GSM Shop GSM Shop
GSM-Forum  

Welcome to the GSM-Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features.
Only registered members may post questions, contact other members or search our database of over 8 million posts.

Registration is fast, simple and absolutely free so please - Click to REGISTER!

If you have any problems with the registration process or your account login, please contact contact us .

Go Back   GSM-Forum > Product Support Sections > Special Solutions / Services / WebShop > GSMFABRICA Products > HYDRA TOOL

Reply
 
LinkBack Thread Tools Display Modes
Old 02-08-2021, 06:26   #1171 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,624
Huawei DUB-LX2 (Y7 2019) Successfully Zero wipe FRP successfully done by Hydra Tool


Huawei DUB-LX2 (Y7 2019) Successfully Zero wipe FRP successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : HUAWEI Model : DUB-LX2 (Y7 2019) Storage : Auto
Loader: DUB-LX1_Loader_T-Tool-Team_1.mbn
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM3)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&2a35e47&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/31/2015,2.1.2.0

Getting device info......
Serial No.: 0x011E57FE
MSM ID : 0x0009A0E1, SDM450-Qualcomm Snapdragon 450
PBL Ver : 00000000
PK HASH : 6BC369511DA9CADB3A7AF61574F89DB3
85003D6241BDD1FF573DBA61BF6AE119

Firehose Loader[DUB-LX1_Loader_T-Tool-Team_1.mbn]
SaharaBoot... Ok
Sending .............Ok
Connecting to Firehose...
Ping... Ok
Configuration.......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8953
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 2086284
Firmware Version : 0
Product Name : hC9aP3
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 122142720[58.242 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok

Phone Information.....
Vendor : unknown
ID : OPM1.171019.011
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : generic_a53-user 8.1.0 OPM1.171019.011 eng.root.20200323.020904 test-keys
Display ID : System 8.2.0.036(07JH)
Security Patch : 2020-02-01

Reading GPT[3]
Drive [0] 60 Items
Drive [1] 0 Items
Drive [2] 0 Items

Removing FRPta...
Method :
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOkOk

Elapsed Time : 00:00:09
BR
Dipendra Pathak

  Reply With Quote
Old 02-08-2021, 06:35   #1172 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,624
Huawei Honor 8C (BKK-LX2) Zero Wipe FRP successfully by Hydra Tool

Huawei Honor 8C (BKK-LX2) Zero Wipe FRP successfully by Hydra Tool

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : HUAWEI Model : BKK-LX2 (Honor 8C) Storage : Auto
Loader: Huawei-BKK-Honor.mbn
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM10)
SymbolicName :\??\USB#VID_05C6&PID_9008#8&e054ac4&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :03/25/2016,2.1.2.2

Getting device info......
Serial No.: 0xB75AD4F2
MSM ID : 0x000BA0E1, SDM632-Qualcomm Snapdragon 632
PBL Ver : 00000000
PK HASH : 6BC369511DA9CADB3A7AF61574F89DB3
85003D6241BDD1FF573DBA61BF6AE119

Firehose Loader[Huawei-BKK-Honor.mbn]
SaharaBoot... Ok
Sending .............Ok
Connecting to Firehose...
Ping... Ok
Configuration.......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8953
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 2296252346
Firmware Version : 0
Product Name : GD6BMB
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 61071360[29,121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok

Phone Information.....
Vendor : unknown
ID : OPM1.171019.011
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : generic_a53-user 8.1.0 OPM1.171019.011 eng.root.20201208.111438 test-keys
Display ID : System 8.2.0.036(1RUN)
Security Patch : 2020-09-01

Reading GPT[3]
Drive [0] 60 Items
Drive [1] 0 Items
Drive [2] 0 Items

Removing FRPta...
Method :
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOkOk

Rebooting Phone.... Ok
If not rebooted, Please Power on Manually

Elapsed Time : 00:00:10
BR
Dipendra Pathak

  Reply With Quote
Old 02-08-2021, 06:50   #1173 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,624
Xiaomi Redmi Note 8 (ginkgo) Mi Account removed using Files by Hydra Tool

Xiaomi Redmi Note 8 (ginkgo) Mi Account removed using Files by Hydra Tool

Screen Short:



Logs:

Quote:
Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM23)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&2191cfca&0&7#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :05/29/2019,2.1.3.7

Getting device info......
Serial No.: 0xE66C7631
MSM ID : 0x0010A0E1, SM6125-Qualcomm Snapdragon 665
PBL Ver : 00000000
PK HASH : 1BEBE3863A6781DB4B01086063007334
DE9E5CA14971C7C4F4358EC9D79CDA46

Firehose Loader[Xiaomi_redminote8_loader.elf]
SaharaBoot... Ok
Sending ..............................Ok
Connecting to Firehose...
Ping..................... Ok
Configuration.........
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Jul 3 2019 - 22:23:56

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 19
Serial Number : 292993118
Firmware Version : 4
Product Name : S0J9K9
Physical Partitions : 4
Total Logical Blocks:
Drive [0] 244285440[116.484 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Drive [3] 32768[16 MB]

Protocol : Universal
Running : Ok

Phone Information......
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi Note 8
ID : PKQ1.190616.001
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : ginkgo-user 9 PKQ1.190616.001 V11.0.8.0.PCOMIXM release-keys
Miui Ver : V11
Device : ginkgo
Mod_device : ginkgo_global
Display ID : PKQ1.190616.001
Security Patch : 2020-03-01
Fingerprint : xiaomi/ginkgo/ginkgo:9/PKQ1.190616.001/V11.0.8.0.PCOMIXM:user/release-keys

Reading GPT[4]
Drive [0] 88 Items
Drive [1] 0 Items
Drive [2] 0 Items
Drive [3]


Backup Security partitions...
Reading Security Items....
> modemst1
> modemst2
> fsg
C:\Hydra Tool\Backup\Security_Backup\Redmi Note 8__9_Security_020521162034.sec
Backup Security Success....

