GSM Shop GSM Shop
GSM-Forum  

Welcome to the GSM-Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features.
Only registered members may post questions, contact other members or search our database of over 8 million posts.

Registration is fast, simple and absolutely free so please - Click to REGISTER!

If you have any problems with the registration process or your account login, please contact contact us .

Go Back   GSM-Forum > Product Support Sections > Special Solutions / Services / WebShop > GSMFABRICA Products > HYDRA TOOL

Reply
 
LinkBack Thread Tools Display Modes
Old 02-21-2021, 08:44   #1291 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,609
Xiaomi Redmi 6A (Cactus) writing flash file successfully done by Hydra Tool


Xiaomi Redmi 6A (Cactus) writing flash file successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
Brand : XIAOMI Model : Redmi 6A (cactus) Connection : Flash Mode

=====================================
How To Boot : Power off phone
* BROM Mode : Press VOL + or Press VOL -+
* Preloader Mode : Just Insert cable

Connection
-Please wait...
-Found...[COM6]

TPortConnection.Create...(COM6)..Opening...Ok


Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : ACB7F4AFBE77B5EBC16E19BD6DC9B7CE
ERAM Size : 0x000000000003A000 -232 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003A3E00000 -14.561 GB
eMMC CID : 150100514536334D420343ED9BF89527 - QE63MB

Reading GPT-EMMC [0x00008000] 130 Items

Flashing Selected Partitions....
- preloader[preloader_cactus.bin] 256 KB Skipped
- recovery[recovery.img] 64 MB Flash -> = Ok
- md1img[md1img.img] 100 MB Flash -> = Ok
- spmfw[spmfw.img] 1024 KB Flash -> = Ok
- scp1[scp.img] 1024 KB Flash -> = Ok
- scp2[scp.img] 1024 KB Flash -> = Ok
- sspm_1[sspm.img] 1024 KB Flash -> = Ok
- sspm_2[sspm.img] 1024 KB Flash -> = Ok
- vbmeta[vbmeta.img] 8 MB Flash -> = Ok
- lk[lk.img] 1024 KB Flash -> = Ok
- lk2[lk.img] 1024 KB Flash -> = Ok
- boot[boot.img] 64 MB Flash -> = Ok
- logo[logo.bin] 64 MB Flash -> = Ok
- odmdtbo[odmdtbo.img] 16 MB Flash -> = Ok
- cust[cust.img] 512 MB Flash -> = Ok
- tee1[tee.img] 5 MB Flash -> = Ok
- tee2[tee.img] 5 MB Flash -> = Ok
- vendor[vendor.img] 768 MB Flash -> = Ok
- system[system.img] 2.5 GB Flash -> = Ok
- cache[cache.img] 256 MB Flash -> = Ok
- userdata[userdata.img] 3 GB Flash -> = Ok

TPortConnection.Destroy.....Closing...Ok..
=====================================

Elapsed Time : 00:01:44
BR
Dipendra Pathak

  Reply With Quote
Old 02-22-2021, 04:02   #1292 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,609
Huawei ATU-L22 (Y6 2018) Formatted user data successfully done by Hydra Tool

Huawei ATU-L22 (Y6 2018) Formatted user data successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : HUAWEI Model : ATU-L22 (Y6 2018) Storage : Auto
Loader: Huawei-ATU-Y6.mbn
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :HS-USB Diagnostics 9008 (COM114)
SymbolicName :\??\USB#VID_05C6&PID_9008#6&1f283aba&0&3#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/20/2017,2.1.2.2

Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8917
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 1904266362
Firmware Version : 4
Product Name : QE63MB
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 30535680[14.561 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok
Reading GPT[3]
Drive [0] 56 Items
Drive [1] 0 Items
Drive [2] 0 Items

Processing Format Userdata....
- Formatting Userdata [Zero Wipe] Ok
Action Result : Ok

Rebooting Phone.... Ok

Elapsed Time : 00:00:05
BR
Dipendra Pathak

  Reply With Quote
Old 02-22-2021, 04:25   #1293 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,609
Huawei MYA-L22 Zero Wipe FRP successfully done by Hydra Tool

Huawei MYA-L22 Zero Wipe FRP successfully done by Hydra Tool

Screen Short:

[IMG][/IMG]

Logs:

Quote:
Brand : AUTO Model : AUTO Connection : Flash Mode

=====================================
Connection
-Please wait...
-Connect Phone...
-Found...
-PreLoader...[COM4]

TPortConnection.Create...(COM4)..Opening...Ok

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0321MT6737T[6735]
BROM HW_SW_VER : 8A00 CA00 0000 0000

Handshaking...

