★★★ Post All Successfully Repaired Phones By Hydra Tool ★★★

argysees

Active Member
Jun 11, 2020
36
15
indonesia
XIAMI REDMI 8 (OLIVE) MI ACCOUNT REMOVE DONE By HYDRA

Screenshot (2).png

- Tick Brand : Xiaomi
- Model Redmi 8 (Olive)
- Click BOOT/iNFO Then Test Point
- Don' Un Plug Usb And On Tab Select Xiaomi
- Select Mi Account
- Select Remove MiAccount(New Metode)
- Click Execute
- Wait Process And Done
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi Note 5 (vince) Edl Frp Remove done by Hydra
190300000463_HQTool.exe_EDL_FRP_RemoveAuto_02-07-2022-130320.jpeg

Brand : XIAOMI Model : Redmi Note 5 (Vince) Storage : Auto
Loader: 000460E100000000_57158eaf1814d78f_ffd16e82_QUALCOMM_XIAOMI_peek_8953.fhprg
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM15)
SymbolicName :??USB#VID_05C6&PID_9008#5&115a75a8&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 07/08/2015,2.1.2.0

Getting device info .. Ok
Device MODE : Firehose
Connecting to Firehose...
Ping .. Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8953
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 873738735
Firmware Version : 165
Product Name : HBG4a2
Physical titions : 3
Total Logical Blocks:
Drive [0] 61071360 [29,121 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]

Protocol : Universal
Running : Ok

Phone Information .....
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi 5 Plus
ID : OPM1.171019.019
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : vince-user 8.1.0 OPM1.171019.019 V11.0.2.0.OEGMIXM release-keys
Miui Ver : V11
Device : vince
Mod_device : vince_global
Board : msm8953
Display ID : ZQL1711-vince-build-20191108142512
Security Patch : 2019-10-01
Emmc_size : 16GB
Platform : msm8953
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : xiaomi/vince/vince:8.1.0/OPM1.171019.019/V11.0.2.0.OEGMIXM:user/release-keys

Reading GPT[3]
Drive [0] 52 Items
Drive [1] 0 Items
Drive [2] 0 Items

Removing FRPta...
Method :
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOk Ok

Elapsed Time : 00:00:03
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi 9C (angelica) Bootloader Unlock done With by Hydra

=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port (COM16)
Device : 6&3af0f9ce&0&14
SymbolicName :??USB#VID_0E8D&PID_0003#6&3af0f9ce&0&14#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2016,3.0.1504.0

Opened handle..

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 99F74B15546F6508640BB4D122AC7
ERAM Size : 0x0000000000038000 -224 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58,242 GB
eMMC CID : 45010044413430363401CA3D5E4598F9 - DA4064

Reading GPT -EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Unlock Bootloader
Processing...
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------

Verifying status after operation...
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------
Action Result : Ok

Elapsed Time : 00:00:02
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi Note 8 (ginkgo) Edl Frp Remove With by Hydra

Brand : XIAOMI Model : Redmi Note 8 (ginkgo) Storage : Auto
Loader: 0010A0E100720000_1bebe3863a6781db_76196dc8_XIAOMI.fhprg
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM47)
SymbolicName :??USB#VID_05C6&PID_9008#7&1bb086bd&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 08/02/2017,2.1.2.7

Getting device info .. Ok
Device MODE : Firehose
Connecting to Firehose...
Ping ..................... Ok
Configuration.........
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Jul 3 2019 - 22:23:56

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 1364596900
Firmware Version : 925904944
Product Name : hDEaP3
Physical titions : 4
Total Logical Blocks:
Drive [0] 244285440 [116,484 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]
Drive [3] 32768 [16 MB]

Protocol : Universal
Running : Ok

Phone Information ......
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi Note 8
ID : PKQ1.190616.001
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : ginkgo-user 9 PKQ1.190616.001 V11.0.7.0.PCOIDXM release-keys
Miui Ver : V11
Device : ginkgo
Mod_device : ginkgo_id_global
Display ID : PKQ1.190616.001
Security Patch : 2020-09-01
Fingerprint : xiaomi/ginkgo/ginkgo:9/PKQ1.190616.001/V11.0.7.0.PCOIDXM:user/release-keys

Reading GPT[4]
Drive [0] 88 Items
Drive [1] 0 Items
Drive [2] 0 Items
Drive [3]

Removing FRPta...
Method :
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOk Ok

Rebooting Phone.... Ok
If not rebooted, Please Power on Manually

Elapsed Time : 00:00:03
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Oppo A37 Edl Format Userdata done With by Hydra

Brand : OPPO Model : A37 Storage : Auto
Loader: 007050E100000000_99c8c13e374c34d8_959439aa_QUALCOMM_LENOVO_peek_8916.fhprg
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM17)
SymbolicName :??USB#VID_05C6&PID_9008#6&31f1d36d&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 08/31/2015,2.1.2.0

Getting device info . . ...
Serial No.: 0x24D6A950
HW_ID : 007050E100000000
MSM ID : 0x007050E1, MSM8916-Qualcomm Snapdragon 410
MODEL_ID : 0x0000
OEM_ID : 0x0000 - QUALCOMM
PBL Ver : 00000000
PK HASH : cc3153a80293939b90d02d3bf8b23e0292e452fef662c74998421adad42a380f

