GSM Shop GSM Shop
GSM-Forum  

Welcome to the GSM-Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features.
Only registered members may post questions, contact other members or search our database of over 8 million posts.

Registration is fast, simple and absolutely free so please - Click to REGISTER!

If you have any problems with the registration process or your account login, please contact contact us .

Go Back   GSM-Forum > Product Support Sections > Special Solutions / Services / WebShop > GSMFABRICA Products > HYDRA TOOL

Reply
 
LinkBack Thread Tools Display Modes
Old 05-05-2021, 04:56   #1846 (permalink)
Freak Poster
 
Join Date: Jun 2016
Location: INDIA (BIHAR,MOTIHARI)
Posts: 158
Member: 2589490
Status: Offline
Sonork: live:.cid.32a2af136177ed3
Thanks Meter: 92
Donate money to this user
Arrow OPPO A12 (CPH1283) PATTERN FRP REMOVED successfully by HYDRA TOOL (Success)


  Reply With Quote
The Following User Says Thank You to HASIM MOBILE For This Useful Post:
Old 05-05-2021, 04:59   #1847 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 8,462
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,258
Oppo A31 (CPH 2015) Formatting user data successfully remove by Hydra Tool

Oppo A31 (CPH 2015) Formatting user data successfully remove by Hydra Tool

1. Run MTK Tool and choose "Sosc"
2. Choose Brand and Module.
3. Go to "Service"--> "Tool"
4. Choose "Ultra Power Option"
5. Choose "Format / Erase" from drop down menu
6. Click on "Execute"
7. Connect device to computer using USB Data Cable.
8. Wait until the operation is completed.


Screen Short:



Logs:

Quote:
Brand : OPPO Model : A31 (CPH2015) Connection : Flash Mode

=====================================
Connection
-Please wait...
-Found...[COM4]

TPortConnection.Create...(COM4)..Opening...Ok

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 09F9D2997130687003C4C3767C677F72
ERAM Size : 0x000000000003A000 -232 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000001D1F000000 -116.484 GB
eMMC CID : 13014E53304A394B39101AF43E16579F - S0J9K9

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Vendor : OPPO
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6765_19581-user 9 PPR1.180610.011 eng.root.20210309.210105 release-keys
Security Patch : 2021-03-05
StorageType : mtp
Userdata State : Not Encrypted

-------------------------------------
Operation : Format/Erase
Processing...
Erasing FRP Partition...
Formatting Userdata... Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:20
BR
Dipendra Pathak

  Reply With Quote
Old 05-05-2021, 05:22   #1848 (permalink)
Freak Poster
 
Join Date: Jun 2016
Location: INDIA (BIHAR,MOTIHARI)
Posts: 158
Member: 2589490
Status: Offline
Sonork: live:.cid.32a2af136177ed3
Thanks Meter: 92
Donate money to this user
Arrow VIVO Y71 (1724) PATTERN FRP REMOVED successfully by HYDRA TOOL (Success)

  Reply With Quote
Old 05-06-2021, 07:00   #1849 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 8,462
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,258
Xiaomi Redmi Note 6 Pro (Tulip) flashing successfully done by Hydra Tool

Xiaomi Redmi Note 6 Pro (Tulip) flashing successfully done by Hydra Tool

1. Run Hydra Qualcomm Module and Sosc.
2. Choose Brand and Module.
3. Go to "Flash Tool" Tab.
4. Choose Flash file and its location.
5. Click on "Flash"
6. connect device to the computer with USB Data cable
7. Wait until the process is completed.


Screen Short:



Logs:

Quote:
Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM47)
SymbolicName :\??\USB#VID_05C6&PID_9008#6&e7c094f&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :12/17/2018,2.1.3.5

Getting device info......
Serial No.: 0xA204C6F0
MSM ID : 0x000CC0E1,
PBL Ver : 00000000
PK HASH : A7B8B82545A98ECA23D6E9105FB46456
8D1B5828264903441BDEF0CD57E3C370

Firehose Loader[mi_2_9.elf]
SaharaBoot... Ok
Sending ...............................Ok
Connecting to Firehose...
Ping...... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : MSM8996
Version : 1
DateTime : Aug 2 2018 - 22:27:53

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 69
Serial Number : 728747581
Firmware Version : 3977066805590111797
Product Name : DA4064
Physical Partitions : 4
Total Logical Blocks:
Drive [0] 122142720[58,242 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Drive [3] 32768[16 MB]

Protocol : Universal
Running : Ok

Reading GPT[4]
Drive [0] 64 Items
Drive [1] 0 Items
Drive [2] 0 Items
Drive [3]


Backup Security partitions...
Reading Security Items....
> modemst1
> modemst2
> fsg
C:\Hydra Tool\Backup\Security_Backup\___Security_0502211255 07.sec
Backup Security Success....

