HYDRA Xiaomi Redmi 9A Mi Account Remove With Hydra Tool (1 Viewer)

unlockinfo

Deneyimli Üye
Deneyimli Üye
Kayıtlı Kullanıcı
Xiaomi Redmi 9A Mi Account Remove with Hydra Tool

- First Keep press Boot Info
- Remove mi account new method
- click execute


Kod:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                      Service Function
                           Xiaomi
               Remove MiAccount [New Method]
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching for MTK Device...Found
  MTK Port Type    Flashmode BROM
  FriendlyName     MediaTek USB Port_V1633 (COM3)
  Device           5&2f1b43e3&0&1
  SymbolicName     usb#vid_0e8d&pid_0003#5&2f1b43e3&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver       01222015,3.0.1504.0
  Service          wdm_usb

Openning Port [COM3] Ok
Handshaking...Ok
  HwCode           0766 {MT6765MT8768t}
  Hwver            0000
  Target config    E7
  SBC              01 (True)
  SLA              02 (True)
  DAA              04 (True)
  SWJTAG           06 (True)
  EPP              00 (False)
  CERT             00 (False)
  MEMREAD          20 (True)
  MEMWRITE         40 (True)
  CMD_C8           80 (True)
  Connection       BROM
  HW Subcode       8A00
  HW Subcode       CA00
  SW Ver           0000
  ME_ID            0535D57D6EF57799447C38131582A8FF
  SOC_ID           ED3C81239EF43C25108CB1333F15A1F17901ABEFA61D53DC96E4F7B613A88C58

Exploiting Device...
Successfully Exploited..
Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..Found @ 0x00200BC4
Starting to dump...
Prel Size  0x0003B670
Successfully dump preloader..  [CHydra ToolBootPreloaderDumppreloader_k62v1_64_bsp.bin]
  Target config    00
  SBC              00 (False)
  SLA              00 (False)
  DAA              00 (False)
  SWJTAG           00 (False)
  EPP              00 (False)
  CERT             00 (False)
  MEMREAD          00 (False)
  MEMWRITE         00 (False)
  CMD_C8           00 (False)
  Connection       BROM

Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin]
Patching da2 ... Ok
Uploading Stage 1....
Successfully uploaded stage 1, jumping ..
Executing JUMP_DA Address @ 0x00200000
Jumping to 0x00200000 Ok 0xC0
Successfully received DA sync
  ONNECTION_AGENT  brom
  DRAM config needed for  9B01005932503033
Sending auto preloader from dump...  [preloader_k62v1_64_bsp.bin]
Sending emi data.. [DRAM setup passed.]
Sending emi data succeeded.
Uploading stage 2...
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
  ERAM Size        0x000000000003A000-232 KB
  IRAM Size        0x0000000080000000-2 GB
  EMMC Boot1 Size  0x0000000000400000-4 MB
  EMMC Boot2 Size  0x0000000000400000-4 MB
  EMMC RPMB Size   0x0000000001000000-16 MB
  EMMC USER Size   0x0000000747C00000-29,121 GB
  EMMC CID         9B010059325030333200E400990B8883 - Y2P032
  HW-CODE          0x766
  HWSUB-CODE       0x8A00
  HW-VERSION       0xCA00
  SW-VERSION       0x0
  CHIP-EVOLUTION   0x0
  DA-VERSION       1.0
  Speed            high-speed
Upload data was accepted. Jumping to stage 2...
DA Extensions successfully added
Reading Partition Table ..
Partition Count  45
--------------- Reading build.prop content ---------------
  Product         dandelion
  Marketname    ro.product.systemRedmi 9A
  ID              QP1A.190711.020
  SDK             29
  Release         10
  ABI             armeabi-v7a
  CPU abilist     armeabi-v7a,armeabi
  Locale          en-GB
  Description     dandelion-user 10 QP1A.190711.020 V12.0.20.0.QCDEUXM release-keys
  Display ID      QP1A.190711.020
  Security Patch  2022-07-01
  StorageType     mtp
--------------- end of build.prop content ---------------

Reading IMEI........
IMEI1  86751**********
IMEI2  86751**********
-------------------------------
Bootloader Status...
  Bootloader  Locked
-------------------------------
Backing up Security..
- preloader(preloader.bin), 512 KB                    = Ok  [preloader_k62v1_64_bsp.bin]
  Creating Scatter file... CHydra ToolBackupMTKBKUP0766_0535D57D6EF57799447C381344442A8FFAuto0720231916306765_Android_scatter.txt
- pgpt(pgpt.bin), 32 KB                               = Ok
- nvram(nvram.bin), 64 MB                             = Ok
- nvdata(nvdata.bin), 64 MB                           = Ok
- frp(frp.bin), 1024 KB                               = Ok
- protect1(protect1.bin), 8 MB                        = Ok
- protect2(protect2.bin), 10,867 MB                   = Ok
- persist(persist.bin), 48 MB                         = Ok
- proinfo(proinfo.bin), 3 MB                          = Ok
- nvcfg(nvcfg.bin), 32 MB                             = Ok
- sec1(sec1.bin), 2 MB                                = Ok
- seccfg(seccfg.bin), 8 MB                            = Ok
- lk(lk.bin), 2 MB                                    = Ok
Backup Done!!!
------------------------------
   Xiaomi Operation Flash Mode.. 
------------------------------
Backing up Security..
persist... Ok
vbmeta_system... Ok
vbmeta... Ok
Patching Persist

Scanning Patching address...Please wait...
   Patching address detected [PATCHED]
   Patching address detected [PATCHED]
   Patching address detected [PATCHED]
   Patching address detected [PATCHED]
   Patching address detected [PATCHED]
   Patching address detected [PATCHED]
   Patching address detected [PATCHED]
   Patching address detected [PATCHED]
   Patching address detected [PATCHED]
   Patching address detected [PATCHED]
   Patching address detected [PATCHED]
   Patching address detected [PATCHED]
   Patching address detected [PATCHED]
   Patching address detected [PATCHED]
   Patching address detected [PATCHED]
   Patching address detected [PATCHED]
   Patching address detected [PATCHED]
   Patching address detected [PATCHED]
   Patching address detected [PATCHED]
Total Items patched  19
Successfully patched address..
-persist .....Ok
Done Writing...
-vbmeta .....Ok
Done Writing...
-vbmeta_system .....Ok
Done Writing...
Please wait, processing.....
Status  Ok

Action Result   Ok

Elapsed Time  001028
 
Üst