Firehose Loader [007050E100000000_99c8c13e374c34d8_959439aa_QUALCOMM_LENOVO_peek_8916.fhprg]
--------------------------------------------------
Header Type : OLD
TargetMSM : 8916
Tag : _peek
Version : 3
Code_size : 96
Signature_size : 256
fhVendor : LENOVO
HW_ID : 007050E100000000
Vendor : QUALCOMM
OEM_ID : 0000
MODEL_ID : 0000
SW_ID : 0000000000000003
APP_ID :
pk_hash : 99c8c13e374c34d8f9afb065ea4c733e6b1b21cbc5a78705f041eb24acdd5fe5
OEM_VERSION :
IMAGE_VARIANT :
QC_VERSION :
--------------------------------------------------

SaharaBoot... Ok
Sending .....b Okb0
Connecting to Firehose...
Ping ... Ok
Configuration.......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8916
Version : 1


Protocol : Universal
Running : Ok

Phone Information .....
Brand : OPPO
Vendor : OPPO
Model : A37f
ID : LMY47V
SDK : 22
Release : 5.1.1
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Description : msm8916_64-user 5.1.1 LMY47V eng.root.20190711.032745 release-keys
Board : msm8916
Display ID : A37fEX_11_190711
Security Patch : 2018-03-01
Platform : msm8916
FRPPST : /dev/block/bootdevice/by-name/config

Reading GPT[3]
Drive [0] 40 Items
Drive [1] 0 Items
Drive [2] 4 Items

Formatting Userdata...
Method : 0
Auto
Processing...
- Formatting Userdata
Executing ...
- Formatting Userdata [Safe Format - eMMc] OkOk Ok

Elapsed Time : 00:00:07
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi Note 8 (ginkgo) Edl Frp Remove with by Hydra

Brand : XIAOMI Model : Redmi Note 8 (ginkgo) Storage : Auto
Loader: 0010A0E100720000_1bebe3863a6781db_76196dc8_XIAOMI.fhprg
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM8)
SymbolicName :??USB#VID_05C6&PID_9008#5&1ab54bf6&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 08/02/2017,2.1.2.7

Getting device info .. . ...
Serial No.: 0xEE9AF9A2
HW_ID : 0010A0E100720000
MSM ID : 0x0010A0E1, SM6125-Qualcomm Snapdragon 665
MODEL_ID : 0x0000
OEM_ID : 0x0072 - XIAOMI
PBL Ver : 00000000
PK HASH : 1bebe3863a6781db4b01086063007334de9e5ca14971c7c4f4358ec9d79cda46

Firehose Loader [0010A0E100720000_1bebe3863a6781db_76196dc8_XIAOMI.fhprg]
--------------------------------------------------
Header Type : New
TargetMSM :
Tag :
Version : 6
Code_size : 816
Signature_size : 256
fhVendor : XIAOMI
HW_ID : 0010A0E100720000
Vendor : XIAOMI
OEM_ID : 0072
MODEL_ID : 0000
SW_ID : 00000003
APP_ID : 00000000
pk_hash : 1bebe3863a6781db4b01086063007334de9e5ca14971c7c4f4358ec9d79cda4692ce5e948c6fd409408f4c919fcadfe3
OEM_VERSION : cibuild
IMAGE_VARIANT : NicobarPkgLAA
QC_VERSION : BOOT.XF.4.0-00149-NICOBARLAZ-1
--------------------------------------------------

SaharaBoot... Ok
Sending ..............................b Okb0
Connecting to Firehose...
Ping ..................... Ok
Configuration.........
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Jul 3 2019 - 22:23:56

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 19
Serial Number : 323198597
Firmware Version : 4
Product Name : S0J9K8
Physical Partitions : 4
Total Logical Blocks:
Drive [0] 122142720 [58,242 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]
Drive [3] 32768 [16 MB]

Protocol : Universal
Running : Ok

Phone Information ......
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi Note 8
ID : PKQ1.190616.001
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : ginkgo-user 9 PKQ1.190616.001 V11.0.7.0.PCOIDXM release-keys
Miui Ver : V11
Device : ginkgo
Mod_device : ginkgo_id_global
Display ID : PKQ1.190616.001
Security Patch : 2020-09-01
Fingerprint : xiaomi/ginkgo/ginkgo:9/PKQ1.190616.001/V11.0.7.0.PCOIDXM:user/release-keys

Reading GPT[4]
Drive [0] 88 Items
Drive [1] 0 Items
Drive [2] 0 Items
Drive [3]

Removing FRPta...
Method : 0
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOk Ok

Elapsed Time : 00:00:08
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi 9A (dandelion) Bootloader Unlock done by Hydra

=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port_V1632 (COM10)
Device : 6&13f4c3e&0&6
SymbolicName :??USB#VID_0E8D&PID_0003#6&13f4c3e&0&6#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0

Opened handle..
Handshaking... Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0766 MT6765 [6765]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : E7
SBC : 01 (True)
SLA : 02 (True)
DAA : 04 (True)
SWJTAG : 06 (True)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 20 (True)
MEMWRITE : 40 (True)
CMD_C8 : 80 (True)

Exploiting Device...
Exploit Sent..
Successfully Exploited...
Handshaking... Ok

--- ENABLE AUTO PREL DUMP ----
Found
C:Hydra ToolBackupPreloader_dumpprel.tmp
------------------------------

Handshaking...

