Hydra Oppo F7 (CPH1918) FRP successfully removed by Hydra Tool

Hydra Tool

Mount Everest

Friend's Martview
Dec 26, 2020
1,273
546
Kathmandu, Nepal
Oppo F7 (CPH1918) FRP successfully removed by Hydra Tool

Screen Short:



Logs:
Brand : OPPO Model : F7 (CPH1819) Connection : Flash Mode

=====================================
Connection
-Please wait...
-Found...[COM12]

TPortConnection.Create...(COM12)..Opening...Ok

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0788 (0000)MT6771[6771]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
SECURE VERSION : 05
BL VERSION : FE
BR Secured : E5[SBC+SDA+SEL]

Security Authorization....
Sending[Oppo_F7.auth] Accepted

Preparing Download Agent..
DA : 6771_SWSEC_E0871E87F0.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.00.00
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_oppo6771_17197.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 44CAB856E392A881ABE3008E4E64F5CE
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 90014A484347386134A50887909615CD - HCG8a4

DA Speed : high-speed
DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info
Vendor : OPPO
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6771_17331-user 9 PPR1.180610.011 eng.root.20200710.230657 release-keys
Security Patch : 2020-07-05
StorageType : mtp
Userdata State : Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_oppo6771_17331.bin
Creating Scatter file... C:\HydraTool\\Backup\Auto\__0788--9__220121124018\MT6771_Android_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x07C88000]1024 KB ->frp.bin...Ok
-nvdata[0x09D88000]64 MB ->nvdata.bin...Ok
-persist[0x11800000]48 MB ->persist.bin...Ok
-nvram[0x20D00000]64 MB ->nvram.bin...Ok
Done!!!
C:\HydraTool\\Backup\Auto\__0788--9__220121124018
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 44CAB856E392A881ABE3008E4E64F5CE
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 90014A484347386134A50887909615CD - HCG8a4

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Vendor : OPPO
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6771_17331-user 9 PPR1.180610.011 eng.root.20200710.230657 release-keys
Security Patch : 2020-07-05
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Rebuild Userdata
Processing...
Erasing FRP Partition...
Rebuilding Userdata... Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:38
BR
Mount Everest
 
Top