GSM Shop GSM Shop
GSM-Forum  

Welcome to the GSM-Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features.
Only registered members may post questions, contact other members or search our database of over 8 million posts.

Registration is fast, simple and absolutely free so please - Click to REGISTER!

If you have any problems with the registration process or your account login, please contact contact us .

Go Back   GSM-Forum > Product Support Sections > Special Solutions / Services / WebShop > GSMFABRICA Products > HYDRA TOOL

Reply
 
LinkBack Thread Tools Display Modes
Old 03-15-2021, 04:34   #1441 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,623
Oppo A12 (CPH2083) Factory Reset successfully done by Hydra Tool


Oppo A12 (CPH2083) Factory Reset successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
---------------------------------
Searching for MTK Device...Found
Port Identification :METAMODE Preloader
FriendlyName :MediaTek PreLoader USB VCOM_V1632 (Android) (COM22)
SymbolicName :\??\USB#VID_22D9&PID_0006#5&2108ad5d&0&9#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0


META Phone Info . . .
MCUID: U ` 8U ` mt6765
ME_SO:
DATE : Tue Jan 19 00:08:14 CST 2021
MODEL: CPH2083EX_11_A.51
ME_SWVER: CPH2083_11_A.51_210118_e3e8671b


Reset to Factory Default Ok
Rebooting....
Done!!!

Elapsed Time : 00:00:01
BR
Dipendra Pathak

  Reply With Quote
Old 03-15-2021, 04:45   #1442 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,623
Vivo V11 (V1804) Zero Wipe formatting successfully done by Hydra Tool

Vivo V11 (V1804) Zero Wipe formatting successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : VIVO Model : V11 Pro (V1804) Storage : Auto
Loader: Vivo_V11Pro_SDM660_RW.elf
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM7)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&9cf0c96&0&6#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :07/08/2015,2.1.2.0

Getting device info......
Serial No.: 0x19A8C470
MSM ID : 0x0008C0E1, SDM660-Qualcomm Snapdragon 660
PBL Ver : 00000000
PK HASH : F188B3BC5198FB412FC8AB7EF8B60D24
5EBB705A0FC0AF387F1DB21533CC4570

Firehose Loader[Vivo_V11Pro_SDM660_RW.elf]
SaharaBoot... Ok
Sending ...............................Ok
Connecting to Firehose...
Ping...... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : MSM8996
Version : 1
DateTime : Jul 19 2019 - 12:28:14

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 69
Serial Number : 3518918205
Firmware Version : 4121134714682684464
Product Name : DA4064
Physical Partitions : 4
Total Logical Blocks:
Drive [0] 122142720[58.242 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Drive [3] 32768[16 MB]

Protocol : Universal
Running : Ok
Reading GPT[4]
Drive [0] 52 Items
Drive [1] 0 Items
Drive [2] 0 Items
Drive [3]


Phone Information......
Brand : vivo
Vendor : vivo
Model : vivo 1804
ID : PKQ1.180819.001
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : sdm660_64-user 9 PKQ1.180819.001 compiler08242230 release-keys
Device : PD1814F_EX
Display ID : PKQ1.180819.001 release-keys
Security Patch : 2020-08-01
Platform : =SDM660
Fingerprint : vivo/1804/1804:9/PKQ1.180819.001/compiler08242230:user/release-keys

Processing Zero Wipe....
- Removing FRP [Zero Wipe] Ok
- Formatting Userdata [Zero Wipe] Ok
Action Result : Ok

Rebooting Phone.... Ok

Elapsed Time : 00:00:14
BR
Dipendra Pathak

  Reply With Quote
Old 03-15-2021, 05:40   #1443 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,623
Huawei ATU-L22 (Y6 2018) formatting user data successfully done by Hydra Tool

