GSM Shop GSM Shop
GSM-Forum  

Welcome to the GSM-Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features.
Only registered members may post questions, contact other members or search our database of over 8 million posts.

Registration is fast, simple and absolutely free so please - Click to REGISTER!

If you have any problems with the registration process or your account login, please contact contact us .

Go Back   GSM-Forum > Product Support Sections > Special Solutions / Services / WebShop > GSMFABRICA Products > HYDRA TOOL


Reply
 
LinkBack Thread Tools Display Modes
Old 02-12-2021, 07:35   #1216 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Oppo F7 (CPH1819) Rebuilding User Data successfully done by Hydra Tool


Oppo F7 (CPH1819) Rebuilding User Data successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
Brand : OPPO Model : F7 (CPH1819) Connection : Flash Mode

=====================================
Connection
-Please wait...
-Found...[COM41]

TPortConnection.Create...(COM41)..Opening...Ok

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 1AA85F8110A815ED19E8BBFC3860EB5F
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 150100444836444D42058F2290EBB4AD - DH6DMB

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
ID : QP1A.190711.020
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6771-user 10 QP1A.190711.020 7604ad4e2b1328a1 release-keys
Display ID : QP1A.190711.020 release-keys
Security Patch : 2020-12-05
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Rebuild Userdata
Processing...
Rebuilding Userdata... Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:08
BR
Dipendra Pathak

  Reply With Quote
Old 02-12-2021, 07:39   #1217 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Xiaomi Mi Max 2 (Chiron) Find Device Off successfully done by Hydra Tool

Xiaomi Mi Max 2 (Chiron) Find Device Off successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : XIAOMI Model : Mi Mix 2 (Chiron) Storage : Auto
Loader: mi_1_3.elf
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM20)
SymbolicName :\??\USB#VID_05C6&PID_9008#6&45f9e49&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/04/2013,2.1.0.5

Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping...... Ok
Configuration......
Identifying Chip.......UFS
Ok
Chip Configuration :
MemoryName : UFS
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : MSM8996
Version : 1
DateTime : Aug 1 2017 - 21:30:16

*** STORAGE DEVICE INFO ***
Memory Type : UFS
Block Size in Bytes : 4096
Page Size : 4096
Manufacturer ID : 462
Serial Number : 1297306958
Firmware Version : 200
Product Name : KLUCG4J1ED-B0C1
Physical Partitions : 6
Total Logical Blocks:
Drive [0] 13895680[53.008 GB]
Drive [1] 2048[8 MB]
Drive [2] 2048[8 MB]
Drive [3] 32768[128 MB]
Drive [4] 1654784[6.313 GB]
Drive [5] 32768[128 MB]

Protocol : Universal
Running : Ok
Reading GPT[6]
Drive [0] 32 Items
Drive [1] 32 Items
Drive [2] 32 Items
Drive [3] 32 Items
Drive [4] 64 Items
Drive [5] 32 Items


Phone Information.....
Brand : Xiaomi
Vendor : Xiaomi
Model : Mi MIX 2
ID : PKQ1.190118.001
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : chiron-user 9 PKQ1.190118.001 V12.0.1.0.PDEMIXM release-keys
Miui Ver : V12
Device : chiron
Mod_device : chiron_global
Display ID : PKQ1.190118.001
Security Patch : 2019-09-01
FRPPST : /dev/block/bootdevice/by-name/frp
Fingerprint : Xiaomi/chiron/chiron:9/PKQ1.190118.001/V12.0.1.0.PDEMIXM:user/release-keys

Processing Find Device Disable.........
InodeNo : 4899.
PKQ1.190118.001_FindDevice
Action Result : Ok

Elapsed Time : 00:00:09
BR
Dipendra Pathak

  Reply With Quote
Old 02-12-2021, 07:43   #1218 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Intex Cloud Q11 4G zerp wo[e FRP successfully removed by Hydra Tool

Intex Cloud Q11 4G zerp wo[e FRP successfully removed by Hydra Tool

Screen Short:



Logs:

Quote:
Brand : AUTO Model : AUTO Connection : Flash Mode

=====================================
Connection
-Please wait...
-Connect Phone...
-Found...
-PreLoader...[COM8]

TPortConnection.Create...(COM8)..Opening...Ok

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0335MT6737[6735]
BROM HW_SW_VER : 8A00 CB00 0000 0000

Handshaking...

Identifying Hardware ID.....
BROM CPUID : 0335MT6737[6735]
BROM HW_SW_VER : 8A00 CB00 0000 0000
FUSEID : A4020000
SECURE VERSION : 00
BL VERSION : 00
BR Secured : 00
NORMAL BOOT

Preparing Download Agent..
DA : 6735.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2018-09-18.13:22_452898
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : Old - eMMC
00000000000000000000
PRMMCCID : 460001154D323237717F0042DFC000EB
Init Configuration
Running DA 4.2 on BBID : 0x9B Ok

Initializing Loader [2]
Sending Loader [2] Accepted
Reading Flashchip data....
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000080000 -512 KB
eMMC USER : 0x00000001D2000000 -7.281 GB
ERAM Size : 0x0000000040000000 -1024 MB
IRAM Size : 0x0000000000020000 -128 KB
UNICAL RID : 996E64B6F80BF6729D79CEB5FD8D63F3
eMMC CID : 460001154D323237717F0042DF3400EB
Change to HIGH SPEED...
5A
Connection
-Please wait...
-Found...[COM9]


Reading Partition Table
SIZE[0x000007E8] 23 Items > Done

Reading System Info
Brand : Intex
Vendor : Intex
Model : Cloud Q11 4G
ID : MRA58K
SDK : 23
Release : 6.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-US
Description : full_vs6737m_35_m0-user 6.0 MRA58K 1488603706 release-keys
Device : Cloud_Q11_4G
Board : Intex
Display ID : Intex_Cloud_Q11_4G_V06_Indian_SER
Security Patch : 2017-01-01
Platform : mt6737m
FRPPST : /dev/block/platform/mtk-msdc.0/11230000.msdc0/by-name/frp
Fingerprint : Intex/Cloud_Q11_4G/Cloud_Q11_4G:6.0/MRA58K/1488603706:user/release-keys
StorageType : mtp,mass_storage
Userdata State : Not Encrypted

Autobackup Partitions
-preloader[0x00000000] 512 KB -> preloader.bin...Ok
-> Renaming Preloader.... preloader_vs6737m_35_m0.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\Intex_Cloud Q11 4G_0335-mt6737m-6.0_Intex_Cloud_Q11_4G_V06_Indian_SER_110221210115 \MT6737_Android_scatter.txt
-nvram[0x00380000] 5 MB -> nvram.bin...Ok
-frp[0x06A00000] 1024 KB -> frp.bin...Ok
-nvdata[0x06B00000] 32 MB -> nvdata.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\Intex_Cloud Q11 4G_0335-mt6737m-6.0_Intex_Cloud_Q11_4G_V06_Indian_SER_110221210115
MTK Phone Loader is NOW RUNNING.


