★★★ Post All Successfully Repaired Phones By Hydra Tool ★★★

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi 9C (angelica) Bootloader Unlock With by hydra
a.jpeg

=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port (COM12)
Device : 5&2f3fe3a6&0&3
SymbolicName :??USB#VID_0E8D&PID_0003#5&2f3fe3a6&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2016,3.0.1504.0

Opened handle..
Handshaking... Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0766 MT6765 [6765]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : E7
SBC : 01 (True)
SLA : 02 (True)
DAA : 04 (True)
SWJTAG : 06 (True)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 20 (True)
MEMWRITE : 40 (True)
CMD_C8 : 80 (True)

Exploiting Device...
Exploit Sent..
Successfully Exploited...
Handshaking... Ok

--- ENABLE AUTO PREL DUMP ----
Found
C:Hydra ToolBackupPreloader_dumpprel.tmp
------------------------------

Handshaking...

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0766 MT6765 [6765]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)

MEID : 434B6A9D8A5C697AEEDE32E408A9E0DA
Stage 1.. [Size:216440]
Sending : Please wait.. Accepted

Identifying Protocol...
Protocol : New
Synchronization... SYNC
Preloader Initialization...
sing prel.tmp
Init : Accepted
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : C6DB7D51E4D45B8BF024922E39D6C106
ERAM Size : 0x0000000000038000 -224 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 4501004441343033320138C42B43C78B - DA4032
Executing : ACCEPTED...

Reading GPT -EMMC [0x00008000] 130 Items
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 0 C6DB7D51E4D45B8BF024922E39D6C106
ERAM Size : 0 0x0000000000038000 -224 KB
IRAM Size : 0 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 4501004441343033320138C42B43C78B - DA4032

Reading GPT -EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Unlock Bootloader
Processing...
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------

Verifying status after operation...
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------
Action Result : Ok

Elapsed Time : 00:00:33
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Mi A1 (Tissot) Edl Frp Remove done by Hydra
190400000760_HQTool.exe_EDL_FRP_RemoveAuto_11-27-2021-090541.jpeg

Brand : XIAOMI Model : Mi A1 (Tissot) Storage : Auto
Loader: 000460E100000000_57158eaf1814d78f_3b318c1d_QUALCOMM_XIAOMI_peek_8953.fhprg
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM5)
SymbolicName :??USB#VID_05C6&PID_9008#5&1f03ab54&0&7#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 05/29/2019,2.1.3.7

Getting device info .. . ...
Serial No.: 0x3D2556FB
HW_ID : 000460E100000000
MSM ID : 0x000460E1, MSM8953-Qualcomm Snapdragon 625
MODEL_ID : 0x0000
OEM_ID : 0x0000 - QUALCOMM
PBL Ver : 00000000
PK HASH : 57158eaf1814d78fd2b3105ece4db18a817a08ac664a5782a925f3ff8403d39a

Firehose Loader [000460E100000000_57158eaf1814d78f_3b318c1d_QUALCOMM_XIAOMI_peek_8953.fhprg]
--------------------------------------------------
Header Type : OLD
TargetMSM : 8953
Tag : _peek
Version : 3
Code_size : 288
Signature_size : 256
fhVendor : XIAOMI
HW_ID : 000460E100000000
Vendor : QUALCOMM
OEM_ID : 0000
MODEL_ID : 0000
SW_ID : 0000000000000003
APP_ID :
pk_hash : 57158eaf1814d78fd2b3105ece4db18a817a08ac664a5782a925f3ff8403d39a
OEM_VERSION : modem-ci
IMAGE_VARIANT : JAADANAZA
QC_VERSION : BOOT.BF.3.3-00214
--------------------------------------------------

SaharaBoot... Ok
Sending ..................b Okb0
Connecting to Firehose...
Ping ... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8953
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 3152321234
Firmware Version : 5
Product Name : RH64MB
Physical titions : 3
Total Logical Blocks:
Drive [0] 122142720 [58.242 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]

Protocol : Universal
Running : Ok

Phone Information .....
Brand : xiaomi
Vendor : Xiaomi
Model : Mi A1
ID : N2G47H
SDK : 25
Release : 8.0.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : tissot-user 7.1.2 N2G47H 7.8.23 release-keys
Device : tissot_sprout
Board : msm8953
Display ID : N2G47H.7.8.23
Security Patch : 2018-01-01
Emmc_size : 16GB
Platform : msm8953
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : xiaomi/tissot/tissot_sprout:7.1.2/N2G47H/7.8.23:user/release-keys

Reading GPT[3]
Drive [0] 52 Items
Drive [1] 0 Items
Drive [2] 0 Items

Removing FRPta...
Method : 0
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOk Ok

Elapsed Time : 00:00:03
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Huawei Y7 2019 (DUB-LX1) Fix Sound Problem done With by Hydra Edl FLashıng

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM80)
SymbolicName :??USB#VID_05C6&PID_9008#5&1e6bc522&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 02/05/2018,3.0.0.0

Getting device info .. . ...
Serial No.: 0x4156FC6C
HW_ID : 0009A0E100150065
MSM ID : 0x0009A0E1, SDM450-Qualcomm Snapdragon 450
MODEL_ID : 0x0065
OEM_ID : 0x0015 - HUAWEI
PBL Ver : 00000000
PK HASH : 6bc369511da9cadb3a7af61574f89db385003d6241bdd1ff573dba61bf6ae119

