Platform: Samsung Android
Selected port: COM1
Selected model: SM-J730G
Detected phone model: SM-J730G
Firmware compiled date: Mon Jun 12 18:49:47 KST 2017
PDA version: J730GDXU1AQF6
CSC version: J730GOLB1AQF6
SW version: J730GDXU1AQF5
Phone SN: R58J728C4FN
Android version: 7.0 (NRD90M)
Sales code: XME
Country: MALAYSIA
HW platform: exynos5
HW Chip: exynos7870
HW Modem: SHANNON315
Security patch level: 2017-06-01
SIM 1 status: absent
SIM 2 status: absent
Codename: j7y17ltedx
Checking Root:
Phone is Rooted.
Initializing exploit...
Phone will restart now. Please don't disconnect cable!
Searching for a phone. Please wait...
Phone found.
Executing exploit...
Searching for a phone. Please wait...
Found phone on COM299
Reading info...
Detected phone model: SM-J730G
HW Version: XME
PDA version: J730GDXU1AQF6
CSC version: J730GOLB1AQF6
CP version: J730GDXU1AQF5
Phone SN: R58J728C4FN
Phone IMEI: 356456-08-344153-8
Unlocking phone...
Please type '00000000' (8 zeros) on the phone if needed.
Phone is successfully unlocked
To finish the operation, please restart the phone via phone's menu.
Performed by 2.6.0 Software version.
BOSS FIRMWARE™
yahoo id:gsmhabib45@yahoo.com
Gmail:habib.mse@gmail.com
Skype:habib.mse
Sonork Id: 100.1609676
Mob:+8801913961692
+8801613961692