★★★ Post All Successfully Repaired Phones By Hydra Tool ★★★

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi Note 8 Pro (begonia) Unlock Bootloader With by Hydra

190100000183_HMTKTool.exe_FM_Bootloader_Unlock_Bootloader_10-13-2021-130926.jpeg

=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port (COM5)
Device : 6&df2ee03&0&1
SymbolicName :??USB#VID_0E8D&PID_0003#6&df2ee03&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0

Opened handle..

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 5EA52B5961222AA87022098F231B6E3E
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x0000000180000000 -6 GB
UFS LU0 Size: 0x0000000000400000 -4 MB
UFS LU1 Size: 0x0000000000400000 -4 MB
UFS LU2 Size: 0x0000000EE5800000 -59.586 GB
UFS CID : -'01H9HQ53AECMMDAR
UFS UNIQID : 0d7801ccea63000000000000

Reading GPT0 -UFS [0x00008000] 0 130 Items

Reading System Info
Vendor : Xiaomi
ID : RP1A.200720.011
SDK : 30
Release : 11
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : zh-CN
Description : begonia-user 11 RP1A.200720.011 V12.5.2.0.RGGCNXM release-keys
Miui Ver : V125
Display ID : RP1A.200720.011
Security Patch : 2021-08-01
StorageType : mtp
Userdata State : Not Encrypted

-------------------------------------
Operation : Unlock Bootloader
Processing...
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------

Verifying status after operation...
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------
Action Result : Ok

Elapsed Time : 00:00:03
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Poco M3 Brick Solution -Edl Flashıng By hydra

190300000387_HQTool.exe_EDL_Flashing_10-12-2021-192107.jpeg


Searching for Qualcomm 9008 Device... Found
FriendlyName : Android HS-USB QDLoader 9008 (COM36)
SymbolicName :??USB#VID_05C6&PID_9008#5&3653f569&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 10/08/2015,2.1.2.1

Getting device info .. . ...
Serial No.: 0xE08BFE08
HW_ID : 0014D0E100720000
MSM ID : 0x0014D0E1, SM_KAMORTA_H-
MODEL_ID : 0x0000
OEM_ID : 0x0072 - XIAOMI
PBL Ver : 00000001
PK HASH : 1bebe3863a6781db4b01086063007334de9e5ca14971c7c4f4358ec9d79cda46

Firehose Loader [0000000000720000_1bebe3863a6781db_159eb52f_XIAOMI.fhprg]
--------------------------------------------------
Header Type : New
TargetMSM :
Tag :
Version : 6
Code_size : 816
Signature_size : 256
fhVendor : XIAOMI
HW_ID : 0000000000720000
Vendor : XIAOMI
OEM_ID : 0072
MODEL_ID : 0000
SW_ID : 00000003
APP_ID : 00000000
pk_hash : 1bebe3863a6781db4b01086063007334de9e5ca14971c7c4f4358ec9d79cda4692ce5e948c6fd409408f4c919fcadfe3
OEM_VERSION : f2f760038334
IMAGE_VARIANT : KamortaPkgLAA
QC_VERSION : BOOT.XF.4.1-00187-KAMORTALAZ-2
--------------------------------------------------

SaharaBoot... Ok
Sending .................................b Okb0
Connecting to Firehose...
Ping ...................... Ok
Configuration........
Identifying Chip.... ....UFS
Ok
Chip Configuration :
MemoryName : UFS
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Nov 16 2020 - 01:25:39

*** STORAGE DEVICE INFO ***
Memory Type : UFS
Block Size in Bytes : 4096
Page Size : 4096
Manufacturer ID : 462
Serial Number : 1297306958
Firmware Version : 800
Product Name : KM5C7001DM-B622
Physical titions : 6
Total Logical Blocks:
Drive [0] 14501888 [55.32 GB]
Drive [1] 2048 [8 MB]
Drive [2] 2048 [8 MB]
Drive [3] 32768 [128 MB]
Drive [4] 1048576 [4 GB]
Drive [5] 32768 [128 MB]

Protocol : Universal
Running : Ok

Failed to read information from phone.


----------------------------
Flashing Selected titions....0
- vbmeta_system (0)b [vbmeta_system.img] b0 Ok0
- metadata (0)b [metadata.img] b0 Ok0
- persist (0)b [persist.img] b0 Ok0
- recovery (0)b [recovery.img] b0 Ok0
- super (0)b [super.img] b0 Ok0
- userdata (0)b [userdata.img] b0 Ok0
- PrimaryGPT (0)b [gpt_main0.bin] b0 Ok0
- xbl_config (1)b [xbl_config.elf] b0 Ok0
- xbl (1)b [xbl.elf] b0 Ok0
- PrimaryGPT (1)b [gpt_main1.bin] b0 Ok0
- xbl_configbak (2)b [xbl_config.elf] b0 Ok0
- xblbak (2)b [xbl.elf] b0 Ok0
- PrimaryGPT (2)b [gpt_main2.bin] b0 Ok0
- PrimaryGPT (3)b [gpt_main3.bin] b0 Ok0
- multiimgoem (4)b [multi_image.mbn] b0 Ok0
- vbmeta (4)b [vbmeta.img] b0 Ok0
- qupfw (4)b [qupv3fw.elf] b0 Ok0
- devcfg (4)b [devcfg.mbn] b0 Ok0
- storsec (4)b [storsec.mbn] b0 Ok0
- hyp (4)b [hyp.mbn] b0 Ok0
- hypbak (4)b [hyp.mbn] b0 Ok0
- cmnlib (4)b [cmnlib.mbn] b0 Ok0
- cmnlibbak (4)b [cmnlib.mbn] b0 Ok0
- cmnlib64 (4)b [cmnlib64.mbn] b0 Ok0
- cmnlib64bak (4)b [cmnlib64.mbn] b0 Ok0
- keymaster (4)b [km4.mbn] b0 Ok0
- keymasterbak (4)b [km4.mbn] b0 Ok0
- bluetooth (4)b [BTFM.bin] b0 Ok0
- abl (4)b [abl.elf] b0 Ok0
- ablbak (4)b [abl.elf] b0 Ok0
- imagefv (4)b [imagefv.elf] b0 Ok0
- imagefvbak (4)b [imagefv.elf] b0 Ok0
- uefisecapp (4)b [uefi_sec.mbn] b0 Ok0
- uefisecappbak (4)b [uefi_sec.mbn] b0 Ok0
- featenabler (4)b [featenabler.mbn] b0 Ok0
- featenablerbak (4)b [featenabler.mbn] b0 Ok0
- misc (4)b [misc.img] b0 Ok0
- rpm (4)b [rpm.mbn] b0 Ok0
- rpmbak (4)b [rpm.mbn] b0 Ok0
- tz (4)b [tz.mbn] b0 Ok0
- tzbak (4)b [tz.mbn] b0 Ok0
- logfs (4)b [logfs_ufs_8mb.bin] b0 Ok0
- dtbo (4)b [dtbo.img] b0 Ok0
- dsp (4)b [dspso.bin] b0 Ok0
- boot (4)b [boot.img] b0 Ok0
- modem (4)b [NON-HLOS.bin] b0 Ok0
- cache (4)b [cache.img] b0 Ok0
- cust (4)b [cust.img] b0 Ok0
- PrimaryGPT (4)b [gpt_main4.bin] b0 Ok0
- PrimaryGPT (5)b [gpt_main5.bin] b0 Ok

