GSM Shop GSM Shop
GSM-Forum  

Welcome to the GSM-Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features.
Only registered members may post questions, contact other members or search our database of over 8 million posts.

Registration is fast, simple and absolutely free so please - Click to REGISTER!

If you have any problems with the registration process or your account login, please contact contact us .

Go Back   GSM-Forum > Product Support Sections > Special Solutions / Services / WebShop > GSMFABRICA Products > HYDRA TOOL


Reply
 
LinkBack Thread Tools Display Modes
Old 12-30-2020, 08:49   #826 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Full Dump File by Hydra Tool successfully Written in Cellphone's memory by Hydra


Full Dump File by Hydra Tool successfully Written in Cellphone's memory by Hydra Main Tool


Screen Short:



Logs:


Quote:
Cylinders : 1900
Tracks Per Cylinder : 255
Sectors Per Track : 63
Bytes Per Sector : 512
DriveSize : 15628032000- 14.555 GB
Total Disk Size : 15634268160- 14.561 GB


EMMC Full Dump Write..
Restore Dump...
C:\Hydra Tool\Backup\EMMC\FullDump\12292020-212303\FullDump.bin
Please wait until done.........
Writing to phone........Ok

Elapsed Time : 00:18:41
BR
Dipendra Pathak
  Reply With Quote
The Following User Says Thank You to Dipendra Pathak For This Useful Post:
Old 12-30-2020, 08:59   #827 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Cherry Flare Y3 FRP successfully removed with zero wipe by Hydra Tool

Cherry Flare Y3 FRP successfully removed with zero wipe by Hydra Tool

Screen Short:




Logs:


Quote:
Brand : AUTO Model : AUTO Connection : Flash Mode

=====================================
Connection
-Please wait...
-Connect Phone...
-Found...
-PreLoader...[COM43]

TPortConnection.Create...(COM43)..Opening...Ok

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 6580 (0000)MT6580[6580]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 40001002
FUSEID : 40001002
SECURE VERSION : FF
BL VERSION : 01
BR Secured : 00

Preparing Download Agent..
DA : 6580.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2018-09-18.13:22_452898
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : Old - eMMC
0000000000000000000000000000
PRMMCCID : 4501004447343030380183F8A309B505
Init Configuration
Running DA 4.2 on BBID : 0x9C Ok

Initializing Loader [2]
Sending Loader [2] Accepted
Reading Flashchip data....
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000001D21D0000 -7.283 GB
ERAM Size : 0x0000000040000000 -1024 MB
IRAM Size : 0x0000000000020000 -128 KB
UNICAL RID : 238CDEE9197DFB4C250CC8E324602BEC
eMMC CID : 4400014530303447F883013805B509A3
Change to HIGH SPEED...
5A
Connection
-Please wait...
-Found...[COM44]


Reading Partition Table
SIZE[0x000008F0] 26 Items > Done

Reading System Info
Brand : Cherry_Mobile
Vendor : Cherry Mobile
Model : Flare_Y3
ID : O11019
SDK : 27
Release : 8.1.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-US
Description : full_k80hd_bsp_fwv_512m-user 8.1.0 O11019 1535537755 release-keys
Device : FlareY3
Display ID : Cherry_Flare_Y3_08312018_V06
Security Patch : 2018-08-05
Fingerprint : Cherry_Mobile/FlareY3/FlareY3:8.1.0/O11019/1535537755:user/release-keys
StorageType : mtp
Userdata State : Encrypted

Autobackup Partitions
-preloader[0x00000000] 512 KB -> preloader.bin...Ok
-> Renaming Preloader.... preloader_k80hd_bsp_fwv_512m.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\Cherry_Mobile_Flare_Y3_6580--8.1.0_Cherry_Flare_Y3_08312018_V06_291220113640\MT 6580_Android_scatter.txt
-nvram[0x00380000] 5 MB -> nvram.bin...Ok
-frp[0x18C00000] 1024 KB -> frp.bin...Ok
-nvdata[0x19700000] 32 MB -> nvdata.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\Cherry_Mobile_Flare_Y3_6580--8.1.0_Cherry_Flare_Y3_08312018_V06_291220113640
MTK Phone Loader is NOW RUNNING.


