DTPro FRP CAT S42

DTPro Tool

carmelillo18

Active Member
Jan 31, 2020
32
4
LoRiKa CiTy
24/08/2022 16:41:58 - Operation : Direct Frp erase
24/08/2022 16:42:02 - MTK Flash/AMAT Client

Preloader - Status: Waiting for PreLoader VCOM, please connect mobile

24/08/2022 16:42:14 - Port - Device detected :)
Preloader - CPU: MT6761/MT6762/MT3369/MT8766B(Helio A20/P22/A22/A25/G25)
Preloader - HW version: 0x0
Preloader - WDT: 0x10007000
Preloader - Uart: 0x11002000
Preloader - Brom payload addr: 0x100a00
Preloader - DA payload addr: 0x201000
Preloader - CQ_DMA addr: 0x10212000
Preloader - Var1: 0x25
Preloader - Disabling Watchdog...
Preloader - HW code: 0x717
Preloader - Target config: 0xe1
Preloader - SBC enabled: True
Preloader - SLA enabled: False
Preloader - DAA enabled: False
Preloader - SWJTAG enabled: False
Preloader - EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False
Preloader - Root cert required: False
Preloader - Mem read auth: True
Preloader - Mem write auth: True
Preloader - Cmd 0xC8 blocked: True
Preloader - HW subcode: 0x8a00
Preloader - HW Ver: 0xca01
Preloader - SW Ver: 0x200
Preloader - ME_ID: AF9927BB87725B96646D6614A141303C
Preloader - SOC_ID: B59BD6CEFF6FCD2BAC212704103E1FFE11D47E879A3A6C82EF0A33917D76249D
Main - Device is unprotected.
DTpro - Loading payload from mt6761_payload.bin, 0x264 bytes
DTpro - Authorization / Service
Kamakiri - Writing Keys...

24/08/2022 16:42:15 - Kamakiri - Authorizing the device Ok...

24/08/2022 16:42:15 - DTpro - Successfully sent payload: C:\Users\carme\Downloads\New_Mediatek_v4.0.0.000040EXT_rev1\File\mtkclient\payloads\mt6761_payload.bin
Port - Device detected :)
Main
Main - [LIB]: [33mDevice is in BROM mode. No preloader given, trying to dump preloader from ram.[0m

24/08/2022 16:42:17 - Successfully extracted preloader for this device to: C:\Users\carme\Downloads\New_Mediatek_v4.0.0.000040EXT_rev1\File\mtkclient\Loader\Preloader\preloader_v500.bin
DAXFlash - Uploading stage 1 from MTK_AllInOne_DA_5.1420.bin

24/08/2022 16:42:18 - DAXFlash - Successfully uploaded stage 1, jumping ..
Preloader - Jumping to 0x200000
Preloader - Jumping to 0x200000: ok.

24/08/2022 16:42:18 - DAXFlash - Successfully received DA sync

24/08/2022 16:42:18 - DAXFlash - DRAM config needed for : 90014a6842386150
DAXFlash - Sending emi data ...

24/08/2022 16:42:19 - DAXFlash - Sending emi data succeeded.
DAXFlash - Uploading stage 2...

24/08/2022 16:42:21 - DAXFlash - Successfully uploaded stage 2
DAXFlash - EMMC FWVer: 0x0
DAXFlash - EMMC ID: hB8aP>
DAXFlash - EMMC CID: 90014a68423861503e03000106d2c7b9
DAXFlash - EMMC Boot1 Size: 0x400000
DAXFlash - EMMC Boot2 Size: 0x400000
DAXFlash - EMMC GP1 Size: 0x0
DAXFlash - EMMC GP2 Size: 0x0
DAXFlash - EMMC GP3 Size: 0x0
DAXFlash - EMMC GP4 Size: 0x0
DAXFlash - EMMC RPMB Size: 0x1000000
DAXFlash - EMMC USER Size: 0x747c00000

24/08/2022 16:42:21 - DAXFlash - DA-CODE : 0x171E0

24/08/2022 16:42:22 - DAXFlash - DA Extensions successfully added

24/08/2022 16:42:22 - DAXFlash - Wiping addr 0x4d88000 with length 0x100000, please wait....

24/08/2022 16:42:22 - DAXFlash - Successsfully Wiped addr 0x4d88000 with length 1048576.
Wiped sector 158784 with sector count 2048.

24/08/2022 16:42:22 - Frp lock Zone formated | Frp erase done!

1112362a-786e-4313-a98b-eddd697a0ab0.jpg d691414d-e260-4b1d-8388-af2f721af60c.jpg
 
  • Like
Reactions: andersoncell
Top