GSM Shop GSM Shop
GSM-Forum  

Welcome to the GSM-Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features.
Only registered members may post questions, contact other members or search our database of over 8 million posts.

Registration is fast, simple and absolutely free so please - Click to REGISTER!

If you have any problems with the registration process or your account login, please contact contact us .

Go Back   GSM-Forum > Product Support Sections > Special Solutions / Services / WebShop > GSMFABRICA Products > HYDRA TOOL

Reply
 
LinkBack Thread Tools Display Modes
Old 12-26-2020, 07:24   #781 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,624
Xiaomi Redmi 8 (Olive) MI-account successfully removed done by Hydra Qualcomm Tool


Xiaomi Redmi 8 (Olive) MI-account successfully removed done by Hydra Qualcomm Tool
Screen Short:



Log:


Quote:
PreOperation Configuration
Brand : XIAOMI Model : Redmi 8 (olive) Storage : Auto
Loader: Xiaomi_Redmi_8_Olive.mbn
Port : Auto
Connection : Flash Mode

Searching EDL Port..[COM47]
TPortConnection.Create...(COM47)..Opening...Ok
Getting device info.......
Serial No.: 0xA0EA9780
MSM ID : 0x000BF0E1, SDM439-Qualcomm Snapdragon 439
PBL Ver : 00000001
PK HASH : 57158EAF1814D78FD2B3105ECE4DB18A
817A08AC664A5782A925F3FF8403D39A

Firehose Loader[Xiaomi_Redmi_8_Olive.mbn]
Initializing SaharaBoot... Ok
Sending .......................Ok

Connecting to Firehose...
Ping... Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[NN5GDxVZvZ-zOWvS
Checking Internet connection....
- Hydra Is Online
Connecting to Hydra Xiaomi Server...

Signature @256bytes Authentication.... Accepted......
Identifying Chip....Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 1435240044
Firmware Version : 1
Product Name : GD6BMB
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 61071360[29,121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Running : Ok

Reading GPT[3], Partitions(64 Items) Ok
Phone Information......
Vendor : Xiaomi
Model : Redmi 8
Android Ver : 9
Miui Ver : V11
Device : olive
Mod_device : olive_ru_global
Display ID : ZQL2115-olive-build-20200521205111
Security Patch : 2020-05-01
Kernel ID : 2020-05-01
Fingerprint : Xiaomi/olive_ru/olive:9/PKQ1.190319.001/V11.0.6.0.PCNRUXM:user/release-keys

Reading GPT[3], Partitions(64 Items) Ok
Operation : MiAccount
Remove MiAccount[Erase Method]
Processing...
Backing up Partition for safety...Ok

Scanning Patching address...
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]Done!!
Total Items patched : 2
Successfully patched address..Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:23
BR
Dipendra Pathak
  Reply With Quote
The Following 2 Users Say Thank You to Dipendra Pathak For This Useful Post:
Old 12-26-2020, 07:32   #782 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,624
Backing up flash file of MTK Y12 (1901 PD19013F) selected partition successfully done

Backing up flash file of MTK Y12 (1901 PD19013F) selected partition successfully done by Hydra Tool

Screen Short:





Logs:


Quote:
Connection
-Please wait...
-Found...
-PreLoader...[COM6]

TPortConnection.Create...(COM6)..Opening...Ok

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 0958F289F8E875DBDF6E87388BB380C6
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000030000000 -768 MB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 90014A68423861503E033230442237A7 - hB8aP>

