★★★ Post All Successfully Repaired Phones By Hydra Tool ★★★

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi 8A (olivelite) Remove Mi Account by Hydra Tool
alieno2012@gmail.com_HydraTool.exe__06-15-2023-151132.jpeg

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Xiaomi Tool
Mi Account
Remove MiAccount[Patch Method]
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

PreOperation Configuration
Brand : AUTO Model : AUTO Storage : Auto
Loader: Auto
Port : Auto

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM5)
SymbolicName :\\?\usb#vid_05c6&pid_9008#5&fade7a0&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :03/19/2014,2.1.1.2

Getting device info. [Connected].Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok
Configuration[FHProt_Auto].
Xiaomi Authentication needed...
Signature Request -> bob[IFgePCNoKVD7acDcVqdf-SPoQRT]
Signature @256bytes Authentication.... Accepted......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 2925834609
Firmware Version : 909127728
Product Name : hB8aP>
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 61071360[29,121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok

Reading GPT[3]
Drive [0] 64 Items
Drive [1] 0 Items
Drive [2] 0 Items

--------------- Reading build.prop content ---------------
build.prop
system
build.prop
ID : QKQ1.191014.001
SDK : 29
Release : 10
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-GB
Security Patch : 2021-09-01
--------------- end of build.prop content ---------------
Reading GPT[3]
Drive [0] 64 Items
Drive [1] 0 Items
Drive [2] 0 Items

Backing up Partition for safety...Ok

Scanning Patching address...
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]Done!!
Total Items patched : 217
Successfully patched address..

Action Result : Ok

Elapsed Time : 00:00:22
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi Note 9 (merlin) IMEI Repair by Hydra Tool
merlin_repair_SS.jpeg
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
***IMEI REPAIR FUNCTION****
Xiaomi 2nd IMEI
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching for MTK Device...Found
MTK Port Type : Flashmode BROM
FriendlyName : MediaTek USB Port (COM4)
Device : /6&3520cc6b&0&7
SymbolicName : \\?\usb#vid_0e8d&pid_0003#6&3520cc6b&0&7#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0
Service : wdm_usb

Openning Port [COM4] Ok
Handshaking...Ok
HwCode : 0707 {MT6768}
Hwver : 0000
Target config : E7
SBC : 01 (True)
SLA : 02 (True)
DAA : 04 (True)
SWJTAG : 06 (True)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 20 (True)
MEMWRITE : 40 (True)
CMD_C8 : 80 (True)
Connection : BROM
HW Subcode : 8A00
HW Subcode : CA00
SW Ver : 0000
ME_ID : D1A645774A096059F0F89F0F6687F42D
SOC_ID : F8E9791BBF068E85DB418565C0C6F630B06B8C6B6ECB7F53570C0FCF58DAEFB8

Exploiting Device...
Successfully Exploited..
Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..Found @ 0x00200BC4
Starting to dump...
Prel Size : 0x00043830
Successfully dump preloader.. [C:\Hydra Tool\Boot\PreloaderDump\preloader_merlin.bin]
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)
Connection : BROM

Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin]
Patching da2 ... Ok
Uploading Stage 1....
Successfully uploaded stage 1, jumping ..
Executing JUMP_DA Address @ 0x00200000
Jumping to 0x00200000 Ok 0xC0
Successfully received DA sync
ONNECTION_AGENT : brom
DRAM config needed for : 13014E47314A3953
Sending auto preloader from dump... [preloader_merlin.bin]
Sending emi data.. [DRAM setup passed.]
Sending emi data succeeded.
Uploading stage 2...
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
ERAM Size : 0x0000000000070000-448 KB
IRAM Size : 0x0000000100000000-4 GB
EMMC Boot1 Size : 0x0000000000400000-4 MB
EMMC Boot2 Size : 0x0000000000400000-4 MB
EMMC RPMB Size : 0x0000000001000000-16 MB
EMMC USER Size : 0x0000001D1F000000-116.484 GB
EMMC CID : 13014E47314A3953391012CBE6185867 - G1J9S9
HW-CODE : 0x707
HWSUB-CODE : 0x8A00
HW-VERSION : 0xCA00
SW-VERSION : 0x0
CHIP-EVOLUTION : 0x1
DA-VERSION : 1.0
Speed : high-speed
Upload data was accepted. Jumping to stage 2...
DA Extensions successfully added
Reading Partition Table ..
Partition Count : 50
--------------- Reading build.prop content ---------------
Product : merlin
Marketname : ro.product.systemRedmi Note 9
ID : QP1A.190711.020
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : merlin-user 10 QP1A.190711.020 V12.0.8.0.QJOMIXM release-keys
Display ID : AL2522-Merlin-V101-Q-0517
Security Patch : 2021-05-01
StorageType : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
IMEI1 : FFFFFFFFFFFFFFF
IMEI2 : **************
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------
Backing up Security..
- preloader(preloader.bin), 512 KB = Ok [preloader_merlin.bin]
*Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0707_D1A645774A096059F0F89F0F6687F42D\Auto\060123174939\6768_Android_scatter.txt
- pgpt(pgpt.bin), 32 KB = Ok
- nvram(nvram.bin), 64 MB = Ok
- nvdata(nvdata.bin), 64 MB = Ok
- frp(frp.bin), 1024 KB = Ok
- protect1(protect1.bin), 8 MB = Ok
- protect2(protect2.bin), 11.367 MB = Ok
- persist(persist.bin), 48 MB = Ok
- proinfo(proinfo.bin), 3 MB = Ok
- nvcfg(nvcfg.bin), 32 MB = Ok
- sec1(sec1.bin), 2 MB = Ok
- seccfg(seccfg.bin), 8 MB = Ok
- lk(lk.bin), 2 MB = Ok
Backup Done!!!

Xiaomi Flashmode Second IMEI Repair
IMEI1 : FFFFFFFFFFFFFFF
IMEI2 : 359************

Reading IMEI........
IMEI1 : FFFFFFFFFFFFFFF
IMEI2 : 359************

Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!

Action Result : Ok

Elapsed Time : 00:00:39
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi Note 7 (lavender) EDL Flashing by Hydra Tool

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Qualcomm Flashing Function......
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

PreOperation Configuration
Brand : XIAOMI Model : Redmi Note 7 (lavender) Storage : Auto
Loader: 0008C0E100010000_a7b8b82545a98eca_28f4dc3c_GENERIC_XIAOMI_auth.fhprg
Port : Auto

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM4)
SymbolicName :\\?\usb#vid_05c6&pid_9008#5&201b4142&0&5#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/02/2017,2.1.2.7

Getting device info. [Connected].....
Serial No.: 0xDE838610
HW_ID : 0008C0E100000000
MSM ID : 0x0008C0E1, SDM660-Qualcomm Snapdragon 660/Sdm660LA
MODEL_ID : 0x0000
OEM_ID : 0x0000 - QUALCOMM
PBL Ver : 00000000
PK HASH : a7b8b82545a98eca23d6e9105fb464568d1b5828264903441bdef0cd57e3c370

Firehose Loader[0008C0E100010000_a7b8b82545a98eca_28f4dc3c_GENERIC_XIAOMI_auth.fhprg]
--------------------------------------------------
Header Type : OLD
TargetMSM :
Tag : _auth
Version : 5
Code_size : 416
Signature_size : 256
fhVendor : XIAOMI
HW_ID : 3006000000010000
Vendor : GENERIC
OEM_ID : 0001
MODEL_ID : 0000
SW_ID : 000000000000000B
APP_ID :
pk_hash : a7b8b82545a98eca23d6e9105fb464568d1b5828264903441bdef0cd57e3c370
OEM_VERSION : c3-bsp-builder-job001.bj
IMAGE_VARIANT : Sdm660LA
QC_VERSION : BOOT.XF.1.4-00255-S660LZB-1
--------------------------------------------------

SaharaBoot... Ok
Sending ...............................Ok
Connecting to Firehose...
Ping......... Ok
Configuration[FHProt_Auto]......
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : MSM8996
Version : 1
DateTime : Aug 2 2018 - 22:27:53

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 46058649
Firmware Version : 2
Product Name : DD68MB
Physical Partitions : 4
Total Logical Blocks:
Drive [0] 61071360[29.121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Drive [3] 8192[4 MB]

Protocol : Universal
Running : Ok

Reading GPT[4]
Drive [0] 68 Items
Drive [1] 0 Items
Drive [2] 0 Items
Drive [3] 0 Items

--------------- Reading build.prop content ---------------
build.prop
system
build.prop
Brand : xiaomi
Vendor : Xiaomi
Model : lavender
Product : lavender
Manufacturer : Xiaomi
ID : PKQ1.180904.001
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : lavender-userdebug 9 PKQ1.180904.001 241 test-keys
Device : lavender
Display ID : lavender-userdebug 9 PKQ1.180904.001 241 test-keys
Security Patch : 2018-11-05
Fingerprint : xiaomi/lavender/lavender:9/PKQ1.180904.001/241:userdebug/test-keys
--------------- end of build.prop content ---------------

Auto Backup Security partitions...
Reading Security Items....
- modemst1(modemst1.bin), 8 MB = Ok
- modemst2(modemst2.bin), 8 MB = Ok
- fsg(fsg.bin), 8 MB = Ok
- fsc(fsc.bin), 7.5 KB = Ok
- persist(persist.bin), 32 MB = Ok

C:\Hydra Tool\Backup\QUALBackup\QUALCOMM\0008C0E100000000_DE838610\Auto_Backup\061623165245
Backup Security Success....

