GSM Shop GSM Shop
GSM-Forum  

Welcome to the GSM-Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features.
Only registered members may post questions, contact other members or search our database of over 8 million posts.

Registration is fast, simple and absolutely free so please - Click to REGISTER!

If you have any problems with the registration process or your account login, please contact contact us .

Go Back   GSM-Forum > Product Support Sections > Special Solutions / Services / WebShop > GSMFABRICA Products > HYDRA TOOL

Reply
 
LinkBack Thread Tools Display Modes
Old 03-26-2021, 05:35   #1531 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,620
Oppo A71 (2018) CPH 1801 Removing lock with auto mode by Hydra Tool


Oppo A71 (2018) CPH 1801 Removing lock with auto mode by Hydra Tool

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : OPPO Model : A71 (2018) CPH1801 Storage : Auto
Loader: a71_firehose.bin
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :HS-USB Diagnostics 9008 (COM17)
SymbolicName :\??\USB#VID_05C6&PID_9008#6&1270daa6&0&1#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/20/2017,2.1.2.2

Getting device info......
Serial No.: 0xB883A3A2
MSM ID : 0x0009A0E1, SDM450-Qualcomm Snapdragon 450
PBL Ver : 00000000
PK HASH : 05F06BA44EEB2ABDF14BB644AABC2E69
3DDF7B8711CC7CF07D4CD0EB2E1A8728

Firehose Loader[a71_firehose.bin]
SaharaBoot... Ok
Sending ..................Ok
Connecting to Firehose...
Ping... Ok
Configuration.
<?xml version="1.0" encoding="UTF-8" ?><data><log value="logbuf@0x0806CD20 fh@0x08069B88" /></data>.
<?xml version="1.0" encoding="UTF-8" ?><data><response value="ACK" MinVersionSupported="1" MemoryName="eMMC" MaxPayloadSizeFromTargetInBytes="4096" MaxPayloadSizeToTargetInBytes="1048576" MaxPayloadSizeToTargetInBytesSupported="1048576" MaxXMLSizeInBytes="4096" Version="1" TargetName="8953" /></data>.
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8953
Version : 1

Protocol : Universal
Running : Ok
Action Result : Ok

Elapsed Time : 00:00:07
BR
Dipendra Pathak

  Reply With Quote
Old 03-26-2021, 05:40   #1532 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,620
Xioami Redmi Note 7 successfully flashed by Hydra Tool

Xioami Redmi Note 7 successfully flashed by Hydra Tool

Screen Short:



Logs:

Quote:
Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM5)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&373328e8&0&1#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :10/21/2014,2.0.9.6

Getting device info......
Serial No.: 0x7B921A2C
MSM ID : 0x0008C0E1, SDM660-Qualcomm Snapdragon 660
PBL Ver : 00000000
PK HASH : A7B8B82545A98ECA23D6E9105FB46456
8D1B5828264903441BDEF0CD57E3C370

Firehose Loader[mi_2_9.elf]
SaharaBoot... Ok
Sending ...............................Ok
Connecting to Firehose...
Ping......... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : MSM8996
Version : 1
DateTime : Aug 2 2018 - 22:27:53

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 19
Serial Number : 231089110
Firmware Version : 4
Product Name : S0J9K9
Physical Partitions : 4
Total Logical Blocks:
Drive [0] 244285440[116,484 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Drive [3] 32768[16 MB]

Protocol : Universal
Running : Ok

Phone Information......
Vendor : Xiaomi
ID : QKQ1.190910.002
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Miui Ver : V12
Mod_device : lavender_global
Display ID : QKQ1.190910.002 V12.0.1.0.QFGMIXM
Security Patch : 2020-10-01

Reading GPT[4]
Drive [0] 68 Items
Drive [1] 0 Items
Drive [2] 0 Items
Drive [3]


Backup Security partitions...
Reading Security Items....
> modemst1
> modemst2
> fsg
C:\Hydra Tool\Backup\Security_Backup\__10_Security_03252119 4301.sec
Backup Security Success....

----------------------------
Flashing Selected Partitions....
- vbmeta(0)[vbmeta.img] Ok
- vbmetabak(0)[vbmeta.img] Ok
- storsec(0)[storsec.mbn] Ok
- storsecbak(0)[storsec.mbn] Ok
- rpm(0)[rpm.mbn] Ok
- rpmbak(0)[rpm.mbn] Ok
- hyp(0)[hyp.mbn] Ok
- hypbak(0)[hyp.mbn] Ok
- pmic(0)[pmic.elf] Ok
- pmicbak(0)[pmic.elf] Ok
- cmnlib(0)[cmnlib.mbn] Ok
- cmnlibbak(0)[cmnlib.mbn] Ok
- cmnlib64(0)[cmnlib64.mbn] Ok
- cmnlib64bak(0)[cmnlib64.mbn] Ok
- abl(0)[abl.elf] Ok
- ablbak(0)[abl.elf] Ok
- devcfgbak(0)[devcfg.mbn] Ok
- devcfg(0)[devcfg.mbn] Ok
- tz(0)[tz.mbn] Ok
- tzbak(0)[tz.mbn] Ok
- mdtpsecapp(0)[mdtpsecapp.mbn] Ok
- mdtpsecappbak(0)[mdtpsecapp.mbn] Ok
- keymaster(0)[km4.mbn] Ok
- keymasterbak(0)[km4.mbn] Ok
- bluetooth(0)[BTFM.bin] Ok
- xbl(0)[xbl.elf] Ok
- xblbak(0)[xbl.elf] Ok
- misc(0)[misc.img] Ok
- dsp(0)[dspso.bin] Ok
- mdtp(0)[mdtp.img] Ok
- dtbo(0)[dtbo.img] Ok
- dtbobak(0)[dtbo.img] Ok
- splash(0)[splash.img] Ok
- persist(0)[persist.img] Skipped
- modem(0)[NON-HLOS.bin] Ok
- boot(0)[boot.img] Ok
- recovery(0)[recovery.img] Ok
- cache(0)[cache.img] Ok
- system(0)[system.img] Ok
- vendor(0)[vendor.img] Ok
- cust(0)[cust.img] Ok
- userdata(0)[userdata.img] Ok
- PrimaryGPT(0)[gpt_main0.bin] Ok

Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-33.] OK
0 [CRC32(2,8704)] OK
0 [CRC32(NUM_DISK_SECTORS-33.,8704)] OK
0 [0] OK
0 [CRC32(1,92)] OK
0 [0] OK
0 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 0
Set bootable storage drive 0 Ok

Rebooting Phone.... Ok

Elapsed Time : 00:03:42
BR
Dipendra Pathak

  Reply With Quote
Old 03-26-2021, 13:38   #1533 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,620
Xioami Redmi 6A Cactus Mi Account Successfully Removed by Hydra Tool

Xioami Redmi 6A Cactus Mi Account Successfully Removed by Hydra Tool

Screen Short:



Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port_V1632 (COM16)
SymbolicName :\??\USB#VID_0E8D&PID_0003#5&2e1b880b&0&2#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0


Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : B748A2F17962470E18E6561D156D53A1
ERAM Size : 0x000000000003A000 -232 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003A3E00000 -14.561 GB
eMMC CID : 150100514536334D4203EA3B9763B539 - QE63MB

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi 6A
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-GB
Description : cactus-user 9 PPR1.180610.011 V11.0.8.0.PCBMIXM release-keys
Miui Ver : V11
Device : cactus
Mod_device : cactus_global
Display ID : SW_S98506AE1_V009_M13_XM_C3C_USR
Security Patch : 2020-05-01
Fingerprint : xiaomi/cactus/cactus:9/PPR1.180610.011/V11.0.8.0.PCBMIXM:user/release-keys
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Remove MiAccount[Erase Method]
Processing...
-persist.bin[0x0F000000]64 MB ->persist.bin...Ok
-frp.bin[0x05588000]1024 KB ->frp.bin...Ok Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:22
BR
Dipendra Pathak

  Reply With Quote
Old 03-26-2021, 13:44   #1534 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,620
Xiaomi Redmi 6 Mi Account Successfully Removed by Hydra Tool

Xiaomi Redmi 6 Mi Account Successfully Removed by Hydra Tool

Screen Short:



Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port_V1632 (COM7)
SymbolicName :\??\USB#VID_0E8D&PID_0003#6&1485bec3&0&3#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0


Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : BA04CE96E34AADFF10B3C88966502961
ERAM Size : 0x000000000003A000 -232 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 150100474436424D4201A5F197A1558B - GD6BMB

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi 6
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : zh-CN
Description : cereus-user 9 PPR1.180610.011 V11.0.4.0.PCGCNXM release-keys
Miui Ver : V11
Device : cereus
Display ID : SW_S98507AE1_V009_M13_XM_C3D_USR
Security Patch : 2020-03-01
Fingerprint : xiaomi/cereus/cereus:9/PPR1.180610.011/V11.0.4.0.PCGCNXM:user/release-keys
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Remove MiAccount[Erase Method]
Processing...
-persist.bin[0x0F000000]64 MB ->persist.bin...Ok
-frp.bin[0x05588000]1024 KB ->frp.bin...Ok Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:38
BR
Dipendra Pathak

  Reply With Quote
Old 03-27-2021, 05:56   #1535 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,620
Oppo A83 CPH1729 Formatted NVData and NVram successfully done by Hydra Tool

Oppo A83 CPH1729 Formatted NVData and NVram successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port_V1632 (COM3)
SymbolicName :\??\USB#VID_0E8D&PID_0003#5&212ac8fc&0&9#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0


Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 8FAB99D16C7E0E9727F1C651599D0621
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003A3E00000 -14.561 GB
eMMC CID : 150100514536334D4203ADDD97E035D5 - QE63MB

Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info
Brand : OPPO
Vendor : OPPO
Model : OPPO A83js
ID : N6F26Q
SDK : 25
Release : 7.1.1
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6763_17101-user 7.1.1 N6F26Q 1599884215 release-keys
Device : M6763E
Board : full_oppo6763_17101
Display ID : A83jsEX_11_A.35_200912
Security Patch : 2019-10-05
Platform : mt6763
FRPPST : /dev/block/platform/bootdevice/by-name/frp
StorageType : mtp
Userdata State : Encrypted

Format Selected Partition
Formatting [nvdata] Ok!
Formatting [nvram] Ok!
=====================================

Elapsed Time : 00:00:06
BR
Dipendra Pathak

  Reply With Quote
Old 03-27-2021, 07:17   #1536 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,620
Oppo A37 Zero Wipe Successfully Done by Hydra Tool

Oppo A37 Zero Wipe Successfully Done by Hydra Tool

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : OPPO Model : A37 Storage : Auto
Loader: 8916.mbn
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM3)
SymbolicName :\??\USB#VID_05C6&PID_9008#8&2e9b2f8&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :03/25/2016,2.1.2.2

Getting device info.....
Serial No.: 0x2359681C
MSM ID : 0x007050E1, MSM8916-Qualcomm Snapdragon 410
PBL Ver : 00000000
PK HASH : CC3153A80293939B90D02D3BF8B23E02
92E452FEF662C74998421ADAD42A380F

Firehose Loader[8916.mbn]
SaharaBoot... Ok
Sending .....Ok
Connecting to Firehose...
Ping. Ok
Configuration........
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8916
Version : 1


Protocol : Universal
Running : Ok

Phone Information.....
Brand : OPPO
Vendor : OPPO
Model : A37f
ID : LMY47V
SDK : 22
Release : 5.1.1
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Description : msm8916_64-user 5.1.1 LMY47V eng.root.20170506.160647 release-keys
Board : msm8916
Display ID : A37fEX_11_170506
Security Patch : 2017-03-01
Platform : msm8916
FRPPST : /dev/block/bootdevice/by-name/config

Reading GPT[3]
Drive [0] 40 Items
Drive [1] 0 Items
Drive [2] 4 Items

Removing FRPta...
Method :
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOkOk

Rebooting Phone.... Ok
If not rebooted, Please Power on Manually

Elapsed Time : 00:00:05
BR
Dipendra Pathak

  Reply With Quote
Old 03-27-2021, 07:22   #1537 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,620
Xiaomi Redmi 8A Olivelite successfully flashed by Hydra Tool

Xiaomi Redmi 8A Olivelite successfully flashed by Hydra Tool

Screen Short:



Logs:

Quote:
Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM20)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&521a615&0&5#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :03/25/2016,2.1.2.2

Getting device info......
Serial No.: 0xFE6BA513
MSM ID : 0x000BF0E1, SDM439-Qualcomm Snapdragon 439
PBL Ver : 00000000
PK HASH : 57158EAF1814D78FD2B3105ECE4DB18A
817A08AC664A5782A925F3FF8403D39A

Firehose Loader[Xiaomi_Redmi_8_Olive.mbn]
SaharaBoot... Ok
Sending .......................Ok
Connecting to Firehose...
Ping... Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[nlwer
Checking Internet connection....
- Hydra Is Online
Connecting to Hydra Xiaomi Server...

Signature @256bytes Authentication.... Accepted......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 19
Serial Number : 327510852
Firmware Version : 4
Product Name : S0J9N8
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 122142720[58.242 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok

Phone Information......
Brand : Xiaomi
Vendor : Xiaomi
Model : Redmi 8A
ID : PKQ1.190319.001
SDK : 28
Release : 9
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : zh-CN
Description : olivelite-user 9 PKQ1.190319.001 V11.0.7.0.PCPCNXM release-keys
Miui Ver : V11
Device : olivelite
Display ID : ZQL2116-olivelite-build-20200111233623
Security Patch : 2019-12-01
Emmc_size : 16GB
Fingerprint : Xiaomi/olivelite/olivelite:9/PKQ1.190319.001/V11.0.7.0.PCPCNXM:user/release-keys


----------------------------
Flashing Selected Partitions....
- switch(0)[dummy.img] Ok
- xbl_config(0)[xbl_config.elf] Ok
- hyp(0)[hyp.mbn] Ok
- hypbak(0)[hyp.mbn] Ok
- cmnlib(0)[cmnlib.mbn] Ok
- cmnlibbak(0)[cmnlib.mbn] Ok
- cmnlib64(0)[cmnlib64.mbn] Ok
- cmnlib64bak(0)[cmnlib64.mbn] Ok
- keymaster(0)[keymaster64.mbn] Ok
- keymasterbak(0)[keymaster64.mbn] Ok
- devcfg(0)[devcfg.mbn] Ok
- devcfgbak(0)[devcfg.mbn] Ok
- abl(0)[abl.elf] Ok
- ablbak(0)[abl.elf] Ok
- misc(0)[dummy.img] Ok
- xbl(0)[xbl.elf] Ok
- xblbak(0)[xbl.elf] Ok
- tz(0)[tz.mbn] Ok
- tzbak(0)[tz.mbn] Ok
- persist(0)[persist.img] Ok
- persistbak(0)[persist.img] Ok
- PrimaryGPT(0)[gpt_main0.bin] Ok

Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-33.] OK
0 [CRC32(2,10752)] OK
0 [CRC32(NUM_DISK_SECTORS-33.,10752)] OK
0 [0] OK
0 [CRC32(1,92)] OK
0 [0] OK
0 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 0
Set bootable storage drive 0 Ok

Rebooting Phone.... Ok

Elapsed Time : 00:00:46
BR
Dipendra Pathak

  Reply With Quote
Old 03-27-2021, 07:25   #1538 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,620
Xiaomi MTK Device's IMEI Repair Successfully Done by Hydra Tool

Xiaomi MTK Device's IMEI Repair Successfully Done by Hydra Tool

Screen Short:



Logs:

Quote:
=====================================
***IMEI REPAIR FUNCTION****
Xiaomi Flashmode
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port (COM115)
SymbolicName :\??\USB#VID_0E8D&PID_0003#00000070#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2016,3.2

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0707MT6768[6768]
BROM HW_SW_VER : 8A00 CA00 0000 0000
getMTKPayloadExploit : 0707
#Executing Exploit..
#SUCCESS..
Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0707MT6768[6768]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
SECURE VERSION : 00
BL VERSION : FE
BR Secured : E0

Preparing Download Agent..
DA : 6768.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2020/07/07.10:10_513994
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_merlin.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 96F32CD0ACE5793C5B9BD732C1BE0341
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000001D1F000000 -116,484 GB
eMMC CID : 90014A6844456150330310397566871D - hDEaP3

DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_merlin.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0707____1141020\MT6768_Android_s catter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x05508000]1024 KB ->frp.bin...Ok
-nvdata[0x0C4A2000]64 MB ->nvdata.bin...Ok
-persist[0x104A2000]48 MB ->persist.bin...Ok
-nvram[0x19F00000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0707____1141020
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 96F32CD0ACE5793C5B9BD732C1BE0341
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000001D1F000000 -116,484 GB
eMMC CID : 90014A6844456150330310397566871D - hDEaP3

Reading GPT-EMMC [0x00008000] 130 Items

IMEI INFO..
IMEI1 : FFFFFFFFFFFFFFF
IMEI2 : *************41*6
ERROR : CMD=07000400, ACK : 0x00200000[]
IMEI INFO..
IMEI1 : FFFFFFFFFFFFFFF
IMEI2 : *************44*1

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:46
BR
Dipendra Pathak

  Reply With Quote
Old 03-27-2021, 07:30   #1539 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,620
Xioami Redmi Note 7 Pro successfully flashed by Hydra Tool

Xioami Redmi Note 7 Pro successfully flashed by Hydra Tool

Screen Short:



Logs:

Quote:
Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM3)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&3273fbaf&0&9#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :03/25/2016,2.1.2.2

Getting device info......
Serial No.: 0xC9E6024F
MSM ID : 0x000950E1, SM6150-Qualcomm Snapdragon 675
PBL Ver : 00000000
PK HASH : 1BEBE3863A6781DB4B01086063007334
DE9E5CA14971C7C4F4358EC9D79CDA46

Firehose Loader[prog_emmc_firehose_Sm6150_ddr.elf]
SaharaBoot... Ok
Sending ...................................Ok
Connecting to Firehose...
Ping..................... Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[jcq4P5vLobaibhUjK9LaukD4ZtG]
Checking Internet connection....
- Hydra Is Online
Connecting to Hydra Xiaomi Server...

Signature @256bytes Authentication.... Accepted........
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Jul 19 2019 - 01:12:10

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 1496500756
Firmware Version : 2
Product Name : 3V6CMB
Physical Partitions : 4
Total Logical Blocks:
Drive [0] 244277248[116.48 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Drive [3] 32768[16 MB]

Protocol : Universal
Running : Ok

Phone Information......
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi Note 7 Pro
ID : PKQ1.181203.001
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : zh-CN
Description : violet-user 9 PKQ1.181203.001 V10.3.10.0.PFHCNXM release-keys
Miui Ver : V10
Device : violet
Display ID : PKQ1.181203.001
Security Patch : 2019-06-01
Fingerprint : xiaomi/violet/violet:9/PKQ1.181203.001/V10.3.10.0.PFHCNXM:user/release-keys


----------------------------
Flashing Selected Partitions....
- multiimgoem(0)[multi_image.mbn] Ok
- vbmeta(0)[vbmeta.img] Ok
- qupfw(0)[qupv3fw.elf] Ok
- xbl_config(0)[xbl_config.elf] Ok
- storsec(0)[storsec.mbn] Ok
- storsecbak(0)[storsec.mbn] Ok
- aop(0)[aop.mbn] Ok
- aopbak(0)[aop.mbn] Ok
- hyp(0)[hyp.mbn] Ok
- hypbak(0)[hyp.mbn] Ok
- cmnlib(0)[cmnlib.mbn] Ok
- cmnlibbak(0)[cmnlib.mbn] Ok
- cmnlib64(0)[cmnlib64.mbn] Ok
- cmnlib64bak(0)[cmnlib64.mbn] Ok
- keymaster(0)[km4.mbn] Ok
- keymasterbak(0)[km4.mbn] Ok
- bluetooth(0)[BTFM.bin] Ok
- devcfg(0)[devcfg.mbn] Ok
- devcfgbak(0)[devcfg.mbn] Ok
- abl(0)[abl.elf] Ok
- ablbak(0)[abl.elf] Ok
- imagefv(0)[imagefv.elf] Ok
- uefisecapp(0)[uefi_sec.mbn] Ok
- uefisecappbak(0)[uefi_sec.mbn] Ok
- misc(0)[misc.img] Ok
- xbl(0)[xbl.elf] Ok
- xblbak(0)[xbl.elf] Ok
- tz(0)[tz.mbn] Ok
- tzbak(0)[tz.mbn] Ok
- logfs(0)[logfs_ufs_8mb.bin] Ok
- dtbo(0)[dtbo.img] Ok
- dsp(0)[dspso.bin] Ok
- splash(0)[splash.img] Ok
- persist(0)[persist.img] Ok
- persistbak(0)[persist.img] Ok
- boot(0)[boot.img] Ok
- recovery(0)[recovery.img] Ok
- modem(0)[NON-HLOS.bin] Ok
- cache(0)[cache.img] Ok
- cust(0)[cust.img] Ok
- system(0)[system.img] Ok
- vendor(0)[vendor.img] Ok
- userdata(0)[userdata.img] Ok
- PrimaryGPT(0)[gpt_main0.bin] Ok

Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-33.] OK
0 [CRC32(2,11264)] OK
0 [CRC32(NUM_DISK_SECTORS-33.,11264)] OK
0 [0] OK
0 [CRC32(1,92)] OK
0 [0] OK
0 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
----------------------------
Done!

Rebooting Phone.... Ok

Elapsed Time : 00:03:04
BR
Dipendra Pathak

  Reply With Quote
Old 03-27-2021, 07:37   #1540 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,620
Lenovo A2020A40 Vibe C successfully flashed by Hydra Tool

Lenovo A2020A40 Vibe C successfully flashed by Hydra Tool

Screen Short:



Logs:

Quote:
Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM91)
SymbolicName :\??\USB#VID_05C6&PID_9008#7&5c7f607&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :03/25/2016,2.1.2.2

Getting device info.....
Serial No.: 0x064287F1
MSM ID : 0x009600E1, MSM8909-Qualcomm Snapdragon 210
PBL Ver : 00000000
PK HASH : CC3153A80293939B90D02D3BF8B23E02
92E452FEF662C74998421ADAD42A380F

Firehose Loader[LV_1_3.mbn]
SaharaBoot... Ok
Sending ..............Ok
Connecting to Firehose...
Ping... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8909
Version : 1


Protocol : Universal
Running : Ok

Phone Information.....
Brand : Lenovo
Vendor : LENOVO
Model : Lenovo A2020a40
ID : LMY47V
SDK : 22
Release : 5.1.1
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Description : angus3A4-user 5.1.1 LMY47V A2020a40_S179_160622_ROW release-keys
Device : angus3A4
Board : msm8909
Display ID : A2020a40_S179_160622_ROW
Security Patch : 2016-05-01
Platform : msm8909
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : Lenovo/angus3A4/angus3A4:5.1.1/LMY47V/A2020a40_S179_160622_ROW:user/release-keys

Reading GPT[3]
Drive [0] 32 Items
Drive [1] 0 Items
Drive [2] 4 Items


Backup Security partitions...
Reading Security Items....
> modemst1
> modemst2
> fsg
C:\Hydra Tool\Backup\Security_Backup\Lenovo A2020a40_msm8909_5.1.1_Security_032621141049.sec
Backup Security Success....

----------------------------
Flashing Selected Partitions....
- modem(0)[NON-HLOS.bin] Ok
- sbl1(0)[sbl1.mbn] Ok
- sbl1bak(0)[sbl1.mbn] Ok
- aboot(0)[emmc_appsboot.mbn] Ok
- abootbak(0)[emmc_appsboot.mbn] Ok
- rpm(0)[rpm.mbn] Ok
- rpmbak(0)[rpm.mbn] Ok
- tz(0)[tz.mbn] Ok
- tzbak(0)[tz.mbn] Ok
- splash(0)[splash.img] Ok
- sec(0)[sec.dat] Skipped
- boot(0)[boot.img] Ok
- system(0)[system_1.img] Ok
- system(0)[system_2.img] Ok
- system(0)[system_3.img] Ok
- system(0)[system_4.img] Ok
- system(0)[system_5.img] Ok
- system(0)[system_6.img] Ok
- system(0)[system_7.img] Ok
- system(0)[system_8.img] Ok
- system(0)[system_9.img] Ok
- system(0)[system_10.img] Ok
- system(0)[system_11.img] Ok
- system(0)[system_12.img] Ok
- system(0)[system_13.img] Ok
- system(0)[system_14.img] Ok
- system(0)[system_15.img] Ok
- system(0)[system_16.img] Ok
- system(0)[system_17.img] Ok
- system(0)[system_18.img] Ok
- system(0)[system_19.img] Ok
- system(0)[system_20.img] Ok
- system(0)[system_21.img] Ok
- system(0)[system_22.img] Ok
- system(0)[system_23.img] Ok
- system(0)[system_24.img] Ok
- system(0)[system_25.img] Ok
- system(0)[system_26.img] Ok
- system(0)[system_27.img] Ok
- system(0)[system_28.img] Ok
- system(0)[system_29.img] Ok
- system(0)[system_30.img] Ok
- system(0)[system_31.img] Ok
- system(0)[system_32.img] Ok
- system(0)[system_33.img] Ok
- system(0)[system_34.img] Ok
- system(0)[system_35.img] Ok
- system(0)[system_36.img] Ok
- system(0)[system_37.img] Ok
- system(0)[system_38.img] Ok
- system(0)[system_39.img] Ok
- system(0)[system_40.img] Ok
- system(0)[system_41.img] Ok
- persist(0)[persist_1.img] Skipped
- cache(0)[cache_1.img] Ok
- cache(0)[cache_2.img] Ok
- cache(0)[cache_3.img] Ok
- recovery(0)[recovery.img] Ok
- userdata(0)[userdata_1.img] Ok
- userdata(0)[userdata_2.img] Ok
- userdata(0)[userdata_3.img] Ok
- userdata(0)[userdata_4.img] Ok
- userdata(0)[userdata_5.img] Ok
- userdata(0)[userdata_6.img] Ok
- userdata(0)[userdata_7.img] Ok
- userdata(0)[userdata_8.img] Ok
- userdata(0)[userdata_9.img] Ok
- userdata(0)[userdata_10.img] Ok
- userdata(0)[userdata_11.img] Ok
- userdata(0)[userdata_12.img] Ok
- userdata(0)[userdata_13.img] Ok
- userdata(0)[userdata_14.img] Ok
- userdata(0)[userdata_15.img] Ok
- userdata(0)[userdata_16.img] Ok
- userdata(0)[userdata_17.img] Ok
- userdata(0)[userdata_18.img] Ok
- userdata(0)[userdata_19.img] Ok
- userdata(0)[userdata_20.img] Ok
- userdata(0)[userdata_21.img] Ok
- userdata(0)[userdata_22.img] Ok
- userdata(0)[userdata_23.img] Ok
- userdata(0)[userdata_24.img] Ok
- userdata(0)[userdata_25.img] Ok
- userdata(0)[userdata_26.img] Ok
- userdata(0)[userdata_27.img] Ok
- userdata(0)[userdata_28.img] Ok
- userdata(0)[userdata_29.img] Ok
- userdata(0)[userdata_30.img] Ok
- userdata(0)[userdata_31.img] Ok
- userdata(0)[userdata_32.img] Ok
- userdata(0)[userdata_33.img] Ok
- userdata(0)[userdata_34.img] Ok
- userdata(0)[userdata_35.img] Ok
- userdata(0)[userdata_36.img] Ok
- userdata(0)[userdata_37.img] Ok
- userdata(0)[userdata_38.img] Ok
- userdata(0)[userdata_39.img] Ok
- userdata(0)[userdata_40.img] Ok
- userdata(0)[userdata_41.img] Ok
- userdata(0)[userdata_42.img] Ok
- userdata(0)[userdata_43.img] Ok
- PrimaryGPT(0)[gpt_main0.bin] Ok

Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-33.] OK
0 [CRC32(2,4096)] OK
0 [CRC32(NUM_DISK_SECTORS-33.,4096)] OK
0 [0] OK
0 [CRC32(1,92)] OK
0 [0] OK
0 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 0
Set bootable storage drive 0 Ok

Rebooting Phone.... Ok

Elapsed Time : 00:04:10
BR
Dipendra Pathak

  Reply With Quote
Old 03-29-2021, 06:26   #1541 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,620
Vivo Y11 (1906) format user data to remove FRP successfully done by Hydra Tool

Vivo Y11 (1906) format user data to remove FRP successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : VIVO Model : Y11 (1906) Storage : EMMC
Loader: Vivo_Y11.elf
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM5)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&c3977cc&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/02/2017,2.1.2.7

Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok
Configuration......
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 3758936689
Firmware Version : 9
Product Name : GX6BAB
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 61071360[29.121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok
Reading GPT[3]
Drive [0] 60 Items
Drive [1] 0 Items
Drive [2] 0 Items


Phone Information......
Brand : vivo
Vendor : vivo
Model : vivo 1906
ID : PKQ1.190616.001
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : msm8937_64-user 9 PKQ1.190616.001 compiler08161931 release-keys
Device : PD1930F_EX
Display ID : PKQ1.190616.001 release-keys
Security Patch : 2020-08-01
Emmc_size : 16GB
Platform : =SDM439
Fingerprint : vivo/1906/1906:9/PKQ1.190616.001/compiler08161931:user/release-keys

Processing Forced Erase....
- Removing FRP [Auto] Ok
- Forced Erase Userdata
Action Result : Ok

Elapsed Time : 00:00:15
BR
Dipendra Pathak

  Reply With Quote
Old 03-29-2021, 06:31   #1542 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,620
Vivo Y81i Formatting userdata successfully done by Hydra Tool

Vivo Y81i Formatting userdata successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port (COM21)
SymbolicName :\??\USB#VID_0E8D&PID_0003#6&1f0054d8&0&2#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0


Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : D41F1CF64B301FD881EC359159C4D12D
ERAM Size : 0x000000000003A000 -232 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003AB400000 -14.676 GB
eMMC CID : 90014A484147346132A5C2843A7995D5 - HAG4a2

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Brand : vivo
Vendor : vivo
Model : vivo 1812
ID : O11019
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : zh-CN
Description : full_k61v1_64_bsp-user 8.1.0 O11019 1578045102 release-keys
Device : PD1732CF_EX
Display ID : O11019 release-keys
Security Patch : 2019-12-05
Platform : =MTK6761
Fingerprint : vivo/1812/1812:8.1.0/O11019/1578045102:user/release-keys
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Erase Userdata
Processing...
Erasing FRP Partition...
Formatting Userdata... Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:07
BR
Dipendra Pathak

  Reply With Quote
Old 03-29-2021, 06:35   #1543 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,620
Vivo Y53 Successfully flashed by Hydra Tool

Vivo Y53 Successfully flashed by Hydra Tool

Screen Short:



Logs:

Quote:
Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM4)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&a453745&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/31/2015,2.1.2.0

Getting device info......
Serial No.: 0xC12E445D
MSM ID : 0x000560E1, MSM8917-Qualcomm Snapdragon 425
PBL Ver : 00000000
PK HASH : 60BA997FEF6DA9F05885FA11F1DD6D2A
90D052A257A09C2075D7246CC73C0D43

Firehose Loader[8917.mbn]
SaharaBoot... Ok
Sending .................Ok
Connecting to Firehose...
Ping... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8917
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 266999821
Firmware Version : 165
Product Name : HAG4a2
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 30777344[14.676 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok

Phone Information.....
Brand : vivo
Vendor : vivo
Model : vivo PD1628F_EX
ID : MMB29M
SDK : 23
Release : 6.0.1
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-US
Description : msm8937_32-user 6.0.1 MMB29M eng.compiler.20171021.161445 release-keys
Device : PD1628F_EX
Board : QC_Reference_Phone
Display ID : MMB29M release-keys
Security Patch : 2017-10-01
Emmc_size : 16GB
Platform : msm8937
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : vivo/PD1628F_EX/PD1628F_EX:6.0.1/MMB29M/compiler10211617:user/release-keys

Reading GPT[3]
Drive [0] 52 Items
Drive [1] 0 Items
Drive [2] 0 Items


Backup Security partitions...
Reading Security Items....
> modemst1
> modemst2
> fsg
D:\HydraTool_Fullpackage_02-20-2021\Backup\Security_Backup\vivo PD1628F_EX_QC_Reference_Phone_6.0.1_Security_03292 1111143.sec
Backup Security Success....

----------------------------
Flashing Selected Partitions....
- modem(0)[NON-HLOS.bin] Ok
- sbl1(0)[sbl1.mbn] Ok
- sbl1bak(0)[sbl1.mbn] Ok
- rpm(0)[rpm.mbn] Ok
- rpmbak(0)[rpm.mbn] Ok
- tz(0)[tz.mbn] Ok
- tzbak(0)[tz.mbn] Ok
- devcfg(0)[devcfg.mbn] Ok
- devcfgbak(0)[devcfg.mbn] Ok
- dsp(0)[adspso.bin] Ok
- sec(0)[sec.dat] Skipped
- aboot(0)[emmc_appsboot.mbn] Ok
- abootbak(0)[emmc_appsboot.mbn] Ok
- boot(0)[boot.img] Ok
- recovery(0)[recovery.img] Ok
- system(0)[system_1.img] Ok
- system(0)[system_2.img] Ok
- system(0)[system_3.img] Ok
- system(0)[system_4.img] Ok
- system(0)[system_5.img] Ok
- system(0)[system_6.img] Ok
- system(0)[system_7.img] Ok
- system(0)[system_8.img] Ok
- system(0)[system_9.img] Ok
- system(0)[system_10.img] Ok
- system(0)[system_11.img] Ok
- system(0)[system_12.img] Ok
- system(0)[system_13.img] Ok
- system(0)[system_14.img] Ok
- system(0)[system_15.img] Ok
- system(0)[system_16.img] Ok
- system(0)[system_17.img] Ok
- system(0)[system_18.img] Ok
- system(0)[system_19.img] Ok
- system(0)[system_20.img] Ok
- system(0)[system_21.img] Ok
- system(0)[system_22.img] Ok
- system(0)[system_23.img] Ok
- system(0)[system_24.img] Ok
- system(0)[system_25.img] Ok
- system(0)[system_26.img] Ok
- system(0)[system_27.img] Ok
- system(0)[system_28.img] Ok
- system(0)[system_29.img] Ok
- system(0)[system_30.img] Ok
- cache(0)[cache_1.img] Ok
- cache(0)[cache_2.img] Ok
- cache(0)[cache_3.img] Ok
- oem(0)[oem_1.img] Ok
- oem(0)[oem_2.img] Ok
- mdtp(0)[mdtp.img] Ok
- cmnlib(0)[cmnlib.mbn] Ok
- cmnlibbak(0)[cmnlib.mbn] Ok
- cmnlib64(0)[cmnlib64.mbn] Ok
- cmnlib64bak(0)[cmnlib64.mbn] Ok
- keymaster(0)[keymaster.mbn] Ok
- keymasterbak(0)[keymaster.mbn] Ok
- survival(0)[survival.img] Ok
- apdp(0)[dp_AP_signed.mbn] Ok
- msadp(0)[dp_MSA_signed.mbn] Ok
- apps(0)[apps_1.img] Ok
- apps(0)[apps_2.img] Ok
- apps(0)[apps_3.img] Ok
- apps(0)[apps_4.img] Ok
- apps(0)[apps_5.img] Ok
- userdata(0)[userdata_1.img] Ok
- userdata(0)[userdata_2.img] Ok
- userdata(0)[userdata_3.img] Ok
- userdata(0)[userdata_4.img] Ok
- userdata(0)[userdata_5.img] Ok
- userdata(0)[userdata_6.img] Ok
- userdata(0)[userdata_7.img] Ok
- userdata(0)[userdata_8.img] Ok
- userdata(0)[userdata_9.img] Ok
- userdata(0)[userdata_10.img] Ok
- userdata(0)[userdata_11.img] Ok
- userdata(0)[userdata_12.img] Ok
- userdata(0)[userdata_13.img] Ok
- userdata(0)[userdata_14.img] Ok
- userdata(0)[userdata_15.img] Ok
- userdata(0)[userdata_16.img] Ok
- userdata(0)[userdata_17.img] Ok
- userdata(0)[userdata_18.img] Ok
- userdata(0)[userdata_19.img] Ok
- userdata(0)[userdata_20.img] Ok
- userdata(0)[userdata_21.img] Ok
- userdata(0)[userdata_22.img] Ok
- userdata(0)[userdata_23.img] Ok
- userdata(0)[userdata_24.img] Ok
- userdata(0)[userdata_25.img] Ok
- userdata(0)[userdata_26.img] Ok
- userdata(0)[userdata_27.img] Ok
- userdata(0)[userdata_28.img] Ok
- userdata(0)[userdata_29.img] Ok
- userdata(0)[userdata_30.img] Ok
- userdata(0)[userdata_31.img] Ok
- userdata(0)[userdata_32.img] Ok
- userdata(0)[userdata_33.img] Ok
- userdata(0)[userdata_34.img] Ok
- userdata(0)[userdata_35.img] Ok
- userdata(0)[userdata_36.img] Ok
- userdata(0)[userdata_37.img] Ok
- userdata(0)[userdata_38.img] Ok
- userdata(0)[userdata_39.img] Ok
- userdata(0)[userdata_40.img] Ok
- userdata(0)[userdata_41.img] Ok
- userdata(0)[userdata_42.img] Ok
- userdata(0)[userdata_43.img] Ok
- PrimaryGPT(0)[gpt_main0.bin] Ok
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 0
Set bootable storage drive 0 Ok

Rebooting Phone.... Ok

Elapsed Time : 00:04:41
BR
Dipendra Pathak

  Reply With Quote
Old 03-29-2021, 06:41   #1544 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,620
Huawei DUB-LX3 (Y7 2019) Zero Wipe FRP successfully done by Hydra Tool

Huawei DUB-LX3 (Y7 2019) Zero Wipe FRP successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : HUAWEI Model : DUB-LX3 (Y7 2019) Storage : Auto
Loader: DUB-LX1_Loader_T-Tool-Team_1.mbn
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM56)
SymbolicName :\??\USB#VID_05C6&PID_9008#6&868c983&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/02/2017,2.1.2.7

Getting device info......
Serial No.: 0xC822151E
MSM ID : 0x0009A0E1, SDM450-Qualcomm Snapdragon 450
PBL Ver : 00000000
PK HASH : 6BC369511DA9CADB3A7AF61574F89DB3
85003D6241BDD1FF573DBA61BF6AE119

Firehose Loader[DUB-LX1_Loader_T-Tool-Team_1.mbn]
SaharaBoot... Ok
Sending .............Ok
Connecting to Firehose...
Ping... Ok
Configuration.......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8953
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 2673698928
Firmware Version : 0
Product Name : RP64MB
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 122142720[58.242 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok
Reading GPT[3]
Drive [0] 60 Items
Drive [1] 0 Items
Drive [2] 0 Items

Processing Remove FRP....
- Removing FRP [Zero Wipe] Ok
Action Result : Ok

Elapsed Time : 00:00:11
BR
Dipendra Pathak

  Reply With Quote
Old 03-29-2021, 06:46   #1545 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,620
Xiaomi Redmi 7A Pine Mi Account Successfully Patched by Hydra Too

Xiaomi Redmi 7A Pine Mi Account Successfully Patched by Hydra Too

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : XIAOMI Model : Redmi 7A (pine) Storage : Auto
Loader: Xiaomi_Redmi_8_Olive.mbn
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM3)
SymbolicName :\??\USB#VID_05C6&PID_9008#7&388e06b0&0&4#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :12/06/2012,2.1.0.5

Getting device info......
Serial No.: 0x03DE7C90
MSM ID : 0x000BF0E1, SDM439-Qualcomm Snapdragon 439
PBL Ver : 00000000
PK HASH : 57158EAF1814D78FD2B3105ECE4DB18A
817A08AC664A5782A925F3FF8403D39A

Firehose Loader[Xiaomi_Redmi_8_Olive.mbn]
SaharaBoot... Ok
Sending .......................Ok
Connecting to Firehose...
Ping... Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[PKlygSVgNHhtvgjE-Qub6Y
Checking Internet connection....
- Hydra Is Online
Connecting to Hydra Xiaomi Server...

Signature @256bytes Authentication.... Accepted......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 1007963683
Firmware Version : 165
Product Name : HAG4a2
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 30777344[14.676 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok
Reading GPT[3]
Drive [0] 60 Items
Drive [1] 0 Items
Drive [2] 0 Items


Phone Information......
Brand : Xiaomi
Vendor : Xiaomi
Model : Redmi 7A
ID : PKQ1.190319.001
SDK : 28
Release : 9
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-GB
Description : pine-user 9 PKQ1.190319.001 V11.0.7.0.PCMMIXM release-keys
Miui Ver : V11
Device : pine
Mod_device : pine_global
Display ID : ZQL1533-pine-build-20200407194230
Security Patch : 2020-03-01
Emmc_size : 16GB
Fingerprint : Xiaomi/pine/pine:9/PKQ1.190319.001/V11.0.7.0.PCMMIXM:user/release-keys

Processing Remove MiAccount[Patch Method]....
Backing up Partition for safety...Ok

Scanning Patching address...
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]Done!!
Total Items patched : 18
Successfully patched address..
Action Result : Ok

Elapsed Time : 00:00:21
BR
Dipendra Pathak

  Reply With Quote
Reply

Bookmarks

Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


 



All times are GMT +1. The time now is 14:40.



Powered by Searchlight © 2024 Axivo Inc.
vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2024 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2023 -
Page generated in 0.45993 seconds with 9 queries

SEO by vBSEO