Reading GPT-EMMC [0x00008000] 130 Items

Reading Selected Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_k65v1_64_bsp.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Selected\MTK__241220155724\MT6765_And roid_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-boot_para[0x00008000]1024 KB ->boot_para.bin...Ok
-recovery[0x00108000]96 MB ->recovery.bin...Ok
-para[0x06108000]512 KB ->para.bin...Ok
-expdb[0x06188000]20 MB ->expdb.bin...Ok
-vbmeta_system[0x07588000]8 MB ->vbmeta_system.bin...Ok
-vbmeta_vendor[0x07D88000]8 MB ->vbmeta_vendor.bin...Ok
-frp[0x08588000]1024 KB ->frp.bin...Ok
-nvcfg[0x08688000]32 MB ->nvcfg.bin...Ok
-nvdata[0x0A688000]64 MB ->nvdata.bin...Ok
-backup[0x0E688000]10 MB ->backup.bin...Ok
-survival[0x0F088000]96 MB ->survival.bin...Ok
-reserved[0x15088000]10 MB ->reserved.bin...Ok
-cust[0x15A88000]64 MB ->cust.bin...Ok
-vgc[0x19A88000]200 MB ->vgc.bin...Ok
-storage[0x26288000]64 MB ->storage.bin...Ok
-logdump[0x2A288000]64 MB ->logdump.bin...Ok
-md_udc[0x2E288000]22.602 MB ->md_udc.bin...Ok
-metadata[0x2F922000]32 MB ->metadata.bin...Ok
-protect1[0x31922000]8 MB ->protect1.bin...Ok
-protect2[0x32122000]14.867 MB ->protect2.bin...Ok
-seccfg[0x33000000]8 MB ->seccfg.bin...Ok
-persist[0x33800000]48 MB ->persist.bin...Ok
-sec1[0x36800000]2 MB ->sec1.bin...Ok
-proinfo[0x36A00000]3 MB ->proinfo.bin...Ok
-efuse[0x36D00000]512 KB ->efuse.bin...Ok
-md1img[0x36D80000]100 MB ->md1img.bin...Ok
-spmfw[0x3D180000]1024 KB ->spmfw.bin...Ok
-scp1[0x3D280000]1024 KB ->scp1.bin...Ok
-scp2[0x3D380000]1024 KB ->scp2.bin...Ok
-sspm_1[0x3D480000]1024 KB ->sspm_1.bin...Ok
-sspm_2[0x3D580000]1024 KB ->sspm_2.bin...Ok
-gz1[0x3D680000]16 MB ->gz1.bin...Ok
-gz2[0x3E680000]16 MB ->gz2.bin...Ok
-nvram[0x3F680000]64 MB ->nvram.bin...Ok
-lk[0x43680000]64 MB ->lk.bin...Ok
-lk2[0x47680000]64 MB ->lk2.bin...Ok
-boot[0x4B680000]96 MB ->boot.bin...Ok
-logo[0x51680000]8 MB ->logo.bin...Ok
-dtbo[0x51E80000]8 MB ->dtbo.bin...Ok
-tee1[0x52680000]5 MB ->tee1.bin...Ok
-tee2[0x52B80000]12.5 MB ->tee2.bin...Ok
-super[0x53800000]6 GB ->super.bin...Ok
-vbmeta[0x1D3800000]8 MB ->vbmeta.bin...Ok
-cache[0x1D4000000]256 MB ->cache.bin...Ok
-otp[0x7440FBE00]43 MB ->otp.bin...Ok
-flashinfo[0x746BFBE00]16 MB ->flashinfo.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Selected\MTK__241220155724

TPortConnection.Destroy.....Closing...Ok..
=====================================

Elapsed Time : 00:03:29
BR
Dipendra Pathak
  Reply With Quote
The Following User Says Thank You to Dipendra Pathak For This Useful Post:
Old 12-26-2020, 07:44   #783 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,624
Xiaomi Redmi 4A (Rolex) Mi-account successfully removde by Hydra Qualcomm Tool

Xiaomi Redmi 4A (Rolex) Mi-account successfully removde by Hydra Qualcomm Tool


Screen Short:





Logs:


Quote:
PreOperation Configuration
Brand : XIAOMI Model : Redmi 4A (Rolex) Storage : Auto
Loader: mi_1_8.mbn
Port : Auto
Connection : Flash Mode

Searching EDL Port..[COM208]
TPortConnection.Create...(COM208)..Opening...Ok
Getting device info.......
Serial No.: 0xF1E05D10
MSM ID : 0x000560E1, MSM8917-Qualcomm Snapdragon 425
PBL Ver : 00000000
PK HASH : 57158EAF1814D78FD2B3105ECE4DB18A
817A08AC664A5782A925F3FF8403D39A

Firehose Loader[mi_1_8.mbn]
Initializing SaharaBoot... Ok
Sending ...................Ok

Connecting to Firehose...
Ping... Ok
Configuration......
Identifying Chip....Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8917
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 2050343982
Firmware Version : 7
Product Name : QX13MB
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 61071360[29.121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Running : Ok

Reading GPT[3], Partitions(52 Items) Ok
Phone Information.....
Vendor : Xiaomi
Model : Redmi 4A
Android Ver : 7.1.2
Miui Ver : V10
Device : rolex
Mod_device : rolex_global
Board : QC_Reference_Phone
Display ID : N2G47H
Security Patch : 2018-07-01
Platform : msm8937
Kernel ID : 2018-07-01
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : Xiaomi/rolex/rolex:7.1.2/N2G47H/V10.2.3.0.NCCMIXM:user/release-keys

