★★★ Post All Successfully Repaired Phones By Hydra Tool ★★★

Rashi Hydra Tool

Product Manager
Feb 3, 2021
338
317
Hydra Team
Samsung A10s (SM-A107M) FRP Lock Remove with Hydra Tool



- Press Boot/info

Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                  MTK Partition Manager Function...              
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching for MTK Device...Found
  MTK Port Type   : Flashmode Preloader
  FriendlyName    : MediaTek PreLoader USB VCOM_V1632 (Android) (COM78)
  Device          : /5&6c8eb93&0&3
  SymbolicName    : \\?\usb#vid_0e8d&pid_2000#5&6c8eb93&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 01/22/2015,3.0.1504.0
  Service         : wdm_usb

Openning Port [COM78] Ok
Handshaking...Ok
  HwCode          : 0766 {MT6765/MT8768t}
  Hwver           : 0000
  Target config   : 05
  SBC             : 01 (True)
  SLA             : 00 (False)
  DAA             : 04 (True)
  SWJTAG          : 04 (True)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 00 (False)
  MEMWRITE        : 00 (False)
  CMD_C8          : 00 (False)
  Connection      : Preloader
  HW Subcode      : 8A00
  HW Subcode      : CA00
  SW Ver          : 0000
  ME_ID           : 4F5A50A0D36A61E19FD24C2828A3B809


- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                  Preloader To Brom Function.....              
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- Method 1  Exploit Executed..... [Successfully Crash Preloader.]
Device now is BROM Port

Exploiting Device...
Successfully Exploited..
Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..Found @ 0x00200BC4
Starting to dump...
Prel Size : 0x0003E84C
Successfully dump preloader..  [C:\Hydra Tool\Boot\PreloaderDump\preloader_s96116ca1.bin]
  Target config   : 00
  SBC             : 00 (False)
  SLA             : 00 (False)
  DAA             : 00 (False)
  SWJTAG          : 00 (False)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 00 (False)
  MEMWRITE        : 00 (False)
  CMD_C8          : 00 (False)
  Connection      : BROM

Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin]
Patching da2 ... Ok
Uploading Stage 1....
Successfully uploaded stage 1, jumping ..
Executing JUMP_DA Address @ 0x00200000
Jumping to 0x00200000 Ok 0xC0
Successfully received DA sync
  ONNECTION_AGENT : brom
  DRAM config needed for : 150100515836334D
Sending auto preloader from dump...  [preloader_s96116ca1.bin]
Sending emi data.. [DRAM setup passed.]
Sending emi data succeeded.
Uploading stage 2...
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
  ERAM Size       : 0x000000000003A000-232 KB
  IRAM Size       : 0x0000000080000000-2 GB
  EMMC Boot1 Size : 0x0000000000400000-4 MB
  EMMC Boot2 Size : 0x0000000000400000-4 MB
  EMMC RPMB Size  : 0x0000000001000000-16 MB
  EMMC USER Size  : 0x0000000747C00000-29,121 GB
  EMMC CID        : 150100515836334D4200949EBEC2B70F - QX63MB
  HW-CODE         : 0x766
  HWSUB-CODE      : 0x8A00
  HW-VERSION      : 0xCA00
  SW-VERSION      : 0x0
  CHIP-EVOLUTION  : 0x0
  DA-VERSION      : 1.0
  Speed           : high-speed
Upload data was accepted. Jumping to stage 2...
DA Extensions successfully added
Reading Partition Table ..
Partition Count : 41
--------------- Reading build.prop content ---------------
  Product        : a10s
  ID             : QP1A.190711.020
  SDK            : 29
  Release        : 10
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Locale         : en-GB
  Description    : a10sub-user 10 QP1A.190711.020 A107MUBU5BUF1 release-keys
  Display ID     : QP1A.190711.020.A107MUBU5BUF1
  Security Patch : 2021-04-01
  StorageType    : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
IMEI1 : F25A27********
IMEI2 : 3CB1E0********
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------
Backing up Security..
- preloader(preloader.bin), 512 KB                    = Ok  [preloader_s96116ca1.bin]
  *Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0766_4F5A50A0D36A61454545kjk28A3B809\Auto\070723143056\6765_Android_scatter.txt
- pgpt(pgpt.bin), 4 MB                                = Ok
- nvram(nvram.bin), 64 MB                             = Ok
- nvdata(nvdata.bin), 64 MB                           = Ok
- frp(frp.bin), 1024 KB                               = Ok
- persistent(persistent.bin), 512 KB                  = Ok
- protect1(protect1.bin), 8 MB                        = Ok
- protect2(protect2.bin), 8 MB                        = Ok
- persist(persist.bin), 48 MB                         = Ok
- proinfo(proinfo.bin), 3 MB                          = Ok
- nvcfg(nvcfg.bin), 32 MB                             = Ok
- sec1(sec1.bin), 2 MB                                = Ok
- seccfg(seccfg.bin), 8 MB                            = Ok
- lk(lk.bin), 2 MB                                    = Ok
Backup Done!!!


Elapsed Time : 00:02:40



- Factory Reset Protection[FRP]
Auto


Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                      Service Function
               Factory Reset Protection[FRP]
                            Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching for MTK Device...Found
  MTK Port Type   : Flashmode BROM
  FriendlyName    : MediaTek USB Port_V1632 (COM124)
  Device          : /5&6c8eb93&0&3
  SymbolicName    : \\?\usb#vid_0e8d&pid_0003#5&6c8eb93&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 01/22/2015,3.0.1504.0
  Service         : wdm_usb

Openning Port [COM124] Ok
Reading Partition Table ..
  ERAM Size       : 0x000000000003A000-232 KB
  IRAM Size       : 0x0000000080000000-2 GB
  EMMC Boot1 Size : 0x0000000000400000-4 MB
  EMMC Boot2 Size : 0x0000000000400000-4 MB
  EMMC RPMB Size  : 0x0000000001000000-16 MB
  EMMC USER Size  : 0x0000000747C00000-29,121 GB
  EMMC CID        : 150100515836334D4200949EBEC2B70F - QX63MB
  HW-CODE         : 0x766
  HWSUB-CODE      : 0x8A00
  HW-VERSION      : 0xCA00
  SW-VERSION      : 0x0
  CHIP-EVOLUTION  : 0x0
  DA-VERSION      : 1.0
  Speed           : high-speed
Partition Count : 41
--------------- Reading build.prop content ---------------
  Product        : a10s
  ID             : QP1A.190711.020
  SDK            : 29
  Release        : 10
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Locale         : en-GB
  Description    : a10sub-user 10 QP1A.190711.020 A107MUBU5BUF1 release-keys
  Display ID     : QP1A.190711.020.A107MUBU5BUF1
  Security Patch : 2021-04-01
  StorageType    : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
IMEI1 : F25A2**********
IMEI2 : 3CB1E0*********
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------

Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!

Action Result :  Ok

Elapsed Time : 00:00:15
 

Rashi Hydra Tool

Product Manager
Feb 3, 2021
338
317
Hydra Team
Samsung A11 SM-A115M FRP Lock Remove with Hydra Tool


- Keep Press Boot/Info
Code:
PreOperation Configuration
Brand : SAMSUNG Model : SM-A115M Storage : Auto
Loader: 0009A0E100200000_2a9630bd810ba7b6_5f79caab_SAMSUNG_SAMSUNG CORPORATION_8953.fhprg
Port  : Auto

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM22)
SymbolicName :\\?\usb#vid_05c6&pid_9008#5&53ce3c&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver   :08/31/2015,2.1.2.0

Getting device info. [Connected].....
Serial No.: 0x1F3F7B15
HW_ID     : 0009A0E100200000
MSM ID    : 0x0009A0E1, SDM450-Qualcomm Snapdragon 450/JAADANAZA
MODEL_ID  : 0x0000
OEM_ID    : 0x0020 - SAMSUNG
PBL Ver   : 00000000
PK HASH   : 084e868b048512d828c51a78a9251ece3c48313ff498fa6f18335e9f56c276bd
Assigned Loader Not Found...
Hydra Enable Auto search Firehose..
#Please wait...
#Search by filename filter.....
#Found 6 Compatible Files ..Found match Firehose...

Firehose Loader[0009a0e100200000_084e868b048512d8_1082a027_samsung_samsung corporation_8953.fhprg]
--------------------------------------------------
  Header Type    : OLD
  TargetMSM      : 8953
  Tag            :
  Version        : 3
  Code_size      : 320
  Signature_size : 256
  fhVendor       : SAMSUNG CORPORATION
  HW_ID          : 0009A0E100200000
  Vendor         : SAMSUNG
  OEM_ID         : 0020
  MODEL_ID       : 0000
  SW_ID          : 0000000100000003
  APP_ID         :
  pk_hash        : 084e868b048512d828c51a78a9251ece3c48313ff498fa6f18335e9f56c276bd
  OEM_VERSION    : 21HH1D11
  IMAGE_VARIANT  : JAADANAZA
  QC_VERSION     : BOOT.BF.3.3.2-00077
--------------------------------------------------

SaharaBoot... Ok
Sending ......................Ok
Connecting to Firehose...
Ping... Ok
Configuration[FHProt_Auto]......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8953
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type         : eMMC
Block Size in Bytes : 512
Page Size           : 512
Manufacturer ID     : 21
Serial Number       : 3219299159
Firmware Version    : 3
Product Name        : QD63MB
Physical Partitions : 3
Total Logical Blocks:
          Drive [0]  61071360[29,121 GB]
          Drive [1]  8192[4 MB]
          Drive [2]  8192[4 MB]

Protocol : Universal
Running : Ok

Reading GPT[3]
          Drive [0] 128 Items
          Drive [1] 0 Items
          Drive [2] 0 Items

--------------- Reading build.prop content ---------------
build.prop
system
build.prop
  Product        : a11q
  ID             : SP1A.210812.016
  SDK            : 31
  Release        : 12
  ABI            : armeabi-v7a
  Locale         : en-GB
  Description    : a11qub-user 12 SP1A.210812.016 A115MUBS3CWA1 release-keys
  Display ID     : SP1A.210812.016.A115MUBS3CWA1
  Security Patch : 2023-01-01
--------------- end of build.prop content ---------------

Auto Backup Security partitions...
Reading Security Items....
- modemst1(modemst1.bin), 4 MB                        = Ok
- modemst2(modemst2.bin), 4 MB                        = Ok
- fsg(fsg.bin), 10 MB                                 = Ok
- fsc(fsc.bin), 3,25 MB                               = Ok
- persist(persist.bin), 32 MB                         = Ok

C:\Hydra Tool\Backup\QUALBackup\SAMSUNG\0009A0E440200000_1F3F7B15\Auto_Backup\070744423122155
Backup Security Success....

Elapsed Time : 00:00:09




- go to PM Tab and Read Patition
Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                  Partition Manager...              
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

PreOperation Configuration
Brand : SAMSUNG Model : SM-A115M Storage : Auto
Loader: c:\hydra tool\boot\hfirehose\0009a0e100200000_084e868b048512d8_1082a027_samsung_samsung corporation_8953.fhprg
Port  : Auto

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM22)
SymbolicName :\\?\usb#vid_05c6&pid_9008#5&53ce3c&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver   :08/31/2015,2.1.2.0

Getting device info. [Connected].Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok
Configuration[FHProt_Auto]......
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8953
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type         : eMMC
Block Size in Bytes : 512
Page Size           : 512
Manufacturer ID     : 21
Serial Number       : 3219299159
Firmware Version    : 3
Product Name        : QD63MB
Physical Partitions : 3
Total Logical Blocks:
          Drive [0]  61071360[29,121 GB]
          Drive [1]  8192[4 MB]
          Drive [2]  8192[4 MB]

Protocol : Universal
Running : Ok

Reading GPT[3]
          Drive [0] 128 Items
          Drive [1] 0 Items
          Drive [2] 0 Items

--------------- Reading build.prop content ---------------
build.prop
system
build.prop
  Product        : a11q
  ID             : SP1A.210812.016
  SDK            : 31
  Release        : 12
  ABI            : armeabi-v7a
  Locale         : en-GB
  Description    : a11qub-user 12 SP1A.210812.016 A115MUBS3CWA1 release-keys
  Display ID     : SP1A.210812.016.A115MUBS3CWA1
  Security Patch : 2023-01-01
--------------- end of build.prop content ---------------

Elapsed Time : 00:00:04




-Formatting/Erasing Selected Partitions
- persistent file


Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                  Partition Manager...              
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

PreOperation Configuration
Brand : SAMSUNG Model : SM-A115M Storage : Auto
Loader: c:\hydra tool\boot\hfirehose\0009a0e100200000_084e868b048512d8_1082a027_samsung_samsung corporation_8953.fhprg
Port  : Auto

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM22)
SymbolicName :\\?\usb#vid_05c6&pid_9008#5&53ce3c&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver   :08/31/2015,2.1.2.0

Getting device info. [Connected].Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok
Configuration[FHProt_Auto]......
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8953
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type         : eMMC
Block Size in Bytes : 512
Page Size           : 512
Manufacturer ID     : 21
Serial Number       : 3219299159
Firmware Version    : 3
Product Name        : QD63MB
Physical Partitions : 3
Total Logical Blocks:
          Drive [0]  61071360[29,121 GB]
          Drive [1]  8192[4 MB]
          Drive [2]  8192[4 MB]

Protocol : Universal
Running : Ok

Reading GPT[3]
          Drive [0] 128 Items
          Drive [1] 0 Items
          Drive [2] 0 Items

--------------- Reading build.prop content ---------------
build.prop
system
build.prop
  Product        : a11q
  ID             : SP1A.210812.016
  SDK            : 31
  Release        : 12
  ABI            : armeabi-v7a
  Locale         : en-GB
  Description    : a11qub-user 12 SP1A.210812.016 A115MUBS3CWA1 release-keys
  Display ID     : SP1A.210812.016.A115MUBS3CWA1
  Security Patch : 2023-01-01
--------------- end of build.prop content ---------------

Formatting/Erasing Selected Partitions
- persistent(), 512 KB                                = Ok

Formatting Selected Partitions Done!

Elapsed Time : 00:00:04
 

Rashi Hydra Tool

Product Manager
Feb 3, 2021
338
317
Hydra Team
Tecno Spark 8C (KG5K) FRP Lock Remove with Hydra Tool


- FRP Lock Remove
Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                  Service Tool Function..
                  Factory Reset Protection
                       Factory Reset
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

****************** PRESS BOOT KEY ******************
VOL + OR VOL - , OR Combination Vol - +
Feature Phone :  Call Button
Please hold boot key until second boot..
*******************************************
Scanning Port....

Openning Port [COM23] Ok
Identifying... [SPRD3]
Sending Config Ok Ok
Spreadtrum Boot Block version 1.1
Sending To phone....
Unisoc Not Secured.... Ok
Successfully booted..Ready to go...

