____ _ _ | _ \ _____ _| |__ (_)_ __ | | | |/ _ \ \/ / '_ \| | '_ \ | |_| | (_) > <| |_) | | | | | |____/ \___/_/\_\_.__/|_|_| |_|
Title:Saud al Qahtani
Created:Sep 21st, 2022
Created by: Anonymous
Views: 572
Comments: 2
Username: Anonymous - (Login)
Please note that all posted information is publicly available and must follow our TOS.
Name Saud al-Qahtani Born July 7, 1978 (age 44) Riyadh, Saudi Arabia Education King Saud UniversityNaif Arab University for Security Sciences Known for Saudi royal court advisor Alleged involvement in the killing of Jamal Khashoggi. Phone Number +966 55 548 9750 Military service Allegiance Saudi Arabia Branch/service Royal Saudi Air Force Royal Saudi Air Force Rank svg Sergeant Early life Al-Qahtani was born in Riyadh, Saudi Arabia on July 7, 1978.He received a bachelor's degree in law from King Saud University, and graduated with the rank of sergeant from the Royal Saudi Air Force. Al-Qahtani subsequently obtained a master's degree in criminal justice from the Naif Arab University for Security Sciences (NAUSS). Career Al-Qahtani previously worked as a journalist for Elaph and as a contributor for Al Riyadh. After obtaining a law degree, al-Qahtani worked as an adviser to the deputy chief of the royal court. In 2003, he served as a legal advisor to the secretariat to then crown prince Abdullah bin Abdul Aziz. In the early 2000s he was hired by Khaled al-Tuwaijri to protect Saudi Arabia's reputation via an "electronic army". In 2008, he became responsible for media monitoring for the royal court. Al-Qahtani worked extensively with Hacking Team for espionage purposes. He was also reportedly active on the Hack Forums, using the username Nokia2mon2. He was officially appointed an advisor to the royal court in 2012 and was given the rank of minister in 2015. He was also President and Chairman of the Saudi Federation of Cyber Security, Programming, and Drones (SAFCSP). Al-Qahtani also served on the board of directors of King Abdul Aziz University, the MiSK Foundation, the Royal Commission for Al-Ula, and the Saudi Union for Cyber Security and Programming. 2016 US lobbying, foreign affairs In 2016, Al-Qahtani signed on two US lobbying firms: BGR Group "will provide public relations and media management services for The Center [for Studies and Media Affairs at The Saudi Royal Court], which includes both traditional and social media forums," for which they were to be paid US$500,000.00, while Squire Patton Boggs were to be paid $100,000 per month, plus expenses, for "legal and strategic policy advice and advocacy on foreign policy and related issues in the U.S. Government". During the 2017–18 Qatar diplomatic crisis, al-Qahtani urged Saudi citizens to identify suspected supporters of Qatar through a "Black List" hashtag on Twitter. He reportedly oversaw the interrogation of Saad al-Hariri during the 2017 Lebanon–Saudi Arabia dispute. Internal Saudi affairs In 2017, al-Qahtani was an instrumental figure in the 2017 Saudi Arabian purge, luring targets to The Ritz-Carlton, Riyadh by arranging fake meetings there. Al-Qahtani reportedly pressured detainees to sign over assets under threat of torture and imprisonment. In 2018, al-Qahtani reportedly oversaw the torture of several female activists in Saudi Arabia including Loujain al-Hathloul. The activists, who had been campaigning against the male guardianship system and for the right to drive, were reportedly subjected to sexual assault, electrical torture, flogging, and threats of rape and murder. Al-Qahtani was personally present during at least one of the interrogation session and is reported to have personally threatened to rape, murder, and dump the body of one of the activists into the sewers. Assassination of Jamal Khashoggi The United States intelligence community has identified al-Qahtani as the ringleader of the assassination of Saudi dissident and Washington Post journalist Jamal Khashoggi. Al-Qahtani acted as the head of what American intelligence officials called the Saudi Rapid Intervention Group, which has reportedly undertaken at least a dozen operations since 2017. Al-Qahtani had been in contact with Khashoggi since at least October 2017, alerting Khashoggi that his public writings were being monitored. Al-Qahtani was reportedly involved with luring Khashoggi back to Saudi Arabia, suggesting to Khashoggi that he might be able to work with Crown Prince Mohammed bin Salman. After the assassination of Khashoggi in the Saudi consulate in Istanbul on October 2, 2018, al-Qahtani was dismissed as the royal court's supervisor of media affairs. According to Arab and Turkish sources, al-Qahtani organized the Khashoggi operation, even calling into the consulate via Skype to talk with and insult Khashoggi before telling the assembled team: "Bring me the head of the dog." The Saudi state prosecutor announced on 15 November 2018 that 11 agents were indicted and 5 charged with murdering Khashoggi. He added that al-Qahtani met the leader of the team that killed Khashoggi before it was dispatched to Turkey. Al-Qahtani was not arrested.[ Saudi officials have never revealed the whereabouts of Khashoggi's remains. Prince Mohammed bin Salman exchanged at least 11 messages with al-Qahtani in the hours before and after the assassination of Khashoggi, leading the Central Intelligence Agency to conclude that Mohammed ordered Khashoggi's murder. A member of the Saudi hit team, Maher Mutreb, also called al-Qahtani to inform him that the operation has been completed. However, the message-exchange element of the report was contested by Saudi Arabia based on a confidential Saudi-commissioned investigation. In November 2018, Saudi authorities confirmed that he was being investigated and was barred to leave the country. On December 5, 2018, the Istanbul Chief Public Prosecutor's Office requested, and was issued, an arrest warrant for Saud al-Qahtani for the murder of Khashoggi. Saudi Minister of Foreign Affairs Adel al-Jubeir rejected Turkey's request for al-Qahtani's extradition on December 9, stating that Saudi Arabia does not extradite its citizens. In January 2019, the Saudi authorities were, according to The Washington Post, refusing to confirm the whereabouts of al-Qahtani. There were concerns that he could be influencing the investigation itself. Khalil Jahshan, executive director of the Arab Center based in Washington DC, stated in an interview with Al Jazeera, that al-Qahtani's "disappearance" was a "natural progression of [Saudi Arabia's] investigation" and is likely used as a strategy to keep crown prince Mohammed bin Salman protected from accusations regarding Khashoggi's murder: "They have sheltered some of the key players accused of being involved [in the murder] whether by Turkey or by the international community. The intention of the Saudi campaign right now is to keep the crown prince clear of any accusations with regards to the murder of Khashoggi." In December 2019, Saudi state TV reported that al-Qahtani was being investigated for his role in the murder of Khashoggi but was cleared of any charges as there was no proof of involvement. Five others were sentenced to death and another three given a combined 24-year prison sentence.[41] Agnès Callamard called the Saudi trials "the antithesis of justice", and "a mockery". Hacking Al-Qahtani was known to procure offensive hacking tools on behalf of the Kingdom of Saudi Arabia, among them tools made by the Italian company Hacking Team. On March 5, 2019, The Guardian reported that a strain had developed between King Salman and his son, Crown Prince Mohammad bin Salman. March 7, 2019, al-Qahtani reportedly signed an order instructing "a technical team to carry out the "penetration" of the Guardian's computer servers "in complete secrecy"". According to an analysis by FTI Consulting, al-Qahtani procured the tools used to hack Jeff Bezos' mobile phone (CEO of Amazon and owner of The Washington Post) - five months before the murder of Jamal Khashoggi. FTI Consulting was asked to look at Bezos' devices after the US tabloid The National Enquirer (publisher American Media Inc owned by David Pecker) exposed Bezos' relationship with his then mistress Lauren Sanchez. Bezos accused Pecker of trying to blackmail him with the threat of publishing "intimate photos" he allegedly sent to Sanchez. Bezos's team suggested it was an orchestrated take down by American Media Inc and the Kingdom of Saudi Arabia. The Guardian reported that a WhatsApp message sent from the personal account of Crown Prince Mohammad bin Salman was the source of the hack. A UN report came to the same conclusion, experts lent their weight to allegations that Crown Prince Mohammad bin Salman hacked the mobile phone of Bezos to “influence, if not silence” The Washington Post's reporting. Agnes Callamard, UN special rapporteur on summary executions and extrajudicial killings, and David