Reading System Info
Brand : Cherry_Mobile
Vendor : Cherry Mobile
Model : Flare_Y3
ID : O11019
SDK : 27
Release : 8.1.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-US
Description : full_k80hd_bsp_fwv_512m-user 8.1.0 O11019 1535537755 release-keys
Device : FlareY3
Display ID : Cherry_Flare_Y3_08312018_V06
Security Patch : 2018-08-05
Fingerprint : Cherry_Mobile/FlareY3/FlareY3:8.1.0/O11019/1535537755:user/release-keys
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition... [Ok] Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:29
BR
Dipendra Pathak
  Reply With Quote
The Following User Says Thank You to Dipendra Pathak For This Useful Post:
Old 12-30-2020, 09:08   #828 (permalink)
No Life Poster
 
Join Date: Apr 2017
Location: pakistan
Posts: 595
Member: 2711874
Status: Offline
Sonork: 100.650600
Thanks Meter: 462
best tool of world..............thanks hydra tool
  Reply With Quote
Old 12-30-2020, 16:50   #829 (permalink)
No Life Poster
 
Malik Shani G's Avatar
 
Join Date: Jul 2020
Location: pakistan daska
Age: 29
Posts: 672
Member: 2963610
Status: Offline
Thanks Meter: 560
QMOBILE I6I READ PATTERN DONE BY HYDRA TOOL
  Reply With Quote
The Following 2 Users Say Thank You to Malik Shani G For This Useful Post:
Old 01-02-2021, 12:23   #830 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Techno LA6 Pouvoir 1 FRP successfully Removed by Hydra Tool

Techno LA6 Pouvoir 1 FRP successfully Removed by Hydra Tool




Screen Short:




Logs:


Quote:
Brand : TECNO Model : LA6 (Pouvoir 1) Connection : Flash Mode

=====================================
Connection
-Please wait...
-Connect Phone...
-Found...
-PreLoader...[COM12]

TPortConnection.Create...(COM12)..Opening...Ok

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 6580 (0000)MT6580[6580]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00001002
FUSEID : 00001002
SECURE VERSION : FF
BL VERSION : 01
BR Secured : 00

Preparing Download Agent..
DA : [Not Exist]
Trying Default 6580.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2018-09-18.13:22_452898
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : Old - eMMC
0000000000000000000000000000
PRMMCCID : 150100464536324D42034CEAD3AC3585
Init Configuration
Running DA 4.2 on BBID : 0x9C Ok

Initializing Loader [2]
Sending Loader [2] Accepted
Reading Flashchip data....
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003A3E00000 -14.561 GB
ERAM Size : 0x0000000040000000 -1024 MB
IRAM Size : 0x0000000000020000 -128 KB
UNICAL RID : C0D96CA74F5F5188A38328BF45EF8B97
eMMC CID : 460001154D323645EA4C03428535ACD3
Change to HIGH SPEED...
5A
Connection
-Please wait...
-Found...[COM233]


Reading Partition Table
SIZE[0x00000738] 21 Items > Done

Reading System Info
Brand : TECNO
Vendor : TECNO
Model : TECNO LA6
ID : NRD90M
SDK : 24
Release : 7.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-US
Description : full_rlk6580_weg_n-user 7.0 NRD90M 1521453186 release-keys
Device : TECNO-LA6
Display ID : LA6-H8021AC-N-180319V91
Security Patch : 2018-02-05
Platform : mt6580
FRPPST : /dev/block/platform/mtk-msdc.0/11120000.msdc0/by-name/frp
Fingerprint : TECNO/H8021/TECNO-LA6:7.0/NRD90M/AC-180319V91:user/release-keys
StorageType : mtp
Userdata State : Encrypted

Autobackup Partitions
-preloader[0x00000000] 512 KB -> preloader.bin...Ok
-> Renaming Preloader.... preloader_rlk6580_weg_n.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\TECNO_TECNO LA6_6580-mt6580-7.0_LA6-H8021AC-N-180319V91_301220175758\MT6580_Android_scatter.txt
-nvram[0x00380000] 5 MB -> nvram.bin...Ok
-frp[0x04FA0000] 1024 KB -> frp.bin...Ok
-nvdata[0x050A0000] 32 MB -> nvdata.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\TECNO_TECNO LA6_6580-mt6580-7.0_LA6-H8021AC-N-180319V91_301220175758
MTK Phone Loader is NOW RUNNING.


