GSM Shop GSM Shop
GSM-Forum  

Welcome to the GSM-Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features.
Only registered members may post questions, contact other members or search our database of over 8 million posts.

Registration is fast, simple and absolutely free so please - Click to REGISTER!

If you have any problems with the registration process or your account login, please contact contact us .

Go Back   GSM-Forum > Product Support Sections > Special Solutions / Services / WebShop > GSMFABRICA Products > HYDRA TOOL


Reply
 
LinkBack Thread Tools Display Modes
Old 04-16-2021, 01:56   #1696 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Infinix X657c smart 5 formatted successfully with DA file by Hydra Tool


Infinix X657c smart 5 formatted successfully with DA file by Hydra Tool

Screen Short:



Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port (COM14)
SymbolicName :\??\USB#VID_0E8D&PID_0003#5&2d60c56e&0&6#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :09/11/2014,3.0.1437.1


Reading Device UniqueID, RAM and Flash Chip Info...
ERROR : ACK : 0x00010009[]

Reading GPT-EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Erase Userdata
Processing...
Formatting Userdata... Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:03
BR
Dipendra Pathak

  Reply With Quote
Old 04-16-2021, 02:16   #1697 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Xiaomi Redmi Note 9 Merlin wiping selected partition successfully done by Hydra Tool

Xiaomi Redmi Note 9 Merlin wiping selected partition successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port (COM23)
SymbolicName :\??\USB#VID_0E8D&PID_0003#5&2108ad5d&0&8#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2016,3.2


Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 1EC99ED9A880A4FCC486B6B3E1FB94EB
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000001D1F000000 -116,484 GB
eMMC CID : 13014E47314A395339100573D3F15743 - G1J9S9

Reading GPT-EMMC [0x00008000] 130 Items

Format Selected Partition
Wiping... [frp] Ok!
Wiping... [persist] Ok!
=====================================

Elapsed Time : 00:00:04
BR
Dipendra Pathak

  Reply With Quote
Old 04-17-2021, 01:27   #1698 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Xiaomi Mi Mix 3 Perseus Universal Auto Unlock Successfully done by Hydra Tool

Xiaomi Mi Mix 3 Perseus Universal Auto Unlock Successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : XIAOMI Model : Mi Mix 3 (perseus) Storage : Auto
Loader: Xiaomi_Mix 3_firehose_sdm845_ddr.elf
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM4)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&22ed776c&0&3#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :12/17/2018,2.1.3.5

Getting device info......
Serial No.: 0xD18A02BA
MSM ID : 0x0008B0E1, SDM845-Qualcomm Snapdragon 845
PBL Ver : 00000000
PK HASH : C924A35F39CE1CDD1B8D5A9F3B8E3C51
317930431D7A9DD5A55028CF6965FE65

Firehose Loader[Xiaomi_Mix 3_firehose_sdm845_ddr.elf]
SaharaBoot... Ok
Sending ....................................Ok
Connecting to Firehose...
Ping..................... Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[z3
Checking Internet connection....
- Hydra Is Online
Connecting to Hydra Xiaomi Server...

Signature @256bytes Authentication.... Accepted........
Identifying Chip........UFS
Ok
Chip Configuration :
MemoryName : UFS
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Oct 22 2018 - 19:22:16

*** STORAGE DEVICE INFO ***
Memory Type : UFS
Block Size in Bytes : 4096
Page Size : 4096
Manufacturer ID : 325
Serial Number : 538976288
Firmware Version : 254
Product Name : SDINDDH4-128G 1254
Physical Partitions : 6
Total Logical Blocks:
Drive [0] 29917184[114.125 GB]
Drive [1] 2048[8 MB]
Drive [2] 2048[8 MB]
Drive [3] 8192[32 MB]
Drive [4] 1310720[5 GB]
Drive [5] 8192[32 MB]

Protocol : Universal
Running : Ok
Reading GPT[6]
Drive [0] 32 Items
Drive [1] 32 Items
Drive [2] 32 Items
Drive [3] 32 Items
Drive [4] 64 Items
Drive [5] 32 Items


Phone Information......
Vendor : Xiaomi
ID : QKQ1.190828.002
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Miui Ver : V12
Mod_device : perseus_global
Security Patch : 2020-10-01

Processing Unlock - Universal - Auto....
Action Result : Ok

Elapsed Time : 00:00:20
BR
Dipendra Pathak

  Reply With Quote
Old 04-17-2021, 01:31   #1699 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Xiaomi Redmi 7A Pine Zero Wipe FRP successfully Removed by Hydra Tool

Xiaomi Redmi 7A Pine Zero Wipe FRP successfully Removed by Hydra Tool

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : XIAOMI Model : Redmi 7A (pine) Storage : Auto
Loader: Xiaomi_Redmi_8_Olive.mbn
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM14)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&212ac8fc&0&6#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/02/2017,2.1.2.7

Getting device info......
Serial No.: 0xC9B43024
MSM ID : 0x000BF0E1, SDM439-Qualcomm Snapdragon 439
PBL Ver : 00000000
PK HASH : 57158EAF1814D78FD2B3105ECE4DB18A
817A08AC664A5782A925F3FF8403D39A

Firehose Loader[Xiaomi_Redmi_8_Olive.mbn]
SaharaBoot... Ok
Sending .......................Ok
Connecting to Firehose...
Ping... Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[pTWZJEPV4SNAiEOZQWlLAWFGzRj]
Checking Internet connection....
- Hydra Is Online
Connecting to Hydra Xiaomi Server...

