GSM Shop GSM Shop
GSM-Forum  

Welcome to the GSM-Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features.
Only registered members may post questions, contact other members or search our database of over 8 million posts.

Registration is fast, simple and absolutely free so please - Click to REGISTER!

If you have any problems with the registration process or your account login, please contact contact us .

Go Back   GSM-Forum > Product Support Sections > Special Solutions / Services / WebShop > GSMFABRICA Products > HYDRA TOOL


Reply
 
LinkBack Thread Tools Display Modes
Old 02-23-2021, 05:44   #1306 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Oppo A57 formatting User Data Successfully Removed by Hydra Tool


Oppo A57 formatting User Data Successfully Removed by Hydra Tool

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : AUTO Model : AUTO Storage : Auto
Loader: Auto
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM39)
SymbolicName :\??\USB#VID_05C6&PID_9008#6&1ba46697&0&5#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/31/2015,2.1.2.0

Getting device info......
Serial No.: 0xAD798B54
MSM ID : 0x0006B0E1, MSM8940-Qualcomm Snapdragon 435
PBL Ver : 00000000
PK HASH : 77A22B92A1BCD0C4D3AAA10AA9F1B2C3
6D51C0CA7429B5201D0FD1D5F5B53BBC

Firehose Loader[Oppo_A57_8940.mbn]
SaharaBoot... Ok
Sending ....................Ok
Connecting to Firehose...
Ping... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 19
Serial Number : 126910332
Firmware Version : 170
Product Name : Q3J97V
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 61071360[29.121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok

Phone Information.....
Brand : OPPO
Vendor : OPPO
Model : OPPO A57
ID : MMB29M
SDK : 23
Release : 6.0.1
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : msm8937_64-user 6.0.1 MMB29M eng.root.20170424.005625 dev-keys
Device : A57
Board : QC_Reference_Phone
Display ID : A57_11_A.19_170424
Security Patch : 2017-03-05
Emmc_size : 16GB
Platform : msm8937
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : OPPO/A57/A57:6.0.1/MMB29M/1487592392:user/release-keys

Reading GPT[3]
Drive [0] 56 Items
Drive [1] 0 Items
Drive [2] 4 Items

Formatting Userdata...
Method :
Auto
Processing...
- Formatting Userdata
Executing ...
- Formatting Userdata [Safe method] OkOkOk

Rebooting Phone.... Ok
If not rebooted, Please Power on Manually

Elapsed Time : 00:00:08
BR
Dipendra Pathak

  Reply With Quote
Old 02-23-2021, 05:55   #1307 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Xiaomi Redmi Note 9 (Merlin) Successfully Flashed by Hydra Tool

Xiaomi Redmi Note 9 (Merlin) Successfully Flashed by Hydra Tool

Screen Short:



Logs:

Quote:
Brand : XIAOMI Model : Redmi Note 9 (merlin) Connection : Flash Mode

=====================================
How To Boot : Power off phone
* BROM Mode : Press VOL + or Press VOL -+
* Preloader Mode : Just Insert cable

Connection
-Please wait...
-Connect Phone...
-Found...[COM5]

TPortConnection.Create...(COM5)..Opening...Ok


Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0707MT6768[6768]
BROM HW_SW_VER : 8A00 CA00 0000 0000
getMTKPayloadExploit : 0707
#Executing Exploit..
#SUCCESS..

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0707MT6768[6768]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
SECURE VERSION : 05
BL VERSION : FE
BR Secured : E0

Preparing Download Agent..
DA : 6768.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2020/07/07.10:10_513994
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_merlin.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 63A482C1DFEE8FA2C6CC9E8BCA4BC107
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58,242 GB
eMMC CID : 13014E53304A394A38101A5888B64773 - S0J9J8

DA Speed : high-speed
DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_merlin.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\__0707--__220221142248\MT6768_Android_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x05508000]1024 KB ->frp.bin...Ok
-nvdata[0x0C4A2000]64 MB ->nvdata.bin...Ok
-persist[0x104A2000]48 MB ->persist.bin...Ok
-nvram[0x19F80000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\__0707--__220221142248
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 63A482C1DFEE8FA2C6CC9E8BCA4BC107
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58,242 GB
eMMC CID : 13014E53304A394A38101A5888B64773 - S0J9J8

