GSM Shop GSM Shop
GSM-Forum  

Welcome to the GSM-Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features.
Only registered members may post questions, contact other members or search our database of over 8 million posts.

Registration is fast, simple and absolutely free so please - Click to REGISTER!

If you have any problems with the registration process or your account login, please contact contact us .

Go Back   GSM-Forum > Product Support Sections > Special Solutions / Services / WebShop > GSMFABRICA Products > HYDRA TOOL


Reply
 
LinkBack Thread Tools Display Modes
Old 01-17-2021, 02:05   #931 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Samsung GT-I9128E wipe-Format user data successfully done by Hydra Tool


Samsung GT-I9128E wipe-Format user data successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
Scanning port....
TPortConnection.Create...(COM24)..Opening...Ok
Device Mode : Download Mode
CPU : QUALCOMM
Format Userdata
Auto
SamFormatUDAuto
Total Binary Size is 0.25MB
Initialize Phone : Ok
Partition Information Table(PIT)
- Backup
Backup PIT (COM_TAR2MSM8916) Ok
- Reading.. Ok
- Mapping..Ok
Successfully Formatted!!!

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:11
BR
Dipendra Pathak

  Reply With Quote
Old 01-17-2021, 02:11   #932 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Xiaomi Redmi S2 (ysl) MI Account successfully Removed by Hydra Tool

Xiaomi Redmi S2 (ysl) MI Account successfully Removed by Hydra Tool

Screen Short:



Logs:

Quote:
Starting ADB Server....
Searching Device By ADB
Device Found...
Model : Redmi S2
Brand : Xiaomi
Android Ver : 8.1.0
CPU abi : armeabi-v7a
Software Version :
CSC Version :
Bootloader :
Board : ysl
Display ID : OPM1.171019.011
Security Patch : 2019-01-01
Emmc_size : 16GB
Platform : msm8953
Kernel ID : 2019-01-01
Marketname :
OTA Version Name :
SYS USB CONFIG : persist.adb
FRPPST : /dev/block/bootdevice/by-name/config
FingerPrint : xiaomi/ysl/ysl:8.1.0/OPM1.171019.011/9.1.17:user/release-keys

Checking Root Status....
Root Status : Not Rooted

ADB MiAccount...

Processing...
Disbaling MI Account
Please wait...
Disabled Mi Account Success
Action Result : Ok

Elapsed Time : 00:00:01
BR
Dipendra Pathak

  Reply With Quote
The Following User Says Thank You to Dipendra Pathak For This Useful Post:
Old 01-17-2021, 02:15   #933 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Xiaomi Mi Max 3 (Nitrogen) Successfully Flashed by Hydra Tool

Xiaomi Mi Max 3 (Nitrogen) Successfully Flashed by Hydra Tool

Screen Short:



Logs:

Quote:
Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM1471)
SymbolicName :\??\USB#VID_05C6&PID_9008#6&22c63a7c&0&3#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :03/19/2014,2.1.1.2

Getting device info......
Serial No.: 0x1DA6B582
MSM ID : 0x000CC0E1,
PBL Ver : 00000000
PK HASH : A7B8B82545A98ECA23D6E9105FB46456
8D1B5828264903441BDEF0CD57E3C370

Firehose Loader[mi_2_9.elf]
SaharaBoot... Ok
Sending ...............................Ok
Connecting to Firehose...
Ping......... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : MSM8996
Version : 1
DateTime : Aug 2 2018 - 22:27:53

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 1198086770
Firmware Version : 162
Product Name : HCG8a4
Physical Partitions : 4
Total Logical Blocks:
Drive [0] 122142720[58,242 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Drive [3] 8192[4 MB]

Protocol : Universal
Running : Ok

Phone Information......
Vendor : Xiaomi
ID : QKQ1.190910.002
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Miui Ver : V12
Mod_device : nitrogen_global
Security Patch : 2020-08-01

Reading GPT[4]
Drive [0] 80 Items
Drive [1] 0 Items
Drive [2] 0 Items
Drive [3] ERROR: Failed to open the device 1 slot 0 partition 0


Backup Security partitions...
Reading Security Items....
> modemst1
> modemst2
> fsg
C:\Hydra Tool\Backup\Security_Backup\__10_Security_01162114 5202.sec
Backup Security Success....

