★★★ Post All Successfully Repaired Phones By Hydra Tool ★★★

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Vivo Y53 (PD1628F) Format-Factory Reset in Flash Mode by Hydra Tool

logansultana123@gmail.com_HydraTool.exe__05-18-2023-192716.jpeg
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Qualcomm Service Tool
Ultra Power
Safe Format
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

PreOperation Configuration
Brand : VIVO Model : Y53 (PD1628F) Storage : Auto
Loader: 000560E100000000_60ba997fef6da9f0_203cb924_QUALCOMM_VIVO_peek_8917.fhprg
Port : Auto

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM7)
SymbolicName :\\?\usb#vid_05c6&pid_9008#6&44e1213&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/31/2015,2.1.2.0

Getting device info. [Connected].....
Serial No.: 0x0032CD20
HW_ID : 000560E100000000
MSM ID : 0x000560E1, MSM8917-Qualcomm Snapdragon 425/LAADANAZA
MODEL_ID : 0x0000
OEM_ID : 0x0000 - QUALCOMM
PBL Ver : 00000000
PK HASH : 60ba997fef6da9f05885fa11f1dd6d2a90d052a257a09c2075d7246cc73c0d43

Firehose Loader[000560E100000000_60ba997fef6da9f0_203cb924_QUALCOMM_VIVO_peek_8917.fhprg]
--------------------------------------------------
Header Type : OLD
TargetMSM : 8917
Tag : _peek
Version : 3
Code_size : 288
Signature_size : 256
fhVendor : VIVO
HW_ID : 000560E100000000
Vendor : QUALCOMM
OEM_ID : 0000
MODEL_ID : 0000
SW_ID : 0000000000000003
APP_ID :
pk_hash : 60ba997fef6da9f05885fa11f1dd6d2a90d052a257a09c2075d7246cc73c0d43
OEM_VERSION : compiler026
IMAGE_VARIANT : LAADANAZA
QC_VERSION : BOOT.BF.3.3-00199
--------------------------------------------------

SaharaBoot... Ok
Sending .................Ok
Connecting to Firehose...
Ping... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8917
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 1130470202
Firmware Version : 13
Product Name : QE13MB
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 30535680[14.561 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok

Reading GPT[3]
Drive [0] 52 Items
Drive [1] 0 Items
Drive [2] 0 Items


Phone Information.....
Brand : vivo
Vendor : vivo
Model : vivo PD1628F_EX
Product : msm8937_32
Manufacturer : vivo
ID : MMB29M
SDK : 23
Release : 6.0.1
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-US
Description : msm8937_32-user 6.0.1 MMB29M eng.compiler.20180810.200649 release-keys
Device : PD1628F_EX
Display ID : MMB29M release-keys
Security Patch : 2018-08-01
Emmc_size : 16GB
Platform : msm8937
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : vivo/PD1628F_EX/PD1628F_EX:6.0.1/MMB29M/compiler08102010:user/release-keys


Backup Security partitions...
Reading Security Items....
- modemst1(modemst1.bin), 1.5 MB = Ok
- modemst2(modemst2.bin), 1.5 MB = Ok
- fsg(fsg.bin), 1.5 MB = Ok
- fsc(fsc.bin), 512 Bytes = Ok
C:\Hydra Tool\Backup\QUALBackup\QUALCOMM\000560E100000000_0032CD20\Security_Backup\051823192715.sec
Backup Security Success....
- Removing FRP [Zero Wipe] Ok
- Formatting Userdata [Safe Format - eMMc] Ok

Rebooting Phone.... Ok

Action Result : Ok

Elapsed Time : 00:00:43
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
İnfinix Hot 6 Pro (X608) FRP Remove in Flash Mode by Hydra Tool
220900026944_HydraTool.exe__05-18-2023-133806.jpeg

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Qualcomm Service Tool
Factory Reset Protection
Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

PreOperation Configuration
Brand : INFINIX Model : X608 (Hot 6 Pro) Storage : Auto
Loader: 0000000000000000_961b4510b56f426f_3ae1ca7b_QUALCOMM_SECTOOLS_peek_8917.fhprg
Port : Auto

Searching for Qualcomm 9008 Device...Found
FriendlyName :FIBOCOM USB QDLoader 08 (COM29)
SymbolicName :\\?\usb#vid_05c6&pid_9008#5&de8667a&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :09/05/2022,2.1.3.12

Getting device info. [Connected].Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8917
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 3893413489
Firmware Version : 3
Product Name : QE63MB
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 30535680[14.561 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok

Reading GPT[3]
Drive [0] 52 Items
Drive [1] 0 Items
Drive [2] 0 Items


Phone Information.....
Brand : Infinix
Vendor : INFINIX MOBILITY LIMITED
Model : Infinix X608
Product : Infinix-X608
Manufacturer : INFINIX MOBILITY LIMITED
ID : OPR1.170623.032
SDK : 26
Release : 8.0.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : QL1661-user 8.0.0 OPR1.170623.032 ABCDEF-181031V24 release-keys
Device : Infinix-X608
Display ID : X608-QL1661ABCDEF-O-181031V24
Security Patch : 2018-11-01
Emmc_size : 16GB
Fingerprint : Infinix/QL1661/Infinix-X608:8.0.0/OPR1.170623.032/ABCDEF-181031V24:user/release-keys

- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOk

Rebooting Phone.... Ok

Action Result : Ok

Elapsed Time : 00:00:05
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Samsung Galaxy Note 10 Lite (N770F) Disable Knox With by Hydra Tool

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Samsung Service Tool
Special Tool
Disable Knox
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Adb Handler [Console]
Starting ADB Server....
Searching Device By ADB [device]
Device Found...
Sate : device
Product name : r7naxx
Product model : SM_N770F
Product device : r7


Action Result : Success!!


Elapsed Time : 00:00:05
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Pocophone M3 (citrus) Remove Mi Account in EDL Mode by Hydra Tool

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Xiaomi Tool
Mi Account
Remove MiAccount[New Method]
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

PreOperation Configuration
Brand : XIAOMI Model : Poco M3 (citrus) Storage : Auto
Loader: 0000000000720000_1bebe3863a6781db_159eb52f_XIAOMI.fhprg
Port : Auto

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM5)
SymbolicName :\\?\usb#vid_05c6&pid_9008#6&2953c98d&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :03/19/2014,2.1.1.2

Getting device info. [Connected].....
Serial No.: 0x5507F482
HW_ID : 0014D0E100720000
MSM ID : 0x0014D0E1, SM_KAMORTA_H- /
MODEL_ID : 0x0000
OEM_ID : 0x0072 - XIAOMI
PBL Ver : 00000000
PK HASH : 1bebe3863a6781db4b01086063007334de9e5ca14971c7c4f4358ec9d79cda46

Firehose Loader[0000000000720000_1bebe3863a6781db_159eb52f_XIAOMI.fhprg]
--------------------------------------------------
Header Type : New
TargetMSM :
Tag :
Version : 6
Code_size : 816
Signature_size : 256
fhVendor : XIAOMI
HW_ID : 0000000000720000
Vendor : XIAOMI
OEM_ID : 0072
MODEL_ID : 0000
SW_ID : 00000003
APP_ID : 00000000
pk_hash : 1bebe3863a6781db4b01086063007334de9e5ca14971c7c4f4358ec9d79cda4692ce5e948c6fd409408f4c919fcadfe3
OEM_VERSION : f2f760038334
IMAGE_VARIANT : KamortaPkgLAA
QC_VERSION : BOOT.XF.4.1-00187-KAMORTALAZ-2
--------------------------------------------------