Huawei ATU-L22 (Y6 2018) formatting user data successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : HUAWEI Model : ATU-L22 (Y6 2018) Storage : Auto
Loader: Huawei-ATU-Y6.mbn
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM31)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&15c311e1&0&10#{a5dcbf 10-6530-11d2-901f-00c04fb951ed}
Driver Ver :12/06/2012,2.1.0.5

Getting device info......
Serial No.: 0x4D4E7C3D
MSM ID : 0x000560E1, MSM8917-Qualcomm Snapdragon 425
PBL Ver : 00000000
PK HASH : 6BC369511DA9CADB3A7AF61574F89DB3
85003D6241BDD1FF573DBA61BF6AE119

Firehose Loader[Huawei-ATU-Y6.mbn]
SaharaBoot... Ok
Sending ...................Ok
Connecting to Firehose...
Ping... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8917
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 4265793575
Firmware Version : 4
Product Name : QE63MB
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 30535680[14.561 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok
Reading GPT[3]
Drive [0] 56 Items
Drive [1] 0 Items
Drive [2] 0 Items

Processing Format Userdata....
- Formatting Userdata [Zero Wipe] Ok
Action Result : Ok

Rebooting Phone.... Ok

Elapsed Time : 00:00:05
BR
Dipendra Pathak

  Reply With Quote
Old 03-15-2021, 12:52   #1444 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,623
Huawei ATU-L22 (Y6 2018) formatting user data successfully done by Hydra Tool

Huawei ATU-L22 (Y6 2018) formatting user data successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : HUAWEI Model : ATU-L22 (Y6 2018) Storage : Auto
Loader: Huawei-ATU-Y6.mbn
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM31)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&15c311e1&0&10#{a5dcbf 10-6530-11d2-901f-00c04fb951ed}
Driver Ver :12/06/2012,2.1.0.5

Getting device info......
Serial No.: 0x4D4E7C3D
MSM ID : 0x000560E1, MSM8917-Qualcomm Snapdragon 425
PBL Ver : 00000000
PK HASH : 6BC369511DA9CADB3A7AF61574F89DB3
85003D6241BDD1FF573DBA61BF6AE119

Firehose Loader[Huawei-ATU-Y6.mbn]
SaharaBoot... Ok
Sending ...................Ok
Connecting to Firehose...
Ping... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8917
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 4265793575
Firmware Version : 4
Product Name : QE63MB
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 30535680[14.561 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok
Reading GPT[3]
Drive [0] 56 Items
Drive [1] 0 Items
Drive [2] 0 Items

Processing Format Userdata....
- Formatting Userdata [Zero Wipe] Ok
Action Result : Ok

Rebooting Phone.... Ok

Elapsed Time : 00:00:05
BR
Dipendra Pathak

  Reply With Quote
Old 03-15-2021, 13:01   #1445 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,623
Huawei MRD-LX2 (Y6 2019) Zero Wipe FRP Partition successfully Removed by Hydra Tool

Huawei MRD-LX2 (Y6 2019) Zero Wipe FRP Partition successfully Removed by Hydra Tool

Screen Short:



Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port_V1632 (COM28)
SymbolicName :\??\USB#VID_0E8D&PID_0003#6&1e1ef7e6&0&4#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0


Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : F3501DE74888207777A44B4ED43FCA14
ERAM Size : 0x000000000003A000 -232 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 90014A68423861503E01C73A5923A52D - hB8aP>

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
ERROR reading system image [corrupted/erased]

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition... Ok

Elapsed Time : 00:00:01
BR
Dipendra Pathak

  Reply With Quote
Old 03-15-2021, 13:05   #1446 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,623
Nokia TA-1032 (Nokia 3 LTE DS NE1) Erasing FRP partition successfully Done by Hydro

Nokia TA-1032 (Nokia 3 LTE DS NE1) Erasing FRP partition successfully Done by Hydro Tool

Screen Short:



Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification A_HIGHSPEED_VCOM
FriendlyName :MediaTek DA USB VCOM (Android) (COM21)
SymbolicName :\??\USB#VID_0E8D&PID_2001#5&2686eb5&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0



