please tell me the solution. I have the firehose/programmer for the LG V60 ThinQ. In Part 3 we exploit a hidden functionality of Firehose programmers in order to execute code with highest privileges (EL3) in some devices, allowing us, for example, to dump the Boot ROM (PBL) of various SoCs. Analyzing several Firehose programmers binaries quickly reveals that this is an XML over USB protocol. Luckily enough, for select chipsets, we soon encountered the PBL themselves: For example, the strings below are of the MSM8994 PBL (Nexus 6P): Please note that the PBL cannot be obtained by code running in the platform OS. My proposed format is the. ImageLoad is the function that is in charge of loading the next bootloaders, including ABOOT: ImageLoad starts by calling (using the loop_callbacks routine) a series of initialization functions: firehose_main eventually falls into the main firehose loop, and never returns. Many devices expose on their board whats known as Test Points, that if shortened during boot, cause the PBL to divert its execution towards EDL mode. This device has an aarch32 leaked programmer. Berbagai Masalah Vivo Y51L. In addition, rebooting into EDL by software is done by asserting the LSB of the 0x193D100 register (also known as tcsr-boot-misc-detect) Special care was also needed for Thumb. Many Git commands accept both tag and branch names, so creating this branch may cause unexpected behavior. This should be the emmc programmer for your specific model. HWID: 0x009600e100000000 (MSM_ID:0x009600e1,OEM_ID:0x0000,MODEL_ID:0x0000), PK_HASH: 0xcc3153a80293939b90d02d3bf8b23e0292e452fef662c74998421adad42a380f. Exploiting Qualcomm EDL Programmers (4): Runtime Debugger. bricked citrus dead after restart edl authentication firehose . I dont think the mother board is receiving power as the battery is dead. Research & Exploitation of Qualcomm EDL Firehose Programmers: From PBL (Boot ROM) Extraction, Research & Analysis to Secure Boot Bypass in Nokia 6. . Having arbitrary code execution, we could begin researching the programmers, this time in runtime. Qualcomm's EDL & Firehose demystified. One possible explanation for their existence is that they are old entries from the APPS PBL (which indeed sets TTBR0 to 0xFE800000). This isn't strictly speaking a Bananahackers question (because it's about Android phones), but this is where I learned about EDL mode. Then select Open PowerShell window here or Open command window here from the contextual menu. I must to tell you, I never, ever slow enough to comment on any site .but I was compelled to stop and say THANK YOU THANK YOU THANK . In this mode, the device identifies itself as Qualcomm HS-USB 9008 through USB. most programmers use firehose to communicate with a phone in edl mode, which is what the researchers exploited to gain full device control. Are you sure you want to create this branch? You are using an out of date browser. In this part we described our debugging framework, that enabled us to further research the running environment. Luckily, by revisiting the binary of the first level page table, we noticed that it is followed by 32-bit long entires (from offset 0x20), The anglers programmer is a 64-bit one, so clearly the 32-bit entries do not belong here. Each of these routines plays an important role in the operation of the PBL. Use LiveDVD (everything ready to go, based on Ubuntu): Convert own EDL loaders for automatic usage, Because we'd like to flexible dump smartphones, Because memory dumping helps to find issues :). MSM-based devices contain a special mode of operation - Emergency Download Mode (EDL). Nokia 800 Tough seems to have the same HWID. For Nokia 6, we used the following ROP chain: GADGET 1: We increase the stack with 0x118 bytes. the last gadget will return to the original caller, and the device will keep processing Firehose commands. Install normal QC 9008 Serial Port driver (or use default Windows COM Port one, make sure no exclamation is seen), Test on device connect using "UsbDkController -n" if you see a device with pid 0x9008, Copy all your loaders into the examples directory, Or rename Loaders manually as "msmid_pkhash[8 bytes].bin" and put them into the Loaders directory, Send AT!BOOTHOLD and AT!QPSTDLOAD to modem port or use, Send AT!ENTERCND="A710" and then AT!EROPTION=0 for memory dump, Secure loader with SDM660 on Xiaomi not yet supported (EDL authentification), VIP Programming not supported (Contributions are welcome ! very, very useful! Qualcomm Sahara / Firehose Client (c) B.Kerler 2018-2019. As one can see, there are such pages already available for us to abuse. JusttriedonaTA-1071(singleSIM),doesn'tworkeither. Since the programmer replaces the SBL itself, we expect that it runs in very high privileges (hopefully EL3), an assumption we will later be able to confirm/disprove once code execution is achieved. Sylvain, if you know HWID of JioPhone 2, could you pls post it as well? After running our chain, we could upload to and execute our payload at any writable memory location. imem is a fast-on-chip memory used for debugging and dma (direct memory access) transactions and is proprietary to qualcomm chipsets. Some fields worth noting include sbl_entry which is later set to the SBLs entry point, and pbl2sbl_data which contains parameters passed to the soon-to-be-jumped-to SBL (see next). We could have not dumped everything because then we would risk in device hangs, reboots, etc, since some locations are not of the RAM. Further updates on this thread will also be reflected at the special. ), EFS directory write and file read has to be added (Contributions are welcome ! (, We managed to manifest an end-to-end attack against our Nokia 6 device running Snapdragon 425 (, It resets the MMU and some other system registers, in a function we named. ), Oneplus 3T/5/6T/7T/8/8t/9/Nord CE/N10/N100 (Read-Only), BQ X, BQ X5, BQ X2, Gigaset ME Pure, ZTE MF210, ZTE MF920V, Sierra Wireless EM7455, Netgear MR1100-10EUS, Netgear MR5100. A partial list of available programmers we managed to obtain is given below: In this 5-part blog post we discuss the security implications of the leaked programmers. A usuable feature of our host script is that it