Reading GPT-EMMC [0x00008000] 130 Items

Flashing Selected Partitions....
- preloader[preloader_merlin.bin] 512 KB Skipped
- recovery[recovery.img] 64 MB Flash -> = Ok
- vbmeta[vbmeta.img] 8 MB Flash -> = Ok
- vbmeta_system[vbmeta_system.img] 8 MB Flash ->= Ok
- vbmeta_vendor[vbmeta_vendor.img] 8 MB Flash ->= Ok
- efuse[efuse.img] 512 KB Flash -> = Ok
- logo[logo.bin] 8 MB Flash -> = Ok
- md1img[md1img-verified.img] 128 MB Flash ->= Ok
- spmfw[spmfw-verified.img] 1024 KB Flash ->= Ok
- scp1[scp-verified.img] 6 MB Flash -> = Ok
- scp2[scp-verified.img] 6 MB Flash -> = Ok
- sspm_1[sspm-verified.img] 1024 KB Flash ->= Ok
- sspm_2[sspm-verified.img] 1024 KB Flash ->= Ok
- lk[lk-verified.img] 2 MB Flash -> = Ok
- lk2[lk-verified.img] 2 MB Flash -> = Ok
- boot[boot.img] 64 MB Flash -> = Ok
- dtbo[dtbo-verified.img] 16 MB Flash -> = Ok
- tee1[tee-verified.img] 5 MB Flash -> = Ok
- tee2[tee-verified.img] 5 MB Flash -> = Ok
- exaid[exaid.img] 384 MB Flash -> = Ok
- cust[cust.img] 1024 MB Flash -> = Ok
- super[super.img] 7 GB Flash -> = Ok
- cache[cache.img] 432 MB Flash -> = Ok
- userdata[userdata.img] 3 GB Flash -> = Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

TPortConnection.Destroy.....Closing...Ok..
=====================================

Elapsed Time : 00:01:59
BR
Dipendra Pathak

  Reply With Quote
Old 02-23-2021, 06:03   #1308 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Xiaomi Mi Play (Lotus) Mi Account Successfully Removed using Erase Method by Hydra

Xiaomi Mi Play (Lotus) Mi Account Successfully Removed using Erase Method by Hydra

Screen Short:



Logs:

Quote:
Brand : XIAOMI Model : Mi Play (Lotus) Connection : Flash Mode

=====================================
Connection
-Please wait...
-Connect Phone...
-Found...[COM3]

TPortConnection.Create...(COM3)..Opening...Ok

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0766MT6765[6765]
BROM HW_SW_VER : 8A00 CA00 0000 0000
getMTKPayloadExploit : 0766
#Executing Exploit..
#SUCCESS..

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0766MT6765[6765]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
SECURE VERSION : 05
BL VERSION : FE
BR Secured : E0

Preparing Download Agent..
DA : 6765.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2020-11-03.22:07_536568
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_lotus.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : DE89B32A03CF6BDA23BF93A885A351BC
ERAM Size : 0x000000000003A000 -232 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58,242 GB
eMMC CID : 90014A68433861503E03CA52D0C416F7 - hC8aP>

DA Speed : high-speed
DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info
Brand : xiaomi
Vendor : Xiaomi
Model : MI PLAY
ID : O11019
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : lotus-user 8.1.0 O11019 V10.2.3.0.OFIMIXM release-keys
Miui Ver : V10
Device : lotus
Mod_device : lotus_global
Display ID : ZAL1722-lotus-build-20190401162923
Security Patch : 2019-03-01
Fingerprint : xiaomi/lotus/lotus:8.1.0/O11019/V10.2.3.0.OFIMIXM:user/release-keys
StorageType : mtp
Userdata State : Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_lotus.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\xiaomi_MI PLAY_0766--8.1.0_ZAL1722-lotus-build-20190401162923_220221135827\MT6765_Android_scatter .txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x03588000]1024 KB ->frp.bin...Ok
-nvdata[0x05688000]64 MB ->nvdata.bin...Ok
-persist[0x0D000000]48 MB ->persist.bin...Ok
-nvram[0x18E80000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\xiaomi_MI PLAY_0766--8.1.0_ZAL1722-lotus-build-20190401162923_220221135827
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : DE89B32A03CF6BDA23BF93A885A351BC
ERAM Size : 0x000000000003A000 -232 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58,242 GB
eMMC CID : 90014A68433861503E03CA52D0C416F7 - hC8aP>

