★★★ Post All Successfully Repaired Phones By Hydra Tool ★★★

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Huawei DUB-LX1 (Y7 2019) Remove Screen Security & Remove Frp With by Hydra
190700001271_HQTool.exe_EDL_FormatUserDataZeroWipe_11-18-2021-215250.jpeg

Brand : HUAWEI Model : DUB-LX1 (Y7 2019) Storage : Auto
Loader: 0009A0E100150065_6bc369511da9cadb_1a1074cf_HUAWEI_QUALCOMM_peek_8953.fhprg
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM76)
SymbolicName :??USB#VID_05C6&PID_9008#5&10dc9a0c&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 02/05/2018,3.0.0.0

Getting device info .. . ...
Serial No.: 0x97B71C29
HW_ID : 0009A0E100150065
MSM ID : 0x0009A0E1, SDM450-Qualcomm Snapdragon 450
MODEL_ID : 0x0065
OEM_ID : 0x0015 - HUAWEI
PBL Ver : 00000000
PK HASH : 6bc369511da9cadb3a7af61574f89db385003d6241bdd1ff573dba61bf6ae119

Firehose Loader [0009A0E100150065_6bc369511da9cadb_1a1074cf_HUAWEI_QUALCOMM_peek_8953.fhprg]
--------------------------------------------------
Header Type : OLD
TargetMSM : 8953
Tag : _peek
Version : 3
Code_size : 288
Signature_size : 256
fhVendor : QUALCOMM
HW_ID : 0009A0E100150065
Vendor : HUAWEI
OEM_ID : 0015
MODEL_ID : 0065
SW_ID : 0000000000000003
APP_ID :
pk_hash : 6bc369511da9cadb3a7af61574f89db385003d6241bdd1ff573dba61bf6ae119
OEM_VERSION : SIA1000073848
IMAGE_VARIANT : JAADANAZA
QC_VERSION : BOOT.BF.3.3.2-00019
--------------------------------------------------

SaharaBoot... Ok
Sending .............b Okb0
Connecting to Firehose...
Ping ... Ok
Configuration.......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8953
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 868843889
Firmware Version : 0
Product Name : hB8aP>
Physical titions : 3
Total Logical Blocks:
Drive [0] 61071360 [29.121 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]

Protocol : Universal
Running : Ok

Phone Information .....
Vendor : unknown
ID : OPM1.171019.011
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : generic_a53-user 8.1.0 OPM1.171019.011 eng.root.20200930.182108 test-keys
Display ID : System 8.2.0.036(0FBU)
Security Patch : 2020-09-01

Reading GPT[3]
Drive [0] 60 Items
Drive [1] 0 Items
Drive [2] 0 Items

Formatting Userdata...
Method : 0
Zero Wipe
Processing...
- Formatting Userdata [Zero Wipe] Ok Ok

Rebooting Phone.... Ok
If not rebooted, Please Power on Manually

Elapsed Time : 00:00:04
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi Note 8 2021 (biloba) Bootloader unlock done by Hydra
190700001410_HMTKTool.exe_FM_Bootloader_Unlock_Bootloader_11-18-2021-225501.jpeg

=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port (COM3)
Device : 5&27298ab&0&3
SymbolicName :??USB#VID_0E8D&PID_0003#5&27298ab&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0

Opened handle..

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 30562668A2687B5AE37C03A02AFB531D
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000001D1F000000 -116,484 GB
eMMC CID : 13014E53304A394B39102201E91AB787 - S0J9K9

Reading GPT -EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Unlock Bootloader
Processing...
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------

Verifying status after operation...
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------
Action Result : Ok

Elapsed Time : 00:00:02
 

Attachments

  • 190700001410_HMTKTool.exe_FM_Bootloader_Unlock_Bootloader_11-18-2021-225501.jpeg
    190700001410_HMTKTool.exe_FM_Bootloader_Unlock_Bootloader_11-18-2021-225501.jpeg
    194.4 KB · Views: 1

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi Note 9 (merlin) Bootloader Unlock Done with by hydra

=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : ?MediaTek USB Port_V1632 (COM4)?
Device : 5&32762a5a&0&3
SymbolicName :??USB#VID_0E8D&PID_0003#5&32762a5a&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0

Opened handle..
Handshaking... Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0707 MT6768 [6768]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : E7
SBC : 01 (True)
SLA : 02 (True)
DAA : 04 (True)
SWJTAG : 06 (True)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 20 (True)
MEMWRITE : 40 (True)
CMD_C8 : 80 (True)

Exploiting Device...
Exploit Sent..
Successfully Exploited...
Handshaking... Ok

C:Hydra ToolBackupPreloader_dumpprel.tmp
Handshaking...

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0707 MT6768 [6768]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)

MEID : 14BD4B7471F4EDC113200E1027916DBE
Stage 1.. [Size:256504]
Sending : Please wait.. Accepted

Identifying Protocol...
Protocol : New
Synchronization... SYNC
Preloader Initialization...
sing prel.tmp
Init : Accepted
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : E3928CA898924DAF3EAB8B3C182EA846
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000001D1EC00000 -116.48 GB
eMMC CID : 150100335636434D4202CB72DC014759 - 3V6CMB
Executing : ACCEPTED...

Reading GPT -EMMC [0x00008000] 130 Items

Autobackup titions
-preloader [0x00000000] 512 KB -> preloader.bin...0 Ok
-> Renaming Preloader.... preloader_merlin.bin
Creating Scatter file... C:Hydra ToolBackupAuto0707__112021111806MT6768_Android_scatter.txt
-pgpt [0x00000000] 32 KB -> pgpt.bin...0 Ok
-frp [0x05508000] 1024 KB -> frp.bin...0 Ok
-nvdata [0x0C4A2000] 64 MB -> nvdata.bin...0 Ok
-persist [0x104A2000] 48 MB -> persist.bin...0 Ok
-protect1 [0x164A2000] 8 MB -> protect1.bin...0 Ok
-protect2 [0x16CA2000] 11.367 MB -> protect2.bin...0 Ok
-nvram [0x19F80000] 64 MB -> nvram.bin...0 Ok
Done!!!
C:Hydra ToolBackupAuto0707__112021111806
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 1 E3928CA898924DAF3EAB8B3C182EA846
ERAM Size : 1 0x0000000000070000 -448 KB
IRAM Size : 1 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000001D1EC00000 -116.48 GB
eMMC CID : 150100335636434D4202CB72DC014759 - 3V6CMB

Reading GPT -EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Unlock Bootloader
Processing...
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------

Verifying status after operation...
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------
Action Result : Ok

