GSM Shop GSM Shop
GSM-Forum  

Welcome to the GSM-Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features.
Only registered members may post questions, contact other members or search our database of over 8 million posts.

Registration is fast, simple and absolutely free so please - Click to REGISTER!

If you have any problems with the registration process or your account login, please contact contact us .

Go Back   GSM-Forum > Product Support Sections > Special Solutions / Services / WebShop > GSMFABRICA Products > HYDRA TOOL


Reply
 
LinkBack Thread Tools Display Modes
Old 02-25-2021, 02:47   #1321 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
MTK 6779 Factory Reset successfully done by Hydra Tool


MTK 6779 Factory Reset successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
Brand : AUTO Model : AUTO Connection : Meta Mode

---------------------------------
TPortConnection.Create...(COM89)..Opening...Ok

META Phone Info . . .
MCUID: 8U ` mt6779
ME_SO:
DATE : Thu Dec 24 22:14:50 CST 2020
MODEL: CPH2043_11_C.14
ME_SWVER: CPH2043export_11_C.14_202012242331


Reset to Factory Default Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:01
BR
Dipendra Pathak

  Reply With Quote
Old 02-25-2021, 02:51   #1322 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Xiaomi Mi 8 Lite (Platina) Flashing Successfully Done

Xiaomi Mi 8 Lite (Platina) Flashing Successfully Done

Screen Short:



Logs:

Quote:
Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM45)
SymbolicName :\??\USB#VID_05C6&PID_9008#6&3ae11b61&0&1#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :10/21/2014,2.0.9.6

Getting device info......
Serial No.: 0x19AB6254
MSM ID : 0x0008C0E1, SDM660-Qualcomm Snapdragon 660
PBL Ver : 00000000
PK HASH : A7B8B82545A98ECA23D6E9105FB46456
8D1B5828264903441BDEF0CD57E3C370

Firehose Loader[mi_2_9.elf]
SaharaBoot... Ok
Sending ...............................Ok
Connecting to Firehose...
Ping......... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : MSM8996
Version : 1
DateTime : Aug 2 2018 - 22:27:53

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 1669055522
Firmware Version : 875573296
Product Name : hC8aP>
Physical Partitions : 4
Total Logical Blocks:
Drive [0] 122142720[58,242 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Drive [3] 32768[16 MB]

Protocol : Universal
Running : Ok

Phone Information......
Vendor : Xiaomi
ID : QKQ1.190910.002
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Miui Ver : V12
Mod_device : platina_global
Security Patch : 2020-08-01

Reading GPT[4]
Drive [0] 80 Items
Drive [1] 0 Items
Drive [2] 0 Items
Drive [3]


Backup Security partitions...
Reading Security Items....
> modemst1
> modemst2
> fsg
C:\Hydra Tool\Backup\Security_Backup\__10_Security_02232119 1958.sec
Backup Security Success....

----------------------------
Flashing Selected Partitions....
- switch(0)[dummy.img] Ok
- storsec(0)[storsec.mbn] Ok
- storsecbak(0)[storsec.mbn] Ok
- rpm(0)[rpm.mbn] Ok
- rpmbak(0)[rpm.mbn] Ok
- hyp(0)[hyp.mbn] Ok
- hypbak(0)[hyp.mbn] Ok
- cmnlib(0)[cmnlib.mbn] Ok
- cmnlibbak(0)[cmnlib.mbn] Ok
- cmnlib64(0)[cmnlib64.mbn] Ok
- cmnlib64bak(0)[cmnlib64.mbn] Ok
- keymaster(0)[keymaster64.mbn] Ok
- keymasterbak(0)[keymaster64.mbn] Ok
- pmic(0)[pmic.elf] Ok
- pmicbak(0)[pmic.elf] Ok
- bluetooth(0)[BTFM.bin] Ok
- devcfg(0)[devcfg.mbn] Ok
- devcfgbak(0)[devcfg.mbn] Ok
- abl(0)[abl.elf] Ok
- ablbak(0)[abl.elf] Ok
- misc(0)[dummy.img] Ok
- xbl(0)[xbl.elf] Ok
- xblbak(0)[xbl.elf] Ok
- tz(0)[tz.mbn] Ok
- tzbak(0)[tz.mbn] Ok
- logfs(0)[logfs_ufs_8mb.bin] Ok
- dsp(0)[dspso.bin] Ok
- logo(0)[logo.img] Ok
- persist(0)[persist.img] Skipped
- boot(0)[boot.img] Ok
- recovery(0)[recovery.img] Ok
- modem(0)[NON-HLOS.bin] Ok
- cache(0)[cache.img] Ok
- cust(0)[cust.img] Ok
- system(0)[system.img] Ok
- vendor(0)[vendor.img] Ok
- userdata(0)[userdata.img] Ok
- PrimaryGPT(0)[gpt_main0.bin] Ok

Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-33.] OK
0 [CRC32(2,10240)] OK
0 [CRC32(NUM_DISK_SECTORS-33.,10240)] OK
0 [0] OK
0 [CRC32(1,92)] OK
0 [0] OK
0 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 0
Set bootable storage drive 0 Ok

Rebooting Phone.... Ok

Elapsed Time : 00:03:28
BR
Dipendra Pathak

  Reply With Quote
Old 02-25-2021, 15:43   #1323 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Oppo A1K (CPH1923) Formatted user data Successfully done by Hydra Tool

Oppo A1K (CPH1923) Formatted user data Successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
Brand : OPPO Model : A1k (CPH1923) Connection : Flash Mode

=====================================
Connection
-Please wait...
-Connect Phone...
-Found...[COM24]

TPortConnection.Create...(COM24)..Opening...Ok

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0766MT6765[6765]
BROM HW_SW_VER : 8A00 CA00 0000 0000
getMTKPayloadExploit : 0766
#Executing Exploit..
#SUCCESS..

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0766MT6765[6765]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
SECURE VERSION : 05
BL VERSION : FE
BR Secured : 00
NORMAL BOOT

Preparing Download Agent..
DA : [Not Exist]
Trying Default 6765.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2020-11-03.22:07_536568
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_oppo6762_18540.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 9172BE03632D5F636F9ED7C905C699DB
ERAM Size : 0x000000000003A000 -232 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 150100514436334D42037C8090BCA6F9 - QD63MB

DA Speed : high-speed
DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info
Vendor : OPPO
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6762_18540-user 9 PPR1.180610.011 eng.root.20201221.133342 release-keys
Security Patch : 2021-01-05
StorageType : mtp
Userdata State : Not Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_oppo6762_18540.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\__0766--9__250221112638\MT6765_Android_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x0BE88000]1024 KB ->frp.bin...Ok
-nvdata[0x0E788000]64 MB ->nvdata.bin...Ok
-persist[0x16000000]48 MB ->persist.bin...Ok
-nvram[0x21E00000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\__0766--9__250221112638
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 9172BE03632D5F636F9ED7C905C699DB
ERAM Size : 0x000000000003A000 -232 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 150100514436334D42037C8090BCA6F9 - QD63MB

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Vendor : OPPO
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6762_18540-user 9 PPR1.180610.011 eng.root.20201221.133342 release-keys
Security Patch : 2021-01-05
StorageType : mtp
Userdata State : Not Encrypted

-------------------------------------
Operation : Auto
Processing...
Safeformat Universal...[C002004B-]
Formatting Userdata... Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:46
BR
Dipendra Pathak

  Reply With Quote
Old 02-25-2021, 15:47   #1324 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Huawei JAT-LX3 (Honor Play 8A) Erasing FRP partition successfully done by Hydra Tool

Huawei JAT-LX3 (Honor Play 8A) Erasing FRP partition successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
Brand : HUAWEI Model : JAT-LX3 (Honor Play 8A) Connection : Flash Mode

=====================================
Connection
-Please wait...
-Connect Phone...
-Found...[COM12]

TPortConnection.Create...(COM12)..Opening...Ok

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0766MT6765[6765]
BROM HW_SW_VER : 8A00 CA00 0000 0000

Handshaking...

Identifying Hardware ID.....
BROM CPUID : 0766MT6765[6765]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
SECURE VERSION : 05
BL VERSION : FE
BR Secured : E5[SBC+SDA+SEL]

Security Authorization....
Sending[huawei_auth_sv5_.auth] Accepted

Preparing Download Agent..
DA : Huawei__6765_8A00CA0000000000_00001000_00030000.bi n
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2018/10/18.17:38_452898
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_k62v1_64_mexico.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : FAAA3ACEE18B33EFF7D4983A4CBE0ED7
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 150100475036424D4201CA9C6AFEA6FF - GP6BMB

DA Speed : high-speed
DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info
ERROR reading system image [corrupted/erased]

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_k62v1_64_mexico.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\__0766--__240221214219\MT6765_Android_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x00108000]1024 KB ->frp.bin...Ok
-nvdata[0x00A08000]16 MB ->nvdata.bin...Ok
-persist[0x03800000]8 MB ->persist.bin...Ok
-nvram[0x04400000]5 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\__0766--__240221214219
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : FAAA3ACEE18B33EFF7D4983A4CBE0ED7
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 150100475036424D4201CA9C6AFEA6FF - GP6BMB

