HYDRA Oppo F5 (Cph1723) Factory Reset With Hydra Tool (1 Viewer)

unlockinfo

Deneyimli Üye
Deneyimli Üye
Kayıtlı Kullanıcı
Oppo F5 (cph1723) factory reset with Hydra Tool



Kod:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                      Service Function
              Format/Factory Reset/ScreenLock
                 Safe Format Master Clear 1
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching for MTK Device...Found
  MTK Port Type   : Flashmode BROM
  FriendlyName    : MediaTek USB Port_V1632 (COM34)
  Device          : /5&fe88cf0&0&2
  SymbolicName    : \\?\usb#vid_0e8d&pid_0003#5&fe88cf0&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 01/22/2015,3.0.1504.0
  Service         : wdm_usb

Openning Port [COM34] Ok
Handshaking...Ok
  HwCode          : 0690 {MT6763}
  Hwver           : 0000
  Target config   : 00
  SBC             : 00 (False)
  SLA             : 00 (False)
  DAA             : 00 (False)
  SWJTAG          : 00 (False)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 00 (False)
  MEMWRITE        : 00 (False)
  CMD_C8          : 00 (False)
  Connection      : BROM
  HW Subcode      : 8A00
  HW Subcode      : CA01
  SW Ver          : 0001
  ME_ID           : 2779AA02BEA8BD678CE7B72E762169E1
  SOC_ID          : BA75FAEB822A3D1AEEFB86973669BFD0A0B8B782853D1CB8A2CD2E1FA1A25E84

Exploiting Device...
Successfully Exploited..
Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..
Not Found
  Target config   : 00
  SBC             : 00 (False)
  SLA             : 00 (False)
  DAA             : 00 (False)
  SWJTAG          : 00 (False)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 00 (False)
  MEMWRITE        : 00 (False)
  CMD_C8          : 00 (False)
  Connection      : BROM

Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin]
Patching da2 ... Ok
Uploading Stage 1....
Successfully uploaded stage 1, jumping ..
Executing JUMP_DA Address @ 0x00200000
Jumping to 0x00200000 Ok 0xC0
Successfully received DA sync
  ONNECTION_AGENT : brom
  DRAM config needed for : 90014A4843473861
Sending auto preloader from dump...
Hydra Auto Preloader Search Enabled..
Hydra will find compatible preloader files...
-----------------------------
Found 4 Compatible Preloaders..
-----------------------------
1-Coolpad_Cool_X_Preloader.bin...Sending... Status: 0xC0070005 = DA exceed max num
2-preloader_e959_oq_s70_63_p0.bin...Sending... Status: 0xC0070005 = DA exceed max num
3-preloader_k63v2_64_bsp_cs6062.bin...Sending... Status: 0xC0070005 = DA exceed max num
4-preloader_q930.bin...Sending... Status: 0xC0070005 = DA exceed max num
-----------------------------
Selected File : D:\preloader_oppo6763_17031.bin
Sending EMI Data... [DRAM setup passed.]
Sending emi data succeeded.
Sending emi data succeeded.
Uploading stage 2...
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
  ERAM Size       : 0x0000000000040000-256 KB
  IRAM Size       : 0x0000000100000000-4 GB
  EMMC Boot1 Size : 0x0000000000400000-4 MB
  EMMC Boot2 Size : 0x0000000000400000-4 MB
  EMMC RPMB Size  : 0x0000000000400000-4 MB
  EMMC USER Size  : 0x0000000E8F800000-58.242 GB
  EMMC CID        : 90014A484347386134A228A02535658F - HCG8a4
  HW-CODE         : 0x690
  HWSUB-CODE      : 0x8A00
  HW-VERSION      : 0xCA01
  SW-VERSION      : 0x1
  CHIP-EVOLUTION  : 0x0
  DA-VERSION      : 1.0
  Speed           : high-speed
Upload data was accepted. Jumping to stage 2...
DA Extensions successfully added
Reading Partition Table ..
Partition Count : 42
--------------- Reading build.prop content ---------------
  Brand          : OPPO
  Vendor         : OPPO
  Model          : OPPO CPH1723
  Product        : oppo6763_17031
  Manufacturer   : OPPO
  ID             : N6F26Q
  SDK            : 25
  Release        : 7.1.1
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-US
  Description    : full_oppo6763_17031-user 7.1.1 N6F26Q 1559583323 release-keys
  Device         : M6763A
  Display ID     : CPH1723EX_11_A.36_190604
  Security Patch : 2019-06-05
  Platform       : mt6763
--------------- end of build.prop content ---------------

Reading IMEI........
-------------------------------
Bootloader Status...
  Bootloader : Unlocked
-------------------------------
------------------------------
   Factory Reset Flash Mode.. 
------------------------------
Operation : Safeformat Master Clear 1

Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!

Action Result :  Ok

Elapsed Time : 00:01:16

 
Üst