GSM Shop GSM Shop
GSM-Forum  

Welcome to the GSM-Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features.
Only registered members may post questions, contact other members or search our database of over 8 million posts.

Registration is fast, simple and absolutely free so please - Click to REGISTER!

If you have any problems with the registration process or your account login, please contact contact us .

Go Back   GSM-Forum > Product Support Sections > Special Solutions / Services / WebShop > GSMFABRICA Products > HYDRA TOOL


Reply
 
LinkBack Thread Tools Display Modes
Old 05-08-2021, 11:42   #1861 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,611
Xiaomi Redmi Note 4 disable mi Account Ati-relock Method successfully done by Hydra T


Xiaomi Redmi Note 4 disable mi Account Ati-relock Method successfully done by Hydra T

1. Run Hydra MTK Module and choose "Sosc"
2. Select Brand and Model as "Auto"
3. Go to Service-->Tools-->Xiaoami
4. Choose "Disable Mi Account Anti Lock" from "Method / Option" drop down menu
5. Execute and connect the device to the computer with data cable
6. wait until the process is completed.


Screen Short:



Logs:

Quote:
Starting ADB Server....
Searching Device By ADB
Device Found...
Model : Redmi Note 4
Brand : Xiaomi
Android Ver : 6.0
CPU abi : arm64-v8a
Software Version :
CSC Version :
Bootloader :
Board :
Display ID : MRA58K
Security Patch : 2016-09-05
Emmc_size :
Platform : mt6797
Kernel ID : 2016-09-05
Marketname :
OTA Version Name :
SYS USB CONFIG : persist.mtp,adb
FRPPST :
FingerPrint : Xiaomi/nikel/nikel:6.0/MRA58K/V8.0.4.0.MBFMIDG:user/release-keys

Checking Root Status....
Root Status : Not Rooted

Operation : Disable Mi Account Anti-Relock
Disable Mi Account ...
Disbaling MI Account
Please wait...
Disabled Mi Account Success Ok

Elapsed Time : 00:00:13
BR
Dipendra Pathak

  Reply With Quote
Old 05-08-2021, 11:50   #1862 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,611
My Phone my X9 factory reset (Format user data) successfully removed by Hydra Tool

My Phone my X9 factory reset (Format user data) successfully removed by Hydra Tool

1. Run Hydra MTK Module and choose "Sosc"
2. Select Brand and Model as "Auto"
3. Go to Service-->Tools
4. Choose "Factory Reset / Format user data"
5. Choose "Auto" from "Method / Option" drop down menu
6. Execute and connect the device to the computer with data cable
7. wait until the process is completed.


Screen Short:



Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode Preloader
FriendlyName :MediaTek PreLoader USB VCOM_V1632 (Android) (COM16)
SymbolicName :\??\USB#VID_0E8D&PID_2000#6&2f8c4b4&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0699MT6739[6739]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
SECURE VERSION : 00
BL VERSION : 03
BR Secured : 00

Preparing Download Agent..
DA : 6739.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2020-11-03.22:07_536568
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
C0
Protocol : New
Synchronization...
SYNCSYNC
Mode : preloader

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 6C862580BCAD7F070BD642D8A1A7CF8B
ERAM Size : 0x0000000000020000 -128 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003AB400000 -14.676 GB
eMMC CID : 13014E51324A33364310006201907289 - Q2J36C

DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info
Brand : MyPhone
Vendor : MyPhone
Model : myX9
ID : O11019
SDK : 27
Release : 8.1.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-US
Description : full_pu5e62_wt2_s551_e16-user 8.1.0 O11019 1540891394 release-keys
Device : myX9
Display ID : S551_MYX9_20181102_V1.10
Security Patch : 2018-10-05
Fingerprint : MyPhone/myX9/myX9:8.1.0/O11019/1540891394:user/release-keys
StorageType : mtp
Userdata State : Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_pu5e62_wt2_s551_e16.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0699_MyPhone_myX9_myX9_8.1.0_O11 019_1540891394_050821131450\MT6739_Android_scatter .txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x02D88000]1024 KB ->frp.bin...Ok
-nvdata[0x03688000]32 MB ->nvdata.bin...Ok
-nvram[0x10700000]5 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0699_MyPhone_myX9_myX9_8.1.0_O11 019_1540891394_050821131450
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 6C862580BCAD7F070BD642D8A1A7CF8B
ERAM Size : 0x0000000000020000 -128 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003AB400000 -14.676 GB
eMMC CID : 13014E51324A33364310006201907289 - Q2J36C

