GSM Shop GSM Shop
GSM-Forum  

Welcome to the GSM-Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features.
Only registered members may post questions, contact other members or search our database of over 8 million posts.

Registration is fast, simple and absolutely free so please - Click to REGISTER!

If you have any problems with the registration process or your account login, please contact contact us .

Go Back   GSM-Forum > Product Support Sections > Special Solutions / Services / WebShop > GSMFABRICA Products > HYDRA TOOL


Reply
 
LinkBack Thread Tools Display Modes
Old 05-26-2021, 13:05   #1921 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Xiaomi Redmi 6A (Cactus) FRP partition successfully removed by Hydra Tool


Xiaomi Redmi 6A (Cactus) FRP partition successfully removed by Hydra Tool

1. Run Hydra MTK Module and choose "Sosc"
2. Select Brand and Model
3. Go to Service-->Tools
4. Choose "factory reset protecton"
5. Choose "Format / Erase" from "Method / Option" drop down menu
6. Execute and connect the device to the computer with data cable
7. wait until the process is completed.


Screen Short:





Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port_V1632 (COM42)
Device :6&944c330&0&2
SymbolicName :\??\USB#VID_0E8D&PID_0003#6&944c330&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0


Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 2B4E00DB119BBCF532529CFAFD93DEA8
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003A3E00000 -14.561 GB
eMMC CID : 150100514536334D42032504F28A9591 - QE63MB

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi 6A
ID : O11019
SDK : 27
Release : 8.1.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-GB
Description : cactus-user 8.1.0 O11019 V10.3.8.0.OCBMIXM release-keys
Miui Ver : V10
Device : cactus
Mod_device : cactus_global
Display ID : O11019
Security Patch : 2019-12-01
Fingerprint : xiaomi/cactus/cactus:8.1.0/O11019/V10.3.8.0.OCBMIXM:user/release-keys
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Format/Erase
Processing...
Erasing FRP Partition... Ok

Elapsed Time : 00:00:04
BR
Dipendra Pathak

  Reply With Quote
Old 05-26-2021, 13:27   #1922 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Oppo CHP 1909 (A5s) Universal Unlock successfully done by Hydra Tool

Oppo CHP 1909 (A5s) Universal Unlock successfully done by Hydra Tool

1. Run Hydra MTK Tool.
2. Go to "Servuce"--> "Tool"
3. Choose "Factory Resert / Format User Data"
4. Choose "Auto" from "Method / Option" drop down menu.
5. Click on "Execute"
6. Connect device to computer using data cable
7. Wait until the operation is completed.


Screen Short:



Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port_V1632 (COM45)
Device :5&6b422f0&0&2
SymbolicName :\??\USB#VID_0E8D&PID_0003#5&6b422f0&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0326MT6750T [6755]
hw subcode : 8A00
hw version : CB00
sw version : 0001
Target config : 05
SB : 01 (True)
SLA : 00 (False)
DAA : 04 (True)

Exploiting Device...
Exploit Sent..
Successfully Exploited...

Handshaking...Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0326MT6750T [6755]
hw subcode : 8A00
hw version : CB00
sw version : 0001
Target config : 00
SB : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
FUSEID : 41140000
SECURE VERSION : 05
BL VERSION : FE
NORMAL BOOT

Preparing Download Agent..
DA : 6755_SWSEC_D36514C0DE.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.00.00
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_oppo6750_16391.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 0B65A9402E403CEECFF95A720BBC6308
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 150100524836344D420598F6AA2B3443 - RH64MB

DA Speed :
Change to HIGH SPEED...
Searching for MTK Device...Found
Port Identification A_HIGHSPEED_VCOM
FriendlyName :MediaTek DA USB VCOM (Android) (COM46)
Device :5&6b422f0&0&2
SymbolicName :\??\USB#VID_0E8D&PID_2001#5&6b422f0&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0


Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info
Brand : OPPO
Vendor : OPPO
Model : CPH1609
ID : MRA58K
SDK : 23
Release : 6.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6750_16391-user 6.0 MRA58K 1551111655 release-keys
Device : CPH1609
Board : full_oppo6750_16391
Display ID : CPH1609EX_11_A.25_190225
Security Patch : 2018-06-05
Platform : mt6750
FRPPST : /dev/block/platform/mtk-msdc.0/11230000.msdc0/by-name/frp
StorageType : mtp,mass_storage
Userdata State : Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_oppo6750_16391.bin
Creating Scatter file... C:\Users\chel\AppData\Local\Temp\Rar$EXb10068.3102 4\\Backup\Auto\0326__052621094432\MT6750T_Android_ scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x06F88000]1024 KB ->frp.bin...Ok
-persist[0x07088000]48 MB ->persist.bin...Ok
-nvdata[0x0A088000]32 MB ->nvdata.bin...Ok
-protect1[0x0E088000]8 MB ->protect1.bin...Ok
-protect2[0x0E888000]15.469 MB ->protect2.bin...Ok
-nvram[0x12F00000]5 MB ->nvram.bin...Ok
Done!!!
C:\Users\chel\AppData\Local\Temp\Rar$EXb10068.3102 4\\Backup\Auto\0326__052621094432
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 0B65A9402E403CEECFF95A720BBC6308
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 150100524836344D420598F6AA2B3443 - RH64MB

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Brand : OPPO
Vendor : OPPO
Model : CPH1609
ID : MRA58K
SDK : 23
Release : 6.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6750_16391-user 6.0 MRA58K 1551111655 release-keys
Device : CPH1609
Board : full_oppo6750_16391
Display ID : CPH1609EX_11_A.25_190225
Security Patch : 2018-06-05
Platform : mt6750
FRPPST : /dev/block/platform/mtk-msdc.0/11230000.msdc0/by-name/frp
StorageType : mtp,mass_storage
Userdata State : Encrypted

-------------------------------------
Operation : Auto
Processing...
Safeformat Universal... Ok

Elapsed Time : 00:01:05
BR
Dipendra Pathak

  Reply With Quote
Old 05-26-2021, 13:33   #1923 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Xiaomi Redmi 6 Pro (Sa.Ku.Ra.) Successfully flashed by Hydra Tool

Xiaomi Redmi 6 Pro (Sa.Ku.Ra.) Successfully flashed by Hydra Tool

1. Run Hydra Qualcomm Module and Sosc.
2. Choose Brand and Module.
3. Go to "Flash Tool" Tab.
4. Choose Flash file and its location.
5. Click on "Flash"
6. connect device to the computer with USB Data cable
7. Wait until the process is completed.


Screen Short:



Logs:

Quote:
Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM49)
SymbolicName :\??\USB#VID_05C6&PID_9008#6&265d47d&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :

Getting device info......
Serial No.: 0x17F2831E
MSM ID : 0x000460E1, MSM8953-Qualcomm Snapdragon 625
PBL Ver : 00000000
PK HASH : 57158EAF1814D78FD2B3105ECE4DB18A
817A08AC664A5782A925F3FF8403D39A

Firehose Loader[Xiaomi_Remi 6 pro_******_8953_ddr.mbn]
SaharaBoot... Ok
Sending ....................Ok
Connecting to Firehose...
Ping... Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[DPP5qdsDzvIg7UbM0ssFhmPVm8G]
Checking Internet connection....
- Hydra Is Online
Connecting to Hydra Xiaomi Server...

Signature @256bytes Authentication.... Accepted......
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8953
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 69
Serial Number : 2516084797
Firmware Version : 2314907615826620721
Product Name : DL2032
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 61071360[29.121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok

Phone Information.....
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi 6 Pro
ID : OPM1.171019.019
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : zh-CN
Description : ******-user 8.1.0 OPM1.171019.019 V10.0.5.0.ODICNFH release-keys
Miui Ver : V10
Device : ******
Display ID : ZQL1715-******-build-20181019192740
Security Patch : 2018-10-05
Emmc_size : 16GB
Fingerprint : xiaomi/******/******:8.1.0/OPM1.171019.019/V10.0.5.0.ODICNFH:user/release-keys

Reading GPT[3]
Drive [0] 60 Items
Drive [1] 0 Items
Drive [2] 0 Items


Backup Security partitions...
Reading Security Items....
> modemst1
> modemst2
> fsg
C:\Hydra Tool\Backup\Security_Backup\Redmi 6 Pro__8.1.0_Security_050421100057.sec
Backup Security Success....