Firehose Loader [0009A0E100150065_6bc369511da9cadb_1a1074cf_HUAWEI_QUALCOMM_peek_8953.fhprg]
--------------------------------------------------
Header Type : OLD
TargetMSM : 8953
Tag : _peek
Version : 3
Code_size : 288
Signature_size : 256
fhVendor : QUALCOMM
HW_ID : 0009A0E100150065
Vendor : HUAWEI
OEM_ID : 0015
MODEL_ID : 0065
SW_ID : 0000000000000003
APP_ID :
pk_hash : 6bc369511da9cadb3a7af61574f89db385003d6241bdd1ff573dba61bf6ae119
OEM_VERSION : SIA1000073848
IMAGE_VARIANT : JAADANAZA
QC_VERSION : BOOT.BF.3.3.2-00019
--------------------------------------------------

SaharaBoot... Ok
Sending .............b Okb0
Connecting to Firehose...
Ping ... Ok
Configuration.......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8953
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 286953654
Firmware Version : 0
Product Name : GD6BMB
Physical titions : 3
Total Logical Blocks:
Drive [0] 61071360 [29.121 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]

Protocol : Universal
Running : Ok

Phone Information ....
Unable To find Build.prop

Reading GPT[3]
Drive [0] 56 Items
Drive [1] 0 Items
Drive [2] 0 Items


Backup Security titions...
Reading Security Items....
> modemst1
> modemst2
> fsg
> fsc
C:Hydra ToolBackupSecurity_Backup___Security_112921114951.sec
Backup Security Success....

----------------------------
Flashing Selected titions....
- gpt (0)b [gpt] b0 Ok
- sbl1 (0)b [sbl1] b0 Ok
- rpm (0)b [rpm] b0 Ok
- tz (0)b [tz] b0 Ok
- devcfg (0)b [devcfg] b0 Ok
- dsp (0)b [dsp] b0 Ok
- keystore (0)b [keystore] b0 Ok
- frp (0)b [frp] b0 Ok
- mota (0)b [mota] b0 Ok
- dip (0)b [dip] b0 Ok
- syscfg (0)b [syscfg] b0 Ok
- apdp (0)b [apdp] b0 Ok
- msadp (0)b [msadp] b0 Ok
- dpo (0)b [dpo] b0 Ok
- fsc (0)b [fsc] b0 Ok
- ssd (0)b [ssd] b0 Ok
- mcfg (0)b [mcfg] b0 Ok
- modemst1 (0)b [modemst1] b0 Skipped
- modemst2 (0)b [modemst2] b0 Skipped
- misc (0)b [misc] b0 Ok
- oeminfo (0)b [oeminfo] b0 Ok
- bootfail_info (0)b [bootfail_info] b0 Ok
- rrecord (0)b [rrecord] b0 Ok
- rainbow (0)b [rainbow] b0 Ok
- pad0 (0)b [pad0] b0 Ok
- aboot (0)b [aboot] b0 Ok
- cmnlib (0)b [cmnlib] b0 Ok
- cmnlib64 (0)b [cmnlib64] b0 Ok
- keymaster (0)b [keymaster] b0 Ok
- fsg (0)b [fsg] b0 Skipped
- DDR (0)b [DDR] b0 Ok
- sec (0)b [sec] b0 Skipped
- devinfo (0)b [devinfo] b0 Ok
- limits (0)b [limits] b0 Ok
- modem (0)b [modem] b0 Ok
- erecovery_kernel (0)b [erecovery_kernel] b0 Ok
- erecovery_ramdis (0)b [erecovery_ramdis] b0 Ok
- erecovery_vendor (0)b [erecovery_vendor] b0 Ok
- kernel (0)b [kernel] b0 Ok
- ramdisk (0)b [ramdisk] b0 Ok
- recovery_ramdisk (0)b [recovery_ramdisk] b0 Ok
- recovery_vendor (0)b [recovery_vendor] b0 Ok
- persist (0)b [persist] b0 Ok
- cache (0)b [cache] b0 Ok
- odm (0)b [odm] b0 Ok
- preload (0)b [preload] b0 Ok
- patch (0)b [patch] b0 Ok
- log (0)b [log] b0 Ok
- version (0)b [version] b0 Ok
- product (0)b [product] b0 Ok
- cust (0)b [cust] b0 Ok
- vendor (0)b [vendor] b0 Ok
- system (0)b [system] b0 Ok
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 0
Set bootable storage drive 0 Ok

Rebooting Phone.... Ok

Elapsed Time : 00:34:07
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
ATU-L31 (Y6 Prime 2018) Edl Frp Remove With by Hydra

Brand : HUAWEI Model : ATU-L31 (Y6 Prime 2018) Storage : Auto
Loader: 000560E10015003A_6bc369511da9cadb_c0ba0f0a_HUAWEI_QUALCOMM_peek_8917.fhprg
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM8)
SymbolicName :??USB#VID_05C6&PID_9008#5&21340359&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 08/02/2017,2.1.2.7

Getting device info .. Ok
Device MODE : Firehose
Connecting to Firehose...
Ping .. Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8917
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 427025420
Firmware Version : 858796104
Product Name : HAG4a2
Physical titions : 3
Total Logical Blocks:
Drive [0] 30777344 [14.676 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]

Protocol : Universal
Running : Ok

Phone Information .....
Vendor : unknown
ID : OPR6.170623.013
SDK : 26
Release : 8.0.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : generic_a53-user 8.0.0 OPR6.170623.013 eng.jenkin.20200225.133909 test-keys
Display ID : System 8.0.0.073(091T)
Security Patch : 2020-02-01
Fingerprint : Huawei/generic_a53/generic_a53:8.0.0/OPR6.170623.013/jenkin02251339:user/test-keys

