Hydra Redmi Note 8 (ginkgo) Mi Account Remove with Hydra Tool

Hydra Tool

Rashi Hydra Tool

Product Manager
Feb 3, 2021
338
317
Hydra Team
Redmi Note 8 (ginkgo) Mi Account Remove with Hydra Tool


- First keep press boot info

Code:
PreOperation Configuration
Brand : XIAOMI Model : Redmi Note 8 (ginkgo) Storage : Auto
Loader: 0010A0E100720000_1bebe3863a6781db_76196dc8_XIAOMI.fhprg
Port  : Auto

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM7)
SymbolicName :\\?\usb#vid_05c6&pid_9008#5&39af0d16&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver   :03/25/2016,2.1.2.2

Getting device info. [Connected].....
Serial No.: 0xAD3C806D
HW_ID     : 0010A0E100720000
MSM ID    : 0x0010A0E1, SM6125-Qualcomm Snapdragon 665/NicobarPkgLAA
MODEL_ID  : 0x0000
OEM_ID    : 0x0072 - XIAOMI
PBL Ver   : 00000000
PK HASH   : 1bebe3863a6781db4b01086063007334de9e5ca14971c7c4f4358ec9d79cda46

Firehose Loader[0010A0E100720000_1bebe3863a6781db_76196dc8_XIAOMI.fhprg]
--------------------------------------------------
  Header Type    : New
  TargetMSM      :
  Tag            :
  Version        : 6
  Code_size      : 816
  Signature_size : 256
  fhVendor       : XIAOMI
  HW_ID          : 0010A0E100720000
  Vendor         : XIAOMI
  OEM_ID         : 0072
  MODEL_ID       : 0000
  SW_ID          : 00000003
  APP_ID         : 00000000
  pk_hash        : 1bebe3863a6781db4b01086063007334de9e5ca14971c7c4f4358ec9d79cda4692ce5e948c6fd409408f4c919fcadfe3
  OEM_VERSION    : cibuild
  IMAGE_VARIANT  : NicobarPkgLAA
  QC_VERSION     : BOOT.XF.4.0-00149-NICOBARLAZ-1
--------------------------------------------------

SaharaBoot... Ok
Sending ..............................Ok
Connecting to Firehose...
Ping..................... Ok
Configuration[FHProt_Auto].........
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Jul  3 2019 - 22:23:56

*** STORAGE DEVICE INFO ***
Memory Type         : eMMC
Block Size in Bytes : 512
Page Size           : 512
Manufacturer ID     : 19
Serial Number       : 250426836
Firmware Version    : 4
Product Name        : S0J9K9
Physical Partitions : 4
Total Logical Blocks:
          Drive [0]  244285440[116,484 GB]
          Drive [1]  8192[4 MB]
          Drive [2]  8192[4 MB]
          Drive [3]  32768[16 MB]

Protocol : Universal
Running : Ok

Reading GPT[4]
          Drive [0] 88 Items
          Drive [1] 0 Items
          Drive [2] 0 Items
          Drive [3] 0 Items

--------------- Reading build.prop content ---------------
build.prop
system
build.prop
  ID             : RKQ1.201004.002
  SDK            : 30
  Release        : 11
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-GB
  Security Patch : 2022-05-01
--------------- end of build.prop content ---------------

Auto Backup Security partitions...
Reading Security Items....
- modemst1(modemst1.bin), 2 MB                        = Ok
- modemst2(modemst2.bin), 2 MB                        = Ok
- fsg(fsg.bin), 10 MB                                 = Ok
- fsc(fsc.bin), 127,5 KB                              = Ok
- persist(persist.bin), 64 MB                         = Ok

C:\Hydra Tool\Backup\QUALBackup\XIAOMI\0010A0E100720000_AD3C806D\Auto_Backup\07072314111702
Backup Security Success....

