![]() ![]() ![]() ![]() |
![]() |
Welcome to the GSM-Forum forums. You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. Only registered members may post questions, contact other members or search our database of over 8 million posts. Registration is fast, simple and absolutely free so please - Click to REGISTER! If you have any problems with the registration process or your account login, please contact contact us . |
|
Register | FAQ | Donate | Forum Rules | Root any Device | ★iPhone Unlock★ | ★ Direct Codes ★ | Direct Unlock Source | Search | Today's Posts | Mark Forums Read |
![]() |
| LinkBack | Thread Tools | Display Modes |
![]() | #1891 (permalink) | |
Product Manager ![]() ![]() ![]() ![]() ![]() Join Date: Apr 2008 Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989 Status: Offline Sonork: 100.1593052 Thanks Meter: 8,626 | Huawei FRL-L22(Y9A 2021) Removing Account successfully done by Hydra Tool Huawei FRL-L22(Y9A 2021) Removing Account successfully done by Hydra Tool 1. Run Hydra MTK Module and choose Sosc. 2. Choose Brand and Module. 3. Go to "Service"-->"Tool" Tab. 4. Choose "Huawei" 5. Choose "|Remove Account" from "Module / Option" of drop down menu. 6. Click on "Execute" 8. connect device to the computer with USB Data cable 7. Wait until the process is completed. Screen Shorts ![]() Logs Quote:
Dipendra Pathak | |
![]() |
![]() | #1892 (permalink) | |
Product Manager ![]() ![]() ![]() ![]() ![]() Join Date: Apr 2008 Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989 Status: Offline Sonork: 100.1593052 Thanks Meter: 8,626 | Oppo A12 (CPH 2083) formatting user data successfully done by Hydra Tool Oppo A12 (CPH 2083) formatting user data successfully done by Hydra Tool 1. Run Hydra MTK Tool. 2. Choose Module and Brand. 3. Go to "Service"--> "Tool" 4. Choose "Factory Format / Format user data" 5. Choose "Auto" from Module / Option from deop down menu. 6. Click on "Execute" 7. Connect device with computer using Data Cable. 8. Wait Operation is completed. Screen Shorts ![]() Logs Quote:
Dipendra Pathak | |
![]() |
The Following User Says Thank You to Dipendra Pathak For This Useful Post: |
![]() | #1893 (permalink) | |
Product Manager ![]() ![]() ![]() ![]() ![]() Join Date: Apr 2008 Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989 Status: Offline Sonork: 100.1593052 Thanks Meter: 8,626 | Another Xiaomi Redmi 6a Mi Account successfully Removed by Hydra Tool Another Xiaomi Redmi 6a Mi Account successfully Removed by Hydra Tool 1. Run Hydra MTK Module and choose "Sosc" .2. Select Brand and Model as "Auto" 3. Go to Service-->Tools-->Xiaoami 4. Choose "Remove Mi Account + FRP" from "Method / Option" drop down menu 5. Execute and connect the device to the computer with data cable 6. wait until the process is completed Screen Shorts ![]() Logs Quote:
Dipendra Pathak | |
![]() |
The Following User Says Thank You to Dipendra Pathak For This Useful Post: |
![]() | #1894 (permalink) | |