Reading GPT[3]
Drive [0] 56 Items
Drive [1] 0 Items
Drive [2] 0 Items

Removing FRPta...
Method :
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOk Ok

Rebooting Phone.... Ok
If not rebooted, Please Power on Manually

Elapsed Time : 00:00:04
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Realme C25 (RMX3191) Unlock Bootlaoder With by Hydra

=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port (COM11)
Device : 6&38a36d0c&0&1
SymbolicName :??USB#VID_0E8D&PID_0003#6&38a36d0c&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2016,3.2

Opened handle..
Handshaking... Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0707 MT6768 [6768]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : E5
SBC : 01 (True)
SLA : 00 (False)
DAA : 04 (True)
SWJTAG : 04 (True)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 20 (True)
MEMWRITE : 40 (True)
CMD_C8 : 80 (True)

Exploiting Device...
Exploit Sent..
Successfully Exploited...
Handshaking... Ok

--- ENABLE AUTO PREL DUMP ----
Found
C:Hydra ToolBackupPreloader_dumpprel.tmp
------------------------------

Handshaking...

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0707 MT6768 [6768]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)

MEID : 994E379C2F98E41759A0A7F6D5024D6A
Stage 1.. [Size:256504]
Sending : Please wait.. Accepted

Identifying Protocol...
Protocol : New
Synchronization... SYNC
Preloader Initialization...
sing prel.tmp
Init : Accepted
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 8E7BD1AEEA6F50252F5B952D902493F8
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 13014E47314A395238100FEBDC1A2857 - G1J9R8
Executing : ACCEPTED...

Reading GPT -EMMC [0x00008000] 130 Items

Autobackup titions
-preloader [0x00000000] 512 KB -> preloader.bin...0 Ok
-> Renaming Preloader.... preloader_oppo6768.bin
Creating Scatter file... C:Hydra ToolBackupAuto0707__112921110751MT6768_Android_scatter.txt
-pgpt [0x00000000] 32 KB -> pgpt.bin...0 Ok
-frp [0x15F08000] 1024 KB -> frp.bin...0 Ok
-nvdata [0x1CEA2000] 64 MB -> nvdata.bin...0 Ok
-persist [0x20EA2000] 48 MB -> persist.bin...0 Ok
-protect1 [0x23EA2000] 8 MB -> protect1.bin...0 Ok
-protect2 [0x246A2000] 9.367 MB -> protect2.bin...0 Ok
-nvram [0x27700000] 64 MB -> nvram.bin...0 Ok
Done!!!
C:Hydra ToolBackupAuto0707__112921110751
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 1 8E7BD1AEEA6F50252F5B952D902493F8
ERAM Size : 1 0x0000000000070000 -448 KB
IRAM Size : 1 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 13014E47314A395238100FEBDC1A2857 - G1J9R8

Reading GPT -EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Unlock Bootloader
Processing...
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------

Verifying status after operation...
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------
Action Result : Ok

Elapsed Time : 00:00:47
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Mi Max 3 (Nitrogen) Edl Frp Remove done by Hydra

Brand : XIAOMI Model : Mi Max 3 (Nitrogen) Storage : Auto
Loader: 0008C0E100010000_a7b8b82545a98eca_28f4dc3c_GENERIC_XIAOMI_auth.fhprg
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM5)
SymbolicName :??USB#VID_05C6&PID_9008#6&16f71b94&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 08/02/2017,2.1.2.7

Getting device info .. . ...
Serial No.: 0xE7237EF2
HW_ID : 000CC0E100000000
MSM ID : 0x000CC0E1,
MODEL_ID : 0x0000
OEM_ID : 0x0000 - QUALCOMM
PBL Ver : 00000000
PK HASH : a7b8b82545a98eca23d6e9105fb464568d1b5828264903441bdef0cd57e3c370

Firehose Loader [0008C0E100010000_a7b8b82545a98eca_28f4dc3c_GENERIC_XIAOMI_auth.fhprg]
--------------------------------------------------
Header Type : OLD
TargetMSM :
Tag : _auth
Version : 5
Code_size : 416
Signature_size : 256
fhVendor : XIAOMI
HW_ID : 3006000000010000
Vendor : GENERIC
OEM_ID : 0001
MODEL_ID : 0000
SW_ID : 000000000000000B
APP_ID :
pk_hash : a7b8b82545a98eca23d6e9105fb464568d1b5828264903441bdef0cd57e3c370
OEM_VERSION : c3-bsp-builder-job001.bj
IMAGE_VARIANT : Sdm660LA
QC_VERSION : BOOT.XF.1.4-00255-S660LZB-1
--------------------------------------------------

SaharaBoot... Ok
Sending ...............................b Okb0
Connecting to Firehose...
Ping ......... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : MSM8996
Version : 1
DateTime : Aug 2 2018 - 22:27:53

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 1192343262
Firmware Version : 162
Product Name : HCG8a4
Physical titions : 4
Total Logical Blocks:
Drive [0] 122142720 [58.242 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]
Drive [3] 8192 [4 MB]

Protocol : Universal
Running : Ok

Phone Information ......
Vendor : Xiaomi
ID : QKQ1.190910.002
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Miui Ver : V12
Mod_device : nitrogen_global
Security Patch : 2020-08-01

Reading GPT[4]
Drive [0] 80 Items
Drive [1] 0 Items
Drive [2] 0 Items
Drive [3]

Removing FRPta...
Method : 0
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOk Ok

Elapsed Time : 00:00:10
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Oppo F1s Pattern lock read code Without data loss by Hydra

Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port_V1632 (COM4)
Device : 5&ae137ff&0&6
SymbolicName :??USB#VID_0E8D&PID_0003#5&ae137ff&0&6#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0

Opened handle..
Handshaking... Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0326 MT6750T [6755]
hw subcode : 8A00
hw version : CB00
sw version : 0001
Target config : 01
SBC : 01 (True)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)

Exploiting Device...
Exploit Sent..
Successfully Exploited...
Handshaking... Ok

--- ENABLE AUTO PREL DUMP ----
Found
D:GSM GADGETHydraTool_FullPackage_08-01-2021BackupPreloader_dumpprel.tmp
------------------------------

Handshaking...

