LG Q51 Q510N Firmware ANDROID 10 Readback Exclusive ⚠️
Ditulis pada
views
Daftar Isi
Firmware LG Q510N Q51
Jumpa lagi dengan kami ahmadservice ,Selamat datang kembali di website tecinta kita ini ❤️Pada kesempatan kali ini kami bagikan file firmware LG Q51 build Q510N20j
dimana file ini hasil read dari unit normal dan ben bentuk scatter file,
file ini bisa untuk mengatasi LG Q51 yang mengalami deadboot brick unbrick akibat
kesalahan file flash imei hilang atau untuk file emmc pun bisa ,
untuk BOOT TO BROM MODE ponsel dalam keadaan off, tekan tombol BOOT
kemudian colok usb , untuk gambar TOMBOL BOOT
![LG Q51 Q510N BOOT Mode , Test point](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjMBAC3pYEy1cfywgFaP7TMGEcf1AFwAfXbHZIcKez_uzOm_AC7I6RqWsU9Xrs3TKuySCscTZDHowHUcIt587Bf5cOAs4dJbbw7_zthTkj0ba_duv5saOOBW68FbEajaCKk6YkGjOMFbGuGAjYVcfK0QaQgxporabEa6Ls7XK-sg6dJ0805Du48-DpZ/w360-h640-rw/WhatsApp%20Image%202022-09-19%20at%2021.19.12.jpeg)
Cara Flash LG Q51 Q510N
Untuk cara flash bisa menggunakan hydratool unlocktool ufi tool umt unlocktool dan lainnya...semoga di mudahkan dalam pengerjaanya ya..
sampai bertemu lagi di tutorial berikutnya...
Unduhan File Download
Q510N20j_Readback_scatter_OK.rarType:Scatter File Size: 3.7GB termasuk NV
Download via ASC Page
![LG Q51 Q510N deadboot](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhG-GxwsxQckHlNs9Y-2uUUzFXxwQbzvuXdMHnvHLJHL1h1OLMHli8MWwraDZV4WYIXUirf19LWNxeRYoYH3JqaJWe4mlWTix4ge55NU3ntLSvJy02xH7RLdYYnc-DmCZPsihLN_YCCVr7IAez9DzzngPMrcyUDbQpotk5VOHHM_-9VwrAeEMtJATDE/w360-h640-rw/WhatsApp%20Image%202022-09-19%20at%2021.20.27.jpeg)
Informasi Readback Unlocktool
BOOT DEVICE Initializing usb... OKWaiting for device... COM38 [BOOTROM:0E8D:0003]
Bypassing authentication... OK
Analyzing preloader... preloader_muse6762_dh30_q.bin [MT6765:7:1232] [Internal]
Vendor : LG
Handshaking... OK
Reading hardware info... OK
Hardware : MT6765 [Helio G25|G35|P35] 0766 8A00 CA00 0000
Security Config : SCB SLA DAA
MEID : 92B0ADEEB388F9A8DB3F6EB3B33BBAF6
Sending Download-Agent... OK
Syncing with target... OK
Booting device... OK
Syncing with DA... OK
Storage : EMMC - CID : 684A0190.50613842.2A09033E.B9B62320
Vendor : SK Hynix - Name : hB8aP> - Serial : 589310473 - Rev : 3
Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 16 MiB - User Area : 29.12 GiB
Reading partition info... OK [62]
Reading device info... OK
Android Version : 11
Security Patch : 2021-11-01
READ BACK Reading preloader [512 KiB] -> preloader.bin... OK
Reading pgpt [8 MiB] -> pgpt.bin... OK
Reading proinfo [3 MiB] -> proinfo.bin... OK
Reading nvcfg [32 MiB] -> nvcfg.img... OK
Reading nvdata [64 MiB] -> nvdata.img... OK
Reading metadata [32 MiB] -> metadata.img... OK
Reading nvram [64 MiB] -> nvram.img... OK
