Ausu X00BD Zero Wipe FRP successfully Done by Hydra Tool

Mount Everest

Friend's Martview
Dec 26, 2020
1,273
546
Kathmandu, Nepal
Ausu X00BD Zero Wipe FRP successfully Done by Hydra Tool

Screen Short:



Logs:

PreOperation Configuration
Brand : AUTO Model : AUTO Storage : Auto
Loader: Auto
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM7)
SymbolicName :\??\USB#VID_05C6&PID_9008#6&1e3c5ed9&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :05/18/2016,2.0.6.725

Getting device info.....
Serial No.: 0x0C2C5A90
MSM ID : 0x008140E1, MSM8212-Qualcomm Snapdragon 200
PBL Ver : 00000000
PK HASH : 5F62A3F033BF45346C15E1CC7B31D4E1
ADFFDF641BDF618B09D44AD075029AD1

Firehose Loader[asus_3_6.mbn]
SaharaBoot... Ok
Sending ....Ok
Connecting to Firehose...
Ping... Ok
Configuration.......
Identifying Chip..........eMMC
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 49152
MaxPayloadSizeToTargetInBytesSupported : 49152
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8x10
Version : 1


Protocol : Universal
Running : Ok

Phone Information.....
Brand : asus
Vendor : asus
Model : ASUS_X00BD
ID : LMY47V
SDK : 22
Release : 5.1.1
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Description : msm8610-user 5.1.1 LMY47V LMY47V.WW_Phone.12.0.0.0129-20170207_user release-keys
Device : ASUS_X00BD_1
Board : MSM8610
Display ID : LMY47V.WW_Phone.12.0.0.0129-20170207_user
Security Patch : 2017-01-01
Platform : msm8610
FRPPST : /dev/block/bootdevice/by-name/persistent
Fingerprint : asus/WW_Phone/ASUS_X00BD_1:5.1.1/LMY47V/12.0.0.0129:user/release-keys

Reading GPT[1]
Drive [0] 48 Items

Removing FRPta...
Method :
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] Ok
- Removing FRP [Zero Wipe] OkOk
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] Ok
- Removing FRP [Zero Wipe] OkOkOk

Elapsed Time : 00:00:10
BR
Mount Everest

 
Top