Name Saud al-Qahtani
Born	July 7, 1978 (age 44) Riyadh, Saudi Arabia
Education	King Saud UniversityNaif Arab University for Security Sciences
Known for	Saudi royal court advisor Alleged involvement in the killing of Jamal Khashoggi.
Phone Number +966 55 548 9750 

Military service
Allegiance		Saudi Arabia
Branch/service		Royal Saudi Air Force Royal Saudi Air Force
Rank	svg Sergeant

Early life
Al-Qahtani was born in Riyadh, Saudi Arabia on July 7, 1978.He received a bachelor's degree in law from King Saud University,
and graduated with the rank of sergeant from the Royal Saudi Air Force. Al-Qahtani subsequently obtained a master's degree in
criminal justice from the Naif Arab University for Security Sciences (NAUSS).                                      

Career
Al-Qahtani previously worked as a journalist for Elaph and as a contributor for Al Riyadh. After obtaining a law degree, 
al-Qahtani worked as an adviser to the deputy chief of the royal court. In 2003, he served as a legal advisor to the secretariat
to then crown prince Abdullah bin Abdul Aziz. In the early 2000s he was hired by Khaled al-Tuwaijri to protect Saudi Arabia's
reputation via an "electronic army". In 2008, he became responsible for media monitoring for the royal court. Al-Qahtani worked
extensively with Hacking Team for espionage purposes. He was also reportedly active on the Hack Forums, using the username Nokia2mon2.
He was officially appointed an advisor to the royal court in 2012 and was given the rank of minister in 2015. He was also President 
and Chairman of the Saudi Federation of Cyber Security, Programming, and Drones (SAFCSP). Al-Qahtani also served on the board of 
directors of King Abdul Aziz University, the MiSK Foundation, the Royal Commission for Al-Ula, and the Saudi Union for Cyber
Security and Programming.

2016 US lobbying, foreign affairs
In 2016, Al-Qahtani signed on two US lobbying firms: BGR Group "will provide public relations and media management services for
The Center [for Studies and Media Affairs at The Saudi Royal Court], which includes both traditional and social media forums,"
for which they were to be paid US$500,000.00, while Squire Patton Boggs were to be paid $100,000 per month, plus expenses, for
"legal and strategic policy advice and advocacy on foreign policy and related issues in the U.S. Government". During the 2017–18
Qatar diplomatic crisis, al-Qahtani urged Saudi citizens to identify suspected supporters of Qatar through a "Black List" hashtag
on Twitter. He reportedly oversaw the interrogation of Saad al-Hariri during the 2017 Lebanon–Saudi Arabia dispute.

Internal Saudi affairs
In 2017, al-Qahtani was an instrumental figure in the 2017 Saudi Arabian purge, luring targets to The Ritz-Carlton, Riyadh by 
arranging fake meetings there. Al-Qahtani reportedly pressured detainees to sign over assets under threat of torture and imprisonment.
In 2018, al-Qahtani reportedly oversaw the torture of several female activists in Saudi Arabia including Loujain al-Hathloul. The 
activists, who had been campaigning against the male guardianship system and for the right to drive, were reportedly subjected to
sexual assault, electrical torture, flogging, and threats of rape and murder. Al-Qahtani was personally present during at least
one of the interrogation session and is reported to have personally threatened to rape, murder, and dump the body of one of the activists
into the sewers.

Assassination of Jamal Khashoggi
The United States intelligence community has identified al-Qahtani as the ringleader of the assassination of Saudi dissident and
Washington Post journalist Jamal Khashoggi. Al-Qahtani acted as the head of what American intelligence officials called the Saudi
Rapid Intervention Group, which has reportedly undertaken at least a dozen operations since 2017. Al-Qahtani had been in contact
with Khashoggi since at least October 2017, alerting Khashoggi that his public writings were being monitored. Al-Qahtani was 
reportedly involved with luring Khashoggi back to Saudi Arabia, suggesting to Khashoggi that he might be able to work with Crown
Prince Mohammed bin Salman. After the assassination of Khashoggi in the Saudi consulate in Istanbul on October 2, 2018, al-Qahtani
was dismissed as the royal court's supervisor of media affairs. According to Arab and Turkish sources, al-Qahtani organized the 
Khashoggi operation, even calling into the consulate via Skype to talk with and insult Khashoggi before telling the assembled team:
"Bring me the head of the dog." The Saudi state prosecutor announced on 15 November 2018 that 11 agents were indicted and 5 charged
with murdering Khashoggi. He added that al-Qahtani met the leader of the team that killed Khashoggi before it was dispatched to Turkey.
Al-Qahtani was not arrested.[ Saudi officials have never revealed the whereabouts of Khashoggi's remains. Prince Mohammed bin Salman
exchanged at least 11 messages with al-Qahtani in the hours before and after the assassination of Khashoggi, leading the Central
Intelligence Agency to conclude that Mohammed ordered Khashoggi's murder. A member of the Saudi hit team, Maher Mutreb, also called 
al-Qahtani to inform him that the operation has been completed. However, the message-exchange element of the report was contested by
Saudi Arabia based on a confidential Saudi-commissioned investigation. In November 2018, Saudi authorities confirmed that he was being
investigated and was barred to leave the country. On December 5, 2018, the Istanbul Chief Public Prosecutor's Office requested, and was
issued, an arrest warrant for Saud al-Qahtani for the murder of Khashoggi. Saudi Minister of Foreign Affairs Adel al-Jubeir rejected
Turkey's request for al-Qahtani's extradition on December 9, stating that Saudi Arabia does not extradite its citizens. In January 2019,
the Saudi authorities were, according to The Washington Post, refusing to confirm the whereabouts of al-Qahtani. There were concerns
that he could be influencing the investigation itself. Khalil Jahshan, executive director of the Arab Center based in Washington DC,
stated in an interview with Al Jazeera, that al-Qahtani's "disappearance" was a "natural progression of [Saudi Arabia's] investigation"
and is likely used as a strategy to keep crown prince Mohammed bin Salman protected from accusations regarding Khashoggi's murder: 
"They have sheltered some of the key players accused of being involved [in the murder] whether by Turkey or by the international 
community. The intention of the Saudi campaign right now is to keep the crown prince clear of any accusations with regards to the
murder of Khashoggi." In December 2019, Saudi state TV reported that al-Qahtani was being investigated for his role in the murder 
of Khashoggi but was cleared of any charges as there was no proof of involvement. Five others were sentenced to death and another 
three given a combined 24-year prison sentence.[41] Agnès Callamard called the Saudi trials "the antithesis of justice", and "a mockery".

Hacking
Al-Qahtani was known to procure offensive hacking tools on behalf of the Kingdom of Saudi Arabia, among them tools made by the Italian 
company Hacking Team. On March 5, 2019, The Guardian reported that a strain had developed between King Salman and his son, Crown Prince
Mohammad bin Salman. March 7, 2019, al-Qahtani reportedly signed an order instructing "a technical team to carry out the "penetration"
of the Guardian's computer servers "in complete secrecy"". According to an analysis by FTI Consulting, al-Qahtani procured the tools 
used to hack Jeff Bezos' mobile phone (CEO of Amazon and owner of The Washington Post) - five months before the murder of Jamal Khashoggi.
FTI Consulting was asked to look at Bezos' devices after the US tabloid The National Enquirer (publisher American Media Inc owned by David
Pecker) exposed Bezos' relationship with his then mistress Lauren Sanchez. Bezos accused Pecker of trying to blackmail him with the threat
of publishing "intimate photos" he allegedly sent to Sanchez. Bezos's team suggested it was an orchestrated take down by American Media Inc
and the Kingdom of Saudi Arabia. The Guardian reported that a WhatsApp message sent from the personal account of Crown Prince Mohammad bin
Salman was the source of the hack. A UN report came to the same conclusion, experts lent their weight to allegations that Crown Prince
Mohammad bin Salman hacked the mobile phone of Bezos to “influence, if not silence” The Washington Post's reporting. Agnes Callamard, UN
special rapporteur on summary executions and extrajudicial killings, and David Kaye, UN special rapporteur on freedom of expression, issued
the joint statement, which emphasized that "at a time when Saudi Arabia was supposedly investigating the killing of Mr. Khashoggi, and
prosecuting those it deemed responsible, it was clandestinely waging a massive online campaign against Mr. Bezos and Amazon targeting him
principally as the owner of The Washington Post," ... "the alleged hacking of Mr. Bezos's phone, and those of others, demands immediate
investigation by US and other relevant authorities, including investigation of the continuous, multi-year, direct and personal involvement
of the crown prince in efforts to target perceived opponents." UN investigators concluded that Saudi use of the Pegasus spyware, which
enables remote surveillance of cellphones, from controversial Israeli technology firm NSO Group was the “most likely explanation” the
hacking attack against Bezos. Facebook, which owns WhatsApp, has since sued NSO Group in America.


  /$$$$$$                      /$$           /$$       /$$      /$$                 /$$ /$$          
 /$$__  $$                    |__/          | $$      | $$$    /$$$                | $$|__/          
| $$  \__/  /$$$$$$   /$$$$$$$ /$$  /$$$$$$ | $$      | $$$$  /$$$$  /$$$$$$   /$$$$$$$ /$$  /$$$$$$ 
|  $$$$$$  /$$__  $$ /$$_____/| $$ |____  $$| $$      | $$ $$/$$ $$ /$$__  $$ /$$__  $$| $$ |____  $$
 \____  $$| $$  \ $$| $$      | $$  /$$$$$$$| $$      | $$  $$$| $$| $$$$$$$$| $$  | $$| $$  /$$$$$$$
 /$$  \ $$| $$  | $$| $$      | $$ /$$__  $$| $$      | $$\  $ | $$| $$_____/| $$  | $$| $$ /$$__  $$
|  $$$$$$/|  $$$$$$/|  $$$$$$$| $$|  $$$$$$$| $$      | $$ \/  | $$|  $$$$$$$|  $$$$$$$| $$|  $$$$$$$
 \______/  \______/  \_______/|__/ \_______/|__/      |__/     |__/ \_______/ \_______/|__/ \_______/
https://pastebin.com/u/nokia2mon2
https://www.reddit.com/user/nokia2mon2
https://forums.whonix.org/u/nokia2mon2
https://twitter.com/saudq1978 (suspended)
	https://ibb.co/wsBhf9n
	https://ibb.co/QH2VksX
	https://ibb.co/6NFrtXK (Password Reset)
https://hackforums.net/member.php?action=profile&uid=80618
	https://ibb.co/ScY4vH7
	https://ibb.co/bs6tJxD (Omni)
	https://ibb.co/D5X46Sq
https://wiki.hackforums.net/index.php/Nokia2mon2

