★★★ Post All Successfully Repaired Phones By Hydra Tool ★★★

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi 9A (dandelion) Bootloader Unlock done With by Hydra
190600000989_HMTKTool.exe_FM_Bootloader_Unlock_Bootloader_02-28-2022-093442.jpeg
=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port_V1632 (COM5)
Device : 6&265d47d&0&6
SymbolicName :??USB#VID_0E8D&PID_0003#6&265d47d&0&6#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0

Opened handle..

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : D1F1ABC4EB882A9031C9C171322F4DAE
ERAM Size : 0x0000000000038000 -224 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 45010044413430363401B9C688168765 - DA4064

Reading GPT -EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Unlock Bootloader
Processing...
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------

Verifying status after operation...
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------
Action Result : Ok

Elapsed Time : 00:00:02
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi Note 8T (willow) EDL Frp Remove With by Hydra
190100000111_HQTool.exe_EDL_FRP_RemoveAuto_03-01-2022-133004.jpeg

Brand : XIAOMI Model : Redmi Note 8T (wiilow) Storage : Auto
Loader: 0010A0E100720000_1bebe3863a6781db_76196dc8_XIAOMI.fhprg
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM6)
SymbolicName :??USB#VID_05C6&PID_9008#5&156228c4&0&7#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 08/31/2015,2.1.2.0

Getting device info .. . ...
Serial No.: 0x435E74E7
HW_ID : 0010A0E100720000
MSM ID : 0x0010A0E1, SM6125-Qualcomm Snapdragon 665
MODEL_ID : 0x0000
OEM_ID : 0x0072 - XIAOMI
PBL Ver : 00000000
PK HASH : 1bebe3863a6781db4b01086063007334de9e5ca14971c7c4f4358ec9d79cda46

Firehose Loader [0010A0E100720000_1bebe3863a6781db_76196dc8_XIAOMI.fhprg]
--------------------------------------------------
Header Type : New
TargetMSM :
Tag :
Version : 6
Code_size : 816
Signature_size : 256
fhVendor : XIAOMI
HW_ID : 0010A0E100720000
Vendor : XIAOMI
OEM_ID : 0072
MODEL_ID : 0000
SW_ID : 00000003
APP_ID : 00000000
pk_hash : 1bebe3863a6781db4b01086063007334de9e5ca14971c7c4f4358ec9d79cda4692ce5e948c6fd409408f4c919fcadfe3
OEM_VERSION : cibuild
IMAGE_VARIANT : NicobarPkgLAA
QC_VERSION : BOOT.XF.4.0-00149-NICOBARLAZ-1
--------------------------------------------------

SaharaBoot... Ok
Sending ..............................b Okb0
Connecting to Firehose...
Ping ..................... Ok
Configuration.........
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Jul 3 2019 - 22:23:56

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 150513042
Firmware Version : 909127728
Product Name : hB8aP>
Physical titions : 4
Total Logical Blocks:
Drive [0] 61071360 [29,121 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]
Drive [3] 32768 [16 MB]

Protocol : Universal
Running : Ok

Phone Information ......
Vendor : Xiaomi
ID : RKQ1.201004.002
SDK : 30
Release : 11
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Miui Ver : V125
Mod_device : willow_ru_global
Security Patch : 2021-12-01

Reading GPT[4]
Drive [0] 88 Items
Drive [1] 0 Items
Drive [2] 0 Items
Drive [3]

Removing FRPta...
Method : 0
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOk Ok

Elapsed Time : 00:00:04
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Mi Play (Lotus) Bootloader Unlock With by Hydra

=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port (COM72)
Device : 5&3b0d2cff&0&6
SymbolicName :??COM72
Driver Ver : 01/22/2016,3.2

Opened handle..
Handshaking... Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0766 MT6765 [6765]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : E7
SBC : 01 (True)
SLA : 02 (True)
DAA : 04 (True)
SWJTAG : 06 (True)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 20 (True)
MEMWRITE : 40 (True)
CMD_C8 : 80 (True)

Exploiting Device...
Exploit Sent..
Successfully Exploited...
Handshaking... Ok

--- ENABLE AUTO PREL DUMP ----
Found
C:HydraTool_FullPackage_12-16-2021BackupPreloader_dumpprel.tmp
------------------------------

Handshaking...

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0766 MT6765 [6765]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)

MEID : D44D7DD97DF447A245799E22946B5945
Stage 1.. [Size:216440]
Sending : Please wait.. Accepted

Identifying Protocol...
Protocol : New
Synchronization... [ERROR]- NOT SYNC
=============================================
Reasons why it fails due to the following"
1. Harware problem/issues
2. If you did Testpoint Kindly check the ts you Touch/TP
3. Powershortage, try to connect Battery
4. Check or replace usb cable and plug directly to your pc usb port.
=============================================
SYNC
Preloader Initialization...
sing prel.tmp
Init : Accepted
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 89E2BA5FB5F08BE7AC3DC40D844E644B
ERAM Size : 0x0000000000038000 -224 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58,242 GB
eMMC CID : 90014A68433861503E030A140D1A1609 - hC8aP>
Executing : ACCEPTED...

Reading GPT0 -EMMC [0x00008000] 0 130 Items

Reading System Info
Brand : xiaomi
Vendor : Xiaomi
Model : MI PLAY
ID : O11019
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : lotus-user 8.1.0 O11019 V11.0.10.0.OFIMIXM release-keys
Miui Ver : V11
Device : lotus
Mod_device : lotus_global
Display ID : ZAL1722-lotus-build-20210108214352
Security Patch : 2021-01-01
Fingerprint : xiaomi/lotus/lotus:8.1.0/O11019/V11.0.10.0.OFIMIXM:user/release-keys
StorageType : mtp
Userdata State : Encrypted
0
Autobackup titions
-preloader [0x00000000] 512 KB -> preloader.bin...1 Ok0
-> Renaming Preloader.... preloader_lotus.bin0
Creating Scatter file... C:HydraTool_FullPackage_12-16-2021BackupAuto0766_xiaomi_lotus_lotus_8.1.0_O11019_V11.0.10.0.OFIMIXM_030122095057MT6765_Android_scatter.txt
-pgpt [0x00000000] 32 KB -> pgpt.bin...1 Ok
-frp [0x03588000] 1024 KB -> frp.bin...1 Ok
-nvdata [0x05688000] 64 MB -> nvdata.bin...1 Ok
-protect1 [0x0B688000] 8 MB -> protect1.bin...1 Ok
-protect2 [0x0BE88000] 9,469 MB -> protect2.bin...1 Ok
-persist [0x0D000000] 48 MB -> persist.bin...1 Ok
-nvram [0x18E80000] 64 MB -> nvram.bin...1 Ok
Done!!!0
C:HydraTool_FullPackage_12-16-2021BackupAuto0766_xiaomi_lotus_lotus_8.1.0_O11019_V11.0.10.0.OFIMIXM_030122095057
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 2 89E2BA5FB5F08BE7AC3DC40D844E644B
ERAM Size : 2 0x0000000000038000 -224 KB
IRAM Size : 2 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58,242 GB
eMMC CID : 90014A68433861503E030A140D1A1609 - hC8aP>

Reading GPT0 -EMMC [0x00008000] 0 130 Items
0

Reading System Info
Brand : xiaomi
Vendor : Xiaomi
Model : MI PLAY
ID : O11019
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : lotus-user 8.1.0 O11019 V11.0.10.0.OFIMIXM release-keys
Miui Ver : V11
Device : lotus
Mod_device : lotus_global
Display ID : ZAL1722-lotus-build-20210108214352
Security Patch : 2021-01-01
Fingerprint : xiaomi/lotus/lotus:8.1.0/O11019/V11.0.10.0.OFIMIXM:user/release-keys
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Unlock Bootloader
Processing...
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------

Verifying status after operation...
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------
Action Result : 0 Ok

Rebooting Device 0 [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:51
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Vivo Y91 (1818C) EDL Frp Remove With by Hydra

Brand : VIVO Model : Y91 (V1818C) Storage : Auto
Loader: 000BF0E100000000_60ba997fef6da9f0_aa167c34_QUALCOMM_VIVO_wut_peek_8937.fhprg
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM13)
SymbolicName :??USB#VID_05C6&PID_9008#5&2d1c7c16&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 03/25/2016,2.1.2.2

