GSM Shop GSM Shop
GSM-Forum  

Welcome to the GSM-Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features.
Only registered members may post questions, contact other members or search our database of over 8 million posts.

Registration is fast, simple and absolutely free so please - Click to REGISTER!

If you have any problems with the registration process or your account login, please contact contact us .

Go Back   GSM-Forum > Product Support Sections > Special Solutions / Services / WebShop > GSMFABRICA Products > HYDRA TOOL


Reply
 
LinkBack Thread Tools Display Modes
Old 06-15-2021, 18:55   #2041 (permalink)
No Life Poster
 
Gsm-Ahmed's Avatar
 
Join Date: Jan 2020
Location: Algeria
Posts: 814
Member: 2944109
Status: Offline
Thanks Meter: 656
WIKO SUNSET2 Safe format Universal


WIKO SUNSET2 Safe format Universal




  Reply With Quote
Old 06-17-2021, 01:56   #2042 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,623
Xiaomi Redmi Note 8 (Ginkgo) qualcomm device Manual selected files flashed by Hydra T

Xiaomi Redmi Note 8 (Ginkgo) qualcomm device Manual selected files flashed by Hydra T

Manual

1. Run Hydra Qualcomm Module and Sosc.
2. Choose Brand and Module or leave it as "Auto"
3. Go to "Flash Tool" Tab.
4. Choose Flash file and its location.
5. Click on "Flash"
6. connect device to the computer with USB Data cable
7. Wait until the process is completed.


Screen Short:



BR
Dipendra Pathak

  Reply With Quote
Old 06-17-2021, 02:06   #2043 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,623
Xiaomi Redmi Note 5 Pro (Whyred) Qualcomm device successfully flashed by Hydra Tool

Xiaomi Redmi Note 5 Pro (Whyred) Qualcomm device successfully flashed by Hydra Tool

Manual

1. Run Hydra Qualcomm Module.
2. Choose Brand and Module or leave it as "Auto"
3. Go to "Flash Tool" Tab.
4. Choose Flash file and its location.
5. Click on "Flash"
6. connect device to the computer with USB Data cable
7. Wait until the process is completed.
Screen Short:




BR
Dipendra Pathak

  Reply With Quote
Old 06-17-2021, 02:17   #2044 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,623
Huawei TRT-L21 (Y7 Prime) successfully FRP removed by Hydra Tool

Huawei TRT-L21 (Y7 Prime) successfully FRP removed by Hydra Tool

1. Run MTK tool.
2. Choose Correct Module and Brand.
3. Go to "Service" -- > Huawei"
4. Choose "Factory Reset" tool from from drop down menu.
5. choose "Format FRP" from "Flash Mode" .
6. Click on "Execute" and connect device with computer using USB cable.
7. Wait until the process is completed.


Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : HUAWEI Model : TRT-L21 (Y7 Prime) Storage : Auto
Loader: Huawei_Y7_MSM8937.mbn
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM16)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&48cd2ae&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :09/10/2015,2.1.2.0

Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 1320257215
Firmware Version : 825241672
Product Name : HBG4a2
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 61071360[29.121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok
Reading GPT[3]
Drive [0] 64 Items
Drive [1] 0 Items
Drive [2] 0 Items

Processing Remove FRP....
- Removing FRP [Zero Wipe] Ok
Action Result : Ok

Elapsed Time : 00:00:04
BR
Dipendra Pathak

  Reply With Quote
Old 06-17-2021, 02:30   #2045 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,623
Oppo A71 (2018) CHP 1801 format user data successfully removed by Hyra King!

Oppo A71 (2018) CPH 1801 format user data successfully removed by Hyra King!

1. Run Qualcomm Tool.
2. Choose Brand and Module.
3. Go to "Service"--> "Oppo" from Universal Option
4. Choose "A71 (CPH 1801 Format user data)"
5. Choose "Factory Reset" from drop down menu.
6. Connect device to computer using USB Data Cable.
7. Click "Execute"
8. Wait until the operation is completed

Screen Short:




BR
Dipendra Pathak

  Reply With Quote
Old 06-18-2021, 03:37   #2046 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,623
Cherry Mobile Flare S7 Factory Reset Protection successfully done by Hydra Tool