Elapsed Time : 00:01:06
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi Y2 (ysl) Remove Frp With by Hydra

Brand : XIAOMI Model : Redmi Y2 (ysl) Storage : Auto
Loader: 000460E100000000_57158eaf1814d78f_ffd16e82_QUALCOMM_XIAOMI_peek_8953.fhprg
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM5)
SymbolicName :??USB#VID_05C6&PID_9008#5&39e6a57&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/10/2020,5.1.1.2

Getting device info .. Ok
Device MODE : Firehose
Connecting to Firehose...
Ping .. Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8953
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 1265685999
Firmware Version : 842018864
Product Name : hB8aP>
Physical titions : 3
Total Logical Blocks:
Drive [0] 61071360 [29.121 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]

Protocol : Universal
Running : Ok

Phone Information .....
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi S2
ID : PKQ1.181203.001
SDK : 28
Release : 9
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-GB
Description : ysl-user 9 PKQ1.181203.001 V12.0.2.0.PEFMIXM release-keys
Miui Ver : V12
Device : ysl
Mod_device : ysl_global
Display ID : PKQ1.181203.001
Security Patch : 2020-09-01
Emmc_size : 16GB
Fingerprint : xiaomi/ysl/ysl:9/PKQ1.181203.001/V12.0.2.0.PEFMIXM:user/release-keys

Reading GPT[3]
Drive [0] 60 Items
Drive [1] 0 Items
Drive [2] 0 Items

Removing FRPta...
Method :
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOk Ok

Elapsed Time : 00.00.04
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi 9T (lime) Edl Flashıng With by Hydra No Auth No Credit

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM29)
SymbolicName :??USB#VID_05C6&PID_9008#5&6e02f97&0&7#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 08/02/2017,2.1.2.7

Getting device info .. . ...
Serial No.: 0xC1DCDA57
HW_ID : 0014D0E100720000
MSM ID : 0x0014D0E1, SM_KAMORTA_H-
MODEL_ID : 0x0000
OEM_ID : 0x0072 - XIAOMI
PBL Ver : 00000000
PK HASH : 1bebe3863a6781db4b01086063007334de9e5ca14971c7c4f4358ec9d79cda46

Firehose Loader [0000000000720000_1bebe3863a6781db_159eb52f_XIAOMI.fhprg]
--------------------------------------------------
Header Type : New
TargetMSM :
Tag :
Version : 6
Code_size : 816
Signature_size : 256
fhVendor : XIAOMI
HW_ID : 0000000000720000
Vendor : XIAOMI
OEM_ID : 0072
MODEL_ID : 0000
SW_ID : 00000003
APP_ID : 00000000
pk_hash : 1bebe3863a6781db4b01086063007334de9e5ca14971c7c4f4358ec9d79cda4692ce5e948c6fd409408f4c919fcadfe3
OEM_VERSION : f2f760038334
IMAGE_VARIANT : KamortaPkgLAA
QC_VERSION : BOOT.XF.4.1-00187-KAMORTALAZ-2
--------------------------------------------------

SaharaBoot... Ok
Sending .................................b Okb0
Connecting to Firehose...
Ping ...................... Ok
Configuration........
Identifying Chip.... ....UFS
Ok
Chip Configuration :
MemoryName : UFS
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Nov 16 2020 - 01:25:39

*** STORAGE DEVICE INFO ***
Memory Type : UFS
Block Size in Bytes : 4096
Page Size : 4096
Manufacturer ID : 300
Serial Number : 1129467726
Firmware Version : 605
Product Name : MT128GASAO4U21 0605
Physical titions : 6
Total Logical Blocks:
Drive [0] 30119936 [114.898 GB]
Drive [1] 2048 [8 MB]
Drive [2] 2048 [8 MB]
Drive [3] 32768 [128 MB]
Drive [4] 1048576 [4 GB]
Drive [5] 32768 [128 MB]

Protocol : Universal
Running : Ok

Failed to read information from phone.