----------------------------
Flashing Selected Partitions....
- storsec(0)[storsec.mbn] Ok
- storsecbak(0)[storsec.mbn] Ok
- rpm(0)[rpm.mbn] Ok
- rpmbak(0)[rpm.mbn] Ok
- hyp(0)[hyp.mbn] Ok
- hypbak(0)[hyp.mbn] Ok
- pmic(0)[pmic.elf] Ok
- pmicbak(0)[pmic.elf] Ok
- cmnlib(0)[cmnlib.mbn] Ok
- cmnlibbak(0)[cmnlib.mbn] Ok
- cmnlib64(0)[cmnlib64.mbn] Ok
- cmnlib64bak(0)[cmnlib64.mbn] Ok
- abl(0)[abl.elf] Ok
- ablbak(0)[abl.elf] Ok
- devcfgbak(0)[devcfg.mbn] Ok
- devcfg(0)[devcfg.mbn] Ok
- tz(0)[tz.mbn] Ok
- tzbak(0)[tz.mbn] Ok
- mdtpsecapp(0)[mdtpsecapp.mbn] Ok
- mdtpsecappbak(0)[mdtpsecapp.mbn] Ok
- keymaster(0)[keymaster64.mbn] Ok
- keymasterbak(0)[keymaster64.mbn] Ok
- bluetooth(0)[BTFM.bin] Ok
- xbl(0)[xbl.elf] Ok
- xblbak(0)[xbl.elf] Ok
- misc(0)[misc.img] Ok
- dsp(0)[dspso.bin] Ok
- mdtp(0)[mdtp.img] Ok
- splash(0)[splash.img] Ok
- persist(0)[persist.img] Skipped
- modem(0)[NON-HLOS.bin] Ok
- boot(0)[boot.img] Ok
- recovery(0)[recovery.img] Ok
- cache(0)[cache.img] Ok
- system(0)[system.img] Ok
- vendor(0)[vendor.img] Ok
- cust(0)[cust.img] Ok
- userdata(0)[userdata.img] Ok
- PrimaryGPT(0)[gpt_main0.bin] Ok

Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-33.] OK
0 [CRC32(2,8192)] OK
0 [CRC32(NUM_DISK_SECTORS-33.,8192)] OK
0 [0] OK
0 [CRC32(1,92)] OK
0 [0] OK
0 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 0
Set bootable storage drive 0 Ok

Rebooting Phone.... Ok

Elapsed Time : 00:03:56
BR
Dipendra Pathak

  Reply With Quote
Old 05-06-2021, 07:06   #1850 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 8,462
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,258
Xiaomi Redmi 3S (Land) Successfully Flashed by Hydra Tool

Xiaomi Redmi 3S (Land) Successfully Flashed by Hydra Tool

1. Run Hydra Qualcomm Module and Sosc.
2. Choose Brand and Module.
3. Go to "Flash Tool" Tab.
4. Choose Flash file and its location.
5. Click on "Flash"
6. connect device to the computer with USB Data cable
7. Wait until the process is completed.


Screen Short:



Logs:

Quote:
Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM4)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&3478949&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/31/2015,2.1.2.0

Getting device info......
Serial No.: 0x00E7DB3E
MSM ID : 0x0004F0E1, MSM8937-Qualcomm Snapdragon 430
PBL Ver : 00000000
PK HASH : 57158EAF1814D78FD2B3105ECE4DB18A
817A08AC664A5782A925F3FF8403D39A

Firehose Loader[mi_1_7.mbn]
SaharaBoot... Ok
Sending .....................Ok
Connecting to Firehose...
Ping... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 3060409189
Firmware Version : 6
Product Name : Q313MB
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 30535680[14.561 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok

Phone Information.....
Brand : Xiaomi
Vendor : Xiaomi
Model : Redmi 3S
ID : MMB29M
SDK : 23
Release : 6.0.1
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : zh-CN
Description : land-user 6.0.1 MMB29M V7.3.11.0.MALCNDE release-keys
Miui Ver : V7
Device : land
Board : msm8937
Display ID : MMB29M
Security Patch : 2016-06-01
Emmc_size : 16G
Platform : msm8937
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : Xiaomi/land/land:6.0.1/MMB29M/V7.3.11.0.MALCNDE:user/release-keys

Reading GPT[3]
Drive [0] 52 Items
Drive [1] 0 Items
Drive [2] 0 Items


Backup Security partitions...
Reading Security Items....
> modemst1
> modemst2
> fsg
E:\Hydra Dongle\HydraTool_Fullpackage_1-30-2021\Backup\Security_Backup\Redmi 3S_msm8937_6.0.1_Security_050421101511.sec
Backup Security Success....

