GSM Shop GSM Shop
GSM-Forum  

Welcome to the GSM-Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features.
Only registered members may post questions, contact other members or search our database of over 8 million posts.

Registration is fast, simple and absolutely free so please - Click to REGISTER!

If you have any problems with the registration process or your account login, please contact contact us .

Go Back   GSM-Forum > Product Support Sections > Special Solutions / Services / WebShop > GSMFABRICA Products > HYDRA TOOL


Reply
 
LinkBack Thread Tools Display Modes
Old 08-22-2020, 16:01   #631 (permalink)
No Life Poster
 
kothamamun's Avatar
 
Join Date: Apr 2016
Location: B A N G L A D E S H
Posts: 3,189
Member: 2556542
Status: Offline
Thanks Meter: 1,790
Redmi note 4x mido mi acount remove done downgrade miui 11 to miui 10


Code:
Searching EDL Port..[COM57]
TPortConnection.Create...(COM57)..Opening...Ok
Getting device info.......
Serial No.: 0x5319770E
MSM ID    : 0x000460E1, MSM8953-Qualcomm Snapdragon 625
PBL Ver   : 00000000
PK HASH   : 57158EAF1814D78FD2B3105ECE4DB18A
            817A08AC664A5782A925F3FF8403D39A
 
Firehose Loader[Xiaomi_S2y2_noauth_8953_ddr.mbn]
Initializing SaharaBoot... Ok
Sending ...................Ok

Connecting to Firehose...
Ping... Ok 
Configuration......
Identifying Chip....Ok
Chip Configuration :
 MemoryName : eMMC
 MaxPayloadSizeToTargetInBytes : 1048576
 MaxPayloadSizeToTargetInBytesSupported : 1048576
 MaxPayloadSizeFromTargetInBytes : 4096
 MaxXMLSizeInBytes : 4096
 TargetName : 8953
 Version : 1

*** STORAGE DEVICE INFO ***
Memory Type         : eMMC
Block Size in Bytes : 512
Page Size           : 512
Manufacturer ID     : 144
Serial Number       : 413735051
Firmware Version    : 165
Product Name        : HBG4a2
Physical Partitions : 3
Total Logical Blocks:
          Drive [0]  61071360[29.121 GB]
          Drive [1]  8192[4 MB]
          Drive [2]  8192[4 MB]
Running : Ok
 
Reading GPT[3], Partitions(52 Items) Ok
Phone Information.....
  Model : Redmi Note 4
  Brand : xiaomi
  Android Ver : 7.0
  Miui Ver  : V10
  Manufacturer : Xiaomi
  Device : mido
  Mod_device : mido_global
  Board : msm8953
  Display ID : AL1512-mido-build-20181220030859
  Security Patch : 2018-10-01
  Platform : msm8953
  Kernel ID : 2018-10-01
  FRPPST : /dev/block/bootdevice/by-name/config
  Fingerprint : xiaomi/mido/mido:7.0/NRD90M/8.12.20:user/release-keys
  ro_product_hardware : 
  sys_hardware_version : 


----------------------------
Flashing Selected Partitions 
>modem(0)[NON-HLOS.bin] Ok
>sbl1(0)[sbl1.mbn] Ok
>sbl1bak(0)[sbl1.mbn] Ok
>rpm(0)[rpm.mbn] Ok
>rpmbak(0)[rpm.mbn] Ok
>tz(0)[tz.mbn] Ok
>tzbak(0)[tz.mbn] Ok
>devcfg(0)[devcfg.mbn] Ok
>devcfgbak(0)[devcfg.mbn] Ok
>dsp(0)[adspso.bin] Ok
>fsg(0)[fs_image.tar.gz.mbn.img] Skipped
>sec(0)[sec.dat] Skipped
>splash(0)[splash.img] Ok
>aboot(0)[emmc_appsboot.mbn] Ok
>abootbak(0)[emmc_appsboot.mbn] Ok
>boot(0)[boot.img] Ok
>recovery(0)[recovery.img] Ok
>system(0)[system.img] Ok
>cache(0)[cache.img] Ok
>persist(0)[persist.img] Skipped
>misc(0)[misc.img] Ok
>lksecapp(0)[lksecapp.mbn] Ok
>lksecappbak(0)[lksecapp.mbn] Ok
>cmnlib(0)[cmnlib.mbn] Ok
>cmnlibbak(0)[cmnlib.mbn] Ok
>cmnlib64(0)[cmnlib64.mbn] Ok
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 0
Set bootable storage drive 0 Ok
Rebooting Phone.... Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:25:55

 * patch0.xml
1 PatchXML Detected and Loaded 26 Items
  Reply With Quote
The Following 2 Users Say Thank You to kothamamun For This Useful Post:
Old 08-22-2020, 20:01   #632 (permalink)
Freak Poster
 
Join Date: Jul 2009
Location: paraguay
Posts: 260
Member: 1086987
Status: Offline
Sonork: 1617504
Thanks Meter: 109
redmi 7a mi account and frp done

Code:
Searching EDL Port..[COM5]
TPortConnection.Create...(COM5)..Opening...Ok
Getting device info.......
Serial No.: 0x52DD4825
MSM ID    : 0x000BF0E1, SDM439-Qualcomm Snapdragon 439
PBL Ver   : 00000001
PK HASH   : 57158EAF1814D78FD2B3105ECE4DB18A
            817A08AC664A5782A925F3FF8403D39A
 
Firehose Loader[Xiaomi_Redmi_8_Olive.mbn]
Initializing SaharaBoot... Ok
Sending .......................Ok

Connecting to Firehose...
Ping... Ok 
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[AjNyt1Y7YrAWKuuZ6agobNd1MnW]
Checking Internet connection....
 - Hydra Is Online
Connecting to Hydra Xiaomi Server...

Signature @256bytes Authentication.... Accepted......
Identifying Chip....Ok
Chip Configuration :
 MemoryName : eMMC
 MaxPayloadSizeToTargetInBytes : 1048576
 MaxPayloadSizeToTargetInBytesSupported : 1048576
 MaxPayloadSizeFromTargetInBytes : 4096
 MaxXMLSizeInBytes : 4096
 TargetName : 8937
 Version : 1

*** STORAGE DEVICE INFO ***
Memory Type         : eMMC
Block Size in Bytes : 512
Page Size           : 512
Manufacturer ID     : 144
Serial Number       : 985860121
Firmware Version    : 165
Product Name        : HAG4a2
Physical Partitions : 3
Total Logical Blocks:
          Drive [0]  30777344[14.676 GB]
          Drive [1]  8192[4 MB]
          Drive [2]  8192[4 MB]
Running : Ok
 
Reading GPT[3], Partitions(60 Items) Ok
Phone Information......
  Model : 
  Brand : 
  Android Ver : 10
  Miui Ver  : V11
  Manufacturer : Xiaomi
  Device : 
  Mod_device : pine_global
  Display ID : 
  Security Patch : 2020-07-01
  Kernel ID : 2020-07-01
  Fingerprint : 
  ro_product_hardware : 
  sys_hardware_version : 

Reading GPT[3], Partitions(60 Items) Ok
*** FRP Reset ***
Resetting FRP...
Auto 
Processing... 
Executing ...
  [Zero Wipe] Ok

Elapsed Time : 00:00:14


TPortConnection.Destroy.....Closing...Ok..