----------------------------
Flashing Selected titions....0
- vbmeta_system (0)b [vbmeta_system.img] b0 Ok0
- metadata (0)b [metadata.img] b0 Ok0
- persist (0)b [persist.img] b0 Ok0
- recovery (0)b [recovery.img] b0 Ok0
- super (0)b [super.img] b0 Ok0
- userdata (0)b [userdata.img] b0 Ok0
- PrimaryGPT (0)b [gpt_main0.bin] b0 Ok0
- xbl_config (1)b [xbl_config.elf] b0 Ok0
- xbl (1)b [xbl.elf] b0 Ok0
- PrimaryGPT (1)b [gpt_main1.bin] b0 Ok0
- xbl_configbak (2)b [xbl_config.elf] b0 Ok0
- xblbak (2)b [xbl.elf] b0 Ok0
- PrimaryGPT (2)b [gpt_main2.bin] b0 Ok0
- PrimaryGPT (3)b [gpt_main3.bin] b0 Ok0
- multiimgoem (4)b [multi_image.mbn] b0 Ok0
- vbmeta (4)b [vbmeta.img] b0 Ok0
- qupfw (4)b [qupv3fw.elf] b0 Ok0
- devcfg (4)b [devcfg.mbn] b0 Ok0
- storsec (4)b [storsec.mbn] b0 Ok0
- hyp (4)b [hyp.mbn] b0 Ok0
- hypbak (4)b [hyp.mbn] b0 Ok0
- cmnlib (4)b [cmnlib.mbn] b0 Ok0
- cmnlibbak (4)b [cmnlib.mbn] b0 Ok0
- cmnlib64 (4)b [cmnlib64.mbn] b0 Ok0
- cmnlib64bak (4)b [cmnlib64.mbn] b0 Ok0
- keymaster (4)b [km4.mbn] b0 Ok0
- keymasterbak (4)b [km4.mbn] b0 Ok0
- bluetooth (4)b [BTFM.bin] b0 Ok0
- abl (4)b [abl.elf] b0 Ok0
- ablbak (4)b [abl.elf] b0 Ok0
- imagefv (4)b [imagefv.elf] b0 Ok0
- imagefvbak (4)b [imagefv.elf] b0 Ok0
- uefisecapp (4)b [uefi_sec.mbn] b0 Ok0
- uefisecappbak (4)b [uefi_sec.mbn] b0 Ok0
- featenabler (4)b [featenabler.mbn] b0 Ok0
- featenablerbak (4)b [featenabler.mbn] b0 Ok0
- misc (4)b [misc.img] b0 Ok0
- rpm (4)b [rpm.mbn] b0 Ok0
- rpmbak (4)b [rpm.mbn] b0 Ok0
- tz (4)b [tz.mbn] b0 Ok0
- tzbak (4)b [tz.mbn] b0 Ok0
- logfs (4)b [logfs_ufs_8mb.bin] b0 Ok0
- dtbo (4)b [dtbo.img] b0 Ok0
- dsp (4)b [dspso.bin] b0 Ok0
- boot (4)b [boot.img] b0 Ok0
- modem (4)b [NON-HLOS.bin] b0 Ok0
- cache (4)b [cache.img] b0 Ok0
- cust (4)b [cust.img] b0 Ok0
- PrimaryGPT (4)b [gpt_main4.bin] b0 Ok0
- PrimaryGPT (5)b [gpt_main5.bin] b0 Ok
0
Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-6.] OK
0 [NUM_DISK_SECTORS-6.] OK
0 [NUM_DISK_SECTORS-6.] OK
0 [NUM_DISK_SECTORS-6.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-5.] OK
0 [CRC32(2,4096)] OK
0 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
0 [0] OK
0 [CRC32(1,92)] OK
0 [0] OK
0 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
1 [NUM_DISK_SECTORS-6.] OK
1 [NUM_DISK_SECTORS-6.] OK
1 [NUM_DISK_SECTORS-6.] OK
1 [NUM_DISK_SECTORS-6.] OK
1 [NUM_DISK_SECTORS-1.] OK
1 [NUM_DISK_SECTORS-1.] OK
1 [NUM_DISK_SECTORS-5.] OK
1 [CRC32(2,4096)] OK
1 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
1 [0] OK
1 [CRC32(1,92)] OK
1 [0] OK
1 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
2 [NUM_DISK_SECTORS-6.] OK
2 [NUM_DISK_SECTORS-6.] OK
2 [NUM_DISK_SECTORS-6.] OK
2 [NUM_DISK_SECTORS-6.] OK
2 [NUM_DISK_SECTORS-1.] OK
2 [NUM_DISK_SECTORS-1.] OK
2 [NUM_DISK_SECTORS-5.] OK
2 [CRC32(2,4096)] OK
2 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
2 [0] OK
2 [CRC32(1,92)] OK
2 [0] OK
2 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
3 [NUM_DISK_SECTORS-6.] OK
3 [NUM_DISK_SECTORS-6.] OK
3 [NUM_DISK_SECTORS-6.] OK
3 [NUM_DISK_SECTORS-6.] OK
3 [NUM_DISK_SECTORS-1.] OK
3 [NUM_DISK_SECTORS-1.] OK
3 [NUM_DISK_SECTORS-5.] OK
3 [CRC32(2,4096)] OK
3 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
3 [0] OK
3 [CRC32(1,92)] OK
3 [0] OK
3 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
4 [NUM_DISK_SECTORS-6.] OK
4 [NUM_DISK_SECTORS-6.] OK
4 [NUM_DISK_SECTORS-6.] OK
4 [NUM_DISK_SECTORS-6.] OK
4 [NUM_DISK_SECTORS-1.] OK
4 [NUM_DISK_SECTORS-1.] OK
4 [NUM_DISK_SECTORS-5.] OK
4 [CRC32(2,8192)] OK
4 [CRC32(NUM_DISK_SECTORS-5.,8192)] OK
4 [0] OK
4 [CRC32(1,92)] OK
4 [0] OK
4 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
5 [NUM_DISK_SECTORS-6.] OK
5 [NUM_DISK_SECTORS-6.] OK
5 [NUM_DISK_SECTORS-6.] OK
5 [NUM_DISK_SECTORS-6.] OK
5 [NUM_DISK_SECTORS-1.] OK
5 [NUM_DISK_SECTORS-1.] OK
5 [NUM_DISK_SECTORS-5.] OK
5 [CRC32(2,4096)] OK
5 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
5 [0] OK
5 [CRC32(1,92)] OK
5 [0] OK
5 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 1
Set bootable storage drive 1 Ok

Rebooting Phone.... Ok

Elapsed Time : 00:06:03
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi Note 6 Pro (tulip) Edl Frp Remove with by Hydra

Brand : XIAOMI Model : Redmi Note 6 Pro (tulip) Storage : Auto
Loader: 0008C0E100010000_a7b8b82545a98eca_28f4dc3c_GENERIC_XIAOMI_auth.fhprg
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM7)
SymbolicName :??USB#VID_05C6&PID_9008#6&22dec234&1&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 05/29/2019,2.1.3.7

Getting device info .. . ...
Serial No.: 0xAD400B6B
HW_ID : 000CC0E100000000
MSM ID : 0x000CC0E1,
MODEL_ID : 0x0000
OEM_ID : 0x0000 - QUALCOMM
PBL Ver : 00000000
PK HASH : a7b8b82545a98eca23d6e9105fb464568d1b5828264903441bdef0cd57e3c370

Firehose Loader [0008C0E100010000_a7b8b82545a98eca_28f4dc3c_GENERIC_XIAOMI_auth.fhprg]
--------------------------------------------------
Header Type : OLD
TargetMSM :
Tag : _auth
Version : 5
Code_size : 416
Signature_size : 256
fhVendor : XIAOMI
HW_ID : 3006000000010000
Vendor : GENERIC
OEM_ID : 0001
MODEL_ID : 0000
SW_ID : 000000000000000B
APP_ID :
pk_hash : a7b8b82545a98eca23d6e9105fb464568d1b5828264903441bdef0cd57e3c370
OEM_VERSION : c3-bsp-builder-job001.bj
IMAGE_VARIANT : Sdm660LA
QC_VERSION : BOOT.XF.1.4-00255-S660LZB-1
--------------------------------------------------

SaharaBoot... Ok
Sending ...............................b Okb0
Connecting to Firehose...
Ping ......... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : MSM8996
Version : 1
DateTime : Aug 2 2018 - 22:27:53

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 3689466904
Firmware Version : 2
Product Name : 3H6CAB
Physical titions : 4
Total Logical Blocks:
Drive [0] 122142720 [58.242 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]
Drive [3] 32768 [16 MB

Protocol : Universal
Running : Ok

Phone Information .....
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi Note 6 Pro
ID : PKQ1.180904.001
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : tulip-user 9 PKQ1.180904.001 V12.0.1.0.PEKMIXM release-keys
Miui Ver : V12
Device : tulip
Mod_device : tulip_global
Display ID : PKQ1.180904.001
Security Patch : 2020-11-05
Fingerprint : xiaomi/tulip/tulip:9/PKQ1.180904.001/V12.0.1.0.PEKMIXM:user/release-keys

Reading GPT[4]
Drive [0] 64 Items
Drive [1] 0 Items
Drive [2] 0 Items
Drive [3]

Removing FRPta...
Method : 0
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOk Ok

Rebooting Phone.... Ok
If not rebooted, Please Power on Manually

Elapsed Time : 00:00:04
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Tecno A6 Format Userdata & Remove Frp one click With by Hydra

=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port (COM30)
Device : 5&11976120&0&2
SymbolicName :??USB#VID_0E8D&PID_0003#5&11976120&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2016,3.2

Opened handle..

