NCK Dongle NCK Pro Dongle
We Make IT Possible
What's New?
NCK Dongle / Pro SPRD Module
11 YEARS NON STOP UPDATES
11 Years of support
11 Years together
11 Years earning together
11 Years & still don't have NCK ?!!!
Hydra MediaTeK Tool Ver 1.0.3 Build 20
Windows 7 Service Pack 1 (Version 6.1, Build 7601, 64-bit Edition)
Intel(R) Core(TM) i3 CPU M 380 @ 2.53GHz
Standard VGA Graphics Adapter
Ram Installed : 3 GB
Windows Access Right Admin
Software Run As Admnistrator
******* Dongle Info *******
Version : Hydra Tool v 1.2
Serial : 190300000281
Initialize : OKAY
Status : Activated
Life : 0 [0-0-0-0-0]
---------------------------------
Searching for MTK Device...Found
Port Identification :METAMODE Preloader
FriendlyName :MediaTek USB VCOM (Android) (COM8)
SymbolicName :\??\USB#VID_0E8D&PID_2007#6&28c53095&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0
META Phone Info . . .
MCUID: 8U ` mt6768
ME_SO: .bsp_P137
DATE : Sat Jan 16 17:41:56 CST 2021
MODEL: QP1A.190711.020 release-keys
ME_SWVER: alps-mp-q0.mp1.tc19sp-V1.0.2_bbk.q0mp1.k71v1.64
Reset to Factory Default Ok
Rebooting....
Done!!!
Elapsed Time : 00:00:02
PreOperation Configuration Brand : XIAOMI Model : Mi Mix 3 (perseus) Storage : Auto Loader: Xiaomi_Mix 3_firehose_sdm845_ddr.elf Port : Auto Connection : Searching for Qualcomm 9008 Device...Found FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM4) SymbolicName :\??\USB#VID_05C6&PID_9008#5&22ed776c&0&3#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed} Driver Ver :12/17/2018,2.1.3.5 Getting device info...... Serial No.: 0xD18A02BA MSM ID : 0x0008B0E1, SDM845-Qualcomm Snapdragon 845 PBL Ver : 00000000 PK HASH : C924A35F39CE1CDD1B8D5A9F3B8E3C51 317930431D7A9DD5A55028CF6965FE65 Firehose Loader[Xiaomi_Mix 3_firehose_sdm845_ddr.elf] SaharaBoot... Ok Sending ....................................Ok Connecting to Firehose... Ping..................... Ok Configuration. Xiaomi Authentication needed... Signature Request -> bob[z3 Checking Internet connection.... - Hydra Is Online Connecting to Hydra Xiaomi Server... Signature @256bytes Authentication.... Accepted........ Identifying Chip........UFS Ok Chip Configuration : MemoryName : UFS MaxPayloadSizeToTargetInBytes : 1048576 MaxPayloadSizeToTargetInBytesSupported : 1048576 MaxPayloadSizeFromTargetInBytes : MaxXMLSizeInBytes : 4096 TargetName : Version : 1 DateTime : Oct 22 2018 - 19:22:16 *** STORAGE DEVICE INFO *** Memory Type : UFS Block Size in Bytes : 4096 Page Size : 4096 Manufacturer ID : 325 Serial Number : 538976288 Firmware Version : 254 Product Name : SDINDDH4-128G 1254 Physical Partitions : 6 Total Logical Blocks: Drive [0] 29917184[114.125 GB] Drive [1] 2048[8 MB] Drive [2] 2048[8 MB] Drive [3] 8192[32 MB] Drive [4] 1310720[5 GB] Drive [5] 8192[32 MB] Protocol : Universal Running : Ok Reading GPT[6] Drive [0] 32 Items Drive [1] 32 Items Drive [2] 32 Items Drive [3] 32 Items Drive [4] 64 Items Drive [5] 32 Items Phone Information...... Vendor : Xiaomi ID : QKQ1.190828.002 SDK : 29 Release : 10 ABI : arm64-v8a CPU abilist : arm64-v8a,armeabi-v7a,armeabi Locale : en-GB Miui Ver : V12 Mod_device : perseus_global Security Patch : 2020-10-01 Processing Unlock - Universal - Auto.... Action Result : Ok Elapsed Time : 00:00:20 |
