▄█    █▄       ▄████████ ███▄▄▄▄      ▄████████ ▄██   ▄     ▄▄▄▄███▄▄▄▄      ▄████████ ███▄▄▄▄      ▄████████  ▄██████▄  ███▄▄▄▄   
  ███    ███     ███    ███ ███▀▀▀██▄   ███    ███ ███   ██▄ ▄██▀▀▀███▀▀▀██▄   ███    ███ ███▀▀▀██▄   ███    ███ ███    ███ ███▀▀▀██▄ 
  ███    ███     ███    █▀  ███   ███   ███    ███ ███▄▄▄███ ███   ███   ███   ███    ███ ███   ███   ███    █▀  ███    ███ ███   ███ 
 ▄███▄▄▄▄███▄▄  ▄███▄▄▄     ███   ███  ▄███▄▄▄▄██▀ ▀▀▀▀▀▀███ ███   ███   ███   ███    ███ ███   ███   ███        ███    ███ ███   ███ 
▀▀███▀▀▀▀███▀  ▀▀███▀▀▀     ███   ███ ▀▀███▀▀▀▀▀   ▄██   ███ ███   ███   ███ ▀███████████ ███   ███ ▀███████████ ███    ███ ███   ███ 
  ███    ███     ███    █▄  ███   ███ ▀███████████ ███   ███ ███   ███   ███   ███    ███ ███   ███          ███ ███    ███ ███   ███ 
  ███    ███     ███    ███ ███   ███   ███    ███ ███   ███ ███   ███   ███   ███    ███ ███   ███    ▄█    ███ ███    ███ ███   ███ 
  ███    █▀      ██████████  ▀█   █▀    ███    ███  ▀█████▀   ▀█   ███   █▀    ███    █▀   ▀█   █▀   ▄████████▀   ▀██████▀   ▀█   █▀  
                                        ███    ███                                                                                    
⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘  

                                                                         ────────────────────────────────────────────
                                                                         |           ─ Table of Contents            |                                 								
                                                                         ────────────────────────────────────────────         					                    
                                                                         | »            0x00 Introduction           |				
                                                                         | »       0x01 Email HIBP + Numbers        |
                                                                         | »     0x02 Addresses + Past addresses    |
                                                                         | »      0x03 Relatives + Associates       |
                                                                         | »              0x04 Mugshot              |
                                                                         | »             0x05 Conclusion            |                      
                                                                         ────────────────────────────────────────────

⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘ 



╔════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╦══════╦═══════╗
▓░█░░░█░▓ [ Introduction ] ▓░█░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░▓ [ 0x00 ] ▓░█░░░█
└────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────┴──────┴───────┘ 


This pedophile likes to go around on discord.com searching for pedophile, I have found him in a server looking for underaged boys and girls, once exposed. It was revealed he had 30+ discord accounts for the same reason.
He tried hiding multiple times but to no avail, I still found him.
He also Mentioned that he was 28 when in reality he was 38.


Enjoy this lazily made dox

╔════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╦══════╦═══════╗
▓░█░░░█░▓ [ Email HIBP / Numbers ] ▓░█░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░▓ [ 0x01 ] ▓░█░░░█
└────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────┴──────┴───────┘ 


List of Email addresses: 

 ›           hnadezhda@yahoo.com
 ›           chrissie2@centurytel.net
 ›           vhburgfinestrcmd1@aol.com
 ›           hburgfinestrcm@aol.com
 ›           murfeinc@gmail.com



List of Numbers:

 ›           (919) 480-1604 (Primary Phone)    Landline    Bandwidth.com CLEC LLC - NC    First reported April 2023
 ›           (919) 410-6785    Landline    Bandwidth.com CLEC LLC - NC    First reported September 2022
 ›           (540) 271-0537    Wireless    Sprint Spectrum LP - VA    First reported August 2010
───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────




Email Lookups:

 ›           hnadezhda@yahoo.com
────────────────────────────────Have I been Pwned?:
 ›           1:
────────────────────────────────Lead Hunter: In March 2020, a massive trove of personal information referred to as "Lead Hunter" was provided to HIBP after being found left exposed on a publicly facing Elasticsearch server. 
────────────────────────────────The data contained 69 million unique email addresses across 110 million rows of data accompanied by additional personal information including names, phone numbers, genders and physical addresses. 
────────────────────────────────At the time of publishing, the breach could not be attributed to those responsible for obtaining and exposing it. The data was provided to HIBP by dehashed.com.
 ›           2:
────────────────────────────────River City Media Spam List (spam list): In January 2017, a massive trove of data from River City Media was found exposed online. 
────────────────────────────────The data was found to contain almost 1.4 billion records including email and IP addresses, names and physical addresses, all of which was used as part of an enormous spam operation. 
────────────────────────────────Once de-duplicated, there were 393 million unique email addresses within the exposed data.
 ›           3:
────────────────────────────────Verifications.io: In February 2019, 
────────────────────────────────the email address validation service verifications.io suffered a data breach. Discovered by Bob Diachenko and Vinny Troia, 
────────────────────────────────the breach was due to the data being stored in a MongoDB instance left publicly facing without a password and resulted in 763 million unique email addresses being exposed. 
────────────────────────────────Many records within the data also included additional personal attributes such as names, phone numbers, IP addresses, dates of birth and genders. No passwords were included in the data. 
────────────────────────────────The Verifications.io website went offline during the disclosure process, although an archived copy remains viewable.