Reading System Info
Brand : TECNO
Vendor : TECNO
Model : TECNO LA6
ID : NRD90M
SDK : 24
Release : 7.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-US
Description : full_rlk6580_weg_n-user 7.0 NRD90M 1521453186 release-keys
Device : TECNO-LA6
Display ID : LA6-H8021AC-N-180319V91
Security Patch : 2018-02-05
Platform : mt6580
FRPPST : /dev/block/platform/mtk-msdc.0/11120000.msdc0/by-name/frp
Fingerprint : TECNO/H8021/TECNO-LA6:7.0/NRD90M/AC-180319V91:user/release-keys
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition... [Ok] Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:57



BR
Dipendra PathaK

  Reply With Quote
Old 01-02-2021, 12:26   #831 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Xioami Redmi Note 5A Mi-Account bypassing Anti-relock Method by Hydra Tool

Xioami Redmi Note 5A Mi-Account bypassing Anti-relock Method by Hydra Tool


Screen Short:




Logs:

Quote:
Starting ADB Server....
Searching Device By ADB
Device Found...
Model : Redmi Note 5A
Brand : Xiaomi
Android Ver : 7.1.2
CPU abi : arm64-v8a
Software Version :
CSC Version :
Bootloader :
Board : QC_Reference_Phone
Display ID : N2G47H
Security Patch : 2017-12-01
Emmc_size : 16GB
Platform : msm8937
Kernel ID : 2017-12-01
Marketname :
OTA Version Name :
SYS USB CONFIG : persist.mtp,adb
FRPPST : /dev/block/bootdevice/by-name/config
FingerPrint : xiaomi/ugglite/ugglite:7.1.2/N2G47H/V9.2.1.0.NDFMIEK:user/release-keys

Checking Root Status....
Root Status : Not Rooted

ADB MiAccount...

Processing...
Disbaling MI Account
Please wait...
Disabled Mi Account Success
Action Result : Ok


Elapsed Time : 00:00:05
BR
Dipendra Pathak

  Reply With Quote
Old 01-02-2021, 12:30   #832 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Xiaomi Readmi Note 8 ginkgo FRP successfully removed by Hydra Tool


Screen Short






Logs:




Quote:
PreOperation Configuration
Brand : XIAOMI Model : Redmi Note 8 (ginkgo) Storage : Auto
Loader: Xiaomi_redminote8_loader.elf
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM11)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&ebe05f0&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :03/25/2016,2.1.2.2

Getting device info......
Serial No.: 0x3AA30834
MSM ID : 0x0010A0E1, SM6125-Qualcomm Snapdragon 665
PBL Ver : 00000000
PK HASH : 1BEBE3863A6781DB4B01086063007334
DE9E5CA14971C7C4F4358EC9D79CDA46

Firehose Loader[Xiaomi_redminote8_loader.elf]
SaharaBoot... Ok
Sending ..............................Ok
Connecting to Firehose...
Ping..................... Ok
Configuration.........
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Jul 3 2019 - 22:23:56

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 19
Serial Number : 371878663
Firmware Version : 4
Product Name : S0J9K9
Physical Partitions : 4
Total Logical Blocks:
Drive [0] 244285440[116,484 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Drive [3] 32768[16 MB]

Protocol : Universal
Running : Ok

Phone Information......
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi Note 8
ID : PKQ1.190616.001
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : ginkgo-user 9 PKQ1.190616.001 V11.0.12.0.PCOMIXM release-keys
Miui Ver : V11
Device : ginkgo
Mod_device : ginkgo_global
Display ID : PKQ1.190616.001
Security Patch : 2020-11-01
Fingerprint : xiaomi/ginkgo/ginkgo:9/PKQ1.190616.001/V11.0.12.0.PCOMIXM:user/release-keys

Reading GPT[4]
Drive [0] 88 Items
Drive [1] 0 Items
Drive [2] 0 Items
Drive [3]

Removing FRPta...
Method :
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOkOk

Elapsed Time : 00:00:07

BR
Dipendra Pathak
  Reply With Quote
Old 01-02-2021, 12:34   #833 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Xiaomi Redmi Note 9 Merlin Nvram and Nvdata written successfully by Hydra Tool

