★★★ Post All Successfully Repaired Phones By Hydra Tool ★★★

Hydra Tool

Product Manager
Aug 31, 2019
316
372
Ukraine
Xiaomi Mi Mix 2S Polaris Unbrick by Hydra Dongle, Without Credit

Mi Mix 2s (polaris) Fix system has been destroyed by hydra tool



Searching EDL Port..[COM10]
TPortConnection.Create...(COM10)..Opening...Ok
Getting device info.......
Serial No.: 0x6002CB31
MSM ID : 0x0008B0E1, SDM845-Qualcomm Snapdragon 845
PBL Ver : 00000001
PK HASH : C924A35F39CE1CDD1B8D5A9F3B8E3C51
317930431D7A9DD5A55028CF6965FE65

Firehose Loader[Xiaomi_ufs_firehose_sdm845_ddr.elf]
Initializing SaharaBoot... Ok
Sending ....................................Ok

Connecting to Firehose...
Ping.....
NOTE : FILTERED : <.
NOTE : FILTERED : ?.
NOTE : FILTERED : x.
NOTE : FILTERED : m.
NOTE : FILTERED : l. Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[7Oa1LIfGgimtjyONk
Checking Internet connection....
- Hydra Is Online
Connecting to Hydra Xiaomi Server...

Signature @256bytes Authentication.... Accepted........
Identifying Chip........UFS Ok
Chip Configuration :
MemoryName : UFS
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Aug 17 2018 - 13:21:01

* STORAGE DEVICE INFO *
Memory Type : UFS
Block Size in Bytes : 4096
Page Size : 4096
Manufacturer ID : 429
Serial Number : 2037279096
Firmware Version : 003
Product Name : H28U74301AMR
Physical Partitions : 6
Total Logical Blocks:
Drive [0] 14419968[55,008 GB]
Drive [1] 2048[8 MB]
Drive [2] 2048[8 MB]
Drive [3] 8192[32 MB]
Drive [4] 1179648[4,5 GB]
Drive [5] 8192[32 MB]
Running : Ok

Reading GPT[6], Partitions(224 Items) Ok
Phone Information.....
Model : Mi MIX 2S
Brand : Xiaomi
Android Ver : 9
Miui Ver : V10
Manufacturer : Xiaomi
Device : polaris
Mod_device : polaris_global
Display ID : PKQ1.180729.001
Security Patch : 2019-09-01
Kernel ID : 2019-09-01
Fingerprint : Xiaomi/polaris/polaris:9/PKQ1.180729.001/V10.3.6.0.PDGMIXM:user/release-keys
ro_product_hardware :
sys_hardware_version :


----------------------------
Flashing Selected Partitions
switch(0)[dummy.img] Ok
misc(0)[misc.img] Ok
logfs(0)[logfs_ufs_8mb.bin] Ok
persist(0)[persist.img] Skipped
cust(0)[cust.img] Ok
recovery(0)[recovery.img] Ok
cache(0)[cache.img] Ok
userdata(0)[userdata.img] Ok
PrimaryGPT(0)[gpt_main0.bin] Ok
xbl_config_a(1)[xbl_config.img] Ok
xbl_a(1)[xbl.img] Ok
PrimaryGPT(1)[gpt_main1.bin] Ok
xbl_config_b(2)[xbl_config.img] Ok
xbl_b(2)[xbl.img] Ok
PrimaryGPT(2)[gpt_main2.bin] Ok
PrimaryGPT(3)[gpt_main3.bin] Ok
limits(4)[dummy.img] Ok
qupfw_a(4)[qupfw.img] Ok
qupfw_b(4)[qupfw.img] Ok
storsec_a(4)[storsec.img] Ok
storsec_b(4)[storsec.img] Ok
devcfg_a(4)[devcfg.img] Ok
devcfg_b(4)[devcfg.img] Ok
aop_a(4)[aop.img] Ok
aop_b(4)[aop.img] Ok
cmnlib_a(4)[cmnlib.img] Ok
cmnlib_b(4)[cmnlib.img] Ok
cmnlib64_a(4)[cmnlib64.img] Ok
cmnlib64_b(4)[cmnlib64.img] Ok
keymaster_a(4)[keymaster.img] Ok
keymaster_b(4)[keymaster.img] Ok
bluetooth(4)[bluetooth.img] Ok
hyp_a(4)[hyp.img] Ok
hyp_b(4)[hyp.img] Ok
abl_a(4)[abl.img] Ok
abl_b(4)[abl.img] Ok
tz_a(4)[tz.img] Ok
tz_b(4)[tz.img] Ok
logo(4)[logo.img] Ok
dsp(4)[dsp.img] Ok
boot(4)[boot.img] Ok
modem(4)[modem.img] Ok
vendor(4)[vendor.img] Ok
system(4)[system.img] Ok
PrimaryGPT(4)[gpt_main4.bin] Ok
ImageFv(5)[imagefv.elf] Ok
PrimaryGPT(5)[gpt_main5.bin] Ok

Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-6.] OK
0 [NUM_DISK_SECTORS-6.] OK
0 [NUM_DISK_SECTORS-6.] OK
0 [NUM_DISK_SECTORS-6.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-5.] OK
0 [CRC32(2,4096)] OK
0 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
0 [0] OK
0 [CRC32(1,92)] OK
0 [0] OK
0 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
1 [NUM_DISK_SECTORS-6.] OK
1 [NUM_DISK_SECTORS-6.] OK
1 [NUM_DISK_SECTORS-6.] OK
1 [NUM_DISK_SECTORS-6.] OK
1 [NUM_DISK_SECTORS-1.] OK
1 [NUM_DISK_SECTORS-1.] OK
1 [NUM_DISK_SECTORS-5.] OK
1 [CRC32(2,4096)] OK
1 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
1 [0] OK
1 [CRC32(1,92)] OK
1 [0] OK
1 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
2 [NUM_DISK_SECTORS-6.] OK
2 [NUM_DISK_SECTORS-6.] OK
2 [NUM_DISK_SECTORS-6.] OK
2 [NUM_DISK_SECTORS-6.] OK
2 [NUM_DISK_SECTORS-1.] OK
2 [NUM_DISK_SECTORS-1.] OK
2 [NUM_DISK_SECTORS-5.] OK
2 [CRC32(2,4096)] OK
2 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
2 [0] OK
2 [CRC32(1,92)] OK
2 [0] OK
2 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
3 [NUM_DISK_SECTORS-6.] OK
3 [NUM_DISK_SECTORS-6.] OK
3 [NUM_DISK_SECTORS-6.] OK
3 [NUM_DISK_SECTORS-6.] OK
3 [NUM_DISK_SECTORS-1.] OK
3 [NUM_DISK_SECTORS-1.] OK
3 [NUM_DISK_SECTORS-5.] OK
3 [CRC32(2,4096)] OK
3 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
3 [0] OK
3 [CRC32(1,92)] OK
3 [0] OK
3 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
4 [NUM_DISK_SECTORS-6.] OK
4 [NUM_DISK_SECTORS-6.] OK
4 [NUM_DISK_SECTORS-6.] OK
4 [NUM_DISK_SECTORS-6.] OK
4 [NUM_DISK_SECTORS-1.] OK
4 [NUM_DISK_SECTORS-1.] OK
4 [NUM_DISK_SECTORS-5.] OK
4 [CRC32(2,8192)] OK
4 [CRC32(NUM_DISK_SECTORS-5.,8192)] OK
4 [0] OK
4 [CRC32(1,92)] OK
4 [0] OK
4 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
5 [NUM_DISK_SECTORS-6.] OK
5 [NUM_DISK_SECTORS-6.] OK
5 [NUM_DISK_SECTORS-6.] OK
5 [NUM_DISK_SECTORS-6.] OK
5 [NUM_DISK_SECTORS-1.] OK
5 [NUM_DISK_SECTORS-1.] OK
5 [NUM_DISK_SECTORS-5.] OK
5 [CRC32(2,4096)] OK
5 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
5 [0] OK
5 [CRC32(1,92)] OK
5 [0] OK
5 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 1
Set bootable storage drive 1 Ok
Rebooting Phone.... Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:03:46
 
  • Like
Reactions: gsm_tukmol

Hydra Tool

Product Manager
Aug 31, 2019
316
372
Ukraine
Xiaomi Redmi 6 Pro Mi Account Remove ARB4 by Hydra Dongle

Without Credit
Without wait any server
Without Deep knowledge, Just 1 Click



PreOperation Configuration
Brand : XIAOMI Model : Redmi 6 Pro (**) Storage : Auto
Loader: Xiaomi_Remi 6 pro_**_8953_ddr.mbn
Port : Auto
Connection : Flash Mode

Searching EDL Port..[COM20]
TPortConnection.Create...(COM20)..Opening...Ok
Getting device info.......
Serial No.: 0xA7C26780
MSM ID : 0x000460E1, MSM8953-Qualcomm Snapdragon 625
PBL Ver : 00000002
PK HASH : 57158EAF1814D78FD2B3105ECE4DB18A
817A08AC664A5782A925F3FF8403D39A

Firehose Loader[Xiaomi_Remi 6 pro_**_8953_ddr.mbn]
Initializing SaharaBoot... Ok
Sending ....................Ok

Connecting to Firehose...
Ping... Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[kkPT4iBmhFFXX1p8E36ze5G8PXc]
Checking Internet connection....
- Hydra Is Online
Connecting to Hydra Xiaomi Server...

Signature @256bytes Authentication.... Accepted......
Identifying Chip....Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8953
Version : 1

* STORAGE DEVICE INFO *
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 19
Serial Number : 158675319
Firmware Version : 4
Product Name : S0J9F8
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 122142720[58.242 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Running : Ok

Reading GPT[3], Partitions(60 Items) Ok
Phone Information.....
Model : Redmi 6 Pro
Brand : xiaomi
Android Ver : 8.1.0
Miui Ver : V9
Manufacturer : Xiaomi
Device : **
Display ID : ZQL1715-**-build-20180727150613
Security Patch : 2018-07-01
Kernel ID : 2018-07-01
Fingerprint : xiaomi/**/**:8.1.0/OPM1.171019.019/V9.6.17.0.ODICNFD:user/release-keys
ro_product_hardware :
sys_hardware_version :

Reading GPT[3], Partitions(60 Items) Ok
Operation : MiAccount
Remove MiAccount[Erase Method]
Processing...
Backing up Partition for safety...Ok

Scanning Patching address...
Patching address detected [PATCHED]
Patching address detected [PATCHED]Done!!
Total Items patched : 2
Successfully patched address..Ok

Elapsed Time : 00:00:21


TPortConnection.Destroy.....Closing...Ok..
 

