GSM Shop GSM Shop
GSM-Forum  

Welcome to the GSM-Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features.
Only registered members may post questions, contact other members or search our database of over 8 million posts.

Registration is fast, simple and absolutely free so please - Click to REGISTER!

If you have any problems with the registration process or your account login, please contact contact us .

Go Back   GSM-Forum > Product Support Sections > Special Solutions / Services / WebShop > GSMFABRICA Products > HYDRA TOOL

Reply
 
LinkBack Thread Tools Display Modes
Old 10-12-2021, 16:43   #2611 (permalink)
No Life Poster
 
gunit1's Avatar
 
Join Date: Oct 2013
Location: Cote Ivoire ABJ,tvlle, LBJ.23
Age: 39
Posts: 1,647
Member: 2041210
Status: Offline
Thanks Meter: 541
Donate money to this user

Samsung A02S (SM-A025F) Remove FRP

Code:
SM-A025F 


Hydra Qualcomm  Tool  Ver 1.0.3 Build 1
Windows 10 (Version 10.0, Build 21996, 64-bit Edition)
Intel(R) Core(TM) i3 CPU       M 350  @ 2.27GHz
Intel(R) HD Graphics
Ram Installed : 8 GB
Windows Access Right : Admin
Software Run As Admnistrator

******* Dongle Info *******
Version    : Hydra Tool v 1.2
Serial     : 210300012902
Initialize : OKAY
Status     : Activated
Life       : 0 [0-0-0-0-0]

PreOperation Configuration 
 Brand : AUTO Model : AUTO Storage : Auto
 Loader: Auto
 Port  : Auto

 Searching for Qualcomm 9008 Device...Found
 FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM53)
 SymbolicName :\??\USB#VID_05C6&PID_9008#6&61bf49f&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :08/02/2017,2.1.2.7

Getting device info......
Serial No.: 0xD34D8CFB
HW_ID     : 0009A0E100200000
MSM ID    : 0x0009A0E1, SDM450-Qualcomm Snapdragon 450
MODEL_ID  : 0x0000
OEM_ID    : 0x0020 - SAMSUNG
PBL Ver   : 00000001
PK HASH   : c8c8dd565bf1d8407777a58f8a8e580e00207116e0222c9ab19f3e1f88599034
 
Firehose Loader[A02S_prog_emmc_firehose_8953_ddr.mbn]
--------------------------------------------------
  Header Type    : OLD
  TargetMSM      : 8953
  Tag            : 
  Version        : 3
  Code_size      : 320
  Signature_size : 256
  fhVendor       : SAMSUNG CORPORATION
  HW_ID          : 0009A0E100200000
  Vendor         : SAMSUNG
  OEM_ID         : 0020
  MODEL_ID       : 0000
  SW_ID          : 0000000100000003
  APP_ID         : 
  pk_hash        : c8c8dd565bf1d8407777a58f8a8e580e00207116e0222c9ab19f3e1f88599034
  OEM_VERSION    : SWHE0316
  IMAGE_VARIANT  : JAADANAZA
  QC_VERSION     : BOOT.BF.3.3.2-00077
--------------------------------------------------

SaharaBoot... Ok
Sending ......................Ok
Connecting to Firehose...
Ping... Ok 
Configuration......
Identifying Chip....
Ok
Chip Configuration :
 MemoryName : eMMC
 MaxPayloadSizeToTargetInBytes : 1048576
 MaxPayloadSizeToTargetInBytesSupported : 1048576
 MaxPayloadSizeFromTargetInBytes : 4096
 MaxXMLSizeInBytes : 4096
 TargetName : 8953
 Version : 1

*** STORAGE DEVICE INFO ***
Memory Type         : eMMC
Block Size in Bytes : 512
Page Size           : 512
Manufacturer ID     : 21
Serial Number       : 2385078298
Firmware Version    : 3
Product Name        : GX6BAB
Physical Partitions : 3
Total Logical Blocks:
          Drive [0]  61071360[29,121 GB]
          Drive [1]  8192[4 MB]
          Drive [2]  8192[4 MB]

Protocol : Universal
Running : Ok
 
Failed to read information from phone.

Reading GPT[3]
          Drive [0] 128 Items
          Drive [1] 0 Items
          Drive [2] 0 Items

Service_SamOptFRPAcount_FM
FRP Remove
 - Removing FRP [Zero Wipe] Ok
 - Removing FRP [Zero Wipe] OkOk

Elapsed Time : 00:00:08
  Reply With Quote
Old 10-12-2021, 16:43   #2612 (permalink)
No Life Poster
 
gunit1's Avatar
 
Join Date: Oct 2013
Location: Cote Ivoire ABJ,tvlle, LBJ.23
Age: 39
Posts: 1,647
Member: 2041210
Status: Offline
Thanks Meter: 541
Donate money to this user
Samsung A02S (SM-A025F) Remove FRP

Code:
SM-A025F 


Hydra Qualcomm  Tool  Ver 1.0.3 Build 1
Windows 10 (Version 10.0, Build 21996, 64-bit Edition)
Intel(R) Core(TM) i3 CPU       M 350  @ 2.27GHz
Intel(R) HD Graphics
Ram Installed : 8 GB
Windows Access Right : Admin
Software Run As Admnistrator

******* Dongle Info *******
Version    : Hydra Tool v 1.2
Serial     : 210300012902
Initialize : OKAY
Status     : Activated
Life       : 0 [0-0-0-0-0]

PreOperation Configuration 
 Brand : AUTO Model : AUTO Storage : Auto
 Loader: Auto
 Port  : Auto

 Searching for Qualcomm 9008 Device...Found
 FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM53)
 SymbolicName :\??\USB#VID_05C6&PID_9008#6&61bf49f&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :08/02/2017,2.1.2.7

Getting device info......
Serial No.: 0xD34D8CFB
HW_ID     : 0009A0E100200000
MSM ID    : 0x0009A0E1, SDM450-Qualcomm Snapdragon 450
MODEL_ID  : 0x0000
OEM_ID    : 0x0020 - SAMSUNG
PBL Ver   : 00000001
PK HASH   : c8c8dd565bf1d8407777a58f8a8e580e00207116e0222c9ab19f3e1f88599034
 
Firehose Loader[A02S_prog_emmc_firehose_8953_ddr.mbn]
--------------------------------------------------
  Header Type    : OLD
  TargetMSM      : 8953
  Tag            : 
  Version        : 3
  Code_size      : 320
  Signature_size : 256
  fhVendor       : SAMSUNG CORPORATION
  HW_ID          : 0009A0E100200000
  Vendor         : SAMSUNG
  OEM_ID         : 0020
  MODEL_ID       : 0000
  SW_ID          : 0000000100000003
  APP_ID         : 
  pk_hash        : c8c8dd565bf1d8407777a58f8a8e580e00207116e0222c9ab19f3e1f88599034
  OEM_VERSION    : SWHE0316
  IMAGE_VARIANT  : JAADANAZA
  QC_VERSION     : BOOT.BF.3.3.2-00077
--------------------------------------------------