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Brand : xiaomi
Vendor : Xiaomi
Model : MI PLAY
ID : O11019
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : lotus-user 8.1.0 O11019 V10.2.3.0.OFIMIXM release-keys
Miui Ver : V10
Device : lotus
Mod_device : lotus_global
Display ID : ZAL1722-lotus-build-20190401162923
Security Patch : 2019-03-01
Fingerprint : xiaomi/lotus/lotus:8.1.0/O11019/V10.2.3.0.OFIMIXM:user/release-keys
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Remove MiAccount[Erase Method] + FRP
Processing...
-persist.bin[0x0D000000]48 MB ->persist.bin...Ok
-frp.bin[0x03588000]1024 KB ->frp.bin...Ok
MI PLAY_8.1.0_022221135848
Backing up Partition for safety...
-MI PLAY_8.1.0_022221135848[0x0D000000]48 MB ->persist.img...OkOk
Saved to :
C:\Hydra Tool\Backup\Persist\MI PLAY_8.1.0_022221135848.bin
Erasing FRP Partition...
-persist.bin[0x0D000000]48 MB ->persist.bin...Ok
-frp.bin[0x03588000]1024 KB ->frp.bin...Ok Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:01:04
BR
Dipendra Pathak

  Reply With Quote
Old 02-23-2021, 06:53   #1309 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Oppo F7 (CPH1819) Fixed Download Image Successfully Done by Hydra Tool

Oppo F7 (CPH1819) Fixed Download Image Successfully Done by Hydra Tool

Screen Short:



Logs:

Quote:
Brand : OPPO Model : F7 (CPH1819) Connection : Flash Mode

=====================================
Connection
-Please wait...
-Connect Phone...
-Found...[COM20]

TPortConnection.Create...(COM20)..Opening...Ok

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0788MT6771[6771]
BROM HW_SW_VER : 8A00 CA00 0000 0000

Handshaking...

Identifying Hardware ID.....
BROM CPUID : 0788MT6771[6771]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
SECURE VERSION : 05
BL VERSION : FE
BR Secured : E5[SBC+SDA+SEL]

Security Authorization....
Sending[Oppo_F7.auth] Accepted

Preparing Download Agent..
DA : 6771_SWSEC_E0871E87F0.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.00.00
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_oppo6771_17197.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : FFE1D902C12402F4F3D4E98A7CE6A984
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 90014A484347386134A4088B306B1569 - HCG8a4

DA Speed : high-speed
DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info
Vendor : OPPO
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6771_17331-user 9 PPR1.180610.011 eng.root.20200419.005523 release-keys
Security Patch : 2020-04-05
StorageType : mtp
Userdata State : Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_oppo6771_17331.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\__0788--9__220221174936\MT6771_Android_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x07C88000]1024 KB ->frp.bin...Ok
-nvdata[0x09D88000]64 MB ->nvdata.bin...Ok
-persist[0x11800000]48 MB ->persist.bin...Ok
-nvram[0x20D00000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\__0788--9__220221174936
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : FFE1D902C12402F4F3D4E98A7CE6A984
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 90014A484347386134A4088B306B1569 - HCG8a4

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Vendor : OPPO
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6771_17331-user 9 PPR1.180610.011 eng.root.20200419.005523 release-keys
Security Patch : 2020-04-05
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Fix DL Image Error
Processing... Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:01:00
BR
Dipendra Pathak

  Reply With Quote
Old 02-23-2021, 07:13   #1310 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Keytak6580 Weg 1 Zero wipe and format user data successfully removed by Hydra Tool

Keytak6580 Weg 1 Zero wipe and format user data successfully removed by Hydra Tool

Screen Short:



Logs:

Quote:
Brand : AUTO Model : AUTO Connection : Flash Mode

=====================================
Connection
-Please wait...
-Connect Phone...
-Found...
-PreLoader...[COM42]

TPortConnection.Create...(COM42)..Opening...Ok

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 6580MT6580[6580]
BROM HW_SW_VER : 8A00 CA00 0000 0000

Handshaking...