Reading System Info
Brand : Intex
Vendor : Intex
Model : Cloud Q11 4G
ID : MRA58K
SDK : 23
Release : 6.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-US
Description : full_vs6737m_35_m0-user 6.0 MRA58K 1488603706 release-keys
Device : Cloud_Q11_4G
Board : Intex
Display ID : Intex_Cloud_Q11_4G_V06_Indian_SER
Security Patch : 2017-01-01
Platform : mt6737m
FRPPST : /dev/block/platform/mtk-msdc.0/11230000.msdc0/by-name/frp
Fingerprint : Intex/Cloud_Q11_4G/Cloud_Q11_4G:6.0/MRA58K/1488603706:user/release-keys
StorageType : mtp,mass_storage
Userdata State : Not Encrypted

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition... [Ok] Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:31
BR
Dipendra Pathak

  Reply With Quote
Old 02-12-2021, 07:48   #1219 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
EMMC device safe format successfully done by Hydra Tool

EMMC device safe format successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
Hydra Main Tool Ver 1.0.1 Build 11 -
Windows 10 (Version 10.0, Build 19041, 32-bit Edition)
Intel(R)Core(TM) i3-2350M CPU @ 2.30GHz
AMD Radeon HD 7400M Series
Ram Installed : 3 GB
Windows Access Right Admin
Software Run As Admnistrator
******* Dongle Info *******
Version : Hydra Tool v 1.2
Serial : ************
Initialize : OKAY
Status : Activated
Life : 0 [0-0-0-0-0]


Cylinders : 1900
Tracks Per Cylinder : 255
Sectors Per Track : 63
Bytes Per Sector : 512
DriveSize : 15628032000- 14.555 GB
Total Disk Size : 15634268160- 14.561 GB

Reading partitions...(65- Items)
SafeFormatUserData. Ok

Elapsed Time : 00:00:01
BR
Dipendra Pathak

  Reply With Quote
Old 02-13-2021, 03:51   #1220 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Vivo S1 Pro (PD1945F) Safe format successfully done by Hydra Tool

Vivo S1 Pro (PD1945F) Safe format successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : VIVO Model : S1 Pro (PD1945F) Storage : Auto
Loader: Vivo_S1Pro_Final.elf
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM11)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&d7aff1a&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/02/2017,2.1.2.7

Getting device info......
Serial No.: 0xD4B0****
MSM ID : 0x0010A0E1, SM6125-Qualcomm Snapdragon 665
PBL Ver : 00000000
PK HASH : A7DF36FFD7AB557C67A6C26675E2795C
922CF671308CFD7169BEDB84424C862B

Firehose Loader[Vivo_S1Pro_Final.elf]
SaharaBoot... Ok
Sending ..............................Ok
Connecting to Firehose...
Ping..................... Ok
Configuration........
Identifying Chip........UFS
Ok
Chip Configuration :
MemoryName : UFS
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Sep 9 2020 - 00:57:45

*** STORAGE DEVICE INFO ***
Memory Type : UFS
Block Size in Bytes : 4096
Page Size : 4096
Manufacturer ID : 462
Serial Number : 1297306958
Firmware Version : 900
Product Name : KM8V7001JA-B813
Physical Partitions : 6
Total Logical Blocks:
Drive [0] 30939136[118.023 GB]
Drive [1] 2048[8 MB]
Drive [2] 2048[8 MB]
Drive [3] 16384[64 MB]
Drive [4] 262144[1024 MB]
Drive [5] 16384[64 MB]

Protocol : Universal
Running : Ok
Reading GPT[6]
Drive [0] 32 Items
Drive [1] 32 Items
Drive [2] 32 Items
Drive [3] 32 Items
Drive [4] 64 Items
Drive [5] 32 Items


Phone Information......
ID : QP1A.190711.020
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Security Patch : 2021-01-01
Platform : =SM6125
Fingerprint : vivo/1920N/1920:10/QP1A.190711.020/compiler01182242:user/release-keys

Processing Safe Format New - UFS....
- Removing FRP [Zero Wipe] Ok
- Formatting Userdata [Safe Vivo New] Ok
Action Result : Ok

Elapsed Time : 00:00:08
BR
Dipendra Pathak

  Reply With Quote
Old 02-13-2021, 03:59   #1221 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Xiaomi Redmi 6A FRP successfully removed by Hydra Tool

Xiaomi Redmi 6A FRP successfully removed by Hydra Tool

Screen Short:



Logs:

Quote:
Brand : XIAOMI Model : Redmi 6A (cactus) Connection : Flash Mode

=====================================
Connection
-Please wait...
-Connect Phone...
-Found...[COM15]

TPortConnection.Create...(COM15)..Opening...Ok

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0766MT6765[6765]
BROM HW_SW_VER : 8A00 CA00 0000 0000
getMTKPayloadExploit : 0766
#Executing Exploit..
#SUCCESS..

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0766MT6765[6765]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
SECURE VERSION : 05
BL VERSION : FE
BR Secured : E0

Preparing Download Agent..
DA : 6765_56EC405E9E.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2018/04/19.10:40_426269
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_cactus.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 344AC107FF837C88C1BD44F669D5A18A
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000020000000 -512 MB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003A3E00000 -14.561 GB
eMMC CID : 150100514536334D4203E06BF2BD6569 - QE63MB

DA Speed : high-speed
DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi 6A
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-GB
Description : cactus-user 9 PPR1.180610.011 V11.0.9.0.PCBMIXM release-keys
Miui Ver : V11
Device : cactus
Mod_device : cactus_global
Display ID : SW_S98506AE1_V009_M13_XM_C3C_USR
Security Patch : 2020-08-01
Fingerprint : xiaomi/cactus/cactus:9/PPR1.180610.011/V11.0.9.0.PCBMIXM:user/release-keys
StorageType : mtp
Userdata State : Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_cactus.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\xiaomi_Redmi 6A_0766--9_SW_S98506AE1_V009_M13_XM_C3C_USR_120221151039\MT 6765_Android_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x05588000]1024 KB ->frp.bin...Ok
-nvdata[0x07688000]64 MB ->nvdata.bin...Ok
-persist[0x0F000000]64 MB ->persist.bin...Ok
-nvram[0x1BE80000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\xiaomi_Redmi 6A_0766--9_SW_S98506AE1_V009_M13_XM_C3C_USR_120221151039
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 344AC107FF837C88C1BD44F669D5A18A
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000020000000 -512 MB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003A3E00000 -14.561 GB
eMMC CID : 150100514536334D4203E06BF2BD6569 - QE63MB

