★★★ Post All Successfully Repaired Phones By Hydra Tool ★★★

Rashi Hydra Tool

Product Manager
Feb 3, 2021
338
317
Hydra Team
Vivo Y53 (PD1628F) Pattern lock Remove with Hdyra Tool


- First Keep press Boot/info
Code:
PreOperation Configuration
Brand : VIVO Model : Y53 (PD1628F) Storage : Auto
Loader: 000560E100000000_60ba997fef6da9f0_203cb924_QUALCOMM_VIVO_peek_8917.fhprg
Port  : Auto

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM6)
SymbolicName :\\?\usb#vid_05c6&pid_9008#5&7f9be32&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver   :05/29/2019,2.1.3.7

Getting device info. [Connected].....
Serial No.: 0xE90B8FBC
HW_ID     : 000560E100000000
MSM ID    : 0x000560E1, MSM8917-Qualcomm Snapdragon 425/LAADANAZA
MODEL_ID  : 0x0000
OEM_ID    : 0x0000 - QUALCOMM
PBL Ver   : 00000000
PK HASH   : 60ba997fef6da9f05885fa11f1dd6d2a90d052a257a09c2075d7246cc73c0d43

Firehose Loader[000560E100000000_60ba997fef6da9f0_203cb924_QUALCOMM_VIVO_peek_8917.fhprg]
--------------------------------------------------
  Header Type    : OLD
  TargetMSM      : 8917
  Tag            : _peek
  Version        : 3
  Code_size      : 288
  Signature_size : 256
  fhVendor       : VIVO
  HW_ID          : 000560E100000000
  Vendor         : QUALCOMM
  OEM_ID         : 0000
  MODEL_ID       : 0000
  SW_ID          : 0000000000000003
  APP_ID         :
  pk_hash        : 60ba997fef6da9f05885fa11f1dd6d2a90d052a257a09c2075d7246cc73c0d43
  OEM_VERSION    : compiler026
  IMAGE_VARIANT  : LAADANAZA
  QC_VERSION     : BOOT.BF.3.3-00199
--------------------------------------------------

SaharaBoot... Ok
Sending .................Ok
Connecting to Firehose...
Ping... Ok
Configuration[FHProt_Auto]......
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8917
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type         : eMMC
Block Size in Bytes : 512
Page Size           : 512
Manufacturer ID     : 144
Serial Number       : 3349782770
Firmware Version    : 165
Product Name        : HAG4a2
Physical Partitions : 3
Total Logical Blocks:
          Drive [0]  30777344[14.676 GB]
          Drive [1]  8192[4 MB]
          Drive [2]  8192[4 MB]

Protocol : Universal
Running : Ok

Reading GPT[3]
          Drive [0] 52 Items
          Drive [1] 0 Items
          Drive [2] 0 Items

--------------- Reading build.prop content ---------------
build.prop
  Brand          : vivo
  Vendor         : vivo
  Model          : vivo PD1628F_EX
  Product        : msm8937_32
  Manufacturer   : vivo
  ID             : MMB29M
  SDK            : 23
  Release        : 6.0.1
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Locale         : en-US
  Description    : msm8937_32-user 6.0.1 MMB29M eng.compiler.20190105.211334 release-keys
  Device         : PD1628F_EX
  Display ID     : MMB29M release-keys
  Security Patch : 2018-08-01
  Platform       : msm8937
  Fingerprint    : vivo/PD1628F_EX/PD1628F_EX:6.0.1/MMB29M/compiler01052117:user/release-keys
--------------- end of build.prop content ---------------

Auto Backup Security partitions...
Reading Security Items....
- modemst1(modemst1.bin), 1.5 MB                      = Ok
- modemst2(modemst2.bin), 1.5 MB                      = Ok
- fsg(fsg.bin), 1.5 MB                                = Ok
- fsc(fsc.bin), 512 Bytes                             = Ok
- persist(persist.bin), 32 MB                         = Ok

C:\Hydra Tool\Backup\QUALBackup\QUALCOMM\000560E10400000_E90B8FBC\Auto_Backup\0707233151104
Backup Security Success....

Elapsed Time : 00:00:23







- go to Vivo Tab select force erase and click execute

Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                     Vivo Service Tool
               Factory Reset/Format Userdata
                         Zero Wipe
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

PreOperation Configuration
Brand : VIVO Model : Y53 (PD1628F) Storage : Auto
Loader: 000560E100000000_60ba997fef6da9f0_203cb924_QUALCOMM_VIVO_peek_8917.fhprg
Port  : Auto

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM6)
SymbolicName :\\?\usb#vid_05c6&pid_9008#5&7f9be32&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver   :05/29/2019,2.1.3.7

Getting device info. [Connected].Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok
Configuration[FHProt_Auto]......
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8917
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type         : eMMC
Block Size in Bytes : 512
Page Size           : 512
Manufacturer ID     : 144
Serial Number       : 3349782770
Firmware Version    : 165
Product Name        : HAG4a2
Physical Partitions : 3
Total Logical Blocks:
          Drive [0]  30777344[14.676 GB]
          Drive [1]  8192[4 MB]
          Drive [2]  8192[4 MB]

Protocol : Universal
Running : Ok

Reading GPT[3]
          Drive [0] 52 Items
          Drive [1] 0 Items
          Drive [2] 0 Items

--------------- Reading build.prop content ---------------
build.prop
  Brand          : vivo
  Vendor         : vivo
  Model          : vivo PD1628F_EX
  Product        : msm8937_32
  Manufacturer   : vivo
  ID             : MMB29M
  SDK            : 23
  Release        : 6.0.1
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Locale         : en-US
  Description    : msm8937_32-user 6.0.1 MMB29M eng.compiler.20190105.211334 release-keys
  Device         : PD1628F_EX
  Display ID     : MMB29M release-keys
  Security Patch : 2018-08-01
  Platform       : msm8937
  Fingerprint    : vivo/PD1628F_EX/PD1628F_EX:6.0.1/MMB29M/compiler01052117:user/release-keys
--------------- end of build.prop content ---------------
Processing Forced Erase....

Action Result :  Ok

Elapsed Time : 00:00:10
 

Rashi Hydra Tool

Product Manager
Feb 3, 2021
338
317
Hydra Team
Vivo Y83 Pro (PD1803F) Factory reset phone with metamode by Hydra Tool


- First Phone reboot metamode

Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                  Reboot Function...              
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching for MTK Device...Found
  MTK Port Type   : Flashmode Preloader
  FriendlyName    : MediaTek PreLoader USB VCOM (Android) (COM109)
  Device          : /6&1eb3904a&0&2
  SymbolicName    : \\?\usb#vid_0e8d&pid_2000#6&1eb3904a&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 07/22/2022,3.0.1511.0
  Service         : wdm_usb

Openning Port [COM109] Ok

Rebooting phone
SWITCH TO : META MODE
Done!!!


Elapsed Time : 00:00:40




- Factory reset phone with metamode.

Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                      Service Function
              Format/Factory Reset/ScreenLock
                    Factory Reset UFS 1
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching for MTK Device...Found
  MTK Port Type   : METAMODE Preloader
  FriendlyName    : MediaTek ETS Port (COM41)
  Device          : VID_0E8D&PID_202D&MI_01/7&2c41ee1e&0&0001
  Driver Ver      : 07/22/2022,3.0.1511.0
  Service         : wdm_usb

Openning Port [COM41] Ok

META Phone Info . . .
MCUID: 8U  `    mt6765,S01
ME_SO: S01
DATE :
MODEL:
ME_SWVER: alps-mp-o1.mp6.tc19sp-V2_k62v1.64.bsp_P293


IMEI 1 : 8699***********
IMEI 2 : 8699**********

Action Result :  Ok

Elapsed Time : 00:00:03
 

Rashi Hydra Tool

Product Manager
Feb 3, 2021
338
317
Hydra Team
Infinix S4 Pattern and Frp Lock Remove with Hydra Tool


- First keep press boot info
Code:
-------------------------------------------------------
To Enable BROM  Mode :
     Method 1    - Bootkey (Vol + - Power) or any combination
     Method 2    - Enable Preloader to brom(crashing Method)
     Method 3    - Test Point Data0 + ground
To Enable Preloader  Mode :
     Method 1    - Just Insert cable
-------------------------------------------------------

Searching for MTK Device...Found
  MTK Port Type   : Flashmode BROM
  FriendlyName    : MediaTek USB Port (COM3)
  Device          : /6&1ea7bcf3&0&1
  SymbolicName    : \\?\usb#vid_0e8d&pid_0003#6&1ea7bcf3&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 08/03/2016,3.0.1504.0
  Service         : wdm_usb

Openning Port [COM3] Ok
Handshaking...Ok
  HwCode          : 0717 {MT6761/MT6762/MT3369/MT8766B}
  Hwver           : 0000
  Target config   : E5
  SBC             : 01 (True)
  SLA             : 00 (False)
  DAA             : 04 (True)
  SWJTAG          : 04 (True)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 20 (True)
  MEMWRITE        : 40 (True)
  CMD_C8          : 80 (True)
  Connection      : BROM
  HW Subcode      : 8A00
  HW Subcode      : CA01
  SW Ver          : 0200
  ME_ID           : 52F2714BD57E0F6A64F6CDA9F8826FCA
  SOC_ID          : 6E34F8EAFED2BA6CC6D4484E475862A5EA5042F6685C699C24B145CDCF86C786

Exploiting Device...
Successfully Exploited..
Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..
Not Found
  Target config   : 00
  SBC             : 00 (False)
  SLA             : 00 (False)
  DAA             : 00 (False)
  SWJTAG          : 00 (False)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 00 (False)
  MEMWRITE        : 00 (False)
  CMD_C8          : 00 (False)
  Connection      : BROM

Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin]
Patching da2 ... Ok
Uploading Stage 1....
Successfully uploaded stage 1, jumping ..
Executing JUMP_DA Address @ 0x00200000
Jumping to 0x00200000 Ok 0xC0
Successfully received DA sync
  ONNECTION_AGENT : brom
  DRAM config needed for : D62D004D4D433634
Sending auto preloader from dump...
Hydra Auto Preloader Search Enabled..
Hydra will find compatible preloader files...
Selected File : C:\Users\v_osu\Desktop\preloader_x6515_h6127.bin
Sending EMI Data... [DRAM setup passed.]
Sending emi data succeeded.
Sending emi data succeeded.
Uploading stage 2...
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
  ERAM Size       : 0x000000000003A500-233,25 KB
  IRAM Size       : 0x0000000100000000-4 GB
  EMMC Boot1 Size : 0x0000000000400000-4 MB
  EMMC Boot2 Size : 0x0000000000400000-4 MB
  EMMC RPMB Size  : 0x0000000000400000-4 MB
  EMMC USER Size  : 0x0000000E90280000-58,252 GB
  EMMC CID        : D62D004D4D433634475106BECDA2C995 - MMC64G
  HW-CODE         : 0x717
  HWSUB-CODE      : 0x8A00
  HW-VERSION      : 0xCA01
  SW-VERSION      : 0x200
  CHIP-EVOLUTION  : 0x0
  DA-VERSION      : 1.0
  Speed           : high-speed
Upload data was accepted. Jumping to stage 2...
DA Extensions successfully added
Reading Partition Table ..
Partition Count : 52
--------------- Reading build.prop content ---------------
  Product        : tssi_64_infinix
  ID             : SP1A.210812.016
  SDK            : 31
  Release        : 12
  ABI            : arm64-v8a
  Locale         : en-US
  Description    : sys_tssi_64_infinix-user 12 SP1A.210812.016 329829 release-keys
  Display ID     : INFINIX-S-64-230518V689
  Security Patch : 2023-04-05
  StorageType    : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
IMEI1 : 3522**********
IMEI2 : 3522**********
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------

Elapsed Time : 00:00:45




- Factory reset select and click execute
Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                      Service Function
              Format/Factory Reset/ScreenLock
                            Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching for MTK Device...Found
  MTK Port Type   : Flashmode BROM
  FriendlyName    : MediaTek USB Port (COM3)
  Device          : /6&1ea7bcf3&0&1
  SymbolicName    : \\?\usb#vid_0e8d&pid_0003#6&1ea7bcf3&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 08/03/2016,3.0.1504.0
  Service         : wdm_usb

Openning Port [COM3] Ok
Reading Partition Table ..
  ERAM Size       : 0x000000000003A500-233,25 KB
  IRAM Size       : 0x0000000100000000-4 GB
  EMMC Boot1 Size : 0x0000000000400000-4 MB
  EMMC Boot2 Size : 0x0000000000400000-4 MB
  EMMC RPMB Size  : 0x0000000000400000-4 MB
  EMMC USER Size  : 0x0000000E90280000-58,252 GB
  EMMC CID        : D62D004D4D433634475106BECDA2C995 - MMC64G
  HW-CODE         : 0x717
  HWSUB-CODE      : 0x8A00
  HW-VERSION      : 0xCA01
  SW-VERSION      : 0x200
  CHIP-EVOLUTION  : 0x0
  DA-VERSION      : 1.0
  Speed           : high-speed
Partition Count : 52
--------------- Reading build.prop content ---------------
  Product        : tssi_64_infinix
  ID             : SP1A.210812.016
  SDK            : 31
  Release        : 12
  ABI            : arm64-v8a
  Locale         : en-US
  Description    : sys_tssi_64_infinix-user 12 SP1A.210812.016 329829 release-keys
  Display ID     : INFINIX-S-64-230518V689
  Security Patch : 2023-04-05
  StorageType    : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
IMEI1 : 3522338*********
IMEI2 : 3522338*********
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------
------------------------------
   Factory Reset Flash Mode.. 
------------------------------
Operation : Safeformat Universal...