SaharaBoot... Ok
Sending .................................Ok
Connecting to Firehose...
Ping...................... Ok
Configuration[FHProt_Auto]........
Identifying Chip........UFS
Ok
Chip Configuration :
MemoryName : UFS
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Nov 16 2020 - 01:25:39

*** STORAGE DEVICE INFO ***
Memory Type : UFS
Block Size in Bytes : 4096
Page Size : 4096
Manufacturer ID : 429
Serial Number : 2037279096
Firmware Version : 005
Product Name : H9HQ53AECMMDAR
Physical Partitions : 6
Total Logical Blocks:
Drive [0] 14501888[55.32 GB]
Drive [1] 2048[8 MB]
Drive [2] 2048[8 MB]
Drive [3] 32768[128 MB]
Drive [4] 1048576[4 GB]
Drive [5] 32768[128 MB]

Protocol : Universal
Running : Ok

Reading GPT[6]
Drive [0] 32 Items
Drive [1] 32 Items
Drive [2] 32 Items
Drive [3] 32 Items
Drive [4] 64 Items
Drive [5] 32 Items


Failed to read information from phone.


Backup Security partitions...
Reading Security Items....
- modemst1(modemst1.bin), 1.996 MB = Ok
- modemst2(modemst2.bin), 1.996 MB = Ok
- fsg(fsg.bin), 1.996 MB = Ok
- fsc(fsc.bin), 124 KB = Ok
C:\Hydra Tool\Backup\QUALBackup\XIAOMI\0014D0E100720000_5507F482\Security_Backup\052323123401.sec
Backup Security Success....
Reading GPT[6]
Drive [0] 32 Items
Drive [1] 32 Items
Drive [2] 32 Items
Drive [3] 32 Items
Drive [4] 64 Items
Drive [5] 32 Items

Backing up Partition for safety...Ok

Scanning Patching address...
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]Done!!
Total Items patched : 6
Successfully patched address..

Action Result : Ok

Elapsed Time : 00:00:37
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Vivo Y1s (PD2014F) Format Factory Reset by Hydra Tool

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Service Function
Format/Factory Reset/ScreenLock
Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching for MTK Device...Found
MTK Port Type : Flashmode BROM
FriendlyName : MediaTek USB Port (COM3)
Device : /6&2953c98d&0&3
SymbolicName : \\?\usb#vid_0e8d&pid_0003#6&2953c98d&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0
Service : wdm_usb

Openning Port [COM3] Ok
Reading Partition Table ..
ERAM Size : 0x000000000003A000-232 KB
IRAM Size : 0x0000000080000000-2 GB
EMMC Boot1 Size : 0x0000000000400000-4 MB
EMMC Boot2 Size : 0x0000000000400000-4 MB
EMMC RPMB Size : 0x0000000001000000-16 MB
EMMC USER Size : 0x0000000747C00000-29.121 GB
EMMC CID : 90014A68423861503E03006FF2F6A72F - hB8aP>
HW-CODE : 0x766
HWSUB-CODE : 0x8A00
HW-VERSION : 0xCA00
SW-VERSION : 0x0
CHIP-EVOLUTION : 0x0
DA-VERSION : 1.0
Speed : high-speed
Partition Count : 49
--------------- Reading build.prop content ---------------
Product : k65v1_64_bsp
ID : QP1A.190711.020
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_k65v1_64_bsp-user 10 QP1A.190711.020 compiler03271745 release-keys
Display ID : QP1A.190711.020 release-keys
Security Patch : 2023-02-01
Fingerprint : vivo/2015/2015:10/QP1A.190711.020/compiler03271745:user/release-keys
StorageType : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
IMEI1 : ***************
IMEI2 : ***************
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------
------------------------------
Factory Reset Flash Mode..
------------------------------
Operation : Safeformat Universal...

Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!

Action Result : Ok

Elapsed Time : 00:00:07
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi Note 9 (merlin) Relock Bootloader by Hydra Tool

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Service Function
Bootloader
Relock Bootloader
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching for MTK Device...Found
MTK Port Type : Flashmode BROM
FriendlyName : MediaTek USB Port (COM33)
Device : /6&3a351701&0&2
SymbolicName : \\?\usb#vid_0e8d&pid_0003#6&3a351701&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2016,3.0.1504.0
Service : wdm_usb

Openning Port [COM33] Ok
Reading Partition Table ..
ERAM Size : 0x0000000000070000-448 KB
IRAM Size : 0x0000000100000000-4 GB
EMMC Boot1 Size : 0x0000000000400000-4 MB
EMMC Boot2 Size : 0x0000000000400000-4 MB
EMMC RPMB Size : 0x0000000001000000-16 MB
EMMC USER Size : 0x0000000E8F800000-58,242 GB
EMMC CID : 13014E53304A394A38101A8CA6354757 - S0J9J8
HW-CODE : 0x707
HWSUB-CODE : 0x8A00
HW-VERSION : 0xCA00
SW-VERSION : 0x0
CHIP-EVOLUTION : 0x1
DA-VERSION : 1.0
Speed : high-speed
Partition Count : 50
--------------- Reading build.prop content ---------------
Vendor : Xiaomi
Product : merlin
Manufacturer : Xiaomi
ID : SP1A.210812.016
SDK : 31
Release : 12
ABI : arm64-v8a
Locale : en-GB
Description : merlin-user 12 SP1A.210812.016 V13.0.2.0.SJOMIXM release-keys
Display ID : SP1A.210812.016
Security Patch : 2022-09-01
StorageType : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
IMEI1 : 865************
IMEI2 : 865************
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------
------------------------------
Bootloader Operation..
------------------------------
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------
Relocking Bootloader
Please wait, processing.....
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------
Status: Ok

Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!


Action Result : Ok

Elapsed Time : 00:00:13
 

Attachments

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi Note 9T 5G (cannong) FRP Remove by Hydra Tool

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Service Function
Factory Reset Protection[FRP]
Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching for MTK Device...Found
MTK Port Type : Flashmode BROM
FriendlyName : MediaTek USB Port_V1632 (COM9)
Device : /6&30f0d3dd&0&2
SymbolicName : \\?\usb#vid_0e8d&pid_0003#6&30f0d3dd&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0
Service : wdm_usb

Openning Port [COM9] Ok
Handshaking...Ok
HwCode : 0996 {MT6853}
Hwver : 0000
Target config : E7
SBC : 01 (True)
SLA : 02 (True)
DAA : 04 (True)
SWJTAG : 06 (True)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 20 (True)
MEMWRITE : 40 (True)
CMD_C8 : 80 (True)
Connection : BROM
HW Subcode : 8A00
HW Subcode : CA00
SW Ver : 0000
ME_ID : 2787D52EC85527523EFFB6E0DC045432
SOC_ID : E785B20E6082731FC86274036F71BD5206ADF52BBDFE45BE9DD085B453FD4765

Exploiting Device...
Successfully Exploited..
Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..Found @ 0x00200BC4
Starting to dump...
Prel Size : 0x0005B9B4
Successfully dump preloader.. [C:\Hydra Tool\Boot\PreloaderDump\preloader_cannong.bin]
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)
Connection : BROM

Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin]
Patching da2 ... Ok
Uploading Stage 1....
Successfully uploaded stage 1, jumping ..
Executing JUMP_DA Address @ 0x00200000
Jumping to 0x00200000 Ok 0xC0
Successfully received DA sync
ONNECTION_AGENT : brom
DRAM config needed for : 4B4D355638303031444D2D4236323200
Sending auto preloader from dump... [preloader_cannong.bin]
Sending emi data.. [DRAM setup passed.]
Sending emi data succeeded.
Uploading stage 2...
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
ERAM Size : 0x0000000000070000-448 KB
IRAM Size : 0x0000000100000000-4 GB
UFS MID : 0x4B
UFS FWVer : 0x2302
UFS Blocksize : 0x0000000000001000-4 KB
UFS LU0 Size : 0x0000000000400000-4 MB
UFS LU1 Size : 0x0000000000400000-4 MB
UFS LU2 Size : 0x0000001DCB000000-119.172 GB
UFS ID : 5
UFS CID : 4B4D355638303031444D2D423632320000000000
HW-CODE : 0x996
HWSUB-CODE : 0x8A00
HW-VERSION : 0xCA00
SW-VERSION : 0x0
CHIP-EVOLUTION : 0x1
DA-VERSION : 1.0
Speed : high-speed
Upload data was accepted. Jumping to stage 2...
DA Extensions successfully added
Reading Partition Table ..
Partition Count : 62
--------------- Reading build.prop content ---------------
Product : cannong
Marketname : ro.product.systemRedmi Note 9T
ID : QP1A.190711.020
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : cannong-user 10 QP1A.190711.020 V12.0.8.0.QJEMIXM release-keys
Display ID : QP1A.190711.020
Security Patch : 2021-03-01
StorageType : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
IMEI1 : Unable To decrypt Unknown Keys[5G]
IMEI2 : Unable To decrypt Unknown Keys[5G]
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------
Backing up Security..
- preloader(preloader.bin), 512 KB = Ok [preloader_cannong.bin]
*Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0996_2787D52EC85527523EFFB6E0DC045432\Auto\052423014037\6853_Android_scatter.txt
- pgpt(pgpt.bin), 32 KB = Ok
- nvram(nvram.bin), 64 MB = Ok
- nvdata(nvdata.bin), 64 MB = Ok
- frp(frp.bin), 1024 KB = Ok
- protect1(protect1.bin), 8 MB = Ok
- protect2(protect2.bin), 8 MB = Ok
- persist(persist.bin), 66.469 MB = Ok
- proinfo(proinfo.bin), 3 MB = Ok
- nvcfg(nvcfg.bin), 32 MB = Ok
- sec1(sec1.bin), 2 MB = Ok
- seccfg(seccfg.bin), 8 MB = Ok
Backup Done!!!

Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!

Action Result : Ok

Elapsed Time : 00:01:13
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi 9A (dandelion) FRP Removed in Flash Mode by Hydra Tool

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Service Function
Factory Reset Protection[FRP]
Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching for MTK Device...Found
MTK Port Type : Flashmode BROM
FriendlyName : MediaTek USB Port_V1632 (COM69)
Device : /9&2b9f94a2&0&2
SymbolicName : \\?\usb#vid_0e8d&pid_0003#9&2b9f94a2&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0
Service : wdm_usb

Openning Port [COM69] Ok
Handshaking...Ok
HwCode : 0766 {MT6765/MT8768t}
Hwver : 0000
Target config : E7
SBC : 01 (True)
SLA : 02 (True)
DAA : 04 (True)
SWJTAG : 06 (True)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 20 (True)
MEMWRITE : 40 (True)
CMD_C8 : 80 (True)
Connection : BROM
HW Subcode : 8A00
HW Subcode : CA00
SW Ver : 0000
ME_ID : 9A62D616775BCDF101C0F85F270F7708
SOC_ID : 1E01B318B8E1AF6FC3CA7B9B82FDAB199B8148E2E36F5A82426A7340CD76CD7F

Exploiting Device...
Successfully Exploited..
Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..
Not Found
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)
Connection : BROM

Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin]
Uploading Stage 1....
Successfully uploaded stage 1, jumping ..
Executing JUMP_DA Address @ 0x00200000
Jumping to 0x00200000 Ok 0xC0
Successfully received DA sync
ONNECTION_AGENT : brom
DRAM config needed for : 4501004441343033
Sending auto preloader from dump... [Redmi_9a_v2.bin]
Sending emi data.. [DRAM setup passed.]
Sending emi data succeeded.
Uploading stage 2...
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
ERAM Size : 0x000000000003A000-232 KB
IRAM Size : 0x0000000080000000-2 GB
EMMC Boot1 Size : 0x0000000000400000-4 MB
EMMC Boot2 Size : 0x0000000000400000-4 MB
EMMC RPMB Size : 0x0000000001000000-16 MB
EMMC USER Size : 0x0000000747C00000-29.121 GB
EMMC CID : 4501004441343033320136E46B415737 - DA4032
HW-CODE : 0x766
HWSUB-CODE : 0x8A00
HW-VERSION : 0xCA00
SW-VERSION : 0x0
CHIP-EVOLUTION : 0x0
DA-VERSION : 1.0
Speed : high-speed
Error: on sending data: DA hash mismatch
*DA Extensions failed to enable
Reading Partition Table ..
Partition Count : 45
--------------- Reading build.prop content ---------------
Product : dandelion
Marketname : ro.product.systemRedmi 9A
ID : QP1A.190711.020
SDK : 29
Release : 10
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-GB
Description : dandelion-user 10 QP1A.190711.020 V12.0.22.0.QCDMIXM release-keys
Display ID : QP1A.190711.020
Security Patch : 2023-02-01
StorageType : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
IMEI1 : 863************
IMEI2 : 863************
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------
Backing up Security..
- preloader(preloader.bin), 512 KB = Ok [preloader_k62v1_64_bsp.bin]
*Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0766_9A62D616775BCDF101C0F85F270F7708\Auto\052623123046\6765_Android_scatter.txt
- pgpt(pgpt.bin), 32 KB = Ok
- nvram(nvram.bin), 64 MB = Ok
- nvdata(nvdata.bin), 64 MB = Ok
- frp(frp.bin), 1024 KB = Ok
- protect1(protect1.bin), 8 MB = Ok
- protect2(protect2.bin), 10.867 MB = Ok
- persist(persist.bin), 48 MB = Ok
- proinfo(proinfo.bin), 3 MB = Ok
- nvcfg(nvcfg.bin), 32 MB = Ok
- sec1(sec1.bin), 2 MB = Ok
- seccfg(seccfg.bin), 8 MB = Ok
- lk(lk.bin), 2 MB = Ok
Backup Done!!!

Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!

Action Result : Ok

Elapsed Time : 00:01:32
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Pocophone X3 Pro (vayu) Brick-Bootloop Solution Fastboot Flash with Hydra Tool

