29.03.2023 02:43:39 - Connecting to server:
29.03.2023 02:43:39 - Installing LibUsb Drivers..
29.03.2023 02:43:40 - Info : Connect phone to USB in BROM mode
29.03.2023 02:43:40 - BROM Mode : Please, power phone OFF, press and hold "Vol" button and connect USB cable.
29.03.2023 02:43:40 - Searching for a phone. Please wait...
29.03.2023 02:43:49 - Mode : [BootRom] COM16 - MediaTek USB Port_V1632 (COM16)
29.03.2023 02:43:49 - Drivers : MediaTek Inc.,usb2ser.sys [1-22-2015] [3.0.1504.0]
29.03.2023 02:43:50 - Checking Device Interface..
29.03.2023 02:43:50 - Port - Device detected
Preloader - CPU: MT6739/MT6731()
Preloader - HW version: 0x0
Preloader - WDT: 0x10007000
Preloader - Uart: 0x11002000
Preloader - Brom payload addr: 0x100a00
Preloader - DA payload addr: 0x201000
Preloader - CQ_DMA addr: 0x10212000
Preloader - Var1: 0xb4
Preloader - Disabling Watchdog...
Preloader - HW code: 0x699
Preloader - Target config: 0x0
Preloader - SBC enabled: False
Preloader - SLA enabled: False
Preloader - DAA enabled: False
Preloader - SWJTAG enabled: False
Preloader - EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False
Preloader - Root cert required: False
Preloader - Mem read auth: False
Preloader - Mem write auth: False
Preloader - Cmd 0xC8 blocked: False
29.03.2023 02:43:50 - Preloader - HW subcode: 0x8a00
Preloader - HW Ver: 0xcb00
Preloader - SW Ver: 0x2
Preloader - ME_ID: 75A28AA26DDD26ECD1F9C32E7503D70B
Preloader - SOC_ID: E725DCCA150E28B94CCA229762EAA469774581729F1DA50A0D2021980449318E
Main - Device is unprotected.
DTpro - Loading payload from mt6739_payload.bin, 0x264 bytes
DTpro - Authorization / Service
Kamakiri - Writing Keys...
29.03.2023 02:43:51 - Kamakiri - Authorizing the device Ok...
29.03.2023 02:43:51 - DTpro - Successfully sent payload: C:\Users\bio hazard\Desktop\Yeni klas+Âr\Mediatek _v4.0.0.00070DRAM\File\mtkclient\payloads\mt6739_payload.bin
Port - Device detected
Main
Main - [LIB]: [33mDevice is in BROM mode. No preloader given, trying to dump preloader from ram.[0m
29.03.2023 02:43:52 - Successfully extracted preloader for this device to: C:\Users\bio hazard\Desktop\Yeni klas+Âr\Mediatek _v4.0.0.00070DRAM\File\mtkclient\Loader\Preloader\preloader_fd3901.bin
DAXFlash - Uploading stage 1 from MTK_AllInOne_DA_5.1420.bin
29.03.2023 02:43:53 - DAXFlash - Successfully uploaded stage 1, jumping ..
Preloader - Jumping to 0x200000
Preloader - Jumping to 0x200000: ok.
DAXFlash - Successfully received DA sync
29.03.2023 02:43:53 - DAXFlash - Sending emi data ...
DAXFlash - Sending emi data succeeded.
DAXFlash - Uploading stage 2...
29.03.2023 02:43:55 - DAXFlash - Successfully uploaded stage 2
DAXFlash - EMMC FWVer: 0x0
DAXFlash - EMMC ID: FE62MB
DAXFlash - EMMC CID: 150100464536324d42037f15acff45b1
DAXFlash - EMMC Boot1 Size: 0x400000
DAXFlash - EMMC Boot2 Size: 0x400000
DAXFlash - EMMC GP1 Size: 0x0
DAXFlash - EMMC GP2 Size: 0x0
DAXFlash - EMMC GP3 Size: 0x0
DAXFlash - EMMC GP4 Size: 0x0
DAXFlash - EMMC RPMB Size: 0x400000
DAXFlash - EMMC USER Size: 0x3a3e00000
29.03.2023 02:43:55 - DAXFlash - DA-CODE : 0x999F0
29.03.2023 02:43:56 - DAXFlash - DA Extensions successfully added
29.03.2023 02:43:56 - DAXFlash - Wiping addr 0x2d88000 with length 0x100000, please wait....
DAXFlash - Successsfully Wiped addr 0x2d88000 with length 1048576.
Wiped sector 93248 with sector count 2048.
29.03.2023 02:43:56 - Frp lock Zone formated | Frp erase done!
