![](/screenshots/57374ea7-51a7-4c03-85e2-87d2253f8ef1.png)
p3plvcpnl316301.prod.phx3.secureserver.net
Open in
urlscan Pro
132.148.208.68
Malicious Activity!
Public Scan
Submission Tags: @ipnigh
Submission: On December 15 via api from GB
Summary
TLS certificate: Issued by Starfield Secure Certificate Authorit... on September 18th 2018. Valid for: 2 years.
This is the only time p3plvcpnl316301.prod.phx3.secureserver.net was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: BB&T Bank (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
3 | 132.148.208.68 132.148.208.68 | 26496 (AS-26496-...) (AS-26496-GO-DADDY-COM-LLC - GoDaddy.com) | |
7 | 23.0.36.157 23.0.36.157 | 16625 (AKAMAI-AS) (AKAMAI-AS - Akamai Technologies) | |
3 | 23.210.248.45 23.210.248.45 | 16625 (AKAMAI-AS) (AKAMAI-AS - Akamai Technologies) | |
1 | 23.0.46.158 23.0.46.158 | 16625 (AKAMAI-AS) (AKAMAI-AS - Akamai Technologies) | |
1 3 | 172.82.224.88 172.82.224.88 | 15224 (OMNITURE) (OMNITURE - Adobe Systems Inc.) | |
2 | 95.101.176.176 95.101.176.176 | 16625 (AKAMAI-AS) (AKAMAI-AS - Akamai Technologies) | |
1 | 192.28.147.68 192.28.147.68 | 53580 (MARKETO) (MARKETO - MARKETO) | |
25 | 8 |
ASN26496 (AS-26496-GO-DADDY-COM-LLC - GoDaddy.com, LLC, US)
PTR: ip-132-148-208-68.ip.secureserver.net
p3plvcpnl316301.prod.phx3.secureserver.net |
ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US)
PTR: a23-0-36-157.deploy.static.akamaitechnologies.com
bank.bbt.com |
ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US)
PTR: a23-210-248-45.deploy.static.akamaitechnologies.com
assets.adobedtm.com |
ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US)
PTR: a23-0-46-158.deploy.static.akamaitechnologies.com
service.maxymiser.net |
ASN15224 (OMNITURE - Adobe Systems Inc., US)
PTR: bbt.com.ssl.sc.omtrdc.net
sstats.bbt.com |
ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US)
PTR: a95-101-176-176.deploy.static.akamaitechnologies.com
munchkin.marketo.net |
Apex Domain Subdomains |
Transfer | |
---|---|---|
10 |
bbt.com
1 redirects
bank.bbt.com sstats.bbt.com |
175 KB |
3 |
adobedtm.com
assets.adobedtm.com |
29 KB |
3 |
secureserver.net
p3plvcpnl316301.prod.phx3.secureserver.net |
17 KB |
2 |
marketo.net
munchkin.marketo.net |
6 KB |
1 |
mktoresp.com
636-zej-858.mktoresp.com |
303 B |
1 |
maxymiser.net
service.maxymiser.net |
|
25 | 6 |
Domain | Requested by | |
---|---|---|
7 | bank.bbt.com |
p3plvcpnl316301.prod.phx3.secureserver.net
|
3 | sstats.bbt.com |
1 redirects
p3plvcpnl316301.prod.phx3.secureserver.net
|
3 | assets.adobedtm.com |
p3plvcpnl316301.prod.phx3.secureserver.net
bank.bbt.com |
3 | p3plvcpnl316301.prod.phx3.secureserver.net |
p3plvcpnl316301.prod.phx3.secureserver.net
|
2 | munchkin.marketo.net |
assets.adobedtm.com
munchkin.marketo.net |
1 | 636-zej-858.mktoresp.com |
munchkin.marketo.net
|
1 | service.maxymiser.net |
bank.bbt.com
|
25 | 7 |
This site contains links to these domains. Also see Links.
