GSM Shop GSM Shop
GSM-Forum  

Welcome to the GSM-Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features.
Only registered members may post questions, contact other members or search our database of over 8 million posts.

Registration is fast, simple and absolutely free so please - Click to REGISTER!

If you have any problems with the registration process or your account login, please contact contact us .

Go Back   GSM-Forum > Product Support Sections > Special Solutions / Services / WebShop > GSMFABRICA Products > HYDRA TOOL

Reply
 
LinkBack Thread Tools Display Modes
Old 02-11-2021, 15:02   #1201 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,599
Xiaomi Redmi 6 Mi Account Successfully Removed with Erased Method by Hydra Tool


Xiaomi Redmi 6 Mi Account Successfully Removed with Erased Method by Hydra Tool

Screen Short:



Logs:

Quote:
Brand : AUTO Model : AUTO Connection : Flash Mode

=====================================
Connection
-Please wait...
-Connect Phone...
-Found...[COM72]

TPortConnection.Create...(COM72)..Opening...Ok

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0766MT6765[6765]
BROM HW_SW_VER : 8A00 CA00 0000 0000
getMTKPayloadExploit : 0766
#Executing Exploit..
#SUCCESS..

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0766MT6765[6765]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
SECURE VERSION : 05
BL VERSION : FE
BR Secured : E0

Preparing Download Agent..
DA : 6765_SWSEC_56EC405E9E.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2018/04/19.10:40_426269
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_cactus.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 780701B79E40D42F78C408D66BDEC401
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000030000000 -768 MB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 13014E53304A394237100638A2DC85C1 - S0J9B7

DA Speed : high-speed
DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi 6
ID : O11019
SDK : 27
Release : 8.1.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-GB
Description : cereus-user 8.1.0 O11019 V10.3.6.0.OCGMIXM release-keys
Miui Ver : V10
Device : cereus
Mod_device : cereus_global
Display ID : O11019
Security Patch : 2019-08-01
Fingerprint : xiaomi/cereus/cereus:8.1.0/O11019/V10.3.6.0.OCGMIXM:user/release-keys
StorageType : mtp
Userdata State : Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_cereus.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\xiaomi_Redmi 6_0766--8.1.0_O11019_100221172150\MT6765_Android_scatter.t xt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x05588000]1024 KB ->frp.bin...Ok
-nvdata[0x07688000]64 MB ->nvdata.bin...Ok
-persist[0x0F000000]64 MB ->persist.bin...Ok
-nvram[0x1BE80000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\xiaomi_Redmi 6_0766--8.1.0_O11019_100221172150
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 780701B79E40D42F78C408D66BDEC401
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000030000000 -768 MB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 13014E53304A394237100638A2DC85C1 - S0J9B7

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi 6
ID : O11019
SDK : 27
Release : 8.1.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-GB
Description : cereus-user 8.1.0 O11019 V10.3.6.0.OCGMIXM release-keys
Miui Ver : V10
Device : cereus
Mod_device : cereus_global
Display ID : O11019
Security Patch : 2019-08-01
Fingerprint : xiaomi/cereus/cereus:8.1.0/O11019/V10.3.6.0.OCGMIXM:user/release-keys
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Remove MiAccount[Erase Method]
Processing...
-persist.bin[0x0F000000]64 MB ->persist.bin...Ok
-frp.bin[0x05588000]1024 KB ->frp.bin...Ok Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:01:59
BR
Dipendra Pathak

  Reply With Quote
Old 02-11-2021, 15:08   #1202 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,599
Xiaomi Redmi 7(Onclite) Successfully Flashed by Hydra Tool

Xiaomi Redmi 7(Onclite) Successfully Flashed by Hydra Tool

Screen Short:



Logs:

Quote:
Searching Device By Fastboot
Device Found...

