Not Encrypted

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition... [Ok] Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:19
BR
Dipendra Pathak

  Reply With Quote
Old 02-14-2021, 03:42   #1238 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,599
Vivo Y53 safe format successfully done by Hydra Tool

Vivo Y53 safe format successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : VIVO Model : Y53 Storage : Auto
Loader: 8917.mbn
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM17)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&376aba2d&0&9#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/31/2015,2.1.2.0

Getting device info......
Serial No.: 0x8F55E0A6
MSM ID : 0x000560E1, MSM8917-Qualcomm Snapdragon 425
PBL Ver : 00000000
PK HASH : 60BA997FEF6DA9F05885FA11F1DD6D2A
90D052A257A09C2075D7246CC73C0D43

Firehose Loader[8917.mbn]
SaharaBoot... Ok
Sending .................Ok
Connecting to Firehose...
Ping... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8917
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 1334258771
Firmware Version : 165
Product Name : HAG4a2
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 30777344[14.676 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok
Reading GPT[3]
Drive [0] 52 Items
Drive [1] 0 Items
Drive [2] 0 Items


Phone Information.....
Brand : vivo
Vendor : vivo
Model : vivo PD1628F_EX
ID : MMB29M
SDK : 23
Release : 6.0.1
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-US
Description : msm8937_32-user 6.0.1 MMB29M eng.compiler.20190105.211334 release-keys
Device : PD1628F_EX
Board : QC_Reference_Phone
Display ID : MMB29M release-keys
Security Patch : 2018-08-01
Emmc_size : 16GB
Platform : msm8937
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : vivo/PD1628F_EX/PD1628F_EX:6.0.1/MMB29M/compiler01052117:user/release-keys

Processing Safe Format - EMMC....
- Removing FRP [Zero Wipe] Ok
- Formatting Userdata [Safe method] Ok
Action Result : Ok

Elapsed Time : 00:00:08
BR
Dipendra Pathak

  Reply With Quote
Old 02-14-2021, 03:49   #1239 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,599
Asus X00BD safe format user data successfully done by Hydra Tool

Asus X00BD safe format user data successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : AUTO Model : AUTO Storage : Auto
Loader: Auto
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM17)
SymbolicName :\??\USB#VID_05C6&PID_9008#6&1bcad829&0&3#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :12/17/2018,2.1.3.5

Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok
Configuration.......
Identifying Chip..........eMMC
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 49152
MaxPayloadSizeToTargetInBytesSupported : 49152
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8x10
Version : 1


Protocol : Universal
Running : Ok

Phone Information.....
Brand : asus
Vendor : asus
Model : ASUS_X00BD
ID : LMY47V
SDK : 22
Release : 5.1.1
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Description : msm8610-user 5.1.1 LMY47V LMY47V.WW_Phone.12.0.0.0153-20170904_user release-keys
Device : ASUS_X00BD_1
Board : MSM8610
Display ID : LMY47V.WW_Phone.12.0.0.0153-20170904_user
Security Patch : 2017-09-01
Platform : msm8610
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : asus/WW_Phone/ASUS_X00BD_1:5.1.1/LMY47V/12.0.0.0153:user/release-keys

Reading GPT[1]
Drive [0] 48 Items

Formatting Userdata...
Method :
Auto
Processing...
- Formatting Userdata
Executing ...
- Formatting Userdata [Safe method] OkOkOk

Rebooting Phone.... Ok
If not rebooted, Please Power on Manually

Elapsed Time : 00:00:04
BR
Dipendra Pathak

  Reply With Quote
Old 02-14-2021, 03:51   #1240 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,599
Wiko C210AE Flashing Partly firmware successfully done by Hydra Tool

Wiko C210AE Flashing Partly firmware successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
Brand : AUTO Model : AUTO Connection : Flash Mode

=====================================
How To Boot : Power off phone
* BROM Mode : Press VOL + or Press VOL -+
* Preloader Mode : Just Insert cable

Connection
-Please wait...
-Found...[COM448]

TPortConnection.Create...(COM448)..Opening...Ok


Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 0EAD08721E1FC59D0EE0B55EE4F84CDF
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000040000000 -1024 MB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000080000 -512 KB
eMMC USER : 0x00000001D2000000 -7.281 GB
eMMC CID : 150100464E36324D4203DBFCD3F965E3 - FN62MB