SaharaBoot... Ok
Sending ......................Ok
Connecting to Firehose...
Ping... Ok 
Configuration......
Identifying Chip....
Ok
Chip Configuration :
 MemoryName : eMMC
 MaxPayloadSizeToTargetInBytes : 1048576
 MaxPayloadSizeToTargetInBytesSupported : 1048576
 MaxPayloadSizeFromTargetInBytes : 4096
 MaxXMLSizeInBytes : 4096
 TargetName : 8953
 Version : 1

*** STORAGE DEVICE INFO ***
Memory Type         : eMMC
Block Size in Bytes : 512
Page Size           : 512
Manufacturer ID     : 21
Serial Number       : 2385078298
Firmware Version    : 3
Product Name        : GX6BAB
Physical Partitions : 3
Total Logical Blocks:
          Drive [0]  61071360[29,121 GB]
          Drive [1]  8192[4 MB]
          Drive [2]  8192[4 MB]

Protocol : Universal
Running : Ok
 
Failed to read information from phone.

Reading GPT[3]
          Drive [0] 128 Items
          Drive [1] 0 Items
          Drive [2] 0 Items

Service_SamOptFRPAcount_FM
FRP Remove
 - Removing FRP [Zero Wipe] Ok
 - Removing FRP [Zero Wipe] OkOk

Elapsed Time : 00:00:08
  Reply With Quote
Old 10-13-2021, 09:55   #2613 (permalink)
No Life Poster
 
Join Date: May 2011
Posts: 1,322
Member: 1576733
Status: Offline
Thanks Meter: 622
Redmi Note 8 Pro (begonia) Unlock Bootloader With by Hydra

Redmi Note 8 Pro (begonia) Unlock Bootloader With by Hydra



Quote:
=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port (COM5)
Device : 6&df2ee03&0&1
SymbolicName :??USB#VID_0E8D&PID_0003#6&df2ee03&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0

Opened handle..

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 5EA52B5961222AA87022098F231B6E3E
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x0000000180000000 -6 GB
UFS LU0 Size: 0x0000000000400000 -4 MB
UFS LU1 Size: 0x0000000000400000 -4 MB
UFS LU2 Size: 0x0000000EE5800000 -59.586 GB
UFS CID : -'01H9HQ53AECMMDAR
UFS UNIQID : 0d7801ccea63000000000000

Reading GPT0 -UFS [0x00008000] 0 130 Items

Reading System Info
Vendor : Xiaomi
ID : RP1A.200720.011
SDK : 30
Release : 11
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : zh-CN
Description : begonia-user 11 RP1A.200720.011 V12.5.2.0.RGGCNXM release-keys
Miui Ver : V125
Display ID : RP1A.200720.011
Security Patch : 2021-08-01
StorageType : mtp
Userdata State : Not Encrypted

-------------------------------------
Operation : Unlock Bootloader
Processing...
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------

Verifying status after operation...
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------
Action Result : Ok

Elapsed Time : 00:00:03
  Reply With Quote
Old 10-13-2021, 10:07   #2614 (permalink)
No Life Poster
 
Join Date: May 2011
Posts: 1,322
Member: 1576733
Status: Offline
Thanks Meter: 622
Poco M3 Brick Solution -Edl Flashıng By hydra

Poco M3 Brick Solution -Edl Flashıng by Hydra









Quote:
Searching for Qualcomm 9008 Device... Found
FriendlyName : Android HS-USB QDLoader 9008 (COM36)
SymbolicName :??USB#VID_05C6&PID_9008#5&3653f569&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 10/08/2015,2.1.2.1

Getting device info .. . ...
Serial No.: 0xE08BFE08
HW_ID : 0014D0E100720000
MSM ID : 0x0014D0E1, SM_KAMORTA_H-
MODEL_ID : 0x0000
OEM_ID : 0x0072 - XIAOMI
PBL Ver : 00000001
PK HASH : 1bebe3863a6781db4b01086063007334de9e5ca14971c7c4f4 358ec9d79cda46

Firehose Loader [0000000000720000_1bebe3863a6781db_159eb52f_XIAOMI. fhprg]
--------------------------------------------------
Header Type : New
TargetMSM :
Tag :
Version : 6
Code_size : 816
Signature_size : 256
fhVendor : XIAOMI
HW_ID : 0000000000720000
Vendor : XIAOMI
OEM_ID : 0072
MODEL_ID : 0000
SW_ID : 00000003
APP_ID : 00000000
pk_hash : 1bebe3863a6781db4b01086063007334de9e5ca14971c7c4f4 358ec9d79cda4692ce5e948c6fd409408f4c919fcadfe3
OEM_VERSION : f2f760038334
IMAGE_VARIANT : KamortaPkgLAA
QC_VERSION : BOOT.XF.4.1-00187-KAMORTALAZ-2
--------------------------------------------------

SaharaBoot... Ok
Sending .................................b Okb0
Connecting to Firehose...
Ping ...................... Ok
Configuration........
Identifying Chip.... ....UFS
Ok
Chip Configuration :
MemoryName : UFS
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Nov 16 2020 - 01:25:39

*** STORAGE DEVICE INFO ***
Memory Type : UFS
Block Size in Bytes : 4096
Page Size : 4096
Manufacturer ID : 462
Serial Number : 1297306958
Firmware Version : 800
Product Name : KM5C7001DM-B622
Physical titions : 6
Total Logical Blocks:
Drive [0] 14501888 [55.32 GB]
Drive [1] 2048 [8 MB]
Drive [2] 2048 [8 MB]
Drive [3] 32768 [128 MB]
Drive [4] 1048576 [4 GB]
Drive [5] 32768 [128 MB]

Protocol : Universal
Running : Ok

Failed to read information from phone.