Code:
14:30:12 : PreOperation Configuration 
14:30:12 :  Brand : XIAOMI Model : Redmi 7A (pine) Storage : Auto
14:30:12 :  Loader: Xiaomi_Redmi_8_Olive.mbn
14:30:12 :  Port  : Auto
14:30:12 :  Connection  : Flash Mode
14:30:12 : 
14:30:12 : Searching EDL Port..[COM5]
14:30:23 : TPortConnection.Create...(COM5)..Opening...Ok
14:30:24 : Getting device info.......
14:30:27 : Serial No.: 0x52DD4825
14:30:27 : MSM ID    : 0x000BF0E1, SDM439-Qualcomm Snapdragon 439
14:30:27 : PBL Ver   : 00000001
14:30:27 : PK HASH   : 57158EAF1814D78FD2B3105ECE4DB18A
14:30:27 :             817A08AC664A5782A925F3FF8403D39A
14:30:27 :  
14:30:27 : Firehose Loader[Xiaomi_Redmi_8_Olive.mbn]
14:30:27 : Initializing SaharaBoot... Ok
14:30:27 : Sending .......................Ok
14:30:29 : 
14:30:30 : Connecting to Firehose...
14:30:31 : Ping... Ok 
14:30:31 : Configuration.
14:30:31 : Xiaomi Authentication needed...
14:30:33 : Signature Request -> bob[4UjvUmCk4u6OfBYYhflKk5xUTf6]
14:30:33 : Checking Internet connection....
14:30:33 :  - Hydra Is Online
14:30:34 : Connecting to Hydra Xiaomi Server...
14:30:35 : 
14:30:35 : Signature @256bytes Authentication.... Accepted......
14:30:37 : Identifying Chip....Ok
14:30:37 : Chip Configuration :
14:30:37 :  MemoryName : eMMC
14:30:37 :  MaxPayloadSizeToTargetInBytes : 1048576
14:30:37 :  MaxPayloadSizeToTargetInBytesSupported : 1048576
14:30:37 :  MaxPayloadSizeFromTargetInBytes : 4096
14:30:37 :  MaxXMLSizeInBytes : 4096
14:30:37 :  TargetName : 8937
14:30:37 :  Version : 1
14:30:37 : 
14:30:38 : *** STORAGE DEVICE INFO ***
14:30:38 : Memory Type         : eMMC
14:30:38 : Block Size in Bytes : 512
14:30:38 : Page Size           : 512
14:30:38 : Manufacturer ID     : 144
14:30:38 : Serial Number       : 985860121
14:30:38 : Firmware Version    : 165
14:30:38 : Product Name        : HAG4a2
14:30:38 : Physical Partitions : 3
14:30:38 : Total Logical Blocks:
14:30:38 :           Drive [0]  30777344[14.676 GB]
14:30:38 :           Drive [1]  8192[4 MB]
14:30:38 :           Drive [2]  8192[4 MB]
14:30:38 : Running : Ok
14:30:38 :  
14:30:38 : Reading GPT[3], Partitions(60 Items) Ok
14:30:38 : Phone Information......
14:30:38 :   Model : 
14:30:38 :   Brand : 
14:30:38 :   Android Ver : 10
14:30:38 :   Miui Ver  : V11
14:30:38 :   Manufacturer : Xiaomi
14:30:38 :   Device : 
14:30:38 :   Mod_device : pine_global
14:30:38 :   Display ID : 
14:30:38 :   Security Patch : 2020-07-01
14:30:38 :   Kernel ID : 2020-07-01
14:30:38 :   Fingerprint : 
14:30:38 :   ro_product_hardware : 
14:30:38 :   sys_hardware_version : 
14:30:38 : 
14:30:38 : Reading GPT[3], Partitions(60 Items) Ok
14:30:39 : Operation : MiAccount
14:30:39 : Remove MiAccount[Erase Method] 
14:30:39 : Processing... 
14:30:39 : Backing up Partition for safety...Ok
14:30:42 : 
14:30:42 : Scanning Patching address...
14:30:43 :   > Patching address detected [PATCHED]
14:30:43 :   > Patching address detected [PATCHED]
14:30:43 :   > Patching address detected [PATCHED]
14:30:43 :   > Patching address detected [PATCHED]
14:30:43 :   > Patching address detected [PATCHED]
14:30:43 :   > Patching address detected [PATCHED]
14:30:43 :   > Patching address detected [PATCHED]
14:30:43 :   > Patching address detected [PATCHED]
14:30:43 :   > Patching address detected [PATCHED]
14:30:43 :   > Patching address detected [PATCHED]
14:30:43 :   > Patching address detected [PATCHED]
14:30:43 :   > Patching address detected [PATCHED]
14:30:43 :   > Patching address detected [PATCHED]
14:30:43 :   > Patching address detected [PATCHED]
14:30:43 :   > Patching address detected [PATCHED]
14:30:43 :   > Patching address detected [PATCHED]
14:30:43 :   > Patching address detected [PATCHED]
14:30:43 :   > Patching address detected [PATCHED]
14:30:43 :   > Patching address detected [PATCHED]
14:30:43 :   > Patching address detected [PATCHED]
14:30:43 :   > Patching address detected [PATCHED]
14:30:43 :   > Patching address detected [PATCHED]
14:30:43 :   > Patching address detected [PATCHED]
14:30:44 :   > Patching address detected [PATCHED]
14:30:44 :   > Patching address detected [PATCHED]
14:30:44 :   > Patching address detected [PATCHED]
14:30:44 :   > Patching address detected [PATCHED]
14:30:44 :   > Patching address detected [PATCHED]
14:30:44 :   > Patching address detected [PATCHED]
14:30:44 :   > Patching address detected [PATCHED]
14:30:44 :   > Patching address detected [PATCHED]
14:30:44 :   > Patching address detected [PATCHED]
14:30:44 :   > Patching address detected [PATCHED]
14:30:44 :   > Patching address detected [PATCHED]
14:30:44 :   > Patching address detected [PATCHED]
14:30:44 :   > Patching address detected [PATCHED]
14:30:44 :   > Patching address detected [PATCHED]
14:30:44 :   > Patching address detected [PATCHED]Done!!
14:30:44 : Total Items patched : 38
14:30:44 : Successfully patched address..Ok
14:30:48 : 
14:30:48 : Elapsed Time : 00:00:25
  Reply With Quote
The Following 2 Users Say Thank You to miguelcpm22 For This Useful Post:
Old 08-22-2020, 20:05   #633 (permalink)
Freak Poster
 
Join Date: Jul 2009
Location: paraguay
Posts: 260
Member: 1086987
Status: Offline
Sonork: 1617504
Thanks Meter: 109
mi a2 bootloop fix and reset frp done