Auto Backup Security partitions...
Reading Security Items....
- modemst1(modemst1.bin), 8 MB = Ok
- modemst2(modemst2.bin), 8 MB = Ok
- fsg(fsg.bin), 8 MB = Ok
- fsc(fsc.bin), 7.5 KB = Ok
- persist(persist.bin), 32 MB = Ok

C:\Hydra Tool\Backup\QUALBackup\QUALCOMM\0008C0E100000000_DE838610\Auto_Backup\061623165247
Backup Security Success....
----------------------------
Flashing Selected Partitions....
- vbmeta[0](vbmeta.img), 4 KB = Ok
- vbmetabak[0](vbmeta.img), 4 KB = Ok
- storsec[0](storsec.mbn), 48.016 KB = Ok
- storsecbak[0](storsec.mbn), 48.016 KB = Ok
- rpm[0](rpm.mbn), 219.539 KB = Ok
- rpmbak[0](rpm.mbn), 219.539 KB = Ok
- hyp[0](hyp.mbn), 272 KB = Ok
- hypbak[0](hyp.mbn), 272 KB = Ok
- pmic[0](pmic.elf), 38.961 KB = Ok
- pmicbak[0](pmic.elf), 38.961 KB = Ok
- cmnlib[0](cmnlib.mbn), 216.984 KB = Ok
- cmnlibbak[0](cmnlib.mbn), 216.984 KB = Ok
- cmnlib64[0](cmnlib64.mbn), 267.703 KB = Ok
- cmnlib64bak[0](cmnlib64.mbn), 267.703 KB = Ok
- abl[0](abl.elf), 148 KB = Ok
- ablbak[0](abl.elf), 148 KB = Ok
- devcfgbak[0](devcfg.mbn), 47.918 KB = Ok
- devcfg[0](devcfg.mbn), 47.918 KB = Ok
- tz[0](tz.mbn), 1.879 MB = Ok
- tzbak[0](tz.mbn), 1.879 MB = Ok
- mdtpsecapp[0](mdtpsecapp.mbn), 1.033 MB = Ok
- mdtpsecappbak[0](mdtpsecapp.mbn), 1.033 MB = Ok
- keymaster[0](km4.mbn), 309.25 KB = Ok
- keymasterbak[0](km4.mbn), 309.25 KB = Ok
- bluetooth[0](BTFM.bin), 556 KB = Ok
- xbl[0](xbl.elf), 2.452 MB = Ok
- xblbak[0](xbl.elf), 2.452 MB = Ok
- misc[0](misc.img), 8 KB = Ok
- dsp[0](dspso.bin), 16 MB = Ok
- mdtp[0](mdtp.img), 16.983 MB = Ok
- splash[0](splash.img), 28.937 MB = Ok
- persist[0](persist.img), 32 MB Skipped
- modem[0](NON-HLOS.bin), 109.392 MB = Ok
- boot[0](boot.img), 64 MB = Ok
- recovery[0](recovery.img), 64 MB = Ok
- cache[0](cache.img), 120.145 KB = Ok
- system[0](system.img), 3.225 GB = Ok
- vendor[0](vendor.img), 926.747 MB = Ok
- cust[0](cust.img), 217.196 MB = Ok
- userdata[0](userdata.img), 198.891 MB = Ok
Operation : Setbootablestoragedrive: Drive 0
Set bootable storage drive 0 Ok

Rebooting Phone.... Ok

Elapsed Time : 00:02:41
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi 9T (lime) Mi Account Remove by Hydra Tool

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Xiaomi Tool
Mi Account
Remove MiAccount[New Method]
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

PreOperation Configuration
Brand : XIAOMI Model : Redmi 9T (lime) Storage : Auto
Loader: 0000000000720000_1bebe3863a6781db_159eb52f_XIAOMI.fhprg
Port : Auto

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM9)
SymbolicName :\\?\usb#vid_05c6&pid_9008#5&1d73674e&0&8#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :12/17/2018,2.1.3.5

Getting device info. [Connected].....
Serial No.: 0x6F07A257
HW_ID : 0014D0E100720000
MSM ID : 0x0014D0E1, SM_KAMORTA_H-Qualcomm SM6115 Snapdragon 662 (11 nm)/KamortaPkgLAA
MODEL_ID : 0x0000
OEM_ID : 0x0072 - XIAOMI
PBL Ver : 00000000
PK HASH : 1bebe3863a6781db4b01086063007334de9e5ca14971c7c4f4358ec9d79cda46

Firehose Loader[0000000000720000_1bebe3863a6781db_159eb52f_XIAOMI.fhprg]
--------------------------------------------------
Header Type : New
TargetMSM :
Tag :
Version : 6
Code_size : 816
Signature_size : 256
fhVendor : XIAOMI
HW_ID : 0000000000720000
Vendor : XIAOMI
OEM_ID : 0072
MODEL_ID : 0000
SW_ID : 00000003
APP_ID : 00000000
pk_hash : 1bebe3863a6781db4b01086063007334de9e5ca14971c7c4f4358ec9d79cda4692ce5e948c6fd409408f4c919fcadfe3
OEM_VERSION : f2f760038334
IMAGE_VARIANT : KamortaPkgLAA
QC_VERSION : BOOT.XF.4.1-00187-KAMORTALAZ-2
--------------------------------------------------

SaharaBoot... Ok
Sending .................................Ok
Connecting to Firehose...
Ping...................... Ok
Configuration[FHProt_Auto]........
Ok
Chip Configuration :
MemoryName : UFS
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Nov 16 2020 - 01:25:39

*** STORAGE DEVICE INFO ***
Memory Type : UFS
Block Size in Bytes : 4096
Page Size : 4096
Manufacturer ID : 462
Serial Number : 1297306958
Firmware Version : 800
Product Name : KM5C7001DM-B622
Physical Partitions : 6
Total Logical Blocks:
Drive [0] 14501888[55,32 GB]
Drive [1] 2048[8 MB]
Drive [2] 2048[8 MB]
Drive [3] 32768[128 MB]
Drive [4] 1048576[4 GB]
Drive [5] 32768[128 MB]

Protocol : Universal
Running : Ok

Reading GPT[6]
Drive [0] 32 Items
Drive [1] 32 Items
Drive [2] 32 Items
Drive [3] 32 Items
Drive [4] 64 Items
Drive [5] 32 Items

--------------- Reading build.prop content ---------------
build.prop
system
build.prop
Marketname : ro.product.system
ID : QKQ1.200830.002
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Display ID : Android-Q-build-20210802221113
Security Patch : 2021-07-01
--------------- end of build.prop content ---------------

Auto Backup Security partitions...
Reading Security Items....
- modemst1(modemst1.bin), 1,996 MB = Ok
- modemst2(modemst2.bin), 1,996 MB = Ok
- fsg(fsg.bin), 1,996 MB = Ok
- fsc(fsc.bin), 124 KB = Ok
- persist(persist.bin), 31,996 MB = Ok

C:\Hydra Tool\Backup\QUALBackup\XIAOMI\0014D0E100720000_6F07A257\Auto_Backup\061623112250
Backup Security Success....
Reading GPT[6]
Drive [0] 32 Items
Drive [1] 32 Items
Drive [2] 32 Items
Drive [3] 32 Items
Drive [4] 64 Items
Drive [5] 32 Items

Backing up Partition for safety...Ok

Scanning Patching address...Done!!
No patching address available...
Seems like device has no Mi Account added....

Rebooting Phone.... Ok

Action Result : Ok

Elapsed Time : 00:00:32
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye

Redmi 8A Pro (olivewood) Remove Mi Account by Hydra Tool


- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Xiaomi Tool
Mi Account
Remove MiAccount[New Method]
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

PreOperation Configuration
Brand : XIAOMI Model : Redmi 8A Pro (olivewood) Storage : Auto
Loader: 000BF0E100720000_57158eaf1814d78f_e551cac5_XIAOMI_auth_peek_8937.fhprg
Port : Auto

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM18)
SymbolicName :\\?\usb#vid_05c6&pid_9008#6&33d1b76f&0&5#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :05/29/2019,2.1.3.7

Getting device info. [Connected].Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok
Configuration[FHProt_Auto]......
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 1655959819
Firmware Version : 909127728
Product Name : hB8aP>
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 61071360[29.121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok

Reading GPT[3]
Drive [0] 64 Items
Drive [1] 0 Items
Drive [2] 0 Items

--------------- Reading build.prop content ---------------
build.prop
system
build.prop
ID : QKQ1.191014.001
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Security Patch : 2021-09-01
--------------- end of build.prop content ---------------
Reading GPT[3]
Drive [0] 64 Items
Drive [1] 0 Items
Drive [2] 0 Items

Backing up Partition for safety...Ok

Scanning Patching address...
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]Done!!
Total Items patched : 35
Successfully patched address..

Action Result : Ok

Elapsed Time : 00:01:05
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Oppo A15s (CPH2179) Removed Screen Lock With Data Loss by Hydra Tool

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Service Function
Format/Factory Reset/ScreenLock
Safe Format
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching for MTK Device...Found
MTK Port Type : Flashmode BROM
FriendlyName : MediaTek USB Port (COM3)
Device : /5&21111b0c&0&2
SymbolicName : \\?\usb#vid_0e8d&pid_0003#5&21111b0c&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 07/22/2022,3.0.1511.0
Service : wdm_usb

Openning Port [COM3] Ok
Handshaking...Ok
HwCode : 0766 {MT6765/MT8768t}
Hwver : 0000
Target config : E5
SBC : 01 (True)
SLA : 00 (False)
DAA : 04 (True)
SWJTAG : 04 (True)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 20 (True)
MEMWRITE : 40 (True)
CMD_C8 : 80 (True)
Connection : BROM
HW Subcode : 8A00
HW Subcode : CA00
SW Ver : 0000
ME_ID : C44B328FC89514D4D3A31AB05118C79C
SOC_ID : 47AD0A453AD2E0F0E631F088B3062E5D4D254B96BE39457A94759F5319B94C7B

Exploiting Device...
Successfully Exploited..
Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..Found @ 0x00200BC4
Starting to dump...
Prel Size : 0x0003DB1C
Successfully dump preloader.. [C:\Hydra Tool\Boot\PreloaderDump\preloader_oppo6765.bin]
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)
Connection : BROM

Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin]
Patching da2 ... Ok
Uploading Stage 1....
Successfully uploaded stage 1, jumping ..
Executing JUMP_DA Address @ 0x00200000
Jumping to 0x00200000 Ok 0xC0
Successfully received DA sync
ONNECTION_AGENT : brom
DRAM config needed for : 1501003458364B4D
Sending auto preloader from dump... [preloader_oppo6765.bin]
Sending emi data.. [DRAM setup passed.]
Sending emi data succeeded.
Uploading stage 2...
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
ERAM Size : 0x000000000003A000-232 KB
IRAM Size : 0x0000000080000000-2 GB
EMMC Boot1 Size : 0x0000000000400000-4 MB
EMMC Boot2 Size : 0x0000000000400000-4 MB
EMMC RPMB Size : 0x0000000000400000-4 MB
EMMC USER Size : 0x0000000747C00000-29.121 GB
EMMC CID : 1501003458364B4D420362AECED857A3 - 4X6KMB
HW-CODE : 0x766
HWSUB-CODE : 0x8A00
HW-VERSION : 0xCA00
SW-VERSION : 0x0
CHIP-EVOLUTION : 0x0
DA-VERSION : 1.0
Speed : high-speed
Upload data was accepted. Jumping to stage 2...
DA Extensions successfully added
Reading Partition Table ..
Partition Count : 49
--------------- Reading build.prop content ---------------
Product : oppo6765
ID : QP1A.190711.020
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6765-user 10 QP1A.190711.020 bedd37e98646d3a1 release-keys
Display ID : QP1A.190711.020 release-keys
Security Patch : 2021-10-05
StorageType : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------
Backing up Security..
- preloader(preloader.bin), 512 KB = Ok [preloader_oppo6765.bin]
*Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0766_C44B328FC89514D4D3A31AB05118C79C\Auto\062023102514\6765_Android_scatter.txt
- pgpt(pgpt.bin), 32 KB = Ok
- nvram(nvram.bin), 64 MB = Ok
- nvdata(nvdata.bin), 64 MB = Ok
- frp(frp.bin), 1024 KB = Ok
- protect1(protect1.bin), 8 MB = Ok
- protect2(protect2.bin), 15.867 MB = Ok
- persist(persist.bin), 48 MB = Ok
- proinfo(proinfo.bin), 3 MB = Ok
- oppo_custom(oppo_custom.bin), 1024 KB = Ok
- opporeserve1(opporeserve1.bin), 8 MB = Ok
- opporeserve2(opporeserve2.bin), 128 MB = Ok
- nvcfg(nvcfg.bin), 32 MB = Ok
- sec1(sec1.bin), 2 MB = Ok
- seccfg(seccfg.bin), 8 MB = Ok
- lk(lk.bin), 4 MB = Ok
Backup Done!!!
------------------------------
Factory Reset Flash Mode..
------------------------------
Operation : Safeformat Universal...

Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!

Action Result : Ok

Elapsed Time : 00:01:04
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Oppo A15s (CPH2179) Remove FRP by Hydra Tool


- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Service Function
Factory Reset Protection[FRP]
Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching for MTK Device...Found
MTK Port Type : Flashmode BROM
FriendlyName : MediaTek USB Port (COM3)
Device : /5&21111b0c&0&2
SymbolicName : \\?\usb#vid_0e8d&pid_0003#5&21111b0c&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 07/22/2022,3.0.1511.0
Service : wdm_usb

Openning Port [COM3] Ok
Handshaking...Ok
HwCode : 0766 {MT6765/MT8768t}
Hwver : 0000
Target config : E5
SBC : 01 (True)
SLA : 00 (False)
DAA : 04 (True)
SWJTAG : 04 (True)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 20 (True)
MEMWRITE : 40 (True)
CMD_C8 : 80 (True)
Connection : BROM
HW Subcode : 8A00
HW Subcode : CA00
SW Ver : 0000
ME_ID : C44B328FC89514D4D3A31AB05118C79C
SOC_ID : 47AD0A453AD2E0F0E631F088B3062E5D4D254B96BE39457A94759F5319B94C7B

Exploiting Device...
Successfully Exploited..
Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..Found @ 0x00200BC4
Starting to dump...
Prel Size : 0x0003DB1C
Successfully dump preloader.. [C:\Hydra Tool\Boot\PreloaderDump\preloader_oppo6765.bin]
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)
Connection : BROM

Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin]
Patching da2 ... Ok
Uploading Stage 1....
Successfully uploaded stage 1, jumping ..
Executing JUMP_DA Address @ 0x00200000
Jumping to 0x00200000 Ok 0xC0
Successfully received DA sync
ONNECTION_AGENT : brom
DRAM config needed for : 1501003458364B4D
Sending auto preloader from dump... [preloader_oppo6765.bin]
Sending emi data.. [DRAM setup passed.]
Sending emi data succeeded.
Uploading stage 2...
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
ERAM Size : 0x000000000003A000-232 KB
IRAM Size : 0x0000000080000000-2 GB
EMMC Boot1 Size : 0x0000000000400000-4 MB
EMMC Boot2 Size : 0x0000000000400000-4 MB
EMMC RPMB Size : 0x0000000000400000-4 MB
EMMC USER Size : 0x0000000747C00000-29.121 GB
EMMC CID : 1501003458364B4D420362AECED857A3 - 4X6KMB
HW-CODE : 0x766
HWSUB-CODE : 0x8A00
HW-VERSION : 0xCA00
SW-VERSION : 0x0
CHIP-EVOLUTION : 0x0
DA-VERSION : 1.0
Speed : high-speed
Upload data was accepted. Jumping to stage 2...
DA Extensions successfully added
Reading Partition Table ..
Partition Count : 49
--------------- Reading build.prop content ---------------
Product : oppo6765
ID : QP1A.190711.020
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6765-user 10 QP1A.190711.020 bedd37e98646d3a1 release-keys
Display ID : QP1A.190711.020 release-keys
Security Patch : 2021-10-05
StorageType : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------
Backing up Security..
- preloader(preloader.bin), 512 KB = Ok [preloader_oppo6765.bin]
*Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0766_C44B328FC89514D4D3A31AB05118C79C\Auto\062023103213\6765_Android_scatter.txt
- pgpt(pgpt.bin), 32 KB = Ok
- nvram(nvram.bin), 64 MB = Ok
- nvdata(nvdata.bin), 64 MB = Ok
- frp(frp.bin), 1024 KB = Ok
- protect1(protect1.bin), 8 MB = Ok
- protect2(protect2.bin), 15.867 MB = Ok
- persist(persist.bin), 48 MB = Ok
- proinfo(proinfo.bin), 3 MB = Ok
- oppo_custom(oppo_custom.bin), 1024 KB = Ok
- opporeserve1(opporeserve1.bin), 8 MB = Ok
- opporeserve2(opporeserve2.bin), 128 MB = Ok
- nvcfg(nvcfg.bin), 32 MB = Ok
- sec1(sec1.bin), 2 MB = Ok
- seccfg(seccfg.bin), 8 MB = Ok
- lk(lk.bin), 4 MB = Ok
Backup Done!!!

Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!

Action Result : Ok

Elapsed Time : 00:01:00
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Poco X3 Pro (vayu) Brick Solution With Fastboot Flashing by Hydra Tool

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Qualcomm Flashing Function......
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching Device By Fastboot
Device Found...
- switch[0](dummy.img), 8 KB = Ok
- misc[0](misc.img), 4 MB = Ok
- logfs[0](logfs_ufs_8mb.bin), 16 KB = Ok
- metadata[0](metadata.img), 48,074 KB = Ok
- super[0](super.img), 7,348 GB = Ok
- imagefv[0](imagefv.elf), 140 KB = Ok
- recovery[0](recovery.img), 128 MB = Ok
- cache[0](cache.img), 152,145 KB = Ok
- cust[0](cust.img), 507,965 MB = Ok
- userdata[0](userdata.img), 790,18 MB = Ok
- xbl_config[0](xbl_config.elf), 120,641 KB = Ok
- xbl[0](xbl.elf), 3,96 MB = Ok
- xbl_configbak[0](xbl_config.elf), 120,641 KB = Ok
- xblbak[0](xbl.elf), 3,96 MB = Ok
- multiimgoem[0](multi_image.mbn), 32 KB = Ok
- qupfw[0](qupv3fw.elf), 69,072 KB = Ok
- qupfwbak[0](qupv3fw.elf), 69,072 KB = Ok
- vbmeta[0](vbmeta.img), 8 KB = Ok
- storsec[0](storsec.mbn), 20,083 KB = Ok
- vbmeta_system[0](vbmeta_system.img), 4 KB = Ok
- devcfg[0](devcfg.mbn), 53,012 KB = Ok
- devcfgbak[0](devcfg.mbn), 53,012 KB = Ok
- aop[0](aop.mbn), 195,992 KB = Ok
- aopbak[0](aop.mbn), 195,992 KB = Ok
- cmnlib[0](cmnlib.mbn), 385,748 KB = Ok
- cmnlibbak[0](cmnlib.mbn), 385,748 KB = Ok
- cmnlib64[0](cmnlib64.mbn), 503,607 KB = Ok
- cmnlib64bak[0](cmnlib64.mbn), 503,607 KB = Ok
- keymaster[0](km41.mbn), 273,663 KB = Ok
- keymasterbak[0](km41.mbn), 273,663 KB = Ok
- bluetooth[0](BTFM.bin), 860 KB = Ok
- uefisecapp[0](uefi_sec.mbn), 122,616 KB = Ok
- uefisecappbak[0](uefi_sec.mbn), 122,616 KB = Ok
- abl[0](abl.elf), 204 KB = Ok
- ablbak[0](abl.elf), 204 KB = Ok
- tz[0](tz.mbn), 3,043 MB = Ok
- tzbak[0](tz.mbn), 3,043 MB = Ok
- hyp[0](hyp.mbn), 476,883 KB = Ok
- hypbak[0](hyp.mbn), 476,883 KB = Ok
- dtbo[0](dtbo.img), 32 MB = Ok
- logo[0](logo.img), 29,504 MB = Ok
- dsp[0](dspso.bin), 64 MB = Ok
- boot[0](boot.img), 128 MB = Ok
- modem[0](NON-HLOS.bin), 195,309 MB = Ok
- persist[0](persist.img), 64 MB Skipped

Elapsed Time : 00:02:31

 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi Note 10 (sunny) EDL Flasing by Hydra Tool

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Qualcomm Flashing Function......
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

PreOperation Configuration
Brand : XIAOMI Model : Redmi Note 10 (sunny) Storage : Auto
Loader: 000950E100720000_1bebe3863a6781db_404ab4f2_XIAOMI_auth.fhprg
Port : Auto

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM26)
SymbolicName :\\?\usb#vid_05c6&pid_9008#5&1946a98f&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/02/2017,2.1.2.7

Getting device info. [Connected].....
Serial No.: 0x95843824
HW_ID : 000950E100720000
MSM ID : 0x000950E1, SM6150-Qualcomm Snapdragon 675 /SDM6150LA
MODEL_ID : 0x0000
OEM_ID : 0x0072 - XIAOMI
PBL Ver : 00000000
PK HASH : 1bebe3863a6781db4b01086063007334de9e5ca14971c7c4f4358ec9d79cda46

Firehose Loader[000950E100720000_1bebe3863a6781db_404ab4f2_XIAOMI_auth.fhprg]
--------------------------------------------------
Header Type : New
TargetMSM :
Tag : _auth
Version : 6
Code_size : 816
Signature_size : 256
fhVendor : XIAOMI
HW_ID : 000950E100720000
Vendor : XIAOMI
OEM_ID : 0072
MODEL_ID : 0000
SW_ID : 00000003
APP_ID : 00000000
pk_hash : 1bebe3863a6781db4b01086063007334de9e5ca14971c7c4f4358ec9d79cda4692ce5e948c6fd409408f4c919fcadfe3
OEM_VERSION : c3-bsp-builder-job004.bj
IMAGE_VARIANT : SDM6150LA
QC_VERSION : BOOT.XF.3.1-00157-SM6150LZB-1
--------------------------------------------------

SaharaBoot... Ok
Sending ..................................Ok
Connecting to Firehose...
Ping..................... Ok
Configuration[FHProt_Auto].
Xiaomi Authentication needed...
Signature Request -> bob[3XkvVhPLrg6cxMvsLNdU9f2cZUs]
Signature @256bytes Authentication.... Accepted........
Identifying Chip........UFS
Ok
Chip Configuration :
MemoryName : UFS
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Mar 7 2019 - 23:06:29

*** STORAGE DEVICE INFO ***
Memory Type : UFS
Block Size in Bytes : 4096
Page Size : 4096
Manufacturer ID : 429
Serial Number : 2037279096
Firmware Version : 002
Product Name : H9HQ15AECMBDAR
Physical Partitions : 6
Total Logical Blocks:
Drive [0] 30119936[114,898 GB]
Drive [1] 2048[8 MB]
Drive [2] 2048[8 MB]
Drive [3] 32768[128 MB]
Drive [4] 1048576[4 GB]
Drive [5] 32768[128 MB]

Protocol : Universal
Running : Ok

Reading GPT[6]
Drive [0] 32 Items
Drive [1] 32 Items
Drive [2] 32 Items
Drive [3] 32 Items
Drive [4] 64 Items
Drive [5] 32 Items

--------------- Reading build.prop content ---------------
build.prop
system
build.prop
Marketname : ro.product.system
ID : RKQ1.201022.002
SDK : 30
Release : 11
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Security Patch : 2021-02-01
--------------- end of build.prop content ---------------

Auto Backup Security partitions...
Reading Security Items....
- modemst1(modemst1.bin), 2,496 MB = Ok
- modemst2(modemst2.bin), 2,496 MB = Ok
- fsg(fsg.bin), 2,496 MB = Ok
- fsc(fsc.bin), 124 KB = Ok
- persist(persist.bin), 31,996 MB = Ok

C:\Hydra Tool\Backup\QUALBackup\XIAOMI\000950E100720000_95843824\Auto_Backup\062123091625
Backup Security Success....