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi 6A
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-GB
Description : cactus-user 9 PPR1.180610.011 V11.0.9.0.PCBMIXM release-keys
Miui Ver : V11
Device : cactus
Mod_device : cactus_global
Display ID : SW_S98506AE1_V009_M13_XM_C3C_USR
Security Patch : 2020-08-01
Fingerprint : xiaomi/cactus/cactus:9/PPR1.180610.011/V11.0.9.0.PCBMIXM:user/release-keys
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition...[C002002A-STATUS_SEC_IMG_TYPE_MISMATCH]
Erasing FRP Partition... Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:01:00
BR
Dipendra Pathak

  Reply With Quote
Old 02-13-2021, 04:06   #1222 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Xiaomi Redmi Note 5 Pro (whyred) Mi Account successfully removed with Patch method

Xiaomi Redmi Note 5 Pro (whyred) Mi Account successfully removed with Patch method by Hydra Tool

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : XIAOMI Model : Redmi Note 5 Pro (Whyred) Storage : Auto
Loader: mi_2_9.elf
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM18)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&c94d647&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/02/2017,2.1.2.7

Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping...... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : MSM8996
Version : 1
DateTime : Aug 2 2018 - 22:27:53

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 1117343287
Firmware Version : 162
Product Name : HCG8a4
Physical Partitions : 4
Total Logical Blocks:
Drive [0] 122142720[58,242 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Drive [3] 8192[4 MB]

Protocol : Universal
Running : Ok
Reading GPT[4]
Drive [0] 64 Items
Drive [1] 0 Items
Drive [2] 0 Items
Drive [3]


Phone Information.....
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi Note 5
ID : OPM1.171019.011
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : whyred-user 8.1.0 OPM1.171019.011 V9.5.17.0.OEIMIFA release-keys
Miui Ver : V9
Device : whyred
Mod_device : whyred_global
Display ID : OPM1.171019.011
Security Patch : 2018-06-01
Fingerprint : xiaomi/whyred/whyred:8.1.0/OPM1.171019.011/V9.5.17.0.OEIMIFA:user/release-keys

Processing Remove MiAccount[Patch Method]....
Backing up Partition for safety...Ok

Scanning Patching address...
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]Done!!
Total Items patched : 41
Successfully patched address..
Action Result : Ok

Elapsed Time : 00:00:15
BR
Dipendra Pathak

  Reply With Quote
Old 02-13-2021, 04:15   #1223 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Huawei DUB-LX3 (Y7 2019) successfully flashed by Hydra Tool

Huawei DUB-LX3 (Y7 2019) successfully flashed by Hydra Tool

Screen Short:



Logs:

Quote:
Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM17)
SymbolicName :\??\USB#VID_05C6&PID_9008#6&26d54cb8&0&2#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :10/21/2014,2.0.9.6

Getting device info......
Serial No.: 0xF49ABB4E
MSM ID : 0x0009A0E1, SDM450-Qualcomm Snapdragon 450
PBL Ver : 00000000
PK HASH : 6BC369511DA9CADB3A7AF61574F89DB3
85003D6241BDD1FF573DBA61BF6AE119

Firehose Loader[DUB-LX1_Loader_T-Tool-Team_1.mbn]
SaharaBoot... Ok
Sending .............Ok
Connecting to Firehose...
Ping... Ok
Configuration.......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8953
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 50878731
Firmware Version : 0
Product Name : hB8aP>
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 61071360[29,121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok

Phone Information.....
Vendor : unknown
ID : OPM1.171019.011
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : generic_a53-user 8.1.0 OPM1.171019.011 eng.root.20200109.172356 test-keys
Display ID : System 8.2.0.036(07AE)
Security Patch : 2019-12-01

Reading GPT[3]
Drive [0] 60 Items
Drive [1] 0 Items
Drive [2] 0 Items


Backup Security partitions...
Reading Security Items....
> modemst1
> modemst2
> fsg
C:\Hydra Tool\Backup\Security_Backup\__8.1.0_Security_02112 1184035.sec
Backup Security Success....

----------------------------
Flashing Selected Partitions....
- RPM(0)[RPM.img] Ok
- TZ(0)[TZ.img] Ok
- SBL1(0)[SBL1.img] Ok
- APDP(0)[APDP.img] Ok
- MSADP(0)[MSADP.img] Ok
- KEYMASTER(0)[KEYMASTER.img] Ok
- DEVCFG(0)[DEVCFG.img] Ok
- ABOOT(0)[ABOOT.img] Ok
- MODEM(0)[MODEM.img] Ok
- KERNEL(0)[KERNEL.img] Ok
- RAMDISK(0)[RAMDISK.img] Ok
- RECOVERY_RAMDISK(0)[RECOVERY_RAMDISK.img] Ok
- RECOVERY_VENDOR(0)[RECOVERY_VENDOR.img] Ok
- ERECOVERY_KERNEL(0)[ERECOVERY_KERNEL.img] Ok
- ERECOVERY_RAMDISK(0)[ERECOVERY_RAMDISK.img] Ok
- ERECOVERY_VENDOR(0)[ERECOVERY_VENDOR.img] Ok
- SYSTEM(0)[SYSTEM.img] Ok
- CACHE(0)[CACHE.img] Ok
- VENDOR(0)[VENDOR.img] Ok
- PRODUCT(0)[PRODUCT.img] Ok
- USERDATA(0)[USERDATA.img] Ok
- PrimaryGPT(0)[gpt_main0.bin] Ok

Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-33.] OK
0 [CRC32(2,7168)] OK
0 [CRC32(NUM_DISK_SECTORS-33.,7168)] OK
0 [0] OK
0 [CRC32(1,92)] OK
0 [0] OK
0 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 0
Set bootable storage drive 0 Ok

Rebooting Phone.... Ok

Elapsed Time : 00:27:00
BR
Dipendra Pathak

  Reply With Quote
Old 02-13-2021, 04:33   #1224 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Huawei DUB-LX3 (Y7 2019) successfully flashed by Hydra Tool

