GSM Shop GSM Shop
GSM-Forum  

Welcome to the GSM-Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features.
Only registered members may post questions, contact other members or search our database of over 8 million posts.

Registration is fast, simple and absolutely free so please - Click to REGISTER!

If you have any problems with the registration process or your account login, please contact contact us .

Go Back   GSM-Forum > Product Support Sections > Special Solutions / Services / WebShop > GSMFABRICA Products > HYDRA TOOL


Reply
 
LinkBack Thread Tools Display Modes
Old 12-02-2021, 09:15   #2791 (permalink)
No Life Poster
 
ceza031's Avatar
 
Join Date: Feb 2012
Age: 38
Posts: 1,395
Member: 1724862
Status: Offline
Thanks Meter: 445
Huawei P Smart 2020 (FIG-LX1) Frp Remove One Click With by Hydra


Huawei P Smart 2020 (FIG-LX1) Frp Remove One Click With by Hydra



Quote:
Searching Device By Fastboot
Device Found...

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Reading Device Information...
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
hotainfo......
#hotainfo_len :
#C_version :
#D_version :
#PLMN :
#BoardID :
#DeviceName :
Build number : FIG-LX1 9.1.0.235(C432E14R1P5)
Product Model : FIG-LX1
hwnff_ver : Ver2.3
key_version : huawei_key_v1
product : hi6250
system_update_state :
vendorcountry : hw/eu
soc_id : 0.5
ro_build_fingerprint : 0.5
ro_build_version_full : 0.5
ro_build_version_qcom : 0.5
psid.........
#SN : HBE7N18C03002103
#IMEI1 : ***************
#IMEI2 : ***************

Security Info....
#Dongle_info : 0.5
#FB Lock State : UNLOCKED
#USER Lock State : LOCKED

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Huawei Fastboot Service...
Factory Reset Protection...
Removing.... Ok

Elapsed Time : 00:00:02
  Reply With Quote
Old 12-03-2021, 09:18   #2792 (permalink)
No Life Poster
 
ceza031's Avatar
 
Join Date: Feb 2012
Age: 38
Posts: 1,395
Member: 1724862
Status: Offline
Thanks Meter: 445
ZTE1Blade A460 Edl Frp Remove done With by Hydra

ZTE1Blade A460 Edl Frp Remove done With by Hydra



Quote:
Brand : ZTE Model : Blade A460 Storage : Auto
Loader: 009600E100000000_3767512bcb320b2b_73a00da7_QUALCOM M_peek_8909.fhprg
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM9)
SymbolicName :??USB#VID_05C6&PID_9008#5&373328e8&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 02/05/2018,3.0.0.0

Getting device info . . ...
Serial No.: 0x00596261
HW_ID : 009600E100000000
MSM ID : 0x009600E1, MSM8909-Qualcomm Snapdragon 210
MODEL_ID : 0x0000
OEM_ID : 0x0000 - QUALCOMM
PBL Ver : 00000000
PK HASH : 3767512bcb320b2b8450bab3fcc7d891d913702cba941717d6 d13af81fdadc68

Firehose Loader [009600E100000000_3767512bcb320b2b_73a00da7_QUALCOM M_peek_8909.fhprg]
--------------------------------------------------
Header Type : OLD
TargetMSM : 8909
Tag : _peek
Version : 3
Code_size : 288
Signature_size : 256
fhVendor : QUALCOMM
HW_ID : 009600E100000000
Vendor : QUALCOMM
OEM_ID : 0000
MODEL_ID : 0000
SW_ID : 0000000000000003
APP_ID :
pk_hash : 3767512bcb320b2b8450bab3fcc7d891d913702cba941717d6 d13af81fdadc68
OEM_VERSION : server-142
IMAGE_VARIANT : DAADANAZA
QC_VERSION : BOOT.BF.3.1.2.C2-00011
--------------------------------------------------

SaharaBoot... Ok
Sending ..............b Okb0
Connecting to Firehose...
Ping ... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8909
Version : 1


Protocol : Universal
Running : Ok

Phone Information .....
Brand : ZTE
Vendor : ZTE
Model : Blade A460
ID : LMY47V
SDK : 22
Release : 5.1.1
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Description : P809A20-user 5.1.1 LMY47V 1.0.0 release-keys
Device : P809A20
Board : msm8909
Display ID : CLA-CO-P809A20V1.0.0
Platform : msm8909
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : ZTE/P809A20/P809A20:5.1.1/LMY47V/20150828.111758:user/release-keys

Reading GPT[3]
Drive [0] 32 Items
Drive [1] 0 Items
Drive [2] 4 Items

Removing FRPta...
Method : 0
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOk Ok

