GSM Shop GSM Shop
GSM-Forum  

Welcome to the GSM-Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features.
Only registered members may post questions, contact other members or search our database of over 8 million posts.

Registration is fast, simple and absolutely free so please - Click to REGISTER!

If you have any problems with the registration process or your account login, please contact contact us .

Go Back   GSM-Forum > Product Support Sections > Special Solutions / Services / WebShop > GSMFABRICA Products > HYDRA TOOL

Reply
 
LinkBack Thread Tools Display Modes
Old 03-09-2021, 05:12   #1396 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,591
Xiaomi Redmi 8 (olive) Mi Account Patched successfully done by Hydra Tool


Xiaomi Redmi 8 (olive) Mi Account Patched successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : XIAOMI Model : Redmi 8 (olive) Storage : Auto
Loader: Xiaomi_Redmi_8_Olive.mbn
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Quectel QDLoader 9008 (COM6)
SymbolicName :\??\USB#VID_05C6&PID_9008#6&1ba6c5f2&0&2#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/15/2020,20.0.0.4

Getting device info......
Serial No.: 0x34F75533
MSM ID : 0x000BF0E1, SDM439-Qualcomm Snapdragon 439
PBL Ver : 00000000
PK HASH : 57158EAF1814D78FD2B3105ECE4DB18A
817A08AC664A5782A925F3FF8403D39A

Firehose Loader[Xiaomi_Redmi_8_Olive.mbn]
SaharaBoot... Ok
Sending .......................Ok
Connecting to Firehose...
Ping... Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[xkwF5qliSa47HXmhTKwEHDQL4D6]
Checking Internet connection....
- Hydra Is Online
Connecting to Hydra Xiaomi Server...

Signature @256bytes Authentication.... Accepted......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 3263727003
Firmware Version : 842018864
Product Name : hC9aP3
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 122142720[58,242 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok
Reading GPT[3]
Drive [0] 64 Items
Drive [1] 0 Items
Drive [2] 0 Items


Phone Information......
Brand : Xiaomi
Vendor : Xiaomi
Model : Redmi 8
ID : PKQ1.190319.001
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : olive-user 9 PKQ1.190319.001 V11.0.11.0.PCNMIXM release-keys
Miui Ver : V11
Device : olive
Mod_device : olive_global
Display ID : ZQL2115-olive-build-20200519032343
Security Patch : 2020-05-01
Emmc_size : 16GB
Fingerprint : Xiaomi/olive/olive:9/PKQ1.190319.001/V11.0.11.0.PCNMIXM:user/release-keys

Processing Remove MiAccount[Patch Method]....
Backing up Partition for safety...Ok

Scanning Patching address...
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]Done!!
Total Items patched : 18
Successfully patched address..
Action Result : Ok

Elapsed Time : 00:00:20
BR
Dipendra Pathak

  Reply With Quote
Old 03-09-2021, 05:18   #1397 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,591
Xiaomi Redmi 6A (Cactus) Zero Wipe Partition is successfully done by Hydra Tool

Xiaomi Redmi 6A (Cactus) Zero Wipe Partition is successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port (COM69)
SymbolicName :\??\USB#VID_0E8D&PID_0003#6&1f512615&0&2#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0


Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 21EFDF8BD25DBD4AD1F65EB99EA2D9FE
ERAM Size : 0x000000000003A000 -232 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003AB400000 -14.676 GB
eMMC CID : 90014A484147346132A54B3559CA16B3 - HAG4a2

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi 6A
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-GB
Description : cactus-user 9 PPR1.180610.011 V11.0.8.0.PCBMIXM release-keys
Miui Ver : V11
Device : cactus
Mod_device : cactus_global
Display ID : SW_S98506AE1_V009_M13_XM_C3C_USR
Security Patch : 2020-05-01
Fingerprint : xiaomi/cactus/cactus:9/PPR1.180610.011/V11.0.8.0.PCBMIXM:user/release-keys
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition... Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:05
BR
Dipendra Pathak

  Reply With Quote
The Following User Says Thank You to Dipendra Pathak For This Useful Post:
Old 03-09-2021, 05:36   #1398 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,591
Oppo A12 Cph2083 Factory Reset and Reset user data successfully done by Hydra Tool

Oppo A12 Cph2083 Factory Reset and Reset user data successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
Brand : OPPO Model : A12 cph2083 Connection : Flash Mode

