★★★ Post All Successfully Repaired Phones By Hydra Tool ★★★

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi Note 7 (lavender) Edl Frp Remove One Click With by Hydra
190300000426_HQTool.exe_EDL_FRP_RemoveAuto_01-26-2022-152106.jpeg

Brand : XIAOMI Model : Redmi Note 7 (lavender) Micron Storage : Auto
Loader: 0008C0E100010000_a7b8b82545a98eca_384d4649_GENERIC_XIAOMI_auth.fhprg
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM7)
SymbolicName :??USB#VID_05C6&PID_9008#5&3269d8ea&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 08/02/2017,2.1.2.7

Getting device info .. . ...
Serial No.: 0x84111960
HW_ID : 0008C0E100000000
MSM ID : 0x0008C0E1, SDM660-Qualcomm Snapdragon 660
MODEL_ID : 0x0000
OEM_ID : 0x0000 - QUALCOMM
PBL Ver : 00000000
PK HASH : a7b8b82545a98eca23d6e9105fb464568d1b5828264903441bdef0cd57e3c370

Firehose Loader [0008C0E100010000_a7b8b82545a98eca_384d4649_GENERIC_XIAOMI_auth.fhprg]
--------------------------------------------------
Header Type : OLD
TargetMSM :
Tag : _auth
Version : 5
Code_size : 416
Signature_size : 256
fhVendor : XIAOMI
HW_ID : 3006000000010000
Vendor : GENERIC
OEM_ID : 0001
MODEL_ID : 0000
SW_ID : 000000000000000B
APP_ID :
pk_hash : a7b8b82545a98eca23d6e9105fb464568d1b5828264903441bdef0cd57e3c370
OEM_VERSION : c3-bsp-builder-job007.bj
IMAGE_VARIANT : Sdm660LA
QC_VERSION : BOOT.XF.1.4-00262-S660LZB-1
--------------------------------------------------

SaharaBoot... Ok
Sending .................................b Okb0
Connecting to Firehose...
Ping ......... Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[iWcG87HUU2AiG5I3Q4dxkbqVKQF]
Signature @256bytes Authentication.... Accepted ......................
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 8192
MaxPayloadSizeToTargetInBytesSupported : 8192
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : MSM8996
Version : 1
DateTime : Feb 10 2020 - 19:28:52

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 2500444849
Firmware Version : 2
Product Name : DH6DAB
Physical titions : 4
Total Logical Blocks:
Drive [0] 122142720 [58.242 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]
Drive [3] 32768 [16 MB]

Protocol : Universal
Running : Ok

Phone Information ......
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi Note 7
ID : PKQ1.180904.001
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : lavender-user 9 PKQ1.180904.001 V11.0.9.0.PFGINXM release-keys
Miui Ver : V11
Device : lavender
Mod_device : lavender_in_global
Display ID : PKQ1.180904.001
Security Patch : 2020-02-05
Fingerprint : xiaomi/lavender/lavender:9/PKQ1.180904.001/V11.0.9.0.PFGINXM:user/release-keys

Reading GPT[4]
Drive [0] 68 Items
Drive [1] 0 Items
Drive [2] 0 Items
Drive [3]

Removing FRPta...
Method : 0
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOk Ok

Elapsed Time : 00:00:09
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi 9C (angelica) Bootloader Unlock With by Hydra
190400000851_HMTKTool.exe_FM_Bootloader_Unlock_Bootloader_01-26-2022-134645.jpeg

=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port_V1632 (COM50)
Device : 6&33f3d&1&3
SymbolicName :??USB#VID_0E8D&PID_0003#6&33f3d&1&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0

Opened handle..
Handshaking... Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0766 MT6765 [6765]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : E7
SBC : 01 (True)
SLA : 02 (True)
DAA : 04 (True)
SWJTAG : 06 (True)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 20 (True)
MEMWRITE : 40 (True)
CMD_C8 : 80 (True)

Exploiting Device...
Exploit Sent..
Successfully Exploited...
Handshaking... Ok

--- ENABLE AUTO PREL DUMP ----
Found
E:Hydra ToolBackupPreloader_dumpprel.tmp
------------------------------

Handshaking...

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0766 MT6765 [6765]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)

MEID : 94B218617B3113FC186920D3D2E84F4E
Stage 1.. [Size:216440]
Sending : Please wait.. Accepted

Identifying Protocol...
Protocol : New
Synchronization... SYNC
Preloader Initialization...
sing prel.tmp
Init : Accepted
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 437194648BCBA64B83CFCAEC5B5D7F1C
ERAM Size : 0x0000000000038000 -224 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000747C00000 -29,121 GB
eMMC CID : 150100424A544434520944974D04776F - BJTD4R
Executing : ACCEPTED...