Reading GPT-EMMC [0x00008000] 130 Items

Flashing Selected Partitions....
- pgpt[pgpt.bin] 32 KB Flash -> = Ok
- recovery[recovery.bin] 24 MB Flash -> = Ok
- lk[lk.bin] 1024 KB Flash -> = Ok
- lk2[lk2.bin] 1024 KB Flash -> = Ok
- loader_ext1[loader_ext1.bin] 64 KB Flash ->= Ok
- loader_ext2[loader_ext2.bin] 64 KB Flash ->= Ok
- boot[boot.bin] 24 MB Flash -> = Ok
- logo[logo.bin] 8 MB Flash -> = Ok
- odmdtbo[odmdtbo.bin] 16 MB Flash -> = Ok
- tee1[tee1.bin] 5 MB Flash -> = Ok
- tee2[tee2.bin] 5 MB Flash -> = Ok
- cache[cache.bin] 112 MB Flash -> = Ok

TPortConnection.Destroy.....Closing...Ok..
=====================================

Elapsed Time : 00:00:15
BR
Dipendra Pathak

  Reply With Quote
Old 02-14-2021, 03:57   #1241 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,599
Xiaomi Redmi Note 7 Pro (Violet) Erasing security using Flash Mode successfully done

Xiaomi Redmi Note 7 Pro (Violet) Erasing security using Flash Mode successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : XIAOMI Model : Redmi Note 7 Pro (violet) Storage : Auto
Loader: Xiaomi_Redmi Note 7 Pro_Sdm6150_ddr.elf
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM300)
SymbolicName :\??\USB#VID_05C6&PID_9008#6&31fe055a&0&2#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/02/2017,2.1.2.7

Getting device info......
Serial No.: 0x8EB3DD43
MSM ID : 0x000950E1, SM6150-Qualcomm Snapdragon 675
PBL Ver : 00000000
PK HASH : 1BEBE3863A6781DB4B01086063007334
DE9E5CA14971C7C4F4358EC9D79CDA46

Firehose Loader[Xiaomi_Redmi Note 7 Pro_Sdm6150_ddr.elf]
SaharaBoot... Ok
Sending ...................................Ok
Connecting to Firehose...
Ping..................... Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[ciKSj8ydw466nK2Yy5oVxb1JdiO]
Checking Internet connection....
- Hydra Is Online
Connecting to Hydra Xiaomi Server...

Signature @256bytes Authentication.... Accepted........
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Jul 19 2019 - 01:12:10

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 3678854831
Firmware Version : 2
Product Name : 3V6CMB
Physical Partitions : 4
Total Logical Blocks:
Drive [0] 244277248[116.48 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Drive [3] 32768[16 MB]

Protocol : Universal
Running : Ok
Reading GPT[4]
Drive [0] 88 Items
Drive [1] 0 Items
Drive [2] 0 Items
Drive [3]

Processing Erase Security....
Wipe Security ...

Backup Security partitions...
Reading Security Items....
> modemst1
> modemst2
> fsg
C:\Hydra Tool\Backup\Security_Backup\___Security_0211210803 17.sec
Backup Security Success....
Security Wipe Started..
> modemst1 Ok
> modemst2 Ok
> fsg Ok
Security Wipe Success...
Action Result : Ok

Elapsed Time : 00:00:21
BR
Dipendra Pathak

  Reply With Quote
Old 02-14-2021, 04:03   #1242 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,599
Oppo A12 (CPH2083) FRP successfully removed by Hydra Tool

Oppo A12 (CPH2083) FRP successfully removed by Hydra Tool

Screen Short:



Logs:

Quote:
Brand : OPPO Model : A12 cph2083 Connection : Flash Mode

=====================================
Connection
-Please wait...
-Connect Phone...
-Found...[COM3]

TPortConnection.Create...(COM3)..Opening...Ok

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0766MT6765[6765]
BROM HW_SW_VER : 8A00 CA00 0000 0000
getMTKPayloadExploit : 0766
#Executing Exploit..
#SUCCESS..

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0766MT6765[6765]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
SECURE VERSION : 05
BL VERSION : FE
BR Secured : E0

Preparing Download Agent..
DA : 6765.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2020-11-03.22:07_536568
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_oppo6765_19451.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : B6A4DD2D3651C8DF97306817613479DB
ERAM Size : 0x000000000003A000 -232 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000747C00000 -29,121 GB
eMMC CID : 150100444436384D420207D4CCC817F1 - DD68MB

DA Speed : high-speed
DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info
Vendor : OPPO
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6765_19451-user 9 PPR1.180610.011 eng.root.20201009.231717 release-keys
Security Patch : 2020-10-05
StorageType : mtp
Userdata State : Not Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_oppo6765_19451.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\__0766--9__110221102906\MT6765_Android_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x0DE88000]1024 KB ->frp.bin...Ok
-nvdata[0x0FF88000]64 MB ->nvdata.bin...Ok
-persist[0x17800000]48 MB ->persist.bin...Ok
-nvram[0x23600000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\__0766--9__110221102906
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : B6A4DD2D3651C8DF97306817613479DB
ERAM Size : 0x000000000003A000 -232 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000747C00000 -29,121 GB
eMMC CID : 150100444436384D420207D4CCC817F1 - DD68MB