Action Result :  Ok

Elapsed Time : 00:00:07



- Select FRP Lock Remove and click execute
Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                      Service Function
               Factory Reset Protection[FRP]
                            Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching for MTK Device...Found
  MTK Port Type   : Flashmode BROM
  FriendlyName    : MediaTek USB Port (COM3)
  Device          : /6&1ea7bcf3&0&1
  SymbolicName    : \\?\usb#vid_0e8d&pid_0003#6&1ea7bcf3&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 08/03/2016,3.0.1504.0
  Service         : wdm_usb

Openning Port [COM3] Ok
Reading Partition Table ..
  ERAM Size       : 0x000000000003A500-233,25 KB
  IRAM Size       : 0x0000000100000000-4 GB
  EMMC Boot1 Size : 0x0000000000400000-4 MB
  EMMC Boot2 Size : 0x0000000000400000-4 MB
  EMMC RPMB Size  : 0x0000000000400000-4 MB
  EMMC USER Size  : 0x0000000E90280000-58,252 GB
  EMMC CID        : D62D004D4D433634475106BECDA2C995 - MMC64G
  HW-CODE         : 0x717
  HWSUB-CODE      : 0x8A00
  HW-VERSION      : 0xCA01
  SW-VERSION      : 0x200
  CHIP-EVOLUTION  : 0x0
  DA-VERSION      : 1.0
  Speed           : high-speed
Partition Count : 52
--------------- Reading build.prop content ---------------
  Product        : tssi_64_infinix
  ID             : SP1A.210812.016
  SDK            : 31
  Release        : 12
  ABI            : arm64-v8a
  Locale         : en-US
  Description    : sys_tssi_64_infinix-user 12 SP1A.210812.016 329829 release-keys
  Display ID     : INFINIX-S-64-230518V689
  Security Patch : 2023-04-05
  StorageType    : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
IMEI1 : 3522338********
IMEI2 : 3522338********
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------

Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!

Action Result :  Ok

Elapsed Time : 00:00:08

 

Rashi Hydra Tool

Product Manager
Feb 3, 2021
338
317
Hydra Team
Redmi 5A Pattern and FRP Lock Remove with Hydra Tool


- First Keep press Boot Info
Code:
PreOperation Configuration
Brand : AUTO Model : AUTO Storage : Auto
Loader: Auto
Port  : Auto

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM8)
SymbolicName :\\?\usb#vid_05c6&pid_9008#6&37254210&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver   :05/29/2019,2.1.3.7

Getting device info. [Connected].....
Serial No.: 0x6B35FB63
HW_ID     : 000560E100000000
MSM ID    : 0x000560E1, MSM8917-Qualcomm Snapdragon 425/LAADANAZA
MODEL_ID  : 0x0000
OEM_ID    : 0x0000 - QUALCOMM
PBL Ver   : 00000000
PK HASH   : 57158eaf1814d78fd2b3105ece4db18a817a08ac664a5782a925f3ff8403d39a

Hydra Enable Auto search Firehose..
#Please wait...
#Search by filename filter.....
#Found 42 Compatible Files ..Found match Firehose...

Firehose Loader[000560e100000000_57158eaf1814d78f_01740d29_qualcomm_xiaomi_peek_8917.fhprg]
--------------------------------------------------
  Header Type    : OLD
  TargetMSM      : 8917
  Tag            : _peek
  Version        : 3
  Code_size      : 288
  Signature_size : 256
  fhVendor       : XIAOMI
  HW_ID          : 000560E100000000
  Vendor         : QUALCOMM
  OEM_ID         : 0000
  MODEL_ID       : 0000
  SW_ID          : 0000000000000003
  APP_ID         :
  pk_hash        : 57158eaf1814d78fd2b3105ece4db18a817a08ac664a5782a925f3ff8403d39a
  OEM_VERSION    : c3-miui-ota-bd102.bj
  IMAGE_VARIANT  : LAADANAZA
  QC_VERSION     : BOOT.BF.3.3-00214
--------------------------------------------------

SaharaBoot... Ok
Sending ...................Ok
Connecting to Firehose...
Ping... Ok
Configuration[FHProt_Auto]......
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8917
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type         : eMMC
Block Size in Bytes : 512
Page Size           : 512
Manufacturer ID     : 144
Serial Number       : 817549405
Firmware Version    : 165
Product Name        : HAG4a2
Physical Partitions : 3
Total Logical Blocks:
          Drive [0]  30777344[14.676 GB]
          Drive [1]  8192[4 MB]
          Drive [2]  8192[4 MB]

Protocol : Universal
Running : Ok

Reading GPT[3]
          Drive [0] 52 Items
          Drive [1] 0 Items
          Drive [2] 0 Items

--------------- Reading build.prop content ---------------
build.prop
  Brand          : Xiaomi
  Model          : Redmi 5A
  Product        : riva
  ID             : OPM1.171019.026
  SDK            : 27
  Release        : 8.1.0
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-GB
  Description    : riva-user 8.1.0 OPM1.171019.026 V11.0.2.0.OCKMIXM release-keys
  Device         : riva
  Display ID     : CUSTOMER_VERSION_riva
  Security Patch : 2019-10-01
  Platform       : msm8937
  Fingerprint    : Xiaomi/riva/riva:8.1.0/OPM1.171019.026/V11.0.2.0.OCKMIXM:user/release-keys
--------------- end of build.prop content ---------------

Auto Backup Security partitions...
Reading Security Items....
- modemst1(modemst1.bin), 4 MB                        = Ok
- modemst2(modemst2.bin), 4 MB                        = Ok
- fsg(fsg.bin), 4 MB                                  = Ok
- fsc(fsc.bin), 512 Bytes                             = Ok
- persist(persist.bin), 32 MB                         = Ok

C:\Hydra Tool\Backup\QUALBackup\QUALCOMM\000560E1000900000_6B35FB63\Auto_Backup\070742292836
Backup Security Success....

Elapsed Time : 00:01:21



- Select Factory reset and click execute
Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                   Qualcomm Service Tool
                    Format/Factory Reset
                            Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

PreOperation Configuration
Brand : AUTO Model : AUTO Storage : Auto
Loader: Auto
Port  : Auto

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM8)
SymbolicName :\\?\usb#vid_05c6&pid_9008#6&37254210&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver   :05/29/2019,2.1.3.7

Getting device info. [Connected].Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok
Configuration[FHProt_Auto]......
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8917
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type         : eMMC
Block Size in Bytes : 512
Page Size           : 512
Manufacturer ID     : 144
Serial Number       : 817549405
Firmware Version    : 165
Product Name        : HAG4a2
Physical Partitions : 3
Total Logical Blocks:
          Drive [0]  30777344[14.676 GB]
          Drive [1]  8192[4 MB]
          Drive [2]  8192[4 MB]

Protocol : Universal
Running : Ok

Reading GPT[3]
          Drive [0] 52 Items
          Drive [1] 0 Items
          Drive [2] 0 Items

--------------- Reading build.prop content ---------------
build.prop
  Brand          : Xiaomi
  Model          : Redmi 5A
  Product        : riva
  ID             : OPM1.171019.026
  SDK            : 27
  Release        : 8.1.0
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-GB
  Description    : riva-user 8.1.0 OPM1.171019.026 V11.0.2.0.OCKMIXM release-keys
  Device         : riva
  Display ID     : CUSTOMER_VERSION_riva
  Security Patch : 2019-10-01
  Platform       : msm8937
  Fingerprint    : Xiaomi/riva/riva:8.1.0/OPM1.171019.026/V11.0.2.0.OCKMIXM:user/release-keys
--------------- end of build.prop content ---------------
- Formatting Userdata
Executing ...
- Formatting Userdata  [Safe Format - eMMc] OkOk

Action Result :  Ok

Elapsed Time : 00:00:05




- select Frp lock remove and click execute
Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                   Qualcomm Service Tool
                  Factory Reset Protection
                            Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

PreOperation Configuration
Brand : AUTO Model : AUTO Storage : Auto
Loader: Auto
Port  : Auto

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM8)
SymbolicName :\\?\usb#vid_05c6&pid_9008#6&37254210&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver   :05/29/2019,2.1.3.7

Getting device info. [Connected].Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok
Configuration[FHProt_Auto]......
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8917
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type         : eMMC
Block Size in Bytes : 512
Page Size           : 512
Manufacturer ID     : 144
Serial Number       : 817549405
Firmware Version    : 165
Product Name        : HAG4a2
Physical Partitions : 3
Total Logical Blocks:
          Drive [0]  30777344[14.676 GB]
          Drive [1]  8192[4 MB]
          Drive [2]  8192[4 MB]

Protocol : Universal
Running : Ok

Reading GPT[3]
          Drive [0] 52 Items
          Drive [1] 0 Items
          Drive [2] 0 Items

--------------- Reading build.prop content ---------------
build.prop
  Brand          : Xiaomi
  Model          : Redmi 5A
  Product        : riva
  ID             : OPM1.171019.026
  SDK            : 27
  Release        : 8.1.0
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-GB
  Description    : riva-user 8.1.0 OPM1.171019.026 V11.0.2.0.OCKMIXM release-keys
  Device         : riva
  Display ID     : CUSTOMER_VERSION_riva
  Security Patch : 2019-10-01
  Platform       : msm8937
  Fingerprint    : Xiaomi/riva/riva:8.1.0/OPM1.171019.026/V11.0.2.0.OCKMIXM:user/release-keys
--------------- end of build.prop content ---------------
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOk

Rebooting Phone.... Ok

Action Result :  Ok

Elapsed Time : 00:00:05
 

Rashi Hydra Tool

Product Manager
Feb 3, 2021
338
317
Hydra Team
Samsung A11 (SM-A115M) FRP Lock Remove with Hydra Tool



Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                   Qualcomm Service Tool
                  Factory Reset Protection
                            Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

PreOperation Configuration
Brand : AUTO Model : AUTO Storage : Auto
Loader: Auto
Port  : Auto

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM11)
SymbolicName :\\?\usb#vid_05c6&pid_9008#5&521a615&0&9#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver   :08/02/2017,2.1.2.7

Getting device info. [Connected].....
Serial No.: 0x10DE0D5F
HW_ID     : 0009A0E100200000
MSM ID    : 0x0009A0E1, SDM450-Qualcomm Snapdragon 450/JAADANAZA
MODEL_ID  : 0x0000
OEM_ID    : 0x0020 - SAMSUNG
PBL Ver   : 00000000
PK HASH   : 084e868b048512d828c51a78a9251ece3c48313ff498fa6f18335e9f56c276bd

Hydra Enable Auto search Firehose..
#Please wait...
#Search by filename filter.....
#Found 6 Compatible Files ..Found match Firehose...

Firehose Loader[0009a0e100200000_084e868b048512d8_1082a027_samsung_samsung corporation_8953.fhprg]
--------------------------------------------------
  Header Type    : OLD
  TargetMSM      : 8953
  Tag            :
  Version        : 3
  Code_size      : 320
  Signature_size : 256
  fhVendor       : SAMSUNG CORPORATION
  HW_ID          : 0009A0E100200000
  Vendor         : SAMSUNG
  OEM_ID         : 0020
  MODEL_ID       : 0000
  SW_ID          : 0000000100000003
  APP_ID         :
  pk_hash        : 084e868b048512d828c51a78a9251ece3c48313ff498fa6f18335e9f56c276bd
  OEM_VERSION    : 21HH1D11
  IMAGE_VARIANT  : JAADANAZA
  QC_VERSION     : BOOT.BF.3.3.2-00077
--------------------------------------------------

SaharaBoot... Ok
Sending ......................Ok
Connecting to Firehose...
Ping... Ok
Configuration[FHProt_Auto]......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8953
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type         : eMMC
Block Size in Bytes : 512
Page Size           : 512
Manufacturer ID     : 21
Serial Number       : 143314151
Firmware Version    : 1
Product Name        : GP6BAB
Physical Partitions : 3
Total Logical Blocks:
          Drive [0]  122142720[58,242 GB]
          Drive [1]  8192[4 MB]
          Drive [2]  8192[4 MB]

Protocol : Universal
Running : Ok

Reading GPT[3]
          Drive [0] 128 Items
          Drive [1] 0 Items
          Drive [2] 0 Items

--------------- Reading build.prop content ---------------
build.prop
system
build.prop
  Product        : a11q
  ID             : RP1A.200720.012
  SDK            : 30
  Release        : 11
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Locale         : en-GB
  Description    : a11qub-user 11 RP1A.200720.012 A115MUBU2BVB2 release-keys
  Display ID     : RP1A.200720.012.A115MUBU2BVB2
  Security Patch : 2022-03-01
--------------- end of build.prop content ---------------

Auto Backup Security partitions...
Reading Security Items....
- modemst1(modemst1.bin), 4 MB                        = Ok
- modemst2(modemst2.bin), 4 MB                        = Ok
- fsg(fsg.bin), 10 MB                                 = Ok
- fsc(fsc.bin), 3,25 MB                               = Ok
- persist(persist.bin), 32 MB                         = Ok

C:\Hydra Tool\Backup\QUALBackup\SAMSUNG\0009A0E100200000_10DE0D5F\Auto_Backup\0707231trt3918
Backup Security Success....
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] Ok
- Removing FRP [Zero Wipe] OkOk
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] Ok
- Removing FRP [Zero Wipe] OkOk

Rebooting Phone.... Ok

Action Result :  Ok

Elapsed Time : 00:00:20

 
Last edited:

Rashi Hydra Tool

Product Manager
Feb 3, 2021
338
317
Hydra Team
Tecno Pop 5 LTE FRP Lock Remove with Hydra Tool

Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                  Service Tool Function..
                  Factory Reset Protection
                       Factory Reset
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

****************** PRESS BOOT KEY ******************
VOL + OR VOL - , OR Combination Vol - +
Feature Phone :  Call Button
Please hold boot key until second boot..
*******************************************
Scanning Port....

Openning Port [COM6] Ok
Identifying... [SPRD3]
Sending Config Ok Ok
Spreadtrum Boot Block version 1.1
Sending To phone....
Unisoc Not Secured.... Ok
Successfully booted..Ready to go...

Reading System Info.
Reading IMEI...
BSL_REP_OPERATION_FAILED
BSL_REP_OPERATION_FAILED
BSL_REP_OPERATION_FAILED.
IMEI 1 : 000000000000000
IMEI 2 : 000000000000000
IMEI 3 : 000000000000000
IMEI 4 : 000000000000000
BSL_WRITE_ERROR
BSL_WRITE_ERROR
Rebooting Phone..Ok

Action Result :  Ok

Elapsed Time : 00:00:19


 

Rashi Hydra Tool

Product Manager
Feb 3, 2021
338
317
Hydra Team
Vivo Y81i (1812) Flashing done with Hydra Tool


- First Keep Press Boot Info
Code:
-------------------------------------------------------
To Enable BROM  Mode :
     Method 1    - Bootkey (Vol + - Power) or any combination
     Method 2    - Enable Preloader to brom(crashing Method)
     Method 3    - Test Point Data0 + ground
To Enable Preloader  Mode :
     Method 1    - Just Insert cable
-------------------------------------------------------

Searching for MTK Device...Found
  MTK Port Type   : Flashmode BROM
  FriendlyName    : MediaTek USB Port_V1633 (COM4)
  Device          : /6&37254210&0&4
  SymbolicName    : \\?\usb#vid_0e8d&pid_0003#6&37254210&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 01/22/2015,3.0.1504.0
  Service         : wdm_usb

Openning Port [COM4] Ok
Handshaking...Ok
  HwCode          : 0717 {MT6761/MT6762/MT3369/MT8766B}
  Hwver           : 0000
  Target config   : E5
  SBC             : 01 (True)
  SLA             : 00 (False)
  DAA             : 04 (True)
  SWJTAG          : 04 (True)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 20 (True)
  MEMWRITE        : 40 (True)
  CMD_C8          : 80 (True)
  Connection      : BROM
  HW Subcode      : 8A00
  HW Subcode      : CA01
  SW Ver          : 0200
  ME_ID           : 820D42FD152D436532D17D77D6118563
  SOC_ID          : F4D91C36D3D43BA509BF9E2EBF5C5DDFA6CC7E1F565A7414884E8613CC43E70C

Exploiting Device...
Successfully Exploited..
Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..Found @ 0x00200BC4
Starting to dump...
Prel Size : 0x0003B72C
Successfully dump preloader..  [C:\Hydra Tool\Boot\PreloaderDump\preloader_k61v1_64_bsp.bin]
  Target config   : 00
  SBC             : 00 (False)
  SLA             : 00 (False)
  DAA             : 00 (False)
  SWJTAG          : 00 (False)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 00 (False)
  MEMWRITE        : 00 (False)
  CMD_C8          : 00 (False)
  Connection      : BROM

Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin]
Patching da2 ... Ok
Uploading Stage 1....
Successfully uploaded stage 1, jumping ..
Executing JUMP_DA Address @ 0x00200000
Jumping to 0x00200000 Ok 0xC0
Successfully received DA sync
  ONNECTION_AGENT : brom
  DRAM config needed for : 90014A4841473461
Sending auto preloader from dump...  [preloader_k61v1_64_bsp.bin]
Sending emi data.. [DRAM setup passed.]
Sending emi data succeeded.
Uploading stage 2...
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
  ERAM Size       : 0x000000000003A500-233.25 KB
  IRAM Size       : 0x0000000080000000-2 GB
  EMMC Boot1 Size : 0x0000000000400000-4 MB
  EMMC Boot2 Size : 0x0000000000400000-4 MB
  EMMC RPMB Size  : 0x0000000000400000-4 MB
  EMMC USER Size  : 0x00000003AB400000-14.676 GB
  EMMC CID        : 90014A484147346132A52EEB687D660D - HAG4a2
  HW-CODE         : 0x717
  HWSUB-CODE      : 0x8A00
  HW-VERSION      : 0xCA01
  SW-VERSION      : 0x200
  CHIP-EVOLUTION  : 0x0
  DA-VERSION      : 1.0
  Speed           : high-speed
Upload data was accepted. Jumping to stage 2...
DA Extensions successfully added
Reading Partition Table ..
Partition Count : 44
--------------- Reading build.prop content ---------------
  Brand          : vivo
  Vendor         : vivo
  Model          : vivo 1812
  Product        : k61v1_64_bsp
  Manufacturer   : vivo
  ID             : O11019
  SDK            : 27
  Release        : 8.1.0
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-US
  Description    : full_k61v1_64_bsp-user 8.1.0 O11019 1563630544 release-keys
  Device         : PD1917F_EX
  Display ID     : O11019 release-keys
  Security Patch : 2019-06-05
  Platform       : =MTK6761
  Fingerprint    : vivo/1812/1812:8.1.0/O11019/1563592353:user/release-keys
  StorageType    : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
IMEI1 : 86352***********
IMEI2 : 86352***********
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------

Elapsed Time : 00:00:16





- Select firmware and click execute
Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                  MTK Flash Function...              
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching for MTK Device...Found
  MTK Port Type   : Flashmode BROM
  FriendlyName    : MediaTek USB Port_V1633 (COM4)
  Device          : /6&37254210&0&4
  SymbolicName    : \\?\usb#vid_0e8d&pid_0003#6&37254210&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 01/22/2015,3.0.1504.0
  Service         : wdm_usb

Openning Port [COM4] Ok
Reading Partition Table ..
  ERAM Size       : 0x000000000003A500-233.25 KB
  IRAM Size       : 0x0000000080000000-2 GB
  EMMC Boot1 Size : 0x0000000000400000-4 MB
  EMMC Boot2 Size : 0x0000000000400000-4 MB
  EMMC RPMB Size  : 0x0000000000400000-4 MB
  EMMC USER Size  : 0x00000003AB400000-14.676 GB
  EMMC CID        : 90014A484147346132A52EEB687D660D - HAG4a2
  HW-CODE         : 0x717
  HWSUB-CODE      : 0x8A00
  HW-VERSION      : 0xCA01
  SW-VERSION      : 0x200
  CHIP-EVOLUTION  : 0x0
  DA-VERSION      : 1.0
  Speed           : high-speed
Partition Count : 44
--------------- Reading build.prop content ---------------
  Brand          : vivo
  Vendor         : vivo
  Model          : vivo 1812
  Product        : k61v1_64_bsp
  Manufacturer   : vivo
  ID             : O11019
  SDK            : 27
  Release        : 8.1.0
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-US
  Description    : full_k61v1_64_bsp-user 8.1.0 O11019 1563630544 release-keys
  Device         : PD1917F_EX
  Display ID     : O11019 release-keys
  Security Patch : 2019-06-05
  Platform       : =MTK6761
  Fingerprint    : vivo/1812/1812:8.1.0/O11019/1563592353:user/release-keys
  StorageType    : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
IMEI1 : 86352*********
IMEI2 : 86352*********
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------

Write Selected Partitions..
- preloader(preloader_k61v1_64_bsp.bin), 237.793 KB[Erasing...Ok]  Status  :C0010001 Error= Failed
- recovery(recovery-verified.img), 25.075 MB          = Ok
- survival(survival-verified.img), 32.07 MB           = Ok
- cust(oem.img), 7.08 MB                              = Ok
- efuse(efuse.img), 512 Bytes                         = Ok
- md1img(md1img-verified.img), 53.782 MB              = Ok
- spmfw(spmfw-verified.img), 51.125 KB                = Ok
- scp1(scp-verified.img), 553.703 KB                  = Ok
- scp2(scp-verified.img), 553.703 KB                  = Ok
- sspm_1(sspm-verified.img), 389.688 KB               = Ok
- sspm_2(sspm-verified.img), 389.688 = Ok
- lk(lk-verified.img), 3.224 MB                       = Ok
- lk2(lk-verified.img), 3.224 MB                      = Ok
- boot(boot-verified.img), 10.95 MB                   = Ok
- logo(logo-verified.bin), 439.906 KB                 = Ok
- odmdtbo(odmdtbo-verified.img), 103.766 KB           = Ok
- tee1(tee-verified.img), 462.688 KB                  = Ok
- tee2(tee-verified.img), 462.688 KB                  = Ok
- vendor(vendor.img), 441.124 MB                      = Ok
- system(system.img), 2.812 GB                        = Ok
- cache(cache.img), 6.102 MB                          = Ok
- userdata(userdata.img), 703.549 MB                  = Ok
----------------------------------

Elapsed Time : 00:02:46

 

Rashi Hydra Tool

Product Manager
Feb 3, 2021
338
317
Hydra Team
Huawei Honor 9 Lite (LLD-L21) FRP Lock Remove with Hydra Tool

- Connect phone with test point
- Select Load Factory Fastboot and click execute

Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                    Huawei Service Tool
                        Factory Boot
                   Load Factory Fastboot
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -


Searching for Hisilicon USB1 Port...Found
  FriendlyName    : HUAWEI USB COM 1.0 (COM27)
  Device          : /5&212ac8fc&0&1
  SymbolicName    : \\?\usb#vid_12d1&pid_3609#5&212ac8fc&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 11/06/2015,2.0.7.1
  Service         : HSPL_usbvcom

Openning Port [COM27] Ok
================================
   USB1 To Fastboot....
================================
Sending Fastboot Loader...
> Loader 1 ...Ok
> Loader 2 ...Ok

Wait few seconds.. phone will reboot in Fastboot Mode

Action Result :  Ok

Elapsed Time : 00:00:37





- Select FRP Remove Fasbootmode method and click Execute

Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                    Huawei Service Tool
              Factory Reset Protection/Account
                         Remove FRP
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching Device By Fastboot
Device Found...

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                  Reading Device Information...              
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
hotainfo......
  #hotainfo_len       :
  #C_version          :
  #D_version          :
  #PLMN               :
  #BoardID            :
  #DeviceName         :
Build number          : LLD-L21 9.1.0.189(C185E11R1P5)
Product Model         : LLD-L21
hwnff_ver             : Ver2.3
key_version           : huawei_key_v1
product               : : hi6250
system_update_state   : FAILED (remote: 'cannot system get update state in oeminfo')
vendorcountry         : : hw/meafnaf
soc_id                : : 0.5
ro_build_fingerprint  : : 0.5
ro_build_version_full : : 0.5
ro_build_version_qcom : : 0.5
psid.........
  #SN                 : HCY4C18*********
  #IMEI1              : 869186**********
  #IMEI2              : 869186**********
Security Info....
#Dongle_info         : : 0.5
#FB Lock State       : UNLOCKED
#USER Lock State     : LOCKED

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Huawei Fastboot Service...
Factory Reset Protection...
Removing....