Rebooting Phone.... Ok
If not rebooted, Please Power on Manually

Elapsed Time : 00:00:05
  Reply With Quote
Old 12-03-2021, 09:28   #2793 (permalink)
No Life Poster
 
ceza031's Avatar
 
Join Date: Feb 2012
Age: 38
Posts: 1,395
Member: 1724862
Status: Offline
Thanks Meter: 445
Vivo Y53 Edl Remove Screen Lock Security Without Data Loss done by Hydra

Vivo Y53 Edl Remove Screen Lock Security Without Data Loss done by Hydra



Quote:
Brand : VIVO Model : Y53 Storage : Auto
Loader: 000560E100000000_60ba997fef6da9f0_203cb924_QUALCOM M_VIVO_peek_8917.fhprg
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM13)
SymbolicName :??USB#VID_05C6&PID_9008#6&15bd46b4&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 07/08/2015,2.1.2.0

Getting device info .. . ...
Serial No.: 0x6A66806F
HW_ID : 000560E100000000
MSM ID : 0x000560E1, MSM8917-Qualcomm Snapdragon 425
MODEL_ID : 0x0000
OEM_ID : 0x0000 - QUALCOMM
PBL Ver : 00000000
PK HASH : 60ba997fef6da9f05885fa11f1dd6d2a90d052a257a09c2075 d7246cc73c0d43

Firehose Loader [000560E100000000_60ba997fef6da9f0_203cb924_QUALCOM M_VIVO_peek_8917.fhprg]
--------------------------------------------------
Header Type : OLD
TargetMSM : 8917
Tag : _peek
Version : 3
Code_size : 288
Signature_size : 256
fhVendor : VIVO
HW_ID : 000560E100000000
Vendor : QUALCOMM
OEM_ID : 0000
MODEL_ID : 0000
SW_ID : 0000000000000003
APP_ID :
pk_hash : 60ba997fef6da9f05885fa11f1dd6d2a90d052a257a09c2075 d7246cc73c0d43
OEM_VERSION : compiler026
IMAGE_VARIANT : LAADANAZA
QC_VERSION : BOOT.BF.3.3-00199
--------------------------------------------------

SaharaBoot... Ok
Sending .................b Okb0
Connecting to Firehose...
Ping ... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8917
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 510256200
Firmware Version : 165
Product Name : HAG4a2
Physical titions : 3
Total Logical Blocks:
Drive [0] 30777344 [14.676 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]

Protocol : Universal
Running : Ok
Reading GPT[3]
Drive [0] 52 Items
Drive [1] 0 Items
Drive [2] 0 Items


Phone Information .....
Brand : vivo
Vendor : vivo
Model : vivo PD1628F_EX
ID : MMB29M
SDK : 23
Release : 6.0.1
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-US
Description : msm8937_32-user 6.0.1 MMB29M eng.compiler.20200118.112618 release-keys
Device : PD1628F_EX
Board : QC_Reference_Phone
Display ID : MMB29M release-keys
Security Patch : 2018-08-01
Emmc_size : 16GB
Platform : msm8937
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : vivo/PD1628F_EX/PD1628F_EX:6.0.1/MMB29M/compiler01181129:user/release-keys

Processing Forced Erase....
- Removing FRP [Zero Wipe] Ok
- Formatting Userdata
Executing ...
- Formatting Userdata [Safe Format - eMMc] OkOk
Action Result : Ok

Elapsed Time : 00:01:53
  Reply With Quote
Old 12-03-2021, 09:46   #2794 (permalink)
No Life Poster
 
ceza031's Avatar
 
Join Date: Feb 2012
Age: 38
Posts: 1,395
Member: 1724862
Status: Offline
Thanks Meter: 445
Redmi Note 8 Pro (begonia) Bootloader Unlock With by Hydra

Redmi Note 8 Pro (begonia) Bootloader Unlock With by Hydra




Quote:
=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port_V1632 (COM9)
Device : 5&4722137&0&1
SymbolicName :??COM9
Driver Ver : 01/22/2015,3.0.1504.0

Opened handle..

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 41E8177BC0C54F6C5545DBE5D90C9460
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x0000000200000000 -8 GB
UFS LU0 Size: 0x0000000000400000 -4 MB
UFS LU1 Size: 0x0000000000400000 -4 MB
UFS LU2 Size: 0x0000001DCB000000 -119.172 GB
UFS CID : ?H9HQ16AFAMMDAR
UFS UNIQID : 14307306f2a9000000000000

Reading GPT0 -UFS [0x00008000] 0 130 Items
0

Reading System Info
Vendor : Xiaomi
ID : RP1A.200720.011
SDK : 30
Release : 11
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : zh-CN
Description : begonia-user 11 RP1A.200720.011 V12.5.3.0.RGGCNXM release-keys
Miui Ver : V125
Display ID : RP1A.200720.011
Security Patch : 2021-10-01
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Unlock Bootloader
Processing...
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------

