GSM Shop GSM Shop
GSM-Forum  

Welcome to the GSM-Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features.
Only registered members may post questions, contact other members or search our database of over 8 million posts.

Registration is fast, simple and absolutely free so please - Click to REGISTER!

If you have any problems with the registration process or your account login, please contact contact us .

Go Back   GSM-Forum > Product Support Sections > Special Solutions / Services / WebShop > GSMFABRICA Products > HYDRA TOOL

Reply
 
LinkBack Thread Tools Display Modes
Old 06-03-2020, 14:15   #496 (permalink)
No Life Poster
 
Join Date: May 2011
Posts: 1,322
Member: 1576733
Status: Offline
Thanks Meter: 622
Lenovo L38012 FRP Reset by Hydra Dongle


Lenovo L38012 FRP Reset by Hydra Dongle

Lenovo L38012 K9 Note Remove Google Account with Hydra Dongle at QdLoader Mode



  Reply With Quote
Old 06-11-2020, 15:59   #497 (permalink)
No Life Poster
 
Join Date: May 2011
Posts: 1,322
Member: 1576733
Status: Offline
Thanks Meter: 622
Reeder M7s FRP Reset Success by Hydra Dongle

Reeder M7s FRP Reset Success by Hydra Dongle

Reeder Tablet Spreadtrum SC7731G Remove Google Account with Hydra Tool

  Reply With Quote
Old 06-11-2020, 16:01   #498 (permalink)
No Life Poster
 
Join Date: May 2011
Posts: 1,322
Member: 1576733
Status: Offline
Thanks Meter: 622
Redmi Note 4X Remove FRP Success by Hydra Dongle

Redmi Note 4X Remove FRP Success by Hydra Dongle

Redmi Note 4X (mido) Remove Google Account with Hydra Tool



Quote:
PreOperation Configuration
Brand : XIAOMI Model : Redmi Note 4X (Mido) Storage : Auto
Loader: Xiaomi_S2y2_noauth_8953_ddr.mbn
Port : Auto
Connection : Flash Mode

Searching EDL Port..[COM59]
TPortConnection.Create...(COM59)..Opening...Ok
Getting device info.......
Serial No.: 0x9ACAD651
MSM ID : 0x000460E1, MSM8953-Qualcomm Snapdragon 625
PBL Ver : 00000000
PK HASH : 57158EAF1814D78FD2B3105ECE4DB18A
817A08AC664A5782A925F3FF8403D39A

Firehose Loader[Xiaomi_S2y2_noauth_8953_ddr.mbn]
Initializing SaharaBoot... Ok
Sending ...................Ok

Connecting to Firehose...
Ping... Ok
Configuration......
Identifying Chip....Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8953
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 3195203628
Firmware Version : 7
Product Name : RE1BMB
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 30535680[14,561 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Running : Ok

Reading GPT[3]Ok
Phone Information.....
Model : Redmi Note 4
Brand : xiaomi
Android Ver : 7.0
Miui Ver : V11
Manufacturer : Xiaomi
Device : mido
Mod_device : mido_global
Board : msm8953
Display ID : AL1512-mido-build-20191107001817
Security Patch : 2018-12-01
Platform : msm8953
Kernel ID : 2018-12-01
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : xiaomi/mido/mido:7.0/NRD90M/V11.0.2.0.NCFMIXM:user/release-keys
ro_product_hardware :
sys_hardware_version :

Reading GPT[3]Ok
*** FRP Reset ***
Resetting FRP...
Auto
Processing...
Executing ...
[Zero Wipe] Ok

Elapsed Time : 00:00:07


TPortConnection.Destroy.....Closing...Ok..
  Reply With Quote
Old 06-11-2020, 16:03   #499 (permalink)
No Life Poster
 
Join Date: May 2011
Posts: 1,322
Member: 1576733
Status: Offline
Thanks Meter: 622
Redmi Note 4 Mi Account Remove by Hydra Dongle

Redmi Note 4 Mi Account Remove by Hydra Dongle

Xiaomi Redmi Note 4 (nikel) Mi Account Reset Success



Quote:
PreOperation Configuration
Brand : XIAOMI Model : Redmi Note 4 (Nikel) Storage : Auto
Loader: Mi_8953.mbn
Port : Auto
Connection : Flash Mode