Action Result :  Ok

Elapsed Time : 00:00:03
 

Rashi Hydra Tool

Product Manager
Feb 3, 2021
338
317
Hydra Team
Redmi 6A Mi Account Remove with Hdyra Tool


- Keep Press Boot Info
Code:
-------------------------------------------------------
To Enable BROM  Mode :
     Method 1    - Bootkey (Vol + - Power) or any combination
     Method 2    - Enable Preloader to brom(crashing Method)
     Method 3    - Test Point Data0 + ground
To Enable Preloader  Mode :
     Method 1    - Just Insert cable
-------------------------------------------------------

Searching for MTK Device...Found
  MTK Port Type   : Flashmode BROM
  FriendlyName    : MediaTek USB Port_V1632 (COM10)
  Device          : /5&ebe48c4&0&3
  SymbolicName    : \\?\usb#vid_0e8d&pid_0003#5&ebe48c4&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 01/22/2015,3.0.1504.0
  Service         : wdm_usb

Openning Port [COM10] Ok
Handshaking...Ok
  HwCode          : 0766 {MT6765/MT8768t}
  Hwver           : 0000
  Target config   : E7
  SBC             : 01 (True)
  SLA             : 02 (True)
  DAA             : 04 (True)
  SWJTAG          : 06 (True)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 20 (True)
  MEMWRITE        : 40 (True)
  CMD_C8          : 80 (True)
  Connection      : BROM
  HW Subcode      : 8A00
  HW Subcode      : CA00
  SW Ver          : 0000
  ME_ID           : 97E446E48B0245B503158DFA0679FBE1
  SOC_ID          : 8A3B1D5E083BB3B242C91F4B15BA3034E773A315347A9C1513F0F6340826D77C

Exploiting Device...
Successfully Exploited..
Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..Found @ 0x00200BC4
Starting to dump...
Prel Size : 0x00039370
Successfully dump preloader..  [C:\Hydra Tool\Boot\PreloaderDump\preloader_cactus.bin]
  Target config   : 00
  SBC             : 00 (False)
  SLA             : 00 (False)
  DAA             : 00 (False)
  SWJTAG          : 00 (False)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 00 (False)
  MEMWRITE        : 00 (False)
  CMD_C8          : 00 (False)
  Connection      : BROM

Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin]
Patching da2 ... Ok
Uploading Stage 1....
Successfully uploaded stage 1, jumping ..
Executing JUMP_DA Address @ 0x00200000
Jumping to 0x00200000 Ok 0xC0
Successfully received DA sync
  ONNECTION_AGENT : brom
  DRAM config needed for : 90014A4841473461
Sending auto preloader from dump...  [preloader_cactus.bin]
Sending emi data.. [DRAM setup passed.]
Sending emi data succeeded.
Uploading stage 2...
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
  ERAM Size       : 0x000000000003A000-232 KB
  IRAM Size       : 0x0000000080000000-2 GB
  EMMC Boot1 Size : 0x0000000000400000-4 MB
  EMMC Boot2 Size : 0x0000000000400000-4 MB
  EMMC RPMB Size  : 0x0000000000400000-4 MB
  EMMC USER Size  : 0x00000003AB400000-14,676 GB
  EMMC CID        : 90014A484147346132A53A369E62B54B - HAG4a2
  HW-CODE         : 0x766
  HWSUB-CODE      : 0x8A00
  HW-VERSION      : 0xCA00
  SW-VERSION      : 0x0
  CHIP-EVOLUTION  : 0x0
  DA-VERSION      : 1.0
  Speed           : high-speed
Upload data was accepted. Jumping to stage 2...
DA Extensions successfully added
Reading Partition Table ..
Partition Count : 43
--------------- Reading build.prop content ---------------
  Brand          : xiaomi
  Model          : Redmi 6A
  Product        : cactus
  ID             : PPR1.180610.011
  SDK            : 28
  Release        : 9
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Locale         : en-GB
  Description    : cactus-user 9 PPR1.180610.011 V11.0.8.0.PCBMIXM release-keys
  Device         : cactus
  Display ID     : SW_S98506AE1_V009_M13_XM_C3C_USR
  Security Patch : 2020-05-01
  Fingerprint    : xiaomi/cactus/cactus:9/PPR1.180610.011/V11.0.8.0.PCBMIXM:user/release-keys
  StorageType    : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
IMEI1 : 3585**********
IMEI2 : 3585**********
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------
Backing up Security..
- preloader(preloader.bin), 512 KB                    = Ok  [preloader_cactus.bin]
  *Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0766_97E446D38B0245B503158DFA0679FBE1\Auto\0707233214827\6765_Android_scatter.txt
- pgpt(pgpt.bin), 32 KB                               = Ok
- nvram(nvram.bin), 64 MB                             = Ok
- nvdata(nvdata.bin), 64 MB                           = Ok
- frp(frp.bin), 1024 KB                               = Ok
- protect1(protect1.bin), 8 MB                        = Ok
- protect2(protect2.bin), 9,469 MB                    = Ok
- persist(persist.bin), 64 MB                         = Ok
- proinfo(proinfo.bin), 3 MB                          = Ok
- nvcfg(nvcfg.bin), 32 MB                             = Ok
- sec1(sec1.bin), 2 MB                                = Ok
- seccfg(seccfg.bin), 8 MB                            = Ok
- lk(lk.bin), 1024 KB                                 = Ok
Backup Done!!!

Elapsed Time : 00:00:40




- Remove Mi Account Patch Method
Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                      Service Function
                           Xiaomi
              Remove MiAccount [Patch Method]
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching for MTK Device...Found
  MTK Port Type   : Flashmode BROM
  FriendlyName    : MediaTek USB Port_V1632 (COM10)
  Device          : /5&ebe48c4&0&3
  SymbolicName    : \\?\usb#vid_0e8d&pid_0003#5&ebe48c4&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 01/22/2015,3.0.1504.0
  Service         : wdm_usb

Openning Port [COM10] Ok
Handshaking...Ok
  HwCode          : 0766 {MT6765/MT8768t}
  Hwver           : 0000
  Target config   : E7
  SBC             : 01 (True)
  SLA             : 02 (True)
  DAA             : 04 (True)
  SWJTAG          : 06 (True)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 20 (True)
  MEMWRITE        : 40 (True)
  CMD_C8          : 80 (True)
  Connection      : BROM
  HW Subcode      : 8A00
  HW Subcode      : CA00
  SW Ver          : 0000
  ME_ID           : 97E446E48B0245B503158DFA0679FBE1
  SOC_ID          : 8A3B1D5E083BB3B242C91F4B15BA3034E773A315347A9C1513F0F6340826D77C

Exploiting Device...
Successfully Exploited..
Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..Found @ 0x00200BC4
Starting to dump...
Prel Size : 0x00039370
Successfully dump preloader..  [C:\Hydra Tool\Boot\PreloaderDump\preloader_cactus.bin]
  Target config   : 00
  SBC             : 00 (False)
  SLA             : 00 (False)
  DAA             : 00 (False)
  SWJTAG          : 00 (False)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 00 (False)
  MEMWRITE        : 00 (False)
  CMD_C8          : 00 (False)
  Connection      : BROM

Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin]
Patching da2 ... Ok
Uploading Stage 1....
Successfully uploaded stage 1, jumping ..
Executing JUMP_DA Address @ 0x00200000
Jumping to 0x00200000 Ok 0xC0
Successfully received DA sync
  ONNECTION_AGENT : brom
  DRAM config needed for : 90014A4841473461
Sending auto preloader from dump...  [preloader_cactus.bin]
Sending emi data.. [DRAM setup passed.]
Sending emi data succeeded.
Uploading stage 2...
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
  ERAM Size       : 0x000000000003A000-232 KB
  IRAM Size       : 0x0000000080000000-2 GB
  EMMC Boot1 Size : 0x0000000000400000-4 MB
  EMMC Boot2 Size : 0x0000000000400000-4 MB
  EMMC RPMB Size  : 0x0000000000400000-4 MB
  EMMC USER Size  : 0x00000003AB400000-14,676 GB
  EMMC CID        : 90014A484147346132A53A369E62B54B - HAG4a2
  HW-CODE         : 0x766
  HWSUB-CODE      : 0x8A00
  HW-VERSION      : 0xCA00
  SW-VERSION      : 0x0
  CHIP-EVOLUTION  : 0x0
  DA-VERSION      : 1.0
  Speed           : high-speed
Upload data was accepted. Jumping to stage 2...
DA Extensions successfully added
Reading Partition Table ..
Partition Count : 43
--------------- Reading build.prop content ---------------
  Brand          : xiaomi
  Model          : Redmi 6A
  Product        : cactus
  ID             : PPR1.180610.011
  SDK            : 28
  Release        : 9
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Locale         : en-GB
  Description    : cactus-user 9 PPR1.180610.011 V11.0.8.0.PCBMIXM release-keys
  Device         : cactus
  Display ID     : SW_S98506AE1_V009_M13_XM_C3C_USR
  Security Patch : 2020-05-01
  Fingerprint    : xiaomi/cactus/cactus:9/PPR1.180610.011/V11.0.8.0.PCBMIXM:user/release-keys
  StorageType    : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
IMEI1 : 3585***********
IMEI2 : 3585***********
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------
Backing up Security..
- preloader(preloader.bin), 512 KB                    = Ok  [preloader_cactus.bin]
  *Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0766_97DD6E48B0245B503158DFA0679FBE1\Auto\0110723213907\6765_Android_scatter.txt
- pgpt(pgpt.bin), 32 KB                               = Ok
- nvram(nvram.bin), 64 MB                             = Ok
- nvdata(nvdata.bin), 64 MB                           = Ok
- frp(frp.bin), 1024 KB                               = Ok
- protect1(protect1.bin), 8 MB                        = Ok
- protect2(protect2.bin), 9,469 MB                    = Ok
- persist(persist.bin), 64 MB                         = Ok
- proinfo(proinfo.bin), 3 MB                          = Ok
- nvcfg(nvcfg.bin), 32 MB                             = Ok
- sec1(sec1.bin), 2 MB                                = Ok
- seccfg(seccfg.bin), 8 MB                            = Ok
- lk(lk.bin), 1024 KB                                 = Ok
Backup Done!!!
------------------------------
   Xiaomi Operation Flash Mode.. 
------------------------------
Backing up Security..
persist... Ok
vbmeta... Ok
Patching Persist

Scanning Patching address...Please wait...
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
Total Items patched : 2
Successfully patched address..
-persist .....Ok
Done Writing...
Status:  Ok

Action Result :  Ok

Elapsed Time : 00:04:26
 

Rashi Hydra Tool

Product Manager
Feb 3, 2021
338
317
Hydra Team
Tecno Pop 4 LTE FRP Lock Remove with Hydra Tool

- Keep Press Boot Info


Code:
-------------------------------------------------------
To Enable BROM  Mode :
     Method 1    - Bootkey (Vol + - Power) or any combination
     Method 2    - Enable Preloader to brom(crashing Method)
     Method 3    - Test Point Data0 + ground
To Enable Preloader  Mode :
     Method 1    - Just Insert cable
-------------------------------------------------------

Searching for MTK Device...Found
  MTK Port Type   : Flashmode Preloader
  FriendlyName    : MediaTek PreLoader USB VCOM_V1632 (Android) (COM9)
  Device          : /5&33881217&0&2
  SymbolicName    : \\?\usb#vid_0e8d&pid_2000#5&33881217&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 01/22/2015,3.0.1504.0
  Service         : wdm_usb

Openning Port [COM9] Ok
Handshaking...Ok
  HwCode          : 0699 {MT6739/MT6731}
  Hwver           : 0000
  Target config   : 05
  SBC             : 01 (True)
  SLA             : 00 (False)
  DAA             : 04 (True)
  SWJTAG          : 04 (True)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 00 (False)
  MEMWRITE        : 00 (False)
  CMD_C8          : 00 (False)
  Connection      : Preloader
  HW Subcode      : 8A00
  HW Subcode      : CA00
  SW Ver          : 0000
  ME_ID           : E195965CE8086819E1A38D1FE762390B


- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                  Preloader To Brom Function.....              
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- Method 1  Exploit Executed..... [Successfully Crash Preloader.]
Device now is BROM Port

Exploiting Device...
Successfully Exploited..
Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..Found @ 0x00200BC4
Starting to dump...
Prel Size : 0x0001CC70
Successfully dump preloader..  [C:\Users\alvin\Desktop\hydra\Boot\PreloaderDump\preloader_k39tv1_bsp.bin]
  Target config   : 00
  SBC             : 00 (False)
  SLA             : 00 (False)
  DAA             : 00 (False)
  SWJTAG          : 00 (False)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 00 (False)
  MEMWRITE        : 00 (False)
  CMD_C8          : 00 (False)
  Connection      : BROM

Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin]
Patching da2 ... Ok
Uploading Stage 1....
Successfully uploaded stage 1, jumping ..
Executing JUMP_DA Address @ 0x00200000
Jumping to 0x00200000 Ok 0xC0
Successfully received DA sync
  ONNECTION_AGENT : brom
Sending auto preloader from dump...  [preloader_k39tv1_bsp.bin]
Sending emi data.. [DRAM setup passed.]
Sending emi data succeeded.
Uploading stage 2...
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
  ERAM Size       : 0x0000000000020000-128 KB
  IRAM Size       : 0x0000000080000000-2 GB
  EMMC Boot1 Size : 0x0000000000400000-4 MB
  EMMC Boot2 Size : 0x0000000000400000-4 MB
  EMMC RPMB Size  : 0x0000000001000000-16 MB
  EMMC USER Size  : 0x0000000747C00000-29.121 GB
  EMMC CID        : 150100514436334D4201202306D2688B - QD63MB
  HW-CODE         : 0x699
  HWSUB-CODE      : 0x8A00
  HW-VERSION      : 0xCA00
  SW-VERSION      : 0x0
  CHIP-EVOLUTION  : 0x0
  DA-VERSION      : 1.0
  Speed           : high-speed
Upload data was accepted. Jumping to stage 2...
DA Extensions successfully added
Reading Partition Table ..
Partition Count : 40
--------------- Reading build.prop content ---------------
  Product        : k39tv1_bsp
  ID             : QP1A.190711.020
  SDK            : 29
  Release        : 10
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Locale         : en-US
  Description    : full_k39tv1_bsp-user 10 QP1A.190711.020 1677044979 release-keys
  Device         : TECNO-BC1s
  Display ID     : BC1s-VQ653AB-QGo-OP-230221V021
  Security Patch : 2023-02-05
  Fingerprint    : TECNO/BC1s-OP/TECNO-BC1s:10/QP1A.190711.020/AB-OP-230221V021:user/release-keys
--------------- end of build.prop content ---------------

Reading IMEI........
IMEI1 : 35082**********
IMEI2 : 35082**********
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------
Backing up Security..
- preloader(preloader.bin), 512 KB                    = Ok  [preloader_k39tv1_bsp.bin]
  *Creating Scatter file... C:\Users\alvin\Desktop\hydra\Backup\MTKBKUP\0699_EWWW965CE8086819E1A38D1FE762390B\Auto\0707244083426\6739_Android_scatter.txt
- pgpt(pgpt.bin), 32 KB                               = Ok
- nvram(nvram.bin), 5 MB                              = Ok
- nvdata(nvdata.bin), 32 MB                           = Ok
- frp(frp.bin), 1024 KB                               = Ok
- protect1(protect1.bin), 8 MB                        = Ok
- protect2(protect2.bin), 10.867 MB                   = Ok
- persist(persist.bin), 48 MB                         = Ok
- proinfo(proinfo.bin), 3 MB                          = Ok
- nvcfg(nvcfg.bin), 8 MB                              = Ok
- sec1(sec1.bin), 2 MB                                = Ok
- seccfg(seccfg.bin), 8 MB                            = Ok
- lk(lk.bin), 1024 KB                                 = Ok
Backup Done!!!