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0766 MT6765 [6765]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)

MEID : E0DC2C1D684C12780BE353CC21FAF286
Stage 1.. [Size:216440]
Sending : Please wait.. Accepted

Identifying Protocol...
Protocol : New
Synchronization... SYNC
Preloader Initialization...
Parsing prel.tmp
Init : Accepted
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 0077839D9F51A28F013E3D02C079B665
ERAM Size : 0x0000000000038000 -224 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000747C00000 -29,121 GB
eMMC CID : 150100424A544434520990AD8E0DB71B - BJTD4R
Executing : ACCEPTED...

Reading GPT -EMMC [0x00008000] 130 Items

Autobackup Partitions
-preloader [0x00000000] 512 KB -> preloader.bin...0 Ok
-> Renaming Preloader.... preloader_k62v1_64_bsp.bin
Creating Scatter file... C:Hydra ToolBackupAuto0766__020922101531MT6765_Android_scatter.txt
-pgpt [0x00000000] 32 KB -> pgpt.bin...0 Ok
-frp [0x3BD88000] 1024 KB -> frp.bin...0 Ok
-nvdata [0x3DE88000] 64 MB -> nvdata.bin...0 Ok
-protect1 [0x45522000] 8 MB -> protect1.bin...0 Ok
-protect2 [0x45D22000] 10,867 MB -> protect2.bin...0 Ok
-persist [0x47000000] 48 MB -> persist.bin...0 Ok
-nvram [0x52E80000] 64 MB -> nvram.bin...0 Ok
Done!!!
C:Hydra ToolBackupAuto0766__020922101531
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 1 0077839D9F51A28F013E3D02C079B665
ERAM Size : 1 0x0000000000038000 -224 KB
IRAM Size : 1 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000747C00000 -29,121 GB
eMMC CID : 150100424A544434520990AD8E0DB71B - BJTD4R

Reading GPT -EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Unlock Bootloader
Processing...
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------

Verifying status after operation...
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------
Action Result : Ok

Elapsed Time : 00:00:44
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Mi A2 Lite (daisy) EDL Frp Remove done by Hydra

Brand : XIAOMI Model : Mi A2 Lite (daisy) Storage : Auto
Loader: 000460E100000000_57158eaf1814d78f_ffd16e82_QUALCOMM_XIAOMI_peek_8953.fhprg
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM83)
SymbolicName :??USB#VID_05C6&PID_9008#5&115a75a8&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 07/08/2015,2.1.2.0

Getting device info .. . ...
Serial No.: 0x92ADDD25
HW_ID : 000460E100000000
MSM ID : 0x000460E1, MSM8953-Qualcomm Snapdragon 625
MODEL_ID : 0x0000
OEM_ID : 0x0000 - QUALCOMM
PBL Ver : 00000000
PK HASH : 57158eaf1814d78fd2b3105ece4db18a817a08ac664a5782a925f3ff8403d39a

Firehose Loader [000460E100000000_57158eaf1814d78f_ffd16e82_QUALCOMM_XIAOMI_peek_8953.fhprg]
--------------------------------------------------
Header Type : OLD
TargetMSM : 8953
Tag : _peek
Version : 3
Code_size : 288
Signature_size : 256
fhVendor : XIAOMI
HW_ID : 000460E100000000
Vendor : QUALCOMM
OEM_ID : 0000
MODEL_ID : 0000
SW_ID : 0000000100000003
APP_ID :
pk_hash : 57158eaf1814d78fd2b3105ece4db18a817a08ac664a5782a925f3ff8403d39a
OEM_VERSION : c3-bsp-builder-job004.bj
IMAGE_VARIANT : JAADANAZA
QC_VERSION : BOOT.BF.3.3-00228
--------------------------------------------------

SaharaBoot... Ok
Sending ...................b Okb0
Connecting to Firehose...
Ping ... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8953
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 1735484819
Firmware Version : 842018864
Product Name : hB8aP>
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 61071360 [29,121 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]

Protocol : Universal
Running : Ok

Phone Information ......
ID : QKQ1.191002.002
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US"
Display ID : QKQ1.191002.002.V11.0.20.0.QDLMIXM
Security Patch : 2021-06-01
Emmc_size : 16GB

Reading GPT[3]
Drive [0] 60 Items
Drive [1] 0 Items
Drive [2] 0 Items

Removing FRPta...
Method : 0
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOk Ok

Elapsed Time : 00:00:04
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Oppo F1S Plus Read Screen Security/PIN/Pattern Done by Hydra

=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port_V1632 (COM4)
Device : 5&11e1c200&0&3
SymbolicName :??USB#VID_0E8D&PID_0003#5&11e1c200&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0

Opened handle..