Domain |
---|
bank.bbt.com |
www.bbt.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.prod.phx3.secureserver.net Starfield Secure Certificate Authority - G2 |
2018-09-18 - 2020-09-18 |
2 years | crt.sh |
www.bbt.com DigiCert SHA2 Extended Validation Server CA |
2019-04-03 - 2021-02-08 |
2 years | crt.sh |
assets.adobedtm.com DigiCert SHA2 High Assurance Server CA |
2019-10-22 - 2021-10-01 |
2 years | crt.sh |
*.maxymiser.net DigiCert SHA2 Secure Server CA |
2019-01-15 - 2020-04-15 |
a year | crt.sh |
sstats.bbt.com DigiCert SHA2 Extended Validation Server CA |
2017-12-20 - 2019-12-21 |
2 years | crt.sh |
*.marketo.net DigiCert SHA2 Secure Server CA |
2018-12-24 - 2020-03-24 |
a year | crt.sh |
*.mktoresp.com GeoTrust RSA CA 2018 |
2018-02-05 - 2020-02-05 |
2 years | crt.sh |
This page contains 1 frames:
Primary Page:
https://p3plvcpnl316301.prod.phx3.secureserver.net/~jsyscbdv5dpe/cgi-bin/home/Online/verify.html
Frame ID: 0BC8ECD954F2B515E68924FD5FEE1620
Requests: 25 HTTP requests in this frame
Screenshot
![](/screenshots/57374ea7-51a7-4c03-85e2-87d2253f8ef1.png)
Detected technologies
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|\b)HTTPD)/i
![](/vendor/wappa/icons/adobedmt.png)
Detected patterns
- script /\/\/assets.adobedtm.com\//i
![](/vendor/wappa/icons/Marketo.png)
Detected patterns
- script /munchkin\.marketo\.net\/munchkin\.js/i
![](/vendor/wappa/icons/SiteCatalyst.png)
Detected patterns
- script /\/s[_-]code.*\.js/i
Detected patterns
- script /jquery[.-]([\d.]*\d)[^\/]*\.js/i
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
Page Statistics
11 Outgoing links
These are links going to different origins than the main page.
Title: Skip Navigation
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Title: Cancel
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Title: Yes Leave page and no changes are made.
Search URL Search Domain Scan URL
Title: No click to close window and return to Page
Search URL Search Domain Scan URL
Title: Click to Close Window
Search URL Search Domain Scan URL
Title: Privacy & Security
Search URL Search Domain Scan URL
Title: Disclosures
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Title: Leave Pageand no changes saved
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 19- https://sstats.bbt.com/b/ss/bbt-com-dtm-dev/1/H.27.4-D6EF/s4320181334179?AQB=1&ndh=1&t=15%2F11%2F2019%2013%3A17%3A41%200%20-60&D=D%3D&fid=5918120F563EA6C4-22FFE2D6EBF915EE&ce=UTF-8&ns=bbandt&pageName=bbt.com%3Abbt.com%3Alogin%3Aforgot_user_id%3Aaccount_id&g=https%3A%2F%2Fp3plvcpnl316301.prod.phx3.secureserver.net%2F%7Ejsyscbdv5dpe%2Fcgi-bin%2Fhome%2FOnline%2Fverify.html&cc=USD&ch=bbt.com%3Abbt.com&server=bbt.com&c4=D%3Dv39&c5=Logged-In&c6=New&v11=BB%26T%20Client%3A&c21=D%3DpageName&v24=Sunday%3A7%3A00AM&v29=D%3Dc2&c32=Sunday%3A7%3A00AM&v32=D%3DpageName&v33=bbt.com%3Abbt.com%3Ano_tracking_code%3Awithout_caseid&v39=https%3A%2F%2Fp3plvcpnl316301.prod.phx3.secureserver.net%2F%7Ejsyscbdv5dpe%2Fcgi-bin%2Fhome%2FOnline%2Fverify.html&v41=D%3Dc44&c46=mozilla%2F5.0%20%28macintosh%3B%20intel%20mac%20os%20x%2010_14_5%29%20applewebkit%2F537.36%20%28khtml%2C%20like%20gecko%29%20chrome%2F74.0.3729.169%20safari%2F537.36&c59=EN&v59=D%3Dc59&c70=D%3Dv38&c73=D%3Dv73&c74=H.27.4.&v74=2DBE980E5768DC9F7993546A34539AB9&h1=bbt.com%3Abbt.com%3Alogin%3Aforgot_user_id%3Aaccount_id&s=1600x1200&c=24&j=1.6&v=N&k=Y&bw=1600&bh=1200&AQE=1 HTTP 302