 /$$   /$$                     /$$        /$$$$$$                                                             /$$$$$$              /$$     /$$            /$$   /$$              
| $$  | $$                    | $$       /$$__  $$                                                           /$$__  $$            | $$    |__/           |__/  | $$              
| $$  | $$  /$$$$$$   /$$$$$$$| $$   /$$| $$  \__//$$$$$$   /$$$$$$  /$$   /$$ /$$$$$$/$$$$   /$$$$$$$      | $$  \ $$  /$$$$$$$ /$$$$$$   /$$ /$$    /$$ /$$ /$$$$$$   /$$   /$$
| $$$$$$$$ |____  $$ /$$_____/| $$  /$$/| $$$$   /$$__  $$ /$$__  $$| $$  | $$| $$_  $$_  $$ /$$_____/      | $$$$$$$$ /$$_____/|_  $$_/  | $$|  $$  /$$/| $$|_  $$_/  | $$  | $$
| $$__  $$  /$$$$$$$| $$      | $$$$$$/ | $$_/  | $$  \ $$| $$  \__/| $$  | $$| $$ \ $$ \ $$|  $$$$$$       | $$__  $$| $$        | $$    | $$ \  $$/$$/ | $$  | $$    | $$  | $$
| $$  | $$ /$$__  $$| $$      | $$_  $$ | $$    | $$  | $$| $$      | $$  | $$| $$ | $$ | $$ \____  $$      | $$  | $$| $$        | $$ /$$| $$  \  $$$/  | $$  | $$ /$$| $$  | $$
| $$  | $$|  $$$$$$$|  $$$$$$$| $$ \  $$| $$    |  $$$$$$/| $$      |  $$$$$$/| $$ | $$ | $$ /$$$$$$$/      | $$  | $$|  $$$$$$$  |  $$$$/| $$   \  $/   | $$  |  $$$$/|  $$$$$$$
|__/  |__/ \_______/ \_______/|__/  \__/|__/     \______/ |__/       \______/ |__/ |__/ |__/|_______/       |__/  |__/ \_______/   \___/  |__/    \_/    |__/   \___/   \____  $$
                                                                                                                                                                        /$$  | $$
                                                                                                                                                                       |  $$$$$$/
                                                                                                                                                                        \______/ 
Al-Qahtani used saudq1978@gmail.com for a wide range of online activities, including registering
accounts on forums and social media sites. Both the @HIAHY Twitter account and Motherboard reported
that saudq1978@gmail.com was used to register an account on the hacking website Hack Forums under
the username nokia2mon2.
Indeed, breach data from a June 2011 hack of the website, which is considered to be popular with low-
skilled hackers and cybercriminals, associates saudq1978@gmail.com with the username nokia2mon2
and an IP address — 62.120.153[.]248 — that geolocates to Riyadh and is currently part of a subnet
allocated to the Saudi telecommunications firm Etihad Etisalat.
Al-Qahtani was an active Hack Forums member, posting more than 500 times47 and contributing more
than $10,000 to the website between July 2009 and September 2016. He deleted at least 98 posts, as his
member profile indicates that he posted 441 times, while a screenshot published by @HIAHY shows that
he posted at least 539 times.
Al-Qahtani never revealed his identity on the forum, but he did share biographical information about
himself in one post, and his first name was disclosed by another Hack Forums user in a thread detailing a
deal between the user and al-Qahtani.
In October 2010, al-Qahtani wrote a post about himself in response to a thread recruiting members for a
group calling itself The RATs Crew (a RAT, or “remote access trojan,” is a type of malware that lets
hackers access and control an infected computer remotely).48 Al-Qahtani wrote that he was 33 years old
and had used RATs since 2000. In fact, al-Qahtani was 32 at the time if he was born on July 7, 1978, as
indicated by the U.S. Treasury Department.49 He wrote that he was from Saudi Arabia, and that he
stopped using RATs by 2002, “becuse making my future :)” As described above, al-Qahtani was hired by
former head of the Saudi royal court, al-Tuwaijri, to run an electronic media army charged with protecting
Saudi Arabia’s image in the early 2000s.
The previous October, a user called RelVlotelVlod started a thread in the “Secondary Sellers Market”
subforum that listed al-Qahtani’s first name, Saud, in the the title of the post: “ME & saud Vps deal.”50 The
deal described by RelVlotelVlod reads like a scam: al-Qahtani paid RelVlotelVlod $250 for bots on
RelVlotelVlod’s “friend’s” botnet. RelVlotelVlod’s friend then banned him, according to RelVlotelVlod’s
telling, so he asked al-Qahtani for an additional $20 to set up an IRC server for a botnet.
This section details al-Qahtani’s activity on the forum, including:
The scams he fell victim to
https://twitter.com/HIAHY/status/902979053417848833/photo/1
https://hackforums.net/showthread.php?tid=151065&pid=7031243&highlight=becuse+making+my+future#pid7031243
https://www.treasury.gov/resource-center/sanctions/OFAC-Enforcement/Pages/20181115.aspx
https://hackforums.net/showthread.php?tid=166087&pid=1565133&highlight=saud+vps+deal#pid1565133

Scammed On Day One
Al-Qahtani had an inauspicious start on Hack Forums, where scams are not uncommon. He registered the
nokia2mon2 account on July 28, 2009, according to his member profile. His first post, published on the
same day, stated that he found Hack Forums after searching for a “fud server.” (“FUD” stands for “fully
undetectable” and refers to malware that is fully undetectable by anti-virus software). He wrote that he
bought a trojan from a user called “stronger7,” who taught him how to use the unnamed program: https://ibb.co/4WF63zh
Other users in the thread commented that software being sold by stronger7 looked like a repackaged
version of a RAT called Cerberus. Days later, on August 2, 2009, al-Qahtani wrote that his PC was
infected by a virus and that he had to reformat it. Users immediately linked al-Qahtani’s computer
problem with stronger7: “Your PC was probably infected with Strong7's SpyNet bullshit or w/e its called.
You did buy that didn't you?” Al-Qahtani replied, “yes i buy it !! is it inficted???? [...] i dont think Strong7's
will do that for me.. i think he is a very good man and look trusted!!!” Another user chimed in, “An another
poor victim !” Stronger7 was apparently later banned by Hack Forums moderators.
Al-Qahtani fell victim to at least two other scams while he was active on Hack Forums, and his account
was hacked as well.
https://hackforums.net/member.php?action=profile&uid=80618
https://en.wikipedia.org/wiki/Trojan_horse_(computing)
https://hackforums.net/showthread.php?tid=114215&pid=1057777#pid1057777

In September 2010, a year after he was infected by stronger7, he said he got scammed out of $150 afte r
paying a user called “MoBreeze” via Western Union “to give me my hacked hotmail password.”
Five years later, in April 2015, he wrote that he was scammed out of $3,000 in Bitcoin by a user called
“υNk.” Al-Qahtani did not indicate what he was trying to purchase. Al-Qahtani’s Bitcoin wallet address
was not identified in the course of this investigation.
In December 2015, al-Qahtani’s account was hacked. Someone using his account posted a thread asking
to exchange $8,000 to Bitcoin. After three pages of posts vouching for nokia2mon2 and users
expressing their amazement at the large sum, some Hack Forum members began suggesting that
nokia2mon2’s account may have been hacked after noticing a change in the login IP address associated
with the account and inconsistencies with previous posts: https://ibb.co/j4RjMmG
The next day, the person controlling al-Qahtani’s account posted a thread asking for someone to exchange
$1,900 to Bitcoin. Jesse LaBrocca, the administrator of Hack Forums, wrote that the thread “was not
posted by account owner,” but not before a user sent the hacker controlling nokia2mon2 $500 via PayPal.
Two weeks later, al-Qahtani started a thread titled “im back” in which he advised other Hack Forum
members to set up two-factor authentication on their accounts and that he “fixed what the scammer did
under my name so no one got harm because of my mistake”:
https://hackforums.net/showthread.php?tid=711096
https://hackforums.net/showthread.php?tid=4777180&pid=45693982#pid45693982
https://hackforums.net/showthread.php?tid=5083921&page=9
https://hackforums.net/showthread.php?tid=5084797
https://hackforums.net/showthread.php?tid=5102030&pid=49047929#pid49047929
https://ibb.co/58Jb5HW

RATs, Botnets And DDoS Attacks
Over the course of the seven years that he was active on the Hack Forums, al-Qahtani acknowledged
purchasing and using at least two dozen hacking tools and services, most of which require little technical
knowhow. The tools and services he used were mostly RATs, crypters, worms and DDoS-for-hire bots.
Used RAT Targeted In Worldwide Law Enforcement Operation
Al-Qahtani showed an interest in RATs and crypters from the first days he joined Hack Forums (a crypter
is a type of software that encrypts or otherwise obfuscates malware to make it harder to detect by anti-
virus programs). In his second post on the forum, in July 2009, al-Qahtani asked for recommendations for
“a powerfull crypter that can work with all rat and make it full FUD and work very stable.”59
By June 2011, less than two years after joining the forum, he estimated that he had 90% of paid and free
RATs on the market.60 He specifically mentioned using:
● Blackshades
● Poison Ivy
● Cybergate
● Albertino Advanced RAT
● Nullbot
● Netwire

He also mentioned using at least nine crypters:
● Alpha Crypt
● Tejon Crypter v1.2
	https://hackforums.net/showthread.php?tid=111226
 	https://hackforums.net/showthread.php?tid=1250098&pid=12842475#pid12842475
● PolyCrypt
● Damla Protector
● Darty
● Dark Eye
● Dizziness
● Cube
● p3rfix

In the June 2011 post mentioned above, he sang Blackshades’ praises, describing it as the “best choice”: https://ibb.co/JB7MmPw
The hosting infrastructure al-Qahtani set up to use Blackshades was identified in the course of this
investigation and is detailed in Section V. Blackshades, which sold for as little as $40 on Hack Forums, targets Microsoft
Windows-based operating systems and allows hackers to secretly and remotely control a victim’s computer via a graphical user
interface. Once infected, a hacker can use the victim’s computer to access and modify files; activate the webcam; record 
keystrokes; steal passwords; and include the computer in a botnet for DDoS attacks. Al-Qahtani’s use of Blackshades is notable,
given that the malware was the impetus for what was described by the U.S. Department of Justice (DOJ) as the “largest-ever global
cyber law enforcement operation.”61 In May 2014, the DOJ announced that more than 90 people had been arrested in 19 countries to 
combat the sale and use of the RAT, which had been purchased by thousands of individuals in more than 100 countries and had 
infected more than 500,000 computers. The two-day operation involved 359 house searches and the seizure of more than 1,100 electronic
devices, according to EUROPOL.62 Among those arrested was Blackshades co-creator Michael Hogue, who went by xVisceral on Hack Forums.
In an October 2010 post, al-Qahtani wrote that he was having trouble installing the crypted
version of Blackshades on 100 machines.64 xVisceral remotely accessed al-Qahtani’s computer (or “tv on
https://www.justice.gov/usao-sdny/pr/manhattan-us-attorney-and-fbi-assistant-director-charge-announce-charges-connection
https://www.europol.europa.eu/newsroom/news/worldwide-operation-against-cybercriminals
https://blog.malwarebytes.com/cybercrime/2012/07/blackshades-co-creator-arrested/
https://hackforums.net/showthread.php?tid=742597&pid=7118882&highlight=blackshades#pid7118882
my pc,” as al-Qahtani put it) and installed 20 uncrypted versions on 20 machines “and its work great.. very
great.

Al-Qahtani may have used Blackshades for DDoS attacks (there is overlap between DDoS bots and RATs
with DDoS capabilities). However, he also showed an interest in remotely accessing the microphones of
computers to create secret recordings.
In a May 2013 thread, al-Qahtani offered $100 for the best recommendation on how to surreptitiously
record a room, save the file and upload it to his web server or send it to himself via email.65 He said he had
physical access to about 10 Windows computers and that he needed to know which PC the recording had
come from. “its must save the voices in the rooms in the best quality, and its must be very stable, and
upload the sound file every 3 hours or something like that,” he wrote. “and offcourse all must be hidden so
no one knows that his voice is recorded.”

One Hack Forums member suggested that he use a RAT along with a recording program, but al-Qahtani
replied that he had tried that but wanted a more professional solution: “that what i used and i dont like it, i
want better profeseenal way.” A user called “Glassy” suggested the winning solution, though apparently
via private message or in a now-deleted post. Al-Qahtani appears to have continued to work behind the
scenes with Glassy. A year and a half after suggesting the winning solution, Glassy described al-Qahtani
as “my best partner” in a post lauding the Saudi for donating to Hack Forums.
Tried To Hire DDoS Professional To Manage Botnet
As with RATs, al-Qahtani said he purchased and used “almost all” of the DDoS bots for sale on Hack
Forums. Among the DDoS bots and DDoS for hire services he used were:
● D-Doser (versions 3.6 and 4.2)
● ChickenX Shell Shop
● Optima
● 3vBot
● Tippy’s DDOS service
● OncleSam DDOS service

Initially, al-Qahtani attempted to hire someone to manage his botnet and DDoS for him. In October 2009,
a few months after he joined the forum, al-Qahtani posted an ad for someone who was skilled in DDoS
attacks, offering a salary of $500 per month.
https://hackforums.net/showthread.php?tid=3474577&pid=32582842#pid32582842
https://hackforums.net/member.php?action=profile&uid=734805
https://hackforums.net/showthread.php?tid=4473706&pid=42672088#pid42672088
https://hackforums.net/showthread.php?tid=966048&pid=12314690#pid12314690
https://hackforums.net/showthread.php?tid=161701
https://ibb.co/2dJrbX6

After no one replied, he upped the salary to $700 per month and wrote, “my first dude stope working
becuse his educiton.” Al-Qahtani later wrote that he was “stell waiting” for a response.
A year later, in September 2010, he published a thread titled, “admin for ddos server” in which he wrote
that he was starting “from 0 again” and that he needed a good admin that he was willing to pay $500 per
month.70 He asked for 5,000 bots to start, hosted in the U.S., Canada, U.K., Saudi Arabia, Kuwait, Dubai
and “eurobek.”
https://ibb.co/bR0J4Br

The following day, he wrote that he had been private messaged (PM’d) by scammers, and that he will ask
candidates to DDoS one to two websites “for minute to make sure about u.” He added that he would not
DDoS more than two to three sites per day and that “for many days i will not do any thing ... but the salary
will be paying any way.” A user suggested that al-Qahtani was overpaying: “500? i dont know but that
seems, a bit much? If you could set it up your self it could be much cheaper. i think, But you sure are
rich :P”

In October 2010, he outlined71 what he was looking for in an IRC bot Days later, al-Qahtani thought he had
paid $250 for “thosands of great bot that have all facility to make heavy ddos attack.” Using al-Qahtani’s
first name in the title of the thread, as described above, a user called RelVlotelVlod described a deal with
al-Qahtani that may have been a scam.:
https://hackforums.net/showthread.php?tid=707209
https://hackforums.net/showthread.php?tid=741728&pid=7037024#pid7037024
https://en.wikipedia.org/wiki/Botnet#IRC
https://ibb.co/dB62w8p

RelVlotelVlod claimed that after al-Qahtani paid him for bots on his friend’s botnet, his friend banned him.
RelVlotelVlod offered to set up an IRC server for a botnet for $20 instead. “he promise he will full support
the server and make sure bots not loses and he will give me a full support for every think even update bot
crypted,” al-Qahtani replied. He also tried hiring RelVlotelVlod: “i promise him that when we finish i will
give him a monthly salary.”

Al-Qahtani discussed his efforts at DDoSing sites on several occasions. He never named the websites he
targeted. In November 2009, he wrote that he was having problems DDoSing a website due to the site’s
administrator blocking connections from all but one country: “i ddos site from my bots but site not
down.”73 In January 2011, he recommended using Optima: “i down large site in 300 bot only .. all my irc bot
cant down it in 3-4k :) amazing.”74 The same month, he asked for advice on how to hack or DDoS a PalTalk
room with about 2,000 members.75 In March 2012, he described a DDoS for hire service called OncleSam
as “the most professional DDoS Services i used in the hf, i will use it again and again :D”76 Al-Qahtani took
down a site for 48 hours and caused the victim to change their hosting provider, according to his post.
https://hackforums.net/showthread.php?tid=181966&pid=1717326&highlight=ddos#pid1717326
https://hackforums.net/showthread.php?tid=906835&pid=9248605&highlight=ddos#pid9248605
https://hackforums.net/showthread.php?tid=975055&pid=9054188#pid9054188
https://hackforums.net/showthread.php?tid=2827716&pid=26375253&highlight=ddos#pid26375253

Targeted Users On Major Social Media Platforms, WhatsApp
True to his reputation for being Saudi Arabia’s social media enforcer, al-Qahtani paid to have accounts
deleted and sought to manufacture engagement activity on major social media platforms, including
YouTube and Facebook. He also sought a tool that would allow him to suspend Twitter accounts and tested 
an exploit that was supposed to crash a user’s WhatsApp. Al-Qahtani also demonstrated his petty side by
asking how to kick players from a Facebook game

Paid To Have YouTube Channel, More Than 20 Videos Deleted
Al-Qahtani sought to artificially boost the popularity of unnamed YouTube accounts and videos and
claimed to have had “many” YouTube videos and at least one channel deleted from the platform.
In October 2010, al-Qahtani purchased iTube 2.2, a YouTube bot billed as a “professional YouTube
promotion tool.” The tool included a slew of features, including “Views Booster,” which allows users to
artificially increase the number of views on a video using a botnet, and “Mass Flagger,” which let users use
their YouTube accounts “to flag a competing video and have it removed from youtube.”
A year later, in October 2011, he started a thread indicating that he was interested in purchasing 1,000 to
2,000 verified YouTube accounts. “i will change the passwords so its will be for me only..” he wrote. “Your
offer please.” No one publicly took al-Qahtani up on his request, but the following day, he vouched for a
user called “bloodgen” from whom al-Qahtani said he purchased 500 YouTube accounts but received
525.78 In the same post, he said he had been sold accounts by other users did not work or were not “pva”
(phone-verified accounts). The day before, al-Qahtani had also purchased 6,000 YouTube likes. In
February 2012, he unsuccessfully tried to order 100,000 YouTube views.
Al-Qahtani also paid Hack Forum members to delete YouTube videos and at least one channel. In
February 2011, al-Qahtani vouched for a user called “ruNe0,” who offered to delete any YouTube video for
as low as $6. (When asked to delete a Justin Bieber video, ruNe0 conceded that he could not: “Hihihi its
impossible this kid so famous and partner too, it's me who is to be banned = D.”) Al-Qahtani said ruNe0
“delete for me many many youtube video .. all deals was smooth.” A month later, al-Qahtani vouched for
ruNe0 again and said that he deleted “more than 20 videos” for him. In October 2011, al-Qahtani told
ruNe0 that he had PM’d him a new channel to delete, suggesting that ruNe0 had deleted at least one
channel for al-Qahtani previously.
In June 2013, al-Qahtani started a thread titled, “delete video in youtube 200$,” writing, “tell me the time u
need to do the job ,, i want ASAP.” Two days later, a user called “Venture Mogul” wrote that he got it
taken down. Al-Qahtani replied, “check your paypal , u got the 200$ ... Regards.”
In April 2016, al-Qahtani started a thread indicating that he was looking for someone to build a YouTube
bot that would: 
https://hackforums.net/showthread.php?tid=753917&pid=7256067#pid7256067
https://hackforums.net/showthread.php?tid=749400&pid=16603568#pid16603568
https://hackforums.net/showthread.php?tid=945525&pid=16578821#pid16578821
https://hackforums.net/showthread.php?tid=1873394&pid=19632477#pid19632477
https://hackforums.net/showthread.php?tid=910111&pid=10088370#pid10088370
https://hackforums.net/showthread.php?tid=910111&pid=10332009#pid10332009
https://hackforums.net/showthread.php?tid=3557857&pid=33357383#pid33357383
https://hackforums.net/showthread.php?tid=5230150&highlight=youtube

Sought Tool To Ban Twitter Account
In June 2011, al-Qahtani tried to buy tools that would let him ban Twitter accounts: “i want buy tools that
can banned or freeze twitter account. any offer?” After receiving few responses, he wrote that he would
pay $500 for a tool that would even “freeze” an account for 24 hours if he could do it repeatedly. One user
suggested that such tools do not exist, “but if you have access to the database for twitter then you can do
anything.”In April 2012, al-Qahtani asked about a Twitter account-cracking tool being sold for $20.86 “how fast is it?
how many password in second its try?” He also asked whether it would bypass CAPTCHAs.
In October 2018, The New York Times reported that al-Qahtani was the strategist behind an effort to
harass and silence critics of the kingdom on Twitter by using troll farms consisting of hundreds of young
men in and around Riyadh.87 The Times also reported that a Twitter employee, Ali Alzabarah, was
persuaded by Saudi intelligence “to peer into several user accounts, according to three of the people
briefed on the matter.” Alzabarah, who joined Twitter in 2013, had access to users’ personal information
and account activity, including IP addresses and phone numbers. He was fired in 2015, despite Twitter
having found no evidence that he provided the Saudi government with Twitter data. He returned to Saudi
Arabia and now works in the government, according to a Times source.