Xiaomi Redmi Note 9 Merlin Nvram and Nvdata written successfully by Hydra Tool

Screen Screen




Logs:
Quote:
Brand : XIAOMI Model : Redmi Note 9 (merlin) Connection : Flash Mode

=====================================
How To Boot : Power off phone
* BROM Mode : Press VOL +
* Preloader Mode : Just Insert cable

Connection
-Please wait...
-Connect Phone...
-Found...
-PreLoader...[COM3]

TPortConnection.Create...(COM3)..Opening...Ok


Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0707 (0000)MT6768[6768]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
SECURE VERSION : FF
BL VERSION : 03
BR Secured : 07

Preparing Download Agent..
DA : MT6768_Xiaomi_New.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2020/07/07.10:10_513994
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : preloader

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC
Sending Certifificate

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 6952A55FAA411617FCB3F4C6AD1A5DBC
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
UFS LU0 Size: 0x0000000000000000 -0 Bytes
UFS LU1 Size: 0x0000000000000000 -0 Bytes
UFS LU2 Size: 0x0000000000000000 -0 Bytes
UFS CID :
UFS UNIQID :

DA Speed : high-speed
DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader....
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x05508000]1024 KB ->frp.bin...Ok
-nvdata[0x0C4A2000]64 MB ->nvdata.bin...Ok
-persist[0x104A2000]48 MB ->persist.bin...Ok
-nvram[0x19F80000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\__0707--__301220150804
MTK Phone Loader is NOW RUNNING.

Reading GPT-EMMC [0x00008000] 130 Items

Flashing Selected Partitions....
- preloader[preloader_merlin.bin] 256 KB Skipped
- nvdata[nvdata.bin] 64 MB Flash -> = Ok
- nvram[nvram.bin] 64 MB Flash -> = Ok

TPortConnection.Destroy.....Closing...Ok..
=====================================

Elapsed Time : 00:05:24





BR
Dipendra Pathak

  Reply With Quote
Old 01-02-2021, 12:38   #834 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Xiaomi Mi Max FRP successfully Removed by Hydra Tool

Xiaomi Mi Max FRP successfully Removed by Hydra Tool

Screen Short:





Logs:

Quote:
PreOperation Configuration
Brand : XIAOMI Model : Mi Max (Hydrogen) Storage : Auto
Loader: mi_0_4.mbn
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM3)
SymbolicName :\??\USB#VID_05C6&PID_9008#6&23ec904f&0&3#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :03/21/2018,2.1.3.1

Getting device info......
Serial No.: 0x0548CBC8
MSM ID : 0x009B00E1, MSM8956-Qualcomm Snapdragon 650
PBL Ver : 00000000
PK HASH : 57158EAF1814D78FD2B3105ECE4DB18A
817A08AC664A5782A925F3FF8403D39A

Firehose Loader[mi_0_4.mbn]
SaharaBoot... Ok
Sending ..................Ok
Connecting to Firehose...
Ping... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8976
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 1125776998
Firmware Version : 7
Product Name : BJNB4R
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 61071360[29,121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok
Reading GPT[3]
Drive [0] 68 Items
Drive [1] 0 Items
Drive [2] 0 Items


Phone Information.....
Brand : Xiaomi
Vendor : Xiaomi
Model : MI MAX
ID : NRD90M
SDK : 24
Release : 7.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : hydrogen-user 7.0 NRD90M V10.2.2.0.NBCMIXM release-keys
Miui Ver : V10
Device : hydrogen
Mod_device : hydrogen_global
Board : msm8952
Display ID : NRD90M
Security Patch : 2018-04-01
Platform : msm8952
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : Xiaomi/hydrogen/hydrogen:7.0/NRD90M/V10.2.2.0.NBCMIXM:user/release-keys

Processing Remove MiAccount[Patch Method]....
Backing up Partition for safety...Ok

Scanning Patching address...
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]Done!!
Total Items patched : 3
Successfully patched address..
Failed to find persistbakpartition
Action Result : Ok

Elapsed Time : 00:00:13
BR
Dipendra Pathak

  Reply With Quote
Old 01-02-2021, 12:41   #835 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Xiaomi Readmi 10X 4G Merlin writing NVdata and Nvram successfully done Hydra Tool