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Brand : MyPhone
Vendor : MyPhone
Model : myX9
ID : O11019
SDK : 27
Release : 8.1.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-US
Description : full_pu5e62_wt2_s551_e16-user 8.1.0 O11019 1540891394 release-keys
Device : myX9
Display ID : S551_MYX9_20181102_V1.10
Security Patch : 2018-10-05
Fingerprint : MyPhone/myX9/myX9:8.1.0/O11019/1540891394:user/release-keys
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Auto
Processing...
Safeformat Universal... Ok

Elapsed Time : 00:00:27
BR
Dipendra Pathak

  Reply With Quote
Old 05-08-2021, 11:57   #1863 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,611
Oppo A83 (CPH1729) rebuilding user data successfully done by Hydra Tool

Oppo A83 (CPH1729) rebuilding user data successfully done by Hydra Tool

1. Run MTK Tool and choose "Sosc"
2. Choose Brand and Module.
3. Go to "Service"--> "Tool"
4. Choose "Ultra Power Option"
5. Choose "Rebuilt user data" from "Method / Option" drop down menu.
6. Connect device to computer using USB Data Cable.
7. Wait until the operation is completed.


Screen Short:



Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port_V1632 (COM18)
SymbolicName :\??\USB#VID_0E8D&PID_0003#5&16e57acc&0&1#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0690MT6763T[6763]
BROM HW_SW_VER : 8A00 CA01 0001 0000
getMTKPayloadExploit : 0690
#Executing Exploit..
#SUCCESS..
Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0690MT6763T[6763]
BROM HW_SW_VER : 8A00 CA01 0001 0000
SECURE VERSION : 00
BL VERSION : FE
BR Secured : 00
NORMAL BOOT

Preparing Download Agent..
DA : 6763_F156FF6B3D.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2017/09/22.09:22
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_oppo6763_17101.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 839DD8C74A1E5FAD4C88B685D687818D
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003A3E00000 -14.561 GB
eMMC CID : 150100514536334D420326FD97AB5531 - QE63MB

DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info
Brand : OPPO
Vendor : OPPO
Model : OPPO A83js
ID : N6F26Q
SDK : 25
Release : 7.1.1
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6763_17101-user 7.1.1 N6F26Q 1526236878 release-keys
Device : M6763E
Board : full_oppo6763_17101
Display ID : A83jsEX_11_A.14_180514
Security Patch : 2018-05-05
Platform : mt6763
FRPPST : /dev/block/platform/bootdevice/by-name/frp
StorageType : mtp
Userdata State : Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_oppo6763_17101.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0690__050421112658\MT6763T_Andro id_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x05A88000]1024 KB ->frp.bin...Ok
-nvdata[0x07B88000]64 MB ->nvdata.bin...Ok
-persist[0x0F800000]48 MB ->persist.bin...Ok
-nvram[0x1A000000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0690__050421112658
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 839DD8C74A1E5FAD4C88B685D687818D
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003A3E00000 -14.561 GB
eMMC CID : 150100514536334D420326FD97AB5531 - QE63MB

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Brand : OPPO
Vendor : OPPO
Model : OPPO A83js
ID : N6F26Q
SDK : 25
Release : 7.1.1
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6763_17101-user 7.1.1 N6F26Q 1526236878 release-keys
Device : M6763E
Board : full_oppo6763_17101
Display ID : A83jsEX_11_A.14_180514
Security Patch : 2018-05-05
Platform : mt6763
FRPPST : /dev/block/platform/bootdevice/by-name/frp
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Rebuild Userdata
Processing...
Erasing FRP Partition...
Rebuilding Userdata... Ok

Elapsed Time : 00:00:48
BR
Dipendra Pathak

  Reply With Quote
Old 05-08-2021, 12:04   #1864 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,611
Redmi 6A (Cactus) Mi account removed using erased method by Hydra Tool

Redmi 6A (Cactus) Mi account removed using erased method by Hydra Tool

1. Run Hydra MTK Module and choose "Sosc"
2. Select Brand and Model
3. Go to Service-->Tools-->Xiaoami
4. Choose "Remove Mi Account (Erased Method)" from "Method / Option" drop down menu
5. Execute and connect the device to the computer with data cable
6. wait until the process is completed.




