Huawei Y9 Pro factory reset protection FRP successfully removed by Hydra Tool
Screen Short:
Logs:
1. Run MTK tool of Hydra Dongle.
2. Choose Correct Module and Brand or choose "Auto".
3. Go to "Service" -- > "Tool"
4. choose "Factory Reset Protection (FRP)".
5. Choose "Auto" from "Method / Option" drop down menu.
6. Click on "Execute" and connect device with computer using USB cable.
7. Wait until the process is completed.
2. Choose Correct Module and Brand or choose "Auto".
3. Go to "Service" -- > "Tool"
4. choose "Factory Reset Protection (FRP)".
5. Choose "Auto" from "Method / Option" drop down menu.
6. Click on "Execute" and connect device with computer using USB cable.
7. Wait until the process is completed.
Screen Short:
Logs:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port_V1632 (COM8)
Device :5&388db30c&0&1
SymbolicName :\??\USB#VID_0E8D&PID_0003#5&388db30c&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0
Handshaking...Ok
Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0717MT6761 [6761]
hw subcode : 8A00
hw version : CA01
sw version : 0200
Target config : E5
SB : 01 (True)
SLA : 00 (False)
DAA : 04 (True)
Exploiting Device...
Exploit Sent..
Successfully Exploited...
Handshaking...Ok
Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0717MT6761 [6761]
hw subcode : 8A00
hw version : CA01
sw version : 0200
Target config : 00
SB : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
FUSEID : 00000000
SECURE VERSION : 00
BL VERSION : FE
NORMAL BOOT
Preparing Download Agent..
DA : Huawei_Y9Pro_6761_DA.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2018/10/18.17:38_452898
Init : Loader [1]
Sending : Accepted
Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_k61v1_64_mexico.bin
Init : Accepted
Execute Secondary Loader
Init : Loader [2]
Executing : SYNC
Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 92DC2553EF52937605550B72AF39B39D
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 150100474436424D42015698D30B1787 - GD6BMB
DA Speed : high-speed
Reading GPT-EMMC [0x00008000] 130 Items
Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_lc7_h6116.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0717__053121154410\MT6761_Android_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x01888000]1024 KB ->frp.bin...Ok
-nvdata[0x07022000]71.867 MB ->nvdata.bin...Ok
-persist[0x0B800000]48 MB ->persist.bin...Ok
-protect1[0x0E800000]8 MB ->protect1.bin...Ok
-protect2[0x0F000000]8 MB ->protect2.bin...Ok
-nvram[0x1B300000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0717__053121154410
MTK Phone Loader is NOW RUNNING.
Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 92DC2553EF52937605550B72AF39B39D
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 150100474436424D42015698D30B1787 - GD6BMB
Reading GPT-EMMC [0x00008000] 130 Items
-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition... Ok
Elapsed Time : 00:00:46
Mount Everest[/B]