GSM Shop GSM Shop
GSM-Forum  

Welcome to the GSM-Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features.
Only registered members may post questions, contact other members or search our database of over 8 million posts.

Registration is fast, simple and absolutely free so please - Click to REGISTER!

If you have any problems with the registration process or your account login, please contact contact us .

Go Back   GSM-Forum > Product Support Sections > Special Solutions / Services / WebShop > GSMFABRICA Products > HYDRA TOOL


Reply
 
LinkBack Thread Tools Display Modes
Old 07-25-2020, 15:15   #571 (permalink)
No Life Poster
 
ceza031's Avatar
 
Join Date: Feb 2012
Age: 39
Posts: 1,395
Member: 1724862
Status: Offline
Thanks Meter: 448
Asus X017DA FRP Reset by Hydra Dongle


Asus X017DA FRP Reset by Hydra Dongle



Asus ZC600KL Zenfone 5 Google Account remove

Quote:
PreOperation Configuration
Brand : ASUS Model : X017D (ZenFone 5 ZC600KL 2018) Storage : Auto
Loader: asus_3_2.elf
Port : Auto
Connection : Flash Mode

Searching EDL Port..[COM46]
TPortConnection.Create...(COM46)..Opening...Ok
Getting device info.......
Serial No.: 0xEFD99B96
MSM ID : 0x000AC0E1, SDM636-Qualcomm Snapdragon 636
PBL Ver : 00000000
PK HASH : CD47CD2FD76E812DD08329A201DCD6E9
C26A2E12B4083DC513B7DFB4AE963F83

Firehose Loader[asus_3_2.elf]
Initializing SaharaBoot... Ok
Sending ...............................Ok

Connecting to Firehose...
Ping...... Ok
Configuration......
Identifying Chip....Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 8192
MaxPayloadSizeToTargetInBytesSupported : 8192
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : MSM8996
Version : 1
DateTime : Jan 28 2018 - 18:29:38

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 3721846382
Firmware Version : 5
Product Name : DH6DMB
Physical Partitions : 4
Total Logical Blocks:
Drive [0] 122142720[58.242 GB]
Drive [1] 122142720[58.242 GB]
Drive [2] 8192[4 MB]
Drive [3] 8192[4 MB]
Running : Ok

Reading GPT[4], Partitions(76 Items) Ok
Phone Information.....
Model : ASUS_X017DA
Brand : asus
Android Ver : 9
Manufacturer : asus
Device : ASUS_X017D_2
Display ID : PPR1.180610.009.WW_Phone-16.0610.1911.89-0
Security Patch : 2019-11-01
Kernel ID : 2019-11-01
FRPPST : /dev/block/bootdevice/by-name/frp
Fingerprint : asus/WW_Phone/ASUS_X017D_2:9/PPR1.180610.009/16.0610.1911.89-0:user/release-keys
ro_product_hardware :
sys_hardware_version :

Reading GPT[4], Partitions(76 Items) Ok
*** FRP Reset ***
Resetting FRP...
Auto
Processing...
Executing ...
[Zero Wipe] Ok

Elapsed Time : 00:00:11


TPortConnection.Destroy.....Closing...Ok..
  Reply With Quote
The Following User Says Thank You to ceza031 For This Useful Post:
Old 07-27-2020, 14:04   #572 (permalink)
No Life Poster
 
dicle_gsm's Avatar
 
Join Date: Jul 2007
Location: tr
Posts: 2,219
Member: 539148
Status: Offline
Thanks Meter: 2,174
Redmi Note 7 Pro (violet) Write Firmware EDL Mode Without Credit

Redmi Note 7 Pro (violet) Write Firmware EDL Mode Without Credit

Xiaomi Redmi Note 7 Pro Flashing ROM by QdLoader Mode 9008 EDL Port



Quote:
Searching EDL Port..[COM8]
TPortConnection.Create...(COM8)..Opening...Ok
Getting device info.......
Serial No.: 0x0AB0DA72
MSM ID : 0x000950E1, SM6150-Qualcomm Snapdragon 675
PBL Ver : 00000001
PK HASH : 1BEBE3863A6781DB4B01086063007334
DE9E5CA14971C7C4F4358EC9D79CDA46

Firehose Loader[Xiaomi_Redmi Note 7 Pro_Sdm6150_ddr.elf]
Initializing SaharaBoot... Ok
Sending ...................................Ok

Connecting to Firehose...
Ping.....
NOTE : FILTERED : <.
NOTE : FILTERED : ?.
NOTE : FILTERED : x.
NOTE : FILTERED : m.
NOTE : FILTERED : l. Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[5rqc8rzuth1-7khqBAR
Checking Internet connection....
- Hydra Is Online
Connecting to Hydra Xiaomi Server...

Signature @256bytes Authentication.... Accepted........
Identifying Chip....Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Jul 19 2019 - 01:12:10

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 1684040218
Firmware Version : 2
Product Name : 3V6CMB
Physical Partitions : 4
Total Logical Blocks:
Drive [0] 244277248[116.48 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Drive [3] 32768[16 MB]
Running : Ok

Reading GPT[4], Partitions(88 Items) Ok
Phone Information......
Model : Redmi Note 7 Pro
Brand : xiaomi
Android Ver : 9
Miui Ver : V10
Manufacturer : Xiaomi
Device : violet
Display ID : PKQ1.181203.001
Security Patch : 2019-02-01
Kernel ID : 2019-02-01
Fingerprint : xiaomi/violet/violet:9/PKQ1.181203.001/V10.2.5.0.PFHCNXM:user/release-keys
ro_product_hardware :
sys_hardware_version :