Signature @256bytes Authentication.... Accepted......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 1011550637
Firmware Version : 165
Product Name : HAG4a2
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 30777344[14.676 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok

Phone Information......
Brand : Xiaomi
Vendor : Xiaomi
Model : Redmi 7A
ID : PKQ1.190319.001
SDK : 28
Release : 9
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-GB
Description : pine-user 9 PKQ1.190319.001 V11.0.7.0.PCMMIXM release-keys
Miui Ver : V11
Device : pine
Mod_device : pine_global
Display ID : ZQL1533-pine-build-20200407194230
Security Patch : 2020-03-01
Emmc_size : 16GB
Fingerprint : Xiaomi/pine/pine:9/PKQ1.190319.001/V11.0.7.0.PCMMIXM:user/release-keys

Reading GPT[3]
Drive [0] 60 Items
Drive [1] 0 Items
Drive [2] 0 Items

Removing FRPta...
Method :
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOkOk

Elapsed Time : 00:00:14
BR
Dipendra Pathak

  Reply With Quote
Old 04-17-2021, 01:39   #1700 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Xiaomi Redmi Note 9 Merlin IMEI repaird successfully done by Hydra Tool

Xiaomi Redmi Note 9 Merlin IMEI repaird successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
=====================================
***IMEI REPAIR FUNCTION****
Xiaomi Flashmode
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port (COM14)
SymbolicName :\??\USB#VID_0E8D&PID_0003#5&2dadc828&0&2#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0707MT6768[6768]
BROM HW_SW_VER : 8A00 CA00 0000 0000
getMTKPayloadExploit : 0707
#Executing Exploit..
#SUCCESS..
Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0707MT6768[6768]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
SECURE VERSION : 05
BL VERSION : FE
BR Secured : E0

Preparing Download Agent..
DA : MT6768_Xiaomi_New.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2020/07/07.10:10_513994
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_merlin.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 059D0B65ABAF4BBF15621544C6BA99DA
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58,242 GB
eMMC CID : 13014E53304A394A38101EB946B377EF - S0J9J8

DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_merlin.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0707__041521165443\MT6768_Androi d_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x05508000]1024 KB ->frp.bin...Ok
-nvdata[0x0C4A2000]64 MB ->nvdata.bin...Ok
-persist[0x104A2000]48 MB ->persist.bin...Ok
-nvram[0x19F80000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0707__041521165443
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 059D0B65ABAF4BBF15621544C6BA99DA
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58,242 GB
eMMC CID : 13014E53304A394A38101EB946B377EF - S0J9J8

Reading GPT-EMMC [0x00008000] 130 Items

IMEI INFO..
IMEI1 : FFFFFFFFFFFFFFF
IMEI2 : **************87
IMEI INFO..
IMEI1 : FFFFFFFFFFFFFFF
IMEI2 : **************28

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:01:02
BR
Dipendra Pathak

  Reply With Quote
Old 04-17-2021, 01:45   #1701 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Xiaomi Redmi Note 8 Pro Begonia Backup Partition successfully done by Hydra Tool

Xiaomi Redmi Note 8 Pro Begonia Backup Partition successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port (COM19)
SymbolicName :\??\USB#VID_0E8D&PID_0003#5&1330824a&0&2#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2016,3.2


Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : FF30907ECFAFE8BD8387267D1728FE08
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x0000000180000000 -6 GB
UFS LU0 Size: 0x0000000000400000 -4 MB
UFS LU1 Size: 0x0000000000400000 -4 MB
UFS LU2 Size: 0x0000001DCB000000 -119.172 GB
UFS CID : Ī?KM2V8001CM-B707
UFS UNIQID : 00330038006500380036003300330030

Reading GPT-UFS [0x00008000] 130 Items


Reading System Info
Vendor : Xiaomi
ID : QP1A.190711.020
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : begonia-user 10 QP1A.190711.020 V12.0.6.0.QGGMIXM release-keys
Miui Ver : V12
Mod_device : begonia_global
Display ID : QP1A.190711.020
Security Patch : 2020-12-01
StorageType : mtp
Userdata State : Not Encrypted

-------------------------------------
Operation : Backup All By Partitions Except Userdata
Processing...