Huawei DUB-LX3 (Y7 2019) successfully flashed by Hydra Tool

Screen Short:



Logs:

Quote:
Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM17)
SymbolicName :\??\USB#VID_05C6&PID_9008#6&26d54cb8&0&2#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :10/21/2014,2.0.9.6

Getting device info......
Serial No.: 0xF49ABB4E
MSM ID : 0x0009A0E1, SDM450-Qualcomm Snapdragon 450
PBL Ver : 00000000
PK HASH : 6BC369511DA9CADB3A7AF61574F89DB3
85003D6241BDD1FF573DBA61BF6AE119

Firehose Loader[DUB-LX1_Loader_T-Tool-Team_1.mbn]
SaharaBoot... Ok
Sending .............Ok
Connecting to Firehose...
Ping... Ok
Configuration.......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8953
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 50878731
Firmware Version : 0
Product Name : hB8aP>
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 61071360[29,121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok

Phone Information.....
Vendor : unknown
ID : OPM1.171019.011
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : generic_a53-user 8.1.0 OPM1.171019.011 eng.root.20200109.172356 test-keys
Display ID : System 8.2.0.036(07AE)
Security Patch : 2019-12-01

Reading GPT[3]
Drive [0] 60 Items
Drive [1] 0 Items
Drive [2] 0 Items


Backup Security partitions...
Reading Security Items....
> modemst1
> modemst2
> fsg
C:\Hydra Tool\Backup\Security_Backup\__8.1.0_Security_02112 1184035.sec
Backup Security Success....

----------------------------
Flashing Selected Partitions....
- RPM(0)[RPM.img] Ok
- TZ(0)[TZ.img] Ok
- SBL1(0)[SBL1.img] Ok
- APDP(0)[APDP.img] Ok
- MSADP(0)[MSADP.img] Ok
- KEYMASTER(0)[KEYMASTER.img] Ok
- DEVCFG(0)[DEVCFG.img] Ok
- ABOOT(0)[ABOOT.img] Ok
- MODEM(0)[MODEM.img] Ok
- KERNEL(0)[KERNEL.img] Ok
- RAMDISK(0)[RAMDISK.img] Ok
- RECOVERY_RAMDISK(0)[RECOVERY_RAMDISK.img] Ok
- RECOVERY_VENDOR(0)[RECOVERY_VENDOR.img] Ok
- ERECOVERY_KERNEL(0)[ERECOVERY_KERNEL.img] Ok
- ERECOVERY_RAMDISK(0)[ERECOVERY_RAMDISK.img] Ok
- ERECOVERY_VENDOR(0)[ERECOVERY_VENDOR.img] Ok
- SYSTEM(0)[SYSTEM.img] Ok
- CACHE(0)[CACHE.img] Ok
- VENDOR(0)[VENDOR.img] Ok
- PRODUCT(0)[PRODUCT.img] Ok
- USERDATA(0)[USERDATA.img] Ok
- PrimaryGPT(0)[gpt_main0.bin] Ok

Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-33.] OK
0 [CRC32(2,7168)] OK
0 [CRC32(NUM_DISK_SECTORS-33.,7168)] OK
0 [0] OK
0 [CRC32(1,92)] OK
0 [0] OK
0 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 0
Set bootable storage drive 0 Ok

Rebooting Phone.... Ok

Elapsed Time : 00:27:00
BR
Dipendra Pathak

  Reply With Quote
Old 02-13-2021, 06:39   #1225 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
How can we do FRP choosing CPU and MTK ALL in One DA SP using Hydra Tool?

How can we do FRP choosing CPU and MTK ALL in One DA SP using Hydra Tool?

Screen Short:



Logs:

Quote:
Brand : By CPU Model : MT6580 Connection : Flash Mode

=====================================
Connection
-Please wait...
-Connect Phone...
-Found...[COM42]

TPortConnection.Create...(COM42)..Opening...Ok

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 6580MT6580[6580]
BROM HW_SW_VER : 8A00 CA00 0000 0000

Handshaking...

Identifying Hardware ID.....
BROM CPUID : 6580MT6580[6580]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
FUSEID : 00000000
SECURE VERSION : 00
BL VERSION : 00
BR Secured : 01
NORMAL BOOT

Preparing Download Agent..
DA : MTK_AllInOne_DA_SP.bin
Agent: MTK_DOWNLOAD_AGENT
Ver : MTK_AllInOne_DA_v3.3001.00.00
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : Old - eMMC
0000000000000000000000000000
PRMMCCID : 150100464536324D4203E183CE7BA58F
Init Configuration
Running DA 4.2 on BBID : 0x9C

Scanning Init Database...
preloader_a155_d.bin
FLASH Chip Initialization
D:\HydraTool_Fullpackage_7-04-20\BOOT\PREL\preloader_a155_d.bin
ERROR : EMMI Settings
14Accepted Ok

Initializing Loader [2]
Sending Loader [2] Accepted
Reading Flashchip data....
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003A3E00000 -14.561 GB
ERAM Size : 0x0000000040000000 -1024 MB
IRAM Size : 0x0000000000020000 -128 KB
UNICAL RID : B5F6C9C6D2260C0967CD138F1D592F83
eMMC CID : 460001154D32364583E103428FA57BCE
Change to HIGH SPEED...
5A
Connection
-Please wait...
-Found...[COM62]


Reading Partition Table
SIZE[0x000009A0] 28 Items > Done

Reading System Info
Brand : Cherry_Mobile
Vendor : Cherry_Mobile
Model : Flare S7 Max
ID : O11019
SDK : 27
Release : 8.1.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-US
Description : full_k400-user 8.1.0 O11019 1554878118 release-keys
Device : Flare_S7_Max
Display ID : O11019 release-keys
Security Patch : 2019-04-05
Fingerprint : Cherry_Mobile/Flare_S7_Max/Flare_S7_Max:8.1.0/O11019/1554878118:user/release-keys
StorageType : mtp
Userdata State : Encrypted

Autobackup Partitions
-preloader[0x00000000] 512 KB -> preloader.bin...Ok
-> Renaming Preloader.... preloader_k400.bin
Creating Scatter file... D:\HydraTool_Fullpackage_7-04-20\\Backup\Auto\Cherry_Mobile_Flare S7 Max_6580--8.1.0_O11019 release-keys_110221140443\MT6580_Android_scatter.txt
-nvram[0x00380000] 5 MB -> nvram.bin...Ok
-frp[0x1B200000] 1024 KB -> frp.bin...Ok
-nvdata[0x1BD00000] 32 MB -> nvdata.bin...Ok
Done!!!
D:\HydraTool_Fullpackage_7-04-20\\Backup\Auto\Cherry_Mobile_Flare S7 Max_6580--8.1.0_O11019 release-keys_110221140443
MTK Phone Loader is NOW RUNNING.


