Quantcast
Channel: GSM-Forum
Viewing all 449259 articles
Browse latest View live

NCK Dongle / Pro Spreadtrum Module v1.7 Update Released - [17/04/2021]

$
0
0


NCK Dongle NCK Pro Dongle

We Make IT Possible


What's New?

NCK Dongle / Pro SPRD Module


11 YEARS NON STOP UPDATES
11 Years of support
11 Years together
11 Years earning together
11 Years & still don't have NCK ?!!!

vivo s1 1907 pattern passcode removed with hydra dongle

$
0
0
Vivo S1 (1907) passcode removed with Hydra Mtk Module

Code:

Hydra MediaTeK Tool  Ver 1.0.3 Build 20
Windows 7 Service Pack 1 (Version 6.1, Build 7601, 64-bit Edition)
Intel(R) Core(TM) i3 CPU      M 380  @ 2.53GHz
Standard VGA Graphics Adapter
Ram Installed : 3 GB
Windows Access Right Admin
Software Run As Admnistrator
******* Dongle Info *******
Version    : Hydra Tool v 1.2
Serial    : 190300000281
Initialize : OKAY
Status    : Activated
Life      : 0 [0-0-0-0-0]


---------------------------------
Searching for MTK Device...Found
 Port Identification :METAMODE Preloader
 FriendlyName :MediaTek USB VCOM (Android) (COM8)
 SymbolicName :\??\USB#VID_0E8D&PID_2007#6&28c53095&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver  :01/22/2015,3.0.1504.0


META Phone Info . . .
MCUID: 8U  `    mt6768
ME_SO: .bsp_P137
DATE : Sat Jan 16 17:41:56 CST 2021
MODEL: QP1A.190711.020 release-keys
ME_SWVER: alps-mp-q0.mp1.tc19sp-V1.0.2_bbk.q0mp1.k71v1.64


Reset to Factory Default Ok
Rebooting....
Done!!!

Elapsed Time : 00:00:02

Xiaomi Mi Mix 3 Perseus Universal Auto Unlock Successfully done by Hydra Tool

$
0
0
Xiaomi Mi Mix 3 Perseus Universal Auto Unlock Successfully done by Hydra Tool

Screen Short:



Logs:

Quote:

PreOperation Configuration
Brand : XIAOMI Model : Mi Mix 3 (perseus) Storage : Auto
Loader: Xiaomi_Mix 3_firehose_sdm845_ddr.elf
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM4)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&22ed776c&0&3#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :12/17/2018,2.1.3.5

Getting device info......
Serial No.: 0xD18A02BA
MSM ID : 0x0008B0E1, SDM845-Qualcomm Snapdragon 845
PBL Ver : 00000000
PK HASH : C924A35F39CE1CDD1B8D5A9F3B8E3C51
317930431D7A9DD5A55028CF6965FE65

Firehose Loader[Xiaomi_Mix 3_firehose_sdm845_ddr.elf]
SaharaBoot... Ok
Sending ....................................Ok
Connecting to Firehose...
Ping..................... Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[z3
Checking Internet connection....
- Hydra Is Online
Connecting to Hydra Xiaomi Server...

Signature @256bytes Authentication.... Accepted........
Identifying Chip........UFS
Ok
Chip Configuration :
MemoryName : UFS
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Oct 22 2018 - 19:22:16

*** STORAGE DEVICE INFO ***
Memory Type : UFS
Block Size in Bytes : 4096
Page Size : 4096
Manufacturer ID : 325
Serial Number : 538976288
Firmware Version : 254
Product Name : SDINDDH4-128G 1254
Physical Partitions : 6
Total Logical Blocks:
Drive [0] 29917184[114.125 GB]
Drive [1] 2048[8 MB]
Drive [2] 2048[8 MB]
Drive [3] 8192[32 MB]
Drive [4] 1310720[5 GB]
Drive [5] 8192[32 MB]

Protocol : Universal
Running : Ok
Reading GPT[6]
Drive [0] 32 Items
Drive [1] 32 Items
Drive [2] 32 Items
Drive [3] 32 Items
Drive [4] 64 Items
Drive [5] 32 Items


Phone Information......
Vendor : Xiaomi
ID : QKQ1.190828.002
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Miui Ver : V12
Mod_device : perseus_global
Security Patch : 2020-10-01

