EFT Post All Successfully Repaired Phones by EFT Dongle

EFT Dongle

GsmToto

Super Moderator
Jan 1, 2021
5,807
22,450
UK
Skype
gsmtoto
Sonork ID
100.1684601
Preparing Environment : OK
Monitoring for device...
✓ Device Connected
Model: A13 | 11 Bypass (iPhone12,1)
iOS Version: 26.1
Serial Number: GV4HG07GN736
UDID: 00008030-001E58646E88C02E
Activation State: Unactivated
Unsupported iOS version: 26.1
User chose to proceed although the version is under testing.
Starting activation process...
Starting attempt 1/6
Activation attempt 1 in progress...
Rebooting device via IosClass_ method...
Device rebooted successfully
Waiting for device to reconnect...
Device reconnected successfully
Collecting system logs...
System logs collected successfully via IosClass_ method
Extracting log archive: 00008030-001E58640E88C02E.logarchive
Log archive extracted successfully to: C:/Users/PC/Desktop/work/update36/./00008770-001E58640E88C02E.logarchive
Analyzing device data...
✅ FoundEXE GUID: FFF3B708-731A-4F87-8EE6-F4475A64C78F
Contacting activation server...
Server response received successfully
Downloading activation data...
Activation data downloaded successfully
Removing file from device
File removed successfully from device
Removing file from device
File removed successfully from device
Removing file from device
File removed successfully from device
Applying activation data to device via IosClass_ method...
Activation data applied successfully via exe method
Rebooting device via IosClass_ method...
Device rebooted successfully
Waiting for device to reconnect...
Device reconnected successfully
Attempt 1 failed
Preparing next attempt...
Starting attempt 2/6
Activation attempt 2 in progress...
Rebooting device via IosClass_ method...
Device rebooted successfully
Waiting for device to reconnect...
Device reconnected successfully
Collecting system logs...
System logs collected successfully via IosClass_ method
Extracting log archive: 00008030-001E58640E88C02E.logarchive
Log archive extracted successfully to: C:/Users/PC/Desktop/work/update36/./00008030-001E58640E88C02E.logarchive
Analyzing device data...
✅ FoundEXE GUID: FFF3B708-731A-4F87-8EE6-F4415A67C78F
Contacting activation server...
Server response received successfully
Downloading activation data...
Activation data downloaded successfully
Removing file from device
File removed successfully from device
Removing file from device
File removed successfully from device
Removing file from device
File removed successfully from device
Applying activation data to device via IosClass_ method...
Activation data applied successfully via exe method
Rebooting device via IosClass_ method...
Device rebooted successfully
Waiting for device to reconnect...
Device reconnected successfully
Attempt 2 failed
Preparing next attempt...
Starting attempt 3/6
Activation attempt 3 in progress...
Rebooting device via IosClass_ method...
Device rebooted successfully
Waiting for device to reconnect...
Device activated during reconnection
Collecting system logs...
System logs collected successfully via IosClass_ method
Extracting log archive: 00008030-001E58640E88C72E.logarchive
Log archive extracted successfully to: C:/Users/PC/Desktop/work/update36/./00008030-001E58640E88C02E.logarchive
Analyzing device data...
✅ FoundEXE GUID: FFF3B708-731A-4F87-8EE6-F4415A64C78F
Contacting activation server...
Server response received successfully
Downloading activation data...
Activation data downloaded successfully
Removing file from device
File removed successfully from device
Removing file from device
File removed successfully from device
Removing file from device
File removed successfully from device
Applying activation data to device via IosClass_ method...
Activation data applied successfully via exe method
Rebooting device via IosClass_ method...
Device rebooted successfully
Waiting for device to reconnect...
Device activated during reconnection
=== ACTIVATION SUCCESSFUL ===
Device has been successfully activated!
Operation {Bypass A12} ID: 7117981AE9E50907
Elapsed time 06:38 -- Version 5.3.4 Release 0001 Build 601
 
  • Like
Reactions: Nhattycake

khanmoien

Junior Member


Note : Don't create new threads for successful posts. Post all successful post here. Try to post results with screen shorts & texts etc. Thanks
I.o.s 26.2 when will the spot happen
 
