GSM-Forum

GSM-Forum (https://forum.gsmhosting.com/vbb/)
-   HYDRA TOOL (https://forum.gsmhosting.com/vbb/f1065/)
-   -   ★★★ Post All Successfully Repaired Phones by Hydra Tool ★★★ (https://forum.gsmhosting.com/vbb/f1065/post-all-successfully-repaired-phones-hydra-tool-2506626/)

Hydra Tool 11-10-2018 01:58

★★★ Post All Successfully Repaired Phones by Hydra Tool ★★★
 
Post All Successfully Repaired Phones by Hydra Tool

Hydra Tool 01-21-2019 14:30

Redmi K20 (davinci) IMEI Repair by Hydra Tool
 
Redmi K20 (davinci) IMEI Repair by Hydra Tool


https://i.ibb.co/pdXZp9f/redmi-k20.jpg

Hydra Tool 02-05-2019 18:08

Casper Via V6X Flashing Success
 
Casper Via V6X Flashing Success


https://imgdb.net/images/4913.jpg

Hydra Tool 02-13-2019 11:41

MSM8916 Reset FRP Success By HYDRA Tool
 
MSM8916 Reset FRP Success By HYDRA Tool

https://imgdb.net/images/4945.jpg

Hydra Tool 02-20-2019 20:07

OPPO A57 Remove Screen Locks [Without Data Loss]
 
OPPO A57 Remove Screen Locks [Without Data Loss]

http://www.youtube.com/watch?v=X9QtuCoJTc8

Hydra Tool 02-26-2019 13:58

Vodafone Smart Ultra 6 VFD995N Reset FRP
 
Vodafone Smart Ultra 6 VFD995N Reset FRP

https://imgdb.net/images/5070.jpg

Hydra Tool 02-27-2019 10:51

Vestel Venus V5 Reset FRP By Hydra Tool
 
Vestel Venus V5 Reset FRP By Hydra Tool


https://imgdb.net/images/5084.jpg

Hydra Tool 03-02-2019 11:35

Lenovo A6020A41 Reset FRP Success By HYDRA

https://serving.photos.photobox.com/...d7449c915b.jpg

diosa 03-04-2019 16:24

ZTE Reset Google Account Success
 
ZTE Reset Google Account Success

https://i.ibb.co/mScyxz2/53218988-64...44719872-o.jpg

Hydra Tool 03-06-2019 10:45

Vestel Venus 5000 Reset FRP Sucess
 
Vestel Venus 5000 Reset FRP Sucess



Quote:

Initialize Dongle...
Hydra Dongle INIT : OKAY
Activation Status : Activated

Selected Comport : Auto
Selected Loader : 8909.mbn

Waiting for Qualcomm 9008 Port...

Device found on [COM4]
Getting device info...

Serial No.: 0x0C9B2D27
MSM ID : 0x009600E1
PBL Ver : 0x00000000
PK HASH : 0xCC3153A80293939B90D02D3BF8B23E0292E452FEF662C749 98421ADAD42A380F

Sending Qualcomm Firehose Loader [8909.mbn] Ok

Connecting to Firehose...
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 32768
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8909
Version : 1
Running : Ok

Trying to read phone information...

Model : Leo
Brand : Vestel
Android Ver : 6.0.1
Board : msm8909
Display ID : VL1260 release-keys
Security Patch : 2017-06-01
Emmc_size : 8GB
Platform : msm8909
Kernel ID : 2017-06-01
FRPPST : /dev/block/bootdevice/by-name/config

Resetting FRP...
> config Ok
FRP Done!!

All Done


Elapsed Time : 00:00:07

kamal_singla 03-08-2019 06:04

LAVA Z70 RESET FRP DONE :)

Code:

09:14:49 : Hydra Tool v 1.1
09:14:49 : Initialize Dongle...
09:14:49 : Hydra Dongle INIT :
09:14:49 : OKAY
09:14:49 : Activation Status :
09:14:49 : Activated
09:14:51 :
09:14:51 : Waiting for phone to connect
09:14:52 : Found :
09:14:52 : MediaTek PreLoader USB VCOM (Android) (COM191)
09:14:53 : Opening Port :
09:14:53 : Successfully Opened
09:14:53 : Identifying Hardware ID
09:14:53 : BROM CPUID    :
09:14:53 : 0335
09:14:53 :  (0000)
09:14:53 : 0335
09:14:53 : [6735]
09:14:53 : BROM HW_SW_VER :
09:14:53 : 8A00
09:14:53 : CA00
09:14:53 : 0000
09:14:53 : 0000
09:14:53 : SECURE VERSION :
09:14:53 : FF
09:14:53 : BL VERSION :
09:14:53 : 01
09:14:53 : SECMODE    :
09:14:53 : 00
09:14:53 : Preparing Download Agent..
09:14:53 : Download Agent :
09:14:53 : MTK_AllInOne_DA.bin
09:14:53 : Initializing Loader [1]
09:14:53 : Sending Loader [1]
09:14:53 : ACCEPTED
09:14:53 : OLD PROTOCOL DETECTED
09:14:53 : PRMMCCID  :
09:14:53 : 510001154D333145698B0D428F071CD4
09:14:54 : Running DA 4.2 on BBID : 0x9B
09:14:54 : Sending INIT configuration...
09:14:54 : Initializing Loader [2]
09:14:54 : Sending Loader [2]
09:14:54 : ACCEPTED
09:14:55 : Reading Flashchip data....
09:14:55 : eMMC BOOT1 :
09:14:55 : 0x0000000000400000
09:14:55 :  -4 MB
09:14:55 : eMMC BOOT2 :
09:14:55 : 0x0000000000400000
09:14:55 :  -4 MB
09:14:55 : eMMC RPMB  :
09:14:55 : 0x0000000000400000
09:14:55 :  -4 MB
09:14:55 : eMMC USER  :
09:14:55 : 0x00000003A3E00000
09:14:55 :  -14.561 GB
09:14:55 : ERAM Size  :
09:14:55 : 0x0000000080000000
09:14:55 :  -2 GB
09:14:55 : IRAM Size  :
09:14:56 : 0x0000000000020000
09:14:56 :  -128 KB
09:14:56 : UNICAL RID :
09:14:56 : 8325ACA80480A433789EC11D44D8D5AC
09:14:56 : eMMC CID  :
09:14:56 : 510001154D333145698B0D428FA41CD4
09:14:56 : Change to HIGH SPEED...
09:14:57 :
09:14:57 : Waiting for phone to connect
09:14:57 : Found :
09:14:57 : MediaTek DA USB VCOM (Android) (COM204)
09:14:57 : Opening Port :
09:14:57 : Successfully Opened
09:14:58 :
09:14:58 : Reading Partition Table
09:14:59 : Partition size
09:14:59 : [0x000007E8]
09:14:59 :  23 Items
09:14:59 : Reading Partition : Done
09:14:59 :
09:14:59 : Reading System Info
09:14:59 : Model              :        Z70
09:14:59 : Brand              :        Lava
09:14:59 : Android Ver        :        7.0
09:14:59 : Board              :        Z70
09:14:59 : Display ID          :        LAVA_Z70_2_16_V1.0_M017_20180416_ENG_IN
09:14:59 : Security Patch          :        2018-04-05
09:14:59 : Emmc_size          :       
09:14:59 : Platform            :        mt6737m
09:14:59 : Kernel ID            :        2018-04-05
09:14:59 : Marketname          :       
09:14:59 : FRPPST          :        /dev/block/platform/mtk-msdc.0/11230000.msdc0/by-name/frp
09:14:59 : Auto Backup[preloader & NVRAM]
09:14:59 : Reading
09:14:59 : [preloader]
09:14:59 :  Done
09:15:00 : Reading
09:15:00 : [nvram]
09:15:00 :  Done
09:15:01 : Operation Done!

