GSM Shop GSM Shop
GSM-Forum  

Welcome to the GSM-Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features.
Only registered members may post questions, contact other members or search our database of over 8 million posts.

Registration is fast, simple and absolutely free so please - Click to REGISTER!

If you have any problems with the registration process or your account login, please contact contact us .

Go Back   GSM-Forum > Product Support Sections > Special Solutions / Services / WebShop > GSMFABRICA Products > HYDRA TOOL


Reply
 
LinkBack Thread Tools Display Modes
Old 03-04-2021, 23:57   #1381 (permalink)
Product Manager
 
Hydra Tool's Avatar
 
Join Date: Aug 2018
Location: Ukraine / Harkov
Posts: 1,986
Member: 2857401
Status: Offline
Thanks Meter: 6,861
Redmi Note 8 Pro IMEI Repair Bootloader Locked by Hydra Dongle


Xiaomi Redmi Note 8 Pro (begonia) IMEI Repair Bootloader Locked in Flash Mode | Without Auth and Without Credit


http://www.youtube.com/watch?v=ddjwIng2fug
  Reply With Quote
The Following 3 Users Say Thank You to Hydra Tool For This Useful Post:
Show/Hide list of the thanked
Old 03-06-2021, 04:47   #1382 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Xiaomi Redmi Note 6 Pro safe format user data successfully done by Hydra Tool

Xiaomi Redmi Note 6 Pro safe format user data successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : XIAOMI Model : Redmi Note 6 Pro (tulip) Storage : Auto
Loader: mi_2_9.elf
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM5)
SymbolicName :\??\USB#VID_05C6&PID_9008#6&3950927a&0&2#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/02/2017,2.1.2.7

Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping...... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : MSM8996
Version : 1
DateTime : Aug 2 2018 - 22:27:53

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 2427897914
Firmware Version : 2
Product Name : DH6DAB
Physical Partitions : 4
Total Logical Blocks:
Drive [0] 122142720[58.242 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Drive [3] 32768[16 MB]

Protocol : Universal
Running : Ok
Reading GPT[4]
Drive [0] 64 Items
Drive [1] 0 Items
Drive [2] 0 Items
Drive [3]


Phone Information.....
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi Note 6 Pro
ID : PKQ1.180904.001
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : tulip-user 9 PKQ1.180904.001 V10.3.6.0.PEKMIXM release-keys
Miui Ver : V10
Device : tulip
Mod_device : tulip_global
Display ID : PKQ1.180904.001
Security Patch : 2019-08-05
Fingerprint : xiaomi/tulip/tulip:9/PKQ1.180904.001/V10.3.6.0.PEKMIXM:user/release-keys

Processing Auto....
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOk
- Formatting Userdata
Executing ...
- Formatting Userdata [Safe method] OkOk
Action Result : Ok

Elapsed Time : 00:00:06
BR
Dipendra Pathak

  Reply With Quote
The Following User Says Thank You to Dipendra Pathak For This Useful Post:
Old 03-06-2021, 04:52   #1383 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Xiaomi Redmi Mi 8 Lite Partly flashed is done by Hydra Tool

Xiaomi Redmi Mi 8 Lite Partly flashed is done by Hydra Tool

Screen Short:



Logs:

Quote:
Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM4)
SymbolicName :\??\USB#VID_05C6&PID_9008#6&1c16f335&0&1#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/31/2015,2.1.2.0

Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping...... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : MSM8996
Version : 1
DateTime : Aug 2 2018 - 22:27:53

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 1666872926
Firmware Version : 875573296
Product Name : hC8aP>
Physical Partitions : 4
Total Logical Blocks:
Drive [0] 122142720[58,242 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Drive [3] 32768[16 MB]

Protocol : Universal
Running : Ok

Phone Information.....
Brand : Xiaomi
Vendor : Xiaomi
Model : MI 8 Lite
ID : PKQ1.181007.001
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : platina-user 9 PKQ1.181007.001 V11.0.8.0.PDTMIXM release-keys
Miui Ver : V11
Device : platina
Mod_device : platina_global
Display ID : PKQ1.181007.001
Security Patch : 2019-12-01
Fingerprint : Xiaomi/platina/platina:9/PKQ1.181007.001/V11.0.8.0.PDTMIXM:user/release-keys


----------------------------
Flashing Selected Partitions....
- abl(0)[abl.elf] Ok
- ablbak(0)[abl.elf] Ok
- xbl(0)[xbl.elf] Ok
- xblbak(0)[xbl.elf] Ok
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 0
Set bootable storage drive 0 Ok

Rebooting Phone.... Ok

Elapsed Time : 00:00:09
BR
Dipendra Pathak

  Reply With Quote
The Following User Says Thank You to Dipendra Pathak For This Useful Post:
Old 03-06-2021, 05:00   #1384 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
MTK MT6575 Safe format successfully with DA 6765_SWSEC.bin file by Hydra Tool

MTK MT6575 Safe format successfully with DA 6765_SWSEC.bin file by Hydra Tool

Screen Short:



Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode Preloader
FriendlyName :MediaTek PreLoader USB VCOM_V1632 (Android) (COM46)
SymbolicName :\??\USB#VID_0E8D&PID_2000#6&5bbb549&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0


Reading Device UniqueID, RAM and Flash Chip Info...
ERROR : ACK : 0x00010009[]
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000030000000 -768 MB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 150100474436424D42018DE096A0458B - GD6BMB

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
ERROR : ACK : 0x0001FEEE[]

-------------------------------------
Operation : Auto
Processing...
Safeformat Universal... Ok

Elapsed Time : 00:00:02
BR
Dipendra Pathak

  Reply With Quote
The Following User Says Thank You to Dipendra Pathak For This Useful Post:
Old 03-06-2021, 09:19   #1385 (permalink)
No Life Poster
 
Malik Shani G's Avatar
 
Join Date: Jul 2020
Location: pakistan daska
Age: 29
Posts: 672
Member: 2963610
Status: Offline
Thanks Meter: 560
huawei cro-l22 y3 2018 frp reset done by hydra tool
  Reply With Quote
The Following User Says Thank You to Malik Shani G For This Useful Post:
Old 03-06-2021, 14:16   #1386 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Xiaomi Redmi Note 9 (merlin) Remove MI Account and FRP Successfully Removed By Hydra

Xiaomi Redmi Note 9 (merlin) Remove MI Account and FRP Successfully Removed By Hydra

Screen Short:



Logs:

Quote:
Brand : XIAOMI Model : Redmi Note 9 (merlin) Connection : Flash Mode

=====================================
How To Boot : Power off phone
* BROM Mode : Press VOL + or Press VOL -+
* Preloader Mode : Just Insert cable

Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port (COM11)
SymbolicName :\??\USB#VID_0E8D&PID_0003#6&16219a97&0&2#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/03/2016,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0707MT6768[6768]
BROM HW_SW_VER : 8A00 CA00 0000 0000
getMTKPayloadExploit : 0707
#Executing Exploit..
#SUCCESS..
Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0707MT6768[6768]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
SECURE VERSION : 00
BL VERSION : FE
BR Secured : E0

Preparing Download Agent..
DA : 6768.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2020-11-03.22:07_536568
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
C0
Protocol : New
Synchronization...
SYNCSYNC
Mode : brom
Preloader Initialization...
Parsing preloader_merlin.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 88C84B37D7D0717168241420ECB16ED9
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58,242 GB
eMMC CID : 13014E53304A394A38101AAD28924739 - S0J9J8

DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_merlin.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0707__030521191158\MT6768_Androi d_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x05508000]1024 KB ->frp.bin...Ok
-nvdata[0x0C4A2000]64 MB ->nvdata.bin...Ok
-persist[0x104A2000]48 MB ->persist.bin...Ok
-nvram[0x19F80000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0707__030521191158
MTK Phone Loader is NOW RUNNING.
=====================================

Elapsed Time : 00:00:48
BR
Dipendra Pathak

  Reply With Quote
Old 03-07-2021, 04:27   #1387 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Huawei DRA-LX5 (Y5 Light) Zero Wipe FRP partition successfully done by Hydra Tool

Huawei DRA-LX5 (Y5 Light) Zero Wipe FRP partition successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port_V1632 (COM12)
SymbolicName :\??\USB#VID_0E8D&PID_0003#7&2b3b5751&0&3#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0


Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 158AB151BB5B1A49DEF42F0CF0942FB0
ERAM Size : 0x0000000000020000 -128 KB
IRAM Size : 0x0000000040000000 -1024 MB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003A3E00000 -14.561 GB
eMMC CID : 150100464536324D4206F85FCE7BC5EF - FE62MB

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Brand : HUAWEI
Vendor : HUAWEI
Model : DRA-LX5
ID : HUAWEIDRA-LX5
SDK : 27
Release : 8.1.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-US
Description : "DRA-LX5-user 8.1.0 HUAWEIDRA-LX5 1.0.0.150(C185) release-keys"
Device : HWDRA-MG
Board : DRA-LX5
Display ID : DRA-LX5 1.0.0.150(C185)
Security Patch : 2020-08-01
Fingerprint : HUAWEI/DRA-LX5/HWDRA-MG:8.1.0/HUAWEIDRA-LX5/1.0.0.150(C185):user/release-keys
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition... Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:04
BR
Dipendra Pathak

  Reply With Quote
Old 03-07-2021, 05:08   #1388 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Ausu X00BD Zero Wipe FRP successfully Done by Hydra Tool

Ausu X00BD Zero Wipe FRP successfully Done by Hydra Tool

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : AUTO Model : AUTO Storage : Auto
Loader: Auto
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM7)
SymbolicName :\??\USB#VID_05C6&PID_9008#6&1e3c5ed9&0&2#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :05/18/2016,2.0.6.725

Getting device info.....
Serial No.: 0x0C2C5A90
MSM ID : 0x008140E1, MSM8212-Qualcomm Snapdragon 200
PBL Ver : 00000000
PK HASH : 5F62A3F033BF45346C15E1CC7B31D4E1
ADFFDF641BDF618B09D44AD075029AD1

Firehose Loader[asus_3_6.mbn]
SaharaBoot... Ok
Sending ....Ok
Connecting to Firehose...
Ping... Ok
Configuration.......
Identifying Chip..........eMMC
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 49152
MaxPayloadSizeToTargetInBytesSupported : 49152
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8x10
Version : 1


Protocol : Universal
Running : Ok

Phone Information.....
Brand : asus
Vendor : asus
Model : ASUS_X00BD
ID : LMY47V
SDK : 22
Release : 5.1.1
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Description : msm8610-user 5.1.1 LMY47V LMY47V.WW_Phone.12.0.0.0129-20170207_user release-keys
Device : ASUS_X00BD_1
Board : MSM8610
Display ID : LMY47V.WW_Phone.12.0.0.0129-20170207_user
Security Patch : 2017-01-01
Platform : msm8610
FRPPST : /dev/block/bootdevice/by-name/persistent
Fingerprint : asus/WW_Phone/ASUS_X00BD_1:5.1.1/LMY47V/12.0.0.0129:user/release-keys

Reading GPT[1]
Drive [0] 48 Items

Removing FRPta...
Method :
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] Ok
- Removing FRP [Zero Wipe] OkOk
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] Ok
- Removing FRP [Zero Wipe] OkOkOk

Elapsed Time : 00:00:10
BR
Dipendra Pathak

  Reply With Quote
Old 03-08-2021, 15:48   #1389 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Oppo A37m Fixed from Dead by Hydra Tool

Oppo A37m Fixed from Dead by Hydra Tool

Screen Short:



Logs:

Quote:
Brand : OPPO Model : A37m (Neo 9) Connection : Flash Mode

=====================================
How To Boot : Power off phone
* BROM Mode : Press VOL + or Press VOL -+
* Preloader Mode : Just Insert cable

Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port_V1632 (COM13)
SymbolicName :\??\USB#VID_0E8D&PID_0003#5&18e4146f&0&2#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0326MT6750T[6755]
BROM HW_SW_VER : 8A00 CB00 0001 0000
FUSEID : 42040000
SECURE VERSION : 05
BL VERSION : FE
BR Secured : 00
NORMAL BOOT

Preparing Download Agent..
DA : 6755_SWSEC_2B23567CB4.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.00.00
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
C0
Protocol : New
Synchronization...
SYNCSYNC
Mode : brom
Preloader Initialization...
Parsing preloader_oppo6750_15127.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 96CED7258496456CCBC0433A1B4B47FA
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003AB400000 -14.676 GB
eMMC CID : 90014A484147346132A550DADAA043D1 - HAG4a2

DA Speed :
Change to HIGH SPEED...
Searching for MTK Device...Found
Port Identification A_HIGHSPEED_VCOM
FriendlyName :MediaTek DA USB VCOM (Android) (COM44)
SymbolicName :\??\USB#VID_0E8D&PID_2001#5&18e4146f&0&2#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0


Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info
Brand : OPPO
Vendor : OPPO
Model : OPPO A37m
ID : LMY47I
SDK : 22
Release : 5.1
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Description : full_oppo6750_15127-user 5.1 LMY47I 1488448383 dev-keys
Device : A37
Board : full_oppo6750_15127
Display ID : A37m_11_A.18_170302
Security Patch : 2016-09-05
Platform : mt6750
FRPPST : /dev/block/platform/mtk-msdc.0/by-name/frp
Fingerprint : OPPO/A37m/A37:5.1/LMY47I/1474447292:user/release-keys
StorageType : mtp,mass_storage
Userdata State : Not Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_oppo6750_15127.bin
Creating Scatter file... C:\hydratool\\Backup\Auto\0326_OPPO_A37m_A37_5.1_L MY47I_1474447292_030721183809\MT6750T_Android_scat ter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x03F88000]1024 KB ->frp.bin...Ok
-nvdata[0x04088000]32 MB ->nvdata.bin...Ok
-nvram[0x0CF00000]5 MB ->nvram.bin...Ok
Done!!!
C:\hydratool\\Backup\Auto\0326_OPPO_A37m_A37_5.1_L MY47I_1474447292_030721183809
MTK Phone Loader is NOW RUNNING.
=====================================

Elapsed Time : 00:00:31
BR
Dipendra Pathak

  Reply With Quote
Old 03-08-2021, 16:01   #1390 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Vivo Y71 (V1731B) Forced Erased to remove FRP successfully done by Hydra Tool

Vivo Y71 (V1731B) Forced Erased to remove FRP successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : VIVO Model : Y71 (V1731B) Storage : Auto
Loader: vivo_2_8.mbn
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM44)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&1e7d8db7&0&8#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/02/2017,2.1.2.7

Getting device info......
Serial No.: 0xE396BB12
MSM ID : 0x000560E1, MSM8917-Qualcomm Snapdragon 425
PBL Ver : 00000000
PK HASH : 60BA997FEF6DA9F05885FA11F1DD6D2A
90D052A257A09C2075D7246CC73C0D43

Firehose Loader[vivo_2_8.mbn]
SaharaBoot... Ok
Sending ..................Ok
Connecting to Firehose...
Ping... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8917
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 3102894151
Firmware Version : 3
Product Name : GE6BMB
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 30535680[14.561 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok
Reading GPT[3]
Drive [0] 56 Items
Drive [1] 0 Items
Drive [2] 0 Items


Phone Information.....
Brand : vivo
Vendor : vivo
Model : vivo 1724
ID : OPM1.171019.011
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : msm8937_64-user 8.1.0 OPM1.171019.011 eng.compil.20210113.122216 release-keys
Device : msm8937_64
Display ID : OPM1.171019.011 release-keys
Security Patch : 2021-01-01
Emmc_size : 16GB
Platform : =QCOM8917
Fingerprint : vivo/1724/1724:8.1.0/OPM1.171019.011/compil01131222:user/release-keys

Processing Forced Erase....
- Removing FRP [Auto] Ok
- Forced Erase Userdata
Action Result : Ok

Elapsed Time : 00:00:37
BR
Dipendra Pathak

  Reply With Quote
Old 03-08-2021, 16:18   #1391 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Cat S30 Zero FRP successfully removed by Hydra Tool

Cat S30 Zero FRP successfully removed by Hydra Tool

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : AUTO Model : AUTO Storage : Auto
Loader: Auto
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM6)
SymbolicName :\??\USB#VID_05C6&PID_9008#6&35c31b9d&0&3#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :03/21/2018,2.1.3.1

Getting device info.....
Serial No.: 0x0ACD4FDC
MSM ID : 0x009600E1, MSM8909-Qualcomm Snapdragon 210
PBL Ver : 00000000
PK HASH : DF989E3C2BE41617A8FF5019AD996BF7
06BBD5D3EEE0DC4B9A2F048F9224FA54

Firehose Loader[Qualcomm_Factory_Loader_MSM8909_Cat_S30.mbn]
SaharaBoot... Ok
Sending ..............Ok
Connecting to Firehose...
Ping... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8909
Version : 1


