GSM Shop GSM Shop
GSM-Forum  

Welcome to the GSM-Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features.
Only registered members may post questions, contact other members or search our database of over 8 million posts.

Registration is fast, simple and absolutely free so please - Click to REGISTER!

If you have any problems with the registration process or your account login, please contact contact us .

Go Back   GSM-Forum > Product Support Sections > Special Solutions / Services / WebShop > GSMFABRICA Products > HYDRA TOOL

Reply
 
LinkBack Thread Tools Display Modes
Old 01-21-2022, 10:03   #2911 (permalink)
No Life Poster
 
Join Date: Feb 2012
Age: 37
Posts: 1,184
Member: 1724862
Status: Offline
Thanks Meter: 374
Redmi Note 5 Pro (whyred) Edl Frp Remove Done by Hydra


Redmi Note 5 Pro (whyred) Edl Frp Remove Done by Hydra



Quote:
Brand : XIAOMI Model : Redmi Note 5 Pro (Whyred) New V2 Storage : Auto
Loader: 0008C0E100010000_a7b8b82545a98eca_384d4649_GENERIC _XIAOMI_auth.fhprg
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM18)
SymbolicName :??USB#VID_05C6&PID_9008#7&3cd3280&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 02/05/2018,3.0.0.0

Getting device info .. Ok
Device MODE : Firehose
Connecting to Firehose...
Ping ....... Ok
Configuration.......................
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 8192
MaxPayloadSizeToTargetInBytesSupported : 8192
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : MSM8996
Version : 1
DateTime : Feb 10 2020 - 19:28:52

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 3366611514
Firmware Version : 5
Product Name : DH6DMB
Physical titions : 4
Total Logical Blocks:
Drive [0] 122142720 [58.242 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]
Drive [3] 8192 [4 MB]

Protocol : Universal
Running : Ok

Phone Information .....
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi Note 5
ID : PKQ1.180904.001
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : whyred-user 9 PKQ1.180904.001 V11.0.3.0.PEIMIXM release-keys
Miui Ver : V11
Device : whyred
Mod_device : whyred_global
Display ID : PKQ1.180904.001
Security Patch : 2019-11-05
Fingerprint : xiaomi/whyred/whyred:9/PKQ1.180904.001/V11.0.3.0.PEIMIXM:user/release-keys

Reading GPT[4]
Drive [0] 64 Items
Drive [1] 0 Items
Drive [2] 0 Items
Drive [3]

Removing FRPta...
Method :
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOk Ok

Elapsed Time : 00:00:03
  Reply With Quote
Old 01-22-2022, 09:57   #2912 (permalink)
No Life Poster
 
Join Date: Feb 2012
Age: 37
Posts: 1,184
Member: 1724862
Status: Offline
Thanks Meter: 374
Vivo Y91 (V1818C) Edl Frp Remove done by Hydra

Vivo Y91 (V1818C) Edl Frp Remove done by Hydra




Quote:
Brand : 4 VIVO Model : 4 Y91 (V1818C) Storage : 4 Auto
Loader: 4 000BF0E100000000_60ba997fef6da9f0_aa167c34_QUALCOM M_VIVO_wut_peek_8937.fhprg
Port : 4 Auto

Searching for Qualcomm 9008 Device...4 Found
FriendlyName :4 Qualcomm HS-USB QDLoader 9008 (COM13)
SymbolicName :4??USB#VID_05C6&PID_9008#5&2d1c7c16&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :4 03/25/2016,2.1.2.2

Getting device info6 ..4 Ok3
Device MODE : Firehose4
Connecting to Firehose...2
Ping ..4 Ok
Configuration......7
Identifying Chip....
4 Ok8
Chip Configuration :4
MemoryName : 3 eMMC4
MaxPayloadSizeToTargetInBytes : 3 10485764
MaxPayloadSizeToTargetInBytesSupported : 3 10485764
MaxPayloadSizeFromTargetInBytes : 3 40964
MaxXMLSizeInBytes : 3 40964
TargetName : 3 89374
Version : 3 1

*** STORAGE DEVICE INFO ***
Memory Type : 3 eMMC
Block Size in Bytes : 3 512
Page Size : 3 512
Manufacturer ID : 3 21
Serial Number : 3 3125872586
Firmware Version : 3 7
Product Name : 3 RD64MB
Physical titions : 3 3
Total Logical Blocks:7
Drive [0] 3 61071360 [29.121 GB]7
Drive [1] 3 8192 [4 MB]7
Drive [2] 3 8192 [4 MB]

Protocol : 3 Universal
Running : Ok4

Phone Information7 .....
Brand : 2 vivo
Vendor : 2 vivo
Model : 2 vivo 1807
ID : 2 OPM1.171019.026
SDK : 2 27
Release : 2 8.1.0
ABI : 2 arm64-v8a
CPU abilist : 2 arm64-v8a,armeabi-v7a,armeabi
Locale : 2 en-US
Description : 2 msm8937_64-user 8.1.0 OPM1.171019.026 eng.compil.20210222.204719 release-keys
Device : 2 msm8937_64
Display ID : 2 OPM1.171019.026 release-keys
Security Patch : 2 2021-02-01
Emmc_size : 2 16GB
Platform : 2 =SDM439
Fingerprint : 2 vivo/1807/1807:8.1.0/OPM1.171019.026/compil02222047:user/release-keys