Xiaomi Readmi 10X 4G Merlin writing NVdata and Nvram successfully done Hydra Tool

Screen Short:





Logs:
Quote:
Brand : XIAOMI Model : Redmi 10X 4G (merlin) Connection : Flash Mode

=====================================
How To Boot : Power off phone
* BROM Mode : Press VOL +
* Preloader Mode : Just Insert cable

Connection
-Please wait...
-Connect Phone...
-Found...
-PreLoader...[COM142]

TPortConnection.Create...(COM142)..Opening...Ok


Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0707 (0000)MT6768[6768]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
SECURE VERSION : FF
BL VERSION : 03
BR Secured : 07

Preparing Download Agent..
DA : MT6768_Xiaomi_New.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2020/07/07.10:10_513994
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : preloader

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC
Sending Certifificate

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : EFE81655E0EEFE7A6758DF557CC1CC4B
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
UFS LU0 Size: 0x0000000000000000 -0 Bytes
UFS LU1 Size: 0x0000000000000000 -0 Bytes
UFS LU2 Size: 0x0000000000000000 -0 Bytes
UFS CID :
UFS UNIQID :

DA Speed : high-speed
DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items
MTK Phone Loader is NOW RUNNING.

Reading GPT-EMMC [0x00008000] 130 Items

Flashing Selected Partitions....
- preloader[preloader_merlin.bin] 256 KB Skipped
- nvdata[nvdata.bin] 64 MB Flash -> = Ok
- nvram[nvram.bin] 64 MB Flash -> = Ok

TPortConnection.Destroy.....Closing...Ok..
=====================================

Elapsed Time : 00:00:21





BR
Dipendra Pathak
  Reply With Quote
Old 01-02-2021, 12:43   #836 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
CloudFone Thrill HD ScreenLock successfully remove Without Data Loss by Hydra Tool

CloudFone Thrill HD ScreenLock successfully remove Without Data Loss by Hydra Tool


Screen Short:




Logs:
Quote:
Brand : AUTO Model : AUTO Connection : Flash Mode

=====================================
Connection
-Please wait...
-Found...
-PreLoader...[COM30]

TPortConnection.Create...(COM30)..Opening...Ok

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 6580 (0000)MT6580[6580]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
FUSEID : 00000000
SECURE VERSION : 00
BL VERSION : 00
BR Secured : 00
NORMAL BOOT

Preparing Download Agent..
DA : 6580.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2018-09-18.13:22_452898
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : Old - eMMC
0000000000000000000000000000
PRMMCCID : 450100445331303038013D943E10A2F9
Init Configuration
Running DA 4.2 on BBID : 0x9C Ok

Initializing Loader [2]
Sending Loader [2] Accepted
Reading Flashchip data....
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000001D2000000 -7.281 GB
ERAM Size : 0x0000000040000000 -1024 MB
IRAM Size : 0x0000000000020000 -128 KB
UNICAL RID : E1997FA206C89FD161ABD0CC0961836A
eMMC CID : 4400014530303153943D0138F9A2103E
Change to HIGH SPEED...
5A
Connection
-Please wait...
-Found...[COM40]


Reading Partition Table
SIZE[0x00000738] 21 Items > Done

Reading System Info
Brand : CloudFone
Vendor : CloudFone
Model : Thrill HD
ID : MRA58K
SDK : 23
Release : 6.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Description : full_v3702-user 6.0 MRA58K 1458214920 release-keys
Device : ThrillHD
Board : ThrillHD
Display ID : ThrillHD_FS20160310_V05
Security Patch : 2016-02-01
Platform : mt6580
FRPPST : /dev/block/platform/mtk-msdc.0/11120000.msdc0/by-name/frp
Fingerprint : alps/V3702AN/V3702AN:6.0/MRA58K/1458214920:user/release-keys
StorageType : mtp,mass_storage
Userdata State : Not Encrypted

Autobackup Partitions
-preloader[0x00000000] 512 KB -> preloader.bin...Ok
-> Renaming Preloader.... preloader_v3702.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\CloudFone_Thrill HD_6580-mt6580-6.0_ThrillHD_FS20160310_V05_301220145104\MT6580_An droid_scatter.txt
-nvram[0x00380000] 5 MB -> nvram.bin...Ok
-frp[0x04FA0000] 1024 KB -> frp.bin...Ok
-nvdata[0x050A0000] 32 MB -> nvdata.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\CloudFone_Thrill HD_6580-mt6580-6.0_ThrillHD_FS20160310_V05_301220145104
MTK Phone Loader is NOW RUNNING.