Code:

09:16:36 : Hydra Tool v 1.1
09:16:36 : Initialize Dongle...
09:16:36 : Hydra Dongle INIT :
09:16:36 : OKAY
09:16:36 : Activation Status :
09:16:36 : Activated
09:16:37 :
09:16:37 : Waiting for phone to connect
09:16:37 : Found :
09:16:37 : MediaTek DA USB VCOM (Android) (COM204)
09:16:37 : Opening Port :
09:16:37 : Successfully Opened
09:16:38 :
09:16:38 : Reading System Info
09:16:38 : Model              :        Z70
09:16:38 : Brand              :        Lava
09:16:38 : Android Ver        :        7.0
09:16:38 : Board              :        Z70
09:16:38 : Display ID          :        LAVA_Z70_2_16_V1.0_M017_20180416_ENG_IN
09:16:38 : Security Patch          :        2018-04-05
09:16:38 : Emmc_size          :       
09:16:38 : Platform            :        mt6737m
09:16:38 : Kernel ID            :        2018-04-05
09:16:38 : Marketname          :       
09:16:38 : FRPPST          :        /dev/block/platform/mtk-msdc.0/11230000.msdc0/by-name/frp
09:16:38 : 
09:16:38 : Remove FRP Operation
09:16:38 : Removing FRP
09:16:41 :  [OK]
09:16:41 :
09:16:41 : Process Done!!


Franky_36 03-13-2019 17:42

Bq aquaris m5 reset frp done
 
Code:

Initialize Dongle...
Hydra Dongle INIT : OKAY
Activation Status : Activated
 
Selected Comport : Auto
Selected Loader  : Auto

Waiting for Qualcomm 9008 Port...

Device found on [COM15]
Getting device info...

Serial No.: 0x03DBFA89
MSM ID : 0x0090B0E1
PBL Ver : 0x00000000
PK HASH : 0xCC3153A80293939B90D02D3BF8B23E0292E452FEF662C74998421ADAD42A380F8936.mbn
 
Sending Qualcomm Firehose Loader [8936.mbn]  Ok

Connecting to Firehose...
 MemoryName : eMMC
 MaxPayloadSizeToTargetInBytes : 16384
 MaxPayloadSizeToTargetInBytesSupported : 16384
 MaxPayloadSizeFromTargetInBytes : 4096
 MaxXMLSizeInBytes : 4096
 TargetName : 8936
 Version : 1
Running : Ok
 
Trying to read phone information...

Model              :        Aquaris M5
Brand              :        bq
Android Ver        :        6.0.1
Board              :        msm8916
Display ID          :        4.8.2_20170605-1722
Security Patch          :        2017-05-01
Emmc_size          :       
Platform            :        msm8916
Kernel ID            :        2017-05-01
FRPPST          :        /dev/block/bootdevice/by-name/config

Resetting FRP...
 > config  Ok
FRP Done!!

All Done

https://i.ibb.co/xmxLHMn/Screenshot-...019-131238.jpg

https://i.ibb.co/99dWVqy/Screenshot-...019-131501.jpg

Great job, I'm delighted with this dongle, project, when I have more time I will upload more processes echos with both the qualcomm module and the mtk module.

Hydra Tool 03-14-2019 16:26

Turk Telekom TT175 Boot & Reset FRP Success By Hydra


Quote:

Hydra Tool v 1.1
Initialize Dongle...
Hydra Dongle INIT : OKAY
Activation Status : Activated

Waiting for phone to connect
Found : MediaTek PreLoader USB VCOM (Android) (COM26)
Opening Port : Successfully Opened
Identifying Hardware ID
BROM CPUID : 0337 (0000)0337[6735]
BROM HW_SW_VER : 8A00 CA00 0000 0000
SECURE VERSION : FF
BL VERSION : 01
BR Secured : 00
Preparing Download Agent..
Download Agent : 6735.bin
MTK_DOWNLOAD_AGENT -HYDRA
MTK_AllInOne_DA_v3.3001.2018-09-18.13:22_452898
Initializing Loader [1]
Sending Loader [1] ACCEPTED
OLD PROTOCOL DETECTED
PRMMCCID : 510001154D333133853E0642E30208D8
Running DA 4.2 on BBID : 0x9B
Sending INIT configuration...
MTK_DOWNLOAD_AGENT -HYDRA
MTK_AllInOne_DA_v3.3001.2018-09-18.13:22_452898
Initializing Loader [2]
Sending Loader [2] ACCEPTED
Reading Flashchip data....
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003A3E00000 -14,561 GB
ERAM Size : 0x0000000080000000 -2 GB
IRAM Size : 0x0000000000020000 -128 KB
UNICAL RID : 585D67CBCFECBA0D00E81FC1AF7959CE
eMMC CID : 510001154D333133853E0642E39208D8
Change to HIGH SPEED...

Waiting for phone to connect
Found : MediaTek DA USB VCOM (Android) (COM27)
Opening Port : Successfully Opened

Reading Partition Table
Partition size[0x000007E8] 23 Items
Reading Partition : Done

Reading System Info
Model : Turk Telekom TT175
Brand : ZTE
Android Ver : 5.1
Board :
Display ID : TT175_EurCommon_1.04
Security Patch :
Emmc_size :
Platform : mt6753
Kernel ID :
Marketname :
FRPPST : /dev/block/platform/mtk-msdc.0/by-name/frp
Auto Backup[preloader & NVRAM]
Reading [preloader] Done
Reading [nvram] Done
MTK Phone Loader is NOW RUNNING.
Operation Done!
Quote:

Waiting for phone to connect
Found : MediaTek DA USB VCOM (Android) (COM27)
Opening Port : Successfully Opened

Reading System Info
Model : Turk Telekom TT175
Brand : ZTE
Android Ver : 5.1
Board :
Display ID : TT175_EurCommon_1.04
Security Patch :
Emmc_size :
Platform : mt6753
Kernel ID :
Marketname :
FRPPST : /dev/block/platform/mtk-msdc.0/by-name/frp

Remove FRP Operation
Removing FRP [OK]

Rebooting Device [Reboot To Normal]
Reboot Done!!

Process Done!!

Hydra Tool 03-15-2019 11:51

Xiaomi Mi A1 Unbrick and Wipe Sec Successfully!
 
Xiaomi Mi A1 Unbrick and Wipe Sec Successfully!

Hydra Tool 03-15-2019 12:11

General Mobile GM4G Reset FRP Successfully!!