Done
Operation : Setbootablestoragedrive: Drive 1
Set bootable storage drive 1 Ok

Rebooting Phone.... Ok

Elapsed Time : 00:05:15
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi S2 (ysl) Edl Frp Remove With by Hydra


Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM7)
SymbolicName :??USB#VID_05C6&PID_9008#5&30124de0&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :

Getting device info .. . ...
Serial No.: 0xCBAE4096
HW_ID : 000460E100000000
MSM ID : 0x000460E1, MSM8953-Qualcomm Snapdragon 625
MODEL_ID : 0x0000
OEM_ID : 0x0000 - QUALCOMM
PBL Ver : 00000001
PK HASH : 57158eaf1814d78fd2b3105ece4db18a817a08ac664a5782a925f3ff8403d39a

Firehose Loader [Xiaomi_S2y2_noauth_8953_ddr.mbn]
--------------------------------------------------
Header Type : OLD
TargetMSM : 8953
Tag : _peek
Version : 3
Code_size : 288
Signature_size : 256
fhVendor : XIAOMI
HW_ID : 000460E100000000
Vendor : QUALCOMM
OEM_ID : 0000
MODEL_ID : 0000
SW_ID : 0000000100000003
APP_ID :
pk_hash : 57158eaf1814d78fd2b3105ece4db18a817a08ac664a5782a925f3ff8403d39a
OEM_VERSION : c3-bsp-builder-job004.bj
IMAGE_VARIANT : JAADANAZA
QC_VERSION : BOOT.BF.3.3-00228
--------------------------------------------------

SaharaBoot... Ok
Sending ...................b Okb0
Connecting to Firehose...
Ping ... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8953
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 19
Serial Number : 34134705
Firmware Version : 4
Product Name : S0J9B7
Physical titions : 3
Total Logical Blocks:
Drive [0] 61071360 [29,121 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]

Protocol : Universal
Running : Ok

Phone Information .....
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi S2
ID : PKQ1.181203.001
SDK : 28
Release : 9
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-GB
Description : ysl-user 9 PKQ1.181203.001 V12.0.2.0.PEFMIXM release-keys
Miui Ver : V12
Device : ysl
Mod_device : ysl_global
Display ID : PKQ1.181203.001
Security Patch : 2020-09-01
Emmc_size : 16GB
Fingerprint : xiaomi/ysl/ysl:9/PKQ1.181203.001/V12.0.2.0.PEFMIXM:user/release-keys

Reading GPT[3]
Drive [0] 60 Items
Drive [1] 0 Items
Drive [2] 0 Items

Removing FRPta...
Method : 0
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOk Ok

Elapsed Time : 00:00:05
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi 7A (Pine) Edl Flash With by Hydra


Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM31)
SymbolicName :??USB#VID_05C6&PID_9008#5&31c2c6e&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 07/05/2018,2.1.3.2

Getting device info .. . ...
Serial No.: 0x4A90547D
HW_ID : 000BF0E100720000
MSM ID : 0x000BF0E1, SDM439-Qualcomm Snapdragon 439
MODEL_ID : 0x0000
OEM_ID : 0x0072 - XIAOMI
PBL Ver : 00000001
PK HASH : 57158eaf1814d78fd2b3105ece4db18a817a08ac664a5782a925f3ff8403d39a

Firehose Loader [Xiaomi_Redmi_8_Olive.mbn]
--------------------------------------------------
Header Type : OLD
TargetMSM : 8937
Tag : _auth_peek
Version : 3
Code_size : 320
Signature_size : 256
fhVendor : XIAOMI
HW_ID : 000BF0E100720000
Vendor : XIAOMI
OEM_ID : 0072
MODEL_ID : 0000
SW_ID : 0000000100000003
APP_ID :
pk_hash : 57158eaf1814d78fd2b3105ece4db18a817a08ac664a5782a925f3ff8403d39a
OEM_VERSION : c4-miui-ota-bd104.bj
IMAGE_VARIANT : FAADANAZA
QC_VERSION : BOOT.BF.3.3.2-00073
--------------------------------------------------

SaharaBoot... Ok
Sending .......................b Okb0
Connecting to Firehose...
Ping ... Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[ANvdA8vgR8OVEperxghHU3mne4g]
Signature @256bytes Authentication.... Accepted ......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 19
Serial Number : 224052638
Firmware Version : 7
Product Name : S0J9B7
Physical titions : 3
Total Logical Blocks:
Drive [0] 61071360 [29.121 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]

Protocol : Universal
Running : Ok

Phone Information ......
Vendor : Xiaomi
ID : QKQ1.191014.001
SDK : 29
Release : 10
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-GB
Miui Ver : V12
Mod_device : pine_global
Security Patch : 2021-05-01
Emmc_size : 16GB

Reading GPT[3]
Drive [0] 60 Items
Drive [1] 0 Items
Drive [2] 0 Items


Backup Security titions...
Reading Security Items....
> modemst1
> modemst2
> fsg
> fsc
D:Hydra ToolBackupSecurity_Backup__10_Security_101421075519.sec
Backup Security Success....

----------------------------
Flashing Selected titions....
- sec (0)b [sec.dat] b0 Skipped
- config (0)b [config.bin] b0 Ok
- vbmeta (0)b [vbmeta.img] b0 Ok
- vbmetabak (0)b [vbmeta.img] b0 Ok
- devcfg (0)b [devcfg.mbn] b0 Ok
- devcfgbak (0)b [devcfg.mbn] b0 Ok
- apdp (0)b [dummy.img] b0 Ok
- msadp (0)b [dummy.img] b0 Ok
- sbl1 (0)b [sbl1.mbn] b0 Ok
- sbl1bak (0)b [sbl1.mbn] b0 Ok
- rpm (0)b [rpm.mbn] b0 Ok
- rpmbak (0)b [rpm.mbn] b0 Ok
- cmnlib (0)b [cmnlib_30.mbn] b0 Ok
- cmnlibbak (0)b [cmnlib_30.mbn] b0 Ok
- cmnlib64 (0)b [cmnlib64_30.mbn] b0 Ok
- cmnlib64bak (0)b [cmnlib64_30.mbn] b0 Ok
- keymaster (0)b [km4.mbn] b0 Ok
- keymasterbak (0)b [km4.mbn] b0 Ok
- misc (0)b [misc.img] b0 Ok
- aboot (0)b [emmc_appsboot.mbn] b0 Ok
- abootbak (0)b [emmc_appsboot.mbn] b0 Ok
- tz (0)b [tz.mbn] b0 Ok
- tzbak (0)b [tz.mbn] b0 Ok
- dtbo (0)b [dtbo.img] b0 Ok
- dtbobak (0)b [dtbo.img] b0 Ok
- splash (0)b [splash.img] b0 Ok
- dsp (0)b [adspso.bin] b0 Ok
- dspbak (0)b [adspso.bin] b0 Ok
- persist (0)b [persist.img] b0 Ok
- mdtp (0)b [mdtp.img] b0 Ok
- mdtpbak (0)b [mdtp.img] b0 Ok
- boot (0)b [boot.img] b0 Ok
- recovery (0)b [recovery.img] b0 Ok
- cache (0)b [cache.img] b0 Ok
- modem (0)b [NON-HLOS.bin] b0 Ok
- system (0)b [system.img] b0 Ok
- vendor (0)b [vendor.img] b0 Ok
- cust (0)b [cust.img] b0 Ok
- userdata (0)b [userdata.img] b0 Ok
- PrimaryGPT (0)b [gpt_main0.bin] b0 Ok

Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-33.] OK
0 [CRC32(2,7680)] OK
0 [CRC32(NUM_DISK_SECTORS-33.,7680)] OK
0 [0] OK
0 [CRC32(1,92)] OK
0 [0] OK
0 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 0
Set bootable storage drive 0 Ok

Rebooting Phone.... Ok

Elapsed Time : 00:09:00
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Huawei Y7 2019 (DUB-LX1) Edl Flash With by Hydra


Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM22)
SymbolicName :??USB#VID_05C6&PID_9008#6&3662e80&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 08/02/2017,2.1.2.7

Getting device info .. . ...
Serial No.: 0xEDE8F155
HW_ID : 0009A0E100150065
MSM ID : 0x0009A0E1, SDM450-Qualcomm Snapdragon 450
MODEL_ID : 0x0065
OEM_ID : 0x0015 - HUAWEI
PBL Ver : 00000000
PK HASH : 6bc369511da9cadb3a7af61574f89db385003d6241bdd1ff573dba61bf6ae119

Firehose Loader [prog_emmc_firehose_11.mbn]
--------------------------------------------------
Header Type : OLD
TargetMSM : 8953
Tag : _peek
Version : 3
Code_size : 288
Signature_size : 256
fhVendor : QUALCOMM
HW_ID : 0009A0E100150065
Vendor : HUAWEI
OEM_ID : 0015
MODEL_ID : 0065
SW_ID : 0000000000000003
APP_ID :
pk_hash : 6bc369511da9cadb3a7af61574f89db385003d6241bdd1ff573dba61bf6ae119
OEM_VERSION : SIA1000073848
IMAGE_VARIANT : JAADANAZA
QC_VERSION : BOOT.BF.3.3.2-00019
--------------------------------------------------

SaharaBoot... Ok
Sending .............b Okb0
Connecting to Firehose...
Ping ... Ok
Configuration.......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8953
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 1259872288
Firmware Version : 0
Product Name : hB8aP>
Physical titions : 3
Total Logical Blocks:
Drive [0] 61071360 [29.121 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]

Protocol : Universal
Running : Ok

Phone Information .....
Vendor : unknown
ID : OPM1.171019.011
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : generic_a53-user 8.1.0 OPM1.171019.011 eng.root.20200109.172356 test-keys
Display ID : System 8.2.0.036(07AE)
Security Patch : 2019-12-01

Reading GPT[3]
Drive [0] 60 Items
Drive [1] 0 Items
Drive [2] 0 Items


Backup Security titions...
Reading Security Items....
> modemst1
> modemst2
> fsg
> fsc
C:Hydra ToolBackupSecurity_Backup__8.1.0_Security_101421084814.sec
Backup Security Success....

----------------------------
Flashing Selected titions....
- RPM (0)b [RPM.img] b0 Ok
- TZ (0)b [TZ.img] b0 Ok
- SBL1 (0)b [SBL1.img] b0 Ok
- APDP (0)b [APDP.img] b0 Ok
- MSADP (0)b [MSADP.img] b0 Ok
- KEYMASTER (0)b [KEYMASTER.img] b0 Ok
- DEVCFG (0)b [DEVCFG.img] b0 Ok
- ABOOT (0)b [ABOOT.img] b0 Ok
- MODEM (0)b [MODEM.img] b0 Ok
- KERNEL (0)b [KERNEL.img] b0 Ok
- RAMDISK (0)b [RAMDISK.img] b0 Ok
- RECOVERY_RAMDISK (0)b [RECOVERY_RAMDISK.img] b0 Ok
- RECOVERY_VENDOR (0)b [RECOVERY_VENDOR.img] b0 Ok
- ERECOVERY_KERNEL (0)b [ERECOVERY_KERNEL.img] b0 Ok
- ERECOVERY_RAMDISK (0)b [ERECOVERY_RAMDISK.img] b0 Ok
- ERECOVERY_VENDOR (0)b [ERECOVERY_VENDOR.img] b0 Ok
- SYSTEM (0)b [SYSTEM.img] b0 Ok
- CACHE (0)b [CACHE.img] b0 Ok
- ODM (0)b [ODM.img] b0 Ok
- VENDOR (0)b [VENDOR.img] b0 Ok
- PRODUCT (0)b [PRODUCT.img] b0 Ok
- USERDATA (0)b [USERDATA.img] b0 Ok
- PrimaryGPT (0)b [gpt_main0.bin] b0 Ok

Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-33.] OK
0 [CRC32(2,7168)] OK
0 [CRC32(NUM_DISK_SECTORS-33.,7168)] OK
0 [0] OK
0 [CRC32(1,92)] OK
0 [0] OK
0 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 0
Set bootable storage drive 0 Ok

Rebooting Phone.... Ok

Elapsed Time : 00:36:48

 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi 9C NFC (angelican) Unlock Bootloader With by Hydra

190800001706_HMTKTool.exe_FM_Bootloader_Unlock_Bootloader_10-13-2021-194417.jpeg



=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port (COM15)
Device : 5&23b8d6f1&0&4
SymbolicName :??USB#VID_0E8D&PID_0003#5&23b8d6f1&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2016,3.2

Opened handle..
Handshaking... Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0766 MT6765 [6765]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : E7
SBC : 01 (True)
SLA : 02 (True)
DAA : 04 (True)
SWJTAG : 06 (True)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 20 (True)
MEMWRITE : 40 (True)
CMD_C8 : 80 (True)

Exploiting Device...
Exploit Sent..
Successfully Exploited...
Handshaking... Ok

C:Hydra ToolBackupPreloader_dumpprel.tmp
Handshaking...

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0766 MT6765 [6765]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)

MEID : 0560C0ED0AFECC2E48AD1BEC692D24BD
Stage 1.. [Size:216440]
Sending : Please wait.. Accepted

Identifying Protocol...
Protocol : New
Synchronization... SYNC
Preloader Initialization...
sing prel.tmp
Init : Accepted
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : F495478DEAE1748D0C3CA3919A6763D3
ERAM Size : 0x0000000000038000 -224 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 45010044413430333201A35FA342A777 - DA4032
Executing : ACCEPTED...