Product Manager ![]() ![]() ![]() ![]() ![]() Join Date: Apr 2008 Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989 Status: Offline Sonork: 100.1593052 Thanks Meter: 8,626 | Huawei MRD-LX2 (Y6 2019) Removing account successfully done by Hydra Tool Huawei MRD-LX2 (Y6 2019) Removing account successfully done by Hydra Tool 1. Run Hydra MTK Module and choose Sosc. 2. Choose Brand and Module. 3. Go to "Service"-->"Tool" Tab. 4. Choose "Huawei" 5. Choose "Remove Account" from "Module / Option" of drop down menu. 6. Click on "Execute" 8. connect device to the computer with USB Data cable 7. Wait until the process is completed. Screen Shorts ![]() Logs Quote:
Dipendra Pathak | |
![]() |
The Following User Says Thank You to Dipendra Pathak For This Useful Post: |
![]() | #1895 (permalink) | |
Product Manager ![]() ![]() ![]() ![]() ![]() Join Date: Apr 2008 Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989 Status: Offline Sonork: 100.1593052 Thanks Meter: 8,626 | Huawei MED-L49 (Y6P) restore OEM info successfully done by Hydra Tool Huawei MED-L49 (Y6P) restore OEM info successfully done by Hydra Tool 1. Run MTK Hydra Tool. 2. Choose "Brand" and "Module". 3. Go to "Service"--> "Tool" 4. Choose "Huawei" 5. Chose "Restore OEM Info" from "Method/ Option" drop down option. 6. Click "Execute". 7. Connect Device to computer using USB Data Cable. 8. Wait until the operation is completed. Screen Shorts ![]() Logs Quote:
Dipendra Pathak | |
![]() |
![]() | #1896 (permalink) | |
Product Manager ![]() ![]() ![]() ![]() ![]() Join Date: Apr 2008 Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989 Status: Offline Sonork: 100.1593052 Thanks Meter: 8,626 | Huawei DRA-LX9 (Y5P 2020) account successfully removed by Hydra Tool Huawei DRA-LX9 (Y5P 2020) account successfully removed by Hydra Tool 1. Run Hydra MTK Module and choose Sosc. 2. Choose Brand and Module. 3. Go to "Service"-->"Tool" Tab. 4. Choose "Huawei" 5. Choose "Remove Account" from "Module / Option" of drop down menu. 6. Click on "Execute" 8. connect device to the computer with USB Data cable 7. Wait until the process is completed. Screen Shorts ![]() Logs Quote:
Dipendra Pathak | |
![]() |
![]() | #1897 (permalink) | |
Product Manager ![]() ![]() ![]() ![]() ![]() Join Date: Apr 2008 Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989 Status: Offline Sonork: 100.1593052 Thanks Meter: 8,626 | Huawei FRL-L23 (Y9A 2021) restoring OEM info successfully done by Hydra Tool Huawei FRL-L23 (Y9A 2021) restoring OEM info successfully done by Hydra Tool 1. Run MTK Hydra Tool. 2. Choose "Brand" and "Module". 3. Go to "Service"--> "Tool" 4. Choose "Huawei" 5. Chose "Restore OEM Info" from "Method/ Option" drop down option. 6. Click "Execute". 7. Connect Device to computer using USB Data Cable. 8. Wait until the operation is completed. Screen Shorts ![]() Logs Quote:
Dipendra Pathak | |
![]() |
![]() | #1898 (permalink) | |
Product Manager ![]() ![]() ![]() ![]() ![]() Join Date: Apr 2008 Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989 Status: Offline Sonork: 100.1593052 Thanks Meter: 8,626 | Huawei ATU-L22(Y6 2018) EDL FRP successfully removed by Hydra Tool Huawei ATU-L22(Y6 2018) EDL FRP successfully removed by Hydra Tool - Run Hydra Qualcomm Module - Select Model of your device (cellphone / mobile) - Select Flashmode - Tick" FRP Remove" - Join the TP or Short the TP of Device (you need to disassemble the device). - Click Execute kay - Connect USB Cable - DONE Screen Shorts ![]() Test Point ![]() Logs Quote:
Dipendra Pathak | |
![]() |
