Exploring Qualcomm's Secure Execution Environment

Welcome to a new series of blog posts!

In this series, we'll dive once more into the world of TrustZone, and explore a new chain of vulnerabilities and corresponding exploits which will allow us to elevate privileges from zero permissions to code execution in the TrustZone kernel.

This may sound familiar to those of you who have read the previous series - but let me reassure you; this series will be much more exciting!

First of all, this exploit chain features a privilege escalation which is universal across all Android versions and phones (and which requires zero permissions) and a TrustZone exploit which affects a very wide variety of devices. Secondly, we will dive deep into an as-of-yet unexplored operating system - QSEE - Qualcomm's Secure Execution Environment. Lastly, we'll see some interesting TrustZone payloads, such as directly extracting a real fingerprint from TrustZone's encrypted file-system.

In case you would like to follow along with the symbols and disassembled binaries, I will be using my own Nexus 6 throughout this series, with the following fingerprint:

You can find the exact factory image here.



Oh say can QSEE

In this blog post, we'll explore Qualcomm's Secure Execution Environment (QSEE).

As we've previously discussed, one of the main reasons for the inclusion of TrustZone on devices is the ability to provide a "Trusted Execution Environment" (TEE) - an environment which should theoretically allow computation which cannot be interfered with from the regular operating system, and is therefore "trusted".

This is achieved by creating a small operating system which operates solely in the "Secure World" facilitated by TrustZone. This operating system provides a small number of services directly in the form of system calls which are handled by the TrustZone kernel (TZBSP) itself. However, in order to allow for an extensible model where "trusted" functionality can be added, the TrustZone kernel can also securely load and execute small programs called "Trustlets", which are meant to provide a secure service to the insecure ("Normal World") operating system (in our case, Android).

There are several such Trustlets commonly used on devices:
  • keymaster - Implements the key management API provided by the Android "keystore" daemon. It can securely generate and store cryptographic keys and allow the users to operate on data using these keys.
  • widevine - Implementation of Widevine DRM, which allows "secure" playback of media on the device.
In fact, there are many more DRM related trustlets, depending on the OEM and the device, but these two trustlets are universally used.

Where do we start?

Naturally, one place to start would be to look at a trustlet of our choice, and to try and understand what makes it tick. Since the "widevine" module is one of the most ubiquitous, we'll focus on it.

Searching briefly for the widevine trustlet itself in the device's firmware reveals the following:

Apparently the trustlet is split into a few different files... Opening the files reveals a jumbled up mess - some files contain what looks like code, others contain ELF headers and metadata. In any case, before we can start disassembling the trustlet, we need to make some sense out of this format. We can either do this by opening each of the files and guessing the meaning of each blob, or by following the code-paths responsible for loading the trustlet - let's try a little of both.

Loading a Trustlet

In order to load a trustlet from the "Normal World", applications can use the libQSEECom.so shared object, which exports the function "QSEECom_start_app":

Unfortunately this library's source code is not available, so we'll have to reverse engineer the function's implementation to find out what it does. Doing so reveals that it performs the following operations:
  • Opens the /dev/qseecom device and calls some ioctls to configure it
  • Opens the ".mdt" file associated with the trustlet and reads the first 0x34 bytes from it
  • Calculates the number of ".bXX" files using the 0x34 bytes from the ".mdt"
  • Allocates a physically continuous buffer (using "ion") and copies the ".mdt" and ".bXX" files into it
  • Finally, calls a ioctl to load the trustlet itself, using the allocated buffer
So, still no luck on exactly how the images are loaded, but we're getting there.

First of all, the number 0x34 might look familiar - this is the size of a (32 bit) ELF header. Opening the MDT file reveals that the first 0x34 bytes are indeed a valid ELF header:

Moreover, the "QSEECOM_start_app" function we just had a look at used the word at offset 0x2C in order to calculate the number of ".bXX" files. As you can see above, this corresponds to the "e_phnum" field in the ELF header.

Since the "e_phnum" field is usually used to specify the number of program headers, this hints that perhaps each of the ".bXX" files contains single segment of the trustlet. Indeed, opening each of the files reveals content the seems like it may be a segment of the program being loaded... But in order to make sure, we'll need to find the program headers themselves (and see if they match the ".bXX" files).

Looking further, the next few chunks in the ".mdt" file are in fact the program headers themselves, one for each of the ".bXX" files present.

And, confirming our earlier suspicion, their sizes match the sizes of the ".bXX" files exactly. Great!

Note that the first two program headers above look a little strange - they are both NULL-type headers, meaning they are "reserved" and should not be loaded into the resulting ELF image. Strangely, opening the corresponding ".bXX" files reveals that the first block contains the same ELF header and program headers present in the ".mdt", and the second block contains the rest of the ".mdt" file.

In any case, here's a short schematic summing up what we know so far:

Also, note that since the ELF header and the program headers are all present in the ".mdt", we can use "readelf" in order to quickly dump the information about program headers in the trustlet:

At this point we have all the information we need in order to create a complete and valid ELF file from the ".mdt" and ".bXX" files; we have the ELF header and the program headers, as well as each of the segments themselves. We just need to write a small script that will create an ELF file using this data.

I've written a small python script which does just that. You can find it here:


Reflections on Trusting Trustlets


By now have a basic understanding of how trustlets are assembled into an executable file, but we still don't know how they are verified. However, since we know the ".bXX" files contain only the segments to be loaded, this means that this data must reside in the ".mdt" file.

So it's time for some guesswork - if we were to build a trusted loader, how would we do it?

One very common paradigm would be to use hash-and-sign (relying on a CRHF and a digital signature). Essentially - we calculate the hash of the data to be authenticated and sign it using a private key for which a corresponding public key is known to the loader.

If that were the case, we'd expect to find two things in the ".mdt":
  • A certificate chain
  • A signature blob
Let's start by looking for a certificate chain. There are way too many formats for certificates, but since the ".mdt" file only contains binary data, we can assume it'll probably be a binary format, the most common of which is DER.

There's a quick hack we can use to find DER encoded certificates - they almost always start with an "ASN.1 SEQUENCE" blob, which is encoded as: 0x30 0x82. So let's search for these two bytes in the ".mdt" and save each found blob into a file. Now, we can check if these blobs are well-formed certificates using "openssl":

Yup, we guessed correctly - those are certificates.

In fact, the trustlet contains three certificates, one after the other. Just for good measure, we might also want to check that these three certificates are in fact a certificate chain which forms a valid chain of trust. We can do this by dumping the certificates to a single "certificate chain" file and using "openssl" to verify each certificate using this chain:

As for the root of trust of this chain - looking at the root certificate in the chain reveals the same root certificate which is used to verify all other parts of the boot chain in Qualcomm's "Secure Boot" process. There has been some research about this mechanism, which has shown that the validation occurs by comparing the SHA256 of the root certificate to a special value called "OEM_PK_HASH", which is "fused" into the devices QFuses during the production process. Since this value should theoretically not be modifiable after the production of the device, this means that forging such a root certificate would essentially require a second pre-image attack against SHA256.

Now, let's get back to the ".mdt" - we've found the certificate chain, so now it's time to look for a signature. Normally, the private key is used to produce a signature and the public key can be used to recover the signed data. Since we have the public key of the top-most certificate in the chain, we can use it to go over the file and opportunistically try to "recover" each blob.

But how will we know when we've succeeded?

Recall that RSA is a trapdoor permutation family - every blob with the same number of bits as the public modulus N is mapped to another blob of the same size.

However, while the RSA public modulus in our case is 2048 bits long, most hashes are much shorter than that (160 bits for SHA1, 256 bits for SHA256). This means that if we try to "decrypt" a blob using our public key and it happens to end with a lot of "slack" space (for example, zero bytes), there's a very good chance that this is the signature we're looking for (for a completely random permutation, the chance of n consecutive zero bits is 2^-n - extremely small for even a moderate n)

In order to do so, I wrote a small program which loads the public key from the top-most certificate in the chain and tries to "recover" each blob in the ".mdt" (using rsa_public_decrypt with PKCS #1 v1.5 padding). If the "recovered" blob ends with a bunch of zero bytes, the program outputs it. So... Running it on our ".mdt":

We've found a signature! Great.

What's more, this signature is 256 bits long, which implies that it may be a SHA256 hash... And if there's one SHA256 in the ".mdt", perhaps there are more?

Lucky once again!

As we can see, the SHA256 hashes for each of the ".bXX" files are also stored in the ".mdt", consecutively. We can also make an educated guess that this will be the data (or at least some of the data) that is signed to produce the signature we found earlier.

Note that the ".b01" file's hash is missing - why is that? Remember that the ".b01" file contains all the data in the ".mdt" other than the ELF header and program headers. Since this data also contains the signature above, and the signature is (possibly) produced over the hashes of the block files, this would cause a circular dependency (since changing the block file would change the hash, which would change the signature, which would again change the block file, etc.). So it makes sense that this block's hash wouldn't be present.

By now we've actually decoded all of the data in the ".mdt" file apart from a small structure which resides right after the program headers. However, after looking at it for a while, we can see that it simply contains pointers and lengths of the various parts of the ".mdt" that we've already decoded:

So finally, we've decoded all of the information in the ".mdt"... Phew.

Motorola's High Assurance Boot

Although the ".mdt" file format we've seen above is universal for all OEMs, Motorola decided to add a little twist.

Instead of supplying an RSA signature like the one we saw earlier, they actually leave the signature blob empty (in fact, the signature I showed you earlier was from a Nexus 5). In fact, Motorola's signature looks like this:

So how is the image verified?

This is done by using a mechanism which Motorola calls HAB ("High Assurance Boot"). This mechanism allows them to verify the ".mdt" file by appending a certificate chain and a signature over the whole ".mdt" to the end of the file, encoded using a proprietary format used by "HAB":

For more information about this mechanism, you can check out this great research by Tal Aloni. In short, the ".mdt" is hashed and signed using the top-most key in the certificate chain, while the root certificate in the chain is verified using a "Super Root Key", which is hard-coded in one of the bootloader's stages.


Life of a Trustlet

After the verification process we saw above, the TrustZone kernel loads the trustlet's segments into a secure memory region ("secapp-region") which is inaccessible from the "Normal World" and assigns an ID to it.

Then, the kernel switches into "Secure World" user-mode and executes the trustlet's entry function:

As you can see, the trustlet registers itself with the TrustZone kernel, along with a "handler function". After registering the trustlet, control is returned to the TrustZone kernel, and the loading process finishes.

Now, once the trustlet is loaded, the "Normal World" can send commands to the trustlet by issuing a special SCM call (called "QSEOS_CLIENT_SEND_DATA_COMMAND") containing the loaded trustlet's ID and the request and response buffers. Here's what it looks like:

The TrustZone kernel (TZBSP) receives the SCM call, maps it to QSEOS, which then finds the application with the given ID and calls the handler function which was registered earlier (from "Secure World" user-mode) in order to serve the request.

What's Next?

Now that we have some understanding of what trustlets are and how they are loaded, we can move on to the exploits! In the next blog post we'll find a vulnerability in a very popular trustlet and exploit it in order to execute code within QSEE.


  1. Great post as always!
    I'm waiting for the next post and in the meanwhile I hope you get some time to release the code for standalone version (without the kernel modification) of the older trustzone exploit :).

    As I understand from the post, trustlets execute in a separate usermode inside QSEE. Can exploiting a trustlet lead to possible bootloader unlock? Since it's just a QSEE usermode application the possibly don't have access privileged instructions like blowing a qfuse right?

    PS: can I know the hex editor you are using? :)

    1. I have re-written his original zero-write exploit as a standalone kernel module here: https://github.com/ghassani/qc-tz-es-activated-exploit

    2. The hex-editor looks like 010 editor, probably running on linux.

    3. Hi Madushan,

      First of all, thank you! Glad you enjoyed the post.

      I totally forgot about the "standalone" version of the older TZ exploit. In any case, I just cleaned it up a little bit and put it up on github, here: https://github.com/laginimaineb/standalone_msm8974

      It relies on the previous kernel exploit (https://github.com/laginimaineb/cve-2014-4322/tree/master/Feud/jni) to get kernel code execution, and then dynamically finds the needed kernel symbols and does all the work without needing a kernel module.

      You should definitely check out Ghassan's version as well! I just found out about it, but looking at the code it looks very clean and easy to use.

      As for your second question - you are absolutely correct. QSEE does not have sufficient privileges in order to blow a QFuse, which means we'll need to go further than just exploiting QSEE - you'll see all the details in tomorrow's blog post :)

      Finally, as shuffle2 mentioned below - yes, I am using 010editor on Linux (which I highly recommend! It's a fantastic tool).


    4. Ghassan -

      Just wanted to say thank you for wrapping the exploit in an LKM! Great work. The code is really clean and well-written. Kudos :)


    5. Great :D Thanks all you guys for all the help and sources. I waiting for the next post.

    6. Gal, thank you for that shout out. That means a lot! I love reading your articles, I learn so much from your explanations and examples. Glad that I am able to contribute something to you and your readers. Keep it up, I look forward to the next exploit :)

    7. Smadav 2020 | The Smadav 2020 code is the champion among the most established antivirus romance, using the supported Tainting Safety Assurance. If your Computer system accepts malady, Smadav 2020 Download Free remotely will enter your device and determine it. On this occasion, change is unlimited, you will get a full price reduction. Download Smadav Antivirus 2020 for PC

    8. This is a very good application, I really like KineMaster 2020, I can edit my videos almost every day I open the kinemaster to edit / make other videos so hopefully the kinemaster won't stop. Download Kinemater (Pro / Full / Mod) Apk latest version at https://kinemaster2020.site

  2. Just wanted to drop a note and say: you have done some really great work here.

    I actually needed to implement some signing verification tools for Qualcomm's mdt/mbn format very recently. While I have a full set of docs from them it was actually reading through this article that got me most of the information I needed instead :)

    It is funny how reversers often know more about the nitty gritty details of a company's product than they themselves seem to.