────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────

 ›           chrissie2@centurytel.net (No Pwnage found)
 ›           vhburgfinestrcmd1@aol.com (No Pwnage found)

────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────

 ›           hburgfinestrcm@aol.com
────────────────────────────────Have I been Pwned?:
 ›           1:
────────────────────────────────Lead Hunter: In March 2020, a massive trove of personal information referred to as "Lead Hunter" was provided to HIBP after being found left exposed on a publicly facing Elasticsearch server.
────────────────────────────────The data contained 69 million unique email addresses across 110 million rows of data accompanied by additional personal information including names, phone numbers, genders and physical addresses. 
────────────────────────────────At the time of publishing, the breach could not be attributed to those responsible for obtaining and exposing it. The data was provided to HIBP by dehashed.com.
 ›           2:
────────────────────────────────River City Media Spam List (spam list): In January 2017, a massive trove of data from River City Media was found exposed online. 
────────────────────────────────The data was found to contain almost 1.4 billion records including email and IP addresses, names and physical addresses, all of which was used as part of an enormous spam operation. 
────────────────────────────────Once de-duplicated, there were 393 million unique email addresses within the exposed data.
 ›           3:
────────────────────────────────Verifications.io: In February 2019, the email address validation service verifications.io suffered a data breach. Discovered by Bob Diachenko and Vinny Troia, 
────────────────────────────────the breach was due to the data being stored in a MongoDB instance left publicly facing without a password and resulted in 763 million unique email addresses being exposed. 
────────────────────────────────Many records within the data also included additional personal attributes such as names, phone numbers, IP addresses, dates of birth and genders. No passwords were included in the data. 
────────────────────────────────The Verifications.io website went offline during the disclosure process, although an archived copy remains viewable.
 ›           4:
────────────────────────────────Advance Auto Parts: In June 2024, Advance Auto Parts confirmed they had suffered a data breach which was posted for sale to a popular hacking forum. Linked to unauthorised access to Snowflake cloud services, 
────────────────────────────────the breach exposed a large number of records related to both customers and employees. In total, 79M unique email addresses were included in the breach, 
────────────────────────────────alongside names, phone numbers, addresses and further data attributes related to company employees.
 ›           5:
────────────────────────────────Anti Public Combo List (unverified): In December 2016, a huge list of email address and password pairs appeared in a "combo list" referred to as "Anti Public". The list contained 458 million unique email addresses, 
────────────────────────────────many with multiple different passwords hacked from various online systems. The list was broadly circulated and used for "credential stuffing", 
────────────────────────────────that is attackers employ it in an attempt to identify other online systems where the account owner had reused their password. For detailed background on this incident, 
────────────────────────────────read Password reuse, credential stuffing and another billion records in Have I Been Pwned.
 ›           6:
────────────────────────────────Collection #1 (unverified): In January 2019, a large collection of credential stuffing lists (combinations of email addresses and passwords used to hijack accounts on other services) was discovered being distributed on a popular hacking forum. 
────────────────────────────────The data contained almost 2.7 billion records including 773 million unique email addresses alongside passwords those addresses had used on other breached services. 
────────────────────────────────Full details on the incident and how to search the breached passwords are provided in the blog post The 773 Million Record "Collection #1" Data Breach.
 ›           7:
────────────────────────────────Data & Leads: In November 2018, security researcher Bob Diachenko identified an unprotected database believed to be hosted by a data aggregator. 
────────────────────────────────Upon further investigation, the data was linked to marketing company Data & Leads. The exposed Elasticsearch instance contained over 44M unique email addresses along with names, 
────────────────────────────────IP and physical addresses, phone numbers and employment information. No response was received from Data & Leads when contacted by Bob and their site subsequently went offline.
 ›           8:
────────────────────────────────Exactis: In June 2018, the marketing firm Exactis inadvertently publicly leaked 340 million records of personal data. 
────────────────────────────────Security researcher Vinny Troia of Night Lion Security discovered the leak contained multiple terabytes of personal information spread across hundreds of separate fields including addresses, 
────────────────────────────────phone numbers, family structures and extensive profiling data. The data was collected as part of Exactis' service as a "compiler and aggregator of premium business & consumer data" which they then sell for profiling and marketing purposes. 
────────────────────────────────A small subset of the exposed fields were provided to Have I Been Pwned and contained 132 million unique email addresses.
 ›           9:
────────────────────────────────Kayo.moe Credential Stuffing List (unverified): In September 2018, a collection of almost 42 million email address and plain text password pairs was uploaded to the anonymous file sharing service kayo.moe. 
────────────────────────────────The operator of the service contacted HIBP to report the data which, upon further investigation, turned out to be a large credential stuffing list. For more information, read about The 42M Record kayo.
────────────────────────────────moe Credential Stuffing Data.
 ›           10:
────────────────────────────────MySpace: In approximately 2008, MySpace suffered a data breach that exposed almost 360 million accounts. 
────────────────────────────────In May 2016 the data was offered up for sale on the "Real Deal" dark market website and included email addresses, usernames and SHA1 hashes of the first 10 characters of the password converted to lowercase and stored without 
────────────────────────────────a salt. 
────────────────────────────────The exact breach date is unknown, but analysis of the data suggests it was 8 years before being made public.
 ›           11:
────────────────────────────────National Public Data (unverified): In April 2024, a large trove of data made headlines as having exposed "3 billion people" due to a breach of the National Public Data background check service. 
────────────────────────────────The initial corpus of data released in the breach contained billions of rows of personal information, including US social security numbers. 
────────────────────────────────Further partial data sets were later released including extensive personal information and 134M unique email addresses, 
────────────────────────────────although the origin and accuracy of the data remains in question. This breach has been flagged as "unverified" and a full description of the incident is in the link above.
 ›           12:
────────────────────────────────Not Acxiom (unverified): In 2020, a corpus of data containing almost a quarter of a billion records spanning over 400 different fields was misattributed to database marketing company Acxiom 
────────────────────────────────and subsequently circulated within the hacking community. 
────────────────────────────────On review, Acxiom concluded that "the claims are indeed false and that the data, which has been readily available across multiple environments, does not come from Acxiom and is in no way the subject of an Acxiom breach". 
────────────────────────────────The data contained almost 52M unique email addresses.
 ›           13:
────────────────────────────────Not SOCRadar: In August 2024, over 332M rows of email addresses were posted to a popular hacking forum. 
────────────────────────────────The post alleged the addresses were scraped from cybersecurity firm SOCRadar, however an investigation on their behalf concluded that "the actor merely utilised functionalities inherent in the platform's standard offerings, 
────────────────────────────────designed to gather information from publicly available sources". There is no suggestion the incident compromised SOCRadar's security or posed any risk to their customers. In total, 
────────────────────────────────the data set contained 282M unique addresses of valid email address format.
 ›           14:
────────────────────────────────Onliner Spambot (spam list): In August 2017, a spambot by the name of Onliner Spambot was identified by security researcher Benkow moʞuƎq. 
────────────────────────────────The malicious software contained a server-based component located on an IP address in the Netherlands which exposed a large number of files containing personal information. In total, 
────────────────────────────────there were 711 million unique email addresses, many of which were also accompanied by corresponding passwords. 
────────────────────────────────A full write-up on what data was found is in the blog post titled Inside the Massive 711 Million Record Onliner Spambot Dump.
 ›           15:
────────────────────────────────Data Enrichment Exposure From PDL Customer: In October 2019, security researchers Vinny Troia and Bob Diachenko identified an unprotected Elasticsearch server holding 1.2 billion records of personal data. 
────────────────────────────────The exposed data included an index indicating it was sourced from data enrichment company People Data Labs (PDL) and contained 622 million unique email addresses. 
────────────────────────────────The server was not owned by PDL and it's believed a customer failed to properly secure the database. Exposed information included email addresses, phone numbers, social media profiles and job history data.
 ›           16:
────────────────────────────────Pemiblanc (unverified): In April 2018, a credential stuffing list containing 111 million email addresses and passwords known as Pemiblanc was discovered on a French server.
────────────────────────────────The list contained email addresses and passwords collated from different data breaches and used to mount account takeover attacks against other services. Read more about the incident.
 ›           17:
────────────────────────────────SC Daily Phone Spam List (spam list): In early 2015, a spam list known as SC Daily Phone emerged containing almost 33M identities. 
────────────────────────────────The data includes personal attributes such as names, physical and IP addresses, genders, birth dates and phone numbers. Read more about spam lists in HIBP.
 ›           18:
────────────────────────────────Special K Data Feed Spam List (spam list): In mid to late 2015, a spam list known as the Special K Data Feed was discovered containing almost 31M identities. 
────────────────────────────────The data includes personal attributes such as names, physical and IP addresses, genders, birth dates and phone numbers. Read more about spam lists in HIBP.
 ›           19:
────────────────────────────────Straffic: In February 2020, Israeli marketing company Straffic exposed a database with 140GB of personal data. 
────────────────────────────────The publicly accessible Elasticsearch database contained over 300M rows with 49M unique email addresses. 
────────────────────────────────Exposed data also included names, phone numbers, physical addresses and genders. In their breach disclosure message, 
────────────────────────────────Straffic stated that "it is impossible to create a totally immune system, and these things can occur".
 ›           20:
────────────────────────────────Combolists Posted to Telegram: In May 2024, 2B rows of data with 361M unique email addresses were collated from malicious Telegram channels. 
────────────────────────────────The data contained 122GB across 1.7k files with email addresses, usernames, passwords and in many cases, the website they were entered into. 
────────────────────────────────The data appears to have been sourced from a combination of existing combolists and info stealer malware.
 ›           21:
────────────────────────────────Twitter (200M): In early 2023, over 200M records scraped from Twitter appeared on a popular hacking forum. 
────────────────────────────────The data was obtained sometime in 2021 by abusing an API that enabled email addresses to be resolved to Twitter profiles. 
────────────────────────────────The subsequent results were then composed into a corpus of data containing email addresses alongside public Twitter profile information including names, usernames and follower counts.

