Huawei Y9 Pro factory reset protection FRP successfully removed by Hydra Tool
Screen Short:
Logs:
1. Run MTK tool of Hydra Dongle.
2. Choose Correct Module and Brand or choose "Auto".
3. Go to "Service" -- > "Tool"
4. choose "Factory Reset Protection (FRP)".
5. Choose "Auto" from "Method / Option" drop down menu.
6. Click on "Execute" and connect device with computer using USB cable.
7. Wait until the process is completed.
2. Choose Correct Module and Brand or choose "Auto".
3. Go to "Service" -- > "Tool"
4. choose "Factory Reset Protection (FRP)".
5. Choose "Auto" from "Method / Option" drop down menu.
6. Click on "Execute" and connect device with computer using USB cable.
7. Wait until the process is completed.
Screen Short:
Logs:
Quote:
===================================== Searching for MTK Device...Found Port Identification :Flashmode BROM FriendlyName :MediaTek USB Port_V1632 (COM8) Device :5&388db30c&0&1 SymbolicName :\??\USB#VID_0E8D&PID_0003#5&388db30c&0&1#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed} Driver Ver :01/22/2015,3.0.1504.0 Handshaking...Ok Identifying Hardware ID..... Reading Device hardware info.. hw code : 0717MT6761 [6761] hw subcode : 8A00 hw version : CA01 sw version : 0200 Target config : E5 SB : 01 (True) SLA : 00 (False) DAA : 04 (True) Exploiting Device... Exploit Sent.. Successfully Exploited... Handshaking...Ok Identifying Hardware ID..... Reading Device hardware info.. hw code : 0717MT6761 [6761] hw subcode : 8A00 hw version : CA01 sw version : 0200 Target config : 00 SB : 00 (False) SLA : 00 (False) DAA : 00 (False) FUSEID : 00000000 SECURE VERSION : 00 BL VERSION : FE NORMAL BOOT Preparing Download Agent.. DA : Huawei_Y9Pro_6761_DA.bin Agent: MTK_DOWNLOAD_AGENT -HYDRA Ver : MTK_AllInOne_DA_v3.3001.2018/10/18.17:38_452898 Init : Loader [1] Sending : Accepted Identifying Protocol... Protocol : New Synchronization...SYNC Mode : brom Preloader Initialization... Parsing preloader_k61v1_64_mexico.bin Init : Accepted Execute Secondary Loader Init : Loader [2] Executing : SYNC Reading Device UniqueID, RAM and Flash Chip Info... UNIQUE ID : 92DC2553EF52937605550B72AF39B39D ERAM Size : 0x0000000000080000 -512 KB IRAM Size : 0x00000000C0000000 -3 GB eMMC BOOT1 : 0x0000000000400000 -4 MB eMMC BOOT2 : 0x0000000000400000 -4 MB eMMC RPMB : 0x0000000000400000 -4 MB eMMC USER : 0x0000000747C00000 -29.121 GB eMMC CID : 150100474436424D42015698D30B1787 - GD6BMB DA Speed : high-speed Reading GPT-EMMC [0x00008000] 130 Items Autobackup Partitions -preloader[0x00000000]512 KB ->preloader.bin...Ok -> Renaming Preloader.... preloader_lc7_h6116.bin Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0717__053121154410\MT6761_Androi d_scatter.txt -pgpt[0x00000000]32 KB ->pgpt.bin...Ok -frp[0x01888000]1024 KB ->frp.bin...Ok -nvdata[0x07022000]71.867 MB ->nvdata.bin...Ok -persist[0x0B800000]48 MB ->persist.bin...Ok -protect1[0x0E800000]8 MB ->protect1.bin...Ok -protect2[0x0F000000]8 MB ->protect2.bin...Ok -nvram[0x1B300000]64 MB ->nvram.bin...Ok Done!!! C:\Hydra Tool\\Backup\Auto\0717__053121154410 MTK Phone Loader is NOW RUNNING. Reading Device UniqueID, RAM and Flash Chip Info... UNIQUE ID : 92DC2553EF52937605550B72AF39B39D ERAM Size : 0x0000000000080000 -512 KB IRAM Size : 0x00000000C0000000 -3 GB eMMC BOOT1 : 0x0000000000400000 -4 MB eMMC BOOT2 : 0x0000000000400000 -4 MB eMMC RPMB : 0x0000000000400000 -4 MB eMMC USER : 0x0000000747C00000 -29.121 GB eMMC CID : 150100474436424D42015698D30B1787 - GD6BMB Reading GPT-EMMC [0x00008000] 130 Items ------------------------------------- Operation : Auto Processing... ZeroWipe FRP Partition... Ok Elapsed Time : 00:00:46 |
Dipendra Pathak
by Dipendra Pathak via GSM-Forum
No comments:
Post a Comment