Reading System Info

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition... [FAILED]
Erasing FRP Partition... Ok

Elapsed Time : 00:00:02
BR
Dipendra Pathak

  Reply With Quote
Old 03-15-2021, 13:13   #1447 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,623
Xiaomi Redmi 9 Prime (lancelot) Remove Mi Account and FRP successfully done by Hydra

Xiaomi Redmi 9 Prime (lancelot) Remove Mi Account and FRP successfully done by Hydra

Screen Short:



Logs:

Quote:
Brand : XIAOMI Model : Redmi 9 Prime (lancelot) Connection : Flash Mode

=====================================
Connection
-Please wait...
-Connect Phone...
-Found...[COM12]

TPortConnection.Create...(COM12)..Opening...Ok

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0707MT6768[6768]
BROM HW_SW_VER : 8A00 CA00 0000 0000
getMTKPayloadExploit : 0707
#Executing Exploit..
#SUCCESS..

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0707MT6768[6768]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
SECURE VERSION : 05
BL VERSION : FE
BR Secured : E0

Preparing Download Agent..
DA : 6768.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2020-11-03.22:07_536568
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...[ERROR]- NOT SYNC
=============================================
Reasons why it fails due to the following"
1. Harware problem/issues
2. If you did Testpoint Kindly check the parts you Touch/TP
3. Powershortage, try to connect Battery
4. Check or replace usb cable and plug directly to your pc usb port.
=============================================

Mode : brom
Preloader Initialization...
Parsing preloader_lancelot.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : AEE9730E66D1B0E98F3B8097F9CD40C0
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 15010044503644414203354E903D8763 - DP6DAB

DA Speed : high-speed
DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_lancelot.bin
Creating Scatter file... H:\\Backup\Auto\__0707--__140321172021\MT6768_Android_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x05508000]1024 KB ->frp.bin...Ok
-nvdata[0x0C4A2000]64 MB ->nvdata.bin...Ok
-persist[0x104A2000]48 MB ->persist.bin...Ok
-nvram[0x19F80000]64 MB ->nvram.bin...Ok
Done!!!
H:\\Backup\Auto\__0707--__140321172021
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : AEE9730E66D1B0E98F3B8097F9CD40C0
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 15010044503644414203354E903D8763 - DP6DAB

Reading GPT-EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Remove MiAccount[Erase Method] + FRP
Processing...
-persist.bin[0x104A2000]48 MB ->persist.bin...Ok
-frp.bin[0x05508000]1024 KB ->frp.bin...Ok
__031421172042
Backing up Partition for safety...
-__031421172042[0x104A2000]48 MB ->persist.img...OkOk
Saved to :
H:\Backup\Persist\__031421172042.bin
Erasing FRP Partition...
-persist.bin[0x104A2000]48 MB ->persist.bin...Ok
-frp.bin[0x05508000]1024 KB ->frp.bin...Ok Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:01:32
BR
Dipendra Pathak

  Reply With Quote
Old 03-15-2021, 13:17   #1448 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,623
Oppo REalme C2 (RMX1941) Zero Wipe FRP partition successfully done by Hydra Tool

Oppo REalme C2 (RMX1941) Zero Wipe FRP partition successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port_V1632 (COM49)
SymbolicName :\??\USB#VID_0E8D&PID_0003#7&7dd38b&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0


Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 90377AED9E303F78F34D9786D1CB007B
ERAM Size : 0x000000000003A000 -232 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 150100514436334D420312D006DE7675 - QD63MB

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Vendor : Realme
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6762_18540-user 9 PPR1.180610.011 eng.root.20200501.002658 release-keys
Security Patch : 2020-05-05
StorageType : mtp
Userdata State : Not Encrypted