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Qualcomm Flashing Function......
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching Device By Fastboot
Device Found...
- switch[0](dummy.img), 8 KB = Ok
- misc[0](misc.img), 4 MB = Ok
- logfs[0](logfs_ufs_8mb.bin), 16 KB = Ok
- metadata[0](metadata.img), 48.074 KB = Ok
- super[0](super.img), 7.348 GB = Ok
- imagefv[0](imagefv.elf), 140 KB = Ok
- recovery[0](recovery.img), 128 MB = Ok
- cache[0](cache.img), 152.145 KB = Ok
- cust[0](cust.img), 507.965 MB = Ok
- userdata[0](userdata.img), 790.18 MB = Ok
- xbl_config[0](xbl_config.elf), 120.641 KB = Ok
- xbl[0](xbl.elf), 3.96 MB = Ok
- xbl_configbak[0](xbl_config.elf), 120.641 KB = Ok
- xblbak[0](xbl.elf), 3.96 MB = Ok
- multiimgoem[0](multi_image.mbn), 32 KB = Ok
- qupfw[0](qupv3fw.elf), 69.072 KB = Ok
- qupfwbak[0](qupv3fw.elf), 69.072 KB = Ok
- vbmeta[0](vbmeta.img), 8 KB = Ok
- storsec[0](storsec.mbn), 20.083 KB = Ok
- vbmeta_system[0](vbmeta_system.img), 4 KB = Ok
- devcfg[0](devcfg.mbn), 53.012 KB = Ok
- devcfgbak[0](devcfg.mbn), 53.012 KB = Ok
- aop[0](aop.mbn), 195.992 KB = Ok
- aopbak[0](aop.mbn), 195.992 KB = Ok
- cmnlib[0](cmnlib.mbn), 385.748 KB = Ok
- cmnlibbak[0](cmnlib.mbn), 385.748 KB = Ok
- cmnlib64[0](cmnlib64.mbn), 503.607 KB = Ok
- cmnlib64bak[0](cmnlib64.mbn), 503.607 KB = Ok
- keymaster[0](km41.mbn), 273.663 KB = Ok
- keymasterbak[0](km41.mbn), 273.663 KB = Ok
- bluetooth[0](BTFM.bin), 860 KB = Ok
- uefisecapp[0](uefi_sec.mbn), 122.616 KB = Ok
- uefisecappbak[0](uefi_sec.mbn), 122.616 KB = Ok
- abl[0](abl.elf), 204 KB = Ok
- ablbak[0](abl.elf), 204 KB = Ok
- tz[0](tz.mbn), 3.043 MB = Ok
- tzbak[0](tz.mbn), 3.043 MB = Ok
- hyp[0](hyp.mbn), 476.883 KB = Ok
- hypbak[0](hyp.mbn), 476.883 KB = Ok
- dtbo[0](dtbo.img), 32 MB = Ok
- logo[0](logo.img), 29.504 MB = Ok
- dsp[0](dspso.bin), 64 MB = Ok
- boot[0](boot.img), 128 MB = Ok
- modem[0](NON-HLOS.bin), 195.309 MB = Ok
- persist[0](persist.img), 64 MB = Ok

Elapsed Time : 00:08:45
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Oppo A16 (CPH2275) FRP Remove One Click by Hydra Tool

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Service Function
Factory Reset Protection[FRP]
Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching for MTK Device...Found
MTK Port Type : Flashmode BROM
FriendlyName : MediaTek USB Port_V1633 (COM13)
Device : /8&2e2938e2&0&2
SymbolicName : \\?\usb#vid_0e8d&pid_0003#8&2e2938e2&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0
Service : wdm_usb

Openning Port [COM13] Ok
Handshaking...Ok
HwCode : 0766 {MT6765/MT8768t}
Hwver : 0000
Target config : E5
SBC : 01 (True)
SLA : 00 (False)
DAA : 04 (True)
SWJTAG : 04 (True)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 20 (True)
MEMWRITE : 40 (True)
CMD_C8 : 80 (True)
Connection : BROM
HW Subcode : 8A00
HW Subcode : CA00
SW Ver : 0000
ME_ID : CE6118EFC124C9F107AEA973C3C7FB2B
SOC_ID : FE2BCCF6160CD208E5E6EB6B81A5AE55ED5959A50F9C77F1DF95581D6DC40FD0

Exploiting Device...
Successfully Exploited..
Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..
Not Found
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)
Connection : BROM

Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin]
Patching da2 ... Ok
Uploading Stage 1....
Successfully uploaded stage 1, jumping ..
Executing JUMP_DA Address @ 0x00200000
Jumping to 0x00200000 Ok 0xC0
Successfully received DA sync
ONNECTION_AGENT : brom
DRAM config needed for : 150100445836384D
Sending auto preloader from dump...
Hydra Auto Preloader Search Enabled..
Hydra will find compatible preloader files...
-----------------------------
Found 14 Compatible Preloaders..
-----------------------------
1-A15s_preloader_oppo6765.bin...Sending... [DRAM setup passed.] [Ok]
-----------------------------
Sending emi data succeeded.
Uploading stage 2...
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
ERAM Size : 0x000000000003A000-232 KB
IRAM Size : 0x00000000C0000000-3 GB
EMMC Boot1 Size : 0x0000000000400000-4 MB
EMMC Boot2 Size : 0x0000000000400000-4 MB
EMMC RPMB Size : 0x0000000000400000-4 MB
EMMC USER Size : 0x0000000747C00000-29,121 GB
EMMC CID : 150100445836384D4209D6C5CA2C5981 - DX68MB
HW-CODE : 0x766
HWSUB-CODE : 0x8A00
HW-VERSION : 0xCA00
SW-VERSION : 0x0
CHIP-EVOLUTION : 0x0
DA-VERSION : 1.0
Speed : high-speed
Upload data was accepted. Jumping to stage 2...
DA Extensions successfully added
Reading Partition Table ..
Partition Count : 50
--------------- Reading build.prop content ---------------
Product : oplus_mssi_64_cn
ID : RP1A.200720.011
SDK : 30
Release : 11
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : sys_oplus_mssi_64_cn-user 11 RP1A.200720.011 1680510347543 release-keys
Display ID : RP1A.200720.011 release-keys
Security Patch : 2023-04-05
StorageType : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------
Backing up Security..
- preloader(preloader.bin), 512 KB = Ok [preloader_oppo6765.bin]
*Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0766_CE6118EFC124C9F107AEA973C3C7FB2B\Auto\052723100308\6765_Android_scatter.txt
- pgpt(pgpt.bin), 32 KB = Ok
- nvram(nvram.bin), 64 MB = Ok
- nvdata(nvdata.bin), 64 MB = Ok
- frp(frp.bin), 1024 KB = Ok
- protect1(protect1.bin), 8 MB = Ok
- protect2(protect2.bin), 15,867 MB = Ok
- persist(persist.bin), 48 MB = Ok
- proinfo(proinfo.bin), 3 MB = Ok
- oppo_custom(oppo_custom.bin), 1024 KB = Ok
- opporeserve1(opporeserve1.bin), 8 MB = Ok
- opporeserve2(opporeserve2.bin), 128 MB = Ok
- nvcfg(nvcfg.bin), 32 MB = Ok
- sec1(sec1.bin), 2 MB = Ok
- seccfg(seccfg.bin), 8 MB = Ok
- lk(lk.bin), 5 MB = Ok
Backup Done!!!

Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!

Action Result : Ok

Elapsed Time : 00:01:25
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
İnfinix Smart Hd 2021 (X612B) Full Flashed by Hydra Tool

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
MTK Flash Function...
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching for MTK Device...Found
MTK Port Type : Flashmode BROM
FriendlyName : MediaTek USB Port_V1633 (COM3)
Device : /5&674d156&0&6
SymbolicName : \\?\usb#vid_0e8d&pid_0003#5&674d156&0&6#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0
Service : wdm_usb

Openning Port [COM3] Ok
Handshaking...Ok
HwCode : 0717 {MT6761/MT6762/MT3369/MT8766B}
Hwver : 0000
Target config : E5
SBC : 01 (True)
SLA : 00 (False)
DAA : 04 (True)
SWJTAG : 04 (True)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 20 (True)
MEMWRITE : 40 (True)
CMD_C8 : 80 (True)
Connection : BROM
HW Subcode : 8A00
HW Subcode : CA01
SW Ver : 0200
ME_ID : AE5F9D48F5FE3D00E0F1270348280C5D
SOC_ID : 5DA35592634F8042B744F42659723BC7773B6802B7CF29BFB473381CB3F99013