────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────

 ›           murfeinc@gmail.com
────────────────────────────────Have I been Pwned?:
 ›           1:
────────────────────────────────2,844 Separate Data Breaches (unverified): In February 2018, a massive collection of almost 3,000 alleged data breaches was found online. 
────────────────────────────────Whilst some of the data had previously been seen in Have I Been Pwned, 2,844 of the files consisting of more than 80 million unique email addresses had not previously been seen.
────────────────────────────────Each file contained both an email address and plain text password and were consequently loaded as a single "unverified" data breach.
 ›           2:
────────────────────────────────ApexSMS: In May 2019, news broke of a massive SMS spam operation known as "ApexSMS" which 
────────────────────────────────was discovered after a MongoDB instance of the same name was found exposed without a password. 
────────────────────────────────The incident leaked over 80M records with 23M unique email addresses alongside names, phone numbers and carriers, 
────────────────────────────────geographic locations (state and country), genders and IP addresses.
 ›           3:
────────────────────────────────Appen: In June 2020, the AI training data company Appen suffered a data breach exposing the details of almost 5.9 million users which were subsequently sold online.
────────────────────────────────Included in the breach were names, email addresses and passwords stored as bcrypt hashes. Some records also contained phone numbers, 
────────────────────────────────employers and IP addresses. The data was provided to HIBP by dehashed.com.
 ›           4:
────────────────────────────────Cit0day (unverified): In November 2020, a collection of more than 23,000 allegedly breached websites known as Cit0day were made available for download on several hacking forums. 
────────────────────────────────The data consisted of 226M unique email address alongside password pairs, often represented as both password hashes and the cracked, plain text versions. 
────────────────────────────────Independent verification of the data established it contains many legitimate, previously undisclosed breaches. 
────────────────────────────────The data was provided to HIBP by dehashed.com.
 ›           5:
────────────────────────────────Coinmama: In August 2017, the crypto coin brokerage service Coinmama suffered a data breach that impacted 479k subscribers. 
────────────────────────────────The breach was discovered in February 2019 with exposed data including email addresses, usernames and passwords stored as MD5 WordPress hashes.
────────────────────────────────The data was provided to HIBP by white hat security researcher and data analyst Adam Davies.
 ›           6:
────────────────────────────────Collection #1 (unverified): In January 2019, a large collection of credential stuffing lists (combinations of email addresses and passwords used to hijack accounts on other services) was discovered being distributed on a popular hacking forum. 
────────────────────────────────The data contained almost 2.7 billion records including 773 million unique email addresses alongside passwords those addresses had used on other breached services. 
────────────────────────────────Full details on the incident and how to search the breached passwords are provided in the blog post The 773 Million Record "Collection #1" Data Breach.
 ›           7:
────────────────────────────────Gemini: In late 2022, data allegedly taken from the Gemini crypto exchange was posted to a public hacking forum. 
────────────────────────────────The data consisted of email addresses and partial phone numbers, which Gemini later attributed to an incident at a third-party vendor 
────────────────────────────────(the vendor was not named). The data was provided to HIBP by a source who requested it be attributed to "ZAN @ BF".
 ›           8:
────────────────────────────────Gravatar: In October 2020, a security researcher published a technique for scraping large volumes of data from Gravatar, 
────────────────────────────────the service for providing globally unique avatars . 167 million names, usernames and MD5 hashes of email addresses used to reference users' avatars were subsequently scraped and distributed within the hacking community.
────────────────────────────────114 million of the MD5 hashes were cracked and distributed alongside the source hash, thus disclosing the original email address and accompanying data. Following the impacted email addresses being searchable in HIBP, 
────────────────────────────────Gravatar release an FAQ detailing the incident.
 ›           9:
────────────────────────────────MGM Resorts (2022 Update): In July 2019, MGM Resorts discovered a data breach of one of their cloud services. 
────────────────────────────────The breach included 10.6M guest records with 3.1M unique email addresses stemming back to 2017. In May 2022, 
────────────────────────────────a superset of the data totalling almost 25M unique email addresses across 142M rows was extensively shared on Telegram. On analysis, 
────────────────────────────────it's highly likely the data stems from the same incident with 142M records having been discovered for sale on a dark web marketplace in mid-2020. 
────────────────────────────────The exposed data included email and physical addresses, names, phone numbers and dates of birth.
 ›           10:
────────────────────────────────Robinhood: In November 2021, the online trading platform Robinhood suffered a data breach after a customer service representative was socially engineered. 
────────────────────────────────The incident exposed over 5M customer email addresses and 2M customer names. 
────────────────────────────────The data was provided to HIBP by a source who requested it be attributed to "Jarand Moen Romtviet".
 ›           11:
────────────────────────────────Romwe: In mid-2018, the Hong Kong-based retailer Romwe suffered a data breach which exposed almost 20 million customers. 
────────────────────────────────The data was subsequently sold online and includes names, phone numbers, email and IP addresses, customer geographic locations and passwords stored as salted SHA-1 hashes. 
────────────────────────────────The data was provided to HIBP by dehashed.com.
 ›           12:
────────────────────────────────Straffic: In February 2020, Israeli marketing company Straffic exposed a database with 140GB of personal data. The publicly accessible Elasticsearch database contained over 300M rows with 49M unique email addresses. 
────────────────────────────────Exposed data also included names, phone numbers, physical addresses and genders. In their breach disclosure message, 
────────────────────────────────Straffic stated that "it is impossible to create a totally immune system, and these things can occur".
────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────



