GSM Shop GSM Shop
GSM-Forum  

Welcome to the GSM-Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features.
Only registered members may post questions, contact other members or search our database of over 8 million posts.

Registration is fast, simple and absolutely free so please - Click to REGISTER!

If you have any problems with the registration process or your account login, please contact contact us .

Go Back   GSM-Forum > Product Support Sections > Special Solutions / Services / WebShop > GSMFABRICA Products > HYDRA TOOL


Reply
 
LinkBack Thread Tools Display Modes
Old 07-21-2020, 13:39   #556 (permalink)
No Life Poster
 
dicle_gsm's Avatar
 
Join Date: Jul 2007
Location: tr
Posts: 2,219
Member: 539148
Status: Offline
Thanks Meter: 2,174
OPPO F9 (CPH1823) FRP and Format Done by Hydra


OPPO F9 (CPH1823) FRP and Format Done by Hydra



Quote:
Brand : OPPO Model : F9 (CPH1823) Connection : Flash Mode

=====================================
Connection[WAITING]Found[COM4] Status[Opened]
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 90014A484347386134A41DC1F529C559 - HCG8a4
UNICAL RID : C7B4900077675217BA4AE1E02F9F9DE8
Reading GPT-EMMC [0x00008000] 130 Items
Done!!!


Reading System Info
Model :
Brand :
Android Ver : 9
Manufacturer : OPPO
Device :
Display ID :
Security Patch : 2020-05-05
Kernel ID : 2020-05-05
Fingerprint :
ro_product_hardware :
sys_hardware_version :

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition...
Erasing FRP Partition...
Formatting Userdata... Ok

Elapsed Time : 00:00:09
  Reply With Quote
Old 07-21-2020, 13:40   #557 (permalink)
No Life Poster
 
dicle_gsm's Avatar
 
Join Date: Jul 2007
Location: tr
Posts: 2,219
Member: 539148
Status: Offline
Thanks Meter: 2,174
Xiaomi Mi Mix 3 (perseus) Google Account Remove

Mi Mix 3 (perseus) FRP Reset Done by Hydra Tool



Xiaomi Mi Mix 3 (perseus) Google Account Remove Log

Quote:
PreOperation Configuration
Brand : XIAOMI Model : Mi Mix 3 (perseus) Storage : Auto
Loader: Xiaomi_Mix 3_firehose_sdm845_ddr.elf
Port : Auto
Connection : Flash Mode

Searching EDL Port..[COM20]
TPortConnection.Create...(COM20)..Opening...Ok
Getting device info.......
Serial No.: 0xDE448A9E
MSM ID : 0x0008B0E1, SDM845-Qualcomm Snapdragon 845
PBL Ver : 00000002
PK HASH : C924A35F39CE1CDD1B8D5A9F3B8E3C51
317930431D7A9DD5A55028CF6965FE65

Firehose Loader[Xiaomi_Mix 3_firehose_sdm845_ddr.elf]
Initializing SaharaBoot... Ok
Sending ....................................Ok

Connecting to Firehose...
Ping.....
NOTE : FILTERED : <.
NOTE : FILTERED : ?.
NOTE : FILTERED : x.
NOTE : FILTERED : m.
NOTE : FILTERED : l. Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[eooV9jtv0sbe0qiMyADaVvfSo6n]
Checking Internet connection....
- Hydra Is Online
Connecting to Hydra Xiaomi Server...

Signature @256bytes Authentication.... Accepted........
Identifying Chip........UFS Ok
Chip Configuration :
MemoryName : UFS
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Oct 22 2018 - 19:22:16

*** STORAGE DEVICE INFO ***
Memory Type : UFS
Block Size in Bytes : 4096
Page Size : 4096
Manufacturer ID : 462
Serial Number : 1297306958
Firmware Version : 100
Product Name : KLUDG4U1EA-B0C1
Physical Partitions : 6
Total Logical Blocks:
Drive [0] 29906944[114.086 GB]
Drive [1] 2048[8 MB]
Drive [2] 2048[8 MB]
Drive [3] 8192[32 MB]
Drive [4] 1310720[5 GB]
Drive [5] 8192[32 MB]
Running : Ok

Reading GPT[6]Ok
Phone Information......
Model : Mi MIX 3
Brand : Xiaomi
Android Ver : 9
Miui Ver : V10
Manufacturer : Xiaomi
Device : perseus
Mod_device : perseus_global
Display ID : PKQ1.180729.001
Security Patch : 2019-04-01
Kernel ID : 2019-04-01
Fingerprint : Xiaomi/perseus/perseus:9/PKQ1.180729.001/9.4.26:user/release-keys
ro_product_hardware :
sys_hardware_version :

Reading GPT[6]Ok
*** FRP Reset ***
Resetting FRP...
Auto
Processing...
Executing ...
[Zero Wipe] Ok

Elapsed Time : 00:00:15


TPortConnection.Destroy.....Closing...Ok..
  Reply With Quote
Old 07-21-2020, 13:43   #558 (permalink)
No Life Poster
 
dicle_gsm's Avatar
 
Join Date: Jul 2007
Location: tr
Posts: 2,219
Member: 539148
Status: Offline
Thanks Meter: 2,174
Mi 8 dipper Unlock Bootloader Without Credits | First in the World

Mi 8 dipper Unlock Bootloader Without Credits | First in the World

Xiaomi Mi 8 dipper Unlock Bootloader by UBL Firmware, after write firmware by edl (qdloader 9008) port you need unlock bootloader by fastboot mode directly, then you can flash stock rom by fastboot or twrp




Quote:
Searching EDL Port..[COM10]
TPortConnection.Create...(COM10)..Opening...Ok
Getting device info.......
Serial No.: 0xDF481BF2
MSM ID : 0x0008B0E1, SDM845-Qualcomm Snapdragon 845
PBL Ver : 00000001
PK HASH : C924A35F39CE1CDD1B8D5A9F3B8E3C51
317930431D7A9DD5A55028CF6965FE65

Firehose Loader[Xiaomi_ufs_firehose_sdm845_ddr.elf]
Initializing SaharaBoot... Ok
Sending ....................................Ok

Connecting to Firehose...
Ping.....
NOTE : FILTERED : <.
NOTE : FILTERED : ?.
NOTE : FILTERED : x.
NOTE : FILTERED : m.
NOTE : FILTERED : l. Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[MJds7MnBIqzdsBD-X0-hpsg-AhS]
Checking Internet connection....
- Hydra Is Online
Connecting to Hydra Xiaomi Server...