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 5BC8C3D35E0F65C931B0FB8B7ACFBD9E
ERAM Size : 0x0000000000038000 -224 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 90014A484247346132A40E60F4C65365 - HBG4a2

Reading GPT -EMMC [0x00008000] 130 Items


Reading System Info
Brand : OPPO
Vendor : OPPO
Model : OPPO F1s
ID : LMY47I
SDK : 22
Release : 5.1
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Description : full_oppo6750_15131-user 5.1 LMY47I 1482847378 dev-keys
Device : A59m
Board : full_oppo6750_15131
Display ID : A1601EX_11_A.16_161227
Security Patch : 2016-09-05
Platform : mt6750
FRPPST : /dev/block/platform/mtk-msdc.0/by-name/frp
Fingerprint : OPPO/A59/A59:5.1/LMY47I/1474447292:user/release-keys
StorageType : mtp,mass_storage
Userdata State : Not Encrypted

-------------------------------------
Operation : Read Pattern
Processing...
Searching PatternKey : .0 Found
Gesture Data : F56A6DF0A85F5B0EB1E661B5836ED423542AFA86
Bruteforcing pattern hash..Please wait for few seconds
Pattern Code : 7415369
1 2 3
4 5 6
7 8 9
Action Result : Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:06
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi Note 7 (lavender) EDL Frp Remove done by Hydra

Brand : XIAOMI Model : Redmi Note 7 (lavender) Storage : Auto
Loader: 0008C0E100010000_a7b8b82545a98eca_28f4dc3c_GENERIC_XIAOMI_auth.fhprg
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM40)
SymbolicName :??USB#VID_05C6&PID_9008#7&2f923895&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 08/02/2017,2.1.2.7

Getting device info .. Ok
Device MODE : Firehose
Connecting to Firehose...
Ping ...... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : MSM8996
Version : 1
DateTime : Aug 2 2018 - 22:27:53

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 19
Serial Number : 66292841
Firmware Version : 5644752166968636211
Product Name : S0J97Y
Physical Partitions : 4
Total Logical Blocks:
Drive [0] 61071360 [29.121 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]
Drive [3] 8192 [4 MB]

Protocol : Universal
Running : Ok

Phone Information ......
Vendor : Xiaomi
ID : QKQ1.190910.002
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Miui Ver : V12
Mod_device : lavender_global
Display ID : QKQ1.190910.002 V12.0.1.0.QFGMIXM
Security Patch : 2020-10-01

Reading GPT[4]
Drive [0] 68 Items
Drive [1] 0 Items
Drive [2] 0 Items
Drive [3]

Removing FRPta...
Method :
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOk Ok

Rebooting Phone.... Ok
If not rebooted, Please Power on Manually

Elapsed Time : 00:00:05
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi 6A (cactus) Bootloader Unlock done With by Hydra

=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port_V1632 (COM18)
Device : 6&36559b33&0&2
SymbolicName :??USB#VID_0E8D&PID_0003#6&36559b33&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0

Opened handle..

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : FE79FC9536198FEDECC06D883B0FF23E
ERAM Size : 0x0000000000038000 -224 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003AB400000 -14.676 GB
eMMC CID : 90014A484147346132A5C716CEC18503 - HAG4a2

Reading GPT -EMMC [0x00008000] 130 Items


Reading System Info
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi 6A
ID : O11019
SDK : 27
Release : 8.1.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-GB
Description : cactus-user 8.1.0 O11019 V10.0.2.0.OCBMIFH release-keys
Miui Ver : V10
Device : cactus
Mod_device : cactus_global
Display ID : O11019
Security Patch : 2018-09-01
Fingerprint : xiaomi/cactus/cactus:8.1.0/O11019/V10.0.2.0.OCBMIFH:user/release-keys
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Unlock Bootloader
Processing...
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------

Verifying status after operation...
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------
Action Result : Ok

Elapsed Time : 00:00:04
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi 6 Pro (sakura) FRP Remove done With by Hydra

Brand : XIAOMI Model : Redmi 6 Pro (sakura) Storage : Auto
Loader: 000460E100000000_57158eaf1814d78f_6f50979f_QUALCOMM_XIAOMI_auth_peek_8953.fhprg
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM35)
SymbolicName :??USB#VID_05C6&PID_9008#8&a8f9&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/10/2020,5.1.1.2

Getting device info .. Ok
Device MODE : Firehose
Connecting to Firehose...
Ping .. Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8953
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 1735888978
Firmware Version : 842018864
Product Name : hB8aP>
Physical titions : 3
Total Logical Blocks:
Drive [0] 61071360 [29.121 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]

Protocol : Universal
Running : Ok

Phone Information .....
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi 6 Pro
ID : PKQ1.180917.001
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : sakura_india-user 9 PKQ1.180917.001 V12.0.4.0.PDMMIXM release-keys
Miui Ver : V12
Device : sakura_india
Mod_device : sakura_india_global
Display ID : ZQL1715-sakura_india-build-20201104125201
Security Patch : 2020-09-01
Emmc_size : 16GB
Fingerprint : xiaomi/sakura_india/sakura_india:9/PKQ1.180917.001/V12.0.4.0.PDMMIXM:user/release-keys

Reading GPT[3]
Drive [0] 60 Items
Drive [1] 0 Items
Drive [2] 0 Items

Removing FRPta...
Method :
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOk Ok

Elapsed Time : 00.00.03
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi Note 8 Pro (begonia) Bootloader Unlock done With by Hydra

=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port (COM30)
Device : 5&2d897&0&4
SymbolicName :??USB#VID_0E8D&PID_0003#5&2d897&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2016,3.0.1504.0

Opened handle..
Handshaking... Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0813 MT6785 [6785]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : E7
SBC : 01 (True)
SLA : 02 (True)
DAA : 04 (True)
SWJTAG : 06 (True)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 20 (True)
MEMWRITE : 40 (True)
CMD_C8 : 80 (True)

Exploiting Device...
Exploit Sent..
Successfully Exploited...
Handshaking... Ok

--- ENABLE AUTO PREL DUMP ----
Found
D:Hydra ToolBackupPreloader_dumpprel.tmp
------------------------------

Handshaking...

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0813 MT6785 [6785]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)

MEID : 531B82EC9E0C15F99CBDE27EE082CFF9
Stage 1.. [Size:234968]
Sending : Please wait.. Accepted

Identifying Protocol...
Protocol : New
Synchronization... SYNC
Preloader Initialization...
sing prel.tmp
Init : Accepted
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 7769A4835B8BCABC70B52812A1A7166E
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x0000000180000000 -6 GB
UFS LU0 Size: 0x0000000000400000 -4 MB
UFS LU1 Size: 0x0000000000400000 -4 MB
UFS LU2 Size: 0x0000000EE5800000 -59.586 GB
UFS CID : ?H9HQ53AECMMDAR
UFS UNIQID : 0d8090e0b304000000000000
Executing : ACCEPTED...

Reading GPT0 -UFS [0x00008000] 0 130 Items

Reading System Info
Brand : Redmi
Vendor : Xiaomi
Model : Redmi Note 8 Pro
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : zh-CN
Description : begonia-user 9 PPR1.180610.011 V11.0.3.0.PGGCNXM release-keys
Miui Ver : V11
Device : begonia
Display ID : PPR1.180610.011
Security Patch : 2019-12-01
Fingerprint : Redmi/begonia/begonia:9/PPR1.180610.011/V11.0.3.0.PGGCNXM:user/release-keys
StorageType : mtp
Userdata State : Not Encrypted
0
Autobackup titions
-preloader [0x00000000] 512 KB -> preloader.bin... Ok0
-> Renaming Preloader.... preloader_begonia.bin0
Creating Scatter file... D:Hydra ToolBackupAuto0813_Redmi_begonia_begonia_9_PPR1.180610.011_V11.0.3.0.PGGCNXM_021222163514MT6785_Android_scatter.txt
-pgpt [0x00000000] 32 KB -> pgpt.bin... Ok
-frp [0x05888000] 1024 KB -> frp.bin... Ok
-nvdata [0x08188000] 64 MB -> nvdata.bin... Ok
-persist [0x0E188000] 70.469 MB -> persist.bin... Ok
-protect1 [0x12800000] 8 MB -> protect1.bin... Ok
-protect2 [0x13000000] 8 MB -> protect2.bin... Ok
-nvram [0x17580000] 64 MB -> nvram.bin... Ok
Done!!!0
D:Hydra ToolBackupAuto0813_Redmi_begonia_begonia_9_PPR1.180610.011_V11.0.3.0.PGGCNXM_021222163514
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 1 7769A4835B8BCABC70B52812A1A7166E
ERAM Size : 1 0x0000000000080000 -512 KB
IRAM Size : 1 0x0000000180000000 -6 GB
UFS LU0 Size: 0x0000000000400000 -4 MB
UFS LU1 Size: 0x0000000000400000 -4 MB
UFS LU2 Size: 0x0000000EE5800000 -59.586 GB
UFS CID : ?H9HQ53AECMMDAR
UFS UNIQID : 0d8090e0b304000000000000

Reading GPT0 -UFS [0x00008000] 0 130 Items
0

Reading System Info
Brand : Redmi
Vendor : Xiaomi
Model : Redmi Note 8 Pro
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : zh-CN
Description : begonia-user 9 PPR1.180610.011 V11.0.3.0.PGGCNXM release-keys
Miui Ver : V11
Device : begonia
Display ID : PPR1.180610.011
Security Patch : 2019-12-01
Fingerprint : Redmi/begonia/begonia:9/PPR1.180610.011/V11.0.3.0.PGGCNXM:user/release-keys
StorageType : mtp
Userdata State : Not Encrypted

-------------------------------------
Operation : Unlock Bootloader
Processing...
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------

Verifying status after operation...
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------
Action Result : 0 Ok

Elapsed Time : 00:01:22
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi Note 5 Pro (whyred) EDL Frp Remove done by Hydra

Brand : XIAOMI Model : Redmi Note 5 Pro (Whyred) Storage : Auto
Loader: 0008C0E100010000_a7b8b82545a98eca_28f4dc3c_GENERIC_XIAOMI_auth.fhprg
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM75)
SymbolicName :??USB#VID_05C6&PID_9008#5&30124de0&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 03/25/2016,2.1.2.2

Getting device info .. . ...
Serial No.: 0xC69367E0
HW_ID : 000CC0E100000000
MSM ID : 0x000CC0E1,
MODEL_ID : 0x0000
OEM_ID : 0x0000 - QUALCOMM
PBL Ver : 00000000
PK HASH : a7b8b82545a98eca23d6e9105fb464568d1b5828264903441bdef0cd57e3c370

