Author

Topic: Known Alts of any-one - A User Generated List Mk III (2021 Q2) - page 160. (Read 172271 times)

copper member
Activity: 1442
Merit: 529
This is not a place of work but a forum to aks questions and get knowledge regarding bitcoin and cryptocurrencies in general. People like you who only come here to spam the hell out of the forum just to earn your pennies are a cancer to this forum. This forum would be a much better place without you just like a healthy human body is much better than someone with cancer. Oh and stop complaining about your red trust as no one will give a shit about that.
full member
Activity: 1190
Merit: 102
Accounts Connected:
imrobo2,StallionMosquito
I ask you to check two accounts, there is a suspicion that this is a multi account.
Proof:

Posts and tweets are the same, participating in the same companies.
Account data is the same.
Pay attention to the addresses linked to accounts.
imrobo2 Address : 0xbef2af02a27DD69B2cE91F14d67e8F85EC116483
StallionMosquito Address : 0x6B7E7D46A5Dc49A48Cc38339e511EF38d4b53b26
Related Addresses:
Code:
0xbef2af02a27dd69b2ce91f14d67e8f85ec116483
0x6b7e7d46a5dc49a48cc38339e511ef38d4b53b26
0x2a02904c2d7510a28d184387aab187478182a60b
txid1: https://etherscan.io/tx/0x952b8c2253b23678ec5bdc0ff7d70afb6ea8f70796abfd016f1b4804151d2eac
txid2: https://etherscan.io/tx/0x77c3884ddc61bb4fc89c19b1e3623416bd746824c61b6b78083349858be5389d
All addresses sent ETH to this address : 0x2a02904c2d7510a28d184387aab187478182a60b

2 ethereum transactions are proof that person A sent eth to person B and vice versa, not proof that accounts are connected, but...

That address (https://etherscan.io/tokentxns?a=0x2a02904c2d7510a28d184387aab187478182a60b&ps=100&p=2) has many "IN" token transactions from all 3 addresses.
I checked several bounty spreadsheets and I have found account zef316 (including accounts from quoted post) in WePower https://docs.google.com/spreadsheets/d/1_95d3lVbRCOjBNKQw7trQvaVhNDYsAbSGFrlB-mU8ug/edit#gid=920768750:



imrobo2 posted this:
My used ETH public address: 0xbef2af02a27DD69B2cE91F14d67e8F85EC116483
Few minutes after StallionMosquito posted this:
My used ETH public address: 0x6B7E7D46A5Dc49A48Cc38339e511EF38d4b53b26
And zef316 posted his addy here https://archive.fo/wCcOa:
Hello sir,
I have given my MEW address 0x2a02904C2d7510A28d184387AAb187478182a60b
but have not received any coin yet,  please process payment sir. my name is in spread sheet on Sr. No. 31

thank you
good day.

And that address was posted only few minutes before imrobo's post, all 3 accounts posted back to back:
My used ETH public address: 0x2a02904C2d7510A28d184387AAb187478182a60b

So, account cheechu is another alt (https://archive.fo/ZzwZq#selection-3027.0-3027.7).

To make this connection more solid, zef316 posted this:
Hello,
Thanks for the opportunity. I have Joined both, Slack and Telegram.
Telegram: @zef316
Slack: zef316
ETH: 0x6B7E7D46A5Dc49A48Cc38339e511EF38d4b53b26
Thank yous
Which is stallionmosquito's addy. (https://archive.fo/zpHiN)

So, accounts connected: imrobo2, StallionMosquito, cheechu, zef316

On side note @Timelord2067 why is reagannn in Hall of Shame, maybe I missed it but which bounty he abused?

Hello Sir i am not holding these accounts, I have only this account but these are my friends and we are working together on the forum, We just following the stallions posts as he referred us so we copy his data and the campaigns because of lake of knowledge but posting from our accounts and in some bounty account requirement we use latest post so you can see same posts as well. For the transactions we send our coins to zef316 and stallion some times as we need money s o we sell those go them, in which way we can prove our identity? sir zef316's account is ban due to signature scam since long time so he created other id named cheechu yes cheechu is his 2nd account, kindly remove negative trust from my id please I am just working here with my own account.
HCP
legendary
Activity: 2086
Merit: 4361
Accounts Connected:

juanmdamico, juanmatt.