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition... Ok

Elapsed Time : 00:00:04
BR
Dipendra Pathak

  Reply With Quote
Old 03-16-2021, 01:48   #1449 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,623
Xiaomi Redmi Note 9 merlin zero wipe FRP partition successfully Done by Hydra Tool

Xiaomi Redmi Note 9 merlin zero wipe FRP partition successfully Done by Hydra Tool

Screen Short:



Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port_V1632 (COM14)
SymbolicName :\??\USB#VID_0E8D&PID_0003#5&14eb737d&0&3#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0707MT6768[6768]
BROM HW_SW_VER : 8A00 CA00 0000 0000
getMTKPayloadExploit : 0707
#Executing Exploit..
#SUCCESS..
Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0707MT6768[6768]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
SECURE VERSION : 05
BL VERSION : FE
BR Secured : E0

Preparing Download Agent..
DA : 6768.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2020-11-03.22:07_536568
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_merlin.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : CE174FD7EA2F33B1D0C74D5909ADA9E4
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000001D1F000000 -116,484 GB
eMMC CID : 13014E47314A39533910034CC5F547BD - G1J9S9

DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_merlin.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0707__031521134935\MT6768_Androi d_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x05508000]1024 KB ->frp.bin...Ok
-nvdata[0x0C4A2000]64 MB ->nvdata.bin...Ok
-persist[0x104A2000]48 MB ->persist.bin...Ok
-nvram[0x19F80000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0707__031521134935
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : CE174FD7EA2F33B1D0C74D5909ADA9E4
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000001D1F000000 -116,484 GB
eMMC CID : 13014E47314A39533910034CC5F547BD - G1J9S9

Reading GPT-EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition...[C002002A-STATUS_SEC_IMG_TYPE_MISMATCH]
Erasing FRP Partition... Ok

Elapsed Time : 00:01:14
BR
Dipendra Pathak

  Reply With Quote
Old 03-16-2021, 01:52   #1450 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,623
Huawei MED-LX9 (Y6P 2020) formatting OEMINFO successfully done by Hydra Tool

Huawei MED-LX9 (Y6P 2020) formatting OEMINFO successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port_V1632 (COM9)
SymbolicName :\??\USB#VID_0E8D&PID_0003#6&27a0b2a2&0&3#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0


Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 08689ECAA0FA8DAB228E81A1C5FA0106
ERAM Size : 0x000000000003A000 -232 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 90014A68433961503301003DF972870B - hC9aP3

Reading GPT-EMMC [0x00008000] 130 Items

Format Selected Partition
Formatting [oeminfo] Ok!
=====================================

Elapsed Time : 00:00:03
BR
Dipendra Pathak

  Reply With Quote
Old 03-16-2021, 01:57   #1451 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,623
Xiaomi Mi 8 Lite (Platina) successfully flashed by Hydra Tool

Xiaomi Mi 8 Lite (Platina) successfully flashed by Hydra Tool

Screen Short:



Logs:

Quote:
Searching Device By Fastboot
Device Found...

