GSM Shop GSM Shop
GSM-Forum  

Welcome to the GSM-Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features.
Only registered members may post questions, contact other members or search our database of over 8 million posts.

Registration is fast, simple and absolutely free so please - Click to REGISTER!

If you have any problems with the registration process or your account login, please contact contact us .

Go Back   GSM-Forum > Product Support Sections > Special Solutions / Services / WebShop > GSMFABRICA Products > HYDRA TOOL

Reply
 
LinkBack Thread Tools Display Modes
Old 12-11-2020, 14:20   #721 (permalink)
No Life Poster
 
ceza031's Avatar
 
Join Date: Feb 2012
Age: 39
Posts: 1,395
Member: 1724862
Status: Offline
Thanks Meter: 450
Symphony V140 FRP Reset Success by Hydra Tool


Symphony V140 FRP Reset Success by Hydra Tool

  Reply With Quote
The Following 2 Users Say Thank You to ceza031 For This Useful Post:
Old 12-11-2020, 14:32   #722 (permalink)
No Life Poster
 
ceza031's Avatar
 
Join Date: Feb 2012
Age: 39
Posts: 1,395
Member: 1724862
Status: Offline
Thanks Meter: 450
Xiaomi Redmi Note 8 (ginkgo) Mi Acc Removed by Hydra Dongle

Xiaomi Redmi Note 8 (ginkgo) Mi Acc Removed by Hydra Dongle
  1. Go to Qualcomm Module
  2. Select brand and model
  3. Connect your device edl mode by testpoint
  4. go to Xiaomi tab, select remove mi account
  5. click execute and wait for a task completed



Quote:
PreOperation Configuration
Brand : XIAOMI Model : Redmi Note 8 (ginkgo) Storage : Auto
Loader: Xiaomi_redminote8_loader.elf
Port : Auto
Connection : Flash Mode

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM7)
SymbolicName :\??\USB#VID_05C6&PID_9008#6&1e3ed538&0&3#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/02/2017,2.1.2.7

Getting device info......
Serial No.: 0x68A6BFCA
MSM ID : 0x0010A0E1, SM6125-Qualcomm Snapdragon 665
PBL Ver : 00000000
PK HASH : 1BEBE3863A6781DB4B01086063007334
DE9E5CA14971C7C4F4358EC9D79CDA46

Firehose Loader[Xiaomi_redminote8_loader.elf]
SaharaBoot... Ok
Sending ..............................Ok
Connecting to Firehose...
Ping..................... Ok
Configuration.........
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Jul 3 2019 - 22:23:56

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 19
Serial Number : 416877119
Firmware Version : 4
Product Name : S0J9K8
Physical Partitions : 4
Total Logical Blocks:
Drive [0] 122142720[58,242 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Drive [3] 32768[16 MB]

Protocol : Universal
Running : Ok
Reading GPT[4]
Drive [0] 88 Items
Drive [1] 0 Items
Drive [2] 0 Items
Drive [3]


Phone Information......
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi Note 8
ID : PKQ1.190616.001
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : ginkgo-user 9 PKQ1.190616.001 V11.0.7.0.PCOIDXM release-keys
Miui Ver : V11
Device : ginkgo
Mod_device : ginkgo_id_global
Display ID : PKQ1.190616.001
Security Patch : 2020-09-01
Fingerprint : xiaomi/ginkgo/ginkgo:9/PKQ1.190616.001/V11.0.7.0.PCOIDXM:user/release-keys

Processing Remove MiAccount[Patch Method]....
Backing up Partition for safety...Ok

Scanning Patching address...
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]Done!!
Total Items patched : 26
Successfully patched address..
Action Result : Ok

Elapsed Time : 00:01:48
  Reply With Quote
The Following 2 Users Say Thank You to ceza031 For This Useful Post:
Old 12-11-2020, 14:34   #723 (permalink)
No Life Poster
 
ceza031's Avatar
 
Join Date: Feb 2012
Age: 39
Posts: 1,395
Member: 1724862
Status: Offline
Thanks Meter: 450
Redmi Note 7 Pro (violet) Android 10 FRP Reset by Hydra Dongle