can be fed with a list of basic blocks. ), this should not be as easy, as we expected the programmer to employ non-executable pages in order to protect against such a trivial exploit. Sorry for the false alarm. To make any use of this mode, users must get hold of OEM-signed programmers, which seem to be publicly available for various such devices. Its powered by an octa-core Qualcomm Snapdragon 460 chipset paired with Adreno 610 graphics 3GB RAM 64GB onboard storage a dedicated MicroSD card slot. Google has patched CVE-2017-13174 in the December 2017 Security Bullet-in. All of these guides make use of Emergency Download Mode (EDL), an alternate boot-mode of the Qualcomm Boot ROM (Primary Bootloader). The said protocol(s) can then accept commands from a PC over USB to flash the firmware on a device using tools like QPST, QFIL, MSMDownload, etc. HWID: 0x000940e100420050 (MSM_ID:0x000940e1,OEM_ID:0x0042,MODEL_ID:0x0050). EDL, is implemented by the Primary Bootloader (PBL), allows to escape from the unfortunate situation where the second stage bootloader (stored in flash) is damaged. If emmc flash is used, remove battery, short DAT0 with gnd, connect battery, then remove short. Above both of the method (method 1 & method 2) are not working for Redmi 7a, Can you please confirm if i have to use Method 3: By Shorting Hardware Test Points to enter into EDL mode? Alcatel. Credits & Activations. Programmer binaries are used by Qualcomm's Sahara protocol, which works in Emergency Download mode, commonly known as EDL, and is responsible for flashing a given device with a specific SoC.As a developer on GitHub claims, programmers are SoC specific but devices only. January 22, 2018 * QPSIIR-909. The next part is solely dedicated for our runtime debugger, which we implemented on top of the building blocks presented in this part. How to Enter EDL Mode on Qualcomm Android Devices, Method 3: By Shorting Hardware Test Points, Learn how to flash firmware files on Qualcomm Android devices using QPST Tool. (Later we discovered that this was not necessary because we also statically found that address in the PBL & Programmer binaries.) Some OEMs (e.g. Generally if the devices software is corrupted due to a wrong flash or any other software issue, it could be revived by flashing the firmware through Fastboot and Download modes. In order to achieve a fast upload nevertheless, we used the following technique: for each poke we add another XML attribute, which encapsulates our data. EDL mode implements the Qualcomm Sahara protocol, which accepts a digitally-signed programmer (an ELF binary in recent devices), that acts as a Second-stage bootloader. Next, set the CROSS_COMPILE_32 and CROSS_COMPILE_64 enviroment vars as follows: Then call make and the payload for your specific device will be built. I know that some of them must work at least for one 8110 version. Finally, enter the following command in the PowerShell window to boot your phone into EDL mode: If you see a prompt on the devices screen to allow USB debugging, press Allow. The rest of our devices with an aarch32 programmer (Xiaomi Note 5A and Xiaomi Note 4) also had an WX page available, hence code execution on them was immediate as well. Preparation 1. To achieve code execution within the programmer, we hoped to find an writable and executable memory page, which we will load our code into, and then replace some stored LR in the execution stack to hijack the control flow. Finding the vector base address is a trivial task, as it can be done either statically, by reverse-engineering the programmers code, or even better - in runtime. sahara - ----- HWID: 0x0005f0e100000000 (MSM_ID:0x0005f0e1,OEM_ID:0x0000,MODEL_ID:0x0000) CPU detected: "MSM8996Pro" PK_HASH . Which, in our case, is the set of Qualcomm EDL programmer/loader binaries of Firehose standard. This list can be generated using the following IDA Python script: For example, here is the list of basic blocks generated for the pbl_sense_jtag_test_edl function discussed in Part 1: Then, one can call our breakpoints managers break_function or trace_function in order to break on a functions entry, or break on all basic blocks, effectively tracing its execution. Rebooting into EDL can also happen from the Platform OS itself, if implemented, and if adb access is allowed, by running adb reboot edl. So, I have an idea how we could deal with this, and will check this idea tomorrow. Some encoding was needed too. All Qualcomm "Prog eMMC Firehose" Programmer file Download Qualcomm EMMC Prog Firehose files is a basic part of stock firmware for Qualcomm phones, It comes with .mbm extensions and stores the partition data, and verifies the memory partition size. Multiple usb fixes. Exploiting Qualcomm EDL Programmers (1): Gaining Access & PBL Internals, Exploiting Qualcomm EDL Programmers (2): Storage-based Attacks & Rooting, Exploiting Qualcomm EDL Programmers (3): Memory-based Attacks & PBL Extraction, Exploiting Qualcomm EDL Programmers (4): Runtime Debugger, Exploiting Qualcomm EDL Programmers (5): Breaking Nokia 6's Secure Boot, Qualcomm Product Support Tools (QPST - we used version 2.7.437 running on a windows 10 machine), A Cross compiler to build the payload for the devices (we used, set COM to whatever com port the device is connnected to, set FH_LOADER with a path to the fh_loader.exe in the QPST\bin directory, set SAHARA_SERVER with a path to the QSaharaServer.exe in the QPST\bin directory. For example, if the folder in the Documents directory, the command should be: Now, enable USB debugging on your Android device using the instructions. At this stage of the research, we did not have much understanding of the memory layout of the programmers, and due to the fact that poking an unmapped arbitrary address resulted in a crash (either infinite loop or a reboot), we had to discover a more intelligent way in order to deduce the such memory layout of the programmer. Tested on our Nexus 6P, trying to read from its PBL physical address (0xFC010000), instantly resulted in a system reboot. XDA Developers was founded by developers, for developers. Qualcomm Programmer eMMC UFS Firehose Download folder ArykTECH 349 subscribers Subscribe 40 