Cherry Mobile Flare S7 Factory Reset Protection successfully done by Hydra Tool

1. Run MTK Tool and Sosc.
2. Choose Brand and Module.
3. Go to "Service"--> "Tool" from Universal Option
4. Choose "Factory Reset Protection (FRP)"
5. Choose "Auto" from "Option / Menu" drop down menu.
6. Connect device to computer using USB Data Cable.
7. Click "Execute"
8. Wait until the operation is completed

Screen Short:



Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode Preloader
FriendlyName :MediaTek PreLoader USB VCOM_V1632 (Android) (COM72)
Device :6&28f39a82&0&4
SymbolicName :\??\USB#VID_0E8D&PID_2000#6&28f39a82&0&4#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0699MT6739 [6739]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : 00
SB : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
FUSEID : 00000000
SECURE VERSION : 00
BL VERSION : 03

Preparing Download Agent..
DA : 6739.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2020-11-03.22:07_536568
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : preloader

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 1E4D913E435B1607A86EFBF16B634B28
ERAM Size : 0x0000000000020000 -128 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003A3E00000 -14.561 GB
eMMC CID : 150100524531424D420745759BCB14DF - RE1BMB

DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info
Brand : Cherry_Mobile
Vendor : Cherry_Mobile
Model : Flare_S7
ID : O11019
SDK : 27
Release : 8.1.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-US
Description : Flare_S7-user 8.1.0 O11019 1570865869 release-keys
Device : Flare_S7
Board : Flare_S7
Display ID : Cherry_Flare_S7_V22_10122019
Security Patch : 2019-09-05
Fingerprint : Cherry_Mobile/Flare_S7/Flare_S7:8.1.0/O11019/1570865869:user/release-keys
StorageType : mtp
Userdata State : Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_c767_8111h_xxa1_39_o1.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0699_Cherry_Mobile_Flare_S7_Flar e_S7_8.1.0_O11019_1570865869_061721173815\MT6739_A ndroid_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x02D88000]1024 KB ->frp.bin...Ok
-nvdata[0x03688000]32 MB ->nvdata.bin...Ok
-protect1[0x07688000]8 MB ->protect1.bin...Ok
-protect2[0x07E88000]9.469 MB ->protect2.bin...Ok
-nvram[0x10700000]5 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0699_Cherry_Mobile_Flare_S7_Flar e_S7_8.1.0_O11019_1570865869_061721173815
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 1E4D913E435B1607A86EFBF16B634B28
ERAM Size : 0x0000000000020000 -128 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003A3E00000 -14.561 GB
eMMC CID : 150100524531424D420745759BCB14DF - RE1BMB

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Brand : Cherry_Mobile
Vendor : Cherry_Mobile
Model : Flare_S7
ID : O11019
SDK : 27
Release : 8.1.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-US
Description : Flare_S7-user 8.1.0 O11019 1570865869 release-keys
Device : Flare_S7
Board : Flare_S7
Display ID : Cherry_Flare_S7_V22_10122019
Security Patch : 2019-09-05
Fingerprint : Cherry_Mobile/Flare_S7/Flare_S7:8.1.0/O11019/1570865869:user/release-keys
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition... Ok

Elapsed Time : 00:00:28
BR
Dipendra Pathak

  Reply With Quote
Old 06-18-2021, 03:45   #2047 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,623
Cherry Mobile Flare S7 Factory Reset Protection successfully done by Hydra Tool

Cherry Mobile Flare S7 Factory Reset Protection successfully done by Hydra Tool

1. Run MTK Tool and Sosc.
2. Choose Brand and Module.
3. Go to "Service"--> "Tool" from Universal Option
4. Choose "Factory Reset Protection (FRP)"
5. Choose "Auto" from "Option / Menu" drop down menu.
6. Connect device to computer using USB Data Cable.
7. Click "Execute"
8. Wait until the operation is completed

Screen Short:



Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode Preloader
FriendlyName :MediaTek PreLoader USB VCOM_V1632 (Android) (COM72)
Device :6&28f39a82&0&4
SymbolicName :\??\USB#VID_0E8D&PID_2000#6&28f39a82&0&4#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0699MT6739 [6739]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : 00
SB : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
FUSEID : 00000000
SECURE VERSION : 00
BL VERSION : 03

Preparing Download Agent..
DA : 6739.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2020-11-03.22:07_536568
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : preloader

