Oppo r15 screenlock remove by king hydra ultra format Hydra MediaTeK Tool Ver 1.0.1 Build 91 Windows 10 (Version 10.0, Build 18362, 64-bit Edition) Intel(R) Core(TM) i5-6440HQ CPU @ 2.60GHz Intel(R) HD Graphics 530 Ram Installed : 8 GB Windows Access Right Admin Software Run As Admnistrator ******* Dongle Info ******* Version : Hydra Tool v 1.1 Serial : 181200000026 Initialize : OKAY Status : Activated Life : 1-[0-0-0-0-0] Brand : AUTO Model : AUTO Connection : Flash Mode ===================================== How To Boot : Remove Batt if possible * TP Ground Must be near cpu.. * Remove ground upon popup of the message dialog. Connection[WAITING]Found[COM18] Status[Opened] Identifying Hardware ID BROM CPUID : 0788 (0000)MT6771[6771] BROM HW_SW_VER : 8A00 CA00 0000 0000 FUSEID : 00000001 SECURE VERSION : 05 BL VERSION : FE BR Secured : E5[SBC+SDA+SEL] Security Authorization.... Sending[Oppo_F7.auth] Accepted Preparing Download Agent.. Download Agent : 6771_SWSEC_E0871E87F0.bin MTK_DOWNLOAD_AGENT -HYDRA MTK_AllInOne_DA_v3.3001.00.00 Initializing Loader [1] Sending Loader [1] Accepted PROTOCOL[NEW] - eMMC PHONE SYNC[Accepted] DA Mode : brom Preloader Initialization.... Parsing preloader_oppo6771_17197.bin Sending FlashInit Accepted Initializing Loader [2] Sending Loader [2] Accepted ERAM Size : 0x0000000000040000 -256 KB IRAM Size : 0x00000000C0000000 -3 GB eMMC BOOT1 : 0x0000000000400000 -4 MB eMMC BOOT2 : 0x0000000000400000 -4 MB eMMC RPMB : 0x0000000001000000 -16 MB eMMC USER : 0x0000001D1EC00000 -116.48 GB eMMC CID : 150100335636434D4202C3CCC87D45ED - 3V6CMB UNICAL RID : 14DD1AE80FBFCFB6500EE9B2B72AE895 DA Speed : high-speed Reading GPT-EMMC [0x00008000] 130 Items Done!!! Reading System Info Model : Brand : Android Ver : 9 Manufacturer : OPPO Device : Display ID : Security Patch : 2020-01-05 Kernel ID : 2020-01-05 Fingerprint : ro_product_hardware : sys_hardware_version : Autobackup Partitions preloader[0x00000000-0x00080000]512 KB ->preloader.bin... Done -> Renaming Preloader.... preloader_oppo6771_17197.bin Creating Scatter file... C:\Hydra Tool\\Backup\Auto\__0788--9()_230620111032\MT6771_Android_scatter.txt pgpt[0x00000000-0x00008000]32 KB ->pgpt.bin... Done frp[0x07C88000-0x07D88000]1024 KB ->frp.bin... Done nvdata[0x09D88000-0x0DD88000]64 MB ->nvdata.bin... Done nvram[0x20D00000-0x24D00000]64 MB ->nvram.bin... Done Done!!! C:\Hydra Tool\\Backup\Auto\__0788--9()_230620111032 MTK Phone Loader is NOW RUNNING. ERAM Size : 0x0000000000040000 -256 KB IRAM Size : 0x00000000C0000000 -3 GB eMMC BOOT1 : 0x0000000000400000 -4 MB eMMC BOOT2 : 0x0000000000400000 -4 MB eMMC RPMB : 0x0000000001000000 -16 MB eMMC USER : 0x0000001D1EC00000 -116.48 GB eMMC CID : 150100335636434D4202C3CCC87D45ED - 3V6CMB UNICAL RID : 14DD1AE80FBFCFB6500EE9B2B72AE895 Reading GPT-EMMC [0x00008000] 130 Items Done!!! Reading System Info Model : Brand : Android Ver : 9 Manufacturer : OPPO Device : Display ID : Security Patch : 2020-01-05 Kernel ID : 2020-01-05 Fingerprint : ro_product_hardware : sys_hardware_version : ------------------------------------- Operation : Auto Processing... Ok Elapsed Time : 00:00:42 |
Thanks for Good Report. Best Regards | Hydra Team |
All times are GMT +1. The time now is 00:08. |
vBulletin Optimisation provided by
vB Optimise (Pro) -
vBulletin Mods & Addons Copyright © 2024 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2023 -