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0326 MT6750T [6755]
hw subcode : 8A00
hw version : CB00
sw version : 0001
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)

MEID : 6CD6FB30DA47A2CA0CB78D8568884376
Stage 1.. [Size:219288]
Sending : Please wait.. Accepted

Identifying Protocol...
Protocol : New
Synchronization... SYNC
Preloader Initialization...
sing prel.tmp
Init : Accepted
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 4E6FE696DFF8F6EECD6694B19CBC58A4
ERAM Size : 0x0000000000038000 -224 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 90014A484247346132A40AEB44F78365 - HBG4a2
Executing : ACCEPTED...

Reading GPT -EMMC [0x00008000] 130 Items

Reading System Info
Brand : OPPO
Vendor : OPPO
Model : A1601
ID : LMY47I
SDK : 22
Release : 5.1
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Description : full_oppo6750_15331-user 5.1 LMY47I 1562665575 release-keys
Device : A1601
Board : full_oppo6750_15331
Display ID : A1601EX_11_A.40_190709
Security Patch : 2018-01-05
Platform : mt6750
FRPPST : /dev/block/platform/mtk-msdc.0/by-name/frp
StorageType : mtp,mass_storage
Userdata State : Not Encrypted

Autobackup titions
-preloader [0x00000000] 512 KB -> preloader.bin...0 Ok
-> Renaming Preloader.... preloader_oppo6750_15131.bin
Creating Scatter file... D:GSM GADGETHydraTool_FullPackage_08-01-2021BackupAuto0326__113021093808MT6750T_Android_scatter.txt
-pgpt [0x00000000] 32 KB -> pgpt.bin...0 Ok
-frp [0x03F88000] 1024 KB -> frp.bin...0 Ok
-nvdata [0x04088000] 32 MB -> nvdata.bin...0 Ok
-protect1 [0x08088000] 8 MB -> protect1.bin...0 Ok
-protect2 [0x08888000] 15.469 MB -> protect2.bin...0 Ok
-nvram [0x0CF00000] 5 MB -> nvram.bin...0 Ok
Done!!!
D:GSM GADGETHydraTool_FullPackage_08-01-2021BackupAuto0326__113021093808
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 1 4E6FE696DFF8F6EECD6694B19CBC58A4
ERAM Size : 1 0x0000000000038000 -224 KB
IRAM Size : 1 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 90014A484247346132A40AEB44F78365 - HBG4a2

Reading GPT -EMMC [0x00008000] 130 Items


Reading System Info
Brand : OPPO
Vendor : OPPO
Model : A1601
ID : LMY47I
SDK : 22
Release : 5.1
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Description : full_oppo6750_15331-user 5.1 LMY47I 1562665575 release-keys
Device : A1601
Board : full_oppo6750_15331
Display ID : A1601EX_11_A.40_190709
Security Patch : 2018-01-05
Platform : mt6750
FRPPST : /dev/block/platform/mtk-msdc.0/by-name/frp
StorageType : mtp,mass_storage
Userdata State : Not Encrypted

-------------------------------------
Operation : Read Pattern
Processing...
Searching PatternKey : .0 Found
Gesture Data : B86056C615A37D86E0B3359C8B00EEB7B28D6CCF
Bruteforcing pattern hash..Please wait for few seconds
Pattern Code : 123654
1 2 3
4 5 6
7 8 9
Action Result : Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:03:32
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi 9 (lancelot) Unlock Bootloader With by Hydra

=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port_V1632 (COM3)
Device : 5&17411534&0&4
SymbolicName :??USB#VID_0E8D&PID_0003#5&17411534&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0

Opened handle..

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : A129AB79C83AA6DC2709008F4AED7CC3
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 15010044503644414203FA74CC8ED - DP6DAB

Reading GPT -EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Unlock Bootloader
Processing...
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------

Verifying status after operation...
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------
Action Result : Ok

Elapsed Time : 00:00:02
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi 9A (dandelion) Bootloader Unlock Done with by Hydra

Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port (COM11)
Device : 6&376ffbcd&0&2
SymbolicName :??USB#VID_0E8D&PID_0003#6&376ffbcd&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2016,3.0.1504.0

Opened handle..