Processing Unlock - Universal - Auto....
Action Result : Ok

Elapsed Time : 00:00:20
BR
Dipendra Pathak

a30S patch cert ok but imei still NG no network connection

$
0
0
i did this procedure 3 times first rooted with magisk no patch cert after that i rooted with eftsu root ok but when i patch cert it makes all the procedure correct but when the phone starts doesnt read sim card imei NG status i need a little help i even flash the oldest firmare bit 4 security patch
heres the log



Patch certificate started
Gathering phone info...
Collecting information. Be patient! Do NOT disconnect the phone!
Model: SM-A307G
Carrier ID: CGU
Sales Code: CGU
Country Code: Guatemala
Timezone: America/Managua
Android Version: 9 [PPR1.180610.011] [SDK 28]
Build Date: Fri Feb 21 00:32:42 KST 2020
PDA Version: A307GUBS4ATB5 [february 2020, rev5]
Phone Version: A307GDXS4ATB5 [february 2020, rev5]
CSC Version: A307GOWB4ATB1 [february 2020, rev1]
Board Platform: EXYNOS5
Modem Platform: SHANNON327
Serial Number: RF8N11657AJ
Imei: 881521112564454
Battery Status: 3.82V (18%)
Network Type: GSM
SIM Status: UNKNOWN
Multisim Config: SS
Knox Version: v30
Warranty Bit: 1
Security Patch: 2020-03-01
Em Did: 4354f52bee66
Preparing...
Checking root access.
The phone is rooted by: 3.19:EFTSU
Previously installed patchcert detected.
Previously installed patchcert successfully removed.
Reading data...
The operation is in progress. Be patient! Do NOT disconnect the phone!
Patching certificate...
Checking root access.
The phone must be started in recovery mode to be rooted!
To start recovery, you must use a key combo at startup. Usually [volume_up + power] or [volume_up + bixby + power].
Without root the patchcert will not work!
Restarting phone in recovery mode...
About 30-180 seconds after the phone starts, the signal strength indicator turns OFF and then turns ON again after a few seconds.
You can check the status of the imei using: *#0011#
The patchcert can be removed by repeating the process.
After installing new firmware, the patchcert process must be repeated.
Successfully finished.
Finished at local time: [04.16.21 17:50:08]
WorkID: 131555825

new wit medusa pro 2

$
0
0
hi
i just bought the medusa pro 2 and i have a m315f to test
this phone hace mdm i would like if you guys can hel,p with wiring and pinout please

Xiaomi Redmi 7A Pine Zero Wipe FRP successfully Removed by Hydra Tool

$
0
0
Xiaomi Redmi 7A Pine Zero Wipe FRP successfully Removed by Hydra Tool

Screen Short:



Logs:

Quote:

PreOperation Configuration
Brand : XIAOMI Model : Redmi 7A (pine) Storage : Auto
Loader: Xiaomi_Redmi_8_Olive.mbn
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM14)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&212ac8fc&0&6#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/02/2017,2.1.2.7

Getting device info......
Serial No.: 0xC9B43024
MSM ID : 0x000BF0E1, SDM439-Qualcomm Snapdragon 439
PBL Ver : 00000000
PK HASH : 57158EAF1814D78FD2B3105ECE4DB18A
817A08AC664A5782A925F3FF8403D39A

Firehose Loader[Xiaomi_Redmi_8_Olive.mbn]
SaharaBoot... Ok
Sending .......................Ok
Connecting to Firehose...
Ping... Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[pTWZJEPV4SNAiEOZQWlLAWFGzRj]
Checking Internet connection....
- Hydra Is Online
Connecting to Hydra Xiaomi Server...

Signature @256bytes Authentication.... Accepted......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 1011550637
Firmware Version : 165
Product Name : HAG4a2
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 30777344[14.676 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok

Phone Information......
Brand : Xiaomi
Vendor : Xiaomi
Model : Redmi 7A
ID : PKQ1.190319.001
SDK : 28
Release : 9
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-GB
Description : pine-user 9 PKQ1.190319.001 V11.0.7.0.PCMMIXM release-keys
Miui Ver : V11
Device : pine
Mod_device : pine_global
Display ID : ZQL1533-pine-build-20200407194230
Security Patch : 2020-03-01
Emmc_size : 16GB
Fingerprint : Xiaomi/pine/pine:9/PKQ1.190319.001/V11.0.7.0.PCMMIXM:user/release-keys

Reading GPT[3]
Drive [0] 60 Items
Drive [1] 0 Items
Drive [2] 0 Items

Removing FRPta...
Method :
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOkOk

Elapsed Time : 00:00:14
BR
Dipendra Pathak

Xiaomi Redmi Note 9 Merlin IMEI repaird successfully done by Hydra Tool

$
0
0
Xiaomi Redmi Note 9 Merlin IMEI repaird successfully done by Hydra Tool

Screen Short:



Logs:

Quote:

=====================================
***IMEI REPAIR FUNCTION****
Xiaomi Flashmode
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port (COM14)
SymbolicName :\??\USB#VID_0E8D&PID_0003#5&2dadc828&0&2#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0707MT6768[6768]
BROM HW_SW_VER : 8A00 CA00 0000 0000
getMTKPayloadExploit : 0707
#Executing Exploit..
#SUCCESS..
Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0707MT6768[6768]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
SECURE VERSION : 05
BL VERSION : FE
BR Secured : E0

Preparing Download Agent..
DA : MT6768_Xiaomi_New.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2020/07/07.10:10_513994
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_merlin.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 059D0B65ABAF4BBF15621544C6BA99DA
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58,242 GB
eMMC CID : 13014E53304A394A38101EB946B377EF - S0J9J8

DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_merlin.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0707__041521165443\MT6768_Androi d_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x05508000]1024 KB ->frp.bin...Ok
-nvdata[0x0C4A2000]64 MB ->nvdata.bin...Ok
-persist[0x104A2000]48 MB ->persist.bin...Ok
-nvram[0x19F80000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0707__041521165443
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 059D0B65ABAF4BBF15621544C6BA99DA
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58,242 GB
eMMC CID : 13014E53304A394A38101EB946B377EF - S0J9J8

Reading GPT-EMMC [0x00008000] 130 Items

IMEI INFO..
IMEI1 : FFFFFFFFFFFFFFF
IMEI2 : **************87
IMEI INFO..
IMEI1 : FFFFFFFFFFFFFFF
IMEI2 : **************28

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:01:02
BR
Dipendra Pathak

Xiaomi Redmi Note 8 Pro Begonia Backup Partition successfully done by Hydra Tool

$
0
0
Xiaomi Redmi Note 8 Pro Begonia Backup Partition successfully done by Hydra Tool

Screen Short:



Logs:

Quote:

=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port (COM19)
SymbolicName :\??\USB#VID_0E8D&PID_0003#5&1330824a&0&2#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2016,3.2


Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : FF30907ECFAFE8BD8387267D1728FE08
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x0000000180000000 -6 GB
UFS LU0 Size: 0x0000000000400000 -4 MB
UFS LU1 Size: 0x0000000000400000 -4 MB
UFS LU2 Size: 0x0000001DCB000000 -119.172 GB
UFS CID : Ī?KM2V8001CM-B707
UFS UNIQID : 00330038006500380036003300330030

Reading GPT-UFS [0x00008000] 130 Items


Reading System Info
Vendor : Xiaomi
ID : QP1A.190711.020
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : begonia-user 10 QP1A.190711.020 V12.0.6.0.QGGMIXM release-keys
Miui Ver : V12
Mod_device : begonia_global
Display ID : QP1A.190711.020
Security Patch : 2020-12-01
StorageType : mtp
Userdata State : Not Encrypted

-------------------------------------
Operation : Backup All By Partitions Except Userdata
Processing...

