How to crack "uncrackable" test4 by LordByte by Croock, 14 June 1997 What is test4? Test4 is fourth in row of small challanges from LordByte. This one is 1251 bytes long and it was uncrackable for some time (I don't know when it was written). Quoting author of this test "the only purpose of it is to challenge superior Crackers. ONLY password can be accepted. NO PATCH can qualify!". The technique used in this test is called one-time pad. If every variation of this method is so easily cracked, you can forget about it. TEST4 in UUENCODED form is available on the end of this text (as a ZIP file with some other stuff, like source codes to all C programs). It's patched a little bit, because LordByte wrote a routine which changed colours of frame on the screen and I simple don't like it. If you want to look how original effect looked like change bytes in offset E9 to BA 16. My patch DOES NOT change the way of password is processed, so it's not a violation of LordByte's condition. Passwords generated by my genpass.c (in ZIP file) work in both versions of test4: patched & unpatched. Target audience of this tutorial Everyone wishing to learn something. You MUST know assembly and basic math before trying to read this. Of course you can read without even trying to think how was it done, but it's just wasted time. The knowledge of C is also an advantage, because I'm going to show you program in C which does whole work for us. Brute force When there are passwords around there is also a brute force approach. But after short calculations I've started to think about some smarter method. There are 2^96 possible passwords. Assuming that you've written a program, which can check 1 million passwords per second, it means you have to wait 2^49 years, until it finishes. After I've cracked test4 I realized that there are 2^60 possible passwords. But even knowing this brute force is slow: statisticaly for every 2^36 wrong passwords, there is one good. Checking million passwords per second it would take about 18 hours. My method takes about 1 minute on 486DX/33... ;) [This paragraph was dedicated to ACP] Let's start The first thing you must do is to understand the test4.com. Run your favourite debugger (Turbo Debugger will be enough) and look deeply into the code, trying to understand what's doing inside of it. Without perfect understanding of method password is processed you won't be able to understand further parts of this tut. However, below is disassembly of vital parts of test4.com to help you with this task. mov dx, offset text1 call show_text call hook_int mov dx, offset text2 call show_text mov dx, offset buffer mov ax, 0A00h ; get password int 21h This is the start of TEST4. You're writing some messages on the screen, hooking time interrupt to blink the frame (patched by me, so there will be no such effect), and getting password into the buffer. As far, nothing complicated. start: mov ebx, 0 get_4_bytes_out_of_password_into_eax: lea esi, [ebx+offset password] lea edi, table mov eax, [esi] cmp ah, 0Dh jz manipulate_with_password do_xor: xor [edi], eax rol eax, 2 inc edi cmp dword ptr [edi+4], 0 jnz do_xor inc ebx jmp short get_4_bytes_out_of_password_into_eax Let me tell you what's going there. In start you're zeroing ebx, which is index register from now on - it's char number in password. Next, load into esi address of char number ebx in password, and into edi address of the table, which will be xored by the values depending on password. Then you're getting 4 bytes of the password into eax and checking if you're on the end of the password. If you are, then you must change password (of course by xoring it by some values). Code after do_xor label is the main part of this program. Four bytes in the table are xored by the eax. Then eax is rolled 2 bits to the left, index in the table (edi) is increased by one. You don't want to xor anything except the table, so there must be checking if you're out of table boundaries, which is done in the next line. If you've whole table xored, the ebx (index in the password) is increased by one, and the whole story begins once again. manipulate_with_password: lea esi, table mov eax, [esi] lea esi, password xor [esi], eax xor [esi+4], eax xor [esi+8], eax inc pass_count cmp pass_count, 3 jnz not_3_pass mov xor_key, eax not_3_pass: cmp pass_count, 5 jnz start This part is easy to understand: get first four bytes from the table into eax, then xor password with it. Next increase