----------------------------
Flashing Selected Partitions....
- sec(0)[sec.dat] Ok
- config(0)[config.bin] Ok
- lksecapp(0)[lksecapp.mbn] Ok
- lksecappbak(0)[lksecapp.mbn] Ok
- devcfg(0)[devcfg.mbn] Ok
- devcfgbak(0)[devcfg.mbn] Ok
- apdp(0)[dummy.img] Ok
- msadp(0)[dummy.img] Ok
- sbl1(0)[sbl1.mbn] Ok
- sbl1bak(0)[sbl1.mbn] Ok
- rpm(0)[rpm.mbn] Ok
- rpmbak(0)[rpm.mbn] Ok
- cmnlib(0)[cmnlib_30.mbn] Ok
- cmnlibbak(0)[cmnlib_30.mbn] Ok
- cmnlib64(0)[cmnlib64_30.mbn] Ok
- cmnlib64bak(0)[cmnlib64_30.mbn] Ok
- keymaster(0)[keymaster64.mbn] Ok
- keymasterbak(0)[keymaster64.mbn] Ok
- misc(0)[misc.img] Ok
- aboot(0)[emmc_appsboot.mbn] Ok
- abootbak(0)[emmc_appsboot.mbn] Ok
- tz(0)[tz.mbn] Ok
- tzbak(0)[tz.mbn] Ok
- splash(0)[splash.img] Ok
- dsp(0)[adspso.bin] Ok
- mdtp(0)[mdtp.img] Ok
- persist(0)[persist.img] Ok
- boot(0)[boot.img] Ok
- recovery(0)[recovery.img] Ok
- modem(0)[NON-HLOS.bin] Ok
- cache(0)[cache.img] Ok
- system(0)[system.img] Ok
- vendor(0)[vendor.img] Ok
- cust(0)[cust.img] Ok
- userdata(0)[userdata.img] Ok
- PrimaryGPT(0)[gpt_main0.bin] Ok

Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-33.] OK
0 [CRC32(2,7680)] OK
0 [CRC32(NUM_DISK_SECTORS-33.,7680)] OK
0 [0] OK
0 [CRC32(1,92)] OK
0 [0] OK
0 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
----------------------------
Done!

Rebooting Phone.... Ok

Elapsed Time : 00:03:14
BR
Dipendra Pathak

  Reply With Quote
Old 05-26-2021, 13:41   #1924 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Xiaomi Redmi Note 8 Proe (begonia) removing Mi Account (Patch Method) successfully do

Xiaomi Redmi Note 8 Proe (begonia) removing Mi Account (Patch Method) successfully do

1. Run Hydra MTK Module,
2. Select Brand and Model
3. Go to Service-->Tool
4. Choose "Xiomi"
5. Choose "Remove Mi Account (Patched Method)" from drop down method
6. Execute and connect the device to the computer with data cable
7. wait until the process is completed.

Screen Short:



Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port_V1632 (COM8)
Device :5&16bdd27b&0&3
SymbolicName :\??\USB#VID_0E8D&PID_0003#5&16bdd27b&0&3#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0


Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 69B269CA6EF027A3AB861B5A94C6CB09
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x0000000180000000 -6 GB
UFS LU0 Size: 0x0000000000400000 -4 MB
UFS LU1 Size: 0x0000000000400000 -4 MB
UFS LU2 Size: 0x0000001DCB000000 -119.172 GB
UFS CID : ,?MT128GASAO4U21
UFS UNIQID : 0842ddf301020c111900000000000000

