Hydra Realme C11 [ RMX2185 ] Pattern Lock Removed Done ! BY ! Hydra Tool !!!

Hydra Tool

GSM KING MAKER

Moderator
Mar 16, 2017
2,151
7,274
MOBILE EXPERT @ GSM KING MAKER @ KUMBAKONAM
Skype
GSMKINGMAKER
Sonork ID
9655528882
PayPal:

Donate money to this user
Realme C11 ( RMX2185 ) Pattern Lock Removed Done !
BY
Hydra Tool
.

.

.
.
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port_V1633 (COM5)
Device :5&15c311e1&0&2
SymbolicName :\??\USB#VID_0E8D&PID_0003#5&15c311e1&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0

Trying to Open Port [COM5] Ok
Handshaking...Ok
HwCode : 0766 {MT6765/MT8768t}
Hwver : 0000
Target config : E5
SBC : 01 (True)
SLA : 00 (False)
DAA : 04 (True)
SWJTAG : 04 (True)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 20 (True)
MEMWRITE : 40 (True)
CMD_C8 : 80 (True)
Device Connection : BROM
HW Subcode: 8A00
HW Ver : CA00
SW Ver : 0000
ME_ID : 6DE236E9DB679FA938C6775E4A5D3D59
SOC_ID : 17DDCADBF8A40F718E81A2552EB7E6063E2CDC14BC50F97E9C96EC048190E2F8
Device not yet filterd...
Executing LibUSB Filter..
Device Now Filtered...Restarting Device Port..
Trying to Open Port [COM5] Ok
Handshaking...
Device Connection : BROM
Exploiting Device...
Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..Found @ 0x00200BC4
Starting to dump...
Prel Size : 0x0003BE60
Successfully dump preloader.. [D:\SOFTWARE_BOXES\HYDRA\HYDRA_TOOL\Boot\PreloaderDump\preloader_oppo6765.bin]
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)
Device Connection : BROM
Download Agent...
DA :MTK_AllInOne_DA_5.2152.bin
Patching da2 ... Ok
Uploading data
Successfully uploaded stage 1, jumping ..
Jumping to 0x00200000
Successfully received DA sync
CONNECTION_AGENT : brom
DRAM config needed for : 90014A6842386150
Sending emi data..
DRAM setup passed.
Sending emi data succeeded.
Uploading stage 2...
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
ERAM Size: 0x000000000003A000-232 KB
IRAM Size: 0x0000000080000000-2 GB
EMMC Boot1 Size: 0x0000000000400000-4 MB
EMMC Boot2 Size: 0x0000000000400000-4 MB
EMMC RPMB Size : 0x0000000001000000-16 MB
EMMC USER Size : 0x0000000747C00000-29.121 GB
EMMC CID : 90014A68423861503E03501A3C6937C9 - hB8aP>
HW-CODE : 0x766
HWSUB-CODE : 0x8A00
HW-VERSION : 0xCA00
SW-VERSION : 0x0
CHIP-EVOLUTION : 0x0
DA-VERSION : 1.0
Speed : high-speed
Upload data was accepted. Jumping to stage 2...
DA Extensions successfully added
Reading Partition Table ..
Partition Count : 49
--------------- Reading build.prop content ---------------
Brand : OPPO
Vendor : OPPO
Model : oppoEffectModel
Product : oppo6765
Manufacturer : OPPO
ID : QP1A.190711.020
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6765-user 10 QP1A.190711.020 bedd37e98646d3a1 release-keys
Display ID : QP1A.190711.020 release-keys
Security Patch : 2020-05-05
StorageType : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------
Backing up Security..
-preloader .....Ok [preloader_oppo6765.bin]
*Creating Scatter file... D:\SOFTWARE_BOXES\HYDRA\HYDRA_TOOL\Backup\MTKBKUP\0766_6DE236E9DB679FA938C6775E4A5D3D59\Auto\092522000541\6765_Android_scatter.txt
-pgpt .....Ok
-nvram .....Ok
-nvdata .....Ok
-frp .....Ok
-protect1 .....Ok
-protect2 .....Ok
-persist .....Ok
-proinfo .....Ok
-oppo_custom .....Ok
-opporeserve1 .....Ok
-opporeserve2 .....Ok
-nvcfg .....Ok
-sec1 .....Ok
-seccfg .....Ok
Backup Done!!!
------------------------------
Factory Reset Flash Mode..
------------------------------
Operation : Safeformat Universal...
Status: Ok
Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!
 
  • Like
Reactions: Larson19
Top