|
Welcome to the GSM-Forum forums. You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. Only registered members may post questions, contact other members or search our database of over 8 million posts. Registration is fast, simple and absolutely free so please - Click to REGISTER! If you have any problems with the registration process or your account login, please contact contact us . |
|
Register | FAQ | Donate | Forum Rules | Root any Device | ★iPhone Unlock★ | ★ Direct Codes ★ | Direct Unlock Source | Today's Posts | Search |
| LinkBack | Thread Tools | Display Modes |
10-29-2022, 07:30 | #1 (permalink) |
No Life Poster Join Date: Mar 2008 Location: RMS- CLUB
Posts: 3,364
Member: 723410 Status: Offline Sonork: 📱 100.1592732 Thanks Meter: 3,374 | Xiaomi 9a mi account reset dead [ Solved ] now phone display show Code: Hydra MediaTeK Tool Ver 1.0.5.35 @Rahim Software Windows 8.1 (Version 6.3, Build 9600, 32-bit Edition) Intel(R) Core(TM) i5-4570 CPU @ 3.20GHz Intel(R) HD Graphics 4600 Ram Installed : 3 GB Windows Access Right : Admin Software Run As Admnistrator ******* Dongle Info ******* Version : Hydra Tool v 1.2 Serial : 190100000167 Initialize : OKAY Status : Activated Life : 0 [0-0-0-0-0] Searching for MTK Device...Found Port Identification :Flashmode BROM FriendlyName :MediaTek USB Port (COM6) Device :5&fade7a0&0&3 SymbolicName :\??\USB#VID_0E8D&PID_0003#5&fade7a0&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver :01/22/2016,3.0.1504.0 Trying to Open Port [COM6] Ok Handshaking...Ok HwCode : 0766 {MT6765/MT8768t} Hwver : 0000 Target config : E7 SBC : 01 (True) SLA : 02 (True) DAA : 04 (True) SWJTAG : 06 (True) EPP : 00 (False) CERT : 00 (False) MEMREAD : 20 (True) MEMWRITE : 40 (True) CMD_C8 : 80 (True) Device Connection : BROM HW Subcode: 8A00 HW Ver : CA00 SW Ver : 0000 ME_ID : CF8945BE9FFA48923B4B7FF8D74E5583 SOC_ID : D33BA10699BBE681D9079C3E7313C2AB24782944C7F13A03075FBA9EB7A94E81 Exploiting Device... Handshaking...Ok Target config : 00 SBC : 00 (False) SLA : 00 (False) DAA : 00 (False) SWJTAG : 00 (False) EPP : 00 (False) CERT : 00 (False) MEMREAD : 00 (False) MEMWRITE : 00 (False) CMD_C8 : 00 (False) Device Connection : BROM Download Agent... DA :MTK_AllInOne_DA_5.2152.bin Uploading data Successfully uploaded stage 1, jumping .. Jumping to 0x00200000 Successfully received DA sync CONNECTION_AGENT : brom DRAM config needed for : 4501004441343033 Sending emi data.. DRAM setup passed. Sending emi data succeeded. Uploading stage 2... Upload data was accepted. Jumping to stage 2... Successfully uploaded stage 2 ERAM Size: 0x000000000003A000-232 KB IRAM Size: 0x0000000080000000-2 GB EMMC Boot1 Size: 0x0000000000400000-4 MB EMMC Boot2 Size: 0x0000000000400000-4 MB EMMC RPMB Size : 0x0000000001000000-16 MB EMMC USER Size : 0x0000000747C00000-29.121 GB EMMC CID : 4501004441343033320189A34D1337B3 - DA4032 HW-CODE : 0x766 HWSUB-CODE : 0x8A00 HW-VERSION : 0xCA00 SW-VERSION : 0x0 CHIP-EVOLUTION : 0x0 DA-VERSION : 1.0 Speed : high-speed Error on sending data: DA hash mismatch *DA Extensions failed to enable Reading Partition Table .. Partition Count : 45 --------------- Reading build.prop content --------------- Brand : Redmi Vendor : Xiaomi Model : M2006C3LG Product : dandelion Manufacturer : Xiaomi Marketname : Redmi 9A ID : QP1A.190711.020 SDK : 29 Release : 10 ABI : armeabi-v7a CPU abilist : armeabi-v7a,armeabi Locale : en-GB Description : dandelion-user 10 QP1A.190711.020 V12.0.20.0.QCDMIXM release-keys Display ID : QP1A.190711.020 Security Patch : 2022-05-01 StorageType : mtp --------------- end of build.prop content --------------- Reading IMEI........ IMEI1 : 867174052320996 IMEI2 : 867174052321002 ------------------------------- Bootloader Status... Bootloader : Locked ------------------------------- Backing up Security.. -preloader .....Ok [preloader_k62v1_64_bsp.bin] *Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0766_CF8945BE9FFA48923B4B7FF8D74E5583\Auto\102922105242\6765_Android_scatter.txt -pgpt .....Ok -nvram .....Ok -nvdata .....Ok -frp .....Ok -protect1 .....Ok -protect2 .....Ok -persist .....Ok -proinfo .....Ok -nvcfg .....Ok -sec1 .....Ok -seccfg .....Ok Backup Done!!! ------------------------------ Xiaomi Operation Flash Mode.. ------------------------------ Backing up Security.. persist... Ok vbmeta_system... Ok vbmeta... Ok Patching Persist Scanning Patching address...Please wait... > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] > Patching address detected [PATCHED] Total Items patched : 111 Successfully patched address.. -persist .....Ok Done Writing... -vbmeta .....Ok Done Writing... -vbmeta_system .....Ok Done Writing... Please wait, processing..... Error send_cmd 0x000F0004 Unsupported ctrl code Error send_cmd 0x000F0004 Unsupported ctrl code Error send_cmd 0x000F0004 Unsupported ctrl code Error send_cmd 0x000F0004 Unsupported ctrl code Error send_cmd 0x000F0004 Unsupported ctrl code Error send_cmd 0x000F0004 Unsupported ctrl code Error send_cmd 0x000F0004 Unsupported ctrl code Error send_cmd 0x000F0004 Unsupported ctrl code Error send_cmd 0x000F0004 Unsupported ctrl code Error send_cmd 0x000F0004 Unsupported ctrl code Error send_cmd 0x000F0004 Unsupported ctrl code Error send_cmd 0x000F0004 Unsupported ctrl code Error send_cmd 0x000F0004 Unsupported ctrl code Error send_cmd 0x000F0004 Unsupported ctrl code Error send_cmd 0x000F0004 Unsupported ctrl code Error send_cmd 0x000F0004 Unsupported ctrl code Error send_cmd 0x000F0004 Unsupported ctrl code Error send_cmd 0x000F0004 Unsupported ctrl code Error send_cmd 0x000F0004 Unsupported ctrl code Error send_cmd 0x000F0004 Unsupported ctrl code Error send_cmd 0x000F0004 Unsupported ctrl code Error send_cmd 0x000F0004 Unsupported ctrl code Error send_cmd 0x000F0004 Unsupported ctrl code Error send_cmd 0x000F0004 Unsupported ctrl code Error send_cmd 0x000F0004 Unsupported ctrl code Error send_cmd 0x000F0004 Unsupported ctrl code Error send_cmd 0x000F0004 Unsupported ctrl code Error send_cmd 0x000F0004 Unsupported ctrl code Error send_cmd 0x000F0004 Unsupported ctrl code Error send_cmd 0x000F0002 Unsupported ctrl code Access violation at address 0162E695 in module 'HMTKTool.exe'. Read of address 00000000 |
10-30-2022, 04:33 | #3 (permalink) |
No Life Poster Join Date: Mar 2008 Location: RMS- CLUB
Posts: 3,364