Reading GPT -EMMC [0x00008000] 130 Items
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 0 437194648BCBA64B83CFCAEC5B5D7F1C
ERAM Size : 0 0x0000000000038000 -224 KB
IRAM Size : 0 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000747C00000 -29,121 GB
eMMC CID : 150100424A544434520944974D04776F - BJTD4R

Reading GPT -EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Unlock Bootloader
Processing...
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------

Verifying status after operation...
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------
Action Result : Ok

Elapsed Time : 00:00:27
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Huawei Y7 2019 (DUB-LX3) Edl Frp Remove One Click With by Hydra

Brand : HUAWEI Model : DUB-LX3 (Y7 2019) Storage : Auto
Loader: 0009A0E100150065_6bc369511da9cadb_1a1074cf_HUAWEI_QUALCOMM_peek_8953.fhprg
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM17)
SymbolicName :??USB#VID_05C6&PID_9008#6&29132496&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 09/10/2015,2.1.2.0

Getting device info .. . ...
Serial No.: 0xF8FDCC13
HW_ID : 0009A0E100150065
MSM ID : 0x0009A0E1, SDM450-Qualcomm Snapdragon 450
MODEL_ID : 0x0065
OEM_ID : 0x0015 - HUAWEI
PBL Ver : 00000000
PK HASH : 6bc369511da9cadb3a7af61574f89db385003d6241bdd1ff573dba61bf6ae119

Firehose Loader [0009A0E100150065_6bc369511da9cadb_1a1074cf_HUAWEI_QUALCOMM_peek_8953.fhprg]
--------------------------------------------------
Header Type : OLD
TargetMSM : 8953
Tag : _peek
Version : 3
Code_size : 288
Signature_size : 256
fhVendor : QUALCOMM
HW_ID : 0009A0E100150065
Vendor : HUAWEI
OEM_ID : 0015
MODEL_ID : 0065
SW_ID : 0000000000000003
APP_ID :
pk_hash : 6bc369511da9cadb3a7af61574f89db385003d6241bdd1ff573dba61bf6ae119
OEM_VERSION : SIA1000073848
IMAGE_VARIANT : JAADANAZA
QC_VERSION : BOOT.BF.3.3.2-00019
--------------------------------------------------

SaharaBoot... Ok
Sending .............b Okb0
Connecting to Firehose...
Ping ... Ok
Configuration.......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8953
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 3797470
Firmware Version : 0
Product Name : hC9aP3
Physical titions : 3
Total Logical Blocks:
Drive [0] 122142720 [58.242 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]

Protocol : Universal
Running : Ok

Phone Information .....
Vendor : unknown
ID : OPM1.171019.011
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : generic_a53-user 8.1.0 OPM1.171019.011 eng.jenkin.20210205.113911 test-keys
Display ID : System 8.2.0.036(1UW5)
Security Patch : 2020-09-01

Reading GPT[3]
Drive [0] 60 Items
Drive [1] 0 Items
Drive [2] 0 Items

Removing FRPta...
Method : 0
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOk Ok

Rebooting Phone.... Ok
If not rebooted, Please Power on Manually

Elapsed Time : 00:00:05
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi 9 (lancelot) Bootloader Unlock With by Hydra

====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port (COM25)
Device : 6&2ec5e233&0&5
SymbolicName :??USB#VID_0E8D&PID_0003#6&2ec5e233&0&5#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2016,3.2

Opened handle..
Handshaking... Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0707 MT6768 [6768]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : E7
SBC : 01 (True)
SLA : 02 (True)
DAA : 04 (True)
SWJTAG : 06 (True)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 20 (True)
MEMWRITE : 40 (True)
CMD_C8 : 80 (True)

Exploiting Device...
Exploit Sent..
Successfully Exploited...
Handshaking... Ok

--- ENABLE AUTO PREL DUMP ----
Found
C:Hydra ToolBackupPreloader_dumpprel.tmp
------------------------------

Handshaking...

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0707 MT6768 [6768]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)

MEID : 990E5A76234B64884381F83A65ECD875
Stage 1.. [Size:256504]
Sending : Please wait.. Accepted

Identifying Protocol...
Protocol : New
Synchronization... SYNC
Preloader Initialization...
sing prel.tmp
Init : Accepted
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : E7B638570126C91D9FEAA40EFEFEEF1C
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58,242 GB
eMMC CID : 15010044503644414203B75568679793 - DP6DAB
Executing : ACCEPTED...