Protocol : Universal
Running : Ok

Phone Information.....
Brand : Cat
Vendor : BullittGroupLimited
Model : S30
ID : LMY47O
SDK : 22
Release : 5.1
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Description : msm8909-user 5.1 LMY47O 1464 release-keys
Device : CatS30
Board : msm8909
Display ID : LTE_D0201121.0_S30_0.025.00
Security Patch : 2017-10-01
Platform : msm8909
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : Cat/CatS30/CatS30:5.1/LMY47O/LTE_D0201121.0_S30_0.025.00:user/release-keys

Reading GPT[3]
Drive [0] 32 Items
Drive [1] 0 Items
Drive [2] 0 Items

Removing FRPta...
Method :
Zero Wipe
Processing...
- Removing FRP [Zero Wipe] OkOk

Elapsed Time : 00:00:07
BR
Dipendra Pathak

  Reply With Quote
Old 03-08-2021, 16:30   #1392 (permalink)
No Life Poster
 
Gsm-Ahmed's Avatar
 
Join Date: Jan 2020
Location: Algeria
Posts: 814
Member: 2944109
Status: Offline
Thanks Meter: 656
XIAOMI REDMI 8 Removing FRP Done

Testpoint





Code:
PreOperation Configuration 
 Brand : XIAOMI Model : Redmi 8 (olive) Storage : Auto
 Loader: Xiaomi_Redmi_8_Olive.mbn
 Port  : Auto
 Connection  : 

Searching for Qualcomm 9008 Device...Found
 FriendlyName :
 SymbolicName :\??\USB#VID_05C6&PID_9008#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :08/02/2017,2.1.2.7

Getting device info......
Serial No.: 0x1141376D
MSM ID    : 0x000BF0E1, SDM439-Qualcomm Snapdragon 439
PBL Ver   : 00000000
PK HASH   : 57158EAF1814D78FD2B3105ECE4DB18A
            817A08AC664A5782A925F3FF8403D39A
 
Firehose Loader[Xiaomi_Redmi_8_Olive.mbn]
SaharaBoot... Ok
Sending .......................Ok
Connecting to Firehose...
Ping... Ok 
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[81efKfdvcrugmyzSW9IDx8TkwRL]
Checking Internet connection....
 - Hydra Is Online
Connecting to Hydra Xiaomi Server...

Signature @256bytes Authentication.... Accepted......
Identifying Chip....
Ok
Chip Configuration :
 MemoryName : eMMC
 MaxPayloadSizeToTargetInBytes : 1048576
 MaxPayloadSizeToTargetInBytesSupported : 1048576
 MaxPayloadSizeFromTargetInBytes : 4096
 MaxXMLSizeInBytes : 4096
 TargetName : 8937
 Version : 1

*** STORAGE DEVICE INFO ***
Memory Type         : eMMC
Block Size in Bytes : 512
Page Size           : 512
Manufacturer ID     : 19
Serial Number       : 333567215
Firmware Version    : 4
Product Name        : S0J9N8
Physical Partitions : 3
Total Logical Blocks:
          Drive [0]  122142720[58,242 GB]
          Drive [1]  8192[4 MB]
          Drive [2]  8192[4 MB]

Protocol : Universal
Running : Ok
 
Phone Information......
  Brand          : Xiaomi
  Vendor         : Xiaomi
  Model          : Redmi 8
  ID             : PKQ1.190319.001
  SDK            : 28
  Release        : 9
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-GB
  Description    : olive-user 9 PKQ1.190319.001 V11.0.6.0.PCNEUXM release-keys
  Miui Ver       : V11
  Device         : olive
  Mod_device     : olive_eea_global
  Display ID     : ZQL2115-olive-build-20200322162723
  Security Patch : 2020-03-01
  Emmc_size      : 16GB
  Fingerprint    : Xiaomi/olive_eea/olive:9/PKQ1.190319.001/V11.0.6.0.PCNEUXM:user/release-keys

Reading GPT[3]
          Drive [0] 64 Items
          Drive [1] 0 Items
          Drive [2] 0 Items

Removing FRPta...
Method : 
Auto 
Processing... 
 - Removing FRP
Executing ...
 - Removing FRP [Zero Wipe] OkOkOk

Rebooting Phone.... Ok
If not rebooted, Please Power on Manually

Elapsed Time : 00:00:23
  Reply With Quote
Old 03-08-2021, 16:30   #1393 (permalink)
No Life Poster
 
