GSM Shop GSM Shop
GSM-Forum  

Welcome to the GSM-Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features.
Only registered members may post questions, contact other members or search our database of over 8 million posts.

Registration is fast, simple and absolutely free so please - Click to REGISTER!

If you have any problems with the registration process or your account login, please contact contact us .

Go Back   GSM-Forum > Product Support Sections > Special Solutions / Services / WebShop > GSMFABRICA Products > HYDRA TOOL

Reply
 
LinkBack Thread Tools Display Modes
Old 03-22-2021, 03:38   #1501 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,609
Xiaomi Redmi 9A (dendelion) formatting selection partition successfully done by Hydra


Xiaomi Redmi 9A (dendelion) formatting selection partition successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port (COM14)
SymbolicName :\??\USB#VID_0E8D&PID_0003#5&22a600f3&0&4#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2016,3.2


Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 90840E68BC57744ED81B7AF3A1D5B640
ERAM Size : 0x000000000003A000 -232 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29,121 GB
eMMC CID : 450100444134303332017D558413471B - DA4032

Reading GPT-EMMC [0x00008000] 130 Items

Format Selected Partition
Formatting [protect1] Ok!
Formatting [protect2] Ok!
Formatting [persist] Ok!
=====================================

Elapsed Time : 00:00:05
BR
Dipendra Pathak

  Reply With Quote
Old 03-22-2021, 04:19   #1502 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,609
Xiaomi Redmi 9A (dendelion) formatting selection partition successfully done by Hydra

Xiaomi Redmi 9A (dendelion) formatting selection partition successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port (COM14)
SymbolicName :\??\USB#VID_0E8D&PID_0003#5&22a600f3&0&4#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2016,3.2


Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 90840E68BC57744ED81B7AF3A1D5B640
ERAM Size : 0x000000000003A000 -232 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29,121 GB
eMMC CID : 450100444134303332017D558413471B - DA4032

Reading GPT-EMMC [0x00008000] 130 Items

Format Selected Partition
Formatting [protect1] Ok!
Formatting [protect2] Ok!
Formatting [persist] Ok!
=====================================

Elapsed Time : 00:00:05
BR
Dipendra Pathak

  Reply With Quote
Old 03-22-2021, 04:22   #1503 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,609
Xiaomi Redmi 9 (lancelot) removing FRP and Mi Account Successfully Done by Hydra Tool

Xiaomi Redmi 9 (lancelot) removing FRP and Mi Account Successfully Done by Hydra Tool

Screen Short:



Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port (COM6)
SymbolicName :\??\USB#VID_0E8D&PID_0003#5&eaaa4c&0&9#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0707MT6768[6768]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
SECURE VERSION : 00
BL VERSION : FE
BR Secured : 00
NORMAL BOOT

Preparing Download Agent..
DA : MT6768_Xiaomi_New.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2020/07/07.10:10_513994
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_lancelot.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 6B15368CDC68A4E9C89FF3849BB3BDF1
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58,242 GB
eMMC CID : 15010044503644414203D6A4684347E7 - DP6DAB

DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_lancelot.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0707__032121100641\MT6768_Androi d_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x05508000]1024 KB ->frp.bin...Ok
-nvdata[0x0C4A2000]64 MB ->nvdata.bin...Ok
-persist[0x104A2000]48 MB ->persist.bin...Ok
-nvram[0x19F80000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0707__032121100641
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 6B15368CDC68A4E9C89FF3849BB3BDF1
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58,242 GB
eMMC CID : 15010044503644414203D6A4684347E7 - DP6DAB

Reading GPT-EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Remove MiAccount[Erase Method] + FRP
Processing...
-persist.bin[0x104A2000]48 MB ->persist.bin...Ok
-frp.bin[0x05508000]1024 KB ->frp.bin...Ok
__032121100710
Backing up Partition for safety...
-__032121100710[0x104A2000]48 MB ->persist.img...OkOk
Saved to :
C:\Hydra Tool\Backup\Persist\__032121100710.bin
Erasing FRP Partition...
-persist.bin[0x104A2000]48 MB ->persist.bin...Ok
-frp.bin[0x05508000]1024 KB ->frp.bin...Ok Ok

Elapsed Time : 00:00:50
BR
Dipendra Pathak

  Reply With Quote
Old 03-22-2021, 04:36   #1504 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,609
Xiaomi Redmi 6A (Cactus) Mi Account Removed using Patch Method by Hydra Tool

Xiaomi Redmi 6A (Cactus) Mi Account Removed using Patch Method by Hydra Tool

Screen Short:



Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port_V1632 (COM14)
SymbolicName :\??\USB#VID_0E8D&PID_0003#6&3af92cab&0&4#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0766MT6765[6765]
BROM HW_SW_VER : 8A00 CA00 0000 0000
getMTKPayloadExploit : 0766
#Executing Exploit..
#SUCCESS..
Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0766MT6765[6765]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
SECURE VERSION : 00
BL VERSION : FE
BR Secured : E0

Preparing Download Agent..
DA : 6765.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2020-11-03.22:07_536568
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...[ERROR]- NOT SYNC
=============================================
Reasons why it fails due to the following"
1. Harware problem/issues
2. If you did Testpoint Kindly check the parts you Touch/TP
3. Powershortage, try to connect Battery
4. Check or replace usb cable and plug directly to your pc usb port.
=============================================
SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_cactus.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : D8038DBB5A8608643AE6512489FBF48C
ERAM Size : 0x000000000003A000 -232 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003AB400000 -14,676 GB
eMMC CID : 90014A484147346132A5C2C1101375DB - HAG4a2

DA Speed : high-speed

Reading GPTNot Valid GPT
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
ERROR : ACK : 0x00010009[]

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi 6A
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-GB
Description : cactus-user 9 PPR1.180610.011 V11.0.8.0.PCBMIXM release-keys
Miui Ver : V11
Device : cactus
Mod_device : cactus_global
Display ID : SW_S98506AE1_V009_M13_XM_C3C_USR
Security Patch : 2020-05-01
Fingerprint : xiaomi/cactus/cactus:9/PPR1.180610.011/V11.0.8.0.PCBMIXM:user/release-keys
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Remove MiAccount[Patch Method]
Processing...
-persist.bin[0x0F000000]64 MB ->persist.bin...Ok
-frp.bin[0x05588000]1024 KB ->frp.bin...Ok

Scanning Patching address...Please wait...
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
Total Items patched : 3
Successfully patched address..
C:\Users\Desktop\hydra tool full pack\Backup\Xiaomi_Account\xiaomi_cactus_cactus_9_ PPR1.180610.011_V11.0.8.0.PCBMIXM_032121134345\per sist.bin.patch Ok

Elapsed Time : 00:01:50
BR
Dipendra Pathak

  Reply With Quote
Old 03-23-2021, 09:27   #1505 (permalink)
No Life Poster
 
Gsm-Ahmed's Avatar
 
Join Date: Jan 2020
Location: Algeria
Posts: 790
Member: 2944109
Status: Offline
Thanks Meter: 621
Donate money to this user
Condor Griffe T8 PLUS (SP641) Ultra Power Option

Condor Griffe T8 PLUS (SP641) Ultra Power Option



Code:
Brand : AUTO Model : AUTO Connection : Flash Mode

=====================================
How To Boot : Power off phone
 * BROM Mode : Press VOL + or Press VOL -+
 * Preloader Mode : Just Insert cable

Searching for MTK Device...Found
 Port Identification :Flashmode Preloader
 FriendlyName :MediaTek PreLoader USB VCOM (Android) (COM4)
 SymbolicName :\??\USB#VID_0E8D&PID_2000#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
 BROM CPUID     : 0699MT6739[6739]
 BROM HW_SW_VER : 8A00 CB00 0002 0000 
 FUSEID         : 00000000
 SECURE VERSION : FF 
 BL VERSION     : 03 
 BR Secured     : 00

Preparing Download Agent..
 DA   : 6739.bin
 Agent: MTK_DOWNLOAD_AGENT -HYDRA
 Ver  : MTK_AllInOne_DA_v3.3001.2020-11-03.22:07_536568
 Init : Loader [1]
 Sending : Accepted

Identifying Protocol...
 Protocol : New
 Synchronization...SYNC
 Mode : preloader

Execute Secondary Loader
 Init : Loader [2]
 Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
 UNIQUE ID  : FC053B5959B2B1241D5B171D80804D09
 ERAM Size  : 0x0000000000020000 -128 KB
 IRAM Size  : 0x0000000040000000 -1024 MB
 eMMC BOOT1 : 0x0000000000400000 -4 MB
 eMMC BOOT2 : 0x0000000000400000 -4 MB
 eMMC RPMB  : 0x0000000000400000 -4 MB
 eMMC USER  : 0x00000003AB400000 -14,676 GB
 eMMC CID   : 13014E53304A39483610037AF62755CB - S0J9H6

DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info
  Brand          : Condor
  Vendor         : SPA Condor Electronics
  Model          : Griffe T8 Plus
  ID             : O11019
  SDK            : 27
  Release        : 8.1.0
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Locale         : en-US
  Description    : full_k602-user 8.1.0 O11019 1560328254 release-keys
  Device         : SP641
  Display ID     : O11019 release-keys
  Security Patch : 2019-06-05
  Fingerprint    : Condor/SP641/SP641:8.1.0/O11019/1560328254:user/release-keys
  StorageType    : mtp
  Userdata State : Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
   -> Renaming Preloader....  preloader_k602.bin
   Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0699_Condor_SP641_SP641_8.1.0_O11019_1560328254_032221093049\MT6739_Android_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x02D88000]1024 KB ->frp.bin...Ok
-nvdata[0x03688000]32 MB ->nvdata.bin...Ok
-nvram[0x10700000]5 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0699_Condor_SP641_SP641_8.1.0_O11019_1560328254_032221093049
MTK Phone Loader is NOW RUNNING.
=====================================

Elapsed Time : 00:00:32


Code:
=====================================
Searching for MTK Device...Found
 Port Identification :Flashmode Preloader
 FriendlyName :MediaTek PreLoader USB VCOM (Android) (COM4)
 SymbolicName :\??\USB#VID_0E8D&PID_2000#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0


Reading Device UniqueID, RAM and Flash Chip Info...
 UNIQUE ID  : FC053B5959B2B1241D5B171D80804D09
 ERAM Size  : 0x0000000000020000 -128 KB
 IRAM Size  : 0x0000000040000000 -1024 MB
 eMMC BOOT1 : 0x0000000000400000 -4 MB
 eMMC BOOT2 : 0x0000000000400000 -4 MB
 eMMC RPMB  : 0x0000000000400000 -4 MB
 eMMC USER  : 0x00000003AB400000 -14,676 GB
 eMMC CID   : 13014E53304A39483610037AF62755CB - S0J9H6

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
  Brand          : Condor
  Vendor         : SPA Condor Electronics
  Model          : Griffe T8 Plus
  ID             : O11019
  SDK            : 27
  Release        : 8.1.0
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Locale         : en-US
  Description    : full_k602-user 8.1.0 O11019 1560328254 release-keys
  Device         : SP641
  Display ID     : O11019 release-keys
  Security Patch : 2019-06-05
  Fingerprint    : Condor/SP641/SP641:8.1.0/O11019/1560328254:user/release-keys
  StorageType    : mtp
  Userdata State : Encrypted

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition...
Safeformat Universal... Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:05
  Reply With Quote
The Following User Says Thank You to Gsm-Ahmed For This Useful Post:
Old 03-23-2021, 09:28   #1506 (permalink)
No Life Poster
 
Gsm-Ahmed's Avatar
 
Join Date: Jan 2020
Location: Algeria
Posts: 790
Member: 2944109
Status: Offline
Thanks Meter: 621
Donate money to this user
OPPO A3S Password Remove ISP Hydra EMMC Tool

OPPO A3S Password Remove ISP Hydra EMMC Tool



Code:
Cylinders : 1900
Tracks Per Cylinder : 255
Sectors Per Track : 63
Bytes Per Sector : 512
DriveSize : 15651560000- 14.555 GB
Total Disk Size : 15668440288- 14.562 GB

Reading partitions...(65- Items)
SafeFormatUserData. Ok

Elapsed Time : 00:00:01
  Reply With Quote
The Following User Says Thank You to Gsm-Ahmed For This Useful Post:
Old 03-23-2021, 09:29   #1507 (permalink)
No Life Poster
 
Gsm-Ahmed's Avatar
 
Join Date: Jan 2020
Location: Algeria
Posts: 790
Member: 2944109
Status: Offline
Thanks Meter: 621
Donate money to this user
Hisense Infinity E6 (F16) Erasing FRP

Hisense Infinity E6 (F16) Erasing FRP successfully done by Hydra Tool




Code:
Brand : AUTO Model : AUTO Connection : Flash Mode

=====================================
How To Boot : Power off phone
 * BROM Mode : Press VOL + or Press VOL -+
 * Preloader Mode : Just Insert cable

Searching for MTK Device...Found
 Port Identification :Flashmode BROM 
 FriendlyName :MediaTek USB Port (COM10)
 SymbolicName :\??\USB#VID_0E8D&PID_0003#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
 BROM CPUID     : 0699MT6739[6739]
 BROM HW_SW_VER : 8A00 CB00 0002 0000 
 FUSEID         : 00000000
 SECURE VERSION : 05 
 BL VERSION     : FE 
 BR Secured     : 00
NORMAL BOOT

Preparing Download Agent..
 DA   : [Not Exist]
Trying Default 6739.bin
 Agent: MTK_DOWNLOAD_AGENT -HYDRA
 Ver  : MTK_AllInOne_DA_v3.3001.2020-11-03.22:07_536568
 Init : Loader [1]
 Sending : Accepted

Identifying Protocol...
 Protocol : New
 Synchronization...SYNC
 Mode : brom
 Preloader Initialization...
 Parsing preloader_Hisense_6739_yk737_lwg_bsp1g.bin
 Init : Accepted

Execute Secondary Loader
 Init : Loader [2]
 Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
 UNIQUE ID  : 26B2F7A4CEA064E632B9889184E6CEA0
 ERAM Size  : 0x0000000000020000 -128 KB
 IRAM Size  : 0x0000000040000000 -1024 MB
 eMMC BOOT1 : 0x0000000000400000 -4 MB
 eMMC BOOT2 : 0x0000000000400000 -4 MB
 eMMC RPMB  : 0x0000000000080000 -512 KB
 eMMC USER  : 0x00000001D2000000 -7,281 GB
 eMMC CID   : 150100464E36324D420335739A22C51B - FN62MB

DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info
  Brand          : Hisense
  Vendor         : Hisense
  Model          : Hisense Infinity E6
  ID             : O11019
  SDK            : 27
  Release        : 8.1.0
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Locale         : en-US
  Description    : full_yk736_lwg_bsp1g-user 8.1.0 O11019 Hisense_F16_02_S02 release-keys
  Device         : HS6739MT_EEA
  Board          : Hisense
  Display ID     : Hisense_F16_02_S02_20190316
  Security Patch : 2019-01-05
  Fingerprint    : Hisense/F16_EEA/HS6739MT_EEA:8.1.0/O11019/Hisense_F16_02_S02:user/release-keys
  StorageType    : mtp
  Userdata State : Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
   -> Renaming Preloader....  preloader_yk736_lwg_bsp1g.bin
   Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0699_Hisense_F16_EEA_HS6739MT_EEA_8.1.0_O11019_Hisense_F16_02_S02_032221141455\MT6739_Android_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x02D88000]1024 KB ->frp.bin...Ok
-nvdata[0x03688000]32 MB ->nvdata.bin...Ok
-nvram[0x10700000]5 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0699_Hisense_F16_EEA_HS6739MT_EEA_8.1.0_O11019_Hisense_F16_02_S02_032221141455
MTK Phone Loader is NOW RUNNING.
=====================================

Elapsed Time : 00:00:31


Code:
Searching for MTK Device...Found
 Port Identification :Flashmode BROM 
 FriendlyName :MediaTek USB Port (COM10)
 SymbolicName :\??\USB#VID_0E8D&PID_0003#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0


Reading Device UniqueID, RAM and Flash Chip Info...
 UNIQUE ID  : 26B2F7A4CEA064E632B9889184E6CEA0
 ERAM Size  : 0x0000000000020000 -128 KB
 IRAM Size  : 0x0000000040000000 -1024 MB
 eMMC BOOT1 : 0x0000000000400000 -4 MB
 eMMC BOOT2 : 0x0000000000400000 -4 MB
 eMMC RPMB  : 0x0000000000080000 -512 KB
 eMMC USER  : 0x00000001D2000000 -7,281 GB
 eMMC CID   : 150100464E36324D420335739A22C51B - FN62MB

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
  Brand          : Hisense
  Vendor         : Hisense
  Model          : Hisense Infinity E6
  ID             : O11019
  SDK            : 27
  Release        : 8.1.0
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Locale         : en-US
  Description    : full_yk736_lwg_bsp1g-user 8.1.0 O11019 Hisense_F16_02_S02 release-keys
  Device         : HS6739MT_EEA
  Board          : Hisense
  Display ID     : Hisense_F16_02_S02_20190316
  Security Patch : 2019-01-05
  Fingerprint    : Hisense/F16_EEA/HS6739MT_EEA:8.1.0/O11019/Hisense_F16_02_S02:user/release-keys
  StorageType    : mtp
  Userdata State : Encrypted

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition...[C002002A-STATUS_SEC_IMG_TYPE_MISMATCH]
Erasing FRP Partition... Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:05
  Reply With Quote
The Following User Says Thank You to Gsm-Ahmed For This Useful Post:
Old 03-23-2021, 13:06   #1508 (permalink)
No Life Poster
 
Gsm-Ahmed's Avatar
 
Join Date: Jan 2020
Location: Algeria
Posts: 790
Member: 2944109
Status: Offline
Thanks Meter: 621
Donate money to this user
Xiaomi Redmi note 5 Pro (whyred) FRP + MiAccount

Xiaomi Redmi note 5 Pro (whyred)

Remove FRP
Remove MiAccount[Patch Method]
Disabled MiAccount ADB Mode

successfully done by Hydra Tool




Code:
PreOperation Configuration 
 Brand : XIAOMI Model : Redmi Note 5 Pro (Whyred) Storage : Auto
 Loader: mi_2_9.elf
 Port  : Auto
 Connection  : 

Searching for Qualcomm 9008 Device...Found
 FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM9)
 SymbolicName :\??\USB#VID_05C6&PID_9008#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :05/18/2016,1.0.26.0

Getting device info......
Serial No.: 0xF18FB804
MSM ID    : 0x000CC0E1, 
PBL Ver   : 00000000
PK HASH   : A7B8B82545A98ECA23D6E9105FB46456
            8D1B5828264903441BDEF0CD57E3C370
 
Firehose Loader[mi_2_9.elf]
SaharaBoot... Ok
Sending ...............................Ok
Connecting to Firehose...
Ping......... Ok 
Configuration......
Identifying Chip....
Ok
Chip Configuration :
 MemoryName : eMMC
 MaxPayloadSizeToTargetInBytes : 1048576
 MaxPayloadSizeToTargetInBytesSupported : 1048576
 MaxPayloadSizeFromTargetInBytes : 4096
 MaxXMLSizeInBytes : 4096
 TargetName : MSM8996
 Version : 1
 DateTime : Aug  2 2018 - 22:27:53

*** STORAGE DEVICE INFO ***
Memory Type         : eMMC
Block Size in Bytes : 512
Page Size           : 512
Manufacturer ID     : 21
Serial Number       : 2676665404
Firmware Version    : 2
Product Name        : DD68MB
Physical Partitions : 4
Total Logical Blocks:
          Drive [0]  61071360[29,121 GB]
          Drive [1]  8192[4 MB]
          Drive [2]  8192[4 MB]
          Drive [3]  8192[4 MB]

Protocol : Universal
Running : Ok
 
Phone Information.....
  Brand          : xiaomi
  Vendor         : Xiaomi
  Model          : Redmi Note 5
  ID             : OPM1.171019.011
  SDK            : 27
  Release        : 8.1.0
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-GB
  Description    : whyred-user 8.1.0 OPM1.171019.011 V10.0.6.0.OEIMIFH release-keys
  Miui Ver       : V10
  Device         : whyred
  Mod_device     : whyred_global
  Display ID     : OPM1.171019.011
  Security Patch : 2018-11-01
  Fingerprint    : xiaomi/whyred/whyred:8.1.0/OPM1.171019.011/V10.0.6.0.OEIMIFH:user/release-keys

Reading GPT[4]
          Drive [0] 64 Items
          Drive [1] 0 Items
          Drive [2] 0 Items
          Drive [3] 

Removing FRPta...
Method : 
Auto 
Processing... 
 - Removing FRP
Executing ...
 - Removing FRP [Zero Wipe] OkOkOk

Elapsed Time : 00:00:09


Code:
PreOperation Configuration 
 Brand : XIAOMI Model : Redmi Note 5 Pro (Whyred) Storage : Auto
 Loader: mi_2_9.elf
 Port  : Auto
 Connection  : 

Searching for Qualcomm 9008 Device...Found
 FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM9)
 SymbolicName :\??\USB#VID_05C6&PID_9008#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :05/18/2016,1.0.26.0

Getting device info......
Serial No.: 0xF18FB804
MSM ID    : 0x000CC0E1, 
PBL Ver   : 00000000
PK HASH   : A7B8B82545A98ECA23D6E9105FB46456
            8D1B5828264903441BDEF0CD57E3C370
 
Firehose Loader[mi_2_9.elf]
SaharaBoot... Ok
Sending ...............................Ok
Connecting to Firehose...
Ping......... Ok 
Configuration......
Identifying Chip....
Ok
Chip Configuration :
 MemoryName : eMMC
 MaxPayloadSizeToTargetInBytes : 1048576
 MaxPayloadSizeToTargetInBytesSupported : 1048576
 MaxPayloadSizeFromTargetInBytes : 4096
 MaxXMLSizeInBytes : 4096
 TargetName : MSM8996
 Version : 1
 DateTime : Aug  2 2018 - 22:27:53

*** STORAGE DEVICE INFO ***
Memory Type         : eMMC
Block Size in Bytes : 512
Page Size           : 512
Manufacturer ID     : 21
Serial Number       : 2676665404
Firmware Version    : 2
Product Name        : DD68MB
Physical Partitions : 4
Total Logical Blocks:
          Drive [0]  61071360[29,121 GB]
          Drive [1]  8192[4 MB]
          Drive [2]  8192[4 MB]
          Drive [3]  8192[4 MB]

Protocol : Universal
Running : Ok
Reading GPT[4]
          Drive [0] 64 Items
          Drive [1] 0 Items
          Drive [2] 0 Items
          Drive [3] 

 
Phone Information.....
  Brand          : xiaomi
  Vendor         : Xiaomi
  Model          : Redmi Note 5
  ID             : OPM1.171019.011
  SDK            : 27
  Release        : 8.1.0
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-GB
  Description    : whyred-user 8.1.0 OPM1.171019.011 V10.0.6.0.OEIMIFH release-keys
  Miui Ver       : V10
  Device         : whyred
  Mod_device     : whyred_global
  Display ID     : OPM1.171019.011
  Security Patch : 2018-11-01
  Fingerprint    : xiaomi/whyred/whyred:8.1.0/OPM1.171019.011/V10.0.6.0.OEIMIFH:user/release-keys

Processing Remove MiAccount[Patch Method]....
Backing up Partition for safety...Ok

Scanning Patching address...
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]Done!!
Total Items patched : 2
Successfully patched address..
Action Result : Ok

Rebooting Phone.... Ok

Elapsed Time : 00:00:16


Code:
Starting ADB Server....
Searching Device By ADB
Device Found...
Model       	: Redmi Note 5
Brand       	: Xiaomi
Android Ver 	: 8.1.0
CPU abi     	: arm64-v8a
Software Version 	: 
CSC Version 	: 
Bootloader  	: 
Board       	: sdm636
Display ID  	: OPM1.171019.011
Security Patch  	: 2018-11-01
Emmc_size   	: 
Platform    	: sdm660
Kernel ID    	: 2018-11-01
Marketname   	: 
OTA Version Name	: 
SYS USB CONFIG  	: persist.adb
FRPPST          	: /dev/block/bootdevice/by-name/frp
FingerPrint     	: xiaomi/whyred/whyred:8.1.0/OPM1.171019.011/V10.0.6.0.OEIMIFH:user/release-keys

Checking Root Status.... 
Root Status : Not Rooted

ADB MiAccount...
 
Processing... 
Disbaling MI Account
Please wait...
Disabled Mi Account Success
Action Result : Ok

Elapsed Time : 00:00:11
  Reply With Quote
The Following User Says Thank You to Gsm-Ahmed For This Useful Post:
Old 03-23-2021, 13:35   #1509 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,609
Vivo Y53 Flashing Successfully Done by Hydra Tool

Vivo Y53 Flashing Successfully Done by Hydra Tool

Screen Short:



Logs:

Quote:
Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM3)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&10ef021e&0&6#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :03/25/2016,2.1.2.2

Getting device info......
Serial No.: 0x0071C1DF
MSM ID : 0x000560E1, MSM8917-Qualcomm Snapdragon 425
PBL Ver : 00000000
PK HASH : 60BA997FEF6DA9F05885FA11F1DD6D2A
90D052A257A09C2075D7246CC73C0D43

Firehose Loader[8917.mbn]
SaharaBoot... Ok
Sending .................Ok
Connecting to Firehose...
Ping... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8917
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 936051212
Firmware Version : 165
Product Name : HAG4a2
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 30777344[14.676 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok

Phone Information.....
Brand : vivo
Vendor : vivo
Model : vivo PD1628F_EX
ID : MMB29M
SDK : 23
Release : 6.0.1
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-US
Description : msm8937_32-user 6.0.1 MMB29M eng.compiler.20200118.112618 release-keys
Device : PD1628F_EX
Board : QC_Reference_Phone
Display ID : MMB29M release-keys
Security Patch : 2018-08-01
Emmc_size : 16GB
Platform : msm8937
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : vivo/PD1628F_EX/PD1628F_EX:6.0.1/MMB29M/compiler01181129:user/release-keys

Reading GPT[3]
Drive [0] 52 Items
Drive [1] 0 Items
Drive [2] 0 Items


Backup Security partitions...
Reading Security Items....
> modemst1
> modemst2
> fsg
C:\Hydra Tool\Backup\Security_Backup\vivo PD1628F_EX_QC_Reference_Phone_6.0.1_Security_03232 1123857.sec
Backup Security Success....

----------------------------
Flashing Selected Partitions....
- modem(0)[NON-HLOS.bin] Ok
- sbl1(0)[sbl1.mbn] Ok
- sbl1bak(0)[sbl1.mbn] Ok
- rpm(0)[rpm.mbn] Ok
- rpmbak(0)[rpm.mbn] Ok
- tz(0)[tz.mbn] Ok
- tzbak(0)[tz.mbn] Ok
- devcfg(0)[devcfg.mbn] Ok
- devcfgbak(0)[devcfg.mbn] Ok
- dsp(0)[adspso.bin] Ok
- modemst1(0)[modemst.mbn] Skipped
- modemst2(0)[modemst.mbn] Skipped
- fsg(0)[PD1628F_EX_fs_image.tar.gz.mbn.img] Skipped
- sec(0)[sec.dat] Skipped
- aboot(0)[emmc_appsboot.mbn] Ok
- abootbak(0)[emmc_appsboot.mbn] Ok
- boot(0)[boot.img] Ok
- recovery(0)[recovery.img] Ok
- system(0)[system_1.img] Ok
- system(0)[system_2.img] Ok
- system(0)[system_3.img] Ok
- system(0)[system_4.img] Ok
- system(0)[system_5.img] Ok
- system(0)[system_6.img] Ok
- system(0)[system_7.img] Ok
- system(0)[system_8.img] Ok
- system(0)[system_9.img] Ok
- system(0)[system_10.img] Ok
- system(0)[system_11.img] Ok
- system(0)[system_12.img] Ok
- system(0)[system_13.img] Ok
- system(0)[system_14.img] Ok
- system(0)[system_15.img] Ok
- system(0)[system_16.img] Ok
- system(0)[system_17.img] Ok
- system(0)[system_18.img] Ok
- system(0)[system_19.img] Ok
- system(0)[system_20.img] Ok
- system(0)[system_21.img] Ok
- system(0)[system_22.img] Ok
- system(0)[system_23.img] Ok
- system(0)[system_24.img] Ok
- system(0)[system_25.img] Ok
- system(0)[system_26.img] Ok
- system(0)[system_27.img] Ok
- system(0)[system_28.img] Ok
- system(0)[system_29.img] Ok
- system(0)[system_30.img] Ok
- cache(0)[cache_1.img] Ok
- cache(0)[cache_2.img] Ok
- cache(0)[cache_3.img] Ok
- persist(0)[persist_1.img] Skipped
- oem(0)[oem_1.img] Ok
- oem(0)[oem_2.img] Ok
- mdtp(0)[mdtp.img] Ok
- cmnlib(0)[cmnlib.mbn] Ok
- cmnlibbak(0)[cmnlib.mbn] Ok
- cmnlib64(0)[cmnlib64.mbn] Ok
- cmnlib64bak(0)[cmnlib64.mbn] Ok
- keymaster(0)[keymaster.mbn] Ok
- keymasterbak(0)[keymaster.mbn] Ok
- survival(0)[survival.img] Ok
- apdp(0)[dp_AP_signed.mbn] Ok
- msadp(0)[dp_MSA_signed.mbn] Ok
- apps(0)[apps_1.img] Ok
- apps(0)[apps_2.img] Ok
- apps(0)[apps_3.img] Ok
- apps(0)[apps_4.img] Ok
- apps(0)[apps_5.img] Ok
- userdata(0)[userdata_1.img] Ok
- userdata(0)[userdata_2.img] Ok
- userdata(0)[userdata_3.img] Ok
- userdata(0)[userdata_4.img] Ok
- userdata(0)[userdata_5.img] Ok
- userdata(0)[userdata_6.img] Ok
- userdata(0)[userdata_7.img] Ok
- userdata(0)[userdata_8.img] Ok
- userdata(0)[userdata_9.img] Ok
- userdata(0)[userdata_10.img] Ok
- userdata(0)[userdata_11.img] Ok
- userdata(0)[userdata_12.img] Ok
- userdata(0)[userdata_13.img] Ok
- userdata(0)[userdata_14.img] Ok
- userdata(0)[userdata_15.img] Ok
- userdata(0)[userdata_16.img] Ok
- userdata(0)[userdata_17.img] Ok
- userdata(0)[userdata_18.img] Ok
- userdata(0)[userdata_19.img] Ok
- userdata(0)[userdata_20.img] Ok
- userdata(0)[userdata_21.img] Ok
- userdata(0)[userdata_22.img] Ok
- userdata(0)[userdata_23.img] Ok
- userdata(0)[userdata_24.img] Ok
- userdata(0)[userdata_25.img] Ok
- userdata(0)[userdata_26.img] Ok
- userdata(0)[userdata_27.img] Ok
- userdata(0)[userdata_28.img] Ok
- userdata(0)[userdata_29.img] Ok
- userdata(0)[userdata_30.img] Ok
- userdata(0)[userdata_31.img] Ok
- userdata(0)[userdata_32.img] Ok
- userdata(0)[userdata_33.img] Ok
- userdata(0)[userdata_34.img] Ok
- userdata(0)[userdata_35.img] Ok
- userdata(0)[userdata_36.img] Ok
- userdata(0)[userdata_37.img] Ok
- userdata(0)[userdata_38.img] Ok
- userdata(0)[userdata_39.img] Ok
- userdata(0)[userdata_40.img] Ok
- userdata(0)[userdata_41.img] Ok
- userdata(0)[userdata_42.img] Ok
- userdata(0)[userdata_43.img] Ok
- PrimaryGPT(0)[gpt_main0.bin] Ok

Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-33.] OK
0 [CRC32(2,6656)] OK
0 [CRC32(NUM_DISK_SECTORS-33.,6656)] OK
0 [0] OK
0 [CRC32(1,92)] OK
0 [0] OK
0 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 0
Set bootable storage drive 0 Ok

Rebooting Phone.... Ok

Elapsed Time : 00:04:21
BR
Dipendra Pathak

  Reply With Quote
Old 03-23-2021, 14:01   #1510 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,609
Xiaomi Mi 5 (Gimini) Mi Account Patched successfully done by Hydra Tool

Xiaomi Mi 5 (Gimini) Mi Account Patched successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : XIAOMI Model : Mi 5 (Gemini) Storage : UFS
Loader: mi_1_2.elf
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM5)
SymbolicName :\??\USB#VID_05C6&PID_9008#6&12597ac3&0&2#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/02/2017,2.1.2.7

Getting device info......
Serial No.: 0x46014530
MSM ID : 0x009470E1, MSM8996-Qualcomm Snapdragon 820
PBL Ver : 00000000
PK HASH : 355D47F912FEA0AF1F46C007C6DC22C4
3544FB9359E30AA7DB5F4734D18FBD74

Firehose Loader[mi_1_2.elf]
SaharaBoot... Ok
Sending ........................Ok
Connecting to Firehose...
Ping...... Ok
Configuration......
Ok
Chip Configuration :
MemoryName : UFS
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : MSM8996
Version : 1
DateTime : Aug 22 2017 - 20:56:14

*** STORAGE DEVICE INFO ***
Memory Type : UFS
Block Size in Bytes : 4096
Page Size : 4096
Manufacturer ID : 462
Serial Number : 1297306958
Firmware Version : 800
Product Name : KLUCG4J1CB-B0B1
Physical Partitions : 6
Total Logical Blocks:
Drive [0] 14448640[55.117 GB]
Drive [1] 1024[4 MB]
Drive [2] 1024[4 MB]
Drive [3] 32768[128 MB]
Drive [4] 1130496[4.313 GB]
Drive [5] 8192[32 MB]

Protocol : Universal
Running : Ok
Reading GPT[6]
Drive [0] 16 Items
Drive [1] 4 Items
Drive [2] 4 Items
Drive [3] 8 Items
Drive [4] 44 Items
Drive [5] 8 Items


Phone Information.....
Brand : Xiaomi
Vendor : Xiaomi
Model : MI 5
ID : OPR1.170623.032
SDK : 26
Release : 8.0.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : zh-CN
Description : gemini-user 8.0.0 OPR1.170623.032 V10.0.1.0.OAACNFH release-keys
Miui Ver : V10
Device : gemini
Board : QC_Reference_Phone
Display ID : OPR1.170623.032
Security Patch : 2018-07-01
Platform : msm8996
FRPPST : /dev/block/bootdevice/by-name/frp
Fingerprint : Xiaomi/gemini/gemini:8.0.0/OPR1.170623.032/V10.0.1.0.OAACNFH:user/release-keys

Processing Unlock - Universal - Auto....
Action Result : Ok

Elapsed Time : 00:00:27
BR
Dipendra Pathak

  Reply With Quote
Old 03-23-2021, 14:18   #1511 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,609
Xiaomi Redmi Note 7 (Lavender) Successfully Flashed by Hydra Tool

Xiaomi Redmi Note 7 (Lavender) Successfully Flashed by Hydra Tool

Screen Short:



Logs:

Quote:
Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM8)
SymbolicName :\??\USB#VID_05C6&PID_9008#6&375385d2&0&6#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :03/25/2016,2.1.2.2

Getting device info......
Serial No.: 0x07850A52
MSM ID : 0x0008C0E1, SDM660-Qualcomm Snapdragon 660
PBL Ver : 00000000
PK HASH : A7B8B82545A98ECA23D6E9105FB46456
8D1B5828264903441BDEF0CD57E3C370

Firehose Loader[mi_2_9.elf]
SaharaBoot... Ok
Sending ...............................Ok
Connecting to Firehose...
Ping......... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : MSM8996
Version : 1
DateTime : Aug 2 2018 - 22:27:53

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 4050046057
Firmware Version : 2
Product Name : DH6DAB
Physical Partitions : 4
Total Logical Blocks:
Drive [0] 122142720[58.242 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Drive [3] 32768[16 MB]

Protocol : Universal
Running : Ok

Phone Information......
Vendor : Xiaomi
ID : QKQ1.190910.002
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : zh-CN
Miui Ver : V12
Display ID : QKQ1.190910.002 V12.0.3.0.QFGCNXM
Security Patch : 2021-01-01


----------------------------
Flashing Selected Partitions....
- vbmeta(0)[vbmeta.img] Ok
- abl(0)[3] Ok
- ablbak(0)[3] Ok
- xbl(0)[4] Ok
- xblbak(0)[4] Ok
- misc(0)[misc.img] Ok
- cache(0)[cache.img] Ok
- PrimaryGPT(0)[gpt_main0.bin] Ok

Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-33.] OK
0 [CRC32(2,8704)] OK
0 [CRC32(NUM_DISK_SECTORS-33.,8704)] OK
0 [0] OK
0 [CRC32(1,92)] OK
0 [0] OK
0 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 0
Set bootable storage drive 0 Ok

Rebooting Phone.... Ok

Elapsed Time : 00:00:12
BR
Dipendra Pathak

  Reply With Quote
Old 03-23-2021, 16:13   #1512 (permalink)
No Life Poster
 
Gsm-Ahmed's Avatar
 
Join Date: Jan 2020
Location: Algeria
Posts: 790
Member: 2944109
Status: Offline
Thanks Meter: 621
Donate money to this user
Xiaomi Redmi 8a dual (olivewood) Removing FRP

Xiaomi Redmi 8a dual (olivewood) Removing FRP







Code:
PreOperation Configuration 
 Brand : XIAOMI Model : Redmi 8A Dual (olivewood) Storage : Auto
 Loader: Xiaomi_Redmi_8_Olive.mbn
 Port  : Auto
 Connection  : 

Searching for Qualcomm 9008 Device...Found
 FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM9)
 SymbolicName :\??\USB#VID_05C6&PID_9008#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :05/18/2016,1.0.26.0

Getting device info......
Serial No.: 0x76F6119E
MSM ID    : 0x000BF0E1, SDM439-Qualcomm Snapdragon 439
PBL Ver   : 00000000
PK HASH   : 57158EAF1814D78FD2B3105ECE4DB18A
            817A08AC664A5782A925F3FF8403D39A
 
Firehose Loader[Xiaomi_Redmi_8_Olive.mbn]
SaharaBoot... Ok
Sending .......................Ok
Connecting to Firehose...
Ping... Ok 
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[2pZlJyfebKmsgf81C38Ya1cm4bR]
Checking Internet connection....
 - Hydra Is Online
Connecting to Hydra Xiaomi Server...

