|
Welcome to the GSM-Forum forums. You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. Only registered members may post questions, contact other members or search our database of over 8 million posts. Registration is fast, simple and absolutely free so please - Click to REGISTER! If you have any problems with the registration process or your account login, please contact contact us . |
|
Register | FAQ | Donate | Forum Rules | Root any Device | ★iPhone Unlock★ | ★ Direct Codes ★ | Direct Unlock Source | Mark Forums Read |
| LinkBack | Thread Tools | Display Modes |
11-24-2016, 16:32 | #1 (permalink) |
No Life Poster Join Date: Apr 2007 Location: CLOUD Age: 40
Posts: 2,966
Member: 486357 Status: Offline Sonork: 100.1602846 Thanks Meter: 1,220 | sm-G610F unlock failed [Solved] Platform: Samsung Android Selected port: COM72 Selected model: SM-G610F Detected phone model: SM-G610F Firmware compiled date: Thu Aug 25 00:51:06 KST 2016 PDA version: G610FDDU1APHD CSC version: G610FOJV1APH5 SW version: G610FDDU1APH9 Phone SN: R28H92G138N Android version: 6.0.1 (MMB29K) Sales code: KSA Country: KSA HW platform: exynos5 HW Chip: exynos7870 HW Modem: SHANNON315 Security patch level: 2016-09-01 Codename: on7xeltedd Checking Root: Phone is Rooted. Reading security backup, please wait... Backup saved as C:\Program Files\Octoplus\Octoplus_Samsung\BACKUP\Security-SM-G610F-Unknown24-11-2016_20-36-53-.asec file Initializing exploit... Executing exploit... Executing exploit failed Phone unlocking failed Performed by 2.4.5 Software version. read codes Platform: Samsung Android Selected port: COM72 Selected model: SM-G610F Detected phone model: SM-G610F Firmware compiled date: Thu Aug 25 00:51:06 KST 2016 PDA version: G610FDDU1APHD CSC version: G610FOJV1APH5 SW version: G610FDDU1APH9 Phone SN: R28H92G138N Android version: 6.0.1 (MMB29K) Sales code: KSA Country: KSA HW platform: exynos5 HW Chip: exynos7870 HW Modem: SHANNON315 Security patch level: 2016-09-01 Codename: on7xeltedd Checking Root: Phone is Rooted. Initializing exploit... Executing exploit... Executing exploit failed Read codes failed Performed by 2.4.5 Software version. Last edited by Octopus box; 11-25-2016 at 12:15. |
11-24-2016, 16:41 | #2 (permalink) |
Product Supporter Join Date: Oct 2009 Location: Romania, Bucharest
Posts: 99,806
Member: 1146942 Status: Offline Sonork: 100.1587278 Thanks Meter: 27,406 | Hello. Please upload *.log and *.logx files of performed operations to any file-sharing service and post here download link. We will check what causes the problem. *.log and *.logx files can be found in "C:\Program Files (x86)\Octoplus\Octoplus_Samsung\LOG" folder. |
11-24-2016, 16:47 | #3 (permalink) | |
No Life Poster Join Date: Apr 2007 Location: CLOUD Age: 40
Posts: 2,966
Member: 486357 Status: Offline Sonork: 100.1602846 Thanks Meter: 1,220 | Quote:
here is log file link https://drive.google.com/file/d/0Byn...JCbk5IVVE/view | |
11-24-2016, 17:25 | #4 (permalink) |
Product Supporter Join Date: Oct 2009 Location: Romania, Bucharest
Posts: 99,806
Member: 1146942 Status: Offline Sonork: 100.1587278 Thanks Meter: 27,406 | This problem is caused by a specific root method, which was used to root the phone. Please download and install test Software version from "samsung/TEST SOFTWARE" folder of the Support Area and perform necessary operation. Post here result and full Software log of the operation. |
11-24-2016, 22:57 | #5 (permalink) |
No Life Poster Join Date: Sep 2008 Location: in your hart Age: 40
Posts: 745