----------------------------
Flashing Selected Partitions....
- switch(0)[dummy.img]
No response from phone... Failed
Operation : Setbootablestoragedrive: Drive 0
Set bootable storage drive 0 Ok

Rebooting Phone.... Ok

Elapsed Time : 00:00:23
BR
Dipendra Pathak

  Reply With Quote
The Following User Says Thank You to Dipendra Pathak For This Useful Post:
Old 01-17-2021, 02:18   #934 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Cherry Mobile Flare P1 Plus FRP successfully removed by Hydra Tool

Cherry Mobile Flare P1 Plus FRP successfully removed by Hydra Tool

Screen Short:



Logs:

Quote:
Brand : CHERRY MOBILE Model : Flare P1 Plus Connection : Flash Mode

=====================================
Connection
-Please wait...
-Connect Phone...
-Found...[COM18]

TPortConnection.Create...(COM18)..Opening...Ok

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0321 (0000)MT6737T[6735]
BROM HW_SW_VER : 8A00 CC00 0000 0000
FUSEID : 00000000
FUSEID : 00000000
SECURE VERSION : 00
BL VERSION : 00
BR Secured : 00
NORMAL BOOT

Preparing Download Agent..
DA : [Not Exist]
Trying Default 6735.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2018-09-18.13:22_452898
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : Old - eMMC
00000000000000000000
PRMMCCID : 4500017045434148A9110141C712486C
Init Configuration
Running DA 4.2 on BBID : 0x9B

Scanning Init Database...
preloader_a3a64g.bin
FLASH Chip Initialization
C:\Users\Rakimaru\Desktop\HydraTool_Fullpackage_9-22-2020\BOOT\PREL\preloader_a3a64g.bin
ERROR : EMMI Settings
14Accepted Ok

Initializing Loader [2]
Sending Loader [2] Accepted
Reading Flashchip data....
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000390000000 -14.25 GB
ERAM Size : 0x0000000080000000 -2 GB
IRAM Size : 0x0000000000020000 -128 KB
UNICAL RID : 3D49BF9C6B8FE91A3700155EBDCEE856
eMMC CID : 4500017045434148A9110141C7B3486C
Change to HIGH SPEED...
5A
Connection
-Please wait...
-Found...[COM15]


Reading Partition Table
SIZE[0x000007E8] 23 Items > Done

Reading System Info
Brand : Cherry_Mobile
Vendor : Cherry_Mobile
Model : Flare P1 Plus
ID : NRD90M
SDK : 24
Release : 7.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-US
Description : full_t587_cherry_n_37t36-user 7.0 NRD90M 1495798412 release-keys
Device : Flare_P1_Plus
Board : Cherry
Display ID : Cherry_Mobile_Flare_P1_Plus_V09_05262017
Security Patch : 2017-05-05
Platform : mt6737t
FRPPST : /dev/block/platform/mtk-msdc.0/11230000.msdc0/by-name/frp
Fingerprint : Cherry_Mobile/Flare_P1_Plus/Flare_P1_Plus:7.0/NRD90M/1489578972:user/release-keys
StorageType : mtp
Userdata State : Encrypted

Autobackup Partitions
-preloader[0x00000000] 512 KB -> preloader.bin...Ok
-> Renaming Preloader.... preloader_t587_cherry_n_37t36.bin
Creating Scatter file... C:\Users\Rakimaru\Desktop\HydraTool_Fullpackage_9-22-2020\\Backup\Auto\Cherry_Mobile_Flare P1 Plus_0321-mt6737t-7.0_Cherry_Mobile_Flare_P1_Plus_V09_05262017_16012 1170423\MT6737T_Android_scatter.txt
-nvram[0x00380000] 5 MB -> nvram.bin...Ok
-frp[0x06A00000] 1024 KB -> frp.bin...Ok
-nvdata[0x06B00000] 32 MB -> nvdata.bin...Ok
Done!!!
C:\Users\Rakimaru\Desktop\HydraTool_Fullpackage_9-22-2020\\Backup\Auto\Cherry_Mobile_Flare P1 Plus_0321-mt6737t-7.0_Cherry_Mobile_Flare_P1_Plus_V09_05262017_16012 1170423
MTK Phone Loader is NOW RUNNING.