Screen Short:



Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port_V1632 (COM3)
Device :6&36559b33&0&3
SymbolicName :\??\USB#VID_0E8D&PID_0003#6&36559b33&0&3#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0766MT6765 [6765]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : E7
SB : 01 (True)
SLA : 02 (True)
DAA : 04 (True)

Exploiting Device...
Successfully Exploited...

Handshaking...Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0766MT6765 [6765]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : 00
SB : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
FUSEID : 00000000
SECURE VERSION : 00
BL VERSION : FE
NORMAL BOOT

Preparing Download Agent..
DA : 6765_Xiaomi_wb.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2020/03/17.…IIÁ10:04_497508
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_cactus.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : F3E0B82BF2968678B57CD4ABA73FFA09
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003A3E00000 -14.561 GB
eMMC CID : 150100514536334D4203EB01072AB585 - QE63MB

DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi 6A
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : zh-CN
Description : cactus-user 9 PPR1.180610.011 V11.0.5.0.PCBCNXM release-keys
Miui Ver : V11
Device : cactus
Display ID : SW_S98506AE1_V009_M13_XM_C3C_USR
Security Patch : 2020-03-01
Fingerprint : xiaomi/cactus/cactus:9/PPR1.180610.011/V11.0.5.0.PCBCNXM:user/release-keys
StorageType : mtp
Userdata State : Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_cactus.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0766_xiaomi_cactus_cactus_9_PPR1 .180610.011_V11.0.5.0.PCBCNXM_050821143955\MT6765_ Android_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x05588000]1024 KB ->frp.bin...Ok
-nvdata[0x07688000]64 MB ->nvdata.bin...Ok
-persist[0x0F000000]64 MB ->persist.bin...Ok
-nvram[0x1BE80000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0766_xiaomi_cactus_cactus_9_PPR1 .180610.011_V11.0.5.0.PCBCNXM_050821143955
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : F3E0B82BF2968678B57CD4ABA73FFA09
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003A3E00000 -14.561 GB
eMMC CID : 150100514536334D4203EB01072AB585 - QE63MB

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi 6A
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : zh-CN
Description : cactus-user 9 PPR1.180610.011 V11.0.5.0.PCBCNXM release-keys
Miui Ver : V11
Device : cactus
Display ID : SW_S98506AE1_V009_M13_XM_C3C_USR
Security Patch : 2020-03-01
Fingerprint : xiaomi/cactus/cactus:9/PPR1.180610.011/V11.0.5.0.PCBCNXM:user/release-keys
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Remove MiAccount[Erase Method]
Processing...
-persist.bin[0x0F000000]64 MB ->persist.bin...Ok
-frp.bin[0x05588000]1024 KB ->frp.bin...Ok Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:01:23
BR
Dipendra Pathak

  Reply With Quote
Old 05-08-2021, 12:04   #1865 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,611
Redmi 6A (Cactus) Mi account removed using erased method by Hydra Tool

Redmi 6A (Cactus) Mi account removed using erased method by Hydra Tool

1. Run Hydra MTK Module and choose "Sosc"
2. Select Brand and Model
3. Go to Service-->Tools-->Xiaoami
4. Choose "Remove Mi Account (Erased Method)" from "Method / Option" drop down menu
5. Execute and connect the device to the computer with data cable
6. wait until the process is completed.




Screen Short:



Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port_V1632 (COM3)
Device :6&36559b33&0&3
SymbolicName :\??\USB#VID_0E8D&PID_0003#6&36559b33&0&3#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0766MT6765 [6765]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : E7
SB : 01 (True)
SLA : 02 (True)
DAA : 04 (True)

Exploiting Device...
Successfully Exploited...

