GSM Shop GSM Shop
GSM-Forum  

Welcome to the GSM-Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features.
Only registered members may post questions, contact other members or search our database of over 8 million posts.

Registration is fast, simple and absolutely free so please - Click to REGISTER!

If you have any problems with the registration process or your account login, please contact contact us .

Go Back   GSM-Forum > Product Support Sections > Special Solutions / Services / WebShop > GSMFABRICA Products > HYDRA TOOL


Reply
 
LinkBack Thread Tools Display Modes
Old 04-05-2021, 05:34   #1606 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,623
Xiaomi Mi 8 Dipper Successfully Flashed By Hydra Tool


Xiaomi Mi 8 Dipper Successfully Flashed By Hydra Tool

Screen Short:



Logs:

Quote:
Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM3)
SymbolicName :\??\USB#VID_05C6&PID_9008#6&8b259d2&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :03/25/2016,2.1.2.2

Getting device info......
Serial No.: 0x6E5C7C97
MSM ID : 0x0008B0E1, SDM845-Qualcomm Snapdragon 845
PBL Ver : 00000000
PK HASH : C924A35F39CE1CDD1B8D5A9F3B8E3C51
317930431D7A9DD5A55028CF6965FE65

Firehose Loader[Xiaomi_ufs_firehose_sdm845_ddr.elf]
SaharaBoot... Ok
Sending ....................................Ok
Connecting to Firehose...
Ping..................... Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[MnK74VYFh94s6
Checking Internet connection....
- Hydra Is Online
Connecting to Hydra Xiaomi Server...

Signature @256bytes Authentication.... Accepted........
Identifying Chip........UFS
Ok
Chip Configuration :
MemoryName : UFS
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Aug 17 2018 - 13:21:01

*** STORAGE DEVICE INFO ***
Memory Type : UFS
Block Size in Bytes : 4096
Page Size : 4096
Manufacturer ID : 429
Serial Number : 2037279096
Firmware Version : 003
Product Name : H28S7Q302BMR
Physical Partitions : 6
Total Logical Blocks:
Drive [0] 14417920[55 GB]
Drive [1] 2048[8 MB]
Drive [2] 2048[8 MB]
Drive [3] 8192[32 MB]
Drive [4] 1179648[4.5 GB]
Drive [5] 8192[32 MB]

Protocol : Universal
Running : Ok

Phone Information......
Vendor : Xiaomi
ID : QKQ1.190828.002
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : zh-CN
Miui Ver : V12
Security Patch : 2020-07-01


----------------------------
Flashing Selected Partitions....
- switch(0)[dummy.img] Ok
- misc(0)[misc.img] Ok
- logfs(0)[logfs_ufs_8mb.bin] Ok
- persist(0)[persist.img] Ok
- persistbak(0)[persist.img] Ok
- recovery(0)[misc.img] Ok
- PrimaryGPT(0)[gpt_main0.bin] Ok
- xbl_config_a(1)[xbl_config.img] Ok
- xbl_a(1)[xbl.img] Ok
- PrimaryGPT(1)[gpt_main1.bin] Ok
- xbl_config_b(2)[xbl_config.img] Ok
- xbl_b(2)[xbl.img] Ok
- PrimaryGPT(2)[gpt_main2.bin] Ok
- PrimaryGPT(3)[gpt_main3.bin] Ok
- limits(4)[dummy.img] Ok
- qupfw_a(4)[qupfw.img] Ok
- qupfw_b(4)[qupfw.img] Ok
- storsec_a(4)[storsec.img] Ok
- storsec_b(4)[storsec.img] Ok
- devcfg_a(4)[devcfg.img] Ok
- devcfg_b(4)[devcfg.img] Ok
- aop_a(4)[aop.img] Ok
- aop_b(4)[aop.img] Ok
- cmnlib_a(4)[cmnlib.img] Ok
- cmnlib_b(4)[cmnlib.img] Ok
- cmnlib64_a(4)[cmnlib64.img] Ok
- cmnlib64_b(4)[cmnlib64.img] Ok
- keymaster_a(4)[keymaster.img] Ok
- keymaster_b(4)[keymaster.img] Ok
- bluetooth(4)[bluetooth.img] Ok
- hyp_a(4)[hyp.img] Ok
- hyp_b(4)[hyp.img] Ok
- abl_a(4)[abl.img] Ok
- abl_b(4)[abl.img] Ok
- tz_a(4)[tz.img] Ok
- tz_b(4)[tz.img] Ok
- logo(4)[logo.img] Ok
- dsp(4)[dsp.img] Ok
- boot(4)[misc.img] Ok
- PrimaryGPT(4)[gpt_main4.bin] Ok
- ImageFv(5)[imagefv.elf] Ok
- PrimaryGPT(5)[gpt_main5.bin] Ok

Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-6.] OK
0 [NUM_DISK_SECTORS-6.] OK
0 [NUM_DISK_SECTORS-6.] OK
0 [NUM_DISK_SECTORS-6.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-5.] OK
0 [CRC32(2,4096)] OK
0 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
0 [0] OK
0 [CRC32(1,92)] OK
0 [0] OK
0 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
1 [NUM_DISK_SECTORS-6.] OK
1 [NUM_DISK_SECTORS-6.] OK
1 [NUM_DISK_SECTORS-6.] OK
1 [NUM_DISK_SECTORS-6.] OK
1 [NUM_DISK_SECTORS-1.] OK
1 [NUM_DISK_SECTORS-1.] OK
1 [NUM_DISK_SECTORS-5.] OK
1 [CRC32(2,4096)] OK
1 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
1 [0] OK
1 [CRC32(1,92)] OK
1 [0] OK
1 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
2 [NUM_DISK_SECTORS-6.] OK
2 [NUM_DISK_SECTORS-6.] OK
2 [NUM_DISK_SECTORS-6.] OK
2 [NUM_DISK_SECTORS-6.] OK
2 [NUM_DISK_SECTORS-1.] OK
2 [NUM_DISK_SECTORS-1.] OK
2 [NUM_DISK_SECTORS-5.] OK
2 [CRC32(2,4096)] OK
2 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
2 [0] OK
2 [CRC32(1,92)] OK
2 [0] OK
2 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
3 [NUM_DISK_SECTORS-6.] OK
3 [NUM_DISK_SECTORS-6.] OK
3 [NUM_DISK_SECTORS-6.] OK
3 [NUM_DISK_SECTORS-6.] OK
3 [NUM_DISK_SECTORS-1.] OK
3 [NUM_DISK_SECTORS-1.] OK
3 [NUM_DISK_SECTORS-5.] OK
3 [CRC32(2,4096)] OK
3 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
3 [0] OK
3 [CRC32(1,92)] OK
3 [0] OK
3 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
4 [NUM_DISK_SECTORS-6.] OK
4 [NUM_DISK_SECTORS-6.] OK
4 [NUM_DISK_SECTORS-6.] OK
4 [NUM_DISK_SECTORS-6.] OK
4 [NUM_DISK_SECTORS-1.] OK
4 [NUM_DISK_SECTORS-1.] OK
4 [NUM_DISK_SECTORS-5.] OK
4 [CRC32(2,8192)] OK
4 [CRC32(NUM_DISK_SECTORS-5.,8192)] OK
4 [0] OK
4 [CRC32(1,92)] OK
4 [0] OK
4 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
5 [NUM_DISK_SECTORS-6.] OK
5 [NUM_DISK_SECTORS-6.] OK
5 [NUM_DISK_SECTORS-6.] OK
5 [NUM_DISK_SECTORS-6.] OK
5 [NUM_DISK_SECTORS-1.] OK
5 [NUM_DISK_SECTORS-1.] OK
5 [NUM_DISK_SECTORS-5.] OK
5 [CRC32(2,4096)] OK
5 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
5 [0] OK
5 [CRC32(1,92)] OK
5 [0] OK
5 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
----------------------------
Done!

Rebooting Phone.... Ok

Elapsed Time : 00:00:49
BR
Dipendra Pathak

  Reply With Quote
Old 04-05-2021, 05:45   #1607 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,623
Xiaomi Redmi Note 8 Pro Begonia successfully Flashed by Hydra Tool

Xiaomi Redmi Note 8 Pro Begonia successfully Flashed by Hydra Tool

Screen Short:



Logs:

Quote:
Brand : XIAOMI Model : Redmi Note 8 Pro (begonia) Connection : Flash Mode

=====================================
How To Boot : Power off phone
* BROM Mode : Press VOL + or Press VOL -+
* Preloader Mode : Just Insert cable

Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port (COM6)
SymbolicName :\??\USB#VID_0E8D&PID_0003#5&10dc86fd&0&2#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2016,3.2


Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0813MT6785[6785]
BROM HW_SW_VER : 8A00 CA00 0000 0000
getMTKPayloadExploit : 0813
#Executing Exploit..
#SUCCESS..
Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0813MT6785[6785]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
SECURE VERSION : 05
BL VERSION : FE
BR Secured : E0

Preparing Download Agent..
DA : 6785.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2019/12/14.17:56_491164
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_begonia.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 8B8F410CB3DC13741C1DD590661ADC17
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x0000000180000000 -6 GB
UFS LU0 Size: 0x0000000000400000 -4 MB
UFS LU1 Size: 0x0000000000400000 -4 MB
UFS LU2 Size: 0x0000001DCB000000 -119.172 GB
UFS CID : Ī?KM2V8001CM-B707
UFS UNIQID : 00330038003400330035003600630063

DA Speed : high-speed

Reading GPT-UFS [0x00008000] 130 Items

Reading System Info
Vendor : Xiaomi
ID : QP1A.190711.020
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : begonia-user 10 QP1A.190711.020 V12.0.6.0.QGGMIXM release-keys
Miui Ver : V12
Mod_device : begonia_global
Display ID : QP1A.190711.020
Security Patch : 2020-12-01
StorageType : mtp
Userdata State : Not Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_begonia.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0813__040321143411\MT6785_Androi d_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x05888000]1024 KB ->frp.bin...Ok
-nvdata[0x08188000]64 MB ->nvdata.bin...Ok
-persist[0x0E188000]70.469 MB ->persist.bin...Ok
-nvram[0x17580000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0813__040321143411
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 8B8F410CB3DC13741C1DD590661ADC17
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x0000000180000000 -6 GB
UFS LU0 Size: 0x0000000000400000 -4 MB
UFS LU1 Size: 0x0000000000400000 -4 MB
UFS LU2 Size: 0x0000001DCB000000 -119.172 GB
UFS CID : Ī?KM2V8001CM-B707
UFS UNIQID : 00330038003400330035003600630063

Reading GPT-UFS [0x00008000] 130 Items

Flashing Selected Partitions....
- recovery[recovery.img] 64 MB Flash -> = Ok
- vbmeta[vbmeta.img] 8 MB Flash -> = Ok
- efuse[efuse.img] 512 KB Flash -> = Ok
- md1img[md1img.img] 150 MB Flash -> = Ok
- spmfw[spmfw.img] 1024 KB Flash -> = Ok
- audio_dsp[audio_dsp.img] 4 MB Flash -> = Ok
- scp1[scp.img] 6 MB Flash -> = Ok
- scp2[scp.img] 6 MB Flash -> = Ok
- sspm_1[sspm.img] 1024 KB Flash -> = Ok
- sspm_2[sspm.img] 1024 KB Flash -> = Ok
- cam_vpu1[cam_vpu1.img] 15 MB Flash -> = Ok
- cam_vpu2[cam_vpu2.img] 15 MB Flash -> = Ok
- cam_vpu3[cam_vpu3.img] 15 MB Flash -> = Ok
- gz1[gz.img] 32 MB Flash -> = Ok
- gz2[gz.img] 32 MB Flash -> = Ok
- lk[lk.img] 2 MB Flash -> = Ok
- lk2[lk.img] 2 MB Flash -> = Ok
- boot[boot.img] 64 MB Flash -> = Ok
- logo[logo.bin] 64 MB Flash -> = Ok
- dtbo[dtbo.img] 32 MB Flash -> = Ok
- tee1[tee.img] 5 MB Flash -> = Ok
- tee2[tee.img] 9.5 MB Flash -> = Ok
- vendor[vendor.img] 1.5 GB Flash -> = Ok
- system[system.img] 3.5 GB Flash -> = Ok
- cache[cache.img] 432 MB Flash -> = Ok
- gsort[gsort.img] 16 MB Flash -> = Ok
- oem_misc1[oem_misc1.img] 16 MB Flash -> = Ok
- exaid[exaid.img] 128 MB Flash -> = Ok
- cust[cust.img] 832 MB Flash -> = Ok
- userdata[userdata.img] 12 GB Flash -> = Ok
=====================================

Elapsed Time : 00:04:18
BR
Dipendra Pathak

  Reply With Quote
Old 04-05-2021, 05:56   #1608 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,623
Xiaomi Redmi 6 Cereus Removing Mi Account and FRP with Erase method successfully done

Xiaomi Redmi 6 Cereus Removing Mi Account and FRP with Erase method successfully done by Hydra

Screen Short:



Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port_V1632 (COM10)
SymbolicName :\??\USB#VID_0E8D&PID_0003#6&eda1dea&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0766MT6765[6765]
BROM HW_SW_VER : 8A00 CA00 0000 0000
getMTKPayloadExploit : 0766
#Executing Exploit..
#SUCCESS..
Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0766MT6765[6765]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
SECURE VERSION : 05
BL VERSION : FE
BR Secured : E0

Preparing Download Agent..
DA : 6765.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2020-11-03.22:07_536568
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_cereus.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 5ABF57F52DDCB06CF9E4305ED22C54CF
ERAM Size : 0x000000000003A000 -232 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 150100474436424D42017249071C55C7 - GD6BMB

DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi 6
ID : O11019
SDK : 27
Release : 8.1.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : zh-CN
Description : cereus-user 8.1.0 O11019 V10.3.4.0.OCGCNXM release-keys
Miui Ver : V10
Device : cereus
Display ID : O11019
Security Patch : 2019-05-01
Fingerprint : xiaomi/cereus/cereus:8.1.0/O11019/V10.3.4.0.OCGCNXM:user/release-keys
StorageType : mtp
Userdata State : Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_cereus.bin
Creating Scatter file... D:\JAFF\Hydra Tool\\Backup\Auto\0766_xiaomi_cereus_cereus_8.1.0_ O11019_V10.3.4.0.OCGCNXM_040321101026\MT6765_Andro id_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x05588000]1024 KB ->frp.bin...Ok
-nvdata[0x07688000]64 MB ->nvdata.bin...Ok
-persist[0x0F000000]64 MB ->persist.bin...Ok
-nvram[0x1BE80000]64 MB ->nvram.bin...Ok
Done!!!
D:\****\Hydra Tool\\Backup\Auto\0766_xiaomi_cereus_cereus_8.1.0_ O11019_V10.3.4.0.OCGCNXM_040321101026
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 5ABF57F52DDCB06CF9E4305ED22C54CF
ERAM Size : 0x000000000003A000 -232 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 150100474436424D42017249071C55C7 - GD6BMB

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi 6
ID : O11019
SDK : 27
Release : 8.1.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : zh-CN
Description : cereus-user 8.1.0 O11019 V10.3.4.0.OCGCNXM release-keys
Miui Ver : V10
Device : cereus
Display ID : O11019
Security Patch : 2019-05-01
Fingerprint : xiaomi/cereus/cereus:8.1.0/O11019/V10.3.4.0.OCGCNXM:user/release-keys
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Remove MiAccount[Erase Method] + FRP
Processing...
-persist.bin[0x0F000000]64 MB ->persist.bin...Ok
-frp.bin[0x05588000]1024 KB ->frp.bin...Ok
Redmi 6_8.1.0_040321101130
Backing up Partition for safety...
-Redmi 6_8.1.0_040321101130[0x0F000000]64 MB ->persist.img...OkOk
Saved to :
D:\*****\Hydra Tool\Backup\Persist\Redmi 6_8.1.0_040321101130.bin
Erasing FRP Partition...
-persist.bin[0x0F000000]64 MB ->persist.bin...Ok
-frp.bin[0x05588000]1024 KB ->frp.bin...Ok Ok

Elapsed Time : 00:01:46
BR
Dipendra Pathak

  Reply With Quote
Old 04-05-2021, 06:06   #1609 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,623
Xiaomi Redmi 7A Pine Safe Format user data successfully done by Hydra Tool

Xiaomi Redmi 7A Pine Safe Format user data successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : XIAOMI Model : Redmi 7A (pine) Storage : Auto
Loader: Xiaomi_Redmi_8_Olive.mbn
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM12)
SymbolicName :\??\USB#VID_05C6&PID_9008#6&eda1dea&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/31/2015,2.1.2.0

Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 485005007
Firmware Version : 4
Product Name : QD63MB
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 61071360[29.121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok
Reading GPT[3]
Drive [0] 60 Items
Drive [1] 0 Items
Drive [2] 0 Items


Phone Information......
Brand : Xiaomi
Vendor : Xiaomi
Model : Redmi 7A
ID : PKQ1.190319.001
SDK : 28
Release : 9
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-GB
Description : pine-user 9 PKQ1.190319.001 V10.2.4.0.PCMMIXM release-keys
Miui Ver : V10
Device : pine
Mod_device : pine_global
Display ID : ZQL1533-pine-build-20190701230949
Security Patch : 2019-06-01
Emmc_size : 16GB
Fingerprint : Xiaomi/pine/pine:9/PKQ1.190319.001/V10.2.4.0.PCMMIXM:user/release-keys