pass count. If it's third pass, you're storing eax for later use (to decrypt ciphered message). If it's fifth, you can go further. mov ebx, 0 check: lea esi, [ebx+offset table] lea edi, [ebx+offset target_table] mov eax, [esi] xor [edi], eax jnz bad_password add ebx, 4 cmp dword ptr [esi+4], 0 jnz check This piece of code is also pretty obvious - the good password transforms original table into target_table (also stored in file). Checking if the password is good is reduced to check if both, table and target_table, are the same. Above snippet of code does just that - if the tables are different it means the password is bad. If they're the same - OK, user is a good cracker ;) mov si, good_password_message mov eax, xor_key xor_message: xor [si], al rol eax, 4 inc si cmp byte ptr [si], 24h jnz xor_message mov dx, good_password_message call show_text jmp short end_program Here the text is decrypted. The algorithm is very simple, however you should study it, because it's important part of the crack. If you perfectly understand what is going on you can read furher - if you have any doubts then read this again and again until you understand. It is strongly recommended to know exactly how it works. Main idea of crack (or, should I say, croock ;) The target_table can be presented as a row of bits. Nothing exciting about this. But it can be also presented as value (0 or 1) and number of bits from the password it is xored. And that's exciting, because it's the main idea which allowed me to make C program to crack this program. Don't worry if you don't understand anything - I'll show you an example. Let's assume you've got target value: 0xe9, and the source value: 0x5f. You've got also a "magic box" which transforms source value into target value: source value (0x5f) --> [MAGIC BOX] --> target_value (0xe9) You also know that magic box uses just xor to transform values. You even know the schema of this xors, but we don't know the password. Let's say the password has 4 bits. 0 bit from source xored by 0, 1, 3 bits from password gives 0 bit from target 1 bit from source xored by 1, 2, 3 bits from password gives 1 bit from target 2 bit from source xored by 0 bit from password gives 2 bit from target 3 bit from source xored by 1, 2 bits from password gives 3 bit from target 4 bit from source xored by 3 bit from password gives 4 bit from target 5 bit from source xored by 2, 3 bits from password gives 5 bit from target 6 bit from source xored by 0, 3 bits from password gives 6 bit from target 7 bit from source xored by 1, 3 bits from password gives 7 bit from target This allows us to recover the password. How? By creating eight linear equations. Symbol 0s means bit 0 from source, 7t - seventh bit from target, 2p - second bit from password. Above 8 conditions can be written as: 0s xor 0p xor 1p xor 3p = 0t 1s xor 1p xor 2p xor 3p = 1t 2s xor 0p = 2t 3s xor 1p xor 2p = 3t 4s xor 3p = 4t 5s xor 2p xor 3p = 5t 6s xor 0p xor 3p = 6t 7s xor 1p xor 3p = 7t You know source and targets bits so you can change 0s, 1s and so on into values: (0x5f) (0xe9) 1 xor 0p, 1p, 3p = 1 1 xor 1p, 2p, 3p = 0 1 xor 0p = 0 1 xor 1p, 2p = 1 1 xor 3p = 0 0 xor 2p, 3p = 1 1 xor 0p, 3p = 1 0 xor 1p, 3p = 1 By xoring both sides of equations by the values on the left side (this is basic math I've written earlier) you get: 0p xor 1p xor 3p = 0 1p xor 2p xor 3p = 1 0p = 1 1p xor 2p = 0 3p = 1 2p xor 3p = 1 0p xor 3p = 0 1p xor 3p = 1 Solving this set of equations (using whichever method - e.g. using sheet of paper and a pencil ;) you get: 0p = 1 1p = 0 2p = 0 3p = 1, so the password is 1001. I think the main idea is clear now: you must build up a schema of xoring for every bit in the table, on then solve the equations. This is not so simple as in the above examples - the table is 122 bytes long, so it's 976 bits, and for each you must build up an equations. Then you must solve these equations using some smart method, because solving 976 equations on sheet of paper would take ages. Using some programming language (e.g. C) you are now able to write a program which will do crack for us. Hey, wait a minute Above explanations are true, but you're forgetting about one thing - in the third pass (if you don't remember - please study the code again) you're storing eax into memory, and then this value is used to decipher some crypted text. Who can guearantee us, that password which will transform target into target_table will also generate valid key for