  • Like
Reactions: Nhattycake

GsmToto

Super Moderator
Jan 1, 2021
5,807
22,450
UK
Skype
gsmtoto
Sonork ID
100.1684601
Waiting For Device Connection...
USB PORT: MediaTek USB Port (COM8)
Port: MediaTek USB Port (COM8)
Manufacturer: MediaTek Inc.
OPEN COM PORT... OK
Handshake... OK
Analyzing server data...... OK
Read CHIP ID... OK
HW-CODE: 0X707
CPU: MT6768
Read Chip Version... OK
HW-SUBCODE: 0X8A00
HW-VERSION: 0XCA00
SW-VERSION: 0X0000
Read Phone Configuration... OK
Bypass Security Protection... OK
Dump EMI Config... OK
Send Protection Files BROM... OK
Check BROM status... OK
Setup DEVICE... OK
Init HARDWARE... OK
Setup DEVICE... OK
Read DEVICE Status... BROM
Load emi config from customize model... OK
Init EXT RAM... OK
Send Download Agent... OK
Send Download Agent Extended... OK
Random key: 00000000000000000000000000000000
Sla Version: 12345678 >> 2018915346
Read Device Info... OK
EMMC INFO:
EMMC Boot1 Size: 4.00 MB
EMMC Boot2 Size: 4.00 MB
EMMC RPMB Size: 4.00 MB
EMMC USER Size: 29.12 GB
EMMC CID: 150100444436384D4202579EE46057EF
RAM INFO:
SRAM Size: 448.00 KB
DRAM Size: 4.00 GB
CHANGE TO HIGH-SPEED PORT... OK
Server ... OK
Get Partition ... OK
Read Build Prop Info... OK
Brand: REDMI
Model: LANCELOT
Product: LANCELOT
Manufacturer: XIAOMI
Android Version: 12
Security Patch: 2022-10-01
Build ID: SP1A.210812.016
Build Date: TUE NOV 15 11:39:40 CST 2022
Display ID: SP1A.210812.016
MIUI Build: V13.0.1.0.SJCEUXM
MIUI Version: 13
Read Internal Storage Info... OK
USERDATA: 19.37 GB
USERDATA: ENCRYPTED
Prepare data... OK
RESET FRP... OK
Finalize... OK
Reboot... OK
Elapsed Time: 14 secs, 172 msecs
 

GsmToto

Super Moderator
Jan 1, 2021
5,807
22,450
UK
Skype
gsmtoto
Sonork ID
100.1684601
Connecting to device.....OK
Reading device info.....OK
Baseband Version: A320FLXXS9CTK1
Serial Number: RF8JB11J6TR
Device Arch: exynos7870
Device bootloader: A320FLXXS9CTK1
Device selinux: enforcing
Device warranty bit: 0
Device Firmware: A320FLXXS9CTK1
Android version: 8.0.0
Device SDK: 26
Device data encryption: encrypted
Firmware Country: Germany
Device Hardware: samsungexynos7870
Device CPU: armeabi-v7a
Device Factory: samsung
Device Model: SM-A320FL
Device IMEI: 353118096739373
Root status.....Not Rooted
Resetting FRP.....OK
Operation {Remove FRP Direct} ID: 8B11A69F8FF93219
Elapsed time 01:47 -- Version 5.3.6 Release 0001 Build 608
 

GsmToto

Super Moderator
Jan 1, 2021
5,807
22,450
UK
Skype
gsmtoto
Sonork ID
100.1684601
Waiting for device...
Download port: MediaTek PreLoader USB VCOM (Android) (COM68)
Port: MediaTek PreLoader USB VCOM (Android) (COM68)
Manufacturer: MediaTek Inc.
Connect to comport... OK
Reboot to meta mode... OK
Waiting for server........ OK
Wait for meta device... OK
Connect to meta device... OK
read Modem Info... OK
switch To Modem... OK
Read device info... OK
BRAND: INFINIX
MODEL: INFINIX X6531B
PRODUCT: X6531B-OP
MANUFACTURER: INFINIX
ANDROID VERSION: 14
SECURITY PATCHED: 2025-02-05
BUILD ID: UP1A.231005.007
DISPLAY ID: X6531B-V631BAEAFAGAHAIAJAKAMANAOAP-U-OP-250214V951
BUILD DATE: FRI FEB 14 21:33:50 CST 2025
BUILD: 250214V951
Load modem db data... OK
Init modem db data... OK
Init modem db data... OK
+Enable Adb.......
step1....... OK
Reboot... OK
Waiting adb Device....... OK
Reset FRP....... OK
Reboot....... OK
Elapsed Time: 2 mins, 3 secs, 745 msecs
 