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
ERROR reading system image [corrupted/erased]

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition...[C002002A-STATUS_SEC_IMG_TYPE_MISMATCH]
Erasing FRP Partition... Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:33
BR
Dipendra Pathak

  Reply With Quote
Old 02-25-2021, 15:52   #1325 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Cherry Mobile Flare Y3 Safe format successfully Done by Hydra Tool

Cherry Mobile Flare Y3 Safe format successfully Done by Hydra Tool

Screen Short:



Logs:

Quote:
Brand : AUTO Model : AUTO Connection : Flash Mode

=====================================
Connection
-Please wait...
-Found...[COM33]

TPortConnection.Create...(COM33)..Opening...Ok


Reading System Info
Brand : Cherry_Mobile
Vendor : Cherry Mobile
Model : Flare_Y3
ID : O11019
SDK : 27
Release : 8.1.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-US
Description : full_k80hd_bsp_fwv_512m-user 8.1.0 O11019 1535537755 release-keys
Device : FlareY3
Display ID : Cherry_Flare_Y3_08312018_V06
Security Patch : 2018-08-05
Fingerprint : Cherry_Mobile/FlareY3/FlareY3:8.1.0/O11019/1535537755:user/release-keys
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition... [Ok]
Safeformat Universal...(tmp.bin)240 Bytes Ok Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:03
BR
Dipendra Pathak

  Reply With Quote
Old 02-25-2021, 15:58   #1326 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
MTK CPU 6771 Factory Reset successfully done by Hydra Tool

MTK CPU 6771 Factory Reset successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
Brand : AUTO Model : AUTO Connection : Meta Mode

---------------------------------
Please wait..Searching for META Port..
TPortConnection.Create...(COM9)..Opening...Ok

META Phone Info . . .
MCUID: 8U ` mt6771,S01
ME_SO: S01
DATE : Sat Apr 20 20:59:56 CST 2019
MODEL: CPH1825EX_11_A.14_190420
ME_SWVER: CPH1825_11_A.14_190420_a1f19367


Reset to Factory Default Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:02

BR
Dipendra Pathak

  Reply With Quote
Old 02-25-2021, 16:05   #1327 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Oppo Realme C2 (RMX1941) Formatting User Data successfully done by Hydra Tool

Oppo Realme C2 (RMX1941) Formatting User Data successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
Brand : OPPO Model : Realme C2 (RMX1941) Connection : Flash Mode

=====================================
Connection
-Please wait...
-Connect Phone...
-Found...[COM4]

TPortConnection.Create...(COM4)..Opening...Ok

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0766MT6765[6765]
BROM HW_SW_VER : 8A00 CA00 0000 0000
getMTKPayloadExploit : 0766
#Executing Exploit..
#SUCCESS..

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0766MT6765[6765]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
SECURE VERSION : 05
BL VERSION : FE
BR Secured : E0

Preparing Download Agent..
DA : [Not Exist]
Trying Default 6765.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2020-11-03.22:07_536568
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_oppo6762_18540.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 11B5E5C0E8D2D8D72D8D63F0A21FF239
ERAM Size : 0x000000000003A000 -232 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 150100514436334D42035F57D3CA86A3 - QD63MB

DA Speed : high-speed
DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info
Vendor : Realme
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6762_18540-user 9 PPR1.180610.011 eng.root.20190919.214712 release-keys
Security Patch : 2019-09-05
StorageType : mtp
Userdata State : Not Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_oppo6762_18540.bin
Creating Scatter file... C:\Users\RMM\Desktop\HYDRA\\Backup\Auto\__0766--9__250221103506\MT6765_Android_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x0BE88000]1024 KB ->frp.bin...Ok
-nvdata[0x0E788000]64 MB ->nvdata.bin...Ok
-persist[0x16000000]48 MB ->persist.bin...Ok
-nvram[0x21E00000]64 MB ->nvram.bin...Ok
Done!!!
C:\Users\RMM\Desktop\HYDRA\\Backup\Auto\__0766--9__250221103506
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 11B5E5C0E8D2D8D72D8D63F0A21FF239
ERAM Size : 0x000000000003A000 -232 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 150100514436334D42035F57D3CA86A3 - QD63MB

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Vendor : Realme
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6762_18540-user 9 PPR1.180610.011 eng.root.20190919.214712 release-keys
Security Patch : 2019-09-05
StorageType : mtp
Userdata State : Not Encrypted

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition...[C002002A-STATUS_SEC_IMG_TYPE_MISMATCH]
Erasing FRP Partition...
Safeformat Universal...[C002004B-]
Formatting Userdata... Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:51
BR
Dipendra Pathak