Reading GPT-UFS [0x00008000] 130 Items


Reading System Info
Vendor : Xiaomi
ID : QP1A.190711.020
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : begonia-user 10 QP1A.190711.020 V12.0.3.0.QGGIDXM release-keys
Miui Ver : V12
Mod_device : begonia_id_global
Display ID : QP1A.190711.020
Security Patch : 2020-11-01
StorageType : mtp
Userdata State : Not Encrypted

-------------------------------------
Operation : Remove MiAccount[Patch Method]
Processing...
-persist.bin[0x0E188000]70.469 MB ->persist.bin...Ok
-frp.bin[0x05888000]1024 KB ->frp.bin...Ok

Scanning Patching address...Please wait...
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
Total Items patched : 3
Successfully patched address..
D:\software file\hydra\Hydra Tool\Backup\Xiaomi_Account\_050821091329\persist.b in.patch Ok

Elapsed Time : 00:00:45
BR
Dipendra Pathak

  Reply With Quote
Old 05-26-2021, 20:59   #1925 (permalink)
No Life Poster
 
apologized's Avatar
 
Join Date: Jan 2012
Location: Morocco
Posts: 1,107
Member: 1712203
Status: Offline
Thanks Meter: 354
Redmi Note 8T MiAccount Remove (new)

Quote:
PreOperation Configuration
Brand : XIAOMI Model : Redmi Note 8T (wiilow) Storage : Auto
Loader: Xiaomi_redminote8_loader.elf
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM179)
SymbolicName :\??\USB#VID_05C6&PID_9008#6&3a225e6&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/31/2015,2.1.2.0

Getting device info......
Serial No.: 0xA81BC94D
MSM ID : 0x0010A0E1, SM6125-Qualcomm Snapdragon 665
PBL Ver : 00000000
PK HASH : 1BEBE3863A6781DB4B01086063007334
DE9E5CA14971C7C4F4358EC9D79CDA46

Firehose Loader[Xiaomi_redminote8_loader.elf]
SaharaBoot... Ok
Sending ..............................Ok
Connecting to Firehose...
Ping..................... Ok
Configuration.........
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Jul 3 2019 - 22:23:56

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 864722224
Firmware Version : 909127728
Product Name : hC8aP>
Physical Partitions : 4
Total Logical Blocks:
Drive [0] 122142720[58,242 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Drive [3] 32768[16 MB]

Protocol : Universal
Running : Ok
Reading GPT[4]
Drive [0] 88 Items
Drive [1] 0 Items
Drive [2] 0 Items
Drive [3]


Phone Information......
Vendor : Xiaomi
ID : QKQ1.200114.002
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Miui Ver : V12
Mod_device : willow_eea_global
Security Patch : 2021-04-01

Processing Remove MiAccount[New Method]....
Backing up Partition for safety...Ok

Scanning Patching address...
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]Done!!
Total Items patched : 41
Successfully patched address..
Action Result : Ok

Rebooting Phone.... Ok

Elapsed Time : 00:03:49
  Reply With Quote
Old 05-27-2021, 10:25   #1926 (permalink)
Freak Poster
 
Join Date: Jun 2014
Location: Turkiye-Konya
Posts: 316
Member: 2199727
Status: Offline
Thanks Meter: 217
redmi note 9 miui 12 imei repair ok

  Reply With Quote
Old 05-29-2021, 14:32   #1927 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Huawei RNE-L22 (Nova 2i) factory reset protection successfully removed by Hydra Tool

Huawei RNE-L22 (Nova 2i) factory reset protection successfully removed by Hydra Tool

Screen Short:



Logs:

Quote:
Searching Device By Fastboot
Device Found...