Identifying Hardware ID.....
BROM CPUID : 0321MT6737T[6735]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
FUSEID : 00000000
SECURE VERSION : FF
BL VERSION : 01
BR Secured : 01

Preparing Download Agent..
DA : MYA_L22_DA_SWSEC.bin
Agent: MTK_DOWNLOAD_AGENT
Ver : MTK_AllInOne_DA_v3.3001.00.00
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : Old - eMMC
00000000000000000000
PRMMCCID : 484A019061344741AA57D432897AEAA1
Init Configuration
Running DA 4.2 on BBID : 0x93 Ok

Initializing Loader [2]
Sending Loader [2] Accepted
Reading Flashchip data....
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003AB400000 -14.676 GB
ERAM Size : 0x0000000080000000 -2 GB
IRAM Size : 0x0000000000020000 -128 KB
UNICAL RID : B0928680D53CABFB21FEF3ACC7B857F5
eMMC CID : 484A019061344741AA57D4328924EAA1
Change to HIGH SPEED...
5A
Connection
-Please wait...
-Found...[COM14]


Reading Partition Table
SIZE[0x000009F8] 29 Items > Done

Reading System Info
Brand : HUAWEI
Vendor : HUAWEI
Model : MYA-L22
ID : HUAWEIMYA-L22
SDK : 23
Release : 6.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : zh-CN
Description : MYA-L22-user 6.0 HUAWEIMYA-L22 C636B140 release-keys
Device : HWMYA-L6737
Board : MYA-L22
Display ID : Maya-L22C636B140
Security Patch : 2017-11-05
Platform : mt6737t
FRPPST : /dev/block/platform/mtk-msdc.0/11230000.msdc0/by-name/frp
Fingerprint : HUAWEI/MYA-L22/HWMYA-L6737:6.0/HUAWEIMYA-L22/C636B140:user/release-keys
StorageType : mtp,mass_storage
Userdata State : Encrypted

Autobackup Partitions
-preloader[0x00000000] 512 KB -> preloader.bin...Ok
-> Renaming Preloader.... preloader_hq6737t_66_1ha_m0.bin
Creating Scatter file... D:\HydraTool_Fullpackage_01-28-2021\\Backup\Auto\HUAWEI_MYA-L22_0321-mt6737t-6.0_Maya-L22C636B140_210221104108\MT6737T_Android_scatter.t xt
-nvram[0x00380000] 12.5 MB -> nvram.bin... Failed
Done!!!
D:\HydraTool_Fullpackage_01-28-2021\\Backup\Auto\HUAWEI_MYA-L22_0321-mt6737t-6.0_Maya-L22C636B140_210221104108
MTK Phone Loader is NOW RUNNING.


Reading System Info
Brand : HUAWEI
Vendor : HUAWEI
Model : MYA-L22
ID : HUAWEIMYA-L22
SDK : 23
Release : 6.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : zh-CN
Description : MYA-L22-user 6.0 HUAWEIMYA-L22 C636B140 release-keys
Device : HWMYA-L6737
Board : MYA-L22
Display ID : Maya-L22C636B140
Security Patch : 2017-11-05
Platform : mt6737t
FRPPST : /dev/block/platform/mtk-msdc.0/11230000.msdc0/by-name/frp
Fingerprint : HUAWEI/MYA-L22/HWMYA-L6737:6.0/HUAWEIMYA-L22/C636B140:user/release-keys
StorageType : mtp,mass_storage
Userdata State : Encrypted

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition... [Ok] Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:22
BR
Dipendra Pathak

  Reply With Quote
Old 02-22-2021, 05:30   #1294 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,609
Lenevo A2020A40 (Vibe C) FRP successfully removed by Hydra Tool

Lenevo A2020A40 (Vibe C) FRP successfully removed by Hydra Tool

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : LENOVO Model : A2020A40 (Vibe C) Storage : Auto
Loader: LV_1_3.mbn
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM10)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&2108ad5d&0&6#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/02/2017,2.1.2.7

Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8909
Version : 1


Protocol : Universal
Running : Ok

Phone Information.....
Brand : Lenovo
Vendor : LENOVO
Model : Lenovo A2020a40
ID : LMY47V
SDK : 22
Release : 5.1.1
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Description : angus3A4-user 5.1.1 LMY47V A2020a40_S193_170218_ROW release-keys
Device : angus3A4
Board : msm8909
Display ID : A2020a40_S193_170218_ROW
Security Patch : 2017-01-01
Platform : msm8909
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : Lenovo/angus3A4/angus3A4:5.1.1/LMY47V/A2020a40_S193_170218_ROW:user/release-keys

Reading GPT[3]
Drive [0] 32 Items
Drive [1] 0 Items
Drive [2] 4 Items

Removing FRPta...
Method :
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOkOk

Rebooting Phone.... Ok
If not rebooted, Please Power on Manually

Elapsed Time : 00:00:03
BR
Dipendra Pathak

  Reply With Quote
Old 02-22-2021, 05:37   #1295 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,609
Oppo F11 Pro (CPH1969) Format user Data successfully done by Hydra Tool

Oppo F11 Pro (CPH1969) Format user Data successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
Brand : OPPO Model : F11 Pro (CPH1969) Connection : Flash Mode

=====================================
Connection
-Please wait...
-Connect Phone...
-Found...[COM54]

TPortConnection.Create...(COM54)..Opening...Ok

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0788MT6771[6771]
BROM HW_SW_VER : 8A00 CA00 0000 0000
getMTKPayloadExploit : 0788
#Executing Exploit..
#SUCCESS..

