Hydra Vivo Y12 Pattern and FRP Lock Remove with Hydra Tool

Hydra Tool

Unlockinfo

Friend's Martview
Feb 6, 2020
394
435
Pakistan
Skype
unlockinfo
Vivo Y12 Pattern and FRP Lock Remove with Hydra Tool



- Keep press boot info
Code:
-------------------------------------------------------
To Enable BROM  Mode :
     Method 1    - Bootkey (Vol + - Power) or any combination
     Method 2    - Enable Preloader to brom(crashing Method)
     Method 3    - Test Point Data0 + ground
To Enable Preloader  Mode :
     Method 1    - Just Insert cable
-------------------------------------------------------

Searching for MTK Device...Found
  MTK Port Type   : Flashmode BROM
  FriendlyName    : MediaTek USB Port_V1632 (COM30)
  Device          : /7&d3e40fc&0&4
  SymbolicName    : \\?\usb#vid_0e8d&pid_0003#7&d3e40fc&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 01/22/2015,3.0.1504.0
  Service         : wdm_usb

Openning Port [COM30] Ok
Handshaking...Ok
  HwCode          : 0766 {MT6765/MT8768t}
  Hwver           : 0000
  Target config   : E5
  SBC             : 01 (True)
  SLA             : 00 (False)
  DAA             : 04 (True)
  SWJTAG          : 04 (True)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 20 (True)
  MEMWRITE        : 40 (True)
  CMD_C8          : 80 (True)
  Connection      : BROM
  HW Subcode      : 8A00
  HW Subcode      : CA00
  SW Ver          : 0000
  ME_ID           : 4C1C9483396F7B19FC5FCAE43EE9DA94
  SOC_ID          : C2ECB3A739701F253CAD1698A1A83C8713C057858DD82B3B48CCED68DEC55AD5

Exploiting Device...
Successfully Exploited..
Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..
Not Found
  Target config   : 00
  SBC             : 00 (False)
  SLA             : 00 (False)
  DAA             : 00 (False)
  SWJTAG          : 00 (False)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 00 (False)
  MEMWRITE        : 00 (False)
  CMD_C8          : 00 (False)
  Connection      : BROM

Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin]
Patching da2 ... Ok
Uploading Stage 1....
Successfully uploaded stage 1, jumping ..
Executing JUMP_DA Address @ 0x00200000
Jumping to 0x00200000 Ok 0xC0
Successfully received DA sync
  ONNECTION_AGENT : brom
  DRAM config needed for : 150100475036424D
Sending auto preloader from dump...
Hydra Auto Preloader Search Enabled..
Hydra will find compatible preloader files...
-----------------------------
Found 14 Compatible Preloaders..
-----------------------------
1-preloader_cereus.bin...Sending... [DRAM setup passed.] [Ok]
-----------------------------
Sending emi data succeeded.
Uploading stage 2...
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
  ERAM Size       : 0x000000000003A000-232 KB
  IRAM Size       : 0x00000000C0000000-3 GB
  EMMC Boot1 Size : 0x0000000000400000-4 MB
  EMMC Boot2 Size : 0x0000000000400000-4 MB
  EMMC RPMB Size  : 0x0000000001000000-16 MB
  EMMC USER Size  : 0x0000000E8F800000-58.242 GB
  EMMC CID        : 150100475036424D42011247E4D5A6B3 - GP6BMB
  HW-CODE         : 0x766
  HWSUB-CODE      : 0x8A00
  HW-VERSION      : 0xCA00
  SW-VERSION      : 0x0
  CHIP-EVOLUTION  : 0x0
  DA-VERSION      : 1.0
  Speed           : high-speed
Upload data was accepted. Jumping to stage 2...
DA Extensions successfully added
Reading Partition Table ..
Partition Count : 44
--------------- Reading build.prop content ---------------
  Product        : k62v1_64_bsp
  ID             : RP1A.200720.012
  SDK            : 30
  Release        : 11
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-US
  Description    : full_k62v1_64_bsp-user 11 RP1A.200720.012 eng.compil.20230322.112912 release-keys
  Display ID     : RP1A.200720.012 release-keys
  Security Patch : 2022-05-01
  StorageType    : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
IMEI1 : 86091**********
IMEI2 : 86091**********
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------
Backing up Security..
- preloader(preloader.bin), 512 KB                    = Ok  [preloader_k62v1_64_bsp.bin]
  *Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0766_4C1C94996F7B19FC5FCAE43EE9DA94\Auto\07219205401\6765_Android_scatter.txt
- pgpt(pgpt.bin), 32 KB                               = Ok
- nvram(nvram.bin), 64 MB                             = Ok
- nvdata(nvdata.bin), 64 MB                           = Ok
- frp(frp.bin), 1024 KB                               = Ok
- protect1(protect1.bin), 8 MB                        = Ok
- protect2(protect2.bin), 13.469 MB                   = Ok
- persist(persist.bin), 48 MB                         = Ok
- proinfo(proinfo.bin), 3 MB                          = Ok
- nvcfg(nvcfg.bin), 32 MB                             = Ok
- sec1(sec1.bin), 2 MB                                = Ok
- seccfg(seccfg.bin), 8 MB                            = Ok
- lk(lk.bin), 5 MB                                    = Ok
Backup Done!!!

Elapsed Time : 00:00:44




- Select factory reset and click execute
Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                      Service Function
              Format/Factory Reset/ScreenLock
                            Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching for MTK Device...Found
  MTK Port Type   : Flashmode BROM
  FriendlyName    : MediaTek USB Port_V1632 (COM30)
  Device          : /7&d3e40fc&0&4
  SymbolicName    : \\?\usb#vid_0e8d&pid_0003#7&d3e40fc&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 01/22/2015,3.0.1504.0
  Service         : wdm_usb

Openning Port [COM30] Ok
Reading Partition Table ..
  ERAM Size       : 0x000000000003A000-232 KB
  IRAM Size       : 0x00000000C0000000-3 GB
  EMMC Boot1 Size : 0x0000000000400000-4 MB
  EMMC Boot2 Size : 0x0000000000400000-4 MB
  EMMC RPMB Size  : 0x0000000001000000-16 MB
  EMMC USER Size  : 0x0000000E8F800000-58.242 GB
  EMMC CID        : 150100475036424D42011247E4D5A6B3 - GP6BMB
  HW-CODE         : 0x766
  HWSUB-CODE      : 0x8A00
  HW-VERSION      : 0xCA00
  SW-VERSION      : 0x0
  CHIP-EVOLUTION  : 0x0
  DA-VERSION      : 1.0
  Speed           : high-speed
Partition Count : 44
--------------- Reading build.prop content ---------------
  Product        : k62v1_64_bsp
  ID             : RP1A.200720.012
  SDK            : 30
  Release        : 11
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-US
  Description    : full_k62v1_64_bsp-user 11 RP1A.200720.012 eng.compil.20230322.112912 release-keys
  Display ID     : RP1A.200720.012 release-keys
  Security Patch : 2022-05-01
  StorageType    : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
IMEI1 : 86091**********
IMEI2 : 86091**********
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------
------------------------------
   Factory Reset Flash Mode.. 
------------------------------
Operation : Safeformat Universal...

Action Result :  Ok

Elapsed Time : 00:00:04





- Select Remove FRP Lock and click Execute
Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                      Service Function
               Factory Reset Protection[FRP]
                            Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching for MTK Device...Found
  MTK Port Type   : Flashmode BROM
  FriendlyName    : MediaTek USB Port_V1632 (COM30)
  Device          : /7&d3e40fc&0&4
  SymbolicName    : \\?\usb#vid_0e8d&pid_0003#7&d3e40fc&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 01/22/2015,3.0.1504.0
  Service         : wdm_usb

Openning Port [COM30] Ok
Reading Partition Table ..
  ERAM Size       : 0x000000000003A000-232 KB
  IRAM Size       : 0x00000000C0000000-3 GB
  EMMC Boot1 Size : 0x0000000000400000-4 MB
  EMMC Boot2 Size : 0x0000000000400000-4 MB
  EMMC RPMB Size  : 0x0000000001000000-16 MB
  EMMC USER Size  : 0x0000000E8F800000-58.242 GB
  EMMC CID        : 150100475036424D42011247E4D5A6B3 - GP6BMB
  HW-CODE         : 0x766
  HWSUB-CODE      : 0x8A00
  HW-VERSION      : 0xCA00
  SW-VERSION      : 0x0
  CHIP-EVOLUTION  : 0x0
  DA-VERSION      : 1.0
  Speed           : high-speed
Partition Count : 44
--------------- Reading build.prop content ---------------
  Product        : k62v1_64_bsp
  ID             : RP1A.200720.012
  SDK            : 30
  Release        : 11
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-US
  Description    : full_k62v1_64_bsp-user 11 RP1A.200720.012 eng.compil.20230322.112912 release-keys
  Display ID     : RP1A.200720.012 release-keys
  Security Patch : 2022-05-01
  StorageType    : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
IMEI1 : 860919*********
IMEI2 : 860919*********
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------

Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!

Action Result :  Ok

Elapsed Time : 00:00:05
 

Rajivsumanth

Member
Mar 9, 2021
8
3
Bangalore
Searching for MTK Device...Found
MTK Port Type : Flashmode Preloader
FriendlyName : MediaTek PreLoader USB VCOM_V1633 (Android) (COM3)
Device : /5&94b8c27&0&3
SymbolicName : \\?\usb#vid_0e8d&pid_2000#5&94b8c27&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0
Service : wdm_usb

Openning Port [COM3] Ok
Handshaking...Ok
HwCode : 0766 {MT6765/MT8768t}
Hwver : 0000
Target config : 05
SBC : 01 (True)
SLA : 00 (False)
DAA : 04 (True)
SWJTAG : 04 (True)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)
Connection : Preloader
HW Subcode : 8A00
HW Subcode : CA00
SW Ver : 0000
ME_ID : 862C27639E780A3A339166188298FB63


- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Preloader To Brom Function.....
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- Method 1 Exploit Executed..... [Failed]
Unable to reconnect device...
------------------------------------------
Device not able to crash preloader..
 
Top