NCK Online Tool MTK Preloader Module v0.3.3 Released - [13/12/2025]

Fast Unlocking

Administrator
Admin
UACXgZM.png



What’s New?


Added

- Bypass brom security for connecting in Meta mode
(same as brom security bypass for flash mode)

- Backup/restore NVRam in meta mode for supported phones

- Read flash slot info.

- Detection of EROFS filesystem
Exe will auto detect filesystem and will read info.


Improved

- Read info in meta mode for supported phones.

- Rewritten security backup function, buid.prop if exists and
software log will be saved together with backup.

- Rewritten wipe function to avoid dead phone.

- Rewritten change flash slot, was error for some phones.

- Read info, exe will display dynamic partitions fs type also now.





Official Website:

NCK Online Tool - Best Mobile Servicing Tool


For Help & FAQ Specially how to use PC Reset MUST READ

https://nckonlinetool.com/faq/

in Case of you changing pc without following the needed steps, it will result of you having to wait few days of verifications.


Download from Support Page, or From Downloads Page.


https://nckonlinetool.com/supported-models/downloads-2/


Telegram Channel

https://t.me/+gLpNIlDOub9iOWU0

Password For installer: NckTeam

 
orbita Whatsapp ciobanus, [07/12/2025 7:40 PM]
Job: Read Info
Brand: INFINIX
Model : Note 12 2023[X676C]

Expected connection: BROM or PRELOADER
Connect USB Cable to turned off device.
Some device may need you to hold VOL UP/DOWN while connecting.
Waiting for device...Found
Port Info : MediaTek PreLoader USB VCOM (Android) (COM11) [\\?\usb#vid_0e8d&pid_2000#5&4f9223b&0&8#{a5dcbf10-6530-11d2-901f-00c04fb951ed}]
: MediaTek Inc., 3.0.1512.0 [usb2ser.sys]
: PRELOADER PORT
Helio Boot Exploit
HW ID : MT6789 [1208] MTK Helio G99
HW VER : 8A00,CA00,0000
Sec. Cfg : [SBA Active] [SLA Inactive] [DAA Active]
MEID : 00B9887587C232CC490D1C8A95ECBED6
SoC ID[0] : FEF52EB4A1B6AEF3AF09C63595FD9C2A
SoC ID[1] : 6A63C89BE8E5D517A4DA37618D2CBE91
Patched hash binding.
Sending DA1...Done
Running DA1...Done
V6 Protocol Detected!
Reading Hardware Information...OK
EXT_RAM Not Initialized!
Setup Hardware Init...OK
Reading Hardware Information...OK
VERSION : 1.2
RNDM_ID : ff084737d59d71f775c89e9728d26cd5
PROD_ID
RAM_SIZE : 0x200000000 [8 GB]
STORAGE : KM8F9001JM-B813
BLOCK_SIZE : 0x1000
BOOT1 SIZE : 0x0000000000400000 [4 MB]
BOOT2 SIZE : 0x0000000000400000 [4 MB]
USER SIZE : 0x0000003B96000000 [238,34 GB]
RPMB SIZE : 0x0000000000000000 [ bytes]
Executing Exploit...Done
Sending DA2...Done
SLA: ENABLED
rnd: 69192A6069192A6069192A6069192A60
Performing Rsa Authorization...
DAA Authentification: OK
Life-Cycle : OK

