Main Menu
Home
Bookmark
Contact Us



 
C2.Lop Spyware Information

Name: C2.Lop
Category: Spyware
Advice: Remove
Risk: Elevated Risk Elevated threats are usually threats that fall into the range of adware in which data about a user's habits are tracked and sent back to a server for analysis without your consent or knowledge.
Description: Lop is a group of spyware and hijacker programs that set your Internet Explorer start page and search features to use the site lop.com ('Live Online Portal') or one of its clone sites.

Lop.com is a web site owned by C2 Media. It is mainly a pay-per-click search portal where other web sites pay for each click-through to their site via lop. Lop.com created a program which is labeled variously as an mp3 search program, a porn search program, or some other such thing. The installer turns the user's web browser into a device with a seemingly endless supply of links to lop.com.

An early version (installer name download_plugin.exe) installs two files in the user's wallpaper folder, one an html file and the other a shockwave file. The html file contains code to load the shockwave file. The installer sets the html file as the user's wallpaper so that the flash search engine program is sitting on the desktop at every boot. The flash file does little more than open and close a series of collapsible menus containing more lop internet shortucts and a search function which queries.

A later version (installer name mp3serch.exe) omits this desktop feature as its bugginess reportedly led to its being discontinued. Both versions install a stripped down browser which uses the Internet Explorer web browser engine. This browser automatically launches the following URL: http://www.mp3search.com.

The lop installer also makes dramatic changes to Internet Explorer, Mozilla Navigator, and Netscape Navigator. The default search engine pages, toolbar settings, and start page are changed. The lop installer adds scores of internet shortcuts in Internet Explorer's Favorites folder and in Mozilla's Bookmarks.htm file.

These lop installers create a BHO which produces an accessories toolbar in Internet Explorer full of - you guessed it - even more lop.com internet shortcuts. This BHO also takes control of the browser to make it redirect to lop.com if there is some error loading a page. It also changes bookmarks.html to bookmarks.bk!. The replacement file included all of lop's bookmarks. The lop installers finishes up by creating a registry entry to load a file named mp3serch.exe (or lopsearch.exe if you have the download_plugin.exe installer) at every boot. This entry will make Windows load the lop executable file on each machine restart.
Newer variants of C2Media's software omits the browser and BHO altogether, and instead installs dozens of internet shortcuts and sets the home page to http://unitedstates.rub.to. The installer for this variant may be named mp3.exe or freemp3z.exe. These files may appear on your computer as a result of an activex script which automatically begins to download them when you load pages at certain mp3 and/or pornographic web sites. The files are digitally signed by C2Media, the company which owns the lop.com web site and software.

Known lop sites include: aavc.com acjp.com ebav.com ebaw.com ebch.com ebch.com ebdv.com ebdw.com ebgo.com ebjp.com ebkb.com ebkn.com ebky.com eblv.com wbkb.com ebmu.com ebvr.com ecmh.com ecmp.com ecpm.com ecwz.com ecyb.com edhq.com edty.com eduy.com eeev.com farse.com ibmx.com icwb.com icwo.com icwp.com iddh.com idhh.com ifiz.com iguu.com samz.com saoe.com sbee.com sbjr.com sbnl.com sbnt.com sbvr.com scbm.com sckr.com scrk.com sdry.com seld.com sfux.com sheat.com sipo.com smds.com srib.com srox.com srsf.com ssaw.com ssby.com surj.com tbvg.com tdak.com tdmy.com tefs.com tfil.com tjar.com tjaw.com tjgo.com tjem.com torc.com wabu.com wabq.com wfix.com wflu.com

Lop also adds shortcuts to advertisers.