Reading Information...version: 0.5
Product : onc
version : 0.5
Secure : yes
Device Info:
Device tampered: false
Device unlocked: true
Device critical unlocked: true
Charger screen enabled: true
Display panel:
Device Verity Mode: enforcing
Debug policy enable: false
--------------------------
Fastboot Flashing...
-config(config.bin) Skipped
-lksecapp(lksecapp.mbn) Ok
-lksecappbak(lksecapp.mbn) Ok
-devcfg(devcfg.mbn) Ok
-devcfgbak(devcfg.mbn) Ok
-rpm(rpm.mbn) Ok
-rpmbak(rpm.mbn) Ok
-misc(misc.img) Ok
-sbl1(sbl1.mbn) Ok
-sbl1bak(sbl1.mbn) Ok
-cmnlib(cmnlib_30.mbn) Ok
-cmnlibbak(cmnlib_30.mbn) Ok
-cmnlib64(cmnlib64_30.mbn) Ok
-cmnlib64bak(cmnlib64_30.mbn) Ok
-keymaster(km4.mbn) Ok
-keymasterbak(km4.mbn) Ok
-aboot(emmc_appsboot.mbn) Ok
-abootbak(emmc_appsboot.mbn) Ok
-tz(tz.mbn) Ok
-tzbak(tz.mbn) Ok
-dsp(adspso.bin) Ok
-splash(splash.img) Ok
-persist(persist.img) Skipped
-boot(boot.img) Ok
-recovery(recovery.img) Ok
-modem(NON-HLOS.bin) Ok
-dtbo(dtbo.img) Ok
-vbmeta(vbmeta.img) Ok
-cache(cache.img) Ok
-cust(cust.img) Ok
-vendor(vendor.img) Ok
-system(system.img) Ok
-userdata(userdata.img) Ok
All Done
--------------------------

Elapsed Time : 00:05:04
BR
Dipendra Pathak

  Reply With Quote
Old 02-11-2021, 15:19   #1203 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,599
Cherry Mobile SPD 7731E Flare J2 Max FRP successfully Removed by Hydra Tool

Cherry Mobile SPD 7731E Flare J2 Max FRP successfully Removed by Hydra Tool

Screen Short:



Logs:

Quote:
Port : [Auto] Scanning...COM10
TPortConnection.Create...(COM10)..Opening...Ok
Reading IMEI...
Error : 84.
IMEI 1 : 35157010*******
IMEI 2 : 35157010*******

Reading System Info..
Vendor : Cherry_Mobile
Model : Flare_J2_Max
Android Ver : 8.1.0
Device : Flare_J2_Max
Display ID : Cherry_Flare_J2_Max_V11_10162019
Security Patch : 2019-10-05
FRPPST : /dev/block/platform/soc/soc:ap-ahb/20600000.sdio/by-name/persist
Fingerprint : Cherry_Mobile/Flare_J2_Max/Flare_J2_Max:8.1.0/O21019/1571218870:user/release-keys
ro_product_hardware : #sc7731e
sys_hardware_version : SC7731e_2_IRD_K_V1.1.0

*** Flash Mode #Ultra Power ***
Resetting FRP...Ok
Formatting userdata...Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:01:22
BR
Dipendra Pathak

  Reply With Quote
Old 02-11-2021, 15:26   #1204 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,599
Infinix X605 FRP successfully Removed by Hydra Tool

Infinix X605 FRP successfully Removed by Hydra Tool

Screen Short:



Logs:

Quote:
Brand : AUTO Model : AUTO Connection : Flash Mode

=====================================
Connection
-Please wait...
-Connect Phone...
-Found...
-PreLoader...[COM144]

TPortConnection.Create...(COM144)..Opening...Ok

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0690MT6763T[6763]
BROM HW_SW_VER : 8A00 CA01 0001 0000

Handshaking...

Identifying Hardware ID.....
BROM CPUID : 0690MT6763T[6763]
BROM HW_SW_VER : 8A00 CA01 0001 0000
SECURE VERSION : FF
BL VERSION : 03
BR Secured : 05
NORMAL BOOT

Preparing Download Agent..
DA : MTK_AllInOne_DA.bin
Agent: MTK_DOWNLOAD_AGENT
Ver : MTK_AllInOne_DA_v3.3001.2017/12/14.17:12_396299
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : preloader

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : F34204E19A4C7DDB3FE9D0DF9849E762
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 90014A484347386134A235D4006E54A5 - HCG8a4

DA Speed : high-speed
DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info
Brand : Infinix
Vendor : INFINIX MOBILITY LIMITED
Model : Infinix X605
ID : O11019
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_X605_H632-user 8.1.0 O11019 1545059048 release-keys
Device : Infinix-X605_sprout
Display ID : X605-H632AD-O-181217V285
Security Patch : 2018-12-05
Fingerprint : Infinix/H632/Infinix-X605_sprout:8.1.0/O11019/AD-181217V285:user/release-keys
StorageType : mtp
Userdata State : Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_x605_h632.bin
Creating Scatter file... C:\Users\USER\Desktop\HydraTool_Fullpackage_01-25-2021\\Backup\Auto\Infinix_Infinix X605_0690--8.1.0_X605-H632AD-O-181217V285_100221110921\MT6763T_Android_scatter.tx t
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x01588000]1024 KB ->frp.bin...Ok
-nvdata[0x03688000]64 MB ->nvdata.bin...Ok
-persist[0x0B000000]48 MB ->persist.bin...Ok
-nvram[0x0E500000]64 MB ->nvram.bin...Ok
Done!!!
C:\Users\USER\Desktop\HydraTool_Fullpackage_01-25-2021\\Backup\Auto\Infinix_Infinix X605_0690--8.1.0_X605-H632AD-O-181217V285_100221110921
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : F34204E19A4C7DDB3FE9D0DF9849E762
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 90014A484347386134A235D4006E54A5 - HCG8a4

