GSM Shop GSM Shop
GSM-Forum  

Welcome to the GSM-Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features.
Only registered members may post questions, contact other members or search our database of over 8 million posts.

Registration is fast, simple and absolutely free so please - Click to REGISTER!

If you have any problems with the registration process or your account login, please contact contact us .

Go Back   GSM-Forum > GSM & CDMA Phones / Tablets Software & Hardware Area > Android based Phones / Tablets

Android based Phones / Tablets For all of your questions relating to the android mobile phones.

Reply
 
LinkBack Thread Tools Display Modes
Old 12-01-2022, 09:31   #1 (permalink)
Major Poster
 
Join Date: Dec 2019
Location: lahore,punjab,pakistan
Posts: 48
Member: 2940608
Status: Offline
Sonork: 100.1588189
Thanks Meter: 8
Vivo Y17 1901 Android 11 Format + FRP in One Click With Hydra




******* Dongle Info *******
Version : Hydra Tool v 1.2
Serial : 190300000417
Initialize : OKAY
Status : Activated
Life : 0 [0-0-0-0-0]

Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port_V1632 (COM10)
Device :6&8725acd&0&4
SymbolicName :\??\USB#VID_0E8D&PID_0003#6&8725acd&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0

Trying to Open Port [COM10] Ok
Handshaking...Ok
HwCode : 0766 {MT6765/MT8768t}
Hwver : 0000
Target config : E5
SBC : 01 (True)
SLA : 00 (False)
DAA : 04 (True)
SWJTAG : 04 (True)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 20 (True)
MEMWRITE : 40 (True)
CMD_C8 : 80 (True)
Device Connection : BROM
HW Subcode: 8A00
HW Ver : CA00
SW Ver : 0000
ME_ID : 64067D4B3D970CCC8E5DAE43D583FC06
SOC_ID : 62EE426454D239A6E15C00CA281654296B88A8943FDAD8C16E 5A175E41135020
Exploiting Device...
Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..Found @ 0x00200BC4
Starting to dump...
Prel Size : 0x0003B768
Successfully dump preloader.. [C:\Hydra Tool\Boot\PreloaderDump\preloader_k62v1_64_bsp.bin]
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)
Device Connection : BROM
Download Agent...
DA :MTK_AllInOne_DA_5.2152.bin
Uploading data
Successfully uploaded stage 1, jumping ..
Jumping to 0x00200000
Successfully received DA sync
CONNECTION_AGENT : brom
DRAM config needed for : 90014A6843396150
Sending emi data..
DRAM setup passed.
Sending emi data succeeded.
Uploading stage 2...
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
ERAM Size: 0x000000000003A000-232 KB
IRAM Size: 0x0000000100000000-4 GB
EMMC Boot1 Size: 0x0000000000400000-4 MB
EMMC Boot2 Size: 0x0000000000400000-4 MB
EMMC RPMB Size : 0x0000000001000000-16 MB
EMMC USER Size : 0x0000000E8F800000-58.242 GB
EMMC CID : 90014A68433961503301C3E65C5EA64D - hC9aP3
HW-CODE : 0x766
HWSUB-CODE : 0x8A00
HW-VERSION : 0xCA00
SW-VERSION : 0x0
CHIP-EVOLUTION : 0x0
DA-VERSION : 1.0
Speed : high-speed
Error on sending data: DA hash mismatch
*DA Extensions failed to enable
Reading Partition Table ..
Partition Count : 44
--------------- Reading build.prop content ---------------
Brand : vivo
Vendor : vivo
Model : vivo 1901
Product : k62v1_64_bsp
Manufacturer : vivo
ID : RP1A.200720.012
SDK : 30
Release : 11
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_k62v1_64_bsp-user 11 RP1A.200720.012 eng.compil.20220822.174220 release-keys
Display ID : RP1A.200720.012 release-keys
Security Patch : 2022-05-01
StorageType : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
IMEI1 : 862xxxxxxxxxxxxxx
IMEI2 : 86xxxxxxxxxxxxxxx
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------
Backing up Security..
-preloader .....Ok [preloader_k62v1_64_bsp.bin]
*Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0766_64067D4B3D970CCC8E5DAE43D 583FC06\Auto\120122124823\6765_Android_scatter.txt
-pgpt .....Ok
-nvram .....Ok
-nvdata .....Ok
-frp .....Ok
-protect1 .....Ok
-protect2 .....Ok
-persist .....Ok
-proinfo .....Ok
-nvcfg .....Ok
-sec1 .....Ok
-seccfg .....Ok
Backup Done!!!
---------------------------
Ultra Power
---------------------------
Formatting Userdata :
Operation : Uni_FMFRP_Erase Ok
Removing FRP :
Operation : Uni_FMFRP_Erase Ok
Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!
  Reply With Quote
The Following 2 Users Say Thank You to Tafseer Syed For This Useful Post:
Old 01-03-2023, 12:48   #2 (permalink)
Major Poster
 
Join Date: Dec 2019
Location: lahore,punjab,pakistan
Posts: 48
Member: 2940608
Status: Offline
Sonork: 100.1588189
Thanks Meter: 8
Vivo Y17 1901 Android 11 Format + FRP in One Click With Hydra

Vivo Y17 1901 Android 11 Format + FRP in One Click With Hydra
  Reply With Quote
Reply

Bookmarks

Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


 



All times are GMT +1. The time now is 04:12.



Powered by Searchlight © 2023 Axivo Inc.
vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2023 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2022 -
Page generated in 0.10160 seconds with 7 queries

SEO by vBSEO