  Reply With Quote
Old 02-25-2021, 16:14   #1328 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Cherry Mobile Flare S8 Successfully Flashed selected partition by Hydra Tool

Cherry Mobile Flare S8 Successfully Flashed selected partition by Hydra Tool

Screen Short:



Logs:

Quote:
Brand : CHERRY MOBILE Model : Flare S8 Connection : Flash Mode

=====================================
How To Boot : Power off phone
* BROM Mode : Press VOL + or Press VOL -+
* Preloader Mode : Just Insert cable

Connection
-Please wait...
-Found...
-PreLoader...[COM13]

TPortConnection.Create...(COM13)..Opening...Ok


Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 2BBA07F5C871AEEA0EC1C5A45AC7FE38
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 90014A68423861503E020F4C414D44C7 - hB8aP>

Reading GPT-EMMC [0x00008000] 130 Items

Flashing Selected Partitions....
- recovery[recovery.img] 32 MB Flash -> = Ok
- md1img[md1img.img] 64 MB Flash -> = Ok
- md1dsp[md1dsp.img] 16 MB Flash -> = Ok
- spmfw[spmfw.img] 1024 KB Flash -> = Ok
- sspm_1[sspm.img] 1024 KB Flash -> = Ok
- sspm_2[sspm.img] 1024 KB Flash -> = Ok
- lk[lk.bin] 1024 KB Flash -> = Ok
- lk2[lk.bin] 1024 KB Flash -> = Ok
- boot[boot.img] 32 MB Flash -> = Ok
- logo[logo.bin] 8 MB Flash -> = Ok
- vendor[vendor.img] 448 MB Flash -> = Ok
- system[system.img] 2.586 GB Flash -> = Ok
- cache[cache.img] 112 MB Flash -> = Ok
- userdata[userdata.img] 0 Bytes Flash -> = Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

TPortConnection.Destroy.....Closing...Ok..
=====================================

Elapsed Time : 00:01:56
BR
Dipendra Pathak

  Reply With Quote
Old 02-25-2021, 16:22   #1329 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Xioami Redmi Mi 8 Successfully Flashed by Hydra Tool

Xioami Mi 8 Successfully Flashed by Hydra Tool

Screen Short:



Logs:

Quote:
Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM145)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&2ce07ca9&0&3#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/31/2015,2.1.2.0

Getting device info......
Serial No.: 0xEE7ECC54
MSM ID : 0x0008B0E1, SDM845-Qualcomm Snapdragon 845
PBL Ver : 00000000
PK HASH : C924A35F39CE1CDD1B8D5A9F3B8E3C51
317930431D7A9DD5A55028CF6965FE65

Firehose Loader[prog_ufs_firehose_sdm845_ddr_10.elf]
SaharaBoot... Ok
Sending .....................................Ok
Connecting to Firehose...
Ping..................... Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[r
Checking Internet connection....
- Hydra Is Online
Connecting to Hydra Xiaomi Server...

Signature @256bytes Authentication.... Accepted........
Identifying Chip........UFS
Ok
Chip Configuration :
MemoryName : UFS
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Aug 17 2019 - 16:08:38

*** STORAGE DEVICE INFO ***
Memory Type : UFS
Block Size in Bytes : 4096
Page Size : 4096
Manufacturer ID : 462
Serial Number : 1297306958
Firmware Version : 500
Product Name : KLUDG4U1EA-B0C1
Physical Partitions : 6
Total Logical Blocks:
Drive [0] 30038016[114,586 GB]
Drive [1] 2048[8 MB]
Drive [2] 2048[8 MB]
Drive [3] 8192[32 MB]
Drive [4] 1179648[4,5 GB]
Drive [5] 8192[32 MB]

Protocol : Universal
Running : Ok

Phone Information.....
Brand : Xiaomi
Vendor : Xiaomi
Model : MI 8
ID : OPM1.171019.011
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : dipper-user 8.1.0 OPM1.171019.011 V9.5.13.0.OEAMIFA release-keys
Miui Ver : V9
Device : dipper
Mod_device : dipper_global
Display ID : OPM1.171019.011
Security Patch : 2018-06-01
Fingerprint : Xiaomi/dipper/dipper:8.1.0/OPM1.171019.011/V9.5.13.0.OEAMIFA:user/release-keys

Reading GPT[6]
Drive [0] 32 Items
Drive [1] 32 Items
Drive [2] 32 Items
Drive [3] 32 Items
Drive [4] 64 Items
Drive [5] 32 Items


Backup Security partitions...
Reading Security Items....
> modemst1
> modemst2
> fsg
C:\Users\user\Desktop\Новая папка (5)\Backup\Security_Backup\MI 8__8.1.0_Security_022521091916.sec
Backup Security Success....