Member: 864102 Status: Offline Sonork: 100.1617637 Thanks Meter: 146 | help me same problem Welcome to Octoplus/Octopus Box Samsung software version 2.4.5 ----------------------------------------------------------------------------------- Platform: Samsung Android Selected port: COM1 Selected model: SM-G610F Reading info, please wait... Detected phone model: SM-G610F Firmware compiled date: Tue Sep 6 13:58:56 KST 2016 PDA version: G610FDDU1API4 CSC version: G610FODD1API6 SW version: G610FDDU1API7 Phone SN: R28H934YRTV Android version: 6.0.1 (MMB29K) Sales code: INS Country: India HW platform: exynos5 HW Chip: exynos7870 HW Modem: SHANNON315 Security patch level: 2016-09-01 Codename: on7xeltedd Performed by 2.4.5 Software version. ----------------------------------------------------------------------------------- Platform: Samsung Android Selected port: COM1 Selected model: SM-G610F Detected phone model: SM-G610F Firmware compiled date: Tue Sep 6 13:58:56 KST 2016 PDA version: G610FDDU1API4 CSC version: G610FODD1API6 SW version: G610FDDU1API7 Phone SN: R28H934YRTV Android version: 6.0.1 (MMB29K) Sales code: INS Country: India HW platform: exynos5 HW Chip: exynos7870 HW Modem: SHANNON315 Security patch level: 2016-09-01 Codename: on7xeltedd Checking Root: Phone is Rooted. Initializing exploit... Executing exploit... Executing exploit failed Read codes failed Performed by 2.4.5 Software version. ----------------------------------------------------------------------------------- Platform: Samsung Android Selected port: COM1 Selected model: SM-G610F Detected phone model: SM-G610F Firmware compiled date: Tue Sep 6 13:58:56 KST 2016 PDA version: G610FDDU1API4 CSC version: G610FODD1API6 SW version: G610FDDU1API7 Phone SN: R28H934YRTV Android version: 6.0.1 (MMB29K) Sales code: INS Country: India HW platform: exynos5 HW Chip: exynos7870 HW Modem: SHANNON315 Security patch level: 2016-09-01 Codename: on7xeltedd Checking Root: Phone is Rooted. Reading security backup, please wait... Backup saved as C:\Program Files\Octoplus\Octoplus_Samsung \BACKUP\Security-SM-G610F-Unknown25-11-2016_02-12-09-.asec file Initializing exploit... Executing exploit... Executing exploit failed Reading Certificate failed Performed by 2.4.5 Software version. ----------------------------------------------------------------------------------- Platform: Samsung Android Selected port: COM1 Selected model: SM-G610F Detected phone model: SM-G610F Firmware compiled date: Tue Sep 6 13:58:56 KST 2016 PDA version: G610FDDU1API4 CSC version: G610FODD1API6 SW version: G610FDDU1API7 Phone SN: R28H934YRTV Android version: 6.0.1 (MMB29K) Sales code: INS Country: India HW platform: exynos5 HW Chip: exynos7870 HW Modem: SHANNON315 Security patch level: 2016-09-01 Codename: on7xeltedd Checking Root: Phone is Rooted. Reading security backup, please wait... Phone unlocking failed Performed by 2.4.5 Software version. ----------------------------------------------------------------------------------- Platform: Samsung Android Selected port: COM1 Selected model: SM-G610F Detected phone model: SM-G610F Firmware compiled date: Tue Sep 6 13:58:56 KST 2016 PDA version: G610FDDU1API4 CSC version: G610FODD1API6 SW version: G610FDDU1API7 Phone SN: R28H934YRTV Android version: 6.0.1 (MMB29K) Sales code: INS Country: India HW platform: exynos5 HW Chip: exynos7870 HW Modem: SHANNON315 Security patch level: 2016-09-01 Codename: on7xeltedd Checking Root: Phone is Rooted. Initializing exploit... Executing exploit... Executing exploit failed Read codes failed Performed by 2.4.5 Software version. ----------------------------------------------------------------------------------- Platform: Samsung Android Selected port: COM1 Selected model: SM-G610F Please, press "OK" button on the phone to allow USB debugging.. Detected phone model: SM-G610F Firmware compiled date: Mon Sep 5 20:41:44 KST 2016 PDA version: G610FDXU1API3 CSC version: G610FOLB1API4 SW version: G610FDDU1API6 Phone SN: R28H934YRTV Android version: 6.0.1 (MMB29K) Sales code: XME Country: MALAYSIA HW platform: exynos5 HW Chip: exynos7870 HW Modem: SHANNON315 Security patch level: 2016-09-01 Codename: on7xeltedd Checking Root: Phone is Rooted. Initializing exploit... Executing exploit... Executing exploit failed Read codes failed Performed by 2.4.5 Software version. ----------------------------------------------------------------------------------- Platform: Samsung Android