GSM Shop GSM Shop
GSM-Forum  

Welcome to the GSM-Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features.
Only registered members may post questions, contact other members or search our database of over 8 million posts.

Registration is fast, simple and absolutely free so please - Click to REGISTER!

If you have any problems with the registration process or your account login, please contact contact us .

Go Back   GSM-Forum > Product Support Sections > Special Solutions / Services / WebShop > GSMFABRICA Products > HYDRA TOOL

Reply
 
LinkBack Thread Tools Display Modes
Old 08-05-2020, 12:08   #586 (permalink)
No Life Poster
 
Join Date: May 2011
Posts: 1,322
Member: 1576733
Status: Offline
Thanks Meter: 615
Redmi Note 9 Pro (joyeuse) Write Firmware by Fastboot Mode


Redmi Note 9 Pro (joyeuse) Write Firmware by Fastboot Mode

Your device Bootloader status should be unlocked for Write Firmware by Fastboot Mode



Quote:
Searching Device By Fastboot
Device Found...

Reading Information...
Product : product: joyeuse
Serial No. : serialno: 2a232425
version : getvar:version FAILED (remote: GetVar Variable Not found)
Secure : secure: yes
Device Info:
Verity mode: true
Device unlocked: true
Device critical unlocked: true
Charger screen enabled: true
--------------------------
Fastboot Flashing...
-persist(persist.img) Skipped
-misc(misc.img) Ok
-cust(cust.img) Ok
-recovery(recovery.img) Ok
-recoverybak(recovery.img) Ok
-vbmeta_system(vbmeta_system.img) Ok
-vbmeta_systembak(vbmeta_system.img) Ok
-metadata(metadata.img) Ok
-cache(cache.img) Ok
-ffu(ffu.img) Ok
-super(super.img) Ok
-userdata(userdata.img) Ok
-xbl(xbl.elf) Ok
-xbl_config(xbl_config.elf) Ok
-xblbak(xbl.elf) Ok
-xbl_configbak(xbl_config.elf) Ok
-aop(aop.mbn) Ok
-tz(tz.mbn) Ok
-hyp(hyp.mbn) Ok
-modem(NON-HLOS.bin) Ok
-bluetooth(BTFM.bin) Ok
-abl(abl.elf) Ok
-dsp(dspso.bin) Ok
-keymaster(km4.mbn) Ok
-cmnlib(cmnlib.mbn) Ok
-cmnlib64(cmnlib64.mbn) Ok
-devcfg(devcfg.mbn) Ok
-qupfw(qupv3fw.elf) Ok
-imagefv(imagefv.elf) Ok
-uefisecapp(uefi_sec.mbn) Ok
-aopbak(aop.mbn) Ok
-tzbak(tz.mbn) Ok
-hypbak(hyp.mbn) Ok
-modembak(NON-HLOS.bin) Ok
-bluetoothbak(BTFM.bin) Ok
-ablbak(abl.elf) Ok
-dspbak(dspso.bin) Ok
-keymasterbak(km4.mbn) Ok
-cmnlibbak(cmnlib.mbn) Ok
-cmnlib64bak(cmnlib64.mbn) Ok
-devcfgbak(devcfg.mbn) Ok
-qupfwbak(qupv3fw.elf) Ok
-imagefvbak(imagefv.elf) Ok
-uefisecappbak(uefi_sec.mbn) Ok
-logfs(logfs_ufs_8mb.bin) Ok
-storsec(storsec.mbn) Ok
-vbmeta(vbmeta.img) Ok
-boot(boot.img) Ok
-dtbo(dtbo.img) Ok
-vbmetabak(vbmeta.img) Ok
-dtbobak(dtbo.img) Ok
-bootbak(boot.img) Ok
All Done
--------------------------

Elapsed Time : 00:05:42
  Reply With Quote
Old 08-05-2020, 12:10   #587 (permalink)
No Life Poster
 
Join Date: May 2011
Posts: 1,322
Member: 1576733
Status: Offline
Thanks Meter: 615
Redmi Note 8T willow FRP + Format Done Without Credit

Redmi Note 8T willow FRP + Format Done Without Credit

Xiaomi Redmi Note 8T (willow) Remove Google Account and Password remove done, without credit with hydra standalone server



Quote:
PreOperation Configuration
Brand : XIAOMI Model : Redmi Note 8T (wiilow) Storage : Auto
Loader: Xiaomi_redminote8_loader.elf
Port : Auto
Connection : Flash Mode

Searching EDL Port..[COM3]
TPortConnection.Create...(COM3)..Opening...Ok
Getting device info.......
Serial No.: 0xE86AB891
MSM ID : 0x0010A0E1,
PBL Ver : 00000001
PK HASH : 1BEBE3863A6781DB4B01086063007334
DE9E5CA14971C7C4F4358EC9D79CDA46

Firehose Loader[Xiaomi_redminote8_loader.elf]
Initializing SaharaBoot... Ok
Sending ..............................Ok

Connecting to Firehose...
Ping.....
NOTE : FILTERED : <.
NOTE : FILTERED : ?.
NOTE : FILTERED : x.
NOTE : FILTERED : m.
NOTE : FILTERED : l. Ok
Configuration........
Identifying Chip....Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Jul 3 2019 - 22:23:56

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 139477716
Firmware Version : 875573296
Product Name : hC8aP>
Physical Partitions : 4
Total Logical Blocks:
Drive [0] 122142720[58,242 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Drive [3] 32768[16 MB]
Running : Ok

Reading GPT[4], Partitions(88 Items) Ok
Phone Information......
Model : Redmi Note 8T
Brand : xiaomi
Android Ver : 9
Miui Ver : V11
Manufacturer : Xiaomi
Device : willow
Mod_device : willow_ru_global
Display ID : PKQ1.190616.001
Security Patch : 2020-06-01
Kernel ID : 2020-06-01
Fingerprint : xiaomi/willow_ru/willow:9/PKQ1.190616.001/V11.0.4.0.PCXRUXM:user/release-keys
ro_product_hardware :
sys_hardware_version :

Reading GPT[4], Partitions(88 Items) Ok
*** Ultra Power Option ***
Auto
Processing...
Executing ...
[Zero Wipe]
Executing ...
[Format Safe method] Ok

Elapsed Time : 00:00:12


TPortConnection.Destroy.....Closing...Ok..
  Reply With Quote
Old 08-05-2020, 12:13   #588 (permalink)
No Life Poster
 
Join Date: May 2011
Posts: 1,322
Member: 1576733
Status: Offline
Thanks Meter: 615
Xiaomi Redmi Note 8 MIUI 11 FRP Remove by Hydra

Xiaomi Redmi Note 8 MIUI 11 FRP Remove by Hydra

Redmi Note 8 (ginkgo) Google Account remove Android 9 byHydra Dongle without credit