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Brand : Infinix
Vendor : INFINIX MOBILITY LIMITED
Model : Infinix X605
ID : O11019
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_X605_H632-user 8.1.0 O11019 1545059048 release-keys
Device : Infinix-X605_sprout
Display ID : X605-H632AD-O-181217V285
Security Patch : 2018-12-05
Fingerprint : Infinix/H632/Infinix-X605_sprout:8.1.0/O11019/AD-181217V285:user/release-keys
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition...[C002002A-STATUS_SEC_IMG_TYPE_MISMATCH]
Erasing FRP Partition... Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:28
BR
Dipendra Pathak

  Reply With Quote
Old 02-11-2021, 15:32   #1205 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,599
Cherry Mobile Flare S8 Lite FRP successfully removed by Hydra Tool

Cherry Mobile Flare S8 Lite FRP successfully removed by Hydra Tool

Screen Short:



Logs:

Quote:
Brand : CHERRY MOBILE Model : Flare S8 Lite Connection : Flash Mode

=====================================
Connection
-Please wait...
-Connect Phone...
-Found...
-PreLoader...[COM47]

TPortConnection.Create...(COM47)..Opening...Ok

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0690MT6763T[6763]
BROM HW_SW_VER : 8A00 CA01 0001 0000

Handshaking...

Identifying Hardware ID.....
BROM CPUID : 0690MT6763T[6763]
BROM HW_SW_VER : 8A00 CA01 0001 0000
SECURE VERSION : FF
BL VERSION : 03
BR Secured : 00

Preparing Download Agent..
DA : [Not Exist]
Trying Default 6763.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2020-11-03.22:07_536568
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : preloader

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC
Sending Certifificate

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 017919DBFCF95BDB51A25658A75F4E0C
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003AB800000 -14.68 GB
eMMC CID : 90014A484147346132A40DB9304AC393 - HAG4a2

DA Speed : high-speed
DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info
Brand : Cherry_Mobile
Vendor : Cherry_Mobile
Model : Flare S8 Lite
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_k63v2_64_bsp-user 9 PPR1.180610.011 1578561636 release-keys
Device : H1950
Display ID : Cherry_H1950_Flare_S8_Lite_01102020_V10
Security Patch : 2020-01-05
FRPPST : /dev/block/platform/bootdevice/by-name/frp
Fingerprint : Cherry_Mobile/Flare_S8_Lite/H1950:9/PPR1.180610.011/1578561636:user/release-keys
StorageType : mtp
Userdata State : Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_k63v2_64_bsp.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\Cherry_Mobile_Flare S8 Lite_0690--9_Cherry_H1950_Flare_S8_Lite_01102020_V10_10022115 1944\MT6763T_Android_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x03588000]1024 KB ->frp.bin...Ok
-nvdata[0x05688000]64 MB ->nvdata.bin...Ok
-persist[0x0D000000]48 MB ->persist.bin...Ok
-nvram[0x17800000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\Cherry_Mobile_Flare S8 Lite_0690--9_Cherry_H1950_Flare_S8_Lite_01102020_V10_10022115 1944
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 017919DBFCF95BDB51A25658A75F4E0C
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003AB800000 -14.68 GB
eMMC CID : 90014A484147346132A40DB9304AC393 - HAG4a2

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Brand : Cherry_Mobile
Vendor : Cherry_Mobile
Model : Flare S8 Lite
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_k63v2_64_bsp-user 9 PPR1.180610.011 1578561636 release-keys
Device : H1950
Display ID : Cherry_H1950_Flare_S8_Lite_01102020_V10
Security Patch : 2020-01-05
FRPPST : /dev/block/platform/bootdevice/by-name/frp
Fingerprint : Cherry_Mobile/Flare_S8_Lite/H1950:9/PPR1.180610.011/1578561636:user/release-keys
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition...[C002002A-STATUS_SEC_IMG_TYPE_MISMATCH]
Erasing FRP Partition... Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:34
BR
Dipendra Pathak

  Reply With Quote
Old 02-11-2021, 15:37   #1206 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,599
Vivo Y53i (1606) Safe format user data successfully done by Hydra Tool

