★★★ Post All Successfully Repaired Phones By Hydra Tool ★★★

Hydra Tool

Product Manager
Aug 31, 2019
298
319
Ukraine
Redmi Note 8T willow FRP Remove Success by Hydra Tool

Xiaomi Redmi note 8t willow Reset FRP without credits, with hydra tool standalone server by hydra dongle



PreOperation Configuration
Brand : XIAOMI Model : Redmi Note 8T (wiilow) Storage : Auto
Loader: Xiaomi_redmi8t_loader.elf
Port : Auto
Connection : Flash Mode

Searching EDL Port..[COM52]
TPortConnection.Create...(COM52)..Opening...Ok
Getting device info.......
Serial No.: 0xECF29658
MSM ID : 0x0010A0E1,
PBL Ver : 00000001
PK HASH : 1BEBE3863A6781DB4B01086063007334
DE9E5CA14971C7C4F4358EC9D79CDA46

Firehose Loader[Xiaomi_redminote8_loader.elf]
Initializing SaharaBoot... Ok
Sending ..............................Ok

Connecting to Firehose...
Ping.....
NOTE : FILTERED : <.
NOTE : FILTERED : ?.
NOTE : FILTERED : x.
NOTE : FILTERED : m.
NOTE : FILTERED : l. Ok
Configuration........
Identifying Chip....Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Jul 3 2019 - 22:23:56

* STORAGE DEVICE INFO *
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 19
Serial Number : 337546819
Firmware Version : 4
Product Name : S0J9K8
Physical Partitions : 4
Total Logical Blocks:
Drive [0] 122142720[58,242 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Drive [3] 32768[16 MB]
Running : Ok

Reading GPT[4]Ok
Phone Information......
Model : Redmi Note 8T
Brand : xiaomi
Android Ver : 9
Miui Ver : V11
Manufacturer : Xiaomi
Device : willow
Mod_device : willow_global
Display ID : PKQ1.190616.001
Security Patch : 2020-01-01
Kernel ID : 2020-01-01
Fingerprint : xiaomi/willow/willow:9/PKQ1.190616.001/V11.0.2.0.PCXMIXM:user/release-keys
ro_product_hardware :
sys_hardware_version :

Reading GPT[4]Ok
* FRP Reset *
Resetting FRP...
Auto
Processing...
Executing ...
[Zero Wipe] Ok

Elapsed Time : 00:00:09


TPortConnection.Destroy.....Closing...Ok..
 

Hydra Tool

Product Manager
Aug 31, 2019
298
319
Ukraine
Redmi Note 7 Pro Flashing edl mode without credit

Redmi note 7 pro violet write firmware without credit, with hydra tool stand alone server



Flashing rom log :

Port selected..[COM235]
TPortConnection.Create...(COM235)..Opening...Ok
Getting device info.......
Serial No.: 0x5D43DC67
MSM ID : 0x000950E1, SM6150-Qualcomm Snapdragon 675
PBL Ver : 00000001
PK HASH : 1BEBE3863A6781DB4B01086063007334
DE9E5CA14971C7C4F4358EC9D79CDA46

Firehose Loader[Xiaomi_Redmi Note 7 Pro_Sdm6150_ddr.elf]
Initializing SaharaBoot... Ok
Sending ...................................Ok

Connecting to Firehose...
Ping.....
NOTE : FILTERED : <.
NOTE : FILTERED : ?.
NOTE : FILTERED : x.
NOTE : FILTERED : m.
NOTE : FILTERED : l. Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[8Mp5cNYF0t6Qot1
Checking Internet connection....
- Hydra Is Online
Connecting to Hydra Xiaomi Server...

Signature @256bytes Authentication.... Accepted........
Identifying Chip....Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Jul 19 2019 - 01:12:10

* STORAGE DEVICE INFO *
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 3206792429
Firmware Version : 2
Product Name : DH6DAB
Physical Partitions : 4
Total Logical Blocks:
Drive [0] 122142720[58.242 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Drive [3] 32768[16 MB]
Running : Ok

Reading GPT[4]Ok
Phone Information......
Model : Redmi Note 7 Pro
Brand : xiaomi
Android Ver : 9
Miui Ver : V11
Manufacturer : Xiaomi
Device : violet
Mod_device : violet_in_global
Display ID : PKQ1.181203.001
Security Patch : 2020-04-01
Kernel ID : 2020-04-01
Fingerprint : xiaomi/violet/violet:9/PKQ1.181203.001/V11.0.9.0.PFHINXM:user/release-keys
ro_product_hardware :
sys_hardware_version :


----------------------------
Flashing Selected Partitions
multiimgoem(0)[multi_image.mbn] Ok
vbmeta(0)[vbmeta.img] Ok
qupfw(0)[qupv3fw.elf] Ok
xbl_config(0)[xbl_config.elf] Ok
storsec(0)[storsec.mbn] Ok
storsecbak(0)[storsec.mbn] Ok
aop(0)[aop.mbn] Ok
aopbak(0)[aop.mbn] Ok
hyp(0)[hyp.mbn] Ok
hypbak(0)[hyp.mbn] Ok
cmnlib(0)[cmnlib.mbn] Ok
cmnlibbak(0)[cmnlib.mbn] Ok
cmnlib64(0)[cmnlib64.mbn] Ok
cmnlib64bak(0)[cmnlib64.mbn] Ok
keymaster(0)[km4.mbn] Ok
keymasterbak(0)[km4.mbn] Ok
bluetooth(0)[BTFM.bin] Ok
devcfg(0)[devcfg.mbn] Ok
devcfgbak(0)[devcfg.mbn] Ok
abl(0)[abl.elf] Ok
ablbak(0)[abl.elf] Ok
imagefv(0)[imagefv.elf] Ok
uefisecapp(0)[uefi_sec.mbn] Ok
uefisecappbak(0)[uefi_sec.mbn] Ok
misc(0)[misc.img] Ok
xbl(0)[xbl.elf] Ok
xblbak(0)[xbl.elf] Ok
tz(0)[tz.mbn] Ok
tzbak(0)[tz.mbn] Ok
logfs(0)[logfs_ufs_8mb.bin] Ok
dtbo(0)[dtbo.img] Ok
dsp(0)[dspso.bin] Ok
splash(0)[splash.img] Ok
persist(0)[persist.img] Ok
boot(0)[boot.img] Ok
recovery(0)[recovery.img] Ok
modem(0)[NON-HLOS.bin] Ok
cache(0)[cache.img] Ok
cust(0)[cust.img] Ok
system(0)[system.img] Ok
vendor(0)[vendor.img] Ok
userdata(0)[userdata.img] Ok
PrimaryGPT(0)[gpt_main0.bin] Ok

Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-33.] OK
0 [CRC32(2,11264)] OK
0 [CRC32(NUM_DISK_SECTORS-33.,11264)] OK
0 [0] OK
0 [CRC32(1,92)] OK
0 [0] OK
0 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 0
Set bootable storage drive 0 Ok
Rebooting Phone.... Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:04:00
 

Hydra Tool

Product Manager
Aug 31, 2019
298
319
Ukraine
Redmi 8A olivelite FRP Remove Success by Hydra dongle



Xiaomi redmi 8a google account remove log :

PreOperation Configuration
Brand : XIAOMI Model : Redmi 8A (olivelite) Storage : Auto
Loader: Xiaomi_Redmi_8_Olive.mbn
Port : Auto
Connection : Flash Mode

Searching EDL Port..[COM139]
TPortConnection.Create...(COM139)..Opening...Ok
Getting device info.......
Serial No.: 0x5FD605C8
MSM ID : 0x000BF0E1, SDM439-Qualcomm Snapdragon 439
PBL Ver : 00000001
PK HASH : 57158EAF1814D78FD2B3105ECE4DB18A
817A08AC664A5782A925F3FF8403D39A

Firehose Loader[Xiaomi_Redmi_8_Olive.mbn]
Initializing SaharaBoot... Ok
Sending .......................Ok

Connecting to Firehose...
Ping... Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[RZt-JDfJTJmJzRXRsSKxRv1IJlN]
Checking Internet connection....
- Hydra Is Online
Connecting to Hydra Xiaomi Server...

Signature @256bytes Authentication.... Accepted......
Identifying Chip....Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

* STORAGE DEVICE INFO *
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 660211609
Firmware Version : 1
Product Name : QD63MB
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 61071360[29,121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Running : Ok

Reading GPT[3]Ok
Phone Information......
Model : Redmi 8A
Brand : Xiaomi
Android Ver : 9
Miui Ver : V10
Manufacturer : Xiaomi
Device : olivelite
Mod_device : olivelite_global
Display ID : ZQL2116-olivelite-build-20190922162324
Security Patch : 2019-09-01
Kernel ID : 2019-09-01
Fingerprint : Xiaomi/olivelite/olivelite:9/PKQ1.190319.001/V10.3.2.0.PCPMIXM:user/release-keys
ro_product_hardware :
sys_hardware_version :

Reading GPT[3]Ok
* FRP Reset *
Resetting FRP...
Auto
Processing...
Executing ...
[Zero Wipe] Ok

Elapsed Time : 00:00:17


TPortConnection.Destroy.....Closing...Ok..
 

Hydra Tool

Product Manager
Aug 31, 2019
298
319
Ukraine
Redmi 8 olive FRP Remove by Hydra Tool Without Credit

Xiaomi Redmi 8 (olive) Google Account Reset QdLoader 9008 EDL Port with test point



PreOperation Configuration
Brand : XIAOMI Model : Redmi 8 (olive) Storage : Auto
Loader: Xiaomi_Redmi_8_Olive.mbn
Port : Auto
Connection : Flash Mode

Searching EDL Port..[COM16]
TPortConnection.Create...(COM16)..Opening...Ok
Getting device info.......
Serial No.: 0xE2FFC1EA
MSM ID : 0x000BF0E1, SDM439-Qualcomm Snapdragon 439
PBL Ver : 00000001
PK HASH : 57158EAF1814D78FD2B3105ECE4DB18A
817A08AC664A5782A925F3FF8403D39A

Firehose Loader[Xiaomi_Redmi_8_Olive.mbn]
Initializing SaharaBoot... Ok
Sending .......................Ok

Connecting to Firehose...
Ping... Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[8Tsv69gpdonZkefHvktnsZaIppp]
Checking Internet connection....
- Hydra Is Online
Connecting to Hydra Xiaomi Server...

Signature @256bytes Authentication.... Accepted......
Identifying Chip....Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

* STORAGE DEVICE INFO *
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 2539987094
Firmware Version : 909127728
Product Name : hB8aP>
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 61071360[29,121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Running : Ok

Reading GPT[3]Ok
Phone Information......
Model : Redmi 8
Brand : Xiaomi
Android Ver : 9
Miui Ver : V11
Manufacturer : Xiaomi
Device : olive
Mod_device : olive_global
Display ID : ZQL2115-olive-build-20200119015852
Security Patch : 2020-01-01
Kernel ID : 2020-01-01
Fingerprint : Xiaomi/olive/olive:9/PKQ1.190319.001/V11.0.6.0.PCNMIXM:user/release-keys
ro_product_hardware :
sys_hardware_version :

Reading GPT[3]Ok
* FRP Reset *
Resetting FRP...
Auto
Processing...
Executing ...
[Zero Wipe] Ok

Elapsed Time : 00:00:14


TPortConnection.Destroy.....Closing...Ok..
 

Hydra Tool

Product Manager
Aug 31, 2019
298
319
Ukraine
Redmi Note 7 Pro FRP Remove Without Credit By Hydra Tool

Xiaomi Redmi Note 7 pro violet google account reset EDL Mode with testpoint



PreOperation Configuration
Brand : XIAOMI Model : Redmi Note 7 Pro (violet) Storage : Auto
Loader: Xiaomi_Redmi Note 7 Pro_Sdm6150_ddr.elf
Port : Auto
Connection : Flash Mode

Searching EDL Port..[COM41]
TPortConnection.Create...(COM41)..Opening...Ok
Getting device info..
Device MODE : SAHARA

Connecting to Firehose...
Ping.....
NOTE : FILTERED : <.
NOTE : FILTERED : ?.
NOTE : FILTERED : x.
NOTE : FILTERED : m.
NOTE : FILTERED : l. Ok
Configuration........
Identifying Chip....Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Jul 19 2019 - 01:12:10

* STORAGE DEVICE INFO *
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 834785305
Firmware Version : 875573296
Product Name : hC8aP>
Physical Partitions : 4
Total Logical Blocks:
Drive [0] 122142720[58.242 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Drive [3] 8192[4 MB]
Running : Ok

Reading GPT[4]Ok
Phone Information......
Model : Redmi Note 7 Pro
Brand : xiaomi
Android Ver : 9
Miui Ver : V11
Manufacturer : Xiaomi
Device : violet
Mod_device : violet_in_global
Display ID : PKQ1.181203.001
Security Patch : 2020-04-01
Kernel ID : 2020-04-01
Fingerprint : xiaomi/violet/violet:9/PKQ1.181203.001/V11.0.9.0.PFHINXM:user/release-keys
ro_product_hardware :
sys_hardware_version :

Reading GPT[4]Ok
* FRP Reset *
Resetting FRP...
Auto
Processing...
Executing ...
[Zero Wipe] Ok

Elapsed Time : 00:00:06


TPortConnection.Destroy.....Closing...Ok..
 