Selected port: COM1 Selected model: SM-G610F Detected phone model: SM-G610F Firmware compiled date: Mon Sep 5 20:41:44 KST 2016 PDA version: G610FDXU1API3 CSC version: G610FOLB1API4 SW version: G610FDDU1API6 Phone SN: R28H934YRTV Android version: 6.0.1 (MMB29K) Sales code: XME Country: MALAYSIA HW platform: exynos5 HW Chip: exynos7870 HW Modem: SHANNON315 Security patch level: 2016-09-01 Codename: on7xeltedd Checking Root: Phone is Rooted. Reading security backup, please wait... Backup saved as C:\Program Files\Octoplus\Octoplus_Samsung \BACKUP\Security-SM-G610F-Unknown25-11-2016_03-16-49-.asec file Initializing exploit... Executing exploit... Executing exploit failed Phone unlocking failed Performed by 2.4.5 Software version. ----------------------------------------------------------------------------------- Platform: Samsung Android Selected port: COM1 Selected model: SM-G610F Detected phone model: SM-G610F Firmware compiled date: Mon Sep 5 20:41:44 KST 2016 PDA version: G610FDXU1API3 CSC version: G610FOLB1API4 SW version: G610FDDU1API6 Phone SN: R28H934YRTV Android version: 6.0.1 (MMB29K) Sales code: XME Country: MALAYSIA HW platform: exynos5 HW Chip: exynos7870 HW Modem: SHANNON315 Security patch level: 2016-09-01 Codename: on7xeltedd Checking Root: Phone is Rooted. Reading security backup, please wait... Backup saved as C:\Program Files\Octoplus\Octoplus_Samsung \BACKUP\Security-SM-G610F-Unknown25-11-2016_03-17-48-.asec file Initializing exploit... Executing exploit... Executing exploit failed Phone unlocking failed Performed by 2.4.5 Software version. |
11-25-2016, 06:24 | #6 (permalink) | |
No Life Poster Join Date: Apr 2007 Location: CLOUD Age: 40
Posts: 2,966
Member: 486357 Status: Offline Sonork: 100.1602846 Thanks Meter: 1,220 | Quote:
right now only 1 method for root J7 xda share [GUIDE][G610F] Root Galaxy J7 Prime Through ? | Samsung Galaxy J7 if team you have any other method so plz share | |
11-25-2016, 06:34 | #7 (permalink) |
Freak Poster Join Date: Jul 2008 Location: meerut
Posts: 303
Member: 804463 Status: Offline Thanks Meter: 77 | g610f Welcome to Octoplus/Octopus Box Samsung software version 2.4.5 Selected BOOT file: C:\Users\dell\Desktop \G610FDDU1APHD_OJV1APH5_Arabic_6.0.1 \BL_G610FDDU1APHD_CL8984664_QB10727744_REV00 _user_low_ship.tar.md5 Selected AP file: C:\Users\dell\Desktop\G610FDDU1APHD_OJV1APH5 _Arabic_6.0.1\AP_G610FDDU1APHD_CL8984664_QB1072774 4 _REV00_user_low_ship.tar.md5 Selected CP file: C:\Users\dell\Desktop\G610FDDU1APHD_OJV1APH5 _Arabic_6.0.1\CP_G610FDDU1APH9_CL8984664_QB1063190 9_REV00 _user_low_ship.tar.md5 Selected CSC file: C:\Users\dell\Desktop\G610FDDU1APHD_OJV1APH5 _Arabic_6.0.1\CSC_OJV_G610FOJV1APH5_CL9080744_QB10 732073 _REV00_user_low_ship.tar.md5 Please put the phone into Download Mode and connect USB cable. To put SM-G610F into Download Mode, You have to perform the following steps: 1. Reconnect the battery. 2. Press and hold "Volume-" + "Home" + "Power ON" keys. 3. When phone turns on, press "Volume+" key. Found phone on Firmware write started. Writing BOOTLOADER section... BOOTLOADER section has been written successfully. Writing PARAM section... PARAM section has been written successfully. Writing CM section... CM section has been written successfully. Writing BOOT section... BOOT section has been written successfully. Writing RECOVERY section... RECOVERY section has been written successfully. Writing SYSTEM section... SYSTEM section has been written successfully. Writing USERDATA section... USERDATA section has been written successfully. Writing RADIO section... RADIO section has been written successfully. Writing CACHE section... CACHE section has been written successfully. Writing HIDDEN section... HIDDEN section has been written successfully. Firmware writing successfully completed. Performed by 2.4.5 Software version. ----------------------------------------------------------------------------------- Platform: Samsung Android Selected port: COM3 Selected