Hydra Tool

Product Manager
Aug 31, 2019
316
372
Ukraine
Asus A001D ZB634KL FRP Reset by Hydra Dongle



PreOperation Configuration
Brand : ASUS Model : A001D (ZenFone Max Plus M2 ZB634KL) Storage : Auto
Loader: prog_emmc_firehose_8953_ASUS_M2.mbn
Port : Auto
Connection : Flash Mode

Searching EDL Port..[COM9]
TPortConnection.Create...(COM9)..Opening...Ok
Getting device info..
Device MODE : SAHARA

Connecting to Firehose...
Ping.. Ok
Configuration......
Identifying Chip....Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8953
Version : 1

* STORAGE DEVICE INFO *
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 77947963
Firmware Version : 162
Product Name : HCG8a4
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 122142720[58,242 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Running : Ok

Reading GPT[3], Partitions(56 Items) Ok
Phone Information.....
Model : ASUS_A001D
Brand : asus
Android Ver : 9
Manufacturer : asus
Device : ASUS_A001D_2
Display ID :
Security Patch : 2020-05-01
Kernel ID : 2020-05-01
Fingerprint : asus/WW_Phone/ASUS_A001D_2:9/PPR1/16.14.2005.298-20200417:user/release-keys
ro_product_hardware :
sys_hardware_version :

Reading GPT[3], Partitions(56 Items) Ok
* FRP Reset *
Resetting FRP...
Auto
Processing...
Executing ...
[Zero Wipe] Ok

Elapsed Time : 00:00:06


TPortConnection.Destroy.....Closing...Ok..
 
  • Like
Reactions: gsm_tukmol

Hydra Tool

Product Manager
Aug 31, 2019
316
372
Ukraine
Xiaomi Mi 9 Lite pyxis FRP Remove by Hydra Tool

Mi 9 Lite (pyxis) Google Account remove, Without Credit, With Hydra Stand-Alone server



Connecting to Firehose...
Ping.....
NOTE : FILTERED : <.
NOTE : FILTERED : ?.
NOTE : FILTERED : x.
NOTE : FILTERED : m.
NOTE : FILTERED : l. Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[jqZr22LjAomEMpGmPqrhKyrt084]
Checking Internet connection....
- Hydra Is Online
Connecting to Hydra Xiaomi Server...

Signature @256bytes Authentication.... Accepted........
Identifying Chip........UFS Ok
Chip Configuration :
MemoryName : UFS
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Jun 2 2018 - 19:34:59

* STORAGE DEVICE INFO *
Memory Type : UFS
Block Size in Bytes : 4096
Page Size : 4096
Manufacturer ID : 429
Serial Number : 2037279096
Firmware Version : 001
Product Name : H9HQ53AECMMDAR
Physical Partitions : 6
Total Logical Blocks:
Drive [0] 15304704[58,383 GB]
Drive [1] 2048[8 MB]
Drive [2] 2048[8 MB]
Drive [3] 8192[32 MB]
Drive [4] 262144[1024 MB]
Drive [5] 40960[160 MB]
Running : Ok

Reading GPT[6], Partitions(224 Items) Ok
Phone Information......
Model : Mi 9 Lite
Brand : Xiaomi
Android Ver : 9
Miui Ver : V10
Manufacturer : Xiaomi
Device : pyxis
Mod_device : pyxis_global
Display ID : PKQ1.181121.001
Security Patch : 2019-08-01
Kernel ID : 2019-08-01
Fingerprint : Xiaomi/pyxis/pyxis:9/PKQ1.181121.001/V10.3.1.0.PFCMIXM:user/release-keys
ro_product_hardware :
sys_hardware_version :

Reading GPT[6], Partitions(224 Items) Ok
* FRP Reset *
Resetting FRP...
Auto
Processing...
Executing ...
[Zero Wipe] Ok

Elapsed Time : 00:00:25


TPortConnection.Destroy.....Closing...Ok..
 

Hydra Tool

Product Manager
Aug 31, 2019
316
372
Ukraine
Huawei JAT-LX3 Honor Play 8A FRP Remove by Hydra Dongle

  1. Run MTK Module
  2. Select Brrand and Model
  3. Tick Factory Reset Protection (FRP)
  4. Atached the Testpoint and Click Execute



Brand : HUAWEI Model : JAT-LX3 (Honor Play 8A) Connection : Flash Mode

=====================================
How To Boot : Remove Batt if possible
* TP Ground Must be near cpu..
* Remove ground upon popup of the message dialog.

Connection[WAITING]Found[COM4] Status[Opened]
Identifying Hardware ID
BROM CPUID : 0766 (0000)MT6765[6765]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000001
SECURE VERSION : 05
BL VERSION : FE
BR Secured : E5[SBC+SDA+SEL]
Security Authorization....
Sending[huawei_auth_sv5_.auth] Accepted
Preparing Download Agent..
Download Agent : Huawei__6765_8A00CA0000000000_00001000_00030000.bin
MTK_DOWNLOAD_AGENT -HYDRA
MTK_AllInOne_DA_v3.3001.2018/10/18.17:38_452898
Initializing Loader [1]
Sending Loader [1] Accepted
PROTOCOL[NEW] - eMMC
PHONE SYNC[Accepted]
DA Mode : brom
Preloader Initialization....
Parsing preloader_k62v1_64_mexico.bin
Sending Flashchip Initialization... Accepted
Initializing Loader [2]
Sending Loader [2] Accepted
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 150100475036424D42012DA297329631 - GP6BMB
UNICAL RID : 3F8EAF77988F6CC154DC2023D8161A6F
DA Speed : high-speed
Reading GPT-EMMC [0x00008000] 130 Items
Done!!!

Reading System Info
ERROR reading system image [corrupted/erased]

Autobackup Partitions
preloader[0x00000000-0x00080000]512 KB ->preloader.bin... Done
-> Renaming Preloader.... preloader_k62v1_64_mexico.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\__0766--()_040820162111\MT6765_Android_scatter.txt
pgpt[0x00000000-0x00008000]32 KB ->pgpt.bin... Done
frp[0x00108000-0x00208000]1024 KB ->frp.bin... Done
nvdata[0x00A08000-0x01A08000]16 MB ->nvdata.bin... Done
nvram[0x04400000-0x04900000]5 MB ->nvram.bin... Done
Done!!!
C:\Hydra Tool\\Backup\Auto\__0766--()_040820162111
MTK Phone Loader is NOW RUNNING.
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 150100475036424D42012DA297329631 - GP6BMB
UNICAL RID : 3F8EAF77988F6CC154DC2023D8161A6F
Reading GPT-EMMC [0x00008000] 130 Items
Done!!!


