Oppo X9009 (F1 Plus) removing FRP partition successfully done by Hydra Tool
Screen Short:
Logs:
1. Run MTK Tool and choose "Sosc"
2. Choose Brand and Module as "Auto"
3. Go to "Service"--> "Tool" from Universal Option
4. Choose "Factory Reset Protection (FRP)"
5. Choose "Auto" from "Method / Option" drop down menu.
6. Connect device to computer using USB Data Cable.
7. Wait until the operation is completed
2. Choose Brand and Module as "Auto"
3. Go to "Service"--> "Tool" from Universal Option
4. Choose "Factory Reset Protection (FRP)"
5. Choose "Auto" from "Method / Option" drop down menu.
6. Connect device to computer using USB Data Cable.
7. Wait until the operation is completed
Screen Short:
Logs:
BR=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port_V1632 (COM9)
Device :5&1d6c0649&0&4
SymbolicName :\??\USB#VID_0E8D&PID_0003#5&1d6c0649&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0
Handshaking...Ok
Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0326MT6750T [6755]
hw subcode : 8A00
hw version : CB00
sw version : 0001
Target config : 01
SB : 01 (True)
SLA : 00 (False)
DAA : 00 (False)
Exploiting Device...
Exploit Sent..
Successfully Exploited...
Handshaking...Ok
Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0326MT6750T [6755]
hw subcode : 8A00
hw version : CB00
sw version : 0001
Target config : 00
SB : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
FUSEID : 02000000
SECURE VERSION : 05
BL VERSION : FE
NORMAL BOOT
Preparing Download Agent..
DA : 6755_SWSEC_D36514C0DE.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.00.00
Init : Loader [1]
Sending : Accepted
Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : brom
Preloader Initialization...
Parsing F1S_preloader_oppo6750_15131.bin
Init : Accepted
Execute Secondary Loader
Init : Loader [2]
Executing : SYNC
Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 0461C3537043FF63ED41E450606DD69A
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 150100524331344D4201B691D49F33FB - RC14MB
DA Speed :
Change to HIGH SPEED...
Searching for MTK Device...Found
Port Identification :DA_HIGHSPEED_VCOM
FriendlyName :MediaTek DA USB VCOM (Android) (COM25)
Device :5&1ba1e768&0&4
SymbolicName :\??\USB#VID_0E8D&PID_2001#5&1ba1e768&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0
Reading GPT-EMMC [0x00008000] 130 Items
Reading System Info
Brand : OPPO
Vendor : OPPO
Model : X9009
ID : LMY47I
SDK : 22
Release : 5.1
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Description : full_oppo6755_15311-user 5.1 LMY47I 1584563916 release-keys
Device : X9009
Board : full_oppo6755_15311
Display ID : X9009EX_11_A.34_200319
Security Patch : 2018-02-05
Platform : mt6755
FRPPST : /dev/block/platform/mtk-msdc.0/by-name/frp
StorageType : mtp,mass_storage
Userdata State : Not Encrypted
Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_oppo6755_15111.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0326__053021110655\MT6750T_Android_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x03F88000]1024 KB ->frp.bin...Ok
-nvdata[0x04088000]32 MB ->nvdata.bin...Ok
-protect1[0x08088000]8 MB ->protect1.bin...Ok
-protect2[0x08888000]15.469 MB ->protect2.bin...Ok
-nvram[0x0CF00000]5 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0326__053021110655
MTK Phone Loader is NOW RUNNING.
Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 0461C3537043FF63ED41E450606DD69A
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 150100524331344D4201B691D49F33FB - RC14MB
Reading GPT-EMMC [0x00008000] 130 Items
Reading System Info
Brand : OPPO
Vendor : OPPO
Model : X9009
ID : LMY47I
SDK : 22
Release : 5.1
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Description : full_oppo6755_15311-user 5.1 LMY47I 1584563916 release-keys
Device : X9009
Board : full_oppo6755_15311
Display ID : X9009EX_11_A.34_200319
Security Patch : 2018-02-05
Platform : mt6755
FRPPST : /dev/block/platform/mtk-msdc.0/by-name/frp
StorageType : mtp,mass_storage
Userdata State : Not Encrypted
-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition... Ok
Elapsed Time : 00:01:06
Mount Everest