Verifying status after operation...
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------
Action Result : 0 Ok

Elapsed Time : 00:00:02
  Reply With Quote
Old 12-04-2021, 09:10   #2795 (permalink)
No Life Poster
 
ceza031's Avatar
 
Join Date: Feb 2012
Age: 38
Posts: 1,395
Member: 1724862
Status: Offline
Thanks Meter: 445
Vivo Y71 Edl Frp Remove With by Hydra

Vivo Y71 Edl Frp Remove With by Hydra



Quote:
Brand : VIVO Model : Y71 (V1731B) Storage : Auto
Loader: vivo_2_8.mbn
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM8)
SymbolicName :??USB#VID_05C6&PID_9008#5&3478949&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 08/02/2017,2.1.2.7

Getting device info .. . ...
Serial No.: 0x713D98FC
HW_ID : 000560E100000000
MSM ID : 0x000560E1, MSM8917-Qualcomm Snapdragon 425
MODEL_ID : 0x0000
OEM_ID : 0x0000 - QUALCOMM
PBL Ver : 00000000
PK HASH : 60ba997fef6da9f05885fa11f1dd6d2a90d052a257a09c2075 d7246cc73c0d43

Firehose Loader [vivo_2_8.mbn]
--------------------------------------------------
Header Type : OLD
TargetMSM : 8917
Tag : _wut_peek
Version : 3
Code_size : 288
Signature_size : 256
fhVendor : VIVO
HW_ID : 000560E100000000
Vendor : QUALCOMM
OEM_ID : 0000
MODEL_ID : 0000
SW_ID : 0000000000000003
APP_ID :
pk_hash : 60ba997fef6da9f05885fa11f1dd6d2a90d052a257a09c2075 d7246cc73c0d43
OEM_VERSION : compiler032
IMAGE_VARIANT : LAADANAZA
QC_VERSION : BOOT.BF.3.3-00227
--------------------------------------------------

SaharaBoot... Ok
Sending ..................b Okb0
Connecting to Firehose...
Ping ... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8917
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 500506842
Firmware Version : 165
Product Name : HAG4a2
Physical titions : 3
Total Logical Blocks:
Drive [0] 30777344 [14,676 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]

Protocol : Universal
Running : Ok

Phone Information .....
Brand : vivo
Vendor : vivo
Model : vivo 1724
ID : OPM1.171019.011
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : msm8937_64-user 8.1.0 OPM1.171019.011 eng.compil.20201019.202120 release-keys
Device : msm8937_64
Display ID : OPM1.171019.011 release-keys
Security Patch : 2020-10-01
Emmc_size : 16GB
Platform : =QCOM8917
Fingerprint : vivo/1724/1724:8.1.0/OPM1.171019.011/compil10192021:user/release-keys

Reading GPT[3]
Drive [0] 56 Items
Drive [1] 0 Items
Drive [2] 0 Items

Removing FRPta...
Method : 0
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] 1 **WARNING Unauthorized tag '' 2 <?xml version="1.0" encoding="UTF-8" ?><data><response value="NAK" /></data>Failed
- Removing FRP [Erase Safety Tag] OkOk Ok

Rebooting Phone.... Ok
If not rebooted, Please Power on Manually

Elapsed Time : 00:00:05
  Reply With Quote
Old 12-04-2021, 09:36   #2796 (permalink)
No Life Poster
 
ceza031's Avatar
 
Join Date: Feb 2012
Age: 38
Posts: 1,395
Member: 1724862
Status: Offline
Thanks Meter: 445
Redmi 9A (dandelion) Unlock Bootloader With by Hydra

Redmi 9A (dandelion) Unlock Bootloader With by Hydra



Quote:
=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port_V1633 (COM24)
Device : 6&2f8c4b4&0&1
SymbolicName :??USB#VID_0E8D&PID_0003#6&2f8c4b4&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0

Opened handle..

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 99619035CD6631E89E01BE4AC89C6
ERAM Size : 0x0000000000038000 -224 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 150100434A544434520407BFBE3E8789 - CJTD4R

Reading GPT -EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Unlock Bootloader
Processing...
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------

Verifying status after operation...
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------
Action Result : Ok

Elapsed Time : 00:00:02
  Reply With Quote
Old 12-04-2021, 09:59   #2797 (permalink)
No Life Poster
 
ceza031's Avatar
 
Join Date: Feb 2012
Age: 38
Posts: 1,395
Member: 1724862
Status: Offline
Thanks Meter: 445
Vivo S1 Pro Format Userdata & Frp Remove With by Hydra

Vivo S1 Pro Format Userdata & Frp Remove With by Hydra



Quote:
Brand : VIVO Model : S1 Pro (PD1945F) Storage : Auto
Loader: 0000000000730003_a7df36ffd7ab557c_90719675_VIVO.fh prg
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName :
SymbolicName :??USB#VID_05C6&PID_9008#7&251502ef&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 08/31/2015,2.1.2.0