Numbers:
─────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
 ›           (919) 480-1604 (Primary Phone)    Landline    Bandwidth.com CLEC LLC - NC    First reported April 2023     |
─────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
 ›           (919) 410-6785    Landline    Bandwidth.com CLEC LLC - NC    First reported September 2022                 |
─────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
 ›           (540) 271-0537    Wireless    Sprint Spectrum LP - VA    First reported August 2010                        |
─────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────



╔════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╦══════╦═══════╗
▓░█░░░█░▓ [ Addresses + Past Addresses ] ▓░█░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░▓ [ 0x02 ] ▓░█░░░█
└────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────┴──────┴───────┘ 



Current Address:

 ›         405 Gooseneck Dr, Unit B2
           Cary NC 27513
           Wake County


 Property Information:

 ›         Bedrooms
            1

 ›         Bathrooms
            1

 ›         Square Feet
            734

 ›         Year Built
            1985

 ›         Estimated Value
            $186,000

 ›         Estimated Equity
            $186,000

 ›         Last Sale Amount
            $81,000

 ›         Last Sale Date
            2016-08-05

 ›         Occupancy Type
            Non-Owner Occupied

 ›         Ownership Type
            Related

 ›         Land Use
            Condominium Unit (Residential)

 ›         Property Class
            Residential






Past Addresses:

 ›            1092 Oakdale Ct
              Rockingham VA 22801
              Rockingham County
              Recorded August 2010

 ›            154 Jessamine Pl
              Mc Gaheysville VA 22840
              Rockingham County
              Recorded August 2016

 ›            1169 Portland Dr
              Harrisonburg VA 22801
              Harrisonburg City County
              Recorded October 2007

  ›           1851 Trailwood Heights Ln, Unit 102
              Raleigh NC 27603
              Wake County
              Recorded January 2019






╔════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╦══════╦═══════╗
▓░█░░░█░▓ [ Relatives + Associates ] ▓░█░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░▓ [ 0x03 ] ▓░█░░░█
└────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────┴──────┴───────┘ 



Relatvies:
───────────────────────────────────────────────────
 ›            Clay Randolph    Age 38 (Nov 1985)  |
───────────────────────────────────────────────────
 ›            Donna Murphey    Age 93 (Dec 1930)  |
───────────────────────────────────────────────────
 ›            Megan Murphey    Age 40 (Jul 1984)  |
───────────────────────────────────────────────────
 ›            Randolph Murphey    Age 72 (Aug 1952)|
───────────────────────────────────────────────────
 ›            Carol Garner    Age 68 (Jul 1956)   |
───────────────────────────────────────────────────
 ›            Cathy Labor    Age 63 (Apr 1961)    |
───────────────────────────────────────────────────
 ›            Cathy Labor    Age 59 (Nov 1964)    |
───────────────────────────────────────────────────
 ›            Chris Wahl    Age 39 (Mar 1985)     |
───────────────────────────────────────────────────
 ›            Nicole Murphy    Age 47 (Feb 1977)  |
───────────────────────────────────────────────────
 ›           Randolph Murphey    Age 93 (Jun 1931)|
───────────────────────────────────────────────────
 ›            Richard Murphey    Age 72 (Jun 1952)|
───────────────────────────────────────────────────
 ›            Shawn Chase    Age 64 (Jan 1960)    |
───────────────────────────────────────────────────
 ›            Alice Gibbs    Age 77 (Mar 1947)    |
───────────────────────────────────────────────────
 ›           Barron Dickerson    Age 48 (Aug 1976)|
───────────────────────────────────────────────────
 ›            Brendan Murphy    Age 47 (Nov 1976)  |
───────────────────────────────────────────────────
 ›            Cathleen Wahl    Age 38 (Apr 1986)  |
───────────────────────────────────────────────────
 ›            Dawn Webb    Age 53 (Jan 1971)      |
───────────────────────────────────────────────────
 ›            Donald Murphey    Age 71 (Jun 1953) |
───────────────────────────────────────────────────
 ›            George Wahl    Age 42 (Jul 1982)    |
───────────────────────────────────────────────────
 ›            Helen Wahl    Age 68 (May 1956)     |
───────────────────────────────────────────────────
 ›            James Garner    Age 69 (Jul 1955)   |
───────────────────────────────────────────────────
 ›            James Mahoney    Age 44 (Sep 1980)  |
───────────────────────────────────────────────────
 ›            Joseph Murray    Age 53 (Apr 1971)  |
───────────────────────────────────────────────────
 ›            Kayly Mckeown    Age 27 (Aug 1997)  |
───────────────────────────────────────────────────
 ›            Kelsy Mckeown    Age 29 (Nov 1994)  |
───────────────────────────────────────────────────
 ›            Kitt Murphey    Age 34 (Dec 1989)   |
───────────────────────────────────────────────────
 ›            Kristin Crow    Age 52 (May 1972)   |
───────────────────────────────────────────────────
 ›            Larry Sills    Age 58 (Nov 1965)    |
───────────────────────────────────────────────────
 ›            Letha Murphey    Age 98 (Mar 1926)  |
───────────────────────────────────────────────────
 ›            Linda Gibbs    Age 81 (Apr 1943)    |
───────────────────────────────────────────────────
 ›            Michael Gibbs    Age 51 (Jan 1973)  |
───────────────────────────────────────────────────
 ›            Michael Gibbs    Age 76 (Feb 1948)  |
───────────────────────────────────────────────────
 ›            Norma Mitchell    Age 35 (Jul 1989) |
───────────────────────────────────────────────────
 ›            Rebecca Gibbs    Age 54 (Aug 1970)  |
───────────────────────────────────────────────────
 ›            Robin Mahoney    Age 64 (Sep 1960)  |
───────────────────────────────────────────────────
 ›            Russell Chase    Age 31 (Sep 1993)  |
───────────────────────────────────────────────────
 ›            Rylee Mahoney    Age 24 (Nov 1999)  |
───────────────────────────────────────────────────
 ›            Sandra Alfano    Age 58 (Jan 1966)  |
───────────────────────────────────────────────────
 ›            Trey Murphey    Age 31 (Mar 1993)   |
───────────────────────────────────────────────────
 ›            Whitney Murphy    Age 35 (Jun 1989) |
───────────────────────────────────────────────────