Reading Information...getvar:version FAILED (remote: GetVar Variable Not found)
Product : platina
version : getvar:version FAILED (remote: GetVar Variable Not found)
Secure : yes
Device Info:
Verity mode: true
Device unlocked: true
Device critical unlocked: true
Charger screen enabled: true
--------------------------
Fastboot Flashing...
-switch(dummy.img) Ok
-storsec(storsec.mbn) Ok
-storsecbak(storsec.mbn) Ok
-rpm(rpm.mbn) Ok
-rpmbak(rpm.mbn) Ok
-hyp(hyp.mbn) Ok
-hypbak(hyp.mbn) Ok
-cmnlib(cmnlib.mbn) Ok
-cmnlibbak(cmnlib.mbn) Ok
-cmnlib64(cmnlib64.mbn) Ok
-cmnlib64bak(cmnlib64.mbn) Ok
-keymaster(keymaster64.mbn) Ok
-keymasterbak(keymaster64.mbn) Ok
-pmic(pmic.elf) Ok
-pmicbak(pmic.elf) Ok
-bluetooth(BTFM.bin) Ok
-devcfg(devcfg.mbn) Ok
-devcfgbak(devcfg.mbn) Ok
-abl(abl.elf) Ok
-ablbak(abl.elf) Ok
-misc(dummy.img) Ok
-xbl(xbl.elf) Ok
-xblbak(xbl.elf) Ok
-tz(tz.mbn) Ok
-tzbak(tz.mbn) Ok
-logfs(logfs_ufs_8mb.bin) Ok
-dsp(dspso.bin) Ok
-logo(logo.img) Ok
-persist(persist.img) Skipped
-boot(boot.img) Ok
-recovery(recovery.img) Ok
-modem(NON-HLOS.bin) Ok
-cache(cache.img) Ok
-cust(cust.img) Ok
-system(system.img) Ok
-vendor(vendor.img) Ok
-userdata(userdata.img) Ok
All Done
--------------------------

Elapsed Time : 00:03:33
BR
Dipendra Pathak

  Reply With Quote
Old 03-16-2021, 02:01   #1452 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,623
Oppo A5s (CPH1909) Successfully Flashed by Hydra Tool

Oppo A5s (CPH1909) Successfully Flashed by Hydra Tool

Screen Short:



Logs:

Quote:
Brand : OPPO Model : A5s (CPH1909) Connection : Flash Mode

=====================================
How To Boot : Power off phone
* BROM Mode : Press VOL + or Press VOL -+
* Preloader Mode : Just Insert cable

Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port_V1632 (COM3)
SymbolicName :\??\USB#VID_0E8D&PID_0003#6&36559b33&0&3#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0


Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0766MT6765[6765]
BROM HW_SW_VER : 8A00 CA00 0000 0000
getMTKPayloadExploit : 0766
#Executing Exploit..
#SUCCESS..
Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0766MT6765[6765]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
SECURE VERSION : 00
BL VERSION : FE
BR Secured : E0

Preparing Download Agent..
DA : [Not Exist]
Trying Default 6765.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2020-11-03.22:07_536568
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
C0
Protocol : New
Synchronization...
SYNCSYNC
Mode : brom
Preloader Initialization...
Parsing preloader_oppo6765_18511_OPPO_a5s.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : B9F82067173DC473BC9A44E155C147FC
ERAM Size : 0x000000000003A000 -232 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 90014A68423861503E03AD27B8D68653 - hB8aP>

DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info
Vendor : OPPO
ID : O11019
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6765_18511-user 8.1.0 O11019 1575884435 release-keys
Security Patch : 2019-12-05
StorageType : mtp
Userdata State : Not Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_oppo6765_18511.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0766__031521110246\MT6765_Androi d_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x09E88000]1024 KB ->frp.bin...Ok
-nvdata[0x0BF88000]64 MB ->nvdata.bin...Ok
-persist[0x13800000]48 MB ->persist.bin...Ok
-nvram[0x20000000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0766__031521110246
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : B9F82067173DC473BC9A44E155C147FC
ERAM Size : 0x000000000003A000 -232 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 90014A68423861503E03AD27B8D68653 - hB8aP>

Reading GPT-EMMC [0x00008000] 130 Items

Flashing Selected Partitions....
- preloader[preloader_oppo6765_18511.bin] 512 KB Skipped
- recovery[recovery.img] 64 MB Flash -> = Ok
- scp1[scp.img] 6 MB Flash -> = Ok
- scp2[scp.img] 6 MB Flash -> = Ok
- sspm_1[sspm.img] 1024 KB Flash -> = Ok
- sspm_2[sspm.img] 1024 KB Flash -> = Ok
- lk[lk.img] 5 MB Flash -> = Ok
- lk2[lk.img] 5 MB Flash -> = Ok
- boot[boot.img] 32 MB Flash -> = Ok
- logo[logo.bin] 16 MB Flash -> = Ok
- odmdtbo[odmdtbo.img] 16 MB Flash -> = Ok
- tee1[tee.img] 5 MB Flash -> = Ok
- tee2[tee.img] 9 MB Flash -> = Ok
- odm[odm.img] 256 MB Flash -> = Ok
- vendor[vendor.img] 1.313 GB Flash -> = Ok
- system[system.img] 4.203 GB Flash -> = Ok
- cache[cache.img] 256 MB Flash -> = Ok
- userdata[userdata.img] 8 GB Flash -> = Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!
=====================================