Reading GPT -EMMC [0x00008000] 130 Items

Autobackup titions
-preloader [0x00000000] 512 KB -> preloader.bin...0 Ok
-> Renaming Preloader.... preloader_lancelot.bin
Creating Scatter file... C:Hydra ToolBackupAuto0707__012622193944MT6768_Android_scatter.txt
-pgpt [0x00000000] 32 KB -> pgpt.bin...0 Ok
-frp [0x05508000] 1024 KB -> frp.bin...0 Ok
-nvdata [0x0C4A2000] 64 MB -> nvdata.bin...0 Ok
-persist [0x104A2000] 48 MB -> persist.bin...0 Ok
-protect1 [0x164A2000] 8 MB -> protect1.bin...0 Ok
-protect2 [0x16CA2000] 11,367 MB -> protect2.bin...0 Ok
-nvram [0x19F00000] 64 MB -> nvram.bin...0 Ok
Done!!!
C:Hydra ToolBackupAuto0707__012622193944
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 1 E7B638570126C91D9FEAA40EFEFEEF1C
ERAM Size : 1 0x0000000000070000 -448 KB
IRAM Size : 1 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58,242 GB
eMMC CID : 15010044503644414203B75568679793 - DP6DAB

Reading GPT -EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Unlock Bootloader
Processing...
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------

Verifying status after operation...
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------
Action Result : Ok

Elapsed Time : 00:00:39
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi Note 8 (ginkgo) Edl Format Userdata One Click With by Hydra

Brand : XIAOMI Model : Redmi Note 8 (ginkgo) Storage : Auto
Loader: 0010A0E100720000_1bebe3863a6781db_76196dc8_XIAOMI.fhprg
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM8)
SymbolicName :??USB#VID_05C6&PID_9008#6&61bf49f&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 08/02/2017,2.1.2.7

Getting device info .. Okc
Device MODE : Firehose
Connecting to Firehose...
Ping ..................... Ok
Configuration.........
Identifying Chip....
Ok
Chip Configuration :
MemoryName : c eMMC
MaxPayloadSizeToTargetInBytes : c 16384
MaxPayloadSizeToTargetInBytesSupported : c 16384
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : c 4096
TargetName :
Version : c 1
DateTime : c Jul 3 2019 - 22:23:56

*** STORAGE DEVICE INFO ***
Memory Type : c eMMC
Block Size in Bytes : c 512
Page Size : c 512
Manufacturer ID : c 19
Serial Number : c 394286107
Firmware Version : c 4
Product Name : c S0J9K8
Physical titions : c 4
Total Logical Blocks:
Drive [0] c 122142720 [58.242 GB]
Drive [1] c 8192 [4 MB]
Drive [2] c 8192 [4 MB]
Drive [3] c 32768 [16 MB]

Protocol : c Universal
Running : Ok

Phone Information ......
Vendor : Xiaomi
ID : QKQ1.200114.002
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Miui Ver : V12
Mod_device : ginkgo_in_global
Security Patch : 2021-01-01

Reading GPT[4]
Drive [0] c 88 Items
Drive [1] c 0 Items
Drive [2] c 0 Items
Drive [3]

Formatting Userdata...
Method :
Auto
Processing... c
- Formatting Userdata
Executing ...c
- Formatting Userdata [Safe Format - eMMc] OkOkc Ok
c
Elapsed Time : 00:00:08
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Realme 8 5G (RMX2341) Bootloader Unlock One Click With by Hydra

=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port_V1633 (COM8)
Device : 5&53c06f5&0&3
SymbolicName :??USB#VID_0E8D&PID_0003#5&53c06f5&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0

Opened handle..

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 5A2B8AD5AE89B666212FE997FD570571
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
UFS LU0 Size: 0x0000000000400000 -4 MB
UFS LU1 Size: 0x0000000000400000 -4 MB
UFS LU2 Size: 0x0000001DCB000000 -119.172 GB
UFS CID : -'01H9HQ15AFAMBDAR
UFS UNIQID : 20092EA50320

Reading GPT0 -UFS [0x00008000] 0 130 Items


-------------------------------------
Operation : Unlock Bootloader
Processing...
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------

Verifying status after operation...
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------
Action Result : 0 Ok

Elapsed Time : 00:00:02
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Huawei Y6P 2020 (MED-LX9) Remove Huawei Account in Flash Mode One Click With by Hydra

=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port (COM33)
Device : 5&36f1b564&0&2
SymbolicName :??USB#VID_0E8D&PID_0003#5&36f1b564&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0

Opened handle..