----------------------------
Flashing Selected Partitions....
- switch(0)[dummy.img] Ok
- misc(0)[misc.img] Ok
- logfs(0)[logfs_ufs_8mb.bin] Ok
- persist(0)[persist.img] Skipped
- cust(0)[cust.img] Ok
- recovery(0)[recovery.img] Ok
- cache(0)[cache.img] Ok
- userdata(0)[userdata.img] Ok
- PrimaryGPT(0)[gpt_main0.bin] Ok
- xbl_config_a(1)[xbl_config.img] Ok
- xbl_a(1)[xbl.img] Ok
- PrimaryGPT(1)[gpt_main1.bin] Ok
- xbl_config_b(2)[xbl_config.img] Ok
- xbl_b(2)[xbl.img] Ok
- PrimaryGPT(2)[gpt_main2.bin] Ok
- PrimaryGPT(3)[gpt_main3.bin] Ok
- sec(4)[sec.dat] Skipped
- limits(4)[dummy.img] Ok
- qupfw_a(4)[qupfw.img] Ok
- qupfw_b(4)[qupfw.img] Ok
- storsec_a(4)[storsec.img] Ok
- storsec_b(4)[storsec.img] Ok
- devcfg_a(4)[devcfg.img] Ok
- devcfg_b(4)[devcfg.img] Ok
- aop_a(4)[aop.img] Ok
- aop_b(4)[aop.img] Ok
- cmnlib_a(4)[cmnlib.img] Ok
- cmnlib_b(4)[cmnlib.img] Ok
- cmnlib64_a(4)[cmnlib64.img] Ok
- cmnlib64_b(4)[cmnlib64.img] Ok
- keymaster_a(4)[keymaster.img] Ok
- keymaster_b(4)[keymaster.img] Ok
- bluetooth(4)[bluetooth.img] Ok
- hyp_a(4)[hyp.img] Ok
- hyp_b(4)[hyp.img] Ok
- abl_a(4)[abl.img] Ok
- abl_b(4)[abl.img] Ok
- tz_a(4)[tz.img] Ok
- tz_b(4)[tz.img] Ok
- logo(4)[logo.img] Ok
- dsp(4)[dsp.img] Ok
- boot(4)[boot.img] Ok
- modem(4)[modem.img] Ok
- vendor(4)[vendor.img] Ok
- system(4)[system.img] Ok
- PrimaryGPT(4)[gpt_main4.bin] Ok
- ImageFv(5)[imagefv.elf] Ok
- PrimaryGPT(5)[gpt_main5.bin] Ok

Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-6.] OK
0 [NUM_DISK_SECTORS-6.] OK
0 [NUM_DISK_SECTORS-6.] OK
0 [NUM_DISK_SECTORS-6.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-5.] OK
0 [CRC32(2,4096)] OK
0 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
0 [0] OK
0 [CRC32(1,92)] OK
0 [0] OK
0 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
1 [NUM_DISK_SECTORS-6.] OK
1 [NUM_DISK_SECTORS-6.] OK
1 [NUM_DISK_SECTORS-6.] OK
1 [NUM_DISK_SECTORS-6.] OK
1 [NUM_DISK_SECTORS-1.] OK
1 [NUM_DISK_SECTORS-1.] OK
1 [NUM_DISK_SECTORS-5.] OK
1 [CRC32(2,4096)] OK
1 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
1 [0] OK
1 [CRC32(1,92)] OK
1 [0] OK
1 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
2 [NUM_DISK_SECTORS-6.] OK
2 [NUM_DISK_SECTORS-6.] OK
2 [NUM_DISK_SECTORS-6.] OK
2 [NUM_DISK_SECTORS-6.] OK
2 [NUM_DISK_SECTORS-1.] OK
2 [NUM_DISK_SECTORS-1.] OK
2 [NUM_DISK_SECTORS-5.] OK
2 [CRC32(2,4096)] OK
2 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
2 [0] OK
2 [CRC32(1,92)] OK
2 [0] OK
2 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
3 [NUM_DISK_SECTORS-6.] OK
3 [NUM_DISK_SECTORS-6.] OK
3 [NUM_DISK_SECTORS-6.] OK
3 [NUM_DISK_SECTORS-6.] OK
3 [NUM_DISK_SECTORS-1.] OK
3 [NUM_DISK_SECTORS-1.] OK
3 [NUM_DISK_SECTORS-5.] OK
3 [CRC32(2,4096)] OK
3 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
3 [0] OK
3 [CRC32(1,92)] OK
3 [0] OK
3 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
4 [NUM_DISK_SECTORS-6.] OK
4 [NUM_DISK_SECTORS-6.] OK
4 [NUM_DISK_SECTORS-6.] OK
4 [NUM_DISK_SECTORS-6.] OK
4 [NUM_DISK_SECTORS-1.] OK
4 [NUM_DISK_SECTORS-1.] OK
4 [NUM_DISK_SECTORS-5.] OK
4 [CRC32(2,8192)] OK
4 [CRC32(NUM_DISK_SECTORS-5.,8192)] OK
4 [0] OK
4 [CRC32(1,92)] OK
4 [0] OK
4 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
5 [NUM_DISK_SECTORS-6.] OK
5 [NUM_DISK_SECTORS-6.] OK
5 [NUM_DISK_SECTORS-6.] OK
5 [NUM_DISK_SECTORS-6.] OK
5 [NUM_DISK_SECTORS-1.] OK
5 [NUM_DISK_SECTORS-1.] OK
5 [NUM_DISK_SECTORS-5.] OK
5 [CRC32(2,4096)] OK
5 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
5 [0] OK
5 [CRC32(1,92)] OK
5 [0] OK
5 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 1
Set bootable storage drive 1 Ok

