05-30-2023, 08:56
|
#3130 (permalink)
|
No Life Poster
Join Date: Feb 2012 Age: 39
Posts: 1,395
Member: 1724862
Status: Offline
Thanks Meter: 450 | Huawei Y5 2018 (DRA-L21) FRP Remove With by Hydra Tool Huawei Y5 2018 (DRA-L21) FRP Remove With by Hydra Tool Quote:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Service Function
Factory Reset Protection[FRP]
Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Searching for MTK Device...Found
MTK Port Type : Flashmode BROM
FriendlyName : MediaTek USB Port_V1632 (COM26)
Device : /5&14013d94&0&3
SymbolicName : \\?\usb#vid_0e8d&pid_0003#5&14013d94&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0
Service : wdm_usb
Openning Port [COM26] Ok
Handshaking...Ok
HwCode : 0699 {MT6739/MT6731}
Hwver : 0000
Target config : E3
SBC : 01 (True)
SLA : 02 (True)
DAA : 00 (False)
SWJTAG : 02 (True)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 20 (True)
MEMWRITE : 40 (True)
CMD_C8 : 80 (True)
Connection : BROM
HW Subcode : 8A00
HW Subcode : CA00
SW Ver : 0000
ME_ID : C2C54D614073D1D77D529B2B94DCC8AD
SOC_ID : 1BEC25277A74B27079637F62332E432B1A109901931643D0CC 3591961416B46E
Exploiting Device...
Successfully Exploited..
Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..Found @ 0x00200BC4
Starting to dump...
Prel Size : 0x0001D5D0
Successfully dump preloader.. [C:\Hydra Tool\Boot\PreloaderDump\preloader_dura.bin]
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)
Connection : BROM
Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin]
Patching da2 ... Ok
Uploading Stage 1....
Successfully uploaded stage 1, jumping ..
Executing JUMP_DA Address @ 0x00200000
Jumping to 0x00200000 Ok 0xC0
Successfully received DA sync
ONNECTION_AGENT : brom
Sending auto preloader from dump... [preloader_dura.bin]
Sending emi data.. [DRAM setup passed.]
Sending emi data succeeded.
Uploading stage 2...
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
ERAM Size : 0x0000000000020000-128 KB
IRAM Size : 0x0000000040000000-1024 MB
EMMC Boot1 Size : 0x0000000000400000-4 MB
EMMC Boot2 Size : 0x0000000000400000-4 MB
EMMC RPMB Size : 0x0000000000400000-4 MB
EMMC USER Size : 0x00000003A3E00000-14,561 GB
EMMC CID : 150100464536324D42061754682B852B - FE62MB
HW-CODE : 0x699
HWSUB-CODE : 0x8A00
HW-VERSION : 0xCA00
SW-VERSION : 0x0
CHIP-EVOLUTION : 0x0
DA-VERSION : 1.0
Speed : high-speed
Upload data was accepted. Jumping to stage 2...
DA Extensions successfully added
Reading Partition Table ..
Partition Count : 47
--------------- Reading build.prop content ---------------
SDK : 27
Release : 8.1.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-US
Security Patch : 2018-09-01
StorageType : mtp
--------------- end of build.prop content ---------------
Reading IMEI........
IMEI1 : 868************
IMEI2 : 868************
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------
Backing up Security..
- preloader(preloader.bin), 512 KB = Ok [preloader_dura.bin]
*Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0699_C2C54D614073D1D77D529B2B9 4DCC8AD\Auto\052923190305\6739_Android_scatter.txt
- pgpt(pgpt.bin), 512 KB = Ok
- nvram(nvram.bin), 5 MB = Ok
- nvdata(nvdata.bin), 32 MB = Ok
- frp(frp.bin), 1024 KB = Ok
- protect1(protect1.bin), 8 MB = Ok
- protect2(protect2.bin), 16,938 MB = Ok
- oeminfo(oeminfo.bin), 8 MB = Ok
- proinfo(proinfo.bin), 3 MB = Ok
- nvcfg(nvcfg.bin), 8 MB = Ok
- sec1(sec1.bin), 2 MB = Ok
- seccfg(seccfg.bin), 8 MB = Ok
- lk(lk.bin), 1024 KB = Ok
Backup Done!!!
Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!
Action Result : Ok
Elapsed Time : 00:00:47
| |
| |