Quote:
PreOperation Configuration
Brand : XIAOMI Model : Redmi Note 8 (ginkgo) Storage : Auto
Loader: Xiaomi_redminote8_loader.elf
Port : Auto
Connection : Flash Mode

Searching EDL Port..[COM398]
TPortConnection.Create...(COM398)..Opening...Ok
Getting device info.......
Serial No.: 0xD75E2700
MSM ID : 0x0010A0E1,
PBL Ver : 00000001
PK HASH : 1BEBE3863A6781DB4B01086063007334
DE9E5CA14971C7C4F4358EC9D79CDA46

Firehose Loader[Xiaomi_redminote8_loader.elf]
Initializing SaharaBoot... Ok
Sending ..............................Ok

Connecting to Firehose...
Ping.....
NOTE : FILTERED : <.
NOTE : FILTERED : ?.
NOTE : FILTERED : x.
NOTE : FILTERED : m.
NOTE : FILTERED : l. Ok
Configuration........
Identifying Chip....Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Jul 3 2019 - 22:23:56

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 19
Serial Number : 323166652
Firmware Version : 4
Product Name : S0J9K8
Physical Partitions : 4
Total Logical Blocks:
Drive [0] 122142720[58,242 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Drive [3] 32768[16 MB]
Running : Ok

Reading GPT[4], Partitions(88 Items) Ok
Phone Information......
Model : Redmi Note 8
Brand : xiaomi
Android Ver : 9
Miui Ver : V11
Manufacturer : Xiaomi
Device : ginkgo
Mod_device : ginkgo_global
Display ID : PKQ1.190616.001
Security Patch : 2020-01-01
Kernel ID : 2020-01-01
Fingerprint : xiaomi/ginkgo/ginkgo:9/PKQ1.190616.001/V11.0.6.0.PCOMIXM:user/release-keys
ro_product_hardware :
sys_hardware_version :

Reading GPT[4], Partitions(88 Items) Ok
*** FRP Reset ***
Resetting FRP...
Auto
Processing...
Executing ...
[Zero Wipe] Ok

Elapsed Time : 00:00:14


TPortConnection.Destroy.....Closing...Ok..
  Reply With Quote
Old 08-05-2020, 12:16   #589 (permalink)
No Life Poster
 
Join Date: May 2011
Posts: 1,322
Member: 1576733
Status: Offline
Thanks Meter: 615
Redmi 8A olivelite Fix NV Data Corrupted Done

Redmi 8A olivelite Fix NV Data Corrupted Done

Xiaomi Redmi 8A olivelite Nv Data corrupted and hang on logo fix by hydra



Quote:
PreOperation Configuration
Brand : XIAOMI Model : Redmi 8A (olivelite) Storage : Auto
Loader: Xiaomi_Redmi_8_Olive.mbn
Port : Auto
Connection : Flash Mode

Searching EDL Port..[COM84]
TPortConnection.Create...(COM84)..Opening...Ok
Getting device info.......
Serial No.: 0x46CC3523
MSM ID : 0x000BF0E1, SDM439-Qualcomm Snapdragon 439
PBL Ver : 00000001
PK HASH : 57158EAF1814D78FD2B3105ECE4DB18A
817A08AC664A5782A925F3FF8403D39A

Firehose Loader[Xiaomi_Redmi_8_Olive.mbn]
Initializing SaharaBoot... Ok
Sending .......................Ok

Connecting to Firehose...
Ping... Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[Ag5OjT352QlUxa8-faD0Nc8wGVs]
Checking Internet connection....
- Hydra Is Online
Connecting to Hydra Xiaomi Server...

Signature @256bytes Authentication.... Accepted......
Identifying Chip....Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 887314619
Firmware Version : 909127728
Product Name : hB8aP>
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 61071360[29.121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Running : Ok

Reading GPT[3], Partitions(64 Items) Ok
Phone Information......
Model : Redmi 8A
Brand : Xiaomi
Android Ver : 9
Miui Ver : V11
Manufacturer : Xiaomi
Device : olivelite
Mod_device : olivelite_global
Display ID : ZQL2116-olivelite-build-20191219025522
Security Patch : 2019-12-01
Kernel ID : 2019-12-01
Fingerprint : Xiaomi/olivelite/olivelite:9/PKQ1.190319.001/V11.0.3.0.PCPMIXM:user/release-keys
ro_product_hardware :
sys_hardware_version :

Reading GPT[3], Partitions(64 Items) Ok
Wipe Security ...
Security Data Found.
Reading Security Items....
> modemst1
> modemst2
> fsg
C:\Hydra Tool\Backup\Security_Backup\Redmi 8A__9_Security_072620195117.sec
Backup Security Success....
Security Wipe Started..
> modemst1 Ok
> modemst2 Ok
> fsg Ok
Security Wipe Success...Ok

Elapsed Time : 00:00:20


TPortConnection.Destroy.....Closing...Ok..
  Reply With Quote
Old 08-05-2020, 12:19   #590 (permalink)
No Life Poster
 
Join Date: May 2011
Posts: 1,322
Member: 1576733
Status: Offline
Thanks Meter: 615
PocoPhone F1 (beryllium) Mi Account Remove Success

PocoPhone F1 (beryllium) Mi Account Remove Success

Xiaomi PocoPhone F1 beryllium Remove Mi Account and Anti-Relock Fix by Hydra tool



Quote:
PreOperation Configuration
Brand : XIAOMI Model : PocoPhone F1 (beryllium) Storage : Auto
Loader: Xiaomi_beryllium_PocoF1.elf
Port : Auto
Connection : Flash Mode

Searching EDL Port..[COM8]
TPortConnection.Create...(COM8)..Opening...Ok
Getting device info.......
Serial No.: 0x90FB25A5
MSM ID : 0x0008B0E1, SDM845-Qualcomm Snapdragon 845
PBL Ver : 00000001
PK HASH : C924A35F39CE1CDD1B8D5A9F3B8E3C51
317930431D7A9DD5A55028CF6965FE65

Firehose Loader[Xiaomi_beryllium_PocoF1.elf]
Initializing SaharaBoot... Ok
Sending ....................................Ok

Connecting to Firehose...
Ping.....
NOTE : FILTERED : <.
NOTE : FILTERED : ?.
NOTE : FILTERED : x.
NOTE : FILTERED : m.
NOTE : FILTERED : l. Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[CSY5YWdJlPLyMIB30EZopa1lGe9]
Checking Internet connection....
- Hydra Is Online
Connecting to Hydra Xiaomi Server...

