GSM Shop GSM Shop
GSM-Forum  

Welcome to the GSM-Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features.
Only registered members may post questions, contact other members or search our database of over 8 million posts.

Registration is fast, simple and absolutely free so please - Click to REGISTER!

If you have any problems with the registration process or your account login, please contact contact us .

Go Back   GSM-Forum > Product Support Sections > Special Solutions / Services / WebShop > GSMFABRICA Products > HYDRA TOOL


Reply
 
LinkBack Thread Tools Display Modes
Old 05-02-2021, 04:14   #1816 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Xiaomi Redmi 6 (Cereus) Mi Account Removed using Erased Method by Hydra Tool


Xiaomi Redmi 6 (Cereus) Mi Account Removed using Erased Method by Hydra Tool

1. Run Hydra MTK Module, Select Brand and Model
2. Go to Service-->Tools-->Xiaoami
3. Choose "Remove Mi Account Erased Method" from Method / Option
4. Execute and connect the device to the computer with data cable
5. wait until the process is completed.


Note: Only in MTK devices, Android above 8, need to install VPN software before you connect wify. But, no need VPS software in Qualcomm module even highest miui vesion ie. 12.xx.xx. No need server! No need Credit! No need yearly activation! No need any extra cost .

Screen Short:



Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port (COM11)
SymbolicName :\??\USB#VID_0E8D&PID_0003#5&25587c9f&0&5#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2016,3.2


Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : D10D63FD038176FC1DE76367E8777B61
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000030000000 -768 MB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 150100475036424D42016EABD8E18587 - GP6BMB

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi 6
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-GB
Description : cereus-user 9 PPR1.180610.011 V11.0.5.0.PCGMIXM release-keys
Miui Ver : V11
Device : cereus
Mod_device : cereus_global
Display ID : SW_S98507AE1_V009_M13_XM_C3D_USR
Security Patch : 2020-08-01
Fingerprint : xiaomi/cereus/cereus:9/PPR1.180610.011/V11.0.5.0.PCGMIXM:user/release-keys
StorageType : mtp
Userdata State : Not Encrypted

-------------------------------------
Operation : Remove MiAccount[Erase Method]
Processing...
-persist.bin[0x0F000000]64 MB ->persist.bin...Ok
-frp.bin[0x05588000]1024 KB ->frp.bin...Ok Ok

Elapsed Time : 00:00:16
BR
Dipendra Pathak

  Reply With Quote
Old 05-02-2021, 04:21   #1817 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Xiaomi Redmi 6A (Cactus) Mi Account Successfully Removed using Erased Method by Hydra

Xiaomi Redmi 6A (Cactus) Mi Account Successfully Removed using Erased Method by Hydra

1. Run Hydra MTK Module, Select Brand and Model
2. Go to Service-->Tools-->Xiaoami
3. Choose "Remove Mi Account Erased Method" from Method / Option
4. Execute and connect the device to the computer with data cable
5. wait until the process is completed.

Screen Short:



Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port (COM9)
SymbolicName :\??\USB#VID_0E8D&PID_0003#6&15dc4b66&0&2#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2016,3.2

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0766MT6765[6765]
BROM HW_SW_VER : 8A00 CA00 0000 0000
getMTKPayloadExploit : 0766
#Executing Exploit..
#SUCCESS..
Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0766MT6765[6765]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
SECURE VERSION : 00
BL VERSION : FE
BR Secured : E0

Preparing Download Agent..
DA : 6765_56EC405E9E.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2018/04/19.10:40_426269
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_cactus.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 1F2F42BFEF9FFB274B56B9DDE3FEC33B
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000020000000 -512 MB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003AB400000 -14,676 GB
eMMC CID : 90014A484147346132A5664B6CCD5503 - HAG4a2

DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi 6A
ID : O11019
SDK : 27
Release : 8.1.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-GB
Description : cactus-user 8.1.0 O11019 V10.0.2.0.OCBMIFH release-keys
Miui Ver : V10
Device : cactus
Mod_device : cactus_global
Display ID : O11019
Security Patch : 2018-09-01
Fingerprint : xiaomi/cactus/cactus:8.1.0/O11019/V10.0.2.0.OCBMIFH:user/release-keys
StorageType : mtp
Userdata State : Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_cactus.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0766_xiaomi_cactus_cactus_8.1.0_ O11019_V10.0.2.0.OCBMIFH_050121042755\MT6765_Andro id_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x05588000]1024 KB ->frp.bin...Ok
-nvdata[0x07688000]64 MB ->nvdata.bin...Ok
-persist[0x0F000000]64 MB ->persist.bin...Ok
-nvram[0x1BE80000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0766_xiaomi_cactus_cactus_8.1.0_ O11019_V10.0.2.0.OCBMIFH_050121042755
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 1F2F42BFEF9FFB274B56B9DDE3FEC33B
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000020000000 -512 MB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003AB400000 -14,676 GB
eMMC CID : 90014A484147346132A5664B6CCD5503 - HAG4a2

