Hydra Redmi 7A (pine) Mi Account Remove with Hydra Tool

Hydra Tool

Unlockinfo

Friend's Martview
Feb 6, 2020
394
435
Pakistan
Skype
unlockinfo
Redmi 7A (pine) Mi Account Remove with Hydra Tool



- keep press boot info


Code:
PreOperation Configuration
Brand : XIAOMI Model : Redmi 7A (pine) Storage : Auto
Loader: 000BF0E100720000_57158eaf1814d78f_e551cac5_XIAOMI_auth_peek_8937.fhprg
Port  : Auto

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM10)
SymbolicName :\\?\usb#vid_05c6&pid_9008#7&30cfde48&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver   :03/25/2016,2.1.2.2

Getting device info. [Connected].....
Serial No.: 0x6C9D2F61
HW_ID     : 000BF0E100720000
MSM ID    : 0x000BF0E1, SDM439-Qualcomm Snapdragon 439/FAADANAZA
MODEL_ID  : 0x0000
OEM_ID    : 0x0072 - XIAOMI
PBL Ver   : 00000000
PK HASH   : 57158eaf1814d78fd2b3105ece4db18a817a08ac664a5782a925f3ff8403d39a

Firehose Loader[000BF0E100720000_57158eaf1814d78f_e551cac5_XIAOMI_auth_peek_8937.fhprg]
--------------------------------------------------
  Header Type    : OLD
  TargetMSM      : 8937
  Tag            : _auth_peek
  Version        : 3
  Code_size      : 320
  Signature_size : 256
  fhVendor       : XIAOMI
  HW_ID          : 000BF0E100720000
  Vendor         : XIAOMI
  OEM_ID         : 0072
  MODEL_ID       : 0000
  SW_ID          : 0000000100000003
  APP_ID         :
  pk_hash        : 57158eaf1814d78fd2b3105ece4db18a817a08ac664a5782a925f3ff8403d39a
  OEM_VERSION    : c4-miui-ota-bd104.bj
  IMAGE_VARIANT  : FAADANAZA
  QC_VERSION     : BOOT.BF.3.3.2-00073
--------------------------------------------------

SaharaBoot... Ok
Sending .......................Ok
Connecting to Firehose...
Ping... Ok
Configuration[FHProt_Auto].
Xiaomi Authentication needed...
Signature Request -> bob[tHIcqS9vSk7BNoMAWbTz1InesQt]
Signature @256bytes Authentication.... Accepted......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type         : eMMC
Block Size in Bytes : 512
Page Size           : 512
Manufacturer ID     : 21
Serial Number       : 400805921
Firmware Version    : 4
Product Name        : QD63MB
Physical Partitions : 3
Total Logical Blocks:
          Drive [0]  61071360[29.121 GB]
          Drive [1]  8192[4 MB]
          Drive [2]  8192[4 MB]

Protocol : Universal
Running : Ok

Reading GPT[3]
          Drive [0] 60 Items
          Drive [1] 0 Items
          Drive [2] 0 Items

--------------- Reading build.prop content ---------------
build.prop
system
build.prop
  ID             : QKQ1.191014.001
  SDK            : 29
  Release        : 10
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Locale         : en-GB
  Security Patch : 2021-11-01
--------------- end of build.prop content ---------------

Auto Backup Security partitions...
Reading Security Items....
- modemst1(modemst1.bin), 8 MB                        = Ok
- modemst2(modemst2.bin), 8 MB                        = Ok
- fsg(fsg.bin), 8 MB                                  = Ok
- fsc(fsc.bin), 7.5 KB                                = Ok
- persist(persist.bin), 32 MB                         = Ok

C:\Hydra Tool\Backup\QUALBackup\XIAOMI\000BF0E1EE20000_6C9D2F61\Auto_Backup\0720222195247
Backup Security Success....