Signature @256bytes Authentication.... Accepted........
Identifying Chip........UFS Ok
Chip Configuration :
MemoryName : UFS
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Oct 10 2018 - 22:42:48

*** STORAGE DEVICE INFO ***
Memory Type : UFS
Block Size in Bytes : 4096
Page Size : 4096
Manufacturer ID : 429
Serial Number : 2037279096
Firmware Version : 003
Product Name : H28U74301AMR
Physical Partitions : 6
Total Logical Blocks:
Drive [0] 14419968[55.008 GB]
Drive [1] 2048[8 MB]
Drive [2] 2048[8 MB]
Drive [3] 8192[32 MB]
Drive [4] 1179648[4.5 GB]
Drive [5] 8192[32 MB]
Running : Ok

Reading GPT[6], Partitions(224 Items) Ok
Phone Information.....
Model : POCO F1
Brand : Xiaomi
Android Ver : 8.1.0
Miui Ver : V10
Manufacturer : Xiaomi
Device : beryllium
Mod_device : beryllium_global
Display ID : OPM1.171019.026
Security Patch : 2018-10-01
Kernel ID : 2018-10-01
Fingerprint : Xiaomi/beryllium/beryllium:8.1.0/OPM1.171019.026/V10.0.6.0.OEJMIFH:user/release-keys
ro_product_hardware :
sys_hardware_version :

Reading GPT[6], Partitions(224 Items) Ok
Operation : MiAccount
Remove MiAccount[Erase Method]
Processing...
Backing up Partition for safety...Ok

Scanning Patching address...
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]Done!!
Total Items patched : 47
Successfully patched address..Ok

Elapsed Time : 00:00:44


TPortConnection.Destroy.....Closing...Ok..
  Reply With Quote
Old 08-05-2020, 12:21   #591 (permalink)
No Life Poster
 
Join Date: May 2011
Posts: 1,322
Member: 1576733
Status: Offline
Thanks Meter: 615
Mi A3 laurel_sprout Flashing by EDL Mode Without Credit

Mi A3 laurel_sprout Flashing by EDL Mode Without Credit

Xiaomi Mi A3 Write Firmware QdLoader 9008 Mode Without Credit.



Quote:
Searching EDL Port..[COM12]
TPortConnection.Create...(COM12)..Opening...Ok
Getting device info.......
Serial No.: 0xD3A25A15
MSM ID : 0x0010A0E1,
PBL Ver : 00000000
PK HASH : 1BEBE3863A6781DB4B01086063007334
DE9E5CA14971C7C4F4358EC9D79CDA46

Firehose Loader[Xiaomi_redminote8_loader.elf]
Initializing SaharaBoot... Ok
Sending ..............................Ok

Connecting to Firehose...
Ping.....
NOTE : FILTERED : <.
NOTE : FILTERED : ?.
NOTE : FILTERED : x.
NOTE : FILTERED : m.
NOTE : FILTERED : l. Ok
Configuration........
Identifying Chip........UFS Ok
Chip Configuration :
MemoryName : UFS
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Jul 3 2019 - 22:23:56

*** STORAGE DEVICE INFO ***
Memory Type : UFS
Block Size in Bytes : 4096
Page Size : 4096
Manufacturer ID : 462
Serial Number : 1297306958
Firmware Version : 300
Product Name : KM5H7001DM-B424
Physical Partitions : 6
Total Logical Blocks:
Drive [0] 14501888[55,32 GB]
Drive [1] 2048[8 MB]
Drive [2] 2048[8 MB]
Drive [3] 32768[128 MB]
Drive [4] 1048576[4 GB]
Drive [5] 32768[128 MB]
Running : Ok

Reading GPT[6], Partitions(224 Items) Ok
Phone Information......
Model : Mi A3
Brand : Xiaomi
Android Ver : 9
Manufacturer : Xiaomi
Device : laurel_sprout
Display ID : PKQ1.190416.001.V10.3.4.0.PFQMIXM
Security Patch : 2019-08-05
Kernel ID : 2019-08-05
Fingerprint : Xiaomi/laurel_sprout/laurel_sprout:9/PKQ1.190416.001/V10.3.4.0.PFQMIXM:user/release-keys
ro_product_hardware :
sys_hardware_version :


----------------------------
Flashing Selected Partitions
>persist(0)[persist.img] Skipped
>misc(0)[misc.img] Ok
>product_a(0)[product.img] Ok
>product_b(0)[product.img] Ok
>system_a(0)[system.img] Ok
>system_b(0)[system_other.img] Ok
>metadata(0)[metadata.img] Ok
>userdata(0)[userdata.img] Ok
>PrimaryGPT(0)[gpt_main0.bin] Ok
>xbl_a(1)[xbl.elf] Ok
>xbl_config_a(1)[xbl_config.elf] Ok
>PrimaryGPT(1)[gpt_main1.bin] Ok
>xbl_b(2)[xbl.elf] Ok
>xbl_config_b(2)[xbl_config.elf] Ok
>PrimaryGPT(2)[gpt_main2.bin] Ok
>PrimaryGPT(3)[gpt_main3.bin] Ok
>rpm_a(4)[rpm.mbn] Ok
>tz_a(4)[tz.mbn] Ok
>hyp_a(4)[hyp.mbn] Ok
>modem_a(4)[NON-HLOS.bin] Ok
>bluetooth_a(4)[BTFM.bin] Ok
>abl_a(4)[abl.elf] Ok
>dsp_a(4)[dspso.bin] Ok
>keymaster_a(4)[km4.mbn] Ok
>boot_a(4)[boot.img] Ok
>cmnlib_a(4)[cmnlib.mbn] Ok
>cmnlib64_a(4)[cmnlib64.mbn] Ok
>devcfg_a(4)[devcfg.mbn] Ok
>qupfw_a(4)[qupv3fw.elf] Ok
>vendor_a(4)[vendor.img] Ok
>vbmeta_a(4)[vbmeta.img] Ok
>dtbo_a(4)[dtbo.img] Ok
>imagefv_a(4)[imagefv.elf] Ok
>uefisecapp_a(4)[uefi_sec.mbn] Ok
>storsec_a(4)[storsec.mbn] Ok
>rpm_b(4)[rpm.mbn] Ok
>tz_b(4)[tz.mbn] Ok
>hyp_b(4)[hyp.mbn] Ok
>modem_b(4)[NON-HLOS.bin] Ok
>bluetooth_b(4)[BTFM.bin] Ok
>abl_b(4)[abl.elf] Ok
>dsp_b(4)[dspso.bin] Ok
>keymaster_b(4)[km4.mbn] Ok
>boot_b(4)[boot.img] Ok
>cmnlib_b(4)[cmnlib.mbn] Ok
>cmnlib64_b(4)[cmnlib64.mbn] Ok
>devcfg_b(4)[devcfg.mbn] Ok
>qupfw_b(4)[qupv3fw.elf] Ok
>vendor_b(4)[vendor.img] Ok
>vbmeta_b(4)[vbmeta.img] Ok
>dtbo_b(4)[dtbo.img] Ok
>imagefv_b(4)[imagefv.elf] Ok
>uefisecapp_b(4)[uefi_sec.mbn] Ok
>storsec_b(4)[storsec.mbn] Ok
>apdp(4)[apdp.mbn] Ok
>logfs(4)[logfs_ufs_8mb.bin] Ok
>storsec(4)[storsec.mbn] Ok
>PrimaryGPT(4)[gpt_main4.bin] Ok
>PrimaryGPT(5)[gpt_main5.bin] Ok

Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-6.] OK
0 [NUM_DISK_SECTORS-6.] OK
0 [NUM_DISK_SECTORS-6.] OK
0 [NUM_DISK_SECTORS-6.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-5.] OK
0 [CRC32(2,4096)] OK
0 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
0 [0] OK
0 [CRC32(1,92)] OK
0 [0] OK
0 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
1 [NUM_DISK_SECTORS-6.] OK
1 [NUM_DISK_SECTORS-6.] OK
1 [NUM_DISK_SECTORS-6.] OK
1 [NUM_DISK_SECTORS-6.] OK
1 [NUM_DISK_SECTORS-1.] OK
1 [NUM_DISK_SECTORS-1.] OK
1 [NUM_DISK_SECTORS-5.] OK
1 [CRC32(2,4096)] OK
1 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
1 [0] OK
1 [CRC32(1,92)] OK
1 [0] OK
1 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
2 [NUM_DISK_SECTORS-6.] OK
2 [NUM_DISK_SECTORS-6.] OK
2 [NUM_DISK_SECTORS-6.] OK
2 [NUM_DISK_SECTORS-6.] OK
2 [NUM_DISK_SECTORS-1.] OK
2 [NUM_DISK_SECTORS-1.] OK
2 [NUM_DISK_SECTORS-5.] OK
2 [CRC32(2,4096)] OK
2 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
2 [0] OK
2 [CRC32(1,92)] OK
2 [0] OK
2 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
3 [NUM_DISK_SECTORS-6.] OK
3 [NUM_DISK_SECTORS-6.] OK
3 [NUM_DISK_SECTORS-6.] OK
3 [NUM_DISK_SECTORS-6.] OK
3 [NUM_DISK_SECTORS-1.] OK
3 [NUM_DISK_SECTORS-1.] OK
3 [NUM_DISK_SECTORS-5.] OK
3 [CRC32(2,4096)] OK
3 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
3 [0] OK
3 [CRC32(1,92)] OK
3 [0] OK
3 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
4 [NUM_DISK_SECTORS-6.] OK
4 [NUM_DISK_SECTORS-6.] OK
4 [NUM_DISK_SECTORS-6.] OK
4 [NUM_DISK_SECTORS-6.] OK
4 [NUM_DISK_SECTORS-1.] OK
4 [NUM_DISK_SECTORS-1.] OK
4 [NUM_DISK_SECTORS-5.] OK
4 [CRC32(2,8192)] OK
4 [CRC32(NUM_DISK_SECTORS-5.,8192)] OK
4 [0] OK
4 [CRC32(1,92)] OK
4 [0] OK
4 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
5 [NUM_DISK_SECTORS-6.] OK
5 [NUM_DISK_SECTORS-6.] OK
5 [NUM_DISK_SECTORS-6.] OK
5 [NUM_DISK_SECTORS-6.] OK
5 [NUM_DISK_SECTORS-1.] OK
5 [NUM_DISK_SECTORS-1.] OK
5 [NUM_DISK_SECTORS-5.] OK
5 [CRC32(2,4096)] OK
5 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
5 [0] OK
5 [CRC32(1,92)] OK
5 [0] OK
5 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 1
Set bootable storage drive 1 Ok
Rebooting Phone.... Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:06:48
  Reply With Quote
Old 08-05-2020, 12:23   #592 (permalink)
No Life Poster
 
Join Date: May 2011
Posts: 1,322
Member: 1576733
Status: Offline
Thanks Meter: 615
Xiaomi Mi 5X tiffany Mi Account Remove by Hydra Tool

Xiaomi Mi 5X tiffany Mi Account Remove by Hydra Tool



Quote:
PreOperation Configuration
Brand : XIAOMI Model : Mi 5X (Tiffany) Storage : Auto
Loader: Xiaomi_S2y2_noauth_8953_ddr.mbn
Port : Auto
Connection : Flash Mode

Searching EDL Port..[COM8]
TPortConnection.Create...(COM8)..Opening...Ok
Getting device info.......
Serial No.: 0x258B2DA1
MSM ID : 0x000460E1, MSM8953-Qualcomm Snapdragon 625
PBL Ver : 00000000
PK HASH : 57158EAF1814D78FD2B3105ECE4DB18A
817A08AC664A5782A925F3FF8403D39A

Firehose Loader[Xiaomi_S2y2_noauth_8953_ddr.mbn]
Initializing SaharaBoot... Ok
Sending ...................Ok

Connecting to Firehose...
Ping... Ok
Configuration......
Identifying Chip....Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8953
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 19
Serial Number : 6201363
Firmware Version : 4
Product Name : S0J9F8
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 122142720[58.242 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Running : Ok

Reading GPT[3], Partitions(52 Items) Ok
Phone Information.....
Model : MI 5X
Brand : xiaomi
Android Ver : 8.1.0
Miui Ver : V11
Manufacturer : Xiaomi
Device : tiffany
Board : msm8953
Display ID : ZQL1711-tiffany-build-20191118222649
Security Patch : 2019-10-01
Platform : msm8953
Kernel ID : 2019-10-01
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : xiaomi/tiffany/tiffany:8.1.0/OPM1.171019.019/V11.0.3.0.ODBCNXM:user/release-keys
ro_product_hardware :
sys_hardware_version :

Reading GPT[3], Partitions(52 Items) Ok
Operation : MiAccount
Remove MiAccount[Erase Method]
Processing...
Backing up Partition for safety...Ok

Scanning Patching address...
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]Done!!
Total Items patched : 4
Successfully patched address..Ok

Elapsed Time : 00:00:16


TPortConnection.Destroy.....Closing...Ok..
  Reply With Quote
Old 08-05-2020, 12:26   #593 (permalink)
No Life Poster
 
Join Date: May 2011
Posts: 1,322
Member: 1576733
Status: Offline
Thanks Meter: 615
Meizu M6 Backup Full eMMC DUMP by Hydra Tool

Meizu M6 Backup Full eMMC DUMP by Hydra Tool



Quote:
Brand : MEIZU Model : M6 Connection : Flash Mode

=====================================
Connection[WAITING]Found[PreLoader][COM10] Status[Opened]
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003AB400000 -14.676 GB
eMMC CID : 450100444634303136013F70D23B9461 - DF4016
UNICAL RID : FA6687D419BA1A63030DE6C37418EF17
Reading GPT-EMMC [0x00008000] 130 Items
Done!!!