Proof:

Scam accusation thread created by juanmdamico: http://archive.is/7GI31
Duplicate (identical) scam accusation thread created by juanmatt: http://archive.is/gLW5U

Related Addresses:

N/A

Miscellaneous:

Note, not accusing the account of scamming or anything... just noting two linked accounts.
legendary
Activity: 2968
Merit: 3406
Crypto Swap Exchange
Accounts Connected:

JDacer and liejames.

Proof:

Same BTCitcoin address on both accounts and self-admitted as well:

Related Address:

Code:
3EE1PMdzhccs1iGCjiaf1Kq5a2iXYNUyRU

Miscellaneous:

- There's another account that has been hacked (jdacer95), "proof".

- liejames is ban evading (proof).
member
Activity: 168
Merit: 12
Accounts Connected:
jelma, ranggawulung, antislip, desasdesus, stipen, usluf

Proof:
From UTrust.io Bounty , https://docs.google.com/spreadsheets/d/1Z7vmnANbyyECG9dQG11m8lnlBvGvfLd5rVJcl_1OW6c/edit#gid=1857779443

jelma's ETH address 0x9Cb02BBc05b1B81c53086c0Cd128Ee099ABcD60c (#72)
ranggawulung's ETH address 0x9475170Ca7fAa73188A32647a8e5A87dE7885D7B (#64)
antislip's ETH address 0x2Bb6a385173e927aA331A017b9D81F5391EF946A (#65)
desasdesus's ETH address 0xE75C5006C14Bf0Bd000AD08fb04Bb4232F988D42 (#70)
stipen's ETH address 0xE6e4CBdAA1A2C8486f626F8dD99E6b52dEE3331c (#78)
usluf's ETH address 0xbf327c2E6Cb4baFE41D45FB4fCC2aa49103FFCf4 (#79)

All sends to the address 0x485e2eAB26dC045f37854fFdCEAd2dA1445a5614













Related Addresses:
Code:
0x9Cb02BBc05b1B81c53086c0Cd128Ee099ABcD60c
0x9475170Ca7fAa73188A32647a8e5A87dE7885D7B
0x2Bb6a385173e927aA331A017b9D81F5391EF946A
0xE75C5006C14Bf0Bd000AD08fb04Bb4232F988D42
0xE6e4CBdAA1A2C8486f626F8dD99E6b52dEE3331c
0xbf327c2E6Cb4baFE41D45FB4fCC2aa49103FFCf4
legendary
Activity: 3696
Merit: 2219
💲🏎️💨🚓
On side note @Timelord2067 why is reagannn in Hall of Shame, maybe I missed it but which bounty he abused?

Accounts Connected:
same twitter username, eth address connected reagannn and Decentradical

proof:

(snip)



legendary
Activity: 1932
Merit: 2272
Accounts connected: imrobo2, StallionMosquito, cheechu, zef316

Accounts Connected:
imrobo2,StallionMosquito
I ask you to check two accounts, there is a suspicion that this is a multi account.
Proof:

Posts and tweets are the same, participating in the same companies.
Account data is the same.
Pay attention to the addresses linked to accounts.
imrobo2 Address : 0xbef2af02a27DD69B2cE91F14d67e8F85EC116483
StallionMosquito Address : 0x6B7E7D46A5Dc49A48Cc38339e511EF38d4b53b26
Related Addresses:
Code:
0xbef2af02a27dd69b2ce91f14d67e8f85ec116483
0x6b7e7d46a5dc49a48cc38339e511ef38d4b53b26
0x2a02904c2d7510a28d184387aab187478182a60b
txid1: https://etherscan.io/tx/0x952b8c2253b23678ec5bdc0ff7d70afb6ea8f70796abfd016f1b4804151d2eac
txid2: https://etherscan.io/tx/0x77c3884ddc61bb4fc89c19b1e3623416bd746824c61b6b78083349858be5389d
All addresses sent ETH to this address : 0x2a02904c2d7510a28d184387aab187478182a60b

2 ethereum transactions are proof that person A sent eth to person B and vice versa, not proof that accounts are connected, but...

