Samsung J730F BIT 3 Unlock | Samsung J730F BIT 3 Mở Mạng
Samsung J730F BIT 3 Khóa Sim Nhà Mạng,Mở Mạng Thành Công
Samsung J730F BIT 3 Network Lock,Unlock Network Online
Samsung J730F BIT 3 Unlock Network By Code | Samkey
Combination J730F U3,Stock J730F U3, J730F U3 FRP, J730F U3 Bypass
☯ Unlock - Remove FRP - Repair IMEI - Online (Teamviewer)
☎ Hotline : 0966833711 (Zalo + Facebook)
☎ Hotline : 0966833711 (Zalo + Facebook)
@thanhnamPDAviet SAMSUNG USB Modem detected on [COM4] Looking for DEVICE...OK Reading USB MODEM information.......OK MODEL : SM-J730F VER : FA70_J730FXXU3ARI1 IMEI : 358224092301@thanhnamPDAviet S/N : RF8K62FVFB U/N : CAJ00C9BE4CA755 Loading ADB module...OK Starting ADB module...OK Searching for SAMSUNG ADB device...OK Checking device authorization...OK Reading ADB device information... ADB Serial Number : 5200C9BE4CA75537 CP Version : J730FXXU3ARI1 Android Version : 7.0 Warranty VOID : 1 Loading RIL applet...OK Starting RIL applet...OK Reading RADIO information... IMEI : 35822409230@thanhnamPDAviet MSL address : RF8K62FVFB Initializing RIL applet......OK Starting exploit...[SHL:OK]...OK Reading HW signature...OK Reading data...OK Calculating security...[KEY:OK]...OK Sending data to SERVER...OK Waiting for SERVER response (may take few minutes)...OK Sending unlock codes to phone...OK Operation successful. 80503917 4180803
3 Nhận xét
@thanhnamPDAviet
Trả lờiXóaWaiting ADB device... OK
Reading phone info...
Model: SM-J730F
Android version: 7.0
PDA version: J730FXXU2ARF2
CSC version: J730FDBT2ARF2
Phone version: J730FXXU2AQK2
Product code: SM-J730FZDDDBT
CSC country code: Germany
CSC sales code: DBT
Phone SN: R58K849X3EM
IMEI: 359237093988785
HW version: MP 0.500
RF cal date: 20180824
Chip name: EXYNOS7870
Modem board: SHANNON315
Security patch: 2018-06-01
Boot Warranty bit: 0
Checking Super user right... true
Reading NV data... OK
Checking NV data... OK
Reading data... OK
Detecting MODEM... OK
Reading MODEM... OK
Calculating... OK
Writing zTool... OK
Initialization zTool... OK
Running zTool, please wait...
Start... OK
Initialization... OK
Generate and check client proof... OK
Verify proof by client... OK
Reading data... OK
HWID: 1A D0 3F 5C 48 7D 0F A6 F6 EC 83 DB 19 84 5A 94
Calculating... OK
Unlocking... OK
Writing NV data... OK
Rebooting phone... OK
Unlock done
Waiting ADB device... OK
Trả lờiXóaReading phone info...
Model: SM-J730F
Android version: 7.0
PDA version: J730FXXU3ARI1
CSC version: J730FLUX3ARI1
Phone version: J730FXXU3ARI1
Product code: SM-J730FZSDLUX
CSC country code: Luxembourg
CSC sales code: LUX
Phone SN: R58K92VHAEJ
IMEI: 359238095288000
HW version: MP 0.500
RF cal date: 20180920
Chip name: EXYNOS7870
Modem board: SHANNON315
Security patch: 2018-09-01
Boot Warranty bit: 1
SIM State: NETWORK_LOCKED,NETWORK_LOCKED
Initialization zTool... OK
Running zTool, please wait... OK
Reading data from phone... OK
Searching server... OK
Checking server answer... OK
Executing... OK
Reading data from phone... OK
Calculating... OK
Searching server... OK
Waiting for server answer... OK
Freeze code: 50257293
NET lock: 86360803
SUB lock: 00000000
SP lock: 00000000
CP lock: 00000000
SIM lock: 00000000
For check lock status: *#7465625#
@thanhnamPDAviet
Trả lờiXóaSearching for SAMSUNG Mobile USB Modem...OK
SAMSUNG USB Modem detected on [COM109]
Looking for DEVICE...OK
Reading USB MODEM information...OK
MODEL : SM-J730F
VER : J730FXXU3BRK2/J730FXEF3BRK2/J730FXXU3BRK2/J730FXXU3BRK2
IMEI : 356204093516845
S/N : R58K30PC5N
U/N : CAJ00B1C24F60C4
Connecting to DEVICE in DL-Mode...OK [COM5]
Setting up module...OK
Initializing memory...OK
Transmitting data...OK
Restarting DEVICE to AT-Mode...OK
Loading ADB module.....OK
Starting ADB module...OK
Searching for SAMSUNG ADB device...OK
Checking device authorization...OK
Reading ADB device information...
ADB Serial Number : 5200B1C24F60C457
SIM State : ABSENT (OK)
Debug Level : OK
CP Version : J730FXXU3ARI1
Android Version : 8.1.0
Warranty VOID : 1
Loading RIL applet...OK
Starting RIL applet...OK
Reading RADIO information...
IMEI : 356204093516845
Initializing RIL applet....OK
Starting exploit...[SHL:OK]...OK
Reading HW signature...OK
Reading data...OK
Calculating security...[KEY:OK]...OK
Sending data to SERVER...OK
Waiting for SERVER response (may take few minutes)...OK
Sending unlock codes to phone...
14649504
37151647