Rebooting Phone.... Ok

Elapsed Time : 00:09:44
BR
Dipendra Pathak

  Reply With Quote
Old 02-26-2021, 03:33   #1330 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Xiaomi Redmi Note 6 Pro (tulip) Micron Patched Mi Account Successfully Done by Hydra

Xiaomi Redmi Note 6 Pro (tulip) Micron Patched Mi Account Successfully Done by Hydra Tool

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : XIAOMI Model : Redmi Note 6 Pro (tulip) Micron Storage : Auto
Loader: Redmi_Note_6_Pro_Micron.elf
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM64)
SymbolicName :\??\USB#VID_05C6&PID_9008#6&57fdb7a&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :03/25/2016,2.1.2.2

Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping...... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : MSM8996
Version : 1
DateTime : Aug 2 2018 - 22:27:53

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 69
Serial Number : 208327997
Firmware Version : 3977066805590111797
Product Name : DA4064
Physical Partitions : 4
Total Logical Blocks:
Drive [0] 122142720[58.242 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Drive [3] 32768[16 MB]

Protocol : Universal
Running : Ok
Reading GPT[4]
Drive [0] 64 Items
Drive [1] 0 Items
Drive [2] 0 Items
Drive [3]


Phone Information.....
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi Note 6 Pro
ID : OPM1.171019.011
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : tulip-user 8.1.0 OPM1.171019.011 V10.2.2.0.OEKMIXM release-keys
Miui Ver : V10
Device : tulip
Mod_device : tulip_global
Display ID : OPM1.171019.011
Security Patch : 2019-01-01
Fingerprint : xiaomi/tulip/tulip:8.1.0/OPM1.171019.011/V10.2.2.0.OEKMIXM:user/release-keys

Processing Remove MiAccount[Patch Method]....
Backing up Partition for safety...Ok

Scanning Patching address...
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]Done!!
Total Items patched : 3
Successfully patched address..
Action Result : Ok

Elapsed Time : 00:00:15
BR
Dipendra Pathak

  Reply With Quote
Old 02-26-2021, 03:53   #1331 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Generic Spreadtrum SC6531 Screen Lock Security Successfully read by Hydra Tool

Generic Spreadtrum SC6531 Screen Lock Security Successfully read by Hydra Tool

Screen Short:



Logs:

Quote:
Port : [Auto] Scanning...COM14
TPortConnection.Create...(COM14)..Opening...Ok
FlashID : [EF1760] Size : 0x00800000
IMEI [1] : 357628105******
IMEI [2] : 000000000000000
IMEI [3] : 357628105******
IMEI [4] : 000000000000000

*** Flash Mode #ReadSecurity ***
Reading Security Lock ...
Scanning.....
Code[E8] : ?

Code[3C] : _
Code[E4] : _
Code[A4] : ?

Code[D4] : U?
Code[64] : ?

Code[DC] : ?

