Jump to content

zbeng

Active Members
  • Posts

    2402
  • Joined

  • Last visited

  • Days Won

    3

Everything posted by zbeng

  1. nena zbengu foloseste ultima versiune 8
  2. mie tot asta imi zice GENERAL_ERROR: Free Beta has ended due to overwhelming demand. See FAQ.
  3. Nemessis cam cati boti ai vrut u sa loghezi )
  4. [url]http://rapidshare.com/files/21732274/8-PHPNuke.rar[/url] am genunchiul luxat si cu ghips asa ca posturile mele vor scadea
  5. incet dragii mei nenea stress m-ai incet tata
  6. SCAN RESULT http://www.virustotal.com/vt/en/resultadof?dcab17283e832c59f785f301dccd8a3b http://www.4shared.com/file/12456663/b70b8bf6/bmw.html
  7. SCAN RESULT: STATUS: FINISHEDComplete scanning result of "boot_guardian.zip", received in VirusTotal at 03.14.2007, 03:18:44 (CET). Antivirus Version Update Result AntiVir 7.3.1.41 03.13.2007 no virus found Authentium 4.93.8 03.13.2007 no virus found Avast 4.7.936.0 03.12.2007 no virus found AVG 7.5.0.447 03.13.2007 no virus found BitDefender 7.2 03.14.2007 no virus found CAT-QuickHeal 9.00 03.13.2007 no virus found ClamAV devel-20060426 03.14.2007 no virus found DrWeb 4.33 03.13.2007 no virus found eSafe 7.0.14.0 03.13.2007 no virus found eTrust-Vet 30.6.3476 03.14.2007 no virus found Ewido 4.0 03.13.2007 no virus found FileAdvisor 1 03.14.2007 Not analyzed yet Fortinet 2.85.0.0 03.13.2007 no virus found F-Prot 4.3.1.45 03.13.2007 no virus found F-Secure 6.70.13030.0 03.13.2007 no virus found Ikarus T3.1.1.3 03.13.2007 no virus found Kaspersky 4.0.2.24 03.14.2007 no virus found McAfee 4983 03.13.2007 no virus found Microsoft 1.2306 03.14.2007 no virus found NOD32v2 2113 03.13.2007 no virus found Norman 5.80.02 03.13.2007 no virus found Panda 9.0.0.4 03.13.2007 Suspicious file Prevx1 V2 03.14.2007 no virus found Sophos 4.15.0 03.13.2007 no virus found Sunbelt 2.2.907.0 03.10.2007 no virus found Symantec 10 03.14.2007 no virus found TheHacker 6.1.6.074 03.12.2007 no virus found UNA 1.83 03.13.2007 no virus found VBA32 3.11.2 03.13.2007 suspected of Flooder.VB.1 (paranoid heuristics) VirusBuster 4.3.19:9 03.12.2007 no virus found Aditional Information File size: 97572 bytes MD5: 7db14f111bdc476b5111684cbac61978 SHA1: cb08a62e8634575c79921391bcf3a2d0f6d1f480 [url]http://www.4shared.com/file/12225795/aefec8d8/boot_guardian.html[/url]
  8. Chapter I : Yahoo Rares (intro) Chapter II : What Do I Need To Get Them Chapter III : How To Crack Them Chapter IV : All About Booting Chapter I : Yahoo Ids Alright a yahoo id is a www.yahoo.com account , it's an email but without @yahoo.com , l3lackevil007 [at] yahoo [dot] com is the email ur yahoo ID is l3lackevil007 . Now what is a rare ? well a rare is an id form that you can't make anymore , such as : -Multiple Followed Underscores : like__this or like_____this or __like_this_ or _like________this and so on -Caps Lock : LikeThis or LiKeThIs or lIkEtHiS ( u can create an id with caps but it wont show as caps in ur profile it will be in normal case is what makes it a rare ) -dots : like..this like.this. like...this .like.this. and so on -Illegal names suck as : yahoo , fuck , horny , admin , ... -Number IDs : 1486111 , 55321654 , 4658464 , 687146414 ... -dash : like-this , -like-this- , -likethis--- ... -Symboles : like$this , like@this , like*this , like^this , like#this ... -+ or known as space because it shows space in games rooms n chat rooms : like+this , like+this+z , +like+this+ That's about it , a rare is a name that you can't make anymore , but they are still available in big quantities ... Chapter II : How To Crack them How to crack or "get" those names? ok first of all you're gonna need tools for this , you can find anything you want @ www.yahworld.com : - First of all you're gonna need a cracker thats gonna be attempting to steal the yahoo id by connecting to yahoo automaticly not manually , ill explain in Chapter III how to use it . Recommandations : For Dsl+ Users : Supirium , kriptinite , Y!Shizzle . For Dial Up And slow users : Refuse V4 , The Grudge Uncoloured , Nicholas V2 . - Second of all you're need the tools to grab the names you will attempt to crack , there are many ways for it: 1 - to make the id urself and check if it does really exist ( if so you will need a name scanner to check if the id exists and is available ).This Is Call ID Generating 2 - to search yahoo for existing ids For the first , now dont worry u wont be needin to make the yahoo id manually and end up spending hours to make 100 ids , there are programs that make up to 32000 ids in few seconds , dont be so happy it's gonna take u days to scan them if you make a big amount of ids Recommandations : Cracking Toolz , Kleptomania V1 , Mortification Creation . For the second , there are programs that grabs you existing yahoo ids ready to attempt to crack , it gets them by connecting to yahoo profiles. Recommandations : Cracking Toolz , - Third of all you're gonna need proxies , proxies are used so you wont get banned from yahoo due to attempting to sign in several times , so the cracker uses proxies as ips so you dont get banned , but the proxies will so its all good ( proxy is something like this 218.56.32.230:8080 ). You're gonna need a proxy leecher and a proxy checker leecher to grab proxies and scanner to check if the proxy is good to use and is not banned already or else your cracker won't work properly. Recommandation : Leecher : Proxy Leecher Pro Returns , Kleptomania V1 , Grab N Leech . Scanner : Valid Proxorz 2zorz , Ram0na.Net - Elite Proxy Scanner , ProxyPro . - Next is server list , server is where your gonna try to login with the id and password , such as login.yahoo.com or edit.yahoo.com , not gonna explain whats a server its gonna take days u just have to know thats its where you login or try to. you can find server lists @ www.yahworld.com in forums or downloads . - Last step is password list , that ur gonna try to crack ( steal ) the yahoo id with , cause u should know that cracking is a matter of luck , u jsut load a list of ids n passwords and hope it'll hit ... but don't worry everyone can crack so you shouldn't be having any problems at all. thats all related to cracking tools , now lets learn how to use them stuff and try to crack some illys Very Happy. Chapter III : How To Crack Them Ok when you open the cracker your gonna be shocked with all the options and stuff you're gonna see , well believe it or not it's not that complicated I'm gonna be explaining most of them. Now let's get the names we're gonna try to crack first. Open Your Name Generator , i can't really explain alot here since each generator is diff and i aint gonna explain every single generator available our there so you're gonna have to play with its buttons for a lil bit see what each one does but mainly all the name generators got a list for you to add n generate , load a wording list that you can find @ www.yahworld.com , its whether the generator got another list to add so it combines both lists and start forming IDs , like firstlike_secondlist and so on . Or it's gonna ask you to add a name and generate suck as _G_E_N_E_R_A_T_E_ or yourword_item this is the prog work it has already built list you just have to add the word you want to generate and wait . that's all about generators you just gotta play with its buttons see what each one of them does then start collecting your ids. Members Scanner : It's the simplest way to get IDs , but you really gotta be creative since the members grabs the same ids each time so prolly the typical scanned ids are all taken such as : king , killer , princess , god , ... All of them are typical you need original stuff , such as xxx_ or anything really original that hasnt been thought about yet...How do they work? they search yahoo profiles for the IDs you're looking for , they all have a " Insert Name To Scan " you just put the word you to grab its ids . Name Scanners : IT's for the name generator , to check if the ids really exist since your building the ID yourself , dont worry you will be finding alot. Now That's All ... Yes That's