Getting device info .. . ...
Serial No.: 0x461AFCE5
HW_ID : 0010A0E100730003
MSM ID : 0x0010A0E1, SM6125-Qualcomm Snapdragon 665
MODEL_ID : 0x0003
OEM_ID : 0x0073 - VIVO
PBL Ver : 00000000
PK HASH : a7df36ffd7ab557c67a6c26675e2795c92271308cfd7169bed b84424c862b

Firehose Loader [0000000000730003_a7df36ffd7ab557c_90719675_VIVO.fh prg]
--------------------------------------------------
Header Type : New
TargetMSM :
Tag :
Version : 6
Code_size : 816
Signature_size : 256
fhVendor : VIVO
HW_ID : 0000000000730003
Vendor : VIVO
OEM_ID : 0073
MODEL_ID : 0003
SW_ID : 00000003
APP_ID : 00000000
pk_hash : a7df36ffd7ab557c67a6c26675e2795c92271308cfd7169bed b84424c862bc7b646907dd79989578590fb6370a940
OEM_VERSION : compiler02024095
IMAGE_VARIANT : NicobarPkgLAA
QC_VERSION : BOOT.XF.4.0-00210-NICOBARLAZ-1
--------------------------------------------------

SaharaBoot... Ok
Sending ..............................b Okb0
Connecting to Firehose...
Ping ..................... Ok
Configuration........
Identifying Chip.... ....UFS
Ok
Chip Configuration :
MemoryName : UFS
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Sep 9 2020 - 00:57:45

*** STORAGE DEVICE INFO ***
Memory Type : UFS
Block Size in Bytes : 4096
Page Size : 4096
Manufacturer ID : 462
Serial Number : 1297306958
Firmware Version : 900
Product Name : KM8V7001JA-B813
Physical titions : 6
Total Logical Blocks:
Drive [0] 30939136 [118.023 GB]
Drive [1] 2048 [8 MB]
Drive [2] 2048 [8 MB]
Drive [3] 16384 [64 MB]
Drive [4] 262144 [1024 MB]
Drive [5] 16384 [64 MB]

Protocol : Universal
Running : Ok

Phone Information ......
ID : RP1A.200720.012
SDK : 30
Release : 11
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Security Patch : 2021-09-01
Platform : =SM6125

Reading GPT[6]
Drive [0] 32 Items
Drive [1] 32 Items
Drive [2] 32 Items
Drive [3] 32 Items
Drive [4] 64 Items
Drive [5] 32 Items

Formatting Userdata...
Method : 0
Safe Format - EMMC
Processing...
- Formatting Userdata
- Formatting Userdata [Safe Format - UFS] OkOk Ok

Rebooting Phone.... Ok
If not rebooted, Please Power on Manually

Elapsed Time : 00:00:08
  Reply With Quote
Old 12-06-2021, 09:16   #2798 (permalink)
No Life Poster
 
ceza031's Avatar
 
Join Date: Feb 2012
Age: 38
Posts: 1,395
Member: 1724862
Status: Offline
Thanks Meter: 445
Oppo A37 Edl Frp Remove done With by Hydra

Oppo A37 Edl Frp Remove done With by Hydra



Quote:
Brand : OPPO Model : A37 Storage : Auto
Loader: 007050E100000000_99c8c13e374c34d8_959439aa_QUALCOM M_LENOVO_peek_8916.fhprg
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM36)
SymbolicName :??USB#VID_05C6&PID_9008#5&2363eed3&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 03/25/2016,2.1.2.2

Getting device info .. Ok
Device MODE : Firehose
Connecting to Firehose...
Ping .. Ok
Configuration.......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8916
Version : 1


Protocol : Universal
Running : Ok

Phone Information .....
Brand : OPPO
Vendor : OPPO
Model : A37f
ID : LMY47V
SDK : 22
Release : 5.1.1
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Description : msm8916_64-user 5.1.1 LMY47V eng.root.20180817.014458 release-keys
Board : msm8916
Display ID : A37fEX_11_180817
Security Patch : 2018-03-01
Platform : msm8916
FRPPST : /dev/block/bootdevice/by-name/config

Reading GPT[3]
Drive [0] 40 Items
Drive [1] 0 Items
Drive [2] 4 Items

Removing FRPta...
Method :
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOk Ok

Rebooting Phone.... Ok
If not rebooted, Please Power on Manually

Elapsed Time : 00:00:03

  Reply With Quote
Old 12-06-2021, 09:22   #2799 (permalink)
No Life Poster
 
ceza031's Avatar
 
Join Date: Feb 2012
Age: 38
Posts: 1,395
Member: 1724862
Status: Offline
Thanks Meter: 445
Vivo S1 Pro Remove Screen Security With Data Loss done by Hydra



