Offline
frp cuenta google Vivo PD1901 (Vivo Y12) + hart reset Vivo PD1901 (Vivo Y12)
Vivo PD1901 (Vivo Y12) password or frp remove done
Selected model: Vivo PD1901 (Vivo Y12)
Operation: Erase FRP And Wipe
Software version: 5.6
Erasing of partitions can damage your device.
Make sure that you have a backup created. Continue? YES
Host Power Off... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Host Power On... OK
Connect phone to [BOX] in BROM/PRELOADER Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM12 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Force switch to BROM... OK
Host Power Off... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Waiting for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0766
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Release testpoint
Advanced Bypass Security... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM12 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0xF07910AE, 0x150666C2, 0xDF251C37, 0x88345696
Get Chip ID... [MT6765]
Get SOC ID... [5064DC8880F9DFB5E88104817235CEC2757C507350145CCD6F 01E9E25E5EDD47]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [7]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x90014A68433861503E03008E173457C5
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_CNAME: hC8aP>
EMMC_ID : 0x90014A68433861503E03008E173457C5
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0001000000 (16.00Mb)
EMMC_USER : 0x0E8F800000 (58.24Gb)
RAM INFO:
INT_SRAM: 0x000003A000 (232.00Kb)
EXT_RAM : 0x00C0000000 (3.00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... [EXT4] ... OK
Product Brand : vivo
Product Manufacturer : vivo
Product Model : vivo 1901
Product Name : 1901
Product Device : 1901
Product Board : k62v1_64_bsp
Board Platform : MTK6765
Build ID : RP1A.200720.012
Build Date : Mon Mar 6 18:32:38 CST 2023
Display ID : Funtouch OS_9
Security Patch : 2022-05-01
Version SDK : 30
Version Release : 11
Version Codename : REL
Firmware Version : 6.72.30
Userdata FS Type : EXT4
Read partition "frp"... OK
Backup saved to C:/Program%20Files%20(x86)/Z3X/Pandora/Backup/MTK/Vivo_PD1901%20(Vivo%20Y12)/FRP_BACKUP_(2023-8-12_13-45-48)/
Writting FRP data... OK
Formatting "userdata" partition... OK
Formatting "cache" partition... OK
Formatting "metadata" partition... OK
Wipe data done!