Reading IMEI...
BSL_REP_INCOMPATIBLE_PARTITION
BSL_REP_OPERATION_FAILED
BSL_REP_OPERATION_FAILED.
IMEI 1 : ****000*********
IMEI 2 : ***00*********
IMEI 3 : ***00*********
IMEI 4 : ***000********
Rebooting Phone..Ok

Action Result :  Ok

Elapsed Time : 00:00:12
 

Rashi Hydra Tool

Product Manager
Feb 3, 2021
338
317
Hydra Team
Vivo Y91i 1820 Pattern and FRP Lock Remove with Hydra Tool



- Keep Press Boot/Info
Code:
-------------------------------------------------------
To Enable BROM  Mode :
     Method 1    - Bootkey (Vol + - Power) or any combination
     Method 2    - Enable Preloader to brom(crashing Method)
     Method 3    - Test Point Data0 + ground
To Enable Preloader  Mode :
     Method 1    - Just Insert cable
-------------------------------------------------------

Searching for MTK Device...Found
  MTK Port Type   : Flashmode BROM
  FriendlyName    : MediaTek USB Port_V1632 (COM40)
  Device          : /6&2bbff36a&0&3
  SymbolicName    : \\?\usb#vid_0e8d&pid_0003#6&2bbff36a&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 01/22/2015,3.0.1504.0
  Service         : wdm_usb

Openning Port [COM40] Ok
Handshaking...Ok
  HwCode          : 0766 {MT6765/MT8768t}
  Hwver           : 0000
  Target config   : E5
  SBC             : 01 (True)
  SLA             : 00 (False)
  DAA             : 04 (True)
  SWJTAG          : 04 (True)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 20 (True)
  MEMWRITE        : 40 (True)
  CMD_C8          : 80 (True)
  Connection      : BROM
  HW Subcode      : 8A00
  HW Subcode      : CA00
  SW Ver          : 0000
  ME_ID           : E1A8F720DE736682CA64E69E3F328B71
  SOC_ID          : 328EF76A7D55A1C331D74E5A4451A864885700C05C9B24FF4173C0ADE72AA485

Exploiting Device...
Successfully Exploited..
Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..
Not Found
  Target config   : 00
  SBC             : 00 (False)
  SLA             : 00 (False)
  DAA             : 00 (False)
  SWJTAG          : 00 (False)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 00 (False)
  MEMWRITE        : 00 (False)
  CMD_C8          : 00 (False)
  Connection      : BROM

Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin]
Patching da2 ... Ok
Uploading Stage 1....
Successfully uploaded stage 1, jumping ..
Executing JUMP_DA Address @ 0x00200000
Jumping to 0x00200000 Ok 0xC0
Successfully received DA sync
  ONNECTION_AGENT : brom
  DRAM config needed for : 150100514436334D
Sending auto preloader from dump...
Hydra Auto Preloader Search Enabled..
Hydra will find compatible preloader files...
-----------------------------
Found 15 Compatible Preloaders..
-----------------------------
1-preloader_blackjack_64.bin...Sending... [DRAM setup passed.] [Ok]
-----------------------------
Sending emi data succeeded.
Uploading stage 2...
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
  ERAM Size       : 0x000000000003A000-232 KB
  IRAM Size       : 0x0000000080000000-2 GB
  EMMC Boot1 Size : 0x0000000000400000-4 MB
  EMMC Boot2 Size : 0x0000000000400000-4 MB
  EMMC RPMB Size  : 0x0000000001000000-16 MB
  EMMC USER Size  : 0x0000000747C00000-29.121 GB
  EMMC CID        : 150100514436334D4201A68197D52609 - QD63MB
  HW-CODE         : 0x766
  HWSUB-CODE      : 0x8A00
  HW-VERSION      : 0xCA00
  SW-VERSION      : 0x0
  CHIP-EVOLUTION  : 0x0
  DA-VERSION      : 1.0
  Speed           : high-speed
Upload data was accepted. Jumping to stage 2...
DA Extensions successfully added
Reading Partition Table ..
Partition Count : 44
--------------- Reading build.prop content ---------------
  Brand          : vivo
  Vendor         : vivo
  Model          : vivo 1820
  Product        : k62v1_64_bsp
  Manufacturer   : vivo
  ID             : O11019
  SDK            : 27
  Release        : 8.1.0
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-US
  Description    : full_k62v1_64_bsp-user 8.1.0 O11019 1656153506 release-keys
  Device         : PD1818HF_EX
  Display ID     : O11019 release-keys
  Security Patch : 2021-10-01
  Platform       : =MTK6765
  Fingerprint    : vivo/1820/1820:8.1.0/O11019/1656153506:user/release-keys
  StorageType    : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
IMEI1 : 864164*********
IMEI2 : 864164*********
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------
Backing up Security..
- preloader(preloader.bin), 512 KB                    = Ok  [preloader_k62v1_64_bsp.bin]
  *Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0766_E1A8F720DE4444444469E3F328B71\Auto\070723090058\6765_Android_scatter.txt
- pgpt(pgpt.bin), 32 KB                               = Ok
- nvram(nvram.bin), 64 MB                             = Ok
- nvdata(nvdata.bin), 64 MB                           = Ok
- frp(frp.bin), 1024 KB                               = Ok
- protect1(protect1.bin), 8 MB                        = Ok
- protect2(protect2.bin), 13.469 MB                   = Ok
- persist(persist.bin), 48 MB                         = Ok
- proinfo(proinfo.bin), 3 MB                          = Ok
- nvcfg(nvcfg.bin), 32 MB                             = Ok
- sec1(sec1.bin), 2 MB                                = Ok
- seccfg(seccfg.bin), 8 MB                            = Ok
- lk(lk.bin), 5 MB                                    = Ok
Backup Done!!!

Elapsed Time : 00:02:00




- Ultra Power
Rebuild Userdata

Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                      Service Function
                        Ultra Power
                      Rebuild Userdata
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching for MTK Device...Found
  MTK Port Type   : Flashmode BROM
  FriendlyName    : MediaTek USB Port_V1632 (COM40)
  Device          : /6&2bbff36a&0&3
  SymbolicName    : \\?\usb#vid_0e8d&pid_0003#6&2bbff36a&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 01/22/2015,3.0.1504.0
  Service         : wdm_usb

Openning Port [COM40] Ok
Reading Partition Table ..
  EMMC Boot1 Size : 0x0000000000400000-4 MB
  EMMC Boot2 Size : 0x0000000000400000-4 MB
  EMMC RPMB Size  : 0x0000000001000000-16 MB
  EMMC USER Size  : 0x0000000747C00000-29.121 GB
  EMMC CID        : 150100514436334D4201A68197D52609 - QD63MB
  HW-CODE         : 0x766
  HWSUB-CODE      : 0x8A00
  HW-VERSION      : 0xCA00
  SW-VERSION      : 0x0
  CHIP-EVOLUTION  : 0x0
  DA-VERSION      : 1.0
  Speed           : high-speed
Partition Count : 44
--------------- Reading build.prop content ---------------
  Brand          : vivo
  Vendor         : vivo
  Model          : vivo 1820
  Product        : k62v1_64_bsp
  Manufacturer   : vivo
  ID             : O11019
  SDK            : 27
  Release        : 8.1.0
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-US
  Description    : full_k62v1_64_bsp-user 8.1.0 O11019 1656153506 release-keys
  Device         : PD1818HF_EX
  Display ID     : O11019 release-keys
  Security Patch : 2021-10-01
  Platform       : =MTK6765
  Fingerprint    : vivo/1820/1820:8.1.0/O11019/1656153506:user/release-keys
  StorageType    : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
IMEI1 : 864164*********
IMEI2 : 864164*********
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------
---------------------------
        Ultra Power   
---------------------------
Formatting Userdata :
Operation : MTK_FUDRebuild Ok
Removing FRP :  Ok

Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!

Action Result :  Ok

Elapsed Time : 00:00:08
 

Rashi Hydra Tool

Product Manager
Feb 3, 2021
338
317
Hydra Team
Infinix Smart 6 X6511E Pattern and Frp Lock remove with Hydra Tool


- Keep Press Boot/info
Code:
-------------------------------------------------------
To Enable BROM  Mode :
     Method 1    - Bootkey (Vol + - Power) or any combination
     Method 2    - Enable Preloader to brom(crashing Method)
     Method 3    - Test Point Data0 + ground
To Enable Preloader  Mode :
     Method 1    - Just Insert cable
-------------------------------------------------------

Searching for MTK Device...Found
  MTK Port Type   : Flashmode BROM
  FriendlyName    : MediaTek USB Port (COM5)
  Device          : /5&15c311e1&0&8
  SymbolicName    : \\?\usb#vid_0e8d&pid_0003#5&15c311e1&0&8#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 01/22/2016,3.2
  Service         : wdm_usb

Openning Port [COM5] Ok
Handshaking...Ok
  HwCode          : 0717 {MT6761/MT6762/MT3369/MT8766B}
  Hwver           : 0000
  Target config   : E5
  SBC             : 01 (True)
  SLA             : 00 (False)
  DAA             : 04 (True)
  SWJTAG          : 04 (True)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 20 (True)
  MEMWRITE        : 40 (True)
  CMD_C8          : 80 (True)
  Connection      : BROM
  HW Subcode      : 8A00
  HW Subcode      : CA01
  SW Ver          : 0200
  ME_ID           : 0B3E4496539219B1A9A76993658D979A
  SOC_ID          : E3368393836CD2CA4EC384B0F417BE72C935A987E97173F349CD89D309B68300
Device not yet filterd...
Executing LibUSB Filter..
Device Now Filtered...Restarting Device Port..

Openning Port [COM5] Ok

Exploiting Device...
Successfully Exploited..
Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..Found @ 0x00200BC4
Starting to dump...
Prel Size : 0x0003CFE0
Successfully dump preloader..  [C:\ALL SETUP\Hydra Tool\Boot\PreloaderDump\preloader_x6511e_h6125.bin]
  Target config   : 00
  SBC             : 00 (False)
  SLA             : 00 (False)
  DAA             : 00 (False)
  SWJTAG          : 00 (False)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 00 (False)
  MEMWRITE        : 00 (False)
  CMD_C8          : 00 (False)
  Connection      : BROM

Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin]
Patching da2 ... Ok
Uploading Stage 1....
Successfully uploaded stage 1, jumping ..
Executing JUMP_DA Address @ 0x00200000
Jumping to 0x00200000 Ok 0xC0
Successfully received DA sync
  ONNECTION_AGENT : brom
  DRAM config needed for : D62D004D4D433332
Sending auto preloader from dump...  [preloader_x6511e_h6125.bin]
Sending emi data.. [DRAM setup passed.]
Sending emi data succeeded.
Uploading stage 2...
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
  ERAM Size       : 0x000000000003A500-233.25 KB
  IRAM Size       : 0x0000000080000000-2 GB
  EMMC Boot1 Size : 0x0000000000400000-4 MB
  EMMC Boot2 Size : 0x0000000000400000-4 MB
  EMMC RPMB Size  : 0x0000000000400000-4 MB
  EMMC USER Size  : 0x0000000747C00000-29.121 GB
  EMMC CID        : D62D004D4D433332475103DA1139882F - MMC32G
  HW-CODE         : 0x717
  HWSUB-CODE      : 0x8A00
  HW-VERSION      : 0xCA01
  SW-VERSION      : 0x200
  CHIP-EVOLUTION  : 0x0
  DA-VERSION      : 1.0
  Speed           : high-speed
Upload data was accepted. Jumping to stage 2...
DA Extensions successfully added
Reading Partition Table ..
Partition Count : 50
--------------- Reading build.prop content ---------------
--------------- end of build.prop content ---------------

Reading IMEI........
IMEI1 : 356318**********
IMEI2 : 356318**********
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------
Backing up Security..
- preloader(preloader.bin), 512 KB                    = Ok  [preloader_x6511e_h6125.bin]
  *Creating Scatter file... C:\ALL SETUP\Hydra Tool\Backup\MTKBKUP\0717_0B3E4496539219B1A9A7555553658D979A\Auto\07074103414\6761_Android_scatter.txt
- pgpt(pgpt.bin), 32 KB                               = Ok
- nvram(nvram.bin), 70 MB                             = Ok
- nvdata(nvdata.bin), 64 MB                           = Ok
- frp(frp.bin), 1024 KB                               = Ok
- protect1(protect1.bin), 8 MB                        = Ok
- protect2(protect2.bin), 15.867 MB                   = Ok
- persist(persist.bin), 48 MB                         = Ok
- proinfo(proinfo.bin), 3 MB                          = Ok
- nvcfg(nvcfg.bin), 32 MB                             = Ok
- sec1(sec1.bin), 2 MB                                = Ok
- seccfg(seccfg.bin), 8 MB                            = Ok
Backup Done!!!

Elapsed Time : 00:00:47



- Factory Reset/FRP Lock Remove

Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                      Service Function
                  [B]      Ultra Power
                            Auto[/B]
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching for MTK Device...Found
  MTK Port Type   : Flashmode BROM
  FriendlyName    : MediaTek USB Port (COM5)
  Device          : /5&15c311e1&0&8
  SymbolicName    : \\?\usb#vid_0e8d&pid_0003#5&15c311e1&0&8#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 01/22/2016,3.2
  Service         : wdm_usb

Openning Port [COM5] Ok
Reading Partition Table ..
  ERAM Size       : 0x000000000003A500-233.25 KB
  IRAM Size       : 0x0000000080000000-2 GB
  EMMC Boot1 Size : 0x0000000000400000-4 MB
  EMMC Boot2 Size : 0x0000000000400000-4 MB
  EMMC RPMB Size  : 0x0000000000400000-4 MB
  EMMC USER Size  : 0x0000000747C00000-29.121 GB
  EMMC CID        : D62D004D4D433332475103DA1139882F - MMC32G
  HW-CODE         : 0x717
  HWSUB-CODE      : 0x8A00
  HW-VERSION      : 0xCA01
  SW-VERSION      : 0x200
  CHIP-EVOLUTION  : 0x0
  DA-VERSION      : 1.0
  Speed           : high-speed
Partition Count : 50
--------------- Reading build.prop content ---------------
--------------- end of build.prop content ---------------

Reading IMEI........
IMEI1 : 356318*********
IMEI2 : 356318*********
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------
---------------------------
        Ultra Power   
---------------------------
Formatting Userdata :
Operation : Safeformat Universal... Ok
Removing FRP :  Ok

Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!