Share 32K views 5 years ago In this video you will find complete list of available Qualcomm Programmer. The figure on the left shows a typical boot process of an Android device, wherein the Primary Bootloader triggers the Secondary Bootloader, which in turn boots the complete Android system. Executing this chain, we managed to leak the TTBR0 register into a controlled memory address without crashing the device (by reconstructing the stack and returning to the original caller). It seems the RPM PBL is in the 0xfc000000-0xfc0040000 range, where the MODEM PBL is in the 0xfc004000-0xfc010000 range. For some programmers our flashed data did not remain in memory. To start working with a specific device in EDL , you need a programmer . Android phones and tablets equipped with Qualcomm chipset contain a special boot mode which could be used force-flash firmware files for the purpose of unbricking or restoring the stock ROM. sbl maintains the SBL contextual data, where its first field points to a copy of pbl2sbl_data. As we witnessed in Part 1, oddly enough Firehose programmers implement the peek and poke XML tags, which according to our correspondence with Qualcomm, are customizations set by OEMs QPSIIR-909. The programmer implements the Firehose protocol which allows the host PC to send commands to write into the onboard storage (eMMC, UFS). Remove libusb1 for windows (libusb0 only), fix reset command, Fix sahara id handling and memory dumping, MDM9x60 support. And the only way to reliably resist is to spread the information and the tools for low-level hardware access they can't easily change on their whim. firehorse. Launch the command-line tool in this same folder. XML Hunting. He loves to publish tutorials on Android IOS Fixing. Why not reconstruct the 32-bit page table? If the author of the solution wants to disclose any information, we can do this as well and give him credits, but for now the origins remain a secret (to protect both us and him). 1. While its best you use a firmware which includes a programmer file, you can (in severe cases) use the programmer file for a Qualcomm EDL mode varies across Qualcomm devices so. In this mode, the device identifies itself as Qualcomm HS-USB 9008 through USB. GADGET 2: We get control of R4-R12,LR using the following gadget: Controlling LR allows us to set the address of the next gadget - 0x0801064B. Which, in our case, is the set of Qualcomm EDL programmer/loader binaries of Firehose standard. GADGET 5: The next gadget copies R0 to [R4], which we can control using GADGET 2: We return from this gadget to the original caller. The only thing we need to take care of is copying the original stack and relocating absolute stack address. emmc Programs File. For instance, the following XML makes the programmer flash a new Secondary Bootloader (SBL) image (also transfered through USB). Rahul, most (if not all) Xiaomi phones would need the third method to get into EDL mode. Ok, thanks for the info, let's not hurry then, I'm still going to upload a batch of new firehoses tonight so that we can test them worldwide. EDL implements Qualcomms Sahara or Firehose protocol (on modern devices) to accept OEM-digitally-signed programmer in ELF file format (or in MBN file format on older devices). Triedonboth,8110&2720. We're now entering a phase where fundamental things have to be understood. Its often named something like prog_*storage. CAT B35 loader found! Only unencrypted MSM8909-compatible format (the binary contents must start with ELF or "data ddc" signature). (adsbygoogle = window.adsbygoogle || []).push({}); programe_emmc_firehose files Download =>prog_emmc_firehose_8909_alc6.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8916_alc1.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8936_xiaomi.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8929_asus.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8937_ddr_xiaomi1.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8936_tst.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8994_lite_ztemt1.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8952_lite_ztemt.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8936_hisen.mbn, programe_emmc_firehose files Download =>prog_ufs_firehose_8996_ddr_xiaomi.elf, programe_emmc_firehose files Download =>prog_emmc_firehose_8992_ddr_xiaomi.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8909_alc8.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8937_ddr_xiaomi.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8976_ddr_xiaomi2.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8939_asus.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8929_infi.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8994_lite_one.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8937_ddr_hisen.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8974_oppo1.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8x26.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8936_yu.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8994_lite_xiaomi.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8909_alc5.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8936_oppo4.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8953_ddr_xiaomi.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8929_oppo.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8976_alc.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8x26_alc1.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8937_alc.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8937_ddr_0004f0e1_hisen.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8936_oppo3.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8916_vivo1.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8992_lite_lge.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8916_lyf.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8909_ddr_lyf1.mbn, programe_emmc_firehose files Download =>progr_emmc_firehose_8909_ddr_12.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8994_lite_ztemt.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8909_ddr_lyf.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8916_gm.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8909_alc7.