Reading System Info
Brand : CloudFone
Vendor : CloudFone
Model : Thrill HD
ID : MRA58K
SDK : 23
Release : 6.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Description : full_v3702-user 6.0 MRA58K 1458214920 release-keys
Device : ThrillHD
Board : ThrillHD
Display ID : ThrillHD_FS20160310_V05
Security Patch : 2016-02-01
Platform : mt6580
FRPPST : /dev/block/platform/mtk-msdc.0/11120000.msdc0/by-name/frp
Fingerprint : alps/V3702AN/V3702AN:6.0/MRA58K/1458214920:user/release-keys
StorageType : mtp,mass_storage
Userdata State : Not Encrypted

-------------------------------------
Operation : Remove Lock Without Data Loss
Processing...
Searching patching address.. [Ok].. [Ok].. [Ok].. [Ok].. [Ok] Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:26



BR
Dipendra Pathak
  Reply With Quote
Old 01-02-2021, 12:56   #837 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Vivo Y95 (1807) Screen Lock successfully removed by Hydra Tool

Vivo Y95 (1807) Screen Lock successfully removed by Hydra Tool


Screen Short:




Logs:


Quote:
PreOperation Configuration
Brand : VIVO Model : Y95 (1807) Storage : Auto
Loader: Vivo_Y95_8937.mbn
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM34)
SymbolicName :\??\USB#VID_05C6&PID_9008#6&192dbed9&0&1#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/02/2017,2.1.2.7

Getting device info......
Serial No.: 0x011F114C
MSM ID : 0x000BF0E1, SDM439-Qualcomm Snapdragon 439
PBL Ver : 00000000
PK HASH : 60BA997FEF6DA9F05885FA11F1DD6D2A
90D052A257A09C2075D7246CC73C0D43

Firehose Loader[Vivo_Y95_8937.mbn]
SaharaBoot... Ok
Sending ...................Ok
Connecting to Firehose...
Ping... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 1278231678
Firmware Version : 167
Product Name : HCG8a4
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 122142720[58.242 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok
Reading GPT[3]
Drive [0] 60 Items
Drive [1] 0 Items
Drive [2] 0 Items


Phone Information.....
Brand : vivo
Vendor : vivo
Model : vivo 1807
ID : OPM1.171019.026
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : msm8937_64-user 8.1.0 OPM1.171019.026 eng.compil.20201103.204126 release-keys
Device : msm8937_64
Display ID : OPM1.171019.026 release-keys
Security Patch : 2020-10-01
Emmc_size : 16GB
Platform : =SDM439
Fingerprint : vivo/1807/1807:8.1.0/OPM1.171019.026/compil11032041:user/release-keys

Processing Forced Erase....
- Removing FRP [Drive 0] Ok
- Forced Erase Userdata
Action Result : Ok

Rebooting Phone.... Ok

Elapsed Time : 00:00:11
BR
Dipendra Pathak
  Reply With Quote
Old 01-02-2021, 12:59   #838 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Xiaomi Redmi 7a Pine Erasing Security successfully by Hydra Tool

Xiaomi Redmi 7a Pine Erasing Security successfully by Hydra Tool


Screen Short:




Logs:


Quote:
PreOperation Configuration
Brand : XIAOMI Model : Redmi 7A (pine) Storage : Auto
Loader: Xiaomi_Redmi_8_Olive.mbn
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM24)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&eb20011&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/02/2017,2.1.2.7

Getting device info......
Serial No.: 0x5978339E
MSM ID : 0x000BF0E1, SDM439-Qualcomm Snapdragon 439
PBL Ver : 00000000
PK HASH : 57158EAF1814D78FD2B3105ECE4DB18A
817A08AC664A5782A925F3FF8403D39A

Firehose Loader[Xiaomi_Redmi_8_Olive.mbn]
SaharaBoot... Ok
Sending .......................Ok
Connecting to Firehose...
Ping... Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[KNE7CcaG1wq7eWswT7lLvJRkt2W]
Checking Internet connection....
- Hydra Is Online
Connecting to Hydra Xiaomi Server...