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : B4EB508333897D2F423E32CB04AA23AD
ERAM Size : 0x0000000000038000 -224 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 150100424A5444345209DEADBC11870F - BJTD4R

Reading GPT -EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Unlock Bootloader
Processing...
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------

Verifying status after operation...
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------
Action Result : Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:05
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi 8A (olivelite) Edl Frp Remove with by Hydra

Brand : XIAOMI Model : Redmi 8A (olivelite) Storage : Auto
Loader: 000BF0E100720000_57158eaf1814d78f_e551cac5_XIAOMI_auth_peek_8937.fhprg
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM26)
SymbolicName :??USB#VID_05C6&PID_9008#5&373328e8&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 02/05/2018,3.0.0.0

Getting device info .. Ok
Device MODE : Firehose
Connecting to Firehose...
Ping .. Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 2540925459
Firmware Version : 909127728
Product Name : hB8aP>
Physical titions : 3
Total Logical Blocks:
Drive [0] 61071360 [29,121 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]

Protocol : Universal
Running : Ok

Phone Information ......
Vendor : Xiaomi
ID : QKQ1.191014.001
SDK : 29
Release : 10
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-GB
Miui Ver : V12
Mod_device : olivelite_global
Security Patch : 2021-05-01
Emmc_size : 16GB

Reading GPT[3]
Drive [0] 64 Items
Drive [1] 0 Items
Drive [2] 0 Items

Removing FRPta...
Method :
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOk Ok

Rebooting Phone.... Ok
If not rebooted, Please Power on Manually

Elapsed Time : 00:00:04

}
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Vivo Y53 Format Userdata One click done by Hydra

Brand : VIVO Model : Y53 Storage : Auto
Loader: 000560E100000000_60ba997fef6da9f0_203cb924_QUALCOMM_VIVO_peek_8917.fhprg
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM113)
SymbolicName :??USB#VID_05C6&PID_9008#6&5b0a393&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 08/02/2017,2.1.2.7

Getting device info .. Ok
Device MODE : Firehose
Connecting to Firehose...
Ping .. Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8917
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 1966065408
Firmware Version : 13
Product Name : QE13MB
Physical titions : 3
Total Logical Blocks:
Drive [0] 30535680 [14.561 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]

Protocol : Universal
Running : Ok

Phone Information .....
Brand : vivo
Vendor : vivo
Model : vivo PD1628F_EX
ID : MMB29M
SDK : 23
Release : 6.0.1
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-US
Description : msm8937_32-user 6.0.1 MMB29M eng.compiler.20190105.211334 release-keys
Device : PD1628F_EX
Board : QC_Reference_Phone
Display ID : MMB29M release-keys
Security Patch : 2018-08-01
Emmc_size : 16GB
Platform : msm8937
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : vivo/PD1628F_EX/PD1628F_EX:6.0.1/MMB29M/compiler01052117:user/release-keys

Reading GPT[3]
Drive [0] 52 Items
Drive [1] 0 Items
Drive [2] 0 Items

Formatting Userdata...
Method :
Auto
Processing...
- Formatting Userdata
Executing ...
- Formatting Userdata [Safe Format - eMMc] OkOk Ok

Elapsed Time : 00:00:04
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi Note 9 (merlin) Bootlaoder Unlock With by Hydra

=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port_V1632 (COM8)
Device : 6&33f3d&0&1
SymbolicName :??USB#VID_0E8D&PID_0003#6&33f3d&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0

Opened handle..
Handshaking... Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0707 MT6768 [6768]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : E7
SBC : 01 (True)
SLA : 02 (True)
DAA : 04 (True)
SWJTAG : 06 (True)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 20 (True)
MEMWRITE : 40 (True)
CMD_C8 : 80 (True)

Exploiting Device...
Exploit Sent..
Successfully Exploited...
Handshaking... Ok

--- ENABLE AUTO PREL DUMP ----
Found
E:Hydra ToolBackupPreloader_dumpprel.tmp
------------------------------

Handshaking...

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0707 MT6768 [6768]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)

MEID : DDAA187B2E83882D6C06B07C32A9AADA
Stage 1.. [Size:256504]
Sending : Please wait.. Accepted

Identifying Protocol...
Protocol : New
Synchronization... SYNC
Preloader Initialization...
sing prel.tmp
Init : Accepted
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 2ED7F8E3AEC28CE59BBC7122A30CE71E
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000001D1F000000 -116,484 GB
eMMC CID : 13014E47314A3953391005D5B40D5781 - G1J9S9
Executing : ACCEPTED...

Reading GPT -EMMC [0x00008000] 130 Items

Autobackup titions
-preloader [0x00000000] 512 KB -> preloader.bin...0 Ok
-> Renaming Preloader.... preloader_merlin.bin
Creating Scatter file... E:Hydra ToolBackupAuto0707__120221122543MT6768_Android_scatter.txt
-pgpt [0x00000000] 32 KB -> pgpt.bin...0 Ok
-frp [0x05508000] 1024 KB -> frp.bin...0 Ok
-nvdata [0x0C4A2000] 64 MB -> nvdata.bin...0 Ok
-persist [0x104A2000] 48 MB -> persist.bin...0 Ok
-protect1 [0x164A2000] 8 MB -> protect1.bin...0 Ok
-protect2 [0x16CA2000] 11,367 MB -> protect2.bin...0 Ok
-nvram [0x19F80000] 64 MB -> nvram.bin...0 Ok
Done!!!
E:Hydra ToolBackupAuto0707__120221122543
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 1 2ED7F8E3AEC28CE59BBC7122A30CE71E
ERAM Size : 1 0x0000000000070000 -448 KB
IRAM Size : 1 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000001D1F000000 -116,484 GB
eMMC CID : 13014E47314A3953391005D5B40D5781 - G1J9S9

Reading GPT -EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Unlock Bootloader
Processing...
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------

Verifying status after operation...
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------
Action Result : Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:44
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi Note 8 (ginkgo) Edl Frp Remove With by Hydra

Brand : XIAOMI Model : Redmi Note 8 (ginkgo) Storage : Auto
Loader: 0010A0E100720000_1bebe3863a6781db_76196dc8_XIAOMI.fhprg
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM10)
SymbolicName :??USB#VID_05C6&PID_9008#6&be8b923&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 07/08/2015,2.1.2.0

