GSM-Forum

GSM-Forum (https://forum.gsmhosting.com/vbb/)
-   HYDRA TOOL (https://forum.gsmhosting.com/vbb/f1065/)
-   -   ★★★ Post All Successfully Repaired Phones by Hydra Tool ★★★ (https://forum.gsmhosting.com/vbb/f1065/post-all-successfully-repaired-phones-hydra-tool-2506626/)

Dipendra Pathak 03-24-2021 04:44

Xiaomi Redmi Note 6 Pro (tulip) successfully flashed by Hydra Tool
 
Xiaomi Redmi Note 6 Pro (tulip) successfully flashed by Hydra Tool

Screen Short:

https://i.ibb.co/tYgLS5j/Xiaomi-Redm...ool-edited.jpg

Logs:

Quote:

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM8)
SymbolicName :\??\USB#VID_05C6&PID_9008#6&29a21a1a&0&3#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :03/25/2016,2.1.2.2

Getting device info......
Serial No.: 0xDE7462CD
MSM ID : 0x000CC0E1,
PBL Ver : 00000000
PK HASH : A7B8B82545A98ECA23D6E9105FB46456
8D1B5828264903441BDEF0CD57E3C370

Firehose Loader[mi_2_9.elf]
SaharaBoot... Ok
Sending ...............................Ok
Connecting to Firehose...
Ping...... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : MSM8996
Version : 1
DateTime : Aug 2 2018 - 22:27:53

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 1337511145
Firmware Version : 2
Product Name : DH6DAB
Physical Partitions : 4
Total Logical Blocks:
Drive [0] 122142720[58.242 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Drive [3] 32768[16 MB]

Protocol : Universal
Running : Ok

Phone Information.....
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi Note 6 Pro
ID : OPM1.171019.011
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : tulip-user 8.1.0 OPM1.171019.011 V9.6.10.0.OEKMIFD release-keys
Miui Ver : V9
Device : tulip
Mod_device : tulip_global
Display ID : OPM1.171019.011
Security Patch : 2018-08-01
Fingerprint : xiaomi/tulip/tulip:8.1.0/OPM1.171019.011/V9.6.10.0.OEKMIFD:user/release-keys

Reading GPT[4]
Drive [0] 64 Items
Drive [1] 0 Items
Drive [2] 0 Items
Drive [3]


Backup Security partitions...
Reading Security Items....
> modemst1
> modemst2
> fsg
C:\Hydra Tool\Backup\Security_Backup\Redmi Note 6 Pro__8.1.0_Security_032321200912.sec
Backup Security Success....

----------------------------
Flashing Selected Partitions....
- storsec(0)[storsec.mbn] Ok
- storsecbak(0)[storsec.mbn] Ok
- rpm(0)[rpm.mbn] Ok
- rpmbak(0)[rpm.mbn] Ok
- hyp(0)[hyp.mbn] Ok
- hypbak(0)[hyp.mbn] Ok
- pmic(0)[pmic.elf] Ok
- pmicbak(0)[pmic.elf] Ok
- cmnlib(0)[cmnlib.mbn] Ok
- cmnlibbak(0)[cmnlib.mbn] Ok
- cmnlib64(0)[cmnlib64.mbn] Ok
- cmnlib64bak(0)[cmnlib64.mbn] Ok
- abl(0)[abl.elf] Ok
- ablbak(0)[abl.elf] Ok
- devcfgbak(0)[devcfg.mbn] Ok
- devcfg(0)[devcfg.mbn] Ok
- tz(0)[tz.mbn] Ok
- tzbak(0)[tz.mbn] Ok
- mdtpsecapp(0)[mdtpsecapp.mbn] Ok
- mdtpsecappbak(0)[mdtpsecapp.mbn] Ok
- keymaster(0)[keymaster64.mbn] Ok
- keymasterbak(0)[keymaster64.mbn] Ok
- bluetooth(0)[BTFM.bin] Ok
- xbl(0)[xbl.elf] Ok
- xblbak(0)[xbl.elf] Ok
- misc(0)[misc.img] Ok
- dsp(0)[dspso.bin] Ok
- mdtp(0)[mdtp.img] Ok
- splash(0)[splash.img] Ok
- persist(0)[persist.img] Skipped
- modem(0)[NON-HLOS.bin] Ok
- boot(0)[boot.img] Ok
- recovery(0)[recovery.img] Ok
- cache(0)[cache.img] Ok
- system(0)[system.img] Ok
- vendor(0)[vendor.img] Ok
- cust(0)[cust.img] Ok
- userdata(0)[userdata.img] Ok
- PrimaryGPT(0)[gpt_main0.bin] Ok

Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-33.] OK
0 [CRC32(2,8192)] OK
0 [CRC32(NUM_DISK_SECTORS-33.,8192)] OK
0 [0] OK
0 [CRC32(1,92)] OK
0 [0] OK
0 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 0
Set bootable storage drive 0 Ok

Rebooting Phone.... Ok

Elapsed Time : 00:05:51
BR
Dipendra Pathak


Dipendra Pathak 03-24-2021 04:53

Xiaomi Redmi Note 8 (ginkgo) successfully flashed by Hydra Tool
 
Xiaomi Redmi Note 8 (ginkgo) successfully flashed by Hydra Tool

Screen Short:

https://i.ibb.co/Fgq2L1S/Xiaomi-Redm...ool-edited.jpg

Logs:

Quote:

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM1307)
SymbolicName :\??\USB#VID_05C6&PID_9008#6&188c7adf&0&3#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :07/08/2015,2.1.2.0

Getting device info......
Serial No.: 0x5EC1FF53
MSM ID : 0x0010A0E1, SM6125-Qualcomm Snapdragon 665
PBL Ver : 00000000
PK HASH : 1BEBE3863A6781DB4B01086063007334
DE9E5CA14971C7C4F4358EC9D79CDA46

Firehose Loader[Xiaomi_redminote8_loader.elf]
SaharaBoot... Ok
Sending ..............................Ok
Connecting to Firehose...
Ping..................... Ok
Configuration.........
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Jul 3 2019 - 22:23:56

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 2692472032
Firmware Version : 909127728
Product Name : hC8aP>
Physical Partitions : 4
Total Logical Blocks:
Drive [0] 122142720[58,242 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Drive [3] 32768[16 MB]

Protocol : Universal
Running : Ok

Phone Information......
Brand : Xiaomi
Vendor : Xiaomi
Model : Redmi 8
ID : PKQ1.190319.001
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : olive-user 9 PKQ1.190319.001 V11.0.3.0.PCNMIXM release-keys
Miui Ver : V11
Device : olive
Mod_device : olive_global
Display ID : ZQL2115-olive-build-20191219020635
Security Patch : 2019-12-01
Emmc_size : 16GB
Fingerprint : Xiaomi/olive/olive:9/PKQ1.190319.001/V11.0.3.0.PCNMIXM:user/release-keys

Reading GPT[4]
Drive [0] 88 Items
Drive [1] 0 Items
Drive [2] 0 Items
Drive [3]


Backup Security partitions...
Reading Security Items....
> modemst1
> modemst2
> fsg
C:\Hydra Tool\Backup\Security_Backup\Redmi 8__9_Security_032421014055.sec
Backup Security Success....

----------------------------
Flashing Selected Partitions....
- qupfw(0)[qupv3fw.elf] Ok
- qupfwbak(0)[qupv3fw.elf] Ok
- vbmeta(0)[vbmeta.img] Ok
- vbmetabak(0)[vbmeta.img] Ok
- xbl_config(0)[xbl_config.elf] Ok
- xbl_configbak(0)[xbl_config.elf] Ok
- devcfg(0)[devcfg.mbn] Ok
- devcfgbak(0)[devcfg.mbn] Ok
- storsec(0)[storsec.mbn] Ok
- rpm(0)[rpm.mbn] Ok
- rpmbak(0)[rpm.mbn] Ok
- hyp(0)[hyp.mbn] Ok
- hypbak(0)[hyp.mbn] Ok
- keymaster(0)[km4.mbn] Ok
- keymasterbak(0)[km4.mbn] Ok
- cmnlib(0)[cmnlib.mbn] Ok
- cmnlib64(0)[cmnlib64.mbn] Ok
- cmnlibbak(0)[cmnlib.mbn] Ok
- cmnlib64bak(0)[cmnlib64.mbn] Ok
- abl(0)[abl.elf] Ok
- ablbak(0)[abl.elf] Ok
- bluetooth(0)[BTFM.bin] Ok
- bluetoothbak(0)[BTFM.bin] Ok
- misc(0)[misc.img] Ok
- imagefv(0)[imagefv.elf] Ok
- imagefvbak(0)[imagefv.elf] Ok
- uefisecapp(0)[uefi_sec.mbn] Ok
- uefisecappbak(0)[uefi_sec.mbn] Ok
- xbl(0)[xbl.elf] Ok
- xblbak(0)[xbl.elf] Ok
- tz(0)[tz.mbn] Ok
- tzbak(0)[tz.mbn] Ok
- logfs(0)[logfs_ufs_8mb.bin] Ok
- metadata(0)[metadata.img] Ok
- dtbo(0)[dtbo.img] Ok
- dtbobak(0)[dtbo.img] Ok
- dsp(0)[dspso.bin] Ok
- dspbak(0)[dspso.bin] Ok
- persist(0)[persist.img] Skipped
- boot(0)[boot.img] Ok
- bootbak(0)[boot.img] Ok
- recovery(0)[recovery.img] Ok
- modem(0)[NON-HLOS.bin] Ok
- modembak(0)[NON-HLOS.bin] Ok
- cache(0)[cache.img] Ok
- cust(0)[cust.img] Ok
- vendor(0)[vendor.img] Ok
- system(0)[system.img] Ok
- userdata(0)[userdata.img] Ok
- PrimaryGPT(0)[gpt_main0.bin] Ok

Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-33.] OK
0 [CRC32(2,11264)] OK
0 [CRC32(NUM_DISK_SECTORS-33.,11264)] OK
0 [0] OK
0 [CRC32(1,92)] OK
0 [0] OK
0 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 0
Set bootable storage drive 0 Ok

Rebooting Phone.... Ok

Elapsed Time : 00:21:57
BR
Dipendra Pathak


Dipendra Pathak 03-24-2021 05:00

Cherry Mobile Flare J3s removing FRP successfully done by Hydra Tool
 
Cherry Mobile Flare J3s removing FRP successfully done by Hydra Tool

Screen Short:

https://i.ibb.co/b6rDJF8/Cherry-Mobi...Hydra-Tool.jpg

Logs:

Quote:

************* PRESS BOOT KEY *************
VOL + OR VOL - , OR Combination Vol - +
Feature Phone : Call Button
Please hold boot key until second boot..
*******************************************
Port : [Auto] Scanning...COM7
TPortConnection.Create...(COM7)..Opening...Ok
Identifying... [SPRD3]
Sending Config Ok
Boot1 [hydra.fdl1] Ok
Spreadtrum Boot Block version 1.1
Boot2 [hydra.fdl2]
Verifying Loader 2.... Ok
Sending To phone.... Ok
Successfully booted..Ready to go...

TPortConnection.Destroy.....Closing...Ok..
Port : [Auto] Scanning...COM7
TPortConnection.Create...(COM7)..Opening...Ok
Reading IMEI...
Error : 84.
IMEI 1 : 35276710*******
IMEI 2 : 35276710*******

Reading System Info.
*** Flash Mode #Remove FRP ***
Resetting FRP...Ok
Rebooting Phone..Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:14
BR
Dipendra Pathak


Dipendra Pathak 03-24-2021 05:07

Xiaomi Redmi 7A (Pine) Patched Mi Account Successfully Done by Hydra Tool
 
Xiaomi Redmi 7A (Pine) Patched Mi Account Successfully Done by Hydra Tool

Screen Short:

https://i.ibb.co/k02Vh29/Xiaomi-Redm...ool-edited.jpg

Logs:

Quote:

PreOperation Configuration
Brand : XIAOMI Model : Redmi 7A (pine) Storage : Auto
Loader: Xiaomi_Redmi_8_Olive.mbn
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM17)
SymbolicName :\??\USB#VID_05C6&PID_9008#6&201c3a87&0&3#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/31/2015,2.1.2.0

Getting device info......
Serial No.: 0xFAE24846
MSM ID : 0x000BF0E1, SDM439-Qualcomm Snapdragon 439
PBL Ver : 00000000
PK HASH : 57158EAF1814D78FD2B3105ECE4DB18A
817A08AC664A5782A925F3FF8403D39A

Firehose Loader[Xiaomi_Redmi_8_Olive.mbn]
SaharaBoot... Ok
Sending .......................Ok
Connecting to Firehose...
Ping... Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[KbNgJBOF8zfD8iJQSnphvzgFN4a]
Checking Internet connection....
- Hydra Is Online
Connecting to Hydra Xiaomi Server...