Getting device info .. Ok
Device MODE : Firehose
Connecting to Firehose...
Ping .. Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 3345004885
Firmware Version : 165
Product Name : HAG4a2
Physical titions : 3
Total Logical Blocks:
Drive [0] 30777344 [14.676 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]

Protocol : Universal
Running : Ok

Phone Information .....
Brand : vivo
Vendor : vivo
Model : vivo 1817
ID : OPM1.171019.026
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : msm8937_64-user 8.1.0 OPM1.171019.026 eng.compil.20201012.115940 release-keys
Device : msm8937_64
Display ID : OPM1.171019.026 release-keys
Security Patch : 2020-10-01
Emmc_size : 16GB
Platform : =SDM439
Fingerprint : vivo/1817/1817:8.1.0/OPM1.171019.026/compil10121159:user/release-keys

Reading GPT[3]
Drive [0] 60 Items
Drive [1] 0 Items
Drive [2] 0 Items

Removing FRPta...
Method :
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] 0 **WARNING Unauthorized tag '' 1 <?xml version="1.0" encoding="UTF-8" ?><data><response value="NAK" /></data>Failed
- Removing FRP [Erase Safety Tag] OkOk Ok

Elapsed Time : 00:00:05
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi Note 8 2021 (biloba) Bootloader Unlock Done With by Hydra

=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : ?MediaTek USB Port_V1632 (COM3)?
Device : 5&32762a5a&0&3
SymbolicName :??USB#VID_0E8D&PID_0003#5&32762a5a&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0

Opened handle..

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : DCA4D81815685B66229A1AE9FB45F039
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 90014A68433861503E03101241F3B787 - hC8aP>

Reading GPT -EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Unlock Bootloader
Processing...
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------

Verifying status after operation...
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------
Action Result : Ok

Elapsed Time : 00:00:03
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Huawei Y7 2019 (DUB-LX3) EDL Frp Remove One Click With by Hydra

Brand : HUAWEI Model : DUB-LX3 (Y7 2019) Storage : Auto
Loader: 0009A0E100150065_6bc369511da9cadb_1a1074cf_HUAWEI_QUALCOMM_peek_8953.fhprg
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM22)
SymbolicName :??USB#VID_05C6&PID_9008#5&1e7d8db7&0&10#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 02/05/2018,3.0.0.0

Getting device info .. Ok
Device MODE : Firehose
Connecting to Firehose...
Ping .. Ok
Configuration.......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8953
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 3348574
Firmware Version : 0
Product Name : hC9aP3
Physical titions : 3
Total Logical Blocks:
Drive [0] 122142720 [58.242 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]

Protocol : Universal
Running : Ok

Phone Information .....
Vendor : unknown
ID : OPM1.171019.011
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : generic_a53-user 8.1.0 OPM1.171019.011 eng.jenkin.20210205.113911 test-keys
Display ID : System 8.2.0.036(1UW5)
Security Patch : 2020-09-01

Reading GPT[3]
Drive [0] 60 Items
Drive [1] 0 Items
Drive [2] 0 Items

Removing FRPta...
Method :
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOk Ok

Rebooting Phone.... Ok
If not rebooted, Please Power on Manually

Elapsed Time : 00:00:03
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi Note 8 Pro (begonia) Bootloader Unlock done With by Hydra

=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port (COM7)
Device : 5&18598057&0&2
SymbolicName :??USB#VID_0E8D&PID_0003#5&18598057&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0

Opened handle..

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : DD6460D3CD2AC4BD165EAF2FC02CFEC6
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x0000000180000000 -6 GB
UFS LU0 Size: 0x0000000000400000 -4 MB
UFS LU1 Size: 0x0000000000400000 -4 MB
UFS LU2 Size: 0x0000000EE5800000 -59,586 GB
UFS CID : -'01H9HQ53AECMMDAR
UFS UNIQID : 0d69350eb204000000000000

Reading GPT0 -UFS [0x00008000] 0 130 Items
0

Reading System Info
Vendor : Xiaomi
ID : RP1A.200720.011
SDK : 30
Release : 11
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : begonia-user 11 RP1A.200720.011 V12.5.5.0.RGGMIXM release-keys
Miui Ver : V125
Mod_device : begonia_global
Display ID : RP1A.200720.011
Security Patch : 2021-10-01
StorageType : mtp
Userdata State : Not Encrypted