Searching EDL Port..[COM21]
TPortConnection.Create...(COM21).Opening...Ok
Getting device info.......
Serial No.: 0xA505FFB1
MSM ID : 0x000460E1, MSM8953-Qualcomm Snapdragon 625
PBL Ver : 00000000
PK HASH : 57158EAF1814D78FD2B3105ECE4DB18A
817A08AC664A5782A925F3FF8403D39A

Firehose Loader[Mi_8953.mbn]
Initializing SaharaBoot... Ok
Sending ..................Ok

Connecting to Firehose...
Ping... Ok
Configuration......
Identifying Chip....Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8953
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 3998968444
Firmware Version : 7
Product Name : RX1BMB
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 61071360[29.121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Running : Ok

Reading GPT[3]Ok
Phone Information.....
Model : Redmi Note 4
Brand : xiaomi
Android Ver : 7.0
Miui Ver : V11
Manufacturer : Xiaomi
Device : mido
Mod_device : mido_global
Board : msm8953
Display ID : AL1512-mido-build-20191107001817
Security Patch : 2018-12-01
Platform : msm8953
Kernel ID : 2018-12-01
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : xiaomi/mido/mido:7.0/NRD90M/V11.0.2.0.NCFMIXM:user/release-keys
ro_product_hardware :
sys_hardware_version :

Reading GPT[3]Ok
Operation : MiAccount
Remove MiAccount[Erase Method]
Processing...
Backing up Partition for safety...Ok

Scanning Patching address...
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]Done!!
Total Items patched : 2
Successfully patched address..Ok

Elapsed Time : 00:00:18


TPortConnection.Destroy.....Closi
  Reply With Quote
Old 06-11-2020, 16:05   #500 (permalink)
No Life Poster
 
Join Date: May 2011
Posts: 1,322
Member: 1576733
Status: Offline
Thanks Meter: 622
Huawei MYA-L41 FRP Reset by Hydra Dongle

Huawei MYA-L41 FRP Reset by Hydra Dongle

Huawei MYA-L41 Y6 2017 MT6737T Google Account Remove Done by Flash Mode hydra dongle



Quote:
Brand : HUAWEI Model : MYA-L41 (Y6 2017) Connection : Flash Mode

=====================================
How To Boot : Power off phone
* BROM Mode : Press VOL +
* Preloader Mode : Just Insert cable

Connection[WAITING]Found[PreLoader][COM10] Status[Opened]
Identifying Hardware ID
BROM CPUID : 0321 (0000)MT6737T[6735]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 84010000
FUSEID : 2BB08010
SECURE VERSION : FF
BL VERSION : 01
BR Secured : 01
Preparing Download Agent..
Download Agent : MYA_L41_DA_SWSEC.bin
MTK_DOWNLOAD_AGENT
MTK_AllInOne_DA_v3.3001.00.00
Initializing Loader [1]
Sending Loader [1] Accepted
PROTOCOL[OLD] - eMMC
PRMMCCID : 484A0190613447410137D4323B830F5E
Running DA 4.2 on BBID : 0x93
Init Configuration Ok
Initializing Loader [2]
Sending Loader [2] Accepted
Reading Flashchip data....
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003AB400000 -14.676 GB
ERAM Size : 0x0000000080000000 -2 GB
IRAM Size : 0x0000000000020000 -128 KB
UNICAL RID : EBD18BAFBAD543C077F5BBA28237F8F3
eMMC CID : 484A0190613447410137D4323BB40F5E
Change to HIGH SPEED...
Connection[WAITING]Found[COM12] Status[Opened]

Reading Partition Table
SIZE[0x000009F8] 29 Items > Done

Reading System Info
Model : MYA-L41
Brand : HUAWEI
Android Ver : 6.0
Manufacturer : HUAWEI
Device : HWMYA-L6737
Board : MYA-L41
Display ID : Maya-L41C432B146
Security Patch : 2018-08-05
Platform : mt6737t
Kernel ID : 2018-08-05
FRPPST : /dev/block/platform/mtk-msdc.0/11230000.msdc0/by-name/frp
FingerPrint : HUAWEI/MYA-L41/HWMYA-L6737:6.0/HUAWEIMYA-L41/C432B146:user/release-keys

Autobackup Partitions
preloader [0x00000000-0x00080000] 512 KB -> preloader.bin Done
-> Renaming Preloader.... preloader_hq6737t_66_1ha_m0.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\HUAWEI_MYA-L41_0321-mt6737t-6.0(Maya-L41C432B146)_020620143811\MT6737T_Android_scatter. txt
pgpt [0x00000000-0x00080000] 512 KB -> pgpt.bin Done
nvram [0x00380000-0x01000000] 12.5 MB -> nvram.bin Failed
Done!!!
C:\Hydra Tool\\Backup\Auto\HUAWEI_MYA-L41_0321-mt6737t-6.0(Maya-L41C432B146)_020620143811
MTK Phone Loader is NOW RUNNING.