Reading System Info
ERROR reading system image [corrupted/erased]

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition...
Erasing FRP Partition... Ok

Elapsed Time : 00:00:27
 

Hydra Tool

Product Manager
Aug 31, 2019
316
372
Ukraine
Xiaomi Mi 8 SE (sirius) Downgrade Android 9 to 8 by Hydra Hydra Dongle




Searching EDL Port..[COM3]
TPortConnection.Create...(COM3)..Opening...Ok
Getting device info.......
Serial No.: 0x2153B106
MSM ID : 0x000DB0E1,
PBL Ver : 00000001
PK HASH : C924A35F39CE1CDD1B8D5A9F3B8E3C51
317930431D7A9DD5A55028CF6965FE65

Firehose Loader[prog_emmc_firehose_sdm670_ddr.elf]
Initializing SaharaBoot... Ok
Sending .....................................Ok

Connecting to Firehose...
Ping.....
NOTE : FILTERED : <.
NOTE : FILTERED : ?.
NOTE : FILTERED : x.
NOTE : FILTERED : m.
NOTE : FILTERED : l. Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[52CAL3jwQwWEVgJlDSEAh05lIKT]
Checking Internet connection....
- Hydra Is Online
Connecting to Hydra Xiaomi Server...

Signature @256bytes Authentication.... Accepted........
Identifying Chip....Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Aug 24 2018 - 20:05:37

* STORAGE DEVICE INFO *
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 2725751869
Firmware Version : 2
Product Name : 3H6CAB
Physical Partitions : 4
Total Logical Blocks:
Drive [0] 122142720[58.242 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Drive [3] 32768[16 MB]
Running : Ok

Reading GPT[4], Partitions(84 Items) Ok
Phone Information.....
Model : MI 8 SE
Brand : Xiaomi
Android Ver : 9
Miui Ver : V10
Manufacturer : Xiaomi
Device : sirius
Display ID : PKQ1.181030.001
Security Patch : 2019-02-01
Kernel ID : 2019-02-01
Fingerprint : Xiaomi/sirius/sirius:9/PKQ1.181030.001/V10.2.3.0.PEBCNXM:user/release-keys
ro_product_hardware :
sys_hardware_version :


----------------------------
Flashing Selected Partitions
switch(0)[dummy.img] Ok
xbl_config(0)[xbl_config.elf] Ok
hyp(0)[hyp.mbn] Ok
hypbak(0)[hyp.mbn] Ok
cmnlib(0)[cmnlib.mbn] Ok
cmnlibbak(0)[cmnlib.mbn] Ok
cmnlib64(0)[cmnlib64.mbn] Ok
cmnlib64bak(0)[cmnlib64.mbn] Ok
keymaster(0)[keymaster64.mbn] Ok
keymasterbak(0)[keymaster64.mbn] Ok
devcfg(0)[devcfg.mbn] Ok
devcfgbak(0)[devcfg.mbn] Ok
abl(0)[abl.elf] Ok
ablbak(0)[abl.elf] Ok
misc(0)[dummy.img] Ok
xbl(0)[xbl.elf] Ok
xblbak(0)[xbl.elf] Ok
tz(0)[tz.mbn] Ok
tzbak(0)[tz.mbn] Ok
persist(0)[persist.img] Ok
persistbak(0)[persist.img] Ok
PrimaryGPT(0)[gpt_main0.bin] Ok

Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-33.] OK
0 [CRC32(2,10752)] OK
0 [CRC32(NUM_DISK_SECTORS-33.,10752)] OK
0 [0] OK
0 [CRC32(1,92)] OK
0 [0] OK
0 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 0
Set bootable storage drive 0 Ok
Rebooting Phone.... Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:30
 

Hydra Tool

Product Manager
Aug 31, 2019
316
372
Ukraine
Xiaomi Mi 8 dipper Mi Account Remove by Hydra Dongle

  • Without Credit
  • Without wait Server
  • Totally 100% Free



PreOperation Configuration
Brand : XIAOMI Model : Mi 8 (dipper) Storage : Auto
Loader: Xiaomi_ufs_firehose_sdm845_ddr.elf
Port : Auto
Connection : Flash Mode

Searching EDL Port..[COM11]
TPortConnection.Create...(COM11)..Opening...Ok
Getting device info.......
Serial No.: 0x947B4BBA
MSM ID : 0x0008B0E1, SDM845-Qualcomm Snapdragon 845
PBL Ver : 00000001
PK HASH : C924A35F39CE1CDD1B8D5A9F3B8E3C51
317930431D7A9DD5A55028CF6965FE65

Firehose Loader[Xiaomi_ufs_firehose_sdm845_ddr.elf]
Initializing SaharaBoot... Ok
Sending ....................................Ok

Connecting to Firehose...
Ping.....
NOTE : FILTERED : <.
NOTE : FILTERED : ?.
NOTE : FILTERED : x.
NOTE : FILTERED : m.
NOTE : FILTERED : l. Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[GxwHcdQpIZ1GHewxLy93ltFjRT6]
Checking Internet connection....
- Hydra Is Online
Connecting to Hydra Xiaomi Server...