Reading GPT -EMMC [0x00008000] 130 Items

Autobackup titions
-preloader [0x00000000] 512 KB -> preloader.bin...0 Ok
-> Renaming Preloader.... preloader_k65v1_64_bsp.bin
Creating Scatter file... C:Hydra ToolBackupAuto0766__101321194349MT6765_Android_scatter.txt
-pgpt [0x00000000] 32 KB -> pgpt.bin...0 Ok
-frp [0x3BD88000] 1024 KB -> frp.bin...0 Ok
-nvdata [0x3DE88000] 64 MB -> nvdata.bin...0 Ok
-protect1 [0x45522000] 8 MB -> protect1.bin...0 Ok
-protect2 [0x45D22000] 10.867 MB -> protect2.bin...0 Ok
-persist [0x47000000] 48 MB -> persist.bin...0 Ok
-nvram [0x52E80000] 64 MB -> nvram.bin...0 Ok
Done!!!
C:Hydra ToolBackupAuto0766__101321194349
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 1 F495478DEAE1748D0C3CA3919A6763D3
ERAM Size : 1 0x0000000000038000 -224 KB
IRAM Size : 1 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 45010044413430333201A35FA342A777 - DA4032

Reading GPT -EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Unlock Bootloader
Processing...
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------

Verifying status after operation...
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------
Action Result : Ok

Elapsed Time : 00:01:05
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi 9T Brick Solution-Edl Flash With by Hydra



Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM16)
SymbolicName :??USB#VID_05C6&PID_9008#5&2b2dc6ef&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 08/31/2015,2.1.2.0

Getting device info .. . ...
Serial No.: 0x9A4294E2
HW_ID : 0014D0E100720000
MSM ID : 0x0014D0E1, SM_KAMORTA_H-
MODEL_ID : 0x0000
OEM_ID : 0x0072 - XIAOMI
PBL Ver : 00000001
PK HASH : 1bebe3863a6781db4b01086063007334de9e5ca14971c7c4f4358ec9d79cda46

Firehose Loader [0000000000720000_1bebe3863a6781db_159eb52f_XIAOMI.fhprg]
--------------------------------------------------
Header Type : New
TargetMSM :
Tag :
Version : 6
Code_size : 816
Signature_size : 256
fhVendor : XIAOMI
HW_ID : 0000000000720000
Vendor : XIAOMI
OEM_ID : 0072
MODEL_ID : 0000
SW_ID : 00000003
APP_ID : 00000000
pk_hash : 1bebe3863a6781db4b01086063007334de9e5ca14971c7c4f4358ec9d79cda4692ce5e948c6fd409408f4c919fcadfe3
OEM_VERSION : f2f760038334
IMAGE_VARIANT : KamortaPkgLAA
QC_VERSION : BOOT.XF.4.1-00187-KAMORTALAZ-2
--------------------------------------------------

SaharaBoot... Ok
Sending .................................b Okb0
Connecting to Firehose...
Ping ...................... Ok
Configuration........
Identifying Chip.... ....UFS
Ok
Chip Configuration :
MemoryName : UFS
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Nov 16 2020 - 01:25:39

*** STORAGE DEVICE INFO ***
Memory Type : UFS
Block Size in Bytes : 4096
Page Size : 4096
Manufacturer ID : 462
Serial Number : 1297306958
Firmware Version : 800
Product Name : KM5C7001DM-B622
Physical titions : 6
Total Logical Blocks:
Drive [0] 14501888 [55.32 GB]
Drive [1] 2048 [8 MB]
Drive [2] 2048 [8 MB]
Drive [3] 32768 [128 MB]
Drive [4] 1048576 [4 GB]
Drive [5] 32768 [128 MB]

Protocol : Universal
Running : Ok

Failed to read information from phone.

Reading GPT[6]
Drive [0] 32 Items
Drive [1] 32 Items
Drive [2] 32 Items
Drive [3] 32 Items
Drive [4] 64 Items
Drive [5] 32 Items


Backup Security titions...
Reading Security Items....
> modemst1
> modemst2
> fsg
> fsc
C:Hydra ToolBackupSecurity_Backup___Security_101521131701.sec
Backup Security Success....

----------------------------
Flashing Selected titions....0
- vbmeta_system (0)b [vbmeta_system.img] b0 Ok0
- metadata (0)b [metadata.img] b0 Ok0
- persist (0)b [persist.img] b0 Ok0
- recovery (0)b [recovery.img] b0 Ok0
- super (0)b [super.img] b0 Ok0
- userdata (0)b [userdata.img] b0 Ok0
- PrimaryGPT (0)b [gpt_main0.bin] b0 Ok0
- xbl_config (1)b [xbl_config.elf] b0 Ok0
- xbl (1)b [xbl.elf] b0 Ok0
- PrimaryGPT (1)b [gpt_main1.bin] b0 Ok0
- xbl_configbak (2)b [xbl_config.elf] b0 Ok0
- xblbak (2)b [xbl.elf] b0 Ok0
- PrimaryGPT (2)b [gpt_main2.bin] b0 Ok0
- PrimaryGPT (3)b [gpt_main3.bin] b0 Ok0
- multiimgoem (4)b [multi_image.mbn] b0 Ok0
- vbmeta (4)b [vbmeta.img] b0 Ok0
- qupfw (4)b [qupv3fw.elf] b0 Ok0
- devg (4)b [devg.mbn] b0 Ok0
- storsec (4)b [storsec.mbn] b0 Ok0
- hyp (4)b [hyp.mbn] b0 Ok0
- hypbak (4)b [hyp.mbn] b0 Ok0
- cmnlib (4)b [cmnlib.mbn] b0 Ok0
- cmnlibbak (4)b [cmnlib.mbn] b0 Ok0
- cmnlib64 (4)b [cmnlib64.mbn] b0 Ok0
- cmnlib64bak (4)b [cmnlib64.mbn] b0 Ok0
- keymaster (4)b [km4.mbn] b0 Ok0
- keymasterbak (4)b [km4.mbn] b0 Ok0
- bluetooth (4)b [BTFM.bin] b0 Ok0
- abl (4)b [abl.elf] b0 Ok0
- ablbak (4)b [abl.elf] b0 Ok0
- imagefv (4)b [imagefv.elf] b0 Ok0
- imagefvbak (4)b [imagefv.elf] b0 Ok0
- uefisecapp (4)b [uefi_sec.mbn] b0 Ok0
- uefisecappbak (4)b [uefi_sec.mbn] b0 Ok0
- featenabler (4)b [featenabler.mbn] b0 Ok0
- featenablerbak (4)b [featenabler.mbn] b0 Ok0
- misc (4)b [misc.img] b0 Ok0
- rpm (4)b [rpm.mbn] b0 Ok0
- rpmbak (4)b [rpm.mbn] b0 Ok0
- tz (4)b [tz.mbn] b0 Ok0
- tzbak (4)b [tz.mbn] b0 Ok0
- logfs (4)b [logfs_ufs_8mb.bin] b0 Ok0
- dtbo (4)b [dtbo.img] b0 Ok0
- dsp (4)b [dspso.bin] b0 Ok0
- boot (4)b [boot.img] b0 Ok0
- modem (4)b [NON-HLOS.bin] b0 Ok0
- cache (4)b [cache.img] b0 Ok0
- cust (4)b [cust.img] b0 Ok0
- PrimaryGPT (4)b [gpt_main4.bin] b0 Ok0
- PrimaryGPT (5)b [gpt_main5.bin] b0 Ok
0
Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-6.] OK
0 [NUM_DISK_SECTORS-6.] OK
0 [NUM_DISK_SECTORS-6.] OK
0 [NUM_DISK_SECTORS-6.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-5.] OK
0 [CRC32(2,4096)] OK
0 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
0 [0] OK
0 [CRC32(1,92)] OK
0 [0] OK
0 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
1 [NUM_DISK_SECTORS-6.] OK
1 [NUM_DISK_SECTORS-6.] OK
1 [NUM_DISK_SECTORS-6.] OK
1 [NUM_DISK_SECTORS-6.] OK
1 [NUM_DISK_SECTORS-1.] OK
1 [NUM_DISK_SECTORS-1.] OK
1 [NUM_DISK_SECTORS-5.] OK
1 [CRC32(2,4096)] OK
1 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
1 [0] OK
1 [CRC32(1,92)] OK
1 [0] OK
1 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
2 [NUM_DISK_SECTORS-6.] OK
2 [NUM_DISK_SECTORS-6.] OK
2 [NUM_DISK_SECTORS-6.] OK
2 [NUM_DISK_SECTORS-6.] OK
2 [NUM_DISK_SECTORS-1.] OK
2 [NUM_DISK_SECTORS-1.] OK
2 [NUM_DISK_SECTORS-5.] OK
2 [CRC32(2,4096)] OK
2 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
2 [0] OK
2 [CRC32(1,92)] OK
2 [0] OK
2 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
3 [NUM_DISK_SECTORS-6.] OK
3 [NUM_DISK_SECTORS-6.] OK
3 [NUM_DISK_SECTORS-6.] OK
3 [NUM_DISK_SECTORS-6.] OK
3 [NUM_DISK_SECTORS-1.] OK
3 [NUM_DISK_SECTORS-1.] OK
3 [NUM_DISK_SECTORS-5.] OK
3 [CRC32(2,4096)] OK
3 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
3 [0] OK
3 [CRC32(1,92)] OK
3 [0] OK
3 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
4 [NUM_DISK_SECTORS-6.] OK
4 [NUM_DISK_SECTORS-6.] OK
4 [NUM_DISK_SECTORS-6.] OK
4 [NUM_DISK_SECTORS-6.] OK
4 [NUM_DISK_SECTORS-1.] OK
4 [NUM_DISK_SECTORS-1.] OK
4 [NUM_DISK_SECTORS-5.] OK
4 [CRC32(2,8192)] OK
4 [CRC32(NUM_DISK_SECTORS-5.,8192)] OK
4 [0] OK
4 [CRC32(1,92)] OK
4 [0] OK
4 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
5 [NUM_DISK_SECTORS-6.] OK
5 [NUM_DISK_SECTORS-6.] OK
5 [NUM_DISK_SECTORS-6.] OK
5 [NUM_DISK_SECTORS-6.] OK
5 [NUM_DISK_SECTORS-1.] OK
5 [NUM_DISK_SECTORS-1.] OK
5 [NUM_DISK_SECTORS-5.] OK
5 [CRC32(2,4096)] OK
5 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
5 [0] OK
5 [CRC32(1,92)] OK
5 [0] OK
5 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 1
Set bootable storage drive 1 Ok