----------------------------
Flashing Selected Partitions....
- Easy_Soluciones_FRP(0)[Redmi_Note_8_FRP.bin] Ok
- Easy_Soluciones_Mi_Account(0)[Mi_Account.img] Ok
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 0
Set bootable storage drive 0 Ok

Rebooting Phone.... Ok

Elapsed Time : 00:00:53
BR
Dipendra Pathak

  Reply With Quote
Old 02-09-2021, 04:27   #1174 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,624
Xiaomi Redmi 6a (cactus) System, cache & userdata flashed successfully by Hydra Tool

Xiaomi Redmi 6a (cactus) System, cache and userdata flashed successfully by Hydra Tool

Screen Short:



Logs:

Quote:
Brand : AUTO Model : AUTO Connection : Flash Mode

=====================================
How To Boot : Power off phone
* BROM Mode : Press VOL + or Press VOL -+
* Preloader Mode : Just Insert cable

Connection
-Please wait...
-Found...[COM14]

TPortConnection.Create...(COM14)..Opening...Ok


Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : D53EAB01D2551C4D8EE81BD202455D01
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000020000000 -512 MB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003AB400000 -14,676 GB
eMMC CID : 90014A484147346132A5C631A91E2693 - HAG4a2

Reading GPT-EMMC [0x00008000] 130 Items

Flashing Selected Partitions....
- system[system.img] 2,5 GB Flash -> = Ok
- cache[cache.img] 256 MB Flash -> = Ok
- userdata[userdata.img] 3 GB Flash -> = Ok

TPortConnection.Destroy.....Closing...Ok..
=====================================

Elapsed Time : 00:01:45
Note : Did you notice why did I tick on "Enable BROM Exploit" ?


BR
Dipendra Pathak

  Reply With Quote
Old 02-09-2021, 04:43   #1175 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,624
Lenevo Tab 4 successfully flashed by Hydra Tool

Lenevo Tab 4 successfully flashed by Hydra Tool

Screen Short:



Logs:

Quote:
Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM53)
SymbolicName :\??\USB#VID_05C6&PID_9008#7&3a97d304&2&2#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :

Getting device info......
Serial No.: 0x996AF25F
MSM ID : 0x000560E1, MSM8917-Qualcomm Snapdragon 425
PBL Ver : 00000000
PK HASH : 92242CF8F6FAD111A0B0E2AEF2FCEB69
32AC73D2451037CDC6059DA3A4F6DD9D

Firehose Loader[prog_emmc_firehose_8917_ddr.mbn]
SaharaBoot... Ok
Sending ...................Ok
Connecting to Firehose...
Ping... Ok
Configuration......
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8917
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 2043203754
Firmware Version : 13
Product Name : QE13MB
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 30535680[14.561 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok

Phone Information.....
Brand : Lenovo
Vendor : LENOVO
Model : Lenovo TB-X304L
ID : NMF26F
SDK : 25
Release : 7.1.1
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : hq_msm8917_64-user 7.1.1 NMF26F 1548 release-keys
Device : X304L
Board : LenovoTB-X304L
Display ID : TB-X304L_S000035_170703_ROW
Security Patch : 2017-04-05
Emmc_size : 16GB
Platform : msm8937
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : Lenovo/LenovoTB-X304L/X304L:7.1.1/NMF26F/TB-X304L_S000035_170703_ROW:user/release-keys

Reading GPT[3]
Drive [0] 48 Items
Drive [1] 0 Items
Drive [2] 0 Items


Backup Security partitions...
Reading Security Items....
> modemst1
> modemst2
> fsg
I:\HYDRA\2.8\HydraTool_Fullpackage_11-23-2020\Backup\Security_Backup\Lenovo TB-X304L_LenovoTB-X304L_7.1.1_Security_020421142334.sec
Backup Security Success....

----------------------------
Flashing Selected Partitions....
- modem(0)[NON-HLOS.bin] Ok
- sbl1(0)[sbl1.mbn] Ok
- sbl1bak(0)[sbl1.mbn] Ok
- rpm(0)[rpm.mbn] Ok
- rpmbak(0)[rpm.mbn] Ok
- tz(0)[tz.mbn] Ok
- tzbak(0)[tz.mbn] Ok
- devcfg(0)[devcfg.mbn] Ok
- devcfgbak(0)[devcfg.mbn] Ok
- dsp(0)[adspso.bin] Ok
- sec(0)[sec.dat] Skipped
- splash(0)[splash.img] Ok
- aboot(0)[emmc_appsboot.mbn] Ok
- abootbak(0)[emmc_appsboot.mbn] Ok
- boot(0)[boot.img] Ok
- recovery(0)[recovery.img] Ok
- system(0)[system_1.img] Ok
- system(0)[system_2.img] Ok
- system(0)[system_3.img] Ok
- system(0)[system_4.img] Ok
- system(0)[system_5.img] Ok
- system(0)[system_6.img] Ok
- system(0)[system_7.img] Ok
- system(0)[system_8.img] Ok
- system(0)[system_9.img] Ok
- system(0)[system_10.img] Ok
- system(0)[system_11.img] Ok
- system(0)[system_12.img] Ok
- system(0)[system_13.img] Ok
- system(0)[system_14.img] Ok
- system(0)[system_15.img] Ok
- system(0)[system_16.img] Ok
- system(0)[system_17.img] Ok
- system(0)[system_18.img] Ok
- system(0)[system_19.img] Ok
- system(0)[system_20.img] Ok
- system(0)[system_21.img] Ok
- system(0)[system_22.img] Ok
- system(0)[system_23.img] Ok
- system(0)[system_24.img] Ok
- system(0)[system_25.img] Ok
- system(0)[system_26.img] Ok
- system(0)[system_27.img] Ok
- system(0)[system_28.img] Ok
- system(0)[system_29.img] Ok
- system(0)[system_30.img] Ok
- system(0)[system_31.img] Ok
- system(0)[system_32.img] Ok
- system(0)[system_33.img] Ok
- system(0)[system_34.img] Ok
- system(0)[system_35.img] Ok
- system(0)[system_36.img] Ok
- system(0)[system_37.img] Ok
- system(0)[system_38.img] Ok
- system(0)[system_39.img] Ok
- system(0)[system_40.img] Ok
- system(0)[system_41.img] Ok
- system(0)[system_42.img] Ok
- system(0)[system_43.img] Ok
- system(0)[system_44.img] Ok
- system(0)[system_45.img] Ok
- cache(0)[cache_1.img] Ok
- cache(0)[cache_2.img] Ok
- cache(0)[cache_3.img] Ok
- persist(0)[persist.img] Skipped
- devinfo(0)[zeros_1sector.bin] Ok
- mdtp(0)[mdtp.img] Ok
- cmnlib(0)[cmnlib.mbn] Ok
- cmnlibbak(0)[cmnlib.mbn] Ok
- cmnlib64(0)[cmnlib64.mbn] Ok
- cmnlib64bak(0)[cmnlib64.mbn] Ok
- keymaster(0)[keymaster.mbn] Ok
- keymasterbak(0)[keymaster.mbn] Ok
- userdata(0)[userdata_1.img] Ok
- userdata(0)[userdata_2.img] Ok
- userdata(0)[userdata_3.img] Ok
- userdata(0)[userdata_4.img] Ok
- userdata(0)[userdata_5.img] Ok
- userdata(0)[userdata_6.img] Ok
- userdata(0)[userdata_7.img] Ok
- userdata(0)[userdata_8.img] Ok
- userdata(0)[userdata_9.img] Ok
- userdata(0)[userdata_10.img] Ok
- userdata(0)[userdata_11.img] Ok
- userdata(0)[userdata_12.img] Ok
- userdata(0)[userdata_13.img] Ok
- userdata(0)[userdata_14.img] Ok
- userdata(0)[userdata_15.img] Ok
- userdata(0)[userdata_16.img] Ok
- userdata(0)[userdata_17.img] Ok
- userdata(0)[userdata_18.img] Ok
- userdata(0)[userdata_19.img] Ok
- userdata(0)[userdata_20.img] Ok
- userdata(0)[userdata_21.img] Ok
- userdata(0)[userdata_22.img] Ok
- userdata(0)[userdata_23.img] Ok
- userdata(0)[userdata_24.img] Ok
- userdata(0)[userdata_25.img] Ok
- userdata(0)[userdata_26.img] Ok
- userdata(0)[userdata_27.img] Ok
- userdata(0)[userdata_28.img] Ok
- userdata(0)[userdata_29.img] Ok
- userdata(0)[userdata_30.img] Ok
- userdata(0)[userdata_31.img] Ok
- userdata(0)[userdata_32.img] Ok
- userdata(0)[userdata_33.img] Ok
- userdata(0)[userdata_34.img] Ok
- userdata(0)[userdata_35.img] Ok
- userdata(0)[userdata_36.img] Ok
- userdata(0)[userdata_37.img] Ok
- userdata(0)[userdata_38.img] Ok
- userdata(0)[userdata_39.img] Ok
- userdata(0)[userdata_40.img] Ok
- userdata(0)[userdata_41.img] Ok
- userdata(0)[userdata_42.img] Ok
- userdata(0)[userdata_43.img] Ok
- userdata(0)[userdata_44.img] Ok
- userdata(0)[userdata_45.img] Ok
- userdata(0)[userdata_46.img] Ok
- userdata(0)[userdata_47.img] Ok
- userdata(0)[userdata_48.img] Ok
- userdata(0)[userdata_49.img] Ok
- userdata(0)[userdata_50.img] Ok
- userdata(0)[userdata_51.img] Ok
- userdata(0)[userdata_52.img] Ok
- userdata(0)[userdata_53.img] Ok
- userdata(0)[userdata_54.img] Ok
- userdata(0)[userdata_55.img] Ok
- userdata(0)[userdata_56.img] Ok
- userdata(0)[userdata_57.img] Ok
- userdata(0)[userdata_58.img] Ok
- userdata(0)[userdata_59.img] Ok
- userdata(0)[userdata_60.img] Ok
- userdata(0)[userdata_61.img] Ok
- userdata(0)[userdata_62.img] Ok
- userdata(0)[userdata_63.img] Ok
- userdata(0)[userdata_64.img] Ok
- userdata(0)[userdata_65.img] Ok
- userdata(0)[userdata_66.img] Ok
- userdata(0)[userdata_67.img] Ok
- userdata(0)[userdata_68.img] Ok
- userdata(0)[userdata_69.img] Ok
- userdata(0)[userdata_70.img] Ok
- userdata(0)[userdata_71.img] Ok
- userdata(0)[userdata_72.img] Ok
- userdata(0)[userdata_73.img] Ok
- userdata(0)[userdata_74.img] Ok
- userdata(0)[userdata_75.img] Ok
- userdata(0)[userdata_76.img] Ok
- userdata(0)[userdata_77.img] Ok
- userdata(0)[userdata_78.img] Ok
- userdata(0)[userdata_79.img] Ok
- userdata(0)[userdata_80.img] Ok
- userdata(0)[userdata_81.img] Ok
- lenovocust(0)[lenovocust.img] Ok
- PrimaryGPT(0)[gpt_main0.bin] Ok

Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-33.] OK
0 [CRC32(2,6144)] OK
0 [CRC32(NUM_DISK_SECTORS-33.,6144)] OK
0 [0] OK
0 [CRC32(1,92)] OK
0 [0] OK
0 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 0
Set bootable storage drive 0 Ok