Elapsed Time : 00:00:36


- Select FRP Remove and Click Execute
Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                      Service Function
               Factory Reset Protection[FRP]
                            Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching for MTK Device...Found
  MTK Port Type   : Flashmode BROM
  FriendlyName    : MediaTek USB Port_V1632 (COM6)
  Device          : /5&33881217&0&2
  SymbolicName    : \\?\usb#vid_0e8d&pid_0003#5&33881217&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 01/22/2015,3.0.1504.0
  Service         : wdm_usb

Openning Port [COM6] Ok
Reading Partition Table ..
  ERAM Size       : 0x0000000000020000-128 KB
  IRAM Size       : 0x0000000080000000-2 GB
  EMMC Boot1 Size : 0x0000000000400000-4 MB
  EMMC Boot2 Size : 0x0000000000400000-4 MB
  EMMC RPMB Size  : 0x0000000001000000-16 MB
  EMMC USER Size  : 0x0000000747C00000-29.121 GB
  EMMC CID        : 150100514436334D4201202306D2688B - QD63MB
  HW-CODE         : 0x699
  HWSUB-CODE      : 0x8A00
  HW-VERSION      : 0xCA00
  SW-VERSION      : 0x0
  CHIP-EVOLUTION  : 0x0
  DA-VERSION      : 1.0
  Speed           : high-speed
Partition Count : 40
--------------- Reading build.prop content ---------------
  Product        : k39tv1_bsp
  ID             : QP1A.190711.020
  SDK            : 29
  Release        : 10
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Locale         : en-US
  Description    : full_k39tv1_bsp-user 10 QP1A.190711.020 1677044979 release-keys
  Device         : TECNO-BC1s
  Display ID     : BC1s-VQ653AB-QGo-OP-230221V021
  Security Patch : 2023-02-05
  Fingerprint    : TECNO/BC1s-OP/TECNO-BC1s:10/QP1A.190711.020/AB-OP-230221V021:user/release-keys
--------------- end of build.prop content ---------------

Reading IMEI........
IMEI1 : 35082*********
IMEI2 : 35082*********
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------

Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!

Action Result :  Ok

Elapsed Time : 00:00:06

 

Rashi Hydra Tool

Product Manager
Feb 3, 2021
338
317
Hydra Team
Vivo Y71 (1724) pattern and frp lock remove with Hydra Tool


- First Keep Press Boot Info
Code:
PreOperation Configuration
Brand : AUTO Model : AUTO Storage : Auto
Loader: Auto
Port  : Auto

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM4)
SymbolicName :\\?\usb#vid_05c6&pid_9008#5&29e81f4d&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver   :01/25/2014,2.1.1.0

Getting device info. [Connected].....
Serial No.: 0x1AE8541A
HW_ID     : 000560E100000000
MSM ID    : 0x000560E1, MSM8917-Qualcomm Snapdragon 425/LAADANAZA
MODEL_ID  : 0x0000
OEM_ID    : 0x0000 - QUALCOMM
PBL Ver   : 00000000
PK HASH   : 60ba997fef6da9f05885fa11f1dd6d2a90d052a257a09c2075d7246cc73c0d43

Hydra Enable Auto search Firehose..
#Please wait...
#Search by filename filter.....
#Found 21 Compatible Files ..Found match Firehose...

Firehose Loader[000560e100000000_60ba997fef6da9f0_1600b30c_qualcomm_vivo_peek_8917.fhprg]
--------------------------------------------------
  Header Type    : OLD
  TargetMSM      : 8917
  Tag            : _peek
  Version        : 3
  Code_size      : 288
  Signature_size : 256
  fhVendor       : VIVO
  HW_ID          : 000560E100000000
  Vendor         : QUALCOMM
  OEM_ID         : 0000
  MODEL_ID       : 0000
  SW_ID          : 0000000000000003
  APP_ID         :
  pk_hash        : 60ba997fef6da9f05885fa11f1dd6d2a90d052a257a09c2075d7246cc73c0d43
  OEM_VERSION    : compiler026
  IMAGE_VARIANT  : LAADANAZA
  QC_VERSION     : BOOT.BF.3.3-00199
--------------------------------------------------

SaharaBoot... Ok
Sending .................Ok
Connecting to Firehose...
Ping... Ok
Configuration[FHProt_Auto]......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8917
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type         : eMMC
Block Size in Bytes : 512
Page Size           : 512
Manufacturer ID     : 21
Serial Number       : 217974681
Firmware Version    : 3
Product Name        : QE63MB
Physical Partitions : 3
Total Logical Blocks:
          Drive [0]  30535680[14.561 GB]
          Drive [1]  8192[4 MB]
          Drive [2]  8192[4 MB]

Protocol : Universal
Running : Ok

Reading GPT[3]
          Drive [0] 56 Items
          Drive [1] 0 Items
          Drive [2] 0 Items

--------------- Reading build.prop content ---------------
build.prop
  Brand          : vivo
  Vendor         : vivo
  Model          : vivo 1724
  Product        : msm8937_64
  Manufacturer   : vivo
  ID             : OPM1.171019.011
  SDK            : 27
  Release        : 8.1.0
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-US
  Description    : msm8937_64-user 8.1.0 OPM1.171019.011 eng.compil.20210507.114116 release-keys
  Device         : msm8937_64
  Display ID     : OPM1.171019.011 release-keys
  Security Patch : 2021-03-01
  Fingerprint    : vivo/1724/1724:8.1.0/OPM1.171019.011/compil05071141:user/release-keys
--------------- end of build.prop content ---------------

Auto Backup Security partitions...
Reading Security Items....
- modemst1(modemst1.bin), 2.5 MB                      = Ok
- modemst2(modemst2.bin), 2.5 MB                      = Ok
- fsg(fsg.bin), 2.5 MB                                = Ok
- fsc(fsc.bin), 512 Bytes                             = Ok
- persist(persist.bin), 32 MB                         = Ok

C:\Hydra Tool\Backup\QUALBackup\QUALCOMM\000560E100000000_1AE8541A\Auto_Backup\070723193739
Backup Security Success....

Elapsed Time : 00:00:13





- Select Factory Reset safeformat and click execute
Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                     Vivo Service Tool
               Factory Reset/Format Userdata
                            Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

PreOperation Configuration
Brand : AUTO Model : AUTO Storage : Auto
Loader: Auto
Port  : Auto

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM4)
SymbolicName :\\?\usb#vid_05c6&pid_9008#5&29e81f4d&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver   :01/25/2014,2.1.1.0

Getting device info. [Connected].Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok
Configuration[FHProt_Auto]......
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8917
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type         : eMMC
Block Size in Bytes : 512
Page Size           : 512
Manufacturer ID     : 21
Serial Number       : 217974681
Firmware Version    : 3
Product Name        : QE63MB
Physical Partitions : 3
Total Logical Blocks:
          Drive [0]  30535680[14.561 GB]
          Drive [1]  8192[4 MB]
          Drive [2]  8192[4 MB]

Protocol : Universal
Running : Ok

Reading GPT[3]
          Drive [0] 56 Items
          Drive [1] 0 Items
          Drive [2] 0 Items

--------------- Reading build.prop content ---------------
build.prop
  Brand          : vivo
  Vendor         : vivo
  Model          : vivo 1724
  Product        : msm8937_64
  Manufacturer   : vivo
  ID             : OPM1.171019.011
  SDK            : 27
  Release        : 8.1.0
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-US
  Description    : msm8937_64-user 8.1.0 OPM1.171019.011 eng.compil.20210507.114116 release-keys
  Device         : msm8937_64
  Display ID     : OPM1.171019.011 release-keys
  Security Patch : 2021-03-01
  Fingerprint    : vivo/1724/1724:8.1.0/OPM1.171019.011/compil05071141:user/release-keys
--------------- end of build.prop content ---------------
Processing Safe Format  - Auto....
- Formatting Userdata
Executing ...
- Formatting Userdata  [Safe Format - eMMc] OkOk

Rebooting Phone.... Ok

Action Result :  Ok

Elapsed Time : 00:00:05



- Select FRP Remove and click execute
Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                     Vivo Service Tool
         Factory Reset Protection(FRP)/Demo Remove
                            Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

PreOperation Configuration
Brand : AUTO Model : AUTO Storage : Auto
Loader: Auto
Port  : Auto

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM4)
SymbolicName :\\?\usb#vid_05c6&pid_9008#5&29e81f4d&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver   :01/25/2014,2.1.1.0

Getting device info. [Connected].Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok
Configuration[FHProt_Auto]......
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8917
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type         : eMMC
Block Size in Bytes : 512
Page Size           : 512
Manufacturer ID     : 21
Serial Number       : 217974681
Firmware Version    : 3
Product Name        : QE63MB
Physical Partitions : 3
Total Logical Blocks:
          Drive [0]  30535680[14.561 GB]
          Drive [1]  8192[4 MB]
          Drive [2]  8192[4 MB]

Protocol : Universal
Running : Ok

Reading GPT[3]
          Drive [0] 56 Items
          Drive [1] 0 Items
          Drive [2] 0 Items

--------------- Reading build.prop content ---------------
build.prop
  Brand          : vivo
  Vendor         : vivo
  Model          : vivo 1724
  Product        : msm8937_64
  Manufacturer   : vivo
  ID             : OPM1.171019.011
  SDK            : 27
  Release        : 8.1.0
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-US
  Description    : msm8937_64-user 8.1.0 OPM1.171019.011 eng.compil.20210507.114116 release-keys
  Device         : msm8937_64
  Display ID     : OPM1.171019.011 release-keys
  Security Patch : 2021-03-01
  Fingerprint    : vivo/1724/1724:8.1.0/OPM1.171019.011/compil05071141:user/release-keys
--------------- end of build.prop content ---------------

Rebooting Phone.... Ok

Rebooting Phone.... Ok

Action Result :  Ok

Elapsed Time : 00:00:06
 

Rashi Hydra Tool

Product Manager
Feb 3, 2021
338
317
Hydra Team
Xiaomi Redmi 9 (lancelot) Flashing Done with Hydra Tool

Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                  MTK Partition Manager Function...              
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching for MTK Device...Found
  MTK Port Type   : Flashmode BROM
  FriendlyName    : MediaTek USB Port_V1632 (COM15)
  Device          : /7&3b5abdfa&0&2
  SymbolicName    : \\?\usb#vid_0e8d&pid_0003#7&3b5abdfa&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 01/22/2015,3.0.1504.0
  Service         : wdm_usb

Openning Port [COM15] Ok
Reading Partition Table ..
  ERAM Size       : 0x0000000000070000-448 KB
  IRAM Size       : 0x0000000100000000-4 GB
  EMMC Boot1 Size : 0x0000000000400000-4 MB
  EMMC Boot2 Size : 0x0000000000400000-4 MB
  EMMC RPMB Size  : 0x0000000001000000-16 MB
  EMMC USER Size  : 0x0000000E8F800000-58,242 GB
  EMMC CID        : 1501004450364441420333ECD0633879 - DP6DAB
  HW-CODE         : 0x707
  HWSUB-CODE      : 0x8A00
  HW-VERSION      : 0xCA00
  SW-VERSION      : 0x0
  CHIP-EVOLUTION  : 0x1
  DA-VERSION      : 1.0
  Speed           : high-speed
Partition Count : 50
--------------- Reading build.prop content ---------------
  Product        : lancelot
  Marketname   : ro.product.systemRedmi 9
  ID             : RP1A.200720.011
  SDK            : 30
  Release        : 11
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-GB
  Description    : lancelot-user 11 RP1A.200720.011 V12.5.5.0.RJCMIXM release-keys
  Display ID     : RP1A.200720.011
  Security Patch : 2022-04-01
  StorageType    : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
IMEI1 : 86531**********
IMEI2 : 86531************
-------------------------------
Bootloader Status...
  Bootloader : Unlocked
-------------------------------