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi 6A
ID : O11019
SDK : 27
Release : 8.1.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-GB
Description : cactus-user 8.1.0 O11019 V10.0.2.0.OCBMIFH release-keys
Miui Ver : V10
Device : cactus
Mod_device : cactus_global
Display ID : O11019
Security Patch : 2018-09-01
Fingerprint : xiaomi/cactus/cactus:8.1.0/O11019/V10.0.2.0.OCBMIFH:user/release-keys
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Remove MiAccount[Erase Method]
Processing...
-persist.bin[0x0F000000]64 MB ->persist.bin...Ok
-frp.bin[0x05588000]1024 KB ->frp.bin...Ok Ok

Elapsed Time : 00:01:12
BR
Dipendra Pathak

  Reply With Quote
Old 05-02-2021, 04:39   #1818 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Xiaomi Redmi Note 4 (Nikel) successfully flashed by Hydra Tool

Xiaomi Redmi Note 4 (Nikel) successfully flashed by Hydra Tool

1. Run Hydra MTK Module and Sosc.
2. Choose Brand and Module.
3. Go to "Flash" Tab.
4. Choose Flash file and its location.
5. Click on "Execute"
6. connect device to the computer with USB Data cable
7. Wait until the process is completed.

Screen Short:



Logs:

Quote:
Brand : XIAOMI Model : Redmi Note 4 (Nikel) Connection : Flash Mode

=====================================
How To Boot : Power off phone
* BROM Mode : Press VOL + or Press VOL -+
* Preloader Mode : Just Insert cable

Searching for MTK Device...Found
Port Identification :Flashmode Preloader
FriendlyName :MediaTek PreLoader USB VCOM (Android) (COM12)
SymbolicName :\??\USB#VID_0E8D&PID_2000#5&d2368d0&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2016,3.2



Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : DD0F4D2AFAE1447C50C53D0F10AB16AE
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000E8F800000 -58,242 GB
eMMC CID : 11010030363447333000D0568C6F63B5 - 064G30

Reading GPT-EMMC [0x00008000] 130 Items

Flashing Selected Partitions....
- preloader[preloader_lcsh6797_6c_lw_m.bin] 256 KB Skipped
- recovery[recovery.img] 16 MB Flash -> = Ok
- md1img[md1rom.img] 24 MB Flash -> = Ok
- md1dsp[md1dsp.img] 4 MB Flash -> = Ok
- md1arm7[md1arm7.img] 3 MB Flash -> = Ok
- md3img[md3rom.img] 5 MB Flash -> = Ok
- scp1[tinysys-scp.bin] 1024 KB Flash -> = Ok
- scp2[tinysys-scp.bin] 1024 KB Flash -> = Ok
- lk[lk.bin] 4 MB Flash -> = Ok
- lk2[lk.bin] 4 MB Flash -> = Ok
- boot[boot.img] 16 MB Flash -> = Ok
- logo[logo.bin] 8 MB Flash -> = Ok
- tee1[trustzone.bin] 5 MB Flash -> = Ok
- tee2[trustzone.bin] 5 MB Flash -> = Ok
- system[system.img] 3 GB Flash -> = Ok
- cache[cache.img] 432 MB Flash -> = Ok
- userdata[userdata.img] 3 GB Flash -> = Ok
=====================================

Elapsed Time : 00:03:44
BR
Dipendra Pathak

  Reply With Quote
Old 05-02-2021, 04:46   #1819 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
oppo f7 (cph1819) erasing user data successfully done by Hydra Too

oppo f7 (cph1819) erasing user data successfully done by Hydra Tool


1. Run MTK Tool and choose "Sosc"
2. Choose Brand and Module.
3. Go to "Service"--> "Tool"
4. Choose "Ultra Power Option"
5. Choose "Erese User Data" from "Method / Option" drop down menu.
6. Connect device to computer using USB Data Cable.
7. Wait until the operation is completed.

Screen Short:



Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port_V1632 (COM13)
SymbolicName :\??\USB#VID_0E8D&PID_0003#5&2108ad5d&0&2#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0


Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 9FB0F5C8E6F2FD5B7AC1903246498D1A
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000030000000 -768 MB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 90014A68423861503E033C3925F666F7 - hB8aP>

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Vendor : OPPO
ID : O11019
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6765_18511-user 8.1.0 O11019 1613699860 release-keys
Security Patch : 2021-02-05
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Erase Userdata
Processing...
Erasing FRP Partition...
Formatting Userdata... Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:05
BR
Dipendra Pathak

  Reply With Quote
The Following User Says Thank You to Dipendra Pathak For This Useful Post:
Old 05-02-2021, 04:52   #1820 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Xiaomi Redmi 9 (lancelot) successfully Flashed by Hydra Tool

Xiaomi Redmi 9 (lancelot) successfully Flashed by Hydra Tool

1. Run Hydra MTK Module and Sosc.
2. Choose Brand and Module.
3. Go to "Flash" Tab.
4. Choose Flash file and its location.
5. Click on "Execute"
6. connect device to the computer with USB Data cable
7. Wait until the process is completed.