Reading System Info
Brand : Cherry_Mobile
Vendor : Cherry_Mobile
Model : Flare P1 Plus
ID : NRD90M
SDK : 24
Release : 7.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-US
Description : full_t587_cherry_n_37t36-user 7.0 NRD90M 1495798412 release-keys
Device : Flare_P1_Plus
Board : Cherry
Display ID : Cherry_Mobile_Flare_P1_Plus_V09_05262017
Security Patch : 2017-05-05
Platform : mt6737t
FRPPST : /dev/block/platform/mtk-msdc.0/11230000.msdc0/by-name/frp
Fingerprint : Cherry_Mobile/Flare_P1_Plus/Flare_P1_Plus:7.0/NRD90M/1489578972:user/release-keys
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition... [Ok] Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:58
BR
Dipendra Pathak

  Reply With Quote
The Following User Says Thank You to Dipendra Pathak For This Useful Post:
Old 01-17-2021, 02:21   #935 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Xiaomi Mi A2 (Jasmine) Security Backup Successfully Done

Xiaomi Mi A2 (Jasmine) Security Backup Successfully Done

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : XIAOMI Model : Mi A2 (Jasmine) Storage : Auto
Loader: prog_emmc_firehose_Sdm660_ddr.elf
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM6)
SymbolicName :\??\USB#VID_05C6&PID_9008#6&f8bfca&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/02/2017,2.1.2.7

Getting device info......
Serial No.: 0x0E6E1A5F
MSM ID : 0x0008C0E1, SDM660-Qualcomm Snapdragon 660
PBL Ver : 00000000
PK HASH : A7B8B82545A98ECA23D6E9105FB46456
8D1B5828264903441BDEF0CD57E3C370

Firehose Loader[prog_emmc_firehose_Sdm660_ddr.elf]
SaharaBoot... Ok
Sending .................................Ok
Connecting to Firehose...
Ping......... Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[qqLRLBD7RwXC-isEl2gWR3Pjfoz]
Checking Internet connection....
- Hydra Is Online
Connecting to Hydra Xiaomi Server...

Signature @256bytes Authentication.... Accepted......................
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 8192
MaxPayloadSizeToTargetInBytesSupported : 8192
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : MSM8996
Version : 1
DateTime : Aug 16 2019 - 17:22:13

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 19
Serial Number : 16527080
Firmware Version : 4
Product Name : S0J9D8
Physical Partitions : 4
Total Logical Blocks:
Drive [0] 122142720[58,242 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Drive [3] 8192[4 MB]

Protocol : Universal
Running : Ok
Reading GPT[4]
Drive [0] 72 Items
Drive [1] 0 Items
Drive [2] 0 Items
Drive [3]

Processing Backup Security....

Backup Security partitions...
Reading Security Items....
> modemst1
> modemst2
> fsg
C:\Hydra Tool\Backup\Security_Backup\___Security_0116211237 24.sec
Backup Security Success....
Action Result : Ok

Elapsed Time : 00:02:31
BR
Dipendra Pathak

  Reply With Quote
The Following User Says Thank You to Dipendra Pathak For This Useful Post:
Old 01-17-2021, 14:32   #936 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Xiaomi Redmi Note 7 Pro Mi Account successfully removed by Hydra Tool

Xiaomi Redmi Note 7 Pro Mi Account successfully removed by Hydra Tool

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : XIAOMI Model : Redmi Note 7 Pro (violet) Storage : Auto
Loader: Xiaomi_Redmi Note 7 Pro_Sdm6150_ddr.elf
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM4)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&291ba64b&0&6#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :07/29/2011,2.0.8.7

Getting device info......
Serial No.: 0xBE404211
MSM ID : 0x000950E1, SM6150-Qualcomm Snapdragon 675
PBL Ver : 00000000
PK HASH : 1BEBE3863A6781DB4B01086063007334
DE9E5CA14971C7C4F4358EC9D79CDA46

Firehose Loader[Xiaomi_Redmi Note 7 Pro_Sdm6150_ddr.elf]
SaharaBoot... Ok
Sending ...................................Ok
Connecting to Firehose...
Ping..................... Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[WNFPwUTSXgMp5NtsqX0DOI-MXsi]
Checking Internet connection....
- Hydra Is Online
Connecting to Hydra Xiaomi Server...

