http://cars4x4noy5z3hoq5ggwsovel46ao2ejieu7gfpr5cqqecqzku4lmoid.onion/order.php
Our level of preparation for custom hijacking is significantly greater than for classic hijacking. When ordering a car of a certain model, we first buy a similar, broken or burnt-out vehicle of the same model, which is beyond repair. We then search the database for a vehicle with a similar vehicle identification number (VIN), so that a maximum of a couple of digits differ.