Hydra VIVO Y22 V2207 (V2207) NEW SECURITY FRP DONE WITH HYDRA TOOL (WITHOUT TEST POINT)

Hydra Tool

Mo Software Point

Friend's Martview
Sep 16, 2019
107
43
PayPal:

Donate money to this user
Screenshot_09-12-2023-162718.jpeg

VIVO Y22 NEW SECURITY FRP DONE WITH HYDRA TOOL [ Preloader Mode ]


Hydra Tool Ver 2023.9.11.1
Windows 10 (Version 22H2, OS Build 19045.3324, 64-bit Edition)
Intel(R) Core(TM) i3-4005U CPU @ 1.70GHz
Intel(R) HD Graphics Family
Ram Installed : 4 GB
Windows Access Right : Admin
Software Run As Admnistrator


******* Dongle Info *******
Version : Hydra Tool v 1.2
Serial : 200
Initialize : OKAY
Status : Activated
Life : 0 [0-0-0-0-0]

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Service Function
Factory Reset Protection[FRP]
Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching for MTK Device...Found
MTK Port Type : Flashmode Preloader
FriendlyName : MediaTek PreLoader USB VCOM_V1632 (Android) (COM46)
Device : /5&4473364&0&1
SymbolicName : \\?\usb#vid_0e8d&pid_2000#5&4473364&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0
Service : wdm_usb

Openning Port [COM46] Ok
Handshaking...Ok
HwCode : 0707 {MT6768}
Hwver : 0000
Target config : 05
SBC : 01 (True)
SLA : 00 (False)
DAA : 04 (True)
SWJTAG : 04 (True)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)
Connection : Preloader
HW Subcode : 8A00
HW Subcode : CA00
SW Ver : 0000
ME_ID : D900402F0CC3F8A0628B806BC2DAA5A2
Connection : Preloader
Download Agent...
Successfully uploaded stage 1, jumping ..
Executing JUMP_DA Address @ 0x00200000
Jumping to 0x00200000 Ok.. 1
Successfully received DA sync
ONNECTION_AGENT : preloader
DRAM config needed for : 13014E4732433231
Uploading stage 2...
Patching da2 ...
Hash check not patched. Ok
Error: on sending data: DA hash mismatch
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
ERAM Size : 0x0000000000070000-448 KB
IRAM Size : 0x0000000100000000-4 GB
EMMC Boot1 Size : 0x0000000000400000-4 MB
EMMC Boot2 Size : 0x0000000000400000-4 MB
EMMC RPMB Size : 0x0000000001000000-16 MB
EMMC USER Size : 0x0000000E8F800000-58.242 GB
EMMC CID : 13014E473243323139102446746A79CD - G2C219
HW-CODE : 0x707
HWSUB-CODE : 0x8A00
HW-VERSION : 0xCA00
SW-VERSION : 0x0
CHIP-EVOLUTION : 0x1
DA-VERSION : 1.0
Speed : high-speed
Executing DA Ext Method 1
Upload data was accepted. Jumping to stage 2...
DA Extensions successfully added
Reading Partition Table ..
Partition Count : 53
--------------- Reading build.prop content ---------------
Product : k69v1_64_k419
ID : SP1A.210812.003
SDK : 31
Release : 12
ABI : arm64-v8a
Locale : en-US
Description : full_k69v1_64_k419-user 12 SP1A.210812.003 compiler02131619 release-keys
Display ID : SP1A.210812.003 release-keys
Security Patch : 2023-01-01
StorageType : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
IMEI1 : 8633400
IMEI2 : 8633400
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------
Backing up Security..
- preloader(preloader.bin), 512 KB = Ok [preloader_k69v1_64_k419.bin]
*Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0707_D900402F0CC3F8A0628B806BC2DAA5A2\Auto\091223162037\6768_Android_scatter.txt
- pgpt(pgpt.bin), 32 KB = Ok
- nvram(nvram.bin), 64 MB = Ok
- nvdata(nvdata.bin), 64 MB = Ok
- frp(frp.bin), 1024 KB = Ok
- protect1(protect1.bin), 8 MB = Ok
- protect2(protect2.bin), 13.242 MB = Ok
- persist(persist.bin), 48 MB = Ok
- proinfo(proinfo.bin), 3 MB = Ok
- nvcfg(nvcfg.bin), 32 MB = Ok
- sec1(sec1.bin), 2 MB = Ok
- seccfg(seccfg.bin), 8 MB = Ok
- lk(lk.bin), 16 MB = Ok
Backup Done!!!

Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!

Action Result : Ok

Elapsed Time : 00:01:36
 
  • Like
Reactions: sagar2567
Top