Hydra Oppo A37m (Neo 9) Reading Pattern Code successfully read by Hydra Tool

Hydra Tool

Mount Everest

Friend's Martview
Dec 26, 2020
1,273
546
Kathmandu, Nepal
Oppo A37m (Neo 9) Reading Pattern Code successfully read by Hydra Tool

1. Run MTK module
2. Go to "Service"--> "Screen Lock Security"
3. Choose "Read Pattern" from Method / Option
4. Click "Execute"
5. Connect device with computer with USB data cable.
6. Wait until the operation is completed.

Screen Short:




Logs:

=====================================
Searching for MTK Device...Found
Port Identification :DA_HIGHSPEED_VCOM
FriendlyName :MediaTek DA USB VCOM (Android) (COM50)
SymbolicName :\??\USB#VID_0E8D&PID_2001#5&262ed807&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/03/2016,3.0.1504.0


Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : B58455513AC932376B49CCCDC4E52789
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003AB400000 -14.676 GB
eMMC CID : 90014A484147346132A51664610464ED - HAG4a2

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Brand : OPPO
Vendor : OPPO
Model : OPPO A37m
ID : LMY47I
SDK : 22
Release : 5.1
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Description : full_oppo6750_15127-user 5.1 LMY47I 1569840626 dev-keys
Device : A37
Board : full_oppo6750_15127
Display ID : A37m_11_A.31_190930
Platform : mt6750
FRPPST : /dev/block/platform/mtk-msdc.0/by-name/frp
Fingerprint : OPPO/A37m/A37:5.1/LMY47I/1520330081:user/release-keys
StorageType : mtp,mass_storage
Userdata State : Not Encrypted

-------------------------------------
Operation : Read Pattern
Processing...
Searching PatternKey : . Found
Gesture Data : 4F49BACD2B760D8C07B704E2F6249B455606C8DE
Bruteforcing pattern hash..Please wait for few seconds
Pattern Code : 124578
1 2 3
4 5 6
7 8 9

Ok

Elapsed Time : 00:00:06
Mount Everest[/B]
 
Top