----------------------------
Flashing Selected Partitions
>multiimgoem(0)[multi_image.mbn] Ok
>vbmeta(0)[vbmeta.img] Ok
>qupfw(0)[qupv3fw.elf] Ok
>xbl_config(0)[xbl_config.elf] Ok
>storsec(0)[storsec.mbn] Ok
>storsecbak(0)[storsec.mbn] Ok
>aop(0)[aop.mbn] Ok
>aopbak(0)[aop.mbn] Ok
>hyp(0)[hyp.mbn] Ok
>hypbak(0)[hyp.mbn] Ok
>cmnlib(0)[cmnlib.mbn] Ok
>cmnlibbak(0)[cmnlib.mbn] Ok
>cmnlib64(0)[cmnlib64.mbn] Ok
>cmnlib64bak(0)[cmnlib64.mbn] Ok
>keymaster(0)[km4.mbn] Ok
>keymasterbak(0)[km4.mbn] Ok
>bluetooth(0)[BTFM.bin] Ok
>devcfg(0)[devcfg.mbn] Ok
>devcfgbak(0)[devcfg.mbn] Ok
>abl(0)[abl.elf] Ok
>ablbak(0)[abl.elf] Ok
>imagefv(0)[imagefv.elf] Ok
>uefisecapp(0)[uefi_sec.mbn] Ok
>uefisecappbak(0)[uefi_sec.mbn] Ok
>misc(0)[misc.img] Ok
>xbl(0)[xbl.elf] Ok
>xblbak(0)[xbl.elf] Ok
>tz(0)[tz.mbn] Ok
>tzbak(0)[tz.mbn] Ok
>logfs(0)[logfs_ufs_8mb.bin] Ok
>dtbo(0)[dtbo.img] Ok
>dsp(0)[dspso.bin] Ok
>splash(0)[splash.img] Ok
>persist(0)[persist.img] Ok
>boot(0)[boot.img] Ok
>recovery(0)[recovery.img] Ok
>modem(0)[NON-HLOS.bin] Ok
>cache(0)[cache.img] Ok
>cust(0)[cust.img] Ok
>system(0)[system.img] Ok
>vendor(0)[vendor.img] Ok
>userdata(0)[userdata.img] Ok
>PrimaryGPT(0)[gpt_main0.bin] Ok

Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-33.] OK
0 [CRC32(2,11264)] OK
0 [CRC32(NUM_DISK_SECTORS-33.,11264)] OK
0 [0] OK
0 [CRC32(1,92)] OK
0 [0] OK
0 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 0
Set bootable storage drive 0 Ok
Rebooting Phone.... Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:02:37
  Reply With Quote
The Following User Says Thank You to dicle_gsm For This Useful Post:
Old 07-27-2020, 14:22   #573 (permalink)
No Life Poster
 
dicle_gsm's Avatar
 
Join Date: Jul 2007
Location: tr
Posts: 2,219
Member: 539148
Status: Offline
Thanks Meter: 2,174
Redmi 8A IMEI Repair Without Root

Redmi 8A IMEI Repair Without Root

Xiaomi Redmi 8A olivelite Repair IMEI Without Root and Unlock Bootloader

Steps :
  1. Wipe Security by EDL Mode
  2. Enable Diag by Dial Screen Code #*#717717#*#*
  3. Write 2nd IMEI only from Connection Dignostic
  4. Write ENG QCN From Support Area



Quote:
PreOperation Configuration
Brand : XIAOMI Model : Redmi 8A (olivelite) Storage : Auto
Loader: Xiaomi_Redmi_8_Olive.mbn
Port : Auto
Connection : Flash Mode

Searching EDL Port..[COM15]
TPortConnection.Create...(COM15)..Opening...Ok
Getting device info.......
Serial No.: 0xF504AB87
MSM ID : 0x000BF0E1, SDM439-Qualcomm Snapdragon 439
PBL Ver : 00000001
PK HASH : 57158EAF1814D78FD2B3105ECE4DB18A
817A08AC664A5782A925F3FF8403D39A

Firehose Loader[Xiaomi_Redmi_8_Olive.mbn]
Initializing SaharaBoot... Ok
Sending .......................Ok

Connecting to Firehose...
Ping... Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[pW
Checking Internet connection....
- Hydra Is Online
Connecting to Hydra Xiaomi Server...

Signature @256bytes Authentication.... Accepted......
Identifying Chip....Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 2925650485
Firmware Version : 909127728
Product Name : hB8aP>
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 61071360[29,121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Running : Ok

Reading GPT[3], Partitions(64 Items) Ok
Phone Information......
Model : Redmi 8A
Brand : Xiaomi
Android Ver : 9
Miui Ver : V11
Manufacturer : Xiaomi
Device : olivelite
Mod_device : olivelite_eea_global
Display ID : ZQL2116-olivelite-build-20191214170409
Security Patch : 2019-12-01
Kernel ID : 2019-12-01
Fingerprint : Xiaomi/olivelite_eea/olivelite:9/PKQ1.190319.001/V11.0.2.0.PCPEUXM:user/release-keys
ro_product_hardware :
sys_hardware_version :

Reading GPT[3], Partitions(64 Items) Ok
Wipe Security ...
Security Data Found.
Reading Security Items....
> modemst1
> modemst2
> fsg
C:\User\Desktop\hydra\Backup\Security_Backup\Redmi 8A__9_Security_072220004144.sec
Backup Security Success....
Security Wipe Started..
> modemst1 Ok
> modemst2 Ok
> fsg Ok
Security Wipe Success...Ok

Elapsed Time : 00:00:30


TPortConnection.Destroy.....Closing...Ok..
  Reply With Quote
The Following User Says Thank You to dicle_gsm For This Useful Post:
Old 07-27-2020, 14:24   #574 (permalink)
No Life Poster
 
dicle_gsm's Avatar
 
Join Date: Jul 2007
Location: tr
Posts: 2,219
Member: 539148
Status: Offline
Thanks Meter: 2,174
Redmi 7A IMEI Repair Without Root and Unlock Bootloader

Redmi 7A IMEI Repair Without Root and Unlock Bootloader

Xiaomi Redmi 7A Pine Write 2nd IMEI Without Rooting and Unlock Bootloader

Steps :
  1. Run Hydra Qualcomm Module
  2. Wipe Security by EDL Mode
  3. Enable Diag by Dial Screen Code #*#717717#*#*
  4. Write 2nd IMEI only from Connection Dignostic
  5. Write ENG QCN From Support Area