Reading System Info
Model : MYA-L41
Brand : HUAWEI
Android Ver : 6.0
Manufacturer : HUAWEI
Device : HWMYA-L6737
Board : MYA-L41
Display ID : Maya-L41C432B146
Security Patch : 2018-08-05
Platform : mt6737t
Kernel ID : 2018-08-05
FRPPST : /dev/block/platform/mtk-msdc.0/11230000.msdc0/by-name/frp
FingerPrint : HUAWEI/MYA-L41/HWMYA-L6737:6.0/HUAWEIMYA-L41/C432B146:user/release-keys

-------------------------------------
Operation : Auto
Processing... Ok

Elapsed Time : 00:00:16
  Reply With Quote
Old 06-16-2020, 10:00   #501 (permalink)
No Life Poster
 
ceza031's Avatar
 
Join Date: Feb 2012
Age: 39
Posts: 1,395
Member: 1724862
Status: Offline
Thanks Meter: 450
Xiaomi Mi Note 10 IMEI Repair by Hydra Dongle

Xiaomi Mi Note 10 IMEI Repair by Hydra Dongle

Xiaomi Mi Note 10 (tucana) Fix Network



Quote:
Starting ADB Server....
Searching Device By ADB
Device Found...
Model : Mi Note 10 Pro
Brand : Xiaomi
Android Ver : 10
CPU abi : arm64-v8a
Software Version :
CSC Version :
Bootloader :
Board : tucana
Display ID : QKQ1.190825.002 test-keys
Security Patch : 2020-04-01
Emmc_size :
Platform : sm6150
Kernel ID : 2020-04-01
Marketname :
OTA Version Name :
SYS USB CONFIG : persist.adb
FRPPST : /dev/block/bootdevice/by-name/frp
FingerPrint : Xiaomi/tucana/tucana:10/QKQ1.190825.002/V11.1.2.0.QFDMIXM:user/release-keys

Checking Root Status....
Root Status : Rooted
Root Version : 20.4:MAGISKSU

Reading Security Backup.....

Reading Data - 1
Reading Data - 2
Reading Data - 3
Deleting Cookies....
Exception: Cannot create file "C:\Hydra Tool\adb\Security_Backup\Security_06-16-2020.sec". Sistem belirtilen yolu bulamıyor
Backup Security Success....
Rebooting To Mode, Please Wait....

Searching Device By Recovery
Device Found...
Wipe Security Success...

Reboooting Device, Please Wait....
Do Not Dissconnect device...

Starting ADB Server....
Searching Device By ADB
Device Found...

Checking Root Status....
Root Status : Rooted
Root Version : 20.4:MAGISKSU

Enabling Diag....
Enable Diag Done!!!
Searching for Diag Port....
Selected Comport : Auto
Searching Qualcomm Diag Port[FOUND](COM38)
Diag Port Found ON : COM38
Writting IMEI, Please Wait....
Firmware ID : 4.3.c5-00036-0510_1944_e5490b1
Build Date : ay 10 202019:47:49Jan 17 202010:00:00sm7150.g
IMEI1 :
IMEI2 :
Repair IMEI Success, Please Wait..
Writting File, Please Wait....
Sending SPC to Device....
SPC Send Success
Restoring File....
Restore File Success
Repair IMEI Success, Rebooting Device...

Elapsed Time : 00:01:14
  Reply With Quote
The Following User Says Thank You to ceza031 For This Useful Post:
Old 06-19-2020, 11:55   #502 (permalink)
No Life Poster
 
ceza031's Avatar
 
Join Date: Feb 2012
Age: 39
Posts: 1,395
Member: 1724862
Status: Offline
Thanks Meter: 450
Huawei DUB-LX1 Y7 2019 Write Board Software by Hydra Dongle

