Android Anti-Forensics: Modifying Cyanogenmod

Total Page:16

File Type:pdf, Size:1020Kb

Android Anti-Forensics: Modifying Cyanogenmod 2014 47th Hawaii International Conference on System Science Android Anti-forensics: Modifying CyanogenMod Karl-Johan Karlsson William Bradley Glisson University of Glasgow University of South Alabama [email protected] [email protected] Abstract component analysis, an analyst would start by Mobile devices implementing Android operating disassembling the phone and removing the surface systems inherently create opportunities to present mounted memory chips, which is a delicate and environments that are conducive to anti-forensic highly risky procedure. The memory chips can be activities. Previous mobile forensics research focused read by standardized readers, but the interpretation of on applications and data hiding anti-forensics the data depends on the software running on the solutions. In this work, a set of modifications were phone. A much easier method is to let the phone run, developed and implemented on a CyanogenMod and access the data through the normal interfaces community distribution of the Android operating provided by the software. However, this presents a system. The execution of these solutions successfully high risk of data being modified, both as a normal prevented data extractions, blocked the installation of function of the phone and/or by specialized anti- forensic tools, created extraction delays and forensic applications. The savings in time and effort presented false data to industry accepted forensic gained by the utilization of normal interfaces are analysis tools without impacting normal use of the substantial enough that this technique is endorsed by device. The research contribution is an initial the Association of Chief Police Officers (ACPO) [32] empirical analysis of the viability of operating system and the American National Institute of Standards and modifications in an anti-forensics context along with Technology [24]. providing the foundation for future research. Due to this acceptance, forensic analysts rely heavily on the correct functioning of the phone's software when performing analyses. Hence, altering functionality is a way of thwarting an analysis. 1. Introduction Smartphones running operating systems such as Android and iOS are designed to allow the The increasing integration of mobile smartphones, installation of third-party applications. This has in today’s digitally dependant, highly networked, allowed for the development of applications with communication based societies creates an anti-forensic functionality [7, 12, 27]. However, these environment that is conducive to encouraging anti- applications have to work under the restrictions forensics activities. According to the International imposed by the operating system, such as application Telecommunications Union [23], at the end of 2011 isolation and responsiveness demands. If anti- there were almost six billion mobile phone forensic modifications were to be made on a lower subscriptions for a world population of seven billion. level, these restrictions would not apply in the same In the fourth quarter of 2012, 207.7 million way, possibly making more advanced methods smartphones were sold with Android capturing over available. This idea promoted research into the 50% of the operating system market [13]. hypothesis that it is possible to modify the Android Smartphones can be described as general-purpose operating system to present false information to the computers with an attached phone. As such, many forensics tools. Several subsidiary research questions people use smartphones for their daily consumption, were identified in order to explore the hypothesis: storage and communications tasks. This makes 1. Which components of the Android operating smartphones a great source of forensic evidence system do the forensics tools trust? while, simultaneously, presenting interesting analysis 2. Is it possible to modify these components to challenges. present false information? Mobile smartphones are highly integrated devices 3. Can the presence of a forensic analysis tool be that are built from non-standard components, running detected? software which is often proprietary, undocumented 4. Is it possible to make the presentation of false and frequently changed. To perform a component-by- information reversible, such that the phone will 978-1-4799-2504-9/14 $31.00 © 2014 IEEE 4828 DOI 10.1109/HICSS.2014.593 revert to presenting the real information after the Data hiding on mobile devices will implement forensic analysis? substantially similar approaches to that of personal The research contribution is an initial empirical computers like steganography, deleted files, and analysis of the viability of operating system storing data in the cloud or in other users' storage modifications in