★★★ Post All Successfully Repaired Phones By Hydra Tool ★★★

Hydra Tool

Product Manager
Aug 31, 2019
312
363
Ukraine
Turkcell Reeder P13 Google Account Success by Hydra Dongle



=====================================
Connection[WAITING]Found[PreLoader][COM3] Status[Opened]
ERAM Size : 0x0000000080000000 -2 GB
IRAM Size : 0x0000000000040000 -256 KB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000747C00000 -29,121 GB
eMMC CID : 90014A484247346132A5023805103559 - HBG4a2
UNICAL RID : DF6DDEBEB37C3E6B1F0F882AB5516876
DA Speed : high-speed
Reading GPT-EMMC [0x00008000] 130 Items
Done!!!


Reading System Info
Model : P13
Brand : reeder
Android Ver : 8.1.0
Manufacturer : Turkcell
Device : P13
Board : MT6739O
Display ID : O11019 release-keys
Security Patch : 2018-07-05
Kernel ID : 2018-07-05
FingerPrint : reeder/P13/P13:8.1.0/O11019/1528358635:user/release-keys

-------------------------------------
Operation : Auto
Processing... Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:11
 

Hydra Tool

Product Manager
Aug 31, 2019
312
363
Ukraine
Asus A001D ZB634KL ZenFone Max Plus M2 Google Account Remove by Hydra Tool

  1. Run Hydra Qualcomm Module
  2. Untick auto Select Brand and model
  3. Go to service tab, tick factory reset protection (frp)
  4. click execute and wait for frp operation complete



PreOperation Configuration
Brand : ASUS Model : A001D (ZB634KL ZenFone Max Plus M2) Storage : Auto
Loader: prog_emmc_firehose_8953_ASUS_M2.mbn
Port : Auto
Connection : Flash Mode

Finding EDL Port..[COM6]
Getting device info.......
Serial No.: 0x8BA4AACB
MSM ID : 0x0009A0E1, SDM450-Qualcomm Snapdragon 450
PBL Ver : 00000000
PK HASH : D3976384E063ADF4980A5B8FB601A976
80A47E0294B4FE0A11E735D5724D759D

Firehose Loader[prog_emmc_firehose_8953_ASUS_M2.mbn]
Initializing SaharaBoot... Ok
Sending ...................Ok

Finding EDL Port..[COM6]
Connecting to Firehose...
Ping... Ok
Configuration......
Identifying Chip....Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8953
Version : 1

* STORAGE DEVICE INFO *
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 841691648
Firmware Version : 162
Product Name : HCG8a4
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 122142720[58,242 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Running : Ok

Reading GPT[3]Ok
Phone Information.....
Model : ASUS_A001D
Brand : asus
Android Ver : 9
Manufacturer : asus
Device : ASUS_A001D_2
Display ID :
Security Patch : 2019-09-05
Kernel ID : 2019-09-05
Fingerprint : asus/WW_Phone/ASUS_A001D_2:9/PPR1/16.14.1909.258-20190912:user/release-keys
ro_product_hardware :
sys_hardware_version :

======================================
Reading GPT[3]Ok
* FRP Reset *
Resetting FRP...
Auto
Processing...
Executing ...
[Zero Wipe] Ok
All Done
======================================

Elapsed Time : 00:00:09
 
  • Like
Reactions: Franky38

Franky38

Moderator
Jul 28, 2018
2,147
2,322
PayPal:

Donate money to this user
SM-G955F U4 Android 9 Root by Hydra Tool



Code:
Starting ADB Server....
Searching Device By ADB
Device Found...
Model : SM-G950F
Brand : samsung
Android Ver : 9
CPU abi : arm64-v8a
Software Version : G950FXXS4DSD3
CSC Version : G950FOWA4DSBA
Bootloader : G950FXXS4DSD3
Board : universal8895
Display ID : PPR1.180610.011.G950FXXS4DSD3
Security Patch : 2019-04-01
Emmc_size :
Platform : exynos5
Kernel ID : 2019-04-01
Marketname :
OTA Version Name :
SYS USB CONFIG : persist.mtp,adb
FRPPST : /dev/block/persistent
FingerPrint : samsung/dreamltexx/dreamlte:9/PPR1.180610.011/G950FXXS4DSD3:user/release-keys

Checking Root Status....
Root Status : Not Rooted

Searching Device On Modem Port....
Scanning port....
TPortConnection.Create...(COM64)..Opening...Ok
Searching for Device ....Found !!
Rebooting to Download Mode
Success!!

TPortConnection.Destroy.....Closing...Ok..
Scanning port....
Connecting Device....
TPortConnection.Create...(COM3)..Opening...Ok
Device Mode : Download Mode
CPU : EXYNOS
Total Binary Size is 77.55MB
Initialize Phone : Ok
Partition Information Table(PIT)
- Backup
Backup PIT (COM_TAR2LSI7420) Ok
- Reading.. Ok
- Mapping..Ok
Writing boot.img...
Writing recovery.img...

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:08


BR HYDRA TOOL TEAM
 

Hydra Tool

Product Manager
Aug 31, 2019
312
363
Ukraine
Nokia 5.1 TA-1108 Reset FRP,
Nokia TA-1108 Remove Google account android 9 by hydra tool



MTK Phone Loader is NOW RUNNING.
ERAM Size : 0x00000000C0000000 -3 GB
IRAM Size : 0x0000000000040000 -256 KB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 90014A68423861503E013BE2AAC6A5CB - hB8aP>
UNICAL RID : CABD6856CA4C13C864EFDF734D2D4D5D
DA Speed : high-speed
Reading GPT-EMMC [0x00008000] 130 Items
Done!!!


Reading System Info
Model : GSI-00WW
Brand : FIH_GSI
Android Ver : 9
Manufacturer : FIH
Device : PDA_sprout
Display ID : 00WW_2_20D
Security Patch : 2019-11-05
Kernel ID : 2019-11-05
FingerPrint : Nokia/Panda_00WW/PDA_sprout:9/PPR1.180610.011/00WW_2_20D:user/release-keys

-------------------------------------
Operation : Auto
Processing... Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:37
 

Hydra Tool

Product Manager
Aug 31, 2019
312
363
Ukraine
Reeder P13 Blue Reset FRP,
Reeder P13 Blue Google account remove by hydra tool



MTK Phone Loader is NOW RUNNING.
ERAM Size : 0x00000000C0000000 -3 GB
IRAM Size : 0x0000000000040000 -256 KB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003AB400000 -14,676 GB
eMMC CID : 90014A484147346132A41979182F4379 - HAG4a2
UNICAL RID : E4D3E0894D45A29B0E8120768D699574
DA Speed : high-speed
Reading GPT-EMMC [0x00008000] 130 Items
Done!!!


