Hydra Vivo Y83 Pattern and FRP lock remove with Hydra Tool

Hydra Tool

Unlockinfo

Friend's Martview
Feb 6, 2020
394
435
Pakistan
Skype
unlockinfo
Vivo Y83 Pattern and FRP lock remove with Hydra Tool


- keep press boot info
Code:
-------------------------------------------------------
To Enable BROM  Mode :
     Method 1    - Bootkey (Vol + - Power) or any combination
     Method 2    - Enable Preloader to brom(crashing Method)
     Method 3    - Test Point Data0 + ground
To Enable Preloader  Mode :
     Method 1    - Just Insert cable
-------------------------------------------------------

Searching for MTK Device...Found
  MTK Port Type   : Flashmode BROM
  FriendlyName    : MediaTek USB Port_V1633 (COM5)
  Device          : /6&1f400921&0&5
  SymbolicName    : \\?\usb#vid_0e8d&pid_0003#6&1f400921&0&5#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 01/22/2015,3.0.1504.0
  Service         : wdm_usb

Openning Port [COM5] Ok
Handshaking...Ok
  HwCode          : 0766 {MT6765/MT8768t}
  Hwver           : 0000
  Target config   : E5
  SBC             : 01 (True)
  SLA             : 00 (False)
  DAA             : 04 (True)
  SWJTAG          : 04 (True)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 20 (True)
  MEMWRITE        : 40 (True)
  CMD_C8          : 80 (True)
  Connection      : BROM
  HW Subcode      : 8A00
  HW Subcode      : CA00
  SW Ver          : 0000
  ME_ID           : 814879719C48C33D04B1C318A413F3F8
  SOC_ID          : 9BDF4FDC24B04E0647FCFCF088335ED263679878A1839EF2CEF0D29C95F7700B

Exploiting Device...
Successfully Exploited..
Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..Found @ 0x00200BC4
Starting to dump...
Prel Size : 0x00039C88
Successfully dump preloader..  [C:\Hydra Tool\Boot\PreloaderDump\preloader_k62v1_64_bsp.bin]
  Target config   : 00
  SBC             : 00 (False)
  SLA             : 00 (False)
  DAA             : 00 (False)
  SWJTAG          : 00 (False)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 00 (False)
  MEMWRITE        : 00 (False)
  CMD_C8          : 00 (False)
  Connection      : BROM

Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin]
Patching da2 ... Ok
Uploading Stage 1....
Successfully uploaded stage 1, jumping ..
Executing JUMP_DA Address @ 0x00200000
Jumping to 0x00200000 Ok 0xC0
Successfully received DA sync
  ONNECTION_AGENT : brom
  DRAM config needed for : 1501005248363441
Sending auto preloader from dump...  [preloader_k62v1_64_bsp.bin]
Sending emi data.. [DRAM setup passed.]
Sending emi data succeeded.
Uploading stage 2...
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
  ERAM Size       : 0x000000000003A000-232 KB
  IRAM Size       : 0x0000000100000000-4 GB
  EMMC Boot1 Size : 0x0000000000400000-4 MB
  EMMC Boot2 Size : 0x0000000000400000-4 MB
  EMMC RPMB Size  : 0x0000000000400000-4 MB
  EMMC USER Size  : 0x0000000E8F800000-58.242 GB
  EMMC CID        : 15010052483634414205A8FE9A4F5561 - RH64AB
  HW-CODE         : 0x766
  HWSUB-CODE      : 0x8A00
  HW-VERSION      : 0xCA00
  SW-VERSION      : 0x0
  CHIP-EVOLUTION  : 0x0
  DA-VERSION      : 1.0
  Speed           : high-speed
Upload data was accepted. Jumping to stage 2...
DA Extensions successfully added
Reading Partition Table ..
Partition Count : 45
--------------- Reading build.prop content ---------------
  Brand          : vivo
  Vendor         : vivo
  Model          : vivo Y83
  Product        : k62v1_64_bsp
  Manufacturer   : vivo
  ID             : O11019
  SDK            : 27
  Release        : 8.1.0
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-US
  Description    : full_k62v1_64_bsp-user 8.1.0 O11019 1573876683 release-keys
  Device         : PD1803BF_EX
  Display ID     : O11019 release-keys
  Security Patch : 2019-11-05
  Platform       : =MTK6765
  Fingerprint    : vivo/1802/1802:8.1.0/O11019/1573876683:user/release-keys
  StorageType    : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
IMEI1 : 869932********
IMEI2 : 869932********
-------------------------------
Bootloader Status...
  Bootloader : Unlocked
-------------------------------
Backing up Security..
- preloader(preloader.bin), 512 KB                    = Ok  [preloader_k62v1_64_bsp.bin]
  *Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0766_814879719CCCDDFF344D04B1C318A413F3F8\Auto\072823172442\6765_Android_scatter.txt
- pgpt(pgpt.bin), 32 KB                               = Ok
- nvram(nvram.bin), 64 MB                             = Ok
- nvdata(nvdata.bin), 64 MB                           = Ok
- frp(frp.bin), 1024 KB                               = Ok
- protect1(protect1.bin), 8 MB                        = Ok
- protect2(protect2.bin), 15.469 MB                   = Ok
- persist(persist.bin), 48 MB                         = Ok
- proinfo(proinfo.bin), 3 MB                          = Ok
- nvcfg(nvcfg.bin), 32 MB                             = Ok
- sec1(sec1.bin), 2 MB                                = Ok
- seccfg(seccfg.bin), 8 MB                            = Ok
- lk(lk.bin), 5 MB                                    = Ok
Backup Done!!!

