Offline
Exe version: NCKBox AndroidMTK 2.9.5
Selected model: Alcatel OT-V720[MT6739]
Action: Unlock
Phone must be off with battery inside.
Battery must be charged
Please connect phone in brom mode
For some phones need to keep "VOL-" button untill inserting USB cable.
For some phones need to keep "VOL+ and VOL-" button untill inserting USB cable.
For some phones need to keep "VOL+" button untill inserting USB cable.
Detected(11) : MediaTek USB Port_V1632 (COM11)
[11] \\?\usb#vid_0e8d&pid_0003#7&3386638&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
CPU: MT6739 CPU code: 699 Target config: e7
Secure boot enabled: true
Need serial link authorization: true
Need download agent authorization true
Executing exploit, do not disconnect phone
Exploit has been executed successfully.
Waiting for handle to become active......
Reseived active handle repply from phone......
Booting phone
Detected(11) : MediaTek USB Port_V1632 (COM11)
USB\VID_0E8D&PID_0003\7&3386638&0&3
Detected(11) : MediaTek USB Port_V1632 (COM11)
[11] \\?\usb#vid_0e8d&pid_0003#7&3386638&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Starting META mode, wait...
Restarting to meta,wait....
If drivers missing, please install CDC drivers.
This can take up to 5 min on slow phones.
If take too long, check device manager for drivers.
[14]META Port Detected: MediaTek USB VCOM (Android) (COM14)
USB\VID_0E8D&PID_200E&MI_01\8&EE58868&0&0001
Start sync target, waiting responce.....
ChipID: MT6739
[MT6739]Using Algo 5
Start sync target, waiting responce.....
[META]BaseBand CPU : MT6739
[META]SW_VER : MOLY.LR12A.R3.MP.V65.2.P2
[META]HW_VER : TK_MD_BASIC_HW
[helio]Read simlock info.
IMEI Location: OTP
Phone imei[1] : 015608003906651
Start direct unlock[SIM1]
Simlock checksum is ok.
Direct unlock done
[0]All done.
Selected model: Alcatel OT-V720[MT6739]
Action: Unlock
Phone must be off with battery inside.
Battery must be charged
Please connect phone in brom mode
For some phones need to keep "VOL-" button untill inserting USB cable.
For some phones need to keep "VOL+ and VOL-" button untill inserting USB cable.
For some phones need to keep "VOL+" button untill inserting USB cable.
Detected(11) : MediaTek USB Port_V1632 (COM11)
[11] \\?\usb#vid_0e8d&pid_0003#7&3386638&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
CPU: MT6739 CPU code: 699 Target config: e7
Secure boot enabled: true
Need serial link authorization: true
Need download agent authorization true
Executing exploit, do not disconnect phone
Exploit has been executed successfully.
Waiting for handle to become active......
Reseived active handle repply from phone......
Booting phone
Detected(11) : MediaTek USB Port_V1632 (COM11)
USB\VID_0E8D&PID_0003\7&3386638&0&3
Detected(11) : MediaTek USB Port_V1632 (COM11)
[11] \\?\usb#vid_0e8d&pid_0003#7&3386638&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Starting META mode, wait...
Restarting to meta,wait....
If drivers missing, please install CDC drivers.
This can take up to 5 min on slow phones.
If take too long, check device manager for drivers.
[14]META Port Detected: MediaTek USB VCOM (Android) (COM14)
USB\VID_0E8D&PID_200E&MI_01\8&EE58868&0&0001
Start sync target, waiting responce.....
ChipID: MT6739
[MT6739]Using Algo 5
Start sync target, waiting responce.....
[META]BaseBand CPU : MT6739
[META]SW_VER : MOLY.LR12A.R3.MP.V65.2.P2
[META]HW_VER : TK_MD_BASIC_HW
[helio]Read simlock info.
IMEI Location: OTP
Phone imei[1] : 015608003906651
Start direct unlock[SIM1]
Simlock checksum is ok.
Direct unlock done
[0]All done.