Signature @256bytes Authentication.... Accepted........
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Jul 19 2019 - 01:12:10

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 1196154401
Firmware Version : 2
Product Name : 3V6CMB
Physical Partitions : 4
Total Logical Blocks:
Drive [0] 244277248[116.48 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Drive [3] 32768[16 MB]

Protocol : Universal
Running : Ok
Reading GPT[4]
Drive [0] 88 Items
Drive [1] 0 Items
Drive [2] 0 Items
Drive [3]


Phone Information......
Vendor : Xiaomi
ID : QKQ1.190915.002
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : zh-CN
Miui Ver : V12
Security Patch : 2020-07-01

Processing Remove MiAccount[Patch Method]....
Backing up Partition for safety...Ok

Scanning Patching address...
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]Done!!
Total Items patched : 2
Successfully patched address..
Action Result : Ok

Rebooting Phone.... Ok

Elapsed Time : 00:00:24
BR
Dipendra Pathak


Last edited by Hydra Tool; 01-17-2021 at 19:19.
  Reply With Quote
The Following User Says Thank You to Dipendra Pathak For This Useful Post:
Old 01-18-2021, 04:55   #937 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Oppo A37 safe formatting userdata successfully done by Hydra Tool

Oppo A37 safe formatting userdata successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : OPPO Model : A37 Storage : Auto
Loader: 8916.mbn
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM18)
SymbolicName :\??\USB#VID_05C6&PID_9008#6&349d6006&0&3#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :03/25/2016,2.1.2.2

Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok
Configuration.......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8916
Version : 1


Protocol : Universal
Running : Ok

Phone Information.....
Brand : OPPO
Vendor : OPPO
Model : A37f
ID : LMY47V
SDK : 22
Release : 5.1.1
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Description : msm8916_64-user 5.1.1 LMY47V eng.root.20190711.032745 release-keys
Board : msm8916
Display ID : A37fEX_11_190711
Security Patch : 2018-03-01
Platform : msm8916
FRPPST : /dev/block/bootdevice/by-name/config

Reading GPT[3]
Drive [0] 40 Items
Drive [1] 0 Items
Drive [2] 4 Items

Formatting Userdata...
Method :
Auto
Processing...
- Formatting Userdata
Executing ...
- Formatting Userdata [Safe method] OkOkOk

Elapsed Time : 00:00:08
BR
Dipendra Pathak

  Reply With Quote
Old 01-18-2021, 05:01   #938 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Xiaomi Redmi 4x FRP Zero Wipe successfully done by Hydra Tool

Xiaomi Redmi 4x FRP Zero Wipe successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : AUTO Model : AUTO Storage : Auto
Loader: Auto
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM33)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&2d4ae1f7&0&1#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/02/2017,2.1.2.7

Getting device info......
Serial No.: 0xA4C128E5
MSM ID : 0x0006B0E1, MSM8940-Qualcomm Snapdragon 435
PBL Ver : 00000000
PK HASH : 57158EAF1814D78FD2B3105ECE4DB18A
817A08AC664A5782A925F3FF8403D39A

Firehose Loader[mi_1_9.mbn]
SaharaBoot... Ok
Sending .....................Ok
Connecting to Firehose...
Ping... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 775448649
Firmware Version : 7
Product Name : QE13MB
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 30535680[14,561 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok
Reading GPT[3]
Drive [0] 52 Items
Drive [1] 0 Items
Drive [2] 0 Items


Phone Information.....
Brand : Xiaomi
Vendor : Xiaomi
Model : Redmi 4X
ID : N2G47H
SDK : 25
Release : 7.1.2
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : santoni-user 7.1.2 N2G47H V11.0.2.0.NAMMIXM release-keys
Miui Ver : V11
Device : santoni
Mod_device : santoni_global
Board : QC_Reference_Phone
Display ID : N2G47H
Security Patch : 2018-10-01
Emmc_size : 16GB
Platform : msm8937
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : Xiaomi/santoni/santoni:7.1.2/N2G47H/V11.0.2.0.NAMMIXM:user/release-keys

Processing Safe Format - EMMC....
- Removing FRP [Zero Wipe] Ok
- Formatting Userdata [Safe method] Ok
Action Result : Ok

Elapsed Time : 00:00:08
BR
Dipendra Pathak

  Reply With Quote
Old 01-18-2021, 05:06   #939 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Oppo A37 Security Wipe Successfully Done by Hydra Tool

Oppo A37 Security Wipe Successfully Done by Hydra Tool

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : OPPO Model : A37 Storage : Auto
Loader: 8916.mbn
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM12)
SymbolicName :\??\USB#VID_05C6&PID_9008#6&1e3c5ed9&0&2#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :12/17/2018,2.1.3.5

Getting device info.....
Serial No.: 0x20178748
MSM ID : 0x007050E1, MSM8916-Qualcomm Snapdragon 410
PBL Ver : 00000000
PK HASH : CC3153A80293939B90D02D3BF8B23E02
92E452FEF662C74998421ADAD42A380F

Firehose Loader[8916.mbn]
SaharaBoot... Ok
Sending .....Ok
Connecting to Firehose...
Ping... Ok
Configuration.......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8916
Version : 1


Protocol : Universal
Running : Ok
Reading GPT[3]
Drive [0] 40 Items
Drive [1] 0 Items
Drive [2] 4 Items

Processing Erase Security....
Wipe Security ...

Backup Security partitions...
Reading Security Items....
> modemst1
> modemst2
> fsg
C:\Users\hi\Desktop\HydraTool_Fullpackage_10-06-2020\Backup\Security_Backup\___Security_0117210657 49.sec
Backup Security Success....
Security Wipe Started..
> modemst1 Ok
> modemst2 Ok
> fsg Ok
Security Wipe Success...
Action Result : Ok

Elapsed Time : 00:00:20
BR
Dipendra Pathak

  Reply With Quote
Old 01-18-2021, 05:12   #940 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
ITEL P13 Plus Reset Privacy successfully Done by Hydra Tool

ITEL P13 Plus Reset Privacy successfully Done by Hydra Tool

Screen Short:



Logs:

Quote:
Brand : ITEL Model : P13 Plus Connection : Flash Mode

=====================================
Connection
-Please wait...
-Connect Phone...
-Found...
-PreLoader...[COM7]

TPortConnection.Create...(COM7)..Opening...Ok

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 6580 (0000)MT6580[6580]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
FUSEID : 00000000
SECURE VERSION : 00
BL VERSION : 00
BR Secured : 00
NORMAL BOOT

Preparing Download Agent..
DA : [Not Exist]
Trying Default 6580.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2018-09-18.13:22_452898
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : Old - eMMC
0000000000000000000000000000
PRMMCCID : 150100464E36324D4203231CD48B5527
Init Configuration
Running DA 4.2 on BBID : 0x9C Ok

Initializing Loader [2]
Sending Loader [2] Accepted
Reading Flashchip data....
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000080000 -512 KB
eMMC USER : 0x00000001D2000000 -7.281 GB
ERAM Size : 0x0000000040000000 -1024 MB
IRAM Size : 0x0000000000020000 -128 KB
UNICAL RID : 0FA9F98F5898B6960F6FA973D0B58A0F
eMMC CID : 460001154D32364E1C23034227558BD4
Change to HIGH SPEED...
5A
Connection
-Please wait...
-Found...[COM8]


Reading Partition Table
SIZE[0x000009A0] 28 Items > Done

Reading System Info
Brand : Itel
Vendor : itel
Model : itel P13 Plus
ID : O11019
SDK : 27
Release : 8.1.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-US
Description : P13Plus-user 8.1.0 O11019 1594283341 release-keys
Device : itel-P13-Plus
Security Patch : 2020-07-05
Fingerprint : Itel/F8013/itel-P13-Plus:8.1.0/O11019/OP-V043-20200709:user/release-keys
StorageType : mtp
Userdata State : Encrypted

