- Sep 3, 2018
- 4,885
- 4,366
- Skype
- nico_2202
Operation : Direct Frp erase
MTK Flash/AMAT Client
Preloader - Status: Waiting for PreLoader VCOM, please connect mobile
Port - Device detected
Preloader - CPU: MT6765(Helio P35/G35)
Preloader - HW version: 0x0
Preloader - WDT: 0x10007000
Preloader - Uart: 0x11002000
Preloader - Brom payload addr: 0x100a00
Preloader - DA payload addr: 0x201000
Preloader - CQ_DMA addr: 0x10212000
Preloader - Var1: 0x25
Preloader - Disabling Watchdog...
Preloader - HW code: 0x766
Preloader - Target config: 0xe7
Preloader - SBC enabled: True
Preloader - SLA enabled: True
Preloader - DAA enabled: True
Preloader - SWJTAG enabled: True
Preloader - EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False
Preloader - Root cert required: False
Preloader - Mem read auth: True
Preloader - Mem write auth: True
Preloader - Cmd 0xC8 blocked: True
Preloader - HW subcode: 0x8a00
Preloader - HW Ver: 0xca00
Preloader - SW Ver: 0x0
Preloader - ME_ID: 98B21607E776265357E5F9E7B800DE56
Preloader - SOC_ID: 5E2E381FCB6C8849997DF334EF1C4224C7C93727F0AEA09478C483AA11CCFD55
DTpro - Loading payload from mt6765_payload.bin, 0x264 bytes
DTpro - Authorization / Service
Kamakiri - Writing Keys...
Kamakiri - Authorizing the device Ok...
DTpro - Successfully sent payload: C:\DT PRO TOOL\MTK -AMAT_v3.0.0.4001\File\mtkclient\payloads\mt6765_payload.bin
Port - Device detected
Main - Device is protected.
Main - Device is in BROM mode. Trying to dump preloader.
Successfully extracted preloader for this device to: C:\DT PRO TOOL\MTK -AMAT_v3.0.0.4001\File\mtkclient\Loader\Preloader\preloader_muse6762_dh5_q.bin
DAXFlash - Uploading stage 1 from MTK_AllInOne_DA_5.1420.bin
DAXFlash - Successfully uploaded stage 1, jumping ..
Preloader - Jumping to 0x200000
Preloader - Jumping to 0x200000: ok.
DAXFlash - Successfully received DA sync
DAXFlash - DRAM config needed for : 150100515836334d
DAXFlash - Sending emi data ...
DAXFlash - Sending emi data succeeded.
DAXFlash - Uploading stage 2...
DAXFlash - Successfully uploaded stage 2
DAXFlash - EMMC FWVer: 0x0
DAXFlash - EMMC ID: QX63MB
DAXFlash - EMMC CID: 150100515836334d4203503007c8a73f
DAXFlash - EMMC Boot1 Size: 0x400000
DAXFlash - EMMC Boot2 Size: 0x400000
DAXFlash - EMMC GP1 Size: 0x0
DAXFlash - EMMC GP2 Size: 0x0
DAXFlash - EMMC GP3 Size: 0x0
DAXFlash - EMMC GP4 Size: 0x0
DAXFlash - EMMC RPMB Size: 0x400000
DAXFlash - EMMC USER Size: 0x747c00000
DAXFlash - DA-CODE : 0x666D0
DAXFlash - DA Extensions successfully added
DAXFlash - Wiping addr 0xd000000 with length 0x800000, please wait....
DAXFlash - Successsfully Wiped addr 0xd000000 with length 8388608.
Wiped sector 425984 with sector count 16384.
Frp lock Zone formated | Frp erase done!
MTK Flash/AMAT Client
Preloader - Status: Waiting for PreLoader VCOM, please connect mobile
Port - Device detected
Preloader - CPU: MT6765(Helio P35/G35)
Preloader - HW version: 0x0
Preloader - WDT: 0x10007000
Preloader - Uart: 0x11002000
Preloader - Brom payload addr: 0x100a00
Preloader - DA payload addr: 0x201000
Preloader - CQ_DMA addr: 0x10212000
Preloader - Var1: 0x25
Preloader - Disabling Watchdog...
Preloader - HW code: 0x766
Preloader - Target config: 0xe7
Preloader - SBC enabled: True
Preloader - SLA enabled: True
Preloader - DAA enabled: True
Preloader - SWJTAG enabled: True
Preloader - EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False
Preloader - Root cert required: False
Preloader - Mem read auth: True
Preloader - Mem write auth: True
Preloader - Cmd 0xC8 blocked: True
Preloader - HW subcode: 0x8a00
Preloader - HW Ver: 0xca00
Preloader - SW Ver: 0x0
Preloader - ME_ID: 98B21607E776265357E5F9E7B800DE56
Preloader - SOC_ID: 5E2E381FCB6C8849997DF334EF1C4224C7C93727F0AEA09478C483AA11CCFD55
DTpro - Loading payload from mt6765_payload.bin, 0x264 bytes
DTpro - Authorization / Service
Kamakiri - Writing Keys...
Kamakiri - Authorizing the device Ok...
DTpro - Successfully sent payload: C:\DT PRO TOOL\MTK -AMAT_v3.0.0.4001\File\mtkclient\payloads\mt6765_payload.bin
Port - Device detected
Main - Device is protected.
Main - Device is in BROM mode. Trying to dump preloader.
Successfully extracted preloader for this device to: C:\DT PRO TOOL\MTK -AMAT_v3.0.0.4001\File\mtkclient\Loader\Preloader\preloader_muse6762_dh5_q.bin
DAXFlash - Uploading stage 1 from MTK_AllInOne_DA_5.1420.bin
DAXFlash - Successfully uploaded stage 1, jumping ..
Preloader - Jumping to 0x200000
Preloader - Jumping to 0x200000: ok.
DAXFlash - Successfully received DA sync
DAXFlash - DRAM config needed for : 150100515836334d
DAXFlash - Sending emi data ...
DAXFlash - Sending emi data succeeded.
DAXFlash - Uploading stage 2...
DAXFlash - Successfully uploaded stage 2
DAXFlash - EMMC FWVer: 0x0
DAXFlash - EMMC ID: QX63MB
DAXFlash - EMMC CID: 150100515836334d4203503007c8a73f
DAXFlash - EMMC Boot1 Size: 0x400000
DAXFlash - EMMC Boot2 Size: 0x400000
DAXFlash - EMMC GP1 Size: 0x0
DAXFlash - EMMC GP2 Size: 0x0
DAXFlash - EMMC GP3 Size: 0x0
DAXFlash - EMMC GP4 Size: 0x0
DAXFlash - EMMC RPMB Size: 0x400000
DAXFlash - EMMC USER Size: 0x747c00000
DAXFlash - DA-CODE : 0x666D0
DAXFlash - DA Extensions successfully added
DAXFlash - Wiping addr 0xd000000 with length 0x800000, please wait....
DAXFlash - Successsfully Wiped addr 0xd000000 with length 8388608.
Wiped sector 425984 with sector count 16384.
Frp lock Zone formated | Frp erase done!