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Reading Device Information...
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
hotainfo......
#hotainfo_len :
#C_version :
#D_version :
#PLMN :
#BoardID :
#DeviceName :
Build number :
Product Model : RNE-L22
hwnff_ver : Ver2.3
key_version : huawei_key_v1
product : hi6250
system_update_state :
vendorcountry : hw/spcseas
soc_id : 0.5
ro_build_fingerprint : 0.5
ro_build_version_full : 0.5
ro_build_version_qcom : 0.5
psid.........
#SN : 8UE*************80
#IMEI1 : 86***********39
#IMEI2 : 86***********43

Security Info....
#Dongle_info : 0.5
#FB Lock State : UNLOCKED
#USER Lock State : LOCKED

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Huawei Fastboot Service...
Factory Reset Protection...
Removing....Ok

Elapsed Time : 00:00:02
BR
Dipendra Pathak

  Reply With Quote
Old 05-29-2021, 14:50   #1928 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Huawei WAS-AL00 (Honour 8 Lite 2017) Remove FRP sucessflly done by Hydra Tool

Huawei WAS-AL00 (Honour 8 Lite 2017) Remove FRP sucessflly done by Hydra Tool

1. Run Hydra Main Tool.
2. Choose "Hisilicon" Tab
3. Choose "Module"
4. Go to "service" and choose "factory reset protection" from drop down menu.
5. Choose "Remove FRP" from fastboot menu.
6. Take device to fastboot mood and connect with computer with USB Data Cable.
7. Click "Execute"
8. Wait Until the operation is completed.

Screen Short:



Logs:

Quote:
Searching Device By Fastboot
Device Found...

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Reading Device Information...
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
hotainfo......
#hotainfo_len :
#C_version :
#D_version :
#PLMN :
#BoardID :
#DeviceName :
Build number : PRA-LX2C636B186
Product Model : PRA-LX2
hwnff_ver : Ver2.3
key_version : huawei_key_v1
product : hi6250
system_update_state : 0.5
vendorcountry : hw/spcseas
soc_id : 0.5
ro_build_fingerprint : 0.5
ro_build_version_full : 0.5
ro_build_version_qcom : 0.5
psid.........
#SN : 6M**************46
#IMEI1 : 86**************67
#IMEI2 : 86**************44

Security Info....
#Dongle_info : 0.5
#FB Lock State : UNLOCKED
#USER Lock State : LOCKED

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Huawei Fastboot Service...
Factory Reset Protection...
Removing....Ok

Elapsed Time : 00:00:01
BR
Dipendra Pathak

  Reply With Quote
Old 05-29-2021, 15:01   #1929 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Huawei NMO-l31 (GT3) Hisilicon factory reset protection successfully removed by Hydra

Huawei NMO-l31 (GT3) Hisilicon factory reset protection successfully removed by Hydra

1. Run Hydra Main Tool.
2. Choose "Hisilicon" Tab
3. Choose "Module"
4. Go to "service" and choose "factory reset protection" from drop down menu.
5. Choose "Remove FRP" from fastboot menu.
6. Take device to fastboot mood and connect with computer with USB Data Cable.
7. Click "Execute"
8. Wait Until the operation is completed.

Screen Short:



Logs:

Quote:
Searching Device By Fastboot
Device Found...

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Reading Device Information...
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
hotainfo......
#hotainfo_len : 0x00000069
#C_version : C185
#D_version : D378
#PLMN : 51502
#BoardID : NMO-L31C185B378
#DeviceName :
Build number : NMO-L31C185B378
Product Model : HUAWEI NMO-L31
hwnff_ver : Ver2.3
key_version : huawei_key_v1
product : hi6250
system_update_state :
vendorcountry : hw/meafnaf
soc_id : 0.5
ro_build_fingerprint : 0.5
ro_build_version_full : 0.5
ro_build_version_qcom : 0.5
psid.........
#SN : EU*************73
#IMEI1 : 86**********48
#IMEI2 : 60**********21

Security Info....
#Dongle_info : 0.5
#FB Lock State : UNLOCKED
#USER Lock State : LOCKED

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Huawei Fastboot Service...
Factory Reset Protection...
Removing....Ok

Elapsed Time : 00:00:04
BR
Dipendra Pathak

  Reply With Quote
Old 05-29-2021, 15:14   #1930 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Huawei AGS2-L03 (MediaPad T5) Hisilicon removing FRP successfully done by Hydra Tool

Huawei AGS2-L03 (MediaPad T5) Hisilicon removing FRP successfully done by Hydra Tool

1. Run Hydra Main Tool.
2. Choose "Hisilicon" Tab
3. Choose "Module"
4. Go to "service" and choose "factory reset protection" from drop down menu.
5. Choose "Remove FRP" from fastboot menu.
6. Take device to fastboot mood and connect with computer with USB Data Cable.
7. Click "Execute"
8. Wait Until the operation is completed.