Kaye, UN special rapporteur on freedom of expression, issued the joint statement, which emphasized that "at a time when Saudi Arabia was supposedly investigating the killing of Mr. Khashoggi, and prosecuting those it deemed responsible, it was clandestinely waging a massive online campaign against Mr. Bezos and Amazon targeting him principally as the owner of The Washington Post," ... "the alleged hacking of Mr. Bezos's phone, and those of others, demands immediate investigation by US and other relevant authorities, including investigation of the continuous, multi-year, direct and personal involvement of the crown prince in efforts to target perceived opponents." UN investigators concluded that Saudi use of the Pegasus spyware, which enables remote surveillance of cellphones, from controversial Israeli technology firm NSO Group was the “most likely explanation” the hacking attack against Bezos. Facebook, which owns WhatsApp, has since sued NSO Group in America. /$$$$$$ /$$ /$$ /$$ /$$ /$$ /$$ /$$__ $$ |__/ | $$ | $$$ /$$$ | $$|__/ | $$ \__/ /$$$$$$ /$$$$$$$ /$$ /$$$$$$ | $$ | $$$$ /$$$$ /$$$$$$ /$$$$$$$ /$$ /$$$$$$ | $$$$$$ /$$__ $$ /$$_____/| $$ |____ $$| $$ | $$ $$/$$ $$ /$$__ $$ /$$__ $$| $$ |____ $$ \____ $$| $$ \ $$| $$ | $$ /$$$$$$$| $$ | $$ $$$| $$| $$$$$$$$| $$ | $$| $$ /$$$$$$$ /$$ \ $$| $$ | $$| $$ | $$ /$$__ $$| $$ | $$\ $ | $$| $$_____/| $$ | $$| $$ /$$__ $$ | $$$$$$/| $$$$$$/| $$$$$$$| $$| $$$$$$$| $$ | $$ \/ | $$| $$$$$$$| $$$$$$$| $$| $$$$$$$ \______/ \______/ \_______/|__/ \_______/|__/ |__/ |__/ \_______/ \_______/|__/ \_______/ https://pastebin.com/u/nokia2mon2 https://www.reddit.com/user/nokia2mon2 https://forums.whonix.org/u/nokia2mon2 https://twitter.com/saudq1978 (suspended) https://ibb.co/wsBhf9n https://ibb.co/QH2VksX https://ibb.co/6NFrtXK (Password Reset) https://hackforums.net/member.php?action=profile&uid=80618 https://ibb.co/ScY4vH7 https://ibb.co/bs6tJxD (Omni) https://ibb.co/D5X46Sq https://wiki.hackforums.net/index.php/Nokia2mon2 /$$ /$$ /$$ /$$$$$$ /$$$$$$ /$$ /$$ /$$ /$$ | $$ | $$ | $$ /$$__ $$ /$$__ $$ | $$ |__/ |__/ | $$ | $$ | $$ /$$$$$$ /$$$$$$$| $$ /$$| $$ \__//$$$$$$ /$$$$$$ /$$ /$$ /$$$$$$/$$$$ /$$$$$$$ | $$ \ $$ /$$$$$$$ /$$$$$$ /$$ /$$ /$$ /$$ /$$$$$$ /$$ /$$ | $$$$$$$$ |____ $$ /$$_____/| $$ /$$/| $$$$ /$$__ $$ /$$__ $$| $$ | $$| $$_ $$_ $$ /$$_____/ | $$$$$$$$ /$$_____/|_ $$_/ | $$| $$ /$$/| $$|_ $$_/ | $$ | $$ | $$__ $$ /$$$$$$$| $$ | $$$$$$/ | $$_/ | $$ \ $$| $$ \__/| $$ | $$| $$ \ $$ \ $$| $$$$$$ | $$__ $$| $$ | $$ | $$ \ $$/$$/ | $$ | $$ | $$ | $$ | $$ | $$ /$$__ $$| $$ | $$_ $$ | $$ | $$ | $$| $$ | $$ | $$| $$ | $$ | $$ \____ $$ | $$ | $$| $$ | $$ /$$| $$ \ $$$/ | $$ | $$ /$$| $$ | $$ | $$ | $$| $$$$$$$| $$$$$$$| $$ \ $$| $$ | $$$$$$/| $$ | $$$$$$/| $$ | $$ | $$ /$$$$$$$/ | $$ | $$| $$$$$$$ | $$$$/| $$ \ $/ | $$ | $$$$/| $$$$$$$ |__/ |__/ \_______/ \_______/|__/ \__/|__/ \______/ |__/ \______/ |__/ |__/ |__/|_______/ |__/ |__/ \_______/ \___/ |__/ \_/ |__/ \___/ \____ $$ /$$ | $$ | $$$$$$/ \______/ Al-Qahtani used saudq1978@gmail.com for a wide range of online activities, including registering accounts on forums and social media sites. Both the @HIAHY Twitter account and Motherboard reported that saudq1978@gmail.com was used to register an account on the hacking website Hack Forums under the username nokia2mon2. Indeed, breach data from a June 2011 hack of the website, which is considered to be popular with low- skilled hackers and cybercriminals, associates saudq1978@gmail.com with the username nokia2mon2 and an IP address — 62.120.153[.]248 — that geolocates to Riyadh and is currently part of a subnet allocated to the Saudi telecommunications firm Etihad Etisalat. Al-Qahtani was an active Hack Forums member, posting more than 500 times47 and contributing more than $10,000 to the website between July 2009 and September 2016. He deleted at least 98 posts, as his member profile indicates that he posted 441 times, while a screenshot published by @HIAHY shows that he posted at least 539 times. Al-Qahtani never revealed his identity on the forum, but he did share biographical information about himself in one post, and his first name was disclosed by another Hack Forums user in a thread detailing a deal between the user and al-Qahtani. In October 2010, al-Qahtani wrote a post about himself in response to a thread recruiting members for a group calling itself The RATs Crew (a RAT, or “remote access trojan,” is a type of malware that lets hackers access and control an infected computer remotely).48 Al-Qahtani wrote that he was 33 years old and had used RATs since 2000. In fact, al-Qahtani was 32 at the time if he was born on July 7, 1978, as indicated by the U.S. Treasury Department.49 He wrote that he was from Saudi Arabia, and that he stopped using RATs by 2002, “becuse making my future :)” As described above, al-Qahtani was hired by former head of the Saudi royal court, al-Tuwaijri, to run an electronic media army charged with protecting Saudi Arabia’s image in the early 2000s. The previous October, a user called RelVlotelVlod started a thread in the “Secondary Sellers Market” subforum that listed al-Qahtani’s first name, Saud, in the the title of the post: “ME & saud Vps deal.”50 The deal described by RelVlotelVlod reads like a scam: al-Qahtani paid RelVlotelVlod $250 for bots on RelVlotelVlod’s “friend’s” botnet. RelVlotelVlod’s friend then banned him, according to RelVlotelVlod’s telling, so he asked al-Qahtani for an additional $20 to set up an IRC server for a botnet. This section details al-Qahtani’s activity on the forum, including: The scams he fell victim to https://twitter.com/HIAHY/status/902979053417848833/photo/1 https://hackforums.net/showthread.php?tid=151065&pid=7031243&highlight=becuse+making+my+future#pid7031243 https://www.treasury.gov/resource-center/sanctions/OFAC-Enforcement/Pages/20181115.aspx https://hackforums.net/showthread.php?tid=166087&pid=1565133&highlight=saud+vps+deal#pid1565133 Scammed On Day One Al-Qahtani had an inauspicious start on Hack Forums, where scams are not uncommon. He registered the nokia2mon2 account on July 28, 2009, according to his member profile. His first post, published on the same day, stated that he found Hack Forums after searching for a “fud server.” (“FUD” stands for “fully undetectable” and refers to malware that is fully undetectable by anti-virus software). He wrote that he bought a trojan from a user called “stronger7,” who taught him how to use the unnamed program: https://ibb.co/4WF63zh Other users in the thread commented that software being sold by stronger7 looked like a repackaged version of a RAT called Cerberus. Days later, on August 2, 2009, al-Qahtani wrote that his PC was infected by a virus and that he had to reformat it. Users immediately linked al-Qahtani’s computer problem with stronger7: “Your PC was probably infected with Strong7's SpyNet bullshit or w/e its called. You did buy that didn't you?” Al-Qahtani replied, “yes i buy it !! is it inficted???? [...] i dont think Strong7's will do that for me.. i think he is a very good man and look trusted!!!” Another user chimed in, “An another poor victim !” Stronger7 was apparently later banned by Hack Forums moderators. Al-Qahtani fell victim to at least two other scams while he was active on Hack Forums, and his account was hacked as well. https://hackforums.net/member.php?action=profile&uid=80618 https://en.wikipedia.org/wiki/Trojan_horse_(computing) https://hackforums.net/showthread.php?tid=114215&pid=1057777#pid1057777 In September 2010, a year after he was infected by stronger7, he said he got scammed out of $150 afte r paying a user called “MoBreeze” via Western Union “to give me my hacked hotmail password.” Five years later, in April 2015, he wrote that he was scammed out of $3,000 in Bitcoin by a user called “υNk.” Al-Qahtani did not indicate what he was trying to purchase. Al-Qahtani’s Bitcoin wallet address was not identified in the course of this investigation. In December 2015, al-Qahtani’s account was hacked. Someone using his account posted a thread asking to exchange $8,000 to Bitcoin. After three pages of posts vouching for nokia2mon2 and users expressing their amazement at the large sum, some Hack Forum members began suggesting that nokia2mon2’s account may have been hacked after noticing a change in the login IP address associated with the account and inconsistencies with previous posts: https://ibb.co/j4RjMmG The next day, the person controlling al-Qahtani’s account posted a thread asking for someone to exchange $1,900 to Bitcoin. Jesse LaBrocca, the administrator of Hack Forums, wrote that the thread “was not posted by account owner,” but not before a user sent the hacker controlling nokia2mon2 $500 via PayPal. Two weeks later, al-Qahtani started a thread titled “im back” in which he advised other Hack Forum members to set up two-factor authentication on their accounts and that he “fixed what the scammer did under my name so no one got harm because of my mistake”: https://hackforums.net/showthread.php?tid=711096 https://hackforums.net/showthread.php?tid=4777180&pid=45693982#pid45693982 https://hackforums.net/showthread.php?tid=5083921&page=9 https://hackforums.net/showthread.php?tid=5084797 https://hackforums.net/showthread.php?tid=5102030&pid=49047929#pid49047929 https://ibb.co/58Jb5HW RATs, Botnets And DDoS Attacks Over the course of the seven years that he was active on the Hack Forums, al-Qahtani acknowledged purchasing and using at least two dozen hacking tools and services, most of which require little technical knowhow. The tools and services he used were mostly RATs, crypters, worms and DDoS-for-hire bots. Used RAT Targeted In Worldwide Law Enforcement Operation Al-Qahtani showed an interest in RATs and crypters from the first days he joined Hack Forums (a crypter is a type of software that encrypts or otherwise obfuscates malware to make it harder to detect by anti- virus programs). In his second post on the forum, in July 2009, al-Qahtani asked for recommendations for “a powerfull crypter that can work with all rat and make it full FUD and work very stable.”59 By June 2011, less than two years after joining the forum, he estimated that he had 90% of paid and free RATs on the market.60 He specifically mentioned using: ● Blackshades ● Poison Ivy ● Cybergate ● Albertino Advanced RAT ● Nullbot ● Netwire He also mentioned using at least nine crypters: ● Alpha Crypt ● Tejon Crypter v1.2 https://hackforums.net/showthread.php?tid=111226 https://hackforums.net/showthread.php?tid=1250098&pid=12842475#pid12842475 ● PolyCrypt ● Damla Protector ● Darty ● Dark Eye ● Dizziness ● Cube ● p3rfix In the June 2011 post mentioned above, he sang Blackshades’ praises, describing it as the “best choice”: https://ibb.co/JB7MmPw The hosting infrastructure al-Qahtani set up to use Blackshades was identified in the course of this investigation and is detailed in Section V. Blackshades, which sold for as little as $40 on Hack Forums, targets Microsoft Windows-based operating systems and allows hackers to secretly and remotely control a victim’s computer via a graphical user interface. Once infected, a hacker can use the victim’s computer to access and modify files; activate the webcam; record keystrokes; steal passwords; and include the computer in a botnet for DDoS attacks. Al-Qahtani’s use of Blackshades is notable, given that the malware was the impetus for what was described by the U.S. Department of Justice (DOJ) as the “largest-ever global cyber law enforcement operation.”61 In May 2014, the DOJ announced that more than 90 people had been arrested in 19 countries to combat the sale and use of the RAT, which had been purchased by thousands of individuals in more than 100 countries and had infected more than 500,000 computers. The two-day operation involved 359 house searches and the seizure of more than 1,100 electronic devices, according to EUROPOL.62 Among those arrested was Blackshades co-creator Michael Hogue, who went by xVisceral on Hack Forums. In an October 2010 post, al-Qahtani wrote that he was having trouble installing the crypted version of Blackshades on 100 machines.64 xVisceral remotely accessed al-Qahtani’s computer (or “tv on https://www.justice.gov/usao-sdny/pr/manhattan-us-attorney-and-fbi-assistant-director-charge-announce-charges-connection https://www.europol.europa.eu/newsroom/news/worldwide-operation-against-cybercriminals https://blog.malwarebytes.com/cybercrime/2012/07/blackshades-co-creator-arrested/ https://hackforums.net/showthread.php?tid=742597&pid=7118882&highlight=blackshades#pid7118882 my pc,” as al-Qahtani put it) and installed 20 uncrypted versions on 20 machines “and its work great.. very great. Al-Qahtani may have used Blackshades for DDoS attacks (there is overlap between DDoS bots and RATs with DDoS capabilities). However, he also showed an interest in remotely accessing the microphones of computers to create secret recordings. In a May 2013 thread, al-Qahtani offered $100 for the best recommendation on how to surreptitiously record a room, save the file and upload it to his web server or send it to himself via email.65 He said he had physical access to about 10 Windows computers and that he needed to know which PC the recording had come from. “its must save the voices in the rooms in the best quality, and its must be very stable, and upload the sound file every 3 hours or something like that,” he wrote. “and offcourse all must be hidden so no one knows that his voice is recorded.” One Hack Forums member suggested that he use a RAT along with a recording program, but al-Qahtani replied that he had tried that but wanted a more professional solution: “that what i used and i dont like it, i want better profeseenal way.” A user called “Glassy” suggested the winning solution, though apparently via private message or in a now-deleted post. Al-Qahtani appears to have continued to work behind the scenes with Glassy. A year and a half after suggesting the winning solution, Glassy described al-Qahtani as “my best partner” in a post lauding the Saudi for donating to Hack Forums. Tried To Hire DDoS Professional To Manage Botnet As with RATs, al-Qahtani said he purchased and used “almost all” of the DDoS bots for sale on Hack Forums. Among the DDoS bots and DDoS for hire services he used were: ● D-Doser (versions 3.6 and 4.2) ● ChickenX Shell Shop ● Optima ● 3vBot ● Tippy’s DDOS service ● OncleSam DDOS service Initially, al-Qahtani attempted to hire someone to manage his botnet and DDoS for him. In October 2009, a few months after he joined the forum, al-Qahtani posted an ad for someone who was skilled in DDoS attacks, offering a salary of $500 per month. https://hackforums.net/showthread.php?tid=3474577&pid=32582842#pid32582842 https://hackforums.net/member.php?action=profile&uid=734805 https://hackforums.net/showthread.php?tid=4473706&pid=42672088#pid42672088 https://hackforums.net/showthread.php?tid=966048&pid=12314690#pid12314690 https://hackforums.net/showthread.php?tid=161701 https://ibb.co/2dJrbX6 After no one replied, he upped the salary to $700 per month and wrote, “my first dude stope working becuse his educiton.” Al-Qahtani later wrote that he was “stell waiting” for a response. A year later, in September 2010, he published a thread titled, “admin for ddos server” in which he wrote that he was starting “from 0 again” and that he needed a good admin that he was willing to pay $500 per month.70 He asked for 5,000 bots to start, hosted in the U.S., Canada, U.K., Saudi Arabia, Kuwait, Dubai and “eurobek.” https://ibb.co/bR0J4Br The following day, he wrote that he had been private messaged (PM’d) by scammers, and that he will ask candidates to DDoS one to two websites “for minute to make sure about u.” He added that he would not DDoS more than two to three sites per day and that “for many days i will not do any thing ... but the salary will be paying any way.” A user suggested that al-Qahtani was overpaying: “500? i dont know but that seems, a bit much? If you could set it up your self it could be much cheaper. i think, But you sure are rich :P” In October 2010, he outlined71 what he was looking for in an IRC bot Days later, al-Qahtani thought he had paid $250 for “thosands of great bot that have all facility to make heavy ddos attack.” Using al-Qahtani’s first name in the title of the thread, as described above, a user called RelVlotelVlod described a deal with al-Qahtani that may have been a scam.: https://hackforums.net/showthread.php?tid=707209 https://hackforums.net/showthread.php?tid=741728&pid=7037024#pid7037024 https://en.wikipedia.org/wiki/Botnet#IRC https://ibb.co/dB62w8p RelVlotelVlod claimed that after al-Qahtani paid him for bots on his friend’s botnet, his friend banned him. RelVlotelVlod offered to set up an IRC server for a botnet for $20 instead. “he promise he will full support the server and make sure bots not loses and he will give me a full support for every think even update bot crypted,” al-Qahtani replied. He also tried hiring RelVlotelVlod: “i promise him that when we finish i will give him a monthly salary.” Al-Qahtani discussed his efforts at DDoSing sites on several occasions. He never named the websites he targeted. In November 2009, he wrote that he was having problems DDoSing a website due to the site’s administrator blocking connections from all but one country: “i ddos site from my bots but site not down.”73 In January 2011, he recommended using Optima: “i down large site in 300 bot only .. all my irc bot cant down it in 3-4k :) amazing.”74 The same month, he asked for advice on how to hack or DDoS a PalTalk room with about 2,000 members.75 In March 2012, he described a DDoS for hire service called OncleSam as “the most professional DDoS Services i used in the