GSM Shop GSM Shop
GSM-Forum  

Welcome to the GSM-Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features.
Only registered members may post questions, contact other members or search our database of over 8 million posts.

Registration is fast, simple and absolutely free so please - Click to REGISTER!

If you have any problems with the registration process or your account login, please contact contact us .

Go Back   GSM-Forum > Product Support Sections > Special Solutions / Services / WebShop > GSMFABRICA Products > HYDRA TOOL

Reply
 
LinkBack Thread Tools Display Modes
Old 02-11-2020, 12:52   #406 (permalink)
No Life Poster
 
diosa's Avatar
 
Join Date: May 2011
Posts: 922
Member: 1576733
Status: Offline
Thanks Meter: 410
Xiaomi Mi 9 Cpeheus Write Firmware by Hydra Tool


Xiaomi Mi 9 Cpeheus Flashing Rom Success By Hydra Tool



Quote:
Searching Device By Fastboot
Device Found...

Reading Information...
Product : cepheus
Serial No. : c281f3c9
version : version FAILED (remote: GetVar Variable Not found)
Secure : yes
Device Info:
(bootloader) Verity mode: true
(bootloader) Device unlocked: true
(bootloader) Device critical unlocked: true
(bootloader) Charger screen enabled: false
--------------------------
Fastboot Flashing...
-switch(dummy.img) Ok
-misc(misc.img) Ok
-vm-data(dummy.img) Ok
-logfs(logfs_ufs_8mb.bin) Ok
-metadata(metadata.img) Ok
-recovery(recovery.img) Ok
-cache(cache.img) Ok
-cust(cust.img) Ok
-userdata(userdata.img) Ok
-xbl_config(xbl_config.elf) Ok
-xbl(xbl.elf) Ok
-xbl_configbak(xbl_config.elf) Ok
-xblbak(xbl.elf) Ok
-multiimgoem(multi_image.mbn) Ok
-qupfw(qupv3fw.elf) Ok
-qupfwbak(qupv3fw.elf) Ok
-vbmeta(vbmeta.img) Ok
-storsec(storsec.mbn) Ok
-devcfg(devcfg.mbn) Ok
-devcfgbak(devcfg.mbn) Ok
-aop(aop.mbn) Ok
-aopbak(aop.mbn) Ok
-cmnlib(cmnlib.mbn) Ok
-cmnlibbak(cmnlib.mbn) Ok
-cmnlib64(cmnlib64.mbn) Ok
-cmnlib64bak(cmnlib64.mbn) Ok
-keymaster(km4.mbn) Ok
-keymasterbak(km4.mbn) Ok
-bluetooth(BTFM.bin) Ok
-uefisecapp(uefi_sec.mbn) Ok
-uefisecappbak(uefi_sec.mbn) Ok
-abl(abl.elf) Ok
-ablbak(abl.elf) Ok
-tz(tz.mbn) Ok
-tzbak(tz.mbn) Ok
-hyp(hyp.mbn) Ok
-hypbak(hypvm.mbn) Ok
-dtbo(dtbo.img) Ok
-ifaa(ifaa.img) Ok
-logo(logo.img) Ok
-dsp(dspso.bin) Ok
-boot(boot.img) Ok
-modem(NON-HLOS.bin) Ok
-vendor(vendor.img) Ok
-system(system.img) Ok
-imagefv(imagefv.elf) Ok
All Done
--------------------------
Wiping userdata, Please Wait...
Factory Reset Success!!
Rebooting device to Normal
Elapsed Time : 00:04:47
  Reply With Quote
Old 02-11-2020, 12:55   #407 (permalink)
No Life Poster
 
diosa's Avatar
 
Join Date: May 2011
Posts: 922
Member: 1576733
Status: Offline
Thanks Meter: 410
Nokia 2.2 FRP Remove by Hydra Tool

Nokia 2.2 Reset Google Account By Hydra Tool



Quote:
Autobackup Partitions
preloader[0x00000000-0x00080000]512 KB Done
-> Renaming Preloader.... preloader_wasp.bin
Creating Scatter file... F:\Hydra Tool\\Backup\Auto\Nokia_Nokia 2.2_0717--9(00WW_1_630_SP03)_090120133009\MT6761_Android_sca tter.txt
nvdata[0x06E88000-0x0AE88000]64 MB Done
nvram[0x0ED00000-0x12D00000]64 MB Done
Done!!!
F:\Hydra Tool\\Backup\Auto\Nokia_Nokia 2.2_0717--9(00WW_1_630_SP03)_090120133009
MTK Phone Loader is NOW RUNNING.
ERAM Size : 0x0000000080000000 -2 GB
IRAM Size : 0x0000000000040000 -256 KB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x000000039D000000 -14,453 GB
eMMC CID : 880103443944313647388A151557765D - D9D16G
UNICAL RID : 58F3BA7FE938F3BF7FDFA42BF18C806E
DA Speed : high-speed
Reading Partition Table[0x00008000] 48 Items
Done!!!


Reading System Info
Model : Nokia 2.2
Brand : Nokia
Android Ver : 9
Manufacturer : HMD Global
Device : WSP_sprout
Display ID : 00WW_1_630_SP03
Security Patch : 2019-12-05
Kernel ID : 2019-12-05
FingerPrint : Nokia/Wasp_00WW/WSP_sprout:9/PPR1.180610.011/00WW_1_63C:user/release-keys

-------------------------------------
FRP Security..
Operation : Auto
Remove FRP Operation Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!
=====================================

Elapsed Time : 00:00:27
  Reply With Quote
Old 02-11-2020, 12:59   #408 (permalink)
No Life Poster
 
diosa's Avatar
 
Join Date: May 2011
Posts: 922
Member: 1576733
Status: Offline
Thanks Meter: 410
Xiaomi Redmi Note 4 MTK MT6797 Remove Mi Account by Hydra Tool

Xiaomi Redmi Note 4 Nikel MT6797 Remove Mi Account Success by Hydra Tool



Quote:
Brand : XIAOMI Model : Redmi Note 4 (Nikel) Connection : Flash Mode

=====================================
How To Boot : Power off phone
* BROM Mode : Press VOL +
* Preloader Mode : Just Insert cable

Connection[WAITING]Found
Mode[PreLoader] Port[COM104] Status[Opened]
Identifying Hardware ID
BROM CPUID : 0279 (0000)MT6797[6797]
BROM HW_SW_VER : 8A00 CA01 0000 0000
SECURE VERSION : FF
BL VERSION : 02
BR Secured : 01
Preparing Download Agent..
Download Agent : [Not Exist]
Trying Default 6797_SP.bin
MTK_DOWNLOAD_AGENT -HYDRA
MTK_AllInOne_DA_v3.3001.00.00
Initializing Loader [1]
Sending Loader [1] Accepted
PROTOCOL[NEW] - eMMC
PHONE SYNC[Accepted]
DA Mode : preloader
Initializing Loader [2]
Sending Loader [2] Accepted
ERAM Size : 0x00000000C0000000 -3 GB
IRAM Size : 0x0000000000040000 -256 KB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 150100434A4E42345207CB154AEF73A5 - CJNB4R
UNICAL RID : D23D1EF9B7428F58AA5D7C5CED1BAAD2
DA Speed : high-speed
DA Speed : high-speed
Reading Partition Table[0x00008000] 33 Items
Done!!!

Reading System Info
Model : Redmi Note 4
Brand : Xiaomi
Android Ver : 6.0
Miui Ver : V10
Manufacturer : Xiaomi
Device : nikel
Mod_device : nikel_global
Display ID : MRA58K
Security Patch : 2018-08-01
Platform : mt6797
Kernel ID : 2018-08-01
FingerPrint : Xiaomi/nikel/nikel:6.0/MRA58K/V10.2.1.0.MBFMIXM:user/release-keys

Autobackup Partitions
preloader[0x00000000-0x00080000]512 KB Done
-> Renaming Preloader.... preloader_lcsh6797_6c_lw_m.bin
Creating Scatter file... G:\Hydra_2\\Backup\Auto\Xiaomi_Redmi Note 4_0279-mt6797-6.0(MRA58K)_080120163057\MT6797_Android_scatter.tx t
nvdata[0x02288000-0x04288000]32 MB Done
nvram[0x0AB00000-0x0B000000]5 MB Done
Done!!!
G:\Hydra_2\\Backup\Auto\Xiaomi_Redmi Note 4_0279-mt6797-6.0(MRA58K)_080120163057
MTK Phone Loader is NOW RUNNING.
ERAM Size : 0x00000000C0000000 -3 GB
IRAM Size : 0x0000000000040000 -256 KB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 150100434A4E42345207CB154AEF73A5 - CJNB4R
UNICAL RID : D23D1EF9B7428F58AA5D7C5CED1BAAD2
DA Speed : high-speed
Reading Partition Table[0x00008000] 33 Items
Done!!!


Reading System Info
Model : Redmi Note 4
Brand : Xiaomi
Android Ver : 6.0
Miui Ver : V10
Manufacturer : Xiaomi
Device : nikel
Mod_device : nikel_global
Display ID : MRA58K
Security Patch : 2018-08-01
Platform : mt6797
Kernel ID : 2018-08-01
FingerPrint : Xiaomi/nikel/nikel:6.0/MRA58K/V10.2.1.0.MBFMIXM:user/release-keys

-------------------------------------
Hydra MiAccount Operation
Operation : Remove FindDevice
MiAccount Operation
Could not locate desired file
Could not locate desired file Ok
=====================================

Elapsed Time : 00:00:36
  Reply With Quote
Old 02-11-2020, 13:09   #409 (permalink)
No Life Poster
 
diosa's Avatar
 
Join Date: May 2011
Posts: 922
Member: 1576733
Status: Offline
Thanks Meter: 410
Cloudfone Thrill Boost 2 Plus FRP Remove by Hydra Tool

Cloudfone Thrill Boost 2 Plus Google Account Reset by Hydra Dongle



Quote:
=====================================
Connection[WAITING]Found
Mode Port[COM39] Status[Opened]


Reading System Info
Model : Thrill Boost 2 Plus
Brand : Cloudfone
Android Ver : 8.1.0
Manufacturer : Cloudfone
Device : ThrillBoost2Plus
Display ID : O11019 release-keys
Security Patch : 2018-08-05
Kernel ID : 2018-08-05
FingerPrint : Cloudfone/ThrillBoost2Plus/ThrillBoost2Plus:8.1.0/O11019/1536913864:user/release-keys

-------------------------------------
FRP Security..
Operation : Auto
Remove FRP Operation Ok
=====================================

Elapsed Time : 00:00:02
  Reply With Quote
Old 02-12-2020, 12:38   #410 (permalink)
No Life Poster
 
Join Date: Feb 2012
Age: 34
Posts: 508
Member: 1724862
Status: Offline
Thanks Meter: 137
Xiaomi Mi Play lotus MTK Unbrick Fix by Hydra Tool Auth Server

Xiaomi Mi Play lotus MTK Unbrick Fix by Hydra Tool Auth Server





Quote:
Brand : XIAOMI Model : Mi Play (Lotus) Connection : Flash Mode

=====================================

Connection[WAITING]Found[COM19] Status[Opened]

Flashing Selected Partitions....
>preloader_lotus.bin Ok
>recovery.img Ok
>efuse.img Ok
>md1img.img Ok
>spmfw.img Ok
>scp.img Ok
>scp.img Ok
>sspm.img Ok
>sspm.img Ok
>lk.img Ok
>lk.img Ok
>boot.img Ok
>logo.bin Ok
>odmdtbo.img Ok
>tee.img Ok
>tee.img Ok
>vendor.img Ok
>cust.img Ok
>system.img Ok
>vbmeta.img Ok
>cache.img Ok
>userdata.img Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!
=====================================
  Reply With Quote
Old 02-13-2020, 08:23   #411 (permalink)
No Life Poster
 
diosa's Avatar
 
Join Date: May 2011
Posts: 922
Member: 1576733
Status: Offline
Thanks Meter: 410
Xiaomi Mi 9 Unbrick Fix Write Firmware by EDL Mode with Hydra Auth Server by Hydra To

Xiaomi Mi 9 Unbrick Fix Write Firmware by EDL Mode with Hydra Auth Server by Hydra Tool

  Reply With Quote
Old 02-14-2020, 11:48   #412 (permalink)
No Life Poster
 
Join Date: Feb 2012
Age: 34
Posts: 508
Member: 1724862
Status: Offline
Thanks Meter: 137
Asus X00TD ZB601KL Unbrick by Hydra Tool

Asus X00TD ZB601KL Writting Raw XML Firmware by QdLoader Mode EDL



Quote:
Connecting to Firehose...
Ping...... Ok
Configuration......Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 8192
MaxPayloadSizeToTargetInBytesSupported : 8192
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : MSM8996
Version : 1
DateTime : Jul 20 2018 - 00:26:46

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 358664905
Firmware Version : 2
Product Name : DD68MB
Physical Partitions : 4
Total Logical Blocks:
Drive [0] 61071360[29.121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Drive [3] 8192[4 MB]
Running : Ok

Reading GPT . Ok
Phone Information.....
Model : ASUS_X00TD
Brand : asus
Android Ver : 9
Manufacturer : asus
Device : ASUS_X00TD
Display ID : PKQ1.WW_Phone-16.2017.1906.057-20190816
Security Patch : 2019-08-05
Kernel ID : 2019-08-05
Fingerprint : Android/sdm660_64/sdm660_64:9/PKQ1/16.2017.1906.057-20190816:user/release-keys
ro_product_hardware :
sys_hardware_version :


----------------------------
Flashing Selected Partitions
>xbl(0)[xbl.elf] Ok
>xblbak(0)[xbl.elf] Ok
>tz(0)[tz.mbn] Ok
>tzbak(0)[tz.mbn] Ok
>rpm(0)[rpm.mbn] Ok
>rpmbak(0)[rpm.mbn] Ok
>hyp(0)[hyp.mbn] Ok
>hypbak(0)[hyp.mbn] Ok
>pmic(0)[pmic.elf] Ok
>pmicbak(0)[pmic.elf] Ok
>fsg(0)[tw_fs_image.tar.gz.mbn.img] Skipped
>system(0)[system_1.img] Ok
>system(0)[system_2.img] Ok
>system(0)[system_3.img] Ok
>system(0)[system_4.img] Ok
>system(0)[system_5.img] Ok
>system(0)[system_6.img] Ok
>system(0)[system_7.img] Ok
>system(0)[system_8.img] Ok
>system(0)[system_9.img] Ok
>system(0)[system_10.img] Ok
>system(0)[system_11.img] Ok
>system(0)[system_12.img] Ok
>system(0)[system_13.img] Ok
>system(0)[system_14.img] Ok
>system(0)[system_15.img] Ok
>system(0)[system_16.img] Ok
>system(0)[system_17.img] Ok
>system(0)[system_18.img] Ok
>system(0)[system_19.img] Ok
>system(0)[system_20.img] Ok
>system(0)[system_21.img] Ok
>system(0)[system_22.img] Ok
>system(0)[system_23.img] Ok
>system(0)[system_24.img] Ok
>system(0)[system_25.img] Ok
>system(0)[system_26.img] Ok
>system(0)[system_27.img] Ok
>system(0)[system_28.img] Ok
>system(0)[system_29.img] Ok
>system(0)[system_30.img] Ok
>system(0)[system_31.img] Ok
>system(0)[system_32.img] Ok
>system(0)[system_33.img] Ok
>system(0)[system_34.img] Ok
>system(0)[system_35.img] Ok
>system(0)[system_36.img] Ok
>system(0)[system_37.img] Ok
>system(0)[system_38.img] Ok
>system(0)[system_39.img] Ok
>system(0)[system_40.img] Ok
>system(0)[system_41.img] Ok
>system(0)[system_42.img] Ok
>system(0)[system_43.img] Ok
>system(0)[system_44.img] Ok
>vendor(0)[vendor_1.img] Ok
>vendor(0)[vendor_2.img] Ok
>vendor(0)[vendor_3.img] Ok
>vendor(0)[vendor_4.img] Ok
>vendor(0)[vendor_5.img] Ok
>vendor(0)[vendor_6.img] Ok
>vendor(0)[vendor_7.img] Ok
>vendor(0)[vendor_8.img] Ok
>vendor(0)[vendor_9.img] Ok
>vendor(0)[vendor_10.img] Ok
>vendor(0)[vendor_11.img] Ok
>boot(0)[boot.img] Ok
>keymaster(0)[keymaster64.mbn] Ok
>keymasterbak(0)[keymaster64.mbn] Ok
>cmnlib(0)[cmnlib.mbn] Ok
>cmnlib64(0)[cmnlib64.mbn] Ok
>cmnlibbak(0)[cmnlib.mbn] Ok
>cmnlib64bak(0)[cmnlib64.mbn] Ok
>mdtpsecapp(0)[mdtpsecapp.mbn] Ok
>mdtpsecappbak(0)[mdtpsecapp.mbn] Ok
>mdtp(0)[mdtp.img] Ok
>mdtpbak(0)[mdtp.img] Ok
>modem(0)[NON-HLOS.bin] Ok
>dsp(0)[dspso.bin] Ok
>abl(0)[abl.elf] Ok
>ablbak(0)[abl.elf] Ok
>apdp(0)[dp_AP_signed.mbn] Ok
>msadp(0)[dp_MSA_signed.mbn] Ok
>sec(0)[sec.dat] Skipped
>bluetooth(0)[BTFM.bin] Ok
>bluetoothbak(0)[BTFM.bin] Ok
>modemst1(0)[st1] Skipped
>persist(0)[persist_1.img] Skipped
>modemst2(0)[st2] Skipped
>devcfg(0)[devcfg.mbn] Ok
>devcfgbak(0)[devcfg.mbn] Ok
>asusfw(0)[asusfw.img] Ok
>storsec(0)[storsec.mbn] Ok
>cache(0)[cache_1.img] Ok
>cache(0)[cache_2.img] Ok
>cache(0)[cache_3.img] Ok
>cache(0)[cache_4.img] Ok
>cache(0)[cache_5.img] Ok
>recovery(0)[recovery.img] Ok
>APD(0)[APD.img] Ok
>ADF(0)[ADF.img] Ok
>asdf(0)[asdf.img] Ok
>priv(0)[priv.img] Ok
>factory(0)[factory.img] Ok
>userdata(0)[userdata_1.img] Ok
>userdata(0)[userdata_2.img] Ok
>userdata(0)[userdata_3.img] Ok
>userdata(0)[userdata_4.img] Ok
>userdata(0)[userdata_5.img] Ok
>userdata(0)[userdata_6.img] Ok
>userdata(0)[userdata_7.img] Ok
>userdata(0)[userdata_8.img] Ok
>userdata(0)[userdata_9.img] Ok
>userdata(0)[userdata_10.img] Ok
>userdata(0)[userdata_11.img] Ok
>userdata(0)[userdata_12.img] Ok
>userdata(0)[userdata_13.img] Ok
>userdata(0)[userdata_14.img] Ok
>userdata(0)[userdata_15.img] Ok
>userdata(0)[userdata_16.img] Ok
>userdata(0)[userdata_17.img] Ok
>userdata(0)[userdata_18.img] Ok
>userdata(0)[userdata_19.img] Ok
>userdata(0)[userdata_20.img] Ok
>userdata(0)[userdata_21.img] Ok
>userdata(0)[userdata_22.img] Ok
>userdata(0)[userdata_23.img] Ok
>userdata(0)[userdata_24.img] Ok
>userdata(0)[userdata_25.img] Ok
>userdata(0)[userdata_26.img] Ok
>userdata(0)[userdata_27.img] Ok
>userdata(0)[userdata_28.img] Ok
>userdata(0)[userdata_29.img] Ok
>userdata(0)[userdata_30.img] Ok
>userdata(0)[userdata_31.img] Ok
>userdata(0)[userdata_32.img] Ok
>userdata(0)[userdata_33.img] Ok
>userdata(0)[userdata_34.img] Ok
>userdata(0)[userdata_35.img] Ok
>userdata(0)[userdata_36.img] Ok
>userdata(0)[userdata_37.img] Ok
>userdata(0)[userdata_38.img] Ok
>userdata(0)[userdata_39.img] Ok
>userdata(0)[userdata_40.img] Ok
>userdata(0)[userdata_41.img] Ok
>userdata(0)[userdata_42.img] Ok
>userdata(0)[userdata_43.img] Ok
>userdata(0)[userdata_44.img] Ok
>userdata(0)[userdata_45.img] Ok
>userdata(0)[userdata_46.img] Ok
>userdata(0)[userdata_47.img] Ok
>userdata(0)[userdata_48.img] Ok
>userdata(0)[userdata_49.img] Ok
>userdata(0)[userdata_50.img] Ok
>userdata(0)[userdata_51.img] Ok
>userdata(0)[userdata_52.img] Ok
>userdata(0)[userdata_53.img] Ok
>userdata(0)[userdata_54.img] Ok
>userdata(0)[userdata_55.img] Ok
>userdata(0)[userdata_56.img] Ok
>userdata(0)[userdata_57.img] Ok
>userdata(0)[userdata_58.img] Ok
>userdata(0)[userdata_59.img] Ok
>userdata(0)[userdata_60.img] Ok
>userdata(0)[userdata_61.img] Ok
>userdata(0)[userdata_62.img] Ok
>userdata(0)[userdata_63.img] Ok
>userdata(0)[userdata_64.img] Ok
>userdata(0)[userdata_65.img] Ok
>userdata(0)[userdata_66.img] Ok
>userdata(0)[userdata_67.img] Ok
>userdata(0)[userdata_68.img] Ok
>userdata(0)[userdata_69.img] Ok
>userdata(0)[userdata_70.img] Ok
>userdata(0)[userdata_71.img] Ok
>userdata(0)[userdata_72.img] Ok
>userdata(0)[userdata_73.img] Ok
>userdata(0)[userdata_74.img] Ok
>userdata(0)[userdata_75.img] Ok
>userdata(0)[userdata_76.img] Ok
>userdata(0)[userdata_77.img] Ok
>userdata(0)[userdata_78.img] Ok
>userdata(0)[userdata_79.img] Ok
>userdata(0)[userdata_80.img] Ok
>userdata(0)[userdata_81.img] Ok
>version(0)[tw_nfc_version.img] Ok
>PrimaryGPT(0)[gpt_main0.bin] Ok
>BackupGPT(0)[gpt_backup0.bin] Ok

Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-33.] OK
0 [CRC32(2,8704)] OK
0 [CRC32(NUM_DISK_SECTORS-33.,8704)] OK
0 [0] OK
0 [CRC32(1,92)] OK
0 [0] OK
0 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 0
Set bootable storage drive 0 Ok
Elapsed Time : 00:06:12
  Reply With Quote
Old 02-14-2020, 11:50   #413 (permalink)
No Life Poster
 
Join Date: Feb 2012
Age: 34
Posts: 508
Member: 1724862
Status: Offline
Thanks Meter: 137
Asus X01BD FRP Reset by Hydra Tool

Asus Zenfone Max Pro M2 X01BD Reset Google account by Hydra Tool



Quote:
Finding EDL Port..[COM67]
Connecting to Firehose...
Ping...... Ok
Configuration......Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 8192
MaxPayloadSizeToTargetInBytesSupported : 8192
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : MSM8996
Version : 1
DateTime : Dec 7 2018 - 17:09:09

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 1659622475
Firmware Version : 162
Product Name : HCG8a4
Physical Partitions : 4
Total Logical Blocks:
Drive [0] 122142720[58,242 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Drive [3] 8192[4 MB]
Running : Ok

Reading GPT . Ok
Phone Information.....
Model : ASUS_X01BD
Brand : asus
Android Ver : 9
Manufacturer : asus
Device : ASUS_X01BD
Display ID : PKQ1.WW_Phone-16.2017.1905.065-20190507
Security Patch : 2019-05-01
Kernel ID : 2019-05-01
Fingerprint : Android/sdm660_64/sdm660_64:9/PKQ1/16.2017.1905.065-20190507:user/release-keys
ro_product_hardware :
sys_hardware_version :

======================================
Reading GPT . Ok
*** FRP Reset ***
Resetting FRP...
Auto Ok
All Done
======================================
Elapsed Time : 00:00:12
  Reply With Quote
Old 02-14-2020, 11:57   #414 (permalink)
No Life Poster
 
Join Date: Feb 2012
Age: 34
Posts: 508
Member: 1724862
Status: Offline
Thanks Meter: 137
Cherry Mobile Flare J5 Mini FRP Reset by Hydra

Cherry Mobile Flare J5 Mini Google Account Reset by Hydra Tool



Quote:
-------------------------------
Port : [Auto] Scanning...COM20
TPortConnection.Create...(COM20)..Opening...Ok

-------------------------------
Reading IMEI.
IMEI 1 : 3527***********
IMEI 2 : 3527***********

Reading System Info..
Model : Flare J5 Mini
Brand : Cherry_Mobile
Android Ver : 8.1.0
Manufacturer : Cherry_Mobile
Device : Flare_J5_Mini
Display ID : O11019 release-keys
Security Patch : 2018-11-05
Kernel ID : 2018-11-05
FRPPST : /dev/block/platform/soc/soc:ap-ahb/20600000.sdio/by-name/persist
Fingerprint : Cherry_Mobile/Flare_J5_Mini/Flare_J5_Mini:8.1.0/O11019/1542262072:user/release-keys
ro_product_hardware : y400_v1.1.0
sys_hardware_version : SC7731e_2_IRD_K_V1.1.0

-------------------------------
*** Flash Mode #Remove FRP ***
Resetting FRP...Ok

TPortConnection.Destroy.....Closing...Ok..
-------------------------------
Elapsed Time : 00:00:07
  Reply With Quote
Old 02-14-2020, 11:59   #415 (permalink)
No Life Poster
 
Join Date: Feb 2012
Age: 34
Posts: 508
Member: 1724862
Status: Offline
Thanks Meter: 137
Cherry Mobile Flare Y3 FRP Reset Success by Hydra Tool

Cherry Mobile Flare Y3 FRP Reset Success by Hydra Tool



Quote:
=====================================
Connection[WAITING]Found
Mode Port[COM6] Status[Opened]


Reading System Info
Model : Flare_Y3
Brand : Cherry_Mobile
Android Ver : 8.1.0
Manufacturer : Cherry Mobile
Device : FlareY3
Display ID : Cherry_Flare_Y3_08312018_V06
Security Patch : 2018-08-05
Kernel ID : 2018-08-05
FingerPrint : Cherry_Mobile/FlareY3/FlareY3:8.1.0/O11019/1535537755:user/release-keys

-------------------------------------
FRP Security..
Operation : Auto
Remove FRP Operation Ok
=====================================

Elapsed Time : 00:00:02
  Reply With Quote
Old 02-14-2020, 12:01   #416 (permalink)
No Life Poster
 
Join Date: Feb 2012
Age: 34
Posts: 508
Member: 1724862
Status: Offline
Thanks Meter: 137
Lenovo L19041 FRP Reset Success by Hydra Tool

Lenovo L19041 (A6 Note) Google Account Reset Done!!



Quote:
MTK Phone Loader is NOW RUNNING.
ERAM Size : 0x00000000C0000000 -3 GB
IRAM Size : 0x0000000000040000 -256 KB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x000000074A000000 -29.156 GB
eMMC CID : 700100544132383332200B9894A276F5 - TA2832
UNICAL RID : 2F384AD8327F86D6506C102F62E5ED1E
DA Speed : high-speed
Reading Partition Table[0x00008000] 39 Items
Done!!!


Reading System Info
Model : Lenovo L19041
Brand : Lenovo
Android Ver : 9
Manufacturer : Lenovo
Device : Lenovo_A6_Note
Display ID : L608_LENOVO_Arizona_20190817
Security Patch : 2019-07-01
Kernel ID : 2019-07-01
FRPPST : /dev/block/platform/bootdevice/by-name/frp
FingerPrint : Lenovo/Arizona/Lenovo_A6_Note:9/PPR1.180610.011/32119:user/release-keys

-------------------------------------
FRP Security..
Operation : Auto
Remove FRP Operation Ok
=====================================

Elapsed Time : 00:00:34
  Reply With Quote
Old 02-14-2020, 12:03   #417 (permalink)
No Life Poster
 
Join Date: Feb 2012
Age: 34
Posts: 508
Member: 1724862
Status: Offline
Thanks Meter: 137
Meizu C9 FRP Reset by Hydra Tool

Meizu C9 Google Account Remove by Hydra



Quote:
-------------------------------

************* PRESS BOOT KEY *************
VOL + OR VOL - , OR Combination Vol - +
Please hold boot key until second boot..
*******************************************
SM1801
SM
0

C:\Hydra Tool\Boot\\_Meizu_8.1.2.0G.bin
Port : [Auto] Scanning...COM143
TPortConnection.Create...(COM143)..Opening...Ok

Identifying... [SPRD3]
Sending Config Ok
Boot1 [hydra.fdl1] Ok
Spreadtrum Boot Block version 1.1
Boot2 [hydra.fdl2] Ok
Successfully booted..Ready to go...

TPortConnection.Destroy.....Closing...Ok..
Port : [Auto] Scanning...COM143
TPortConnection.Create...(COM143)..Opening...Ok

-------------------------------
Reading IMEI
nVRAM Partition NOT EXIST

Reading System Info..
Model : meizu C9
Brand : Meizu
Android Ver : 8.1.0
Manufacturer : Meizu
Device : meizuC9
Display ID : Meizu 8.1.2.5G
Security Patch : 2019-12-05
Kernel ID : 2019-12-05
FRPPST : /dev/block/platform/soc/soc:ap-ahb/20600000.sdio/by-name/persist
Fingerprint : Meizu/meizu_C9_Public/meizuC9:8.1.0/OPM2.171019.012/1575872908:user/release-keys
ro_product_hardware : SM1801
sys_hardware_version :

-------------------------------
*** Flash Mode #Remove FRP ***
Resetting FRP...Ok
Rebooting Phone..Ok

TPortConnection.Destroy.....Closing...Ok..
-------------------------------
Elapsed Time : 00:00:13
  Reply With Quote
Old 02-14-2020, 12:08   #418 (permalink)
No Life Poster
 
Join Date: Feb 2012
Age: 34
Posts: 508
Member: 1724862
Status: Offline
Thanks Meter: 137
Motorola E6 Plus FRP Reset by Hydra Tool

Motorola E6 Plus Google Account Remove Success



Quote:
=====================================
Connection[WAITING]Found
Mode[PreLoader] Port[COM21] Status[Opened]
ERAM Size : 0x0000000080000000 -2 GB
IRAM Size : 0x0000000000080000 -512 KB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 150100514436334D4201A26CA83876FD - QD63MB
UNICAL RID : 9BE163A333DDC6270B2CEFFE330EA11E
DA Speed : high-speed
Reading Partition Table[0x00008000] 43 Items
Done!!!


Reading System Info
Model : moto e(6) plus
Brand : motorola
Android Ver : 9
Manufacturer : motorola
Device : pokerp
Display ID : PTA29.401-18
Security Patch : 2019-08-05
Kernel ID : 2019-08-05
FingerPrint : motorola/pokerp/pokerp:9/PTA29.401-18/18:user/release-keys

-------------------------------------
FRP Security..
Operation : Auto
Remove FRP Operation Ok
=====================================

Elapsed Time : 00:00:04
  Reply With Quote
Old 02-14-2020, 12:10   #419 (permalink)
No Life Poster
 
Join Date: Feb 2012
Age: 34
Posts: 508
Member: 1724862
Status: Offline
Thanks Meter: 137
ZTE ConeXis X2 FRP Reset by Hydra Tool

ZTE ConeXis X2 Google account Remove Success



Quote:
Port selected..[COM14]
Connecting to Firehose...
Ping... Ok
Configuration......Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

Running : Ok

Reading GPT . Ok
Phone Information.....
Model : ConeXis X2
Brand : ZTE
Android Ver : 7.0
Manufacturer : ZTE
Device : ZTE_BLADE_V0850
Board : MSM8940
Display ID : FNB_ZA_ConeXisX2_V1.6
Security Patch : 2018-11-01
Platform : msm8937
Kernel ID : 2018-11-01
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : ZTE/FNB_ZA_P840F01/ZTE_BLADE_V0850:7.0/NRD90M/20181204.115036:user/release-keys
ro_product_hardware :
sys_hardware_version :

======================================
Reading GPT . Ok
*** FRP Reset ***
Resetting FRP...
Auto Ok
All Done
======================================
Elapsed Time : 00:00:10
  Reply With Quote
Old 02-14-2020, 12:12   #420 (permalink)
No Life Poster
 
Join Date: Feb 2012
Age: 34
Posts: 508
Member: 1724862
Status: Offline
Thanks Meter: 137
ZTE Blade Max View Z610DL FRP Reset by Hydra Tool

ZTE Blade Max View Z610DL Google Account Remove Success



Quote:
PreOperation Configuration
Brand : ZTE Model : Blade Max View Z610DL
Loader: Auto
Port : COM16

Port selected..[COM16]
Getting device info.......
Serial No.: 0x68BBF7CB
MSM ID : 0x0006B0E1
PBL Ver : 00000000
PK HASH : 168D0BAD52B5D5CBB882A90C1DAC68F9
299D3905816386BA1B1887DDA758CF6D

Firehose Loader[ZTE_4_2.mbn]
Sending .....................
NULLOk

Port selected..[COM16]
Connecting to Firehose...
Ping... Ok
Configuration......Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 1228577610
Firmware Version : 3
Product Name : GX6BMB
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 61071360[29.121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Running : Ok

Reading GPT . Ok
Phone Information.....
Model : Z610DL
Brand : ZTE
Android Ver : 8.1.0
Manufacturer : ZTE
Device : msm8937
Board : flame
Display ID : Z610DLV3.0.0B06
Security Patch : 2018-12-01
Platform : msm8937
Kernel ID : 2018-12-01
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : ZTE/Z610DL/msm8937:8.1.0/OPM1.171019.026/20181218.100240:user/release-keys
ro_product_hardware :
sys_hardware_version :

======================================
Reading GPT . Ok
*** FRP Reset ***
Resetting FRP...
Zero Wipe
[Zero Wipe]Ok
All Done
======================================
Elapsed Time : 00:00:10
  Reply With Quote
Reply

Bookmarks

Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


 



All times are GMT +1. The time now is 15:20.



Powered by Searchlight © 2020 Axivo Inc.
vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2020 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2017 -
Page generated in 0.34309 seconds with 8 queries

SEO by vBSEO