PreOperation Configuration Brand : XIAOMI Model : Redmi 7A (pine) Storage : Auto Loader: Xiaomi_Redmi_8_Olive.mbn Port : Auto Connection : Searching for Qualcomm 9008 Device...Found FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM14) SymbolicName :\??\USB#VID_05C6&PID_9008#5&212ac8fc&0&6#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed} Driver Ver :08/02/2017,2.1.2.7 Getting device info...... Serial No.: 0xC9B43024 MSM ID : 0x000BF0E1, SDM439-Qualcomm Snapdragon 439 PBL Ver : 00000000 PK HASH : 57158EAF1814D78FD2B3105ECE4DB18A 817A08AC664A5782A925F3FF8403D39A Firehose Loader[Xiaomi_Redmi_8_Olive.mbn] SaharaBoot... Ok Sending .......................Ok Connecting to Firehose... Ping... Ok Configuration. Xiaomi Authentication needed... Signature Request -> bob[pTWZJEPV4SNAiEOZQWlLAWFGzRj] Checking Internet connection.... - Hydra Is Online Connecting to Hydra Xiaomi Server... Signature @256bytes Authentication.... Accepted...... Identifying Chip.... Ok Chip Configuration : MemoryName : eMMC MaxPayloadSizeToTargetInBytes : 1048576 MaxPayloadSizeToTargetInBytesSupported : 1048576 MaxPayloadSizeFromTargetInBytes : 4096 MaxXMLSizeInBytes : 4096 TargetName : 8937 Version : 1 *** STORAGE DEVICE INFO *** Memory Type : eMMC Block Size in Bytes : 512 Page Size : 512 Manufacturer ID : 144 Serial Number : 1011550637 Firmware Version : 165 Product Name : HAG4a2 Physical Partitions : 3 Total Logical Blocks: Drive [0] 30777344[14.676 GB] Drive [1] 8192[4 MB] Drive [2] 8192[4 MB] Protocol : Universal Running : Ok Phone Information...... Brand : Xiaomi Vendor : Xiaomi Model : Redmi 7A ID : PKQ1.190319.001 SDK : 28 Release : 9 ABI : armeabi-v7a CPU abilist : armeabi-v7a,armeabi Locale : en-GB Description : pine-user 9 PKQ1.190319.001 V11.0.7.0.PCMMIXM release-keys Miui Ver : V11 Device : pine Mod_device : pine_global Display ID : ZQL1533-pine-build-20200407194230 Security Patch : 2020-03-01 Emmc_size : 16GB Fingerprint : Xiaomi/pine/pine:9/PKQ1.190319.001/V11.0.7.0.PCMMIXM:user/release-keys Reading GPT[3] Drive [0] 60 Items Drive [1] 0 Items Drive [2] 0 Items Removing FRPta... Method : Auto Processing... - Removing FRP Executing ... - Removing FRP [Zero Wipe] OkOkOk Elapsed Time : 00:00:14 |
===================================== ***IMEI REPAIR FUNCTION**** Xiaomi Flashmode Searching for MTK Device...Found Port Identification :Flashmode BROM FriendlyName :MediaTek USB Port (COM14) SymbolicName :\??