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0788MT6771[6771]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
SECURE VERSION : 05
BL VERSION : FE
BR Secured : E0

Preparing Download Agent..
DA : [Not Exist]
Trying Default 6771.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2020-11-03.22:07_536568
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : brom
Preloader Initialization...
Parsing F11_PRO_preloader_oppo6771_18531.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : AA5947FC1F628F0FD242A8D04123162F
ERAM Size : 0x0000000000039000 -228 KB
IRAM Size : 0x0000000180000000 -6 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 90014A68433861503E03CB28D55BB577 - hC8aP>

DA Speed : high-speed
DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info
Vendor : OPPO
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6771_18531-user 9 PPR1.180610.011 eng.root.20200325.183314 release-keys
Security Patch : 2020-04-05
StorageType : mtp
Userdata State : Not Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_oppo6771_18531.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\__0788--9__210221181823\MT6771_Android_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x0DE88000]1024 KB ->frp.bin...Ok
-nvdata[0x0FF88000]64 MB ->nvdata.bin...Ok
-persist[0x17800000]48 MB ->persist.bin...Ok
-nvram[0x26D00000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\__0788--9__210221181823
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : AA5947FC1F628F0FD242A8D04123162F
ERAM Size : 0x0000000000039000 -228 KB
IRAM Size : 0x0000000180000000 -6 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 90014A68433861503E03CB28D55BB577 - hC8aP>

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Vendor : OPPO
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6771_18531-user 9 PPR1.180610.011 eng.root.20200325.183314 release-keys
Security Patch : 2020-04-05
StorageType : mtp
Userdata State : Not Encrypted

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition...[C002002A-STATUS_SEC_IMG_TYPE_MISMATCH]
Erasing FRP Partition...
Safeformat Universal...[C002004B-]
Formatting Userdata... Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:41
BR
Dipendra Pathak

  Reply With Quote
Old 02-22-2021, 05:44   #1296 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,609
Itel A44 Successfully flashed selected partition by Hydra Tool

Itel A44 Successfully flashed selected partition by Hydra Tool

Screen Short:



Logs:

Quote:
Brand : AUTO Model : AUTO Connection : Flash Mode

=====================================
How To Boot : Power off phone
* BROM Mode : Press VOL + or Press VOL -+
* Preloader Mode : Just Insert cable

Connection
-Please wait...
-Connect Phone...
-Found...
-PreLoader...[COM8]

TPortConnection.Create...(COM8)..Opening...Ok


Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0335MT6737[6735]
BROM HW_SW_VER : 8A00 CA00 0000 0000

Handshaking...

Identifying Hardware ID.....
BROM CPUID : 0335MT6737[6735]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
SECURE VERSION : 00
BL VERSION : 00
BR Secured : 00
NORMAL BOOT

Preparing Download Agent..
DA : 6735.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2020-11-03.22:07_536568
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : Old - eMMC
00000000000000000000
PRMMCCID : 460001154D32364EE6BB03420F8D36D6
Init Configuration
Running DA 4.2 on BBID : 0x9B Ok

Initializing Loader [2]
Sending Loader [2] Accepted
Reading Flashchip data....
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000080000 -512 KB
eMMC USER : 0x00000001D2000000 -7.281 GB
ERAM Size : 0x0000000040000000 -1024 MB
IRAM Size : 0x0000000000020000 -128 KB
UNICAL RID : AA15CB8472A5CA79332218D1E8E06F68
eMMC CID : 460001154D32364EE6BB03420FC436D6
Change to HIGH SPEED...
5A
Connection
-Please wait...
-Found...[COM9]


Reading Partition Table
SIZE[0x000007E8] 23 Items > Done

Reading System Info
Brand : Itel
Vendor : itel
Model : itel A44
ID : NRD90M
SDK : 24
Release : 7.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-US
Description : A44-user 7.0 NRD90M 1565321702 release-keys
Device : itel-A44
Display ID : A44-F3706-7.0-OP-V042-20190809
Security Patch : 2019-08-05
Platform : mt6737m
FRPPST : /dev/block/platform/mtk-msdc.0/11230000.msdc0/by-name/frp
Fingerprint : Itel/F3706/itel-A44:7.0/NRD90M/A44-F3706-7.0-OP-V042-20190809:user/release-keys
StorageType : mtp
Userdata State : Not Encrypted

Autobackup Partitions
-preloader[0x00000000] 512 KB -> preloader.bin...Ok
-> Renaming Preloader.... preloader_rlk6737m_35_i_n.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\Itel_itel A44_0335-mt6737m-7.0_A44-F3706-7.0-OP-V042-20190809_210221154613\MT6737_Android_scatter.txt
-nvram[0x00380000] 5 MB -> nvram.bin...Ok
-frp[0x06A00000] 1024 KB -> frp.bin...Ok
-nvdata[0x06B00000] 32 MB -> nvdata.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\Itel_itel A44_0335-mt6737m-7.0_A44-F3706-7.0-OP-V042-20190809_210221154613
MTK Phone Loader is NOW RUNNING.


Reading Partition Table
SIZE[0x000007E8] 23 Items > Done

Preparing to flash selected partitions
Flashing....
preloader(preloader_rlk6737m_35_i_n.bin) Ok
lk(lk.bin)314.969 KB Ok
boot(boot.img)8.451 MB Ok
recovery(recovery.img)10.764 MB Ok
logo(logo.bin)2.517 MB Ok
secro(secro.img)132 KB Ok
tee1(trustzone.bin)166 KB Ok
tee2(trustzone.bin)166 KB Ok
system(system.img)2.555 GB Ok
cache(cache.img)8 MB Ok
userdata(userdata.img)26.524 MB Ok
Done!!!!