Finally it adds a task to run on startup which sets your homepage and sear

Signatures: process: 1111.exe: MD5 Hash: e769d8f953fb91e2ccb... process: 2443.exe: MD5 Hash: 8f46007b60a88d36c89... process: brdrsstl.exe: MD5 Hash: 11042c79575f2d89cf5... process: ckcoofrunea.exe: MD5 Hash: eb83235d584a3460918... process: cyd1.exe: MD5 Hash: bc73e2569e38274ce3e... process: download_plugin.exe: MD5 Hash: 159dad57eea84e04fbc... process: download_plugin.exe: MD5 Hash: 2d2a7d4c176884a5a3f... process: eneqckap.exe: MD5 Hash: 86d4f51f91c7cc31452... process: fblfssstoozl.exe: MD5 Hash: 2df18603161c8e93ac5... process: freemp3z.exe: MD5 Hash: 874cf2735767c931250... process: gchmfrea.exe: MD5 Hash: 5dd9b109db4441a7b10... process: hpt1.exe: MD5 Hash: 57a3b944e3a4fff8832... process: keyhost.exe: MD5 Hash: 0925a44449e5f6d01e5... process: lrgluoot.exe: MD5 Hash: 59b619f2550e7ff1ba1... process: mp3.exe: MD5 Hash: 9b3dda31f1e2ac93a38... process: mp3.exe: MD5 Hash: 4e0fa1ac6bae510eb01... process: mp3serch.exe: MD5 Hash: 93f9db14e39575e32a8... process: mp3_plugin.exe: MD5 Hash: 3308680a38c1703e12f... process: mp3_plugin.exe: MD5 Hash: e1d16536da17472a22e... process: rgg1.exe: MD5 Hash: c729ef6e7648e1d45cd... process: shxshoalldtrl.exe: MD5 Hash: 214d0f6fa1ea864a9d9... process: software_plugin.exe: MD5 Hash: c13494a361153680541... process: srytuikb.exe: MD5 Hash: 3b0570ac3377a8138ea... process: the_ultimate_browser_enhancer.exe: MD5 Hash: 0da5398708d33648188... process: trstbfkl.exe: MD5 Hash: dc400fbd46381c96d37... process: vlluafrq.exe: MD5 Hash: 59526436fa7815be49e... process: wa_inst.exe: MD5 Hash: b5c44e4663decc39d9e... process: wqy1.exe: MD5 Hash: 692e16183323dcf5585... process: wshbrybr.exe: MD5 Hash: 518e2b18159ebaf1c92... process: x.exe: MD5 Hash: 222463ec31fc659fb33... process: xlj1.exe: MD5 Hash: 417f34e6f2f0a52ee1b... process: ystck32.exe: MD5 Hash: 845cd69b6849df15616... process: yxogltoo.exe: MD5 Hash: d75cf1dc5b2dc297baa... process: zvxcypnh.exe: MD5 Hash: 77306b8fb608b7f3988... process: winactive.exe: MD5 Hash: 07dfc91183f1791fb8c... process: winactivej.exe: MD5 Hash: 783847a4416c011b70a... process: winactivej_unpacked.exe: MD5 Hash: db84b586e5a16d5baa1... process: brsswthg.exe: MD5 Hash: ... process: ddinxmdb.exe: MD5 Hash: ... process: dgpxzhtb.exe: MD5 Hash: ... process: djgxsbcl.exe: MD5 Hash: ... process: efjwxjsl.exe: MD5 Hash: ... process: flmgvmas.exe: MD5 Hash: ... process: fqbhyhjh.exe: MD5 Hash: ... process: gqlfiqii.exe: MD5 Hash: ... process: gzxqpghe.exe: MD5 Hash: ... process: hlsctpay.exe: MD5 Hash: ... process: hlyvjncf.exe: MD5 Hash: ... process: idixbdmf.exe: MD5 Hash: ... process: kmigeuhh.exe: MD5 Hash: ... process: lckqdcvd.exe: MD5 Hash: ... process: lkxelvrg.exe: MD5 Hash: ... process: lopsearch.exe: MD5 Hash: ... process: mspuztbg.exe: MD5 Hash: ... process: muqhatod.exe: MD5 Hash: ... process: muxibdom.exe: MD5 Hash: ... process: mycvbdqu.exe: MD5 Hash: ... process: nimylprv.exe: MD5 Hash: ... process: ovnolxvi.exe: MD5 Hash: ... process: pbgqwhoj.exe: MD5 Hash: ... process: qhiqikdr.exe: MD5 Hash: ... process: qtufbghm.exe: MD5 Hash: ... process: qwxgxlrv.exe: MD5 Hash: ... process: sefiqovd.exe: MD5 Hash: ... process: taecoidy.exe: MD5 Hash: ... process: trmugnsu.exe: MD5 Hash: ... process: trstlskb.exe: MD5 Hash: ... process: uljpmexe.exe: MD5 Hash: ... process: vygaeifz.exe: MD5 Hash: ... process: xxdfwvli.exe: MD5 Hash: ... process: ysaebwco.exe: MD5 Hash: ... process: zaeoxdiu.exe: MD5 Hash: ... process: zdmlfhmh.exe: MD5 Hash: ... process: zvpkxxtu.exe: MD5 Hash: ... process: ayw17f.exe: MD5 Hash: ... process: bvj13.exe: MD5 Hash: ... process: rem2ea.exe: MD5 Hash: ... process: znp1.exe: MD5 Hash: ... process: asshuktr.exe: MD5 Hash: ... process: bilyooas.exe: MD5 Hash: ... process: byb_save.exe: MD5 Hash: ... process: crgbeaoa.exe: MD5 Hash: ... process: dmvcrthl.exe: MD5 Hash: ... process: eaymulyl.exe: MD5 Hash: ... process: eeublidc.exe: MD5 Hash: ... process: glxshmcr.exe: MD5 Hash: ... process: ijlysseb.exe: MD5 Hash: ... process: jqumysto.exe: MD5 Hash: ... process: kfriegbs.exe: MD5 Hash: ... process: llfggrdr.exe: MD5 Hash: ... process: lltckiey.exe: MD5 Hash: ... process: lopsearc.exe: MD5 Hash: ... process: meemnckyqbr.exe: MD5 Hash: ... process: meepajlr.exe: MD5 Hash: ... process: mprcouie.exe: MD5 Hash: ... process: oofrkxpe.exe: MD5 Hash: ... process: peebqusz.exe: MD5 Hash: ... process: quveioot.exe: MD5 Hash: ... process: shoucrck.exe: MD5 Hash: ... process: ssmeeibl.exe: MD5 Hash: ... process: tchpeatr.exe: MD5 Hash: ... process: tglblrll.exe: MD5 Hash: ... process: trdzhtxf.exe: MD5 Hash: ... process: trstdris.exe: MD5 Hash: ... process: ulyuiexeechp.exe: MD5 Hash: ... process: vestufck.exe: MD5 Hash: ... process: vfthrcbr.exe: MD5 Hash: ... process: xogyfhp.exe: MD5 Hash: ... process: ykphmbre.exe: MD5 Hash: ... process: ylynfste.exe: MD5 Hash: ... process: the_ultimate_browser_enhancer.exe: MD5 Hash: ... process: desktop.swf1111.exe: MD5 Hash: ... process: setup.exe: MD5 Hash: 55abd95480090f45268... process: peak real.exe: MD5 Hash: 9c2f75e281cc5587494... process: curb readme.exe: MD5 Hash: e44c239b272a38c8557... process: dppcqxes.exe: MD5 Hash: 59c45596e3f42647302... process: drawbibbook.exe: MD5 Hash: afd7aa28ec7177ca6bc... process: shim glue.exe: MD5 Hash: 200e9aefce0dcb1f329... process: drawbibbook.exe: MD5 Hash: c65b8c7b25fa8a2ce6d... process: wave extra.exe: MD5 Hash: af0031c29841ce9e18e... process: Skip Option.exe: MD5 Hash: 35376b134a2937cbeb2... process: curb readme.exe: MD5 Hash: 39e5d585238c3f5341a... process: sectonepingspam.exe: MD5 Hash: 45ffedc57253915314a... process: Curb Readme.exe: MD5 Hash: 5862f80a93212ffc9e5... process: setup.exe: MD5 Hash: 76ad0088a04aa068b0d... process: peak real.exe: MD5 Hash: b42242345407594a1a0... process: sectonepingspam.exe: MD5 Hash: 684b5390e0fc6525e05... process: setup.exe: MD5 Hash: 001605b58062efdc44e... process: curb readme.exe: MD5 Hash: bd2411f0f79e242de34... process: bis38.exe: MD5 Hash: bd2411f0f79e242de34... process: drawbibbook.exe: MD5 Hash: a062944a490ab5f200d... process: sectonepingspam.exe: MD5 Hash: d25d9b63029f50271e0... process: iyjmdduk.exe: MD5 Hash: efc1a7ff2ad0cd5354a... process: peak real.exe: MD5 Hash: ae4dd127dd735ff281c... process: trans bold bash cast.exe: MD5 Hash: d18be9f42ffc84033dd... process: aim curb heart.exe: MD5 Hash: 167ec7bc7f810eca43e... process: setup.exe: MD5 Hash: f831b5a73521c80a48a... process: bis3.exe: MD5 Hash: 9633f02eaacfde2c19c... process: xgakgdzm.exe: MD5 Hash: 6c90856b54314884e5a... process: boneroad.exe: MD5 Hash: 2fe9ba63697646d75ec... process: bis247.exe: MD5 Hash: bb696ac6b47df0c5972... process: boneroad.exe: MD5 Hash: 37fb51c44a2b7990e29... process: aim curb heart.exe: MD5 Hash: 469381b73298208168d... process: that1.exe: MD5 Hash: 3eb13c1579d1e2955c5... process: setup.exe: MD5 Hash: 469a032e4cc895292cf... process: setup.exe: MD5 Hash: 99a4f21f830e2d54c8a... process: setup.exe: MD5 Hash: 54d3191ffe9a424f452... process: setup.exe: MD5 Hash: ea742121987aa009d19... process: setup.exe: MD5 Hash: a466badc2e9c43a9bf7... process: setup.exe: MD5 Hash: 1b086f95a7e25c6a31a... process: boneroad.exe: MD5 Hash: 8d93d8f8dec892a00ee... process: aim curb heart.exe: MD5 Hash: 40e2aa6ebfc5752369e... process: deadsupport.exe: MD5 Hash: 05f887a6ff576ddc49e... process: campmail.exe: MD5 Hash: 6429fc0251b67651abe... process: trans bold bash cast.exe: MD5 Hash: 220dc630dee0f0a88c9... process: chic drv about intra.exe: MD5 Hash: b75289e02e82739ff99... process: copy cast.exe: MD5 Hash: 1e5759b3924b7e3e2c2... process: jugs browse exit.exe: MD5 Hash: 81ed5822e70cbfcb214... process: proc flap.exe: MD5 Hash: a3e4d508de45b65b5e5... process: aim curb heart.exe: MD5 Hash: 469381b73298208168d... process: xgakgdzm.exe: MD5 Hash: 6c90856b54314884e5a... process: bis3.exe: MD5 Hash: 9633f02eaacfde2c19c... process: bis247.exe: MD5 Hash: bb696ac6b47df0c5972... process: boneroad.exe: MD5 Hash: 37fb51c44a2b7990e29... process: aim curb heart.exe: MD5 Hash: 167ec7bc7f810eca43e... process: trans bold bash cast.exe: MD5 Hash: d18be9f42ffc84033dd... process: boneroad.exe: MD5 Hash: 2fe9ba63697646d75ec... process: start about.exe: MD5 Hash: 8baa1714eb2f90a3e8c... process: curb readme.exe: MD5 Hash: 4bb6310f9caca126903... process: peak real.exe: MD5 Hash: 3012628c7a55002c49c... process: drawbibbook.exe: MD5 Hash: 06a0dde333a6ad7987f... process: sectonepingspam.exe: MD5 Hash: 97cb1ba721e7194955b... process: well41.exe: MD5 Hash: 031ba8a613969685a2f... process: iu.exe: MD5 Hash: 031ba8a613969685a2f... process: chic drv about intra.exe: MD5 Hash: 7cd945f88ca8a591945... process: copy cast.exe: MD5 Hash: 41a3d569592668fe8bf... process: jugs browse exit.exe: MD5 Hash: 068d4aed24a603be084... process: onpkgrzz.exe: MD5 Hash: 5770cceb3f0ca56100f... process: proc flap.exe: MD5 Hash: 86e7973b938798f8d30... process: 3b9c81.exe: MD5 Hash: b9842f995655fee38c6... process: obj show.exe: MD5 Hash: 5770cceb3f0ca56100f... process: mvammdxf.exe: MD5 Hash: d0f7b65a0a05772236a... process: bis248.exe: MD5 Hash: a322f417c628d7dd594... process: bis16.exe: MD5 Hash: 406159fec8a121c6eca... process: exyjhedz.exe: MD5 Hash: 797422df689dbfe0787... process: wma acid.exe: MD5 Hash: 8b196f8640ef711bed7... process: help readme internet bold.exe: MD5 Hash: 2888d2da8aa72e53b8f... process: support bits free.exe: MD5 Hash: e8793f3ddcbddad6e74... process: mode ace 01.exe: MD5 Hash: 47533e0f342ecca0c9f... process: rqtuooyy.exe: MD5 Hash: c51dffc90a007c9c070... process: wma acid.exe: MD5 Hash: a18ad35bc59e4c912b8... process: help readme internet bold.exe: MD5 Hash: 48c38b4bfaa727e613a... process: bis16.exe: MD5 Hash: d9b66459e3cce47814e... process: wooofimg.exe: MD5 Hash: 23c506b10b4455be165... process: wma acid.exe: MD5 Hash: 227b39efba94cd6c70d... process: help readme internet bold.exe: MD5 Hash: 13b00192a9d7cf8034d... process: support bits free.exe: MD5 Hash: 7a8709cefc81567c69d... process: bis16.exe: MD5 Hash: 6c7a3e4b161504a1bca... process: epynhzjb.exe: MD5 Hash: 4e9213724f0a53f351a... process: wma acid.exe: MD5 Hash: 78a56fdf37a1dfba349... process: help readme internet bold.exe: MD5 Hash: d55204b5191c6e75abc... process: support bits free.exe: MD5 Hash: 3efd308a6b720377cb9... process: wma acid.exe: MD5 Hash: 890eb10128b8cea9385... process: bis4.exe: MD5 Hash: cd911408c602b594a87... process: zuvhjnum.exe: MD5 Hash: 3d102cb102e8d81e766... process: wma acid.exe: MD5 Hash: 98b4cc2bd7c10216650... process: help readme internet bold.exe: MD5 Hash: e5cbb809d06a2b2575c... process: support bits free.exe: MD5 Hash: d96394746788a724518... process: wave extra.exe: MD5 Hash: af0031c29841ce9e18e... process: start about.exe: MD5 Hash: 8baa1714eb2f90a3e8c... process: bis38.exe: MD5 Hash: bd2411f0f79e242de34... process: curb readme.exe: MD5 Hash: bd2411f0f79e242de34... process: iyjmdduk.exe: MD5 Hash: efc1a7ff2ad0cd5354a... process: peak real.exe: MD5 Hash: ae4dd127dd735ff281c... process: sectonepingspam.exe: MD5 Hash: d25d9b63029f50271e0... process: drawbibbook.exe: MD5 Hash: a062944a490ab5f200d... process: help readme internet bold.exe: MD5 Hash: 6bff1f7545ea03ba90c... process: help readme internet bold.exe: MD5 Hash: 10d73855ff6f974597f... process: inside program.exe: MD5 Hash: 2e9aae9fdbc62240d28... process: inside program.exe: MD5 Hash: 2e9aae9fdbc62240d28... process: sta1.exe: MD5 Hash: b09cee658714d27d04b... process: sta1.exe: MD5 Hash: b09cee658714d27d04b... process: dogwarntest.exe: MD5 Hash: f0be2abef05f04d1cfa... process: camp lite file joy.exe: MD5 Hash: 17cbe71692a79b2d51d... process: nkxhtazi.exe: MD5 Hash: 3358a4e7bd346a21ee8... process: that1.exe: MD5 Hash: 3eb13c1579d1e2955c5... process: deadsupport.exe: MD5 Hash: 05f887a6ff576ddc49e... process: wma acid.exe: MD5 Hash: d902698ac7f8b9d9902... process: wma acid.exe: MD5 Hash: fe80c18a73cd214c559... process: wma acid.exe: MD5 Hash: 5f97eedf94fbfb310d4... process: bis17.exe: MD5 Hash: 36dc85f696317b9ee16... process: support bits free.exe: MD5 Hash: 18dd193acb00d9a76a7... process: curb rect.exe: MD5 Hash: ... process: curb rect.exe: MD5 Hash: c6e3b1340f921ad5058... process: bis17.exe: MD5 Hash: bec5f6f35533c94d4a2... process: ughcscre.exe: MD5 Hash: 5eb3561e5aae0fa1e5c... process: spamhide.exe: MD5 Hash: 6e77672ee3ed8dd7e56... process: help readme internet bold.exe: MD5 Hash: 67524721272d01eb694... process: new boob.exe: MD5 Hash: ... process: hole keep.exe: MD5 Hash: 623d6735178ba8942a6... process: hide does.exe: MD5 Hash: 255320acce7a78f000e... process: loyjzdh.exe: MD5 Hash: 870d2495a597b9fdc2a... process: curb rect.exe: MD5 Hash: efb04b9a8292bcfde81... process: curb rect.exe: MD5 Hash: f23a1533c396cbe0ea7... process: support bits free.exe: MD5 Hash: ... process: bis3.exe: MD5 Hash: d3e3b2e01abdb4c33b7... process: support bits free.exe: MD5 Hash: 85fc5333428555e35d7... process: sta1.exe: MD5 Hash: fbf8d06d0ac6216c281... process: curb rect.exe: MD5 Hash: c079996b8eae44534dc... process: pliknken.exe: MD5 Hash: caa885bba3385904652... process: help readme internet bold.exe: MD5 Hash: a3835a51175a438fcb7... process: rwlvqweu.exe: MD5 Hash: 6950065b865eaf0da85... process: wma acid.exe: MD5 Hash: b1bdae65afaee9d7aae... process: wma acid.exe: MD5 Hash: ... process: help readme internet bold.exe: MD5 Hash: ... process: wma acid.exe: MD5 Hash: 73a244e609296a00a5e... process: curb rect.exe: MD5 Hash: 824a79e9fd8e84c8538... process: curb rect.exe: MD5 Hash: c789873118ba89ab681... process: mode ace 01.exe: MD5 Hash: ... process: wma acid.exe: MD5 Hash: e14c8a7d66ff6e707b1... process: boneroad.exe: MD5 Hash: 42479ed76cd542b1871... process: aim curb heart.exe: MD5 Hash: d328a02670905c6659b... process: campmail.exe: MD5 Hash: 76bea0de1cbd8530164... process: sevgtltq.exe: MD5 Hash: 536be91b558dd912375... process: wma acid.exe: MD5 Hash: 325f15fcf7910375f1c... process: olekhrcr.exe: MD5 Hash: a655d16a8f38eaa34b4... process: support bits free.exe: MD5 Hash: 2af60b2cba599379764... process: help readme internet bold.exe: MD5 Hash: ed12b50fc76a72f55e0... process: bis3.exe: MD5 Hash: 3e74b542bfc929cd539... process: army stop.exe: MD5 Hash: 9dd18e53e9dbced13b5... process: army stop.exe: MD5 Hash: 9dd18e53e9dbced13b5..
Type: Spyware - Spyware's primary purpose is to collect demographic and usage information from your computer, usually for advertising purposes. Spyware usually that 'sneaks' onto a system or performs other activities hidden to the user. Spyware programs are usually bundled as a hidden component and downloaded from the Internet. These modules are almost always installed on the system secretively and try to run secretively as well.