Vivo Y53i (1606) Safe format user data successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : VIVO Model : Y53i (1606) Storage : Auto
Loader: 8917.mbn
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM11)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&388db30c&0&3#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/31/2015,2.1.2.0

Getting device info......
Serial No.: 0x2B5A7A99
MSM ID : 0x000560E1, MSM8917-Qualcomm Snapdragon 425
PBL Ver : 00000000
PK HASH : 60BA997FEF6DA9F05885FA11F1DD6D2A
90D052A257A09C2075D7246CC73C0D43

Firehose Loader[8917.mbn]
SaharaBoot... Ok
Sending .................Ok
Connecting to Firehose...
Ping... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8917
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 499778650
Firmware Version : 165
Product Name : HAG4a2
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 30777344[14.676 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok
Reading GPT[3]
Drive [0] 52 Items
Drive [1] 0 Items
Drive [2] 0 Items


Phone Information.....
Brand : vivo
Vendor : vivo
Model : vivo PD1628F_EX
ID : MMB29M
SDK : 23
Release : 6.0.1
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-US
Description : msm8937_32-user 6.0.1 MMB29M eng.compiler.20190105.211334 release-keys
Device : PD1628F_EX
Board : QC_Reference_Phone
Display ID : MMB29M release-keys
Security Patch : 2018-08-01
Emmc_size : 16GB
Platform : msm8937
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : vivo/PD1628F_EX/PD1628F_EX:6.0.1/MMB29M/compiler01052117:user/release-keys

Processing Safe Format - EMMC....
- Removing FRP [Zero Wipe] Ok
- Formatting Userdata [Safe method] Ok
Action Result : Ok

Rebooting Phone.... Ok

Elapsed Time : 00:00:12
BR
Dipendra Pathak

  Reply With Quote
Old 02-11-2021, 15:44   #1207 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,599
Cherry mobile Flare S6 Lite formatting user data successfully done by Hydra Tool

Cherry mobile Flare S6 Lite formatting user data successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
Brand : CHERRY MOBILE Model : Flare S6 Lite Connection : Flash Mode

=====================================
Connection
-Please wait...
-Connect Phone...
-Found...[COM9]

TPortConnection.Create...(COM9)..Opening...Ok

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 6580 (0000)MT6580[6580]
BROM HW_SW_VER : 8A00 CA00 0000 0000

Handshaking...

Identifying Hardware ID.....
BROM CPUID : 6580 (0000)MT6580[6580]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00001002
FUSEID : 00000000
SECURE VERSION : 05
BL VERSION : FE
BR Secured : 01
NORMAL BOOT

Preparing Download Agent..
DA : 6580_SP_8B2DCD2CC0.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.00.00
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : Old - eMMC
0000000000000000000000000000
PRMMCCID : 150100464E58324D4206BEF2B28A349B
Init Configuration
Running DA 4.2 on BBID : 0x9C

Scanning Init Database...
FRT-0-140A-00WW-1-2-preloader_FRT.bin
FLASH Chip Initialization
C:\Users\Desktop\hydra\HUMTool\BOOT\PREL\FRT-0-140A-00WW-1-2-preloader_FRT.bin
ERROR : EMMI Settings
14Accepted Ok

Initializing Loader [2]
Sending Loader [2] Accepted
Reading Flashchip data....
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000080000 -512 KB
eMMC USER : 0x00000001D2000000 -7.281 GB
ERAM Size : 0x0000000040000000 -1024 MB
IRAM Size : 0x0000000000020000 -128 KB
UNICAL RID : E03D17B4B2C54D9B734008FD7BE4E458
eMMC CID : 460001154D32584EF2BE06429B348AB2
Change to HIGH SPEED...
5A
Connection
-Please wait...
-Found...[COM11]


Reading Partition Table
SIZE[0x00000738] 21 Items > Done

Reading System Info
Brand : Cherry_Mobile
Vendor : Cherry_Mobile
Model : Flare S6 Lite DTV
ID : NRD90M
SDK : 24
Release : 7.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-US
Description : full_wd395v-user 7.0 NRD90M 1509418055 release-keys
Device : S6_Lite_DTV
Board : Cherry
Display ID : Cherry_Mobile_Flare_S6_lite_DTV_V07_20171031
Security Patch : 2017-10-05
Platform : mt6580
FRPPST : /dev/block/platform/mtk-msdc.0/11120000.msdc0/by-name/frp
Fingerprint : Cherry_Mobile/S6_Lite_DTV/S6_Lite_DTV:7.0/NRD90M/20171031.105129:user/release-keys
StorageType : mtp
Userdata State : Not Encrypted

Autobackup Partitions
-preloader[0x00000000] 512 KB -> preloader.bin...Ok
-> Renaming Preloader.... preloader_wd395v.bin
Creating Scatter file... C:\Users\Desktop\hydra\HUMTool\\Backup\Auto\Cherry _Mobile_Flare S6 Lite DTV_6580-mt6580-7.0_Cherry_Mobile_Flare_S6_lite_DTV_V07_20171031_1 00221142132\MT6580_Android_scatter.txt
-nvram[0x00380000] 5 MB -> nvram.bin...Ok
-frp[0x04FC0000] 1024 KB -> frp.bin...Ok
-nvdata[0x050C0000] 32 MB -> nvdata.bin...Ok
Done!!!
C:\Users\Desktop\hydra\HUMTool\\Backup\Auto\Cherry _Mobile_Flare S6 Lite DTV_6580-mt6580-7.0_Cherry_Mobile_Flare_S6_lite_DTV_V07_20171031_1 00221142132
MTK Phone Loader is NOW RUNNING.


Reading System Info
Brand : Cherry_Mobile
Vendor : Cherry_Mobile
Model : Flare S6 Lite DTV
ID : NRD90M
SDK : 24
Release : 7.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-US
Description : full_wd395v-user 7.0 NRD90M 1509418055 release-keys
Device : S6_Lite_DTV
Board : Cherry
Display ID : Cherry_Mobile_Flare_S6_lite_DTV_V07_20171031
Security Patch : 2017-10-05
Platform : mt6580
FRPPST : /dev/block/platform/mtk-msdc.0/11120000.msdc0/by-name/frp
Fingerprint : Cherry_Mobile/S6_Lite_DTV/S6_Lite_DTV:7.0/NRD90M/20171031.105129:user/release-keys
StorageType : mtp
Userdata State : Not Encrypted

-------------------------------------
Operation : Erase Userdata
Processing...
Formatting Userdata... Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:01:08
BR
Dipendra Pathak

  Reply With Quote
Old 02-11-2021, 15:48   #1208 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,599
Xiaomi Redmi 8A (olivelite) FRp successfully Removed by Hydra Tool

Xiaomi Redmi 8A (olivelite) FRp successfully Removed by Hydra Tool

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : XIAOMI Model : Redmi 8A (olivelite) Storage : Auto
Loader: Xiaomi_Redmi_8_Olive.mbn
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM103)
SymbolicName :\??\USB#VID_05C6&PID_9008#7&32bc770e&0&3#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :03/19/2014,2.1.1.2

Getting device info......
Serial No.: 0x6A37CDB0
MSM ID : 0x000BF0E1, SDM439-Qualcomm Snapdragon 439
PBL Ver : 00000000
PK HASH : 57158EAF1814D78FD2B3105ECE4DB18A
817A08AC664A5782A925F3FF8403D39A

Firehose Loader[Xiaomi_Redmi_8_Olive.mbn]
SaharaBoot... Ok
Sending .......................Ok
Connecting to Firehose...
Ping... Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[VNh93vp3
Checking Internet connection....
- Hydra Is Online
Connecting to Hydra Xiaomi Server...

Signature @256bytes Authentication.... Accepted......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 77129935
Firmware Version : 909127728
Product Name : hB8aP>
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 61071360[29,121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok

Phone Information......
Brand : Xiaomi
Vendor : Xiaomi
Model : Redmi 8A
ID : PKQ1.190319.001
SDK : 28
Release : 9
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-GB
Description : olivelite-user 9 PKQ1.190319.001 V11.0.1.0.PCPRUXM release-keys
Miui Ver : V11
Device : olivelite
Mod_device : olivelite_ru_global
Display ID : ZQL2116-olivelite-build-20191122230220
Security Patch : 2019-11-01
Emmc_size : 16GB
Fingerprint : Xiaomi/olivelite_ru/olivelite:9/PKQ1.190319.001/V11.0.1.0.PCPRUXM:user/release-keys

Reading GPT[3]
Drive [0] 64 Items
Drive [1] 0 Items
Drive [2] 0 Items

Removing FRPta...
Method :
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOkOk

Elapsed Time : 00:00:15
BR
Dipendra Pathak

  Reply With Quote
Old 02-12-2021, 06:53   #1209 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,599
Xioami Redmi Note 3 successfully flashed by Hydra Tool

Xioami Redmi Note 3 successfully flashed by Hydra Tool

Screen Short:



Logs:

Quote:
Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM52)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&221869e0&0&3#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :07/08/2015,2.1.2.0

