GSM Shop GSM Shop
GSM-Forum  

Welcome to the GSM-Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features.
Only registered members may post questions, contact other members or search our database of over 8 million posts.

Registration is fast, simple and absolutely free so please - Click to REGISTER!

If you have any problems with the registration process or your account login, please contact contact us .

Go Back   GSM-Forum > Product Support Sections > Special Solutions / Services / WebShop > GSMFABRICA Products > HYDRA TOOL

Reply
 
LinkBack Thread Tools Display Modes
Old 02-16-2021, 05:17   #1261 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,599
Xiaomi go (tiare) removed FRP using Loader Redmi_8917.mbn by Hydra Tool


Xiaomi go (tiare) removed FRP using Loader Redmi_8917.mbn by Hydra Tool

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : XIAOMI Model : Redmi Go (tiare) Storage : Auto
Loader: Redmi_8917.mbn
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM3)
SymbolicName :\??\USB#VID_05C6&PID_9008#6&165637c&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :03/19/2014,2.1.1.2

Getting device info......
Serial No.: 0x016A3641
MSM ID : 0x000560E1, MSM8917-Qualcomm Snapdragon 425
PBL Ver : 00000000
PK HASH : 57158EAF1814D78FD2B3105ECE4DB18A
817A08AC664A5782A925F3FF8403D39A

Firehose Loader[Redmi_8917.mbn]
SaharaBoot... Ok
Sending ...................Ok
Connecting to Firehose...
Ping... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8917
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 1764679411
Firmware Version : 6
Product Name : FE62MB
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 30535680[14,561 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok

Phone Information.....
Brand : Xiaomi
Vendor : Xiaomi
Model : Redmi Go
ID : OPM1.171019.026
SDK : 27
Release : 8.1.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-US
Description : tiare-user 8.1.0 OPM1.171019.026 V10.2.13.0.OCLMIXM release-keys
Device : tiare
Mod_device : tiare_global
Display ID : OPM1.171019.026.V10.2.13.0.OCLMIXM
Security Patch : 2019-07-01
Emmc_size : 16GB
Fingerprint : Xiaomi/tiare/tiare:8.1.0/OPM1.171019.026/V10.2.13.0.OCLMIXM:user/release-keys

Reading GPT[3]
Drive [0] 48 Items
Drive [1] 0 Items
Drive [2] 0 Items

Removing FRPta...
Method :
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOkOk

Rebooting Phone.... Ok
If not rebooted, Please Power on Manually

Elapsed Time : 00:00:12
BR
Dipendra Pathak

  Reply With Quote
Old 02-16-2021, 05:24   #1262 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,599
Xiaomi Redmi 3 Safe Format successfully done by Hydra Tool

Xiaomi Redmi 3 Safe Format successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : AUTO Model : AUTO Storage : Auto
Loader: Auto
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM24)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&124d2cb1&0&1#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :03/25/2016,2.1.2.2

Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok
Configuration.......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8936
Version : 1


Protocol : Universal
Running : Ok
Reading GPT[3]
Drive [0] 32 Items
Drive [1] 0 Items
Drive [2] 0 Items


Phone Information.....
Brand : Xiaomi
Vendor : Xiaomi
Model : Redmi 3
ID : LMY47V
SDK : 22
Release : 5.1.1
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Description : ido-user 5.1.1 LMY47V V9.6.2.0.LAIMIFD release-keys
Miui Ver : V9
Device : ido
Mod_device : ido_xhdpi_global
Board : msm8916
Display ID : LMY47V
Security Patch : 2017-01-01
Platform : msm8916
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : Xiaomi/ido/ido:5.1.1/LMY47V/V9.6.2.0.LAIMIFD:user/release-keys

Processing Auto....
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOk
- Formatting Userdata
Executing ...
- Formatting Userdata [Safe method] OkOk
Action Result : Ok

Rebooting Phone.... Ok

Elapsed Time : 00:00:20
BR
Dipendra Pathak

  Reply With Quote
Old 02-16-2021, 06:53   #1263 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,599
Polaroid PSPTD21NA FRP successfully removed by Hydra Tool

Polaroid PSPTD21NA FRP successfully removed by Hydra Tool

Screen Short:



Logs:

Quote:
Brand : POLAROID Model : PSPTD21NA (Turbo D2 Plus) Connection : Flash Mode

=====================================
Connection
-Please wait...
-Connect Phone...
-Found...
-PreLoader...[COM9]

TPortConnection.Create...(COM9)..Opening...Ok

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 6580MT6580[6580]
BROM HW_SW_VER : 8A00 CA00 0000 0000

Handshaking...