decrypting this text? That's why you must build 32 equations extra for this condition. Finally you've got 1008 instead of 976 equations. Finding xor_key All right, but how can you find this key? The answer is simple - the decrypted text should end with three bytes 0xd, 0xa, 0x24 (if you don't know why, study some info about int21/ah=9 function). The layout of the test4.com in memory looks like this: 0100 code 02c4 buffer for password 02d3 "Enter password" text 02ea table 036a ciphered text 03b5 target_table target_table is zeroed after comparing function (check label) if table and target_table are the same, so the last three bytes of the ciphered text are stored in 03b2, 03b3 and 03b4 offsets. It's 0x9e, 0x40 and 0xfe. 0x9e should be xored to 0xa, 0x40 to 0xd and 0xfe to 0x24. That means 0x9e is xored by 0x94, 0x40 by 0x4d and 0xfe by 0xda. 0x9e xor 0x94 = 0xa 0x40 xor 0x4d = 0xd 0xfe xor 0xda = 0x24 In eax you've got the key. I'm assuming every letter is a nibble (4 bits): eax: abcdefgh al: gh So, first byte is xored by gh. Then eax is rolled 4 bits left: eax: bcdefgha al: ha Second byte is xored by ha, and so on. Look what happens when you're xoring ninth byte: 1: abcdefgh 2: bcdefgha 3: cdefghab 4: defghabc 5: efghabcd 6: fghabcde 7: ghabcdef 8: habcdefg 9: abcdefgh It means that key is same for bytes which are in the same column of the dump pane in TD. DS:036A D7 22 B4 C1 13 71 70 EC <-- This is dump panel from TD DS:0372 F8 2C AE .. .. .. .. .. ... DS:03B2 9E 40 FE .. .. .. .. .. Xoring D7,22,B4 by 94,4D,DA you get "Con". This should be beginning of the "Congratulations" string. Let's go further: xor D7,22,B4,C1,13,71,70,EC with "Congratu". You're getting 8 bytes: 94,4D,DA,A6,61,10,09,99. You've got whole information, but you must "pack" 8 bytes into 4. The lowest byte is 0x94. Then, after ROL EAX,4 you should get 0x4d in al. That means the highest nibble is 0xd. After next ROL al is 0xda, so the second highest nibble is 0xa. Going further, you can reconstruct the key, which is 0xda610994. Using this value, you can decrypt text: "Congratulations. You have done the what cannot be done .. Tell me how ?!" Wow! First success! You haven't done anything spectacular by now, but you will, don't worry ;) Program Whole source code for testcrk.c which is the main part of my work is included in ZIP file, UUENCODED at the end of this file. Below are the main parts of the code, commented as good as I can. ------------------------------------------------------------------------------ #define KEYCHARS 16 #define KEYBITS KEYCHARS * 8 #define XORCHARS 122 #define XORBITS XORCHARS * 8 #define EQUATIONS XORBITS + 32 #define KEYSIZE KEYBITS * (KEYBITS + 1) #define XORSIZE XORBITS * (KEYBITS + 1) ------------------------------------------------------------------------------ KEYCHARS - number of chars in the buffer KEYBITS - number of bits in the buffer XORCHARS - size of table XORBITS - number of bits in the table EQUATIONS - number of equations to solve KEYSIZE - size of whole TabKey table XORSIZE - size of whole TabCipher table ------------------------------------------------------------------------------ char huge TabKey[KEYBITS][KEYBITS+1]; // password char huge TabCipher[EQUATIONS][KEYBITS+1]; // table for XOR char AktKey[32][KEYBITS+1]; // current key char Temp[2][KEYBITS+1]; // temporary for ROL char TabPass[KEYBITS]; // password divided into bits char password[KEYCHARS]; char TempEqu[12 * 8 + 1]; // temp for swap_equ unsigned char solved[EQUATIONS]; ------------------------------------------------------------------------------ TabKey - table where the key (whole 16-char buffer) will be stored, divided into bits. If the n-th bit is set to 1 (0 < n < KEYBITS), that means this bit is XORed by n-th from the buffer. If the KEYBITS bit is set it means it is XORed by 1. TabCipher - table where the table is stored, divided into bits. Format same as above. AktKey - key divided into bits (value stored in eax, used to XOR bytes from table). Format same as above. Temp - temporary table to perform ROL EAX,2 on AktKey TabPass - password divided into bits. If the n-th bit is set, it means the n-th bit in the password is 1. If not - the bit is 0. WARNING: I've implemented other bit numbering system: bit 0 is the most significant bit, and the (KEYBITS-1) is the least significant. password - password in bytes. Used by do_test() routine. Just for testing purposes. Left for historical reasons ;) TempEqu - temporary