Getting device info......
Serial No.: 0x89A7FE77
MSM ID : 0x0008C0E1, SDM660-Qualcomm Snapdragon 660
PBL Ver : 00000000
PK HASH : A7B8B82545A98ECA23D6E9105FB46456
8D1B5828264903441BDEF0CD57E3C370

Firehose Loader[mi_2_9.elf]
SaharaBoot... Ok
Sending ...............................Ok
Connecting to Firehose...
Ping...... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : MSM8996
Version : 1
DateTime : Aug 2 2018 - 22:27:53

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 3299584703
Firmware Version : 5
Product Name : 3H6CMB
Physical Partitions : 4
Total Logical Blocks:
Drive [0] 122142720[58,242 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Drive [3] 8192[4 MB]

Protocol : Universal
Running : Ok

Phone Information.....
Brand : Xiaomi
Vendor : Xiaomi
Model : Mi Note 3
ID : PKQ1.181007.001
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : zh-CN
Description : jason-user 9 PKQ1.181007.001 V11.0.2.0.PCHCNXM release-keys
Miui Ver : V11
Device : jason
Display ID : PKQ1.181007.001
Security Patch : 2019-09-01
FRPPST : /dev/block/bootdevice/by-name/frp
Fingerprint : Xiaomi/jason/jason:9/PKQ1.181007.001/V11.0.2.0.PCHCNXM:user/release-keys

Reading GPT[4]
Drive [0] 72 Items
Drive [1] 0 Items
Drive [2] 0 Items
Drive [3]


Backup Security partitions...
Reading Security Items....
> modemst1
> modemst2
> fsg
C:\Hydra Tool\Backup\Security_Backup\Mi Note 3__9_Security_021021163906.sec
Backup Security Success....

----------------------------
Flashing Selected Partitions....
- switch(0)[dummy.img] Ok
- storsec(0)[storsec.mbn] Ok
- storsecbak(0)[storsec.mbn] Ok
- rpm(0)[rpm.mbn] Ok
- rpmbak(0)[rpm.mbn] Ok
- hyp(0)[hyp.mbn] Ok
- hypbak(0)[hyp.mbn] Ok
- cmnlib(0)[cmnlib.mbn] Ok
- cmnlibbak(0)[cmnlib.mbn] Ok
- cmnlib64(0)[cmnlib64.mbn] Ok
- cmnlib64bak(0)[cmnlib64.mbn] Ok
- keymaster(0)[keymaster.mbn] Ok
- keymasterbak(0)[keymaster.mbn] Ok
- pmic(0)[pmic.elf] Ok
- pmicbak(0)[pmic.elf] Ok
- bluetooth(0)[BTFM.bin] Ok
- devcfg(0)[devcfg.mbn] Ok
- devcfgbak(0)[devcfg.mbn] Ok
- abl(0)[abl.elf] Ok
- ablbak(0)[abl.elf] Ok
- misc(0)[dummy.img] Ok
- xbl(0)[xbl.elf] Ok
- xblbak(0)[xbl.elf] Ok
- tz(0)[tz.mbn] Ok
- tzbak(0)[tz.mbn] Ok
- dsp(0)[dspso.bin] Ok
- logo(0)[logo.img] Ok
- persist(0)[persist.img] Skipped
- boot(0)[boot.img] Ok
- recovery(0)[recovery.img] Ok
- modem(0)[NON-HLOS.bin] Ok
- cache(0)[cache.img] Ok
- cust(0)[cust.img] Ok
- system(0)[system.img] Ok
- userdata(0)[userdata.img] Ok
- PrimaryGPT(0)[gpt_main0.bin] Ok

Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-33.] OK
0 [CRC32(2,9216)] OK
0 [CRC32(NUM_DISK_SECTORS-33.,9216)] OK
0 [0] OK
0 [CRC32(1,92)] OK
0 [0] OK
0 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 0
Set bootable storage drive 0 Ok

Rebooting Phone.... Ok

Elapsed Time : 00:02:39
BR
Dipendra Pathak

  Reply With Quote
Old 02-12-2021, 06:59   #1210 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,599
Asus Xo1AD (Zenefone Max M2 ZB633KL) successfully flashed by Hydra Tool

Asus Xo1AD (Zenefone Max M2 ZB633KL) successfully flashed by Hydra Tool

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : ASUS Model : X01AD (ZenFone Max M2 ZB633KL) Storage : Auto
Loader: asus_5_1.mbn
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM3)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&201b4142&0&1#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/02/2017,2.1.2.7

Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8953
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 822725784
Firmware Version : 7
Product Name : RX1BMB
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 61071360[29.121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok

Phone Information......
Brand : asus
Vendor : asus
Model : ASUS_X01AD
ID : WW_Phone-201905061022
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : msm8953_64-user 9 WW_Phone-201905061022 42 release-keys
Device : ASUS_X01A_1
Display ID : OPM1.WW_Phone-16.2018.1905.42-20190506
Security Patch : 2019-05-05
Emmc_size : 16GB
Fingerprint : asus/WW_X01AD/ASUS_X01A_1:9/WW_Phone-201905061022/16.2018.1905.42-20190506:user/release-keys

Reading GPT[3]
Drive [0] 68 Items
Drive [1] 0 Items
Drive [2] 0 Items

Formatting Userdata...
Method :
Auto
Processing...
- Formatting Userdata
Executing ...
- Formatting Userdata [Safe method] OkOkOk

Elapsed Time : 00:00:04
BR
Dipendra Pathak

  Reply With Quote
Old 02-12-2021, 07:04   #1211 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,599
Lava A3 mini safe format successfully done by hydra Tool

Lava A3 mini safe format successfully done by hydra Tool

Screen Short:



Logs:

Quote:
Brand : LAVA Model : A3 Mini Connection : Flash Mode

=====================================
Connection
-Please wait...
-Found...[COM59]

TPortConnection.Create...(COM59)..Opening...Ok


Reading System Info
Brand : LAVA
Vendor : LAVA
Model : A3_mini
ID : NRD90M
SDK : 24
Release : 7.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_lava6737t_sp508-user 7.0 NRD90M 1487573400 release-keys
Device : A3_mini
Board : A3_mini
Display ID : LAVA_A3_mini_INT_S112_17C14
Security Patch : 2017-02-05
Platform : mt6737t
FRPPST : /dev/block/platform/mtk-msdc.0/11230000.msdc0/by-name/frp
Fingerprint : LAVA/A3_mini/A3_mini:7.0/NRD90M/1487573400:user/release-keys
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition... [Ok]
Safeformat Universal...(tmp.bin)240 Bytes Ok Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:03
BR
Dipendra Pathak

  Reply With Quote
Old 02-12-2021, 07:10   #1212 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,599
Generic SC7XX SPD successfully flashed using PAC file by Hydra Tool

Generic SC7XX SPD successfully flashed using PAC file by Hydra Tool

Screen Short:



Logs:

Quote:
=====================================
Port : [Auto] Scanning...COM9
TPortConnection.Create...(COM9)..Opening...Ok
C:\Users\BNS\Downloads\SP7731_1 (1).PAC
Project : BP_R1.0.0
SIZE : 0x4D748EC4
CPUID : SC77xx
DISPLAYID : SC7731_eMMC_HDR_SP7731G_1H10_6.0_INFINITY-BOX

Flashing Partitions...
NV_W [nvitem_w.bin]
Error : 81
NV_WCN [nvitem_wcn.bin]
Error : 8B
ProdNV [prodnv.img]
Error : 8B
SPLLoader [u-boot-spl-16k.bin]
Error : 8B
Modem_W [sc7731g_CP0_modem.bin]
Error : 8B
DSP_W [DSP_DM_Gx.bin]
Error : 8B
Modem_WCN [sc8830g_modem_CP2_WCN_14D_W16.26.3_Release.bin]
Error : 8B
BootLogo [logo_480x960.bin]
Error : 8B
Fastboot_Logo [fblogo_480x854.bin]
Error : 8B
BOOT [boot.img]
Error : 8B
System [system.img]
Error : 8B
SysInfo [sysinfo.img]
Error : 8B
Cache [cache.img]
Error : 8B
Recovery [recovery.img]
Error : 8B
UserData [userdata.img]
Error : 8B
UBOOTLoader [u-boot.bin]
Error : 8B
Done!!!
Rebooting Phone..Failed

TPortConnection.Destroy.....Closing...Ok..
=====================================

Elapsed Time : 00:00:02
BR
Dipendra Pathak

  Reply With Quote
Old 02-12-2021, 07:18   #1213 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,599
Oppo A37F (Neo 9) Zero wipe FRP successfully removed by HYdra Tool

Oppo A37F (Neo 9) Zero wipe FRP successfully removed by HYdra Tool

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : OPPO Model : A37F (Neo 9) Storage : Auto
Loader: 8916.mbn
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM33)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&18e4146f&0&1#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/02/2017,2.1.2.7

Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok
Configuration.......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8916
Version : 1