Elapsed Time : 00:01:53



- Remove mi Account ( Patch Method )

Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                        Xiaomi Tool
                         Mi Account
               Remove MiAccount[Patch Method]
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

PreOperation Configuration
Brand : XIAOMI Model : Redmi Note 8 (ginkgo) Storage : Auto
Loader: 0010A0E100720000_1bebe3863a6781db_76196dc8_XIAOMI.fhprg
Port  : Auto

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM7)
SymbolicName :\\?\usb#vid_05c6&pid_9008#5&39af0d16&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver   :03/25/2016,2.1.2.2

Getting device info. [Connected].Ok
Device MODE : Firehose
Connecting to Firehose...
Ping..................... Ok
Configuration[FHProt_Auto].........
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Jul  3 2019 - 22:23:56

*** STORAGE DEVICE INFO ***
Memory Type         : eMMC
Block Size in Bytes : 512
Page Size           : 512
Manufacturer ID     : 19
Serial Number       : 250426836
Firmware Version    : 4
Product Name        : S0J9K9
Physical Partitions : 4
Total Logical Blocks:
          Drive [0]  244285440[116,484 GB]
          Drive [1]  8192[4 MB]
          Drive [2]  8192[4 MB]
          Drive [3]  32768[16 MB]

Protocol : Universal
Running : Ok

Reading GPT[4]
          Drive [0] 88 Items
          Drive [1] 0 Items
          Drive [2] 0 Items
          Drive [3] 0 Items

--------------- Reading build.prop content ---------------
build.prop
system
build.prop
  ID             : RKQ1.201004.002
  SDK            : 30
  Release        : 11
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-GB
  Security Patch : 2022-05-01
--------------- end of build.prop content ---------------
Reading GPT[4]
          Drive [0] 88 Items
          Drive [1] 0 Items
          Drive [2] 0 Items
          Drive [3] 0 Items

Backing up Partition for safety...Ok

Scanning Patching address...
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]Done!!
Total Items patched : 6
Successfully patched address..

Action Result :  Ok

Elapsed Time : 00:03:02
 

Rashi Hydra Tool

Product Manager
Feb 3, 2021
338
317
Hydra Team
Samsung A10s (SM-A107M) FRP Lock Remove with Hydra Tool

- Keep press Boot info
Code:
-------------------------------------------------------
To Enable BROM  Mode :
     Method 1    - Bootkey (Vol + - Power) or any combination
     Method 2    - Enable Preloader to brom(crashing Method)
     Method 3    - Test Point Data0 + ground
To Enable Preloader  Mode :
     Method 1    - Just Insert cable
-------------------------------------------------------

Searching for MTK Device...Found
  MTK Port Type   : Flashmode Preloader
  FriendlyName    : MediaTek PreLoader USB VCOM (Android) (COM16)
  Device          : /5&54725e2&0&1
  SymbolicName    : \\?\usb#vid_0e8d&pid_2000#5&54725e2&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 01/22/2016,3.2
  Service         : wdm_usb

Openning Port [COM16] Ok
Handshaking...Ok
  HwCode          : 0766 {MT6765/MT8768t}
  Hwver           : 0000
  Target config   : 05
  SBC             : 01 (True)
  SLA             : 00 (False)
  DAA             : 04 (True)
  SWJTAG          : 04 (True)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 00 (False)
  MEMWRITE        : 00 (False)
  CMD_C8          : 00 (False)
  Connection      : Preloader
  HW Subcode      : 8A00
  HW Subcode      : CA00
  SW Ver          : 0000
  ME_ID           : A8D24BBCE07C150F92E2C5BE255A1383


- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                  Preloader To Brom Function.....              
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- Method 1  Exploit Executed..... [Successfully Crash Preloader.]
Device now is BROM Port
Device not yet filterd...
Executing LibUSB Filter..
Device Now Filtered...Restarting Device Port..