That address (https://etherscan.io/tokentxns?a=0x2a02904c2d7510a28d184387aab187478182a60b&ps=100&p=2) has many "IN" token transactions from all 3 addresses.
I checked several bounty spreadsheets and I have found account zef316 (including accounts from quoted post) in WePower https://docs.google.com/spreadsheets/d/1_95d3lVbRCOjBNKQw7trQvaVhNDYsAbSGFrlB-mU8ug/edit#gid=920768750:



imrobo2 posted this:
My used ETH public address: 0xbef2af02a27DD69B2cE91F14d67e8F85EC116483
Few minutes after StallionMosquito posted this:
My used ETH public address: 0x6B7E7D46A5Dc49A48Cc38339e511EF38d4b53b26
And zef316 posted his addy here https://archive.fo/wCcOa:
Hello sir,
I have given my MEW address 0x2a02904C2d7510A28d184387AAb187478182a60b
but have not received any coin yet,  please process payment sir. my name is in spread sheet on Sr. No. 31

thank you
good day.

And that address was posted only few minutes before imrobo's post, all 3 accounts posted back to back:
My used ETH public address: 0x2a02904C2d7510A28d184387AAb187478182a60b

So, account cheechu is another alt (https://archive.fo/ZzwZq#selection-3027.0-3027.7).

To make this connection more solid, zef316 posted this:
Hello,
Thanks for the opportunity. I have Joined both, Slack and Telegram.
Telegram: @zef316
Slack: zef316
ETH: 0x6B7E7D46A5Dc49A48Cc38339e511EF38d4b53b26
Thank yous
Which is stallionmosquito's addy. (https://archive.fo/zpHiN)

So, accounts connected: imrobo2, StallionMosquito, cheechu, zef316

EDIT*

Same twitter used by stallionmosquito and imbro2
https://twitter.com/imhbk1 https://archive.fo/qXWeZ#selection-2235.0-2235.13. https://archive.fo/2pDvG#selection-7043.0-7043.25 Also merit exchange.



On side note @Timelord2067 why is reagannn in Hall of Shame, maybe I missed it but which bounty he abused?
member
Activity: 213
Merit: 53
Accounts Connected:
Lysables28, Iskandar AB, rencong bitcoin, putri annisa, Novita


Proof:
I want to explore more with this cheater and as expected i have found their other alts....

I've found their 11 alt accounts. https://bitcointalksearch.org/topic/m.31846934

BitrentX also has found their other alts before on here https://bitcointalksearch.org/topic/m.31856884

And this is my new found about their alt accounts....

Lysables28 posted same address with joe marla.
WEEK: #20 (30-06 Mei)
Bitcointalk username: Lysables28
Twitter Link: https://twitter.com/elsa_gunawan212
Twitter Audit Link: https://www.twitteraudit.com/elsa_gunawan212
ETH address: 0x5CA3326C984705B2F6A9B67c1b28C94c74A0D7fC

http://archive.is/4P17d

#proof authentication post
#join Twitter Campaign
twitter user name: @joearanda17
Twitter profil link: https://twitter.com/joearanda17
Bitcointalk username: joe marla
Profile link: https://bitcointalksearch.org/user/joe-marla-1090756
Ether address: 0x5CA3326C984705B2F6A9B67c1b28C94c74A0D7fC
http://archive.is/rtRh7



IskandarAB and rencong bitcoin posted same address like kandarAB
Proof of joined post
Bitcointalk username: kandarAB
Campaign in which you participate: Twitter, Telegram, and Facebook
ETH address: 0xBFe49E7B66ff81211Aa5642A4310c95C523A1960

#JOIN

Bitcointalk username: rencong bitcoin
Forum rank: member
Posts count: 195 (including registration post)
ETH address: 0x2D5B82c5F050e0f776e416583649C5763C52231c
http://archive.is/88mYs


Quote from: putri annisa
Bitcointalk account URL: https://bitcointalksearch.org/user/putri-annisa-1216744
Bitcointalk username: putri annisa
Forum rank: Member
Starting post count: 104
ETH Address: 0x2D5B82c5F050e0f776e416583649C5763C52231c
http://archive.is/HyZkv

With this valid proofs, we can say if Lysables28, Iskandar AB, rencong bitcoin and putri annisa are connected with all accounts which i and BitrentX have found before.