Identifying Hardware ID.....
BROM CPUID : 6580MT6580[6580]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
FUSEID : 00000000
SECURE VERSION : 00
BL VERSION : 00
BR Secured : 00
NORMAL BOOT

Preparing Download Agent..
DA : 6580.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2018-09-18.13:22_452898
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : Old - eMMC
0000000000000000000000000000
PRMMCCID : 90014A4834473261110143D7CD5143A1
Init Configuration
Running DA 4.2 on BBID : 0x9C Ok

Initializing Loader [2]
Sending Loader [2] Accepted
Reading Flashchip data....
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000000E9000000 -3.641 GB
ERAM Size : 0x0000000020000000 -512 MB
IRAM Size : 0x0000000000020000 -128 KB
UNICAL RID : 103E6BCAA81F3964DCBAAAFA401B191C
eMMC CID : 484A019061324734D7430111A14351CD
Change to HIGH SPEED...
5A
Connection
-Please wait...
-Found...[COM93]


Reading Partition Table
SIZE[0x00000738] 21 Items > Done

Reading System Info
Device : keytak6580_weg_l
Userdata State : Encrypted

Autobackup Partitions
-preloader[0x00000000] 512 KB -> preloader.bin...Ok
-> Renaming Preloader.... preloader_keytak6580_weg_l.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\__6580--__220221133641\MT6580_Android_scatter.txt
-nvram[0x00380000] 5 MB -> nvram.bin...Ok
-frp[0x04FA0000] 1024 KB -> frp.bin...Ok
-nvdata[0x050A0000] 32 MB -> nvdata.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\__6580--__220221133641
MTK Phone Loader is NOW RUNNING.


Reading System Info
Device : keytak6580_weg_l
Userdata State : Encrypted

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition... [Ok]
Safeformat Universal...(tmp.bin)240 Bytes Ok Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:01:06
BR
Dipendra Pathak

  Reply With Quote
Old 02-23-2021, 07:44   #1311 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Xiomi Note 8 Pro (begonia) successfully Flashed by Hydra Tool

Xiomi Note 8 Pro (begonia) successfully Flashed by Hydra Tool

Screen Short:



Logs:

Quote:
Brand : XIAOMI Model : Redmi Note 8 Pro (begonia) Connection : Flash Mode

=====================================
How To Boot : Power off phone
* BROM Mode : Press VOL + or Press VOL -+
* Preloader Mode : Just Insert cable

Connection
-Please wait...
-Found...[COM3]

TPortConnection.Create...(COM3)..Opening...Ok


Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0813MT6785[6785]
BROM HW_SW_VER : 8A00 CA00 0000 0000
getMTKPayloadExploit : 0813
#Executing Exploit..
#SUCCESS..

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0813MT6785[6785]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
SECURE VERSION : 05
BL VERSION : FE
BR Secured : E0

Preparing Download Agent..
DA : 6785.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2020-11-03.22:07_536568
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_begonia.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 5F2E7C133CF4EB9FB67456CCB0DDE01C
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x0000000180000000 -6 GB
UFS LU0 Size: 0x0000000000400000 -4 MB
UFS LU1 Size: 0x0000000000400000 -4 MB
UFS LU2 Size: 0x0000000EE5800000 -59,586 GB
UFS CID : *OH9HQ53AECMMDAR
UFS UNIQID : 0d80f85332a0000000000000

DA Speed : high-speed
DA Speed : high-speed

Reading GPT-UFS [0x00008000] 130 Items

Reading System Info
Vendor : Xiaomi
ID : QP1A.190711.020
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : begonia-user 10 QP1A.190711.020 V12.0.3.0.QGGMIXM release-keys
Miui Ver : V12
Mod_device : begonia_global
Display ID : QP1A.190711.020
Security Patch : 2020-08-01
StorageType : mtp
Userdata State : Not Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader....
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x05888000]1024 KB ->frp.bin...Ok
-nvdata[0x08188000]64 MB ->nvdata.bin...Ok
-persist[0x0E188000]70,469 MB ->persist.bin...Ok
-nvram[0x17580000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\__0813--10_QP1A.190711.020_220221172629
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 5F2E7C133CF4EB9FB67456CCB0DDE01C
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x0000000180000000 -6 GB
UFS LU0 Size: 0x0000000000400000 -4 MB
UFS LU1 Size: 0x0000000000400000 -4 MB
UFS LU2 Size: 0x0000000EE5800000 -59,586 GB
UFS CID : *OH9HQ53AECMMDAR
UFS UNIQID : 0d80f85332a0000000000000