Auto Backup Security partitions...
Reading Security Items....
- modemst1(modemst1.bin), 2,496 MB = Ok
- modemst2(modemst2.bin), 2,496 MB = Ok
- fsg(fsg.bin), 2,496 MB = Ok
- fsc(fsc.bin), 124 KB = Ok
- persist(persist.bin), 31,996 MB = Ok

C:\Hydra Tool\Backup\QUALBackup\XIAOMI\000950E100720000_95843824\Auto_Backup\062123091634
Backup Security Success....
----------------------------
Flashing Selected Partitions....
- misc[0](misc.img), 8 KB = Ok
- cust[0](cust.img), 917,2 MB = Ok
- super[0](super.img), 5,401 GB = Ok
- vbmeta_system_a[0](vbmeta_system.img), 4 KB = Ok
- metadata[0](metadata.img), 44,074 KB = Ok
- rescue[0](rescue.img), 40,074 KB = Ok
- ffu[0](ffu.img), 4 MB = Ok
- userdata[0](userdata.img), 716,657 MB = Ok
- PrimaryGPT[0](gpt_main0.bin), 24 KB = Ok
- xbl_a[1](xbl.elf), 3,446 MB = Ok
- xbl_config_a[1](xbl_config.elf), 71,324 KB = Ok
- PrimaryGPT[1](gpt_main1.bin), 24 KB = Ok
- xbl_b[2](xbl.elf), 3,446 MB = Ok
- xbl_config_b[2](xbl_config.elf), 71,324 KB = Ok
- PrimaryGPT[2](gpt_main2.bin), 24 KB = Ok
- PrimaryGPT[3](gpt_main3.bin), 24 KB = Ok
- aop_a[4](aop.mbn), 156,949 KB = Ok
- tz_a[4](tz.mbn), 1,965 MB = Ok
- hyp_a[4](hyp.mbn), 368,547 KB = Ok
- bluetooth_a[4](BTFM.bin), 908 KB = Ok
- abl_a[4](abl.elf), 204 KB = Ok
- dsp_a[4](dspso.bin), 32 MB = Ok
- keymaster_a[4](km41.mbn), 237,155 KB = Ok
- boot_a[4](boot.img), 128 MB = Ok
- cmnlib_a[4](cmnlib.mbn), 389,521 KB = Ok
- cmnlib64_a[4](cmnlib64.mbn), 507,959 KB = Ok
- devcfg_a[4](devcfg.mbn), 42,867 KB = Ok
- qupfw_a[4](qupv3fw.elf), 48,081 KB = Ok
- vbmeta_a[4](vbmeta.img), 4 KB = Ok
- dtbo_a[4](dtbo.img), 8 MB = Ok
- imagefv_a[4](imagefv.elf), 20 KB = Ok
- uefisecapp_a[4](uefi_sec.mbn), 123,772 KB = Ok
- vendor_boot_a[4](vendor_boot.img), 96 MB = Ok
- aop_b[4](aop.mbn), 156,949 KB = Ok
- tz_b[4](tz.mbn), 1,965 MB = Ok
- hyp_b[4](hyp.mbn), 368,547 KB = Ok
- bluetooth_b[4](BTFM.bin), 908 KB = Ok
- abl_b[4](abl.elf), 204 KB = Ok
- dsp_b[4](dspso.bin), 32 MB = Ok
- keymaster_b[4](km41.mbn), 237,155 KB = Ok
- boot_b[4](boot.img), 128 MB = Ok
- cmnlib_b[4](cmnlib.mbn), 389,521 KB = Ok
- cmnlib64_b[4](cmnlib64.mbn), 507,959 KB = Ok
- devcfg_b[4](devcfg.mbn), 42,867 KB = Ok
- qupfw_b[4](qupv3fw.elf), 48,081 KB = Ok
- vbmeta_b[4](vbmeta.img), 4 KB = Ok
- dtbo_b[4](dtbo.img), 8 MB = Ok
- imagefv_b[4](imagefv.elf), 20 KB = Ok
- uefisecapp_b[4](uefi_sec.mbn), 123,772 KB = Ok
- logfs[4](logfs_ufs_8mb.bin), 16 KB = Ok
- storsec[4](storsec.mbn), 20,091 KB = Ok
- PrimaryGPT[4](gpt_main4.bin), 24 KB = Ok
- PrimaryGPT[5](gpt_main5.bin), 24 KB = Ok

Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-6.] = Ok
0 [NUM_DISK_SECTORS-6.] = Ok
0 [NUM_DISK_SECTORS-6.] = Ok
0 [NUM_DISK_SECTORS-6.] = Ok
0 [NUM_DISK_SECTORS-1.] = Ok
0 [NUM_DISK_SECTORS-1.] = Ok
0 [NUM_DISK_SECTORS-5.] = Ok
0 [CRC32(2,4096)] = Ok
0 [CRC32(NUM_DISK_SECTORS-5.,4096)] = Ok
0 [0] = Ok
0 [CRC32(1,92)] = Ok
0 [0] = Ok
0 [CRC32(NUM_DISK_SECTORS-1.,92)] = Ok
1 [NUM_DISK_SECTORS-6.] = Ok
1 [NUM_DISK_SECTORS-6.] = Ok
1 [NUM_DISK_SECTORS-6.] = Ok
1 [NUM_DISK_SECTORS-6.] = Ok
1 [NUM_DISK_SECTORS-1.] = Ok
1 [NUM_DISK_SECTORS-1.] = Ok
1 [NUM_DISK_SECTORS-5.] = Ok
1 [CRC32(2,4096)] = Ok
1 [CRC32(NUM_DISK_SECTORS-5.,4096)] = Ok
1 [0] = Ok
1 [CRC32(1,92)] = Ok
1 [0] = Ok
1 [CRC32(NUM_DISK_SECTORS-1.,92)] = Ok
2 [NUM_DISK_SECTORS-6.] = Ok
2 [NUM_DISK_SECTORS-6.] = Ok
2 [NUM_DISK_SECTORS-6.] = Ok
2 [NUM_DISK_SECTORS-6.] = Ok
2 [NUM_DISK_SECTORS-1.] = Ok
2 [NUM_DISK_SECTORS-1.] = Ok
2 [NUM_DISK_SECTORS-5.] = Ok
2 [CRC32(2,4096)] = Ok
2 [CRC32(NUM_DISK_SECTORS-5.,4096)] = Ok
2 [0] = Ok
2 [CRC32(1,92)] = Ok
2 [0] = Ok
2 [CRC32(NUM_DISK_SECTORS-1.,92)] = Ok
3 [NUM_DISK_SECTORS-6.] = Ok
3 [NUM_DISK_SECTORS-6.] = Ok
3 [NUM_DISK_SECTORS-6.] = Ok
3 [NUM_DISK_SECTORS-6.] = Ok
3 [NUM_DISK_SECTORS-1.] = Ok
3 [NUM_DISK_SECTORS-1.] = Ok
3 [NUM_DISK_SECTORS-5.] = Ok
3 [CRC32(2,4096)] = Ok
3 [CRC32(NUM_DISK_SECTORS-5.,4096)] = Ok
3 [0] = Ok
3 [CRC32(1,92)] = Ok
3 [0] = Ok
3 [CRC32(NUM_DISK_SECTORS-1.,92)] = Ok
4 [NUM_DISK_SECTORS-6.] = Ok
4 [NUM_DISK_SECTORS-6.] = Ok
4 [NUM_DISK_SECTORS-6.] = Ok
4 [NUM_DISK_SECTORS-6.] = Ok
4 [NUM_DISK_SECTORS-1.] = Ok
4 [NUM_DISK_SECTORS-1.] = Ok
4 [NUM_DISK_SECTORS-5.] = Ok
4 [CRC32(2,8192)] = Ok
4 [CRC32(NUM_DISK_SECTORS-5.,8192)] = Ok
4 [0] = Ok
4 [CRC32(1,92)] = Ok
4 [0] = Ok
4 [CRC32(NUM_DISK_SECTORS-1.,92)] = Ok
5 [NUM_DISK_SECTORS-6.] = Ok
5 [NUM_DISK_SECTORS-6.] = Ok
5 [NUM_DISK_SECTORS-6.] = Ok
5 [NUM_DISK_SECTORS-6.] = Ok
5 [NUM_DISK_SECTORS-1.] = Ok
5 [NUM_DISK_SECTORS-1.] = Ok
5 [NUM_DISK_SECTORS-5.] = Ok
5 [CRC32(2,4096)] = Ok
5 [CRC32(NUM_DISK_SECTORS-5.,4096)] = Ok
5 [0] = Ok
5 [CRC32(1,92)] = Ok
5 [0] = Ok
5 [CRC32(NUM_DISK_SECTORS-1.,92)] = Ok
Operation : Setbootablestoragedrive: Drive 1
Set bootable storage drive 1 Ok

Rebooting Phone.... Ok

Elapsed Time : 00:14:03
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Realme C25 (RMX3191) Format Factory Reset by Hydra Tool


- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Service Function
Format/Factory Reset/ScreenLock
Safe Format Master Clear 1
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching for MTK Device...Found
MTK Port Type : Flashmode BROM
FriendlyName : MediaTek USB Port_V1632 (COM12)
Device : /8&327aa5f0&0&1
SymbolicName : \\?\usb#vid_0e8d&pid_0003#8&327aa5f0&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0
Service : wdm_usb