Processing Safe Format - EMMC....
- Removing FRP [Zero Wipe] Ok
- Formatting Userdata [Safe method] Ok
Action Result : Ok

Elapsed Time : 00:00:08
BR
Dipendra Pathak

  Reply With Quote
Old 04-05-2021, 06:17   #1610 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,623
Asus ZB5552KL zero wipe FRP successfully done by Hydra Tool

Asus ZB5552KL zero wipe FRP successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : AUTO Model : AUTO Storage : Auto
Loader: Auto
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM11)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&9dafd45&0&5#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/31/2015,2.1.2.0

Getting device info......
Serial No.: 0xFE44C476
MSM ID : 0x000560E1, MSM8917-Qualcomm Snapdragon 425
PBL Ver : 00000000
PK HASH : FBD4DE360136046BBF581DC5EFF178E1
F716188E6834DA714E485695230D00F3

Firehose Loader[asus_4_7.mbn]
SaharaBoot... Ok
Sending ...................Ok
Connecting to Firehose...
Ping... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8917
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 3263488747
Firmware Version : 165
Product Name : HAG4a2
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 30777344[14.676 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok

Phone Information.....
Brand : asus
Vendor : asus
Model : ZB555KL
ID : OPR1.170623.032
SDK : 26
Release : 8.0.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : E300L_WW-user 8.0.0 OPR1.170623.032 90 release-keys
Display ID : WW_Phone-15.00.2007.122-20200618
Security Patch : 2020-07-05
Emmc_size : 16GB

Reading GPT[3]
Drive [0] 56 Items
Drive [1] 0 Items
Drive [2] 0 Items

Removing FRPta...
Method :
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOkOk

Elapsed Time : 00:00:09
BR
Dipendra Pathak

  Reply With Quote
The Following User Says Thank You to Dipendra Pathak For This Useful Post:
Old 04-05-2021, 10:16   #1611 (permalink)
No Life Poster
 
sky73's Avatar
 
Join Date: Jan 2013
Location: gsmhosting
Age: 29
Posts: 1,148
Member: 1876736
Status: Offline
Thanks Meter: 735
TECNO BB4k imei repair done

Code:
***IMEI REPAIR FUNCTION****
New Method
Searching for MTK Device...Found
 Port Identification :METAMODE BROM
 FriendlyName :MediaTek USB VCOM (Android) (COM79)
 SymbolicName :\??\COM79
 Driver Ver   :01/22/2015,3.0.1504.0

Rebooting Phone into META Mode...
Connecting to META Device...Ok
Getting Device Information...
Brand : TECNO MOBILE LIMITED
Product Board : unknown
Model : TECNO-BB4k
Model Code : TECNO BB4k
Android Version : 9
CPU : mt6761
Security Patch : 2020-11-05
ARM CPU : armeabi-v7a
Read Information Succes...

Loading MDDB From Phone...Ok

IMEI1 : 353yyyyyyy
IMEI1 : 353yyyyy

Writing IMEI 1Ok
Writing IMEI 2Ok
Done

Elapsed Time : 00:00:03
  Reply With Quote
The Following User Says Thank You to sky73 For This Useful Post:
Old 04-05-2021, 10:16   #1612 (permalink)
No Life Poster
 
sky73's Avatar
 
Join Date: Jan 2013
Location: gsmhosting
Age: 29
Posts: 1,148
Member: 1876736
Status: Offline
Thanks Meter: 735
TECNO BB4k imei repair done

Code:
***IMEI REPAIR FUNCTION****
New Method
Searching for MTK Device...Found
 Port Identification :METAMODE BROM
 FriendlyName :MediaTek USB VCOM (Android) (COM79)
 SymbolicName :\??\COM79
 Driver Ver   :01/22/2015,3.0.1504.0

Rebooting Phone into META Mode...
Connecting to META Device...Ok
Getting Device Information...
Brand : TECNO MOBILE LIMITED
Product Board : unknown
Model : TECNO-BB4k
Model Code : TECNO BB4k
Android Version : 9
CPU : mt6761
Security Patch : 2020-11-05
ARM CPU : armeabi-v7a
Read Information Succes...