model: SM-G610F Reading info, please wait... Please, press "OK" button on the phone to allow USB debugging.. Detected phone model: SM-G610F Firmware compiled date: Thu Aug 25 00:51:06 KST 2016 PDA version: G610FDDU1APHD CSC version: G610FOJV1APH5 SW version: G610FDDU1APH9 Phone SN: R28H934Z3LB Android version: 6.0.1 (MMB29K) Sales code: KSA Country: KSA HW platform: exynos5 HW Chip: exynos7870 HW Modem: SHANNON315 Security patch level: 2016-09-01 Codename: on7xeltedd Performed by 2.4.5 Software version. ----------------------------------------------------------------------------------- Platform: Samsung Android Selected port: COM3 Selected model: SM-G610F Detected phone model: SM-G610F Firmware compiled date: Thu Aug 25 00:51:06 KST 2016 PDA version: G610FDDU1APHD CSC version: G610FOJV1APH5 SW version: G610FDDU1APH9 Phone SN: R28H934Z3LB Android version: 6.0.1 (MMB29K) Sales code: KSA Country: KSA HW platform: exynos5 HW Chip: exynos7870 HW Modem: SHANNON315 Security patch level: 2016-09-01 Codename: on7xeltedd Rebooting phone in Download Mode... Phone successfully rebooted in Download Mode. Performed by 2.4.5 Software version. ----------------------------------------------------------------------------------- Platform: Samsung Android Selected port: COM3 Selected model: SM-G610F Detected phone model: SM-G610F Firmware compiled date: Thu Aug 25 00:51:06 KST 2016 PDA version: G610FDDU1APHD CSC version: G610FOJV1APH5 SW version: G610FDDU1APH9 Phone SN: R28H934Z3LB Android version: 6.0.1 (MMB29K) Sales code: KSA Country: KSA HW platform: exynos5 HW Chip: exynos7870 HW Modem: SHANNON315 Security patch level: 2016-09-01 Codename: on7xeltedd Checking Root: Read codes failed Performed by 2.4.5 Software version. ----------------------------------------------------------------------------------- Platform: Samsung Android Selected port: COM3 Selected model: SM-G610F Please, press "OK" button on the phone to allow USB debugging.. Proper android device not found. Make shure that "USB debug" option on the device is turned on. Performed by 2.4.5 Software version. ----------------------------------------------------------------------------------- Platform: Samsung Android Selected port: COM3 Selected model: SM-G610F Please, press "OK" button on the phone to allow USB debugging.. Proper android device not found. Make shure that "USB debug" option on the device is turned on. Performed by 2.4.5 Software version. ----------------------------------------------------------------------------------- Platform: Samsung Android Selected port: COM3 Selected model: SM-G610F Detected phone model: SM-G610F Firmware compiled date: Thu Aug 25 00:51:06 KST 2016 PDA version: G610FDDU1APHD CSC version: G610FOJV1APH5 SW version: G610FDDU1APH9 Phone SN: R28H934Z3LB Android version: 6.0.1 (MMB29K) Sales code: KSA Country: KSA HW platform: exynos5 HW Chip: exynos7870 HW Modem: SHANNON315 Security patch level: 2016-09-01 Codename: on7xeltedd Checking Root: Phone is Rooted. Initializing exploit... Executing exploit... Executing exploit failed Read codes failed Performed by 2.4.5 Software version. ----------------------------------------------------------------------------------- Platform: Samsung Android Selected port: COM3 Selected model: SM-G610F Detected phone model: SM-G610F Firmware compiled date: Thu Aug 25 00:51:06 KST 2016 PDA version: G610FDDU1APHD CSC version: G610FOJV1APH5 SW version: G610FDDU1APH9 Phone SN: R28H934Z3LB Android version: 6.0.1 (MMB29K) Sales code: KSA Country: KSA HW platform: exynos5 HW Chip: exynos7870 HW Modem: SHANNON315 Security patch level: 2016-09-01 Codename: on7xeltedd Checking Root: Phone is Rooted. Reading security backup, please wait... Backup saved as C:\Program Files\Octoplus\Octoplus_Samsung \BACKUP\Security-SM-G610F-Unknown25-11-2016_08-56-13-.asec file Initializing exploit... Executing exploit... Executing exploit failed Phone unlocking failed Performed by 2.4.5 Software