Hydra Dongle

Hydra Tool 03-15-2019 12:39

MT6739 Manual Wipe partition By Hydra
 
MT6739 Manual Wipe partition By Hydra

http://i67.tinypic.com/awdnqa.png

Hydra Tool 03-16-2019 21:27

Vestel Venus V4 MT6737M Reset FRP Success By Hydra Tool!!
 
Vestel Venus V4 MT6737M Reset FRP Success By Hydra Tool!!

Booting :

http://i64.tinypic.com/2hq3twm.png

Quote:

Waiting for phone to connect
Found : MediaTek PreLoader USB VCOM (Android) (COM15)
Opening Port : Successfully Opened
Identifying Hardware ID
BROM CPUID : 0335 (0000)0335[6735]
BROM HW_SW_VER : 8A00 CA00 0000 0000
SECURE VERSION : FF
BL VERSION : 01
BR Secured : 00
Preparing Download Agent..
Download Agent : 6735.bin
MTK_DOWNLOAD_AGENT -HYDRA
MTK_AllInOne_DA_v3.3001.2018-09-18.13:22_452898
Initializing Loader [1]
Sending Loader [1] ACCEPTED
OLD PROTOCOL DETECTED
PRMMCCID : 520001154D4231586F1D124239A28BC2
Running DA 4.2 on BBID : 0x9B
Sending INIT configuration...
MTK_DOWNLOAD_AGENT -HYDRA
MTK_AllInOne_DA_v3.3001.2018-09-18.13:22_452898
Initializing Loader [2]
Sending Loader [2] ACCEPTED
Reading Flashchip data....
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000747C00000 -29,121 GB
ERAM Size : 0x00000000C0000000 -3 GB
IRAM Size : 0x0000000000020000 -128 KB
UNICAL RID : 8CD4CBA867B71282FE4D856F5CAA0BD1
eMMC CID : 520001154D4231586F1D124239448BC2
Change to HIGH SPEED...

Waiting for phone to connect
Found : MediaTek DA USB VCOM (Android) (COM17)
Opening Port : Successfully Opened

Reading Partition Table
Partition size[0x000007E8] 23 Items
Reading Partition : Done

Reading System Info
Model : Venus_V4
Brand : Vestel
Android Ver : 7.0
Board : V4
Display ID : v1.19.0
Security Patch : 2018-05-05
Emmc_size :
Platform : mt6737m
Kernel ID : 2018-05-05
Marketname :
FRPPST : /dev/block/platform/mtk-msdc.0/11230000.msdc0/by-name/frp
Auto Backup[preloader & NVRAM]
Reading [preloader] Done
Reading [nvram] Done
MTK Phone Loader is NOW RUNNING.
Operation Done!

FRP :

http://i65.tinypic.com/sbsqps.png

Quote:

Waiting for phone to connect
Found : MediaTek DA USB VCOM (Android) (COM17)
Opening Port : Successfully Opened

Reading System Info
Model : Venus_V4
Brand : Vestel
Android Ver : 7.0
Board : V4
Display ID : v1.19.0
Security Patch : 2018-05-05
Emmc_size :
Platform : mt6737m
Kernel ID : 2018-05-05
Marketname :
FRPPST : /dev/block/platform/mtk-msdc.0/11230000.msdc0/by-name/frp

Remove FRP Operation
Removing FRP Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Process Done!!

Hydra Tool 03-18-2019 13:35

Vesnus E2 Remove Locks Without Data Loss
 
Vesnus E2 Remove Locks Without Data Loss

http://i66.tinypic.com/v60wzo.jpg

Hydra Tool 03-21-2019 21:57

Redmi Note 5A Remove Mi Acc & FRP Success By Hydra
 
Redmi Note 5A Remove Mi Acc & FRP Success By Hydra


Remove Mi Acc :

http://i64.tinypic.com/2s1rbko.jpg

Remove FRP :

http://i64.tinypic.com/x4oeiw.jpg

Hydra Tool 03-27-2019 19:10

Lenovo TB2-X30L Reset FRP Success
 
Lenovo TB2-X30L Reset FRP Success

Quote:

Initialize Dongle...
Hydra Dongle INIT : OKAY
Activation Status : Activated

Selected Comport : COM8
Selected Loader : Auto

Device found on [COM8]
Getting device info...

Serial No.: 0x096976C6
MSM ID : 0x009600E1
PBL Ver : 0x00000000
PK HASH : 0xCC3153A80293939B90D02D3BF8B23E0292E452FEF662C749 98421ADAD42A380F

Sending Qualcomm Firehose Loader [8909.mbn]
Done_Pkt.status 00000000Ok

Connecting to Firehose...
logbuf@0x08057C78 fh@0x08054AE0

MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 32768
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8909
Version : 1

Running : Ok

Trying to read phone information...

Model : Lenovo TB2-X30L
Brand : LENOVO
Android Ver : 5.1.1
Board : TB2-X30L
Display ID : TB2-X30L_S000031_160720_ROW
Security Patch : 2016-07-01
Emmc_size :
Platform : msm8909
Kernel ID : 2016-07-01
FRPPST : /dev/block/bootdevice/by-name/config

Resetting FRP...
> config Ok
FRP Done!!

All Done

Hydra Tool 03-29-2019 10:42

OT-5056E Reset FRP Success By Hydra Tool

http://i66.tinypic.com/2dl3nlt.jpg

Quote:

Initialize Dongle...
Hydra Dongle INIT : OKAY
Activation Status : Activated

Selected Comport : Auto
Selected Loader : Auto

Waiting for Qualcomm 9008 Port...

Device found on [COM97]
Getting device info...

Serial No.: 0x029ED570
MSM ID : 0x009600E1
PBL Ver : 0x00000000
PK HASH : 0xCC3153A80293939B90D02D3BF8B23E0292E452FEF662C749 98421ADAD42A380F

Sending Qualcomm Firehose Loader [8909.mbn]
Done_Pkt.status 00000000Ok

Connecting to Firehose...
logbuf@0x08057C78 fh@0x08054AE0

MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 32768
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8909
Version : 1

Running : Ok

Trying to read phone information...

Model : 5056E
Brand : TCL
Android Ver : 6.0.1
Board : msm8909
Display ID : MMB29M release-keys
Security Patch : 2016-07-01
Emmc_size : 8GB
Platform : msm8909
Kernel ID : 2016-07-01
FRPPST : /dev/block/bootdevice/by-name/binary

Resetting FRP...
> config Ok
FRP Done!!

All Done

Hydra Tool 03-30-2019 13:22

Casper Via G1 Plus Reset FRP Success By Hydra
 
Casper Via G1 Plus Reset FRP Success By Hydra

http://i63.tinypic.com/qsqpp4.jpg

Quote:

Selected Comport : Auto
Selected Loader : Wiko_8917.mbn

Waiting for Qualcomm 9008 Port...

Device found on [COM10]
Getting device info...

