Bitcoin Forum
May 13, 2024, 07:29:18 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: 1 2 3 [All]
  Print  
Author Topic: I need some small super malicious computer viruses  (Read 2408 times)
luv2drnkbr (OP)
Hero Member
*****
Offline Offline

Activity: 793
Merit: 1016



View Profile
September 11, 2013, 07:21:36 AM
 #1

I have started adding flagged words to the signature of my e-mails, as a form of protest of the topical NSA scandal. I would also like to start attaching small viruses, encrypted with passwords like "Password1" and "correct horse battery staple" so that the recipients don't get infected (because it's encrypted) but any snoops that steal the e-mail and attempt to decrypt the attachment will 1) definitely be able to decrypt it, and 2) will get a nasty surprise. (I also have in my signature an warning/alert to the e-mail recipients NOT to attempt to decrypt the attachment, because it's a virus.)

Does anybody have some torrents or other links to something best suited for this purpose.

1715628558
Hero Member
*
Offline Offline

Posts: 1715628558

View Profile Personal Message (Offline)

Ignore
1715628558
Reply with quote  #2

1715628558
Report to moderator
1715628558
Hero Member
*
Offline Offline

Posts: 1715628558

View Profile Personal Message (Offline)

Ignore
1715628558
Reply with quote  #2

1715628558
Report to moderator
1715628558
Hero Member
*
Offline Offline

Posts: 1715628558

View Profile Personal Message (Offline)

Ignore
1715628558
Reply with quote  #2

1715628558
Report to moderator
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
greyhawk
Hero Member
*****
Offline Offline

Activity: 938
Merit: 1009


View Profile
September 11, 2013, 08:18:51 AM
 #2

I have started adding flagged words to the signature of my e-mails, as a form of protest of the topical NSA scandal. I would also like to start attaching small viruses, encrypted with passwords like "Password1" and "correct horse battery staple" so that the recipients don't get infected (because it's encrypted) but any snoops that steal the e-mail and attempt to decrypt the attachment will 1) definitely be able to decrypt it, and 2) will get a nasty surprise. (I also have in my signature an warning/alert to the e-mail recipients NOT to attempt to decrypt the attachment, because it's a virus.)

Does anybody have some torrents or other links to something best suited for this purpose.

http://www.downloadstuffserversite.org/howtogetbuttfucked4freeinguantanamo.txt
r3wt
Hero Member
*****
Offline Offline

Activity: 686
Merit: 504


always the student, never the master.


View Profile
September 11, 2013, 09:14:25 AM
 #3

Just encrypt a jpg of Rick Astley => Rickroll the NSA.

fucking genius. you sir are awesome.

My negative trust rating is reflective of a personal vendetta by someone on default trust.
b!z
Legendary
*
Offline Offline

Activity: 1582
Merit: 1010



View Profile
September 11, 2013, 10:43:31 AM
 #4

Zeus, Carberp source are available for download on the web. SpyEye and many other banking trojan builders have been cracked. Enjoy your stay in Guantanamo Bay.

PS: Your plan is flawed because the NSA is not stupid enough to run potential malware in an unprotected environment, especially after you've written "there is malware attached". Also, malware is illegal, if you're doing illegal things.
pgbit
Sr. Member
****
Offline Offline

Activity: 771
Merit: 258


Trident Protocol | Simple «buy-hold-earn» system!


View Profile
September 11, 2013, 10:46:21 AM
 #5

Zeus, Carberp source are available for download on the web. SpyEye and many other banking trojan builders have been cracked. Enjoy your stay in Guantanamo Bay.

PS: Your plan is flawed because the NSA is not stupid enough to run potential malware in an unprotected environment, especially after you've written "there is malware attached". Also, malware is illegal, if you're doing illegal things.
Rickrolling will be made illegal!