an anti-forensics context along with space. The caveat with this approach on mobile providing the foundation for future research in this devices is that recovery of deleted files depends on area. The paper is structured as follows: Section 2 the file system. Many mobile devices use a version of discusses relevant approaches to smartphone anti- Yet Another Flash File System (YAFFS) [1], which forensics. Section 3 presents the methodology, and may be unsupported in commercial forensics tools. the experimental design. Section 4 discusses the Specific for Android is the separation between implementation and results. Section 5 draws different applications enforced by the operating conclusions from the research conducted and Section system. Every application is run as its own Linux 6 presents future work. user. Standard Linux file system permissions are used to ensure that no other application can read its files. 2. Relevant Work This also applies to the applications uploaded to the phone by forensic analysis tools. This protection can only be bypassed if the phone is first rooted. If that is Recent research investigates the risk that mobile done, software can use the elevated privilege to read phones present to individual members of society [16] the entire file system. and to the business world [14]. It has also examined On a non-rooted phone, then, information can be some of the challenges these devices present to hidden by having an application store it somewhere forensic investigations [9, 17, 18, 25]. Hence, it is secluded and restore it at a later time (such as when only a matter of time before individuals, the user enters a password). This approach was tested organizations and businesses implement solutions to by Distefano et al. [12]. Their program takes data mitigate these risks through anti-forensics activities. from a number of standard databases on the phone Anti-forensics in this case is broadly defined as (e.g. contact list, call logs, and SMS messages) and “any attempts to compromise the availability or user-specified files, copies this data to files in the usefulness of evidence to the forensics process. program’s directory and deletes the originals. This Compromising evidence availability includes any approach also allows for quick mass deletion, since attempts to prevent evidence from existing, hiding the Android package manager deletes all files private existing evidence or otherwise manipulating evidence to an application if it is uninstalled. to ensure that it is no longer within reach of the They attempted to use the forensics tool Paraben investigator” [19]. While several data extraction Device Seizure [30], but found that this was options exist for mobile devices, research has incompatible with the phone they were using. highlighted the fact that not all extraction solutions Instead, they used backup programs, which require are equal nor do they necessarily provide the ability the phone to be rooted and perform a logical to validate results [15]. This can be attributed to an acquisition of the phone memory. As expected, these array of factors that include numerous mobile phone programs were able to read the private directory hardware configurations and vast numbers of devices where the data had been stored. Had the phone not in the market. Hence, the extractions that are most been rooted, the backup programs would not have likely to be implemented with higher degrees of worked [20]. success are logical and manual extractions. Distefano, et al. [12] say nothing about how their Android is a young operating system, with the data hiding program is triggered, nor when data is put first commercial device, the HTC Dream, also known back. They do, however, include test results for how as the T-Mobile G1, launched in September 2008 long it takes for the hiding process to run. This was [31]. Hence, it is expected that the Android forensics on the order of 10 seconds, depending on the amount and anti-forensics literature will not be as established of data to be hidden. This suggests that the hiding as the ones for Windows PCs. Harris [19] classifies process is action sensitive, which would be the case if anti-forensics into four groups: hiding, destruction, it was triggered by the connection or starting of a source elimination and counterfeiting. Kessler [26] forensics tool. Presumably, the data would then be also categorizes anti-forensics into similar groups manually restored by the user after regaining control which consist of data hiding, artifact wiping, trail over the phone. obfuscation, and attacks against processes and tools. 2.2 Artifact wiping 2.1 Data hiding 4829 Artifact wiping is the act of overwriting data so to make the phone act as if a user is present, thereby that it is impossible to restore, even with un-deletion
Recommended publications
  • How Applications Are Run on Android ?
