• Log InLog In
  • Register
Liquid`
Team Liquid Liquipedia
EDT 00:06
CEST 06:06
KST 13:06
  • Home
  • Forum
  • Calendar
  • Streams
  • Liquipedia
  • Features
  • Store
  • EPT
  • TL+
  • StarCraft 2
  • Brood War
  • Smash
  • Heroes
  • Counter-Strike
  • Overwatch
  • Liquibet
  • Fantasy StarCraft
  • TLPD
  • StarCraft 2
  • Brood War
  • Blogs
Forum Sidebar
Events/Features
News
Featured News
BGE Stara Zagora 2025: Info & Preview22Code S RO12 Preview: GuMiho, Bunny, SHIN, ByuN3The Memories We Share - Facing the Final(?) GSL46Code S RO12 Preview: Cure, Zoun, Solar, Creator4[ASL19] Finals Preview: Daunting Task30
Community News
[BSL20] ProLeague: Bracket Stage & Dates6GSL Ro4 and Finals moved to Sunday June 15th12Weekly Cups (May 27-June 1): ByuN goes back-to-back0EWC 2025 Regional Qualifier Results26Code S RO12 Results + RO8 Groups (2025 Season 2)3
StarCraft 2
General
BGE Stara Zagora 2025: Info & Preview Jim claims he and Firefly were involved in match-fixing Magnus Carlsen and Fabi review Clem's chess game. GSL Ro4 and Finals moved to Sunday June 15th Serious Question: Mech
Tourneys
Bellum Gens Elite: Stara Zagora 2025 SOOPer7s Showmatches 2025 Cheeseadelphia 2025 - Open Bracket LAN! $25,000+ WardiTV 2025 Series Sparkling Tuna Cup - Weekly Open Tournament
Strategy
[G] Darkgrid Layout Simple Questions Simple Answers [G] PvT Cheese: 13 Gate Proxy Robo
Custom Maps
[UMS] Zillion Zerglings
External Content
Mutation # 476 Charnel House Mutation # 475 Hard Target Mutation # 474 Futile Resistance Mutation # 473 Cold is the Void
Brood War
General
BW General Discussion [BSL20] ProLeague: Bracket Stage & Dates Will foreigners ever be able to challenge Koreans? BGH auto balance -> http://bghmmr.eu/ I made an ASL quiz
Tourneys
[BSL 2v2] ProLeague Season 3 - Friday 21:00 CET [ASL19] Grand Finals [Megathread] Daily Proleagues Small VOD Thread 2.0
Strategy
I am doing this better than progamers do. [G] How to get started on ladder as a new Z player
Other Games
General Games
Path of Exile Nintendo Switch Thread Mechabellum Stormgate/Frost Giant Megathread Monster Hunter Wilds
Dota 2
Official 'what is Dota anymore' discussion
League of Legends
LiquidLegends to reintegrate into TL.net
Heroes of the Storm
Heroes of the Storm 2.0 Simple Questions, Simple Answers
Hearthstone
Heroes of StarCraft mini-set
TL Mafia
Vanilla Mini Mafia TL Mafia Community Thread
Community
General
US Politics Mega-thread Russo-Ukrainian War Thread Things Aren’t Peaceful in Palestine Vape Nation Thread European Politico-economics QA Mega-thread
Fan Clubs
Maru Fan Club Serral Fan Club
Media & Entertainment
Korean Music Discussion [Manga] One Piece
Sports
2024 - 2025 Football Thread Formula 1 Discussion NHL Playoffs 2024
World Cup 2022
Tech Support
Computer Build, Upgrade & Buying Resource Thread Cleaning My Mechanical Keyboard
TL Community
The Automated Ban List
Blogs
Heero Yuy & the Tax…
KrillinFromwales
Research study on team perfo…
TrAiDoS
I was completely wrong ab…
jameswatts
Need Your Help/Advice
Glider
Trip to the Zoo
micronesia
Poker
Nebuchad
Info SLEgma_12
SLEgma_12
Customize Sidebar...

Website Feedback

Closed Threads



Active: 19925 users

Screw Scamware

Blogs > tofucake
Post a Reply
Normal
tofucake
Profile Blog Joined October 2009
Hyrule19026 Posts
July 07 2010 16:08 GMT
#1
For the past 2 hours I've been fixing the receptionist's computer. The problem? Scamware. Clever, annoying scamware. The kind I hate most.