Reading GPT[3]7
Drive [0] 3 60 Items7
Drive [1] 3 0 Items7
Drive [2] 3 0 Items
4
Removing FRPta...
Method : 9
Auto 5
Processing... 3
- Removing FRP4
Executing ...3
- Removing FRP7 [Zero Wipe] 0 **WARNING Unauthorized tag '' 1 <?xml version="1.0" encoding="UTF-8" ?><data><response value="NAK" /></data>Failed3
- Removing FRP7 [Erase Safety Tag] 4 OkOk3 Ok
3
Elapsed Time : 00:00:05
  Reply With Quote
Old 01-22-2022, 10:08   #2913 (permalink)
No Life Poster
 
Join Date: Feb 2012
Age: 37
Posts: 1,184
Member: 1724862
Status: Offline
Thanks Meter: 374
Oppo A54 (CPH2236) Unlock Bootloader Done by Hydra

Oppo A54 (CPH2236) Unlock Bootloader Done by Hydra



Quote:
=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port_V1632 (COM5)
Device : 5&d975007&0&2
SymbolicName :??USB#VID_0E8D&PID_0003#5&d975007&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0

Opened handle..
Handshaking... Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0766 MT6765 [6765]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : E5
SBC : 01 (True)
SLA : 00 (False)
DAA : 04 (True)
SWJTAG : 04 (True)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 20 (True)
MEMWRITE : 40 (True)
CMD_C8 : 80 (True)

Exploiting Device...
Exploit Sent..
Successfully Exploited...
Handshaking... Ok

--- ENABLE AUTO PREL DUMP ----
Found
C:Hydra ToolBackupPreloader_dumpprel.tmp
------------------------------

Handshaking...

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0766 MT6765 [6765]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)

MEID : 4C28DDBEC03E7C05E26B13897C49C6CF
Stage 1.. [Size:216440]
Sending : Please wait.. Accepted

Identifying Protocol...
Protocol : New
Synchronization... SYNC
Preloader Initialization...
sing prel.tmp
Init : Accepted
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : BE797BE323550357F918A4C1EF8887BE
ERAM Size : 0x0000000000038000 -224 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000001D1F000000 -116.484 GB
eMMC CID : 13014E47314A395339100F09D2E228A5 - G1J9S9
Executing : ACCEPTED...

Reading GPT -EMMC [0x00008000] 130 Items

Autobackup titions
-preloader [0x00000000] 512 KB -> preloader.bin...0 Ok
-> Renaming Preloader.... preloader_oppo6765.bin
Creating Scatter file... C:Hydra ToolBackupAuto0766__012222082019MT6765_Android_sca tter.txt
-pgpt [0x00000000] 32 KB -> pgpt.bin...0 Ok
-frp [0x15088000] 1024 KB -> frp.bin...0 Ok
-nvdata [0x17188000] 64 MB -> nvdata.bin...0 Ok
-protect1 [0x1E822000] 8 MB -> protect1.bin...0 Ok
-protect2 [0x1F022000] 15.867 MB -> protect2.bin...0 Ok
-persist [0x20800000] 48 MB -> persist.bin...0 Ok
-nvram [0x2C600000] 64 MB -> nvram.bin...0 Ok
Done!!!
C:Hydra ToolBackupAuto0766__012222082019
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 1 BE797BE323550357F918A4C1EF8887BE
ERAM Size : 1 0x0000000000038000 -224 KB
IRAM Size : 1 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000001D1F000000 -116.484 GB
eMMC CID : 13014E47314A395339100F09D2E228A5 - G1J9S9

Reading GPT -EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Unlock Bootloader
Processing...
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------

Verifying status after operation...
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------
Action Result : Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:01:29
  Reply With Quote
Old 01-22-2022, 10:13   #2914 (permalink)
No Life Poster
 
Join Date: Feb 2012
Age: 37
Posts: 1,184
Member: 1724862
Status: Offline
Thanks Meter: 374
Vivo Y53 Factory Reset One Click Without Recovery Security With by Hydra

Vivo Y53 Factory Reset One Click Without Recovery Security With by Hydra




Quote:
Brand : VIVO Model : Y53 Storage : Auto
Loader: 000560E100000000_60ba997fef6da9f0_203cb924_QUALCOM M_VIVO_peek_8917.fhprg
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM14)
SymbolicName :??USB#VID_05C6&PID_9008#6&36ddd81c&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 08/02/2017,2.1.2.7

