Account Verification

Are you requesting access to your account?

Chat Settings

Show Chat
Enable Chat
Allow Anonymous
	     sdSSSSSSSbs   .S_SSSs      sSSs_sSSs     .S       S.   
	     YSSSSSSSS%S  .SS~SSSSS    d%%SP~YS%%b   .SS       SS.  
	            S%S   S%S   SSSS  d%S'     `S%b  S%S       S%S  
	           S&S    S%S    S%S  S%S       S%S  S%S       S%S  
	          S&S     S%S SSSS%S  S&S       S&S  S&S       S&S  
	          S&S     S&S  SSS%S  S&S       S&S  S&S       S&S  
	         S&S      S&S    S&S  S&S       S&S  S&S       S&S  
	        S*S       S&S    S&S  S&S       S&S  S&S       S&S  
 	       S*S        S*S    S&S  S*b       d*S  S*b       d*S  
	     .s*S         S*S    S*S  S*S.     .S*S  S*S.     .S*S  
	     sY*SSSSSSSP  S*S    S*S   SSSbs_sdSSSS   SSSbs_sdSSS   
	    sY*SSSSSSSSP  SSS    S*S    YSSP~YSSSSS    YSSP~YSSY    
                      SP                                 
                      Y                                  
                            <> SomeCunt <> 

	    Zaqu23 got infected by stealer malware after attempting
        to download cracked software. Unfortunately for him it
        exposed him. 

        Looking through his logs, we see familiar instances used
        by a part of the internet that goes by the "pediverse".
 
        This instance in particular is the now non-functional
        "cute.lolison.top"/"lolison.top". If we go ahead and see
        his search history this is also what we can see:

	    ===============
	    Name: search_filename	  Both of these searches were
	    Value: nude               consecutive, so do with that
	    ===============           context as you will. Although
	    Name: search_filename     with the pediverse instance
	    Value: young              included. It's pretty obvious.
	    ===============                           

Aliases:
-> Zachersky           -> zaqu23
-> Zachersky98         -> sebonifade
-> Zachersky23         -> Sebonafide
-> karinkakrol130      -> karinkakrol130
-> VanillusUnicornus   -> s.zacher
-> sebonafide          -> zachersky

Full Name: Sebastian Zacher
DOB: 1998-05-01
Address: Polska 41-100 Siemianowice Śląskie Ul. Powstańców 24/1
2nd Address(?): ul. Hoża 86/410, 00-682 Warszawa

IRL: https://files.catbox.moe/gxclc7.jpg  

PESEL (Polish national ID): 98050103392
Document Number: DAG886294
Document Expiry: 20/05/2029
Tax ID / NIP: 98050103392

Credit Card Expiry: 12/27

Last IPs:
-> 94.172.39.82 | Warsaw, Poland
-> 89.64.33.175 | Krakow, Poland

Bank account (IBAN): PL65 1050 1357 1000 0091 2364 5948
Monthly net income: 620 PLN

Loan agreement number: BECEIAWI
Loan date: 2022-01-16
Repayment due date: 2022-03-17
Outstanding amount (as of 2022-06-17): 1250.16 zł
Principal: 1000.00 zł
Commission: 184.10 zł
Late interest: 60.16 zł
Capital interest: 5.90 zł
Document: https://files.catbox.moe/gp7m0f.pdf

Document type: Certificate of payment reliability (Certyfikat wiarygodności płatniczej)
Date issued: 15.02.2022 (Warszawa)
Based on: Agreement of joint undertaking (Umowa o Wspólnym Przedsięwzięciu) dated 08.05.2020
Score: Doskonała (“Excellent”)
Overdue payments: 0
Overdue debt: 0,00
Document: https://files.catbox.moe/xqqiby.pdf