Rebooting Phone.... Ok

Elapsed Time : 00:07:58
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi 9A (dandelion) Bootloader Unlock With by Hydra

=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port (COM29)
Device : 5&2ad60a6b&0&1
SymbolicName :??USB#VID_0E8D&PID_0003#5&2ad60a6b&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 09/11/2014,3.0.1437.1

Opened handle..
Handshaking... Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0707 MT6768 [6768]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : E7
SBC : 01 (True)
SLA : 02 (True)
DAA : 04 (True)
SWJTAG : 06 (True)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 20 (True)
MEMWRITE : 40 (True)
CMD_C8 : 80 (True)

Exploiting Device...
Exploit Sent..
Successfully Exploited...
Handshaking... Ok

D:HYDRA TOOLHydraTool_Fullpackage_12-01-2020BackupPreloader_dumpprel.tmp
Handshaking...

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0707 MT6768 [6768]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)

MEID : BB915505424FFC5EAAE13547808F75F0
Stage 1.. [Size:256504]
Sending : Please wait.. Accepted

Identifying Protocol...
Protocol : New
Synchronization... SYNC
Preloader Initialization...
sing prel.tmp
Init : Accepted
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 2FBD9181249499348D12BC92BFB36662
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000001D1EC00000 -116.48 GB
eMMC CID : 15010044563644414202AB2DCE644701 - DV6DAB
Executing : ACCEPTED...

Reading GPT -EMMC [0x00008000] 130 Items

Autobackup titions
-preloader [0x00000000] 512 KB -> preloader.bin...0 Ok
-> Renaming Preloader.... preloader_merlin.bin
Creating Scatter file... D:HYDRA TOOLHydraTool_Fullpackage_12-01-2020BackupAuto0707__101521105959MT6768_Android_scatter.txt
-pgpt [0x00000000] 32 KB -> pgpt.bin...0 Ok
-frp [0x05508000] 1024 KB -> frp.bin...0 Ok
-nvdata [0x0C4A2000] 64 MB -> nvdata.bin...0 Ok
-persist [0x104A2000] 48 MB -> persist.bin...0 Ok
-protect1 [0x164A2000] 8 MB -> protect1.bin...0 Ok
-protect2 [0x16CA2000] 11.367 MB -> protect2.bin...0 Ok
-nvram [0x19F80000] 64 MB -> nvram.bin...0 Ok
Done!!!
D:HYDRA TOOLHydraTool_Fullpackage_12-01-2020BackupAuto0707__101521105959
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 1 2FBD9181249499348D12BC92BFB36662
ERAM Size : 1 0x0000000000070000 -448 KB
IRAM Size : 1 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000001D1EC00000 -116.48 GB
eMMC CID : 15010044563644414202AB2DCE644701 - DV6DAB

Reading GPT -EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Unlock Bootloader
Processing...
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------

Verifying status after operation...
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------
Action Result : Ok

Elapsed Time : 00:00:49
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Huawei Y9A(FRL-L22)Remove Huawei Account With by Hydra

=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port (COM3)
Device : 5&11a3f1f7&0&1
SymbolicName :??USB#VID_0E8D&PID_0003#5&11a3f1f7&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 11/30/2012,5.30.14.0

Opened handle..
Handshaking... Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0707 MT6768 [6768]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : E5
SBC : 01 (True)
SLA : 00 (False)
DAA : 04 (True)
SWJTAG : 04 (True)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 20 (True)
MEMWRITE : 40 (True)
CMD_C8 : 80 (True)

Exploiting Device...
Exploit Sent..
Successfully Exploited...
Handshaking... Ok

C:Hydra ToolBackupPreloader_dumpprel.tmp
Handshaking...

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0707 MT6768 [6768]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)

MEID : 8AFCF09B58E2F354646079125E4E2793
Stage 1.. [Size:256504]
Sending : Please wait.. Accepted

Identifying Protocol...
Protocol : New
Synchronization... SYNC
Preloader Initialization...
sing prel.tmp
Init : Accepted
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : B4E94207B07C300A0705D6B445BA6144
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000001D1EC00000 -116.48 GB
eMMC CID : 15010044555442343202A81ABE818715 - DUTB42
Executing : ACCEPTED...

Reading GPT -EMMC [0x00008000] 130 Items

Autobackup titions
-preloader [0x00000000] 512 KB -> preloader.bin...0 Ok
-> Renaming Preloader.... preloader_k69v1_64.bin
Creating Scatter file... C:Hydra ToolBackupAuto0707__101421193556MT6768_Android_scatter.txt
-pgpt [0x00000000] 32 KB -> pgpt.bin...0 Ok
-frp [0x01A08000] 1024 KB -> frp.bin...0 Ok
-nvdata [0x03B08000] 32 MB -> nvdata.bin...0 Ok
-protect1 [0x05B08000] 8 MB -> protect1.bin...0 Ok
-protect2 [0x06308000] 8 MB -> protect2.bin...0 Ok
-persist [0x07800000] 8 MB -> persist.bin...0 Ok
-nvram [0x08100000] 21 MB -> nvram.bin...0 Ok
-oeminfo [0x09600000] 32 MB -> oeminfo.bin...0 Ok
Done!!!
C:Hydra ToolBackupAuto0707__101421193556
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 1 B4E94207B07C300A0705D6B445BA6144
ERAM Size : 1 0x0000000000070000 -448 KB
IRAM Size : 1 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000001D1EC00000 -116.48 GB
eMMC CID : 15010044555442343202A81ABE818715 - DUTB42

Reading GPT -EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Remove Account
Processing...
Backing up tition for safety...
-oeminfo_101421193617.bin [0x09600000] 32 MB -> oeminfo_101421193617.bin...0 Ok
Action Result : Ok

Elapsed Time : 00:01:46
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Y6P 2020 (MED-LX9) Remove Frp With by Hydra


=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port_V1632 (COM7)
Device : 5&1b4e643&0&3
SymbolicName :??USB#VID_0E8D&PID_0003#5&1b4e643&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0

Opened handle..

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : F8A9FCDAEC599EBBFC62F512B255D2A9
ERAM Size : 0x0000000000038000 -224 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 150100525036344D42019FE5979187A9 - RP64MB

Reading GPT -EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP tition...
Action Result : Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:02
 

Attachments

  • 190700001408_HMTKTool.exe_Auto_10-16-2021-094802.jpeg
    190700001408_HMTKTool.exe_Auto_10-16-2021-094802.jpeg
    248.5 KB · Views: 1

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi 5 Plus (vince) Edl Flashing With by Hydra

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM61)
SymbolicName :??USB#VID_05C6&PID_9008#6&44e1213&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 08/02/2017,2.1.2.7

Getting device info .. . ...
Serial No.: 0x0B704B05
HW_ID : 000460E100000000
MSM ID : 0x000460E1, MSM8953-Qualcomm Snapdragon 625
MODEL_ID : 0x0000
OEM_ID : 0x0000 - QUALCOMM
PBL Ver : 00000000
PK HASH : 57158eaf1814d78fd2b3105ece4db18a817a08ac664a5782a925f3ff8403d39a

Firehose Loader [mi_3_1.mbn]
--------------------------------------------------
Header Type : OLD
TargetMSM : 8953
Tag : _peek
Version : 3
Code_size : 288
Signature_size : 256
fhVendor : XIAOMI
HW_ID : 000460E100000000
Vendor : QUALCOMM
OEM_ID : 0000
MODEL_ID : 0000
SW_ID : 0000000000000003
APP_ID :
pk_hash : 57158eaf1814d78fd2b3105ece4db18a817a08ac664a5782a925f3ff8403d39a
OEM_VERSION : c3-bsp-builder-job001.bj
IMAGE_VARIANT : JAADANAZA
QC_VERSION : BOOT.BF.3.3-00221
--------------------------------------------------

SaharaBoot... Ok
Sending ..................b Okb0
Connecting to Firehose...
Ping ... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8953
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 701740467
Firmware Version : 162
Product Name : HCG8a4
Physical titions : 3
Total Logical Blocks:
Drive [0] 122142720 [58.242 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]

Protocol : Universal
Running : Ok

Phone Information .....
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi 5 Plus
ID : N2G47H
SDK : 25
Release : 7.1.2
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : zh-CN
Description : vince-user 7.1.2 N2G47H 8.11.2 release-keys
Miui Ver : V10
Device : vince
Board : msm8953
Display ID : ZQL1711-vince-build-20181011021921
Security Patch : 2018-09-01
Emmc_size : 16GB
Platform : msm8953
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : xiaomi/vince/vince:7.1.2/N2G47H/8.11.2:user/release-keys

Reading GPT[3]
Drive [0] 52 Items
Drive [1] 0 Items
Drive [2] 0 Items


Backup Security titions...
Reading Security Items....
> modemst1
> modemst2
> fsg
> fsc
C:Hydra ToolBackupSecurity_BackupRedmi 5 Plus_msm8953_7.1.2_Security_101621123409.sec
Backup Security Success....

----------------------------
Flashing Selected titions....
- modem (0)b [NON-HLOS.bin] b0 Ok
- sbl1 (0)b [sbl1.mbn] b0 Ok
- sbl1bak (0)b [sbl1.mbn] b0 Ok
- rpm (0)b [rpm.mbn] b0 Ok
- rpmbak (0)b [rpm.mbn] b0 Ok
- tz (0)b [tz.mbn] b0 Ok
- tzbak (0)b [tz.mbn] b0 Ok
- devcfg (0)b [devcfg.mbn] b0 Ok
- devcfgbak (0)b [devcfg.mbn] b0 Ok
- dsp (0)b [adspso.bin] b0 Ok
- sec (0)b [sec.dat] b0 Skipped
- splash (0)b [splash.img] b0 Ok
- aboot (0)b [emmc_appsboot.mbn] b0 Ok
- abootbak (0)b [emmc_appsboot.mbn] b0 Ok
- boot (0)b [boot.img] b0 Ok
- recovery (0)b [recovery.img] b0 Ok
- system (0)b [system.img] b0 Ok
- cache (0)b [cache.img] b0 Ok
- persist (0)b [persist.img] b0 Ok
- misc (0)b [misc.img] b0 Ok
- lksecapp (0)b [lksecapp.mbn] b0 Ok
- lksecappbak (0)b [lksecapp.mbn] b0 Ok
- cmnlib (0)b [cmnlib.mbn] b0 Ok
- cmnlibbak (0)b [cmnlib.mbn] b0 Ok
- cmnlib64 (0)b [cmnlib64.mbn] b0 Ok
- cmnlib64bak (0)b [cmnlib64.mbn] b0 Ok
- keymaster (0)b [keymaster.mbn] b0 Ok
- keymasterbak (0)b [keymaster.mbn] b0 Ok
- cust (0)b [cust.img] b0 Ok
- userdata (0)b [userdata.img] b0 Ok
- PrimaryGPT (0)b [gpt_main0.bin] b0 Ok

Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-33.] OK
0 [CRC32(2,6656)] OK
0 [CRC32(NUM_DISK_SECTORS-33.,6656)] OK
0 [0] OK
0 [CRC32(1,92)] OK
0 [0] OK
0 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 0
Set bootable storage drive 0 Ok

Rebooting Phone.... Ok

Elapsed Time : 00:07:17
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Oppo A37FW Safe Format-EMMC With by Hydra