Signature @256bytes Authentication.... Accepted......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 914139797
Firmware Version : 1
Product Name : QD63MB
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 61071360[29.121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok
Reading GPT[3]
Drive [0] 60 Items
Drive [1] 0 Items
Drive [2] 0 Items


Phone Information......
Brand : Xiaomi
Vendor : Xiaomi
Model : Redmi 7A
ID : PKQ1.190319.001
SDK : 28
Release : 9
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : zh-CN
Description : pine-user 9 PKQ1.190319.001 V11.0.6.0.PCMCNXM release-keys
Miui Ver : V11
Device : pine
Display ID : ZQL1533-pine-build-20200407010642
Security Patch : 2020-03-01
Emmc_size : 16GB
Fingerprint : Xiaomi/pine/pine:9/PKQ1.190319.001/V11.0.6.0.PCMCNXM:user/release-keys

Processing Remove MiAccount[Patch Method]....
Backing up Partition for safety...Ok

Scanning Patching address...
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]Done!!
Total Items patched : 5
Successfully patched address..
Action Result : Ok

Elapsed Time : 00:00:20
BR
Dipendra Pathak


Dipendra Pathak 03-24-2021 05:41

Oppo A5s (CHP1909) Formatting selected partition successfully done by Hydra Tool
 
Oppo A5s (CHP1909) Formatting selected partition successfully done by Hydra Tool

Screen Short:

https://i.ibb.co/KjGrL3C/Oppo-A5s-CH...ool-edited.jpg

Logs:

Quote:

Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port_V1632 (COM7)
SymbolicName :\??\USB#VID_0E8D&PID_0003#6&5bab935&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0


Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : DCD2EAE0E994D4CD2D415F21DEBC7863
ERAM Size : 0x000000000003A000 -232 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000747C00000 -29,121 GB
eMMC CID : 150100474436424D42014F259BD2B6ED - GD6BMB

Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info
Vendor : OPPO
ID : O11019
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6765_18511-user 8.1.0 O11019 1608036329 release-keys
Security Patch : 2020-12-05
StorageType : mtp
Userdata State : Encrypted

Format Selected Partition
Formatting [nvdata] Ok!
Formatting [nvram] Ok!
=====================================

Elapsed Time : 00.00.06
BR
Dipendra Pathak


Dipendra Pathak 03-25-2021 04:22

Xiaomi Redmi 6A Cactus Factory Format (formatting user data) successfully done-Hydra
 
Xiaomi Redmi 6A Cactus Factory Format (formatting user data) successfully done by Hydra Tool

Screen Short:

https://i.ibb.co/gWb9cPH/Xiaomi-Redm...ool-edited.jpg

Logs:

Quote:

=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port_V1632 (COM5)
SymbolicName :\??\USB#VID_0E8D&PID_0003#5&201b4142&0&1#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0


Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : C76BD9EAFC047F4A997AF8EC5F99CB88
ERAM Size : 0x000000000003A000 -232 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003A3E00000 -14.561 GB
eMMC CID : 150100514536334D42039874D398B5E5 - QE63MB

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info

-------------------------------------
Operation : Auto
Processing...
Safeformat Universal... Ok

Elapsed Time : 00:00:02
BR
Dipendra Pathak


Dipendra Pathak 03-25-2021 04:32

Xiaomi Redmi 4A Rolex successfully flashed by Hydra Tool
 
Xiaomi Redmi 4A Rolex successfully flashed by Hydra Tool

Screen Short:

https://i.ibb.co/KzXjVSg/Xiaomi-Redm...ool-edited.jpg

Logs:

Quote:

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM17)
SymbolicName :\??\USB#VID_05C6&PID_9008#6&339b49c&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :03/25/2016,2.1.2.2

Getting device info......
Serial No.: 0x9652B03A
MSM ID : 0x000560E1, MSM8917-Qualcomm Snapdragon 425
PBL Ver : 00000000
PK HASH : 57158EAF1814D78FD2B3105ECE4DB18A
817A08AC664A5782A925F3FF8403D39A

Firehose Loader[mi_1_8.mbn]
SaharaBoot... Ok
Sending ...................Ok
Connecting to Firehose...
Ping... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8917
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 2083641452
Firmware Version : 7
Product Name : QX13MB
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 61071360[29,121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok

Phone Information.....
Brand : Xiaomi
Vendor : Xiaomi
Model : Redmi 4A
ID : N2G47H
SDK : 25
Release : 7.1.2
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : rolex-user 7.1.2 N2G47H V10.2.3.0.NCCMIXM release-keys
Miui Ver : V10
Device : rolex
Mod_device : rolex_global
Board : QC_Reference_Phone
Display ID : N2G47H
Security Patch : 2018-07-01
Emmc_size : 16GB
Platform : msm8937
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : Xiaomi/rolex/rolex:7.1.2/N2G47H/V10.2.3.0.NCCMIXM:user/release-keys

Reading GPT[3]
Drive [0] 52 Items
Drive [1] 0 Items
Drive [2] 0 Items


Backup Security partitions...
Reading Security Items....
> modemst1
> modemst2
> fsg
C:\Hydra Tool\Backup\Security_Backup\Redmi 4A_QC_Reference_Phone_7.1.2_Security_032421194110. sec
Backup Security Success....

