Offline
J737T U8 unlock bit 8 u8 bin8 Binary 8 binario 8 rev8 samkey
Searching for SAMSUNG Mobile USB Modem...OK
SAMSUNG USB Modem detected on [COM44]
Looking for DEVICE...OK
Reading USB MODEM information...OK
MODEL : SM-J737T
VER : J737TUVS8BTE1/J737TTMB8BTE1/J737TUVS8BTE1/J737TUVS8BTE1
IMEI : 35605
S/N : R58KB63HLR
U/N : CBJ00DCA14764A5
Loading ADB module............OK
Loading ADB module.OK
Searching for SAMSUNG ADB device...OK
Checking device authorization...OK
Reading ADB device information...
ADB Serial Number : 5200DCA14764A5F3
SIM State : OK
AP Version : J737TUVS8BTE1
CP Version : J737TUVS8BTE1
Debug Level : OK
Android Version : 9
Warranty VOID : 0
Setting USB Settings to [dm,acm,adb] automatically...OK
Searching for SAMSUNG Diagnostic Port...[COM45]...OK
Connecting to phone via DIAG port...OK
Reading CP registers.....OK
Executing exploit...[CPRAM:OK]...[BUFF:OK]...OK
Loading RIL applet...OK
Starting RIL applet...OK
Reading RADIO information...
IMEI : 3560
MSL address : R58KB63HLR
Initializing RIL applet...OK
Starting exploit...[SHL:OK]...OK
Reading HW signature...OK
Signature status : VALID
Sending data to SERVER...OK
Waiting for SERVER response...OK
Loading RIL applet...[SHL:OK]...OK
Unlocking phone...[OEM:OK]...OK
Operation successful.
PLEASE REBOOT PHONE MANUALLY TO FINISH UNLOCK!
SamKEY Team (2017)
Searching for SAMSUNG Mobile USB Modem...OK
SAMSUNG USB Modem detected on [COM44]
Looking for DEVICE...OK
Reading USB MODEM information...OK
MODEL : SM-J737T
VER : J737TUVS8BTE1/J737TTMB8BTE1/J737TUVS8BTE1/J737TUVS8BTE1
IMEI : 35605
S/N : R58KB63HLR
U/N : CBJ00DCA14764A5
Loading ADB module............OK
Loading ADB module.OK
Searching for SAMSUNG ADB device...OK
Checking device authorization...OK
Reading ADB device information...
ADB Serial Number : 5200DCA14764A5F3
SIM State : OK
AP Version : J737TUVS8BTE1
CP Version : J737TUVS8BTE1
Debug Level : OK
Android Version : 9
Warranty VOID : 0
Setting USB Settings to [dm,acm,adb] automatically...OK
Searching for SAMSUNG Diagnostic Port...[COM45]...OK
Connecting to phone via DIAG port...OK
Reading CP registers.....OK
Executing exploit...[CPRAM:OK]...[BUFF:OK]...OK
Loading RIL applet...OK
Starting RIL applet...OK
Reading RADIO information...
IMEI : 3560
MSL address : R58KB63HLR
Initializing RIL applet...OK
Starting exploit...[SHL:OK]...OK
Reading HW signature...OK
Signature status : VALID
Sending data to SERVER...OK
Waiting for SERVER response...OK
Loading RIL applet...[SHL:OK]...OK
Unlocking phone...[OEM:OK]...OK
Operation successful.
PLEASE REBOOT PHONE MANUALLY TO FINISH UNLOCK!
SamKEY Team (2017)