Exploiting Device...
Successfully Exploited..
Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..
Not Found
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)
Connection : BROM

Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin]
Patching da2 ... Ok
Uploading Stage 1....
Successfully uploaded stage 1, jumping ..
Executing JUMP_DA Address @ 0x00200000
Jumping to 0x00200000 Ok 0xC0
Successfully received DA sync
ONNECTION_AGENT : brom
DRAM config needed for : 1501005158363341
Sending auto preloader from dump...
Hydra Auto Preloader Search Enabled..
Hydra will find compatible preloader files...
-----------------------------
Found 6 Compatible Preloaders..
-----------------------------
1-preloader_akita_row_wifi.bin...Sending... [DRAM setup passed.] [Ok]
-----------------------------
Sending emi data succeeded.
Uploading stage 2...
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
ERAM Size : 0x000000000003A500-233.25 KB
IRAM Size : 0x0000000080000000-2 GB
EMMC Boot1 Size : 0x0000000000400000-4 MB
EMMC Boot2 Size : 0x0000000000400000-4 MB
EMMC RPMB Size : 0x0000000000400000-4 MB
EMMC USER Size : 0x0000000747C00000-29.121 GB
EMMC CID : 150100515836334142038EF8BCAFC7E5 - QX63AB
HW-CODE : 0x717
HWSUB-CODE : 0x8A00
HW-VERSION : 0xCA01
SW-VERSION : 0x200
CHIP-EVOLUTION : 0x0
DA-VERSION : 1.0
Speed : high-speed
Upload data was accepted. Jumping to stage 2...
DA Extensions successfully added
Reading Partition Table ..
Partition Count : 41
--------------- Reading build.prop content ---------------
No or unknown super geometry !

Reading IMEI........
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------
Backing up Security..
- preloader(preloader.bin), 512 KB = Ok []
*Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0717_AE5F9D48F5FE3D00E0F1270348280C5D\Auto\052623185049\6761_Android_scatter.txt
- pgpt(pgpt.bin), 32 KB = Ok
- nvram(nvram.bin), 64 MB = Ok
- nvdata(nvdata.bin), 64 MB = Ok
- frp(frp.bin), 1024 KB = Ok
- protect1(protect1.bin), 8 MB = Ok
- protect2(protect2.bin), 10.867 MB = Ok
- persist(persist.bin), 48 MB = Ok
- proinfo(proinfo.bin), 3 MB = Ok
- nvcfg(nvcfg.bin), 32 MB = Ok
- sec1(sec1.bin), 2 MB = Ok
- seccfg(seccfg.bin), 8 MB = Ok
Backup Done!!!

Write Selected Partitions..
- preloader(preloader_infinix_x612b-verified.bin), 224.043 KB[Erasing...Ok] Status :C0010001 Error= Failed
- recovery(recovery.img), 32 MB[Erasing...Ok] = Ok
- vbmeta_system(vbmeta_system.img), 4 KB[Erasing...Ok] = Ok
- vbmeta_vendor(vbmeta_vendor.img), 4 KB[Erasing...Ok] = Ok
- md1img(md1img-verified.img), 53.748 MB[Erasing...Ok] = Ok
- spmfw(spmfw-verified.img), 51.141 KB[Erasing...Ok] = Ok
- scp1(scp-verified.img), 553.469 KB[Erasing...Ok] = Ok
- scp2(scp-verified.img), 553.469 KB[Erasing...Ok] = Ok
- sspm_1(sspm-verified.img), 428.281 KB[Erasing...Ok] = Ok
- sspm_2(sspm-verified.img), 428.281 KB[Erasing...Ok] = Ok
- lk(lk-verified.img), 796.25 KB[Erasing...Ok] = Ok
- lk2(lk-verified.img), 796.25 KB[Erasing...Ok] = Ok
- boot(boot.img), 32 MB[Erasing...Ok] = Ok
- logo(logo-verified.bin), 1.079 MB[Erasing...Ok] = Ok
- dtbo(dtbo-verified.img), 8 MB[Erasing...Ok] = Ok
- tee1(tee-verified.img), 958.719 KB[Erasing...Ok] = Ok
- tee2(tee-verified.img), 958.719 KB[Erasing...Ok] = Ok
- super(super.img), 2.844 GB[Erasing...Ok] = Ok
- vbmeta(vbmeta.img), 4 KB[Erasing...Ok] = Ok
- cache(cache.img), 72.074 KB[Erasing...Ok] = Ok
- userdata(userdata.img), 248.309 KB[Erasing...Ok] = Ok

Rebooting Device...

Rebooting Device...
Reboot Option : OperationDone
Rebooting Operation Done!!!! = Ok
----------------------------------

Elapsed Time : 00:03:48
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
SM-A115F Samsung Galaxy A11 Frp Remove One Click by Hydra Tool

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Qualcomm Service Tool
Factory Reset Protection
Zero Wipe
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

PreOperation Configuration
Brand : SAMSUNG Model : SM-A115F Storage : Auto
Loader: 0009A0E100200000_2a9630bd810ba7b6_5f79caab_SAMSUNG_SAMSUNG CORPORATION_8953.fhprg
Port : Auto

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM74)
SymbolicName :\\?\usb#vid_05c6&pid_9008#6&30f0d3dd&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :03/19/2014,2.1.1.2

Getting device info. [Connected].....
Serial No.: 0xEF6B893F
HW_ID : 0009A0E100200000
MSM ID : 0x0009A0E1, SDM450-Qualcomm Snapdragon 450/JAADANAZA
MODEL_ID : 0x0000
OEM_ID : 0x0020 - SAMSUNG
PBL Ver : 00000000
PK HASH : 2a9630bd810ba7b60ee2750c46a10d3f55e8d0e9b8b36d75632053f4cbaa55ed

Firehose Loader[0009A0E100200000_2a9630bd810ba7b6_5f79caab_SAMSUNG_SAMSUNG CORPORATION_8953.fhprg]
--------------------------------------------------
Header Type : OLD
TargetMSM : 8953
Tag :
Version : 3
Code_size : 320
Signature_size : 256
fhVendor : SAMSUNG CORPORATION
HW_ID : 0009A0E100200000
Vendor : SAMSUNG
OEM_ID : 0020
MODEL_ID : 0000
SW_ID : 0000000100000003
APP_ID :
pk_hash : 2a9630bd810ba7b60ee2750c46a10d3f55e8d0e9b8b36d75632053f4cbaa55ed
OEM_VERSION : 21HH1F18
IMAGE_VARIANT : JAADANAZA
QC_VERSION : BOOT.BF.3.3.2-00077
--------------------------------------------------

SaharaBoot... Ok
Sending ......................Ok
Connecting to Firehose...
Ping... Ok
Configuration[FHProt_Auto]......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8953
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 2098187405
Firmware Version : 3
Product Name : QX63AB
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 61071360[29.121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok

Reading GPT[3]
Drive [0] 128 Items
Drive [1] 0 Items
Drive [2] 0 Items


Failed to read information from phone.