Signature @256bytes Authentication.... Accepted........
Identifying Chip........UFS Ok
Chip Configuration :
MemoryName : UFS
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Aug 17 2018 - 13:21:01

* STORAGE DEVICE INFO *
Memory Type : UFS
Block Size in Bytes : 4096
Page Size : 4096
Manufacturer ID : 462
Serial Number : 1297306958
Firmware Version : 500
Product Name : KLUDG4U1EA-B0C1
Physical Partitions : 6
Total Logical Blocks:
Drive [0] 30038016[114.586 GB]
Drive [1] 2048[8 MB]
Drive [2] 2048[8 MB]
Drive [3] 8192[32 MB]
Drive [4] 1179648[4.5 GB]
Drive [5] 8192[32 MB]
Running : Ok

Reading GPT[6], Partitions(224 Items) Ok
Phone Information.....
Model : MI 8
Brand : Xiaomi
Android Ver : 8.1.0
Miui Ver : V9
Manufacturer : Xiaomi
Device : dipper
Mod_device : dipper_global
Display ID : OPM1.171019.011
Security Patch : 2018-06-01
Kernel ID : 2018-06-01
Fingerprint : Xiaomi/dipper/dipper:8.1.0/OPM1.171019.011/V9.5.13.0.OEAMIFA:user/release-keys
ro_product_hardware :
sys_hardware_version :

Reading GPT[6], Partitions(224 Items) Ok
Operation : MiAccount
Remove MiAccount[Erase Method]
Processing...
Backing up Partition for safety...Ok

Scanning Patching address...
Patching address detected [PATCHED]
Patching address detected [PATCHED]
Patching address detected [PATCHED]Done!!
Total Items patched : 3
Successfully patched address..Ok

Elapsed Time : 00:00:28


TPortConnection.Destroy.....Closing...Ok..
 

Hydra Tool

Product Manager
Aug 31, 2019
316
372
Ukraine
Redmi Note 8 IMEI Repair Bootloader Locked, Without Root, Without Credit

Xiaomi Redmi Note 8 (ginkgo) Repair IMEI Without Root, Without Unlock BL, Without Credit, Without Auth by Hydra Tool steps.


  1. Flash ENG Firmware by EDL Mode with Hydra Dongle
  2. When you flash untick skip security partitions
  3. From RSA IMEI Tab repair imei



Searching EDL Port..[COM39]
TPortConnection.Create...(COM39)..Opening...Ok
Getting device info.......
Serial No.: 0x9F91C3A1
MSM ID : 0x0010A0E1,
PBL Ver : 00000001
PK HASH : 1BEBE3863A6781DB4B01086063007334
DE9E5CA14971C7C4F4358EC9D79CDA46

Firehose Loader[Xiaomi_redminote8_loader.elf]
Initializing SaharaBoot... Ok
Sending ..............................Ok

Connecting to Firehose...
Ping..................... Ok
Configuration........
Identifying Chip....Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Jul 3 2019 - 22:23:56

* STORAGE DEVICE INFO *
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 19
Serial Number : 322970979
Firmware Version : 4
Product Name : S0J9K8
Physical Partitions : 4
Total Logical Blocks:
Drive [0] 122142720[58,242 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Drive [3] 32768[16 MB]
Running : Ok

Reading GPT[4]
<?xml version="1.0" encoding="UTF-8" ?>
<data>
<response value="NAK" rawmode="false" /></data>, Partitions(88 Items) Ok
Phone Information......
Model : Redmi Note 8
Brand : xiaomi
Android Ver : 9
Miui Ver : V11
Manufacturer : Xiaomi
Device : ginkgo
Mod_device : ginkgo_global
Display ID : PKQ1.190616.001
Security Patch : 2020-05-01
Kernel ID : 2020-05-01
Fingerprint : xiaomi/ginkgo/ginkgo:9/PKQ1.190616.001/V11.0.9.0.PCOMIXM:user/release-keys
ro_product_hardware :
sys_hardware_version :

Reading GPT[4]
<?xml version="1.0" encoding="UTF-8" ?>
<data>
<response value="NAK" rawmode="false" /></data>, Partitions(88 Items) Ok

Backup Security partitions...
Reading Security Items....
modemst1
modemst2
fsg
C:\Hydra Tool\Backup\Security_Backup\Redmi Note 8__9_Security_083020145227.sec
Backup Security Success....