    How applications are run on Android ? Jean-Loup Bogalho & Jérémy Lefaure [email protected] [email protected] Table of contents 1. Dalvik and ART 2. Executable files 3. Memory management 4. Compilation What is Dalvik ? ● Android’s Virtual Machine ● Designed to run on embedded systems ● Register-based (lower memory consumption) ● Run Dalvik Executable (.dex) files What is ART ? ● Android RunTime ● Dalvik’s successor ● ART Is Not a JVM ● Huge performance gain thanks to ahead-of-time (AOT) compilation ● Available in Android 4.4 What is ART ? Executable files Dalvik: .dex files ● Not the same bytecode as classical Java bytecode ● .class files are converted in .dex files at build time ● Optimized for minimal memory footprint Dalvik: .dex files Dalvik: application installation ● Verification: ○ bytecode check (illegal instructions, valid indices,...) ○ checksum on files ● Optimization: ○ method inlining ○ byte swapping and padding ○ static linking ART: OAT file ● Generated during installation (dex2oat) ● ELF format ● Classes metadata Memory management Zygote ● Daemon started at boot time ● Loads and initializes core libraries ● Forks to create new Dalvik instance ● Startup time of new VM is reduced ● Memory layouts are shared across processes Dalvik: memory management ● Memory is garbage collected ● Automatic management avoids programming errors ● Objects are not freed as soon as they become unused Dalvik: memory allocation ● Allocation profiling: ○ allocation count (succeeded or failed) ○ total allocated size (succeeded or failed) ● malloc
    [Show full text]
  • Android (Operating System) 1 Android (Operating System)
    Android (operating system) 1 Android (operating system) Android Home screen displayed by Samsung Nexus S with Google running Android 2.3 "Gingerbread" Company / developer Google Inc., Open Handset Alliance [1] Programmed in C (core), C++ (some third-party libraries), Java (UI) Working state Current [2] Source model Free and open source software (3.0 is currently in closed development) Initial release 21 October 2008 Latest stable release Tablets: [3] 3.0.1 (Honeycomb) Phones: [3] 2.3.3 (Gingerbread) / 24 February 2011 [4] Supported platforms ARM, MIPS, Power, x86 Kernel type Monolithic, modified Linux kernel Default user interface Graphical [5] License Apache 2.0, Linux kernel patches are under GPL v2 Official website [www.android.com www.android.com] Android is a software stack for mobile devices that includes an operating system, middleware and key applications.[6] [7] Google Inc. purchased the initial developer of the software, Android Inc., in 2005.[8] Android's mobile operating system is based on a modified version of the Linux kernel. Google and other members of the Open Handset Alliance collaborated on Android's development and release.[9] [10] The Android Open Source Project (AOSP) is tasked with the maintenance and further development of Android.[11] The Android operating system is the world's best-selling Smartphone platform.[12] [13] Android has a large community of developers writing applications ("apps") that extend the functionality of the devices. There are currently over 150,000 apps available for Android.[14] [15] Android Market is the online app store run by Google, though apps can also be downloaded from third-party sites.
    [Show full text]
  • K1 LEVEL QUESTIONS 17PMC640 ANDROID PROGRAMMING Unit:1
    K1 LEVEL QUESTIONS 17PMC640 ANDROID PROGRAMMING Unit:1 1) Dalvik Virtual Machine (DVM) actually uses core features of A. Windows B. Mac C. Linux D. Contiki 2) A type of service provided by android that allows sharing and publishing of data to other applications is A. View System B. Content Providers C. Activity Manager D. Notifications Manager 3) Android library that provides access to UI pre-built elements such as buttons, lists, views etc. is A. android.text B. android.os C. android.view D. android.webkit 4) A type of service provided by android that shows messages and alerts to user is A. Content Providers B. View System C. Notifications Manager D. Activity Manager 5) A type of service provided by android that controls application lifespan and activity pile is A. Activity