Auto Backup Security partitions...
Reading Security Items....
- modemst1(modemst1.bin), 4 MB = Ok
- modemst2(modemst2.bin), 4 MB = Ok
- fsg(fsg.bin), 10 MB = Ok
- fsc(fsc.bin), 3.25 MB = Ok
- persist(persist.bin), 32 MB = Ok

C:\Hydra Tool\Backup\QUALBackup\SAMSUNG\0009A0E100200000_EF6B893F\Auto_Backup\052823021250
Backup Security Success....
- Removing FRP [Zero Wipe] Ok
- Removing FRP [Zero Wipe] Ok

Rebooting Phone.... Ok

Action Result : Ok

Elapsed Time : 00:00:14
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi Note 8 (ginkgo) EDL Frp Remove With by Hydra Tool

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Qualcomm Service Tool
Factory Reset Protection
Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

PreOperation Configuration
Brand : XIAOMI Model : Redmi Note 8 (ginkgo) Storage : Auto
Loader: 0010A0E100720000_1bebe3863a6781db_76196dc8_XIAOMI.fhprg
Port : Auto

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM4)
SymbolicName :\\?\usb#vid_05c6&pid_9008#6&2244aa37&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/31/2015,2.1.2.0

Getting device info. [Connected].Ok
Device MODE : Firehose
Connecting to Firehose...
Ping..................... Ok
Configuration.........
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Jul 3 2019 - 22:23:56

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 19
Serial Number : 338953364
Firmware Version : 4
Product Name : S0J9K8
Physical Partitions : 4
Total Logical Blocks:
Drive [0] 122142720[58,242 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Drive [3] 32768[16 MB]

Protocol : Universal
Running : Ok

Reading GPT[4]
Drive [0] 88 Items
Drive [1] 0 Items
Drive [2] 0 Items
Drive [3]


Phone Information......
Vendor : Xiaomi
Manufacturer : Xiaomi
ID : RKQ1.201004.002
SDK : 30
Release : 11
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Miui Ver : V125
Security Patch : 2022-10-01

- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOk

Rebooting Phone.... Ok

Action Result : Ok

Elapsed Time : 00:00:05
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Huawei Y5 2018 (DRA-L21) FRP Remove With by Hydra Tool

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Service Function
Factory Reset Protection[FRP]
Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching for MTK Device...Found
MTK Port Type : Flashmode BROM
FriendlyName : MediaTek USB Port_V1632 (COM26)
Device : /5&14013d94&0&3
SymbolicName : \\?\usb#vid_0e8d&pid_0003#5&14013d94&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0
Service : wdm_usb

Openning Port [COM26] Ok
Handshaking...Ok
HwCode : 0699 {MT6739/MT6731}
Hwver : 0000
Target config : E3
SBC : 01 (True)
SLA : 02 (True)
DAA : 00 (False)
SWJTAG : 02 (True)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 20 (True)
MEMWRITE : 40 (True)
CMD_C8 : 80 (True)
Connection : BROM
HW Subcode : 8A00
HW Subcode : CA00
SW Ver : 0000
ME_ID : C2C54D614073D1D77D529B2B94DCC8AD
SOC_ID : 1BEC25277A74B27079637F62332E432B1A109901931643D0CC3591961416B46E

Exploiting Device...
Successfully Exploited..
Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..Found @ 0x00200BC4
Starting to dump...
Prel Size : 0x0001D5D0
Successfully dump preloader.. [C:\Hydra Tool\Boot\PreloaderDump\preloader_dura.bin]
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)
Connection : BROM

Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin]
Patching da2 ... Ok
Uploading Stage 1....
Successfully uploaded stage 1, jumping ..
Executing JUMP_DA Address @ 0x00200000
Jumping to 0x00200000 Ok 0xC0
Successfully received DA sync
ONNECTION_AGENT : brom
Sending auto preloader from dump... [preloader_dura.bin]
Sending emi data.. [DRAM setup passed.]
Sending emi data succeeded.
Uploading stage 2...
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
ERAM Size : 0x0000000000020000-128 KB
IRAM Size : 0x0000000040000000-1024 MB
EMMC Boot1 Size : 0x0000000000400000-4 MB
EMMC Boot2 Size : 0x0000000000400000-4 MB
EMMC RPMB Size : 0x0000000000400000-4 MB
EMMC USER Size : 0x00000003A3E00000-14,561 GB
EMMC CID : 150100464536324D42061754682B852B - FE62MB
HW-CODE : 0x699
HWSUB-CODE : 0x8A00
HW-VERSION : 0xCA00
SW-VERSION : 0x0
CHIP-EVOLUTION : 0x0
DA-VERSION : 1.0
Speed : high-speed
Upload data was accepted. Jumping to stage 2...
DA Extensions successfully added
Reading Partition Table ..
Partition Count : 47
--------------- Reading build.prop content ---------------
SDK : 27
Release : 8.1.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-US
Security Patch : 2018-09-01
StorageType : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
IMEI1 : 868************
IMEI2 : 868************
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------
Backing up Security..
- preloader(preloader.bin), 512 KB = Ok [preloader_dura.bin]
*Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0699_C2C54D614073D1D77D529B2B94DCC8AD\Auto\052923190305\6739_Android_scatter.txt
- pgpt(pgpt.bin), 512 KB = Ok
- nvram(nvram.bin), 5 MB = Ok
- nvdata(nvdata.bin), 32 MB = Ok
- frp(frp.bin), 1024 KB = Ok
- protect1(protect1.bin), 8 MB = Ok
- protect2(protect2.bin), 16,938 MB = Ok
- oeminfo(oeminfo.bin), 8 MB = Ok
- proinfo(proinfo.bin), 3 MB = Ok
- nvcfg(nvcfg.bin), 8 MB = Ok
- sec1(sec1.bin), 2 MB = Ok
- seccfg(seccfg.bin), 8 MB = Ok
- lk(lk.bin), 1024 KB = Ok
Backup Done!!!

Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!

Action Result : Ok

Elapsed Time : 00:00:47
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi Note 10 Pro (sweet) Brick Fix with Fastboot Flashed by Hydra Tool


- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Qualcomm Flashing Function......
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching Device By Fastboot
Device Found...
- switch[0](dummy.img), 8 KB = Ok
- misc[0](misc.img), 4 MB = Ok
- logfs[0](logfs_ufs_8mb.bin), 16 KB = Ok
- metadata[0](metadata.img), 44.074 KB = Ok
- super[0](super.img), 2.585 GB = Ok
- imagefv[0](imagefv.elf), 28 KB = Ok
- recovery[0](recovery.img), 128 MB = Ok
- cache[0](cache.img), 56.121 KB = Ok
- cust[0](cust.img), 18.36 MB = Ok
- userdata[0](userdata.img), 2.559 MB = Ok
- xbl_config[0](xbl_config.elf), 86.762 KB = Ok
- xbl[0](xbl.elf), 3.594 MB = Ok
- xbl_configbak[0](xbl_config.elf), 86.762 KB = Ok
- xblbak[0](xbl.elf), 3.594 MB = Ok
- multiimgoem[0](multi_image.mbn), 32 KB = Ok
- qupfw[0](qupv3fw.elf), 48.081 KB = Ok
- qupfwbak[0](qupv3fw.elf), 48.081 KB = Ok
- vbmeta[0](vbmeta.img), 4 KB = Ok
- storsec[0](storsec.mbn), 20.091 KB = Ok
- vbmeta_system[0](vbmeta_system.img), 4 KB = Ok
- devcfg[0](devcfg.mbn), 42.043 KB = Ok
- devcfgbak[0](devcfg.mbn), 42.043 KB = Ok
- aop[0](aop.mbn), 160.391 KB = Ok
- aopbak[0](aop.mbn), 160.391 KB = Ok
- cmnlib[0](cmnlib.mbn), 389.521 KB = Ok
- cmnlibbak[0](cmnlib.mbn), 389.521 KB = Ok
- cmnlib64[0](cmnlib64.mbn), 507.959 KB = Ok
- cmnlib64bak[0](cmnlib64.mbn), 507.959 KB = Ok
- keymaster[0](km41.mbn), 237.132 KB = Ok
- keymasterbak[0](km41.mbn), 237.132 KB = Ok
- bluetooth[0](BTFM.bin), 780 KB = Ok
- uefisecapp[0](uefi_sec.mbn), 123.772 KB = Ok
- uefisecappbak[0](uefi_sec.mbn), 123.772 KB = Ok
- abl[0](abl.elf), 204 KB = Ok
- ablbak[0](abl.elf), 204 KB = Ok
- tz[0](tz.mbn), 1.969 MB = Ok
- tzbak[0](tz.mbn), 1.969 MB = Ok
- hyp[0](hyp.mbn), 384.172 KB = Ok
- hypbak[0](hyp.mbn), 384.172 KB = Ok
- dtbo[0](dtbo.img), 32 MB = Ok
- logo[0](logo.img), 24.125 MB = Ok
- dsp[0](dspso.bin), 64 MB = Ok
- boot[0](boot.img), 128 MB = Ok
- modem[0](NON-HLOS.bin), 143.902 MB = Ok
- persist[0](persist.img), 64 MB Skipped