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 573356C4CE45431717575EF43982682B
ERAM Size : 0x0000000000038000 -224 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 15010044503644414202183CDC1557A5 - DP6DAB

Reading GPT -EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Safe Format Master Clear 1
Processing...
Safeformat Master Clear 1...
Action Result : Ok

Elapsed Time : 00:00:02
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Oppo F1s Plus Read Screen Security With by Hydra

=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port_V1632 (COM14)
Device : 6&4346150&0&8
SymbolicName :??USB#VID_0E8D&PID_0003#6&4346150&0&8#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0

Opened handle..
Handshaking... Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0326 MT6750T [6755]
hw subcode : 8A00
hw version : CB00
sw version : 0001
Target config : 01
SBC : 01 (True)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)

Exploiting Device...
Exploit Sent..
Successfully Exploited...
Handshaking... Ok

--- ENABLE AUTO PREL DUMP ----
Found
C:Hydra ToolBackupPreloader_dumpprel.tmp
------------------------------

Handshaking...

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0326 MT6750T [6755]
hw subcode : 8A00
hw version : CB00
sw version : 0001
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)

MEID : D8135C47F8157DEAD4D7E20E52DC726C
Stage 1.. [Size:219288]
Sending : Please wait.. Accepted

Identifying Protocol...
Protocol : New
Synchronization... SYNC
Preloader Initialization...
sing prel.tmp
Init : Accepted
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : D4E6C40B62B9D26F1A9196F85F0078CA
ERAM Size : 0x0000000000038000 -224 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 90014A484247346132A5281AA8B4749D - HBG4a2
Executing : ACCEPTED...

Reading GPT -EMMC [0x00008000] 130 Items

Reading System Info
Brand : OPPO
Vendor : OPPO
Model : OPPO F1s
ID : LMY47I
SDK : 22
Release : 5.1
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Description : full_oppo6750_15131-user 5.1 LMY47I 1482847378 dev-keys
Device : A59
Board : full_oppo6750_15131
Display ID : A1601_11_A.16_161227
Security Patch : 2016-09-05
Platform : mt6750
FRPPST : /dev/block/platform/mtk-msdc.0/by-name/frp
Fingerprint : OPPO/A59/A59:5.1/LMY47I/1474447292:user/release-keys
StorageType : mtp,mass_storage
Userdata State : Not Encrypted

Autobackup titions
-preloader [0x00000000] 512 KB -> preloader.bin...0 Ok
-> Renaming Preloader.... preloader_oppo6750_15131.bin
Creating Scatter file... C:Hydra ToolBackupAuto0326_OPPO_A59_A59_5.1_LMY47I_1474447292_112221144102MT6750T_Android_scatter.txt
-pgpt [0x00000000] 32 KB -> pgpt.bin...0 Ok
-frp [0x03F88000] 1024 KB -> frp.bin...0 Ok
-nvdata [0x04088000] 32 MB -> nvdata.bin...0 Ok
-protect1 [0x08088000] 8 MB -> protect1.bin...0 Ok
-protect2 [0x08888000] 15.469 MB -> protect2.bin...0 Ok
-nvram [0x0CF00000] 5 MB -> nvram.bin...0 Ok
Done!!!
C:Hydra ToolBackupAuto0326_OPPO_A59_A59_5.1_LMY47I_1474447292_112221144102
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 1 D4E6C40B62B9D26F1A9196F85F0078CA
ERAM Size : 1 0x0000000000038000 -224 KB
IRAM Size : 1 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 90014A484247346132A5281AA8B4749D - HBG4a2

Reading GPT -EMMC [0x00008000] 130 Items


Reading System Info
Brand : OPPO
Vendor : OPPO
Model : OPPO F1s
ID : LMY47I
SDK : 22
Release : 5.1
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Description : full_oppo6750_15131-user 5.1 LMY47I 1482847378 dev-keys
Device : A59
Board : full_oppo6750_15131
Display ID : A1601_11_A.16_161227
Security Patch : 2016-09-05
Platform : mt6750
FRPPST : /dev/block/platform/mtk-msdc.0/by-name/frp
Fingerprint : OPPO/A59/A59:5.1/LMY47I/1474447292:user/release-keys
StorageType : mtp,mass_storage
Userdata State : Not Encrypted

-------------------------------------
Operation : Read Pattern
Processing...
Searching PatternKey : .0 Found
Gesture Data : E31BC75265FBBBBB3330323611520B980C89F361
Bruteforcing pattern hash..Please wait for few seconds
Pattern Code : 47869
1 2 3
4 5 6
7 8 9
Action Result : Ok

Elapsed Time : 00:03:24
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi Note 7 Pro (violet) Edl Flashıng done by Hydra No Auth No Credit

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM19)
SymbolicName :??USB#VID_05C6&PID_9008#6&22dec234&1&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 05/29/2019,2.1.3.7

Getting device info .. . ...
Serial No.: 0x802090CC
HW_ID : 000950E100720000
MSM ID : 0x000950E1, SM6150-Qualcomm Snapdragon 675
MODEL_ID : 0x0000
OEM_ID : 0x0072 - XIAOMI
PBL Ver : 00000000
PK HASH : 1bebe3863a6781db4b01086063007334de9e5ca14971c7c4f4358ec9d79cda46

Firehose Loader [000950E100720000_1bebe3863a6781db_6fbee6d5_XIAOMI_auth.fhprg]
--------------------------------------------------
Header Type : New
TargetMSM :
Tag : _auth
Version : 6
Code_size : 816
Signature_size : 256
fhVendor : XIAOMI
HW_ID : 000950E100720000
Vendor : XIAOMI
OEM_ID : 0072
MODEL_ID : 0000
SW_ID : 00000003
APP_ID : 00000000
pk_hash : 1bebe3863a6781db4b01086063007334de9e5ca14971c7c4f4358ec9d79cda4692ce5e948c6fd409408f4c919fcadfe3
OEM_VERSION : c3-miui-ota-bd121.bj
IMAGE_VARIANT : SDM6150LA
QC_VERSION : BOOT.XF.3.1-00208-SM6150LZB-1
--------------------------------------------------