Signature @256bytes Authentication.... Accepted........
Identifying Chip........UFS Ok
Chip Configuration :
MemoryName : UFS
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Aug 17 2018 - 13:21:01

*** STORAGE DEVICE INFO ***
Memory Type : UFS
Block Size in Bytes : 4096
Page Size : 4096
Manufacturer ID : 462
Serial Number : 1297306958
Firmware Version : 500
Product Name : KLUDG4U1EA-B0C1
Physical Partitions : 6
Total Logical Blocks:
Drive [0] 30038016[114,586 GB]
Drive [1] 2048[8 MB]
Drive [2] 2048[8 MB]
Drive [3] 8192[32 MB]
Drive [4] 1179648[4,5 GB]
Drive [5] 8192[32 MB]
Running : Ok

Reading GPT[6]Ok
Phone Information.....
Model : MI 8
Brand : Xiaomi
Android Ver : 9
Miui Ver : V10
Manufacturer : Xiaomi
Device : dipper
Mod_device : dipper_global
Display ID : PKQ1.180729.001
Security Patch : 2019-09-01
Kernel ID : 2019-09-01
Fingerprint : Xiaomi/dipper/dipper:9/PKQ1.180729.001/V10.3.5.0.PEAMIXM:user/release-keys
ro_product_hardware :
sys_hardware_version :


----------------------------
Flashing Selected Partitions
>PrimaryGPT(0)[gpt_main0.bin] Ok
>xbl_config_a(1)[xbl_config.img] Ok
>xbl_a(1)[xbl.img] Ok
>PrimaryGPT(1)[gpt_main1.bin] Ok
>xbl_config_b(2)[xbl_config.img] Ok
>xbl_b(2)[xbl.img] Ok
>PrimaryGPT(2)[gpt_main2.bin] Ok
>PrimaryGPT(3)[gpt_main3.bin] Ok
>abl_a(4)[abl.img] Ok
>abl_b(4)[abl.img] Ok
>PrimaryGPT(4)[gpt_main4.bin] Ok
>PrimaryGPT(5)[gpt_main5.bin] Ok
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 1
Set bootable storage drive 1 Ok
Rebooting Phone.... Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:42
  Reply With Quote
Old 07-21-2020, 13:45   #559 (permalink)
No Life Poster
 
dicle_gsm's Avatar
 
Join Date: Jul 2007
Location: tr
Posts: 2,219
Member: 539148
Status: Offline
Thanks Meter: 2,174
Mi 8 SE (sirius) Unbrick EDL Mode Done | Without Credit

Mi 8 SE (sirius) Unbrick EDL Mode Done | Without Credit



Xiaomi Mi 8 SE sirius Write Firmware by QdLoader 9008 Emergency Download Mode

Quote:
Searching EDL Port..[COM6]
TPortConnection.Create...(COM6)..Opening...Ok
Getting device info.......
Serial No.: 0x41165DE5
MSM ID : 0x000DB0E1,
PBL Ver : 00000001
PK HASH : C924A35F39CE1CDD1B8D5A9F3B8E3C51
317930431D7A9DD5A55028CF6965FE65

Firehose Loader[prog_emmc_firehose_sdm670_ddr.elf]
Initializing SaharaBoot... Ok
Sending .....................................Ok

Connecting to Firehose...
Ping.....
NOTE : FILTERED : <.
NOTE : FILTERED : ?.
NOTE : FILTERED : x.
NOTE : FILTERED : m.
NOTE : FILTERED : l. Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[7lxe6mYrvSKcCx
Checking Internet connection....
- Hydra Is Online
Connecting to Hydra Xiaomi Server...

Signature @256bytes Authentication.... Accepted........
Identifying Chip................
<?xml version="1.0" encoding="UTF-8" ?>
<data>
<response value="ACK" rawmode="false" /></data>.
<.
?.
x....eMMC Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Aug 24 2018 - 20:05:37

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 205616406
Firmware Version : 162
Product Name : HCG8a4
Physical Partitions : 4
Total Logical Blocks:
Drive [0] 122142720[58.242 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Drive [3] 8192[4 MB]
Running : Ok

Reading GPT[4]Ok
Phone Information.....
Model : MI 8 SE
Brand : Xiaomi
Android Ver : 9
Miui Ver : V10
Manufacturer : Xiaomi
Device : sirius
Display ID : PKQ1.181030.001
Security Patch : 2018-12-01
Kernel ID : 2018-12-01
Fingerprint : Xiaomi/sirius/sirius:9/PKQ1.181030.001/V10.2.2.0.PEBCNXM:user/release-keys
ro_product_hardware :
sys_hardware_version :


----------------------------
Flashing Selected Partitions
>switch(0)[dummy.img] Ok
>vbmeta(0)[vbmeta.img] Ok
>qupfw(0)[qupv3fw.elf] Ok
>xbl_config(0)[xbl_config.elf] Ok
>storsec(0)[storsec.mbn] Ok
>storsecbak(0)[storsec.mbn] Ok
>aop(0)[aop.mbn] Ok
>hyp(0)[hyp.mbn] Ok
>hypbak(0)[hyp.mbn] Ok
>cmnlib(0)[cmnlib.mbn] Ok
>cmnlibbak(0)[cmnlib.mbn] Ok
>cmnlib64(0)[cmnlib64.mbn] Ok
>cmnlib64bak(0)[cmnlib64.mbn] Ok
>keymaster(0)[keymaster64.mbn] Ok
>keymasterbak(0)[keymaster64.mbn] Ok
>bluetooth(0)[BTFM.bin] Ok
>devcfg(0)[devcfg.mbn] Ok
>devcfgbak(0)[devcfg.mbn] Ok
>abl(0)[abl.elf] Ok
>ablbak(0)[abl.elf] Ok
>misc(0)[dummy.img] Ok
>dtbo(0)[dtbo.img] Ok
>xbl(0)[xbl.elf] Ok
>xblbak(0)[xbl.elf] Ok
>tz(0)[tz.mbn] Ok
>tzbak(0)[tz.mbn] Ok
>dsp(0)[dspso.bin] Ok
>logo(0)[logo.img] Ok
>persist(0)[persist.img] Skipped
>boot(0)[boot.img] Ok
>recovery(0)[recovery.img] Ok
>modem(0)[NON-HLOS.bin] Ok
>cache(0)[cache.img] Ok
>cust(0)[cust.img] Ok
>system(0)[system.img] Ok
>vendor(0)[vendor.img] Ok
>userdata(0)[userdata.img] Ok
>PrimaryGPT(0)[gpt_main0.bin] Ok

Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-33.] OK
0 [CRC32(2,10752)] OK
0 [CRC32(NUM_DISK_SECTORS-33.,10752)] OK
0 [0] OK
0 [CRC32(1,92)] OK
0 [0] OK
0 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 0
Set bootable storage drive 0 Ok
Rebooting Phone.... Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:02:09
  Reply With Quote
Old 07-21-2020, 13:47   #560 (permalink)
No Life Poster
 
dicle_gsm's Avatar
 
Join Date: Jul 2007
Location: tr
Posts: 2,219
Member: 539148
Status: Offline
Thanks Meter: 2,174
Mi 8 Explorer (ursa) Unbrick EDL Mode | Without Credit

Mi 8 Explorer (ursa) Unbrick EDL Mode | Without Credit



Xiaomi Mi 8 Explorer ursa Write Firmware by QdLoader 9008 Port Mode

Quote:
Searching EDL Port..[COM23]
TPortConnection.Create...(COM23)..Opening...Ok
Getting device info..
Device MODE : SAHARA

Connecting to Firehose...
Ping.....
NOTE : FILTERED : <.
NOTE : FILTERED : ?.
NOTE : FILTERED : x.
NOTE : FILTERED : m.
NOTE : FILTERED : l. Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[W1alVy-crgAO7KuJzGZpm8WwjJ
Checking Internet connection....
- Hydra Is Online
Connecting to Hydra Xiaomi Server...