Plenty of people run into spyware. Ads popping up at random, tracking cookies (they count) for certain sites, and things like that. Scamware takes it to the next level: it tries to extort you at the same time.

This one was pretty sophisticated. It posed as an AntiVirus software. It intercepted all DNS requests to anywhere but its site (antivirmore.com). It reported fake "infected files" (real files, just not really infected). It also blocked all programs except browsers. That meant I couldn't go into notepad and block/redirect the site in hosts.

So I tried to boot into safe mode, but no....it's a corporate computer, so obviously nobody trusts anyone: there was a password lock on BIOS and the boot menu. While in theory this is a good idea, it's pretty bad practice when nobody (including the CEO) knows the damn password.

After about 2 minutes of trying to guess it, I said "screw you software, I have direct access to the hardware." And so I grabbed a screwdriver and opened up the computer. For the next 10 minutes I looked for the CMOS reset jumper. It was hidden under a bunch of cables and under the lip of the case..arg. I reset CMOS, rebooted, got into safe mode, system restored to last week, and installed a real antivirus.

Back to the scamware: it blocked everything and said you had to activate the product to remove the infection. This would cost $189.00, and I'm quite sure all that would accomplish would be to disable the blocks temporarily (odds are it was a yearly subscription) and not activate any kind of real AV.

All in all, screw scamware. And everyone stop downloading things.

*****
Liquipediaasante sana squash banana
Djzapz
Profile Blog Joined August 2009
Canada10681 Posts
Last Edited: 2010-07-07 16:15:16
July 07 2010 16:14 GMT
#2
I've had to deal with that kind of problem too, about 2 months ago. Same deal with a fake AV program... Usually I handle it in safe mode and get rid of it from there.

That time, it wouldn't let me start any programs at all, and the first thing I tried was to close it in task manager but it wouldn't come up...... So I spammed task manager and somehow one DID pop up. I tried to shut down the infected process and it didn't work - so I spammed again and it actually CRASHED the scamware =D

So I just installed some spyware removal software and it did the trick. Took about 15 minutes and I didn't even have to reboot. It was kind of funny to me seeing how I've had to handle *VERY* annoying viruses in the past.
"My incompetence with power tools had been increasing exponentially over the course of 20 years spent inhaling experimental oven cleaners"
sob3k
Profile Blog Joined August 2009
United States7572 Posts
July 07 2010 16:15 GMT
#3
I just have only the OS on a really small hard drive....whenever I catch something I just unplug my data drive and reformat. Very convenient.

Although I haven't got anything for almost a year...and I don't run ANY antivirus.

I guess I just know how to avoid sketch stuff...I wouldn't say I'm a "low risk user" with all the torrenting and cracking I do...

In Hungry Hungry Hippos there are no such constraints—one can constantly attempt to collect marbles with one’s hippo, limited only by one’s hippo-levering capabilities.
ieatkids5
Profile Blog Joined September 2004
United States4628 Posts
July 07 2010 16:15 GMT
#4
that's cool, never knew you could reset stuff like that. and i bet it felt great when you finally fixed the problem. i've gone through a ton of different computer software and hardware problems that when i finally found a solution and got something to work, i felt damn accomplished. one of those 'fuck yeah' moments.

also, im going to continue downloading things.
Judicator
Profile Blog Joined August 2004
United States7270 Posts
July 07 2010 16:17 GMT
#5
On July 08 2010 01:08 tofucake wrote:
For the past 2 hours I've been fixing the receptionist's computer. The problem? Scamware. Clever, annoying scamware. The kind I hate most.

Plenty of people run into spyware. Ads popping up at random, tracking cookies (they count) for certain sites, and things like that. Scamware takes it to the next level: it tries to extort you at the same time.

This one was pretty sophisticated. It posed as an AntiVirus software. It intercepted all DNS requests to anywhere but its site (antivirmore.com). It reported fake "infected files" (real files, just not really infected). It also blocked all programs except browsers. That meant I couldn't go into notepad and block/redirect the site in hosts.

So I tried to boot into safe mode, but no....it's a corporate computer, so obviously nobody trusts anyone: there was a password lock on BIOS and the boot menu. While in theory this is a good idea, it's pretty bad practice when nobody (including the CEO) knows the damn password.