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 71880D2379CED9C299E79B99DD408B72
ERAM Size : 0x0000000000038000 -224 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 150100525036344D42014D27CE7CB605 - RP64MB

Reading GPT -EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Remove Account
Processing...
Backing up tition for safety...
-oeminfo_012922183649.bin [0x04900000] 32 MB -> oeminfo_012922183649.bin...0 Ok
Action Result : Ok

Elapsed Time : 00:00:06
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Vivo Y91 (V1818C) Format Userdata İn Edl Mode One Click With by Hydra

Brand : VIVO Model : Y91 (V1818C) Storage : Auto
Loader: 000BF0E100000000_60ba997fef6da9f0_aa167c34_QUALCOMM_VIVO_wut_peek_8937.fhprg
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM20)
SymbolicName :??USB#VID_05C6&PID_9008#6&df2ee03&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 03/19/2014,2.1.1.2

Getting device info .. Ok
Device MODE : Firehose
Connecting to Firehose...
Ping .. Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 1831090197
Firmware Version : 875573296
Product Name : hB8aP>
Physical titions : 3
Total Logical Blocks:
Drive [0] 61071360 [29.121 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]

Protocol : Universal
Running : Ok

Phone Information .....
Brand : vivo
Vendor : vivo
Model : vivo 1807
ID : OPM1.171019.026
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : msm8937_64-user 8.1.0 OPM1.171019.026 eng.compil.20210412.120019 release-keys
Device : msm8937_64
Display ID : OPM1.171019.026 release-keys
Security Patch : 2021-03-01
Emmc_size : 16GB
Platform : =SDM439
Fingerprint : vivo/1807/1807:8.1.0/OPM1.171019.026/compil04121200:user/release-keys

Reading GPT[3]
Drive [0] 60 Items
Drive [1] 0 Items
Drive [2] 0 Items

Formatting Userdata...
Method :
Auto
Processing...
- Formatting Userdata
Executing ...
- Formatting Userdata [Safe Format - eMMc] 0 **WARNING Unauthorized tag '' 1 <?xml version="1.0" encoding="UTF-8" ?><data><response value="NAK" /></data>Failed
- Formatting Userdata [Zero Wipe] 0 **WARNING Unauthorized tag '' 1 <?xml version="1.0" encoding="UTF-8" ?><data><response value="NAK" /></data>Failed
- Formatting Userdata [Erase Safety Tag] OkOk Ok

Elapsed Time : 00:00:05
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Vivo Y53 Edl Format Userdata One Click With by Hydra

Brand : VIVO Model : Y53 Storage : Auto
Loader: 000560E100000000_60ba997fef6da9f0_203cb924_QUALCOMM_VIVO_peek_8917.fhprg
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM21)
SymbolicName :??USB#VID_05C6&PID_9008#5&179203b4&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 03/25/2016,2.1.2.2

Getting device info .. Ok
Device MODE : Firehose
Connecting to Firehose...
Ping .. Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8917
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 3900020434
Firmware Version : 13
Product Name : QE13MB
Physical titions : 3
Total Logical Blocks:
Drive [0] 30535680 [14,561 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]

Protocol : Universal
Running : Ok

Phone Information .....
Brand : vivo
Vendor : vivo
Model : vivo PD1628F_EX
ID : MMB29M
SDK : 23
Release : 6.0.1
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-US
Description : msm8937_32-user 6.0.1 MMB29M eng.compiler.20190105.211334 release-keys
Device : PD1628F_EX
Board : QC_Reference_Phone
Display ID : MMB29M release-keys
Security Patch : 2018-08-01
Emmc_size : 16GB
Platform : msm8937
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : vivo/PD1628F_EX/PD1628F_EX:6.0.1/MMB29M/compiler01052117:user/release-keys

Reading GPT[3]
Drive [0] 52 Items
Drive [1] 0 Items
Drive [2] 0 Items

Formatting Userdata...
Method :
Auto
Processing...
- Formatting Userdata
Executing ...
- Formatting Userdata [Safe Format - eMMc] OkOk Ok

Elapsed Time : 00:00:06
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi 9 (lancelot) Bootloader Unlock One Click With by Hydra

=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port_V1633 (COM3)
Device : 5&2a35e47&0&3
SymbolicName :??USB#VID_0E8D&PID_0003#5&2a35e47&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0

Opened handle..

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : E6251A29A6CA7E84C7B63ABBBAE0E941
ERAM Size : 0x0000000000038000 -224 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 150100434A54443452044E86BEEC8793 - CJTD4R

Reading GPT -EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Unlock Bootloader
Processing...
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------

Verifying status after operation...
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------
Action Result : Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:03

}
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Vivo Y53 Frp Remove in Flash mode One Click With done by Hydra

Brand : VIVO Model : Y53 Storage : Auto
Loader: 000560E100000000_60ba997fef6da9f0_203cb924_QUALCOMM_VIVO_peek_8917.fhprg
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : HS-USB Diagnostics 9008 (COM10)
SymbolicName :??USB#VID_05C6&PID_9008#6&3a34e632&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/20/2017,2.1.2.2

Getting device info .. . ...
Serial No.: 0xA5821080
HW_ID : 000560E100000000
MSM ID : 0x000560E1, MSM8917-Qualcomm Snapdragon 425
MODEL_ID : 0x0000
OEM_ID : 0x0000 - QUALCOMM
PBL Ver : 00000000
PK HASH : 60ba997fef6da9f05885fa11f1dd6d2a90d052a257a09c2075d7246cc73c0d43

