Code:
PreOperation Configuration
Brand : OPPO Model : A37F (Neo 9) Storage : Auto
Loader: 8916.mbn
Port : Auto
Connection : Flash Mode
Finding EDL Port..[COM112]
Getting device info.......
Serial No.: 0x2156DB7B
MSM ID : 0x007050E1
PBL Ver : 00000000
PK HASH : CC3153A80293939B90D02D3BF8B23E02
92E452FEF662C74998421ADAD42A380F
Firehose Loader[8916.mbn]
Initializing SaharaBoot... Ok
Sending .....Ok
Finding EDL Port..[COM112]
Connecting to Firehose...
Ping... Ok
Configuration......
Identifying Chip....Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8916
Version : 1
Running : Ok
Reading GPT[3]Ok
Phone Information.....
Model : A37f
Brand : OPPO
Android Ver : 5.1.1
Manufacturer : OPPO
Device :
Board : msm8916
Display ID : A37fEX_11_190711
Security Patch : 2018-03-01
Platform : msm8916
Kernel ID : 2018-03-01
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint :
ro_product_hardware :
sys_hardware_version :
======================================
Reading GPT[3]Ok
Operation : ScreenLock Security
Read Pattern
Processing...
Trying to search : gatekeeper.pattern.key
Trying to search : personalpattern.key
Trying to search : cm_gesture.key
Trying to search : gesture.key FOUND
Gesture Data : 2BF9A672D9942D31628DBB816484F8893E5D5779
Bruteforcing pattern hash..Please wait for few seconds
Pattern Code : 2145
1 2 3
4 5 6
7 8 9
Ok
All Done
======================================
Elapsed Time : 00:00:11