HYDRA Redmi 7A (Pine) Mi Account Remove With Hydra Tool (1 Viewer)

unlockinfo

Deneyimli Üye
Deneyimli Üye
Kayıtlı Kullanıcı
Redmi 7A (pine) Mi Account Remove with Hydra Tool



- keep press boot info


Kod:
PreOperation Configuration
Brand : XIAOMI Model : Redmi 7A (pine) Storage : Auto
Loader: 000BF0E100720000_57158eaf1814d78f_e551cac5_XIAOMI_auth_peek_8937.fhprg
Port  : Auto

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM10)
SymbolicName :\\?\usb#vid_05c6&pid_9008#7&30cfde48&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver   :03/25/2016,2.1.2.2

Getting device info. [Connected].....
Serial No.: 0x6C9D2F61
HW_ID     : 000BF0E100720000
MSM ID    : 0x000BF0E1, SDM439-Qualcomm Snapdragon 439/FAADANAZA
MODEL_ID  : 0x0000
OEM_ID    : 0x0072 - XIAOMI
PBL Ver   : 00000000
PK HASH   : 57158eaf1814d78fd2b3105ece4db18a817a08ac664a5782a925f3ff8403d39a

Firehose Loader[000BF0E100720000_57158eaf1814d78f_e551cac5_XIAOMI_auth_peek_8937.fhprg]
--------------------------------------------------
  Header Type    : OLD
  TargetMSM      : 8937
  Tag            : _auth_peek
  Version        : 3
  Code_size      : 320
  Signature_size : 256
  fhVendor       : XIAOMI
  HW_ID          : 000BF0E100720000
  Vendor         : XIAOMI
  OEM_ID         : 0072
  MODEL_ID       : 0000
  SW_ID          : 0000000100000003
  APP_ID         :
  pk_hash        : 57158eaf1814d78fd2b3105ece4db18a817a08ac664a5782a925f3ff8403d39a
  OEM_VERSION    : c4-miui-ota-bd104.bj
  IMAGE_VARIANT  : FAADANAZA
  QC_VERSION     : BOOT.BF.3.3.2-00073
--------------------------------------------------

SaharaBoot... Ok
Sending .......................Ok
Connecting to Firehose...
Ping... Ok
Configuration[FHProt_Auto].
Xiaomi Authentication needed...
Signature Request -> bob[tHIcqS9vSk7BNoMAWbTz1InesQt]
Signature @256bytes Authentication.... Accepted......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type         : eMMC
Block Size in Bytes : 512
Page Size           : 512
Manufacturer ID     : 21
Serial Number       : 400805921
Firmware Version    : 4
Product Name        : QD63MB
Physical Partitions : 3
Total Logical Blocks:
          Drive [0]  61071360[29.121 GB]
          Drive [1]  8192[4 MB]
          Drive [2]  8192[4 MB]

Protocol : Universal
Running : Ok

Reading GPT[3]
          Drive [0] 60 Items
          Drive [1] 0 Items
          Drive [2] 0 Items

--------------- Reading build.prop content ---------------
build.prop
system
build.prop
  ID             : QKQ1.191014.001
  SDK            : 29
  Release        : 10
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Locale         : en-GB
  Security Patch : 2021-11-01
--------------- end of build.prop content ---------------

Auto Backup Security partitions...
Reading Security Items....
- modemst1(modemst1.bin), 8 MB                        = Ok
- modemst2(modemst2.bin), 8 MB                        = Ok
- fsg(fsg.bin), 8 MB                                  = Ok
- fsc(fsc.bin), 7.5 KB                                = Ok
- persist(persist.bin), 32 MB                         = Ok

C:\Hydra Tool\Backup\QUALBackup\XIAOMI\000BF0E1EE20000_6C9D2F61\Auto_Backup\0720222195247
Backup Security Success....

