GSM Shop GSM Shop
GSM-Forum  

Welcome to the GSM-Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features.
Only registered members may post questions, contact other members or search our database of over 8 million posts.

Registration is fast, simple and absolutely free so please - Click to REGISTER!

If you have any problems with the registration process or your account login, please contact contact us .

Go Back   GSM-Forum > Product Support Sections > Special Solutions / Services / WebShop > GSMFABRICA Products > HYDRA TOOL

Reply
 
LinkBack Thread Tools Display Modes
Old 12-14-2021, 09:42   #2821 (permalink)
No Life Poster
 
Join Date: Feb 2012
Age: 37
Posts: 1,192
Member: 1724862
Status: Offline
Thanks Meter: 388
Vivo V11 Pro Remove Screen Lock And Remove Frp With by Hydra


Vivo V11 Pro Remove Screen Lock And Remove Frp With by Hydra



Quote:
Brand : VIVO Model : V11 Pro (V1804) Storage : Auto
Loader: 0008C0E100010000_f188b3bc5198fb41_6a85bcbd_GENERIC _VIVO.fhprg
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Quectel QDLoader 9008 (COM3)
SymbolicName :??USB#VID_05C6&PID_9008#6&f50380e&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 12/16/2020,20.0.0.20

Getting device info .. . ...
Serial No.: 0xCCC0D313
HW_ID : 0008C0E100730004
MSM ID : 0x0008C0E1, SDM660-Qualcomm Snapdragon 660
MODEL_ID : 0x0004
OEM_ID : 0x0073 - VIVO
PBL Ver : 00000000
PK HASH : f188b3bc5198fb412fc8ab7ef8b60d245ebb705a0fc0af387f 1db21533cc4570

Firehose Loader [0008C0E100010000_f188b3bc5198fb41_6a85bcbd_GENERIC _VIVO.fhprg]
--------------------------------------------------
Header Type : OLD
TargetMSM :
Tag :
Version : 5
Code_size : 416
Signature_size : 256
fhVendor : VIVO
HW_ID : 3006000000010000
Vendor : GENERIC
OEM_ID : 0001
MODEL_ID : 0000
SW_ID : 000000000000000B
APP_ID :
pk_hash : f188b3bc5198fb412fc8ab7ef8b60d245ebb705a0fc0af387f 1db21533cc4570
OEM_VERSION : compiler027
IMAGE_VARIANT : Sdm660LA
QC_VERSION : BOOT.XF.1.4-00265-S660LZB-1
--------------------------------------------------

SaharaBoot... Ok
Sending ...............................b Okb0
Connecting to Firehose...
Ping ......... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : MSM8996
Version : 1
DateTime : Jul 19 2019 - 12:28:14

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 273077294
Firmware Version : 3
Product Name : 3V6CMB
Physical titions : 4
Total Logical Blocks:
Drive [0] 244277248 [116.48 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]
Drive [3] 32768 [16 MB]

Protocol : Universal
Running : Ok
Reading GPT[4]
Drive [0] 52 Items
Drive [1] 0 Items
Drive [2] 0 Items
Drive [3]


Phone Information ......
ID : QP1A.190711.020
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Security Patch : 2020-11-01
Platform : =SDM660
Fingerprint : vivo/1804/1804:10/QP1A.190711.020/compiler12082137:user/release-keys

Processing Auto....
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOk
- Formatting Userdata
Executing ...
- Formatting Userdata [Safe Format - eMMc] OkOk
Action Result : Ok

Rebooting Phone.... Ok

Elapsed Time : 00:00:05
  Reply With Quote
Old 12-15-2021, 08:25   #2822 (permalink)
No Life Poster
 
Join Date: Feb 2012
Age: 37
Posts: 1,192
Member: 1724862
Status: Offline
Thanks Meter: 388
Redmi 5 Plus (vince) Edl Frp Remove With by Hydra

Redmi 5 Plus (vince) Edl Frp Remove With by Hydra



Quote:
Brand : XIAOMI Model : Redmi 5 Plus (vince) Storage : Auto
Loader: 000460E100000000_57158eaf1814d78f_cfb903c9_QUALCOM M_XIAOMI_peek_8953.fhprg
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM4)
SymbolicName :??USB#VID_05C6&PID_9008#6&182a12da&0&5#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 08/02/2017,2.1.2.7

Getting device info .. Ok
Device MODE : Firehose
Connecting to Firehose...
Ping .. Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8953
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 19
Serial Number : 62407058
Firmware Version : 4
Product Name : S0J9F8
Physical titions : 3
Total Logical Blocks:
Drive [0] 122142720 [58,242 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]