----------------------------
Flashing Selected titions....0
- vbmeta_system (0)b [vbmeta_system.img] b0 Ok0
- metadata (0)b [metadata.img] b0 Ok0
- persist (0)b [persist.img] b0 Ok0
- recovery (0)b [recovery.img] b0 Ok0
- super (0)b [super.img] b0 Ok0
- userdata (0)b [userdata.img] b0 Ok0
- PrimaryGPT (0)b [gpt_main0.bin] b0 Ok0
- xbl_config (1)b [xbl_config.elf] b0 Ok0
- xbl (1)b [xbl.elf] b0 Ok0
- PrimaryGPT (1)b [gpt_main1.bin] b0 Ok0
- xbl_configbak (2)b [xbl_config.elf] b0 Ok0
- xblbak (2)b [xbl.elf] b0 Ok0
- PrimaryGPT (2)b [gpt_main2.bin] b0 Ok0
- PrimaryGPT (3)b [gpt_main3.bin] b0 Ok0
- multiimgoem (4)b [multi_image.mbn] b0 Ok0
- vbmeta (4)b [vbmeta.img] b0 Ok0
- qupfw (4)b [qupv3fw.elf] b0 Ok0
- devcfg (4)b [devcfg.mbn] b0 Ok0
- storsec (4)b [storsec.mbn] b0 Ok0
- hyp (4)b [hyp.mbn] b0 Ok0
- hypbak (4)b [hyp.mbn] b0 Ok0
- cmnlib (4)b [cmnlib.mbn] b0 Ok0
- cmnlibbak (4)b [cmnlib.mbn] b0 Ok0
- cmnlib64 (4)b [cmnlib64.mbn] b0 Ok0
- cmnlib64bak (4)b [cmnlib64.mbn] b0 Ok0
- keymaster (4)b [km4.mbn] b0 Ok0
- keymasterbak (4)b [km4.mbn] b0 Ok0
- bluetooth (4)b [BTFM.bin] b0 Ok0
- abl (4)b [abl.elf] b0 Ok0
- ablbak (4)b [abl.elf] b0 Ok0
- imagefv (4)b [imagefv.elf] b0 Ok0
- imagefvbak (4)b [imagefv.elf] b0 Ok0
- uefisecapp (4)b [uefi_sec.mbn] b0 Ok0
- uefisecappbak (4)b [uefi_sec.mbn] b0 Ok0
- featenabler (4)b [featenabler.mbn] b0 Ok0
- featenablerbak (4)b [featenabler.mbn] b0 Ok0
- misc (4)b [misc.img] b0 Ok0
- rpm (4)b [rpm.mbn] b0 Ok0
- rpmbak (4)b [rpm.mbn] b0 Ok0
- tz (4)b [tz.mbn] b0 Ok0
- tzbak (4)b [tz.mbn] b0 Ok0
- logfs (4)b [logfs_ufs_8mb.bin] b0 Ok0
- dtbo (4)b [dtbo.img] b0 Ok0
- dsp (4)b [dspso.bin] b0 Ok0
- boot (4)b [boot.img] b0 Ok0
- modem (4)b [NON-HLOS.bin] b0 Ok0
- cache (4)b [cache.img] b0 Ok0
- cust (4)b [cust.img] b0 Ok0
- PrimaryGPT (4)b [gpt_main4.bin] b0 Ok0
- PrimaryGPT (5)b [gpt_main5.bin] b0 Ok

Done
Operation : Setbootablestoragedrive: Drive 1
Set bootable storage drive 1 Ok

Rebooting Phone.... Ok

Elapsed Time : 00:05:15
  Reply With Quote
Old 10-13-2021, 10:22   #2615 (permalink)
No Life Poster
 
Join Date: May 2011
Posts: 1,322
Member: 1576733
Status: Offline
Thanks Meter: 622
Redmi S2 (ysl) Edl Frp Remove With by Hydra

Redmi S2 (ysl) Edl Frp Remove With by Hydra




Quote:
Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM7)
SymbolicName :??USB#VID_05C6&PID_9008#5&30124de0&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :

Getting device info .. . ...
Serial No.: 0xCBAE4096
HW_ID : 000460E100000000
MSM ID : 0x000460E1, MSM8953-Qualcomm Snapdragon 625
MODEL_ID : 0x0000
OEM_ID : 0x0000 - QUALCOMM
PBL Ver : 00000001
PK HASH : 57158eaf1814d78fd2b3105ece4db18a817a08ac664a5782a9 25f3ff8403d39a

Firehose Loader [Xiaomi_S2y2_noauth_8953_ddr.mbn]
--------------------------------------------------
Header Type : OLD
TargetMSM : 8953
Tag : _peek
Version : 3
Code_size : 288
Signature_size : 256
fhVendor : XIAOMI
HW_ID : 000460E100000000
Vendor : QUALCOMM
OEM_ID : 0000
MODEL_ID : 0000
SW_ID : 0000000100000003
APP_ID :
pk_hash : 57158eaf1814d78fd2b3105ece4db18a817a08ac664a5782a9 25f3ff8403d39a
OEM_VERSION : c3-bsp-builder-job004.bj
IMAGE_VARIANT : JAADANAZA
QC_VERSION : BOOT.BF.3.3-00228
--------------------------------------------------

SaharaBoot... Ok
Sending ...................b Okb0
Connecting to Firehose...
Ping ... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8953
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 19
Serial Number : 34134705
Firmware Version : 4
Product Name : S0J9B7
Physical titions : 3
Total Logical Blocks:
Drive [0] 61071360 [29,121 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]

Protocol : Universal
Running : Ok

Phone Information .....
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi S2
ID : PKQ1.181203.001
SDK : 28
Release : 9
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-GB
Description : ysl-user 9 PKQ1.181203.001 V12.0.2.0.PEFMIXM release-keys
Miui Ver : V12
Device : ysl
Mod_device : ysl_global
Display ID : PKQ1.181203.001
Security Patch : 2020-09-01
Emmc_size : 16GB
Fingerprint : xiaomi/ysl/ysl:9/PKQ1.181203.001/V12.0.2.0.PEFMIXM:user/release-keys

Reading GPT[3]
Drive [0] 60 Items
Drive [1] 0 Items
Drive [2] 0 Items

Removing FRPta...
Method : 0
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOk Ok

Elapsed Time : 00:00:05
  Reply With Quote
Old 10-14-2021, 07:41   #2616 (permalink)
No Life Poster
 
Join Date: May 2011
Posts: 1,322
Member: 1576733
Status: Offline
Thanks Meter: 622
Redmi 7A (Pine) Edl Flash With by Hydra

Redmi 7A (Pine) Edl Flash With by Hydra



Quote:
Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM31)
SymbolicName :??USB#VID_05C6&PID_9008#5&31c2c6e&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 07/05/2018,2.1.3.2

Getting device info .. . ...
Serial No.: 0x4A90547D
HW_ID : 000BF0E100720000
MSM ID : 0x000BF0E1, SDM439-Qualcomm Snapdragon 439
MODEL_ID : 0x0000
OEM_ID : 0x0072 - XIAOMI
PBL Ver : 00000001
PK HASH : 57158eaf1814d78fd2b3105ece4db18a817a08ac664a5782a9 25f3ff8403d39a

Firehose Loader [Xiaomi_Redmi_8_Olive.mbn]
--------------------------------------------------
Header Type : OLD
TargetMSM : 8937
Tag : _auth_peek
Version : 3
Code_size : 320
Signature_size : 256
fhVendor : XIAOMI
HW_ID : 000BF0E100720000
Vendor : XIAOMI
OEM_ID : 0072
MODEL_ID : 0000
SW_ID : 0000000100000003
APP_ID :
pk_hash : 57158eaf1814d78fd2b3105ece4db18a817a08ac664a5782a9 25f3ff8403d39a
OEM_VERSION : c4-miui-ota-bd104.bj
IMAGE_VARIANT : FAADANAZA
QC_VERSION : BOOT.BF.3.3.2-00073
--------------------------------------------------

SaharaBoot... Ok
Sending .......................b Okb0
Connecting to Firehose...
Ping ... Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[ANvdA8vgR8OVEperxghHU3mne4g]
Signature @256bytes Authentication.... Accepted ......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 19
Serial Number : 224052638
Firmware Version : 7
Product Name : S0J9B7
Physical titions : 3
Total Logical Blocks:
Drive [0] 61071360 [29.121 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]

Protocol : Universal
Running : Ok

Phone Information ......
Vendor : Xiaomi
ID : QKQ1.191014.001
SDK : 29
Release : 10
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-GB
Miui Ver : V12
Mod_device : pine_global
Security Patch : 2021-05-01
Emmc_size : 16GB

Reading GPT[3]
Drive [0] 60 Items
Drive [1] 0 Items
Drive [2] 0 Items


Backup Security titions...
Reading Security Items....
> modemst1
> modemst2
> fsg
> fsc
D:Hydra ToolBackupSecurity_Backup__10_Security_10142107551 9.sec
Backup Security Success....

----------------------------
Flashing Selected titions....
- sec (0)b [sec.dat] b0 Skipped
- config (0)b [config.bin] b0 Ok
- vbmeta (0)b [vbmeta.img] b0 Ok
- vbmetabak (0)b [vbmeta.img] b0 Ok
- devcfg (0)b [devcfg.mbn] b0 Ok
- devcfgbak (0)b [devcfg.mbn] b0 Ok
- apdp (0)b [dummy.img] b0 Ok
- msadp (0)b [dummy.img] b0 Ok
- sbl1 (0)b [sbl1.mbn] b0 Ok
- sbl1bak (0)b [sbl1.mbn] b0 Ok
- rpm (0)b [rpm.mbn] b0 Ok
- rpmbak (0)b [rpm.mbn] b0 Ok
- cmnlib (0)b [cmnlib_30.mbn] b0 Ok
- cmnlibbak (0)b [cmnlib_30.mbn] b0 Ok
- cmnlib64 (0)b [cmnlib64_30.mbn] b0 Ok
- cmnlib64bak (0)b [cmnlib64_30.mbn] b0 Ok
- keymaster (0)b [km4.mbn] b0 Ok
- keymasterbak (0)b [km4.mbn] b0 Ok
- misc (0)b [misc.img] b0 Ok
- aboot (0)b [emmc_appsboot.mbn] b0 Ok
- abootbak (0)b [emmc_appsboot.mbn] b0 Ok
- tz (0)b [tz.mbn] b0 Ok
- tzbak (0)b [tz.mbn] b0 Ok
- dtbo (0)b [dtbo.img] b0 Ok
- dtbobak (0)b [dtbo.img] b0 Ok
- splash (0)b [splash.img] b0 Ok
- dsp (0)b [adspso.bin] b0 Ok
- dspbak (0)b [adspso.bin] b0 Ok
- persist (0)b [persist.img] b0 Ok
- mdtp (0)b [mdtp.img] b0 Ok
- mdtpbak (0)b [mdtp.img] b0 Ok
- boot (0)b [boot.img] b0 Ok
- recovery (0)b [recovery.img] b0 Ok
- cache (0)b [cache.img] b0 Ok
- modem (0)b [NON-HLOS.bin] b0 Ok
- system (0)b [system.img] b0 Ok
- vendor (0)b [vendor.img] b0 Ok
- cust (0)b [cust.img] b0 Ok
- userdata (0)b [userdata.img] b0 Ok
- PrimaryGPT (0)b [gpt_main0.bin] b0 Ok

Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-33.] OK
0 [CRC32(2,7680)] OK
0 [CRC32(NUM_DISK_SECTORS-33.,7680)] OK
0 [0] OK
0 [CRC32(1,92)] OK
0 [0] OK
0 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 0
Set bootable storage drive 0 Ok

Rebooting Phone.... Ok

Elapsed Time : 00:09:00
  Reply With Quote
Old 10-14-2021, 07:52   #2617 (permalink)
No Life Poster
 
Join Date: May 2011
Posts: 1,322
Member: 1576733
Status: Offline
Thanks Meter: 622
Huawei Y7 2019 (DUB-LX1) Edl Flash With by Hydra

Huawei Y7 2019 (DUB-LX1) Edl Flash With by Hydra



Quote:
Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM22)
SymbolicName :??USB#VID_05C6&PID_9008#6&3662e80&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 08/02/2017,2.1.2.7

Getting device info .. . ...
Serial No.: 0xEDE8F155
HW_ID : 0009A0E100150065
MSM ID : 0x0009A0E1, SDM450-Qualcomm Snapdragon 450
MODEL_ID : 0x0065
OEM_ID : 0x0015 - HUAWEI
PBL Ver : 00000000
PK HASH : 6bc369511da9cadb3a7af61574f89db385003d6241bdd1ff57 3dba61bf6ae119

Firehose Loader [prog_emmc_firehose_11.mbn]
--------------------------------------------------
Header Type : OLD
TargetMSM : 8953
Tag : _peek
Version : 3
Code_size : 288
Signature_size : 256
fhVendor : QUALCOMM
HW_ID : 0009A0E100150065
Vendor : HUAWEI
OEM_ID : 0015
MODEL_ID : 0065
SW_ID : 0000000000000003
APP_ID :
pk_hash : 6bc369511da9cadb3a7af61574f89db385003d6241bdd1ff57 3dba61bf6ae119
OEM_VERSION : SIA1000073848
IMAGE_VARIANT : JAADANAZA
QC_VERSION : BOOT.BF.3.3.2-00019
--------------------------------------------------

SaharaBoot... Ok
Sending .............b Okb0
Connecting to Firehose...
Ping ... Ok
Configuration.......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8953
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 1259872288
Firmware Version : 0
Product Name : hB8aP>
Physical titions : 3
Total Logical Blocks:
Drive [0] 61071360 [29.121 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]

Protocol : Universal
Running : Ok

Phone Information .....
Vendor : unknown
ID : OPM1.171019.011
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : generic_a53-user 8.1.0 OPM1.171019.011 eng.root.20200109.172356 test-keys
Display ID : System 8.2.0.036(07AE)
Security Patch : 2019-12-01

Reading GPT[3]
Drive [0] 60 Items
Drive [1] 0 Items
Drive [2] 0 Items


Backup Security titions...
Reading Security Items....
> modemst1
> modemst2
> fsg
> fsc
C:Hydra ToolBackupSecurity_Backup__8.1.0_Security_10142108 4814.sec
Backup Security Success....

----------------------------
Flashing Selected titions....
- RPM (0)b [RPM.img] b0 Ok
- TZ (0)b [TZ.img] b0 Ok
- SBL1 (0)b [SBL1.img] b0 Ok
- APDP (0)b [APDP.img] b0 Ok
- MSADP (0)b [MSADP.img] b0 Ok
- KEYMASTER (0)b [KEYMASTER.img] b0 Ok
- DEVCFG (0)b [DEVCFG.img] b0 Ok
- ABOOT (0)b [ABOOT.img] b0 Ok
- MODEM (0)b [MODEM.img] b0 Ok
- KERNEL (0)b [KERNEL.img] b0 Ok
- RAMDISK (0)b [RAMDISK.img] b0 Ok
- RECOVERY_RAMDISK (0)b [RECOVERY_RAMDISK.img] b0 Ok
- RECOVERY_VENDOR (0)b [RECOVERY_VENDOR.img] b0 Ok
- ERECOVERY_KERNEL (0)b [ERECOVERY_KERNEL.img] b0 Ok
- ERECOVERY_RAMDISK (0)b [ERECOVERY_RAMDISK.img] b0 Ok
- ERECOVERY_VENDOR (0)b [ERECOVERY_VENDOR.img] b0 Ok
- SYSTEM (0)b [SYSTEM.img] b0 Ok
- CACHE (0)b [CACHE.img] b0 Ok
- ODM (0)b [ODM.img] b0 Ok
- VENDOR (0)b [VENDOR.img] b0 Ok
- PRODUCT (0)b [PRODUCT.img] b0 Ok
- USERDATA (0)b [USERDATA.img] b0 Ok
- PrimaryGPT (0)b [gpt_main0.bin] b0 Ok

Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-33.] OK
0 [CRC32(2,7168)] OK
0 [CRC32(NUM_DISK_SECTORS-33.,7168)] OK
0 [0] OK
0 [CRC32(1,92)] OK
0 [0] OK
0 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 0
Set bootable storage drive 0 Ok

Rebooting Phone.... Ok

Elapsed Time : 00:36:48
  Reply With Quote
Old 10-14-2021, 08:04   #2618 (permalink)
No Life Poster
 
Join Date: May 2011
Posts: 1,322
Member: 1576733
Status: Offline
Thanks Meter: 622
Redmi 9C NFC (angelican) Unlock Bootloader With by Hydra

Redmi 9C NFC (angelican) Unlock Bootloader With by Hydra



Quote:
=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port (COM15)
Device : 5&23b8d6f1&0&4
SymbolicName :??USB#VID_0E8D&PID_0003#5&23b8d6f1&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2016,3.2

Opened handle..
Handshaking... Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0766 MT6765 [6765]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : E7
SBC : 01 (True)
SLA : 02 (True)
DAA : 04 (True)
SWJTAG : 06 (True)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 20 (True)
MEMWRITE : 40 (True)
CMD_C8 : 80 (True)

Exploiting Device...
Exploit Sent..
Successfully Exploited...
Handshaking... Ok

C:Hydra ToolBackupPreloader_dumpprel.tmp
Handshaking...

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0766 MT6765 [6765]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)

MEID : 0560C0ED0AFECC2E48AD1BEC692D24BD
Stage 1.. [Size:216440]
Sending : Please wait.. Accepted

Identifying Protocol...
Protocol : New
Synchronization... SYNC
Preloader Initialization...
sing prel.tmp
Init : Accepted
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : F495478DEAE1748D0C3CA3919A6763D3
ERAM Size : 0x0000000000038000 -224 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 45010044413430333201A35FA342A777 - DA4032
Executing : ACCEPTED...

Reading GPT -EMMC [0x00008000] 130 Items

Autobackup titions
-preloader [0x00000000] 512 KB -> preloader.bin...0 Ok
-> Renaming Preloader.... preloader_k65v1_64_bsp.bin
Creating Scatter file... C:Hydra ToolBackupAuto0766__101321194349MT6765_Android_sca tter.txt
-pgpt [0x00000000] 32 KB -> pgpt.bin...0 Ok
-frp [0x3BD88000] 1024 KB -> frp.bin...0 Ok
-nvdata [0x3DE88000] 64 MB -> nvdata.bin...0 Ok
-protect1 [0x45522000] 8 MB -> protect1.bin...0 Ok
-protect2 [0x45D22000] 10.867 MB -> protect2.bin...0 Ok
-persist [0x47000000] 48 MB -> persist.bin...0 Ok
-nvram [0x52E80000] 64 MB -> nvram.bin...0 Ok
Done!!!
C:Hydra ToolBackupAuto0766__101321194349
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 1 F495478DEAE1748D0C3CA3919A6763D3
ERAM Size : 1 0x0000000000038000 -224 KB
IRAM Size : 1 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 45010044413430333201A35FA342A777 - DA4032

Reading GPT -EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Unlock Bootloader
Processing...
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------

Verifying status after operation...
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------
Action Result : Ok

Elapsed Time : 00:01:05

}
  Reply With Quote
Old 10-14-2021, 13:16   #2619 (permalink)
No Life Poster
 
Gsm-Ahmed's Avatar
 
Join Date: Jan 2020
Location: Algeria
Posts: 825
Member: 2944109
Status: Offline
Thanks Meter: 666
Xiaomi Redmi Note 5 (Whyred) Ultra Power Done By HYDRA

Xiaomi Redmi Note 5 (Whyred) Ultra Power Done By HYDRA TOOL

Removing FRP [Zero Wipe] + Formatting Userdata [Safe Format - eMMc]





Code:
PreOperation Configuration 
 Brand : XIAOMI Model : Redmi Note 5 Pro (Whyred) Storage : Auto
 Loader: mi_2_9.elf
 Port  : Auto

 Searching for Qualcomm 9008 Device...Found
 FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM5)
 SymbolicName :\??\USB#VID_05C6&PID_9008#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :08/31/2015,2.1.2.0

Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping...... Ok 
Configuration......
Identifying Chip....
Ok
Chip Configuration :
 MemoryName : eMMC
 MaxPayloadSizeToTargetInBytes : 1048576
 MaxPayloadSizeToTargetInBytesSupported : 1048576
 MaxPayloadSizeFromTargetInBytes : 4096
 MaxXMLSizeInBytes : 4096
 TargetName : MSM8996
 Version : 1
 DateTime : Aug  2 2018 - 22:27:53

*** STORAGE DEVICE INFO ***
Memory Type         : eMMC
Block Size in Bytes : 512
Page Size           : 512
Manufacturer ID     : 21
Serial Number       : 2676665404
Firmware Version    : 2
Product Name        : DD68MB
Physical Partitions : 4
Total Logical Blocks:
          Drive [0]  61071360[29.121 GB]
          Drive [1]  8192[4 MB]
          Drive [2]  8192[4 MB]
          Drive [3]  8192[4 MB]

Protocol : Universal
Running : Ok
Reading GPT[4]
          Drive [0] 64 Items
          Drive [1] 0 Items
          Drive [2] 0 Items
          Drive [3] 