=====================================
How To Boot : Power off phone
* BROM Mode : Press VOL + or Press VOL -+
* Preloader Mode : Just Insert cable

Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port_V1632 (COM6)
SymbolicName :\??\USB#VID_0E8D&PID_0003#5&de3b74c&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0766MT6765[6765]
BROM HW_SW_VER : 8A00 CA00 0000 0000
getMTKPayloadExploit : 0766
#Executing Exploit..
#SUCCESS..
Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0766MT6765[6765]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
SECURE VERSION : 00
BL VERSION : FE
BR Secured : E0

Preparing Download Agent..
DA : 6765.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2018-09-18.13:22_452898
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
C0
Protocol : New
Synchronization...
SYNCSYNC
Mode : brom
Preloader Initialization...
Parsing preloader_oppo6765_19451.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 29CF6C4FB7DF46BA38A958102E9D0D03
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 90014A68433961503301A03AF5824777 - hC9aP3

DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info
Vendor : OPPO
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6765_19451-user 9 PPR1.180610.011 eng.root.20200710.220858 release-keys
Security Patch : 2020-06-05
StorageType : mtp
Userdata State : Not Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_oppo6765_19451.bin
Creating Scatter file... C:\Users\Desktop\HydraTool_Fullpackage_01-28-2021\\Backup\Auto\0766__030921102821\MT6765_Androi d_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x0DE88000]1024 KB ->frp.bin...Ok
-nvdata[0x0FF88000]64 MB ->nvdata.bin...Ok
-persist[0x17800000]48 MB ->persist.bin...Ok
-nvram[0x23600000]64 MB ->nvram.bin...Ok
Done!!!
C:\Users\Desktop\HydraTool_Fullpackage_01-28-2021\\Backup\Auto\0766__030921102821
MTK Phone Loader is NOW RUNNING.
=====================================

Elapsed Time : 00:00:53
BR
Dipendra Pathak

  Reply With Quote
The Following User Says Thank You to Dipendra Pathak For This Useful Post:
Old 03-09-2021, 16:43   #1399 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,591
Xiaomi Redmi Note 8 Pro (begonia) IMEI repair Successfully in Meta mode or Flash Mod

Xiaomi Redmi Note 8 Pro (begonia) IMEI repair Successfully in Meta mode or Flash Mode by Hydra Tool

Screen Short:



Logs:

Quote:
=====================================
***IMEI REPAIR FUNCTION****
Xiaomi Flashmode
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port_V1632 (COM6)
SymbolicName :\??\USB#VID_0E8D&PID_0003#5&31b872b&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0


Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 241430BE3701EAEDE23E9FB6F8BA42D5
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x0000000180000000 -6 GB
UFS LU0 Size: 0x0000000000400000 -4 MB
UFS LU1 Size: 0x0000000000400000 -4 MB
UFS LU2 Size: 0x0000001DCB000000 -119,172 GB
UFS CID : ,OMT128GASAO4U21
UFS UNIQID : 17f649b407840f112000000000000000

Reading GPT-UFS [0x00008000] 130 Items


Reading System Info
Brand : Redmi
Vendor : Xiaomi
Model : Redmi Note 8 Pro
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : begonia-user 9 PPR1.180610.011 V11.0.5.0.PGGEUXM release-keys
Miui Ver : V11
Device : begonia
Mod_device : begonia_eea_global
Display ID : PPR1.180610.011
Security Patch : 2020-04-01
Fingerprint : Redmi/begonia_eea/begonia:9/PPR1.180610.011/V11.0.5.0.PGGEUXM:user/release-keys
StorageType : mtp
Userdata State : Not Encrypted
IMEI INFO..
IMEI1 : *************85
IMEI2 : *************93
IMEI INFO..
IMEI1 : FFFFFFFFFFFFFFF
IMEI2 : ***************26

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:06
BR
Dipendra Pathak

  Reply With Quote
The Following 2 Users Say Thank You to Dipendra Pathak For This Useful Post:
Old 03-09-2021, 17:07   #1400 (permalink)
No Life Poster
 
Join Date: Apr 2011
Posts: 2,404
Member: 1562854
Status: Online
Sonork: 1245
Thanks Meter: 236
Redmi 9 repair imei done

Code:
Rebooting phone 
SWITCH TO : META MODE
Done!!!

Searching for MTK Device...Found
 Port Identification :METAMODE BROM
 FriendlyName :MediaTek USB VCOM (Android) (COM116)
 SymbolicName :\??\COM116
 Driver Ver   :01/22/2015,3.0.1504.0


META Phone Info . . .
MCUID: U  `    mt6768
ME_SO: 67
DATE : Tue Dec 15 10:10:05 CST 2020
MODEL: build-20201215100645
ME_SWVER: alps-mp-q0.mp1.tc8sp2-V1.9.1_huaqin.q0mp1.k69v1.64_P
MANUFACTURER : Xiaomi
BOARD : lancelot
MODEL : M2004J19C
NAME : lancelot_global
BUILD.DISPLAY.ID : build-20201215100645
USB.MODEL : unknown
BUILD.VERSION.RELEASE : 10
BUILD.VERSION.SECURITY_PATCH : 2020-11-01
DEVICE : lancelot
BRAND : Redmi
SERVICE CALL IPHONESUBINFO 1 : unknown
PERSIST.MTK.WCN.COMBO.CHIPID : unknown
SERIALNO : unknown
MEDIATEK.PLATFORM : unknown
MEDIATEK.CHIP_VER : unknown
HARDWARE : mt6768
MEDIATEK.VERSION.RELEASE : unknown
OEM_UNLOCK_SUPPORTED : unknown
EXPECT.RECOVERY_ID : unknown
FRP.PST : /dev/block/platform/bootdevice/by-name/frp
BUILD.FINGERPRINT : Redmi/lancelot_global/lancelot:10/QP1A.190711.020/V12.0.2.0.QJCMIXM:user/release-keys
GSM.VERSION.BASEBAND : unknown
SW.BUILDID : unknown
RIL.IMEI : unknown
SYS.USB.CONFIG : unknown

IMEI 1 : 
IMEI 2 : CABDFC5E0250800

COM116
Connecting to META Device...Ok
Getting Device Information...
Brand : Xiaomi
Product Board : Redmi 9
Model : lancelot
Model Code : M2004J19C
Android Version : 10
CPU : mt6768
Security Patch : 2019-12-05
ARM CPU : arm64-v8a
Read Information Succes...

Loading MDDB From Phone...Ok
Reading phone IMEI
IMEI1 :
IMEI2 : 
Ok
Processing imei repair......Ok
Reading NEW IMEI..
IMEI2 : 352145699635451
  Reply With Quote
The Following 2 Users Say Thank You to rai14 For This Useful Post:
Old 03-10-2021, 05:12   #1401 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,591
Formatting and rebuilding user data by choosing CPU Type (Cherry Mobile OMEGA)

Formatting and rebuilding user data by choosing CPU Type (Cherry Mobile OMEGA) successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode Preloader
FriendlyName :MediaTek PreLoader USB VCOM_V1632 (Android) (COM96)
SymbolicName :\??\USB#VID_0E8D&PID_2000#6&1e1ef7e6&0&1#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0


Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 98CCCBBBF5177FB11CCBFB5A33EB1DBB
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 90014A68423861503E020F4C414D44C7 - hB8aP>

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Brand : Cherry_Mobile
Vendor : Cherry_Mobile
Model : Omega X
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_g1860ps_v2_gt_fng_g31scr_p-user 9 PPR1.180610.011 0729121921 release-keys
Device : X960
Display ID : Cherry_X960_Omega_X_07292019_v1
Security Patch : 2019-07-05
FRPPST : /dev/block/platform/bootdevice/by-name/frp
Fingerprint : Cherry_Mobile/Omega_X/X960:9/PPR1.180610.011/0729121921:user/release-keys
StorageType : mtp
Userdata State : Not Encrypted

-------------------------------------
Operation : Rebuild Userdata
Processing...
Erasing FRP Partition...
Rebuilding Userdata... Ok

Elapsed Time : 00:00:08
BR
Dipendra Pathak

  Reply With Quote
Old 03-10-2021, 05:18   #1402 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,591
Xiaomi Redmi 9 Prime (lancelot) Mi Account Successfully Removed by Hydra Tool

Xiaomi Redmi 9 Prime (lancelot) Mi Account Successfully Removed by Hydra Tool

Screen Short:



Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port (COM19)
SymbolicName :\??\USB#VID_0E8D&PID_0003#5&15c64844&0&3#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2016,3.2


Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 593786DF31EDEF7AB9428F7CFA03EAF6
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58,242 GB
eMMC CID : 15010044503644414203F094DCCD4729 - DP6DAB

Reading GPT-EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Remove MiAccount[Erase Method]
Processing...
-persist.bin[0x104A2000]48 MB ->persist.bin...Ok
-frp.bin[0x05508000]1024 KB ->frp.bin...Ok Ok

Elapsed Time : 00:00:10
BR
Dipendra Pathak

  Reply With Quote
The Following User Says Thank You to Dipendra Pathak For This Useful Post:
Old 03-10-2021, 05:46   #1403 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,591
Vovo Y15 (PD1304CW) Zero wipe FRP successfully Done by Hydra Tool

Vovo Y15 (PD1304CW) Zero wipe FRP successfully Done by Hydra Tool

Screen Short:



Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode Preloader
FriendlyName :MediaTek PreLoader USB VCOM_V1632 (Android) (COM40)
SymbolicName :\??\USB#VID_0E8D&PID_2000#6&17b57f57&0&7#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0


Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : A50BCDC423F869DAC0D942ECCFA2C308
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000030000000 -768 MB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 150100474436424D4201381F90EF5665 - GD6BMB

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Brand : vivo
Vendor : vivo
Model : vivo 1901
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_k62v1_64_bsp-user 9 PPR1.180610.011 compiler12011624 release-keys
Device : PD1901BF_EX
Display ID : PPR1.180610.011 release-keys
Security Patch : 2019-11-05
Platform : =MTK6765
Fingerprint : vivo/1901/1901:9/PPR1.180610.011/compiler12011624:user/release-keys
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition... Ok

Elapsed Time : 00:00:03
BR
Dipendra Pathak

  Reply With Quote
The Following User Says Thank You to Dipendra Pathak For This Useful Post:
Old 03-10-2021, 08:57   #1404 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,591
Xiaomi Redmi 6A (Cactus) Mi Account successfully Removed by Erasing Method by Hydra

Xiaomi Redmi 6A (Cactus) Mi Account successfully Removed by Erasing Method by Hydra Tool

Screen Short:



Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port (COM18)
SymbolicName :\??\USB#VID_0E8D&PID_0003#5&3478949&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2016,3.2

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0766MT6765[6765]
BROM HW_SW_VER : 8A00 CA00 0000 0000
getMTKPayloadExploit : 0766
#Executing Exploit..
#SUCCESS..
Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0766MT6765[6765]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
SECURE VERSION : 05
BL VERSION : FE
BR Secured : E0

Preparing Download Agent..
DA : 6765.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2020-11-03.22:07_536568
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
C0
Protocol : New
Synchronization...
SYNCSYNC
Mode : brom
Preloader Initialization...
Parsing preloader_cactus.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 4199A3F7967E6118DC39C5A8E0FE7957
ERAM Size : 0x000000000003A000 -232 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003A3E00000 -14.561 GB
eMMC CID : 150100514536334D420382B996C6153F - QE63MB

DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi 6A
ID : O11019
SDK : 27
Release : 8.1.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : zh-CN
Description : cactus-user 8.1.0 O11019 V10.2.2.0.OCBCNXM release-keys
Miui Ver : V10
Device : cactus
Display ID : O11019
Security Patch : 2019-03-01
Fingerprint : xiaomi/cactus/cactus:8.1.0/O11019/V10.2.2.0.OCBCNXM:user/release-keys
StorageType : mtp
Userdata State : Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_cactus.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0766_xiaomi_cactus_cactus_8.1.0_ O11019_V10.2.2.0.OCBCNXM_030921100314\MT6765_Andro id_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x05588000]1024 KB ->frp.bin...Ok
-nvdata[0x07688000]64 MB ->nvdata.bin...Ok
-persist[0x0F000000]64 MB ->persist.bin...Ok
-nvram[0x1BE80000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0766_xiaomi_cactus_cactus_8.1.0_ O11019_V10.2.2.0.OCBCNXM_030921100314
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 4199A3F7967E6118DC39C5A8E0FE7957
ERAM Size : 0x000000000003A000 -232 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003A3E00000 -14.561 GB
eMMC CID : 150100514536334D420382B996C6153F - QE63MB