Reading System Info
Model : MEIZU M6
Brand : Meizu
Android Ver : 7.0
Manufacturer : Meizu
Device : meizu_M6
Board : M6
Display ID : Flyme 7.1.2.0G
Security Patch : 2019-03-01
Platform : mt6750
Kernel ID : 2019-03-01
FRPPST : /dev/block/platform/mtk-msdc.0/11230000.msdc0/by-name/frp
Fingerprint : Meizu/meizu_M6/meizu_M6:7.0/NRD90M/1553585720:user/release-keys
ro_product_hardware :
sys_hardware_version :

-------------------------------------
Operation : Full EMMC DUMP
Processing...
BOOT1[0x00000000-0x00400000]4 MB ->boot1.bin... Done
BOOT1[0x00000000-0x00400000]4 MB ->boot2.bin... Done
RPMB[0x00000000-0x00400000]4 MB ->rpmb.bin... Done
USERAREA[0x00000000-0x3AB400000]14.676 GB ->userarea.bin... Done Ok

Elapsed Time : 00:09:23
  Reply With Quote
The Following User Says Thank You to diosa For This Useful Post:
Old 08-05-2020, 12:28   #594 (permalink)
No Life Poster
 
Join Date: May 2011
Posts: 1,322
Member: 1576733
Status: Offline
Thanks Meter: 615
Huawei FLA-L22 (Y9 2018) Write Board Firmware Success

Huawei FLA-L22 (Y9 2018) Write Board Firmware Success



Quote:
Searching Device By Fastboot
Device Found...
-[flash] huawei_crc_check... Ok
-[flash] ptable... Ok
-[flash] huawei_crc_check... Ok
-[flash] xloader... Ok
-[flash] huawei_crc_check... Ok
-[flash] fastboot... Ok
-[flash] huawei_crc_check... Ok
-[flash] kernel... Ok
-[flash] huawei_crc_check... Ok
-[flash] ramdisk... Ok
-[flash] huawei_crc_check... Ok
-[flash] vbmeta... Ok
-[flash] huawei_crc_check... Ok
-[flash] odm... Ok
-[flash] huawei_crc_check... Ok
-[flash] recovery_ramdisk... Ok
-[flash] huawei_crc_check... Ok
-[flash] recovery_vendor... Ok
-[flash] huawei_crc_check... Ok
-[flash] recovery_vbmeta... Ok
-[erase] cust... Ok
-[erase] misc... Ok
-[flash] huawei_crc_check... Ok
-[flash] cache... Ok
-[flash] huawei_crc_check... Ok
-[flash] fw_lpm3... Ok
-[flash] huawei_crc_check... Ok
-[flash] fw_hifi... Ok
-[flash] huawei_crc_check... Ok
-[flash] teeos... Ok
-[flash] huawei_crc_check... Ok
-[flash] trustfirmware... Ok
-[flash] huawei_crc_check... Ok
-[flash] sensorhub... Ok
-[flash] huawei_crc_check... Ok
-[flash] dts... Ok
-[flash] huawei_crc_check... Ok
-[flash] modemnvm_update... Ok
-[flash] huawei_crc_check... Ok
-[flash] modem_fw... Ok
-[flash] huawei_crc_check... Ok
-[flash] system... Ok
-[flash] huawei_crc_check... Ok
-[flash] vendor... Ok
-[erase] product... Ok
-[flash] huawei_crc_check... Ok
-[flash] product... Ok
-[erase] version... Ok
-[flash] huawei_crc_check... Ok
-[flash] version... Ok
-[erase] userdata... Ok
-[flash] huawei_crc_check... Ok
-[flash] userdata... Ok
-[flash] huawei_crc_check... Ok
-[flash] splash2... Ok
-[erase] modemnvm_factory... Ok
-[erase] bootfail_info... Ok
-[erase] dfx... Ok
-[erase] rrecord... Ok
-[reboot-bootloader] ... Ok
-[oem] hwdog certify set 0... Ok
-[oem] oeminfoerase-vendorcountry... Ok
-[oem] oeminfoerase-devicemodel... Ok
-[oem] oeminfoerase-ver... Ok
-[oem] oeminfoerase-single_sim... Ok
-[reboot] ... Ok
Done!!!!

Elapsed Time : 00:02:44
  Reply With Quote
The Following User Says Thank You to diosa For This Useful Post:
Old 08-05-2020, 12:29   #595 (permalink)
No Life Poster
 
Join Date: May 2011
Posts: 1,322
Member: 1576733
Status: Offline
Thanks Meter: 615
Huawei DIG-L03 (Diego) FRP Remove Success

Huawei DIG-L03 (Diego) FRP Remove Success



Quote:
PreOperation Configuration
Brand : HUAWEI Model : DIG-L03 (Diego) Storage : Auto
Loader: Huawei-DIG.mbn
Port : Auto
Connection : Flash Mode

Searching EDL Port..[COM10]
TPortConnection.Create...(COM10)..Opening...Ok
Getting device info..
Device MODE : SAHARA

Connecting to Firehose...
Ping.. Ok
Configuration......
Identifying Chip....Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 530692278
Firmware Version : 825241672
Product Name : HAG4a2
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 30777344[14,676 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Running : Ok

Reading GPT[3], Partitions(56 Items) Ok
Phone Information.....
Model : DIG
Brand : HUAWEI
Android Ver : 6.0
Manufacturer : HUAWEI
Device : HWDIG-L8940
Board : DIG
Display ID : #deleted
Security Patch : 2017-05-05
Platform : msm8937
Kernel ID : 2017-05-05
Fingerprint : #deleted
ro_product_hardware :
sys_hardware_version :

Reading GPT[3], Partitions(56 Items) Ok
*** FRP Reset ***
Resetting FRP...
Auto
Processing...
Executing ...
[Zero Wipe] Ok

Elapsed Time : 00:00:03


TPortConnection.Destroy.....Closing...Ok..
  Reply With Quote
The Following User Says Thank You to diosa For This Useful Post:
Old 08-05-2020, 12:30   #596 (permalink)
No Life Poster
 
Join Date: May 2011
Posts: 1,322
Member: 1576733
Status: Offline
Thanks Meter: 615
Huawei AMN-LX9 (Y5 2019) FRP Remove Success by Hydra Dongle

Huawei AMN-LX9 (Y5 2019) FRP Remove Success



Quote:
Brand : HUAWEI Model : AMN-LX9 (Y5 2019) Connection : Flash Mode

=====================================
How To Boot : Remove Batt if possible
* TP Ground Must be near cpu..
* Remove ground upon popup of the message dialog.