----------------------------
Flashing Selected Partitions....
- modem(0)[NON-HLOS.bin] Ok
- sbl1(0)[sbl1.mbn] Ok
- sbl1bak(0)[sbl1.mbn] Ok
- rpm(0)[rpm.mbn] Ok
- rpmbak(0)[rpm.mbn] Ok
- tz(0)[tz.mbn] Ok
- tzbak(0)[tz.mbn] Ok
- devcfg(0)[devcfg.mbn] Ok
- devcfgbak(0)[devcfg.mbn] Ok
- dsp(0)[adspso.bin] Ok
- splash(0)[splash.img] Ok
- aboot(0)[emmc_appsboot.mbn] Ok
- abootbak(0)[emmc_appsboot.mbn] Ok
- boot(0)[boot.img] Ok
- recovery(0)[recovery.img] Ok
- system(0)[system.img] Ok
- cache(0)[cache.img] Ok
- persist(0)[persist.img] Skipped
- misc(0)[misc.img] Ok
- lksecapp(0)[lksecapp.mbn] Ok
- lksecappbak(0)[lksecapp.mbn] Ok
- cmnlib(0)[cmnlib.mbn] Ok
- cmnlibbak(0)[cmnlib.mbn] Ok
- cmnlib64(0)[cmnlib64.mbn] Ok
- cmnlib64bak(0)[cmnlib64.mbn] Ok
- keymaster(0)[keymaster.mbn] Ok
- keymasterbak(0)[keymaster.mbn] Ok
- cust(0)[cust.img] Ok
- userdata(0)[userdata.img] Ok
- PrimaryGPT(0)[gpt_main0.bin] Ok

Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-33.] OK
0 [CRC32(2,6656)] OK
0 [CRC32(NUM_DISK_SECTORS-33.,6656)] OK
0 [0] OK
0 [CRC32(1,92)] OK
0 [0] OK
0 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 0
Set bootable storage drive 0 Ok

Rebooting Phone.... Ok

Elapsed Time : 00:08:20
BR
Dipendra Pathak

  Reply With Quote
The Following User Says Thank You to Dipendra Pathak For This Useful Post:
Old 05-06-2021, 07:28   #1851 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 8,462
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,258
Xiaomi Redmi Note 8 (ginkgo) successfully flashed by Hydra Tool

Xiaomi Redmi Note 8 (ginkgo) successfully flashed by Hydra Tool

1. Run Hydra Qualcomm Module and Sosc.
2. Choose Brand and Module.
3. Go to "Flash Tool" Tab.
4. Choose Flash file and its location.
5. Click on "Flash"
6. connect device to the computer with USB Data cable
7. Wait until the process is completed.


Screen Short:



Logs:

Quote:
Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM20)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&18524d94&0&4#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :03/01/2019,2.1.3.6

Getting device info......
Serial No.: 0x19D470A0
MSM ID : 0x0010A0E1, SM6125-Qualcomm Snapdragon 665
PBL Ver : 00000000
PK HASH : 1BEBE3863A6781DB4B01086063007334
DE9E5CA14971C7C4F4358EC9D79CDA46

Firehose Loader[Xiaomi_redminote8_loader.elf]
SaharaBoot... Ok
Sending ..............................Ok
Connecting to Firehose...
Ping..................... Ok
Configuration.........
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Jul 3 2019 - 22:23:56

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 10614171
Firmware Version : 909127728
Product Name : hC8aP>
Physical Partitions : 4
Total Logical Blocks:
Drive [0] 122142720[58,242 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Drive [3] 32768[16 MB]

Protocol : Universal
Running : Ok

Phone Information......
Brand : xiaomi
Vendor : Xiaomi
Model : GINKGO
ID : PKQ1.190616.001
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : ginkgo-userdebug 9 PKQ1.190616.001 211 test-keys
Device : ginkgo
Display ID : ginkgo-userdebug 9 PKQ1.190616.001 211 test-keys
Security Patch : 2019-06-05
Fingerprint : xiaomi/ginkgo/ginkgo:9/PKQ1.190616.001/211:userdebug/test-keys

Reading GPT[4]
Drive [0] 88 Items
Drive [1] 0 Items
Drive [2] 0 Items
Drive [3]


Backup Security partitions...
Reading Security Items....
> modemst1
> modemst2
> fsg
C:\Hydra Tool\Backup\Security_Backup\GINKGO__9_Security_050 321214049.sec
Backup Security Success....