Related Addresses:
Code:
0x2D5B82c5F050e0f776e416583649C5763C52231c
0xBFe49E7B66ff81211Aa5642A4310c95C523A1960
0x5CA3326C984705B2F6A9B67c1b28C94c74A0D7fC


Miscellaneous:
Cheating bounty, abusing bounty and merits, abusing trust (giving positive trust to their alts), copy-paste (aneukmuda), and ban evasion. This person has done all bad things and should be get a permaban
Red color = Negative trust
Purple = Permaban.

Quote from: BitrentX
Please note that aneukmuda is perma-banned for copy-paste therefore all of his alts must be banned and/or tagged for BAN EVASION, CHEATING CAMPAIGNS AND BOUNTIES, AND ABUSING THE MERIT SYSTEM.
jr. member
Activity: 504
Merit: 5
Thank you for taking away the negative trust! No offense ...
newbie
Activity: 15
Merit: 1
buying and selling bitcointalk accounts
I would be more than happy to tag these jokers for selling accounts, but I don't speak whatever language that is that the posts are written in.  I don't think I'm asking too much by requesting that you please translate posts like that into English before dropping them into a thread like this. 

And if your translation is wrong, then it's an easy enough task to remove feedback if the accused has an argument that they're innocent.  Thank you.
maybe the Indonesian moderator (BitRentX) is the right person to crack down on the seller of this account. he is also a member of DT.
sr. member
Activity: 770
Merit: 268
Accounts Connected:

Paidi, Unread, mhd japar siregar, Hirose UK

Proof:

- Paidi used 13P2e4rq1UaAWYa9Mi6R2yQD4svVquDP7N as his address back in 2015. It is part of a bigger wallet that contains the addresses in this list: https://www.walletexplorer.com/wallet/1053e07438cb6018/addresses
Archived: https://archive.li/t1ceu#selection-809.0-809.34

- 189TEvqMHev1akB7nNd9W2FCwJVjy6Nkiy, has been used by Unread.
Archived: https://archive.li/05Dwk#selection-4422.1-4463.34

- 1HBjAvX4txeYRGK9Wb9wNDkfg81esxKgHN has been used by mhd japar siregar.
Archived: https://archive.li/Bh3Qf#selection-6713.0-6721.17

- 1M7VLNdpxTuDkAx9ktmy6xTdbWWHy4hsSS has been used by Hirose UK.
Archived: https://archive.li/TAZHE#selection-4579.10-4579.44


Related Addresses:

List of old wallet address that connect this account:
Code:
189TEvqMHev1akB7nNd9W2FCwJVjy6Nkiy
1HBjAvX4txeYRGK9Wb9wNDkfg81esxKgHN
1M7VLNdpxTuDkAx9ktmy6xTdbWWHy4hsSS
1Axvo1JNoJxMRE2aaRZXPSJXFxy1cmMJoM
18pxxP7J4qgd6Ccfmpa7jmKL4bC4GFRrbs
13P2e4rq1UaAWYa9Mi6R2yQD4svVquDP7N

Possibly related account:
Keyboard PC => same posting style, has been found to be using 1Axvo1JNoJxMRE2aaRZXPSJXFxy1cmMJoM (google it and it will show up coming from a phishing site pretending to be Bitcointalk), even though I can't archive it yet.

Miscellaneous:

- Hirose UK and Unread joined Money Token signature campaign at the same time: https://docs.google.com/spreadsheets/d/1mXVjLYMjNqpcUGSDjTpwrB4AuPhPL3ZkZNzO4drHffE/edit#gid=15856888
Screenshot: https://image.ibb.co/hZY6ES/Screenshot_from_2018_05_09_06_39_47.png

- Hirose UK and Unread both join Honestdoubler giveaway: https://archive.li/05Dwk#selection-4422.1-4463.34
member
Activity: 168
Merit: 12
Accounts Connected:
josh07, curry101, winfair, Pompa, joshua10, Mainman08

Proof:
From Betterbetting bounty, https://docs.google.com/spreadsheets/d/1G1T8UhgtMQIsKpBkpQq-zqsb_92t1iljc_B7QRQOe90/edit#gid=1310713430

Winfair's ETH address 0x4F028aA0D2C931F980DF57AfF551e26744911bfC (#15)
josh07's ETH address 0xeC3bd0787719CE663f2EE28345E786Cc96E89b7e (#12)
curry101's ETH address 0x99DDdE67b7cb81efb4EA9Bd69690dB4a1504498C (#56)

Proof:
From Kickcity signature bounty, https://docs.google.com/spreadsheets/d/1W6uN6HUvFzH9bHHSva7oieM2Tlt-HpCC-Q-WBfq4Dmg/edit#gid=1786145968
We can see
pompa's ETH address 0x4F028aA0D2C931F980DF57AfF551e26744911bfC (#97)
Joshua10's ETH address 0xeC3bd0787719CE663f2EE28345E786Cc96E89b7e (#20)

I see them using the same address for different accounts. And all sends to the address 0xEAea8a86A88886BF8EAd0646be4037d1699147e9

From AppCoins signature bounty, https://docs.google.com/spreadsheets/d/1_NU15-YW8YnDYmZHiIVAM-QF3QiiNW6To2KWxkm-piM/edit#gid=876123805

curry101's ETH address 0x99DDdE67b7cb81efb4EA9Bd69690dB4a1504498C (#2)
Mainman08's ETH address 0xCc0B812df76613ff5d628788296AEb94d3464eBB (#29)

From AppCoins send to 0x8c5B6ff602455821a74Db62fD8b845F175Aee67e

Related Addresses:
Code:
0x4F028aA0D2C931F980DF57AfF551e26744911bfC
0xeC3bd0787719CE663f2EE28345E786Cc96E89b7e
0x99DDdE67b7cb81efb4EA9Bd69690dB4a1504498C
0xCc0B812df76613ff5d628788296AEb94d3464eBB

Account farmer again!
Accounts Connected:
MasNizzer, Landakhitam, Sungoku

Proof:
From UTrust.io signature bounty, https://docs.google.com/spreadsheets/d/1Z7vmnANbyyECG9dQG11m8lnlBvGvfLd5rVJcl_1OW6c/edit#gid=581688320

MasNizzer's ETH address 0xeaEc1c8cf892c30195D3619320c9a7874856765C (#48)
Landakhitam's ETH address 0x7a01955771CF68F3a83e147Ff40e4B792A1a6612 (#165)

From UTrust.io slack bounty, https://docs.google.com/spreadsheets/d/1Z7vmnANbyyECG9dQG11m8lnlBvGvfLd5rVJcl_1OW6c/edit#gid=859892095

Sungoku's ETH address 0xe95BAD0D7a8d503348366A7A652616c5aa81D42b (#160)

0xeaEc1c8cf892c30195D3619320c9a7874856765C to 0x7595f546F72FfF1EB20Fdd6974fc6A7736063287
0x7a01955771CF68F3a83e147Ff40e4B792A1a6612 to 0xBdeB49549E0AFc98E0438b951097b5d6fa918D7b

All send the token to the same address, but they send the token first to the backup address and the backup address is above. The last address they send 0x9EA246Cdea7199b4E4E185FAA5abecfFB3630d4F

Related Addresses:
Code:
0xeaEc1c8cf892c30195D3619320c9a7874856765C
0x7a01955771CF68F3a83e147Ff40e4B792A1a6612
0xe95BAD0D7a8d503348366A7A652616c5aa81D42b

Accounts Connected:
ruskytailz02, raymart0720, rcoins0720

Proof:
ruskytailz02's ETH address 0x100cdE3d1D9383507074bf3a8577862E9D8Ee5bc
raymart0720's ETH address 0x889ae472e56A005989A665aA7C85adb4c35647Fd
rcoins0720's ETH address 0x76a19b7c2326cc49b667e94A2d5928935b2F6888

Their address is connected to this address 0xa4E7896C1E84d0f1988415DCD88274D68D0E5394



And their account while following Bounty



Related Addresses:
Code:
0x100cdE3d1D9383507074bf3a8577862E9D8Ee5bc
0x889ae472e56A005989A665aA7C85adb4c35647Fd
0x76a19b7c2326cc49b667e94A2d5928935b2F6888
newbie
Activity: 28
Merit: 0
Timelord2067
Sorry. I'll try to do it in proper way:

Accounts Connected: yigga (uid = 26188), mig5000 (uid = 220603), SistaFista (uid = 111190), Omega0255 (uid = 21043), Stargazer (uid = 361580), Grillo (uid = 301790), Anonylz (uid = 153613), MiningSensei (uid = 260575)

yigga (uid = 26188) - old account, sleeping -> wake up 16 april -> mass posting -> go to Equitybase Bounty #180 -> go to
Marginless Bounty campaign #78

mig5000 (uid = 220603) - old account, sleeping -> wake up 16 april -> mass posting -> go to Equitybase Bounty #194 -> go to
Marginless Bounty campaign #77