Screen Short:



Logs:

Quote:
Brand : XIAOMI Model : Redmi 9 (lancelot) Connection : Flash Mode

=====================================
How To Boot : Power off phone
* BROM Mode : Press VOL + or Press VOL -+
* Preloader Mode : Just Insert cable

Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port (COM10)
SymbolicName :\??\USB#VID_0E8D&PID_0003#6&1ab5e341&0&3#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2016,3.2


Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0707MT6768[6768]
BROM HW_SW_VER : 8A00 CA00 0000 0000
getMTKPayloadExploit : 0707
#Executing Exploit..
#SUCCESS..
Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0707MT6768[6768]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
SECURE VERSION : 00
BL VERSION : FE
BR Secured : E0

Preparing Download Agent..
DA : MT6768_Xiaomi_New.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2020/07/07.10:10_513994
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_lancelot.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 1B15FFB812C2CC4DA358CD1656FDCDE2
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 15010044503644414203C4AA6867A725 - DP6DAB

DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_lancelot.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0707__043021195125\MT6768_Androi d_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x05508000]1024 KB ->frp.bin...Ok
-nvdata[0x0C4A2000]64 MB ->nvdata.bin...Ok
-persist[0x104A2000]48 MB ->persist.bin...Ok
-nvram[0x19F80000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0707__043021195125
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 1B15FFB812C2CC4DA358CD1656FDCDE2
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 15010044503644414203C4AA6867A725 - DP6DAB

Reading GPT-EMMC [0x00008000] 130 Items

Flashing Selected Partitions....
- preloader[preloader_lancelot.bin] 512 KB Skipped
- recovery[recovery.img] 64 MB Flash -> = Ok
- vbmeta[vbmeta.img] 8 MB Flash -> = Ok
- vbmeta_system[vbmeta_system.img] 8 MB Flash ->= Ok
- vbmeta_vendor[vbmeta_vendor.img] 8 MB Flash ->= Ok
- spmfw[spmfw.img] 1024 KB Flash -> = Ok
- scp1[scp.img] 6 MB Flash -> = Ok
- scp2[scp.img] 6 MB Flash -> = Ok
- sspm_1[sspm.img] 1024 KB Flash -> = Ok
- sspm_2[sspm.img] 1024 KB Flash -> = Ok
- lk[lk.img] 2 MB Flash -> = Ok
- lk2[lk.img] 2 MB Flash -> = Ok
- boot[boot.img] 64 MB Flash -> = Ok
- dtbo[dtbo.img] 16 MB Flash -> = Ok
- tee1[tee.img] 5 MB Flash ->
ERROR : CMD=07000400, ACK : 0x00200000[] = Ok
- tee2[tee.img] 5 MB Flash -> = Ok
- super[super.img] 7 GB Flash -> = Ok
- cache[cache.img] 432 MB Flash -> = Ok
- userdata[userdata.img] 3 GB Flash -> = Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!
=====================================

Elapsed Time : 00:06:48
BR
Dipendra Pathak

  Reply With Quote
Old 05-02-2021, 04:59   #1821 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Huawei DRA-LX9 (Y5P 2020) restoring OEM info successfully done by Hydra Tool

Huawei DRA-LX9 (Y5P 2020) restoring OEM info successfully done by Hydra Tool

1. Run MTK Hydra Tool and choose "Sosc".
2. Choose "Brand" and "Module".
3. Go to "Service"--> "Tool"
4. Choose "Huawei"
5. Chose "Restore OEM Info" from "Method/ Option" drop down option.
6. Click "Execute".
7. Connect Device to computer using USB Data Cable.
8. Wait until the operation is completed.


Screen Short:



Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port (COM35)
SymbolicName :\??\USB#VID_0E8D&PID_0003#5&38e97a59&0&5#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0766MT6765[6765]
BROM HW_SW_VER : 8A00 CA00 0000 0000
getMTKPayloadExploit : 0766
#Executing Exploit..
#SUCCESS..
Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0766MT6765[6765]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
SECURE VERSION : 05
BL VERSION : FE
BR Secured : E0

Preparing Download Agent..
DA : MT6765_Huawei_MED.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2018/10/18.17:38_452898
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...[ERROR]- NOT SYNC
=============================================
Reasons why it fails due to the following"
1. Harware problem/issues
2. If you did Testpoint Kindly check the parts you Touch/TP
3. Powershortage, try to connect Battery
4. Check or replace usb cable and plug directly to your pc usb port.
=============================================
SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_k62v1_64_mexico.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : BE283BF8B50F8952594C552C97511E3E
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29,121 GB
eMMC CID : 90014A68423861503E0196AA35FC6789 - hB8aP>

DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_k62v1_64_mex_a32.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0766__043021210624\MT6765_Androi d_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x00108000]1024 KB ->frp.bin...Ok
-nvdata[0x00A08000]16 MB ->nvdata.bin...Ok
-persist[0x03800000]8 MB ->persist.bin...Ok
-nvram[0x04400000]5 MB ->nvram.bin...Ok
-oeminfo[0x04900000]32 MB ->oeminfo.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0766__043021210624
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : BE283BF8B50F8952594C552C97511E3E
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29,121 GB
eMMC CID : 90014A68423861503E0196AA35FC6789 - hB8aP>

Reading GPT-EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Restore OEM Info
Processing... Ok

Elapsed Time : 00:01:13
BR
Dipendra Pathak

  Reply With Quote
Old 05-02-2021, 05:06   #1822 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Xiaomi Redmi 9 (lancelot) Mi Account + FRP successfully removed by Hydra Tool

Xiaomi Redmi 9 (lancelot) Mi Account + FRP successfully removed by Hydra Tool

1. Run Hydra MTK Module and choose "Sosc"
2. Select Brand and Model
3. Go to Service-->Tools-->Xiaoami
4. Choose "Remove Mi Account + FRP" from Method / Option
5. Execute and connect the device to the computer with data cable
6. wait until the process is completed.

Screen Short:



Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port (COM15)
SymbolicName :\??\USB#VID_0E8D&PID_0003#5&7f9be32&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2016,3.2

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0707MT6768[6768]
BROM HW_SW_VER : 8A00 CA00 0000 0000
getMTKPayloadExploit : 0707
#Executing Exploit..
#SUCCESS..
Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0707MT6768[6768]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
SECURE VERSION : 05
BL VERSION : FE
BR Secured : E0

Preparing Download Agent..
DA : MT6768_Xiaomi_New.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2020/07/07.10:10_513994
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_lancelot.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 084B89E8CE615F60EEBC929567EC62A5
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 15010044503644414203B765CE2F9763 - DP6DAB

DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_lancelot.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0707__043021201555\MT6768_Androi d_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x05508000]1024 KB ->frp.bin...Ok
-nvdata[0x0C4A2000]64 MB ->nvdata.bin...Ok
-persist[0x104A2000]48 MB ->persist.bin...Ok
-nvram[0x19F80000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0707__043021201555
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 084B89E8CE615F60EEBC929567EC62A5
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 15010044503644414203B765CE2F9763 - DP6DAB

Reading GPT-EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Remove MiAccount[Erase Method] + FRP
Processing...
-persist.bin[0x104A2000]48 MB ->persist.bin...Ok
-frp.bin[0x05508000]1024 KB ->frp.bin...Ok
__043021201654
Backing up Partition for safety...
-__043021201654[0x104A2000]48 MB ->persist.img...OkOk
Saved to :
C:\Hydra Tool\Backup\Persist\__043021201654.bin
Erasing FRP Partition...
-persist.bin[0x104A2000]48 MB ->persist.bin...Ok
-frp.bin[0x05508000]1024 KB ->frp.bin...Ok Ok

Elapsed Time : 00:01:42
BR
Dipendra Pathak

  Reply With Quote
Old 05-03-2021, 02:12   #1823 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Huawei DRA-LX9 (Y5P 2020) NVRAM written successfully done by Hydra Tool

Huawei DRA-LX9 (Y5P 2020) NVRAM written successfully done by Hydra Tool

1. Run MTK Tool and choose "Sosc"
2. Choose Brand and Module.
3. Go to "Service"--> "Tool"
4. Choose "NVRAM"
5. Choose "Write NVRAM" from "Method / Option" drop down menu.
6. Connect device to computer using USB Data Cable.
7. Wait until the operation is completed.

Screen Short:



Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port (COM8)
SymbolicName :\??\USB#VID_0E8D&PID_0003#5&4696bc7&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2016,3.2


Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : CCFB8CBF6A134493E045DCB9DCBADC7A
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29,121 GB
eMMC CID : 90014A68423861503E0196B13ED0478D - hB8aP>

Reading GPT-EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Write NVMRAM
Processing...
Writing nvram file [nvram.bin] Ok

Elapsed Time : 00:01:05
BR
Dipendra Pathak

  Reply With Quote
Old 05-03-2021, 02:16   #1824 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Huawei FRL-L23 (Y9A 2021) restore OEM info successfully done by Hydra Too

Huawei FRL-L23 (Y9A 2021) restore OEM info successfully done by Hydra Too

1. Run MTK Tool and choose "Sosc"
2. Choose Brand and Module.
3. Go to "Service"--> "Tool"
4. Choose "NVRAM"
5. Choose "Write NVRAM" from "Method / Option" drop down menu.
6. Connect device to computer using USB Data Cable.
7. Wait until the operation is completed.


Screen Short:



Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port_V1632 (COM12)
SymbolicName :\??\USB#VID_0E8D&PID_0003#6&229efb56&0&8#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0707MT6768[6768]
BROM HW_SW_VER : 8A00 CA00 0000 0000
getMTKPayloadExploit : 0707
#Executing Exploit..
#SUCCESS..
Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0707MT6768[6768]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
SECURE VERSION : 05
BL VERSION : FE
BR Secured : E0

Preparing Download Agent..
DA : MT6768_Xiaomi_New.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2020/07/07.10:10_513994
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_k69v1_64.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : F29A96AABA1C532506F3A4FDD693BD22
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000001D1F000000 -116.484 GB
eMMC CID : 90014A68444561503301103BB5CB8703 - hDEaP3

DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_k69v1_64.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0707__043021195354\MT6768_Androi d_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x01A08000]1024 KB ->frp.bin...Ok
-nvdata[0x03B08000]32 MB ->nvdata.bin...Ok
-persist[0x07800000]8 MB ->persist.bin...Ok
-nvram[0x08100000]21 MB ->nvram.bin...Ok
-oeminfo[0x09600000]32 MB ->oeminfo.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0707__043021195354
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : F29A96AABA1C532506F3A4FDD693BD22
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000001D1F000000 -116.484 GB
eMMC CID : 90014A68444561503301103BB5CB8703 - hDEaP3

Reading GPT-EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Restore OEM Info
Processing... Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:55
BR
Dipendra Pathak

  Reply With Quote
Old 05-03-2021, 02:26   #1825 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Xiaomi Redmi Note 3 (Kenzo) Universal auto unlock successfully done by Hydra Tool

Xiaomi Redmi Note 3 (Kenzo) Universal auto unlock successfully done by Hydra Tool

1. Run Hydra MTK Module and choose "Sosc"
2. Select Brand and Model
3. Go to Service-->Xiaoami
4. Choose "Unlock Universal auto" using Flash Mode
5. Execute and connect the device to the computer with data cable
6. wait until the process is completed.

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : XIAOMI Model : Redmi Note 3 (Kenzo) Storage : Auto
Loader: mi_0_4.mbn
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM385)
SymbolicName :\??\USB#VID_05C6&PID_9008#7&1d27e7fd&0&3#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :02/05/2018,3.0.0.0

Getting device info......
Serial No.: 0x04744F10
MSM ID : 0x009B00E1, MSM8956-Qualcomm Snapdragon 650
PBL Ver : 00000000
PK HASH : 57158EAF1814D78FD2B3105ECE4DB18A
817A08AC664A5782A925F3FF8403D39A

Firehose Loader[mi_0_4.mbn]
SaharaBoot... Ok
Sending ..................Ok
Connecting to Firehose...
Ping... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8976
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 17
Serial Number : 1473658512
Firmware Version : 4
Product Name : 032G34
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 61071360[29.121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok
Reading GPT[3]
Drive [0] 48 Items
Drive [1] 0 Items
Drive [2] 0 Items


Phone Information.....
Brand : Xiaomi
Vendor : Xiaomi
Model : Redmi Note 3
ID : MMB29M
SDK : 23
Release : 6.0.1
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : kate-user 6.0.1 MMB29M V10.2.1.0.MHRMIXM release-keys
Miui Ver : V10
Device : kate
Mod_device : kate_global
Board : msm8952
Display ID : MMB29M
Security Patch : 2018-07-01
Platform : msm8952
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : Xiaomi/kate/kate:6.0.1/MMB29M/V10.2.1.0.MHRMIXM:user/release-keys

Processing Unlock - Universal - Auto....
Action Result : Ok

Rebooting Phone.... Ok

Elapsed Time : 00:00:07
BR
Dipendra Pathak

  Reply With Quote
Old 05-03-2021, 02:32   #1826 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Xiaomi Redmi 8 (Olive) successfully flashed by Hydra Tool

Xiaomi Redmi 8 (Olive) successfully flashed by Hydra Tool

1. Run Hydra Qualcomm Module and Sosc.
2. Choose Brand and Module.
3. Go to "Flash Tool" Tab.
4. Choose Flash file and its location.
5. Click on "Execute"
6. connect device to the computer with USB Data cable
7. Wait until the process is completed.


Screen Short:



Logs:

Quote:
Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM17)
SymbolicName :\??\USB#VID_05C6&PID_9008#6&2de80233&0&4#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :03/25/2016,2.1.2.2

Getting device info......
Serial No.: 0x4E96EC5D
MSM ID : 0x000BF0E1, SDM439-Qualcomm Snapdragon 439
PBL Ver : 00000000
PK HASH : 57158EAF1814D78FD2B3105ECE4DB18A
817A08AC664A5782A925F3FF8403D39A

Firehose Loader[Xiaomi_Redmi_8_Olive.mbn]
SaharaBoot... Ok
Sending .......................Ok
Connecting to Firehose...
Ping... Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[Rkj0xUwI1U6mkessfBNPQFWqbA-]
Checking Internet connection....
- Hydra Is Online
Connecting to Hydra Xiaomi Server...

Signature @256bytes Authentication.... Accepted......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 19
Serial Number : 543355609
Firmware Version : 4
Product Name : S0J9N8
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 122142720[58,242 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok

Phone Information......
Vendor : Xiaomi
ID : QKQ1.191014.001
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Miui Ver : V12
Mod_device : olive_global
Security Patch : 2021-03-01
Emmc_size : 16GB

Reading GPT[3]
Drive [0] 64 Items
Drive [1] 0 Items
Drive [2] 0 Items


Backup Security partitions...
Reading Security Items....
> modemst1
> modemst2
> fsg
C:\Hydra Tool\Backup\Security_Backup\__10_Security_05012102 5609.sec
Backup Security Success....