![]() | #1899 (permalink) |
No Life Poster ![]() ![]() ![]() ![]() ![]() Join Date: Jan 2020 Location: Algeria
Posts: 847
Member: 2944109 Status: Offline Thanks Meter: 713 | C-idea CM800 Remove Lock Without Data Loss C-idea CM800 Remove Lock Without Data Loss ![]() Code: Brand : AUTO Model : AUTO Connection : Flash Mode ===================================== Connection -Please wait... -Found...[COM5] TPortConnection.Create...(COM5)..Opening...Ok Reading System Info Brand : alps Vendor : alps Model : CM800 ID : LRX21M SDK : 21 Release : 6.1 ABI : armeabi-v7a CPU abilist : armeabi-v7a,armeabi Description : full_b906-user 5.1 LRX21M 1575957105 test-keys Device : CM800 Display ID : LRX21M test-keys Platform : mt6582 Fingerprint : alps/full_b906/b906:5.1/LRX21M/1575957105:user/test-keys StorageType : mtp,mass_storage Userdata State : Not Encrypted ------------------------------------- Operation : Remove Lock Without Data Loss Processing... Searching patching address.. [Ok].. [Ok].. [Ok].. [Ok].. [Ok] Ok Rebooting Device [Reboot To Normal] Reboot Done!! TPortConnection.Destroy.....Closing...Ok.. Elapsed Time : 00:00:04 |
![]() |
![]() | #1900 (permalink) |
No Life Poster ![]() ![]() ![]() ![]() ![]() Join Date: Jan 2020 Location: Algeria
Posts: 847
Member: 2944109 Status: Offline Thanks Meter: 713 | OPPO A71 (2018) CPH1801 Format Userdata By HydraTool OPPO A71 (2018) CPH1801 Format Userdata By HydraTool ![]() Code: PreOperation Configuration Brand : OPPO Model : A71 (2018) CPH1801 Storage : Auto Loader: a71_firehose.bin Port : Auto Connection : Searching for Qualcomm 9008 Device...Found FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM20) SymbolicName :\??\USB#VID_05C6&PID_9008#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver :08/02/2017,2.1.2.7 0x2011F9DC Getting device info...... Serial No.: 0x2080D522 MSM ID : 0x0009A0E1, SDM450-Qualcomm Snapdragon 450 PBL Ver : 00000000 PK HASH : 05F06BA44EEB2ABDF14BB644AABC2E69 3DDF7B8711CC7CF07D4CD0EB2E1A8728 Firehose Loader[a71_firehose.bin] SaharaBoot... Ok Sending ..................Ok Connecting to Firehose... Ping... Ok Configuration. <?xml version="1.0" encoding="UTF-8" ?><data><log value="logbuf@0x0806CD20 fh@0x08069B88" /></data>. <?xml version="1.0" encoding="UTF-8" ?><data><response value="ACK" MinVersionSupported="1" MemoryName="eMMC" MaxPayloadSizeFromTargetInBytes="4096" MaxPayloadSizeToTargetInBytes="1048576" MaxPayloadSizeToTargetInBytesSupported="1048576" MaxXMLSizeInBytes="4096" Version="1" TargetName="8953" /></data>. Ok Chip Configuration : MemoryName : eMMC MaxPayloadSizeToTargetInBytes : 1048576 MaxPayloadSizeToTargetInBytesSupported : 1048576 MaxPayloadSizeFromTargetInBytes : 4096 MaxXMLSizeInBytes : 4096 TargetName : 8953 Version : 1 Protocol : Universal Running : Ok Processing A71 Format Userdata.... Action Result : Ok Rebooting Phone.... Ok Elapsed Time : 00:00:04 |
![]() |
![]() | #1901 (permalink) |
No Life Poster ![]() ![]() ![]() ![]() ![]() Join Date: Jan 2020 Location: Algeria
Posts: 847
