suzun54
.

Принёс клиент новый с коробкой OPPO A15 CPH2185 на пароле. Который успешно забыл.
Octoplus FRP Tool версия 2.0.9.0 и новая версия 2.1.0.0 не справились с ним.
За пару секунд снял без всяких донглов и программаторов при помощи MTK CLIENT TOOL
Далее снял FRP в наборе экстренных вызовов набрав код *#812# также должен подойти код *#813# и ВСЁ телефон полностью разблокирован.
Может кому и пригодится
Всем удачных ремонтов
Octoplus FRP Tool версия 2.0.9.0 и новая версия 2.1.0.0 не справились с ним.
ПОДРОБНО
Welcome to Octoplus FRP Tool v.2.1.0.0
Card S/N: 20000D,,,
Work ID: 00000000024,,,,,,
Platform: OPPO
Selected model: A15 (CPH2185)
Please, power phone OFF, press and hold "Vol+" and "Vol-" buttons and connect USB cable.
Searching for a phone. Please wait...
Found phone on COM3
Port name: MediaTek USB Port_V1632 (COM3)
Detecting Chip Version...
HW Chip: MT6765: 0766.0000
HW Version: 8A00.CA00.0000.0000
Connecting...
Target Config: 00E5
Brom Version: 05
BootLoader Version: FE
Disabling protection...
Reconnecting...
Detecting Chip Version...
HW Chip: MT6765: 0766.0000
HW Version: 8A00.CA00.0000.0000
Target Config: 0000
Reading preloader...
Searching Download Agent...
Selected DA: MTK_AllInOne_DA_v3.3001.2019-09-13.17:00_485156, n.28
Prepairing Download Agent...
Sending Download Agent...
DA sent successfully
Initializing DA...
Synchronizing with DA...
Mobile Status: SYNC
Mobile Status: brom
Sending BootLoader Info...
Operation was failed!
Performed by 2.1.0.0 Software version.
Card S/N: 20000D,,,
Work ID: 00000000024,,,,,,
Platform: OPPO
Selected model: A15 (CPH2185)
Please, power phone OFF, press and hold "Vol+" and "Vol-" buttons and connect USB cable.
Searching for a phone. Please wait...
Found phone on COM3
Port name: MediaTek USB Port_V1632 (COM3)
Detecting Chip Version...
HW Chip: MT6765: 0766.0000
HW Version: 8A00.CA00.0000.0000
Connecting...
Target Config: 00E5
Brom Version: 05
BootLoader Version: FE
Disabling protection...
Reconnecting...
Detecting Chip Version...
HW Chip: MT6765: 0766.0000
HW Version: 8A00.CA00.0000.0000
Target Config: 0000
Reading preloader...
Searching Download Agent...
Selected DA: MTK_AllInOne_DA_v3.3001.2019-09-13.17:00_485156, n.28
Prepairing Download Agent...
Sending Download Agent...
DA sent successfully
Initializing DA...
Synchronizing with DA...
Mobile Status: SYNC
Mobile Status: brom
Sending BootLoader Info...
Operation was failed!
Performed by 2.1.0.0 Software version.
За пару секунд снял без всяких донглов и программаторов при помощи MTK CLIENT TOOL
ПОДРОБНО
OPERATION: Format Data
1.Turn Off Phone
2.Hold VOL+ And VOL- Then Insert Usb Cable
3.Phone must have battery inside!
Waiting For Device .....
Device -Found
CPU -MT6765(Helio P35/G35)
HW version -0x0
WDT -0x10007000
Uart -0x11002000
Brom payload addr -0x100a00
DA payload addr -0x201000
CQ_DMA addr -0x10212000
Var1: -0x25
Disabling Watchdog.. -OK
HW code -0x766
Target config -0xe5
SBC enabled -True
SLA enabled -False
DAA enabled -True
SWJTAG enabled -True
Root cert required -False
Mem read auth -True
Mem write auth -True
Cmd 0xC8 blocked -True
HW subcode -0x8a00
HW Ver -0xca00
SW Ver -0x0
ME_ID -FAE222967A57AD2B5AA462B035D63D7E
Auth Bypass -OK
Device -Found
Device Protected -OK
BROM mode -Connected
Successfully received DA -OK
Sending EMI data -OK
Uploading stage 2 -Done
Successfully stage 2 -OK
EMMC FWVer -0x0
EMMC ID - hB8aP>
CID -90014a68423861503e0300ceb581a7b5
EMMC Boot1 Size - 0x400000
EMMC Boot2 Size - 0x400000
EMMC GP1 Size - 0x0
EMMC GP2 Size - 0x0
EMMC GP3 Size - 0x0
EMMC GP4 Size - 0x0
EMMC RPMB Size -0x1000000
EMMC USER Size -0x747c00000
DA-CODE - 0x666D0
DA Extensions successfully -OK
Formating Data - OK
1.Turn Off Phone
2.Hold VOL+ And VOL- Then Insert Usb Cable
3.Phone must have battery inside!
Waiting For Device .....
Device -Found
CPU -MT6765(Helio P35/G35)
HW version -0x0
WDT -0x10007000
Uart -0x11002000
Brom payload addr -0x100a00
DA payload addr -0x201000
CQ_DMA addr -0x10212000
Var1: -0x25
Disabling Watchdog.. -OK
HW code -0x766
Target config -0xe5
SBC enabled -True
SLA enabled -False
DAA enabled -True
SWJTAG enabled -True
Root cert required -False
Mem read auth -True
Mem write auth -True
Cmd 0xC8 blocked -True
HW subcode -0x8a00
HW Ver -0xca00
SW Ver -0x0
ME_ID -FAE222967A57AD2B5AA462B035D63D7E
Auth Bypass -OK
Device -Found
Device Protected -OK
BROM mode -Connected
Successfully received DA -OK
Sending EMI data -OK
Uploading stage 2 -Done
Successfully stage 2 -OK
EMMC FWVer -0x0
EMMC ID - hB8aP>
CID -90014a68423861503e0300ceb581a7b5
EMMC Boot1 Size - 0x400000
EMMC Boot2 Size - 0x400000
EMMC GP1 Size - 0x0
EMMC GP2 Size - 0x0
EMMC GP3 Size - 0x0
EMMC GP4 Size - 0x0
EMMC RPMB Size -0x1000000
EMMC USER Size -0x747c00000
DA-CODE - 0x666D0
DA Extensions successfully -OK
Formating Data - OK
Далее снял FRP в наборе экстренных вызовов набрав код *#812# также должен подойти код *#813# и ВСЁ телефон полностью разблокирован.
Может кому и пригодится
Последнее редактирование: