GSM Shop GSM Shop
GSM-Forum  

Welcome to the GSM-Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features.
Only registered members may post questions, contact other members or search our database of over 8 million posts.

Registration is fast, simple and absolutely free so please - Click to REGISTER!

If you have any problems with the registration process or your account login, please contact contact us .

Go Back   GSM-Forum > Product Support Sections > Special Solutions / Services / WebShop > GSMFABRICA Products > HYDRA TOOL


Reply
 
LinkBack Thread Tools Display Modes
Old 08-11-2020, 18:13   #1 (permalink)
No Life Poster
 
ghacks's Avatar
 
Join Date: Dec 2009
Location: ***** Taste Good
Age: 39
Posts: 4,066
Member: 1196914
Status: Offline
Sonork: 100.1667938
Thanks Meter: 1,645
Donate money to this user
Angry ZTE Z983 pattern cannot rmeove [Answered]


Hydra Qualcomm Tool Ver 1.0.2 Build 5
Windows 10 (Version 10.0, Build 18362, 64-bit Edition)
Intel(R)Core(TM) i7-2640M CPU @ 2.80GHz
Intel(R) HD Graphics 3000
Ram Installed : 16 GB
Windows Access Right Admin
******* Dongle Info *******
Version : Hydra Tool v 1.1
Serial : 190300000558
Initialize : OKAY
Status : Activated
Life : 0 [2-0-1-0-0]

PreOperation Configuration
Brand : ZTE Model : Blade X MAX Z983 Storage : Auto
Loader: Z983_ZTE_6_1.mbn
Port : Auto
Connection : Flash Mode

Searching EDL Port..[COM33]
TPortConnection.Create...(COM33)..Opening...Ok
Getting device info.......
Serial No.: 0xE22BE98F
MSM ID : 0x0006B0E1, MSM8940-Qualcomm Snapdragon 435
PBL Ver : 00000000
PK HASH : 5FE8A3597F29751F57BD95A8515DE5D6
C8677486DECE8D1FCD54B6A9D675FE76

Firehose Loader[Z983_ZTE_6_1.mbn]
Initializing SaharaBoot... Ok
Sending .....................Ok

Connecting to Firehose...
Ping... Ok
Configuration......
Identifying Chip....Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 929879176
Firmware Version : 7
Product Name : QX13MB
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 61071360[29.121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Running : Ok

Reading GPT[3], Partitions(48 Items) Ok
Phone Information.....
Model : Z983
Brand : ZTE
Android Ver : 7.1.1
Manufacturer : ZTE
Device : stollen
Board : stollen
Display ID : Z983V1.9.23
Security Patch : 2018-08-01
Platform : msm8937
Kernel ID : 2018-08-01
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : ZTE/Z983/stollen:7.1.1/NMF26F/20180815.140527:user/release-keys
ro_product_hardware :
sys_hardware_version :

Reading GPT[3], Partitions(48 Items) Ok
Operation : ScreenLock Security
Remove Lock Without Data Loss
Processing...
Encrypted userdata found.
You may disable Keyguard to bypass lock.
Failed

Elapsed Time : 00:00:09


TPortConnection.Destroy.....Closing...Ok..

Hydra Qualcomm Tool Ver 1.0.2 Build 5
Windows 10 (Version 10.0, Build 18362, 64-bit Edition)
Intel(R)Core(TM) i7-2640M CPU @ 2.80GHz
Intel(R) HD Graphics 3000
Ram Installed : 16 GB
Windows Access Right Admin
******* Dongle Info *******
Version : Hydra Tool v 1.1
Serial : 190300000558
Initialize : OKAY
Status : Activated
Life : 0 [2-0-1-0-0]

PreOperation Configuration
Brand : ZTE Model : Blade X MAX Z983 Storage : Auto
Loader: Z983_ZTE_6_1.mbn
Port : Auto
Connection : Flash Mode

Searching EDL Port..[COM33]
TPortConnection.Create...(COM33)..Opening...Ok
Getting device info.......
Serial No.: 0xE22BE98F
MSM ID : 0x0006B0E1, MSM8940-Qualcomm Snapdragon 435
PBL Ver : 00000000
PK HASH : 5FE8A3597F29751F57BD95A8515DE5D6
C8677486DECE8D1FCD54B6A9D675FE76

Firehose Loader[Z983_ZTE_6_1.mbn]
Initializing SaharaBoot... Ok
Sending .....................Ok

Connecting to Firehose...
Ping... Ok
Configuration......
Identifying Chip....Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 929879176
Firmware Version : 7
Product Name : QX13MB
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 61071360[29.121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Running : Ok

Reading GPT[3], Partitions(48 Items) Ok
Phone Information.....
Model : Z983
Brand : ZTE
Android Ver : 7.1.1
Manufacturer : ZTE
Device : stollen
Board : stollen
Display ID : Z983V1.9.23
Security Patch : 2018-08-01
Platform : msm8937
Kernel ID : 2018-08-01
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : ZTE/Z983/stollen:7.1.1/NMF26F/20180815.140527:user/release-keys
ro_product_hardware :
sys_hardware_version :

Reading GPT[3], Partitions(48 Items) Ok
Operation : ScreenLock Security
Read Pattern
Processing...
Encrypted userdata found.
You may disable Keyguard to bypass lock.
Failed

Elapsed Time : 00:00:09


TPortConnection.Destroy.....Closing...Ok..
  Reply With Quote
Old 08-11-2020, 21:21   #2 (permalink)
Product Manager
 
Hydra Tool's Avatar
 
Join Date: Aug 2018
Location: Ukraine / Harkov
Posts: 1,986
Member: 2857401
Status: Offline
Thanks Meter: 6,861
Hello,

Please follow log error,

Quote:
Encrypted userdata found.
You may disable Keyguard to bypass lock.
Best Regards | Hydra Team
  Reply With Quote
Reply

Bookmarks


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


 



All times are GMT +1. The time now is 00:51.



Powered by Searchlight © 2024 Axivo Inc.
vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2024 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2023 -
Page generated in 0.16682 seconds with 8 queries

SEO by vBSEO