Member: 2944109 Status: Offline Thanks Meter: 713 | Xiaomi Redmi Note 9 Ultra Power Option Xiaomi Redmi Note 9 Ultra Power Option ![]() Code: Searching for MTK Device...Found Port Identification :Flashmode BROM FriendlyName :MediaTek USB Port (COM38) SymbolicName :\??\USB#VID_0E8D&PID_0003#6&944c330&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver :01/22/2015,3.0.1504.0 Handshaking...Ok Identifying Hardware ID..... BROM CPUID : 0707MT6768[6768] BROM HW_SW_VER : 8A00 CA00 0000 0000 getMTKPayloadExploit : 0707 #Executing Exploit.. #SUCCESS.. Handshaking...Ok Identifying Hardware ID..... BROM CPUID : 0707MT6768[6768] BROM HW_SW_VER : 8A00 CA00 0000 0000 FUSEID : 00000000 SECURE VERSION : 05 BL VERSION : FE BR Secured : E0 Preparing Download Agent.. DA : MT6768_Xiaomi_New.bin Agent: MTK_DOWNLOAD_AGENT -HYDRA Ver : MTK_AllInOne_DA_v3.3001.2020/07/07.10:10_513994 Init : Loader [1] Sending : Accepted Identifying Protocol... Protocol : New Synchronization...SYNC Mode : brom Preloader Initialization... Parsing preloader_merlin.bin Init : Accepted Execute Secondary Loader Init : Loader [2] Executing : SYNC Reading Device UniqueID, RAM and Flash Chip Info... UNIQUE ID : B267EB411777C40E7CE767D3147026D9 ERAM Size : 0x0000000000070000 -448 KB IRAM Size : 0x0000000100000000 -4 GB eMMC BOOT1 : 0x0000000000400000 -4 MB eMMC BOOT2 : 0x0000000000400000 -4 MB eMMC RPMB : 0x0000000001000000 -16 MB eMMC USER : 0x0000000E8F800000 -58,242 GB eMMC CID : 13014E53304A394A38101EAFCF3E77C3 - S0J9J8 DA Speed : high-speed Reading GPT-EMMC [0x00008000] 130 Items Autobackup Partitions -preloader[0x00000000]512 KB ->preloader.bin...Ok -> Renaming Preloader.... preloader_merlin.bin Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0707__050221173452\MT6768_Android_scatter.txt -pgpt[0x00000000]32 KB ->pgpt.bin...Ok -frp[0x05508000]1024 KB ->frp.bin...Ok -nvdata[0x0C4A2000]64 MB ->nvdata.bin...Ok -persist[0x104A2000]48 MB ->persist.bin...Ok -nvram[0x19F80000]64 MB ->nvram.bin...Ok Done!!! C:\Hydra Tool\\Backup\Auto\0707__050221173452 MTK Phone Loader is NOW RUNNING. Reading Device UniqueID, RAM and Flash Chip Info... UNIQUE ID : B267EB411777C40E7CE767D3147026D9 ERAM Size : 0x0000000000070000 -448 KB IRAM Size : 0x0000000100000000 -4 GB eMMC BOOT1 : 0x0000000000400000 -4 MB eMMC BOOT2 : 0x0000000000400000 -4 MB eMMC RPMB : 0x0000000001000000 -16 MB eMMC USER : 0x0000000E8F800000 -58,242 GB eMMC CID : 13014E53304A394A38101EAFCF3E77C3 - S0J9J8 Reading GPT-EMMC [0x00008000] 130 Items ------------------------------------- Operation : Auto Processing... ZeroWipe FRP Partition... Safeformat Universal... Ok Rebooting Device [Reboot To Normal] Reboot Done!! Elapsed Time : 00:00:44 |
![]() |
![]() | #1902 (permalink) |
No Life Poster ![]() ![]() ![]() ![]() ![]() Join Date: Jan 2020 Location: Algeria
Posts: 847
Member: 2944109 Status: Offline Thanks Meter: 713 | Lenovo C2 (K10a40) Remove Lock Without Data Loss Lenovo C2 (K10a40) Remove Lock Without Data Loss ![]() Code: Brand : LENOVO Model : K10a40 (Lenovo C2) Connection : Flash Mode ===================================== How To Boot : Power off phone * BROM Mode : Press VOL + * Preloader Mode : Just Insert cable Connection -Please wait... -Connect Phone... -Found... -PreLoader...[COM4] TPortConnection.Create...