Autobackup Partitions
-preloader[0x00000000] 512 KB -> preloader.bin...Ok
-> Renaming Preloader.... preloader_p13plus.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\Itel_itel P13 Plus_6580--8.1.0__170121175511\MT6580_Android_scatter.txt
-nvram[0x00580000] 5 MB -> nvram.bin...Ok
-frp[0x18600000] 1024 KB -> frp.bin...Ok
-nvdata[0x18900000] 8 MB -> nvdata.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\Itel_itel P13 Plus_6580--8.1.0__170121175511
MTK Phone Loader is NOW RUNNING.


Reading System Info
Brand : Itel
Vendor : itel
Model : itel P13 Plus
ID : O11019
SDK : 27
Release : 8.1.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-US
Description : P13Plus-user 8.1.0 O11019 1594283341 release-keys
Device : itel-P13-Plus
Security Patch : 2020-07-05
Fingerprint : Itel/F8013/itel-P13-Plus:8.1.0/O11019/OP-V043-20200709:user/release-keys
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Auto
Processing...Reset Privacy...

Reset Privacy
Searching...
Patching..Address and Size init, NOT Accepted
Erasing.. Ok
Done!!! Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:36
BR
Dipendra Pathak

  Reply With Quote
Old 01-18-2021, 05:15   #941 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Vivo Y11 (1906) FRP successfully Removed by Hydra Tool

Vivo Y11 (1906) FRP successfully Removed by Hydra Tool

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : VIVO Model : Y11 (1906) Storage : Auto
Loader: Vivo_Y11.elf
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM9)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&10ef021e&0&6#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/31/2015,2.1.2.0

Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 1231146052
Firmware Version : 9
Product Name : GX6BAB
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 61071360[29.121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok
Reading GPT[3]
Drive [0] 60 Items
Drive [1] 0 Items
Drive [2] 0 Items


Phone Information......
Brand : vivo
Vendor : vivo
Model : vivo 1906
ID : PKQ1.190616.001
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : msm8937_64-user 9 PKQ1.190616.001 compiler12021300 release-keys
Device : PD1930F_EX
Display ID : PKQ1.190616.001 release-keys
Security Patch : 2020-11-01
Emmc_size : 16GB
Platform : =SDM439
Fingerprint : vivo/1906/1906:9/PKQ1.190616.001/compiler12021300:user/release-keys

Processing Forced Erase....
- Removing FRP [Auto] Ok
- Forced Erase Userdata
Action Result : Ok

Elapsed Time : 00:00:11
BR
Dipendra Pathak

  Reply With Quote
The Following User Says Thank You to Dipendra Pathak For This Useful Post:
Old 01-18-2021, 05:18   #942 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Lenevo A2010-A Screen Lock Security Successfully Done by Hydra Tool

Lenevo A2010-A Screen Lock Security Successfully Done by Hydra Tool

Screen Short:



Logs:

Quote:
Brand : LENOVO Model : A2010-A Connection : Flash Mode

=====================================
Connection
-Please wait...
-Found...[COM9]

TPortConnection.Create...(COM9)..Opening...Ok


Reading System Info
Brand : Lenovo
Vendor : LENOVO
Model : Lenovo A2010-a
ID : LMY47D
SDK : 22
Release : 5.1
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Description : hq6735m_35u_b1d_l-user 5.1 LMY47D 1484124816 release-keys
Device : A2010-a
Board : A2010-a
Display ID : A2010-a-t_S264_1701101300_MP3V1_8G_ROW
Security Patch : 2016-06-01
Platform : mt6735m
FRPPST : /dev/block/platform/mtk-msdc.0/by-name/frp
Fingerprint : Lenovo/A2010-a/A2010-a:5.1/LMY47D/A2010-a-t_S264_170110.170111:user/release-keys
StorageType : mtp,mass_storage
Userdata State : Not Encrypted

-------------------------------------
Operation : Remove Lock Without Data Loss
Processing...
Searching patching address.. [Ok].. [Ok].. [Ok].. [Ok].. [Ok] Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:03
BR
Dipendra Pathak

  Reply With Quote
The Following User Says Thank You to Dipendra Pathak For This Useful Post:
Old 01-18-2021, 15:48   #943 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Xiaomi Redmi 2 (WT88047) repairing IMEI done by Hydra Tool

Xiaomi Redmi 2 (WT88047) repairing IMEI done by Hydra Tool

Screen Short:



Logs:

Quote:
Selected Comport : Auto
Searching Qualcomm Diag Port[FOUND](COM48)

Firmware ID : MPSS.DPM.1.0.c7.18-00023-M8916EAAAANUZM-1-all16
Build Date : ug 20 201509:30:56Feb 10 201512:00:00EAAAANUZ
IMEI1 : 8676060206*****
IMEI2 : 8676060206*****

Sending SPC Code... OK
Backuping Qcn.... OK
QCN Saved To : C:\Users\Administrator\Downloads\Compressed\QCN+Mo demStockflasherRedmi 2(wt88047)\mboke.qcn
Elapsed Time : 00:01:00
BR
Dipendra Pathak

  Reply With Quote
The Following User Says Thank You to Dipendra Pathak For This Useful Post:
Old 01-19-2021, 03:27   #944 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Oppo A83 (CPH1729) FRP successfully removed by Hydra Tool

Oppo A83 (CPH1729) FRP successfully removed by Hydra Tool

Screen Short:



Logs:

Quote:
Brand : OPPO Model : A83 (CPH1729) Connection : Flash Mode

=====================================
Connection
-Please wait...
-Found...[COM4]

TPortConnection.Create...(COM4)..Opening...Ok

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 97FD79DE35A5E36EB61EF2E6D265A056
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003A3E00000 -14.561 GB
eMMC CID : 150100514536334D4203073BF2F84599 - QE63MB

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Brand : OPPO
Vendor : OPPO
Model : OPPO A83js
ID : N6F26Q
SDK : 25
Release : 7.1.1
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6763_17101-user 7.1.1 N6F26Q 1574193114 release-keys
Device : M6763E
Board : full_oppo6763_17101
Display ID : A83jsEX_11_A.32_191120
Security Patch : 2019-10-05
Platform : mt6763
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Rebuild Userdata
Processing...
Rebuilding Userdata... Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:11
BR
Dipendra Pathak

  Reply With Quote
Old 01-19-2021, 03:30   #945 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Xiaomi Redmi Note 7S Safe format successfully done by Hydra Tool

Xiaomi Redmi Note 7S Safe format successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : XIAOMI Model : Redmi Note 7S Storage : Auto
Loader: mi_2_9.elf
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM13)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&1be9af57&0&1#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :03/25/2016,2.1.2.2

Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping...... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : MSM8996
Version : 1
DateTime : Aug 2 2018 - 22:27:53

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 3748840634
Firmware Version : 2
Product Name : DD68MB
Physical Partitions : 4
Total Logical Blocks:
Drive [0] 61071360[29.121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Drive [3] 8192[4 MB]

Protocol : Universal
Running : Ok

Phone Information......
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi Note 7
ID : PKQ1.180904.001
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : lavender-user 9 PKQ1.180904.001 V11.0.9.0.PFGINXM release-keys
Miui Ver : V11
Device : lavender
Mod_device : lavender_in_global
Display ID : PKQ1.180904.001
Security Patch : 2020-02-05
Fingerprint : xiaomi/lavender/lavender:9/PKQ1.180904.001/V11.0.9.0.PFGINXM:user/release-keys

Reading GPT[4]
Drive [0] 68 Items
Drive [1] 0 Items
Drive [2] 0 Items
Drive [3]

Formatting Userdata...
Method :
Safe Format - EMMC
Processing...
- Formatting Userdata [Safe method] OkOk

Rebooting Phone.... Ok
If not rebooted, Please Power on Manually

Elapsed Time : 00:00:07
BR
Dipendra Pathak

  Reply With Quote
Reply

Bookmarks


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


 



All times are GMT +1. The time now is 04:10.



Powered by Searchlight © 2024 Axivo Inc.
vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2024 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2023 -
Page generated in 0.46293 seconds with 9 queries

SEO by vBSEO