Signature @256bytes Authentication.... Accepted........
Identifying Chip........UFS Ok
Chip Configuration :
MemoryName : UFS
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Mar 25 2018 - 00:27:13

*** STORAGE DEVICE INFO ***
Memory Type : UFS
Block Size in Bytes : 4096
Page Size : 4096
Manufacturer ID : 462
Serial Number : 1297306958
Firmware Version : 500
Product Name : KLUDG4U1EA-B0C1
Physical Partitions : 6
Total Logical Blocks:
Drive [0] 30038016[114.586 GB]
Drive [1] 2048[8 MB]
Drive [2] 2048[8 MB]
Drive [3] 8192[32 MB]
Drive [4] 1179648[4.5 GB]
Drive [5] 8192[32 MB]
Running : Ok

Reading GPT[6]Ok
Phone Information.....
Model : MI 8 UD
Brand : Xiaomi
Android Ver : 9
Miui Ver : V11
Manufacturer : Xiaomi
Device : equuleus
Display ID : PKQ1.180729.001
Security Patch : 2019-10-01
Kernel ID : 2019-10-01
Fingerprint : Xiaomi/equuleus/equuleus:9/PKQ1.180729.001/V11.0.3.0.PECCNXM:user/release-keys
ro_product_hardware :
sys_hardware_version :


----------------------------
Flashing Selected Partitions
>switch(0)[dummy.img] Ok
>misc(0)[misc.img] Ok
>logfs(0)[logfs_ufs_8mb.bin] Ok
>persist(0)[persist.img] Skipped
>persistbak(0)[persist.img] Ok
>cust(0)[cust.img] Ok
>recovery(0)[recovery.img] Ok
>cache(0)[cache.img] Ok
>userdata(0)[userdata.img] Ok
>PrimaryGPT(0)[gpt_main0.bin] Ok
>xbl_config_a(1)[xbl_config.img] Ok
>xbl_a(1)[xbl.img] Ok
>PrimaryGPT(1)[gpt_main1.bin] Ok
>xbl_config_b(2)[xbl_config.img] Ok
>xbl_b(2)[xbl.img] Ok
>PrimaryGPT(2)[gpt_main2.bin] Ok
>PrimaryGPT(3)[gpt_main3.bin] Ok
>limits(4)[dummy.img] Ok
>qupfw_a(4)[qupfw.img] Ok
>qupfw_b(4)[qupfw.img] Ok
>storsec_a(4)[storsec.img] Ok
>storsec_b(4)[storsec.img] Ok
>devcfg_a(4)[devcfg.img] Ok
>devcfg_b(4)[devcfg.img] Ok
>aop_a(4)[aop.img] Ok
>aop_b(4)[aop.img] Ok
>cmnlib_a(4)[cmnlib.img] Ok
>cmnlib_b(4)[cmnlib.img] Ok
>cmnlib64_a(4)[cmnlib64.img] Ok
>cmnlib64_b(4)[cmnlib64.img] Ok
>keymaster_a(4)[keymaster.img] Ok
>keymaster_b(4)[keymaster.img] Ok
>bluetooth(4)[bluetooth.img] Ok
>hyp_a(4)[hyp.img] Ok
>hyp_b(4)[hyp.img] Ok
>abl_a(4)[abl.img] Ok
>abl_b(4)[abl.img] Ok
>tz_a(4)[tz.img] Ok
>tz_b(4)[tz.img] Ok
>logo(4)[logo.img] Ok
>dsp(4)[dsp.img] Ok
>boot(4)[boot.img] Ok
>modem(4)[modem.img] Ok
>vendor(4)[vendor.img] Ok
>system(4)[system.img] Ok
>PrimaryGPT(4)[gpt_main4.bin] Ok
>ImageFv(5)[imagefv.elf] Ok
>PrimaryGPT(5)[gpt_main5.bin] Ok

Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-6.] OK
0 [NUM_DISK_SECTORS-6.] OK
0 [NUM_DISK_SECTORS-6.] OK
0 [NUM_DISK_SECTORS-6.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-5.] OK
0 [CRC32(2,4096)] OK
0 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
0 [0] OK
0 [CRC32(1,92)] OK
0 [0] OK
0 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
1 [NUM_DISK_SECTORS-6.] OK
1 [NUM_DISK_SECTORS-6.] OK
1 [NUM_DISK_SECTORS-6.] OK
1 [NUM_DISK_SECTORS-6.] OK
1 [NUM_DISK_SECTORS-1.] OK
1 [NUM_DISK_SECTORS-1.] OK
1 [NUM_DISK_SECTORS-5.] OK
1 [CRC32(2,4096)] OK
1 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
1 [0] OK
1 [CRC32(1,92)] OK
1 [0] OK
1 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
2 [NUM_DISK_SECTORS-6.] OK
2 [NUM_DISK_SECTORS-6.] OK
2 [NUM_DISK_SECTORS-6.] OK
2 [NUM_DISK_SECTORS-6.] OK
2 [NUM_DISK_SECTORS-1.] OK
2 [NUM_DISK_SECTORS-1.] OK
2 [NUM_DISK_SECTORS-5.] OK
2 [CRC32(2,4096)] OK
2 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
2 [0] OK
2 [CRC32(1,92)] OK
2 [0] OK
2 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
3 [NUM_DISK_SECTORS-6.] OK
3 [NUM_DISK_SECTORS-6.] OK
3 [NUM_DISK_SECTORS-6.] OK
3 [NUM_DISK_SECTORS-6.] OK
3 [NUM_DISK_SECTORS-1.] OK
3 [NUM_DISK_SECTORS-1.] OK
3 [NUM_DISK_SECTORS-5.] OK
3 [CRC32(2,4096)] OK
3 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
3 [0] OK
3 [CRC32(1,92)] OK
3 [0] OK
3 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
4 [NUM_DISK_SECTORS-6.] OK
4 [NUM_DISK_SECTORS-6.] OK
4 [NUM_DISK_SECTORS-6.] OK
4 [NUM_DISK_SECTORS-6.] OK
4 [NUM_DISK_SECTORS-1.] OK
4 [NUM_DISK_SECTORS-1.] OK
4 [NUM_DISK_SECTORS-5.] OK
4 [CRC32(2,8192)] OK
4 [CRC32(NUM_DISK_SECTORS-5.,8192)] OK
4 [0] OK
4 [CRC32(1,92)] OK
4 [0] OK
4 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
5 [NUM_DISK_SECTORS-6.] OK
5 [NUM_DISK_SECTORS-6.] OK
5 [NUM_DISK_SECTORS-6.] OK
5 [NUM_DISK_SECTORS-6.] OK
5 [NUM_DISK_SECTORS-1.] OK
5 [NUM_DISK_SECTORS-1.] OK
5 [NUM_DISK_SECTORS-5.] OK
5 [CRC32(2,4096)] OK
5 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
5 [0] OK
5 [CRC32(1,92)] OK
5 [0] OK
5 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 1
Set bootable storage drive 1 Ok
Rebooting Phone.... Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:09:49
  Reply With Quote
Old 07-21-2020, 13:49   #561 (permalink)
No Life Poster
 
dicle_gsm's Avatar
 
Join Date: Jul 2007
Location: tr
Posts: 2,219
Member: 539148
Status: Offline
Thanks Meter: 2,174
GM 9 Pro FRP Remove Success by Hydra Dongle

GM 9 Pro FRP Remove Success by Hydra Dongle



General Mobile GM 9 Pro Google account remove log

Quote:
Searching EDL Port..[COM60]
TPortConnection.Create...(COM60)..Opening...Ok
Getting device info.......
Serial No.: 0x3433EAE7
MSM ID : 0x0008C0E1, SDM660-Qualcomm Snapdragon 660
PBL Ver : 00000000
PK HASH : 7BE49B72F9E4337223CCB84D6ECCCA4E
61CE16E3602AC2008CB18B75BABE6D09

Firehose Loader[dec_vivo_1_4.elf]
Initializing SaharaBoot... Ok
Sending ................................Ok

Connecting to Firehose...
Ping...... Ok
Configuration........
Identifying Chip..........
<?xml version="1.0" encoding="UTF-8" ?>
<data>
<response value="NAK" />
</data>.
<.
?.
x.
m.
l.
.
v.
e.
r....eMMC Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 8192
MaxPayloadSizeToTargetInBytesSupported : 8192
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : MSM8996
Version : 1
DateTime : Sep 21 2018 - 19:19:07

Running : Ok

Reading GPT[1]Ok
Phone Information......
Model : GM 9 Pro
Brand : GM
Android Ver : 9
Manufacturer : General Mobile
Device : GM9PRO_sprout
Display ID : P.9PR.1905A-s
Security Patch : 2019-05-05
Kernel ID : 2019-05-05
Fingerprint : GM/GM9PRO/GM9PRO_sprout:9/PKQ1.180904.001/314:user/release-keys
ro_product_hardware :
sys_hardware_version :

Reading GPT[1]Ok
*** FRP Reset ***
Resetting FRP...
Auto
Processing...
Executing ...
[Zero Wipe] **WARNING Unauthorized tag 'program'
[Erase Safety Tag] Ok

Elapsed Time : 00:00:09


TPortConnection.Destroy.....Closing...Ok..
  Reply With Quote
Old 07-21-2020, 14:05   #562 (permalink)
No Life Poster
 
pintu_das's Avatar
 
Join Date: Jan 2015
Location: Narsingdi, Dhaka, Bangladesh
Age: 28
Posts: 2,207
Member: 2325851
Status: Offline
Sonork: 100.1680491
Thanks Meter: 2,363
Donate money to this user
SYMPHONY I10 FRP REMOVE DONE



Hydra MediaTeK Tool Ver 1.0.1 Build 92
Windows 10 (Version 10.0, Build 18362, 64-bit Edition)
Intel(R) Core(TM) i7-8700 CPU @ 3.20GHz
Intel(R) UHD Graphics 630
Ram Installed : 8 GB
Windows Access Right Admin
Software Run As Admnistrator
******* Dongle Info *******
Version : Hydra Tool v 1.2
Serial : 200300003558
Initialize : OKAY
Status : Activated
Life : 0-[0-0-0-0-0]


Brand : AUTO Model : AUTO Connection : Flash Mode

=====================================
How To Boot : Power off phone
* BROM Mode : Press VOL +
* Preloader Mode : Just Insert cable

Connection[WAITING]Found[PreLoader][COM12] Status[Opened]
Identifying Hardware ID
BROM CPUID : 6580 (0000)MT6580[6580]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00001002
FUSEID : 00000000
SECURE VERSION : FF
BL VERSION : 01
BR Secured : 00
Preparing Download Agent..
Download Agent : 6580.bin
MTK_DOWNLOAD_AGENT -HYDRA
MTK_AllInOne_DA_v3.3001.2018-09-18.13:22_452898
Initializing Loader [1]
Sending Loader [1] Accepted
PROTOCOL[OLD] - eMMC
PRMMCCID : 150100463832324D4200AC39C6958385
Running DA 4.2 on BBID : 0x9C
Init Configuration Ok
Initializing Loader [2]
Sending Loader [2] Accepted
Reading Flashchip data....
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003A3E00000 -14.561 GB
ERAM Size : 0x0000000040000000 -1024 MB
IRAM Size : 0x0000000000020000 -128 KB
UNICAL RID : A570A12ED33F2AB7A8D5C60C0EBD262A
eMMC CID : 460001154D32323839AC0042858395C6
Change to HIGH SPEED...
Connection[WAITING]Found[COM35] Status[Opened]

Reading Partition Table
SIZE[0x00000738] 21 Items > Done

Reading System Info
Model : i10
Brand : Symphony
Android Ver : 6.0
Manufacturer : Symphony
Device : i10
Display ID : MRA58K release-keys
Security Patch : 2016-05-01
Platform : mt6580
Kernel ID : 2016-05-01
FRPPST : /dev/block/platform/mtk-msdc.0/11120000.msdc0/by-name/frp
Fingerprint : Symphony/i10/i10:6.0/MRA58K/1462337248:user/release-keys
ro_product_hardware :
sys_hardware_version :

Autobackup Partitions
-preloader[0x00000000] 512 KB -> preloader.bin...Ok
-> Renaming Preloader.... preloader_p4200.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\Symphony_i10_6580-mt6580-6.0(MRA58K release-keys)_210720185913\MT6580_Android_scatter.txt
-nvram[0x00380000] 5 MB -> nvram.bin...Ok
-nvdata[0x050A0000] 32 MB -> nvdata.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\Symphony_i10_6580-mt6580-6.0(MRA58K release-keys)_210720185913
MTK Phone Loader is NOW RUNNING.


Reading System Info
Model : i10
Brand : Symphony
Android Ver : 6.0
Manufacturer : Symphony
Device : i10
Display ID : MRA58K release-keys
Security Patch : 2016-05-01
Platform : mt6580
Kernel ID : 2016-05-01
FRPPST : /dev/block/platform/mtk-msdc.0/11120000.msdc0/by-name/frp
Fingerprint : Symphony/i10/i10:6.0/MRA58K/1462337248:user/release-keys
ro_product_hardware :
sys_hardware_version :

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition... [Ok] Ok

Elapsed Time : 00:00:20
  Reply With Quote
The Following User Says Thank You to pintu_das For This Useful Post:
Old 07-22-2020, 09:21   #563 (permalink)
No Life Poster
 
sky73's Avatar
 
Join Date: Jan 2013
Location: gsmhosting
Age: 29
Posts: 1,148
Member: 1876736
Status: Offline
Thanks Meter: 735
xiaomi a1 imei repair done


erase sec by fastboot by hydra (for some 5x converted to a1 phones shoud not use edl it will break)

enable diag with code

repair imei by hydra

restore qcn by hydra

Code:
Selected Comport : [FOUND](COM42)

Firmware ID : MPSS.TA.2.3.c1-00361-8953_GEN_PACK-1.111174.2.113516.1
Build Date : ct  9 201721:16:20Aug 28 201722:00:008953.gen
IMEI1 : yyyyyyy
IMEI2 : yyyyyyyy

Enabling MultiSim....
Sending SPC Code...  OK
Restoring Qcn....  
Restoring Qcn Success  
Elapsed Time : 00:00:37
  Reply With Quote
The Following 2 Users Say Thank You to sky73 For This Useful Post:
Old 07-23-2020, 18:55   #564 (permalink)
No Life Poster
 
blinet's Avatar
 
Join Date: Nov 2002
Location: Slovakia
Age: 40
Posts: 1,060
Member: 17405
Status: Offline
Thanks Meter: 345
Pocophone F1 flashing ok

frp ok -> but phone dead -> full flash ok, phone unlocked and repaired.

Code:
******* Dongle Info *******
Version    : Hydra Tool v 1.1
Serial     : 19070000****
Initialize : OKAY
Status     : Activated
Life       : 2-[0-0-0-0-0]

Searching EDL Port..[COM37]
TPortConnection.Create...(COM37)..Opening...Ok
Getting device info.......
Serial No.: 0xEEB9267C
MSM ID    : 0x0008B0E1, SDM845-Qualcomm Snapdragon 845
PBL Ver   : 00000001
PK HASH   : C924A35F39CE1CDD1B8D5A9F3B8E3C51
            317930431D7A9DD5A55028CF6965FE65
 
Firehose Loader[Xiaomi_beryllium_PocoF1.elf]
Initializing SaharaBoot... Ok
Sending ....................................Ok

Connecting to Firehose...
Ping.....
NOTE : FILTERED : <.
NOTE : FILTERED : ?.
NOTE : FILTERED : x.
NOTE : FILTERED : m.
NOTE : FILTERED : l. Ok 
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[2qJPndLkZjVGTHOpSUZAoQJEDV6]
Checking Internet connection....
 - Hydra Is Online
Connecting to Hydra Xiaomi Server...

Signature @256bytes Authentication.... Accepted........
Identifying Chip........UFS Ok
Chip Configuration :
 MemoryName : UFS
 MaxPayloadSizeToTargetInBytes : 1048576
 MaxPayloadSizeToTargetInBytesSupported : 1048576
 MaxPayloadSizeFromTargetInBytes : 
 MaxXMLSizeInBytes : 4096
 TargetName : 
 Version : 1
 DateTime : Oct 10 2018 - 22:42:48

*** STORAGE DEVICE INFO ***
Memory Type         : UFS
Block Size in Bytes : 4096
Page Size           : 4096
Manufacturer ID     : 462
Serial Number       : 1297306958
Firmware Version    : 500
Product Name        : KLUDG4U1EA-B0C1
Physical Partitions : 6
Total Logical Blocks:
          Drive [0]  30038016[114,586 GB]
          Drive [1]  2048[8 MB]
          Drive [2]  2048[8 MB]
          Drive [3]  8192[32 MB]
          Drive [4]  1179648[4,5 GB]
          Drive [5]  8192[32 MB]
Running : Ok
 
Reading GPT[6], Partitions(224 Items) Ok
Phone Information......
  Model : 
  Brand : 
  Android Ver : 10
  Miui Ver  : V11
  Manufacturer : Xiaomi
  Device : 
  Mod_device : beryllium_global
  Display ID : 
  Security Patch : 2020-04-01
  Kernel ID : 2020-04-01
  Fingerprint : 
  ro_product_hardware : 
  sys_hardware_version : 


----------------------------
Flashing Selected Partitions 
>switch(0)[dummy.img] Ok
>misc(0)[misc.img] Ok
>logfs(0)[logfs_ufs_8mb.bin] Ok
>persist(0)[persist.img] Skipped
>cust(0)[cust.img] Ok
>recovery(0)[recovery.img] Ok
>cache(0)[cache.img] Ok
>userdata(0)[userdata.img] Ok
>PrimaryGPT(0)[gpt_main0.bin] Ok
>xbl_config_a(1)[xbl_config.img] Ok
>xbl_a(1)[xbl.img] Ok
>PrimaryGPT(1)[gpt_main1.bin] Ok
>xbl_config_b(2)[xbl_config.img] Ok
>xbl_b(2)[xbl.img] Ok
>PrimaryGPT(2)[gpt_main2.bin] Ok
>PrimaryGPT(3)[gpt_main3.bin] Ok
>limits(4)[dummy.img] Ok
>qupfw_a(4)[qupfw.img] Ok
>qupfw_b(4)[qupfw.img] Ok
>storsec_a(4)[storsec.img] Ok
>storsec_b(4)[storsec.img] Ok
>devcfg_a(4)[devcfg.img] Ok
>devcfg_b(4)[devcfg.img] Ok
>aop_a(4)[aop.img] Ok
>aop_b(4)[aop.img] Ok
>cmnlib_a(4)[cmnlib.img] Ok
>cmnlib_b(4)[cmnlib.img] Ok
>cmnlib64_a(4)[cmnlib64.img] Ok
>cmnlib64_b(4)[cmnlib64.img] Ok
>keymaster_a(4)[keymaster.img] Ok
>keymaster_b(4)[keymaster.img] Ok
>bluetooth(4)[bluetooth.img] Ok
>hyp_a(4)[hyp.img] Ok
>hyp_b(4)[hyp.img] Ok
>abl_a(4)[abl.img] Ok
>abl_b(4)[abl.img] Ok
>tz_a(4)[tz.img] Ok
>tz_b(4)[tz.img] Ok
>logo(4)[logo.img] Ok
>dsp(4)[dsp.img] Ok
>boot(4)[boot.img] Ok
>modem(4)[modem.img] Ok
>vendor(4)[vendor.img] Ok
>system(4)[system.img] Ok
>PrimaryGPT(4)[gpt_main4.bin] Ok
>ImageFv(5)[imagefv.elf] Ok
>PrimaryGPT(5)[gpt_main5.bin] Ok