Reading Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_begonia.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Full\__0813--10(QP1A.190711.020)_150421111220\MT6785_Android_sc atter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-recovery[0x00008000]64 MB ->recovery.bin...Ok
-misc[0x04008000]4 MB ->misc.bin...Ok
-para[0x04408000]512 KB ->para.bin...Ok
-expdb[0x04488000]20 MB ->expdb.bin...Ok
-frp[0x05888000]1024 KB ->frp.bin...Ok
-vbmeta[0x05988000]8 MB ->vbmeta.bin...Ok
-nvcfg[0x06188000]32 MB ->nvcfg.bin...Ok
-nvdata[0x08188000]64 MB ->nvdata.bin...Ok
-metadata[0x0C188000]32 MB ->metadata.bin...Ok
-persist[0x0E188000]70.469 MB ->persist.bin...Ok
-protect1[0x12800000]8 MB ->protect1.bin...Ok
-protect2[0x13000000]8 MB ->protect2.bin...Ok
-seccfg[0x13800000]8 MB ->seccfg.bin...Ok
-otp[0x14000000]48 MB ->otp.bin...Ok
-sec1[0x17000000]2 MB ->sec1.bin...Ok
-proinfo[0x17200000]3 MB ->proinfo.bin...Ok
-efuse[0x17500000]512 KB ->efuse.bin...Ok
-nvram[0x17580000]64 MB ->nvram.bin...Ok
-md1img[0x1B580000]150 MB ->md1img.bin...Ok
-boot_para[0x24B80000]26 MB ->boot_para.bin...Ok
-spmfw[0x26580000]1024 KB ->spmfw.bin...Ok
-audio_dsp[0x26680000]4 MB ->audio_dsp.bin...Ok
-scp1[0x26A80000]6 MB ->scp1.bin...Ok
-scp2[0x27080000]6 MB ->scp2.bin...Ok
-sspm_1[0x27680000]1024 KB ->sspm_1.bin...Ok
-sspm_2[0x27780000]1024 KB ->sspm_2.bin...Ok
-cam_vpu1[0x27880000]15 MB ->cam_vpu1.bin...Ok
-cam_vpu2[0x28780000]15 MB ->cam_vpu2.bin...Ok
-cam_vpu3[0x29680000]15 MB ->cam_vpu3.bin...Ok
-gz1[0x2A580000]32 MB ->gz1.bin...Ok
-gz2[0x2C580000]32 MB ->gz2.bin...Ok
-lk[0x2E580000]2 MB ->lk.bin...Ok
-lk2[0x2E780000]2 MB ->lk2.bin...Ok
-boot[0x2E980000]64 MB ->boot.bin...Ok
-logo[0x32980000]64 MB ->logo.bin...Ok
-dtbo[0x36980000]32 MB ->dtbo.bin...Ok
-tee1[0x38980000]5 MB ->tee1.bin...Ok
-tee2[0x38E80000]9.5 MB ->tee2.bin...Ok
-vendor[0x39800000]1.5 GB ->vendor.bin...Ok
-system[0x99800000]3.5 GB ->system.bin...Ok
-cache[0x179800000]432 MB ->cache.bin...Ok
-gsort[0x194800000]16 MB ->gsort.bin...Ok
-oem_misc1[0x195800000]16 MB ->oem_misc1.bin...Ok
-exaid[0x196800000]128 MB ->exaid.bin...Ok
-cust[0x19E800000]832 MB ->cust.bin...Ok
-flashinfo[0x1DC9FF8000]16 MB ->flashinfo.bin...Ok
Reading Done!!!
C:\Hydra Tool\\Backup\Full\__0813--10(QP1A.190711.020)_150421111220 Ok

Elapsed Time : 00:14:15
BR
Dipendra Pathak

  Reply With Quote
Old 04-17-2021, 01:51   #1702 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Huawei Y625-U32 flashing selected partition successfully done by Hydra Tool

Huawei Y625-U32 flashing selected partition successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM5)
SymbolicName :\??\USB#VID_05C6&PID_9008#6&944c330&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :12/17/2018,2.1.3.5

Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok
Configuration.......
Identifying Chip..........eMMC
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 49152
MaxPayloadSizeToTargetInBytesSupported : 49152
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8x10
Version : 1


Protocol : Universal
Running : Ok

Phone Information....
Unable To find Build.prop

Reading GPT[1]
Drive [0] 24 Items


Backup Security partitions...
Reading Security Items....
> modemst1
> modemst2
> fsg
C:\Hydra Tool\Backup\Security_Backup\___Security_0415211038 58.sec
Backup Security Success....