- https://sstats.bbt.com/b/ss/bbt-com-dtm-dev/1/H.27.4-D6EF/s4320181334179?AQB=1&pccr=true&vidn=2EFB12330531015B-60000114400065E1&&ndh=1&t=15%2F11%2F2019%2013%3A17%3A41%200%20-60&D=D%3D&fid=5918120F563EA6C4-22FFE2D6EBF915EE&ce=UTF-8&ns=bbandt&pageName=bbt.com%3Abbt.com%3Alogin%3Aforgot_user_id%3Aaccount_id&g=https%3A%2F%2Fp3plvcpnl316301.prod.phx3.secureserver.net%2F%7Ejsyscbdv5dpe%2Fcgi-bin%2Fhome%2FOnline%2Fverify.html&cc=USD&ch=bbt.com%3Abbt.com&server=bbt.com&c4=D%3Dv39&c5=Logged-In&c6=New&v11=BB%26T%20Client%3A&c21=D%3DpageName&v24=Sunday%3A7%3A00AM&v29=D%3Dc2&c32=Sunday%3A7%3A00AM&v32=D%3DpageName&v33=bbt.com%3Abbt.com%3Ano_tracking_code%3Awithout_caseid&v39=https%3A%2F%2Fp3plvcpnl316301.prod.phx3.secureserver.net%2F%7Ejsyscbdv5dpe%2Fcgi-bin%2Fhome%2FOnline%2Fverify.html&v41=D%3Dc44&c46=mozilla%2F5.0%20%28macintosh%3B%20intel%20mac%20os%20x%2010_14_5%29%20applewebkit%2F537.36%20%28khtml%2C%20like%20gecko%29%20chrome%2F74.0.3729.169%20safari%2F537.36&c59=EN&v59=D%3Dc59&c70=D%3Dv38&c73=D%3Dv73&c74=H.27.4.&v74=2DBE980E5768DC9F7993546A34539AB9&h1=bbt.com%3Abbt.com%3Alogin%3Aforgot_user_id%3Aaccount_id&s=1600x1200&c=24&j=1.6&v=N&k=Y&bw=1600&bh=1200&AQE=1
25 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
verify.html
p3plvcpnl316301.prod.phx3.secureserver.net/~jsyscbdv5dpe/cgi-bin/home/Online/ |
25 KB 5 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-1.9.1.min.js
bank.bbt.com/bbtpassreset/content/js/ |
97 KB 36 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.mask.js
bank.bbt.com/bbtpassreset/content/js/ |
16 KB 5 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
overview_v1.css
bank.bbt.com/bbtpassreset/content/css/ |
79 KB 16 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
styles_v1.css
bank.bbt.com/bbtpassreset/content/css/ |
315 KB 58 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
s-code-contents-bea128958d738e75cd806a6872947dd61c940126.js
assets.adobedtm.com/ac265c174e480c2b170c2d73fbe2ff4ca87ebaac/ |
62 KB 23 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
satellite-564649ba64746d41e0007125.js
assets.adobedtm.com/ac265c174e480c2b170c2d73fbe2ff4ca87ebaac/scripts/ |
15 KB 5 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
u-logo.png
p3plvcpnl316301.prod.phx3.secureserver.net/~jsyscbdv5dpe/cgi-bin/home/Online/T-Dox/content/dam/bbt/bbt.com/landscape/personal/info/ |
10 KB 10 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
alert.png
p3plvcpnl316301.prod.phx3.secureserver.net/~jsyscbdv5dpe/cgi-bin/home/Online/wpfile/ |
2 KB 2 KB |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
WaAnalytics.js
bank.bbt.com/bbtpassreset/content/js/ |
188 KB 38 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
passrst-script_v1.js
bank.bbt.com/bbtpassreset/content/js/ |
82 KB 16 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
print.css
bank.bbt.com/bbtpassreset/content/css/ |
5 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
sourcesanspro-regular-webfont.woff
