★★★ Post All Successfully Repaired Phones By Hydra Tool ★★★

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
OnePlus One A0001 Edl Flashıng by Hydra
191100002754_HQTool.exe_EDL_Flashing_10-19-2021-103341.jpeg

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM28)
SymbolicName :??USB#VID_05C6&PID_9008#6&2cb3aafc&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 03/01/2019,2.1.3.6

Getting device info . . ...
Serial No.: 0x0D56FA8F
HW_ID : 007B40E100000000
MSM ID : 0x007B40E1,
MODEL_ID : 0x0000
OEM_ID : 0x0000 - QUALCOMM
PBL Ver : 00000000
PK HASH : cc3153a80293939b90d02d3bf8b23e0292e452fef662c74998421adad42a380f

Firehose Loader [one_0_1.mbn]
--------------------------------------------------
Header Type : mbnOLD_NOSignature
TargetMSM : 8974
Tag :
Version : 0
Code_size : 0
Signature_size : 0
fhVendor :
HW_ID :
Vendor :
OEM_ID :
MODEL_ID :
SW_ID :
APP_ID :
pk_hash :
OEM_VERSION :
IMAGE_VARIANT :
QC_VERSION :
--------------------------------------------------

SaharaBoot... Ok
Sending ....b Okb0
Connecting to Firehose...
Ping ... Ok
Configuration.....
Identifying Chip.... ....eMMC
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 131072
MaxPayloadSizeToTargetInBytesSupported : 131072
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8974
Version : 1


Protocol : Universal
Running : Ok

Reading GPT[1]
Drive [0]

Reading GPT[1]
Drive [0]


----------------------------
Flashing Selected titions....
- modem (0)b [NON-HLOS.bin] b0 Ok
- sbl1 (0)b [sbl1.mbn] b0 Ok
- aboot (0)b [emmc_appsboot.mbn] b0 Ok
- rpm (0)b [rpm.mbn] b0 Ok
- boot (0)b [boot.img] b0 Ok
- tz (0)b [tz.mbn] b0 Ok
- oppodycnvbk (0)b [dynamic_nvbk.bin] b0 Ok
- oppostanvbk (0)b [static_nvbk.bin] b0 Ok
- system (0)b [system.img] b0 Ok
- persist (0)b [persist.img] b0 Ok
- cache (0)b [cache.img] b0 Ok
- recovery (0)b [recovery.img] b0 Ok
- LOGO (0)b [splash.img] b0 Ok
- DRIVER (0)b [DRIVER.ISO] b0 Ok
- userdata (0)b [userdata.img] b0 Ok
- PrimaryGPT (0)b [gpt_main0.bin] b0 Ok

Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-33.] OK
0 [CRC32(2,4096)] OK
0 [CRC32(NUM_DISK_SECTORS-33.,4096)] OK
0 [0] OK
0 [CRC32(1,92)] OK
0 [0] OK
0 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 0
Set bootable storage drive 0 Ok

Rebooting Phone.... Ok

Elapsed Time : 00:04:50
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Oppo A15 CPH 2185 Erase Userdata Without Recovery Lock With by Hydra
190300000440_HMTKTool.exe_FM_Erase_Userdata_10-20-2021-110521.jpeg

=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port (COM15)
Device : 6&3a34e632&0&2
SymbolicName :??USB#VID_0E8D&PID_0003#6&3a34e632&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2016,3.0.1504.0

Opened handle..

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : FC5E2223914FFA092684CBBE17ED271E
ERAM Size : 0x0000000000038000 -224 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 90014A68423861503E0300AD4854A7D7 - hB8aP>

Reading GPT -EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Erase Userdata
Processing...
Formatting Userdata...
Action Result : Ok

Elapsed Time : 00:00:02
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi 9 Prime (lancelot) Bootloader Unlock With by Hydra

=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port (COM10)
Device : 5&21be246a&0&4
SymbolicName :??USB#VID_0E8D&PID_0003#5&21be246a&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2016,3.2

Opened handle..
Handshaking...

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0707 MT6768 [6768]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)
Device not secured..
C:Hydra ToolBackupPreloader_dumpprel.tmp
Handshaking...

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0707 MT6768 [6768]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)

MEID : 5E818EE1378442828AA4B9FB3BC449A9
Stage 1.. [Size:256504]
Sending : Please wait.. Accepted

Identifying Protocol...
Protocol : New
Synchronization... SYNC
Preloader Initialization...
sing prel.tmp
Init : Accepted
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 3F322473F5D1D9173DFAB125BAAEC82B
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58,242 GB
eMMC CID : 15010044503644414203399DD4E368F5 - DP6DAB
Executing : ACCEPTED...

Reading GPT -EMMC [0x00008000] 130 Items

Autobackup titions
-preloader [0x00000000] 512 KB -> preloader.bin...0 Ok
-> Renaming Preloader.... preloader_lancelot.bin
Creating Scatter file... C:Hydra ToolBackupAuto0707__101921231016MT6768_Android_scatter.txt
-pgpt [0x00000000] 32 KB -> pgpt.bin...0 Ok
-frp [0x05508000] 1024 KB -> frp.bin...0 Ok
-nvdata [0x0C4A2000] 64 MB -> nvdata.bin...0 Ok
-persist [0x104A2000] 48 MB -> persist.bin...0 Ok
-protect1 [0x164A2000] 8 MB -> protect1.bin...0 Ok
-protect2 [0x16CA2000] 11,367 MB -> protect2.bin...0 Ok
-nvram [0x19F80000] 64 MB -> nvram.bin...0 Ok
Done!!!
C:Hydra ToolBackupAuto0707__101921231016
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 1 3F322473F5D1D9173DFAB125BAAEC82B
ERAM Size : 1 0x0000000000070000 -448 KB
IRAM Size : 1 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58,242 GB
eMMC CID : 15010044503644414203399DD4E368F5 - DP6DAB

Reading GPT -EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Unlock Bootloader
Processing...
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------

Verifying status after operation...
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------
Action Result : Ok

Elapsed Time : 00:00:43
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi Note 8 (ginkgo) Edl Frp Remove With by Hydra

Brand : XIAOMI Model : Redmi Note 8 (ginkgo) Storage : Auto
Loader: Xiaomi_redminote8_loader.elf
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM13)
SymbolicName :??USB#VID_05C6&PID_9008#5&1f3e3f24&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 02/05/2018,3.0.0.0

Getting device info .. Ok
Device MODE : Firehose
Connecting to Firehose...
Ping ..................... Ok
Configuration.........
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Jul 3 2019 - 22:23:56

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 19
Serial Number : 327166710
Firmware Version : 4
Product Name : S0J9K8
Physical titions : 4
Total Logical Blocks:
Drive [0] 122142720 [58,242 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]
Drive [3] 32768 [16 MB]

Protocol : Universal
Running : Ok

Phone Information ......
Vendor : Xiaomi
ID : QKQ1.200114.002
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Miui Ver : V12
Mod_device : ginkgo_global
Security Patch : 2021-07-01

Reading GPT[4]
Drive [0] 88 Items
Drive [1] 0 Items
Drive [2] 0 Items
Drive [3]

Removing FRPta...
Method :
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOk Ok

Elapsed Time : 00:00:03
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi Note 8 Edl Flashıng With by Hydra


Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM23)
SymbolicName :??USB#VID_05C6&PID_9008#6&2dab7f2b&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 05/29/2019,2.1.3.7

Getting device info .. . ...
Serial No.: 0x66F1C172
HW_ID : 0010A0E100720000
MSM ID : 0x0010A0E1, SM6125-Qualcomm Snapdragon 665
MODEL_ID : 0x0000
OEM_ID : 0x0072 - XIAOMI
PBL Ver : 00000001
PK HASH : 1bebe3863a6781db4b01086063007334de9e5ca14971c7c4f4358ec9d79cda46

Firehose Loader [Xiaomi_redminote8_loader.elf]
--------------------------------------------------
Header Type : New
TargetMSM :
Tag :
Version : 6
Code_size : 816
Signature_size : 256
fhVendor : XIAOMI
HW_ID : 0010A0E100720000
Vendor : XIAOMI
OEM_ID : 0072
MODEL_ID : 0000
SW_ID : 00000003
APP_ID : 00000000
pk_hash : 1bebe3863a6781db4b01086063007334de9e5ca14971c7c4f4358ec9d79cda4692ce5e948c6fd409408f4c919fcadfe3
OEM_VERSION : cibuild
IMAGE_VARIANT : NicobarPkgLAA
QC_VERSION : BOOT.XF.4.0-00149-NICOBARLAZ-1
--------------------------------------------------

SaharaBoot... Ok
Sending ..............................b Okb0
Connecting to Firehose...
Ping ..................... Ok
Configuration.........
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Jul 3 2019 - 22:23:56

Protocol : Universal
Running : Ok
Reading GPT[1]
Drive [0] 88 Items


Backup Security titions...
Reading Security Items....
> modemst1
> modemst2
> fsg
> fsc
C:Hydra ToolBackupSecurity_Backup___Security_102021195928.sec
Backup Security Success....

