HYDRA Redmi 6A Mi Account Remove With Hdyra Tool (1 Viewer)

unlockinfo

Deneyimli Üye
Deneyimli Üye
Kayıtlı Kullanıcı
Redmi 6A Mi Account Remove with Hdyra Tool


- Keep Press Boot Info

Kod:
-------------------------------------------------------
To Enable BROM  Mode :
     Method 1    - Bootkey (Vol + - Power) or any combination
     Method 2    - Enable Preloader to brom(crashing Method)
     Method 3    - Test Point Data0 + ground
To Enable Preloader  Mode :
     Method 1    - Just Insert cable
-------------------------------------------------------

Searching for MTK Device...Found
  MTK Port Type   : Flashmode BROM
  FriendlyName    : MediaTek USB Port_V1632 (COM10)
  Device          : /5&ebe48c4&0&3
  SymbolicName    : \\?\usb#vid_0e8d&pid_0003#5&ebe48c4&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 01/22/2015,3.0.1504.0
  Service         : wdm_usb

Openning Port [COM10] Ok
Handshaking...Ok
  HwCode          : 0766 {MT6765/MT8768t}
  Hwver           : 0000
  Target config   : E7
  SBC             : 01 (True)
  SLA             : 02 (True)
  DAA             : 04 (True)
  SWJTAG          : 06 (True)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 20 (True)
  MEMWRITE        : 40 (True)
  CMD_C8          : 80 (True)
  Connection      : BROM
  HW Subcode      : 8A00
  HW Subcode      : CA00
  SW Ver          : 0000
  ME_ID           : 97E446E48B0245B503158DFA0679FBE1
  SOC_ID          : 8A3B1D5E083BB3B242C91F4B15BA3034E773A315347A9C1513F0F6340826D77C

Exploiting Device...
Successfully Exploited..
Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..Found @ 0x00200BC4
Starting to dump...
Prel Size : 0x00039370
Successfully dump preloader..  [C:\Hydra Tool\Boot\PreloaderDump\preloader_cactus.bin]
  Target config   : 00
  SBC             : 00 (False)
  SLA             : 00 (False)
  DAA             : 00 (False)
  SWJTAG          : 00 (False)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 00 (False)
  MEMWRITE        : 00 (False)
  CMD_C8          : 00 (False)
  Connection      : BROM

Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin]
Patching da2 ... Ok
Uploading Stage 1....
Successfully uploaded stage 1, jumping ..
Executing JUMP_DA Address @ 0x00200000
Jumping to 0x00200000 Ok 0xC0
Successfully received DA sync
  ONNECTION_AGENT : brom
  DRAM config needed for : 90014A4841473461
Sending auto preloader from dump...  [preloader_cactus.bin]
Sending emi data.. [DRAM setup passed.]
Sending emi data succeeded.
Uploading stage 2...
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
  ERAM Size       : 0x000000000003A000-232 KB
  IRAM Size       : 0x0000000080000000-2 GB
  EMMC Boot1 Size : 0x0000000000400000-4 MB
  EMMC Boot2 Size : 0x0000000000400000-4 MB
  EMMC RPMB Size  : 0x0000000000400000-4 MB
  EMMC USER Size  : 0x00000003AB400000-14,676 GB
  EMMC CID        : 90014A484147346132A53A369E62B54B - HAG4a2
  HW-CODE         : 0x766
  HWSUB-CODE      : 0x8A00
  HW-VERSION      : 0xCA00
  SW-VERSION      : 0x0
  CHIP-EVOLUTION  : 0x0
  DA-VERSION      : 1.0
  Speed           : high-speed
Upload data was accepted. Jumping to stage 2...
DA Extensions successfully added
Reading Partition Table ..
Partition Count : 43
--------------- Reading build.prop content ---------------
  Brand          : xiaomi
  Model          : Redmi 6A
  Product        : cactus
  ID             : PPR1.180610.011
  SDK            : 28
  Release        : 9
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Locale         : en-GB
  Description    : cactus-user 9 PPR1.180610.011 V11.0.8.0.PCBMIXM release-keys
  Device         : cactus
  Display ID     : SW_S98506AE1_V009_M13_XM_C3C_USR
  Security Patch : 2020-05-01
  Fingerprint    : xiaomi/cactus/cactus:9/PPR1.180610.011/V11.0.8.0.PCBMIXM:user/release-keys
  StorageType    : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
IMEI1 : 3585**********
IMEI2 : 3585**********
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------
Backing up Security..
- preloader(preloader.bin), 512 KB                    = Ok  [preloader_cactus.bin]
  *Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0766_97E446D38B0245B503158DFA0679FBE1\Auto\0707233214827\6765_Android_scatter.txt
- pgpt(pgpt.bin), 32 KB                               = Ok
- nvram(nvram.bin), 64 MB                             = Ok
- nvdata(nvdata.bin), 64 MB                           = Ok
- frp(frp.bin), 1024 KB                               = Ok
- protect1(protect1.bin), 8 MB                        = Ok
- protect2(protect2.bin), 9,469 MB                    = Ok
- persist(persist.bin), 64 MB                         = Ok
- proinfo(proinfo.bin), 3 MB                          = Ok
- nvcfg(nvcfg.bin), 32 MB                             = Ok
- sec1(sec1.bin), 2 MB                                = Ok
- seccfg(seccfg.bin), 8 MB                            = Ok
- lk(lk.bin), 1024 KB                                 = Ok
Backup Done!!!

