Hydra Oppo A83 (CPH1729) Partly flashed to remove FRP successfully done by Hydra Tool

Hydra Tool

Mount Everest

Friend's Martview
Dec 26, 2020
1,273
546
Kathmandu, Nepal
Oppo A83 (CPH1729) Partly flashed to remove FRP successfully done by Hydra Tool

Screen Short:



Logs:

Brand : OPPO Model : A83 (CPH1729) Connection : Flash Mode

=====================================
How To Boot : Power off phone
* BROM Mode : Press VOL + or Press VOL -+
* Preloader Mode : Just Insert cable

Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port_V1632 (COM3)
SymbolicName :\??\USB#VID_0E8D&PID_0003#6&2b9c2bdb&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0


Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0690MT6763T[6763]
BROM HW_SW_VER : 8A00 CA01 0001 0000
getMTKPayloadExploit : 0690
#Executing Exploit..
#SUCCESS..
Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0690MT6763T[6763]
BROM HW_SW_VER : 8A00 CA01 0001 0000
SECURE VERSION : 05
BL VERSION : FE
BR Secured : 00
NORMAL BOOT

Preparing Download Agent..
DA : 6763.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2018-09-18.13:22_452898
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
C0
Protocol : New
Synchronization...
SYNCSYNC
Mode : brom
Preloader Initialization...
Parsing preloader_oppo6763_17101.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : D5B90F009BDC19EF0C66E70AFC1224C7
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 90014A484247346132A50FE0CC17C495 - HBG4a2

DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info
Brand : OPPO
Vendor : OPPO
Model : OPPO A83js
ID : N6F26Q
SDK : 25
Release : 7.1.1
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6763_17101-user 7.1.1 N6F26Q 1537620965 release-keys
Device : M6763D
Board : full_oppo6763_17101
Display ID : A83jsEX_11_A.21_180922
Security Patch : 2018-09-05
Platform : mt6763
FRPPST : /dev/block/platform/bootdevice/by-name/frp
StorageType : mtp
Userdata State : Not Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_oppo6763_17101.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0690__031521143219\MT6763T_Android_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x05A88000]1024 KB ->frp.bin...Ok
-nvdata[0x07B88000]64 MB ->nvdata.bin...Ok
-persist[0x0F800000]48 MB ->persist.bin...Ok
-nvram[0x1A000000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0690__031521143219
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : D5B90F009BDC19EF0C66E70AFC1224C7
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 90014A484247346132A50FE0CC17C495 - HBG4a2

Reading GPT-EMMC [0x00008000] 130 Items

Flashing Selected Partitions....
- preloader[preloader_oppo6763_17101.bin] 256 KB Erasing..[STATUS_INVALID_PARAMETERS]Failed Flash ->= Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!
=====================================

Elapsed Time : 00:01:25
BR
Mount Everest

 
  • Like
Reactions: FAROK
Top