GSM Shop GSM Shop
GSM-Forum  

Welcome to the GSM-Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features.
Only registered members may post questions, contact other members or search our database of over 8 million posts.

Registration is fast, simple and absolutely free so please - Click to REGISTER!

If you have any problems with the registration process or your account login, please contact contact us .

Go Back   GSM-Forum > Product Support Sections > Special Solutions / Services / WebShop > GSMFABRICA Products > HYDRA TOOL

Reply
 
LinkBack Thread Tools Display Modes
Old 12-27-2020, 07:52   #796 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,577
Lenevo A2020a40 Successfully Flashed By Hydra Tool


Lenevo A2020a40 Successfully Flashed By Hydra Tool

Logs:

Quote:
Searching for Qualcomm 9008 Device...Found FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM23) SymbolicName :\??\USB#VID_05C6&PID_9008#5&3478949&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver :08/02/2017,2.1.2.7 Getting device info..... Serial No.: 0x0BD1A708 MSM ID : 0x009600E1, MSM8909-Qualcomm Snapdragon 210 PBL Ver : 00000000 PK HASH : CC3153A80293939B90D02D3BF8B23E02 92E452FEF662C74998421ADAD42A380F Firehose Loader[LV_1_3.mbn] SaharaBoot... Ok Sending ..............Ok Connecting to Firehose... Ping... Ok Configuration...... Identifying Chip.... Ok Chip Configuration : MemoryName : eMMC MaxPayloadSizeToTargetInBytes : 1048576 MaxPayloadSizeToTargetInBytesSupported : 1048576 MaxPayloadSizeFromTargetInBytes : 4096 MaxXMLSizeInBytes : 4096 TargetName : 8909 Version : 1 Protocol : Universal Running : Ok Phone Information..... Brand : Lenovo Vendor : LENOVO Model : Lenovo A2020a40 ID : LMY47V SDK : 22 Release : 5.1.1 ABI : armeabi-v7a CPU abilist : armeabi-v7a,armeabi Description : angus3A4-user 5.1.1 LMY47V A2020a40_S220_170517_ROW release-keys Device : angus3A4 Board : msm8909 Display ID : A2020a40_S220_170517_ROW Security Patch : 2017-04-01 Platform : msm8909 FRPPST : /dev/block/bootdevice/by-name/config Fingerprint : Lenovo/angus3A4/angus3A4:5.1.1/LMY47V/A2020a40_S220_170517_ROW:user/release-keys Reading GPT[3] Drive [0] 32 Items Drive [1] 0 Items Drive [2] 4 Items Backup Security partitions... Reading Security Items.... > modemst1 > modemst2 > fsg C:\Hydra Tool\Backup\Security_Backup\Lenovo A2020a40_msm8909_5.1.1_Security_122620182432.sec Backup Security Success.... ---------------------------- Flashing Selected Partitions.... - modem(0)[NON-HLOS.bin] Ok - sbl1(0)[sbl1.mbn] Ok - sbl1bak(0)[sbl1.mbn] Ok - aboot(0)[emmc_appsboot.mbn] Ok - abootbak(0)[emmc_appsboot.mbn] Ok - rpm(0)[rpm.mbn] Ok - rpmbak(0)[rpm.mbn] Ok - tz(0)[tz.mbn] Ok - tzbak(0)[tz.mbn] Ok - modemst1(0)[modemst_zero.bin] Skipped - modemst2(0)[modemst_zero.bin] Skipped - misc(0)[misc.img] Ok - splash(0)[splash.img] Ok - fsg(0)[fs_image.tar.gz.mbn.img] Skipped - sec(0)[sec.dat] Skipped - boot(0)[boot.img] Ok - system(0)[system_1.img] Ok - system(0)[system_2.img] Ok - system(0)[system_3.img] Ok - system(0)[system_4.img] Ok - system(0)[system_5.img] Ok - system(0)[system_6.img] Ok - system(0)[system_7.img] Ok - system(0)[system_8.img] Ok - system(0)[system_9.img] Ok - system(0)[system_10.img] Ok - system(0)[system_11.img] Ok - system(0)[system_12.img] Ok - system(0)[system_13.img] Ok - system(0)[system_14.img] Ok - system(0)[system_15.img] Ok - system(0)[system_16.img] Ok - system(0)[system_17.img] Ok - system(0)[system_18.img] Ok - system(0)[system_19.img] Ok - system(0)[system_20.img] Ok - system(0)[system_21.img] Ok - system(0)[system_22.img] Ok - system(0)[system_23.img] Ok - system(0)[system_24.img] Ok - system(0)[system_25.img] Ok - system(0)[system_26.img] Ok - system(0)[system_27.img] Ok - system(0)[system_28.img] Ok - system(0)[system_29.img] Ok - system(0)[system_30.img] Ok - system(0)[system_31.img] Ok - system(0)[system_32.img] Ok - system(0)[system_33.img] Ok - system(0)[system_34.img] Ok - system(0)[system_35.img] Ok - system(0)[system_36.img] Ok - system(0)[system_37.img] Ok - system(0)[system_38.img] Ok - system(0)[system_39.img] Ok - system(0)[system_40.img] Ok - persist(0)[persist_1.img] Skipped - cache(0)[cache_1.img] Ok - cache(0)[cache_2.img] Ok - cache(0)[cache_3.img] Ok - recovery(0)[recovery.img] Ok - userdata(0)[userdata_1.img] Ok - userdata(0)[userdata_2.img] Ok - userdata(0)[userdata_3.img] Ok - userdata(0)[userdata_4.img] Ok - userdata(0)[userdata_5.img] Ok - userdata(0)[userdata_6.img] Ok - userdata(0)[userdata_7.img] Ok - userdata(0)[userdata_8.img] Ok - userdata(0)[userdata_9.img] Ok - userdata(0)[userdata_10.img] Ok - userdata(0)[userdata_11.img] Ok - userdata(0)[userdata_12.img] Ok - userdata(0)[userdata_13.img] Ok - userdata(0)[userdata_14.img] Ok - userdata(0)[userdata_15.img] Ok - userdata(0)[userdata_16.img] Ok - userdata(0)[userdata_17.img] Ok - userdata(0)[userdata_18.img] Ok - userdata(0)[userdata_19.img] Ok - userdata(0)[userdata_20.img] Ok - userdata(0)[userdata_21.img] Ok - userdata(0)[userdata_22.img] Ok - userdata(0)[userdata_23.img] Ok - userdata(0)[userdata_24.img] Ok - userdata(0)[userdata_25.img] Ok - userdata(0)[userdata_26.img] Ok - userdata(0)[userdata_27.img] Ok - userdata(0)[userdata_28.img] Ok - userdata(0)[userdata_29.img] Ok - userdata(0)[userdata_30.img] Ok - userdata(0)[userdata_31.img] Ok - userdata(0)[userdata_32.img] Ok - userdata(0)[userdata_33.img] Ok - userdata(0)[userdata_34.img] Ok - userdata(0)[userdata_35.img] Ok - userdata(0)[userdata_36.img] Ok - userdata(0)[userdata_37.img] Ok - userdata(0)[userdata_38.img] Ok - userdata(0)[userdata_39.img] Ok - userdata(0)[userdata_40.img] Ok - userdata(0)[userdata_41.img] Ok - userdata(0)[userdata_42.img] Ok - userdata(0)[userdata_43.img] Ok - PrimaryGPT(0)[gpt_main0.bin] Ok Flashing Patch Configuration.. 0 [NUM_DISK_SECTORS-34.] OK 0 [NUM_DISK_SECTORS-34.] OK 0 [NUM_DISK_SECTORS-34.] OK 0 [NUM_DISK_SECTORS-34.] OK 0 [NUM_DISK_SECTORS-1.] OK 0 [NUM_DISK_SECTORS-1.] OK 0 [NUM_DISK_SECTORS-33.] OK 0 [CRC32(2,4096)] OK 0 [CRC32(NUM_DISK_SECTORS-33.,4096)] OK 0 [0] OK 0 [CRC32(1,92)] OK 0 [0] OK 0 [CRC32(NUM_DISK_SECTORS-1.,92)] OK ---------------------------- Done! Operation : Setbootablestoragedrive: Drive 0 Set bootable storage drive 0 Ok Rebooting Phone.... Ok Elapsed Time : 00:03:01
BR
Dipendra Pathak
  Reply With Quote
The Following User Says Thank You to Dipendra Pathak For This Useful Post:
Old 12-27-2020, 08:03   #797 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,577
Oppo A57 (CHP1701) User Data Successfully Cleared according to Clint by Hydra Tool