----------------------------
Flashing Selected Partitions....
- sec(0)[sec.dat] Skipped
- config(0)[config.bin] Skipped
- vbmeta(0)[vbmeta.img] Ok
- vbmetabak(0)[vbmeta.img] Ok
- devcfg(0)[devcfg.mbn] Ok
- devcfgbak(0)[devcfg.mbn] Ok
- apdp(0)[dummy.img] Ok
- msadp(0)[dummy.img] Ok
- sbl1(0)[sbl1.mbn] Ok
- sbl1bak(0)[sbl1.mbn] Ok
- rpm(0)[rpm.mbn] Ok
- rpmbak(0)[rpm.mbn] Ok
- cmnlib(0)[cmnlib_30.mbn] Ok
- cmnlibbak(0)[cmnlib_30.mbn] Ok
- cmnlib64(0)[cmnlib64_30.mbn] Ok
- cmnlib64bak(0)[cmnlib64_30.mbn] Ok
- keymaster(0)[km4.mbn] Ok
- keymasterbak(0)[km4.mbn] Ok
- misc(0)[misc.img] Ok
- aboot(0)[emmc_appsboot.mbn] Ok
- abootbak(0)[emmc_appsboot.mbn] Ok
- tz(0)[tz.mbn] Ok
- tzbak(0)[tz.mbn] Ok
- dtbo(0)[dtbo.img] Ok
- dtbobak(0)[dtbo.img] Ok
- splash(0)[splash.img] Ok
- dsp(0)[adspso.bin] Ok
- dspbak(0)[adspso.bin] Ok
- persist(0)[persist.img] Skipped
- mdtp(0)[mdtp.img] Ok
- mdtpbak(0)[mdtp.img] Ok
- boot(0)[boot.img] Ok
- recovery(0)[recovery.img] Ok
- cache(0)[cache.img] Ok
- modem(0)[NON-HLOS.bin] Ok
- system(0)[system.img] Ok
- vendor(0)[vendor.img] Ok
- cust(0)[cust.img] Ok
- userdata(0)[userdata.img] Ok
- PrimaryGPT(0)[gpt_main0.bin] Ok

Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-33.] OK
0 [CRC32(2,8192)] OK
0 [CRC32(NUM_DISK_SECTORS-33.,8192)] OK
0 [0] OK
0 [CRC32(1,92)] OK
0 [0] OK
0 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 0
Set bootable storage drive 0 Ok

Rebooting Phone.... Ok

Elapsed Time : 00:07:27
BR
Dipendra Pathak


Last edited by Dipendra Pathak; 05-03-2021 at 02:37.
  Reply With Quote
Old 05-03-2021, 02:43   #1827 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Xiaomi Redmi Note 7 Lavendra Successfully Flashed by Hydra Tool

Xiaomi Redmi Note 7 Lavendra Successfully Flashed by Hydra Tool

1. Run Hydra Qualcomm Module and Sosc.
2. Choose Brand and Module.
3. Go to "Flash Tool" Tab.
4. Choose Flash file and its location.
5. Click on "Flash"
6. connect device to the computer with USB Data cable
7. Wait until the process is completed.


Screen Short:



Logs:

Quote:
Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM5)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&1e94452c&0&4#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :02/05/2018,3.0.0.0

Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping...... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : MSM8996
Version : 1
DateTime : Aug 2 2018 - 22:27:53

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 19
Serial Number : 229244572
Firmware Version : 4
Product Name : S0J9K9
Physical Partitions : 4
Total Logical Blocks:
Drive [0] 244285440[116.484 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Drive [3] 32768[16 MB]

Protocol : Universal
Running : Ok

Phone Information......
Vendor : Xiaomi
ID : QKQ1.190910.002
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Miui Ver : V12
Mod_device : lavender_global
Display ID : QKQ1.190910.002 V12.0.1.0.QFGMIXM
Security Patch : 2020-10-01

Reading GPT[4]
Drive [0] 68 Items
Drive [1] 0 Items
Drive [2] 0 Items
Drive [3]


Backup Security partitions...
Reading Security Items....
> modemst1
> modemst2
> fsg
C:\Hydra Tool\Backup\Security_Backup\__10_Security_04302117 3416.sec
Backup Security Success....