 
Phone Information.....
  Brand          : xiaomi
  Vendor         : Xiaomi
  Model          : Redmi Note 5
  ID             : PKQ1.180904.001
  SDK            : 28
  Release        : 9
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-GB
  Description    : whyred-user 9 PKQ1.180904.001 V12.0.2.0.PEIMIXM release-keys
  Miui Ver       : V12
  Device         : whyred
  Mod_device     : whyred_global
  Display ID     : PKQ1.180904.001
  Security Patch : 2020-11-05
  Fingerprint    : xiaomi/whyred/whyred:9/PKQ1.180904.001/V12.0.2.0.PEIMIXM:user/release-keys

Processing Safe Format....
 - Removing FRP [Zero Wipe] Ok
 - Formatting Userdata  [Safe Format - eMMc] Ok
Action Result : Ok

Rebooting Phone.... Ok

Elapsed Time : 00:00:04
  Reply With Quote
Old 10-14-2021, 13:18   #2620 (permalink)
No Life Poster
 
Gsm-Ahmed's Avatar
 
Join Date: Jan 2020
Location: Algeria
Posts: 825
Member: 2944109
Status: Offline
Thanks Meter: 666
Stream B1S Safe Format Done

Stream B1S Safe Format Done





Code:
Searching for MTK Device...Found
 Port Identification :Flashmode Preloader
 FriendlyName :MediaTek PreLoader USB VCOM_V1633 (Android) (COM3)
 Device       :6&12e3c9ed&0&1
 SymbolicName :\??\USB#VID_0E8D&PID_2000#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
Reading Device hardware info..
 hw code       : 6580MT6580 [6580]
 hw subcode    : 8A00
 hw version    : CA00
 sw version    : 0000
 Target config : 00
 SBC           : 00 (False)
 SLA           : 00 (False)
 DAA           : 00 (False)
 SWJTAG        : 00 (False)
 EPP           : 00 (False)
 CERT          : 00 (False)
 MEMREAD       : 00 (False)
 MEMWRITE      : 00 (False)
 CMD_C8        : 00 (False)
 FUSEID         : 02100040
 FUSEID         : 02100040
 SECURE VERSION : 00 
 BL VERSION     : 01 

Preparing Download Agent..
 DA   : 6580.bin
 Agent: MTK_DOWNLOAD_AGENT -HYDRA
 Ver  : MTK_AllInOne_DA_v3.3001.2020-11-03.22:07_536568
 Init : Loader [1]
 Sending : Accepted

Identifying Protocol...
 Protocol : Old
C4 - eMMC
0007
0000000000000000000000000000
PRMMCCID   : 700100543232373038010F1209FF9537
Init Configuration
Running DA 4.2 on BBID : 0x00 Ok

Initializing Loader [2]
Sending Loader [2] Accepted
Reading Flashchip data....
eMMC BOOT1 : 0x0000000000000000 -0 Bytes
eMMC BOOT2 : 0x0000000000000000 -0 Bytes
eMMC RPMB  : 0x0000000000000000 -0 Bytes
eMMC USER  : 0x0000000000000000 -0 Bytes
ERAM Size  : 0x0000000000000000 -0 Bytes
IRAM Size  : 0x0000000000000000 -0 Bytes
UNICAL RID : 00000000000000000000000000000000
eMMC CID   : 00000000000000000000000000000000

Reading Partition Table
SIZE[0x000008F0] 26 Items > Done
MTK Phone Loader is NOW RUNNING.


-------------------------------------
Operation : Safe Format
Processing...
Safeformat Universal...(tmp.bin)512 Bytes Ok
Action Result :  Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:17
  Reply With Quote
Old 10-14-2021, 13:20   #2621 (permalink)
No Life Poster
 
Gsm-Ahmed's Avatar
 
Join Date: Jan 2020
Location: Algeria
Posts: 825
Member: 2944109
Status: Offline
Thanks Meter: 666
Xiaomi Redmi Note 9 (merlin) Unlock Bootloader Done

Xiaomi Redmi Note 9 (merlin) Unlock Bootloader Done

Hydra Tool - ONE CLICK





B.R
  Reply With Quote
Old 10-15-2021, 08:36   #2622 (permalink)
No Life Poster
 
Join Date: May 2011
Posts: 1,322
Member: 1576733
Status: Offline
Thanks Meter: 622
Redmi 9T Brick Solution-Edl Flash With by Hydra

Redmi 9T Brick Solution-Edl Flash With by Hydra



Quote:

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM16)
SymbolicName :??USB#VID_05C6&PID_9008#5&2b2dc6ef&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 08/31/2015,2.1.2.0

Getting device info .. . ...
Serial No.: 0x9A4294E2
HW_ID : 0014D0E100720000
MSM ID : 0x0014D0E1, SM_KAMORTA_H-
MODEL_ID : 0x0000
OEM_ID : 0x0072 - XIAOMI
PBL Ver : 00000001
PK HASH : 1bebe3863a6781db4b01086063007334de9e5ca14971c7c4f4 358ec9d79cda46

Firehose Loader [0000000000720000_1bebe3863a6781db_159eb52f_XIAOMI. fhprg]
--------------------------------------------------
Header Type : New
TargetMSM :
Tag :
Version : 6
Code_size : 816
Signature_size : 256
fhVendor : XIAOMI
HW_ID : 0000000000720000
Vendor : XIAOMI
OEM_ID : 0072
MODEL_ID : 0000
SW_ID : 00000003
APP_ID : 00000000
pk_hash : 1bebe3863a6781db4b01086063007334de9e5ca14971c7c4f4 358ec9d79cda4692ce5e948c6fd409408f4c919fcadfe3
OEM_VERSION : f2f760038334
IMAGE_VARIANT : KamortaPkgLAA
QC_VERSION : BOOT.XF.4.1-00187-KAMORTALAZ-2
--------------------------------------------------

SaharaBoot... Ok
Sending .................................b Okb0
Connecting to Firehose...
Ping ...................... Ok
Configuration........
Identifying Chip.... ....UFS
Ok
Chip Configuration :
MemoryName : UFS
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Nov 16 2020 - 01:25:39

*** STORAGE DEVICE INFO ***
Memory Type : UFS
Block Size in Bytes : 4096
Page Size : 4096
Manufacturer ID : 462
Serial Number : 1297306958
Firmware Version : 800
Product Name : KM5C7001DM-B622
Physical titions : 6
Total Logical Blocks:
Drive [0] 14501888 [55.32 GB]
Drive [1] 2048 [8 MB]
Drive [2] 2048 [8 MB]
Drive [3] 32768 [128 MB]
Drive [4] 1048576 [4 GB]
Drive [5] 32768 [128 MB]

Protocol : Universal
Running : Ok

Failed to read information from phone.

Reading GPT[6]
Drive [0] 32 Items
Drive [1] 32 Items
Drive [2] 32 Items
Drive [3] 32 Items
Drive [4] 64 Items
Drive [5] 32 Items


Backup Security titions...
Reading Security Items....
> modemst1
> modemst2
> fsg
> fsc
C:Hydra ToolBackupSecurity_Backup___Security_101521131701. sec
Backup Security Success....

