Oppo F7 (CPH1819) Factory Reset Without Recovery Lock With by Hydra
=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port (COM12)
Device : 5&709fa6&0&1
SymbolicName :??USB#VID_0E8D&PID_0003#5&709fa6&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2016,3.0.1504.0
Opened handle..
Handshaking... Ok
Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0788 MT6771 [6771]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : E5
SBC : 01 (True)
SLA : 00 (False)
DAA : 04 (True)
SWJTAG : 04 (True)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 20 (True)
MEMWRITE : 40 (True)
CMD_C8 : 80 (True)
Exploiting Device...
Exploit Sent..
Successfully Exploited...
Handshaking... Ok
Handshaking...
Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0788 MT6771 [6771]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)
MEID : FE0CECE012A09C1D6C871DA9A673E07C
Stage 1.. [Size:229160]
Sending : Please wait.. Accepted
Identifying Protocol...
Protocol : New
Synchronization... SYNC
Preloader Initialization...
sing preloader_oppo6771_17197.bin
Init : Accepted
Executing : SYNC
Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 4A792D6FA1C9AD68099A27F2B40DF53B
ERAM Size : 0x0000000000038000 -224 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 150100444836444D42059A8F9092B4FD - DH6DMB
Executing : ACCEPTED...
Reading GPT -EMMC [0x00008000] 130 Items
Reading System Info
ID : QP1A.190711.020
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6771-user 10 QP1A.190711.020 7604ad4e2b1328a1 release-keys
Display ID : QP1A.190711.020 release-keys
Security Patch : 2021-04-05
StorageType : mtp
Userdata State : Encrypted
Autobackup titions
-preloader [0x00000000] 512 KB -> preloader.bin...0 Ok
-> Renaming Preloader.... preloader_oppo6771.bin
Creating Scatter file... C:UsersACERDesktophydra toolBackupAuto0788__102921104136MT6771_Android_scatter.txt
-pgpt [0x00000000] 32 KB -> pgpt.bin...0 Ok
-frp [0x07C88000] 1024 KB -> frp.bin...0 Ok
-nvdata [0x09D88000] 64 MB -> nvdata.bin...0 Ok
-protect1 [0x0FD88000] 8 MB -> protect1.bin...0 Ok
-protect2 [0x10588000] 10.469 MB -> protect2.bin...0 Ok
-persist [0x11800000] 48 MB -> persist.bin...0 Ok
-nvram [0x20D00000] 64 MB -> nvram.bin...0 Ok
Done!!!
C:UsersACERDesktophydra toolBackupAuto0788__102921104136
MTK Phone Loader is NOW RUNNING.
Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 1 4A792D6FA1C9AD68099A27F2B40DF53B
ERAM Size : 1 0x0000000000038000 -224 KB
IRAM Size : 1 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 150100444836444D42059A8F9092B4FD - DH6DMB
Reading GPT -EMMC [0x00008000] 130 Items
Reading System Info
ID : QP1A.190711.020
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6771-user 10 QP1A.190711.020 7604ad4e2b1328a1 release-keys
Display ID : QP1A.190711.020 release-keys
Security Patch : 2021-04-05
StorageType : mtp
Userdata State : Encrypted
-------------------------------------
Operation : Erase Userdata
Processing...
Formatting Userdata...
Action Result : Ok
Elapsed Time : 00:01:40