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi 6A
ID : O11019
SDK : 27
Release : 8.1.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : zh-CN
Description : cactus-user 8.1.0 O11019 V10.2.2.0.OCBCNXM release-keys
Miui Ver : V10
Device : cactus
Display ID : O11019
Security Patch : 2019-03-01
Fingerprint : xiaomi/cactus/cactus:8.1.0/O11019/V10.2.2.0.OCBCNXM:user/release-keys
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Remove MiAccount[Erase Method]
Processing...
-persist.bin[0x0F000000]64 MB ->persist.bin...Ok
-frp.bin[0x05588000]1024 KB ->frp.bin...Ok Ok

Elapsed Time : 00:00:50
BR
Dipendra Pathak

  Reply With Quote
Old 03-10-2021, 14:19   #1405 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,591
Huawei MYA-L22 (Y5 2015) Zero Wip FRP partition successfully removed by Hydra Tool

Huawei MYA-L22 (Y5 2015) Zero Wip FRP partition successfully removed by Hydra Tool

Screen Short:



Logs:

Quote:
Brand : HUAWEI Model : MYA-L22 (Y5 2017) Connection : Flash Mode

=====================================
Connection
-Please wait...
-Connect Phone...
-Found...
-PreLoader...[COM19]

TPortConnection.Create...(COM19)..Opening...Ok

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0321MT6737T[6735]
BROM HW_SW_VER : 8A00 CA00 0000 0000

Handshaking...

Identifying Hardware ID.....
BROM CPUID : 0321MT6737T[6735]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
FUSEID : 00000000
SECURE VERSION : 00
BL VERSION : 00
BR Secured : 01
NORMAL BOOT

Preparing Download Agent..
DA : MYA_L22_DA_SWSEC.bin
Agent: MTK_DOWNLOAD_AGENT
Ver : MTK_AllInOne_DA_v3.3001.00.00
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : Old - eMMC
00000000000000000000
PRMMCCID : 484A019061344741844ED432931863E0
Init Configuration
Running DA 4.2 on BBID : 0x93 Ok

Initializing Loader [2]
Sending Loader [2] Accepted
Reading Flashchip data....
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003AB400000 -14.676 GB
ERAM Size : 0x0000000080000000 -2 GB
IRAM Size : 0x0000000000020000 -128 KB
UNICAL RID : A6AA6C64A9A7219D3CE4D75B32E1266D
eMMC CID : 484A019061344741844ED432937463E0
Change to HIGH SPEED...
5A
Connection
-Please wait...
-Found...[COM45]


Reading Partition Table
SIZE[0x000009F8] 29 Items > Done

Reading System Info
Brand : HUAWEI
Vendor : HUAWEI
Model : MYA-L22
ID : HUAWEIMYA-L22
SDK : 23
Release : 6.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : zh-CN
Description : MYA-L22-user 6.0 HUAWEIMYA-L22 C185B127 release-keys
Device : HWMYA-L6737
Board : MYA-L22
Display ID : Maya-L22C185B127
Security Patch : 2018-08-05
Platform : mt6737t
FRPPST : /dev/block/platform/mtk-msdc.0/11230000.msdc0/by-name/frp
Fingerprint : HUAWEI/MYA-L22/HWMYA-L6737:6.0/HUAWEIMYA-L22/C185B127:user/release-keys
StorageType : mtp,mass_storage
Userdata State : Encrypted

Autobackup Partitions
-preloader[0x00000000] 512 KB -> preloader.bin...Ok
-> Renaming Preloader.... preloader_hq6737t_66_1ha_m0.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\HUAWEI_MYA-L22_0321-mt6737t-6.0_Maya-L22C185B127_090321123133\MT6737T_Android_scatter.t xt
-nvram[0x00380000] 12.5 MB -> nvram.bin... Failed
Done!!!
C:\Hydra Tool\\Backup\Auto\HUAWEI_MYA-L22_0321-mt6737t-6.0_Maya-L22C185B127_090321123133
MTK Phone Loader is NOW RUNNING.