----------------------------
Flashing Selected Partitions....
- sbl1(0)[sbl1.mbn] Failed
Operation : Setbootablestoragedrive: Drive 0
Set bootable storage drive 0 Ok

Rebooting Phone.... Ok

Elapsed Time : 00:00:08
BR
Dipendra Pathak

  Reply With Quote
Old 04-17-2021, 01:55   #1703 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Xiaomi Redmi 9A Dendelion Mi Account and FRP successfully removed by Hydra Tool

Xiaomi Redmi 9A Dendelion Mi Account and FRP successfully removed by Hydra Tool

Screen Short:



Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port (COM5)
SymbolicName :\??\USB#VID_0E8D&PID_0003#6&2824289&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2016,3.2


Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : F09CAD1F92B1780690D5306B2477545D
ERAM Size : 0x000000000003A000 -232 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58,242 GB
eMMC CID : 45010044413430363401DBAE1E1787F1 - DA4064

Reading GPT-EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Remove MiAccount[Erase Method] + FRP
Processing...
-persist.bin[0x47000000]48 MB ->persist.bin...Ok
-frp.bin[0x3BD88000]1024 KB ->frp.bin...Ok
__041521145532
Backing up Partition for safety...
-__041521145532[0x47000000]48 MB ->persist.img...OkOk
Saved to :
C:\Hydra Tool\Backup\Persist\__041521145532.bin
Erasing FRP Partition...
-persist.bin[0x47000000]48 MB ->persist.bin...Ok
-frp.bin[0x3BD88000]1024 KB ->frp.bin...Ok Ok

Elapsed Time : 00:00:41
BR
Dipendra Pathak

  Reply With Quote
Old 04-17-2021, 01:59   #1704 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Techno KC3 Camon 12 Air Zero Wipe FRP partition successfully done by Hydra Tool

Techno KC3 Camon 12 Air Zero Wipe FRP partition successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode Preloader
FriendlyName :MediaTek PreLoader USB VCOM_V1632 (Android) (COM11)
SymbolicName :\??\USB#VID_0E8D&PID_2000#6&3703ea33&0&4#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0766MT6765[6765]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
SECURE VERSION : 00
BL VERSION : 03
BR Secured : 05
NORMAL BOOT

Preparing Download Agent..
DA : 6765_Tecno_camon_air_a12.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2018/05/22.14:57_437806
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : preloader

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC
Sending Certifificate

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : C607912CE5885D156F4826F4CE3EC13B
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 90014A484347386134A210053688C691 - HCG8a4

DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info
Brand : TECNO
Vendor : TECNO MOBILE LIMITED
Model : TECNO KC3
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_kc3_h627mt62-user 9 PPR1.180610.011 57842 release-keys
Device : TECNO-KC3
Display ID : KC3-H627G-P-200113V292
Security Patch : 2020-01-05
Fingerprint : TECNO/H627/TECNO-KC3:9/PPR1.180610.011/G-200113V292:user/release-keys
StorageType : mtp
Userdata State : Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_kc3_h627mt62.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0766_TECNO_H627_TECNO-KC3_9_PPR1.180610.011_G-200113V292_041521153059\MT6765_Android_scatter.txt
-pgpt[0x00000000]8 MB ->pgpt.bin...Ok
-nvram[0x09B00000]64 MB ->nvram.bin...Ok
-persist[0x113000000]48 MB ->persist.bin...Ok
-frp[0x12F580000]1024 KB ->frp.bin...Ok
-nvdata[0x144280000]69.5 MB ->nvdata.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0766_TECNO_H627_TECNO-KC3_9_PPR1.180610.011_G-200113V292_041521153059
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : C607912CE5885D156F4826F4CE3EC13B
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 90014A484347386134A210053688C691 - HCG8a4

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Brand : TECNO
Vendor : TECNO MOBILE LIMITED
Model : TECNO KC3
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_kc3_h627mt62-user 9 PPR1.180610.011 57842 release-keys
Device : TECNO-KC3
Display ID : KC3-H627G-P-200113V292
Security Patch : 2020-01-05
Fingerprint : TECNO/H627/TECNO-KC3:9/PPR1.180610.011/G-200113V292:user/release-keys
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Zero Wipe
Processing...
ZeroWipe FRP Partition... Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:51
BR
Dipendra Pathak

  Reply With Quote
Old 04-17-2021, 02:03   #1705 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Xiaomi Redmi Note 7 Pro Violet successfully Flashed by Hydra Tool

Xiaomi Redmi Note 7 Pro Violet successfully Flashed by Hydra Tool

Screen Short:



Logs:

Quote:
Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM13)
SymbolicName :\??\USB#VID_05C6&PID_9008#6&153f065e&0&1#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/31/2015,2.1.2.0

Getting device info......
Serial No.: 0x994CACFF
MSM ID : 0x000950E1, SM6150-Qualcomm Snapdragon 675
PBL Ver : 00000000
PK HASH : 1BEBE3863A6781DB4B01086063007334
DE9E5CA14971C7C4F4358EC9D79CDA46

Firehose Loader[Xiaomi_Redmi Note 7 Pro_Sdm6150_ddr.elf]
SaharaBoot... Ok
Sending ...................................Ok
Connecting to Firehose...
Ping..................... Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[ru4JBg81TbfBLal8EjZwz0ybwfD]
Checking Internet connection....
- Hydra Is Online
Connecting to Hydra Xiaomi Server...