Oppo A57 (CHP1701) User Data Successfully Cleared according to Clint by Hydra Tool

Screen Short



Logs:

Quote:
PreOperation Configuration
Brand : OPPO Model : A57 (CPH1701) Storage : Auto
Loader: Oppo_A57_8940.mbn
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM101)
SymbolicName :\??\USB#VID_05C6&PID_9008#6&1e1c44b&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/07/2015,4.2.0.35

Getting device info......
Serial No.: 0x67B7C605
MSM ID : 0x0006B0E1, MSM8940-Qualcomm Snapdragon 435
PBL Ver : 00000000
PK HASH : 77A22B92A1BCD0C4D3AAA10AA9F1B2C3
6D51C0CA7429B5201D0FD1D5F5B53BBC

Firehose Loader[Oppo_A57_8940.mbn]
SaharaBoot... Ok
Sending ....................Ok
Connecting to Firehose...
Ping... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 2498992102
Firmware Version : 7
Product Name : RX1BMB
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 61071360[29.121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok

Phone Information.....
Brand : OPPO
Vendor : OPPO
Model : CPH1701
ID : MMB29M
SDK : 23
Release : 6.0.1
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : msm8937_64-user 6.0.1 MMB29M eng.root.20180806.181819 release-keys
Device : CPH1701
Board : QC_Reference_Phone
Display ID : CPH1701EX_11_A.34_180806
Security Patch : 2018-05-05
Emmc_size : 16GB
Platform : msm8937
FRPPST : /dev/block/bootdevice/by-name/config

Reading GPT[3]
Drive [0] 56 Items
Drive [1] 0 Items
Drive [2] 4 Items

Formatting Userdata...
Method :
Safe Format - EMMC
Processing...
- Formatting Userdata [Safe method] OkOk

Elapsed Time : 00:00:06
BR
Dipendra Pathak
  Reply With Quote
The Following User Says Thank You to Dipendra Pathak For This Useful Post:
Old 12-28-2020, 06:21   #798 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,577
Xiaomi Note 7 Successfully removed MI Account by Hydra Tool

Xiaomi Note 7 Successfully removed MI Account by Hydra Tool

Screen Short:



Logs:

Quote:
Starting ADB Server....
Searching Device By ADB
Device Found...
Model : Redmi Note 7
Brand : Xiaomi
Android Ver : 9
CPU abi : arm64-v8a
Software Version :
CSC Version :
Bootloader :
Board : sdm660
Display ID : PKQ1.180904.001
Security Patch : 2020-05-05
Emmc_size :
Platform : sdm660
Kernel ID : 2020-05-05
Marketname :
OTA Version Name :
SYS USB CONFIG : persist.adb
FRPPST : /dev/block/bootdevice/by-name/frp
FingerPrint : xiaomi/lavender/lavender:9/PKQ1.180904.001/V11.0.6.0.PFGMIXM:user/release-keys

Checking Root Status....
Root Status : Not Rooted

ADB MiAccount...

Processing...
Disbaling MI Account
Please wait...
Disabled Mi Account Success
Note : Disable/Bypass Miaccount not work Android 9 and Up
You need to downgrade ...
Action Result : Ok

Elapsed Time : 00:00:01
BR
Dipendra Pathak
  Reply With Quote
Old 12-28-2020, 06:38   #799 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,577
Asus XOOQD (ZenFone 5 ZE620KL 2018) FRP successfully removed by Hydra Tool

Asus XOOQD (ZenFone 5 ZE620KL 2018) FRP successfully removed by Hydra Tool.


Screen Short:





Logs:


Quote:
PreOperation Configuration
Brand : ASUS Model : X00QD (ZenFone 5 ZE620KL 2018) Storage : Auto
Loader: asus_3_1.elf
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM7)
SymbolicName :\??\USB#VID_05C6&PID_9008#6&36559b33&0&3#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/31/2015,2.1.2.0

Getting device info......
Serial No.: 0x06277834
MSM ID : 0x000CC0E1,
PBL Ver : 00000000
PK HASH : E5E07A6BEB0800FA91229A6211857712
DDAF1FAE8E1337B32911C0013B1F195A

Firehose Loader[asus_3_1.elf]
SaharaBoot... Ok
Sending ...............................Ok
Connecting to Firehose...
Ping...... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : MSM8996
Version : 1
DateTime : Oct 31 2017 - 11:17:46

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 161790045
Firmware Version : 162
Product Name : HCG8a4
Physical Partitions : 4
Total Logical Blocks:
Drive [0] 122142720[58.242 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Drive [3] 8192[4 MB]

Protocol : Universal
Running : Ok

Phone Information.....
Brand : asus
Vendor : asus
Model : ASUS_X00QD
ID : OPR1.170623.032
SDK : 26
Release : 8.0.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : WW_Phone-user 8.0.0 OPR1.170623.032 15.0616.1804.20-0 release-keys
Device : ASUS_X00QD
Display ID : OPR1.170623.032.WW_Phone-15.0616.1804.20-0
Security Patch : 2018-04-01
Fingerprint : asus/WW_Phone/ASUS_X00QD:8.0.0/OPR1.170623.032/15.0616.1804.20-0:user/release-keys

Reading GPT[4]
Drive [0] 80 Items
Drive [1] 0 Items
Drive [2] 0 Items
Drive [3]

Formatting Userdata...
Method :
Auto
Processing...
- Formatting Userdata
Executing ...
- Formatting Userdata [Safe method] Failed
- Formatting Userdata [Zero Wipe] Failed
- Formatting Userdata [Erase Safety Tag] OkOkOk

Rebooting Phone.... Ok
If not rebooted, Please Power on Manually

Elapsed Time : 00:00:19
BR
Dipendra Pathak
  Reply With Quote
Old 12-28-2020, 06:48   #800 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,577
Xiaomi Redmi 8 Olive Patching Unlock successfully Done by Hydra Tool

Xiaomi Redmi 8 Olive Patching Unlock successfully Done by Hydra Tool

Screen Short:



Logs:

Quote:
Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM80)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&ce37f52&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/04/2013,2.1.0.5

Getting device info......
Serial No.: 0x823A2974
MSM ID : 0x000BF0E1, SDM439-Qualcomm Snapdragon 439
PBL Ver : 00000000
PK HASH : 57158EAF1814D78FD2B3105ECE4DB18A
817A08AC664A5782A925F3FF8403D39A

Firehose Loader[Xiaomi_Redmi_8_Olive.mbn]
SaharaBoot... Ok
Sending .......................Ok
Connecting to Firehose...
Ping... Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[CuqoshyVE3PZ3gyd3dKm-Y4UnD3]
Checking Internet connection....
- Hydra Is Online
Connecting to Hydra Xiaomi Server...

Signature @256bytes Authentication.... Accepted......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 19
Serial Number : 554134418
Firmware Version : 4
Product Name : S0J9N8
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 122142720[58.242 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok

Phone Information......
Brand : Xiaomi
Vendor : Xiaomi
Model : Redmi 8
ID : PKQ1.190319.001
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : zh-CN
Description : olive-user 9 PKQ1.190319.001 V11.0.11.0.PCNCNXM release-keys
Miui Ver : V11
Device : olive
Display ID : ZQL2115-olive-build-20200516003727
Security Patch : 2020-05-01
Emmc_size : 16GB
Fingerprint : Xiaomi/olive/olive:9/PKQ1.190319.001/V11.0.11.0.PCNCNXM:user/release-keys


----------------------------
Flashing Selected Partitions....
- devcfg(0)[devcfg.mbn] Ok
- sbl1(0)[sbl1.mbn] Ok
- rpm(0)[rpm.mbn] Ok
- aboot(0)[emmc_appsboot.mbn] Ok
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 0
Set bootable storage drive 0 Ok

Rebooting Phone.... Ok

Elapsed Time : 00:00:31
BR
Dipendra Pathak
  Reply With Quote
Old 12-28-2020, 06:56   #801 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,577
Oppo A71 (CHP1801) formatting user data succssfully done by Hydra Tool

Oppo A71 (CHP1801) formatting user data succssfully done by Hydra Tool

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : OPPO Model : A71 (2018) CPH1801 Storage : Auto
Loader: a71_firehose.bin
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM37)
SymbolicName :\??\USB#VID_05C6&PID_9008#6&1fc6487e&0&1#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :12/17/2018,2.1.3.5

Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok
Configuration.
<?xml version="1.0" encoding="UTF-8" ?><data><log value="[email protected] [email protected]" /></data>.
<?xml version="1.0" encoding="UTF-8" ?><data><response value="ACK" MinVersionSupported="1" MemoryName="eMMC" MaxPayloadSizeFromTargetInBytes="4096" MaxPayloadSizeToTargetInBytes="1048576" MaxPayloadSizeToTargetInBytesSupported="1048576" MaxXMLSizeInBytes="4096" Version="1" TargetName="8953" /></data>.
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8953
Version : 1

Protocol : Universal
Running : Ok
Processing A71 Format Userdata....
Action Result : Ok

Rebooting Phone.... Ok

Elapsed Time : 00:00:03
BR
Dipendra Pathak
  Reply With Quote
Old 12-28-2020, 07:05   #802 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,577
Another Readmi Note 8 Ginkgo MI-Account successfully removed by HYDRA TOOL

Another Readmi Note 8 Ginkgo MI-Account successfully removed by HYDRA TOOL

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : XIAOMI Model : Redmi Note 8 (ginkgo) Storage : Auto
Loader: Xiaomi_redminote8_loader.elf
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM6)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&20f852f0&0&6#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :03/17/2014,10.2104.1.2

Getting device info......
Serial No.: 0x80C737FB
MSM ID : 0x0010A0E1, SM6125-Qualcomm Snapdragon 665
PBL Ver : 00000000
PK HASH : 1BEBE3863A6781DB4B01086063007334
DE9E5CA14971C7C4F4358EC9D79CDA46

Firehose Loader[Xiaomi_redminote8_loader.elf]
SaharaBoot... Ok
Sending ..............................Ok
Connecting to Firehose...
Ping..................... Ok
Configuration.........
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Jul 3 2019 - 22:23:56

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 3237666318
Firmware Version : 2
Product Name : DD68MB
Physical Partitions : 4
Total Logical Blocks:
Drive [0] 61071360[29,121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Drive [3] 8192[4 MB]

Protocol : Universal
Running : Ok
Reading GPT[4]
Drive [0] 88 Items
Drive [1] 0 Items
Drive [2] 0 Items
Drive [3]