----------------------------
Flashing Selected titions....0
- vbmeta_system (0)b [vbmeta_system.img] b0 Ok0
- metadata (0)b [metadata.img] b0 Ok0
- persist (0)b [persist.img] b0 Ok0
- recovery (0)b [recovery.img] b0 Ok0
- super (0)b [super.img] b0 Ok0
- userdata (0)b [userdata.img] b0 Ok0
- PrimaryGPT (0)b [gpt_main0.bin] b0 Ok0
- xbl_config (1)b [xbl_config.elf] b0 Ok0
- xbl (1)b [xbl.elf] b0 Ok0
- PrimaryGPT (1)b [gpt_main1.bin] b0 Ok0
- xbl_configbak (2)b [xbl_config.elf] b0 Ok0
- xblbak (2)b [xbl.elf] b0 Ok0
- PrimaryGPT (2)b [gpt_main2.bin] b0 Ok0
- PrimaryGPT (3)b [gpt_main3.bin] b0 Ok0
- multiimgoem (4)b [multi_image.mbn] b0 Ok0
- vbmeta (4)b [vbmeta.img] b0 Ok0
- qupfw (4)b [qupv3fw.elf] b0 Ok0
- devg (4)b [devg.mbn] b0 Ok0
- storsec (4)b [storsec.mbn] b0 Ok0
- hyp (4)b [hyp.mbn] b0 Ok0
- hypbak (4)b [hyp.mbn] b0 Ok0
- cmnlib (4)b [cmnlib.mbn] b0 Ok0
- cmnlibbak (4)b [cmnlib.mbn] b0 Ok0
- cmnlib64 (4)b [cmnlib64.mbn] b0 Ok0
- cmnlib64bak (4)b [cmnlib64.mbn] b0 Ok0
- keymaster (4)b [km4.mbn] b0 Ok0
- keymasterbak (4)b [km4.mbn] b0 Ok0
- bluetooth (4)b [BTFM.bin] b0 Ok0
- abl (4)b [abl.elf] b0 Ok0
- ablbak (4)b [abl.elf] b0 Ok0
- imagefv (4)b [imagefv.elf] b0 Ok0
- imagefvbak (4)b [imagefv.elf] b0 Ok0
- uefisecapp (4)b [uefi_sec.mbn] b0 Ok0
- uefisecappbak (4)b [uefi_sec.mbn] b0 Ok0
- featenabler (4)b [featenabler.mbn] b0 Ok0
- featenablerbak (4)b [featenabler.mbn] b0 Ok0
- misc (4)b [misc.img] b0 Ok0
- rpm (4)b [rpm.mbn] b0 Ok0
- rpmbak (4)b [rpm.mbn] b0 Ok0
- tz (4)b [tz.mbn] b0 Ok0
- tzbak (4)b [tz.mbn] b0 Ok0
- logfs (4)b [logfs_ufs_8mb.bin] b0 Ok0
- dtbo (4)b [dtbo.img] b0 Ok0
- dsp (4)b [dspso.bin] b0 Ok0
- boot (4)b [boot.img] b0 Ok0
- modem (4)b [NON-HLOS.bin] b0 Ok0
- cache (4)b [cache.img] b0 Ok0
- cust (4)b [cust.img] b0 Ok0
- PrimaryGPT (4)b [gpt_main4.bin] b0 Ok0
- PrimaryGPT (5)b [gpt_main5.bin] b0 Ok
0
Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-6.] OK
0 [NUM_DISK_SECTORS-6.] OK
0 [NUM_DISK_SECTORS-6.] OK
0 [NUM_DISK_SECTORS-6.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-5.] OK
0 [CRC32(2,4096)] OK
0 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
0 [0] OK
0 [CRC32(1,92)] OK
0 [0] OK
0 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
1 [NUM_DISK_SECTORS-6.] OK
1 [NUM_DISK_SECTORS-6.] OK
1 [NUM_DISK_SECTORS-6.] OK
1 [NUM_DISK_SECTORS-6.] OK
1 [NUM_DISK_SECTORS-1.] OK
1 [NUM_DISK_SECTORS-1.] OK
1 [NUM_DISK_SECTORS-5.] OK
1 [CRC32(2,4096)] OK
1 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
1 [0] OK
1 [CRC32(1,92)] OK
1 [0] OK
1 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
2 [NUM_DISK_SECTORS-6.] OK
2 [NUM_DISK_SECTORS-6.] OK
2 [NUM_DISK_SECTORS-6.] OK
2 [NUM_DISK_SECTORS-6.] OK
2 [NUM_DISK_SECTORS-1.] OK
2 [NUM_DISK_SECTORS-1.] OK
2 [NUM_DISK_SECTORS-5.] OK
2 [CRC32(2,4096)] OK
2 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
2 [0] OK
2 [CRC32(1,92)] OK
2 [0] OK
2 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
3 [NUM_DISK_SECTORS-6.] OK
3 [NUM_DISK_SECTORS-6.] OK
3 [NUM_DISK_SECTORS-6.] OK
3 [NUM_DISK_SECTORS-6.] OK
3 [NUM_DISK_SECTORS-1.] OK
3 [NUM_DISK_SECTORS-1.] OK
3 [NUM_DISK_SECTORS-5.] OK
3 [CRC32(2,4096)] OK
3 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
3 [0] OK
3 [CRC32(1,92)] OK
3 [0] OK
3 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
4 [NUM_DISK_SECTORS-6.] OK
4 [NUM_DISK_SECTORS-6.] OK
4 [NUM_DISK_SECTORS-6.] OK
4 [NUM_DISK_SECTORS-6.] OK
4 [NUM_DISK_SECTORS-1.] OK
4 [NUM_DISK_SECTORS-1.] OK
4 [NUM_DISK_SECTORS-5.] OK
4 [CRC32(2,8192)] OK
4 [CRC32(NUM_DISK_SECTORS-5.,8192)] OK
4 [0] OK
4 [CRC32(1,92)] OK
4 [0] OK
4 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
5 [NUM_DISK_SECTORS-6.] OK
5 [NUM_DISK_SECTORS-6.] OK
5 [NUM_DISK_SECTORS-6.] OK
5 [NUM_DISK_SECTORS-6.] OK
5 [NUM_DISK_SECTORS-1.] OK
5 [NUM_DISK_SECTORS-1.] OK
5 [NUM_DISK_SECTORS-5.] OK
5 [CRC32(2,4096)] OK
5 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
5 [0] OK
5 [CRC32(1,92)] OK
5 [0] OK
5 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 1
Set bootable storage drive 1 Ok

Rebooting Phone.... Ok

Elapsed Time : 00:07:58

}
  Reply With Quote
Old 10-15-2021, 09:28   #2623 (permalink)
No Life Poster
 
Join Date: May 2011
Posts: 1,322
Member: 1576733
Status: Offline
Thanks Meter: 622
Redmi 9A (dandelion) Bootloader Unlock With by Hydra

Redmi 9A (dandelion) Bootloader Unlock With by Hydra



Quote:
=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port (COM29)
Device : 5&2ad60a6b&0&1
SymbolicName :??USB#VID_0E8D&PID_0003#5&2ad60a6b&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 09/11/2014,3.0.1437.1

Opened handle..
Handshaking... Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0707 MT6768 [6768]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : E7
SBC : 01 (True)
SLA : 02 (True)
DAA : 04 (True)
SWJTAG : 06 (True)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 20 (True)
MEMWRITE : 40 (True)
CMD_C8 : 80 (True)

Exploiting Device...
Exploit Sent..
Successfully Exploited...
Handshaking... Ok

D:HYDRA TOOLHydraTool_Fullpackage_12-01-2020BackupPreloader_dumpprel.tmp
Handshaking...

