Oppo A37F Read Pattern One Click With by Hydra Tool
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Qualcomm Service Tool
Format/Factory Reset
Read Pattern
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
PreOperation Configuration
Brand : AUTO Model : AUTO Storage : Auto
Loader: Auto
Port : Auto
Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM8)
SymbolicName :\\?\usb#vid_05c6&pid_9008#6&df2ee03&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :07/08/2015,2.1.2.0
Getting device info......
Serial No.: 0x26DDE7B0
HW_ID : 007050E100000000
MSM ID : 0x007050E1, MSM8916-Qualcomm Snapdragon 410 /HAAAANAZA
MODEL_ID : 0x0000
OEM_ID : 0x0000 - QUALCOMM
PBL Ver : 00000000
PK HASH : cc3153a80293939b90d02d3bf8b23e0292e452fef662c74998421adad42a380f
Hydra Enable Auto search Firehose..
#Please wait...
#Search by filename filter.....
#Found 1 Compatible Files..Found match Firehose...
Firehose Loader[007050e10029001e_cc3153a80293939b_ae162be1_asus_qualcomm_peek_8916.fhprg]
--------------------------------------------------
Header Type : OLD
TargetMSM : 8916
Tag : _peek
Version : 3
Code_size : 96
Signature_size : 256
fhVendor : QUALCOMM
HW_ID : 007050E10029001E
Vendor : ASUS
OEM_ID : 0029
MODEL_ID : 001E
SW_ID : 0000000000000003
APP_ID :
pk_hash : cc3153a80293939b90d02d3bf8b23e0292e452fef662c74998421adad42a380f
OEM_VERSION :
IMAGE_VARIANT :
QC_VERSION :
--------------------------------------------------
SaharaBoot... Ok
Sending .....Ok
Connecting to Firehose...
Ping... Ok
Configuration.......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8916
Version : 1
Protocol : Universal
Running : Ok
Reading GPT[3]
Drive [0] 40 Items
Drive [1] 0 Items
Drive [2] 4 Items
Phone Information.....
Brand : OPPO
Vendor : OPPO
Model : A37f
Product : A37f
Manufacturer : OPPO
ID : LMY47V
SDK : 22
Release : 5.1.1
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Description : msm8916_64-user 5.1.1 LMY47V eng.root.20180817.014458 release-keys
Display ID : A37fEX_11_180817
Security Patch : 2018-03-01
Platform : msm8916
FRPPST : /dev/block/bootdevice/by-name/config
Backup Security partitions...
Reading Security Items....
- modemst1(modemst1.bin), 1,5 MB = Ok
- modemst2(modemst2.bin), 1,5 MB = Ok
- fsg(fsg.bin), 1,5 MB = Ok
- fsc(fsc.bin), 512 Bytes = Ok
C:\Hydra Tool\Backup\QUALBackup\QUALCOMM\007050E100000000_26DDE7B0\Security_Backup\041923130257.sec
Backup Security Success....
Trying to search : gatekeeper.pattern.key
Trying to search : personalpattern.key
Trying to search : cm_gesture.key
Trying to search : gesture.key FOUND
Gesture Data : 8E9D7E8E6BC4E77529D93115D84F65D6C7008261
Bruteforcing pattern hash..Please wait for few seconds
Pattern Code : 1258
1 2 3
4 5 6
7 8 9
Rebooting Phone.... Ok
Action Result : Ok
Elapsed Time : 00:00:34