Hydra Oppo A15 (CPH2185) Factory Reset Without Recovery Lock With by Hydra

Hydra Tool

sero408

Friend's Martview
Sep 26, 2021
683
66
türkiye
Oppo A15 (CPH2185) Factory Reset Without Recovery Lock With by Hydra
190300000423_HMTKTool.exe_FM_UltraPower_Auto_11-05-2021-005648.jpeg

=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port_V1632 (COM6)
Device : 6&944c330&0&5
SymbolicName :??USB#VID_0E8D&PID_0003#6&944c330&0&5#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0

Opened handle..
Handshaking... Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0766 MT6765 [6765]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : E5
SBC : 01 (True)
SLA : 00 (False)
DAA : 04 (True)
SWJTAG : 04 (True)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 20 (True)
MEMWRITE : 40 (True)
CMD_C8 : 80 (True)

Exploiting Device...
Exploit Sent..
Successfully Exploited...
Handshaking... Ok

H:mobileboxHydraTool_FullPackage_08-01-2021BackupPreloader_dumpprel.tmp
Handshaking...

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0766 MT6765 [6765]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)

MEID : CE3D3036A4A0A4F8DBC99799DBA09C7A
Stage 1.. [Size:216440]
Sending : Please wait.. Accepted

Identifying Protocol...
Protocol : New
Synchronization... SYNC
Preloader Initialization...
sing prel.tmp
Init : Accepted
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 184AA57BAF48C6BAAA462805137E02E1
ERAM Size : 0x0000000000038000 -224 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 90014A68423861503E030080AED9C73B - hB8aP>
Executing : ACCEPTED...

Reading GPT -EMMC [0x00008000] 130 Items

Autobackup titions
-preloader [0x00000000] 512 KB -> preloader.bin...0 Ok
-> Renaming Preloader.... preloader_oppo6765.bin
Creating Scatter file... H:mobileboxHydraTool_FullPackage_08-01-2021BackupAuto0766__110521005632MT6765_Android_scatter.txt
-pgpt [0x00000000] 32 KB -> pgpt.bin...0 Ok
-frp [0x15088000] 1024 KB -> frp.bin...0 Ok
-nvdata [0x17188000] 64 MB -> nvdata.bin...0 Ok
-protect1 [0x1E822000] 8 MB -> protect1.bin...0 Ok
-protect2 [0x1F022000] 15.867 MB -> protect2.bin...0 Ok
-persist [0x20800000] 48 MB -> persist.bin...0 Ok
-nvram [0x2C600000] 64 MB -> nvram.bin...0 Ok
Done!!!
H:mobileboxHydraTool_FullPackage_08-01-2021BackupAuto0766__110521005632
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 1 184AA57BAF48C6BAAA462805137E02E1
ERAM Size : 1 0x0000000000038000 -224 KB
IRAM Size : 1 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 90014A68423861503E030080AED9C73B - hB8aP>

Reading GPT -EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP tition...
Safeformat Universal...
Action Result : Ok

Elapsed Time : 00:01:00
 
  • Like
Reactions: FAROK
Top