Quote:
PreOperation Configuration
Brand : XIAOMI Model : Redmi 7A (pine) Storage : Auto
Loader: Xiaomi_Redmi_8_Olive.mbn
Port : Auto
Connection : Flash Mode

Searching EDL Port..[COM64]
TPortConnection.Create...(COM64)..Opening...Ok
Getting device info.......
Serial No.: 0xA5F83C79
MSM ID : 0x000BF0E1, SDM439-Qualcomm Snapdragon 439
PBL Ver : 00000001
PK HASH : 57158EAF1814D78FD2B3105ECE4DB18A
817A08AC664A5782A925F3FF8403D39A

Firehose Loader[Xiaomi_Redmi_8_Olive.mbn]
Initializing SaharaBoot... Ok
Sending .......................Ok

Connecting to Firehose...
Ping... Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[jKk7iaIMLI0oReNvM1X11cbLCFH]
Checking Internet connection....
- Hydra Is Online
Connecting to Hydra Xiaomi Server...

Signature @256bytes Authentication.... Accepted......
Identifying Chip....Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 1026075229
Firmware Version : 165
Product Name : HAG4a2
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 30777344[14.676 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Running : Ok

Reading GPT[3], Partitions(60 Items) Ok
Phone Information......
Model : Redmi 7A
Brand : Xiaomi
Android Ver : 9
Miui Ver : V11
Manufacturer : Xiaomi
Device : pine
Mod_device : pine_global
Display ID : ZQL1533-pine-build-20200407194230
Security Patch : 2020-03-01
Kernel ID : 2020-03-01
Fingerprint : Xiaomi/pine/pine:9/PKQ1.190319.001/V11.0.7.0.PCMMIXM:user/release-keys
ro_product_hardware :
sys_hardware_version :

Reading GPT[3], Partitions(60 Items) Ok
Wipe Security ...
Security Data Found.
Reading Security Items....
> modemst1
> modemst2
> fsg
C:\Hydra Tool\Backup\Security_Backup\Redmi 7A__9_Security_072120151855.sec
Backup Security Success....
Security Wipe Started..
> modemst1 Ok
> modemst2 Ok
> fsg Ok
Security Wipe Success...Ok
Rebooting Phone.... Ok
If not rebooted, Please Power on Manually

Elapsed Time : 00:00:16


TPortConnection.Destroy.....Closing...Ok..
  Reply With Quote
The Following User Says Thank You to dicle_gsm For This Useful Post:
Old 07-27-2020, 14:31   #575 (permalink)
No Life Poster
 
dicle_gsm's Avatar
 
Join Date: Jul 2007
Location: tr
Posts: 2,219
Member: 539148
Status: Offline
Thanks Meter: 2,174
Xiaomi Redmi 6 Pro sakur'a Mi Account Remove Success by Hydra Dongle

Xiaomi Redmi 6 Pro sakur'a Mi Account Remove Success by Hydra Dongle

Put your device to EDL Mode, From service tick Xiaomi,
Select Remove Mi Account Erase Method and Click Execute,
After it before you connect it wifi or mobile data enable
ADB and dissable mi account by adb.




Quote:
PreOperation Configuration
Brand : XIAOMI Model : Redmi 6 Pro (sakur'a ) Storage : Auto
Loader: Xiaomi_Remi 6 pro_sakur'a _8953_ddr.mbn
Port : Auto
Connection : Flash Mode

Searching EDL Port..[COM7]
TPortConnection.Create...(COM7)..Opening...Ok
Getting device info.......
Serial No.: 0xC905A505
MSM ID : 0x000460E1, MSM8953-Qualcomm Snapdragon 625
PBL Ver : 00000001
PK HASH : 57158EAF1814D78FD2B3105ECE4DB18A
817A08AC664A5782A925F3FF8403D39A

Firehose Loader[Xiaomi_Remi 6 pro_sakur'a _8953_ddr.mbn]
Initializing SaharaBoot... Ok
Sending ....................Ok

Connecting to Firehose...
Ping... Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[st2501tZFK5NB9UMx6IRNhSI
Checking Internet connection....
- Hydra Is Online
Connecting to Hydra Xiaomi Server...

Signature @256bytes Authentication.... Accepted......
Identifying Chip....Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8953
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 1467314234
Firmware Version : 165
Product Name : HBG4a2
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 61071360[29.121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Running : Ok

Reading GPT[3], Partitions(60 Items) Ok
Phone Information.....
Model : Redmi 6 Pro
Brand : xiaomi
Android Ver : 8.1.0
Miui Ver : V9
Manufacturer : Xiaomi
Device : sakur'a _india
Mod_device : sakur'a _india_global
Display ID : ZQL1715-sakur'a _india-build-20180712001207
Security Patch : 2018-07-01
Kernel ID : 2018-07-01
Fingerprint : xiaomi/sakur'a_india/sakur'a_india:8.1.0/OPM1.171019.019/V9.6.1.0.ODMMIFD:user/release-keys
ro_product_hardware :
sys_hardware_version :

Reading GPT[3], Partitions(60 Items) Ok
Operation : MiAccount
Remove MiAccount[Erase Method]
Processing...
Backing up Partition for safety...Ok

Scanning Patching address...
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]Done!!
Total Items patched : 2
Successfully patched address..Ok

Elapsed Time : 00:00:14


TPortConnection.Destroy.....Closing...Ok..
  Reply With Quote
The Following User Says Thank You to dicle_gsm For This Useful Post:
Old 07-27-2020, 14:33   #576 (permalink)
No Life Poster
 
dicle_gsm's Avatar
 
Join Date: Jul 2007
Location: tr
Posts: 2,219
Member: 539148
Status: Offline
Thanks Meter: 2,174
Meizu X8 Passsowrd Remove Success by Hydra Dongle