Reading System Info
Model : P13_Blue
Brand : reeder
Android Ver : 9
Manufacturer : reeder
Device : P13_Blue
Display ID : reeder_P13Blue_2019.07.11V1.00
Security Patch : 2019-07-05
Kernel ID : 2019-07-05
FingerPrint : reeder/P13_Blue/P13_Blue:9/PPR1.180610.011/1562763166:user/release-keys

-------------------------------------
Operation : Auto
Processing... Ok

Elapsed Time : 00:00:19
 
  • Like
Reactions: alighiyasee

Hydra Tool

Product Manager
Aug 31, 2019
312
363
Ukraine
OPPO A83 Dead Fix Unbrick device by hydra tool
Dead boot for oppo a83




Brand : OPPO Model : A83 (CPH1729) Connection : Flash Mode

=====================================
How To Boot : Power off phone
* BROM Mode : Press VOL +
* Preloader Mode : Just Insert cable

Connection[WAITING]Found[COM9] Status[Opened]
Identifying Hardware ID
BROM CPUID : 0690 (0000)MT6763T[6763]
BROM HW_SW_VER : 8A00 CA01 0001 0000
SECURE VERSION : 05
BL VERSION : FE
BR Secured : E5[SBC+SDA+SEL]
Security Authorization....
Sending[Oppo_A83.auth] Accepted
Preparing Download Agent..
Download Agent : 6763_F156FF6B3D.bin
MTK_DOWNLOAD_AGENT -HYDRA
MTK_AllInOne_DA_v3.3001.2017/09/22.09:22
Initializing Loader [1]
Sending Loader [1] Accepted
PROTOCOL[NEW] - eMMC
PHONE SYNC[Accepted]
DA Mode : brom
Preloader Initialization....
Parsing preloader_oppo6763_17101.bin
Sending FlashInit Accepted
Initializing Loader [2]
Sending Loader [2]
16
434E5953Accepted
ERAM Size : 0x00000000C0000000 -3 GB
IRAM Size : 0x0000000000040000 -256 KB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 90014A484247346132A5C7A048B3C405 - HBG4a2
UNICAL RID : 65948ED6274280B6394415AE498CCC2F
DA Speed : high-speed
DA Speed : high-speed
Reading GPT-EMMC [0x00008000] 130 Items
Done!!!

Reading System Info

Autobackup Partitions
preloader[0x00000000-0x00080000]512 KB Done
-> Renaming Preloader.... preloader_oppo6763_17101.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\__0690--()_100420153000\MT6763T_Android_scatter.txt
nvdata[0x07B88000-0x0BB88000]64 MB Done
nvram[0x1A000000-0x1E000000]64 MB Done
Done!!!
C:\Hydra Tool\\Backup\Auto\__0690--()_100420153000
MTK Phone Loader is NOW RUNNING.
ERAM Size : 0x00000000C0000000 -3 GB
IRAM Size : 0x0000000000040000 -256 KB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 90014A484247346132A5C7A048B3C405 - HBG4a2
UNICAL RID : 65948ED6274280B6394415AE498CCC2F
DA Speed : high-speed
Reading GPT-EMMC [0x00008000] 130 Items
Done!!!


Reading System Info

-------------------------------------
Operation : Fix Dead From TP-1
Processing...
preloader[0x00000000-0x00080000]512 KB Done... Ok

Elapsed Time : 00:01:24
 

Franky38

Moderator
Jul 28, 2018
2,147
2,322
PayPal:

Donate money to this user
Casper Via A3 FRP Reset by Hydra Dongle



Code:
Finding EDL Port..[COM33]
Connecting to Firehose...
Ping... Ok
Configuration......
Identifying Chip....Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8953
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 1627396115
Firmware Version : 162
Product Name : HCG8a4
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 122142720[58,242 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Running : Ok

Reading GPT[3]Ok
Phone Information.....
Model : VIA_A3
Brand : Casper
Android Ver : 8.1.0
Manufacturer : Casper
Device : VIA_A3
Display ID : A3_c1.01_20180814
Security Patch : 2018-08-01
Kernel ID : 2018-08-01
Fingerprint : Casper/VIA_A3/VIA_A3:8.1.0/OPM1.171019.019/1534207320:user/release-keys
ro_product_hardware :
sys_hardware_version :

======================================
Reading GPT[3]Ok
*** Ultra Power Option ***
Auto
Processing...
Executing ...
[Zero Wipe]
Executing ...
[Format Safe method] Ok
Rebooting Phone.... Ok
If not rebooted, Please Power on Manually
All Done
======================================

Elapsed Time : 00:00:10
 

Franky38

Moderator
Jul 28, 2018
2,147
2,322
PayPal:

Donate money to this user
Huawei Y5 2019 AMN-LX9 Reset FRP 9.1.0 via test point by hydra

Code:
Brand : HUAWEI Model : AMN-LX9 (Y5 2019) Connection : Flash Mode



=====================================

How To Boot : Remove Batt if possible

* TP Ground Must be near cpu..

* Remove ground upon popup of the message dialog.



Connection[WAITING]Found[COM23] Status[Opened]

Identifying Hardware ID

BROM CPUID     : 0717 (0000)MT6761[6761]

BROM HW_SW_VER : 8A00 CA01 0200 0000

FUSEID : 00000001

SECURE VERSION : 05

BL VERSION : FE

BR Secured : E5[SBC+SDA+SEL]

Security Authorization....

Sending[Huawei_auth_sv5_.auth] Accepted

Preparing Download Agent..

Download Agent : Huawei_6761_8A00CA0000000000_00001000_00030000.bin

MTK_DOWNLOAD_AGENT -HYDRA

MTK_AllInOne_DA_v3.3001.2018/10/18.17:38_452898

Initializing Loader [1]

Sending Loader [1] Accepted

PROTOCOL[NEW] - eMMC

PHONE SYNC[Accepted]

DA Mode : brom

Preloader Initialization....

Parsing preloader_k61v1_64_mexico.bin

Sending FlashInit Accepted

Initializing Loader [2]

Sending Loader [2] Accepted

ERAM Size  : 0x0000000000080000 -512 KB

IRAM Size  : 0x0000000080000000 -2 GB

eMMC BOOT1 : 0x0000000000400000 -4 MB

eMMC BOOT2 : 0x0000000000400000 -4 MB

eMMC RPMB  : 0x0000000001000000 -16 MB

eMMC USER  : 0x0000000747C00000 -29.121 GB

eMMC CID   : 90014A68423861503E011F605CEBB64B - hB8aP>

UNICAL RID : 247BB0F4F76FB5D93BCDA4779364BEAA

DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Done!!!



Reading System Info

ERROR reading system image [corrupted/erased]



Autobackup Partitions

preloader[0x00000000-0x00080000]512 KB ->preloader.bin... Done

-> Renaming Preloader....  preloader_k61v1_64_mexico.bin

Creating Scatter file... F:\Hydra Tool\\Backup\Auto\__0717--()_070520180205\MT6761_Android_scatter.txt

nvdata[0x00A08000-0x01A08000]16 MB ->nvdata.bin... Done

nvram[0x04400000-0x04900000]5 MB ->nvram.bin... Done

preload[0xC8800000-0xEE000000]600 MB ->preload.bin... Done

Done!!!

F:\Hydra Tool\\Backup\Auto\__0717--()_070520180205

MTK Phone Loader is NOW RUNNING.

ERAM Size  : 0x0000000000080000 -512 KB

IRAM Size  : 0x0000000080000000 -2 GB

eMMC BOOT1 : 0x0000000000400000 -4 MB

eMMC BOOT2 : 0x0000000000400000 -4 MB

eMMC RPMB  : 0x0000000001000000 -16 MB

eMMC USER  : 0x0000000747C00000 -29.121 GB

eMMC CID   : 90014A68423861503E011F605CEBB64B - hB8aP>

UNICAL RID : 247BB0F4F76FB5D93BCDA4779364BEAA

Reading GPT-EMMC [0x00008000] 130 Items

Done!!!





