Analyzing file [F:/Z3X FRT/winrar FRP/z3x box file/J/J260F/AP_J260FXXU3ASF1_CL15031630_QB24071173_REV01_user_ low_ship_meta.tar.md5].....OK
Extracting files.....OK
Decompressing LZ4.....OK
Checking output file.....OK
File to process [C:/Users/sami/Desktop/boot.img]
Unpacking image.....OK
Checking ramdisk status.....OK
Patching ramdisk.....OK
Patching dm-verity flags.....OK
Patching protections.....OK
Repacking image.....OK
Rooted image saved to [F:/Z3X FRT/winrar FRP/z3x box file/J/J260F/RootedBoot.rEFT]
Operation ID: C09CA6F08C0CD3A5A782B0385533A379
Elapsed time 00:50 -- Version 1.3.2
Analyzing [F:/Z3X FRT/winrar FRP/z3x box file/J/J260F/RootedBoot.rEFT].....OK
Searching for Samsung ODIN protocol.....Detected {COM12}
Connecting to device.....OK
Device Model.....SM-J260F
Reading PIT.....OK
Flashing [boot.img].....OK
Rebooting device.....OK
Operation ID: C45FFB80A97956FC281E7166B63DA6E8
Elapsed time 00:09 -- Version 1.3.2
Connecting to device.....OK
Reading device info.....OK
Baseband Version: J260FXXU3ASF1
Serial Number: R28M20MY3JE
Device Arch: exynos7570
Device bootloader: J260FXXU3ASF1
Device selinux: enforcing
Device warranty bit: 0
Device Firmware: J260FXXU3ASF1
Android version: 8.1.0
Device SDK: 27
Device data encryption: unsupported
Firmware Country: UAE
Device Hardware: samsungexynos7570
Device CPU: armeabi-v7a
Device Factory: samsung
Device Model: SM-J260F
Device IMEI: 358663086956573
Root status.....Rooted { 3.16:EFTSU }
Operation ID: AA444B95FDB169659F8AE1B3D6658F44
Elapsed time 00:00 -- Version 1.3.2
great team great work thx.............. |