All About Cracking ... You Only Need Proxys And You're Good To Go. Open Your Proxy Leechers ... Get Over 10k Proxies , Don't worry its easy . Now Scan Them With A Proxy Scanner That You Downloaded From www.yahworld.com . The Least To Get Is 400-700 ( Good Scanned Ones ) Now Let's Go Crack Some Names : Open The Cracker , Load The Name List That You Generated/Member Scanned , in Proxy Lists Load The Proxys You Scanned , In The Servers There Must Be Servers Found Built In The Cracker But You Can Find Alot More In www.yahworld.com . Sockets : It's The Crackers Speed , but dont go right away and put 200 sockets , cuz 1/ it depends on your connection speed 2/ it depends on the crackers accurancy , but with the good crackers and if you're using DSL connection , 40-70 sockets is the best to use . TimeOut : It's something complicated but it's related to your net speed , if your on good connection you higher it same as sockets , but best is like 8000ms or 8sec. Sim Options : You will find this option on most of the crackers , see it's a style of cracking ( you wont need passwords in some cases ) Name As Pass : if you're tryin to crack idnumber1 the password its gonna use is idnumber1 ... Remove A-Z : if you're tryin to crack idnumber1212 the pass gonna be 1212 Remove #'s : if you're tryin to crack idnumber1212 the pass gonna be idnumber Cap First Letter : if you're usin killer as pass the pass gonna be Killer caP lasT letteR : if you're usin killer as pass the pass gonna be killeR AlTeRnAtIvE : if you're usin killer as pass the pass gonna be KiLlEr ... That's most of them . now the hardest part ... Click Start ... and Best Of Luck Wink2 . Yes believe it or not that's all about cracking , the rest is up on you being creative and get the unthought about names and attempt to crack . Chapter IV : All About Booting Ok you want to boot someone from his yahoo messenger ?? Here we go... First thing you're gonna need is bots *Bots = yahoo IDs Why bots? cuz the bots are gonna mass flood ( send many yim messages ) to the lamer , over 1000yim+ which is gonna OF COURSE lag him he's gonna end up rebooting his system to restart yim. Booting someone takes 2min . But it might take longer for his status to go offline cause when u reboot ur system and you have your yim open , you will be still shown on till you relogin or after a small period ... 3-4min or so. Ids and Pass should be in this form: ID:PASS Or Id - Pass It really depends on the booter you're using , some use the first some use the second... Now you just gotta load the bot list you made , enter the victim name in its place , leave the server like it is if available , now hit "boot" ( Mind that most of the booters have many booting options such as Audible , Buzz , COnference , ... they all boot successfully just in different ways , some send buzzes some send game invites some send audibles and and and ... That's all really , just load bots and boot. ( mind that if the victim has his preferences set on " NOT TO RECEIVE MESSAGES FROM PEOPLE NOT ON MY LIST " cannot be booted unfortunatly ).
  9. STATUS: FINISHEDComplete scanning result of "SVoxGOLD1.33.zip", received in VirusTotal at 02.12.2007, 14:25:06 (CET). Antivirus Version Update Result AntiVir 7.3.1.36 02.12.2007 HEUR/Crypted Authentium 4.93.8 02.12.2007 no virus found Avast 4.7.936.0 02.12.2007 no virus found AVG 386 02.11.2007 no virus found BitDefender 7.2 02.12.2007 no virus found CAT-QuickHeal 9.00 02.12.2007 (Suspicious) - DNAScan ClamAV devel-20060426 02.12.2007 no virus found DrWeb 4.33 02.12.2007 no virus found eSafe 7.0.14.0 02.12.2007 no virus found eTrust-Vet 30.4.3391 02.12.2007 no virus found Ewido 4.0 02.11.2007 no virus found Fortinet 2.85.0.0 02.12.2007 suspicious F-Prot 4.2.1.29 02.12.2007 no virus found F-Secure 6.70.13030.0 02.12.2007 no virus found Ikarus T3.1.0.31 02.12.2007 no virus found Kaspersky 4.0.2.24 02.12.2007 no virus found McAfee 4960 02.09.2007 no virus found Microsoft 1.2204 02.12.2007 no virus found NOD32v2 2054 02.12.2007 no virus found Norman 5.80.02 02.12.2007 no virus found Panda 9.0.0.4 02.12.2007 Suspicious file Prevx1 V2 02.12.2007 no virus found Sophos 4.13.0 02.12.2007 no virus found Sunbelt 2.2.907.0 02.09.2007 VIPRE.Suspicious Symantec 10 02.12.2007 no virus found TheHacker 6.1.6.056 02.11.2007 no virus found UNA 1.83 02.09.2007 no virus found VBA32 3.11.2 02.11.2007 no virus found VirusBuster 4.3.19:9 02.11.2007 no virus found http://www.sendspace.com/file/9r5wxt
  10. Since a lot of people proxy DDoS, it's useful to protect your site against it. You have three options if you have total control over the server. 1.) Detect proxies and block them on firewall/mod_security level 2.) Detect and block them via .htaccess (a hastle) 3.) Detect them via PHP and block them via .htaccess Since most people use shared hosting, number 3 is the best option unless you feel like manually banning 600 ips from / So, just put this litle code at the top of all your main PHP files, and it will consume little to no resources. if(isset($_SERVER['HTTP_X_FORWARDED_FOR']) || ($_SERVER['HTTP_USER_AGENT']=='') || ($_SERVER['HTTP_VIA']!='')){ die("Don't use proxies, please."); } Break down: HTTP_X_FORWARDED_FOR: When a proxy connects to a site, it sends Forwaded-For: YourIPHere, unless it's an elite proxy. People that don't use proxies have no http_x_forwaded_for so that's a dead easy way to spot them. HTTP_USER_AGENT: This script checks and make sure the user DOES send a user agent. Most DDoSing programs don't have a User-Agent attribute where as all internet browsers do =) Another easy spot on. HTTP_VIA: HTTP_VIA pretty much sends what kind of proxy server it's using, ie squid/squidX. Info: Most DDoSing programs hit http://site.com, not http://site.com/page.php. When the program connects to site.com/, the index file is loaded. index.php in most forums. So, if you put that code in index.php, the first line of it, then you'll barely feel any effects of proxy DDoSing. You can modify that script to add on to the .htaccess to deny the attacking IP ie: $fp = fopen(".htaccess", "a"); /*append the file*/ $write = fputs($fp, "deny from " .$_SERVER['REMOTE_ADDR'] . "\n"); fclose($fp); Open the file for appendage, write "deny from xxx.xxx.xxx.xxx, add a new line, close/save file.
  11. SCAN RESULT: http://www.virustotal.com/vt/en/resultadof?c6b1edd4c297f2e0a1106e41d69f93b2 Antivirus Version Update Result AntiVir 7.3.1.34 02.07.2007 no virus found Authentium 4.93.8 02.07.2007 no virus found Avast 4.7.936.0 02.06.2007 no virus found AVG 386 02.06.2007 no virus found BitDefender 7.2 02.05.2007 no virus found CAT-QuickHeal 9.00 02.06.2007 no virus found ClamAV devel-20060426 02.06.2007 no virus found DrWeb 4.33 02.07.2007 no virus found eSafe 7.0.14.0 02.06.2007 no virus found eTrust-InoculateIT 30.4.3374 02.07.2007 no virus found eTrust-Vet 30.4.3374 02.07.2007 no virus found Ewido 4.0 02.06.2007 no virus found Fortinet 2.85.0.0 02.07.2007 no virus found F-Prot 4.2.1.29 02.07.2007 no virus found Ikarus T3.1.0.31 02.07.2007 no virus found Kaspersky 4.0.2.24 02.07.2007 no virus found McAfee 4957 02.06.2007 no virus found Microsoft 1.2101 02.07.2007 no virus found NOD32v2 2042 02.06.2007 no virus found Norman 5.80.02 02.06.2007 no virus found Panda 9.0.0.4 02.07.2007 no virus found Prevx1 V2 02.07.2007 no virus found Sophos 4.13.0 02.05.2007 no virus found Sunbelt 2.2.907.0 02.02.2007 no virus found Symantec 10 02.07.2007 no virus found TheHacker 6.1.6.053 02.07.2007 no virus found UNA 1.83 02.06.2007 no virus found VBA32 3.11.2 02.07.2007 no virus found VirusBuster 4.3.19:9 02.06.2007 no virus found [url]http://www.rogepost.com/n/9885301145[/url]