----------------------------
Flashing Selected Partitions
secdata(0)[sec.elf] Ok
qupfw(0)[qupv3fw.elf] Ok
qupfwbak(0)[qupv3fw.elf] Ok
vbmeta(0)[vbmeta.img] Ok
vbmetabak(0)[vbmeta.img] Ok
xbl_config(0)[xbl_config.elf] Ok
xbl_configbak(0)[xbl_config.elf] Ok
devcfg(0)[devcfg.mbn] Ok
devcfgbak(0)[devcfg.mbn] Ok
storsec(0)[storsec.mbn] Ok
rpm(0)[rpm.mbn] Ok
rpmbak(0)[rpm.mbn] Ok
hyp(0)[hyp.mbn] Ok
hypbak(0)[hyp.mbn] Ok
keymaster(0)[km4.mbn] Ok
keymasterbak(0)[km4.mbn] Ok
cmnlib(0)[cmnlib.mbn] Ok
cmnlib64(0)[cmnlib64.mbn] Ok
cmnlibbak(0)[cmnlib.mbn] Ok
cmnlib64bak(0)[cmnlib64.mbn] Ok
abl(0)[abl.elf] Ok
ablbak(0)[abl.elf] Ok
bluetooth(0)[BTFM.bin] Ok
bluetoothbak(0)[BTFM.bin] Ok
misc(0)[misc.img] Ok
imagefv(0)[imagefv.elf] Ok
imagefvbak(0)[imagefv.elf] Ok
uefisecapp(0)[uefi_sec.mbn] Ok
uefisecappbak(0)[uefi_sec.mbn] Ok
modemst1(0)[dummy.bin] Ok
modemst2(0)[dummy.bin] Ok
xbl(0)[xbl.elf] Ok
xblbak(0)[xbl.elf] Ok
tz(0)[tz.mbn] Ok
tzbak(0)[tz.mbn] Ok
devinfo(0)[devinfo.img] Ok
logfs(0)[logfs_ufs_8mb.bin] Ok
metadata(0)[metadata_1.img] Ok
metadata(0)[metadata_2.img] Ok
metadata(0)[metadata_3.img] Ok
metadata(0)[metadata_4.img] Ok
fsg(0)[fs_image.tar.gz.mbn.img] Ok
dtbo(0)[dtbo.img] Ok
dtbobak(0)[dtbo.img] Ok
dsp(0)[dspso.bin] Ok
dspbak(0)[dspso.bin] Ok
persist(0)[persist.img] Ok
persistbak(0)[persist.img] Ok
boot(0)[boot.img] Ok
bootbak(0)[boot.img] Ok
recovery(0)[recovery.img] Ok
modem(0)[NON-HLOS.bin] Ok
modembak(0)[NON-HLOS.bin] Ok
cache(0)[cache.img] Ok
vendor(0)[vendor_1.img] Ok
vendor(0)[vendor_2.img] Ok
vendor(0)[vendor_3.img] Ok
vendor(0)[vendor_4.img] Ok
vendor(0)[vendor_5.img] Ok
vendor(0)[vendor_6.img] Ok
vendor(0)[vendor_7.img] Ok
vendor(0)[vendor_8.img] Ok
vendor(0)[vendor_9.img] Ok
vendor(0)[vendor_10.img] Ok
vendor(0)[vendor_11.img] Ok
system(0)[system_1.img] Ok
system(0)[system_2.img] Ok
system(0)[system_3.img] Ok
system(0)[system_4.img] Ok
system(0)[system_5.img] Ok
system(0)[system_6.img] Ok
system(0)[system_7.img] Ok
system(0)[system_8.img] Ok
system(0)[system_9.img] Ok
system(0)[system_10.img] Ok
system(0)[system_11.img] Ok
system(0)[system_12.img] Ok
system(0)[system_13.img] Ok
system(0)[system_14.img] Ok
system(0)[system_15.img] Ok
userdata(0)[userdata_1.img] Ok
userdata(0)[userdata_2.img] Ok
userdata(0)[userdata_3.img] Ok
userdata(0)[userdata_4.img] Ok
userdata(0)[userdata_5.img] Ok
userdata(0)[userdata_6.img] Ok
userdata(0)[userdata_7.img] Ok
userdata(0)[userdata_8.img] Ok
userdata(0)[userdata_9.img] Ok
userdata(0)[userdata_10.img] Ok
userdata(0)[userdata_11.img] Ok
userdata(0)[userdata_12.img] Ok
PrimaryGPT(0)[gpt_main0.bin] Ok

Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-33.] OK
0 [CRC32(2,11264)] OK
0 [CRC32(NUM_DISK_SECTORS-33.,11264)] OK
0 [0] OK
0 [CRC32(1,92)] OK
0 [0] OK
0 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 0
Set bootable storage drive 0 Ok
Rebooting Phone.... Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:19:09

 

Hydra Tool

Product Manager
Aug 31, 2019
316
372
Ukraine
Vivo V15 Pro PD1832F Pattern/Password Done

Remove Pin/Password and FRP by Hydra Testpoint.



PreOperation Configuration
Brand : VIVO Model : V15 Pro (PD1832F) Storage : Auto
Loader: Vivo_V17_Pro_SDM675.elf
Port : Auto
Connection : Flash Mode

Searching EDL Port..[COM422]
TPortConnection.Create...(COM422)..Opening...Ok
Getting device info.......
Serial No.: 0xF4F6F6DE
MSM ID : 0x000950E1, SM6150-Qualcomm Snapdragon 675
PBL Ver : 00000000
PK HASH : A7DF36FFD7AB557C67A6C26675E2795C
922CF671308CFD7169BEDB84424C862B

Firehose Loader[Vivo_V17_Pro_SDM675.elf]
SaharaBoot... Ok
Sending .................................Ok
Connecting to Firehose...
Ping..................... Ok
Configuration........
Identifying Chip........UFS Ok
Chip Configuration :
MemoryName : UFS
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Jul 2 2020 - 22:00:29

*** STORAGE DEVICE INFO ***
Memory Type : UFS
Block Size in Bytes : 4096
Page Size : 4096
Manufacturer ID : 462
Serial Number : 1297306958
Firmware Version : 800
Product Name : KM8V7001JM-B810
Physical Partitions : 6
Total Logical Blocks:
Drive [0] 30947328[118.055 GB]
Drive [1] 2048[8 MB]
Drive [2] 2048[8 MB]
Drive [3] 8192[32 MB]
Drive [4] 262144[1024 MB]
Drive [5] 16384[64 MB]

Protocol : Universal

Running : Ok

Reading GPT[6], Partitions(224 Items) Ok
Phone Information......
Brand : vivo
Vendor : vivo
Model : vivo 1818
ID : PKQ1.190302.001
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : sm6150-user 9 PKQ1.190302.001 compiler12161826 release-keys
Device : PD1832F_EX
Display ID : PKQ1.190302.001 release-keys
Security Patch : 2019-11-01
Platform : =SM6150
Fingerprint : vivo/1818/1818:9/PKQ1.190302.001/compiler12161810:user/release-keys

Reading GPT[6], Partitions(224 Items) Ok
*** Ultra Power Option ***
Rebuild UserData
Processing...
[Zero Wipe]
[Rebuild UserData] Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:13
 

Hydra Tool

Product Manager
Aug 31, 2019
316
372
Ukraine
Huawei MED-LX9 Y6P 2020 Huawei ID Remove by Hydra Dongle

Run mtk module, select huawei, remove account, connect testpoint



Huawei ID Remove Log :

Brand : HUAWEI Model : MED-LX9 (Y6P 2020) Connection : Flash Mode

=====================================
Connection
-Please wait...
-Connect Phone...
-Found...[COM51]

TPortConnection.Create...(COM51)..Opening...Ok

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0766 (0000)MT6765[6765]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
SECURE VERSION : 05
BL VERSION : FE
BR Secured : E5[SBC+SDA+SEL]

Security Authorization....
Sending[Huawei_Y6P_auth_sv5.auth] Accepted

Preparing Download Agent..
DA : MT6765_Huawei_MED.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2018/10/18.17:38_452898
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_k62v1_64_mexico.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : D57DCC00DEB016AA21A3516481680408
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 90014A68433961503301C3366DA13791 - hC9aP3

DA Speed : high-speed
DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_k62v1_64_mex_a32.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\__0766--__071220123012\MT6765_Android_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x00108000]1024 KB ->frp.bin...Ok
-nvdata[0x00A08000]16 MB ->nvdata.bin...Ok
-persist[0x03800000]8 MB ->persist.bin...Ok
-nvram[0x04400000]5 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\__0766--__071220123012
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : D57DCC00DEB016AA21A3516481680408
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 90014A68433961503301C3366DA13791 - hC9aP3

Reading GPT-EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Remove Account
Processing...
Backing up Partition for safety...
-oeminfo_120720123016.bin[0x04900000]32 MB ->oeminfo_120720123016.bin...Ok Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:21


Restore OEM INFO :

Brand : HUAWEI Model : MED-LX9 (Y6P 2020) Connection : Flash Mode

=====================================
Connection
-Please wait...
-Connect Phone...
-Found...[COM16]

TPortConnection.Create...(COM16)..Opening...Ok

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0766 (0000)MT6765[6765]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
SECURE VERSION : 05
BL VERSION : FE
BR Secured : E5[SBC+SDA+SEL]

Security Authorization....
Sending[Huawei_Y6P_auth_sv5.auth] Accepted

Preparing Download Agent..
DA : MT6765_Huawei_MED.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2018/10/18.17:38_452898
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_k62v1_64_mexico.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 6BC372AD71233B5C850AE3AFC5A6F053
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 150100525036344D420178BBD4333719 - RP64MB

DA Speed : high-speed
DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_k62v1_64_mex_a32.bin
Creating Scatter file... C:\HYDRATOOL\\Backup\Auto\__0766--__071220182927\MT6765_Android_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x00108000]1024 KB ->frp.bin...Ok
-nvdata[0x00A08000]16 MB ->nvdata.bin...Ok
-persist[0x03800000]8 MB ->persist.bin...Ok
-nvram[0x04400000]5 MB ->nvram.bin...Ok
Done!!!
C:\HYDRATOOL\\Backup\Auto\__0766--__071220182927
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 6BC372AD71233B5C850AE3AFC5A6F053
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 150100525036344D420178BBD4333719 - RP64MB

Reading GPT-EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Restore OEM Info
Processing... Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:41
 

Hydra Tool

Product Manager
Aug 31, 2019
316
372
Ukraine
Xiaomi Redmi 8 (olive) Mi Account Remove Done by Hydra Dongle

find my device off so no relocked after wifi or mobile net connection



PreOperation Configuration
Brand : XIAOMI Model : Redmi 8 (olive) Storage : Auto
Loader: Xiaomi_Redmi_8_Olive.mbn
Port : Auto
Connection : Flash Mode

Searching EDL Port..[COM26]
TPortConnection.Create...(COM26)..Opening...Ok
Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[UgKN
Checking Internet connection....
- Hydra Is Online
Connecting to Hydra Xiaomi Server...

Signature @256bytes Authentication.... Accepted......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 2906249733
Firmware Version : 162
Product Name : HCG8a4
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 122142720[58,242 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok

Reading GPT[3], Partitions(64 Items) Ok
Phone Information......
Vendor : Xiaomi
ID : QKQ1.191014.001
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Miui Ver : V11
Mod_device : olive_global
Security Patch : 2020-09-01
Emmc_size : 16GB

Reading GPT[3], Partitions(64 Items) Ok
Operation : MiAccount
Remove MiAccount[Erase Method]
Processing...
Backing up Partition for safety...Ok

Scanning Patching address...
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]Done!!
Total Items patched : 7
Successfully patched address..Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:45
 

Hydra Tool

Product Manager
Aug 31, 2019
316
372
Ukraine
Redmi Note 7 Pro (violet) Android 10 FRP Reset by Hydra Dongle



PreOperation Configuration
Brand : XIAOMI Model : Redmi Note 7 Pro (violet) Storage : Auto
Loader: Xiaomi_Redmi Note 7 Pro_Sdm6150_ddr.elf
Port : Auto
Connection : Flash Mode

Searching EDL Port..[COM8]
TPortConnection.Create...(COM8)..Opening...Ok
Getting device info.......
Serial No.: 0x801AA83C
MSM ID : 0x000950E1, SM6150-Qualcomm Snapdragon 675
PBL Ver : 00000001
PK HASH : 1BEBE3863A6781DB4B01086063007334
DE9E5CA14971C7C4F4358EC9D79CDA46

Firehose Loader[Xiaomi_Redmi Note 7 Pro_Sdm6150_ddr.elf]
SaharaBoot... Ok
Sending ...................................Ok
Connecting to Firehose...
Ping..................... Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[cg-6OaQ9RiA44jEKP9HKs0yYp03]
Checking Internet connection....
- Hydra Is Online
Connecting to Hydra Xiaomi Server...

Signature @256bytes Authentication.... Accepted........
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Jul 19 2019 - 01:12:10

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 2050475080
Firmware Version : 2
Product Name : DH6DAB
Physical Partitions : 4
Total Logical Blocks:
Drive [0] 122142720[58.242 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Drive [3] 32768[16 MB]

Protocol : Universal
Running : Ok

Reading GPT[4], Partitions(88 Items) Ok
Phone Information......
Vendor : Xiaomi
ID : QKQ1.190915.002
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Miui Ver : V12
Mod_device : violet_in_global
Security Patch : 2020-08-01

Reading GPT[4], Partitions(88 Items) Ok
*** FRP Reset ***
Resetting FRP...
Auto
Processing...
Executing ...
[Zero Wipe] Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:22
 

Hydra Tool

Product Manager
Aug 31, 2019
316
372
Ukraine
Xiaomi Redmi Note 8 (ginkgo) Mi Acc Removed by Hydra Dongle

  1. Go to Qualcomm Module
  2. Select brand and model
  3. Connect your device edl mode by testpoint
  4. go to Xiaomi tab, select remove mi account
  5. click execute and wait for a task completed



PreOperation Configuration
Brand : XIAOMI Model : Redmi Note 8 (ginkgo) Storage : Auto
Loader: Xiaomi_redminote8_loader.elf
Port : Auto
Connection : Flash Mode

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM7)
SymbolicName :\??\USB#VID_05C6&PID_9008#6&1e3ed538&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/02/2017,2.1.2.7

Getting device info......
Serial No.: 0x68A6BFCA
MSM ID : 0x0010A0E1, SM6125-Qualcomm Snapdragon 665
PBL Ver : 00000000
PK HASH : 1BEBE3863A6781DB4B01086063007334
DE9E5CA14971C7C4F4358EC9D79CDA46

Firehose Loader[Xiaomi_redminote8_loader.elf]
SaharaBoot... Ok
Sending ..............................Ok
Connecting to Firehose...
Ping..................... Ok
Configuration.........
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Jul 3 2019 - 22:23:56

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 19
Serial Number : 416877119
Firmware Version : 4
Product Name : S0J9K8
Physical Partitions : 4
Total Logical Blocks:
Drive [0] 122142720[58,242 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Drive [3] 32768[16 MB]

Protocol : Universal
Running : Ok
Reading GPT[4]
Drive [0] 88 Items
Drive [1] 0 Items
Drive [2] 0 Items
Drive [3]


Phone Information......
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi Note 8
ID : PKQ1.190616.001
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : ginkgo-user 9 PKQ1.190616.001 V11.0.7.0.PCOIDXM release-keys
Miui Ver : V11
Device : ginkgo
Mod_device : ginkgo_id_global
Display ID : PKQ1.190616.001
Security Patch : 2020-09-01
Fingerprint : xiaomi/ginkgo/ginkgo:9/PKQ1.190616.001/V11.0.7.0.PCOIDXM:user/release-keys

Processing Remove MiAccount[Patch Method]....
Backing up Partition for safety...Ok

Scanning Patching address...
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]Done!!
Total Items patched : 26
Successfully patched address..
Action Result : Ok

Elapsed Time : 00:01:48
 

Hydra Tool

Product Manager
Aug 31, 2019
316
372
Ukraine
Xiaomi Mi A2 Lite (daisy) Android 10 FRP Removed by Hydra

connect your device at qdloader mode, select factory reset protection (frp) and execute



PreOperation Configuration
Brand : XIAOMI Model : Mi A2 Lite (daisy) Storage : Auto
Loader: Xiaomi_S2y2_noauth_8953_ddr.mbn
Port : Auto
Connection : Flash Mode

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM10)
SymbolicName :\??\USB#VID_05C6&PID_9008#6&35e5f498&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/04/2013,2.1.0.5

Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8953
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 376817909
Firmware Version : 162
Product Name : HCG8a4
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 122142720[58,242 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok

Phone Information......
ID : QKQ1.191002.002
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Device : daisy_sprout
Display ID : QKQ1.191002.002.V11.0.5.0.QDLMIXM
Security Patch : 2020-05-01
Emmc_size : 16GB

Reading GPT[3]
Drive [0] 60 Items
Drive [1] 0 Items
Drive [2] 0 Items

*** FRP Reset ***
Resetting FRP...
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOkOk

Elapsed Time : 00:00:03
 

Hydra Tool

Product Manager
Aug 31, 2019
316
372
Ukraine
Vivo Y91 V1818C Pattern Remove Done by Hydra Dongle



PreOperation Configuration
Brand : VIVO Model : Y91 (V1818C) Storage : Auto
Loader: vivo_3_6.mbn
Port : Auto
Connection : Flash Mode

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM10)
SymbolicName :\??\USB#VID_05C6&PID_9008#6&13f92a08&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/02/2017,2.1.2.7

Getting device info......
Serial No.: 0xF65327BA
MSM ID : 0x000BF0E1, SDM439-Qualcomm Snapdragon 439
PBL Ver : 00000000
PK HASH : 60BA997FEF6DA9F05885FA11F1DD6D2A
90D052A257A09C2075D7246CC73C0D43

Firehose Loader[vivo_3_6.mbn]
SaharaBoot... Ok
Sending ...................Ok
Connecting to Firehose...
Ping... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 995801488
Firmware Version : 165
Product Name : HAG4a2
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 30777344[14.676 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok

Phone Information.....
Brand : vivo
Vendor : vivo
Model : vivo 1817
ID : OPM1.171019.026
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : msm8937_64-user 8.1.0 OPM1.171019.026 eng.compil.20200730.192449 release-keys
Device : msm8937_64
Display ID : OPM1.171019.026 release-keys
Security Patch : 2020-08-01
Emmc_size : 16GB
Platform : =SDM439
Fingerprint : vivo/1817/1817:8.1.0/OPM1.171019.026/compil07301924:user/release-keys

Reading GPT[3]
Drive [0] 60 Items
Drive [1] 0 Items
Drive [2] 0 Items

Formatting Userdata...
Method : Vivo ForcedErase Userdata
Processing...
- Formatting Userdata [Vivo ForcedErase Userdata] OkOk

Elapsed Time : 00:00:08
 
Top