Reading GPT-UFS [0x00008000] 130 Items

Flashing Selected Partitions....
- preloader[preloader_begonia.bin] 512 KB Skipped
- recovery[recovery.img] 64 MB Flash -> = Ok
- vbmeta[vbmeta.img] 8 MB Flash -> = Ok
- efuse[efuse.img] 512 KB Flash -> = Ok
- md1img[md1img.img] 150 MB Flash -> = Ok
- spmfw[spmfw.img] 1024 KB Flash -> = Ok
- audio_dsp[audio_dsp.img] 4 MB Flash -> = Ok
- scp1[scp.img] 6 MB Flash -> = Ok
- scp2[scp.img] 6 MB Flash -> = Ok
- sspm_1[sspm.img] 1024 KB Flash -> = Ok
- sspm_2[sspm.img] 1024 KB Flash -> = Ok
- cam_vpu1[cam_vpu1.img] 15 MB Flash -> = Ok
- cam_vpu2[cam_vpu2.img] 15 MB Flash -> = Ok
- cam_vpu3[cam_vpu3.img] 15 MB Flash -> = Ok
- gz1[gz.img] 32 MB Flash -> = Ok
- gz2[gz.img] 32 MB Flash -> = Ok
- lk[lk.img] 2 MB Flash -> = Ok
- lk2[lk.img] 2 MB Flash -> = Ok
- boot[boot.img] 64 MB Flash -> = Ok
- logo[logo.bin] 64 MB Flash -> = Ok
- dtbo[dtbo.img] 32 MB Flash -> = Ok
- tee1[tee.img] 5 MB Flash -> = Ok
- tee2[tee.img] 9,5 MB Flash -> = Ok
- vendor[vendor.img] 1,5 GB Flash -> = Ok
- system[system.img] 3,5 GB Flash -> = Ok
- cache[cache.img] 432 MB Flash -> = Ok
- gsort[gsort.img] 16 MB Flash -> = Ok
- oem_misc1[oem_misc1.img] 16 MB Flash -> = Ok
- exaid[exaid.img] 128 MB Flash -> = Ok
- cust[cust.img] 832 MB Flash -> = Ok
- userdata[userdata.img] 12 GB Flash -> = Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

TPortConnection.Destroy.....Closing...Ok..
=====================================

Elapsed Time : 00:02:16
BR
Dipendra Pathak

  Reply With Quote
Old 02-23-2021, 07:54   #1312 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Levevo K33A42 (Vibe K6 Power) zero FRP successfully done by Hydra Tool

Levevo K33A42 (Vibe K6 Power) zero FRP successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : LENOVO Model : K33A42 (Vibe K6 Power) Storage : Auto
Loader: LV_1_9.mbn
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM12)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&16bdd27b&0&1#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :03/21/2018,2.1.3.1

Getting device info......
Serial No.: 0x91644C7C
MSM ID : 0x0004F0E1, MSM8937-Qualcomm Snapdragon 430
PBL Ver : 00000000
PK HASH : 99C8C13E374C34D8F9AFB065EA4C733E
6B1B21CBC5A78705F041EB24ACDD5FE5

Firehose Loader[LV_1_9.mbn]
SaharaBoot... Ok
Sending ....................Ok
Connecting to Firehose...
Ping... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 3927822916
Firmware Version : 7
Product Name : QE13MB
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 30535680[14.561 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok

Phone Information.....
Brand : Lenovo
Vendor : LENOVO
Model : Lenovo K33
ID : MMB29M
SDK : 23
Release : 6.0.1
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-US
Description : karate-user 6.0.1 MMB29M K33_S156_170220_ROW release-keys
Device : K33
Board : QC_Reference_Phone
Display ID : K33_S156_170220_ROW
Security Patch : 2017-01-01
Emmc_size : 16GB
Platform : msm8937
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : Lenovo/karate/K33:6.0.1/MMB29M/K33_S156_170220_ROW:user/release-keys

Reading GPT[3]
Drive [0] 56 Items
Drive [1] 0 Items
Drive [2] 0 Items

Removing FRPta...
Method :
Zero Wipe
Processing...
- Removing FRP [Zero Wipe] OkOk

Elapsed Time : 00:00:07
BR
Dipendra Pathak

  Reply With Quote
Old 02-24-2021, 17:01   #1313 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Cheerry Mobile Flare J2S Zero WIpe FRP successfully Done by Hydra Tool

Cheerry Mobile Flare J2S Zero WIpe FRP successfully Done by Hydra Tool

Screen Short:




BR
Dipendra Pathak
  Reply With Quote
Old 02-24-2021, 17:07   #1314 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Vivo Y30 FRP partition successfully done by Hydra Tool

Vivo Y30 FRP partition successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
Brand : VIVO Model : Y30 Connection : Flash Mode

=====================================
Connection
-Please wait...
-Connect Phone...
-Found...
-PreLoader...[COM13]

TPortConnection.Create...(COM13)..Opening...Ok

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0766 (0000)MT6765[6765]
BROM HW_SW_VER : 8A00 CA00 0000 0000

Handshaking...

