Hydra VIVO Y30 Pattern Lock Removed Done ! BY ! Hydra Tool !!!

Hydra Tool

GSM KING MAKER

Moderator
Mar 16, 2017
2,151
7,272
MOBILE EXPERT @ GSM KING MAKER @ KUMBAKONAM
Skype
GSMKINGMAKER
Sonork ID
9655528882
PayPal:

Donate money to this user
VIVO Y30 Pattern Lock Removed Done !
BY
Hydra Tool
.
Read Info
.

.
Read Info
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Service Function
Read Info
Flash Mode
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching for MTK Device...Found
MTK Port Type : Flashmode Preloader
FriendlyName : MediaTek PreLoader USB VCOM (Android) (COM10)
Device : /5&15c311e1&0&1
SymbolicName : \\?\usb#vid_0e8d&pid_2000#5&15c311e1&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2016,3.2
Service : wdm_usb


Handshaking...Ok
HwCode : 0766 {MT6765/MT8768t}
Hwver : 0000
Target config : 05
SBC : 01 (True)
SLA : 00 (False)
DAA : 04 (True)
SWJTAG : 04 (True)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)
Connection : Preloader
HW Subcode : 8A00
HW Subcode : CA00
SW Ver : 0000
ME_ID : 8052719261B7F1B49282842132018DF6


- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Preloader To Brom Function..
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- Method 1 Exploit Executed..... [Successfully Crash Preloader.]
Device now is BROM Port


Exploiting Device...
Successfully Exploited..

Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..Found @ 0x00200BC4
Starting to dump...
Prel Size : 0x0003EA04
Successfully dump preloader.. [D:\MOBILE EXPERT\SOFTWARE_BOXES\HYDRA\HYDRA_TOOL\Boot\PreloaderDump\preloader_k65v1_64_bsp.bin]
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)
Connection : BROM

Preparing Download Agent..
Preparing Download Agent..[MTK_DA_V5.bin]
Uploading Stage 1....
Successfully uploaded stage 1, jumping ..
Executing JUMP_DA Address @ 0x00200000
Jumping to 0x00200000 Ok.... 0xC0
Successfully received DA sync
ONNECTION_AGENT : brom
DRAM config needed for : 13014E47314A3953
Sending auto preloader from dump... [preloader_k65v1_64_bsp_29709DEA48.bin]
Sending emi data.. [DRAM setup passed.]
Sending emi data succeeded.
Uploading stage 2...
Error: on sending data: DA hash mismatch
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
DA SLA Disabled..
Executing DA Ext Method 1
Upload data was accepted. Jumping to stage 2...
DA Extensions successfully added
Device Chip Info...
ERAM Size : 0x000000000003A000-232 KB
IRAM Size : 0x0000000100000000-4 GB
EMMC Boot1 Size : 0x0000000000400000-4 MB
EMMC Boot2 Size : 0x0000000000400000-4 MB
EMMC RPMB Size : 0x0000000001000000-16 MB
EMMC USER Size : 0x0000001D1F000000-116.484 GB
EMMC CID : 13014E47314A3953391006E11B85677D - G1J9S9
HW-CODE : 0x766
HWSUB-CODE : 0x8A00
HW-VERSION : 0xCA00
SW-VERSION : 0x0
CHIP-EVOLUTION : 0x0
DA-VERSION : 1.0
Speed : high-speed

Reading Partition Table ..
Partition Count : 49

Reading Phone Info...
Brand : vivo
Vendor : vivo
Model : vivo 1938N
Product : k65v1_64_bsp
Manufacturer : vivo
ID : QP1A.190711.020
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_k65v1_64_bsp-user 10 QP1A.190711.020 compiler03311703 release-keys
Device : k65v1_64_bsp
Display ID : QP1A.190711.020 release-keys
Security Patch : 2022-04-01
Platform : =MTK6765
Fingerprint : vivo/1938N/1938:10/QP1A.190711.020/compiler03311703:user/release-keys
StorageType : mtp

Reading IMEI........
IMEI1 [nvdata-LD0B_001] : 866*********695
IMEI2 [nvdata-LD0B_001] : 866*********687
IMEI1 : 866*********695
IMEI2 : 866*********687
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------

Backing up Security..
- preloader(preloader.bin), 512 KB = Ok [preloader_k65v1_64_bsp.bin]
*Creating Scatter file... D:\MOBILE EXPERT\SOFTWARE_BOXES\HYDRA\HYDRA_TOOL\Backup\MTKBKUP\0766_8052719261B7F1B49282842132018DF6\Auto\092924152226\0766_Android_scatter.txt
- pgpt(pgpt.bin), 32 KB = Ok
- nvram(nvram.bin), 64 MB = Ok
- nvdata(nvdata.bin), 64 MB = Ok
- frp(frp.bin), 1024 KB = Ok
- protect1(protect1.bin), 8 MB = Ok
- protect2(protect2.bin), 13.469 MB = Ok
- persist(persist.bin), 48 MB = Ok
- proinfo(proinfo.bin), 3 MB = Ok
- nvcfg(nvcfg.bin), 32 MB = Ok
- sec1(sec1.bin), 2 MB = Ok
- seccfg(seccfg.bin), 8 MB = Ok
- lk(lk.bin), 64 MB = Ok
- flashinfo(flashinfo.bin), 16 MB = Ok
Backup Done!!!

Action Result : Ok

Elapsed Time : 00:04:09
Format Done
.

.
Format Info.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Service Function
Format/Factory Reset/ScreenLock
Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching for MTK Device...Found
MTK Port Type : Flashmode BROM
FriendlyName : MediaTek USB Port (COM5)
Device : /5&15c311e1&0&1
SymbolicName : \\?\usb#vid_0e8d&pid_0003#5&15c311e1&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/01/2021,1.0.0.0
Service : usbser [Slow Driver] *Please Update Driver

Device Chip Info...
ERAM Size : 0x000000000003A000-232 KB
IRAM Size : 0x0000000100000000-4 GB
EMMC Boot1 Size : 0x0000000000400000-4 MB
EMMC Boot2 Size : 0x0000000000400000-4 MB
EMMC RPMB Size : 0x0000000001000000-16 MB
EMMC USER Size : 0x0000001D1F000000-116.484 GB
EMMC CID : 13014E47314A3953391006E11B85677D - G1J9S9
HW-CODE : 0x766
HWSUB-CODE : 0x8A00
HW-VERSION : 0xCA00
SW-VERSION : 0x0
CHIP-EVOLUTION : 0x0
DA-VERSION : 1.0
Speed : high-speed

Reading Partition Table ..
Partition Count : 49

Reading Phone Info...
Brand : vivo
Vendor : vivo
Model : vivo 1938N
Product : k65v1_64_bsp
Manufacturer : vivo
ID : QP1A.190711.020
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_k65v1_64_bsp-user 10 QP1A.190711.020 compiler03311703 release-keys
Device : k65v1_64_bsp
Display ID : QP1A.190711.020 release-keys
Security Patch : 2022-04-01
Platform : =MTK6765
Fingerprint : vivo/1938N/1938:10/QP1A.190711.020/compiler03311703:user/release-keys
StorageType : mtp

Reading IMEI........
IMEI1 [nvdata-LD0B_001] : 866*********695
IMEI2 [nvdata-LD0B_001] : 866*********687
IMEI1 : 866*********695
IMEI2 : 866*********687
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------
------------------------------
Factory Reset Flash Mode..
------------------------------
Operation : Safeformat Universal...

Action Result : Ok

Elapsed Time : 00:00:09
.
 
  • Like
Reactions: Larson19
Top