Quote:
Brand : VIVO Model : S1 Pro (PD1945F) Storage : Auto
Loader: 0000000000730003_a7df36ffd7ab557c_90719675_VIVO.fh prg
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM13)
SymbolicName :??USB#VID_05C6&PID_9008#6&3a720ed3&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 05/29/2019,2.1.3.7

Getting device info .. . ...
Serial No.: 0xCAE6A090
HW_ID : 0010A0E100730003
MSM ID : 0x0010A0E1, SM6125-Qualcomm Snapdragon 665
MODEL_ID : 0x0003
OEM_ID : 0x0073 - VIVO
PBL Ver : 00000000
PK HASH : a7df36ffd7ab557c67a6c26675e2795c92271308d7169bedb8 4424c862b

Firehose Loader [0000000000730003_a7df36ffd7ab557c_90719675_VIVO.fh prg]
--------------------------------------------------
Header Type : New
TargetMSM :
Tag :
Version : 6
Code_size : 816
Signature_size : 256
fhVendor : VIVO
HW_ID : 0000000000730003
Vendor : VIVO
OEM_ID : 0073
MODEL_ID : 0003
SW_ID : 00000003
APP_ID : 00000000
pk_hash : a7df36ffd7ab557c67a6c26675e2795c92271308d7169bedb8 4424c862bc7b646907dd79989578590fb6370a940
OEM_VERSION : compiler02024095
IMAGE_VARIANT : NicobarPkgLAA
QC_VERSION : BOOT.XF.4.0-00210-NICOBARLAZ-1
--------------------------------------------------

SaharaBoot... Ok
Sending ..............................b Okb0
Connecting to Firehose...
Ping ..................... Ok
Configuration........
Identifying Chip.... ....UFS
Ok
Chip Configuration :
MemoryName : UFS
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Sep 9 2020 - 00:57:45

*** STORAGE DEVICE INFO ***
Memory Type : UFS
Block Size in Bytes : 4096
Page Size : 4096
Manufacturer ID : 429
Serial Number : 2037279096
Firmware Version : 110
Product Name : H9HQ16AFAMMDAR
Physical titions : 6
Total Logical Blocks:
Drive [0] 30939136 [118.023 GB]
Drive [1] 2048 [8 MB]
Drive [2] 2048 [8 MB]
Drive [3] 16384 [64 MB]
Drive [4] 262144 [1024 MB]
Drive [5] 16384 [64 MB]

Protocol : Universal
Running : Ok

Phone Information ......
ID : RP1A.200720.012
SDK : 30
Release : 11
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Security Patch : 2021-09-01
Platform : =SM6125

Reading GPT[6]
Drive [0] 32 Items
Drive [1] 32 Items
Drive [2] 32 Items
Drive [3] 32 Items
Drive [4] 64 Items
Drive [5] 32 Items

Formatting Userdata...
Method : 0
Auto
Processing...
- Formatting Userdata
Executing ...
- Formatting Userdata [Safe Format - UFS] OkOk Ok

Elapsed Time : 00:00:10
  Reply With Quote
Old 12-06-2021, 09:34   #2800 (permalink)
No Life Poster
 
ceza031's Avatar
 
Join Date: Feb 2012
Age: 38
Posts: 1,395
Member: 1724862
Status: Offline
Thanks Meter: 445
Redmi 9C (Angelica) Bootloader Unlock With by Hydra

Redmi 9C (Angelica) Bootloader Unlock With by Hydra



Quote:
=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port_V1632 (COM7)
Device : 6&7d0d375&0&1
SymbolicName :??USB#VID_0E8D&PID_0003#6&7d0d375&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0

Opened handle..
Handshaking... Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0766 MT6765 [6765]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : E7
SBC : 01 (True)
SLA : 02 (True)
DAA : 04 (True)
SWJTAG : 06 (True)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 20 (True)
MEMWRITE : 40 (True)
CMD_C8 : 80 (True)

Exploiting Device...
Exploit Sent..
Successfully Exploited...
Handshaking... Ok

--- ENABLE AUTO PREL DUMP ----
Found
C:Hydra ToolBackupPreloader_dumpprel.tmp
------------------------------

Handshaking...

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0766 MT6765 [6765]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)

MEID : F54229E68BD14FAA0BFDBF47329DA
Stage 1.. [Size:216440]
Sending : Please wait.. Accepted

Identifying Protocol...
Protocol : New
Synchronization... SYNC
Preloader Initialization...
sing prel.tmp
Init : Accepted
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 773DEC44B72FBE4ABEA82CE561790FAF
ERAM Size : 0x0000000000038000 -224 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 45010044413430333201BD94601337C3 - DA4032
Executing : ACCEPTED...