Huawei DUB-LX1 Y7 2019 Write Board Software by Hydra Dongle by Fastboot Mode



Quote:
Searching Device By Fastboot
Device Found...
-[flash] huawei_crc_check... Ok
-[flash] partition... Ok
-[flash] huawei_crc_check... Ok
-[flash] rpm... Ok
-[flash] huawei_crc_check... Ok
-[flash] tz... Ok
-[flash] huawei_crc_check... Ok
-[flash] aboot... Ok
-[flash] huawei_crc_check... Ok
-[flash] ramdisk... Ok
-[flash] huawei_crc_check... Ok
-[flash] kernel... Ok
-[flash] huawei_crc_check... Ok
-[flash] recovery_ramdisk... Ok
-[flash] huawei_crc_check... Ok
-[flash] recovery_vendor... Ok
-[flash] huawei_crc_check... Ok
-[flash] erecovery_kernel... Ok
-[flash] huawei_crc_check... Ok
-[flash] erecovery_ramdisk... Ok
-[flash] huawei_crc_check... Ok
-[flash] erecovery_vendor... Ok
-[flash] huawei_crc_check... Ok
-[flash] modem... Ok
-[erase] cust... Ok
-[erase] misc... Ok
-[erase] bootfail_info... Ok
-[erase] rrecord... Ok
-[erase] devinfo... Ok
-[flash] huawei_crc_check... Ok
-[flash] system... Ok
-[erase] userdata... Ok
-[flash] huawei_crc_check... Ok
-[flash] userdata... Ok
-[flash] huawei_crc_check... Ok
-[flash] cache... Ok
-[flash] huawei_crc_check... Ok
-[flash] dsp... Ok
-[flash] huawei_crc_check... Ok
-[flash] cmnlib... Ok
-[flash] huawei_crc_check... Ok
-[flash] cmnlib64... Ok
-[flash] huawei_crc_check... Ok
-[flash] devcfg... Ok
-[flash] huawei_crc_check... Ok
-[flash] keymaster... Ok
-[flash] huawei_crc_check... Ok
-[flash] modemst1... Ok
-[flash] huawei_crc_check... Ok
-[flash] modemst2... Ok
-[erase] product... Ok
-[flash] huawei_crc_check... Ok
-[flash] product... Ok
-[flash] huawei_crc_check... Ok
-[flash] vendor... Ok
-[erase] version... Ok
-[flash] huawei_crc_check... Ok
-[flash] version... Ok
-[flash] huawei_crc_check... Ok
-[flash] odm... Ok
-[flash] huawei_crc_check... Ok
-[flash] log... Ok
-[flash] huawei_crc_check... Ok
-[flash] sbl1... Ok
-[flash] huawei_crc_check... Ok
-[flash] sec... Ok
-[flash] huawei_crc_check... Ok
-[flash] apdp... Ok
-[flash] huawei_crc_check... Ok
-[flash] msadp... Ok
-[erase] patch... Ok
-[reboot-bootloader] ... Ok
-[oem] oeminfoerase-all... Ok
-[reboot] ... Ok
Done!!!!

Elapsed Time : 00:03:16
  Reply With Quote
Old 06-19-2020, 22:14   #503 (permalink)
No Life Poster
 
ceza031's Avatar
 
Join Date: Feb 2012
Age: 39
Posts: 1,395
Member: 1724862
Status: Offline
Thanks Meter: 450
Redmi Note 8 IMEI Repair Success by Hydra Dongle

Redmi Note 8 IMEI Repair Success by Hydra Dongle

1 - Unlock Bootloader
2 - Install TWRP + ROOT
3 - Enable USB Debug and Connect USB and at Xiaomi IMEI tab write IMEI

  Reply With Quote
Old 06-19-2020, 22:19   #504 (permalink)
No Life Poster
 
ceza031's Avatar
 
Join Date: Feb 2012
Age: 39
Posts: 1,395
Member: 1724862
Status: Offline
Thanks Meter: 450
Redmi Note 7 (lavender) Erase Security by Hydra Dongle

Redmi Note 7 (lavender) Erase Security by Hydra Dongle

1 - Dissambly back cover for test point
2 - Put your device with test point, Select brand and model
3 - tick partitions, select Erase Security and click execute



Quote:
PreOperation Configuration
Brand : XIAOMI Model : Redmi Note 7 (lavender) Storage : EMMC
Loader: mi_2_9.elf
Port : COM9
Connection : Flash Mode

Port selected..[COM9]
TPortConnection.Create...(COM9)..Opening...Ok
Getting device info.......
Serial No.: 0xB2B4BEA4
MSM ID : 0x0008C0E1, SDM660-Qualcomm Snapdragon 660
PBL Ver : 00000004
PK HASH : A7B8B82545A98ECA23D6E9105FB46456
8D1B5828264903441BDEF0CD57E3C370