  12. SCAN RESULT: http://www.virustotal.com/vt/en/resultadof?3648d650d89dd449ac3ff6ec6edbe614 Antivirus Version Update Result AntiVir 7.3.1.34 02.07.2007 CC/Agent Authentium 4.93.8 02.07.2007 no virus found Avast 4.7.936.0 02.07.2007 no virus found AVG 386 02.07.2007 Potentially harmful program HackTool.AG BitDefender 7.2 02.07.2007 no virus found CAT-QuickHeal 9.00 02.07.2007 no virus found ClamAV devel-20060426 02.07.2007 no virus found DrWeb 4.33 02.07.2007 no virus found eSafe 7.0.14.0 02.07.2007 Win32.Adload.a eTrust-InoculateIT 30.4.3374 02.07.2007 no virus found eTrust-Vet 30.4.3374 02.07.2007 no virus found Ewido 4.0 02.07.2007 Backdoor.IRCBot Fortinet 2.85.0.0 02.07.2007 HackerTool/ProxyCrack F-Prot 4.2.1.29 02.07.2007 no virus found F-Secure 6.70.13030.0 02.07.2007 no virus found Ikarus T3.1.0.31 02.07.2007 no virus found Kaspersky 4.0.2.24 02.07.2007 no virus found McAfee 4958 02.07.2007 potentially unwanted program PWCrack-ProxyCrack Microsoft 1.2101 02.07.2007 no virus found NOD32v2 2044 02.07.2007 probably a variant of Win32/Flooder.IM.VB.A Norman 5.80.02 02.07.2007 no virus found Panda 9.0.0.4 02.07.2007 no virus found Prevx1 V2 02.08.2007 no virus found Sophos 4.13.0 02.05.2007 KewlButtonz 1.00 Sunbelt 2.2.907.0 02.02.2007 no virus found Symantec 10 02.07.2007 no virus found TheHacker 6.1.6.053 02.07.2007 no virus found UNA 1.83 02.07.2007 no virus found VBA32 3.11.2 02.07.2007 suspected of Flooder.VB.1 (paranoid heuristics) VirusBuster 4.3.19:9 02.07.2007 no virus found DOWNLOAD http://www.4shared.com/file/11128079/79920f16/GMC---Chat_Client_Booter_v2.html
  13. http://www.4shared.com/file/8114847/95421d1d/info_crack_v_422Cracked.html
  14. A vulnerability has been reported in Yahoo! Messenger, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to an error in the YMailAttach ActiveX control when handling the TextETACalculating property. This can be exploited to cause a heap-based buffer overflow by setting an overly long string to the said property. Successful exploitation allows execution of arbitrary code and requires that the user is e.g. tricked into visiting a malicious web site. The vulnerability is reported in version 8.0 and 7.5. Other versions may also be affected. ***Discovered by Peter Vreugdenhil and reported via iDefense Labs. Yahoo! Messenger Unspecified ActiveX Control Buffer Overflow - Advisories - Secunia http://secunia.com/advisories/23401/ Security Update - Yahoo! Messenger http://messenger.yahoo.com/security_update.php?id=120806 YEAHBAH!!!
  15. Ras macar zi de unde le copii
  16. zbeng

    FrEeBoY

    bun venit in aceasta mare familie;))
  17. ABORT -- abort the current transaction ALTER DATABASE -- change a database ALTER GROUP -- add users to a group or remove users from a group ALTER TABLE -- change the definition of a table ALTER TRIGGER -- change the definition of a trigger ALTER USER -- change a database user account ANALYZE -- collect statistics about a database BEGIN -- start a transaction block CHECKPOINT -- force a transaction log checkpoint CLOSE -- close a cursor CLUSTER -- cluster a table according to an index COMMENT -- define or change the comment of an object COMMIT -- commit the current transaction COPY -- copy data between files and tables CREATE AGGREGATE -- define a new aggregate function CREATE CAST -- define a user-defined cast CREATE CONSTRAINT TRIGGER -- define a new constraint trigger CREATE CONVERSION -- define a user-defined conversion CREATE DATABASE -- create a new database CREATE DOMAIN -- define a new domain CREATE FUNCTION -- define a new function CREATE GROUP -- define a new user group CREATE INDEX -- define a new index CREATE LANGUAGE -- define a new procedural language CREATE OPERATOR -- define a new operator CREATE OPERATOR CLASS -- define a new operator class for indexes CREATE RULE -- define a new rewrite rule CREATE SCHEMA -- define a new schema CREATE SEQUENCE -- define a new sequence generator CREATE TABLE -- define a new table CREATE TABLE AS -- create a new table from the results of a query CREATE TRIGGER -- define a new trigger CREATE TYPE -- define a new data type CREATE USER -- define a new database user account CREATE VIEW -- define a new view DEALLOCATE -- remove a prepared query DECLARE -- define a cursor DELETE -- delete rows of a table DROP AGGREGATE -- remove a user-defined aggregate function DROP CAST -- remove a user-defined cast DROP CONVERSION -- remove a user-defined