Elapsed Time : 00:02:07







- Remove mi account
Kod:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                        Xiaomi Tool
                         Mi Account
                Remove MiAccount[New Method]
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

PreOperation Configuration
Brand : XIAOMI Model : Redmi 7A (pine) Storage : Auto
Loader: 000BF0E100720000_57158eaf1814d78f_e551cac5_XIAOMI_auth_peek_8937.fhprg
Port  : Auto

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM10)
SymbolicName :\\?\usb#vid_05c6&pid_9008#7&30cfde48&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver   :03/25/2016,2.1.2.2

Getting device info. [Connected].....
Serial No.: 0x6C9D2F61
HW_ID     : 000BF0E100720000
MSM ID    : 0x000BF0E1, SDM439-Qualcomm Snapdragon 439/FAADANAZA
MODEL_ID  : 0x0000
OEM_ID    : 0x0072 - XIAOMI
PBL Ver   : 00000000
PK HASH   : 57158eaf1814d78fd2b3105ece4db18a817a08ac664a5782a925f3ff8403d39a

Firehose Loader[000BF0E100720000_57158eaf1814d78f_e551cac5_XIAOMI_auth_peek_8937.fhprg]
--------------------------------------------------
  Header Type    : OLD
  TargetMSM      : 8937
  Tag            : _auth_peek
  Version        : 3
  Code_size      : 320
  Signature_size : 256
  fhVendor       : XIAOMI
  HW_ID          : 000BF0E100720000
  Vendor         : XIAOMI
  OEM_ID         : 0072
  MODEL_ID       : 0000
  SW_ID          : 0000000100000003
  APP_ID         :
  pk_hash        : 57158eaf1814d78fd2b3105ece4db18a817a08ac664a5782a925f3ff8403d39a
  OEM_VERSION    : c4-miui-ota-bd104.bj
  IMAGE_VARIANT  : FAADANAZA
  QC_VERSION     : BOOT.BF.3.3.2-00073
--------------------------------------------------

SaharaBoot... Ok
Sending .......................Ok
Connecting to Firehose...
Ping... Ok
Configuration[FHProt_Auto].
Xiaomi Authentication needed...
Signature Request -> bob[mk0Yyp5GlsfZU9u300
Signature @256bytes Authentication.... Accepted......
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type         : eMMC
Block Size in Bytes : 512
Page Size           : 512
Manufacturer ID     : 21
Serial Number       : 400805921
Firmware Version    : 4
Product Name        : QD63MB
Physical Partitions : 3
Total Logical Blocks:
          Drive [0]  61071360[29.121 GB]
          Drive [1]  8192[4 MB]
          Drive [2]  8192[4 MB]

Protocol : Universal
Running : Ok

Reading GPT[3]
          Drive [0] 60 Items
          Drive [1] 0 Items
          Drive [2] 0 Items

--------------- Reading build.prop content ---------------
build.prop
system
build.prop
  ID             : QKQ1.191014.001
  SDK            : 29
  Release        : 10
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Locale         : en-GB
  Security Patch : 2021-11-01
--------------- end of build.prop content ---------------

Auto Backup Security partitions...
Reading Security Items....
- modemst1(modemst1.bin), 8 MB                        = Ok
- modemst2(modemst2.bin), 8 MB                        = Ok
- fsg(fsg.bin), 8 MB                                  = Ok
- fsc(fsc.bin), 7.5 KB                                = Ok
- persist(persist.bin), 32 MB                         = Ok

C:\Hydra Tool\Backup\QUALBackup\XIAOMI\000BF0E100720000_6C9D2F61\Auto_Backup\072023195429
Backup Security Success....
Reading GPT[3]
          Drive [0] 60 Items
          Drive [1] 0 Items
          Drive [2] 0 Items

Backing up Partition for safety...Ok

Scanning Patching address...
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]Done!!
Total Items patched : 74
Successfully patched address..

Action Result :  Ok

Elapsed Time : 00:01:34
 
Üst