Rebooting Phone.... Ok

Elapsed Time : 00:04:25
BR
Dipendra Pathak

  Reply With Quote
Old 02-09-2021, 04:55   #1176 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,624
Xiaomi Redmi 6a (cactus) System, cache & userdata flashed successfully by Hydra Tool

Xiaomi Redmi 6a (cactus) System, cache and userdata flashed successfully by Hydra Tool

Screen Short:



Logs:

Quote:
Brand : AUTO Model : AUTO Connection : Flash Mode

=====================================
How To Boot : Power off phone
* BROM Mode : Press VOL + or Press VOL -+
* Preloader Mode : Just Insert cable

Connection
-Please wait...
-Found...[COM14]

TPortConnection.Create...(COM14)..Opening...Ok


Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : D53EAB01D2551C4D8EE81BD202455D01
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000020000000 -512 MB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003AB400000 -14,676 GB
eMMC CID : 90014A484147346132A5C631A91E2693 - HAG4a2

Reading GPT-EMMC [0x00008000] 130 Items

Flashing Selected Partitions....
- system[system.img] 2,5 GB Flash -> = Ok
- cache[cache.img] 256 MB Flash -> = Ok
- userdata[userdata.img] 3 GB Flash -> = Ok

TPortConnection.Destroy.....Closing...Ok..
=====================================

Elapsed Time : 00:01:45
Note : Did you notice why did I tick on "Enable BROM Exploit" ?


BR
Dipendra Pathak

  Reply With Quote
Old 02-09-2021, 04:55   #1177 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,624
Lenevo Tab 4 successfully flashed by Hydra Tool (not listed in Hydra Module)

Lenevo Tab 4 successfully flashed by Hydra Tool (not listed in Hydra Module)

Screen Short:



Logs:

Quote:
Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM53)
SymbolicName :\??\USB#VID_05C6&PID_9008#7&3a97d304&2&2#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :

Getting device info......
Serial No.: 0x996AF25F
MSM ID : 0x000560E1, MSM8917-Qualcomm Snapdragon 425
PBL Ver : 00000000
PK HASH : 92242CF8F6FAD111A0B0E2AEF2FCEB69
32AC73D2451037CDC6059DA3A4F6DD9D

Firehose Loader[prog_emmc_firehose_8917_ddr.mbn]
SaharaBoot... Ok
Sending ...................Ok
Connecting to Firehose...
Ping... Ok
Configuration......
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8917
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 2043203754
Firmware Version : 13
Product Name : QE13MB
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 30535680[14.561 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok

Phone Information.....
Brand : Lenovo
Vendor : LENOVO
Model : Lenovo TB-X304L
ID : NMF26F
SDK : 25
Release : 7.1.1
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : hq_msm8917_64-user 7.1.1 NMF26F 1548 release-keys
Device : X304L
Board : LenovoTB-X304L
Display ID : TB-X304L_S000035_170703_ROW
Security Patch : 2017-04-05
Emmc_size : 16GB
Platform : msm8937
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : Lenovo/LenovoTB-X304L/X304L:7.1.1/NMF26F/TB-X304L_S000035_170703_ROW:user/release-keys

Reading GPT[3]
Drive [0] 48 Items
Drive [1] 0 Items
Drive [2] 0 Items


Backup Security partitions...
Reading Security Items....
> modemst1
> modemst2
> fsg
I:\HYDRA\2.8\HydraTool_Fullpackage_11-23-2020\Backup\Security_Backup\Lenovo TB-X304L_LenovoTB-X304L_7.1.1_Security_020421142334.sec
Backup Security Success....

----------------------------
Flashing Selected Partitions....
- modem(0)[NON-HLOS.bin] Ok
- sbl1(0)[sbl1.mbn] Ok
- sbl1bak(0)[sbl1.mbn] Ok
- rpm(0)[rpm.mbn] Ok
- rpmbak(0)[rpm.mbn] Ok
- tz(0)[tz.mbn] Ok
- tzbak(0)[tz.mbn] Ok
- devcfg(0)[devcfg.mbn] Ok
- devcfgbak(0)[devcfg.mbn] Ok
- dsp(0)[adspso.bin] Ok
- sec(0)[sec.dat] Skipped
- splash(0)[splash.img] Ok
- aboot(0)[emmc_appsboot.mbn] Ok
- abootbak(0)[emmc_appsboot.mbn] Ok
- boot(0)[boot.img] Ok
- recovery(0)[recovery.img] Ok
- system(0)[system_1.img] Ok
- system(0)[system_2.img] Ok
- system(0)[system_3.img] Ok
- system(0)[system_4.img] Ok
- system(0)[system_5.img] Ok
- system(0)[system_6.img] Ok
- system(0)[system_7.img] Ok
- system(0)[system_8.img] Ok
- system(0)[system_9.img] Ok
- system(0)[system_10.img] Ok
- system(0)[system_11.img] Ok
- system(0)[system_12.img] Ok
- system(0)[system_13.img] Ok
- system(0)[system_14.img] Ok
- system(0)[system_15.img] Ok
- system(0)[system_16.img] Ok
- system(0)[system_17.img] Ok
- system(0)[system_18.img] Ok
- system(0)[system_19.img] Ok
- system(0)[system_20.img] Ok
- system(0)[system_21.img] Ok
- system(0)[system_22.img] Ok
- system(0)[system_23.img] Ok
- system(0)[system_24.img] Ok
- system(0)[system_25.img] Ok
- system(0)[system_26.img] Ok
- system(0)[system_27.img] Ok
- system(0)[system_28.img] Ok
- system(0)[system_29.img] Ok
- system(0)[system_30.img] Ok
- system(0)[system_31.img] Ok
- system(0)[system_32.img] Ok
- system(0)[system_33.img] Ok
- system(0)[system_34.img] Ok
- system(0)[system_35.img] Ok
- system(0)[system_36.img] Ok
- system(0)[system_37.img] Ok
- system(0)[system_38.img] Ok
- system(0)[system_39.img] Ok
- system(0)[system_40.img] Ok
- system(0)[system_41.img] Ok
- system(0)[system_42.img] Ok
- system(0)[system_43.img] Ok
- system(0)[system_44.img] Ok
- system(0)[system_45.img] Ok
- cache(0)[cache_1.img] Ok
- cache(0)[cache_2.img] Ok
- cache(0)[cache_3.img] Ok
- persist(0)[persist.img] Skipped
- devinfo(0)[zeros_1sector.bin] Ok
- mdtp(0)[mdtp.img] Ok
- cmnlib(0)[cmnlib.mbn] Ok
- cmnlibbak(0)[cmnlib.mbn] Ok
- cmnlib64(0)[cmnlib64.mbn] Ok
- cmnlib64bak(0)[cmnlib64.mbn] Ok
- keymaster(0)[keymaster.mbn] Ok
- keymasterbak(0)[keymaster.mbn] Ok
- userdata(0)[userdata_1.img] Ok
- userdata(0)[userdata_2.img] Ok
- userdata(0)[userdata_3.img] Ok
- userdata(0)[userdata_4.img] Ok
- userdata(0)[userdata_5.img] Ok
- userdata(0)[userdata_6.img] Ok
- userdata(0)[userdata_7.img] Ok
- userdata(0)[userdata_8.img] Ok
- userdata(0)[userdata_9.img] Ok
- userdata(0)[userdata_10.img] Ok
- userdata(0)[userdata_11.img] Ok
- userdata(0)[userdata_12.img] Ok
- userdata(0)[userdata_13.img] Ok
- userdata(0)[userdata_14.img] Ok
- userdata(0)[userdata_15.img] Ok
- userdata(0)[userdata_16.img] Ok
- userdata(0)[userdata_17.img] Ok
- userdata(0)[userdata_18.img] Ok
- userdata(0)[userdata_19.img] Ok
- userdata(0)[userdata_20.img] Ok
- userdata(0)[userdata_21.img] Ok
- userdata(0)[userdata_22.img] Ok
- userdata(0)[userdata_23.img] Ok
- userdata(0)[userdata_24.img] Ok
- userdata(0)[userdata_25.img] Ok
- userdata(0)[userdata_26.img] Ok
- userdata(0)[userdata_27.img] Ok
- userdata(0)[userdata_28.img] Ok
- userdata(0)[userdata_29.img] Ok
- userdata(0)[userdata_30.img] Ok
- userdata(0)[userdata_31.img] Ok
- userdata(0)[userdata_32.img] Ok
- userdata(0)[userdata_33.img] Ok
- userdata(0)[userdata_34.img] Ok
- userdata(0)[userdata_35.img] Ok
- userdata(0)[userdata_36.img] Ok
- userdata(0)[userdata_37.img] Ok
- userdata(0)[userdata_38.img] Ok
- userdata(0)[userdata_39.img] Ok
- userdata(0)[userdata_40.img] Ok
- userdata(0)[userdata_41.img] Ok
- userdata(0)[userdata_42.img] Ok
- userdata(0)[userdata_43.img] Ok
- userdata(0)[userdata_44.img] Ok
- userdata(0)[userdata_45.img] Ok
- userdata(0)[userdata_46.img] Ok
- userdata(0)[userdata_47.img] Ok
- userdata(0)[userdata_48.img] Ok
- userdata(0)[userdata_49.img] Ok
- userdata(0)[userdata_50.img] Ok
- userdata(0)[userdata_51.img] Ok
- userdata(0)[userdata_52.img] Ok
- userdata(0)[userdata_53.img] Ok
- userdata(0)[userdata_54.img] Ok
- userdata(0)[userdata_55.img] Ok
- userdata(0)[userdata_56.img] Ok
- userdata(0)[userdata_57.img] Ok
- userdata(0)[userdata_58.img] Ok
- userdata(0)[userdata_59.img] Ok
- userdata(0)[userdata_60.img] Ok
- userdata(0)[userdata_61.img] Ok
- userdata(0)[userdata_62.img] Ok
- userdata(0)[userdata_63.img] Ok
- userdata(0)[userdata_64.img] Ok
- userdata(0)[userdata_65.img] Ok
- userdata(0)[userdata_66.img] Ok
- userdata(0)[userdata_67.img] Ok
- userdata(0)[userdata_68.img] Ok
- userdata(0)[userdata_69.img] Ok
- userdata(0)[userdata_70.img] Ok
- userdata(0)[userdata_71.img] Ok
- userdata(0)[userdata_72.img] Ok
- userdata(0)[userdata_73.img] Ok
- userdata(0)[userdata_74.img] Ok
- userdata(0)[userdata_75.img] Ok
- userdata(0)[userdata_76.img] Ok
- userdata(0)[userdata_77.img] Ok
- userdata(0)[userdata_78.img] Ok
- userdata(0)[userdata_79.img] Ok
- userdata(0)[userdata_80.img] Ok
- userdata(0)[userdata_81.img] Ok
- lenovocust(0)[lenovocust.img] Ok
- PrimaryGPT(0)[gpt_main0.bin] Ok

Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-33.] OK
0 [CRC32(2,6144)] OK
0 [CRC32(NUM_DISK_SECTORS-33.,6144)] OK
0 [0] OK
0 [CRC32(1,92)] OK
0 [0] OK
0 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 0
Set bootable storage drive 0 Ok

Rebooting Phone.... Ok

Elapsed Time : 00:04:25
BR
Dipendra Pathak

  Reply With Quote
Old 02-09-2021, 05:03   #1178 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,624
Xiaomi Redmi Note 8 Pro (begonia) flashing successfully done by Hydra Tool

Xiaomi Redmi Note 8 Pro (begonia) flashing successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
Brand : XIAOMI Model : Redmi Note 8 Pro (begonia) Connection : Flash Mode

=====================================
How To Boot : Power off phone
* BROM Mode : Press VOL + or Press VOL -+
* Preloader Mode : Just Insert cable

Connection
-Please wait...
-Found...[COM29]

TPortConnection.Create...(COM29)..Opening...Ok


Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 5087DC4C2B8267D378EE4DCDA929D7DF
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x0000000180000000 -6 GB
================================================== =====
ERROR READING eMMC Chip
================================================== =====
Reason maybe one the following:
- Check USB port connection and cable
- Check capacitor where you testpoint, maybe cap was removed or shortage(replace it)
- Try to load latest preloader file..
- EMMC maybe damaged, try to reball or replace it
================================================== ======
00000000000000000000000000000000000000000000000000 00000000000000000000000000000000000000000000000000 00000000000000000000000000000000000000000000000000 00000000000000000000000000000000000000000000000000 00000000
UFS LU0 Size: 0x0000000000400000 -4 MB
UFS LU1 Size: 0x0000000000400000 -4 MB
UFS LU2 Size: 0x0000001DCB000000 -119,172 GB
UFS CID : ,?MT128GASAO4U21
UFS UNIQID : 0d468111a61f03032000000000000000

Reading GPT-UFS [0x00008000] 130 Items

Flashing Selected Partitions....
- preloader[preloader_begonia.bin] 512 KB Erasing..Ok Flash ->= Ok
- recovery[recovery.img] 64 MB Erasing..Ok Flash ->= Ok
- vbmeta[vbmeta.img] 8 MB Erasing..Ok Flash ->= Ok
- efuse[efuse.img] 512 KB Erasing..Ok Flash ->= Ok
- md1img[md1img.img] 150 MB Erasing..Ok Flash ->= Ok
- spmfw[spmfw.img] 1024 KB Erasing..Ok Flash ->= Ok
- audio_dsp[audio_dsp.img] 4 MB Erasing..Ok Flash ->= Ok
- scp1[scp.img] 6 MB Erasing..Ok Flash -> = Ok
- scp2[scp.img] 6 MB Erasing..Ok Flash -> = Ok
- sspm_1[sspm.img] 1024 KB Erasing..Ok Flash ->= Ok
- sspm_2[sspm.img] 1024 KB Erasing..Ok Flash ->= Ok
- cam_vpu1[cam_vpu1.img] 15 MB Erasing..Ok Flash ->= Ok
- cam_vpu2[cam_vpu2.img] 15 MB Erasing..Ok Flash ->= Ok
- cam_vpu3[cam_vpu3.img] 15 MB Erasing..Ok Flash ->= Ok
- gz1[gz.img] 32 MB Erasing..Ok Flash -> = Ok
- gz2[gz.img] 32 MB Erasing..Ok Flash -> = Ok
- lk[lk.img] 2 MB Erasing..Ok Flash -> = Ok
- lk2[lk.img] 2 MB Erasing..Ok Flash -> = Ok
- boot[boot.img] 64 MB Erasing..Ok Flash -> = Ok
- logo[logo.bin] 64 MB Erasing..Ok Flash -> = Ok
- dtbo[dtbo.img] 32 MB Erasing..Ok Flash -> = Ok
- tee1[tee.img] 5 MB Erasing..Ok Flash -> = Ok
- tee2[tee.img] 9,5 MB Erasing..Ok Flash -> = Ok
- vendor[vendor.img] 1,5 GB Erasing..Ok Flash ->= Ok
- system[system.img] 3,5 GB Erasing..Ok Flash ->= Ok
- cache[cache.img] 432 MB Erasing..Ok Flash ->= Ok
- gsort[gsort.img] 16 MB Erasing..Ok Flash ->= Ok
- oem_misc1[oem_misc1.img] 16 MB Erasing..Ok Flash ->= Ok
- exaid[exaid.img] 128 MB Erasing..Ok Flash ->= Ok
- cust[cust.img] 832 MB Erasing..Ok Flash ->= Ok
- userdata[userdata.img] 12 GB Erasing..Ok Flash ->= Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

TPortConnection.Destroy.....Closing...Ok..
=====================================

Elapsed Time : 00:03:24
BR
Dipendra Pathak

  Reply With Quote
Old 02-09-2021, 05:09   #1179 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,624
FIH E1M zero wipe successfully done by Hydra Tool (Not listed in Hydra Tool))

FIH E1M zero wipe successfully done by Hydra Tool (Not listed in Hydra Tool))

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : AUTO Model : AUTO Storage : Auto
Loader: Auto
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM28)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&105bcc94&0&1#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :11/28/2016,2.0.6.725

Getting device info.....
Serial No.: 0x12204C8A
MSM ID : 0x009600E1, MSM8909-Qualcomm Snapdragon 210
PBL Ver : 00000000
PK HASH : F5F4192A33B2830974B400119BAB728C
C9FE911011F928625C2AED0DA441AC97

Firehose Loader[NK_0_1.mbn]
SaharaBoot... Ok
Sending ..............Ok
Connecting to Firehose...
Ping... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8909
Version : 1


Protocol : Universal
Running : Ok

Phone Information.....
Brand : FIH
Vendor : FIH
Model : FIH-E1M-FIH
ID : NMF26F
SDK : 25
Release : 7.1.1
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Description : E1M_00WW_FIH-user 7.1.1 NMF26F 00WW_0_68R release-keys
Device : E1M
Board : E1M
Display ID : 00WW_0_68R
Security Patch : 2019-11-01
Emmc_size : 8GB
Platform : msm8909
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : FIH/E1M_00WW_FIH/E1M:7.1.1/NMF26F/00WW_0_68R:user/release-keys