version. ----------------------------------------------------------------------------------- Platform: Samsung Android Selected port: COM3 Selected model: SM-G610F Detected phone model: SM-G610F Firmware compiled date: Thu Aug 25 00:51:06 KST 2016 PDA version: G610FDDU1APHD CSC version: G610FOJV1APH5 SW version: G610FDDU1APH9 Phone SN: R28H934Z3LB Android version: 6.0.1 (MMB29K) Sales code: KSA Country: KSA HW platform: exynos5 HW Chip: exynos7870 HW Modem: SHANNON315 Security patch level: 2016-09-01 Codename: on7xeltedd Checking Root: Phone is Rooted. Reading security backup, please wait... Backup saved as C:\Program Files\Octoplus\Octoplus_Samsung \BACKUP\Security-SM-G610F-Unknown25-11-2016_08-58-53-.asec file Initializing exploit... Executing exploit... Executing exploit failed Phone unlocking failed Performed by 2.4.5 Software version. ----------------------------------------------------------------------------------- Platform: Samsung Android Selected port: COM3 Selected model: SM-G610F Detected phone model: SM-G610F Firmware compiled date: Thu Aug 25 00:51:06 KST 2016 PDA version: G610FDDU1APHD CSC version: G610FOJV1APH5 SW version: G610FDDU1APH9 Phone SN: R28H934Z3LB Android version: 6.0.1 (MMB29K) Sales code: KSA Country: KSA HW platform: exynos5 HW Chip: exynos7870 HW Modem: SHANNON315 Security patch level: 2016-09-01 Codename: on7xeltedd Checking Root: Phone is Rooted. Initializing exploit... Executing exploit... Executing exploit failed Read codes failed Performed by 2.4.5 Software version. Selected BOOT file: C:\Users\dell\Desktop\G610FDDU1API4 _G610FODD1API6_INS\BL_G610FDDU1API4_CL9154975_QB10 841443 _REV00_user_low_ship.tar.md5 Selected AP file: C:\Users\dell\Desktop\G610FDDU1API4 _G610FODD1API6_INS\AP_G610FDDU1API4_CL9154975_QB10 841443 _REV00_user_low_ship.tar.md5 Selected CP file: C:\Users\dell\Desktop\G610FDDU1API4 _G610FODD1API6_INS\CP_G610FDDU1API7_CL9154975_QB10 841443 _REV00_user_low_ship.tar.md5 Selected CSC file: C:\Users\dell\Desktop\G610FDDU1API4 _G610FODD1API6_INS\CSC_ODD_G610FODD1API6_CL9154975 _QB10859935_REV00_user_low_ship.tar.md5 Please put the phone into Download Mode and connect USB cable. To put SM-G610F into Download Mode, You have to perform the following steps: 1. Reconnect the battery. 2. Press and hold "Volume-" + "Home" + "Power ON" keys. 3. When phone turns on, press "Volume+" key. Found phone on Firmware write started. Writing BOOTLOADER section... BOOTLOADER section has been written successfully. Writing PARAM section... PARAM section has been written successfully. Writing CM section... CM section has been written successfully. Writing BOOT section... BOOT section has been written successfully. Writing RECOVERY section... RECOVERY section has been written successfully. Writing SYSTEM section... SYSTEM section has been written successfully. Writing USERDATA section... USERDATA section has been written successfully. Writing RADIO section... RADIO section has been written successfully. Writing CACHE section... CACHE section has been written successfully. Writing HIDDEN section... HIDDEN section has been written successfully. Firmware writing successfully completed. Performed by 2.4.5 Software version. ----------------------------------------------------------------------------------- Platform: Samsung Android Selected port: COM3 Selected model: SM-G610F Please, press "OK" button on the phone to allow USB debugging.. Detected phone model: SM-G610F Firmware compiled date: Tue Sep 6 13:58:56 KST 2016 PDA version: G610FDDU1API4 CSC version: G610FODD1API6 SW version: G610FDDU1API7 Phone SN: R28H934Z3LB Android version: 6.0.1 (MMB29K) Sales code: INS Country: India HW platform: exynos5 HW Chip: exynos7870 HW Modem: SHANNON315 Security patch level: 2016-09-01 Codename: on7xeltedd Checking Root: Phone is Rooted. Reading security backup, please wait... Backup saved as C:\Program Files\Octoplus\Octoplus_Samsung \BACKUP\Security-SM-G610F-Unknown25-11-2016_10-56-44-.asec file Initializing exploit... Executing exploit... Executing