Elapsed Time : 00:00:40




- Remove Mi Account Patch Method
Kod:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                      Service Function
                           Xiaomi
              Remove MiAccount [Patch Method]
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching for MTK Device...Found
  MTK Port Type   : Flashmode BROM
  FriendlyName    : MediaTek USB Port_V1632 (COM10)
  Device          : /5&ebe48c4&0&3
  SymbolicName    : \\?\usb#vid_0e8d&pid_0003#5&ebe48c4&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 01/22/2015,3.0.1504.0
  Service         : wdm_usb

Openning Port [COM10] Ok
Handshaking...Ok
  HwCode          : 0766 {MT6765/MT8768t}
  Hwver           : 0000
  Target config   : E7
  SBC             : 01 (True)
  SLA             : 02 (True)
  DAA             : 04 (True)
  SWJTAG          : 06 (True)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 20 (True)
  MEMWRITE        : 40 (True)
  CMD_C8          : 80 (True)
  Connection      : BROM
  HW Subcode      : 8A00
  HW Subcode      : CA00
  SW Ver          : 0000
  ME_ID           : 97E446E48B0245B503158DFA0679FBE1
  SOC_ID          : 8A3B1D5E083BB3B242C91F4B15BA3034E773A315347A9C1513F0F6340826D77C

Exploiting Device...
Successfully Exploited..
Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..Found @ 0x00200BC4
Starting to dump...
Prel Size : 0x00039370
Successfully dump preloader..  [C:\Hydra Tool\Boot\PreloaderDump\preloader_cactus.bin]
  Target config   : 00
  SBC             : 00 (False)
  SLA             : 00 (False)
  DAA             : 00 (False)
  SWJTAG          : 00 (False)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 00 (False)
  MEMWRITE        : 00 (False)
  CMD_C8          : 00 (False)
  Connection      : BROM

Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin]
Patching da2 ... Ok
Uploading Stage 1....
Successfully uploaded stage 1, jumping ..
Executing JUMP_DA Address @ 0x00200000
Jumping to 0x00200000 Ok 0xC0
Successfully received DA sync
  ONNECTION_AGENT : brom
  DRAM config needed for : 90014A4841473461
Sending auto preloader from dump...  [preloader_cactus.bin]
Sending emi data.. [DRAM setup passed.]
Sending emi data succeeded.
Uploading stage 2...
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
  ERAM Size       : 0x000000000003A000-232 KB
  IRAM Size       : 0x0000000080000000-2 GB
  EMMC Boot1 Size : 0x0000000000400000-4 MB
  EMMC Boot2 Size : 0x0000000000400000-4 MB
  EMMC RPMB Size  : 0x0000000000400000-4 MB
  EMMC USER Size  : 0x00000003AB400000-14,676 GB
  EMMC CID        : 90014A484147346132A53A369E62B54B - HAG4a2
  HW-CODE         : 0x766
  HWSUB-CODE      : 0x8A00
  HW-VERSION      : 0xCA00
  SW-VERSION      : 0x0
  CHIP-EVOLUTION  : 0x0
  DA-VERSION      : 1.0
  Speed           : high-speed
Upload data was accepted. Jumping to stage 2...
DA Extensions successfully added
Reading Partition Table ..
Partition Count : 43
--------------- Reading build.prop content ---------------
  Brand          : xiaomi
  Model          : Redmi 6A
  Product        : cactus
  ID             : PPR1.180610.011
  SDK            : 28
  Release        : 9
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Locale         : en-GB
  Description    : cactus-user 9 PPR1.180610.011 V11.0.8.0.PCBMIXM release-keys
  Device         : cactus
  Display ID     : SW_S98506AE1_V009_M13_XM_C3C_USR
  Security Patch : 2020-05-01
  Fingerprint    : xiaomi/cactus/cactus:9/PPR1.180610.011/V11.0.8.0.PCBMIXM:user/release-keys
  StorageType    : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
IMEI1 : 3585***********
IMEI2 : 3585***********
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------
Backing up Security..
- preloader(preloader.bin), 512 KB                    = Ok  [preloader_cactus.bin]
  *Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0766_97DD6E48B0245B503158DFA0679FBE1\Auto\0110723213907\6765_Android_scatter.txt
- pgpt(pgpt.bin), 32 KB                               = Ok
- nvram(nvram.bin), 64 MB                             = Ok
- nvdata(nvdata.bin), 64 MB                           = Ok
- frp(frp.bin), 1024 KB                               = Ok
- protect1(protect1.bin), 8 MB                        = Ok
- protect2(protect2.bin), 9,469 MB                    = Ok
- persist(persist.bin), 64 MB                         = Ok
- proinfo(proinfo.bin), 3 MB                          = Ok
- nvcfg(nvcfg.bin), 32 MB                             = Ok
- sec1(sec1.bin), 2 MB                                = Ok
- seccfg(seccfg.bin), 8 MB                            = Ok
- lk(lk.bin), 1024 KB                                 = Ok
Backup Done!!!
------------------------------
   Xiaomi Operation Flash Mode..
------------------------------
Backing up Security..
persist... Ok
vbmeta... Ok
Patching Persist

Scanning Patching address...Please wait...
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
Total Items patched : 2
Successfully patched address..
-persist .....Ok
Done Writing...
Status:  Ok

Action Result :  Ok

Elapsed Time : 00:04:26
 
Üst