Xiaomi Poco M2 (Shiva) Mi Account removed using Patched Method by Hydra Tool
Screen Short:
Logs:
1. Run Hydra MTK Module, Select Brand and Model
2. Go to Service-->Tools-->Xiaoami
3. Choose "Remove Mi Account Patched Method" from Method / Option
4. Execute and connect the device to the computer with data cable
5. wait until the process is completed.
Note: Only in MTK devices, Android above 8, need to install VPN software before you connect wify. But, no need VPS software in Qualcomm module even highest miui vesion ie. 12.xx.xx. No need server! No need Credit! No need yearly activation! No need any extra cost .
2. Go to Service-->Tools-->Xiaoami
3. Choose "Remove Mi Account Patched Method" from Method / Option
4. Execute and connect the device to the computer with data cable
5. wait until the process is completed.
Note: Only in MTK devices, Android above 8, need to install VPN software before you connect wify. But, no need VPS software in Qualcomm module even highest miui vesion ie. 12.xx.xx. No need server! No need Credit! No need yearly activation! No need any extra cost .
Screen Short:
Logs:
BR=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port_V1633 (COM45)
SymbolicName :\??\USB#VID_0E8D&PID_0003#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0
Handshaking...Ok
Identifying Hardware ID.....
BROM CPUID : 0707MT6768[6768]
BROM HW_SW_VER : 8A00 CA00 0000 0000
getMTKPayloadExploit : 0707
#Executing Exploit..
#SUCCESS..
Handshaking...Ok
Identifying Hardware ID.....
BROM CPUID : 0707MT6768[6768]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
SECURE VERSION : 00
BL VERSION : FE
BR Secured : E0
Preparing Download Agent..
DA : MT6768_Xiaomi_New.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2020/07/07.10:10_513994
Init : Loader [1]
Sending : Accepted
Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_shiva.bin
Init : Accepted
Execute Secondary Loader
Init : Loader [2]
Executing : SYNC
Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : D837F65333A085FEBFB3D76CB8CC5301
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 150100335036434D42031BFCE40B6709 - 3P6CMB
DA Speed : high-speed
Reading GPT-EMMC [0x00008000] 130 Items
Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_shiva.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0707__042821081937\MT6768_Android_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x05508000]1024 KB ->frp.bin...Ok
-nvdata[0x0C4A2000]64 MB ->nvdata.bin...Ok
-persist[0x104A2000]48 MB ->persist.bin...Ok
-nvram[0x19F80000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0707__042821081937
MTK Phone Loader is NOW RUNNING.
Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : D837F65333A085FEBFB3D76CB8CC5301
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 150100335036434D42031BFCE40B6709 - 3P6CMB
Reading GPT-EMMC [0x00008000] 130 Items
-------------------------------------
Operation : Remove MiAccount[Patch Method]
Processing...
-persist.bin[0x104A2000]48 MB ->persist.bin...Ok
-frp.bin[0x05508000]1024 KB ->frp.bin...Ok
Scanning Patching address...Please wait...
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
Total Items patched : 2
Successfully patched address..
C:\Hydra Tool\Backup\Xiaomi_Account\_042821082013\persist.bin.patch Ok
Elapsed Time : 00:01:43
Mount Everest