Getting device info .. . ...
Serial No.: 0x54C390D8
HW_ID : 0010A0E100720000
MSM ID : 0x0010A0E1, SM6125-Qualcomm Snapdragon 665
MODEL_ID : 0x0000
OEM_ID : 0x0072 - XIAOMI
PBL Ver : 00000000
PK HASH : 1bebe3863a6781db4b01086063007334de9e5ca14971c7c4f4358ec9d79cda46

Firehose Loader [0010A0E100720000_1bebe3863a6781db_76196dc8_XIAOMI.fhprg]
--------------------------------------------------
Header Type : New
TargetMSM :
Tag :
Version : 6
Code_size : 816
Signature_size : 256
fhVendor : XIAOMI
HW_ID : 0010A0E100720000
Vendor : XIAOMI
OEM_ID : 0072
MODEL_ID : 0000
SW_ID : 00000003
APP_ID : 00000000
pk_hash : 1bebe3863a6781db4b01086063007334de9e5ca14971c7c4f4358ec9d79cda4692ce5e948c6fd409408f4c919fcadfe3
OEM_VERSION : cibuild
IMAGE_VARIANT : NicobarPkgLAA
QC_VERSION : BOOT.XF.4.0-00149-NICOBARLAZ-1
--------------------------------------------------

SaharaBoot... Ok
Sending ..............................b Okb0
Connecting to Firehose...
Ping ..................... Ok
Configuration.........
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Jul 3 2019 - 22:23:56

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 19
Serial Number : 314838373
Firmware Version : 4
Product Name : S0J9K8
Physical titions : 4
Total Logical Blocks:
Drive [0] 122142720 [58,242 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]
Drive [3] 32768 [16 MB]

Protocol : Universal
Running : Ok

Phone Information ......
Vendor : Xiaomi
ID : QKQ1.200114.002
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Miui Ver : V12
Mod_device : ginkgo_global
Security Patch : 2021-07-01

Reading GPT[4]
Drive [0] 88 Items
Drive [1] 0 Items
Drive [2] 0 Items
Drive [3]

Removing FRPta...
Method : 0
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOk Ok

Rebooting Phone.... Ok
If not rebooted, Please Power on Manually

Elapsed Time : 00:00:23
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Huawei P Smart 2020 (FIG-LX1) Frp Remove One Click With by Hydra


Searching Device By Fastboot
Device Found...

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Reading Device Information...
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
hotainfo......
#hotainfo_len :
#C_version :
#D_version :
#PLMN :
#BoardID :
#DeviceName :
Build number : FIG-LX1 9.1.0.235(C432E14R1P5)
Product Model : FIG-LX1
hwnff_ver : Ver2.3
key_version : huawei_key_v1
product : hi6250
system_update_state :
vendorcountry : hw/eu
soc_id : 0.5
ro_build_fingerprint : 0.5
ro_build_version_full : 0.5
ro_build_version_qcom : 0.5
psid.........
#SN : HBE7N18C03002103
#IMEI1 : ***************
#IMEI2 : ***************

Security Info....
#Dongle_info : 0.5
#FB Lock State : UNLOCKED
#USER Lock State : LOCKED

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Huawei Fastboot Service...
Factory Reset Protection...
Removing.... Ok

Elapsed Time : 00:00:02
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
ZTE1Blade A460 Edl Frp Remove done With by Hydra

Brand : ZTE Model : Blade A460 Storage : Auto
Loader: 009600E100000000_3767512bcb320b2b_73a00da7_QUALCOMM_peek_8909.fhprg
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM9)
SymbolicName :??USB#VID_05C6&PID_9008#5&373328e8&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 02/05/2018,3.0.0.0

Getting device info . . ...
Serial No.: 0x00596261
HW_ID : 009600E100000000
MSM ID : 0x009600E1, MSM8909-Qualcomm Snapdragon 210
MODEL_ID : 0x0000
OEM_ID : 0x0000 - QUALCOMM
PBL Ver : 00000000
PK HASH : 3767512bcb320b2b8450bab3fcc7d891d913702cba941717d6d13af81fdadc68

Firehose Loader [009600E100000000_3767512bcb320b2b_73a00da7_QUALCOMM_peek_8909.fhprg]
--------------------------------------------------
Header Type : OLD
TargetMSM : 8909
Tag : _peek
Version : 3
Code_size : 288
Signature_size : 256
fhVendor : QUALCOMM
HW_ID : 009600E100000000
Vendor : QUALCOMM
OEM_ID : 0000
MODEL_ID : 0000
SW_ID : 0000000000000003
APP_ID :
pk_hash : 3767512bcb320b2b8450bab3fcc7d891d913702cba941717d6d13af81fdadc68
OEM_VERSION : server-142
IMAGE_VARIANT : DAADANAZA
QC_VERSION : BOOT.BF.3.1.2.C2-00011
--------------------------------------------------

SaharaBoot... Ok
Sending ..............b Okb0
Connecting to Firehose...
Ping ... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8909
Version : 1


Protocol : Universal
Running : Ok

Phone Information .....
Brand : ZTE
Vendor : ZTE
Model : Blade A460
ID : LMY47V
SDK : 22
Release : 5.1.1
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Description : P809A20-user 5.1.1 LMY47V 1.0.0 release-keys
Device : P809A20
Board : msm8909
Display ID : CLA-CO-P809A20V1.0.0
Platform : msm8909
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : ZTE/P809A20/P809A20:5.1.1/LMY47V/20150828.111758:user/release-keys

