Hydra Redmi Note 8 Pro (begonia) FRP Removed With by Hydra Tool

Hydra Tool

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi Note 8 Pro (begonia) FRP Removed With by Hydra Tool
medved100@list.ru_HydraTool.exe__05-04-2023-121921.jpeg

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Service Function
Factory Reset Protection[FRP]
Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching for MTK Device...Found
MTK Port Type : Flashmode Preloader
FriendlyName : MediaTek PreLoader USB VCOM (Android) (COM122)
Device : /5&521a615&0&4
SymbolicName : \\?\usb#vid_0e8d&pid_2000#5&521a615&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0
Service : wdm_usb

Openning Port [COM122] Ok
Handshaking...Ok
HwCode : 0725 {MT6779}
Hwver : 0000
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)
Connection : Preloader
HW Subcode : 8A00
HW Subcode : CA01
SW Ver : 0000
ME_ID : 20B9B15FE104659CBFEC35F75ED80F83


- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Preloader To Brom Function.....
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- Method 1 Exploit Executed..... [Failed]
- Method 2 Exploit Executed..... [Failed]
- Method 3 Exploit Executed..... [Failed]

Preloader still in preloader mode...
Connection : Preloader

Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin]
Uploading Stage 1....
Successfully uploaded stage 1, jumping ..
Executing JUMP_DA Address @ 0x00200000
Jumping to 0x00200000 Ok 0xC0
Successfully received DA sync
ONNECTION_AGENT : preloader
DRAM config needed for : 31323847422D5546532D4D5420202020
Uploading stage 2...
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
ERAM Size : 0x0000000000080000-512 KB
IRAM Size : 0x0000000180000000-6 GB
UFS MID : 0x31
UFS FWVer : 0x9QSM
UFS Blocksize : 0x0000000000001000-4 KB
UFS LU0 Size : 0x0000000000400000-4 MB
UFS LU1 Size : 0x0000000000400000-4 MB
UFS LU2 Size : 0x0000001DCA800000-119,164 GB
UFS ID : 8
UFS CID : 31323847422D5546532D4D542020202000000000
HW-CODE : 0x725
HWSUB-CODE : 0x8A00
HW-VERSION : 0xCA01
SW-VERSION : 0x0
CHIP-EVOLUTION : 0x0
DA-VERSION : 1.0
Speed : high-speed
Reading Partition Table ..
Partition Count : 46
--------------- Reading build.prop content ---------------
Product : BV9900E_EEA
ID : QP1A.190711.020
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_k79v1_64-user 10 QP1A.190711.020 mp1V9433 release-keys
Display ID : BV9900E_EEA_S900AA_V1.0_20211206V06
Security Patch : 2021-11-05
StorageType : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
IMEI1 : 3535***********
IMEI2 : 3535***********
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------
Backing up Security..
- preloader(preloader.bin), 512 KB = Ok [preloader_k79v1_64.bin]
*Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0725_20B9B15FE104659CBFEC35F75ED80F83\Auto\050423121911\6779_Android_scatter.txt
- pgpt(pgpt.bin), 32 KB = Ok
- nvram(nvram.bin), 64 MB = Ok
- nvdata(nvdata.bin), 64 MB = Ok
- frp(frp.bin), 1024 KB = Ok
- protect1(protect1.bin), 8 MB = Ok
- protect2(protect2.bin), 8 MB = Ok
- persist(persist.bin), 48 MB = Ok
- proinfo(proinfo.bin), 3 MB = Ok
- nvcfg(nvcfg.bin), 32 MB = Ok
- sec1(sec1.bin), 2 MB = Ok
- seccfg(seccfg.bin), 8 MB = Ok
Backup Done!!!

Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!

Action Result : Ok

Elapsed Time : 00:00:31

 
Top