GSM Shop GSM Shop
GSM-Forum  

Welcome to the GSM-Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features.
Only registered members may post questions, contact other members or search our database of over 8 million posts.

Registration is fast, simple and absolutely free so please - Click to REGISTER!

If you have any problems with the registration process or your account login, please contact contact us .

Go Back   GSM-Forum > Product Support Sections > Special Solutions / Services / WebShop > GSMFABRICA Products > HYDRA TOOL


Reply
 
LinkBack Thread Tools Display Modes
Old 04-12-2021, 03:34   #1666 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Cherry Mobile Flare S8 safe format universal successfully done by Hydra Tool


Cherry Mobile Flare S8 safe format universal successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port_V1632 (COM10)
SymbolicName :\??\USB#VID_0E8D&PID_0003#5&254a8f52&0&2#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0


Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 4F5AD5EA6EEBE27A57B1E1329077D9BB
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 90014A68423861503E020F4C414D44C7 - hB8aP>

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Brand : Cherry_Mobile
Vendor : Cherry_Mobile
Model : Flare S8
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_g1860ps_v2_gh_fng_g33scr_p-user 9 PPR1.180610.011 0729122925 release-keys
Device : X930
Display ID : Cherry_X930_Flare_S8_07292019_v1
Security Patch : 2019-07-05
FRPPST : /dev/block/platform/bootdevice/by-name/frp
Fingerprint : Cherry_Mobile/Flare_S8/X930:9/PPR1.180610.011/0729122925:user/release-keys
StorageType : mtp
Userdata State : Not Encrypted

-------------------------------------
Operation : Auto
Processing...
Safeformat Universal... Ok

Elapsed Time : 00:00:05
BR
Dipendra Pathak

  Reply With Quote
Old 04-12-2021, 03:42   #1667 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Xiaomi Redmi 9c (angelica) FRP successfully removed by Hydra Tool

Xiaomi Redmi 9c (angelica) FRP successfully removed by Hydra Tool

Screen Short:



Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port_V1632 (COM36)
SymbolicName :\??\USB#VID_0E8D&PID_0003#5&2108ad5d&0&6#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0


Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 28627B38E8AA7463545ABB9C4459B75E
ERAM Size : 0x000000000003A000 -232 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 45010044413430333201131C891457FD - DA4032

Reading GPT-EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition... Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:01
BR
Dipendra Pathak

  Reply With Quote
Old 04-12-2021, 03:46   #1668 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Xiaomi Redmi 4X Samtpmo removed MI Account with New Method by Hydra Tool

Xiaomi Redmi 4X Samtpmo removed MI Account with New Method by Hydra Tool

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : XIAOMI Model : Redmi 4X (Santoni) Storage : Auto
Loader: mi_1_9.mbn
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM14)
SymbolicName :\??\USB#VID_05C6&PID_9008#6&3230b2b9&0&5#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :02/05/2018,3.0.0.0

Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 17
Serial Number : 2228383011
Firmware Version : 3
Product Name : 032G32
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 61071360[29.121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok
Reading GPT[3]
Drive [0] 52 Items
Drive [1] 0 Items
Drive [2] 0 Items


Phone Information.....
Brand : Xiaomi
Vendor : Xiaomi
Model : Redmi 4X
ID : N2G47H
SDK : 25
Release : 7.1.2
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : santoni-user 7.1.2 N2G47H V11.0.2.0.NAMMIXM release-keys
Miui Ver : V11
Device : santoni
Mod_device : santoni_global
Board : QC_Reference_Phone
Display ID : N2G47H
Security Patch : 2018-10-01
Emmc_size : 16GB
Platform : msm8937
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : Xiaomi/santoni/santoni:7.1.2/N2G47H/V11.0.2.0.NAMMIXM:user/release-keys

Processing Remove MiAccount[New Method]....
Access violation at address 00C7D66B in module 'HQTool.exe'. Write of address 00000000

Elapsed Time : 00:00:11
BR
Dipendra Pathak

  Reply With Quote
Old 04-12-2021, 03:55   #1669 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Xiaomi Mi 8 Dipper successfully flashed by Hydra Tool

Xiaomi Mi 8 Dipper successfully flashed by Hydra Tool

Screen Short:



Logs:

Quote:
Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM10)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&8ef9904&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/02/2017,2.1.2.7

Getting device info......
Serial No.: 0xA157C9B4
MSM ID : 0x0008B0E1, SDM845-Qualcomm Snapdragon 845
PBL Ver : 00000000
PK HASH : C924A35F39CE1CDD1B8D5A9F3B8E3C51
317930431D7A9DD5A55028CF6965FE65

Firehose Loader[Xiaomi_ufs_firehose_sdm845_ddr.elf]
SaharaBoot... Ok
Sending ....................................Ok
Connecting to Firehose...
Ping..................... Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[Wdm6PNUvro-l7jHMVejl3CwyAzr]
Checking Internet connection....
- Hydra Is Online
Connecting to Hydra Xiaomi Server...