Openning Port [COM12] Ok
Handshaking...Ok
HwCode : 0707 {MT6768}
Hwver : 0000
Target config : E5
SBC : 01 (True)
SLA : 00 (False)
DAA : 04 (True)
SWJTAG : 04 (True)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 20 (True)
MEMWRITE : 40 (True)
CMD_C8 : 80 (True)
Connection : BROM
HW Subcode : 8A00
HW Subcode : CA00
SW Ver : 0000
ME_ID : 4CAD9EE13B49CB7B06E724A98772DB71
SOC_ID : 74247DE71C15ECBC52E2133D6B201B27B8E37E5069DF37781232E9359DD46593

Exploiting Device...
Successfully Exploited..
Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..Found @ 0x00200BC4
Starting to dump...
Prel Size : 0x00050340
Successfully dump preloader.. [C:\Hydra Tool\Boot\PreloaderDump\preloader_k68v1_64.bin]
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)
Connection : BROM

Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin]
Patching da2 ... Ok
Uploading Stage 1....
Successfully uploaded stage 1, jumping ..
Executing JUMP_DA Address @ 0x00200000
Jumping to 0x00200000 Ok 0xC0
Successfully received DA sync
ONNECTION_AGENT : brom
DRAM config needed for : 13014E47314A3952
Sending auto preloader from dump... [preloader_k68v1_64.bin]
Sending emi data.. [DRAM setup passed.]
Sending emi data succeeded.
Uploading stage 2...
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
ERAM Size : 0x0000000000070000-448 KB
IRAM Size : 0x0000000100000000-4 GB
EMMC Boot1 Size : 0x0000000000400000-4 MB
EMMC Boot2 Size : 0x0000000000400000-4 MB
EMMC RPMB Size : 0x0000000001000000-16 MB
EMMC USER Size : 0x0000000E8F800000-58.242 GB
EMMC CID : 13014E47314A395238100F8818C728D3 - G1J9R8
HW-CODE : 0x707
HWSUB-CODE : 0x8A00
HW-VERSION : 0xCA00
SW-VERSION : 0x0
CHIP-EVOLUTION : 0x1
DA-VERSION : 1.0
Speed : high-speed
Upload data was accepted. Jumping to stage 2...
DA Extensions successfully added
Reading Partition Table ..
Partition Count : 48
--------------- Reading build.prop content ---------------
Product : oplus_mssi_64_cn
ID : RP1A.200720.011
SDK : 30
Release : 11
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : sys_oplus_mssi_64_cn-user 11 RP1A.200720.011 1614161234317 release-keys
Display ID : RP1A.200720.011 release-keys
Security Patch : 2022-01-05
StorageType : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------
Backing up Security..
- preloader(preloader.bin), 512 KB = Ok [preloader_k68v1_64.bin]
*Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0707_4CAD9EE13B49CB7B06E724A98772DB71\Auto\062123123617\6768_Android_scatter.txt
- pgpt(pgpt.bin), 32 KB = Ok
- nvram(nvram.bin), 64 MB = Ok
- nvdata(nvdata.bin), 64 MB = Ok
- frp(frp.bin), 1024 KB = Ok
- protect1(protect1.bin), 8 MB = Ok
- protect2(protect2.bin), 9.367 MB = Ok
- persist(persist.bin), 48 MB = Ok
- proinfo(proinfo.bin), 3 MB = Ok
- oppo_custom(oppo_custom.bin), 1024 KB = Ok
- opporeserve1(opporeserve1.bin), 8 MB = Ok
- opporeserve2(opporeserve2.bin), 128 MB = Ok
- nvcfg(nvcfg.bin), 32 MB = Ok
- sec1(sec1.bin), 2 MB = Ok
- seccfg(seccfg.bin), 8 MB = Ok
- lk(lk.bin), 5 MB = Ok
Backup Done!!!
------------------------------
Factory Reset Flash Mode..
------------------------------
Operation : Safeformat Master Clear 1

Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!

Action Result : Ok

Elapsed Time : 00:01:35
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Vivo Y95 (1807) Format Factory Reset & FRP Remove by Hydra Tool

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Vivo Service Tool
Factory Reset/Format Userdata
Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

PreOperation Configuration
Brand : AUTO Model : AUTO Storage : Auto
Loader: Auto
Port : Auto

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM122)
SymbolicName :\\?\usb#vid_05c6&pid_9008#6&6f0c48d&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/31/2015,2.1.2.0

Getting device info. [Connected].....
Serial No.: 0x804BD8D1
HW_ID : 000BF0E100000000
MSM ID : 0x000BF0E1, SDM439-Qualcomm Snapdragon 439/FAADANAZA
MODEL_ID : 0x0000
OEM_ID : 0x0000 - QUALCOMM
PBL Ver : 00000000
PK HASH : 60ba997fef6da9f05885fa11f1dd6d2a90d052a257a09c2075d7246cc73c0d43

Hydra Enable Auto search Firehose..
#Please wait...
#Search by filename filter.....
#Found 16 Compatible Files ..Found match Firehose...

Firehose Loader[000bf0e100000000_60ba997fef6da9f0_11940c9b_qualcomm_vivo_wut_peek_8937.fhprg]
--------------------------------------------------
Header Type : OLD
TargetMSM : 8937
Tag : _wut_peek
Version : 3
Code_size : 288
Signature_size : 256
fhVendor : VIVO
HW_ID : 000BF0E100000000
Vendor : QUALCOMM
OEM_ID : 0000
MODEL_ID : 0000
SW_ID : 0000000000000003
APP_ID :
pk_hash : 60ba997fef6da9f05885fa11f1dd6d2a90d052a257a09c2075d7246cc73c0d43
OEM_VERSION : compiler0176
IMAGE_VARIANT : FAADANAZA
QC_VERSION : BOOT.BF.3.3.2-00063
--------------------------------------------------

SaharaBoot... Ok
Sending ...................Ok
Connecting to Firehose...
Ping... Ok
Configuration[FHProt_Auto]......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 3738634280
Firmware Version : 167
Product Name : HCG8a4
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 122142720[58,242 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok

Reading GPT[3]
Drive [0] 60 Items
Drive [1] 0 Items
Drive [2] 0 Items

--------------- Reading build.prop content ---------------
build.prop
Brand : vivo
Vendor : vivo
Model : vivo 1807
Product : msm8937_64
Manufacturer : vivo
ID : OPM1.171019.026
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : msm8937_64-user 8.1.0 OPM1.171019.026 eng.compil.20190710.220041 release-keys
Device : msm8937_64
Display ID : OPM1.171019.026 release-keys
Security Patch : 2019-07-01
Fingerprint : vivo/1807/1807:8.1.0/OPM1.171019.026/compil07102200:user/release-keys
--------------- end of build.prop content ---------------

Auto Backup Security partitions...
Reading Security Items....
- modemst1(modemst1.bin), 2,5 MB = Ok
- modemst2(modemst2.bin), 2,5 MB = Ok
- fsg(fsg.bin), 2,5 MB = Ok
- fsc(fsc.bin), 512 Bytes = Ok
- persist(persist.bin), 32 MB = Ok

C:\Hydra Tool\Backup\QUALBackup\QUALCOMM\000BF0E100000000_804BD8D1\Auto_Backup\062123164554
Backup Security Success....
Processing Safe Format - Auto....
- Formatting Userdata
Executing ...
- Formatting Userdata [Safe Format - eMMc] **WARNING Unauthorized tag '' FailedFailed

Rebooting Phone.... Ok

Action Result : Failed

Elapsed Time : 00:00:18
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi 8 (olive) EDL Flashing by Hydra Tool
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Qualcomm Flashing Function......
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

PreOperation Configuration
Brand : XIAOMI Model : Redmi 8 (olive) Storage : Auto
Loader: 000BF0E100720000_57158eaf1814d78f_e551cac5_XIAOMI_auth_peek_8937.fhprg
Port : Auto

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM6)
SymbolicName :\\?\usb#vid_05c6&pid_9008#6&223f1529&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :05/29/2019,2.1.3.7

Getting device info. [Connected].Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok
Configuration[FHProt_Auto]......
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 2908283366
Firmware Version : 162
Product Name : HCG8a4
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 122142720[58,242 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok

Reading GPT[3]
Drive [0] 64 Items
Drive [1] 0 Items
Drive [2] 0 Items

--------------- Reading build.prop content ---------------
build.prop
system
build.prop
ID : QKQ1.191014.001
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Security Patch : 2020-08-01
--------------- end of build.prop content ---------------

Auto Backup Security partitions...
Reading Security Items....
- modemst1(modemst1.bin), 8 MB = Ok
- modemst2(modemst2.bin), 8 MB = Ok
- fsg(fsg.bin), 8 MB = Ok
- fsc(fsc.bin), 7,5 KB = Ok
- persist(persist.bin), 32 MB = Ok

C:\Hydra Tool\Backup\QUALBackup\XIAOMI\000BF0E100720000_A83DF23B\Auto_Backup\062123113438
Backup Security Success....
----------------------------
Flashing Selected Partitions....
- sec[0](sec.dat), 80 Bytes Skipped
- config[0](config.bin), 32 KB Skipped
- vbmeta[0](vbmeta.img), 4 KB = Ok
- vbmetabak[0](vbmeta.img), 4 KB = Ok
- devcfg[0](devcfg.mbn), 37,145 KB = Ok
- devcfgbak[0](devcfg.mbn), 37,145 KB = Ok
- apdp[0](dummy.img), 8 KB = Ok
- msadp[0](dummy.img), 8 KB = Ok
- sbl1[0](sbl1.mbn), 399,457 KB = Ok
- sbl1bak[0](sbl1.mbn), 399,457 KB = Ok
- rpm[0](rpm.mbn), 165,129 KB = Ok
- rpmbak[0](rpm.mbn), 165,129 KB = Ok
- cmnlib[0](cmnlib_30.mbn), 208,844 KB = Ok
- cmnlibbak[0](cmnlib_30.mbn), 208,844 KB = Ok
- cmnlib64[0](cmnlib64_30.mbn), 262,781 KB = Ok
- cmnlib64bak[0](cmnlib64_30.mbn), 262,781 KB = Ok
- keymaster[0](km4.mbn), 312,258 KB = Ok
- keymasterbak[0](km4.mbn), 312,258 KB = Ok
- misc[0](misc.img), 8 KB = Ok
- aboot[0](emmc_appsboot.mbn), 747 KB = Ok
- abootbak[0](emmc_appsboot.mbn), 747 KB = Ok
- tz[0](tz.mbn), 1,461 MB = Ok
- tzbak[0](tz.mbn), 1,461 MB = Ok
- dtbo[0](dtbo.img), 8 MB = Ok
- dtbobak[0](dtbo.img), 8 MB = Ok
- splash[0](splash.img), 1,211 MB = Ok
- dsp[0](adspso.bin), 16 MB = Ok
- dspbak[0](adspso.bin), 16 MB = Ok
- persist[0](persist.img), 32 MB Skipped
- mdtp[0](mdtp.img), 16,983 MB = Ok
- mdtpbak[0](mdtp.img), 16,983 MB = Ok
- boot[0](boot.img), 64 MB = Ok
- recovery[0](recovery.img), 64 MB = Ok
- cache[0](cache.img), 160,168 KB = Ok
- modem[0](NON-HLOS.bin), 128 MB = Ok
- system[0](system.img), 3,387 GB = Ok
- vendor[0](vendor.img), 981 MB = Ok
- cust[0](cust.img), 307,156 MB = Ok
- userdata[0](userdata.img), 262,102 MB = Ok
- PrimaryGPT[0](gpt_main0.bin), 17 KB = Ok

Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-34.] = Ok
0 [NUM_DISK_SECTORS-34.] = Ok
0 [NUM_DISK_SECTORS-34.] = Ok
0 [NUM_DISK_SECTORS-34.] = Ok
0 [NUM_DISK_SECTORS-1.] = Ok
0 [NUM_DISK_SECTORS-1.] = Ok
0 [NUM_DISK_SECTORS-33.] = Ok
0 [CRC32(2,8192)] = Ok
0 [CRC32(NUM_DISK_SECTORS-33.,8192)] = Ok
0 [0] = Ok
0 [CRC32(1,92)] = Ok
0 [0] = Ok
0 [CRC32(NUM_DISK_SECTORS-1.,92)] = Ok
Operation : Setbootablestoragedrive: Drive 0
Set bootable storage drive 0 Ok

Rebooting Phone.... Ok

Elapsed Time : 00:05:27
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Oppo A11K (CPH2071) Format Factory Reset by Hydra Tool

,

-------------------------------------------------------
To Enable BROM Mode :
Method 1 - Bootkey (Vol + - Power) or any combination
Method 2 - Enable Preloader to brom(crashing Method)
Method 3 - Test Point Data0 + ground
To Enable Preloader Mode :
Method 1 - Just Insert cable
-------------------------------------------------------

Searching for MTK Device...Found
MTK Port Type : Flashmode BROM
FriendlyName : MediaTek USB Port_V1632 (COM4)
Device : /5&854f772&0&2
SymbolicName : \\?\usb#vid_0e8d&pid_0003#5&854f772&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0
Service : wdm_usb

Openning Port [COM4] Ok
Handshaking...Ok
HwCode : 0766 {MT6765/MT8768t}
Hwver : 0000
Target config : E5
SBC : 01 (True)
SLA : 00 (False)
DAA : 04 (True)
SWJTAG : 04 (True)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 20 (True)
MEMWRITE : 40 (True)
CMD_C8 : 80 (True)
Connection : BROM
HW Subcode : 8A00
HW Subcode : CA00
SW Ver : 0000
ME_ID : 705BAEA3F33E79B55EBEEE61C713BD8C
SOC_ID : 45E6F7766F059C2944AF78C14B47DBB650F549091CD0A384647398AD8D8433DE

Exploiting Device...
Successfully Exploited..
Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..Found @ 0x00200BC4
Starting to dump...
Prel Size : 0x0003E32C
Successfully dump preloader.. [C:\Hydra Tool\Boot\PreloaderDump\preloader_oppo6765_19451.bin]
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)
Connection : BROM

Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin]
Patching da2 ... Ok
Uploading Stage 1....
Successfully uploaded stage 1, jumping ..
Executing JUMP_DA Address @ 0x00200000
Jumping to 0x00200000 Ok 0xC0
Successfully received DA sync
ONNECTION_AGENT : brom
DRAM config needed for : 150100444436384D
Sending auto preloader from dump... [preloader_oppo6765_19451.bin]
Sending emi data.. [DRAM setup passed.]
Sending emi data succeeded.
Uploading stage 2...
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
ERAM Size : 0x000000000003A000-232 KB
IRAM Size : 0x00000000C0000000-3 GB
EMMC Boot1 Size : 0x0000000000400000-4 MB
EMMC Boot2 Size : 0x0000000000400000-4 MB
EMMC RPMB Size : 0x0000000000400000-4 MB
EMMC USER Size : 0x0000000747C00000-29,121 GB
EMMC CID : 150100444436384D42022AB4C262A66B - DD68MB
HW-CODE : 0x766
HWSUB-CODE : 0x8A00
HW-VERSION : 0xCA00
SW-VERSION : 0x0
CHIP-EVOLUTION : 0x0
DA-VERSION : 1.0
Speed : high-speed
Upload data was accepted. Jumping to stage 2...
DA Extensions successfully added
Reading Partition Table ..
Partition Count : 44
--------------- Reading build.prop content ---------------
Vendor : OPPO
Manufacturer : OPPO
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6765_19451-user 9 PPR1.180610.011 1565076280 release-keys
Security Patch : 2022-01-05
StorageType : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------
Backing up Security..
- preloader(preloader.bin), 512 KB = Ok [preloader_oppo6765_19451.bin]
*Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0766_705BAEA3F33E79B55EBEEE61C713BD8C\Auto\062123211436\6765_Android_scatter.txt
- pgpt(pgpt.bin), 32 KB = Ok
- nvram(nvram.bin), 64 MB = Ok
- nvdata(nvdata.bin), 64 MB = Ok
- frp(frp.bin), 1024 KB = Ok
- protect1(protect1.bin), 8 MB = Ok
- protect2(protect2.bin), 8,469 MB = Ok
- persist(persist.bin), 48 MB = Ok
- proinfo(proinfo.bin), 3 MB = Ok
- oppo_custom(oppo_custom.bin), 1024 KB = Ok
- opporeserve1(opporeserve1.bin), 8 MB = Ok
- opporeserve2(opporeserve2.bin), 64 MB = Ok
- nvcfg(nvcfg.bin), 32 MB = Ok
- sec1(sec1.bin), 2 MB = Ok
- seccfg(seccfg.bin), 8 MB = Ok
- lk(lk.bin), 5 MB = Ok
Backup Done!!!

Elapsed Time : 00:00:54
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Vivo S1 (PD1913) FRP Remove by Hydra Tool

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Service Function
Factory Reset Protection[FRP]
Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching for MTK Device...Found
MTK Port Type : Flashmode Preloader
FriendlyName : MediaTek PreLoader USB VCOM_V1633 (Android) (COM4)
Device : /5&186144f5&0&4
SymbolicName : \\?\usb#vid_0e8d&pid_2000#5&186144f5&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0
Service : wdm_usb

Openning Port [COM4] Ok
Handshaking...Ok
HwCode : 0707 {MT6768}
Hwver : 0000
Target config : 05
SBC : 01 (True)
SLA : 00 (False)
DAA : 04 (True)
SWJTAG : 04 (True)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)
Connection : Preloader
HW Subcode : 8A00
HW Subcode : CA00
SW Ver : 0000
ME_ID : 209963B09549D96E0B87D13ED7DC92C0


- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Preloader To Brom Function.....
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- Method 1 Exploit Executed..... [Failed]
- Method 2 Exploit Executed..... [Successfully Crash Preloader.]
Device now is BROM Port

Exploiting Device...
Successfully Exploited..
Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..Found @ 0x00200BC0
Starting to dump...
Prel Size : 0x0006F6F8
Successfully dump preloader..
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)
Connection : BROM

Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin]
Patching da2 ... Ok
Uploading Stage 1....
Successfully uploaded stage 1, jumping ..
Executing JUMP_DA Address @ 0x00200000
Jumping to 0x00200000 Ok 0xC0
Successfully received DA sync
ONNECTION_AGENT : brom
DRAM config needed for : 150100445636444D
Sending auto preloader from dump...
Hydra Auto Preloader Search Enabled..
Hydra will find compatible preloader files...
-----------------------------
Found 10 Compatible Preloaders..
-----------------------------
1-preloader_k68v1_64.bin...Sending... [DRAM setup passed.] [Ok]
-----------------------------
Sending emi data succeeded.
Uploading stage 2...
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
ERAM Size : 0x0000000000070000-448 KB
IRAM Size : 0x0000000100000000-4 GB
EMMC Boot1 Size : 0x0000000000400000-4 MB
EMMC Boot2 Size : 0x0000000000400000-4 MB
EMMC RPMB Size : 0x0000000001000000-16 MB
EMMC USER Size : 0x0000001D1EC00000-116.48 GB
EMMC CID : 150100445636444D42023BC290C8A6C3 - DV6DMB
HW-CODE : 0x707
HWSUB-CODE : 0x8A00
HW-VERSION : 0xCA00
SW-VERSION : 0x0
CHIP-EVOLUTION : 0x1
DA-VERSION : 1.0
Speed : high-speed
Upload data was accepted. Jumping to stage 2...
DA Extensions successfully added
Reading Partition Table ..
Partition Count : 45
--------------- Reading build.prop content ---------------
Product : k68v1_64
ID : SP1A.210812.003
SDK : 31
Release : 12
ABI : arm64-v8a
Locale : en-US
Description : full_k68v1_64-user 12 SP1A.210812.003 compiler04241622 release-keys
Display ID : SP1A.210812.003 release-keys
Security Patch : 2022-04-01
StorageType : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
IMEI1 : ****************
IMEI2 : ****************
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------
Backing up Security..
- preloader(preloader.bin), 512 KB = Ok [preloader_k68v1_64.bin]
*Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0707_209963B09549D96E0B87D13ED7DC92C0\Auto\062423170849\6768_Android_scatter.txt
- pgpt(pgpt.bin), 32 KB = Ok
- nvram(nvram.bin), 64 MB = Ok
- nvdata(nvdata.bin), 64 MB = Ok
- frp(frp.bin), 1024 KB = Ok
- protect1(protect1.bin), 8 MB = Ok
- protect2(protect2.bin), 13.969 MB = Ok
- persist(persist.bin), 48 MB = Ok
- proinfo(proinfo.bin), 3 MB = Ok
- nvcfg(nvcfg.bin), 32 MB = Ok
- sec1(sec1.bin), 2 MB = Ok
- seccfg(seccfg.bin), 8 MB = Ok
- lk(lk.bin), 5 MB = Ok
Backup Done!!!

Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!