exploit failed Reading Certificate failed Performed by 2.4.5 Software version. ----------------------------------------------------------------------------------- Platform: Samsung Android Selected port: COM3 Selected model: SM-G610F Detected phone model: SM-G610F Firmware compiled date: Tue Sep 6 13:58:56 KST 2016 PDA version: G610FDDU1API4 CSC version: G610FODD1API6 SW version: G610FDDU1API7 Phone SN: R28H934Z3LB Android version: 6.0.1 (MMB29K) Sales code: INS Country: India HW platform: exynos5 HW Chip: exynos7870 HW Modem: SHANNON315 Security patch level: 2016-09-01 Codename: on7xeltedd Checking Root: Phone is Rooted. Initializing exploit... Executing exploit... Executing exploit failed Read codes failed Performed by 2.4.5 Software version. ----------------------------------------------------------------------------------- Platform: Samsung Android Selected port: COM3 Selected model: SM-G610F Detected phone model: SM-G610F Firmware compiled date: Tue Sep 6 13:58:56 KST 2016 PDA version: G610FDDU1API4 CSC version: G610FODD1API6 SW version: G610FDDU1API7 Phone SN: R28H934Z3LB Android version: 6.0.1 (MMB29K) Sales code: INS Country: India HW platform: exynos5 HW Chip: exynos7870 HW Modem: SHANNON315 Security patch level: 2016-09-01 Codename: on7xeltedd Checking Root: Phone is Rooted. Initializing exploit... Executing exploit... Executing exploit failed Read codes failed Performed by 2.4.5 Software version. |
11-25-2016, 06:49 | #8 (permalink) | |
No Life Poster Join Date: Feb 2005 Location: MX-KEY is the BEST NOKIA TOOL Age: 50
Posts: 875
Member: 116314 Status: Offline Thanks Meter: 147 | Quote:
dont forget to backup security and imei | |
11-25-2016, 09:26 | #10 (permalink) |
Product Supporter Join Date: Oct 2009 Location: Romania, Bucharest
Posts: 99,806
Member: 1146942 Status: Offline Sonork: 100.1587278 Thanks Meter: 27,406 | Please upload *.log and *.logx files of performed operations with test Software version to any file-sharing service and post here download link. We will check what causes the problem. *.log and *.logx files can be found in "C:\Program Files (x86)\Octoplus\Octoplus_Samsung\LOG" folder. |
11-25-2016, 09:52 | #11 (permalink) | |
No Life Poster Join Date: Apr 2007 Location: CLOUD Age: 40
Posts: 2,966
Member: 486357 Status: Offline Sonork: 100.1602846 Thanks Meter: 1,220 | Quote:
plz check Attachment .... | |
11-25-2016, 11:39 | #14 (permalink) |
Product Supporter Join Date: Oct 2009 Location: Romania, Bucharest
Posts: 99,806
Member: 1146942 Status: Offline Sonork: 100.1587278 Thanks Meter: 27,406 | Please download and install "install_octoplus_octopus_Samsung_2.4.5.2" test Software version from "samsung/TEST SOFTWARE" folder of the Support Area. Perform "Read Codes" operation and post here the result. |
11-25-2016, 12:11 | #15 (permalink) | |
No Life Poster Join Date: Apr 2007 Location: CLOUD Age: 40
Posts: 2,966
Member: 486357 Status: Offline Sonork: 100.1602846 Thanks Meter: 1,220 | Quote:
thanks team unlock done Platform: Samsung Android Selected port: COM1 Selected model: SM-G610F Detected phone model: SM-G610F Firmware compiled date: Thu Aug 25 00:51:06 KST 2016 PDA version: G610FDDU1APHD CSC version: G610FOJV1APH5 SW version: G610FDDU1APH9 Phone SN: R28H92G138N Android version: 6.0.1 (MMB29K) Sales code: KSA Country: KSA HW platform: exynos5 HW Chip: exynos7870 HW Modem: SHANNON315 Security patch level: 2016-09-01 Codename: on7xeltedd Checking Root: Phone is Rooted. Initializing exploit... Executing exploit... Exploit has been executed successfully Reading phone unlock codes. It can take some time, please wait... FREEZE unlock code: 93840757 NET LOCK unlock code: 74904024 SUB LOCK unlock code: 00000000 SP LOCK unlock code: 00000000 CP LOCK unlock code: 00000000 SIM LOCK unlock code: 00000000 Work time: 0:01:53 Performed by 2.4.5 Software version. | |
The Following 2 Users Say Thank You to mohit_kripalu01 For This Useful Post: |
Bookmarks |
Thread Tools | |
Display Modes | |
| |
|