Identifying Hardware ID.....
BROM CPUID : 6580MT6580[6580]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 40001002
FUSEID : 40001002
SECURE VERSION : FF
BL VERSION : 01
BR Secured : 00

Preparing Download Agent..
DA : [Not Exist]
Trying Default 6580.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2018-09-18.13:22_452898
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : Old - eMMC
0000000000000000000000000000
PRMMCCID : 13014E51324A3935511108AA52DDC40D
Init Configuration
Running DA 4.2 on BBID : 0x9C Ok

Initializing Loader [2]
Sending Loader [2] Accepted
Reading Flashchip data....
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000001D2000000 -7.281 GB
ERAM Size : 0x0000000040000000 -1024 MB
IRAM Size : 0x0000000000020000 -128 KB
UNICAL RID : B3274D5CFB460EF6EDEEC47CB10BB1B1
eMMC CID : 514E011335394A32AA0811510DC4DD52
Change to HIGH SPEED...
5A
Connection
-Please wait...
-Found...[COM10]


Reading Partition Table
SIZE[0x000008F0] 26 Items > Done

Reading System Info
Brand : Polaroid
Vendor : Polaroid
Model : PSPTD21NA
ID : O11019
SDK : 27
Release : 8.1.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : es-US
Description : full_k80_bsp-user 8.1.0 O11019 06082018.0608201808.01 release-keys
Device : PSPTD21NA
Board : PSPTD21NA
Display ID : PSPTD21NA_MX_V1.0
Security Patch : 2018-07-05
Fingerprint : Polaroid/PSPTD21NA/PSPTD21NA:8.1.0/O11019/06082018.0608201808.01:user/release-keys
StorageType : mtp
Userdata State : Encrypted

Autobackup Partitions
-preloader[0x00000000] 512 KB -> preloader.bin...Ok
-> Renaming Preloader.... preloader_k80_bsp.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\Polaroid_PSPTD21NA_6580--8.1.0_PSPTD21NA_MX_V1.0_150221180444\MT6580_Androi d_scatter.txt
-nvram[0x00380000] 5 MB -> nvram.bin...Ok
-frp[0x17FA0000] 1024 KB -> frp.bin...Ok
-nvdata[0x18AA0000] 32 MB -> nvdata.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\Polaroid_PSPTD21NA_6580--8.1.0_PSPTD21NA_MX_V1.0_150221180444
MTK Phone Loader is NOW RUNNING.


Reading System Info
Brand : Polaroid
Vendor : Polaroid
Model : PSPTD21NA
ID : O11019
SDK : 27
Release : 8.1.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : es-US
Description : full_k80_bsp-user 8.1.0 O11019 06082018.0608201808.01 release-keys
Device : PSPTD21NA
Board : PSPTD21NA
Display ID : PSPTD21NA_MX_V1.0
Security Patch : 2018-07-05
Fingerprint : Polaroid/PSPTD21NA/PSPTD21NA:8.1.0/O11019/06082018.0608201808.01:user/release-keys
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition... [Ok] Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:01:06
BR
Dipendra Pathak

  Reply With Quote
Old 02-16-2021, 06:58   #1264 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,599
Quatro Teksun 10 FRP successfully Removed by Hydra Tool

Quatro Teksun 10 FRP successfully Removed by Hydra Tool

Screen Short:



Logs:

[LEFT]
Quote:
Brand : AUTO Model : AUTO Connection : Flash Mode

=====================================
Connection
-Please wait...
-Connect Phone...
-Found...
-PreLoader...[COM4]

TPortConnection.Create...(COM4)..Opening...Ok

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0699MT6739[6739]
BROM HW_SW_VER : 8A00 CA00 0000 0000

Handshaking...

Identifying Hardware ID.....
BROM CPUID : 0699MT6739[6739]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
SECURE VERSION : FF
BL VERSION : 03
BR Secured : 00

Preparing Download Agent..
DA : 6739.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2020-11-03.22:07_536568
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : preloader

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 2DD3ED0337AE4797EACFB5CE7572CB20
ERAM Size : 0x0000000000020000 -128 KB
IRAM Size : 0x0000000040000000 -1024 MB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x000000039D000000 -14,453 GB
eMMC CID : 8801034E436172642016E10DD12225AD - NCard

DA Speed : high-speed
DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info
Brand : Quatro
Vendor : teksun
Model : Quatro 10
ID : O11019
SDK : 27
Release : 8.1.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : tr-TR
Description : full_t939ha_v1_r_djy_d28a_quatro_go-user 8.1.0 O11019 1531814315 release-keys
Device : Quatro_10
Display ID : T939HA_V1_R_DJY_D28A_Quatro_GO_V010_20180717
Security Patch : 2018-06-05
Fingerprint : Quatro/Quatro_10/Quatro_10:8.1.0/O11019/1531814315:user/release-keys
StorageType : mtp
Userdata State : Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_t939ha_v1_r_djy_d28a_quatro_go.bin
Creating Scatter file... C:\HydraTool_Fullpackage_01-28-2021\\Backup\Auto\Quatro_Quatro 10_0699--8.1.0_T939HA_V1_R_DJY_D28A_Quatro_GO_V010_20180717 _150221162508\MT6739_Android_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x02D88000]1024 KB ->frp.bin...Ok
-nvdata[0x03688000]32 MB ->nvdata.bin...Ok
-nvram[0x10700000]5 MB ->nvram.bin...Ok
Done!!!
C:\HydraTool_Fullpackage_01-28-2021\\Backup\Auto\Quatro_Quatro 10_0699--8.1.0_T939HA_V1_R_DJY_D28A_Quatro_GO_V010_20180717 _150221162508
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 2DD3ED0337AE4797EACFB5CE7572CB20
ERAM Size : 0x0000000000020000 -128 KB
IRAM Size : 0x0000000040000000 -1024 MB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x000000039D000000 -14,453 GB
eMMC CID : 8801034E436172642016E10DD12225AD - NCard