 sebastian.zacher98@gmail.com
|‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾
|> |Basic Information
|  |> GID: 109138029161898198966
|  |> PFP: https://files.catbox.moe/8gqehx.png
|  |> Google Activated Services: Youtube, Photos, 
|  |  Maps, Meet.
|  |> Registered On: EA, Eventbrite, Kaleida
|  |  Microsoft, NVidia, Spotify, Wbgames,
|  |  Wix, WordPress, Adobe, Gravatar, Flickr, 
|  |  Twitter, TikTok.
|
|> |Profiles
|  |> Flickr
|  |   Name: Sebastian Zacher
|  |   Created: 06/05/2023
|  |   Link: https://www.flickr.com/photos/198256976@N02
|  |
|  |> TikTok
|  |   Username: zacherskyy, sebastianzacher4
|  |   Link: https://www.tiktok.com/@zacherskyy

 zachersky98@gmail.com
|‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾
|> |Basic Information
|  |> GID: 105627774542575072318
|  |> PFP: [DEFAULT IMAGE]
 
 sebazac98@live.com
|‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾
|> |Basic Information
|  |> Registered On: Microsoft, Picsart
|  |  Spotify, Wix.

 sebastian.zacher980501@gmail.com
|‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾
|> |Basic Information
|  |> GID: 109579013958572285119
|  |> PFP: [DEFAULT IMAGE] 
|  |> Google Activated Services: Maps, Meet.

 artur.zacher@gmail.com
|‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾
|> |Basic Information
|  |> GID: 113746013742470079154
|  |> PFP: [DEFAULT IMAGE] 
|  |> Google Activated Services: Maps
|  |> Registered On: Bitmoji.com, Eventbrite
|  |  Spotify, Wbgames, Adobe, Twitter.

 nesthiik@gmail.com
|‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾
|> |Basic Information
|  |> GID: 100487820472665231787
|  |> PFP: [DEFAULT IMAGE]  
|  |> Registered On: NVidia

 furkanglr2313@gmail.com
|‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾
|> |Basic Information
|  |> GID: 117390570204479170757
|  |> PFP: https://files.catbox.moe/7d325p.png
|  |> Registered On: Envato, Eventbrite
|  |  Microsoft, NVidia, Spotify, Wix
|  |  WordPress, Zapier, sololearn, Twitter, 
|  |  Trello, Plex, GitHub, Duolingo, Chess, Adobe.
|
|> |Profiles
|  |> Chess
|  |   Username: Revenueee
|  |   Name: Furkan Gelir
|  |   Created: 19/07/2023
|  |   Link: https://www.chess.com/member/Revenueee
|  |
|  |> GitHub
|  |   Username: furkanglr2313
|  |   Created: 20/01/2021
|  |   Link: https://github.com/furkanglr2313
|  |
|  |> Plex
|  |  Username: furkanglr
|  |  Created: 09/12/2015
|  |  Link: https://app.plex.tv/desktop/#!/u/furkanglr
|  |
|  |> Sololearn
|  |  Name: Furkan Gelir
|  |  Created: 18/04/2019
|  |  Link: https://sololearn.com/profile/13736976
|  |
|  |> Trello
|  |  Username: furkangelir1
|  |  Name: Furkan Gelir
|  |  Link: https://trello.com/u/5fab9bbdf8b05114a9f1d658/activity

 +48733652288
|‾‾‾‾‾‾‾‾‾‾‾‾
|> |> Name Linked: Zaqu
|  |> Carrier: Play

Infection Date:	2023-11-17T18:51:20.000Z
Computer Name: DESKTOP-EK60BNS	
Operating System: Windows 11
Malware Path: C:\\Users\\sebaz\\AppData\\Local\\095247ef-3246-4bce-a0fa-82a9b46e9293\\build2.exe
Anti-Viruses: N/A
IP: 89.64.**.***

Infection Date:	2023-11-17T07:48:18.000Z
Computer Name: sebaz
Operating System: Windows 10 Home x64
Malware Path: C:\\\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe
Anti-Viruses: Windows Defender, Avast Antivirus
IP: 89.64.**.***

Infection Date:	2021-11-25T15:24:47.000Z
Computer Name: sebas
Operating System: Windows 10 Enterprise x64
Malware Path: C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\RegAsm.exe
Anti-Viruses: Windows Defender
IP: 89.174.***.***