Elapsed Time : 00:00:49
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Oppo Reno 5 Lite (CPH2205) Remove FRP by Hydra Tool

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Service Function
Factory Reset Protection[FRP]
Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching for MTK Device...Found
MTK Port Type : Flashmode BROM
FriendlyName : MediaTek USB Port_V1632 (COM10)
Device : /6&723e50&0&2
SymbolicName : \\?\usb#vid_0e8d&pid_0003#6&723e50&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0
Service : wdm_usb

Openning Port [COM10] Ok
Handshaking...Ok
HwCode : 0788 {MT6771/MT8385/MT8183/MT8666}
Hwver : 0000
Target config : E5
SBC : 01 (True)
SLA : 00 (False)
DAA : 04 (True)
SWJTAG : 04 (True)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 20 (True)
MEMWRITE : 40 (True)
CMD_C8 : 80 (True)
Connection : BROM
HW Subcode : 8A00
HW Subcode : CA00
SW Ver : 0000
ME_ID : BE67D15B89EDAD58BE7932EFE1624CA1
SOC_ID : C791BB616047565DFC5E6698DBD9863E8C0A73730ED1AA09764027B1286CAE1D

Exploiting Device...
Successfully Exploited..
Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..Found @ 0x00200BC4
Starting to dump...
Prel Size : 0x00049798
Successfully dump preloader.. [C:\Hydra Tool\Boot\PreloaderDump\preloader_oppo6771.bin]
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)
Connection : BROM

Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin]
Patching da2 ... Ok
Uploading Stage 1....
Successfully uploaded stage 1, jumping ..
Executing JUMP_DA Address @ 0x00200000
Jumping to 0x00200000 Ok 0xC0
Successfully received DA sync
ONNECTION_AGENT : brom
DRAM config needed for : 13014E53304A394B
Sending auto preloader from dump... [preloader_oppo6771.bin]
Sending emi data.. [DRAM setup passed.]
Sending emi data succeeded.
Uploading stage 2...
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
ERAM Size : 0x0000000000039000-228 KB
IRAM Size : 0x0000000100000000-4 GB
EMMC Boot1 Size : 0x0000000000400000-4 MB
EMMC Boot2 Size : 0x0000000000400000-4 MB
EMMC RPMB Size : 0x0000000001000000-16 MB
EMMC USER Size : 0x0000001D1F000000-116.484 GB
EMMC CID : 13014E53304A394B39101243283B764D - S0J9K9
HW-CODE : 0x788
HWSUB-CODE : 0x8A00
HW-VERSION : 0xCA00
SW-VERSION : 0x0
CHIP-EVOLUTION : 0x0
DA-VERSION : 1.0
Speed : high-speed
Upload data was accepted. Jumping to stage 2...
DA Extensions successfully added
Reading Partition Table ..
Partition Count : 46
--------------- Reading build.prop content ---------------
Product : oplus_mssi_64_cn
ID : RP1A.200720.011
SDK : 30
Release : 11
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : sys_oplus_mssi_64_cn-user 11 RP1A.200720.011 1648824731399 release-keys
Display ID : RP1A.200720.011 release-keys
Security Patch : 2022-04-05
StorageType : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------
Backing up Security..
- preloader(preloader.bin), 512 KB = Ok [preloader_oppo6771.bin]
*Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0788_BE67D15B89EDAD58BE7932EFE1624CA1\Auto\053123151636\6771_Android_scatter.txt
- pgpt(pgpt.bin), 32 KB = Ok
- nvram(nvram.bin), 64 MB = Ok
- nvdata(nvdata.bin), 64 MB = Ok
- frp(frp.bin), 1024 KB = Ok
- protect1(protect1.bin), 8 MB = Ok
- protect2(protect2.bin), 8.469 MB = Ok
- persist(persist.bin), 48 MB = Ok
- proinfo(proinfo.bin), 3 MB = Ok
- oppo_custom(oppo_custom.bin), 1024 KB = Ok
- opporeserve1(opporeserve1.bin), 8 MB = Ok
- opporeserve2(opporeserve2.bin), 64 MB = Ok
- nvcfg(nvcfg.bin), 32 MB = Ok
- sec1(sec1.bin), 2 MB = Ok
- seccfg(seccfg.bin), 8 MB = Ok
- lk(lk.bin), 5 MB = Ok
Backup Done!!!

Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!

Action Result : Ok

Elapsed Time : 00:01:04
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
İnfinix Hot 6X (X623) Qualcomm CPU Remove FRP by Hydra Tool

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Qualcomm Service Tool
Factory Reset Protection
Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

PreOperation Configuration
Brand : INFINIX Model : X623 (Hot 6X) Storage : Auto
Loader: 0000000000000000_18faa941bcdcbf69_08bb5f04_QUALCOMM_SECTOOLS_peek_8917.fhprg
Port : Auto

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM109)
SymbolicName :\\?\usb#vid_05c6&pid_9008#6&30fbebb5&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :03/19/2014,2.1.1.2

Getting device info. [Connected].Ok
Device MODE : Firehose
Connecting to Firehose...
Ping... Ok
Configuration[FHProt_Auto]......
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8917
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 3242487517
Firmware Version : 875573296
Product Name : hB8aP>
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 61071360[29,121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok

Reading GPT[3]
Drive [0] 52 Items
Drive [1] 0 Items
Drive [2] 0 Items

--------------- Reading build.prop content ---------------
Brand : Infinix
Vendor : INFINIX MOBILITY LIMITED
Model : Infinix X623
Product : Infinix-X623
Manufacturer : INFINIX MOBILITY LIMITED
ID : OPM1.171019.026
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : QL1819-user 8.1.0 OPM1.171019.026 ABCDEFI-200402V65 release-keys
Device : Infinix-X623
Display ID : X623-QL1819ABCDEFI-O-200402V65
Security Patch : 2020-04-05
Fingerprint : Infinix/QL1819/Infinix-X623:8.1.0/OPM1.171019.026/ABCDEFI-200402V65:user/release-keys
--------------- end of build.prop content ---------------
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOk

Rebooting Phone.... Ok

Action Result : Ok

Elapsed Time : 00:00:02
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi 9 (lancelot) IMEI Repair by Hydra Tool

-------------------------------------------------------
To Enable BROM Mode :
Method 1 - Bootkey (Vol + - Power) or any combination
Method 2 - Enable Preloader to brom(crashing Method)
Method 3 - Test Point Data0 + ground
To Enable Preloader Mode :
Method 1 - Just Insert cable
-------------------------------------------------------