Code:
12:13:26 : Reading System Image Info ..........
12:13:26 : Model       	:	Mi A2
12:13:26 : Brand       	:	xiaomi
12:13:26 : Android Ver 	:	8.1.0
12:13:26 : Manufacturer	:	Xiaomi
12:13:26 : Device      	:	jasmine_sprout
12:13:26 : Display ID  	:	OPM1.171019.011.V9.6.17.0.ODIMIFE
12:13:26 : Security Patch  	:	2018-11-05
12:13:26 : Kernel ID    	:	2018-11-05
12:13:26 : 
12:13:26 : ****** CHECK IF MATCH WITH YOUR PHONE *********
12:13:26 : 
12:13:27 :  * patch0.xml
12:13:27 : 1 PatchXML Detected and Loaded 26 ItemsHydra Qualcomm  Tool  Ver 1.0.2 Build 5
12:13:48 : Windows 10 (Version 10.0, Build 19041, 64-bit Edition)
12:13:48 : Intel(R) Core(TM) i5-2500 CPU @ 3.30GHz
12:13:49 : NVIDIA GeForce GT 520
12:13:49 : Ram Installed : 4 GB
12:13:49 : Windows Access Right Admin
12:13:50 : ******* Dongle Info *******
12:13:50 : Version    : Hydra Tool v 1.2
12:13:50 : Serial     : 
12:13:51 : Initialize : OKAY
12:13:51 : Status     : Activated
12:13:51 : Life       : 0 [0-0-0-0-0]
12:13:51 : 
12:13:51 : Searching EDL Port..[COM5]
12:14:08 : TPortConnection.Create...(COM5)..Opening...Ok
12:14:10 : Getting device info.......
12:14:12 : Serial No.: 0x46396BB4
12:14:12 : MSM ID    : 0x0008C0E1, SDM660-Qualcomm Snapdragon 660
12:14:13 : PBL Ver   : 00000002
12:14:13 : PK HASH   : A7B8B82545A98ECA23D6E9105FB46456
12:14:13 :             8D1B5828264903441BDEF0CD57E3C370
12:14:13 :  
12:14:13 : Firehose Loader[prog_emmc_firehose_Sdm660_ddr.elf]
12:14:13 : Initializing SaharaBoot... Ok
12:14:13 : Sending .................................Ok
12:14:19 : 
12:14:19 : Connecting to Firehose...
12:14:20 : Ping...... Ok 
12:14:20 : Configuration.
12:14:20 : Xiaomi Authentication needed...
12:14:22 : Signature Request -> bob[ByxQx2r
12:14:22 : Checking Internet connection....
12:14:22 :  - Hydra Is Online
12:14:23 : Connecting to Hydra Xiaomi Server...
12:14:25 : 
12:14:25 : Signature @256bytes Authentication.... Accepted......................
12:14:27 : Identifying Chip....Ok
12:14:27 : Chip Configuration :
12:14:27 :  MemoryName : eMMC
12:14:27 :  MaxPayloadSizeToTargetInBytes : 8192
12:14:27 :  MaxPayloadSizeToTargetInBytesSupported : 8192
12:14:27 :  MaxPayloadSizeFromTargetInBytes : 4096
12:14:27 :  MaxXMLSizeInBytes : 4096
12:14:27 :  TargetName : MSM8996
12:14:27 :  Version : 1
12:14:27 :  DateTime : Aug 16 2019 - 17:22:13
12:14:27 : 
12:14:28 : *** STORAGE DEVICE INFO ***
12:14:28 : Memory Type         : eMMC
12:14:28 : Block Size in Bytes : 512
12:14:28 : Page Size           : 512
12:14:28 : Manufacturer ID     : 19
12:14:28 : Serial Number       : 139270123
12:14:28 : Firmware Version    : 4
12:14:28 : Product Name        : S0J9D8
12:14:28 : Physical Partitions : 4
12:14:28 : Total Logical Blocks:
12:14:28 :           Drive [0]  122142720[58.242 GB]
12:14:28 :           Drive [1]  8192[4 MB]
12:14:28 :           Drive [2]  8192[4 MB]
12:14:28 :           Drive [3]  8192[4 MB]
12:14:28 : Running : Ok
12:14:28 :  
12:14:28 : Reading GPT[4], Partitions(72 Items) Ok
12:14:28 : Phone Information......
12:14:29 :   Model : Mi A2
12:14:29 :   Brand : xiaomi
12:14:29 :   Android Ver : 8.1.0
12:14:29 :   Manufacturer : Xiaomi
12:14:29 :   Device : jasmine_sprout
12:14:29 :   Display ID : OPM1.171019.011.V9.6.9.0.ODIMIFE
12:14:29 :   Security Patch : 2018-06-05
12:14:29 :   Kernel ID : 2018-06-05
12:14:29 :   Fingerprint : xiaomi/jasmine/jasmine_sprout:8.1.0/OPM1.171019.011/V9.6.9.0.ODIMIFE:user/release-keys
12:14:29 :   ro_product_hardware : 
12:14:29 :   sys_hardware_version : 
12:14:29 : 
12:14:29 : 
12:14:29 : ----------------------------
12:14:29 : Flashing Selected Partitions 
12:14:29 : >storsec(0)[storsec.mbn] Ok
12:14:29 : >oops(0)[storsec.mbn] Ok
12:14:29 : >rpm_a(0)[rpm.img] Ok
12:14:30 : >rpm_b(0)[rpm.img] Ok
12:14:30 : >hyp_a(0)[hyp.img] Ok
12:14:30 : >hyp_b(0)[hyp.img] Ok
12:14:30 : >pmic_a(0)[pmic.img] Ok
12:14:30 : >pmic_b(0)[pmic.img] Ok
12:14:31 : >cmnlib_a(0)[cmnlib.img] Ok
12:14:31 : >cmnlib64_a(0)[cmnlib64.img] Ok
12:14:31 : >cmnlib_b(0)[cmnlib.img] Ok
12:14:31 : >cmnlib64_b(0)[cmnlib64.img] Ok
12:14:31 : >abl_a(0)[abl.elf] Ok
12:14:32 : >abl_b(0)[abl.elf] Ok
12:14:32 : >devcfg_a(0)[devcfg.img] Ok
12:14:32 : >devcfg_b(0)[devcfg.img] Ok
12:14:32 : >tz_a(0)[tz.img] Ok
12:14:33 : >tz_b(0)[tz.img] Ok
12:14:33 : >mdtpsecapp_a(0)[mdtpsecapp.img] Ok
12:14:34 : >mdtpsecapp_b(0)[mdtpsecapp.img] Ok
12:14:34 : >keymaster_a(0)[keymaster.img] Ok
12:14:34 : >keymaster_b(0)[keymaster.img] Ok
12:14:34 : >bluetooth_a(0)[bluetooth.img] Ok
12:14:35 : >xbl_a(0)[xbl.img] Ok
12:14:35 : >xbl_b(0)[xbl.img] Ok
12:14:38 : >misc(0)[misc.img] Ok
12:14:38 : >dsp_a(0)[dsp.img] Ok
12:14:42 : >dsp_b(0)[dsp.img] Ok
12:14:45 : >bluetooth_b(0)[bluetooth.img] Ok
12:14:45 : >mdtp_a(0)[mdtp.img] Ok
12:14:49 : >mdtp_b(0)[mdtp.img] Ok
12:14:52 : >splash(0)[splash.img] Ok
12:14:57 : >persist(0)[persist.img] Skipped
12:14:57 : >persistbak(0)[persist.img] Ok
12:14:58 : >modem_a(0)[modem.img] Ok
12:15:20 : >modem_b(0)[modem.img] Ok
12:15:41 : >boot_a(0)[boot.img] Ok
12:15:47 : >boot_b(0)[boot.img] Ok
12:15:53 : >system_a(0)[system.img] Ok
12:20:24 : >system_b(0)[system.img] Ok
12:24:57 : >vendor_a(0)[vendor.img] Ok
12:26:44 : >vendor_b(0)[vendor.img] Ok
12:28:28 : >userdata(0)[userdata.img] Ok
12:28:56 : >PrimaryGPT(0)[gpt_main0.bin] Ok
12:28:56 : 
12:28:56 : Flashing Patch Configuration.. 
12:28:56 : 0 [NUM_DISK_SECTORS-34.]   OK
12:28:57 : 0 [NUM_DISK_SECTORS-34.]   OK
12:28:57 : 0 [NUM_DISK_SECTORS-34.]   OK
12:28:57 : 0 [NUM_DISK_SECTORS-34.]   OK
12:28:57 : 0 [NUM_DISK_SECTORS-1.]   OK
12:28:57 : 0 [NUM_DISK_SECTORS-1.]   OK
12:28:57 : 0 [NUM_DISK_SECTORS-33.]   OK
12:28:58 : 0 [CRC32(2,9216)]   OK
12:28:58 : 0 [CRC32(NUM_DISK_SECTORS-33.,9216)]   OK
12:28:58 : 0 [0]   OK
12:28:58 : 0 [CRC32(1,92)]   OK
12:28:58 : 0 [0]   OK
12:28:58 : 0 [CRC32(NUM_DISK_SECTORS-1.,92)]   OK
12:28:59 : ----------------------------
12:28:59 : Done!
12:28:59 : Operation : Setbootablestoragedrive: Drive 0
12:28:59 : Set bootable storage drive 0 Ok
12:28:59 : Rebooting Phone.... Ok
12:28:59 : 
12:28:59 : TPortConnection.Destroy.....Closing...Ok..
12:28:59 : 
12:28:59 : Elapsed Time : 00:15:07
12:28:59 : Hydra Qualcomm  Tool  Ver 1.0.2 Build 5
12:38:03 : Windows 10 (Version 10.0, Build 19041, 64-bit Edition)
12:38:03 : Intel(R) Core(TM) i5-2500 CPU @ 3.30GHz
12:38:03 : NVIDIA GeForce GT 520
12:38:03 : Ram Installed : 4 GB
12:38:03 : Windows Access Right Admin
12:38:08 : ******* Dongle Info *******
12:38:08 : Version    : Hydra Tool v 1.2
12:38:08 : Serial     : 200300003526
12:38:09 : Initialize : OKAY
12:38:09 : Status     : Activated
12:38:09 : Life       : 0 [0-0-0-0-0]
12:38:09 : 
12:38:09 : PreOperation Configuration 
12:38:09 :  Brand : XIAOMI Model : Mi A2 (Jasmine) Storage : Auto
12:38:09 :  Loader: prog_emmc_firehose_Sdm660_ddr.elf
12:38:09 :  Port  : Auto
12:38:09 :  Connection  : Flash Mode
12:38:09 : 
12:38:09 : Searching EDL Port..[COM5]
12:38:13 : TPortConnection.Create...(COM5)..Opening...Ok
12:38:14 : Getting device info.......
12:38:17 : Serial No.: 0x46396BB4
12:38:17 : MSM ID    : 0x0008C0E1, SDM660-Qualcomm Snapdragon 660
12:38:17 : PBL Ver   : 00000002
12:38:17 : PK HASH   : A7B8B82545A98ECA23D6E9105FB46456
12:38:17 :             8D1B5828264903441BDEF0CD57E3C370
12:38:17 :  
12:38:17 : Firehose Loader[prog_emmc_firehose_Sdm660_ddr.elf]
12:38:17 : Initializing SaharaBoot... Ok
12:38:17 : Sending .................................Ok
12:38:23 : 
12:38:24 : Connecting to Firehose...
12:38:25 : Ping...... Ok 
12:38:25 : Configuration.
12:38:25 : Xiaomi Authentication needed...
12:38:28 : Signature Request -> bob[WTocxS
12:38:28 : Checking Internet connection....
12:38:28 :  - Hydra Is Online
12:38:28 : Connecting to Hydra Xiaomi Server...
12:38:30 : 
12:38:30 : Signature @256bytes Authentication.... Accepted......................
12:38:32 : Identifying Chip....Ok
12:38:32 : Chip Configuration :
12:38:32 :  MemoryName : eMMC
12:38:32 :  MaxPayloadSizeToTargetInBytes : 8192
12:38:32 :  MaxPayloadSizeToTargetInBytesSupported : 8192
12:38:32 :  MaxPayloadSizeFromTargetInBytes : 4096
12:38:32 :  MaxXMLSizeInBytes : 4096
12:38:32 :  TargetName : MSM8996
12:38:32 :  Version : 1
12:38:32 :  DateTime : Aug 16 2019 - 17:22:13
12:38:32 : 
12:38:33 : *** STORAGE DEVICE INFO ***
12:38:33 : Memory Type         : eMMC
12:38:33 : Block Size in Bytes : 512
12:38:33 : Page Size           : 512
12:38:33 : Manufacturer ID     : 19
12:38:33 : Serial Number       : 139270123
12:38:33 : Firmware Version    : 4
12:38:33 : Product Name        : S0J9D8
12:38:33 : Physical Partitions : 4
12:38:33 : Total Logical Blocks:
12:38:33 :           Drive [0]  122142720[58.242 GB]
12:38:33 :           Drive [1]  8192[4 MB]
12:38:33 :           Drive [2]  8192[4 MB]
12:38:33 :           Drive [3]  8192[4 MB]
12:38:33 : Running : Ok
12:38:33 :  
12:38:33 : Reading GPT[4], Partitions(72 Items) Ok
12:38:34 : Phone Information......
12:38:35 :   Model : Mi A2
12:38:35 :   Brand : xiaomi
12:38:35 :   Android Ver : 8.1.0
12:38:35 :   Manufacturer : Xiaomi
12:38:35 :   Device : jasmine_sprout
12:38:35 :   Display ID : OPM1.171019.011.V9.6.17.0.ODIMIFE
12:38:35 :   Security Patch : 2018-11-05
12:38:35 :   Kernel ID : 2018-11-05
12:38:35 :   Fingerprint : xiaomi/jasmine/jasmine_sprout:8.1.0/OPM1.171019.011/V9.6.17.0.ODIMIFE:user/release-keys
12:38:35 :   ro_product_hardware : 
12:38:35 :   sys_hardware_version : 
12:38:35 : 
12:38:35 : Reading GPT[4], Partitions(72 Items) Ok
12:38:35 : *** FRP Reset ***
12:38:35 : Resetting FRP...
12:38:35 : Auto 
12:38:35 : Processing... 
12:38:35 : Executing ...
12:38:35 :   [Zero Wipe] Ok
  Reply With Quote
The Following 2 Users Say Thank You to miguelcpm22 For This Useful Post:
Old 08-23-2020, 05:44   #634 (permalink)
No Life Poster
 