Redmi Note 7 Pro (violet) Android 10 FRP Reset by Hydra Dongle



Quote:
PreOperation Configuration
Brand : XIAOMI Model : Redmi Note 7 Pro (violet) Storage : Auto
Loader: Xiaomi_Redmi Note 7 Pro_Sdm6150_ddr.elf
Port : Auto
Connection : Flash Mode

Searching EDL Port..[COM8]
TPortConnection.Create...(COM8)..Opening...Ok
Getting device info.......
Serial No.: 0x801AA83C
MSM ID : 0x000950E1, SM6150-Qualcomm Snapdragon 675
PBL Ver : 00000001
PK HASH : 1BEBE3863A6781DB4B01086063007334
DE9E5CA14971C7C4F4358EC9D79CDA46

Firehose Loader[Xiaomi_Redmi Note 7 Pro_Sdm6150_ddr.elf]
SaharaBoot... Ok
Sending ...................................Ok
Connecting to Firehose...
Ping..................... Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[cg-6OaQ9RiA44jEKP9HKs0yYp03]
Checking Internet connection....
- Hydra Is Online
Connecting to Hydra Xiaomi Server...

Signature @256bytes Authentication.... Accepted........
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Jul 19 2019 - 01:12:10

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 2050475080
Firmware Version : 2
Product Name : DH6DAB
Physical Partitions : 4
Total Logical Blocks:
Drive [0] 122142720[58.242 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Drive [3] 32768[16 MB]

Protocol : Universal
Running : Ok

Reading GPT[4], Partitions(88 Items) Ok
Phone Information......
Vendor : Xiaomi
ID : QKQ1.190915.002
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Miui Ver : V12
Mod_device : violet_in_global
Security Patch : 2020-08-01

Reading GPT[4], Partitions(88 Items) Ok
*** FRP Reset ***
Resetting FRP...
Auto
Processing...
Executing ...
[Zero Wipe] Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:22
  Reply With Quote
The Following 2 Users Say Thank You to ceza031 For This Useful Post:
Old 12-11-2020, 14:51   #724 (permalink)
No Life Poster
 
ceza031's Avatar
 
Join Date: Feb 2012
Age: 39
Posts: 1,395
Member: 1724862
Status: Offline
Thanks Meter: 450
Redmi 8 (olive) Mi Account Remove Done by Hydra Dongle

Xiaomi Redmi 8 (olive) Mi Account Remove Done by Hydra Dongle

find my device off so no relocked after wifi or mobile net connection



Quote:
PreOperation Configuration
Brand : XIAOMI Model : Redmi 8 (olive) Storage : Auto
Loader: Xiaomi_Redmi_8_Olive.mbn
Port : Auto
Connection : Flash Mode

Searching EDL Port..[COM26]
TPortConnection.Create...(COM26)..Opening...Ok
Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[UgKN
Checking Internet connection....
- Hydra Is Online
Connecting to Hydra Xiaomi Server...

Signature @256bytes Authentication.... Accepted......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 2906249733
Firmware Version : 162
Product Name : HCG8a4
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 122142720[58,242 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok

Reading GPT[3], Partitions(64 Items) Ok
Phone Information......
Vendor : Xiaomi
ID : QKQ1.191014.001
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Miui Ver : V11
Mod_device : olive_global
Security Patch : 2020-09-01
Emmc_size : 16GB

Reading GPT[3], Partitions(64 Items) Ok
Operation : MiAccount
Remove MiAccount[Erase Method]
Processing...
Backing up Partition for safety...Ok