Elapsed Time : 00:01:00



Service Function
Ultra Power
Erase Userdata

Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                      Service Function
                        Ultra Power
                       Erase Userdata
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching for MTK Device...Found
  MTK Port Type   : Flashmode BROM
  FriendlyName    : MediaTek USB Port_V1633 (COM5)
  Device          : /6&1f400921&0&5
  SymbolicName    : \\?\usb#vid_0e8d&pid_0003#6&1f400921&0&5#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 01/22/2015,3.0.1504.0
  Service         : wdm_usb

Openning Port [COM5] Ok
Reading Partition Table ..
  ERAM Size       : 0x000000000003A000-232 KB
  IRAM Size       : 0x0000000100000000-4 GB
  EMMC Boot1 Size : 0x0000000000400000-4 MB
  EMMC Boot2 Size : 0x0000000000400000-4 MB
  EMMC RPMB Size  : 0x0000000000400000-4 MB
  EMMC USER Size  : 0x0000000E8F800000-58.242 GB
  EMMC CID        : 15010052483634414205A8FE9A4F5561 - RH64AB
  HW-CODE         : 0x766
  HWSUB-CODE      : 0x8A00
  HW-VERSION      : 0xCA00
  SW-VERSION      : 0x0
  CHIP-EVOLUTION  : 0x0
  DA-VERSION      : 1.0
  Speed           : high-speed
Partition Count : 45
--------------- Reading build.prop content ---------------
  Brand          : vivo
  Vendor         : vivo
  Model          : vivo Y83
  Product        : k62v1_64_bsp
  Manufacturer   : vivo
  ID             : O11019
  SDK            : 27
  Release        : 8.1.0
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-US
  Description    : full_k62v1_64_bsp-user 8.1.0 O11019 1573876683 release-keys
  Device         : PD1803BF_EX
  Display ID     : O11019 release-keys
  Security Patch : 2019-11-05
  Platform       : =MTK6765
  Fingerprint    : vivo/1802/1802:8.1.0/O11019/1573876683:user/release-keys
  StorageType    : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
IMEI1 : 869932*********
IMEI2 : 869932*********
-------------------------------
Bootloader Status...
  Bootloader : Unlocked
-------------------------------
---------------------------
        Ultra Power   
---------------------------
Formatting Userdata :
Operation : Uni_FMFRP_Erase Ok
Removing FRP :  Ok

Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!

Action Result :  Ok

Elapsed Time : 00:00:09
 
Top