kothamamun's Avatar
 
Join Date: Apr 2016
Location: B A N G L A D E S H
Posts: 3,189
Member: 2556542
Status: Offline
Thanks Meter: 1,790
Symphony p7 frp

Code:
Brand : AUTO Model : AUTO Connection : Flash Mode

=====================================
How To Boot : Power off phone
 * BROM Mode : Press VOL +
 * Preloader Mode : Just Insert cable

Connection[WAITING]Found[PreLoader][COM8] Status[Opened]
Identifying Hardware ID
BROM CPUID     : 6580 (0000)MT6580[6580]
BROM HW_SW_VER : 8A00 CA00 0000 0000 
FUSEID : 00001002
FUSEID : 00000000
SECURE VERSION : FF 
BL VERSION : 01 
BR Secured : 00
Preparing Download Agent..
Download Agent : 6580.bin
MTK_DOWNLOAD_AGENT -HYDRA
MTK_AllInOne_DA_v3.3001.2018-09-18.13:22_452898
Initializing Loader [1]
Sending Loader [1] Accepted
PROTOCOL[OLD] - eMMC
PRMMCCID   : 150100513832334D420019B790989317
Running DA 4.2 on BBID : 0x9C
Init Configuration Ok
Initializing Loader [2]
Sending Loader [2] Accepted
Reading Flashchip data....
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB  : 0x0000000000400000 -4 MB
eMMC USER  : 0x00000003A3E00000 -14.561 GB
ERAM Size  : 0x0000000080000000 -2 GB
IRAM Size  : 0x0000000000020000 -128 KB
UNICAL RID : 58DC24368E6F7CA8560EC1182CE6ECA5
eMMC CID   : 510001154D333238B719004217939890
Change to HIGH SPEED...
Connection[WAITING]Found[COM37] Status[Opened]

Reading Partition Table
SIZE[0x00000738] 21 Items > Done

Reading System Info
  Model : Symphony P7
  Brand : Symphony
  Android Ver : 6.0
  Manufacturer : Symphony
  Device : P7
  Board : P7
  Display ID : P7_HW1_V10
  Security Patch : 2016-09-05
  Platform : mt6580
  Kernel ID : 2016-09-05
  FRPPST : /dev/block/platform/mtk-msdc.0/11120000.msdc0/by-name/frp
  Fingerprint : Symphony/P7/Symphony_P7:6.0/MRA58K/1472210484:user/release-keys
  ro_product_hardware : 
  sys_hardware_version : 

Autobackup Partitions
 -preloader[0x00000000] 512 KB -> preloader.bin...Ok
   -> Renaming Preloader....  preloader_m3679.bin
   Creating Scatter file... C:\Hydra Tool\\Backup\Auto\Symphony_Symphony P7_6580-mt6580-6.0(P7_HW1_V10)_220820030901\MT6580_Android_scatter.txt
 -nvram[0x00380000] 5 MB -> nvram.bin...Ok
 -nvdata[0x050A0000] 32 MB -> nvdata.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\Symphony_Symphony P7_6580-mt6580-6.0(P7_HW1_V10)_220820030901
MTK Phone Loader is NOW RUNNING.


Reading System Info
  Model : Symphony P7
  Brand : Symphony
  Android Ver : 6.0
  Manufacturer : Symphony
  Device : P7
  Board : P7
  Display ID : P7_HW1_V10
  Security Patch : 2016-09-05
  Platform : mt6580
  Kernel ID : 2016-09-05
  FRPPST : /dev/block/platform/mtk-msdc.0/11120000.msdc0/by-name/frp
  Fingerprint : Symphony/P7/Symphony_P7:6.0/MRA58K/1472210484:user/release-keys
  ro_product_hardware : 
  sys_hardware_version : 

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition... [Ok] Ok

Elapsed Time : 00:00:28
  Reply With Quote
The Following 2 Users Say Thank You to kothamamun For This Useful Post:
Old 08-25-2020, 10:33   #635 (permalink)
Product Manager
 
Hydra Tool's Avatar
 
Join Date: Aug 2018
Location: Ukraine / Harkov
Posts: 1,986
Member: 2857401
Status: Offline
Thanks Meter: 6,861
Xiaomi BlackShark SKR-A0 UFS Chip Unbrick Success