Reading Parititon Info...
PartName: boot_para Begin: 0x8000 Length: 0x100000
PartName: proinfo Begin: 0x108000 Length: 0x300000
PartName: misc Begin: 0x408000 Length: 0x80000
PartName: para Begin: 0x488000 Length: 0x80000
PartName: expdb Begin: 0x508000 Length: 0x8000000
PartName: frp Begin: 0x8508000 Length: 0x100000
PartName: nvcfg Begin: 0x8608000 Length: 0x2000000
PartName: nvdata Begin: 0xA608000 Length: 0x4000000
PartName: tkv_a Begin: 0xE608000 Length: 0x100000
PartName: vbmeta_a Begin: 0xE708000 Length: 0x800000
PartName: vbmeta_system_a Begin: 0xEF08000 Length: 0x800000
PartName: vbmeta_vendor_a Begin: 0xF708000 Length: 0x800000
PartName: tkv_b Begin: 0xFF08000 Length: 0x100000
PartName: vbmeta_b Begin: 0x10008000 Length: 0x800000
PartName: vbmeta_system_b Begin: 0x10808000 Length: 0x800000
PartName: vbmeta_vendor_b Begin: 0x11008000 Length: 0x800000
PartName: metadata Begin: 0x11808000 Length: 0x2000000
PartName: persist Begin: 0x13808000 Length: 0x37F8000
PartName: protect1 Begin: 0x17000000 Length: 0x800000
PartName: protect2 Begin: 0x17800000 Length: 0x800000
PartName: seccfg Begin: 0x18000000 Length: 0x800000
PartName: otp Begin: 0x18800000 Length: 0x3000000
PartName: md1img_a Begin: 0x1B800000 Length: 0xC800000
PartName: spmfw_a Begin: 0x28000000 Length: 0x100000
PartName: pi_img_a Begin: 0x28100000 Length: 0x100000
PartName: dpm_a Begin: 0x28200000 Length: 0x400000
PartName: scp_a Begin: 0x28600000 Length: 0x600000
PartName: sspm_a Begin: 0x28C00000 Length: 0x100000
PartName: mcupm_a Begin: 0x28D00000 Length: 0x100000
PartName: gz_a Begin: 0x28E00000 Length: 0x2000000
PartName: lk_a Begin: 0x2AE00000 Length: 0x400000
PartName: logo_a Begin: 0x2B200000 Length: 0x1800000
PartName: boot_a Begin: 0x2CA00000 Length: 0x4000000
PartName: vendor_boot_a Begin: 0x30A00000 Length: 0x4000000
PartName: dtbo_a Begin: 0x34A00000 Length: 0x800000
PartName: tee_a Begin: 0x35200000 Length: 0x500000
PartName: sec1 Begin: 0x35700000 Length: 0x200000
PartName: efuse Begin: 0x35900000 Length: 0x80000
PartName: nvram Begin: 0x35980000 Length: 0x4000000
PartName: dram_para Begin: 0x39980000 Length: 0x1900000
PartName: connsys_bt_a Begin: 0x3B280000 Length: 0x800000
PartName: connsys_wifi_a Begin: 0x3BA80000 Length: 0x800000
PartName: connsys_gnss_a Begin: 0x3C280000 Length: 0xD80000
PartName: md1img_b Begin: 0x3D000000 Length: 0xC800000
PartName: spmfw_b Begin: 0x49800000 Length: 0x100000
PartName: pi_img_b Begin: 0x49900000 Length: 0x100000
PartName: dpm_b Begin: 0x49A00000 Length: 0x400000
PartName: scp_b Begin: 0x49E00000 Length: 0x600000
PartName: sspm_b Begin: 0x4A400000 Length: 0x100000
PartName: mcupm_b Begin: 0x4A500000 Length: 0x100000
PartName: gz_b Begin: 0x4A600000 Length: 0x2000000
PartName: lk_b Begin: 0x4C600000 Length: 0x400000
PartName: logo_b Begin: 0x4CA00000 Length: 0x1800000
PartName: boot_b Begin: 0x4E200000 Length: 0x4000000
PartName: vendor_boot_b Begin: 0x52200000 Length: 0x4000000
PartName: connsys_bt_b Begin: 0x56200000 Length: 0x800000
PartName: connsys_wifi_b Begin: 0x56A00000 Length: 0x800000
PartName: connsys_gnss_b Begin: 0x57200000 Length: 0x800000
PartName: dtbo_b Begin: 0x57A00000 Length: 0x800000
PartName: tee_b Begin: 0x58200000 Length: 0x600000
PartName: super Begin: 0x58800000 Length: 0x293214000
PartName: tranfs Begin: 0x2EBA14000 Length: 0x12DEC000
PartName: userdata Begin: 0x2FE800000 Length: 0x38967F8000
PartName: flashinfo Begin: 0x3B94FF8000 Length: 0x1000000OK
Active flash slot: _a

SuperPartList: odm_dlkm_a begin: 0x58900000 FS: EXT4
SuperPartList: odm_dlkm_b begin: 0x58A00000 FS: EROFS
SuperPartList: product_a begin: 0x58A00000 FS: EROFS
SuperPartList: product_b begin: 0xD0700000 FS: EROFS
SuperPartList: system_a begin: 0xD0700000 FS: EROFS
SuperPartList: system_b begin: 0xFAB00000 FS: EROFS
SuperPartList: system_ext_a begin: 0xFAB00000 FS: EROFS
SuperPartList: system_ext_b begin: 0x168C00000 FS: EROFS
SuperPartList: vendor_a begin: 0x168C00000 FS: EROFS
SuperPartList: vendor_b begin: 0x1A3C00000 FS: EXT4
SuperPartList: vendor_dlkm_a begin: 0x1A3C00000 FS: EXT4
SuperPartList: vendor_dlkm_b begin: 0x58800000 FS: RAW
Reading info

***************
Manufacturer: INFINIX
Brand: Infinix
Device: Infinix-X676C
Model: Infinix X676C
Name: X676C-OP
Build ID: SP1A.210812.016
Android Version: 12
SDK: 31


IMEI 1: 350350240521xxx
IMEI 2: 350350240521xxx
Process finished
[NCK Online MTK Exploit Tool v0.3.3]
LOG TXT : 20251207_173945.txt
 
Back
Top