Asus Xo1AD (Zenefone Max M2 ZB633KL) successfully flashed by Hydra Tool
Screen Short:
Logs:
Screen Short:
Logs:
BRPreOperation Configuration
Brand : ASUS Model : X01AD (ZenFone Max M2 ZB633KL) Storage : Auto
Loader: asus_5_1.mbn
Port : Auto
Connection :
Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM3)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&201b4142&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/02/2017,2.1.2.7
Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8953
Version : 1
*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 822725784
Firmware Version : 7
Product Name : RX1BMB
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 61071360[29.121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Protocol : Universal
Running : Ok
Phone Information......
Brand : asus
Vendor : asus
Model : ASUS_X01AD
ID : WW_Phone-201905061022
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : msm8953_64-user 9 WW_Phone-201905061022 42 release-keys
Device : ASUS_X01A_1
Display ID : OPM1.WW_Phone-16.2018.1905.42-20190506
Security Patch : 2019-05-05
Emmc_size : 16GB
Fingerprint : asus/WW_X01AD/ASUS_X01A_1:9/WW_Phone-201905061022/16.2018.1905.42-20190506:user/release-keys
Reading GPT[3]
Drive [0] 68 Items
Drive [1] 0 Items
Drive [2] 0 Items
Formatting Userdata...
Method :
Auto
Processing...
- Formatting Userdata
Executing ...
- Formatting Userdata [Safe method] OkOkOk
Elapsed Time : 00:00:04
Mount Everest