Scanning Patching address...
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]Done!!
Total Items patched : 7
Successfully patched address..Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:45
  Reply With Quote
The Following 2 Users Say Thank You to ceza031 For This Useful Post:
Old 12-11-2020, 15:06   #725 (permalink)
No Life Poster
 
ceza031's Avatar
 
Join Date: Feb 2012
Age: 39
Posts: 1,395
Member: 1724862
Status: Offline
Thanks Meter: 450
Huawei MED-LX9 Y6P 2020 Huawei ID Remove by Hydra Dongle

Huawei MED-LX9 Y6P 2020 Huawei ID Remove by Hydra Dongle

Run mtk module, select huawei, remove account, connect testpoint



Huawei ID Remove Log :

Quote:
Brand : HUAWEI Model : MED-LX9 (Y6P 2020) Connection : Flash Mode

=====================================
Connection
-Please wait...
-Connect Phone...
-Found...[COM51]

TPortConnection.Create...(COM51)..Opening...Ok

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0766 (0000)MT6765[6765]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
SECURE VERSION : 05
BL VERSION : FE
BR Secured : E5[SBC+SDA+SEL]

Security Authorization....
Sending[Huawei_Y6P_auth_sv5.auth] Accepted

Preparing Download Agent..
DA : MT6765_Huawei_MED.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2018/10/18.17:38_452898
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_k62v1_64_mexico.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : D57DCC00DEB016AA21A3516481680408
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 90014A68433961503301C3366DA13791 - hC9aP3

DA Speed : high-speed
DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_k62v1_64_mex_a32.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\__0766--__071220123012\MT6765_Android_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x00108000]1024 KB ->frp.bin...Ok
-nvdata[0x00A08000]16 MB ->nvdata.bin...Ok
-persist[0x03800000]8 MB ->persist.bin...Ok
-nvram[0x04400000]5 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\__0766--__071220123012
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : D57DCC00DEB016AA21A3516481680408
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 90014A68433961503301C3366DA13791 - hC9aP3

Reading GPT-EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Remove Account
Processing...
Backing up Partition for safety...
-oeminfo_120720123016.bin[0x04900000]32 MB ->oeminfo_120720123016.bin...Ok Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:21

Restore OEM INFO :

Quote:
Brand : HUAWEI Model : MED-LX9 (Y6P 2020) Connection : Flash Mode

=====================================
Connection
-Please wait...
-Connect Phone...
-Found...[COM16]

TPortConnection.Create...(COM16)..Opening...Ok

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0766 (0000)MT6765[6765]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
SECURE VERSION : 05
BL VERSION : FE
BR Secured : E5[SBC+SDA+SEL]

Security Authorization....
Sending[Huawei_Y6P_auth_sv5.auth] Accepted

Preparing Download Agent..
DA : MT6765_Huawei_MED.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2018/10/18.17:38_452898
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_k62v1_64_mexico.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 6BC372AD71233B5C850AE3AFC5A6F053
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 150100525036344D420178BBD4333719 - RP64MB

DA Speed : high-speed
DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_k62v1_64_mex_a32.bin
Creating Scatter file... C:\HYDRATOOL\\Backup\Auto\__0766--__071220182927\MT6765_Android_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x00108000]1024 KB ->frp.bin...Ok
-nvdata[0x00A08000]16 MB ->nvdata.bin...Ok
-persist[0x03800000]8 MB ->persist.bin...Ok
-nvram[0x04400000]5 MB ->nvram.bin...Ok
Done!!!
C:\HYDRATOOL\\Backup\Auto\__0766--__071220182927
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 6BC372AD71233B5C850AE3AFC5A6F053
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 150100525036344D420178BBD4333719 - RP64MB

Reading GPT-EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Restore OEM Info
Processing... Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:41
  Reply With Quote
The Following 2 Users Say Thank You to ceza031 For This Useful Post:
Old 12-11-2020, 15:09   #726 (permalink)
No Life Poster
 
ceza031's Avatar
 
Join Date: Feb 2012
Age: 39
Posts: 1,395
Member: 1724862
Status: Offline
Thanks Meter: 450
Vivo V15 Pro PD1832F Pattern/Password Done

Vivo V15 Pro PD1832F Pattern/Password Done

Remove Pin/Password and FRP by Hydra Testpoint.