Protocol : Universal
Running : Ok

Phone Information .....
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi 5 Plus
ID : OPM1.171019.019
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : vince-user 8.1.0 OPM1.171019.019 V11.0.2.0.OEGMIXM release-keys
Miui Ver : V11
Device : vince
Mod_device : vince_global
Board : msm8953
Display ID : ZQL1711-vince-build-20191108142512
Security Patch : 2019-10-01
Emmc_size : 16GB
Platform : msm8953
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : xiaomi/vince/vince:8.1.0/OPM1.171019.019/V11.0.2.0.OEGMIXM:user/release-keys

Reading GPT[3]
Drive [0] 52 Items
Drive [1] 0 Items
Drive [2] 0 Items

Removing FRPta...
Method :
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOk Ok

Elapsed Time : 00:00:04
  Reply With Quote
Old 12-15-2021, 08:33   #2823 (permalink)
No Life Poster
 
Join Date: Feb 2012
Age: 37
Posts: 1,192
Member: 1724862
Status: Offline
Thanks Meter: 388
Redmi 5A (riva) Factory Reset One click With by Hydra

Redmi 5A (riva) Factory Reset One click With by Hydra




Quote:
Brand : XIAOMI Model : Redmi 5A (riva) Storage : Auto
Loader: 000560E100000000_57158eaf1814d78f_2f7bab6c_QUALCOM M_XIAOMI_peek_8917.fhprg
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM8)
SymbolicName :??USB#VID_05C6&PID_9008#6&55ce37d&0&6#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 08/02/2017,2.1.2.7

Getting device info .. Ok
Device MODE : Firehose
Connecting to Firehose...
Ping .. Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8917
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 97873921
Firmware Version : 165
Product Name : HAG4a2
Physical titions : 3
Total Logical Blocks:
Drive [0] 30777344 [14,676 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]

Protocol : Universal
Running : Ok

Phone Information .....
Brand : Xiaomi
Vendor : Xiaomi
Model : Redmi 5A
ID : N2G47H
SDK : 25
Release : 7.1.2
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : riva-user 7.1.2 N2G47H V9.1.8.0.NCKMIEI release-keys
Miui Ver : V9
Device : riva
Mod_device : riva_global
Board : QC_Reference_Phone
Display ID : N2G47H
Security Patch : 2017-10-01
Emmc_size : 16GB
Platform : msm8937
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : Xiaomi/riva/riva:7.1.2/N2G47H/V9.1.8.0.NCKMIEI:user/release-keys

Reading GPT[3]
Drive [0] 52 Items
Drive [1] 0 Items
Drive [2] 0 Items

Formatting Userdata...
Method :
Auto
Processing...
- Formatting Userdata
Executing ...
- Formatting Userdata [Safe Format - eMMc] OkOk Ok

Elapsed Time : 00:00:03
  Reply With Quote
Old 12-15-2021, 08:45   #2824 (permalink)
No Life Poster
 
Join Date: Feb 2012
Age: 37
Posts: 1,192
Member: 1724862
Status: Offline
Thanks Meter: 388
Redmi Note 9 (merlin) Bootloader Unlock With by Hydra

Redmi Note 9 (merlin) Bootloader Unlock With by Hydra




Quote:
=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port (COM49)
Device : 5&b248509&0&2
SymbolicName :??USB#VID_0E8D&PID_0003#5&b248509&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0

Opened handle..
Handshaking... Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0707 MT6768 [6768]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : E7
SBC : 01 (True)
SLA : 02 (True)
DAA : 04 (True)
SWJTAG : 06 (True)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 20 (True)
MEMWRITE : 40 (True)
CMD_C8 : 80 (True)

Exploiting Device...
Exploit Sent..
Successfully Exploited...
Handshaking... Ok

--- ENABLE AUTO PREL DUMP ----
Found
C:Hydra ToolBackupPreloader_dumpprel.tmp
------------------------------

Handshaking...

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0707 MT6768 [6768]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)

MEID : 1984AA9E3B15E247D1AFC0A024E51A26
Stage 1.. [Size:256504]
Sending : Please wait.. Accepted

Identifying Protocol...
Protocol : New
Synchronization... SYNC
Preloader Initialization...
sing prel.tmp
Init : Accepted
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 87BC789174F12EDA9012196826F0056A
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58,242 GB
eMMC CID : 13014E53304A394B38101FE532A3976B - S0J9K8
Executing : ACCEPTED...