Signature @256bytes Authentication.... Accepted........
Identifying Chip........UFS
Ok
Chip Configuration :
MemoryName : UFS
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Aug 17 2018 - 13:21:01

*** STORAGE DEVICE INFO ***
Memory Type : UFS
Block Size in Bytes : 4096
Page Size : 4096
Manufacturer ID : 462
Serial Number : 1297306958
Firmware Version : 500
Product Name : KLUDG4U1EA-B0C1
Physical Partitions : 6
Total Logical Blocks:
Drive [0] 30038016[114.586 GB]
Drive [1] 2048[8 MB]
Drive [2] 2048[8 MB]
Drive [3] 8192[32 MB]
Drive [4] 1179648[4.5 GB]
Drive [5] 8192[32 MB]

Protocol : Universal
Running : Ok

Phone Information.....
Brand : Xiaomi
Vendor : Xiaomi
Model : MI 8
ID : OPM1.171019.011
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : zh-CN
Description : dipper-user 8.1.0 OPM1.171019.011 V9.5.11.0.OEACNFA release-keys
Miui Ver : V9
Device : dipper
Display ID : OPM1.171019.011
Security Patch : 2018-06-01
Fingerprint : Xiaomi/dipper/dipper:8.1.0/OPM1.171019.011/V9.5.11.0.OEACNFA:user/release-keys

Reading GPT[6]
Drive [0] 32 Items
Drive [1] 32 Items
Drive [2] 32 Items
Drive [3] 32 Items
Drive [4] 64 Items
Drive [5] 32 Items


Backup Security partitions...
Reading Security Items....
> modemst1
> modemst2
> fsg
C:\Hydra Tool\Backup\Security_Backup\MI 8__8.1.0_Security_041121161629.sec
Backup Security Success....

----------------------------
Flashing Selected Partitions....
- switch(0)[dummy.img] Ok
- misc(0)[misc.img] Ok
- logfs(0)[logfs_ufs_8mb.bin] Ok
- persist(0)[persist.img] Skipped
- cust(0)[cust.img] Ok
- recovery(0)[recovery.img] Ok
- cache(0)[cache.img] Ok
- userdata(0)[userdata.img] Ok
- PrimaryGPT(0)[gpt_main0.bin] Ok
- xbl_config_a(1)[xbl_config.img] Ok
- xbl_a(1)[xbl.img] Ok
- PrimaryGPT(1)[gpt_main1.bin] Ok
- xbl_config_b(2)[xbl_config.img] Ok
- xbl_b(2)[xbl.img] Ok
- PrimaryGPT(2)[gpt_main2.bin] Ok
- PrimaryGPT(3)[gpt_main3.bin] Ok
- limits(4)[dummy.img] Ok
- qupfw_a(4)[qupfw.img] Ok
- qupfw_b(4)[qupfw.img] Ok
- storsec_a(4)[storsec.img] Ok
- storsec_b(4)[storsec.img] Ok
- devcfg_a(4)[devcfg.img] Ok
- devcfg_b(4)[devcfg.img] Ok
- aop_a(4)[aop.img] Ok
- aop_b(4)[aop.img] Ok
- cmnlib_a(4)[cmnlib.img] Ok
- cmnlib_b(4)[cmnlib.img] Ok
- cmnlib64_a(4)[cmnlib64.img] Ok
- cmnlib64_b(4)[cmnlib64.img] Ok
- keymaster_a(4)[keymaster.img] Ok
- keymaster_b(4)[keymaster.img] Ok
- bluetooth(4)[bluetooth.img] Ok
- hyp_a(4)[hyp.img] Ok
- hyp_b(4)[hyp.img] Ok
- abl_a(4)[abl.img] Ok
- abl_b(4)[abl.img] Ok
- tz_a(4)[tz.img] Ok
- tz_b(4)[tz.img] Ok
- logo(4)[logo.img] Ok
- dsp(4)[dsp.img] Ok
- boot(4)[boot.img] Ok
- modem(4)[modem.img] Ok
- vendor(4)[vendor.img] Ok
- system(4)[system.img] Ok
- PrimaryGPT(4)[gpt_main4.bin] Ok
- ImageFv(5)[imagefv.elf] Ok
- PrimaryGPT(5)[gpt_main5.bin] Ok

Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-6.] OK
0 [NUM_DISK_SECTORS-6.] OK
0 [NUM_DISK_SECTORS-6.] OK
0 [NUM_DISK_SECTORS-6.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-5.] OK
0 [CRC32(2,4096)] OK
0 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
0 [0] OK
0 [CRC32(1,92)] OK
0 [0] OK
0 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
1 [NUM_DISK_SECTORS-6.] OK
1 [NUM_DISK_SECTORS-6.] OK
1 [NUM_DISK_SECTORS-6.] OK
1 [NUM_DISK_SECTORS-6.] OK
1 [NUM_DISK_SECTORS-1.] OK
1 [NUM_DISK_SECTORS-1.] OK
1 [NUM_DISK_SECTORS-5.] OK
1 [CRC32(2,4096)] OK
1 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
1 [0] OK
1 [CRC32(1,92)] OK
1 [0] OK
1 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
2 [NUM_DISK_SECTORS-6.] OK
2 [NUM_DISK_SECTORS-6.] OK
2 [NUM_DISK_SECTORS-6.] OK
2 [NUM_DISK_SECTORS-6.] OK
2 [NUM_DISK_SECTORS-1.] OK
2 [NUM_DISK_SECTORS-1.] OK
2 [NUM_DISK_SECTORS-5.] OK
2 [CRC32(2,4096)] OK
2 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
2 [0] OK
2 [CRC32(1,92)] OK
2 [0] OK
2 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
3 [NUM_DISK_SECTORS-6.] OK
3 [NUM_DISK_SECTORS-6.] OK
3 [NUM_DISK_SECTORS-6.] OK
3 [NUM_DISK_SECTORS-6.] OK
3 [NUM_DISK_SECTORS-1.] OK
3 [NUM_DISK_SECTORS-1.] OK
3 [NUM_DISK_SECTORS-5.] OK
3 [CRC32(2,4096)] OK
3 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
3 [0] OK
3 [CRC32(1,92)] OK
3 [0] OK
3 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
4 [NUM_DISK_SECTORS-6.] OK
4 [NUM_DISK_SECTORS-6.] OK
4 [NUM_DISK_SECTORS-6.] OK
4 [NUM_DISK_SECTORS-6.] OK
4 [NUM_DISK_SECTORS-1.] OK
4 [NUM_DISK_SECTORS-1.] OK
4 [NUM_DISK_SECTORS-5.] OK
4 [CRC32(2,8192)] OK
4 [CRC32(NUM_DISK_SECTORS-5.,8192)] OK
4 [0] OK
4 [CRC32(1,92)] OK
4 [0] OK
4 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
5 [NUM_DISK_SECTORS-6.] OK
5 [NUM_DISK_SECTORS-6.] OK
5 [NUM_DISK_SECTORS-6.] OK
5 [NUM_DISK_SECTORS-6.] OK
5 [NUM_DISK_SECTORS-1.] OK
5 [NUM_DISK_SECTORS-1.] OK
5 [NUM_DISK_SECTORS-5.] OK
5 [CRC32(2,4096)] OK
5 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
5 [0] OK
5 [CRC32(1,92)] OK
5 [0] OK
5 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 1
Set bootable storage drive 1 Ok

Rebooting Phone.... Ok

Elapsed Time : 00:03:11
BR
Dipendra Pathak

  Reply With Quote
Old 04-12-2021, 04:03   #1670 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
GOME C7 Note Pluse Zero Wipe FRP Partition successfully Removed by Hydra Tool

GOME C7 Note Pluse Zero Wipe FRP Partition successfully Removed by Hydra Tool

Screen Short:



Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode Preloader
FriendlyName :MediaTek PreLoader USB VCOM_V1632 (Android) (COM28)
SymbolicName :\??\USB#VID_0E8D&PID_2000#8&272be523&0&4#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0


Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 64F7C2DFDCC4E0F83B37FD61E976079C
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 15010052483634414205436D07284585 - RH64AB

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Brand : GOME
Vendor : Techain
Model : GOME_C7_Note_Plus
ID : O11019
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : GOME_C7_Note-user 8.1.0 O11019 1544536262 release-keys
Device : GOME_C7_Note_Plus
Display ID : C7_Note_Plus_IND_00_V1.0
Security Patch : 2018-11-05
Fingerprint : GOME/GOME_C7_Note_Plus/GOME_C7_Note_Plus:8.1.0/O11019/1544536262:user/release-keys
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition... Ok

Elapsed Time : 00:00:04
BR
Dipendra Pathak

  Reply With Quote
Old 04-12-2021, 04:08   #1671 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Techno IN2 FRP successfully removed by Hydra Tool

Techno IN2 FRP successfully removed by Hydra Tool

Screen Short:



Logs:

Quote:
Searching for MTK Device...Found
Port Identification :Flashmode Preloader
FriendlyName :MediaTek PreLoader USB VCOM_V1632 (Android) (COM6)
SymbolicName :\??\USB#VID_0E8D&PID_2000#6&4817b6d&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0


Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 3B449EA9865B02E41BF706BF3278A6D6
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003A3E00000 -14.561 GB
eMMC CID : 150100514536334D42031F5907E635BB - QE63MB

Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info
Brand : TECNO
Vendor : TECNO MOBILE LIMITED
Model : TECNO IN2
ID : O11019
SDK : 27
Release : 8.1.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-US
Description : full_in2_h391-user 8.1.0 O11019 1561030961 release-keys
Device : TECNO-IN2
Display ID : IN2-H391A-O-190620V231
Security Patch : 2019-06-05
Fingerprint : TECNO/H391/TECNO-IN2:8.1.0/O11019/A-190620V231:user/release-keys
StorageType : mtp
Userdata State : Encrypted

Format Selected Partition
Formatting [frp] Ok!
Formatting [userdata] Ok!
=====================================

Elapsed Time : 00:00:07
BR
Dipendra Pathak

  Reply With Quote
Old 04-13-2021, 05:02   #1672 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Asus ROG 5 successfully flashed by Hydra Tool

Screen Short:



Logs:

Quote:
Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM35)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&1116a2db&0&2#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :03/25/2016,2.1.2.2

Getting device info......
Serial No.: 0x03C5DF77
MSM ID : 0x001350E1, SM_LAHAINA-
PBL Ver : 00000000
PK HASH : 94FD305DC42B32552A096000B1FC16AA
117D48D14C8D04B137C6F5A3A3C536F1

Firehose Loader[prog_firehose_lite.elf]
SaharaBoot... Ok
Sending ...............................................Ok
Connecting to Firehose...
Ping...................... Ok
Configuration.........
Ok
Chip Configuration :
MemoryName : UFS
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Nov 17 2020 - 17:00:53

*** STORAGE DEVICE INFO ***
Memory Type : UFS
Block Size in Bytes : 4096
Page Size : 4096
Manufacturer ID : 462
Serial Number : 1297306958
Firmware Version : 100
Product Name : KLUEG8UHDC-B0E1
Physical Partitions : 7
Total Logical Blocks:
Drive [0] 61865984[236 GB]
Drive [1] 2048[8 MB]
Drive [2] 2048[8 MB]
Drive [3] 2048[8 MB]
Drive [4] 589824[2,25 GB]
Drive [5] 8192[32 MB]
Drive [6] 8192[32 MB]

Protocol : Universal
Running : Ok

Phone Information.
Failed to read information from phone.


----------------------------
Flashing Selected Partitions....
- persist(0)[persist.img] Ok
- factory(0)[persist.img] Ok
- batinfo(0)[batinfo.img] Ok
- asdf(0)[asdf_384M.img] Ok
- ADF(0)[ADF.img] Ok
- APD(0)[APD.img] Ok
- asusfw_a(0)[asusfw.img] Ok
- asusfw_b(0)[asusfw.img] Ok
- xrom_a(0)[OPEN-xrom_1.img] Ok
- xrom_a(0)[OPEN-xrom_2.img] Ok
- xrom_a(0)[OPEN-xrom_3.img] Ok
- xrom_a(0)[OPEN-xrom_4.img] Ok
- xrom_a(0)[OPEN-xrom_5.img] Ok
- xrom_a(0)[OPEN-xrom_6.img] Ok
- xrom_b(0)[OPEN-xrom_1.img] Ok
- xrom_b(0)[OPEN-xrom_2.img] Ok
- xrom_b(0)[OPEN-xrom_3.img] Ok
- xrom_b(0)[OPEN-xrom_4.img] Ok
- xrom_b(0)[OPEN-xrom_5.img] Ok
- xrom_b(0)[OPEN-xrom_6.img] Ok
- super(0)[super_1.img] Ok
- super(0)[super_2.img] Ok
- super(0)[super_3.img] Ok
- super(0)[super_4.img] Ok
- super(0)[super_5.img] Ok
- super(0)[super_6.img] Ok
- vbmeta_system_a(0)[vbmeta_system.img] Ok
- vbmeta_system_b(0)[vbmeta_system.img] Ok
- userdata(0)[userdata_1.img] Ok
- userdata(0)[userdata_2.img] Ok
- userdata(0)[userdata_3.img] Ok
- userdata(0)[userdata_4.img] Ok
- userdata(0)[userdata_5.img] Ok
- userdata(0)[userdata_6.img] Ok
- userdata(0)[userdata_7.img] Ok
- userdata(0)[userdata_8.img] Ok
- userdata(0)[userdata_9.img] Ok
- userdata(0)[userdata_10.img] Ok
- PrimaryGPT(0)[gpt_main0.bin] Ok
- xbl_a(1)[xbl.elf] Ok
- xbl_config_a(1)[xbl_config.elf] Ok
- PrimaryGPT(1)[gpt_main1.bin] Ok
- xbl_b(2)[xbl.elf] Ok
- xbl_config_b(2)[xbl_config.elf] Ok
- PrimaryGPT(2)[gpt_main2.bin] Ok
- ddr(3)[dummy_ddr.bin] Ok
- PrimaryGPT(3)[gpt_main3.bin] Ok
- aop_a(4)[aop.mbn] Ok
- tz_a(4)[tz.mbn] Ok
- hyp_a(4)[hypvm.mbn] Ok
- modem_a(4)[NON-HLOS.bin] Ok
- bluetooth_a(4)[BTFM.bin] Ok
- abl_a(4)[abl.elf] Ok
- dsp_a(4)[dspso.bin] Ok
- keymaster_a(4)[km41.mbn] Ok
- boot_a(4)[boot.img] Ok
- devcfg_a(4)[devcfg.mbn] Ok
- qupfw_a(4)[qupv3fw.elf] Ok
- vbmeta_a(4)[vbmeta.img] Ok
- dtbo_a(4)[dtbo.img] Ok
- uefisecapp_a(4)[uefi_sec.mbn] Ok
- shrm_a(4)[shrm.elf] Ok
- multiimgoem_a(4)[multi_image.mbn] Ok
- cpucp_a(4)[cpucp.elf] Ok
- featenabler_a(4)[featenabler.mbn] Ok
- vendor_boot_a(4)[vendor_boot.img] Ok
- qweslicstore_a(4)[qweslicstore.bin] Ok
- aop_b(4)[aop.mbn] Ok
- tz_b(4)[tz.mbn] Ok
- hyp_b(4)[hypvm.mbn] Ok
- modem_b(4)[NON-HLOS.bin] Ok
- bluetooth_b(4)[BTFM.bin] Ok
- abl_b(4)[abl.elf] Ok
- dsp_b(4)[dspso.bin] Ok
- keymaster_b(4)[km41.mbn] Ok
- boot_b(4)[boot.img] Ok
- devcfg_b(4)[devcfg.mbn] Ok
- qupfw_b(4)[qupv3fw.elf] Ok
- vbmeta_b(4)[vbmeta.img] Ok
- dtbo_b(4)[dtbo.img] Ok
- uefisecapp_b(4)[uefi_sec.mbn] Ok
- shrm_b(4)[shrm.elf] Ok
- multiimgoem_b(4)[multi_image.mbn] Ok
- cpucp_b(4)[cpucp.elf] Ok
- featenabler_b(4)[featenabler.mbn] Ok
- vendor_boot_b(4)[vendor_boot.img] Ok
- qweslicstore_b(4)[qweslicstore.bin] Ok
- logfs(4)[logfs_ufs_8mb.bin] Ok
- storsec(4)[storsec.mbn] Ok
- secdata(4)[sec.elf] Ok
- spunvm(4)[spunvm.bin] Ok
- rtice(4)[rtice.mbn] Ok
- PrimaryGPT(4)[gpt_main4.bin] Ok
- modemst1(5)[dummy_fsg] Ok
- modemst2(5)[dummy_fsg] Ok
- fsg(5)[fs_image.tar.gz.mbn_cn.img] Ok
- fsgCA(5)[fs_image.tar.gz.mbn.img] Ok
- fsc(5)[cookie_untar.bin] Ok
- PrimaryGPT(5)[gpt_main5.bin] Ok
- PrimaryGPT(6)[gpt_main6.bin] Ok

Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-6.] OK
0 [NUM_DISK_SECTORS-6.] OK
0 [NUM_DISK_SECTORS-6.] OK
0 [NUM_DISK_SECTORS-6.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-5.] OK
0 [CRC32(2,4096)] OK
0 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
0 [0] OK
0 [CRC32(1,92)] OK
0 [0] OK
0 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
1 [NUM_DISK_SECTORS-6.] OK
1 [NUM_DISK_SECTORS-6.] OK
1 [NUM_DISK_SECTORS-6.] OK
1 [NUM_DISK_SECTORS-6.] OK
1 [NUM_DISK_SECTORS-1.] OK
1 [NUM_DISK_SECTORS-1.] OK
1 [NUM_DISK_SECTORS-5.] OK
1 [CRC32(2,4096)] OK
1 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
1 [0] OK
1 [CRC32(1,92)] OK
1 [0] OK
1 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
2 [NUM_DISK_SECTORS-6.] OK
2 [NUM_DISK_SECTORS-6.] OK
2 [NUM_DISK_SECTORS-6.] OK
2 [NUM_DISK_SECTORS-6.] OK
2 [NUM_DISK_SECTORS-1.] OK
2 [NUM_DISK_SECTORS-1.] OK
2 [NUM_DISK_SECTORS-5.] OK
2 [CRC32(2,4096)] OK
2 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
2 [0] OK
2 [CRC32(1,92)] OK
2 [0] OK
2 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
3 [NUM_DISK_SECTORS-6.] OK
3 [NUM_DISK_SECTORS-6.] OK
3 [NUM_DISK_SECTORS-6.] OK
3 [NUM_DISK_SECTORS-6.] OK
3 [NUM_DISK_SECTORS-1.] OK
3 [NUM_DISK_SECTORS-1.] OK
3 [NUM_DISK_SECTORS-5.] OK
3 [CRC32(2,4096)] OK
3 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
3 [0] OK
3 [CRC32(1,92)] OK
3 [0] OK
3 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
4 [NUM_DISK_SECTORS-6.] OK
4 [NUM_DISK_SECTORS-6.] OK
4 [NUM_DISK_SECTORS-6.] OK
4 [NUM_DISK_SECTORS-6.] OK
4 [NUM_DISK_SECTORS-1.] OK
4 [NUM_DISK_SECTORS-1.] OK
4 [NUM_DISK_SECTORS-5.] OK
4 [CRC32(2,12288)] OK
4 [CRC32(NUM_DISK_SECTORS-5.,12288)] OK
4 [0] OK
4 [CRC32(1,92)] OK
4 [0] OK
4 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
5 [NUM_DISK_SECTORS-6.] OK
5 [NUM_DISK_SECTORS-6.] OK
5 [NUM_DISK_SECTORS-6.] OK
5 [NUM_DISK_SECTORS-6.] OK
5 [NUM_DISK_SECTORS-1.] OK
5 [NUM_DISK_SECTORS-1.] OK
5 [NUM_DISK_SECTORS-5.] OK
5 [CRC32(2,4096)] OK
5 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
5 [0] OK
5 [CRC32(1,92)] OK
5 [0] OK
5 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
6 [NUM_DISK_SECTORS-6.] OK
6 [NUM_DISK_SECTORS-6.] OK
6 [NUM_DISK_SECTORS-6.] OK
6 [NUM_DISK_SECTORS-6.] OK
6 [NUM_DISK_SECTORS-1.] OK
6 [NUM_DISK_SECTORS-1.] OK
6 [NUM_DISK_SECTORS-5.] OK
6 [CRC32(2,4096)] OK
6 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
6 [0] OK
6 [CRC32(1,92)] OK
6 [0] OK
6 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 1
Set bootable storage drive 1 Ok

Rebooting Phone.... Ok

Elapsed Time : 00:16:14
BR
Dipendra Pathak

  Reply With Quote
Old 04-13-2021, 05:10   #1673 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Xiaomi Note 5A Mi Account successfully removed by Hydra Tool

Xiaomi Note 5A Mi Account successfully removed by Hydra Tool

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : AUTO Model : AUTO Storage : Auto
Loader: Auto
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM3)
SymbolicName :\??\USB#VID_05C6&PID_9008#6&3477b93e&0&14#{a5dcbf 10-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/02/2017,2.1.2.7

Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8917
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 19
Serial Number : 119111251
Firmware Version : 84
Product Name : Q3J96R
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 30777344[14.676 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok
Reading GPT[3]
Drive [0] 48 Items
Drive [1] 0 Items
Drive [2] 0 Items


Phone Information.....
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi Note 5A
ID : N2G47H
SDK : 25
Release : 7.1.2
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : ugglite-user 7.1.2 N2G47H V11.0.3.0.NDFMIXM release-keys
Miui Ver : V11
Device : ugglite
Mod_device : ugglite_global
Board : QC_Reference_Phone
Display ID : N2G47H
Security Patch : 2019-08-01
Emmc_size : 16GB
Platform : msm8937
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : xiaomi/ugglite/ugglite:7.1.2/N2G47H/V11.0.3.0.NDFMIXM:user/release-keys

Processing Remove MiAccount[New Method]....
Backing up Partition for safety...Ok

Scanning Patching address...Done!!
No patching address available...
Seems like device has no Mi Account added....
Action Result : Ok

Rebooting Phone.... Ok

Elapsed Time : 00:00:18
BR
Dipendra Pathak

  Reply With Quote
Old 04-13-2021, 05:47   #1674 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Xiaomi Redmi Note 9 Mrelin IMEI successfully repaired by Hydra Tool

Xiaomi Redmi Note 9 Mrelin IMEI successfully repaired by Hydra Tool

Screen Short:



Logs:

Quote:
=====================================
***IMEI REPAIR FUNCTION****
Xiaomi Flashmode
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port (COM19)
SymbolicName :\??\USB#VID_0E8D&PID_0003#5&1b065f01&0&1#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2016,3.2


Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 930066EA95704D7E13D49B486E801AAA
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000001D1F000000 -116,484 GB
eMMC CID : 13014E47314A3953391008A42345779B - G1J9S9

Reading GPT-EMMC [0x00008000] 130 Items

IMEI INFO..
IMEI1 : 86*************
IMEI2 : 86**********979
IMEI INFO..
IMEI1 : FFFFFFFFFFFFFFF
IMEI2 : **************5*2

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:06
BR
Dipendra Pathak

  Reply With Quote
Old 04-13-2021, 05:58   #1675 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Vivo Y11 (1906) Forced erased to remove FRP successfully done by Hydra Tool

Vivo Y11 (1906) Forced erased to remove FRP successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : VIVO Model : Y11 (1906) Storage : Auto
Loader: Vivo_Y11.elf
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM7)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&d2fa260&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :11/06/2015,2.0.7.1

Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 1460126277
Firmware Version : 1
Product Name : QD63MB
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 61071360[29.121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok
Reading GPT[3]
Drive [0] 60 Items
Drive [1] 0 Items
Drive [2] 0 Items


Phone Information......
Brand : vivo
Vendor : vivo
Model : vivo 1906
ID : PKQ1.190616.001
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : msm8937_64-user 9 PKQ1.190616.001 compiler09101835 release-keys
Device : PD1930F_EX
Display ID : PKQ1.190616.001 release-keys
Security Patch : 2020-08-01
Emmc_size : 16GB
Platform : =SDM439
Fingerprint : vivo/1906/1906:9/PKQ1.190616.001/compiler09101835:user/release-keys

Processing Forced Erase....
- Removing FRP [Auto] Ok
- Forced Erase Userdata
Action Result : Ok

Rebooting Phone.... Ok

Elapsed Time : 00:00:13
BR
Dipendra Pathak

  Reply With Quote
Old 04-13-2021, 06:18   #1676 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Huawei FRL-L23 (Y9A 2021) TWO IMEI successfully repaired by Hydra Tool

Huawei FRL-L23 (Y9A 2021) TWO IMEI successfully repaired by Hydra Tool

Screen Short:



Logs:

Quote:
====================================
***IMEI REPAIR FUNCTION****
Huawei Flashmode
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port (COM10)
SymbolicName :\??\USB#VID_0E8D&PID_0003#5&16199b29&0&2#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2016,3.2

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0707MT6768[6768]
BROM HW_SW_VER : 8A00 CA00 0000 0000
getMTKPayloadExploit : 0707
#Executing Exploit..
#SUCCESS..
Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0707MT6768[6768]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
SECURE VERSION : 05
BL VERSION : FE
BR Secured : E0

Preparing Download Agent..
DA : MT6768_Xiaomi_New.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2020/07/07.10:10_513994
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_k69v1_64.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : DA131AE245AEA776939052B07FADD7CD
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000001D1EC00000 -116.48 GB
eMMC CID : 1501004455544234320275C5BCE487A5 - DUTB42

DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_k69v1_64.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0707__041221175500\MT6768_Androi d_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x01A08000]1024 KB ->frp.bin...Ok
-nvdata[0x03B08000]32 MB ->nvdata.bin...Ok
-persist[0x07800000]8 MB ->persist.bin...Ok
-nvram[0x08100000]21 MB ->nvram.bin...Ok
-oeminfo[0x09600000]32 MB ->oeminfo.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0707__041221175500
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : DA131AE245AEA776939052B07FADD7CD
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000001D1EC00000 -116.48 GB
eMMC CID : 1501004455544234320275C5BCE487A5 - DUTB42

Reading GPT-EMMC [0x00008000] 130 Items
IMEI INFO..
IMEI1 : 869062050923143
IMEI2 : FFFFFFFFFFFFFFF
Repairing HUWEI IMEI....

OLD IMEI..
IMEI1 : 86*************43
IMEI2 : FFFFFFFFFFFFFFF

NEW IMEI..
IMEI1 : 86***********58
IMEI2 : 86***********31
Done!!!!

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:01:01
BR
Dipendra Pathak

  Reply With Quote
Old 04-13-2021, 08:21   #1677 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Xiaomi Redmi Note 8 Ginkgo Mi account Patched successfully done by Hydra Tool

Xiaomi Redmi Note 8 Ginkgo Mi account Patched successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : XIAOMI Model : Redmi Note 8 (ginkgo) Storage : Auto
Loader: Xiaomi_redminote8_loader.elf
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Quectel QDLoader 9008 (COM10)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&2cdb33c3&0&3#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :04/28/2018,5.0.1.5

Getting device info......
Serial No.: 0x25D1338F
MSM ID : 0x0010A0E1, SM6125-Qualcomm Snapdragon 665
PBL Ver : 00000000
PK HASH : 1BEBE3863A6781DB4B01086063007334
DE9E5CA14971C7C4F4358EC9D79CDA46

Firehose Loader[Xiaomi_redminote8_loader.elf]
SaharaBoot... Ok
Sending ..............................Ok
Connecting to Firehose...
Ping..................... Ok
Configuration.........
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Jul 3 2019 - 22:23:56

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 19
Serial Number : 329730362
Firmware Version : 4
Product Name : S0J9K8
Physical Partitions : 4
Total Logical Blocks:
Drive [0] 122142720[58.242 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Drive [3] 32768[16 MB]

Protocol : Universal
Running : Ok
Reading GPT[4]
Drive [0] 88 Items
Drive [1] 0 Items
Drive [2] 0 Items
Drive [3]


Phone Information......
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi Note 8
ID : PKQ1.190616.001
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : ginkgo-user 9 PKQ1.190616.001 V10.3.13.0.PCOMXTC release-keys
Miui Ver : V10
Device : ginkgo
Mod_device : ginkgo_mx_tc_global
Display ID : PKQ1.190616.001
Security Patch : 2021-01-01
Fingerprint : xiaomi/ginkgo/ginkgo:9/PKQ1.190616.001/V10.3.13.0.PCOMXTC:user/release-keys

Processing Remove MiAccount[New Method]....
Backing up Partition for safety...Ok

Scanning Patching address...
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]Done!!
Total Items patched : 33
Successfully patched address..
Action Result : Ok

Elapsed Time : 00:04:19
BR
Dipendra Pathak

  Reply With Quote
Old 04-13-2021, 08:31   #1678 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Xiaomi Redmi Note 5 Pro Whyred Universal Auto Unlok successfully done by Hydra Tool

Xiaomi Redmi Note 5 Pro Whyred Universal Auto Unlok successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : XIAOMI Model : Redmi Note 5 Pro (Whyred) Storage : Auto
Loader: mi_2_9.elf
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM53)
SymbolicName :\??\USB#VID_05C6&PID_9008#6&19a80169&0&1#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :03/25/2016,2.1.2.2

Getting device info......
Serial No.: 0xCA4D0EA8
MSM ID : 0x000CC0E1,
PBL Ver : 00000000
PK HASH : A7B8B82545A98ECA23D6E9105FB46456
8D1B5828264903441BDEF0CD57E3C370

Firehose Loader[mi_2_9.elf]
SaharaBoot... Ok
Sending ...............................Ok
Connecting to Firehose...
Ping......... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : MSM8996
Version : 1
DateTime : Aug 2 2018 - 22:27:53

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 3760164958
Firmware Version : 5
Product Name : DH6DMB
Physical Partitions : 4
Total Logical Blocks:
Drive [0] 122142720[58,242 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Drive [3] 8192[4 MB]

Protocol : Universal
Running : Ok
Reading GPT[4]
Drive [0] 64 Items
Drive [1] 0 Items
Drive [2] 0 Items
Drive [3]


Phone Information.....
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi Note 5
ID : PKQ1.180904.001
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : whyred-user 9 PKQ1.180904.001 V11.0.3.0.PEIMIXM release-keys
Miui Ver : V11
Device : whyred
Mod_device : whyred_global
Display ID : PKQ1.180904.001
Security Patch : 2019-11-05
Fingerprint : xiaomi/whyred/whyred:9/PKQ1.180904.001/V11.0.3.0.PEIMIXM:user/release-keys

Processing Unlock - Universal - Auto....
Action Result : Ok

Elapsed Time : 00:00:12
BR
Dipendra Pathak

  Reply With Quote
Old 04-14-2021, 06:21   #1679 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
MTK Device Lava Iris 65 super fast and successfully Flashed by Hydra Tool

MTK Device Lava Iris 65 super fast and successfully Flashed by Hydra Tool

Screen Short:



Logs:

Quote:
Hydra MediaTeK Tool Ver 1.0.3 Build 20
Windows 10 (Version 10.0, Build 19042, 32-bit Edition)
Intel(R) Core(TM)2 Duo CPU E7400 @ 2.80GHz
Intel(R) G41 Express Chipset (Microsoft Corporation - WDDM 1.1)
Ram Installed : 3 GB
Windows Access Right Admin
Software Run As Admnistrator
******* Dongle Info *******
Version : Hydra Tool v 1.2
Serial : *************
Initialize : OKAY
Status : Activated
Life : 0 [0-0-0-0-0]


Brand : AUTO Model : AUTO Connection : Flash Mode

=====================================
How To Boot : Power off phone
* BROM Mode : Press VOL + or Press VOL -+
* Preloader Mode : Just Insert cable

Searching for MTK Device...Found
Port Identification :Flashmode Preloader
FriendlyName :MediaTek PreLoader USB VCOM_V1632 (Android) (COM70)
SymbolicName :\??\USB#VID_0E8D&PID_2000#5&a713703&2&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0


Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0699MT6739[6739]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
SECURE VERSION : 00
BL VERSION : 03
BR Secured : 00

Preparing Download Agent..
DA : 6739.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2020-11-03.22:07_536568
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : preloader

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 86B8E516C3736E2D7D9FF5227155C57A
ERAM Size : 0x0000000000020000 -128 KB
IRAM Size : 0x0000000040000000 -1024 MB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000080000 -512 KB
eMMC USER : 0x00000001D2000000 -7.281 GB
eMMC CID : 150100464E36324D4203768B90EE5543 - FN62MB

DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info
Brand : LAVA
Vendor : LAVA
Model : iris65
ID : O11019
SDK : 27
Release : 8.1.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-US
Description : full_lava6739_sp65-user 8.1.0 O11019 1521873769 dev-keys
Device : iris65
Display ID : LAVA_iris65_TH_S105_18C24
Security Patch : 2018-03-05
Fingerprint : alps/full_lava6739_sp65/lava6739_sp65:8.1.0/O11019/1521873769:user/dev-keys
StorageType : mtp
Userdata State : Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_lava6739_sp65.bin
Creating Scatter file... C:\Program Files\HydraTool\\Backup\Auto\0699_alps_full_lava67 39_sp65_lava6739_sp65_8.1.0_O11019_1521873769_user _dev-keys_041421103855\MT6739_Android_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x02D88000]1024 KB ->frp.bin...Ok
-nvdata[0x03688000]32 MB ->nvdata.bin...Ok
-nvram[0x10700000]5 MB ->nvram.bin...Ok
Done!!!
C:\Program Files\HydraTool\\Backup\Auto\0699_alps_full_lava67 39_sp65_lava6739_sp65_8.1.0_O11019_1521873769_user _dev-keys_041421103855
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 86B8E516C3736E2D7D9FF5227155C57A
ERAM Size : 0x0000000000020000 -128 KB
IRAM Size : 0x0000000040000000 -1024 MB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000080000 -512 KB
eMMC USER : 0x00000001D2000000 -7.281 GB
eMMC CID : 150100464E36324D4203768B90EE5543 - FN62MB

Reading GPT-EMMC [0x00008000] 130 Items

Flashing Selected Partitions....
- preloader[preloader_lava6739_sp65.bin] 256 KB Skipped
- recovery[recovery.img] 24 MB Flash -> = Ok
- md1img[md1rom.img] 64 MB Flash -> = Ok
- md1dsp[md1dsp.img] 16 MB Flash -> = Ok
- spmfw[spmfw.img] 1024 KB Flash -> = Ok
- mcupmfw[mcupmfw.img] 1024 KB Flash -> = Ok
- lk[lk.bin] 1024 KB Flash -> = Ok
- lk2[lk.bin] 1024 KB Flash -> = Ok
- boot[boot.img] 24 MB Flash -> = Ok
- logo[logo.bin] 8 MB Flash -> = Ok
- odmdtbo[odmdtbo.img] 16 MB Flash -> = Ok
- tee1[trustzone.bin] 5 MB Flash -> = Ok
- tee2[trustzone.bin] 12.875 MB Flash -> = Ok
- vendor[vendor.img] 456 MB Flash -> = Ok
- system[system.img] 1024 MB Flash -> = Ok
- cache[cache.img] 112 MB Flash -> = Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!
=====================================

Elapsed Time : 00:02:10



Out with the old, in with the new: may you be happy the whole year through. HAPPY NEW NEPALI NEW YEAR 2078.


BR
Dipendra Pathak

  Reply With Quote
Old 04-14-2021, 14:52   #1680 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Xiaomi Redmi Note 5 Mi Account successfully patched by Hydra Tool

Xiaomi Redmi Note 5 Mi Account successfully patched by Hydra Tool

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : AUTO Model : AUTO Storage : Auto
Loader: Auto
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM3)
SymbolicName :\??\USB#VID_05C6&PID_9008#6&3a6a7fd9&0&2#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/31/2015,2.1.2.0

Getting device info......
Serial No.: 0x93E21F47
MSM ID : 0x0006B0E1, MSM8940-Qualcomm Snapdragon 435
PBL Ver : 00000000
PK HASH : 57158EAF1814D78FD2B3105ECE4DB18A
817A08AC664A5782A925F3FF8403D39A

Firehose Loader[mi_1_9.mbn]
SaharaBoot... Ok
Sending .....................Ok
Connecting to Firehose...
Ping... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 69
Serial Number : 2291703099
Firmware Version : 2314907615826620721
Product Name : DL2032
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 61071360[29,121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok
Reading GPT[3]
Drive [0] 48 Items
Drive [1] 0 Items
Drive [2] 0 Items


Phone Information.....
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi Note 5A
ID : N2G47H
SDK : 25
Release : 7.1.2
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : ugg-user 7.1.2 N2G47H V10.3.1.0.NDKMIXM release-keys
Miui Ver : V10
Device : ugg
Mod_device : ugg_global
Board : QC_Reference_Phone
Display ID : N2G47H
Security Patch : 2019-06-01
Emmc_size : 16GB
Platform : msm8937
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : xiaomi/ugg/ugg:7.1.2/N2G47H/V10.3.1.0.NDKMIXM:user/release-keys

Processing Remove MiAccount[New Method]....
Backing up Partition for safety...Ok

Scanning Patching address...
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]Done!!
Total Items patched : 6
Successfully patched address..
Failed to find persistbakpartition
Action Result : Ok

Elapsed Time : 00:00:26


* All Firmware versions are supported.
* Few steps to remove or disable to remove Mi Account.
* No need credit to disable or remove Mi-account.
* No need server Authentication to unlock or disable Mi-Account
* Permanently disables Mi Account
* No re-lock even you reset the device (mobile / cellphone)

BR
Dipendra Pathak

  Reply With Quote
Reply

Bookmarks


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


 



All times are GMT +1. The time now is 13:22.



Powered by Searchlight © 2024 Axivo Inc.
vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2024 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2023 -
Page generated in 0.47442 seconds with 9 queries

SEO by vBSEO