Quote:
PreOperation Configuration
Brand : VIVO Model : V15 Pro (PD1832F) Storage : Auto
Loader: Vivo_V17_Pro_SDM675.elf
Port : Auto
Connection : Flash Mode

Searching EDL Port..[COM422]
TPortConnection.Create...(COM422)..Opening...Ok
Getting device info.......
Serial No.: 0xF4F6F6DE
MSM ID : 0x000950E1, SM6150-Qualcomm Snapdragon 675
PBL Ver : 00000000
PK HASH : A7DF36FFD7AB557C67A6C26675E2795C
922CF671308CFD7169BEDB84424C862B

Firehose Loader[Vivo_V17_Pro_SDM675.elf]
SaharaBoot... Ok
Sending .................................Ok
Connecting to Firehose...
Ping..................... Ok
Configuration........
Identifying Chip........UFS Ok
Chip Configuration :
MemoryName : UFS
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Jul 2 2020 - 22:00:29

*** STORAGE DEVICE INFO ***
Memory Type : UFS
Block Size in Bytes : 4096
Page Size : 4096
Manufacturer ID : 462
Serial Number : 1297306958
Firmware Version : 800
Product Name : KM8V7001JM-B810
Physical Partitions : 6
Total Logical Blocks:
Drive [0] 30947328[118.055 GB]
Drive [1] 2048[8 MB]
Drive [2] 2048[8 MB]
Drive [3] 8192[32 MB]
Drive [4] 262144[1024 MB]
Drive [5] 16384[64 MB]

Protocol : Universal

Running : Ok

Reading GPT[6], Partitions(224 Items) Ok
Phone Information......
Brand : vivo
Vendor : vivo
Model : vivo 1818
ID : PKQ1.190302.001
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : sm6150-user 9 PKQ1.190302.001 compiler12161826 release-keys
Device : PD1832F_EX
Display ID : PKQ1.190302.001 release-keys
Security Patch : 2019-11-01
Platform : =SM6150
Fingerprint : vivo/1818/1818:9/PKQ1.190302.001/compiler12161810:user/release-keys

Reading GPT[6], Partitions(224 Items) Ok
*** Ultra Power Option ***
Rebuild UserData
Processing...
[Zero Wipe]
[Rebuild UserData] Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:13
  Reply With Quote
The Following 2 Users Say Thank You to ceza031 For This Useful Post:
Old 12-12-2020, 08:40   #727 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,624
Vivo Y11 (1906) user data removed (Formated) by Hydra Tool with Test Point support!

Vivo Y11 (1906) user data removed (Formated) by Hydra Tool with Test Point support!




Test Point of Vivo Y11 (1906)






Success Report:







Success Logs :

Quote:
PreOperation Configuration
Brand : VIVO Model : Y11 (1906) Storage : Auto
Loader: Vivo_Y95_8937.mbn
Port : Auto
Connection : Flash Mode

Searching EDL Port..[COM12]
TPortConnection.Create...(COM12)..Opening...Ok
Getting device info.......
Serial No.: 0xC5123C1E
MSM ID : 0x000BF0E1, SDM439-Qualcomm Snapdragon 439
PBL Ver : 00000000
PK HASH : 60BA997FEF6DA9F05885FA11F1DD6D2A
90D052A257A09C2075D7246CC73C0D43

Firehose Loader[Vivo_Y95_8937.mbn]
Initializing SaharaBoot... Ok
Sending ...................Ok

Connecting to Firehose...
Ping... Ok
Configuration......
Identifying Chip....Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 488376259
Firmware Version : 8
Product Name : GD6BMB
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 61071360[29.121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Running : Ok

Reading GPT[3], Partitions(60 Items) Ok
Phone Information......
Vendor : vivo
Model : vivo 1906
Android Ver : 9
Device : PD1930F_EX
Display ID : PKQ1.190616.001 release-keys
Security Patch : 2020-10-01
Platform : =SDM439
Kernel ID : 2020-10-01
Fingerprint : vivo/1906/1906:9/PKQ1.190616.001/compiler10221504:user/release-keys