----------------------------
Flashing Selected Partitions....
- modem(0)[NON-HLOS.bin] Ok
- sbl1(0)[sbl1.mbn] Ok
- sbl1bak(0)[sbl1.mbn] Ok
- rpm(0)[rpm.mbn] Ok
- rpmbak(0)[rpm.mbn] Ok
- tz(0)[tz.mbn] Ok
- tzbak(0)[tz.mbn] Ok
- devcfg(0)[devcfg.mbn] Ok
- devcfgbak(0)[devcfg.mbn] Ok
- dsp(0)[adspso.bin] Ok
- splash(0)[splash.img] Ok
- aboot(0)[emmc_appsboot.mbn] Ok
- abootbak(0)[emmc_appsboot.mbn] Ok
- boot(0)[boot.img] Ok
- recovery(0)[recovery.img] Ok
- system(0)[system.img] Ok
- cache(0)[cache.img] Ok
- persist(0)[persist.img] Skipped
- misc(0)[misc.img] Ok
- mdtp(0)[mdtp.img] Ok
- lksecapp(0)[lksecapp.mbn] Ok
- lksecappbak(0)[lksecapp.mbn] Ok
- cmnlib(0)[cmnlib.mbn] Ok
- cmnlibbak(0)[cmnlib.mbn] Ok
- cmnlib64(0)[cmnlib64.mbn] Ok
- cmnlib64bak(0)[cmnlib64.mbn] Ok
- keymaster(0)[keymaster.mbn] Ok
- keymasterbak(0)[keymaster.mbn] Ok
- cust(0)[cust.img] Ok
- userdata(0)[userdata.img] Ok
- PrimaryGPT(0)[gpt_main0.bin] Ok

Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-33.] OK
0 [CRC32(2,6656)] OK
0 [CRC32(NUM_DISK_SECTORS-33.,6656)] OK
0 [0] OK
0 [CRC32(1,92)] OK
0 [0] OK
0 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 0
Set bootable storage drive 0 Ok

Rebooting Phone.... Ok

Elapsed Time : 00:10:25
BR
Dipendra Pathak


Dipendra Pathak 03-25-2021 04:40

Huawei DRA-LX9 (Y5P 2020) removed Account successfully done by Hydra Tool
 
Huawei DRA-LX9 (Y5P 2020) removed Account successfully done by Hydra Tool

Screen Short:

https://i.ibb.co/SdDqnGB/Huawei-DRA-...ool-edited.jpg

Logs:

Quote:

=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port (COM15)
SymbolicName :\??\USB#VID_0E8D&PID_0003#6&7a1c2a0&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2016,3.0.1504.0


Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 1C7C19F62E9A9E537C1224EE6B790F4B
ERAM Size : 0x000000000003A000 -232 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29,121 GB
eMMC CID : 90014A68423861503E0100F0F29347ED - hB8aP>

Reading GPT-EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Remove Account
Processing...
Backing up Partition for safety...
-oeminfo_032421194233.bin[0x04900000]32 MB ->oeminfo_032421194233.bin...Ok Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:11
BR
Dipendra Pathak


Dipendra Pathak 03-25-2021 04:45

Vovi V11 Pro (V1804) Zero Wipe Successfully removed by Hydra Tool
 
Vovi V11 Pro (V1804) Zero Wipe Successfully removed by Hydra Tool

Screen Short:

https://i.ibb.co/VqRJfgx/Vovi-V11-Pr...ool-edited.jpg

Logs:

Quote:

PreOperation Configuration
Brand : VIVO Model : V11 Pro (V1804) Storage : Auto
Loader: Vivo_V11Pro_SDM660_RW.elf
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM71)
SymbolicName :\??\USB#VID_05C6&PID_9008#7&287c2830&0&2#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/02/2017,2.1.2.7

Getting device info......
Serial No.: 0x57DC6B34
MSM ID : 0x0008C0E1, SDM660-Qualcomm Snapdragon 660
PBL Ver : 00000000
PK HASH : F188B3BC5198FB412FC8AB7EF8B60D24
5EBB705A0FC0AF387F1DB21533CC4570

Firehose Loader[Vivo_V11Pro_SDM660_RW.elf]
SaharaBoot... Ok
Sending ...............................Ok
Connecting to Firehose...
Ping......... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : MSM8996
Version : 1
DateTime : Jul 19 2019 - 12:28:14