Hydra Tool

Product Manager
Aug 31, 2019
298
319
Ukraine
Redmi Note 7 Fix Unknown Baseband and IMEI by Hydra Dongle

Xiaomi lavender fix imei by adb and root



Starting ADB Server....
Searching Device By ADB
Device Found...
Model : Redmi Note 7
Brand : Xiaomi
Android Ver : 9
CPU abi : arm64-v8a
Software Version :
CSC Version :
Bootloader :
Board : sdm660
Display ID : PKQ1.180904.001
Security Patch : 2020-05-05
Emmc_size :
Platform : sdm660
Kernel ID : 2020-05-05
Marketname :
OTA Version Name :
SYS USB CONFIG : persist.adb
FRPPST : /dev/block/bootdevice/by-name/frp
FingerPrint : xiaomi/lavender/lavender:9/PKQ1.180904.001/V11.0.6.0.PFGMIXM:user/release-keys

Checking Root Status....
Root Status : Rooted
Root Version : 20.4:MAGISKSU



Checking Root Status....
Root Status : Rooted
Root Version : 20.4:MAGISKSU

Reading Security Backup.....

Reading Data - 1
Reading Data - 2
Reading Data - 3
Deleting Cookies....
Exception: Cannot create file "C:\Hydra Tool\adb\Security_Backup\Security_07-16-2020.sec". Sistem belirtilen yolu bulamıyor
Backup Security Success....
Rebooting To Mode, Please Wait....

Searching Device By Recovery
Device Found...
Wipe Security Success...

Reboooting Device, Please Wait....
Do Not Dissconnect device...

Starting ADB Server....
Searching Device By ADB
Device Found...

Checking Root Status....
Root Status : Rooted
Root Version : 20.4:MAGISKSU

Enabling Diag....
Enable Diag Done!!!
Searching for Diag Port....
Selected Comport : Auto
Searching Qualcomm Diag Port[FOUND](COM55)
Diag Port Found ON : COM55
Writting IMEI, Please Wait....
Firmware ID : MPSS.AT.3.1-00777-SDM660_GEN_PACK-1.260989.1.267581.1
Build Date : ay 13 202020:13:20Mar 13 202007:00:00sdm660.g
IMEI1 :
IMEI2 :
Repair IMEI Success, Please Wait..
Writting File, Please Wait....
Sending SPC to Device....
SPC Send Success
Restoring File....
Restore File Success
Repair IMEI Success, Rebooting Device...

Elapsed Time : 00:01:32
 

Hydra Tool

Product Manager
Aug 31, 2019
298
319
Ukraine
Redmi 8 olive Write Firmware by QdLoader Mode Without Auth
Flashing without auth, credit, server by hydra tool




Searching EDL Port..[COM16]
TPortConnection.Create...(COM16)..Opening...Ok
Getting device info.......
Serial No.: 0x7BC9F81E
MSM ID : 0x000BF0E1, SDM439-Qualcomm Snapdragon 439
PBL Ver : 00000001
PK HASH : 57158EAF1814D78FD2B3105ECE4DB18A
817A08AC664A5782A925F3FF8403D39A

Firehose Loader[Xiaomi_Redmi_8_Olive.mbn]
Initializing SaharaBoot... Ok
Sending .......................Ok

Connecting to Firehose...
Ping... Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[Tc37PtjbMQieZib6kVOJxwyN85v]
Checking Internet connection....
- Hydra Is Online
Connecting to Hydra Xiaomi Server...

Signature @256bytes Authentication.... Accepted......
Identifying Chip....Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1
Running : Ok

Reading GPT[1]Ok
Phone Information......
Model : Redmi 8
Brand : Xiaomi
Android Ver : 9
Miui Ver : V11
Manufacturer : Xiaomi
Device : olive
Mod_device : olive_global
Display ID : ZQL2115-olive-build-20200212222549
Security Patch : 2020-01-01
Kernel ID : 2020-01-01
Fingerprint : Xiaomi/olive/olive:9/PKQ1.190319.001/V11.0.7.0.PCNMIXM:user/release-keys
ro_product_hardware :
sys_hardware_version :


----------------------------
Flashing Selected Partitions
sec(0)[sec.dat] Skipped
config(0)[config.bin] Skipped
vbmeta(0)[vbmeta.img] Ok
vbmetabak(0)[vbmeta.img] Ok
devcfg(0)[devcfg.mbn] Ok
devcfgbak(0)[devcfg.mbn] Ok
apdp(0)[dummy.img] Ok
msadp(0)[dummy.img] Ok
sbl1(0)[sbl1.mbn] Ok
sbl1bak(0)[sbl1.mbn] Ok
rpm(0)[rpm.mbn] Ok
rpmbak(0)[rpm.mbn] Ok
cmnlib(0)[cmnlib_30.mbn] Ok
cmnlibbak(0)[cmnlib_30.mbn] Ok
cmnlib64(0)[cmnlib64_30.mbn] Ok
cmnlib64bak(0)[cmnlib64_30.mbn] Ok
keymaster(0)[km4.mbn] Ok
keymasterbak(0)[km4.mbn] Ok
misc(0)[misc.img] Ok
aboot(0)[emmc_appsboot.mbn] Ok
abootbak(0)[emmc_appsboot.mbn] Ok
tz(0)[tz.mbn] Ok
tzbak(0)[tz.mbn] Ok
dtbo(0)[dtbo.img] Ok
dtbobak(0)[dtbo.img] Ok
splash(0)[splash.img] Ok
dsp(0)[adspso.bin] Ok
dspbak(0)[adspso.bin] Ok
persist(0)[persist.img] Skipped
mdtp(0)[mdtp.img] Ok
mdtpbak(0)[mdtp.img] Ok
boot(0)[boot.img] Ok
recovery(0)[recovery.img] Ok
cache(0)[cache.img] Ok
modem(0)[NON-HLOS.bin] Ok
system(0)[system.img] Ok
vendor(0)[vendor.img] Ok
cust(0)[cust.img] Ok
userdata(0)[userdata.img] Ok
PrimaryGPT(0)[gpt_main0.bin] Ok

Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-33.] OK
0 [CRC32(2,8192)] OK
0 [CRC32(NUM_DISK_SECTORS-33.,8192)] OK
0 [0] OK
0 [CRC32(1,92)] OK
0 [0] OK
0 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 0
Set bootable storage drive 0 Ok
Rebooting Phone.... Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:08:05
 

Hydra Tool

Product Manager
Aug 31, 2019
298
319
Ukraine
Redmi 7A (pine) FRP Reset by Hydra Tool Without Credit and Auth

xiaomi redmi 7a google account remove testpoint edl mode



PreOperation Configuration
Brand : XIAOMI Model : Redmi 7A (pine) Storage : Auto
Loader: Xiaomi_Redmi.mbn
Port : Auto
Connection : Flash Mode

Searching EDL Port..[COM29]
TPortConnection.Create...(COM29)..Opening...Ok
Getting device info..
Device MODE : SAHARA

Connecting to Firehose...
Ping.. Ok
Configuration......
Identifying Chip....Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

* STORAGE DEVICE INFO *
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 1794808827
Firmware Version : 1
Product Name : QD63MB
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 61071360[29,121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Running : Ok

Reading GPT[3]Ok
Phone Information......
Model : Redmi 7A
Brand : Xiaomi
Android Ver : 9
Miui Ver : V10
Manufacturer : Xiaomi
Device : pine
Mod_device : pine_global
Display ID : ZQL1533-pine-build-20190701230949
Security Patch : 2019-06-01
Kernel ID : 2019-06-01
Fingerprint : Xiaomi/pine/pine:9/PKQ1.190319.001/V10.2.4.0.PCMMIXM:user/release-keys
ro_product_hardware :
sys_hardware_version :

Reading GPT[3]Ok
* FRP Reset *
Resetting FRP...
Auto
Processing...
Executing ...
[Zero Wipe] Ok

Elapsed Time : 00:00:03


TPortConnection.Destroy.....Closing...Ok..
 

Hydra Tool

Product Manager
Aug 31, 2019
298
319
Ukraine
PocoPhone F1 Write Firmware QdLoader 9008 EDL Mode
Xiaomi Pocophone F1 Unbrick System has been destroyed by Hydra Dongle without auth, without credit, without waiting server :)



Searching EDL Port..[COM234]
TPortConnection.Create...(COM234)..Opening...Ok
Getting device info..
Device MODE : SAHARA

Connecting to Firehose...
Ping.....
NOTE : FILTERED : <.
NOTE : FILTERED : ?.
NOTE : FILTERED : x.
NOTE : FILTERED : m.
NOTE : FILTERED : l. Ok
Configuration........
Identifying Chip........UFS Ok
Chip Configuration :
MemoryName : UFS
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Oct 10 2018 - 22:42:48

* STORAGE DEVICE INFO *
Memory Type : UFS
Block Size in Bytes : 4096
Page Size : 4096
Manufacturer ID : 462
Serial Number : 1297306958
Firmware Version : 100
Product Name : KLUCG2K1EA-B0C1
Physical Partitions : 6
Total Logical Blocks:
Drive [0] 14419968[55.008 GB]
Drive [1] 2048[8 MB]
Drive [2] 2048[8 MB]
Drive [3] 8192[32 MB]
Drive [4] 1179648[4.5 GB]
Drive [5] 8192[32 MB]
Running : Ok

Reading GPT[6]Ok
Phone Information.....
Model : POCO F1
Brand : Xiaomi
Android Ver : 8.1.0
Miui Ver : V10
Manufacturer : Xiaomi
Device : beryllium
Mod_device : beryllium_global
Display ID : OPM1.171019.026
Security Patch : 2018-08-01
Kernel ID : 2018-08-01
Fingerprint : Xiaomi/beryllium/beryllium:8.1.0/OPM1.171019.026/8.9.13:user/release-keys
ro_product_hardware :
sys_hardware_version :


----------------------------
Flashing Selected Partitions
switch(0)[dummy.img] Ok
misc(0)[misc.img] Ok
logfs(0)[logfs_ufs_8mb.bin] Ok
persist(0)[persist.img] Skipped
cust(0)[cust.img] Ok
recovery(0)[recovery.img] Ok
cache(0)[cache.img] Ok
userdata(0)[userdata.img] Ok
PrimaryGPT(0)[gpt_main0.bin] Ok
xbl_config_a(1)[xbl_config.img] Ok
xbl_a(1)[xbl.img] Ok
PrimaryGPT(1)[gpt_main1.bin] Ok
xbl_config_b(2)[xbl_config.img] Ok
xbl_b(2)[xbl.img] Ok
PrimaryGPT(2)[gpt_main2.bin] Ok
PrimaryGPT(3)[gpt_main3.bin] Ok
limits(4)[dummy.img] Ok
qupfw_a(4)[qupfw.img] Ok
qupfw_b(4)[qupfw.img] Ok
storsec_a(4)[storsec.img] Ok
storsec_b(4)[storsec.img] Ok
devcfg_a(4)[devcfg.img] Ok
devcfg_b(4)[devcfg.img] Ok
aop_a(4)[aop.img] Ok
aop_b(4)[aop.img] Ok
cmnlib_a(4)[cmnlib.img] Ok
cmnlib_b(4)[cmnlib.img] Ok
cmnlib64_a(4)[cmnlib64.img] Ok
cmnlib64_b(4)[cmnlib64.img] Ok
keymaster_a(4)[keymaster.img] Ok
keymaster_b(4)[keymaster.img] Ok
bluetooth(4)[bluetooth.img] Ok
hyp_a(4)[hyp.img] Ok
hyp_b(4)[hyp.img] Ok
abl_a(4)[abl.img] Ok
abl_b(4)[abl.img] Ok
tz_a(4)[tz.img] Ok
tz_b(4)[tz.img] Ok
logo(4)[logo.img] Ok
dsp(4)[dsp.img] Ok
boot(4)[boot.img] Ok
modem(4)[modem.img] Ok
vendor(4)[vendor.img] Ok
system(4)[system.img] Ok
PrimaryGPT(4)[gpt_main4.bin] Ok
ImageFv(5)[imagefv.elf] Ok
PrimaryGPT(5)[gpt_main5.bin] Ok

Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-6.] OK
0 [NUM_DISK_SECTORS-6.] OK
0 [NUM_DISK_SECTORS-6.] OK
0 [NUM_DISK_SECTORS-6.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-5.] OK
0 [CRC32(2,4096)] OK
0 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
0 [0] OK
0 [CRC32(1,92)] OK
0 [0] OK
0 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
1 [NUM_DISK_SECTORS-6.] OK
1 [NUM_DISK_SECTORS-6.] OK
1 [NUM_DISK_SECTORS-6.] OK
1 [NUM_DISK_SECTORS-6.] OK
1 [NUM_DISK_SECTORS-1.] OK
1 [NUM_DISK_SECTORS-1.] OK
1 [NUM_DISK_SECTORS-5.] OK
1 [CRC32(2,4096)] OK
1 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
1 [0] OK
1 [CRC32(1,92)] OK
1 [0] OK
1 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
2 [NUM_DISK_SECTORS-6.] OK
2 [NUM_DISK_SECTORS-6.] OK
2 [NUM_DISK_SECTORS-6.] OK
2 [NUM_DISK_SECTORS-6.] OK
2 [NUM_DISK_SECTORS-1.] OK
2 [NUM_DISK_SECTORS-1.] OK
2 [NUM_DISK_SECTORS-5.] OK
2 [CRC32(2,4096)] OK
2 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
2 [0] OK
2 [CRC32(1,92)] OK
2 [0] OK
2 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
3 [NUM_DISK_SECTORS-6.] OK
3 [NUM_DISK_SECTORS-6.] OK
3 [NUM_DISK_SECTORS-6.] OK
3 [NUM_DISK_SECTORS-6.] OK
3 [NUM_DISK_SECTORS-1.] OK
3 [NUM_DISK_SECTORS-1.] OK
3 [NUM_DISK_SECTORS-5.] OK
3 [CRC32(2,4096)] OK
3 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
3 [0] OK
3 [CRC32(1,92)] OK
3 [0] OK
3 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
4 [NUM_DISK_SECTORS-6.] OK
4 [NUM_DISK_SECTORS-6.] OK
4 [NUM_DISK_SECTORS-6.] OK
4 [NUM_DISK_SECTORS-6.] OK
4 [NUM_DISK_SECTORS-1.] OK
4 [NUM_DISK_SECTORS-1.] OK
4 [NUM_DISK_SECTORS-5.] OK
4 [CRC32(2,8192)] OK
4 [CRC32(NUM_DISK_SECTORS-5.,8192)] OK
4 [0] OK
4 [CRC32(1,92)] OK
4 [0] OK
4 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
5 [NUM_DISK_SECTORS-6.] OK
5 [NUM_DISK_SECTORS-6.] OK
5 [NUM_DISK_SECTORS-6.] OK
5 [NUM_DISK_SECTORS-6.] OK
5 [NUM_DISK_SECTORS-1.] OK
5 [NUM_DISK_SECTORS-1.] OK
5 [NUM_DISK_SECTORS-5.] OK
5 [CRC32(2,4096)] OK
5 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
5 [0] OK
5 [CRC32(1,92)] OK
5 [0] OK
5 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 1
Set bootable storage drive 1 Ok
Rebooting Phone.... Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:02:28
 

Hydra Tool

Product Manager
Aug 31, 2019
298
319
Ukraine
ZTE Z852 FRP Remove Success by Hydra Tool



Firehose Loader[ZTE_3_2.mbn]
Initializing SaharaBoot... Ok
Sending ..............Ok

Connecting to Firehose...
Ping... Ok
Configuration......
Identifying Chip....Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8909
Version : 1

Running : Ok

Reading GPT[3], Partitions(32 Items) Ok
Phone Information.....
Model : Z852
Brand : ZTE
Android Ver : 7.1.1
Manufacturer : ZTE
Device : *
Board : *
Display ID : Z852V1.2.11
Security Patch : 2017-08-01
Platform : msm8909
Kernel ID : 2017-08-01
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : ZTE/Z852/*:7.1.1/NMF26V/20170727.004439:user/release-keys
ro_product_hardware :
sys_hardware_version :

Reading GPT[3], Partitions(32 Items) Ok
* FRP Reset *
Resetting FRP...
Auto
Processing...
Executing ...
[Zero Wipe] Ok
Rebooting Phone.... Ok
If not rebooted, Please Power on Manually

Elapsed Time : 00:00:10


TPortConnection.Destroy.....Closing...Ok..
 

Hydra Tool

Product Manager
Aug 31, 2019
298
319
Ukraine
ZTE Blade V9 V0900 FPR Remove Just 1 Click by Hydra




PreOperation Configuration
Brand : ZTE Model : Blade V9 V0900 Storage : Auto
Loader: ZTE_A_A.mbn
Port : COM30
Connection : Flash Mode

Port selected..[COM30]
TPortConnection.Create...(COM30)..Opening...Ok
Getting device info.......
Serial No.: 0xFC097FD2
MSM ID : 0x0009A0E1, SDM450-Qualcomm Snapdragon 450
PBL Ver : 00000000
PK HASH : 168D0BAD52B5D5CBB882A90C1DAC68F9
299D3905816386BA1B1887DDA758CF6D

Firehose Loader[ZTE_A_A.mbn]
Initializing SaharaBoot... Ok
Sending ..................Ok

Connecting to Firehose...
Ping... Ok
Configuration......
Identifying Chip....Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8953
Version : 1

* STORAGE DEVICE INFO *
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 19
Serial Number : 30945374
Firmware Version : 4
Product Name : S0J9B7
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 61071360[29.121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Running : Ok

Reading GPT[3], Partitions(52 Items) Ok
Phone Information.....
Model : BLADE V9
Brand : ZTE
Android Ver : 8.1.0
Manufacturer : ZTE
Device : P450L10
Display ID : CLA_CL_V9_V1.1
Security Patch : 2018-12-01
Kernel ID : 2018-12-01
Fingerprint : ZTE/CLA_CL_P450L10/P450L10:8.1.0/OPM1.171019.026/20181206.120142:user/release-keys
ro_product_hardware :
sys_hardware_version :

Reading GPT[3], Partitions(52 Items) Ok
* FRP Reset *
Resetting FRP...
Auto
Processing...
Executing ...
[Zero Wipe] Ok
Rebooting Phone.... Ok
If not rebooted, Please Power on Manually

Elapsed Time : 00:00:10


TPortConnection.Destroy.....Closing...Ok..
 