conversion DROP DATABASE -- remove a database DROP DOMAIN -- remove a user-defined domain DROP FUNCTION -- remove a user-defined function DROP GROUP -- remove a user group DROP INDEX -- remove an index DROP LANGUAGE -- remove a user-defined procedural language DROP OPERATOR -- remove a user-defined operator DROP OPERATOR CLASS -- remove a user-defined operator class DROP RULE -- remove a rewrite rule DROP SCHEMA -- remove a schema DROP SEQUENCE -- remove a sequence DROP TABLE -- remove a table DROP TRIGGER -- remove a trigger DROP TYPE -- remove a user-defined data type DROP USER -- remove a database user account DROP VIEW -- remove a view END -- commit the current transaction EXECUTE -- execute a prepared query EXPLAIN -- show the execution plan of a statement FETCH -- retrieve rows from a table using a cursor GRANT -- define access privileges INSERT -- create new rows in a table LISTEN -- listen for a notification LOAD -- load or reload a shared library file LOCK -- explicitly lock a table MOVE -- position a cursor on a specified row of a table NOTIFY -- generate a notification PREPARE -- create a prepared query REINDEX -- rebuild corrupted indexes RESET -- restore the value of a run-time parameter to a default value REVOKE -- remove access privileges ROLLBACK -- abort the current transaction SELECT -- retrieve rows from a table or view SELECT INTO -- create a new table from the results of a query SET -- change a run-time parameter SET CONSTRAINTS -- set the constraint mode of the current transaction SET SESSION AUTHORIZATION -- set the session user identifier and the current user identifier of the current session SET TRANSACTION -- set the characteristics of the current transaction SHOW -- show the value of a run-time parameter START TRANSACTION -- start a transaction block TRUNCATE -- empty a table UNLISTEN -- stop listening for a notification UPDATE -- update rows of a table VACUUM -- garbage-collect and optionally analyze a database ceva mai complet =>http://dev.mysql.com/doc/refman/5.0/en/index.html cred cal am de la =>h4cky0u
  18. http://rapidshare.com/files/21031838/TM10979.rar
  19. http://rapidshare.com/files/20676062/BentoBox_By_SGKNOX.COM.rar
  20. WinHex is a universal hexadecimal editor, particularly helpful in the realm of computer forensics, data recovery, low-level data processing, and IT security. An advanced tool for everyday and emergency use: inspect and edit all kinds of files, recover deleted files or lost data from hard drives with corrupt file systems or from digital camera cards. Features include: - Disk editor for hard disks, floppy disks, CD-ROM & DVD, ZIP, Smart Media, Compact Flash, … - Powerful directory browser for FAT, NTFS, Ext2/3, ReiserFS, CDFS, UDF - RAM editor, providing access to other processes’ virtual memory - Data interpreter, knowing 20 data types - Editing data structures using templates (e.g. to repair partition table/boot sector) - Concatenating and splitting files, unifying and dividing odd and even bytes/words - Analyzing and comparing files - Particularly flexible search and replace functions - Disk cloning, with a specialist license also under DOS - Drive images & backups (optionally compressed or split into 650 MB archives) - Programming interface (API) and scripting (professional & specialist licenses only) - 128-bit encryption, checksums, CRC32, hashes (MD5, SHA-1, …) - Erase (wipe) confidential files securely, hard drive cleansing to protect your privacy - Import all clipboard formats, incl. ASCII hex values - Convert between binary, hex ASCII, Intel Hex, and Motorola S - Character sets: ANSI ASCII, IBM ASCII, EBCDIC, (Unicode) - Instant window switching. Printing. Random-number generator. - Supports files >4 GB. Very fast. Easy to use & more… Download: http://depositfiles.com/files/624693 _________________
  21. WiFi eBooks Filename: Wireless Internet eBooks.rar Description: Wireless Internet eBooks Filesize: 253.52 MB [url]http://www.megaupload.com/?d=K683OVR2[/url] password: KaliMali
×
×
  • Create New...