hf, i will use it again and again :D”76 Al-Qahtani took down a site for 48 hours and caused the victim to change their hosting provider, according to his post. https://hackforums.net/showthread.php?tid=181966&pid=1717326&highlight=ddos#pid1717326 https://hackforums.net/showthread.php?tid=906835&pid=9248605&highlight=ddos#pid9248605 https://hackforums.net/showthread.php?tid=975055&pid=9054188#pid9054188 https://hackforums.net/showthread.php?tid=2827716&pid=26375253&highlight=ddos#pid26375253 Targeted Users On Major Social Media Platforms, WhatsApp True to his reputation for being Saudi Arabia’s social media enforcer, al-Qahtani paid to have accounts deleted and sought to manufacture engagement activity on major social media platforms, including YouTube and Facebook. He also sought a tool that would allow him to suspend Twitter accounts and tested an exploit that was supposed to crash a user’s WhatsApp. Al-Qahtani also demonstrated his petty side by asking how to kick players from a Facebook game Paid To Have YouTube Channel, More Than 20 Videos Deleted Al-Qahtani sought to artificially boost the popularity of unnamed YouTube accounts and videos and claimed to have had “many” YouTube videos and at least one channel deleted from the platform. In October 2010, al-Qahtani purchased iTube 2.2, a YouTube bot billed as a “professional YouTube promotion tool.” The tool included a slew of features, including “Views Booster,” which allows users to artificially increase the number of views on a video using a botnet, and “Mass Flagger,” which let users use their YouTube accounts “to flag a competing video and have it removed from youtube.” A year later, in October 2011, he started a thread indicating that he was interested in purchasing 1,000 to 2,000 verified YouTube accounts. “i will change the passwords so its will be for me only..” he wrote. “Your offer please.” No one publicly took al-Qahtani up on his request, but the following day, he vouched for a user called “bloodgen” from whom al-Qahtani said he purchased 500 YouTube accounts but received 525.78 In the same post, he said he had been sold accounts by other users did not work or were not “pva” (phone-verified accounts). The day before, al-Qahtani had also purchased 6,000 YouTube likes. In February 2012, he unsuccessfully tried to order 100,000 YouTube views. Al-Qahtani also paid Hack Forum members to delete YouTube videos and at least one channel. In February 2011, al-Qahtani vouched for a user called “ruNe0,” who offered to delete any YouTube video for as low as $6. (When asked to delete a Justin Bieber video, ruNe0 conceded that he could not: “Hihihi its impossible this kid so famous and partner too, it's me who is to be banned = D.”) Al-Qahtani said ruNe0 “delete for me many many youtube video .. all deals was smooth.” A month later, al-Qahtani vouched for ruNe0 again and said that he deleted “more than 20 videos” for him. In October 2011, al-Qahtani told ruNe0 that he had PM’d him a new channel to delete, suggesting that ruNe0 had deleted at least one channel for al-Qahtani previously. In June 2013, al-Qahtani started a thread titled, “delete video in youtube 200$,” writing, “tell me the time u need to do the job ,, i want ASAP.” Two days later, a user called “Venture Mogul” wrote that he got it taken down. Al-Qahtani replied, “check your paypal , u got the 200$ ... Regards.” In April 2016, al-Qahtani started a thread indicating that he was looking for someone to build a YouTube bot that would: https://hackforums.net/showthread.php?tid=753917&pid=7256067#pid7256067 https://hackforums.net/showthread.php?tid=749400&pid=16603568#pid16603568 https://hackforums.net/showthread.php?tid=945525&pid=16578821#pid16578821 https://hackforums.net/showthread.php?tid=1873394&pid=19632477#pid19632477 https://hackforums.net/showthread.php?tid=910111&pid=10088370#pid10088370 https://hackforums.net/showthread.php?tid=910111&pid=10332009#pid10332009 https://hackforums.net/showthread.php?tid=3557857&pid=33357383#pid33357383 https://hackforums.net/showthread.php?tid=5230150&highlight=youtube Sought Tool To Ban Twitter Account In June 2011, al-Qahtani tried to buy tools that would let him ban Twitter accounts: “i want buy tools that can banned or freeze twitter account. any offer?” After receiving few responses, he wrote that he would pay $500 for a tool that would even “freeze” an account for 24 hours if he could do it repeatedly. One user suggested that such tools do not exist, “but if you have access to the database for twitter then you can do anything.”In April 2012, al-Qahtani asked about a Twitter account-cracking tool being sold for $20.86 “how fast is it? how many password in second its try?” He also asked whether it would bypass CAPTCHAs. In October 2018, The New York Times reported that al-Qahtani was the strategist behind an effort to harass and silence critics of the kingdom on Twitter by using troll farms consisting of hundreds of young men in and around Riyadh.87 The Times also reported that a Twitter employee, Ali Alzabarah, was persuaded by Saudi intelligence “to peer into several user accounts, according to three of the people briefed on the matter.” Alzabarah, who joined Twitter in 2013, had access to users’ personal information and account activity, including IP addresses and phone numbers. He was fired in 2015, despite Twitter having found no evidence that he provided the Saudi government with Twitter data. He returned to Saudi Arabia and now works in the government, according to a Times source. Owned “Many Facebook Accounts” In February 2011, al-Qahtani started a thread titled, “facebook script or software that can add like and comments for thousand of accounts.”88 It is not clear from the post whether he owned thousands of Facebook accounts or if he wanted a tool that would allow him to like and comment on thousands of accounts’ posts. “i have many facebook accounts,” he wrote. “i want the best software/script that i can insert all the accounts on it and send command by the software/script.. and its do the like from all the accounts and add comments..” 85 https://hackforums.net/showthread.php?tid=1431286&pid=13126931&highlight=twitter#pid13126931 86 https://hackforums.net/showthread.php?tid=2424661&pid=21968194&highlight=twitter#pid21968194 87 https://www.nytimes.com/2018/10/20/us/politics/saudi-image-campaign-twitter.html 88 https://hackforums.net/showthread.php?tid=1065979&pid=9894520#pid9894520 Tested Exploit For Crashing WhatsApp Al-Qahtani also indicated an interest in WhatsApp tools. In December 2014, he wrote that he tried using an exploit that would crash a users’ WhatsApp, but it did not work for him on iOS.89 In May 2015, he started a thread asking for the “best whatsapp panel bulk/checker in market.”90 Two users responded, but al-Qahtani did not post again in the thread Wanted To Kick Players From Facebook Game, Bought Coins For 8 Ball Pool Game The only other reference to Facebook identified was in April 2013, when he offered to pay $500 for a script that would show the IP address of players in a Facebook game called War Commander. “i need software show me any player ip in the same sector or other sector by there id or name. i will pay 500$ for that,, and mybey i will increase that if i like what i see. i will use it to kick some bad players ;).” In October 2014, he also suggested that he had hacked the game 8 Ball Pool for iOS. The same day, he offered to buy all of the 8 Ball Pool coins being sold by a user ($2 for one million coins), and in another post on the same day, he offered to buy an 8 Ball Pool account with one billion coins for $700, even though another user claimed to have recently sold their one billion-coin account for $25. Opined About God, Obama, Kashmir In four posts on October 10 and 11, 2010, al-Qahtani opined on subjects unrelated to hacking, including Iran, Kashmir and religion. Al-Qahtani started a thread titled, “Obama and the soft or hard or smart power.. what will work with iran?” in which he called then-President Obama “a realy humanity leader for the earth” and argued that President Obama needed to use soft, smart and hard power when dealing with Iran. In a thread on India and Pakistan, al-Qahtani weighed in on the Kashmir conflict: “the only solution is give Kashmirs people The right to self-determination under UN auspices, or make it a Separate Nation.” https://hackforums.net/showthread.php?tid=3410601&pid=31991490#pid31991490 https://hackforums.net/showthread.php?tid=3997427&pid=42667955#pid42667955 https://hackforums.net/showthread.php?tid=4438718&pid=42668053#pid42668053 https://hackforums.net/showthread.php?tid=4335239&pid=42668157#pid42668157 https://hackforums.net/showthread.php?tid=4566034&pid=43622761#pid43622761 https://hackforums.net/showthread.php?tid=4819790&pid=46116587#pid46116587 https://hackforums.net/showthread.php?tid=732501&pid=6955346#pid6955346 