|
Welcome to the GSM-Forum forums. You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. Only registered members may post questions, contact other members or search our database of over 8 million posts. Registration is fast, simple and absolutely free so please - Click to REGISTER! If you have any problems with the registration process or your account login, please contact contact us . |
|
Register | FAQ | Donate | Forum Rules | Root any Device | ★iPhone Unlock★ | ★ Direct Codes ★ | Direct Unlock Source |
| LinkBack | Thread Tools | Display Modes |
09-15-2021, 12:35 | #1 (permalink) |
Freak Poster Join Date: Aug 2016 Location: Peshawar Pakistan
Posts: 140
Member: 2613197 Status: Offline Sonork: 100.1673396 Thanks Meter: 29 | Vivo S1 One CLick Done By Hydra Port Identification :Flashmode BROM FriendlyName :MediaTek USB Port_V1633 (COM4) Device :5&f609c7b&0&5 SymbolicName :\??\USB#VID_0E8D&PID_0003#5&f609c7b&0&5#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver :01/22/2015,3.0.1504.0 Handshaking...Ok Identifying Hardware ID..... Reading Device hardware info.. hw code : 0707MT6768 [6768] hw subcode : 8A00 hw version : CA00 sw version : 0000 Target config : E5 SBC : 01 (True) SLA : 00 (False) DAA : 04 (True) SWJTAG : 04 (True) EPP : 00 (False) CERT : 00 (False) MEMREAD : 20 (True) MEMWRITE : 40 (True) CMD_C8 : 80 (True) Exploiting Device... Exploit Sent.. Successfully Exploited... Handshaking...Ok C:\Hydra Tool\Backup\Preloader_dump\prel.tmp Handshaking... Identifying Hardware ID..... Reading Device hardware info.. hw code : 0707MT6768 [6768] hw subcode : 8A00 hw version : CA00 sw version : 0000 Target config : 00 SBC : 00 (False) SLA : 00 (False) DAA : 00 (False) SWJTAG : 00 (False) EPP : 00 (False) CERT : 00 (False) MEMREAD : 00 (False) MEMWRITE : 00 (False) CMD_C8 : 00 (False) MEID : E974017669548AE0196945496649BCA9 Stage 1..[Size:256504] Sending : Please wait.. Accepted Identifying Protocol... Protocol : New Synchronization...SYNC Preloader Initialization... Parsing prel.tmp Init : Accepted Executing : SYNC Reading Device UniqueID, RAM and Flash Chip Info... UNIQUE ID : 7F5F641201D1FE6DA9C2759C13757D51 ERAM Size : 0x0000000000070000 -448 KB IRAM Size : 0x0000000100000000 -4 GB eMMC BOOT1 : 0x0000000000400000 -4 MB eMMC BOOT2 : 0x0000000000400000 -4 MB eMMC RPMB : 0x0000000001000000 -16 MB eMMC USER : 0x0000001D1EC00000 -116.48 GB eMMC CID : 150100445636444D42022F066A781775 - DV6DMB Executing : ACCEPTED... Reading GPT-EMMC [0x00008000] 130 Items Reading System Info ID : RP1A.200720.012 SDK : 30 Release : 11 ABI : arm64-v8a CPU abilist : arm64-v8a,armeabi-v7a,armeabi Locale : en-US Description : full_k68v1_64-user 11 RP1A.200720.012 eng.compil.20210409.214127 release-keys Display ID : RP1A.200720.012 release-keys Security Patch : 2021-03-01 Platform : =MTK6768 StorageType : mtp Userdata State : Not Encrypted Autobackup Partitions -preloader[0x00000000]512 KB ->preloader.bin...Ok -> Renaming Preloader.... preloader_k68v1_64.bin Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0707__091521151510\MT6768_Androi d_scatter.txt -pgpt[0x00000000]32 KB ->pgpt.bin...Ok -frp[0x05508000]1024 KB ->frp.bin...Ok -nvdata[0x13208000]64 MB ->nvdata.bin...Ok -persist[0x17208000]48 MB ->persist.bin...Ok -protect1[0x1A208000]8 MB ->protect1.bin...Ok -protect2[0x1AA08000]13.969 MB ->protect2.bin...Ok -nvram[0x1DF80000]64 MB ->nvram.bin...Ok Done!!! C:\Hydra Tool\\Backup\Auto\0707__091521151510 MTK Phone Loader is NOW RUNNING. Reading Device UniqueID, RAM and Flash Chip Info... UNIQUE ID : 7F5F641201D1FE6DA9C2759C13757D51 ERAM Size : 0x0000000000070000 -448 KB IRAM Size : 0x0000000100000000 -4 GB eMMC BOOT1 : 0x0000000000400000 -4 MB eMMC BOOT2 : 0x0000000000400000 -4 MB eMMC RPMB : 0x0000000001000000 -16 MB eMMC USER : 0x0000001D1EC00000 -116.48 GB eMMC CID : 150100445636444D42022F066A781775 - DV6DMB Reading GPT-EMMC [0x00008000] 130 Items Reading System Info ID : RP1A.200720.012 SDK : 30 Release : 11 ABI : arm64-v8a CPU abilist : arm64-v8a,armeabi-v7a,armeabi Locale : en-US Description : full_k68v1_64-user 11 RP1A.200720.012 eng.compil.20210409.214127 release-keys Display ID : RP1A.200720.012 release-keys Security Patch : 2021-03-01 Platform : =MTK6768 StorageType : mtp Userdata State : Not Encrypted ---------------------------------------------- VIVO IMEI REPAIR ---------------------------------------------- OLD IMEI.. IMEI=86369XXXXXXXXXXX IMEI2=8636XXXXXXXXXXX Writing New IMEI.. IMEI1 : 86369XXXXXXXXXX IMEI2 : 86369XXXXXXXXXX ACK : 0xFFFFFFFF[] Verifying IMEI... ACK : 0xFFFFFFFF[] IMEI=863691XXXXXXXXXX IMEI2=86369XXXXXXXXXX Rebooting Device [Reboot To Normal] Reboot Done!! |
Bookmarks |
| |
|