![]() ![]() ![]() |
![]() |
Welcome to the GSM-Forum forums. You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. Only registered members may post questions, contact other members or search our database of over 8 million posts. Registration is fast, simple and absolutely free so please - Click to REGISTER! If you have any problems with the registration process or your account login, please contact contact us . |
|
Register | FAQ | Donate | Forum Rules | Root any Device | ★iPhone Unlock★ | ★ Direct Codes ★ | Direct Unlock Source | Today's Posts | Search |
![]() |
| LinkBack | Thread Tools | Display Modes |
![]() | #1 (permalink) |
Freak Poster ![]() ![]() ![]() ![]() Join Date: Nov 2013 Location: Deira, Dubai
Posts: 228
Member: 2062071 Status: Offline Sonork: 100.1663486 Thanks Meter: 61 ![]() | ![]() Octoplus Unlock done Only without Root Code: Work ID: 00000000018E7B45 Starting Read Codes (Feb.2023) Selected model: SM-J600FN Turn on USB debugging on the phone. Connect powered-on phone to PC using USB via ADB. Please, don't run any other third party Softwares or start any other operations which can use your CPU/RAM resources during the operation! Devices with Unlock App (branded to T-Mobile, MetroPCS, etc.) are not supported! Make sure device requests to enter unlock code and only then perform "Read Codes" operation! Do you want to continue? Searching ADB devices... Press "OK" button on the device to allow USB debugging OK Reading info... Detected model: SM-J600FN Fingerprint: samsung/j6ltexx/j6lte:10/QP1A.190711.020/J600FNXXSACVB1:user/release-keys Firmware compiled date: Fri Feb 11 10:34:04 KST 2022 PDA version: J600FNXXSACVB1 CSC version: J600FNOBEACVB1 SW version: J600FXXSACVB1 Build number: QB21654492 Phone SN: RF8KXXV5NGZ Android version: 10 (QP1A.190711.020) Sales code: EVR Carrier Id: ATO Country: UK HW platform: samsungexynos7870 HW Chip: universal7870 HW Modem: REV0.3A Security patch level: 2022-02-01 Warranty Void: 0 Codename: j6ltexx SIM 1 status: ABSENT SIM 2 status: ABSENT Modem board: SHANNON315 Connecting to server... Username: imrankhaliq Your balance: 59 credits Your account will be charged for 46 credits. Do you want to continue? Starting exploit... Reading info... IMEI A: 3594910XXXXXX IMEI B: 3594920XXXXXX Rebooting device to Upload Mode... Searching upload mode interface... Rebooting device... OK Searching ADB devices... OK Reading dump file... Reading data from phone... Removing crash dump file. Starting codes calculation... Calculating codes. Please wait... OK FREEZE: 58413164 NET LOCK: 53586028 SUB LOCK: 00000000 SP LOCK: 00000000 CP LOCK: 00000000 SIM LOCK: 00000000 Read Codes (Feb.2023) done Execution time 4 minute(s) 7 second(s) Performed by 4.3.0.1 Software version. |
![]() |
The Following User Says Thank You to imrankhaliq For This Useful Post: |
![]() |
Bookmarks |
| |
|