Identifying Hardware ID.....
BROM CPUID : 0766 (0000)MT6765[6765]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
SECURE VERSION : FF
BL VERSION : 03
BR Secured : 05
NORMAL BOOT

Preparing Download Agent..
DA : 6765_PL.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2018/03/20.21:09_402229+403250
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : preloader

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC
Sending Certifificate

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : CDB55C6C2EF8EDC831D832B441A3CADE
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000030000000 -768 MB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58,242 GB
eMMC CID : 1501004448364441420289276AB1478B - DH6DAB

DA Speed : high-speed
DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_k65v1_64_bsp.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\__0766--__230221184736\MT6765_Android_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x08588000]1024 KB ->frp.bin...Ok
-nvdata[0x0A688000]64 MB ->nvdata.bin...Ok
-persist[0x32000000]48 MB ->persist.bin...Ok
-nvram[0x3DE80000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\__0766--__230221184736
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : CDB55C6C2EF8EDC831D832B441A3CADE
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000030000000 -768 MB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58,242 GB
eMMC CID : 1501004448364441420289276AB1478B - DH6DAB

Reading GPT-EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition...[C002002A-STATUS_SEC_IMG_TYPE_MISMATCH]
Erasing FRP Partition... Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:53
BR
Dipendra Pathak

  Reply With Quote
Old 02-24-2021, 17:11   #1315 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Xiaomi Redmi 6A (Cactus) Safe format successfully done by Hydra Tool

Xiaomi Redmi 6A (Cactus) Safe format successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
Brand : XIAOMI Model : Redmi 6A (cactus) Connection : Flash Mode

=====================================
Connection
-Please wait...
-Found...[COM21]

TPortConnection.Create...(COM21)..Opening...Ok

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 25AB356D2DA4434D0051343608F1B2B7
ERAM Size : 0x000000000003A000 -232 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003A3E00000 -14.561 GB
eMMC CID : 150100514536334D4203094D96A6B523 - QE63MB

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi 6A
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : zh-CN
Description : cactus-user 9 PPR1.180610.011 20.1.9 release-keys
Miui Ver : V11
Device : cactus
Display ID : SW_S98506AE1_V000_M13_XM_C3C_USR_MP
Security Patch : 2020-01-01
Fingerprint : xiaomi/cactus/cactus:9/PPR1.180610.011/20.1.9:user/release-keys
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition...
Safeformat Universal... Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:06
BR
Dipendra Pathak

  Reply With Quote
Old 02-25-2021, 02:21   #1316 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Cherry Mobile Flare J8 LTD safe format successfully done by Hydra Tool

Cherry Mobile Flare J8 LTD safe format successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
Brand : CHERRY MOBILE Model : Flare J8 LTE Connection : Flash Mode

=====================================
Connection
-Please wait...
-Found...
-PreLoader...[COM16]

TPortConnection.Create...(COM16)..Opening...Ok

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 061A099131384541D3CA9F20C2A317C1
ERAM Size : 0x0000000000020000 -128 KB
IRAM Size : 0x0000000040000000 -1024 MB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000001D2000000 -7.281 GB
eMMC CID : 13014E51324A3935541000620191721D - Q2J95T

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Brand : Cherry_Mobile
Vendor : Cherry_Mobile
Model : Flare J8 LTE
ID : O11019
SDK : 27
Release : 8.1.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-US
Description : full_k39tv1_bsp_1g-user 8.1.0 O11019 1553612841 release-keys
Device : Flare_J8_LTE
Display ID : Cherry_H1840_Flare_J8_LTE_03262019_V03
Security Patch : 2019-03-05
Fingerprint : Cherry_Mobile/Flare_J8_LTE/Flare_J8_LTE:8.1.0/O11019/1553612841:user/release-keys
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Safe Format Method 1
Processing...
Erasing FRP Partition...
Safeformat Universal... Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:07
BR
Dipendra Pathak

