Hydra Xiaomi Redmi 9A Mi Account Remove with Hydra Tool

Hydra Tool

Unlockinfo

Friend's Martview
Feb 6, 2020
394
435
Pakistan
Skype
unlockinfo
Xiaomi Redmi 9A Mi Account Remove with Hydra Tool

- First Keep press Boot Info
- Remove mi account new method
- click execute


Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                      Service Function
                           Xiaomi
               Remove MiAccount [New Method]
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching for MTK Device...Found
  MTK Port Type    Flashmode BROM
  FriendlyName     MediaTek USB Port_V1633 (COM3)
  Device           5&2f1b43e3&0&1
  SymbolicName     usb#vid_0e8d&pid_0003#5&2f1b43e3&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver       01222015,3.0.1504.0
  Service          wdm_usb

Openning Port [COM3] Ok
Handshaking...Ok
  HwCode           0766 {MT6765MT8768t}
  Hwver            0000
  Target config    E7
  SBC              01 (True)
  SLA              02 (True)
  DAA              04 (True)
  SWJTAG           06 (True)
  EPP              00 (False)
  CERT             00 (False)
  MEMREAD          20 (True)
  MEMWRITE         40 (True)
  CMD_C8           80 (True)
  Connection       BROM
  HW Subcode       8A00
  HW Subcode       CA00
  SW Ver           0000
  ME_ID            0535D57D6EF57799447C38131582A8FF
  SOC_ID           ED3C81239EF43C25108CB1333F15A1F17901ABEFA61D53DC96E4F7B613A88C58

Exploiting Device...
Successfully Exploited..
Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..Found @ 0x00200BC4
Starting to dump...
Prel Size  0x0003B670
Successfully dump preloader..  [CHydra ToolBootPreloaderDumppreloader_k62v1_64_bsp.bin]
  Target config    00
  SBC              00 (False)
  SLA              00 (False)
  DAA              00 (False)
  SWJTAG           00 (False)
  EPP              00 (False)
  CERT             00 (False)
  MEMREAD          00 (False)
  MEMWRITE         00 (False)
  CMD_C8           00 (False)
  Connection       BROM

Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin]
Patching da2 ... Ok
Uploading Stage 1....
Successfully uploaded stage 1, jumping ..
Executing JUMP_DA Address @ 0x00200000
Jumping to 0x00200000 Ok 0xC0
Successfully received DA sync
  ONNECTION_AGENT  brom
  DRAM config needed for  9B01005932503033
Sending auto preloader from dump...  [preloader_k62v1_64_bsp.bin]
Sending emi data.. [DRAM setup passed.]
Sending emi data succeeded.
Uploading stage 2...
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
  ERAM Size        0x000000000003A000-232 KB
  IRAM Size        0x0000000080000000-2 GB
  EMMC Boot1 Size  0x0000000000400000-4 MB
  EMMC Boot2 Size  0x0000000000400000-4 MB
  EMMC RPMB Size   0x0000000001000000-16 MB
  EMMC USER Size   0x0000000747C00000-29,121 GB
  EMMC CID         9B010059325030333200E400990B8883 - Y2P032
  HW-CODE          0x766
  HWSUB-CODE       0x8A00
  HW-VERSION       0xCA00
  SW-VERSION       0x0
  CHIP-EVOLUTION   0x0
  DA-VERSION       1.0
  Speed            high-speed
Upload data was accepted. Jumping to stage 2...
DA Extensions successfully added
Reading Partition Table ..
Partition Count  45
--------------- Reading build.prop content ---------------
  Product         dandelion
  Marketname    ro.product.systemRedmi 9A
  ID              QP1A.190711.020
  SDK             29
  Release         10
  ABI             armeabi-v7a
  CPU abilist     armeabi-v7a,armeabi
  Locale          en-GB
  Description     dandelion-user 10 QP1A.190711.020 V12.0.20.0.QCDEUXM release-keys
  Display ID      QP1A.190711.020
  Security Patch  2022-07-01
  StorageType     mtp
--------------- end of build.prop content ---------------

Reading IMEI........
IMEI1  86751**********
IMEI2  86751**********
-------------------------------
Bootloader Status...
  Bootloader  Locked
-------------------------------
Backing up Security..
- preloader(preloader.bin), 512 KB                    = Ok  [preloader_k62v1_64_bsp.bin]
  Creating Scatter file... CHydra ToolBackupMTKBKUP0766_0535D57D6EF57799447C381344442A8FFAuto0720231916306765_Android_scatter.txt
- pgpt(pgpt.bin), 32 KB                               = Ok
- nvram(nvram.bin), 64 MB                             = Ok
- nvdata(nvdata.bin), 64 MB                           = Ok
- frp(frp.bin), 1024 KB                               = Ok
- protect1(protect1.bin), 8 MB                        = Ok
- protect2(protect2.bin), 10,867 MB                   = Ok
- persist(persist.bin), 48 MB                         = Ok
- proinfo(proinfo.bin), 3 MB                          = Ok
- nvcfg(nvcfg.bin), 32 MB                             = Ok
- sec1(sec1.bin), 2 MB                                = Ok
- seccfg(seccfg.bin), 8 MB                            = Ok
- lk(lk.bin), 2 MB                                    = Ok
Backup Done!!!
------------------------------
   Xiaomi Operation Flash Mode.. 
------------------------------
Backing up Security..
persist... Ok
vbmeta_system... Ok
vbmeta... Ok
Patching Persist

Scanning Patching address...Please wait...
   Patching address detected [PATCHED]
   Patching address detected [PATCHED]
   Patching address detected [PATCHED]
   Patching address detected [PATCHED]
   Patching address detected [PATCHED]
   Patching address detected [PATCHED]
   Patching address detected [PATCHED]
   Patching address detected [PATCHED]
   Patching address detected [PATCHED]
   Patching address detected [PATCHED]
   Patching address detected [PATCHED]
   Patching address detected [PATCHED]
   Patching address detected [PATCHED]
   Patching address detected [PATCHED]
   Patching address detected [PATCHED]
   Patching address detected [PATCHED]
   Patching address detected [PATCHED]
   Patching address detected [PATCHED]
   Patching address detected [PATCHED]
Total Items patched  19
Successfully patched address..
-persist .....Ok
Done Writing...
-vbmeta .....Ok
Done Writing...
-vbmeta_system .....Ok
Done Writing...
Please wait, processing.....
Status  Ok

Action Result   Ok

Elapsed Time  001028
 
Top