Reading GPT[3], Partitions(52 Items) Ok
Operation : MiAccount
Remove MiAccount[Erase Method]
Processing...
Backing up Partition for safety...Ok

Scanning Patching address...
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]Done!!
Total Items patched : 5
Successfully patched address..
Failed to find persistbakpartitionOk
Rebooting Phone.... Ok
If not rebooted, Please Power on Manually

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:22
BR
Dipendra Pathak
  Reply With Quote
The Following User Says Thank You to Dipendra Pathak For This Useful Post:
Old 12-26-2020, 07:54   #784 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,624
Xiaomi ARedmi 8 (Olive) wiping security successfully done by Hydra Wualcomm Tool

Xiaomi ARedmi 8 (Olive) wiping security successfully done by Hydra Wualcomm Tool

Screen Short:


Logs:

Quote:
PreOperation Configuration
Brand : XIAOMI Model : Redmi 8 (olive) Storage : Auto
Loader: Xiaomi_Redmi_8_Olive.mbn
Port : Auto
Connection : Flash Mode

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM10)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&26670dd9&0&1#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/09/2018, 6.1.7600.16385

Getting device info......
Serial No.: 0xD8393F7C
MSM ID : 0x000BF0E1, SDM439-Qualcomm Snapdragon 439
PBL Ver : 00000000
PK HASH : 57158EAF1814D78FD2B3105ECE4DB18A
817A08AC664A5782A925F3FF8403D39A

Firehose Loader[Xiaomi_Redmi_8_Olive.mbn]
SaharaBoot... Ok
Sending .......................Ok
Connecting to Firehose...
Ping... Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[BmvE6LbjgS9y4YXSu0uUVA0aNxY]
Checking Internet connection....
- Hydra Is Online
Connecting to Hydra Xiaomi Server...

Signature @256bytes Authentication.... Accepted......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 715896
Firmware Version : 842018864
Product Name : hC9aP3
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 122142720[58,242 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok

Phone Information......
Brand : Xiaomi
Vendor : Xiaomi
Model : Redmi 8
ID : PKQ1.190319.001
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : olive-user 9 PKQ1.190319.001 V11.0.11.0.PCNMIXM release-keys
Miui Ver : V11
Device : olive
Mod_device : olive_global
Display ID : ZQL2115-olive-build-20200519032343
Security Patch : 2020-05-01
Emmc_size : 16GB
Fingerprint : Xiaomi/olive/olive:9/PKQ1.190319.001/V11.0.11.0.PCNMIXM:user/release-keys

Reading GPT[3]
Drive [0] 64 Items
Drive [1] 0 Items
Drive [2] 0 Items

Wipe Security ...

Backup Security partitions...
Reading Security Items....
> modemst1
> modemst2
> fsg
C:\Hydra Tool\Backup\Security_Backup\Redmi 8__9_Security_122420164044.sec
Backup Security Success....
Security Wipe Started..
> modemst1 Ok
> modemst2 Ok
> fsg Ok
Security Wipe Success...Ok

Elapsed Time : 00:00:12
BR
Dipendra Pathak
  Reply With Quote
The Following User Says Thank You to Dipendra Pathak For This Useful Post:
Old 12-26-2020, 08:06   #785 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,624
My Phone my XI1 Plus FRP successfully removed by Hydra Tool

My Phone my XI1 Plus FRP successfully removed by Hydra Tool

Screen Short:



Logs:

Quote:
Port : [Auto] Scanning...COM20
TPortConnection.Create...(COM20)..Opening...Ok
Reading IMEI....
IMEI 1 : 8667900********
IMEI 2 : 8667900********

Reading System Info.
*** Flash Mode #Remove FRP ***
Resetting FRP...Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:04
BR
Dipendra Pathak
  Reply With Quote
The Following User Says Thank You to Dipendra Pathak For This Useful Post:
Old 12-26-2020, 08:16   #786 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,624
Xiaomi Redmi Note 5A Writing security successfully written by Hydra Qualcomm Tool

Xiaomi Redmi Note 5A Writing security successfully written by Hydra Qualcomm Tool

Screen Short:




Logs:


Quote:
PreOperation Configuration
Brand : AUTO Model : AUTO Storage : Auto
Loader: Auto
Port : Auto
Connection : Flash Mode

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM3)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&49b4c9&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/31/2015,2.1.2.0