Reading GPT -EMMC [0x00008000] 130 Items

Autobackup titions
-preloader [0x00000000] 512 KB -> preloader.bin...0 Ok
-> Renaming Preloader.... preloader_k65v1_64_bsp.bin
Creating Scatter file... C:Hydra ToolBackupAuto0766__120621114041MT6765_Android_sca tter.txt
-pgpt [0x00000000] 32 KB -> pgpt.bin...0 Ok
-frp [0x3BD88000] 1024 KB -> frp.bin...0 Ok
-nvdata [0x3DE88000] 64 MB -> nvdata.bin...0 Ok
-protect1 [0x45522000] 8 MB -> protect1.bin...0 Ok
-protect2 [0x45D22000] 10.867 MB -> protect2.bin...0 Ok
-persist [0x47000000] 48 MB -> persist.bin...0 Ok
-nvram [0x52E80000] 64 MB -> nvram.bin...0 Ok
Done!!!
C:Hydra ToolBackupAuto0766__120621114041
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 1 773DEC44B72FBE4ABEA82CE561790FAF
ERAM Size : 1 0x0000000000038000 -224 KB
IRAM Size : 1 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 45010044413430333201BD94601337C3 - DA4032

Reading GPT -EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Unlock Bootloader
Processing...
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------

Verifying status after operation...
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------
Action Result : Ok

Elapsed Time : 00:00:51
  Reply With Quote
Old 12-07-2021, 09:21   #2801 (permalink)
No Life Poster
 
ceza031's Avatar
 
Join Date: Feb 2012
Age: 38
Posts: 1,395
Member: 1724862
Status: Offline
Thanks Meter: 445
Huawei Y6 2018 (ATU-L22) Edl Frp Remove One Click Done With by Hydra

Huawei Y6 2018 (ATU-L22) Edl Frp Remove One Click Done With by Hydra



Quote:
Brand : HUAWEI Model : ATU-L22 (Y6 2018) Storage : Auto
Loader: 000560E10015003A_6bc369511da9cadb_c0ba0f0a_HUAWEI_ QUALCOMM_peek_8917.fhprg
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : HS-USB Diagnostics 9008 (COM35)
SymbolicName :??USB#VID_05C6&PID_9008#6&1c2dbb3f&0&7#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/20/2017,2.1.2.2

Getting device info .. Ok
Device MODE : Firehose
Connecting to Firehose...
Ping .. Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8917
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 647538807
Firmware Version : 858796104
Product Name : HAG4a2
Physical titions : 3
Total Logical Blocks:
Drive [0] 30777344 [14.676 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]

Protocol : Universal
Running : Ok

Phone Information .....
Vendor : unknown
ID : OPR6.170623.013
SDK : 26
Release : 8.0.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : generic_a53-user 8.0.0 OPR6.170623.013 eng.root.20200707.022230 test-keys
Display ID : System 8.0.0.073(09LN)
Security Patch : 2020-02-01
Fingerprint : Huawei/generic_a53/generic_a53:8.0.0/OPR6.170623.013/root07070222:user/test-keys

Reading GPT[3]
Drive [0] 56 Items
Drive [1] 0 Items
Drive [2] 0 Items

Removing FRPta...
Method :
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOk Ok

Elapsed Time : 00:00:05

  Reply With Quote
Old 12-07-2021, 09:26   #2802 (permalink)
No Life Poster
 
ceza031's Avatar
 
Join Date: Feb 2012
Age: 38
Posts: 1,395
Member: 1724862
Status: Offline
Thanks Meter: 445
Redmi 9A (dandelion) Bootlaoder Unlock With by Hydra

Redmi 9A (dandelion) Bootlaoder Unlock With by Hydra



Quote:
=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port_V1632 (COM8)
Device : 6&265d47d&0&6
SymbolicName :??USB#VID_0E8D&PID_0003#6&265d47d&0&6#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0

Opened handle..

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : A910CFE7A5A6B9488938BD5F9A95ADF7
ERAM Size : 0x0000000000038000 -224 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 450100444134303634013D0D58178789 - DA4064

Reading GPT -EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Unlock Bootloader
Processing...
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------

Verifying status after operation...
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------
Action Result : Ok

Elapsed Time : 00:00:02


  Reply With Quote
Old 12-07-2021, 09:53   #2803 (permalink)
No Life Poster
 
ceza031's Avatar
 
Join Date: Feb 2012
Age: 38
Posts: 1,395
Member: 1724862
Status: Offline
Thanks Meter: 445
Huawei Honor 7X (BND-L21) Frp Remove With By Hydra