Firehose Loader[mi_2_9.elf]
Initializing SaharaBoot... Ok
Sending ...............................Ok

Connecting to Firehose...
Ping...... Ok
Configuration......Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 8192
MaxPayloadSizeToTargetInBytesSupported : 8192
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : MSM8996
Version : 1
DateTime : Aug 2 2018 - 22:27:53

Running : Ok

Reading GPT[1]Ok
Phone Information......
Model : Redmi Note 7
Brand : xiaomi
Android Ver : 9
Miui Ver : V11
Manufacturer : Xiaomi
Device : lavender
Mod_device : lavender_global
Display ID : PKQ1.180904.001
Security Patch : 2020-05-05
Kernel ID : 2020-05-05
Fingerprint : xiaomi/lavender/lavender:9/PKQ1.180904.001/V11.0.6.0.PFGMIXM:user/release-keys
ro_product_hardware :
sys_hardware_version :

Reading GPT[1]Ok
Wipe Security ...
Security Data Found.
Reading Security Items....
> modemst1
> modemst2
> fsg
C:\Hydra Tool\Backup\Security_Backup\Redmi Note 7__9_Security_061820135151.sec
Backup Security Success
Security Wipe Started..
> modemst1 Ok
> modemst2 Ok
> fsg Ok
Security Wipe SuccessOk
Rebooting Phone.... Ok
If not rebooted, Please Power on Manually

Elapsed Time : 00:01:43


TPortConnection.Destroy.....Closing...Ok..
  Reply With Quote
Old 06-26-2020, 14:30   #505 (permalink)
No Life Poster
 
Join Date: May 2011
Posts: 1,322
Member: 1576733
Status: Offline
Thanks Meter: 622
Asus X01BD FRP Remove by Hydra Dongle

Asus X01BD FRP Remove by Hydra Dongle

Asus X01BD ZenFone Max Pro M2 ZB630KL Google Account Reset by Hydra Tool



Quote:
PreOperation Configuration
Brand : ASUS Model : X01B (ZenFone Max Pro M2 ZB630K) Storage : Auto
Loader: asus_5_2.mbn
Port : Auto
Connection : Flash Mode

Searching EDL Port..[COM10]
TPortConnection.Create...(COM10)..Opening...Ok
Getting device info..
Device MODE : SAHARA

Connecting to Firehose...
Ping...... Ok
Configuration......
Identifying Chip....Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 8192
MaxPayloadSizeToTargetInBytesSupported : 8192
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : MSM8996
Version : 1
DateTime : Dec 7 2018 - 17:09:09

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 770380068
Firmware Version : 162
Product Name : HCG8a4
Physical Partitions : 4
Total Logical Blocks:
Drive [0] 122142720[58.242 GB]
Drive [1] 122142720[58.242 GB]
Drive [2] 8192[4 MB]
Drive [3] 8192[4 MB]
Running : Ok

Reading GPT[4]Ok
Phone Information.....
Model : ASUS_X01BD
Brand : asus
Android Ver : 9
Manufacturer : asus
Device : ASUS_X01BD
Display ID : PKQ1.WW_Phone-16.2017.2004.075-20200407
Security Patch : 2020-04-05
Kernel ID : 2020-04-05
Fingerprint : Android/sdm660_64/sdm660_64:9/PKQ1/16.2017.2004.075-20200407:user/release-keys
ro_product_hardware :
sys_hardware_version :

Reading GPT[4]Ok
*** FRP Reset ***
Resetting FRP...
Auto
Processing...
Executing ...
[Zero Wipe]
[Erase Safety Tag] Ok

Elapsed Time : 00:00:03


TPortConnection.Destroy.....Closing...Ok..
  Reply With Quote
Old 06-29-2020, 14:05   #506 (permalink)
No Life Poster
 
ceza031's Avatar
 
Join Date: Feb 2012
Age: 39
Posts: 1,395
Member: 1724862
Status: Offline
Thanks Meter: 450
Vivo 1820 Pattern Remove by Hydra Tool

Vivo 1820 Pattern Remove by Hydra Tool

Vivo 1820 Y91i Factory Reset by Flash mode with Hydra Dongle



Quote:
Brand : VIVO Model : Y91 (1816) Connection : Flash Mode

=====================================
Connection[WAITING]Found[PreLoader][COM19] Status[Opened]
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000020000000 -512 MB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003AB400000 -14.676 GB
eMMC CID : 90014A484147346132A5DED2C13A1693 - HAG4a2
UNICAL RID : B330FBB20EF3FC7996A21DE4F3282F2E
Reading GPT-EMMC [0x00008000] 130 Items
Done!!!