Action Result :  Ok

Elapsed Time : 00:00:05
 

Rashi Hydra Tool

Product Manager
Feb 3, 2021
338
317
Hydra Team
Oppo A16 (CPH2275) Flashing done with Hydra Tool

- Write firmware
Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                  MTK Flash Function...              
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching for MTK Device...Found
  MTK Port Type   : Flashmode BROM
  FriendlyName    : MediaTek USB Port_V1632 (COM27)
  Device          : /5&51fd96d&0&6
  SymbolicName    : \\?\usb#vid_0e8d&pid_0003#5&51fd96d&0&6#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 01/22/2015,3.0.1504.0
  Service         : wdm_usb

Openning Port [COM27] Ok
Handshaking...Ok
  HwCode          : 0766 {MT6765/MT8768t}
  Hwver           : 0000
  Target config   : E5
  SBC             : 01 (True)
  SLA             : 00 (False)
  DAA             : 04 (True)
  SWJTAG          : 04 (True)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 20 (True)
  MEMWRITE        : 40 (True)
  CMD_C8          : 80 (True)
  Connection      : BROM
  HW Subcode      : 8A00
  HW Subcode      : CA00
  SW Ver          : 0000
  ME_ID           : 6AD5196312201F5928532AACD5426D1D
  SOC_ID          : 32AE3A823FF045758DDFADC706BB148AAD63538EF9C2CEF7097DAA0BF9973ECF

Exploiting Device...
Successfully Exploited..
Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..Found @ 0x00200BC4
Starting to dump...
Prel Size : 0x0003E1F0
Successfully dump preloader..  [C:\Hydra Tool\Boot\PreloaderDump\preloader_oppo6765.bin]
  Target config   : 00
  SBC             : 00 (False)
  SLA             : 00 (False)
  DAA             : 00 (False)
  SWJTAG          : 00 (False)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 00 (False)
  MEMWRITE        : 00 (False)
  CMD_C8          : 00 (False)
  Connection      : BROM

Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin]
Patching da2 ... Ok
Uploading Stage 1....
Successfully uploaded stage 1, jumping ..
Executing JUMP_DA Address @ 0x00200000
Jumping to 0x00200000 Ok 0xC0
Successfully received DA sync
  ONNECTION_AGENT : brom
  DRAM config needed for : 90014A6843386150
Sending auto preloader from dump...  [preloader_oppo6765.bin]
Sending emi data.. [DRAM setup passed.]
Sending emi data succeeded.
Uploading stage 2...
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
  ERAM Size       : 0x000000000003A000-232 KB
  IRAM Size       : 0x0000000100000000-4 GB
  EMMC Boot1 Size : 0x0000000000400000-4 MB
  EMMC Boot2 Size : 0x0000000000400000-4 MB
  EMMC RPMB Size  : 0x0000000001000000-16 MB
  EMMC USER Size  : 0x0000000E8F800000-58.242 GB
  EMMC CID        : 90014A68433861503E031014F601A857 - hC8aP>
  HW-CODE         : 0x766
  HWSUB-CODE      : 0x8A00
  HW-VERSION      : 0xCA00
  SW-VERSION      : 0x0
  CHIP-EVOLUTION  : 0x0
  DA-VERSION      : 1.0
  Speed           : high-speed
Upload data was accepted. Jumping to stage 2...
DA Extensions successfully added
Reading Partition Table ..
Partition Count : 50

Write Selected Partitions..
- preloader(preloader_oppo6765.bin), 248.484 KB[Erasing...Ok]  Status  :C0010001 Error= Failed
- recovery(recovery.img), 256 KB                      = Ok
- opporeserve2(opporeserve2.img), 256 KB              = Ok
- vbmeta_system(vbmeta_system.img), 4 KB              = Ok
- vbmeta_vendor(vbmeta_vendor.img), 4 KB              = Ok
- cdt_engineering(cdt_engineering.img), 256 KB        = Ok
- md1img(md1img.img), 256 KB                          = Ok
- spmfw(spmfw.img), 62.578 KB                         = Ok
- scp1(scp.img), 256 KB                               = Ok
- scp2(scp.img), 256 KB                               = Ok
- sspm_1(sspm.img), 256 KB                            = Ok
- sspm_2(sspm.img), 256 KB                            = Ok
- gz1(gz.img), 256 KB                                 = Ok
- gz2(gz.img), 256 KB                                 = Ok
- lk(lk.img), 256 KB                                  = Ok
- lk2(lk.img), 256 KB                                 = Ok
- boot(boot.img), 256 KB                              = Ok
- logo(logo.bin), 256 KB                              = Ok
- dtbo(dtbo.img), 256 KB                              = Ok
- tee1(tee.img), 256 KB                               = Ok
- tee2(tee.img), 256 KB                               = Ok
- vbmeta(vbmeta.img), 4 KB                            = Ok
- cache(cache.img), 68.168 KB                         = Ok
- userdata(userdata.img), 256 KB                      = Ok

Rebooting Device...

Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!                           =  Ok
----------------------------------

Elapsed Time : 00:00:38

 

Rashi Hydra Tool

Product Manager
Feb 3, 2021
338
317
Hydra Team
Redmi 9A Pattern and FRP Lock Remove with Hydra Tool


- Keep press Boot/Info
Code:
-------------------------------------------------------
To Enable BROM  Mode :
     Method 1    - Bootkey (Vol + - Power) or any combination
     Method 2    - Enable Preloader to brom(crashing Method)
     Method 3    - Test Point Data0 + ground
To Enable Preloader  Mode :
     Method 1    - Just Insert cable
-------------------------------------------------------

Searching for MTK Device...Found
  MTK Port Type   : Flashmode BROM
  FriendlyName    : MediaTek USB Port (COM40)
  Device          : /6&18de9b47&0&2
  SymbolicName    : \\?\usb#vid_0e8d&pid_0003#6&18de9b47&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 11/06/2014,2.0.1136.0
  Service         : usbser

Openning Port [COM40] Ok
Handshaking...Ok
  HwCode          : 0766 {MT6765/MT8768t}
  Hwver           : 0000
  Target config   : E5
  SBC             : 01 (True)
  SLA             : 00 (False)
  DAA             : 04 (True)
  SWJTAG          : 04 (True)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 20 (True)
  MEMWRITE        : 40 (True)
  CMD_C8          : 80 (True)
  Connection      : BROM
  HW Subcode      : 8A00
  HW Subcode      : CA00
  SW Ver          : 0000
  ME_ID           : CB0956A64A6310ED58142B5BFD8FB115
  SOC_ID          : F9A141F833AAB23E12907926017B4E794B07387758ACD9EF40FBAFC5EC538D10

Exploiting Device...
Successfully Exploited..
Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..
Not Found
  Target config   : 00
  SBC             : 00 (False)
  SLA             : 00 (False)
  DAA             : 00 (False)
  SWJTAG          : 00 (False)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 00 (False)
  MEMWRITE        : 00 (False)
  CMD_C8          : 00 (False)
  Connection      : BROM

Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin]
Patching da2 ... Ok
Uploading Stage 1....
Successfully uploaded stage 1, jumping ..
Executing JUMP_DA Address @ 0x00200000
Jumping to 0x00200000 Ok 0xC0
Successfully received DA sync
  ONNECTION_AGENT : brom
  DRAM config needed for : 150100475036424D
Sending auto preloader from dump...
Hydra Auto Preloader Search Enabled..
Hydra will find compatible preloader files...
-----------------------------
Found 14 Compatible Preloaders..
-----------------------------
1-preloader_cereus.bin...Sending... [DRAM setup passed.] [Ok]
-----------------------------
Sending emi data succeeded.
Uploading stage 2...
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
  ERAM Size       : 0x000000000003A000-232 KB
  IRAM Size       : 0x00000000C0000000-3 GB
  EMMC Boot1 Size : 0x0000000000400000-4 MB
  EMMC Boot2 Size : 0x0000000000400000-4 MB
  EMMC RPMB Size  : 0x0000000001000000-16 MB
  EMMC USER Size  : 0x0000000E8F800000-58.242 GB
  EMMC CID        : 150100475036424D4201CDB76872C64D - GP6BMB
  HW-CODE         : 0x766
  HWSUB-CODE      : 0x8A00
  HW-VERSION      : 0xCA00
  SW-VERSION      : 0x0
  CHIP-EVOLUTION  : 0x0
  DA-VERSION      : 1.0
  Speed           : high-speed
Upload data was accepted. Jumping to stage 2...
DA Extensions successfully added
Reading Partition Table ..
Partition Count : 44
--------------- Reading build.prop content ---------------
  Product        : k62v1_64_bsp
  ID             : RP1A.200720.012
  SDK            : 30
  Release        : 11
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-US
  Description    : full_k62v1_64_bsp-user 11 RP1A.200720.012 eng.compil.20230306.183730 release-keys
  Display ID     : RP1A.200720.012 release-keys
  Security Patch : 2022-05-01
  StorageType    : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
IMEI1 : 863591*********
IMEI2 : 863591*********
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------
Backing up Security..
- preloader(preloader.bin), 512 KB                    = Ok  [preloader_k62v1_64_bsp.bin]
  *Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0766_CB0gfgfg4A6310ED58142B5BFD8FB115\Auto\070723445555615\6765_Android_scatter.txt
- pgpt(pgpt.bin), 32 KB                               = Ok
- nvram(nvram.bin), 64 MB                             = Ok
- nvdata(nvdata.bin), 64 MB                           = Ok
- frp(frp.bin), 1024 KB                               = Ok
- protect1(protect1.bin), 8 MB                        = Ok
- protect2(protect2.bin), 13.469 MB                   = Ok
- persist(persist.bin), 48 MB                         = Ok
- proinfo(proinfo.bin), 3 MB                          = Ok
- nvcfg(nvcfg.bin), 32 MB                             = Ok
- sec1(sec1.bin), 2 MB                                = Ok
- seccfg(seccfg.bin), 8 MB                            = Ok
- lk(lk.bin), 5 MB                                    = Ok
Backup Done!!!

Elapsed Time : 00:01:40




- Factory Reset Phone
Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                      Service Function
              Format/Factory Reset/ScreenLock
                            Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching for MTK Device...Found
  MTK Port Type   : Flashmode BROM
  FriendlyName    : MediaTek USB Port (COM40)
  Device          : /6&18de9b47&0&2
  SymbolicName    : \\?\usb#vid_0e8d&pid_0003#6&18de9b47&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 11/06/2014,2.0.1136.0
  Service         : usbser

Openning Port [COM40] Ok
Reading Partition Table ..
  ERAM Size       : 0x000000000003A000-232 KB
  IRAM Size       : 0x00000000C0000000-3 GB
  EMMC Boot1 Size : 0x0000000000400000-4 MB
  EMMC Boot2 Size : 0x0000000000400000-4 MB
  EMMC RPMB Size  : 0x0000000001000000-16 MB
  EMMC USER Size  : 0x0000000E8F800000-58.242 GB
  EMMC CID        : 150100475036424D4201CDB76872C64D - GP6BMB
  HW-CODE         : 0x766
  HWSUB-CODE      : 0x8A00
  HW-VERSION      : 0xCA00
  SW-VERSION      : 0x0
  CHIP-EVOLUTION  : 0x0
  DA-VERSION      : 1.0
  Speed           : high-speed
Partition Count : 44
--------------- Reading build.prop content ---------------
  Product        : k62v1_64_bsp
  ID             : RP1A.200720.012
  SDK            : 30
  Release        : 11
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-US
  Description    : full_k62v1_64_bsp-user 11 RP1A.200720.012 eng.compil.20230306.183730 release-keys
  Display ID     : RP1A.200720.012 release-keys
  Security Patch : 2022-05-01
  StorageType    : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
IMEI1 : 863591*******
IMEI2 : 863591*******
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------
------------------------------
   Factory Reset Flash Mode.. 
------------------------------
Operation : Safeformat Universal...

Action Result :  Ok

Elapsed Time : 00:00:06




- FRP Lock Remove
Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                      Service Function
               Factory Reset Protection[FRP]
                            Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching for MTK Device...Found
  MTK Port Type   : Flashmode BROM
  FriendlyName    : MediaTek USB Port (COM40)
  Device          : /6&18de9b47&0&2
  SymbolicName    : \\?\usb#vid_0e8d&pid_0003#6&18de9b47&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 11/06/2014,2.0.1136.0
  Service         : usbser

Openning Port [COM40] Ok
Reading Partition Table ..
  ERAM Size       : 0x000000000003A000-232 KB
  IRAM Size       : 0x00000000C0000000-3 GB
  EMMC Boot1 Size : 0x0000000000400000-4 MB
  EMMC Boot2 Size : 0x0000000000400000-4 MB
  EMMC RPMB Size  : 0x0000000001000000-16 MB
  EMMC USER Size  : 0x0000000E8F800000-58.242 GB
  EMMC CID        : 150100475036424D4201CDB76872C64D - GP6BMB
  HW-CODE         : 0x766
  HWSUB-CODE      : 0x8A00
  HW-VERSION      : 0xCA00
  SW-VERSION      : 0x0
  CHIP-EVOLUTION  : 0x0
  DA-VERSION      : 1.0
  Speed           : high-speed
Partition Count : 44
--------------- Reading build.prop content ---------------
  Product        : k62v1_64_bsp
  ID             : RP1A.200720.012
  SDK            : 30
  Release        : 11
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-US
  Description    : full_k62v1_64_bsp-user 11 RP1A.200720.012 eng.compil.20230306.183730 release-keys
  Display ID     : RP1A.200720.012 release-keys
  Security Patch : 2022-05-01
  StorageType    : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
IMEI1 : 8635**********
IMEI2 : 8635**********
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------

Action Result :  Ok

Elapsed Time : 00:00:07
 

Rashi Hydra Tool

Product Manager
Feb 3, 2021
338
317
Hydra Team
Redmi Note 8 FRP Lock remove with Hydra Tool



- FRP Lock Remove


Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                   Qualcomm Service Tool
                  Factory Reset Protection
                            Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

PreOperation Configuration
Brand : XIAOMI Model : Redmi Note 8 (ginkgo) Storage : Auto
Loader: 0010A0E100720000_1bebe3863a6781db_76196dc8_XIAOMI.fhprg
Port  : Auto

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM30)
SymbolicName :\\?\usb#vid_05c6&pid_9008#6&1b32c093&0&5#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver   :08/02/2017,2.1.2.7

Getting device info. [Connected].Ok
Device MODE : Firehose
Connecting to Firehose...
Ping..................... Ok
Configuration[FHProt_Auto].........
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Jul  3 2019 - 22:23:56

*** STORAGE DEVICE INFO ***
Memory Type         : eMMC
Block Size in Bytes : 512
Page Size           : 512
Manufacturer ID     : 144
Serial Number       : 2697483459
Firmware Version    : 925904944
Product Name        : hDEaP3
Physical Partitions : 4
Total Logical Blocks:
          Drive [0]  244285440[116.484 GB]
          Drive [1]  8192[4 MB]
          Drive [2]  8192[4 MB]
          Drive [3]  32768[16 MB]

Protocol : Universal
Running : Ok

Reading GPT[4]
          Drive [0] 88 Items
          Drive [1] 0 Items
          Drive [2] 0 Items
          Drive [3] 0 Items

--------------- Reading build.prop content ---------------
build.prop
system
build.prop
  ID             : RKQ1.201004.002
  SDK            : 30
  Release        : 11
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-GB
  Security Patch : 2021-12-01
--------------- end of build.prop content ---------------
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOk

Action Result :  Ok

Elapsed Time : 00:00:06

 

Rashi Hydra Tool

Product Manager
Feb 3, 2021
338
317
Hydra Team
Redmi Note 10S Flashing with Hydra Tool



- Keep press Boot/Info
Code:
-------------------------------------------------------
To Enable BROM  Mode :
     Method 1    - Bootkey (Vol + - Power) or any combination
     Method 2    - Enable Preloader to brom(crashing Method)
     Method 3    - Test Point Data0 + ground
To Enable Preloader  Mode :
     Method 1    - Just Insert cable
-------------------------------------------------------

Searching for MTK Device...Found
  MTK Port Type   : Flashmode BROM
  FriendlyName    : MediaTek USB Port (COM125)
  Device          : /6&34f65de6&0&4
  SymbolicName    : \\?\usb#vid_0e8d&pid_0003#6&34f65de6&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 01/22/2016,3.2
  Service         : wdm_usb

Openning Port [COM125] Ok
Handshaking...Ok
  HwCode          : 0813 {MT6785}
  Hwver           : 0000
  Target config   : E7
  SBC             : 01 (True)
  SLA             : 02 (True)
  DAA             : 04 (True)
  SWJTAG          : 06 (True)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 20 (True)
  MEMWRITE        : 40 (True)
  CMD_C8          : 80 (True)
  Connection      : BROM
  HW Subcode      : 8A00
  HW Subcode      : CA00
  SW Ver          : 0000
  ME_ID           : 0242EF44BF4349AA45FE60784A86F7B6
  SOC_ID          : B2861822C030918B6D52258BFB68E0024C4A926BA45C9CB0B6AB0FEC38871B13