\USB#VID_0E8D&PID_0003#5&2dadc828&0&2#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed} Driver Ver :01/22/2015,3.0.1504.0 Handshaking...Ok Identifying Hardware ID..... BROM CPUID : 0707MT6768[6768] BROM HW_SW_VER : 8A00 CA00 0000 0000 getMTKPayloadExploit : 0707 #Executing Exploit.. #SUCCESS.. Handshaking...Ok Identifying Hardware ID..... BROM CPUID : 0707MT6768[6768] BROM HW_SW_VER : 8A00 CA00 0000 0000 FUSEID : 00000000 SECURE VERSION : 05 BL VERSION : FE BR Secured : E0 Preparing Download Agent.. DA : MT6768_Xiaomi_New.bin Agent: MTK_DOWNLOAD_AGENT -HYDRA Ver : MTK_AllInOne_DA_v3.3001.2020/07/07.10:10_513994 Init : Loader [1] Sending : Accepted Identifying Protocol... Protocol : New Synchronization...SYNC Mode : brom Preloader Initialization... Parsing preloader_merlin.bin Init : Accepted Execute Secondary Loader Init : Loader [2] Executing : SYNC Reading Device UniqueID, RAM and Flash Chip Info... UNIQUE ID : 059D0B65ABAF4BBF15621544C6BA99DA ERAM Size : 0x0000000000070000 -448 KB IRAM Size : 0x0000000100000000 -4 GB eMMC BOOT1 : 0x0000000000400000 -4 MB eMMC BOOT2 : 0x0000000000400000 -4 MB eMMC RPMB : 0x0000000001000000 -16 MB eMMC USER : 0x0000000E8F800000 -58,242 GB eMMC CID : 13014E53304A394A38101EB946B377EF - S0J9J8 DA Speed : high-speed Reading GPT-EMMC [0x00008000] 130 Items Autobackup Partitions -preloader[0x00000000]512 KB ->preloader.bin...Ok -> Renaming Preloader.... preloader_merlin.bin Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0707__041521165443\MT6768_Androi d_scatter.txt -pgpt[0x00000000]32 KB ->pgpt.bin...Ok -frp[0x05508000]1024 KB ->frp.bin...Ok -nvdata[0x0C4A2000]64 MB ->nvdata.bin...Ok -persist[0x104A2000]48 MB ->persist.bin...Ok -nvram[0x19F80000]64 MB ->nvram.bin...Ok Done!!! C:\Hydra Tool\\Backup\Auto\0707__041521165443 MTK Phone Loader is NOW RUNNING. Reading Device UniqueID, RAM and Flash Chip Info... UNIQUE ID : 059D0B65ABAF4BBF15621544C6BA99DA ERAM Size : 0x0000000000070000 -448 KB IRAM Size : 0x0000000100000000 -4 GB eMMC BOOT1 : 0x0000000000400000 -4 MB eMMC BOOT2 : 0x0000000000400000 -4 MB eMMC RPMB : 0x0000000001000000 -16 MB eMMC USER : 0x0000000E8F800000 -58,242 GB eMMC CID : 13014E53304A394A38101EB946B377EF - S0J9J8 Reading GPT-EMMC [0x00008000] 130 Items IMEI INFO.. IMEI1 : FFFFFFFFFFFFFFF IMEI2 : **************87 IMEI INFO.. IMEI1 : FFFFFFFFFFFFFFF IMEI2 : **************28 Rebooting Device [Reboot To Normal] Reboot Done!! Elapsed Time : 00:01:02 |
===================================== Searching for MTK Device...Found Port Identification :Flashmode BROM FriendlyName :MediaTek USB Port (COM19) SymbolicName :\??\USB#VID_0E8D&PID_0003#5&1330824a&0&2#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed} Driver Ver :01/22/2016,3.2 Reading Device UniqueID, RAM and Flash Chip Info... UNIQUE ID : FF30907ECFAFE8BD8387267D1728FE08 ERAM Size : 0x0000000000080000 -512 KB IRAM Size : 0x0000000180000000 -6 GB UFS LU0 Size: 0x0000000000400000 -4 MB UFS LU1 Size: 0x0000000000400000 -4 MB UFS LU2 Size: 0x0000001DCB000000 -119.172 GB UFS CID : Ī?KM2V8001CM-B707 UFS UNIQID : 00330038006500380036003300330030 Reading GPT-UFS [0x00008000] 130 Items Reading System Info Vendor : Xiaomi ID : QP1A.190711.020 SDK : 29 Release : 10 ABI : arm64-v8a CPU abilist : arm64-v8a,armeabi-v7a,armeabi Locale : en-GB Description : begonia-user 10 QP1A.190711.020 V12.0.6.0.QGGMIXM release-keys Miui Ver : V12 Mod_device : begonia_global Display ID : QP1A.190711.020 Security Patch : 2020-12-01 StorageType : mtp Userdata State : Not Encrypted ------------------------------------- Operation : Backup All By Partitions Except Userdata Processing... Reading Partitions -preloader[0x00000000]512 KB ->preloader.bin...Ok -> Renaming Preloader.... preloader_begonia.bin Creating Scatter file... C:\Hydra Tool\\Backup\Full\__0813--10(QP1A.190711.020)_150421111220\MT6785_Android_sc atter.txt -pgpt[0x00000000]32 KB ->pgpt.bin...Ok -recovery[0x00008000]64 MB ->recovery.bin...Ok -misc[0x04008000]4 MB ->misc.bin...Ok -para[0x04408000]512 KB ->para.bin...Ok -expdb[0x04488000]20 MB ->expdb.bin...Ok -frp[0x05888000]1024 KB ->frp.bin...Ok -vbmeta[0x05988000]8 MB ->vbmeta.bin...Ok -nvcfg[0x06188000]32 MB ->nvcfg.bin...Ok -nvdata[0x08188000]64 MB ->nvdata.bin...Ok -metadata[0x0C188000]32 MB ->metadata.bin...Ok -persist[0x0E188000]70.469 MB ->persist.bin...Ok -protect1[0x12800000]8 MB ->protect1.bin...Ok -protect2[0x13000000]8 MB ->protect2.bin...Ok -seccfg[0x13800000]8 MB ->seccfg.bin...Ok -otp[0x14000000]48 MB ->otp.bin...Ok -sec1[0x17000000]2 MB ->sec1.bin...Ok -proinfo[0x17200000]3 MB ->proinfo.bin...Ok -efuse[0x17500000]512 KB ->efuse.bin...Ok -nvram[0x17580000]64 MB ->nvram.bin...Ok -md1img[0x1B580000]150 MB ->md1img.bin...Ok -boot_para[0x24B80000]26 MB ->boot_para.bin...Ok -spmfw[0x26580000]1024 KB ->spmfw.bin...Ok -audio_dsp[0x26680000]4 MB ->audio_dsp.bin...Ok -scp1[0x26A80000]6 MB ->scp1.bin...Ok -scp2[0x27080000]6 MB ->scp2.bin...Ok -sspm_1[0x27680000]1024 KB ->sspm_1.bin...Ok -sspm_2[0x27780000]1024 KB ->sspm_2.bin...Ok -cam_vpu1[0x27880000]15 MB ->cam_vpu1.bin...Ok -cam_vpu2[0x28780000]15 MB ->cam_vpu2.bin...Ok -cam_vpu3[0x29680000]15 MB ->cam_vpu3.bin...Ok -gz1[0x2A580000]32 MB ->gz1.bin...Ok -gz2[0x2C580000]32 MB ->gz2.bin...Ok -lk[0x2E580000]2 MB ->lk.bin...Ok -lk2[0x2E780000]2 MB ->lk2.bin...Ok -boot[0x2E980000]64 MB ->boot.bin...Ok -logo[0x32980000]64 MB ->logo.bin...Ok -dtbo[0x36980000]32 MB ->dtbo.bin...Ok -tee1[0x38980000]5 MB ->tee1.bin...Ok -tee2[0x38E80000]9.5 MB ->tee2.bin...Ok -vendor[0x39800000]1.5 GB ->vendor.bin...Ok -system[0x99800000]3.5 GB ->system.bin...Ok -cache[0x179800000]432 MB ->cache.bin...Ok -gsort[0x194800000]16 MB ->gsort.bin...Ok -oem_misc1[0x195800000]16 MB ->oem_misc1.bin...Ok -exaid[0x196800000]128 MB ->exaid.bin...Ok -cust[0x19E800000]832 MB ->cust.bin...Ok -flashinfo[0x1DC9FF8000]16 MB ->flashinfo.bin...Ok Reading Done!!! C:\Hydra Tool\\Backup\Full\__0813--10(QP1A.190711.020)_150421111220 Ok Elapsed Time : 00:14:15 |