Associates:
───────────────────────────────────────────────────
 ›            Stephen Donald    Age 34(Nov 1989)  |
───────────────────────────────────────────────────
 ›            Ricardo Raymond    Age 63(Apr 1961) |
───────────────────────────────────────────────────





╔════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╦══════╦═══════╗
▓░█░░░█░▓ [ Mugshot ] ▓░█░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░▓ [ 0x04 ] ▓░█░░░█
└────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────┴──────┴───────┘ 

 ›            Mugshot found in: --->  https://wakenc.mugshots.zone/murphey-randolph-clay-v-mugshot-05-10-2023/

Mugshot Information:

 ›            Name    MURPHEY, RANDOLPH CLAY V
 ›            Age    37
 ›            Sex    M
 ›            Arrested By    NC DEPARTMENT OF ADULT CORRECT
 ›            Charges    FELONY PROBATION VIOLATION


╔════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╦══════╦═══════╗
▓░█░░░█░▓ [  Conclusion ] ▓░█░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░▓ [ 0x05 ] ▓░█░░░█
└────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────┴──────┴───────┘ 


This pedophile just got fucked, and im pretty sure he will get fucked more in life the more he keeps doing what he is doing.
I know what I did isnt enough but It's what I can do with what I have, I hope you all enjoyed this dox.
If you are seriously struggling with such tendencies, get help.


Its not too late.


⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘⫘
⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣀⣯⣾⣿⡿⢟⣿⠛⠉⠩⠁⠀⠀⡟⠁⠀⣀⠀⠀⠈⠙⠿⣿⣿⣿⣿⣿⣿⣿⣿⣦⠀⠀⠀⠀⠀⠀⠈⠢⣄⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣴⣾⡿⠟⠁⣐⡮⠁⠀⡐⠀⠀⠀⠀⢰⣅⠈⠀⠒⠄⡀⠀⠀⠀⠙⠿⣿⣿⣿⣿⣿⣿⣷⣄⠀⠀⠀⠀⠀⠀⠐⠆⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢀⣰⡿⠋⠀⠀⠀⡬⠁⠀⡐⠀⠀⠀⠀⠀⠀⠟⢂⠀⠀⠀⠈⠂⡀⠀⠀⠀⠈⠙⢿⣿⣻⣿⣿⣿⣷⡀⠀⠀⠀⠀⠀⠈⢳⡀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣲⠏⠀⠀⠀⠠⡙⠀⠀⢀⠁⠀⠀⠀⠀⠀⠀⠐⡈⠑⡀⠀⠀⠀⠈⠢⡀⠀⠀⠀⠀⠙⣿⣿⣿⣿⣿⣷⡀⠀⠀⠀⠀⠀⠀⢗⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠀⠀⠀⢀⠬⠁⠀⢀⠈⠀⢠⠁⠀⠀⡈⠀⠀⠀⠀⠀⠀⠀⠀⠐⡀⠈⢄⠀⠀⠀⠀⠀⢄⠀⠀⠀⠀⠈⠻⣿⣿⣿⣿⣷⡀⠀⠀⠀⠀⠀⠈⠦⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠀⠀⠀⡼⠁⠀⠀⠂⠀⠀⡄⠀⠀⠀⠁⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠄⠈⢂⠀⠀⠀⠀⠀⢂⠀⠀⠀⠀⠀⠈⢿⣿⣿⣿⣗⡀⠀⠀⠀⠀⠀⠈⣇⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠀⠀⣨⠁⠀⠀⠄⠀⠀⢀⠀⠀⠀⢰⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢂⠀⠀⠀⠀⠀⢂⠀⠀⠀⠀⠀⠀⢻⣿⣿⣿⡰⠀⠀⠀⠀⠀⠀⢩⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠀⢠⡇⠀⠀⡘⠀⠀⠀⢸⠀⠀⠀⢸⠀⠀⠀⠀⠀⠀⣣⠀⠀⠀⠀⠀⠀⠀⠀⢆⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢿⣿⣿⡇⢃⠀⠀⠀⠀⠀⠸⢆⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠀⣨⠀⠀⢀⠁⠀⠀⠀⠀⠀⠀⠀⣼⠀⠀⠀⠀⠀⠀⢁⢀⠀⠀⠀⠀⠀⠀⠀⠈⠄⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠈⣿⣿⡇⠋⡀⠀⠀⠀⠀⠀⣏⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⢠⡇⠀⠀⡈⠀⠀⠀⠀⠀⠀⠰⢰⣿⡆⠀⠀⠀⠀⠀⠀⠄⢂⠀⠐⡀⠀⠀⠀⠀⠈⠄⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠸⣿⣿⠈⢡⠀⠀⠀⠀⠀⢸⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⢨⠀⠀⢀⠁⠀⠀⠀⠀⢀⠀⠆⣿⣿⣧⠀⠠⠀⠐⠀⠀⠘⡀⠠⠀⠐⣀⠀⠀⠀⠀⠘⡄⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢻⣿⠀⠈⡄⠀⠀⠀⠀⠘⠆⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⣿⠀⠀⠘⠀⠀⠀⠀⠀⠸⠰⢸⣿⣿⣿⣆⠀⢂⠀⠀⠀⠀⠐⡀⠐⠀⠐⠑⠀⠀⠈⠄⠐⡀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠘⣿⠀⠀⢁⠀⠀⠀⠀⠀⡆⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⡊⠀⠀⡀⠀⠀⠀⠀⠀⢐⢳⣾⣿⣿⣿⣿⡌⠌⣆⠀⠀⠀⠀⠐⠀⠈⠂⠈⢀⠢⡀⠀⢂⢡⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢿⠀⠀⠘⠀⠀⠀⠀⠀⠣⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⡅⠀⠀⡇⠀⡀⠀⠀⠀⢰⣧⣿⣿⣿⣿⣿⣿⣄⠚⢆⠀⠀⠀⠀⠈⢄⠀⠑⠀⠁⡀⠀⠀⠂⡆⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢸⠀⠀⠀⡆⠀⠀⡆⡆⡔⠄⠀⠀⠀
⠀⠀⠀⠀⠀⠀⣿⠀⠃⢸⢀⡇⠀⠀⠠⠈⣻⣿⣿⣿⣿⣿⣿⣿⣦⠙⡧⡀⠀⠀⠀⠀⠀⡀⠀⠀⠈⠀⡀⢀⢲⠀⠀⠀⠀⠀⠀⠀⠀⠀⠄⢸⠆⠀⠀⡇⢰⠀⢳⠁⢷⠗⡀⠀⠀