----------------------------
Flashing Selected Partitions....
- qupfw(0)[qupv3fw.elf] Ok
- qupfwbak(0)[qupv3fw.elf] Ok
- vbmeta(0)[vbmeta.img] Ok
- vbmetabak(0)[vbmeta.img] Ok
- xbl_config(0)[xbl_config.elf] Ok
- xbl_configbak(0)[xbl_config.elf] Ok
- devcfg(0)[devcfg.mbn] Ok
- devcfgbak(0)[devcfg.mbn] Ok
- storsec(0)[storsec.mbn] Ok
- rpm(0)[rpm.mbn] Ok
- rpmbak(0)[rpm.mbn] Ok
- hyp(0)[hyp.mbn] Ok
- hypbak(0)[hyp.mbn] Ok
- keymaster(0)[km4.mbn] Ok
- keymasterbak(0)[km4.mbn] Ok
- cmnlib(0)[cmnlib.mbn] Ok
- cmnlib64(0)[cmnlib64.mbn] Ok
- cmnlibbak(0)[cmnlib.mbn] Ok
- cmnlib64bak(0)[cmnlib64.mbn] Ok
- abl(0)[abl.elf] Ok
- ablbak(0)[abl.elf] Ok
- bluetooth(0)[BTFM.bin] Ok
- bluetoothbak(0)[BTFM.bin] Ok
- misc(0)[misc.img] Ok
- imagefv(0)[imagefv.elf] Ok
- imagefvbak(0)[imagefv.elf] Ok
- uefisecapp(0)[uefi_sec.mbn] Ok
- uefisecappbak(0)[uefi_sec.mbn] Ok
- xbl(0)[xbl.elf] Ok
- xblbak(0)[xbl.elf] Ok
- tz(0)[tz.mbn] Ok
- tzbak(0)[tz.mbn] Ok
- logfs(0)[logfs_ufs_8mb.bin] Ok
- metadata(0)[metadata.img] Ok
- dtbo(0)[dtbo.img] Ok
- dtbobak(0)[dtbo.img] Ok
- dsp(0)[dspso.bin] Ok
- dspbak(0)[dspso.bin] Ok
- persist(0)[persist.img] Skipped
- boot(0)[boot.img] Ok
- bootbak(0)[boot.img] Ok
- recovery(0)[recovery.img] Ok
- modem(0)[NON-HLOS.bin] Ok
- modembak(0)[NON-HLOS.bin] Ok
- cache(0)[cache.img] Ok
- cust(0)[cust.img] Ok
- vendor(0)[vendor.img] Ok
- system(0)[system.img] Ok
- userdata(0)[userdata.img] Ok
- PrimaryGPT(0)[gpt_main0.bin] Ok

Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-33.] OK
0 [CRC32(2,11264)] OK
0 [CRC32(NUM_DISK_SECTORS-33.,11264)] OK
0 [0] OK
0 [CRC32(1,92)] OK
0 [0] OK
0 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 0
Set bootable storage drive 0 Ok

Rebooting Phone.... Ok

Elapsed Time : 00:27:28
BR
Dipendra Pathak

  Reply With Quote
Old 05-06-2021, 07:35   #1852 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 8,462
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,258
Xiaomi Redmi 6 Pro (Sa.Ku.Ra.) Successfully flashed by Hydra Tool

Xiaomi Redmi 6 Pro (Sa.Ku.Ra.) Successfully flashed by Hydra Tool

1. Run Hydra Qualcomm Module and Sosc.
2. Choose Brand and Module.
3. Go to "Flash Tool" Tab.
4. Choose Flash file and its location.
5. Click on "Flash"
6. connect device to the computer with USB Data cable
7. Wait until the process is completed.




Screen Short:



Logs:

Quote:
Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM49)
SymbolicName :\??\USB#VID_05C6&PID_9008#6&265d47d&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :

Getting device info......
Serial No.: 0x17F2831E
MSM ID : 0x000460E1, MSM8953-Qualcomm Snapdragon 625
PBL Ver : 00000000
PK HASH : 57158EAF1814D78FD2B3105ECE4DB18A
817A08AC664A5782A925F3FF8403D39A

Firehose Loader[Xiaomi_Remi 6 pro_******_8953_ddr.mbn]
SaharaBoot... Ok
Sending ....................Ok
Connecting to Firehose...
Ping... Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[DPP5qdsDzvIg7UbM0ssFhmPVm8G]
Checking Internet connection....
- Hydra Is Online
Connecting to Hydra Xiaomi Server...

Signature @256bytes Authentication.... Accepted......
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8953
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 69
Serial Number : 2516084797
Firmware Version : 2314907615826620721
Product Name : DL2032
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 61071360[29.121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok

Phone Information.....
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi 6 Pro
ID : OPM1.171019.019
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : zh-CN
Description : ******-user 8.1.0 OPM1.171019.019 V10.0.5.0.ODICNFH release-keys
Miui Ver : V10
Device : ******
Display ID : ZQL1715-******-build-20181019192740
Security Patch : 2018-10-05
Emmc_size : 16GB
Fingerprint : xiaomi/******/******:8.1.0/OPM1.171019.019/V10.0.5.0.ODICNFH:user/release-keys

Reading GPT[3]
Drive [0] 60 Items
Drive [1] 0 Items
Drive [2] 0 Items


Backup Security partitions...
Reading Security Items....
> modemst1
> modemst2
> fsg
C:\Hydra Tool\Backup\Security_Backup\Redmi 6 Pro__8.1.0_Security_050421100057.sec
Backup Security Success....

----------------------------
Flashing Selected Partitions....
- sec(0)[sec.dat] Ok
- config(0)[config.bin] Ok
- lksecapp(0)[lksecapp.mbn] Ok
- lksecappbak(0)[lksecapp.mbn] Ok
- devcfg(0)[devcfg.mbn] Ok
- devcfgbak(0)[devcfg.mbn] Ok
- apdp(0)[dummy.img] Ok
- msadp(0)[dummy.img] Ok
- sbl1(0)[sbl1.mbn] Ok
- sbl1bak(0)[sbl1.mbn] Ok
- rpm(0)[rpm.mbn] Ok
- rpmbak(0)[rpm.mbn] Ok
- cmnlib(0)[cmnlib_30.mbn] Ok
- cmnlibbak(0)[cmnlib_30.mbn] Ok
- cmnlib64(0)[cmnlib64_30.mbn] Ok
- cmnlib64bak(0)[cmnlib64_30.mbn] Ok
- keymaster(0)[keymaster64.mbn] Ok
- keymasterbak(0)[keymaster64.mbn] Ok
- misc(0)[misc.img] Ok
- aboot(0)[emmc_appsboot.mbn] Ok
- abootbak(0)[emmc_appsboot.mbn] Ok
- tz(0)[tz.mbn] Ok
- tzbak(0)[tz.mbn] Ok
- splash(0)[splash.img] Ok
- dsp(0)[adspso.bin] Ok
- mdtp(0)[mdtp.img] Ok
- persist(0)[persist.img] Ok
- boot(0)[boot.img] Ok
- recovery(0)[recovery.img] Ok
- modem(0)[NON-HLOS.bin] Ok
- cache(0)[cache.img] Ok
- system(0)[system.img] Ok
- vendor(0)[vendor.img] Ok
- cust(0)[cust.img] Ok
- userdata(0)[userdata.img] Ok
- PrimaryGPT(0)[gpt_main0.bin] Ok

Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-33.] OK
0 [CRC32(2,7680)] OK
0 [CRC32(NUM_DISK_SECTORS-33.,7680)] OK
0 [0] OK
0 [CRC32(1,92)] OK
0 [0] OK
0 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
----------------------------
Done!

Rebooting Phone.... Ok

Elapsed Time : 00:03:14
BR
Dipendra Pathak

  Reply With Quote
Old 05-07-2021, 12:07   #1853 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 8,462
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,258
Xioami Redmi 8 (Olive) Mi Account Patched by New Method by Hydra Tool

Xioami Redmi 8 (Olive) Mi Account Patched by New Method by Hydra Tool

1. Run Hydra Qualcomm Module, Select Brand and Model
2. Go to Service-->Xiaoami
3. Choose "Mi Account" from drop down method
4. Choose "Remove Mi Account (New Method)" from Flash Mode
5. Execute and connect the device to the computer with data cable
6. wait until the process is completed.


Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : XIAOMI Model : Redmi 8 (olive) Storage : Auto
Loader: Xiaomi_Redmi_8_Olive.mbn
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM23)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&31b872b&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :02/05/2018,3.0.0.0

Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 2539928688
Firmware Version : 909127728
Product Name : hB8aP>
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 61071360[29,121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok
Reading GPT[3]
Drive [0] 64 Items
Drive [1] 0 Items
Drive [2] 0 Items


Phone Information......
Vendor : Xiaomi
ID : QKQ1.191014.001
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Miui Ver : V12
Mod_device : olive_global
Security Patch : 2021-03-01
Emmc_size : 16GB

Processing Remove MiAccount[New Method]....
Backing up Partition for safety...Ok

Scanning Patching address...
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]Done!!
Total Items patched : 20
Successfully patched address..
Action Result : Ok

Rebooting Phone.... Ok

Elapsed Time : 00:00:38
BR
Dipendra Pathak

  Reply With Quote
Old 05-07-2021, 12:22   #1854 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 8,462
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,258
Xiaomi Redmi Note 5 Pro (Whyred) Mi Account successfully removed by Hydra Tool

Xiaomi Redmi Note 5 Pro (Whyred) Mi Account successfully removed by Hydra Tool

1. Run Hydra Qualcomm Module, Select Brand and Model
2. Go to Service-->Xiaoami
3. Choose "Mi Account" from drop down method
4. Choose "Remove Mi Account (New Method)" from Flash Mode
5. Execute and connect the device to the computer with data cable
6. wait until the process is completed


Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : XIAOMI Model : Redmi Note 5 Pro (Whyred) Storage : Auto
Loader: mi_2_9.elf
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM24)
SymbolicName :\??\USB#VID_05C6&PID_9008#6&1923b7cb&0&1#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :03/17/2014,5.2104.1.2

Getting device info......
Serial No.: 0x1D95B8F2
MSM ID : 0x000CC0E1,
PBL Ver : 00000000
PK HASH : A7B8B82545A98ECA23D6E9105FB46456
8D1B5828264903441BDEF0CD57E3C370

Firehose Loader[mi_2_9.elf]
SaharaBoot... Ok
Sending ...............................Ok
Connecting to Firehose...
Ping...... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : MSM8996
Version : 1
DateTime : Aug 2 2018 - 22:27:53

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 19
Serial Number : 45391774
Firmware Version : 5644752166968636211
Product Name : S0J97Y
Physical Partitions : 4
Total Logical Blocks:
Drive [0] 61071360[29.121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Drive [3] 8192[4 MB]

Protocol : Universal
Running : Ok
Reading GPT[4]
Drive [0] 64 Items
Drive [1] 0 Items
Drive [2] 0 Items
Drive [3]


Phone Information.....
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi Note 5
ID : OPM1.171019.011
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : whyred-user 8.1.0 OPM1.171019.011 V9.6.4.0.OEIMIFD release-keys
Miui Ver : V9
Device : whyred
Mod_device : whyred_global
Display ID : OPM1.171019.011
Security Patch : 2018-08-01
Fingerprint : xiaomi/whyred/whyred:8.1.0/OPM1.171019.011/V9.6.4.0.OEIMIFD:user/release-keys