Signature @256bytes Authentication.... Accepted........
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Jul 19 2019 - 01:12:10

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 3390710511
Firmware Version : 892350512
Product Name : hDEaP3
Physical Partitions : 4
Total Logical Blocks:
Drive [0] 244285440[116.484 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Drive [3] 32768[16 MB]

Protocol : Universal
Running : Ok

Phone Information......
Vendor : Xiaomi
ID : QKQ1.190915.002
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : zh-CN
Miui Ver : V12
Security Patch : 2020-07-01


----------------------------
Flashing Selected Partitions....
- multiimgoem(0)[multi_image.mbn] Ok
- vbmeta(0)[vbmeta.img] Ok
- qupfw(0)[qupv3fw.elf] Ok
- xbl_config(0)[xbl_config.elf] Ok
- storsec(0)[storsec.mbn] Ok
- storsecbak(0)[storsec.mbn] Ok
- aop(0)[aop.mbn] Ok
- aopbak(0)[aop.mbn] Ok
- hyp(0)[hyp.mbn] Ok
- hypbak(0)[hyp.mbn] Ok
- cmnlib(0)[cmnlib.mbn] Ok
- cmnlibbak(0)[cmnlib.mbn] Ok
- cmnlib64(0)[cmnlib64.mbn] Ok
- cmnlib64bak(0)[cmnlib64.mbn] Ok
- keymaster(0)[km4.mbn] Ok
- keymasterbak(0)[km4.mbn] Ok
- bluetooth(0)[BTFM.bin] Ok
- devcfg(0)[devcfg.mbn] Ok
- devcfgbak(0)[devcfg.mbn] Ok
- abl(0)[abl.elf] Ok
- ablbak(0)[abl.elf] Ok
- imagefv(0)[imagefv.elf] Ok
- uefisecapp(0)[uefi_sec.mbn] Ok
- uefisecappbak(0)[uefi_sec.mbn] Ok
- misc(0)[misc.img] Ok
- xbl(0)[xbl.elf] Ok
- xblbak(0)[xbl.elf] Ok
- tz(0)[tz.mbn] Ok
- tzbak(0)[tz.mbn] Ok
- logfs(0)[logfs_ufs_8mb.bin] Ok
- dtbo(0)[dtbo.img] Ok
- dsp(0)[dspso.bin] Ok
- splash(0)[splash.img] Ok
- persist(0)[persist.img] Ok
- persistbak(0)[persist.img] Ok
- boot(0)[boot.img] Ok
- recovery(0)[recovery.img] Ok
- modem(0)[NON-HLOS.bin] Ok
- cache(0)[cache.img] Ok
- cust(0)[cust.img] Ok
- system(0)[system.img] Ok
- vendor(0)[vendor.img] Ok
- userdata(0)[userdata.img] Ok
- PrimaryGPT(0)[gpt_main0.bin] Ok

Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-33.] OK
0 [CRC32(2,11264)] OK
0 [CRC32(NUM_DISK_SECTORS-33.,11264)] OK
0 [0] OK
0 [CRC32(1,92)] OK
0 [0] OK
0 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
----------------------------
Done!

Rebooting Phone.... Ok

Elapsed Time : 00:02:54
BR
Dipendra Pathak

  Reply With Quote
Old 04-18-2021, 01:22   #1706 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Oppo Realme 7 Pro manual selection files successfully flashed by Hydra Tool

Oppo Realme 7 Pro manual selection files successfully flashed by Hydra Tool

Screen Short:



Logs:

Quote:
Searching Device By Fastboot
Device Found...

Reading Information...getvar:version FAILED (remote: GetVar Variable Not found)
Product : atoll
version : getvar:version FAILED (remote: GetVar Variable Not found)
Secure : yes
Device Info:
Verity mode: true
Device unlocked: true
Device critical unlocked: false
Charger screen enabled: false
--------------------------
Fastboot Flashing...
-oppodycnvbk(dynamic_nvbk.bin) Ok
-oppostanvbk(static_nvbk.bin) Ok
-opporeserve1(emmc_fw.bin) Ok
-opporeserve2(opporeserve2.img) Ok
-DRIVER(DRIVER.ISO) Ok
All Done
--------------------------

Elapsed Time : 00:00:04
BR
Dipendra Pathak

  Reply With Quote
Old 04-18-2021, 01:26   #1707 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Xiaomi Redmi 6A Mi Account and FRP removed with Erased Method by Hydra Tool

Xiaomi Redmi 6A Mi Account and FRP removed with Erased Method by Hydra Tool

Screen Short:



Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port (COM7)
SymbolicName :\??\USB#VID_0E8D&PID_0003#6&1958333f&0&1#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0766MT6765[6765]
BROM HW_SW_VER : 8A00 CA00 0000 0000
getMTKPayloadExploit : 0766
#Executing Exploit..
#SUCCESS..
Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0766MT6765[6765]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
SECURE VERSION : 00
BL VERSION : FE
BR Secured : E0