⠀⠀⠀⠀⠀⠀⢹⢰⠀⠈⣸⢰⠀⠀⠀⠒⡹⣿⣿⣿⣿⣿⣿⢿⣿⣷⣜⣮⣦⠀⠀⠀⠀⠈⠊⠀⠀⠀⢄⠀⠀⡄⠀⠀⠀⠀⠀⠀⠀⠀⢤⢸⠀⠀⠀⡇⢸⢰⣾⢠⠆⠁⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠸⢸⠆⠀⢡⢀⠃⠀⠀⢀⠱⡹⣿⣿⣿⣿⣯⣿⣼⣹⣻⣮⣿⣿⡦⡀⠐⠄⠀⠈⠢⡢⢀⠀⠠⡣⡀⠀⠀⠀⠀⠀⠀⠀⡿⢸⠀⠀⠀⡇⠸⢘⠙⣾⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⢸⣾⣯⣶⠀⢸⠎⠄⡀⠈⡷⣼⣌⢻⣿⣿⣿⠿⢻⠩⠁⠀⠈⠑⢖⠠⠔⢄⠀⢌⠐⠨⠢⠁⠣⠂⠰⢠⣄⠀⠀⠀⠀⢠⡙⡈⠀⠀⠀⣌⢀⢸⠀⠏⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠀⢹⣁⠱⡇⢸⢰⡘⢇⢄⢡⠈⢿⣷⠟⠋⠀⠀⠀⢅⠀⠀⠀⠀⠀⠁⠀⠀⠈⠂⡝⡰⢠⠄⣐⡆⠀⢀⠀⠈⠀⠂⢠⢲⢡⠃⠀⠀⣰⠂⣸⡆⠘⠃⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠀⠀⠙⠦⢩⣆⢼⢡⠈⠂⠱⢕⠌⡅⠀⢀⠀⠀⠀⠀⠁⠀⠀⠀⠀⠀⠀⠀⠀⠀⠈⠂⠁⠊⠔⣣⣀⣀⣀⠸⠀⣠⢏⡲⡉⠀⠠⢠⡏⢠⣗⠁⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢧⢯⣛⣥⠀⠀⠂⠈⠩⢊⠀⠀⠀⠀⠀⢀⡀⢀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢁⣵⠉⠁⠀⠄⡆⡊⣜⡚⡔⠀⢠⡵⣿⢠⠯⠂⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢊⡎⠙⢓⠄⠀⢆⠀⠑⠱⢄⠀⠀⠀⠁⢃⡀⠀⠉⠀⠀⠀⠀⠀⠀⢀⢐⠚⠹⠀⡀⣨⢰⡀⢨⡣⡞⣠⡰⠉⢀⣭⠃⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠘⢧⠤⠢⠽⠦⢈⠑⢦⢀⠳⡅⡠⡀⠀⠀⠀⠀⠀⠁⠀⠀⠀⡠⣐⠁⡂⢀⢃⣔⣔⣇⢛⢣⡜⣷⠮⡧⠃⠈⢐⠂⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢣⡆⠀⢠⠈⠑⠊⣾⣺⢳⣿⠙⢲⣄⡀⠀⢀⣀⣤⡔⢻⡔⠃⠁⣀⡔⢹⡏⢹⣿⠁⠙⣷⣟⡆⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⡄⣴⠾⠟⣴⢠⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠉⠀⠟⠃⣿⣿⡅⠘⠈⠉⠉⠁⠀⠀⠀⠃⠛⠃⢸⣷⣼⡏⠀⠀⠈⠻⣦⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀⣠⠤⢓⣵⣾⣿⣷⣄⠈⢘⠲⣠⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢻⣿⣿⣷⣶⣶⣶⣤⣤⣤⣤⣶⣶⣶⣿⣿⣿⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⢀⡤⠓⠁⣰⡿⣽⢾⣟⣿⣿⣧⡄⡘⠢⡟⣧⣠⡀⠀⠀⢀⡀⣀⣴⣁⠟⠹⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣅⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠟⠁⢀⣾⢯⣟⣽⣻⣞⡿⣿⣿⣿⣮⣳⣜⣻⣿⣷⠒⠊⠉⠁⣠⣴⣶⣦⣤⣙⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣗⢀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⡠⢤⣤⣠⠀⠀⠀⠀⠀
⠀⡠⢟⣞⣯⣞⣷⣻⣾⣿⣿⣿⣿⣿⣿⣾⣷⣿⢿⣵⣤⣶⣿⣿⡿⣿⣿⣿⣿⣾⣽⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣷⡴⣠⠀⢀⣠⠠⠒⠒⠒⠒⠋⣰⣿⡿⣿⣷⣴⠀⠀⠀
⢀⠝⣸⣿⣶⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⢯⣟⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣧⡐⣉⠯⣄⠀⠀⠀⠀⠀⣴⣿⢯⣿⢷⣿⣿⣷⡂⠀
⢈⢠⣿⣽⣻⣿⢿⣯⣿⣽⣯⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣯⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣵⣫⡽⣷⠀⢀⣠⣾⡿⣯⣿⣾⣿⣿⣟⣿⣿⡄
⠀⣼⣷⣻⣿⣾⣿⣯⣿⣯⣿⢿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣟⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣷⣿⡽⣧⠛⠿⣿⣽⣿⣿⣿⣿⣿⣿⣿⣿⣿
⢠⣿⡽⣟⣷⣿⣿⣿⣷⣿⡿⣿⣯⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣷⣯⢿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⢿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣶⣬⣟⣯⣿⣿⣿⣿⣿⣿⣿⣿
─────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────

