Oppo F11 (CPH1911) Formatting user data successfully done by Hydra Too

Mount Everest

Friend's Martview
Dec 26, 2020
1,273
546
Kathmandu, Nepal
Oppo F11 (CPH1911) Formatting user data successfully done by Hydra Tool

Screen Short:



Logs:

=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port_V1632 (COM19)
SymbolicName :\??\USB#VID_0E8D&PID_0003#7&919e011&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0788MT6771[6771]
BROM HW_SW_VER : 8A00 CA00 0000 0000
getMTKPayloadExploit : 0788
#Executing Exploit..
#SUCCESS..
Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0788MT6771[6771]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
SECURE VERSION : 00
BL VERSION : FE
BR Secured : E0

Preparing Download Agent..
DA : [Not Exist]
Trying Default 6771.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2020-11-03.22:07_536568
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
C0
Protocol : New
Synchronization...
SYNCSYNC
Mode : brom
Preloader Initialization...
Parsing Reno_2F_preloader_oppo6771.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 373AA2D8FA524907F32504A66B87E8E1
ERAM Size : 0x0000000000039000 -228 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000001D1F000000 -116,484 GB
eMMC CID : 13014E53304A394B3910113536DF6695 - S0J9K9

DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info
ID : QP1A.190711.020
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6771-user 10 QP1A.190711.020 7604ad4e2b1328a1 release-keys
Display ID : QP1A.190711.020 release-keys
Security Patch : 2020-11-05
StorageType : mtp
Userdata State : Not Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_oppo6771.bin
Creating Scatter file... C:\Users\Downloads\HYDRA TOOL\HydraTool_Fullpackage_1-30-2021\\Backup\Auto\0788__031221200040\MT6771_Android_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x0DE88000]1024 KB ->frp.bin...Ok
-nvdata[0x0FF88000]64 MB ->nvdata.bin...Ok
-persist[0x17800000]48 MB ->persist.bin...Ok
-nvram[0x26D00000]64 MB ->nvram.bin...Ok
Done!!!
C:\Users\Downloads\HYDRA TOOL\HydraTool_Fullpackage_1-30-2021\\Backup\Auto\0788__031221200040
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 373AA2D8FA524907F32504A66B87E8E1
ERAM Size : 0x0000000000039000 -228 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000001D1F000000 -116,484 GB
eMMC CID : 13014E53304A394B3910113536DF6695 - S0J9K9

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
ID : QP1A.190711.020
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6771-user 10 QP1A.190711.020 7604ad4e2b1328a1 release-keys
Display ID : QP1A.190711.020 release-keys
Security Patch : 2020-11-05
StorageType : mtp
Userdata State : Not Encrypted

-------------------------------------
Operation : Erase Userdata
Processing...
Formatting Userdata... Ok

Elapsed Time : 00:00:50
BR
Mount Everest

 
Top