██▄     ▄▄░
▀██▄ ▄██▀
▄▄███████████████████▄▄
▄█████▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀█████▄
████▀                   ▀████
████       ▄▄█████▄▄  ▀▄   ████
████      ▄██████████▄▀    ████
████      ████████▀▀       ████
████  ▄▀ ▄██▀▀▀   ▄██      ████
████   ▀▀     ▄▄███▀       ████
████▄                   ▄████
▀█████▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄█████▀
▀▀███████████████████▀▀
.
SECONDLIVE
.
CHOOSE LIFE      CHOOSE SPACE      CHOOSE FRIENDS
.
|    Twitter    |  Telegram  |   Medium   |  YouTube  |   Discord   |    TikTok    |    GitHub    |
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
   S T A K E   L I T T L E   W I N   B I G   
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
        ▄▄███████▄▄▄
    ▄▄████████████████▄▄
   ████████████████████▄
  ███████▀▀▀█████████████
 ██████▌     ▀████████████
███████▀ ▀▀▄▄██▀▀▀█████████
██████             ▀███████
██████▄             ███████
 ███████▄▄        ▄███████
  ███████████▄▄▄▄█████████
   ▀███████████████████▀
     ▀████████████████▀▀
   ██████████████████████
surebet
Hero Member
*****
Offline Offline

Activity: 495
Merit: 507



View Profile
September 11, 2013, 10:49:40 AM
 #6

luv2drnkbr (OP)
Hero Member
*****
Offline Offline

Activity: 793
Merit: 1016



View Profile
September 11, 2013, 12:27:36 PM
 #7

.

ok I encrypted some zip bombs, some rick astley pics, some random data, and just fired off an e-mail to Virus Share asking for an invite... if I get it, then the fun begins!....

.

PS: Your plan is flawed because the NSA is not stupid enough to run potential malware in an unprotected environment, especially after you've written "there is malware attached". Also, malware is illegal, if you're doing illegal things.

Well it's more a form of protest, and also I'm assuming a lot of the process might be automated.  I don't really expect them to fall for it though, it's more a "fuck you" than anything else.  Also, I think they'd have an interesting time trying to show to a court that me sending an encrypted attachment to a MY friends via MY e-mail account counts as "doing something malicious" with malware.

Mooshire
Sr. Member
****
Offline Offline

Activity: 322
Merit: 250



View Profile
September 11, 2013, 12:29:08 PM
 #8

Your avatar makes me happy

luv2drnkbr (OP)
Hero Member
*****
Offline Offline

Activity: 793
Merit: 1016



View Profile
September 11, 2013, 12:36:03 PM
 #9

Your avatar makes me happy

Haha, thanks

surebet
Hero Member
*****
Offline Offline

Activity: 495
Merit: 507



View Profile
September 11, 2013, 01:16:47 PM
 #10

ok I encrypted some zip bombs, some rick astley pics, some random data, and just fired off an e-mail to Virus Share asking for an invite... if I get it, then the fun begins!....

What reason did you put in for your access request?
Dabs
Legendary
*
Offline Offline

Activity: 3416
Merit: 1912


The Concierge of Crypto


View Profile
September 11, 2013, 02:02:01 PM
 #11

I used to keep a "virus zoo". They were all floppies locked up in a cage. I got a couple now from my office but every anti-virus can easily tag it. Pretty sure I can make some neato malware custom made trojan now that instantly nukes your drive (assuming it's windows) when executed.

I don't think this will work though, because what will happen is they will store the email and the files, but never open them or run the executables.

b!z
Legendary
*
Offline Offline

Activity: 1582
Merit: 1010



View Profile
September 11, 2013, 03:14:01 PM
 #12

ok I encrypted some zip bombs, some rick astley pics, some random data, and just fired off an e-mail to Virus Share asking for an invite... if I get it, then the fun begins!....

What reason did you put in for your access request?
Probably "i want to troll the NSA". VXShare is mostly full of crap, nothing useful anyways :-)
BitBlitz
Sr. Member
****
Offline Offline

Activity: 285
Merit: 250


Turning money into heat since 2011.


View Profile
September 11, 2013, 03:37:18 PM
 #13

From the book of old school:  Create a HUGE file that just consists of one character repeated over and over (think /dev/zero piped into a 100G file).  It will compress down to a few bytes when zipped, but any system expanding/decrypting it will be consuming a lot of resources.