----------------------------
Flashing Selected titions....
- qupfw (0)b [qupv3fw.elf] b0 Ok
- qupfwbak (0)b [qupv3fw.elf] b0 Ok
- vbmeta (0)b [vbmeta.img] b0 Ok
- vbmetabak (0)b [vbmeta.img] b0 Ok
- xbl_config (0)b [xbl_config.elf] b0 Ok
- xbl_configbak (0)b [xbl_config.elf] b0 Ok
- devcfg (0)b [devcfg.mbn] b0 Ok
- devcfgbak (0)b [devcfg.mbn] b0 Ok
- storsec (0)b [storsec.mbn] b0 Ok
- rpm (0)b [rpm.mbn] b0 Ok
- rpmbak (0)b [rpm.mbn] b0 Ok
- hyp (0)b [hyp.mbn] b0 Ok
- hypbak (0)b [hyp.mbn] b0 Ok
- keymaster (0)b [km4.mbn] b0 Ok
- keymasterbak (0)b [km4.mbn] b0 Ok
- cmnlib (0)b [cmnlib.mbn] b0 Ok
- cmnlib64 (0)b [cmnlib64.mbn] b0 Ok
- cmnlibbak (0)b [cmnlib.mbn] b0 Ok
- cmnlib64bak (0)b [cmnlib64.mbn] b0 Ok
- abl (0)b [abl.elf] b0 Ok
- ablbak (0)b [abl.elf] b0 Ok
- bluetooth (0)b [BTFM.bin] b0 Ok
- bluetoothbak (0)b [BTFM.bin] b0 Ok
- misc (0)b [misc.img] b0 Ok
- imagefv (0)b [imagefv.elf] b0 Ok
- imagefvbak (0)b [imagefv.elf] b0 Ok
- uefisecapp (0)b [uefi_sec.mbn] b0 Ok
- uefisecappbak (0)b [uefi_sec.mbn] b0 Ok
- xbl (0)b [xbl.elf] b0 Ok
- xblbak (0)b [xbl.elf] b0 Ok
- tz (0)b [tz.mbn] b0 Ok
- tzbak (0)b [tz.mbn] b0 Ok
- logfs (0)b [logfs_ufs_8mb.bin] b0 Ok
- metadata (0)b [metadata.img] b0 Ok
- dtbo (0)b [dtbo.img] b0 Ok
- dtbobak (0)b [dtbo.img] b0 Ok
- dsp (0)b [dspso.bin] b0 Ok
- dspbak (0)b [dspso.bin] b0 Ok
- persist (0)b [persist.img] b0 Ok
- boot (0)b [boot.img] b0 Ok
- bootbak (0)b [boot.img] b0 Ok
- recovery (0)b [recovery.img] b0 Ok
- modem (0)b [NON-HLOS.bin] b0 Ok
- modembak (0)b [NON-HLOS.bin] b0 Ok
- cache (0)b [cache.img] b0 Ok
- cust (0)b [cust.img] b0 Ok
- vendor (0)b [vendor.img] b0 Ok
- system (0)b [system.img] b0 Ok
- userdata (0)b [userdata.img] b0 Ok
- PrimaryGPT (0)b [gpt_main0.bin] b0 Ok

Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-33.] OK
0 [CRC32(2,11264)] OK
0 [CRC32(NUM_DISK_SECTORS-33.,11264)] OK
0 [0] OK
0 [CRC32(1,92)] OK
0 [0] OK
0 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 0
Set bootable storage drive 0 Ok

Rebooting Phone.... Ok

Elapsed Time : 03:41:11
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi Note 6 Pro (tulip) Edl Frp Remove With by Hydra

Brand : XIAOMI Model : Redmi Note 6 Pro (tulip) Storage : Auto
Loader: mi_2_9.elf
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM65)
SymbolicName :??USB#VID_05C6&PID_9008#6&1ba46697&0&5#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 05/29/2019,2.1.3.7

Getting device info .. Ok
Device MODE : Firehose
Connecting to Firehose...
Ping ...... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : MSM8996
Version : 1
DateTime : Aug 2 2018 - 22:27:53

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 1439487652
Firmware Version : 2
Product Name : DD68MB
Physical titions : 4
Total Logical Blocks:
Drive [0] 61071360 [29.121 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]
Drive [3] 8192 [4 MB]

Protocol : Universal
Running : Ok

Phone Information .....
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi Note 6 Pro
ID : PKQ1.180904.001
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : tulip-user 9 PKQ1.180904.001 V12.0.1.0.PEKMIXM release-keys
Miui Ver : V12
Device : tulip
Mod_device : tulip_global
Display ID : PKQ1.180904.001
Security Patch : 2020-11-05
Fingerprint : xiaomi/tulip/tulip:9/PKQ1.180904.001/V12.0.1.0.PEKMIXM:user/release-keys

Reading GPT[4]
Drive [0] 64 Items
Drive [1] 0 Items
Drive [2] 0 Items
Drive [3]

Removing FRPta...
Method :
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOk Ok

Elapsed Time : 00:00:04
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Y6P 2020 (MED-LX9) Bootloader Unlock With by Hydra

=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port_V1633 (COM44)
Device : 5&1ecefef&0&4
SymbolicName :??USB#VID_0E8D&PID_0003#5&1ecefef&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0

Opened handle..

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 1C9A38A917CC57061B2A17AC4B466E41
ERAM Size : 0x0000000000038000 -224 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 150100475036424D4201B9F5CC39870F - GP6BMB

Reading GPT -EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Unlock Bootloader
Processing...
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------

Verifying status after operation...
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------
Action Result : Ok

Elapsed Time : 00:00:03
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Vivo Y91C Erase user Data and Remove Frp With by Hydra

=====================================
Searching for MTK Device... Found
Port Identification : Flashmode Preloader
FriendlyName : MediaTek PreLoader USB VCOM_V1632 (Android) (COM10)
Device : 6&2550cee7&0&3
SymbolicName :??USB#VID_0E8D&PID_2000#6&2550cee7&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0

Opened handle..

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 5BCAE68FCB4EFA73C95E9F4C6C193CED
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000030000000 -768 MB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000001D1F000000 -116.484 GB
eMMC CID : 13014E47314A395339100B001E9FA717 - G1J9S9

Reading GPT -EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Erase Userdata
Processing...
Erasing FRP tition...
Formatting Userdata...
Action Result : Ok

Elapsed Time : 00:00:05
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Oppo A71 (CPH 1801) Format User Data Without Recovery Lock With by Hydra

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM31)
SymbolicName :??USB#VID_05C6&PID_9008#6&1485bec3&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 03/25/2016,2.1.2.2

Getting device info .. . ...
Serial No.: 0xAD024CC3
HW_ID : 0009A0E100000000
MSM ID : 0x0009A0E1, SDM450-Qualcomm Snapdragon 450
MODEL_ID : 0x0000
OEM_ID : 0x0000 - QUALCOMM
PBL Ver : 00000000
PK HASH : 05f06ba44eeb2abdf14bb644aabc2e693ddf7b8711cc7cf07d4cd0eb2e1a8728

Firehose Loader [a71_firehose.bin]
--------------------------------------------------
Header Type : OLD
TargetMSM : 8953
Tag : _peek
Version : 3
Code_size : 288
Signature_size : 256
fhVendor : OPPO
HW_ID : 0009A0E100000000
Vendor : QUALCOMM
OEM_ID : 0000
MODEL_ID : 0000
SW_ID : 0000000000000003
APP_ID :
pk_hash : 05f06ba44eeb2abdf14bb644aabc2e693ddf7b8711cc7cf07d4cd0eb2e1a8728
OEM_VERSION : ubuntu-121-238
IMAGE_VARIANT : JAADANAZA
QC_VERSION : BOOT.BF.3.3-00216
--------------------------------------------------

SaharaBoot... Ok
Sending ..................b Okb0
Connecting to Firehose...
Ping ... Ok
Configuration... Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8953
Version : 1

Protocol : Oppo
Running : Ok
Processing A71 (CPH1801) Format Userdata....
Action Result : Ok

Rebooting Phone.... Ok

Elapsed Time : 00:00:08
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Y6 2018 (ATU-L22) Edl Frp Remove With by Hydra

Brand : HUAWEI Model : ATU-L22 (Y6 2018) Storage : Auto
Loader: Huawei-ATU-Y6.mbn
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM57)
SymbolicName :??USB#VID_05C6&PID_9008#6&3505d85a&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 09/10/2015,2.1.2.0

Getting device info .. . ...
Serial No.: 0x666B5E5E
HW_ID : 000560E10015003A
MSM ID : 0x000560E1, MSM8917-Qualcomm Snapdragon 425
MODEL_ID : 0x003A
OEM_ID : 0x0015 - HUAWEI
PBL Ver : 00000000
PK HASH : 6bc369511da9cadb3a7af61574f89db385003d6241bdd1ff573dba61bf6ae119

Firehose Loader [Huawei-ATU-Y6.mbn]
--------------------------------------------------
Header Type : OLD
TargetMSM : 8917
Tag : _peek
Version : 3
Code_size : 288
Signature_size : 256
fhVendor : QUALCOMM
HW_ID : 000560E10015003A
Vendor : HUAWEI
OEM_ID : 0015
MODEL_ID : 003A
SW_ID : 0000000000000003
APP_ID :
pk_hash : 6bc369511da9cadb3a7af61574f89db385003d6241bdd1ff573dba61bf6ae119
OEM_VERSION : ubuntu
IMAGE_VARIANT : LAADANAZA
QC_VERSION : BOOT.BF.3.3-00193
--------------------------------------------------

SaharaBoot... Ok
Sending ...................b Okb0
Connecting to Firehose...
Ping ... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8917
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 3333537160
Firmware Version : 858796104
Product Name : HAG4a2
Physical titions : 3
Total Logical Blocks:
Drive [0] 30777344 [14.676 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]

Protocol : Universal
Running : Ok
Reading GPT[3]
Drive [0] 56 Items
Drive [1] 0 Items
Drive [2] 0 Items

Processing Remove FRP....
- Removing FRP [Zero Wipe] Ok
Action Result : Ok

Elapsed Time : 00:00:04
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Oppo F1 Edl Frp Remove With by Hydra

Brand : OPPO Model : F1 Storage : Auto
Loader: Oppo_A53_8936.mbn
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM86)
SymbolicName :??USB#VID_05C6&PID_9008#6&27a0b2a2&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 08/02/2017,2.1.2.7

Getting device info .. Ok
Device MODE : Firehose
Connecting to Firehose...
Ping .. Ok
Configuration.......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8936
Version : 1