Preparing Download Agent..
DA : 6765_56EC405E9E.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2018/04/19.10:40_426269
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...[ERROR]- NOT SYNC
=============================================
Reasons why it fails due to the following"
1. Harware problem/issues
2. If you did Testpoint Kindly check the parts you Touch/TP
3. Powershortage, try to connect Battery
4. Check or replace usb cable and plug directly to your pc usb port.
=============================================
SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_cactus.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 0BF59F0FCB10CEA14579D24D143D1A5E
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000020000000 -512 MB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003A3E00000 -14.561 GB
eMMC CID : 150100514536334D42038BE09B2C95A7 - QE63MB

DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi 6A
ID : O11019
SDK : 27
Release : 8.1.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : zh-CN
Description : cactus-user 8.1.0 O11019 V10.3.4.0.OCBCNXM release-keys
Miui Ver : V10
Device : cactus
Display ID : O11019
Security Patch : 2019-05-01
Fingerprint : xiaomi/cactus/cactus:8.1.0/O11019/V10.3.4.0.OCBCNXM:user/release-keys
StorageType : mtp
Userdata State : Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_cactus.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0766_xiaomi_cactus_cactus_8.1.0_ O11019_V10.3.4.0.OCBCNXM_041721090546\MT6765_Andro id_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x05588000]1024 KB ->frp.bin...Ok
-nvdata[0x07688000]64 MB ->nvdata.bin...Ok
-persist[0x0F000000]64 MB ->persist.bin...Ok
-nvram[0x1BE80000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0766_xiaomi_cactus_cactus_8.1.0_ O11019_V10.3.4.0.OCBCNXM_041721090546
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 0BF59F0FCB10CEA14579D24D143D1A5E
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000020000000 -512 MB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003A3E00000 -14.561 GB
eMMC CID : 150100514536334D42038BE09B2C95A7 - QE63MB

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi 6A
ID : O11019
SDK : 27
Release : 8.1.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : zh-CN
Description : cactus-user 8.1.0 O11019 V10.3.4.0.OCBCNXM release-keys
Miui Ver : V10
Device : cactus
Display ID : O11019
Security Patch : 2019-05-01
Fingerprint : xiaomi/cactus/cactus:8.1.0/O11019/V10.3.4.0.OCBCNXM:user/release-keys
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Remove MiAccount[Erase Method] + FRP
Processing...
-persist.bin[0x0F000000]64 MB ->persist.bin...Ok
-frp.bin[0x05588000]1024 KB ->frp.bin...Ok
Redmi 6A_8.1.0_041721090637
Backing up Partition for safety...
-Redmi 6A_8.1.0_041721090637[0x0F000000]64 MB ->persist.img...OkOk
Saved to :
C:\Hydra Tool\Backup\Persist\Redmi 6A_8.1.0_041721090637.bin
Erasing FRP Partition...
-persist.bin[0x0F000000]64 MB ->persist.bin...Ok
-frp.bin[0x05588000]1024 KB ->frp.bin...Ok Ok

Elapsed Time : 00:01:34
BR
Dipendra Pathak

  Reply With Quote
Old 04-18-2021, 01:30   #1708 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Huawei MRD-LX2 (Y6 2019) Factory Reset Protection (FRP) Successfully Removed By Hydra

Huawei MRD-LX2 (Y6 2019) Factory Reset Protection (FRP) Successfully Removed By Hydra Tool

Screen Short:



Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port (COM6)
SymbolicName :\??\USB#VID_0E8D&PID_0003#6&3a34e632&0&4#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2016,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0717MT6761[6761]
BROM HW_SW_VER : 8A00 CA01 0200 0000
getMTKPayloadExploit : 0717
#Executing Exploit..
#SUCCESS..
Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0717MT6761[6761]
BROM HW_SW_VER : 8A00 CA01 0200 0000
FUSEID : 00000000
SECURE VERSION : 00
BL VERSION : FE
BR Secured : E0

Preparing Download Agent..
DA : Huawei_Y9Pro_6761_DA.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2018/10/18.17:38_452898
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...[ERROR]- NOT SYNC
=============================================
Reasons why it fails due to the following"
1. Harware problem/issues
2. If you did Testpoint Kindly check the parts you Touch/TP
3. Powershortage, try to connect Battery
4. Check or replace usb cable and plug directly to your pc usb port.
=============================================
SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_k61v1_64_mexico.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : EBC4FB23458AD7A70647C401F4934C0F
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 90014A68423861503E0104F4413F36C5 - hB8aP>

DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_k61v1_64_mexico.bin
Creating Scatter file... D:\Hydra Tool\\Backup\Auto\0717__041721085524\MT6761_Androi d_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x00108000]1024 KB ->frp.bin...Ok
-nvdata[0x00A08000]16 MB ->nvdata.bin...Ok
-persist[0x03800000]8 MB ->persist.bin...Ok
-nvram[0x04400000]5 MB ->nvram.bin...Ok
-oeminfo[0x04900000]32 MB ->oeminfo.bin...Ok
Done!!!
D:\Hydra Tool\\Backup\Auto\0717__041721085524
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : EBC4FB23458AD7A70647C401F4934C0F
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 90014A68423861503E0104F4413F36C5 - hB8aP>