Hydra Tool

Product Manager
Aug 31, 2019
298
319
Ukraine
ZTE Blade A522 FRP Reset Success by Hydra Tool

Remove Google Account by edl mode with just 1 click



PreOperation Configuration
Brand : ZTE Model : Blade A522 Storage : Auto
Loader: Blade-A522.mbn
Port : Auto
Connection : Flash Mode

Searching EDL Port..[COM10]
TPortConnection.Create...(COM10)..Opening...Ok
Getting device info.......
Serial No.: 0x881B273F
MSM ID : 0x000560E1, MSM8917-Qualcomm Snapdragon 425
PBL Ver : 00000000
PK HASH : 9764995D53559360DC5789643D7424AC
E3BF6208DA9433656B7C9DD103F0FE65

Firehose Loader[Blade-A522.mbn]
Initializing SaharaBoot... Ok
Sending ...................Ok

Connecting to Firehose...
Ping... Ok
Configuration......
Identifying Chip....Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8917
Version : 1

* STORAGE DEVICE INFO *
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 69
Serial Number : 142043452
Firmware Version : 2314905408196718642
Product Name : DF4016
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 30777344[14,676 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Running : Ok

Reading GPT[3], Partitions(52 Items) Ok
Phone Information.....
Model : ZTE Blade A522
Brand : ZTE
Android Ver : 7.1.1
Manufacturer : ZTE
Device : P817E53
Board : MSM8917
Display ID : GEN_CIS_A522_V1.0
Security Patch : 2018-08-01
Platform : msm8937
Kernel ID : 2018-08-01
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : ZTE/P817E53_OEM_VDF/P817E53:7.1.1/NMF26F/20181026.133929:user/release-keys
ro_product_hardware :
sys_hardware_version :

Reading GPT[3], Partitions(52 Items) Ok
* FRP Reset *
Resetting FRP...
Auto
Processing...
Executing ...
[Zero Wipe] Ok

Elapsed Time : 00:00:07


TPortConnection.Destroy.....Closing...Ok..
 

Hydra Tool

Product Manager
Aug 31, 2019
298
319
Ukraine
Redmi 8A Pro FRP Remove by Hydra Dongle

  1. Go to Hydra Qualcomm Module
  2. Select brand and model, tick factory reset protection frp
  3. Connect device by edl mode
  4. click execute and wait for google account removed



PreOperation Configuration
Brand : XIAOMI Model : Redmi 8A Pro Storage : Auto
Loader: Xiaomi_Redmi_8_Olive.mbn
Port : COM3
Connection : Flash Mode

Port selected..[COM3]
TPortConnection.Create...(COM3)..Opening...Ok
Getting device info.......
Serial No.: 0xA06C83E0
MSM ID : 0x000BF0E1, SDM439-Qualcomm Snapdragon 439
PBL Ver : 00000001
PK HASH : 57158EAF1814D78FD2B3105ECE4DB18A
817A08AC664A5782A925F3FF8403D39A

Firehose Loader[Xiaomi_Redmi_8_Olive.mbn]
Initializing SaharaBoot... Ok
Sending .......................Ok

Connecting to Firehose...
Ping... Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[VD5czQd9okMhHwpvlF69D926bOR]
Checking Internet connection....
- Hydra Is Online
Connecting to Hydra Xiaomi Server...

Signature @256bytes Authentication.... Accepted......
Identifying Chip....Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

* STORAGE DEVICE INFO *
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 3106067390
Firmware Version : 1
Product Name : QD63MB
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 61071360[29,121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Running : Ok

Reading GPT[3], Partitions(64 Items) Ok
Phone Information......
Model : Redmi 8A Pro
Brand : Redmi
Android Ver : 9
Miui Ver : V11
Manufacturer : Xiaomi
Device : olivewood
Mod_device : olivewood_id_global
Display ID : ZQL2117-olivewood-build-20200228172221
Security Patch : 2020-02-01
Kernel ID : 2020-02-01
Fingerprint : Redmi/olivewood/olivewood:9/PKQ1.190319.001/V11.0.2.0.PCQIDXM:user/release-keys
ro_product_hardware :
sys_hardware_version :

Reading GPT[3], Partitions(64 Items) Ok
* FRP Reset *
Resetting FRP...
Auto
Processing...
Executing ...
[Zero Wipe] Ok

Elapsed Time : 00.00.12


TPortConnection.Destroy.....Closing...Ok..
 

Hydra Tool

Product Manager
Aug 31, 2019
298
319
Ukraine
OPPO F9 PRO CPH1823 Passcode remove by hydra


  1. Run Hydra MTK Module
  2. Select Brand and Model
  3. Tick TP Mode, Tick Wipe Format Data
  4. Atached testpoint device and click execute



Brand : OPPO Model : F9 Pro (CPH1823) Connection : Flash Mode

=====================================
Connection[WAITING]Found[COM10] Status[Opened]
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 90014A484347386134A5081654F1A539 - HCG8a4
UNICAL RID : DA8190FCB2C71053390813F80E6B8BD0
Reading GPT-EMMC [0x00008000] 130 Items
Done!!!


Reading System Info
Model :
Brand :
Android Ver : 9
Manufacturer : OPPO
Device :
Display ID :
Security Patch : 2020-07-05
Kernel ID : 2020-07-05
Fingerprint :
ro_product_hardware :
sys_hardware_version :

-------------------------------------
Operation : Auto
Processing...
Formatting Userdata...[]
ZeroWipe Userdata... Ok

Elapsed Time : 00:29:08
 

Hydra Tool

Product Manager
Aug 31, 2019
298
319
Ukraine
OPPO A83 CPH1729 Fix Hang Recovery by Hydra

if your device hang on recovery mode after format you will need use rebuild userdata function



Brand : OPPO Model : A83 (CPH1729) Connection : Flash Mode

=====================================
Connection[WAITING]Found[COM36] Status[Opened]
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 90014A484247346132A543416AD7B4DD - HBG4a2
UNICAL RID : E01177A687172241CFB969DB8BF342E9
Reading GPT-EMMC [0x00008000] 130 Items
Done!!!


