Jump to content

Recommended Posts

Posted

I did trade with Wonderboy1986@hotmail.gr, and it was all ok. He was buying from me items on cerberbus and no1 get scamm. Do you have any proves for his actions?

u want the transaction of paypal?

  • 2 weeks later...
Posted

Scammer's Name "Crashreport"

 

Date of scam: 2011.06.04.

MSN: giannismrk1@hotmail.com

Real name: Giannis Markou

Facebook profile: http://www.facebook.com/profile.php?id=1234137756

Server: L2Java x5000

Topic link: http://maxcheaters.com/forum/index.php?topic=191756.0

Prooves: Can be either forum pms, or msn chats.

Additional Info: Normal behaviour of immature's guy , while trying to get items that cost ~20 euros. As we see economical crysis make ppl steal even pixels...

 

  • 2 weeks later...
Posted

Date of scam: Around 1st june.

MSN: bobbyexe@hotmail.com

MXC Nickname: Piotress(l2crow owner)

Scam method: He asked me to give his the webdesign before he pay me cuz his paypal card was limited or something because he was about to start his server.So if this guy ever tell you he will pay you after his account gets unlimited don't trust him at all.

Proof: I got tons of msn history to show if anyone is interested.

Additional Info: He scammed me with 100 euro not a big deal but still i don't want anyone else to get scammed by this guy cuz i saw him selling l2crow server.

 

ps.im not sure if this is only about items/chars sell scamms but i decided to post it here...

 

Posted

Date of scam: 22.06.2011 (he received my money)

 

MSN: vorfin1@hotmail.com

 

MXC Nickname: eXtaSy™

 

Scam method: Accepted my money and didn't give me my stuff. Plus blocking/deleting me on MSN and not answering any PMs on MxC.

 

Server: www.infinitel2.com

 

Topic link: http://maxcheaters.com/forum/index.php?topic=198051.0

 

Who did the scammer scam: Me

 

Proof: http://img829.imageshack.us/img829/1369/lult.jpg

 

Additional Info: And i thought ppl with 15 Karma are trustfull. Atleast i reported it to Paypal now to get my money back.

Posted

Date of scam: 22.06.2011 (he received my money)

 

MSN: vorfin1@hotmail.com

 

MXC Nickname: eXtaSy™

 

Scam method: Accepted my money and didn't give me my stuff. Plus blocking/deleting me on MSN and not answering any PMs on MxC.

 

Server: www.infinitel2.com

 

Topic link: http://maxcheaters.com/forum/index.php?topic=198051.0

 

Who did the scammer scam: Me

 

Proof: http://img829.imageshack.us/img829/1369/lult.jpg

 

Additional Info: And i thought ppl with 15 Karma are trustfull. Atleast i reported it to Paypal now to get my money back.

i will tell it for second time ...

 

that's not true i send you the exploit via pm (today) on mxc and you dont answer to me.

second dont lie and show the real screen of paypal acc.

when i send you the exploit you request the money back from paypal or i lie?

whats this?

you take the money back + you block my paypal acc with 300+ euro in.

 

stfu and gf idiot.

 

Posted

that's not true i send you the exploit via pm (today) on mxc and you dont answer to me.

second dont lie and show the real screen of paypal acc.

when i send you the exploit you request the money back from paypal or i lie?

whats this?

you take the money back + you block my paypal acc with 300+ euro in.

 

stfu and gf idiot.

 

No PMs received today. only have 2 PMs from you. http://img706.imageshack.us/img706/9039/proof1k.jpg

This are the 2 PMs i have from you on MxC: http://img825.imageshack.us/img825/8246/proof2zl.jpg

 

I canceled my payment after i received the exploit?? Lol

 

Here is the full paypal information http://img546.imageshack.us/img546/2900/proof3m.jpg

I send you the money. I did wait till today (22.06.11 you received the money today 27.06.2011 after not getting my stuff i reported you on paypal.)

 

I opened a conflict today because i didn't get a answer to my PMs or you never msg'd me on MSN. http://img546.imageshack.us/img546/3994/proof4b.jpg

 

 

The funny part is, after reporting you, like i said i will to you in PMs, you msg'd me within 2 mins in MSN.

 

 

I duno if you tried to scam me, if you send the private messages to someone else by misstake or if something was wrong with MxC. But i never got a PM from you which explained me the exploit i payed you for.

 

 

This is the msg you send me on MSN a few mins ago.

 

Jun 27, 2011 Temporary Hold To blubb Placed Details Temporary Hold To blubb 9171103100042912L -€100.00 EUR

 

You said you pm'ed me today the exploit.

Send me a e-mail with it, or pm me on MSN with it (MxC might have problems with PMs) and i'll stop the conflict on paypal and remove the posts from the scammer sections. And you can use your Paypal again.

Guest
This topic is now closed to further replies.



  • Posts

    • Classic move "its not a virus, all antiviruses are just wrong." The moment someone starts yelling "FIND THE MALICIOUS CODE" and mocking heuristic detection, its usually because there is something shady in there… or they have no clue what heuristic detection even is. If your files was clean, you wouldn’t be this defensive or getting personal.   when half the AV vendors are throwing out names like Trojan.Win32.Kasidet, Trj/Chgt.AD, and Gen:Variant.Tedy.537463, maybe it’s not "heuristics", maybe its just a shady-ass .rar. If there is smoke you don't argue with the smoke detector, you check the kitchen. But hey, maybe they all got paid too, right? 🤷‍♂️ the argue comes down to trusting you (a nobody) versus AV vendors   Popular threat label trojan.tedy Threat categories trojan  Family labels tedy   can i call you Teddy from now on? yes i can Teddy
    • https://github.com/gawric/Guide-L2Unity/blob/main/Guide/Pakets/Blowfish/General description.md   Perhaps you will find it useful piece of encryption and decryption code from Acis Interlude   I transferred these methods to Unity c# and everything works fine   https://ibb.co/DHhP0JYr   I think the first 2 bytes are the packet size. Third byte packet id And then the information itself   It's all there in l2j servers  
    • Hello, I’m working on decrypting the Init packet that the server sends to the client during login. This packet is treated specially and contains the Blowfish keys used to encrypt and decrypt subsequent packets. Although it isn’t encrypted irreversibly and should be reversible, I haven’t succeeded yet. My goal is to extract the Blowfish key to decrypt certain client packets without disrupting the normal session flow. I can inject a DLL to sniff the packets, and with that I plan to develop a module that extends the client’s functionality. For example, after logging in, this module would capture all the data the client receives (character data, etc.). Additionally, it could listen for real-time server events, enabling integrations with Discord SDKs or other systems, thereby expanding Lineage 2’s capabilities. Init packet(0x00) LoginServer. Currently in the java Cores I checked there is no decode function for this package, only encript.
    • whats password from the archivie ?
    • All that shit are false positives of the vanganth cliext, sources are well and who sell it is a big scammer
  • Topics

×
×
  • Create New...