----------------------------
Flashing Selected Partitions....
- vbmeta(0)[vbmeta.img] Ok
- vbmetabak(0)[vbmeta.img] Ok
- storsec(0)[storsec.mbn] Ok
- storsecbak(0)[storsec.mbn] Ok
- rpm(0)[rpm.mbn] Ok
- rpmbak(0)[rpm.mbn] Ok
- hyp(0)[hyp.mbn] Ok
- hypbak(0)[hyp.mbn] Ok
- pmic(0)[pmic.elf] Ok
- pmicbak(0)[pmic.elf] Ok
- cmnlib(0)[cmnlib.mbn] Ok
- cmnlibbak(0)[cmnlib.mbn] Ok
- cmnlib64(0)[cmnlib64.mbn] Ok
- cmnlib64bak(0)[cmnlib64.mbn] Ok
- abl(0)[abl.elf] Ok
- ablbak(0)[abl.elf] Ok
- devcfgbak(0)[devcfg.mbn] Ok
- devcfg(0)[devcfg.mbn] Ok
- tz(0)[tz.mbn] Ok
- tzbak(0)[tz.mbn] Ok
- mdtpsecapp(0)[mdtpsecapp.mbn] Ok
- mdtpsecappbak(0)[mdtpsecapp.mbn] Ok
- keymaster(0)[km4.mbn] Ok
- keymasterbak(0)[km4.mbn] Ok
- bluetooth(0)[BTFM.bin] Ok
- xbl(0)[xbl.elf] Ok
- xblbak(0)[xbl.elf] Ok
- misc(0)[misc.img] Ok
- dsp(0)[dspso.bin] Ok
- mdtp(0)[mdtp.img] Ok
- dtbo(0)[dtbo.img] Ok
- dtbobak(0)[dtbo.img] Ok
- splash(0)[splash.img] Ok
- persist(0)[persist.img] Skipped
- modem(0)[NON-HLOS.bin] Ok
- boot(0)[boot.img] Ok
- recovery(0)[recovery.img] Ok
- cache(0)[cache.img] Ok
- system(0)[system.img] Ok
- vendor(0)[vendor.img] Ok
- cust(0)[cust.img] Ok
- userdata(0)[userdata.img] Ok
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 0
Set bootable storage drive 0 Ok

Rebooting Phone.... Ok

Elapsed Time : 00:04:14
BR
Dipendra Pathak

  Reply With Quote
Old 05-03-2021, 02:48   #1828 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Xiaomi Redmi 6 Pro (Sa.ku.ra) Sucessfully flashed by Hydra Tool

Xiaomi Redmi 6 Pro (Sa.ku.ra) Sucessfully flashed by Hydra Tool

1. Run Hydra Qualcomm Module and Sosc.
2. Choose Brand and Module.
3. Go to "Flash Tool" Tab.
4. Choose Flash file and its location.
5. Click on "Flash"
6. connect device to the computer with USB Data cable
7. Wait until the process is completed.


Screen Short:



Logs:

Quote:
Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM7)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&27926011&0&2#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :05/29/2019,2.1.3.7

Getting device info......
Serial No.: 0xB162F79D
MSM ID : 0x000460E1, MSM8953-Qualcomm Snapdragon 625
PBL Ver : 00000000
PK HASH : 57158EAF1814D78FD2B3105ECE4DB18A
817A08AC664A5782A925F3FF8403D39A

Firehose Loader[Xiaomi_Remi 6 pro_******_8953_ddr.mbn]
SaharaBoot... Ok
Sending ....................Ok
Connecting to Firehose...
Ping... Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[h9TYzMu0BXG88RyGGbSmGFYoE3L]
Checking Internet connection....
- Hydra Is Online
Connecting to Hydra Xiaomi Server...

Signature @256bytes Authentication.... Accepted......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8953
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 299090140
Firmware Version : 842018864
Product Name : hB8aP>
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 61071360[29.121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok

Phone Information.....
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi 6 Pro
ID : PKQ1.180917.001
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : zh-CN
Description : ******-user 9 PKQ1.180917.001 V10.3.1.0.PDICNXM release-keys
Miui Ver : V10
Device : ******
Display ID : ZQL1715-******-build-20190328213556
Security Patch : 2019-03-05
Emmc_size : 16GB
Fingerprint : xiaomi/******/******:9/PKQ1.180917.001/V10.3.1.0.PDICNXM:user/release-keys


----------------------------
Flashing Selected Partitions....
- sec(0)[sec.dat] Ok
- config(0)[config.bin] Ok
- lksecapp(0)[lksecapp.mbn] Ok
- lksecappbak(0)[lksecapp.mbn] Ok
- devcfg(0)[devcfg.mbn] Ok
- devcfgbak(0)[devcfg.mbn] Ok
- apdp(0)[dummy.img] Ok
- msadp(0)[dummy.img] Ok
- sbl1(0)[sbl1.mbn] Ok
- sbl1bak(0)[sbl1.mbn] Ok
- rpm(0)[rpm.mbn] Ok
- rpmbak(0)[rpm.mbn] Ok
- cmnlib(0)[cmnlib_30.mbn] Ok
- cmnlibbak(0)[cmnlib_30.mbn] Ok
- cmnlib64(0)[cmnlib64_30.mbn] Ok
- cmnlib64bak(0)[cmnlib64_30.mbn] Ok
- keymaster(0)[keymaster64.mbn] Ok
- keymasterbak(0)[keymaster64.mbn] Ok
- misc(0)[misc.img] Ok
- aboot(0)[emmc_appsboot.mbn] Ok
- abootbak(0)[emmc_appsboot.mbn] Ok
- tz(0)[tz.mbn] Ok
- tzbak(0)[tz.mbn] Ok
- splash(0)[splash.img] Ok
- dsp(0)[adspso.bin] Ok
- mdtp(0)[mdtp.img] Ok
- persist(0)[persist.img] Ok
- boot(0)[boot.img] Ok
- recovery(0)[recovery.img] Ok
- modem(0)[NON-HLOS.bin] Ok
- cache(0)[cache.img] Ok
- system(0)[system.img] Ok
- vendor(0)[vendor.img] Ok
- cust(0)[cust.img] Ok
- userdata(0)[userdata.img] Ok
- PrimaryGPT(0)[gpt_main0.bin] Ok

Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-33.] OK
0 [CRC32(2,7680)] OK
0 [CRC32(NUM_DISK_SECTORS-33.,7680)] OK
0 [0] OK
0 [CRC32(1,92)] OK
0 [0] OK
0 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 0
Set bootable storage drive 0 Ok

Rebooting Phone.... Ok

Elapsed Time : 00:02:57
BR
Dipendra Pathak

  Reply With Quote
Old 05-03-2021, 02:56   #1829 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Oppo A37F (Neo 9) formatting user data succcessfully done by Hydra Tool

Oppo A37F (Neo 9) formatting user data succcessfully done by Hydra Tool

1. Run Qualcomm Tool and choose "Sosc"
2. Choose Brand and Module.
3. Go to "Service"--> "Universal"
4. Choose "Auto" from "Format / Factory Reset" from drop down menu
5. Click on "Execute"
6. Connect device to computer using USB Data Cable.
7. Wait until the operation is completed.


Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : OPPO Model : A37F (Neo 9) Storage : Auto
Loader: 8916.mbn
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM14)
SymbolicName :\??\USB#VID_05C6&PID_9008#6&27c7ce02&0&4#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :02/05/2018,3.0.0.0

Getting device info.....
Serial No.: 0x2671649B
MSM ID : 0x007050E1, MSM8916-Qualcomm Snapdragon 410
PBL Ver : 00000000
PK HASH : CC3153A80293939B90D02D3BF8B23E02
92E452FEF662C74998421ADAD42A380F

Firehose Loader[8916.mbn]
SaharaBoot... Ok
Sending .....Ok
Connecting to Firehose...
Ping. Ok
Configuration........
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8916
Version : 1


Protocol : Universal
Running : Ok

Phone Information.....
Brand : OPPO
Vendor : OPPO
Model : A37f
ID : LMY47V
SDK : 22
Release : 5.1.1
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Description : msm8916_64-user 5.1.1 LMY47V eng.root.20190228.004112 release-keys
Board : msm8916
Display ID : A37fEX_11_190228
Security Patch : 2018-03-01
Platform : msm8916
FRPPST : /dev/block/bootdevice/by-name/config

Reading GPT[3]
Drive [0] 40 Items
Drive [1] 0 Items
Drive [2] 4 Items

Formatting Userdata...
Method :
Auto
Processing...
- Formatting Userdata
Executing ...
- Formatting Userdata [Safe method] OkOkOk

Rebooting Phone.... Ok
If not rebooted, Please Power on Manually

Elapsed Time : 00:00:06
BR
Dipendra Pathak

  Reply With Quote
Old 05-04-2021, 03:17   #1830 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Xiaomi Redmi 5 Mi Account successfully Removed using Anti Lock Method by Hydra Tool

Xiaomi Redmi 5 Mi Account successfully Removed using Anti Lock Method by Hydra Tool

1. Run Hydra MTK Module and choose "Sosc"
2. Select Auto and Auto
3. Go to Service-->Xiaoami
4. Choose "Mi Account" drop down menu
5. Choose "Bypass Anti-relock method 1" using ADB method.
5. Execute and connect the device to the computer with data cable
6. wait until the process is completed.

Note: Even you reset your device, Mi Account does not appear again .


Screen Short:



Logs:

Quote:
Starting ADB Server....
Searching Device By ADB
Device Found...
Model : Redmi 5
Brand : Xiaomi
Android Ver : 7.1.2
CPU abi : arm64-v8a
Software Version :
CSC Version :
Bootloader :
Board : msm8953
Display ID : N2G47H
Security Patch : 2018-01-01
Emmc_size : 16GB
Platform : msm8953
Kernel ID : 2018-01-01
Marketname :
OTA Version Name :
SYS USB CONFIG : persist.mtp,adb
FRPPST : /dev/block/bootdevice/by-name/config
FingerPrint : Xiaomi/rosy/rosy:7.1.2/N2G47H/V9.2.3.0.NDAMIEK:user/release-keys

Checking Root Status....
Root Status : Not Rooted

ADB MiAccount...

Processing...
Disbaling MI Account
Please wait...
Disabled Mi Account Success
Action Result : Ok

Elapsed Time : 00:00:06
BR
Dipendra Pathak

  Reply With Quote
Reply

Bookmarks


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


 



All times are GMT +1. The time now is 19:42.



Powered by Searchlight © 2024 Axivo Inc.
vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2024 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2023 -
Page generated in 0.22817 seconds with 9 queries

SEO by vBSEO