I see the value of Bitcoin, so I don't worry about the price...
Dabs
Legendary
*
Offline Offline

Activity: 3416
Merit: 1912


The Concierge of Crypto


View Profile
September 12, 2013, 12:08:53 AM
 #14

From the book of old school:  Create a HUGE file that just consists of one character repeated over and over (think /dev/zero piped into a 100G file).  It will compress down to a few bytes when zipped, but any system expanding/decrypting it will be consuming a lot of resources.

You just described the zip bomb, and most modern extractors can easily detect this and not continue.

The updated method is to zip one of these giant babies, then to copy them multiple times to another zip file, then to copy those multiple times to another zip file, and you nest them very deep for a combined total size exceeding most hard drive capacities.

But, like I said, most modern archivers and extractors will detect this.

01BTC10
VIP
Hero Member
*
Offline Offline

Activity: 756
Merit: 503



View Profile
September 12, 2013, 12:12:57 AM
 #15

It won't work. It's not like it's their first infected file.

If you put this string in a file and rename it to exe it will be detected as a virus by all AV:
Code:
X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
Nixsy
Full Member
***
Offline Offline

Activity: 151
Merit: 100



View Profile WWW
September 12, 2013, 12:13:35 AM
 #16

open a text document and add this

Code:
X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*

save the file with the extension .exe

This is not a malicious file but should trigger any antivirus as being malicious. "The file is a legitimate DOS program, and produces sensible results when run (it prints the message "EICAR-STANDARD-ANTIVIRUS-TEST-FILE!")."

http://www.eicar.org/86-0-Intended-use.html

01BTC10
VIP
Hero Member
*
Offline Offline

Activity: 756
Merit: 503



View Profile
September 12, 2013, 12:15:30 AM
 #17

lol, I ninja edited my post while you were writing yours.  Cheesy
Nixsy
Full Member
***
Offline Offline

Activity: 151
Merit: 100



View Profile WWW
September 12, 2013, 12:20:21 AM
 #18


damnit .. made me look like I copied your stuff..

I know !!!

I forked it.

This 360 second delay business it like hammering six inch nails into a 2 x 4, Repetitive but I will get there in the end.

BitBlitz
Sr. Member
****
Offline Offline

Activity: 285
Merit: 250


Turning money into heat since 2011.


View Profile
September 12, 2013, 01:24:25 AM
 #19

You just described the zip bomb, and most modern extractors can easily detect this and not continue.

The updated method is to zip one of these giant babies, then to copy them multiple times to another zip file, then to copy those multiple times to another zip file, and you nest them very deep for a combined total size exceeding most hard drive capacities.

But, like I said, most modern archivers and extractors will detect this.
The reality is that nothing mentioned here would do what the OP wants..

.....Like the NSA is just going to run every executable they find as root/admin  Roll Eyes

I see the value of Bitcoin, so I don't worry about the price...
Kluge
Donator
Legendary
*
Offline Offline

Activity: 1218
Merit: 1015



View Profile
September 12, 2013, 01:38:50 AM
 #20

Hm... Is there any software to generate "multiple-outcome" encrypted text or other documents? It would have multiple hashes to "solve," but only one would be legitimate.

For example passw0rd would give:
Hey, there. I lost your most recent pubkey. Would you mind sending it over, again?

while a3nomalym@@kZer39jooL would give:
Hey, there. Ready to bomb X embassy in PleaseDon'tRaidMyHouse-istan?

Would be similar to Truecrypt's ability to give "fake" information with certain passwords. This could be useful as an added layer in case a PGP privkey is compromised, for example. I'd guess the initial password key(chain) would have to be given in a very private manner, like in a face-to-face kind of way, then entered with a randomly-scrambling virtual keyboard offline.
Dabs
Legendary
*
Offline Offline

Activity: 3416
Merit: 1912


The Concierge of Crypto


View Profile
September 12, 2013, 01:42:52 AM
 #21

Quote
The reality is that nothing mentioned here would do what the OP wants..

.....Like the NSA is just going to run every executable they find as root/admin  Roll Eyes

You never know. The NSA has some crazy evil genius mad scientists. Maybe they just like to double-click on stuff.

Hm... Is there any software to generate "multiple-outcome" encrypted text or other documents? It would have multiple hashes to "solve," but only one would be legitimate.

