OPPO A37F (Neo 9) Screen Lock Security Hydra Tool

YuSuF02

Active Member
May 20, 2020
34
5
İstanbul
14440
Code:
PreOperation Configuration
 Brand : OPPO Model : A37F (Neo 9) Storage : Auto
 Loader: 8916.mbn
 Port  : Auto
 Connection  : Flash Mode

Finding EDL Port..[COM112]
Getting device info.......
Serial No.: 0x2156DB7B
MSM ID    : 0x007050E1
PBL Ver   : 00000000
PK HASH   : CC3153A80293939B90D02D3BF8B23E02
            92E452FEF662C74998421ADAD42A380F
 
Firehose Loader[8916.mbn]
Initializing SaharaBoot... Ok
Sending .....Ok

Finding EDL Port..[COM112]
Connecting to Firehose...
Ping... Ok
Configuration......
Identifying Chip....Ok
Chip Configuration :
 MemoryName : eMMC
 MaxPayloadSizeToTargetInBytes : 16384
 MaxPayloadSizeToTargetInBytesSupported : 16384
 MaxPayloadSizeFromTargetInBytes : 4096
 MaxXMLSizeInBytes : 4096
 TargetName : 8916
 Version : 1

Running : Ok
 
Reading GPT[3]Ok
Phone Information.....
  Model : A37f
  Brand : OPPO
  Android Ver : 5.1.1
  Manufacturer : OPPO
  Device :
  Board : msm8916
  Display ID : A37fEX_11_190711
  Security Patch : 2018-03-01
  Platform : msm8916
  Kernel ID : 2018-03-01
  FRPPST : /dev/block/bootdevice/by-name/config
  Fingerprint :
  ro_product_hardware :
  sys_hardware_version :

======================================
Reading GPT[3]Ok
Operation : ScreenLock Security
Read Pattern
Processing...
Trying to search : gatekeeper.pattern.key
Trying to search :  personalpattern.key
Trying to search : cm_gesture.key
Trying to search : gesture.key FOUND
Gesture Data : 2BF9A672D9942D31628DBB816484F8893E5D5779
Bruteforcing pattern hash..Please wait for few seconds
Pattern Code : 2145
1 2 3
4 5 6
7 8 9

 
Ok
All Done
======================================

Elapsed Time : 00:00:11
 
Top