Openning Port [COM11] Ok

Exploiting Device...
Successfully Exploited..
Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..Found @ 0x00200BC4
Starting to dump...
Prel Size : 0x0003E84C
Successfully dump preloader..  [C:\Hydra Tool\Boot\PreloaderDump\preloader_s96116ca1.bin]
  Target config   : 00
  SBC             : 00 (False)
  SLA             : 00 (False)
  DAA             : 00 (False)
  SWJTAG          : 00 (False)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 00 (False)
  MEMWRITE        : 00 (False)
  CMD_C8          : 00 (False)
  Connection      : BROM

Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin]
Patching da2 ... Ok
Uploading Stage 1....
Successfully uploaded stage 1, jumping ..
Executing JUMP_DA Address @ 0x00200000
Jumping to 0x00200000 Ok 0xC0
Successfully received DA sync
  ONNECTION_AGENT : brom
  DRAM config needed for : 150100515836334D
Sending auto preloader from dump...  [preloader_s96116ca1.bin]
Sending emi data.. [DRAM setup passed.]
Sending emi data succeeded.
Uploading stage 2...
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
  ERAM Size       : 0x000000000003A000-232 KB
  IRAM Size       : 0x0000000080000000-2 GB
  EMMC Boot1 Size : 0x0000000000400000-4 MB
  EMMC Boot2 Size : 0x0000000000400000-4 MB
  EMMC RPMB Size  : 0x0000000001000000-16 MB
  EMMC USER Size  : 0x0000000747C00000-29,121 GB
  EMMC CID        : 150100515836334D4200892AF498C7BB - QX63MB
  HW-CODE         : 0x766
  HWSUB-CODE      : 0x8A00
  HW-VERSION      : 0xCA00
  SW-VERSION      : 0x0
  CHIP-EVOLUTION  : 0x0
  DA-VERSION      : 1.0
  Speed           : high-speed
Upload data was accepted. Jumping to stage 2...
DA Extensions successfully added
Reading Partition Table ..
Partition Count : 41
--------------- Reading build.prop content ---------------
  Product        : a10s
  ID             : QP1A.190711.020
  SDK            : 29
  Release        : 10
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Locale         : en-GB
  Description    : a10sub-user 10 QP1A.190711.020 A107MUBU5BUF1 release-keys
  Display ID     : QP1A.190711.020.A107MUBU5BUF1
  Security Patch : 2021-04-01
  StorageType    : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
IMEI1 : 52ACA2*********
IMEI2 : 8D761B*********
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------
Backing up Security..
- preloader(preloader.bin), 512 KB                    = Ok  [preloader_s96116ca1.bin]
  *Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0766_A8D24fD3C150F92E2C5BE255A1383\Auto\0707444373656\6765_Android_scatter.txt
- pgpt(pgpt.bin), 4 MB                                = Ok
- nvram(nvram.bin), 64 MB                             = Ok
- nvdata(nvdata.bin), 64 MB                           = Ok
- frp(frp.bin), 1024 KB                               = Ok
- persistent(persistent.bin), 512 KB                  = Ok
- protect1(protect1.bin), 8 MB                        = Ok
- protect2(protect2.bin), 8 MB                        = Ok
- persist(persist.bin), 48 MB                         = Ok
- proinfo(proinfo.bin), 3 MB                          = Ok
- nvcfg(nvcfg.bin), 32 MB                             = Ok
- sec1(sec1.bin), 2 MB                                = Ok
- seccfg(seccfg.bin), 8 MB                            = Ok
- lk(lk.bin), 2 MB                                    = Ok
Backup Done!!!

Elapsed Time : 00:01:22



- Go to PM Tab and Read Patitions
Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                  MTK Partition Manager Function...              
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching for MTK Device...Found
  MTK Port Type   : Flashmode BROM
  FriendlyName    : MediaTek USB Port (COM11)
  Device          : /5&54725e2&0&1
  SymbolicName    : \\?\usb#vid_0e8d&pid_0003#5&54725e2&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 01/22/2016,3.2
  Service         : wdm_usb