Phone Information......
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi Note 8
ID : PKQ1.190616.001
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : ginkgo-user 9 PKQ1.190616.001 V11.0.12.0.PCOMIXM release-keys
Miui Ver : V11
Device : ginkgo
Mod_device : ginkgo_global
Display ID : PKQ1.190616.001
Security Patch : 2020-11-01
Fingerprint : xiaomi/ginkgo/ginkgo:9/PKQ1.190616.001/V11.0.12.0.PCOMIXM:user/release-keys

Processing Remove MiAccount[Patch Method]....
Backing up Partition for safety...Ok

Scanning Patching address...
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]Done!!
Total Items patched : 4
Successfully patched address..
Action Result : Ok

Elapsed Time : 00:03:32
BR
Dipendra Pathak
  Reply With Quote
Old 12-28-2020, 07:13   #803 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,577
Xiaomi Redmi 3 IDO Mi account Patched successfully by Hydra Qualcomm Tool

Xiaomi Redmi 3 IDO Mi account Patched successfully by Hydra Qualcomm Tool

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : XIAOMI Model : Redmi 3 (Ido) Storage : Auto
Loader: mi_0_1.mbn
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM3)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&9b34f90&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/02/2017,2.1.2.7

Getting device info.....
Serial No.: 0x09031BF9
MSM ID : 0x0090B0E1, MSM8939-Qualcomm Snapdragon 615
PBL Ver : 00000000
PK HASH : 57158EAF1814D78FD2B3105ECE4DB18A
817A08AC664A5782A925F3FF8403D39A

Firehose Loader[mi_0_1.mbn]
SaharaBoot... Ok
Sending .....Ok
Connecting to Firehose...
Ping. Ok
Configuration........
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8936
Version : 1


Protocol : Universal
Running : Ok
Reading GPT[3]
Drive [0] 32 Items
Drive [1] 0 Items
Drive [2] 0 Items


Phone Information.....
Brand : Xiaomi
Vendor : Xiaomi
Model : Redmi 3
ID : LMY47V
SDK : 22
Release : 5.1.1
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Description : ido-user 5.1.1 LMY47V V8.2.1.0.LAIMIDL release-keys
Miui Ver : V8
Device : ido_rifle007
Mod_device : ido_xhdpi_global
Board : msm8916
Display ID : LMY47V
Security Patch : 2017-02-01
Platform : msm8916
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : Xiaomi/ido/ido:5.1.1/LMY47V/V8.2.1.0.LAIMIDL:user/release-keys

Processing Remove MiAccount[Patch Method]....
Backing up Partition for safety...Ok

Scanning Patching address...
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]Done!!
Total Items patched : 3
Successfully patched address..
Failed to find persistbakpartition
Action Result : Ok

Elapsed Time : 00:00:38
BR
Dipendra Patrhak
  Reply With Quote
Old 12-28-2020, 07:21   #804 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,577
Huawei TRT-L21 (Y7 Prime) Factory Resat Successfully Done by Hydra Tool

Huawei TRT-L21 (Y7 Prime) Factory Resat Successfully Done by Hydra Tool


Screen Short:





Logs:


Quote:
PreOperation Configuration
Brand : HUAWEI Model : TRT-L21 (Y7 Prime) Storage : Auto
Loader: Huawei_Y7_MSM8937.mbn
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM12)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&1e7d8db7&0&6#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/02/2017,2.1.2.7

Getting device info......
Serial No.: 0xC6D14A66
MSM ID : 0x0006B0E1, MSM8940-Qualcomm Snapdragon 435
PBL Ver : 00000000
PK HASH : 6BC369511DA9CADB3A7AF61574F89DB3
85003D6241BDD1FF573DBA61BF6AE119

Firehose Loader[Huawei_Y7_MSM8937.mbn]
SaharaBoot... Ok
Sending ...................Ok
Connecting to Firehose...
Ping... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 1329648654
Firmware Version : 6
Product Name : RX1BMB
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 61071360[29.121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok

Phone Information.....
Brand : Huawei
Vendor : unknown
Model : generic_a53_32
ID : NRD90M
SDK : 24
Release : 7.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Description : generic_a53_32-user 7.0 NRD90M eng.jslave.20170908.171223 test-keys
Device : generic_a53_32
Display ID : NRD90M test-keys
Security Patch : 2017-09-01
Fingerprint : Huawei/generic_a53_32/generic_a53_32:7.0/NRD90M/jslave09081712:user/test-keys

Reading GPT[3]
Drive [0] 64 Items
Drive [1] 0 Items
Drive [2] 0 Items

Formatting Userdata...
Method :
Auto
Processing...
- Formatting Userdata
Executing ...
- Formatting Userdata [Safe method] OkOkOk

Elapsed Time : 00:00:04
BR
Dipendra Pathak
  Reply With Quote
Old 12-28-2020, 07:28   #805 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,577
Condor 011019 Formatting User data to remove FRP successfully Done by Hydra Tool

Condor 011019 Formatting User data to remove FRP successfully Done by Hydra Tool

Screen Short



Logs:

Quote:
Brand : AUTO Model : AUTO Connection : Flash Mode

=====================================
Connection
-Please wait...
-Connect Phone...
-Found...
-PreLoader...[COM37]

TPortConnection.Create...(COM37)..Opening...Ok

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0321 (0000)MT6737T[6735]
BROM HW_SW_VER : 8A00 CC00 0000 0000
FUSEID : 00000000
FUSEID : 00000000
SECURE VERSION : 00
BL VERSION : 00
BR Secured : 00
NORMAL BOOT

Preparing Download Agent..
DA : DA_SWSEC_1640_P100AN_SYM_01.bin[Not Exist]
Trying Default 6735.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2018-09-18.13:22_452898
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : Old - eMMC
00000000000000000000
PRMMCCID : 510001154D33364531710342C33DF4C8
Init Configuration
Running DA 4.2 on BBID : 0x9B Ok

Initializing Loader [2]
Sending Loader [2] Accepted
Reading Flashchip data....
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003A3E00000 -14.561 GB
ERAM Size : 0x0000000080000000 -2 GB
IRAM Size : 0x0000000000020000 -128 KB
UNICAL RID : EF838AA1BDD6F4BCF9432AC79225C7A3
eMMC CID : 510001154D33364531710342C355F4C8
Change to HIGH SPEED...
5A
Connection
-Please wait...
-Found...[COM14]


Reading Partition Table
SIZE[0x00000948] 27 Items > Done

Reading System Info
Brand : Condor
Vendor : SPA Condor Electronics
Model : Plume L2 Pro
ID : O11019
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : Plume_L2_Pro-user 8.1.0 O11019 1529733443 release-keys
Device : Plume_L2_Pro
Display ID : SP633_V08_20180806
Security Patch : 2018-07-05
Fingerprint : Condor/Plume_L2_Pro/Plume_L2_Pro:8.1.0/O11019/1529733443:user/release-keys
StorageType : mtp
Userdata State : Encrypted

Autobackup Partitions
-preloader[0x00000000] 512 KB -> preloader.bin...Ok
-> Renaming Preloader.... preloader_k37tv1_64_bsp.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\Condor_Plume L2 Pro_0321--8.1.0_SP633_V08_20180806_271220191106\MT6737T_Andr oid_scatter.txt
-nvram[0x00380000] 5 MB -> nvram.bin...Ok
-frp[0x09A80000] 1024 KB -> frp.bin...Ok
-nvdata[0x09B80000] 32 MB -> nvdata.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\Condor_Plume L2 Pro_0321--8.1.0_SP633_V08_20180806_271220191106
MTK Phone Loader is NOW RUNNING.


Reading System Info
Brand : Condor
Vendor : SPA Condor Electronics
Model : Plume L2 Pro
ID : O11019
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : Plume_L2_Pro-user 8.1.0 O11019 1529733443 release-keys
Device : Plume_L2_Pro
Display ID : SP633_V08_20180806
Security Patch : 2018-07-05
Fingerprint : Condor/Plume_L2_Pro/Plume_L2_Pro:8.1.0/O11019/1529733443:user/release-keys
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition... [Ok]
Formatting Userdata... Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:24
BR
Dipenda Pathak
  Reply With Quote
The Following User Says Thank You to Dipendra Pathak For This Useful Post:
Old 12-28-2020, 07:47   #806 (permalink)
No Life Poster
 
zeeshan ali 786's Avatar
 
Join Date: Apr 2017
Location: pakistan
Posts: 596
Member: 2711874
Status: Offline
Sonork: 100.650600
Thanks Meter: 457
Best tool of world........
  Reply With Quote
Old 12-29-2020, 07:59   #807 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,577
Oppo CPH 1701 FRP Successfully Removed by Hydra Qualcomm Tool

Oppo CPH 1701 FRP Successfully Removed by Hydra Qualcomm Tool

Scree Short:



Logs:

Quote:
PreOperation Configuration
Brand : OPPO Model : A57 (CPH1701) Storage : Auto
Loader: Oppo_A57_8940.mbn
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM4)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&179203b4&0&1#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/31/2015,2.1.2.0

Getting device info......
Serial No.: 0x21999006
MSM ID : 0x0006B0E1, MSM8940-Qualcomm Snapdragon 435
PBL Ver : 00000000
PK HASH : 77A22B92A1BCD0C4D3AAA10AA9F1B2C3
6D51C0CA7429B5201D0FD1D5F5B53BBC

Firehose Loader[Oppo_A57_8940.mbn]
SaharaBoot... Ok
Sending ....................Ok
Connecting to Firehose...
Ping... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 2483590989
Firmware Version : 7
Product Name : RX1BMB
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 61071360[29,121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok

Phone Information.....
Brand : OPPO
Vendor : OPPO
Model : CPH1701
ID : MMB29M
SDK : 23
Release : 6.0.1
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : msm8937_64-user 6.0.1 MMB29M eng.root.20190515.101414 release-keys
Device : CPH1701
Board : QC_Reference_Phone
Display ID : CPH1701EX_11_A.37_190515
Security Patch : 2018-08-05
Emmc_size : 16GB
Platform : msm8937
FRPPST : /dev/block/bootdevice/by-name/config

Reading GPT[3]
Drive [0] 56 Items
Drive [1] 0 Items
Drive [2] 4 Items

Removing FRPta...
Method :
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOkOk

Elapsed Time : 00:00:16
BR
Dipendra Pathak
  Reply With Quote
The Following User Says Thank You to Dipendra Pathak For This Useful Post:
Old 12-29-2020, 08:13   #808 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,577
Xiaomi Note 8 Version 12 Successfully Flashed by Hydra Qualcomm Tool

Xiaomi Note 8 Version 12 Successfully Flashed by Hydra Qualcomm Tool

Screen Short:



Logs:

Quote:
Searching Device By Fastboot
Device Found...

Reading Information...getvar:version FAILED (remote: GetVar Variable Not found)
Product : ginkgo
version : getvar:version FAILED (remote: GetVar Variable Not found)
Secure : yes
Device Info:
Verity mode: true
Device unlocked: false
Device critical unlocked: false
Charger screen enabled: false
--------------------------
Fastboot Flashing...
-qupfw(qupv3fw.elf) Ok
-qupfwbak(qupv3fw.elf) Ok
-vbmeta(vbmeta.img) Ok
-vbmetabak(vbmeta.img) Ok
-xbl_config(xbl_config.elf) Ok
-xbl_configbak(xbl_config.elf) Ok
-devcfg(devcfg.mbn) Ok
-devcfgbak(devcfg.mbn) Ok
-storsec(storsec.mbn) Ok
-rpm(rpm.mbn) Ok
-rpmbak(rpm.mbn) Ok
-hyp(hyp.mbn) Ok
-hypbak(hyp.mbn) Ok
-keymaster(km4.mbn) Ok
-keymasterbak(km4.mbn) Ok
-cmnlib(cmnlib.mbn) Ok
-cmnlib64(cmnlib64.mbn) Ok
-cmnlibbak(cmnlib.mbn) Ok
-cmnlib64bak(cmnlib64.mbn) Ok
-abl(abl.elf) Ok
-ablbak(abl.elf) Ok
-bluetooth(BTFM.bin) Ok
-bluetoothbak(BTFM.bin) Ok
-imagefv(imagefv.elf) Ok
-imagefvbak(imagefv.elf) Ok
-uefisecapp(uefi_sec.mbn) Ok
-uefisecappbak(uefi_sec.mbn) Ok
-xbl(xbl.elf) Ok
-xblbak(xbl.elf) Ok
-tz(tz.mbn) Ok
-tzbak(tz.mbn) Ok
-logfs(logfs_ufs_8mb.bin) Ok
-metadata(metadata.img) Ok
-dtbo(dtbo.img) Ok
-dtbobak(dtbo.img) Ok
-dsp(dspso.bin) Ok
-dspbak(dspso.bin) Ok
-persist(persist.img) Skipped
-boot(boot.img) Ok
-bootbak(boot.img) Ok
-recovery(recovery.img) Ok
-modem(NON-HLOS.bin) Ok
-modembak(NON-HLOS.bin) Ok
-cache(cache.img) Ok
-cust(cust.img) Ok
-vendor(vendor.img) Ok
-system(system.img) Ok
-userdata(userdata.img) Ok
All Done
--------------------------

Elapsed Time : 00:04:38
BR
Dipendra Pathak
  Reply With Quote
The Following User Says Thank You to Dipendra Pathak For This Useful Post:
Old 12-29-2020, 08:22   #809 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,577
Xiaomi Redmi 8A (Olivelite) MI ACCOUNT successfully removed by Hydra Tool

Xiaomi Redmi 8A (Olivelite) MI ACCOUNT successfully removed by Hydra Tool

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : XIAOMI Model : Redmi 8A (olivelite) Storage : Auto
Loader: Xiaomi_Redmi_8_Olive.mbn
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM636)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&a5097e2&0&8#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :07/29/2011,1.0.6.5

Getting device info......
Serial No.: 0x8BA33CF0
MSM ID : 0x000BF0E1, SDM439-Qualcomm Snapdragon 439
PBL Ver : 00000000
PK HASH : 57158EAF1814D78FD2B3105ECE4DB18A
817A08AC664A5782A925F3FF8403D39A

Firehose Loader[Xiaomi_Redmi_8_Olive.mbn]
SaharaBoot... Ok
Sending .......................Ok
Connecting to Firehose...
Ping... Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[o2W15kteyeHawzAC8GUv9P-Uz7A]
Checking Internet connection....
- Hydra Is Online
Connecting to Hydra Xiaomi Server...

Signature @256bytes Authentication.... Accepted......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 3523386334
Firmware Version : 4
Product Name : QD63MB
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 61071360[29.121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok
Reading GPT[3]
Drive [0] 64 Items
Drive [1] 0 Items
Drive [2] 0 Items


Phone Information......
Brand : Xiaomi
Vendor : Xiaomi
Model : Redmi 8A
ID : PKQ1.190319.001
SDK : 28
Release : 9
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-GB
Description : olivelite-user 9 PKQ1.190319.001 V11.0.7.0.PCPMIXM release-keys
Miui Ver : V11
Device : olivelite
Mod_device : olivelite_global
Display ID : ZQL2116-olivelite-build-20200530033821
Security Patch : 2020-05-01
Emmc_size : 16GB
Fingerprint : Xiaomi/olivelite/olivelite:9/PKQ1.190319.001/V11.0.7.0.PCPMIXM:user/release-keys

Processing Remove MiAccount[Patch Method]....
Backing up Partition for safety...Ok

Scanning Patching address...
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]Done!!
Total Items patched : 29
Successfully patched address..
Action Result : Ok

Elapsed Time : 00:00:33
BR
Dipendra Pathak
  Reply With Quote
The Following User Says Thank You to Dipendra Pathak For This Useful Post:
Old 12-29-2020, 08:39   #810 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,577
Infinix X624 (Hot 7) Factory reset done to remove FRP by Hydra Tool

Infinix X624 (Hot 7) Factory reset done to remove FRP by Hydra Tool

Screen Short:



Logs:

Quote:
Brand : INFINIX Model : X624 (Hot 7) Connection : Flash Mode

=====================================
Connection
-Please wait...
-Connect Phone...
-Found...
-PreLoader...[COM12]

TPortConnection.Create...(COM12)..Opening...Ok

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 6580 (0000)MT6580[6580]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
FUSEID : 00000000
SECURE VERSION : 00
BL VERSION : 00
BR Secured : 05
NORMAL BOOT

Preparing Download Agent..
DA : 6580_SP_Tecno.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2017/12/29.10:21_396299
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : Old - eMMC
0000000000000000000000000000
PRMMCCID : 700100464D414545382014E45AD8565D
Init Configuration
Running DA 4.2 on BBID : 0x9C Ok

Initializing Loader [2]
Sending Loader [2] Accepted
Reading Flashchip data....
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003A8000000 -14.625 GB
ERAM Size : 0x0000000040000000 -1024 MB
IRAM Size : 0x0000000000020000 -128 KB
UNICAL RID : 8198D583A4F502E2F55A3308AAFF60A9
eMMC CID : 460001704545414DE41420385D56D85A
Change to HIGH SPEED...
5A
Connection
-Please wait...
-Found...[COM233]


Reading Partition Table
SIZE[0x000009A0] 28 Items > Done

Reading System Info
Brand : Infinix
Vendor : INFINIX MOBILITY LIMITED
Model : Infinix X624
ID : O11019
SDK : 27
Release : 8.1.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-US
Description : full_x624_h8025-user 8.1.0 O11019 1584855331 release-keys
Device : Infinix-X624
Display ID : X624-H8026CDE-OGo-200322V290
Security Patch : 2020-04-05
Fingerprint : Infinix/H8026/Infinix-X624:8.1.0/O11019/CDE-200322V290:user/release-keys
StorageType : mtp
Userdata State : Encrypted

Autobackup Partitions
-preloader[0x00000000] 512 KB -> preloader.bin...Ok
-> Renaming Preloader.... preloader_x624_h8025.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\Infinix_Infinix X624_6580--8.1.0_X624-H8026CDE-OGo-200322V290_281220174149\MT6580_Android_scatter.txt
-nvram[0x00380000] 5 MB -> nvram.bin...Ok
-frp[0x23400000] 1024 KB -> frp.bin...Ok
-nvdata[0x24000000] 32 MB -> nvdata.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\Infinix_Infinix X624_6580--8.1.0_X624-H8026CDE-OGo-200322V290_281220174149
MTK Phone Loader is NOW RUNNING.


Reading System Info
Brand : Infinix
Vendor : INFINIX MOBILITY LIMITED
Model : Infinix X624
ID : O11019
SDK : 27
Release : 8.1.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-US
Description : full_x624_h8025-user 8.1.0 O11019 1584855331 release-keys
Device : Infinix-X624
Display ID : X624-H8026CDE-OGo-200322V290
Security Patch : 2020-04-05
Fingerprint : Infinix/H8026/Infinix-X624:8.1.0/O11019/CDE-200322V290:user/release-keys
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition... [Ok] Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:47
BR
Dipendra Pathak
  Reply With Quote
Reply

Bookmarks

Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


 



All times are GMT +1. The time now is 16:42.



Powered by Searchlight © 2022 Axivo Inc.
vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2022 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2017 -
Page generated in 0.20786 seconds with 8 queries

SEO by vBSEO