Oppo F11 Pro (CPH1969) Format user Data successfully done by Hydra Tool

Oppo F11 Pro (CPH1969) Format user Data successfully done by Hydra Tool

Huawei ATU-L42 (Y6 2018) FRP successfylly removed by Hydra Tool

Screen Short:

[

Logs:

Quote:

Brand : OPPO Model : F11 Pro (CPH1969) Connection : Flash Mode

=====================================
Connection
-Please wait…
-Connect Phone…
-Found…[COM54]

TPortConnection.Create…(COM54)..Opening…Ok

Handshaking…Ok

Identifying Hardware ID…..
BROM CPUID : 0788MT6771[6771] BROM HW_SW_VER : 8A00 CA00 0000 0000
getMTKPayloadExploit : 0788
#Executing Exploit..
#SUCCESS..

Handshaking…Ok

Identifying Hardware ID…..
BROM CPUID : 0788MT6771[6771] BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
SECURE VERSION : 05
BL VERSION : FE
BR Secured : E0

Preparing Download Agent..
DA : [Not Exist] Trying Default 6771.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2020-11-03.22:07_536568
Init : Loader [1] Sending : Accepted

Identifying Protocol…
Protocol : New
Synchronization…SYNC
Mode : brom
Preloader Initialization…
Parsing F11_PRO_preloader_oppo6771_18531.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2] Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info…
UNIQUE ID : AA5947FC1F628F0FD242A8D04123162F
ERAM Size : 0x0000000000039000 -228 KB
IRAM Size : 0x0000000180000000 -6 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 90014A68433861503E03CB28D55BB577 – hC8aP>

DA Speed : high-speed
DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info
Vendor : OPPO
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6771_18531-user 9 PPR1.180610.011 eng.root.20200325.183314 release-keys
Security Patch : 2020-04-05
StorageType : mtp
Userdata State : Not Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin…Ok
-> Renaming Preloader…. preloader_oppo6771_18531.bin
Creating Scatter file… C:Hydra Tool\BackupAuto__0788–9__210221181823MT6771_Android_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin…Ok
-frp[0x0DE88000]1024 KB ->frp.bin…Ok
-nvdata[0x0FF88000]64 MB ->nvdata.bin…Ok
-persist[0x17800000]48 MB ->persist.bin…Ok
-nvram[0x26D00000]64 MB ->nvram.bin…Ok
Done!!!
C:Hydra Tool\BackupAuto__0788–9__210221181823
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info…
UNIQUE ID : AA5947FC1F628F0FD242A8D04123162F
ERAM Size : 0x0000000000039000 -228 KB
IRAM Size : 0x0000000180000000 -6 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 90014A68433861503E03CB28D55BB577 – hC8aP>

Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info
Vendor : OPPO
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6771_18531-user 9 PPR1.180610.011 eng.root.20200325.183314 release-keys
Security Patch : 2020-04-05
StorageType : mtp
Userdata State : Not Encrypted

————————————-
Operation : Auto
Processing…
ZeroWipe FRP Partition…[C002002A-STATUS_SEC_IMG_TYPE_MISMATCH] Erasing FRP Partition…
Safeformat Universal…[C002004B-] Formatting Userdata… Ok

TPortConnection.Destroy…..Closing…Ok..

Elapsed Time : 00:00:41


BR
Dipendra Pathak

Scroll to Top