Reading GPT[3]
Drive [0] 128 Items
Drive [1] 0 Items
Drive [2] 0 Items

Removing FRPta...
Method :
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOkOk

Elapsed Time : 00:00:13
BR
Dipendra Pathak

  Reply With Quote
Old 02-09-2021, 05:18   #1180 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,624
Nokia Ta-1059 (Nokia 81100 4G) Repair IMEI successfully done by Hydra Tool

Nokia Ta-1059 (Nokia 81100 4G) Repair IMEI successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
Hydra Qualcomm Tool Ver 1.0.2 Build 72
Windows 10 (Version 10.0, Build 19041, 64-bit Edition)
Intel(R) Core(TM) i5-6300HQ CPU @ 2.30GHz
Intel(R) HD Graphics 530
Ram Installed : 16 GB
Windows Access Right Admin
******* Dongle Info *******
Version : Hydra Tool v 1.1
Serial : **************
Initialize : OKAY
Status : Activated
Life : 2 [2-0-0-0-1]


Selected Comport : Auto
Searching Qualcomm Diag Port[FOUND](COM25)

Firmware ID : MPSS.JO.3.0.c4-00087-8909_GEN_PACK-1
Build Date : ar 31 201818:30:16Mar 16 201804:00:008909.lwg
IMEI1 : 353420091******
IMEI2 : 353420093******

Enabling MultiSim....
Sending SPC Code... OK
Restoring Qcn....
Restoring Qcn Success
Elapsed Time : 00:00:31
BR
Dipendra Pathak

  Reply With Quote
Old 02-10-2021, 03:18   #1181 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,624
Vivo Y53 Successfully Flashed by Hydra Tool

Vivo Y53 Successfully Flashed by Hydra Tool

Screen Short:



Logs:

Quote:
Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM28)
SymbolicName :\??\USB#VID_05C6&PID_9008#6&186afa3&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/31/2015,2.1.2.0

Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8917
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 876796016
Firmware Version : 165
Product Name : HAG4a2
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 30777344[14.676 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok

Phone Information.....
Brand : vivo
Vendor : vivo
Model : vivo PD1628F_EX
ID : MMB29M
SDK : 23
Release : 6.0.1
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-US
Description : msm8937_32-user 6.0.1 MMB29M eng.compiler.20190105.211334 release-keys
Device : PD1628F_EX
Board : QC_Reference_Phone
Display ID : MMB29M release-keys
Security Patch : 2018-08-01
Emmc_size : 16GB
Platform : msm8937
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : vivo/PD1628F_EX/PD1628F_EX:6.0.1/MMB29M/compiler01052117:user/release-keys

Reading GPT[3]
Drive [0] 52 Items
Drive [1] 0 Items
Drive [2] 0 Items


Backup Security partitions...
Reading Security Items....
> modemst1
> modemst2
> fsg
C:\Hydra Tool\Backup\Security_Backup\vivo PD1628F_EX_QC_Reference_Phone_6.0.1_Security_02042 1105738.sec
Backup Security Success....

----------------------------
Flashing Selected Partitions....
- modem(0)[NON-HLOS.bin] Failed
Operation : Setbootablestoragedrive: Drive 0
Set bootable storage drive 0 Ok

Rebooting Phone.... Ok

Elapsed Time : 00:00:13
BR
Dipendra Pathak

  Reply With Quote
Old 02-10-2021, 03:58   #1182 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,624
Oppo A37FW Writing IMEI in QCN successfully done by Hydra Tool

Oppo A37FW Writing IMEI in QCN successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
Hydra Qualcomm Tool Ver 1.0.2 Build 72
Windows 8.1 (Version 6.3, Build 9600, 64-bit Edition)
Intel(R)Core(TM) i5-3470S CPU @ 2.90GHz
Intel(R) HD Graphics
Ram Installed : 4 GB
Windows Access Right Admin
******* Dongle Info *******
Version : Hydra Tool v 1.2
Serial : **************
Initialize : OKAY
Status : Activated
Life : 0 [0-0-0-0-0]


Selected Comport : [FOUND](COM3)

Firmware ID : MPSS.DPM.2.0.2.c1.10-00065-M8936FAAAANUZM-1.110272.1.112997.1_VENDOR
Build Date : ar 16 201911:30:28Aug 21 201723:00:00EAAAANUZ: Śd
IMEI1 : 868631036******
IMEI2 : 868631036******

Enabling MultiSim....
Sending SPC Code... OK
Restoring Qcn....
Restoring Qcn Success
Elapsed Time : 00:00:22
BR
Dipendra Pathak

  Reply With Quote
Old 02-10-2021, 04:13   #1183 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,624
Xiaomi Redmi 6A (cactus) Mi Account removing erasing method successfully done by Hydr

Xiaomi Redmi 6A (cactus) Mi Account removing erasing method successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
Brand : XIAOMI Model : Redmi 6A (cactus) Connection : Flash Mode

=====================================
Connection
-Please wait...
-Found...[COM24]

TPortConnection.Create...(COM24)..Opening...Ok

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : ACB14B9139B5701BF7D20EE8EE3C0A5D
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000020000000 -512 MB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003A3E00000 -14.561 GB
eMMC CID : 150100514536334D420300399790B58F - QE63MB

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi 6A
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-GB
Description : cactus-user 9 PPR1.180610.011 V11.0.8.0.PCBMIXM release-keys
Miui Ver : V11
Device : cactus
Mod_device : cactus_global
Display ID : SW_S98506AE1_V009_M13_XM_C3C_USR
Security Patch : 2020-05-01
Fingerprint : xiaomi/cactus/cactus:9/PPR1.180610.011/V11.0.8.0.PCBMIXM:user/release-keys
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Remove MiAccount[Erase Method]
Processing...
-persist.bin[0x0F000000]64 MB ->persist.bin...Ok
-frp.bin[0x05588000]1024 KB ->frp.bin...Ok Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:15
BR
Dipendra Pathak