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Brand : Quatro
Vendor : teksun
Model : Quatro 10
ID : O11019
SDK : 27
Release : 8.1.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : tr-TR
Description : full_t939ha_v1_r_djy_d28a_quatro_go-user 8.1.0 O11019 1531814315 release-keys
Device : Quatro_10
Display ID : T939HA_V1_R_DJY_D28A_Quatro_GO_V010_20180717
Security Patch : 2018-06-05
Fingerprint : Quatro/Quatro_10/Quatro_10:8.1.0/O11019/1531814315:user/release-keys
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition... Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:33
BR
Dipendra Pathak

[/LEFT
  Reply With Quote
Old 02-16-2021, 07:09   #1265 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,599
Oppo F3 (1609) FRP Successfully Removed selecting AUTO Brand and Module by Hydra Tool

Oppo F3 (1609) FRP Successfully Removed selecting AUTO Brand and Module by Hydra Tool

Screen Short:



Logs:

Quote:
Brand : AUTO Model : AUTO Connection : Flash Mode

=====================================
Connection
-Please wait...
-Connect Phone...
-Found...[COM8]

TPortConnection.Create...(COM8)..Opening...Ok

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0326MT6750T[6755]
BROM HW_SW_VER : 8A00 CB00 0001 0000

Handshaking...

Identifying Hardware ID.....
BROM CPUID : 0326MT6750T[6755]
BROM HW_SW_VER : 8A00 CB00 0001 0000
FUSEID : 00001441
SECURE VERSION : 05
BL VERSION : FE
BR Secured : 05[SBC DAA]

Security Authorization....
Sending[Oppo_F3.auth] Accepted

Preparing Download Agent..
DA : 6755_SWSEC_D36514C0DE.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.00.00
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_oppo6750_16391.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 03610E2007E30909CC80EFF8437B87F4
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 150100524836344D42059633C8923455 - RH64MB

DA Speed : full-speed
DA Speed : full-speed
Change to HIGH SPEED...
Connection
-Please wait...
-Found...[COM12]


Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info
Brand : OPPO
Vendor : OPPO
Model : CPH1609
ID : MRA58K
SDK : 23
Release : 6.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6750_16391-user 6.0 MRA58K 1577469416 release-keys
Device : CPH1609
Board : full_oppo6750_16391
Display ID : CPH1609EX_11_A.32_191228
Security Patch : 2018-06-05
Platform : mt6750
FRPPST : /dev/block/platform/mtk-msdc.0/11230000.msdc0/by-name/frp
StorageType : mtp,mass_storage
Userdata State : Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_oppo6750_16391.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\OPPO_CPH1609_0326-mt6750-6.0_CPH1609EX_11_A.32_191228_160221095206\MT6750T_ Android_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x06F88000]1024 KB ->frp.bin...Ok
-persist[0x07088000]48 MB ->persist.bin...Ok
-nvdata[0x0A088000]32 MB ->nvdata.bin...Ok
-nvram[0x12F00000]5 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\OPPO_CPH1609_0326-mt6750-6.0_CPH1609EX_11_A.32_191228_160221095206
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 03610E2007E30909CC80EFF8437B87F4
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 150100524836344D42059633C8923455 - RH64MB

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Brand : OPPO
Vendor : OPPO
Model : CPH1609
ID : MRA58K
SDK : 23
Release : 6.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6750_16391-user 6.0 MRA58K 1577469416 release-keys
Device : CPH1609
Board : full_oppo6750_16391
Display ID : CPH1609EX_11_A.32_191228
Security Patch : 2018-06-05
Platform : mt6750
FRPPST : /dev/block/platform/mtk-msdc.0/11230000.msdc0/by-name/frp
StorageType : mtp,mass_storage
Userdata State : Encrypted

-------------------------------------
Operation : Auto
Processing...
Safeformat Universal... Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:31
BR
Dipendra Pathak

  Reply With Quote
Old 02-18-2021, 19:21   #1266 (permalink)
Freak Poster
 
Join Date: Mar 2010
Posts: 442
Member: 1263652
Status: Offline
Thanks Meter: 28
huawei P smath FIG-LX1 new security FRP remove by Hydra Dongle