bank.bbt.com/bbtpassreset/content/css/fonts/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
sourcesanspro-semibold-webfont.woff
bank.bbt.com/bbtpassreset/content/css/fonts/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
sourcesanspro-bold-webfont.woff
bank.bbt.com/bbtpassreset/content/css/fonts/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
mmcore.js
service.maxymiser.net/cdn/bbt/js/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
sourcesanspro-regular-webfont.ttf
bank.bbt.com/bbtpassreset/content/css/fonts/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
sourcesanspro-semibold-webfont.ttf
bank.bbt.com/bbtpassreset/content/css/fonts/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
sourcesanspro-bold-webfont.ttf
bank.bbt.com/bbtpassreset/content/css/fonts/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
satellite-560c459a326131277000018a.js
assets.adobedtm.com/ac265c174e480c2b170c2d73fbe2ff4ca87ebaac/scripts/ |
1 KB 759 B |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
s4320181334179
sstats.bbt.com/b/ss/bbt-com-dtm-dev/1/H.27.4-D6EF/ Redirect Chain
|
43 B 743 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
munchkin.js
munchkin.marketo.net/ |
1 KB 1 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
munchkin.js
munchkin.marketo.net/155/ |
9 KB 4 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
visitWebPage
636-zej-858.mktoresp.com/webevents/ |
2 B 303 B |
XHR
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
s46411690786432
sstats.bbt.com/b/ss/bbt-com-dtm-dev/1/H.27.4-D6EF/ |
43 B 743 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- bank.bbt.com
- URL
- https://bank.bbt.com/bbtpassreset/content/css/fonts/sourcesanspro-regular-webfont.woff
- Domain
- bank.bbt.com
- URL
- https://bank.bbt.com/bbtpassreset/content/css/fonts/sourcesanspro-semibold-webfont.woff
- Domain
- bank.bbt.com
- URL
- https://bank.bbt.com/bbtpassreset/content/css/fonts/sourcesanspro-bold-webfont.woff
- Domain
- bank.bbt.com
- URL
- https://bank.bbt.com/bbtpassreset/content/css/fonts/sourcesanspro-regular-webfont.ttf
- Domain
- bank.bbt.com
- URL
- https://bank.bbt.com/bbtpassreset/content/css/fonts/sourcesanspro-semibold-webfont.ttf
- Domain
- bank.bbt.com
- URL
- https://bank.bbt.com/bbtpassreset/content/css/fonts/sourcesanspro-bold-webfont.ttf
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: BB&T Bank (Banking)106 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate function| $ function| jQuery string| olbUserFlag string| maskedNumber string| webSessionId string| pageName string| waEventCode string| secFeat string| secQuestn string| strongPwd function| enableEmailDiv function| enablePhoneDiv function| enrollOLB function| abandonWA function| abandonNoWA function| abandonYesWA string| purl string| s_account object| s function| s_doPlugins undefined| dfaConfig function| wa_lpEvents function| wa_lpEvents_new string| s_code string| s_objectID function| s_gi function| s_giqf function| c_r function| c_rspers function| c_w string| s_an function| s_sp function| s_jn function| s_rep function| s_d function| s_fe function| s_fa function| s_ft object| s_c_il number| s_c_in number| s_giq