OPPO A57 FRP REMOVE DONE MRST DONGLE
>>> Connecting Mobile Com Port...
Get Mobile Port: COM14
>>> Driver Identifying name:
MediaTek PreLoader USB VCOM_V1632 (Android)
>>> Mobile Connection is Normal...
CPU_NAME: MT6765
>>> Reading Mobile Hardware info...Success
HW_Inf: 8A00 SW_Inf: CA00
>>>>> downloading boot1 to device...
>>> Triggering Mobile Phone...
Success
>>>>> Selected Oppo 2023 Preloader exploit V1 ....
>>>>> Device Boot1_Size: 0x0003A228
>>>>> Calling Magic Key ,,,,,,
>>>>> Device meid:
00000000000000000000000000000000
>>>> Downloading boot2 to Device...
>>>> Bypassing Preloader ...
>>>>> Device Boot1_Add: 0x0022B274
>>>>> Downloading 0x0004708C
>>> switch hight speed re,wr port...
>>> Connecting Mobile Com Port...
Get Mobile Port: COM15
>>> Driver Identifying name:
MediaTek DA USB VCOM (Android)
Get Com Port is: COM15
>>> Driver name:
MediaTek DA USB VCOM (Android)
>>> Reading Mobile GPT data...Success
>>>>Erasing Devices data...
Start Add : 0x0DE88000 Size : 0x00100000
>>>>Task Finished<<<<
OPPO A57 FRP REMOVE DONE MRST DONGLE
Moderator: DYNET