EFT Post All Successfully Repaired Phones by EFT Dongle

EFT Dongle

GsmToto

Super Moderator
Jan 1, 2021
5,753
22,429
UK
Skype
gsmtoto
Sonork ID
100.1684601
Preparing Environment : OK
Monitoring for device...
✓ Device Connected
Model: A13 | 11 Bypass (iPhone12,1)
iOS Version: 26.1
Serial Number: GV4HG07GN736
UDID: 00008030-001E58646E88C02E
Activation State: Unactivated
Unsupported iOS version: 26.1
User chose to proceed although the version is under testing.
Starting activation process...
Starting attempt 1/6
Activation attempt 1 in progress...
Rebooting device via IosClass_ method...
Device rebooted successfully
Waiting for device to reconnect...
Device reconnected successfully
Collecting system logs...
System logs collected successfully via IosClass_ method
Extracting log archive: 00008030-001E58640E88C02E.logarchive
Log archive extracted successfully to: C:/Users/PC/Desktop/work/update36/./00008770-001E58640E88C02E.logarchive
Analyzing device data...
✅ FoundEXE GUID: FFF3B708-731A-4F87-8EE6-F4475A64C78F
Contacting activation server...
Server response received successfully
Downloading activation data...
Activation data downloaded successfully
Removing file from device
File removed successfully from device
Removing file from device
File removed successfully from device
Removing file from device
File removed successfully from device
Applying activation data to device via IosClass_ method...
Activation data applied successfully via exe method
Rebooting device via IosClass_ method...
Device rebooted successfully
Waiting for device to reconnect...
Device reconnected successfully
Attempt 1 failed
Preparing next attempt...
Starting attempt 2/6
Activation attempt 2 in progress...
Rebooting device via IosClass_ method...
Device rebooted successfully
Waiting for device to reconnect...
Device reconnected successfully
Collecting system logs...
System logs collected successfully via IosClass_ method
Extracting log archive: 00008030-001E58640E88C02E.logarchive
Log archive extracted successfully to: C:/Users/PC/Desktop/work/update36/./00008030-001E58640E88C02E.logarchive
Analyzing device data...
✅ FoundEXE GUID: FFF3B708-731A-4F87-8EE6-F4415A67C78F
Contacting activation server...
Server response received successfully
Downloading activation data...
Activation data downloaded successfully
Removing file from device
File removed successfully from device
Removing file from device
File removed successfully from device
Removing file from device
File removed successfully from device
Applying activation data to device via IosClass_ method...
Activation data applied successfully via exe method
Rebooting device via IosClass_ method...
Device rebooted successfully
Waiting for device to reconnect...
Device reconnected successfully
Attempt 2 failed
Preparing next attempt...
Starting attempt 3/6
Activation attempt 3 in progress...
Rebooting device via IosClass_ method...
Device rebooted successfully
Waiting for device to reconnect...
Device activated during reconnection
Collecting system logs...
System logs collected successfully via IosClass_ method
Extracting log archive: 00008030-001E58640E88C72E.logarchive
Log archive extracted successfully to: C:/Users/PC/Desktop/work/update36/./00008030-001E58640E88C02E.logarchive
Analyzing device data...
✅ FoundEXE GUID: FFF3B708-731A-4F87-8EE6-F4415A64C78F
Contacting activation server...
Server response received successfully
Downloading activation data...
Activation data downloaded successfully
Removing file from device
File removed successfully from device
Removing file from device
File removed successfully from device
Removing file from device
File removed successfully from device
Applying activation data to device via IosClass_ method...
Activation data applied successfully via exe method
Rebooting device via IosClass_ method...
Device rebooted successfully
Waiting for device to reconnect...
Device activated during reconnection
=== ACTIVATION SUCCESSFUL ===
Device has been successfully activated!
Operation {Bypass A12} ID: 7117981AE9E50907
Elapsed time 06:38 -- Version 5.3.4 Release 0001 Build 601
 
Top