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Vendor : OPPO
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6765_19451-user 9 PPR1.180610.011 eng.root.20201009.231717 release-keys
Security Patch : 2020-10-05
StorageType : mtp
Userdata State : Not Encrypted

-------------------------------------
Operation : Auto
Processing...
Safeformat Universal...[C002004B-]
Formatting Userdata... Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:01:00
BR
Dipendra Pathak

  Reply With Quote
Old 02-15-2021, 03:57   #1243 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,599
Xiaomi Redmi 6A Cactus Successfully Flashed by Hydra Tool

Xiaomi Redmi 6A Cactus Successfully Flashed by Hydra Tool

Screen Short:



Logs:

[LEFT]
Quote:
Brand : XIAOMI Model : Redmi 6A (cactus) Connection : Flash Mode

=====================================
How To Boot : Power off phone
* BROM Mode : Press VOL + or Press VOL -+
* Preloader Mode : Just Insert cable

Connection
-Please wait...
-Connect Phone...
-Found...[COM54]

TPortConnection.Create...(COM54)..Opening...Ok


Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0766MT6765[6765]
BROM HW_SW_VER : 8A00 CA00 0000 0000
getMTKPayloadExploit : 0766
#Executing Exploit..
#SUCCESS..

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0766MT6765[6765]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
SECURE VERSION : 05
BL VERSION : FE
BR Secured : E0

Preparing Download Agent..
DA : 6765_56EC405E9E.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2018/04/19.10:40_426269
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_cactus.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 433962622ED195A35F9FCA540C8862E7
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000020000000 -512 MB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003AB400000 -14.676 GB
eMMC CID : 90014A484147346132A5C311F0528583 - HAG4a2

DA Speed : high-speed
DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi 6
ID : O11019
SDK : 27
Release : 8.1.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-GB
Description : cereus-user 8.1.0 O11019 V9.6.11.0.OCGMIFD release-keys
Miui Ver : V9
Device : cereus
Mod_device : cereus_global
Display ID : O11019
Security Patch : 2018-06-01
Fingerprint : xiaomi/cereus/cereus:8.1.0/O11019/V9.6.11.0.OCGMIFD:user/release-keys
StorageType : mtp
Userdata State : Not Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_cactus.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\xiaomi_Redmi 6_0766--8.1.0_O11019_140221162152\MT6765_Android_scatter.t xt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x05588000]1024 KB ->frp.bin...Ok
-nvdata[0x07688000]64 MB ->nvdata.bin...Ok
-persist[0x0F000000]64 MB ->persist.bin...Ok
-nvram[0x1BE80000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\xiaomi_Redmi 6_0766--8.1.0_O11019_140221162152
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 433962622ED195A35F9FCA540C8862E7
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000020000000 -512 MB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003AB400000 -14.676 GB
eMMC CID : 90014A484147346132A5C311F0528583 - HAG4a2

Reading GPT-EMMC [0x00008000] 130 Items

Flashing Selected Partitions....
- preloader[preloader_cactus.bin] 256 KB Skipped
- recovery[recovery.img] 64 MB Flash -> = Ok
- efuse[efuse.img] 512 KB Flash -> = Ok
- md1img[md1img.img] 100 MB Flash -> = Ok
- spmfw[spmfw.img] 1024 KB Flash -> = Ok
- scp1[scp.img] 1024 KB Flash -> = Ok
- scp2[scp.img] 1024 KB Flash -> = Ok
- sspm_1[sspm.img] 1024 KB Flash -> = Ok
- sspm_2[sspm.img] 1024 KB Flash -> = Ok
- vbmeta[vbmeta.img] 8 MB Flash -> = Ok
- lk[lk.img] 1024 KB Flash -> = Ok
- lk2[lk.img] 1024 KB Flash -> = Ok
- boot[boot.img] 64 MB Flash -> = Ok
- logo[logo.bin] 64 MB Flash -> = Ok
- odmdtbo[odmdtbo.img] 16 MB Flash -> = Ok
- cust[cust.img] 512 MB Flash -> = Ok
- tee1[tee.img] 5 MB Flash -> = Ok
- tee2[tee.img] 5 MB Flash -> = Ok
- vendor[vendor.img] 768 MB Flash -> = Ok
- system[system.img] 2.5 GB Flash -> = Ok
- cache[cache.img] 256 MB Flash -> = Ok
- userdata[userdata.img] 3 GB Flash -> = Ok

TPortConnection.Destroy.....Closing...Ok..
=====================================

Elapsed Time : 00:03:02
BR
Dipendra Pathak
  Reply With Quote
Old 02-15-2021, 04:09   #1244 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,599
Oppo A37F (Neo 9) Formatting user data successfully done with safe method by Hydra