WITH TestPoint

  Reply With Quote
The Following User Says Thank You to moulaha For This Useful Post:
Old 02-19-2021, 11:34   #1267 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,599
Nokia Ta 1011 (Nokia -2) Flashing successfully by Hydra Tool

Nokia Ta 1011 (Nokia -2) Flashing successfully by Hydra Tool

Screen Short:



Logs:

Quote:
Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM11)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&498299f&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :07/08/2015,2.1.2.0

Getting device info.....
Serial No.: 0x11CD422E
MSM ID : 0x009600E1, MSM8909-Qualcomm Snapdragon 210
PBL Ver : 00000000
PK HASH : F5F4192A33B2830974B400119BAB728C
C9FE911011F928625C2AED0DA441AC97

Firehose Loader[NK_0_1.mbn]
SaharaBoot... Ok
Sending ..............Ok
Connecting to Firehose...
Ping... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8909
Version : 1


Protocol : Universal
Running : Ok

Phone Information.....
Brand : Unknown
Vendor : FIH
Model : Unknown
ID : NMF26F
SDK : 25
Release : 7.1.1
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Description : Unknown-user 7.1.1 NMF26F 00WW_0_55F release-keys
Device : Unknown
Board : MSM8909
Display ID : 00WW_0_55F
Security Patch : 2017-12-01
Emmc_size : 8GB
Platform : msm8909
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : Unknown/Unknown/Unknown:7.1.1/NMF26F/00WW_0_55F:user/release-keys

Reading GPT[3]
Drive [0] 128 Items
Drive [1] 0 Items
Drive [2] 0 Items


Backup Security partitions...
Reading Security Items....
> modemst1
> modemst2
> fsg
C:\Users\DipendraPathak\HydraTool_Fullpackage_1-30-2021\Backup\Security_Backup\Unknown_MSM8909_7.1.1_ Security_021821095338.sec
Backup Security Success....

----------------------------
Flashing Selected Partitions....
- sbl1(0)[sbl1.mbn] Ok
- sbl1bak(0)[sbl1bak.mbn] Ok
- aboot(0)[aboot.mbn] Ok
- abootbak(0)[abootbak.mbn] Ok
- rpm(0)[rpm.mbn] Ok
- rpmbak(0)[rpmbak.mbn] Ok
- tz(0)[tz.mbn] Ok
- tzbak(0)[tzbak.mbn] Ok
- DDR(0)[DDR.bin] Ok
- pad(0)[pad.bin] Ok
- ssd(0)[ssd.bin] Ok
- sutinfo(0)[sutinfo.bin] Ok
- systeminfo(0)[systeminfo.bin] Ok
- splash(0)[splash.bin] Ok
- reserved(0)[reserved.bin] Ok
- cust_nv(0)[cust_nv.bin] Ok
- ftmlog(0)[ftmlog.bin] Ok
- box(0)[box.bin] Ok
- ftm(0)[ftm.bin] Ok
- hidden(0)[hidden.bin] Ok
- cda(0)[cda.bin] Ok
- logdump(0)[logdump.bin] Ok
- elabel(0)[elabel.bin] Ok
- reserved_bak(0)[reserved_bak.bin] Ok
- recovery(0)[recovery.img] Ok
- sec(0)[sec.bin] Skipped
- boot(0)[boot.img] Ok
- modem(0)[modem.bin] Ok
- system(0)[system.img] Ok
- cache(0)[cache_sparsed.img] Ok
- persist(0)[persist.img] Skipped
- devinfo(0)[devinfo.bin] Ok
- keystore(0)[keystore.bin] Ok
- config(0)[config.bin] Skipped
- cmnlib(0)[cmnlib.mbn] Ok
- cmnlibbak(0)[cmnlibbak.mbn] Ok
- keymaster(0)[keymaster.mbn] Ok
- keymasterbak(0)[keymasterbak.mbn] Ok
- userdata(0)[userdata_sparsed.img] Ok
- PrimaryGPT(0)[gpt_main0.bin] Ok
- BackupGPT(0)[gpt_backup0.bin] Ok

Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-33.] OK
0 [CRC32(2,16384)] OK
0 [CRC32(NUM_DISK_SECTORS-33.,16384)] OK
0 [0] OK
0 [CRC32(1,92)] OK
0 [0] OK
0 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 0
Set bootable storage drive 0 Ok

Rebooting Phone.... Ok

Elapsed Time : 00:05:26
BR
Dipendra Pathak

  Reply With Quote
Old 02-19-2021, 11:41   #1268 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,599
Xiaomi Redmi Note 8 Pro (begonia) FRP successfully removed by Hydra Tool

Xiaomi Redmi Note 8 Pro (begonia) FRP successfully removed by Hydra Tool

Screen Short:



Logs:

Quote:
Brand : XIAOMI Model : Redmi Note 8 Pro (begonia) Connection : Flash Mode

=====================================
Connection
-Please wait...
-Connect Phone...
-Found...[COM8]

TPortConnection.Create...(COM8)..Opening...Ok

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0813MT6785[6785]
BROM HW_SW_VER : 8A00 CA00 0000 0000
getMTKPayloadExploit : 0813
#Executing Exploit..
#SUCCESS..

