HYDRA Sm-A315G (A31) Bootloader Unlock Done With By Hydra (1 Viewer)

GSMŞ3R1F

Profesyonel Teknik Servis
Yönetici
Admin
Destek Ekibi
Onursal Yönetici
Elit Üye
Uzman Üye
SM-A315G (A31) Bootloader Unlock Done With by Hydra
190100000197_HMTKTool.exe_FM_Bootloader_Unlock_Bootloader_02-22-2022-201200.jpeg

=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port (COM43)
Device : 6&37f2e094&0&2
SymbolicName :??USB#VID_0E8D&PID_0003#6&37f2e094&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0

Opened handle..
Handshaking... Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0707 MT6768 [6768]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : E0
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 20 (True)
MEMWRITE : 40 (True)
CMD_C8 : 80 (True)
Device not secured..
--- ENABLE AUTO PREL DUMP ----
Handshaking...

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0707 MT6768 [6768]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : E0
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 20 (True)
MEMWRITE : 40 (True)
CMD_C8 : 80 (True)

MEID : 65E75EC5EDF74BE9F7ADCBB5725AD258
Stage 1.. [Size:256504]
Sending : Please wait.. Accepted

Identifying Protocol...
Protocol : New
Synchronization... SYNC
Preloader Initialization...
sing preloader_k68v1_64_titan.bin
Init : Accepted
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : A616604F7CD3005CC44D7D49ADD4DDC2
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000001D1F000000 -116.484 GB
eMMC CID : 150100335636434D4200B52668664765 - 3V6CMB
Executing : ACCEPTED...

Reading GPT -EMMC [0x00008000] 59 Items

Autobackup titions
-preloader [0x00000000] 512 KB -> preloader.bin...0 Ok
-> Renaming Preloader.... preloader_k68v1_64_titan.bin
Creating Scatter file... C:Hydra ToolBackupAuto0707__022222201145MT6768_Android_scatter.txt
-pgpt [0x00000000] 4 MB -> pgpt.bin...0 Ok
-frp [0x06700000] 1024 KB -> frp.bin...0 Ok
-nvdata [0x08800000] 64 MB -> nvdata.bin...0 Ok
-protect1 [0x0E800000] 8 MB -> protect1.bin...0 Ok
-protect2 [0x0F000000] 8 MB -> protect2.bin...0 Ok
-persist [0x10000000] 48 MB -> persist.bin...0 Ok
-nvram [0x20880000] 64 MB -> nvram.bin...0 Ok
Done!!!
C:Hydra ToolBackupAuto0707__022222201145
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 1 A616604F7CD3005CC44D7D49ADD4DDC2
ERAM Size : 1 0x0000000000070000 -448 KB
IRAM Size : 1 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000001D1F000000 -116.484 GB
eMMC CID : 150100335636434D4200B52668664765 - 3V6CMB

Reading GPT -EMMC [0x00008000] 59 Items


-------------------------------------
Operation : Unlock Bootloader
Processing...
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------

Verifying status after operation...
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------
Action Result : Ok

Elapsed Time : 00:01:11
 
Üst