OPPO A17 FACTORY RESET & FRP REMOVE DONE MRST DONGLE
Posted: Mon Mar 11, 2024 10:09 am
OPPO A17 FACTORY RESET & FRP REMOVE DONE MRST DONGLE
>>> Connecting Mobile Com Port...
Get Mobile Port: COM19
>>> Driver Identifying name:
MediaTek PreLoader USB VCOM_V1632 (Android)
>>> Mobile Connection is Normal...
CPU_NAME: MT6765
>>> Reading Mobile Hardware info...Success
HW_Inf: 8A00 SW_Inf: CA00
>>>>> downloading boot1 to device...
>>> Triggering Mobile Phone...
Success
>>>>> Selected Oppo 2023 Preloader exploit V1 ....
>>>>> Device Boot1_Size: 0x0003A228
>>>>> Calling Magic Key ,,,,,,
>>>>> Device meid:
00000000000000000000000000000000
>>>> Downloading boot2 to Device...
>>>> Bypassing Preloader ...
>>>>> Device Boot1_Add: 0x0022B274
>>>>> Downloading 0x0004708C
>>>>>>>Flash Type(eMMC)<<<<<<<<
Flash Size: 0x0000000E8F800000 -> 59640M
Flash ID: 0x13014E47324D3231
Flash Name: UNKNOWN
Flash Code: G2M211
>>> switch hight speed re,wr port...
>>> Connecting Mobile Com Port...
Get Mobile Port: COM13
>>> Driver Identifying name:
MediaTek DA USB VCOM (Android)
Get Com Port is: COM13
>>> Driver name:
MediaTek DA USB VCOM (Android)
>>> Reading Mobile GPT data...Success
>>>>Flashing userdata...
Start Add: 0x02AD800000 Length: 0x0BDE4F8000
File length: 0x032FE388
>>>>Task Finished<<<<
>>> Connecting Mobile Com Port...
Get Mobile Port: COM19
>>> Driver Identifying name:
MediaTek PreLoader USB VCOM_V1632 (Android)
>>> Mobile Connection is Normal...
CPU_NAME: MT6765
>>> Reading Mobile Hardware info...Success
HW_Inf: 8A00 SW_Inf: CA00
>>>>> downloading boot1 to device...
>>> Triggering Mobile Phone...
Success
>>>>> Selected Oppo 2023 Preloader exploit V1 ....
>>>>> Device Boot1_Size: 0x0003A228
>>>>> Calling Magic Key ,,,,,,
>>>>> Device meid:
00000000000000000000000000000000
>>>> Downloading boot2 to Device...
>>>> Bypassing Preloader ...
>>>>> Device Boot1_Add: 0x0022B274
>>>>> Downloading 0x0004708C
>>>>>>>Flash Type(eMMC)<<<<<<<<
Flash Size: 0x0000000E8F800000 -> 59640M
Flash ID: 0x13014E47324D3231
Flash Name: UNKNOWN
Flash Code: G2M211
>>> switch hight speed re,wr port...
>>> Connecting Mobile Com Port...
Get Mobile Port: COM13
>>> Driver Identifying name:
MediaTek DA USB VCOM (Android)
Get Com Port is: COM13
>>> Driver name:
MediaTek DA USB VCOM (Android)
>>> Reading Mobile GPT data...Success
>>>>Flashing userdata...
Start Add: 0x02AD800000 Length: 0x0BDE4F8000
File length: 0x032FE388
>>>>Task Finished<<<<