Xiaomi Black Shark SKR-A0 UFS Chip Unbrick Success

BlackShark SKR-A0 Downgrade Android 8.1.0 by Hydra Tool EDL Mode

  Reply With Quote
The Following 3 Users Say Thank You to Hydra Tool For This Useful Post:
Show/Hide list of the thanked
Old 08-27-2020, 06:53   #636 (permalink)
No Life Poster
 
canliyayin's Avatar
 
Join Date: Jul 2006
Location: TÜRKİYE
Posts: 1,252
Member: 311558
Status: Offline
Thanks Meter: 476
gigaset s100 frp lock done

gigaset s100 frp lock done
Attached Images
File Type: jpeg Screenshot_08-27-2020-084109.jpeg (176.9 KB, 14 views)
  Reply With Quote
The Following 2 Users Say Thank You to canliyayin For This Useful Post:
Old 08-28-2020, 17:35   #637 (permalink)
Freak Poster
 
mastersgsm's Avatar
 
Join Date: Dec 2010
Location: Uzbekistan/Jizzakh
Posts: 425
Member: 1470188
Status: Offline
Sonork: 100.1638921
Thanks Meter: 88
REDMI NOTE 7 MICRON EMMC FRP reset done thanks HYDRA team

Hydra Qualcomm Tool Ver 1.0.2 Build 10
Windows 7 Service Pack 1 (Version 6.1, Build 7601, 32-bit Edition)
Intel(R) Xeon(R) CPU X5460 @ 3.16GHz
NVIDIA GeForce GTX 760
Ram Installed : 3 GB
Windows Access Right Admin
Software Run As Admnistrator
******* Dongle Info *******
Version : Hydra Tool v 1.1
Serial : 190500000944
Initialize : OKAY
Status : Activated
Life : 2 [3-0-0-0-0]

PreOperation Configuration
Brand : XIAOMI Model : Redmi Note 7 (lavender) Micron Storage : Auto
Loader: Redmi_Note_7_lavender_Micron.elf
Port : Auto
Connection : Flash Mode

Searching EDL Port..[COM247]
TPortConnection.Create...(COM247)..Opening...Ok
Getting device info.......
Serial No.: 0x5422BC70
MSM ID : 0x0008C0E1, SDM660-Qualcomm Snapdragon 660
PBL Ver : 00000004
PK HASH : A7B8B82545A98ECA23D6E9105FB46456
8D1B5828264903441BDEF0CD57E3C370

Firehose Loader[Redmi_Note_7_lavender_Micron.elf]
Initializing SaharaBoot... Ok
Sending .................................Ok

Connecting to Firehose...
Ping...... Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[jujulxx-8XLfjTdhCnES2LWdYJh]
Checking Internet connection....
- Hydra Is Online
Connecting to Hydra Xiaomi Server...

Signature @256bytes Authentication.... Accepted......................
Identifying Chip....Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 8192
MaxPayloadSizeToTargetInBytesSupported : 8192
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : MSM8996
Version : 1
DateTime : Feb 10 2020 - 19:28:52

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 19
Serial Number : 267625408
Firmware Version : 4
Product Name : S0J9K8
Physical Partitions : 4
Total Logical Blocks:
Drive [0] 122142720[58,242 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Drive [3] 32768[16 MB]
Running : Ok

Reading GPT[4]
<?xml version="1.0" encoding="UTF-8" ?>
<data>
<response value="NAK" rawmode="false" />
</data>, Partitions(68 Items) Ok
Phone Information......
Model : Redmi Note 7
Brand : xiaomi
Android Ver : 9
Miui Ver : V10
Manufacturer : Xiaomi
Device : lavender
Mod_device : lavender_global
Display ID : PKQ1.180904.001
Security Patch : 2019-05-05
Kernel ID : 2019-05-05
Fingerprint : xiaomi/lavender/lavender:9/PKQ1.180904.001/V10.3.6.0.PFGMIXM:user/release-keys
ro_product_hardware :
sys_hardware_version :

Reading GPT[4]
<?xml version="1.0" encoding="UTF-8" ?>
<data>
<response value="NAK" rawmode="false" />
</data>, Partitions(68 Items) Ok
*** FRP Reset ***
Resetting FRP...
Auto
Processing...
Executing ...
[Zero Wipe] Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:17

  Reply With Quote
The Following 2 Users Say Thank You to mastersgsm For This Useful Post:
Old 08-29-2020, 13:08   #638 (permalink)
Freak Poster
 
prince2047's Avatar
 
Join Date: Dec 2009
Location: jind
Posts: 219
Member: 1181899
Status: Offline
Thanks Meter: 79
redmi 7a pine full flash problem solve the system has been dystroyed.

Hydra Qualcomm Tool Ver 1.0.2 Build 10
Windows 10 (Version 10.0, Build 18362, 64-bit Edition)
Intel(R) Core(TM) i7-6500U CPU @ 2.50GHz
Intel(R) HD Graphics 520
Ram Installed : 8 GB
Windows Access Right Admin
******* Dongle Info *******
Version : Hydra Tool v 1.2
Serial : 200
Initialize : OKAY
Status : Activated
Life : 0 [0-0-0-0-0]

Searching EDL Port..[COM77]
TPortConnection.Create...(COM77)..Opening...Ok
Getting device info.......
Serial No.: 0x86FE14FD
MSM ID : 0x000BF0E1, SDM439-Qualcomm Snapdragon 439
PBL Ver : 00000001
PK HASH : 57158EAF1814D78FD2B3105ECE4DB18A
817A08AC664A5782A925F3FF8403D39A

Firehose Loader[Xiaomi_Redmi_8_Olive.mbn]
Initializing SaharaBoot... Ok
Sending .......................Ok

Connecting to Firehose...
Ping... Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[Zl-0PTRVQS9gLqAWHQ6-ExMVxes]
Checking Internet connection....
- Hydra Is Online
Connecting to Hydra Xiaomi Server...

Signature @256bytes Authentication.... Accepted......
Identifying Chip....Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 2937262277
Firmware Version : 909127728
Product Name : hB8aP>
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 61071360[29.121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Running : Ok

Reading GPT[3], Partitions(60 Items) Ok
Phone Information......
Model :
Brand :
Android Ver : 10
Miui Ver : V11
Manufacturer : Xiaomi
Device :
Mod_device : pine_in_global
Display ID :
Security Patch : 2020-05-01
Kernel ID : 2020-05-01
Fingerprint :
ro_product_hardware :
sys_hardware_version :

Reading GPT[3], Partitions(60 Items) Ok

Backup Security partitions...
Reading Security Items....
> modemst1
> modemst2
> fsg
D:\HYDRA TOOL\HydraTool_Fullpackage_8-27-2020\Backup\Security_Backup\__10_Security_08292014 0440.sec
Backup Security Success....

----------------------------
Flashing Selected Partitions
>sec(0)[sec.dat] Skipped
>config(0)[config.bin] Skipped
>vbmeta(0)[vbmeta.img] Ok
>vbmetabak(0)[vbmeta.img] Ok
>devcfg(0)[devcfg.mbn] Ok
>devcfgbak(0)[devcfg.mbn] Ok
>apdp(0)[dummy.img] Ok
>msadp(0)[dummy.img] Ok
>sbl1(0)[sbl1.mbn] Ok
>sbl1bak(0)[sbl1.mbn] Ok
>rpm(0)[rpm.mbn] Ok
>rpmbak(0)[rpm.mbn] Ok
>cmnlib(0)[cmnlib_30.mbn] Ok
>cmnlibbak(0)[cmnlib_30.mbn] Ok
>cmnlib64(0)[cmnlib64_30.mbn] Ok
>cmnlib64bak(0)[cmnlib64_30.mbn] Ok
>keymaster(0)[km4.mbn] Ok
>keymasterbak(0)[km4.mbn] Ok
>misc(0)[misc.img] Ok
>aboot(0)[emmc_appsboot.mbn] Ok
>abootbak(0)[emmc_appsboot.mbn] Ok
>tz(0)[tz.mbn] Ok
>tzbak(0)[tz.mbn] Ok
>dtbo(0)[dtbo.img] Ok
>dtbobak(0)[dtbo.img] Ok
>splash(0)[splash.img] Ok
>dsp(0)[adspso.bin] Ok
>dspbak(0)[adspso.bin] Ok
>persist(0)[persist.img] Skipped
>mdtp(0)[mdtp.img] Ok
>mdtpbak(0)[mdtp.img] Ok
>boot(0)[boot.img] Ok
>recovery(0)[recovery.img] Ok
>cache(0)[cache.img] Ok
>modem(0)[NON-HLOS.bin] Ok
>system(0)[system.img] Ok
>vendor(0)[vendor.img] Ok
>cust(0)[cust.img] Ok
>userdata(0)[userdata.img] Ok
>PrimaryGPT(0)[gpt_main0.bin] Ok

Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-33.] OK
0 [CRC32(2,7680)] OK
0 [CRC32(NUM_DISK_SECTORS-33.,7680)] OK
0 [0] OK
0 [CRC32(1,92)] OK
0 [0] OK
0 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 0
Set bootable storage drive 0 Ok
Rebooting Phone.... Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:06:34
  Reply With Quote
The Following 2 Users Say Thank You to prince2047 For This Useful Post:
Old 08-29-2020, 14:00   #639 (permalink)
No Life Poster
 
kothamamun's Avatar
 
Join Date: Apr 2016
Location: B A N G L A D E S H
Posts: 3,189
Member: 2556542
Status: Offline
Thanks Meter: 1,790
oppo a57 password unlock done

Code:
PreOperation Configuration 
 Brand : AUTO Model : AUTO Storage : Auto
 Loader: Auto
 Port  : Auto
 Connection  : Flash Mode

Searching EDL Port..[COM57]
TPortConnection.Create...(COM57)..Opening...Ok
Getting device info.......
Serial No.: 0x63981E5F
MSM ID    : 0x0006B0E1, 
PBL Ver   : 00000000
PK HASH   : 77A22B92A1BCD0C4D3AAA10AA9F1B2C3
            6D51C0CA7429B5201D0FD1D5F5B53BBC
 
Firehose Loader[Oppo_A57_8940.mbn]
Initializing SaharaBoot... Ok
Sending ....................Ok

Connecting to Firehose...
Ping... Ok 
Configuration......
Identifying Chip....Ok
Chip Configuration :
 MemoryName : eMMC
 MaxPayloadSizeToTargetInBytes : 1048576
 MaxPayloadSizeToTargetInBytesSupported : 1048576
 MaxPayloadSizeFromTargetInBytes : 4096
 MaxXMLSizeInBytes : 4096
 TargetName : 8937
 Version : 1

*** STORAGE DEVICE INFO ***
Memory Type         : eMMC
Block Size in Bytes : 512
Page Size           : 512
Manufacturer ID     : 21
Serial Number       : 2277426271
Firmware Version    : 7
Product Name        : RX1BMB
Physical Partitions : 3
Total Logical Blocks:
          Drive [0]  61071360[29.121 GB]
          Drive [1]  8192[4 MB]
          Drive [2]  8192[4 MB]
Running : Ok
 
Reading GPT[3], Partitions(60 Items) Ok
Phone Information.....
  Model : CPH1701
  Brand : OPPO
  Android Ver : 6.0.1
  Manufacturer : OPPO
  Device : CPH1701
  Board : QC_Reference_Phone
  Display ID : CPH1701EX_11_A.11_170421
  Security Patch : 2017-03-05
  Platform : msm8937
  Kernel ID : 2017-03-05
  FRPPST : /dev/block/bootdevice/by-name/config
  Fingerprint : 
  ro_product_hardware : 
  sys_hardware_version : 

Reading GPT[3], Partitions(60 Items) Ok
Formatting Userdata...
Method : Auto
Processing... 
Executing ...
  [Safe method] Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:10
  Reply With Quote
The Following 2 Users Say Thank You to kothamamun For This Useful Post:
Old 08-30-2020, 10:39   #640 (permalink)
No Life Poster
 
kothamamun's Avatar
 
Join Date: Apr 2016
Location: B A N G L A D E S H
Posts: 3,189
Member: 2556542
Status: Offline
Thanks Meter: 1,790
redmi 5 rosy dead recover done

Code:
Searching EDL Port..[COM57]
TPortConnection.Create...(COM57)..Opening...Ok
Getting device info.......
Serial No.: 0xE83567A0
MSM ID    : 0x0009A0E1, SDM450-Qualcomm Snapdragon 450
PBL Ver   : 00000000
PK HASH   : 57158EAF1814D78FD2B3105ECE4DB18A
            817A08AC664A5782A925F3FF8403D39A
 
Firehose Loader[PROG_E~1.MBN]
Initializing SaharaBoot... Ok
Sending ...................Ok

Connecting to Firehose...
Ping... Ok 
Configuration......Ok
Chip Configuration :
 MemoryName : eMMC
 MaxPayloadSizeToTargetInBytes : 1048576
 MaxPayloadSizeToTargetInBytesSupported : 1048576
 MaxPayloadSizeFromTargetInBytes : 4096
 MaxXMLSizeInBytes : 4096
 TargetName : 8953
 Version : 1

*** STORAGE DEVICE INFO ***
Memory Type         : eMMC
Block Size in Bytes : 512
Page Size           : 512
Manufacturer ID     : 144
Serial Number       : 928726214
Firmware Version    : 165
Product Name        : HAG4a2
Physical Partitions : 3
Total Logical Blocks:
          Drive [0]  30777344[14.676 GB]
          Drive [1]  8192[4 MB]
          Drive [2]  8192[4 MB]
Running : Ok
 
Reading GPT[3], Partitions(52 Items) Ok
Phone Information.....
  Model : Redmi 5
  Brand : Xiaomi
  Android Ver : 8.1.0
  Miui Ver  : V11
  Manufacturer : Xiaomi
  Device : rosy
  Mod_device : rosy_global
  Board : msm8953
  Display ID : CUSTOMER_VERSION_rosy
  Security Patch : 2019-10-01
  Platform : msm8953
  Kernel ID : 2019-10-01
  FRPPST : /dev/block/bootdevice/by-name/config
  Fingerprint : Xiaomi/rosy/rosy:8.1.0/OPM1.171019.026/V11.0.1.0.ODAMIXM:user/release-keys
  ro_product_hardware : 
  sys_hardware_version : 

Reading GPT[3], Partitions(52 Items) Ok

Backup Security partitions...
Reading Security Items....
 > modemst1
 > modemst2
 > fsg
C:\Hydra Tool\Backup\Security_Backup\Redmi 5_msm8953_8.1.0_Security_082920050558.sec
Backup Security Success....

----------------------------
Flashing Selected Partitions 
>modem(0)[NON-HLOS.bin] Ok
>sbl1(0)[sbl1.mbn] Ok
>sbl1bak(0)[sbl1.mbn] Ok
>rpm(0)[rpm.mbn] Ok
>rpmbak(0)[rpm.mbn] Ok
>tz(0)[tz.mbn] Ok
>tzbak(0)[tz.mbn] Ok
>devcfg(0)[devcfg.mbn] Ok
>devcfgbak(0)[devcfg.mbn] Ok
>dsp(0)[adspso.bin] Ok
>splash(0)[splash.img] Ok
>boot(0)[boot.img] Ok
>recovery(0)[recovery.img] Ok
>system(0)[system.img] Ok
>cache(0)[cache.img] Ok
>persist(0)[persist.img] Skipped
>misc(0)[misc.img] Ok
>lksecapp(0)[lksecapp.mbn] Ok
>lksecappbak(0)[lksecapp.mbn] Ok
>cmnlib(0)[cmnlib_30.mbn] Ok
>cmnlibbak(0)[cmnlib_30.mbn] Ok
>keymaster(0)[keymaster.mbn] Ok
>keymasterbak(0)[keymaster.mbn] Ok
>cust(0)[cust.img] Ok
>userdata(0)[userdata.img] Ok
>PrimaryGPT(0)[gpt_main0.bin] Ok

Flashing Patch Configuration.. 
0 [NUM_DISK_SECTORS-34.]   OK
0 [NUM_DISK_SECTORS-34.]   OK
0 [NUM_DISK_SECTORS-34.]   OK
0 [NUM_DISK_SECTORS-34.]   OK
0 [NUM_DISK_SECTORS-1.]   OK
0 [NUM_DISK_SECTORS-1.]   OK
0 [NUM_DISK_SECTORS-33.]   OK
0 [CRC32(2,6656)]   OK
0 [CRC32(NUM_DISK_SECTORS-33.,6656)]   OK
0 [0]   OK
0 [CRC32(1,92)]   OK
0 [0]   OK
0 [CRC32(NUM_DISK_SECTORS-1.,92)]   OK
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 0
Set bootable storage drive 0 Ok
Rebooting Phone.... Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:32:35
  Reply With Quote
The Following 2 Users Say Thank You to kothamamun For This Useful Post:
Old 08-31-2020, 11:11   #641 (permalink)
No Life Poster
 
ceza031's Avatar
 
Join Date: Feb 2012
Age: 39
Posts: 1,395
Member: 1724862
Status: Offline
Thanks Meter: 448
Redmi Note 8 IMEI Repair Bootloader Locked, Without Root, Without Credit