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 1E4D913E435B1607A86EFBF16B634B28
ERAM Size : 0x0000000000020000 -128 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003A3E00000 -14.561 GB
eMMC CID : 150100524531424D420745759BCB14DF - RE1BMB

DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info
Brand : Cherry_Mobile
Vendor : Cherry_Mobile
Model : Flare_S7
ID : O11019
SDK : 27
Release : 8.1.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-US
Description : Flare_S7-user 8.1.0 O11019 1570865869 release-keys
Device : Flare_S7
Board : Flare_S7
Display ID : Cherry_Flare_S7_V22_10122019
Security Patch : 2019-09-05
Fingerprint : Cherry_Mobile/Flare_S7/Flare_S7:8.1.0/O11019/1570865869:user/release-keys
StorageType : mtp
Userdata State : Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_c767_8111h_xxa1_39_o1.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0699_Cherry_Mobile_Flare_S7_Flar e_S7_8.1.0_O11019_1570865869_061721173815\MT6739_A ndroid_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x02D88000]1024 KB ->frp.bin...Ok
-nvdata[0x03688000]32 MB ->nvdata.bin...Ok
-protect1[0x07688000]8 MB ->protect1.bin...Ok
-protect2[0x07E88000]9.469 MB ->protect2.bin...Ok
-nvram[0x10700000]5 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0699_Cherry_Mobile_Flare_S7_Flar e_S7_8.1.0_O11019_1570865869_061721173815
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 1E4D913E435B1607A86EFBF16B634B28
ERAM Size : 0x0000000000020000 -128 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003A3E00000 -14.561 GB
eMMC CID : 150100524531424D420745759BCB14DF - RE1BMB

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Brand : Cherry_Mobile
Vendor : Cherry_Mobile
Model : Flare_S7
ID : O11019
SDK : 27
Release : 8.1.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-US
Description : Flare_S7-user 8.1.0 O11019 1570865869 release-keys
Device : Flare_S7
Board : Flare_S7
Display ID : Cherry_Flare_S7_V22_10122019
Security Patch : 2019-09-05
Fingerprint : Cherry_Mobile/Flare_S7/Flare_S7:8.1.0/O11019/1570865869:user/release-keys
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition... Ok

Elapsed Time : 00:00:28
BR
Dipendra Pathak

  Reply With Quote
Old 06-18-2021, 03:46   #2048 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,623
Xiaomi Redmi 7A Pine Successfully Flashed by Hydra Tool

Xiaomi Redmi 7A Pine Successfully Flashed by Hydra Tool

1. Run Hydra Qualcomm Module and Sosc.
2. Choose Brand and Module or leave it as "Auto"
3. Go to "Flash Tool" Tab.
4. Choose Flash file and its location.
5. Click on "Flash"
6. connect device to the computer with USB Data cable
7. Wait until the process is completed.
Screen Short:



Logs:

Quote:
Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM35)
SymbolicName :\??\USB#VID_05C6&PID_9008#6&3ab4f6ad&0&6#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/02/2017,2.1.2.7

Getting device info......
Serial No.: 0x6E372C41
MSM ID : 0x000BF0E1, SDM439-Qualcomm Snapdragon 439
PBL Ver : 00000000
PK HASH : 57158EAF1814D78FD2B3105ECE4DB18A
817A08AC664A5782A925F3FF8403D39A

Firehose Loader[Xiaomi_Redmi_8_Olive.mbn]
SaharaBoot... Ok
Sending .......................Ok
Connecting to Firehose...
Ping... Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[zTSjm8CmQXf97rubox5an7EloPO]
Checking Internet connection....
- Hydra Is Online
Connecting to Hydra Xiaomi Server...

Signature @256bytes Authentication.... Accepted......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 959710456
Firmware Version : 909127728
Product Name : hB8aP>
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 61071360[29.121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok

Phone Information......
Brand : Xiaomi
Vendor : Xiaomi
Model : Redmi 7A
ID : PKQ1.190319.001
SDK : 28
Release : 9
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-GB
Description : pine-user 9 PKQ1.190319.001 V10.2.4.0.PCMMIXM release-keys
Miui Ver : V10
Device : pine
Mod_device : pine_global
Display ID : ZQL1533-pine-build-20190701230949
Security Patch : 2019-06-01
Emmc_size : 16GB
Fingerprint : Xiaomi/pine/pine:9/PKQ1.190319.001/V10.2.4.0.PCMMIXM:user/release-keys

Reading GPT[3]
Drive [0] 60 Items
Drive [1] 0 Items
Drive [2] 0 Items


Backup Security partitions...
Reading Security Items....
> modemst1
> modemst2
> fsg
C:\Hydra Tool\Backup\Security_Backup\Redmi 7A__9_Security_061821091823.sec
Backup Security Success....