Handshaking...Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0766MT6765 [6765]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : 00
SB : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
FUSEID : 00000000
SECURE VERSION : 00
BL VERSION : FE
NORMAL BOOT

Preparing Download Agent..
DA : 6765_Xiaomi_wb.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2020/03/17.…IIÁ10:04_497508
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_cactus.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : F3E0B82BF2968678B57CD4ABA73FFA09
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003A3E00000 -14.561 GB
eMMC CID : 150100514536334D4203EB01072AB585 - QE63MB

DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi 6A
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : zh-CN
Description : cactus-user 9 PPR1.180610.011 V11.0.5.0.PCBCNXM release-keys
Miui Ver : V11
Device : cactus
Display ID : SW_S98506AE1_V009_M13_XM_C3C_USR
Security Patch : 2020-03-01
Fingerprint : xiaomi/cactus/cactus:9/PPR1.180610.011/V11.0.5.0.PCBCNXM:user/release-keys
StorageType : mtp
Userdata State : Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_cactus.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0766_xiaomi_cactus_cactus_9_PPR1 .180610.011_V11.0.5.0.PCBCNXM_050821143955\MT6765_ Android_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x05588000]1024 KB ->frp.bin...Ok
-nvdata[0x07688000]64 MB ->nvdata.bin...Ok
-persist[0x0F000000]64 MB ->persist.bin...Ok
-nvram[0x1BE80000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0766_xiaomi_cactus_cactus_9_PPR1 .180610.011_V11.0.5.0.PCBCNXM_050821143955
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : F3E0B82BF2968678B57CD4ABA73FFA09
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003A3E00000 -14.561 GB
eMMC CID : 150100514536334D4203EB01072AB585 - QE63MB

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi 6A
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : zh-CN
Description : cactus-user 9 PPR1.180610.011 V11.0.5.0.PCBCNXM release-keys
Miui Ver : V11
Device : cactus
Display ID : SW_S98506AE1_V009_M13_XM_C3C_USR
Security Patch : 2020-03-01
Fingerprint : xiaomi/cactus/cactus:9/PPR1.180610.011/V11.0.5.0.PCBCNXM:user/release-keys
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Remove MiAccount[Erase Method]
Processing...
-persist.bin[0x0F000000]64 MB ->persist.bin...Ok
-frp.bin[0x05588000]1024 KB ->frp.bin...Ok Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:01:23
BR
Dipendra Pathak

  Reply With Quote
Old 05-08-2021, 12:13   #1866 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,611
Cherry Mobile Flare S8 FRP partition successfully done by Hydra Tool

Cherry Mobile Flare S8 FRP partition successfully done by Hydra Tool

1. Run MTK Tool and choose "Sosc"
2. Choose Brand and Module.
3. Go to "Service"--> "Tool"
4. Choose "Factory Reset Protection (FRP)"
5. Choose "Auto" from "Method / Option" drop down menu.
6. Connect device to computer using USB Data Cable.
7. Wait until the operation is completed.

Screen Short:



Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode Preloader
FriendlyName :MediaTek PreLoader USB VCOM_V1632 (Android) (COM21)
Device :6&df2ee03&0&3
SymbolicName :\??\USB#VID_0E8D&PID_2000#6&df2ee03&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0690MT6763T [6763]
hw subcode : 8A00
hw version : CA01
sw version : 0001
Target config : 00
SB : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SECURE VERSION : 00
BL VERSION : 03

Preparing Download Agent..
DA : [Not Exist]
Trying Default 6763.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2020-11-03.22:07_536568
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : preloader

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : A8CE73F5AC84279B25921826DC5D4214
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 13014E51324A39375610002A3D58334B - Q2J97V

DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info
Brand : Cherry_Mobile
Vendor : Cherry_Mobile
Model : Flare S8
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_g1860ps_v2_gh_fng_g33scr_p-user 9 PPR1.180610.011 0729122925 release-keys
Device : X930
Display ID : Cherry_X930_Flare_S8_07292019_v1
Security Patch : 2019-07-05
FRPPST : /dev/block/platform/bootdevice/by-name/frp
Fingerprint : Cherry_Mobile/Flare_S8/X930:9/PPR1.180610.011/0729122925:user/release-keys
StorageType : mtp
Userdata State : Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_g1860ps_v2_gh_fng_g33scr_p.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0690_Cherry_Mobile_Flare_S8_X930 _9_PPR1.180610.011_0729122925_050821013015\MT6763T _Android_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x03588000]1024 KB ->frp.bin...Ok
-nvdata[0x05688000]64 MB ->nvdata.bin...Ok
-persist[0x0D000000]48 MB ->persist.bin...Ok
-nvram[0x17800000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0690_Cherry_Mobile_Flare_S8_X930 _9_PPR1.180610.011_0729122925_050821013015
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : A8CE73F5AC84279B25921826DC5D4214
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 13014E51324A39375610002A3D58334B - Q2J97V