(COM4)..Opening...Ok Handshaking...Ok Identifying Hardware ID..... BROM CPUID : 0335 (0000)MT6737[6735] BROM HW_SW_VER : 8A00 CB00 0000 0000 Handshaking... Identifying Hardware ID..... BROM CPUID : 0335 (0000)MT6737[6735] BROM HW_SW_VER : 8A00 CB00 0000 0000 FUSEID : 00000000 SECURE VERSION : 00 BL VERSION : 00 BR Secured : 01 NORMAL BOOT Preparing Download Agent.. DA : 6735_SWSEC_Lenovo_3.bin Agent: MTK_DOWNLOAD_AGENT -HYDRA Ver : MTK_AllInOne_DA_v3.3001.00.00 Init : Loader [1] Sending : Accepted Identifying Protocol... Protocol : Old - eMMC 00000000000000000000 PRMMCCID : 460001154D3232377C890042658E39D6 Init Configuration Running DA 4.2 on BBID : 0x93 Ok Initializing Loader [2] Sending Loader [2] Accepted Reading Flashchip data.... eMMC BOOT1 : 0x0000000000400000 -4 MB eMMC BOOT2 : 0x0000000000400000 -4 MB eMMC RPMB : 0x0000000000080000 -512 KB eMMC USER : 0x00000001D2000000 -7,281 GB ERAM Size : 0x0000000040000000 -1024 MB IRAM Size : 0x0000000000020000 -128 KB UNICAL RID : CDD0FC3DCAFE19F4C9E5085B62911777 eMMC CID : 460001154D3232377C890042658339D6 Change to HIGH SPEED... 5A Connection -Please wait... -Found...[COM5] Reading Partition Table SIZE[0x000007E8] 23 Items > Done Reading System Info Brand : Lenovo Vendor : LENOVO Model : Lenovo K10a40 ID : MRA58K SDK : 23 Release : 6.0 ABI : armeabi-v7a CPU abilist : armeabi-v7a,armeabi Locale : en-US Description : full_lcsh6735m_35u_m-user 6.0 MRA58K 1472611130 release-keys Device : K10a40 Display ID : K10a40_S003_160809_ROW_DJEZZY Security Patch : 2016-09-05 Platform : mt6735m FRPPST : /dev/block/platform/mtk-msdc.0/11230000.msdc0/by-name/frp Fingerprint : Lenovo/K10a40/K10a40:6.0/MRA58K/K10a40_S003_160831_ROW_DJEZZY:user/release-keys StorageType : mtp,mass_storage Userdata State : Not Encrypted Autobackup Partitions -preloader[0x00000000] 512 KB -> preloader.bin...Ok -> Renaming Preloader.... preloader_lcsh6735m_35u_m.bin Creating Scatter file... C:\Hydra 1.0.2.60\Hydra Tool\\Backup\Auto\Lenovo_Lenovo K10a40_0335-mt6735m-6.0_K10a40_S003_160809_ROW_DJEZZY_030521114015\MT6737_Android_scatter.txt -nvram[0x00380000] 5 MB -> nvram.bin...Ok -frp[0x06A00000] 1024 KB -> frp.bin...Ok -nvdata[0x06B00000] 32 MB -> nvdata.bin...Ok Done!!! C:\Hydra 1.0.2.60\Hydra Tool\\Backup\Auto\Lenovo_Lenovo K10a40_0335-mt6735m-6.0_K10a40_S003_160809_ROW_DJEZZY_030521114015 MTK Phone Loader is NOW RUNNING. TPortConnection.Destroy.....Closing...Ok.. ===================================== Elapsed Time : 00:00:19 ![]() Code: Brand : LENOVO Model : K10a40 (Lenovo C2) Connection : Flash Mode ===================================== Connection -Please wait... -Found...[COM5] TPortConnection.Create...(COM5)..Opening...Ok Reading System Info Brand : Lenovo Vendor : LENOVO Model : Lenovo K10a40 ID : MRA58K SDK : 23 Release : 6.0 ABI : armeabi-v7a CPU abilist : armeabi-v7a,armeabi Locale : en-US Description : full_lcsh6735m_35u_m-user 6.0 MRA58K 1472611130 release-keys Device : K10a40 Display ID : K10a40_S003_160809_ROW_DJEZZY Security Patch : 2016-09-05 Platform : mt6735m FRPPST : /dev/block/platform/mtk-msdc.0/11230000.msdc0/by-name/frp Fingerprint : Lenovo/K10a40/K10a40:6.0/MRA58K/K10a40_S003_160831_ROW_DJEZZY:user/release-keys StorageType : mtp,mass_storage Userdata State : Not Encrypted ------------------------------------- Operation : Remove Lock Without Data Loss Processing... Searching patching address.. [Ok].. [Ok].. [Ok].. [Ok].. [Ok] Ok Rebooting Device [Reboot To Normal] Reboot Done!! TPortConnection.Destroy.....Closing...Ok.. Elapsed Time : 00:00:04 |