SaharaBoot... Ok
Sending ...................................b Okb0
Connecting to Firehose...
Ping ..................... Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[-HE2PNG8YA9Ll0Huvo46hBvRfPo]
Signature @256bytes Authentication.... Accepted ........
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Jul 19 2019 - 01:12:10

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 3426929346
Firmware Version : 8
Product Name : DH6DAB
Physical titions : 4
Total Logical Blocks:
Drive [0] 122142720 [58.242 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]
Drive [3] 32768 [16 MB]

Protocol : Universal
Running : Ok

Phone Information ......
Brand : xiaomi
Vendor : Xiaomi
Model : violet
ID : PKQ1.181203.001
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : violet-userdebug 9 PKQ1.181203.001 288 test-keys
Device : violet
Display ID : violet-userdebug 9 PKQ1.181203.001 288 test-keys
Security Patch : 2018-10-05
Fingerprint : xiaomi/violet/violet:9/PKQ1.181203.001/288:userdebug/test-keys


----------------------------
Flashing Selected titions....
- secdata (0)b [sec.elf] b0 Ok
- multiimgoem (0)b [multi_image.mbn] b0 Ok
- vbmeta (0)b [vbmeta.img] b0 Ok
- qupfw (0)b [qupv3fw.elf] b0 Ok
- xbl_config (0)b [xbl_config.elf] b0 Ok
- storsec (0)b [storsec.mbn] b0 Ok
- storsecbak (0)b [storsec.mbn] b0 Ok
- aop (0)b [aop.mbn] b0 Ok
- aopbak (0)b [aop.mbn] b0 Ok
- hyp (0)b [hyp.mbn] b0 Ok
- hypbak (0)b [hyp.mbn] b0 Ok
- cmnlib (0)b [cmnlib.mbn] b0 Ok
- cmnlibbak (0)b [cmnlib.mbn] b0 Ok
- cmnlib64 (0)b [cmnlib64.mbn] b0 Ok
- cmnlib64bak (0)b [cmnlib64.mbn] b0 Ok
- keymaster (0)b [km4.mbn] b0 Ok
- keymasterbak (0)b [km4.mbn] b0 Ok
- bluetooth (0)b [BTFM.bin] b0 Ok
- devcfg (0)b [devcfg.mbn] b0 Ok
- devcfgbak (0)b [devcfg.mbn] b0 Ok
- abl (0)b [abl.elf] b0 Ok
- ablbak (0)b [abl.elf] b0 Ok
- imagefv (0)b [imagefv.elf] b0 Ok
- uefisecapp (0)b [uefi_sec.mbn] b0 Ok
- uefisecappbak (0)b [uefi_sec.mbn] b0 Ok
- misc (0)b [misc.img] b0 Ok
- xbl (0)b [xbl.elf] b0 Ok
- xblbak (0)b [xbl.elf] b0 Ok
- tz (0)b [tz.mbn] b0 Ok
- tzbak (0)b [tz.mbn] b0 Ok
- logfs (0)b [logfs_ufs_8mb.bin] b0 Ok
- dtbo (0)b [dtbo.img] b0 Ok
- fsg (0)b [fs_image.tar.gz.mbn.img] b0 Ok
- modemst1 (0)b [dummy.bin] b0 Ok
- modemst2 (0)b [dummy.bin] b0 Ok
- devinfo (0)b [devinfo.img] b0 Ok
- dsp (0)b [dspso.bin] b0 Ok
- splash (0)b [splash.img] b0 Ok
- persist (0)b [persist.img] b0 Ok
- persistbak (0)b [persist.img] b0 Ok
- boot (0)b [boot.img] b0 Ok
- recovery (0)b [recovery.img] b0 Ok
- cache (0)b [cache_1.img] b0 Ok
- cache (0)b [cache_2.img] b0 Ok
- cache (0)b [cache_3.img] b0 Ok
- cache (0)b [cache_4.img] b0 Ok
- modem (0)b [NON-HLOS.bin] b0 Ok
- system (0)b [system_1.img] b0 Ok
- system (0)b [system_2.img] b0 Ok
- system (0)b [system_3.img] b0 Ok
- system (0)b [system_4.img] b0 Ok
- system (0)b [system_5.img] b0 Ok
- system (0)b [system_6.img] b0 Ok
- system (0)b [system_7.img] b0 Ok
- system (0)b [system_8.img] b0 Ok
- system (0)b [system_9.img] b0 Ok
- system (0)b [system_10.img] b0 Ok
- system (0)b [system_11.img] b0 Ok
- system (0)b [system_12.img] b0 Ok
- system (0)b [system_13.img] b0 Ok
- system (0)b [system_14.img] b0 Ok
- system (0)b [system_15.img] b0 Ok
- vendor (0)b [vendor_1.img] b0 Ok
- vendor (0)b [vendor_2.img] b0 Ok
- vendor (0)b [vendor_3.img] b0 Ok
- vendor (0)b [vendor_4.img] b0 Ok
- vendor (0)b [vendor_5.img] b0 Ok
- vendor (0)b [vendor_6.img] b0 Ok
- vendor (0)b [vendor_7.img] b0 Ok
- vendor (0)b [vendor_8.img] b0 Ok
- vendor (0)b [vendor_9.img] b0 Ok
- vendor (0)b [vendor_10.img] b0 Ok
- vendor (0)b [vendor_11.img] b0 Ok
- userdata (0)b [userdata_1.img] b0 Ok
- userdata (0)b [userdata_2.img] b0 Ok
- userdata (0)b [userdata_3.img] b0 Ok
- userdata (0)b [userdata_4.img] b0 Ok
- userdata (0)b [userdata_5.img] b0 Ok
- userdata (0)b [userdata_6.img] b0 Ok
- userdata (0)b [userdata_7.img] b0 Ok
- userdata (0)b [userdata_8.img] b0 Ok
- userdata (0)b [userdata_9.img] b0 Ok
- userdata (0)b [userdata_10.img] b0 Ok
- userdata (0)b [userdata_11.img] b0 Ok
- userdata (0)b [userdata_12.img] b0 Ok
- PrimaryGPT (0)b [gpt_main0.bin] b0 Ok

Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-33.] OK
0 [CRC32(2,11264)] OK
0 [CRC32(NUM_DISK_SECTORS-33.,11264)] OK
0 [0] OK
0 [CRC32(1,92)] OK
0 [0] OK
0 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
----------------------------
Done!