Reading System Info
Model : vivo 1820
Brand : vivo
Android Ver : 8.1.0
Manufacturer : vivo
Device : PD1818HF_EX
Display ID : O11019 release-keys
Security Patch : 2020-02-05
Platform : =MTK6765
Kernel ID : 2020-02-05
FingerPrint : vivo/1820/1820:8.1.0/O11019/1586327490:user/release-keys

-------------------------------------
Operation : Auto
Processing...[] Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:09
  Reply With Quote
Old 06-29-2020, 14:07   #507 (permalink)
No Life Poster
 
ceza031's Avatar
 
Join Date: Feb 2012
Age: 39
Posts: 1,395
Member: 1724862
Status: Offline
Thanks Meter: 450
Vivo 1902D Y17 Pattern Remove by Hydra Tool

Vivo 1902D Y17 Pattern Remove by Hydra Tool

Vivo 1902D Y17 Factory Reset, Wipe Userdata by Hydra Dongle



Quote:
=====================================
How To Boot : Power off phone
* BROM Mode : Press VOL +
* Preloader Mode : Just Insert cable

Connection[WAITING]Found[PreLoader][COM6] Status[Opened]
Identifying Hardware ID
BROM CPUID : 0766 (0000)MT6765[6765]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000001
SECURE VERSION : FF
BL VERSION : 03
BR Secured : 05
NORMAL BOOT
Preparing Download Agent..
Download Agent : 6765_PL.bin
MTK_DOWNLOAD_AGENT -HYDRA
MTK_AllInOne_DA_v3.3001.2018/03/20.21:09_402229+403250
Initializing Loader [1]
Sending Loader [1] Accepted
PROTOCOL[NEW] - eMMC
PHONE SYNC[Accepted]
DA Mode : preloader
Initializing Loader [2]
Sending Loader [2] Accepted
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000030000000 -768 MB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000001D1EC00000 -116.48 GB
eMMC CID : 150100445636444D420256FF90C366CB - DV6DMB
UNICAL RID : C22311592377131CEFF794EC46691C1D
DA Speed : high-speed
Reading GPT-EMMC [0x00008000] 130 Items
Done!!!

Reading System Info
Model : vivo 1902D
Brand : vivo
Android Ver : 9
Manufacturer : vivo
Device : PD1901DF_EX
Display ID : PPR1.180610.011 release-keys
Security Patch : 2020-04-05
Platform : =MTK6765
Kernel ID : 2020-04-05
FingerPrint : vivo/1902D/1902D:9/PPR1.180610.011/compiler04091449:user/release-keys

Autobackup Partitions
preloader[0x00000000-0x00080000]512 KB ->preloader.bin... Done
-> Renaming Preloader.... preloader_k65v1_64_bsp.bin
Creating Scatter file... C:\HydraToo\\Backup\Auto\vivo_vivo 1902D_0766-=MTK6765-9(PPR1.180610.011 release-keys)_040620183132\MT6765_Android_scatter.txt
pgpt[0x00000000-0x00008000]32 KB ->pgpt.bin... Done
frp[0x05588000-0x05688000]1024 KB ->frp.bin... Done
nvdata[0x07688000-0x0B688000]64 MB ->nvdata.bin... Done
nvram[0x24680000-0x28680000]64 MB ->nvram.bin... Done
Done!!!
C:\HydraToo\\Backup\Auto\vivo_vivo 1902D_0766-=MTK6765-9(PPR1.180610.011 release-keys)_040620183132
MTK Phone Loader is NOW RUNNING.
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000030000000 -768 MB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000001D1EC00000 -116.48 GB
eMMC CID : 150100445636444D420256FF90C366CB - DV6DMB
UNICAL RID : C22311592377131CEFF794EC46691C1D
Reading GPT-EMMC [0x00008000] 130 Items
Done!!!