Reading System Info
Brand : Cherry_Mobile
Vendor : Cherry_Mobile
Model : Flare S7 Max
ID : O11019
SDK : 27
Release : 8.1.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-US
Description : full_k400-user 8.1.0 O11019 1554878118 release-keys
Device : Flare_S7_Max
Display ID : O11019 release-keys
Security Patch : 2019-04-05
Fingerprint : Cherry_Mobile/Flare_S7_Max/Flare_S7_Max:8.1.0/O11019/1554878118:user/release-keys
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition... [Ok] Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:27
BR
Dipendra Pathak

  Reply With Quote
Old 02-13-2021, 06:54   #1226 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Xiaomi Mi A2 Lite (daisy) Safe format done using EMMC method by Hydra Tool

Xiaomi Mi A2 Lite (daisy) Safe format done using EMMC method by Hydra Tool

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : XIAOMI Model : Mi A2 Lite (daisy) Storage : Auto
Loader: Xiaomi_S2y2_noauth_8953_ddr.mbn
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM7)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&2e40154&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :03/25/2016,2.1.2.2

Getting device info......
Serial No.: 0xE81A5830
MSM ID : 0x000460E1, MSM8953-Qualcomm Snapdragon 625
PBL Ver : 00000000
PK HASH : 57158EAF1814D78FD2B3105ECE4DB18A
817A08AC664A5782A925F3FF8403D39A

Firehose Loader[Xiaomi_S2y2_noauth_8953_ddr.mbn]
SaharaBoot... Ok
Sending ...................Ok
Connecting to Firehose...
Ping... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8953
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 1738674707
Firmware Version : 842018864
Product Name : hB8aP>
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 61071360[29,121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok
Reading GPT[3]
Drive [0] 60 Items
Drive [1] 0 Items
Drive [2] 0 Items


Phone Information......
ID : QKQ1.191002.002
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Device : daisy_sprout
Display ID : QKQ1.191002.002.V11.0.11.0.QDLMIXM
Security Patch : 2020-09-01
Emmc_size : 16GB

Processing Safe Format - EMMC....
- Removing FRP [Zero Wipe] Ok
- Formatting Userdata [Safe method] Ok
Action Result : Ok

Rebooting Phone.... Ok

Elapsed Time : 00:00:07
BR
Dipendra Pathak

  Reply With Quote
Old 02-13-2021, 07:02   #1227 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Huawei Nexus 6P successfully flashed by Hydra Tool

Huawei Nexus 6P successfully flashed by Hydra Tool

Screen Short:



Logs:

Quote:
Hydra Qualcomm Tool Ver 1.0.2 Build 72
Windows 10 (Version 10.0, Build 19041, 64-bit Edition)
Intel(R) Pentium(R) CPU 4417U @ 2.30GHz
Intel(R) HD Graphics 610
Ram Installed : 4 GB
Windows Access Right Admin
Software Run As Admnistrator
******* Dongle Info *******
Version : Hydra Tool v 1.2
Serial : **************
Initialize : OKAY
Status : Activated
Life : 0 [0-0-0-0-0]

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM5)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&66d5322&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :10/21/2014,2.0.9.6

Getting device info.....
Serial No.: 0x00C3D338
MSM ID : 0x009400E1, MSM8994-Qualcomm Snapdragon 810
PBL Ver : 00000000
PK HASH : 6BC369511DA9CADB3A7AF61574F89DB3
85003D6241BDD1FF573DBA61BF6AE119

Firehose Loader[prog_emmc_firehose.mbn]
SaharaBoot... Ok
Sending ...............Ok
Connecting to Firehose...
Ping..... Ok
Configuration........
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 32768
MaxPayloadSizeToTargetInBytesSupported : 32768
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8994
Version : 1
DateTime : Oct 31 2015 - 03:23:17


Protocol : Universal
Running : Ok

Phone Information.....
Brand : Android
Vendor : Huawei
Model : angler
ID : LMY47I
SDK : 22
Release : 5.1
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Description : msm8994-eng 5.1 LMY47I eng.jslave.20151031.030858 test-keys
Device : msm8994
Board : msm8994
Display ID : msm8994-eng 5.1 LMY47I eng.jslave.20151031.030858 test-keys
Platform : msm8994
Fingerprint : Android/msm8994/msm8994:5.1/LMY47I/jslave10310310:eng/test-keys


