Hydra Honor 9A MOA-LX9N Frp Remove With by Hydra Tool

Hydra Tool

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Honor 9A MOA-LX9N Frp Remove With by Hydra Tool
220400024429_HydraTool.exe__03-31-2023-192045.jpeg

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Service Function
Factory Reset Protection[FRP]
Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching for MTK Device...Found
MTK Port Type : Flashmode BROM
FriendlyName : USB Modem Driver (COM7)
Device : /5&e658374&0&1
SymbolicName : \\?\usb#vid_0e8d&pid_0003#5&e658374&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 10/15/2008,6.0.6000.16386
Service : usbser

Openning Port [COM7] Ok
Handshaking...Ok
HwCode : 0766 {MT6765/MT8768t}
Hwver : 0000
Target config : E5
SBC : 01 (True)
SLA : 00 (False)
DAA : 04 (True)
SWJTAG : 04 (True)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 20 (True)
MEMWRITE : 40 (True)
CMD_C8 : 80 (True)
Connection : BROM
HW Subcode : 8A00
HW Subcode : CA00
SW Ver : 0000
ME_ID : 34F03A87698716F792B3C661B9D5A839
SOC_ID : A5219A244A72B812CBA7A1CB2D4519480F8317C9C54B5A2497A0D3E52F6DBF70

Exploiting Device...
Successfully Exploited..
Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..Found @ 0x00200BC4
Starting to dump...
Prel Size : 0x0003EA0C
Successfully dump preloader..
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)
Connection : BROM

Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin]
Uploading Stage 1....
Successfully uploaded stage 1, jumping ..
Executing JUMP_DA Address @ 0x00200000
Jumping to 0x00200000 Ok 0xC0
Successfully received DA sync
ONNECTION_AGENT : brom
DRAM config needed for : 90014A6843386150
Sending auto preloader from dump... [preloader_k62v1_64_mexico.bin]
Sending emi data.. [DRAM setup passed.]
Sending emi data succeeded.
Uploading stage 2...
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
ERAM Size : 0x000000000003A000-232 KB
IRAM Size : 0x00000000C0000000-3 GB
EMMC Boot1 Size : 0x0000000000400000-4 MB
EMMC Boot2 Size : 0x0000000000400000-4 MB
EMMC RPMB Size : 0x0000000001000000-16 MB
EMMC USER Size : 0x0000000E8F800000-58.242 GB
EMMC CID : 90014A68433861503E010063D12177AF - hC8aP>
HW-CODE : 0x766
HWSUB-CODE : 0x8A00
HW-VERSION : 0xCA00
SW-VERSION : 0x0
CHIP-EVOLUTION : 0x0
DA-VERSION : 1.0
Speed : high-speed
Error: on sending data: DA hash mismatch
*DA Extensions failed to enable
Reading Partition Table ..
Partition Count : 57
--------------- Reading build.prop content ---------------
Unable to read system info..
--------------- end of build.prop content ---------------

Reading IMEI........
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------
Backing up Security..
- preloader(preloader.bin), 512 KB = Ok [preloader_k62v1_64_mex_a32.bin]
*Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0766_34F03A87698716F792B3C661B9D5A839\Auto\033123190427\6765_Android_scatter.txt
- pgpt(pgpt.bin), 32 KB = Ok
- nvram(nvram.bin), 5 MB = Ok
- nvdata(nvdata.bin), 16 MB = Ok
- frp(frp.bin), 1024 KB = Ok
- protect1(protect1.bin), 8 MB = Ok
- protect2(protect2.bin), 13.969 MB = Ok
- persist(persist.bin), 8 MB = Ok
- oeminfo(oeminfo.bin), 32 MB = Ok
- proinfo(proinfo.bin), 1024 KB = Ok
- nvcfg(nvcfg.bin), 8 MB = Ok
- seccfg(seccfg.bin), 8 MB = Ok
Backup Done!!!
Status: Ok

Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!

Elapsed Time : 00:17:07
 
Top