Reading GPT -EMMC [0x00008000] 130 Items

Autobackup titions
-preloader [0x00000000] 512 KB -> preloader.bin...0 Ok
-> Renaming Preloader.... preloader_merlin.bin
Creating Scatter file... C:Hydra ToolBackupAuto0707__121521110151MT6768_Android_sca tter.txt
-pgpt [0x00000000] 32 KB -> pgpt.bin...0 Ok
-frp [0x05508000] 1024 KB -> frp.bin...0 Ok
-nvdata [0x0C4A2000] 64 MB -> nvdata.bin...0 Ok
-persist [0x104A2000] 48 MB -> persist.bin...0 Ok
-protect1 [0x164A2000] 8 MB -> protect1.bin...0 Ok
-protect2 [0x16CA2000] 11,367 MB -> protect2.bin...0 Ok
-nvram [0x19F80000] 64 MB -> nvram.bin...0 Ok
Done!!!
C:Hydra ToolBackupAuto0707__121521110151
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 1 87BC789174F12EDA9012196826F0056A
ERAM Size : 1 0x0000000000070000 -448 KB
IRAM Size : 1 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58,242 GB
eMMC CID : 13014E53304A394B38101FE532A3976B - S0J9K8

Reading GPT -EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Unlock Bootloader
Processing...
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------

Verifying status after operation...
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------
Action Result : Ok

Elapsed Time : 00:00:48
  Reply With Quote
Old 12-15-2021, 13:05   #2825 (permalink)
Freak Poster
 
Mr. Hafidi's Avatar
 
Join Date: Sep 2018
Location: Algeria
Age: 33
Posts: 133
Member: 2862301
Status: Offline
Thanks Meter: 23
Realme C11 ScreenLock Remove, Format & FRP.

[/URL]
  Reply With Quote
Old 12-16-2021, 08:56   #2826 (permalink)
No Life Poster
 
Join Date: Feb 2012
Age: 37
Posts: 1,192
Member: 1724862
Status: Offline
Thanks Meter: 388
Oppo F1s Plus Read Screen Security With by Hydra

Oppo F1s Plus Read Screen Security With by Hydra



Quote:
=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port (COM7)
Device : 5&2363eed3&0&4
SymbolicName :??USB#VID_0E8D&PID_0003#5&2363eed3&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0

Opened handle..

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 580238E9D89ADDE8BC50940842BF80C2
ERAM Size : 0x0000000000038000 -224 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 150100524836344D4202D5F3C64F1419 - RH64MB

Reading GPT -EMMC [0x00008000] 130 Items


Reading System Info
Brand : OPPO
Vendor : OPPO
Model : A1601
ID : LMY47I
SDK : 22
Release : 5.1
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Description : full_oppo6750_15331-user 5.1 LMY47I 1577332894 release-keys
Device : A1601
Board : full_oppo6750_15331
Display ID : A1601EX_11_A.41_191226
Security Patch : 2018-01-05
Platform : mt6750
FRPPST : /dev/block/platform/mtk-msdc.0/by-name/frp
StorageType : mtp,mass_storage
Userdata State : Not Encrypted

-------------------------------------
Operation : Read Pattern
Processing...
Searching PatternKey : .0 Found
Gesture Data : CACDF7F47DFE7726360CCE8697CD7CEE531D9F1F
Bruteforcing pattern hash..Please wait for few seconds
Pattern Code : 2486573
1 2 3
4 5 6
7 8 9
Action Result : Ok

Elapsed Time : 00:00:03

  Reply With Quote
Old 12-16-2021, 09:10   #2827 (permalink)
No Life Poster
 
Join Date: Feb 2012
Age: 37
Posts: 1,192
Member: 1724862
Status: Offline
Thanks Meter: 388
Redmi Note 9C NFC (angelican) Bootloader Unlock With by Hydra

Redmi Note 9C NFC (angelican) Bootloader Unlock With by Hydra



Quote:
=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port_V1632 (COM78)
Device : 7&e6223af&0&2
SymbolicName :??COM78
Driver Ver : 01/22/2015,3.0.1504.0

Opened handle..

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : E3BCC6E54809C9957BDEE55848CDD9B4
ERAM Size : 0x0000000000038000 -224 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000747C00000 -29,121 GB
eMMC CID : 150100424A54443452097C8D5F7197A9 - BJTD4R

Reading GPT -EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Unlock Bootloader
Processing...
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------

Verifying status after operation...
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------
Action Result : Ok

Elapsed Time : 00:00:02
  Reply With Quote
Old 12-16-2021, 09:26   #2828 (permalink)
No Life Poster
 
Join Date: Feb 2012
Age: 37
Posts: 1,192
Member: 1724862
Status: Offline
Thanks Meter: 388
Oppo A71 (2018) CPH1801 Edl Format Userdata One Click With by Hydra

Oppo A71 (2018) CPH1801 Edl Format Userdata One Click With by Hydra



Quote:
Brand : OPPO Model : A71 (2018) CPH1801 Storage : Auto
Loader: 0009A0E100000000_05f06ba44eeb2abd_740b0467_QUALCOM M_OPPO_peek_8953.fhprg
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM3)
SymbolicName :??USB#VID_05C6&PID_9008#5&1d65b4dc&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 07/08/2015,2.1.2.0

Getting device info .. Ok
Device MODE : Firehose
Connecting to Firehose...
Ping .. Ok
Configuration... Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8953
Version : 1

Protocol : Oppo
Running : Ok
Processing A71 (CPH1801) Format Userdata....
Action Result : Ok

Rebooting Phone.... Ok

Elapsed Time : 00:00:02
  Reply With Quote
Old 12-17-2021, 08:44   #2829 (permalink)
No Life Poster
 
Join Date: Feb 2012
Age: 37
Posts: 1,192
Member: 1724862
Status: Offline
Thanks Meter: 388
Redmi 7A (pine) Edl Frp Remove With by Hydra

Redmi 7A (pine) Edl Frp Remove With by Hydra



Quote:
Brand : XIAOMI Model : Redmi 7A (pine) Storage : Auto
Loader: 000BF0E100720000_57158eaf1814d78f_e551cac5_XIAOMI_ auth_peek_8937.fhprg
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM5)
SymbolicName :??USB#VID_05C6&PID_9008#6&2953c98d&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 08/02/2017,2.1.2.7

Getting device info .. Ok
Device MODE : Firehose
Connecting to Firehose...
Ping .. Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 208732301
Firmware Version : 165
Product Name : HAG4a2
Physical titions : 3
Total Logical Blocks:
Drive [0] 30777344 [14,676 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]

Protocol : Universal
Running : Ok

Phone Information ......
Brand : Xiaomi
Vendor : Xiaomi
Model : Redmi 7A
ID : PKQ1.190319.001
SDK : 28
Release : 9
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-GB
Description : pine-user 9 PKQ1.190319.001 V11.0.7.0.PCMMIXM release-keys
Miui Ver : V11
Device : pine
Mod_device : pine_global
Display ID : ZQL1533-pine-build-20200407194230
Security Patch : 2020-03-01
Emmc_size : 16GB
Fingerprint : Xiaomi/pine/pine:9/PKQ1.190319.001/V11.0.7.0.PCMMIXM:user/release-keys

Reading GPT[3]
Drive [0] 60 Items
Drive [1] 0 Items
Drive [2] 0 Items

Removing FRPta...
Method :
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOk Ok

Rebooting Phone.... Ok
If not rebooted, Please Power on Manually

Elapsed Time : 00:00:04
  Reply With Quote
Old 12-17-2021, 08:54   #2830 (permalink)
No Life Poster
 
Join Date: Feb 2012
Age: 37
Posts: 1,192
Member: 1724862
Status: Offline
Thanks Meter: 388
Redmi Note 8 Pro (begonia) Bootloader Unlock With By hydra

Redmi Note 8 Pro (begonia) Bootloader Unlock With By hydra



Quote:
=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port_V1632 (COM5)
Device : 6&2ee930ad&0&2
SymbolicName :??USB#VID_0E8D&PID_0003#6&2ee930ad&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0

Opened handle..
Handshaking... Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0813 MT6785 [6785]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : E7
SBC : 01 (True)
SLA : 02 (True)
DAA : 04 (True)
SWJTAG : 06 (True)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 20 (True)
MEMWRITE : 40 (True)
CMD_C8 : 80 (True)

Exploiting Device...
Exploit Sent..
Successfully Exploited...
Handshaking... Ok

--- ENABLE AUTO PREL DUMP ----
Found
C:Hydra ToolBackupPreloader_dumpprel.tmp
------------------------------

Handshaking...

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0813 MT6785 [6785]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)

MEID : 1B85FA60F97A293624A22EC7AA200C16
Stage 1.. [Size:234968]
Sending : Please wait.. Accepted

Identifying Protocol...
Protocol : New
Synchronization... SYNC
Preloader Initialization...
sing prel.tmp
Init : Accepted
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : E8708B65C021765230D1E48C79C02
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x0000000180000000 -6 GB
UFS LU0 Size: 0x0000000000400000 -4 MB
UFS LU1 Size: 0x0000000000400000 -4 MB
UFS LU2 Size: 0x0000001DCB000000 -119.172 GB
UFS CID : ,'01MT128GASAO4U21
UFS UNIQID : 095e029001020c121900000000000000
Executing : ACCEPTED...

