Hydra Oppo F5 (cph1723) factory reset with Hydra Tool

Hydra Tool

Unlockinfo

Friend's Martview
Feb 6, 2020
394
437
Pakistan
Skype
unlockinfo
Oppo F5 (cph1723) factory reset with Hydra Tool



Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                      Service Function
              Format/Factory Reset/ScreenLock
                 Safe Format Master Clear 1
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching for MTK Device...Found
  MTK Port Type   : Flashmode BROM
  FriendlyName    : MediaTek USB Port_V1632 (COM34)
  Device          : /5&fe88cf0&0&2
  SymbolicName    : \\?\usb#vid_0e8d&pid_0003#5&fe88cf0&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 01/22/2015,3.0.1504.0
  Service         : wdm_usb

Openning Port [COM34] Ok
Handshaking...Ok
  HwCode          : 0690 {MT6763}
  Hwver           : 0000
  Target config   : 00
  SBC             : 00 (False)
  SLA             : 00 (False)
  DAA             : 00 (False)
  SWJTAG          : 00 (False)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 00 (False)
  MEMWRITE        : 00 (False)
  CMD_C8          : 00 (False)
  Connection      : BROM
  HW Subcode      : 8A00
  HW Subcode      : CA01
  SW Ver          : 0001
  ME_ID           : 2779AA02BEA8BD678CE7B72E762169E1
  SOC_ID          : BA75FAEB822A3D1AEEFB86973669BFD0A0B8B782853D1CB8A2CD2E1FA1A25E84

Exploiting Device...
Successfully Exploited..
Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..
Not Found
  Target config   : 00
  SBC             : 00 (False)
  SLA             : 00 (False)
  DAA             : 00 (False)
  SWJTAG          : 00 (False)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 00 (False)
  MEMWRITE        : 00 (False)
  CMD_C8          : 00 (False)
  Connection      : BROM

Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin]
Patching da2 ... Ok
Uploading Stage 1....
Successfully uploaded stage 1, jumping ..
Executing JUMP_DA Address @ 0x00200000
Jumping to 0x00200000 Ok 0xC0
Successfully received DA sync
  ONNECTION_AGENT : brom
  DRAM config needed for : 90014A4843473861
Sending auto preloader from dump...
Hydra Auto Preloader Search Enabled..
Hydra will find compatible preloader files...
-----------------------------
Found 4 Compatible Preloaders..
-----------------------------
1-Coolpad_Cool_X_Preloader.bin...Sending... Status: 0xC0070005 = DA exceed max num
2-preloader_e959_oq_s70_63_p0.bin...Sending... Status: 0xC0070005 = DA exceed max num
3-preloader_k63v2_64_bsp_cs6062.bin...Sending... Status: 0xC0070005 = DA exceed max num
4-preloader_q930.bin...Sending... Status: 0xC0070005 = DA exceed max num
-----------------------------
Selected File : D:\preloader_oppo6763_17031.bin
Sending EMI Data... [DRAM setup passed.]
Sending emi data succeeded.
Sending emi data succeeded.
Uploading stage 2...
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
  ERAM Size       : 0x0000000000040000-256 KB
  IRAM Size       : 0x0000000100000000-4 GB
  EMMC Boot1 Size : 0x0000000000400000-4 MB
  EMMC Boot2 Size : 0x0000000000400000-4 MB
  EMMC RPMB Size  : 0x0000000000400000-4 MB
  EMMC USER Size  : 0x0000000E8F800000-58.242 GB
  EMMC CID        : 90014A484347386134A228A02535658F - HCG8a4
  HW-CODE         : 0x690
  HWSUB-CODE      : 0x8A00
  HW-VERSION      : 0xCA01
  SW-VERSION      : 0x1
  CHIP-EVOLUTION  : 0x0
  DA-VERSION      : 1.0
  Speed           : high-speed
Upload data was accepted. Jumping to stage 2...
DA Extensions successfully added
Reading Partition Table ..
Partition Count : 42
--------------- Reading build.prop content ---------------
  Brand          : OPPO
  Vendor         : OPPO
  Model          : OPPO CPH1723
  Product        : oppo6763_17031
  Manufacturer   : OPPO
  ID             : N6F26Q
  SDK            : 25
  Release        : 7.1.1
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-US
  Description    : full_oppo6763_17031-user 7.1.1 N6F26Q 1559583323 release-keys
  Device         : M6763A
  Display ID     : CPH1723EX_11_A.36_190604
  Security Patch : 2019-06-05
  Platform       : mt6763
--------------- end of build.prop content ---------------

Reading IMEI........
-------------------------------
Bootloader Status...
  Bootloader : Unlocked
-------------------------------
------------------------------
   Factory Reset Flash Mode.. 
------------------------------
Operation : Safeformat Master Clear 1

Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!

Action Result :  Ok

Elapsed Time : 00:01:16

 
Top