    I have also been enjoying the follow up articles on exploitation immensely. Keep up the great work!

    1. Thank you Eric, It means a lot to me!

      More posts coming soon :)

  3. Very good! Enjoyed reading it, looking forward to new posts.


  4. Great post!
    Could this exploit be used on a snapdragon 820? Or is it only limited to the 800 and the 810?

  5. Hi, great post!
    I got lost in the signature recover phase. You wrote:

    "Normally, the private key is used to produce a signature and the public key can be used to recover the signed data"
    Please, could you explain me how you recover the signed data with the public key? It's the first time I heard about it.

    Later on you wrote:

    "This means that if we try to "decrypt" a blob using our public key[...]"
    What do you want to mean by "decrypt"? Again, it's the first time I heard about using a public key RSA to decrypt data.

    I do not understand quite well your process of looking for the signature, what does trydec function do?
    Could not you to try to do it by brute force? Sign-hash blob files with several hash functions and the public key and then looking for the result on the .mdt binary data?

    Maybe the problem is that I am a mathematician (...XD) trying to get your work.

    Thank you again and waiting for more post!

    1. Thank you!

      As for you question - the main problem here is terminology regarding RSA.

      First, the mathematical definition of RSA is a trapdoor permutation family. Let's say we have the public exponent e, private exponent d and modulus N.

      Now, for each message m in Zn*, applying m' = (m^e) mod N is a onto one-to-one mapping into Zn*. Recall that we chosen e,d such that e*d = 1 (mod phi(N)). This means that by applying the permutation (m' ^ d) mod N = ((m^e) ^ d) mod N = (m ^ (e*d mod phi (N))) mod N = m (mod N).

      So applying the reverse permutation allowed us to retrieve the original message m.

      Now - people often refer to RSA as an encryption scheme. It isn't (because it's not CPA-secure, as it's completely deterministic). But you *could* think of it as encryption in the sense that after permuting a message with the public exponent, it's hard to retrieve the message without knowing the private exponent.

      In that sense, we can say that the operation (m^e) mod N is public-encryption and (m^d) mod N is private-decryption.

      The inverse is also true (since RSA is symmetric with regards to e,d). So we could say that (m^d) mod N is private-encryption and (m^e) mod N is public-decryption.

      Next comes an important primitive that is often used with RSA - signing. Imagine you have a message and would like to guarantee it was produced *only* by someone who knows the private exponent. You could do this by applying the permutation using the private exponent - that is, for each message m, produce (m^d) mod N. We just called this operation "private-encryption" in the previous paragraph, but when using RSA as a signature scheme, we could call this operation "signing".

      So... how is this useful at all? Well, someone with the public exponent can apply "public-decryption" on the message, and by the commutativity of multiplication: (m' ^ d) mod N = ((m^d) ^ e) mod N = (m ^ (d*e mod phi (N))) mod N = (e*d mod phi (N))) mod N = m (mod N). So anyone with the public key can use this to retrieve the message m from the signature. We'll call this operation "verify".

      Finally, if we already have a signature block produced using the private exponent, and we know the signed message has some unique structure, we can scan each block and attempt to perform RSA-verification ("public-decryption") on every block. This will produce some message m' - if it matches the structure we know, it is (other than a negligible probability) our signature block.


    2. Hi Gal,

      Thank you by your quick response. I know what involves RSA cryptography, part of my daily job is related with crypto issues. The thing was that this was the first time I read the concept of encryption when you want to refer to signing, but I agree is just terminology.

      I know a forum is not the best place to write maths...jajaja but I suppose you wanted to write (the ' was left):

      (m^e) mod N = m' is public-encryption and (m'^d) mod N is private-decryption
      (m^d) mod N = m' is private-encryption and (m'^e) mod N is public-decryption

      Therefore, what I understand is that when you write "we try to "decrypt" a blob using our public key" what you are looking for is a hash value. Because what has been "encrypted/signed" should be a hash value. That's the way signing process works.

      Then, what is the output of your TryDecrypt function, the hash value of some of the blocks? How did you choose the m message along the .mdt binary to perform the "decryption"?

      Thank you

    3. Hi Jota,

      Sorry, just wanted to write a full explanation just in case other people find it useful. Anyway, I agree, writing math in a blog post is pretty hard :)

      As for the actual value that is signed - it's actually special version of HMAC-SHA256 (w/ a different i_pad and o_pad) over all the block files' data, concatenated. But you can outright ignore that and still find the signature block.

      Here are a couple of facts:
      1. The signature is 2048 bits long, while the HMAC-SHA256 is only 256 bits long.
      2. The signature uses PKCS#1 v1.5 padding

      If we simply use RSA-public-decrypt w/ the appropriate padding on each 2048-bit block, we'll get a 2048 bit result. For each randomly-chosen block, the resulting block's bits will be roughly uniformly distributed (since RSA is a trapdoor permutation). But we know that in the signature blob the first 2048-256 bits will be zero (remember this is after removing the padding). The chances of that happening in uniformly distributed message is negligibly small 2^(-1792).

      So all TryDecrypt does is iterate over each block, use "RSA public decrypt" w/ the appropriate padding, and check if the resulting block starts with a bunch of leading zeros.

    4. Hi Gal (my name is Jose, I use yours so I think is fair you to know mine),

      You do not have to apologize, you did not know it and, probably, some readers have learnt a little more about crypto ;)

      Perfect, everything clear now! Maybe, you will find interesting this article: https://www.cs.cornell.edu/courses/cs5430/2015sp/notes/rsa_sign_vs_dec.php

      Look for vulnerabilities on non-public things is quite exciting, but have you try to check how good is the implementation of public TEEs such OP-TEE?

      Will you participate at any security conference to talk about this?

      Thank you,

    5. Hi Jose,

      Sorry for the late response! I missed your response.

      I didn't look at public TEEs yet, but I might get around to it (for example, Trusty TEE looks like it could be interesting...)

      Also, I haven't spoken in any conference yet (and have nothing planned up ahead). Mainly because the conferences happen to coincide with the exam period :)

      All the best,

  6. Awesome post!

    I am trying to follow your post and reverse widevine trustlet(and if needed libQSEECom.so for the loading part).
    Is there a easy way to locate the entry function for the trustlet being loaded? Do I have to look at the libQSEECom.so ?