Reading System Info
Model : vivo 1902D
Brand : vivo
Android Ver : 9
Manufacturer : vivo
Device : PD1901DF_EX
Display ID : PPR1.180610.011 release-keys
Security Patch : 2020-04-05
Platform : =MTK6765
Kernel ID : 2020-04-05
FingerPrint : vivo/1902D/1902D:9/PPR1.180610.011/compiler04091449:user/release-keys

-------------------------------------
Operation : Auto
Processing...[] Ok

Elapsed Time : 00:00:23
  Reply With Quote
Old 06-29-2020, 14:09   #508 (permalink)
No Life Poster
 
ceza031's Avatar
 
Join Date: Feb 2012
Age: 39
Posts: 1,395
Member: 1724862
Status: Offline
Thanks Meter: 450
OUKITEL K10000 Pro FRP Reset by Hydra Dongle

OUKITEL K10000 Pro FRP Reset by Hydra Dongle

OUKITEL K10000 Pro Remove Google Account with Hydra Tool by Flash Mode



Quote:
=====================================
How To Boot : Power off phone
* BROM Mode : Press VOL +
* Preloader Mode : Just Insert cable

Connection[WAITING]Found[COM15] Status[Opened]
Identifying Hardware ID
BROM CPUID : 0326 (0000)MT6750T[6755]
BROM HW_SW_VER : 8A00 CB00 0001 0000
FUSEID : 00000000
SECURE VERSION : 05
BL VERSION : FE
BR Secured : 01
NORMAL BOOT
Preparing Download Agent..
Download Agent : 6755_SWSEC_2B23567CB4.bin
MTK_DOWNLOAD_AGENT -HYDRA
MTK_AllInOne_DA_v3.3001.00.00
Initializing Loader [1]
Sending Loader [1] Accepted
PROTOCOL[NEW] - eMMC
PHONE SYNC[Accepted]
DA Mode : brom
Preloader Initialization....
Parsing preloader_oppo6750_15131.bin
Sending FlashInit Accepted
Initializing Loader [2]
Sending Loader [2] Accepted
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000747C00000 -29,121 GB
eMMC CID : 90014A484247346132A554453D042405 - HBG4a2
UNICAL RID : 3919C0ED201A53A43B24AB39C196DC3A
DA Speed : full-speed
Change to HIGH SPEED...
Connection[WAITING]Found[COM16] Status[Opened]
Reading GPT-EMMC [0x00008000] 130 Items
Done!!!

Reading System Info
Model : K10000 Pro
Brand : OUKITEL
Android Ver : 7.0
Manufacturer : OUKITEL
Device : K10000_Pro
Board : K10000_Pro
Display ID : OUKITEL_K10000_Pro_V1.0_20170531
Security Patch : 2017-05-05
Platform : mt6750
Kernel ID : 2017-05-05
FRPPST : /dev/block/platform/mtk-msdc.0/11230000.msdc0/by-name/frp
FingerPrint : OUKITEL/full_hct6750_66_n/hct6750_66_n:7.0/NRD90M/1496290182:user/release-keys

Autobackup Partitions
preloader[0x00000000-0x00080000]512 KB ->preloader.bin... Done
-> Renaming Preloader.... preloader_hct6750_66_n.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\OUKITEL_K10000 Pro_0326-mt6750-7.0(OUKITEL_K10000_Pro_V1.0_20170531)_040620200835 \MT6750T_Android_scatter.txt
pgpt[0x00000000-0x00008000]32 KB ->pgpt.bin... Done
frp[0x01A88000-0x01B88000]1024 KB ->frp.bin... Done
nvdata[0x01BC8000-0x03BC8000]32 MB ->nvdata.bin... Done
nvram[0x0A700000-0x0AC00000]5 MB ->nvram.bin... Done
Done!!!
C:\Hydra Tool\\Backup\Auto\OUKITEL_K10000 Pro_0326-mt6750-7.0(OUKITEL_K10000_Pro_V1.0_20170531)_040620200835
MTK Phone Loader is NOW RUNNING.
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000747C00000 -29,121 GB
eMMC CID : 90014A484247346132A554453D042405 - HBG4a2
UNICAL RID : 3919C0ED201A53A43B24AB39C196DC3A
Reading GPT-EMMC [0x00008000] 130 Items
Done!!!