Firehose Loader [0008C0E100010000_a7b8b82545a98eca_28f4dc3c_GENERIC_XIAOMI_auth.fhprg]
--------------------------------------------------
Header Type : OLD
TargetMSM :
Tag : _auth
Version : 5
Code_size : 416
Signature_size : 256
fhVendor : XIAOMI
HW_ID : 3006000000010000
Vendor : GENERIC
OEM_ID : 0001
MODEL_ID : 0000
SW_ID : 000000000000000B
APP_ID :
pk_hash : a7b8b82545a98eca23d6e9105fb464568d1b5828264903441bdef0cd57e3c370
OEM_VERSION : c3-bsp-builder-job001.bj
IMAGE_VARIANT : Sdm660LA
QC_VERSION : BOOT.XF.1.4-00255-S660LZB-1
--------------------------------------------------

SaharaBoot... Ok
Sending ...............................b Okb0
Connecting to Firehose...
Ping ......... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : MSM8996
Version : 1
DateTime : Aug 2 2018 - 22:27:53

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 1227610176
Firmware Version : 162
Product Name : HCG8a4
Physical titions : 4
Total Logical Blocks:
Drive [0] 122142720 [58,242 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]
Drive [3] 8192 [4 MB]

Protocol : Universal
Running : Ok

Phone Information .....
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi Note 5
ID : OPM1.171019.011
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : whyred-user 8.1.0 OPM1.171019.011 V10.3.1.0.OEIMIXM release-keys
Miui Ver : V10
Device : whyred
Mod_device : whyred_global
Display ID : OPM1.171019.011
Security Patch : 2019-04-01
Fingerprint : xiaomi/whyred/whyred:8.1.0/OPM1.171019.011/V10.3.1.0.OEIMIXM:user/release-keys

Reading GPT[4]
Drive [0] 64 Items
Drive [1] 0 Items
Drive [2] 0 Items
Drive [3]

Removing FRPta...
Method : 0
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOk Ok

Elapsed Time : 00:00:06
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi Note 7 Pro (violet) EDL Format Userdata done by Hydra

Brand : XIAOMI Model : Redmi Note 7 Pro (violet) Storage : Auto
Loader: 000950E100720000_1bebe3863a6781db_6fbee6d5_XIAOMI_auth.fhprg
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM7)
SymbolicName :??USB#VID_05C6&PID_9008#6&4f07d00&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 08/02/2017,2.1.2.7

Getting device info .. . ...
Serial No.: 0xF6629FD4
HW_ID : 000950E100720000
MSM ID : 0x000950E1, SM6150-Qualcomm Snapdragon 675
MODEL_ID : 0x0000
OEM_ID : 0x0072 - XIAOMI
PBL Ver : 00000000
PK HASH : 1bebe3863a6781db4b01086063007334de9e5ca14971c7c4f4358ec9d79cda46

Firehose Loader [000950E100720000_1bebe3863a6781db_6fbee6d5_XIAOMI_auth.fhprg]
--------------------------------------------------
Header Type : New
TargetMSM :
Tag : _auth
Version : 6
Code_size : 816
Signature_size : 256
fhVendor : XIAOMI
HW_ID : 000950E100720000
Vendor : XIAOMI
OEM_ID : 0072
MODEL_ID : 0000
SW_ID : 00000003
APP_ID : 00000000
pk_hash : 1bebe3863a6781db4b01086063007334de9e5ca14971c7c4f4358ec9d79cda4692ce5e948c6fd409408f4c919fcadfe3
OEM_VERSION : c3-miui-ota-bd121.bj
IMAGE_VARIANT : SDM6150LA
QC_VERSION : BOOT.XF.3.1-00208-SM6150LZB-1
--------------------------------------------------

SaharaBoot... Ok
Sending ...................................b Okb0
Connecting to Firehose...
Ping ..................... Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[lMMKDLFdNtqFM9OGJinwL-Tk7ou]
Signature @256bytes Authentication.... Accepted ........
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Jul 19 2019 - 01:12:10

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 3587885616
Firmware Version : 8
Product Name : DH6DAB
Physical titions : 4
Total Logical Blocks:
Drive [0] 122142720 [58.242 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]
Drive [3] 32768 [16 MB]

Protocol : Universal
Running : Ok

Phone Information ......
Vendor : Xiaomi
ID : QKQ1.190915.002
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Miui Ver : V12
Mod_device : violet_in_global
Security Patch : 2021-01-01

Reading GPT[4]
Drive [0] 88 Items
Drive [1] 0 Items
Drive [2] 0 Items
Drive [3]

Formatting Userdata...
Method : 0
Safe Format - EMMC
Processing...
- Formatting Userdata [Safe Format - eMMc] Ok Ok

Elapsed Time : 00:00:06

}
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Oppo A83 (CPH1729) Remove Screen Lock Without Data Loss done by Hydra

=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port_V1632 (COM5)
Device : 6&e72cee4&0&2
SymbolicName :??USB#VID_0E8D&PID_0003#6&e72cee4&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0

Opened handle..

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 14B9995D133E21C3584A1F03A0028E46
ERAM Size : 0x0000000000038000 -224 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 13014E47314A395238100E98047B1855 - G1J9R8

Reading GPT -EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Remove Lock Without Data Loss
Processing...
Searching patching address
Action Result : Ok

Elapsed Time : 00:00:02
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi Note 9 (merlin) Bootloader Unlock done By Hydra

=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port (COM86)
Device : 5&291ba64b&0&3
SymbolicName :??USB#VID_0E8D&PID_0003#5&291ba64b&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2016,3.2

Opened handle..