Reading Selected Partitions..
- preloader(preloader.bin), 512 KB                    = Ok  [preloader_lancelot.bin]
  *Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0707_C960385BF4879DD4D48EEF7D3BC438\Selected\070725532457\6768_Android_scatter.txt
- pgpt(pgpt.bin), 32 KB                               = Ok
- recovery(recovery.bin), 64 MB                       = Ok
- misc(misc.bin), 512 KB                              = Ok
- para(para.bin), 512 KB                              = Ok
- expdb(expdb.bin), 20 MB                             = Ok
- frp(frp.bin), 1024 KB                               = Ok
- vbmeta(vbmeta.bin), 8 MB                            = Ok
- vbmeta_system(vbmeta_system.bin), 8 MB              = Ok
- vbmeta_vendor(vbmeta_vendor.bin), 8 MB              = Ok
- md_udc(md_udc.bin), 22,602 MB                       = Ok
- metadata(metadata.bin), 32 MB                       = Ok
- nvcfg(nvcfg.bin), 32 MB                             = Ok
- nvdata(nvdata.bin), 64 MB                           = Ok
- persist(persist.bin), 48 MB                         = Ok
- persistbak(persistbak.bin), 48 MB                   = Ok
- protect1(protect1.bin), 8 MB                        = Ok
- protect2(protect2.bin), 11,367 MB                   = Ok
- seccfg(seccfg.bin), 8 MB                            = Ok
- sec1(sec1.bin), 2 MB                                = Ok
- proinfo(proinfo.bin), 3 MB                          = Ok
- efuse(efuse.bin), 512 KB                            = Ok
- boot_para(boot_para.bin), 26 MB                     = Ok
- nvram(nvram.bin), 64 MB                             = Ok
- logo(logo.bin), 8 MB                                = Ok
- md1img(md1img.bin), 128 MB                          = Ok
- spmfw(spmfw.bin), 1024 KB                           = Ok
- scp1(scp1.bin), 6 MB                                = Ok
- scp2(scp2.bin), 6 MB                                = Ok
- sspm_1(sspm_1.bin), 1024 KB                         = Ok
- sspm_2(sspm_2.bin), 1024 KB                         = Ok
- gz1(gz1.bin), 16 MB                                 = Ok
- gz2(gz2.bin), 16 MB                                 = Ok
- lk(lk.bin), 2 MB                                    = Ok
- lk2(lk2.bin), 2 MB                                  = Ok
- boot(boot.bin), 64 MB                               = Ok
- dtbo(dtbo.bin), 16 MB                               = Ok
- tee1(tee1.bin), 5 MB                                = Ok
- tee2(tee2.bin), 5 MB                                = Ok
- gsort(gsort.bin), 16 MB                             = Ok
- minidump(minidump.bin), 128 MB                      = Ok
- exaid(exaid.bin), 384 MB                            = Ok
- cust(cust.bin), 1024 MB                             = Ok
- devinfo(devinfo.bin), 8 MB                          = Ok
- ffu(ffu.bin), 11,5 MB                               = Ok
- cache(cache.bin), 432 MB                            = Ok
- otp(otp.bin), 43 MB                                 = Ok
- flashinfo(flashinfo.bin), 16 MB                     = Ok
Done Reading...

Elapsed Time : 00:05:52

 

Rashi Hydra Tool

Product Manager
Feb 3, 2021
338
317
Hydra Team
Huawei P20 lite (ANE-L01) FRP Lock Remove with Hydra Tool


- Unlock Bootloader temp with testpoint
Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                    Huawei Service Tool
                         Bootloader
                      Temporary Unlock
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -


Searching for Hisilicon USB1 Port...Found
  FriendlyName    : Android Adapter PCUI (COM64)
  Device          : /5&2108ad5d&0&12
  SymbolicName    : \\?\usb#vid_12d1&pid_3609#5&2108ad5d&0&12#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 11/28/2016,2.0.6.725
  Service         : HWHandSet

Openning Port [COM64] Ok
================================
   USB1 To Fastboot....
================================
Sending Fastboot Loader...
> Loader 1 ...Ok
> Loader 2 ...Ok

Wait few seconds.. phone will reboot in Fastboot Mode

Action Result :  Ok

Elapsed Time : 00:01:23



- Now remove frp lock fastboot mode
Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                    Huawei Service Tool
              Factory Reset Protection/Account
                         Remove FRP
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching Device By Fastboot
Device Found...

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                  Reading Device Information...              
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
hotainfo......
  #hotainfo_len       :
  #C_version          :
  #D_version          :
  #PLMN               :
  #BoardID            :
  #DeviceName         :
Build number          : ANE-LX1 9.1.0.401(C432E13R1P7)
Product Model         : ANE-LX1
hwnff_ver             : Ver2.3
key_version           : huawei_key_v1
product               : : hi6250
system_update_state   : FAILED (remote: 'cannot system get update state in oeminfo')
vendorcountry         : : hw/eu
soc_id                : : 0.5
ro_build_fingerprint  : : 0.5
ro_build_version_full : : 0.5
ro_build_version_qcom : : 0.5
psid.........
  #SN                 : 89U4C***********
  #IMEI1              : 867440**********
  #IMEI2              : 000000**********
Security Info....
#Dongle_info         : : 0.5
#FB Lock State       : UNLOCKED
#USER Lock State     : LOCKED

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Huawei Fastboot Service...
Factory Reset Protection...
Removing....

Action Result :  Ok

Elapsed Time : 00:00:03
 

Rashi Hydra Tool

Product Manager
Feb 3, 2021
338
317
Hydra Team
Huawei Y6s Frp Lock Remove with Hydra Tool

Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                      Service Function
               Factory Reset Protection[FRP]
                            Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching for MTK Device...Found
  MTK Port Type   : Flashmode BROM
  FriendlyName    : MediaTek USB Port (COM25)
  Device          : /7&33c1e99c&0&1
  SymbolicName    : \\?\usb#vid_0e8d&pid_0003#7&33c1e99c&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 01/22/2015,3.0.1504.0
  Service         : wdm_usb

Openning Port [COM25] Ok
Handshaking...Ok
  HwCode          : 0766 {MT6765/MT8768t}
  Hwver           : 0000
  Target config   : E5
  SBC             : 01 (True)
  SLA             : 00 (False)
  DAA             : 04 (True)
  SWJTAG          : 04 (True)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 20 (True)
  MEMWRITE        : 40 (True)
  CMD_C8          : 80 (True)
  Connection      : BROM
  HW Subcode      : 8A00
  HW Subcode      : CA00
  SW Ver          : 0000
  ME_ID           : EBF2D31655B5FF41E5BB5342E1A4410B
  SOC_ID          : 903EC0F0478A0A8AC8755A7CA229FF2DFA7B31F4F93C373B49CF0E7F9F7D7A01
Device not yet filterd...
Executing LibUSB Filter..
Device Now Filtered...Restarting Device Port..

Openning Port [COM25] Ok

Exploiting Device...
Successfully Exploited..
Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..Found @ 0x00200BC4
Starting to dump...
Prel Size : 0x0003D85C
Successfully dump preloader..  [C:\Hydra Tool\Boot\PreloaderDump\preloader_k62v1_64_mexico.bin]
  Target config   : 00
  SBC             : 00 (False)
  SLA             : 00 (False)
  DAA             : 00 (False)
  SWJTAG          : 00 (False)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 00 (False)
  MEMWRITE        : 00 (False)
  CMD_C8          : 00 (False)
  Connection      : BROM

Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin]
Patching da2 ... Ok
Uploading Stage 1....
Successfully uploaded stage 1, jumping ..
Executing JUMP_DA Address @ 0x00200000
Jumping to 0x00200000 Ok 0xC0
Successfully received DA sync
  ONNECTION_AGENT : brom
  DRAM config needed for : 90014A6843386150
Sending auto preloader from dump...  [preloader_k62v1_64_mexico.bin]
Sending emi data.. [DRAM setup passed.]
Sending emi data succeeded.
Uploading stage 2...
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
  ERAM Size       : 0x000000000003A000-232 KB
  IRAM Size       : 0x00000000C0000000-3 GB
  EMMC Boot1 Size : 0x0000000000400000-4 MB
  EMMC Boot2 Size : 0x0000000000400000-4 MB
  EMMC RPMB Size  : 0x0000000001000000-16 MB
  EMMC USER Size  : 0x0000000E8F800000-58/242 GB
  EMMC CID        : 90014A68433861503E01000E604767A3 - hC8aP>
  HW-CODE         : 0x766
  HWSUB-CODE      : 0x8A00
  HW-VERSION      : 0xCA00
  SW-VERSION      : 0x0
  CHIP-EVOLUTION  : 0x0
  DA-VERSION      : 1.0
  Speed           : high-speed
Upload data was accepted. Jumping to stage 2...
DA Extensions successfully added
Reading Partition Table ..
Partition Count : 49
--------------- Reading build.prop content ---------------
Unable to read system info..
--------------- end of build.prop content ---------------

Reading IMEI........
IMEI1 : 861244*********
IMEI2 : 861244*********
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------
Backing up Security..
- preloader(preloader.bin), 512 KB                    = Ok  [preloader_k62v1_64_mexico.bin]
  *Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0766_EBF2D31655B5FF4VCC5BB5342E1A4410B\Auto\070823011101\6765_Android_scatter.txt
- pgpt(pgpt.bin), 32 KB                               = Ok
- nvram(nvram.bin), 5 MB                              = Ok
- nvdata(nvdata.bin), 16 MB                           = Ok
- frp(frp.bin), 1024 KB                               = Ok
- protect1(protect1.bin), 8 MB                        = Ok
- protect2(protect2.bin), 13/969 MB                   = Ok
- persist(persist.bin), 8 MB                          = Ok
- oeminfo(oeminfo.bin), 32 MB                         = Ok
- proinfo(proinfo.bin), 1024 KB                       = Ok
- nvcfg(nvcfg.bin), 8 MB                              = Ok
- seccfg(seccfg.bin), 8 MB                            = Ok
- lk(lk.bin), 3 MB                                    = Ok
Backup Done!!!

Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!

Action Result :  Ok

Elapsed Time : 00:00:38
 

Rashi Hydra Tool

Product Manager
Feb 3, 2021
338
317
Hydra Team
Oppo A5s (CPH1809) Pattern and FRP Lock remove with Hdyra Tool



- First Keep press boot info
Code:
-------------------------------------------------------
To Enable BROM  Mode :
     Method 1    - Bootkey (Vol + - Power) or any combination
     Method 2    - Enable Preloader to brom(crashing Method)
     Method 3    - Test Point Data0 + ground
To Enable Preloader  Mode :
     Method 1    - Just Insert cable
-------------------------------------------------------

Searching for MTK Device...Found
  MTK Port Type   : Flashmode BROM
  FriendlyName    : MediaTek USB Port_V1632 (COM5)
  Device          : /5&13a213fa&0&2
  SymbolicName    : \\?\usb#vid_0e8d&pid_0003#5&13a213fa&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 01/22/2015,3.0.1504.0
  Service         : wdm_usb

Openning Port [COM5] Ok
Handshaking...Ok
  HwCode          : 0766 {MT6765/MT8768t}
  Hwver           : 0000
  Target config   : E5
  SBC             : 01 (True)
  SLA             : 00 (False)
  DAA             : 04 (True)
  SWJTAG          : 04 (True)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 20 (True)
  MEMWRITE        : 40 (True)
  CMD_C8          : 80 (True)
  Connection      : BROM
  HW Subcode      : 8A00
  HW Subcode      : CA00
  SW Ver          : 0000
  ME_ID           : B573FAD9936F8C45384C3CB81C707C51
  SOC_ID          : AFA3E4DEB00D65E31CE09144A75D49AD2332C9C0230910642366F0D052773838

Exploiting Device...
Successfully Exploited..
Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..Found @ 0x00200BC4
Starting to dump...
Prel Size : 0x0003A958
Successfully dump preloader..  [C:\Users\user\Downloads\Hydra Tool_FullPackage_02-21-2023\Boot\PreloaderDump\preloader_oppo6765_18511.bin]
  Target config   : 00
  SBC             : 00 (False)
  SLA             : 00 (False)
  DAA             : 00 (False)
  SWJTAG          : 00 (False)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 00 (False)
  MEMWRITE        : 00 (False)
  CMD_C8          : 00 (False)
  Connection      : BROM

Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin]
Patching da2 ... Ok
Uploading Stage 1....
Successfully uploaded stage 1, jumping ..
Executing JUMP_DA Address @ 0x00200000
Jumping to 0x00200000 Ok 0xC0
Successfully received DA sync
  ONNECTION_AGENT : brom
  DRAM config needed for : 150100474436424D
Sending auto preloader from dump...  [preloader_oppo6765_18511.bin]
Sending emi data.. [DRAM setup passed.]
Sending emi data succeeded.
Uploading stage 2...
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
  ERAM Size       : 0x000000000003A000-232 KB
  IRAM Size       : 0x00000000C0000000-3 GB
  EMMC Boot1 Size : 0x0000000000400000-4 MB
  EMMC Boot2 Size : 0x0000000000400000-4 MB
  EMMC RPMB Size  : 0x0000000000400000-4 MB
  EMMC USER Size  : 0x0000000747C00000-29.121 GB
  EMMC CID        : 150100474436424D42010D350633C537 - GD6BMB
  HW-CODE         : 0x766
  HWSUB-CODE      : 0x8A00
  HW-VERSION      : 0xCA00
  SW-VERSION      : 0x0
  CHIP-EVOLUTION  : 0x0
  DA-VERSION      : 1.0
  Speed           : high-speed
Upload data was accepted. Jumping to stage 2...
DA Extensions successfully added
Reading Partition Table ..
Partition Count : 42
--------------- Reading build.prop content ---------------
  Vendor         : OPPO
  Manufacturer   : OPPO
  ID             : O11019
  SDK            : 27
  Release        : 8.1.0
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-US
  Description    : full_oppo6765_18511-user 8.1.0 O11019 1616154336 release-keys
  Security Patch : 2021-04-05
  StorageType    : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------
Backing up Security..
- preloader(preloader.bin), 512 KB                    = Ok  [preloader_oppo6765_18511.bin]
  *Creating Scatter file... C:\Users\user\Downloads\Hydra Tool_FullPackage_02-21-2023\Backup\MTKBKUP\0766_B573FAD9936F8C45384C3CB81C707C51\Auto\0707234444354\6765_Android_scatter.txt
- pgpt(pgpt.bin), 32 KB                               = Ok
- nvram(nvram.bin), 64 MB                             = Ok
- nvdata(nvdata.bin), 64 MB                           = Ok
- frp(frp.bin), 1024 KB                               = Ok
- protect1(protect1.bin), 8 MB                        = Ok
- protect2(protect2.bin), 8.469 MB                    = Ok
- persist(persist.bin), 48 MB                         = Ok
- proinfo(proinfo.bin), 3 MB                          = Ok
- oppo_custom(oppo_custom.bin), 1024 KB               = Ok
- opporeserve1(opporeserve1.bin), 8 MB                = Ok
- opporeserve2(opporeserve2.bin), 64 MB               = Ok
- nvcfg(nvcfg.bin), 32 MB                             = Ok
- sec1(sec1.bin), 2 MB                                = Ok
- seccfg(seccfg.bin), 8 MB                            = Ok
- lk(lk.bin), 5 MB                                    = Ok
Backup Done!!!

Elapsed Time : 00:01:07





- select ultrapower opration and click execute
Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                      Service Function
                        Ultra Power
                            Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching for MTK Device...Found
  MTK Port Type   : Flashmode BROM
  FriendlyName    : MediaTek USB Port_V1632 (COM5)
  Device          : /5&13a213fa&0&2
  SymbolicName    : \\?\usb#vid_0e8d&pid_0003#5&13a213fa&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 01/22/2015,3.0.1504.0
  Service         : wdm_usb

Openning Port [COM5] Ok
Reading Partition Table ..
  ERAM Size       : 0x000000000003A000-232 KB
  IRAM Size       : 0x00000000C0000000-3 GB
  EMMC Boot1 Size : 0x0000000000400000-4 MB
  EMMC Boot2 Size : 0x0000000000400000-4 MB
  EMMC RPMB Size  : 0x0000000000400000-4 MB
  EMMC USER Size  : 0x0000000747C00000-29.121 GB
  EMMC CID        : 150100474436424D42010D350633C537 - GD6BMB
  HW-CODE         : 0x766
  HWSUB-CODE      : 0x8A00
  HW-VERSION      : 0xCA00
  SW-VERSION      : 0x0
  CHIP-EVOLUTION  : 0x0
  DA-VERSION      : 1.0
  Speed           : high-speed
Partition Count : 42
--------------- Reading build.prop content ---------------
  Vendor         : OPPO
  Manufacturer   : OPPO
  ID             : O11019
  SDK            : 27
  Release        : 8.1.0
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-US
  Description    : full_oppo6765_18511-user 8.1.0 O11019 1616154336 release-keys
  Security Patch : 2021-04-05
  StorageType    : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------
---------------------------
        Ultra Power   
---------------------------
Formatting Userdata :
Operation : Safeformat Universal... Ok
Removing FRP :  Ok

Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!

Action Result :  Ok

Elapsed Time : 00:00:11
 

Rashi Hydra Tool

Product Manager
Feb 3, 2021
338
317
Hydra Team
Redmi Note 5 Pro (whyred) new v2 mi account remove with Hydra Tool

- First Keep press Boot info

Code:
PreOperation Configuration
Brand : XIAOMI Model : Redmi Note 5 Pro (Whyred) New V2 Storage : Auto
Loader: 0008C0E100010000_a7b8b82545a98eca_384d4649_GENERIC_XIAOMI_auth.fhprg
Port  : Auto

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM14)
SymbolicName :\\?\usb#vid_05c6&pid_9008#6&29e6b3c2&0&7#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver   :02/05/2018,3.0.0.0

Getting device info. [Connected].Ok
Device MODE : Firehose
Connecting to Firehose...
Ping...... Ok
Configuration[FHProt_Auto]......
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : MSM8996
Version : 1
DateTime : Aug  2 2018 - 22:27:53

*** STORAGE DEVICE INFO ***
Memory Type         : eMMC
Block Size in Bytes : 512
Page Size           : 512
Manufacturer ID     : 144
Serial Number       : 1150398153
Firmware Version    : 162
Product Name        : HCG8a4
Physical Partitions : 4
Total Logical Blocks:
          Drive [0]  122142720[58,242 GB]
          Drive [1]  8192[4 MB]
          Drive [2]  8192[4 MB]
          Drive [3]  8192[4 MB]

Protocol : Universal
Running : Ok

Reading GPT[4]
          Drive [0] 64 Items
          Drive [1] 0 Items
          Drive [2] 0 Items
          Drive [3] 0 Items

--------------- Reading build.prop content ---------------
build.prop
  Brand          : xiaomi
  Model          : Redmi Note 5
  Product        : whyred
  ID             : PKQ1.180904.001
  SDK            : 28
  Release        : 9
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-GB
  Description    : whyred-user 9 PKQ1.180904.001 V11.0.3.0.PEIMIXM release-keys
  Device         : whyred
  Display ID     : PKQ1.180904.001
  Security Patch : 2019-11-05
  Fingerprint    : xiaomi/whyred/whyred:9/PKQ1.180904.001/V11.0.3.0.PEIMIXM:user/release-keys
--------------- end of build.prop content ---------------

Elapsed Time : 00:00:06


- Remove mi account new mthod

Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                        Xiaomi Tool
                         Mi Account
                Remove MiAccount[New Method]
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

PreOperation Configuration
Brand : XIAOMI Model : Redmi Note 5 Pro (Whyred) New V2 Storage : Auto
Loader: 0008C0E100010000_a7b8b82545a98eca_384d4649_GENERIC_XIAOMI_auth.fhprg
Port  : Auto

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM14)
SymbolicName :\\?\usb#vid_05c6&pid_9008#6&29e6b3c2&0&7#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver   :02/05/2018,3.0.0.0

Getting device info. [Connected].Ok
Device MODE : Firehose
Connecting to Firehose...
Ping...... Ok
Configuration[FHProt_Auto]......
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : MSM8996
Version : 1
DateTime : Aug  2 2018 - 22:27:53

*** STORAGE DEVICE INFO ***
Memory Type         : eMMC
Block Size in Bytes : 512
Page Size           : 512
Manufacturer ID     : 144
Serial Number       : 1150398153
Firmware Version    : 162
Product Name        : HCG8a4
Physical Partitions : 4
Total Logical Blocks:
          Drive [0]  122142720[58,242 GB]
          Drive [1]  8192[4 MB]
          Drive [2]  8192[4 MB]
          Drive [3]  8192[4 MB]

Protocol : Universal
Running : Ok

Reading GPT[4]
          Drive [0] 64 Items
          Drive [1] 0 Items
          Drive [2] 0 Items
          Drive [3] 0 Items

--------------- Reading build.prop content ---------------
build.prop
  Brand          : xiaomi
  Model          : Redmi Note 5
  Product        : whyred
  ID             : PKQ1.180904.001
  SDK            : 28
  Release        : 9
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-GB
  Description    : whyred-user 9 PKQ1.180904.001 V11.0.3.0.PEIMIXM release-keys
  Device         : whyred
  Display ID     : PKQ1.180904.001
  Security Patch : 2019-11-05
  Fingerprint    : xiaomi/whyred/whyred:9/PKQ1.180904.001/V11.0.3.0.PEIMIXM:user/release-keys
--------------- end of build.prop content ---------------
Reading GPT[4]
          Drive [0] 64 Items
          Drive [1] 0 Items
          Drive [2] 0 Items
          Drive [3] 0 Items

Backing up Partition for safety...Ok

Scanning Patching address...
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]Done!!
Total Items patched : 33
Successfully patched address..

Rebooting Phone.... Ok

Action Result :  Ok

Elapsed Time : 00:00:39
 

Rashi Hydra Tool

Product Manager
Feb 3, 2021
338
317
Hydra Team
Redmi Note 10 (sunny) Flashing done with Hydra Tool


Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                  Qualcomm Flashing Function......              
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

PreOperation Configuration
Brand  XIAOMI Model  Redmi Note 10 (sunny) Storage  Auto
Loader 000950E100720000_1bebe3863a6781db_404ab4f2_XIAOMI_auth.fhprg
Port   Auto

Searching for Qualcomm 9008 Device...Found
FriendlyName Qualcomm HS-USB QDLoader 9008 (COM3)
SymbolicName usb#vid_05c6&pid_9008#6&182a12da&0&7#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver   08022017,2.1.2.7

Getting device info. [Connected].Ok
Device MODE  Firehose
Connecting to Firehose...
Ping..................... Ok
Configuration[FHProt_Auto]........
Ok
Chip Configuration
MemoryName  UFS
MaxPayloadSizeToTargetInBytes  1048576
MaxPayloadSizeToTargetInBytesSupported  1048576
MaxPayloadSizeFromTargetInBytes 
MaxXMLSizeInBytes  4096
TargetName 
Version  1
DateTime  Mar  7 2019 - 230629

STORAGE DEVICE INFO
Memory Type          UFS
Block Size in Bytes  4096
Page Size            4096
Manufacturer ID      300
Serial Number        1129467726
Firmware Version     605
Product Name         MT128GASAO4U21  0605
Physical Partitions  6
Total Logical Blocks
          Drive [0]  30119936[114.898 GB]
          Drive [1]  2048[8 MB]
          Drive [2]  2048[8 MB]
          Drive [3]  32768[128 MB]
          Drive [4]  1048576[4 GB]
          Drive [5]  32768[128 MB]

Protocol  Universal
Running  Ok

Reading GPT[6]
          Drive [0] 32 Items
          Drive [1] 32 Items
          Drive [2] 32 Items
          Drive [3] 32 Items
          Drive [4] 64 Items
          Drive [5] 32 Items

--------------- Reading build.prop content ---------------
build.prop
system
build.prop
  Marketname    ro.product.system
  ID              RKQ1.201022.002
  SDK             30
  Release         11
  ABI             arm64-v8a
  CPU abilist     arm64-v8a,armeabi-v7a,armeabi
  Locale          en-GB
  Security Patch  2021-02-01
--------------- end of build.prop content ---------------

Auto Backup Security partitions...
Reading Security Items....
- modemst1(modemst1.bin), 2.496 MB                    = Ok
- modemst2(modemst2.bin), 2.496 MB                    = Ok
- fsg(fsg.bin), 2.496 MB                              = Ok
- fsc(fsc.bin), 124 KB                                = Ok
- persist(persist.bin), 31.996 MB                     = Ok