Elapsed Time : 00:02:07







- Remove mi account
Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                        Xiaomi Tool
                         Mi Account
                Remove MiAccount[New Method]
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

PreOperation Configuration
Brand : XIAOMI Model : Redmi 7A (pine) Storage : Auto
Loader: 000BF0E100720000_57158eaf1814d78f_e551cac5_XIAOMI_auth_peek_8937.fhprg
Port  : Auto

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM10)
SymbolicName :\\?\usb#vid_05c6&pid_9008#7&30cfde48&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver   :03/25/2016,2.1.2.2

Getting device info. [Connected].....
Serial No.: 0x6C9D2F61
HW_ID     : 000BF0E100720000
MSM ID    : 0x000BF0E1, SDM439-Qualcomm Snapdragon 439/FAADANAZA
MODEL_ID  : 0x0000
OEM_ID    : 0x0072 - XIAOMI
PBL Ver   : 00000000
PK HASH   : 57158eaf1814d78fd2b3105ece4db18a817a08ac664a5782a925f3ff8403d39a

Firehose Loader[000BF0E100720000_57158eaf1814d78f_e551cac5_XIAOMI_auth_peek_8937.fhprg]
--------------------------------------------------
  Header Type    : OLD
  TargetMSM      : 8937
  Tag            : _auth_peek
  Version        : 3
  Code_size      : 320
  Signature_size : 256
  fhVendor       : XIAOMI
  HW_ID          : 000BF0E100720000
  Vendor         : XIAOMI
  OEM_ID         : 0072
  MODEL_ID       : 0000
  SW_ID          : 0000000100000003
  APP_ID         :
  pk_hash        : 57158eaf1814d78fd2b3105ece4db18a817a08ac664a5782a925f3ff8403d39a
  OEM_VERSION    : c4-miui-ota-bd104.bj
  IMAGE_VARIANT  : FAADANAZA
  QC_VERSION     : BOOT.BF.3.3.2-00073
--------------------------------------------------

SaharaBoot... Ok
Sending .......................Ok
Connecting to Firehose...
Ping... Ok
Configuration[FHProt_Auto].
Xiaomi Authentication needed...
Signature Request -> bob[mk0Yyp5GlsfZU9u300
Signature @256bytes Authentication.... Accepted......
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type         : eMMC
Block Size in Bytes : 512
Page Size           : 512
Manufacturer ID     : 21
Serial Number       : 400805921
Firmware Version    : 4
Product Name        : QD63MB
Physical Partitions : 3
Total Logical Blocks:
          Drive [0]  61071360[29.121 GB]
          Drive [1]  8192[4 MB]
          Drive [2]  8192[4 MB]

Protocol : Universal
Running : Ok

Reading GPT[3]
          Drive [0] 60 Items
          Drive [1] 0 Items
          Drive [2] 0 Items

--------------- Reading build.prop content ---------------
build.prop
system
build.prop
  ID             : QKQ1.191014.001
  SDK            : 29
  Release        : 10
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Locale         : en-GB
  Security Patch : 2021-11-01
--------------- end of build.prop content ---------------

Auto Backup Security partitions...
Reading Security Items....
- modemst1(modemst1.bin), 8 MB                        = Ok
- modemst2(modemst2.bin), 8 MB                        = Ok
- fsg(fsg.bin), 8 MB                                  = Ok
- fsc(fsc.bin), 7.5 KB                                = Ok
- persist(persist.bin), 32 MB                         = Ok

C:\Hydra Tool\Backup\QUALBackup\XIAOMI\000BF0E100720000_6C9D2F61\Auto_Backup\072023195429
Backup Security Success....
Reading GPT[3]
          Drive [0] 60 Items
          Drive [1] 0 Items
          Drive [2] 0 Items

Backing up Partition for safety...Ok

Scanning Patching address...
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]Done!!
Total Items patched : 74
Successfully patched address..

Action Result :  Ok

Elapsed Time : 00:01:34
 
Top