Screen Short:



Logs:

Quote:
Searching Device By Fastboot
Device Found...

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Reading Device Information...
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
hotainfo......
#hotainfo_len : 0x00000000
#C_version :
#D_version :
#PLMN :
#BoardID :
#DeviceName :
Build number : LON-LGRP2-OVS 9.1.0.254
Product Model : LON
hwnff_ver : Ver2.3
key_version : huawei_key_v1
product :
system_update_state :
vendorcountry :
soc_id :
ro_build_fingerprint :
ro_build_version_full :
ro_build_version_qcom :
psid.........
#SN :
#IMEI1 :
#IMEI2 :

Security Info....
#Dongle_info : RSA-2048,0x9000,0x7000,0x8F04,0x8F05,0x8F06
#FB Lock State : UNLOCKED
#USER Lock State : LOCKED

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Huawei Fastboot Service...
Factory Reset Protection...
Removing....Ok

Elapsed Time : 00:00:02
BR
Dipendra Pathak

  Reply With Quote
Old 05-29-2021, 15:24   #1931 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Xiaomi Redmi Note 8 Pro (begonia) removing Mi Account (Patch Method) successfully do

Xiaomi Redmi Note 8 Pro (begonia) removing Mi Account (Patch Method) successfully do

1. Run Hydra MTK Module and Sosc.
2. Choose Brand and Module.
3. Go to "Service"-->"Tool" Tab.
4. Choose "Xiaomi".
5. Click on "Remove Mi Account (Patched Method)" from drop down menu.
6. Click "Execute" button
7. connect device to the computer with USB Data cable
8. Wait until the process is completed.


Screen Short:



Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port_V1632 (COM8)
Device :5&16bdd27b&0&3
SymbolicName :\??\USB#VID_0E8D&PID_0003#5&16bdd27b&0&3#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0


Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 69B269CA6EF027A3AB861B5A94C6CB09
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x0000000180000000 -6 GB
UFS LU0 Size: 0x0000000000400000 -4 MB
UFS LU1 Size: 0x0000000000400000 -4 MB
UFS LU2 Size: 0x0000001DCB000000 -119.172 GB
UFS CID : ,?MT128GASAO4U21
UFS UNIQID : 0842ddf301020c111900000000000000

Reading GPT-UFS [0x00008000] 130 Items


Reading System Info
Vendor : Xiaomi
ID : QP1A.190711.020
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : begonia-user 10 QP1A.190711.020 V12.0.3.0.QGGIDXM release-keys
Miui Ver : V12
Mod_device : begonia_id_global
Display ID : QP1A.190711.020
Security Patch : 2020-11-01
StorageType : mtp
Userdata State : Not Encrypted

-------------------------------------
Operation : Remove MiAccount[Patch Method]
Processing...
-persist.bin[0x0E188000]70.469 MB ->persist.bin...Ok
-frp.bin[0x05888000]1024 KB ->frp.bin...Ok

Scanning Patching address...Please wait...
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
Total Items patched : 3
Successfully patched address..
D:\software file\hydra\Hydra Tool\Backup\Xiaomi_Account\_050821091329\persist.b in.patch Ok

Elapsed Time : 00:00:45
BR
Dipendra Pathak

  Reply With Quote
Old 05-29-2021, 15:38   #1932 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Huawei kirin 970 Remove Huawei Account successfully done by Hydra Tool

Huawei kirin 970 Remove Huawei Account successfully done by Hydra Tool

Logs:

Quote:
Searching Device By Fastboot
Device Found...

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Reading Device Information...
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
hotainfo......
#hotainfo_len : 0x0000005D
#C_version : C00
#D_version : D000
#PLMN : 46002
#BoardID : 6929
#DeviceName : COR-AL10
Build number : COR-AL10 9.1.0.346(C00E336R1P1)
Product Model : COR-AL10
hwnff_ver : Ver2.3
key_version : huawei_key_v1
product : kirin970
system_update_state :
vendorcountry : all/cn
soc_id : 0.5
ro_build_fingerprint : 0.5
ro_build_version_full : 0.5
ro_build_version_qcom : 0.5
psid.........
#SN : EW************40
#IMEI1 : 86************95
#IMEI2 : 86************35

Security Info....
#Dongle_info : RSA-2048,0x9000,0x7000,0x8F04,0x8F05,0x8F06
#FB Lock State : UNLOCKED
#USER Lock State : LOCKED

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Remove Huawei Account....
Processing...Ok

Elapsed Time : 00:00:08]
BR
Dipendra Pathak

  Reply With Quote
Old 05-29-2021, 15:45   #1933 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Huawei FRL-L23 (Y9A 2021) Restore OEM info successfully done by HYDRA TooL

Huawei FRL-L23 (Y9A 2021) Restore OEM info successfully done by HYDRA TooL

1. Run MTK Hydra Tool.
2. Choose "Brand" and "Module".
3. Go to "Service"--> "Tool"
4. Choose "Huawei"
5. Chose "Restore OEM Info" from "Method/ Option" drop down option.
6. Click "Execute".
7. Connect Device to computer using USB Data Cable.
8. Wait until the operation is completed.



Screen Short:



Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port (COM22)
Device :5&1600c3aa&0&1
SymbolicName :\??\USB#VID_0E8D&PID_0003#5&1600c3aa&0&1#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2016,3.2


Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 0A93A2F03274AD274B5407EE7A28CE4A
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000001D1EC00000 -116.48 GB
eMMC CID : 15010044555442343202C005BE668725 - DUTB42

Reading GPT-EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Restore OEM Info
Processing... Ok

Elapsed Time : 00:00:53
BR
Dipendra Pathak

  Reply With Quote
Old 05-30-2021, 07:07   #1934 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Oppo X9009 (F1 Plus) removing FRP partition successfully done by Hydra Tool

Oppo X9009 (F1 Plus) removing FRP partition successfully done by Hydra Tool

1. Run MTK Tool and choose "Sosc"
2. Choose Brand and Module as "Auto"
3. Go to "Service"--> "Tool" from Universal Option
4. Choose "Factory Reset Protection (FRP)"
5. Choose "Auto" from "Method / Option" drop down menu.
6. Connect device to computer using USB Data Cable.
7. Wait until the operation is completed



Screen Short:



Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port_V1632 (COM9)
Device :5&1d6c0649&0&4
SymbolicName :\??\USB#VID_0E8D&PID_0003#5&1d6c0649&0&4#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0326MT6750T [6755]
hw subcode : 8A00
hw version : CB00
sw version : 0001
Target config : 01
SB : 01 (True)
SLA : 00 (False)
DAA : 00 (False)

Exploiting Device...
Exploit Sent..
Successfully Exploited...

Handshaking...Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0326MT6750T [6755]
hw subcode : 8A00
hw version : CB00
sw version : 0001
Target config : 00
SB : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
FUSEID : 02000000
SECURE VERSION : 05
BL VERSION : FE
NORMAL BOOT

Preparing Download Agent..
DA : 6755_SWSEC_D36514C0DE.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.00.00
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : brom
Preloader Initialization...
Parsing F1S_preloader_oppo6750_15131.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 0461C3537043FF63ED41E450606DD69A
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 150100524331344D4201B691D49F33FB - RC14MB

DA Speed :
Change to HIGH SPEED...
Searching for MTK Device...Found
Port Identification A_HIGHSPEED_VCOM
FriendlyName :MediaTek DA USB VCOM (Android) (COM25)
Device :5&1ba1e768&0&4
SymbolicName :\??\USB#VID_0E8D&PID_2001#5&1ba1e768&0&4#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0


Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info
Brand : OPPO
Vendor : OPPO
Model : X9009
ID : LMY47I
SDK : 22
Release : 5.1
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Description : full_oppo6755_15311-user 5.1 LMY47I 1584563916 release-keys
Device : X9009
Board : full_oppo6755_15311
Display ID : X9009EX_11_A.34_200319
Security Patch : 2018-02-05
Platform : mt6755
FRPPST : /dev/block/platform/mtk-msdc.0/by-name/frp
StorageType : mtp,mass_storage
Userdata State : Not Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_oppo6755_15111.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0326__053021110655\MT6750T_Andro id_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x03F88000]1024 KB ->frp.bin...Ok
-nvdata[0x04088000]32 MB ->nvdata.bin...Ok
-protect1[0x08088000]8 MB ->protect1.bin...Ok
-protect2[0x08888000]15.469 MB ->protect2.bin...Ok
-nvram[0x0CF00000]5 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0326__053021110655
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 0461C3537043FF63ED41E450606DD69A
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 150100524331344D4201B691D49F33FB - RC14MB

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Brand : OPPO
Vendor : OPPO
Model : X9009
ID : LMY47I
SDK : 22
Release : 5.1
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Description : full_oppo6755_15311-user 5.1 LMY47I 1584563916 release-keys
Device : X9009
Board : full_oppo6755_15311
Display ID : X9009EX_11_A.34_200319
Security Patch : 2018-02-05
Platform : mt6755
FRPPST : /dev/block/platform/mtk-msdc.0/by-name/frp
StorageType : mtp,mass_storage
Userdata State : Not Encrypted

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition... Ok

Elapsed Time : 00:01:06
BR
Dipendra Pathak

  Reply With Quote
Old 05-30-2021, 07:20   #1935 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Xiaomi Redmi Note 8 Pro repairing 2nd IMEI successfully repaired by Hydra Tool

Xiaomi Redmi Note 8 Pro repairing 2nd IMEI successfully repaired by Hydra Tool

1. Run Hydra MTK Module, Select Brand and Model
2. Go to Service-->Repair IMEI
3. Tick on "IMEI changing is ILLIGAL........"
4. Choose "Xiaomi TWRP" from drop down menu
5. Type correct IMEI as written in battery housing
6. Click on "Repair IMEI" and connect the device to the computer
7. wait until the process is completed.


Screen Short:



Logs:

Quote:
=====================================
***IMEI REPAIR FUNCTION****
Xiaomi TWRP
Searching Device By Recovery
Device Found...
Model : Redmi Note 8 Pro
Brand : Xiaomi
Android Ver : 10
CPU abi : arm64-v8a
Software Version :
CSC Version :
Bootloader :
Board : begonia
Display ID : omni_redmiNote8pro-eng 10 PQ3B.190801.002 eng.wzsx15.20200305.194220 test-keys
Security Patch : 2021-02-01
Emmc_size :
Platform : mt6785
Kernel ID : 2021-02-01
Marketname :
OTA Version Name :
SYS USB CONFIG : persist.adb
FRPPST :
FingerPrint : Redmi/begonia/begonia:10/QP1A.190711.020/V12.0.7.0.QGGMIXM:user/release-keys

Checking Root Status....
Root Status : Not Rooted

Current IMEI:
IMEI1 : *************75
IMEI2 : *************83
Writing new IMEI....

Reading Stored IMEI
IMEI1 : FFFFFFFFFFFFFFF
IMEI2 : **************60
Done!!

Elapsed Time : 00:00:05
BR
Dipendra Pathak

  Reply With Quote
Reply

Bookmarks


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


 



All times are GMT +1. The time now is 15:02.



Powered by Searchlight © 2024 Axivo Inc.
vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2024 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2023 -
Page generated in 1.02371 seconds with 9 queries

SEO by vBSEO