Reading System Info

ERROR reading system image [corrupted/erased]



-------------------------------------

Operation : Auto

Processing... Ok



Rebooting Device [Reboot To Normal]

Reboot Done!!



Elapsed Time : 00:01:29
 

Franky38

Moderator
Jul 28, 2018
2,147
2,322
PayPal:

Donate money to this user
Vivo Y91i 1820 FRP + Format Done

Select Brand, Select Model, Tick ULTRA Option click execute buton



Brand : VIVO Model : Y91i (1820) Connection : Flash Mode

=====================================
Connection[WAITING]Found[PreLoader][COM7] Status[Opened]
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000020000000 -512 MB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 150100514436334D4201A2BBE485C643 - QD63MB
UNICAL RID : 416C7BD97074EE4410123996F1212558
Reading GPT-EMMC [0x00008000] 130 Items
Done!!!


Reading System Info
Model : vivo 1820
Brand : vivo
Android Ver : 8.1.0
Manufacturer : vivo
Device : PD1818HF_EX
Display ID : O11019 release-keys
Security Patch : 2019-12-05
Platform : =MTK6765
Kernel ID : 2019-12-05
FingerPrint : vivo/1820/1820:8.1.0/O11019/1577713030:user/release-keys

-------------------------------------
Operation : Auto
Processing... Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:12
 

Franky38

Moderator
Jul 28, 2018
2,147
2,322
PayPal:

Donate money to this user
Xiaomi Redmi 5 Plus (Vince) Remove Mi Account and FRP by Hydra Dongle


FRP Reset and Mi Account Video guide :


Best Regards | Hydra Team
 

Franky38

Moderator
Jul 28, 2018
2,147
2,322
PayPal:

Donate money to this user
Xiaomi Redmi 4A (rolex) Remove Mi Account success by hydra dongle

after disable it by EDL, you need to disable by ADB


Code:
PreOperation Configuration
Brand : XIAOMI Model : Redmi 4A (Rolex) Storage : Auto
Loader: mi_1_8.mbn
Port : Auto
Connection : Flash Mode

Finding EDL Port..[COM9]
Getting device info.......
Serial No.: 0x00826FBE
MSM ID : 0x000560E1
PBL Ver : 00000000
PK HASH : 57158EAF1814D78FD2B3105ECE4DB18A
817A08AC664A5782A925F3FF8403D39A

Firehose Loader[mi_1_8.mbn]
Initializing SaharaBoot... Ok
Sending ...................Ok

Finding EDL Port..[COM9]
Connecting to Firehose...
Ping... Ok
Configuration......
Identifying Chip....Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8917
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 622958195
Firmware Version : 7
Product Name : QE13MB
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 30535680[14,561 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Running : Ok

Reading GPT[3]Ok
Phone Information.....
Model : Redmi 4A
Brand : Xiaomi
Android Ver : 7.1.2
Miui Ver : V10
Manufacturer : Xiaomi
Device : rolex
Mod_device : rolex_global
Board : QC_Reference_Phone
Display ID : N2G47H
Security Patch : 2018-07-01
Platform : msm8937
Kernel ID : 2018-07-01
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : Xiaomi/rolex/rolex:7.1.2/N2G47H/V10.2.3.0.NCCMIXM:user/release-keys
ro_product_hardware :
sys_hardware_version :

======================================
Reading GPT[3]Ok
Operation : MiAccount
Remove MiAccount[Erase Method]
Processing...
Backing up Partition for safety...Ok

Scanning Patching address...
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]Done!!
Total Items patched : 4
Successfully patched address..Ok
Rebooting Phone.... Ok
If not rebooted, Please Power on Manually
All Done
======================================

Elapsed Time : 00:00:25

Best Regards | Hydra Team
 

Franky38

Moderator
Jul 28, 2018
2,147
2,322
PayPal:

Donate money to this user
Vivo 1906 FRP + Format Done by Hydra Tool

Vivo Y11 1906 Remove Pattern and Google Account Remove Hydra Tool


Code:
PreOperation Configuration
Brand : VIVO Model : Y11 (1906) Storage : Auto
Loader: Vivo_Y95_8937.mbn
Port : Auto
Connection : Flash Mode

Finding EDL Port..[COM5]
Getting device info..
Device MODE : SAHARA

Finding EDL Port..[COM5]
Connecting to Firehose...
Ping.. Ok
Configuration......
Identifying Chip....Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 2915277927
Firmware Version : 892350512
Product Name : hB8aP>
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 61071360[29.121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Running : Ok

Reading GPT[3]Ok
Phone Information......
Model : vivo 1906
Brand : vivo
Android Ver : 9
Manufacturer : vivo
Device : PD1930F_EX
Display ID : PKQ1.190616.001 release-keys
Security Patch : 2019-12-01
Platform : =SDM439
Kernel ID : 2019-12-01
Fingerprint : vivo/1906/1906:9/PKQ1.190616.001/compiler01181456:user/release-keys
ro_product_hardware :
sys_hardware_version :

======================================
Reading GPT[3]Ok
*** Ultra Power Option ***
Vivo ForcedErase Userdata
Processing...
[Vivo ForcedErase]
[Vivo ForcedErase Userdata] Ok
All Done
======================================

Elapsed Time : 00:00:13

Best Regards | Hydra Team
 

Franky38

Moderator
Jul 28, 2018
2,147
2,322
PayPal:

Donate money to this user
Casper Via M1 FRP Reset by Hydra Tool

Casper m1 google account remove by flash mode.



Code:
Brand : AUTO Model : AUTO Connection : Flash Mode

=====================================
How To Boot : Power off phone
* BROM Mode : Press VOL +
* Preloader Mode : Just Insert cable

Connection[WAITING]Found[PreLoader][COM14] Status[Opened]
Identifying Hardware ID
BROM CPUID : 0337 (0000)MT6753[6735]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 54000000
SECURE VERSION : FF
BL VERSION : 01
BR Secured : 00
Preparing Download Agent..
Download Agent : 6735.bin
MTK_DOWNLOAD_AGENT -HYDRA
MTK_AllInOne_DA_v3.3001.2018-09-18.13:22_452898
Initializing Loader [1]
Sending Loader [1] Accepted
PROTOCOL[OLD] - eMMC
PRMMCCID : 484A019065324741722807057368A2ED
Running DA 4.2 on BBID : 0x9B
Init Configuration Ok
Initializing Loader [2]
Sending Loader [2] Accepted
Reading Flashchip data....
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003AB800000 -14,68 GB
ERAM Size : 0x00000000C0000000 -3 GB
IRAM Size : 0x0000000000020000 -128 KB
UNICAL RID : DD6994FA631D2BA5323496C6F5A8CBB9
eMMC CID : 484A019065324741722807057313A2ED
Change to HIGH SPEED...
Connection[WAITING]Found[COM196] Status[Opened]