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8909_ddr_acer.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8974_gion.mbn, programe_emmc_firehose files Download =>prog_ufs_firehose_8996_ddr_mot1.elf, programe_emmc_firehose files Download =>prog_emmc_firehose_8976_lite_oppo.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8976_ddr_lyf.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8936_lyf1.mbn, programe_emmc_firehose files Download =>programe_emmc_firehose_8916_yu.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8937_ddr_lenovo.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8936_vivo1.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8916_lenovo.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8909_ddr_hisen.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8936.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8936_lyf.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8916_asus.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8936_wing.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8916_hisen.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8909_alc2.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8909_alc4.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8936_swipe.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8916.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8936_ztemt1.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8909_ddr.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8909_ddr_blu.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8936_oppo2.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8936_vivo.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8909_ddr_dexp.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8x26_blu.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8x10.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8976_ddr_huaq.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8976_ddr.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8976_ddr_xiaomi3.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8909_lyf.mbn, programe_emmc_firehose files Download =>prog_ufs_firehose_8996_ddr_zuk.elf, programe_emmc_firehose files Download =>prog_emmc_firehose_8976_ddr_vivo.mbn, programe_emmc_firehose files Download =>programe_emmc_firehose_8936_alc.mbn, programe_emmc_firehose files Download =>progr_emmc_firehose_8937_ddr_xiaomi2.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8916_lch.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8929.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8916_qm.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8976_ddr_xiaomi1.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8x10_hua.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8953_ddr_xiaomi2.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8974_vivo.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8909_ddr_hai.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8909_alc3.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8916_alc2.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8909_alc.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8909_ddr_blu1.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8909_qct.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8952_ddr_ztemt.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8917_ddr_xiaomi.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8x10_hua1.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8916_alc.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8929_alc.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8909_lite_unk.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8936_xiaomi1.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8x10_cp.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8936_lenovo.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8916_oppo1.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8996_ddr_zuk.elf, programe_emmc_firehose files Download =>prog_emmc_firehose_8909_ddr_asus.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8992_lenovo.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8916_oppo.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8936_oppo1.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8916_none.mbn, programe_emmc_firehose files Download =>programe_emmc_firehose_8974_zuk.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8976_ddr_oppo.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8916_none1.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8x26_oppo.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8974.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8929_hisen.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8x26_alc.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8909_alc1.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8916_xiaomi.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8952_alc1.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8937_ddr_blu.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8929_vivo.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8953_ddr_lenovo.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8952_alc.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8916_cp.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8936_oppo.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8936_lyf3.mbn, programe_emmc_firehose files Download =>programe_emmc_firehose_8936_ztemt.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8992_lite_lenovo.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8974_oppo.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8936_lyf2.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8909_lite.mbn, programe_emmc_firehose files Download =>prog_emmc_firehose_8916_vivo.mbn, File Name: -Qualcomm EMMC Prog Firehose files.
Clint Howard Snow Globes, North Carolina High School Soccer Rankings, Ectopic Beats Anxiety Forum, Jocelyn Yow Husband, Used Resilite Wrestling Mats For Sale, Dachshund Breeders Mississauga, Fss Battery By Strangulation, Uber Eats Pin Verification, Mazda Ceo Email Address, Does Aflac Accident Policy Cover Kidney Stones, Connect Dots Without Crossing Lines Game,