SistaFista (uid = 111190) - old account, sleeping -> wake up 16 april -> mass posting -> go to Equitybase Bounty #182 -> go to
Marginless Bounty campaign #82

Omega0255 (uid = 21043) - old account, sleeping -> wake up 6 day later 22 april -> mass posting -> go to Equitybase Bounty #177 -> go to
Marginless Bounty campaign #85

Stargazer (uid = 361580) - old account, sleeping -> wake up 16 april -> mass posting -> go to Equitybase Bounty #187 -> go to
Marginless Bounty campaign # MAY BE TODAY?

Grillo (uid = 301790) - old account, sleeping -> wake up 6 day later 22 april -> mass posting -> go to Equitybase Bounty #179 -> go to
Marginless Bounty campaign # MAY BE TODAY?

OWNERS: Anonylz (uid = 153613) MiningSensei (uid = 260575)
Same way Equitybase Bounty #199, 195 -> go to
Marginless Bounty campaign #79, 83
Both accounts were most likely sold several times. A pause in posts between August 2017 and October and a sharp change in the style of posts. On both accounts at the same time. https://bitcointalksearch.org/user/anonylz-153613;sa=showPosts;start=340 https://bitcointalksearch.org/user/miningsensei-260575;sa=showPosts;start=380
By December 2017, both accounts had simultaneously learned to quote messages and the style had changed again.
Both accounts constantly use different bitcoins wallets from campaign to campaign.
October 10, 2017 fraudster was not yet experienced and risked: https://bitcointalksearch.org/topic/closed-multibot-signature-campaign-2255703 https://bitcointalksearch.org/topic/m.22827778 Between the posts is 4 minutes.

This accounts are obviously connected, cheating bounty campaigns and deserve negative trust.

After i published this info here
Anonylz (uid = 153613) began to delete some messages but i have a screenshots:
October 10, 2017 fraudster was not yet experienced and risked: https://bitcointalksearch.org/topic/closed-multibot-signature-campaign-2255703 https://bitcointalksearch.org/topic/m.22827778 Between the posts is 4 minutes.
He deleted the message on the first link.
But he forgot about the screenshots. And now his Activity > number of posts  Roll Eyes
Make a quote to make the pictures appear
https://i.imgur.com/0jmrxyE.png
https://i.imgur.com/CJwJQpV.png
jr. member
Activity: 504
Merit: 5
legendary
Activity: 3528
Merit: 7005
Top Crypto Casino
buying and selling bitcointalk accounts
I would be more than happy to tag these jokers for selling accounts, but I don't speak whatever language that is that the posts are written in.  I don't think I'm asking too much by requesting that you please translate posts like that into English before dropping them into a thread like this. 

And if your translation is wrong, then it's an easy enough task to remove feedback if the accused has an argument that they're innocent.  Thank you.
jr. member
Activity: 182
Merit: 1
Kind to review my thread. im helping raise voice to scamers project who lied to their communty by not paying their bounty.

https://bitcointalksearch.org/topic/m.36635105
legendary
Activity: 3696
Merit: 2219
💲🏎️💨🚓
Need DT member here to stop abusing of bounty.
https://bitcointalksearch.org/topic/bounty-abusing-alts-3595400

You haven't even given the accounts in question any trust, good, bad or indifferent and yet you want us to check out (and act on) your thread which would be better off here where people can act on it.

What does UUID mean?  I've heard of a UID which is a User IDenetity, but U-U I.D. ??  Just doesn't make any sense.
legendary
Activity: 3696
Merit: 2219
💲🏎️💨🚓
Dear Nyerok,

Thank you for posting in the Known Alts thread, two things, please don't post screen shots for the kind of post you have made, they can be doctored and therefore won't be taken seriously.

Always post the text of the case you are reviewing, people can search for text here, they can't search an image here.  For example they can search for a wallet address - if you have posted an image, the search engine won't find your post.

I can't add your details to the Google spread sheet for the same reason that I can't copy your text and I can't therefore add you to the level of awesomeness either.
newbie
Activity: 560
Merit: 0
newbie
Activity: 28
Merit: 0
Jump to: