GSM Shop GSM Shop
GSM-Forum  

Welcome to the GSM-Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features.
Only registered members may post questions, contact other members or search our database of over 8 million posts.

Registration is fast, simple and absolutely free so please - Click to REGISTER!

If you have any problems with the registration process or your account login, please contact contact us .

Go Back   GSM-Forum > Product Support Sections > Special Solutions / Services / WebShop > GSMFABRICA Products > HYDRA TOOL

Reply
 
LinkBack Thread Tools Display Modes
Old 03-24-2021, 04:44   #1516 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,591
Xiaomi Redmi Note 6 Pro (tulip) successfully flashed by Hydra Tool


Xiaomi Redmi Note 6 Pro (tulip) successfully flashed by Hydra Tool

Screen Short:



Logs:

Quote:
Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM8)
SymbolicName :\??\USB#VID_05C6&PID_9008#6&29a21a1a&0&3#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :03/25/2016,2.1.2.2

Getting device info......
Serial No.: 0xDE7462CD
MSM ID : 0x000CC0E1,
PBL Ver : 00000000
PK HASH : A7B8B82545A98ECA23D6E9105FB46456
8D1B5828264903441BDEF0CD57E3C370

Firehose Loader[mi_2_9.elf]
SaharaBoot... Ok
Sending ...............................Ok
Connecting to Firehose...
Ping...... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : MSM8996
Version : 1
DateTime : Aug 2 2018 - 22:27:53

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 1337511145
Firmware Version : 2
Product Name : DH6DAB
Physical Partitions : 4
Total Logical Blocks:
Drive [0] 122142720[58.242 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Drive [3] 32768[16 MB]

Protocol : Universal
Running : Ok

Phone Information.....
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi Note 6 Pro
ID : OPM1.171019.011
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : tulip-user 8.1.0 OPM1.171019.011 V9.6.10.0.OEKMIFD release-keys
Miui Ver : V9
Device : tulip
Mod_device : tulip_global
Display ID : OPM1.171019.011
Security Patch : 2018-08-01
Fingerprint : xiaomi/tulip/tulip:8.1.0/OPM1.171019.011/V9.6.10.0.OEKMIFD:user/release-keys

Reading GPT[4]
Drive [0] 64 Items
Drive [1] 0 Items
Drive [2] 0 Items
Drive [3]


Backup Security partitions...
Reading Security Items....
> modemst1
> modemst2
> fsg
C:\Hydra Tool\Backup\Security_Backup\Redmi Note 6 Pro__8.1.0_Security_032321200912.sec
Backup Security Success....

----------------------------
Flashing Selected Partitions....
- storsec(0)[storsec.mbn] Ok
- storsecbak(0)[storsec.mbn] Ok
- rpm(0)[rpm.mbn] Ok
- rpmbak(0)[rpm.mbn] Ok
- hyp(0)[hyp.mbn] Ok
- hypbak(0)[hyp.mbn] Ok
- pmic(0)[pmic.elf] Ok
- pmicbak(0)[pmic.elf] Ok
- cmnlib(0)[cmnlib.mbn] Ok
- cmnlibbak(0)[cmnlib.mbn] Ok
- cmnlib64(0)[cmnlib64.mbn] Ok
- cmnlib64bak(0)[cmnlib64.mbn] Ok
- abl(0)[abl.elf] Ok
- ablbak(0)[abl.elf] Ok
- devcfgbak(0)[devcfg.mbn] Ok
- devcfg(0)[devcfg.mbn] Ok
- tz(0)[tz.mbn] Ok
- tzbak(0)[tz.mbn] Ok
- mdtpsecapp(0)[mdtpsecapp.mbn] Ok
- mdtpsecappbak(0)[mdtpsecapp.mbn] Ok
- keymaster(0)[keymaster64.mbn] Ok
- keymasterbak(0)[keymaster64.mbn] Ok
- bluetooth(0)[BTFM.bin] Ok
- xbl(0)[xbl.elf] Ok
- xblbak(0)[xbl.elf] Ok
- misc(0)[misc.img] Ok
- dsp(0)[dspso.bin] Ok
- mdtp(0)[mdtp.img] Ok
- splash(0)[splash.img] Ok
- persist(0)[persist.img] Skipped
- modem(0)[NON-HLOS.bin] Ok
- boot(0)[boot.img] Ok
- recovery(0)[recovery.img] Ok
- cache(0)[cache.img] Ok
- system(0)[system.img] Ok
- vendor(0)[vendor.img] Ok
- cust(0)[cust.img] Ok
- userdata(0)[userdata.img] Ok
- PrimaryGPT(0)[gpt_main0.bin] Ok

Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-33.] OK
0 [CRC32(2,8192)] OK
0 [CRC32(NUM_DISK_SECTORS-33.,8192)] OK
0 [0] OK
0 [CRC32(1,92)] OK
0 [0] OK
0 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 0
Set bootable storage drive 0 Ok

Rebooting Phone.... Ok

Elapsed Time : 00:05:51
BR
Dipendra Pathak

  Reply With Quote
Old 03-24-2021, 04:53   #1517 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,591
Xiaomi Redmi Note 8 (ginkgo) successfully flashed by Hydra Tool

Xiaomi Redmi Note 8 (ginkgo) successfully flashed by Hydra Tool

Screen Short:



Logs:

Quote:
Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM1307)
SymbolicName :\??\USB#VID_05C6&PID_9008#6&188c7adf&0&3#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :07/08/2015,2.1.2.0

Getting device info......
Serial No.: 0x5EC1FF53
MSM ID : 0x0010A0E1, SM6125-Qualcomm Snapdragon 665
PBL Ver : 00000000
PK HASH : 1BEBE3863A6781DB4B01086063007334
DE9E5CA14971C7C4F4358EC9D79CDA46

Firehose Loader[Xiaomi_redminote8_loader.elf]
SaharaBoot... Ok
Sending ..............................Ok
Connecting to Firehose...
Ping..................... Ok
Configuration.........
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Jul 3 2019 - 22:23:56

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 2692472032
Firmware Version : 909127728
Product Name : hC8aP>
Physical Partitions : 4
Total Logical Blocks:
Drive [0] 122142720[58,242 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Drive [3] 32768[16 MB]

Protocol : Universal
Running : Ok

Phone Information......
Brand : Xiaomi
Vendor : Xiaomi
Model : Redmi 8
ID : PKQ1.190319.001
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : olive-user 9 PKQ1.190319.001 V11.0.3.0.PCNMIXM release-keys
Miui Ver : V11
Device : olive
Mod_device : olive_global
Display ID : ZQL2115-olive-build-20191219020635
Security Patch : 2019-12-01
Emmc_size : 16GB
Fingerprint : Xiaomi/olive/olive:9/PKQ1.190319.001/V11.0.3.0.PCNMIXM:user/release-keys

Reading GPT[4]
Drive [0] 88 Items
Drive [1] 0 Items
Drive [2] 0 Items
Drive [3]


Backup Security partitions...
Reading Security Items....
> modemst1
> modemst2
> fsg
C:\Hydra Tool\Backup\Security_Backup\Redmi 8__9_Security_032421014055.sec
Backup Security Success....

----------------------------
Flashing Selected Partitions....
- qupfw(0)[qupv3fw.elf] Ok
- qupfwbak(0)[qupv3fw.elf] Ok
- vbmeta(0)[vbmeta.img] Ok
- vbmetabak(0)[vbmeta.img] Ok
- xbl_config(0)[xbl_config.elf] Ok
- xbl_configbak(0)[xbl_config.elf] Ok
- devcfg(0)[devcfg.mbn] Ok
- devcfgbak(0)[devcfg.mbn] Ok
- storsec(0)[storsec.mbn] Ok
- rpm(0)[rpm.mbn] Ok
- rpmbak(0)[rpm.mbn] Ok
- hyp(0)[hyp.mbn] Ok
- hypbak(0)[hyp.mbn] Ok
- keymaster(0)[km4.mbn] Ok
- keymasterbak(0)[km4.mbn] Ok
- cmnlib(0)[cmnlib.mbn] Ok
- cmnlib64(0)[cmnlib64.mbn] Ok
- cmnlibbak(0)[cmnlib.mbn] Ok
- cmnlib64bak(0)[cmnlib64.mbn] Ok
- abl(0)[abl.elf] Ok
- ablbak(0)[abl.elf] Ok
- bluetooth(0)[BTFM.bin] Ok
- bluetoothbak(0)[BTFM.bin] Ok
- misc(0)[misc.img] Ok
- imagefv(0)[imagefv.elf] Ok
- imagefvbak(0)[imagefv.elf] Ok
- uefisecapp(0)[uefi_sec.mbn] Ok
- uefisecappbak(0)[uefi_sec.mbn] Ok
- xbl(0)[xbl.elf] Ok
- xblbak(0)[xbl.elf] Ok
- tz(0)[tz.mbn] Ok
- tzbak(0)[tz.mbn] Ok
- logfs(0)[logfs_ufs_8mb.bin] Ok
- metadata(0)[metadata.img] Ok
- dtbo(0)[dtbo.img] Ok
- dtbobak(0)[dtbo.img] Ok
- dsp(0)[dspso.bin] Ok
- dspbak(0)[dspso.bin] Ok
- persist(0)[persist.img] Skipped
- boot(0)[boot.img] Ok
- bootbak(0)[boot.img] Ok
- recovery(0)[recovery.img] Ok
- modem(0)[NON-HLOS.bin] Ok
- modembak(0)[NON-HLOS.bin] Ok
- cache(0)[cache.img] Ok
- cust(0)[cust.img] Ok
- vendor(0)[vendor.img] Ok
- system(0)[system.img] Ok
- userdata(0)[userdata.img] Ok
- PrimaryGPT(0)[gpt_main0.bin] Ok

Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-33.] OK
0 [CRC32(2,11264)] OK
0 [CRC32(NUM_DISK_SECTORS-33.,11264)] OK
0 [0] OK
0 [CRC32(1,92)] OK
0 [0] OK
0 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 0
Set bootable storage drive 0 Ok

Rebooting Phone.... Ok

Elapsed Time : 00:21:57
BR
Dipendra Pathak

  Reply With Quote
Old 03-24-2021, 05:00   #1518 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,591
Cherry Mobile Flare J3s removing FRP successfully done by Hydra Tool

Cherry Mobile Flare J3s removing FRP successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
************* PRESS BOOT KEY *************
VOL + OR VOL - , OR Combination Vol - +
Feature Phone : Call Button
Please hold boot key until second boot..
*******************************************
Port : [Auto] Scanning...COM7
TPortConnection.Create...(COM7)..Opening...Ok
Identifying... [SPRD3]
Sending Config Ok
Boot1 [hydra.fdl1] Ok
Spreadtrum Boot Block version 1.1
Boot2 [hydra.fdl2]
Verifying Loader 2.... Ok
Sending To phone.... Ok
Successfully booted..Ready to go...

TPortConnection.Destroy.....Closing...Ok..
Port : [Auto] Scanning...COM7
TPortConnection.Create...(COM7)..Opening...Ok
Reading IMEI...
Error : 84.
IMEI 1 : 35276710*******
IMEI 2 : 35276710*******

Reading System Info.
*** Flash Mode #Remove FRP ***
Resetting FRP...Ok
Rebooting Phone..Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:14
BR
Dipendra Pathak

  Reply With Quote
Old 03-24-2021, 05:07   #1519 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,591
Xiaomi Redmi 7A (Pine) Patched Mi Account Successfully Done by Hydra Tool

Xiaomi Redmi 7A (Pine) Patched Mi Account Successfully Done by Hydra Tool

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : XIAOMI Model : Redmi 7A (pine) Storage : Auto
Loader: Xiaomi_Redmi_8_Olive.mbn
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM17)
SymbolicName :\??\USB#VID_05C6&PID_9008#6&201c3a87&0&3#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/31/2015,2.1.2.0

Getting device info......
Serial No.: 0xFAE24846
MSM ID : 0x000BF0E1, SDM439-Qualcomm Snapdragon 439
PBL Ver : 00000000
PK HASH : 57158EAF1814D78FD2B3105ECE4DB18A
817A08AC664A5782A925F3FF8403D39A

Firehose Loader[Xiaomi_Redmi_8_Olive.mbn]
SaharaBoot... Ok
Sending .......................Ok
Connecting to Firehose...
Ping... Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[KbNgJBOF8zfD8iJQSnphvzgFN4a]
Checking Internet connection....
- Hydra Is Online
Connecting to Hydra Xiaomi Server...

Signature @256bytes Authentication.... Accepted......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 914139797
Firmware Version : 1
Product Name : QD63MB
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 61071360[29.121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok
Reading GPT[3]
Drive [0] 60 Items
Drive [1] 0 Items
Drive [2] 0 Items


Phone Information......
Brand : Xiaomi
Vendor : Xiaomi
Model : Redmi 7A
ID : PKQ1.190319.001
SDK : 28
Release : 9
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : zh-CN
Description : pine-user 9 PKQ1.190319.001 V11.0.6.0.PCMCNXM release-keys
Miui Ver : V11
Device : pine
Display ID : ZQL1533-pine-build-20200407010642
Security Patch : 2020-03-01
Emmc_size : 16GB
Fingerprint : Xiaomi/pine/pine:9/PKQ1.190319.001/V11.0.6.0.PCMCNXM:user/release-keys

Processing Remove MiAccount[Patch Method]....
Backing up Partition for safety...Ok

Scanning Patching address...
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]Done!!
Total Items patched : 5
Successfully patched address..
Action Result : Ok

Elapsed Time : 00:00:20
BR
Dipendra Pathak

  Reply With Quote
Old 03-24-2021, 05:41   #1520 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,591
Oppo A5s (CHP1909) Formatting selected partition successfully done by Hydra Tool

Oppo A5s (CHP1909) Formatting selected partition successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port_V1632 (COM7)
SymbolicName :\??\USB#VID_0E8D&PID_0003#6&5bab935&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0


Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : DCD2EAE0E994D4CD2D415F21DEBC7863
ERAM Size : 0x000000000003A000 -232 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000747C00000 -29,121 GB
eMMC CID : 150100474436424D42014F259BD2B6ED - GD6BMB

Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info
Vendor : OPPO
ID : O11019
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6765_18511-user 8.1.0 O11019 1608036329 release-keys
Security Patch : 2020-12-05
StorageType : mtp
Userdata State : Encrypted

Format Selected Partition
Formatting [nvdata] Ok!
Formatting [nvram] Ok!
=====================================

Elapsed Time : 00.00.06
BR
Dipendra Pathak

  Reply With Quote
Old 03-25-2021, 04:22   #1521 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,591
Xiaomi Redmi 6A Cactus Factory Format (formatting user data) successfully done-Hydra

Xiaomi Redmi 6A Cactus Factory Format (formatting user data) successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port_V1632 (COM5)
SymbolicName :\??\USB#VID_0E8D&PID_0003#5&201b4142&0&1#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0


Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : C76BD9EAFC047F4A997AF8EC5F99CB88
ERAM Size : 0x000000000003A000 -232 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003A3E00000 -14.561 GB
eMMC CID : 150100514536334D42039874D398B5E5 - QE63MB

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info

-------------------------------------
Operation : Auto
Processing...
Safeformat Universal... Ok

Elapsed Time : 00:00:02
BR
Dipendra Pathak

  Reply With Quote
Old 03-25-2021, 04:32   #1522 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,591
Xiaomi Redmi 4A Rolex successfully flashed by Hydra Tool

Xiaomi Redmi 4A Rolex successfully flashed by Hydra Tool

Screen Short:



Logs:

Quote:
Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM17)
SymbolicName :\??\USB#VID_05C6&PID_9008#6&339b49c&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :03/25/2016,2.1.2.2

Getting device info......
Serial No.: 0x9652B03A
MSM ID : 0x000560E1, MSM8917-Qualcomm Snapdragon 425
PBL Ver : 00000000
PK HASH : 57158EAF1814D78FD2B3105ECE4DB18A
817A08AC664A5782A925F3FF8403D39A

Firehose Loader[mi_1_8.mbn]
SaharaBoot... Ok
Sending ...................Ok
Connecting to Firehose...
Ping... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8917
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 2083641452
Firmware Version : 7
Product Name : QX13MB
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 61071360[29,121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok

Phone Information.....
Brand : Xiaomi
Vendor : Xiaomi
Model : Redmi 4A
ID : N2G47H
SDK : 25
Release : 7.1.2
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : rolex-user 7.1.2 N2G47H V10.2.3.0.NCCMIXM release-keys
Miui Ver : V10
Device : rolex
Mod_device : rolex_global
Board : QC_Reference_Phone
Display ID : N2G47H
Security Patch : 2018-07-01
Emmc_size : 16GB
Platform : msm8937
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : Xiaomi/rolex/rolex:7.1.2/N2G47H/V10.2.3.0.NCCMIXM:user/release-keys

Reading GPT[3]
Drive [0] 52 Items
Drive [1] 0 Items
Drive [2] 0 Items


Backup Security partitions...
Reading Security Items....
> modemst1
> modemst2
> fsg
C:\Hydra Tool\Backup\Security_Backup\Redmi 4A_QC_Reference_Phone_7.1.2_Security_032421194110. sec
Backup Security Success....

----------------------------
Flashing Selected Partitions....
- modem(0)[NON-HLOS.bin] Ok
- sbl1(0)[sbl1.mbn] Ok
- sbl1bak(0)[sbl1.mbn] Ok
- rpm(0)[rpm.mbn] Ok
- rpmbak(0)[rpm.mbn] Ok
- tz(0)[tz.mbn] Ok
- tzbak(0)[tz.mbn] Ok
- devcfg(0)[devcfg.mbn] Ok
- devcfgbak(0)[devcfg.mbn] Ok
- dsp(0)[adspso.bin] Ok
- splash(0)[splash.img] Ok
- aboot(0)[emmc_appsboot.mbn] Ok
- abootbak(0)[emmc_appsboot.mbn] Ok
- boot(0)[boot.img] Ok
- recovery(0)[recovery.img] Ok
- system(0)[system.img] Ok
- cache(0)[cache.img] Ok
- persist(0)[persist.img] Skipped
- misc(0)[misc.img] Ok
- mdtp(0)[mdtp.img] Ok
- lksecapp(0)[lksecapp.mbn] Ok
- lksecappbak(0)[lksecapp.mbn] Ok
- cmnlib(0)[cmnlib.mbn] Ok
- cmnlibbak(0)[cmnlib.mbn] Ok
- cmnlib64(0)[cmnlib64.mbn] Ok
- cmnlib64bak(0)[cmnlib64.mbn] Ok
- keymaster(0)[keymaster.mbn] Ok
- keymasterbak(0)[keymaster.mbn] Ok
- cust(0)[cust.img] Ok
- userdata(0)[userdata.img] Ok
- PrimaryGPT(0)[gpt_main0.bin] Ok

Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-33.] OK
0 [CRC32(2,6656)] OK
0 [CRC32(NUM_DISK_SECTORS-33.,6656)] OK
0 [0] OK
0 [CRC32(1,92)] OK
0 [0] OK
0 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 0
Set bootable storage drive 0 Ok

Rebooting Phone.... Ok

Elapsed Time : 00:10:25
BR
Dipendra Pathak

  Reply With Quote
Old 03-25-2021, 04:40   #1523 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,591
Huawei DRA-LX9 (Y5P 2020) removed Account successfully done by Hydra Tool

Huawei DRA-LX9 (Y5P 2020) removed Account successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port (COM15)
SymbolicName :\??\USB#VID_0E8D&PID_0003#6&7a1c2a0&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2016,3.0.1504.0


Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 1C7C19F62E9A9E537C1224EE6B790F4B
ERAM Size : 0x000000000003A000 -232 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29,121 GB
eMMC CID : 90014A68423861503E0100F0F29347ED - hB8aP>

Reading GPT-EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Remove Account
Processing...
Backing up Partition for safety...
-oeminfo_032421194233.bin[0x04900000]32 MB ->oeminfo_032421194233.bin...Ok Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:11
BR
Dipendra Pathak

  Reply With Quote
Old 03-25-2021, 04:45   #1524 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,591
Vovi V11 Pro (V1804) Zero Wipe Successfully removed by Hydra Tool

Vovi V11 Pro (V1804) Zero Wipe Successfully removed by Hydra Tool

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : VIVO Model : V11 Pro (V1804) Storage : Auto
Loader: Vivo_V11Pro_SDM660_RW.elf
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM71)
SymbolicName :\??\USB#VID_05C6&PID_9008#7&287c2830&0&2#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/02/2017,2.1.2.7

Getting device info......
Serial No.: 0x57DC6B34
MSM ID : 0x0008C0E1, SDM660-Qualcomm Snapdragon 660
PBL Ver : 00000000
PK HASH : F188B3BC5198FB412FC8AB7EF8B60D24
5EBB705A0FC0AF387F1DB21533CC4570

Firehose Loader[Vivo_V11Pro_SDM660_RW.elf]
SaharaBoot... Ok
Sending ...............................Ok
Connecting to Firehose...
Ping......... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : MSM8996
Version : 1
DateTime : Jul 19 2019 - 12:28:14

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 124939305
Firmware Version : 875573296
Product Name : hC8aP>
Physical Partitions : 4
Total Logical Blocks:
Drive [0] 122142720[58.242 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Drive [3] 32768[16 MB]

Protocol : Universal
Running : Ok
Reading GPT[4]
Drive [0] 52 Items
Drive [1] 0 Items
Drive [2] 0 Items
Drive [3]


Phone Information......
ID : QP1A.190711.020
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Security Patch : 2021-02-01
Platform : =SDM660
Fingerprint : vivo/1804/1804:10/QP1A.190711.020/compiler02221538:user/release-keys

Processing Zero Wipe....
- Removing FRP [Zero Wipe] Ok
- Formatting Userdata [Zero Wipe] Ok
Action Result : Ok

Elapsed Time : 00:00:07
BR
Dipendra Pathak

  Reply With Quote
Old 03-25-2021, 04:50   #1525 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,591
Huawei ATU-L22 (Y6 2018) Sending Boot Loader Code successfully sent by Hydra Tool

Huawei ATU-L22 (Y6 2018) Sending Boot Loader Code successfully sent by Hydra Tool

Screen Short:



Logs:

Quote:
Searching Device By Fastboot
Device Found...

Reading Information...version: 0.5
Product : QC_REFERENCE_PHONE
version : 0.5
Secure : yes
Device Info:
Device tampered: true
Device unlocked: false
Device critical unlocked: false
Charger screen enabled: false
Display panel:
Bootloader...
Send Bootloader Code
Processing... Ok

Elapsed Time : 00:00:05
BR
Dipendra Pathak

  Reply With Quote
Old 03-25-2021, 05:14   #1526 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,591
OWN Smart 9 Pro backing up partition successfully done by Hydra Tool

OWN Smart 9 Pro backing up partition successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port (COM12)
SymbolicName :\??\USB#VID_0E8D&PID_0003#6&8a7554c&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2016,3.2


Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : E6215AFC7340D8F31903A141C23A3027
ERAM Size : 0x0000000000039000 -228 KB
IRAM Size : 0x0000000180000000 -6 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000001D1EC00000 -116,48 GB
eMMC CID : 150100335636434D4202BE8FD4196599 - 3V6CMB

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Brand : OWN
Vendor : OWN
Model : Smart 9 Pro
ID : O11019
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : es-US
Description : full_k71v1_64_bsp-user 8.1.0 O11019 1528707816 release-keys
Device : Smart_9_Pro
Board : CSW1703B
Display ID : Smart_9_Pro
Security Patch : 2018-04-05
Fingerprint : OWN/Smart_9_Pro/Smart_9_Pro:8.1.0/O11019/1528707816:user/release-keys
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Backup Stock ROM
Processing...

Reading Important Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_k71v1_64_bsp.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Important\OWN_Smart 9 Pro_0788--8.1.0(Smart_9_Pro)240321221518\MT6771_Android_scat ter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x03588000]1024 KB ->frp.bin...Ok
-nvdata[0x05688000]64 MB ->nvdata.bin...Ok
-protect1[0x0B688000]8 MB ->protect1.bin...Ok
-protect2[0x0BE88000]9,469 MB ->protect2.bin...Ok
-seccfg[0x0C800000]8 MB ->seccfg.bin...Ok
-proinfo[0x10200000]3 MB ->proinfo.bin...Ok
-nvram[0x1C580000]64 MB ->nvram.bin...Ok
Reading/Backup Flash Done!!!
C:\Hydra Tool\\Backup\Important\OWN_Smart 9 Pro_0788--8.1.0(Smart_9_Pro)240321221518 Ok

Elapsed Time : 00:01:00
BR
Dipendra Pathak

  Reply With Quote
Old 03-25-2021, 05:24   #1527 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,591
Oppo A5s successfully formatted by Hydra Tool

Oppo A5s successfully formatted by Hydra Tool

Screen Short:



Logs:

Quote:
Brand : AUTO Model : AUTO Connection : Flash Mode

=====================================
How To Boot : Power off phone
* BROM Mode : Press VOL + or Press VOL -+
* Preloader Mode : Just Insert cable

Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port_V1632 (COM36)
SymbolicName :\??\USB#VID_0E8D&PID_0003#6&df2ee03&0&6#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0766MT6765[6765]
BROM HW_SW_VER : 8A00 CA00 0000 0000
getMTKPayloadExploit : 0766
#Executing Exploit..
#SUCCESS..
Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0766MT6765[6765]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
SECURE VERSION : 00
BL VERSION : FE
BR Secured : E0

Preparing Download Agent..
DA : 6765.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2020-11-03.22:07_536568
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_cactus.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 84F3D8E337026ABFC3B34B7583AC6689
ERAM Size : 0x000000000003A000 -232 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 90014A68423861503E03629AB0819629 - hB8aP>

DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info
Vendor : OPPO
ID : O11019
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6765_18511-user 8.1.0 O11019 1608036329 release-keys
Security Patch : 2020-12-05
StorageType : mtp
Userdata State : Not Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_oppo6765_18511.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0766__032521101229\MT6765_Androi d_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x09E88000]1024 KB ->frp.bin...Ok
-nvdata[0x0BF88000]64 MB ->nvdata.bin...Ok
-persist[0x13800000]48 MB ->persist.bin...Ok
-nvram[0x20000000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0766__032521101229
MTK Phone Loader is NOW RUNNING.

Rebooting Device [Reboot To Normal]
Reboot Done!!
=====================================

Elapsed Time : 00:00:56
BR
Dipendra Pathak

  Reply With Quote
The Following User Says Thank You to Dipendra Pathak For This Useful Post:
Old 03-25-2021, 17:38   #1528 (permalink)
No Life Poster
 
Gsm-Ahmed's Avatar
 
Join Date: Jan 2020
Location: Algeria
Posts: 770
Member: 2944109
Status: Online
Thanks Meter: 593
Donate money to this user
Benzo G-PADLITE K708 Remove Pattren Without Data Loss

Benzo G-PADLITE K708 Remove Pattren Without Data Loss





Code:
Brand : AUTO Model : AUTO Connection : Flash Mode

=====================================
Connection
 -Please wait...
 -Found...[COM5]

TPortConnection.Create...(COM5)..Opening...Ok


Reading System Info
  Brand          : K708
  Vendor         : Benzo
  Model          : G-PADLITE
  ID             : MRA58K
  SDK            : 23
  Release        : 6.0
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Locale         : fr-FR
  Description    : full_mt8321_tb_m-user 6.0 MRA58K 1557899887 dev-keys
  Device         : K708
  Board          : K708
  Display ID     : G-PADLITE-16G-2019-05-15
  Security Patch : 2017-11-05
  Platform       : mt6580
  FRPPST         : /dev/block/platform/mtk-msdc.0/11120000.msdc0/by-name/frp
  Fingerprint    : alps/full_mt8321_tb_m/mt8321_tb_m:6.0/MRA58K/1557899887:user/dev-keys
  StorageType    : mtp,mass_storage
  Userdata State : Not Encrypted

-------------------------------------
Operation : Remove Lock Without Data Loss
Processing...
Searching patching address.. [Ok].. [Ok].. [Ok].. [Ok].. [Ok] Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:03
  Reply With Quote
The Following User Says Thank You to Gsm-Ahmed For This Useful Post:
Old 03-25-2021, 17:39   #1529 (permalink)
No Life Poster
 
Gsm-Ahmed's Avatar
 
Join Date: Jan 2020
Location: Algeria
Posts: 770
Member: 2944109
Status: Online
Thanks Meter: 593
Donate money to this user
Xiaomi Redmi Note 7 Pro (Violet) Flash Done

Xiaomi Redmi Note 7 Pro (Violet) Flash Done
by Hyra Tool







Code:
Searching for Qualcomm 9008 Device...Found
 FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM9)
 SymbolicName :\??\USB#VID_05C6&PID_9008#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :05/18/2016,1.0.26.0

Getting device info......
Serial No.: 0xDB43600C
MSM ID : 0x000950E1, SM6150-Qualcomm Snapdragon 675
PBL Ver : 00000000
PK HASH : 1BEBE3863A6781DB4B01086063007334
DE9E5CA14971C7C4F4358EC9D79CDA46

Firehose Loader[Xiaomi_Redmi Note 7 Pro_Sdm6150_ddr.elf]
SaharaBoot... Ok
Sending ...................................Ok
Connecting to Firehose...
Ping..................... Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[obi
Checking Internet connection....
- Hydra Is Online
Connecting to Hydra Xiaomi Server...

Signature @256bytes Authentication.... Accepted........
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Jul 19 2019 - 01:44:32

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 1588004687
Firmware Version : 2
Product Name : 
Physical Partitions : 4
Total Logical Blocks:
Drive [0] 244277248[116.48 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Drive [3] 32768[16 MB]

Protocol : Universal
Running : Ok

Phone Information......
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi Note 7 Pro
ID : PKQ1.181203.001
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : zh-CN
Description : violet-user 9 PKQ1.181203.001 9.8.9 release-keys
Miui Ver : V10
Device : violet
Display ID : PKQ1.181203.001
Security Patch : 2019-08-01
Fingerprint : xiaomi/violet/violet:9/PKQ1.181203.001/9.8.9:user/release-keys
keys

Reading GPT[4]
Drive [0] 88 Items
Drive [1] 0 Items
Drive [2] 0 Items
Drive [3]


Backup Security partitions...
Reading Security Items....
> modemst1
> modemst2
> fsg
C:\Hydra Tool\Backup\Security_Backup\Redmi Note 7 Pro__9_Security_022042220640.sec
Backup Security Success....