CHydra ToolBackupQUALBackupXIAOMI000950E100720000_416AC6D3Auto_Backup070723233523
Backup Security Success....
----------------------------
Flashing Selected Partitions....
- persist[0](persist.img), 32 MB                      = Ok
- misc[0](misc.img), 85 Bytes                         = Ok
- super[0](super_1.img), 396 KB                       = Ok
- super[0](super_2.img), 994.848 MB                   = Ok
- super[0](super_3.img), 341.324 MB                   = Ok
- super[0](super_4.img), 203.25 MB                    = Ok
- super[0](super_5.img), 605.445 MB                   = Ok
- vbmeta_system_a[0](vbmeta_system.img), 4 KB         = Ok
- metadata[0](metadata_1.img), 20 KB                  = Ok
- metadata[0](metadata_2.img), 24 KB                  = Ok
- userdata[0](userdata_1.img), 8 KB                   = Ok
- userdata[0](userdata_2.img), 32 KB                  = Ok
- userdata[0](userdata_3.img), 54.043 MB              = Ok
- userdata[0](userdata_4.img), 4 KB                   = Ok
- userdata[0](userdata_5.img), 4 KB                   = Ok
- userdata[0](userdata_6.img), 12 KB                  = Ok
- userdata[0](userdata_7.img), 20 KB                  = Ok
- userdata[0](userdata_8.img), 24 KB                  = Ok
- userdata[0](userdata_9.img), 44 KB                  = Ok
- userdata[0](userdata_10.img), 3.332 MB              = Ok
- ffu[0](ffu.img), 4 MB                               = Ok
- PrimaryGPT[0](gpt_main0.bin), 24 KB                 = Ok
- xbl_a[1](xbl.elf), 3.452 MB                         = Ok
- xbl_config_a[1](xbl_config.elf), 71.324 KB          = Ok
- PrimaryGPT[1](gpt_main1.bin), 24 KB                 = Ok
- xbl_b[2](xbl.elf), 3.452 MB                         = Ok
- xbl_config_b[2](xbl_config.elf), 71.324 KB          = Ok
- PrimaryGPT[2](gpt_main2.bin), 24 KB                 = Ok
- PrimaryGPT[3](gpt_main3.bin), 24 KB                 = Ok
- aop_a[4](aop.mbn), 157.574 KB                       = Ok
- tz_a[4](tz.mbn), 1.965 MB                           = Ok
- hyp_a[4](hyp.mbn), 368.547 KB                       = Ok
- modem_a[4](NON-HLOS.bin), 115.074 MB                = Ok
- bluetooth_a[4](BTFM.bin), 908 KB                    = Ok
- abl_a[4](abl.elf), 204 KB                           = Ok
- dsp_a[4](dspso.bin), 32 MB                          = Ok
- keymaster_a[4](km41.mbn), 237.132 KB                = Ok
- boot_a[4](boot.img), 128 MB                         = Ok
- cmnlib_a[4](cmnlib.mbn), 389.521 KB                 = Ok
- cmnlib64_a[4](cmnlib64.mbn), 507.959 KB             = Ok
- devcfg_a[4](devcfg.mbn), 42.867 KB                  = Ok
- qupfw_a[4](qupv3fw.elf), 48.081 KB                  = Ok
- vbmeta_a[4](vbmeta.img), 4 KB                       = Ok
- dtbo_a[4](dtbo.img), 8 MB                           = Ok
- imagefv_a[4](imagefv.elf), 20 KB                    = Ok
- uefisecapp_a[4](uefi_sec.mbn), 123.772 KB           = Ok
- vendor_boot_a[4](vendor_boot.img), 96 MB            = Ok
- aop_b[4](aop.mbn), 157.574 KB                       = Ok
- tz_b[4](tz.mbn), 1.965 MB                           = Ok
- hyp_b[4](hyp.mbn), 368.547 KB                       = Ok
- modem_b[4](NON-HLOS.bin), 115.074 MB                = Ok
- bluetooth_b[4](BTFM.bin), 908 KB                    = Ok
- abl_b[4](abl.elf), 204 KB                           = Ok
- dsp_b[4](dspso.bin), 32 MB                          = Ok
- keymaster_b[4](km41.mbn), 237.132 KB                = Ok
- boot_b[4](boot.img), 128 MB                         = Ok
- cmnlib_b[4](cmnlib.mbn), 389.521 KB                 = Ok
- cmnlib64_b[4](cmnlib64.mbn), 507.959 KB             = Ok
- devcfg_b[4](devcfg.mbn), 42.867 KB                  = Ok
- qupfw_b[4](qupv3fw.elf), 48.081 KB                  = Ok
- vbmeta_b[4](vbmeta.img), 4 KB                       = Ok
- dtbo_b[4](dtbo.img), 8 MB                           = Ok
- imagefv_b[4](imagefv.elf), 20 KB                    = Ok
- uefisecapp_b[4](uefi_sec.mbn), 123.772 KB           = Ok
- devinfo[4](devinfo.img), 25 Bytes                   = Ok
- logfs[4](logfs_ufs_8mb.bin), 16 KB                  = Ok
- storsec[4](storsec.mbn), 20.091 KB                  = Ok
- secdata[4](sec.elf), 12.465 KB                      = Ok
- PrimaryGPT[4](gpt_main4.bin), 24 KB                 = Ok
- PrimaryGPT[5](gpt_main5.bin), 24 KB                 = Ok

Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-6.]                                = Ok
0 [NUM_DISK_SECTORS-6.]                                = Ok
0 [NUM_DISK_SECTORS-6.]                                = Ok
0 [NUM_DISK_SECTORS-6.]                                = Ok
0 [NUM_DISK_SECTORS-1.]                                = Ok
0 [NUM_DISK_SECTORS-1.]                                = Ok
0 [NUM_DISK_SECTORS-5.]                                = Ok
0 [CRC32(2,4096)]                                      = Ok
0 [CRC32(NUM_DISK_SECTORS-5.,4096)]                    = Ok
0 [0]                                                  = Ok
0 [CRC32(1,92)]                                        = Ok
0 [0]                                                  = Ok
0 [CRC32(NUM_DISK_SECTORS-1.,92)]                      = Ok
1 [NUM_DISK_SECTORS-6.]                                = Ok
1 [NUM_DISK_SECTORS-6.]                                = Ok
1 [NUM_DISK_SECTORS-6.]                                = Ok
1 [NUM_DISK_SECTORS-6.]                                = Ok
1 [NUM_DISK_SECTORS-1.]                                = Ok
1 [NUM_DISK_SECTORS-1.]                                = Ok
1 [NUM_DISK_SECTORS-5.]                                = Ok
1 [CRC32(2,4096)]                                      = Ok
1 [CRC32(NUM_DISK_SECTORS-5.,4096)]                    = Ok
1 [0]                                                  = Ok
1 [CRC32(1,92)]                                        = Ok
1 [0]                                                  = Ok
1 [CRC32(NUM_DISK_SECTORS-1.,92)]                      = Ok
2 [NUM_DISK_SECTORS-6.]                                = Ok
2 [NUM_DISK_SECTORS-6.]                                = Ok
2 [NUM_DISK_SECTORS-6.]                                = Ok
2 [NUM_DISK_SECTORS-6.]                                = Ok
2 [NUM_DISK_SECTORS-1.]                                = Ok
2 [NUM_DISK_SECTORS-1.]                                = Ok
2 [NUM_DISK_SECTORS-5.]                                = Ok
2 [CRC32(2,4096)]                                      = Ok
2 [CRC32(NUM_DISK_SECTORS-5.,4096)]                    = Ok
2 [0]                                                  = Ok
2 [CRC32(1,92)]                                        = Ok
2 [0]                                                  = Ok
2 [CRC32(NUM_DISK_SECTORS-1.,92)]                      = Ok
3 [NUM_DISK_SECTORS-6.]                                = Ok
3 [NUM_DISK_SECTORS-6.]                                = Ok
3 [NUM_DISK_SECTORS-6.]                                = Ok
3 [NUM_DISK_SECTORS-6.]                                = Ok
3 [NUM_DISK_SECTORS-1.]                                = Ok
3 [NUM_DISK_SECTORS-1.]                                = Ok
3 [NUM_DISK_SECTORS-5.]                                = Ok
3 [CRC32(2,4096)]                                      = Ok
3 [CRC32(NUM_DISK_SECTORS-5.,4096)]                    = Ok
3 [0]                                                  = Ok
3 [CRC32(1,92)]                                        = Ok
3 [0]                                                  = Ok
3 [CRC32(NUM_DISK_SECTORS-1.,92)]                      = Ok
4 [NUM_DISK_SECTORS-6.]                                = Ok
4 [NUM_DISK_SECTORS-6.]                                = Ok
4 [NUM_DISK_SECTORS-6.]                                = Ok
4 [NUM_DISK_SECTORS-6.]                                = Ok
4 [NUM_DISK_SECTORS-1.]                                = Ok
4 [NUM_DISK_SECTORS-1.]                                = Ok
4 [NUM_DISK_SECTORS-5.]                                = Ok
4 [CRC32(2,8192)]                                      = Ok
4 [CRC32(NUM_DISK_SECTORS-5.,8192)]                    = Ok
4 [0]                                                  = Ok
4 [CRC32(1,92)]                                        = Ok
4 [0]                                                  = Ok
4 [CRC32(NUM_DISK_SECTORS-1.,92)]                      = Ok
5 [NUM_DISK_SECTORS-6.]                                = Ok
5 [NUM_DISK_SECTORS-6.]                                = Ok
5 [NUM_DISK_SECTORS-6.]                                = Ok
5 [NUM_DISK_SECTORS-6.]                                = Ok
5 [NUM_DISK_SECTORS-1.]                                = Ok
5 [NUM_DISK_SECTORS-1.]                                = Ok
5 [NUM_DISK_SECTORS-5.]                                = Ok
5 [CRC32(2,4096)]                                      = Ok
5 [CRC32(NUM_DISK_SECTORS-5.,4096)]                    = Ok
5 [0]                                                  = Ok
5 [CRC32(1,92)]                                        = Ok
5 [0]                                                  = Ok
5 [CRC32(NUM_DISK_SECTORS-1.,92)]                      = Ok
Operation  Setbootablestoragedrive Drive 1
Set bootable storage drive 1 Ok

Rebooting Phone.... Ok

Elapsed Time  000242

 

Rashi Hydra Tool

Product Manager
Feb 3, 2021
338
317
Hydra Team
Xiaomi POCO X3 Pro (vayu) Safe Format with Hydra Tool


- Safe format phone with Mi Assistant mode

Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                        Xiaomi Tool
                       Factory Reset
                        Safe Format
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Adb Handler [Console]
Starting ADB Server....
Searching Device By ADB [sideload]
Device Found...
Sate           : sideload
Product name   : vayu_global
Product model  : vayu_global
Product device : vayu


Model                       :      vayu_global
Android VERSION             :      11
OS Version                  :      V12.5.7.0.RJUMIXM
Branch                      :      F
Language                    :     
Region                      :      GB
Sideload Factory Reset...
Sideload Safe Format....
Processing...
Action Result : Ok

Elapsed Time : 00:00:00




Action Result :  Ok

Elapsed Time : 00:00:02
 

GsmToto

Super Moderator
Jan 1, 2021
5,017
21,654
UK
Skype
gsmtoto
Sonork ID
100.1684601
Hydra Tool Ver 2024.1.26.0
Windows 10 (Version 22H2, OS Build 19045.3930, 64-bit Edition)
Intel(R) Core(TM) i5 CPU 660 @ 3.33GHz
Intel(R) HD Graphics
Ram Installed : 4 GB
Windows Access Right : Admin
Software Run As Admnistrator


******* Dongle Info *******
Version : Hydra Tool v 1.3
Serial : 190300000856
Initialize : OKAY
Status : Activated
Life : 0 [0-0-0-0-0]

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Service Function
Xiaomi
Remove MiAccount [New Method]
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching for MTK Device...Found
MTK Port Type : Flashmode BROM
FriendlyName : MediaTek USB Port (COM5)
Device : /6&23c67e70&0&6
SymbolicName : \\?\usb#vid_0e8d&pid_0003#6&23c67e70&0&6#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0
Service : wdm_usb

Reading Partition Table ..
ERAM Size : 0x0000000000080000-512 KB
IRAM Size : 0x0000000180000000-6 GB
UFS MID : 0x4B
UFS FWVer : 0x0600
UFS Blocksize : 0x0000000000001000-4 KB
UFS LU0 Size : 0x0000000000400000-4 MB
UFS LU1 Size : 0x0000000000400000-4 MB
UFS LU2 Size : 0x0000000EE5800000-59.586 GB
UFS ID : 2
UFS CID : 4B4D324837303031434D2D423531380000000000
HW-CODE : 0x813
HWSUB-CODE : 0x8A00
HW-VERSION : 0xCA00
SW-VERSION : 0x0
CHIP-EVOLUTION : 0x0
DA-VERSION : 1.0
Speed : high-speed
Partition Count : 50
Brand : Redmi
Vendor : Xiaomi
Model : Redmi Note 8 Pro
Product : begonia
Manufacturer : Xiaomi
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : begonia-user 9 PPR1.180610.011 V11.0.3.0.PGGEUXM release-keys
Miui Ver : V11
Device : begonia
Display ID : PPR1.180610.011
Security Patch : 2019-11-01
Fingerprint : Redmi/begonia_eea/begonia:9/PPR1.180610.011/V11.0.3.0.PGGEUXM:user/release-keys
StorageType : mtp

Reading IMEI........
IMEI1 [nvdata] : 86075204xxxxxxxxxxxxx
IMEI2 [nvdata] : 8607520xxxxxxxxxxxx
IMEI1 : 8607520xxxxxxxxxxx
IMEI2 : 8607520xxxxxxxxxxx
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------
------------------------------
Xiaomi Operation Flash Mode..
------------------------------
Backing up Security..
- persist... Ok
- vbmeta... Ok
Patching Persist

Scanning Patching address...Please wait...
No patching address available...
Seems like device has no Mi Account added
-vbmeta .....Ok
Done Writing...
Please wait, processing.....
Status: Ok

Action Result : Ok

Elapsed Time : 00:01:27
 
  • Like
Reactions: .::Gorbagy::.
Top