GSM Shop GSM Shop
GSM-Forum  

Welcome to the GSM-Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features.
Only registered members may post questions, contact other members or search our database of over 8 million posts.

Registration is fast, simple and absolutely free so please - Click to REGISTER!

If you have any problems with the registration process or your account login, please contact contact us .

Go Back   GSM-Forum > Product Support Sections > Special Solutions / Services / WebShop > GSMFABRICA Products > HYDRA TOOL

Reply
 
LinkBack Thread Tools Display Modes
Old 12-25-2021, 08:44   #2851 (permalink)
No Life Poster
 
Join Date: Feb 2012
Age: 37
Posts: 1,192
Member: 1724862
Status: Offline
Thanks Meter: 388
Vivo Y11 (1906) Edl Format Userdata &Frp Remove One Click With by Hydra


Vivo Y11 (1906) Edl Format Userdata &Frp Remove One Click With by Hydra



Quote:
Brand : VIVO Model : Y11 (1906) Storage : Auto
Loader: 000BF0E100000000_60ba997fef6da9f0_d8fbe714_QUALCOM M_VIVO_wut_peek_8937.fhprg
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM76)
SymbolicName :??USB#VID_05C6&PID_9008#6&2adb531f&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 08/31/2015,2.1.2.0

Getting device info .. Ok
Device MODE : Firehose
Connecting to Firehose...
Ping .. Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 2849493830
Firmware Version : 8
Product Name : GD6BMB
Physical titions : 3
Total Logical Blocks:
Drive [0] 61071360 [29.121 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]

Protocol : Universal
Running : Ok
Reading GPT[3]
Drive [0] 60 Items
Drive [1] 0 Items
Drive [2] 0 Items


Phone Information ......
Brand : vivo
Vendor : vivo
Model : vivo 1906
ID : PKQ1.190616.001
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : msm8937_64-user 9 PKQ1.190616.001 compiler08210558 release-keys
Device : PD1930F_EX
Display ID : PKQ1.190616.001 release-keys
Security Patch : 2020-08-01
Emmc_size : 16GB
Platform : =SDM439
Fingerprint : vivo/1906/1906:9/PKQ1.190616.001/compiler08210558:user/release-keys

Processing Safe Erase....
- Removing FRP [Erase Safety Tag] Ok
- Formatting Userdata [Erase Safety Tag] Ok
Action Result : Ok

Elapsed Time : 00:00:06
  Reply With Quote
Old 12-25-2021, 08:50   #2852 (permalink)
No Life Poster
 
Join Date: Feb 2012
Age: 37
Posts: 1,192
Member: 1724862
Status: Offline
Thanks Meter: 388
Redmi Note 3 (Kenzo) Edl Frp Remove One click With by Hydra

Redmi Note 3 (Kenzo) Edl Frp Remove One click With by Hydra



Quote:
Brand : XIAOMI Model : Redmi Note 3 (Kenzo) Storage : Auto
Loader: 009B00E100000000_57158eaf1814d78f_70636436_QUALCOM M_XIAOMI_peek_8976.fhprg
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM97)
SymbolicName :??USB#VID_05C6&PID_9008#5&332e0c4c&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 08/02/2017,2.1.2.7

Getting device info .. Ok
Device MODE : Firehose
Connecting to Firehose...
Ping .. Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8976
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 17
Serial Number : 148445718
Firmware Version : 4
Product Name : 016G32
Physical titions : 3
Total Logical Blocks:
Drive [0] 30777344 [14,676 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]

Protocol : Universal
Running : Ok

Phone Information .....
Brand : Xiaomi
Vendor : Xiaomi
Model : Redmi Note 3
ID : MMB29M
SDK : 23
Release : 6.0.1
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : kenzo-user 6.0.1 MMB29M V8.1.4.0.MHOMIDI release-keys
Miui Ver : V8
Device : kate
Mod_device : kenzo_global
Board : msm8952
Display ID : MMB29M
Security Patch : 2017-04-03
Platform : msm8952
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : Xiaomi/kenzo/kenzo:6.0.1/MMB29M/V8.1.4.0.MHOMIDI:user/release-keys

Reading GPT[3]
Drive [0] 48 Items
Drive [1] 0 Items
Drive [2] 0 Items

Removing FRPta...
Method :
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOk Ok

Elapsed Time : 00:00:04
  Reply With Quote
Old 12-27-2021, 09:51   #2853 (permalink)
No Life Poster
 
Join Date: Feb 2012
Age: 37
Posts: 1,192
Member: 1724862
Status: Offline
Thanks Meter: 388
Redmi Note 4X (Mido) Edl Frp Remove With by Hydra