 _______   ________         ___  ________      ___    ___      ___  ___  _______   ___       ___               ________  ___  _________  ________  ___  ___     
|\  ___ \ |\   ___  \      |\  \|\   __  \    |\  \  /  /|    |\  \|\  \|\  ___ \ |\  \     |\  \             |\   __  \|\  \|\___   ___\\   ____\|\  \|\  \    
\ \   __/|\ \  \\ \  \     \ \  \ \  \|\  \   \ \  \/  / /    \ \  \\\  \ \   __/|\ \  \    \ \  \            \ \  \|\ /\ \  \|___ \  \_\ \  \___|\ \  \\\  \   
 \ \  \_|/_\ \  \\ \  \  __ \ \  \ \  \\\  \   \ \    / /      \ \   __  \ \  \_|/_\ \  \    \ \  \            \ \   __  \ \  \   \ \  \ \ \  \    \ \   __  \  
  \ \  \_|\ \ \  \\ \  \|\  \\_\  \ \  \\\  \   \/  /  /        \ \  \ \  \ \  \_|\ \ \  \____\ \  \____        \ \  \|\  \ \  \   \ \  \ \ \  \____\ \  \ \  \ 
   \ \_______\ \__\\ \__\ \________\ \_______\__/  / /           \ \__\ \__\ \_______\ \_______\ \_______\       \ \_______\ \__\   \ \__\ \ \_______\ \__\ \__\
    \|_______|\|__| \|__|\|________|\|_______|\___/ /             \|__|\|__|\|_______|\|_______|\|_______|        \|_______|\|__|    \|__|  \|_______|\|__|\|__|
                                             \|___|/