-------------------------------------
Operation : Unlock Bootloader
Processing...
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------

Verifying status after operation...
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------
Action Result : 0 Ok

Elapsed Time : 00:00:03
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi Note 3 (kenzo) EDL Format Userdata done by Hydra

Brand : XIAOMI Model : Redmi Note 3 (Kenzo) Storage : Auto
Loader: 009B00E100000000_57158eaf1814d78f_70636436_QUALCOMM_XIAOMI_peek_8976.fhprg
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM80)
SymbolicName :??USB#VID_05C6&PID_9008#5&109bc972&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 08/02/2017,2.1.2.7

Getting device info .. . ...
Serial No.: 0x00DED
HW_ID : 009B00E100000000
MSM ID : 0x009B00E1, MSM8956-Qualcomm Snapdragon 650
MODEL_ID : 0x0000
OEM_ID : 0x0000 - QUALCOMM
PBL Ver : 00000000
PK HASH : 57158eaf1814d78fd2b3105ece4db18a817a08ac664a5782a925f3ff8403d39a

Firehose Loader [009B00E100000000_57158eaf1814d78f_70636436_QUALCOMM_XIAOMI_peek_8976.fhprg]
--------------------------------------------------
Header Type : OLD
TargetMSM : 8976
Tag : _peek
Version : 3
Code_size : 288
Signature_size : 256
fhVendor : XIAOMI
HW_ID : 009B00E100000000
Vendor : QUALCOMM
OEM_ID : 0000
MODEL_ID : 0000
SW_ID : 0000000000000000
APP_ID :
pk_hash : 57158eaf1814d78fd2b3105ece4db18a817a08ac664a5782a925f3ff8403d39a
OEM_VERSION : c3-bsp-builder-job001.bj
IMAGE_VARIANT : EAADANAZA
QC_VERSION : BOOT.BF.3.3.C3-00004
--------------------------------------------------

SaharaBoot... Ok
Sending ..................b Okb0
Connecting to Firehose...
Ping ... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8976
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 1607513117
Firmware Version : 7
Product Name : BJNB4R
Physical titions : 3
Total Logical Blocks:
Drive [0] 61071360 [29.121 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]

Protocol : Universal
Running : Ok

Phone Information .....
Brand : Xiaomi
Vendor : Xiaomi
Model : Redmi Note 3
ID : LMY47V
SDK : 22
Release : 5.1.1
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Description : kenzo-user 5.1.1 LMY47V V7.1.9.0.LHOCNCL release-keys
Miui Ver : V7
Device : kenzo
Mod_device : kenzo_global
Board : msm8952
Display ID : LMY47V
Security Patch : 2015-12-01
Platform : msm8952
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : Xiaomi/kenzo/kenzo:5.1.1/LMY47V/V7.1.9.0.LHOCNCL:user/release-keys

Reading GPT[3]
Drive [0] 48 Items
Drive [1] 0 Items
Drive [2] 0 Items

Formatting Userdata...
Method : 0
Auto
Processing...
- Formatting Userdata
Executing ...
- Formatting Userdata [Safe Format - eMMc] OkOk Ok

Elapsed Time : 00:00:03
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi Note 8 (ginkgo) EDL Frp Remove With by Hydra


Brand : XIAOMI Model : Redmi Note 8 (ginkgo) Storage : Auto
Loader: 0010A0E100720000_1bebe3863a6781db_76196dc8_XIAOMI.fhprg
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM74)
SymbolicName :??USB#VID_05C6&PID_9008#6&3a34e632&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 02/05/2018,3.0.0.0

Getting device info .. . ...
Serial No.: 0x2BCC9B8E
HW_ID : 0010A0E100720000
MSM ID : 0x0010A0E1, SM6125-Qualcomm Snapdragon 665
MODEL_ID : 0x0000
OEM_ID : 0x0072 - XIAOMI
PBL Ver : 00000000
PK HASH : 1bebe3863a6781db4b01086063007334de9e5ca14971c7c4f4358ec9d79cda46