Action Result : Ok

Elapsed Time : 00:01:03
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Vivo S1 (PD1913) Format Factory Reset by Hydra Tool

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Service Function
Format/Factory Reset/ScreenLock
Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching for MTK Device...Found
MTK Port Type : Flashmode BROM
FriendlyName : MediaTek USB Port_V1633 (COM23)
Device : /5&186144f5&0&4
SymbolicName : \\?\usb#vid_0e8d&pid_0003#5&186144f5&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0
Service : wdm_usb

Openning Port [COM23] Ok
Reading Partition Table ..
ERAM Size : 0x0000000000070000-448 KB
IRAM Size : 0x0000000100000000-4 GB
EMMC Boot1 Size : 0x0000000000400000-4 MB
EMMC Boot2 Size : 0x0000000000400000-4 MB
EMMC RPMB Size : 0x0000000001000000-16 MB
EMMC USER Size : 0x0000001D1EC00000-116.48 GB
EMMC CID : 150100445636444D42023BC290C8A6C3 - DV6DMB
HW-CODE : 0x707
HWSUB-CODE : 0x8A00
HW-VERSION : 0xCA00
SW-VERSION : 0x0
CHIP-EVOLUTION : 0x1
DA-VERSION : 1.0
Speed : high-speed
Partition Count : 45
--------------- Reading build.prop content ---------------
Product : k68v1_64
ID : SP1A.210812.003
SDK : 31
Release : 12
ABI : arm64-v8a
Locale : en-US
Description : full_k68v1_64-user 12 SP1A.210812.003 compiler04241622 release-keys
Display ID : SP1A.210812.003 release-keys
Security Patch : 2022-04-01
StorageType : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
IMEI1 : ***************
IMEI2 : ***************
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------
------------------------------
Factory Reset Flash Mode..
------------------------------
Operation : Safeformat Universal...

Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!

Action Result : Ok

Elapsed Time : 00:00:04
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
LAVA Z61 FRP Remove by Hydra Tool

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Service Function
Format/Factory Reset/ScreenLock
Safe Format
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching for MTK Device...Found
MTK Port Type : Flashmode BROM
FriendlyName : MediaTek USB Port (COM10)
Device : /5&21111b0c&0&1
SymbolicName : \\?\usb#vid_0e8d&pid_0003#5&21111b0c&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 07/22/2022,3.0.1511.0
Service : wdm_usb

Openning Port [COM10] Ok
Handshaking...Ok
HwCode : 0699 {MT6739/MT6731}
Hwver : 0000
Target config : E1
SBC : 01 (True)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 20 (True)
MEMWRITE : 40 (True)
CMD_C8 : 80 (True)
Connection : BROM
HW Subcode : 8A00
HW Subcode : CB00
SW Ver : 0002
ME_ID : 5BA6CFA6742556F7DA25483D945D9CFB
SOC_ID : 5A0F3F1EF216DE674655F17EB499DFED0346C9A4D2B323E3F7CF933A3511EE24
Device not yet filterd...
Executing LibUSB Filter..
Device Now Filtered...Restarting Device Port..

Openning Port [COM10] Ok

Exploiting Device...
Successfully Exploited..
Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..Found @ 0x00200BC4
Starting to dump...
Prel Size : 0x0001D56C
Successfully dump preloader.. [C:\Hydra Tool\Boot\PreloaderDump\preloader_lava6739_op63_gmo.bin]
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)
Connection : BROM

Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin]
Patching da2 ... Ok
Uploading Stage 1....
Successfully uploaded stage 1, jumping ..
Executing JUMP_DA Address @ 0x00200000
Jumping to 0x00200000 Ok 0xC0
Successfully received DA sync
ONNECTION_AGENT : brom
Sending auto preloader from dump... [preloader_lava6739_op63_gmo.bin]
Sending emi data.. [DRAM setup passed.]
Sending emi data succeeded.
Uploading stage 2...
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
ERAM Size : 0x0000000000020000-128 KB
IRAM Size : 0x0000000040000000-1024 MB
EMMC Boot1 Size : 0x0000000000400000-4 MB
EMMC Boot2 Size : 0x0000000000400000-4 MB
EMMC RPMB Size : 0x0000000000400000-4 MB
EMMC USER Size : 0x00000003A3E00000-14.561 GB
EMMC CID : 150100464536324D42036D0B079165C5 - FE62MB
HW-CODE : 0x699
HWSUB-CODE : 0x8A00
HW-VERSION : 0xCB00
SW-VERSION : 0x2
CHIP-EVOLUTION : 0x0
DA-VERSION : 1.0
Speed : high-speed
Upload data was accepted. Jumping to stage 2...
DA Extensions successfully added
Reading Partition Table ..
Partition Count : 36
--------------- Reading build.prop content ---------------
Brand : LAVA
Vendor : LAVA
Model : Z61
Product : Z61
Manufacturer : LAVA
ID : O11019
SDK : 27
Release : 8.1.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-IN
Description : full_lava6739_op63_gmo-user 8.1.0 O11019 1529665497 release-keys
Device : Z61
Display ID : LAVA_Z61_1_16_V1.0_S117_20180622_ENG_IN
Security Patch : 2018-06-05
Fingerprint : LAVA/Z61/Z61:8.1.0/O11019/1529665497:user/release-keys
StorageType : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
IMEI1 : ***************
IMEI2 : ***************
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------
Backing up Security..
- preloader(preloader.bin), 512 KB = Ok [preloader_lava6739_op63_gmo.bin]
*Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0699_5BA6CFA6742556F7DA25483D945D9CFB\Auto\062423122132\6739_Android_scatter.txt
- pgpt(pgpt.bin), 32 KB = Ok
- nvram(nvram.bin), 5 MB = Ok
- nvdata(nvdata.bin), 32 MB = Ok
- frp(frp.bin), 1024 KB = Ok
- protect1(protect1.bin), 8 MB = Ok
- protect2(protect2.bin), 9.469 MB = Ok
- proinfo(proinfo.bin), 3 MB = Ok
- nvcfg(nvcfg.bin), 8 MB = Ok
- sec1(sec1.bin), 2 MB = Ok
- seccfg(seccfg.bin), 8 MB = Ok
- lk(lk.bin), 1024 KB = Ok
Backup Done!!!
------------------------------
Factory Reset Flash Mode..
------------------------------
Operation : Safeformat Universal...

Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!

Action Result : Ok

Elapsed Time : 00:00:37
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
ITEL A33 FRP Remove by Hydra Tool

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Service Tool Function..
Factory Reset Protection
Factory Reset
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

****************** PRESS BOOT KEY ******************
VOL + OR VOL - , OR Combination Vol - +
Feature Phone : Call Button
Please hold boot key until second boot..
*******************************************
Scanning Port....

Openning Port [COM20] Ok

Reading IMEI....
IMEI 1 : ****************
IMEI 2 : ****************
IMEI 3 : ****************
IMEI 4 : ****************
BSL_WRITE_ERROR
BSL_WRITE_ERROR
Rebooting Phone..Ok

Action Result : Ok

Elapsed Time : 00:00:05
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi 9 (lancelot) FRP Remove with by Hydra Tool


- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Service Function
Factory Reset Protection[FRP]
Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching for MTK Device...Found
MTK Port Type : Flashmode BROM
FriendlyName : MediaTek USB Port_V1632 (COM13)
Device : /5&300aa465&0&3
SymbolicName : \\?\usb#vid_0e8d&pid_0003#5&300aa465&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0
Service : wdm_usb

Openning Port [COM13] Ok
Reading Partition Table ..
ERAM Size : 0x0000000000070000-448 KB
IRAM Size : 0x0000000100000000-4 GB
EMMC Boot1 Size : 0x0000000000400000-4 MB
EMMC Boot2 Size : 0x0000000000400000-4 MB
EMMC RPMB Size : 0x0000000000400000-4 MB
EMMC USER Size : 0x0000000747C00000-29.121 GB
EMMC CID : 150100444436384D42022609DA0AB6F5 - DD68MB
HW-CODE : 0x707
HWSUB-CODE : 0x8A00
HW-VERSION : 0xCA00
SW-VERSION : 0x0
CHIP-EVOLUTION : 0x1
DA-VERSION : 1.0
Speed : high-speed
Partition Count : 50
--------------- Reading build.prop content ---------------
Product : lancelot
Marketname : ro.product.systemRedmi 9
ID : QP1A.190711.020
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : lancelot-user 10 QP1A.190711.020 V11.0.4.0.QJCMIXM release-keys
Display ID : build-20200617231236
Security Patch : 2020-06-01
StorageType : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
IMEI1 : ***************
IMEI2 : ***************
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------

Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!

Action Result : Ok

Elapsed Time : 00:00:06
 

Attachments

  • lancelot frp.jpeg
    lancelot frp.jpeg
    178.5 KB · Views: 0

Rashi Hydra Tool

Product Manager
Feb 3, 2021
338
317
Hydra Team
Lenovo Tab E7 tb-7104i FRP Remove with Hydra Tool



- Keep Press Boot/Info
Code:
-------------------------------------------------------
To Enable BROM  Mode :
     Method 1    - Bootkey (Vol + - Power) or any combination
     Method 2    - Enable Preloader to brom(crashing Method)
     Method 3    - Test Point Data0 + ground
To Enable Preloader  Mode :
     Method 1    - Just Insert cable
-------------------------------------------------------

Searching for MTK Device...Found
  MTK Port Type   : Flashmode BROM
  FriendlyName    : MediaTek USB Port_V1632 (COM12)
  Device          : /5&24203f19&0&3
  SymbolicName    : \\?\usb#vid_0e8d&pid_0003#5&24203f19&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 01/22/2015,3.0.1504.0
  Service         : wdm_usb

Openning Port [COM12] Ok
Handshaking...Ok
  HwCode          : 6580 {MT6580}
  Hwver           : 0000
  Target config   : 05
  SBC             : 01 (True)
  SLA             : 00 (False)
  DAA             : 04 (True)
  SWJTAG          : 04 (True)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 00 (False)
  MEMWRITE        : 00 (False)
  CMD_C8          : 00 (False)
  Connection      : BROM
  HW Subcode      : 8A00
  HW Subcode      : CA00
  SW Ver          : 0000
  ME_ID           : 91A37D64C3C16E9F5125E699070EB4C1
Device not yet filterd...
Executing LibUSB Filter..
Device Now Filtered...Restarting Device Port..