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : CED44764D8DE6469D92C182518D61C6B
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000001D1F000000 -116,484 GB
eMMC CID : 90014A684445615033031097F1A2870B - hDEaP3

Reading GPT -EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Unlock Bootloader
Processing...
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------

Verifying status after operation...
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------
Action Result : Ok

Elapsed Time : 00:00:02
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi 6A (cactus) Bootloader Unlock done With by Hydra

=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port (COM92)
Device : 6&90b4d50&0&2
SymbolicName :??USB#VID_0E8D&PID_0003#6&90b4d50&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 08/03/2016,3.0.1504.0

Opened handle..
Handshaking... Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0766 MT6765 [6765]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : E7
SBC : 01 (True)
SLA : 02 (True)
DAA : 04 (True)
SWJTAG : 06 (True)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 20 (True)
MEMWRITE : 40 (True)
CMD_C8 : 80 (True)

Exploiting Device...
Exploit Sent..
Successfully Exploited...
Handshaking... Ok

--- ENABLE AUTO PREL DUMP ----
Found
C:Hydra ToolBackupPreloader_dumpprel.tmp
------------------------------

Handshaking...

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0766 MT6765 [6765]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)

MEID : 66B87D14912CD7FC9A34140FBAB74587
Stage 1.. [Size:216440]
Sending : Please wait.. Accepted

Identifying Protocol...
Protocol : New
Synchronization... [ERROR]- NOT SYNC
=============================================
Reasons why it fails due to the following"
1. Harware problem/issues
2. If you did Testpoint Kindly check the ts you Touch/TP
3. Powershortage, try to connect Battery
4. Check or replace usb cable and plug directly to your pc usb port.
=============================================
SYNC
Preloader Initialization...
sing prel.tmp
Init : Accepted
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 3DE52A137FD17D9C48D74B93818B3B34
ERAM Size : 0x0000000000038000 -224 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003AB400000 -14,676 GB
eMMC CID : 90014A484147346132A5C186A91616E7 - HAG4a2
Executing : ACCEPTED...

Reading GPT0 -EMMC [0x00008000] 0 130 Items

Reading System Info
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi 6A
ID : O11019
SDK : 27
Release : 8.1.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-GB
Description : cactus-user 8.1.0 O11019 V10.0.2.0.OCBMIFH release-keys
Miui Ver : V10
Device : cactus
Mod_device : cactus_global
Display ID : O11019
Security Patch : 2018-09-01
Fingerprint : xiaomi/cactus/cactus:8.1.0/O11019/V10.0.2.0.OCBMIFH:user/release-keys
StorageType : mtp
Userdata State : Encrypted
0
Autobackup titions
-preloader [0x00000000] 512 KB -> preloader.bin...1 Ok0
-> Renaming Preloader.... preloader_cactus.bin0
Creating Scatter file... C:Hydra ToolBackupAuto0766_xiaomi_cactus_cactus_8.1.0_O11019_V10.0.2.0.OCBMIFH_021522104933MT6765_Android_scatter.txt
-pgpt [0x00000000] 32 KB -> pgpt.bin...1 Ok
-frp [0x05588000] 1024 KB -> frp.bin...1 Ok
-nvdata [0x07688000] 64 MB -> nvdata.bin...1 Ok
-protect1 [0x0D688000] 8 MB -> protect1.bin...1 Ok
-protect2 [0x0DE88000] 9,469 MB -> protect2.bin...1 Ok
-persist [0x0F000000] 64 MB -> persist.bin...1 Ok
-nvram [0x1BE80000] 64 MB -> nvram.bin...1 Ok
Done!!!0
C:Hydra ToolBackupAuto0766_xiaomi_cactus_cactus_8.1.0_O11019_V10.0.2.0.OCBMIFH_021522104933
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 2 3DE52A137FD17D9C48D74B93818B3B34
ERAM Size : 2 0x0000000000038000 -224 KB
IRAM Size : 2 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003AB400000 -14,676 GB
eMMC CID : 90014A484147346132A5C186A91616E7 - HAG4a2

Reading GPT0 -EMMC [0x00008000] 0 130 Items
0

Reading System Info
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi 6A
ID : O11019
SDK : 27
Release : 8.1.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-GB
Description : cactus-user 8.1.0 O11019 V10.0.2.0.OCBMIFH release-keys
Miui Ver : V10
Device : cactus
Mod_device : cactus_global
Display ID : O11019
Security Patch : 2018-09-01
Fingerprint : xiaomi/cactus/cactus:8.1.0/O11019/V10.0.2.0.OCBMIFH:user/release-keys
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Unlock Bootloader
Processing...
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------

Verifying status after operation...
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------
Action Result : 0 Ok

Elapsed Time : 00:01:00
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Myphone MYA15 (7731E) Format Userdata One Click in Flash mode With by Hydra

Port : [Auto] Scanning... COM32
Opening Port... (COM32) Ok
Reading tition Table...
------------------------------------------
Factory Reset/Format Userdata...
------------------------------------------
Reading IMEI...
BSL_REP_OPERATION_FAILED .
IMEI 1 : ***************
IMEI 2 : ***************
IMEI 3 : ***************
IMEI 4 : ***************
Executing... Factory Reset(Erase Misc & userdata)