Brand : OPPO Model : A37FW Storage : Auto
Loader: 8916.mbn
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM3)
SymbolicName :??USB#VID_05C6&PID_9008#2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 08/31/2015,2.1.2.0

Getting device info .. Ok
Device MODE : Firehose
Connecting to Firehose...
Ping .. Ok
Configuration.......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8916
Version : 1


Protocol : Universal
Running : Ok

Phone Information .....
Brand : OPPO
Vendor : OPPO
Model : A37f
ID : LMY47V
SDK : 22
Release : 5.1.1
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Description : msm8916_64-user 5.1.1 LMY47V eng.root.20190711.032745 release-keys
Board : msm8916
Display ID : A37fEX_11_190711
Security Patch : 2018-03-01
Platform : msm8916
FRPPST : /dev/block/bootdevice/by-name/config

Reading GPT[3]
Drive [0] 40 Items
Drive [1] 0 Items
Drive [2] 4 Items

Formatting Userdata...
Method :
Safe Format - EMMC
Processing...
- Formatting Userdata [Safe Format - eMMc] Ok Ok

Elapsed Time : 00:00:08
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Oppo F7 (CHP1819) Format User Data Without Recovery Lock With by Hydra

=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port (COM43)
Device : 6&6f0c48d&0&4
SymbolicName :??USB#VID_0E8D&PID_0003#6&6f0c48d&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0

Opened handle..

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 438E428367675062AD4D3E66F72BEAF5
ERAM Size : 0x0000000000038000 -224 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 90014A484347386134A509C1D852A4DD - HCG8a4

Reading GPT -EMMC [0x00008000] 130 Items


Reading System Info
ID : QP1A.190711.020
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6771-user 10 QP1A.190711.020 7604ad4e2b1328a1 release-keys
Display ID : QP1A.190711.020 release-keys
Security Patch : 2021-04-05
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Erase Userdata
Processing...
Formatting Userdata...
Action Result : Ok

Elapsed Time : 00:00:05
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi 4X(santoni) Remove FRP With by Hydra


Brand : XIAOMI Model : Redmi 4X (Santoni) Storage : Auto
Loader: mi_1_9.mbn
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM343)
SymbolicName :??USB#VID_05C6&PID_9008#6&e7c094f&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 08/02/2017,2.1.2.7

Getting device info .. Ok
Device MODE : Firehose
Connecting to Firehose...
Ping .. Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 845887861
Firmware Version : 165
Product Name : HBG4a2
Physical titions : 3
Total Logical Blocks:
Drive [0] 61071360 [29,121 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]

Protocol : Universal
Running : Ok

Phone Information .....
Brand : Xiaomi
Vendor : Xiaomi
Model : Redmi 4X
ID : N2G47H
SDK : 25
Release : 7.1.2
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : santoni-user 7.1.2 N2G47H V11.0.2.0.NAMMIXM release-keys
Miui Ver : V11
Device : santoni
Mod_device : santoni_global
Board : QC_Reference_Phone
Display ID : N2G47H
Security Patch : 2018-10-01
Emmc_size : 16GB
Platform : msm8937
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : Xiaomi/santoni/santoni:7.1.2/N2G47H/V11.0.2.0.NAMMIXM:user/release-keys

Reading GPT[3]
Drive [0] 52 Items
Drive [1] 0 Items
Drive [2] 0 Items

Removing FRPta...
Method :
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOk Ok

Elapsed Time : 00:00:05
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Mi Play (lotus) Unlock Bootloader With by Hydra

=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : USB Single Port (COM58)
Device : 6&10c694e1&0&2
SymbolicName :??USB#VID_0E8D&PID_0003#6&10c694e1&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 05/26/2014,3.0.1422.1

Opened handle..
Handshaking... Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0766 MT6765 [6765]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : E7
SBC : 01 (True)
SLA : 02 (True)
DAA : 04 (True)
SWJTAG : 06 (True)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 20 (True)
MEMWRITE : 40 (True)
CMD_C8 : 80 (True)

Exploiting Device...
Exploit Sent..
Successfully Exploited...
Handshaking... Ok

C:Hydra ToolBackupPreloader_dumpprel.tmp
Handshaking...

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0766 MT6765 [6765]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)

MEID : C59A4FB6A3689D812827672C95785105
Stage 1.. [Size:216440]
Sending : Please wait.. Accepted

Identifying Protocol...
Protocol : New
Synchronization... SYNC
Preloader Initialization...
sing prel.tmp
Init : Accepted
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : C88C74E495D7A18A261B9D12DAD491CB
ERAM Size : 0x0000000000038000 -224 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58,242 GB
eMMC CID : 90014A68433861503E03498419FC1643 - hC8aP>
Executing : ACCEPTED...

Reading GPT -EMMC [0x00008000] 130 Items

Reading System Info
Brand : xiaomi
Vendor : Xiaomi
Model : MI PLAY
ID : O11019
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : lotus-user 8.1.0 O11019 V11.0.9.0.OFIMIXM release-keys
Miui Ver : V11
Device : lotus
Mod_device : lotus_global
Display ID : ZAL1722-lotus-build-20201017005213
Security Patch : 2020-10-01
Fingerprint : xiaomi/lotus/lotus:8.1.0/O11019/V11.0.9.0.OFIMIXM:user/release-keys
StorageType : mtp
Userdata State : Encrypted

Autobackup titions
-preloader [0x00000000] 512 KB -> preloader.bin...0 Ok
-> Renaming Preloader.... preloader_lotus.bin
Creating Scatter file... C:Hydra ToolBackupAuto0766_xiaomi_lotus_lotus_8.1.0_O11019_V11.0.9.0.OFIMIXM_101721100616MT6765_Android_scatter.txt
-pgpt [0x00000000] 32 KB -> pgpt.bin...0 Ok
-frp [0x03588000] 1024 KB -> frp.bin...0 Ok
-nvdata [0x05688000] 64 MB -> nvdata.bin...0 Ok
-protect1 [0x0B688000] 8 MB -> protect1.bin...0 Ok
-protect2 [0x0BE88000] 9,469 MB -> protect2.bin...0 Ok
-persist [0x0D000000] 48 MB -> persist.bin...0 Ok
-nvram [0x18E80000] 64 MB -> nvram.bin...0 Ok
Done!!!
C:Hydra ToolBackupAuto0766_xiaomi_lotus_lotus_8.1.0_O11019_V11.0.9.0.OFIMIXM_101721100616
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 1 C88C74E495D7A18A261B9D12DAD491CB
ERAM Size : 1 0x0000000000038000 -224 KB
IRAM Size : 1 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58,242 GB
eMMC CID : 90014A68433861503E03498419FC1643 - hC8aP>

Reading GPT -EMMC [0x00008000] 130 Items


Reading System Info
Brand : xiaomi
Vendor : Xiaomi
Model : MI PLAY
ID : O11019
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : lotus-user 8.1.0 O11019 V11.0.9.0.OFIMIXM release-keys
Miui Ver : V11
Device : lotus
Mod_device : lotus_global
Display ID : ZAL1722-lotus-build-20201017005213
Security Patch : 2020-10-01
Fingerprint : xiaomi/lotus/lotus:8.1.0/O11019/V11.0.9.0.OFIMIXM:user/release-keys
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Unlock Bootloader
Processing...
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------

Verifying status after operation...
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------
Action Result : Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:52
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Vivo 1727 Format Userdata And Remove Frp With by Hydra

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM18)
SymbolicName :??USB#VID_05C6&PID_9008#5&2ff99628&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 03/25/2016,2.1.2.2

Getting device info .. . ...
Serial No.: 0x002B79B0
HW_ID : 0009A0E100000000
MSM ID : 0x0009A0E1, SDM450-Qualcomm Snapdragon 450
MODEL_ID : 0x0000
OEM_ID : 0x0000 - QUALCOMM
PBL Ver : 00000000
PK HASH : 60ba997fef6da9f05885fa11f1dd6d2a90d052a257a09c2075d7246cc73c0d43

Hydra Enable Auto search Firehose..
#Please wait...
#Search by filename filter.....
#Found 2 Compatible Files.. Found match Firehose...

Firehose Loader [0009a0e100000000_60ba997fef6da9f0_3d51f0e9_qualcomm_vivo_peek_8953.fhprg]
--------------------------------------------------
Header Type : OLD
TargetMSM : 8953
Tag : _peek
Version : 3
Code_size : 288
Signature_size : 256
fhVendor : VIVO
HW_ID : 0009A0E100000000
Vendor : QUALCOMM
OEM_ID : 0000
MODEL_ID : 0000
SW_ID : 0000000000000003
APP_ID :
pk_hash : 60ba997fef6da9f05885fa11f1dd6d2a90d052a257a09c2075d7246cc73c0d43
OEM_VERSION : compiler033
IMAGE_VARIANT : JAADANAZA
QC_VERSION : BOOT.BF.3.3-00221
--------------------------------------------------

SaharaBoot... Ok
Sending ..................b Okb0
Connecting to Firehose...
Ping ... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8953
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 392551536
Firmware Version : 5
Product Name : RD64MB
Physical titions : 3
Total Logical Blocks:
Drive [0] 61071360 [29.121 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]

Protocol : Universal
Running : Ok
Reading GPT[3]
Drive [0] 56 Items
Drive [1] 0 Items
Drive [2] 0 Items


Phone Information ......
Brand : vivo
Vendor : vivo
Model : vivo 1727
ID : PKQ1.190118.001
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : msm8953_64-user 9 PKQ1.190118.001 compiler09222121 release-keys
Device : PD1730BF_EX
Display ID : PKQ1.190118.001 release-keys
Security Patch : 2020-09-01
Emmc_size : 16GB
Platform : =QCOM8953
Fingerprint : vivo/1727/1727:9/PKQ1.190118.001/compiler09222121:user/release-keys

Processing Safe Format - EMMC....
- Removing FRP [Zero Wipe] Ok
- Formatting Userdata [Safe Format - eMMc] Ok
Action Result : Ok

Rebooting Phone.... Ok

Elapsed Time : 00:00:07
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Oppo A71(2018) CPH1801 Format Userdata Without Recovery Lock With by Hydra

Brand : OPPO Model : A71 (2018) CPH1801 Storage : Auto
Loader: a71_firehose.bin
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM37)
SymbolicName :??USB#VID_05C6&PID_9008#5&115a75a8&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 08/02/2017,2.1.2.7

Getting device info .. Ok
Device MODE : Firehose
Connecting to Firehose...
Ping .. Ok
Configuration... Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8953
Version : 1

Protocol : Oppo
Running : Ok
Processing A71 (CPH1801) Format Userdata....
Action Result : Ok

Elapsed Time : 00:00:03
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
DUB-LX3 (Y7 2019) Edl Frp Remove With by Hydra

Brand : HUAWEI Model : DUB-LX3 (Y7 2019) Storage : Auto
Loader: prog_emmc_firehose_11.mbn
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM5)
SymbolicName :??USB#VID_05C6&PID_9008#5&e13ab&0&6#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 07/08/2015,2.1.2.0

Getting device info .. Ok
Device MODE : Firehose
Connecting to Firehose...
Ping .. Ok
Configuration.......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8953
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 4392787
Firmware Version : 0
Product Name : hC9aP3
Physical titions : 3
Total Logical Blocks:
Drive [0] 122142720 [58.242 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]

Protocol : Universal
Running : Ok

Phone Information .....
Vendor : unknown
ID : OPM1.171019.011
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : generic_a53-user 8.1.0 OPM1.171019.011 eng.jenkin.20210205.113911 test-keys
Display ID : System 8.2.0.036(1UW5)
Security Patch : 2020-09-01

Reading GPT[3]
Drive [0] 60 Items
Drive [1] 0 Items
Drive [2] 0 Items

Removing FRPta...
Method :
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOk Ok

Elapsed Time : 00:00:03
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi 6 (cereus) Bootloader Unlock With by Hydra

=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port (COM3)
Device : 6&4817b6d&0&2
SymbolicName :??USB#VID_0E8D&PID_0003#6&4817b6d&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0

Opened handle..

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 7882252F182B7E966D679C34E41F1EDF
ERAM Size : 0x0000000000038000 -224 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58,242 GB
eMMC CID : 150100475036424D4201CDBEA857955B - GP6BMB

Reading GPT -EMMC [0x00008000] 130 Items


Reading System Info
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi 6
ID : O11019
SDK : 27
Release : 8.1.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-GB
Description : cereus-user 8.1.0 O11019 V10.0.2.0.OCGMIFH release-keys
Miui Ver : V10
Device : cereus
Mod_device : cereus_global
Display ID : O11019
Security Patch : 2018-09-01
Fingerprint : xiaomi/cereus/cereus:8.1.0/O11019/V10.0.2.0.OCGMIFH:user/release-keys
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Unlock Bootloader
Processing...
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------

Verifying status after operation...
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------
Action Result : Ok

Elapsed Time : 00:00:03
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
CloudFone GO SP 2 Remove Frp by Hydra


Port : [Auto] Scanning... COM8
Opening Port... (COM8) Ok
------------------------------------------
Service_FRP_Flashmode...
------------------------------------------
Reading IMEI... .
IMEI 1 : 351************
IMEI 2 : 351************

Reading System Info ..
Vendor : Cloudfone
Model : Go SP 2
Android Ver : 8.1.0
Device : Go_SP_2
Display ID : OPM2.171019.012 release-keys
Security Patch : 2018-07-05
FRPPST : /dev/block/platform/soc/soc:ap-ahb/20600000.sdio/by-name/persist
Fingerprint : Cloudfone/Go_SP_2/Go_SP_2:8.1.0/OPM2.171019.012/1534498757:user/release-keys
ro_product_hardware : k120_v1.1.0
sys_hardware_version : SC7731e_2_IRD_K_V1.1.0

Removing FRP... Ok

Elapsed Time : 00:00:01
 

Attachments

  • 190900002257_HSPRDTool.exe_SPDOperation_FRP_Flashmode_Remove_10-19-2021-122114.jpeg
    190900002257_HSPRDTool.exe_SPDOperation_FRP_Flashmode_Remove_10-19-2021-122114.jpeg
    192.2 KB · Views: 1
Top