TPortConnection.Destroy.....Closing...Ok..
=====================================

Elapsed Time : 00:04:06
BR
Dipendra Pathak

  Reply With Quote
Old 02-22-2021, 06:07   #1297 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,609
Oppo F3 (CPH1609) rebuilding user data successfully done by Hydra Tool

Oppo F3 (CPH1609) rebuilding user data successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
Brand : OPPO Model : F3 (CPH1609) Connection : Flash Mode

=====================================
Connection
-Please wait...
-Found...[COM8]

TPortConnection.Create...(COM8)..Opening...Ok

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : F0F50661AA3568FC61FFAAC217B2F359
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 150100524836344D42059969E07234F1 - RH64MB

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Brand : OPPO
Vendor : OPPO
Model : CPH1609
ID : MRA58K
SDK : 23
Release : 6.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6750_16391-user 6.0 MRA58K 1563765866 release-keys
Device : CPH1609
Board : full_oppo6750_16391
Display ID : CPH1609EX_11_A.31_190722
Security Patch : 2018-06-05
Platform : mt6750
FRPPST : /dev/block/platform/mtk-msdc.0/11230000.msdc0/by-name/frp
StorageType : mtp,mass_storage
Userdata State : Encrypted

-------------------------------------
Operation : Rebuild Userdata
Processing...
Erasing FRP Partition...
Rebuilding Userdata... Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:16
BR
Dipendra Pathak

  Reply With Quote
Old 02-22-2021, 06:09   #1298 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,609
Vivo Y71 (V1731B) Force Erase User Data successfully removed by Hydra Tool

Vivo Y71 (V1731B) Force Erase User Data successfully removed by Hydra Tool

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : VIVO Model : Y71 (V1731B) Storage : Auto
Loader: vivo_2_8.mbn
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM3)
SymbolicName :\??\USB#VID_05C6&PID_9008#6&2c1e6d93&0&4#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :07/02/2015,2.00.05.00

Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8917
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 3272925689
Firmware Version : 165
Product Name : HAG4a2
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 30777344[14.676 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok
Reading GPT[3]
Drive [0] 56 Items
Drive [1] 0 Items
Drive [2] 0 Items


Phone Information.....
Brand : vivo
Vendor : vivo
Model : vivo 1724
ID : OPM1.171019.011
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : msm8937_64-user 8.1.0 OPM1.171019.011 eng.compil.20200303.175010 release-keys
Device : msm8937_64
Display ID : OPM1.171019.011 release-keys
Security Patch : 2020-03-01
Emmc_size : 16GB
Platform : =QCOM8917
Fingerprint : vivo/1724/1724:8.1.0/OPM1.171019.011/compil03031750:user/release-keys

Processing Forced Erase....
- Removing FRP [Auto] Ok
- Forced Erase Userdata
Action Result : Ok

Elapsed Time : 00:00:11
BR
Dipendra Pathak

  Reply With Quote
Old 02-22-2021, 06:17   #1299 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,609
Xiaomi Redmi Note 9 (merlin) Mi Account Removed without Credit! (Off Line) by Hydra T

Xiaomi Redmi Note 9 (merlin) Mi Account Removed without Credit! (Off Line) by Hydra Tool

Screen Short:



Logs:

Quote:
Brand : XIAOMI Model : Redmi Note 9 (merlin) Connection : Flash Mode

=====================================
Connection
-Please wait...
-Found...[COM3]

TPortConnection.Create...(COM3)..Opening...Ok

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : B09E1BFBAA16084657455C606DEF7381
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000001D1EC00000 -116,48 GB
eMMC CID : 150100445636444142025AA9CECA67E9 - DV6DAB

Reading GPT-EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Remove MiAccount[Erase Method] + FRP
Processing...
-persist.bin[0x104A2000]48 MB ->persist.bin...Ok
-frp.bin[0x05508000]1024 KB ->frp.bin...Ok
__022021205734
Backing up Partition for safety...
-__022021205734[0x104A2000]48 MB ->persist.img...OkOk
Saved to :
C:\Hydra Tool\Backup\Persist\__022021205734.bin
Erasing FRP Partition...
-persist.bin[0x104A2000]48 MB ->persist.bin...Ok
-frp.bin[0x05508000]1024 KB ->frp.bin...Ok Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:26
BR
Dipendra Pathak

  Reply With Quote
Old 02-22-2021, 06:22   #1300 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,609
Oppo Realme 3 ( RMX1821) Formatting User Data Successfully Done by Hydra Tool

Oppo Realme 3 ( RMX1821) Formatting User Data Successfully Done by Hydra Tool

Screen Short:



Logs:

Quote:
Brand : OPPO Model : Realme 3 (RMX1821) Connection : Flash Mode

=====================================
Connection
-Please wait...
-Connect Phone...
-Found...[COM7]

TPortConnection.Create...(COM7)..Opening...Ok

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0788MT6771[6771]
BROM HW_SW_VER : 8A00 CA00 0000 0000
getMTKPayloadExploit : 0788
#Executing Exploit..
#SUCCESS..