Signature @256bytes Authentication.... Accepted......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 1033945733
Firmware Version : 909127728
Product Name : hB8aP>
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 61071360[29,121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok
Reading GPT[3]
Drive [0] 60 Items
Drive [1] 0 Items
Drive [2] 0 Items

Processing Erase Security....

Backup Security partitions...
Reading Security Items....
> modemst1
> modemst2
> fsg
C:\Hydra Tool\Backup\Security_Backup\___Security_1230200150 45.sec
Backup Security Success....
Action Result : Ok

Elapsed Time : 00:00:18
BR
Dipendra Pathak
  Reply With Quote
Old 01-02-2021, 13:03   #839 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Xiaomi Redmi 7A (Pine) MI-Account successfully removed by Hydra Tool

Xiaomi Redmi 7A (Pine) MI-Account successfully removed by Hydra Tool


Screen Short:





Logs:
Quote:
PreOperation Configuration
Brand : XIAOMI Model : Redmi 7A (pine) Storage : Auto
Loader: Xiaomi_Redmi_8_Olive.mbn
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM68)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&2679771a&0&2#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :03/25/2016,2.1.2.2

Getting device info......
Serial No.: 0xFEC9C803
MSM ID : 0x000BF0E1, SDM439-Qualcomm Snapdragon 439
PBL Ver : 00000000
PK HASH : 57158EAF1814D78FD2B3105ECE4DB18A
817A08AC664A5782A925F3FF8403D39A

Firehose Loader[Xiaomi_Redmi_8_Olive.mbn]
SaharaBoot... Ok
Sending .......................Ok
Connecting to Firehose...
Ping... Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[ca9bp-DncIYGhcy1yCfnkqSbExM]
Checking Internet connection....
- Hydra Is Online
Connecting to Hydra Xiaomi Server...

Signature @256bytes Authentication.... Accepted......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 241339554
Firmware Version : 875573296
Product Name : hB8aP>
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 61071360[29,121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok
Reading GPT[3]
Drive [0] 60 Items
Drive [1] 0 Items
Drive [2] 0 Items


Phone Information......
Brand : Xiaomi
Vendor : Xiaomi
Model : Redmi 7A
ID : PKQ1.190319.001
SDK : 28
Release : 9
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-GB
Description : pine-user 9 PKQ1.190319.001 V11.0.5.0.PCMMIXM release-keys
Miui Ver : V11
Device : pine
Mod_device : pine_global
Display ID : ZQL1533-pine-build-20191126161134
Security Patch : 2019-11-01
Emmc_size : 16GB
Fingerprint : Xiaomi/pine/pine:9/PKQ1.190319.001/V11.0.5.0.PCMMIXM:user/release-keys

Processing Remove MiAccount[Patch Method]....
Backing up Partition for safety...Ok

Scanning Patching address...
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]Done!!
Total Items patched : 3
Successfully patched address..
Action Result : Ok

Elapsed Time : 00:00:36


BR
Dipendra Pathak
  Reply With Quote
Old 01-02-2021, 13:06   #840 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Xiaomi Redmi Note 9 Merlin Zero FRP successfully removed by Hydra Tool

Xiaomi Redmi Note 9 Merlin Zero FRP successfully removed by Hydra Tool

Screen Short




Logs


Quote:
Brand : XIAOMI Model : Redmi Note 9 (merlin) Connection : Flash Mode

=====================================
Connection
-Please wait...
-Found...
-PreLoader...[COM41]

TPortConnection.Create...(COM41)..Opening...Ok

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : EC710217442D23ACA7BA4EDA939B6CD6
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
UFS LU0 Size: 0x0000000000000000 -0 Bytes
UFS LU1 Size: 0x0000000000000000 -0 Bytes
UFS LU2 Size: 0x0000000000000000 -0 Bytes
UFS CID :
UFS UNIQID :

Reading GPT-EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition... Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:04
BR
Dipendra Pathak
  Reply With Quote
Reply

Bookmarks


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


 



All times are GMT +1. The time now is 11:23.



Powered by Searchlight © 2024 Axivo Inc.
vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2024 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2023 -
Page generated in 0.48226 seconds with 10 queries

SEO by vBSEO