Flashing Patch Configuration.. 
0 [NUM_DISK_SECTORS-6.]   OK
0 [NUM_DISK_SECTORS-6.]   OK
0 [NUM_DISK_SECTORS-6.]   OK
0 [NUM_DISK_SECTORS-6.]   OK
0 [NUM_DISK_SECTORS-1.]   OK
0 [NUM_DISK_SECTORS-1.]   OK
0 [NUM_DISK_SECTORS-5.]   OK
0 [CRC32(2,4096)]   OK
0 [CRC32(NUM_DISK_SECTORS-5.,4096)]   OK
0 [0]   OK
0 [CRC32(1,92)]   OK
0 [0]   OK
0 [CRC32(NUM_DISK_SECTORS-1.,92)]   OK
1 [NUM_DISK_SECTORS-6.]   OK
1 [NUM_DISK_SECTORS-6.]   OK
1 [NUM_DISK_SECTORS-6.]   OK
1 [NUM_DISK_SECTORS-6.]   OK
1 [NUM_DISK_SECTORS-1.]   OK
1 [NUM_DISK_SECTORS-1.]   OK
1 [NUM_DISK_SECTORS-5.]   OK
1 [CRC32(2,4096)]   OK
1 [CRC32(NUM_DISK_SECTORS-5.,4096)]   OK
1 [0]   OK
1 [CRC32(1,92)]   OK
1 [0]   OK
1 [CRC32(NUM_DISK_SECTORS-1.,92)]   OK
2 [NUM_DISK_SECTORS-6.]   OK
2 [NUM_DISK_SECTORS-6.]   OK
2 [NUM_DISK_SECTORS-6.]   OK
2 [NUM_DISK_SECTORS-6.]   OK
2 [NUM_DISK_SECTORS-1.]   OK
2 [NUM_DISK_SECTORS-1.]   OK
2 [NUM_DISK_SECTORS-5.]   OK
2 [CRC32(2,4096)]   OK
2 [CRC32(NUM_DISK_SECTORS-5.,4096)]   OK
2 [0]   OK
2 [CRC32(1,92)]   OK
2 [0]   OK
2 [CRC32(NUM_DISK_SECTORS-1.,92)]   OK
3 [NUM_DISK_SECTORS-6.]   OK
3 [NUM_DISK_SECTORS-6.]   OK
3 [NUM_DISK_SECTORS-6.]   OK
3 [NUM_DISK_SECTORS-6.]   OK
3 [NUM_DISK_SECTORS-1.]   OK
3 [NUM_DISK_SECTORS-1.]   OK
3 [NUM_DISK_SECTORS-5.]   OK
3 [CRC32(2,4096)]   OK
3 [CRC32(NUM_DISK_SECTORS-5.,4096)]   OK
3 [0]   OK
3 [CRC32(1,92)]   OK
3 [0]   OK
3 [CRC32(NUM_DISK_SECTORS-1.,92)]   OK
4 [NUM_DISK_SECTORS-6.]   OK
4 [NUM_DISK_SECTORS-6.]   OK
4 [NUM_DISK_SECTORS-6.]   OK
4 [NUM_DISK_SECTORS-6.]   OK
4 [NUM_DISK_SECTORS-1.]   OK
4 [NUM_DISK_SECTORS-1.]   OK
4 [NUM_DISK_SECTORS-5.]   OK
4 [CRC32(2,8192)]   OK
4 [CRC32(NUM_DISK_SECTORS-5.,8192)]   OK
4 [0]   OK
4 [CRC32(1,92)]   OK
4 [0]   OK
4 [CRC32(NUM_DISK_SECTORS-1.,92)]   OK
5 [NUM_DISK_SECTORS-6.]   OK
5 [NUM_DISK_SECTORS-6.]   OK
5 [NUM_DISK_SECTORS-6.]   OK
5 [NUM_DISK_SECTORS-6.]   OK
5 [NUM_DISK_SECTORS-1.]   OK
5 [NUM_DISK_SECTORS-1.]   OK
5 [NUM_DISK_SECTORS-5.]   OK
5 [CRC32(2,4096)]   OK
5 [CRC32(NUM_DISK_SECTORS-5.,4096)]   OK
5 [0]   OK
5 [CRC32(1,92)]   OK
5 [0]   OK
5 [CRC32(NUM_DISK_SECTORS-1.,92)]   OK
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 1
Set bootable storage drive 1 Ok
Rebooting Phone.... Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:03:25
  Reply With Quote
The Following User Says Thank You to blinet For This Useful Post:
Old 07-25-2020, 15:02   #565 (permalink)
No Life Poster
 
ceza031's Avatar
 
Join Date: Feb 2012
Age: 39
Posts: 1,395
Member: 1724862
Status: Offline
Thanks Meter: 448
Nokia TA-1105 (Nokia 5.1 Plus Backup Stock ROM Done

Nokia TA-1105 (Nokia 5.1 Plus Backup Stock ROM Done



Quote:
Brand : NOKIA Model : TA-1105 (Nokia 5.1 Plus LTE DS PDA) Connection : Flash Mode

=====================================
Connection[WAITING]Found[COM28] Status[Opened]
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 90014A68423861503E0169143659A5B3 - hB8aP>
UNICAL RID : D075A6D718E2FEA7B080FD4C6F624625
Reading GPT-EMMC [0x00008000] 130 Items
Done!!!


Reading System Info
Model :
Brand :
Android Ver : 10
Manufacturer :
Device :
Display ID : 00WW_3_11A
Security Patch : 2020-04-05
Kernel ID : 2020-04-05
Fingerprint :
ro_product_hardware :
sys_hardware_version :

-------------------------------------
Operation : Backup Stock ROM
Processing...

Reading Important Partitions
preloader[0x00000000-0x00080000]512 KB ->preloader.bin... Done
-> Renaming Preloader.... preloader_pda.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Important\__0788--10(00WW_3_11A)150720173658\MT6771_Android_scatter. txt
pgpt[0x00000000-0x00008000]32 KB ->pgpt.bin... Done
frp[0x01588000-0x01688000]1024 KB ->frp.bin... Done
nvdata[0x03688000-0x07688000]64 MB ->nvdata.bin... Done
nvram[0x09688000-0x0D688000]64 MB ->nvram.bin... Done
protect1[0x0D688000-0x0DE88000]8 MB ->protect1.bin... Done
protect2[0x0DE88000-0x0E800000]9.469 MB ->protect2.bin... Done
seccfg[0x0E800000-0x0F000000]8 MB ->seccfg.bin... Done
proinfo[0x12200000-0x12500000]3 MB ->proinfo.bin... Done
Reading/Backup Flash Done!!!
C:\Hydra Tool\\Backup\Important\__0788--10(00WW_3_11A)150720173658 Ok

Elapsed Time : 00:00:12
  Reply With Quote
Old 07-25-2020, 15:05   #566 (permalink)
No Life Poster
 
ceza031's Avatar
 
Join Date: Feb 2012
Age: 39
Posts: 1,395
Member: 1724862
Status: Offline
Thanks Meter: 448
Redmi 8A Pro olivewood FRP Remove by Hydra Dongle

Redmi 8A Pro olivewood FRP Remove by Hydra Dongle



Xiaomi Redmi 8A Pro olivewood google account remove log :

Quote:
Searching EDL Port..[COM9]
TPortConnection.Create...(COM9)..Opening...Ok
Getting device info.......
Serial No.: 0x87201D13
MSM ID : 0x000BF0E1, SDM439-Qualcomm Snapdragon 439
PBL Ver : 00000001
PK HASH : 57158EAF1814D78FD2B3105ECE4DB18A
817A08AC664A5782A925F3FF8403D39A

Firehose Loader[prog_emmc_firehose_8937_ddr.mbn]
Initializing SaharaBoot... Ok
Sending .......................Ok

Connecting to Firehose...
Ping... Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[ckL6YXMsiqhts0iAqoQy6TYvYQ3]
Checking Internet connection....
- Hydra Is Online
Connecting to Hydra Xiaomi Server...