Firehose Loader [000560E100000000_60ba997fef6da9f0_203cb924_QUALCOMM_VIVO_peek_8917.fhprg]
--------------------------------------------------
Header Type : OLD
TargetMSM : 8917
Tag : _peek
Version : 3
Code_size : 288
Signature_size : 256
fhVendor : VIVO
HW_ID : 000560E100000000
Vendor : QUALCOMM
OEM_ID : 0000
MODEL_ID : 0000
SW_ID : 0000000000000003
APP_ID :
pk_hash : 60ba997fef6da9f05885fa11f1dd6d2a90d052a257a09c2075d7246cc73c0d43
OEM_VERSION : compiler026
IMAGE_VARIANT : LAADANAZA
QC_VERSION : BOOT.BF.3.3-00199
--------------------------------------------------

SaharaBoot... Ok
Sending .................b Okb0
Connecting to Firehose...
Ping ... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8917
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 919050760
Firmware Version : 165
Product Name : HAG4a2
Physical titions : 3
Total Logical Blocks:
Drive [0] 30777344 [14.676 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]

Protocol : Universal
Running : Ok

Phone Information .....
Brand : vivo
Vendor : vivo
Model : vivo PD1628F_EX
ID : MMB29M
SDK : 23
Release : 6.0.1
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-US
Description : msm8937_32-user 6.0.1 MMB29M eng.compiler.20190105.211334 release-keys
Device : PD1628F_EX
Board : QC_Reference_Phone
Display ID : MMB29M release-keys
Security Patch : 2018-08-01
Emmc_size : 16GB
Platform : msm8937
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : vivo/PD1628F_EX/PD1628F_EX:6.0.1/MMB29M/compiler01052117:user/release-keys

Reading GPT[3]
Drive [0] 52 Items
Drive [1] 0 Items
Drive [2] 0 Items

Removing FRPta...
Method : 0
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOk Ok

Rebooting Phone.... Ok
If not rebooted, Please Power on Manually

Elapsed Time : 00:00:05
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi 6A (cactus) Bootloader Unlock Done in Flash Mode One Click With by Hydra

====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port_V1632 (COM15)
Device : 6&d090d12&0&2
SymbolicName :??USB#VID_0E8D&PID_0003#6&d090d12&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0

Opened handle..
Handshaking... Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0766 MT6765 [6765]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : E7
SBC : 01 (True)
SLA : 02 (True)
DAA : 04 (True)
SWJTAG : 06 (True)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 20 (True)
MEMWRITE : 40 (True)
CMD_C8 : 80 (True)

Exploiting Device...
Exploit Sent..
Successfully Exploited...
Handshaking... Ok

--- ENABLE AUTO PREL DUMP ----
Found
C:Hydra ToolBackupPreloader_dumpprel.tmp
------------------------------

Handshaking...

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0766 MT6765 [6765]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)

MEID : A8C597F5E4FF1ECBE4C9E964960BE56F
Stage 1.. [Size:216440]
Sending : Please wait.. Accepted

Identifying Protocol...
Protocol : New
Synchronization... [ERROR]- NOT SYNC
=============================================
Reasons why it fails due to the following"
1. Harware problem/issues
2. If you did Testpoint Kindly check the ts you Touch/TP
3. Powershortage, try to connect Battery
4. Check or replace usb cable and plug directly to your pc usb port.
=============================================
SYNC
Preloader Initialization...
sing prel.tmp
Init : Accepted
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : AF4D83929C83DC8FE7F249280B
ERAM Size : 0x0000000000038000 -224 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 150100474436424D4201E646D35FA5BB - GD6BMB
Executing : ACCEPTED...

Reading GPT0 -EMMC [0x00008000] 0 130 Items

Reading System Info
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi 6A
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : zh-CN
Description : cactus-user 9 PPR1.180610.011 V11.0.5.0.PCBCNXM release-keys
Miui Ver : V11
Device : cactus
Display ID : SW_S98506AE1_V009_M13_XM_C3C_USR
Security Patch : 2020-03-01
Fingerprint : xiaomi/cactus/cactus:9/PPR1.180610.011/V11.0.5.0.PCBCNXM:user/release-keys
StorageType : mtp
Userdata State : Encrypted
0
Autobackup titions
-preloader [0x00000000] 512 KB -> preloader.bin...1 Ok0
-> Renaming Preloader.... preloader_cactus.bin0
Creating Scatter file... C:Hydra ToolBackupAuto0766_xiaomi_cactus_cactus_9_PPR1.180610.011_V11.0.5.0.PCBCNXM_020122123145MT6765_Android_scatter.txt
-pgpt [0x00000000] 32 KB -> pgpt.bin...1 Ok
-frp [0x05588000] 1024 KB -> frp.bin...1 Ok
-nvdata [0x07688000] 64 MB -> nvdata.bin...1 Ok
-protect1 [0x0D688000] 8 MB -> protect1.bin...1 Ok
-protect2 [0x0DE88000] 9.469 MB -> protect2.bin...1 Ok
-persist [0x0F000000] 64 MB -> persist.bin...1 Ok
-nvram [0x1BE80000] 64 MB -> nvram.bin...1 Ok
Done!!!0
C:Hydra ToolBackupAuto0766_xiaomi_cactus_cactus_9_PPR1.180610.011_V11.0.5.0.PCBCNXM_020122123145
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 2 AF4D83929C83DC8FE7F249280B
ERAM Size : 2 0x0000000000038000 -224 KB
IRAM Size : 2 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 150100474436424D4201E646D35FA5BB - GD6BMB

