orbita Whatsapp ciobanus, [07/12/2025 7:40 PM]
Job: Read Info
Brand: INFINIX
Model : Note 12 2023[X676C]
Expected connection: BROM or PRELOADER
Connect USB Cable to turned off device.
Some device may need you to hold VOL UP/DOWN while connecting.
Waiting for device...Found
Port Info : MediaTek PreLoader USB VCOM (Android) (COM11) [\\?\usb#vid_0e8d&pid_2000#5&4f9223b&0&8#{a5dcbf10-6530-11d2-901f-00c04fb951ed}]
: MediaTek Inc., 3.0.1512.0 [usb2ser.sys]
: PRELOADER PORT
Helio Boot Exploit
HW ID : MT6789 [1208] MTK Helio G99
HW VER : 8A00,CA00,0000
Sec. Cfg : [SBA Active] [SLA Inactive] [DAA Active]
MEID : 00B9887587C232CC490D1C8A95ECBED6
SoC ID[0] : FEF52EB4A1B6AEF3AF09C63595FD9C2A
SoC ID[1] : 6A63C89BE8E5D517A4DA37618D2CBE91
Patched hash binding.
Sending DA1...Done
Running DA1...Done
V6 Protocol Detected!
Reading Hardware Information...OK
EXT_RAM Not Initialized!
Setup Hardware Init...OK
Reading Hardware Information...OK
VERSION : 1.2
RNDM_ID : ff084737d59d71f775c89e9728d26cd5
PROD_ID
RAM_SIZE : 0x200000000 [8 GB]
STORAGE : KM8F9001JM-B813
BLOCK_SIZE : 0x1000
BOOT1 SIZE : 0x0000000000400000 [4 MB]
BOOT2 SIZE : 0x0000000000400000 [4 MB]
USER SIZE : 0x0000003B96000000 [238,34 GB]
RPMB SIZE : 0x0000000000000000 [ bytes]
Executing Exploit...Done
Sending DA2...Done
SLA: ENABLED
rnd: 69192A6069192A6069192A6069192A60
Performing Rsa Authorization...
DAA Authentification: OK
Life-Cycle : OK
Reading Parititon Info...
PartName: boot_para Begin: 0x8000 Length: 0x100000
PartName: proinfo Begin: 0x108000 Length: 0x300000
PartName: misc Begin: 0x408000 Length: 0x80000
PartName: para Begin: 0x488000 Length: 0x80000
PartName: expdb Begin: 0x508000 Length: 0x8000000
PartName: frp Begin: 0x8508000 Length: 0x100000
PartName: nvcfg Begin: 0x8608000 Length: 0x2000000
PartName: nvdata Begin: 0xA608000 Length: 0x4000000
PartName: tkv_a Begin: 0xE608000 Length: 0x100000
PartName: vbmeta_a Begin: 0xE708000 Length: 0x800000
PartName: vbmeta_system_a Begin: 0xEF08000 Length: 0x800000
PartName: vbmeta_vendor_a Begin: 0xF708000 Length: 0x800000
PartName: tkv_b Begin: 0xFF08000 Length: 0x100000
PartName: vbmeta_b Begin: 0x10008000 Length: 0x800000
PartName: vbmeta_system_b Begin: 0x10808000 Length: 0x800000
PartName: vbmeta_vendor_b Begin: 0x11008000 Length: 0x800000
PartName: metadata Begin: 0x11808000 Length: 0x2000000
PartName: persist Begin: 0x13808000 Length: 0x37F8000
PartName: protect1 Begin: 0x17000000 Length: 0x800000
PartName: protect2 Begin: 0x17800000 Length: 0x800000
PartName: seccfg Begin: 0x18000000 Length: 0x800000
PartName: otp Begin: 0x18800000 Length: 0x3000000
PartName: md1img_a Begin: 0x1B800000 Length: 0xC800000
PartName: spmfw_a Begin: 0x28000000 Length: 0x100000
PartName: pi_img_a Begin: 0x28100000 Length: 0x100000
PartName: dpm_a Begin: 0x28200000 Length: 0x400000
PartName: scp_a Begin: 0x28600000 Length: 0x600000
PartName: sspm_a Begin: 0x28C00000 Length: 0x100000