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Brand : Cherry_Mobile
Vendor : Cherry_Mobile
Model : Flare S8
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_g1860ps_v2_gh_fng_g33scr_p-user 9 PPR1.180610.011 0729122925 release-keys
Device : X930
Display ID : Cherry_X930_Flare_S8_07292019_v1
Security Patch : 2019-07-05
FRPPST : /dev/block/platform/bootdevice/by-name/frp
Fingerprint : Cherry_Mobile/Flare_S8/X930:9/PPR1.180610.011/0729122925:user/release-keys
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition... Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:44
BR
Dipendra Pathak

  Reply With Quote
Old 05-08-2021, 12:41   #1867 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,611
Huawei MED-LX9 (Y6P 2020) restoring OEM info successfully done by Hydra Tool

Huawei MED-LX9 (Y6P 2020) restoring OEM info successfully done by Hydra Tool

1. Run MTK tool of Hydra Dongle.
2. Choose Correct Module and Brand.
3. Go to "Service" -- > "Tool"
4. choose "Huawei".
5. Choose "Restore OEM info" from "Method / Option" of drop down menu.
6. Click on "Execute" and connect device with computer using USB cable.
7. Wait until the process is completed.


Screen Short:



Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port_V1633 (COM5)
SymbolicName :\??\USB#VID_0E8D&PID_0003#5&27926011&0&2#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0766MT6765[6765]
BROM HW_SW_VER : 8A00 CA00 0000 0000
getMTKPayloadExploit : 0766
#Executing Exploit..
#SUCCESS..
Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0766MT6765[6765]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
SECURE VERSION : 05
BL VERSION : FE
BR Secured : E0

Preparing Download Agent..
DA : MT6765_Huawei_MED.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2018/10/18.17:38_452898
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...[ERROR]- NOT SYNC
=============================================
Reasons why it fails due to the following"
1. Harware problem/issues
2. If you did Testpoint Kindly check the parts you Touch/TP
3. Powershortage, try to connect Battery
4. Check or replace usb cable and plug directly to your pc usb port.
=============================================
SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_k62v1_64_mexico.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 9744DC8C2DD0A449396145B4EDDCFF3B
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 90014A6843396150330197193C58378D - hC9aP3

DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_k62v1_64_mex_a32.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0766__050821135138\MT6765_Androi d_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x00108000]1024 KB ->frp.bin...Ok
-nvdata[0x00A08000]16 MB ->nvdata.bin...Ok
-persist[0x03800000]8 MB ->persist.bin...Ok
-nvram[0x04400000]5 MB ->nvram.bin...Ok
-oeminfo[0x04900000]32 MB ->oeminfo.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0766__050821135138
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 9744DC8C2DD0A449396145B4EDDCFF3B
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 90014A6843396150330197193C58378D - hC9aP3

Reading GPT-EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Restore OEM Info
Processing... Ok

Elapsed Time : 00:01:26
BR
Dipendra Pathak

  Reply With Quote
Old 05-09-2021, 11:17   #1868 (permalink)
Freak Poster
 
Malik Shani G's Avatar
 
Join Date: Jul 2020
Location: pakistan daska
Age: 29
Posts: 489
Member: 2963610
Status: Offline
Thanks Meter: 520
telenor infinity 5 pattern lock reset done by hydra tool
  Reply With Quote
Old 05-12-2021, 04:47   #1869 (permalink)
Freak Poster
 
Join Date: Jun 2016
Location: INDIA (BIHAR,MOTIHARI)
Posts: 305
Member: 2589490
Status: Offline
Sonork: live:.cid.32a2af136177ed3
Thanks Meter: 231
Donate money to this user
Arrow OPPO A57 (CPH1701) PATTERN FRP REMOVED successfully by HYDRA TOOL (Success)

  Reply With Quote
Old 05-13-2021, 05:12   #1870 (permalink)
Freak Poster
 
Join Date: Jun 2016
Location: INDIA (BIHAR,MOTIHARI)
Posts: 305
Member: 2589490
Status: Offline
Sonork: live:.cid.32a2af136177ed3
Thanks Meter: 231
Donate money to this user
Arrow OPPO A31 {CPH2015} Pattern FRP lock Remove Done By HYDRA TOOL (Success)