29.03.2023 02:43:39 - Installing LibUsb Drivers..
29.03.2023 02:43:40 - Info : Connect phone to USB in BROM mode
29.03.2023 02:43:40 - BROM Mode : Please, power phone OFF, press and hold "Vol" button and connect USB cable.
29.03.2023 02:43:40 - Searching for a phone. Please wait...
29.03.2023 02:43:49 - Mode : [BootRom] COM16 - MediaTek USB Port_V1632 (COM16)
29.03.2023 02:43:49 - Drivers : MediaTek Inc.,usb2ser.sys [1-22-2015] [3.0.1504.0]
29.03.2023 02:43:50 - Checking Device Interface..
29.03.2023 02:43:50 - Port - Device detected
Preloader - CPU: MT6739/MT6731()
Preloader - HW version: 0x0
Preloader - WDT: 0x10007000
Preloader - Uart: 0x11002000
Preloader - Brom payload addr: 0x100a00
Preloader - DA payload addr: 0x201000
Preloader - CQ_DMA addr: 0x10212000
Preloader - Var1: 0xb4
Preloader - Disabling Watchdog...
Preloader - HW code: 0x699
Preloader - Target config: 0x0
Preloader - SBC enabled: False
Preloader - SLA enabled: False
Preloader - DAA enabled: False
Preloader - SWJTAG enabled: False
Preloader - EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False
Preloader - Root cert required: False
Preloader - Mem read auth: False
Preloader - Mem write auth: False
Preloader - Cmd 0xC8 blocked: False
29.03.2023 02:43:50 - Preloader - HW subcode: 0x8a00
Preloader - HW Ver: 0xcb00
Preloader - SW Ver: 0x2
Preloader - ME_ID: 75A28AA26DDD26ECD1F9C32E7503D70B
Preloader - SOC_ID: E725DCCA150E28B94CCA229762EAA469774581729F1DA50A0D2021980449318E
Main - Device is unprotected.
DTpro - Loading payload from mt6739_payload.bin, 0x264 bytes
DTpro - Authorization / Service
Kamakiri - Writing Keys...
29.03.2023 02:43:51 - Kamakiri - Authorizing the device Ok...
29.03.2023 02:43:51 - DTpro - Successfully sent payload: C:\Users\bio hazard\Desktop\Yeni klas+Âr\Mediatek _v4.0.0.00070DRAM\File\mtkclient\payloads\mt6739_payload.bin
Port - Device detected
Main
Main - [LIB]: [33mDevice is in BROM mode. No preloader given, trying to dump preloader from ram.[0m
29.03.2023 02:43:52 - Successfully extracted preloader for this device to: C:\Users\bio hazard\Desktop\Yeni klas+Âr\Mediatek _v4.0.0.00070DRAM\File\mtkclient\Loader\Preloader\preloader_fd3901.bin
DAXFlash - Uploading stage 1 from MTK_AllInOne_DA_5.1420.bin
29.03.2023 02:43:53 - DAXFlash - Successfully uploaded stage 1, jumping ..
Preloader - Jumping to 0x200000
Preloader - Jumping to 0x200000: ok.
DAXFlash - Successfully received DA sync
29.03.2023 02:43:53 - DAXFlash - Sending emi data ...
DAXFlash - Sending emi data succeeded.
DAXFlash - Uploading stage 2...
29.03.2023 02:43:55 - DAXFlash - Successfully uploaded stage 2
DAXFlash - EMMC FWVer: 0x0
DAXFlash - EMMC ID: FE62MB
DAXFlash - EMMC CID: 150100464536324d42037f15acff45b1
DAXFlash - EMMC Boot1 Size: 0x400000
DAXFlash - EMMC Boot2 Size: 0x400000
DAXFlash - EMMC GP1 Size: 0x0
DAXFlash - EMMC GP2 Size: 0x0
DAXFlash - EMMC GP3 Size: 0x0
DAXFlash - EMMC GP4 Size: 0x0
DAXFlash - EMMC RPMB Size: 0x400000
DAXFlash - EMMC USER Size: 0x3a3e00000
29.03.2023 02:43:55 - DAXFlash - DA-CODE : 0x999F0
29.03.2023 02:43:56 - DAXFlash - DA Extensions successfully added
29.03.2023 02:43:56 - DAXFlash - Wiping addr 0x2d88000 with length 0x100000, please wait....
DAXFlash - Successsfully Wiped addr 0x2d88000 with length 1048576.
Wiped sector 93248 with sector count 2048.
29.03.2023 02:43:56 - Frp lock Zone formated | Frp erase done!