Reading Partition Table
SIZE[0x000007E8] 23 Items > Done

Reading System Info
Model : CASPER_VIA_M1
Brand : Casper
Android Ver : 5.1
Manufacturer : Casper
Device : CASPER_VIA_M1
Board : VIA_M1
Display ID : M1_20160429_c1.04
Security Patch :
Platform : mt6753
Kernel ID :
FRPPST : /dev/block/platform/mtk-msdc.0/by-name/frp
FingerPrint : Micromax/E481/E481:5.1/LMY47D/1461917402:user/release-keys

Autobackup Partitions
preloader [0x00000000-0x00080000] 512 KB Done
-> Renaming Preloader.... preloader_l5460.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\Casper_CASPER_VIA_M1_0337-mt6753-5.1(M1_20160429_c1.04)_160520145535\MT6753_Android _scatter.txt
nvram [0x00380000-0x00880000] 5 MB Done
nvdata [0x06B00000-0x08B00000] 32 MB Done
Done!!!
C:\Hydra Tool\\Backup\Auto\Casper_CASPER_VIA_M1_0337-mt6753-5.1(M1_20160429_c1.04)_160520145535
MTK Phone Loader is NOW RUNNING.


Reading System Info
Model : CASPER_VIA_M1
Brand : Casper
Android Ver : 5.1
Manufacturer : Casper
Device : CASPER_VIA_M1
Board : VIA_M1
Display ID : M1_20160429_c1.04
Security Patch :
Platform : mt6753
Kernel ID :
FRPPST : /dev/block/platform/mtk-msdc.0/by-name/frp
FingerPrint : Micromax/E481/E481:5.1/LMY47D/1461917402:user/release-keys

-------------------------------------
Operation : Auto
Processing... Ok

Elapsed Time : 00:00:17
 

Franky38

Moderator
Jul 28, 2018
2,147
2,322
PayPal:

Donate money to this user
Redmi 5A (riva) mi accont remove done



Code:
Hydra Qualcomm  Tool  Ver 1.0.1 Build 88
Windows 7 Service Pack 1 (Version 6.1, Build 7601, 32-bit Edition)
Intel(R) Core(TM) i3-7100 CPU @ 3.90GHz
Intel(R) HD Graphics 630
Ram Installed : 3 GB
Windows Access Right Admin
******* Dongle Info *******
Version    : Hydra Tool v 1.1
Serial     : 190400000765
Initialize : OKAY
Status     : Activated
Life       : 0-[3-0-0-0-0]

PreOperation Configuration
 Brand : XIAOMI Model : Redmi 5A (riva) Storage : Auto
 Loader: Redmi_8917.mbn
 Port  : Auto
 Connection  : Flash Mode

Searching EDL Port..[COM13]
TPortConnection.Create...(COM13)..Opening...Ok
Getting device info..
Device MODE : SAHARA

Connecting to Firehose...
Ping.. Ok
Configuration......
Identifying Chip....Ok
Chip Configuration :
 MemoryName : eMMC
 MaxPayloadSizeToTargetInBytes : 1048576
 MaxPayloadSizeToTargetInBytesSupported : 1048576
 MaxPayloadSizeFromTargetInBytes : 4096
 MaxXMLSizeInBytes : 4096
 TargetName : 8917
 Version : 1

*** STORAGE DEVICE INFO ***
Memory Type         : eMMC
Block Size in Bytes : 512
Page Size           : 512
Manufacturer ID     : 21
Serial Number       : 1143314162
Firmware Version    : 3
Product Name        : QE63MB
Physical Partitions : 3
Total Logical Blocks:
          Drive [0]  30535680[14.561 GB]
          Drive [1]  8192[4 MB]
          Drive [2]  8192[4 MB]
Running : Ok
 
Reading GPT[3]Ok
Phone Information.....
  Model : Redmi 5A
  Brand : Xiaomi
  Android Ver : 7.1.2
  Miui Ver  : V9
  Manufacturer : Xiaomi
  Device : riva
  Mod_device : riva_global
  Board : QC_Reference_Phone
  Display ID : N2G47H
  Security Patch : 2017-10-01
  Platform : msm8937
  Kernel ID : 2017-10-01
  FRPPST : /dev/block/bootdevice/by-name/config
  Fingerprint : Xiaomi/riva/riva:7.1.2/N2G47H/V9.1.6.0.NCKMIEI:user/release-keys
  ro_product_hardware :
  sys_hardware_version :

Reading GPT[3]Ok
Operation : MiAccount
Remove MiAccount[Erase Method]
Processing...
Backing up Partition for safety...Ok

Scanning Patching address...
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]Done!!
Total Items patched : 4
Successfully patched address..Ok

Elapsed Time : 00:00:08


TPortConnection.Destroy.....Closing...Ok..
 

Franky38

Moderator
Jul 28, 2018
2,147
2,322
PayPal:

Donate money to this user
Maxeeder MX-T43 Remove Lock Without Data Loss DONE



Code:
Hydra MediaTeK Tool  Ver 1.0.1 Build 83
Windows 7 Service Pack 1 (Version 6.1, Build 7601, 32-bit Edition)
Intel(R) Core(TM) i3-7100 CPU @ 3.90GHz
Intel(R) HD Graphics 630
Ram Installed : 3 GB
Windows Access Right Admin
******* Dongle Info *******
Version    : Hydra Tool v 1.1
Serial     : 190400000765
Initialize : OKAY
Status     : Activated
Life       : 0-[3-0-0-0-0]


Brand : AUTO Model : AUTO Connection : Flash Mode

=====================================
How To Boot : Power off phone
 * BROM Mode : Press VOL +
 * Preloader Mode : Just Insert cable

Connection[WAITING]Found[PreLoader][COM7] Status[Opened]
Identifying Hardware ID
BROM CPUID     : 6572 (0000)MT6572[6572]
BROM HW_SW_VER : 8A00 CA01 0000 0000
FUSEID : 804000E0
SECURE VERSION : FF
BL VERSION : 01
BR Secured : 00
Preparing Download Agent..
Download Agent : 6572.bin
MTK_DOWNLOAD_AGENT -HYDRA
MTK_AllInOne_DA_v3.3001.2018-09-18.13:22_452898
Initializing Loader [1]
Sending Loader [1] Accepted
PROTOCOL[OLD] - eMMC
PRMMCCID   : 8801034E4361726420294CA91236535D
Running DA 4.2 on BBID : 0x88
Init Configuration Ok
Initializing Loader [2]
Sending Loader [2] Accepted
Reading Flashchip data....
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB  : 0x0000000000400000 -4 MB
eMMC USER  : 0x00000001CE100000 -7.22 GB
ERAM Size  : 0x0000000020000000 -512 MB
IRAM Size  : 0x0000000000020000 -128 KB
UNICAL RID : D68B666297A15CFC6EE38DF33BA4ACA8
eMMC CID   : 4E03018864726143A94C29205D533612
Change to HIGH SPEED...
Connection[WAITING]Found[COM47] Status[Opened]

Reading Partition Table
SIZE[0x00000780] 20 Items > Done

Reading System Info
Model           :    MX-T43
Brand           :    alps
Android Ver     :    4.4.2
Manufacturer    :    alps
Device          :    MX-T43
Board           :    BLS-T35
Display ID      :    ALPS.KK1.MP7.V1.44
Security Patch      :   
Kernel ID        :   
FingerPrint       :    alps/w706/w706:4.4.2/KOT49H/1464960380:user/test-keys

Autobackup Partitions
 PRELOADER [0x00000000-0x00080000] 512 KB -> PRELOADER.bin  Done
 -> Renaming Preloader....  preloader_w706.bin
 Creating Scatter file... C:\Hydra Tool\\Backup\Auto\alps_MX-T43_6572--4.4.2(ALPS.KK1.MP7.V1.44)_210520211919\MT6572_Android_scatter.txt
 NVRAM [0x04400000-0x04900000] 5 MB -> NVRAM.bin  Done
Done!!!
C:\Hydra Tool\\Backup\Auto\alps_MX-T43_6572--4.4.2(ALPS.KK1.MP7.V1.44)_210520211919
MTK Phone Loader is NOW RUNNING.