----------------------------
Flashing Selected Partitions....
- modem(0)[NON-HLOS.bin] Ok
- sbl1(0)[sbl1.mbn] Ok
- sdi(0)[sdi.mbn] Ok
- tz(0)[tz.mbn] Ok
- rpm(0)[rpm.mbn] Ok
- hyp(0)[hyp.mbn] Ok
- pmic(0)[pmic.mbn] Ok
- sec(0)[sec.dat] Skipped
- aboot(0)[emmc_appsboot.mbn] Ok
- pmicbak(0)[pmic.mbn] Ok
- sbl1bak(0)[sbl1.mbn] Ok
- tzbak(0)[tz.mbn] Ok
- rpmbak(0)[rpm.mbn] Ok
- hypbak(0)[hyp.mbn] Ok
- abootbak(0)[emmc_appsboot.mbn] Ok
- devinfo(0)[devinfo.img] Ok
- fsg(0)[fs_image.tar.gz.mbn.img] Skipped
- modemst1(0)[modem_st1.mbn] Skipped
- modemst2(0)[modem_st2.mbn] Skipped
- persist(0)[persist_1.img] Skipped
- oeminfo(0)[oeminfo.img] Ok
- boot(0)[boot.img] Ok
- recovery(0)[recovery.img] Ok
- cache(0)[cache_1.img] Ok
- misc(0)[misc.img] Ok
- frp(0)[frp.img] Skipped
- system(0)[system_1.img] Ok
- userdata(0)[userdata_1.img] Ok
- userdata(0)[userdata_2.img] Ok
- userdata(0)[userdata_3.img] Ok
- userdata(0)[userdata_4.img] Ok
- userdata(0)[userdata_5.img] Ok
- userdata(0)[userdata_6.img] Ok
- userdata(0)[userdata_7.img] Ok
- userdata(0)[userdata_8.img] Ok
- userdata(0)[userdata_9.img] Ok
- userdata(0)[userdata_10.img] Ok
- userdata(0)[userdata_11.img] Ok
- userdata(0)[userdata_12.img] Ok
- userdata(0)[userdata_13.img] Ok
- userdata(0)[userdata_14.img] Ok
- userdata(0)[userdata_15.img] Ok
- userdata(0)[userdata_16.img] Ok
- userdata(0)[userdata_17.img] Ok
- userdata(0)[userdata_18.img] Ok
- userdata(0)[userdata_19.img] Ok
- userdata(0)[userdata_20.img] Ok
- userdata(0)[userdata_21.img] Ok
- userdata(0)[userdata_22.img] Ok
- userdata(0)[userdata_23.img] Ok
- userdata(0)[userdata_24.img] Ok
- userdata(0)[userdata_25.img] Ok
- userdata(0)[userdata_26.img] Ok
- userdata(0)[userdata_27.img] Ok
- userdata(0)[userdata_28.img] Ok
- userdata(0)[userdata_29.img] Ok
- userdata(0)[userdata_30.img] Ok
- userdata(0)[userdata_31.img] Ok
- userdata(0)[userdata_32.img] Ok
- userdata(0)[userdata_33.img] Ok
- userdata(0)[userdata_34.img] Ok
- userdata(0)[userdata_35.img] Ok
- userdata(0)[userdata_36.img] Ok
- userdata(0)[userdata_37.img] Ok
- userdata(0)[userdata_38.img] Ok
- userdata(0)[userdata_39.img] Ok
- userdata(0)[userdata_40.img] Ok
- userdata(0)[userdata_41.img] Ok
- userdata(0)[userdata_42.img] Ok
- userdata(0)[userdata_43.img] Ok
- userdata(0)[userdata_44.img] Ok
- userdata(0)[userdata_45.img] Ok
- userdata(0)[userdata_46.img] Ok
- userdata(0)[userdata_47.img] Ok
- userdata(0)[userdata_48.img] Ok
- userdata(0)[userdata_49.img] Ok
- userdata(0)[userdata_50.img] Ok
- userdata(0)[userdata_51.img] Ok
- userdata(0)[userdata_52.img] Ok
- userdata(0)[userdata_53.img] Ok
- userdata(0)[userdata_54.img] Ok
- userdata(0)[userdata_55.img] Ok
- userdata(0)[userdata_56.img] Ok
- userdata(0)[userdata_57.img] Ok
- userdata(0)[userdata_58.img] Ok
- userdata(0)[userdata_59.img] Ok
- userdata(0)[userdata_60.img] Ok
- userdata(0)[userdata_61.img] Ok
- userdata(0)[userdata_62.img] Ok
- userdata(0)[userdata_63.img] Ok
- userdata(0)[userdata_64.img] Ok
- userdata(0)[userdata_65.img] Ok
- userdata(0)[userdata_66.img] Ok
- userdata(0)[userdata_67.img] Ok
- userdata(0)[userdata_68.img] Ok
- userdata(0)[userdata_69.img] Ok
- userdata(0)[userdata_70.img] Ok
- userdata(0)[userdata_71.img] Ok
- userdata(0)[userdata_72.img] Ok
- userdata(0)[userdata_73.img] Ok
- userdata(0)[userdata_74.img] Ok
- userdata(0)[userdata_75.img] Ok
- userdata(0)[userdata_76.img] Ok
- userdata(0)[userdata_77.img] Ok
- userdata(0)[userdata_78.img] Ok
- userdata(0)[userdata_79.img] Ok
- userdata(0)[userdata_80.img] Ok
- userdata(0)[userdata_81.img] Ok
- userdata(0)[userdata_82.img] Ok
- userdata(0)[userdata_83.img] Ok
- userdata(0)[userdata_84.img] Ok
- userdata(0)[userdata_85.img] Ok
- userdata(0)[userdata_86.img] Ok
- userdata(0)[userdata_87.img] Ok
- userdata(0)[userdata_88.img] Ok
- userdata(0)[userdata_89.img] Ok
- userdata(0)[userdata_90.img] Ok
- userdata(0)[userdata_91.img] Ok
- userdata(0)[userdata_92.img] Ok
- userdata(0)[userdata_93.img] Ok
- userdata(0)[userdata_94.img] Ok
- userdata(0)[userdata_95.img] Ok
- userdata(0)[userdata_96.img] Ok
- userdata(0)[userdata_97.img] Ok
- userdata(0)[userdata_98.img] Ok
- userdata(0)[userdata_99.img] Ok
- userdata(0)[userdata_100.img] Ok
- userdata(0)[userdata_101.img] Ok
- userdata(0)[userdata_102.img] Ok
- userdata(0)[userdata_103.img] Ok
- userdata(0)[userdata_104.img] Ok
- userdata(0)[userdata_105.img] Ok
- userdata(0)[userdata_106.img] Ok
- userdata(0)[userdata_107.img] Ok
- userdata(0)[userdata_108.img] Ok
- userdata(0)[userdata_109.img] Ok
- userdata(0)[userdata_110.img] Ok
- userdata(0)[userdata_111.img] Ok
- userdata(0)[userdata_112.img] Ok
- userdata(0)[userdata_113.img] Ok
- userdata(0)[userdata_114.img] Ok
- userdata(0)[userdata_115.img] Ok
- userdata(0)[userdata_116.img] Ok
- userdata(0)[userdata_117.img] Ok
- userdata(0)[userdata_118.img] Ok
- userdata(0)[userdata_119.img] Ok
- userdata(0)[userdata_120.img] Ok
- userdata(0)[userdata_121.img] Ok
- userdata(0)[userdata_122.img] Ok
- userdata(0)[userdata_123.img] Ok
- userdata(0)[userdata_124.img] Ok
- userdata(0)[userdata_125.img] Ok
- userdata(0)[userdata_126.img] Ok
- userdata(0)[userdata_127.img] Ok
- userdata(0)[userdata_128.img] Ok
- userdata(0)[userdata_129.img] Ok
- userdata(0)[userdata_130.img] Ok
- userdata(0)[userdata_131.img] Ok
- userdata(0)[userdata_132.img] Ok
- userdata(0)[userdata_133.img] Ok
- userdata(0)[userdata_134.img] Ok
- userdata(0)[userdata_135.img] Ok
- userdata(0)[userdata_136.img] Ok
- userdata(0)[userdata_137.img] Ok
- userdata(0)[userdata_138.img] Ok
- userdata(0)[userdata_139.img] Ok
- userdata(0)[userdata_140.img] Ok
- userdata(0)[userdata_141.img] Ok
- userdata(0)[userdata_142.img] Ok
- userdata(0)[userdata_143.img] Ok
- userdata(0)[userdata_144.img] Ok
- userdata(0)[userdata_145.img] Ok
- userdata(0)[userdata_146.img] Ok
- userdata(0)[userdata_147.img] Ok
- userdata(0)[userdata_148.img] Ok
- userdata(0)[userdata_149.img] Ok
- userdata(0)[userdata_150.img] Ok
- userdata(0)[userdata_151.img] Ok
- userdata(0)[userdata_152.img] Ok
- userdata(0)[userdata_153.img] Ok
- userdata(0)[userdata_154.img] Ok
- userdata(0)[userdata_155.img] Ok
- userdata(0)[userdata_156.img] Ok
- userdata(0)[userdata_157.img] Ok
- userdata(0)[userdata_158.img] Ok
- userdata(0)[userdata_159.img] Ok
- userdata(0)[userdata_160.img] Ok
- userdata(0)[userdata_161.img] Ok
- userdata(0)[userdata_162.img] Ok
- userdata(0)[userdata_163.img] Ok
- userdata(0)[userdata_164.img] Ok
- userdata(0)[userdata_165.img] Ok
- userdata(0)[userdata_166.img] Ok
- userdata(0)[userdata_167.img] Ok
- userdata(0)[userdata_168.img] Ok
- userdata(0)[userdata_169.img] Ok
- userdata(0)[userdata_170.img] Ok
- userdata(0)[userdata_171.img] Ok
- userdata(0)[userdata_172.img] Ok
- userdata(0)[userdata_173.img] Ok
- userdata(0)[userdata_174.img] Ok
- userdata(0)[userdata_175.img] Ok
- userdata(0)[userdata_176.img] Ok
- userdata(0)[userdata_177.img] Ok
- userdata(0)[userdata_178.img] Ok
- userdata(0)[userdata_179.img] Ok
- userdata(0)[userdata_180.img] Ok
- userdata(0)[userdata_181.img] Ok
- userdata(0)[userdata_182.img] Ok
- userdata(0)[userdata_183.img] Ok
- userdata(0)[userdata_184.img] Ok
- userdata(0)[userdata_185.img] Ok
- userdata(0)[userdata_186.img] Ok
- userdata(0)[userdata_187.img] Ok
- userdata(0)[userdata_188.img] Ok
- userdata(0)[userdata_189.img] Ok
- userdata(0)[userdata_190.img] Ok
- userdata(0)[userdata_191.img] Ok
- userdata(0)[userdata_192.img] Ok
- userdata(0)[userdata_193.img] Ok
- userdata(0)[userdata_194.img] Ok
- userdata(0)[userdata_195.img] Ok
- userdata(0)[userdata_196.img] Ok
- userdata(0)[userdata_197.img] Ok
- userdata(0)[userdata_198.img] Ok
- userdata(0)[userdata_199.img] Ok
- userdata(0)[userdata_200.img] Ok
- userdata(0)[userdata_201.img] Ok
- userdata(0)[userdata_202.img] Ok
- userdata(0)[userdata_203.img] Ok
- userdata(0)[userdata_204.img] Ok
- userdata(0)[userdata_205.img] Ok
- userdata(0)[userdata_206.img] Ok
- userdata(0)[userdata_207.img] Ok
- userdata(0)[userdata_208.img] Ok
- userdata(0)[userdata_209.img] Ok
- system(0)[system_2.img] Ok
- system(0)[system_3.img] Ok
- system(0)[system_4.img] Ok
- system(0)[system_5.img] Ok
- system(0)[system_6.img] Ok
- system(0)[system_7.img] Ok
- system(0)[system_8.img] Ok
- system(0)[system_9.img] Ok
- system(0)[system_10.img] Ok
- system(0)[system_11.img] Ok
- system(0)[system_12.img] Ok
- system(0)[system_13.img] Ok
- system(0)[system_14.img] Ok
- system(0)[system_15.img] Ok
- system(0)[system_16.img] Ok
- system(0)[system_17.img] Ok
- system(0)[system_18.img] Ok
- system(0)[system_19.img] Ok
- system(0)[system_20.img] Ok
- system(0)[system_21.img] Ok
- system(0)[system_22.img] Ok
- system(0)[system_23.img] Ok
- system(0)[system_24.img] Ok
- system(0)[system_25.img] Ok
- system(0)[system_26.img] Ok
- system(0)[system_27.img] Ok
- system(0)[system_28.img] Ok
- system(0)[system_29.img] Ok
- system(0)[system_30.img] Ok
- system(0)[system_31.img] Ok
- system(0)[system_32.img] Ok
- system(0)[system_33.img] Ok
- system(0)[system_34.img] Ok
- system(0)[system_35.img] Ok
- system(0)[system_36.img] Ok
- persistent(0)[persistent.img] Ok
- PrimaryGPT(0)[gpt_main0.bin] Ok

Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-33.] OK
0 [CRC32(2,5632)] OK
0 [CRC32(NUM_DISK_SECTORS-33.,5632)] OK
0 [0] OK
0 [CRC32(1,92)] OK
0 [0] OK
0 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 0
Set bootable storage drive 0 Ok

Rebooting Phone.... Ok

Elapsed Time : 00:05:06
BR
Dipendra Pathak

  Reply With Quote
Old 02-13-2021, 07:14   #1228 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Xiaomi Redmi Note 8 (ginkgo) Repairing IMEI in QCN file successfully done by Hydra

Xiaomi Redmi Note 8 (ginkgo) Repairing IMEI in QCN file successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
Hydra Qualcomm Tool Ver 1.0.2 Build 72
Windows 10 (Version 10.0, Build 19041, 64-bit Edition)
AMD Ryzen 5 5600X 6-Core Processor
NVIDIA GeForce RTX 3070
Ram Installed : 8 GB
Windows Access Right Admin
******* Dongle Info *******
Version : Hydra Tool v 1.2
Serial : **************
Initialize : OKAY
Status : Activated
Life : 0 [0-0-0-0-0]


Selected Comport : [FOUND](COM9)

Firmware ID : MPSS.AT.4.3.1-00244.3-NICOBAR_GEN_PACK-1
Build Date : ep 5 201906:07:23Jun 23 201923:00:00nicobar.
IMEI1 : 8646760473*****
IMEI2 : 864676047******

Sending SPC Code... OK
Restoring Qcn....
Restoring Qcn Success
Elapsed Time : 00:00:47
BR
Dipendra Pathak

  Reply With Quote
Old 02-13-2021, 07:25   #1229 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Xiaomi Mi Max 2 (Oxygen) Mi Account bypassing using anti-relock method done by Hydra

Xiaomi Mi Max 2 (Oxygen) Mi Account bypassing using anti-relock method done by Hydra Tool

Screen Short:



Logs:

Quote:
Hydra Qualcomm Tool Ver 1.0.2 Build 72
Windows 10 (Version 10.0, Build 18362, 64-bit Edition)
Intel(R)Core(TM) i3-3110M CPU @ 2.40GHz
Intel(R) HD Graphics 4000
Ram Installed : 8 GB
Windows Access Right Admin
Software Run As Admnistrator
******* Dongle Info *******
Version : Hydra Tool v 1.2
Serial : **************
Initialize : OKAY
Status : Activated
Life : 0 [0-0-0-0-0]


Starting ADB Server....
Searching Device By ADB
Device Found...
Model : MI MAX 2
Brand : Xiaomi
Android Ver : 7.1.1
CPU abi : arm64-v8a
Software Version :
CSC Version :
Bootloader :
Board : msm8953
Display ID : NMF26F
Security Patch : 2019-03-01
Emmc_size : 16GB
Platform : msm8953
Kernel ID : 2019-03-01
Marketname :
OTA Version Name :
SYS USB CONFIG : persist.mtp,adb
FRPPST : /dev/block/bootdevice/by-name/config
FingerPrint : Xiaomi/oxygen/oxygen:7.1.1/NMF26F/V11.0.2.0.NDDMIXM:user/release-keys

Checking Root Status....
Root Status : Not Rooted

ADB MiAccount...

Processing...
Disbaling MI Account
Please wait...
Disabled Mi Account Success
Action Result : Ok
O nome do diret¢rio ' inv lido.
NÆo foi poss¡vel encontrar C:\Program Files (x86)\Hydra Tool\adb\AdbWinApi.DLL.dat


Elapsed Time : 00:00:06
BR
Dipendra Pathak

  Reply With Quote
Old 02-13-2021, 07:36   #1230 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Nokia Ta-1029 Successfully Flashed by Hydra Tool

Nokia Ta-1029 Successfully Flashed by Hydra Tool

Screen Short:



Logs:

Quote:
Hydra Qualcomm Tool Ver 1.0.2 Build 72
Windows 8.1 (Version 6.3, Build 9600, 64-bit Edition)
Intel(R) Core(TM) i5-2400 CPU @ 3.10GHz
Intel(R) HD Graphics
Ram Installed : 6 GB
Windows Access Right Admin
******* Dongle Info *******
Version : Hydra Tool v 1.2
Serial : ************
Initialize : OKAY
Status : Activated
Life : 0 [0-0-0-0-0]

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM7)
SymbolicName :\??\USB#VID_05C6&PID_9008#6&3b073303&0&4#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/02/2017,2.1.2.7

Getting device info.....
Serial No.: 0x11BCFE7C
MSM ID : 0x009600E1, MSM8909-Qualcomm Snapdragon 210
PBL Ver : 00000000
PK HASH : F5F4192A33B2830974B400119BAB728C
C9FE911011F928625C2AED0DA441AC97

Firehose Loader[NK_0_1.mbn]
SaharaBoot... Ok
Sending ..............Ok
Connecting to Firehose...
Ping... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8909
Version : 1


Protocol : Universal
Running : Ok

Phone Information.....
Brand : Unknown
Vendor : FIH
Model : Unknown
ID : NMF26F
SDK : 25
Release : 7.1.1
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Description : Unknown-user 7.1.1 NMF26F 00WW_0_55F release-keys
Device : Unknown
Board : MSM8909
Display ID : 00WW_0_55F
Security Patch : 2017-12-01
Emmc_size : 8GB
Platform : msm8909
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : Unknown/Unknown/Unknown:7.1.1/NMF26F/00WW_0_55F:user/release-keys

Reading GPT[3]
Drive [0] 128 Items
Drive [1] 0 Items
Drive [2] 0 Items


Backup Security partitions...
Reading Security Items....
> modemst1
> modemst2
> fsg
C:\Hydra Tool\Backup\Security_Backup\Unknown_MSM8909_7.1.1_ Security_021121002739.sec
Backup Security Success....

----------------------------
Flashing Selected Partitions....
- gpt_main0(0)[gpt_main0.bin] Ok
- sbl1(0)[sbl1.mbn] Ok
- sbl1bak(0)[sbl1.mbn] Ok
- aboot(0)[emmc_appsboot.mbn] Ok
- abootbak(0)[emmc_appsboot.mbn] Ok
- rpm(0)[rpm.mbn] Ok
- rpmbak(0)[rpm.mbn] Ok
- tz(0)[tz.mbn] Ok
- tzbak(0)[tz.mbn] Ok
- systeminfo(0)[sysinfo.cfg] Ok
- splash(0)[splash.img] Ok
- ftm(0)[ftm.img] Ok
- hidden(0)[hidden.img] Ok
- cda(0)[cda.img] Ok
- elabel(0)[elabel] Ok
- recovery(0)[recovery.img] Ok
- sec(0)[sec.dat] Skipped
- boot(0)[boot.img] Ok
- modem(0)[NON-HLOS.bin] Ok
- system(0)[system.img] Ok
- misc(0)[misc.img] Ok
- cache(0)[cache.img] Ok
- persist(0)[persist.img] Skipped
- keystore(0)[keystore.bin] Ok
- cmnlib(0)[cmnlib.mbn] Ok
- cmnlibbak(0)[cmnlib.mbn] Ok
- keymaster(0)[keymaster.mbn] Ok
- keymasterbak(0)[keymaster.mbn] Ok
- userdata(0)[userdata.img] Ok
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 0
Set bootable storage drive 0 Ok

Rebooting Phone.... Ok

Elapsed Time : 00:04:31
BR
Dipendra Pathak

  Reply With Quote
Reply

Bookmarks


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


 



All times are GMT +1. The time now is 04:42.



Powered by Searchlight © 2024 Axivo Inc.
vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2024 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2023 -
Page generated in 0.55145 seconds with 9 queries

SEO by vBSEO