Redmi Note 4X (Mido) Edl Frp Remove With by Hydra



Quote:
Brand : XIAOMI Model : Redmi Note 4X (Mido) Storage : Auto
Loader: 000460E100000000_57158eaf1814d78f_ffd16e82_QUALCOM M_XIAOMI_peek_8953.fhprg
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM10)
SymbolicName :??USB#VID_05C6&PID_9008#5&30124de0&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 08/10/2014,2.0.0.0

Getting device info .. . ...
Serial No.: 0x4CFF1932
HW_ID : 000460E100000000
MSM ID : 0x000460E1, MSM8953-Qualcomm Snapdragon 625
MODEL_ID : 0x0000
OEM_ID : 0x0000 - QUALCOMM
PBL Ver : 00000000
PK HASH : 57158eaf1814d78fd2b3105ece4db18a817a08ac664a5782a9 25f3ff8403d39a

Firehose Loader [000460E100000000_57158eaf1814d78f_ffd16e82_QUALCOM M_XIAOMI_peek_8953.fhprg]
--------------------------------------------------
Header Type : OLD
TargetMSM : 8953
Tag : _peek
Version : 3
Code_size : 288
Signature_size : 256
fhVendor : XIAOMI
HW_ID : 000460E100000000
Vendor : QUALCOMM
OEM_ID : 0000
MODEL_ID : 0000
SW_ID : 0000000100000003
APP_ID :
pk_hash : 57158eaf1814d78fd2b3105ece4db18a817a08ac664a5782a9 25f3ff8403d39a
OEM_VERSION : c3-bsp-builder-job004.bj
IMAGE_VARIANT : JAADANAZA
QC_VERSION : BOOT.BF.3.3-00228
--------------------------------------------------

SaharaBoot... Ok
Sending ...................b Okb0
Connecting to Firehose...
Ping ... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8953
Version : 1

Protocol : Universal
Running : Ok

Phone Information .....
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi Note 4
ID : NRD90M
SDK : 24
Release : 7.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : mido-user 7.0 NRD90M V11.0.2.0.NCFMIXM release-keys
Miui Ver : V11
Device : mido
Mod_device : mido_global
Board : msm8953
Display ID : AL1512-mido-build-20191107001817
Security Patch : 2018-12-01
Emmc_size : 16GB
Platform : msm8953
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : xiaomi/mido/mido:7.0/NRD90M/V11.0.2.0.NCFMIXM:user/release-keys

Reading GPT[1]
Drive [0] 52 Items

Removing FRPta...
Method : 0
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOk Ok

Elapsed Time : 00:00:06

  Reply With Quote
Old 12-27-2021, 09:56   #2854 (permalink)
No Life Poster
 
Join Date: Feb 2012
Age: 37
Posts: 1,192
Member: 1724862
Status: Offline
Thanks Meter: 388
Redmi 6A (cactus) Bootloader Unlock With by Hydra

Redmi 6A (cactus) Bootloader Unlock With by Hydra



Quote:
=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port (COM53)
Device : 5&2a6d7c22&0&1
SymbolicName :??USB#VID_0E8D&PID_0003#5&2a6d7c22&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 09/11/2014,3.0.1437.1

Opened handle..
Handshaking... Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0766 MT6765 [6765]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : E7
SBC : 01 (True)
SLA : 02 (True)
DAA : 04 (True)
SWJTAG : 06 (True)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 20 (True)
MEMWRITE : 40 (True)
CMD_C8 : 80 (True)

Exploiting Device...
Exploit Sent..
Successfully Exploited...
Handshaking... Ok

--- ENABLE AUTO PREL DUMP ----
Found
C:Hydra ToolBackupPreloader_dumpprel.tmp
------------------------------

Handshaking...

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0766 MT6765 [6765]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)

MEID : 250A0D69037E885D59A89865E545F563
Stage 1.. [Size:216440]
Sending : Please wait.. Accepted

Identifying Protocol...
Protocol : New
Synchronization... SYNC
Preloader Initialization...
sing prel.tmp
Init : Accepted
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 3388CEC88FD73725E2D76DC11B0C2
ERAM Size : 0x0000000000038000 -224 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29,121 GB
eMMC CID : 150100514436334D4201BD0EDC8E16DD - QD63MB
Executing : ACCEPTED...