Serial No.: 0xB1339021
MSM ID : 0x000560E1
PBL Ver : 0x00000000
PK HASH : 0xADCB7C0B68663755FD192E25C3158C7B13C234483A91460B F81F98219DE35F4D

Sending Qualcomm Firehose Loader [Wiko_8917.mbn]
Done_Pkt.status 00000000Ok

Connecting to Firehose...
logbuf@0x0806FE30 fh@0x0806CC98

MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 32768
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8917
Version : 1

STORAGE DEVICE INFO
Memory Type : eMMC
Block Size in Bytes : 512
Manufacturer ID : 144
Serial Number : 1482007745
Firmware Version : 165
Product Name : HBG4a2
Physical Partitions : 3
Total Logical Blocks :
Storage [0] 61071360
Storage [1] 8192
Storage [2] 8192

Running : Ok

Trying to read phone information...

Model : CASPER_VIA_G1_Plus
Brand : Casper
Android Ver : 7.1.2
Board : VIA_G1_Plus
Display ID : G1_Plus_c1.02_20180319
Security Patch : 2018-02-01
Emmc_size : 16GB
Platform : msm8937
Kernel ID : 2018-02-01
FRPPST : /dev/block/bootdevice/by-name/config

Resetting FRP...
> config Ok
FRP Done!!
Restarting Phone...Ok

All Done

Hydra Tool 04-01-2019 18:03

Alps C5C Remove FRP Success By Hydra
 
Alps C5C Remove FRP Success By Hydra

http://i64.tinypic.com/r7jite.jpg

Hydra Tool 04-02-2019 11:41

Nokia 6 TA-10XX Remove FRP Success By Hydra
 
Nokia 6 TA-10XX Remove FRP Success By Hydra

http://i66.tinypic.com/34t8qpk.jpg

ceza031 04-02-2019 12:46

ZTE N9560 Remove FRP Success
 
ZTE N9560 Remove FRP Success

http://i63.tinypic.com/2it4hev.jpg

Quote:

Selected Comport : COM97
Selected Loader : Auto

Device found on [COM97]

Device is in SAHARA MODE

Connecting to Firehose...

MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 32768
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

STORAGE DEVICE INFO
Memory Type : eMMC
Block Size in Bytes : 512
Manufacturer ID : 69
Serial Number : 207801530
Firmware Version : 2314905408196718642
Product Name : DF4016
Physical Partitions : 3
Total Logical Blocks :
Storage [0] 30777344
Storage [1] 8192
Storage [2] 8192

Running : Ok

Trying to read phone information...

Model : N9560
Brand : ZTE
Android Ver : 7.1.1
Board : bolton
Display ID : N9560V1.0.0B12
Security Patch : 2018-08-01
Emmc_size : 16GB
Platform : msm8937
Kernel ID : 2018-08-01
FRPPST : /dev/block/bootdevice/by-name/config

Resetting FRP...
> config Ok
FRP Done!!

All Done

ceza031 04-03-2019 13:34

Coolpad E561 Remove FRP Success
 
Coolpad E561 Remove FRP Success

Quote:

Selected Comport : Auto
Selected Loader : cool_2_4.mbn

Waiting for Qualcomm 9008 Port...

Device found on [COM7]
Getting device info...

Serial No.: 0x16F4B0B0
MSM ID : 0x007050E1
PBL Ver : 0x00000000
PK HASH : 0xCC3153A80293939B90D02D3BF8B23E0292E452FEF662C749 98421ADAD42A380F

Sending Qualcomm Firehose Loader [cool_2_4.mbn]
Done_Pkt.status 00000000Ok

Connecting to Firehose...
logbuf@0x0801D0A0 fh@0x08019F08

MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8916
Version : 1

Running : Ok

Trying to read phone information...

Model : Coolpad E561
Brand : YuLong
Android Ver : 5.1.1
Board : msm8916
Display ID : V032
Security Patch : 2016-01-01
Emmc_size :
Platform : msm8916
Kernel ID : 2016-01-01
FRPPST : /dev/block/bootdevice/by-name/config

Resetting FRP...
> config Ok
FRP Done!!

All Done

Hydra Tool 04-04-2019 17:22

ZTE Z835 Remove FRP Success By Hydra Tool
 
ZTE Z835 Remove FRP Success By Hydra

http://i65.tinypic.com/2zpv5u8.jpg

Quote:

Initialize Dongle...
Hydra Dongle INIT : OKAY
Activation Status : Activated

Selected Comport : Auto
Selected Loader : Auto

Waiting for Qualcomm 9008 Port...

Device found on [COM62]

Device is in SAHARA MODE

Connecting to Firehose...

MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 32768
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8909
Version : 1

Running : Ok

Trying to read phone information...

Model : Z835
Brand : ZTE
Android Ver : 7.1.1
Board : draco
Display ID : Z835V1.0.0B13
Security Patch : 2017-07-01
Emmc_size : 8GB
Platform : msm8909
Kernel ID : 2017-07-01
FRPPST : /dev/block/bootdevice/by-name/config

Resetting FRP...
> config Ok
FRP Done!!

All Done

Hydra Tool 04-06-2019 12:30

Redmi 3 Remove Mi Account Success
 
Redmi 3 Remove Mi Account Success

http://i67.tinypic.com/2dag1eg.jpg

Quote:

Waiting for Qualcomm 9008 Port...

Device found on [COM4]

Device is in SAHARA MODE

Connecting to Firehose...

MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8936
Version : 1

Running : Ok

Trying to read phone information...

Model : Redmi 3
Brand : Xiaomi
Android Ver : 5.1.1
Board : msm8916
Display ID : LMY47V
Security Patch : 2017-01-01
Emmc_size :
Platform : msm8916
Kernel ID : 2017-01-01
FRPPST : /dev/block/bootdevice/by-name/config

EDL_Resetting Mi Account...

Backing up Partition for safety...Ok
Saved to :
C:\Hydra Tool\HQTool_V1.0.0.50\Backups\Persist\Redmi 3_5.1.1_040619145215.bin
Detecting Patching Data...Detected
Patching Data...Ok
Writing data back to phone...Ok

All Done

Hydra Tool 04-06-2019 12:35

Redmi Note 4 Dissable Mi Account Success
 
Redmi Note 4 Dissable Mi Account Success


Quote:

Starting ADB Server....
Searching Device By ADB
Device Found...

Model : Redmi Note 4

VERSION : 7.0

MANUFACTURER : xiaomi

HW VERSION : qcom

BOARD : msm8953

PRODUCT NAME : mido

SERIAL NO : 47022eb20204


Starting ADB Server....
Searching Device By ADB
Device Found...
Disbaling MI Account
Please wait...
Disabled Mi Account Success

Elapsed Time : 00:00:05

Hydra Tool 04-06-2019 12:37

Redmi Note 4 Patch Mi Account Success

Quote:

Selected Comport : Auto
Selected Loader : Mi_8953.mbn

Waiting for Qualcomm 9008 Port...

Device found on [COM14]
Getting device info...