Reading GPT[3], Partitions(60 Items) Ok
*** Ultra Power Option ***
Vivo ForcedErase Userdata
Processing...
[Vivo ForcedErase]
[Vivo ForcedErase Userdata] Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:14



BR
Dipendra Pathak
  Reply With Quote
The Following 3 Users Say Thank You to Dipendra Pathak For This Useful Post:
Show/Hide list of the thanked
Old 12-12-2020, 09:14   #728 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,624
Cherry Mobile Flare HD3 FRP & Format Done by Hydra Tool With Normal USB Cable

Cherry Mobile Flare HD3 FRP & Format Done by Hydra Tool With Normal USB Cable




Success Report :








Success Log :


Quote:
Brand : AUTO Model : AUTO Connection : Flash Mode

=====================================
Connection
-Please wait...
-Found...[COM10]

TPortConnection.Create...(COM10)..Opening...Ok


Reading System Info
Brand : CherryMobile
Vendor : CherryMobile
Model : Flare HD 3
ID : NRD90M
SDK : 24
Release : 7.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-US
Description : full_esky6580_we_n-user 7.0 NRD90M 1492108816 release-keys
Device : Flare_HD_3
Board : MT6580A
Display ID : Cherry_H1020_PH_FlareHD3_05242017_V2.4
Security Patch : 2017-05-05
Platform : mt6580
FRPPST : /dev/block/platform/mtk-msdc.0/11120000.msdc0/by-name/frp
Fingerprint : CherryMobile/Flare_HD_3/Flare_HD_3:7.0/NRD90M/1492108816:user/release-keys
StorageType : mtp
Userdata State : Not Encrypted

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition... [Ok]
Formatting Userdata... Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:03






BR

Dipendra Pathak
  Reply With Quote
The Following 2 Users Say Thank You to Dipendra Pathak For This Useful Post:
Old 12-13-2020, 09:22   #729 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,624
Xiomi Redmi Note 7S Factory Reset (User Data) Done With King Hydra Tool

Xiomi Redmi Note 7S Factory Reset (User Data) Done With King Hydra Tool



Screen Short :








Format Log :

Quote:
PreOperation Configuration
Brand : XIAOMI Model : Redmi Note 7S Storage : Auto
Loader: mi_2_9.elf
Port : Auto
Connection : Flash Mode

Searching EDL Port..[COM9]
TPortConnection.Create...(COM9)..Opening...Ok
Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping...... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 8192
MaxPayloadSizeToTargetInBytesSupported : 8192
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : MSM8996
Version : 1
DateTime : Aug 2 2018 - 22:27:53

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 19
Serial Number : 265636900
Firmware Version : 4
Product Name : S0J9K8
Physical Partitions : 4
Total Logical Blocks:
Drive [0] 122142720[58.242 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Drive [3] 32768[16 MB]

Protocol : Universal
Running : Ok

Reading GPT[4], Partitions(68 Items) Ok
Phone Information......
Vendor : Xiaomi
ID : QKQ1.190910.002
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Miui Ver : V11
Mod_device : lavender_in_global
Display ID : QKQ1.190910.002 V11.0.5.0.QFGINXM
Security Patch : 2020-09-05

Reading GPT[4], Partitions(68 Items) Ok
Formatting Userdata...
Method : Auto
Processing...
Executing ...
[Safe method] Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:03





BR
Dipendra Pathak
  Reply With Quote
The Following 2 Users Say Thank You to Dipendra Pathak For This Useful Post:
Old 12-13-2020, 09:54   #730 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,624
Lenovo L58041 (S5 Pro) FRP Removed with King Hydra Tool

Lenovo L58041 (S5 Pro) FRP Removed with King Hydra Tool




Operation of Logs :