Exploiting Device...
Successfully Exploited..
Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..Found @ 0x00200BC4
Starting to dump...
Prel Size : 0x0004FC28
Successfully dump preloader..  [C:\Hydra Tool\Boot\PreloaderDump\preloader_k85v1_64.bin]
  Target config   : 00
  SBC             : 00 (False)
  SLA             : 00 (False)
  DAA             : 00 (False)
  SWJTAG          : 00 (False)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 00 (False)
  MEMWRITE        : 00 (False)
  CMD_C8          : 00 (False)
  Connection      : BROM

Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin]
Uploading Stage 1....
Successfully uploaded stage 1, jumping ..
Executing JUMP_DA Address @ 0x00200000
Jumping to 0x00200000 Ok 0xC0
Successfully received DA sync
  ONNECTION_AGENT : brom
  DRAM config needed for : 4839485131354145434D424441520000
Sending auto preloader from dump...  [preloader_k85v1_64.bin]
Sending emi data.. [DRAM setup passed.]
Sending emi data succeeded.
Uploading stage 2...
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
  ERAM Size       : 0x0000000000080000-512 KB
  IRAM Size       : 0x0000000180000000-6 GB
  UFS MID         : 0x48
  UFS FWVer       : 0xA043
  UFS Blocksize   : 0x0000000000001000-4 KB
  UFS LU0 Size    : 0x0000000000400000-4 MB
  UFS LU1 Size    : 0x0000000000400000-4 MB
  UFS LU2 Size    : 0x0000001DCB000000-119.172 GB
  UFS ID          : H
  UFS CID         : 4839485131354145434D42444152000000000000
  HW-CODE         : 0x813
  HWSUB-CODE      : 0x8A00
  HW-VERSION      : 0xCA00
  SW-VERSION      : 0x0
  CHIP-EVOLUTION  : 0x0
  DA-VERSION      : 1.0
  Speed           : high-speed
Error:  on sending data: DA hash mismatch
*DA Extensions failed to enable
Reading Partition Table ..
Partition Count : 64
--------------- Reading build.prop content ---------------
Unable to read system info..
--------------- end of build.prop content ---------------

Reading IMEI........
IMEI1 : 868075*********
IMEI2 : 860901*********
-------------------------------
Bootloader Status...
  Bootloader : Unlocked
-------------------------------
Backing up Security..
- preloader(preloader.bin), 512 KB                    = Ok  [preloader_k85v1_64.bin]
  *Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0813_024ghgh45dfgfAA45FE60784A86F7B6\Auto\07072375544425\6785_Android_scatter.txt
- pgpt(pgpt.bin), 32 KB                               = Ok
- nvram(nvram.bin), 64 MB                             = Ok
- nvdata(nvdata.bin), 64 MB                           = Ok
- frp(frp.bin), 1024 KB                               = Ok
- protect1(protect1.bin), 8 MB                        = Ok
- protect2(protect2.bin), 8 MB                        = Ok
- persist(persist.bin), 49.367 MB                     = Ok
- proinfo(proinfo.bin), 3 MB                          = Ok
- nvcfg(nvcfg.bin), 32 MB                             = Ok
- sec1(sec1.bin), 2 MB                                = Ok
- seccfg(seccfg.bin), 8 MB                            = Ok
Backup Done!!!

Elapsed Time : 00:00:56




- Write firmware
Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                  MTK Flash Function...              
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching for MTK Device...Found
  MTK Port Type   : Flashmode BROM
  FriendlyName    : MediaTek USB Port (COM6)
  Device          : /5&3a7b297c&0&2
  SymbolicName    : \\?\usb#vid_0e8d&pid_0003#5&3a7b297c&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 01/22/2016,3.2
  Service         : wdm_usb

Openning Port [COM6] Ok
Reading Partition Table ..
  ERAM Size       : 0x0000000000080000-512 KB
  IRAM Size       : 0x0000000180000000-6 GB
  UFS MID         : 0x48
  UFS FWVer       : 0xA043
  UFS Blocksize   : 0x0000000000001000-4 KB
  UFS LU0 Size    : 0x0000000000400000-4 MB
  UFS LU1 Size    : 0x0000000000400000-4 MB
  UFS LU2 Size    : 0x0000001DCB000000-119.172 GB
  UFS ID          : H
  UFS CID         : 4839485131354145434D42444152000000000000
  HW-CODE         : 0x813
  HWSUB-CODE      : 0x8A00
  HW-VERSION      : 0xCA00
  SW-VERSION      : 0x0
  CHIP-EVOLUTION  : 0x0
  DA-VERSION      : 1.0
  Speed           : high-speed
Partition Count : 62
--------------- Reading build.prop content ---------------
  Product        : rosemary
  ID             : RP1A.200720.011
  SDK            : 30
  Release        : 11
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-US
  Description    : rosemary-userdebug 11 RP1A.200720.011 320 test-keys
  Display ID     : rosemary-userdebug 11 RP1A.200720.011 320 test-keys
  Security Patch : 2021-01-05
  StorageType    : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
IMEI1 : 86807**********
IMEI2 : 86090**********
-------------------------------
Bootloader Status...
  Bootloader : Unlocked
-------------------------------

Write Selected Partitions..
- preloader(preloader_k85v1_64.bin), 336.867 KB[Erasing...Ok]  Status  :C0010001 Error= Failed
- cust(cust.img), 955.739 MB                          = Ok
- rescue(rescue.img), 44.074 KB                       = Ok
- vbmeta_a(vbmeta.img), 4 KB                          = Ok
- vbmeta_system_a(vbmeta_system.img), 4 KB            = Ok
- vbmeta_vendor_a(vbmeta_vendor.img), 4 KB            = Ok
- md1img_a(md1img.img), 56.996 MB                     = Ok
- spmfw_a(spmfw.img), 14.969 KB                       = Ok
- audio_dsp_a(audio_dsp.img), 1.338 MB                = Ok
- scp_a(scp.img), 2.22 MB                             = Ok
- sspm_a(sspm.img), 646.313 KB                        = Ok
- cam_vpu1_a(cam_vpu1.img), 1.096 MB                  = Ok
- cam_vpu2_a(cam_vpu2.img), 11.6 MB                   = Ok
- cam_vpu3_a(cam_vpu3.img), 138.688 KB                = Ok
- gz_a(gz.img), 1.195 MB                              = Ok
- lk_a(lk.img), 1.695 MB                              = Ok
- boot_a(boot.img), 64 MB                             = Ok
- dtbo_a(dtbo.img), 52.453 KB                         = Ok
- tee_a(tee.img), 2.448 MB                            = Ok
- logo(logo.bin), 1.629 MB                            = Ok
- super(super.img), 7.477 GB                          = Ok
- userdata(userdata.img), 1.291 GB                    = Ok
----------------------------------

Elapsed Time : 00:05:17

 

Rashi Hydra Tool

Product Manager
Feb 3, 2021
338
317
Hydra Team
Tecno CAMON 18T Factory Reset with Hydra Tool


- Keep Press Boot/Info

Code:
-------------------------------------------------------
To Enable BROM  Mode :
     Method 1    - Bootkey (Vol + - Power) or any combination
     Method 2    - Enable Preloader to brom(crashing Method)
     Method 3    - Test Point Data0 + ground
To Enable Preloader  Mode :
     Method 1    - Just Insert cable
-------------------------------------------------------

Searching for MTK Device...Found
  MTK Port Type   : Flashmode BROM
  FriendlyName    : MediaTek USB Port_V1633 (COM3)
  Device          : /5&208a4c23&0&2
  SymbolicName    : \\?\usb#vid_0e8d&pid_0003#5&208a4c23&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 01/22/2015,3.0.1504.0
  Service         : wdm_usb

Openning Port [COM3] Ok
Handshaking...Ok
  HwCode          : 0707 {MT6768}
  Hwver           : 0000
  Target config   : E5
  SBC             : 01 (True)
  SLA             : 00 (False)
  DAA             : 04 (True)
  SWJTAG          : 04 (True)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 20 (True)
  MEMWRITE        : 40 (True)
  CMD_C8          : 80 (True)
  Connection      : BROM
  HW Subcode      : 8A00
  HW Subcode      : CA00
  SW Ver          : 0000
  ME_ID           : DA2AB393F47F5703F8444B1A2626C49B
  SOC_ID          : BF54A288AA3D060DEFF358FB28217EB120DE5D77627D1766627F1940C94ECB7D

Exploiting Device...
Successfully Exploited..
Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..Found @ 0x00200BC4
Starting to dump...
Prel Size : 0x0004FA6C
Successfully dump preloader..  [C:\Hydra Tool\Boot\PreloaderDump\preloader_ch6h_h698.bin]
  Target config   : 00
  SBC             : 00 (False)
  SLA             : 00 (False)
  DAA             : 00 (False)
  SWJTAG          : 00 (False)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 00 (False)
  MEMWRITE        : 00 (False)
  CMD_C8          : 00 (False)
  Connection      : BROM

Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin]
Patching da2 ... Ok
Uploading Stage 1....
Successfully uploaded stage 1, jumping ..
Executing JUMP_DA Address @ 0x00200000
Jumping to 0x00200000 Ok 0xC0
Successfully received DA sync
  ONNECTION_AGENT : brom
  DRAM config needed for : 13014E47314A3953
Sending auto preloader from dump...  [preloader_ch6h_h698.bin]
Sending emi data.. [DRAM setup passed.]
Sending emi data succeeded.
Uploading stage 2...
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
  ERAM Size       : 0x0000000000070000-448 KB
  IRAM Size       : 0x0000000100000000-4 GB
  EMMC Boot1 Size : 0x0000000000400000-4 MB
  EMMC Boot2 Size : 0x0000000000400000-4 MB
  EMMC RPMB Size  : 0x0000000001000000-16 MB
  EMMC USER Size  : 0x0000001D1F000000-116.484 GB
  EMMC CID        : 13014E47314A3953391016336AA39835 - G1J9S9
  HW-CODE         : 0x707
  HWSUB-CODE      : 0x8A00
  HW-VERSION      : 0xCA00
  SW-VERSION      : 0x0
  CHIP-EVOLUTION  : 0x1
  DA-VERSION      : 1.0
  Speed           : high-speed
Upload data was accepted. Jumping to stage 2...
DA Extensions successfully added
Reading Partition Table ..
Partition Count : 51
--------------- Reading build.prop content ---------------
--------------- end of build.prop content ---------------

Reading IMEI........
IMEI1 : 35938**********
IMEI2 : 35938**********
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------
Backing up Security..
- preloader(preloader.bin), 512 KB                    = Ok  [preloader_ch6h_h698.bin]
  *Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0707_DA2AB3fgh7F47F5703F8444B1A2626C49B\Auto\070444080614\6768_Android_scatter.txt
- pgpt(pgpt.bin), 32 KB                               = Ok
- nvram(nvram.bin), 70 MB                             = Ok
- nvdata(nvdata.bin), 64 MB                           = Ok
- frp(frp.bin), 1024 KB                               = Ok
- protect1(protect1.bin), 8 MB                        = Ok
- protect2(protect2.bin), 14.367 MB                   = Ok
- persist(persist.bin), 48 MB                         = Ok
- proinfo(proinfo.bin), 3 MB                          = Ok
- nvcfg(nvcfg.bin), 32 MB                             = Ok
- sec1(sec1.bin), 2 MB                                = Ok
- seccfg(seccfg.bin), 8 MB                            = Ok
Backup Done!!!

Elapsed Time : 00:00:55



- Factory Reset

Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                      Service Function
              Format/Factory Reset/ScreenLock
                            Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching for MTK Device...Found
  MTK Port Type   : Flashmode BROM
  FriendlyName    : MediaTek USB Port_V1633 (COM3)
  Device          : /5&208a4c23&0&2
  SymbolicName    : \\?\usb#vid_0e8d&pid_0003#5&208a4c23&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 01/22/2015,3.0.1504.0
  Service         : wdm_usb

Openning Port [COM3] Ok
Reading Partition Table ..
  ERAM Size       : 0x0000000000070000-448 KB
  IRAM Size       : 0x0000000100000000-4 GB
  EMMC Boot1 Size : 0x0000000000400000-4 MB
  EMMC Boot2 Size : 0x0000000000400000-4 MB
  EMMC RPMB Size  : 0x0000000001000000-16 MB
  EMMC USER Size  : 0x0000001D1F000000-116.484 GB
  EMMC CID        : 13014E47314A3953391016336AA39835 - G1J9S9
  HW-CODE         : 0x707
  HWSUB-CODE      : 0x8A00
  HW-VERSION      : 0xCA00
  SW-VERSION      : 0x0
  CHIP-EVOLUTION  : 0x1
  DA-VERSION      : 1.0
  Speed           : high-speed
Partition Count : 51
--------------- Reading build.prop content ---------------
--------------- end of build.prop content ---------------

Reading IMEI........
IMEI1 : 359384********
IMEI2 : 359384********
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------
------------------------------
   Factory Reset Flash Mode.. 
------------------------------
Operation : Safeformat Universal...

Action Result :  Ok

Elapsed Time : 00:00:04
 

Rashi Hydra Tool

Product Manager
Feb 3, 2021
338
317
Hydra Team
Tecno Camon 19 FRP Lock Remove with Hydra Tool

- Keep Press Boot/Info
Code:
-------------------------------------------------------
To Enable BROM  Mode :
     Method 1    - Bootkey (Vol + - Power) or any combination
     Method 2    - Enable Preloader to brom(crashing Method)
     Method 3    - Test Point Data0 + ground
To Enable Preloader  Mode :
     Method 1    - Just Insert cable
-------------------------------------------------------

Searching for MTK Device...Found
  MTK Port Type   : Flashmode BROM
  FriendlyName    : MediaTek USB Port_V1632 (COM6)
  Device          : /5&34f2cc5c&0&4
  SymbolicName    : \\?\usb#vid_0e8d&pid_0003#5&34f2cc5c&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 01/22/2015,3.0.1504.0
  Service         : wdm_usb

Openning Port [COM6] Ok
Handshaking...Ok
  HwCode          : 0707 {MT6768}
  Hwver           : 0000
  Target config   : E5
  SBC             : 01 (True)
  SLA             : 00 (False)
  DAA             : 04 (True)
  SWJTAG          : 04 (True)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 20 (True)
  MEMWRITE        : 40 (True)
  CMD_C8          : 80 (True)
  Connection      : BROM
  HW Subcode      : 8A00
  HW Subcode      : CA00
  SW Ver          : 0000
  ME_ID           : 53A8545D97FDC8123B2FA8F130B88A4D
  SOC_ID          : 4CEA9C733349DDC8B3FE815B3EA9A49126537356D87312B7EE9AEA940054E0D2

Exploiting Device...
Successfully Exploited..
Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..Found @ 0x00200BC4
Starting to dump...
Prel Size : 0x0004F38C
Successfully dump preloader..  [C:\Hydra Tool\Boot\PreloaderDump\preloader_ci6n_h6917.bin]
  Target config   : 00
  SBC             : 00 (False)
  SLA             : 00 (False)
  DAA             : 00 (False)
  SWJTAG          : 00 (False)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 00 (False)
  MEMWRITE        : 00 (False)
  CMD_C8          : 00 (False)
  Connection      : BROM

Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin]
Patching da2 ... Ok
Uploading Stage 1....
Successfully uploaded stage 1, jumping ..
Executing JUMP_DA Address @ 0x00200000
Jumping to 0x00200000 Ok 0xC0
Successfully received DA sync
  ONNECTION_AGENT : brom
  DRAM config needed for : 90014A6844456150
Sending auto preloader from dump...  [preloader_ci6n_h6917.bin]
Sending emi data.. [DRAM setup passed.]
Sending emi data succeeded.
Uploading stage 2...
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
  ERAM Size       : 0x0000000000070000-448 KB
  IRAM Size       : 0x0000000100000000-4 GB
  EMMC Boot1 Size : 0x0000000000400000-4 MB
  EMMC Boot2 Size : 0x0000000000400000-4 MB
  EMMC RPMB Size  : 0x0000000001000000-16 MB
  EMMC USER Size  : 0x0000001D1F000000-116,484 GB
  EMMC CID        : 90014A68444561503303103964F6A8A7 - hDEaP3
  HW-CODE         : 0x707
  HWSUB-CODE      : 0x8A00
  HW-VERSION      : 0xCA00
  SW-VERSION      : 0x0
  CHIP-EVOLUTION  : 0x1
  DA-VERSION      : 1.0
  Speed           : high-speed
Upload data was accepted. Jumping to stage 2...
DA Extensions successfully added
Reading Partition Table ..
Partition Count : 53
--------------- Reading build.prop content ---------------
  Product        : tssi_64_tecno
  ID             : SP1A.210812.016
  SDK            : 31
  Release        : 12
  ABI            : arm64-v8a
  Locale         : en-US
  Description    : sys_tssi_64_tecno-user 12 SP1A.210812.016 69767 release-keys
  Display ID     : TECNO-S-64-220826V643
  Security Patch : 2022-07-05
  StorageType    : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
IMEI1 : 3504708******
IMEI2 : 3504708******
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------
Backing up Security..
- preloader(preloader.bin), 512 KB                    = Ok  [preloader_ci6n_h6917.bin]
  *Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0707_53A8545D97FDj55555B2FA8F130B88A4D\Auto\07072444455\6768_Android_scatter.txt
- pgpt(pgpt.bin), 32 KB                               = Ok
- nvram(nvram.bin), 70 MB                             = Ok
- nvdata(nvdata.bin), 64 MB                           = Ok
- frp(frp.bin), 1024 KB                               = Ok
- protect1(protect1.bin), 8 MB                        = Ok
- protect2(protect2.bin), 12,367 MB                   = Ok
- persist(persist.bin), 48 MB                         = Ok
- proinfo(proinfo.bin), 3 MB                          = Ok
- nvcfg(nvcfg.bin), 32 MB                             = Ok
- sec1(sec1.bin), 2 MB                                = Ok
- seccfg(seccfg.bin), 8 MB                            = Ok
Backup Done!!!

Elapsed Time : 00:01:23




- FRP Lock Remove

Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                      Service Function
               Factory Reset Protection[FRP]
                            Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching for MTK Device...Found
  MTK Port Type   : Flashmode BROM
  FriendlyName    : MediaTek USB Port_V1632 (COM6)
  Device          : /5&34f2cc5c&0&4
  SymbolicName    : \\?\usb#vid_0e8d&pid_0003#5&34f2cc5c&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 01/22/2015,3.0.1504.0
  Service         : wdm_usb

Openning Port [COM6] Ok
Reading Partition Table ..
  ERAM Size       : 0x0000000000070000-448 KB
  IRAM Size       : 0x0000000100000000-4 GB
  EMMC Boot1 Size : 0x0000000000400000-4 MB
  EMMC Boot2 Size : 0x0000000000400000-4 MB
  EMMC RPMB Size  : 0x0000000001000000-16 MB
  EMMC USER Size  : 0x0000001D1F000000-116,484 GB
  EMMC CID        : 90014A68444561503303103964F6A8A7 - hDEaP3
  HW-CODE         : 0x707
  HWSUB-CODE      : 0x8A00
  HW-VERSION      : 0xCA00
  SW-VERSION      : 0x0
  CHIP-EVOLUTION  : 0x1
  DA-VERSION      : 1.0
  Speed           : high-speed
Partition Count : 53
--------------- Reading build.prop content ---------------
  Product        : tssi_64_tecno
  ID             : SP1A.210812.016
  SDK            : 31
  Release        : 12
  ABI            : arm64-v8a
  Locale         : en-US
  Description    : sys_tssi_64_tecno-user 12 SP1A.210812.016 69767 release-keys
  Display ID     : TECNO-S-64-220826V643
  Security Patch : 2022-07-05
  StorageType    : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
IMEI1 : 350470**********
IMEI2 : 350470**********
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------

Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!

Action Result :  Ok

Elapsed Time : 00:00:07
 

Rashi Hydra Tool

Product Manager
Feb 3, 2021
338
317
Hydra Team
Vivo Y11 (1906) Pattern and Frp Lock Remove with Hydra Tool


- Keep press Boot/Info
Code:
PreOperation Configuration
Brand : VIVO Model : Y11 (1906) Storage : Auto
Loader: 000BF0E100000000_60ba997fef6da9f0_d8fbe714_QUALCOMM_VIVO_wut_peek_8937.fhprg
Port  : Auto

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM3)
SymbolicName :\\?\usb#vid_05c6&pid_9008#8&fc22dd9&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver   :05/29/2019,2.1.3.7

Getting device info. [Connected].....
Serial No.: 0x170B7555
HW_ID     : 000BF0E100000000
MSM ID    : 0x000BF0E1, SDM439-Qualcomm Snapdragon 439/FAADANAZA
MODEL_ID  : 0x0000
OEM_ID    : 0x0000 - QUALCOMM
PBL Ver   : 00000000
PK HASH   : 60ba997fef6da9f05885fa11f1dd6d2a90d052a257a09c2075d7246cc73c0d43

Firehose Loader[000BF0E100000000_60ba997fef6da9f0_d8fbe714_QUALCOMM_VIVO_wut_peek_8937.fhprg]
--------------------------------------------------
  Header Type    : OLD
  TargetMSM      : 8937
  Tag            : _wut_peek
  Version        : 3
  Code_size      : 288
  Signature_size : 256
  fhVendor       : VIVO
  HW_ID          : 000BF0E100000000
  Vendor         : QUALCOMM
  OEM_ID         : 0000
  MODEL_ID       : 0000
  SW_ID          : 0000000000000003
  APP_ID         :
  pk_hash        : 60ba997fef6da9f05885fa11f1dd6d2a90d052a257a09c2075d7246cc73c0d43
  OEM_VERSION    : compiler0182
  IMAGE_VARIANT  : FAADANAZA
  QC_VERSION     : BOOT.BF.3.3.2-00063
--------------------------------------------------

SaharaBoot... Ok
Sending ...................Ok
Connecting to Firehose...
Ping... Ok
Configuration[FHProt_Auto]......
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type         : eMMC
Block Size in Bytes : 512
Page Size           : 512
Manufacturer ID     : 144
Serial Number       : 13161149
Firmware Version    : 909127728
Product Name        : hB8aP>
Physical Partitions : 3
Total Logical Blocks:
          Drive [0]  61071360[29.121 GB]
          Drive [1]  8192[4 MB]
          Drive [2]  8192[4 MB]

Protocol : Universal
Running : Ok

Reading GPT[3]
          Drive [0] 60 Items
          Drive [1] 0 Items
          Drive [2] 0 Items

--------------- Reading build.prop content ---------------
build.prop
system
build.prop
  ID             : RP1A.200720.012
  SDK            : 30
  Release        : 11
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-US
  Security Patch : 2022-03-01
--------------- end of build.prop content ---------------

Auto Backup Security partitions...
Reading Security Items....
- modemst1(modemst1.bin), 2.5 MB                      = Ok
- modemst2(modemst2.bin), 2.5 MB                      = Ok
- fsg(fsg.bin), 2.5 MB                                = Ok
- fsc(fsc.bin), 512 Bytes                             = Ok
- persist(persist.bin), 32 MB                         = Ok

C:\Hydra Tool\Backup\QUALBackup\QUALCOMM\000BF0E100000000_170B7555\Auto_Backup\070723133655
Backup Security Success....

Elapsed Time : 00:00:14





- Factory Reset Safeformat
Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                   Qualcomm Service Tool
                    Format/Factory Reset
                        SafeFormat
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

PreOperation Configuration
Brand : VIVO Model : Y11 (1906) Storage : Auto
Loader: 000BF0E100000000_60ba997fef6da9f0_d8fbe714_QUALCOMM_VIVO_wut_peek_8937.fhprg
Port  : Auto

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM3)
SymbolicName :\\?\usb#vid_05c6&pid_9008#8&fc22dd9&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver   :05/29/2019,2.1.3.7

Getting device info. [Connected].Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok
Configuration[FHProt_Auto]......
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type         : eMMC
Block Size in Bytes : 512
Page Size           : 512
Manufacturer ID     : 144
Serial Number       : 13161149
Firmware Version    : 909127728
Product Name        : hB8aP>
Physical Partitions : 3
Total Logical Blocks:
          Drive [0]  61071360[29.121 GB]
          Drive [1]  8192[4 MB]
          Drive [2]  8192[4 MB]

Protocol : Universal
Running : Ok

Reading GPT[3]
          Drive [0] 60 Items
          Drive [1] 0 Items
          Drive [2] 0 Items

--------------- Reading build.prop content ---------------
build.prop
system
build.prop
  ID             : RP1A.200720.012
  SDK            : 30
  Release        : 11
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-US
  Security Patch : 2022-03-01
--------------- end of build.prop content ---------------

Action Result :  Failed

Elapsed Time : 00:00:10





- FRP Lock Remove

Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                     Vivo Service Tool
         Factory Reset Protection(FRP)/Demo Remove
                        Forced Erase
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

PreOperation Configuration
Brand : VIVO Model : Y11 (1906) Storage : Auto
Loader: 000BF0E100000000_60ba997fef6da9f0_d8fbe714_QUALCOMM_VIVO_wut_peek_8937.fhprg
Port  : Auto

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM3)
SymbolicName :\\?\usb#vid_05c6&pid_9008#8&fc22dd9&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver   :05/29/2019,2.1.3.7

Getting device info. [Connected].Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok
Configuration[FHProt_Auto]......
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type         : eMMC
Block Size in Bytes : 512
Page Size           : 512
Manufacturer ID     : 144
Serial Number       : 13161149
Firmware Version    : 909127728
Product Name        : hB8aP>
Physical Partitions : 3
Total Logical Blocks:
          Drive [0]  61071360[29.121 GB]
          Drive [1]  8192[4 MB]
          Drive [2]  8192[4 MB]

Protocol : Universal
Running : Ok

Reading GPT[3]
          Drive [0] 60 Items
          Drive [1] 0 Items
          Drive [2] 0 Items

--------------- Reading build.prop content ---------------
build.prop
system
build.prop
  ID             : RP1A.200720.012
  SDK            : 30
  Release        : 11
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-US
  Security Patch : 2022-03-01
--------------- end of build.prop content ---------------

Rebooting Phone.... Ok

Action Result :  Ok

Elapsed Time : 00:00:08
 

Rashi Hydra Tool

Product Manager
Feb 3, 2021
338
317
Hydra Team
Huawei Y9 prime 2019 (STK-LX3) FRP Lock Remove with Hydra Tool


- Connect phone with test point
-- Select load factory fasboot
--- click execute

Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                    Huawei Service Tool
                        Factory Boot
                   Load Factory Fastboot
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -


Searching for Hisilicon USB1 Port...Found
  FriendlyName    : HUAWEI USB COM 1.0 (COM22)
  Device          : /6&22abd3b3&0&1
  SymbolicName    : \\?\usb#vid_12d1&pid_3609#6&22abd3b3&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 11/06/2015,2.0.7.1
  Service         : HSPL_usbvcom

Openning Port [COM22] Ok
================================
   USB1 To Fastboot....
================================
Sending Loader...
----------------------------
Already In Factory Mode...
----------------------------
> Loader 1 ...Ok
Error : Device not responding..
> Loader 2 ...Ok
> Loader 3 ...Ok
Writing patch....Ok


Searching for Hisilicon USB1 Port...Found
  FriendlyName    : HUAWEI USB COM 1.0 (COM22)
  Device          : /6&22abd3b3&0&1
  SymbolicName    : \\?\usb#vid_12d1&pid_3609#6&22abd3b3&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 11/06/2015,2.0.7.1
  Service         : HSPL_usbvcom

Openning Port [COM22] Ok
Sending Fastboot Loader...
> Loader 1 ...Ok
> Loader 2 ...Ok
> Loader 3 ...Ok
> Loader 4 ...Ok
> Loader 5 ...Ok

Wait few seconds.. phone will reboot in Fastboot Mode

Action Result :  Ok

Elapsed Time : 00:01:10


- Select frp remove factory mode and click execute

Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                    Huawei Service Tool
              Factory Reset Protection/Account
                         Remove FRP
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -


Searching for Hisilicon USB1 Port...Found
  FriendlyName    : HUAWEI USB COM 1.0 (COM22)
  Device          : /6&22abd3b3&0&1
  SymbolicName    : \\?\usb#vid_12d1&pid_3609#6&22abd3b3&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 11/06/2015,2.0.7.1
  Service         : HSPL_usbvcom

Openning Port [COM22] Ok
================================
   Initialize factory Boot
================================
Sending Loader...
> Loader 1 ...Ok
Error : Device not responding..
> Loader 2 ...Ok [FactoryMode]
> Loader 3 ...Ok

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
             Factory Mode Operation....                    
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Removing FRP....

