![]() ![]() ![]() |
![]() |
Welcome to the GSM-Forum forums. You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. Only registered members may post questions, contact other members or search our database of over 8 million posts. Registration is fast, simple and absolutely free so please - Click to REGISTER! If you have any problems with the registration process or your account login, please contact contact us . |
|
Register | FAQ | Donate | Forum Rules | Root any Device | ★iPhone Unlock★ | [ Easy-JTAG ] | Direct Unlock Source | Search | Today's Posts | Mark Forums Read |
Android based Phones / Tablets For all of your questions relating to the android mobile phones. |
![]() |
| LinkBack | Thread Tools | Display Modes |
![]() | #1 (permalink) |
Major Poster ![]() ![]() Join Date: Dec 2019 Location: lahore,punjab,pakistan
Posts: 48
Member: 2940608 Status: Offline Sonork: 100.1588189 Thanks Meter: 9 | Vivo Y17 1901 Android 11 Format + FRP in One Click With Hydra ******* Dongle Info ******* Version : Hydra Tool v 1.2 Serial : 190300000417 Initialize : OKAY Status : Activated Life : 0 [0-0-0-0-0] Searching for MTK Device...Found Port Identification :Flashmode BROM FriendlyName :MediaTek USB Port_V1632 (COM10) Device :6&8725acd&0&4 SymbolicName :\??\USB#VID_0E8D&PID_0003#6&8725acd&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver :01/22/2015,3.0.1504.0 Trying to Open Port [COM10] Ok Handshaking...Ok HwCode : 0766 {MT6765/MT8768t} Hwver : 0000 Target config : E5 SBC : 01 (True) SLA : 00 (False) DAA : 04 (True) SWJTAG : 04 (True) EPP : 00 (False) CERT : 00 (False) MEMREAD : 20 (True) MEMWRITE : 40 (True) CMD_C8 : 80 (True) Device Connection : BROM HW Subcode: 8A00 HW Ver : CA00 SW Ver : 0000 ME_ID : 64067D4B3D970CCC8E5DAE43D583FC06 SOC_ID : 62EE426454D239A6E15C00CA281654296B88A8943FDAD8C16E 5A175E41135020 Exploiting Device... Handshaking...Ok Dumping Preloader from Bootrom.. Seeking preloader address..Found @ 0x00200BC4 Starting to dump... Prel Size : 0x0003B768 Successfully dump preloader.. [C:\Hydra Tool\Boot\PreloaderDump\preloader_k62v1_64_bsp.bin] Target config : 00 SBC : 00 (False) SLA : 00 (False) DAA : 00 (False) SWJTAG : 00 (False) EPP : 00 (False) CERT : 00 (False) MEMREAD : 00 (False) MEMWRITE : 00 (False) CMD_C8 : 00 (False) Device Connection : BROM Download Agent... DA :MTK_AllInOne_DA_5.2152.bin Uploading data Successfully uploaded stage 1, jumping .. Jumping to 0x00200000 Successfully received DA sync CONNECTION_AGENT : brom DRAM config needed for : 90014A6843396150 Sending emi data.. DRAM setup passed. Sending emi data succeeded. Uploading stage 2... Upload data was accepted. Jumping to stage 2... Successfully uploaded stage 2 ERAM Size: 0x000000000003A000-232 KB IRAM Size: 0x0000000100000000-4 GB EMMC Boot1 Size: 0x0000000000400000-4 MB EMMC Boot2 Size: 0x0000000000400000-4 MB EMMC RPMB Size : 0x0000000001000000-16 MB EMMC USER Size : 0x0000000E8F800000-58.242 GB EMMC CID : 90014A68433961503301C3E65C5EA64D - hC9aP3 HW-CODE : 0x766 HWSUB-CODE : 0x8A00 HW-VERSION : 0xCA00 SW-VERSION : 0x0 CHIP-EVOLUTION : 0x0 DA-VERSION : 1.0 Speed : high-speed Error on sending data: DA hash mismatch *DA Extensions failed to enable Reading Partition Table .. Partition Count : 44 --------------- Reading build.prop content --------------- Brand : vivo Vendor : vivo Model : vivo 1901 Product : k62v1_64_bsp Manufacturer : vivo ID : RP1A.200720.012 SDK : 30 Release : 11 ABI : arm64-v8a CPU abilist : arm64-v8a,armeabi-v7a,armeabi Locale : en-US Description : full_k62v1_64_bsp-user 11 RP1A.200720.012 eng.compil.20220822.174220 release-keys Display ID : RP1A.200720.012 release-keys Security Patch : 2022-05-01 StorageType : mtp --------------- end of build.prop content --------------- Reading IMEI........ IMEI1 : 862xxxxxxxxxxxxxx IMEI2 : 86xxxxxxxxxxxxxxx ------------------------------- Bootloader Status... Bootloader : Locked ------------------------------- Backing up Security.. -preloader .....Ok [preloader_k62v1_64_bsp.bin] *Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0766_64067D4B3D970CCC8E5DAE43D 583FC06\Auto\120122124823\6765_Android_scatter.txt -pgpt .....Ok -nvram .....Ok -nvdata .....Ok -frp .....Ok -protect1 .....Ok -protect2 .....Ok -persist .....Ok -proinfo .....Ok -nvcfg .....Ok -sec1 .....Ok -seccfg .....Ok Backup Done!!! --------------------------- Ultra Power --------------------------- Formatting Userdata : Operation : Uni_FMFRP_Erase Ok Removing FRP : Operation : Uni_FMFRP_Erase Ok Rebooting Device... Reboot Option : RebootToNormal Rebooting Operation Done!!!! |
![]() |
The Following 2 Users Say Thank You to Tafseer Syed For This Useful Post: |
![]() |
Bookmarks |
Thread Tools | |
Display Modes | |
| |
|