Top Spyware Visited Pages:
IEPlugin - Alias: IMIServer IEPlugin, Webplugin, BHO3Lib, ExplWWW, IExpl, MimarSinan, Win Server, winobject, TrojanDow - 126 visits
Spyware.SearchAssistant - Alias: Troj/StartPa-EI - 96 visits
webHancer - Alias: Customer Companion, Webhancer Customer Companion, SpeedRank - 90 visits
PowerReg Scheduler - 90 visits
CWS.Cassandra - 84 visits
Conducent - Alias: Timesink - 79 visits
C2.Lop - Alias: C2 Media, Lop, LopAdvert, MP3Search, MpAdvert, TrojanClicker.Win32.Rotarran - 78 visits
007.msnnames - Alias: access.ocx, jokes.ocx, StopLiteCtrl, StopLite, 007installer - 77 visits
VX2.LocalNRD - Alias: LocalNRD - 77 visits
Aureate - Alias: Aureate Spy, Radiate - 76 visits

Random Spyware Pages:
Look2Me - Alias: Spyware.Look2Me, ZestyFind
OpenSetream - Alias: Java.OpenSetream, Shinwow, TrojanDownloader.Java.OpenSetream.c, JS/Shinwow, Trojan.ByteVerify
WebDir
Axexx CHM
Unclassified.Spyware.41
StartSurfing
AlwaysUpdateNews - Alias: SoftTech
Bridge/WinFavorites - Alias: Bridge, WinFavorites, Flingstone Bridge, SPYW_BRISS, Keylog-Briss, Win32/Briss
Spyware.Jmzxm
MS SyS Restore


 


2006-2008 spyware32.com - Privacy Policy