Rebooting Phone.... Ok

Elapsed Time : 00:01:35
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Vivo V9 Pro Remove Frp & Factory Reset done with by Hydra

Brand : VIVO Model : V9 Pro (PD1730DF) Storage : Auto
Loader: 000460E100000000_60ba997fef6da9f0_3da38e38_QUALCOMM_VIVO_wut_peek_8953.fhprg
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : HS-USB Diagnostics 9008 (COM35)
SymbolicName :??USB#VID_05C6&PID_9008#6&1c2dbb3f&0&7#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/20/2017,2.1.2.2

Getting device info .. Ok
Device MODE : Firehose
Connecting to Firehose...
Ping .. Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8953
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 745398320
Firmware Version : 21
Product Name : RH64AB
Physical titions : 3
Total Logical Blocks:
Drive [0] 122142720 [58.242 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]

Protocol : Universal
Running : Ok

Phone Information ......
Brand : vivo
Vendor : vivo
Model : vivo 1723
ID : PKQ1.190118.001
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : msm8953_64-user 9 PKQ1.190118.001 compiler05171625 release-keys
Device : PD1730F_EX
Display ID : PKQ1.190118.001 release-keys
Security Patch : 2021-05-01
Emmc_size : 16GB
Platform : =QCOM8953
Fingerprint : vivo/1723/1723:9/PKQ1.190118.001/compiler05171625:user/release-keys

Reading GPT[3]
Drive [0] 56 Items
Drive [1] 0 Items
Drive [2] 0 Items

Removing FRPta...
Method :
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] 0 **WARNING Unauthorized tag '' 1 <?xml version="1.0" encoding="UTF-8" ?><data><response value="NAK" /></data>Failed
- Removing FRP [Erase Safety Tag] OkOk Ok

Elapsed Time : 00:00:07
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi 9A (dandelion) Bootloader Unlock With by Hydra

=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port_V1632 (COM43)
Device : 6&6f0c48d&0&4
SymbolicName :??USB#VID_0E8D&PID_0003#6&6f0c48d&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0

Opened handle..
Handshaking... Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0766 MT6765 [6765]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : E7
SBC : 01 (True)
SLA : 02 (True)
DAA : 04 (True)
SWJTAG : 06 (True)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 20 (True)
MEMWRITE : 40 (True)
CMD_C8 : 80 (True)

Exploiting Device...
Exploit Sent..
Successfully Exploited...
Handshaking... Ok

--- ENABLE AUTO PREL DUMP ----
Found
C:UsersadminDesktopHydraTool_Fullpackage_05-06-2021BackupPreloader_dumpprel.tmp
------------------------------

Handshaking...

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0766 MT6765 [6765]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)

MEID : 9D67B4A0C3EB77D2FC43FF3582687243
Stage 1.. [Size:216440]
Sending : Please wait.. Accepted

Identifying Protocol...
Protocol : New
Synchronization... SYNC
Preloader Initialization...
sing prel.tmp
Init : Accepted
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 5BCA0A03037609A457FD30DE6F1DBACD
ERAM Size : 0x0000000000038000 -224 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 150100434A544434520487084C5CC7CB - CJTD4R
Executing : ACCEPTED...

Reading GPT -EMMC [0x00008000] 130 Items

Autobackup titions
-preloader [0x00000000] 512 KB -> preloader.bin...0 Ok
-> Renaming Preloader.... preloader_k62v1_64_bsp.bin
Creating Scatter file... C:UsersadminDesktopHydraTool_Fullpackage_05-06-2021BackupAuto0766__112321121345MT6765_Android_scatter.txt
-pgpt [0x00000000] 32 KB -> pgpt.bin...0 Ok
-frp [0x3BD88000] 1024 KB -> frp.bin...0 Ok
-nvdata [0x3DE88000] 64 MB -> nvdata.bin...0 Ok
-protect1 [0x45522000] 8 MB -> protect1.bin...0 Ok
-protect2 [0x45D22000] 10.867 MB -> protect2.bin...0 Ok
-persist [0x47000000] 48 MB -> persist.bin...0 Ok
-nvram [0x52E80000] 64 MB -> nvram.bin...0 Ok
Done!!!
C:UsersadminDesktopHydraTool_Fullpackage_05-06-2021BackupAuto0766__112321121345
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 1 5BCA0A03037609A457FD30DE6F1DBACD
ERAM Size : 1 0x0000000000038000 -224 KB
IRAM Size : 1 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 150100434A544434520487084C5CC7CB - CJTD4R

Reading GPT -EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Unlock Bootloader
Processing...
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------

Verifying status after operation...
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------
Action Result : Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:53
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi Note 8 (ginkgo) Unlock Bootloader one click with by Hydra

Brand : XIAOMI Model : Redmi Note 8 (ginkgo) Storage : Auto
Loader: 0010A0E100720000_1bebe3863a6781db_76196dc8_XIAOMI.fhprg
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM3)
SymbolicName :??USB#VID_05C6&PID_9008#5&1e7d8db7&0&9#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 03/19/2014,2.1.1.2

Getting device info .. Ok
Device MODE : Firehose
Connecting to Firehose...
Ping ..................... Ok
Configuration.........
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Jul 3 2019 - 22:23:56

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 3770796679
Firmware Version : 3
Product Name : DP6DAB
Physical titions : 4
Total Logical Blocks:
Drive [0] 122142720 [58.242 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]
Drive [3] 32768 [16 MB]

Protocol : Universal
Running : Ok
Reading GPT[4]
Drive [0] 88 Items
Drive [1] 0 Items
Drive [2] 0 Items
Drive [3]


Phone Information ......
Vendor : Xiaomi
ID : QKQ1.200114.002
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : zh-CN
Miui Ver : V12
Security Patch : 2020-11-01

Processing Unlock - Universal - Auto....
Action Result : Ok

Elapsed Time : 00:00:04
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi 4A (Rolex) Edl Frp Remove done by Hydra

Brand : XIAOMI Model : Redmi 4A (Rolex) Storage : Auto
Loader: mi_1_8.mbn
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM3)
SymbolicName :??USB#VID_05C6&PID_9008#5&12cbda9c&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 08/31/2015,2.1.2.0

Getting device info .. Ok
Device MODE : Firehose
Connecting to Firehose...
Ping .. Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8917
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 1152870596
Firmware Version : 7
Product Name : QE13MB
Physical titions : 3
Total Logical Blocks:
Drive [0] 30535680 [14.561 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]

Protocol : Universal
Running : Ok

Phone Information .....
Brand : Xiaomi
Vendor : Xiaomi
Model : Redmi 4A
ID : N2G47H
SDK : 25
Release : 7.1.2
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : rolex-user 7.1.2 N2G47H V9.2.6.0.NCCMIEK release-keys
Miui Ver : V9
Device : rolex
Mod_device : rolex_global
Board : QC_Reference_Phone
Display ID : N2G47H
Security Patch : 2018-01-01
Emmc_size : 16GB
Platform : msm8937
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : Xiaomi/rolex/rolex:7.1.2/N2G47H/V9.2.6.0.NCCMIEK:user/release-keys