Oppo A37F (Neo 9) Formatting user data successfully done with safe method by Hydra Tool

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : OPPO Model : A37F (Neo 9) Storage : Auto
Loader: 8916.mbn
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM4)
SymbolicName :\??\USB#VID_05C6&PID_9008#6&182a12da&0&5#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/02/2017,2.1.2.7

Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok
Configuration.......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8916
Version : 1


Protocol : Universal
Running : Ok
Reading GPT[3]
Drive [0] 40 Items
Drive [1] 0 Items
Drive [2] 4 Items


Phone Information.....
Brand : OPPO
Vendor : OPPO
Model : A37f
ID : LMY47V
SDK : 22
Release : 5.1.1
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Description : msm8916_64-user 5.1.1 LMY47V eng.root.20190711.032745 release-keys
Board : msm8916
Display ID : A37fEX_11_190711
Security Patch : 2018-03-01
Platform : msm8916
FRPPST : /dev/block/bootdevice/by-name/config

Processing Auto....
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOk
- Formatting Userdata
Executing ...
- Formatting Userdata [Safe method] OkOk
Action Result : Ok

Elapsed Time : 00:00:05
BR
Dipendra Pathak

  Reply With Quote
Old 02-15-2021, 04:15   #1245 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,599
Vivo Y91i (1820) Resulting User data Successfully done by Hydra Tool

Vivo Y91i (1820) Resulting User data Successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
Brand : VIVO Model : Y91i (1820) Connection : Flash Mode

=====================================
Connection
-Please wait...
-Connect Phone...
-Found...
-PreLoader...[COM17]

TPortConnection.Create...(COM17)..Opening...Ok

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0766MT6765[6765]
BROM HW_SW_VER : 8A00 CA00 0000 0000

Handshaking...

Identifying Hardware ID.....
BROM CPUID : 0766MT6765[6765]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
SECURE VERSION : FF
BL VERSION : 03
BR Secured : 05
NORMAL BOOT

Preparing Download Agent..
DA : 6765_SWSEC_9FAA6CBA20.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2018/03/20.21:08_402229+403250
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...[ERROR]- NOT SYNC
=============================================
Reasons why it fails due to the following"
1. Harware problem/issues
2. If you did Testpoint Kindly check the parts you Touch/TP
3. Powershortage, try to connect Battery
4. Check or replace usb cable and plug directly to your pc usb port.
=============================================

Mode : preloader

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 82E4689BDCE5136ACA9B93AC032FF53F
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000020000000 -512 MB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 150100514436334D42017BBC069326DD - QD63MB

DA Speed : high-speed
DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info
Brand : vivo
Vendor : vivo
Model : vivo 1820
ID : O11019
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_k62v1_64_bsp-user 8.1.0 O11019 1608551238 release-keys
Device : PD1818HF_EX
Display ID : O11019 release-keys
Security Patch : 2020-12-01
Platform : =MTK6765
Fingerprint : vivo/1820/1820:8.1.0/O11019/1608551238:user/release-keys
StorageType : mtp
Userdata State : Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_k62v1_64_bsp.bin
Creating Scatter file... C:\Users\WWin 7\Downloads\Compressed\\Backup\Auto\vivo_vivo 1820_0766-=MTK6765-8.1.0_O11019 release-keys_140221182908\MT6765_Android_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x05588000]1024 KB ->frp.bin...Ok
-nvdata[0x07688000]64 MB ->nvdata.bin...Ok
-persist[0x18800000]48 MB ->persist.bin...Ok
-nvram[0x25680000]64 MB ->nvram.bin...Ok
Done!!!
C:\Users\ABC\Downloads\Compressed\\Backup\Auto\viv o_vivo 1820_0766-=MTK6765-8.1.0_O11019 release-keys_140221182908
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 82E4689BDCE5136ACA9B93AC032FF53F
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000020000000 -512 MB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 150100514436334D42017BBC069326DD - QD63MB

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Brand : vivo
Vendor : vivo
Model : vivo 1820
ID : O11019
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_k62v1_64_bsp-user 8.1.0 O11019 1608551238 release-keys
Device : PD1818HF_EX
Display ID : O11019 release-keys
Security Patch : 2020-12-01
Platform : =MTK6765
Fingerprint : vivo/1820/1820:8.1.0/O11019/1608551238:user/release-keys
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Rebuild Userdata
Processing...
Rebuilding Userdata... Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:49
BR
Dipendra Pathak

  Reply With Quote
Reply

Bookmarks

Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


 



All times are GMT +1. The time now is 22:46.



Powered by Searchlight © 2023 Axivo Inc.
vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2023 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2022 -
Page generated in 0.43858 seconds with 8 queries

SEO by vBSEO