Elapsed Time : 00:11:30
BR
Dipendra Pathak

  Reply With Quote
Old 03-16-2021, 02:05   #1453 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,623
General Mobile GM 8 GO formatting successfully done by Hydra Tool

General Mobile GM 8 GO formatting successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
Brand : GENERAL MOBILE Model : GM 8 GO Connection : Flash Mode

=====================================
How To Boot : Power off phone
* BROM Mode : Press VOL + or Press VOL -+
* Preloader Mode : Just Insert cable

Searching for MTK Device...Found
Port Identification :Flashmode Preloader
FriendlyName :MediaTek PreLoader USB VCOM (Android) (COM5)
SymbolicName :\??\USB#VID_0E8D&PID_2000#5&10104b2c&0&3#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0699MT6739[6739]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
SECURE VERSION : 00
BL VERSION : 03
BR Secured : 00

Preparing Download Agent..
DA : [Not Exist]
Trying Default 6739.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2020-11-03.22:07_536568
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : preloader

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 02D812C5A9E5D96DBDC3A51FE180D3C6
ERAM Size : 0x0000000000020000 -128 KB
IRAM Size : 0x0000000040000000 -1024 MB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003A3E00000 -14,561 GB
eMMC CID : 150100464536324D42037D76DE4B45F5 - FE62MB

DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info
Brand : gm
Vendor : General Mobile
Model : GM8 go
ID : O11019
SDK : 27
Release : 8.1.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-US
Description : full_fd3901-user 8.1.0 O11019 OGMG18A-d release-keys
Device : GM8_go
Display ID : OGMG18A-d
Security Patch : 2018-06-05
Fingerprint : gm/GM8_go/GM8_go:8.1.0/O11019/OGMG18A-d:user/release-keys
StorageType : mtp
Userdata State : Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_fd3901.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0699_gm_GM8_go_GM8_go_8.1.0_O110 19_OGMG18A-d_031521152217\MT6739_Android_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x02D88000]1024 KB ->frp.bin...Ok
-nvdata[0x03688000]32 MB ->nvdata.bin...Ok
-nvram[0x10700000]5 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0699_gm_GM8_go_GM8_go_8.1.0_O110 19_OGMG18A-d_031521152217
MTK Phone Loader is NOW RUNNING.

Rebooting Device [Reboot To Normal]
Reboot Done!!
=====================================

Elapsed Time : 00:00:29
BR
Dipendra Pathak

  Reply With Quote
Old 03-16-2021, 02:11   #1454 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,623
Oppo A83 (CPH1729) Partly flashed to remove FRP successfully done by Hydra Tool

Oppo A83 (CPH1729) Partly flashed to remove FRP successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
Brand : OPPO Model : A83 (CPH1729) Connection : Flash Mode

=====================================
How To Boot : Power off phone
* BROM Mode : Press VOL + or Press VOL -+
* Preloader Mode : Just Insert cable

Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port_V1632 (COM3)
SymbolicName :\??\USB#VID_0E8D&PID_0003#6&2b9c2bdb&0&2#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0


Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0690MT6763T[6763]
BROM HW_SW_VER : 8A00 CA01 0001 0000
getMTKPayloadExploit : 0690
#Executing Exploit..
#SUCCESS..
Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0690MT6763T[6763]
BROM HW_SW_VER : 8A00 CA01 0001 0000
SECURE VERSION : 05
BL VERSION : FE
BR Secured : 00
NORMAL BOOT