Meizu X8 Passsowrd Remove Success by Hydra Dongle




Quote:
PreOperation Configuration
Brand : MEIZU Model : X8 Storage : Auto
Loader: prog_firehose_ddr_8.elf
Port : Auto
Connection : Flash Mode

Searching EDL Port..[COM36]
TPortConnection.Create...(COM36)..Opening...Ok
Getting device info.......
Serial No.: 0x0004B525
MSM ID : 0x000DB0E1,
PBL Ver : 00000000
PK HASH : 160F033421DFAE527BA8E46CF3424568
BE38770F5887D2F3608FBB5FD2EF4483

Firehose Loader[prog_firehose_ddr_8.elf]
Initializing SaharaBoot... Ok
Sending .....................................Ok

Connecting to Firehose...
Ping.....
NOTE : FILTERED : <.
NOTE : FILTERED : ?.
NOTE : FILTERED : x.
NOTE : FILTERED : m.
NOTE : FILTERED : l. Ok
Configuration........
Identifying Chip....Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Nov 13 2018 - 23:03:33

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 2223033503
Firmware Version : 2
Product Name : DH6DAB
Physical Partitions : 4
Total Logical Blocks:
Drive [0] 122142720[58,242 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Drive [3] 32768[16 MB]
Running : Ok

Reading GPT[4], Partitions(72 Items) Ok
Phone Information.....
Model : meizu X8
Brand : Meizu
Android Ver : 8.1.0
Manufacturer : Meizu
Device : X8
Display ID : Flyme 7.3.0.0G
Security Patch : 2019-04-01
Kernel ID : 2019-04-01
Fingerprint : Meizu/meizu_X8/X8:8.1.0/OPM1.171019.026/1556996821:user/release-keys
ro_product_hardware :
sys_hardware_version :

Reading GPT[4], Partitions(72 Items) Ok
Formatting Userdata...
Method : Auto
Processing...
Executing ...
[Format Safe method] Ok

Elapsed Time : 00:00:12


TPortConnection.Destroy.....Closing...Ok..
  Reply With Quote
The Following User Says Thank You to dicle_gsm For This Useful Post:
Old 08-04-2020, 08:36   #577 (permalink)
No Life Poster
 
Join Date: May 2011
Posts: 1,322
Member: 1576733
Status: Offline
Thanks Meter: 622
Xiaomi Mi 8 Explorer Edition ursa Unbrick by Hydra Tool

Xiaomi Mi 8 Explorer Edition ursa Unbrick by Hydra Tool
Fix Mi 8 Explorer Edition (ursa) Fix system has been destroyed without credit



Quote:
Port selected..[COM12]
TPortConnection.Create...(COM12)..Opening...Ok
Getting device info..
Device MODE : SAHARA

Connecting to Firehose...
Ping.....
NOTE : FILTERED : <.
NOTE : FILTERED : ?.
NOTE : FILTERED : x.
NOTE : FILTERED : m.
NOTE : FILTERED : l. Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[zbGG8hkIqbCnBPWCDwrHD
Checking Internet connection....
- Hydra Is Online
Connecting to Hydra Xiaomi Server...

Signature @256bytes Authentication.... Accepted........
Identifying Chip........UFS Ok
Chip Configuration :
MemoryName : UFS
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Aug 17 2018 - 13:21:01

*** STORAGE DEVICE INFO ***
Memory Type : UFS
Block Size in Bytes : 4096
Page Size : 4096
Manufacturer ID : 462
Serial Number : 1297306958
Firmware Version : 500
Product Name : KLUDG4U1EA-B0C1
Physical Partitions : 6
Total Logical Blocks:
Drive [0] 30038016[114.586 GB]
Drive [1] 2048[8 MB]
Drive [2] 2048[8 MB]
Drive [3] 8192[32 MB]
Drive [4] 1179648[4.5 GB]
Drive [5] 8192[32 MB]
Running : Ok

Reading GPT[6], Partitions(224 Items) Ok
Phone Information.....
Model : MI 8 Explorer Edition
Brand : Xiaomi
Android Ver : 8.1.0
Miui Ver : V9
Manufacturer : Xiaomi
Device : ursa
Display ID : OPM1.171019.026
Security Patch : 2018-07-01
Kernel ID : 2018-07-01
Fingerprint : Xiaomi/ursa/ursa:8.1.0/OPM1.171019.026/V9.6.7.0.OEHCNFD:user/release-keys
ro_product_hardware :
sys_hardware_version :


----------------------------
Flashing Selected Partitions
>switch(0)[dummy.img] Ok
>misc(0)[misc.img] Ok
>logfs(0)[logfs_ufs_8mb.bin] Ok
>persist(0)[persist.img] Skipped
>cust(0)[cust.img] Ok
>recovery(0)[recovery.img] Ok
>cache(0)[cache.img] Ok
>userdata(0)[userdata.img] Ok
>PrimaryGPT(0)[gpt_main0.bin] Ok
>xbl_config_a(1)[xbl_config.img] Ok
>xbl_a(1)[xbl.img] Ok
>PrimaryGPT(1)[gpt_main1.bin] Ok
>xbl_config_b(2)[xbl_config.img] Ok
>xbl_b(2)[xbl.img] Ok
>PrimaryGPT(2)[gpt_main2.bin] Ok
>PrimaryGPT(3)[gpt_main3.bin] Ok
>limits(4)[dummy.img] Ok
>qupfw_a(4)[qupfw.img] Ok
>qupfw_b(4)[qupfw.img] Ok
>storsec_a(4)[storsec.img] Ok
>storsec_b(4)[storsec.img] Ok
>devcfg_a(4)[devcfg.img] Ok
>devcfg_b(4)[devcfg.img] Ok
>aop_a(4)[aop.img] Ok
>aop_b(4)[aop.img] Ok
>cmnlib_a(4)[cmnlib.img] Ok
>cmnlib_b(4)[cmnlib.img] Ok
>cmnlib64_a(4)[cmnlib64.img] Ok
>cmnlib64_b(4)[cmnlib64.img] Ok
>keymaster_a(4)[keymaster.img] Ok
>keymaster_b(4)[keymaster.img] Ok
>bluetooth(4)[bluetooth.img] Ok
>hyp_a(4)[hyp.img] Ok
>hyp_b(4)[hyp.img] Ok
>abl_a(4)[abl.img] Ok
>abl_b(4)[abl.img] Ok
>tz_a(4)[tz.img] Ok
>tz_b(4)[tz.img] Ok
>logo(4)[logo.img] Ok
>dsp(4)[dsp.img] Ok
>boot(4)[boot.img] Ok
>modem(4)[modem.img] Ok
>vendor(4)[vendor.img] Ok
>PrimaryGPT(4)[gpt_main4.bin] Ok
>ImageFv(5)[imagefv.elf] Ok
>PrimaryGPT(5)[gpt_main5.bin] Ok

Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-6.] OK
0 [NUM_DISK_SECTORS-6.] OK
0 [NUM_DISK_SECTORS-6.] OK
0 [NUM_DISK_SECTORS-6.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-5.] OK
0 [CRC32(2,4096)] OK
0 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
0 [0] OK
0 [CRC32(1,92)] OK
0 [0] OK
0 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
1 [NUM_DISK_SECTORS-6.] OK
1 [NUM_DISK_SECTORS-6.] OK
1 [NUM_DISK_SECTORS-6.] OK
1 [NUM_DISK_SECTORS-6.] OK
1 [NUM_DISK_SECTORS-1.] OK
1 [NUM_DISK_SECTORS-1.] OK
1 [NUM_DISK_SECTORS-5.] OK
1 [CRC32(2,4096)] OK
1 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
1 [0] OK
1 [CRC32(1,92)] OK
1 [0] OK
1 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
2 [NUM_DISK_SECTORS-6.] OK
2 [NUM_DISK_SECTORS-6.] OK
2 [NUM_DISK_SECTORS-6.] OK
2 [NUM_DISK_SECTORS-6.] OK
2 [NUM_DISK_SECTORS-1.] OK
2 [NUM_DISK_SECTORS-1.] OK
2 [NUM_DISK_SECTORS-5.] OK
2 [CRC32(2,4096)] OK
2 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
2 [0] OK
2 [CRC32(1,92)] OK
2 [0] OK
2 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
3 [NUM_DISK_SECTORS-6.] OK
3 [NUM_DISK_SECTORS-6.] OK
3 [NUM_DISK_SECTORS-6.] OK
3 [NUM_DISK_SECTORS-6.] OK
3 [NUM_DISK_SECTORS-1.] OK
3 [NUM_DISK_SECTORS-1.] OK
3 [NUM_DISK_SECTORS-5.] OK
3 [CRC32(2,4096)] OK
3 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
3 [0] OK
3 [CRC32(1,92)] OK
3 [0] OK
3 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
4 [NUM_DISK_SECTORS-6.] OK
4 [NUM_DISK_SECTORS-6.] OK
4 [NUM_DISK_SECTORS-6.] OK
4 [NUM_DISK_SECTORS-6.] OK
4 [NUM_DISK_SECTORS-1.] OK
4 [NUM_DISK_SECTORS-1.] OK
4 [NUM_DISK_SECTORS-5.] OK
4 [CRC32(2,8192)] OK
4 [CRC32(NUM_DISK_SECTORS-5.,8192)] OK
4 [0] OK
4 [CRC32(1,92)] OK
4 [0] OK
4 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
5 [NUM_DISK_SECTORS-6.] OK
5 [NUM_DISK_SECTORS-6.] OK
5 [NUM_DISK_SECTORS-6.] OK
5 [NUM_DISK_SECTORS-6.] OK
5 [NUM_DISK_SECTORS-1.] OK
5 [NUM_DISK_SECTORS-1.] OK
5 [NUM_DISK_SECTORS-5.] OK
5 [CRC32(2,4096)] OK
5 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
5 [0] OK
5 [CRC32(1,92)] OK
5 [0] OK
5 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 1
Set bootable storage drive 1 Ok
Rebooting Phone.... Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:02:41
  Reply With Quote
The Following User Says Thank You to diosa For This Useful Post:
Old 08-04-2020, 08:39   #578 (permalink)
No Life Poster
 
Join Date: May 2011
Posts: 1,322
Member: 1576733
Status: Offline
Thanks Meter: 622
Vivo Y81i Demo Remove by Hydra Dongle

Vivo Y81i Demo Remove by Hydra Dongle



Quote:
Brand : AUTO Model : AUTO Connection : ATE Mode
Connection[WAITING]Found[COM47]
TPortConnection.Create...(COM47)..Opening...Ok
Reading Device Info....
Device : MOLY.LR12A.R2.MP.V32.21.P136
IMEI- 1 : "861687049720099"
IMEI- 2 : "861687049720081"
MAC ADDRESS: "88F7BF2D607F"
Version: "PD1732CF_EX_A_1.22.0"
RID: "90014a484147346132a53491f133859d"
Serial Number: "0B1A5081689424012345"
vivo.oem.name: PD1732CF_EX_PH_NULL_NULL
FingerPrint: vivo/1812/1812:8.1.0/O11019/1592467744:user/release-keys
FRPPST: /dev/block/platform/bootdevice/by-name/frp
Model: vivo 1812
ModeRAMl: "1822"
---------------------------------
Vivo removing DEMO Ok
---------------------------------

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:02
  Reply With Quote
The Following User Says Thank You to diosa For This Useful Post:
Old 08-04-2020, 08:41   #579 (permalink)
No Life Poster
 
Join Date: May 2011
Posts: 1,322
Member: 1576733
Status: Offline
Thanks Meter: 622
Redmi Note 8T willow Fix NV Data Corrupted Without Credit

Redmi Note 8T willow Fix NV Data Corrupted Without Credit



Quote:
PreOperation Configuration
Brand : XIAOMI Model : Redmi Note 8T (wiilow) Storage : Auto
Loader: Xiaomi_redminote8_loader.elf
Port : Auto
Connection : Flash Mode

Searching EDL Port..[COM3]
TPortConnection.Create...(COM3)..Opening...Ok
Getting device info.......
Serial No.: 0xEF55B8FC
MSM ID : 0x0010A0E1,
PBL Ver : 00000001
PK HASH : 1BEBE3863A6781DB4B01086063007334
DE9E5CA14971C7C4F4358EC9D79CDA46

Firehose Loader[Xiaomi_redminote8_loader.elf]
Initializing SaharaBoot... Ok
Sending ..............................Ok

Connecting to Firehose...
Ping.....
NOTE : FILTERED : <.
NOTE : FILTERED : ?.
NOTE : FILTERED : x.
NOTE : FILTERED : m.
NOTE : FILTERED : l. Ok
Configuration........
Identifying Chip....Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Jul 3 2019 - 22:23:56

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 578492436
Firmware Version : 875573296
Product Name : hB8aP>
Physical Partitions : 4
Total Logical Blocks:
Drive [0] 61071360[29.121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Drive [3] 32768[16 MB]
Running : Ok

Reading GPT[4], Partitions(88 Items) Ok
Phone Information......
Model : Redmi Note 8T
Brand : xiaomi
Android Ver : 9
Miui Ver : V10
Manufacturer : Xiaomi
Device : willow
Mod_device : willow_global
Display ID : PKQ1.190616.001
Security Patch : 2019-10-01
Kernel ID : 2019-10-01
Fingerprint : xiaomi/willow/willow:9/PKQ1.190616.001/V10.3.1.0.PCXMIXM:user/release-keys
ro_product_hardware :
sys_hardware_version :

Reading GPT[4], Partitions(88 Items) Ok
Wipe Security ...
Security Data Found.
Reading Security Items....
> modemst1
> modemst2
> fsg
C:\Hydra Tool\Backup\Security_Backup\Redmi Note 8T__9_Security_072520004526.sec
Backup Security Success....
Security Wipe Started..
> modemst1 Ok
> modemst2 Ok
> fsg Ok
Security Wipe Success...Ok

Elapsed Time : 00:02:26


TPortConnection.Destroy.....Closing...Ok..
  Reply With Quote
The Following User Says Thank You to diosa For This Useful Post:
Old 08-04-2020, 08:46   #580 (permalink)
No Life Poster
 
Join Date: May 2011
Posts: 1,322
Member: 1576733
Status: Offline
Thanks Meter: 622
Redmi 8A Pro FRP Reset Success by Hydra Tool

Redmi 8A Pro FRP Reset Success by Hydra Tool

Xiaomi Redmi 8A Pro olivewood Android 9 Google account remove by Hydra Dongle




Quote:
PreOperation Configuration
Brand : XIAOMI Model : Redmi 8A Pro Storage : Auto
Loader: Xiaomi_Redmi_8_Olive.mbn
Port : Auto
Connection : Flash Mode

Searching EDL Port..[COM30]
TPortConnection.Create...(COM30)..Opening...Ok
Getting device info.......
Serial No.: 0x2DC6BCE4
MSM ID : 0x000BF0E1, SDM439-Qualcomm Snapdragon 439
PBL Ver : 00000001
PK HASH : 57158EAF1814D78FD2B3105ECE4DB18A
817A08AC664A5782A925F3FF8403D39A

Firehose Loader[Xiaomi_Redmi_8_Olive.mbn]
Initializing SaharaBoot... Ok
Sending .......................Ok

Connecting to Firehose...
Ping... Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[0jQcebbMbmV97H7weGsqyEN4CCy]
Checking Internet connection....
- Hydra Is Online
Connecting to Hydra Xiaomi Server...

Signature @256bytes Authentication.... Accepted......
Identifying Chip....Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 2997327531
Firmware Version : 1
Product Name : QD63MB
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 61071360[29,121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Running : Ok

Reading GPT[3], Partitions(64 Items) Ok
Phone Information......
Model : Redmi 8A Pro
Brand : Redmi
Android Ver : 9
Miui Ver : V11
Manufacturer : Xiaomi
Device : olivewood
Mod_device : olivewood_id_global
Display ID : ZQL2117-olivewood-build-20200228172221
Security Patch : 2020-02-01
Kernel ID : 2020-02-01
Fingerprint : Redmi/olivewood/olivewood:9/PKQ1.190319.001/V11.0.2.0.PCQIDXM:user/release-keys
ro_product_hardware :
sys_hardware_version :

Reading GPT[3], Partitions(64 Items) Ok
*** FRP Reset ***
Resetting FRP...
Auto
Processing...
Executing ...
[Zero Wipe] Ok

Elapsed Time : 00:00:12


TPortConnection.Destroy.....Closing...Ok..
  Reply With Quote
The Following User Says Thank You to diosa For This Useful Post:
Old 08-04-2020, 08:49   #581 (permalink)
No Life Poster
 
Join Date: May 2011
Posts: 1,322
Member: 1576733
Status: Offline
Thanks Meter: 622
Redmi 8 olive Fix NV Data Corrupted by Hydra Tool

Redmi 8 olive Fix NV Data Corrupted by Hydra Tool

Xiaomi Fix NV Data Corrupted, Hang on logo Redmi 8 (olive) Erase Security by hydra dongle, without credit.



Quote:
PreOperation Configuration
Brand : XIAOMI Model : Redmi 8 (olive) Storage : Auto
Loader: Xiaomi_Redmi_8_Olive.mbn
Port : Auto
Connection : Flash Mode

Searching EDL Port..[COM4]
TPortConnection.Create...(COM4)..Opening...Ok
Getting device info.......
Serial No.: 0xF672B18E
MSM ID : 0x000BF0E1, SDM439-Qualcomm Snapdragon 439
PBL Ver : 00000001
PK HASH : 57158EAF1814D78FD2B3105ECE4DB18A
817A08AC664A5782A925F3FF8403D39A

Firehose Loader[Xiaomi_Redmi_8_Olive.mbn]
Initializing SaharaBoot... Ok
Sending .......................Ok

Connecting to Firehose...
Ping... Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[922BwHSX6zZ-
Checking Internet connection....
- Hydra Is Online
Connecting to Hydra Xiaomi Server...

Signature @256bytes Authentication.... Accepted......
Identifying Chip....Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 19
Serial Number : 370607686
Firmware Version : 4
Product Name : S0J9N8
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 122142720[58.242 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Running : Ok

Reading GPT[3], Partitions(64 Items) Ok
Phone Information......
Model : Redmi 8
Brand : Xiaomi
Android Ver : 9
Miui Ver : V11
Manufacturer : Xiaomi
Device : olive
Mod_device : olive_in_global
Display ID : ZQL2115-olive-build-20200515001019
Security Patch : 2020-05-01
Kernel ID : 2020-05-01
Fingerprint : Xiaomi/olive/olive:9/PKQ1.190319.001/V11.0.11.0.PCNINXM:user/release-keys
ro_product_hardware :
sys_hardware_version :

Reading GPT[3], Partitions(64 Items) Ok
Wipe Security ...
Security Data Found.
Reading Security Items....
> modemst1
> modemst2
> fsg
C:\Hydra Tool\Backup\Security_Backup\Redmi 8__9_Security_072420112302.sec
Backup Security Success....
Security Wipe Started..
> modemst1 Ok
> modemst2 Ok
> fsg Ok
Security Wipe Success...Ok

Elapsed Time : 00:00:18


TPortConnection.Destroy.....Closing...Ok..
  Reply With Quote
The Following User Says Thank You to diosa For This Useful Post:
Old 08-04-2020, 08:51   #582 (permalink)
No Life Poster
 
Join Date: May 2011
Posts: 1,322
Member: 1576733
Status: Offline
Thanks Meter: 622
Nokia 2.2 FRP Reset Success by Hydra Tool

Nokia 2.2 FRP Reset Success by Hydra Tool



Quote:
Brand : AUTO Model : AUTO Connection : Flash Mode

=====================================
Connection[WAITING]Found[COM14] Status[Opened]
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x000000074A000000 -29.156 GB
eMMC CID : 7001005441323833322019B10DE7460F - TA2832
UNICAL RID : 2E61F14FA128035E2983387E99E83DAB
Reading GPT-EMMC [0x00008000] 130 Items
Done!!!


Reading System Info
Model : Nokia 2.2
Brand : Nokia
Android Ver : 9
Manufacturer : HMD Global
Device : WSP_sprout
Display ID : 00WW_1_280
Security Patch : 2019-05-05
Kernel ID : 2019-05-05
Fingerprint : Nokia/Wasp_00WW/WSP_sprout:9/PPR1.180610.011/00WW_1_280:user/release-keys
ro_product_hardware :
sys_hardware_version :

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition...
Erasing FRP Partition... Ok

Elapsed Time : 00:00:07
  Reply With Quote
The Following User Says Thank You to diosa For This Useful Post:
Old 08-04-2020, 08:55   #583 (permalink)
No Life Poster
 
Join Date: May 2011
Posts: 1,322
Member: 1576733
Status: Offline
Thanks Meter: 622
Xiaomi Mi Max (Hydrogen) Remove Mi Account MIUI 10 Android 7 by Hydra Dongle

Mi Max Hydrogen Mi account remove

Xiaomi Mi Max (Hydrogen) Remove Mi Account MIUI 10 Android 7 by Hydra Dongle



Quote:
PreOperation Configuration
Brand : XIAOMI Model : Mi Max (Hydrogen) Storage : Auto
Loader: mi_0_4.mbn
Port : COM14
Connection : Flash Mode

Port selected..[COM14]
TPortConnection.Create...(COM14)..Opening...Ok
Getting device info.......
Serial No.: 0x02E61EE2
MSM ID : 0x009B00E1, MSM8956-Qualcomm Snapdragon 650
PBL Ver : 00000000
PK HASH : 57158EAF1814D78FD2B3105ECE4DB18A
817A08AC664A5782A925F3FF8403D39A

Firehose Loader[mi_0_4.mbn]
Initializing SaharaBoot... Ok
Sending ..................Ok

Connecting to Firehose...
Ping... Ok
Configuration......
Identifying Chip....Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8976
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 17
Serial Number : 2875987522
Firmware Version : 4
Product Name : 032G34
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 61071360[29.121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Running : Ok

Reading GPT[3], Partitions(68 Items) Ok
Phone Information.....
Model : MI MAX
Brand : Xiaomi
Android Ver : 7.0
Miui Ver : V10
Manufacturer : Xiaomi
Device : hydrogen
Mod_device : hydrogen_global
Board : msm8952
Display ID : NRD90M
Security Patch : 2018-04-01
Platform : msm8952
Kernel ID : 2018-04-01
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : Xiaomi/hydrogen/hydrogen:7.0/NRD90M/V10.2.2.0.NBCMIXM:user/release-keys
ro_product_hardware :
sys_hardware_version :

Reading GPT[3], Partitions(68 Items) Ok
Operation : MiAccount
Remove MiAccount[Erase Method]
Processing...
Backing up Partition for safety...Ok

Scanning Patching address...
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]Done!!
Total Items patched : 41
Successfully patched address..Ok

Elapsed Time : 00:00:15


TPortConnection.Destroy.....Closing...Ok..
  Reply With Quote
The Following User Says Thank You to diosa For This Useful Post:
Old 08-04-2020, 08:59   #584 (permalink)
No Life Poster
 
Join Date: May 2011
Posts: 1,322
Member: 1576733
Status: Offline
Thanks Meter: 622
Xiaomi Mi Max 2 (oxygen) Remove Mi Account MIUI 11 Android 7 by Hydra Dongle

Mi Max 2 oxygen mi account remove done

Xiaomi Mi Max 2 (oxygen) Remove Mi Account MIUI 11 Android 7 by Hydra Dongle



Quote:
PreOperation Configuration
Brand : XIAOMI Model : Mi Max 2 (Oxygen) Storage : Auto
Loader: Mi_8953.mbn
Port : Auto
Connection : Flash Mode

Searching EDL Port..[COM16]
TPortConnection.Create...(COM16)..Opening...Ok
Getting device info.......
Serial No.: 0xFE9BB138
MSM ID : 0x000460E1, MSM8953-Qualcomm Snapdragon 625
PBL Ver : 00000000
PK HASH : 57158EAF1814D78FD2B3105ECE4DB18A
817A08AC664A5782A925F3FF8403D39A

Firehose Loader[Mi_8953.mbn]
Initializing SaharaBoot... Ok
Sending ..................Ok

Connecting to Firehose...
Ping... Ok
Configuration......
Identifying Chip....Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8953
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 1277221553
Firmware Version : 4
Product Name : RV54MB
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 244277248[116.48 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Running : Ok

Reading GPT[3], Partitions(68 Items) Ok
Phone Information.....
Model : MI MAX 2
Brand : Xiaomi
Android Ver : 7.1.1
Miui Ver : V11
Manufacturer : Xiaomi
Device : oxygen
Board : msm8953
Display ID : NMF26F
Security Patch : 2019-03-01
Platform : msm8953
Kernel ID : 2019-03-01
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : Xiaomi/oxygen/oxygen:7.1.1/NMF26F/V11.0.2.0.NDDCNXM:user/release-keys
ro_product_hardware :
sys_hardware_version :

Reading GPT[3], Partitions(68 Items) Ok
Operation : MiAccount
Remove MiAccount[Erase Method]
Processing...
Backing up Partition for safety...Ok

Scanning Patching address...
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]Done!!
Total Items patched : 176
Successfully patched address..Ok

Elapsed Time : 00:00:22


TPortConnection.Destroy.....Closing...Ok..
  Reply With Quote
The Following User Says Thank You to diosa For This Useful Post:
Old 08-04-2020, 09:01   #585 (permalink)
No Life Poster
 
Join Date: May 2011
Posts: 1,322
Member: 1576733
Status: Offline
Thanks Meter: 622
Mi 8 Pro equuleus Mi Account Remove Success

Mi 8 Pro equuleus Mi Account Remove Success

Xiaomi Mi 8 Pro (equuleus) Remove Mi Account on MIUI 10 Android 8 With Hydra Dongle, without credit



Quote:
PreOperation Configuration
Brand : XIAOMI Model : Mi 8 Pro (equuleus) Storage : Auto
Loader: Xiaomi_ufs_firehose_sdm845_ddr.elf
Port : Auto
Connection : Flash Mode

Searching EDL Port..[COM149]
TPortConnection.Create...(COM149)..Opening...Ok
Getting device info.......
Serial No.: 0xE6AF40BE
MSM ID : 0x0008B0E1, SDM845-Qualcomm Snapdragon 845
PBL Ver : 00000001
PK HASH : C924A35F39CE1CDD1B8D5A9F3B8E3C51
317930431D7A9DD5A55028CF6965FE65

Firehose Loader[Xiaomi_ufs_firehose_sdm845_ddr.elf]
Initializing SaharaBoot... Ok
Sending ....................................Ok

Connecting to Firehose...
Ping.....
NOTE : FILTERED : <.
NOTE : FILTERED : ?.
NOTE : FILTERED : x.
NOTE : FILTERED : m.
NOTE : FILTERED : l. Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[r2
Checking Internet connection....
- Hydra Is Online
Connecting to Hydra Xiaomi Server...

Signature @256bytes Authentication.... Accepted........
Identifying Chip........UFS Ok
Chip Configuration :
MemoryName : UFS
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Aug 17 2018 - 13:21:01

*** STORAGE DEVICE INFO ***
Memory Type : UFS
Block Size in Bytes : 4096
Page Size : 4096
Manufacturer ID : 462
Serial Number : 1297306958
Firmware Version : 500
Product Name : KLUDG4U1EA-B0C1
Physical Partitions : 6
Total Logical Blocks:
Drive [0] 30038016[114,586 GB]
Drive [1] 2048[8 MB]
Drive [2] 2048[8 MB]
Drive [3] 8192[32 MB]
Drive [4] 1179648[4,5 GB]
Drive [5] 8192[32 MB]
Running : Ok

Reading GPT[6], Partitions(224 Items) Ok
Phone Information.....
Model : MI 8 Pro
Brand : Xiaomi
Android Ver : 8.1.0
Miui Ver : V10
Manufacturer : Xiaomi
Device : equuleus
Mod_device : equuleus_global
Display ID : OPM1.171019.026
Security Patch : 2018-10-01
Kernel ID : 2018-10-01
Fingerprint : Xiaomi/equuleus/equuleus:8.1.0/OPM1.171019.026/V10.0.1.0.OECMIFH:user/release-keys
ro_product_hardware :
sys_hardware_version :

Reading GPT[6], Partitions(224 Items) Ok
Operation : MiAccount
Remove MiAccount[Erase Method]
Processing...
Backing up Partition for safety...Ok

Scanning Patching address...
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]Done!!
Total Items patched : 28
Successfully patched address..Ok

Elapsed Time : 00:00:27


TPortConnection.Destroy.....Closing...Ok..
  Reply With Quote
The Following User Says Thank You to diosa For This Useful Post:
Reply

Bookmarks


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


 



All times are GMT +1. The time now is 17:23.



Powered by Searchlight © 2024 Axivo Inc.
vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2024 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2023 -
Page generated in 0.52238 seconds with 9 queries

SEO by vBSEO