Hydra Realme mobile successfully Formatted to remove user data successfully done by Hydra Tool

Hydra Tool

Mount Everest

Friend's Martview
Dec 26, 2020
1,273
543
Kathmandu, Nepal
Realme mobile successfully Formatted to remove user data successfully done by Hydra Tool

Screen Short:



Logs:
Brand : AUTO Model : AUTO Connection : Flash Mode

=====================================
Connection
-Please wait...
-Connect Phone...
-Found...[COM31]

TPortConnection.Create...(COM31)..Opening...Ok

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0766 (0000)MT6765[6765]
BROM HW_SW_VER : 8A00 CA00 0000 0000
#Executing Exploit..
#SUCCESS..

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0766 (0000)MT6765[6765]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
SECURE VERSION : 05
BL VERSION : FE
BR Secured : E0

Preparing Download Agent..
DA : 6765_SWSEC_56EC405E9E.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2018/04/19.10:40_426269
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_cactus.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 08B6E74309AA41A44FF1FE72D2BF0759
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000020000000 -512 MB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003AB400000 -14.676 GB
eMMC CID : 90014A484147346132A53D9B4A082637 - HAG4a2

DA Speed : high-speed
DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info
Vendor : Realme
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6762_18540-user 9 PPR1.180610.011 eng.root.20190919.214712 release-keys
Security Patch : 2019-09-05
StorageType : mtp
Userdata State : Not Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_oppo6762_18540.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\__0766--9__260121154322\MT6765_Android_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x0BE88000]1024 KB ->frp.bin...Ok
-nvdata[0x0E788000]64 MB ->nvdata.bin...Ok
-persist[0x16000000]48 MB ->persist.bin...Ok
-nvram[0x21E00000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\__0766--9__260121154322
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 08B6E74309AA41A44FF1FE72D2BF0759
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000020000000 -512 MB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003AB400000 -14.676 GB
eMMC CID : 90014A484147346132A53D9B4A082637 - HAG4a2

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Vendor : Realme
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6762_18540-user 9 PPR1.180610.011 eng.root.20190919.214712 release-keys
Security Patch : 2019-09-05
StorageType : mtp
Userdata State : Not Encrypted

-------------------------------------
Operation : Format/Erase
Processing...
Erasing FRP Partition...
Formatting Userdata... Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:46
BR
Mount Everest
 
Top