Getting device info .. . ...
Serial No.: 0xA64CC040
HW_ID : 000560E100000000
MSM ID : 0x000560E1, MSM8917-Qualcomm Snapdragon 425
MODEL_ID : 0x0000
OEM_ID : 0x0000 - QUALCOMM
PBL Ver : 00000000
PK HASH : 60ba997fef6da9f05885fa11f1dd6d2a90d052a257a09c2075 d7246cc73c0d43

Firehose Loader [000560E100000000_60ba997fef6da9f0_203cb924_QUALCOM M_VIVO_peek_8917.fhprg]
--------------------------------------------------
Header Type : OLD
TargetMSM : 8917
Tag : _peek
Version : 3
Code_size : 288
Signature_size : 256
fhVendor : VIVO
HW_ID : 000560E100000000
Vendor : QUALCOMM
OEM_ID : 0000
MODEL_ID : 0000
SW_ID : 0000000000000003
APP_ID :
pk_hash : 60ba997fef6da9f05885fa11f1dd6d2a90d052a257a09c2075 d7246cc73c0d43
OEM_VERSION : compiler026
IMAGE_VARIANT : LAADANAZA
QC_VERSION : BOOT.BF.3.3-00199
--------------------------------------------------

SaharaBoot... Ok
Sending .................b Okb0
Connecting to Firehose...
Ping ... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8917
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 2198987974
Firmware Version : 13
Product Name : QE13MB
Physical titions : 3
Total Logical Blocks:
Drive [0] 30535680 [14.561 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]

Protocol : Universal
Running : Ok

Phone Information .....
Brand : vivo
Vendor : vivo
Model : vivo PD1628F_EX
ID : MMB29M
SDK : 23
Release : 6.0.1
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-US
Description : msm8937_32-user 6.0.1 MMB29M eng.compiler.20200118.112618 release-keys
Device : PD1628F_EX
Board : QC_Reference_Phone
Display ID : MMB29M release-keys
Security Patch : 2018-08-01
Emmc_size : 16GB
Platform : msm8937
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : vivo/PD1628F_EX/PD1628F_EX:6.0.1/MMB29M/compiler01181129:user/release-keys

Reading GPT[3]
Drive [0] 52 Items
Drive [1] 0 Items
Drive [2] 0 Items

Formatting Userdata...
Method : 0
Auto
Processing...
- Formatting Userdata
Executing ...
- Formatting Userdata [Safe Format - eMMc] OkOk Ok

Rebooting Phone.... Ok
If not rebooted, Please Power on Manually

Elapsed Time : 00:00:09
  Reply With Quote
Old 01-24-2022, 10:05   #2915 (permalink)
No Life Poster
 
Join Date: Feb 2012
Age: 37
Posts: 1,184
Member: 1724862
Status: Offline
Thanks Meter: 374
Redmi 5A (riva) Edl Frp Remove One Click done With by Hydra

Redmi 5A (riva) Edl Frp Remove One Click done With by Hydra



Quote:
Brand : XIAOMI Model : Redmi 5A (riva) Storage : Auto
Loader: 000560E100000000_57158eaf1814d78f_2f7bab6c_QUALCOM M_XIAOMI_peek_8917.fhprg
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM10)
SymbolicName :??USB#VID_05C6&PID_9008#6&1dfc3d21&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 08/31/2015,2.1.2.0

Getting device info .. . ...
Serial No.: 0x467428E6
HW_ID : 000560E100000000
MSM ID : 0x000560E1, MSM8917-Qualcomm Snapdragon 425
MODEL_ID : 0x0000
OEM_ID : 0x0000 - QUALCOMM
PBL Ver : 00000000
PK HASH : 57158eaf1814d78fd2b3105ece4db18a817a08ac664a5782a9 25f3ff8403d39a

Firehose Loader [000560E100000000_57158eaf1814d78f_2f7bab6c_QUALCOM M_XIAOMI_peek_8917.fhprg]
--------------------------------------------------
Header Type : OLD
TargetMSM : 8917
Tag : _peek
Version : 3
Code_size : 288
Signature_size : 256
fhVendor : XIAOMI
HW_ID : 000560E100000000
Vendor : QUALCOMM
OEM_ID : 0000
MODEL_ID : 0000
SW_ID : 0000000000000003
APP_ID :
pk_hash : 57158eaf1814d78fd2b3105ece4db18a817a08ac664a5782a9 25f3ff8403d39a
OEM_VERSION : modem-ci
IMAGE_VARIANT : LAADANAZA
QC_VERSION : BOOT.BF.3.3-68959
--------------------------------------------------

SaharaBoot... Ok
Sending ...................b Okb0
Connecting to Firehose...
Ping ... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8917
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 526046043
Firmware Version : 3
Product Name : QE63MB
Physical titions : 3
Total Logical Blocks:
Drive [0] 30535680 [14.561 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]