Reading GPT -EMMC [0x00008000] 130 Items

Reading System Info
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi 6A
ID : O11019
SDK : 27
Release : 8.1.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-GB
Description : cactus-user 8.1.0 O11019 V10.2.6.0.OCBMIXM release-keys
Miui Ver : V10
Device : cactus
Mod_device : cactus_global
Display ID : O11019
Security Patch : 2019-01-01
Fingerprint : xiaomi/cactus/cactus:8.1.0/O11019/V10.2.6.0.OCBMIXM:user/release-keys
StorageType : mtp
Userdata State : Encrypted

Autobackup titions
-preloader [0x00000000] 512 KB -> preloader.bin...0 Ok
-> Renaming Preloader.... preloader_cactus.bin
Creating Scatter file... C:Hydra ToolBackupAuto0766_xiaomi_cactus_cactus_8.1.0_O110 19_V10.2.6.0.OCBMIXM_122521153837MT6765_Android_sc atter.txt
-pgpt [0x00000000] 32 KB -> pgpt.bin...0 Ok
-frp [0x05588000] 1024 KB -> frp.bin...0 Ok
-nvdata [0x07688000] 64 MB -> nvdata.bin...0 Ok
-protect1 [0x0D688000] 8 MB -> protect1.bin...0 Ok
-protect2 [0x0DE88000] 9,469 MB -> protect2.bin...0 Ok
-persist [0x0F000000] 64 MB -> persist.bin...0 Ok
-nvram [0x1BE80000] 64 MB -> nvram.bin...0 Ok
Done!!!
C:Hydra ToolBackupAuto0766_xiaomi_cactus_cactus_8.1.0_O110 19_V10.2.6.0.OCBMIXM_122521153837
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 1 3388CEC88FD73725E2D76DC11B0C2
ERAM Size : 1 0x0000000000038000 -224 KB
IRAM Size : 1 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29,121 GB
eMMC CID : 150100514436334D4201BD0EDC8E16DD - QD63MB

Reading GPT -EMMC [0x00008000] 130 Items


Reading System Info
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi 6A
ID : O11019
SDK : 27
Release : 8.1.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-GB
Description : cactus-user 8.1.0 O11019 V10.2.6.0.OCBMIXM release-keys
Miui Ver : V10
Device : cactus
Mod_device : cactus_global
Display ID : O11019
Security Patch : 2019-01-01
Fingerprint : xiaomi/cactus/cactus:8.1.0/O11019/V10.2.6.0.OCBMIXM:user/release-keys
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Unlock Bootloader
Processing...
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------

Verifying status after operation...
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------
Action Result : Ok

Elapsed Time : 00:00:47
  Reply With Quote
Old 12-27-2021, 10:11   #2855 (permalink)
No Life Poster
 
Join Date: Feb 2012
Age: 37
Posts: 1,192
Member: 1724862
Status: Offline
Thanks Meter: 388
Oppo F1s Plus Read Screen Security One Click With by Hydra

Oppo F1s Plus Read Screen Security One Click With by Hydra



Quote:
=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port_V1633 (COM7)
Device : 6&46fa1a1&0&6
SymbolicName :??USB#VID_0E8D&PID_0003#6&46fa1a1&0&6#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0

Opened handle..
Handshaking... Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0326 MT6750T [6755]
hw subcode : 8A00
hw version : CB00
sw version : 0001
Target config : 01
SBC : 01 (True)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)

Exploiting Device...
Exploit Sent..
Successfully Exploited...
Handshaking... Ok

--- ENABLE AUTO PREL DUMP ----
Found
C:Hydra ToolBackupPreloader_dumpprel.tmp
------------------------------

Handshaking...

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0326 MT6750T [6755]
hw subcode : 8A00
hw version : CB00
sw version : 0001
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)

MEID : 67A29FCD6CBD193FF5FC130BB301AD0C
Stage 1.. [Size:219288]
Sending : Please wait.. Accepted

Identifying Protocol...
Protocol : New
Synchronization... SYNC
Preloader Initialization...
sing prel.tmp
Init : Accepted
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : AB70FF7C42DC9A38A84DF843DBC50DBB
ERAM Size : 0x0000000000038000 -224 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 150100525831424D4207CCCBC2A1837D - RX1BMB
Executing : ACCEPTED...