Reading misc2 [8 MiB] -> misc2.img... OK
Reading ftm [8 MiB] -> ftm.img... OK
Reading spare1 [5 MiB] -> spare1.img... OK
Reading frp [8 MiB] -> frp.bin... OK
Reading para [512 KiB] -> para.bin... OK
Reading expdb [20 MiB] -> expdb.bin... OK
Reading spare2 [3.5 MiB] -> spare2.img... OK
Reading protect1 [8 MiB] -> protect1.img... OK
Reading protect2 [8 MiB] -> protect2.img... OK
Reading seccfg [8 MiB] -> seccfg.bin... OK
Reading persist [48 MiB] -> persist.img... OK
Reading efuse [512 KiB] -> efuse.img... OK
Reading eksst [512 KiB] -> eksst.img... OK
Reading encrypt [512 KiB] -> encrypt.img... OK
Reading persist_lg [8 MiB] -> persist_lg.img... OK
Reading p_persist_lg [8 MiB] -> p_persist_lg.img... OK
Reading power [40 MiB] -> power.img... OK
Reading mpt [32 MiB] -> mpt.img... OK
Reading fota [10 MiB] -> fota.img... OK
Reading rct [1 MiB] -> rct.img... OK
Reading els [16 MiB] -> els.img... OK
Reading carrier [51.5 MiB] -> carrier.img... OK
Reading md1img_a [100 MiB] -> md1img_a.img... OK
Reading spmfw_a [1 MiB] -> spmfw_a.img... OK
Reading scp_a [6 MiB] -> scp_a.img... OK
Reading sspm_a [1 MiB] -> sspm_a.img... OK
Reading lk_a [1 MiB] -> lk_a.img... OK
Reading logo_a [8 MiB] -> logo_a.img... OK
Reading laf_a [40 MiB] -> laf_a.img... OK
Reading boot_a [40 MiB] -> boot_a.img... OK
Reading dtbo_a [8 MiB] -> dtbo_a.img... OK
Reading tee_a [5 MiB] -> tee_a.img... OK
Reading vbmeta_a [8 MiB] -> vbmeta_a.img... OK
Reading spare3 [6 MiB] -> spare3.img... OK
Reading md1img_b [100 MiB] -> md1img_b.img... OK
Reading spmfw_b [1 MiB] -> spmfw_b.img... OK
Reading scp_b [6 MiB] -> scp_b.img... OK
Reading sspm_b [1 MiB] -> sspm_b.img... OK
Reading lk_b [1 MiB] -> lk_b.img... OK
Reading logo_b [8 MiB] -> logo_b.img... OK
Reading laf_b [40 MiB] -> laf_b.img... OK
Reading boot_b [40 MiB] -> boot_b.img... OK
Reading dtbo_b [8 MiB] -> dtbo_b.img... OK
Reading tee_b [5 MiB] -> tee_b.img... OK
Reading vbmeta_b [8 MiB] -> vbmeta_b.img... OK
Reading srtc [8 MiB] -> srtc.img... OK
Reading spare4 [6 MiB] -> spare4.img... OK
Reading vendor_a [800 MiB] -> vendor_a.img... OK
Reading system_a [2.67 GiB] -> system_a.img... OK
Reading vendor_b [800 MiB] -> vendor_b.img... OK
Reading system_b [2.67 GiB] -> system_b.img... OK
Reading product_a [1.2 GiB] -> product_a.img... OK
Reading product_b [1.2 GiB] -> product_b.img... OK
Reading OP_a [400 MiB] -> OP_a.img... OK
Reading OP_b [400 MiB] -> OP_b.img... OK
Reading userdata [18.07 GiB] -> userdata.img... OK
Reading flashinfo [16 MiB] -> flashinfo.img... OK
UNLOCKTOOL 2022.09.11.0
Elapsed time : 12 minutes 40 seconds
Waiting for device... COM51 [UNKNOWN:0000:0000]
COM52 [UNKNOWN:0000:0000]
UNKNOWN Mode!
Tips : Device need to be in BROM mode if Auth Bypass is selected!
UNLOCKTOOL 2023.07.22.0
Elapsed time : 6 seconds