For example passw0rd would give:
Hey, there. I lost your most recent pubkey. Would you mind sending it over, again?

while a3nomalym@@kZer39jooL would give:
Hey, there. Ready to bomb X embassy in PleaseDon'tRaidMyHouse-istan?

Would be similar to Truecrypt's ability to give "fake" information with certain passwords. This could be useful as an added layer in case a PGP privkey is compromised, for example. I'd guess the initial password key(chain) would have to be given in a very private manner, like in a face-to-face kind of way, then entered with a randomly-scrambling virtual keyboard offline.

A simple XOR scheme would do the trick. I've seen the software somewhere. What it does is it can generate the required password to decrypt the desired plaintext. The password would be as long as the message. This is essentially similar to a one time pad.

b!z
Legendary
*
Offline Offline

Activity: 1582
Merit: 1010



View Profile
September 12, 2013, 11:03:51 AM
 #22

From the book of old school:  Create a HUGE file that just consists of one character repeated over and over (think /dev/zero piped into a 100G file).  It will compress down to a few bytes when zipped, but any system expanding/decrypting it will be consuming a lot of resources.

You just described the zip bomb, and most modern extractors can easily detect this and not continue.

The updated method is to zip one of these giant babies, then to copy them multiple times to another zip file, then to copy those multiple times to another zip file, and you nest them very deep for a combined total size exceeding most hard drive capacities.

But, like I said, most modern archivers and extractors will detect this.
http://www.unforgettable.dk/
it is not 1993 so zip bombs are useless, along with 'viruses'.

kluge: http://en.wikipedia.org/wiki/Deniable_encryption
Dabs
Legendary
*
Offline Offline

Activity: 3416
Merit: 1912


The Concierge of Crypto


View Profile
September 13, 2013, 01:52:13 AM
 #23

@b!z, yes that's the one I'm talking about. It doesn't work except for really badly implemented homebrew unzippers. I actually made one from a much smaller file, like 100 MB or something. The unzippers I all tried still wouldn't unzip them.

niko
Hero Member
*****
Offline Offline

Activity: 756
Merit: 501


There is more to Bitcoin than bitcoins.


View Profile
September 13, 2013, 05:01:55 AM
 #24

Well it's more a form of protest, and also I'm assuming a lot of the process might be automated.  I don't really expect them to fall for it though, it's more a "fuck you" than anything else.

You might as well run to the woods and scream "fuck you".

Your are on the good track, though. They seem to be in the business of mass surveilance, not national security. The process is largely automated, and as such relies on a fixed menu of exploitable standards. The more people start broadcasting random data and using ad hoc, home-brewed crypto and steganography, the more human intervention and judgement will be required on the Big Brother side. That is their only potentially limited resource, and stretching it thin might finally force them to start dealing with the national security issues at the expense of mass surveilance. We should make it part of the etiquette to include random and random-looking bits in all our communication.


They're there, in their room.
Your mining rig is on fire, yet you're very calm.
mangox
Sr. Member
****
Offline Offline

Activity: 364
Merit: 250



View Profile
September 13, 2013, 05:28:50 AM
 #25

http://www.hackforums.net/ Grin
mangox
Sr. Member
****
Offline Offline

Activity: 364
Merit: 250



View Profile
September 13, 2013, 05:48:35 AM
 #26

Hier haben wir für dich noch einige wichtige Tipps für das sichere Surfen im Internet
Solche Themen Cheesy können unseren Moderatoren gemeldet werden.
mangox
Sr. Member
****
Offline Offline

Activity: 364
Merit: 250



View Profile
September 13, 2013, 09:40:29 AM
 #27

http://jrat.pro/pictures.php
anonymous_acc
Sr. Member
****
Offline Offline

Activity: 322
Merit: 250



View Profile
September 13, 2013, 11:49:40 AM
Last edit: September 17, 2013, 08:35:29 AM by anonymous_acc
 #28