Protocol : Universal
Running : Ok

Phone Information .....
Brand : OPPO
Vendor : OPPO
Model : F1f
ID : LMY47V
SDK : 22
Release : 5.1.1
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Description : msm8916_64-user 5.1.1 LMY47V eng.root.20190307.154315 release-keys
Device : F1f
Board : msm8916
Display ID : F1EX_11_190307
Security Patch : 2017-12-01
Platform : msm8916
FRPPST : /dev/block/bootdevice/by-name/config

Reading GPT[3]
Drive [0] 40 Items
Drive [1] 0 Items
Drive [2] 4 Items

Removing FRPta...
Method :
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOk Ok

Elapsed Time : 00:00:04
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi Note 8 Pro (begonia) Bootlaoder Unlock With by Hydra

=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port_V1632 (COM13)
Device : 6&283ebb7d&0&2
SymbolicName :??USB#VID_0E8D&PID_0003#6&283ebb7d&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0

Opened handle..
Handshaking... Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0813 MT6785 [6785]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : E7
SBC : 01 (True)
SLA : 02 (True)
DAA : 04 (True)
SWJTAG : 06 (True)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 20 (True)
MEMWRITE : 40 (True)
CMD_C8 : 80 (True)

Exploiting Device...
Exploit Sent..
Successfully Exploited...
Handshaking... Ok

C:Hydra ToolBackupPreloader_dumpprel.tmp
Handshaking...

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0813 MT6785 [6785]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)

MEID : D136E12AB9EB8E86630B3B9968CB18BF
Stage 1.. [Size:234968]
Sending : Please wait.. Accepted

Identifying Protocol...
Protocol : New
Synchronization... SYNC
Preloader Initialization...
sing prel.tmp
Init : Accepted
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 6032FEE2A95D5FF595D5AEDE4D97867F
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x0000000180000000 -6 GB
UFS LU0 Size: 0x0000000000400000 -4 MB
UFS LU1 Size: 0x0000000000400000 -4 MB
UFS LU2 Size: 0x0000000EE5800000 -59.586 GB
UFS CID : 'ce'01KM2H7001CM-B518
UFS UNIQID : 00330039006300380031003900300064
Executing : ACCEPTED...

Reading GPT0 -UFS [0x00008000] 0 130 Items

Reading System Info
Vendor : Xiaomi
ID : RP1A.200720.011
SDK : 30
Release : 11
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : zh-CN
Description : begonia-user 11 RP1A.200720.011 V12.5.2.0.RGGCNXM release-keys
Miui Ver : V125
Display ID : RP1A.200720.011
Security Patch : 2021-08-01
StorageType : mtp
Userdata State : Not Encrypted
0
Autobackup titions
-preloader [0x00000000] 512 KB -> preloader.bin... Ok0
-> Renaming Preloader.... preloader_begonia.bin0
Creating Scatter file... C:Hydra ToolBackupAuto0813__102321093408MT6785_Android_scatter.txt
-pgpt [0x00000000] 32 KB -> pgpt.bin... Ok
-frp [0x05888000] 1024 KB -> frp.bin... Ok
-nvdata [0x08188000] 64 MB -> nvdata.bin... Ok
-persist [0x0E188000] 70.469 MB -> persist.bin... Ok
-protect1 [0x12800000] 8 MB -> protect1.bin... Ok
-protect2 [0x13000000] 8 MB -> protect2.bin... Ok
-nvram [0x17580000] 64 MB -> nvram.bin... Ok
Done!!!0
C:Hydra ToolBackupAuto0813__102321093408
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 1 6032FEE2A95D5FF595D5AEDE4D97867F
ERAM Size : 1 0x0000000000080000 -512 KB
IRAM Size : 1 0x0000000180000000 -6 GB
UFS LU0 Size: 0x0000000000400000 -4 MB
UFS LU1 Size: 0x0000000000400000 -4 MB
UFS LU2 Size: 0x0000000EE5800000 -59.586 GB
UFS CID : 'ce'01KM2H7001CM-B518
UFS UNIQID : 00330039006300380031003900300064

Reading GPT0 -UFS [0x00008000] 0 130 Items
0

Reading System Info
Vendor : Xiaomi
ID : RP1A.200720.011
SDK : 30
Release : 11
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : zh-CN
Description : begonia-user 11 RP1A.200720.011 V12.5.2.0.RGGCNXM release-keys
Miui Ver : V125
Display ID : RP1A.200720.011
Security Patch : 2021-08-01
StorageType : mtp
Userdata State : Not Encrypted

-------------------------------------
Operation : Unlock Bootloader
Processing...
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------

Verifying status after operation...
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------
Action Result : 0 Ok

Elapsed Time : 00:01:20
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Y6P 2020 (MED-LX9) Remove Huawei ID With by Hydra

=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port_V1632 (COM12)
Device : 5&1e7d8db7&0&4
SymbolicName :??USB#VID_0E8D&PID_0003#5&1e7d8db7&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0

Opened handle..

