VIVO Y17S SCREEN LOCK + FRP REMOVE DONE BY HYDRA TOOL

Software Point

Friend's Martview
Sep 16, 2019
120
48
PayPal:

Donate money to this user
Hydra Tool Ver 2024.4.13.0
Windows 10 (Version 22H2, OS Build 19045.4170, 64-bit Edition)
Intel(R) Core(TM) i3-4005U CPU @ 1.70GHz
Intel(R) HD Graphics Family
Ram Installed : 4 GB
Windows Access Right : Admin
Software Run As Admnistrator


******* Dongle Info *******
Version : Hydra Tool v 1.2
Serial :
Initialize : OKAY
Status : Activated
Life : 0 [0-0-0-0-0]

-------------------------------------------------------
To Enable BROM Mode :
Method 1 - Bootkey (Vol + - Power) or any combination
Method 2 - Enable Preloader to brom(crashing Method)
Method 3 - Test Point Data0 + ground
To Enable Preloader Mode :
Method 1 - Just Insert cable
-------------------------------------------------------

Searching for MTK Device...Found
MTK Port Type : Flashmode Preloader
FriendlyName : MediaTek PreLoader USB VCOM_V1632 (Android) (COM28)
Device : /6&3a6aa860&1&4
SymbolicName : \\?\usb#vid_0e8d&pid_2000#6&3a6aa860&1&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0
Service : wdm_usb


Handshaking...Ok
HwCode : 0707 {MT6768}
Hwver : 0000
Target config : 05
SBC : 01 (True)
SLA : 00 (False)
DAA : 04 (True)
SWJTAG : 04 (True)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)
Connection : Preloader
HW Subcode : 8A00
HW Subcode : CA00
SW Ver : 0000
ME_ID : F2EF28E35A1A21F8BB8A9706D3F5EA3B
Connection : Preloader
Sending Da1..
Successfully uploaded stage 1, jumping ..
Executing JUMP_DA Address @ 0x00200000
Jumping to 0x00200000 Ok.. 1
Successfully received DA sync
ONNECTION_AGENT : preloader
DRAM config needed for : 9B01005930533036
Uploading stage 2...
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
Error: on sending data: DA hash mismatch
Executing DA Ext Method 1
Device Chip Info...
ERAM Size : 0x0000000000070000-448 KB
IRAM Size : 0x0000000100000000-4 GB
EMMC Boot1 Size : 0x0000000000400000-4 MB
EMMC Boot2 Size : 0x0000000000400000-4 MB
EMMC RPMB Size : 0x0000000001000000-16 MB
EMMC USER Size : 0x0000000E90000000-58.25 GB
EMMC CID : 9B010059305330363400D85945289A87 - Y0S064
HW-CODE : 0x707
HWSUB-CODE : 0x8A00
HW-VERSION : 0xCA00
SW-VERSION : 0x0
CHIP-EVOLUTION : 0x1
DA-VERSION : 1.0
Speed : high-speed

Reading Partition Table ..
Partition Count : 57

Reading Phone Info...
Erofs Format Detected...

Reading IMEI........
IMEI1 [nvdata] : 8641790
IMEI2 [nvdata] : 8641790
IMEI1 : 8641790670
IMEI2 : 8641790670
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------
Backing up Security..
- preloader(preloader.bin), 512 KB = Ok [preloader_k69v1_64_k510.bin]
*Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0707_F2EF28E35A1A21F8BB8A9706D3F5EA3B\Auto\041724130300\0707_Android_scatter.txt
- pgpt(pgpt.bin), 32 KB = Ok
- nvram(nvram.bin), 64 MB = Ok
- nvdata(nvdata.bin), 64 MB = Ok
- frp(frp.bin), 1024 KB = Ok
- protect1(protect1.bin), 8 MB = Ok
- protect2(protect2.bin), 13.242 MB = Ok
- persist(persist.bin), 96 MB = Ok
- proinfo(proinfo.bin), 3 MB = Ok
- nvcfg(nvcfg.bin), 64 MB = Ok
- sec1(sec1.bin), 2 MB = Ok
- seccfg(seccfg.bin), 8 MB = Ok
- lk(lk.bin), 16 MB = Ok
- flashinfo(flashinfo.bin), 16 MB = Ok
Backup Done!!!
 
Top