Openning Port [COM12] Ok

Exploiting Device...
Successfully Exploited..
Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..Found @ 0x00200B40
Starting to dump...
Prel Size : 0x0001B1F0
Successfully dump preloader..  [C:\Hydra Tool\Boot\PreloaderDump\preloader_p98996fa1.bin]
  Target config   : 00
  SBC             : 00 (False)
  SLA             : 00 (False)
  DAA             : 00 (False)
  SWJTAG          : 00 (False)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 00 (False)
  MEMWRITE        : 00 (False)
  CMD_C8          : 00 (False)
  Connection      : BROM
Uploading legacy da...
DA :MTK_AllInOne_DA_5.2152.bin
Legacy DA2 Patched..
Legacy DA2 CMD F0 is patched.
Successfully uploaded stage 1, jumping ..
Executing JUMP_DA Address @ 0x00200000
Jumping to 0x00200000 Ok
Got loader sync !
Reading Nand Info..
Reading EMMC Info
EMMC_INFO     : 0x00000000
Uploading Stage 2
DRAM config needed for : 460001154D3236451A01034207A6F790
Reading dram nand info ...
Sending dram info ...
RAM-Length:  BC000000
5A
Successfully upload stage 2

Flash and ram info.....
  m_int_sram_ret    : 0x00000000
  m_ext_ram_ret     : 0x00000000
  m_ext_ram_type    : 0x02
  m_ext_ram_chip_select : 0x00
  m_int_sram_ret    : 0x00000000
  m_ext_ram_size    : 0x0000000040000000-1024 MB
  Randomid          : 0xEA0936AD475F1DF0231B8145AD446417
  m_emmc_ret        : 0x00000000
  m_emmc_boot1_size : 0x0000000000400000-4 MB
  m_emmc_boot2_size : 0x0000000000400000-4 MB
  m_emmc_rpmb_size  : 0x0000000000400000-4 MB
  m_emmc_gp_size[0] : 0x0000000000000000-0 Bytes
  m_emmc_gp_size[1] : 0x0000000000000000-0 Bytes
  m_emmc_gp_size[2] : 0x0000000000000000-0 Bytes
  m_emmc_gp_size[3] : 0x0000000000000000-0 Bytes
  m_emmc_ua_size    : 0x00000003A3E00000-14.561 GB
  CID               : 460001154D3236451A01034207A6F790

Checking Connection Speed..
Configuration HighSpeed Switch : True
Full Speed Detected..
Switching To High Speed...
Connected to preloader...
Reconnecting to preloader...
Reading Partition Table ..
Partition Count : 28

Reading System Info
  Brand          : Lenovo
  Vendor         : LENOVO
  Model          : Lenovo TB-7104I
  Product        : TB7104I
  Manufacturer   : LENOVO
  ID             : O11019
  SDK            : 27
  Release        : 8.1.0
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Locale         : en-US
  Description    : full_P98996FA1-user 8.1.0 O11019 1587913804 release-keys
  Device         : TB7104I
  Display ID     : TB-7104I_S000005_200426_RSA
  Security Patch : 2020-05-05
  Fingerprint    : Lenovo/LenovoTB-7104I/TB7104I:8.1.0/O11019/TB-7104I_S000005_200426_RSA:user/release-keys
  StorageType    : mtp

Reading IMEI........

IMEI Info....
IMEI1 : 86971*********
IMEI2 : 00000*********
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------
Backing up Security..
- preloader(preloader.bin), 512 KB                    = Ok  [preloader_p98996fa1.bin]
  *Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\6580_91A37D64445455555E699070EB4C1\Auto\070723165702\6580_Android_scatter.txt
- pgpt(pgpt.bin), 512 KB                              = Ok
- nvram(nvram.bin), 5 MB                              = Ok
- nvdata(nvdata.bin), 32 MB                           = Ok
- frp(frp.bin), 1024 KB                               = Ok
- protect1(protect1.bin), 10 MB                       = Ok
- protect2(protect2.bin), 10 MB                       = Ok
- persist(persist.bin), 4 MB                          = Ok
- proinfo(proinfo.bin), 3 MB                          = Ok
- seccfg(seccfg.bin), 256 KB                          = Ok
- lk(lk.bin), 384 KB                                  = Ok
Backup Done!!!

Elapsed Time : 00:01:34



- Factory Reset Protection[FRP]
Auto


Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                      Service Function
               Factory Reset Protection[FRP]
                            Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching for MTK Device...Found
  MTK Port Type   : Flashmode Preloader
  FriendlyName    : MediaTek DA USB VCOM (Android) (COM22)
  Device          : /5&16dd958c&0&3
  SymbolicName    : \\?\usb#vid_0e8d&pid_2001#5&16dd958c&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 01/22/2015,3.0.1504.0
  Service         : wdm_usb

Openning Port [COM22] Ok
Reading Partition Table ..
Partition Count : 28

Reading System Info
  Brand          : Lenovo
  Vendor         : LENOVO
  Model          : Lenovo TB-7104I
  Product        : TB7104I
  Manufacturer   : LENOVO
  ID             : O11019
  SDK            : 27
  Release        : 8.1.0
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Locale         : en-US
  Description    : full_P98996FA1-user 8.1.0 O11019 1587913804 release-keys
  Device         : TB7104I
  Display ID     : TB-7104I_S000005_200426_RSA
  Security Patch : 2020-05-05
  Fingerprint    : Lenovo/LenovoTB-7104I/TB7104I:8.1.0/O11019/TB-7104I_S000005_200426_RSA:user/release-keys
  StorageType    : mtp

Reading IMEI........

IMEI Info....
IMEI1 : 869719*******
IMEI2 : 000000*******
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------

Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!

Action Result :  Ok

Elapsed Time : 00:00:17
 

Rashi Hydra Tool

Product Manager
Feb 3, 2021
338
317
Hydra Team
LG LM-X52 FRP Lock Remove with Hydra Tool




- Keep Press Boot/Info

Code:
-------------------------------------------------------
To Enable BROM  Mode :
     Method 1    - Bootkey (Vol + - Power) or any combination
     Method 2    - Enable Preloader to brom(crashing Method)
     Method 3    - Test Point Data0 + ground
To Enable Preloader  Mode :
     Method 1    - Just Insert cable
-------------------------------------------------------

Searching for MTK Device...Found
  MTK Port Type   : Flashmode BROM
  FriendlyName    : MediaTek USB Port (COM67)
  Device          : /5&105948fe&0&4
  SymbolicName    : \\?\usb#vid_0e8d&pid_0003#5&105948fe&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 07/22/2022,3.0.1511.0
  Service         : wdm_usb

Openning Port [COM67] Ok
Handshaking...Ok
  HwCode          : 0766 {MT6765/MT8768t}
  Hwver           : 0000
  Target config   : E5
  SBC             : 01 (True)
  SLA             : 00 (False)
  DAA             : 04 (True)
  SWJTAG          : 04 (True)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 20 (True)
  MEMWRITE        : 40 (True)
  CMD_C8          : 80 (True)
  Connection      : BROM
  HW Subcode      : 8A00
  HW Subcode      : CA00
  SW Ver          : 0000
  ME_ID           : 367D4F27A591F3E59930305209579689
  SOC_ID          : 3C6623C3E861C07CE40E02ABDF6D08B61AEFDE21B9F1265541C749847E3A9F2B

Exploiting Device...
Successfully Exploited..
Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..Found @ 0x00200BC4
Starting to dump...
Prel Size : 0x0003C318
Successfully dump preloader..  [C:\Hydra Tool\Boot\PreloaderDump\preloader_muse6762_mh4p_q.bin]
  Target config   : 00
  SBC             : 00 (False)
  SLA             : 00 (False)
  DAA             : 00 (False)
  SWJTAG          : 00 (False)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 00 (False)
  MEMWRITE        : 00 (False)
  CMD_C8          : 00 (False)
  Connection      : BROM

Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin]
Patching da2 ... Ok
Uploading Stage 1....
Successfully uploaded stage 1, jumping ..
Executing JUMP_DA Address @ 0x00200000
Jumping to 0x00200000 Ok 0xC0
Successfully received DA sync
  ONNECTION_AGENT : brom
  DRAM config needed for : 150100475036424D
Sending auto preloader from dump...  [preloader_muse6762_mh4p_q.bin]
Sending emi data.. [DRAM setup passed.]
Sending emi data succeeded.
Uploading stage 2...
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
  ERAM Size       : 0x000000000003A000-232 KB
  IRAM Size       : 0x00000000C0000000-3 GB
  EMMC Boot1 Size : 0x0000000000400000-4 MB
  EMMC Boot2 Size : 0x0000000000400000-4 MB
  EMMC RPMB Size  : 0x0000000001000000-16 MB
  EMMC USER Size  : 0x0000000E8F800000-58,242 GB
  EMMC CID        : 150100475036424D4201F075D35B5609 - GP6BMB
  HW-CODE         : 0x766
  HWSUB-CODE      : 0x8A00
  HW-VERSION      : 0xCA00
  SW-VERSION      : 0x0
  CHIP-EVOLUTION  : 0x0
  DA-VERSION      : 1.0
  Speed           : high-speed
Upload data was accepted. Jumping to stage 2...
DA Extensions successfully added
Reading Partition Table ..
Partition Count : 63
--------------- Reading build.prop content ---------------
  Brand          : lge
  Vendor         : LGE
  Model          : LM-X52
  Product        : mmh4p
  Manufacturer   : LGE
  ID             : PKQ1.190223.001
  SDK            : 28
  Release        : 9
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Locale         : ko-KR
  Description    : mmh4p-user 9 PKQ1.190223.001 19319203544d0 release-keys
  Device         : mmh4p
  Display ID     : PKQ1.190223.001
  Security Patch : 2019-11-01
  Fingerprint    : lge/mmh4p/mmh4p:9/PKQ1.190223.001/19319203544d0:user/release-keys
  StorageType    : mtp,mass_storage
--------------- end of build.prop content ---------------

Reading IMEI........
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------

Elapsed Time : 00:01:31





- Factory Reset Protection[FRP]
Auto



Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                      Service Function
               Factory Reset Protection[FRP]
                            Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching for MTK Device...Found
  MTK Port Type   : Flashmode BROM
  FriendlyName    : MediaTek USB Port (COM67)
  Device          : /5&105948fe&0&4
  SymbolicName    : \\?\usb#vid_0e8d&pid_0003#5&105948fe&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 07/22/2022,3.0.1511.0
  Service         : wdm_usb

Openning Port [COM67] Ok
Reading Partition Table ..
  ERAM Size       : 0x000000000003A000-232 KB
  IRAM Size       : 0x00000000C0000000-3 GB
  EMMC Boot1 Size : 0x0000000000400000-4 MB
  EMMC Boot2 Size : 0x0000000000400000-4 MB
  EMMC RPMB Size  : 0x0000000001000000-16 MB
  EMMC USER Size  : 0x0000000E8F800000-58,242 GB
  EMMC CID        : 150100475036424D4201F075D35B5609 - GP6BMB
  HW-CODE         : 0x766
  HWSUB-CODE      : 0x8A00
  HW-VERSION      : 0xCA00
  SW-VERSION      : 0x0
  CHIP-EVOLUTION  : 0x0
  DA-VERSION      : 1.0
  Speed           : high-speed
Partition Count : 63
--------------- Reading build.prop content ---------------
  Brand          : lge
  Vendor         : LGE
  Model          : LM-X52
  Product        : mmh4p
  Manufacturer   : LGE
  ID             : PKQ1.190223.001
  SDK            : 28
  Release        : 9
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Locale         : ko-KR
  Description    : mmh4p-user 9 PKQ1.190223.001 19319203544d0 release-keys
  Device         : mmh4p
  Display ID     : PKQ1.190223.001
  Security Patch : 2019-11-01
  Fingerprint    : lge/mmh4p/mmh4p:9/PKQ1.190223.001/19319203544d0:user/release-keys
  StorageType    : mtp,mass_storage
--------------- end of build.prop content ---------------

Reading IMEI........
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------

Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!

Action Result :  Ok

Elapsed Time : 00:00:17
 
Top