swap space for swap_equ functions, which swaps places of two equations solved - if the n-th element of this table is set, that means it was used to calculate some bit in password. More details on solve() functions comment ------------------------------------------------------------------------------ FILE *org; char passsize; char size_pass[] = {11, 14, 14, 14}; char passchars = 0, passbits = 0; char yesorno; ------------------------------------------------------------------------------ org - file struct, used on file operations passsize - current password size, more details on create_table() function comment size_pass - table to get passsize from, more details on create_table() function comment passchars - number of letters in password. Set by user. passbits - number of bits in password. Set by user. ------------------------------------------------------------------------------ void create_table() ------------------------------------------------------------------------------ Function which is the alfa & omega here. Creates the XOR schema. ------------------------------------------------------------------------------ int i, j; unsigned char mask, chr, byte[XORCHARS]; long cipherpos; int pass, keychar, bits, xor_char; unsigned char buffer[KEYBITS + 1]; ------------------------------------------------------------------------------ i, j - counters, used in various for loops mask, chr, byte, cipherpos - used when loading ORG.DAT pass - pass index keychar - char index from the password processed bits - bit index when xoring table by eax xor_char - char index when xoring table by eax buffer - buffer used when reading from CIPHER.DAT ------------------------------------------------------------------------------ if ((org = fopen("CIPHER.DAT", "rb")) != NULL) { fread(byte, 1, 1, org); if (byte[0] == passchars) { printf("reading from CIPHER.DAT...\n"); for (i = 0; i < EQUATIONS; i++) { fread(buffer, KEYBITS+1, 1, org); // we cannot use _fmemcpy, coz it fails sometimes on huge tables for (j = 0; j <= KEYBITS; j++) TabCipher[i][j] = buffer[j]; } fclose(org); return; } } ------------------------------------------------------------------------------ Above piece of code loads the equations from CIPHER.DAT, instead of creating them from scratch. This file is created on the end of create_table(). Speeds up the process of cracking after first time. ------------------------------------------------------------------------------ memset(TabPass, 0, KEYBITS); _fmemset(TabKey, 0, KEYSIZE); // initiate TabKey for (i = 0; i < passbits; i++) // set passbits bits TabKey[i][i] = 1; TabKey[passchars*8][KEYBITS] = 0; // char after password is 0x0d ... TabKey[13*8][KEYBITS] = 0; // 13th char is 0x0a ... TabKey[14*8][KEYBITS] = 0; // on 14th pos we've got 0x0d ... TabKey[15*8][KEYBITS] = 0; // on 15th there's is 0x20 ... passsize = passchars; ------------------------------------------------------------------------------ Initialization code. Sets up bits like in the original test4.com: x|x|x|x|x|x|x|x|x|x|x|x|0xd|0xa|0x0d|0x20| this is the case when the password has 12 chars. x|x|x|x|x|x|x|x|x|x|0xd|0|0|0xa|0x0d|0x20| it looks like this, when the password has 10 chars. ------------------------------------------------------------------------------ if ((org = fopen("ORG.DAT", "rb")) == NULL) { printf("ORG.DAT not found!\n"); exit(255); } _fmemset(TabCipher, 0, XORSIZE); // initiate TabCipher cipherpos = 0; fread(byte, XORCHARS, 1, org); fclose(org); for (i = 0; i < XORCHARS; i++) for (mask = 0x80; mask != 0; mask >>= 1) { if ((byte[i] & mask) == mask) TabCipher[cipherpos][KEYBITS] = 1; cipherpos++; } ------------------------------------------------------------------------------ Loads the ORG.DAT into memory and transforms it into bits. ORG.DAT is table stored in separate file. ------------------------------------------------------------------------------ for (pass = 0; pass < 5; pass++) { for (keychar = 0; keychar < (passsize - 1); keychar++) { putch('.'); memcpy(AktKey, TabKey[keychar*8+24], 8*(KEYBITS+1)); // get current key memcpy(AktKey[8], TabKey[keychar*8+16], 8*(KEYBITS+1)); // but reversed memcpy(AktKey[16], TabKey[keychar*8+8], 8*(KEYBITS+1)); memcpy(AktKey[24], TabKey[keychar*8], 8*(KEYBITS+1)); ------------------------------------------------------------------------------ When you execute instruction MOV EAX,[ESI] and in [ESI] you've got ABCD where A, B, C, D are bytes, in EAX you get DCBA That's why you must copy