Owned “Many Facebook Accounts”
In February 2011, al-Qahtani started a thread titled, “facebook script or software that can add like and
comments for thousand of accounts.”88 It is not clear from the post whether he owned thousands of
Facebook accounts or if he wanted a tool that would allow him to like and comment on thousands of
accounts’ posts. “i have many facebook accounts,” he wrote. “i want the best software/script that i can
insert all the accounts on it and send command by the software/script.. and its do the like from all the
accounts and add comments..”
85 https://hackforums.net/showthread.php?tid=1431286&pid=13126931&highlight=twitter#pid13126931
86 https://hackforums.net/showthread.php?tid=2424661&pid=21968194&highlight=twitter#pid21968194
87 https://www.nytimes.com/2018/10/20/us/politics/saudi-image-campaign-twitter.html
88 https://hackforums.net/showthread.php?tid=1065979&pid=9894520#pid9894520

Tested Exploit For Crashing WhatsApp
Al-Qahtani also indicated an interest in WhatsApp tools. In December 2014, he wrote that he tried using
an exploit that would crash a users’ WhatsApp, but it did not work for him on iOS.89
In May 2015, he started a thread asking for the “best whatsapp panel bulk/checker in market.”90 Two
users responded, but al-Qahtani did not post again in the thread

Wanted To Kick Players From Facebook Game, Bought Coins For 8 Ball Pool Game
The only other reference to Facebook identified was in April 2013, when he offered to pay $500 for a script
that would show the IP address of players in a Facebook game called War Commander. “i need software
show me any player ip in the same sector or other sector by there id or name. i will pay 500$ for that,, and
mybey i will increase that if i like what i see. i will use it to kick some bad players ;).”
In October 2014, he also suggested that he had hacked the game 8 Ball Pool for iOS. The same day, he
offered to buy all of the 8 Ball Pool coins being sold by a user ($2 for one million coins), and in another post
on the same day, he offered to buy an 8 Ball Pool account with one billion coins for $700, even though
another user claimed to have recently sold their one billion-coin account for $25.

Opined About God, Obama, Kashmir
In four posts on October 10 and 11, 2010, al-Qahtani opined on subjects unrelated to hacking, including
Iran, Kashmir and religion. Al-Qahtani started a thread titled, “Obama and the soft or hard or smart power..
what will work with iran?” in which he called then-President Obama “a realy humanity leader for the earth”
and argued that President Obama needed to use soft, smart and hard power when dealing with Iran. In a thread
on India and Pakistan, al-Qahtani weighed in on the Kashmir conflict: “the only solution is give Kashmirs people
The right to self-determination under UN auspices, or make it a Separate Nation.”
https://hackforums.net/showthread.php?tid=3410601&pid=31991490#pid31991490
https://hackforums.net/showthread.php?tid=3997427&pid=42667955#pid42667955
https://hackforums.net/showthread.php?tid=4438718&pid=42668053#pid42668053
https://hackforums.net/showthread.php?tid=4335239&pid=42668157#pid42668157
https://hackforums.net/showthread.php?tid=4566034&pid=43622761#pid43622761
https://hackforums.net/showthread.php?tid=4819790&pid=46116587#pid46116587
https://hackforums.net/showthread.php?tid=732501&pid=6955346#pid6955346
https://hackforums.net/showthread.php?tid=720377&pid=6965503#pid6965503
https://ibb.co/VtBd9Xp

Posted While Drunk
Al-Qahtani wrote that he was drunk in three posts at the end of 2010. Alcohol is illegal in Saudi Arabia and
punishable by flogging or worse, though it has been reported that some members of the royal family have
flouted the prohibition with impunity. In October 2010, al-Qahtani sponsored a contest for the best tutorials
pertaining to a range of subjects, including programming, graphics, hacks and exploits.97 The winners of the
contest received forum upgrades purchased by al-Qahtani. Responding to the apparently lackluster response,
al-Qahtani wrote that he was drunk and wanted better tutorials: 
https://ibb.co/VjLRP3J
The following month, al-Qahtani sponsored another contest.98 When the contest was over, he
congratulated the winners and wrote, “im on party and drunk and now im really happy cheers to hf.. brb
will go to drink tackila and dance lol.” 
https://hackforums.net/showthread.php?tid=721169&pid=6965546#pid6965546
https://hackforums.net/showthread.php?tid=305159&pid=6965603#pid6965603
https://plato.stanford.edu/entries/pascal-wager/index.html
https://www.theguardian.com/world/2010/dec/07/wikileaks-cables-saudi-princes-parties
https://hackforums.net/showthread.php?tid=738021&pid=7014461#pid7014461
https://hackforums.net/showthread.php?tid=781348&pid=7485785#pid7485785
In December 2010, al-Qahtani wrote that he was a “little drounk” in a post vouching for a user from whom
he said he purchased 1,000 bots: https://ibb.co/n3Ph0hW && https://ibb.co/M1y5W7m

Used PayPal, Provided Hotmail Email
As seen in the screenshot in the beginning of this section, al-Qahtani wrote in his first Hack Forums post
that he used PayPal to buy malware from the user stronger7. He would mention using PayPal for various
purchases in at least a dozen other posts. In an April 2016 post, he specified that he could pay only via
PayPal or Visa. According to information leakage from PayPal’s password recovery site, saudq1978@gmail.com is
connected to a PayPal account linked to a Visa ending in 10 and the following partially redacted p hone
number: 05* *** *750 that corresponds with al-Qahtani’s Saudi Telecom Company cell phone number,
+966 55 548 9750.101 In a December 2010 post, al-Qahtani sought to purchase 3,000 installs or updates. 
He wrote that he would pay via “pp only,” referring to PayPal. He also provided a new email address:
nokia2mon2@hotmail.com. He posted the email address at least one other time two months earlier, in
October 2010, when he asked the seller of a Windows server exploit to add him on MSN.103
Nokia2mon2@hotmail.com is connected to a Microsoft Live account and a Skype profile with the handle
“test test 1.” According to information leakage from Microsoft Live’s password recovery page, the email
address is connected to a partially redacted phone number (********72) and email address
(al*****@hotmail.com) that were not identified during the course of this investigation.
https://hackforums.net/showthread.php?tid=914890&pid=8487820#pid8487820
https://hackforums.net/showthread.php?tid=5230150&pid=50476121#pid50476121
https://en.wikipedia.org/wiki/Telephone_numbers_in_Saudi_Arabia
https://hackforums.net/showthread.php?tid=890641&pid=8276669#pid8276669
https://hackforums.net/showthread.php?tid=746882&pid=7144180#pid7144180

Paid $1,500 For Hack Of Hotmail Accounts
Al-Qahtani hired Hack Forum members to hack specific Hotmail accounts and provide him with the
credentials. In October 2010, he started a thread offering to pay $300 for the password to a Hotmail
account.104 Ten days later, he wrote that many users had tried but failed to hack the account. “i don't have
any info about the account, only the account id, if any one can do it pls pm me.”
In March 2012, al-Qahtani started a thread requesting the hack of three Hotmail accounts, offering to pay
$500 for each account.105 He edited the thread six days later indicating his success: “i hacked the emails,”
he wrote. “the offer is finished.”
Days later, al-Qahtani wrote that Microsoft had locked him out of one of the Hotmail accounts he had
hacked. He posted the message he received, which read in part, “Often customers get here because
someone else has access to your account and are using it without your knowledge to send spam.” Al-
Qahtani said that his IP address was in the same country as the genuine account owner and that he
knows the account owner’s “town and name only.” He did not say whether or not he had any luck getting
back into the compromised account.

Tried Cracking Wireless Networks, Published First Script
Al-Qahtani showed an interest in cracking wireless networks (e.g. Wi-Fi) beginning in 2011. In September
2011, he responded to a thread by a user called “Middle,” who offered to sell their hacking skills or teach
others for a fee.106 Al-Qahtani wrote that Middle gave him “great lessons” on wireless cracking.
Two months later, in November 2011, al-Qahtani started a thread explaining that the wireless cracking tool
Pyrit was not reading his graphics card and offered $20 to whomever could “fix it to me by tv and show me
what was the wrong and how i can use pyrit.”107
Al-Qahtani indicated that he was using BackTrack 5 R, a predecessor to the penetration testing Linux
distribution Kali Linux. Days later, he posted a thread asking for help with oclHashcat, a password
cracking tool.108 According to the tool’s output, which al-Qahtani included in his post, his system was
overheating while trying to crack a hashed Wi-Fi password (WPA/WPA2), causing the tool to abort.
https://hackforums.net/showthread.php?tid=713739&pid=6781390#pid6781390
https://hackforums.net/showthread.php?tid=2303129&pid=20776371#pid20776371
https://hackforums.net/showthread.php?tid=1700336
https://hackforums.net/showthread.php?tid=1899278&pid=17200084#pid17200084
https://hackforums.net/showthread.php?tid=1907397&pid=17267259#pid17267259
https://ibb.co/HzJrLNz
Al-Qahtani concluded his Hashcat thread by explaining he was new to wireless cracking: “please answer
me with details im new in that.” Three years later, in December 2014, he shared109 “a small script to help
you crack WPA/WPA2” and posted a link to a Pastebin post110 titled, “Red Lions WPA/WPA2 Cracker V1
BETA” (Red Lions was a Hack Forums group headed by al-Qahtani).
He wrote in the comments of the script that it was the first he had written and that it was “intended for the
sole purpose of penetration testing only.” Al-Qahtani created the Pastebin post using an account with the
same username as his Hack Forums profile, nokia2mon2.111 The account was created the same day that he
shared the script on Hack Forums, and there were no other pastes under his account.
https://hackforums.net/showthread.php?tid=4580080&pid=43766880#pid43766880
https://pastebin.com/A7HMFDWQ
https://pastebin.com/u/nokia2mon2

Sought iOS Spyware
In 2014 and 2015, al-Qahtani requested hacking tools for Apple products. In March 2014, he posted a
thread asking whether any RATs existed that could infect Macs.112 Some users mentioned jRAT but
suggested that it was no longer being sold. As was often the case, al-Qahtani’s request was time sensitive:
“any other option guys?????? i need it now :D” In October that same year, a user called “Sam Sung” started 
a thread in which he described seeing a spyware app on his friend’s iPhone 5. In what was almost certainly
a scam post, Sam Sung said that he tried to find the spyware online, but his friend said the developer 
wanted to keep a low profile to keep it hidden from Apple. Al-Qahtani was the first to comment on the thread,
writing, “if u find it i will buy it and will give u bonus if its will work.”113 Sam Sung replied the next day,
“hi yes I found it,please PM me your skype.”

Tried Buying Fake Traffic For Twitter Follower’s Website
In January 2012, al-Qahtani posted a thread asking to buy 100,000 visits to “a page on
http://twitemail.com” and specified that delivery must be within 24 to 48 hours.114 “i dont care if its fake..
its must only increase the counter.” Twitemail.com was and continues to be registered to a Saleh Al-Zaid
in Riyadh, according to Whois records. The domain redirects to twitmail.com, which is also owned by al-
Zaid. Twitmail allows users to share their emails on Twitter, according to the website.
Zaid is a “partner technology strategist” for Microsoft in Riyadh, according to his LinkedIn profile.115 He is
also the CEO of LunarApps, a company he founded in 2011. Twitmail is one of LunarApps’ three main
products, the other two being Untiny.com — a shortened link expander — and TwtBase.com, a “classified
directory of Twitter apps in the market,” according to Zaid’s LinkedIn profile.
Al-Zaid116 and al-Qahtani follow each other on Twitter

Sought Dedicated Server In Russia Or China To Host Exploits, Botnet
In 2010, al-Qahtani twice asked about purchasing servers for hosting exploits and botnets. In October,
he started a thread in the “Buyers Bay” sub-forum with the title, “hosting that will be house ing an expliot
system and an http bot.” His post got right to the point: “i would like to purchase bullet proof hosting
that will be house ing an expliot system and an http bot.” Nine days later, a user said they could provide
good hosting, but less than two months later, in December, al-Qahtani posted another thread with the
same request: “need: dedicated server for botnet and exploits.”  Al-Qahtani expanded on what he was looking
for, saying that he wanted a dedicated server located in Russia or China. “If you guys know any good company
which are providing dedicated server and they allow irc botnet , exploits , etc . just drop their links ..”
This second thread received twice as many responses with one user saying that they had PM’d him and 
cautioning that such servers could be expensive, but “For Russia check out wahome.ru.” In fact, al-Qahtani had
been using a U.S.-based hosting provider, ThePlanet.com, which had a reputation for showing persistent malicious
behavior, such as hosting botnets or drive-by download sites. The following section details al-Qahtani’s hosting
infrastructure.
https://hackforums.net/showthread.php?tid=4114113&pid=38887802#pid38887802
https://hackforums.net/showthread.php?tid=4473189&pid=42687570#pid42687570
https://hackforums.net/showthread.php?tid=2167789&pid=19561996&highlight=vistes#pid19561996
https://www.linkedin.com/in/salehalzaid/
https://twitter.com/alzaid
https://en.wikipedia.org/wiki/Exploit_(computer_security)
https://hackforums.net/showthread.php?tid=713372&pid=6777840#pid6777840
https://hackforums.net/showthread.php?tid=927958&pid=8602127#pid8602127

 /$$      /$$           /$$                 /$$   /$$                        
| $$  /$ | $$          | $$                |__/  | $$                        
| $$ /$$$| $$  /$$$$$$ | $$$$$$$   /$$$$$$$ /$$ /$$$$$$    /$$$$$$   /$$$$$$$
| $$/$$ $$ $$ /$$__  $$| $$__  $$ /$$_____/| $$|_  $$_/   /$$__  $$ /$$_____/
| $$$$_  $$$$| $$$$$$$$| $$  \ $$|  $$$$$$ | $$  | $$    | $$$$$$$$|  $$$$$$ 
| $$$/ \  $$$| $$_____/| $$  | $$ \____  $$| $$  | $$ /$$| $$_____/ \____  $$
| $$/   \  $$|  $$$$$$$| $$$$$$$/ /$$$$$$$/| $$  |  $$$$/|  $$$$$$$ /$$$$$$$/
|__/     \__/ \_______/|_______/ |_______/ |__/   \___/   \_______/|_______/ 
safcsp.org.sa
aldewan-almalaky.com
aldewan-sa.com
aldewanalmalaky.com
aldewanksa.com
aldewannews.com
dewanmalaky.com
fahadserver.com
jasmn.info
ksa-aldewan-almalaky.com
kt-library.com
m-d-sa-news.com
markaz-dewan.com
markaz-dewan.net
markaz-royal.com
markaz-royal.net
royalcourt-ksa.com
royalcourt-sa.com
royalcourt-saudi-arabia.com
sa-aldewan-almalaky.com
saudidewan.com
saudq.com
saudqq.com

markaz-royal[.]net were used by al-Qahtani to host malicious payloads and were detected as running malware such as Blackshades and Darkness/Optima.
The host nokia2mon2.markaz-royal[.]net was included in a list of more than 13,000 hosts identified by the FBI as being involved with Blackshades
activity and was was also observed as hosting a shell booter, which allows compromised websites to be used for DDoS attacks. Another subdomain,
saud4.markaz-royal[.]net, hosted Optima malware, based on Wayback Machine snapshots, which captured a Russian FAQ page 
(https://web.archive.org/web/20110820013508/http://saud4.markaz-royal.net:80/faq.html) for Optima  and the login page 
(https://web.archive.org/web/20110718034435/http://saud4.markaz-royal.net:80/adm/auth.php)for the Optima control panel. In September 2016 and 
October 2016, two iterations of a text file hosted on a saudqq[.]com host were preserved by the Wayback Machine and include what appear to be
SMS logs of two-factor authentication codes, login notifications and other communications sent to approximately one dozen phone numbers across
Canada.  The September 2016 capture shows logs for 12 SMS messages to Canadian numbers with area codes for  Quebec (450) and Manitoba (204).
The messages were sent from Canadian numbers with area codes for Ontario (289, 705), Toronto (647), Montreal 438) and Alberta (403). All of the
messages are WhatsApp verification codes, except for one Google verification code (personally identifying information has been redacted): 
https://ibb.co/jMVMfN7


 /$$       /$$           /$$                       /$$       /$$$$$$$                  /$$   /$$                                  
| $$      |__/          | $$                      | $$      | $$__  $$                | $$$ | $$                                  
| $$       /$$ /$$$$$$$ | $$   /$$  /$$$$$$   /$$$$$$$      | $$  \ $$ /$$   /$$      | $$$$| $$  /$$$$$$  /$$$$$$/$$$$   /$$$$$$ 
| $$      | $$| $$__  $$| $$  /$$/ /$$__  $$ /$$__  $$      | $$$$$$$ | $$  | $$      | $$ $$ $$ |____  $$| $$_  $$_  $$ /$$__  $$
| $$      | $$| $$  \ $$| $$$$$$/ | $$$$$$$$| $$  | $$      | $$__  $$| $$  | $$      | $$  $$$$  /$$$$$$$| $$ \ $$ \ $$| $$$$$$$$
| $$      | $$| $$  | $$| $$_  $$ | $$_____/| $$  | $$      | $$  \ $$| $$  | $$      | $$\  $$$ /$$__  $$| $$ | $$ | $$| $$_____/
| $$$$$$$$| $$| $$  | $$| $$ \  $$|  $$$$$$$|  $$$$$$$      | $$$$$$$/|  $$$$$$$      | $$ \  $$|  $$$$$$$| $$ | $$ | $$|  $$$$$$$
|________/|__/|__/  |__/|__/  \__/ \_______/ \_______/      |_______/  \____  $$      |__/  \__/ \_______/|__/ |__/ |__/ \_______/
                                                                       /$$  | $$                                                  
                                                                      |  $$$$$$/                                                  
                                                                       \______/
APOLLO_IO_129M_MARKETING_2018
email 	sal-qahtani@tcc-ict.com
name 	Saud Al-Qahtani
country 	Saudi Arabia
linkedin 	http://www.linkedin.com/in/saud-al-qahtani-b6009497
job 	Digital Forensics Engeering
company 	TECHNOLOGY CONTROL CO.

APOLLO_IO_129M_MARKETING_2018
email 	s.al-qahtani@mobily.com.sa
name 	Saud Al-Qahtani
country 	Saudi Arabia
linkedin 	http://www.linkedin.com/in/saud-al-qahtani-38a0b640
job 	Retail Sales Principal Officer
company 	Mobily

APOLLO_IO_129M_MARKETING_2018
name 	Saud Al-Qahtani
country 	Saudi Arabia
linkedin 	http://www.linkedin.com/in/saud-al-qahtani-782a4137
job 	GM
company 	WFE prod

CANVA_COM_133M_DESIGN_052019
username 	saudhaif1999
email 	saudhaif1999@gmail.com
name 	Saud al-Qahtani
id 	8743472
id_hash 	UABpJj8dG4g
create_date 	2016-01-27 14:16:11
mail_status 	C
temporary 	0
roles 	U
deactivated 	0
ui_info 	{hasUpdatedSvgPlaceholder:true}
locale 	en
personal_brand 	8768980
personal_brand_id 	BABpJkTXPWM

ZOOSK_COM_28M_DATING_012020
username 	Saud
email 	engali97@hotmail.com
name 	Saud Al-Qahtani
gender 	male
wants 	women
birthday 	1977-11-19
latitude 	21516944
longitude 	39219167
country 	SA
regdate 	2008-01-04 16:52:09
height 	178
children 	0
balance 	0
dscore 	249

LUMINPDF_COM_24M_SERVICE_2019
email 	s1419s1@hotmail.com
name 	saud Al-Qahtani
lang 	ar
gender 	male

EYEEM_COM_20M_STORE_2018
username 	SaudAlqahtani
email 	saud.naq@hotmail.com
name 	Saud Al-qahtani

YOUNOW_COM_40M_SOCIAL_072017
username 	pseeta_85674
lastip 	2.88.246.1
Riyadh, Riyadh Region, Saudi Arabia
name 	Saud Al-Qahtani
proxy_ip 	188.114.102.216

YOUNOW_COM_40M_SOCIAL_072017
username 	SaudAl-Qahtani_1
email 	tfker7lo@hotmail.com
lastip 	77.30.88.138
Riyadh, Riyadh Region, Saudi Arabia
name 	Saud Al-Qahtani
facebook 	tfker7lo@hotmail.com
facebook_id 	100000025326470
proxy_ip 	93.169.193.19

YOUNOW_COM_40M_SOCIAL_072017
username 	noltit
lastip 	51.235.208.138
Riyadh, Riyadh Region, Saudi Arabia
name 	Saud Al-Qahtani
proxy_ip 	198.143.55.1

YOUNOW_COM_40M_SOCIAL_072017
username 	SaudAl-qahtani_4
lastip 	94.98.20.252
Riyadh, Riyadh Region, Saudi Arabia
name 	Saud Al-qahtani
facebook 	sauod-1431@hotmail.com
facebook_id 	100003596728477
proxy_ip 	51.36.61.246

YOUNOW_COM_40M_SOCIAL_072017
username 	Shwit
email 	saudhaif1999@gmail.com
lastip 	2.90.125.6
Riyadh, Riyadh Region, Saudi Arabia
name 	Saud al-Qahtani
google_id 	106589289102388463152
proxy_ip 	207.244.77.234

YOUNOW_COM_40M_SOCIAL_072017
username 	SaudAl-qahtani_44385
lastip 	88.5.193.244
Zaragoza, Aragon, Spain
name 	Saud Al-qahtani

YOUNOW_COM_40M_SOCIAL_072017
username 	SaudAl-Qahtani_76416
lastip 	188.48.134.47
name 	Saud Al-Qahtani
facebook_id 	243301092731460
proxy_ip 	149.126.78.9

YOUNOW_COM_40M_SOCIAL_072017
username 	Qs117
lastip 	46.152.0.233
Riyadh, Riyadh Region, Saudi Arabia
name 	Saud Al-Qahtani
proxy_ip 	141.101.105.15

YOUNOW_COM_40M_SOCIAL_072017
username 	Saud_q7887
lastip 	185.5.152.190
name 	Saud Al-qahtani
facebook_id 	724108041035883
proxy_ip 	198.143.55.25

YOUNOW_COM_40M_SOCIAL_072017
username 	SaudAl-Qahtani_37209
email 	aaa308411@gmail.com
name 	Saud Al-Qahtani
facebook 	aaa308411@gmail.com
facebook_id 	122239361677426
proxy_ip 	5.41.75.16

YOUNOW_COM_40M_SOCIAL_072017
username 	SaudAl-Qahtani_2
email 	radoi-8@windowslive.com
lastip 	94.96.249.79
name 	Saud Al-Qahtani

YOUNOW_COM_40M_SOCIAL_072017
username 	SaudAl-Qahtani_89619
email 	klash_8000@hotmail.com
lastip 	93.168.126.59
Riyadh, Riyadh Region, Saudi Arabia
name 	Saud Al-Qahtani
facebook 	klash_8000@hotmail.com
facebook_id 	1267378336625632

YOUNOW_COM_40M_SOCIAL_072017
username 	saudgamezr
email 	saud.gamezr@gmail.com
lastip 	51.36.60.160
Riyadh, Riyadh Region, Saudi Arabia
name 	Saud AL-Qahtani
google_id 	117775905997146866107
proxy_ip 	54.240.145.8

YOUNOW_COM_40M_SOCIAL_072017
username 	SaudAl-Qahtani_5
email 	kash.505@hotmail.com
lastip 	94.98.92.74
name 	Saud Al-Qahtani
facebook_id 	100003689256451
proxy_ip 	188.114.103.128

YOUNOW_COM_40M_SOCIAL_072017
username 	SaudAl-qahtani_3
email 	saud.h.q@hotmail.com
lastip 	50.191.125.216
Pittsburgh, Pennsylvania, United States
name 	Saud Al-qahtani
facebook 	saud.h.q@hotmail.com
facebook_id 	100002409715770
proxy_ip 	149.126.78.67

YOUNOW_COM_40M_SOCIAL_072017
username 	SaudAl-qahtani_7
email 	saud1994@hotmail.com
lastip 	119.63.142.29
Lahore, Punjab, Pakistan
name 	Saud Al-qahtani
facebook 	saud1994@hotmail.com
facebook_id 	100000887153574
proxy_ip 	151.255.93.141

YOUNOW_COM_40M_SOCIAL_072017
username 	Saudal-qahtani
lastip 	94.98.100.40
name 	Saud al-qahtani

BADOO_COM_126M_DATING_2016
username 	236238431.0236238431
email 	q_w_asz@hotmail.com
hash 	d0a16d66e20ce3043954d00d3cde07fc
nadomyxa
name 	saud Al-Qahtani
alias 	saud Al-Qahtani
dob 	1985-03-29
unparsed 	27:M:91:3559:67225
Password 	nadomyxa

BADOO_COM_126M_DATING_2016
username 	0236325349
email 	q_w_easz@hotmail.com
hash 	429c8a8780d6fcb4d7182a10bc1e4a06
name 	saud Al-Qahtani
alias 	Saud al-qahtani
dob 	1985-03-29
unparsed 	27:M:91:3559:1101857
Password 	0542489892

                     /$$       /$$            /$$$$$$                                     /$$$$$$ 
                    | $$      |__/           /$$__  $$                                   /$$__  $$
 /$$$$$$$   /$$$$$$ | $$   /$$ /$$  /$$$$$$ |__/  \ $$ /$$$$$$/$$$$   /$$$$$$  /$$$$$$$ |__/  \ $$
| $$__  $$ /$$__  $$| $$  /$$/| $$ |____  $$  /$$$$$$/| $$_  $$_  $$ /$$__  $$| $$__  $$  /$$$$$$/
| $$  \ $$| $$  \ $$| $$$$$$/ | $$  /$$$$$$$ /$$____/ | $$ \ $$ \ $$| $$  \ $$| $$  \ $$ /$$____/ 
| $$  | $$| $$  | $$| $$_  $$ | $$ /$$__  $$| $$      | $$ | $$ | $$| $$  | $$| $$  | $$| $$      
| $$  | $$|  $$$$$$/| $$ \  $$| $$|  $$$$$$$| $$$$$$$$| $$ | $$ | $$|  $$$$$$/| $$  | $$| $$$$$$$$
|__/  |__/ \______/ |__/  \__/|__/ \_______/|________/|__/ |__/ |__/ \______/ |__/  |__/|________/                                                                                        
RAIDFORUMS_COM_594K_HACKING_062021
username 	nokia2mon2

HACKFORUMS_NET_190K_HACKING_022011
Not Found
username 	nokia2mon2
email 	saudq1978@gmail.com
lastip 	62.120.153.248
hash 	3cd6141c449606113c9f96369c6163d9
salt 	1e7BKGNv
actual_lastip 	188.65.183.52
uid 	80618
loginkey 	iCStAm6bznoF2DEqF1591a5mG4ljBcYuZeWxGOkhRocWQcGyNy
postnum 	362
awards 	11
myps 	10000.00
avatar 	./uploads/avatars/avatar_80618.gif?dateline=1294840711
avatardimensions 	113|102
avatartype 	upload
usergroup 	28
additionalgroups 	19,36
displaygroup 	36
usertitle 	Red Lions Leader
regdate 	1248800574
lastactive 	1298121997
lastvisit 	1298111075
lastpost 	1297995833
icq 	0
birthday 	10-12-1977
birthdayprivacy 	all
signature 	[align=center][img]http://ploader.net/files/1fcfbbc988360a766e235e8f87c162ab.png[/img][/align] [size=large] [/size]Goals: 900 [color=#32CD32]+rep [/color][ [color=#FF0000]x[/color] ] 200 members upgrade [ [color=#FF0000]102 upgraded right now [/color] ]
parsedsig 	<div style="text-align: center;"><img src="http://ploader.net/files/1fcfbbc988360a766e235e8f87c162ab.png" border="0" alt="[Image: 1fcfbbc988360a766e235e8f87c162ab.png]" /></div> <span style="font-size: large;"><br /> </span>Goals:<br /> 900 <span style="color: #32CD32;">+rep </span>[ <span style="color: #FF0000;">x</span> ]<br /> 200 members upgrade [ <span style="color: #FF0000;">102 upgraded right now </span> ]<br /> <br />
allownotices 	1
hideemail 	0
subscriptionmethod 	2
invisible 	1
receivepms 	1
pmnotice 	2
pmnotify 	1
threadmode 	linear
showsigs 	1
showavatars 	1
showquickreply 	1
showredirect 	1
ppp 	30
tpp 	40
daysprune 	0
dateformat 	0
timeformat 	0
timezone 	-5
dst 	0
dstcorrection 	2
style 	3
away 	0
awaydate 	0
returndate 	0
pmfolders 	1**$%%$2**$%%$3**$%%$4**
referrer 	0
referrals 	2
reputation 	895
longlastip 	-1136543948
longregip 	1048091128
language 	english
timeonline 	1490049
showcodebuttons 	1
totalpms 	2207
unreadpms 	18
warningpoints 	0
moderateposts 	0
moderationtime 	0
suspendposting 	0
suspensiontime 	0
coppauser 	0
classicpostbit 	0
receivefrombuddy 	0
suspendsignature 	0
suspendsigtime 	0
loginattempts 	1
failedlogin 	0

LIZARDSTRESSER_SU_13K_HACKING_2015
username 	nokia2mon2
email 	saudq1978@gmail.com
password 	80808080

000WEBHOST_COM_13M_HOSTING_032015
username 	nokia2mon2
email 	nokia2mon2@gmail.com
lastip 	94.98.168.57
Riyadh, Riyadh Region, Saudi Arabia
password 	saud8080
                                               /$$         /$$ /$$   /$$  /$$$$$$    /$$       /$$$$$$     /$$                   /$$                             /$$ /$$                                      
                                              | $$       /$$$$| $$  | $$ /$$__  $$ /$$$$     /$$$__  $$$  | $$                  | $$                            |__/| $$                                      
  /$$$$$$$  /$$$$$$  /$$   /$$  /$$$$$$   /$$$$$$$      |_  $$| $$  | $$|__/  \ $$|_  $$    /$$_/  \_  $$ | $$$$$$$   /$$$$$$  /$$$$$$   /$$$$$$/$$$$   /$$$$$$  /$$| $$      /$$$$$$$  /$$$$$$  /$$$$$$/$$$$ 
 /$$_____/ |____  $$| $$  | $$ /$$__  $$ /$$__  $$ /$$$$$$| $$| $$$$$$$$   /$$$$$/  | $$   /$$/ /$$$$$  $$| $$__  $$ /$$__  $$|_  $$_/  | $$_  $$_  $$ |____  $$| $$| $$     /$$_____/ /$$__  $$| $$_  $$_  $$
|  $$$$$$   /$$$$$$$| $$  | $$| $$  \ $$| $$  | $$|______/| $$|_____  $$  |___  $$  | $$  | $$ /$$  $$| $$| $$  \ $$| $$  \ $$  | $$    | $$ \ $$ \ $$  /$$$$$$$| $$| $$    | $$      | $$  \ $$| $$ \ $$ \ $$
 \____  $$ /$$__  $$| $$  | $$| $$  | $$| $$  | $$        | $$      | $$ /$$  \ $$  | $$  | $$| $$\ $$| $$| $$  | $$| $$  | $$  | $$ /$$| $$ | $$ | $$ /$$__  $$| $$| $$    | $$      | $$  | $$| $$ | $$ | $$
 /$$$$$$$/|  $$$$$$$|  $$$$$$/|  $$$$$$/|  $$$$$$$       /$$$$$$    | $$|  $$$$$$/ /$$$$$$| $$|  $$$$$$$$/| $$  | $$|  $$$$$$/  |  $$$$/| $$ | $$ | $$|  $$$$$$$| $$| $$ /$$|  $$$$$$$|  $$$$$$/| $$ | $$ | $$
|_______/  \_______/ \______/  \______/  \_______/      |______/    |__/ \______/ |______/|  $$\________/ |__/  |__/ \______/    \___/  |__/ |__/ |__/ \_______/|__/|__/|__/ \_______/ \______/ |__/ |__/ |__/
                                                                                           \  $$$   /$$$                                                                                                      
                                                                                            \_  $$$$$$_/                                                                                                      
                                                                                              \______/                                                                                                        
BREACHCOMP_COMBOLIST_1400M_2020 - 1 result
sauod-1431@hotmail.com mojajosa

ZABUGOR_COMBOLIST_552M_2019 - 1 result
sauod-1431@hotmail.com mojajosa

BADOO_COM_126M_DATING_2016
username 	0306335660
email 	sauod-1431@hotmail.com
hash 	59701be07bb58c946342e76cdc2e982e
alias 	Dgdgd
dob 	1980-12-31
unparsed 	32:M:91:2606:1102203
Password 	mojajosa


             /$$ /$$   /$$   /$$    /$$$$$$              /$$       /$$$$$$     /$$                   /$$                             /$$ /$$                                      
           /$$$$| $$  | $$ /$$$$   /$$__  $$           /$$$$     /$$$__  $$$  | $$                  | $$                            |__/| $$                                      
  /$$$$$$$|_  $$| $$  | $$|_  $$  | $$  \ $$  /$$$$$$$|_  $$    /$$_/  \_  $$ | $$$$$$$   /$$$$$$  /$$$$$$   /$$$$$$/$$$$   /$$$$$$  /$$| $$      /$$$$$$$  /$$$$$$  /$$$$$$/$$$$ 
 /$$_____/  | $$| $$$$$$$$  | $$  |  $$$$$$$ /$$_____/  | $$   /$$/ /$$$$$  $$| $$__  $$ /$$__  $$|_  $$_/  | $$_  $$_  $$ |____  $$| $$| $$     /$$_____/ /$$__  $$| $$_  $$_  $$
|  $$$$$$   | $$|_____  $$  | $$   \____  $$|  $$$$$$   | $$  | $$ /$$  $$| $$| $$  \ $$| $$  \ $$  | $$    | $$ \ $$ \ $$  /$$$$$$$| $$| $$    | $$      | $$  \ $$| $$ \ $$ \ $$
 \____  $$  | $$      | $$  | $$   /$$  \ $$ \____  $$  | $$  | $$| $$\ $$| $$| $$  | $$| $$  | $$  | $$ /$$| $$ | $$ | $$ /$$__  $$| $$| $$    | $$      | $$  | $$| $$ | $$ | $$
 /$$$$$$$/ /$$$$$$    | $$ /$$$$$$|  $$$$$$/ /$$$$$$$/ /$$$$$$| $$|  $$$$$$$$/| $$  | $$|  $$$$$$/  |  $$$$/| $$ | $$ | $$|  $$$$$$$| $$| $$ /$$|  $$$$$$$|  $$$$$$/| $$ | $$ | $$
|_______/ |______/    |__/|______/ \______/ |_______/ |______/|  $$\________/ |__/  |__/ \______/    \___/  |__/ |__/ |__/ \_______/|__/|__/|__/ \_______/ \______/ |__/ |__/ |__/
                                                               \  $$$   /$$$                                                                                                      
                                                                \_  $$$$$$_/                                                                                                      
                                                                  \______/
ATHWAY_COM_24M_EDU_012020
email 	s1419s1@hotmail.com
hash 	0BYedNDpOXGzwq+Zd6mV1Q==
userid 	7194043
subdate 	1900-01-01 00:00:00.000
lastlogin 	2015-04-25 11:02:55.043
todaylogins 	1
signupdate 	2015-04-25 11:02:55.043
stepdetail 	1
exampledifficulty 	1
roundvar 	4
signupdevice 	web1
anonuserid 	ae298734-09ce-4c1f-9d3e-7e4692f7b0d6
inactive 	0
userroles 	0

GONITRO_COM_77M_TECH_102020
email 	s1419s1@hotmail.com
created 	2016-05-31 22:56:17.821
tmp_admin 	f
verified 	f
referred 	pdftoword
status 	ACTIVE
secret 	n0Y7BSdHq2j1R7b2c6118-a66b-4452-9321-ab9b71f5dd7frYoqr8KXEorH2RHfa
client_access 	t
account_id 	989953657643420512

WATTPAD_COM_275M_SOCIAL_062020
username 	Saud2alqahtani
email 	s1419s1@hotmail.com
lastip 	51.36.53.101
hash 	$2y$10$COHNtK5anHQAmeITvBLy6OqIukm5mrdmqzB30nFsuu48o9FCjqY0G
name 	Saud2alqahtani
CREATEDATE 	2015-11-04T21:23:18.000Z
MODIFYDATE 	2015-11-04T21:23:18.000Z
LOGINDATE 	2015-11-16T18:50:41.000Z
ACTIVE 	1
COUNTRY 	GB
DOB 	1998-10-15T22:00:00.000Z

ZYNGA_COM_202M_GAMING_092019
username 	S1419s1
email 	s1419s1@hotmail.com
salt 	3320beaf3d0f4a659448f7a2897cde9c3dd305ec
created 	2016-09-19 07:06:54

LUMINPDF_COM_24M_SERVICE_2019
email 	s1419s1@hotmail.com
name 	saud Al-Qahtani
lang 	ar
gender 	male

EYEEM_COM_20M_STORE_2018
username 	i9lu
email 	s1419s1@hotmail.com
hash 	29487e51246ae8ddb0623be205f110865e1eaf56
salt 	gxjQxzwLAVH8tLIRmu9e4cd7MfcjQsp0
name 	Saud

TUMBLR_COM_73M_SOCIAL_2013
email 	s1419s1@hotmail.com
hash 	84ec7e1aee3e6f587a5dc756a27573b6c41bb9bb

                                     /$$ /$$                 /$$  /$$$$$$    /$$    /$$$$$$   /$$$$$$   /$$$$$$      /$$$$$$                                       /$$ /$$                                      
                                    | $$| $$                |__/ /$$__  $$ /$$$$   /$$__  $$ /$$__  $$ /$$__  $$   /$$$__  $$$                                    |__/| $$                                      
  /$$$$$$$  /$$$$$$  /$$   /$$  /$$$$$$$| $$$$$$$   /$$$$$$  /$$| $$  \__/|_  $$  | $$  \ $$| $$  \ $$| $$  \ $$  /$$_/  \_  $$   /$$$$$$  /$$$$$$/$$$$   /$$$$$$  /$$| $$      /$$$$$$$  /$$$$$$  /$$$$$$/$$$$ 
 /$$_____/ |____  $$| $$  | $$ /$$__  $$| $$__  $$ |____  $$| $$| $$$$      | $$  |  $$$$$$$|  $$$$$$$|  $$$$$$$ /$$/ /$$$$$  $$ /$$__  $$| $$_  $$_  $$ |____  $$| $$| $$     /$$_____/ /$$__  $$| $$_  $$_  $$
|  $$$$$$   /$$$$$$$| $$  | $$| $$  | $$| $$  \ $$  /$$$$$$$| $$| $$_/      | $$   \____  $$ \____  $$ \____  $$| $$ /$$  $$| $$| $$  \ $$| $$ \ $$ \ $$  /$$$$$$$| $$| $$    | $$      | $$  \ $$| $$ \ $$ \ $$
 \____  $$ /$$__  $$| $$  | $$| $$  | $$| $$  | $$ /$$__  $$| $$| $$        | $$   /$$  \ $$ /$$  \ $$ /$$  \ $$| $$| $$\ $$| $$| $$  | $$| $$ | $$ | $$ /$$__  $$| $$| $$    | $$      | $$  | $$| $$ | $$ | $$
 /$$$$$$$/|  $$$$$$$|  $$$$$$/|  $$$$$$$| $$  | $$|  $$$$$$$| $$| $$       /$$$$$$|  $$$$$$/|  $$$$$$/|  $$$$$$/| $$|  $$$$$$$$/|  $$$$$$$| $$ | $$ | $$|  $$$$$$$| $$| $$ /$$|  $$$$$$$|  $$$$$$/| $$ | $$ | $$
|_______/  \_______/ \______/  \_______/|__/  |__/ \_______/|__/|__/      |______/ \______/  \______/  \______/ |  $$\________/  \____  $$|__/ |__/ |__/ \_______/|__/|__/|__/ \_______/ \______/ |__/ |__/ |__/
                                                                                                                 \  $$$   /$$$   /$$  \ $$                                                                      
                                                                                                                  \_  $$$$$$_/  |  $$$$$$/                                                                      
                                                                                                                    \______/     \______/
MATHWAY_COM_24M_EDU_012020
email 	saudhaif1999@gmail.com
hash 	OVbgmJIX/OMRXZ7WnafMCg==
userid 	6808386
subtype 	2
subdate 	2016-08-28 10:47:39.000
lastlogin 	2015-03-10 19:07:48.000
todaylogins 	1
signupdate 	2015-03-10 19:07:48.000
totalmobilelogins 	1
stepdetail 	1
exampledifficulty 	1
roundvar 	4
subscriptionsource 	3
subscriptionid 	7MIIUBQYJKoZIhvcNAQcCoIIT9jCCE/ICAQExCzAJBgUrDgMCGgUAMIIDtgYJKoZIhvcNAQcBoIIDpwSCA6MxggOfMAoCARQCAQEEAgwAMAsCAQ4CAQEEAwIBazALAgEZAgEBBAMCAQMwDAIBCgIBAQQEFgI0KzANAgEDAgEBBAUMAzIuMTANAgELAgEBBAUCAwqAvjANAgENAgEBBAUCAwE6EDAOAgEBAgEBBAYCBBva4o0wDgIBCQIBAQQGAgR
anonuserid 	0773918f-c0b0-4700-b471-4336e29f49ba
inactive 	0
userroles 	0

GONITRO_COM_77M_TECH_102020
email 	saudhaif1999@gmail.com
created 	2017-02-15 11:51:01.549
tmp_admin 	f
verified 	f
referred 	pdftoword
status 	ACTIVE
secret 	Oizezh3-TNR31f7a3e30d-b3d0-4161-a990-e1f622c88a97Q6gMWaPW2Pxx0x-ta
client_access 	t
account_id 	-246515476185159059

MYFITNESSPAL_COM_144M_FITNESS_022018
username 	abu_haif
email 	saudhaif1999@gmail.com
lastip 	2.88.119.35
Riyadh, Riyadh Region, Saudi Arabia

CANVA_COM_133M_DESIGN_052019
username 	saudhaif1999
email 	saudhaif1999@gmail.com
name 	Saud al-Qahtani
id 	8743472
id_hash 	UABpJj8dG4g
create_date 	2016-01-27 14:16:11
mail_status 	C
temporary 	0
roles 	U
deactivated 	0
ui_info 	{hasUpdatedSvgPlaceholder:true}
locale 	en
personal_brand 	8768980
personal_brand_id 	BABpJkTXPWM

DUBSMASH_COM_123M_SOCIAL_122018
username 	saudhaif
email 	saudhaif1999@gmail.com
hash 	pbkdf2_sha256$15000$rTZEhRKRESSK$QDbvcURw60Pj4ABWp1fCUdbactcPtJ36+KF93khoXrI=
Password 	sauo0ody

CHEGG_COM_38M_EDUCATION_2018
email 	saudhaif1999@gmail.com
hash 	d29c34e66c4aa81bcf96ef1a6381832e
Password 	sauo0ody

YOUNOW_COM_40M_SOCIAL_072017
username 	Shwit
email 	saudhaif1999@gmail.com
lastip 	2.90.125.6
Riyadh, Riyadh Region, Saudi Arabia
name 	Saud al-Qahtani
google_id 	106589289102388463152
proxy_ip 	207.244.77.234

									 /$$             /$$    /$$$$$$  /$$$$$$$$ /$$$$$$      /$$$$$$                                       /$$ /$$                                            
                                    | $$           /$$$$   /$$__  $$|_____ $$//$$__  $$   /$$$__  $$$                                    |__/| $$                                            
  /$$$$$$$  /$$$$$$  /$$   /$$  /$$$$$$$  /$$$$$$ |_  $$  | $$  \ $$     /$$/| $$  \ $$  /$$_/  \_  $$   /$$$$$$  /$$$$$$/$$$$   /$$$$$$  /$$| $$      /$$$$$$$  /$$$$$$  /$$$$$$/$$$$       
 /$$_____/ |____  $$| $$  | $$ /$$__  $$ /$$__  $$  | $$  |  $$$$$$$    /$$/ |  $$$$$$/ /$$/ /$$$$$  $$ /$$__  $$| $$_  $$_  $$ |____  $$| $$| $$     /$$_____/ /$$__  $$| $$_  $$_  $$      
|  $$$$$$   /$$$$$$$| $$  | $$| $$  | $$| $$  \ $$  | $$   \____  $$   /$$/   >$$__  $$| $$ /$$  $$| $$| $$  \ $$| $$ \ $$ \ $$  /$$$$$$$| $$| $$    | $$      | $$  \ $$| $$ \ $$ \ $$      
 \____  $$ /$$__  $$| $$  | $$| $$  | $$| $$  | $$  | $$   /$$  \ $$  /$$/   | $$  \ $$| $$| $$\ $$| $$| $$  | $$| $$ | $$ | $$ /$$__  $$| $$| $$    | $$      | $$  | $$| $$ | $$ | $$      
 /$$$$$$$/|  $$$$$$$|  $$$$$$/|  $$$$$$$|  $$$$$$$ /$$$$$$|  $$$$$$/ /$$/    |  $$$$$$/| $$|  $$$$$$$$/|  $$$$$$$| $$ | $$ | $$|  $$$$$$$| $$| $$ /$$|  $$$$$$$|  $$$$$$/| $$ | $$ | $$      
|_______/  \_______/ \______/  \_______/ \____  $$|______/ \______/ |__/      \______/ |  $$\________/  \____  $$|__/ |__/ |__/ \_______/|__/|__/|__/ \_______/ \______/ |__/ |__/ |__/      
                                              | $$                                      \  $$$   /$$$   /$$  \ $$                                                                            
                                              | $$                                       \_  $$$$$$_/  |  $$$$$$/                                                                            
                                              |__/                                         \______/     \______/ 
EXPLOITIN_COMBOLIST_705M_2016 - 4 results
saudq1978@gmail.com 1q2w3e4r
saudq1978@gmail.com 80808080
saudq1978@gmail.com a4651703
saudq1978@gmail.com saud12345

ANTIPUBLIC_COMBOLIST_1865M_2018 - 4 results
saudq1978@gmail.com 1q2w3e4r
saudq1978@gmail.com 80808080
saudq1978@gmail.com a4651703
saudq1978@gmail.com saud12345

BREACHCOMP_COMBOLIST_1400M_2020 - 4 results
saudq1978@gmail.com 1q2w3e4r
saudq1978@gmail.com 80808080
saudq1978@gmail.com a4651703
saudq1978@gmail.com saud12345

COLLECTION1_COMBOLIST_1212M_2019 - 4 results
saudq1978@gmail.com 1q2w3e4r
saudq1978@gmail.com 80808080
saudq1978@gmail.com a4651703
saudq1978@gmail.com saud12345
ZABUGOR_COMBOLIST_552M_2019 - 1 result
saudq1978@gmail.com saud12345

HACKFORUMS_NET_190K_HACKING_022011
Crack
username 	nokia2mon2
email 	saudq1978@gmail.com
lastip 	62.120.153.248
hash 	3cd6141c449606113c9f96369c6163d9
salt 	1e7BKGNv
actual_lastip 	188.65.183.52
uid 	80618
loginkey 	iCStAm6bznoF2DEqF1591a5mG4ljBcYuZeWxGOkhRocWQcGyNy
postnum 	362
awards 	11
myps 	10000.00
avatar 	./uploads/avatars/avatar_80618.gif?dateline=1294840711
avatardimensions 	113|102
avatartype 	upload
usergroup 	28
additionalgroups 	19,36
displaygroup 	36
usertitle 	Red Lions Leader
regdate 	1248800574
lastactive 	1298121997
lastvisit 	1298111075
lastpost 	1297995833
icq 	0
birthday 	10-12-1977
birthdayprivacy 	all
signature 	[align=center][img]http://ploader.net/files/1fcfbbc988360a766e235e8f87c162ab.png[/img][/align] [size=large] [/size]Goals: 900 [color=#32CD32]+rep [/color][ [color=#FF0000]x[/color] ] 200 members upgrade [ [color=#FF0000]102 upgraded right now [/color] ]
parsedsig 	<div style="text-align: center;"><img src="http://ploader.net/files/1fcfbbc988360a766e235e8f87c162ab.png" border="0" alt="[Image: 1fcfbbc988360a766e235e8f87c162ab.png]" /></div> <span style="font-size: large;"><br /> </span>Goals:<br /> 900 <span style="color: #32CD32;">+rep </span>[ <span style="color: #FF0000;">x</span> ]<br /> 200 members upgrade [ <span style="color: #FF0000;">102 upgraded right now </span> ]<br /> <br />
allownotices 	1
hideemail 	0
subscriptionmethod 	2
invisible 	1
receivepms 	1
pmnotice 	2
pmnotify 	1
threadmode 	linear
showsigs 	1
showavatars 	1
showquickreply 	1
showredirect 	1
ppp 	30
tpp 	40
daysprune 	0
dateformat 	0
timeformat 	0
timezone 	-5
dst 	0
dstcorrection 	2
style 	3
away 	0
awaydate 	0
returndate 	0
pmfolders 	1**$%%$2**$%%$3**$%%$4**
referrer 	0
referrals 	2
reputation 	895
longlastip 	-1136543948
longregip 	1048091128
language 	english
timeonline 	1490049
showcodebuttons 	1
totalpms 	2207
unreadpms 	18
warningpoints 	0
moderateposts 	0
moderationtime 	0
suspendposting 	0
suspensiontime 	0
coppauser 	0
classicpostbit 	0
receivefrombuddy 	0
suspendsignature 	0
suspendsigtime 	0
loginattempts 	1
failedlogin 	0

MALWAREBYTES_COM_111K_SECURITY_112014
username 	saud99
email 	saudq1978@gmail.com
lastip 	188.48.9.132
hash 	45620041b21ecd1f39c93ed581a31546
salt 	nlBY DethZero
Password 	45b5de5f1012691b752e1302df62bffd653d716345d8915046b904b90f41f271
500PX_COM_14M_PHOTOS_072018
Not Found
username 	saudq1978
email 	saudq1978@gmail.com
hash 	$2a$10$LSUWmBOt4AXbMfQAm5dhuuaaVVrf69cUqGrNbcRmmWXi3n3AHlxhu
sex 	0

REINCUBATE_COM_218K_FINANCE_112017
Not Found
username 	saudq1978@gmail.com
email 	saudq1978@gmail.com
hash 	pbkdf2_sha256$10000$FpkEIET0nWfc$PC/+d9Ffbc5t1jLmbVw3WLVvN0s04Zl4j8Fk09H7SNk=
name 	saud alqahtani
is_active 	1
last_login 	2014-05-30T15:12:32.000Z
date_joined 	2014-05-30T15:12:32.000Z
id 	103256

DROPBOX_COM_68M_HOSTING_2012
email 	saudq1978@gmail.com
hash 	$2a$08$uiJFDtYnoACYuazQYkYqyOj6vqEb9ByCOKm0dQff1yXIFjPalGGMK
Password 	80808080
LIZARDSTRESSER_SU_13K_HACKING_2015
username 	nokia2mon2
email 	saudq1978@gmail.com
password 	80808080

COINMAMA_COM_478K_CRYPTO_062017
Not Found
username 	saudq1978@gmail.com
email 	saudq1978@gmail.com
hash 	$P$BoOKNDwRzOn/UmhkPvH.uSCAqVvXj51
date 	1420303720
type 	lead
token 	HLORG4BFSRRF7W6C
active 	1
id 	55732

2844_DATABASES_218M_COMPILATION_2018
email 	saudq1978@gmail.com
password 	80808080

2844_DATABASES_218M_COMPILATION_2018
email 	saudq1978@gmail.com
password 	1q2w3e4r

ADOBE_COM_151M_SOFTWARE_102013
email 	saudq1978@gmail.com

000WEBHOST_COM_13M_HOSTING_032015
username 	saud
email 	saudq1978@gmail.com
lastip 	188.48.69.68
Riyadh, Riyadh Region, Saudi Arabia
password 	saud12345

                     /$$       /$$            /$$$$$$                                     /$$$$$$      /$$$$$$                                       /$$ /$$                                            
                    | $$      |__/           /$$__  $$                                   /$$__  $$   /$$$__  $$$                                    |__/| $$                                            
 /$$$$$$$   /$$$$$$ | $$   /$$ /$$  /$$$$$$ |__/  \ $$ /$$$$$$/$$$$   /$$$$$$  /$$$$$$$ |__/  \ $$  /$$_/  \_  $$   /$$$$$$  /$$$$$$/$$$$   /$$$$$$  /$$| $$      /$$$$$$$  /$$$$$$  /$$$$$$/$$$$       
| $$__  $$ /$$__  $$| $$  /$$/| $$ |____  $$  /$$$$$$/| $$_  $$_  $$ /$$__  $$| $$__  $$  /$$$$$$/ /$$/ /$$$$$  $$ /$$__  $$| $$_  $$_  $$ |____  $$| $$| $$     /$$_____/ /$$__  $$| $$_  $$_  $$      
| $$  \ $$| $$  \ $$| $$$$$$/ | $$  /$$$$$$$ /$$____/ | $$ \ $$ \ $$| $$  \ $$| $$  \ $$ /$$____/ | $$ /$$  $$| $$| $$  \ $$| $$ \ $$ \ $$  /$$$$$$$| $$| $$    | $$      | $$  \ $$| $$ \ $$ \ $$      
| $$  | $$| $$  | $$| $$_  $$ | $$ /$$__  $$| $$      | $$ | $$ | $$| $$  | $$| $$  | $$| $$      | $$| $$\ $$| $$| $$  | $$| $$ | $$ | $$ /$$__  $$| $$| $$    | $$      | $$  | $$| $$ | $$ | $$      
| $$  | $$|  $$$$$$/| $$ \  $$| $$|  $$$$$$$| $$$$$$$$| $$ | $$ | $$|  $$$$$$/| $$  | $$| $$$$$$$$| $$|  $$$$$$$$/|  $$$$$$$| $$ | $$ | $$|  $$$$$$$| $$| $$ /$$|  $$$$$$$|  $$$$$$/| $$ | $$ | $$      
|__/  |__/ \______/ |__/  \__/|__/ \_______/|________/|__/ |__/ |__/ \______/ |__/  |__/|________/|  $$\________/  \____  $$|__/ |__/ |__/ \_______/|__/|__/|__/ \_______/ \______/ |__/ |__/ |__/      
                                                                                                   \  $$$   /$$$   /$$  \ $$                                                                            
                                                                                                    \_  $$$$$$_/  |  $$$$$$/                                                                            
                                                                                                      \______/     \______/
BREACHCOMP_COMBOLIST_1400M_2020 - 1 result
nokia2mon2@gmail.com saud8080

000WEBHOST_COM_13M_HOSTING_032015
username     nokia2mon2
email     nokia2mon2@gmail.com
lastip     94.98.168.57
Riyadh, Riyadh Region, Saudi Arabia
password     saud8080