Offline
Samsung s9+ unlock sprint G965u bit 8 u8 bin8 Binary 8 binario 8 rev8 octoplus
Starting Unlock (Sprint Factory)
Selected model: SM-G965U
Searching ADB devices...
Press "OK" button on the device to allow USB debugging
Reading info...
Detected model: SM-G965U
Fingerprint: samsung/star2qltesq/star2qltesq:10/QP1A.190711.020/G965USQU8FTJ3:user/release-keys
Firmware compiled date: Thu Oct 8 21:10:04 KST 2020
PDA version: G965USQU8FTJ3
CSC version: G965UOYN8FTJ3
SW version: G965USQU8FTJ3
Build number: 17061288
Phone SN: 38335a4754423098
Android version: 10 (QP1A.190711.020)
Sales code: SPR
Country: USA
HW platform: sdm845
HW Chip: qcom
HW Modem: REV1.1
Security patch level: 2020-10-01
Warranty Void: 0
Codename: star2qltesq
SIM 1 status: ABSENT
SIM 2 status: ABSENT
Modem board: SDM845
Rebooting device...
Searching ADB devices...
Rebooting device...
Searching ADB devices...
Connecting to server...
Username: **********
Your balance: 100 credits
Starting exploit...
Reading IMEI...
Checking lock status...
Lock status: Locked
Sending device information..
Your account will be charged for 50 credits. Do you want to continue?
Reading SIMLOCK...
Sending data to server...
Sending request...
Unlocking phone...
Checking lock status...
Lock status: Unlocked
Unlock (Sprint Factory) done
Execution time 3 minute(s) 17 second(s)
Performed by 4.0.0 Software version.
Selected model: SM-G965U
Searching ADB devices...
Press "OK" button on the device to allow USB debugging
Reading info...
Detected model: SM-G965U
Fingerprint: samsung/star2qltesq/star2qltesq:10/QP1A.190711.020/G965USQU8FTJ3:user/release-keys
Firmware compiled date: Thu Oct 8 21:10:04 KST 2020
PDA version: G965USQU8FTJ3
CSC version: G965UOYN8FTJ3
SW version: G965USQU8FTJ3
Build number: 17061288
Phone SN: 38335a4754423098
Android version: 10 (QP1A.190711.020)
Sales code: SPR
Country: USA
HW platform: sdm845
HW Chip: qcom
HW Modem: REV1.1
Security patch level: 2020-10-01
Warranty Void: 0
Codename: star2qltesq
SIM 1 status: ABSENT
SIM 2 status: ABSENT
Modem board: SDM845
Rebooting device...
Searching ADB devices...
Rebooting device...
Searching ADB devices...
Connecting to server...
Username: **********
Your balance: 100 credits
Starting exploit...
Reading IMEI...
Checking lock status...
Lock status: Locked
Sending device information..
Your account will be charged for 50 credits. Do you want to continue?
Reading SIMLOCK...
Sending data to server...
Sending request...
Unlocking phone...
Checking lock status...
Lock status: Unlocked
Unlock (Sprint Factory) done
Execution time 3 minute(s) 17 second(s)
Performed by 4.0.0 Software version.