Reading GPT -EMMC [0x00008000] 130 Items

Reading System Info
Brand : OPPO
Vendor : OPPO
Model : OPPO F1s
ID : LMY47I
SDK : 22
Release : 5.1
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Description : full_oppo6750_15131-user 5.1 LMY47I 1482847378 dev-keys
Device : F1S
Board : full_oppo6750_15131
Display ID : F1S_11_A.16_161227
Security Patch : 2016-09-05
Platform : mt6750
FRPPST : /dev/block/platform/mtk-msdc.0/by-name/frp
Fingerprint : OPPO/A59/A59:5.1/LMY47I/1474447292:user/release-keys
StorageType : mtp,mass_storage
Userdata State : Not Encrypted

Autobackup titions
-preloader [0x00000000] 512 KB -> preloader.bin...0 Ok
-> Renaming Preloader.... preloader_oppo6750_15131.bin
Creating Scatter file... C:Hydra ToolBackupAuto0326_OPPO_A59_A59_5.1_LMY47I_1474447 292_122721123502MT6750T_Android_scatter.txt
-pgpt [0x00000000] 32 KB -> pgpt.bin...0 Ok
-frp [0x03F88000] 1024 KB -> frp.bin...0 Ok
-nvdata [0x04088000] 32 MB -> nvdata.bin...0 Ok
-protect1 [0x08088000] 8 MB -> protect1.bin...0 Ok
-protect2 [0x08888000] 15.469 MB -> protect2.bin...0 Ok
-nvram [0x0CF00000] 5 MB -> nvram.bin...0 Ok
Done!!!
C:Hydra ToolBackupAuto0326_OPPO_A59_A59_5.1_LMY47I_1474447 292_122721123502
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 1 AB70FF7C42DC9A38A84DF843DBC50DBB
ERAM Size : 1 0x0000000000038000 -224 KB
IRAM Size : 1 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 150100525831424D4207CCCBC2A1837D - RX1BMB

Reading GPT -EMMC [0x00008000] 130 Items


Reading System Info
Brand : OPPO
Vendor : OPPO
Model : OPPO F1s
ID : LMY47I
SDK : 22
Release : 5.1
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Description : full_oppo6750_15131-user 5.1 LMY47I 1482847378 dev-keys
Device : F1S
Board : full_oppo6750_15131
Display ID : F1S_11_A.16_161227
Security Patch : 2016-09-05
Platform : mt6750
FRPPST : /dev/block/platform/mtk-msdc.0/by-name/frp
Fingerprint : OPPO/A59/A59:5.1/LMY47I/1474447292:user/release-keys
StorageType : mtp,mass_storage
Userdata State : Not Encrypted

-------------------------------------
Operation : Read Pattern
Processing...
Searching PatternKey : .0 Found
Gesture Data : 143D1A012D741BB8D8C05BC56F2D330DD4618F06
Bruteforcing pattern hash..Please wait for few seconds
Pattern Code : 98742
1 2 3
4 5 6
7 8 9
Action Result : Ok

Elapsed Time : 00:03:08
  Reply With Quote
Old 12-27-2021, 16:17   #2856 (permalink)
No Life Poster
 
sky73's Avatar
 
Join Date: Jan 2013
Location: gsmhosting
Age: 27
Posts: 1,142
Member: 1876736
Status: Offline
Thanks Meter: 731
xiaomi note 8 unlock bootloader 1 click with hydra


Code:
XiaomiSpecial_OneClickUBL
PreOperation Configuration 
 Brand : XIAOMI Model : Redmi Note 8 (ginkgo) Storage : Auto
 Loader: 0010A0E100720000_1bebe3863a6781db_76196dc8_XIAOMI.fhprg
 Port  : Auto

 Searching for Qualcomm 9008 Device...Found
 FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM5)
 SymbolicName :\??\USB#VID_05C6&PID_9008#5&15c311e1&0&9#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :08/02/2017,2.1.2.7

Getting device info......
Serial No.: 0x1BAADAC5
HW_ID     : 0010A0E100720000
MSM ID    : 0x0010A0E1, SM6125-Qualcomm Snapdragon 665
MODEL_ID  : 0x0000
OEM_ID    : 0x0072 - XIAOMI
PBL Ver   : 00000000
PK HASH   : 1bebe3863a6781db4b01086063007334de9e5ca14971c7c4f4358ec9d79cda46
 
Firehose Loader[0010A0E100720000_1bebe3863a6781db_76196dc8_XIAOMI.fhprg]
--------------------------------------------------
  Header Type    : New
  TargetMSM      : 
  Tag            : 
  Version        : 6
  Code_size      : 816
  Signature_size : 256
  fhVendor       : XIAOMI
  HW_ID          : 0010A0E100720000
  Vendor         : XIAOMI
  OEM_ID         : 0072
  MODEL_ID       : 0000
  SW_ID          : 00000003
  APP_ID         : 00000000
  pk_hash        : 1bebe3863a6781db4b01086063007334de9e5ca14971c7c4f4358ec9d79cda4692ce5e948c6fd409408f4c919fcadfe3
  OEM_VERSION    : cibuild
  IMAGE_VARIANT  : NicobarPkgLAA
  QC_VERSION     : BOOT.XF.4.0-00149-NICOBARLAZ-1
--------------------------------------------------