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0788MT6771[6771]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
SECURE VERSION : 05
BL VERSION : FE
BR Secured : E0

Preparing Download Agent..
DA : [Not Exist]
Trying Default 6771.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2020-11-03.22:07_536568
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : brom
Preloader Initialization...
Parsing Realme_3_preloader_oppo6771_18601.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 7341D2EAE2DBE13908BB58CCA405A8AE
ERAM Size : 0x0000000000039000 -228 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 90014A68423861503E033B153D09B511 - hB8aP>

DA Speed : high-speed
DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info
Vendor : Realme
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6771_18601-user 9 PPR1.180610.011 eng.root.20190629.220027 release-keys
Security Patch : 2019-06-05
StorageType : mtp
Userdata State : Not Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_oppo6771_18601.bin
Creating Scatter file... C:\Dongle\Hydra Tool\\Backup\Auto\__0788--9__210221040846\MT6771_Android_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x09E88000]1024 KB ->frp.bin...Ok
-nvdata[0x0BF88000]64 MB ->nvdata.bin...Ok
-persist[0x13800000]48 MB ->persist.bin...Ok
-nvram[0x22D00000]64 MB ->nvram.bin...Ok
Done!!!
C:\Dongle\Hydra Tool\\Backup\Auto\__0788--9__210221040846
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 7341D2EAE2DBE13908BB58CCA405A8AE
ERAM Size : 0x0000000000039000 -228 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 90014A68423861503E033B153D09B511 - hB8aP>

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Vendor : Realme
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6771_18601-user 9 PPR1.180610.011 eng.root.20190629.220027 release-keys
Security Patch : 2019-06-05
StorageType : mtp
Userdata State : Not Encrypted

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition...[C002002A-STATUS_SEC_IMG_TYPE_MISMATCH]
Erasing FRP Partition...
Safeformat Universal...[C002004B-]
Formatting Userdata... Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:50
BR
Dipendra Pathak

  Reply With Quote
Old 02-22-2021, 16:29   #1301 (permalink)
No Life Poster
 
sky73's Avatar
 
Join Date: Jan 2013
Location: gsmhosting
Age: 28
Posts: 1,149
Member: 1876736
Status: Offline
Thanks Meter: 735
redmi note 8 pro remove mi account and frp done

Code:
Brand : XIAOMI Model : Redmi Note 8 Pro (begonia) Connection : Flash Mode

=====================================
Connection
 -Please wait...
 -Connect Phone...
 -Found...[COM13]

TPortConnection.Create...(COM13)..Opening...Ok

Handshaking...Ok

Identifying Hardware ID.....
 BROM CPUID     : 0813MT6785[6785]
 BROM HW_SW_VER : 8A00 CA00 0000 0000 
 getMTKPayloadExploit : 0813
 #Executing Exploit..
 #SUCCESS..

Handshaking...Ok

Identifying Hardware ID.....
 BROM CPUID     : 0813MT6785[6785]
 BROM HW_SW_VER : 8A00 CA00 0000 0000 
 FUSEID         : 00000000
 SECURE VERSION : 05 
 BL VERSION     : FE 
 BR Secured     : E0

Preparing Download Agent..
 DA   : 6785.bin
 Agent: MTK_DOWNLOAD_AGENT -HYDRA
 Ver  : MTK_AllInOne_DA_v3.3001.2020-11-03.22:07_536568
 Init : Loader [1]
 Sending : Accepted

Identifying Protocol...
 Protocol : New
 Synchronization...SYNC
 Mode : brom
 Preloader Initialization...
 Parsing preloader_begonia.bin
 Init : Accepted

Execute Secondary Loader
 Init : Loader [2]
 Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
 UNIQUE ID  : 6AD72F3027DD1C07805EE2E50DAE11EC
 ERAM Size  : 0x0000000000080000 -512 KB
 IRAM Size  : 0x0000000180000000 -6 GB
 UFS LU0 Size: 0x0000000000400000 -4 MB
 UFS LU1 Size: 0x0000000000400000 -4 MB
 UFS LU2 Size: 0x0000001DCB000000 -119.172 GB
 UFS CID     : I☺KM2V8001CM-B707
 UFS UNIQID  : 00330038003600390034003400650038

DA Speed : high-speed
DA Speed : high-speed

Reading GPT-UFS [0x00008000] 130 Items

Reading System Info
  Brand          : Redmi
  Vendor         : Xiaomi
  Model          : Redmi Note 8 Pro
  ID             : PPR1.180610.011
  SDK            : 28
  Release        : 9
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-GB
  Description    : begonia-user 9 PPR1.180610.011 V11.0.2.0.PGGMIXM release-keys
  Miui Ver       : V11
  Device         : begonia
  Mod_device     : begonia_global
  Display ID     : PPR1.180610.011
  Security Patch : 2019-11-01
  Fingerprint    : Redmi/begonia/begonia:9/PPR1.180610.011/V11.0.2.0.PGGMIXM:user/release-keys
  StorageType    : mtp
  Userdata State : Not Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
   -> Renaming Preloader....  
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x05888000]1024 KB ->frp.bin...Ok
-nvdata[0x08188000]64 MB ->nvdata.bin...Ok
-persist[0x0E188000]70.469 MB ->persist.bin...Ok
-nvram[0x17580000]64 MB ->nvram.bin...Ok
Done!!!
H:\Hydra Tool\\Backup\Auto\Redmi_Redmi Note 8 Pro_0813--9_PPR1.180610.011_220221185820
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
 UNIQUE ID  : 6AD72F3027DD1C07805EE2E50DAE11EC
 ERAM Size  : 0x0000000000080000 -512 KB
 IRAM Size  : 0x0000000180000000 -6 GB
 UFS LU0 Size: 0x0000000000400000 -4 MB
 UFS LU1 Size: 0x0000000000400000 -4 MB
 UFS LU2 Size: 0x0000001DCB000000 -119.172 GB
 UFS CID     : I☺KM2V8001CM-B707
 UFS UNIQID  : 00330038003600390034003400650038

Reading GPT-UFS [0x00008000] 130 Items


Reading System Info
  Brand          : Redmi
  Vendor         : Xiaomi
  Model          : Redmi Note 8 Pro
  ID             : PPR1.180610.011
  SDK            : 28
  Release        : 9
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-GB
  Description    : begonia-user 9 PPR1.180610.011 V11.0.2.0.PGGMIXM release-keys
  Miui Ver       : V11
  Device         : begonia
  Mod_device     : begonia_global
  Display ID     : PPR1.180610.011
  Security Patch : 2019-11-01
  Fingerprint    : Redmi/begonia/begonia:9/PPR1.180610.011/V11.0.2.0.PGGMIXM:user/release-keys
  StorageType    : mtp
  Userdata State : Not Encrypted

-------------------------------------
Operation : Remove MiAccount[Erase Method] + FRP
Processing...
-persist.bin[0x0E188000]70.469 MB ->persist.bin...Ok
-frp.bin[0x05888000]1024 KB ->frp.bin...Ok
Redmi Note 8 Pro_9_022221185834
Backing up Partition for safety...
-Redmi Note 8 Pro_9_022221185834[0x0E188000]70.469 MB ->persist.img...OkOk
Saved to : 
H:\Hydra Tool\Backup\Persist\Redmi Note 8 Pro_9_022221185834.bin
Erasing FRP Partition...
-persist.bin[0x0E188000]70.469 MB ->persist.bin...Ok
-frp.bin[0x05888000]1024 KB ->frp.bin...Ok[] Failed

Rebooting Device [Reboot To Normal]
Reboot Done!!

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:01:09
  Reply With Quote
Old 02-22-2021, 16:30   #1302 (permalink)
No Life Poster
 
sky73's Avatar
 
Join Date: Jan 2013
Location: gsmhosting
Age: 28
Posts: 1,149
Member: 1876736
Status: Offline
Thanks Meter: 735
redmi note 8 pro remove mi account and frp done

Code:
Brand : XIAOMI Model : Redmi Note 8 Pro (begonia) Connection : Flash Mode

=====================================
Connection
 -Please wait...
 -Connect Phone...
 -Found...[COM13]

TPortConnection.Create...(COM13)..Opening...Ok

Handshaking...Ok

Identifying Hardware ID.....
 BROM CPUID     : 0813MT6785[6785]
 BROM HW_SW_VER : 8A00 CA00 0000 0000 
 getMTKPayloadExploit : 0813
 #Executing Exploit..
 #SUCCESS..

Handshaking...Ok

Identifying Hardware ID.....
 BROM CPUID     : 0813MT6785[6785]
 BROM HW_SW_VER : 8A00 CA00 0000 0000 
 FUSEID         : 00000000
 SECURE VERSION : 05 
 BL VERSION     : FE 
 BR Secured     : E0

Preparing Download Agent..
 DA   : 6785.bin
 Agent: MTK_DOWNLOAD_AGENT -HYDRA
 Ver  : MTK_AllInOne_DA_v3.3001.2020-11-03.22:07_536568
 Init : Loader [1]
 Sending : Accepted

Identifying Protocol...
 Protocol : New
 Synchronization...SYNC
 Mode : brom
 Preloader Initialization...
 Parsing preloader_begonia.bin
 Init : Accepted

Execute Secondary Loader
 Init : Loader [2]
 Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
 UNIQUE ID  : 6AD72F3027DD1C07805EE2E50DAE11EC
 ERAM Size  : 0x0000000000080000 -512 KB
 IRAM Size  : 0x0000000180000000 -6 GB
 UFS LU0 Size: 0x0000000000400000 -4 MB
 UFS LU1 Size: 0x0000000000400000 -4 MB
 UFS LU2 Size: 0x0000001DCB000000 -119.172 GB
 UFS CID     : I☺KM2V8001CM-B707
 UFS UNIQID  : 00330038003600390034003400650038