Getting device info......
Serial No.: 0xF0F2872D
MSM ID : 0x000560E1, MSM8917-Qualcomm Snapdragon 425
PBL Ver : 00000000
PK HASH : 57158EAF1814D78FD2B3105ECE4DB18A
817A08AC664A5782A925F3FF8403D39A

Firehose Loader[Redmi_8917.mbn]
SaharaBoot... Ok
Sending ...................Ok
Connecting to Firehose...
Ping... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8917
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 19
Serial Number : 119137796
Firmware Version : 84
Product Name : Q3J96R
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 30777344[14,676 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok

Phone Information......
Brand : Xiaomi
Vendor : Xiaomi
Model : Redmi Note 5A
ID : QQ3A.200805.001
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : flame-user 10 QQ3A.200805.001 6578210 release-keys
Device : ugglite
Display ID : nad_ugglite-userdebug 10 QQ3A.200805.001 174 release-keys
Security Patch : 2020-09-05
Fingerprint : google/flame/flame:10/QQ3A.200805.001/6578210:user/release-keys

Reading GPT[3]
Drive [0] 48 Items
Drive [1] 0 Items
Drive [2] 0 Items

Security Data Found.
Reading Security Items....
> modemst1
> modemst2
> fsg
Write Security Success....Ok

Rebooting Phone.... Ok
If not rebooted, Please Power on Manually

Elapsed Time : 00:00:12
BR
Dipendra Pathak
  Reply With Quote
The Following User Says Thank You to Dipendra Pathak For This Useful Post:
Old 12-26-2020, 08:37   #787 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,624
Xiaomi Ferrari Global Image Flashing successfully done by Hydra Qualcomm Tool

Xiaomi Ferrari Global Image Flashing successfully done by Hydra Qualcomm Tool

Screen Short:




Logs:


Quote:
Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM8)
SymbolicName :\??\USB#VID_05C6&PID_9008#6&2953c98d&0&4#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/10/2020,5.1.1.2

Getting device info.....
Serial No.: 0x00D9162E
MSM ID : 0x0090B0E1, MSM8939-Qualcomm Snapdragon 615
PBL Ver : 00000000
PK HASH : 57158EAF1814D78FD2B3105ECE4DB18A
817A08AC664A5782A925F3FF8403D39A

Firehose Loader[mi_0_1.mbn]
SaharaBoot... Ok
Sending .....Ok
Connecting to Firehose...
Ping... Ok
Configuration.......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8936
Version : 1


Protocol : Universal
Running : Ok

Phone Information.....
Brand : Xiaomi
Vendor : Xiaomi
Model : Mi 4i
ID : LRX22G
SDK : 21
Release : 5.0.2
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Description : ferrari-user 5.0.2 LRX22G V7.1.1.0.LXIMICK release-keys
Miui Ver : V7
Device : ferrari
Mod_device : ferrari_global
Board : msm8916
Display ID : LRX22G
Security Patch : 2015-12-01
Platform : msm8916
Fingerprint : Xiaomi/ferrari/ferrari:5.0.2/LRX22G/V7.1.1.0.LXIMICK:user/release-keys

Reading GPT[3]
Drive [0] 36 Items
Drive [1] 0 Items
Drive [2] 0 Items


Backup Security partitions...
Reading Security Items....
> modemst1
> modemst2
> fsg
G:\BOX DAN FLASHER\HydraTool_Fullpackage_11-23-2020\Backup\Security_Backup\Mi 4i_msm8916_5.0.2_Security_122420164124.sec
Backup Security Success....

----------------------------
Flashing Selected Partitions....
- sbl1(0)[sbl1.mbn] Ok
- sbl1bak(0)[sbl1.mbn] Ok
- rpm(0)[rpm.mbn] Ok
- rpmbak(0)[rpm.mbn] Ok
- tz(0)[tz.mbn] Ok
- tzbak(0)[tz.mbn] Ok
- hyp(0)[hyp.mbn] Ok
- hypbak(0)[hyp.mbn] Ok
- aboot(0)[emmc_appsboot.mbn] Ok
- abootbak(0)[emmc_appsboot.mbn] Ok
- misc(0)[dummy.img] Ok
- logo(0)[dummy.img] Ok
- modem(0)[NON-HLOS.bin] Ok
- boot(0)[boot.img] Ok
- recovery(0)[recovery.img] Ok
- persist(0)[persist.img] Skipped
- system(0)[system.img] Ok
- cache(0)[cache.img] Ok
- userdata(0)[userdata.img] Ok
- PrimaryGPT(0)[gpt_main0.bin] Ok

Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-33.] OK
0 [CRC32(2,4608)] OK
0 [CRC32(NUM_DISK_SECTORS-33.,4608)] OK
0 [0] OK
0 [CRC32(1,92)] OK
0 [0] OK
0 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
----------------------------
Done!