  Reply With Quote
Old 02-10-2021, 04:28   #1184 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,624
Oppo A57 (CPH1701) FRP successfully removed by Hydra Tool

Oppo A57 (CPH1701) FRP successfully removed by Hydra Tool

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : OPPO Model : A57 (CPH1701) Storage : Auto
Loader: Oppo_A57_8940.mbn
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM27)
SymbolicName :\??\USB#VID_05C6&PID_9008#7&11ee7dbc&0&4#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/02/2017,2.1.2.7

Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 2536294619
Firmware Version : 7
Product Name : RX1BMB
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 61071360[29.121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok

Phone Information.....
Brand : OPPO
Vendor : OPPO
Model : CPH1701
ID : MMB29M
SDK : 23
Release : 6.0.1
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : msm8937_64-user 6.0.1 MMB29M eng.root.20180806.181819 release-keys
Device : CPH1701
Board : QC_Reference_Phone
Display ID : CPH1701EX_11_A.34_180806
Security Patch : 2018-05-05
Emmc_size : 16GB
Platform : msm8937
FRPPST : /dev/block/bootdevice/by-name/config

Reading GPT[3]
Drive [0] 56 Items
Drive [1] 0 Items
Drive [2] 4 Items

Removing FRPta...
Method :
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOkOk

Elapsed Time : 00:00:05
BR
Dipendra Pathak

  Reply With Quote
Old 02-10-2021, 04:34   #1185 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,624
Wiko V3913 (Kenny) FRP successfully removed by Hydra Tool

Wiko V3913 (Kenny) FRP successfully removed by Hydra Tool

Screen Short:



Logs:

Quote:
Brand : WIKO Model : V3913 (Kenny) Connection : Flash Mode

=====================================
Connection
-Please wait...
-Connect Phone...
-Found...
-PreLoader...[COM13]

TPortConnection.Create...(COM13)..Opening...Ok

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0335 (0000)MT6737[6735]
BROM HW_SW_VER : 8A00 CA00 0000 0000

Handshaking...

Identifying Hardware ID.....
BROM CPUID : 0335 (0000)MT6737[6735]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
SECURE VERSION : 00
BL VERSION : 00
BR Secured : 00
NORMAL BOOT

Preparing Download Agent..
DA : 6735_SWSEC_Wiko.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.00.00
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : Old - eMMC
00000000000000000000
PRMMCCID : 460001154D32584EB2E80642A7B2CAF2
Init Configuration
Running DA 4.2 on BBID : 0x9B Ok

Initializing Loader [2]
Sending Loader [2] Accepted
Reading Flashchip data....
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000080000 -512 KB
eMMC USER : 0x00000001D2000000 -7,281 GB
ERAM Size : 0x0000000040000000 -1024 MB
IRAM Size : 0x0000000000020000 -128 KB
UNICAL RID : 20DB4AF6C8687B99898119E16D9363ED
eMMC CID : 460001154D32584EB2E80642A764CAF2
Change to HIGH SPEED...
5A
Connection
-Please wait...
-Found...[COM21]


Reading Partition Table
SIZE[0x00000898] 25 Items > Done

Reading System Info
Brand : WIKO
Vendor : WIKO
Model : KENNY
ID : NRD90M
SDK : 24
Release : 7.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Description : full_v3913-user 7.0 NRD90M 1488199004 release-keys
Device : v3913
Display ID : alps-mp-n0.mp1-V1.0.2_tinno6737m.35.n_P182
Security Patch : 2017-07-05
Platform : mt6737m
FRPPST : /dev/block/platform/mtk-msdc.0/11230000.msdc0/by-name/frp
Fingerprint : WIKO/v3913/v3913:7.0/NRD90M/1488199004:user/release-keys
StorageType : mtp
Userdata State : Not Encrypted

Autobackup Partitions
-preloader[0x00000000] 512 KB -> preloader.bin...Ok
-> Renaming Preloader.... preloader_v3913.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\WIKO_KENNY_0335-mt6737m-7.0_alps-mp-n0.mp1-V1.0.2_tinno6737m.35.n_P182_040221142055\MT6737_An droid_scatter.txt
-nvram[0x00380000] 5 MB -> nvram.bin...Ok
-frp[0x07E00000] 1024 KB -> frp.bin...Ok
-nvdata[0x07F00000] 32 MB -> nvdata.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\WIKO_KENNY_0335-mt6737m-7.0_alps-mp-n0.mp1-V1.0.2_tinno6737m.35.n_P182_040221142055
MTK Phone Loader is NOW RUNNING.


Reading System Info
Brand : WIKO
Vendor : WIKO
Model : KENNY
ID : NRD90M
SDK : 24
Release : 7.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Description : full_v3913-user 7.0 NRD90M 1488199004 release-keys
Device : v3913
Display ID : alps-mp-n0.mp1-V1.0.2_tinno6737m.35.n_P182
Security Patch : 2017-07-05
Platform : mt6737m
FRPPST : /dev/block/platform/mtk-msdc.0/11230000.msdc0/by-name/frp
Fingerprint : WIKO/v3913/v3913:7.0/NRD90M/1488199004:user/release-keys
StorageType : mtp
Userdata State : Not Encrypted

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition... [Ok] Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:18
BR
Dipendra Pathak

  Reply With Quote
Reply

Bookmarks

Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


 



All times are GMT +1. The time now is 03:06.



Powered by Searchlight © 2024 Axivo Inc.
vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2024 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2023 -
Page generated in 0.43068 seconds with 9 queries

SEO by vBSEO