https://hackforums.net/showthread.php?tid=720377&pid=6965503#pid6965503 https://ibb.co/VtBd9Xp Posted While Drunk Al-Qahtani wrote that he was drunk in three posts at the end of 2010. Alcohol is illegal in Saudi Arabia and punishable by flogging or worse, though it has been reported that some members of the royal family have flouted the prohibition with impunity. In October 2010, al-Qahtani sponsored a contest for the best tutorials pertaining to a range of subjects, including programming, graphics, hacks and exploits.97 The winners of the contest received forum upgrades purchased by al-Qahtani. Responding to the apparently lackluster response, al-Qahtani wrote that he was drunk and wanted better tutorials: https://ibb.co/VjLRP3J The following month, al-Qahtani sponsored another contest.98 When the contest was over, he congratulated the winners and wrote, “im on party and drunk and now im really happy cheers to hf.. brb will go to drink tackila and dance lol.” https://hackforums.net/showthread.php?tid=721169&pid=6965546#pid6965546 https://hackforums.net/showthread.php?tid=305159&pid=6965603#pid6965603 https://plato.stanford.edu/entries/pascal-wager/index.html https://www.theguardian.com/world/2010/dec/07/wikileaks-cables-saudi-princes-parties https://hackforums.net/showthread.php?tid=738021&pid=7014461#pid7014461 https://hackforums.net/showthread.php?tid=781348&pid=7485785#pid7485785 In December 2010, al-Qahtani wrote that he was a “little drounk” in a post vouching for a user from whom he said he purchased 1,000 bots: https://ibb.co/n3Ph0hW && https://ibb.co/M1y5W7m Used PayPal, Provided Hotmail Email As seen in the screenshot in the beginning of this section, al-Qahtani wrote in his first Hack Forums post that he used PayPal to buy malware from the user stronger7. He would mention using PayPal for various purchases in at least a dozen other posts. In an April 2016 post, he specified that he could pay only via PayPal or Visa. According to information leakage from PayPal’s password recovery site, saudq1978@gmail.com is connected to a PayPal account linked to a Visa ending in 10 and the following partially redacted p hone number: 05* *** *750 that corresponds with al-Qahtani’s Saudi Telecom Company cell phone number, +966 55 548 9750.101 In a December 2010 post, al-Qahtani sought to purchase 3,000 installs or updates. He wrote that he would pay via “pp only,” referring to PayPal. He also provided a new email address: nokia2mon2@hotmail.com. He posted the email address at least one other time two months earlier, in October 2010, when he asked the seller of a Windows server exploit to add him on MSN.103 Nokia2mon2@hotmail.com is connected to a Microsoft Live account and a Skype profile with the handle “test test 1.” According to information leakage from Microsoft Live’s password recovery page, the email address is connected to a partially redacted phone number (********72) and email address (al*****@hotmail.com) that were not identified during the course of this investigation. https://hackforums.net/showthread.php?tid=914890&pid=8487820#pid8487820 https://hackforums.net/showthread.php?tid=5230150&pid=50476121#pid50476121 https://en.wikipedia.org/wiki/Telephone_numbers_in_Saudi_Arabia https://hackforums.net/showthread.php?tid=890641&pid=8276669#pid8276669 https://hackforums.net/showthread.php?tid=746882&pid=7144180#pid7144180 Paid $1,500 For Hack Of Hotmail Accounts Al-Qahtani hired Hack Forum members to hack specific Hotmail accounts and provide him with the credentials. In October 2010, he started a thread offering to pay $300 for the password to a Hotmail account.104 Ten days later, he wrote that many users had tried but failed to hack the account. “i don't have any info about the account, only the account id, if any one can do it pls pm me.” In March 2012, al-Qahtani started a thread requesting the hack of three Hotmail accounts, offering to pay $500 for each account.105 He edited the thread six days later indicating his success: “i hacked the emails,” he wrote. “the offer is finished.” Days later, al-Qahtani wrote that Microsoft had locked him out of one of the Hotmail accounts he had hacked. He posted the message he received, which read in part, “Often customers get here because someone else has access to your account and are using it without your knowledge to send spam.” Al- Qahtani said that his IP address was in the same country as the genuine account owner and that he knows the account owner’s “town and name only.” He did not say whether or not he had any luck getting back into the compromised account. Tried Cracking Wireless Networks, Published First Script Al-Qahtani showed an interest in cracking wireless networks (e.g. Wi-Fi) beginning in 2011. In September 2011, he responded to a thread by a user called “Middle,” who offered to sell their hacking skills or teach others for a fee.106 Al-Qahtani wrote that Middle gave him “great lessons” on wireless cracking. Two months later, in November 2011, al-Qahtani started a thread explaining that the wireless cracking tool Pyrit was not reading his graphics card and offered $20 to whomever could “fix it to me by tv and show me what was the wrong and how i can use pyrit.”107 Al-Qahtani indicated that he was using BackTrack 5 R, a predecessor to the penetration testing Linux distribution Kali Linux. Days later, he posted a thread asking for help with oclHashcat, a password cracking tool.108 According to the tool’s output, which al-Qahtani included in his post, his system was overheating while trying to crack a hashed Wi-Fi password (WPA/WPA2), causing the tool to abort. https://hackforums.net/showthread.php?tid=713739&pid=6781390#pid6781390 https://hackforums.net/showthread.php?tid=2303129&pid=20776371#pid20776371 https://hackforums.net/showthread.php?tid=1700336 https://hackforums.net/showthread.php?tid=1899278&pid=17200084#pid17200084 https://hackforums.net/showthread.php?tid=1907397&pid=17267259#pid17267259 https://ibb.co/HzJrLNz Al-Qahtani concluded his Hashcat thread by explaining he was new to wireless cracking: “please answer me with details im new in that.” Three years later, in December 2014, he shared109 “a small script to help you crack WPA/WPA2” and posted a link to a Pastebin post110 titled, “Red Lions WPA/WPA2 Cracker V1 BETA” (Red Lions was a Hack Forums group headed by al-Qahtani). He wrote in the comments of the script that it was the first he had written and that it was “intended for the sole purpose of penetration testing only.” Al-Qahtani created the Pastebin post using an account with the same username as his Hack Forums profile, nokia2mon2.111 The account was created the same day that he shared the script on Hack Forums, and there were no other pastes under his account. https://hackforums.net/showthread.php?tid=4580080&pid=43766880#pid43766880 https://pastebin.com/A7HMFDWQ https://pastebin.com/u/nokia2mon2 Sought iOS Spyware In 2014 and 2015, al-Qahtani requested hacking tools for Apple products. In March 2014, he posted a thread asking whether any RATs existed that could infect Macs.112 Some users mentioned jRAT but suggested that it was no longer being sold. As was often the case, al-Qahtani’s request was time sensitive: “any other option guys?????? i need it now :D” In October that same year, a user called “Sam Sung” started a thread in which he described seeing a spyware app on his friend’s iPhone 5. In what was almost certainly a scam post, Sam Sung said that he tried to find the spyware online, but his friend said the developer wanted to keep a low profile to keep it hidden from Apple. Al-Qahtani was the first to comment on the thread, writing, “if u find it i will buy it and will give u bonus if its will work.”113 Sam Sung replied the next day, “hi yes I found it,please PM me your skype.” Tried Buying Fake Traffic For Twitter Follower’s Website In January 2012, al-Qahtani posted a thread asking to buy 100,000 visits to “a page on http://twitemail.com” and specified that delivery must be within 24 to 48 hours.114 “i dont care if its fake.. its must only increase the counter.” Twitemail.com was and continues to be registered to a Saleh Al-Zaid in Riyadh, according to Whois records. The domain redirects to twitmail.com, which is also owned by al- Zaid. Twitmail allows users to share their emails on Twitter, according to the website. Zaid is a “partner technology strategist” for Microsoft in Riyadh, according to his LinkedIn profile.115 He is also the CEO of LunarApps, a company he founded in 2011. Twitmail is one of LunarApps’ three main products, the other two being Untiny.com — a shortened link expander — and TwtBase.com, a “classified directory of Twitter apps in the market,” according to Zaid’s LinkedIn profile. Al-Zaid116 and al-Qahtani follow each other on Twitter Sought Dedicated Server In Russia Or China To Host Exploits, Botnet In 2010, al-Qahtani twice asked about purchasing servers for hosting exploits and botnets. In October, he started a thread in the “Buyers Bay” sub-forum with the title, “hosting that will be house ing an expliot system and an http bot.” His post got right to the point: “i would like to purchase bullet proof hosting that will be house ing an expliot system and an http bot.” Nine days later, a user said they could provide good hosting, but less than two months later, in December, al-Qahtani posted another thread with the same request: “need: dedicated server for botnet and exploits.” Al-Qahtani expanded on what he was looking for, saying that he wanted a dedicated server located in Russia or China. “If you guys know any good company which are providing dedicated server and they allow irc botnet , exploits , etc . just drop their links ..” This second thread received twice as many responses with one user saying that they had PM’d him and cautioning that such servers could be expensive, but “For Russia check out wahome.ru.” In fact, al-Qahtani had been using a U.S.