Reading System Info
Model           :    MX-T43
Brand           :    alps
Android Ver     :    4.4.2
Manufacturer    :    alps
Device          :    MX-T43
Board           :    BLS-T35
Display ID      :    ALPS.KK1.MP7.V1.44
Security Patch      :   
Kernel ID        :   
FingerPrint       :    alps/w706/w706:4.4.2/KOT49H/1464960380:user/test-keys

-------------------------------------
Operation : Remove Lock Without Data Loss
Processing...
Searching patching address.. [Ok].. [Ok].. [Ok].. [Ok].. [Ok] Ok

Elapsed Time : 00:00:15
 

Franky38

Moderator
Jul 28, 2018
2,147
2,322
PayPal:

Donate money to this user
xiaomi Pocophone F1 flash done







Code:
17:39:46 : Hydra Qualcomm  Tool  Ver 1.0.1 Build 88
17:39:46 : Windows 7 Service Pack 1 (Version 6.1, Build 7601, 32-bit Edition)
17:39:46 : Intel(R) Core(TM) i3-7100 CPU @ 3.90GHz       
17:39:46 : Intel(R) HD Graphics 630
17:39:46 : Ram Installed :
17:39:46 : 3 GB
17:39:46 : Windows Access Right
17:39:46 : Admin
17:39:46 :
17:39:46 :
17:39:47 : ******* Dongle Info *******
17:39:47 : Version    :
17:39:47 : Hydra Tool v 1.1
17:39:47 : Serial     :
17:39:47 : 190400000765
17:39:47 : Initialize :
17:39:47 : OKAY
17:39:47 : Status     :
17:39:47 : Activated
17:39:47 : Life       :
17:39:47 : 0-
17:39:47 : [3-
17:39:47 : 0-
17:39:48 : 0-
17:39:48 : 0-
17:39:48 : 0]
17:39:48 :
17:39:58 : Hydra Qualcomm  Tool  Ver 1.0.1 Build 88
17:39:58 : Windows 7 Service Pack 1 (Version 6.1, Build 7601, 32-bit Edition)
17:39:58 : Intel(R) Core(TM) i3-7100 CPU @ 3.90GHz       
17:39:58 : Intel(R) HD Graphics 630
17:39:58 : Ram Installed :
17:39:58 : 3 GB
17:39:58 : Windows Access Right
17:39:58 : Admin
17:39:59 : ******* Dongle Info *******
17:39:59 : Version    :
17:39:59 : Hydra Tool v 1.1
17:39:59 : Serial     :
17:39:59 : 190400000765
17:40:00 : Initialize :
17:40:00 : OKAY
17:40:00 : Status     :
17:40:00 : Activated
17:40:00 : Life       :
17:40:00 : 0-
17:40:00 : [3-
17:40:00 : 0-
17:40:00 : 0-
17:40:00 : 0-
17:40:00 : 0]
17:40:00 :
17:40:00 :
17:40:01 : Searching Device By Fastboot
17:40:02 : Device Found...
17:40:02 :
17:40:02 : Reading Information...
17:40:02 : Product    :
17:40:02 : product: beryllium
17:40:02 : Serial No. :
17:40:02 : serialno: b4a4f031
17:40:02 : version    :
17:40:02 : getvar:version FAILED (remote: GetVar Variable Not found)
17:40:02 : Secure     :
17:40:02 : secure: yes
17:40:02 : Device Info:
17:40:02 :     Verity mode: true
17:40:02 :     Device unlocked: true
17:40:02 :     Device critical unlocked: true
17:40:02 :     Charger screen enabled: false
17:40:02 :
17:40:02 : Rebooting   Fastboot To EDL Mode...
17:40:02 :
17:40:02 : Reboot Successfully.
17:40:15 : Hydra Qualcomm  Tool  Ver 1.0.1 Build 88
17:40:15 : Windows 7 Service Pack 1 (Version 6.1, Build 7601, 32-bit Edition)
17:40:15 : Intel(R) Core(TM) i3-7100 CPU @ 3.90GHz       
17:40:15 : Intel(R) HD Graphics 630
17:40:15 : Ram Installed :
17:40:15 : 3 GB
17:40:15 : Windows Access Right
17:40:15 : Admin
17:40:16 : ******* Dongle Info *******
17:40:16 : Version    :
17:40:16 : Hydra Tool v 1.1
17:40:16 : Serial     :
17:40:16 : 190400000765
17:40:17 : Initialize :
17:40:17 : OKAY
17:40:17 : Status     :
17:40:17 : Activated
17:40:17 : Life       :
17:40:17 : 0-
17:40:17 : [3-
17:40:17 : 0-
17:40:17 : 0-
17:40:17 : 0-
17:40:17 : 0]
17:40:17 :
17:40:17 : PreOperation Configuration
17:40:17 :  Brand :
17:40:17 : AUTO
17:40:17 :  Model :
17:40:17 : AUTO
17:40:17 :  Storage :
17:40:17 : Auto
17:40:17 :  Loader:
17:40:17 : Auto
17:40:17 :  Port  :
17:40:17 : Auto
17:40:17 :  Connection  :
17:40:17 : Flash Mode
17:40:17 :
17:40:17 : Searching EDL Port..
17:40:17 : [COM13]
17:40:17 : TPortConnection.Create...
17:40:17 : (COM13)
17:40:17 : ..Opening...
17:40:17 : Ok
17:40:18 : Getting device info
17:40:18 : .
17:40:18 : .
17:40:18 : .
17:40:19 : .
17:40:19 : .
17:40:20 : .
17:40:20 : .
17:40:20 : Serial No.:
17:40:20 : 0x797E85D8
17:40:20 : MSM ID    :
17:40:20 : 0x0008B0E1
17:40:21 : , SDM845-Qualcomm Snapdragon 845
17:40:21 : PBL Ver   :
17:40:21 : 00000001
17:40:21 : PK HASH   :
17:40:21 : C924A35F39CE1CDD1B8D5A9F3B8E3C51
17:40:21 :             317930431D7A9DD5A55028CF6965FE65
17:40:21 : 
17:40:21 : Firehose Loader
17:40:21 : [prog_ufs_firehose_sdm845_ddr_2.elf]
17:40:21 : Initializing SaharaBoot...
17:40:21 : Ok
17:40:21 : Sending
17:40:21 : .
17:40:21 : .
17:40:21 : .
17:40:21 : .
17:40:21 : .
17:40:21 : .
17:40:21 : .
17:40:21 : .
17:40:21 : .
17:40:21 : .
17:40:21 : .
17:40:21 : .
17:40:21 : .
17:40:21 : .
17:40:21 : .
17:40:21 : .
17:40:21 : .
17:40:21 : .
17:40:21 : .
17:40:21 : .
17:40:21 : .
17:40:21 : .
17:40:21 : .