Manager B. View System C. Notifications Manager D. Content Providers 6) One of application component, that manages application's background services is called A. Activities B. Broadcast Receivers C. Services D. Content Providers 7) In android studio, callback that is called when activity interaction with user is started is A. onStart B. onStop C. onResume D. onDestroy 8) Tab that can be used to do any task that can be done from DOS window is A. TODO B. messages C. terminal D. comments 9) Broadcast that includes information about battery state, level, etc. is A. android.intent.action.BATTERY_CHANGED B. android.intent.action.BATTERY_LOW C. android.intent.action.BATTERY_OKAY D. android.intent.action.CALL_BUTTON 10) OHA stands for a) Open Host Application b) Open Handset
    [Show full text]
  • Android Operating System
    Software Engineering ISSN: 2229-4007 & ISSN: 2229-4015, Volume 3, Issue 1, 2012, pp.-10-13. Available online at http://www.bioinfo.in/contents.php?id=76 ANDROID OPERATING SYSTEM NIMODIA C. AND DESHMUKH H.R. Babasaheb Naik College of Engineering, Pusad, MS, India. *Corresponding Author: Email- [email protected], [email protected] Received: February 21, 2012; Accepted: March 15, 2012 Abstract- Android is a software stack for mobile devices that includes an operating system, middleware and key applications. Android, an open source mobile device platform based on the Linux operating system. It has application Framework,enhanced graphics, integrated web browser, relational database, media support, LibWebCore web browser, wide variety of connectivity and much more applications. Android relies on Linux version 2.6 for core system services such as security, memory management, process management, network stack, and driver model. Architecture of Android consist of Applications. Linux kernel, libraries, application framework, Android Runtime. All applications are written using the Java programming language. Android mobile phone platform is going to be more secure than Apple’s iPhone or any other device in the long run. Keywords- 3G, Dalvik Virtual Machine, EGPRS, LiMo, Open Handset Alliance, SQLite, WCDMA/HSUPA Citation: Nimodia C. and Deshmukh H.R. (2012) Android Operating System. Software Engineering, ISSN: 2229-4007 & ISSN: 2229-4015, Volume 3, Issue 1, pp.-10-13. Copyright: Copyright©2012 Nimodia C. and Deshmukh H.R. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
    [Show full text]
  • Dalvik - Virtual Machine
    Review Indian Journal of Engineering, Volume 1, Number 1, November 2012 REVIEW Indian Journal of 7765 – ngineering 7757 EISSN 2319 E – ISSN 2319 Dalvik - Virtual Machine Ashish Yadav J1, Abhishek Vats J2, Aman Nagpal J3, Avinash Yadav J4 1.Department of Computer Science, Dronacharya college of Engineering, Gurgaon, India, E-mail: [email protected] 2.Department of Computer Science, Dronacharya college of Engineering, Gurgaon, India, E-mail: [email protected] 3.Department of Computer Science, Dronacharya college of Engineering, Gurgaon, India, E-mail: [email protected] 4.Department of Computer Science, Dronacharya college of Engineering, Gurgaon, India, E-mail: [email protected] Received 26 September; accepted 19 October; published online 01 November; printed 16 November 2012 ABSTRACT Android is a software stack for mobile devices that contains an operating system, middleware and key applications. Android is a software platform and operating system for mobile devices based on the Linux operating system and developed by Google and the Open Handset Alliance. It allows developers to Write handle code in a Java-like language that utilizes Google-developed Java libraries, but does not support programs developed in native code. The presentation of the Android platform on 5 November 2007 was announced with the founding of the Open Handset Alliance, a consortium of 34 hardware, software and telecom companies devoted to advancing open standards for mobile devices. When released in 2008, most of the Android platform will be made obtainable under the Apache free-software and open-source license. Open Android provide the permission to access core mobile device functionality through standard API calls.