Connection[WAITING]Found[COM157] Status[Opened]
Identifying Hardware ID
BROM CPUID : 0717 (0000)MT6761[6761]
BROM HW_SW_VER : 8A00 CA01 0200 0000
FUSEID : 00000001
SECURE VERSION : 05
BL VERSION : FE
BR Secured : E5[SBC+SDA+SEL]
Security Authorization....
Sending[Huawei_auth_sv5_.auth] Accepted
Preparing Download Agent..
Download Agent : Huawei_6761_8A00CA0000000000_00001000_00030000.bin
MTK_DOWNLOAD_AGENT -HYDRA
MTK_AllInOne_DA_v3.3001.2018/10/18.17:38_452898
Initializing Loader [1]
Sending Loader [1] Accepted
PROTOCOL[NEW] - eMMC
PHONE SYNC[ERROR]- NOT SYNC[Accepted]
DA Mode : brom
Preloader Initialization....
Parsing preloader_k61v1_64_mexico.bin
Sending Flashchip Initialization... Accepted
Initializing Loader [2]
Sending Loader [2] Accepted
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 150100514436334D42014FB1900EB6CB - QD63MB
UNICAL RID : A9A50EAFD059680F79C212C1CAE3E69B
DA Speed : high-speed
Reading GPT-EMMC [0x00008000] 130 Items
Done!!!

Reading System Info
ERROR reading system image [corrupted/erased]

Autobackup Partitions
preloader[0x00000000-0x00080000]512 KB ->preloader.bin... Done
-> Renaming Preloader.... preloader_k61v1_64_mexico.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\__0717--()_280720113740\MT6761_Android_scatter.txt
pgpt[0x00000000-0x00008000]32 KB ->pgpt.bin... Done
frp[0x00108000-0x00208000]1024 KB ->frp.bin... Done
nvdata[0x00A08000-0x01A08000]16 MB ->nvdata.bin... Done
nvram[0x04400000-0x04900000]5 MB ->nvram.bin... Done
Done!!!
C:\Hydra Tool\\Backup\Auto\__0717--()_280720113740
MTK Phone Loader is NOW RUNNING.
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 150100514436334D42014FB1900EB6CB - QD63MB
UNICAL RID : A9A50EAFD059680F79C212C1CAE3E69B
Reading GPT-EMMC [0x00008000] 130 Items
Done!!!


Reading System Info
ERROR reading system image [corrupted/erased]

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition...
Erasing FRP Partition... Ok

Elapsed Time : 00:00:26
  Reply With Quote
The Following User Says Thank You to diosa For This Useful Post:
Old 08-05-2020, 12:33   #597 (permalink)
No Life Poster
 
Join Date: May 2011
Posts: 1,322
Member: 1576733
Status: Offline
Thanks Meter: 615
Asus X008DA (ZC520TL ZenFone 3 Max) Google Account Remove With Hydra Dongle

Asus X008DA FRP Remove by Hydra Dongle

Asus X008DA (ZC520TL ZenFone 3 Max) Google Account Remove With Hydra Dongle

Brand : Asus
Model : X008DA (ZC520TL ZenFone 3 Max)
CPU : MTK
Alias : MT6737



Quote:
Brand : ASUS Model : X008DA (ZC520TL ZenFone 3 Max) Connection : Flash Mode

=====================================
How To Boot : Power off phone
* BROM Mode : Press VOL +
* Preloader Mode : Just Insert cable

Connection[WAITING]Found[PreLoader][COM4] Status[Opened]
Identifying Hardware ID
BROM CPUID : 0335 (0000)MT6737[6735]
BROM HW_SW_VER : 8A00 CB00 0000 0000
FUSEID : A4020000
SECURE VERSION : FF
BL VERSION : 01
BR Secured : 01
Preparing Download Agent..
Download Agent : 6735_ASUS.bin
MTK_DOWNLOAD_AGENT -HYDRA
MTK_AllInOne_DA_v3.3001.00.00
Initializing Loader [1]
Sending Loader [1] Accepted
PROTOCOL[OLD] - eMMC
PRMMCCID : 510001154D33315840020742CB2184D4
Running DA 4.2 on BBID : 0x93
Init Configuration Ok
Initializing Loader [2]
Sending Loader [2] Accepted
Reading Flashchip data....
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000747C00000 -29,121 GB
ERAM Size : 0x0000000080000000 -2 GB
IRAM Size : 0x0000000000020000 -128 KB
UNICAL RID : BFA3428B682E589DD8FB476A0D3927F7
eMMC CID : 510001154D33315840020742CB9384D4
Change to HIGH SPEED...
Connection[WAITING]Found[COM20] Status[Opened]

Reading Partition Table
SIZE[0x000008F0] 26 Items > Done

Reading System Info
Model : ASUS_X008DA
Brand : asus
Android Ver : 7.0
Manufacturer : asus
Device : ASUS_X008_1
Board : MT6737
Display ID : NRD90M.ID_Phone-14.11.1808.122-20180806
Security Patch : 2018-07-05
Platform : mt6737m
Kernel ID : 2018-07-05
FRPPST : /dev/block/platform/mtk-msdc.0/11230000.msdc0/by-name/frp
Fingerprint : asus/ID_Phone/ASUS_X008_1:7.0/NRD90M/ID_Phone-14.11.1808.122-20180806:user/release-keys
ro_product_hardware : WK3ME1B4-2
sys_hardware_version :

Autobackup Partitions
-preloader[0x00000000] 512 KB -> preloader.bin...Ok
-> Renaming Preloader.... preloader_d281l.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\asus_ASUS_X008DA_0335-mt6737m-7.0(NRD90M.ID_Phone-14.11.1808.122-20180806)_260720131703\MT6737_Android_scatter.txt
-nvram[0x00380000] 5 MB -> nvram.bin...Ok
-nvdata[0x13D00000] 32 MB -> nvdata.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\asus_ASUS_X008DA_0335-mt6737m-7.0(NRD90M.ID_Phone-14.11.1808.122-20180806)_260720131703
MTK Phone Loader is NOW RUNNING.