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 5EB7CFB9A5334673B4BBA81919C00425
ERAM Size : 0x0000000000038000 -224 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 150100525036344D42019F7E97398737 - RP64MB

Reading GPT -EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Remove Account
Processing...
Backing up tition for safety...
-oeminfo_102321125814.bin [0x04900000] 32 MB -> oeminfo_102321125814.bin...0 Ok
Action Result : Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:06
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
OnePlus 2 (A2005) Edl Format Userdata With by Hdyra

Brand : ONEPLUS Model : 2 A2005 Storage : Auto
Loader: one_0_3.mbn
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM28)
SymbolicName :??USB#VID_05C6&PID_9008#5&1a3449c0&0&5#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 12/17/2018,2.1.3.5

Getting device info .. Ok
Device MODE : Firehose
Connecting to Firehose...
Ping ..... Ok
Configuration.......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 32768
MaxPayloadSizeToTargetInBytesSupported : 32768
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8994
Version : 1
DateTime : Jun 4 2016 - 12:48:05


Protocol : Universal
Running : Ok

Phone Information .....
Brand : OnePlus
Vendor : OnePlus
ID : OPM2.171019.029
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : OnePlus2-user 6.0.1 MMB29M 7 release-keys
Device : OnePlus2
Display ID : lineage_oneplus2-userdebug 8.1.0 OPM2.171019.029 22ef08384e
Security Patch : 2018-04-05
FRPPST : /dev/block/platform/soc.0/f9824900.sdhci/by-name/config
Fingerprint : OnePlus/OnePlus2/OnePlus2:6.0.1/MMB29M/1447858500:user/release-keys

Reading GPT[3]
Drive [0] 44 Items
Drive [1] 0 Items
Drive [2] 4 Items

Formatting Userdata...
Method :
Auto
Processing...
- Formatting Userdata
Executing ...
- Formatting Userdata [Safe Format - eMMc] OkOk Ok

Elapsed Time : 00:00:03
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
OnePlus 2 (A2005) Edl Frp Remove With by Hydra

Brand : ONEPLUS Model : 2 A2005 Storage : Auto
Loader: one_0_3.mbn
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM28)
SymbolicName :??USB#VID_05C6&PID_9008#5&1a3449c0&0&5#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 12/17/2018,2.1.3.5

Getting device info .. Ok
Device MODE : Firehose
Connecting to Firehose...
Ping ..... Ok
Configuration.......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 32768
MaxPayloadSizeToTargetInBytesSupported : 32768
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8994
Version : 1
DateTime : Jun 4 2016 - 12:48:05


Protocol : Universal
Running : Ok

Phone Information .....
Brand : OnePlus
Vendor : OnePlus
ID : OPM2.171019.029
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : OnePlus2-user 6.0.1 MMB29M 7 release-keys
Device : OnePlus2
Display ID : lineage_oneplus2-userdebug 8.1.0 OPM2.171019.029 22ef08384e
Security Patch : 2018-04-05
FRPPST : /dev/block/platform/soc.0/f9824900.sdhci/by-name/config
Fingerprint : OnePlus/OnePlus2/OnePlus2:6.0.1/MMB29M/1447858500:user/release-keys

Reading GPT[3]
Drive [0] 44 Items
Drive [1] 0 Items
Drive [2] 4 Items

Removing FRPta...
Method :
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOk Ok

Elapsed Time : 00:00:03
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi 6A (cactus) Bootloader Unlock With by Hydra

=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port_V1632 (COM21)
Device : 6&df2ee03&0&6
SymbolicName :??USB#VID_0E8D&PID_0003#6&df2ee03&0&6#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0

Opened handle..
Handshaking... Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0766 MT6765 [6765]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : E7
SBC : 01 (True)
SLA : 02 (True)
DAA : 04 (True)
SWJTAG : 06 (True)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 20 (True)
MEMWRITE : 40 (True)
CMD_C8 : 80 (True)

Exploiting Device...
Exploit Sent..
Successfully Exploited...
Handshaking... Ok

C:UsersdonzDesktopNew folderHydra ToolBackupPreloader_dumpprel.tmp
Handshaking...

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0766 MT6765 [6765]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)

MEID : 34173A77BA6C6E4BC73851C2F41F45F0
Stage 1.. [Size:216440]
Sending : Please wait.. Accepted

Identifying Protocol...
Protocol : New
Synchronization... SYNC
Preloader Initialization...
sing prel.tmp
Init : Accepted
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 49CB0CDBD5C7067821153C751EEC7
ERAM Size : 0x0000000000038000 -224 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003AB400000 -14.676 GB
eMMC CID : 90014A484147346132A502E788CA75ED - HAG4a2
Executing : ACCEPTED...