Protocol : Universal
Running : Ok

Phone Information .....
Brand : Xiaomi
Vendor : Xiaomi
Model : Redmi 5A
ID : OPM1.171019.026
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : riva-user 8.1.0 OPM1.171019.026 V11.0.2.0.OCKMIXM release-keys
Miui Ver : V11
Device : riva
Mod_device : riva_global
Board : QC_Reference_Phone
Display ID : CUSTOMER_VERSION_riva
Security Patch : 2019-10-01
Emmc_size : 16GB
Platform : msm8937
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : Xiaomi/riva/riva:8.1.0/OPM1.171019.026/V11.0.2.0.OCKMIXM:user/release-keys

Reading GPT[3]
Drive [0] 52 Items
Drive [1] 0 Items
Drive [2] 0 Items

Removing FRPta...
Method : 0
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOk Ok

Rebooting Phone.... Ok
If not rebooted, Please Power on Manually

Elapsed Time : 00:00:11
  Reply With Quote
Old 01-24-2022, 10:10   #2916 (permalink)
No Life Poster
 
Join Date: Feb 2012
Age: 37
Posts: 1,184
Member: 1724862
Status: Offline
Thanks Meter: 374
Oppo A51 Edl Format Userdata Without Recovery Password One Click With by Hydra

Oppo A51 Edl Format Userdata Without Recovery Password One Click With by Hydra



Quote:
Brand : OPPO Model : A51 Storage : Auto
Loader: 007050E100000000_99c8c13e374c34d8_959439aa_QUALCOM M_LENOVO_peek_8916.fhprg
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM61)
SymbolicName :??USB#VID_05C6&PID_9008#5&322e3717&2&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 09/10/2015,2.1.2.0

Getting device info . . ...
Serial No.: 0x1382E026
HW_ID : 007050E100000000
MSM ID : 0x007050E1, MSM8916-Qualcomm Snapdragon 410
MODEL_ID : 0x0000
OEM_ID : 0x0000 - QUALCOMM
PBL Ver : 00000000
PK HASH : cc3153a80293939b90d02d3bf8b23e0292e452fef662c74998 421adad42a380f

Firehose Loader [007050E100000000_99c8c13e374c34d8_959439aa_QUALCOM M_LENOVO_peek_8916.fhprg]
--------------------------------------------------
Header Type : OLD
TargetMSM : 8916
Tag : _peek
Version : 3
Code_size : 96
Signature_size : 256
fhVendor : LENOVO
HW_ID : 007050E100000000
Vendor : QUALCOMM
OEM_ID : 0000
MODEL_ID : 0000
SW_ID : 0000000000000003
APP_ID :
pk_hash : 99c8c13e374c34d8f9afb065ea4c733e6b1b21cbc5a78705f0 41eb24acdd5fe5
OEM_VERSION :
IMAGE_VARIANT :
QC_VERSION :
--------------------------------------------------

SaharaBoot... Ok
Sending .....b Okb0
Connecting to Firehose...
Ping ... Ok
Configuration.......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8916
Version : 1


Protocol : Universal
Running : Ok

Phone Information .....
Brand : OPPO
Vendor : OPPO
Model : A51f
ID : LMY47V
SDK : 22
Release : 5.1.1
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Description : msm8916_32-user 5.1.1 LMY47V eng.root.20160815 dev-keys
Device : A51
Board : msm8916
Display ID : Mirror5EX_11_160815
Platform : msm8916
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : OPPO/A51f/A51:5.1.1/LMY47V/1433469600:user/release-keys

Reading GPT[3]
Drive [0] 40 Items
Drive [1] 0 Items
Drive [2] 4 Items

Formatting Userdata...
Method : 0
Auto
Processing...
- Formatting Userdata
Executing ...
- Formatting Userdata [Safe Format - eMMc] OkOk Ok

Elapsed Time : 00:00:22
  Reply With Quote
Old 01-24-2022, 10:26   #2917 (permalink)
No Life Poster
 
Join Date: Feb 2012
Age: 37
Posts: 1,184
Member: 1724862
Status: Offline
Thanks Meter: 374
Redmi 10X 4G/Redmi Note 9 (merlin) Bootloader Unlock One Click done With by Hydra

Redmi 10X 4G/Redmi Note 9 (merlin) Bootloader Unlock One Click done With by Hydra



Quote:
=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port_V1632 (COM23)
Device : 6&114be0&0&1
SymbolicName :??USB#VID_0E8D&PID_0003#6&114be0&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0

Opened handle..

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : FC3C10291397DF826B4809302EC18E93
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000001D1EC00000 -116.48 GB
eMMC CID : 150100335636434D4202A2C290B627A7 - 3V6CMB

Reading GPT -EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Unlock Bootloader
Processing...
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------

Verifying status after operation...
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------
Action Result : Ok

Elapsed Time : 00:00:04
  Reply With Quote
Old 01-25-2022, 08:58   #2918 (permalink)
No Life Poster
 
Join Date: Feb 2012
Age: 37
Posts: 1,184
Member: 1724862
Status: Offline
Thanks Meter: 374
Redmi 9 (lancelot) Bootloader Unlock One Click With by Hydra

Redmi 9 (lancelot) Bootloader Unlock One Click With by Hydra



Quote:
=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port (COM31)
Device : 5&356b5377&0&9
SymbolicName :??USB#VID_0E8D&PID_0003#5&356b5377&0&9#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0

Opened handle..
Handshaking... Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0707 MT6768 [6768]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : E7
SBC : 01 (True)
SLA : 02 (True)
DAA : 04 (True)
SWJTAG : 06 (True)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 20 (True)
MEMWRITE : 40 (True)
CMD_C8 : 80 (True)

Exploiting Device...
Exploit Sent..
Successfully Exploited...
Handshaking... Ok

--- ENABLE AUTO PREL DUMP ----
Found
C:Hydra ToolBackupPreloader_dumpprel.tmp
------------------------------

Handshaking...

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0707 MT6768 [6768]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)

MEID : 052BFB898FF9CDDFD1CE6A5D10E274B9
Stage 1.. [Size:256504]
Sending : Please wait.. Accepted

Identifying Protocol...
Protocol : New
Synchronization... SYNC
Preloader Initialization...
sing prel.tmp
Init : Accepted
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : F6B67A3E0064B49D5E8DE2832771277F
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 15010044503644414203CA37CE057721 - DP6DAB
Executing : ACCEPTED...

Reading GPT -EMMC [0x00008000] 130 Items

Autobackup titions
-preloader [0x00000000] 512 KB -> preloader.bin...0 Ok
-> Renaming Preloader.... preloader_lancelot.bin
Creating Scatter file... C:Hydra ToolBackupAuto0707__012522103004MT6768_Android_sca tter.txt
-pgpt [0x00000000] 32 KB -> pgpt.bin...0 Ok
-frp [0x05508000] 1024 KB -> frp.bin...0 Ok
-nvdata [0x0C4A2000] 64 MB -> nvdata.bin...0 Ok
-persist [0x104A2000] 48 MB -> persist.bin...0 Ok
-protect1 [0x164A2000] 8 MB -> protect1.bin...0 Ok
-protect2 [0x16CA2000] 11.367 MB -> protect2.bin...0 Ok
-nvram [0x19F80000] 64 MB -> nvram.bin...0 Ok
Done!!!
C:Hydra ToolBackupAuto0707__012522103004
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 1 F6B67A3E0064B49D5E8DE2832771277F
ERAM Size : 1 0x0000000000070000 -448 KB
IRAM Size : 1 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 15010044503644414203CA37CE057721 - DP6DAB

Reading GPT -EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Unlock Bootloader
Processing...
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------

Verifying status after operation...
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------
Action Result : Ok

Elapsed Time : 00:00:46
  Reply With Quote
Old 01-25-2022, 09:07   #2919 (permalink)
No Life Poster
 
Join Date: Feb 2012
Age: 37
Posts: 1,184
Member: 1724862
Status: Offline
Thanks Meter: 374
Redmi Note 7 (lavender) Edl Frp Remove One Click With by Hydra

Redmi Note 7 (lavender) Edl Frp Remove One Click With by Hydra



Quote:
Brand : XIAOMI Model : Redmi Note 7 (lavender) Micron Storage : Auto
Loader: 0008C0E100010000_a7b8b82545a98eca_384d4649_GENERIC _XIAOMI_auth.fhprg
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM34)
SymbolicName :??USB#VID_05C6&PID_9008#7&27933e18&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 08/02/2017,2.1.2.7

Getting device info .. Ok
Device MODE : Firehose
Connecting to Firehose...
Ping ....... Ok
Configuration.......................
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 8192
MaxPayloadSizeToTargetInBytesSupported : 8192
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : MSM8996
Version : 1
DateTime : Feb 10 2020 - 19:28:52

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 1309632713
Firmware Version : 2
Product Name : DV6DMB
Physical titions : 4
Total Logical Blocks:
Drive [0] 244277248 [116,48 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]
Drive [3] 32768 [16 MB]

Protocol : Universal
Running : Ok

Phone Information ......
Vendor : Xiaomi
ID : QKQ1.190910.002
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Miui Ver : V125
Mod_device : lavender_global
Display ID : QKQ1.190910.002 V12.5.3.0.QFGMIXM
Security Patch : 2021-10-01

Reading GPT[4]
Drive [0] 68 Items
Drive [1] 0 Items
Drive [2] 0 Items
Drive [3]

Removing FRPta...
Method :
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOk Ok

Elapsed Time : 00:00:03
  Reply With Quote
Old 01-26-2022, 11:58   #2920 (permalink)
No Life Poster
 
Join Date: Feb 2012
Age: 37
Posts: 1,184
Member: 1724862
Status: Offline
Thanks Meter: 374
Redmi Note 7 (lavender) Edl Frp Remove One Click With by Hydra