  Reply With Quote
Old 02-25-2021, 02:27   #1317 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Xiaomi Redmi Note 9 (merlin) Mi account & FRP successfully removed together by Hydra

Xiaomi Redmi Note 9 (merlin) Mi account and FRP successfully removed together by Hydra Tool

Screen Short:



Logs:

Quote:
Brand : XIAOMI Model : Redmi Note 9 (merlin) Connection : Flash Mode

=====================================
How To Boot : Power off phone
* BROM Mode : Press VOL + or Press VOL -+
* Preloader Mode : Just Insert cable

Connection
-Please wait...
-Connect Phone...
-Found...[COM45]

TPortConnection.Create...(COM45)..Opening...Ok

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0707MT6768[6768]
BROM HW_SW_VER : 8A00 CA00 0000 0000
getMTKPayloadExploit : 0707
#Executing Exploit..
#SUCCESS..

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0707MT6768[6768]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
SECURE VERSION : 05
BL VERSION : FE
BR Secured : E0

Preparing Download Agent..
DA : 6768.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2020-11-03.22:07_536568
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...[ERROR]- NOT SYNC
=============================================
Reasons why it fails due to the following"
1. Harware problem/issues
2. If you did Testpoint Kindly check the parts you Touch/TP
3. Powershortage, try to connect Battery
4. Check or replace usb cable and plug directly to your pc usb port.
=============================================

Mode : brom
Preloader Initialization...
Parsing preloader_merlin.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : EFF920C569F08F851EE15DF42A32F7C4
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000001D1EC00000 -116.48 GB
eMMC CID : 150100445636444142024AEBE4096793 - DV6DAB

DA Speed : high-speed
DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_merlin.bin
Creating Scatter file... C:\Users\*******\Downloads\HydraTool_Fullpackage_0 2-20-2021\\Backup\Auto\__0707--__230221180009\MT6768_Android_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x05508000]1024 KB ->frp.bin...Ok
-nvdata[0x0C4A2000]64 MB ->nvdata.bin...Ok
-persist[0x104A2000]48 MB ->persist.bin...Ok
-nvram[0x19F80000]64 MB ->nvram.bin...Ok
Done!!!
C:\Users\********\Downloads\HydraTool_Fullpackage_ 02-20-2021\\Backup\Auto\__0707--__230221180009
MTK Phone Loader is NOW RUNNING.

TPortConnection.Destroy.....Closing...Ok..
=====================================

Elapsed Time : 00:00:52
BR
Dipendra Pathak

  Reply With Quote
Old 02-25-2021, 02:32   #1318 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Xiaomi Redmi Note 8 Pro (begonia) successfully Formatted by Hydra Tool

Xiaomi Redmi Note 8 Pro (begonia) successfully Formatted by Hydra Tool

Screen Short:



Logs:

Quote:
Brand : XIAOMI Model : Redmi Note 8 Pro (begonia) Connection : Flash Mode

=====================================
Connection
-Please wait...
-Found...[COM5]

TPortConnection.Create...(COM5)..Opening...Ok

Handshaking...

Identifying Hardware ID.....
BROM CPUID : 0813MT6785[6785]
BROM HW_SW_VER : 8A00 CA00 0000 0000
getMTKPayloadExploit : 0813
#Executing Exploit..
#SUCCESS..

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0813MT6785[6785]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
SECURE VERSION : 05
BL VERSION : FE
BR Secured : E0

Preparing Download Agent..
DA : 6785.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2020-11-03.22:07_536568
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_begonia.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : A89EC75EF06DFD3642E4F5D2EA98D756
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x0000000180000000 -6 GB
UFS LU0 Size: 0x0000000000400000 -4 MB
UFS LU1 Size: 0x0000000000400000 -4 MB
UFS LU2 Size: 0x0000001DCB000000 -119.172 GB
UFS CID : ,?MT128GASAO4U21
UFS UNIQID : 11240dcaca9902052000000000000000