Openning Port [COM11] Ok
Reading Partition Table ..
  ERAM Size       : 0x000000000003A000-232 KB
  IRAM Size       : 0x0000000080000000-2 GB
  EMMC Boot1 Size : 0x0000000000400000-4 MB
  EMMC Boot2 Size : 0x0000000000400000-4 MB
  EMMC RPMB Size  : 0x0000000001000000-16 MB
  EMMC USER Size  : 0x0000000747C00000-29,121 GB
  EMMC CID        : 150100515836334D4200892AF498C7BB - QX63MB
  HW-CODE         : 0x766
  HWSUB-CODE      : 0x8A00
  HW-VERSION      : 0xCA00
  SW-VERSION      : 0x0
  CHIP-EVOLUTION  : 0x0
  DA-VERSION      : 1.0
  Speed           : high-speed
Partition Count : 41
--------------- Reading build.prop content ---------------
  Product        : a10s
  ID             : QP1A.190711.020
  SDK            : 29
  Release        : 10
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Locale         : en-GB
  Description    : a10sub-user 10 QP1A.190711.020 A107MUBU5BUF1 release-keys
  Display ID     : QP1A.190711.020.A107MUBU5BUF1
  Security Patch : 2021-04-01
  StorageType    : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
IMEI1 : 52ACA2*********
IMEI2 : 8D761B*********
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------


Elapsed Time : 00:00:03




- Select Persistent file and Erase

Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                  MTK Partition Manager Function...              
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching for MTK Device...Found
  MTK Port Type   : Flashmode BROM
  FriendlyName    : MediaTek USB Port (COM11)
  Device          : /5&54725e2&0&1
  SymbolicName    : \\?\usb#vid_0e8d&pid_0003#5&54725e2&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 01/22/2016,3.2
  Service         : wdm_usb

Openning Port [COM11] Ok
Reading Partition Table ..
  ERAM Size       : 0x000000000003A000-232 KB
  IRAM Size       : 0x0000000080000000-2 GB
  EMMC Boot1 Size : 0x0000000000400000-4 MB
  EMMC Boot2 Size : 0x0000000000400000-4 MB
  EMMC RPMB Size  : 0x0000000001000000-16 MB
  EMMC USER Size  : 0x0000000747C00000-29,121 GB
  EMMC CID        : 150100515836334D4200892AF498C7BB - QX63MB
  HW-CODE         : 0x766
  HWSUB-CODE      : 0x8A00
  HW-VERSION      : 0xCA00
  SW-VERSION      : 0x0
  CHIP-EVOLUTION  : 0x0
  DA-VERSION      : 1.0
  Speed           : high-speed
Partition Count : 41
--------------- Reading build.prop content ---------------
  Product        : a10s
  ID             : QP1A.190711.020
  SDK            : 29
  Release        : 10
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Locale         : en-GB
  Description    : a10sub-user 10 QP1A.190711.020 A107MUBU5BUF1 release-keys
  Display ID     : QP1A.190711.020.A107MUBU5BUF1
  Security Patch : 2021-04-01
  StorageType    : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
IMEI1 : 52ACA2*********
IMEI2 : 8D761B*********
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------

Format Selected Partitions..
-persistent .....Ok
Done Format...

Elapsed Time : 00:00:05

 

Rashi Hydra Tool

Product Manager
Feb 3, 2021
338
317
Hydra Team
Vivo V5s (PD1612DF) FRP Lock Remove With Hydra Tool


- Select Remove frp lock and click Execute
Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                      Service Function
               Factory Reset Protection[FRP]
                            Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching for MTK Device...Found
  MTK Port Type   : Flashmode BROM
  FriendlyName    : MediaTek USB Port_V1632 (COM77)
  Device          : /6&3b069a8e&0&4
  SymbolicName    : \\?\usb#vid_0e8d&pid_0003#6&3b069a8e&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 01/22/2015,3.0.1504.0
  Service         : wdm_usb

Openning Port [COM77] Ok
Handshaking...Ok
  HwCode          : 0326 {MT6755/M/T/S}
  Hwver           : 0000
  Target config   : 05
  SBC             : 01 (True)
  SLA             : 00 (False)
  DAA             : 04 (True)
  SWJTAG          : 04 (True)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 00 (False)
  MEMWRITE        : 00 (False)
  CMD_C8          : 00 (False)
  Connection      : BROM
  HW Subcode      : 8A00
  HW Subcode      : CB00
  SW Ver          : 0001
  ME_ID           : E1F68D290FB3967A4F838F8CF046585D