Redmi Note 7 (lavender) Edl Frp Remove One Click With by Hydra



Quote:
Brand : XIAOMI Model : Redmi Note 7 (lavender) Micron Storage : Auto
Loader: 0008C0E100010000_a7b8b82545a98eca_384d4649_GENERIC _XIAOMI_auth.fhprg
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM7)
SymbolicName :??USB#VID_05C6&PID_9008#5&3269d8ea&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 08/02/2017,2.1.2.7

Getting device info .. . ...
Serial No.: 0x84111960
HW_ID : 0008C0E100000000
MSM ID : 0x0008C0E1, SDM660-Qualcomm Snapdragon 660
MODEL_ID : 0x0000
OEM_ID : 0x0000 - QUALCOMM
PBL Ver : 00000000
PK HASH : a7b8b82545a98eca23d6e9105fb464568d1b5828264903441b def0cd57e3c370

Firehose Loader [0008C0E100010000_a7b8b82545a98eca_384d4649_GENERIC _XIAOMI_auth.fhprg]
--------------------------------------------------
Header Type : OLD
TargetMSM :
Tag : _auth
Version : 5
Code_size : 416
Signature_size : 256
fhVendor : XIAOMI
HW_ID : 3006000000010000
Vendor : GENERIC
OEM_ID : 0001
MODEL_ID : 0000
SW_ID : 000000000000000B
APP_ID :
pk_hash : a7b8b82545a98eca23d6e9105fb464568d1b5828264903441b def0cd57e3c370
OEM_VERSION : c3-bsp-builder-job007.bj
IMAGE_VARIANT : Sdm660LA
QC_VERSION : BOOT.XF.1.4-00262-S660LZB-1
--------------------------------------------------

SaharaBoot... Ok
Sending .................................b Okb0
Connecting to Firehose...
Ping ......... Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[iWcG87HUU2AiG5I3Q4dxkbqVKQF]
Signature @256bytes Authentication.... Accepted ......................
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 8192
MaxPayloadSizeToTargetInBytesSupported : 8192
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : MSM8996
Version : 1
DateTime : Feb 10 2020 - 19:28:52

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 2500444849
Firmware Version : 2
Product Name : DH6DAB
Physical titions : 4
Total Logical Blocks:
Drive [0] 122142720 [58.242 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]
Drive [3] 32768 [16 MB]

Protocol : Universal
Running : Ok

Phone Information ......
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi Note 7
ID : PKQ1.180904.001
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : lavender-user 9 PKQ1.180904.001 V11.0.9.0.PFGINXM release-keys
Miui Ver : V11
Device : lavender
Mod_device : lavender_in_global
Display ID : PKQ1.180904.001
Security Patch : 2020-02-05
Fingerprint : xiaomi/lavender/lavender:9/PKQ1.180904.001/V11.0.9.0.PFGINXM:user/release-keys

Reading GPT[4]
Drive [0] 68 Items
Drive [1] 0 Items
Drive [2] 0 Items
Drive [3]

Removing FRPta...
Method : 0
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOk Ok

Elapsed Time : 00:00:09
  Reply With Quote
Old 01-26-2022, 12:11   #2921 (permalink)
No Life Poster
 
Join Date: Feb 2012
Age: 37
Posts: 1,184
Member: 1724862
Status: Offline
Thanks Meter: 374
Redmi 9C (angelica) Bootloader Unlock With by Hydra

Redmi 9C (angelica) Bootloader Unlock With by Hydra



Quote:
=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port_V1632 (COM50)
Device : 6&33f3d&1&3
SymbolicName :??USB#VID_0E8D&PID_0003#6&33f3d&1&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0

Opened handle..
Handshaking... Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0766 MT6765 [6765]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : E7
SBC : 01 (True)
SLA : 02 (True)
DAA : 04 (True)
SWJTAG : 06 (True)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 20 (True)
MEMWRITE : 40 (True)
CMD_C8 : 80 (True)

Exploiting Device...
Exploit Sent..
Successfully Exploited...
Handshaking... Ok

--- ENABLE AUTO PREL DUMP ----
Found
E:Hydra ToolBackupPreloader_dumpprel.tmp
------------------------------

Handshaking...

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0766 MT6765 [6765]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)

MEID : 94B218617B3113FC186920D3D2E84F4E
Stage 1.. [Size:216440]
Sending : Please wait.. Accepted

Identifying Protocol...
Protocol : New
Synchronization... SYNC
Preloader Initialization...
sing prel.tmp
Init : Accepted
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 437194648BCBA64B83CFCAEC5B5D7F1C
ERAM Size : 0x0000000000038000 -224 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000747C00000 -29,121 GB
eMMC CID : 150100424A544434520944974D04776F - BJTD4R
Executing : ACCEPTED...