Action Result :  Ok

Elapsed Time : 00:00:08
 

Rashi Hydra Tool

Product Manager
Feb 3, 2021
338
317
Hydra Team
Oppo F7 (CPH1819) Pattern and FRP lock remove with Hydra Tool

- First Keep Press Boot Info
Code:
-------------------------------------------------------
To Enable BROM  Mode :
     Method 1    - Bootkey (Vol + - Power) or any combination
     Method 2    - Enable Preloader to brom(crashing Method)
     Method 3    - Test Point Data0 + ground
To Enable Preloader  Mode :
     Method 1    - Just Insert cable
-------------------------------------------------------

Searching for MTK Device...Found
  MTK Port Type   : Flashmode BROM
  FriendlyName    : MediaTek USB Port_V1632 (COM3)
  Device          : /5&1feb1329&0&1
  SymbolicName    : \\?\usb#vid_0e8d&pid_0003#5&1feb1329&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 01/22/2015,3.0.1504.0
  Service         : wdm_usb

Openning Port [COM3] Ok
Handshaking...Ok
  HwCode          : 0788 {MT6771/MT8385/MT8183/MT8666}
  Hwver           : 0000
  Target config   : E5
  SBC             : 01 (True)
  SLA             : 00 (False)
  DAA             : 04 (True)
  SWJTAG          : 04 (True)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 20 (True)
  MEMWRITE        : 40 (True)
  CMD_C8          : 80 (True)
  Connection      : BROM
  HW Subcode      : 8A00
  HW Subcode      : CA00
  SW Ver          : 0000
  ME_ID           : 4931D2E355C3767A3FFB80537AE81FF6
  SOC_ID          : 18D018C69EFC85B72BCDF892B8847F16A1F36EF476417280F3CB050FE74B31C3

Exploiting Device...
Successfully Exploited..
Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..
Not Found
  Target config   : 00
  SBC             : 00 (False)
  SLA             : 00 (False)
  DAA             : 00 (False)
  SWJTAG          : 00 (False)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 00 (False)
  MEMWRITE        : 00 (False)
  CMD_C8          : 00 (False)
  Connection      : BROM

Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin]
Uploading Stage 1....
Successfully uploaded stage 1, jumping ..
Executing JUMP_DA Address @ 0x00200000
Jumping to 0x00200000 Ok 0xC0
Successfully received DA sync
  ONNECTION_AGENT : brom
  DRAM config needed for : 90014A4843473861
Sending auto preloader from dump...  [preloader_oppo6771_17197.bin]
Sending emi data.. [DRAM setup passed.]
Sending emi data succeeded.
Uploading stage 2...
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
  ERAM Size       : 0x0000000000039000-228 KB
  IRAM Size       : 0x0000000100000000-4 GB
  EMMC Boot1 Size : 0x0000000000400000-4 MB
  EMMC Boot2 Size : 0x0000000000400000-4 MB
  EMMC RPMB Size  : 0x0000000000400000-4 MB
  EMMC USER Size  : 0x0000000E8F800000-58.242 GB
  EMMC CID        : 90014A484347386134A50BE5507A1511 - HCG8a4
  HW-CODE         : 0x788
  HWSUB-CODE      : 0x8A00
  HW-VERSION      : 0xCA00
  SW-VERSION      : 0x0
  CHIP-EVOLUTION  : 0x0
  DA-VERSION      : 1.0
  Speed           : high-speed
Error:  on sending data: DA hash mismatch
*DA Extensions failed to enable
Reading Partition Table ..
Partition Count : 48
--------------- Reading build.prop content ---------------
  Product        : oppo6771
  ID             : QP1A.190711.020
  SDK            : 29
  Release        : 10
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-US
  Description    : full_oppo6771-user 10 QP1A.190711.020 2021040000 release-keys
  Display ID     : QP1A.190711.020 release-keys
  Security Patch : 2021-04-05
  StorageType    : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------

Elapsed Time : 00:00:32


- Rebulid userdata from ultra power option and click execute

Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                      Service Function
                        Ultra Power
                      Rebuild Userdata
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching for MTK Device...Found
  MTK Port Type   : Flashmode BROM
  FriendlyName    : MediaTek USB Port_V1632 (COM3)
  Device          : /5&1feb1329&0&1
  SymbolicName    : \\?\usb#vid_0e8d&pid_0003#5&1feb1329&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 01/22/2015,3.0.1504.0
  Service         : wdm_usb

Openning Port [COM3] Ok
Reading Partition Table ..
  ERAM Size       : 0x0000000000039000-228 KB
  IRAM Size       : 0x0000000100000000-4 GB
  EMMC Boot1 Size : 0x0000000000400000-4 MB
  EMMC Boot2 Size : 0x0000000000400000-4 MB
  EMMC RPMB Size  : 0x0000000000400000-4 MB
  EMMC USER Size  : 0x0000000E8F800000-58.242 GB
  EMMC CID        : 90014A484347386134A50BE5507A1511 - HCG8a4
  HW-CODE         : 0x788
  HWSUB-CODE      : 0x8A00
  HW-VERSION      : 0xCA00
  SW-VERSION      : 0x0
  CHIP-EVOLUTION  : 0x0
  DA-VERSION      : 1.0
  Speed           : high-speed
Partition Count : 48
--------------- Reading build.prop content ---------------
  Product        : oppo6771
  ID             : QP1A.190711.020
  SDK            : 29
  Release        : 10
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-US
  Description    : full_oppo6771-user 10 QP1A.190711.020 2021040000 release-keys
  Display ID     : QP1A.190711.020 release-keys
  Security Patch : 2021-04-05
  StorageType    : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------
---------------------------
        Ultra Power   
---------------------------
Formatting Userdata :
Operation : MTK_FUDRebuild Ok
Removing FRP :  Ok

Action Result :  Ok

Elapsed Time : 00:00:20
 

Rashi Hydra Tool

Product Manager
Feb 3, 2021
338
317
Hydra Team
Redmi Note 8 (GINKGO) Flashing done with Hydra Tool

Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                  Qualcomm Flashing Function......              
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

PreOperation Configuration
Brand : AUTO Model : AUTO Storage : Auto
Loader: Auto
Port  : Auto

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM26)
SymbolicName :\\?\usb#vid_05c6&pid_9008#6&22abd3b3&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver   :02/05/2018,3.0.0.0

Getting device info. [Connected].....
Serial No.: 0xF6FDD68C
HW_ID     : 0010A0E100720000
MSM ID    : 0x0010A0E1, SM6125-Qualcomm Snapdragon 665/NicobarPkgLAA
MODEL_ID  : 0x0000
OEM_ID    : 0x0072 - XIAOMI
PBL Ver   : 00000000
PK HASH   : 1bebe3863a6781db4b01086063007334de9e5ca14971c7c4f4358ec9d79cda46

Hydra Enable Auto search Firehose..
#Please wait...
#Search by filename filter.....
#Found 24 Compatible Files ..Found match Firehose...

Firehose Loader[0010a0e100720000_1bebe3863a6781db_17741425_xiaomi.fhprg]
--------------------------------------------------
  Header Type    : New
  TargetMSM      :
  Tag            :
  Version        : 6
  Code_size      : 816
  Signature_size : 256
  fhVendor       : XIAOMI
  HW_ID          : 0010A0E100720000
  Vendor         : XIAOMI
  OEM_ID         : 0072
  MODEL_ID       : 0000
  SW_ID          : 00000003
  APP_ID         : 00000000
  pk_hash        : 1bebe3863a6781db4b01086063007334de9e5ca14971c7c4f4358ec9d79cda4692ce5e948c6fd409408f4c919fcadfe3
  OEM_VERSION    : cibuild
  IMAGE_VARIANT  : NicobarPkgLAA
  QC_VERSION     : BOOT.XF.4.0-00149-NICOBARLAZ-1
--------------------------------------------------

SaharaBoot... Ok
Sending ..............................Ok
Connecting to Firehose...
Ping..................... Ok
Configuration[FHProt_Auto].........
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Jul  3 2019 - 22:23:56

*** STORAGE DEVICE INFO ***
Memory Type         : eMMC
Block Size in Bytes : 512
Page Size           : 512
Manufacturer ID     : 19
Serial Number       : 338306707
Firmware Version    : 4
Product Name        : S0J9K9
Physical Partitions : 4
Total Logical Blocks:
          Drive [0]  244285440[116.484 GB]
          Drive [1]  8192[4 MB]
          Drive [2]  8192[4 MB]
          Drive [3]  32768[16 MB]

Protocol : Universal
Running : Ok

Reading GPT[4]
          Drive [0] 88 Items
          Drive [1] 0 Items
          Drive [2] 0 Items
          Drive [3] 0 Items

--------------- Reading build.prop content ---------------
build.prop
system
build.prop
  ID             : RKQ1.201004.002
  SDK            : 30
  Release        : 11
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-GB
  Security Patch : 2022-02-01
--------------- end of build.prop content ---------------

Auto Backup Security partitions...
Reading Security Items....
- modemst1(modemst1.bin), 2 MB                        = Ok
- modemst2(modemst2.bin), 2 MB                        = Ok
- fsg(fsg.bin), 10 MB                                 = Ok
- fsc(fsc.bin), 127.5 KB                              = Ok
- persist(persist.bin), 64 MB                         = Ok

C:\Hydra Tool\Backup\QUALBackup\XIAOMI\0010A0E100720000_F6FDD68C\Auto_Backup\070623191952
Backup Security Success....

Auto Backup Security partitions...
Reading Security Items....
- modemst1(modemst1.bin), 2 MB                        = Ok
- modemst2(modemst2.bin), 2 MB                        = Ok
- fsg(fsg.bin), 10 MB                                 = Ok
- fsc(fsc.bin), 127.5 KB                              = Ok
- persist(persist.bin), 64 MB                         = Ok

C:\Hydra Tool\Backup\QUALBackup\XIAOMI\0010A0E100720000_F6FDD68C\Auto_Backup\070623192039
Backup Security Success....
----------------------------
Flashing Selected Partitions....
- qupfw[0](qupv3fw.elf), 48.058 KB                    = Ok
- qupfwbak[0](qupv3fw.elf), 48.058 KB                 = Ok
- vbmeta[0](vbmeta.img), 4 KB                         = Ok
- vbmetabak[0](vbmeta.img), 4 KB                      = Ok
- xbl_config[0](xbl_config.elf), 48.105 KB            = Ok
- xbl_configbak[0](xbl_config.elf), 48.105 KB         = Ok
- devcfg[0](devcfg.mbn), 41.727 KB                    = Ok
- devcfgbak[0](devcfg.mbn), 41.727 KB                 = Ok
- storsec[0](storsec.mbn), 19.997 KB                  = Ok
- rpm[0](rpm.mbn), 219.59 KB                          = Ok
- rpmbak[0](rpm.mbn), 219.59 KB                       = Ok
- hyp[0](hyp.mbn), 361.133 KB                         = Ok
- hypbak[0](hyp.mbn), 361.133 KB                      = Ok
- keymaster[0](km4.mbn), 232.458 KB                   = Ok
- keymasterbak[0](km4.mbn), 232.458 KB                = Ok
- cmnlib[0](cmnlib.mbn), 385.785 KB                   = Ok
- cmnlib64[0](cmnlib64.mbn), 503.621 KB               = Ok
- cmnlibbak[0](cmnlib.mbn), 385.785 KB                = Ok
- cmnlib64bak[0](cmnlib64.mbn), 503.621 KB            = Ok
- abl[0](abl.elf), 216 KB                             = Ok
- ablbak[0](abl.elf), 216 KB                          = Ok
- bluetooth[0](BTFM.bin), 876 KB                      = Ok
- bluetoothbak[0](BTFM.bin), 876 KB                   = Ok
- misc[0](misc.img), 4 MB                             = Ok
- imagefv[0](imagefv.elf), 20 KB                      = Ok
- imagefvbak[0](imagefv.elf), 20 KB                   = Ok
- uefisecapp[0](uefi_sec.mbn), 125.772 KB             = Ok
- uefisecappbak[0](uefi_sec.mbn), 125.772 KB          = Ok
- xbl[0](xbl.elf), 3.368 MB                           = Ok
- xblbak[0](xbl.elf), 3.368 MB                        = Ok
- tz[0](tz.mbn), 1.914 MB                             = Ok
- tzbak[0](tz.mbn), 1.914 MB                          = Ok
- logfs[0](logfs_ufs_8mb.bin), 16 KB                  = Ok
- metadata[0](metadata.img), 44.074 KB                = Ok
- dtbo[0](dtbo.img), 8 MB                             = Ok
- dtbobak[0](dtbo.img), 8 MB                          = Ok
- dsp[0](dspso.bin), 32 MB                            = Ok
- dspbak[0](dspso.bin), 32 MB                         = Ok
- persist[0](persist.img), 32 MB Skipped
- boot[0](boot.img), 64 MB                            = Ok
- bootbak[0](boot.img), 64 MB                         = Ok
- recovery[0](recovery.img), 64 MB                    = Ok
- modem[0](NON-HLOS.bin), 116.876 MB                  = Ok
- modembak[0](NON-HLOS.bin), 116.876 MB               = Ok
- cache[0](cache.img), 56.121 KB                      = Ok
- cust[0](cust.img), 784.063 MB                       = Ok
- vendor[0](vendor.img), 986.52 MB                    = Ok
- system[0](system.img), 3.821 GB                     = Ok
- userdata[0](userdata.img), 1.318 GB                 = Ok
- PrimaryGPT[0](gpt_main0.bin), 17 KB                 = Ok

Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-34.]                               = Ok
0 [NUM_DISK_SECTORS-34.]                               = Ok
0 [NUM_DISK_SECTORS-34.]                               = Ok
0 [NUM_DISK_SECTORS-34.]                               = Ok
0 [NUM_DISK_SECTORS-1.]                                = Ok
0 [NUM_DISK_SECTORS-1.]                                = Ok
0 [NUM_DISK_SECTORS-33.]                               = Ok
0 [CRC32(2,11264)]                                     = Ok
0 [CRC32(NUM_DISK_SECTORS-33.,11264)]                  = Ok
0 [0]                                                  = Ok
0 [CRC32(1,92)]                                        = Ok
0 [0]                                                  = Ok
0 [CRC32(NUM_DISK_SECTORS-1.,92)]                      = Ok
Operation : Setbootablestoragedrive: Drive 0
Set bootable storage drive 0 Ok

Rebooting Phone.... Ok

Elapsed Time : 00:29:05
 

Rashi Hydra Tool

Product Manager
Feb 3, 2021
338
317
Hydra Team
Xiaomi Redmi 9 (lancelot) FRP Lock Remove with Hydra Tool


- First Keep Press Boot Info
Code:
-------------------------------------------------------
To Enable BROM  Mode :
     Method 1    - Bootkey (Vol + - Power) or any combination
     Method 2    - Enable Preloader to brom(crashing Method)
     Method 3    - Test Point Data0 + ground
To Enable Preloader  Mode :
     Method 1    - Just Insert cable
-------------------------------------------------------

Searching for MTK Device...Found
  MTK Port Type   : Flashmode BROM
  FriendlyName    : MTK USB Port (COM10)
  Device          : /6&2244aa37&0&2
  SymbolicName    : \\?\usb#vid_0e8d&pid_0003#6&2244aa37&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 09/21/2015,1.0
  Service         : usbser

Openning Port [COM10] Ok
Handshaking...Ok
  HwCode          : 0707 {MT6768}
  Hwver           : 0000
  Target config   : E7
  SBC             : 01 (True)
  SLA             : 02 (True)
  DAA             : 04 (True)
  SWJTAG          : 06 (True)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 20 (True)
  MEMWRITE        : 40 (True)
  CMD_C8          : 80 (True)
  Connection      : BROM
  HW Subcode      : 8A00
  HW Subcode      : CA00
  SW Ver          : 0000
  ME_ID           : D8523B325DBB2AEFC9B3F3C3F128B390
  SOC_ID          : F8ECAD6080EE8DCBF36D0D70E68C0CA0FF9C7578A3BA17E5F5287DB3FCEE2F08

Exploiting Device...
Successfully Exploited..
Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..Found @ 0x00200BC4
Starting to dump...
Prel Size : 0x000447A8
Successfully dump preloader..  [C:\Hydra Tool\Boot\PreloaderDump\preloader_lancelot.bin]
  Target config   : 00
  SBC             : 00 (False)
  SLA             : 00 (False)
  DAA             : 00 (False)
  SWJTAG          : 00 (False)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 00 (False)
  MEMWRITE        : 00 (False)
  CMD_C8          : 00 (False)
  Connection      : BROM

Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin]
Uploading Stage 1....
Successfully uploaded stage 1, jumping ..
Executing JUMP_DA Address @ 0x00200000
Jumping to 0x00200000 Ok 0xC0
Successfully received DA sync
  ONNECTION_AGENT : brom
  DRAM config needed for : 90014A6842386150
Sending auto preloader from dump...  [preloader_lancelot.bin]
Sending emi data.. [DRAM setup passed.]
Sending emi data succeeded.
Uploading stage 2...
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
  ERAM Size       : 0x0000000000070000-448 KB
  IRAM Size       : 0x0000000100000000-4 GB
  EMMC Boot1 Size : 0x0000000000400000-4 MB
  EMMC Boot2 Size : 0x0000000000400000-4 MB
  EMMC RPMB Size  : 0x0000000001000000-16 MB
  EMMC USER Size  : 0x0000000747C00000-29,121 GB
  EMMC CID        : 90014A68423861503E03004C26E89793 - hB8aP>
  HW-CODE         : 0x707
  HWSUB-CODE      : 0x8A00
  HW-VERSION      : 0xCA00
  SW-VERSION      : 0x0
  CHIP-EVOLUTION  : 0x1
  DA-VERSION      : 1.0
  Speed           : high-speed
Error:  on sending data: DA hash mismatch
*DA Extensions failed to enable
Reading Partition Table ..
Partition Count : 50
--------------- Reading build.prop content ---------------
  Product        : lancelot
  Marketname   : ro.product.systemRedmi 9
  ID             : RP1A.200720.011
  SDK            : 30
  Release        : 11
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-GB
  Description    : lancelot-user 11 RP1A.200720.011 V12.5.6.0.RJCMIXM release-keys
  Display ID     : RP1A.200720.011
  Security Patch : 2022-06-01
  StorageType    : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
IMEI1 : 86832*********
IMEI2 : 86832*********
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------