Huawei Honor 7X (BND-L21) Frp Remove With By Hydra



Quote:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Reading Device Information...
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
hotainfo......
#hotainfo_len :
#C_version :
#D_version :
#PLMN :
#BoardID :
#DeviceName :
Build number : BND-L21C636B152
Product Model : BND-L21
hwnff_ver : Ver2.3
key_version : huawei_key_v1
product : hi6250
system_update_state :
vendorcountry : hw/spcseas
soc_id : 0.5
ro_build_fingerprint : 0.5
ro_build_version_full : 0.5
ro_build_version_qcom : 0.5
psid.........
#SN : 3RP4C18408000720
#IMEI1 : ****************
#IMEI2 : ****************

Security Info....
#Dongle_info : 0.5
#FB Lock State : UNLOCKED
#USER Lock State : LOCKED

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Huawei Fastboot Service...
Factory Reset Protection...
Removing.... Ok

Elapsed Time : 00:00:03
  Reply With Quote
Old 12-08-2021, 09:08   #2804 (permalink)
No Life Poster
 
ceza031's Avatar
 
Join Date: Feb 2012
Age: 38
Posts: 1,395
Member: 1724862
Status: Offline
Thanks Meter: 445
Redmi 8 (olive) Edl Flashing With by Hydra

Redmi 8 (olive) Edl Flashing With by Hydra



Quote:
Getting device info .. . ...
Serial No.: 0x9EDAC1D9
HW_ID : 000BF0E100720000
MSM ID : 0x000BF0E1, SDM439-Qualcomm Snapdragon 439
MODEL_ID : 0x0000
OEM_ID : 0x0072 - XIAOMI
PBL Ver : 00000000
PK HASH : 57158eaf1814d78fd2b3105ece4db18a817a08ac664a5782a9 25f3ff8403d39a

Firehose Loader [Xiaomi_Redmi_8_Olive.mbn]
--------------------------------------------------
Header Type : OLD
TargetMSM : 8937
Tag : _auth_peek
Version : 3
Code_size : 320
Signature_size : 256
fhVendor : XIAOMI
HW_ID : 000BF0E100720000
Vendor : XIAOMI
OEM_ID : 0072
MODEL_ID : 0000
SW_ID : 0000000100000003
APP_ID :
pk_hash : 57158eaf1814d78fd2b3105ece4db18a817a08ac664a5782a9 25f3ff8403d39a
OEM_VERSION : c4-miui-ota-bd104.bj
IMAGE_VARIANT : FAADANAZA
QC_VERSION : BOOT.BF.3.3.2-00073
--------------------------------------------------

SaharaBoot... Ok
Sending .......................b Okb0
Connecting to Firehose...
Ping ... Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[IbE-bjy4SYq9ctcjwniFevJDEw0]
Signature @256bytes Authentication.... Accepted ......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 2794108536
Firmware Version : 162
Product Name : HCG8a4
Physical titions : 3
Total Logical Blocks:
Drive [0] 122142720 [58.242 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]

Protocol : Universal
Running : Ok

Phone Information ......
Vendor : Xiaomi
ID : QKQ1.191014.001
SDK : 29
Release : 10
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-GB
Miui Ver : V125
Mod_device : olivelite_global
Security Patch : 2021-09-01
Emmc_size : 16GB

Reading GPT[3]
Drive [0] 64 Items
Drive [1] 0 Items
Drive [2] 0 Items


Backup Security titions...
Reading Security Items....
> modemst1
> modemst2
> fsg
> fsc
C:Hydra ToolBackupSecurity_Backup__10_Security_12082111365 7.sec
Backup Security Success....

----------------------------
Flashing Selected titions....
- sec (0)b [sec.dat] b0 Skipped
- config (0)b [config.bin] b0 Ok
- vbmeta (0)b [vbmeta.img] b0 Ok
- vbmetabak (0)b [vbmeta.img] b0 Ok
- devcfg (0)b [devcfg.mbn] b0 Ok
- devcfgbak (0)b [devcfg.mbn] b0 Ok
- apdp (0)b [dummy.img] b0 Ok
- msadp (0)b [dummy.img] b0 Ok
- sbl1 (0)b [sbl1.mbn] b0 Ok
- sbl1bak (0)b [sbl1.mbn] b0 Ok
- rpm (0)b [rpm.mbn] b0 Ok
- rpmbak (0)b [rpm.mbn] b0 Ok
- cmnlib (0)b [cmnlib_30.mbn] b0 Ok
- cmnlibbak (0)b [cmnlib_30.mbn] b0 Ok
- cmnlib64 (0)b [cmnlib64_30.mbn] b0 Ok
- cmnlib64bak (0)b [cmnlib64_30.mbn] b0 Ok
- keymaster (0)b [km4.mbn] b0 Ok
- keymasterbak (0)b [km4.mbn] b0 Ok
- misc (0)b [misc.img] b0 Ok
- aboot (0)b [emmc_appsboot.mbn] b0 Ok
- abootbak (0)b [emmc_appsboot.mbn] b0 Ok
- tz (0)b [tz.mbn] b0 Ok
- tzbak (0)b [tz.mbn] b0 Ok
- dtbo (0)b [dtbo.img] b0 Ok
- dtbobak (0)b [dtbo.img] b0 Ok
- splash (0)b [splash.img] b0 Ok
- dsp (0)b [adspso.bin] b0 Ok
- dspbak (0)b [adspso.bin] b0 Ok
- persist (0)b [persist.img] b0 Ok
- mdtp (0)b [mdtp.img] b0 Ok
- mdtpbak (0)b [mdtp.img] b0 Ok
- boot (0)b [boot.img] b0 Ok
- recovery (0)b [recovery.img] b0 Ok
- cache (0)b [cache.img] b0 Ok
- modem (0)b [NON-HLOS.bin] b0 Ok
- system (0)b [system.img] b0 Ok
- vendor (0)b [vendor.img] b0 Ok
- cust (0)b [cust.img] b0 Ok
- userdata (0)b [userdata.img] b0 Ok
- PrimaryGPT (0)b [gpt_main0.bin] b0 Ok

Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-33.] OK
0 [CRC32(2,8192)] OK
0 [CRC32(NUM_DISK_SECTORS-33.,8192)] OK
0 [0] OK
0 [CRC32(1,92)] OK
0 [0] OK
0 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 0
Set bootable storage drive 0 Ok

Rebooting Phone.... Ok

Elapsed Time : 00:07:48
  Reply With Quote
Old 12-08-2021, 09:13   #2805 (permalink)
No Life Poster
 
ceza031's Avatar
 
Join Date: Feb 2012
Age: 38
Posts: 1,395
Member: 1724862
Status: Offline
Thanks Meter: 445
Vivo Y11 (1906) Edl Frp Remove One click With by Hydra

Vivo Y11 (1906) Edl Frp Remove One click With by Hydra



Quote:
Brand : VIVO Model : Y11 (1906) Storage : Auto
Loader: 000BF0E100000000_60ba997fef6da9f0_d8fbe714_QUALCOM M_VIVO_wut_peek_8937.fhprg
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM87)
SymbolicName :??USB#VID_05C6&PID_9008#7&18b013f7&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 08/02/2017,2.1.2.7

Getting device info .. . ...
Serial No.: 0xDFEEC037
HW_ID : 000BF0E100000000
MSM ID : 0x000BF0E1, SDM439-Qualcomm Snapdragon 439
MODEL_ID : 0x0000
OEM_ID : 0x0000 - QUALCOMM
PBL Ver : 00000000
PK HASH : 60ba997fef6da9f05885fa11f1dd6d2a90d052a257a09c2075 d7246cc73c0d43

Firehose Loader [000BF0E100000000_60ba997fef6da9f0_d8fbe714_QUALCOM M_VIVO_wut_peek_8937.fhprg]
--------------------------------------------------
Header Type : OLD
TargetMSM : 8937
Tag : _wut_peek
Version : 3
Code_size : 288
Signature_size : 256
fhVendor : VIVO
HW_ID : 000BF0E100000000
Vendor : QUALCOMM
OEM_ID : 0000
MODEL_ID : 0000
SW_ID : 0000000000000003
APP_ID :
pk_hash : 60ba997fef6da9f05885fa11f1dd6d2a90d052a257a09c2075 d7246cc73c0d43
OEM_VERSION : compiler0182
IMAGE_VARIANT : FAADANAZA
QC_VERSION : BOOT.BF.3.3.2-00063
--------------------------------------------------

SaharaBoot... Ok
Sending ...................b Okb0
Connecting to Firehose...
Ping ... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 3370178738
Firmware Version : 8
Product Name : GD6BMB
Physical titions : 3
Total Logical Blocks:
Drive [0] 61071360 [29.121 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]

Protocol : Universal
Running : Ok

Phone Information ......
ID : RP1A.200720.012
SDK : 30
Release : 11
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Security Patch : 2021-10-01
Emmc_size : 16GB
Platform : =SDM439

Reading GPT[3]
Drive [0] 60 Items
Drive [1] 0 Items
Drive [2] 0 Items

Removing FRPta...
Method : 0
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] 1 **WARNING Unauthorized tag '' 2 <?xml version="1.0" encoding="UTF-8" ?><data><response value="NAK" /></data>Failed
- Removing FRP [Erase Safety Tag] OkOk Ok

Elapsed Time : 00:00:06
  Reply With Quote
Reply

Bookmarks

Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


 



All times are GMT +1. The time now is 19:38.



Powered by Searchlight © 2023 Axivo Inc.
vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2023 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2023 -
Page generated in 0.43088 seconds with 9 queries

SEO by vBSEO