function| trackPageObject function| trackLinkObject function| trackDynamicPageObject function| trackExitLinkObject function| trackDownloadObject function| trackingVariablePrep function| setSiteCatalystDataObject function| captureCampaignCodes function| retrieveIntLink function| clone function| oaoCheck object| scDataMap boolean| clearEvents string| globalContextUrl number| totalTime number| warningTime string| logOffUrl number| timeoutTid undefined| logOffTid string| secId object| bbt object| glbPageData function| waOnLoad function| waManageVars object| _satellite function| initTimeout function| abortLogOffTimer function| doCommonFormSubmit boolean| formSubmitted function| doubleSubmitCheck function| submitPasswordResetForm function| submitMeOnEnter function| resendOTP object| BBT object| lightbox object| jQuery19105706625111042427 function| olbAutoTimeoutFunction string| key object| pageDataHolder object| dc number| f number| ne object| gmar number| dsts object| gnov number| dste object| spr object| fl object| cd number| utc object| tz number| thisy number| thish number| thismin number| thisd string| j string| k object| s_i_0_bbandt function| mktoMunchkinFunction object| Munchkin function| mktoMunchkin object| MunchkinTracker object| s_i_0_bbandt_13 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.secureserver.net/ | Name: _mkto_trk Value: id:636-ZEJ-858&token:_mch-secureserver.net-1576412262126-91478 |
|
.secureserver.net/ | Name: s_pers Value: %20s_fid%3D5918120F563EA6C4-22FFE2D6EBF915EE%7C1639570661988%3B%20gpv_p32%3Dbbt.com%253Abbt.com%253Alogin%253Aforgot_user_id%253Aaccount_id%7C1576414061989%3B%20s_nr%3D1576412261989-New%7C1579004261989%3B |
|
.secureserver.net/ | Name: s_sess Value: %20s_cc%3Dtrue%3B%20s_sq%3D%3B |
2 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
636-zej-858.mktoresp.com
assets.adobedtm.com
bank.bbt.com
munchkin.marketo.net
p3plvcpnl316301.prod.phx3.secureserver.net
service.maxymiser.net
sstats.bbt.com
bank.bbt.com
132.148.208.68
172.82.224.88
192.28.147.68
23.0.36.157
23.0.46.158
23.210.248.45
95.101.176.176
0ad03d29ddccb578e4836c5463d15814132a481f601d79909537eec07d393810
177d679046c2862770d537dc4e7ced86f97f44cd290e3298df2317058d3d5484
2bdc27436a51c5e6e28e5b62179513e3435e8f4373f2f7d959cefa94d1210aa4
4b3683b03cc22e50675b37765e8d87343c6c7acf36b341839b2e1dcce393d795
4d0e29856ed71992e8e241255ef84875ee7e3fcbb6a27c42bad9da9f2755136f
52e13531849e2eb1d9580a63b400b2c6512b2119dd42657e61c84a1c324f7ec3
565339bc4d33d72817b583024112eb7f5cdf3e5eef0252d6ec1b9c9a94e12bb3
754739f717dea0a4a759313c0fa9aa864761426b671e01aa609c903c3bc74f18
7a5d872635ceb740f5ba69f06e880f8eb12bd4fbf2b7e52fb3811be9bfeaa426
966687b62b554dbc40bf0462145dfebe42d138b0ceded2320e5ef97b0fd67ef1
a1ecbaed793a1f564c49c671f2dd0ce36f858534ef6d26b55783a06b884cc506
aa5ba3a07a3970664e8c4280188a2ccf47a5775dead3595afe24d8351a377f0f
bb4482d252af40dce2f4f1a550756c9bd98ecfb7230cefef4e53571f262d3109
cd079c65851694efa71ac98e72a4b460b21167468313ffed4170779ae2f609d1
cdc8b52c9402b72ef9c698027c0d2ea63058ed98b832a31d3ac57c9e7f8b35ed
efb6b9732bf508ee305363b10cf2a67ace474e06eb42642f2c3696b2442a5775
f97341de4415531cb15d7472b1a00e875c1ad9b5541fd7e9f8ef5905f2a02092