Reading System Info
Model : K10000 Pro
Brand : OUKITEL
Android Ver : 7.0
Manufacturer : OUKITEL
Device : K10000_Pro
Board : K10000_Pro
Display ID : OUKITEL_K10000_Pro_V1.0_20170531
Security Patch : 2017-05-05
Platform : mt6750
Kernel ID : 2017-05-05
FRPPST : /dev/block/platform/mtk-msdc.0/11230000.msdc0/by-name/frp
FingerPrint : OUKITEL/full_hct6750_66_n/hct6750_66_n:7.0/NRD90M/1496290182:user/release-keys

-------------------------------------
Operation: Zero Wipe
Processing... Ok

Elapsed Time : 00:00:31
  Reply With Quote
Old 06-29-2020, 14:11   #509 (permalink)
No Life Poster
 
ceza031's Avatar
 
Join Date: Feb 2012
Age: 39
Posts: 1,395
Member: 1724862
Status: Offline
Thanks Meter: 450
Huawei MRD-LX2 FRP Reset by Hydra Tool

Huawei MRD-LX2 FRP Reset by Hydra Tool

Huawei MRD-LX2 Y6 2019 Google Account Remove With Hydra Tool



Quote:
Brand : HUAWEI Model : MRD-LX2 (Y6 2019) Connection : Flash Mode

=====================================
Connection[WAITING]Found[COM17] Status[Opened]
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 150100474436424D4202731FD368B64B - GD6BMB
UNICAL RID : 430477E47C142EA4A5E389B6A920ABD7
Reading GPT-EMMC [0x00008000] 130 Items
Done!!!


-------------------------------------
Operation : Auto
Processing... Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:07
  Reply With Quote
Old 06-29-2020, 16:32   #510 (permalink)
No Life Poster
 
ceza031's Avatar
 
Join Date: Feb 2012
Age: 39
Posts: 1,395
Member: 1724862
Status: Offline
Thanks Meter: 450
Huawei JAT-L29 Unbrick by Hydra Dongle

Huawei JAT-L29 Unbrick by Hydra Dongle

Huawei JAT-L29 Honor Play 8A Write Firmware Success by Hydra Tool



Quote:
Brand : HUAWEI Model : JAT-L29 (Honor Play 8A) Connection : Flash Mode

=====================================

How To Boot : Power off phone
* BROM Mode : Press VOL +
* Preloader Mode : Just Insert cable

Connection[WAITING]Found[COM120] Status[Opened]
Identifying Hardware ID
BROM CPUID : 0766 (0000)MT6765[6765]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000001
SECURE VERSION : 05
BL VERSION : FE
BR Secured : E5[SBC+SDA+SEL]
Security Authorization....
Sending[Huawei_auth_sv5_.auth] Accepted
Preparing Download Agent..
Download Agent : Huawei__6765_8A00CA0000000000_00001000_00030000.bi n
MTK_DOWNLOAD_AGENT -HYDRA
MTK_AllInOne_DA_v3.3001.2018/10/18.17:38_452898
Initializing Loader [1]
Sending Loader [1] Accepted
PROTOCOL[NEW] - eMMC
PHONE SYNC[Accepted]
DA Mode : brom
Preloader Initialization....
Parsing preloader_k62v1_64_mexico.bin
Sending FlashInit Accepted
Initializing Loader [2]
Sending Loader [2] Accepted
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29,121 GB
eMMC CID : 150100514436334D42019179E01B5545 - QD63MB
UNICAL RID : 6A7707FB5689BADE55C84716E5FBCBC3
DA Speed : high-speed
Reading GPT-EMMC [0x00008000] 130 Items
Done!!!

Reading System Info
ERROR reading system image [corrupted/erased]

Autobackup Partitions
preloader[0x00000000-0x00080000]512 KB ->preloader.bin... Done
-> Renaming Preloader.... preloader_k62v1_64_mexico.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\__0766--()_030620202132\MT6765_Android_scatter.txt
pgpt[0x00000000-0x00008000]32 KB ->pgpt.bin... Done
frp[0x00108000-0x00208000]1024 KB ->frp.bin... Done
nvdata[0x00A08000-0x01A08000]16 MB ->nvdata.bin... Done
nvram[0x04400000-0x04900000]5 MB ->nvram.bin... Done
preload[0x114000000-0x14E800000]936 MB ->preload.bin... Done
Done!!!
C:\Hydra Tool\\Backup\Auto\__0766--()_030620202132
MTK Phone Loader is NOW RUNNING.

Flashing Selected Partitions....
>spmfw.img Ok
>scp.img Ok
>sspm.img Ok
>efuse.img Ok
>cache.img Ok
>boot.img Ok
>vendor.img Ok
>oem.img Ok
>system.img Ok
=====================================

Elapsed Time : 00:02:07
  Reply With Quote
Reply

Bookmarks

Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


 



All times are GMT +1. The time now is 08:39.



Powered by Searchlight © 2024 Axivo Inc.
vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2024 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2023 -
Page generated in 0.59311 seconds with 9 queries

SEO by vBSEO