After about 2 minutes of trying to guess it, I said "screw you software, I have direct access to the hardware." And so I grabbed a screwdriver and opened up the computer. For the next 10 minutes I looked for the CMOS reset jumper. It was hidden under a bunch of cables and under the lip of the case..arg. I reset CMOS, rebooted, got into safe mode, system restored to last week, and installed a real antivirus.

Back to the scamware: it blocked everything and said you had to activate the product to remove the infection. This would cost $189.00, and I'm quite sure all that would accomplish would be to disable the blocks temporarily (odds are it was a yearly subscription) and not activate any kind of real AV.

All in all, screw scamware. And everyone stop downloading things.


This is hardly clever...by the time it pretends to be anti-virus, you're already too late. Your receptionist was just browsing sites that they shouldn't have been.

R1CH's thread says hello by the way
Get it by your hands...
Jaw
Profile Blog Joined July 2008
United States274 Posts
July 07 2010 16:17 GMT
#6
i had vista defender it was so bad that i ran to foxfire for noscript
Djzapz
Profile Blog Joined August 2009
Canada10681 Posts
July 07 2010 16:18 GMT
#7
It's been about 4-5 years since I got an issue with viruses on my own computers. I do run an antivirus. At this point it's not worth not having one unless your computer is really old IMO.
"My incompetence with power tools had been increasing exponentially over the course of 20 years spent inhaling experimental oven cleaners"
barbsq
Profile Joined November 2009
United States5348 Posts
July 07 2010 16:20 GMT
#8
dude, as an IT person, i totally feel you,

esp when its an important computer that has various important files for research and whatnot (i work for a uni IT dept.), it just makes me wonder how these ppl got these in the first place T.T
The worst one i ever had to deal with, it locked me out of safe mode (i got hanged), so i had to boot through linux in order to copy data to another harddrive, scan it, and then reformat the original hdd. Basically took all day and wasn't fun.
Look at this guy, constantly diluting himself! (╮°-°)╮┳━┳ ( ╯°□°)╯ ┻━┻
tofucake
Profile Blog Joined October 2009
Hyrule19026 Posts
July 07 2010 16:20 GMT
#9
It's not a very well known thing, the CMOS reset jumper. The only reason it exists is to flush the BIOS settings completely, and it's not something I like doing.

Also, I feel great when I fix my computers on my own time, but when I fix a company computer during company time, all I can think is "great, now I'm 2 hours behind on my other work...."
Liquipediaasante sana squash banana
keNn)
Profile Blog Joined February 2003
Philippines297 Posts
Last Edited: 2010-07-07 16:21:34
July 07 2010 16:21 GMT
#10
i encountered something like this before when i was in my OJT. after fixing the problem identical to yours. i made an email( instructionals how to avoid this kind of stuffs and some technical tips) then forward it to all employee in the company(ask permission to your boss before sending it).

It work.after that I had so much free time on work LOL.
^_^
tofucake
Profile Blog Joined October 2009
Hyrule19026 Posts
July 07 2010 16:22 GMT
#11
On July 08 2010 01:17 Judicator wrote:
Show nested quote +
On July 08 2010 01:08 tofucake wrote:
For the past 2 hours I've been fixing the receptionist's computer. The problem? Scamware. Clever, annoying scamware. The kind I hate most.

Plenty of people run into spyware. Ads popping up at random, tracking cookies (they count) for certain sites, and things like that. Scamware takes it to the next level: it tries to extort you at the same time.

This one was pretty sophisticated. It posed as an AntiVirus software. It intercepted all DNS requests to anywhere but its site (antivirmore.com). It reported fake "infected files" (real files, just not really infected). It also blocked all programs except browsers. That meant I couldn't go into notepad and block/redirect the site in hosts.

So I tried to boot into safe mode, but no....it's a corporate computer, so obviously nobody trusts anyone: there was a password lock on BIOS and the boot menu. While in theory this is a good idea, it's pretty bad practice when nobody (including the CEO) knows the damn password.

After about 2 minutes of trying to guess it, I said "screw you software, I have direct access to the hardware." And so I grabbed a screwdriver and opened up the computer. For the next 10 minutes I looked for the CMOS reset jumper. It was hidden under a bunch of cables and under the lip of the case..arg. I reset CMOS, rebooted, got into safe mode, system restored to last week, and installed a real antivirus.