Elapsed Time : 00:00:17




- Select FRP Lock Remove and click Execute
Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                      Service Function
               Factory Reset Protection[FRP]
                            Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching for MTK Device...Found
  MTK Port Type   : Flashmode BROM
  FriendlyName    : MTK USB Port (COM10)
  Device          : /6&2244aa37&0&2
  SymbolicName    : \\?\usb#vid_0e8d&pid_0003#6&2244aa37&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 09/21/2015,1.0
  Service         : usbser

Openning Port [COM10] Ok
Reading Partition Table ..
  ERAM Size       : 0x0000000000070000-448 KB
  IRAM Size       : 0x0000000100000000-4 GB
  EMMC Boot1 Size : 0x0000000000400000-4 MB
  EMMC Boot2 Size : 0x0000000000400000-4 MB
  EMMC RPMB Size  : 0x0000000001000000-16 MB
  EMMC USER Size  : 0x0000000747C00000-29,121 GB
  EMMC CID        : 90014A68423861503E03004C26E89793 - hB8aP>
  HW-CODE         : 0x707
  HWSUB-CODE      : 0x8A00
  HW-VERSION      : 0xCA00
  SW-VERSION      : 0x0
  CHIP-EVOLUTION  : 0x1
  DA-VERSION      : 1.0
  Speed           : high-speed
Partition Count : 50
--------------- Reading build.prop content ---------------
  Product        : lancelot
  Marketname   : ro.product.systemRedmi 9
  ID             : RP1A.200720.011
  SDK            : 30
  Release        : 11
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-GB
  Description    : lancelot-user 11 RP1A.200720.011 V12.5.6.0.RJCMIXM release-keys
  Display ID     : RP1A.200720.011
  Security Patch : 2022-06-01
  StorageType    : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
IMEI1 : 8683***********
IMEI2 : 8683***********
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------

Action Result :  Ok

Elapsed Time : 00:00:06

 

Rashi Hydra Tool

Product Manager
Feb 3, 2021
338
317
Hydra Team
Xiaomi Redmi 10 (selene) Imei Repair with Hydra Tool

- First Keep Press Boot/info
- Never disconnect phone
- And repair phone



Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                ***IMEI REPAIR FUNCTION****
                        Xiaomi Dual
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching for MTK Device...Found
  MTK Port Type   : Flashmode BROM
  FriendlyName    : MediaTek USB Port (COM33)
  Device          : /5&3b36a593&0&2
  SymbolicName    : \\?\usb#vid_0e8d&pid_0003#5&3b36a593&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 01/22/2016,3.2
  Service         : wdm_usb

Openning Port [COM33] Ok
Handshaking...Ok
  HwCode          : 0707 {MT6768}
  Hwver           : 0000
  Target config   : E7
  SBC             : 01 (True)
  SLA             : 02 (True)
  DAA             : 04 (True)
  SWJTAG          : 06 (True)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 20 (True)
  MEMWRITE        : 40 (True)
  CMD_C8          : 80 (True)
  Connection      : BROM
  HW Subcode      : 8A00
  HW Subcode      : CA00
  SW Ver          : 0000
  ME_ID           : 4C2E81273B57F886DB645E448217A9B6
  SOC_ID          : 65BC794D143596DBDB9D64CED82005CA59F8945B82F4D7CA99CDF323B03A4C3A

Exploiting Device...
Successfully Exploited..
Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..Found @ 0x00200BC4
Starting to dump...
Prel Size : 0x00049E00
Successfully dump preloader..  [C:\Hydra Tool\Boot\PreloaderDump\preloader_selene.bin]
  Target config   : 00
  SBC             : 00 (False)
  SLA             : 00 (False)
  DAA             : 00 (False)
  SWJTAG          : 00 (False)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 00 (False)
  MEMWRITE        : 00 (False)
  CMD_C8          : 00 (False)
  Connection      : BROM

Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin]
Uploading Stage 1....
Successfully uploaded stage 1, jumping ..
Executing JUMP_DA Address @ 0x00200000
Jumping to 0x00200000 Ok 0xC0
Successfully received DA sync
  ONNECTION_AGENT : brom
  DRAM config needed for : 9B01005932503132
Sending auto preloader from dump...  [preloader_selene.bin]
Sending emi data.. [DRAM setup passed.]
Sending emi data succeeded.
Uploading stage 2...
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
  ERAM Size       : 0x0000000000070000-448 KB
  IRAM Size       : 0x0000000100000000-4 GB
  EMMC Boot1 Size : 0x0000000000400000-4 MB
  EMMC Boot2 Size : 0x0000000000400000-4 MB
  EMMC RPMB Size  : 0x0000000001000000-16 MB
  EMMC USER Size  : 0x0000001D1EC00000-116.48 GB
  EMMC CID        : 9B0100593250313238009884234B1961 - Y2P128
  HW-CODE         : 0x707
  HWSUB-CODE      : 0x8A00
  HW-VERSION      : 0xCA00
  SW-VERSION      : 0x0
  CHIP-EVOLUTION  : 0x1
  DA-VERSION      : 1.0
  Speed           : high-speed
Error:  on sending data: DA hash mismatch
*DA Extensions failed to enable
Reading Partition Table ..
Partition Count : 57
--------------- Reading build.prop content ---------------
  Product        : selene
  Marketname   : ro.product.systemRedmi 10
  ID             : RP1A.200720.011
  SDK            : 30
  Release        : 11
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-GB
  Description    : selene-user 11 RP1A.200720.011 V12.5.14.0.RKUMIXM release-keys
  Display ID     : AL5186-selene-build-20211220221424
  Security Patch : 2021-12-01
  StorageType    : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
IMEI1 : 862440051496003
IMEI2 : 862440051496011
-------------------------------
Bootloader Status...
  Bootloader : Unlocked
-------------------------------
Backing up Security..
- preloader(preloader.bin), 512 KB                    = Ok  [preloader_selene.bin]
  *Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0707_4C2Ekjk3B57F886DB645E448217A9B6\Auto\0707266121227\6768_Android_scatter.txt
- pgpt(pgpt.bin), 32 KB                               = Ok
- nvram(nvram.bin), 64 MB                             = Ok
- nvdata(nvdata.bin), 64 MB                           = Ok
- frp(frp.bin), 1024 KB                               = Ok
- protect1(protect1.bin), 8 MB                        = Ok
- protect2(protect2.bin), 9.367 MB                    = Ok
- persist(persist.bin), 48 MB                         = Ok
- proinfo(proinfo.bin), 3 MB                          = Ok
- nvcfg(nvcfg.bin), 32 MB                             = Ok
- sec1(sec1.bin), 2 MB                                = Ok
- seccfg(seccfg.bin), 8 MB                            = Ok
Backup Done!!!

Xiaomi Flashmode Dual IMEI Repair
Backing up Security..
- nvram Ok
- nvdata Ok
- vbmeta_a Ok
- vbmeta_b Ok
- proinfo Ok
Step 1 Ok
Step 2 Ok
Step 3 Ok
Step 4 Ok
Operation Done!!!!

Reading IMEI........
IMEI1 : 86132**********
IMEI2 : 86244**********

Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!

Action Result :  Ok

Elapsed Time : 00:01:45

 

Rashi Hydra Tool

Product Manager
Feb 3, 2021
338
317
Hydra Team
Oppo A5s (CPH1909) Pattern and FRP Lock Remoev with Hydra Tool


- Keep Press Boot/info

Code:
-------------------------------------------------------
To Enable BROM  Mode :
     Method 1    - Bootkey (Vol + - Power) or any combination
     Method 2    - Enable Preloader to brom(crashing Method)
     Method 3    - Test Point Data0 + ground
To Enable Preloader  Mode :
     Method 1    - Just Insert cable
-------------------------------------------------------

Searching for MTK Device...Found
  MTK Port Type   : Flashmode BROM
  FriendlyName    : MediaTek USB Port_V1632 (COM67)
  Device          : /6&944c330&0&4
  SymbolicName    : \\?\usb#vid_0e8d&pid_0003#6&944c330&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 01/22/2015,3.0.1504.0
  Service         : wdm_usb

Openning Port [COM67] Ok
Handshaking...Ok
  HwCode          : 0766 {MT6765/MT8768t}
  Hwver           : 0000
  Target config   : E5
  SBC             : 01 (True)
  SLA             : 00 (False)
  DAA             : 04 (True)
  SWJTAG          : 04 (True)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 20 (True)
  MEMWRITE        : 40 (True)
  CMD_C8          : 80 (True)
  Connection      : BROM
  HW Subcode      : 8A00
  HW Subcode      : CA00
  SW Ver          : 0000
  ME_ID           : A2C02D16F7079293DB1045CAF0F374CB
  SOC_ID          : 1EF1BDB2D26A5DD33EE966DCC5CAB4BB864BE8BD9EC42DBC6C5BE63E77F81985
Device not yet filterd...
Executing LibUSB Filter..
Device Now Filtered...Restarting Device Port..

Openning Port [COM67] Ok

Exploiting Device...
Successfully Exploited..
Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..Found @ 0x00200BC4
Starting to dump...
Prel Size : 0x0003A958
Successfully dump preloader..  [C:\Hydra Tool\Boot\PreloaderDump\preloader_oppo6765_18511.bin]
  Target config   : 00
  SBC             : 00 (False)
  SLA             : 00 (False)
  DAA             : 00 (False)
  SWJTAG          : 00 (False)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 00 (False)
  MEMWRITE        : 00 (False)
  CMD_C8          : 00 (False)
  Connection      : BROM

Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin]
Patching da2 ... Ok
Uploading Stage 1....
Successfully uploaded stage 1, jumping ..
Executing JUMP_DA Address @ 0x00200000
Jumping to 0x00200000 Ok 0xC0
Successfully received DA sync
  ONNECTION_AGENT : brom
  DRAM config needed for : 150100514436334D
Sending auto preloader from dump...  [preloader_oppo6765_18511.bin]
Sending emi data.. [DRAM setup passed.]
Sending emi data succeeded.
Uploading stage 2...
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
  ERAM Size       : 0x000000000003A000-232 KB
  IRAM Size       : 0x0000000080000000-2 GB
  EMMC Boot1 Size : 0x0000000000400000-4 MB
  EMMC Boot2 Size : 0x0000000000400000-4 MB
  EMMC RPMB Size  : 0x0000000001000000-16 MB
  EMMC USER Size  : 0x0000000747C00000-29.121 GB
  EMMC CID        : 150100514436334D4203A9E3E40D26B3 - QD63MB
  HW-CODE         : 0x766
  HWSUB-CODE      : 0x8A00
  HW-VERSION      : 0xCA00
  SW-VERSION      : 0x0
  CHIP-EVOLUTION  : 0x0
  DA-VERSION      : 1.0
  Speed           : high-speed
Upload data was accepted. Jumping to stage 2...
DA Extensions successfully added
Reading Partition Table ..
Partition Count : 42
--------------- Reading build.prop content ---------------
  Vendor         : OPPO
  Manufacturer   : OPPO
  ID             : O11019
  SDK            : 27
  Release        : 8.1.0
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-US
  Description    : full_oppo6765_18511-user 8.1.0 O11019 1616154336 release-keys
  Security Patch : 2021-04-05
  StorageType    : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------

Elapsed Time : 00:00:57


- Seleect Ultrapower Option (safeformat) click Execute


Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                      Service Function
                        Ultra Power
                        Safe Format
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching for MTK Device...Found
  MTK Port Type   : Flashmode BROM
  FriendlyName    : MediaTek USB Port_V1632 (COM67)
  Device          : /6&944c330&0&4
  SymbolicName    : \\?\usb#vid_0e8d&pid_0003#6&944c330&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 01/22/2015,3.0.1504.0
  Service         : wdm_usb

Openning Port [COM67] Ok
Reading Partition Table ..
  ERAM Size       : 0x000000000003A000-232 KB
  IRAM Size       : 0x0000000080000000-2 GB
  EMMC Boot1 Size : 0x0000000000400000-4 MB
  EMMC Boot2 Size : 0x0000000000400000-4 MB
  EMMC RPMB Size  : 0x0000000001000000-16 MB
  EMMC USER Size  : 0x0000000747C00000-29.121 GB
  EMMC CID        : 150100514436334D4203A9E3E40D26B3 - QD63MB
  HW-CODE         : 0x766
  HWSUB-CODE      : 0x8A00
  HW-VERSION      : 0xCA00
  SW-VERSION      : 0x0
  CHIP-EVOLUTION  : 0x0
  DA-VERSION      : 1.0
  Speed           : high-speed
Partition Count : 42
--------------- Reading build.prop content ---------------
  Vendor         : OPPO
  Manufacturer   : OPPO
  ID             : O11019
  SDK            : 27
  Release        : 8.1.0
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-US
  Description    : full_oppo6765_18511-user 8.1.0 O11019 1616154336 release-keys
  Security Patch : 2021-04-05
  StorageType    : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------
---------------------------
        Ultra Power   
---------------------------
Formatting Userdata :
Operation : Safeformat Universal... Ok
Removing FRP :  Ok

Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!