Firehose Loader [0010A0E100720000_1bebe3863a6781db_76196dc8_XIAOMI.fhprg]
--------------------------------------------------
Header Type : New
TargetMSM :
Tag :
Version : 6
Code_size : 816
Signature_size : 256
fhVendor : XIAOMI
HW_ID : 0010A0E100720000
Vendor : XIAOMI
OEM_ID : 0072
MODEL_ID : 0000
SW_ID : 00000003
APP_ID : 00000000
pk_hash : 1bebe3863a6781db4b01086063007334de9e5ca14971c7c4f4358ec9d79cda4692ce5e948c6fd409408f4c919fcadfe3
OEM_VERSION : cibuild
IMAGE_VARIANT : NicobarPkgLAA
QC_VERSION : BOOT.XF.4.0-00149-NICOBARLAZ-1
--------------------------------------------------

SaharaBoot... Ok
Sending ..............................b Okb0
Connecting to Firehose...
Ping ..................... Ok
Configuration.........
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Jul 3 2019 - 22:23:56

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 19
Serial Number : 360452007
Firmware Version : 4
Product Name : S0J9K8
Physical titions : 4
Total Logical Blocks:
Drive [0] 122142720 [58.242 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]
Drive [3] 32768 [16 MB]

Protocol : Universal
Running : Ok

Phone Information ......
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi Note 8
ID : PKQ1.190616.001
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : ginkgo-user 9 PKQ1.190616.001 V10.3.2.0.PCOMIXM release-keys
Miui Ver : V10
Device : ginkgo
Mod_device : ginkgo_global
Display ID : PKQ1.190616.001
Security Patch : 2019-08-01
Fingerprint : xiaomi/ginkgo/ginkgo:9/PKQ1.190616.001/V10.3.2.0.PCOMIXM:user/release-keys

Reading GPT[4]
Drive [0] 88 Items
Drive [1] 0 Items
Drive [2] 0 Items
Drive [3]

Removing FRPta...
Method : 0
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOk Ok

Rebooting Phone.... Ok
If not rebooted, Please Power on Manually

Elapsed Time : 00:00:05
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Realme C2 (RMX1941) Remove Screen Lock With by Hydra

=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port_V1633 (COM4)
Device :6&1f0054d8&0&2
SymbolicName :\??\USB#VID_0E8D&PID_0003#6&1f0054d8&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0

Opened handle..

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : B9A75F2830D7853E9A58110D0FF9B472
ERAM Size : 0x0000000000038000 -224 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 150100514436334D420350216AE3B60D - QD63MB

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Vendor : Realme
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6762_18540-user 9 PPR1.180610.011 eng.root.20210508.122048 release-keys
Security Patch : 2021-05-05
StorageType : mtp
Userdata State : Not Encrypted

-------------------------------------
Operation : Remove Lock Without Data Loss
Processing...
Searching patching address
Action Result : Ok

Elapsed Time : 00:00:02
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Vivo Y11 (1906) EDL Frp Remove With by Hydra

Brand : VIVO Model : Y11 (1906) Storage : Auto
Loader: 000BF0E100000000_60ba997fef6da9f0_d8fbe714_QUALCOMM_VIVO_wut_peek_8937.fhprg
Port : Auto

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM48)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&1ba1e768&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :03/19/2014,2.1.1.2

Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 2525730918
Firmware Version : 909127728
Product Name : hB8aP>
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 61071360[29.121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok

Phone Information......
ID : RP1A.200720.012
SDK : 30
Release : 11
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Security Patch : 2021-12-01
Emmc_size : 16GB
Platform : =SDM439

Reading GPT[3]
Drive [0] 60 Items
Drive [1] 0 Items
Drive [2] 0 Items

Removing FRPta...
Method :
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] **WARNING Unauthorized tag '' <?xml version="1.0" encoding="UTF-8" ?><data><response value="NAK" /></data>Failed
- Removing FRP [Erase Safety Tag] OkOkOk
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Realme C2 (RMX1941) Remove Screen Security With by Hydra

=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port_V1633 (COM4)
Device :6&1f0054d8&0&2
SymbolicName :\??\USB#VID_0E8D&PID_0003#6&1f0054d8&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0

Opened handle..

