Offline
		Work ID: 00000000018FC4EB
Starting Read Codes (Feb.2023)
Selected model: SM-G973F
Turn on USB debugging on the phone.
Connect powered-on phone to PC using USB via ADB.
Please, don't run any other third party Softwares or start any other operations which can use your CPU/RAM resources during the operation!
Devices with Unlock App (branded to T-Mobile, MetroPCS, etc.) are not supported! Make sure device requests to enter unlock code and only then perform "Read Codes" operation! Do you want to continue?
Searching ADB devices...
Press "OK" button on the device to allow USB debugging
OK
Reading info...
Detected model: SM-G973F
Fingerprint: samsung/beyond1lteeea/beyond1:12/SP1A.210812.016/G973FXXSGHWC1:user/release-keys
Firmware compiled date: Thu Mar 2 09:46:41 KST 2023
PDA version: G973FXXSGHWC1
CSC version: G973FOBEGHVJ4
SW version: G973FXXSGHWB3
Build number: QB23788344
Phone SN: RF8MB343FCE
Android version: 12 (SP1A.210812.016)
Sales code: EVR
Carrier Id: EVR
Country: UK
HW platform: exynos9820
HW Chip: universal9820
HW Modem: MP 0.700
Security patch level: 2023-03-01
Warranty Void: 0
Codename: beyond1lteeea
SIM 1 status: ABSENT
SIM 2 status: ABSENT
Modem board: SHANNON5000
Rebooting device...
OK
Searching ADB devices...
OK
Connecting to server...
Username:xxxxxxx
Your balance: xxx credits
Your account will be charged for 74 credits. Do you want to continue?
Starting exploit...
Reading info...
IMEI A: 35222911691459
IMEI B: 35223011691459
Rebooting device to Upload Mode...
Searching upload mode interface...
Searching ADB devices...
ADB devices not found
Make sure that "USB Debug" option on the device is turned on
Failed
OK
Reading dump file...
Reading data from phone...
Removing crash dump file.
Starting codes calculation...
Calculating codes. Please wait...
OK
FREEZE: 6xxxxxxx2
NET LOCK: 2xxxxxxx0
SUB LOCK: 00000000
SP LOCK: 00000000
CP LOCK: 00000000
SIM LOCK: 00000000
Read Codes (Feb.2023) done
Execution time 10 minute(s) 11 second(s)
Performed by 4.3.1 Software version.
 Starting Read Codes (Feb.2023)
Selected model: SM-G973F
Turn on USB debugging on the phone.
Connect powered-on phone to PC using USB via ADB.
Please, don't run any other third party Softwares or start any other operations which can use your CPU/RAM resources during the operation!
Devices with Unlock App (branded to T-Mobile, MetroPCS, etc.) are not supported! Make sure device requests to enter unlock code and only then perform "Read Codes" operation! Do you want to continue?
Searching ADB devices...
Press "OK" button on the device to allow USB debugging
OK
Reading info...
Detected model: SM-G973F
Fingerprint: samsung/beyond1lteeea/beyond1:12/SP1A.210812.016/G973FXXSGHWC1:user/release-keys
Firmware compiled date: Thu Mar 2 09:46:41 KST 2023
PDA version: G973FXXSGHWC1
CSC version: G973FOBEGHVJ4
SW version: G973FXXSGHWB3
Build number: QB23788344
Phone SN: RF8MB343FCE
Android version: 12 (SP1A.210812.016)
Sales code: EVR
Carrier Id: EVR
Country: UK
HW platform: exynos9820
HW Chip: universal9820
HW Modem: MP 0.700
Security patch level: 2023-03-01
Warranty Void: 0
Codename: beyond1lteeea
SIM 1 status: ABSENT
SIM 2 status: ABSENT
Modem board: SHANNON5000
Rebooting device...
OK
Searching ADB devices...
OK
Connecting to server...
Username:xxxxxxx
Your balance: xxx credits
Your account will be charged for 74 credits. Do you want to continue?
Starting exploit...
Reading info...
IMEI A: 35222911691459
IMEI B: 35223011691459
Rebooting device to Upload Mode...
Searching upload mode interface...
Searching ADB devices...
ADB devices not found
Make sure that "USB Debug" option on the device is turned on
Failed
OK
Reading dump file...
Reading data from phone...
Removing crash dump file.
Starting codes calculation...
Calculating codes. Please wait...
OK
FREEZE: 6xxxxxxx2
NET LOCK: 2xxxxxxx0
SUB LOCK: 00000000
SP LOCK: 00000000
CP LOCK: 00000000
SIM LOCK: 00000000
Read Codes (Feb.2023) done
Execution time 10 minute(s) 11 second(s)
Performed by 4.3.1 Software version.