Code[00] : ?'
Code[00] : ??
Code[01] : 10082016
Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:50
BR
Dipendra Pathak

  Reply With Quote
Old 02-26-2021, 04:05   #1332 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Oppo Realme 3 (RMX1821) Safe format successfully done by Hydra Tool

Oppo Realme 3 (RMX1821) Safe format successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
Brand : OPPO Model : Realme 3 (RMX1821) Connection : Flash Mode

=====================================
Connection
-Please wait...
-Found...[COM7]

TPortConnection.Create...(COM7)..Opening...Ok

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 438317572B9A55A563BEB9528ED4B552
ERAM Size : 0x0000000000039000 -228 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 90014A484347386134A55160D8BD26AF - HCG8a4

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
ID : QP1A.190711.020
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6771-user 10 QP1A.190711.020 08805472cb0b87b3 release-keys
Display ID : QP1A.190711.020 release-keys
Security Patch : 2021-01-05
StorageType : mtp
Userdata State : Not Encrypted

-------------------------------------
Operation : Auto
Processing...
Safeformat Universal... Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:08
BR
Dipendra Pathak

  Reply With Quote
Old 02-27-2021, 03:35   #1333 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Asus ZA550KL FRP successfully Removed by Hydra Tool

Asus ZA550KL FRP successfully Removed by Hydra Tool

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : AUTO Model : AUTO Storage : Auto
Loader: Auto
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM4)
SymbolicName :\??\USB#VID_05C6&PID_9008#6&182a12da&0&5#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/02/2017,2.1.2.7

Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8917
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 19
Serial Number : 73279894
Firmware Version : 86
Product Name : Q3J96R
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 30777344[14,676 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok

Phone Information.....
Brand : asus
Vendor : asus
Model : ZA550KL
ID : OPR1.170623.032
SDK : 26
Release : 8.0.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : A306-user 8.0.0 OPR1.170623.032 103 release-keys
Display ID : WW_Phone-15.01.2005.141-20200423
Security Patch : 2020-05-05
Emmc_size : 16GB

Reading GPT[3]
Drive [0] 56 Items
Drive [1] 0 Items
Drive [2] 0 Items

Removing FRPta...
Method :
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOkOk

Elapsed Time : 00:00:05
BR
Dipendra Pathak

  Reply With Quote
Old 02-27-2021, 03:42   #1334 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Xiaomi Redmi 5A (riva) successfully flashing done by Hydra Tool

Xiaomi Redmi 5A (riva) successfully flashing done by Hydra Tool

Screen Short:



Logs:

Quote:
Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM16)
SymbolicName :\??\USB#VID_05C6&PID_9008#6&12e3c9ed&0&1#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/31/2015,2.1.2.0

Getting device info......
Serial No.: 0x48A6C3DA
MSM ID : 0x000560E1, MSM8917-Qualcomm Snapdragon 425
PBL Ver : 00000000
PK HASH : 57158EAF1814D78FD2B3105ECE4DB18A
817A08AC664A5782A925F3FF8403D39A

Firehose Loader[mi_1_8.mbn]
SaharaBoot... Ok
Sending ...................Ok
Connecting to Firehose...
Ping... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8917
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 250139327
Firmware Version : 1
Product Name : GD6BMB
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 61071360[29.121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok

Phone Information.....
Brand : Xiaomi
Vendor : Xiaomi
Model : Redmi 5A
ID : N2G47H
SDK : 25
Release : 7.1.2
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : riva-user 7.1.2 N2G47H V9.5.10.0.NCKMIFA release-keys
Miui Ver : V9
Device : riva
Mod_device : riva_global
Board : QC_Reference_Phone
Display ID : N2G47H
Security Patch : 2018-05-01
Emmc_size : 16GB
Platform : msm8937
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : Xiaomi/riva/riva:7.1.2/N2G47H/V9.5.10.0.NCKMIFA:user/release-keys

Reading GPT[3]
Drive [0] 52 Items
Drive [1] 0 Items
Drive [2] 0 Items


Backup Security partitions...
Reading Security Items....
> modemst1
> modemst2
> fsg
C:\Hydra Tool\Backup\Security_Backup\Redmi 5A_QC_Reference_Phone_7.1.2_Security_022621102354. sec
Backup Security Success....

----------------------------
Flashing Selected Partitions....
- modem(0)[NON-HLOS.bin] Ok
- sbl1(0)[sbl1.mbn] Ok
- sbl1bak(0)[sbl1.mbn] Ok
- rpm(0)[rpm.mbn] Ok
- rpmbak(0)[rpm.mbn] Ok
- tz(0)[tz.mbn] Ok
- tzbak(0)[tz.mbn] Ok
- devcfg(0)[devcfg.mbn] Ok
- devcfgbak(0)[devcfg.mbn] Ok
- dsp(0)[adspso.bin] Ok
- splash(0)[splash.img] Ok
- aboot(0)[emmc_appsboot.mbn] Ok
- abootbak(0)[emmc_appsboot.mbn] Ok
- boot(0)[boot.img] Ok
- recovery(0)[recovery.img] Ok
- system(0)[system.img] Ok
- cache(0)[cache.img] Ok
- persist(0)[persist.img] Skipped
- misc(0)[misc.img] Ok
- cmnlib(0)[cmnlib_30.mbn] Ok
- cmnlibbak(0)[cmnlib_30.mbn] Ok
- keymaster(0)[keymaster.mbn] Ok
- keymasterbak(0)[keymaster.mbn] Ok
- cust(0)[cust.img] Ok
- userdata(0)[userdata.img] Ok
- PrimaryGPT(0)[gpt_main0.bin] Ok

Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-33.] OK
0 [CRC32(2,6656)] OK
0 [CRC32(NUM_DISK_SECTORS-33.,6656)] OK
0 [0] OK
0 [CRC32(1,92)] OK
0 [0] OK
0 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 0
Set bootable storage drive 0 Ok

Rebooting Phone.... Ok

Elapsed Time : 00:08:29
BR
Dipendra Pathak

  Reply With Quote
Old 02-27-2021, 03:53   #1335 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Xiaomi Redmi 6A (cactus) removed MI account and FRP successfully done by Hydra Tool

Xiaomi Redmi 6A (cactus) removed MI account and FRP successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
Brand : XIAOMI Model : Redmi 6A (cactus) Connection : Flash Mode

=====================================
Connection
-Please wait...
-Connect Phone...
-Found...[COM3]

TPortConnection.Create...(COM3)..Opening...Ok

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0766MT6765[6765]
BROM HW_SW_VER : 8A00 CA00 0000 0000
getMTKPayloadExploit : 0766
#Executing Exploit..
#SUCCESS..

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0766MT6765[6765]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
SECURE VERSION : 05
BL VERSION : FE
BR Secured : E0

Preparing Download Agent..
DA : 6765.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2020-11-03.22:07_536568
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_cactus.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 476587FA0F75FD81C5E9FF87FE6E04DC
ERAM Size : 0x000000000003A000 -232 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003A3E00000 -14.561 GB
eMMC CID : 150100514536334D4203186D90EDB5A5 - QE63MB

DA Speed : high-speed
DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi 6A
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-GB
Description : cactus-user 9 PPR1.180610.011 V11.0.8.0.PCBMIXM release-keys
Miui Ver : V11
Device : cactus
Mod_device : cactus_global
Display ID : SW_S98506AE1_V009_M13_XM_C3C_USR
Security Patch : 2020-05-01
Fingerprint : xiaomi/cactus/cactus:9/PPR1.180610.011/V11.0.8.0.PCBMIXM:user/release-keys
StorageType : mtp
Userdata State : Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_cactus.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\xiaomi_Redmi 6A_0766--9_SW_S98506AE1_V009_M13_XM_C3C_USR_260221110106\MT 6765_Android_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x05588000]1024 KB ->frp.bin...Ok
-nvdata[0x07688000]64 MB ->nvdata.bin...Ok
-persist[0x0F000000]64 MB ->persist.bin...Ok
-nvram[0x1BE80000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\xiaomi_Redmi 6A_0766--9_SW_S98506AE1_V009_M13_XM_C3C_USR_260221110106
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 476587FA0F75FD81C5E9FF87FE6E04DC
ERAM Size : 0x000000000003A000 -232 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003A3E00000 -14.561 GB
eMMC CID : 150100514536334D4203186D90EDB5A5 - QE63MB

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi 6A
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-GB
Description : cactus-user 9 PPR1.180610.011 V11.0.8.0.PCBMIXM release-keys
Miui Ver : V11
Device : cactus
Mod_device : cactus_global
Display ID : SW_S98506AE1_V009_M13_XM_C3C_USR
Security Patch : 2020-05-01
Fingerprint : xiaomi/cactus/cactus:9/PPR1.180610.011/V11.0.8.0.PCBMIXM:user/release-keys
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Remove MiAccount[Erase Method] + FRP
Processing...
-persist.bin[0x0F000000]64 MB ->persist.bin...Ok
-frp.bin[0x05588000]1024 KB ->frp.bin...Ok
Redmi 6A_9_022621110135
Backing up Partition for safety...
-Redmi 6A_9_022621110135[0x0F000000]64 MB ->persist.img...OkOk
Saved to :
C:\Hydra Tool\Backup\Persist\Redmi 6A_9_022621110135.bin
Erasing FRP Partition...
-persist.bin[0x0F000000]64 MB ->persist.bin...Ok
-frp.bin[0x05588000]1024 KB ->frp.bin...Ok Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:01:33
BR
Dipendra Pathak

  Reply With Quote
Reply

Bookmarks


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


 



All times are GMT +1. The time now is 10:16.



Powered by Searchlight © 2024 Axivo Inc.
vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2024 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2023 -
Page generated in 0.44057 seconds with 10 queries

SEO by vBSEO