Reading System Info
Model : ASUS_X008DA
Brand : asus
Android Ver : 7.0
Manufacturer : asus
Device : ASUS_X008_1
Board : MT6737
Display ID : NRD90M.ID_Phone-14.11.1808.122-20180806
Security Patch : 2018-07-05
Platform : mt6737m
Kernel ID : 2018-07-05
FRPPST : /dev/block/platform/mtk-msdc.0/11230000.msdc0/by-name/frp
Fingerprint : asus/ID_Phone/ASUS_X008_1:7.0/NRD90M/ID_Phone-14.11.1808.122-20180806:user/release-keys
ro_product_hardware : WK3ME1B4-2
sys_hardware_version :

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition... [Ok] Ok

Elapsed Time : 00:00:17
  Reply With Quote
The Following User Says Thank You to diosa For This Useful Post:
Old 08-05-2020, 12:35   #598 (permalink)
No Life Poster
 
Join Date: May 2011
Posts: 1,322
Member: 1576733
Status: Offline
Thanks Meter: 615
Coolpad 1904 (N7 Lite) FRP Remove by Hydra Dongle

Coolpad 1904 (N7 Lite) FRP Remove by Hydra Dongle

Run Hydra MTK Module, Tick Factory Reset Protection (FRP), Click execute and plug usb cable



Quote:
=====================================
How To Boot : Power off phone
* BROM Mode : Press VOL +
* Preloader Mode : Just Insert cable

Connection[WAITING]Found[PreLoader][COM20] Status[Opened]
Identifying Hardware ID
BROM CPUID : 6580 (0000)MT6580[6580]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00001002
FUSEID : 00000001
SECURE VERSION : FF
BL VERSION : 01
BR Secured : 00
Preparing Download Agent..
Download Agent : 6580.bin
MTK_DOWNLOAD_AGENT -HYDRA
MTK_AllInOne_DA_v3.3001.2018-09-18.13:22_452898
Initializing Loader [1]
Sending Loader [1] Accepted
PROTOCOL[OLD] - eMMC
PRMMCCID : F1010943414835313600002D21B6A6F9
Running DA 4.2 on BBID : 0x9C
Init Configuration Ok
Initializing Loader [2]
Sending Loader [2] Accepted
Reading Flashchip data....
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003AB400000 -14.676 GB
ERAM Size : 0x0000000040000000 -1024 MB
IRAM Size : 0x0000000000020000 -128 KB
UNICAL RID : 402F5BAB47D9F3B4433BB031AA5AF363
eMMC CID : 430901F1313548412D000036F9A6B621
Change to HIGH SPEED...
Connection[WAITING]Found[COM21] Status[Opened]

Reading Partition Table
SIZE[0x00000A50] 30 Items > Done

Reading System Info
Model : 1904
Brand : coolpad
Android Ver : 9
Manufacturer : coolpad
Device : 1904
Display ID : Coolpad_N7_Lite_1904_v1.0_20200415
Security Patch : 2020-03-05
Kernel ID : 2020-03-05
FRPPST : /dev/block/platform/bootdevice/by-name/frp
Fingerprint : coolpad/1904/1904:9/PPR1.180610.011/0313131838:user/release-keys
ro_product_hardware :
sys_hardware_version :

Autobackup Partitions
-preloader[0x00000000] 512 KB -> preloader.bin...Ok
-> Renaming Preloader.... preloader_g1860pw_v3_gb_fng_g31kp_gp.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\coolpad_1904_6580--9(Coolpad_N7_Lite_1904_v1.0_20200415)_270720174851 \MT6580_Android_scatter.txt
-nvram[0x00380000] 5 MB -> nvram.bin...Ok
-nvdata[0x1BC00000] 32 MB -> nvdata.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\coolpad_1904_6580--9(Coolpad_N7_Lite_1904_v1.0_20200415)_270720174851
MTK Phone Loader is NOW RUNNING.


Reading System Info
Model : 1904
Brand : coolpad
Android Ver : 9
Manufacturer : coolpad
Device : 1904
Display ID : Coolpad_N7_Lite_1904_v1.0_20200415
Security Patch : 2020-03-05
Kernel ID : 2020-03-05
FRPPST : /dev/block/platform/bootdevice/by-name/frp
Fingerprint : coolpad/1904/1904:9/PPR1.180610.011/0313131838:user/release-keys
ro_product_hardware :
sys_hardware_version :

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition... [Ok] Ok

Elapsed Time : 00:00:34
  Reply With Quote
The Following User Says Thank You to diosa For This Useful Post:
Old 08-05-2020, 12:52   #599 (permalink)
No Life Poster
 
Join Date: May 2011
Posts: 1,322
Member: 1576733
Status: Offline
Thanks Meter: 615
Redmi 7A Fix NV Data corrupted by Hydra Tool

Redmi 7A Fix NV Data corrupted by Hydra Tool

Xiaomi Redmi 7A (pine) Fix Nv Data by Hydra Dongle, Without Credit, Without Unlock Bootloader.



Quote:
PreOperation Configuration
Brand : XIAOMI Model : Redmi 7A (pine) Storage : Auto
Loader: Xiaomi_Redmi_8_Olive.mbn
Port : Auto
Connection : Flash Mode

Searching EDL Port..[COM81]
TPortConnection.Create...(COM81)..Opening...Ok
Getting device info.......
Serial No.: 0x937D8F45
MSM ID : 0x000BF0E1, SDM439-Qualcomm Snapdragon 439
PBL Ver : 00000001
PK HASH : 57158EAF1814D78FD2B3105ECE4DB18A
817A08AC664A5782A925F3FF8403D39A

Firehose Loader[Xiaomi_Redmi_8_Olive.mbn]
Initializing SaharaBoot... Ok
Sending .......................Ok

Connecting to Firehose...
Ping... Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[Bze4cNDNKv-c
Checking Internet connection....
- Hydra Is Online
Connecting to Hydra Xiaomi Server...

Signature @256bytes Authentication.... Accepted......
Identifying Chip....Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 476500788
Firmware Version : 1
Product Name : QD63MB
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 61071360[29,121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Running : Ok

Reading GPT[3], Partitions(60 Items) Ok
Phone Information......
Model : Redmi 7A
Brand : Xiaomi
Android Ver : 9
Miui Ver : V10
Manufacturer : Xiaomi
Device : pine
Mod_device : pine_global
Display ID : ZQL1533-pine-build-20190701230949
Security Patch : 2019-06-01
Kernel ID : 2019-06-01
Fingerprint : Xiaomi/pine/pine:9/PKQ1.190319.001/V10.2.4.0.PCMMIXM:user/release-keys
ro_product_hardware :
sys_hardware_version :

Reading GPT[3], Partitions(60 Items) Ok
Wipe Security ...
Security Data Found.
Reading Security Items....
> modemst1
> modemst2
> fsg
C:\Hydra Tool\Backup\Security_Backup\Redmi 7A__9_Security_072720015037.sec
Backup Security Success....
Security Wipe Started..
> modemst1 Ok
> modemst2 Ok
> fsg Ok
Security Wipe Success...Ok

Elapsed Time : 00:00:21


TPortConnection.Destroy.....Closing...Ok..
  Reply With Quote
The Following User Says Thank You to diosa For This Useful Post:
Old 08-07-2020, 23:09   #600 (permalink)
Freak Poster
 
Join Date: Jan 2011
Location: Brazil
Posts: 198
Member: 1498016
Status: Offline
Thanks Meter: 12
Flash and FRP executed 100% XIAOMI REDMI 7A with HYDRA BOX


Hydra Qualcomm Tool Ver 1.0.2 Build 5
Windows 7 Service Pack 1 (Version 6.1, Build 7601, 64-bit Edition)
Intel(R) Celeron(R) CPU J1900 @ 1.99GHz
Intel(R) HD Graphics
Ram Installed : 4 GB
Windows Access Right Admin
******* Dongle Info *******
Version : Hydra Tool v 1.2
Serial : 200700000000
Initialize : OKAY
Status : Activated
Life : 0 [0-0-0-0-0]

Searching EDL Port..[COM12]
TPortConnection.Create...(COM12)..Opening...Ok
Getting device info..
Device MODE : SAHARA

Connecting to Firehose...
Ping.. Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[OqxkNTvD5oI
Checking Internet connection....
- Hydra Is Online
Connecting to Hydra Xiaomi Server...

Signature @256bytes Authentication.... Accepted......
Identifying Chip....Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 185251048
Firmware Version : 875573296
Product Name : hB8aP>
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 61071360[29,121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Running : Ok

Reading GPT[3], Partitions(60 Items) Ok
Phone Information......
Model : Redmi 7A
Brand : Xiaomi
Android Ver : 9
Miui Ver : V11
Manufacturer : Xiaomi
Device : pine
Mod_device : pine_global
Display ID : ZQL1533-pine-build-20191029121415
Security Patch : 2019-10-01
Kernel ID : 2019-10-01
Fingerprint : Xiaomi/pine/pine:9/PKQ1.190319.001/V11.0.4.0.PCMMIXM:user/release-keys
ro_product_hardware :
sys_hardware_version :


----------------------------
Flashing Selected Partitions
>sec(0)[sec.dat] Skipped
>config(0)[config.bin] Skipped
>vbmeta(0)[vbmeta.img] Ok
>vbmetabak(0)[vbmeta.img] Ok
>devcfg(0)[devcfg.mbn] Ok
>devcfgbak(0)[devcfg.mbn] Ok
>apdp(0)[dummy.img] Ok
>msadp(0)[dummy.img] Ok
>sbl1(0)[sbl1.mbn] Ok
>sbl1bak(0)[sbl1.mbn] Ok
>rpm(0)[rpm.mbn] Ok
>rpmbak(0)[rpm.mbn] Ok
>cmnlib(0)[cmnlib_30.mbn] Ok
>cmnlibbak(0)[cmnlib_30.mbn] Ok
>cmnlib64(0)[cmnlib64_30.mbn] Ok
>cmnlib64bak(0)[cmnlib64_30.mbn] Ok
>keymaster(0)[km4.mbn] Ok
>keymasterbak(0)[km4.mbn] Ok
>misc(0)[misc.img] Ok
>aboot(0)[emmc_appsboot.mbn] Ok
>abootbak(0)[emmc_appsboot.mbn] Ok
>tz(0)[tz.mbn] Ok
>tzbak(0)[tz.mbn] Ok
>dtbo(0)[dtbo.img] Ok
>dtbobak(0)[dtbo.img] Ok
>splash(0)[splash.img] Ok
>dsp(0)[adspso.bin] Ok
>dspbak(0)[adspso.bin] Ok
>persist(0)[persist.img] Skipped
>mdtp(0)[mdtp.img] Ok
>mdtpbak(0)[mdtp.img] Ok
>boot(0)[boot.img] Ok
>recovery(0)[recovery.img] Ok
>cache(0)[cache.img] Ok
>modem(0)[NON-HLOS.bin] Ok
>system(0)[system.img] Ok
>vendor(0)[vendor.img] Ok
>cust(0)[cust.img] Ok
>userdata(0)[userdata.img] Ok
>PrimaryGPT(0)[gpt_main0.bin] Ok

Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-33.] OK
0 [CRC32(2,7680)] OK
0 [CRC32(NUM_DISK_SECTORS-33.,7680)] OK
0 [0] OK
0 [CRC32(1,92)] OK
0 [0] OK
0 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 0
Set bootable storage drive 0 Ok
Rebooting Phone.... Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:06:13


AND FRP TOO


Hydra Qualcomm Tool Ver 1.0.2 Build 5
Windows 7 Service Pack 1 (Version 6.1, Build 7601, 64-bit Edition)
Intel(R) Celeron(R) CPU J1900 @ 1.99GHz
Intel(R) HD Graphics
Ram Installed : 4 GB
Windows Access Right Admin
******* Dongle Info *******
Version : Hydra Tool v 1.2
Serial : 200700000000
Initialize : OKAY
Status : Activated
Life : 0 [0-0-0-0-0]

PreOperation Configuration
Brand : XIAOMI Model : Redmi 7A (pine) Storage : Auto
Loader: Xiaomi_Redmi_8_Olive.mbn
Port : Auto
Connection : Flash Mode

Searching EDL Port..[COM12]
TPortConnection.Create...(COM12)..Opening...Ok
Getting device info.......
Serial No.: 0xE2A9F416
MSM ID : 0x000BF0E1, SDM439-Qualcomm Snapdragon 439
PBL Ver : 00000001
PK HASH : 57158EAF1814D78FD2B3105ECE4DB18A
817A08AC664A5782A925F3FF8403D39A

Firehose Loader[Xiaomi_Redmi_8_Olive.mbn]
Initializing SaharaBoot... Ok
Sending .......................Ok

Connecting to Firehose...
Ping... Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[fhjNsV3N2BIF
Checking Internet connection....
- Hydra Is Online
Connecting to Hydra Xiaomi Server...

Signature @256bytes Authentication.... Accepted......
Identifying Chip....Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 185251048
Firmware Version : 909127728
Product Name : hB8aP>
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 61071360[29,121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Running : Ok

Reading GPT[3], Partitions(60 Items) Ok
Phone Information......
Model : Redmi 7A
Brand : Xiaomi
Android Ver : 9
Miui Ver : V11
Manufacturer : Xiaomi
Device : pine
Mod_device : pine_global
Display ID : ZQL1533-pine-build-20200208215833
Security Patch : 2020-01-01
Kernel ID : 2020-01-01
Fingerprint : Xiaomi/pine/pine:9/PKQ1.190319.001/V11.0.6.0.PCMMIXM:user/release-keys
ro_product_hardware :
sys_hardware_version :

Reading GPT[3], Partitions(60 Items) Ok
*** FRP Reset ***
Resetting FRP...
Auto
Processing...
Executing ...
[Zero Wipe] Ok

Elapsed Time : 00:00:16


TPortConnection.Destroy.....Closing...Ok..
  Reply With Quote
Reply

Bookmarks

Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


 



All times are GMT +1. The time now is 19:17.



Powered by Searchlight © 2022 Axivo Inc.
vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2022 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2017 -
Page generated in 0.44244 seconds with 8 queries

SEO by vBSEO