Reading GPT -EMMC [0x00008000] 130 Items
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 0 437194648BCBA64B83CFCAEC5B5D7F1C
ERAM Size : 0 0x0000000000038000 -224 KB
IRAM Size : 0 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000747C00000 -29,121 GB
eMMC CID : 150100424A544434520944974D04776F - BJTD4R

Reading GPT -EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Unlock Bootloader
Processing...
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------

Verifying status after operation...
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------
Action Result : Ok

Elapsed Time : 00:00:27
  Reply With Quote
Old 01-27-2022, 10:25   #2922 (permalink)
No Life Poster
 
Join Date: Feb 2012
Age: 37
Posts: 1,184
Member: 1724862
Status: Offline
Thanks Meter: 374
Huawei Y7 2019 (DUB-LX3) Edl Frp Remove One Click With by Hydra

Huawei Y7 2019 (DUB-LX3) Edl Frp Remove One Click With by Hydra



Quote:
Brand : HUAWEI Model : DUB-LX3 (Y7 2019) Storage : Auto
Loader: 0009A0E100150065_6bc369511da9cadb_1a1074cf_HUAWEI_ QUALCOMM_peek_8953.fhprg
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM17)
SymbolicName :??USB#VID_05C6&PID_9008#6&29132496&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 09/10/2015,2.1.2.0

Getting device info .. . ...
Serial No.: 0xF8FDCC13
HW_ID : 0009A0E100150065
MSM ID : 0x0009A0E1, SDM450-Qualcomm Snapdragon 450
MODEL_ID : 0x0065
OEM_ID : 0x0015 - HUAWEI
PBL Ver : 00000000
PK HASH : 6bc369511da9cadb3a7af61574f89db385003d6241bdd1ff57 3dba61bf6ae119

Firehose Loader [0009A0E100150065_6bc369511da9cadb_1a1074cf_HUAWEI_ QUALCOMM_peek_8953.fhprg]
--------------------------------------------------
Header Type : OLD
TargetMSM : 8953
Tag : _peek
Version : 3
Code_size : 288
Signature_size : 256
fhVendor : QUALCOMM
HW_ID : 0009A0E100150065
Vendor : HUAWEI
OEM_ID : 0015
MODEL_ID : 0065
SW_ID : 0000000000000003
APP_ID :
pk_hash : 6bc369511da9cadb3a7af61574f89db385003d6241bdd1ff57 3dba61bf6ae119
OEM_VERSION : SIA1000073848
IMAGE_VARIANT : JAADANAZA
QC_VERSION : BOOT.BF.3.3.2-00019
--------------------------------------------------

SaharaBoot... Ok
Sending .............b Okb0
Connecting to Firehose...
Ping ... Ok
Configuration.......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8953
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 3797470
Firmware Version : 0
Product Name : hC9aP3
Physical titions : 3
Total Logical Blocks:
Drive [0] 122142720 [58.242 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]

Protocol : Universal
Running : Ok

Phone Information .....
Vendor : unknown
ID : OPM1.171019.011
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : generic_a53-user 8.1.0 OPM1.171019.011 eng.jenkin.20210205.113911 test-keys
Display ID : System 8.2.0.036(1UW5)
Security Patch : 2020-09-01

Reading GPT[3]
Drive [0] 60 Items
Drive [1] 0 Items
Drive [2] 0 Items

Removing FRPta...
Method : 0
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOk Ok

Rebooting Phone.... Ok
If not rebooted, Please Power on Manually

Elapsed Time : 00:00:05
  Reply With Quote
Old 01-27-2022, 10:30   #2923 (permalink)
No Life Poster
 
Join Date: Feb 2012
Age: 37
Posts: 1,184
Member: 1724862
Status: Offline
Thanks Meter: 374
Redmi 9 (lancelot) Bootloader Unlock With by Hydra




Quote:
====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port (COM25)
Device : 6&2ec5e233&0&5
SymbolicName :??USB#VID_0E8D&PID_0003#6&2ec5e233&0&5#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2016,3.2

Opened handle..
Handshaking... Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0707 MT6768 [6768]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : E7
SBC : 01 (True)
SLA : 02 (True)
DAA : 04 (True)
SWJTAG : 06 (True)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 20 (True)
MEMWRITE : 40 (True)
CMD_C8 : 80 (True)

Exploiting Device...
Exploit Sent..
Successfully Exploited...
Handshaking... Ok

--- ENABLE AUTO PREL DUMP ----
Found
C:Hydra ToolBackupPreloader_dumpprel.tmp
------------------------------

Handshaking...

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0707 MT6768 [6768]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)

MEID : 990E5A76234B64884381F83A65ECD875
Stage 1.. [Size:256504]
Sending : Please wait.. Accepted

Identifying Protocol...
Protocol : New
Synchronization... SYNC
Preloader Initialization...
sing prel.tmp
Init : Accepted
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : E7B638570126C91D9FEAA40EFEFEEF1C
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58,242 GB
eMMC CID : 15010044503644414203B75568679793 - DP6DAB
Executing : ACCEPTED...

Reading GPT -EMMC [0x00008000] 130 Items

Autobackup titions
-preloader [0x00000000] 512 KB -> preloader.bin...0 Ok
-> Renaming Preloader.... preloader_lancelot.bin
Creating Scatter file... C:Hydra ToolBackupAuto0707__012622193944MT6768_Android_sca tter.txt
-pgpt [0x00000000] 32 KB -> pgpt.bin...0 Ok
-frp [0x05508000] 1024 KB -> frp.bin...0 Ok
-nvdata [0x0C4A2000] 64 MB -> nvdata.bin...0 Ok
-persist [0x104A2000] 48 MB -> persist.bin...0 Ok
-protect1 [0x164A2000] 8 MB -> protect1.bin...0 Ok
-protect2 [0x16CA2000] 11,367 MB -> protect2.bin...0 Ok
-nvram [0x19F00000] 64 MB -> nvram.bin...0 Ok
Done!!!
C:Hydra ToolBackupAuto0707__012622193944
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 1 E7B638570126C91D9FEAA40EFEFEEF1C
ERAM Size : 1 0x0000000000070000 -448 KB
IRAM Size : 1 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58,242 GB
eMMC CID : 15010044503644414203B75568679793 - DP6DAB

Reading GPT -EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Unlock Bootloader
Processing...
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------

Verifying status after operation...
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------
Action Result : Ok

Elapsed Time : 00:00:39
  Reply With Quote
Old 01-28-2022, 13:42   #2924 (permalink)
No Life Poster
 
Join Date: Feb 2012
Age: 37
Posts: 1,184
Member: 1724862
Status: Offline
Thanks Meter: 374
Redmi Note 8 (ginkgo) Edl Format Userdata One Click With by Hydra

Redmi Note 8 (ginkgo) Edl Format Userdata One Click With by Hydra



Quote:
Brand : XIAOMI Model : Redmi Note 8 (ginkgo) Storage : Auto
Loader: 0010A0E100720000_1bebe3863a6781db_76196dc8_XIAOMI. fhprg
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM8)
SymbolicName :??USB#VID_05C6&PID_9008#6&61bf49f&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 08/02/2017,2.1.2.7

Getting device info .. Okc
Device MODE : Firehose
Connecting to Firehose...
Ping ..................... Ok
Configuration.........
Identifying Chip....
Ok
Chip Configuration :
MemoryName : c eMMC
MaxPayloadSizeToTargetInBytes : c 16384
MaxPayloadSizeToTargetInBytesSupported : c 16384
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : c 4096
TargetName :
Version : c 1
DateTime : c Jul 3 2019 - 22:23:56

*** STORAGE DEVICE INFO ***
Memory Type : c eMMC
Block Size in Bytes : c 512
Page Size : c 512
Manufacturer ID : c 19
Serial Number : c 394286107
Firmware Version : c 4
Product Name : c S0J9K8
Physical titions : c 4
Total Logical Blocks:
Drive [0] c 122142720 [58.242 GB]
Drive [1] c 8192 [4 MB]
Drive [2] c 8192 [4 MB]
Drive [3] c 32768 [16 MB]

Protocol : c Universal
Running : Ok

Phone Information ......
Vendor : Xiaomi
ID : QKQ1.200114.002
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Miui Ver : V12
Mod_device : ginkgo_in_global
Security Patch : 2021-01-01

Reading GPT[4]
Drive [0] c 88 Items
Drive [1] c 0 Items
Drive [2] c 0 Items
Drive [3]

Formatting Userdata...
Method :
Auto
Processing... c
- Formatting Userdata
Executing ...c
- Formatting Userdata [Safe Format - eMMc] OkOkc Ok
c
Elapsed Time : 00:00:08
  Reply With Quote
Old 01-28-2022, 13:55   #2925 (permalink)
No Life Poster
 
Join Date: Feb 2012
Age: 37
Posts: 1,184
Member: 1724862
Status: Offline
Thanks Meter: 374
Realme 8 5G (RMX2341) Bootloader Unlock One Click With by Hydra

Realme 8 5G (RMX2341) Bootloader Unlock One Click With by Hydra



Quote:
=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port_V1633 (COM8)
Device : 5&53c06f5&0&3
SymbolicName :??USB#VID_0E8D&PID_0003#5&53c06f5&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0

Opened handle..

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 5A2B8AD5AE89B666212FE997FD570571
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
UFS LU0 Size: 0x0000000000400000 -4 MB
UFS LU1 Size: 0x0000000000400000 -4 MB
UFS LU2 Size: 0x0000001DCB000000 -119.172 GB
UFS CID : -'01H9HQ15AFAMBDAR
UFS UNIQID : 20092EA50320

Reading GPT0 -UFS [0x00008000] 0 130 Items


-------------------------------------
Operation : Unlock Bootloader
Processing...
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------

Verifying status after operation...
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------
Action Result : 0 Ok

Elapsed Time : 00:00:02
  Reply With Quote
Reply

Bookmarks

Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


 



All times are GMT +1. The time now is 01:37.



Powered by Searchlight © 2022 Axivo Inc.
vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2022 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2017 -
Page generated in 0.37526 seconds with 8 queries

SEO by vBSEO