Reading GPT0 -EMMC [0x00008000] 0 130 Items
0

Reading System Info
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi 6A
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : zh-CN
Description : cactus-user 9 PPR1.180610.011 V11.0.5.0.PCBCNXM release-keys
Miui Ver : V11
Device : cactus
Display ID : SW_S98506AE1_V009_M13_XM_C3C_USR
Security Patch : 2020-03-01
Fingerprint : xiaomi/cactus/cactus:9/PPR1.180610.011/V11.0.5.0.PCBCNXM:user/release-keys
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Permanent Unlock Redmi 6/6A
Processing...
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------

ACK : 0xC0010003[STATUS_UNSUPPORT_CMD]
ACK : 0xC0010003[STATUS_UNSUPPORT_CMD]
ACK : 0xC0010003[STATUS_UNSUPPORT_CMD]
Verifying status after operation...
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------
Action Result : 0 Ok

Elapsed Time : 00:00:54
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Samsung Galaxy A01 Edl Frp Remove done by Hydra

Brand : SAMSUNG Model : Galaxy A01 Storage : Auto
Loader: 000BF0E100200000_3cc959ac5b3364a4_2ead7cbd_SAMSUNG_SAMSUNG CORPORATION_8937.fhprg
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM3)
SymbolicName :??USB#VID_05C6&PID_9008#6&2c3ff1f8&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 08/02/2017,2.1.2.7

Getting device info .. Ok
Device MODE : Firehose
Connecting to Firehose...
Ping .. Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 233689614
Firmware Version : 3
Product Name : QE63MB
Physical titions : 3
Total Logical Blocks:
Drive [0] 30777344 [14.676 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]

Protocol : Universal
Running : Ok

Failed to read information from phone.

Reading GPT[3]
Drive [0] 128 Items
Drive [1] 0 Items
Drive [2] 0 Items

Removing FRPta...
Method : 0
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] Ok
- Removing FRP [Zero Wipe] OkOk
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] Ok
- Removing FRP [Zero Wipe] OkOk Ok

Elapsed Time : 00:00:03
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi Note 8 (ginkgo) Edl Format Userdata done by Hydra

Brand : XIAOMI Model : Redmi Note 8 (ginkgo) Storage : Auto
Loader: 0010A0E100720000_1bebe3863a6781db_76196dc8_XIAOMI.fhprg
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM10)
SymbolicName :??USB#VID_05C6&PID_9008#6&61bf49f&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 08/02/2017,2.1.2.7

Getting device info .. Ok
Device MODE : Firehose
Connecting to Firehose...
Ping ..................... Ok
Configuration.........
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Jul 3 2019 - 22:23:56

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 19
Serial Number : 382286695
Firmware Version : 4
Product Name : S0J9K8
Physical titions : 4
Total Logical Blocks:
Drive [0] 122142720 [58.242 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]
Drive [3] 32768 [16 MB]

Protocol : Universal
Running : Ok

Phone Information ......
Vendor : Xiaomi
ID : RKQ1.201004.002
SDK : 30
Release : 11
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Miui Ver : V125
Mod_device : ginkgo_in_global
Security Patch : 2021-12-01

Reading GPT[4]
Drive [0] 88 Items
Drive [1] 0 Items
Drive [2] 0 Items
Drive [3]

Formatting Userdata...
Method :
Auto
Processing...
- Formatting Userdata
Executing ...
- Formatting Userdata [Safe Format - eMMc] OkOk Ok

Elapsed Time : 00:00:08
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Y9 Prime 2019 (STK-LX3) Frp Remove Done by Hydra

Searching Device By Fastboot
Device Found...