PartName: mcupm_a Begin: 0x28D00000 Length: 0x100000
PartName: gz_a Begin: 0x28E00000 Length: 0x2000000
PartName: lk_a Begin: 0x2AE00000 Length: 0x400000
PartName: logo_a Begin: 0x2B200000 Length: 0x1800000
PartName: boot_a Begin: 0x2CA00000 Length: 0x4000000
PartName: vendor_boot_a Begin: 0x30A00000 Length: 0x4000000
PartName: dtbo_a Begin: 0x34A00000 Length: 0x800000
PartName: tee_a Begin: 0x35200000 Length: 0x500000
PartName: sec1 Begin: 0x35700000 Length: 0x200000
PartName: efuse Begin: 0x35900000 Length: 0x80000
PartName: nvram Begin: 0x35980000 Length: 0x4000000
PartName: dram_para Begin: 0x39980000 Length: 0x1900000
PartName: connsys_bt_a Begin: 0x3B280000 Length: 0x800000
PartName: connsys_wifi_a Begin: 0x3BA80000 Length: 0x800000
PartName: connsys_gnss_a Begin: 0x3C280000 Length: 0xD80000
PartName: md1img_b Begin: 0x3D000000 Length: 0xC800000
PartName: spmfw_b Begin: 0x49800000 Length: 0x100000
PartName: pi_img_b Begin: 0x49900000 Length: 0x100000
PartName: dpm_b Begin: 0x49A00000 Length: 0x400000
PartName: scp_b Begin: 0x49E00000 Length: 0x600000
PartName: sspm_b Begin: 0x4A400000 Length: 0x100000
PartName: mcupm_b Begin: 0x4A500000 Length: 0x100000
PartName: gz_b Begin: 0x4A600000 Length: 0x2000000
PartName: lk_b Begin: 0x4C600000 Length: 0x400000
PartName: logo_b Begin: 0x4CA00000 Length: 0x1800000
PartName: boot_b Begin: 0x4E200000 Length: 0x4000000
PartName: vendor_boot_b Begin: 0x52200000 Length: 0x4000000
PartName: connsys_bt_b Begin: 0x56200000 Length: 0x800000
PartName: connsys_wifi_b Begin: 0x56A00000 Length: 0x800000
PartName: connsys_gnss_b Begin: 0x57200000 Length: 0x800000
PartName: dtbo_b Begin: 0x57A00000 Length: 0x800000
PartName: tee_b Begin: 0x58200000 Length: 0x600000
PartName: super Begin: 0x58800000 Length: 0x293214000
PartName: tranfs Begin: 0x2EBA14000 Length: 0x12DEC000
PartName: userdata Begin: 0x2FE800000 Length: 0x38967F8000
PartName: flashinfo Begin: 0x3B94FF8000 Length: 0x1000000OK
Active flash slot: _a
SuperPartList: odm_dlkm_a begin: 0x58900000 FS: EXT4
SuperPartList: odm_dlkm_b begin: 0x58A00000 FS: EROFS
SuperPartList: product_a begin: 0x58A00000 FS: EROFS
SuperPartList: product_b begin: 0xD0700000 FS: EROFS
SuperPartList: system_a begin: 0xD0700000 FS: EROFS
SuperPartList: system_b begin: 0xFAB00000 FS: EROFS
SuperPartList: system_ext_a begin: 0xFAB00000 FS: EROFS
SuperPartList: system_ext_b begin: 0x168C00000 FS: EROFS
SuperPartList: vendor_a begin: 0x168C00000 FS: EROFS
SuperPartList: vendor_b begin: 0x1A3C00000 FS: EXT4
SuperPartList: vendor_dlkm_a begin: 0x1A3C00000 FS: EXT4
SuperPartList: vendor_dlkm_b begin: 0x58800000 FS: RAW
Reading info
***************
Manufacturer: INFINIX
Brand: Infinix
Device: Infinix-X676C
Model: Infinix X676C
Name: X676C-OP
Build ID: SP1A.210812.016
Android Version: 12
SDK: 31
IMEI 1: 350350240521xxx
IMEI 2: 350350240521xxx
Process finished
[NCK Online MTK Exploit Tool v0.3.3]
LOG TXT : 20251207_173945.txt