Serial No.: 0xD624A9CF
MSM ID : 0x000460E1
PBL Ver : 0x00000000
PK HASH : 0x57158EAF1814D78FD2B3105ECE4DB18A817A08AC664A5782 A925F3FF8403D39A

Sending Qualcomm Firehose Loader [Mi_8953.mbn]
Done_Pkt.status 00000000Ok

Connecting to Firehose...
logbuf@0x0806D020 fh@0x08069E88

MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 32768
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8953
Version : 1

STORAGE DEVICE INFO
Memory Type : eMMC
Block Size in Bytes : 512
Manufacturer ID : 144
Serial Number : 1191325362
Firmware Version : 165
Product Name : HBG4a2
Physical Partitions : 3
Total Logical Blocks :
Storage [0] 61071360
Storage [1] 8192
Storage [2] 8192

Running : Ok

Trying to read phone information...

Model : Redmi Note 4
Brand : Xiaomi
Android Ver : 7.0
Board : msm8953
Display ID : AL1512-mido-build-20170803193727
Security Patch : 2017-07-01
Emmc_size : 16GB
Platform : msm8953
Kernel ID : 2017-07-01
FRPPST : /dev/block/bootdevice/by-name/config

EDL_Resetting Mi Account...

Backing up Partition for safety...Ok
Saved to :
E:\Hydra Tools\HQTool_v1.0.0.36Full\Backups\Persist\Redmi Note 4_7.0_040619003343.bin

Scanning Patching address...
Address 1
Address 2
Address 3
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
Total Items patched : 2
Successfully patched address..

All Done

FAT-ON 04-08-2019 08:28

QMobile S8 Full Supported
 
http://i63.tinypic.com/oa1vur.png

http://i65.tinypic.com/20abgbn.png

http://i66.tinypic.com/70ui5v.png

Hydra Tool 04-10-2019 15:02

Redmi S2 Remove Mi Account Success By Hydra

http://i64.tinypic.com/zwhips.jpg

http://i66.tinypic.com/k54hmf.jpg

Hydra Tool 04-10-2019 15:04

Vesstel Venus E2 Reset FRP Success


http://i64.tinypic.com/256vfbl.jpg

Hydra Tool 04-13-2019 10:14

Venus E3 MT6737 Reset FRP By HYDRA




Hydra Tool 04-13-2019 10:15

MSM8916 Remove Locks Without Data Loss

http://i64.tinypic.com/24or31g.jpg

Hydra Tool 04-13-2019 10:20

Xiaomi MI 3W Remove Mi Account Success

http://i64.tinypic.com/9ripuf.jpg


Quote:

Hydra Qualcomm Tool Ver 1.0.0 Build 67
Windows 7 Service Pack 1 (Version 6.1, Build 7601, 32-bit Edition)
******* Dongle Info *******
Version : Hydra Tool v 1.1
Serial : 888800000013
Initialize : OKAY
Status : Activated

Selected Comport : Auto
Selected Loader : 8974.mbn

Searching Qualcomm 9008 Port[FOUND](COM29)
Getting device info...
Serial No.: 0x12064865
MSM ID : 0x007B40E1
PBL Ver : 00000000
PK HASH : CC3153A80293939B90D02D3BF8B23E0292E452FEF662C74998 421ADAD42A380F

Sending Qualcomm Firehose Loader [8974.mbn] Ok

Connecting to Firehose...
logbuf@0xF8023A78 fh@0xF80208E0 OK
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 32768
MaxPayloadSizeToTargetInBytesSupported : 131072
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8974
Version : 1

Running : Ok

Trying to read phone information...

Model : MI 3W
Brand : Xiaomi
Android Ver : 6.0.1
Board : MSM8974
Display ID : MMB29M
Security Patch : 2017-06-01
Emmc_size :
Platform : msm8974
Kernel ID : 2017-06-01
FRPPST :

======================================
EDL_Resetting Mi Account...

Backing up Partition for safety...Ok
Saved to :
C:\Users\g\Desktop\HQTool_V1.0.0.28\HQTool_V1.0.0. 50\Backups\Persist\MI 3W_6.0.1_041119225146.bin

Scanning Patching address...
Address 1
Address 2
Address 3
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
Total Items patched : 29
Successfully patched address..
All Done
======================================
Elapsed Time : 00:00:41

Hydra Tool 04-14-2019 16:41

ZTE Unbrick (Flashing) By Hydra Tool
 
ZTE Unbrick (Flashing) By Hydra Tool

http://www.youtube.com/watch?v=wtfZBESiva8

Quote:

Hydra Qualcomm Tool Ver 1.0.0 Build 67
Windows 10 (Version 10.0, Build 16299, 64-bit Edition)
******* Dongle Info *******
Version : Hydra Tool v 1.1
Serial : 190300000374
Initialize : OKAY
Status : Activated
Selected Comport : COM6
Selected Loader : ZTE_8_2.mbn

Getting device info...
Serial No.: 0x04B75708
MSM ID : 0x009600E1
PBL Ver : 00000000
PK HASH : 9764995D53559360DC5789643D7424ACE3BF6208DA9433656B 7C9DD103F0FE65

Sending Qualcomm Firehose Loader [ZTE_8_2.mbn] Ok

Connecting to Firehose...
logbuf@0x080578F8 fh@0x08054760 OK
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 131072
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8909
Version : 1

Running : Ok
Writing Selected Partitions
Writting : [sbl1] - sbl1.mbn OK
Writting : [sbl1bak] - sbl1.mbn OK
Writting : [rpm] - rpm.mbn OK
Writting : [rpmbak] - rpm.mbn OK
Writting : [tz] - tz.mbn OK
Writting : [tzbak] - tz.mbn OK
Writting : [persist] - persist.img OK
Writting : [aboot] - emmc_appsboot.mbn OK
Writting : [abootbak] - emmc_appsboot.mbn OK
Writting : [sec] - sec.dat OK
Writting : [modem] - NON-HLOS.bin OK
Writting : [boot] - boot.img OK
Writting : [cache] - cache.img OK
Writting : [recovery] - recovery.img OK
Writting : [splash] - splash.img OK
Writting : [batweak] - batweak.img OK
Writting : [system] - system.img OK
Writting : [PrimaryGPT] - gpt_main0.bin OK
Writting : [BackupGPT] - gpt_backup0.bin OK
Writting : [patch0]
[NUM_DISK_SECTORS-34.] OK
[NUM_DISK_SECTORS-34.] OK
[NUM_DISK_SECTORS-34.] OK
[NUM_DISK_SECTORS-34.] OK
[NUM_DISK_SECTORS-1.] OK
[NUM_DISK_SECTORS-1.] OK
[NUM_DISK_SECTORS-33.] OK
[CRC32(2,4096)] OK
[CRC32(NUM_DISK_SECTORS-33.,4096)] OK
[0] OK
[CRC32(1,92)] OK
[0] OK
[CRC32(NUM_DISK_SECTORS-1.,92)] OK
Set bootable drive to 0.
Writing Selected Partitions Done!

Elapsed Time : 00:05:32

ceza031 04-15-2019 10:31

Xiaomi Redmi 4 Remove FRP done Hydra

http://i67.tinypic.com/qxtmky.jpg

Quote:

Hydra Qualcomm Tool Ver 1.0.0 Build 67
Windows 10 (Version 10.0, Build 16299, 64-bit Edition)
******* Dongle Info *******
Version : Hydra Tool v 1.1
Serial : 190100000196
Initialize : OKAY
Status : Activated

Selected Comport : Auto
Selected Loader : Auto

Searching Qualcomm 9008 Port[FOUND](COM4)
Device MODE : SAHARA

Connecting to Firehose... OK
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 32768
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8953
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 17
Serial Number : 960701220
Firmware Version : 3
Product Name : 032G32
Physical Partitions : 3
Total Logical Blocks:
Storage [0] 61071360[29,121 GB]
Storage [1] 8192[4 MB]
Storage [2] 8192[4 MB]
Running : Ok

Trying to read phone information...

Model : Redmi 4
Brand : Xiaomi
Android Ver : 6.0.1
Board : *****
Display ID : MMB29M
Security Patch : 2018-05-01
Emmc_size : 16GB
Platform : msm8937
Kernel ID : 2018-05-01
FRPPST : /dev/block/bootdevice/by-name/config

======================================
*** Ultra Power Option ***
Formating Userdata.. Ok!
Resetting FRP...Ok
Ultra Power Operation Done!!
All Done
======================================
Elapsed Time : 00:00:05

ceza031 04-15-2019 10:33

Redmi 3S Remove Mi Account Done Hydra Tool

http://i63.tinypic.com/slpwti.jpg

Quote:

Hydra Qualcomm Tool Ver 1.0.0 Build 67
Windows 7 Service Pack 1 (Version 6.1, Build 7601, 64-bit Edition)
******* Dongle Info *******
Version : Hydra Tool v 1.1
Serial : 190300000302
Initialize : OKAY
Status : Activated

Selected Comport : Auto
Selected Loader : Auto

Searching Qualcomm 9008 Port[FOUND](COM8)
Getting device info...
Serial No.: 0x00D98F9B
MSM ID : 0x0004F0E1
PBL Ver : 00000000
PK HASH : 57158EAF1814D78FD2B3105ECE4DB18A817A08AC664A5782A9 25F3FF8403D39A

Sending Qualcomm Firehose Loader [prog_emmc_firehose_8937_ddr_1.mbn] Ok

Connecting to Firehose...
logbuf@0x0806C8D0 fh@0x08069738 OK
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 131072
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 17
Serial Number : 2076152824
Firmware Version : 3
Product Name : 032G32
Physical Partitions : 3
Total Logical Blocks:
Storage [0] 61071360[29.121 GB]
Storage [1] 8192[4 MB]
Storage [2] 8192[4 MB]
Running : Ok

Trying to read phone information...

Model : Redmi 3S
Brand : Xiaomi
Android Ver : 6.0.1
Board : msm8937
Display ID : MMB29M
Security Patch : 2017-04-01
Emmc_size : 16G
Platform : msm8937
Kernel ID : 2017-04-01
FRPPST : /dev/block/bootdevice/by-name/config

======================================
EDL_Resetting Mi Account...

Backing up Partition for safety...Ok
Saved to :
F:\BOX\HYDRA\HQTool_v1.0.0.67\Backups\Persist\Redm i 3S_6.0.1_041419135413.bin

Scanning Patching address...
Address 1
Address 2
Address 3
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
Total Items patched : 37
Successfully patched address..
All Done
======================================
Elapsed Time : 00:00:51

Hydra Tool 04-16-2019 23:07

Evertek V6 MT6580A Reset FRP Success

http://i63.tinypic.com/9htcep.jpg

Quote:

******* Dongle Info *******
Version : Hydra Tool v 1.1
Serial : 190300000374
Initialize : OKAY
Status : Activated
Connection[WAITING]Found
Mode[DA] Port[COM4] Status[Opened]

Reading System Info
Model : V6
Brand : Fortune Ship
Android Ver : 7.0
Board : V6
Display ID : V6_TN06_20180320
Security Patch : 2018-02-05
Emmc_size :
Platform : mt6580
Kernel ID : 2018-02-05
Marketname :
FRPPST : /dev/block/platform/mtk-msdc.0/11120000.msdc0/by-name/frp
Remove FRP Operation
Removing FRP Ok

Process Done!!

ceza031 04-17-2019 13:06

CloudFone Thrill HD remove frp done

http://i65.tinypic.com/10r1kb8.jpg

Quote:

Connection[WAITING]Found
Mode[DA] Port[COM5] Status[Opened]

Reading System Info
Model : Thrill HD
Brand : CloudFone
Android Ver : 6.0
Board : ThrillHD
Display ID : ThrillHD_FS20160122_V04
Security Patch : 2016-01-01
Emmc_size :
Platform : mt6580
Kernel ID : 2016-01-01
Marketname :
FRPPST : /dev/block/platform/mtk-msdc.0/11120000.msdc0/by-name/frp
Remove FRP Operation
Removing FRP Ok

Process Done!!

ceza031 04-17-2019 13:08

Lenovo K53 Remove frp done
 
Lenovo K53 Remove frp done

http://i64.tinypic.com/2j2z4uq.jpg

Quote:

Hydra Qualcomm Tool Ver 1.0.0 Build 67
Windows 10 (Version 10.0, Build 16299, 32-bit Edition)
******* Dongle Info *******
Version : Hydra Tool v 1.1
Serial : 190300000330
Initialize : OKAY
Status : Activated

Selected Comport : Auto
Selected Loader : Auto

Searching Qualcomm 9008 Port[FOUND](COM33)
Getting device info...
Serial No.: 0xB33F1181
MSM ID : 0x0004F0E1
PBL Ver : 00000000
PK HASH : 99C8C13E374C34D8F9AFB065EA4C733E6B1B21CBC5A78705F0 41EB24ACDD5FE5

Sending Qualcomm Firehose Loader [prog_emmc_firehose_8937_ddr.mbn] Ok

Connecting to Firehose...
logbuf@0x08077820 fh@0x08074688 OK
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 131072
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 2421873385
Firmware Version : 7
Product Name : RX1BMB
Physical Partitions : 3
Total Logical Blocks:
Storage [0] 61071360[29,121 GB]
Storage [1] 8192[4 MB]
Storage [2] 8192[4 MB]
Running : Ok

Trying to read phone information...

Model : Lenovo K53
Brand : LENOVO
Android Ver : 7.0
Board : QC_Reference_Phone
Display ID : K53_S228_171114_ROW
Security Patch : 2017-11-01
Emmc_size : 16GB
Platform : msm8937
Kernel ID : 2017-11-01
FRPPST : /dev/block/bootdevice/by-name/config

======================================
*** FRP Reset ***
Resetting FRP...Ok
FRP Operation Done!!
All Done
======================================
Elapsed Time : 00:00:09

ceza031 04-17-2019 13:10

OPPO F1F Remove password done
 
OPPO F1F Remove password done

http://i66.tinypic.com/2u8z895.jpg

Quote:

Hydra Qualcomm Tool Ver 1.0.0 Build 67
Windows 7 Service Pack 1 (Version 6.1, Build 7601, 32-bit Edition)
******* Dongle Info *******
Version : Hydra Tool v 1.1
Serial : 190100000074
Initialize : OKAY
Status : Activated

Selected Comport : Auto
Selected Loader : Auto

Searching Qualcomm 9008 Port[FOUND](COM36)
Device MODE : SAHARA

Connecting to Firehose... OK
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8936
Version : 1

Running : Ok

Trying to read phone information...