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0707 MT6768 [6768]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)

MEID : BB915505424FFC5EAAE13547808F75F0
Stage 1.. [Size:256504]
Sending : Please wait.. Accepted

Identifying Protocol...
Protocol : New
Synchronization... SYNC
Preloader Initialization...
sing prel.tmp
Init : Accepted
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 2FBD9181249499348D12BC92BFB36662
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000001D1EC00000 -116.48 GB
eMMC CID : 15010044563644414202AB2DCE644701 - DV6DAB
Executing : ACCEPTED...

Reading GPT -EMMC [0x00008000] 130 Items

Autobackup titions
-preloader [0x00000000] 512 KB -> preloader.bin...0 Ok
-> Renaming Preloader.... preloader_merlin.bin
Creating Scatter file... D:HYDRA TOOLHydraTool_Fullpackage_12-01-2020BackupAuto0707__101521105959MT6768_Android_sca tter.txt
-pgpt [0x00000000] 32 KB -> pgpt.bin...0 Ok
-frp [0x05508000] 1024 KB -> frp.bin...0 Ok
-nvdata [0x0C4A2000] 64 MB -> nvdata.bin...0 Ok
-persist [0x104A2000] 48 MB -> persist.bin...0 Ok
-protect1 [0x164A2000] 8 MB -> protect1.bin...0 Ok
-protect2 [0x16CA2000] 11.367 MB -> protect2.bin...0 Ok
-nvram [0x19F80000] 64 MB -> nvram.bin...0 Ok
Done!!!
D:HYDRA TOOLHydraTool_Fullpackage_12-01-2020BackupAuto0707__101521105959
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 1 2FBD9181249499348D12BC92BFB36662
ERAM Size : 1 0x0000000000070000 -448 KB
IRAM Size : 1 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000001D1EC00000 -116.48 GB
eMMC CID : 15010044563644414202AB2DCE644701 - DV6DAB

Reading GPT -EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Unlock Bootloader
Processing...
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------

Verifying status after operation...
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------
Action Result : Ok

Elapsed Time : 00:00:49
  Reply With Quote
Old 10-15-2021, 09:45   #2624 (permalink)
No Life Poster
 
Join Date: May 2011
Posts: 1,322
Member: 1576733
Status: Offline
Thanks Meter: 622
Huawei Y9A(FRL-L22)Remove Huawei Account With by Hydra

Huawei Y9A(FRL-L22)Remove Huawei Account With by Hydra



Quote:
=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port (COM3)
Device : 5&11a3f1f7&0&1
SymbolicName :??USB#VID_0E8D&PID_0003#5&11a3f1f7&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 11/30/2012,5.30.14.0

Opened handle..
Handshaking... Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0707 MT6768 [6768]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : E5
SBC : 01 (True)
SLA : 00 (False)
DAA : 04 (True)
SWJTAG : 04 (True)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 20 (True)
MEMWRITE : 40 (True)
CMD_C8 : 80 (True)

Exploiting Device...
Exploit Sent..
Successfully Exploited...
Handshaking... Ok

C:Hydra ToolBackupPreloader_dumpprel.tmp
Handshaking...

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0707 MT6768 [6768]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)

MEID : 8AFCF09B58E2F354646079125E4E2793
Stage 1.. [Size:256504]
Sending : Please wait.. Accepted

Identifying Protocol...
Protocol : New
Synchronization... SYNC
Preloader Initialization...
sing prel.tmp
Init : Accepted
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : B4E94207B07C300A0705D6B445BA6144
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000001D1EC00000 -116.48 GB
eMMC CID : 15010044555442343202A81ABE818715 - DUTB42
Executing : ACCEPTED...

Reading GPT -EMMC [0x00008000] 130 Items

Autobackup titions
-preloader [0x00000000] 512 KB -> preloader.bin...0 Ok
-> Renaming Preloader.... preloader_k69v1_64.bin
Creating Scatter file... C:Hydra ToolBackupAuto0707__101421193556MT6768_Android_sca tter.txt
-pgpt [0x00000000] 32 KB -> pgpt.bin...0 Ok
-frp [0x01A08000] 1024 KB -> frp.bin...0 Ok
-nvdata [0x03B08000] 32 MB -> nvdata.bin...0 Ok
-protect1 [0x05B08000] 8 MB -> protect1.bin...0 Ok
-protect2 [0x06308000] 8 MB -> protect2.bin...0 Ok
-persist [0x07800000] 8 MB -> persist.bin...0 Ok
-nvram [0x08100000] 21 MB -> nvram.bin...0 Ok
-oeminfo [0x09600000] 32 MB -> oeminfo.bin...0 Ok
Done!!!
C:Hydra ToolBackupAuto0707__101421193556
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 1 B4E94207B07C300A0705D6B445BA6144
ERAM Size : 1 0x0000000000070000 -448 KB
IRAM Size : 1 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000001D1EC00000 -116.48 GB
eMMC CID : 15010044555442343202A81ABE818715 - DUTB42

Reading GPT -EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Remove Account
Processing...
Backing up tition for safety...
-oeminfo_101421193617.bin [0x09600000] 32 MB -> oeminfo_101421193617.bin...0 Ok
Action Result : Ok

Elapsed Time : 00:01:46
  Reply With Quote
Old 10-16-2021, 09:52   #2625 (permalink)
No Life Poster
 
Join Date: May 2011
Posts: 1,322
Member: 1576733
Status: Offline
Thanks Meter: 622
Y6P 2020 (MED-LX9) Remove Frp With by Hydra

Y6P 2020 (MED-LX9) Remove Frp With by Hydra



Quote:
=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port_V1632 (COM7)
Device : 5&1b4e643&0&3
SymbolicName :??USB#VID_0E8D&PID_0003#5&1b4e643&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0

Opened handle..

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : F8A9FCDAEC599EBBFC62F512B255D2A9
ERAM Size : 0x0000000000038000 -224 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 150100525036344D42019FE5979187A9 - RP64MB

Reading GPT -EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP tition...
Action Result : Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:02
  Reply With Quote
Reply

Bookmarks

Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


 



All times are GMT +1. The time now is 22:48.



Powered by Searchlight © 2024 Axivo Inc.
vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2024 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2023 -
Page generated in 0.44291 seconds with 9 queries

SEO by vBSEO