GSM Shop GSM Shop
GSM-Forum  

Welcome to the GSM-Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features.
Only registered members may post questions, contact other members or search our database of over 8 million posts.

Registration is fast, simple and absolutely free so please - Click to REGISTER!

If you have any problems with the registration process or your account login, please contact contact us .

Go Back   GSM-Forum > Product Support Sections > Special Solutions / Services / WebShop > GSMFABRICA Products > HYDRA TOOL


Reply
 
LinkBack Thread Tools Display Modes
Old 09-06-2022, 12:34   #1 (permalink)
No Life Poster
 
malka4u's Avatar
 
Join Date: Aug 2011
Location: bagmati pradesh
Posts: 3,298
Member: 1626780
Status: Offline
Thanks Meter: 1,275
Failed to decode pattern.Failed oppo a37


Hydra Qualcomm Tool Ver 1.0.3.50
Windows 10 (Version 1903, OS Build 18362.30, 64-bit Edition)
Intel(R) Core(TM) i3-9100F CPU @ 3.60GHz
NVIDIA GeForce GT 710
Ram Installed : 8 GB
Windows Access Right : Admin
Software Run As Admnistrator


PreOperation Configuration
Brand : OPPO Model : A33 2020 (CPH2137) Storage : Auto
Loader: c:\hydra tool\hfirehose\007050e10029001e_cc3153a80293939b_a e162be1_asus_qualcomm_peek_8916.fhprg
Port : Auto

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM14)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&53c06f5&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :05/29/2019,2.1.3.7

Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok
Configuration.......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8916
Version : 1


Protocol : Universal
Running : Ok

Reading GPT[3]
Drive [0] 40 Items
Drive [1] 0 Items
Drive [2] 4 Items


Phone Information.....
Brand : OPPO
Vendor : OPPO
Model : A37f
ID : LMY47V
SDK : 22
Release : 5.1.1
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Description : msm8916_64-user 5.1.1 LMY47V eng.root.20190711.032745 release-keys
Board : msm8916
Display ID : A37fEX_11_190711
Security Patch : 2018-03-01
Platform : msm8916
FRPPST : /dev/block/bootdevice/by-name/config

Operation : ScreenLock Security
Read Pattern
Processing...
Trying to search : gatekeeper.pattern.key
Trying to search : personalpattern.key
Trying to search : cm_gesture.key
Trying to search : gesture.key FOUND
Gesture Data : 856DB02FF09312E1214274219C38120CC4F15ECE
Bruteforcing pattern hash..Please wait for few seconds
Failed to decode pattern.Failed

Elapsed Time : 00:00:02


Hydra Qualcomm Tool Ver 1.0.3.50
Windows 10 (Version 1903, OS Build 18362.30, 64-bit Edition)
Intel(R) Core(TM) i3-9100F CPU @ 3.60GHz
NVIDIA GeForce GT 710
Ram Installed : 8 GB
Windows Access Right : Admin
Software Run As Admnistrator



PreOperation Configuration
Brand : OPPO Model : A33 2020 (CPH2137) Storage : Auto
Loader: c:\hydra tool\hfirehose\007050e10029001e_cc3153a80293939b_a e162be1_asus_qualcomm_peek_8916.fhprg
Port : Auto

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM14)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&53c06f5&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :05/29/2019,2.1.3.7

Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok
Configuration.......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8916
Version : 1


Protocol : Universal
Running : Ok

Reading GPT[3]
Drive [0] 40 Items
Drive [1] 0 Items
Drive [2] 4 Items


Phone Information.....
Brand : OPPO
Vendor : OPPO
Model : A37f
ID : LMY47V
SDK : 22
Release : 5.1.1
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Description : msm8916_64-user 5.1.1 LMY47V eng.root.20190711.032745 release-keys
Board : msm8916
Display ID : A37fEX_11_190711
Security Patch : 2018-03-01
Platform : msm8916
FRPPST : /dev/block/bootdevice/by-name/config

Operation : ScreenLock Security
Remove Lock Without Data Loss
Processing... ..
Searching possible patching addressFailed

Elapsed Time : 00:00:02
  Reply With Quote
Old 09-10-2022, 05:34   #2 (permalink)
Product Supporter
 
Hydra Supporter's Avatar
 
Join Date: Jan 2021
Location: ... Heart ...
Posts: 570
Member: 2977290
Status: Offline
Thanks Meter: 703
hello,try with select model and boot/info.
  Reply With Quote
Old 09-10-2022, 07:03   #3 (permalink)
Product Manager
 
Hydra Tool's Avatar
 
Join Date: Aug 2018
Location: Ukraine / Harkov
Posts: 1,986
Member: 2857401
Status: Offline
Thanks Meter: 6,861
Hello,

You Userdata is not Encrypted, You can using Read Pattern Function,
Please post feedback with a clear screen shot, Thank you.

Best Regards | Hydra Team
  Reply With Quote
Old 09-10-2022, 07:39   #4 (permalink)
No Life Poster
 
Gsm-Ahmed's Avatar
 
Join Date: Jan 2020
Location: Algeria
Posts: 814
Member: 2944109
Status: Offline
Thanks Meter: 657
required model is A37
and you choose model A33 2020 (CPH2137)
select the right model bro ... good luck
  Reply With Quote
Reply

Bookmarks


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


 



All times are GMT +1. The time now is 14:22.



Powered by Searchlight © 2024 Axivo Inc.
vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2024 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2023 -
Page generated in 0.19240 seconds with 8 queries

SEO by vBSEO