Exploiting Device...
Successfully Exploited..
Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..Found @ 0x00200B40
Starting to dump...
Prel Size : 0x000282FC
Successfully dump preloader..  [C:\Hydra Tool\Boot\PreloaderDump\preloader_bbk6750_66_n.bin]
  Target config   : 00
  SBC             : 00 (False)
  SLA             : 00 (False)
  DAA             : 00 (False)
  SWJTAG          : 00 (False)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 00 (False)
  MEMWRITE        : 00 (False)
  CMD_C8          : 00 (False)
  Connection      : BROM

Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin]
Uploading Stage 1....
Successfully uploaded stage 1, jumping ..
Executing JUMP_DA Address @ 0x00200000
Jumping to 0x00200000 Ok 0xC0
Successfully received DA sync
  ONNECTION_AGENT : brom
Sending auto preloader from dump...  [preloader_bbk6750_66_n.bin]
Sending emi data.. [DRAM setup passed.]
Sending emi data succeeded.
Uploading stage 2...
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
  ERAM Size       : 0x0000000000038000-224 KB
  IRAM Size       : 0x0000000100000000-4 GB
  EMMC Boot1 Size : 0x0000000000400000-4 MB
  EMMC Boot2 Size : 0x0000000000400000-4 MB
  EMMC RPMB Size  : 0x0000000000400000-4 MB
  EMMC USER Size  : 0x0000000E8F800000-58.242 GB
  EMMC CID        : 150100524836344D42055BE8C6152469 - RH64MB
  HW-CODE         : 0x6750
  HWSUB-CODE      : 0x8A00
  HW-VERSION      : 0xCB00
  SW-VERSION      : 0x1
  CHIP-EVOLUTION  : 0x0
  DA-VERSION      : 1.0
  Speed           : full-speed
Reconnecting to preloader...
Connected to preloader
Error:  on sending data: DA hash mismatch
*DA Extensions failed to enable
Reading Partition Table ..
Reconnecting to preloader...
Connected to preloader
Partition Count : 36
--------------- Reading build.prop content ---------------
  Brand          : vivo
  Vendor         : vivo
  Model          : vivo 1601
  Product        : bbk6750_66_n
  Manufacturer   : vivo
  ID             : NRD90M
  SDK            : 24
  Release        : 7.0
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-US
  Description    : full_bbk6750_66_n-user 7.0 NRD90M 1561083168 release-keys
  Device         : 1601
  Display ID     : NRD90M release-keys
  Security Patch : 2019-06-05
  Platform       : mt6750
  Fingerprint    : vivo/1601/1601:7.0/NRD90M/1561083168:user/release-keys
  StorageType    : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
IMEI1 : 5D02**********
IMEI2 : 5D02**********
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------
Reconnecting to preloader...
Connected to preloader

Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!

Action Result :  Ok

Elapsed Time : 00:00:26

 

Rashi Hydra Tool

Product Manager
Feb 3, 2021
338
317
Hydra Team
Xiaomi Redmi Note 9 (Merlin) FRP Lock Remove with Hydra Tool

- Select frp lock and click Execute

Code:
-------------------------------------------------------
To Enable BROM  Mode :
     Method 1    - Bootkey (Vol + - Power) or any combination
     Method 2    - Enable Preloader to brom(crashing Method)
     Method 3    - Test Point Data0 + ground
To Enable Preloader  Mode :
     Method 1    - Just Insert cable
-------------------------------------------------------

Searching for MTK Device...Found
  MTK Port Type   : Flashmode BROM
  FriendlyName    : MediaTek USB Port (COM11)
  Device          : /5&54725e2&0&1
  SymbolicName    : \\?\usb#vid_0e8d&pid_0003#5&54725e2&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 01/22/2016,3.2
  Service         : wdm_usb

