kangsuper

Sabtu, 17 Februari 2018

Flash & Bypass FRP Himax M21 ~ Verifikasi Akun Google

FRP Himax M21  Verifikasi akun Google ini mencegah pengguna yang tidak sah dari Mengakses atau menggunakan perangkat Anda jika telah ulang ke pengaturan pabrik tanpa izin Anda (misalnya, jika perangkat hilang atau dicuri)

Mohon digunakan dengan bijaksana, jangan digunakan pada hp curian. thx


Device Brand   : HIMAX
Device Model   : M21
Device CPU     : MT6737M
Device IntName : M21
Device Version : 7.0
Device Compile : 9/23/2017 9:00:18 AM
Device Project : HIMAX_M21_0.07_923
Device ExtInfo : M21

HIMAX M21 WARNA ABU-ABU = EMAS

Bahan :
  1. Download  Firmware Himax M21 BYPASS FRP ONLY  atau Download Disini (75KB)
  2. Download  Firmware FULL Himax M21  + FRP  atau Download Disini
  3.  Download SP-Flash-Tool Wajib pake versi ini Download Disini
  4.  Driver bila belum punya instal dulu driver mtknya
  5.  Untuk tutorial flash via Flash tool bisa dilihat DISINI 
  6.  Konfirmasi pass WA / sms only 0822-1163-1565 (nomor ini hanya buat konfirmasi, BUKAN YANG DI ISI) , Mahar pulsa 10k


Cara Kerja :
1. Buat remove / bypass FRP verifikasi akun google  Himax M21, hanya centang pada tab FRP, lihat video dibawah
2. Silahkan pake Flash tool  yang kami upload diatas, jangan pake versi lain

 Cara Flash  Himax M21 via Flash Tool Bypass FRP only

Cara Flash  Himax M21 via Flash Tool + Bypass FRP



Log Read Firmware Himax M21
Loading DA: MTK_AllInOne_DA.bin (6.11 MiB)
 version: 3.3001.00.00, start addr: 0x40000800
Connecting to BootROM...
 Power off the phone, disconnect and reconnect the battery(if possible) and connect USB cable...
 Scanning BootROM or Preloader port(30 s)... Done.
 Detected PreLoader USB VCOM Port (COM6)
 USB Driver: [MediaTek Inc.] usbser, version: 2.0.0.0, date: 12-24-2011
Connecting Bootrom... Done.
Sending Download Agent... Done.
Platform: MT6735M_S00, Hw ver: 0xCA00, Sw ver: 0x0000
 Secure ver: 0xFF, BL ver: 0x01
 Secure config: 0x00
 SRAM size: 128 KiB
DRAM size: 2 GiB
PL Secure ver: 0x02
Storage type: eMMC
Card/BGA: BGA (Discrete embedded)
Manufacturer ID: 0x15 (Samsung)
Product name: QE13MB (0x514531334d42), rev: 0x0D, serial number: 0x827AD331
Manufacturing date: Aug 2017
CID: 15010051 4531334D 420D827A D3318429
Capacity: 14.57 GiB(15,646,851,072 bytes)
 Boot1: 4096 KiB
 Boot2: 4096 KiB
 RPMB: 4096 KiB
 User area: 14.56 GiB(15,634,268,160 bytes)
USB speed: High-Speed
platform: MT6737M, cpu abi: arm64-v8a
manufacturer: HIMAX
board: M21, name: M21
brand: HIMAX, model: M21
build id: NRD90M, version: 7.0 Nougat (HIMAX_M21_0.07_923)
build description: M21-user 7.0 NRD90M 1506157220 release-keys
crypto state: encrypted
BROM version[0]: 7.1625.3.0
Loading DA: MTK_AllInOne_DA.bin (6.11 MiB)
 version: 3.3001.00.00, start addr: 0x40000800
Connecting to BootROM...
 Power off the phone, disconnect and reconnect the battery(if possible) and connect USB cable...
 Scanning BootROM or Preloader port(30 s)... Done.
 Detected PreLoader USB VCOM Port (COM6)
 USB Driver: [MediaTek Inc.] usbser, version: 2.0.0.0, date: 12-24-2011
Connecting Bootrom... Done.
Sending Download Agent... Done.
Platform: MT6735M_S00, Hw ver: 0xCA00, Sw ver: 0x0000
 Secure ver: 0xFF, BL ver: 0x01
 Secure config: 0x00
 SRAM size: 128 KiB
DRAM size: 2 GiB
PL Secure ver: 0x02
Storage type: eMMC
Card/BGA: BGA (Discrete embedded)
Manufacturer ID: 0x15 (Samsung)
Product name: QE13MB (0x514531334d42), rev: 0x0D, serial number: 0x827AD331
Manufacturing date: Aug 2017
CID: 15010051 4531334D 420D827A D3318429
Capacity: 14.57 GiB(15,646,851,072 bytes)
 Boot1: 4096 KiB
 Boot2: 4096 KiB
 RPMB: 4096 KiB
 User area: 14.56 GiB(15,634,268,160 bytes)
USB speed: High-Speed
platform: MT6737M, cpu abi: arm64-v8a
manufacturer: HIMAX
board: M21, name: M21
brand: HIMAX, model: M21
build id: NRD90M, version: 7.0 Nougat (HIMAX_M21_0.07_923)
build description: M21-user 7.0 NRD90M 1506157220 release-keys
crypto state: encrypted
Reading preloader_kon6737m_d6_65_n.bin... Done.
Reading pgpt... Done.
Reading proinfo.bin... Done.
Reading nvram... Done.
Reading protect1... Done.
Reading protect2... Done.
Reading lk.bin... Done.
Reading para... Done.
Reading boot.img... Done.
Reading recovery.img... Done.
Reading logo.bin... Done.
Reading expdb... Done.
Reading seccfg... Done.
Reading oemkeystore... Done.
Reading secro.img... Done.
Reading keystore... Done.
Reading trustzone.bin... Done.
Reading trustzone.bin... Done.
Reading frp... Done.
Reading nvdata... Done.
Reading metadata... Done.
Reading flashinfo... Done.
Files saved to \\D:\himax\m21\banteng\




5 komentar:

Posting Komentar