Signature @256bytes Authentication.... Accepted......
Identifying Chip....
Ok
Chip Configuration :
 MemoryName : eMMC
 MaxPayloadSizeToTargetInBytes : 1048576
 MaxPayloadSizeToTargetInBytesSupported : 1048576
 MaxPayloadSizeFromTargetInBytes : 4096
 MaxXMLSizeInBytes : 4096
 TargetName : 8937
 Version : 1

*** STORAGE DEVICE INFO ***
Memory Type         : eMMC
Block Size in Bytes : 512
Page Size           : 512
Manufacturer ID     : 144
Serial Number       : 13288262
Firmware Version    : 875573296
Product Name        : hC8aP>
Physical Partitions : 3
Total Logical Blocks:
          Drive [0]  122142720[58,242 GB]
          Drive [1]  8192[4 MB]
          Drive [2]  8192[4 MB]

Protocol : Universal
Running : Ok
 
Phone Information......
  Vendor         : Xiaomi
  ID             : QKQ1.191014.001
  SDK            : 29
  Release        : 10
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Locale         : en-GB
  Miui Ver       : V12
  Mod_device     : olivewood_in_global
  Security Patch : 2021-01-01
  Emmc_size      : 16GB

Reading GPT[3]
          Drive [0] 64 Items
          Drive [1] 0 Items
          Drive [2] 0 Items

Removing FRPta...
Method : 
Auto 
Processing... 
 - Removing FRP
Executing ...
 - Removing FRP [Zero Wipe] OkOkOk

Rebooting Phone.... Ok
If not rebooted, Please Power on Manually

Elapsed Time : 00:00:21
  Reply With Quote
Old 03-24-2021, 04:03   #1513 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,609
Vivo Y11 (1906) FRP successfully Removed by Hydra Tool

Vivo Y11 (1906) FRP successfully Removed by Hydra Tool

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : VIVO Model : Y11 (1906) Storage : Auto
Loader: Vivo_Y11.elf
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM6)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&2d311cb3&0&5#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :03/19/2014,2.1.1.2

Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 3336136875
Firmware Version : 9
Product Name : GX6BAB
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 61071360[29.121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok
Reading GPT[3]
Drive [0] 60 Items
Drive [1] 0 Items
Drive [2] 0 Items


Phone Information......
Brand : vivo
Vendor : vivo
Model : vivo 1906
ID : PKQ1.190616.001
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : msm8937_64-user 9 PKQ1.190616.001 compiler02201901 release-keys
Device : PD1930F_EX
Display ID : PKQ1.190616.001 release-keys
Security Patch : 2021-02-01
Emmc_size : 16GB
Platform : =SDM439
Fingerprint : vivo/1906/1906:9/PKQ1.190616.001/compiler02201901:user/release-keys

Processing Forced Erase....
- Removing FRP [Auto] Ok
- Forced Erase Userdata
Action Result : Ok

Elapsed Time : 00:00:14
BR
Dipendra Pathak

  Reply With Quote
Old 03-24-2021, 04:34   #1514 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,609
Vivo Y91 (PD1818GF) erasing FRP partition successfully done by Hydra Tool

Vivo Y91 (PD1818GF) erasing FRP partition successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
Brand : VIVO Model : Y91 (PD1818GF) Connection : Flash Mode

=====================================
Connection
-Please wait...
-Found...
-PreLoader...[COM4]

TPortConnection.Create...(COM4)..Opening...Ok

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 2BC48166E083C2C5B9904DEE3B0D55C7
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000030000000 -768 MB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 150100475036424D42012A2ED889A573 - GP6BMB

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Brand : vivo
Vendor : vivo
Model : vivo 1815
ID : O11019
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_k62v1_64_bsp-user 8.1.0 O11019 1613786536 release-keys
Device : PD1818CF_EX
Display ID : O11019 release-keys
Security Patch : 2021-01-01
Platform : =MTK6765
Fingerprint : vivo/1815/1815:8.1.0/O11019/1613786536:user/release-keys
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition...[C002002A-STATUS_SEC_IMG_TYPE_MISMATCH]
Erasing FRP Partition... Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:07
BR
Dipendra Pathak

  Reply With Quote
Old 03-24-2021, 04:39   #1515 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,609
]Xiaomi Redmi Note 5 Pro (Whyred) Mi Account successfully Patched by Hydra Tool

Xiaomi Redmi Note 5 Pro (Whyred) Mi Account successfully Patched by Hydra Tool

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : XIAOMI Model : Redmi Note 5 Pro (Whyred) Storage : Auto
Loader: mi_2_9.elf
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM6)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&de3b74c&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/02/2017,2.1.2.7

Getting device info......
Serial No.: 0x780836DE
MSM ID : 0x000CC0E1,
PBL Ver : 00000000
PK HASH : A7B8B82545A98ECA23D6E9105FB46456
8D1B5828264903441BDEF0CD57E3C370

Firehose Loader[mi_2_9.elf]
SaharaBoot... Ok
Sending ...............................Ok
Connecting to Firehose...
Ping...... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : MSM8996
Version : 1
DateTime : Aug 2 2018 - 22:27:53

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 279800323
Firmware Version : 5
Product Name : DH6DMB
Physical Partitions : 4
Total Logical Blocks:
Drive [0] 122142720[58.242 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Drive [3] 8192[4 MB]

Protocol : Universal
Running : Ok
Reading GPT[4]
Drive [0] 64 Items
Drive [1] 0 Items
Drive [2] 0 Items
Drive [3]


Phone Information.....
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi Note 5
ID : PKQ1.180904.001
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : zh-CN
Description : whyred-user 9 PKQ1.180904.001 V11.0.2.0.PEICNXM release-keys
Miui Ver : V11
Device : whyred
Display ID : PKQ1.180904.001
Security Patch : 2019-10-05
Fingerprint : xiaomi/whyred/whyred:9/PKQ1.180904.001/V11.0.2.0.PEICNXM:user/release-keys

Processing Remove MiAccount[Patch Method]....
Backing up Partition for safety...Ok

Scanning Patching address...
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]Done!!
Total Items patched : 2
Successfully patched address..
Action Result : Ok

Elapsed Time : 00:00:28
BR
Dipendra Pathak

  Reply With Quote
Reply

Bookmarks

Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


 



All times are GMT +1. The time now is 09:04.



Powered by Searchlight © 2023 Axivo Inc.
vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2023 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2022 -
Page generated in 0.17821 seconds with 9 queries

SEO by vBSEO