----------------------------
Flashing Selected Partitions....
- sec(0)[sec.dat] Skipped
- config(0)[config.bin] Skipped
- vbmeta(0)[vbmeta.img] Ok
- vbmetabak(0)[vbmeta.img] Ok
- devcfg(0)[devcfg.mbn] Ok
- devcfgbak(0)[devcfg.mbn] Ok
- apdp(0)[dummy.img] Ok
- msadp(0)[dummy.img] Ok
- sbl1(0)[sbl1.mbn] Ok
- sbl1bak(0)[sbl1.mbn] Ok
- rpm(0)[rpm.mbn] Ok
- rpmbak(0)[rpm.mbn] Ok
- cmnlib(0)[cmnlib_30.mbn] Ok
- cmnlibbak(0)[cmnlib_30.mbn] Ok
- cmnlib64(0)[cmnlib64_30.mbn] Ok
- cmnlib64bak(0)[cmnlib64_30.mbn] Ok
- keymaster(0)[km4.mbn] Ok
- keymasterbak(0)[km4.mbn] Ok
- misc(0)[misc.img] Ok
- aboot(0)[emmc_appsboot.mbn] Ok
- abootbak(0)[emmc_appsboot.mbn] Ok
- tz(0)[tz.mbn] Ok
- tzbak(0)[tz.mbn] Ok
- dtbo(0)[dtbo.img] Ok
- dtbobak(0)[dtbo.img] Ok
- splash(0)[splash.img] Ok
- dsp(0)[adspso.bin] Ok
- dspbak(0)[adspso.bin] Ok
- persist(0)[persist.img] Skipped
- mdtp(0)[mdtp.img] Ok
- mdtpbak(0)[mdtp.img] Ok
- boot(0)[boot.img] Ok
- recovery(0)[recovery.img] Ok
- cache(0)[cache.img] Ok
- modem(0)[NON-HLOS.bin] Ok
- system(0)[system.img] Ok
- vendor(0)[vendor.img] Ok
- cust(0)[cust.img] Ok
- userdata(0)[userdata.img] Ok
- PrimaryGPT(0)[gpt_main0.bin] Ok

Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-33.] OK
0 [CRC32(2,7680)] OK
0 [CRC32(NUM_DISK_SECTORS-33.,7680)] OK
0 [0] OK
0 [CRC32(1,92)] OK
0 [0] OK
0 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 0
Set bootable storage drive 0 Ok

Rebooting Phone.... Ok

Elapsed Time : 00:05:35
BR
Dipendra Pathak

  Reply With Quote
Old 06-18-2021, 03:58   #2049 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,623
ASUS X00DD formatting user data using Ulter Power successfully done by Hydra Tool

ASUS X00DD formatting user data using Ulter Power successfully done by Hydra Tool

1. Run Qualcomm module.
2. Choose Brand and Module as AUTO.
3. Go to "Service"--> "Universal" from Universal Option
4. Choose "Ultra Power"
5. Choose "Auto".
6. Click "Execute"
7. Connect device to computer using USB Data Cable.
8. Wait until the operation is completed

Screen Short:



Logs:

BR
Dipendra Pathak

  Reply With Quote
Old 06-18-2021, 04:08   #2050 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,623
Xiaomi Redmi 6A (Cactus) Mi Account successfully removed by Hydra Tool

Xiaomi Redmi 6A (Cactus) Mi Account successfully removed by Hydra Tool

1. Run Hydra MTK Module and Sosc.
2. Choose Brand and Module.
3. Go to "Service"-->"Tool" Tab.
4. Choose "Xiaomi".
5. Click on "Remove Mi Account (Erased Method)" from drop down menu.
6. Click "Execute" button
7. connect device to the computer with USB Data cable
8. Wait until the process is completed.
Screen Short:



Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port_V1632 (COM29)
Device :5&376aba2d&0&4
SymbolicName :\??\USB#VID_0E8D&PID_0003#5&376aba2d&0&4#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0


Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 2231BE611607E83348C0F7CD9B876EF9
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003A3E00000 -14.561 GB
eMMC CID : 150100514536334D4203347BE4449595 - QE63MB

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi 6A
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : zh-CN
Description : cactus-user 9 PPR1.180610.011 V11.0.5.0.PCBCNXM release-keys
Miui Ver : V11
Device : cactus
Display ID : SW_S98506AE1_V009_M13_XM_C3C_USR
Security Patch : 2020-03-01
Fingerprint : xiaomi/cactus/cactus:9/PPR1.180610.011/V11.0.5.0.PCBCNXM:user/release-keys
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Remove MiAccount[Erase Method]
Processing...
-persist.bin[0x0F000000]64 MB ->persist.bin...Ok
-frp.bin[0x05588000]1024 KB ->frp.bin...Ok Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:12
BR
Dipendra Pathak

  Reply With Quote
Old 06-19-2021, 02:13   #2051 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,623
Xiaomi Redmi Black Shark wiping securities using fastboot done by Hydra Tool

Xiaomi Black Shark wiping securities successfully done by Hydra Tool

1. Run Hydra Qualcomm Module.
2. Choose Brand and Module
3. Go to "Service"--> "Universal" Tab.
4. Choose "Partition" from drop down menu.
5. Choose "wipe security" from fastboot mode.
6. connect device to the computer with USB Data cable
7. Wait until the process is completed.

Screen Short:




BR
Dipendra Pathak

  Reply With Quote
Old 06-19-2021, 02:21   #2052 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,623
Xiaomi Redmi Note 9 (Merlin) Mi Account and FRP Successfully removed by Hydra Tool

Xiaomi Redmi Note 9 (Merlin) Mi Account and FRP Successfully removed by Hydra Tool

1. Run Hydra MTK Module and Sosc.
2. Choose Brand and Module.
3. Go to "Service"-->"Tool" Tab.
4. Choose "Xiaomi".
5. Click on "Remove Mi Account (Erased Method) + FRP" from drop down menu.
6. Click "Execute" button
7. connect device to the computer with USB Data cable
8. Wait until the process is completed.
Screen Short:



BR
Dipendra Pathak

  Reply With Quote
Old 06-19-2021, 02:32   #2053 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,623
Huawei FRL-L22 (Y9A 2021) has repaired both IMEI successfully done by Hydra Tool

Huawei FRL-L22 (Y9A 2021) has repaired both IMEI successfully done by Hydra Tool

1. Run Hydra MTK Module,
2. Select Brand and Model
3. Go to Service-->Repair IMEI
4. Tick "IMEI changing is................................"
5. Choose The device FLASH MODE and type IMEI written on Battery Housing
6. Execute and connect the device to the computer
7. wait until the process is completed.

Screen Short:



BR
Dipendra Pathak

  Reply With Quote
Old 06-19-2021, 02:41   #2054 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,623
Xiaomi Mi Max 2 (Chiron) Unlock Universal Auto successfully done by Hydra Tool

Xiaomi Mi Max 2 (Chiron) Unlock Universal Auto successfully done by Hydra Tool

1. Run Hydra Qualcomm Module.
2. Choose Brand and Module.
3. Go to "Service"-->"Xiaomi" Tab.
4. Choose "Bootloader" from drop down menu.
5. Click on "Unlock universal Auto" from flash mode.
6. Tick "Include FRP" if you also wants to remove FRP
7. Click "Execute" button
8. connect device to the computer with USB Data cable
9. Wait until the process is completed.

Screen Short:



BR
Dipendra Pathak

  Reply With Quote
Old 06-19-2021, 09:59   #2055 (permalink)
Freak Poster
 
Join Date: Jun 2016
Location: INDIA (BIHAR,MOTIHARI)
Posts: 305
Member: 2589490
Status: Offline
Sonork: live:.cid.32a2af136177ed3
Thanks Meter: 232
Donate money to this user
Arrow Redmi 5 ROSY (REDMI)PATTERN REMOVE DONE BY HYDRA TOOL

  Reply With Quote
Reply

Bookmarks


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


 



All times are GMT +1. The time now is 08:30.



Powered by Searchlight © 2024 Axivo Inc.
vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2024 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2023 -
Page generated in 0.37797 seconds with 9 queries

SEO by vBSEO