SaharaBoot... Ok
Sending ..............................Ok
Connecting to Firehose...
Ping..................... Ok 
Configuration.........
Identifying Chip....
Ok
Chip Configuration :
 MemoryName : eMMC
 MaxPayloadSizeToTargetInBytes : 16384
 MaxPayloadSizeToTargetInBytesSupported : 16384
 MaxPayloadSizeFromTargetInBytes : 
 MaxXMLSizeInBytes : 4096
 TargetName : 
 Version : 1
 DateTime : Jul  3 2019 - 22:23:56

*** STORAGE DEVICE INFO ***
Memory Type         : eMMC
Block Size in Bytes : 512
Page Size           : 512
Manufacturer ID     : 19
Serial Number       : 399840368
Firmware Version    : 4
Product Name        : S0J9K9
Physical Partitions : 4
Total Logical Blocks:
          Drive [0]  244285440[116.484 GB]
          Drive [1]  8192[4 MB]
          Drive [2]  8192[4 MB]
          Drive [3]  32768[16 MB]

Protocol : Universal
Running : Ok
Reading GPT[4]
          Drive [0] 88 Items
          Drive [1] 0 Items
          Drive [2] 0 Items
          Drive [3] 

 
Phone Information......
  Brand          : xiaomi
  Vendor         : Xiaomi
  Model          : Redmi Note 8
  ID             : PKQ1.190616.001
  SDK            : 28
  Release        : 9
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-GB
  Description    : ginkgo-user 9 PKQ1.190616.001 V11.0.12.0.PCOMIXM release-keys
  Miui Ver       : V11
  Device         : ginkgo
  Mod_device     : ginkgo_global
  Display ID     : PKQ1.190616.001
  Security Patch : 2020-11-01
  Fingerprint    : xiaomi/ginkgo/ginkgo:9/PKQ1.190616.001/V11.0.12.0.PCOMIXM:user/release-keys

Preparing Patching......
 - patching... [1]
 - patching... [2]
Action Result : Ok

Rebooting Phone.... Ok

Searching Device By Fastboot
Device Found...
Searching Device By Fastboot
Device Found...

Reading Information...getvar:version FAILED (remote: GetVar Variable Not found)
Product    : laurel_sprout
version    : getvar:version FAILED (remote: GetVar Variable Not found)
Secure     : yes
Device Info: 
    Verity mode: true
    Device unlocked: false
    Device critical unlocked: false
    Charger screen enabled: false
    OKAY [  0.001s]
    Finished. Total time: 0.001s
Searching Device By Fastboot
Device Found...
Searching Device By Fastboot
Device Found...

Reading Information...getvar:version FAILED (remote: GetVar Variable Not found)
Product    : laurel_sprout
version    : getvar:version FAILED (remote: GetVar Variable Not found)
Secure     : yes
Device Info: 
    Verity mode: true
    Device unlocked: true
    Device critical unlocked: true
    Charger screen enabled: false
    OKAY [  0.001s]
    Finished. Total time: 0.001s

Elapsed Time : 00:04:32
  Reply With Quote
Old 12-28-2021, 09:47   #2857 (permalink)
No Life Poster
 
Join Date: Feb 2012
Age: 37
Posts: 1,192
Member: 1724862
Status: Offline
Thanks Meter: 388
Redmi S2 (ysl) Edl Frp Remove With by Hydra

Redmi S2 (ysl) Edl Frp Remove With by Hydra



Quote:
Brand : XIAOMI Model : Redmi S2 (ysl) Storage : Auto
Loader: 000460E100000000_57158eaf1814d78f_ffd16e82_QUALCOM M_XIAOMI_peek_8953.fhprg
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM11)
SymbolicName :??USB#VID_05C6&PID_9008#6&61bf49f&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/10/2020,5.1.1.2

Getting device info .. Ok
Device MODE : Firehose
Connecting to Firehose...
Ping .. Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8953
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 1774578386
Firmware Version : 162
Product Name : HCG8a4
Physical titions : 3
Total Logical Blocks:
Drive [0] 122142720 [58.242 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]

Protocol : Universal
Running : Ok

Phone Information .....
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi S2
ID : PKQ1.181203.001
SDK : 28
Release : 9
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-GB
Description : ysl-user 9 PKQ1.181203.001 V12.0.2.0.PEFMIXM release-keys
Miui Ver : V12
Device : ysl
Mod_device : ysl_global
Display ID : PKQ1.181203.001
Security Patch : 2020-09-01
Emmc_size : 16GB
Fingerprint : xiaomi/ysl/ysl:9/PKQ1.181203.001/V12.0.2.0.PEFMIXM:user/release-keys