Protocol : Universal
Running : Ok

Phone Information.....
Brand : OPPO
Vendor : OPPO
Model : A37f
ID : LMY47V
SDK : 22
Release : 5.1.1
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Description : msm8916_64-user 5.1.1 LMY47V eng.root.20190711.032745 release-keys
Board : msm8916
Display ID : A37fEX_11_190711
Security Patch : 2018-03-01
Platform : msm8916
FRPPST : /dev/block/bootdevice/by-name/config

Reading GPT[3]
Drive [0] 40 Items
Drive [1] 0 Items
Drive [2] 4 Items

Removing FRPta...
Method :
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOkOk

Elapsed Time : 00:00:09
BR
Dipendra Pathak

  Reply With Quote
Old 02-12-2021, 07:25   #1214 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,599
Xiaomi Redmi 8A Dual (olivewood) Removed Mi Account with Patched Method by Hydra Tool

Xiaomi Redmi 8A Dual (olivewood) Removed Mi Account with Patched Method by Hydra Tool

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : XIAOMI Model : Redmi 8A Dual (olivewood) Storage : Auto
Loader: Xiaomi_Redmi_8_Olive.mbn
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM10)
SymbolicName :\??\USB#VID_05C6&PID_9008#6&3a6a7fd9&0&5#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/04/2013,2.1.0.5

Getting device info......
Serial No.: 0xDA67551F
MSM ID : 0x000BF0E1, SDM439-Qualcomm Snapdragon 439
PBL Ver : 00000000
PK HASH : 57158EAF1814D78FD2B3105ECE4DB18A
817A08AC664A5782A925F3FF8403D39A

Firehose Loader[Xiaomi_Redmi_8_Olive.mbn]
SaharaBoot... Ok
Sending .......................Ok
Connecting to Firehose...
Ping... Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[O-OK2YwS4m-GyK7bfPsrASll
Checking Internet connection....
- Hydra Is Online
Connecting to Hydra Xiaomi Server...

Signature @256bytes Authentication.... Accepted......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 2525388926
Firmware Version : 909127728
Product Name : hB8aP>
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 61071360[29,121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok
Reading GPT[3]
Drive [0] 64 Items
Drive [1] 0 Items
Drive [2] 0 Items


Phone Information......
Vendor : Xiaomi
ID : QKQ1.191014.001
SDK : 29
Release : 10
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-GB
Miui Ver : V11
Mod_device : olivelite_global
Security Patch : 2020-09-01
Emmc_size : 16GB

Processing Remove MiAccount[Patch Method]....
Backing up Partition for safety...Ok

Scanning Patching address...
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]Done!!
Total Items patched : 3
Successfully patched address..
Action Result : Ok

Elapsed Time : 00:00:25
BR
Dipendra Pathak

  Reply With Quote
Old 02-12-2021, 07:27   #1215 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,599
Xiaomi Redmi 7a (Pine) removed Mi Account with patched method by Hydra Tool

Xiaomi Redmi 7a (Pine) removed Mi Account with patched method by Hydra Tool

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : XIAOMI Model : Redmi 7A (pine) Storage : Auto
Loader: Xiaomi_Redmi_8_Olive.mbn
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM16)
SymbolicName :\??\USB#VID_05C6&PID_9008#6&352a5b97&0&1#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :03/10/2015,2.01.01.00

Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 2804963545
Firmware Version : 909127728
Product Name : hB8aP>
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 61071360[29,121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok
Reading GPT[3]
Drive [0] 60 Items
Drive [1] 0 Items
Drive [2] 0 Items


Phone Information......
Brand : Xiaomi
Vendor : Xiaomi
Model : Redmi 7A
ID : PKQ1.190319.001
SDK : 28
Release : 9
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-GB
Description : pine-user 9 PKQ1.190319.001 V11.0.7.0.PCMMIXM release-keys
Miui Ver : V11
Device : pine
Mod_device : pine_global
Display ID : ZQL1533-pine-build-20200407194230
Security Patch : 2020-03-01
Emmc_size : 16GB
Fingerprint : Xiaomi/pine/pine:9/PKQ1.190319.001/V11.0.7.0.PCMMIXM:user/release-keys

Processing Remove MiAccount[Patch Method]....
Backing up Partition for safety...Ok

Scanning Patching address...
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]Done!!
Total Items patched : 4
Successfully patched address..
Action Result : Ok

Rebooting Phone.... Ok

Elapsed Time : 00:00:12
BR
Dipendra Pathak

  Reply With Quote
Reply

Bookmarks

Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


 



All times are GMT +1. The time now is 08:36.



Powered by Searchlight © 2023 Axivo Inc.
vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2023 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2022 -
Page generated in 0.46414 seconds with 8 queries

SEO by vBSEO