Platform: Samsung Android
Selected port: COM300
Selected model: SM-J200F
Detected phone model: SM-J200F
Firmware compiled date: Fri Mar 17 16:22:34 KST 2017
PDA version: J200FXXU3AQC2
CSC version: J200FOJV3AQC1
SW version: J200FXXU3AQC1
Phone SN: R28GB52S2CW
Android version: 5.1.1 (LMY47X)
Sales code: KSA
HW platform: exynos3
HW Chip: exynos3475
HW Modem: SHANNON308
Security patch level: 2017-03-01
Phone is Rooted.
Reading security backup, please wait…
Backup saved as C:\Program Files\Octoplus\Octoplus_Samsung\BACKUP\Security-SM-J200F-Unknown16-04-2017_18-04-31-.asec file
Connecting to modem port…
Found phone on COM300
Reading data from phone…
Could not read data from modem port, trying with exploit..
Phone will restart now. Please don’t disconnect cable!
Searching for a phone. Please wait…
Exploit has been executed successfully
Phone is successfully unlocked
To finish the operation, please restart the phone via phone’s menu.
Performed by 2.5.1 Software version.