Rebooting Phone.... Ok

Elapsed Time : 00:20:49
BR
Dipendra Pathak
  Reply With Quote
The Following User Says Thank You to Dipendra Pathak For This Useful Post:
Old 12-26-2020, 08:48   #788 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,624
iaomi Redmi 7A Pine MI-ACCOUNT successfully removed by Hydra Qualcomm Tool

Xiaomi Redmi 7A Pine MI-ACCOUNT successfully removed by Hydra Qualcomm Tool

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : XIAOMI Model : Redmi 7A (pine) Storage : Auto
Loader: Xiaomi_Redmi_8_Olive.mbn
Port : Auto
Connection : Flash Mode

Searching for Qualcomm 9008 Device...Found
FriendlyName :Android HS-USB QDLoader 9008 (COM72)
SymbolicName :\??\USB#VID_05C6&PID_9008#6&688a3b8&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :02/02/2015,2.1.1.2

Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[CiZsQQuQ
Checking Internet connection....
- Hydra Is Online
Connecting to Hydra Xiaomi Server...

Signature @256bytes Authentication.... Accepted......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 2799398647
Firmware Version : 909127728
Product Name : hB8aP>
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 61071360[29,121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok
Reading GPT[3]
Drive [0] 60 Items
Drive [1] 0 Items
Drive [2] 0 Items


Phone Information......
Vendor : Xiaomi
ID : QKQ1.191014.001
SDK : 29
Release : 10
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-GB
Miui Ver : V11
Mod_device : pine_eea_global
Security Patch : 2020-07-01
Emmc_size : 16GB

Processing Remove MiAccount[Patch Method]....
Backing up Partition for safety...Ok

Scanning Patching address...
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]Done!!
Total Items patched : 5
Successfully patched address..
Action Result : Ok

Elapsed Time : 00:01:50
BR
Dipendra Pathak
  Reply With Quote
The Following User Says Thank You to Dipendra Pathak For This Useful Post:
Old 12-26-2020, 12:29   #789 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,624
Xiaomi Readmi Note 4X (Mido) MI-Account successfully Removed by Hydra Tool​

Xiaomi Readmi Note 4X (Mido) MI-Account successfully Removed by Hydra Tool​

Screen Short:


Logs:


Quote:
PreOperation Configuration
Brand : XIAOMI Model : Redmi Note 4X (Mido) Storage : Auto
Loader: Xiaomi_S2y2_noauth_8953_ddr.mbn
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM14)
SymbolicName :\??\USB#VID_05C6&PID_9008#7&e386b14&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/02/2017,2.1.2.7

Getting device info......
Serial No.: 0xD3C8EF90
MSM ID : 0x000460E1, MSM8953-Qualcomm Snapdragon 625
PBL Ver : 00000000
PK HASH : 57158EAF1814D78FD2B3105ECE4DB18A
817A08AC664A5782A925F3FF8403D39A

Firehose Loader[Xiaomi_S2y2_noauth_8953_ddr.mbn]
SaharaBoot... Ok
Sending ...................Ok
Connecting to Firehose...
Ping... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8953
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 264755424
Firmware Version : 165
Product Name : HBG4a2
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 61071360[29,121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok
Reading GPT[3]
Drive [0] 52 Items
Drive [1] 0 Items
Drive [2] 0 Items


Phone Information.....
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi Note 4
ID : NRD90M
SDK : 24
Release : 7.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : mido-user 7.0 NRD90M V11.0.2.0.NCFMIXM release-keys
Miui Ver : V11
Device : mido
Mod_device : mido_global
Board : msm8953
Display ID : AL1512-mido-build-20191107001817
Security Patch : 2018-12-01
Emmc_size : 16GB
Platform : msm8953
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : xiaomi/mido/mido:7.0/NRD90M/V11.0.2.0.NCFMIXM:user/release-keys

Processing Remove MiAccount[Patch Method]....
Backing up Partition for safety...Ok

Scanning Patching address...
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]Done!!
Total Items patched : 3
Successfully patched address..
Failed to find persistbakpartition
Action Result : Ok

