Hydra Huawei Y9 Pro factory reset protection FRP successfully removed by Hydra Tool

Hydra Tool

Mount Everest

Friend's Martview
Dec 26, 2020
1,273
543
Kathmandu, Nepal
Huawei Y9 Pro factory reset protection FRP successfully removed by Hydra Tool

1. Run MTK tool of Hydra Dongle.
2. Choose Correct Module and Brand or choose "Auto".
3. Go to "Service" -- > "Tool"
4. choose "Factory Reset Protection (FRP)".
5. Choose "Auto" from "Method / Option" drop down menu.
6. Click on "Execute" and connect device with computer using USB cable.
7. Wait until the process is completed.

Screen Short:



Logs:

=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port_V1632 (COM8)
Device :5&388db30c&0&1
SymbolicName :\??\USB#VID_0E8D&PID_0003#5&388db30c&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0717MT6761 [6761]
hw subcode : 8A00
hw version : CA01
sw version : 0200
Target config : E5
SB : 01 (True)
SLA : 00 (False)
DAA : 04 (True)

Exploiting Device...
Exploit Sent..
Successfully Exploited...

Handshaking...Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0717MT6761 [6761]
hw subcode : 8A00
hw version : CA01
sw version : 0200
Target config : 00
SB : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
FUSEID : 00000000
SECURE VERSION : 00
BL VERSION : FE
NORMAL BOOT

Preparing Download Agent..
DA : Huawei_Y9Pro_6761_DA.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2018/10/18.17:38_452898
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_k61v1_64_mexico.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 92DC2553EF52937605550B72AF39B39D
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 150100474436424D42015698D30B1787 - GD6BMB

DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_lc7_h6116.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0717__053121154410\MT6761_Android_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x01888000]1024 KB ->frp.bin...Ok
-nvdata[0x07022000]71.867 MB ->nvdata.bin...Ok
-persist[0x0B800000]48 MB ->persist.bin...Ok
-protect1[0x0E800000]8 MB ->protect1.bin...Ok
-protect2[0x0F000000]8 MB ->protect2.bin...Ok
-nvram[0x1B300000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0717__053121154410
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 92DC2553EF52937605550B72AF39B39D
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 150100474436424D42015698D30B1787 - GD6BMB

Reading GPT-EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition... Ok

Elapsed Time : 00:00:46
Mount Everest[/B]
 
  • Like
Reactions: FAROK
Top