Reading GPT[3]
Drive [0] 52 Items
Drive [1] 0 Items
Drive [2] 0 Items

Removing FRPta...
Method :
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOk Ok

Rebooting Phone.... Ok
If not rebooted, Please Power on Manually

Elapsed Time : 00:00:04
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi Note 8 Pro (begonia) Format Userdata & Frp remove one click by Hydra

=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port_V1632 (COM10)
Device : 6&192cd50c&0&9
SymbolicName :??USB#VID_0E8D&PID_0003#6&192cd50c&0&9#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0

Opened handle..
Handshaking... Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0813 MT6785 [6785]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : E7
SBC : 01 (True)
SLA : 02 (True)
DAA : 04 (True)
SWJTAG : 06 (True)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 20 (True)
MEMWRITE : 40 (True)
CMD_C8 : 80 (True)

Exploiting Device...
Exploit Sent..
Successfully Exploited...
Handshaking... Ok

--- ENABLE AUTO PREL DUMP ----
Found
D:Mobile ToolHydraTool 08-01-2021Archive-65b601-08-2021HydraTool_Fullpackage_11-13-2021BackupPreloader_dumpprel.tmp
------------------------------

Handshaking...

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0813 MT6785 [6785]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)

MEID : 4903280847EBF224BDEA1D8E5DB67D05
Stage 1.. [Size:234968]
Sending : Please wait.. Accepted

Identifying Protocol...
Protocol : New
Synchronization... SYNC
Preloader Initialization...
sing prel.tmp
Init : Accepted
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 4C8B9DEC88EBF73BBE6CA03D74CA5
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x0000000180000000 -6 GB
UFS LU0 Size: 0x0000000000400000 -4 MB
UFS LU1 Size: 0x0000000000400000 -4 MB
UFS LU2 Size: 0x0000001DCB000000 -119.172 GB
UFS CID : ,'01MT128GASAO4U21
UFS UNIQID : 1699deb1b2eac9102000000000000000
Executing : ACCEPTED...

Reading GPT0 -UFS [0x00008000] 0 130 Items

Reading System Info
Vendor : Xiaomi
ID : RP1A.200720.011
SDK : 30
Release : 11
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : begonia-user 11 RP1A.200720.011 V12.5.1.0.RGGMIXM release-keys
Miui Ver : V125
Mod_device : begonia_global
Display ID : RP1A.200720.011
Security Patch : 2021-06-01
StorageType : mtp
Userdata State : Not Encrypted
0
Autobackup titions
-preloader [0x00000000] 512 KB -> preloader.bin... Ok0
-> Renaming Preloader.... preloader_begonia.bin0
Creating Scatter file... D:Mobile ToolHydraTool 08-01-2021Archive-65b601-08-2021HydraTool_Fullpackage_11-13-2021BackupAuto0813__112421093451MT6785_Android_scatter.txt
-pgpt [0x00000000] 32 KB -> pgpt.bin... Ok
-frp [0x05888000] 1024 KB -> frp.bin... Ok
-nvdata [0x08188000] 64 MB -> nvdata.bin... Ok
-persist [0x0E188000] 70.469 MB -> persist.bin... Ok
-protect1 [0x12800000] 8 MB -> protect1.bin... Ok
-protect2 [0x13000000] 8 MB -> protect2.bin... Ok
-nvram [0x17580000] 64 MB -> nvram.bin... Ok
Done!!!0
D:Mobile ToolHydraTool 08-01-2021Archive-65b601-08-2021HydraTool_Fullpackage_11-13-2021BackupAuto0813__112421093451
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 1 4C8B9DEC88EBF73BBE6CA03D74CA5
ERAM Size : 1 0x0000000000080000 -512 KB
IRAM Size : 1 0x0000000180000000 -6 GB
UFS LU0 Size: 0x0000000000400000 -4 MB
UFS LU1 Size: 0x0000000000400000 -4 MB
UFS LU2 Size: 0x0000001DCB000000 -119.172 GB
UFS CID : ,'01MT128GASAO4U21
UFS UNIQID : 1699deb1b2eac9102000000000000000

Reading GPT0 -UFS [0x00008000] 0 130 Items
0

Reading System Info
Vendor : Xiaomi
ID : RP1A.200720.011
SDK : 30
Release : 11
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : begonia-user 11 RP1A.200720.011 V12.5.1.0.RGGMIXM release-keys
Miui Ver : V125
Mod_device : begonia_global
Display ID : RP1A.200720.011
Security Patch : 2021-06-01
StorageType : mtp
Userdata State : Not Encrypted

-------------------------------------
Operation : Erase Userdata
Processing...
Formatting Userdata...
Action Result : 0 Ok

Rebooting Device 0 [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:01:11
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
SM-125F (A12) Unlock Bootloader done with by Hydra

=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port (COM9)
Device : 6&cc7a5fb&0&3
SymbolicName :??USB#VID_0E8D&PID_0003#6&cc7a5fb&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2016,3.2

Opened handle..

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 6D6057E16B556CD1B661FDB49B0F9F5C
ERAM Size : 0x0000000000038000 -224 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 15010044503644414200B2D668B848B7 - DP6DAB

Reading GPT -EMMC [0x00008000] 56 Items


-------------------------------------
Operation : Unlock Bootloader
Processing...
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------

Verifying status after operation...
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------
Action Result : Ok

Elapsed Time : 00:00:03
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi Note 5 Pro (Whyred) Edl Frp Remove Remove With By Hydra

Brand : XIAOMI Model : Redmi Note 5 Pro (Whyred) Storage : Auto
Loader: 0008C0E100010000_a7b8b82545a98eca_28f4dc3c_GENERIC_XIAOMI_auth.fhprg
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM343)
SymbolicName :??USB#VID_05C6&PID_9008#6&e7c094f&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 08/02/2017,2.1.2.7

Getting device info .. Ok
Device MODE : Firehose
Connecting to Firehose...
Ping ...... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : MSM8996
Version : 1
DateTime : Aug 2 2018 - 22:27:53

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 147884037
Firmware Version : 162
Product Name : HCG8a4
Physical titions : 4
Total Logical Blocks:
Drive [0] 122142720 [58,242 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]
Drive [3] 8192 [4 MB]