Reading GPT-EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition... Ok

Elapsed Time : 00:00:43
BR
Dipendra Pathak

  Reply With Quote
Old 04-18-2021, 01:35   #1709 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Redmi Note 3 Mi Account Successfully & Permanently patched using EMC method by HYDRA

Xiaomi Redmi Note 3 Mi Account Successfully and Permentaly patched using EMMC method by Hydra

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : AUTO Model : AUTO Storage : Auto
Loader: Auto
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM6)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&253caf8e&0&1#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/02/2017,2.1.2.7

Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8976
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 227964128
Firmware Version : 164
Product Name : HBG4a2
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 61071360[29.121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok
Reading GPT[3]
Drive [0] 48 Items
Drive [1] 0 Items
Drive [2] 0 Items


Phone Information.....
Brand : Xiaomi
Vendor : Xiaomi
Model : Redmi Note 3
ID : MMB29M
SDK : 23
Release : 6.0.1
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : kenzo-user 6.0.1 MMB29M V8.1.4.0.MHOMIDI release-keys
Miui Ver : V8
Device : kate
Mod_device : kenzo_global
Board : msm8952
Display ID : MMB29M
Security Patch : 2017-04-03
Platform : msm8952
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : Xiaomi/kenzo/kenzo:6.0.1/MMB29M/V8.1.4.0.MHOMIDI:user/release-keys

Processing Remove MiAccount[New Method]....
Backing up Partition for safety...Ok

Scanning Patching address...Done!!
No patching address available...
Seems like device has no Mi Account added....
Action Result : Ok

Elapsed Time : 00:00:25
BR
Dipendra Pathak

  Reply With Quote
Old 04-18-2021, 01:43   #1710 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Xiomi Miui Version 12 is supported to Flash without login & Credit by Hydra Tool

Xiomi Miui Version 12 is supported to Flash without login & Credit by Hydra Tool

Screen Short:



Logs:

Quote:
Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM3)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&36f1b564&0&5#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :03/25/2016,2.1.2.2

Getting device info......
Serial No.: 0x23EFE43C
MSM ID : 0x0008B0E1, SDM845-Qualcomm Snapdragon 845
PBL Ver : 00000000
PK HASH : C924A35F39CE1CDD1B8D5A9F3B8E3C51
317930431D7A9DD5A55028CF6965FE65

Firehose Loader[prog_ufs_firehose_sdm845_ddr_10.elf]
SaharaBoot... Ok
Sending .....................................Ok
Connecting to Firehose...
Ping..................... Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[BMNWvXmuAu-gK9vl
Checking Internet connection....
- Hydra Is Online
Connecting to Hydra Xiaomi Server...

Signature @256bytes Authentication.... Accepted........
Identifying Chip........UFS
Ok
Chip Configuration :
MemoryName : UFS
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Aug 17 2019 - 16:08:38

*** STORAGE DEVICE INFO ***
Memory Type : UFS
Block Size in Bytes : 4096
Page Size : 4096
Manufacturer ID : 462
Serial Number : 1297306958
Firmware Version : 100
Product Name : KLUCG2K1EA-B0C1
Physical Partitions : 6
Total Logical Blocks:
Drive [0] 14419968[55.008 GB]
Drive [1] 2048[8 MB]
Drive [2] 2048[8 MB]
Drive [3] 8192[32 MB]
Drive [4] 1179648[4.5 GB]
Drive [5] 8192[32 MB]

Protocol : Universal
Running : Ok

Phone Information......
Vendor : Xiaomi
ID : QKQ1.190828.002
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : zh-CN
Miui Ver : V12
Security Patch : 2020-12-01