17:40:21 : .
17:40:21 : .
17:40:21 : .
17:40:21 : .
17:40:21 : .
17:40:21 : .
17:40:21 : .
17:40:21 : .
17:40:21 : .
17:40:21 : .
17:40:21 : .
17:40:21 : .
17:40:21 : .
17:40:21 : .
17:40:26 : Ok
17:40:26 :
17:40:26 : Connecting to Firehose...
17:40:27 : Ping
17:40:27 : .
17:40:27 : .
17:40:27 : .
17:40:27 : .
17:40:27 : .
17:40:27 : NOTE : FILTERED : <
17:40:27 : .
17:40:27 : NOTE : FILTERED : ?
17:40:27 : .
17:40:27 : NOTE : FILTERED : x
17:40:27 : .
17:40:27 : NOTE : FILTERED : m
17:40:27 : .
17:40:27 : NOTE : FILTERED : l
17:40:27 : .
17:40:27 :  Ok
17:40:27 : Configuration
17:40:27 : .
17:40:27 : Xiaomi Authentication needed...
17:40:33 : User Cancelled Authentication Process.
17:40:33 : Running :
17:40:33 : Failed
17:40:33 : Device is not in Firehose Mode
17:40:33 :
17:40:33 : Elapsed Time : 00:00:15
17:40:33 :
17:40:33 :
17:40:33 : TPortConnection.Destroy...
17:40:33 : ..Closing...
17:40:33 : Ok..
17:40:40 : Hydra Qualcomm  Tool  Ver 1.0.1 Build 88
17:40:40 : Windows 7 Service Pack 1 (Version 6.1, Build 7601, 32-bit Edition)
17:40:40 : Intel(R) Core(TM) i3-7100 CPU @ 3.90GHz       
17:40:40 : Intel(R) HD Graphics 630
17:40:40 : Ram Installed :
17:40:40 : 3 GB
17:40:40 : Windows Access Right
17:40:40 : Admin
17:40:41 : ******* Dongle Info *******
17:40:41 : Version    :
17:40:41 : Hydra Tool v 1.1
17:40:41 : Serial     :
17:40:41 : 190400000765
17:40:41 : Initialize :
17:40:41 : OKAY
17:40:41 : Status     :
17:40:41 : Activated
17:40:41 : Life       :
17:40:41 : 0-
17:40:41 : [3-
17:40:41 : 0-
17:40:41 : 0-
17:40:41 : 0-
17:40:41 : 0]
17:40:41 :
17:40:42 : PreOperation Configuration
17:40:42 :  Brand :
17:40:42 : AUTO
17:40:42 :  Model :
17:40:42 : AUTO
17:40:42 :  Storage :
17:40:42 : Auto
17:40:42 :  Loader:
17:40:42 : Auto
17:40:42 :  Port  :
17:40:42 : Auto
17:40:42 :  Connection  :
17:40:42 : Flash Mode
17:40:42 :
17:40:42 : Searching EDL Port..
17:40:42 : [COM13]
17:40:42 : TPortConnection.Create...
17:40:42 : (COM13)
17:40:42 : ..Opening...
17:40:42 : Ok
17:40:43 : Getting device info
17:40:43 : .
17:40:43 : .
17:40:43 : Device MODE :
17:40:43 : SAHARA
17:40:43 :
17:40:43 : Connecting to Firehose...
17:40:44 : Ping
17:40:44 : .
17:40:44 : .
17:40:44 : .
17:40:44 : .
17:40:44 : .
17:40:44 : NOTE : FILTERED : <
17:40:44 : .
17:40:44 : NOTE : FILTERED : ?
17:40:44 : .
17:40:44 : NOTE : FILTERED : x
17:40:44 : .
17:40:44 : NOTE : FILTERED : m
17:40:44 : .
17:40:44 : NOTE : FILTERED : l
17:40:44 : .
17:40:44 :  Ok
17:40:44 : Configuration
17:40:44 : .
17:40:44 : Xiaomi Authentication needed...
17:40:46 : Signature Request ->
17:40:46 :  .
17:40:46 : blob[AQAAAEEBAADYhX55_fCpkG6MNylo91gD_7TZPg]
17:40:46 : Checking Internet connection....
17:40:46 :
17:40:47 :  - Hydra Is Online
17:40:47 : Connecting to Hydra Xiaomi Server...
17:40:48 :  - ERROR  : XIAOMI SERVER IS CURRENTLY OFFLINE
17:40:48 :
17:40:48 :  - Unable to generate authkey...
17:40:48 : Running :
17:40:48 : Failed
17:40:48 : Device is not in Firehose Mode
17:40:48 :
17:40:48 : Elapsed Time : 00:00:05
17:40:48 :
17:40:48 :
17:40:48 : TPortConnection.Destroy...
17:40:48 : ..Closing...
17:40:48 : Ok..
17:42:02 : Hydra Qualcomm  Tool  Ver 1.0.1 Build 88
17:42:02 : Windows 7 Service Pack 1 (Version 6.1, Build 7601, 32-bit Edition)
17:42:02 : Intel(R) Core(TM) i3-7100 CPU @ 3.90GHz       
17:42:02 : Intel(R) HD Graphics 630
17:42:02 : Ram Installed :
17:42:02 : 3 GB
17:42:02 : Windows Access Right
17:42:02 : Admin
17:42:03 : ******* Dongle Info *******
17:42:03 : Version    :
17:42:03 : Hydra Tool v 1.1
17:42:03 : Serial     :
17:42:03 : 190400000765
17:42:04 : Initialize :
17:42:04 : OKAY
17:42:04 : Status     :
17:42:04 : Activated
17:42:04 : Life       :
17:42:04 : 0-
17:42:04 : [3-
17:42:04 : 0-
17:42:04 : 0-
17:42:04 : 0-
17:42:04 : 0]
17:42:04 :
17:42:04 : PreOperation Configuration
17:42:04 :  Brand :
17:42:04 : XIAOMI
17:42:04 :  Model :
17:42:04 : PocoPhone F1 (beryllium)
17:42:04 :  Storage :
17:42:04 : Auto
17:42:04 :  Loader:
17:42:04 : prog_ufs_firehose_sdm845_ddr.elf
17:42:04 :  Port  :
17:42:04 : Auto
17:42:04 :  Connection  :
17:42:04 : Flash Mode
17:42:04 :
17:42:04 : Searching EDL Port..
17:42:04 : [COM13]
17:42:04 : TPortConnection.Create...
17:42:04 : (COM13)
17:42:04 : ..Opening...
17:42:05 : Ok
17:42:05 : Getting device info
17:42:05 : .
17:42:05 : .
17:42:05 : Device MODE :
17:42:05 : SAHARA
17:42:05 :
17:42:05 : Connecting to Firehose...
17:42:06 : Ping
17:42:06 : .
17:42:06 : .
17:42:06 : .
17:42:06 : .
17:42:06 : .
17:42:06 : NOTE : FILTERED : <
17:42:06 : .
17:42:06 : NOTE : FILTERED : ?
17:42:06 : .
17:42:06 : NOTE : FILTERED : x
17:42:06 : .
17:42:06 : NOTE : FILTERED : m
17:42:06 : .
17:42:06 : NOTE : FILTERED : l
17:42:06 : .
17:42:06 :  Ok
17:42:06 : Configuration
17:42:06 : .
17:42:06 : Xiaomi Authentication needed...
17:42:08 : User Cancelled Authentication Process.
17:42:08 : Running :
17:42:08 : Failed
17:42:08 : Device is not in Firehose Mode
17:42:08 :
17:42:08 : Elapsed Time : 00:00:03
17:42:08 :
17:42:08 :
17:42:08 : TPortConnection.Destroy...
17:42:08 : ..Closing...
17:42:08 : Ok..
17:42:30 : Hydra Qualcomm  Tool  Ver 1.0.1 Build 88
17:42:30 : Windows 7 Service Pack 1 (Version 6.1, Build 7601, 32-bit Edition)
17:42:30 : Intel(R) Core(TM) i3-7100 CPU @ 3.90GHz       
17:42:30 : Intel(R) HD Graphics 630
17:42:30 : Ram Installed :
17:42:30 : 3 GB
17:42:30 : Windows Access Right
17:42:30 : Admin
17:42:31 : ******* Dongle Info *******
17:42:31 : Version    :
17:42:31 : Hydra Tool v 1.1
17:42:31 : Serial     :
17:42:31 : 190400000765
17:42:32 : Initialize :
17:42:32 : OKAY
17:42:32 : Status     :
17:42:32 : Activated
17:42:32 : Life       :
17:42:32 : 0-
17:42:32 : [3-
17:42:32 : 0-
17:42:32 : 0-
17:42:32 : 0-
17:42:32 : 0]
17:42:32 :
17:42:32 :
17:42:32 : Searching EDL Port..
17:42:32 : [COM13]
17:42:32 : TPortConnection.Create...
17:42:32 : (COM13)
17:42:32 : ..Opening...
17:42:32 : Ok
17:42:33 : Getting device info
17:42:33 : .
17:42:33 : .
17:42:33 : Device MODE :
17:42:33 : SAHARA
17:42:33 :
17:42:33 : Connecting to Firehose...
17:42:34 : Ping
17:42:34 : .
17:42:34 : .
17:42:34 : .
17:42:34 : .
17:42:34 : .
17:42:34 : NOTE : FILTERED : <
17:42:34 : .
17:42:34 : NOTE : FILTERED : ?
17:42:34 : .
17:42:34 : NOTE : FILTERED : x
17:42:34 : .
17:42:34 : NOTE : FILTERED : m
17:42:34 : .
17:42:34 : NOTE : FILTERED : l
17:42:34 : .
17:42:34 :  Ok
17:42:34 : Rebooting Phone....
17:42:34 :  Ok
17:42:34 : Ok
17:42:34 :
17:42:34 : TPortConnection.Destroy...
17:42:34 : ..Closing...
17:42:34 : Ok..
17:43:24 : Hydra Qualcomm  Tool  Ver 1.0.1 Build 88
17:43:24 : Windows 7 Service Pack 1 (Version 6.1, Build 7601, 32-bit Edition)
17:43:24 : Intel(R) Core(TM) i3-7100 CPU @ 3.90GHz       
17:43:24 : Intel(R) HD Graphics 630
17:43:24 : Ram Installed :
17:43:24 : 3 GB
17:43:24 : Windows Access Right
17:43:24 : Admin
17:43:25 : ******* Dongle Info *******
17:43:25 : Version    :
17:43:25 : Hydra Tool v 1.1
17:43:25 : Serial     :
17:43:25 : 190400000765
17:43:26 : Initialize :
17:43:26 : OKAY
17:43:26 : Status     :
17:43:26 : Activated
17:43:26 : Life       :
17:43:26 : 0-
17:43:26 : [3-
17:43:26 : 0-
17:43:26 : 0-
17:43:26 : 0-
17:43:26 : 0]
17:43:26 :
17:43:26 : Searching Device By Fastboot
17:43:27 : Device Found...
17:43:27 :
17:43:27 : Reading Information...
17:43:27 : Product    :
17:43:27 : product: beryllium
17:43:27 : Serial No. :
17:43:27 : serialno: b4a4f031
17:43:27 : version    :
17:43:27 : getvar:version FAILED (remote: GetVar Variable Not found)
17:43:27 : Secure     :
17:43:27 : secure: yes
17:43:27 : Device Info:
17:43:27 :     Verity mode: true
17:43:27 :     Device unlocked: true
17:43:27 :     Device critical unlocked: true
17:43:27 :     Charger screen enabled: false
17:43:27 :
17:43:27 : Elapsed Time : 00:00:01
17:43:27 :
18:28:10 : Hydra Qualcomm  Tool  Ver 1.0.1 Build 88
18:28:10 : Windows 7 Service Pack 1 (Version 6.1, Build 7601, 32-bit Edition)
18:28:10 : Intel(R) Core(TM) i3-7100 CPU @ 3.90GHz       
18:28:10 : Intel(R) HD Graphics 630
18:28:10 : Ram Installed :
18:28:10 : 3 GB
18:28:10 : Windows Access Right
18:28:10 : Admin
18:28:10 :
18:28:10 :
18:28:11 : ******* Dongle Info *******
18:28:11 : Version    :
18:28:11 : Hydra Tool v 1.1
18:28:11 : Serial     :
18:28:11 : 190400000765
18:28:11 : Initialize :
18:28:11 : OKAY
18:28:11 : Status     :
18:28:11 : Activated
18:28:11 : Life       :
18:28:11 : 0-
18:28:11 : [3-
18:28:11 : 0-
18:28:11 : 0-
18:28:11 : 0-
18:28:11 : 0]
18:28:11 :
18:28:47 :
18:28:47 : Image Path : C:\Users\STONE\Desktop\New folder (2)\beryllium_global_images_V11.0.6.0.QEJMIXM_20200227.0000.00_10.0_global
18:28:47 : Scanning rawprogram xml
18:28:53 :
18:28:53 : Image Path : C:\Users\STONE\Desktop\New folder (2)\beryllium_global_images_V11.0.6.0.QEJMIXM_20200227.0000.00_10.0_global\images
18:28:53 : Scanning rawprogram xml
18:28:54 :  * rawprogram0.xml
18:28:54 :  * rawprogram1.xml
18:28:54 :  * rawprogram2.xml
18:28:54 :  * rawprogram3.xml
18:28:54 :  * rawprogram4.xml
18:28:54 :  * rawprogram5.xml
18:28:54 : 6 RawXML Detected and Loaded 102 Items
18:28:54 : C:\Users\STONE\Desktop\New folder (2)\beryllium_global_images_V11.0.6.0.QEJMIXM_20200227.0000.00_10.0_global\images\C:\Users\STONE\Desktop\New folder (2)\beryllium_global_images_V11.0.6.0.QEJMIXM_20200227.0000.00_10.0_global\images\System.img