Carberp

https://mega.co.nz/#!FFExXYrQ!CMqd9nrm1d0XABKlifI9vmxprpQ6RnfsdhBHeKrDXao

https://mega.co.nz/#!0YsXWBRD!CMqd9nrm1d0XABKlifI9vmxprpQ6RnfsdhBHeKrDXao

https://disk.yandex.com/public/?hash=PlYmL0CpzKDRRcQNx2b2Go6vjCe5YK7qCI094TWgXzY%3D


1,9 Gb

password
Kj1#w2*LadiOQpw3oi029)K Oa(28)uspeh
K   O - three spaces




https://github.com/hzeroo/Carberp/tree/master/source%20-%20absource/pro/all%20source

https://docs.google.com/file/d/0B9FW2svQegfPdWJnZ2Z4eDB0djg/edit?pli=1

BTC: 1HRcwjxG2H5vSnNo5ZbGqMxRPFWJk6dwW9
b!z
Legendary
*
Offline Offline

Activity: 1582
Merit: 1010



View Profile
September 13, 2013, 12:22:15 PM
 #29


go away 13 year old
01BTC10
VIP
Hero Member
*
Offline Offline

Activity: 756
Merit: 503



View Profile
September 13, 2013, 06:55:00 PM
 #30

Almost forgot about this l337 h4x0r unreadable forum.
escrow.ms
Legendary
*
Offline Offline

Activity: 1274
Merit: 1004


View Profile
September 13, 2013, 07:23:44 PM
 #31

Don't use viruses, just take a "Fuck you NSA" picture, zip it and encrypt password with several multiple encryption algorithms, then send file and encrypted password via mail with subject Surprise 2013 and write all those random encryption algorithms name randomly.
niko
Hero Member
*****
Offline Offline

Activity: 756
Merit: 501


There is more to Bitcoin than bitcoins.


View Profile
September 14, 2013, 05:52:53 AM
 #32

Don't use viruses, just take a "Fuck you NSA" picture, zip it and encrypt password with several multiple encryption algorithms, then send file and encrypted password via mail with subject Surprise 2013 and write all those random encryption algorithms name randomly.

Even better, embed a simple message steganographically, with a weak password, in every image you share with others.

They're there, in their room.
Your mining rig is on fire, yet you're very calm.
Phinnaeus Gage
Legendary
*
Offline Offline

Activity: 1918
Merit: 1570


Bitcoin: An Idea Worth Spending


View Profile WWW
September 14, 2013, 06:11:20 AM
 #33

Don't use viruses, just take a "Fuck you NSA" picture, zip it and encrypt password with several multiple encryption algorithms, then send file and encrypted password via mail with subject Surprise 2013 and write all those random encryption algorithms name randomly.

Even better, embed a simple message steganographically, with a weak password, in every image you share with others.

Send a image back and front, each time changing a few pixels prior to re-sending. Every now and then add a comment like "that won't work" or "I didn't think of that" or "hope nobody ever breaks our code" or "too funny, dude".
cp1
Hero Member
*****
Offline Offline

Activity: 616
Merit: 500


Stop using branwallets


View Profile
September 14, 2013, 06:17:59 AM
 #34

I'm sure they would have to run the .exe.  Otherwise you could hide your secret message inside of a program that prints it out.  They probably have some sort of automated sandbox executable analyzer.

Guide to armory offline install on USB key:  https://bitcointalk.org/index.php?topic=241730.0
b!z
Legendary
*
Offline Offline

Activity: 1582
Merit: 1010



View Profile
September 15, 2013, 04:35:57 AM
 #35

Almost forgot about this l337 h4x0r unreadable forum.
Everytime I go there (for entertainment), my IQ drops by a few points. The kids there post some really stupid shit.
Zeek_W
Sr. Member
****
Offline Offline

Activity: 336
Merit: 250



View Profile
September 15, 2013, 06:37:13 AM
 #36

Hahahah, OPs post reminded me of the virus in the novel 'Digital Fortress' by Dan Brown. Keep the man busy decrypting a virus file instead of his actual information.

niko
Hero Member
*****
Offline Offline

Activity: 756
Merit: 501


There is more to Bitcoin than bitcoins.


View Profile
September 15, 2013, 04:28:44 PM
 #37

Hahahah, OPs post reminded me of the virus in the novel 'Digital Fortress' by Dan Brown. Keep the man busy decrypting a virus file instead of his actual information.