Protocol : Universal
Running : Ok

Phone Information .....
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi Note 5
ID : OPM1.171019.011
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : whyred-user 8.1.0 OPM1.171019.011 V9.5.19.0.OEIMIFA release-keys
Miui Ver : V9
Device : whyred
Mod_device : whyred_global
Display ID : OPM1.171019.011
Security Patch : 2018-06-01
Fingerprint : xiaomi/whyred/whyred:8.1.0/OPM1.171019.011/V9.5.19.0.OEIMIFA:user/release-keys

Reading GPT[4]
Drive [0] 64 Items
Drive [1] 0 Items
Drive [2] 0 Items
Drive [3]

Removing FRPta...
Method :
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOk Ok

Elapsed Time : 00:00:05
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Lenovo TB2-X30L (Tab 2 A10-30) Unlock Bootlaoder With by Hydra

Brand : LENOVO Model : TB2-X30L (Tab 2 A10-30) Storage : Auto
Loader: 8909_7e4131af_peek.fhprg
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM152)
SymbolicName :??USB#VID_05C6&PID_9008#7&36fdc621&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 02/05/2018,3.0.0.0

Getting device info . . ...
Serial No.: 0x04531559
HW_ID : 009600E100000000
MSM ID : 0x009600E1, MSM8909-Qualcomm Snapdragon 210
MODEL_ID : 0x0000
OEM_ID : 0x0000 - QUALCOMM
PBL Ver : 00000000
PK HASH : cc3153a80293939b90d02d3bf8b23e0292e452fef662c74998421adad42a380f

Firehose Loader [8909_7e4131af_peek.fhprg]
--------------------------------------------------
Header Type : OLD
TargetMSM : 8909
Tag : _peek
Version : 3
Code_size : 288
Signature_size : 0
fhVendor :
HW_ID :
Vendor :
OEM_ID :
MODEL_ID :
SW_ID :
APP_ID :
pk_hash :
OEM_VERSION :
IMAGE_VARIANT :
QC_VERSION :
--------------------------------------------------

SaharaBoot... Ok
Sending ..............b Okb0
Connecting to Firehose...
Ping ... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8909
Version : 1


Protocol : Universal
Running : Ok
Reading GPT[3]
Drive [0] 32 Items
Drive [1] 0 Items
Drive [2] 0 Items


Phone Information .....
Brand : Lenovo
Vendor : LENOVO
Model : Lenovo TB2-X30L
ID : LenovoTB2-X30L
SDK : 22
Release : 5.1.1
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Description : msm8909-user 5.1.1 LenovoTB2-X30L TB2-X30L_S000031_160720_ROW release-keys
Device : TB2-X30L
Board : TB2-X30L
Display ID : TB2-X30L_S000031_160720_ROW
Security Patch : 2016-07-01
Platform : msm8909
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : Lenovo/TB2-X30L/TB2-X30L:5.1.1/LenovoTB2-X30L/TB2-X30L_S000031_160720_ROW:user/release-keys

Processing Unlock - Universal - Auto....
Action Result : Ok

Rebooting Phone.... Ok

Elapsed Time : 00:00:04
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Oppo A15s (CPH2179) Factory Reset One click done with by Hydra

=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port (COM4)
Device : 6&1f400921&0&5
SymbolicName :??USB#VID_0E8D&PID_0003#6&1f400921&0&5#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2016,3.0.1504.0

Opened handle..

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 06AC94C4712EB3BFD8A358D38467A2EC
ERAM Size : 0x0000000000038000 -224 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 13014E47314A3952381015C3DB1988D1 - G1J9R8

Reading GPT -EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Erase Userdata
Processing...
Formatting Userdata...
Action Result : Ok

Elapsed Time : 00:00:02
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Huawei TRT-L21 (Y7 Prime) Edl Frp Remove done by hydra

Brand : HUAWEI Model : TRT-L21 (Y7 Prime) Storage : Auto
Loader: 0006B0E100150062_6bc369511da9cadb_f68e4d9c_HUAWEI_QUALCOMM_peek_8937.fhprg
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM12)
SymbolicName :??USB#VID_05C6&PID_9008#6&1923b7cb&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 08/02/2017,2.1.2.7

Getting device info .. . ...
Serial No.: 0x5D54B0C6
HW_ID : 0006B0E100150062
MSM ID : 0x0006B0E1, MSM8940-Qualcomm Snapdragon 435
MODEL_ID : 0x0062
OEM_ID : 0x0015 - HUAWEI
PBL Ver : 00000000
PK HASH : 6bc369511da9cadb3a7af61574f89db385003d6241bdd1ff573dba61bf6ae119

Firehose Loader [0006B0E100150062_6bc369511da9cadb_f68e4d9c_HUAWEI_QUALCOMM_peek_8937.fhprg]
--------------------------------------------------
Header Type : OLD
TargetMSM : 8937
Tag : _peek
Version : 3
Code_size : 288
Signature_size : 256
fhVendor : QUALCOMM
HW_ID : 0006B0E100150062
Vendor : HUAWEI
OEM_ID : 0015
MODEL_ID : 0062
SW_ID : 0000000000000003
APP_ID :
pk_hash : 6bc369511da9cadb3a7af61574f89db385003d6241bdd1ff573dba61bf6ae119
OEM_VERSION : ljunshen-HP-Z240-SFF-Workstation
IMAGE_VARIANT : FAADANAZA
QC_VERSION : BOOT.BF.3.3-00142
--------------------------------------------------

SaharaBoot... Ok
Sending ...................b Okb0
Connecting to Firehose...
Ping ... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 299101484
Firmware Version : 825241672
Product Name : HBG4a2
Physical titions : 3
Total Logical Blocks:
Drive [0] 61071360 [29.121 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]

Protocol : Universal
Running : Ok
Reading GPT[3]
Drive [0] 64 Items
Drive [1] 0 Items
Drive [2] 0 Items

Processing Remove FRP....
- Removing FRP [Zero Wipe] Ok
Action Result : Ok

Elapsed Time : 00:00:06
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi Note 8 2021 (biloba) Bootloader Unlock With by Hydra

=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port (COM11)
Device : 5&31b872b&0&4
SymbolicName :??USB#VID_0E8D&PID_0003#5&31b872b&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2016,3.2

Opened handle..

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : CB9CFA9A6D3DD5BBB55A016EBFF4BF39
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000001D1F000000 -116,484 GB
eMMC CID : 13014E53304A394B391022568BA6B7A9 - S0J9K9

Reading GPT -EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Unlock Bootloader
Processing...
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------

Verifying status after operation...
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------
Action Result : Ok

Elapsed Time : 00:00:02
 
Top