Reading GPT -EMMC [0x00008000] 130 Items

Reading System Info
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi 6A
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : zh-CN
Description : cactus-user 9 PPR1.180610.011 V11.0.5.0.PCBCNXM release-keys
Miui Ver : V11
Device : cactus
Display ID : SW_S98506AE1_V009_M13_XM_C3C_USR
Security Patch : 2020-03-01
Fingerprint : xiaomi/cactus/cactus:9/PPR1.180610.011/V11.0.5.0.PCBCNXM:user/release-keys
StorageType : mtp
Userdata State : Encrypted

Autobackup titions
-preloader [0x00000000] 512 KB -> preloader.bin...0 Ok
-> Renaming Preloader.... preloader_cactus.bin
Creating Scatter file... C:UsersdonzDesktopNew folderHydra ToolBackupAuto0766_xiaomi_cactus_cactus_9_PPR1.180610.011_V11.0.5.0.PCBCNXM_102521084358MT6765_Android_scatter.txt
-pgpt [0x00000000] 32 KB -> pgpt.bin...0 Ok
-frp [0x05588000] 1024 KB -> frp.bin...0 Ok
-nvdata [0x07688000] 64 MB -> nvdata.bin...0 Ok
-protect1 [0x0D688000] 8 MB -> protect1.bin...0 Ok
-protect2 [0x0DE88000] 9.469 MB -> protect2.bin...0 Ok
-persist [0x0F000000] 64 MB -> persist.bin...0 Ok
-nvram [0x1BE80000] 64 MB -> nvram.bin...0 Ok
Done!!!
C:UsersdonzDesktopNew folderHydra ToolBackupAuto0766_xiaomi_cactus_cactus_9_PPR1.180610.011_V11.0.5.0.PCBCNXM_102521084358
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 1 49CB0CDBD5C7067821153C751EEC7
ERAM Size : 1 0x0000000000038000 -224 KB
IRAM Size : 1 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003AB400000 -14.676 GB
eMMC CID : 90014A484147346132A502E788CA75ED - HAG4a2

Reading GPT -EMMC [0x00008000] 130 Items


Reading System Info
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi 6A
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : zh-CN
Description : cactus-user 9 PPR1.180610.011 V11.0.5.0.PCBCNXM release-keys
Miui Ver : V11
Device : cactus
Display ID : SW_S98506AE1_V009_M13_XM_C3C_USR
Security Patch : 2020-03-01
Fingerprint : xiaomi/cactus/cactus:9/PPR1.180610.011/V11.0.5.0.PCBCNXM:user/release-keys
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Unlock Bootloader
Processing...
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------

Verifying status after operation...
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------
Action Result : Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:41
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi 2 (HM2014811) Edl Flashıng With by Hydra

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM23)
SymbolicName :??USB#VID_05C6&PID_9008#5&201b4142&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 08/31/2015,2.1.2.0

Getting device info .. Ok
Device MODE : Firehose
Connecting to Firehose...
Ping .. Ok
Configuration.......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8916
Version : 1


Protocol : Universal
Running : Ok

Phone Information .....
Brand : Xiaomi
Vendor : Xiaomi
Model : wt88047
ID : LMY47V
SDK : 22
Release : 5.1.1
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Description : wt88047-user 5.1.1 LMY47V V9.2.5.0.LHJMIEK release-keys
Miui Ver : V9
Device : wt88047
Mod_device : wt88047_pro_global
Board : msm8916
Display ID : LMY47V
Security Patch : 2017-01-01
Platform : msm8916
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : Xiaomi/wt88047/wt88047:5.1.1/LMY47V/V9.2.5.0.LHJMIEK:user/release-keys

Reading GPT[3]
Drive [0] 32 Items
Drive [1] 0 Items
Drive [2] 0 Items


Backup Security titions...
Reading Security Items....
> modemst1
> modemst2
> fsg
> fsc
C:Hydra ToolBackupSecurity_Backupwt88047_msm8916_5.1.1_Security_102621092704.sec
Backup Security Success....

----------------------------
Flashing Selected titions....
- modem (0)b [NON-HLOS.bin] b0 Ok
- modem1 (0)b [NON-HLOS.bin] b0 Ok
- sbl1 (0)b [sbl1.mbn] b0 Ok
- sbl2 (0)b [sbl2.mbn] b0 Ok
- sbl3 (0)b [sbl3.mbn] b0 Ok
- rpm (0)b [rpm.mbn] b0 Ok
- tz (0)b [tz.mbn] b0 Ok
- aboot (0)b [emmc_appsboot.mbn] b0 Ok
- misc (0)b [misc.img] b0 Ok
- boot (0)b [boot.img] b0 Ok
- boot1 (0)b [boot.img] b0 Ok
- recovery (0)b [recovery.img] b0 Ok
- persist (0)b [persist.img] b0 Ok
- system (0)b [system.img] b0 Ok
- system1 (0)b [system.img] b0 Ok
- cache (0)b [cache.img] b0 Ok
- userdata (0)b [userdata.img] b0 Ok
- storage (0)b [storage.img] b0 Ok
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 0
Set bootable storage drive 0 Ok

Rebooting Phone.... Ok

Elapsed Time : 00:12:14
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi S2 (ysl) Edl Frp Remove With by Hydra

Brand : XIAOMI Model : Redmi S2 (ysl) Storage : Auto
Loader: Xiaomi_S2y2_noauth_8953_ddr.mbn
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM343)
SymbolicName :??USB#VID_05C6&PID_9008#6&e7c094f&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 08/02/2017,2.1.2.7