Member: 723410 Status: Offline Sonork: 📱 100.1592732 Thanks Meter: 3,374 | Error Code: Hydra MediaTeK Tool Ver 1.0.5.35 @Rahim Software Windows 8.1 (Version 6.3, Build 9600, 32-bit Edition) Intel(R) Core(TM) i5-4570 CPU @ 3.20GHz Intel(R) HD Graphics 4600 Ram Installed : 3 GB Windows Access Right : Admin Software Run As Admnistrator ******* Dongle Info ******* Version : Hydra Tool v 1.2 Serial : 190100000167 Initialize : OKAY Status : Activated Life : 0 [0-0-0-0-0] Searching for MTK Device...Found Port Identification :Flashmode BROM FriendlyName :MediaTek USB Port (COM6) Device :5&fade7a0&0&3 SymbolicName :\??\USB#VID_0E8D&PID_0003#5&fade7a0&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver :01/22/2016,3.0.1504.0 Trying to Open Port [COM6] Ok Handshaking...Ok HwCode : 0766 {MT6765/MT8768t} Hwver : 0000 Target config : E7 SBC : 01 (True) SLA : 02 (True) DAA : 04 (True) SWJTAG : 06 (True) EPP : 00 (False) CERT : 00 (False) MEMREAD : 20 (True) MEMWRITE : 40 (True) CMD_C8 : 80 (True) Device Connection : BROM HW Subcode: 8A00 HW Ver : CA00 SW Ver : 0000 ME_ID : CF8945BE9FFA48923B4B7FF8D74E5583 SOC_ID : D33BA10699BBE681D9079C3E7313C2AB24782944C7F13A03075FBA9EB7A94E81 Exploiting Device... Handshaking...Ok Dumping Preloader from Bootrom.. Seeking preloader address.. Not Found Target config : 00 SBC : 00 (False) SLA : 00 (False) DAA : 00 (False) SWJTAG : 00 (False) EPP : 00 (False) CERT : 00 (False) MEMREAD : 00 (False) MEMWRITE : 00 (False) CMD_C8 : 00 (False) Device Connection : BROM Download Agent... DA :MTK_AllInOne_DA_5.2152.bin Uploading data Successfully uploaded stage 1, jumping .. Jumping to 0x00200000 Successfully received DA sync CONNECTION_AGENT : brom DRAM config needed for : 4501004441343033 Sending emi data.. DRAM setup passed. Sending emi data succeeded. Uploading stage 2... Upload data was accepted. Jumping to stage 2... Successfully uploaded stage 2 ERAM Size: 0x000000000003A000-232 KB IRAM Size: 0x0000000080000000-2 GB EMMC Boot1 Size: 0x0000000000400000-4 MB EMMC Boot2 Size: 0x0000000000400000-4 MB EMMC RPMB Size : 0x0000000001000000-16 MB EMMC USER Size : 0x0000000747C00000-29.121 GB EMMC CID : 4501004441343033320189A34D1337B3 - DA4032 HW-CODE : 0x766 HWSUB-CODE : 0x8A00 HW-VERSION : 0xCA00 SW-VERSION : 0x0 CHIP-EVOLUTION : 0x0 DA-VERSION : 1.0 Speed : high-speed Error on sending data: DA hash mismatch *DA Extensions failed to enable Reading Partition Table .. Partition Count : 45 --------------- Reading build.prop content --------------- Brand : Redmi Vendor : Xiaomi Model : M2006C3LG Product : dandelion Manufacturer : Xiaomi Marketname : Redmi 9A ID : QP1A.190711.020 SDK : 29 Release : 10 ABI : armeabi-v7a CPU abilist : armeabi-v7a,armeabi Locale : en-GB Description : dandelion-user 10 QP1A.190711.020 V12.0.20.0.QCDMIXM release-keys Display ID : QP1A.190711.020 Security Patch : 2022-05-01 StorageType : mtp --------------- end of build.prop content --------------- Reading IMEI........ IMEI1 : 867174052320996 IMEI2 : 867174052321002 ------------------------------- Bootloader Status... Bootloader : Locked ------------------------------- Backing up Security.. -preloader .....Ok [preloader_k62v1_64_bsp.bin] *Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0766_CF8945BE9FFA48923B4B7FF8D74E5583\Auto\103022080024\6765_Android_scatter.txt -pgpt .....Ok -nvram .....Ok -nvdata .....Ok -frp .....Ok -protect1 .....Ok -protect2 .....Ok -persist .....Ok -proinfo .....Ok -nvcfg .....Ok -sec1 .....Ok -seccfg .....Ok Backup Done!!! ------------------------------ Bootloader Operation.. ------------------------------ ------------------------------- Bootloader Status... Bootloader : Locked ------------------------------- Unlocking Bootloader Please wait, processing..... Error send_cmd 0x000F0004 Unsupported ctrl code Error send_cmd 0x000F0004 Unsupported ctrl code Error send_cmd 0x000F0004 Unsupported ctrl code Error send_cmd 0x000F0004 Unsupported ctrl code Error send_cmd 0x000F0004 Unsupported ctrl code Error send_cmd 0x000F0004 Unsupported ctrl code Error send_cmd 0x000F0004 Unsupported ctrl code Error send_cmd 0x000F0004 Unsupported ctrl code Error send_cmd 0x000F0004 Unsupported ctrl code Error send_cmd 0x000F0004 Unsupported ctrl code Error send_cmd 0x000F0004 Unsupported ctrl code Error send_cmd 0x000F0004 Unsupported ctrl code Error send_cmd 0x000F0004 Unsupported ctrl code Error send_cmd 0x000F0004 Unsupported ctrl code Error send_cmd 0x000F0004 Unsupported ctrl code Error send_cmd 0x000F0004 Unsupported ctrl code Error send_cmd 0x000F0004 Unsupported ctrl code Error send_cmd 0x000F0004 Unsupported ctrl code Error send_cmd 0x000F0004 Unsupported ctrl code Error send_cmd 0x000F0004 Unsupported ctrl code Error send_cmd 0x000F0004 Unsupported ctrl code Error send_cmd 0x000F0004 Unsupported ctrl code Error send_cmd 0x000F0004 Unsupported ctrl code Error send_cmd 0x000F0004 Unsupported ctrl code Error send_cmd 0x000F0004 Unsupported ctrl code Error send_cmd 0x000F0004 Unsupported ctrl code Error send_cmd 0x000F0004 Unsupported ctrl code Error send_cmd 0x000F0004 Unsupported ctrl code Error send_cmd 0x000F0004 Unsupported ctrl code Error send_cmd 0x000F0002 Unsupported ctrl code Access violation at address 00BBE695 in module 'HMTKTool.exe'. Read of address 00000000 |
10-30-2022, 05:03 | #4 (permalink) | |
No Life Poster Join Date: Jul 2012 Location: GSMFABRICA-Team Age: 35
Posts: 3,373
Member: 1785930 Status: Offline Sonork: 100.1685640 Thanks Meter: 4,786 | Quote:
select model and go to option/Da Agent check DA patch,now again unlock bootloader after boot/info. | |
The Following User Says Thank You to Unlockinfo For This Useful Post: |
10-30-2022, 06:49 | #5 (permalink) | |
No Life Poster Join Date: Mar 2008 Location: RMS- CLUB
Posts: 3,364
Member: 723410 Status: Offline Sonork: 📱 100.1592732 Thanks Meter: 3,374 | Quote:
done thank you Code: Hydra MediaTeK Tool Ver 1.0.5.35 @Rahim Software Windows 8.1 (Version 6.3, Build 9600, 32-bit Edition) Intel(R) Core(TM) i5-4570 CPU @ 3.20GHz Intel(R) HD Graphics 4600 Ram Installed : 3 GB Windows Access Right : Admin Software Run As Admnistrator ******* Dongle Info ******* Version : Hydra Tool v 1.2 Serial : 190100000167 Initialize : OKAY Status : Activated Life : 0 [0-0-0-0-0] Searching for MTK Device...Found Port Identification :Flashmode BROM FriendlyName :MediaTek USB Port (COM6) Device :5&fade7a0&0&3 SymbolicName :\??