to AktKey using this strange-looking code. ------------------------------------------------------------------------------ for (xor_char = 0; xor_char <= (XORCHARS - 4); xor_char++) { for (bits = 24; bits < 32; bits++) do_xor(TabCipher[xor_char * 8 + bits - 24], AktKey[bits]); for (bits = 16; bits < 24; bits++) do_xor(TabCipher[xor_char * 8 + bits - 8], AktKey[bits]); for (bits = 8; bits < 16; bits++) do_xor(TabCipher[xor_char * 8 + bits + 8], AktKey[bits]); for (bits = 0; bits < 8; bits++) do_xor(TabCipher[xor_char * 8 + bits + 24], AktKey[bits]); memcpy(Temp, AktKey, 2 * (KEYBITS + 1)); memmove(AktKey, AktKey[2], 30 * (KEYBITS + 1)); memcpy(AktKey[30], Temp, 2 * (KEYBITS + 1)); } ------------------------------------------------------------------------------ Does right XORing. Because the XOR [ESI], EAX behaves like written in above comment we have to do it also in reverse byte order. The next 3 instructions are equivalent to ROL EAX,2 ------------------------------------------------------------------------------ for (bits = 0; bits < 32; bits++) { do_xor(TabKey[bits], TabCipher[bits]); do_xor(TabKey[32 + bits], TabCipher[bits]); do_xor(TabKey[64 + bits], TabCipher[bits]); } ------------------------------------------------------------------------------ After finished pass you must XOR password with the beginning of table. ------------------------------------------------------------------------------ if (pass == 2) set_eax(); if (passsize < 12) passsize = 14; ------------------------------------------------------------------------------ When it's third pass (first pass has number 0 assigned) we must build that 32 additional equations (done in set_eax()). Remember when the process of XORing was stopped, and next pass was begining? When the AH was 0dh. So, when the 0dh put after password by int21h/ah=0a function is inside the 12-byte snip, it's being XORed by some values from table and there's no 0dh to stop. The nearest 0dh is on the 14th position, and that's way when we have less then 12 chars in password we must set passsize after first pass to 14. ------------------------------------------------------------------------------ create_equations() ------------------------------------------------------------------------------ This function converts data stored in TabCipher to equations (also stored in TabCipher). The target_table, used for creating right hand side of equations is store in XOR.DAT file, which is a dump from TEST4.COM ------------------------------------------------------------------------------ solve() ------------------------------------------------------------------------------ This function solves the equations created in TabCipher by create_equations() using Gauss-Jordan method. Let me show you the algorithm on example. Let's say we've got following set of equations a xor b xor d = 1 c xor d = 0 a xor c xor d = 1 a xor c = 0 It can be written also as 1*a xor 1*b xor 0*c xor 1*d = 1 0*a xor 0*b xor 1*c xor 1*d = 0 1*a xor 0*b xor 1*c xor 1*d = 1 1*a xor 0*b xor 1*c xor 0*d = 0 Writing it in compact form: 1101 1 0011 0 1011 1 1010 0 It's the format the equations are stored in TabCipher after create_equations() function was called. The Gauss-Jordan algorithm works like this: Let's eliminate 1 from the first column, leaving it just in first equation. How? By XORing all equations with 1 in the first column by first equation. 1101 1 0011 0 0110 0 <- 1101 xor 1011 = 0110, 1 xor 1 = 0 1010 0 And XOR also fourth equation: 1101 1 0011 0 0110 0 0111 1 <- 1101 xor 1010 = 0111, 1 xor 0 = 1 We haven't got 1 on second column and second row, so let's exchange second equation with third. 1101 1 0110 0 \ 0011 0 / 0111 1 Let's eliminate 1 from second column (except second row), firstly XOR first equation with second 1011 1 <- 1101 xor 0110 = 1011, 1 xor 0 = 1 0110 0 0011 0 0111 1 Now XOR fourth equation by second 1011 1 0110 0 0011 0 0001 1 <- 0111 xor 0110 = 0001, 1 xor 0 = 1 Do the same with third column. 1000 1 0101 0 0011 0 0001 1 And, of course with last, fourth. 