DA Speed : high-speed
DA Speed : high-speed

Reading GPT-UFS [0x00008000] 130 Items

Reading System Info
Vendor : Xiaomi
ID : QP1A.190711.020
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : begonia-user 10 QP1A.190711.020 V12.0.2.0.QGGEUXM release-keys
Miui Ver : V12
Mod_device : begonia_eea_global
Display ID : QP1A.190711.020
Security Patch : 2020-09-01
StorageType : mtp
Userdata State : Not Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader....
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x05888000]1024 KB ->frp.bin...Ok
-nvdata[0x08188000]64 MB ->nvdata.bin...Ok
-persist[0x0E188000]70.469 MB ->persist.bin...Ok
-nvram[0x17580000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\__0813--10_QP1A.190711.020_240221074621
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : A89EC75EF06DFD3642E4F5D2EA98D756
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x0000000180000000 -6 GB
UFS LU0 Size: 0x0000000000400000 -4 MB
UFS LU1 Size: 0x0000000000400000 -4 MB
UFS LU2 Size: 0x0000001DCB000000 -119.172 GB
UFS CID : ,?MT128GASAO4U21
UFS UNIQID : 11240dcaca9902052000000000000000

Reading GPT-UFS [0x00008000] 130 Items


Reading System Info
Vendor : Xiaomi
ID : QP1A.190711.020
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : begonia-user 10 QP1A.190711.020 V12.0.2.0.QGGEUXM release-keys
Miui Ver : V12
Mod_device : begonia_eea_global
Display ID : QP1A.190711.020
Security Patch : 2020-09-01
StorageType : mtp
Userdata State : Not Encrypted

-------------------------------------
Operation : Auto
Processing...
Safeformat Universal...[C002004B-]
Formatting Userdata... Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:32
BR
Dipendra Pathak

  Reply With Quote
Old 02-25-2021, 02:38   #1319 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Xiaomi Mi 8 Lite (Platina) Mi account successfully Disabling by Hydra Tool

Xiaomi Mi8 Lite (Platina) Mi account successfully Disabling by Hydra Tool

Screen Short:



Logs:

Quote:
Starting ADB Server....
Searching Device By ADB
Device Found...
Model : MI 8 Lite
Brand : Xiaomi
Android Ver : 8.1.0
CPU abi : arm64-v8a
Software Version :
CSC Version :
Bootloader :
Board : sdm660
Display ID : OPM1.171019.019
Security Patch : 2018-12-01
Emmc_size :
Platform : sdm660
Kernel ID : 2018-12-01
Marketname :
OTA Version Name :
SYS USB CONFIG : persist.adb
FRPPST : /dev/block/bootdevice/by-name/frp
FingerPrint : Xiaomi/platina/platina:8.1.0/OPM1.171019.019/V10.2.2.0.ODTMIXM:user/release-keys

Checking Root Status....
Root Status : Not Rooted

ADB MiAccount...

Processing...
Disbaling MI Account
Please wait...
Disabled Mi Account Success
Action Result : Ok

Elapsed Time : 00:00:02
BR
Dipendra Pathak

  Reply With Quote
Old 02-25-2021, 02:43   #1320 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Qnt T702 Reading Pattern successfully done by Hydra Tool

Qnt T702 Reading Pattern successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
Brand : AUTO Model : AUTO Connection : Flash Mode

=====================================
Connection
-Please wait...
-Found...[COM19]

TPortConnection.Create...(COM19)..Opening...Ok


Reading System Info
Brand : Qnet
Vendor : alps
Model : T702
ID : LMY47I
SDK : 22
Release : 5.1
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Description : full_hct6580_weg_a_l-user 5.1 LMY47I 1560392930 test-keys
Device : Glory_G5
Display ID : LMY47I test-keys
Security Patch : 2016-06-01
Platform : mt6580
FRPPST : /dev/block/platform/mtk-msdc.0/by-name/frp
Fingerprint : alps/full_hct6580_weg_a_l/hct6580_weg_a_l:5.1/LMY47I/1560392930:user/test-keys
StorageType : mtp
Userdata State : Not Encrypted

-------------------------------------
Operation : Read Pattern
Processing...
Searching PatternKey : . Found
Gesture Data : 5F59ED28AD9F83E7D808B76F1003FDA7EABC2FFC
Bruteforcing pattern hash..Please wait for few seconds
Pattern Code : 235789
1 2 3
4 5 6
7 8 9

Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:04
BR
Dipendra Pathak

  Reply With Quote
Reply

Bookmarks


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


 



All times are GMT +1. The time now is 03:46.



Powered by Searchlight © 2024 Axivo Inc.
vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2024 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2023 -
Page generated in 0.45700 seconds with 9 queries

SEO by vBSEO