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0813MT6785[6785]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
SECURE VERSION : 05
BL VERSION : FE
BR Secured : E0

Preparing Download Agent..
DA : 6785.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2019/12/14.17:56_491164
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_begonia.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 884D2EBD0840C7D806CC7E86A11484B3
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x0000000180000000 -6 GB
UFS LU0 Size: 0x0000000000400000 -4 MB
UFS LU1 Size: 0x0000000000400000 -4 MB
UFS LU2 Size: 0x0000001DCB000000 -119.172 GB
UFS CID : I?KM2V8001CM-B707
UFS UNIQID : 00330063003900380034006300300063

DA Speed : high-speed
DA Speed : high-speed

Reading GPT-UFS [0x00008000] 130 Items

Reading System Info
Vendor : Xiaomi
ID : QP1A.190711.020
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : begoniain-user 10 QP1A.190711.020 V12.0.3.0.QGGINXM release-keys
Miui Ver : V12
Mod_device : begoniain_in_global
Display ID : QP1A.190711.020
Security Patch : 2020-11-01
StorageType : mtp
Userdata State : Not Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader....
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x05888000]1024 KB ->frp.bin...Ok
-nvdata[0x08188000]64 MB ->nvdata.bin...Ok
-persist[0x0E188000]70.469 MB ->persist.bin...Ok
-nvram[0x17580000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\__0813--10_QP1A.190711.020_180221174433
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 884D2EBD0840C7D806CC7E86A11484B3
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x0000000180000000 -6 GB
UFS LU0 Size: 0x0000000000400000 -4 MB
UFS LU1 Size: 0x0000000000400000 -4 MB
UFS LU2 Size: 0x0000001DCB000000 -119.172 GB
UFS CID : I?KM2V8001CM-B707
UFS UNIQID : 00330063003900380034006300300063

Reading GPT-UFS [0x00008000] 130 Items


Reading System Info
Vendor : Xiaomi
ID : QP1A.190711.020
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : begoniain-user 10 QP1A.190711.020 V12.0.3.0.QGGINXM release-keys
Miui Ver : V12
Mod_device : begoniain_in_global
Display ID : QP1A.190711.020
Security Patch : 2020-11-01
StorageType : mtp
Userdata State : Not Encrypted

-------------------------------------
Operation : Auto
Processing...
Safeformat Universal... Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:40
BR
Dipendra Pathak

  Reply With Quote
Old 02-19-2021, 11:47   #1269 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,599
Xiaomi Redmi Note 8 Pro (begonia) restoring NVRAM successfully done by Hydra Tool

Xiaomi Redmi Note 8 Pro (begonia) restoring NVRAM successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
Brand : XIAOMI Model : Redmi Note 8 Pro (begonia) Connection : Flash Mode

=====================================
Connection
-Please wait...
-Connect Phone...
-Found...
-PreLoader...[COM21]

TPortConnection.Create...(COM21)..Opening...Ok

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0813MT6785[6785]
BROM HW_SW_VER : 8A00 CA00 0000 0000

Handshaking...

Identifying Hardware ID.....
BROM CPUID : 0813MT6785[6785]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
SECURE VERSION : FF
BL VERSION : 03
BR Secured : 07

Preparing Download Agent..
DA : Xiaomi_RedmiNote8Pro_6785.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2019/12/14.17:56_491164
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : preloader

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC
Sending Certifificate

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 3EB48342C2CE6986174CAE47DB5427A0
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x0000000180000000 -6 GB
UFS LU0 Size: 0x0000000000400000 -4 MB
UFS LU1 Size: 0x0000000000400000 -4 MB
UFS LU2 Size: 0x0000001DCB000000 -119,172 GB
UFS CID : ,OMT128GASAO4U21
UFS UNIQID : 11f594e1b2eac9052000000000000000

DA Speed : high-speed
DA Speed : high-speed

Reading GPT-UFS [0x00008000] 130 Items

Reading System Info
Brand : Redmi
Vendor : Xiaomi
Model : begonia
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : zh-CN
Description : begonia-userdebug 9 PPR1.180610.011 FACTORY-BEGONIA-1101 test-keys
Device : begonia
Display ID : begonia-userdebug 9 PPR1.180610.011 FACTORY-BEGONIA-1101 test-keys
Security Patch : 2019-06-05
Fingerprint : Redmi/begonia/begonia:9/PPR1.180610.011/FACTORY-BEGONIA-1101:userdebug/test-keys
StorageType : mtp
Userdata State : Not Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader....
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x05888000]1024 KB ->frp.bin...Ok
-nvdata[0x08188000]64 MB ->nvdata.bin...Ok
-persist[0x0E188000]70,469 MB ->persist.bin...Ok
-nvram[0x17580000]64 MB ->nvram.bin...Ok
Done!!!
D:\Hydra Tool\\Backup\Auto\Redmi_begonia_0813--9_begonia-userdebug 9 PPR1.180610.011 FACTORY-BEGONIA-1101 test-keys_180221174801
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 3EB48342C2CE6986174CAE47DB5427A0
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x0000000180000000 -6 GB
UFS LU0 Size: 0x0000000000400000 -4 MB
UFS LU1 Size: 0x0000000000400000 -4 MB
UFS LU2 Size: 0x0000001DCB000000 -119,172 GB
UFS CID : ,OMT128GASAO4U21
UFS UNIQID : 11f594e1b2eac9052000000000000000