As a kid, I used to spend time listening to short-wave numbers stations, recording it on the cassette tapes, then naively writing it down, and running a C-64 code to analyze frequencies of groups of digits. Fun for kids. That was pretty much the peak of my crypto career.

Now I am thinking - what if the whole numbers station mystery was simply a cheap way of diverting enemy's resources away from where they would be useful? Just a random stream of numbers, a distraction. Certainly some cryptanalysis effort was spent on attempt to break them, and certainly this same effort was not spent on something else.

They're there, in their room.
Your mining rig is on fire, yet you're very calm.
BitBlitz
Sr. Member
****
Offline Offline

Activity: 285
Merit: 250


Turning money into heat since 2011.


View Profile
September 15, 2013, 04:49:57 PM
 #38

Hahahah, OPs post reminded me of the virus in the novel 'Digital Fortress' by Dan Brown. Keep the man busy decrypting a virus file instead of his actual information.

As a kid, I used to spend time listening to short-wave numbers stations, recording it on the cassette tapes, then naively writing it down, and running a C-64 code to analyze frequencies of groups of digits. Fun for kids. That was pretty much the peak of my crypto career.
Heh.. Not to far from this; As a college student in the US, I had some entertainment wasting Soviet military resources by sending pulsed shortwave signals on the same frequency the 'Russian Woodpecker' (over the horizon radar) was running.  Within a minute they would have to change frequencies.  A student with ~$100 worth of outdated vacuum tube equipment and 150' of wire antenna could chase a secret military project around the shortwave band for fun.


I see the value of Bitcoin, so I don't worry about the price...
Dabs
Legendary
*
Offline Offline

Activity: 3416
Merit: 1912


The Concierge of Crypto


View Profile
September 16, 2013, 02:59:50 AM
 #39

Now I am thinking - what if the whole numbers station mystery was simply a cheap way of diverting enemy's resources away from where they would be useful? Just a random stream of numbers, a distraction. Certainly some cryptanalysis effort was spent on attempt to break them, and certainly this same effort was not spent on something else.

There is a recent movie called "The Number Station".

I don't think these are cheap. And it's very possible they are indeed used the way every one thinks they are used, as one way encrypted communications channel, using one time pads. Easy to use. Uncrackable. Meaningless to everyone else.

tkbx
Sr. Member
****
Offline Offline

Activity: 350
Merit: 251



View Profile
September 16, 2013, 03:18:45 AM
 #40

I have started adding flagged words to the signature of my e-mails, as a form of protest of the topical NSA scandal. I would also like to start attaching small viruses, encrypted with passwords like "Password1" and "correct horse battery staple" so that the recipients don't get infected (because it's encrypted) but any snoops that steal the e-mail and attempt to decrypt the attachment will 1) definitely be able to decrypt it, and 2) will get a nasty surprise. (I also have in my signature an warning/alert to the e-mail recipients NOT to attempt to decrypt the attachment, because it's a virus.)

Does anybody have some torrents or other links to something best suited for this purpose.

Are you 12? You do realize that for malware to be effective without an exploit in the OS, the receiving party has to knowingly and intentionally run it.
b!z
Legendary
*
Offline Offline

Activity: 1582
Merit: 1010



View Profile
September 16, 2013, 10:26:41 AM
 #41

I have started adding flagged words to the signature of my e-mails, as a form of protest of the topical NSA scandal. I would also like to start attaching small viruses, encrypted with passwords like "Password1" and "correct horse battery staple" so that the recipients don't get infected (because it's encrypted) but any snoops that steal the e-mail and attempt to decrypt the attachment will 1) definitely be able to decrypt it, and 2) will get a nasty surprise. (I also have in my signature an warning/alert to the e-mail recipients NOT to attempt to decrypt the attachment, because it's a virus.)

Does anybody have some torrents or other links to something best suited for this purpose.

Are you 12? You do realize that for malware to be effective without an exploit in the OS, the receiving party has to knowingly and intentionally run it.

What sort of OS exploit will guess the password to a file, decrypt it, and run it? I'm quite interested.
Pages: 1 2 3 [All]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!