\USB#VID_0E8D&PID_0003#5&fade7a0&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver :01/22/2016,3.0.1504.0 Trying to Open Port [COM6] Ok Handshaking...Ok HwCode : 0766 {MT6765/MT8768t} Hwver : 0000 Target config : E7 SBC : 01 (True) SLA : 02 (True) DAA : 04 (True) SWJTAG : 06 (True) EPP : 00 (False) CERT : 00 (False) MEMREAD : 20 (True) MEMWRITE : 40 (True) CMD_C8 : 80 (True) Device Connection : BROM HW Subcode: 8A00 HW Ver : CA00 SW Ver : 0000 ME_ID : CF8945BE9FFA48923B4B7FF8D74E5583 SOC_ID : D33BA10699BBE681D9079C3E7313C2AB24782944C7F13A03075FBA9EB7A94E81 Exploiting Device... Handshaking...Ok Target config : 00 SBC : 00 (False) SLA : 00 (False) DAA : 00 (False) SWJTAG : 00 (False) EPP : 00 (False) CERT : 00 (False) MEMREAD : 00 (False) MEMWRITE : 00 (False) CMD_C8 : 00 (False) Device Connection : BROM Download Agent... DA :MTK_AllInOne_DA_5.2152.bin Patching da2 ... Ok Uploading data Successfully uploaded stage 1, jumping .. Jumping to 0x00200000 Successfully received DA sync CONNECTION_AGENT : brom DRAM config needed for : 4501004441343033 Sending emi data.. DRAM setup passed. Sending emi data succeeded. Uploading stage 2... Upload data was accepted. Jumping to stage 2... Successfully uploaded stage 2 ERAM Size: 0x000000000003A000-232 KB IRAM Size: 0x0000000080000000-2 GB EMMC Boot1 Size: 0x0000000000400000-4 MB EMMC Boot2 Size: 0x0000000000400000-4 MB EMMC RPMB Size : 0x0000000001000000-16 MB EMMC USER Size : 0x0000000747C00000-29.121 GB EMMC CID : 4501004441343033320189A34D1337B3 - DA4032 HW-CODE : 0x766 HWSUB-CODE : 0x8A00 HW-VERSION : 0xCA00 SW-VERSION : 0x0 CHIP-EVOLUTION : 0x0 DA-VERSION : 1.0 Speed : high-speed Upload data was accepted. Jumping to stage 2... DA Extensions successfully added Reading Partition Table .. Partition Count : 45 --------------- Reading build.prop content --------------- Brand : Redmi Vendor : Xiaomi Model : M2006C3LG Product : dandelion Manufacturer : Xiaomi Marketname : Redmi 9A ID : QP1A.190711.020 SDK : 29 Release : 10 ABI : armeabi-v7a CPU abilist : armeabi-v7a,armeabi Locale : en-GB Description : dandelion-user 10 QP1A.190711.020 V12.0.9.0.QCDIDXM release-keys Display ID : QP1A.190711.020 Security Patch : 2021-08-01 StorageType : mtp --------------- end of build.prop content --------------- Reading IMEI........ IMEI1 : 867174052320996 IMEI2 : 867174052321002 ------------------------------- Bootloader Status... Bootloader : Locked ------------------------------- Backing up Security.. -preloader .....Ok [preloader_k62v1_64_bsp.bin] *Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0766_CF8945BE9FFA48923B4B7FF8D74E5583\Auto\103022101433\6765_Android_scatter.txt -pgpt .....Ok -nvram .....Ok -nvdata .....Ok -frp .....Ok -protect1 .....Ok -protect2 .....Ok -persist .....Ok -proinfo .....Ok -nvcfg .....Ok -sec1 .....Ok -seccfg .....Ok Backup Done!!! ------------------------------ Bootloader Operation.. ------------------------------ ------------------------------- Bootloader Status... Bootloader : Locked ------------------------------- Unlocking Bootloader Please wait, processing..... ------------------------------- Bootloader Status... Bootloader : Unlocked ------------------------------- Status: Ok Rebooting Device... Reboot Option : RebootToNormal Rebooting Operation Done!!!! | |
Bookmarks |
| |
|