Reading GPT[3]
Drive [0] 32 Items
Drive [1] 0 Items
Drive [2] 4 Items

Removing FRPta...
Method : 0
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOk Ok

Rebooting Phone.... Ok
If not rebooted, Please Power on Manually

Elapsed Time : 00:00:05
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Vivo Y53 Edl Remove Screen Lock Security Without Data Loss done by Hydra

Brand : VIVO Model : Y53 Storage : Auto
Loader: 000560E100000000_60ba997fef6da9f0_203cb924_QUALCOMM_VIVO_peek_8917.fhprg
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM13)
SymbolicName :??USB#VID_05C6&PID_9008#6&15bd46b4&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 07/08/2015,2.1.2.0

Getting device info .. . ...
Serial No.: 0x6A66806F
HW_ID : 000560E100000000
MSM ID : 0x000560E1, MSM8917-Qualcomm Snapdragon 425
MODEL_ID : 0x0000
OEM_ID : 0x0000 - QUALCOMM
PBL Ver : 00000000
PK HASH : 60ba997fef6da9f05885fa11f1dd6d2a90d052a257a09c2075d7246cc73c0d43

Firehose Loader [000560E100000000_60ba997fef6da9f0_203cb924_QUALCOMM_VIVO_peek_8917.fhprg]
--------------------------------------------------
Header Type : OLD
TargetMSM : 8917
Tag : _peek
Version : 3
Code_size : 288
Signature_size : 256
fhVendor : VIVO
HW_ID : 000560E100000000
Vendor : QUALCOMM
OEM_ID : 0000
MODEL_ID : 0000
SW_ID : 0000000000000003
APP_ID :
pk_hash : 60ba997fef6da9f05885fa11f1dd6d2a90d052a257a09c2075d7246cc73c0d43
OEM_VERSION : compiler026
IMAGE_VARIANT : LAADANAZA
QC_VERSION : BOOT.BF.3.3-00199
--------------------------------------------------

SaharaBoot... Ok
Sending .................b Okb0
Connecting to Firehose...
Ping ... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8917
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 510256200
Firmware Version : 165
Product Name : HAG4a2
Physical titions : 3
Total Logical Blocks:
Drive [0] 30777344 [14.676 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]

Protocol : Universal
Running : Ok
Reading GPT[3]
Drive [0] 52 Items
Drive [1] 0 Items
Drive [2] 0 Items


Phone Information .....
Brand : vivo
Vendor : vivo
Model : vivo PD1628F_EX
ID : MMB29M
SDK : 23
Release : 6.0.1
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-US
Description : msm8937_32-user 6.0.1 MMB29M eng.compiler.20200118.112618 release-keys
Device : PD1628F_EX
Board : QC_Reference_Phone
Display ID : MMB29M release-keys
Security Patch : 2018-08-01
Emmc_size : 16GB
Platform : msm8937
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : vivo/PD1628F_EX/PD1628F_EX:6.0.1/MMB29M/compiler01181129:user/release-keys

Processing Forced Erase....
- Removing FRP [Zero Wipe] Ok
- Formatting Userdata
Executing ...
- Formatting Userdata [Safe Format - eMMc] OkOk
Action Result : Ok

Elapsed Time : 00:01:53
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi Note 8 Pro (begonia) Bootloader Unlock With by Hydra

=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port_V1632 (COM9)
Device : 5&4722137&0&1
SymbolicName :??COM9
Driver Ver : 01/22/2015,3.0.1504.0

Opened handle..

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 41E8177BC0C54F6C5545DBE5D90C9460
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x0000000200000000 -8 GB
UFS LU0 Size: 0x0000000000400000 -4 MB
UFS LU1 Size: 0x0000000000400000 -4 MB
UFS LU2 Size: 0x0000001DCB000000 -119.172 GB
UFS CID : ?H9HQ16AFAMMDAR
UFS UNIQID : 14307306f2a9000000000000

Reading GPT0 -UFS [0x00008000] 0 130 Items
0

Reading System Info
Vendor : Xiaomi
ID : RP1A.200720.011
SDK : 30
Release : 11
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : zh-CN
Description : begonia-user 11 RP1A.200720.011 V12.5.3.0.RGGCNXM release-keys
Miui Ver : V125
Display ID : RP1A.200720.011
Security Patch : 2021-10-01
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Unlock Bootloader
Processing...
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------

Verifying status after operation...
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------
Action Result : 0 Ok

Elapsed Time : 00:00:02
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Vivo Y71 Edl Frp Remove With by Hydra

Brand : VIVO Model : Y71 (V1731B) Storage : Auto
Loader: vivo_2_8.mbn
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM8)
SymbolicName :??USB#VID_05C6&PID_9008#5&3478949&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 08/02/2017,2.1.2.7

Getting device info .. . ...
Serial No.: 0x713D98FC
HW_ID : 000560E100000000
MSM ID : 0x000560E1, MSM8917-Qualcomm Snapdragon 425
MODEL_ID : 0x0000
OEM_ID : 0x0000 - QUALCOMM
PBL Ver : 00000000
PK HASH : 60ba997fef6da9f05885fa11f1dd6d2a90d052a257a09c2075d7246cc73c0d43