Searching for Qualcomm 9008 Device...Found FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM5) SymbolicName :\??\USB#VID_05C6&PID_9008#6&944c330&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver :12/17/2018,2.1.3.5 Getting device info..Ok Device MODE : Firehose Connecting to Firehose... Ping.. Ok Configuration....... Identifying Chip..........eMMC Ok Chip Configuration : MemoryName : eMMC MaxPayloadSizeToTargetInBytes : 49152 MaxPayloadSizeToTargetInBytesSupported : 49152 MaxPayloadSizeFromTargetInBytes : 4096 MaxXMLSizeInBytes : 4096 TargetName : 8x10 Version : 1 Protocol : Universal Running : Ok Phone Information.... Unable To find Build.prop Reading GPT[1] Drive [0] 24 Items Backup Security partitions... Reading Security Items.... > modemst1 > modemst2 > fsg C:\Hydra Tool\Backup\Security_Backup\___Security_0415211038 58.sec Backup Security Success.... ---------------------------- Flashing Selected Partitions.... - sbl1(0)[sbl1.mbn] Failed Operation : Setbootablestoragedrive: Drive 0 Set bootable storage drive 0 Ok Rebooting Phone.... Ok Elapsed Time : 00:00:08 |
===================================== Searching for MTK Device...Found Port Identification :Flashmode BROM FriendlyName :MediaTek USB Port (COM5) SymbolicName :\??\USB#VID_0E8D&PID_0003#6&2824289&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver :01/22/2016,3.2 Reading Device UniqueID, RAM and Flash Chip Info... UNIQUE ID : F09CAD1F92B1780690D5306B2477545D ERAM Size : 0x000000000003A000 -232 KB IRAM Size : 0x00000000C0000000 -3 GB eMMC BOOT1 : 0x0000000000400000 -4 MB eMMC BOOT2 : 0x0000000000400000 -4 MB eMMC RPMB : 0x0000000001000000 -16 MB eMMC USER : 0x0000000E8F800000 -58,242 GB eMMC CID : 45010044413430363401DBAE1E1787F1 - DA4064 Reading GPT-EMMC [0x00008000] 130 Items ------------------------------------- Operation : Remove MiAccount[Erase Method] + FRP Processing... -persist.bin[0x47000000]48 MB ->persist.bin...Ok -frp.bin[0x3BD88000]1024 KB ->frp.bin...Ok __041521145532 Backing up Partition for safety... -__041521145532[0x47000000]48 MB ->persist.img...OkOk Saved to : C:\Hydra Tool\Backup\Persist\__041521145532.bin Erasing FRP Partition... -persist.bin[0x47000000]48 MB ->persist.bin...Ok -frp.bin[0x3BD88000]1024 KB ->frp.bin...Ok Ok Elapsed Time : 00:00:41 |
===================================== Searching for MTK Device...Found Port Identification :Flashmode Preloader FriendlyName :MediaTek PreLoader USB VCOM_V1632 (Android) (COM11) SymbolicName :\??\USB#VID_0E8D&PID_2000#6&3703ea33&0&4#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed} Driver Ver :01/22/2015,3.0.1504.0 Handshaking...Ok Identifying Hardware ID..... BROM CPUID : 0766MT6765[6765] BROM HW_SW_VER : 8A00 CA00 0000 0000 FUSEID : 00000000 SECURE VERSION : 00 BL VERSION : 03 BR Secured : 05 NORMAL BOOT Preparing Download Agent.. DA : 6765_Tecno_camon_air_a12.bin Agent: MTK_DOWNLOAD_AGENT -HYDRA Ver : MTK_AllInOne_DA_v3.3001.2018/05/22.14:57_437806 Init : Loader [1] Sending : Accepted Identifying Protocol... Protocol : New Synchronization...SYNC Mode : preloader Execute Secondary Loader Init : Loader [2] Executing : SYNC Sending Certifificate Reading Device UniqueID, RAM and Flash Chip Info... UNIQUE ID : C607912CE5885D156F4826F4CE3EC13B