----------------------------
Flashing Selected Partitions....
- switch(0)[dummy.img] Ok
- misc(0)[misc.img] Ok
- logfs(0)[logfs_ufs_8mb.bin] Ok
- (0)[persist.img] Ok
- cust(0)[cust.img] Ok
- recovery(0)[recovery.img] Ok
- cache(0)[cache.img] Ok
- userdata(0)[userdata.img] Ok
- PrimaryGPT(0)[gpt_main0.bin] Ok
- xbl_config_a(1)[xbl_config.img] Ok
- xbl_a(1)[xbl.img] Ok
- PrimaryGPT(1)[gpt_main1.bin] Ok
- xbl_config_b(2)[xbl_config.img] Ok
- xbl_b(2)[xbl.img] Ok
- PrimaryGPT(2)[gpt_main2.bin] Ok
- PrimaryGPT(3)[gpt_main3.bin] Ok
- limits(4)[dummy.img] Ok
- qupfw_a(4)[qupfw.img] Ok
- qupfw_b(4)[qupfw.img] Ok
- storsec_a(4)[storsec.img] Ok
- storsec_b(4)[storsec.img] Ok
- devcfg_a(4)[devcfg.img] Ok
- devcfg_b(4)[devcfg.img] Ok
- aop_a(4)[aop.img] Ok
- aop_b(4)[aop.img] Ok
- cmnlib_a(4)[cmnlib.img] Ok
- cmnlib_b(4)[cmnlib.img] Ok
- cmnlib64_a(4)[cmnlib64.img] Ok
- cmnlib64_b(4)[cmnlib64.img] Ok
- keymaster_a(4)[keymaster.img] Ok
- keymaster_b(4)[keymaster.img] Ok
- bluetooth(4)[bluetooth.img] Ok
- hyp_a(4)[hyp.img] Ok
- hyp_b(4)[hyp.img] Ok
- abl_a(4)[abl.img] Ok
- abl_b(4)[abl.img] Ok
- tz_a(4)[tz.img] Ok
- tz_b(4)[tz.img] Ok
- logo(4)[logo.img] Ok
- dsp(4)[dsp.img] Ok
- boot(4)[boot.img] Ok
- modem(4)[modem.img] Ok
- vendor(4)[vendor.img] Ok
- system(4)[system.img] Ok
- PrimaryGPT(4)[gpt_main4.bin] Ok
- ImageFv(5)[imagefv.elf] Ok
- PrimaryGPT(5)[gpt_main5.bin] Ok

Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-6.] OK
0 [NUM_DISK_SECTORS-6.] OK
0 [NUM_DISK_SECTORS-6.] OK
0 [NUM_DISK_SECTORS-6.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-5.] OK
0 [CRC32(2,4096)] OK
0 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
0 [0] OK
0 [CRC32(1,92)] OK
0 [0] OK
0 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
1 [NUM_DISK_SECTORS-6.] OK
1 [NUM_DISK_SECTORS-6.] OK
1 [NUM_DISK_SECTORS-6.] OK
1 [NUM_DISK_SECTORS-6.] OK
1 [NUM_DISK_SECTORS-1.] OK
1 [NUM_DISK_SECTORS-1.] OK
1 [NUM_DISK_SECTORS-5.] OK
1 [CRC32(2,4096)] OK
1 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
1 [0] OK
1 [CRC32(1,92)] OK
1 [0] OK
1 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
2 [NUM_DISK_SECTORS-6.] OK
2 [NUM_DISK_SECTORS-6.] OK
2 [NUM_DISK_SECTORS-6.] OK
2 [NUM_DISK_SECTORS-6.] OK
2 [NUM_DISK_SECTORS-1.] OK
2 [NUM_DISK_SECTORS-1.] OK
2 [NUM_DISK_SECTORS-5.] OK
2 [CRC32(2,4096)] OK
2 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
2 [0] OK
2 [CRC32(1,92)] OK
2 [0] OK
2 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
3 [NUM_DISK_SECTORS-6.] OK
3 [NUM_DISK_SECTORS-6.] OK
3 [NUM_DISK_SECTORS-6.] OK
3 [NUM_DISK_SECTORS-6.] OK
3 [NUM_DISK_SECTORS-1.] OK
3 [NUM_DISK_SECTORS-1.] OK
3 [NUM_DISK_SECTORS-5.] OK
3 [CRC32(2,4096)] OK
3 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
3 [0] OK
3 [CRC32(1,92)] OK
3 [0] OK
3 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
4 [NUM_DISK_SECTORS-6.] OK
4 [NUM_DISK_SECTORS-6.] OK
4 [NUM_DISK_SECTORS-6.] OK
4 [NUM_DISK_SECTORS-6.] OK
4 [NUM_DISK_SECTORS-1.] OK
4 [NUM_DISK_SECTORS-1.] OK
4 [NUM_DISK_SECTORS-5.] OK
4 [CRC32(2,8192)] OK
4 [CRC32(NUM_DISK_SECTORS-5.,8192)] OK
4 [0] OK
4 [CRC32(1,92)] OK
4 [0] OK
4 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
5 [NUM_DISK_SECTORS-6.] OK
5 [NUM_DISK_SECTORS-6.] OK
5 [NUM_DISK_SECTORS-6.] OK
5 [NUM_DISK_SECTORS-6.] OK
5 [NUM_DISK_SECTORS-1.] OK
5 [NUM_DISK_SECTORS-1.] OK
5 [NUM_DISK_SECTORS-5.] OK
5 [CRC32(2,4096)] OK
5 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
5 [0] OK
5 [CRC32(1,92)] OK
5 [0] OK
5 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 1
Set bootable storage drive 1 Ok

Rebooting Phone.... Ok

Elapsed Time : 00:04:36
BR
Dipendra Pathak

  Reply With Quote
Reply

Bookmarks


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


 



All times are GMT +1. The time now is 05:22.



Powered by Searchlight © 2024 Axivo Inc.
vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2024 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2023 -
Page generated in 0.62641 seconds with 9 queries

SEO by vBSEO