18:28:56 :
18:28:56 : Reading System Image Info ..........
18:28:56 : Model           :   
18:28:56 : Brand           :   
18:28:56 : Android Ver     :    10
18:28:56 : Miui Ver        :    V11
18:28:56 : Manufacturer    :    Xiaomi
18:28:56 : Device          :   
18:28:56 : Mod_device           :    beryllium_global
18:28:56 : Display ID      :   
18:28:56 : Security Patch      :    2020-02-01
18:28:56 : Kernel ID        :    2020-02-01
18:28:56 :
18:28:56 : ****** CHECK IF MATCH WITH YOUR PHONE *********
18:28:56 :
18:28:56 :  * patch0.xml
18:28:56 :  * patch1.xml
18:28:56 :  * patch2.xml
18:28:56 :  * patch3.xml
18:28:56 :  * patch4.xml
18:28:56 :  * patch5.xml
18:28:56 : 6 PatchXML Detected and Loaded 156 Items
18:29:07 : Hydra Qualcomm  Tool  Ver 1.0.1 Build 88
18:29:07 : Windows 7 Service Pack 1 (Version 6.1, Build 7601, 32-bit Edition)
18:29:07 : Intel(R) Core(TM) i3-7100 CPU @ 3.90GHz       
18:29:07 : Intel(R) HD Graphics 630
18:29:07 : Ram Installed :
18:29:07 : 3 GB
18:29:07 : Windows Access Right
18:29:07 : Admin
18:29:08 : ******* Dongle Info *******
18:29:08 : Version    :
18:29:08 : Hydra Tool v 1.1
18:29:08 : Serial     :
18:29:08 : 190400000765
18:29:09 : Initialize :
18:29:09 : OKAY
18:29:09 : Status     :
18:29:09 : Activated
18:29:09 : Life       :
18:29:09 : 0-
18:29:09 : [3-
18:29:09 : 0-
18:29:09 : 0-
18:29:09 : 0-
18:29:09 : 0]
18:29:09 :
18:29:10 : Searching Device By Fastboot
18:29:10 : Device Found...
18:29:10 :
18:29:10 : Reading Information...
18:29:10 : Product    :
18:29:10 : product: beryllium
18:29:10 : Serial No. :
18:29:10 : serialno: b4a4f031
18:29:10 : version    :
18:29:10 : getvar:version FAILED (remote: GetVar Variable Not found)
18:29:10 : Secure     :
18:29:10 : secure: yes
18:29:10 : Device Info:
18:29:10 :     Verity mode: true
18:29:10 :     Device unlocked: true
18:29:10 :     Device critical unlocked: true
18:29:10 :     Charger screen enabled: false
18:29:10 : --------------------------
18:29:10 : Fastboot Flashing...
18:29:10 :  -switch
18:29:10 : (dummy.img)
18:29:10 :  Ok
18:29:10 :  -misc
18:29:10 : (misc.img)
18:29:10 :  Ok
18:29:10 :  -logfs
18:29:10 : (logfs_ufs_8mb.bin)
18:29:10 :  Ok
18:29:10 :  -persist
18:29:10 : (persist.img)
18:29:10 :  Skipped
18:29:10 :  -cust
18:29:10 : (cust.img)
18:29:20 :  Ok
18:29:20 :  -recovery
18:29:20 : (recovery.img)
18:29:22 :  Ok
18:29:22 :  -cache
18:29:22 : (cache.img)
18:29:23 :  Ok
18:29:23 :  -userdata
18:29:23 : (userdata.img)
18:29:25 :  Ok
18:29:25 :  -xbl_config_a
18:29:25 : (xbl_config.img)
18:29:26 :  Ok
18:29:26 :  -xbl_a
18:29:26 : (xbl.img)
18:29:26 :  Ok
18:29:26 :  -xbl_config_b
18:29:26 : (xbl_config.img)
18:29:26 :  Ok
18:29:26 :  -xbl_b
18:29:26 : (xbl.img)
18:29:26 :  Ok
18:29:26 :  -limits
18:29:26 : (dummy.img)
18:29:26 :  Ok
18:29:26 :  -qupfw_a
18:29:26 : (qupfw.img)
18:29:26 :  Ok
18:29:26 :  -qupfw_b
18:29:26 : (qupfw.img)
18:29:26 :  Ok
18:29:26 :  -storsec_a
18:29:26 : (storsec.img)
18:29:26 :  Ok
18:29:26 :  -storsec_b
18:29:26 : (storsec.img)
18:29:26 :  Ok
18:29:26 :  -devcfg_a
18:29:26 : (devcfg.img)
18:29:26 :  Ok
18:29:26 :  -devcfg_b
18:29:26 : (devcfg.img)
18:29:27 :  Ok
18:29:27 :  -aop_a
18:29:27 : (aop.img)
18:29:27 :  Ok
18:29:27 :  -aop_b
18:29:27 : (aop.img)
18:29:27 :  Ok
18:29:27 :  -cmnlib_a
18:29:27 : (cmnlib.img)
18:29:27 :  Ok
18:29:27 :  -cmnlib_b
18:29:27 : (cmnlib.img)
18:29:27 :  Ok
18:29:27 :  -cmnlib64_a
18:29:27 : (cmnlib64.img)
18:29:27 :  Ok
18:29:27 :  -cmnlib64_b
18:29:27 : (cmnlib64.img)
18:29:27 :  Ok
18:29:27 :  -keymaster_a
18:29:27 : (keymaster.img)
18:29:27 :  Ok
18:29:27 :  -keymaster_b
18:29:27 : (keymaster.img)
18:29:27 :  Ok
18:29:27 :  -bluetooth
18:29:27 : (bluetooth.img)
18:29:27 :  Ok
18:29:27 :  -hyp_a
18:29:27 : (hyp.img)
18:29:27 :  Ok
18:29:27 :  -hyp_b
18:29:27 : (hyp.img)
18:29:27 :  Ok
18:29:27 :  -abl_a
18:29:27 : (abl.img)
18:29:27 :  Ok
18:29:27 :  -abl_b
18:29:27 : (abl.img)
18:29:27 :  Ok
18:29:27 :  -tz_a
18:29:27 : (tz.img)
18:29:28 :  Ok
18:29:28 :  -tz_b
18:29:28 : (tz.img)
18:29:28 :  Ok
18:29:28 :  -logo
18:29:28 : (logo.img)
18:29:29 :  Ok
18:29:29 :  -dsp
18:29:29 : (dsp.img)
18:29:30 :  Ok
18:29:30 :  -boot
18:29:30 : (boot.img)
18:29:31 :  Ok
18:29:31 :  -modem
18:29:31 : (modem.img)
18:29:37 :  Ok
18:29:37 :  -vendor
18:29:37 : (vendor.img)
18:30:08 :  Ok
18:30:08 :  -system
18:30:08 : (system.img)
18:32:43 :  Ok
18:32:43 :  -ImageFv
18:32:43 : (imagefv.elf)
18:32:47 :  Ok
18:32:47 : All Done
18:32:47 : --------------------------
18:32:48 :
18:32:48 : Elapsed Time : 00:03:39
18:32:48 :
 
Top