Realme mobile successfully Formatted to remove user data successfully done by Hydra Tool
Screen Short:
Logs:
Screen Short:
Logs:
BRBrand : AUTO Model : AUTO Connection : Flash Mode
=====================================
Connection
-Please wait...
-Connect Phone...
-Found...[COM31]
TPortConnection.Create...(COM31)..Opening...Ok
Handshaking...Ok
Identifying Hardware ID.....
BROM CPUID : 0766 (0000)MT6765[6765]
BROM HW_SW_VER : 8A00 CA00 0000 0000
#Executing Exploit..
#SUCCESS..
Handshaking...Ok
Identifying Hardware ID.....
BROM CPUID : 0766 (0000)MT6765[6765]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
SECURE VERSION : 05
BL VERSION : FE
BR Secured : E0
Preparing Download Agent..
DA : 6765_SWSEC_56EC405E9E.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2018/04/19.10:40_426269
Init : Loader [1]
Sending : Accepted
Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_cactus.bin
Init : Accepted
Execute Secondary Loader
Init : Loader [2]
Executing : SYNC
Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 08B6E74309AA41A44FF1FE72D2BF0759
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000020000000 -512 MB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003AB400000 -14.676 GB
eMMC CID : 90014A484147346132A53D9B4A082637 - HAG4a2
DA Speed : high-speed
DA Speed : high-speed
Reading GPT-EMMC [0x00008000] 130 Items
Reading System Info
Vendor : Realme
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6762_18540-user 9 PPR1.180610.011 eng.root.20190919.214712 release-keys
Security Patch : 2019-09-05
StorageType : mtp
Userdata State : Not Encrypted
Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_oppo6762_18540.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\__0766--9__260121154322\MT6765_Android_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x0BE88000]1024 KB ->frp.bin...Ok
-nvdata[0x0E788000]64 MB ->nvdata.bin...Ok
-persist[0x16000000]48 MB ->persist.bin...Ok
-nvram[0x21E00000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\__0766--9__260121154322
MTK Phone Loader is NOW RUNNING.
Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 08B6E74309AA41A44FF1FE72D2BF0759
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000020000000 -512 MB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003AB400000 -14.676 GB
eMMC CID : 90014A484147346132A53D9B4A082637 - HAG4a2
Reading GPT-EMMC [0x00008000] 130 Items
Reading System Info
Vendor : Realme
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6762_18540-user 9 PPR1.180610.011 eng.root.20190919.214712 release-keys
Security Patch : 2019-09-05
StorageType : mtp
Userdata State : Not Encrypted
-------------------------------------
Operation : Format/Erase
Processing...
Erasing FRP Partition...
Formatting Userdata... Ok
Rebooting Device [Reboot To Normal]
Reboot Done!!
TPortConnection.Destroy.....Closing...Ok..
Elapsed Time : 00:00:46
Mount Everest