Quote:
PreOperation Configuration
Brand : LENOVO Model : L58041 (S5 Pro) Storage : Auto
Loader: LV_2_8.elf
Port : Auto
Connection : Flash Mode

Searching EDL Port..[COM13]
TPortConnection.Create...(COM13)..Opening...Ok
Getting device info.......
Serial No.: 0xB46318E3
MSM ID : 0x000CC0E1,
PBL Ver : 00000000
PK HASH : 0374637D23C4E2EEDE23DA5D60C1E7AB
CD81CCC4CD641045F859B317650F47DF

Firehose Loader[LV_2_8.elf]
SaharaBoot... Ok
Sending ...............................Ok
Connecting to Firehose...
Ping...... Ok
Configuration......
Identifying Chip....Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 8192
MaxPayloadSizeToTargetInBytesSupported : 8192
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : MSM8996
Version : 1
DateTime : Nov 21 2018 - 13:57:02

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 4004433019
Firmware Version : 2
Product Name : 3H6CAB
Physical Partitions : 4
Total Logical Blocks:
Drive [0] 122142720[58.242 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Drive [3] 32768[16 MB]

Protocol : Universal

Running : Ok

Reading GPT[4], Partitions(64 Items) Ok
Phone Information.....
Brand : Lenovo
Vendor : Lenovo
Model : Lenovo L58041
ID : OPM1.171019.026
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : sprout-user 8.1.0 OPM1.171019.026 3.9.166_200309 release-keys
Device : sprout
Display ID : OPM1.171019.026 dev-keys
Security Patch : 2020-02-01
Fingerprint : Lenovo/sprout/sprout:8.1.0/OPM1.171019.026/3.9.166_200309:user/release-keys

Reading GPT[4], Partitions(64 Items) Ok
*** FRP Reset ***
Resetting FRP...
Auto
Processing...
Executing ...
[Zero Wipe] Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:14
BR
Dipendra Pathak
  Reply With Quote
The Following User Says Thank You to Dipendra Pathak For This Useful Post:
Old 12-15-2020, 14:16   #731 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,624
ASUS X01AD Zenfone Max M2 ZB633KL FRP Remove by Hydra Tool

ASUS X01AD Zenfone Max M2 ZB633KL FRP Remove by Hydra Tool


Screen Short :




Logs:
Quote:
PreOperation Configuration
Brand ASUS Model X01AD (ZenFone Max M2 ZB633KL) Storage Auto
Loader asus_5_1.mbn
Port Auto
Connection Flash Mode

Searching EDL Port..[COM24]
TPortConnection.Create...(COM24)..Opening...Ok
Getting device info.......
Serial No. 0x5CA23621
MSM ID 0x000BA0E1,
PBL Ver 00000000
PK HASH 6D6287D60BC71172EBCBDCC1817C69A2
FAD9DCCE60204D08C21F714A59AEE934

Firehose Loader[asus_5_1.mbn]
SaharaBoot... Ok
Sending ......................Ok
Connecting to Firehose...
Ping... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration
MemoryName eMMC
MaxPayloadSizeToTargetInBytes 1048576
MaxPayloadSizeToTargetInBytesSupported 1048576
MaxPayloadSizeFromTargetInBytes 4096
MaxXMLSizeInBytes 4096
TargetName 8953
Version 1

STORAGE DEVICE INFO
Memory Type eMMC
Block Size in Bytes 512
Page Size 512
Manufacturer ID 144
Serial Number 695764451
Firmware Version 162
Product Name HCG8a4
Physical Partitions 3
Total Logical Blocks
Drive [0] 122142720[58.242 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol Universal
Running Ok