    Thanks in advance

    1. Thank you! I think the easiest way is to disassemble the first function (func_0) and look for the function the returns a function pointer. That function pointer points to the entry function. Alternately, you can just search for the Widevine commands (such as PRDiag*) and work backwards from there using XREFs.

  7. Cool post!

    "So let's search for these two bytes in the ".mdt" and save each found blob into a file."

    How could you know the length of these blobs?

    1. I didn't, but you can save the blob from the match index until the end of the file, and asn1parse will stop at the end of the ASN1 data.

  8. Could you share the script to "decrypt" the 2048-bit signature blob?
    I searched the Internet but most of them work on certificates with certain formats, rather than raw-data parameters.

    1. Hi CrazyGalaxy,

      I didn't do anything fancy - I simply used OpenSSL's RSA_public_decrypt (https://www.openssl.org/docs/man1.1.0/crypto/RSA_public_decrypt.html) for the "decryption".

      To get OpenSSL to load the public key, I did write a small PyCrypto script to define the public key from the parameters (e,N) using RSA.construct (https://www.dlitz.net/software/pycrypto/api/current/Crypto.PublicKey.RSA-module.html#construct), and then saved them to a PEM.

      All the best,


    2. Cool WhatsApp Group Names. Drink Dudes. Walky Talky. Innocent girls. Free Wi-Fi. zindagi na milegi dobara. Dil Dhadakane Do. No girls. Best Dudes. So, Here I am sharing the Best Whatsapp group names for friends Whatsapp Group. Pencil Chors. Play your way. So Called Engineers. Non-Stop Notifications. The Untouchables. Toxic Texting. Wandering Minds. We Tie Until We Die. Cool, Funny Best Whatsapp Group names for friends, family, sports lovers, Girls, Boys, Engineers, Doctors in Hindi, Marathi, gujarathi, Tamil, Punjabi. Ultimate Collection of the best WhatsApp Group Names in 2018. Top, Awesome, funny & cool WhatsApp group names for Friends, lovers, family & cousins. Best WhatsApp Group Names are the first search whenever someone creates a new group on WhatsApp. Hey guys all the best and top rated 500+ best,cool,funny,attitude,savage,boys,girl,friends,family whatsapp group names list 2018 & Whatsapp dare messages.

  9. How do you get to the trustlets in the first place? Using the link to the shamu firmware that you provide I find a system.img file in which I assume the widevine trustlet exists, but I cannot continue from here. How did you get to the actual file?

  10. hi
    when i use the QSEECom_start_app,return an error :QSEECom_start_app(.., '/firmware/image/', '***', 1048640) = 'Invalid argument'.
    please help me check


  11. Thanks, I'm reading this text – I hope you found it useful. I've got browse your journal superb info produce good information article, Your article could be a smart inspiration for this blog. Thanks For different info within the future. Arlo security camera

  12. Hey, thanks for posting amazing articles. These blogs would definitely help us keep posted about new trends in the market.

    Limbo Emulator


  13. Nice Article Very Helpful ! Thanks for sharing ! Also check
    Attitude Shayari
    Sad Hindi Shayari

  14. http://myinfomaniya.com/pubg-name-generator-best-cool-stylish-trending-killer-pubg-names/

  15. Want to watch live tv on your Android smartphone then download Solid streamz for free. Solid streamz provides access to thousands of channels which you can stream anywhere anytime.

  16. This comment has been removed by the author.

  17. Thank you for the great information.
    nox app player

  18. very nice post thanks for sharing with us
    attitude shayari

  19. Are you here to locate the net worth of your favorite celebrity. Search no more while at the right place. Here you will not more or less the net worth of your favorite superstar but you'll also find all the brand new and details, you are looking for like their films, era and lot more random celebrity net worth,celebrity net worth 2018,celebrity net worth list,celebrity net worth 2019,Forbes richest celebrities net worth,celebrity net worth list 2018
    New Celebrity Net Worth Gucci Mane
    New Celebrity Net Worth Eminem
    New Celebrity Net Beyonce
    New Celebrity Net Adam Sandler
    New Celebrity Net Jerry Seinfeld
    New Celebrity Net Kevin Hart
    New Celebrity Net Triple H
    New Celebrity Net John Cena
    New Celebrity Net Julia Louis Dreyfus
    New Celebrity Net David Bowie

  20. Nice Article. Also check out how to fix to allow access please respond on your iphone error on your iPhone device

  21. This comment has been removed by the author.

  22. Nice article. You may also like Spotify Cracked Apk if you love listening to songs online.

  23. You define your thought classically by this blog, thank you so much for sharing such an amazing blog. Get website designing services by ogen infosystem in delhi, india.
    Website Designing Company in Delhi

  24. Blockchain is a functions involves conversion of input value to numerical value. the process take a data of fixed length
    learn this process in bitcoin online course

  25. This is Very very nice article. Everyone should read. Thanks for sharing. Don't miss WORLD'S BEST Game

  26. Canada’s new Program for workers and who are wiling to live there so here is a new way for them to go there by AIPP canada


  27. Appreciate you sharing, great article.Really looking forward to read more. Really Great.
    I have some suggestions. Here is a blog - Photo editing & photography tips.
    This may help you to find something useful

  28. To get started Office 2019, 2016 and office 365 download or installation you must need valid 25 character product key & visit-

    office.com/setup |
    www.office.com/setup |

  29. HappyMod is a new generation App Store for Modified Apps and Games that generate premium features.

    HappyMod Apk

  30. https://www.brotherprintersupport.co.uk


    Brother Printer Support or Call : +44-121-286-4615

    How to Solve Installation Problem with my Brother printer using a USB/local connection


    How to Setup Brother Wireless Printer Call +44-121-286-4615
    Brother Wireless Support or Call : +44-121-286-4615

    Brother Printer Support or Call : +44-121-286-4615

    Brother Printer Drivers Call: +44-121-286-4615


    Brother Printer Support Drivers or Call : +44-121-286-4615

    brother printer helpline
    brother printer support number
    brother printer technical support

  31. norton.com/setup to Secure your All Windows, Mac & Android devices. Get norton setup and Run to Install Norton Anti Virus. for more information about norton antivirus, just visit www.norton.com/setup.

    mcafee.com/activate - Get the comprehensive internet security on your device with mcafee activate Antivirus. Get your McAfee installed and activated with easy steps. for more information just visit www.mcafee.com/activate.

    office.com/setup - To get started with Microsoft Office download & install office setup. Find the product key for activation at www.office.com/setup.

  32. Yes, such a great artical i will always follow this blog

  33. WONDERFUL Post for exploring qualcomms secure execution and thanks for share with us keep moving..waiting for more updates - regards - thoptv apk

  34. Exploring qualcomms secure execution was really great info and waiting for more updates - ghd sports & ghd sports apk

  35. code execution in the TrustZone kernel was one of the best article and You made some nice points there - OnMovies App

  36. Thank you for share the explore Qualcomm's Secure Execution Environment. it was really great info thank you - ghd sports apk & gomax tv apk

  37. Everything is very open and very clear explanation for step by step for explore Qualcomm's Secure Execution Environment, waiting for more updates, thank you for sharing with us. - GHDSPORTS & GHD SPORTS Apk

  38. Norton provides world class security solution. Every Norton antivirus system is designed with the latest technology and updated regularly to bring in new virus definitions that help in detecting the viruses. Norton antivirus system is one such program that has numerous all-round protection antivirus. office.com/setup | norton.com/setup | www.norton.com/setup

  39. Wow such great and effective guide
    Thank you so much for sharing this.
    Thenku Again

  40. Get instant access to a huge number of apps for Android, Windows, and Mac operating systems. Download apps from Earnigo Apps
    Earnigo Apps
    Earnigo Apps download
    Earnigo Apps for android
    Earnigo Apps Apk

  41. India's one of the most popular T20 Cricket Tournament IPL Next Season Coming soon. Here you can check
    Vivo IPL 2020 Points Table Information.

  42. Www.Office.Com/Myaccount Main Issue: Resolving common installation issues using Microsoft

    resources Activation Issues Connection Issues Operating System Issues SOLUTION: Resolving

    basic establishment issues utilizing Microsoft resources This guide bargains particularly

    with Microsoft Office forms 2013 and 365...

    office.com/myaccount ||
    norton.com/myaccount ||

  43. In case you are maintaining a business and need to fix all the major technical issues at that point don't falter to call HP support technician whenever. In case you are confronting any hp error code, at that point around then, you contact the support service and the technician will repair the issues successfully. They will support your profitability and afterward they will spare the time by means of having their services to arrange the settings legitimately from being the company in a first-class way.

  44. Visit Brother support to get instant fix Brother printer issue.

  45. Visit us or you Can Contact whenever you are free to Call us. We are available for support 24*7 to Fix Brother Printer Offline Windows 10 Error. Visit us: Brother Printer Offline Windows 10 Technical Support

  46. Are you facing Ink Cartridge cannot be recognized Error? No need to worry, we are always here 24*7. We have a group of certified experts. Visit us: Ink Cartridges Not Recognized.

  47. Brother Printer UK is the team of best technical support experts who can provide you the best technical service. Call us USA/Canada: +1-888-480-0288 & UK: +44-800-041-8324.

  48. watch this online movie and tv show visit this.
    hd cinema apk 2018

  49. With an aim to keep my Brother Printer in running state and in appropriate condition I want to resolve Brother Printer Offline issue. So, I am looking for a reliable support that can guide me to eliminate this error in an easy manner. Someone, please help me to get hold of such service provider that can deliver me results that I want the most.

  50. If you still have issue while depositing or withdrawing cryptocurrency from Bittrex, even if you fail to create or login to your Bittrex account, just feel free to get in touch with Bittrex Customer Support services for technical assistance with issues related to Bittrex wallet.

    bittrex support number
    bittrex support phone number
    bittrex support

    You can contact Bittrex tech support representatives via phone call or live chat. They are available 24*7 for the convenience of users.

    bittrex exchange
    bittrex customer service
    bittrex phone number

  51. Visit Kalakutir Pvt Ltd for the best Floor Marking Paint and School Bus Painting.
    Floor Marking Paint

  52. If you are looking for any help regarding your Hp Printer then just dial for fast and reliable helpline number of HP Customer Service 1-800-382-3046. Then this is the best direct number to the Hp Printer Customer Services team. We have sourced this number to save your time searching over the internet for the Hp Customer Support Phone Number.

  53. will visit your website again soon. You can check Upcoming BBL 2019-2020 Schedule here

  54. اگر دانشجو هستید و به دنبال ترجمه ارزان می گردید بهترین سایت برای شما سایت ترجمه آنلاین است. این سایت با داشتن تیمی حرفه ای در ضمینه ترجمه متون فارسی به انگلیسی و ترجمه متون انگلیسی به فارسی ، بهترین همراه شما در دوران دانشجویی خواهد بود. تخصص ما ترجمه مقاله های تخصصی دانشگاه است.


  55. If you have problems in your Brother Printer Support visit our website for instant solutions.
    Brother Printer Support | Brother Printer Support Number

  56. Belgian authorities have also changed the basic fabric of the social status by inculcating western principles and norms and gave birth to social practices which were far more westernised. So, the local people feared that they might lose their identity and thus Mouvement des Congolais started.

    Visit: sindika dokolo


  57. Norton Setup and Instal Process – For both PC and mobile users. Highly popular among the PC

    users, the Norton antivirus software has been eliminating malware, viruses and other kinds of

    online and offline threats from affecting the performance of a computer for years.

    Norton.com/setup , being a security solution providing company has created

    office.com/setup|| norton.com/setup||norton.com/myaccount || office.com/setup

  58. Well, this is awesome. I like your work here. I am supportive and here to support you always buddy. Keep up the good share and keep submitting these kinda blogs.
    Best Laptops
    Best smartwatch
    best smartphone
    Best Home Theatre
    amazon best sellers

  59. This Blog is great, and I never seen a Blog like this…..
    I really be grateful for you work and Thanks for providing us a great Platform for share information’s with others.
    Computer Virus क्या है

  60. Pleasant stuff! I like to peruse the data that you have imparted to us. I need to get more updates to expand my insight.
    canon printer support | lexmark printer support | epson printer support | lexmark printer support |canon printer support | hp printer support

  61. DraStic DS - Fast emulator from Nintendo DS. The emulator also allows you to customize the screen, supports Xperia PLAY and NVIDIA Shield.

  62. Very nice!!! This is really good blog information thanks for sharing. We are a reliable third party Quickbooks Help company offering technical support for various any types of technical errors. https://www.quickbooksphonenumber.com/

  63. How to Office Setup. Go to office.com/setup and enter your product key. If you have a previous report of Office or existing Microsoft account, enter your email habitat and password, and click Sign in. Select the Country/Region and Language, and click Continue. On the office.com/myaccount page, pick Install
    office setup

  64. To start using mcafee antivirus, visit mcafee.com/activate and enter 25 digit mcafee activation code and activate your mcafee subscription.Mcafee activate code is a 25-character alpha-numeric code written on the back of a retail card. It's used to verify mcafee security

  65. Canon Printer Support works effortlessly towards serving the consumers and have a wide stretch toward resolving the issues, our canon printer Support provides you with all the answers to your issues.