Back to the scamware: it blocked everything and said you had to activate the product to remove the infection. This would cost $189.00, and I'm quite sure all that would accomplish would be to disable the blocks temporarily (odds are it was a yearly subscription) and not activate any kind of real AV.

All in all, screw scamware. And everyone stop downloading things.


This is hardly clever...by the time it pretends to be anti-virus, you're already too late. Your receptionist was just browsing sites that they shouldn't have been.

R1CH's thread says hello by the way

I didn't mean clever in the way it presents itself, but rather how it blocks every avenue of attack. Other similar scamwares I've dealt with have had some way to remove it from the computer without a reboot, but this one was very good at not letting me do that. Unfortunately for it, it can't stop me from using a screwdriver.
Liquipediaasante sana squash banana
tofucake
Profile Blog Joined October 2009
Hyrule19026 Posts
July 07 2010 16:23 GMT
#12
On July 08 2010 01:20 barbsq wrote:
dude, as an IT person, i totally feel you,

esp when its an important computer that has various important files for research and whatnot (i work for a uni IT dept.), it just makes me wonder how these ppl got these in the first place T.T
The worst one i ever had to deal with, it locked me out of safe mode (i got hanged), so i had to boot through linux in order to copy data to another harddrive, scan it, and then reformat the original hdd. Basically took all day and wasn't fun.

Not only that, but that and IIRC every other computer all have a drive mapped from the same source. I'm lucky it (apparently) didn't spread beyond just the one computer.
Liquipediaasante sana squash banana
StRyKeR
Profile Blog Joined January 2006
United States1739 Posts
July 07 2010 16:45 GMT
#13
it's tofucake!
Ars longa, vita brevis, principia aeturna.
monkh
Profile Blog Joined April 2010
United Kingdom568 Posts
July 07 2010 16:45 GMT
#14
For like 20 years I've been using computers and the internet and I rarely use AV software. I feel so left out never had a virus or spyware.
Daeden.620
BrTarolg
Profile Blog Joined June 2009
United Kingdom3574 Posts
July 07 2010 16:58 GMT
#15
I had a vista defender one that worked in safemode, and still made popups even when i was reinstalling fricking windows, blocked all registry editing, browsers, corrups all AV's etc.

that was the most annoying one, i literally had to format and install windows for it, never had one as bad at that before
Baksteen
Profile Blog Joined June 2010
Netherlands438 Posts
July 07 2010 18:09 GMT
#16
The annoying part is where people do have enough user rights to get it on their computer but you never have enough rights to get rid of it
Derp Derp Derp
barbsq
Profile Joined November 2009
United States5348 Posts
July 07 2010 18:11 GMT
#17
On July 08 2010 01:23 tofucake wrote:
Show nested quote +
On July 08 2010 01:20 barbsq wrote:
dude, as an IT person, i totally feel you,

esp when its an important computer that has various important files for research and whatnot (i work for a uni IT dept.), it just makes me wonder how these ppl got these in the first place T.T
The worst one i ever had to deal with, it locked me out of safe mode (i got hanged), so i had to boot through linux in order to copy data to another harddrive, scan it, and then reformat the original hdd. Basically took all day and wasn't fun.

Not only that, but that and IIRC every other computer all have a drive mapped from the same source. I'm lucky it (apparently) didn't spread beyond just the one computer.


Yes, standard operating procedure states that all virus-related cases require us to scan the network drives that the person had access to so that it doesnt contaminate the network. Networks are so hard to maintain :/
Look at this guy, constantly diluting himself! (╮°-°)╮┳━┳ ( ╯°□°)╯ ┻━┻
tofucake
Profile Blog Joined October 2009
Hyrule19026 Posts
July 07 2010 18:19 GMT
#18
On July 08 2010 01:45 StRyKeR wrote:
it's tofucake!

Indeed.

On July 08 2010 03:09 Baksteen wrote:
The annoying part is where people do have enough user rights to get it on their computer but you never have enough rights to get rid of it

I'm sort of lucky there, since the account was a limited one.


On July 08 2010 03:11 barbsq wrote:
Show nested quote +
On July 08 2010 01:23 tofucake wrote:
On July 08 2010 01:20 barbsq wrote:
dude, as an IT person, i totally feel you,

esp when its an important computer that has various important files for research and whatnot (i work for a uni IT dept.), it just makes me wonder how these ppl got these in the first place T.T
The worst one i ever had to deal with, it locked me out of safe mode (i got hanged), so i had to boot through linux in order to copy data to another harddrive, scan it, and then reformat the original hdd. Basically took all day and wasn't fun.