Signature @256bytes Authentication.... Accepted......Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 2612369950
Firmware Version : 1
Product Name : QD63MB
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 61071360[29.121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Running : Ok

Reading GPT[3]Ok
Phone Information......
Model : Redmi 8A Pro
Brand : Redmi
Android Ver : 9
Miui Ver : V11
Manufacturer : Xiaomi
Device : olivewood
Mod_device : olivewood_id_global
Display ID : ZQL2117-olivewood-build-20200402185232
Security Patch : 2020-03-01
Kernel ID : 2020-03-01
Fingerprint : Redmi/olivewood/olivewood:9/PKQ1.190319.001/V11.0.3.0.PCQIDXM:user/release-keys
ro_product_hardware :
sys_hardware_version :

Reading GPT[3]Ok
*** FRP Reset ***
Resetting FRP...
Auto
Processing...
Executing ...
[Zero Wipe] Ok

Elapsed Time : 00:00:17


TPortConnection.Destroy.....Closing...Ok..
  Reply With Quote
Old 07-25-2020, 15:06   #567 (permalink)
No Life Poster
 
ceza031's Avatar
 
Join Date: Feb 2012
Age: 39
Posts: 1,395
Member: 1724862
Status: Offline
Thanks Meter: 448
Nokia 3.1 Full eMMC Dump Done by Hydra Tool

Nokia 3.1 Full eMMC Dump Done by Hydra Tool



Quote:
Brand : AUTO Model : AUTO Connection : Flash Mode

=====================================
How To Boot : Power off phone
* BROM Mode : Press VOL +
* Preloader Mode : Just Insert cable

Connection[WAITING]Found[COM16] Status[Opened]
Identifying Hardware ID
BROM CPUID : 0326 (0000)MT6750T[6755]
BROM HW_SW_VER : 8A00 CB00 0001 0000
FUSEID : 00001C46
SECURE VERSION : 05
BL VERSION : FE
BR Secured : 01
NORMAL BOOT
Preparing Download Agent..
Download Agent : 6755_HMD_CO2.bin
MTK_DOWNLOAD_AGENT -HYDRA
MTK_AllInOne_DA_v3.3001.00.00
Initializing Loader [1]
Sending Loader [1] Accepted
PROTOCOL[NEW] - eMMC
PHONE SYNC[Accepted]
DA Mode : brom
Preloader Initialization....
Parsing ES2-0-2590-00WW-1-2-preloader_ES2.bin
Sending Flashchip Initialization... Accepted
Initializing Loader [2]
Sending Loader [2] Accepted
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003AB400000 -14,676 GB
eMMC CID : 90014A484147346132A52236700B25BB - HAG4a2
UNICAL RID : 4988BFEBF28153992B5F0E7055355091
DA Speed : full-speed
Change to HIGH SPEED...
Connection[WAITING]Found[COM17] Status[Opened]
Reading GPT-EMMC [0x00008000] 130 Items
Done!!!

Reading System Info
Model : Nokia 3.1
Brand : Nokia
Android Ver : 8.1.0
Manufacturer : alps
Device : ES2_sprout
Display ID : 00WW_2_590
Security Patch : 2018-09-05
Kernel ID : 2018-09-05
Fingerprint : Nokia/Essential2_00WW/ES2_sprout:8.1.0/O11019/00WW_2_590:user/release-keys
ro_product_hardware :
sys_hardware_version :

Autobackup Partitions
preloader[0x00000000-0x00080000]512 KB ->preloader.bin... Done
-> Renaming Preloader.... preloader_es2.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\Nokia_Nokia 3.1_0326--8.1.0(00WW_2_590)_160720152430\MT6750T_Android_sca tter.txt
pgpt[0x00000000-0x00008000]32 KB ->pgpt.bin... Done
frp[0x00A88000-0x00B88000]1024 KB ->frp.bin... Done
nvdata[0x03BC8000-0x05BC8000]32 MB ->nvdata.bin... Done
nvram[0x0A380000-0x0A880000]5 MB ->nvram.bin... Done
Done!!!
C:\Hydra Tool\\Backup\Auto\Nokia_Nokia 3.1_0326--8.1.0(00WW_2_590)_160720152430
MTK Phone Loader is NOW RUNNING.
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003AB400000 -14,676 GB
eMMC CID : 90014A484147346132A52236700B25BB - HAG4a2
UNICAL RID : 4988BFEBF28153992B5F0E7055355091
Reading GPT-EMMC [0x00008000] 130 Items
Done!!!


Reading System Info
Model : Nokia 3.1
Brand : Nokia
Android Ver : 8.1.0
Manufacturer : alps
Device : ES2_sprout
Display ID : 00WW_2_590
Security Patch : 2018-09-05
Kernel ID : 2018-09-05
Fingerprint : Nokia/Essential2_00WW/ES2_sprout:8.1.0/O11019/00WW_2_590:user/release-keys
ro_product_hardware :
sys_hardware_version :

-------------------------------------
Operation : Full EMMC DUMP
Processing...
BOOT1[0x00000000-0x00400000]4 MB ->boot1.bin... Done
BOOT1[0x00000000-0x00400000]4 MB ->boot2.bin... Done
RPMB[0x00000000-0x00400000]4 MB ->rpmb.bin... Done
USERAREA[0x00000000-0x3AB400000]14,676 GB ->userarea.bin... Done Ok

Elapsed Time : 00:08:48
  Reply With Quote
Old 07-25-2020, 15:08   #568 (permalink)
No Life Poster
 
ceza031's Avatar
 
Join Date: Feb 2012
Age: 39
Posts: 1,395
Member: 1724862
Status: Offline
Thanks Meter: 448
Mi A2 Jasmine Android 10 FRP Remove by Hydra

Mi A2 Jasmine Android 10 FRP Remove by Hydra



Xiaomi Mi A2 Jasmine Google account remove log :

Quote:
PreOperation Configuration
Brand : XIAOMI Model : Mi A2 (Jasmine) Storage : Auto
Loader: prog_emmc_firehose_Sdm660_ddr.elf
Port : Auto
Connection : Flash Mode

Searching EDL Port..[COM33]
TPortConnection.Create...(COM33)..Opening...Ok
Getting device info.......
Serial No.: 0xC5203808
MSM ID : 0x0008C0E1, SDM660-Qualcomm Snapdragon 660
PBL Ver : 00000002
PK HASH : A7B8B82545A98ECA23D6E9105FB46456
8D1B5828264903441BDEF0CD57E3C370

Firehose Loader[prog_emmc_firehose_Sdm660_ddr.elf]
Initializing SaharaBoot... Ok
Sending .................................Ok

Connecting to Firehose...
Ping...... Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[GGEe3lmerpa57IuCtGc6a9uUiUV]
Checking Internet connection....
- Hydra Is Online
Connecting to Hydra Xiaomi Server...