  66. An exciting cricketing season that displays extravaganza of cricket across the world BBL 2019-2020 Schedule

  67. This comment has been removed by the author.

  68. Very nice!!! This is really good blog information thanks for sharing. We are a reliable third party Brother Printer Customer Support company offering technical support for various any types of technical errors.visit here now:
    Brother Printer customer care | Brother Printer customer service | Brother Printer customer support | Brother Printer technical support | Brother Printer helpline number

  69. Lexmark Printer Support contact if you need assistance with your Lexmark Printer. Support available for printing problems, scanning problems, connectivity problems, and many more.

    Lexmark Printer Support

  70. Users can connect many smart devices with their Alexa Amazon App and Echo. For example thermostats, smart lights, cameras connected to Alexa, Robot vacuums. Alexa App will control all these devices like a home automation system. You just have to give a voice command only to Alexa for performing such tasks.

    Alexa app
    Alexa Amazon App
    Alexa setup
    Echo Dot setup
    Amazon echo dot

  71. Get Easy Assistance for Canon IJ Setup with us
    If you are looking out for the best assistance with Canon IJSetup with us. We at are available for for your assistance with a round the clock availability. You can reach out to us with any issues relating to your Canon Driver Support and our team will provide you the best assistance with its installation and usage.you can call toll free number +1-888-845-6052.

  72. Business users may choose the product according to their business level. Other product by the antivirus is for different categories and users across the world rely on it to secure their data.For More information Visit Our Site: 
    office.com/setup       norton.com/setup  norton.com/setup   

  73. While reading your post, I came to know about the norton com setup . Actually, this information will be useful to all to know the history. Surely I will share these details with my friends who are studying history. Keep updating more news like this.Now you can call toll free number +1-888-845-6052.

  74. Put more information on this page, I really like your blog more. OGEN Infosystem is presented Top 5 Website Designing Company in India and they have also experienced team of Digital Marketing for SEO, PPC, and other social media activities.
    Website Designing Company in Delhi

  75. Now you can get Norton antivirus. You can either get your free trial at norton installation with product key or reach you out to our experts at Norton customer service. So get started.if you need call toll free number +1-888-845-6052.

  76. I am Daniel Carter and I am a technician I will help you in Hotmail password reset you can contact me anytime and for sure I will solve your McAfee Security problems, in few minutes.

    Call us: +1-888-845-6052

    Hotmail password reset

  77. ترجمه کتاب به یک مترجم تخصصی نیاز دارد که با آن کتاب و رشته آشنایی کامل داشته باشد. این کار را نمی توان به دست هرکسی سپرد. ترجمه تخصصی فارسی به انگلیسی را باید به کسی سپرد که در این زمینه تخصص کافی را داشته باشد. ترجمه ارزان را به سایت ترجمه ارزان بسپارید و نگران هیچ چیزی نباشید. اگر نیاز به ترجمه تخصصی انگلیسی به فارسی دارید حتما با ما در تماس باشید. برای اطلاع از قیمت ترجمه تماس بگیرید با ما.

  78. Thanks for sharing the blog it's very usefull. Hey I am Alicen carter from New jersey. welcome to Geek Squad Technical Support . Geek Squad Support is There to Support You we have a Best Technician for Help you and solve your issues very quickly. Just Dial Geek squad tech support number 1-856-673-221. Our Technical Team available for 24/7 hours for support you.

    geek squad repair phone number
    Geek support number
    geek squad online support
    geek squad appointment cost
    geek squad repair prices
    geek squad repair phone number

  79. The information on this platform is very clear and concise and I will love to say thanks for sharing this great information to us on the internet. I am wondering if this is still as effective as it was because I am hoping to add everything you said in my project build for my school activities. I am hoping to see an answer of a brutal life style now. Thanks a lot for being honest.
    Free Netflix Accounts 2019
    Free Premium Account
    Free Spotify Premium Accounts 2019/2020
    Free Minecraft Account 2019/2020
    Free Premium Netflix Account Generator 2019
    WhatsApp Group Links 2020

  80. norton.com/setup easy installation, Norton integrates flawlessly with your device for delivering dynamic results for the best defense against viruses, norton.com/setup malware, norton.com/setup and cyber crooks. The best thing about having a security suite like norton.com/setup is that it runs silently in the background, providing you the guarantee of comprehensive protection through a host of reliable security tools, technologies, and utilities that can be downloaded through norton.com/setup.

  81. In the event that you need to appreciate the redesigned variant of Norton Security Antivirus, restore your membership.

  82. In the event that you need to appreciate the redesigned variant of Norton Security Antivirus, restore your membership.

  83. norton.com/setup the advancement of technology and growing use of the internet, there has been observed a great hike in the number of viruses. norton.com/setup These viruses directly attack your computer systems, resulting in corrupting your important data and stealing your confidential information. norton.com/setup Viruses like Ransomware can also lock your data permanently until you pay some ransom to get the access back. norton.com/setup Antivirus provides you with countless security features along with suitable versions and with such facilities, who will not want a Norton installed on their devices. You can download and install the Norton setup through both online and offline process. norton.com/setup Therefore, if you want to install Norton on your devices consider the steps mentioned below and get secured. norton.com/setup

  84. Good day !!
    We are Christian Organization formed to help people in need of help,such as
    financial assistance, Do you need a loan to pay your bills? Do you need
    Personal Business Car or Student loans? Need a loan for various other
    purposes? If yes contact us today.

    Please these is for serious minded and God fearing People Only.

    Email: jacksonwaltonloancompany@gmail.com

    Text or call: +1-205-5882-592.

    Address is 68 Fremont Ave Penrose CO, 81240.

    Website: jacksonwaltonloancompany.blogspot.com

  85. This kind of article is very informative and expressive throughout all the content. But apart from this if you are facing problem like mcafee activate product key then feel free just contact with us or visit our website.

  86. Hello I am so delighted I located your Page, I really located you by mistake, while I was watching on google for something else, Anyways I am here now and if you any trouble www.Norton.com/Setup With Product Key you can cantact us. could just like to say thank for a tremendous post and a all round entertaining website. Please do keep up the great work.


  87. Hello I am so delighted I located your Page, I really located you by mistake, while I was watching on google for something else, Anyways I am here now and if you any trouble norton.com/setup you can cantact us. could just like to say thank for a tremendous post and a all round entertaining website. Please do keep up the great work.

  88. You have brought up a very wonderful points , regards for the post.
    hp printer support | epson printer support


  89. Content contains good information for readers and on the other side we are providing Avg Antivirus services so if you need Avg customer service phone number just contact us or visit our website.