Preparing Download Agent..
DA : 6763.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2018-09-18.13:22_452898
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
C0
Protocol : New
Synchronization...
SYNCSYNC
Mode : brom
Preloader Initialization...
Parsing preloader_oppo6763_17101.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : D5B90F009BDC19EF0C66E70AFC1224C7
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 90014A484247346132A50FE0CC17C495 - HBG4a2

DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info
Brand : OPPO
Vendor : OPPO
Model : OPPO A83js
ID : N6F26Q
SDK : 25
Release : 7.1.1
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6763_17101-user 7.1.1 N6F26Q 1537620965 release-keys
Device : M6763D
Board : full_oppo6763_17101
Display ID : A83jsEX_11_A.21_180922
Security Patch : 2018-09-05
Platform : mt6763
FRPPST : /dev/block/platform/bootdevice/by-name/frp
StorageType : mtp
Userdata State : Not Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_oppo6763_17101.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0690__031521143219\MT6763T_Andro id_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x05A88000]1024 KB ->frp.bin...Ok
-nvdata[0x07B88000]64 MB ->nvdata.bin...Ok
-persist[0x0F800000]48 MB ->persist.bin...Ok
-nvram[0x1A000000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0690__031521143219
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : D5B90F009BDC19EF0C66E70AFC1224C7
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 90014A484247346132A50FE0CC17C495 - HBG4a2

Reading GPT-EMMC [0x00008000] 130 Items

Flashing Selected Partitions....
- preloader[preloader_oppo6763_17101.bin] 256 KB Erasing..[STATUS_INVALID_PARAMETERS]Failed Flash ->= Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!
=====================================

Elapsed Time : 00:01:25
BR
Dipendra Pathak

  Reply With Quote
Old 03-16-2021, 02:15   #1455 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,623
Tecno LD7 (Pova) Safe format successully Done by Hydra Tool

Tecno LD7 (Pova) Safe format successully Done by Hydra Tool

Screen Short:



Logs:

Quote:
Brand : TECNO Model : LD7 (Pova) Connection : Flash Mode

=====================================
How To Boot : Power off phone
* BROM Mode : Press VOL + or Press VOL -+
* Preloader Mode : Just Insert cable

Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port (COM27)
SymbolicName :\??\USB#VID_0E8D&PID_0003#5&53c06f5&0&10#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0707MT6768[6768]
BROM HW_SW_VER : 8A00 CA00 0000 0000
getMTKPayloadExploit : 0707
#Executing Exploit..
#SUCCESS..
Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0707MT6768[6768]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
SECURE VERSION : 00
BL VERSION : FE
BR Secured : E0

Preparing Download Agent..
DA : [Not Exist]
Trying Default 6768.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2020-11-03.22:07_536568
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
C0
Protocol : New
Synchronization...
SYNCSYNC
Mode : brom
Preloader Initialization...
Parsing preloader_ld7_h694.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 96FA1CF1A2187AECC6B29C1CC4D0C0BA
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 90014A68433861503E023651D2DD76F1 - hC8aP>

DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_ld7_h694.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0707__031521134642\MT6768_Androi d_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x03188000]1024 KB ->frp.bin...Ok
-nvdata[0x08922000]64 MB ->nvdata.bin...Ok
-persist[0x0C922000]48 MB ->persist.bin...Ok
-nvram[0x1E900000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0707__031521134642
MTK Phone Loader is NOW RUNNING.
=====================================

Elapsed Time : 00:00:25
BR
Dipendra Pathak

  Reply With Quote
Reply

Bookmarks

Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


 



All times are GMT +1. The time now is 08:40.



Powered by Searchlight © 2024 Axivo Inc.
vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2024 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2023 -
Page generated in 0.40277 seconds with 9 queries

SEO by vBSEO