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 124939305
Firmware Version : 875573296
Product Name : hC8aP>
Physical Partitions : 4
Total Logical Blocks:
Drive [0] 122142720[58.242 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Drive [3] 32768[16 MB]

Protocol : Universal
Running : Ok
Reading GPT[4]
Drive [0] 52 Items
Drive [1] 0 Items
Drive [2] 0 Items
Drive [3]


Phone Information......
ID : QP1A.190711.020
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Security Patch : 2021-02-01
Platform : =SDM660
Fingerprint : vivo/1804/1804:10/QP1A.190711.020/compiler02221538:user/release-keys

Processing Zero Wipe....
- Removing FRP [Zero Wipe] Ok
- Formatting Userdata [Zero Wipe] Ok
Action Result : Ok

Elapsed Time : 00:00:07
BR
Dipendra Pathak


Dipendra Pathak 03-25-2021 04:50

Huawei ATU-L22 (Y6 2018) Sending Boot Loader Code successfully sent by Hydra Tool
 
Huawei ATU-L22 (Y6 2018) Sending Boot Loader Code successfully sent by Hydra Tool

Screen Short:

https://i.ibb.co/cTVrgdY/Huawei-ATU-...ool-edited.jpg

Logs:

Quote:

Searching Device By Fastboot
Device Found...

Reading Information...version: 0.5
Product : QC_REFERENCE_PHONE
version : 0.5
Secure : yes
Device Info:
Device tampered: true
Device unlocked: false
Device critical unlocked: false
Charger screen enabled: false
Display panel:
Bootloader...
Send Bootloader Code
Processing... Ok

Elapsed Time : 00:00:05
BR
Dipendra Pathak


Dipendra Pathak 03-25-2021 05:14

OWN Smart 9 Pro backing up partition successfully done by Hydra Tool
 
OWN Smart 9 Pro backing up partition successfully done by Hydra Tool

Screen Short:

https://i.ibb.co/JjjwBZB/OWN-Smart-9...ool-edited.jpg

Logs:

Quote:

=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port (COM12)
SymbolicName :\??\USB#VID_0E8D&PID_0003#6&8a7554c&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2016,3.2


Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : E6215AFC7340D8F31903A141C23A3027
ERAM Size : 0x0000000000039000 -228 KB
IRAM Size : 0x0000000180000000 -6 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000001D1EC00000 -116,48 GB
eMMC CID : 150100335636434D4202BE8FD4196599 - 3V6CMB

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Brand : OWN
Vendor : OWN
Model : Smart 9 Pro
ID : O11019
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : es-US
Description : full_k71v1_64_bsp-user 8.1.0 O11019 1528707816 release-keys
Device : Smart_9_Pro
Board : CSW1703B
Display ID : Smart_9_Pro
Security Patch : 2018-04-05
Fingerprint : OWN/Smart_9_Pro/Smart_9_Pro:8.1.0/O11019/1528707816:user/release-keys
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Backup Stock ROM
Processing...

Reading Important Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_k71v1_64_bsp.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Important\OWN_Smart 9 Pro_0788--8.1.0(Smart_9_Pro)240321221518\MT6771_Android_scat ter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x03588000]1024 KB ->frp.bin...Ok
-nvdata[0x05688000]64 MB ->nvdata.bin...Ok
-protect1[0x0B688000]8 MB ->protect1.bin...Ok
-protect2[0x0BE88000]9,469 MB ->protect2.bin...Ok
-seccfg[0x0C800000]8 MB ->seccfg.bin...Ok
-proinfo[0x10200000]3 MB ->proinfo.bin...Ok
-nvram[0x1C580000]64 MB ->nvram.bin...Ok
Reading/Backup Flash Done!!!
C:\Hydra Tool\\Backup\Important\OWN_Smart 9 Pro_0788--8.1.0(Smart_9_Pro)240321221518 Ok

Elapsed Time : 00:01:00
BR
Dipendra Pathak


Dipendra Pathak 03-25-2021 05:24

Oppo A5s successfully formatted by Hydra Tool
 
Oppo A5s successfully formatted by Hydra Tool

Screen Short:

https://i.ibb.co/mGM6Qvy/Oppo-A5s-su...ool-edited.jpg

Logs:

Quote:

Brand : AUTO Model : AUTO Connection : Flash Mode

=====================================
How To Boot : Power off phone
* BROM Mode : Press VOL + or Press VOL -+
* Preloader Mode : Just Insert cable

Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port_V1632 (COM36)
SymbolicName :\??\USB#VID_0E8D&PID_0003#6&df2ee03&0&6#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0766MT6765[6765]
BROM HW_SW_VER : 8A00 CA00 0000 0000
getMTKPayloadExploit : 0766
#Executing Exploit..
#SUCCESS..
Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0766MT6765[6765]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
SECURE VERSION : 00
BL VERSION : FE
BR Secured : E0

Preparing Download Agent..
DA : 6765.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2020-11-03.22:07_536568
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_cactus.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 84F3D8E337026ABFC3B34B7583AC6689
ERAM Size : 0x000000000003A000 -232 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 90014A68423861503E03629AB0819629 - hB8aP>

DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info
Vendor : OPPO
ID : O11019
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6765_18511-user 8.1.0 O11019 1608036329 release-keys
Security Patch : 2020-12-05
StorageType : mtp
Userdata State : Not Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_oppo6765_18511.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0766__032521101229\MT6765_Androi d_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x09E88000]1024 KB ->frp.bin...Ok
-nvdata[0x0BF88000]64 MB ->nvdata.bin...Ok
-persist[0x13800000]48 MB ->persist.bin...Ok
-nvram[0x20000000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0766__032521101229
MTK Phone Loader is NOW RUNNING.

Rebooting Device [Reboot To Normal]
Reboot Done!!
=====================================

Elapsed Time : 00:00:56
BR
Dipendra Pathak


Gsm-Ahmed 03-25-2021 17:38

Benzo G-PADLITE K708 Remove Pattren Without Data Loss
 
Benzo G-PADLITE K708 Remove Pattren Without Data Loss



https://ima.dzgsm.com/uploads/161660243092561.png

Code:

Brand : AUTO Model : AUTO Connection : Flash Mode

=====================================
Connection
 -Please wait...
 -Found...[COM5]

TPortConnection.Create...(COM5)..Opening...Ok


Reading System Info
  Brand          : K708
  Vendor        : Benzo
  Model          : G-PADLITE
  ID            : MRA58K
  SDK            : 23
  Release        : 6.0
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Locale        : fr-FR
  Description    : full_mt8321_tb_m-user 6.0 MRA58K 1557899887 dev-keys
  Device        : K708
  Board          : K708
  Display ID    : G-PADLITE-16G-2019-05-15
  Security Patch : 2017-11-05
  Platform      : mt6580
  FRPPST        : /dev/block/platform/mtk-msdc.0/11120000.msdc0/by-name/frp
  Fingerprint    : alps/full_mt8321_tb_m/mt8321_tb_m:6.0/MRA58K/1557899887:user/dev-keys
  StorageType    : mtp,mass_storage
  Userdata State : Not Encrypted

-------------------------------------
Operation : Remove Lock Without Data Loss
Processing...
Searching patching address.. [Ok].. [Ok].. [Ok].. [Ok].. [Ok] Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:03


Gsm-Ahmed 03-25-2021 17:39

Xiaomi Redmi Note 7 Pro (Violet) Flash Done
 
Xiaomi Redmi Note 7 Pro (Violet) Flash Done
by Hyra Tool



https://ima.dzgsm.com/uploads/161668194192621.png

https://ima.dzgsm.com/uploads/161668194218352.png

Code:

Searching for Qualcomm 9008 Device...Found
 FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM9)
 SymbolicName :\??\USB#VID_05C6&PID_9008#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver  :05/18/2016,1.0.26.0

Getting device info......
Serial No.: 0xDB43600C
MSM ID : 0x000950E1, SM6150-Qualcomm Snapdragon 675
PBL Ver : 00000000
PK HASH : 1BEBE3863A6781DB4B01086063007334
DE9E5CA14971C7C4F4358EC9D79CDA46

Firehose Loader[Xiaomi_Redmi Note 7 Pro_Sdm6150_ddr.elf]
SaharaBoot... Ok
Sending ...................................Ok
Connecting to Firehose...
Ping..................... Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[obi
Checking Internet connection....
- Hydra Is Online
Connecting to Hydra Xiaomi Server...

Signature @256bytes Authentication.... Accepted........
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Jul 19 2019 - 01:44:32

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 1588004687
Firmware Version : 2
Product Name :
Physical Partitions : 4
Total Logical Blocks:
Drive [0] 244277248[116.48 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Drive [3] 32768[16 MB]

Protocol : Universal
Running : Ok

Phone Information......
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi Note 7 Pro
ID : PKQ1.181203.001
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : zh-CN
Description : violet-user 9 PKQ1.181203.001 9.8.9 release-keys
Miui Ver : V10
Device : violet
Display ID : PKQ1.181203.001
Security Patch : 2019-08-01
Fingerprint : xiaomi/violet/violet:9/PKQ1.181203.001/9.8.9:user/release-keys
keys

Reading GPT[4]
Drive [0] 88 Items
Drive [1] 0 Items
Drive [2] 0 Items
Drive [3]


Backup Security partitions...
Reading Security Items....
> modemst1
> modemst2
> fsg
C:\Hydra Tool\Backup\Security_Backup\Redmi Note 7 Pro__9_Security_022042220640.sec
Backup Security Success....

----------------------------
Flashing Selected Partitions....
- multiimgoem(0)[multi_image.mbn] Ok
- vbmeta(0)[vbmeta.img] Ok
- qupfw(0)[qupv3fw.elf] Ok
- xbl_config(0)[xbl_config.elf] Ok
- storsec(0)[storsec.mbn] Ok
- storsecbak(0)[storsec.mbn] Ok
- aop(0)[aop.mbn] Ok
- aopbak(0)[aop.mbn] Ok
- hyp(0)[hyp.mbn] Ok
- hypbak(0)[hyp.mbn] Ok
- cmnlib(0)[cmnlib.mbn] Ok
- cmnlibbak(0)[cmnlib.mbn] Ok
- cmnlib64(0)[cmnlib64.mbn] Ok
- cmnlib64bak(0)[cmnlib64.mbn] Ok
- keymaster(0)[km4.mbn] Ok
- keymasterbak(0)[km4.mbn] Ok
- bluetooth(0)[BTFM.bin] Ok
- devcfg(0)[devcfg.mbn] Ok
- devcfgbak(0)[devcfg.mbn] Ok
- abl(0)[abl.elf] Ok
- ablbak(0)[abl.elf] Ok
- imagefv(0)[imagefv.elf] Ok
- uefisecapp(0)[uefi_sec.mbn] Ok
- uefisecappbak(0)[uefi_sec.mbn] Ok
- misc(0)[misc.img] Ok
- xbl(0)[xbl.elf] Ok
- xblbak(0)[xbl.elf] Ok
- tz(0)[tz.mbn] Ok
- tzbak(0)[tz.mbn] Ok
- logfs(0)[logfs_ufs_8mb.bin] Ok
- dtbo(0)[dtbo.img] Ok
- dsp(0)[dspso.bin] Ok
- splash(0)[splash.img] Ok
- persist(0)[persist.img] Skipped
- boot(0)[boot.img] Ok
- recovery(0)[recovery.img] Ok
- modem(0)[NON-HLOS.bin] Ok
- cache(0)[cache.img] Ok
- cust(0)[cust.img] Ok
- system(0)[system.img] Ok
- vendor(0)[vendor.img] Ok
- userdata(0)[userdata.img] Ok
- PrimaryGPT(0)[gpt_main0.bin] Ok

Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-33.] OK
0 [CRC32(2,11264)] OK
0 [CRC32(NUM_DISK_SECTORS-33.,11264)] OK
0 [0] OK
0 [CRC32(1,92)] OK
0 [0] OK
0 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 0
Set bootable storage drive 0 Ok

Rebooting Phone.... Ok

Elapsed Time : 00:04:34


Dipendra Pathak 03-26-2021 05:29

Huawei mediatek MT6785 IMEI Repaired successfully done by Hydra Tool
 
Huawei mediatek MT6785 IMEI Repaired successfully done by Hydra Tool

Screen Short:

https://i.ibb.co/Bz83hCX/Huawei-medi...ool-edited.jpg

Logs:

Quote:

=====================================
***IMEI REPAIR FUNCTION****
Huawei Flashmode
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port (COM8)
SymbolicName :\??\USB#VID_0E8D&PID_0003#5&38c098cc&0&4#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0


Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 691ED800840173362955D92B23E2B5C2
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000001D1EC00000 -116.48 GB
eMMC CID : 1501004455544234320279B5BC33870F - DUTB42

Reading GPT-EMMC [0x00008000] 130 Items
IMEI INFO..
IMEI1 : **************760
IMEI2 : FFFFFFFFFFFFFFF
Repairing HUWEI IMEI....

OLD IMEI..
IMEI1 : **************760
IMEI2 : FFFFFFFFFFFFFFF

NEW IMEI..
IMEI1 : ************8*4
IMEI2 : ************8*4
Done!!!!

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:11
BR
Dipendra Pathak



All times are GMT +1. The time now is 11:20.


vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2024 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2023 -

Page generated in 0.37946 seconds with 6 queries

SEO by vBSEO