Hydra Huawei Y9A(FRL-L22)Remove Huawei Account With by Hydra

Hydra Tool

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Huawei Y9A(FRL-L22)Remove Huawei Account With by Hydra
201000009461_HMTKTool.exe_FM_HuaweiTool_Remove_Account_10-14-2021-193623.jpeg

=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port (COM3)
Device : 5&11a3f1f7&0&1
SymbolicName :??USB#VID_0E8D&PID_0003#5&11a3f1f7&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 11/30/2012,5.30.14.0

Opened handle..
Handshaking... Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0707 MT6768 [6768]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : E5
SBC : 01 (True)
SLA : 00 (False)
DAA : 04 (True)
SWJTAG : 04 (True)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 20 (True)
MEMWRITE : 40 (True)
CMD_C8 : 80 (True)

Exploiting Device...
Exploit Sent..
Successfully Exploited...
Handshaking... Ok

C:Hydra ToolBackupPreloader_dumpprel.tmp
Handshaking...

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0707 MT6768 [6768]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)

MEID : 8AFCF09B58E2F354646079125E4E2793
Stage 1.. [Size:256504]
Sending : Please wait.. Accepted

Identifying Protocol...
Protocol : New
Synchronization... SYNC
Preloader Initialization...
sing prel.tmp
Init : Accepted
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : B4E94207B07C300A0705D6B445BA6144
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000001D1EC00000 -116.48 GB
eMMC CID : 15010044555442343202A81ABE818715 - DUTB42
Executing : ACCEPTED...

Reading GPT -EMMC [0x00008000] 130 Items

Autobackup titions
-preloader [0x00000000] 512 KB -> preloader.bin...0 Ok
-> Renaming Preloader.... preloader_k69v1_64.bin
Creating Scatter file... C:Hydra ToolBackupAuto0707__101421193556MT6768_Android_scatter.txt
-pgpt [0x00000000] 32 KB -> pgpt.bin...0 Ok
-frp [0x01A08000] 1024 KB -> frp.bin...0 Ok
-nvdata [0x03B08000] 32 MB -> nvdata.bin...0 Ok
-protect1 [0x05B08000] 8 MB -> protect1.bin...0 Ok
-protect2 [0x06308000] 8 MB -> protect2.bin...0 Ok
-persist [0x07800000] 8 MB -> persist.bin...0 Ok
-nvram [0x08100000] 21 MB -> nvram.bin...0 Ok
-oeminfo [0x09600000] 32 MB -> oeminfo.bin...0 Ok
Done!!!
C:Hydra ToolBackupAuto0707__101421193556
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 1 B4E94207B07C300A0705D6B445BA6144
ERAM Size : 1 0x0000000000070000 -448 KB
IRAM Size : 1 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000001D1EC00000 -116.48 GB
eMMC CID : 15010044555442343202A81ABE818715 - DUTB42

Reading GPT -EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Remove Account
Processing...
Backing up tition for safety...
-oeminfo_101421193617.bin [0x09600000] 32 MB -> oeminfo_101421193617.bin...0 Ok
Action Result : Ok

Elapsed Time : 00:01:46
 
Top