Reading GPT[3]
Drive [0] 60 Items
Drive [1] 0 Items
Drive [2] 0 Items

Removing FRPta...
Method :
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOk Ok

Elapsed Time : 00:00:04
  Reply With Quote
Old 12-28-2021, 09:53   #2858 (permalink)
No Life Poster
 
Join Date: Feb 2012
Age: 37
Posts: 1,192
Member: 1724862
Status: Offline
Thanks Meter: 388
Oppo A59st Read Screen Security done With by Hydra

Oppo A59st Read Screen Security done With by Hydra



Quote:
=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port (COM5)
Device : 6&e72cee4&0&2
SymbolicName :??USB#VID_0E8D&PID_0003#6&e72cee4&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0

Opened handle..

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 6BA1353CCD30BCCC62CCBC3FF2B686C6
ERAM Size : 0x0000000000038000 -224 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 90014A484247346132A4024524DFB349 - HBG4a2

Reading GPT -EMMC [0x00008000] 130 Items


Reading System Info
Brand : OPPO
Vendor : OPPO
Model : A1601
ID : LMY47I
SDK : 22
Release : 5.1
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Description : full_oppo6750_15331-user 5.1 LMY47I 1473107983 release-keys
Device : A1601
Board : full_oppo6750_15131
Display ID : A1601EX_11_A.20_170715
Security Patch : 2016-08-05
Platform : mt6750
FRPPST : /dev/block/platform/mtk-msdc.0/by-name/frp
StorageType : mtp,mass_storage
Userdata State : Not Encrypted

-------------------------------------
Operation : Read Pattern
Processing...
Searching PatternKey : .0 Found
Gesture Data : C4303A8C6C7C3CE77D406F3823E3055CD0B1609E
Bruteforcing pattern hash..Please wait for few seconds
Pattern Code : 159637
1 2 3
4 5 6
7 8 9
Action Result : Ok

Elapsed Time : 00:00:03
  Reply With Quote
Old 12-28-2021, 09:58   #2859 (permalink)
No Life Poster
 
Join Date: Feb 2012
Age: 37
Posts: 1,192
Member: 1724862
Status: Offline
Thanks Meter: 388
SM-A107M (A10s) Bootloader Unlock With by Hydra

SM-A107M (A10s) Bootloader Unlock With by Hydra



Quote:
=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port (COM8)
Device : 6&e7c094f&0&1
SymbolicName :??USB#VID_0E8D&PID_0003#6&e7c094f&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2016,3.2

Opened handle..

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 9F567576C7001C5B3804069AAEADC7DF
ERAM Size : 0x0000000000038000 -224 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29,121 GB
eMMC CID : 150100515836334D42009936CCBF5761 - QX63MB

Reading GPT -EMMC [0x00008000] 56 Items


-------------------------------------
Operation : Unlock Bootloader
Processing...
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------

Verifying status after operation...
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------
Action Result : Ok

Elapsed Time : 00:00:07

  Reply With Quote
Old 12-28-2021, 14:34   #2860 (permalink)
No Life Poster
 
sky73's Avatar
 
Join Date: Jan 2013
Location: gsmhosting
Age: 27
Posts: 1,142
Member: 1876736
Status: Offline
Thanks Meter: 731
spd gfive hard reset on diag mode

Code:
Port : [Auto] Scanning...COM4
Opening Port...(COM4)Ok
------------------------------------------
Factory Reset/Format Userdata...
------------------------------------------
Executing... Factory Reset
Action Result..Ok

Elapsed Time : 00:00:01
  Reply With Quote
Old 12-29-2021, 08:59   #2861 (permalink)
No Life Poster
 
Join Date: Feb 2012
Age: 37
Posts: 1,192
Member: 1724862
Status: Offline
Thanks Meter: 388
SM-A315G (A31) Bootloader Unlock One Click With by Hydra

SM-A315G (A31) Bootloader Unlock One Click With by Hydra



Quote:
=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port (COM16)
Device : 5&f6c7377&0&4
SymbolicName :??USB#VID_0E8D&PID_0003#5&f6c7377&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2016,3.2

Opened handle..