![]() |
![]() | #1903 (permalink) |
No Life Poster ![]() ![]() ![]() ![]() ![]() Join Date: Jan 2020 Location: Algeria
Posts: 847
Member: 2944109 Status: Offline Thanks Meter: 713 | Condor P8 Lite [PGN-610] Ultra Power Option Condor P8 Lite [PGN-610] Ultra Power Option ![]() Code: Searching for MTK Device...Found Port Identification :DA_HIGHSPEED_VCOM FriendlyName :MediaTek DA USB VCOM (Android) (COM5) SymbolicName :\??\USB#VID_0E8D&PID_2001#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver :01/22/2015,3.0.1504.0 Reading System Info Brand : condor Vendor : SPA Condor Electronics Model : PGN610 ID : NRD90M SDK : 24 Release : 7.0 ABI : arm64-v8a CPU abilist : arm64-v8a,armeabi-v7a,armeabi Locale : fr-FR Description : full_gnsz6737t_66_n-user 7.0 NRD90M 1535626513 release-keys Device : PGN610 Board : PGN610 Display ID : PGN610 Security Patch : 2018-08-05 Platform : mt6737t FRPPST : /dev/block/platform/mtk-msdc.0/11230000.msdc0/by-name/frp Fingerprint : condor/PGN610/PGN610:7.0/NRD90M/1535626513:user/release-keys StorageType : mtp Userdata State : Not Encrypted ------------------------------------- Operation : Auto Processing... ZeroWipe FRP Partition... [Ok] Safeformat Universal...(tmp.bin)512 Bytes Ok Ok Rebooting Device [Reboot To Normal] Reboot Done!! Elapsed Time : 00:00:03 |
![]() |
![]() | #1904 (permalink) |
No Life Poster ![]() ![]() ![]() ![]() ![]() Join Date: Jan 2020 Location: Algeria
Posts: 847
Member: 2944109 Status: Offline Thanks Meter: 713 | OPPO A33F (Neo 7) Read Pattern Code OPPO A33F (Neo 7) Read Pattern Code ![]() Code: PreOperation Configuration Brand : OPPO Model : A33F (Neo 7) Storage : Auto Loader: 8916.mbn Port : Auto Connection : Searching for Qualcomm 9008 Device...Found FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM10) SymbolicName :\??\USB#VID_05C6&PID_9008#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver :01/04/2013,2.1.0.5 Getting device info..Ok Device MODE : Firehose Connecting to Firehose... Ping.. Ok Configuration....... Identifying Chip.... Ok Chip Configuration : MemoryName : eMMC MaxPayloadSizeToTargetInBytes : 16384 MaxPayloadSizeToTargetInBytesSupported : 16384 MaxPayloadSizeFromTargetInBytes : 4096 MaxXMLSizeInBytes : 4096 TargetName : 8916 Version : 1 Protocol : Universal Running : Ok Phone Information..... Brand : OPPO Vendor : OPPO Model : A33f ID : LMY47V SDK : 22 Release : 5.1.1 ABI : armeabi-v7a CPU abilist : armeabi-v7a,armeabi Description : msm8916_32-user 5.1.1 LMY47V eng.root.20170531 release-keys Device : A33 Board : msm8916 Display ID : A33fEX_11_170531 Security Patch : 2017-04-01 Platform : msm8916 FRPPST : /dev/block/bootdevice/by-name/config Reading GPT[3] Drive [0] 40 Items Drive [1] 0 Items Drive [2] 4 Items Operation : ScreenLock Security Read Pattern Processing... Trying to search : gatekeeper.pattern.key Trying to search : personalpattern.key Trying to search : cm_gesture.key Trying to search : gesture.key FOUND Gesture Data : 0AE21E5011AC665E93189D7700251654222C5A78 Bruteforcing pattern hash..Please wait for few seconds Pattern Code : 14752369 1 2 3 4 5 6 7 8 9 Ok Elapsed Time : 00:00:05 |
![]() |
![]() |
Bookmarks |
Thread Tools | |
Display Modes | |
| |
|