DA Speed : high-speed
DA Speed : high-speed

Reading GPT-UFS [0x00008000] 130 Items

Reading System Info
  Brand          : Redmi
  Vendor         : Xiaomi
  Model          : Redmi Note 8 Pro
  ID             : PPR1.180610.011
  SDK            : 28
  Release        : 9
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-GB
  Description    : begonia-user 9 PPR1.180610.011 V11.0.2.0.PGGMIXM release-keys
  Miui Ver       : V11
  Device         : begonia
  Mod_device     : begonia_global
  Display ID     : PPR1.180610.011
  Security Patch : 2019-11-01
  Fingerprint    : Redmi/begonia/begonia:9/PPR1.180610.011/V11.0.2.0.PGGMIXM:user/release-keys
  StorageType    : mtp
  Userdata State : Not Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
   -> Renaming Preloader....  
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x05888000]1024 KB ->frp.bin...Ok
-nvdata[0x08188000]64 MB ->nvdata.bin...Ok
-persist[0x0E188000]70.469 MB ->persist.bin...Ok
-nvram[0x17580000]64 MB ->nvram.bin...Ok
Done!!!
H:\Hydra Tool\\Backup\Auto\Redmi_Redmi Note 8 Pro_0813--9_PPR1.180610.011_220221185820
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
 UNIQUE ID  : 6AD72F3027DD1C07805EE2E50DAE11EC
 ERAM Size  : 0x0000000000080000 -512 KB
 IRAM Size  : 0x0000000180000000 -6 GB
 UFS LU0 Size: 0x0000000000400000 -4 MB
 UFS LU1 Size: 0x0000000000400000 -4 MB
 UFS LU2 Size: 0x0000001DCB000000 -119.172 GB
 UFS CID     : I☺KM2V8001CM-B707
 UFS UNIQID  : 00330038003600390034003400650038

Reading GPT-UFS [0x00008000] 130 Items


Reading System Info
  Brand          : Redmi
  Vendor         : Xiaomi
  Model          : Redmi Note 8 Pro
  ID             : PPR1.180610.011
  SDK            : 28
  Release        : 9
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-GB
  Description    : begonia-user 9 PPR1.180610.011 V11.0.2.0.PGGMIXM release-keys
  Miui Ver       : V11
  Device         : begonia
  Mod_device     : begonia_global
  Display ID     : PPR1.180610.011
  Security Patch : 2019-11-01
  Fingerprint    : Redmi/begonia/begonia:9/PPR1.180610.011/V11.0.2.0.PGGMIXM:user/release-keys
  StorageType    : mtp
  Userdata State : Not Encrypted

-------------------------------------
Operation : Remove MiAccount[Erase Method] + FRP
Processing...
-persist.bin[0x0E188000]70.469 MB ->persist.bin...Ok
-frp.bin[0x05888000]1024 KB ->frp.bin...Ok
Redmi Note 8 Pro_9_022221185834
Backing up Partition for safety...
-Redmi Note 8 Pro_9_022221185834[0x0E188000]70.469 MB ->persist.img...OkOk
Saved to : 
H:\Hydra Tool\Backup\Persist\Redmi Note 8 Pro_9_022221185834.bin
Erasing FRP Partition...
-persist.bin[0x0E188000]70.469 MB ->persist.bin...Ok
-frp.bin[0x05888000]1024 KB ->frp.bin...Ok[] Failed

Rebooting Device [Reboot To Normal]
Reboot Done!!

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:01:09
  Reply With Quote
Old 02-23-2021, 05:05   #1303 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,609
Casper VIA M3 zero wipe FRP successfully done by Hydra Tool

Casper VIA M3 zero wipe FRP successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
Brand : AUTO Model : AUTO Connection : Flash Mode

=====================================
Connection
-Please wait...
-Connect Phone...
-Found...
-PreLoader...[COM7]

TPortConnection.Create...(COM7)..Opening...Ok

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0335MT6737[6735]
BROM HW_SW_VER : 8A00 CA00 0000 0000

Handshaking...

Identifying Hardware ID.....
BROM CPUID : 0335MT6737[6735]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
SECURE VERSION : 00
BL VERSION : 00
BR Secured : 01
NORMAL BOOT

Preparing Download Agent..
DA : 6735_SWSEC_Wiko.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.00.00
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : Old - eMMC
00000000000000000000
PRMMCCID : 484A0190613447423328A5320F1147E8
Init Configuration
Running DA 4.2 on BBID : 0x9B Ok

Initializing Loader [2]
Sending Loader [2] Accepted
Reading Flashchip data....
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000747C00000 -29,121 GB
ERAM Size : 0x00000000C0000000 -3 GB
IRAM Size : 0x0000000000020000 -128 KB
UNICAL RID : B326F7ADB1FED4CE01B266881364B3EC
eMMC CID : 484A0190613447423328A5320FA447E8
Change to HIGH SPEED...
5A
Connection
-Please wait...
-Found...[COM101]


Reading Partition Table
SIZE[0x000007E8] 23 Items > Done

Reading System Info
Brand : Casper
Vendor : Casper
Model : CASPER_VIA_M3
ID : NRD90M
SDK : 24
Release : 7.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : tr-TR
Description : full_v3961-user 7.0 NRD90M 1507451753 release-keys
Device : CASPER_VIA_M3
Board : VIA_M3
Display ID : M3_c1.03_20171008
Security Patch : 2017-09-05
Platform : mt6737m
FRPPST : /dev/block/platform/mtk-msdc.0/11230000.msdc0/by-name/frp
Fingerprint : Casper/CASPER_VIA_M3/CASPER_VIA_M3:7.0/NRD90M/1501819972:user/release-keys
StorageType : mtp
Userdata State : Not Encrypted