Reading GPT-UFS [0x00008000] 130 Items


Reading System Info
Brand : Redmi
Vendor : Xiaomi
Model : begonia
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : zh-CN
Description : begonia-userdebug 9 PPR1.180610.011 FACTORY-BEGONIA-1101 test-keys
Device : begonia
Display ID : begonia-userdebug 9 PPR1.180610.011 FACTORY-BEGONIA-1101 test-keys
Security Patch : 2019-06-05
Fingerprint : Redmi/begonia/begonia:9/PPR1.180610.011/FACTORY-BEGONIA-1101:userdebug/test-keys
StorageType : mtp
Userdata State : Not Encrypted

-------------------------------------
Operation : Restore NVMRAM and NVDATA
Processing...
Restoring NVM file [NVM-Flash__122320155954.zip] Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:01:54
BR
Dipendra Pathak

  Reply With Quote
Old 02-19-2021, 11:53   #1270 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,599
Cloudfone Thrill Boost Zero wipe FRP successfully removed by Hydra Tool

Cloudfone Thrill Boost Zero wipe FRP successfully removed by Hydra Tool

Screen Short:



Logs:

Quote:
Brand : CLOUDFONE Model : Thrill Boost Connection : Flash Mode

=====================================
Connection
-Please wait...
-Found...[COM19]

TPortConnection.Create...(COM19)..Opening...Ok


Reading System Info
Brand : CloudFone
Vendor : CloudFone
Model : Thrill Boost
ID : MRA58K
SDK : 23
Release : 6.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Description : full_v2800-user 6.0 MRA58K 1471074577 release-keys
Device : Thrill_Boost
Board : Thrill_Boost
Display ID : Thrill_Boost_Fs20160812_v05
Security Patch : 2016-06-01
Platform : mt6580
FRPPST : /dev/block/platform/mtk-msdc.0/11120000.msdc0/by-name/frp
Fingerprint : alps/Thrill_Boost/Thrill_Boost:6.0/MRA58K/1471074577:user/release-keys
StorageType : mtp,mass_storage
Userdata State : Not Encrypted

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition... [Ok]
Safeformat Universal...(tmp.bin)240 Bytes Ok Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:04
BR
Dipendra Pathak

  Reply With Quote
Old 02-19-2021, 12:07   #1271 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,599
MGT Smart Zero wipe FRP successfully removed by Hydra Tool

MGT Smart Zero wipe FRP successfully removed by Hydra Tool

Screen Short:



Logs:

Quote:
Brand : AUTO Model : AUTO Connection : Flash Mode

=====================================
Connection
-Please wait...
-Connect Phone...
-Found...
-PreLoader...[COM8]

TPortConnection.Create...(COM8)..Opening...Ok

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 6580MT6580[6580]
BROM HW_SW_VER : 8A00 CA00 0000 0000

Handshaking...

Identifying Hardware ID.....
BROM CPUID : 6580MT6580[6580]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
FUSEID : 00000000
SECURE VERSION : 00
BL VERSION : 00
BR Secured : 00
NORMAL BOOT

Preparing Download Agent..
DA : 6580.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2020-11-03.22:07_536568
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : Old - eMMC
0000000000000000000000000000
PRMMCCID : 1501004B3758564D4201AE61D08012BF
Init Configuration
Running DA 4.2 on BBID : 0x9C Ok

Initializing Loader [2]
Sending Loader [2] Accepted
Reading Flashchip data....
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000080000 -512 KB
eMMC USER : 0x00000001D2000000 -7.281 GB
ERAM Size : 0x0000000040000000 -1024 MB
IRAM Size : 0x0000000000020000 -128 KB
UNICAL RID : 039EC4DBB04C89A87613282B633FBF49
eMMC CID : 4B0001154D56583761AE0142BF1280D0
Change to HIGH SPEED...
5A
Connection
-Please wait...
-Found...[COM14]


Reading Partition Table
SIZE[0x00000738] 21 Items > Done

Reading System Info
Brand : MGT
Vendor : MGT
Model : Smart
ID : LMY47I
SDK : 22
Release : 8.1
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Description : full_yuanda6580_we_l-user 5.1 LMY47I 1543316703 release-keys
Device : Smart
Board : MTK
Display ID : MGT_Smart 20181205
Platform : mt6580
FRPPST : /dev/block/platform/mtk-msdc.0/by-name/frp
Fingerprint : alps/full_yuanda6580_we_l/yuanda6580_we_l:5.1/LMY47I/1543316703:user/release-keys
StorageType : mtp,mass_storage
Userdata State : Not Encrypted

Autobackup Partitions
-preloader[0x00000000] 512 KB -> preloader.bin...Ok
-> Renaming Preloader.... preloader_yuanda6580_we_l.bin
Creating Scatter file... C:\Users\DipendarPathak\Downloads\HydraTool_Fullpa ckage_1-30-2021\\Backup\Auto\MGT_Smart_6580-mt6580-8.1_MGT_Smart 20181205_180221200332\MT6580_Android_scatter.txt
-nvram[0x00380000] 5 MB -> nvram.bin...Ok
-frp[0x04FA0000] 1024 KB -> frp.bin...Ok
-nvdata[0x050A0000] 32 MB -> nvdata.bin...Ok
Done!!!
C:\Users\Happy2021\Downloads\HydraTool_Fullpackage _1-30-2021\\Backup\Auto\MGT_Smart_6580-mt6580-8.1_MGT_Smart 20181205_180221200332
MTK Phone Loader is NOW RUNNING.


Reading System Info
Brand : MGT
Vendor : MGT
Model : Smart
ID : LMY47I
SDK : 22
Release : 8.1
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Description : full_yuanda6580_we_l-user 5.1 LMY47I 1543316703 release-keys
Device : Smart
Board : MTK
Display ID : MGT_Smart 20181205
Platform : mt6580
FRPPST : /dev/block/platform/mtk-msdc.0/by-name/frp
Fingerprint : alps/full_yuanda6580_we_l/yuanda6580_we_l:5.1/LMY47I/1543316703:user/release-keys
StorageType : mtp,mass_storage
Userdata State : Not Encrypted

-------------------------------------
Operation : Zerowipe Userdata
Processing...
ZeroWipe Userdata... [Ok] Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:22:51
BR
Dipendra Pathak

  Reply With Quote
Old 02-19-2021, 12:11   #1272 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,599
Huawei DUB-LX2 (Y7 2019) formatting User Data successfully done by Hydra Tool

Huawei DUB-LX2 (Y7 2019) formatting User Data successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : HUAWEI Model : DUB-LX2 (Y7 2019) Storage : Auto
Loader: DUB-LX1_Loader_T-Tool-Team_1.mbn
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM39)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&36215b8b&0&1#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/02/2017,2.1.2.7

Getting device info......
Serial No.: 0xCAB7DACB
MSM ID : 0x0009A0E1, SDM450-Qualcomm Snapdragon 450
PBL Ver : 00000000
PK HASH : 6BC369511DA9CADB3A7AF61574F89DB3
85003D6241BDD1FF573DBA61BF6AE119

Firehose Loader[DUB-LX1_Loader_T-Tool-Team_1.mbn]
SaharaBoot... Ok
Sending .............Ok
Connecting to Firehose...
Ping... Ok
Configuration.......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8953
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 402168588
Firmware Version : 0
Product Name : GD6BMB
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 61071360[29.121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok

Phone Information.....

Reading GPT[3]
Drive [0] 56 Items
Drive [1] 0 Items
Drive [2] 0 Items

Formatting Userdata...
Method :
Safe Format - EMMC
Processing...
- Formatting Userdata [Safe method] OkOk

Elapsed Time : 00:00:10
BR
Dipendra Pathak

  Reply With Quote
Old 02-19-2021, 12:15   #1273 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,599
Casper VIA E1 Zero wipe FRP successfully Done by Hydra Tool

Casper VIA E1 Zero wipe FRP successfully Done by Hydra Tool

Screen Short:



Logs:

Quote:
Brand : AUTO Model : AUTO Connection : Flash Mode

=====================================
Connection
-Please wait...
-Connect Phone...
-Found...[COM14]

TPortConnection.Create...(COM14)..Opening...Ok

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0321MT6737T[6735]
BROM HW_SW_VER : 8A00 CA00 0000 0000

Handshaking...

Identifying Hardware ID.....
BROM CPUID : 0321MT6737T[6735]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
FUSEID : 00000000
SECURE VERSION : 00
BL VERSION : 00
BR Secured : 00
NORMAL BOOT

Preparing Download Agent..
DA : 6735.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2020-11-03.22:07_536568
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : Old - eMMC
00000000000000000000
PRMMCCID : 484A019065324741561007051F4412D1
Init Configuration
Running DA 4.2 on BBID : 0x9B

Scanning Init Database...
preloader_1501_m02.bin
FLASH Chip Initialization
C:\Users\Hydratool\HydraTool_Fullpackage_1-30-2021\BOOT\PREL\preloader_1501_m02.bin
ERROR : EMMI Settings
14Accepted Ok

Initializing Loader [2]
Sending Loader [2] Accepted
Reading Flashchip data....
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003AB800000 -14,68 GB
ERAM Size : 0x0000000080000000 -2 GB
IRAM Size : 0x0000000000020000 -128 KB
UNICAL RID : 5CF08A03214A655660E3544978DB901C
eMMC CID : 484A019065324741561007051F2312D1
Change to HIGH SPEED...
5A
Connection
-Please wait...
-Found...[COM20]


Reading Partition Table
SIZE[0x000007E8] 23 Items > Done

Reading System Info
Brand : Casper
Vendor : Casper
Model : CASPER_VIA_E1
ID : MRA58K
SDK : 23
Release : 6.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : tr-TR
Description : full_p4601-user 6.0 MRA58K 1474599463 release-keys
Device : CASPER_VIA_E1
Board : VIA_E1
Display ID : E1_20160922_c2.03
Security Patch : 2016-06-01
Platform : mt6735
FRPPST : /dev/block/platform/mtk-msdc.0/11230000.msdc0/by-name/frp
Fingerprint : TINNO/full_p4601/p4601:6.0/MRA58K/1474599463:user/release-keys
StorageType : mtp,mass_storage
Userdata State : Not Encrypted

Autobackup Partitions
-preloader[0x00000000] 512 KB -> preloader.bin...Ok
-> Renaming Preloader.... preloader_p4601.bin
Creating Scatter file... C:\Users\Hydratool\\HydraTool_Fullpackage_1-30-2021\\Backup\Auto\Casper_CASPER_VIA_E1_0321-mt6735-6.0_E1_20160922_c2.03_180221182547\MT6737T_Android _scatter.txt
-nvram[0x00380000] 5 MB -> nvram.bin...Ok
-frp[0x06A00000] 1024 KB -> frp.bin...Ok
-nvdata[0x06B00000] 32 MB -> nvdata.bin...Ok
Done!!!
C:\C:\Users\Hydratool\\HydraTool_Fullpackage_1-30-2021\\Backup\Auto\Casper_CASPER_VIA_E1_0321-mt6735-6.0_E1_20160922_c2.03_180221182547
MTK Phone Loader is NOW RUNNING.


Reading System Info
Brand : Casper
Vendor : Casper
Model : CASPER_VIA_E1
ID : MRA58K
SDK : 23
Release : 6.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : tr-TR
Description : full_p4601-user 6.0 MRA58K 1474599463 release-keys
Device : CASPER_VIA_E1
Board : VIA_E1
Display ID : E1_20160922_c2.03
Security Patch : 2016-06-01
Platform : mt6735
FRPPST : /dev/block/platform/mtk-msdc.0/11230000.msdc0/by-name/frp
Fingerprint : TINNO/full_p4601/p4601:6.0/MRA58K/1474599463:user/release-keys
StorageType : mtp,mass_storage
Userdata State : Not Encrypted

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition... [Ok] Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:29
BR
Dipendra Pathak

  Reply With Quote
Old 02-19-2021, 12:19   #1274 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,599
MTK 6768 CPU formatting selected partition successfully done by Hydra Tool

MTK 6768 CPU formatting selected partition successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
Connection
-Please wait...
-Found...[COM23]

TPortConnection.Create...(COM23)..Opening...Ok

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 4FD7ED0631D7338BD801F2B0AF2F597D
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000001D1EC00000 -116,48 GB
eMMC CID : 15010044555442343202C3CCFA6677B9 - DUTB42

Reading GPT-EMMC [0x00008000] 130 Items

Format Selected Partition
Formatting [oeminfo] Ok!

TPortConnection.Destroy.....Closing...Ok..
=====================================

Elapsed Time : 00:00:08
BR
Dipendra Pathak

  Reply With Quote
Old 02-19-2021, 12:22   #1275 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,599
Hoffmann X-Play Reading full Dump-NOR successfully done by Hydra Tool

Hoffmann X-Play Reading full Dump-NOR successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
Port : [Auto] Scanning...COM39
TPortConnection.Create...(COM39)..Opening...Ok
Reading IMEI...
IMEI 1 : ****************
IMEI 2 : ****************

Reading System Info..
Vendor : Hoffmann
Model : X-Play
Android Ver : 6.0
Device : X_play
Board : X_play
Display ID : XPlay_V5_20171013
Security Patch : 2017-01-05
Platform : sc8830
FRPPST : /dev/block/platform/sdio_emmc/by-name/persist
Fingerprint : Hoffmann/X_play/X_play:6.0/MRA58K/W17.41.5-14:user/release-keys
ro_product_hardware : L302_V1.2

Reading image......
Reading FLASH....
C:\Hydra Tool\Backup\SPD_NOR\SC9832A__00000000-_021821001237_full.bin
Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:08
BR
Dipendra Pathak

  Reply With Quote
Reply

Bookmarks

Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


 



All times are GMT +1. The time now is 08:47.



Powered by Searchlight © 2023 Axivo Inc.
vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2023 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2022 -
Page generated in 0.44845 seconds with 8 queries

SEO by vBSEO