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : AFEE99F993D149951E2303C2EAD98C32
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000001D1F000000 -116.484 GB
eMMC CID : 150100335636434D4200B863CE0C4807 - 3V6CMB

Reading GPT -EMMC [0x00008000] 59 Items


-------------------------------------
Operation : Unlock Bootloader
Processing...
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------

Verifying status after operation...
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------
Action Result : Ok

Elapsed Time : 00:00:03
  Reply With Quote
Old 12-29-2021, 09:05   #2862 (permalink)
No Life Poster
 
Join Date: Feb 2012
Age: 37
Posts: 1,192
Member: 1724862
Status: Offline
Thanks Meter: 388
Redmi Note 8 (ginkgo) Edl Format Userdata & Frp Remove With by Hydra

Redmi Note 8 (ginkgo) Edl Format Userdata & Frp Remove With by Hydra



Quote:
Brand : XIAOMI Model : Redmi Note 8 (ginkgo) Storage : Auto
Loader: 0010A0E100720000_1bebe3863a6781db_76196dc8_XIAOMI. fhprg
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM31)
SymbolicName :??USB#VID_05C6&PID_9008#6&1e1ef7e6&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 08/02/2017,2.1.2.7

Getting device info .. Ok
Device MODE : Firehose
Connecting to Firehose...
Ping ..................... Ok
Configuration.........
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Jul 3 2019 - 22:23:56

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 147888207
Firmware Version : 925904944
Product Name : hDEaP3
Physical titions : 4
Total Logical Blocks:
Drive [0] 244285440 [116.484 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]
Drive [3] 32768 [16 MB]

Protocol : Universal
Running : Ok

Phone Information ......
Vendor : Xiaomi
ID : RKQ1.201004.002
SDK : 30
Release : 11
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Miui Ver : V12
Mod_device : ginkgo_in_global
Security Patch : 2021-10-01

Reading GPT[4]
Drive [0] 88 Items
Drive [1] 0 Items
Drive [2] 0 Items
Drive [3]

Formatting Userdata...
Method :
Auto
Processing...
- Formatting Userdata
Executing ...
- Formatting Userdata [Safe Format - eMMc] OkOk Ok

Rebooting Phone.... Ok
If not rebooted, Please Power on Manually

Elapsed Time : 00:00:03
  Reply With Quote
Old 12-29-2021, 09:16   #2863 (permalink)
No Life Poster
 
Join Date: Feb 2012
Age: 37
Posts: 1,192
Member: 1724862
Status: Offline
Thanks Meter: 388
Realme 7 (RMX2151) Remove Realme ID One Clıck With by Hydra

Realme 7 (RMX2151) Remove Realme ID One Clıck With by Hydra



Quote:
=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port (COM1)
Device : 5&7cbc383&0&1
SymbolicName :??USB#VID_0E8D&PID_0003#5&7cbc383&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 08/03/2016,3.0.1504.0

Opened handle..
Handshaking... Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0813 MT6785 [6785]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : E5
SBC : 01 (True)
SLA : 00 (False)
DAA : 04 (True)
SWJTAG : 04 (True)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 20 (True)
MEMWRITE : 40 (True)
CMD_C8 : 80 (True)

Exploiting Device...
Exploit Sent..
Successfully Exploited...
Handshaking... Ok

--- ENABLE AUTO PREL DUMP ----
Found
C:UsersambroDownloadsHydraTool_Fullpackage_07-17-21BackupPreloader_dumpprel.tmp
------------------------------

Handshaking...

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0813 MT6785 [6785]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)

MEID : 956EF97C2E448984F6B27E17C72264C4
Stage 1.. [Size:234968]
Sending : Please wait.. Accepted

Identifying Protocol...
Protocol : New
Synchronization... SYNC
Preloader Initialization...
sing prel.tmp
Init : Accepted
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 6CC81729A0C7F68A7563553B68E17326
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x0000000180000000 -6 GB
UFS LU0 Size: 0x0000000000400000 -4 MB
UFS LU1 Size: 0x0000000000400000 -4 MB
UFS LU2 Size: 0x0000000EE5800000 -59.586 GB
UFS CID : -'01H9HQ53AECMMDAR
UFS UNIQID : 0db9228e8c07000000000000
Executing : ACCEPTED...

Reading GPT0 -UFS [0x00008000] 0 130 Items
0
Autobackup titions
-preloader [0x00000000] 512 KB -> preloader.bin... Ok0
-> Renaming Preloader.... preloader_oppo6785.bin0
Creating Scatter file... C:UsersambroDownloadsHydraTool_Fullpackage_07-17-21BackupAuto0813__122821191922MT6785_Android_scatt er.txt
-pgpt [0x00000000] 32 KB -> pgpt.bin... Ok
-frp [0x0BE08000] 1024 KB -> frp.bin... Ok
-nvdata [0x0F708000] 64 MB -> nvdata.bin... Ok
-persist [0x16DA2000] 50.367 MB -> persist.bin... Ok
-protect1 [0x1A000000] 8 MB -> protect1.bin... Ok
-protect2 [0x1A800000] 8 MB -> protect2.bin... Ok
-nvram [0x1ED00000] 64 MB -> nvram.bin... Ok
Done!!!0
C:UsersambroDownloadsHydraTool_Fullpackage_07-17-21BackupAuto0813__122821191922
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 1 6CC81729A0C7F68A7563553B68E17326
ERAM Size : 1 0x0000000000080000 -512 KB
IRAM Size : 1 0x0000000180000000 -6 GB
UFS LU0 Size: 0x0000000000400000 -4 MB
UFS LU1 Size: 0x0000000000400000 -4 MB
UFS LU2 Size: 0x0000000EE5800000 -59.586 GB
UFS CID : -'01H9HQ53AECMMDAR
UFS UNIQID : 0db9228e8c07000000000000

Reading GPT0 -UFS [0x00008000] 0 130 Items


-------------------------------------
Operation : Remove Oppo/Realme ID
Processing...
ACK : 0xFFFF0000[]
Done
Action Result : 0 Ok

Elapsed Time : 00:00:40

  Reply With Quote
Old 12-30-2021, 08:32   #2864 (permalink)
No Life Poster
 
Join Date: Feb 2012
Age: 37
Posts: 1,192
Member: 1724862
Status: Offline
Thanks Meter: 388
Redmi 4A (Rolex) Edl Frp Remove done by Hydra

Redmi 4A (Rolex) Edl Frp Remove done by Hydra



Quote:
Brand : XIAOMI Model : Redmi 4A (Rolex) Storage : Auto
Loader: 000560E100000000_57158eaf1814d78f_2f7bab6c_QUALCOM M_XIAOMI_peek_8917.fhprg
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM5)
SymbolicName :??USB#VID_05C6&PID_9008#6&2953c98d&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 08/02/2017,2.1.2.7

Getting device info .. Ok
Device MODE : Firehose
Connecting to Firehose...
Ping .. Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8917
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 841684202
Firmware Version : 165
Product Name : HAG4a2
Physical titions : 3
Total Logical Blocks:
Drive [0] 30777344 [14,676 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]

Protocol : Universal
Running : Ok

Phone Information .....
Brand : Xiaomi
Vendor : Xiaomi
Model : Redmi 4A
ID : N2G47H
SDK : 25
Release : 7.1.2
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : rolex-user 7.1.2 N2G47H V10.2.3.0.NCCMIXM release-keys
Miui Ver : V10
Device : rolex
Mod_device : rolex_global
Board : QC_Reference_Phone
Display ID : N2G47H
Security Patch : 2018-07-01
Emmc_size : 16GB
Platform : msm8937
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : Xiaomi/rolex/rolex:7.1.2/N2G47H/V10.2.3.0.NCCMIXM:user/release-keys

Reading GPT[3]
Drive [0] 52 Items
Drive [1] 0 Items
Drive [2] 0 Items

Removing FRPta...
Method :
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOk Ok

Rebooting Phone.... Ok
If not rebooted, Please Power on Manually

Elapsed Time : 00:00:04
  Reply With Quote
Old 12-30-2021, 08:38   #2865 (permalink)
No Life Poster
 
Join Date: Feb 2012
Age: 37
Posts: 1,192
Member: 1724862
Status: Offline
Thanks Meter: 388
MED-LX9 (Y6P 2020) Remove Huawei Account done by Hydra

MED-LX9 (Y6P 2020) Remove Huawei Account done by Hydra



Quote:
=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port_V1632 (COM17)
Device : 6&1485bec3&0&3
SymbolicName :??USB#VID_0E8D&PID_0003#6&1485bec3&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0

Opened handle..

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 1Fxu7L83m1qDUM84fvsrQN3iwEjaxeRLEy
ERAM Size : 0x0000000000038000 -224 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 90014A684339615033010043E96E7721 - hC9aP3

Reading GPT -EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Remove Account
Processing...
Backing up tition for safety...
-oeminfo_123021121132.bin [0x04900000] 32 MB -> oeminfo_123021121132.bin...0 Ok
Action Result : Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:08
  Reply With Quote
Reply

Bookmarks

Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


 



All times are GMT +1. The time now is 17:50.



Powered by Searchlight © 2022 Axivo Inc.
vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2022 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2017 -
Page generated in 0.37363 seconds with 8 queries

SEO by vBSEO