Loading MDDB From Phone...Ok

IMEI1 : 353yyyyyyy
IMEI1 : 353yyyyy

Writing IMEI 1Ok
Writing IMEI 2Ok
Done

Elapsed Time : 00:00:03
  Reply With Quote
The Following User Says Thank You to sky73 For This Useful Post:
Old 04-06-2021, 13:43   #1613 (permalink)
Product Manager
 
Hydra Tool's Avatar
 
Join Date: Aug 2018
Location: Ukraine / Harkov
Posts: 1,986
Member: 2857401
Status: Offline
Thanks Meter: 6,861
Xiaomi Qualcomm Mi Account Remove Without Relock and BL Locked

Xiaomi Qualcomm Mi Account Remove Without Relock and BL Locked

Mi Account Remove of Xiaomi Qualcomm devices by EDL Mode, Without any VPN App, No Relocked after Reset, Bootloader locked or locked not matter,
Which device emabed auth can direct erase, With this method device will not relocked after factory reset.

Video Guide :

http://www.youtube.com/watch?v=Fo_qo17qWCY


Quote:
Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM17)
SymbolicName :\??\USB#VID_05C6&PID_9008#7&1ee38e0d&0&1#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/02/2017,2.1.2.7

Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping..................... Ok
Configuration........
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Aug 24 2018 - 20:05:37

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 3558238873
Firmware Version : 5
Product Name : 3H6CMB
Physical Partitions : 4
Total Logical Blocks:
Drive [0] 122142720[58,242 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Drive [3] 8192[4 MB]

Protocol : Universal
Running : Ok
Reading GPT[4]
Drive [0] 84 Items
Drive [1] 0 Items
Drive [2] 0 Items
Drive [3]


Phone Information......
Vendor : Xiaomi
ID : QKQ1.190828.002
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : zh-CN
Miui Ver : V12
Security Patch : 2020-08-01

Processing Remove MiAccount[New Method]....
Backing up Partition for safety...Ok

Scanning Patching address...
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]Done!!
Total Items patched : 3
Successfully patched address..
Action Result : Ok

Rebooting Phone.... Ok

Elapsed Time : 00:00:24
  Reply With Quote
The Following 2 Users Say Thank You to Hydra Tool For This Useful Post:
Old 04-07-2021, 10:47   #1614 (permalink)
No Life Poster
 
Gsm-Ahmed's Avatar
 
Join Date: Jan 2020
Location: Algeria
Posts: 814
Member: 2944109
Status: Offline
Thanks Meter: 656
Condor Allure A8 (PGN611) Ultra power option

Condor Allure A8 (PGN611) Ultra power option




Code:
Brand : CONDOR Model : PGN611 (Allure A8) Connection : Flash Mode

=====================================
Connection
 -Please wait...
 -Found...[COM5]

TPortConnection.Create...(COM5)..Opening...Ok


Reading System Info
  Brand          : condor
  Vendor         : SPA Condor Electronics
  Model          : PGN611
  ID             : NRD90M
  SDK            : 24
  Release        : 7.0
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : fr-FR
  Description    : full_gnsz6753_66_n-user 7.0 NRD90M 1530497184 release-keys
  Device         : PGN611
  Board          : PGN611
  Display ID     : PGN611
  Security Patch : 2018-05-05
  Platform       : mt6753
  FRPPST         : /dev/block/platform/mtk-msdc.0/11230000.msdc0/by-name/frp
  Fingerprint    : condor/PGN611/PGN611:7.0/NRD90M/1530497184:user/release-keys
  StorageType    : mtp
  Userdata State : Encrypted

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition... [Ok]
Formatting Userdata... Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:04
  Reply With Quote
The Following User Says Thank You to Gsm-Ahmed For This Useful Post:
Old 04-07-2021, 10:49   #1615 (permalink)
No Life Poster
 
Gsm-Ahmed's Avatar
 
Join Date: Jan 2020
Location: Algeria
Posts: 814
Member: 2944109
Status: Offline
Thanks Meter: 656
Condor Griffe G5 (PHQ520) Ultra Power Option

Condor Griffe G5 (PHQ520) Ultra Power Option


  Reply With Quote
The Following User Says Thank You to Gsm-Ahmed For This Useful Post:
Old 04-07-2021, 10:50   #1616 (permalink)
No Life Poster
 
Gsm-Ahmed's Avatar
 
Join Date: Jan 2020
Location: Algeria
Posts: 814
Member: 2944109
Status: Offline
Thanks Meter: 656
Huawei Y3II (LUA-U22) Remove Lock Without Data Loss

Huawei Y3II (LUA-U22) Remove Lock Without Data Loss




Code:
Brand : HUAWEI Model : LUA-U22 (Y3 II) Connection : Flash Mode

=====================================
Connection
 -Please wait...
 -Found...
 -PreLoader...[COM4]

TPortConnection.Create...(COM4)..Opening...Ok

Handshaking...Ok

Identifying Hardware ID.....
 BROM CPUID     : 6582 (0000)MT6582[6582]
 BROM HW_SW_VER : 8A00 CA01 0001 0000 

Handshaking...

Identifying Hardware ID.....
 BROM CPUID     : 6582 (0000)MT6582[6582]
 BROM HW_SW_VER : 8A00 CA01 0001 0000 
 FUSEID         : 00000380
 SECURE VERSION : FF 
 BL VERSION     : 01 
 BR Secured     : 00

Preparing Download Agent..
 DA   : da_mt6582_lua_u22.bin
 Agent: MTK_DOWNLOAD_AGENT -HYDRA
 Ver  : MTK_AllInOne_DA_v3.3001.00.00
 Init : Loader [1]
 Sending : Accepted

Identifying Protocol...
 Protocol : Old - eMMC
00000000000000000000
PRMMCCID   : 150100464E31324D420649FCCAF27329
Init Configuration
Running DA 4.2 on BBID : 0x87 Ok

Initializing Loader [2]
Sending Loader [2] Accepted
Reading Flashchip data....
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB  : 0x0000000000080000 -512 KB
eMMC USER  : 0x00000001D2000000 -7,281 GB
ERAM Size  : 0x0000000040000000 -1024 MB
IRAM Size  : 0x0000000000020000 -128 KB
UNICAL RID : 9249709E10A1E3A51962F0A1B4ED300A
eMMC CID   : 460001154D32314EFC4906422973F2CA
Change to HIGH SPEED...
5A
Connection
 -Please wait...
 -Found...[COM5]


Reading Partition Table
SIZE[0x000008A0] 23 Items > Done

Reading System Info
  Brand          : HUAWEI
  Vendor         : HUAWEI
  Model          : HUAWEI LUA-U22
  ID             : HUAWEILUA-U22
  SDK            : 22
  Release        : 5.1
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Description    : LUA-U22-user 5.1 HUAWEILUA-U22 C328B014 release-keys
  Device         : HWLUA-U6582
  Board          : LUA-U22
  Display ID     : LUA-U22C328B014
  Security Patch : 2017-12-05
  Platform       : mt6582
  FRPPST         : emmc@frp
  Fingerprint    : HUAWEI/LUA-U22/HWLUA-U6582:5.1/HUAWEILUA-U22/C328B014:user/release-keys
  StorageType    : mtp,mass_storage
  Userdata State : Not Encrypted

Autobackup Partitions
 -PRELOADER[0x00000000] 512 KB -> PRELOADER.bin...Ok
   -> Renaming Preloader....  preloader_wt96582_s96582aa51.bin
   Creating Scatter file... C:\Hydra 1.0.2.60\Hydra Tool\\Backup\Auto\HUAWEI_HUAWEI LUA-U22_6582-mt6582-5.1_LUA-U22C328B014_060421091902\MT6582_Android_scatter.txt
 -NVRAM[0x01000000] 5 MB -> NVRAM.bin...Ok
 -FRP[0x1DD80000] 1024 KB -> FRP.bin...Ok
Done!!!
C:\Hydra 1.0.2.60\Hydra Tool\\Backup\Auto\HUAWEI_HUAWEI LUA-U22_6582-mt6582-5.1_LUA-U22C328B014_060421091902
MTK Phone Loader is NOW RUNNING.


Reading System Info
  Brand          : HUAWEI
  Vendor         : HUAWEI
  Model          : HUAWEI LUA-U22
  ID             : HUAWEILUA-U22
  SDK            : 22
  Release        : 5.1
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Description    : LUA-U22-user 5.1 HUAWEILUA-U22 C328B014 release-keys
  Device         : HWLUA-U6582
  Board          : LUA-U22
  Display ID     : LUA-U22C328B014
  Security Patch : 2017-12-05
  Platform       : mt6582
  FRPPST         : emmc@frp
  Fingerprint    : HUAWEI/LUA-U22/HWLUA-U6582:5.1/HUAWEILUA-U22/C328B014:user/release-keys
  StorageType    : mtp,mass_storage
  Userdata State : Not Encrypted