Redmi Note 8 IMEI Repair Bootloader Locked, Without Root, Without Credit

Xiaomi Redmi Note 8 (ginkgo) Repair IMEI Without Root, Without Unlock BL, Without Credit, Without Auth by Hydra Tool steps.
  1. Flash ENG Firmware by EDL Mode with Hydra Dongle
  2. When you flash untick skip security partitions
  3. From RSA IMEI Tab repair imei



Quote:
Searching EDL Port..[COM39]
TPortConnection.Create...(COM39)..Opening...Ok
Getting device info.......
Serial No.: 0x9F91C3A1
MSM ID : 0x0010A0E1,
PBL Ver : 00000001
PK HASH : 1BEBE3863A6781DB4B01086063007334
DE9E5CA14971C7C4F4358EC9D79CDA46

Firehose Loader[Xiaomi_redminote8_loader.elf]
Initializing SaharaBoot... Ok
Sending ..............................Ok

Connecting to Firehose...
Ping..................... Ok
Configuration........
Identifying Chip....Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Jul 3 2019 - 22:23:56

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 19
Serial Number : 322970979
Firmware Version : 4
Product Name : S0J9K8
Physical Partitions : 4
Total Logical Blocks:
Drive [0] 122142720[58,242 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Drive [3] 32768[16 MB]
Running : Ok

Reading GPT[4]
<?xml version="1.0" encoding="UTF-8" ?>
<data>
<response value="NAK" rawmode="false" /></data>, Partitions(88 Items) Ok
Phone Information......
Model : Redmi Note 8
Brand : xiaomi
Android Ver : 9
Miui Ver : V11
Manufacturer : Xiaomi
Device : ginkgo
Mod_device : ginkgo_global
Display ID : PKQ1.190616.001
Security Patch : 2020-05-01
Kernel ID : 2020-05-01
Fingerprint : xiaomi/ginkgo/ginkgo:9/PKQ1.190616.001/V11.0.9.0.PCOMIXM:user/release-keys
ro_product_hardware :
sys_hardware_version :

Reading GPT[4]
<?xml version="1.0" encoding="UTF-8" ?>
<data>
<response value="NAK" rawmode="false" /></data>, Partitions(88 Items) Ok

Backup Security partitions...
Reading Security Items....
> modemst1
> modemst2
> fsg
C:\Hydra Tool\Backup\Security_Backup\Redmi Note 8__9_Security_083020145227.sec
Backup Security Success....

----------------------------
Flashing Selected Partitions
>secdata(0)[sec.elf] Ok
>qupfw(0)[qupv3fw.elf] Ok
>qupfwbak(0)[qupv3fw.elf] Ok
>vbmeta(0)[vbmeta.img] Ok
>vbmetabak(0)[vbmeta.img] Ok
>xbl_config(0)[xbl_config.elf] Ok
>xbl_configbak(0)[xbl_config.elf] Ok
>devcfg(0)[devcfg.mbn] Ok
>devcfgbak(0)[devcfg.mbn] Ok
>storsec(0)[storsec.mbn] Ok
>rpm(0)[rpm.mbn] Ok
>rpmbak(0)[rpm.mbn] Ok
>hyp(0)[hyp.mbn] Ok
>hypbak(0)[hyp.mbn] Ok
>keymaster(0)[km4.mbn] Ok
>keymasterbak(0)[km4.mbn] Ok
>cmnlib(0)[cmnlib.mbn] Ok
>cmnlib64(0)[cmnlib64.mbn] Ok
>cmnlibbak(0)[cmnlib.mbn] Ok
>cmnlib64bak(0)[cmnlib64.mbn] Ok
>abl(0)[abl.elf] Ok
>ablbak(0)[abl.elf] Ok
>bluetooth(0)[BTFM.bin] Ok
>bluetoothbak(0)[BTFM.bin] Ok
>misc(0)[misc.img] Ok
>imagefv(0)[imagefv.elf] Ok
>imagefvbak(0)[imagefv.elf] Ok
>uefisecapp(0)[uefi_sec.mbn] Ok
>uefisecappbak(0)[uefi_sec.mbn] Ok
>modemst1(0)[dummy.bin] Ok
>modemst2(0)[dummy.bin] Ok
>xbl(0)[xbl.elf] Ok
>xblbak(0)[xbl.elf] Ok
>tz(0)[tz.mbn] Ok
>tzbak(0)[tz.mbn] Ok
>devinfo(0)[devinfo.img] Ok
>logfs(0)[logfs_ufs_8mb.bin] Ok
>metadata(0)[metadata_1.img] Ok
>metadata(0)[metadata_2.img] Ok
>metadata(0)[metadata_3.img] Ok
>metadata(0)[metadata_4.img] Ok
>fsg(0)[fs_image.tar.gz.mbn.img] Ok
>dtbo(0)[dtbo.img] Ok
>dtbobak(0)[dtbo.img] Ok
>dsp(0)[dspso.bin] Ok
>dspbak(0)[dspso.bin] Ok
>persist(0)[persist.img] Ok
>persistbak(0)[persist.img] Ok
>boot(0)[boot.img] Ok
>bootbak(0)[boot.img] Ok
>recovery(0)[recovery.img] Ok
>modem(0)[NON-HLOS.bin] Ok
>modembak(0)[NON-HLOS.bin] Ok
>cache(0)[cache.img] Ok
>vendor(0)[vendor_1.img] Ok
>vendor(0)[vendor_2.img] Ok
>vendor(0)[vendor_3.img] Ok
>vendor(0)[vendor_4.img] Ok
>vendor(0)[vendor_5.img] Ok
>vendor(0)[vendor_6.img] Ok
>vendor(0)[vendor_7.img] Ok
>vendor(0)[vendor_8.img] Ok
>vendor(0)[vendor_9.img] Ok
>vendor(0)[vendor_10.img] Ok
>vendor(0)[vendor_11.img] Ok
>system(0)[system_1.img] Ok
>system(0)[system_2.img] Ok
>system(0)[system_3.img] Ok
>system(0)[system_4.img] Ok
>system(0)[system_5.img] Ok
>system(0)[system_6.img] Ok
>system(0)[system_7.img] Ok
>system(0)[system_8.img] Ok
>system(0)[system_9.img] Ok
>system(0)[system_10.img] Ok
>system(0)[system_11.img] Ok
>system(0)[system_12.img] Ok
>system(0)[system_13.img] Ok
>system(0)[system_14.img] Ok
>system(0)[system_15.img] Ok
>userdata(0)[userdata_1.img] Ok
>userdata(0)[userdata_2.img] Ok
>userdata(0)[userdata_3.img] Ok
>userdata(0)[userdata_4.img] Ok
>userdata(0)[userdata_5.img] Ok
>userdata(0)[userdata_6.img] Ok
>userdata(0)[userdata_7.img] Ok
>userdata(0)[userdata_8.img] Ok
>userdata(0)[userdata_9.img] Ok
>userdata(0)[userdata_10.img] Ok
>userdata(0)[userdata_11.img] Ok
>userdata(0)[userdata_12.img] Ok
>PrimaryGPT(0)[gpt_main0.bin] Ok

Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-33.] OK
0 [CRC32(2,11264)] OK
0 [CRC32(NUM_DISK_SECTORS-33.,11264)] OK
0 [0] OK
0 [CRC32(1,92)] OK
0 [0] OK
0 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 0
Set bootable storage drive 0 Ok
Rebooting Phone.... Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:19:09
  Reply With Quote
The Following 2 Users Say Thank You to ceza031 For This Useful Post:
Old 09-02-2020, 13:36   #642 (permalink)
No Life Poster
 
kothamamun's Avatar
 
Join Date: Apr 2016
Location: B A N G L A D E S H
Posts: 3,189
Member: 2556542
Status: Offline
Thanks Meter: 1,790
vivo y55 password and frp

Code:
PreOperation Configuration 
 Brand : VIVO Model : Y55 (1610) Storage : Auto
 Loader: vivo_2_6.mbn
 Port  : Auto
 Connection  : Flash Mode

Searching EDL Port..[COM57]
TPortConnection.Create...(COM57)..Opening...Ok
Getting device info.......
Serial No.: 0x2CA34AD6
MSM ID    : 0x000560E1, MSM8917-Qualcomm Snapdragon 425
PBL Ver   : 00000000
PK HASH   : 60BA997FEF6DA9F05885FA11F1DD6D2A
            90D052A257A09C2075D7246CC73C0D43
 
Firehose Loader[vivo_2_6.mbn]
Initializing SaharaBoot... Ok
Sending .................Ok

Connecting to Firehose...
Ping... Ok 
Configuration......
Identifying Chip....Ok
Chip Configuration :
 MemoryName : eMMC
 MaxPayloadSizeToTargetInBytes : 1048576
 MaxPayloadSizeToTargetInBytesSupported : 1048576
 MaxPayloadSizeFromTargetInBytes : 4096
 MaxXMLSizeInBytes : 4096
 TargetName : 8917
 Version : 1

*** STORAGE DEVICE INFO ***
Memory Type         : eMMC
Block Size in Bytes : 512
Page Size           : 512
Manufacturer ID     : 21
Serial Number       : 4071271085
Firmware Version    : 3
Product Name        : GE6BMB
Physical Partitions : 3
Total Logical Blocks:
          Drive [0]  30535680[14.561 GB]
          Drive [1]  8192[4 MB]
          Drive [2]  8192[4 MB]
Running : Ok
 
Reading GPT[3], Partitions(52 Items) Ok
Phone Information.....
  Model : vivo 1610
  Brand : vivo
  Android Ver : 6.0.1
  Manufacturer : vivo
  Device : PD1613BF_EX
  Board : QC_Reference_Phone
  Display ID : MMB29M release-keys
  Security Patch : 2017-04-01
  Platform : msm8937
  Kernel ID : 2017-04-01
  FRPPST : /dev/block/bootdevice/by-name/config
  Fingerprint : vivo/1610/1610:6.0.1/MMB29M/compiler05252021:user/release-keys
  ro_product_hardware : 
  sys_hardware_version : 

Reading GPT[3], Partitions(52 Items) Ok
Formatting Userdata...
Method : Auto
Processing... 
Executing ...
  [Safe method] Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:11

Code:
PreOperation Configuration 
 Brand : VIVO Model : Y55 (1610) Storage : Auto
 Loader: vivo_2_6.mbn
 Port  : Auto
 Connection  : Flash Mode

Searching EDL Port..[COM57]
TPortConnection.Create...(COM57)..Opening...Ok
Getting device info.......
Serial No.: 0x2CA34AD6
MSM ID    : 0x000560E1, MSM8917-Qualcomm Snapdragon 425
PBL Ver   : 00000000
PK HASH   : 60BA997FEF6DA9F05885FA11F1DD6D2A
            90D052A257A09C2075D7246CC73C0D43
 
Firehose Loader[vivo_2_6.mbn]
Initializing SaharaBoot... Ok
Sending .................Ok

Connecting to Firehose...
Ping... Ok 
Configuration......
Identifying Chip....Ok
Chip Configuration :
 MemoryName : eMMC
 MaxPayloadSizeToTargetInBytes : 1048576
 MaxPayloadSizeToTargetInBytesSupported : 1048576
 MaxPayloadSizeFromTargetInBytes : 4096
 MaxXMLSizeInBytes : 4096
 TargetName : 8917
 Version : 1

*** STORAGE DEVICE INFO ***
Memory Type         : eMMC
Block Size in Bytes : 512
Page Size           : 512
Manufacturer ID     : 21
Serial Number       : 4071271085
Firmware Version    : 3
Product Name        : GE6BMB
Physical Partitions : 3
Total Logical Blocks:
          Drive [0]  30535680[14.561 GB]
          Drive [1]  8192[4 MB]
          Drive [2]  8192[4 MB]
Running : Ok
 
Reading GPT[3], Partitions(52 Items) Ok
Phone Information.....
  Model : vivo 1610
  Brand : vivo
  Android Ver : 6.0.1
  Manufacturer : vivo
  Device : PD1613BF_EX
  Board : QC_Reference_Phone
  Display ID : MMB29M release-keys
  Security Patch : 2017-04-01
  Platform : msm8937
  Kernel ID : 2017-04-01
  FRPPST : /dev/block/bootdevice/by-name/config
  Fingerprint : vivo/1610/1610:6.0.1/MMB29M/compiler05252021:user/release-keys
  ro_product_hardware : 
  sys_hardware_version : 

Reading GPT[3], Partitions(52 Items) Ok
*** FRP Reset ***
Resetting FRP...
Auto 
Processing... 
Executing ...
  [Zero Wipe] Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:12
  Reply With Quote
The Following 2 Users Say Thank You to kothamamun For This Useful Post:
Old 09-08-2020, 10:56   #643 (permalink)
Freak Poster
 
Join Date: Apr 2011
Location: Armenia Yerevan
Posts: 134
Member: 1559514
Status: Offline
Thanks Meter: 49
Thumbs up xiaomi redmi note 4 nikel mtk disable screenlock is done by Hydra mtk tool

disable pattern screenlock is done by Hydra mtk tool

https://ibb.co/pL2zSfH

Last edited by Varazdat; 09-08-2020 at 11:04.
  Reply With Quote
The Following 2 Users Say Thank You to Varazdat For This Useful Post:
Old 09-08-2020, 11:09   #644 (permalink)
Freak Poster
 
Join Date: Apr 2011
Location: Armenia Yerevan
Posts: 134
Member: 1559514
Status: Offline
Thanks Meter: 49
without data lost

Quote:
Originally Posted by Varazdat View Post
disable pattern screenlock is done by Hydra mtk tool

https://ibb.co/pL2zSfH

without data lost- is good job
  Reply With Quote
The Following User Says Thank You to Varazdat For This Useful Post:
Old 09-09-2020, 13:42   #645 (permalink)
No Life Poster
 
kothamamun's Avatar
 
Join Date: Apr 2016
Location: B A N G L A D E S H
Posts: 3,189
Member: 2556542
Status: Offline
Thanks Meter: 1,790
oppo a37f password unlock

Code:
PreOperation Configuration 
 Brand : OPPO Model : A37FW Storage : Auto
 Loader: 8916.mbn
 Port  : Auto
 Connection  : Flash Mode

Searching EDL Port..[COM57]
TPortConnection.Create...(COM57)..Opening...Ok
Getting device info.......
Serial No.: 0x2686FB51
MSM ID    : 0x007050E1, MSM8916-Qualcomm Snapdragon 410 
PBL Ver   : 00000000
PK HASH   : CC3153A80293939B90D02D3BF8B23E02
            92E452FEF662C74998421ADAD42A380F
 
Firehose Loader[8916.mbn]
Initializing SaharaBoot... Ok
Sending .....Ok

Connecting to Firehose...
Ping... Ok 
Configuration......
Identifying Chip....Ok
Chip Configuration :
 MemoryName : eMMC
 MaxPayloadSizeToTargetInBytes : 16384
 MaxPayloadSizeToTargetInBytesSupported : 16384
 MaxPayloadSizeFromTargetInBytes : 4096
 MaxXMLSizeInBytes : 4096
 TargetName : 8916
 Version : 1

Running : Ok
 
Reading GPT[3], Partitions(44 Items) Ok
Phone Information.....
  Vendor : OPPO
  Model : A37f
  Android Ver : 5.1.1
  Board : msm8916
  Display ID : A37fEX_11_190711
  Security Patch : 2018-03-01
  Platform : msm8916
  Kernel ID : 2018-03-01
  FRPPST : /dev/block/bootdevice/by-name/config

Reading GPT[3], Partitions(44 Items) Ok
Formatting Userdata...
Method : Auto
Processing... 
Executing ...
  [Safe method] Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:10
  Reply With Quote
The Following User Says Thank You to kothamamun For This Useful Post:
Reply

Bookmarks


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


 



All times are GMT +1. The time now is 22:20.



Powered by Searchlight © 2024 Axivo Inc.
vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2024 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2023 -
Page generated in 0.51096 seconds with 9 queries

SEO by vBSEO