Not only that, but that and IIRC every other computer all have a drive mapped from the same source. I'm lucky it (apparently) didn't spread beyond just the one computer.


Yes, standard operating procedure states that all virus-related cases require us to scan the network drives that the person had access to so that it doesnt contaminate the network. Networks are so hard to maintain :/
That would murder me and waste about 3 days. Too many computers, not enough AV. Unfortunately, it also probably means that I'll have to deal with this crap again soon.
Liquipediaasante sana squash banana
exeexe
Profile Blog Joined January 2010
Denmark937 Posts
July 07 2010 18:22 GMT
#19
get antivirus .. oh no wait.. that cost money .. learn to dodge .. its free :DDDDDD
And never forget, its always easier to throw a bomb downstairs than up. - George Orwell
Baksteen
Profile Blog Joined June 2010
Netherlands438 Posts
July 07 2010 18:30 GMT
#20
On July 08 2010 03:11 barbsq wrote:
Show nested quote +
On July 08 2010 01:23 tofucake wrote:
On July 08 2010 01:20 barbsq wrote:
dude, as an IT person, i totally feel you,

esp when its an important computer that has various important files for research and whatnot (i work for a uni IT dept.), it just makes me wonder how these ppl got these in the first place T.T
The worst one i ever had to deal with, it locked me out of safe mode (i got hanged), so i had to boot through linux in order to copy data to another harddrive, scan it, and then reformat the original hdd. Basically took all day and wasn't fun.

Not only that, but that and IIRC every other computer all have a drive mapped from the same source. I'm lucky it (apparently) didn't spread beyond just the one computer.


Yes, standard operating procedure states that all virus-related cases require us to scan the network drives that the person had access to so that it doesnt contaminate the network. Networks are so hard to maintain :/
That would murder me and waste about 3 days. Too many computers, not enough AV. Unfortunately, it also probably means that I'll have to deal with this crap again soon.
[/QUOTE]

I don't envy you

Where i work i'm the only one who knows the basic stuff about IT so we have it out sourced. I am so glad we did that everytime i read a post like this.

Good luck though and hope it won't happen again.
Derp Derp Derp
barbsq
Profile Joined November 2009
United States5348 Posts
July 07 2010 18:30 GMT
#21
On July 08 2010 03:19 tofucake wrote:
Show nested quote +
On July 08 2010 01:45 StRyKeR wrote:
it's tofucake!

Indeed.

Show nested quote +
On July 08 2010 03:09 Baksteen wrote:
The annoying part is where people do have enough user rights to get it on their computer but you never have enough rights to get rid of it

I'm sort of lucky there, since the account was a limited one.


Show nested quote +
On July 08 2010 03:11 barbsq wrote:
On July 08 2010 01:23 tofucake wrote:
On July 08 2010 01:20 barbsq wrote:
dude, as an IT person, i totally feel you,

esp when its an important computer that has various important files for research and whatnot (i work for a uni IT dept.), it just makes me wonder how these ppl got these in the first place T.T
The worst one i ever had to deal with, it locked me out of safe mode (i got hanged), so i had to boot through linux in order to copy data to another harddrive, scan it, and then reformat the original hdd. Basically took all day and wasn't fun.

Not only that, but that and IIRC every other computer all have a drive mapped from the same source. I'm lucky it (apparently) didn't spread beyond just the one computer.


Yes, standard operating procedure states that all virus-related cases require us to scan the network drives that the person had access to so that it doesnt contaminate the network. Networks are so hard to maintain :/
That would murder me and waste about 3 days. Too many computers, not enough AV. Unfortunately, it also probably means that I'll have to deal with this crap again soon.