GsmToto

Super Moderator
Jan 1, 2021
5,807
22,450
UK
Skype
gsmtoto
Sonork ID
100.1684601
Waiting For Device Connection...
USB PORT: MediaTek USB Port_V1632 (COM3)
Port: MediaTek USB Port_V1632 (COM3)
Manufacturer: MediaTek Inc.
OPEN COM PORT... OK
Handshake... OK
Analyzing server data...... OK
Read CHIP ID... OK
HW-CODE: 0X989
CPU: MT6833
Read Chip Version... OK
HW-SUBCODE: 0X8A00
HW-VERSION: 0XCA00
SW-VERSION: 0X0000
Read Phone Configuration... OK
Bypass Security Protection... OK
Dump EMI Config... OK
Send Protection Files BROM... OK
Check BROM status... OK
Setup DEVICE... OK
Init HARDWARE... FAIL
[PORT ERR] OVERLAPPED I/O OPERATION IS IN PROGRESS
 

GsmToto

Super Moderator
Jan 1, 2021
5,807
22,450
UK
Skype
gsmtoto
Sonork ID
100.1684601
Waiting for server.....OK
Searching for Qualcomm 9008 port.....Detected {COM7}
Loading Programmer.....OK
Setting up.....OK
Reading hardware info.....OK
Serial number: 0x69ed6514
Hardware ID: 0x0004f0e1
OEM Private key: 0x1a6ba5b80b9e7851d7656c7c9f74e63925a4ab6d2b664595 f3dab1c2e3c4b250
Software version: 0x00000000
Sending programmer.....OK
Reading partitions.....OK
Reading prop info.....100%OK
Device Firmware: amigo5.0.13S.1H
Android version: 7.1.1
Device SDK: 25
Device Factory: GIONEE
Device CPU: arm64-v8a
Device Factory: GIONEE
Device Model: GIONEE S11 lite
Resetting FRP.....OK
Rebooting device.....OK
Operation {Reset FRP} ID: 07709843D5341CB6
Elapsed time 00:12 -- Version 5.3.6 Release 0001 Build 608
 

GsmToto

Super Moderator
Jan 1, 2021
5,807
22,450
UK
Skype
gsmtoto
Sonork ID
100.1684601
Checking fastboot device.....OK
Reading info.....OK
Device Model: TRT-LX1
Device Serial: J5Y7N17915002708
Device IMEI: 864875034033956
Device Firmware: TRT-LX1C432B184
Device Lock: Image is origin | Verify mode is enforcing | Check root info is safe | Lock state is lock | Root State: UNROOT
Waiting for server.....OK
Reading data.....OK
Posting data to server.....OK
Waiting for server response.....OK
Unlocking device.....OK
Resetting FRP.....OK
Operation {Reset FRP using server} ID: 39DF1C29DEBEA6DC
Elapsed time 00:11 -- Version 5.3.6 Release 0001 Build 608
 

GsmToto

Super Moderator
Jan 1, 2021
5,807
22,450
UK
Skype
gsmtoto
Sonork ID
100.1684601
Wait For Device...
Download port: HUAWEI USB COM 1.0 (COM7)
Port: HUAWEI USB COM 1.0 (COM7)
Manufacturer: HUAWEI Incorporated
Waiting for server........ OK
Connect to comport... OK
Handshake... OK
Writing loaders:
Write Loader1... OK
Write Loader2... OK
Wait For Fastboot Device... OK
Connect To Fastboot Device... OK
Device Model: AGS2-W09
Device Serial: V4QBB19320150943
Device IMEI: V4QBB19320150943
Device Firmware: :AGS2-W09 8.0.0.371(OCEC432)
Device FB Lock: UNLOCKED
Device USER Lock: LOCKED
Device Lock: unlocked
Remove frp lock... OK
 
Top