Hydra Oppo F7 (CPH1819) Factory Reset Without Recovery Lock With by Hydra

Hydra Tool

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Oppo F7 (CPH1819) Factory Reset Without Recovery Lock With by Hydra
190800001896_HMTKTool.exe_FM_Erase_Userdata_10-29-2021-104214.jpeg

=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port (COM12)
Device : 5&709fa6&0&1
SymbolicName :??USB#VID_0E8D&PID_0003#5&709fa6&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2016,3.0.1504.0

Opened handle..
Handshaking... Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0788 MT6771 [6771]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : E5
SBC : 01 (True)
SLA : 00 (False)
DAA : 04 (True)
SWJTAG : 04 (True)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 20 (True)
MEMWRITE : 40 (True)
CMD_C8 : 80 (True)

Exploiting Device...
Exploit Sent..
Successfully Exploited...
Handshaking... Ok

Handshaking...

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0788 MT6771 [6771]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)

MEID : FE0CECE012A09C1D6C871DA9A673E07C
Stage 1.. [Size:229160]
Sending : Please wait.. Accepted

Identifying Protocol...
Protocol : New
Synchronization... SYNC
Preloader Initialization...
sing preloader_oppo6771_17197.bin
Init : Accepted
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 4A792D6FA1C9AD68099A27F2B40DF53B
ERAM Size : 0x0000000000038000 -224 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 150100444836444D42059A8F9092B4FD - DH6DMB
Executing : ACCEPTED...

Reading GPT -EMMC [0x00008000] 130 Items

Reading System Info
ID : QP1A.190711.020
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6771-user 10 QP1A.190711.020 7604ad4e2b1328a1 release-keys
Display ID : QP1A.190711.020 release-keys
Security Patch : 2021-04-05
StorageType : mtp
Userdata State : Encrypted

Autobackup titions
-preloader [0x00000000] 512 KB -> preloader.bin...0 Ok
-> Renaming Preloader.... preloader_oppo6771.bin
Creating Scatter file... C:UsersACERDesktophydra toolBackupAuto0788__102921104136MT6771_Android_scatter.txt
-pgpt [0x00000000] 32 KB -> pgpt.bin...0 Ok
-frp [0x07C88000] 1024 KB -> frp.bin...0 Ok
-nvdata [0x09D88000] 64 MB -> nvdata.bin...0 Ok
-protect1 [0x0FD88000] 8 MB -> protect1.bin...0 Ok
-protect2 [0x10588000] 10.469 MB -> protect2.bin...0 Ok
-persist [0x11800000] 48 MB -> persist.bin...0 Ok
-nvram [0x20D00000] 64 MB -> nvram.bin...0 Ok
Done!!!
C:UsersACERDesktophydra toolBackupAuto0788__102921104136
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 1 4A792D6FA1C9AD68099A27F2B40DF53B
ERAM Size : 1 0x0000000000038000 -224 KB
IRAM Size : 1 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 150100444836444D42059A8F9092B4FD - DH6DMB

Reading GPT -EMMC [0x00008000] 130 Items


Reading System Info
ID : QP1A.190711.020
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6771-user 10 QP1A.190711.020 7604ad4e2b1328a1 release-keys
Display ID : QP1A.190711.020 release-keys
Security Patch : 2021-04-05
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Erase Userdata
Processing...
Formatting Userdata...
Action Result : Ok

Elapsed Time : 00:01:40
 
  • Like
Reactions: FAROK
Top