Hydra Wiko V3913 (Kenny) FRP successfully removed by Hydra Tool

Hydra Tool

Mount Everest

Friend's Martview
Dec 26, 2020
1,273
546
Kathmandu, Nepal
Wiko V3913 (Kenny) FRP successfully removed by Hydra Tool

Screen Short:



Logs:
Brand : WIKO Model : V3913 (Kenny) Connection : Flash Mode

=====================================
Connection
-Please wait...
-Connect Phone...
-Found...
-PreLoader...[COM13]

TPortConnection.Create...(COM13)..Opening...Ok

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0335 (0000)MT6737[6735]
BROM HW_SW_VER : 8A00 CA00 0000 0000

Handshaking...

Identifying Hardware ID.....
BROM CPUID : 0335 (0000)MT6737[6735]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
SECURE VERSION : 00
BL VERSION : 00
BR Secured : 00
NORMAL BOOT

Preparing Download Agent..
DA : 6735_SWSEC_Wiko.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.00.00
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : Old - eMMC
00000000000000000000
PRMMCCID : 460001154D32584EB2E80642A7B2CAF2
Init Configuration
Running DA 4.2 on BBID : 0x9B Ok

Initializing Loader [2]
Sending Loader [2] Accepted
Reading Flashchip data....
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000080000 -512 KB
eMMC USER : 0x00000001D2000000 -7,281 GB
ERAM Size : 0x0000000040000000 -1024 MB
IRAM Size : 0x0000000000020000 -128 KB
UNICAL RID : 20DB4AF6C8687B99898119E16D9363ED
eMMC CID : 460001154D32584EB2E80642A764CAF2
Change to HIGH SPEED...
5A
Connection
-Please wait...
-Found...[COM21]


Reading Partition Table
SIZE[0x00000898] 25 Items > Done

Reading System Info
Brand : WIKO
Vendor : WIKO
Model : KENNY
ID : NRD90M
SDK : 24
Release : 7.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Description : full_v3913-user 7.0 NRD90M 1488199004 release-keys
Device : v3913
Display ID : alps-mp-n0.mp1-V1.0.2_tinno6737m.35.n_P182
Security Patch : 2017-07-05
Platform : mt6737m
FRPPST : /dev/block/platform/mtk-msdc.0/11230000.msdc0/by-name/frp
Fingerprint : WIKO/v3913/v3913:7.0/NRD90M/1488199004:user/release-keys
StorageType : mtp
Userdata State : Not Encrypted

Autobackup Partitions
-preloader[0x00000000] 512 KB -> preloader.bin...Ok
-> Renaming Preloader.... preloader_v3913.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\WIKO_KENNY_0335-mt6737m-7.0_alps-mp-n0.mp1-V1.0.2_tinno6737m.35.n_P182_040221142055\MT6737_Android_scatter.txt
-nvram[0x00380000] 5 MB -> nvram.bin...Ok
-frp[0x07E00000] 1024 KB -> frp.bin...Ok
-nvdata[0x07F00000] 32 MB -> nvdata.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\WIKO_KENNY_0335-mt6737m-7.0_alps-mp-n0.mp1-V1.0.2_tinno6737m.35.n_P182_040221142055
MTK Phone Loader is NOW RUNNING.


Reading System Info
Brand : WIKO
Vendor : WIKO
Model : KENNY
ID : NRD90M
SDK : 24
Release : 7.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Description : full_v3913-user 7.0 NRD90M 1488199004 release-keys
Device : v3913
Display ID : alps-mp-n0.mp1-V1.0.2_tinno6737m.35.n_P182
Security Patch : 2017-07-05
Platform : mt6737m
FRPPST : /dev/block/platform/mtk-msdc.0/11230000.msdc0/by-name/frp
Fingerprint : WIKO/v3913/v3913:7.0/NRD90M/1488199004:user/release-keys
StorageType : mtp
Userdata State : Not Encrypted

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition... [Ok] Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:18
BR
Mount Everest
 
Top