-based hosting provider, ThePlanet.com, which had a reputation for showing persistent malicious behavior, such as hosting botnets or drive-by download sites. The following section details al-Qahtani’s hosting infrastructure. https://hackforums.net/showthread.php?tid=4114113&pid=38887802#pid38887802 https://hackforums.net/showthread.php?tid=4473189&pid=42687570#pid42687570 https://hackforums.net/showthread.php?tid=2167789&pid=19561996&highlight=vistes#pid19561996 https://www.linkedin.com/in/salehalzaid/ https://twitter.com/alzaid https://en.wikipedia.org/wiki/Exploit_(computer_security) https://hackforums.net/showthread.php?tid=713372&pid=6777840#pid6777840 https://hackforums.net/showthread.php?tid=927958&pid=8602127#pid8602127 /$$ /$$ /$$ /$$ /$$ | $$ /$ | $$ | $$ |__/ | $$ | $$ /$$$| $$ /$$$$$$ | $$$$$$$ /$$$$$$$ /$$ /$$$$$$ /$$$$$$ /$$$$$$$ | $$/$$ $$ $$ /$$__ $$| $$__ $$ /$$_____/| $$|_ $$_/ /$$__ $$ /$$_____/ | $$$$_ $$$$| $$$$$$$$| $$ \ $$| $$$$$$ | $$ | $$ | $$$$$$$$| $$$$$$ | $$$/ \ $$$| $$_____/| $$ | $$ \____ $$| $$ | $$ /$$| $$_____/ \____ $$ | $$/ \ $$| $$$$$$$| $$$$$$$/ /$$$$$$$/| $$ | $$$$/| $$$$$$$ /$$$$$$$/ |__/ \__/ \_______/|_______/ |_______/ |__/ \___/ \_______/|_______/ safcsp.org.sa aldewan-almalaky.com aldewan-sa.com aldewanalmalaky.com aldewanksa.com aldewannews.com dewanmalaky.com fahadserver.com jasmn.info ksa-aldewan-almalaky.com kt-library.com m-d-sa-news.com markaz-dewan.com markaz-dewan.net markaz-royal.com markaz-royal.net royalcourt-ksa.com royalcourt-sa.com royalcourt-saudi-arabia.com sa-aldewan-almalaky.com saudidewan.com saudq.com saudqq.com markaz-royal[.]net were used by al-Qahtani to host malicious payloads and were detected as running malware such as Blackshades and Darkness/Optima. The host nokia2mon2.markaz-royal[.]net was included in a list of more than 13,000 hosts identified by the FBI as being involved with Blackshades activity and was was also observed as hosting a shell booter, which allows compromised websites to be used for DDoS attacks. Another subdomain, saud4.markaz-royal[.]net, hosted Optima malware, based on Wayback Machine snapshots, which captured a Russian FAQ page (https://web.archive.org/web/20110820013508/http://saud4.markaz-royal.net:80/faq.html) for Optima and the login page (https://web.archive.org/web/20110718034435/http://saud4.markaz-royal.net:80/adm/auth.php)for the Optima control panel. In September 2016 and October 2016, two iterations of a text file hosted on a saudqq[.]com host were preserved by the Wayback Machine and include what appear to be SMS logs of two-factor authentication codes, login notifications and other communications sent to approximately one dozen phone numbers across Canada. The September 2016 capture shows logs for 12 SMS messages to Canadian numbers with area codes for Quebec (450) and Manitoba (204). The messages were sent from Canadian numbers with area codes for Ontario (289, 705), Toronto (647), Montreal 438) and Alberta (403). All of the messages are WhatsApp verification codes, except for one Google verification code (personally identifying information has been redacted): https://ibb.co/jMVMfN7 /$$ /$$ /$$ /$$ /$$$$$$$ /$$ /$$ | $$ |__/ | $$ | $$ | $$__ $$ | $$$ | $$ | $$ /$$ /$$$$$$$ | $$ /$$ /$$$$$$ /$$$$$$$ | $$ \ $$ /$$ /$$ | $$$$| $$ /$$$$$$ /$$$$$$/$$$$ /$$$$$$ | $$ | $$| $$__ $$| $$ /$$/ /$$__ $$ /$$__ $$ | $$$$$$$ | $$ | $$ | $$ $$ $$ |____ $$| $$_ $$_ $$ /$$__ $$ | $$ | $$| $$ \ $$| $$$$$$/ | $$$$$$$$| $$ | $$ | $$__ $$| $$ | $$ | $$ $$$$ /$$$$$$$| $$ \ $$ \ $$| $$$$$$$$ | $$ | $$| $$ | $$| $$_ $$ | $$_____/| $$ | $$ | $$ \ $$| $$ | $$ | $$\ $$$ /$$__ $$| $$ | $$ | $$| $$_____/ | $$$$$$$$| $$| $$ | $$| $$ \ $$| $$$$$$$| $$$$$$$ | $$$$$$$/| $$$$$$$ | $$ \ $$| $$$$$$$| $$ | $$ | $$| $$$$$$$ |________/|__/|__/ |__/|__/ \__/ \_______/ \_______/ |_______/ \____ $$ |__/ \__/ \_______/|__/ |__/ |__/ \_______/ /$$ | $$ | $$$$$$/ \______/ APOLLO_IO_129M_MARKETING_2018 email sal-qahtani@tcc-ict.com name Saud Al-Qahtani country Saudi Arabia linkedin http://www.linkedin.com/in/saud-al-qahtani-b6009497 job Digital Forensics Engeering company TECHNOLOGY CONTROL CO. APOLLO_IO_129M_MARKETING_2018 email s.al-qahtani@mobily.com.sa name Saud Al-Qahtani country Saudi Arabia linkedin http://www.linkedin.com/in/saud-al-qahtani-38a0b640 job Retail Sales Principal Officer company Mobily APOLLO_IO_129M_MARKETING_2018 name Saud Al-Qahtani country Saudi Arabia linkedin http://www.linkedin.com/in/saud-al-qahtani-782a4137 job GM company WFE prod CANVA_COM_133M_DESIGN_052019 username saudhaif1999 email saudhaif1999@gmail.com name Saud al-Qahtani id 8743472 id_hash UABpJj8dG4g create_date 2016-01-27 14:16:11 mail_status C temporary 0 roles U deactivated 0 ui_info {hasUpdatedSvgPlaceholder:true} locale en personal_brand 8768980 personal_brand_id BABpJkTXPWM ZOOSK_COM_28M_DATING_012020 username Saud email engali97@hotmail.com name Saud Al-Qahtani gender male wants women birthday 1977-11-19 latitude 21516944 longitude 39219167 country SA regdate 2008-01-04 16:52:09 height 178 children 0 balance 0 dscore 249 LUMINPDF_COM_24M_SERVICE_2019 email s1419s1@hotmail.com name saud Al-Qahtani lang ar gender male EYEEM_COM_20M_STORE_2018 username SaudAlqahtani email saud.naq@hotmail.com name Saud Al-qahtani YOUNOW_COM_40M_SOCIAL_072017 username pseeta_85674 lastip 2.88.246.1 Riyadh, Riyadh Region, Saudi Arabia name Saud Al-Qahtani proxy_ip 188.114.102.216 YOUNOW_COM_40M_SOCIAL_072017 username SaudAl-Qahtani_1 email tfker7lo@hotmail.com lastip 77.30.88.138 Riyadh, Riyadh Region, Saudi Arabia name Saud Al-Qahtani facebook tfker7lo@hotmail.com facebook_id 100000025326470 proxy_ip 93.169.193.19 YOUNOW_COM_40M_SOCIAL_072017 username noltit lastip 51.235.208.138 Riyadh, Riyadh Region, Saudi Arabia name Saud Al-Qahtani proxy_ip 198.143.55.1 YOUNOW_COM_40M_SOCIAL_072017 username SaudAl-qahtani_4 lastip 94.98.20.252 Riyadh, Riyadh Region, Saudi Arabia name Saud Al-qahtani facebook sauod-1431@hotmail.com facebook_id 100003596728477 proxy_ip 51.36.61.246 YOUNOW_COM_40M_SOCIAL_072017 username Shwit email saudhaif1999@gmail.com lastip 2.90.125.6 Riyadh, Riyadh Region, Saudi Arabia name Saud al-Qahtani google_id 106589289102388463152 proxy_ip 207.244.77.234 YOUNOW_COM_40M_SOCIAL_072017 username SaudAl-qahtani_44385 lastip 88.5.193.244 Zaragoza, Aragon, Spain name Saud Al-qahtani YOUNOW_COM_40M_SOCIAL_072017 username SaudAl-Qahtani_76416 lastip 188.48.134.47 name Saud Al-Qahtani facebook_id 243301092731460 proxy_ip 149.126.78.9 YOUNOW_COM_40M_SOCIAL_072017 username Qs117 lastip 46.152.0.233 Riyadh, Riyadh Region, Saudi Arabia name Saud Al-Qahtani proxy_ip 141.101.105.15 YOUNOW_COM_40M_SOCIAL_072017 username Saud_q7887 lastip 185.5.152.190 name Saud Al-qahtani facebook_id 724108041035883 proxy_ip 198.143.55.25 YOUNOW_COM_40M_SOCIAL_072017 username SaudAl-Qahtani_37209 email aaa308411@gmail.com name Saud Al-Qahtani facebook aaa308411@gmail.com facebook_id 122239361677426 proxy_ip 5.41.75.16 YOUNOW_COM_40M_SOCIAL_072017 username SaudAl-Qahtani_2 email radoi-8@windowslive.com lastip 94.96.249.79 name Saud Al-Qahtani YOUNOW_COM_40M_SOCIAL_072017 username SaudAl-Qahtani_89619 email klash_8000@hotmail.com lastip 93.168.126.59 Riyadh, Riyadh Region, Saudi Arabia name Saud Al-Qahtani facebook klash_8000@hotmail.com facebook_id 1267378336625632 YOUNOW_COM_40M_SOCIAL_072017 username saudgamezr email saud.gamezr@gmail.com lastip 51.36.60.160 Riyadh, Riyadh Region, Saudi Arabia name Saud AL-Qahtani google_id 117775905997146866107 proxy_ip 54.240.145.8 YOUNOW_COM_40M_SOCIAL_072017 username SaudAl-Qahtani_5 email kash.505@hotmail.com lastip 94.98.92.74 name Saud Al-Qahtani facebook_id 100003689256451 proxy_ip 188.114.103.128 YOUNOW_COM_40M_SOCIAL_072017 username SaudAl-qahtani_3 email saud.h.q@hotmail.com lastip 50.191.125.216 Pittsburgh, Pennsylvania, United States name Saud Al-qahtani facebook saud.h.q@hotmail.com facebook_id 100002409715770 proxy_ip 149.126.78.67 YOUNOW_COM_40M_SOCIAL_072017 username SaudAl-qahtani_7 email saud1994@hotmail.com lastip 119.63.142.29 Lahore, Punjab, Pakistan name Saud Al-qahtani facebook saud1994@hotmail.com facebook_id 100000887153574 proxy_ip 151.255.93.141 YOUNOW_COM_40M_SOCIAL_072017 username Saudal-qahtani lastip 94.98.100.40 name Saud al-qahtani BADOO_COM_126M_DATING_2016 username 236238431.0236238431 email q_w_asz@hotmail.com hash d0a16d66e20ce3043954d00d3cde07fc nadomyxa name saud Al-Qahtani alias saud Al-Qahtani dob 1985-03-29 unparsed 27:M:91:3559:67225 Password nadomyxa BADOO_COM_126M_DATING_2016 username 0236325349 email q_w_easz@hotmail.com hash 429c8a8780d6fcb4d7182a10bc1e4a06 name saud Al-Qahtani alias Saud al-qahtani dob 1985-03-29 unparsed 27:M:91:3559:1101857 Password 0542489892 /$$ /$$ /$$$$$$ /$$$$$$ | $$ |__/ /$$__ $$ /$$__ $$ /$$$$$$$ /$$$$$$ | $$ /$$ /$$ /$$$$$$ |__/ \ $$ /$$$$$$/$$$$ /$$$$$$ /$$$$$$$ |__/ \ $$ | $$__ $$ /$$__ $$| $$ /$$/| $$ |____ $$ /$$$$$$/| $$_ $$_ $$ /$$__ $$| $$__ $$ /$$$$$$/ | $$ \ $$| $$ \ $$| $$$$$$/ | $$ /$$$$$$$ /$$____/ | $$ \ $$ \ $$| $$ \ $$| $$ \ $$ /$$____/ | $$ | $$| $$ | $$| $$_ $$ | $$ /$$__ $$| $$ | $$ | $$ | $$| $$ | $$| $$ | $$| $$ | $$ | $$| $$$$$$/| $$ \ $$| $$| $$$$$$$| $$$$$$$$| $$ | $$ | $$| $$$$$$/| $$ | $$| $$$$$$$$ |__/ |__/ \______/ |__/ \__/|__/ \_______/|________/|__/ |__/ |__/ \______/ |__/ |__/|________/ RAIDFORUMS_COM_594K_HACKING_062021 username nokia2mon2 HACKFORUMS_NET_190K_HACKING_022011 Not Found username nokia2mon2 email saudq1978@gmail.com lastip 62.120.153.248 hash 3cd6141c449606113c9f96369c6163d9 salt 1e7BKGNv actual_lastip 188.65.183.52 uid 80618 loginkey iCStAm6bznoF2DEqF1591a5mG4ljBcYuZeWxGOkhRocWQcGyNy postnum 362 awards 11 myps 10000.00 avatar ./uploads/avatars/avatar_80618.gif?dateline=1294840711 avatardimensions 113|102 avatartype upload usergroup 28 additionalgroups 19,36 displaygroup 36 usertitle Red Lions Leader regdate 1248800574 lastactive 1298121997 lastvisit 1298111075 lastpost 1297995833 icq 0 birthday 10-12-1977 birthdayprivacy all signature [align=center][img]http://ploader.net/files/1fcfbbc988360a766e235e8f87c162ab.png[/img][/align] [size=large] [/size]Goals: 900 [color=#32CD32]+rep [/color][ [color=#FF0000]x[/color] ] 200 members upgrade [ [color=#FF0000]102 upgraded right now [/color] ] parsedsig <div style="text-align: center;"><img src="http://ploader.net/files/1fcfbbc988360a766e235e8f87c162ab.png" border="0" alt="[Image: 1fcfbbc988360a766e235e8f87c162ab.png]" /></div> <span style="font-size: large;"><br /> </span>Goals:<br /> 900 <span style="color: #32CD32;">+rep </span>[ <span style="color: #FF0000;">x</span> ]<br /> 200 members upgrade [ <span style="color: #FF0000;">102 upgraded right now </span> ]<br /> <br /> allownotices 1 hideemail 0 subscriptionmethod 2 invisible 1 receivepms 1 pmnotice 2 pmnotify 1 threadmode linear showsigs 1 showavatars 1 showquickreply 1 showredirect 1 ppp 30 tpp 40 daysprune 0 dateformat 0 timeformat 0 timezone -5 dst 0 dstcorrection 2 style 3 away 0 awaydate 0 returndate 0 pmfolders 1**$%%$2**$%%$3**$%%$4** referrer 0 referrals 2 reputation 895 longlastip -1136543948 longregip 1048091128 language english timeonline 1490049 showcodebuttons 1 totalpms 2207 unreadpms 18 warningpoints 0 moderateposts 0 moderationtime 0 suspendposting 0 suspensiontime 0 coppauser 0 classicpostbit 0 receivefrombuddy 0 suspendsignature 0 suspendsigtime 0 loginattempts 1 failedlogin 0 LIZARDSTRESSER_SU_13K_HACKING_2015 username nokia2mon2 email saudq1978@gmail.com password 80808080 000WEBHOST_COM_13M_HOSTING_032015 username nokia2mon2 email nokia2mon2@gmail.com lastip 94.98.168.57 Riyadh, Riyadh Region, Saudi Arabia password saud8080 /$$ /$$ /$$ /$$ /$$$$$$ /$$ /$$$$$$ /$$ /$$ /$$ /$$ | $$ /$$$$| $$ | $$ /$$__ $$ /$$$$ /$$$__ $$$ | $$ | $$ |__/| $$ /$$$$$$$ /$$$$$$ /$$ /$$ /$$$$$$ /$$$$$$$ |_ $$| $$ | $$|__/ \ $$|_ $$ /$$_/ \_ $$ | $$$$$$$ /$$$$$$ /$$$$$$ /$$$$$$/$$$$ /$$$$$$ /$$| $$ /$$$$$$$ /$$$$$$ /$$$$$$/$$$$ /$$_____/ |____ $$| $$ | $$ /$$__ $$ /$$__ $$ /$$$$$$| $$| $$$$$$$$ /$$$$$/ | $$ /$$/ /$$$$$ $$| $$__ $$ /$$__ $$|_ $$_/ | $$_ $$_ $$ |____ $$| $$| $$ /$$_____/ /$$__ $$| $$_ $$_ $$ | $$$$$$ /$$$$$$$| $$ | $$| $$ \ $$| $$ | $$|______/| $$|_____ $$ |___ $$ | $$ | $$ /$$ $$| $$| $$ \ $$| $$ \ $$ | $$ | $$ \ $$ \ $$ /$$$$$$$| $$| $$ | $$ | $$ \ $$| $$ \ $$ \ $$ \____ $$ /$$__ $$| $$ | $$| $$ | $$| $$ | $$ | $$ | $$ /$$ \ $$ | $$ | $$| $$\ $$| $$| $$ | $$| $$ | $$ | $$ /$$| $$ | $$ | $$ /$$__ $$| $$| $$ | $$ | $$ | $$| $$ | $$ | $$ /$$$$$$$/| $$$$$$$| $$$$$$/| $$$$$$/| $$$$$$$ /$$$$$$ | $$| $$$$$$/ /$$$$$$| $$| $$$$$$$$/| $$ | $$| $$$$$$/ | $$$$/| $$ | $$ | $$| $$$$$$$| $$| $$ /$$| $$$$$$$| $$$$$$/| $$ | $$ | $$ |_______/ \_______/ \______/ \______/ \_______/ |______/ |__/ \______/ |______/| $$\________/ |__/ |__/ \______/ \___/ |__/ |__/ |__/ \_______/|__/|__/|__/ \_______/ \______/ |__/ |__/ |__/ \ $$$ /$$$ \_ $$$$$$_/ \______/ BREACHCOMP_COMBOLIST_1400M_2020 - 1 result sauod-1431@hotmail.com mojajosa ZABUGOR_COMBOLIST_552M_2019 - 1 result sauod-1431@hotmail.com mojajosa BADOO_COM_126M_DATING_2016 username 0306335660 email sauod-1431@hotmail.com hash 59701be07bb58c946342e76cdc2e982e alias Dgdgd dob 1980-12-31 unparsed 32:M:91:2606:1102203 Password mojajosa /$$ /$$ /$$ /$$ /$$$$$$ /$$ /$$$$$$ /$$ /$$ /$$ /$$ /$$$$| $$ | $$ /$$$$ /$$__ $$ /$$$$ /$$$__ $$$ | $$ | $$ |__/| $$ /$$$$$$$|_ $$| $$ | $$|_ $$ | $$ \ $$ /$$$$$$$|_ $$ /$$_/ \_ $$ | $$$$$$$ /$$$$$$ /$$$$$$ /$$$$$$/$$$$ /$$$$$$ /$$| $$ /$$$$$$$ /$$$$$$ /$$$$$$/$$$$ /$$_____/ | $$| $$$$$$$$ | $$ | $$$$$$$ /$$_____/ | $$ /$$/ /$$$$$ $$| $$__ $$ /$$__ $$|_ $$_/ | $$_ $$_ $$ |____ $$| $$| $$ /$$_____/ /$$__ $$| $$_ $$_ $$ | $$$$$$ | $$|_____ $$ | $$ \____ $$| $$$$$$ | $$ | $$ /$$ $$| $$| $$ \ $$| $$ \ $$ | $$ | $$ \ $$ \ $$ /$$$$$$$| $$| $$ | $$ | $$ \ $$| $$ \ $$ \ $$ \____ $$ | $$ | $$ | $$ /$$ \ $$ \____ $$ | $$ | $$| $$\ $$| $$| $$ | $$| $$ | $$ | $$ /$$| $$ | $$ | $$ /$$__ $$| $$| $$ | $$ | $$ | $$| $$ | $$ | $$ /$$$$$$$/ /$$$$$$ | $$ /$$$$$$| $$$$$$/ /$$$$$$$/ /$$$$$$| $$| $$$$$$$$/| $$ | $$| $$$$$$/ | $$$$/| $$ | $$ | $$| $$$$$$$| $$| $$ /$$| $$$$$$$| $$$$$$/| $$ | $$ | $$ |_______/ |______/ |__/|______/ \______/ |_______/ |______/| $$\________/ |__/ |__/ \______/ \___/ |__/ |__/ |__/ \_______/|__/|__/|__/ \_______/ \______/ |__/ |__/ |__/ \ $$$ /$$$ \_ $$$$$$_/ \______/ ATHWAY_COM_24M_EDU_012020 email s1419s1@hotmail.com hash 0BYedNDpOXGzwq+Zd6mV1Q== userid 7194043 subdate 1900-01-01 00:00:00.000 lastlogin 2015-04-25 11:02:55.043 todaylogins 1 signupdate 2015-04-25 11:02:55.043 stepdetail 1 exampledifficulty 1 roundvar 4 signupdevice web1 anonuserid ae298734-09ce-4c1f-9d3e-7e4692f7b0d6 inactive 0 userroles 0 GONITRO_COM_77M_TECH_102020 email s1419s1@hotmail.com created 2016-05-31 22:56:17.821 tmp_admin f verified f referred pdftoword status ACTIVE secret n0Y7BSdHq2j1R7b2c6118-a66b-4452-9321-ab9b71f5dd7frYoqr8KXEorH2RHfa client_access t account_id 989953657643420512 WATTPAD_COM_275M_SOCIAL_062020 username Saud2alqahtani email s1419s1@hotmail.com lastip 51.36.53.101 hash $2y$10$COHNtK5anHQAmeITvBLy6OqIukm5mrdmqzB30nFsuu48o9FCjqY0G name Saud2alqahtani CREATEDATE 2015-11-04T21:23:18.000Z MODIFYDATE 2015-11-04T21:23:18.000Z LOGINDATE 2015-11-16T18:50:41.000Z ACTIVE 1 COUNTRY GB DOB 1998-10-15T22:00:00.000Z ZYNGA_COM_202M_GAMING_092019 username S1419s1 email s1419s1@hotmail.com salt 3320beaf3d0f4a659448f7a2897cde9c3dd305ec created 2016-09-19 07:06:54 LUMINPDF_COM_24M_SERVICE_2019 email s1419s1@hotmail.com name saud Al-Qahtani lang ar gender male EYEEM_COM_20M_STORE_2018 username i9lu email s1419s1@hotmail.com hash 29487e51246ae8ddb0623be205f110865e1eaf56 salt gxjQxzwLAVH8tLIRmu9e4cd7MfcjQsp0 name Saud TUMBLR_COM_73M_SOCIAL_2013 email s1419s1@hotmail.com hash 84ec7e1aee3e6f587a5dc756a27573b6c41bb9bb /$$ /$$ /$$ /$$$$$$ /$$ /$$$$$$ /$$$$$$ /$$$$$$ /$$$$$$ /$$ /$$ | $$| $$ |__/ /$$__ $$ /$$$$ /$$__ $$ /$$__ $$ /$$__ $$ /$$$__ $$$ |__/| $$ /$$$$$$$ /$$$$$$ /$$ /$$ /$$$$$$$| $$$$$$$ /$$$$$$ /$$| $$ \__/|_ $$ | $$ \ $$| $$ \ $$| $$ \ $$ /$$_/ \_ $$ /$$$$$$ /$$$$$$/$$$$ /$$$$$$ /$$| $$ /$$$$$$$ /$$$$$$ /$$$$$$/$$$$ /$$_____/ |____ $$| $$ | $$ /$$__ $$| $$__ $$ |____ $$| $$| $$$$ | $$ | $$$$$$$| $$$$$$$| $$$$$$$ /$$/ /$$$$$ $$ /$$__ $$| $$_ $$_ $$ |____ $$| $$| $$ /$$_____/ /$$__ $$| $$_ $$_ $$ | $$$$$$ /$$$$$$$| $$ | $$| $$ | $$| $$ \ $$ /$$$$$$$| $$| $$_/ | $$ \____ $$ \____ $$ \____ $$| $$ /$$ $$| $$| $$ \ $$| $$ \ $$ \ $$ /$$$$$$$| $$| $$ | $$ | $$ \ $$| $$ \ $$ \ $$ \____ $$ /$$__ $$| $$ | $$| $$ | $$| $$ | $$ /$$__ $$| $$| $$ | $$ /$$ \ $$ /$$ \ $$ /$$ \ $$| $$| $$\ $$| $$| $$ | $$| $$ | $$ | $$ /$$__ $$| $$| $$ | $$ | $$ | $$| $$ | $$ | $$ /$$$$$$$/| $$$$$$$| $$$$$$/| $$$$$$$| $$ | $$| $$$$$$$| $$| $$ /$$$$$$| $$$$$$/| $$$$$$/| $$$$$$/| $$| $$$$$$$$/| $$$$$$$| $$ | $$ | $$| $$$$$$$| $$| $$ /$$| $$$$$$$| $$$$$$/| $$ | $$ | $$ |_______/ \_______/ \______/ \_______/|__/ |__/ \_______/|__/|__/ |______/ \______/ \______/ \______/ | $$\________/ \____ $$|__/ |__/ |__/ \_______/|__/|__/|__/ \_______/ \______/ |__/ |__/ |__/ \ $$$ /$$$ /$$ \ $$ \_ $$$$$$_/ | $$$$$$/ \______/ \______/ MATHWAY_COM_24M_EDU_012020 email saudhaif1999@gmail.com hash OVbgmJIX/OMRXZ7WnafMCg== userid 6808386 subtype 2 subdate 2016-08-28 10:47:39.000 lastlogin 2015-03-10 19:07:48.000 todaylogins 1 signupdate 2015-03-10 19:07:48.000 totalmobilelogins 1 stepdetail 1 exampledifficulty 1 roundvar 4 subscriptionsource 3 subscriptionid 7MIIUBQYJKoZIhvcNAQcCoIIT9jCCE/ICAQExCzAJBgUrDgMCGgUAMIIDtgYJKoZIhvcNAQcBoIIDpwSCA6MxggOfMAoCARQCAQEEAgwAMAsCAQ4CAQEEAwIBazALAgEZAgEBBAMCAQMwDAIBCgIBAQQEFgI0KzANAgEDAgEBBAUMAzIuMTANAgELAgEBBAUCAwqAvjANAgENAgEBBAUCAwE6EDAOAgEBAgEBBAYCBBva4o0wDgIBCQIBAQQGAgR anonuserid 0773918f-c0b0-4700-b471-4336e29f49ba inactive 0 userroles 0 GONITRO_COM_77M_TECH_102020 email saudhaif1999@gmail.com created 2017-02-15 11:51:01.549 tmp_admin f verified f referred pdftoword status ACTIVE secret Oizezh3-TNR31f7a3e30d-b3d0-4161-a990-e1f622c88a97Q6gMWaPW2Pxx0x-ta client_access t account_id -246515476185159059 MYFITNESSPAL_COM_144M_FITNESS_022018 username abu_haif email saudhaif1999@gmail.com lastip 2.88.119.35 Riyadh, Riyadh Region, Saudi Arabia CANVA_COM_133M_DESIGN_052019 username saudhaif1999 email saudhaif1999@gmail.com name Saud al-Qahtani id 8743472 id_hash UABpJj8dG4g create_date 2016-01-27 14:16:11 mail_status C temporary 0 roles U deactivated 0 ui_info {hasUpdatedSvgPlaceholder:true} locale en personal_brand 8768980 personal_brand_id BABpJkTXPWM DUBSMASH_COM_123M_SOCIAL_122018 username saudhaif email saudhaif1999@gmail.com hash pbkdf2_sha256$15000$rTZEhRKRESSK$QDbvcURw60Pj4ABWp1fCUdbactcPtJ36+KF93khoXrI= Password sauo0ody CHEGG_COM_38M_EDUCATION_2018 email saudhaif1999@gmail.com hash d29c34e66c4aa81bcf96ef1a6381832e Password sauo0ody YOUNOW_COM_40M_SOCIAL_072017 username Shwit email saudhaif1999@gmail.com lastip 2.90.125.6 Riyadh, Riyadh Region, Saudi Arabia name Saud al-Qahtani google_id 106589289102388463152 proxy_ip 207.244.77.234 /$$ /$$ /$$$$$$ /$$$$$$$$ /$$$$$$ /$$$$$$ /$$ /$$ | $$ /$$$$ /$$__ $$|_____ $$//$$__ $$ /$$$__ $$$ |__/| $$ /$$$$$$$ /$$$$$$ /$$ /$$ /$$$$$$$ /$$$$$$ |_ $$ | $$ \ $$ /$$/| $$ \ $$ /$$_/ \_ $$ /$$$$$$ /$$$$$$/$$$$ /$$$$$$ /$$| $$ /$$$$$$$ /$$$$$$ /$$$$$$/$$$$ /$$_____/ |____ $$| $$ | $$ /$$__ $$ /$$__ $$ | $$ | $$$$$$$ /$$/ | $$$$$$/ /$$/ /$$$$$ $$ /$$__ $$| $$_ $$_ $$ |____ $$| $$| $$ /$$_____/ /$$__ $$| $$_ $$_ $$ | $$$$$$ /$$$$$$$| $$ | $$| $$ | $$| $$ \ $$ | $$ \____ $$ /$$/ >$$__ $$| $$ /$$ $$| $$| $$ \ $$| $$ \ $$ \ $$ /$$$$$$$| $$| $$ | $$ | $$ \ $$| $$ \ $$ \ $$ \____ $$ /$$__ $$| $$ | $$| $$ | $$| $$ | $$ | $$ /$$ \ $$ /$$/ | $$ \ $$| $$| $$\ $$| $$| $$ | $$| $$ | $$ | $$ /$$__ $$| $$| $$ | $$ | $$ | $$| $$ | $$ | $$ /$$$$$$$/| $$$$$$$| $$$$$$/| $$$$$$$| $$$$$$$ /$$$$$$| $$$$$$/ /$$/ | $$$$$$/| $$| $$$$$$$$/| $$$$$$$| $$ | $$ | $$| $$$$$$$| $$| $$ /$$| $$$$$$$| $$$$$$/| $$ | $$ | $$ |_______/ \_______/ \______/ \_______/ \____ $$|______/ \______/ |__/ \______/ | $$\________/ \____ $$|__/ |__/ |__/ \_______/|__/|__/|__/ \_______/ \______/ |__/ |__/ |__/ | $$ \ $$$ /$$$ /$$ \ $$ | $$ \_ $$$$$$_/ | $$$$$$/ |__/ \______/ \______/ EXPLOITIN_COMBOLIST_705M_2016 - 4 results saudq1978@gmail.com 1q2w3e4r saudq1978@gmail.com 80808080 saudq1978@gmail.com a4651703 saudq1978@gmail.com saud12345 ANTIPUBLIC_COMBOLIST_1865M_2018 - 4 results saudq1978@gmail.com 1q2w3e4r saudq1978@gmail.com 80808080 saudq1978@gmail.com a4651703 saudq1978@gmail.com saud12345 BREACHCOMP_COMBOLIST_1400M_2020 - 4 results saudq1978@gmail.com 1q2w3e4r saudq1978@gmail.com 80808080 saudq1978@gmail.com a4651703 saudq1978@gmail.com saud12345 COLLECTION1_COMBOLIST_1212M_2019 - 4 results saudq1978@gmail.com 1q2w3e4r saudq1978@gmail.com 80808080 saudq1978@gmail.com a4651703 saudq1978@gmail.com saud12345 ZABUGOR_COMBOLIST_552M_2019 - 1 result saudq1978@gmail.com saud12345 HACKFORUMS_NET_190K_HACKING_022011 Crack username nokia2mon2 email saudq1978@gmail.com lastip 62.120.153.248 hash 3cd6141c449606113c9f96369c6163d9 salt 1e7BKGNv actual_lastip 188.65.183.52 uid 80618 loginkey iCStAm6bznoF2DEqF1591a5mG4ljBcYuZeWxGOkhRocWQcGyNy postnum 362 awards 11 myps 10000.00 avatar ./uploads/avatars/avatar_80618.gif?dateline=1294840711 avatardimensions 113|102 avatartype upload usergroup 28 additionalgroups 19,36 displaygroup 36 usertitle Red Lions Leader regdate 1248800574 lastactive 1298121997 lastvisit 1298111075 lastpost 1297995833 icq 0 birthday 10-12-1977 birthdayprivacy all signature [align=center][img]http://ploader.net/files/1fcfbbc988360a766e235e8f87c162ab.png[/img][/align] [size=large] [/size]Goals: 900 [color=#32CD32]+rep [/color][ [color=#FF0000]x[/color] ] 200 members upgrade [ [color=#FF0000]102 upgraded right now [/color] ] parsedsig <div style="text-align: center;"><img src="http://ploader.net/files/1fcfbbc988360a766e235e8f87c162ab.png" border="0" alt="[Image: 1fcfbbc988360a766e235e8f87c162ab.png]" /></div> <span style="font-size: large;"><br /> </span>Goals:<br /> 900 <span style="color: #32CD32;">+rep </span>[ <span style="color: #FF0000;">x</span> ]<br /> 200 members upgrade [ <span style="color: #FF0000;">102 upgraded right now </span> ]<br /> <br /> allownotices 1 hideemail 0 subscriptionmethod 2 invisible 1 receivepms 1 pmnotice 2 pmnotify 1 threadmode linear showsigs 1 showavatars 1 showquickreply 1 showredirect 1 ppp 30 tpp 40 daysprune 0 dateformat 0 timeformat 0 timezone -5 dst 0 dstcorrection 2 style 3 away 0 awaydate 0 returndate 0 pmfolders 1**$%%$2**$%%$3**$%%$4** referrer 0 referrals 2 reputation 895 longlastip -1136543948 longregip 1048091128 language english timeonline 1490049 showcodebuttons 1 totalpms 2207 unreadpms 18 warningpoints 0 moderateposts 0 moderationtime 0 suspendposting 0 suspensiontime 0 coppauser 0 classicpostbit 0 receivefrombuddy 0 suspendsignature 0 suspendsigtime 0 loginattempts 1 failedlogin 0 MALWAREBYTES_COM_111K_SECURITY_112014 username saud99 email saudq1978@gmail.com lastip 188.48.9.132 hash 45620041b21ecd1f39c93ed581a31546 salt nlBY DethZero Password 45b5de5f1012691b752e1302df62bffd653d716345d8915046b904b90f41f271 500PX_COM_14M_PHOTOS_072018 Not Found username saudq1978 email saudq1978@gmail.com hash $2a$10$LSUWmBOt4AXbMfQAm5dhuuaaVVrf69cUqGrNbcRmmWXi3n3AHlxhu sex 0 REINCUBATE_COM_218K_FINANCE_112017 Not Found username saudq1978@gmail.com email saudq1978@gmail.com hash pbkdf2_sha256$10000$FpkEIET0nWfc$PC/+d9Ffbc5t1jLmbVw3WLVvN0s04Zl4j8Fk09H7SNk= name saud alqahtani is_active 1 last_login 2014-05-30T15:12:32.000Z date_joined 2014-05-30T15:12:32.000Z id 103256 DROPBOX_COM_68M_HOSTING_2012 email saudq1978@gmail.com hash $2a$08$uiJFDtYnoACYuazQYkYqyOj6vqEb9ByCOKm0dQff1yXIFjPalGGMK Password 80808080 LIZARDSTRESSER_SU_13K_HACKING_2015 username nokia2mon2 email saudq1978@gmail.com password 80808080 COINMAMA_COM_478K_CRYPTO_062017 Not Found username saudq1978@gmail.com email saudq1978@gmail.com hash $P$BoOKNDwRzOn/UmhkPvH.uSCAqVvXj51 date 1420303720 type lead token HLORG4BFSRRF7W6C active 1 id 55732 2844_DATABASES_218M_COMPILATION_2018 email saudq1978@gmail.com password 80808080 2844_DATABASES_218M_COMPILATION_2018 email saudq1978@gmail.com password 1q2w3e4r ADOBE_COM_151M_SOFTWARE_102013 email saudq1978@gmail.com 000WEBHOST_COM_13M_HOSTING_032015 username saud email saudq1978@gmail.com lastip 188.48.69.68 Riyadh, Riyadh Region, Saudi Arabia password saud12345 /$$ /$$ /$$$$$$ /$$$$$$ /$$$$$$ /$$ /$$ | $$ |__/ /$$__ $$ /$$__ $$ /$$$__ $$$ |__/| $$ /$$$$$$$ /$$$$$$ | $$ /$$ /$$ /$$$$$$ |__/ \ $$ /$$$$$$/$$$$ /$$$$$$ /$$$$$$$ |__/ \ $$ /$$_/ \_ $$ /$$$$$$ /$$$$$$/$$$$ /$$$$$$ /$$| $$ /$$$$$$$ /$$$$$$ /$$$$$$/$$$$ | $$__ $$ /$$__ $$| $$ /$$/| $$ |____ $$ /$$$$$$/| $$_ $$_ $$ /$$__ $$| $$__ $$ /$$$$$$/ /$$/ /$$$$$ $$ /$$__ $$| $$_ $$_ $$ |____ $$| $$| $$ /$$_____/ /$$__ $$| $$_ $$_ $$ | $$ \ $$| $$ \ $$| $$$$$$/ | $$ /$$$$$$$ /$$____/ | $$ \ $$ \ $$| $$ \ $$| $$ \ $$ /$$____/ | $$ /$$ $$| $$| $$ \ $$| $$ \ $$ \ $$ /$$$$$$$| $$| $$ | $$ | $$ \ $$| $$ \ $$ \ $$ | $$ | $$| $$ | $$| $$_ $$ | $$ /$$__ $$| $$ | $$ | $$ | $$| $$ | $$| $$ | $$| $$ | $$| $$\ $$| $$| $$ | $$| $$ | $$ | $$ /$$__ $$| $$| $$ | $$ | $$ | $$| $$ | $$ | $$ | $$ | $$| $$$$$$/| $$ \ $$| $$| $$$$$$$| $$$$$$$$| $$ | $$ | $$| $$$$$$/| $$ | $$| $$$$$$$$| $$| $$$$$$$$/| $$$$$$$| $$ | $$ | $$| $$$$$$$| $$| $$ /$$| $$$$$$$| $$$$$$/| $$ | $$ | $$ |__/ |__/ \______/ |__/ \__/|__/ \_______/|________/|__/ |__/ |__/ \______/ |__/ |__/|________/| $$\________/ \____ $$|__/ |__/ |__/ \_______/|__/|__/|__/ \_______/ \______/ |__/ |__/ |__/ \ $$$ /$$$ /$$ \ $$ \_ $$$$$$_/ | $$$$$$/ \______/ \______/ BREACHCOMP_COMBOLIST_1400M_2020 - 1 result nokia2mon2@gmail.com saud8080 000WEBHOST_COM_13M_HOSTING_032015 username nokia2mon2 email nokia2mon2@gmail.com lastip 94.98.168.57 Riyadh, Riyadh Region, Saudi Arabia password saud8080
2 years ago
2 years ago