Autobackup Partitions
-preloader[0x00000000] 512 KB -> preloader.bin...Ok
-> Renaming Preloader.... preloader_v3961.bin
Creating Scatter file... C:\Users\Downloads\Compressed\HydraTool_Fullpackag e_01-28-2021\\Backup\Auto\Casper_CASPER_VIA_M3_0335-mt6737m-7.0_M3_c1.03_20171008_220221220742\MT6737_Android_ scatter.txt
-nvram[0x00380000] 5 MB -> nvram.bin...Ok
-frp[0x06A00000] 1024 KB -> frp.bin...Ok
-nvdata[0x06B00000] 32 MB -> nvdata.bin...Ok
Done!!!
C:\Users\Downloads\Compressed\HydraTool_Fullpackag e_01-28-2021\\Backup\Auto\Casper_CASPER_VIA_M3_0335-mt6737m-7.0_M3_c1.03_20171008_220221220742
MTK Phone Loader is NOW RUNNING.


Reading System Info
Brand : Casper
Vendor : Casper
Model : CASPER_VIA_M3
ID : NRD90M
SDK : 24
Release : 7.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : tr-TR
Description : full_v3961-user 7.0 NRD90M 1507451753 release-keys
Device : CASPER_VIA_M3
Board : VIA_M3
Display ID : M3_c1.03_20171008
Security Patch : 2017-09-05
Platform : mt6737m
FRPPST : /dev/block/platform/mtk-msdc.0/11230000.msdc0/by-name/frp
Fingerprint : Casper/CASPER_VIA_M3/CASPER_VIA_M3:7.0/NRD90M/1501819972:user/release-keys
StorageType : mtp
Userdata State : Not Encrypted

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition... [Ok] Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:26
BR
Dipendra Pathak

  Reply With Quote
Old 02-23-2021, 05:17   #1304 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,609
Xiaomi Redmi 4A Mi Account Successfully Disable using Anti-Relock Method by Hydra

Xiaomi Redmi 4A Mi Account Successfully Disable using Anti-Relock Method by Hydra Tool

Screen Short:



Logs:

Quote:
Starting ADB Server....
Searching Device By ADB
Device Found...
Model : Redmi 4A
Brand : Xiaomi
Android Ver : 7.1.2
CPU abi : arm64-v8a
Software Version :
CSC Version :
Bootloader :
Board : QC_Reference_Phone
Display ID : N2G47H
Security Patch : 2018-07-01
Emmc_size : 16GB
Platform : msm8937
Kernel ID : 2018-07-01
Marketname :
OTA Version Name :
SYS USB CONFIG : persist.mtp,adb
FRPPST : /dev/block/bootdevice/by-name/config
FingerPrint : Xiaomi/rolex/rolex:7.1.2/N2G47H/V10.2.3.0.NCCMIXM:user/release-keys

Checking Root Status....
Root Status : Not Rooted

ADB MiAccount...

Processing...
Disbaling MI Account
Please wait...
Disabled Mi Account Success
Action Result : Ok

Elapsed Time : 00:00:04
BR
Dipendra Pathak

  Reply With Quote
Old 02-23-2021, 05:32   #1305 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,609
Huawei SCL- AL00 (Y6) Successfully Flashed by Hydra Tool

Huawei SCL- AL00 (Y6) Successfully Flashed by Hydra Tool

Screen Short:



Logs:

Quote:
Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM19)
SymbolicName :\??\USB#VID_05C6&PID_9008#6&298c69d9&0&3#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/02/2017,2.1.2.7

Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8909
Version : 1


Protocol : Universal
Running : Ok

Phone Information.....
Brand : Huawei
Vendor : HUAWEI
Model : SCL-AL00
ID : HuaweiSCL-AL00
SDK : 22
Release : 5.1.1
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Description : SCL-AL00-user 5.1.1 GRJ90 C541B140 release-keys
Device : hwSCL-Q
Board : SCL-AL00
Display ID : SCL-AL00C541B140
Security Patch : 2016-07-01
Platform : msm8909
Fingerprint : Huawei/SCL-AL00/hwSCL-Q:5.1.1/HuaweiSCL-AL00/C541B140:user/release-keys

Reading GPT[3]
Drive [0] 28 Items
Drive [1] 0 Items
Drive [2] 0 Items


Backup Security partitions...
Reading Security Items....
> modemst1
> modemst2
> fsg
C:\Hydra Tool\Backup\Security_Backup\SCL-AL00_SCL-AL00_5.1.1_Security_022221190510.sec
Backup Security Success....

----------------------------
Flashing Selected Partitions
>sbl1(0)[SBL1.bin] Ok
>rpm(0)[RPM.bin] Failed

Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-33.] OK
0 [CRC32(2,3584)] OK
0 [CRC32(NUM_DISK_SECTORS-33.,3584)] OK
0 [0] OK
0 [CRC32(1,92)] OK
0 [0] OK
0 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 0
Set bootable storage drive 0 Ok

Rebooting Phone.... Ok

Elapsed Time : 00:00:05
BR
Dipendra Pathak

  Reply With Quote
Reply

Bookmarks

Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


 



All times are GMT +1. The time now is 03:42.



Powered by Searchlight © 2023 Axivo Inc.
vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2023 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2022 -
Page generated in 0.38686 seconds with 9 queries

SEO by vBSEO