Well, fortunately for us, we run a pretty tight ship. Ppl only have access to a very limited amount of space on the network, with really only staff computers having access to the larger network hdds. For lab computers, it typically only increases the workload by ~ 1-2 hrs or so. Still sux tho
Look at this guy, constantly diluting himself! (╮°-°)╮┳━┳ ( ╯°□°)╯ ┻━┻
Normal
Please log in or register to reply.
Live Events Refresh
OSC
00:00
OSC Elite Rising Star #15
ArT vs ReBellioNLIVE!
Liquipedia
Replay Cast
00:00
StarCraft Evolution League #12
CranKy Ducklings137
Liquipedia
[ Submit Event ]
Live Streams
Refresh
StarCraft 2
Nina 249
ProTech1
StarCraft: Brood War
Dewaltoss 211
PianO 177
Leta 98
NaDa 60
Backho 42
Noble 25
Dota 2
monkeys_forever624
NeuroSwarm131
League of Legends
JimRising 792
Counter-Strike
Fnx 1990
Stewie2K1131
taco 498
Super Smash Bros
C9.Mang0880
Other Games
summit1g9508
shahzam1104
ViBE237
Mew2King162
Organizations
Other Games
gamesdonequick1249
BasetradeTV89
StarCraft 2
Blizzard YouTube
StarCraft: Brood War
BSLTrovo
sctven
[ Show 17 non-featured ]
StarCraft 2
• Berry_CruncH297
• practicex 44
• davetesta31
• LaughNgamezSOOP
• sooper7s
• AfreecaTV YouTube
• intothetv
• Migwel
• Kozan
• IndyKCrew
StarCraft: Brood War
• STPLYoutube
• ZZZeroYoutube
• BSLYoutube
League of Legends
• Doublelift4654
• Lourlo690
• Stunt166
Other Games
• Scarra802
Upcoming Events
Bellum Gens Elite
5h 54m
WardiTV Invitational
9h 54m
BSL 2v2 ProLeague
14h 54m
Replay Cast
19h 54m
CranKy Ducklings
1d 5h
SC Evo League
1d 7h
Bellum Gens Elite
1d 8h
Fire Grow Cup
1d 10h
CSO Contender
1d 12h
BSL: ProLeague
1d 13h
StRyKeR vs MadiNho
Cross vs UltrA
TT1 vs JDConan
Bonyth vs Sziky
[ Show More ]
Replay Cast
1d 19h
SOOP Global
1d 22h
Creator vs Rogue
Cure vs Classic
SOOP
2 days
Classic vs GuMiho
Sparkling Tuna Cup
2 days
AllThingsProtoss
2 days
Fire Grow Cup
2 days
BSL: ProLeague
2 days
HBO vs Doodle
spx vs Tech
DragOn vs Hawk
Dewalt vs TerrOr
Replay Cast
2 days
Replay Cast
3 days
Replay Cast
4 days
WardiTV Invitational
4 days
WardiTV Invitational
4 days
GSL Code S
5 days
Rogue vs GuMiho
Maru vs Solar
Replay Cast
5 days
GSL Code S
6 days
herO vs TBD
Classic vs TBD
The PondCast
6 days
Replay Cast
6 days
Liquipedia Results

Completed

CSL Season 17: Qualifier 1
DreamHack Dallas 2025
Heroes 10 EU

Ongoing

JPL Season 2
BSL 2v2 Season 3
BSL Season 20
KCM Race Survival 2025 Season 2
NPSL S3
Rose Open S1
CSL Season 17: Qualifier 2
2025 GSL S2
BGE Stara Zagora 2025
BLAST.tv Austin Major 2025
ESL Impact League Season 7
IEM Dallas 2025
PGL Astana 2025
Asian Champions League '25
ECL Season 49: Europe
BLAST Rivals Spring 2025
MESA Nomadic Masters
CCT Season 2 Global Finals
IEM Melbourne 2025
YaLLa Compass Qatar 2025
PGL Bucharest 2025
BLAST Open Spring 2025

Upcoming

CSL 17: 2025 SUMMER
Copa Latinoamericana 4
CSLPRO Last Chance 2025
CSLPRO Chat StarLAN 3
K-Championship
SEL Season 2 Championship
Esports World Cup 2025
HSC XXVII
Championship of Russia 2025
Murky Cup #2
NC Random Cup
BLAST Bounty Fall 2025
BLAST Bounty Fall Qual
IEM Cologne 2025
FISSURE Playground #1
TLPD

1. ByuN
2. TY
3. Dark
4. Solar
5. Stats
6. Nerchio
7. sOs
8. soO
9. INnoVation
10. Elazer
1. Rain
2. Flash
3. EffOrt
4. Last
5. Bisu
6. Soulkey
7. Mini
8. Sharp
Sidebar Settings...

Advertising | Privacy Policy | Terms Of Use | Contact Us

Original banner artwork: Jim Warren
The contents of this webpage are copyright © 2025 TLnet. All Rights Reserved.