Signature @256bytes Authentication.... Accepted......................
Identifying Chip....Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 8192
MaxPayloadSizeToTargetInBytesSupported : 8192
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : MSM8996
Version : 1
DateTime : Aug 16 2019 - 17:22:13

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 19
Serial Number : 18750351
Firmware Version : 4
Product Name : S0J9D8
Physical Partitions : 4
Total Logical Blocks:
Drive [0] 122142720[58.242 GB]
Drive [1] 122142720[58.242 GB]
Drive [2] 8192[4 MB]
Drive [3] 8192[4 MB]
Running : Ok

Reading GPT[4]Ok
Phone Information......
Model :
Brand :
Android Ver : 10
Manufacturer :
Device :
Display ID : QKQ1.190910.002 V11.0.10.0.QDIMIXM
Security Patch : 2020-05-05
Kernel ID : 2020-05-05
Fingerprint :
ro_product_hardware :
sys_hardware_version :

Reading GPT[4]Ok
*** FRP Reset ***
Resetting FRP...
Auto
Processing...
Executing ...
[Zero Wipe] Ok

Elapsed Time : 00:00:26


TPortConnection.Destroy.....Closing...Ok..
  Reply With Quote
Old 07-25-2020, 15:10   #569 (permalink)
No Life Poster
 
ceza031's Avatar
 
Join Date: Feb 2012
Age: 39
Posts: 1,395
Member: 1724862
Status: Offline
Thanks Meter: 448
Xiaomi Mi 9 Lite pyxis flashing fastboot mode

Xiaomi Mi 9 Lite pyxis flashing fastboot mode

Need unlocked bootloader for fastboot operations



Quote:
Searching Device By Fastboot
Device Found...

Reading Information...
Product : product: pyxis
Serial No. : serialno: 59ab112e
version : getvar:version FAILED (remote: GetVar Variable Not found)
Secure : secure: yes
Device Info:
Verity mode: true
Device unlocked: true
Device critical unlocked: true
Charger screen enabled: true
--------------------------
Fastboot Flashing...
-switch(dummy.img) Ok
-misc(misc.img) Ok
-logfs(logfs_ufs_8mb.bin) Ok
-vendor(vendor.img) Ok
-system(system.img) Ok
-imagefv(imagefv.elf) Ok
-recovery(recovery.img) Ok
-cache(cache.img) Ok
-cust(cust.img) Ok
-userdata(userdata.img) Ok
-xbl_config(xbl_config.elf) Ok
-xbl(xbl.elf) Ok
-xbl_configbak(xbl_config.elf) Ok
-xblbak(xbl.elf) Ok
-qupfw(qupv3fw.elf) Ok
-qupfwbak(qupv3fw.elf) Ok
-vbmeta(vbmeta.img) Ok
-storsec(storsec.mbn) Ok
-storsecbak(storsec.mbn) Ok
-devcfg(devcfg.mbn) Ok
-devcfgbak(devcfg.mbn) Ok
-aop(aop.mbn) Ok
-aopbak(aop.mbn) Ok
-cmnlib(cmnlib.mbn) Ok
-cmnlibbak(cmnlib.mbn) Ok
-cmnlib64(cmnlib64.mbn) Ok
-cmnlib64bak(cmnlib64.mbn) Ok
-keymaster(keymaster64.mbn) Ok
-keymasterbak(keymaster64.mbn) Ok
-bluetooth(BTFM.bin) Ok
-abl(abl.elf) Ok
-ablbak(abl.elf) Ok
-tz(tz.mbn) Ok
-tzbak(tz.mbn) Ok
-hyp(hyp.mbn) Ok
-hypbak(hyp.mbn) Ok
-dtbo(dtbo.img) Ok
-logo(logo.img) Ok
-dsp(dspso.bin) Ok
-boot(boot.img) Ok
-modem(NON-HLOS.bin) Ok
-persist(persist.img) Skipped
All Done
--------------------------

Elapsed Time : 00:12:06
  Reply With Quote
Old 07-25-2020, 15:12   #570 (permalink)
No Life Poster
 
ceza031's Avatar
 
Join Date: Feb 2012
Age: 39
Posts: 1,395
Member: 1724862
Status: Offline
Thanks Meter: 448
Lenovo A6020A41 (Vibe K5) Read Pattern by Hydra Tool

Lenovo A6020A41 (Vibe K5) Read Pattern by Hydra Tool



Quote:
PreOperation Configuration
Brand : LENOVO Model : A6020A41 (Vibe K5) Storage : Auto
Loader: 8936.mbn
Port : Auto
Connection : Flash Mode

Searching EDL Port..[COM9]
TPortConnection.Create...(COM9)..Opening...Ok
Getting device info..
Device MODE : SAHARA

Connecting to Firehose...
Ping.. Ok
Configuration......
Identifying Chip....Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8936
Version : 1

Running : Ok

Reading GPT[3]Ok
Phone Information.....
Model : Lenovo A6020a41
Brand : Lenovo
Android Ver : 5.1.1
Manufacturer : LENOVO
Device : A6020a41
Board : msm8916
Display ID : A6020a41_S_S005_161017_ROW
Security Patch : 2016-10-01
Platform : msm8916
Kernel ID : 2016-10-01
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : Lenovo/A6020a41/A6020a41:5.1.1/LMY47V/A6020a41_S_S005_161017_ROW:user/release-keys
ro_product_hardware :
sys_hardware_version :

Reading GPT[3]Ok
Operation : ScreenLock Security
Read Pattern
Processing...
Trying to search : gatekeeper.pattern.key
Trying to search : personalpattern.key
Trying to search : cm_gesture.key
Trying to search : gesture.key FOUND
Gesture Data : 55064A628ED186924DA048F0B6D648EA2621299E
Bruteforcing pattern hash..Please wait for few seconds
Pattern Code : 147852
1 2 3
4 5 6
7 8 9


Ok

Elapsed Time : 00:00:04


TPortConnection.Destroy.....Closing...Ok..
  Reply With Quote
Reply

Bookmarks


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


 



All times are GMT +1. The time now is 02:41.



Powered by Searchlight © 2024 Axivo Inc.
vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2024 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2023 -
Page generated in 0.44419 seconds with 9 queries

SEO by vBSEO