Elapsed Time : 00:00:15





BR
Dipendra Pathak
  Reply With Quote
The Following User Says Thank You to Dipendra Pathak For This Useful Post:
Old 12-26-2020, 14:48   #790 (permalink)
No Life Poster
 
Gsm-Ahmed's Avatar
 
Join Date: Jan 2020
Location: Algeria
Posts: 825
Member: 2944109
Status: Offline
Thanks Meter: 670
Redmi 8A Mi Accoout Remove



Code:
PreOperation Configuration 
 Brand : XIAOMI Model : Redmi 8A (olivelite) Storage : Auto
 Loader: Xiaomi_Redmi_8_Olive.mbn
 Port  : Auto
 Connection  : 

Searching for Qualcomm 9008 Device...Found
 FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM14)
 SymbolicName :\??\USB#VID_05C6&PID_9008#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :11/06/2020,2.17.6.0

Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok 
Configuration......
Identifying Chip....
Ok
Chip Configuration :
 MemoryName : eMMC
 MaxPayloadSizeToTargetInBytes : 1048576
 MaxPayloadSizeToTargetInBytesSupported : 1048576
 MaxPayloadSizeFromTargetInBytes : 4096
 MaxXMLSizeInBytes : 4096
 TargetName : 8937
 Version : 1

*** STORAGE DEVICE INFO ***
Memory Type         : eMMC
Block Size in Bytes : 512
Page Size           : 512
Manufacturer ID     : 21
Serial Number       : 1723257846
Firmware Version    : 4
Product Name        : QD63MB
Physical Partitions : 3
Total Logical Blocks:
          Drive [0]  61071360[29,121 GB]
          Drive [1]  8192[4 MB]
          Drive [2]  8192[4 MB]

Protocol : Universal
Running : Ok
Reading GPT[3]
          Drive [0] 64 Items
          Drive [1] 0 Items
          Drive [2] 0 Items

 
Phone Information......
  Brand          : Xiaomi
  Vendor         : Xiaomi
  Model          : Redmi 8A
  ID             : PKQ1.190319.001
  SDK            : 28
  Release        : 9
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Locale         : en-GB
  Description    : olivelite-user 9 PKQ1.190319.001 V11.0.9.0.PCPINXM release-keys
  Miui Ver       : V11
  Device         : olivelite
  Mod_device     : olivelite_in_global
  Display ID     : ZQL2116-olivelite-build-20200530052012
  Security Patch : 2020-05-01
  Emmc_size      : 16GB
  Fingerprint    : Xiaomi/olivelite/olivelite:9/PKQ1.190319.001/V11.0.9.0.PCPINXM:user/release-keys

Processing Remove MiAccount[Patch Method]....
Backing up Partition for safety...Ok

Scanning Patching address...
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]Done!!
Total Items patched : 38
Successfully patched address..
Action Result : Ok

Elapsed Time : 00:00:17
  Reply With Quote
The Following 2 Users Say Thank You to Gsm-Ahmed For This Useful Post:
Old 12-26-2020, 14:49   #791 (permalink)
No Life Poster
 
Gsm-Ahmed's Avatar
 
Join Date: Jan 2020
Location: Algeria
Posts: 825
Member: 2944109
Status: Offline
Thanks Meter: 670
Oppo F5 clone ultra power option



Code:
Brand : AUTO Model : AUTO Connection : Flash Mode

=====================================
Connection
 -Please wait...
 -Found...[COM42]

TPortConnection.Create...(COM42)..Opening...Ok


Reading System Info
  Brand          : alps
  Vendor         : alps
  Model          : F5
  ID             : LMY47I
  SDK            : 22
  Release        : 7.0
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Description    : M5_80L_WEG_3GW_B15_BH_EMMC_32_4_QHD_DDR3_PMZ_L_A579_A2_ZX_20171223
  Device         : keytak6580_weg_l
  Display ID     : M5_80L_WEG_3GW_B15_BH_EMMC_32_4_QHD_DDR3_PMZ_L_A579_A2_ZX_20171223
  Security Patch : 2016-03-01
  Platform       : mt6580
  FRPPST         : /dev/block/platform/mtk-msdc.0/by-name/frp
  Fingerprint    : alps/full_keytak6580_weg_l/keytak6580_weg_l:7.0/LMY47I/1514012954:user/test-keys
  StorageType    : mtp,mass_storage
  Userdata State : Not Encrypted

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition... [Ok]
Formatting Userdata... Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:08
  Reply With Quote
The Following 2 Users Say Thank You to Gsm-Ahmed For This Useful Post:
Old 12-27-2020, 07:03   #792 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,624
Huawei MED -LX9-Y6P 2020 FRP successfully removed by Hydra MTK Tool