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Reading Device Information...
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
hotainfo......
#hotainfo_len : 0x0000005D
#C_version : C605
#D_version : D1
#PLMN : 732101
#BoardID : 7709
#DeviceName : STK-L23B
Build number : STK-L23B 9.0.1.182(C605E7R2P2)
Product Model : STK-LX3
hwnff_ver : Ver2.3
key_version : huawei_key_v1
product : kirin710
system_update_state :
vendorcountry : hw/la
soc_id :
ro_build_fingerprint :
ro_build_version_full :
ro_build_version_qcom :
psid.........
#SN : ***************
#IMEI1 : ***************
#IMEI2 : ***************

Security Info....
#Dongle_info : RSA-2048,0x9001,0x7000,0x6000,0x5100,0x5000
#FB Lock State : UNLOCKED
#USER Lock State : LOCKED

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Huawei Fastboot Service...
Factory Reset Protection...
Removing.... Ok

Elapsed Time : 00:00:01
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Vivo V5 Plus (1611) Edl Format Factory Done by Hydra

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM85)
SymbolicName :??USB#VID_05C6&PID_9008#5&8b543b&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 03/19/2014,2.1.1.2

Getting device info .. Ok
Device MODE : Firehose
Connecting to Firehose...
Ping .. Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8953
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 3662924017
Firmware Version : 5
Product Name : RH64MB
Physical titions : 3
Total Logical Blocks:
Drive [0] 122142720 [58.242 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]

Protocol : Universal
Running : Ok

Phone Information .....
Brand : vivo
Vendor : vivo
Model : vivo 1611
ID : N2G47H
SDK : 25
Release : 7.1.2
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : msm8953_64-user 7.1.2 N2G47H eng.compil.20191015.144423 release-keys
Device : PD1624F_EX
Board : msm8953
Display ID : N2G47H release-keys
Security Patch : 2019-10-01
Emmc_size : 16GB
Platform : msm8953
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : vivo/1611/1611:7.1.2/N2G47H/compil10151444:user/release-keys

Reading GPT[3]
Drive [0] 52 Items
Drive [1] 0 Items
Drive [2] 0 Items

Formatting Userdata...
Method :
Auto
Processing...
- Formatting Userdata
Executing ...
- Formatting Userdata [Safe Format - eMMc] OkOk Ok

Elapsed Time : 00:00:02
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi Note 8 Pro (begonia) Bootloader Unlock done by Hydra

=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port (COM4)
Device : 6&1b228727&0&3
SymbolicName :??USB#VID_0E8D&PID_0003#6&1b228727&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2016,3.2

Opened handle..
Handshaking... Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0813 MT6785 [6785]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : E7
SBC : 01 (True)
SLA : 02 (True)
DAA : 04 (True)
SWJTAG : 06 (True)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 20 (True)
MEMWRITE : 40 (True)
CMD_C8 : 80 (True)

Exploiting Device...
Exploit Sent..
Successfully Exploited...
Handshaking... Ok

--- ENABLE AUTO PREL DUMP ----
Found
C:Hydra ToolBackupPreloader_dumpprel.tmp
------------------------------

Handshaking...

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0813 MT6785 [6785]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)

MEID : 3AAC5F237DA2DBDAEB33FF06EA6DA751
Stage 1.. [Size:234968]
Sending : Please wait.. Accepted

Identifying Protocol...
Protocol : New
Synchronization... SYNC
Preloader Initialization...
sing prel.tmp
Init : Accepted
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 9153E87ECC9FEA8E618BF6BC68D4B3DF
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x0000000200000000 -8 GB
UFS LU0 Size: 0x0000000000400000 -4 MB
UFS LU1 Size: 0x0000000000400000 -4 MB
UFS LU2 Size: 0x0000001DCB000000 -119.172 GB
UFS CID : -'01H9HQ16AFAMMDAR
UFS UNIQID : 0356741cd1c1000000000000
Executing : ACCEPTED...

Reading GPT0 -UFS [0x00008000] 0 130 Items

Reading System Info
Vendor : Xiaomi
ID : RP1A.200720.011
SDK : 30
Release : 11
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : zh-CN
Description : begonia-user 11 RP1A.200720.011 V12.5.2.0.RGGCNXM release-keys
Miui Ver : V125
Display ID : RP1A.200720.011
Security Patch : 2021-08-01
StorageType : mtp
Userdata State : Not Encrypted
0
Autobackup titions
-preloader [0x00000000] 512 KB -> preloader.bin... Ok0
-> Renaming Preloader.... preloader_begonia.bin0
Creating Scatter file... C:Hydra ToolBackupAuto0813__020422095138MT6785_Android_scatter.txt
-pgpt [0x00000000] 32 KB -> pgpt.bin... Ok
-frp [0x05888000] 1024 KB -> frp.bin... Ok
-nvdata [0x08188000] 64 MB -> nvdata.bin... Ok
-persist [0x0E188000] 70.469 MB -> persist.bin... Ok
-protect1 [0x12800000] 8 MB -> protect1.bin... Ok
-protect2 [0x13000000] 8 MB -> protect2.bin... Ok
-nvram [0x17580000] 64 MB -> nvram.bin... Ok
Done!!!0
C:Hydra ToolBackupAuto0813__020422095138
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 1 9153E87ECC9FEA8E618BF6BC68D4B3DF
ERAM Size : 1 0x0000000000080000 -512 KB
IRAM Size : 1 0x0000000200000000 -8 GB
UFS LU0 Size: 0x0000000000400000 -4 MB
UFS LU1 Size: 0x0000000000400000 -4 MB
UFS LU2 Size: 0x0000001DCB000000 -119.172 GB
UFS CID : -'01H9HQ16AFAMMDAR
UFS UNIQID : 0356741cd1c1000000000000