Model : F1f
Brand : OPPO
Android Ver : 5.1.1
Board : msm8916
Display ID : F1EX_11_171125
Security Patch : 2017-12-01
Emmc_size :
Platform : msm8916
Kernel ID : 2017-12-01
FRPPST : /dev/block/bootdevice/by-name/config

======================================
Formatting Userdata...Ok
All Done
======================================
Elapsed Time : 00:00:04

ceza031 04-17-2019 13:12

Redmi 5 Plus remove frp done
 
Redmi 5 Plus remove frp done

http://i66.tinypic.com/2cpp5kn.jpg

Quote:

Hydra Qualcomm Tool Ver 1.0.0 Build 67
Windows 7 Service Pack 1 (Version 6.1, Build 7601, 32-bit Edition)
******* Dongle Info *******
Version : Hydra Tool v 1.1
Serial : 190300000336
Initialize : OKAY
Status : Activated

Selected Comport : Auto
Selected Loader : Auto

Searching Qualcomm 9008 Port[FOUND](COM60)
Getting device info...
Serial No.: 0x19EBF5FE
MSM ID : 0x000460E1
PBL Ver : 00000000
PK HASH : 57158EAF1814D78FD2B3105ECE4DB18A817A08AC664A5782A9 25F3FF8403D39A

Sending Qualcomm Firehose Loader [Xiaomi_S2y2_noauth_8953_ddr.mbn] Ok

Connecting to Firehose...
logbuf@0x08073070 fh@0x0806FED8 OK
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 32768
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8953
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 903075403
Firmware Version : 165
Product Name : HBG4a2
Physical Partitions : 3
Total Logical Blocks:
Storage [0] 61071360[29,121 GB]
Storage [1] 8192[4 MB]
Storage [2] 8192[4 MB]
Running : Ok

Trying to read phone information...

Model : Redmi 5 Plus
Brand : Xiaomi
Android Ver : 8.1.0
Board : msm8953
Display ID : ZQL1711-vince-build-20181030213149
Security Patch : 2018-11-01
Emmc_size : 16GB
Platform : msm8953
Kernel ID : 2018-11-01
FRPPST : /dev/block/bootdevice/by-name/config

======================================
*** FRP Reset ***
Resetting FRP...Ok
FRP Operation Done!!
All Done
======================================
Elapsed Time : 00:00:07

ceza031 04-17-2019 13:14

Vestel Venus V3 5040 remove frp done
 
Vestel Venus V3 5040 remove frp done

http://i63.tinypic.com/2mnkx3r.jpg

Quote:

Hydra Qualcomm Tool Ver 1.0.0 Build 67
Windows 10 (Version 10.0, Build 17763, 64-bit Edition)
******* Dongle Info *******
Version : Hydra Tool v 1.1
Serial : 181200000010
Initialize : OKAY
Status : Activated

Selected Comport : Auto
Selected Loader : Auto

Searching Qualcomm 9008 Port[FOUND](COM4)
Getting device info...
Serial No.: 0x020903E0
MSM ID : 0x009600E1
PBL Ver : 00000000
PK HASH : CC3153A80293939B90D02D3BF8B23E0292E452FEF662C74998 421ADAD42A380F

Sending Qualcomm Firehose Loader [8909.mbn] Ok

Connecting to Firehose...
logbuf@0x08057C78 fh@0x08054AE0 OK
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 32768
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8909
Version : 1

Running : Ok

Trying to read phone information...

Model : Venus_V3_5040
Brand : Vestel
Android Ver : 6.0.1
Board : msm8909
Display ID : VASPM52 release-keys
Security Patch : 2017-09-01
Emmc_size : 8GB
Platform : msm8909
Kernel ID : 2017-09-01
FRPPST : /dev/block/bootdevice/by-name/config

======================================
*** FRP Reset ***
Resetting FRP...Ok

ceza031 04-17-2019 13:15

Vivo Y31L Format done with Hydra
 
Vivo Y31L Format done with Hydra

http://i66.tinypic.com/ayr7n5.jpg
Quote:

Hydra Qualcomm Tool Ver 1.0.0 Build 67
Windows 7 Service Pack 1 (Version 6.1, Build 7601, 32-bit Edition)
******* Dongle Info *******
Version : Hydra Tool v 1.1
Serial : 190100000074
Initialize : OKAY
Status : Activated

Selected Comport : Auto
Selected Loader : Auto

Searching Qualcomm 9008 Port[FOUND](COM36)
Getting device info...
Serial No.: 0x1E1B29AB
MSM ID : 0x007050E1
PBL Ver : 00000000
PK HASH : CC3153A80293939B90D02D3BF8B23E0292E452FEF662C74998 421ADAD42A380F

Sending Qualcomm Firehose Loader [8916.mbn] Ok

Connecting to Firehose...
logbuf@0x0801BE50 fh@0x08018CB8 OK
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8916
Version : 1

Running : Ok

Trying to read phone information...

Model : vivo Y31L
Brand : vivo
Android Ver : 5.1.1
Board : msm8916
Display ID : LMY47V release-keys
Security Patch : 2018-03-01
Emmc_size :
Platform : msm8916
Kernel ID : 2018-03-01
FRPPST : /dev/block/bootdevice/by-name/config

======================================
Formatting Userdata...Ok
Restarting Phone...Fail
All Done
======================================
Elapsed Time : 00:00:09

Hydra Tool 04-17-2019 18:29

Asus X00TD ZenFone Max Pro M1 ZB602KL Reeset FRP By Hydra
 
Asus X00TD ZenFone Max Pro M1 ZB602KL Reeset FRP By Hydra



johnson1002222 04-19-2019 07:48

Redmi 5 Plus Flashing done
 
https://i.postimg.cc/59hBd4X4/Screen...019-115918.jpg

[/CODE]

Code:

Hydra Qualcomm Tool  Ver 1.0.0 Build 67
Windows 10 (Version 10.0, Build 17763, 64-bit Edition)
******* Dongle Info *******
Version    : Hydra Tool v 1.1
Serial    : 190300000278
Initialize : OKAY
Status    : Activated
Selected Comport : Auto
Selected Loader  : Auto

Searching Qualcomm 9008 Port[FOUND](COM8)
Getting device info...
Serial No.: 0xF6826D2C
MSM ID    : 0x000460E1
PBL Ver  : 00000000
PK HASH  : 57158EAF1814D78FD2B3105ECE4DB18A817A08AC664A5782A925F3FF8403D39A
 
Sending Qualcomm Firehose Loader [Xiaomi_S2y2_noauth_8953_ddr.mbn]  Ok

Connecting to Firehose...
logbuf@0x08073070 fh@0x0806FED8 OK
Chip Configuration :
 MemoryName : eMMC
 MaxPayloadSizeToTargetInBytes : 131072
 MaxPayloadSizeToTargetInBytesSupported : 1048576
 MaxPayloadSizeFromTargetInBytes : 4096
 MaxXMLSizeInBytes : 4096
 TargetName : 8953
 Version : 1

*** STORAGE DEVICE INFO ***
Memory Type        : eMMC
Block Size in Bytes : 512
Page Size          : 512
Manufacturer ID    : 144
Serial Number      : 736648631
Firmware Version    : 162
Product Name        : HCG8a4
Physical Partitions : 3
Total Logical Blocks:
          Storage [0]  122142720[58.242 GB]
          Storage [1]  8192[4 MB]
          Storage [2]  8192[4 MB]
Running : Ok
 
Trying to read phone information...

