Hydra Tool Ver 2024.3.8.0
******* Dongle Info *******
Version : Hydra Tool v 1.2
Serial :
Initialize : OKAY
Status : Activated
Life : 0 [0-0-0-0-0]
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Xiaomi Tool
Mi Account
Remove MiAccount[New Method]
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
PreOperation Configuration
Brand : AUTO Model : AUTO Storage : Auto
Loader: Auto
Port : Auto
Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM67)
SymbolicName :\\?\usb#vid_05c6&pid_9008#6&3a6aa860&1&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :05/29/2019,2.1.3.7
=========Sahara Boot=========
Initialize...Ok
Getting Info...
Serial No.: 0x6ABE9503
PK HASH : 57158eaf1814d78fd2b3105ece4db18a817a08ac664a5782a925f3ff8403d39a
HW_ID : 000BF0E100720000
MSM ID : 0x000BF0E1, SDM439-Qualcomm Snapdragon 439/FAADANAZA
MODEL_ID : 0x0000
OEM_ID : 0x0072 - XIAOMI
Hydra Enable Auto search Firehose..
#Please wait...
#Search by filename filter.....
#Found 22 Compatible Files ..Found match Firehose...
Firehose Loader[000bf0e100720000_57158eaf1814d78f_05ac3fce_xiaomi_auth_peek_8937.fhprg]
--------------------------------------------------
Header Type : OLD
TargetMSM : 8937
Tag : _auth_peek
Version : 3
Code_size : 320
Signature_size : 256
fhVendor : XIAOMI
HW_ID : 000BF0E100720000
Vendor : XIAOMI
OEM_ID : 0072
MODEL_ID : 0000
SW_ID : 0000000100000003
APP_ID :
pk_hash : 57158eaf1814d78fd2b3105ece4db18a817a08ac664a5782a925f3ff8403d39a
OEM_VERSION : c3-miui-ota-bd106.bj
IMAGE_VARIANT : FAADANAZA
QC_VERSION : BOOT.BF.3.3.2-00073
--------------------------------------------------
Preparing to write loader...Ok
Sending .......................Ok
Connecting to Firehose...
Ping... Ok
Configuration[FHProt_Auto].
Xiaomi Authentication needed...
Signature Request -> bob[VMsrgwh71kH81wSob01Dha494m-]
Signature @256bytes Authentication.... Accepted......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1
*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 962971792
Firmware Version : 165
Product Name : HAG4a2
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 30777344[14.676 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Protocol : Universal
Running : Ok
Reading GPT[3]
Drive [0] 60 Items
Drive [1] 0 Items
Drive [2] 0 Items
--------------- Reading build.prop content ---------------
ID : QKQ1.191014.001
SDK : 29
Release : 10
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-GB
Security Patch : 2021-11-01
--------------- end of build.prop content ---------------
Auto Backup Security partitions...
Reading Security Items....
- modemst1(modemst1.bin), 8 MB = Ok
- modemst2(modemst2.bin), 8 MB = Ok
- fsg(fsg.bin), 8 MB = Ok
- fsc(fsc.bin), 7.5 KB = Ok
- persist(persist.bin), 32 MB = Ok
C:\Hydra Tool\Backup\QUALBackup\XIAOMI\6ABE9503\Auto_Backup\040524113055
Backup Security Success....
Reading GPT[3]
Drive [0] 60 Items
Drive [1] 0 Items
Drive [2] 0 Items
Backing up Partition for safety...Ok
Scanning Patching address...
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]Done!!
Total Items patched : 64
Successfully patched address..
Rebooting Phone.... Ok
Action Result : Ok
Elapsed Time : 00:01:16
******* Dongle Info *******
Version : Hydra Tool v 1.2
Serial :
Initialize : OKAY
Status : Activated
Life : 0 [0-0-0-0-0]
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Xiaomi Tool
Mi Account
Remove MiAccount[New Method]
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
PreOperation Configuration
Brand : AUTO Model : AUTO Storage : Auto
Loader: Auto
Port : Auto
Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM67)
SymbolicName :\\?\usb#vid_05c6&pid_9008#6&3a6aa860&1&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :05/29/2019,2.1.3.7
=========Sahara Boot=========
Initialize...Ok
Getting Info...
Serial No.: 0x6ABE9503
PK HASH : 57158eaf1814d78fd2b3105ece4db18a817a08ac664a5782a925f3ff8403d39a
HW_ID : 000BF0E100720000
MSM ID : 0x000BF0E1, SDM439-Qualcomm Snapdragon 439/FAADANAZA
MODEL_ID : 0x0000
OEM_ID : 0x0072 - XIAOMI
Hydra Enable Auto search Firehose..
#Please wait...
#Search by filename filter.....
#Found 22 Compatible Files ..Found match Firehose...
Firehose Loader[000bf0e100720000_57158eaf1814d78f_05ac3fce_xiaomi_auth_peek_8937.fhprg]
--------------------------------------------------
Header Type : OLD
TargetMSM : 8937
Tag : _auth_peek
Version : 3
Code_size : 320
Signature_size : 256
fhVendor : XIAOMI
HW_ID : 000BF0E100720000
Vendor : XIAOMI
OEM_ID : 0072
MODEL_ID : 0000
SW_ID : 0000000100000003
APP_ID :
pk_hash : 57158eaf1814d78fd2b3105ece4db18a817a08ac664a5782a925f3ff8403d39a
OEM_VERSION : c3-miui-ota-bd106.bj
IMAGE_VARIANT : FAADANAZA
QC_VERSION : BOOT.BF.3.3.2-00073
--------------------------------------------------
Preparing to write loader...Ok
Sending .......................Ok
Connecting to Firehose...
Ping... Ok
Configuration[FHProt_Auto].
Xiaomi Authentication needed...
Signature Request -> bob[VMsrgwh71kH81wSob01Dha494m-]
Signature @256bytes Authentication.... Accepted......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1
*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 962971792
Firmware Version : 165
Product Name : HAG4a2
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 30777344[14.676 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Protocol : Universal
Running : Ok
Reading GPT[3]
Drive [0] 60 Items
Drive [1] 0 Items
Drive [2] 0 Items
--------------- Reading build.prop content ---------------
ID : QKQ1.191014.001
SDK : 29
Release : 10
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-GB
Security Patch : 2021-11-01
--------------- end of build.prop content ---------------
Auto Backup Security partitions...
Reading Security Items....
- modemst1(modemst1.bin), 8 MB = Ok
- modemst2(modemst2.bin), 8 MB = Ok
- fsg(fsg.bin), 8 MB = Ok
- fsc(fsc.bin), 7.5 KB = Ok
- persist(persist.bin), 32 MB = Ok
C:\Hydra Tool\Backup\QUALBackup\XIAOMI\6ABE9503\Auto_Backup\040524113055
Backup Security Success....
Reading GPT[3]
Drive [0] 60 Items
Drive [1] 0 Items
Drive [2] 0 Items
Backing up Partition for safety...Ok
Scanning Patching address...
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]Done!!
Total Items patched : 64
Successfully patched address..
Rebooting Phone.... Ok
Action Result : Ok
Elapsed Time : 00:01:16