Hydra Oppo F1s Pattern lock read code Without data loss by Hydra

Hydra Tool

sero408

Friend's Martview
Sep 26, 2021
893
92
türkiye
Oppo F1s Pattern lock read code Without data loss by Hydra
190400000802_HMTKTool.exe_FM_ScreenLock_Read_Pattern_11-30-2021-094108.jpeg

Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port_V1632 (COM4)
Device : 5&ae137ff&0&6
SymbolicName :??USB#VID_0E8D&PID_0003#5&ae137ff&0&6#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0

Opened handle..
Handshaking... Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0326 MT6750T [6755]
hw subcode : 8A00
hw version : CB00
sw version : 0001
Target config : 01
SBC : 01 (True)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)

Exploiting Device...
Exploit Sent..
Successfully Exploited...
Handshaking... Ok

--- ENABLE AUTO PREL DUMP ----
Found
D:GSM GADGETHydraTool_FullPackage_08-01-2021BackupPreloader_dumpprel.tmp
------------------------------

Handshaking...

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0326 MT6750T [6755]
hw subcode : 8A00
hw version : CB00
sw version : 0001
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)

MEID : 6CD6FB30DA47A2CA0CB78D8568884376
Stage 1.. [Size:219288]
Sending : Please wait.. Accepted

Identifying Protocol...
Protocol : New
Synchronization... SYNC
Preloader Initialization...
sing prel.tmp
Init : Accepted
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 4E6FE696DFF8F6EECD6694B19CBC58A4
ERAM Size : 0x0000000000038000 -224 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 90014A484247346132A40AEB44F78365 - HBG4a2
Executing : ACCEPTED...

Reading GPT -EMMC [0x00008000] 130 Items

Reading System Info
Brand : OPPO
Vendor : OPPO
Model : A1601
ID : LMY47I
SDK : 22
Release : 5.1
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Description : full_oppo6750_15331-user 5.1 LMY47I 1562665575 release-keys
Device : A1601
Board : full_oppo6750_15331
Display ID : A1601EX_11_A.40_190709
Security Patch : 2018-01-05
Platform : mt6750
FRPPST : /dev/block/platform/mtk-msdc.0/by-name/frp
StorageType : mtp,mass_storage
Userdata State : Not Encrypted

Autobackup titions
-preloader [0x00000000] 512 KB -> preloader.bin...0 Ok
-> Renaming Preloader.... preloader_oppo6750_15131.bin
Creating Scatter file... D:GSM GADGETHydraTool_FullPackage_08-01-2021BackupAuto0326__113021093808MT6750T_Android_scatter.txt
-pgpt [0x00000000] 32 KB -> pgpt.bin...0 Ok
-frp [0x03F88000] 1024 KB -> frp.bin...0 Ok
-nvdata [0x04088000] 32 MB -> nvdata.bin...0 Ok
-protect1 [0x08088000] 8 MB -> protect1.bin...0 Ok
-protect2 [0x08888000] 15.469 MB -> protect2.bin...0 Ok
-nvram [0x0CF00000] 5 MB -> nvram.bin...0 Ok
Done!!!
D:GSM GADGETHydraTool_FullPackage_08-01-2021BackupAuto0326__113021093808
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 1 4E6FE696DFF8F6EECD6694B19CBC58A4
ERAM Size : 1 0x0000000000038000 -224 KB
IRAM Size : 1 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 90014A484247346132A40AEB44F78365 - HBG4a2

Reading GPT -EMMC [0x00008000] 130 Items


Reading System Info
Brand : OPPO
Vendor : OPPO
Model : A1601
ID : LMY47I
SDK : 22
Release : 5.1
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Description : full_oppo6750_15331-user 5.1 LMY47I 1562665575 release-keys
Device : A1601
Board : full_oppo6750_15331
Display ID : A1601EX_11_A.40_190709
Security Patch : 2018-01-05
Platform : mt6750
FRPPST : /dev/block/platform/mtk-msdc.0/by-name/frp
StorageType : mtp,mass_storage
Userdata State : Not Encrypted

-------------------------------------
Operation : Read Pattern
Processing...
Searching PatternKey : .0 Found
Gesture Data : B86056C615A37D86E0B3359C8B00EEB7B28D6CCF
Bruteforcing pattern hash..Please wait for few seconds
Pattern Code : 123654
1 2 3
4 5 6
7 8 9
Action Result : Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:03:32
 
  • Like
Reactions: Dongle User
Top