Getting device info .. Ok
Device MODE : Firehose
Connecting to Firehose...
Ping .. Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8953
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 2737047505
Firmware Version : 1
Product Name : GD6BMB
Physical titions : 3
Total Logical Blocks:
Drive [0] 61071360 [29,121 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]

Protocol : Universal
Running : Ok

Phone Information .....
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi S2
ID : PKQ1.181203.001
SDK : 28
Release : 9
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-GB
Description : ysl-user 9 PKQ1.181203.001 V12.0.2.0.PEFMIXM release-keys
Miui Ver : V12
Device : ysl
Mod_device : ysl_global
Display ID : PKQ1.181203.001
Security Patch : 2020-09-01
Emmc_size : 16GB
Fingerprint : xiaomi/ysl/ysl:9/PKQ1.181203.001/V12.0.2.0.PEFMIXM:user/release-keys

Reading GPT[3]
Drive [0] 60 Items
Drive [1] 0 Items
Drive [2] 0 Items

Removing FRPta...
Method :
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOk Ok

Elapsed Time : 00:00:05
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi Note 8 Pro (begonia) Bootloader Unlock With by Hydra

=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port_V1632 (COM38)
Device : 7&54f8ea&0&3
SymbolicName :??USB#VID_0E8D&PID_0003#7&54f8ea&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0

Opened handle..

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 8C48A913485BE26E0B87EAD238690AA0
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x0000000200000000 -8 GB
UFS LU0 Size: 0x0000000000400000 -4 MB
UFS LU1 Size: 0x0000000000400000 -4 MB
UFS LU2 Size: 0x0000001DCB000000 -119.172 GB
UFS CID : -'01H9HQ16AFAMMDAR
UFS UNIQID : 158e342a83c9000000000000

Reading GPT0 -UFS [0x00008000] 0 130 Items
0

Reading System Info
Vendor : Xiaomi
ID : RP1A.200720.011
SDK : 30
Release : 11
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : zh-CN
Description : begonia-user 11 RP1A.200720.011 V12.5.2.0.RGGCNXM release-keys
Miui Ver : V125
Display ID : RP1A.200720.011
Security Patch : 2021-08-01
StorageType : mtp
Userdata State : Not Encrypted

-------------------------------------
Operation : Unlock Bootloader
Processing...
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------

Verifying status after operation...
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------
Action Result : 0 Ok

Elapsed Time : 00:00:03
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Lenovo K9 Note (L38012) Edl Frp Remove With by Hydra

Brand : LENOVO Model : L38012 (K9 Note) Storage : Auto
Loader: prog_emmc_firehose_8953_Lenovo_K9.mbn
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM4)
SymbolicName :??USB#VID_05C6&PID_9008#5&1f03ab54&0&5#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 03/25/2016,2.1.2.2

Getting device info .. . ...
Serial No.: 0xE81DBAED
HW_ID : 0009A0E100400000
MSM ID : 0x0009A0E1, SDM450-Qualcomm Snapdragon 450
MODEL_ID : 0x0000
OEM_ID : 0x0040 -
PBL Ver : 00000000
PK HASH : 655c40ed0db5e799224e2b17fbef4836aacd2b63f41933c48b36f3e64eb5a59f

Firehose Loader [prog_emmc_firehose_8953_Lenovo_K9.mbn]
--------------------------------------------------
Header Type : OLD
TargetMSM : 8953
Tag : _peek
Version : 3
Code_size : 288
Signature_size : 256
fhVendor : LENOVO
HW_ID : 0009A0E100400000
Vendor :
OEM_ID : 0040
MODEL_ID : 0000
SW_ID : 0000000000000003
APP_ID :
pk_hash : 655c40ed0db5e799224e2b17fbef4836aacd2b63f41933c48b36f3e64eb5a59f
OEM_VERSION : buildslave@byws19 2018-09-19 06:53:28
IMAGE_VARIANT : JAADANAZA
QC_VERSION : BOOT.BF.3.3-00228
--------------------------------------------------

SaharaBoot... Ok
Sending ...................b Okb0
Connecting to Firehose...
Ping ... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8953
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 708347083
Firmware Version : 165
Product Name : HBG4a2
Physical titions : 3
Total Logical Blocks:
Drive [0] 61071360 [29.121 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]

Protocol : Universal
Running : Ok

Phone Information .....
Brand : Lenovo
Vendor : Lenovo
Model : Lenovo L38012
ID : OPM1.171019.019
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : austin2018-user 8.1.0 OPM1.171019.019 3.9.269_180919 release-keys
Device : austin2018
Display ID : OPM1.171019.019 dev-keys
Security Patch : 2018-08-01
Emmc_size : 16GB
Fingerprint : Lenovo/austin2018/austin2018:8.1.0/OPM1.171019.019/3.9.269_180919:user/release-keys

Reading GPT[3]
Drive [0] 52 Items
Drive [1] 0 Items
Drive [2] 0 Items

Removing FRPta...
Method : 0
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOk Ok

Elapsed Time : 00:00:03
 
Top