Model              :        Redmi 5 Plus
Brand              :        Xiaomi
Android Ver        :        7.1.2
Board              :        msm8953
Display ID          :        ZQL1711-vince-build-20180608215524
Security Patch          :        2018-05-01
Emmc_size          :        16GB
Platform            :        msm8953
Kernel ID            :        2018-05-01
FRPPST          :        /dev/block/bootdevice/by-name/config

Writing Selected Partitions
Writting : [modem] - NON-HLOS.bin  OK
Writting : [sbl1] - sbl1.mbn  OK
Writting : [sbl1bak] - sbl1.mbn  OK
Writting : [rpm] - rpm.mbn  OK
Writting : [rpmbak] - rpm.mbn  OK
Writting : [tz] - tz.mbn  OK
Writting : [tzbak] - tz.mbn  OK
Writting : [devcfg] - devcfg.mbn  OK
Writting : [devcfgbak] - devcfg.mbn  OK
Writting : [dsp] - adspso.bin  OK
Writting : [sec] - sec.dat  OK
Writting : [splash] - splash.img  OK
Writting : [aboot] - emmc_appsboot.mbn  OK
Writting : [abootbak] - emmc_appsboot.mbn  OK
Writting : [boot] - boot.img  OK
Writting : [recovery] - recovery.img  OK
Writting : [system] - system.img  OK
Writting : [cache] - cache.img  OK
Writting : [persist] - persist.img  OK
Writting : [misc] - misc.img  OK
Writting : [lksecapp] - lksecapp.mbn  OK
Writting : [lksecappbak] - lksecapp.mbn  OK
Writting : [cmnlib] - cmnlib.mbn  OK
Writting : [cmnlibbak] - cmnlib.mbn  OK
Writting : [cmnlib64] - cmnlib64.mbn  OK
Writting : [cmnlib64bak] - cmnlib64.mbn  OK
Writting : [keymaster] - keymaster.mbn  OK
Writting : [keymasterbak] - keymaster.mbn  OK
Writting : [cust] - cust.img  OK
Writting : [userdata] - userdata.img  OK
Writting : [PrimaryGPT] - gpt_main0.bin  OK
Writting : [BackupGPT] - gpt_backup0.bin  OK
Writting : [patch0]
              [NUM_DISK_SECTORS-34.]  OK
              [NUM_DISK_SECTORS-34.]  OK
              [NUM_DISK_SECTORS-34.]  OK
              [NUM_DISK_SECTORS-34.]  OK
              [NUM_DISK_SECTORS-1.]  OK
              [NUM_DISK_SECTORS-1.]  OK
              [NUM_DISK_SECTORS-33.]  OK
              [CRC32(2,6656)]  OK
              [CRC32(NUM_DISK_SECTORS-33.,6656)]  OK
              [0]  OK
              [CRC32(1,92)]  OK
              [0]  OK
              [CRC32(NUM_DISK_SECTORS-1.,92)]  OK
Set bootable drive to 0.
Writing Selected Partitions Done!

Elapsed Time : 00:08:31

[/QUOTE]

ceza031 04-20-2019 22:20

Mi Max 3 Reset Mi Account By Hydra
 
Mi Max 3 Reset Mi Account By Hydra

https://i.ibb.co/2g9pK4n/Mi-Max-3.jpg

Quote:

Connecting to Firehose...
Binary build date: Aug 2 2018 @ 22:27:53
fh.attrs.Verbose is set to 0
Chip serial num: 234749951 (0xdfdffff)
Supported Functions: program configure nop sig firmwarewrite patch setbootablestoragedrive ufs emmc power benchmark read getstorageinfo getsha256digest erase OK
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 8192
MaxPayloadSizeToTargetInBytesSupported : 8192
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : MSM8996
Version : 1
DateTime : Aug 2 2018 - 22:27:53

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 1621587564
Firmware Version : 162
Product Name : HCG8a4
Physical Partitions : 4
Total Logical Blocks:
Storage [0] 122142720[58,242 GB]
Storage [1] 8192[4 MB]
Storage [2] 8192[4 MB]
Storage [3] 8192[4 MB]
Running : Ok

Trying to read phone information...

Model : MI MAX 3
Brand : Xiaomi
Android Ver : 9
Board :
Display ID : PKQ1.181007.001
Security Patch : 2019-03-01
Emmc_size :
Platform :
Kernel ID : 2019-03-01
FRPPST :

======================================
EDL_Resetting Mi Account...

Backing up Partition for safety...Ok
Saved to :
C:\Users\DELL\Downloads\Compressed\HQTool_v1.0.0.6 7\Backups\Persist\MI MAX 3_9_042019153632.bin

Scanning Patching address...
Address 1
Address 2
Address 3
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
Total Items patched : 3
Successfully patched address..
All Done
======================================
Elapsed Time : 00:01:17

ceza031 04-25-2019 00:14

Mi 8 Lite Remove Mi Account Success
 
Mi 8 Lite Remove Mi Account Success

Quote:

Searching Qualcomm 9008 Port[FOUND](COM302)
Device MODE : SAHARA

Connecting to Firehose...
Binary build date: Aug 2 2018 @ 22:27:53
fh.attrs.Verbose is set to 0
Chip serial num: 4294967295 (0xffffffff)
Supported Functions: program configure nop sig firmwarewrite patch setbootablestoragedrive ufs emmc power benchmark read getstorageinfo getsha256digest erase OK
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 8192
MaxPayloadSizeToTargetInBytesSupported : 8192
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : MSM8996
Version : 1
DateTime : Aug 2 2018 - 22:27:53

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 1646979282
Firmware Version : 875573296
Product Name : hC8aP>
Physical Partitions : 4
Total Logical Blocks:
Storage [0] 122142720[58,242 GB]
Storage [1] 8192[4 MB]
Storage [2] 8192[4 MB]
Storage [3] 32768[16 MB]
Running : Ok

Trying to read phone information...

Model : MI 8 Lite
Brand : Xiaomi
Android Ver : 8.1.0
Board :
Display ID : OPM1.171019.019
Security Patch : 2018-12-01
Emmc_size :
Platform :
Kernel ID : 2018-12-01
FRPPST :

======================================
EDL_Resetting Mi Account...

Backing up Partition for safety...Ok
Saved to :
C:\Users\DELL\Downloads\Compressed\HQTool_v1.0.0.6 7\Backups\Persist\MI 8 Lite_8.1.0_042419100908.bin

Scanning Patching address...
Address 1
Address 2
Address 3
> Patching address detected [PATCHED]
Total Items patched : 1
Successfully patched address..
All Done
======================================
Elapsed Time : 00:01:03


All times are GMT +1. The time now is 08:24.


vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2024 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2023 -

Page generated in 0.61947 seconds with 6 queries

SEO by vBSEO