Reading GPT0 -UFS [0x00008000] 0 130 Items
0

Reading System Info
Vendor : Xiaomi
ID : RP1A.200720.011
SDK : 30
Release : 11
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : zh-CN
Description : begonia-user 11 RP1A.200720.011 V12.5.2.0.RGGCNXM release-keys
Miui Ver : V125
Display ID : RP1A.200720.011
Security Patch : 2021-08-01
StorageType : mtp
Userdata State : Not Encrypted

-------------------------------------
Operation : Unlock Bootloader
Processing...
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------

Verifying status after operation...
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------
Action Result : 0 Ok

Rebooting Device 0 [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:58
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Realme C21Y (RMX3261,RMX3263) DIAG Mode Read SIM Lock Status One Clik done by Hydra

Port : [Auto] Scanning... COM16
Opening Port... (COM16) Ok
Entering Diag...Please wait..

Closing Port... Ok..
Port : [Auto] Scanning... COM16
Opening Port... (COM16) Ok
Reading Diag Info....

Bluetooth : 0000000A000D
WiFi : 0A0000000000
------------------------------------------
Simlock...
------------------------------------------
Executing... Read Simlock Status
Action Result.. Ok
Repowering Phone....
Done!!!

Elapsed Time : 00:00:02
 

Attachments

  • 201200010918_HSPRDTool.exe_Read_Simlock-Status_02-04-2022-164412.jpeg
    201200010918_HSPRDTool.exe_Read_Simlock-Status_02-04-2022-164412.jpeg
    153.4 KB · Views: 1

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi Note 10s (rosemary) İmei Repair One Click done by Hydra

=====================================
***IMEI REPAIR FUNCTION****
Xiaomi Flashmode
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port_V1633 (COM13)
Device :7&1ee38e0d&0&1
SymbolicName :\??\USB#VID_0E8D&PID_0003#7&1ee38e0d&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0


Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : EE2C2867FCEE40371627C0C652871271
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x0000000180000000 -6 GB
UFS LU0 Size: 0x0000000000400000 -4 MB
UFS LU1 Size: 0x0000000000400000 -4 MB
UFS LU2 Size: 0x0000001DCB000000 -119,172 GB
UFS CID : ,MT128GASAO4U21
UFS UNIQID : 1e16c2be4f14f2042100000000000000

Reading GPT-UFS [0x00008000] 130 Items

IMEI INFO..
IMEI1 : 355************
IMEI2 : 355************
IMEI INFO..
IMEI1 : FFFFFFFFFFFFFFF
IMEI2 : 35810**********

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:03
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Vivo Y53 Edl Format Userdata done by Hydra

Brand : VIVO Model : Y53 Storage : Auto
Loader: 000560E100000000_60ba997fef6da9f0_203cb924_QUALCOMM_VIVO_peek_8917.fhprg
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM4)
SymbolicName :??USB#VID_05C6&PID_9008#6&1f283aba&0&6#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 08/02/2017,2.1.2.7

Getting device info .. Ok
Device MODE : Firehose
Connecting to Firehose...
Ping .. Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8917
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 2537401503
Firmware Version : 13
Product Name : QE13MB
Physical titions : 3
Total Logical Blocks:
Drive [0] 30535680 [14.561 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]

Protocol : Universal
Running : Ok

Phone Information .....
Brand : vivo
Vendor : vivo
Model : vivo PD1628F_EX
ID : MMB29M
SDK : 23
Release : 6.0.1
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-US
Description : msm8937_32-user 6.0.1 MMB29M eng.compiler.20190105.211334 release-keys
Device : PD1628F_EX
Board : QC_Reference_Phone
Display ID : MMB29M release-keys
Security Patch : 2018-08-01
Emmc_size : 16GB
Platform : msm8937
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : vivo/PD1628F_EX/PD1628F_EX:6.0.1/MMB29M/compiler01052117:user/release-keys

Reading GPT[3]
Drive [0] 52 Items
Drive [1] 0 Items
Drive [2] 0 Items

Formatting Userdata...
Method :
Auto
Processing...
- Formatting Userdata
Executing ...
- Formatting Userdata [Safe Format - eMMc] OkOk Ok

Elapsed Time : 00:00:04
 
Top