Firehose Loader [vivo_2_8.mbn]
--------------------------------------------------
Header Type : OLD
TargetMSM : 8917
Tag : _wut_peek
Version : 3
Code_size : 288
Signature_size : 256
fhVendor : VIVO
HW_ID : 000560E100000000
Vendor : QUALCOMM
OEM_ID : 0000
MODEL_ID : 0000
SW_ID : 0000000000000003
APP_ID :
pk_hash : 60ba997fef6da9f05885fa11f1dd6d2a90d052a257a09c2075d7246cc73c0d43
OEM_VERSION : compiler032
IMAGE_VARIANT : LAADANAZA
QC_VERSION : BOOT.BF.3.3-00227
--------------------------------------------------

SaharaBoot... Ok
Sending ..................b Okb0
Connecting to Firehose...
Ping ... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8917
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 500506842
Firmware Version : 165
Product Name : HAG4a2
Physical titions : 3
Total Logical Blocks:
Drive [0] 30777344 [14,676 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]

Protocol : Universal
Running : Ok

Phone Information .....
Brand : vivo
Vendor : vivo
Model : vivo 1724
ID : OPM1.171019.011
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : msm8937_64-user 8.1.0 OPM1.171019.011 eng.compil.20201019.202120 release-keys
Device : msm8937_64
Display ID : OPM1.171019.011 release-keys
Security Patch : 2020-10-01
Emmc_size : 16GB
Platform : =QCOM8917
Fingerprint : vivo/1724/1724:8.1.0/OPM1.171019.011/compil10192021:user/release-keys

Reading GPT[3]
Drive [0] 56 Items
Drive [1] 0 Items
Drive [2] 0 Items

Removing FRPta...
Method : 0
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] 1 **WARNING Unauthorized tag '' 2 <?xml version="1.0" encoding="UTF-8" ?><data><response value="NAK" /></data>Failed
- Removing FRP [Erase Safety Tag] OkOk Ok

Rebooting Phone.... Ok
If not rebooted, Please Power on Manually

Elapsed Time : 00:00:05
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi 9A (dandelion) Unlock Bootloader With by Hydra

=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port_V1633 (COM24)
Device : 6&2f8c4b4&0&1
SymbolicName :??USB#VID_0E8D&PID_0003#6&2f8c4b4&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0

Opened handle..

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 99619035CD6631E89E01BE4AC89C6
ERAM Size : 0x0000000000038000 -224 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 150100434A544434520407BFBE3E8789 - CJTD4R

Reading GPT -EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Unlock Bootloader
Processing...
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------

Verifying status after operation...
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------
Action Result : Ok

Elapsed Time : 00:00:02
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Vivo S1 Pro Format Userdata & Frp Remove With by Hydra

Brand : VIVO Model : S1 Pro (PD1945F) Storage : Auto
Loader: 0000000000730003_a7df36ffd7ab557c_90719675_VIVO.fhprg
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName :
SymbolicName :??USB#VID_05C6&PID_9008#7&251502ef&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 08/31/2015,2.1.2.0

Getting device info .. . ...
Serial No.: 0x461AFCE5
HW_ID : 0010A0E100730003
MSM ID : 0x0010A0E1, SM6125-Qualcomm Snapdragon 665
MODEL_ID : 0x0003
OEM_ID : 0x0073 - VIVO
PBL Ver : 00000000
PK HASH : a7df36ffd7ab557c67a6c26675e2795c92271308cfd7169bedb84424c862b

Firehose Loader [0000000000730003_a7df36ffd7ab557c_90719675_VIVO.fhprg]
--------------------------------------------------
Header Type : New
TargetMSM :
Tag :
Version : 6
Code_size : 816
Signature_size : 256
fhVendor : VIVO
HW_ID : 0000000000730003
Vendor : VIVO
OEM_ID : 0073
MODEL_ID : 0003
SW_ID : 00000003
APP_ID : 00000000
pk_hash : a7df36ffd7ab557c67a6c26675e2795c92271308cfd7169bedb84424c862bc7b646907dd79989578590fb6370a940
OEM_VERSION : compiler02024095
IMAGE_VARIANT : NicobarPkgLAA
QC_VERSION : BOOT.XF.4.0-00210-NICOBARLAZ-1
--------------------------------------------------

SaharaBoot... Ok
Sending ..............................b Okb0
Connecting to Firehose...
Ping ..................... Ok
Configuration........
Identifying Chip.... ....UFS
Ok
Chip Configuration :
MemoryName : UFS
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Sep 9 2020 - 00:57:45

*** STORAGE DEVICE INFO ***
Memory Type : UFS
Block Size in Bytes : 4096
Page Size : 4096
Manufacturer ID : 462
Serial Number : 1297306958
Firmware Version : 900
Product Name : KM8V7001JA-B813
Physical titions : 6
Total Logical Blocks:
Drive [0] 30939136 [118.023 GB]
Drive [1] 2048 [8 MB]
Drive [2] 2048 [8 MB]
Drive [3] 16384 [64 MB]
Drive [4] 262144 [1024 MB]
Drive [5] 16384 [64 MB]

Protocol : Universal
Running : Ok

Phone Information ......
ID : RP1A.200720.012
SDK : 30
Release : 11
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Security Patch : 2021-09-01
Platform : =SM6125

Reading GPT[6]
Drive [0] 32 Items
Drive [1] 32 Items
Drive [2] 32 Items
Drive [3] 32 Items
Drive [4] 64 Items
Drive [5] 32 Items

Formatting Userdata...
Method : 0
Safe Format - EMMC
Processing...
- Formatting Userdata
- Formatting Userdata [Safe Format - UFS] OkOk Ok

Rebooting Phone.... Ok
If not rebooted, Please Power on Manually

Elapsed Time : 00:00:08
 
Top