  90. awesome information sir thank you so much for share this facebook styles name and just read all new latest educational and entertainment article just visit hindi me

  91. awesome information sir thank you so much for share this facebook styles name and just read all new latest educational and entertainment article just visit hindi me

  92. I'm very happy to uncover this page. I need to to thank you for ones time due to this wonderful read!! I definitely savored every bit of it and i also have you bookmarked to look at new things on your site.
    I am Constant Daikon and i am working on Big Bash League 2019-20 Schedule site where you can find latest news

  93. Nice blog and very useful everyone I read your post and found it quite interesting with your article it really uses full information and any one can easily understand but we are also providing you Norton.com setup download if you have any trouble you can contact us. The post you shared is very unique and informative. Thanks for sharing.. it contains good information but If you have any trouble in just contact us we will solve your problem.

  94. What a great post! I found your blog on google and loved reading it greatly. It is a great post indeed. Much obliged to you and good fortunes. keep sharing.

    Latest jokes

  95. netgear support is a tech help assistance provider company that provides the best tech help related to routers and modems issue like connection error, setup fails, login id fails. for these issues you can simply go to netgear support and contact them by call, chat, email. and they will give you the solution to your problem.
    for more details visit the website Netgear wifi extender

  96. Wow, Great article I have ever read, After read your article I thought I should write my first comment here. I don,t know what to say but I really enjoy to read your blog. Thank you so much for sharing this article with us and all the best for your next blog. norton.com/setup

  97. Download office setup key from www.office.com/setup and activate all office products like Excel, world, power point, outlook etc. Office.com/setup provide latest

  98. Resident Evil 2 Remake Crack it can be keygen in which generates an original serial code. All of our available cd-key generator and cracks have build antiban solution so they really happen to be completely buried. We all worked hard develop this unique app and additionally our new crew mysteriously were find out most desirable algorithm that will create codes. Utilizing my fresh new tool it is easy to enjoy on video game without having any troubles. Furthermore our organization contains most of the security certificates you will discover on the Internet. Therefore, you don’t need to stress about just about any issues. Quite frankly function this key generator and then procrastinate a short time and therefore play in video game. Resident Evil 2 Remake serial is actually incredible and also user-friendly and uncomplicated! That Resident Evil 2 Remake full game product offers repeatedly enhancements.

  99. Nice blog and very useful everyone I read your post and found it quite interesting with your article it really uses full information and any one can easily understand but we are also providing you Avast Phone Number if you have any trouble you can contact us. The post you shared is very unique and informative. Thanks for sharing.. it contains good information but If you have any trouble in just contact us we will solve your problem.

  100. Get to know how to fix and bring HP Envy Printer is offline to Online.There could be several factors responsible for the occurrence of HP Envy Printer is offline error,but our offered steps will help you resolve it effortlessly.

  101. I'm really satisfied to find this site.I need to thank you only for this stunning read. This is actually a very informative article – not like most of what I see online. Thanks for the free share and looking forward to reading your updates! simply wow
    epson printer support | dell printer support | hp printer support | canon printer support

  102. Thanks for sharing. We provide full support for all your Linksys devices, including guidance for your arlo support .So if you are having issues with connecting to the Wifi or configure settings on the Linksys app, then contact us using our live chat services or our email. You can also call us using our customer support phone number.

  103. Allahabad University Model Paper & Question Paper Download Allahabad University Question Paper PDF Download, Allahabad University Model Paper, Question Paper Download :
    allahabad university model paper question paper download
    dhes kerala board plus two model paper
    indian geography pdf download
    indian navy year questions paper pdf download
    west bengal state board 12th model paper

  104. November Current Affairs PDF Download Hindi/English November Current Affairs PDF Download, November Current Affairs Download in Hindi, आज हम आपके लिए November Current Affairs लेकर आए है जो की अभी जल्दी में ही होने वाली Exams Candidate के लिए बहुत ही लाभदायक साबित हो सकता है | दोस्तों इसका Link हमने निचे लगा दिया है आप उस पर Click कर के …
    november current affairs pdf download
    pseb model paper pdf download
    precentage questions pdf download
    general scinece pdf download
    april current affairs pdf download

  105. September Current Affairs PDF Download September Current Affairs PDF Download, September Current Affairs in Hindi PDF – Hello Freinds आज हम आपके लिए September महीने की करंट घटनाओ को हम एक PDF फाइल बना कर आपके साथ Shere करने के लिए लाये है इस फाइल को पढ़ने के लिए सबसे पहले आपको निचे दिए गए Link पर Click करके उसे Download …
    september current affairs pdf download
    october current affairs hindi pdf download
    indian history pdf notes download
    arun sharma quantitative aptitude book pdf

  106. Hindi Grammar PDF Download Hindi Vyakaran ( हिंदी ग्रामर नोट्स ) Hindi Vyakaran PDF – यहाँ हिंदी व्याकरण के सारे तथ्वों को विस्तार रूप से समझाया गया है |और साथ में Hindi Grammar PDF Download भी कर सकते है निचे दिए गए Important हिंदी व्याकरण को Download करें जिसमे बहुत सारे हिंदी Subject से Condidet परीक्षाओं की तयारी कर रहे है …
    hindi grammar pdf download
    english grammar pdf download english grammar hindi
    rs aggarwal quantitative aptitude book pdf download
    lucent samanya gyan lucent gk book pdf download
    nios 12th model paper download

  107. SSC CGL GK Questions in Hindi PDF Download SSC CGL GK Questions in PDF – Dear Students आज मैं आप लोगो के लिए SSC CGL 2019 Exam और GK Questions लेकर आया हूँ दोस्तों यह आपके लिए बहुत महत्वपूर्ण होने वाला है Dear Student इसमें कई महत्वपूर्ण प्रश्न भी दिए हुवे है जो की पिछले कई बार SSC CGL में पूछे …
    ssc clg hindi pdf download
    hbsc board 10th model paper
    lucent general knowledge
    uptet hindi vyakaran
    english speaking course

  108. MovieRulz 2019 – Latest Movies Download Bollywood, & Hollywood Tollywood Online MovieRulz – 2019 दोस्तों एक समय था की जब कोई सा भी Movies Theatre में लगता था तो लोगो का पागल पन्न देखने को मिलता था चाहे कोई सा भी मूवीज हो उसे देखने के लिए लोग अपने काम से छुट्टी लेकर जाते थे और देखते थे आज से 10
    movierulz 2019
    worldfree4u 2019
    9xmovies 2019
    filmywap hd movies download
    extramovies movies hindi
    tamilyogi movie download

  109. Yojana Magazine, Kurukshetra Magazine 2018-2019 Yojana PDF In Hindi Download Yojana Magazine PDF Download 2018-19, Yojana pdf in Hindi से अब तक सभी पत्रिका मासिक हिंदी में सभी एक दिवसीय परीक्षा के लिए उपयोगी साबित होगा | हम आपके लिए Yojana Magazine, Kurukshetra Magazine In Hindi 2018 लाये है, 6 Month की ये योजना मैगज़ीन की हिंदी और अंग्रेजी में pdf …
    yojana magazine pdf download
    gktoday gk trick smanya gyan
    pratiyogita darpan pdf download
    railway group d reasoning question
    rrb ntpc ki taiyari kaise karen