Reading GPT[3], Partitions(68 Items) Ok
Phone Information......
Brand asus
Vendor asus
Model ASUS_X01AD
ID WW_Phone-202003131222
SDK 28
Release 9
ABI arm64-v8a
CPU abilist arm64-v8a,armeabi-v7a,armeabi
Locale en-US
Description msm8953_64-user 9 WW_Phone-202003131222 60 release-keys
Device ASUS_X01A_1
Display ID OPM1.WW_Phone-16.2018.2003.60-20200313
Security Patch 2020-03-05
Emmc_size 16GB
Fingerprint asusWW_X01ADASUS_X01A_19WW_Phone-20200313122216.2018.2003.60-20200313userrelease-keys

Reading GPT[3], Partitions(68 Items) Ok
FRP Reset
Resetting FRP...
Auto
Processing...
Executing ...
[Zero Wipe] Ok
Rebooting Phone.... Ok
If not rebooted, Please Power on Manually

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time 000012





BR

Dipendra Pathak

Last edited by Hydra Tool; 12-16-2020 at 04:34.
  Reply With Quote
The Following User Says Thank You to Dipendra Pathak For This Useful Post:
Old 12-15-2020, 14:33   #732 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,624
Redmi 9 Restore NVRAM IMEI Done by Hydra Tool

Redmi 9 Restore NVRAM IMEI Done by Hydra Tool





Screen Short:







Logs:


Quote:
Brand : XIAOMI Model : Redmi 9 (lancelot) Connection : Flash Mode

=====================================
Connection
-Please wait...
-Connect Phone...
-Found...
-PreLoader...[COM6]

TPortConnection.Create...(COM6)..Opening...Ok

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0707 (0000)MT6768[6768]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
SECURE VERSION : FF
BL VERSION : 03
BR Secured : 07

Preparing Download Agent..
DA : MT6768_Xiaomi_New.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2020/07/07.10:10_513994
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : preloader

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC
Sending Certifificate

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 291E8EE04328BA0DF9F868482BA54DE2
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
UFS LU0 Size: 0x0000000000000000 -0 Bytes
UFS LU1 Size: 0x0000000000000000 -0 Bytes
UFS LU2 Size: 0x0000000000000000 -0 Bytes
UFS CID :
UFS UNIQID :

DA Speed : high-speed
DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader....
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x05508000]1024 KB ->frp.bin...Ok
-nvdata[0x0C4A2000]64 MB ->nvdata.bin...Ok
-persist[0x104A2000]48 MB ->persist.bin...Ok
-nvram[0x19F00000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\__0707--__141220005049
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 291E8EE04328BA0DF9F868482BA54DE2
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
UFS LU0 Size: 0x0000000000000000 -0 Bytes
UFS LU1 Size: 0x0000000000000000 -0 Bytes
UFS LU2 Size: 0x0000000000000000 -0 Bytes
UFS CID :
UFS UNIQID :

Reading GPT-EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Restore NVMRAM and NVDATA
Processing...
Restoring NVM file [NVM-Flash__112920004352.zip] Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:05:26
BR

Dipendra Pathak
  Reply With Quote
Old 12-15-2020, 14:45   #733 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,624
Huawei Y5P 2020 (DRA-LX9 ) ID Remove Done by Hydra Tool

Huawei Y5P 2020 (DRA-LX9 ) ID Remove Done by Hydra Tool





Screen Short :






Logs :


Quote:
Brand : HUAWEI Model : DRA-LX9 (Y5P 2020) Connection : Flash Mode

=====================================
Connection
-Please wait...
-Found...[COM3]

TPortConnection.Create...(COM3)..Opening...Ok

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 1EF026DBC4E233CB7A06BC191EC49E8A
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 90014A68423861503E0100A5BFFB47A3 - hB8aP>

Reading GPT-EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Remove Account
Processing...
Backing up Partition for safety...
-oeminfo_121320134155.bin[0x04900000]32 MB ->oeminfo_121320134155.bin...Ok Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:31
BR
Dipendra Pathak
  Reply With Quote
The Following User Says Thank You to Dipendra Pathak For This Useful Post:
Old 12-15-2020, 15:45   #734 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,624
Vivo Y83 MT6762 Backup Stock Rom Done by Hydra Tool

Vivo Y83 MT6762 Backup Stock Rom Done by Hydra Tool





Screen Short :







Logs:


Quote:
Brand : VIVO Model : Y83 (PD1803BF) Connection : Flash Mode

=====================================
Connection[WAITING]Found[PreLoader][COM15] Status[Opened]
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000020000000 -512 MB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 1501003458364B4D4203216AE487574B - 4X6KMB
UNICAL RID : 52DD0CC297BBFC90CA266FB0F2CBF5AE
Reading GPT-EMMC [0x00008000] 130 Items
Done!!!