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : B9A75F2830D7853E9A58110D0FF9B472
ERAM Size : 0x0000000000038000 -224 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 150100514436334D420350216AE3B60D - QD63MB

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Vendor : Realme
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6762_18540-user 9 PPR1.180610.011 eng.root.20210508.122048 release-keys
Security Patch : 2021-05-05
StorageType : mtp
Userdata State : Not Encrypted

-------------------------------------
Operation : Remove Lock Without Data Loss
Processing...
Searching patching address
Action Result : Ok
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi 9C İmei Repair One Click With bu Hydra

******* Dongle Info *******
Version : Hydra Tool v 1.2
Serial : ***********
Initialize : OKAY
Status : Activated
Life : 0 [0-0-0-0-0]


=====================================
***IMEI REPAIR FUNCTION****
Xiaomi 2nd IMEI
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port_V1633 (COM6)
Device :5&225b7e07&0&4
SymbolicName :\??\USB#VID_0E8D&PID_0003#5&225b7e07&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0

Trying to Open Port [COM6] Ok
Reading Partition Table ..
ERAM Size: 0x0000000000070000-448 KB
IRAM Size: 0x0000000100000000-4 GB
UFS FWVer : 0x00000000
UFS Blocksize : 0x0000000000001000-4 KB
UFS LU0 Size : 0x0000000000400000-4 MB
UFS LU1 Size : 0x0000000000400000-4 MB
UFS LU2 Size : 0x0000001DCB000000-119,172 GB
UFS ID : H9HQğ¯
UFS CID : AD014839485131354145434D42444152
HW-CODE : 0x989
HWSUB-CODE : 0x8A00
HW-VERSION : 0xCA00
SW-VERSION : 0x0
CHIP-EVOLUTION : 0x1
DA-VERSION : 1.0
Partition Count : 62
--------------- Reading build.prop content ---------------
IMEI1 : A1339D8********
IMEI2 : 40F9828********
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------
IMEI1 : FFFFFFFFFFFFFFF
IMEI2 : 351************
Rebooting Device...
Reboot Option : OperationDone
Rebooting Operation Done!!!!

Elapsed Time : 00:00:03
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye

Vivo S1 (Pd1913) İmei Repair With By Hydra Tool


***IMEI REPAIR FUNCTION****
Vivo Flashmode
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port_V1633 (COM3)
Device :6&3a34e632&0&2
SymbolicName :\??\USB#VID_0E8D&PID_0003#6&3a34e632&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0

Trying to Open Port [COM3] Ok
Reading Partition Table ..
ERAM Size: 0x0000000000070000-448 KB
IRAM Size: 0x0000000100000000-4 GB
EMMC Boot1 Size: 0x0000000000400000-4 MB
EMMC Boot2 Size: 0x0000000000400000-4 MB
EMMC RPMB Size : 0x0000000001000000-16 MB
EMMC USER Size : 0x0000001D1EC00000-116.48 GB
EMMC CID : 150100445636444D42021273D2AD471F - DV6DMB
HW-CODE : 0x707
HWSUB-CODE : 0x8A00
HW-VERSION : 0xCA00
SW-VERSION : 0x0
CHIP-EVOLUTION : 0x1
DA-VERSION : 1.0
Partition Count : 45
--------------- Reading build.prop content ---------------
Brand : vivo
Vendor : vivo
Model : vivo 1907
Product : k68v1_64
Manufacturer : vivo
ID : RP1A.200720.012
SDK : 30
Release : 11
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_k68v1_64-user 11 RP1A.200720.012 eng.compil.20211221.110754 release-keys
Display ID : RP1A.200720.012 release-keys
Security Patch : 2021-11-01
StorageType : mtp
--------------- end of build.prop content ---------------
IMEI1 : 863************
IMEI2 : 863************
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------
----- IMEI ------
IMEI=863************
IMEI2=863************


Elapsed Time : 00:00:08
 

BISMILLAH786

Active Member
Aug 23, 2021
40
23
PAKISTAN
hello sir please fix errors oppo realme imei repair.!!!!!

oppo a5s cph1909 after unlock BL comes error DM VERITY. AND after reset imei null.!! i tried on 3 hand set with deferent firmware but not success !!

and also many other model not supported well

please fix this all errors team. its a humble request :(
 
Top