  110. SSC CGL Mock Test Series PDF Downloa SSC CGL Tier 1 & Tier 2 के लिए हमने आज Mock Test Series PDF में लेकर आए हैं| जिसमे बहुत से SSC CGL Tier 1 Question & Tier 2 के Question धयान में रख कर तैयार किया गया है इस SSC CGL के परीक्षा में Candidates को अगर कुछ भी इस परीक्षा से सम्बंधित …
    ssc clg mock test series pdf download
    gradup test series
    ssc mts selection process tier 1 tier 2
    hssc clerk previous paper pdf download
    cds ki tiayri kaise kare cds sylabus selection ki puri jankari

  111. UP Scholarship Online Form 2019-20 & How Apply up scholarship 2019-20 Dosto up sarkar ne Students ke liye Up scholarship online form bharne ki date announce kar diya hai agar aap scholarship bhar ke sarkari seva ka laabh uthana chahte hain to uthaa sakte hai . aaj mai aapko puri jaankari dunga ki aap online form kaise apply kar sakte hai. …
    scholarship 2019 2020
    bharat ratna list
    world geography pdf
    indian coast guars book
    june current affairs hindi pdf download

  112. Hello I am so delighted I located your Page, I really located you by mistake,if you any problems Avast customer support phone number while I was watching on google for something else, Anyways I am here now and could just like to say thank for a tremendous post and a all round entertaining website. Please do keep up the great work.

  113. ZBrush 4r8 Crack is an amazing 3D digital sculpting application where you can use various customizable brushes for shaping, texturing and painting virtual clay. You can get the feedback instantly with the use if this application. Pixologic ZBrush 4r8 Crack is a tool which is used by game developers, artists and film studios all over the world.You can likewise download all sort of programming or applications from this site completely free. This product you can likewise get a wide range of present day includes just as forward-thinking choice for altering or making a wide range of photograph with speedy out puts. Shading coordinating, blend and perfect subjects makes your product progressively alluring and organic product full for clients. Any one utilize this product with legitimate ways or get most extreme yields because of all the more amicable use interface. If you interested in sex, so visit link

  114. Thanks for sharing your details ……
    Regarding form: Astroindusoot
    #AriesRashifal2020, #TaurusRashifal2020, #GeminiRashifal2020, #CancerRashifal2020, #LeoRashifal2020, #VirgoRashifal2020, #LibraRashifal2020, #ScorpioRashifal2020, #SagittariusRashifal2020, #CapricornRashifal2020, #AquariusRashifal2020, #PiscesRashifal2020

  115. Digital marketing encompasses all marketing efforts that use an electronic device or the internet.
    Businesses leverage digital channels such as search engines,
    social media, email, and other websites to
    connect with current and prospective customers.

  116. Thanks for sharing. We provide full support for all your Linksys devices, including guidance for your arlo support . So if you are having issues with connecting to the Wifi or configure settings on the Linksys app, then contact us using our live chat services or our email.You can also call us using our customer support phone number.
    Call at +1-844-456-4180 Toll Free Phone Number

  117. Wow thanks for sharing information.



  118. Webroot.com/safe Install webroot on new computer-Activate highly rated Webroot antivirus in your PC, Andriod or Laptops and protects them from the virus, spam, spyware, and malware.

  119. Fallout 4 v1.1.30 All No-DVD [Codex]
    Fallout 4 v1.2 All No-DVD [Codex]
    Fallout 4 v1.3 All No-DVD [Codex]
    Fallout 4 v1.4 All No-DVD [SKiDROW]
    Fallout 4 v1.4.132.0 All No-DVD [Prophet]
    Fallout 4: Automatron v1.4 All No-DVD [Codex]
    Fallout 4: Wasteland Workshop v1.4.132.0 All No-DVD [Codex]
    Fallout 4: Far Harbor v1.5 All No-DVD [PLAZA]
    Fallout 4: Contraptions Workshop v1.5.307.0 All No-DVD [Codex]
    Fallout 4: Nuka World v1.7.12 All No-DVD [3DM]
    Fallout 4 v1.8 All No-DVD [Codex]
    Fallout 4 v1.9 All No-DVD [Codex]


    Fallout 4 Crack has more standard, and the proper code works in has the background, as you know the game that we like most are the premium. Yes, do you think? It has the price that student can’t afford it, SO I Like to give the crack and torrent setup of Fallout 4 crack, You can Xbox, Windows, PlayStation 4 and any other platform for playing that game are best.


    How to Crack?
    Preload the Game if you download it.
    Download the preload
    Crack ex is here just ace cute it in it will automate Marge to the preload version.

  120. Microsoft office setup is the product setup record with this setup document you can introduce on your PC and a portion of the bolstered gadget to utilize Microsoft office. The Microsoft Office programming as well as all the product dependably has the setup record, and it is essential, without the setup document the product turn pointless.
    Best Regards: office.com/setup

  121. I am looking for such an informative post for a long time. Thank you for sharing your expertise. This post is very helpful. It’s informative too! this blog is really helpful. i found very interesting things here. Rakesh Yadav Class Notes PDF
    A very interesting topic that I’ve been looking into, I think this is one of the most significant information for me. And i’m glad reading your article. Thank for sharing! RS Aggarwal Reasoning PDF
    I enjoyed over read your blog post. Your blog have nice information, I got good ideas from this amazing blog. I am always searching like this type blog post.Sarkari Buddy

  122. Thanks for ones marvelous posting! I seriously enjoyed reading it, you’re a great
    author. I will make certain to bookmark your blog and
    will eventually come back in the future. I want to encourage you continue your great writing,
    have a nice evening!

    hulu activate


  123. Support for 123 HP Printer-Install,Setup,Connect,Troubleshoot and Download Drivers for 123.hp.com/setup.

  124. I found this blog on MSN. The important thing is the structure of the post. currently IPL 2020 Points Table is booming. Thanks

  125. Thanks for this amazing post. The way you written is amazing. You can check my latest post on IPL 2020 Points Table.

  126. Posting this article is amazing. You can check the today great blog Sarkari Result 2020

  127. Do you want to delete recording from your Echo device? Don’t know the process how to do that? If yes, then don’t worry! Echo Helpline will do that for you. We have a group of expert technicians. All of them are expert and well qualified. Echo Helpline

  128. GroovePad is a one of the free music and beat maker app available for both android and windows devices. Using this you can make your favorite artist songs on beat pad. It is completely free app.
    GroovePad for PC

  129. Representatives at Shein Phone Number always serve each and every caller with the dependable solutions. Call now to authenticate this claim.
    contact shein,
    Shein Customer Service,