Reading System Info ..
Vendor : MyPhone
Model : myA15
Android Ver : 8.1.0
Device : myA15
Display ID : E7308_NDE_A523_myphone_myA15_V11_20180905_1447
Security Patch : 2018-08-05
FRPPST : /dev/block/platform/soc/soc:ap-ahb/20600000.sdio/by-name/persist
Fingerprint : MyPhone/myA15/myA15:8.1.0/OPM2.171019.012/20180806:user/release-keys
ro_product_hardware : sc7731e_1h10_v1.1.0
sys_hardware_version : SC7731e_2_IRD_K_V1.1.0

Action Result.. Ok

Closing Port... Ok..

Elapsed Time : 00:00:53
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi 6A (cactus) Bootloader Unlock done by Hydra

=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port (COM92)
Device : 6&90b4d50&0&2
SymbolicName :??USB#VID_0E8D&PID_0003#6&90b4d50&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 08/03/2016,3.0.1504.0

Opened handle..
Handshaking... Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0766 MT6765 [6765]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : E7
SBC : 01 (True)
SLA : 02 (True)
DAA : 04 (True)
SWJTAG : 06 (True)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 20 (True)
MEMWRITE : 40 (True)
CMD_C8 : 80 (True)

Exploiting Device...
Exploit Sent..
Successfully Exploited...
Handshaking... Ok

--- ENABLE AUTO PREL DUMP ----
Found
C:Hydra ToolBackupPreloader_dumpprel.tmp
------------------------------

Handshaking...

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0766 MT6765 [6765]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)

MEID : 66B87D14912CD7FC9A34140FBAB74587
Stage 1.. [Size:216440]
Sending : Please wait.. Accepted

Identifying Protocol...
Protocol : New
Synchronization... [ERROR]- NOT SYNC
=============================================
Reasons why it fails due to the following"
1. Harware problem/issues
2. If you did Testpoint Kindly check the ts you Touch/TP
3. Powershortage, try to connect Battery
4. Check or replace usb cable and plug directly to your pc usb port.
=============================================
SYNC
Preloader Initialization...
sing prel.tmp
Init : Accepted
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 3DE52A137FD17D9C48D74B93818B3B34
ERAM Size : 0x0000000000038000 -224 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003AB400000 -14,676 GB
eMMC CID : 90014A484147346132A5C186A91616E7 - HAG4a2
Executing : ACCEPTED...

Reading GPT0 -EMMC [0x00008000] 0 130 Items

Reading System Info
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi 6A
ID : O11019
SDK : 27
Release : 8.1.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-GB
Description : cactus-user 8.1.0 O11019 V10.0.2.0.OCBMIFH release-keys
Miui Ver : V10
Device : cactus
Mod_device : cactus_global
Display ID : O11019
Security Patch : 2018-09-01
Fingerprint : xiaomi/cactus/cactus:8.1.0/O11019/V10.0.2.0.OCBMIFH:user/release-keys
StorageType : mtp
Userdata State : Encrypted
0
Autobackup titions
-preloader [0x00000000] 512 KB -> preloader.bin...1 Ok0
-> Renaming Preloader.... preloader_cactus.bin0
Creating Scatter file... C:Hydra ToolBackupAuto0766_xiaomi_cactus_cactus_8.1.0_O11019_V10.0.2.0.OCBMIFH_021622104047MT6765_Android_scatter.txt
-pgpt [0x00000000] 32 KB -> pgpt.bin...1 Ok
-frp [0x05588000] 1024 KB -> frp.bin...1 Ok
-nvdata [0x07688000] 64 MB -> nvdata.bin...1 Ok
-protect1 [0x0D688000] 8 MB -> protect1.bin...1 Ok
-protect2 [0x0DE88000] 9,469 MB -> protect2.bin...1 Ok
-persist [0x0F000000] 64 MB -> persist.bin...1 Ok
-nvram [0x1BE80000] 64 MB -> nvram.bin...1 Ok
Done!!!0
C:Hydra ToolBackupAuto0766_xiaomi_cactus_cactus_8.1.0_O11019_V10.0.2.0.OCBMIFH_021622104047
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 2 3DE52A137FD17D9C48D74B93818B3B34
ERAM Size : 2 0x0000000000038000 -224 KB
IRAM Size : 2 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003AB400000 -14,676 GB
eMMC CID : 90014A484147346132A5C186A91616E7 - HAG4a2

Reading GPT0 -EMMC [0x00008000] 0 130 Items
0

Reading System Info
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi 6A
ID : O11019
SDK : 27
Release : 8.1.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-GB
Description : cactus-user 8.1.0 O11019 V10.0.2.0.OCBMIFH release-keys
Miui Ver : V10
Device : cactus
Mod_device : cactus_global
Display ID : O11019
Security Patch : 2018-09-01
Fingerprint : xiaomi/cactus/cactus:8.1.0/O11019/V10.0.2.0.OCBMIFH:user/release-keys
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Unlock Bootloader
Processing...
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------

Verifying status after operation...
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------
Action Result : 0 Ok

Elapsed Time : 00:00:53
 
Top