  Reply With Quote
Old 05-13-2021, 05:18   #1871 (permalink)
Freak Poster
 
Join Date: Jun 2016
Location: INDIA (BIHAR,MOTIHARI)
Posts: 305
Member: 2589490
Status: Offline
Sonork: live:.cid.32a2af136177ed3
Thanks Meter: 231
Donate money to this user
Arrow SAMSUNG E1200Y {GURU1200} PASSWORD READ Done By HYDRA TOOL (Success)

  Reply With Quote
Old 05-16-2021, 11:15   #1872 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,611
Xioami Redmi 7A Pine successfully flashed by Hydra Tool

Xioami Redmi 7A Pine successfully flashed by Hydra Tool


Screen Shorts


1. Run Hydra Qualcomm Module and Sosc.
2. Choose Brand and Module.
3. Go to "Flash Tool" Tab.
4. Choose Flash file and its location.
5. Click on "Flash"
6. connect device to the computer with USB Data cable
7. Wait until the process is completed.



Logs


Quote:
Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM6)
SymbolicName :\??\USB#VID_05C6&PID_9008#7&4c25bbf&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :03/25/2016,2.1.2.2

Getting device info......
Serial No.: 0x39D76874
MSM ID : 0x000BF0E1, SDM439-Qualcomm Snapdragon 439
PBL Ver : 00000000
PK HASH : 57158EAF1814D78FD2B3105ECE4DB18A
817A08AC664A5782A925F3FF8403D39A

Firehose Loader[Xiaomi_Redmi_8_Olive.mbn]
SaharaBoot... Ok
Sending .......................Ok
Connecting to Firehose...
Ping... Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[Qpzox8kjlHrrP6yL8d8fBbUZ1J1]
Checking Internet connection....
- Hydra Is Online
Connecting to Hydra Xiaomi Server...

Signature @256bytes Authentication.... Accepted......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 989565982
Firmware Version : 165
Product Name : HAG4a2
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 30777344[14.676 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok

Phone Information......
Brand : Xiaomi
Vendor : Xiaomi
Model : Redmi 7A
ID : PKQ1.190319.001
SDK : 28
Release : 9
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-GB
Description : pine-user 9 PKQ1.190319.001 V11.0.7.0.PCMMIXM release-keys
Miui Ver : V11
Device : pine
Mod_device : pine_global
Display ID : ZQL1533-pine-build-20200407194230
Security Patch : 2020-03-01
Emmc_size : 16GB
Fingerprint : Xiaomi/pine/pine:9/PKQ1.190319.001/V11.0.7.0.PCMMIXM:user/release-keys

Reading GPT[3]
Drive [0] 60 Items
Drive [1] 0 Items
Drive [2] 0 Items


Backup Security partitions...
Reading Security Items....
> modemst1
> modemst2
> fsg
C:\tool\Hydra Tool\Backup\Security_Backup\Redmi 7A__9_Security_051621114400.sec
Backup Security Success....

----------------------------
Flashing Selected Partitions....
- sec(0)[sec.dat] Skipped
- config(0)[config.bin] Skipped
- vbmeta(0)[vbmeta.img] Ok
- vbmetabak(0)[vbmeta.img] Ok
- devcfg(0)[devcfg.mbn] Ok
- devcfgbak(0)[devcfg.mbn] Ok
- apdp(0)[dummy.img] Ok
- msadp(0)[dummy.img] Ok
- sbl1(0)[sbl1.mbn] Ok
- sbl1bak(0)[sbl1.mbn] Ok
- rpm(0)[rpm.mbn] Ok
- rpmbak(0)[rpm.mbn] Ok
- cmnlib(0)[cmnlib_30.mbn] Ok
- cmnlibbak(0)[cmnlib_30.mbn] Ok
- cmnlib64(0)[cmnlib64_30.mbn] Ok
- cmnlib64bak(0)[cmnlib64_30.mbn] Ok
- keymaster(0)[km4.mbn] Ok
- keymasterbak(0)[km4.mbn] Ok
- misc(0)[misc.img] Ok
- aboot(0)[emmc_appsboot.mbn] Ok
- abootbak(0)[emmc_appsboot.mbn] Ok
- tz(0)[tz.mbn] Ok
- tzbak(0)[tz.mbn] Ok
- dtbo(0)[dtbo.img] Ok
- dtbobak(0)[dtbo.img] Ok
- splash(0)[splash.img] Ok
- dsp(0)[adspso.bin] Ok
- dspbak(0)[adspso.bin] Ok
- persist(0)[persist.img] Skipped
- mdtp(0)[mdtp.img] Ok
- mdtpbak(0)[mdtp.img] Ok
- boot(0)[boot.img] Ok
- recovery(0)[recovery.img] Ok
- cache(0)[cache.img] Ok
- modem(0)[NON-HLOS.bin] Ok
- system(0)[system.img] Ok
- vendor(0)[vendor.img] Ok
- cust(0)[cust.img] Ok
- userdata(0)[userdata.img] Ok
- PrimaryGPT(0)[gpt_main0.bin] Ok

Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-33.] OK
0 [CRC32(2,7680)] OK
0 [CRC32(NUM_DISK_SECTORS-33.,7680)] OK
0 [0] OK
0 [CRC32(1,92)] OK
0 [0] OK
0 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 0
Set bootable storage drive 0 Ok

Rebooting Phone.... Ok

Elapsed Time : 00:05:15
BR
Dipendra Pathak
  Reply With Quote
Old 05-16-2021, 12:05   #1873 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,611
Xiaomi Redmi Note 5A safe format using EMMC method successfully done by Hydra Tool

Xiaomi Redmi Note 5A safe format using EMMC method successfully done by Hydra Tool


1. Run Hydra Qualcomm Tool.
2. Go to "Service"---->Xiaomi
3. Choose "Factory Reset" from drop down menu.
4. Choose "Safe Format - EMMC" from flash mode
5. Click "Evacuate"
6. Connect cell phone with computer using data cable.
7. Wait until the operation is completed.



Screen Shorts



Logs


Quote:
PreOperation Configuration
Brand : AUTO Model : AUTO Storage : Auto
Loader: Auto
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM8)
SymbolicName :\??\USB#VID_05C6&PID_9008#6&3611d00f&0&4#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/02/2017,2.1.2.7

Getting device info......
Serial No.: 0x1CC8DFC3
MSM ID : 0x000560E1, MSM8917-Qualcomm Snapdragon 425
PBL Ver : 00000000
PK HASH : 57158EAF1814D78FD2B3105ECE4DB18A
817A08AC664A5782A925F3FF8403D39A

Firehose Loader[Redmi_8917.mbn]
SaharaBoot... Ok
Sending ...................Ok
Connecting to Firehose...
Ping... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8917
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 3092121182
Firmware Version : 3
Product Name : QE63MB
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 30535680[14,561 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok
Reading GPT[3]
Drive [0] 48 Items
Drive [1] 0 Items
Drive [2] 0 Items


Phone Information.....
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi Note 5A
ID : N2G47H
SDK : 25
Release : 7.1.2
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : ugglite-user 7.1.2 N2G47H V9.2.1.0.NDFMIEK release-keys
Miui Ver : V9
Device : ugglite
Mod_device : ugglite_global
Board : QC_Reference_Phone
Display ID : N2G47H
Security Patch : 2017-12-01
Emmc_size : 16GB
Platform : msm8937
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : xiaomi/ugglite/ugglite:7.1.2/N2G47H/V9.2.1.0.NDFMIEK:user/release-keys

Processing Safe Format - EMMC....
- Removing FRP [Zero Wipe] Ok
- Formatting Userdata [Safe method] Ok
Action Result : Ok

Elapsed Time : 00:00:12
BR
Dipendra Pathak
  Reply With Quote
The Following User Says Thank You to Dipendra Pathak For This Useful Post:
Old 05-16-2021, 12:30   #1874 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,611
Xiaomi Redmi 9 (Lancelot) Mi Account removed using Erased Method & FRP by Hydra

Xiaomi Redmi 9 (Lancelot) Mi Account removed using Erased Method & FRP by Hydra


1. Run Hydra MTK Module and choose "Sosc"
2. Select Brand and Model
3. Go to Service-->Tools-->Xiaoami
4. Choose "Remove Mi Account + FRP" from "Method / Option" drop down menu
5. Execute and connect the device to the computer with data cable
6. wait until the process is completed.


