G965F U17 unlock via server with root Work ID: 0000000001A7912C
Starting Read Codes (Nov.2020)
Selected model: SM-G965F
Devices with Unlock App (branded to T-Mobile, MetroPCS, etc.) are not supported! Make sure device requests to enter unlock code and only then perform "Read Codes" operation! Do you want to continue?
Searching ADB devices...
Press "OK" button on the device to allow USB debugging
Reading info...
Detected model: SM-G965F
Fingerprint: samsung/star2ltexx/star2lte:10/QP1A.190711.020/G965FXXUHFVB4:user/release-keys
Firmware compiled date: Thu Feb 24 10:14:52 KST 2022
PDA version: G965FXXUHFVB4
CSC version: G965FOVFHFVB2
SW version: G965FXXUHFVB4
Build number: QB21749216
Phone SN: xxxxxxxxxxx
Android version: 10 (QP1A.190711.020)
Sales code: MOB
Country: Austria
HW platform: samsungexynos9810
HW Chip: universal9810
HW Modem: MP 0.900
Security patch level: 2022-03-01
Warranty Void: 1
Codename: star2ltexx
SIM 1 status: ABSENT
SIM 2 status: ABSENT
Modem board: SHANNON360
Checking network status...
Rebooting device...
Searching ADB devices...
Connecting to server...
Username: xxxxxxx
Your balance:xxxx credits
Your account will be charged for 80 #####. Do you want to continue?
Starting exploit...
Resetting MSL...
Reading codes...
Rebooting device...
FREEZE: 64167320
NET LOCK: 08501764
SUB LOCK: 00000000
SP LOCK: 00000000
CP LOCK: 00000000
SIM LOCK: 00000000
Read Codes (Nov.2020) done
Execution time 2 minute(s) 44 second(s)
Performed by 4.0.5.1 Software version.
Last edited by Octopus support; 07-26-2022 at 06:05.
|