Action Result :  Ok

Elapsed Time : 00:00:14
 

Rashi Hydra Tool

Product Manager
Feb 3, 2021
338
317
Hydra Team
Realme C21 (RMX3201) Pattern and Frp lock remove with Hydra Tool


- First Keep press boot info
Code:
-------------------------------------------------------
To Enable BROM  Mode :
     Method 1    - Bootkey (Vol + - Power) or any combination
     Method 2    - Enable Preloader to brom(crashing Method)
     Method 3    - Test Point Data0 + ground
To Enable Preloader  Mode :
     Method 1    - Just Insert cable
-------------------------------------------------------

Searching for MTK Device...Found
  MTK Port Type   : Flashmode BROM
  FriendlyName    : MediaTek USB Port_V1633 (COM5)
  Device          : /6&37369825&0&5
  SymbolicName    : \\?\usb#vid_0e8d&pid_0003#6&37369825&0&5#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 01/22/2015,3.0.1504.0
  Service         : wdm_usb

Openning Port [COM5] Ok
Handshaking...Ok
  HwCode          : 0766 {MT6765/MT8768t}
  Hwver           : 0000
  Target config   : E5
  SBC             : 01 (True)
  SLA             : 00 (False)
  DAA             : 04 (True)
  SWJTAG          : 04 (True)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 20 (True)
  MEMWRITE        : 40 (True)
  CMD_C8          : 80 (True)
  Connection      : BROM
  HW Subcode      : 8A00
  HW Subcode      : CA00
  SW Ver          : 0000
  ME_ID           : 63B2A2AF939D395A4FE375796CB786C9
  SOC_ID          : 76D01D9D8EA88E875B003A5910E5ED9D67EFF5C3C5A602E3DCC283AD4FAE3F39

Exploiting Device...
Successfully Exploited..
Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..Found @ 0x00200BC4
Starting to dump...
Prel Size : 0x0003F03C
Successfully dump preloader..  [C:\Hydra Tool\Boot\PreloaderDump\preloader_oppo6765.bin]
  Target config   : 00
  SBC             : 00 (False)
  SLA             : 00 (False)
  DAA             : 00 (False)
  SWJTAG          : 00 (False)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 00 (False)
  MEMWRITE        : 00 (False)
  CMD_C8          : 00 (False)
  Connection      : BROM

Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin]
Patching da2 ... Ok
Uploading Stage 1....
Successfully uploaded stage 1, jumping ..
Executing JUMP_DA Address @ 0x00200000
Jumping to 0x00200000 Ok 0xC0
Successfully received DA sync
  ONNECTION_AGENT : brom
  DRAM config needed for : 150100445036384D
Sending auto preloader from dump...  [preloader_oppo6765.bin]
Sending emi data.. [DRAM setup passed.]
Sending emi data succeeded.
Uploading stage 2...
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
  ERAM Size       : 0x000000000003A000-232 KB
  IRAM Size       : 0x00000000C0000000-3 GB
  EMMC Boot1 Size : 0x0000000000400000-4 MB
  EMMC Boot2 Size : 0x0000000000400000-4 MB
  EMMC RPMB Size  : 0x0000000001000000-16 MB
  EMMC USER Size  : 0x0000000E8F800000-58.242 GB
  EMMC CID        : 150100445036384D4202A6AD907177A7 - DP68MB
  HW-CODE         : 0x766
  HWSUB-CODE      : 0x8A00
  HW-VERSION      : 0xCA00
  SW-VERSION      : 0x0
  CHIP-EVOLUTION  : 0x0
  DA-VERSION      : 1.0
  Speed           : high-speed
Upload data was accepted. Jumping to stage 2...
DA Extensions successfully added
Reading Partition Table ..
Partition Count : 49
--------------- Reading build.prop content ---------------
  Product        : oplus_mssi_64_cn
  ID             : RP1A.200720.011
  SDK            : 30
  Release        : 11
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-US
  Description    : sys_oplus_mssi_64_cn-user 11 RP1A.200720.011 1609743540423 release-keys
  Display ID     : RP1A.200720.011 release-keys
  Security Patch : 2022-07-05
  StorageType    : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------
Backing up Security..
- preloader(preloader.bin), 512 KB                    = Ok  [preloader_oppo6765.bin]
  *Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0766_63B2sddD395A4FE375796CB786C9\Auto\070744221446\6765_Android_scatter.txt
- pgpt(pgpt.bin), 32 KB                               = Ok
- nvram(nvram.bin), 64 MB                             = Ok
- nvdata(nvdata.bin), 64 MB                           = Ok
- frp(frp.bin), 1024 KB                               = Ok
- protect1(protect1.bin), 8 MB                        = Ok
- protect2(protect2.bin), 15.867 MB                   = Ok
- persist(persist.bin), 48 MB                         = Ok
- proinfo(proinfo.bin), 3 MB                          = Ok
- oppo_custom(oppo_custom.bin), 1024 KB               = Ok
- opporeserve1(opporeserve1.bin), 8 MB                = Ok
- opporeserve2(opporeserve2.bin), 128 MB              = Ok
- nvcfg(nvcfg.bin), 32 MB                             = Ok
- sec1(sec1.bin), 2 MB                                = Ok
- seccfg(seccfg.bin), 8 MB                            = Ok
- lk(lk.bin), 4 MB                                    = Ok
Backup Done!!!

Elapsed Time : 00:01:38




- select Factory reset Auto and click Execute

Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                      Service Function
              Format/Factory Reset/ScreenLock
                            Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching for MTK Device...Found
  MTK Port Type   : Flashmode BROM
  FriendlyName    : MediaTek USB Port_V1633 (COM5)
  Device          : /6&37369825&0&5
  SymbolicName    : \\?\usb#vid_0e8d&pid_0003#6&37369825&0&5#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 01/22/2015,3.0.1504.0
  Service         : wdm_usb

Openning Port [COM5] Ok
Reading Partition Table ..
  ERAM Size       : 0x000000000003A000-232 KB
  IRAM Size       : 0x00000000C0000000-3 GB
  EMMC Boot1 Size : 0x0000000000400000-4 MB
  EMMC Boot2 Size : 0x0000000000400000-4 MB
  EMMC RPMB Size  : 0x0000000001000000-16 MB
  EMMC USER Size  : 0x0000000E8F800000-58.242 GB
  EMMC CID        : 150100445036384D4202A6AD907177A7 - DP68MB
  HW-CODE         : 0x766
  HWSUB-CODE      : 0x8A00
  HW-VERSION      : 0xCA00
  SW-VERSION      : 0x0
  CHIP-EVOLUTION  : 0x0
  DA-VERSION      : 1.0
  Speed           : high-speed
Partition Count : 49
--------------- Reading build.prop content ---------------
  Product        : oplus_mssi_64_cn
  ID             : RP1A.200720.011
  SDK            : 30
  Release        : 11
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-US
  Description    : sys_oplus_mssi_64_cn-user 11 RP1A.200720.011 1609743540423 release-keys
  Display ID     : RP1A.200720.011 release-keys
  Security Patch : 2022-07-05
  StorageType    : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------
------------------------------
   Factory Reset Flash Mode.. 
------------------------------
Operation : Safeformat Universal...

Action Result :  Ok

Elapsed Time : 00:00:09



- Select FRP Remove and Click Execute

Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                      Service Function
               Factory Reset Protection[FRP]
                            Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching for MTK Device...Found
  MTK Port Type   : Flashmode BROM
  FriendlyName    : MediaTek USB Port_V1633 (COM5)
  Device          : /6&37369825&0&5
  SymbolicName    : \\?\usb#vid_0e8d&pid_0003#6&37369825&0&5#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 01/22/2015,3.0.1504.0
  Service         : wdm_usb

Openning Port [COM5] Ok
Reading Partition Table ..
  ERAM Size       : 0x000000000003A000-232 KB
  IRAM Size       : 0x00000000C0000000-3 GB
  EMMC Boot1 Size : 0x0000000000400000-4 MB
  EMMC Boot2 Size : 0x0000000000400000-4 MB
  EMMC RPMB Size  : 0x0000000001000000-16 MB
  EMMC USER Size  : 0x0000000E8F800000-58.242 GB
  EMMC CID        : 150100445036384D4202A6AD907177A7 - DP68MB
  HW-CODE         : 0x766
  HWSUB-CODE      : 0x8A00
  HW-VERSION      : 0xCA00
  SW-VERSION      : 0x0
  CHIP-EVOLUTION  : 0x0
  DA-VERSION      : 1.0
  Speed           : high-speed
Partition Count : 49
--------------- Reading build.prop content ---------------
  Product        : oplus_mssi_64_cn
  ID             : RP1A.200720.011
  SDK            : 30
  Release        : 11
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-US
  Description    : sys_oplus_mssi_64_cn-user 11 RP1A.200720.011 1609743540423 release-keys
  Display ID     : RP1A.200720.011 release-keys
  Security Patch : 2022-07-05
  StorageType    : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------

Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!

Action Result :  Ok

Elapsed Time : 00:00:10
 

Rashi Hydra Tool

Product Manager
Feb 3, 2021
338
317
Hydra Team
Redmi Note 6 Pro (Tulip) Flashign done with Hydra Tool

Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                  Qualcomm Flashing Function......              
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

PreOperation Configuration
Brand : XIAOMI Model : Redmi Note 6 Pro (tulip) Storage : Auto
Loader: 0008C0E100010000_a7b8b82545a98eca_28f4dc3c_GENERIC_XIAOMI_auth.fhprg
Port  : Auto

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM5)
SymbolicName :\\?\usb#vid_05c6&pid_9008#5&eb20011&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver   :08/02/2017,2.1.2.7

Getting device info. [Connected].....
Serial No.: 0x0B0982A4
HW_ID     : 000CC0E100000000
MSM ID    : 0x000CC0E1,
MODEL_ID  : 0x0000
OEM_ID    : 0x0000 - QUALCOMM
PBL Ver   : 00000000
PK HASH   : a7b8b82545a98eca23d6e9105fb464568d1b5828264903441bdef0cd57e3c370

Firehose Loader[0008C0E100010000_a7b8b82545a98eca_28f4dc3c_GENERIC_XIAOMI_auth.fhprg]
--------------------------------------------------
  Header Type    : OLD
  TargetMSM      :
  Tag            : _auth
  Version        : 5
  Code_size      : 416
  Signature_size : 256
  fhVendor       : XIAOMI
  HW_ID          : 3006000000010000
  Vendor         : GENERIC
  OEM_ID         : 0001
  MODEL_ID       : 0000
  SW_ID          : 000000000000000B
  APP_ID         :
  pk_hash        : a7b8b82545a98eca23d6e9105fb464568d1b5828264903441bdef0cd57e3c370
  OEM_VERSION    : c3-bsp-builder-job001.bj
  IMAGE_VARIANT  : Sdm660LA
  QC_VERSION     : BOOT.XF.1.4-00255-S660LZB-1
--------------------------------------------------

SaharaBoot... Ok
Sending ...............................Ok
Connecting to Firehose...
Ping...... Ok
Configuration[FHProt_Auto]......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : MSM8996
Version : 1
DateTime : Aug  2 2018 - 22:27:53

*** STORAGE DEVICE INFO ***
Memory Type         : eMMC
Block Size in Bytes : 512
Page Size           : 512
Manufacturer ID     : 21
Serial Number       : 3879411748
Firmware Version    : 2
Product Name        : 3V6CMB
Physical Partitions : 4
Total Logical Blocks:
          Drive [0]  244277248[116.48 GB]
          Drive [1]  8192[4 MB]
          Drive [2]  8192[4 MB]
          Drive [3]  8192[4 MB]

Protocol : Universal
Running : Ok

Reading GPT[4]
          Drive [0] 64 Items
          Drive [1] 0 Items
          Drive [2] 0 Items
          Drive [3] 0 Items

--------------- Reading build.prop content ---------------
build.prop
  Brand          : xiaomi
  Model          : Redmi Note 6 Pro
  Product        : tulip
  ID             : PKQ1.180904.001
  SDK            : 28
  Release        : 9
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-GB
  Description    : tulip-user 9 PKQ1.180904.001 V12.0.1.0.PEKMIXM release-keys
  Device         : tulip
  Display ID     : PKQ1.180904.001
  Security Patch : 2020-11-05
  Fingerprint    : xiaomi/tulip/tulip:9/PKQ1.180904.001/V12.0.1.0.PEKMIXM:user/release-keys
--------------- end of build.prop content ---------------

Auto Backup Security partitions...
Reading Security Items....
- modemst1(modemst1.bin), 8 MB                        = Ok
- modemst2(modemst2.bin), 8 MB                        = Ok
- fsg(fsg.bin), 8 MB                                  = Ok
- fsc(fsc.bin), 7.5 KB                                = Ok
- persist(persist.bin), 32 MB                         = Ok

C:\Hydra Tool\Backup\QUALBackup\QUALCOMM\000CC0E100000000_0B0982A4\Auto_Backup\070723134931
Backup Security Success....

Auto Backup Security partitions...
Reading Security Items....
- modemst1(modemst1.bin), 8 MB                        = Ok
- modemst2(modemst2.bin), 8 MB                        = Ok
- fsg(fsg.bin), 8 MB                                  = Ok
- fsc(fsc.bin), 7.5 KB                                = Ok
- persist(persist.bin), 32 MB                         = Ok

C:\Hydra Tool\Backup\QUALBackup\QUALCOMM\000CC0E100000000_0B0982A4\Auto_Backup\070723134938
Backup Security Success....
----------------------------
Flashing Selected Partitions....
- storsec[0](storsec.mbn), 48.016 KB                  = Ok
- storsecbak[0](storsec.mbn), 48.016 KB               = Ok
- rpm[0](rpm.mbn), 219.539 KB                         = Ok
- rpmbak[0](rpm.mbn), 219.539 KB                      = Ok
- hyp[0](hyp.mbn), 272 KB                             = Ok
- hypbak[0](hyp.mbn), 272 KB                          = Ok
- pmic[0](pmic.elf), 38.82 KB                         = Ok
- pmicbak[0](pmic.elf), 38.82 KB                      = Ok
- cmnlib[0](cmnlib.mbn), 216.977 KB                   = Ok
- cmnlibbak[0](cmnlib.mbn), 216.977 KB                = Ok
- cmnlib64[0](cmnlib64.mbn), 267.68 KB                = Ok
- cmnlib64bak[0](cmnlib64.mbn), 267.68 KB             = Ok
- abl[0](abl.elf), 148 KB                             = Ok
- ablbak[0](abl.elf), 148 KB                          = Ok
- devcfgbak[0](devcfg.mbn), 47.918 KB                 = Ok
- devcfg[0](devcfg.mbn), 47.918 KB                    = Ok
- tz[0](tz.mbn), 1.879 MB                             = Ok
- tzbak[0](tz.mbn), 1.879 MB                          = Ok
- mdtpsecapp[0](mdtpsecapp.mbn), 1.029 MB             = Ok
- mdtpsecappbak[0](mdtpsecapp.mbn), 1.029 MB          = Ok
- keymaster[0](keymaster64.mbn), 304.477 KB           = Ok
- keymasterbak[0](keymaster64.mbn), 304.477 KB        = Ok
- bluetooth[0](BTFM.bin), 556 KB                      = Ok
- xbl[0](xbl.elf), 2.446 MB                           = Ok
- xblbak[0](xbl.elf), 2.446 MB                        = Ok
- misc[0](misc.img), 8 KB                             = Ok
- dsp[0](dspso.bin), 16 MB                            = Ok
- mdtp[0](mdtp.img), 16.983 MB                        = Ok
- splash[0](splash.img), 26.713 MB                    = Ok
- persist[0](persist.img), 32 MB Skipped
- modem[0](NON-HLOS.bin), 105.705 MB                  = Ok
- boot[0](boot.img), 25.236 MB                        = Ok
- recovery[0](recovery.img), 31.111 MB                = Ok
- cache[0](cache.img), 128.145 KB                     = Ok
- system[0](system.img), 2.851 GB                     = Ok
- vendor[0](vendor.img), 1.059 GB                     = Ok
- cust[0](cust.img), 172.879 MB                       = Ok
- userdata[0](userdata.img), 149.071 MB               = Ok
- PrimaryGPT[0](gpt_main0.bin), 17 KB                 = Ok

Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-34.]                               = Ok
0 [NUM_DISK_SECTORS-34.]                               = Ok
0 [NUM_DISK_SECTORS-34.]                               = Ok
0 [NUM_DISK_SECTORS-34.]                               = Ok
0 [NUM_DISK_SECTORS-1.]                                = Ok
0 [NUM_DISK_SECTORS-1.]                                = Ok
0 [NUM_DISK_SECTORS-33.]                               = Ok
0 [CRC32(2,8192)]                                      = Ok
0 [CRC32(NUM_DISK_SECTORS-33.,8192)]                   = Ok
0 [0]                                                  = Ok
0 [CRC32(1,92)]                                        = Ok
0 [0]                                                  = Ok
0 [CRC32(NUM_DISK_SECTORS-1.,92)]                      = Ok
Operation : Setbootablestoragedrive: Drive 0
Set bootable storage drive 0 Ok

Rebooting Phone.... Ok

Elapsed Time : 00:04:36

 
Top