Screen Shorts




Logs


Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port (COM42)
Device :5&2c705bfe&0&1
SymbolicName :\??\USB#VID_0E8D&PID_0003#5&2c705bfe&0&1#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2016,3.2


Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 31F276EEE1EC64E9B96F7B54E92E1CE4
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 15010044503644414203B683CED09747 - DP6DAB

Reading GPT-EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Remove MiAccount[Erase Method] + FRP
Processing...
-persist.bin[0x104A2000]48 MB ->persist.bin...Ok
-frp.bin[0x05508000]1024 KB ->frp.bin...Ok
__051521200143
Backing up Partition for safety...
-__051521200143[0x104A2000]48 MB ->persist.img...OkOk
Saved to :
C:\Users\sevtemac\Desktop\HydraTool_Fullpackage_1-30-2021\Backup\Persist\__051521200143.bin
Erasing FRP Partition...
-persist.bin[0x104A2000]48 MB ->persist.bin...Ok
-frp.bin[0x05508000]1024 KB ->frp.bin...Ok Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:25
BR
Dipendra Pathak
  Reply With Quote
The Following User Says Thank You to Dipendra Pathak For This Useful Post:
Old 05-17-2021, 06:40   #1875 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,611
Huawei FRL-L23 (Y9A 2021) selected partition successfully flashed by Hydra Tool

Huawei FRL-L23 (Y9A 2021) selected partition successfully flashed by Hydra Tool


1. Run MTK Tool and choose "Sosc"
2. Choose Brand and Module.
3. Go to "Flash"-TaB
4. Choose Flash file or selected file from here.
5. Tick "Auto Reboot" and click "Execute"
6. Connect device to computer using USB Data Cable.
7. Wait until the operation is completed.



Screen Shorts




Logs


Quote:
Brand : HUAWEI Model : FRL-L23 (Y9A 2021) Connection : Flash Mode

=====================================
How To Boot : Power off phone
* BROM Mode : Press VOL + or Press VOL -+
* Preloader Mode : Just Insert cable

Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port (COM18)
Device :6&1c7d0d6&0&3
SymbolicName :\??\USB#VID_0E8D&PID_0003#6&1c7d0d6&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2016,3.2


Handshaking...Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0707MT6768 [6768]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : E5
SB : 01 (True)
SLA : 00 (False)
DAA : 04 (True)

Exploiting Device...
Successfully Exploited...

Handshaking...Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0707MT6768 [6768]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : 00
SB : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
FUSEID : 00000000
SECURE VERSION : 00
BL VERSION : FE
NORMAL BOOT

Preparing Download Agent..
DA : MT6768_Xiaomi_New.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2020/07/07.10:10_513994
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_k69v1_64.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : DD1E9976218F701269CAF674DC6063D2
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000001D1EC00000 -116.48 GB
eMMC CID : 150100445554423432022513C06A97B3 - DUTB42

DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_k69v1_64.bin
Creating Scatter file... C:\hydratool\\Backup\Auto\0707__051521201307\MT676 8_Android_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x01A08000]1024 KB ->frp.bin...Ok
-nvdata[0x03B08000]32 MB ->nvdata.bin...Ok
-persist[0x07800000]8 MB ->persist.bin...Ok
-nvram[0x08100000]21 MB ->nvram.bin...Ok
-oeminfo[0x09600000]32 MB ->oeminfo.bin...Ok
Done!!!
C:\hydratool\\Backup\Auto\0707__051521201307
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : DD1E9976218F701269CAF674DC6063D2
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000001D1EC00000 -116.48 GB
eMMC CID : 150100445554423432022513C06A97B3 - DUTB42

Reading GPT-EMMC [0x00008000] 130 Items

Flashing Selected Partitions....
- pgpt[pgpt.bin] 32 KB Flash -> = Ok
- frp[frp.bin] 1024 KB Flash -> = Ok
- nvdata[nvdata.bin] 32 MB Flash -> = Ok
- persist[persist.bin] 8 MB Flash -> = Ok
- nvram[nvram.bin] 21 MB Flash -> = Ok
- oeminfo[oeminfo.bin] 32 MB Flash -> = Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!
=====================================

Elapsed Time : 00:01:22
BR
Dipendra Pathak
  Reply With Quote
Reply

Bookmarks

Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


 



All times are GMT +1. The time now is 07:54.



Powered by Searchlight © 2023 Axivo Inc.
vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2023 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2023 -
Page generated in 0.43160 seconds with 9 queries

SEO by vBSEO