Hydra Oppo F9 (CPH1823) Rebuilding User Data successfuly Done by Hydra Tool

Hydra Tool

Mount Everest

Friend's Martview
Dec 26, 2020
1,273
546
Kathmandu, Nepal
Oppo F9 (CPH1823) Rebuilding User Data successfuly Done by Hydra Tool

1. Run Hydra MTK Module,
2. Select Brand and Model
3. Go to Service-->Tools-->Ultra Power Option
4. Choose "Rebiod User Data" from Method / Option
5. Execute and connect the device to the computer
6. wait until the process is completed.​

Screen Short:



Logs:

=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port_V1632 (COM9)
SymbolicName :\??\USB#VID_0E8D&PID_0003#5&297258bb&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0788MT6771[6771]
BROM HW_SW_VER : 8A00 CA00 0000 0000
getMTKPayloadExploit : 0788
#Executing Exploit..
#SUCCESS..
Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0788MT6771[6771]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
SECURE VERSION : 05
BL VERSION : FE
BR Secured : E0

Preparing Download Agent..
DA : 6771_SWSEC_E0871E87F0.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.00.00
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_oppo6771_18311_F9.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 803E93DF73A04EFB27F7141D4724B747
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 90014A484347386134A51FE1E41F95C9 - HCG8a4

DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info
ID : QP1A.190711.020
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6771-user 10 QP1A.190711.020 7604ad4e2b1328a1 release-keys
Display ID : QP1A.190711.020 release-keys
Security Patch : 2021-02-05
StorageType : mtp
Userdata State : Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_oppo6771.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0788__042421103513\MT6771_Android_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x07C88000]1024 KB ->frp.bin...Ok
-nvdata[0x09D88000]64 MB ->nvdata.bin...Ok
-persist[0x11800000]48 MB ->persist.bin...Ok
-nvram[0x20D00000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0788__042421103513
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 803E93DF73A04EFB27F7141D4724B747
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 90014A484347386134A51FE1E41F95C9 - HCG8a4

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
ID : QP1A.190711.020
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6771-user 10 QP1A.190711.020 7604ad4e2b1328a1 release-keys
Display ID : QP1A.190711.020 release-keys
Security Patch : 2021-02-05
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Rebuild Userdata
Processing...
Erasing FRP Partition...
Rebuilding Userdata... Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:01:20
Mount Everest[/B]
 
  • Like
Reactions: FAROK
Top