Vovo Y15 (PD1304CW) Zero wipe FRP successfully Done by Hydra Tool

Mount Everest

Friend's Martview
Dec 26, 2020
1,273
546
Kathmandu, Nepal
Vovo Y15 (PD1304CW) Zero wipe FRP successfully Done by Hydra Tool

Screen Short:



Logs:

=====================================
Searching for MTK Device...Found
Port Identification :Flashmode Preloader
FriendlyName :MediaTek PreLoader USB VCOM_V1632 (Android) (COM40)
SymbolicName :\??\USB#VID_0E8D&PID_2000#6&17b57f57&0&7#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0


Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : A50BCDC423F869DAC0D942ECCFA2C308
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000030000000 -768 MB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 150100474436424D4201381F90EF5665 - GD6BMB

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Brand : vivo
Vendor : vivo
Model : vivo 1901
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_k62v1_64_bsp-user 9 PPR1.180610.011 compiler12011624 release-keys
Device : PD1901BF_EX
Display ID : PPR1.180610.011 release-keys
Security Patch : 2019-11-05
Platform : =MTK6765
Fingerprint : vivo/1901/1901:9/PPR1.180610.011/compiler12011624:user/release-keys
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition... Ok

Elapsed Time : 00:00:03
BR
Mount Everest

 
  • Like
Reactions: GsmToto
Top