Reading Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_begonia.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Full\__0813--10(QP1A.190711.020)_150421111220\MT6785_Android_sc atter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-recovery[0x00008000]64 MB ->recovery.bin...Ok
-misc[0x04008000]4 MB ->misc.bin...Ok
-para[0x04408000]512 KB ->para.bin...Ok
-expdb[0x04488000]20 MB ->expdb.bin...Ok
-frp[0x05888000]1024 KB ->frp.bin...Ok
-vbmeta[0x05988000]8 MB ->vbmeta.bin...Ok
-nvcfg[0x06188000]32 MB ->nvcfg.bin...Ok
-nvdata[0x08188000]64 MB ->nvdata.bin...Ok
-metadata[0x0C188000]32 MB ->metadata.bin...Ok
-persist[0x0E188000]70.469 MB ->persist.bin...Ok
-protect1[0x12800000]8 MB ->protect1.bin...Ok
-protect2[0x13000000]8 MB ->protect2.bin...Ok
-seccfg[0x13800000]8 MB ->seccfg.bin...Ok
-otp[0x14000000]48 MB ->otp.bin...Ok
-sec1[0x17000000]2 MB ->sec1.bin...Ok
-proinfo[0x17200000]3 MB ->proinfo.bin...Ok
-efuse[0x17500000]512 KB ->efuse.bin...Ok
-nvram[0x17580000]64 MB ->nvram.bin...Ok
-md1img[0x1B580000]150 MB ->md1img.bin...Ok
-boot_para[0x24B80000]26 MB ->boot_para.bin...Ok
-spmfw[0x26580000]1024 KB ->spmfw.bin...Ok
-audio_dsp[0x26680000]4 MB ->audio_dsp.bin...Ok
-scp1[0x26A80000]6 MB ->scp1.bin...Ok
-scp2[0x27080000]6 MB ->scp2.bin...Ok
-sspm_1[0x27680000]1024 KB ->sspm_1.bin...Ok
-sspm_2[0x27780000]1024 KB ->sspm_2.bin...Ok
-cam_vpu1[0x27880000]15 MB ->cam_vpu1.bin...Ok
-cam_vpu2[0x28780000]15 MB ->cam_vpu2.bin...Ok
-cam_vpu3[0x29680000]15 MB ->cam_vpu3.bin...Ok
-gz1[0x2A580000]32 MB ->gz1.bin...Ok
-gz2[0x2C580000]32 MB ->gz2.bin...Ok
-lk[0x2E580000]2 MB ->lk.bin...Ok
-lk2[0x2E780000]2 MB ->lk2.bin...Ok
-boot[0x2E980000]64 MB ->boot.bin...Ok
-logo[0x32980000]64 MB ->logo.bin...Ok
-dtbo[0x36980000]32 MB ->dtbo.bin...Ok
-tee1[0x38980000]5 MB ->tee1.bin...Ok
-tee2[0x38E80000]9.5 MB ->tee2.bin...Ok
-vendor[0x39800000]1.5 GB ->vendor.bin...Ok
-system[0x99800000]3.5 GB ->system.bin...Ok
-cache[0x179800000]432 MB ->cache.bin...Ok
-gsort[0x194800000]16 MB ->gsort.bin...Ok
-oem_misc1[0x195800000]16 MB ->oem_misc1.bin...Ok
-exaid[0x196800000]128 MB ->exaid.bin...Ok
-cust[0x19E800000]832 MB ->cust.bin...Ok
-flashinfo[0x1DC9FF8000]16 MB ->flashinfo.bin...Ok
Reading Done!!!
C:\Hydra Tool\\Backup\Full\__0813--10(QP1A.190711.020)_150421111220 Ok

Elapsed Time : 00:14:15
BR
Dipendra Pathak


Huawei Y625-U32 flashing selected partition successfully done by Hydra Tool

$
0
0
Huawei Y625-U32 flashing selected partition successfully done by Hydra Tool

Screen Short:



Logs:

Quote:

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM5)
SymbolicName :\??\USB#VID_05C6&PID_9008#6&944c330&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :12/17/2018,2.1.3.5

Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok
Configuration.......
Identifying Chip..........eMMC
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 49152
MaxPayloadSizeToTargetInBytesSupported : 49152
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8x10
Version : 1


Protocol : Universal
Running : Ok

Phone Information....
Unable To find Build.prop

Reading GPT[1]
Drive [0] 24 Items


Backup Security partitions...
Reading Security Items....
> modemst1
> modemst2
> fsg
C:\Hydra Tool\Backup\Security_Backup\___Security_0415211038 58.sec
Backup Security Success....

----------------------------
Flashing Selected Partitions....
- sbl1(0)[sbl1.mbn] Failed
Operation : Setbootablestoragedrive: Drive 0
Set bootable storage drive 0 Ok

Rebooting Phone.... Ok

Elapsed Time : 00:00:08
BR
Dipendra Pathak

Xiaomi Redmi 9A Dendelion Mi Account and FRP successfully removed by Hydra Tool

$
0
0
Xiaomi Redmi 9A Dendelion Mi Account and FRP successfully removed by Hydra Tool

Screen Short:



Logs:

Quote:

=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port (COM5)
SymbolicName :\??\USB#VID_0E8D&PID_0003#6&2824289&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2016,3.2


Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : F09CAD1F92B1780690D5306B2477545D
ERAM Size : 0x000000000003A000 -232 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58,242 GB
eMMC CID : 45010044413430363401DBAE1E1787F1 - DA4064

Reading GPT-EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Remove MiAccount[Erase Method] + FRP
Processing...
-persist.bin[0x47000000]48 MB ->persist.bin...Ok
-frp.bin[0x3BD88000]1024 KB ->frp.bin...Ok
__041521145532
Backing up Partition for safety...
-__041521145532[0x47000000]48 MB ->persist.img...OkOk
Saved to :
C:\Hydra Tool\Backup\Persist\__041521145532.bin
Erasing FRP Partition...
-persist.bin[0x47000000]48 MB ->persist.bin...Ok
-frp.bin[0x3BD88000]1024 KB ->frp.bin...Ok Ok

Elapsed Time : 00:00:41
BR
Dipendra Pathak

Techno KC3 Camon 12 Air Zero Wipe FRP partition successfully done by Hydra Tool

$
0
0
Techno KC3 Camon 12 Air Zero Wipe FRP partition successfully done by Hydra Tool

Screen Short:



Logs:

Quote:

=====================================
Searching for MTK Device...Found
Port Identification :Flashmode Preloader
FriendlyName :MediaTek PreLoader USB VCOM_V1632 (Android) (COM11)
SymbolicName :\??\USB#VID_0E8D&PID_2000#6&3703ea33&0&4#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0766MT6765[6765]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
SECURE VERSION : 00
BL VERSION : 03
BR Secured : 05
NORMAL BOOT

Preparing Download Agent..
DA : 6765_Tecno_camon_air_a12.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2018/05/22.14:57_437806
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : preloader

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC
Sending Certifificate

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : C607912CE5885D156F4826F4CE3EC13B
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 90014A484347386134A210053688C691 - HCG8a4

DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info
Brand : TECNO
Vendor : TECNO MOBILE LIMITED
Model : TECNO KC3
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_kc3_h627mt62-user 9 PPR1.180610.011 57842 release-keys
Device : TECNO-KC3
Display ID : KC3-H627G-P-200113V292
Security Patch : 2020-01-05
Fingerprint : TECNO/H627/TECNO-KC3:9/PPR1.180610.011/G-200113V292:user/release-keys
StorageType : mtp
Userdata State : Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_kc3_h627mt62.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0766_TECNO_H627_TECNO-KC3_9_PPR1.180610.011_G-200113V292_041521153059\MT6765_Android_scatter.txt
-pgpt[0x00000000]8 MB ->pgpt.bin...Ok
-nvram[0x09B00000]64 MB ->nvram.bin...Ok
-persist[0x113000000]48 MB ->persist.bin...Ok
-frp[0x12F580000]1024 KB ->frp.bin...Ok
-nvdata[0x144280000]69.5 MB ->nvdata.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0766_TECNO_H627_TECNO-KC3_9_PPR1.180610.011_G-200113V292_041521153059
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : C607912CE5885D156F4826F4CE3EC13B
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 90014A484347386134A210053688C691 - HCG8a4

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Brand : TECNO
Vendor : TECNO MOBILE LIMITED
Model : TECNO KC3
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_kc3_h627mt62-user 9 PPR1.180610.011 57842 release-keys
Device : TECNO-KC3
Display ID : KC3-H627G-P-200113V292
Security Patch : 2020-01-05
Fingerprint : TECNO/H627/TECNO-KC3:9/PPR1.180610.011/G-200113V292:user/release-keys
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Zero Wipe
Processing...
ZeroWipe FRP Partition... Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:51
BR
Dipendra Pathak

Xiaomi Redmi Note 7 Pro Violet successfully Flashed by Hydra Tool

$
0
0
Xiaomi Redmi Note 7 Pro Violet successfully Flashed by Hydra Tool

Screen Short:



Logs:

Quote:

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM13)
SymbolicName :\??\USB#VID_05C6&PID_9008#6&153f065e&0&1#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/31/2015,2.1.2.0

Getting device info......
Serial No.: 0x994CACFF
MSM ID : 0x000950E1, SM6150-Qualcomm Snapdragon 675
PBL Ver : 00000000
PK HASH : 1BEBE3863A6781DB4B01086063007334
DE9E5CA14971C7C4F4358EC9D79CDA46

Firehose Loader[Xiaomi_Redmi Note 7 Pro_Sdm6150_ddr.elf]
SaharaBoot... Ok
Sending ...................................Ok
Connecting to Firehose...
Ping..................... Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[ru4JBg81TbfBLal8EjZwz0ybwfD]
Checking Internet connection....
- Hydra Is Online
Connecting to Hydra Xiaomi Server...

Signature @256bytes Authentication.... Accepted........
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Jul 19 2019 - 01:12:10

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 3390710511
Firmware Version : 892350512
Product Name : hDEaP3
Physical Partitions : 4
Total Logical Blocks:
Drive [0] 244285440[116.484 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Drive [3] 32768[16 MB]

Protocol : Universal
Running : Ok

Phone Information......
Vendor : Xiaomi
ID : QKQ1.190915.002
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : zh-CN
Miui Ver : V12
Security Patch : 2020-07-01


----------------------------
Flashing Selected Partitions....
- multiimgoem(0)[multi_image.mbn] Ok
- vbmeta(0)[vbmeta.img] Ok
- qupfw(0)[qupv3fw.elf] Ok
- xbl_config(0)[xbl_config.elf] Ok
- storsec(0)[storsec.mbn] Ok
- storsecbak(0)[storsec.mbn] Ok
- aop(0)[aop.mbn] Ok
- aopbak(0)[aop.mbn] Ok
- hyp(0)[hyp.mbn] Ok
- hypbak(0)[hyp.mbn] Ok
- cmnlib(0)[cmnlib.mbn] Ok
- cmnlibbak(0)[cmnlib.mbn] Ok
- cmnlib64(0)[cmnlib64.mbn] Ok
- cmnlib64bak(0)[cmnlib64.mbn] Ok
- keymaster(0)[km4.mbn] Ok
- keymasterbak(0)[km4.mbn] Ok
- bluetooth(0)[BTFM.bin] Ok
- devcfg(0)[devcfg.mbn] Ok
- devcfgbak(0)[devcfg.mbn] Ok
- abl(0)[abl.elf] Ok
- ablbak(0)[abl.elf] Ok
- imagefv(0)[imagefv.elf] Ok
- uefisecapp(0)[uefi_sec.mbn] Ok
- uefisecappbak(0)[uefi_sec.mbn] Ok
- misc(0)[misc.img] Ok
- xbl(0)[xbl.elf] Ok
- xblbak(0)[xbl.elf] Ok
- tz(0)[tz.mbn] Ok
- tzbak(0)[tz.mbn] Ok
- logfs(0)[logfs_ufs_8mb.bin] Ok
- dtbo(0)[dtbo.img] Ok
- dsp(0)[dspso.bin] Ok
- splash(0)[splash.img] Ok
- persist(0)[persist.img] Ok
- persistbak(0)[persist.img] Ok
- boot(0)[boot.img] Ok
- recovery(0)[recovery.img] Ok
- modem(0)[NON-HLOS.bin] Ok
- cache(0)[cache.img] Ok
- cust(0)[cust.img] Ok
- system(0)[system.img] Ok
- vendor(0)[vendor.img] Ok
- userdata(0)[userdata.img] Ok
- PrimaryGPT(0)[gpt_main0.bin] Ok

Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-33.] OK
0 [CRC32(2,11264)] OK
0 [CRC32(NUM_DISK_SECTORS-33.,11264)] OK
0 [0] OK
0 [CRC32(1,92)] OK
0 [0] OK
0 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
----------------------------
Done!

Rebooting Phone.... Ok

Elapsed Time : 00:02:54
BR
Dipendra Pathak

Tips how to remove nokia 2.3 ta-1206 google account locked by frp

kindly share Qcfire V6.6.1

$
0
0
Hello Respected's kindly share Qcfire V6.6.1 beta ver. please share waiting for replies.

Samsung A20S A207F FRP Bypass Android 10 | Very Easy Method With Free Tool


Samsung A20S A207F FRP Bypass Android 10 | Very Easy Method With Free Tool

Need samsung j730 combination file

$
0
0
Need samsung j730f combination file Z3X

j730fxxS6cte2 combination file:

Samsung J5 Prime Root Oreo 8.0.0| G570F, G570Y U3 Root | 2021 One Click Only

Samsung J5 Prime 8.0.0 U3 imei Repair With Z3X| G570F U3 Modem not Supported FIX

Borneoschematics daily update 17 april 2021 🔥🔥🔥

$
0
0


BORNEOSCHEMATICS DAILY UPDATE 17 APRIL 2021 🔥🔥🔥

☑️ Complete Hardware Solutions VIVO Y11(Y21i)
☑️ IPHONE 12 Mini Bitmap
☑️ LG V500 Schematics
☑️ LAPTOP TOSHIBA Satellite Pro L450 Boardview
☑️ 5 LAPTOP APPLE Schematics
☑️ PC VGA GTX760 192BIT-3GD5 Boardviews
☑️ PC MOTHERBOARD ASROCK 880GM_LE_R1.03 Boardview
☑️ PHILLIP TV Schematics

GREAT UPDATE FOR U !!!

Attached Images
File Type: jpg 400.jpg (151.1 KB)
Viewing all 449259 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>