-------------------------------------
Operation : Remove Lock Without Data Loss
Processing...
Searching patching address.. [Ok].. [Ok].. [Ok].. [Ok].. [Ok] Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:26
  Reply With Quote
The Following User Says Thank You to Gsm-Ahmed For This Useful Post:
Old 04-07-2021, 10:54   #1617 (permalink)
No Life Poster
 
Gsm-Ahmed's Avatar
 
Join Date: Jan 2020
Location: Algeria
Posts: 814
Member: 2944109
Status: Offline
Thanks Meter: 656
XIAOMI Redmi Note 8T (wiilow) Remove MiAccount [New Method]

XIAOMI Redmi Note 8T (wiilow) Remove MiAccount [New Method]


No Need To Flash any File
No Need APP Or VPN
You Can Factory Your Devices (MiAccount No Back)



  Reply With Quote
The Following User Says Thank You to Gsm-Ahmed For This Useful Post:
Old 04-07-2021, 10:56   #1618 (permalink)
No Life Poster
 
Gsm-Ahmed's Avatar
 
Join Date: Jan 2020
Location: Algeria
Posts: 814
Member: 2944109
Status: Offline
Thanks Meter: 656
Samsung B310E Read Lock Code

Samsung B310E Read Lock Code



  Reply With Quote
The Following User Says Thank You to Gsm-Ahmed For This Useful Post:
Old 04-07-2021, 15:30   #1619 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,623
Xiaomi Redmi Note 5A UGG disanble Mi Account successfully Removed by Hydra Tool

Xiaomi Redmi Note 5A UGG disanble Mi Account successfully Removed by Hydra Tool

Screen Short:



Logs:

Quote:
Starting ADB Server....
Searching Device By ADB
Device Found...
Model : Redmi Note 5A
Brand : Xiaomi
Android Ver : 7.1.2
CPU abi : arm64-v8a
Software Version :
CSC Version :
Bootloader :
Board : QC_Reference_Phone
Display ID : N2G47H
Security Patch : 2017-10-01
Emmc_size : 16GB
Platform : msm8937
Kernel ID : 2017-10-01
Marketname :
OTA Version Name :
SYS USB CONFIG : persist.mtp,adb
FRPPST : /dev/block/bootdevice/by-name/config
FingerPrint : xiaomi/ugglite/ugglite:7.1.2/N2G47H/V8.5.6.0.NDFMIED:user/release-keys

Checking Root Status....
Root Status : Not Rooted

ADB MiAccount...

Processing...
Disbaling MI Account
Please wait...
Disabled Mi Account Success
Action Result : Ok

Elapsed Time : 00:00:04
BR
Dipendra Pathak

  Reply With Quote
Old 04-07-2021, 16:09   #1620 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,623
Xiaomi Redmi 4X Santoni Zero Wipe FRP removed successfully done by Hydra Tool

Xiaomi Redmi 4X Santoni Zero Wipe FRP removed successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : XIAOMI Model : Redmi 4X (Santoni) Storage : Auto
Loader: mi_1_9.mbn
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM5)
SymbolicName :\??\USB#VID_05C6&PID_9008#7&39d0cd62&0&6#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/02/2017,2.1.2.7

Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 667655057
Firmware Version : 7
Product Name : QE13MB
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 30535680[14.561 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok

Phone Information.....
Brand : Xiaomi
Vendor : Xiaomi
Model : Redmi 4X
ID : N2G47H
SDK : 25
Release : 7.1.2
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : santoni-user 7.1.2 N2G47H V10.1.1.0.NAMMIFI release-keys
Miui Ver : V10
Device : santoni
Mod_device : santoni_global
Board : QC_Reference_Phone
Display ID : N2G47H
Security Patch : 2018-10-01
Emmc_size : 16GB
Platform : msm8937
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : Xiaomi/santoni/santoni:7.1.2/N2G47H/V10.1.1.0.NAMMIFI:user/release-keys

Reading GPT[3]
Drive [0] 52 Items
Drive [1] 0 Items
Drive [2] 0 Items

Removing FRPta...
Method :
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOkOk

Rebooting Phone.... Ok
If not rebooted, Please Power on Manually

Elapsed Time : 00:00:07
BR
Dipendra Pathak

  Reply With Quote
Reply

Bookmarks


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


 



All times are GMT +1. The time now is 05:58.



Powered by Searchlight © 2024 Axivo Inc.
vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2024 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2023 -
Page generated in 0.71951 seconds with 9 queries

SEO by vBSEO