Searching for MTK Device...Found
MTK Port Type : Flashmode BROM
FriendlyName : MediaTek USB Port_V1633 (COM3)
Device : /6&dada83e&0&2
SymbolicName : \\?\usb#vid_0e8d&pid_0003#6&dada83e&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0
Service : wdm_usb

Openning Port [COM3] Ok
Handshaking...Ok
HwCode : 0707 {MT6768}
Hwver : 0000
Target config : E7
SBC : 01 (True)
SLA : 02 (True)
DAA : 04 (True)
SWJTAG : 06 (True)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 20 (True)
MEMWRITE : 40 (True)
CMD_C8 : 80 (True)
Connection : BROM
HW Subcode : 8A00
HW Subcode : CA00
SW Ver : 0000
ME_ID : 63A2959C4E8C8A05679905E0FE025ECE
SOC_ID : 6531CA3586C37730AC39737FBE74E8082EF9EE636707635EDBDA17B1034E025D

Exploiting Device...
Successfully Exploited..
Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..Found @ 0x00200BC4
Starting to dump...
Prel Size : 0x000447A8
Successfully dump preloader.. [C:\Hydra Tool\Boot\PreloaderDump\preloader_lancelot.bin]
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)
Connection : BROM

Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin]
Patching da2 ... Ok
Uploading Stage 1....
Successfully uploaded stage 1, jumping ..
Executing JUMP_DA Address @ 0x00200000
Jumping to 0x00200000 Ok 0xC0
Successfully received DA sync
ONNECTION_AGENT : brom
DRAM config needed for : 1501004450364441
Sending auto preloader from dump... [preloader_lancelot.bin]
Sending emi data.. [DRAM setup passed.]
Sending emi data succeeded.
Uploading stage 2...
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
ERAM Size : 0x0000000000070000-448 KB
IRAM Size : 0x0000000100000000-4 GB
EMMC Boot1 Size : 0x0000000000400000-4 MB
EMMC Boot2 Size : 0x0000000000400000-4 MB
EMMC RPMB Size : 0x0000000001000000-16 MB
EMMC USER Size : 0x0000000E8F800000-58,242 GB
EMMC CID : 15010044503644414203D787CAD587FB - DP6DAB
HW-CODE : 0x707
HWSUB-CODE : 0x8A00
HW-VERSION : 0xCA00
SW-VERSION : 0x0
CHIP-EVOLUTION : 0x1
DA-VERSION : 1.0
Speed : high-speed
Upload data was accepted. Jumping to stage 2...
DA Extensions successfully added
Reading Partition Table ..
Partition Count : 50
--------------- Reading build.prop content ---------------
Product : lancelot
Marketname : ro.product.systemRedmi 9
ID : RP1A.200720.011
SDK : 30
Release : 11
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : lancelot-user 11 RP1A.200720.011 V12.5.2.0.RJCTRXM release-keys
Display ID : RP1A.200720.011
Security Patch : 2021-11-01
StorageType : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
IMEI1 : 869876058482822
IMEI2 : 869876058482830
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------
Backing up Security..
- preloader(preloader.bin), 512 KB = Ok [preloader_lancelot.bin]
*Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0707_63A2959C4E8C8A05679905E0FE025ECE\Auto\053123175640\6768_Android_scatter.txt
- pgpt(pgpt.bin), 32 KB = Ok
- nvram(nvram.bin), 64 MB = Ok
- nvdata(nvdata.bin), 64 MB = Ok
- frp(frp.bin), 1024 KB = Ok
- protect1(protect1.bin), 8 MB = Ok
- protect2(protect2.bin), 11,367 MB = Ok
- persist(persist.bin), 48 MB = Ok
- proinfo(proinfo.bin), 3 MB = Ok
- nvcfg(nvcfg.bin), 32 MB = Ok
- sec1(sec1.bin), 2 MB = Ok
- seccfg(seccfg.bin), 8 MB = Ok
- lk(lk.bin), 2 MB = Ok
Backup Done!!!

Elapsed Time : 00:01:41



Found
MTK Port Type : Flashmode BROM
FriendlyName : MediaTek USB Port_V1633 (COM3)
Device : /6&dada83e&0&2
SymbolicName : \\?\usb#vid_0e8d&pid_0003#6&dada83e&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0
Service : wdm_usb

Openning Port [COM3] Ok
Reading Partition Table ..
ERAM Size : 0x0000000000070000-448 KB
IRAM Size : 0x0000000100000000-4 GB
EMMC Boot1 Size : 0x0000000000400000-4 MB
EMMC Boot2 Size : 0x0000000000400000-4 MB
EMMC RPMB Size : 0x0000000001000000-16 MB
EMMC USER Size : 0x0000000E8F800000-58,242 GB
EMMC CID : 15010044503644414203D787CAD587FB - DP6DAB
HW-CODE : 0x707
HWSUB-CODE : 0x8A00
HW-VERSION : 0xCA00
SW-VERSION : 0x0
CHIP-EVOLUTION : 0x1
DA-VERSION : 1.0
Speed : high-speed
Partition Count : 50
--------------- Reading build.prop content ---------------
Product : lancelot
Marketname : ro.product.systemRedmi 9
ID : RP1A.200720.011
SDK : 30
Release : 11
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : lancelot-user 11 RP1A.200720.011 V12.5.2.0.RJCTRXM release-keys
Display ID : RP1A.200720.011
Security Patch : 2021-11-01
StorageType : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
IMEI1 : 869876058482822
IMEI2 : 869876058482830
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------

Xiaomi Flashmode Second IMEI Repair
IMEI1 : FFFFFFFFFFFFFFF
IMEI2 : 3534***********

Reading IMEI........
IMEI1 : FFFFFFFFFFFFFFF
IMEI2 : 3534***********

Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!

Action Result : Ok

Elapsed Time : 00:01:52
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye

Redmi 9 (lancelot) Bootloader Unlock One Click by Hydra Tool



- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Service Function
Bootloader
Unlock Bootloader
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching for MTK Device...Found
MTK Port Type : Flashmode BROM
FriendlyName : MediaTek USB Port_V1633 (COM3)
Device : /6&dada83e&0&2
SymbolicName : \\?\usb#vid_0e8d&pid_0003#6&dada83e&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0
Service : wdm_usb

Openning Port [COM3] Ok
Reading Partition Table ..
EMMC Boot1 Size : 0x0000000000400000-4 MB
EMMC Boot2 Size : 0x0000000000400000-4 MB
EMMC RPMB Size : 0x0000000001000000-16 MB
EMMC USER Size : 0x0000000E8F800000-58,242 GB
EMMC CID : 15010044503644414203D787CAD587FB - DP6DAB
HW-CODE : 0x707
HWSUB-CODE : 0x8A00
HW-VERSION : 0xCA00
SW-VERSION : 0x0
CHIP-EVOLUTION : 0x1
DA-VERSION : 1.0
Speed : high-speed
Partition Count : 50
--------------- Reading build.prop content ---------------
Product : lancelot
Marketname : ro.product.systemRedmi 9
ID : RP1A.200720.011
SDK : 30
Release : 11
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : lancelot-user 11 RP1A.200720.011 V12.5.2.0.RJCTRXM release-keys
Display ID : RP1A.200720.011
Security Patch : 2021-11-01
StorageType : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
IMEI1 : 869876058482822
IMEI2 : 869876058482830
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------
------------------------------
Bootloader Operation..
------------------------------
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------
Unlocking Bootloader
Please wait, processing.....
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------
Status: Ok

Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!


Action Result : Ok

Elapsed Time : 00:00:22
 
Top