Processing Remove MiAccount[New Method]....
Backing up Partition for safety...Ok

Scanning Patching address...
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]Done!!
Total Items patched : 27
Successfully patched address..
Action Result : Ok

Elapsed Time : 00:00:40
BR
Dipendra Pathak

  Reply With Quote
Old 05-07-2021, 12:41   #1855 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 8,462
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,258
Xiaomi Redmi 2W (2014811) successfully flashed by Hydra Tool

Xiaomi Redmi 2W (2014811) successfully flashed by Hydra Tool

1. Run Hydra Qualcomm Module and Sosc.
2. Choose Brand and Module.
3. Go to "Flash Tool" Tab.
4. Choose Flash file and its location.
5. Click on "Flash"
6. connect device to the computer with USB Data cable
7. Wait until the process is completed.


Screen Short:



Logs:

Quote:
Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM36)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&7f9be32&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/02/2017,2.1.2.7

Getting device info.....
Serial No.: 0x093E0551
MSM ID : 0x007050E1, MSM8916-Qualcomm Snapdragon 410
PBL Ver : 00000000
PK HASH : CC3153A80293939B90D02D3BF8B23E02
92E452FEF662C74998421ADAD42A380F

Firehose Loader[8916.mbn]
SaharaBoot... Ok
Sending .....Ok
Connecting to Firehose...
Ping. Ok
Configuration........
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8916
Version : 1


Protocol : Universal
Running : Ok

Phone Information.....
Brand : Xiaomi
Vendor : Xiaomi
Model : wt88047
ID : LMY47V
SDK : 22
Release : 5.1.1
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Description : wt88047-user 5.1.1 LMY47V V9.2.4.0.LHJMIEK release-keys
Miui Ver : V9
Device : wt88047
Mod_device : wt88047_pro_global
Board : msm8916
Display ID : LMY47V
Security Patch : 2017-01-01
Platform : msm8916
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : Xiaomi/wt88047/wt88047:5.1.1/LMY47V/V9.2.4.0.LHJMIEK:user/release-keys

Reading GPT[3]
Drive [0] 32 Items
Drive [1] 0 Items
Drive [2] 0 Items


Backup Security partitions...
Reading Security Items....
> modemst1
> modemst2
> fsg
C:\Hydra Tool\Backup\Security_Backup\wt88047_msm8916_5.1.1_ Security_050421105424.sec
Backup Security Success....

----------------------------
Flashing Selected Partitions....
- modem(0)[NON-HLOS.bin] Ok
- sbl1(0)[sbl1.mbn] Ok
- sbl1bak(0)[sbl1.mbn] Ok
- aboot(0)[emmc_appsboot.mbn] Ok
- abootbak(0)[emmc_appsboot.mbn] Ok
- rpm(0)[rpm.mbn] Ok
- rpmbak(0)[rpm.mbn] Ok
- tz(0)[tz.mbn] Ok
- tzbak(0)[tz.mbn] Ok
- hyp(0)[hyp.mbn] Ok
- hypbak(0)[hyp.mbn] Ok
- splash(0)[splash.img] Ok
- sec(0)[sec.dat] Skipped
- boot(0)[boot.img] Ok
- system(0)[system.img] Ok
- cache(0)[cache.img] Ok
- persist(0)[persist.img] Skipped
- recovery(0)[recovery.img] Ok
- userdata(0)[userdata.img] Ok
- PrimaryGPT(0)[gpt_main0.bin] Ok

Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-33.] OK
0 [CRC32(2,4096)] OK
0 [CRC32(NUM_DISK_SECTORS-33.,4096)] OK
0 [0] OK
0 [CRC32(1,92)] OK
0 [0] OK
0 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 0
Set bootable storage drive 0 Ok

Rebooting Phone.... Ok

Elapsed Time : 00:12:02
BR
Dipendra Pathak

  Reply With Quote
Old 05-07-2021, 12:51   #1856 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 8,462
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,258
Vivo Y53 safe formatted user data successfully done by Hydra Tool

1. Run Qualcomm Tool and choose "Sosc"
2. Choose Brand and Module.
3. Go to "Service"--> "Vivo"
4. Choose "Factory Reset" from drop down menu
5. Choose "Safa formet EMMC" from Flash Mode
6. Click on "Execute"
7. Connect device to computer using USB Data Cable.
8. Wait until the operation is completed.


Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : VIVO Model : Y53 Storage : Auto
Loader: 8917.mbn
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM49)
SymbolicName :\??\USB#VID_05C6&PID_9008#7&2683b958&0&2#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :03/25/2016,2.1.2.2

Getting device info......
Serial No.: 0x8F319B40
MSM ID : 0x000560E1, MSM8917-Qualcomm Snapdragon 425
PBL Ver : 00000000
PK HASH : 60BA997FEF6DA9F05885FA11F1DD6D2A
90D052A257A09C2075D7246CC73C0D43

Firehose Loader[8917.mbn]
SaharaBoot... Ok
Sending .................Ok
Connecting to Firehose...
Ping... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8917
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 1815463165
Firmware Version : 13
Product Name : QE13MB
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 30535680[14.561 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok
Reading GPT[3]
Drive [0] 52 Items
Drive [1] 0 Items
Drive [2] 0 Items


Phone Information.....
Brand : vivo
Vendor : vivo
Model : vivo PD1628F_EX
ID : MMB29M
SDK : 23
Release : 6.0.1
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-US
Description : msm8937_32-user 6.0.1 MMB29M eng.compiler.20190105.211334 release-keys
Device : PD1628F_EX
Board : QC_Reference_Phone
Display ID : MMB29M release-keys
Security Patch : 2018-08-01
Emmc_size : 16GB
Platform : msm8937
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : vivo/PD1628F_EX/PD1628F_EX:6.0.1/MMB29M/compiler01052117:user/release-keys

Processing Safe Format - EMMC....
- Removing FRP [Zero Wipe] Ok
- Formatting Userdata [Safe method] Ok
Action Result : Ok

Rebooting Phone.... Ok

Elapsed Time : 00:00:11
BR
Dipendra Pathak

  Reply With Quote
Old 05-07-2021, 13:04   #1857 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 8,462
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,258
Oppo Realme 3 (RMX1821) Safe format Universal done by Hydra Tool

Oppo Realme 3 (RMX1821) Safe format Universal done by Hydra Tool

1. Run MTK Tool and choose "Sosc"
2. Choose Brand and Module.
3. Go to "Service"--> "Tool"
4. Choose "Factory format / Format user Data"
5. Choose "Auto" from "Method / Option" drop down menu.
6. Connect device to computer using USB Data Cable.
7. Wait until the operation is completed.


Screen Short:



Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port_V1632 (COM8)
SymbolicName :\??\USB#VID_0E8D&PID_0003#6&1485bec3&0&3#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0788MT6771[6771]
BROM HW_SW_VER : 8A00 CA00 0000 0000
getMTKPayloadExploit : 0788
#Executing Exploit..
#SUCCESS..
Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0788MT6771[6771]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
SECURE VERSION : 05
BL VERSION : FE
BR Secured : E0

Preparing Download Agent..
DA : [Not Exist]
Trying Default 6771.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2020-11-03.22:07_536568
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : brom
Preloader Initialization...
Parsing Realme_3_preloader_oppo6771_18601.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 428178A87C6AA61822F063B5E27067BB
ERAM Size : 0x0000000000039000 -228 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 90014A68423861503E036C42E9D26683 - hB8aP>

DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info
ID : QP1A.190711.020
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6771-user 10 QP1A.190711.020 08805472cb0b87b3 release-keys
Display ID : QP1A.190711.020 release-keys
Security Patch : 2021-03-05
StorageType : mtp
Userdata State : Not Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_oppo6771.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0788__050421093523\MT6771_Androi d_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x09E88000]1024 KB ->frp.bin...Ok
-nvdata[0x0BF88000]64 MB ->nvdata.bin...Ok
-persist[0x13800000]48 MB ->persist.bin...Ok
-nvram[0x22D00000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0788__050421093523
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 428178A87C6AA61822F063B5E27067BB
ERAM Size : 0x0000000000039000 -228 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 90014A68423861503E036C42E9D26683 - hB8aP>

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
ID : QP1A.190711.020
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6771-user 10 QP1A.190711.020 08805472cb0b87b3 release-keys
Display ID : QP1A.190711.020 release-keys
Security Patch : 2021-03-05
StorageType : mtp
Userdata State : Not Encrypted

-------------------------------------
Operation : Auto
Processing...
Safeformat Universal... Ok

Elapsed Time : 00:01:14
BR
Dipendra Pathak

  Reply With Quote
Old 05-07-2021, 13:12   #1858 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 8,462
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,258
Vivo V7 Plus (PD17008F) formatting user data successfully done by Hydra Tool

Vivo V7 Plus (PD17008F) formatting user data successfully done by Hydra Tool

1. Run Qualcomm Tool of Hydra Dongle.
2. Choose Brand and Module.
3. Go to "Service"--> "Universal"
4. Choose "Ultra Power Option" from drop down menu.
5. Choose "Auto" and click "Execute".
6. Connect device to computer using USB Data Cable.
7. Wait until the operation is completed.


Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : VIVO Model : V7 Plus (PD1708F) Storage : Auto
Loader: vivo_2_9.mbn
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM8)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&241a019b&0&1#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/31/2015,2.1.2.0

Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8953
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 2589639888
Firmware Version : 3
Product Name : RX64MB
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 61071360[29.121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok
Reading GPT[3]
Drive [0] 56 Items
Drive [1] 0 Items
Drive [2] 0 Items


Phone Information.....
Brand : vivo
Vendor : vivo
Model : vivo 1718
ID : OPM1.171019.026
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : msm8953_64-user 8.1.0 OPM1.171019.026 eng.compil.20200103.191629 release-keys
Device : msm8953_64
Board : msm8953
Display ID : OPM1.171019.026 release-keys
Security Patch : 2020-01-01
Emmc_size : 16GB
Platform : msm8953
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : vivo/1718/1718:8.1.0/OPM1.171019.026/compil01031916:user/release-keys

Processing Auto....
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOk
- Formatting Userdata
Executing ...
- Formatting Userdata [Safe method] OkOk
Action Result : Ok

Elapsed Time : 00:00:15
BR
Dipendra Pathak

  Reply With Quote
Old 05-07-2021, 13:21   #1859 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 8,462
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,258
Oppo A83 (CPH1729) rebuilding user data successfully done by Hydra Tool

Oppo A83 (CPH1729) rebuilding user data successfully done by Hydra Tool

1. Run MTK Tool and choose "Sosc"
2. Choose Brand and Module.
3. Go to "Service"--> "Tool"
4. Choose "Ultra Power Option"
5. Choose "Rebuilt User Data" from Method / Option drop down menu
6. Click on "Execute"
7. Connect device to computer using USB Data Cable.
8. Wait until the operation is completed.


Screen Short:



Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port_V1632 (COM18)
SymbolicName :\??\USB#VID_0E8D&PID_0003#5&16e57acc&0&1#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0690MT6763T[6763]
BROM HW_SW_VER : 8A00 CA01 0001 0000
getMTKPayloadExploit : 0690
#Executing Exploit..
#SUCCESS..
Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0690MT6763T[6763]
BROM HW_SW_VER : 8A00 CA01 0001 0000
SECURE VERSION : 00
BL VERSION : FE
BR Secured : 00
NORMAL BOOT

Preparing Download Agent..
DA : 6763_F156FF6B3D.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2017/09/22.09:22
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_oppo6763_17101.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 839DD8C74A1E5FAD4C88B685D687818D
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003A3E00000 -14.561 GB
eMMC CID : 150100514536334D420326FD97AB5531 - QE63MB

DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info
Brand : OPPO
Vendor : OPPO
Model : OPPO A83js
ID : N6F26Q
SDK : 25
Release : 7.1.1
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6763_17101-user 7.1.1 N6F26Q 1526236878 release-keys
Device : M6763E
Board : full_oppo6763_17101
Display ID : A83jsEX_11_A.14_180514
Security Patch : 2018-05-05
Platform : mt6763
FRPPST : /dev/block/platform/bootdevice/by-name/frp
StorageType : mtp
Userdata State : Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_oppo6763_17101.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0690__050421112658\MT6763T_Andro id_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x05A88000]1024 KB ->frp.bin...Ok
-nvdata[0x07B88000]64 MB ->nvdata.bin...Ok
-persist[0x0F800000]48 MB ->persist.bin...Ok
-nvram[0x1A000000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0690__050421112658
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 839DD8C74A1E5FAD4C88B685D687818D
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003A3E00000 -14.561 GB
eMMC CID : 150100514536334D420326FD97AB5531 - QE63MB

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Brand : OPPO
Vendor : OPPO
Model : OPPO A83js
ID : N6F26Q
SDK : 25
Release : 7.1.1
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6763_17101-user 7.1.1 N6F26Q 1526236878 release-keys
Device : M6763E
Board : full_oppo6763_17101
Display ID : A83jsEX_11_A.14_180514
Security Patch : 2018-05-05
Platform : mt6763
FRPPST : /dev/block/platform/bootdevice/by-name/frp
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Rebuild Userdata
Processing...
Erasing FRP Partition...
Rebuilding Userdata... Ok

Elapsed Time : 00:00:48
BR
Dipendra Pathak

  Reply With Quote
Old 05-08-2021, 11:36   #1860 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 8,462
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,258
Xiaomi Redmi 9 Lancelot Remove Mi Account (Erased Method) by Hydra Tool

Xiaomi Redmi 9 Lancelot Remove Mi Account (Erased Method) by Hydra Tool

1. Run Hydra MTK Module and choose "Sosc"
2. Select Brand and Model
3. Go to Service-->Tools-->Xiaoami
4. Choose "Remove Mi Account + FRP" from "Method / Option" drop down menu
5. Execute and connect the device to the computer with data cable
6. wait until the process is completed.

Screen Short:



Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port (COM14)
Device :5&15c64844&0&2
SymbolicName :\??\USB#VID_0E8D&PID_0003#5&15c64844&0&2#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2016,3.0.1504.0


Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : CA7E1C85333469A9C4BB22E3D2E6114E
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 15010044503644414203A9FECA7A8731 - DP6DAB

Reading GPT-EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Remove MiAccount[Erase Method]
Processing...
-persist.bin[0x104A2000]48 MB ->persist.bin...Ok
-frp.bin[0x05508000]1024 KB ->frp.bin...Ok Ok

Elapsed Time : 00:00:09
BR
Dipendra Pathak

  Reply With Quote
Reply

Bookmarks

Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


 



All times are GMT +1. The time now is 23:35.



Powered by Searchlight © 2021 Axivo Inc.
vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2021 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2017 -
Page generated in 0.27629 seconds with 8 queries

SEO by vBSEO