-------------------------------------
Operation : Backup Stock ROM
Processing...

Reading Important Partitions
preloader[0x00000000-0x00080000]512 KB ->preloader.bin... Done
-> Renaming Preloader.... preloader_k65v1_64_bsp.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Important\__0766--()131220163832\MT6765_Android_scatter.txt
pgpt[0x00000000-0x00008000]32 KB ->pgpt.bin... Done
frp[0x08588000-0x08688000]1024 KB ->frp.bin... Done
nvdata[0x0A688000-0x0E688000]64 MB ->nvdata.bin... Done
cust[0x15A88000-0x19A88000]64 MB ->cust.bin... Done
protect1[0x31922000-0x32122000]8 MB ->protect1.bin... Done
protect2[0x32122000-0x33000000]14.867 MB ->protect2.bin... Done
seccfg[0x33000000-0x33800000]8 MB ->seccfg.bin... Done
proinfo[0x36A00000-0x36D00000]3 MB ->proinfo.bin... Done
nvram[0x3F680000-0x43680000]64 MB ->nvram.bin... Done
Reading/Backup Flash Done!!!
C:\Hydra Tool\\Backup\Important\__0766--()131220163832 Ok

Elapsed Time : 00:00:11
BR
Dipendra Pathak
  Reply With Quote
The Following User Says Thank You to Dipendra Pathak For This Useful Post:
Old 12-16-2020, 06:03   #735 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,624
Xiaomi Redmi 5A (riva) Mi account removed successfully by Hydra Tool

Xiaomi Redmi 5A (riva) Mi account removed successfully by Hydra Tool






Screen Short :









Logs :


Quote:
PreOperation Configuration
Brand : XIAOMI Model : Redmi 5A (riva) Storage : Auto
Loader: mi_1_8.mbn
Port : Auto
Connection : Flash Mode

Searching EDL Port..[COM20]
TPortConnection.Create...(COM20)..Opening...Ok
Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8917
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 1880220739
Firmware Version : 3
Product Name : QE63MB
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 30535680[14.561 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok

Reading GPT[3], Partitions(52 Items) Ok
Phone Information.....
Brand : Xiaomi
Vendor : Xiaomi
Model : Redmi 5A
ID : OPM1.171019.026
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : riva-user 8.1.0 OPM1.171019.026 V11.0.2.0.OCKMIXM release-keys
Miui Ver : V11
Device : riva
Mod_device : riva_global
Board : QC_Reference_Phone
Display ID : CUSTOMER_VERSION_riva
Security Patch : 2019-10-01
Emmc_size : 16GB
Platform : msm8937
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : Xiaomi/riva/riva:8.1.0/OPM1.171019.026/V11.0.2.0.OCKMIXM:user/release-keys

Reading GPT[3], Partitions(52 Items) Ok
Operation : MiAccount
Remove MiAccount[Erase Method]
Processing...
Backing up Partition for safety...Ok

Scanning Patching address...
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]Done!!
Total Items patched : 4
Successfully patched address..
Failed to find persistbakpartitionOk

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:15
BR
Dipendra Pathak
  Reply With Quote
The Following User Says Thank You to Dipendra Pathak For This Useful Post:
Reply

Bookmarks

Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


 



All times are GMT +1. The time now is 17:13.



Powered by Searchlight © 2024 Axivo Inc.
vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2024 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2023 -
Page generated in 0.36469 seconds with 9 queries

SEO by vBSEO