Reading GPT0 -UFS [0x00008000] 0 130 Items

Reading System Info
Vendor : Xiaomi
ID : QP1A.190711.020
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : zh-CN
Description : begonia-user 10 QP1A.190711.020 V12.0.5.0.QGGCNXM release-keys
Miui Ver : V12
Display ID : QP1A.190711.020
Security Patch : 2020-12-01
StorageType : mtp
Userdata State : Not Encrypted
0
Autobackup titions
-preloader [0x00000000] 512 KB -> preloader.bin... Ok0
-> Renaming Preloader.... preloader_begonia.bin0
Creating Scatter file... C:Hydra ToolBackupAuto0813__121721103648MT6785_Android_sca tter.txt
-pgpt [0x00000000] 32 KB -> pgpt.bin... Ok
-frp [0x05888000] 1024 KB -> frp.bin... Ok
-nvdata [0x08188000] 64 MB -> nvdata.bin... Ok
-persist [0x0E188000] 70.469 MB -> persist.bin... Ok
-protect1 [0x12800000] 8 MB -> protect1.bin... Ok
-protect2 [0x13000000] 8 MB -> protect2.bin... Ok
-nvram [0x17580000] 64 MB -> nvram.bin... Ok
Done!!!0
C:Hydra ToolBackupAuto0813__121721103648
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 1 E8708B65C021765230D1E48C79C02
ERAM Size : 1 0x0000000000080000 -512 KB
IRAM Size : 1 0x0000000180000000 -6 GB
UFS LU0 Size: 0x0000000000400000 -4 MB
UFS LU1 Size: 0x0000000000400000 -4 MB
UFS LU2 Size: 0x0000001DCB000000 -119.172 GB
UFS CID : ,'01MT128GASAO4U21
UFS UNIQID : 095e029001020c121900000000000000

Reading GPT0 -UFS [0x00008000] 0 130 Items
0

Reading System Info
Vendor : Xiaomi
ID : QP1A.190711.020
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : zh-CN
Description : begonia-user 10 QP1A.190711.020 V12.0.5.0.QGGCNXM release-keys
Miui Ver : V12
Display ID : QP1A.190711.020
Security Patch : 2020-12-01
StorageType : mtp
Userdata State : Not Encrypted

-------------------------------------
Operation : Unlock Bootloader
Processing...
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------

Verifying status after operation...
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------
Action Result : 0 Ok

Elapsed Time : 00:00:36
  Reply With Quote
Old 12-17-2021, 09:09   #2831 (permalink)
No Life Poster
 
Join Date: Feb 2012
Age: 37
Posts: 1,192
Member: 1724862
Status: Offline
Thanks Meter: 388
Huawei Y7 2019 (DUB-LX3) Edl Flashıng Fix Sound Problem With by Hydra

Huawei Y7 2019 (DUB-LX3) Edl Flashıng Fix Sound Problem With by Hydra



Quote:
device info .. . ...
Serial No.: 0x2B250BC3
HW_ID : 0009A0E100150065
MSM ID : 0x0009A0E1, SDM450-Qualcomm Snapdragon 450
MODEL_ID : 0x0065
OEM_ID : 0x0015 - HUAWEI
PBL Ver : 00000000
PK HASH : 6bc369511da9cadb3a7af61574f89db385003d6241bdd1ff57 3dba61bf6ae119

Firehose Loader [0009A0E100150065_6bc369511da9cadb_1a1074cf_HUAWEI_ QUALCOMM_peek_8953.fhprg]
--------------------------------------------------
Header Type : OLD
TargetMSM : 8953
Tag : _peek
Version : 3
Code_size : 288
Signature_size : 256
fhVendor : QUALCOMM
HW_ID : 0009A0E100150065
Vendor : HUAWEI
OEM_ID : 0015
MODEL_ID : 0065
SW_ID : 0000000000000003
APP_ID :
pk_hash : 6bc369511da9cadb3a7af61574f89db385003d6241bdd1ff57 3dba61bf6ae119
OEM_VERSION : SIA1000073848
IMAGE_VARIANT : JAADANAZA
QC_VERSION : BOOT.BF.3.3.2-00019
--------------------------------------------------

SaharaBoot... Ok
Sending .............b Ok
Connecting to Firehose...
Ping ... Ok
Configuration.......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8953
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 3415921380
Firmware Version : 0
Product Name : GD6BMB
Physical titions : 3
Total Logical Blocks:
Drive [0] 61071360 [29,121 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]

Protocol : Universal
Running : Ok

Phone Information .....
Vendor : unknown
ID : OPM1.171019.011
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : generic_a53-eng 8.1.0 OPM1.171019.011 eng.root.20190122.143045 test-keys
Display ID : System 8.2.0.036(03JW)
Security Patch : 2018-07-01
Fingerprint : Huawei/generic_a53/generic_a53:8.1.0/OPM1.171019.011/root01221430:eng/test-keys

Reading GPT[3]
Drive [0] 56 Items
Drive [1] 0 Items
Drive [2] 0 Items


Backup Security titions...
Reading Security Items....
> modemst1
> modemst2
> fsg
> fsc
C:Hydra ToolBackupSecurity_Backup__8.1.0_Security_12162118 3559.sec
Backup Security Success....