Openning Port [COM11] Ok
Handshaking...Ok
  HwCode          : 0707 {MT6768}
  Hwver           : 0000
  Target config   : E7
  SBC             : 01 (True)
  SLA             : 02 (True)
  DAA             : 04 (True)
  SWJTAG          : 06 (True)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 20 (True)
  MEMWRITE        : 40 (True)
  CMD_C8          : 80 (True)
  Connection      : BROM
  HW Subcode      : 8A00
  HW Subcode      : CA00
  SW Ver          : 0000
  ME_ID           : DD353FB6B4504662CC39652D1D2787D9
  SOC_ID          : 79E8FA5C6EFF00D269D86D5A749A8A67D846170C4D54B382A54A11ADFBFC3741

Exploiting Device...
Successfully Exploited..
Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..Found @ 0x00200BC4
Starting to dump...
Prel Size : 0x000448B0
Successfully dump preloader..  [C:\Hydra Tool\Boot\PreloaderDump\preloader_merlin.bin]
  Target config   : 00
  SBC             : 00 (False)
  SLA             : 00 (False)
  DAA             : 00 (False)
  SWJTAG          : 00 (False)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 00 (False)
  MEMWRITE        : 00 (False)
  CMD_C8          : 00 (False)
  Connection      : BROM

Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin]
Patching da2 ... Ok
Uploading Stage 1....
Successfully uploaded stage 1, jumping ..
Executing JUMP_DA Address @ 0x00200000
Jumping to 0x00200000 Ok 0xC0
Successfully received DA sync
  ONNECTION_AGENT : brom
  DRAM config needed for : 13014E47314A3953
Sending auto preloader from dump...  [preloader_merlin.bin]
Sending emi data.. [DRAM setup passed.]
Sending emi data succeeded.
Uploading stage 2...
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
  ERAM Size       : 0x0000000000070000-448 KB
  IRAM Size       : 0x0000000100000000-4 GB
  EMMC Boot1 Size : 0x0000000000400000-4 MB
  EMMC Boot2 Size : 0x0000000000400000-4 MB
  EMMC RPMB Size  : 0x0000000001000000-16 MB
  EMMC USER Size  : 0x0000001D1F000000-116,484 GB
  EMMC CID        : 13014E47314A3953391006B93FB56725 - G1J9S9
  HW-CODE         : 0x707
  HWSUB-CODE      : 0x8A00
  HW-VERSION      : 0xCA00
  SW-VERSION      : 0x0
  CHIP-EVOLUTION  : 0x1
  DA-VERSION      : 1.0
  Speed           : high-speed
Upload data was accepted. Jumping to stage 2...
DA Extensions successfully added
Reading Partition Table ..
Partition Count : 49
--------------- Reading build.prop content ---------------
  Product        : merlin
  Marketname   : ro.product.systemRedmi Note 9
  ID             : RP1A.200720.011
  SDK            : 30
  Release        : 11
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-GB
  Description    : merlin-user 11 RP1A.200720.011 V12.0.6.0.RJOLMCR release-keys
  Display ID     : RP1A.200720.011
  Security Patch : 2022-08-01
  StorageType    : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
IMEI1 : 865289*********
IMEI2 : 865289*********
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------
Backing up Security..
- preloader(preloader.bin), 512 KB                    = Ok  [preloader_merlin.bin]
  *Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0707_DD353CD3504662CC39652D1D2787D9\Auto\0707231344105\6768_Android_scatter.txt
- pgpt(pgpt.bin), 32 KB                               = Ok
- nvram(nvram.bin), 64 MB                             = Ok
- nvdata(nvdata.bin), 64 MB                           = Ok
- frp(frp.bin), 1024 KB                               = Ok
- protect1(protect1.bin), 8 MB                        = Ok
- protect2(protect2.bin), 11,367 MB                   = Ok
- persist(persist.bin), 48 MB                         = Ok
- proinfo(proinfo.bin), 3 MB                          = Ok
- nvcfg(nvcfg.bin), 32 MB                             = Ok
- sec1(sec1.bin), 2 MB                                = Ok
- seccfg(seccfg.bin), 8 MB                            = Ok
- lk(lk.bin), 2 MB                                    = Ok
Backup Done!!!

Elapsed Time : 00:00:41

 
Top