----------------------------
Flashing Selected Partitions....
- multiimgoem(0)[multi_image.mbn] Ok
- vbmeta(0)[vbmeta.img] Ok
- qupfw(0)[qupv3fw.elf] Ok
- xbl_config(0)[xbl_config.elf] Ok
- storsec(0)[storsec.mbn] Ok
- storsecbak(0)[storsec.mbn] Ok
- aop(0)[aop.mbn] Ok
- aopbak(0)[aop.mbn] Ok
- hyp(0)[hyp.mbn] Ok
- hypbak(0)[hyp.mbn] Ok
- cmnlib(0)[cmnlib.mbn] Ok
- cmnlibbak(0)[cmnlib.mbn] Ok
- cmnlib64(0)[cmnlib64.mbn] Ok
- cmnlib64bak(0)[cmnlib64.mbn] Ok
- keymaster(0)[km4.mbn] Ok
- keymasterbak(0)[km4.mbn] Ok
- bluetooth(0)[BTFM.bin] Ok
- devcfg(0)[devcfg.mbn] Ok
- devcfgbak(0)[devcfg.mbn] Ok
- abl(0)[abl.elf] Ok
- ablbak(0)[abl.elf] Ok
- imagefv(0)[imagefv.elf] Ok
- uefisecapp(0)[uefi_sec.mbn] Ok
- uefisecappbak(0)[uefi_sec.mbn] Ok
- misc(0)[misc.img] Ok
- xbl(0)[xbl.elf] Ok
- xblbak(0)[xbl.elf] Ok
- tz(0)[tz.mbn] Ok
- tzbak(0)[tz.mbn] Ok
- logfs(0)[logfs_ufs_8mb.bin] Ok
- dtbo(0)[dtbo.img] Ok
- dsp(0)[dspso.bin] Ok
- splash(0)[splash.img] Ok
- persist(0)[persist.img] Skipped
- boot(0)[boot.img] Ok
- recovery(0)[recovery.img] Ok
- modem(0)[NON-HLOS.bin] Ok
- cache(0)[cache.img] Ok
- cust(0)[cust.img] Ok
- system(0)[system.img] Ok
- vendor(0)[vendor.img] Ok
- userdata(0)[userdata.img] Ok
- PrimaryGPT(0)[gpt_main0.bin] Ok

Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-33.] OK
0 [CRC32(2,11264)] OK
0 [CRC32(NUM_DISK_SECTORS-33.,11264)] OK
0 [0] OK
0 [CRC32(1,92)] OK
0 [0] OK
0 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 0
Set bootable storage drive 0 Ok

Rebooting Phone.... Ok

Elapsed Time : 00:04:34
  Reply With Quote
The Following User Says Thank You to Gsm-Ahmed For This Useful Post:
Old 03-26-2021, 05:29   #1530 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,591
Huawei mediatek MT6785 IMEI Repaired successfully done by Hydra Tool

Huawei mediatek MT6785 IMEI Repaired successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
=====================================
***IMEI REPAIR FUNCTION****
Huawei Flashmode
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port (COM8)
SymbolicName :\??\USB#VID_0E8D&PID_0003#5&38c098cc&0&4#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0


Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 691ED800840173362955D92B23E2B5C2
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000001D1EC00000 -116.48 GB
eMMC CID : 1501004455544234320279B5BC33870F - DUTB42

Reading GPT-EMMC [0x00008000] 130 Items
IMEI INFO..
IMEI1 : **************760
IMEI2 : FFFFFFFFFFFFFFF
Repairing HUWEI IMEI....

OLD IMEI..
IMEI1 : **************760
IMEI2 : FFFFFFFFFFFFFFF

NEW IMEI..
IMEI1 : ************8*4
IMEI2 : ************8*4
Done!!!!

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:11
BR
Dipendra Pathak

  Reply With Quote
Reply

Bookmarks

Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


 



All times are GMT +1. The time now is 08:56.



Powered by Searchlight © 2022 Axivo Inc.
vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2022 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2022 -
Page generated in 0.45712 seconds with 8 queries

SEO by vBSEO