----------------------------
Flashing Selected titions....
- gpt [gpt] Ok
- sbl1 [sbl1] Ok
- rpm [rpm] Ok
- tz [tz] Ok
- devcfg [devcfg] Ok
- dsp [dsp] Ok
- keystore [keystore] Ok
- frp [frp] Ok
- mota [mota] Ok
- dip [dip] Ok
- syscfg [syscfg] Ok
- apdp [apdp] Ok
- msadp [msadp] Ok
- dpo [dpo] Ok
- fsc [fsc] Ok
- ssd [ssd] Ok
- mcfg [mcfg] Ok
- modemst1 [modemst1] Skipped
- modemst2 [modemst2] Skipped
- misc [misc] Ok
- oeminfo [oeminfo] Ok
- bootfail_info [bootfail_info] Ok
- rrecord [rrecord] Ok
- rainbow [rainbow] Ok
- pad0 [pad0] Ok
- aboot [aboot] Ok
- cmnlib [cmnlib] Ok
- cmnlib64 [cmnlib64] Ok
- keymaster [keymaster] Ok
- fsg [fsg] Skipped
- DDR [DDR] Ok
- sec [sec] Skipped
- devinfo [devinfo] Ok
- limits [limits] Ok
- modem [modem] Ok
- erecovery_kernel [erecovery_kernel] Ok
- erecovery_ramdis [erecovery_ramdis] Ok
- erecovery_vendor [erecovery_vendor] Ok
- kernel [kernel] Ok
- ramdisk [ramdisk] Ok
- recovery_ramdisk [recovery_ramdisk] Ok
- recovery_vendor [recovery_vendor] Ok
- persist [persist] Ok
- cache [cache] Ok
- odm [odm] Ok
- preload [preload] Ok
- patch [patch] Ok
- log [log] Ok
- version [version] Ok
- product [product] Ok
- cust [cust] Ok
- vendor [vendor] Ok
- system [system] Ok
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 0
Set bootable storage drive 0 Ok

Rebooting Phone.... Ok

Elapsed Time : 00:30:39
  Reply With Quote
The Following User Says Thank You to ceza031 For This Useful Post:
Old 12-18-2021, 08:56   #2832 (permalink)
No Life Poster
 
Join Date: Feb 2012
Age: 37
Posts: 1,192
Member: 1724862
Status: Offline
Thanks Meter: 388
Vivo V7 (1718) Edl Frp Remove With by Hydra

Vivo V7 (1718) Edl Frp Remove With by Hydra



Quote:
Brand : VIVO Model : V7 (1718) Storage : Auto
Loader: 0009A0E100000000_60ba997fef6da9f0_3d51f0e9_QUALCOM M_VIVO_peek_8953.fhprg
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM64)
SymbolicName :??USB#VID_05C6&PID_9008#6&27a0b2a2&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 09/10/2015,2.1.2.0

Getting device info .. . ...
Serial No.: 0x665582EF
HW_ID : 0009A0E100000000
MSM ID : 0x0009A0E1, SDM450-Qualcomm Snapdragon 450
MODEL_ID : 0x0000
OEM_ID : 0x0000 - QUALCOMM
PBL Ver : 00000000
PK HASH : 60ba997fef6da9f05885fa11f1dd6d2a90d052a257a09c2075 d7246cc73c0d43

Firehose Loader [0009A0E100000000_60ba997fef6da9f0_3d51f0e9_QUALCOM M_VIVO_peek_8953.fhprg]
--------------------------------------------------
Header Type : OLD
TargetMSM : 8953
Tag : _peek
Version : 3
Code_size : 288
Signature_size : 256
fhVendor : VIVO
HW_ID : 0009A0E100000000
Vendor : QUALCOMM
OEM_ID : 0000
MODEL_ID : 0000
SW_ID : 0000000000000003
APP_ID :
pk_hash : 60ba997fef6da9f05885fa11f1dd6d2a90d052a257a09c2075 d7246cc73c0d43
OEM_VERSION : compiler033
IMAGE_VARIANT : JAADANAZA
QC_VERSION : BOOT.BF.3.3-00221
--------------------------------------------------

SaharaBoot... Ok
Sending ..................b Okb0
Connecting to Firehose...
Ping ... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8953
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 1499671739
Firmware Version : 165
Product Name : HBG4a2
Physical titions : 3
Total Logical Blocks:
Drive [0] 61071360 [29.121 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]

Protocol : Universal
Running : Ok

Phone Information .....
Brand : vivo
Vendor : vivo
Model : vivo 1718
ID : N2G47H
SDK : 25
Release : 7.1.2
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : msm8953_64-user 7.1.2 N2G47H eng.compil.20180517.210821 release-keys
Device : PD1718F_EX
Board : msm8953
Display ID : N2G47H release-keys
Security Patch : 2018-05-01
Emmc_size : 16GB
Platform : msm8953
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : vivo/1718/1718:7.1.2/N2G47H/compil05172108:user/release-keys

Reading GPT[3]
Drive [0] 56 Items
Drive [1] 0 Items
Drive [2] 0 Items

Removing FRPta...
Method : 0
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOk Ok

Rebooting Phone.... Ok
If not rebooted, Please Power on Manually

Elapsed Time : 00:00:07
  Reply With Quote
Old 12-18-2021, 09:03   #2833 (permalink)
No Life Poster
 
Join Date: Feb 2012
Age: 37
Posts: 1,192
Member: 1724862
Status: Offline
Thanks Meter: 388
Redmi 9A (dandelion) Bootloader Unlock With by Hydra

Redmi 9A (dandelion) Bootloader Unlock With by Hydra




Quote:
=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port (COM6)
Device : 6&84c0a73&0&3
SymbolicName :??USB#VID_0E8D&PID_0003#6&84c0a73&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 09/11/2014,3.0.1437.1

Opened handle..

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : B07A9AB9C3AE46005896A66D79A15813
ERAM Size : 0x0000000000038000 -224 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 45010044413430363401FEC4491787E5 - DA4064

Reading GPT -EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Unlock Bootloader
Processing...
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------

Verifying status after operation...
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------
Action Result : Ok

Elapsed Time : 00:00:03
  Reply With Quote
Old 12-18-2021, 09:31   #2834 (permalink)
No Life Poster
 
Join Date: Feb 2012
Age: 37
Posts: 1,192
Member: 1724862
Status: Offline
Thanks Meter: 388
Vivo Y12s (PD2036F) Remove Screen Lock &Remove Frp One Click With by Hydra

Vivo Y12s (PD2036F) Remove Screen Lock &Remove Frp One Click With by Hydra



Quote:
=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port_V1632 (COM15)
Device : 5&375ef683&0&1
SymbolicName :??USB#VID_0E8D&PID_0003#5&375ef683&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0

Opened handle..
Handshaking... Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0766 MT6765 [6765]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : E5
SBC : 01 (True)
SLA : 00 (False)
DAA : 04 (True)
SWJTAG : 04 (True)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 20 (True)
MEMWRITE : 40 (True)
CMD_C8 : 80 (True)

Exploiting Device...
Exploit Sent..
Successfully Exploited...
Handshaking... Ok

--- ENABLE AUTO PREL DUMP ----
Found
C:Hydra ToolBackupPreloader_dumpprel.tmp
------------------------------

Handshaking...

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0766 MT6765 [6765]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)

MEID : E988F2F4775EE2DE6B42BA29518BA
Stage 1.. [Size:216440]
Sending : Please wait.. Accepted

Identifying Protocol...
Protocol : New
Synchronization... SYNC
Preloader Initialization...
sing prel.tmp
Init : Accepted
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 7D3ECD15918D4986058F5ED1B46057CF
ERAM Size : 0x0000000000038000 -224 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 150100475036424D42016B4597D4B621 - GP6BMB
Executing : ACCEPTED...

Reading GPT -EMMC [0x00008000] 130 Items

Reading System Info
ID : RP1A.200720.012
SDK : 30
Release : 11
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_k62v1_64_bsp-user 11 RP1A.200720.012 eng.compil.20211009.184437 release-keys
Display ID : RP1A.200720.012 release-keys
Security Patch : 2021-10-01
Platform : =MTK6765
StorageType : mtp
Userdata State : Encrypted