    [Show full text]
  • Android-X86 Project Marshmallow Porting
    Android-x86 Project Marshmallow Porting https://drive.google.com/open?id=1mND8K-AXbMMl8- wOTe75NOpM0xOcJbVy8UorryHOWsY 黃志偉 [email protected] 2015/11/28 http://www.android-x86.org Agenda ●Introduction: what, why, how? ●History and milestones ●Current status ●Porting procedure ●Develop android-x86 ●Future plans android-x86.org About Me ●A free software and open source amateur and promoter from Taiwan ■ CLDP / CLE ■ GNU Gatekeeper ■ Android-x86 Open Source Project ●https://zh.wikipedia.org/wiki/Cwhuang android-x86.org Introduction ●What's Android-x86? ●Why needs Android-x86? ●How can we do it? android-x86.org What's Android-x86 ? ●An open source project aimed to provide a complete solution for Android on x86 devices ●Android BSP (Board support Package) for x86 platform ●At first we use ASUS Eee PC and Virtualbox as the reference platform. ●Some vendors donate tablets, like Tegatech Tegav2, 4tiitoo AG WeTab and AMD android-x86.org Why needs Android-x86? ●Android is an open source operating-system originally designed for arm platform ●It's open source, we can port it to other platforms, like mips, PowerPC and x86 ●AOSP officially supports x86 now ● AOSP doesn’t have specific hardware components ● Still a lot of work to do to make it run on a real device android-x86.org But what are the benefits? ●Understanding Android porting process ●The x86 platform is widely available ●A test platform much faster than SDK emulator ●Android-x86 on vbox / vmware ●Suitable for tablet apps android-x86.org Android architecture android-x86.org How to do that? ●Toolchains – already in AOSP, but old..
    [Show full text]
  • Dexmedetomidine Mitigates LPS-Induced Acute Lung Injury in Rats Through HMGB1-Mediated Anti- Inflammatory and Antioxidant Mechanisms
    Revista Argentina de Clínica Psicológica 2020, Vol. XXIX, N°4, 377-383 377 DOI: 10.24205/03276716.2020.837 Dexmedetomidine Mitigates LPS-Induced Acute Lung Injury in Rats Through HMGB1-Mediated Anti- Inflammatory and Antioxidant Mechanisms Ning Lva*,XiaoYun Lib ABSTRACT Purpose: To investigate the effect of dexmedetomidine on lipopolysaccharide (LPS)- induced acute lung injury in rats, and the underlying mechanism. Methods: Healthy male SD rats (n=54) were randomly divided into three groups: normal, model and dexmedetomidine groups, with 18 rats in each group. Rats in the model and dexmedetomidine groups were given LPS at a dose of 8 mg/kg, to establish a model of acute lung injury. Rats in the dexmedetomidine group were injected intraperitoneallywith dexmedetomidine at a dose of 50 μg/kg prior to establishment of the model, while rats in the normal group received intraperitoneal injection of normal saline in place of dexmedetomidine. Hematoxylin and eosin (H&E) staining was used to observe changes in lung tissue in each group.Changes in wet/dry weight ratio of lung tissue were compared among the groups. Enzyme-linked immunosorbent assay was used to determine the expressions of inflammation indices i.e. interleukin-6 (IL-6), tumor necrosis factor-α (TNF- α), and interleukin-1β (L-1β)] in lung tissue. Levels of MDA were measured with thiobarbituric acid method. Superoxide dismutase (SOD) activity was assayed through enzyme rate method, while nitric oxide was measured using nitrate reductase assay.The expression levels of high mobility group protein B1 (HMGB1), p-PI3K, p-Akt, p-IκB, p-NF- κB, and Toll-like receptor 4 (TLR4) in lung tissue were determined with Western blotting.
    [Show full text]
  • 2019 China Military Power Report
    OFFICE OF THE SECRETARY OF DEFENSE Annual Report to Congress: Military and Security Developments Involving the People’s Republic of China ANNUAL REPORT TO CONGRESS Military and Security Developments Involving the People’s Republic of China 2019 Office of the Secretary of Defense Preparation of this report cost the Department of Defense a total of approximately $181,000 in Fiscal Years 2018-2019. This includes $12,000 in expenses and $169,000 in DoD labor. Generated on 2019May02 RefID: E-1F4B924 OFFICE OF THE SECRETARY OF DEFENSE Annual Report to Congress: Military and Security Developments Involving the People’s Republic of China OFFICE OF THE SECRETARY OF DEFENSE Annual Report to Congress: Military and Security Developments Involving the People’s Republic of China Annual Report to Congress: Military and Security Developments Involving the People’s Republic of China 2019 A Report to Congress Pursuant to the National Defense Authorization Act for Fiscal Year 2000, as Amended Section 1260, “Annual Report on Military and Security Developments Involving the People’s Republic of China,” of the National Defense Authorization Act for Fiscal Year 2019, Public Law 115-232, which amends the National Defense Authorization Act for Fiscal Year 2000, Section 1202, Public Law 106-65, provides that the Secretary of Defense shall submit a report “in both classified and unclassified form, on military and security developments involving the People’s Republic of China. The report shall address the current and probable future course of military-technological development of the People’s Liberation Army and the tenets and probable development of Chinese security strategy and military strategy, and of the military organizations and operational concepts supporting such development over the next 20 years.