Gsm-Ahmed's Avatar
 
Join Date: Jan 2020
Location: Algeria
Posts: 814
Member: 2944109
Status: Offline
Thanks Meter: 656
Ace Buzz 1 lite Ultra Power Option



Code:
Port : [Auto] Scanning...COM5
TPortConnection.Create...(COM5)..Opening...Ok
Reading IMEI...
Error : 84
Error : 84.
IMEI 1 : 35184XXXXXXXX25
IMEI 2 : 35184XXXXXXXX33

Reading System Info.
*** Flash Mode #Ultra Power  ***
Resetting FRP...Ok
Formatting userdata...Ok
Rebooting Phone..Ok

TPortConnection.Destroy.....Closing...
  Reply With Quote
Old 03-08-2021, 16:31   #1394 (permalink)
No Life Poster
 
Gsm-Ahmed's Avatar
 
Join Date: Jan 2020
Location: Algeria
Posts: 814
Member: 2944109
Status: Offline
Thanks Meter: 656
Condor Plume P6 Pro LTE (PGN528) FRP Remove



Code:
=====================================
Searching for MTK Device...Found
 Port Identification :DA_HIGHSPEED_VCOM
 FriendlyName :MediaTek DA USB VCOM (Android) (COM16)
 SymbolicName :\??\USB#VID_0E8D&PID_2001#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0



Reading System Info

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition... [FAILED]
Erasing FRP Partition... Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:01
  Reply With Quote
Old 03-08-2021, 16:32   #1395 (permalink)
No Life Poster
 
Gsm-Ahmed's Avatar
 
Join Date: Jan 2020
Location: Algeria
Posts: 814
Member: 2944109
Status: Offline
Thanks Meter: 656
Alcatel Idol 4 LTE (OT-6055K) Safe Format - EMMC

Alcatel Idol 4 LTE (OT-6055K) Safe Format - EMMC



Code:
PreOperation Configuration 
 Brand : ALCATEL [TCL] Model : OT-6055K (Idol 4 LTE) Storage : Auto
 Loader: 8952.mbn
 Port  : Auto
 Connection  : 

Searching for Qualcomm 9008 Device...Found
 FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM14)
 SymbolicName :\??\USB#VID_05C6&PID_9008#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :08/02/2017,2.1.2.7

Getting device info.....
Serial No.: 0x00A48B2C
MSM ID    : 0x009720E1, MSM8609-Qualcomm Snapdragon 210
PBL Ver   : 00000000
PK HASH   : 598FB494403B71C36D1B0DFD0F9E2450
            0D767980EF04E5F0A3A94E28DF1FD901
 
Firehose Loader[8952.mbn]
SaharaBoot... Ok
Sending ..........Ok
Connecting to Firehose...
Ping... Ok 
Configuration.......
Identifying Chip....
Ok
Chip Configuration :
 MemoryName : eMMC
 MaxPayloadSizeToTargetInBytes : 16384
 MaxPayloadSizeToTargetInBytesSupported : 16384
 MaxPayloadSizeFromTargetInBytes : 4096
 MaxXMLSizeInBytes : 4096
 TargetName : 8952
 Version : 1


Protocol : Feature Phone
Running : Ok
 
Phone Information.....
  Brand          : TCL
  Vendor         : TCL
  Model          : 6055K
  ID             : MMB29M
  SDK            : 23
  Release        : 6.0.1
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Description    : idol4-user 6.0.1 MMB29M v1AKZ-0 release-keys
  Device         : idol4
  Board          : msm8952
  Display ID     : MMB29M release-keys
  Security Patch : 2017-12-05
  Platform       : msm8952
  FRPPST         : /dev/block/bootdevice/by-name/config
  Fingerprint    : TCL/6055K/idol4:6.0.1/MMB29M/v1AKZ-0:user/release-keys

Reading GPT[3]
          Drive [0] 52 Items
          Drive [1] 0 Items
          Drive [2] 0 Items

Formatting Userdata...
Method : 
Safe Format - EMMC 
Processing... 
 - Formatting Userdata  [Safe method] OkOk

Rebooting Phone.... Ok
If not rebooted, Please Power on Manually

Elapsed Time : 00:00:07
  Reply With Quote
Reply

Bookmarks


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


 



All times are GMT +1. The time now is 17:47.



Powered by Searchlight © 2024 Axivo Inc.
vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2024 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2023 -
Page generated in 0.43350 seconds with 9 queries

SEO by vBSEO