Autobackup titions
-preloader [0x00000000] 512 KB -> preloader.bin...0 Ok
-> Renaming Preloader.... preloader_k62v1_64_bsp.bin
Creating Scatter file... C:Hydra ToolBackupAuto0766__121821132954MT6765_Android_sca tter.txt
-pgpt [0x00000000] 32 KB -> pgpt.bin...0 Ok
-frp [0x05588000] 1024 KB -> frp.bin...0 Ok
-nvdata [0x07688000] 64 MB -> nvdata.bin...0 Ok
-protect1 [0x16A88000] 8 MB -> protect1.bin...0 Ok
-protect2 [0x17288000] 13.469 MB -> protect2.bin...0 Ok
-persist [0x18800000] 48 MB -> persist.bin...0 Ok
-nvram [0x24680000] 64 MB -> nvram.bin...0 Ok
Done!!!
C:Hydra ToolBackupAuto0766__121821132954
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 1 7D3ECD15918D4986058F5ED1B46057CF
ERAM Size : 1 0x0000000000038000 -224 KB
IRAM Size : 1 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 150100475036424D42016B4597D4B621 - GP6BMB

Reading GPT -EMMC [0x00008000] 130 Items


Reading System Info
ID : RP1A.200720.012
SDK : 30
Release : 11
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_k62v1_64_bsp-user 11 RP1A.200720.012 eng.compil.20211009.184437 release-keys
Display ID : RP1A.200720.012 release-keys
Security Patch : 2021-10-01
Platform : =MTK6765
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Safe Format Master Clear 1
Processing...
Safeformat Master Clear 1...
Action Result : Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:44
  Reply With Quote
Old 12-20-2021, 07:39   #2835 (permalink)
No Life Poster
 
Join Date: Feb 2012
Age: 37
Posts: 1,192
Member: 1724862
Status: Offline
Thanks Meter: 388
Huawei ATU-L22 (Y6 2018) Edl Frp Remove With by Hydra

Huawei ATU-L22 (Y6 2018) Edl Frp Remove With by Hydra



Quote:
Brand : HUAWEI Model : ATU-L22 (Y6 2018) Storage : Auto
Loader: 000560E10015003A_6bc369511da9cadb_c0ba0f0a_HUAWEI_ QUALCOMM_peek_8917.fhprg
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM4)
SymbolicName :??USB#VID_05C6&PID_9008#6&195f3125&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 08/02/2017,2.1.2.7

Getting device info .. . ...
Serial No.: 0xA9BC1A48
HW_ID : 000560E10015003A
MSM ID : 0x000560E1, MSM8917-Qualcomm Snapdragon 425
MODEL_ID : 0x003A
OEM_ID : 0x0015 - HUAWEI
PBL Ver : 00000000
PK HASH : 6bc369511da9cadb3a7af61574f89db385003d6241bdd1ff57 3dba61bf6ae119

Firehose Loader [000560E10015003A_6bc369511da9cadb_c0ba0f0a_HUAWEI_ QUALCOMM_peek_8917.fhprg]
--------------------------------------------------
Header Type : OLD
TargetMSM : 8917
Tag : _peek
Version : 3
Code_size : 288
Signature_size : 256
fhVendor : QUALCOMM
HW_ID : 000560E10015003A
Vendor : HUAWEI
OEM_ID : 0015
MODEL_ID : 003A
SW_ID : 0000000000000003
APP_ID :
pk_hash : 6bc369511da9cadb3a7af61574f89db385003d6241bdd1ff57 3dba61bf6ae119
OEM_VERSION : ubuntu
IMAGE_VARIANT : LAADANAZA
QC_VERSION : BOOT.BF.3.3-00193
--------------------------------------------------

SaharaBoot... Ok
Sending ...................b Okb0
Connecting to Firehose...
Ping ... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8917
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 3262209095
Firmware Version : 858796104
Product Name : HAG4a2
Physical titions : 3
Total Logical Blocks:
Drive [0] 30777344 [14.676 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]

Protocol : Universal
Running : Ok

Phone Information .....
Vendor : unknown
ID : OPR6.170623.013
SDK : 26
Release : 8.0.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : generic_a53-user 8.0.0 OPR6.170623.013 eng.root.20200225.190715 test-keys
Display ID : System 8.0.0.073(091X)
Security Patch : 2020-02-01
Fingerprint : Huawei/generic_a53/generic_a53:8.0.0/OPR6.170623.013/root02251907:user/test-keys

Reading GPT[3]
Drive [0] 56 Items
Drive [1] 0 Items
Drive [2] 0 Items

Removing FRPta...
Method : 0
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOk Ok

Elapsed Time : 00:00:06
  Reply With Quote
Reply

Bookmarks

Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


 



All times are GMT +1. The time now is 17:54.



Powered by Searchlight © 2022 Axivo Inc.
vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2022 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2017 -
Page generated in 0.40145 seconds with 8 queries

SEO by vBSEO