Huawei MED -LX9-Y6P 2020 FRP successfully removed by Hydra MTK Tool

Screen Short:



Logs:

Quote:
Brand : HUAWEI Model : MED-LX9 (Y6P 2020) Connection : Flash Mode

=====================================
Connection
-Please wait...
-Connect Phone...
-Found...[COM17]

TPortConnection.Create...(COM17)..Opening...Ok

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0766 (0000)MT6765[6765]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
SECURE VERSION : 05
BL VERSION : FE
BR Secured : E5[SBC+SDA+SEL]

Security Authorization....
Sending[Huawei_Y6P_auth_sv5.auth] Accepted

Preparing Download Agent..
DA : MT6765_Huawei_MED.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2018/10/18.17:38_452898
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_k62v1_64_mexico.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 321C0C4F31FE76E7B6ECCE9D4DB0EA4C
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 90014A68433961503301014118873773 - hC9aP3

DA Speed : high-speed
DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_k62v1_64_mex_a32.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\__0766--__271220003917\MT6765_Android_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x00108000]1024 KB ->frp.bin...Ok
-nvdata[0x00A08000]16 MB ->nvdata.bin...Ok
-persist[0x03800000]8 MB ->persist.bin...Ok
-nvram[0x04400000]5 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\__0766--__271220003917
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 321C0C4F31FE76E7B6ECCE9D4DB0EA4C
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 90014A68433961503301014118873773 - hC9aP3

Reading GPT-EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Remove Account
Processing...
Backing up Partition for safety...
-oeminfo_122720003923.bin[0x04900000]32 MB ->oeminfo_122720003923.bin...Ok Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:30
BR
Dipendra Pathak
  Reply With Quote
Old 12-27-2020, 07:19   #793 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,624
Xiaomi Redmi Note 8 (ginkgo) MI-Account successfully Removed by Hydra Qualcomm Tool

Xiaomi Redmi Note 8 (ginkgo) MI-Account successfully Removed by Hydra Qualcomm Tool

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : XIAOMI Model : Redmi Note 8 (ginkgo) Storage : Auto
Loader: Xiaomi_redminote8_loader.elf
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM30)
SymbolicName :\??\USB#VID_05C6&PID_9008#6&24daa714&0&2#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :03/25/2016,2.1.2.2

Getting device info......
Serial No.: 0x73302FC6
MSM ID : 0x0010A0E1, SM6125-Qualcomm Snapdragon 665
PBL Ver : 00000000
PK HASH : 1BEBE3863A6781DB4B01086063007334
DE9E5CA14971C7C4F4358EC9D79CDA46

Firehose Loader[Xiaomi_redminote8_loader.elf]
SaharaBoot... Ok
Sending ..............................Ok
Connecting to Firehose...
Ping..................... Ok
Configuration.........
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Jul 3 2019 - 22:23:56

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 3388435200
Firmware Version : 3
Product Name : DP6DAB
Physical Partitions : 4
Total Logical Blocks:
Drive [0] 122142720[58.242 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Drive [3] 32768[16 MB]

Protocol : Universal
Running : Ok
Reading GPT[4]
Drive [0] 88 Items
Drive [1] 0 Items
Drive [2] 0 Items
Drive [3]


Phone Information......
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi Note 8
ID : PKQ1.190616.001
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : ginkgo-user 9 PKQ1.190616.001 V11.0.8.0.PCOMIXM release-keys
Miui Ver : V11
Device : ginkgo
Mod_device : ginkgo_global
Display ID : PKQ1.190616.001
Security Patch : 2020-03-01
Fingerprint : xiaomi/ginkgo/ginkgo:9/PKQ1.190616.001/V11.0.8.0.PCOMIXM:user/release-keys

Processing Remove MiAccount[Patch Method]....
Backing up Partition for safety...Ok

Scanning Patching address...
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]Done!!
Total Items patched : 3
Successfully patched address..
Action Result : Ok

Elapsed Time : 00:02:20
BR
Dipendra Pathak
  Reply With Quote
Old 12-27-2020, 07:29   #794 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,624
Xiaomi Redmi Note 8 MI Account Successfully removed by Hydra Tool

Xiaomi Redmi Note 8 MI Account Successfully removed by Hydra Tool

Logs:

Quote:
PreOperation Configuration
Brand : XIAOMI Model : Redmi Note 8 (ginkgo) Storage : Auto
Loader: Xiaomi_redminote8_loader.elf
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM14)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&376aba2d&0&3#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/31/2015,2.1.2.0

Getting device info......
Serial No.: 0x3C80AD2F
MSM ID : 0x0010A0E1, SM6125-Qualcomm Snapdragon 665
PBL Ver : 00000000
PK HASH : 1BEBE3863A6781DB4B01086063007334
DE9E5CA14971C7C4F4358EC9D79CDA46

Firehose Loader[Xiaomi_redminote8_loader.elf]
SaharaBoot... Ok
Sending ..............................Ok
Connecting to Firehose...
Ping..................... Ok
Configuration.........
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Jul 3 2019 - 22:23:56

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 19
Serial Number : 424465444
Firmware Version : 4
Product Name : S0J9K9
Physical Partitions : 4
Total Logical Blocks:
Drive [0] 244285440[116,484 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Drive [3] 32768[16 MB]

Protocol : Universal
Running : Ok
Reading GPT[4]
Drive [0] 88 Items
Drive [1] 0 Items
Drive [2] 0 Items
Drive [3]


Phone Information......
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi Note 8
ID : PKQ1.190616.001
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : ginkgo-user 9 PKQ1.190616.001 V11.0.12.0.PCOMIXM release-keys
Miui Ver : V11
Device : ginkgo
Mod_device : ginkgo_global
Display ID : PKQ1.190616.001
Security Patch : 2020-11-01
Fingerprint : xiaomi/ginkgo/ginkgo:9/PKQ1.190616.001/V11.0.12.0.PCOMIXM:user/release-keys

Processing Remove MiAccount[Patch Method]....
Backing up Partition for safety...Ok

Scanning Patching address...
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]Done!!
Total Items patched : 36
Successfully patched address..
Action Result : Ok

Elapsed Time : 00:01:54
BR
Dipendra Pathak
  Reply With Quote
Old 12-27-2020, 07:43   #795 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,624
Xiaomi Redmi 8 (Olive) MI Account Successfully removed by Hydra TOOL

Xiaomi Redmi 8 (Olive) MI Account Successfully removed by Hydra TOOL

Screen Short:



Logs:


Quote:
PreOperation Configuration
Brand : XIAOMI Model : Redmi 8 (olive) Storage : Auto
Loader: Xiaomi_Redmi_8_Olive.mbn
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :HS-USB Diagnostics 9008 (COM4)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&37f23aa8&0&2#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/20/2017,2.1.2.2

Getting device info......
Serial No.: 0x10E5CB34
MSM ID : 0x000BF0E1, SDM439-Qualcomm Snapdragon 439
PBL Ver : 00000000
PK HASH : 57158EAF1814D78FD2B3105ECE4DB18A
817A08AC664A5782A925F3FF8403D39A

Firehose Loader[Xiaomi_Redmi_8_Olive.mbn]
SaharaBoot... Ok
Sending .......................Ok
Connecting to Firehose...
Ping... Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[vOkBv-GI-uB6d8x
Checking Internet connection....
- Hydra Is Online
Connecting to Hydra Xiaomi Server...

Signature @256bytes Authentication.... Accepted......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 2792536521
Firmware Version : 162
Product Name : HCG8a4
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 122142720[58.242 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok
Reading GPT[3]
Drive [0] 64 Items
Drive [1] 0 Items
Drive [2] 0 Items


Phone Information......
Brand : Xiaomi
Vendor : Xiaomi
Model : Redmi 8
ID : PKQ1.190319.001
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : zh-CN
Description : olive-user 9 PKQ1.190319.001 V11.0.7.0.PCNCNXM release-keys
Miui Ver : V11
Device : olive
Display ID : ZQL2115-olive-build-20200111233709
Security Patch : 2019-12-01
Emmc_size : 16GB
Fingerprint : Xiaomi/olive/olive:9/PKQ1.190319.001/V11.0.7.0.PCNCNXM:user/release-keys

Processing Remove MiAccount[Patch Method]....
Backing up Partition for safety...Ok

Scanning Patching address...
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]Done!!
Total Items patched : 3
Successfully patched address..
Action Result : Ok

Elapsed Time : 00:00:55
BR
Dipendra Pathak

  Reply With Quote
Reply

Bookmarks

Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


 



All times are GMT +1. The time now is 02:46.



Powered by Searchlight © 2024 Axivo Inc.
vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2024 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2023 -
Page generated in 0.48456 seconds with 9 queries

SEO by vBSEO