ERAM Size : 0x0000000000040000 -256 KB IRAM Size : 0x0000000100000000 -4 GB eMMC BOOT1 : 0x0000000000400000 -4 MB eMMC BOOT2 : 0x0000000000400000 -4 MB eMMC RPMB : 0x0000000000400000 -4 MB eMMC USER : 0x0000000E8F800000 -58.242 GB eMMC CID : 90014A484347386134A210053688C691 - HCG8a4 DA Speed : high-speed Reading GPT-EMMC [0x00008000] 130 Items Reading System Info Brand : TECNO Vendor : TECNO MOBILE LIMITED Model : TECNO KC3 ID : PPR1.180610.011 SDK : 28 Release : 9 ABI : arm64-v8a CPU abilist : arm64-v8a,armeabi-v7a,armeabi Locale : en-US Description : full_kc3_h627mt62-user 9 PPR1.180610.011 57842 release-keys Device : TECNO-KC3 Display ID : KC3-H627G-P-200113V292 Security Patch : 2020-01-05 Fingerprint : TECNO/H627/TECNO-KC3:9/PPR1.180610.011/G-200113V292:user/release-keys StorageType : mtp Userdata State : Encrypted Autobackup Partitions -preloader[0x00000000]512 KB ->preloader.bin...Ok -> Renaming Preloader.... preloader_kc3_h627mt62.bin Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0766_TECNO_H627_TECNO-KC3_9_PPR1.180610.011_G-200113V292_041521153059\MT6765_Android_scatter.txt -pgpt[0x00000000]8 MB ->pgpt.bin...Ok -nvram[0x09B00000]64 MB ->nvram.bin...Ok -persist[0x113000000]48 MB ->persist.bin...Ok -frp[0x12F580000]1024 KB ->frp.bin...Ok -nvdata[0x144280000]69.5 MB ->nvdata.bin...Ok Done!!! C:\Hydra Tool\\Backup\Auto\0766_TECNO_H627_TECNO-KC3_9_PPR1.180610.011_G-200113V292_041521153059 MTK Phone Loader is NOW RUNNING. Reading Device UniqueID, RAM and Flash Chip Info... UNIQUE ID : C607912CE5885D156F4826F4CE3EC13B ERAM Size : 0x0000000000040000 -256 KB IRAM Size : 0x0000000100000000 -4 GB eMMC BOOT1 : 0x0000000000400000 -4 MB eMMC BOOT2 : 0x0000000000400000 -4 MB eMMC RPMB : 0x0000000000400000 -4 MB eMMC USER : 0x0000000E8F800000 -58.242 GB eMMC CID : 90014A484347386134A210053688C691 - HCG8a4 Reading GPT-EMMC [0x00008000] 130 Items Reading System Info Brand : TECNO Vendor : TECNO MOBILE LIMITED Model : TECNO KC3 ID : PPR1.180610.011 SDK : 28 Release : 9 ABI : arm64-v8a CPU abilist : arm64-v8a,armeabi-v7a,armeabi Locale : en-US Description : full_kc3_h627mt62-user 9 PPR1.180610.011 57842 release-keys Device : TECNO-KC3 Display ID : KC3-H627G-P-200113V292 Security Patch : 2020-01-05 Fingerprint : TECNO/H627/TECNO-KC3:9/PPR1.180610.011/G-200113V292:user/release-keys StorageType : mtp Userdata State : Encrypted ------------------------------------- Operation : Zero Wipe Processing... ZeroWipe FRP Partition... Ok Rebooting Device [Reboot To Normal] Reboot Done!! Elapsed Time : 00:00:51 |
Searching for Qualcomm 9008 Device...Found FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM13) SymbolicName :\??\USB#VID_05C6&PID_9008#6&153f065e&0&1#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed} Driver Ver :08/31/2015,2.1.2.0 Getting device info...... Serial No.: 0x994CACFF MSM ID : 0x000950E1, SM6150-Qualcomm Snapdragon 675 PBL Ver : 00000000 PK HASH : 1BEBE3863A6781DB4B01086063007334 DE9E5CA14971C7C4F4358EC9D79CDA46 Firehose Loader[Xiaomi_Redmi Note 7 Pro_Sdm6150_ddr.elf] SaharaBoot... Ok Sending ...................................Ok Connecting to Firehose... Ping..................... Ok Configuration. Xiaomi Authentication needed... Signature Request -> bob[ru4JBg81TbfBLal8EjZwz0ybwfD] Checking Internet connection.... - Hydra Is Online Connecting to Hydra Xiaomi Server... Signature @256bytes Authentication.... Accepted........ Identifying Chip.... Ok Chip Configuration : MemoryName : eMMC MaxPayloadSizeToTargetInBytes : 1048576 MaxPayloadSizeToTargetInBytesSupported : 1048576 MaxPayloadSizeFromTargetInBytes : MaxXMLSizeInBytes : 4096 TargetName : Version : 1 DateTime : Jul 19 2019 - 01:12:10 *** STORAGE DEVICE INFO *** Memory Type : eMMC Block Size in Bytes : 512 Page Size : 512 Manufacturer ID : 144 Serial Number : 3390710511 Firmware Version : 892350512 Product Name : hDEaP3 Physical Partitions : 4 Total Logical Blocks: Drive [0] 244285440[116.484 GB] Drive [1] 8192[4 MB] Drive [2] 8192[4 MB] Drive [3] 32768[16 MB] Protocol : Universal Running : Ok Phone Information...... Vendor : Xiaomi ID : QKQ1.190915.002 SDK : 29 Release : 10 ABI : arm64-v8a CPU abilist : arm64-v8a,armeabi-v7a,armeabi Locale : zh-CN Miui Ver : V12 Security Patch : 2020-07-01 ---------------------------- Flashing Selected Partitions.... - multiimgoem(0)[multi_image.mbn] Ok - vbmeta(0)[vbmeta.img] Ok - qupfw(0)[qupv3fw.elf] Ok - xbl_config(0)[xbl_config.elf] Ok - storsec(0)[storsec.mbn] Ok - storsecbak(0)[storsec.mbn] Ok - aop(0)[aop.mbn] Ok - aopbak(0)[aop.mbn] Ok - hyp(0)[hyp.mbn] Ok - hypbak(0)[hyp.mbn] Ok - cmnlib(0)[cmnlib.mbn] Ok - cmnlibbak(0)[cmnlib.mbn] Ok - cmnlib64(0)[cmnlib64.mbn] Ok - cmnlib64bak(0)[cmnlib64.mbn] Ok - keymaster(0)[km4.mbn] Ok - keymasterbak(0)[km4.mbn] Ok - bluetooth(0)[BTFM.bin] Ok - devcfg(0)[devcfg.mbn] Ok - devcfgbak(0)[devcfg.mbn] Ok - abl(0)[abl.elf] Ok - ablbak(0)[abl.elf] Ok - imagefv(0)[imagefv.elf] Ok - uefisecapp(0)[uefi_sec.mbn] Ok - uefisecappbak(0)[uefi_sec.mbn] Ok - misc(0)[misc.img] Ok - xbl(0)[xbl.elf] Ok - xblbak(0)[xbl.elf] Ok - tz(0)[tz.mbn] Ok - tzbak(0)[tz.mbn] Ok - logfs(0)[logfs_ufs_8mb.bin] Ok - dtbo(0)[dtbo.img] Ok - dsp(0)[dspso.bin] Ok - splash(0)[splash.img] Ok - persist(0)[persist.img] Ok - persistbak(0)[persist.img] Ok - boot(0)[boot.img] Ok - recovery(0)[recovery.img] Ok - modem(0)[NON-HLOS.bin] Ok - cache(0)[cache.img] Ok - cust(0)[cust.img] Ok - system(0)[system.img] Ok - vendor(0)[vendor.img] Ok - userdata(0)[userdata.img] Ok - PrimaryGPT(0)[gpt_main0.bin] Ok Flashing Patch Configuration.. 0 [NUM_DISK_SECTORS-34.] OK 0 [NUM_DISK_SECTORS-34.] OK 0 [NUM_DISK_SECTORS-34.] OK 0 [NUM_DISK_SECTORS-34.] OK 0 [NUM_DISK_SECTORS-1.] OK 0 [NUM_DISK_SECTORS-1.] OK 0 [NUM_DISK_SECTORS-33.] OK 0 [CRC32(2,11264)] OK 0 [CRC32(NUM_DISK_SECTORS-33.,11264)] OK 0 [0] OK 0 [CRC32(1,92)] OK 0 [0] OK 0 [CRC32(NUM_DISK_SECTORS-1.,92)] OK ---------------------------- Done! Rebooting Phone.... Ok Elapsed Time : 00:02:54 |