DTPro OPPO A54 ANDROID 11 DIRECT FRP ONE CLIC DONE BY DT PRO

DTPro Tool

rrts1987

Member
Apr 3, 2020
11
6
colombia
PayPal:

Donate money to this user
Operation : Direct Frp erase
MTK Flash/AMAT Client

Preloader - Status: Waiting for PreLoader VCOM, please connect mobile

Port - Device detected :)
Preloader - CPU: MT6765(Helio P35/G35)
Preloader - HW version: 0x0
Preloader - WDT: 0x10007000
Preloader - Uart: 0x11002000
Preloader - Brom payload addr: 0x100a00
Preloader - DA payload addr: 0x201000
Preloader - CQ_DMA addr: 0x10212000
Preloader - Var1: 0x25
Preloader - Disabling Watchdog...
Preloader - HW code: 0x766
Preloader - Target config: 0xe5
Preloader - SBC enabled: True
Preloader - SLA enabled: False
Preloader - DAA enabled: True
Preloader - SWJTAG enabled: True
Preloader - EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False
Preloader - Root cert required: False
Preloader - Mem read auth: True
Preloader - Mem write auth: True
Preloader - Cmd 0xC8 blocked: True

Preloader - HW subcode: 0x8a00
Preloader - HW Ver: 0xca00
Preloader - SW Ver: 0x0
Preloader - ME_ID: 5DC3EEC027C11A34488F6E68F4F46997
Preloader - SOC_ID: C92D8028A9E301ACF6378ACB414379A685B4558C35D679EFFB18D367303501A1
DTpro - Loading payload from mt6765_payload.bin, 0x264 bytes
DTpro - Authorization / Service
Kamakiri - Writing Keys...
Kamakiri - Authorizing the device Ok...

DTpro - Successfully sent payload: D:\Documentos\Documents\SOPORTE\DT PRO TOOL\MTK -AMAT_v3.0.0.9099New WhosYourDaddy\File\mtkclient\payloads\mt6765_payload.bin
Port - Device detected :)
Main - Device is protected.
Main - Device is in BROM mode. Trying to dump preloader.

DAXFlash - Uploading stage 1 from MTK_AllInOne_DA_5.1420.bin

DAXFlash - Successfully uploaded stage 1, jumping ..
Preloader - Jumping to 0x200000
Preloader - Jumping to 0x200000: ok.

DAXFlash - Successfully received DA sync
DAXFlash - DRAM config needed for : 13014e53304a394b
DAXFlash - Sending emi data ...

DAXFlash - Sending emi data succeeded.
DAXFlash - Uploading stage 2...

DAXFlash - Successfully uploaded stage 2
DAXFlash - EMMC FWVer: 0x0
DAXFlash - EMMC ID: S0J9K9
DAXFlash - EMMC CID: 13014e53304a394b391026b85d7158cd
DAXFlash - EMMC Boot1 Size: 0x400000
DAXFlash - EMMC Boot2 Size: 0x400000
DAXFlash - EMMC GP1 Size: 0x0
DAXFlash - EMMC GP2 Size: 0x0
DAXFlash - EMMC GP3 Size: 0x0
DAXFlash - EMMC GP4 Size: 0x0
DAXFlash - EMMC RPMB Size: 0x1000000
DAXFlash - EMMC USER Size: 0x1d1f000000

DAXFlash - DA-CODE : 0x666D0

DAXFlash - DA Extensions successfully added

DAXFlash - Wiping addr 0x15088000 with length 0x100000, please wait....

DAXFlash - Successsfully Wiped addr 0x15088000 with length 1048576.
Wiped sector 689216 with sector count 2048.

Frp lock Zone formated | Frp erase done!
 

Attachments

  • oppoa54.jpg
    oppoa54.jpg
    285.5 KB · Views: 32
Top