GSM Shop GSM Shop
GSM-Forum  

Welcome to the GSM-Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features.
Only registered members may post questions, contact other members or search our database of over 8 million posts.

Registration is fast, simple and absolutely free so please - Click to REGISTER!

If you have any problems with the registration process or your account login, please contact contact us .

Go Back   GSM-Forum > Product Support Sections > Hard/Software Products (official support) > EFT Dongle

Reply
 
LinkBack Thread Tools Display Modes
Old 08-01-2019, 15:47   #961 (permalink)
No Life Poster
 
Join Date: Oct 2006
Location: pakistan
Posts: 669
Member: 361094
Status: Offline
Sonork: 100.1597521
Thanks Meter: 173
Thumbs up y6 prime 2018 frp done


EFT Dongle Connecting Fastboot .......
Connecting Fastboot .......Ok
Model Phone: ATU-L31
SW: ATU-L31 8.0.0.152(C185)
Connecting Server .....RECEIVED
Connecting Server .....READY
Erase Done , The Device Will Reboot And Factory Reset
Reboot ...............OK
By EFT Dongle OK
  Reply With Quote
The Following 2 Users Say Thank You to nadim electro For This Useful Post:
Old 08-02-2019, 07:11   #962 (permalink)
No Life Poster
 
Join Date: Aug 2014
Posts: 658
Member: 2233266
Status: Offline
Thanks Meter: 252
samsung j710f frp done

Opening Port COM15...........OK
Verifying Download Mod
OK
Initialization.......OK
Reading Phone Partitation Table........OK
Partition Size : 8192
Unpak pit .......OK
FLASHING FIRMWARE TO PHONE.....
Sending data: ..........OK
FLASHING DONE!
Rebooting PDA TO NORMAL MODE........OK
Waiting For ADB Device.....Detecting Device Info.....DONE
Device Model: SM-J710F
Device CPU: armeabi-v7a
Android SDK: 24
Android Version: 7.0
Resetting Samsung Account / Frp .......OK
  Reply With Quote
The Following User Says Thank You to Yahia_Sb For This Useful Post:
Old 08-03-2019, 04:06   #963 (permalink)
No Life Poster
 
Join Date: Aug 2014
Posts: 658
Member: 2233266
Status: Offline
Thanks Meter: 252
samsung j701f-j7nex no data lose. pattern lock remove done 100%

Opening Port COM15...........OK
Verifying Download Mod
OK
Initialization.......OK
Reading Phone Partitation Table........OK
Partition Size : 8192
Unpak pit .......OK
FLASHING FIRMWARE TO PHONE.....
Sending data: ..........OK
FLASHING DONE!
Rebooting PDA TO NORMAL MODE........OK
Waiting For ADB Device.....Detecting Device Info.....DONE
Device Model: SM-J701F
Device CPU: armeabi-v7a
Android SDK: 27
Android Version: 8.1.0
Screen Lock reset .......OK
  Reply With Quote
The Following User Says Thank You to Yahia_Sb For This Useful Post:
Old 08-03-2019, 04:12   #964 (permalink)
No Life Poster
 
Join Date: Aug 2014
Posts: 658
Member: 2233266
Status: Offline
Thanks Meter: 252
samsung j701f j7 nex no data lose by eft dongle done 100%

Opening Port COM15...........OK
Verifying Download Mod
OK
Initialization.......OK
Reading Phone Partitation Table........OK
Partition Size : 8192
Unpak pit .......OK
FLASHING FIRMWARE TO PHONE.....
Sending data: ..........OK
FLASHING DONE!
Rebooting PDA TO NORMAL MODE........OK
Waiting For ADB Device.....Detecting Device Info.....DONE
Device Model: SM-J701F
Device CPU: armeabi-v7a
Android SDK: 27
Android Version: 8.1.0
Screen Lock reset .......OK
  Reply With Quote
The Following User Says Thank You to Yahia_Sb For This Useful Post:
Old 08-03-2019, 06:20   #965 (permalink)
No Life Poster
 
Join Date: Dec 2004
Location: Amoude-syria
Age: 49
Posts: 1,164
Member: 98928
Status: Offline
Thanks Meter: 474
j700h u2 FRP ON reset screen lock ok

her is the log:
Code:
Opening Port COM2659...........OK
Verifying Download Mod
OK
Initialization.......OK
Reading Phone Partitation Table........OK
Partition Size : 8192
Unpak pit .......OK
FLASHING FIRMWARE TO PHONE.....
Writing: Fix Patch1.......OK
Writing: Fix Patch2.......OK
FLASHING DONE!
Rebooting PDA TO NORMAL MODE........OK
  Reply With Quote
Old 08-04-2019, 14:41   #966 (permalink)
Product Supporter
 
dr_moosavi's Avatar
 
Join Date: Jul 2008
Location: iran-shiraz
Posts: 735
Member: 814775
Status: Offline
Sonork: 100.1587334
Thanks Meter: 973
Remove Screen Lock Encrypted Data Huawei Y5 2017 MYA-L22

Remove Screen Lock Encrypted Data Huawei Y5 2017 MYA-L22
Code:
Wating Device..........OK
CPU: MT6737T
Chip Version: 0x0000ca00
Chip Ext Clock: EXT_26M
Writing Mode..........OK
Internal RAM: 
Internal SRAM Size: 128.00 KB
External RAM: Type DRAM
External Ram Size: 2.00 GB
EMMC: 
EMMC PART BOOT1 Size: 4.00 MB
EMMC PART BOOT2 Size: 4.00 MB
EMMC PART RPMB Size: 4.00 MB
EMMC PART USER Size: 14.68 GB
Battery: 
Battery Voltage: 3958
Injection..........OK
Detecting Parts info............OK
[ID: 1] [preloader] BaseAddr(0x00000000) Size(0x00400000) 
[ID: 8] [pgpt] BaseAddr(0x00000000) Size(0x00080000) 
[ID: 8] [proinfo] BaseAddr(0x00080000) Size(0x00300000) 
[ID: 8] [nvram] BaseAddr(0x00380000) Size(0x00c80000) 
[ID: 8] [protect1] BaseAddr(0x01000000) Size(0x00a00000) 
[ID: 8] [protect2] BaseAddr(0x01a00000) Size(0x00e00000) 
[ID: 8] [lk] BaseAddr(0x02800000) Size(0x00080000) 
[ID: 8] [lk2] BaseAddr(0x02880000) Size(0x00080000) 
[ID: 8] [para] BaseAddr(0x02900000) Size(0x00080000) 
[ID: 8] [boot] BaseAddr(0x02980000) Size(0x01000000) 
[ID: 8] [recovery] BaseAddr(0x03980000) Size(0x04000000) 
[ID: 8] [logo] BaseAddr(0x07980000) Size(0x00800000) 
[ID: 8] [expdb] BaseAddr(0x08180000) Size(0x00a00000) 
[ID: 8] [ROOTM] BaseAddr(0x08b80000) Size(0x00480000) 
[ID: 8] [seccfg] BaseAddr(0x09000000) Size(0x00800000) 
[ID: 8] [oemkeystore] BaseAddr(0x09800000) Size(0x00800000) 
[ID: 8] [secro] BaseAddr(0x0a000000) Size(0x00800000) 
[ID: 8] [keystore] BaseAddr(0x0a800000) Size(0x00800000) 
[ID: 8] [tee1] BaseAddr(0x0b000000) Size(0x00500000) 
[ID: 8] [tee2] BaseAddr(0x0b500000) Size(0x00500000) 
[ID: 8] [log] BaseAddr(0x0ba00000) Size(0x04000000) 
[ID: 8] [oeminfo] BaseAddr(0x0fa00000) Size(0x04800000) 
[ID: 8] [erecovery] BaseAddr(0x14200000) Size(0x04000000) 
[ID: 8] [frp] BaseAddr(0x18200000) Size(0x00100000) 
[ID: 8] [nvdata] BaseAddr(0x18300000) Size(0x02000000) 
[ID: 8] [metadata] BaseAddr(0x1a300000) Size(0x02500000) 
[ID: 8] [system] BaseAddr(0x1c800000) Size(0xc0000000) 
[ID: 8] [cust] BaseAddr(0xdc800000) Size(0x19000000) 
[ID: 8] [cache] BaseAddr(0xf5800000) Size(0x0c800000) 
[ID: 8] [userdata] BaseAddr(0x102000000) Size(0x2a8380000) 
[ID: 8] [flashinfo] BaseAddr(0x3aa380000) Size(0x01000000) 
[ID: 8] [sgpt] BaseAddr(0x3ab380000) Size(0x00080000) 
Detecting Device info.......OK
Product: HUAWEI
Device Model: MYA-L22
ID: Maya-L22C185B123
Sw Internal: 
Build Date: Mon Aug 14 12:04:40 CST 2017
Chip Ver: S01
Android Version: 6.0
Architecture: arm64-v8a
Screen Lock Restore (Encrypted Data).............OK
Screen Lock Restore (Encrypted Data).............OK
Screen Lock Restore (Encrypted Data).............OK
All Done By EFT Dongle
  Reply With Quote
The Following User Says Thank You to dr_moosavi For This Useful Post:
Old 08-06-2019, 13:33   #967 (permalink)
Insane Poster
 
Join Date: May 2009
Location: pakistan
Posts: 61
Member: 1024226
Status: Offline
Thanks Meter: 6
g5510 play store fix firmware 7.1 1


EASY-TEAM
Waiting For Android Device.......OK
Reading Device Info.......OK
Product: samsung
Device Chipset: Qualcomm
Device Model: SM-G5510
Device Serial: R28HB1PCRXL
Android Version: 7.1.1
Android SDK: 25
Architecture: armeabi-v7a
Free space in system disk: 650M
Phone Mode: Normal Mode
Checking Root Permission.......OK
install gapps ............OK
  Reply With Quote
Old 08-07-2019, 16:30   #968 (permalink)
Freak Poster
 
AL-KARAM MOBILE's Avatar
 
Join Date: Jun 2010
Location: Denmark
Posts: 196
Member: 1329373
Status: Offline
Thanks Meter: 87
Smile Gigaset FRP

one click done


Wating Device..........OK
CPU: MT6737M
Chip Version: 0x0000ca00
Chip Ext Clock: EXT_26M
Writing Mode..........OK
Internal RAM:
Internal SRAM Size: 128.00 KB
External RAM: Type DRAM
External Ram Size: 1.00 GB
EMMC:
EMMC PART BOOT1 Size: 4.00 MB
EMMC PART BOOT2 Size: 4.00 MB
EMMC PART RPMB Size: 4.00 MB
EMMC PART USER Size: 14.56 GB
Battery:
Battery Voltage: 3828
Injection..........OK
Detecting Parts info............OK
[ID: 1] [preloader] BaseAddr(0x00000000) Size(0x00400000)
[ID: 8] [pgpt] BaseAddr(0x00000000) Size(0x00080000)
[ID: 8] [proinfo] BaseAddr(0x00080000) Size(0x00300000)
[ID: 8] [nvram] BaseAddr(0x00380000) Size(0x00500000)
[ID: 8] [protect1] BaseAddr(0x00880000) Size(0x00a00000)
[ID: 8] [protect2] BaseAddr(0x01280000) Size(0x00a00000)
[ID: 8] [lk] BaseAddr(0x01c80000) Size(0x00080000)
[ID: 8] [para] BaseAddr(0x01d00000) Size(0x00080000)
[ID: 8] [boot] BaseAddr(0x01d80000) Size(0x01000000)
[ID: 8] [recovery] BaseAddr(0x02d80000) Size(0x01000000)
[ID: 8] [logo] BaseAddr(0x03d80000) Size(0x00800000)
[ID: 8] [expdb] BaseAddr(0x04580000) Size(0x00a00000)
[ID: 8] [seccfg] BaseAddr(0x04f80000) Size(0x00080000)
[ID: 8] [oemkeystore] BaseAddr(0x05000000) Size(0x00200000)
[ID: 8] [secro] BaseAddr(0x05200000) Size(0x00600000)
[ID: 8] [keystore] BaseAddr(0x05800000) Size(0x00800000)
[ID: 8] [tee1] BaseAddr(0x06000000) Size(0x00500000)
[ID: 8] [tee2] BaseAddr(0x06500000) Size(0x00500000)
[ID: 8] [frp] BaseAddr(0x06a00000) Size(0x00100000)
[ID: 8] [nvdata] BaseAddr(0x06b00000) Size(0x02000000)
[ID: 8] [metadata] BaseAddr(0x08b00000) Size(0x02500000)
[ID: 8] [system] BaseAddr(0x0b000000) Size(0xa0000000)
[ID: 8] [cache] BaseAddr(0xab000000) Size(0x19000000)
[ID: 8] [userdata] BaseAddr(0xc4000000) Size(0x2ded80000)
[ID: 8] [flashinfo] BaseAddr(0x3a2d80000) Size(0x01000000)
[ID: 8] [sgpt] BaseAddr(0x3a3d80000) Size(0x00080000)
Detecting Device info.......OK
Product: Gigaset
Device Model: Gigaset GS160
ID: GIG_GS160_S111
Sw Internal:
Build Date: Sun Dec 25 14:26:31 EST 2016
Chip Ver: S01
Android Version: 6.0
Architecture: armeabi-v7a
FRP RESET... [FRP] .....OK
All Done By EFT Dongle
  Reply With Quote
Old 08-08-2019, 13:13   #969 (permalink)
Freak Poster
 
AL-KARAM MOBILE's Avatar
 
Join Date: Jun 2010
Location: Denmark
Posts: 196
Member: 1329373
Status: Offline
Thanks Meter: 87
Honor 9 stf-l09

HONOR 9 DONE BY TESTPOIN


Extracting files.....Done
Waiting for device to connect.....Found {COM36}
Opening Port.....OK
Writing xloader.....OK
Writing usb xloader.....OK
Writing fastboot.....OK
Rebooting to fastboot.....OK
Connecting Fastboot .......
Connecting Fastboot .......Ok
Model Phone: STF-L09
SW: :STF-L099.0.1.179(xxxxxE2R1P5)
Android Version: 9
SN: 7BKDU1XXXXXX384
IMEI: 8645xxxxxxxx80
IMEI: IMEI1:86459xxxxxx5
IMEI: MEID:00000000000000
Lock state: FBLockState:UNLOCKED USERLockState:LOCKED
Boot info: unlocked
battery: 0
Frp Erase ...............OK
Erase Done , The Device Will Reboot And Factory Reset
Reboot ...............OK
By EFT Dongle OK

Last edited by AL-KARAM MOBILE; 08-08-2019 at 13:19.
  Reply With Quote
Old 08-08-2019, 16:52   #970 (permalink)
Junior Member
 
Join Date: Mar 2019
Location: Pakistan
Posts: 16
Member: 2903065
Status: Offline
Thanks Meter: 2
sir my eft dongal id invalid username or passward
this is i key ff96011674 plz solyshon
  Reply With Quote
Old 08-08-2019, 17:46   #971 (permalink)
No Life Poster
 
Join Date: Dec 2015
Posts: 564
Member: 2494408
Status: Offline
Thanks Meter: 110
Quote:
Originally Posted by canliyayin View Post
g950f rooted by eft...


Good bro for info


Sent from my iPhone using Tapatalk
  Reply With Quote
Old 08-08-2019, 21:18   #972 (permalink)
No Life Poster
 
Join Date: Oct 2006
Location: Republica Dominicana
Age: 40
Posts: 1,065
Member: 381487
Status: Offline
Sonork: 100.1659930
Thanks Meter: 161
quantum mini frp ready.


  Reply With Quote
Old 08-09-2019, 07:42   #973 (permalink)
Crazy Poster
 
Join Date: Mar 2014
Posts: 58
Member: 2138876
Status: Offline
Sonork: nawaz
Thanks Meter: 4
EFT Dongle samsung m205f root error

Opening Port COM30...........OK
Verifying Download Mod
OK
Initialization.......OK
Reading Phone Partitation Table........OK
Partition Size : 8192
Unpak pit .......OK
FLASHING FIRMWARE TO PHONE.....
Writing: boot.img.......OK
FLASHING DONE!
Rebooting PDA TO NORMAL MODE......
ERROR : phone unable to accept data, wrong command sent..OK
  Reply With Quote
Old 08-10-2019, 21:36   #974 (permalink)
Freak Poster
 
lolo24's Avatar
 
Join Date: May 2016
Location: CUBA
Age: 32
Posts: 461
Member: 2572618
Status: Offline
Sonork: no
Thanks Meter: 185
Donate money to this user
Opening Port COM144...........OK
Verifying Download Mod
OK
Initialization.......OK
Reading Phone Partitation Table........OK
Partition Size : 8192
Unpak pit .......OK
FLASHING FIRMWARE TO PHONE.....
Sending data: ..........OK
FLASHING DONE!
Rebooting PDA TO NORMAL MODE........OK
Waiting For ADB Device.....Detecting Device Info.....DONE
Device Model: SM-G930T1
Device CPU: arm64-v8a
Android SDK: 26
Android Version: 8.0.0
Screen Lock reset .......OK
  Reply With Quote
Old 08-11-2019, 12:59   #975 (permalink)
Freak Poster
 
Join Date: Jan 2014
Location: Uzbekistan,Tashkent
Posts: 234
Member: 2111301
Status: Offline
Sonork: 1651880:UzjavaAzizbek
Thanks Meter: 65
a510f u8 7.0 frp remove done
EASY-TEAM
Waiting For Android Device.......OK
Reading Device Info.......OK
Product: samsung
Device Chipset: samsungexynos7580
Device Model: SM-A510F
Device Serial: R58GC1QZM3P
Android Version: 7.0
Android SDK: 24
Architecture: armeabi-v7a
Free space in system disk: 118M
Phone Mode: Normal Mode
Checking Root Permission.......OK
security policy update disable.......OK

  Reply With Quote
Reply

Bookmarks

Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


 



All times are GMT +1. The time now is 10:04.



Powered by Searchlight © 2024 Axivo Inc.
vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2024 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2023 -
Page generated in 0.12404 seconds with 9 queries

SEO by vBSEO