Reading System Info
Brand : HUAWEI
Vendor : HUAWEI
Model : MYA-L22
ID : HUAWEIMYA-L22
SDK : 23
Release : 6.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : zh-CN
Description : MYA-L22-user 6.0 HUAWEIMYA-L22 C185B127 release-keys
Device : HWMYA-L6737
Board : MYA-L22
Display ID : Maya-L22C185B127
Security Patch : 2018-08-05
Platform : mt6737t
FRPPST : /dev/block/platform/mtk-msdc.0/11230000.msdc0/by-name/frp
Fingerprint : HUAWEI/MYA-L22/HWMYA-L6737:6.0/HUAWEIMYA-L22/C185B127:user/release-keys
StorageType : mtp,mass_storage
Userdata State : Encrypted

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition... [Ok] Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:23
BR
Dipendra Pathak

  Reply With Quote
Old 03-11-2021, 07:19   #1406 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,591
Infinix S5 X652A android 9 imei repair in Meta mode successfully done by Hydra Tool

Infinix S5 X652A android 9 imei repair in Meta mode successfully done by Hydra Tool

Screen Short:




BR
Dipendra Pathak

  Reply With Quote
Old 03-12-2021, 05:07   #1407 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,591
Cloudfone Thrill Boost 3 Format User Data successfully done by Hydra Tool

Cloudfone Thrill Boost 3 Format User Data successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
Brand : CLOUDFONE Model : Thrill Boost 3 Connection : Flash Mode

=====================================
Connection
-Please wait...
-Connect Phone...
-Found...
-PreLoader...[COM8]

TPortConnection.Create...(COM8)..Opening...Ok

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 6580 (0000)MT6580[6580]
BROM HW_SW_VER : 8A00 CA00 0000 0000

Handshaking...

Identifying Hardware ID.....
BROM CPUID : 6580 (0000)MT6580[6580]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
FUSEID : 00000000
SECURE VERSION : 00
BL VERSION : 00
BR Secured : 01
NORMAL BOOT

Preparing Download Agent..
DA : 6580_SP_8E23B5A808.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.00.00
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : Old - eMMC
0000000000000000000000000000
PRMMCCID : 90014A483847346132A5C65370D7A5BB
Init Configuration
Running DA 4.2 on BBID : 0x9C Ok

Initializing Loader [2]
Sending Loader [2] Accepted
Reading Flashchip data....
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000001D2000000 -7.281 GB
ERAM Size : 0x0000000040000000 -1024 MB
IRAM Size : 0x0000000000020000 -128 KB
UNICAL RID : F0EE3A8133D9DCCA501577B915B11A75
eMMC CID : 484A01906134473853C6A532BBA5D770
Change to HIGH SPEED...
5A
Connection
-Please wait...
-Found...[COM27]


Reading Partition Table
SIZE[0x00000790] 22 Items > Done

Reading System Info
Brand : CloudFone
Vendor : CloudFone
Model : Thrill Boost 3
ID : NRD90M
SDK : 24
Release : 7.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Description : Thrill_Boost_3-user 7.0 NRD90M 1503470989 release-keys
Device : k300
Display ID : alps-mp-n0.mp2-V1_tinno6580.we.n_P181
Security Patch : 2017-11-05
Platform : mt6580
FRPPST : /dev/block/platform/mtk-msdc.0/11120000.msdc0/by-name/frp
Fingerprint : TINNO/k300/k300:7.0/NRD90M/1512474166:user/release-keys
StorageType : mtp
Userdata State : Not Encrypted

Autobackup Partitions
-preloader[0x00000000] 512 KB -> preloader.bin...Ok
-> Renaming Preloader.... preloader_k300.bin
Creating Scatter file... C:\Users\Desktop\HydraTool_Fullpackage_01-03-2021\\Backup\Auto\CloudFone_Thrill Boost 3_6580-mt6580-7.0_alps-mp-n0.mp2-V1_tinno6580.we.n_P181_120321095929\MT6580_Android _scatter.txt
-nvram[0x00380000] 5 MB -> nvram.bin...Ok
-frp[0x051A0000] 1024 KB -> frp.bin...Ok
-nvdata[0x052A0000] 32 MB -> nvdata.bin...Ok
Done!!!
C:\Users\Desktop\HydraTool_Fullpackage_01-03-2021\\Backup\Auto\CloudFone_Thrill Boost 3_6580-mt6580-7.0_alps-mp-n0.mp2-V1_tinno6580.we.n_P181_120321095929
MTK Phone Loader is NOW RUNNING.


Reading System Info
Brand : CloudFone
Vendor : CloudFone
Model : Thrill Boost 3
ID : NRD90M
SDK : 24
Release : 7.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Description : Thrill_Boost_3-user 7.0 NRD90M 1503470989 release-keys
Device : k300
Display ID : alps-mp-n0.mp2-V1_tinno6580.we.n_P181
Security Patch : 2017-11-05
Platform : mt6580
FRPPST : /dev/block/platform/mtk-msdc.0/11120000.msdc0/by-name/frp
Fingerprint : TINNO/k300/k300:7.0/NRD90M/1512474166:user/release-keys
StorageType : mtp
Userdata State : Not Encrypted

-------------------------------------
Operation : Format/Erase
Processing...
Formatting Userdata... Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:45
BR
Dipendra Pathak

  Reply With Quote
Old 03-12-2021, 05:49   #1408 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,591
Huawei MYA-L22 (Y5 2015) Zero Wip FRP partition successfully removed by Hydra Tool

Huawei MYA-L22 (Y5 2015) Zero Wip FRP partition successfully removed by Hydra Tool

Screen Short:



Logs:

Quote:
Brand : HUAWEI Model : MYA-L22 (Y5 2017) Connection : Flash Mode

=====================================
Connection
-Please wait...
-Connect Phone...
-Found...
-PreLoader...[COM19]

TPortConnection.Create...(COM19)..Opening...Ok

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0321MT6737T[6735]
BROM HW_SW_VER : 8A00 CA00 0000 0000

Handshaking...

Identifying Hardware ID.....
BROM CPUID : 0321MT6737T[6735]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
FUSEID : 00000000
SECURE VERSION : 00
BL VERSION : 00
BR Secured : 01
NORMAL BOOT

Preparing Download Agent..
DA : MYA_L22_DA_SWSEC.bin
Agent: MTK_DOWNLOAD_AGENT
Ver : MTK_AllInOne_DA_v3.3001.00.00
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : Old - eMMC
00000000000000000000
PRMMCCID : 484A019061344741844ED432931863E0
Init Configuration
Running DA 4.2 on BBID : 0x93 Ok

Initializing Loader [2]
Sending Loader [2] Accepted
Reading Flashchip data....
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003AB400000 -14.676 GB
ERAM Size : 0x0000000080000000 -2 GB
IRAM Size : 0x0000000000020000 -128 KB
UNICAL RID : A6AA6C64A9A7219D3CE4D75B32E1266D
eMMC CID : 484A019061344741844ED432937463E0
Change to HIGH SPEED...
5A
Connection
-Please wait...
-Found...[COM45]


Reading Partition Table
SIZE[0x000009F8] 29 Items > Done

Reading System Info
Brand : HUAWEI
Vendor : HUAWEI
Model : MYA-L22
ID : HUAWEIMYA-L22
SDK : 23
Release : 6.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : zh-CN
Description : MYA-L22-user 6.0 HUAWEIMYA-L22 C185B127 release-keys
Device : HWMYA-L6737
Board : MYA-L22
Display ID : Maya-L22C185B127
Security Patch : 2018-08-05
Platform : mt6737t
FRPPST : /dev/block/platform/mtk-msdc.0/11230000.msdc0/by-name/frp
Fingerprint : HUAWEI/MYA-L22/HWMYA-L6737:6.0/HUAWEIMYA-L22/C185B127:user/release-keys
StorageType : mtp,mass_storage
Userdata State : Encrypted

Autobackup Partitions
-preloader[0x00000000] 512 KB -> preloader.bin...Ok
-> Renaming Preloader.... preloader_hq6737t_66_1ha_m0.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\HUAWEI_MYA-L22_0321-mt6737t-6.0_Maya-L22C185B127_090321123133\MT6737T_Android_scatter.t xt
-nvram[0x00380000] 12.5 MB -> nvram.bin... Failed
Done!!!
C:\Hydra Tool\\Backup\Auto\HUAWEI_MYA-L22_0321-mt6737t-6.0_Maya-L22C185B127_090321123133
MTK Phone Loader is NOW RUNNING.


Reading System Info
Brand : HUAWEI
Vendor : HUAWEI
Model : MYA-L22
ID : HUAWEIMYA-L22
SDK : 23
Release : 6.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : zh-CN
Description : MYA-L22-user 6.0 HUAWEIMYA-L22 C185B127 release-keys
Device : HWMYA-L6737
Board : MYA-L22
Display ID : Maya-L22C185B127
Security Patch : 2018-08-05
Platform : mt6737t
FRPPST : /dev/block/platform/mtk-msdc.0/11230000.msdc0/by-name/frp
Fingerprint : HUAWEI/MYA-L22/HWMYA-L6737:6.0/HUAWEIMYA-L22/C185B127:user/release-keys
StorageType : mtp,mass_storage
Userdata State : Encrypted

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition... [Ok] Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:23
BR
Dipendra Pathak

  Reply With Quote
Old 03-12-2021, 06:22   #1409 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,591
Xiaomi Redmi 8A (olivelite) security done successfully by Hydra Tool

Xiaomi Redmi 8A (olivelite) security done successfully by Hydra Tool

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : XIAOMI Model : Redmi 8A (olivelite) Storage : Auto
Loader: Xiaomi_Redmi_8_Olive.mbn
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM40)
SymbolicName :\??\USB#VID_05C6&PID_9008#6&29f11ef&0&5#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :03/25/2016,2.1.2.2

Getting device info......
Serial No.: 0x5817CE07
MSM ID : 0x000BF0E1, SDM439-Qualcomm Snapdragon 439
PBL Ver : 00000000
PK HASH : 57158EAF1814D78FD2B3105ECE4DB18A
817A08AC664A5782A925F3FF8403D39A

Firehose Loader[Xiaomi_Redmi_8_Olive.mbn]
SaharaBoot... Ok
Sending .......................Ok
Connecting to Firehose...
Ping... Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[0DB3KZmBtF77eQ45jRTGUzWmpBv]
Checking Internet connection....
- Hydra Is Online
Connecting to Hydra Xiaomi Server...

Signature @256bytes Authentication.... Accepted......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 2899676662
Firmware Version : 909127728
Product Name : hB8aP>
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 61071360[29.121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok
Reading GPT[3]
Drive [0] 64 Items
Drive [1] 0 Items
Drive [2] 0 Items

Processing Erase Security....
Wipe Security ...

Backup Security partitions...
Reading Security Items....
> modemst1
> modemst2
> fsg
C:\Hydra Tool\Backup\Security_Backup\___Security_0311212216 22.sec
Backup Security Success....
Security Wipe Started..
> modemst1 Ok
> modemst2 Ok
> fsg Ok
Security Wipe Success...
Action Result : Ok

Elapsed Time : 00:00:20
BR
Dipendra Pathak

  Reply With Quote
Old 03-12-2021, 12:04   #1410 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,591
Xiaomi Redmi Go (Tiare) Security wipe successfully done by Hydra Tool

Xiaomi Redmi Go (Tiare) Security wipe successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : XIAOMI Model : Redmi Go (tiare) Storage : Auto
Loader: Redmi_8917.mbn
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM10)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&6044b84&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/02/2017,2.1.2.7

Getting device info......
Serial No.: 0xE763F9D8
MSM ID : 0x000560E1, MSM8917-Qualcomm Snapdragon 425
PBL Ver : 00000000
PK HASH : 57158EAF1814D78FD2B3105ECE4DB18A
817A08AC664A5782A925F3FF8403D39A

Firehose Loader[Redmi_8917.mbn]
SaharaBoot... Ok
Sending ...................Ok
Connecting to Firehose...
Ping... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8917
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 1279968859
Firmware Version : 165
Product Name : H8G4a2
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 15269888[7,281 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok
Reading GPT[3]
Drive [0] 48 Items
Drive [1] 0 Items
Drive [2] 0 Items

Processing Erase Security....
Wipe Security ...

Backup Security partitions...
Reading Security Items....
> modemst1
> modemst2
> fsg
C:\Hydra Tool\Backup\Security_Backup\___Security_0310211229 36.sec
Backup Security Success....
Security Wipe Started..
> modemst1 Ok
> modemst2 Ok
> fsg Ok
Security Wipe Success...
Action Result : Ok

Elapsed Time : 00:00:12
BR
Dipendra Pathak

  Reply With Quote
Reply

Bookmarks

Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


 



All times are GMT +1. The time now is 08:23.



Powered by Searchlight © 2022 Axivo Inc.
vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2022 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2022 -
Page generated in 0.41490 seconds with 8 queries

SEO by vBSEO