Reading System Info
Model : OPPO A83js
Brand : OPPO
Android Ver : 7.1.1
Manufacturer : OPPO
Device : M6763D
Board : full_oppo6763_17101
Display ID : A83jsEX_11_A.23_190110
Security Patch : 2019-01-05
Platform : mt6763
Kernel ID : 2019-01-05
FRPPST : /dev/block/platform/bootdevice/by-name/frp
Fingerprint :
ro_product_hardware :
sys_hardware_version :

-------------------------------------
Operation : Rebuild Userdata
Processing...
Rebuilding Userdata... Ok

Elapsed Time : 00:00:08
 

Hydra Tool

Product Manager
Aug 31, 2019
298
319
Ukraine
Xiaomi Mi Mix 3 perseus FRP Remmove Success by Hydra Dongle



Xiaomi Mi Mix 3 (Perseus) Google account remove log :

PreOperation Configuration
Brand : XIAOMI Model : Mi Mix 3 (perseus) Storage : Auto
Loader: Xiaomi_Mix 3_firehose_sdm845_ddr.elf
Port : COM13
Connection : Flash Mode

Port selected..[COM13]
TPortConnection.Create...(COM13)..Opening...Ok
Getting device info..
Device MODE : SAHARA

Connecting to Firehose...
Ping.....
NOTE : FILTERED : <.
NOTE : FILTERED : ?.
NOTE : FILTERED : x.
NOTE : FILTERED : m.
NOTE : FILTERED : l. Ok
Configuration........
Identifying Chip........UFS Ok
Chip Configuration :
MemoryName : UFS
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Oct 22 2018 - 19:22:16

* STORAGE DEVICE INFO *
Memory Type : UFS
Block Size in Bytes : 4096
Page Size : 4096
Manufacturer ID : 325
Serial Number : 538976288
Firmware Version : 254
Product Name : SDINDDH4-128G 1254
Physical Partitions : 6
Total Logical Blocks:
Drive [0] 29917184[114,125 GB]
Drive [1] 2048[8 MB]
Drive [2] 2048[8 MB]
Drive [3] 8192[32 MB]
Drive [4] 1310720[5 GB]
Drive [5] 8192[32 MB]
Running : Ok

Reading GPT[6], Partitions(224 Items) Ok
Phone Information......
Model : Mi MIX 3
Brand : Xiaomi
Android Ver : 9
Miui Ver : V11
Manufacturer : Xiaomi
Device : perseus
Mod_device : perseus_global
Display ID : PKQ1.180729.001
Security Patch : 2019-10-01
Kernel ID : 2019-10-01
Fingerprint : Xiaomi/perseus/perseus:9/PKQ1.180729.001/V11.0.4.0.PEEMIXM:user/release-keys
ro_product_hardware :
sys_hardware_version :

Reading GPT[6], Partitions(224 Items) Ok
* FRP Reset *
Resetting FRP...
Auto
Processing...
Executing ...
[Zero Wipe] Ok

Elapsed Time : 00:00:05


TPortConnection.Destroy.....Closing...Ok..
 

Hydra Tool

Product Manager
Aug 31, 2019
298
319
Ukraine
Xiaomi Mi CC9e (laurus) Unbrick Fix by Hydra Dongle

Mi CC9e Write Firmware by EDL QdLoader Mode Fix system has been destroyed with hydra tool

Searching EDL Port..[COM86]
TPortConnection.Create...(COM86)..Opening...Ok
Getting device info..
Device MODE : SAHARA

Connecting to Firehose...
Ping.....
NOTE : FILTERED : <.
NOTE : FILTERED : ?.
NOTE : FILTERED : x.
NOTE : FILTERED : m.
NOTE : FILTERED : l. Ok
Configuration........
Identifying Chip........UFS Ok
Chip Configuration :
MemoryName : UFS
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Jul 3 2019 - 22:23:56

* STORAGE DEVICE INFO *
Memory Type : UFS
Block Size in Bytes : 4096
Page Size : 4096
Manufacturer ID : 429
Serial Number : 2037279096
Firmware Version : 004
Product Name : H9HQ53ACPMMDAR
Physical Partitions : 6
Total Logical Blocks:
Drive [0] 14501888[55,32 GB]
Drive [1] 2048[8 MB]
Drive [2] 2048[8 MB]
Drive [3] 32768[128 MB]
Drive [4] 1048576[4 GB]
Drive [5] 32768[128 MB]
Running : Ok

Reading GPT[6], Partitions(224 Items) Ok
Phone Information......
Model : MI CC 9e
Brand : Xiaomi
Android Ver : 9
Miui Ver : V11
Manufacturer : Xiaomi
Device : laurus
Display ID : SW_S88512AA1_V000_M13_XM_F9S_USRD_MP
Security Patch : 2020-01-01
Kernel ID : 2020-01-01
Fingerprint : Xiaomi/laurus/laurus:9/PKQ1.190416.001/V11.0.4.0.PFMCNXM:user/release-keys
ro_product_hardware :
sys_hardware_version :


----------------------------
Flashing Selected Partitions
persist(0)[persist.img] Ok
cust(0)[cust.img] Ok
recovery(0)[recovery.img] Ok
cache(0)[cache.img] Ok
system(0)[system.img] Ok
metadata(0)[metadata.img] Ok
userdata(0)[userdata.img] Ok
PrimaryGPT(0)[gpt_main0.bin] Ok
xbl(1)[xbl.elf] Ok
xbl_config(1)[xbl_config.elf] Ok
PrimaryGPT(1)[gpt_main1.bin] Ok
xblbak(2)[xbl.elf] Ok
xbl_configbak(2)[xbl_config.elf] Ok
PrimaryGPT(2)[gpt_main2.bin] Ok
PrimaryGPT(3)[gpt_main3.bin] Ok
rpm(4)[rpm.mbn] Ok
tz(4)[tz.mbn] Ok
hyp(4)[hyp.mbn] Ok
bluetooth(4)[BTFM.bin] Ok
abl(4)[abl.elf] Ok
dsp(4)[dspso.bin] Ok
keymaster(4)[km4.mbn] Ok
boot(4)[boot.img] Ok
cmnlib(4)[cmnlib.mbn] Ok
cmnlib64(4)[cmnlib64.mbn] Ok
devcfg(4)[devcfg.mbn] Ok
qupfw(4)[qupv3fw.elf] Ok
vendor(4)[vendor.img] Ok
vbmeta(4)[vbmeta.img] Ok
dtbo(4)[dtbo.img] Ok
imagefv(4)[imagefv.elf] Ok
uefisecapp(4)[uefi_sec.mbn] Ok
rpmbak(4)[rpm.mbn] Ok
tzbak(4)[tz.mbn] Ok
hypbak(4)[hyp.mbn] Ok
bluetoothbak(4)[BTFM.bin] Ok
ablbak(4)[abl.elf] Ok
dspbak(4)[dspso.bin] Ok
keymasterbak(4)[km4.mbn] Ok
bootbak(4)[boot.img] Ok
cmnlibbak(4)[cmnlib.mbn] Ok
cmnlib64bak(4)[cmnlib64.mbn] Ok
devcfgbak(4)[devcfg.mbn] Ok
qupfwbak(4)[qupv3fw.elf] Ok
vbmetabak(4)[vbmeta.img] Ok
dtbobak(4)[dtbo.img] Ok
imagefvbak(4)[imagefv.elf] Ok
uefisecappbak(4)[uefi_sec.mbn] Ok
apdp(4)[apdp.mbn] Ok
logfs(4)[logfs_ufs_8mb.bin] Ok
storsec(4)[storsec.mbn] Ok
secdata(4)[sec.elf] Ok
PrimaryGPT(4)[gpt_main4.bin] Ok
PrimaryGPT(5)[gpt_main5.bin] Ok

Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-6.] OK
0 [NUM_DISK_SECTORS-6.] OK
0 [NUM_DISK_SECTORS-6.] OK
0 [NUM_DISK_SECTORS-6.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-5.] OK
0 [CRC32(2,4096)] OK
0 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
0 [0] OK
0 [CRC32(1,92)] OK
0 [0] OK
0 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
1 [NUM_DISK_SECTORS-6.] OK
1 [NUM_DISK_SECTORS-6.] OK
1 [NUM_DISK_SECTORS-6.] OK
1 [NUM_DISK_SECTORS-6.] OK
1 [NUM_DISK_SECTORS-1.] OK
1 [NUM_DISK_SECTORS-1.] OK
1 [NUM_DISK_SECTORS-5.] OK
1 [CRC32(2,4096)] OK
1 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
1 [0] OK
1 [CRC32(1,92)] OK
1 [0] OK
1 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
2 [NUM_DISK_SECTORS-6.] OK
2 [NUM_DISK_SECTORS-6.] OK
2 [NUM_DISK_SECTORS-6.] OK
2 [NUM_DISK_SECTORS-6.] OK
2 [NUM_DISK_SECTORS-1.] OK
2 [NUM_DISK_SECTORS-1.] OK
2 [NUM_DISK_SECTORS-5.] OK
2 [CRC32(2,4096)] OK
2 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
2 [0] OK
2 [CRC32(1,92)] OK
2 [0] OK
2 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
3 [NUM_DISK_SECTORS-6.] OK
3 [NUM_DISK_SECTORS-6.] OK
3 [NUM_DISK_SECTORS-6.] OK
3 [NUM_DISK_SECTORS-6.] OK
3 [NUM_DISK_SECTORS-1.] OK
3 [NUM_DISK_SECTORS-1.] OK
3 [NUM_DISK_SECTORS-5.] OK
3 [CRC32(2,4096)] OK
3 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
3 [0] OK
3 [CRC32(1,92)] OK
3 [0] OK
3 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
4 [NUM_DISK_SECTORS-6.] OK
4 [NUM_DISK_SECTORS-6.] OK
4 [NUM_DISK_SECTORS-6.] OK
4 [NUM_DISK_SECTORS-6.] OK
4 [NUM_DISK_SECTORS-1.] OK
4 [NUM_DISK_SECTORS-1.] OK
4 [NUM_DISK_SECTORS-5.] OK
4 [CRC32(2,8192)] OK
4 [CRC32(NUM_DISK_SECTORS-5.,8192)] OK
4 [0] OK
4 [CRC32(1,92)] OK
4 [0] OK
4 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
5 [NUM_DISK_SECTORS-6.] OK
5 [NUM_DISK_SECTORS-6.] OK
5 [NUM_DISK_SECTORS-6.] OK
5 [NUM_DISK_SECTORS-6.] OK
5 [NUM_DISK_SECTORS-1.] OK
5 [NUM_DISK_SECTORS-1.] OK
5 [NUM_DISK_SECTORS-5.] OK
5 [CRC32(2,4096)] OK
5 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
5 [0] OK
5 [CRC32(1,92)] OK
5 [0] OK
5 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 1
Set bootable storage drive 1 Ok
Rebooting Phone.... Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:02:40
 

Hydra Tool

Product Manager
Aug 31, 2019
298
319
Ukraine
Xiaomi Mi 9T Flashing by fastboot mode

Mi 9T davinci Write Firmware by Fastboot mode, bootloader should be unlock




Searching Device By Fastboot
Device Found...

Reading Information...
Product : product: davinci
Serial No. : serialno: 7b756b79
version : getvar:version FAILED (remote: GetVar Variable Not found)
Secure : secure: yes
Device Info:
Verity mode: true
Device unlocked: true
Device critical unlocked: true
Charger screen enabled: false
--------------------------
Fastboot Flashing...
-switch(dummy.img) Ok
-misc(misc.img) Ok
-logfs(logfs_ufs_8mb.bin) Ok
-vendor(vendor.img) Ok
-system(system.img) Ok
-imagefv(imagefv.elf) Ok
-recovery(recovery.img) Ok
-cache(cache.img) Ok
-cust(cust.img) Ok
-userdata(userdata.img) Ok
-xbl_config(xbl_config.elf) Ok
-xbl(xbl.elf) Ok
-xbl_configbak(xbl_config.elf) Ok
-xblbak(xbl.elf) Ok
-multiimgoem(multi_image.mbn) Ok
-qupfw(qupv3fw.elf) Ok
-qupfwbak(qupv3fw.elf) Ok
-vbmeta(vbmeta.img) Ok
-storsec(storsec.mbn) Ok
-devcfg(devcfg.mbn) Ok
-devcfgbak(devcfg.mbn) Ok
-aop(aop.mbn) Ok
-aopbak(aop.mbn) Ok
-cmnlib(cmnlib.mbn) Ok
-cmnlibbak(cmnlib.mbn) Ok
-cmnlib64(cmnlib64.mbn) Ok
-cmnlib64bak(cmnlib64.mbn) Ok
-keymaster(km4.mbn) Ok
-keymasterbak(km4.mbn) Ok
-bluetooth(BTFM.bin) Ok
-uefisecapp(uefi_sec.mbn) Ok
-uefisecappbak(uefi_sec.mbn) Ok
-abl(abl.elf) Ok
-ablbak(abl.elf) Ok
-tz(tz.mbn) Ok
-tzbak(tz.mbn) Ok
-hyp(hyp.mbn) Ok
-hypbak(hyp.mbn) Ok
-dtbo(dtbo.img) Ok
-logo(logo.img) Ok
-dsp(dspso.bin) Ok
-boot(boot.img) Ok
-modem(NON-HLOS.bin) Ok
-persist(persist.img) Skipped
All Done
--------------------------

Elapsed Time : 00:03:27
 
  • Love
Reactions: nauman jan
Top