    [Show full text]
  • Ah! Universal Android Rooting Is Back
    AH! UNIVERSAL ANDROID ROOTING IS BACK Wen `Memeda` Xu @K33nTeam ABOUT ME Wen Xu a.k.a Memeda @antlr7 • Security research intern at KeenTeam • Android Roo6ng • Soware exploita6on • Senior student at Shanghai Jiao Tong University • Member of LoCCS • Vice-captain of CTF team 0ops • Rank 2rd in the world on CTFTIME AGENDA • Present Situa6on of Android Roo6ng • Awesome Bug (CVE-2015-3636) • Fuzzing • Analysis • Awesome Exploita6on Techniques • Object Re-filling in kernel UAF • Kernel Code Execu@on • Targe@ng 64bit Devices • Future PART I Present Situation PRESENT SITUATION Root for what? • Goal • uid=0(root) gid=0(root) groups=0(root) • Kernel arbitrary read/write • Cleaning • SELinux • … PRESENT SITUATION • SoC (Driver) • Missing argument sani6Za6on (ioctl/mmap) • Qualcomm camera drivers bug CVE-2014-4321, CVE-2014-4324 CVE-2014-0975, CVE-2014-0976 • TOCTTOU • Direct dereference in user space CVE-2014-8299 • Chip by chip A BIG DEAL • Universal root soluon • Universally applied bug • Confronng Linux kernel • Universally applied exploita6on techniques • One exploit for hundreds of thousands of devices • Adaptability (Hardcode) • User-friendly (Stability) • COMING BACK AGAIN! PART II Bug Hunting FUZZING Open source kernel syscall fuzzer • Trinity • hps://github.com/kernelslacker/trinity • Scalability • Ported to ARM Linux FUZZING Let’s take a look at our log when we wake up ;) • Crical paging fault at 0x200200?!! SK: PING SOCKET OBJECT IN KERNEL user_sock_fd = socket(AF_INET, SOCK_DGRAM, IPPROTO_ICMP); 2 3 1 LIST_POISON2 == 0X200200 ping_unhash
    [Show full text]
  • Download Android Os for Phone Open Source Mobile OS Alternatives to Android
    download android os for phone Open Source Mobile OS Alternatives To Android. It’s no exaggeration to say that open source operating systems rule the world of mobile devices. Android is still an open-source project, after all. But, due to the bundle of proprietary software that comes along with Android on consumer devices, many people don’t consider it an open source operating system. So, what are the alternatives to Android? iOS? Maybe, but I am primarily interested in open-source alternatives to Android. I am going to list not one, not two, but several alternatives, Linux-based mobile OSes . Top Open Source alternatives to Android (and iOS) Let’s see what open source mobile operating systems are available. Just to mention, the list is not in any hierarchical or chronological order . 1. Plasma Mobile. A few years back, KDE announced its open source mobile OS, Plasma Mobile. Plasma Mobile is the mobile version of the desktop Plasma user interface, and aims to provide convergence for KDE users. It is being actively developed, and you can even find PinePhone running on Manjaro ARM while using KDE Plasma Mobile UI if you want to get your hands on a smartphone. 2. postmarketOS. PostmarketOS (pmOS for short) is a touch-optimized, pre-configured Alpine Linux with its own packages, which can be installed on smartphones. The idea is to enable a 10-year life cycle for smartphones. You probably already know that, after a few years, Android and iOS stop providing updates for older smartphones. At the same time, you can run Linux on older computers easily.
    [Show full text]
  • Mobile Code Anti-Reversing Scheme Based on Bytecode Trapping in ART
    sensors Article Mobile Code Anti-Reversing Scheme Based on Bytecode Trapping in ART Geonbae Na 1, Jongsu Lim 1, Sunjun Lee 2 and Jeong Hyun Yi 2,* 1 School of Computer Science and Engineering, Soongsil University, Seoul 06978, Korea; [email protected] (G.N.); [email protected] (J.L.) 2 School of Software, Soongsil University, Seoul 06978, Korea; [email protected] * Correspondence: [email protected] Received: 31 March 2019; Accepted: 6 June 2019; Published: 10 June 2019 Abstract: As interest in Internet of Things environments rapidly increases throughout the IT convergence field, compatibility with mobile devices must be provided to enable personalized services. The security of mobile platforms and applications is critical because security vulnerabilities of mobile devices can be spread to all things in these environments. Android, the leading open mobile platform, has long used the Dalvik virtual machine as its runtime system. However, it has recently been completely replaced by a new runtime system, namely Android Runtime (ART). The change from Android’s Dalvik to ART means that the existing Dalvik bytecode-based application execution structure has been changed to a machine code-based application execution structure. Consequently, a detailed understanding of ART, such as new file formats and execution switching methods between codes, is required from the viewpoint of application security. In this paper, we demonstrate that an existing Dalvik-based application vulnerability can be exploited as-is in ART. This is because existing Dalvik executable files coexist in the ART executable file, and these Dalvik bytecodes and compiled machine codes have one-to-one mapping relationships.
    [Show full text]
  • Crdroid 3.10.54 Crdroid 3.10.54 * Br Photos and Great Condition That Affects Men Ranked 5 of 18 Archways Prize Wheels
    Crdroid 3.10.54 Crdroid 3.10.54 * Br photos and great condition that affects men ranked 5 of 18 archways prize wheels. Gif beat ladbrokes roulettestrong at lowes. about B2b massage at shah alam2b massage at shah alam Binweevil hangman words Daughter incest.tumblr Speedway gp programme Crdroid 3.10.54 Cheating captions tumblr Menu - Baca komik bleach lengkap bahasa indonesia Maynards wife lei liaynards wife Crdroid 3.10.54. So now introducing our new rom.which is based on lp Friends links What is skypepm ezlog, Sissy kernel ( 3.10.54 ) mt6582 based cm rom which name is Tesla os Previous drawings prim, Wild things foursome post i have given u crDroid rom. Techzbyte is a blog about How to's, Tech full movie worldfree4u.trade, Download anime kindaichi shounen News, Apps, Education, Stock & Custom Roms, Custom recovery, Games no jikenbo tv sub indo and Internet freebies for Smartphones. 22-11-2016 · Hi friends .. introducing our new rom for mmx fire 4. crDroid Rom Based on lp kernel bloggers 3.10.54 Mt 6582 .. Based on cm (5.1) FEATURES : CyanogenMod theme. Hcpcs code for restylane Isabelle blais nue video [ROM][MT6582][LP][ 3.10.54 +] PACMAN V2 FOR GIONEE M3 Many of Trinh hoi s second wife mai thy you might not be aware of PACMan ROM. As the image shows, its a combinati. CRDROID OS-LP-MT6582- 3.10.54 + FOR MMX Q340 BY MANJUNATH YASHU FEATURES CyanogenMod theme supervisor; Power menu customizations; Nav bar tweaks (on/off toggle and. CRDROID OS-LP-MT6582- 3.10.54 + FOR MMX Q340 BY MANJUNATH YASHU CRDROID OS-LP-MT6582- 3.10.54 + FOR MMX Q340 BY MANJUNATH YASHU FEATURES CyanogenMod theme manager; Power.
    [Show full text]