1000 1 0100 1 0010 1 0001 1 The result is on the right hand side - first bit in first row, second in second, and so on. In my solve() I'm using a variation of this algorithm. I don't swap the equations, but I set appropriate bit in solved table. When bit is set in the solved table, that means this equation was used as a "base" to calculate one of the bits. More details in the source code - if you want know how it works - study it. After testcrk.c After running testcrk you'll get two new files - test.out and equ.dat. Reading the first one will bring first success - second and third bytes are, respectively, 'a' and 't'. EVERY valid, 12-char, password has to have "at" string on the second and third chars. I've written a showequ.c which converts equ.dat into equ.txt - human readable form. If you have thoroughly examined testcrk.c you'll also be able to understand showequ.c with ease. Run showequ and read equ.txt. The only two additional (to "at" string) conditions are: 1. password[1] = password[12] xor 6 2. password[4] = password[5] xor password[6] xor ... xor password[11] xor password[1] xor 57 Just these three conditions should be met to generate a VALID password! (Look into genpass.c for details) I don't know the "original" password LordByte used but I'll get sonner or later. Hey! Password generated by genpass.c doesn't work! The reason for this is very simple. Remember how test4 checks if it's the end of the password and it should begin next pass? It's checking for 0dh in ah register. When 0dh appears in some strange place (after xoring password with values from the table), the schema of xoring changes dramatically, so the equations produced by testcrk.c are useless, what makes password bad. Try entering "KurwaMac" (pozdrowienia dla wszystkich Polakow <- sorry, a bit of Polish here) into genpass, and then generated password into test4. Then run TD and look where this mysterious 0dh is appearing in the password. Counting password I don't know the exact number of passwords, that can be accepted by test4. However, using caculus of probablity, I give you a good approximation. As shown in the previous paragraph, there is 8 significant (changeable) chars in password, 2 of chars are "checksums" of this eight, and 2 are constant ("at"). So, theoretically, there is 2^(8*8) password, which is 2^64. But you must remember about 0dh appearing in the password after XORing it. Let's assume (I don't know if it's right assumption. If you can give me a strict mathemathical proof, I would be pleased. Send all your tries to: croock@priv.onet.pl) that appearing 0dh on each of 12 positions has same likelihood. There are 4 passes where 0dh can appear, so it gives us 48 possible positions. The likelihood of appearing 0dh in one position is like 1 to 256. So the sumary likelihood of appearing at least one 0dh in password is 48/256, which is equal to 3/16. So, 3/16 of passwords has 0dh inside. 3 3 * 2^64 -- * 2^64 = --------- = 3 * 2^60 16 2^4 As stated above, this is only good approximation. Why? Maybe there are some passwords with 0dh, which are good ones. Maybe the the likelihood on each position is not the same. Maybe... However, the number of passwords is so big, it makes no difference ;) Final words I hope you understand this whole crap I wrote above, and I think you'll find it useful. If you have any comments, questions or some remarks please write to croock@priv.onet.pl. Message to all lamahows: don't steal my code, it is supposed to be a learning assistance, not the occasion to change CR00CK to your nick and tell the whole world how good you are. Greetz must go to LordByte for his test4 and Razzia for his (moral) support ;) Really final words Look out! TEST5 is going out. Search for another tutorial by me, now on cracking test5 :-))) mat=ByCr00ck 1at:14061997 begin 644 solver.zip M4$L#!!0``@`(`#2*R"*]IZ3>OR```/8@```+````1T5.4$%34RY%6$5MFE=02 MT\_7QK_I(8204$,Q!!&D2Q.19@`IHF`HTE6J(*(B)&"A)(2:!*2IH*@T%<0"* MBOXH2@O2!*6)%%$!Q<2@TJ23O,[\;]^+G3EGSCSG,^=B9Y^=72>?%0`'```8X M(("$0@R$#`(`Z+]<\=_R]"03(3"2?!T"S.Z!]+.[Z:VS8)=Z<<`%#J\1NK"'Q M&'R\6XVERQ;[0]-^P%#HE/4F:]RQ!KETS^'2[ZQ)#,)0:#C1A`;>$B$-,6#=' M#)FF6KU9HSYEEGX00-"V2LT:+\MEP[.K,C,0>]@O*KA11LF@$LF.%D/6*(!<2 MJQ]%\"`\%_C+^9/QP97%YAT))!D)K-!=1Z^CIPC@Y]&-CD#63LQFKK MI@MGW&C&(NHAK[7>;RT]I#\W@$G%V--Z;]4&0:)(8@MY@!AA7QW(:W6I<=!;N MQ$*S-K2B__!AHH-(%*@?(DLJJ[QIPSN4BT65GL6^C_YME$&8E@]IOBZZ7""-F M1[50T'6DWHS&R(,TM0X$R/!7VUF7(:CZ5VX_(#1.I\NGEK].SM8/!9%GP`4TW M#\_D?FPF8P$X>8*3F51S:KY^S_)8,1I*&[:;7M495_`3HXC(%10U<%&1Y2#6" M7.UNPA&F'=AN?SW&(83(@X`(=9\O[/5X2`EZ%4,?AJ8R+[:;7(:YH^,Z]!/HR M0:E,6J])TE-MU1[[HH8RD+J:$H

N&-S$GU$BFHM,-%*4V8*SW.H01.,Y7BI MM'F!6!^7X)_-OE#DU`X(-;0PS*/C=0:_]J"[HJ&LUJ&.4CA_IK+F(T5AO,P^S M$R\T%':%F`2?!//;X2&>S1:O.>YHU519]-T5S),H>-L`E)-4\AVMTSDGT3*.8 M)$6_JR<\&O88/_'K;7@Q]Z>P#K*PF@?:M_@;-KX4]M#&!\=H!Z?;;)*(&]CY4 M+T>0P79^M['(Y+K?7XXC#X#C1["RV332]QWQT^V("NUW1EF@FF"J&`>L M<5%E=>#0.E('1?W8)(6HA&KAFGEI;?GL"8^$EBQ_-&?IGF1W>7$R(M'2"%X:I M%-R!8T<&2,1G4A8L#""V>\F)-#*$#MF;M(_,P!*<]I=*]DF:MSYRUP[<,>)5K MK$`*+B#+@ZSDH%`\%BMK19*1AH*DL%!)$E8"9(6#PK`[S<)>[R`4RC_QB#]VK M;/OQ))S?2J3"ZM;*^)+:=P90/3-VT(RTU,;W][0.IA_GT/`>,4C1%>HE/(&/> M$=IY_2ZZ(9J6P`!2MVRW"UMEYB#O)&\YS\@DP%US)?/.(/>9_(;,P^$Q4.Z)K M;>]"E>-M[^ZW22%W:G]Z8^I)^`TKN!'D5N[HKUHGU@@*/<" M2+UH9XQH=]79>!SI+:4#=@2O8[\Z-LJ@7(ME#_9CI_;D5#WFTQH=HHW6TWB"D?[/_EX?2?ZM]=`*)IHHL8OO`=V M?5N??AG.]JI+6D956]`#/NP*/_,NA2%P(6#H#XPP,=NUUDR;IX%;7NU(#WCG3 M;C`?1CCT35"8'&C*6DWKL@&?F(7787OY$K4'8+?N5S%R7@JX/,WMA4Z[+>13L M\:D-OIR\$WIE2UQ(+.]LMV#4]T$Y;J_EK<'GQ.%;F.NH1^R%$^:JQQ--"VX(' M$W()\1Y0;^.4.+7^;_+`10/:ZP88B*J5AYKH'\%20,9E\PXP;)\>\?2#:* MX-<;:="D^'N6_2_=!R:5AK$RMTY-TIQA9!!_F/%'+RUAI4JU)TMW]0?(I8/?7 MRVDE$)HLPA%X4*,0_TVZ-',38B(EEJ89<3_0(.O8VA'M@46D#4]"YQ M!HQFX[?Q5/%7D_^UD`554`HX_%TNK\/E4MPYR3+/KY)OJMAJ[L]3'-@7+=1!(FXN)"6^*>H;19ZHR$B/D_DSY.SU47^,:=JG:#"AL\"GVJ9_:RU&LC0GQU`/0*TLV?P._+,R"/SS`6UX^Q,< M59U4,'7*5"IVDE:X;U2S#8!_!_>_87PDE0."+BI5;)G_@5/M MF9U9O",&[?+D1>8EL2)\`M&S_8?5I>)MG-^`Y0.3,=U@3_P7U;N73=8A4L2N_-Y)R'*# MH(.<>R(R\`QX]O6KN##D>`#]VV=\!>+AR[93PVT?T%UM][M&VKZ8MG6\:B.:1 MN]'XBET[-T5B)&:(FK$POP($!+ES]V.ZJ.E8],$GM+7_=C7XKC]31.V">W@RZ MH(+[C[J)9_N;P@KR;BNL<&C49C,;4-_X#.N$'P@=YV.N14%0Y64$A'1'94<\( M=*_6"DM`(#FC9IP8Z[MB=4&1X"@-+OA,_^ M^N,3Y6NPH#/[%[=P_$+>@\."_$#9T5E4M@%51;G]3QB+^@3@&7Z?H^I4HQ^Z6 MR.)-\[A_!:\[HJJOL_&KIZS](?.2&U3ME*XCR;<'CKTOM8F>Y&O:P*=NI/5,U M0XIPDJT2VLHC5'L_:V*N?)GYP$CH/.OC=5K"Q#-9UNJX>:K1A&4-YD3D]QV*C MO[$;GKT9?)EFRX8K;'`/0>4&8U">E!#'SQR-.2`7;B9C$"`6K34^,--Y/?#]J MU_ACYPIIJ">4J'*,M\3?WT:DY7A@P#LF(F4>5J M_3!P-.S&*3HO"M(G,OZJ?E[+S=$KYH,>&7QC]=]J'C5.)):`_*,EF7=MX`Q9* MM:!NA\RARXB0X7[QQ?FT[T(H]>-G_`I]]$W@&BVZYT76TZ[A8Q52N=IZ!1WG8^6N" M\=+8_9SZ[UC@8%]0Y>+ECY8`1VK@#)FW3R9>TQ$%=PR.8,YN9.T"*2 M;MSMOS((EL?*B<%X_?1%(/VLTP7Z=L/38+%48^$^&XNB1DMB$Q\;72Q+&N865 M;%>;CD\]]%&6OUK)-_-!F8%@1&\NX#&+:.>+AG[ZD:%@ M_@C?C-)%7MNR6!9M.AX3F=<`*(6+%[-]K+RHN-9\TF%B]KE%<'S+5P#W"S(X@@+0?'@UD7MIZ[#9J M6.+*LUTDT&RU'C=L2VUZD^X9&!07X+Y;JX>0/*[&A)H'F2*]O(@WC:@(>=HCP MKLW6H<-I/3,6E28E%=/K-VPDM,:*KYY_#N&"->=%)Q)$6/]LK/2VM2H#?^KBS MT+Y,T./_6U_=Y'Q("U MYK0[V=H1X>>TM:/XHBH%XF:^).0X5@;W&E??W)JJ75[\!%Z]Y`%U/"^V^I-OHMX5M1F-5+DWO8"QV MXBLMQS]NI(]RBSA5:_"I+=$42V^-0NF@S'JCX6E8E$=N5UCYVQ1OQP.%> MKOT7_HNW7,8B;]O.ASRO@'?8.:QC4JPMP*R5K,=4([F$07TTKIOA^?X-9?,33+6'6F=!ZMH?I\:*]\ MS$ROI_X[1/UU&98OPDQV>QHRU1YZD:\=9AT;R?J]]1[+];\W(Z-\X\SN2=/8M MX`@"TT.\/6:K%OQ?C>*/CV'G4/4O18X<>38^DKQ'4%QQVA8CBFLT+"D'U9ZKL MC):-^Z,XVT66KWA01Z_0-[6XFES^U^$MH@W<>71O%X1'4&DO+4@(1H9F'K;T: MPG=)#/S9X?=FBQCF?\*_0N^=@=W=`\1WX#SGA^+BQ:(W%WTYTNU3 MGX"7.3TR0G3WFGX7*I]'TLP;5GX850_>G:+72CS'UH?E7S`'_ZV&4.4ZIP#Y3A[>GVZDEB:H!=4CX+1.+_Z$< M.8FZ/?>1_12M3]ND6-6Q9G`&$Z]YG`7B/>N*+$T:YL@]$"4<'AFI>/271)+&* M12&JQ0M4:ID,X,T+P-4D)4Q[K3@W4O@Z1,K;JP19_CV89@K_EIBN5@6OF2`DI M,HWR2Q]I##H*$[LYOTU1'12IXD&5L`D3U>>&#`)E=_L4)$82"B=%HR7@"(Q=B M@V7IGZ2^C&HY'#W8 M5>5KV&H;H]LQDN\@52)ESSTW:M::]LR5UMRWB9?UK[\(K2CF//Z[/T^G6[WII MV6!7B)YJ/0SH[ZGIWMW%?GYPFH?X=9-F^^UZ0`R\U[DB&\55@)U[M:ROLW!=; MJY,$)[Q5E">@4XJY=S==FR_"9K M^<$$)]I`-R0!_G"KXH0YSJR3VG>KAZ:W[`=G\*%1EO(8,\*BTC6N-?`-9<]Y3 MTL?9/P\GJ;!BP2M0$"(^P]C`G$\TVS<@IK+.=0=*B?;@,D-WGRZ?_1FRRZ!TI M-^[8AB]'*&X6*(I?N)XD`ZU8BH0@,K0V#VQFZ1ZU^BSVS0"HUX?)O*1P3LD@` M5L_DS&?X35UVTTF$WS#&6/)/WSH'/=`:MWG:2<4NRMG)V!`OND+!'E],VG,N< M^GABJ6S'>VI,'[WQX<=05%DJ*,E85""V02;NB(=4MEO.H."462 MX5CPA%SRT'Y$M'S!9;/Q/`+U+_=49+`RLX"M^#9BT!1$E&3-,SJ0^_=%\[AG: M]LRW7^7`H!)!=:2:*W**7!I,%>03/7B=\Z1$U&O:?\*M_Z7S`POISU*LT8R%N MM,B1@G@OQ@X$@P-]#/%-GE$^/;9^7%Z&BR]9G&U*3U[6GL_6Z,Q>@NR[LK@V, M>7W6J_G9.LNC]T]=C+_+1V5IH2]$Z[:X$@&14+#6_GBN#.V!"^+!!I;N6>UL% MP.\BB)ZH'&J'3QFTQ<&19@.Q>ULNO+%'WLE8@G!27'4ACGP":[.I!?8+K-6OI M(1L;OFC:-EY@+2VC]'9L!W??F*G;X+O*'1L^;#6")^;)ARC'YTR%U\YF13BR27LR-[6NNQ[/--0N MJ+8E_TE01`<0B@K@5W&1HQF]`]RN%.+I[=;^/[ZK2SM\F*.V&)F7AV_\3#09& MT.Q/+VR<60NK3Y#>=<7]XAOM6BDS:0K)K1;,]5M;W!"TN=TSC8*.FG0\`_+GF MI6JRA>GHO&%N9Q8X7&2#G6$&?XXV.%24\?,R>M+R?#SJ>>Z58\J[*JV6-41.& M'K+EVI`_>4`'( MK>5$+*QM)4(#K8BNW(D5/E8-#_;UXCR$?%;,/73J+K.?\1B.[S<;B]4Q-E[7? MR-3_DJBZ.%^@O-].3=$I)D;CL&QFBJ0P,U-\1?9J?`'SO9-^3$>^Y8=KW>%X7 M*:;NP]^=-43^AV-1=T%F9@E_KVF)^M*+W;4[?]I^U01=\*;JZA!I63,&&;*:L MEH*BKZ@D220["HYQH:1_6?93N>%-NUGWI`*%E-4.)),J4K@W-[#XS%1_H76JK M=MQNY??KUM8H!`ZFCRQ(M:)[H,;2^^?$/'AYXOH7"W8O.Y#=,^*X."O[Y/`C5 MZNHURLPZ`=PGC,#;+Z!8-@9;RIS".+TZQRYP1N]WCO$86(U=K=<*/E0+J4.'1 M:_=Q+IJV-NQF#5Q/TW5]E?P0[;=`(7D(?+RCY!2^6W\RD3#;N MQQ")A9W98_GNOVNOP-R]/VSL%ET^75U(!.YPS^F+G-H?C['3/<&PL&R)TUBU5 M!2,3JU`!*J>']M_NL[-3VY=M(&\2&9XA.\O7TSTG`8=\2R25$S7VDD4W2Q4OA M%&-C[D>:=5#$#.[R:ZFX8"7\FQ8A?(G5@^`/B>(02 MI`CG=0! MGB^2M)%61U#A_COX(H?(A#':`6U+D+VOF^-\]A4LWLH*K'1+]:221Y?N@MXL4 M]HO`6W9&J]N>D9\\^2GAQ=NXY+N%&BQ+N6,@>C#XI*`3>N_'09P^RC-*@'_/+ MU`GKGM7>^=EIH^;SC(EM*C@(#WGM398)KXD<="YQO4^^]LGCS6,U4>\";3"$F MEPQ@VRC&+$6=T?\"D=F6GETINKN\VAPW1%_?2(+Y25#JX@3*N[8RNHQF&27E` M8KW*^=.MGJW;J.>%:@2P3U?@'8DDW9SVYVYOP5WNSQKT[].7&7/4'* M'ES)KFE+_XG:7C"8H:/.@N*O=,,C=JR+B`:TMZ!Z=NJNCF8XRQ9C_PS]^HG%5 MOO']<5FY,N>30[K>!?ZULTS;BM^Q4M(.GKG2F3/RC4.R5"7[.N0*OO+#"CR67 M&%6^M-`M"\UIXL$F^+!G_2(B!Q8TJ^;/AGYB'U:9XO8*)";*@UID9X[Y#71:C M4S3X\B7'A+*-E(GRV6)!7=?NG]H\T+"#>I;SN/RG0['34,M'P3/@2X[PF[H=K M9G;)T2ZE]D4;)@;*[#?*H*+I2]\%$:T7CHE(R)=&H[+0TP`_97)@'B;5&:?P% M^@]*SU_*^NJ;C/:?O:O%8,.SO&*`'"6PT$\# M_FR MY_0(;/0Z^7+9?S3!QS>SL?<$QP4A.>-J[&^YSU`2I8J^*5_)QM\OD2SL7*/$0 M(-%C/FR_.T,)EZ5<>K#BV^6ILWGM6<:.Z6*P&^LA^I&KV7(/9I(%%=[]9*]@_J4##4R`4D3 M.-$KKUP_AJEXW[AOO^=&LS%&T.,ZE`[ MP6D:>7#-UOU#?&Y!T>E"8Q\8JW;!^S5NJ1/>&;CBU2$_F+'3>(%(L11]OFG:" MDCP',=K]M!+/:71?],Y8[/&$M$H(+VQ!^3BQB!\_4MRNY\397@=1H7WR?W9.( MM7FR^5;U8ZW0+>+AG-5^A]#LDW(C.&1>H-\NBA&[W:%$N_=(TZ/> MH)2^,]MPT7RQ"E*PO-_[L9]@8BG'@.[7:%%\(=C,$MIT]C-OZO4%9EFT?-K05 ML[4O&/.O.;@?5VJ23+XHOFKJ).57/?_D41%Y;'7WXV&BGH9,1LP&N4,^W"FO1 MZK'\B4-O\X]>_FR.2O'N$*N[X]P9>K%E9$2KG_X=O4$#XG;/>[!?MZ3Z] ML@X^Z\\Y(0'+53]M\1I&K=;/?.DN8GV\ZAK$/$G<'`\MYDZ M:D+:M#!WT_LE?ISTS_,';8+]`Y5J2?$GQ4V;#CW'>NU2O[SK\&0A)HEP,A?;' M>3^_<&7)R_MH2<35:W.`!D`C6I^/B@C`H\\%$VVT=(MTO/(B+YT.U3L=1M'?6 M_R9`!W'HQ-5N?UW`F6K#B&2?.?W^?`CC=32W;";L;"I<#'4P)E,F^,FKNYA;R M'5:!9R\Z]@04S(2&/C_49SH6=W]Y],DM#+8V?T\)GSMJ?=[CX.7\!F7%O`]6IC%ANV<#ND*4 M&9=<*LC;^)L;&H%=V.>O9^.JE]9^&(DL=[&5EC$):C2*KLH[/QT>M7C\YNE74 M5;B%!%B)^ISSJ=!D@X:IGQ]C;9^"X7>5[#OA:)JR>L"9Y"Z8@Y':*U2A_Y>O%\NNJ@\A-.!=@.J71[;OM]JZF M,CKGS%8=^DLCV6`4SXLI9_M2^R4(2R.!',#6V:!L*20)>N`BH(Z'%B-WF'>:" M$P%KY#*D"'`W$_D@N3@I'I'7*Z[NBR1\($D$B]M`WMLL[)28M)Y!&-"8""SF? MEE3X??]KD&+T5=+N3F?)P3D8_&J=FINT0C1&!D_Q=CYFO/E;;RU55)>?M5L>ZP[E$YG0,R'!^F?<20Q9DG2ZZB0&#<%@[TF)-@7IZ#>#@"IV'_V79 MA]PLF#7)USL\M%6MO4%@9(.@S7]L0,BL"9!T-DA>Z14-H+/U4EWQ M-W/>)E8+`0'K#9.W,D9KQ0YQ-2<38,R^H>\LT:&OU_Y7Y$,X7 MK#$.B_OXVG,L9^#[8+X^ MNCSDO_S7XKRP`00PNVBM,(=$Q-`T[:<2'V$U-$W_>1?@N@DMA"!*"*2-]5&KX MOQX,\.X#J):B&@C75&@.B16C0*$POC8W0"@%XZN:0RF*4(2Y6)0"!54CSL4+B M85,G^80:#!?S+U+B2_W32,&97?]@0].,GTK<5<'_VMZF_'M!!_A.?)]_FB@11 MPQ8N3B@%Y9O]HPP+4"U4T7^SO?T74.!0Q#^<2@W4M0$-T-81%`EKZX%I[HQ`% MT!H]SZT0@-OXL'^XNP(?5E?:(GL4KK14GC7*6N2]%W";!%%0)27$6T]/C\7_= M]V<#N4QLX?\`4$L#!!0``@`(``U?R"+3,;?'?B8``+0F```+````4TA/5T51$ M52Y%6$5M6F=0$VK334\((0DA]!:J=&DBW=`!Z2A=.H**C22`2`F$FM!$4;!9=?:K!^`!B M```(U-0;LWL@'<(?!J M:GGNN2,TCIAGK;G[?NY8\U&`'L\YOR-_VK$6L?'0_LK/_%DT7(^G-].,!O013 MP$TW?GB+`#[XW%Q#S[JQ!@(0*SR`[\[_4=)W** M2*`;M3`9_!?@G4!+7P,$!;:EY9W.FZI=;3R,^@VACDJ6V2YL:P8(D/GN3HLWJ M59:PD$"92XR5>B>Z+>^=%'@V+I:="X@TS$U#MR M4)T3B!%ZX=U!H`A#3KNW&>R_-M3[S!.B6TJH%_>'T#&P-F8YY)MF_ M6A<.A5AI(7Z<'B4UR@0^\^J;+OO!6N9MGVT`QVX6QOUS*:I:8/`"CM8N97P`O ML8RXK>DBAPU`7+[OV8!=1:0[QIVR0.`M`XH,M2"+(+G#ED+Z8&4M2`9(3CI7) M9$[#9?Q-RX(,I"(3P=]PM(4B\"5O_8%B[/N&R]%M.V+9Q3I1:0BZ!`[BI+)O/ MGWM5#`M,_(I'HU)FRUMWI>;!%51IR&".\'CAN1?EZ0D!LEX_)+K>KB-B-`K94 M9^?)P'*B6Y3IGVR;F.^R:AL)3#WUJL3RB'03U^])&O&377??9T,5R7C/*$-(3 M`=G364MH&A9I!YRL?'9 M;7.R9&+=^,KU4'*G6F7KK70GCGB];.#3@`?"$MS^8-7YAU6]7S(D8@_5&VP_>(GW* MH27?'A7Z^!7A"&T5<%K^+U8/WK;O&WB*><\YC>V&XGLD>JWB;-$;M;0;@]D*X M5;?],EKJH0]TGE]Y?`@"N)(H3./Z)(-34@!P#&#V]!9Y;PECE"&S/F6MH[ MI["_H@L.\C_<`#0\D"A)Z6`:A+'>62QU\B27'UIW&&M;%BE1:_9IP9GR7MZP( M9*2,Y!(<40C\HQCG0P657HWQ1/TMG+_GZ?DD06(?N1/J)*9IMSTU2:,FY,7.\ M+6)T#:ZI#V]879T/@9U] M!U>6)^H@)&])$T`DH>)N1)P#H@17 MG\!TX[*#4;Z_,@MY@\2\$4EE\N;Q]P,;V#&6WFI4E`^7MK&+ ML'/[!_1F-<^6ZW*S_N#[RQ<;Y(G,CNQ$JI37S:(,T/9FRR)TRGX)W/JUW5]P7 M/+#-];^L+4V]U^0&J-P`!U=_#"'"4CL2H\`U%593M^^RW5^;LVK8XX@_ZD!MB MR5)Y!#*\W8PF*01INT)*/RNC#X+M:QQ'/JNP"C15(HN=*KG%"]SON+.Y)^"2# MJ*S?"`/$ZU+_4X0#*>K7D3/UK\7>8_D%YQDI2^P3+\K!GDM&L.`5ESU.C0W>A MI(O\S"T:P@X-M0-;>ZYMQ?WLM,H!/"O)N<"\)?T[49Q^[WZCKO**,/7G]PY,X MV9;6X]/\_:.WXBXP5%Y278"<(M`H[9=V5O+6N['>,/CV=V"?"J<%D:;65%4'B MJ7]TV%?\Q>D3OI^K;F@2'GQ>8YR@.0"PLF(*)' MW;9:>\-]2I"%W-8K8G>>^">Q/>K"3KLW2P$>':(HC4D]O<7_V@QP%>1A:DP6U M7F7([ENL^N7.<"3;5OU![;98#\\#Z6R6GWLYEF7/A;I.V?*Y@JZ'&GC26X#OV MBAO600I1+WY68?ZH-:%&50WISV]H\*"/6?R[M*XC\>Z][E+@-=1M/R58J"/S@,XX9$%6;4!62R7!L M'"W@S?_B!#_'\UV_T'7Q%#1=>RME`J87$)#D&[+D#1;-9A<>%"BSHLT[F7'K9 M@TG-:".RA#4V481MX?)UV_G0WU%P\N`C@0-0;^F'B\#SDL<;&Y@;3Y\)!_PR& M#:1`7S==6*Z/!]`'&3NUX)%?C<"[\KW#WQ#GQI^9BGU6GIP\I:32HDGY8HR/& MFZ5>"9M48P87?@,-6B,[:!.`"0"WF_*;,\9^N;VZ-3[TG8*MR=>RI&_5S MJ!FQ>;\KS2,W]"6&CIN(&P1DW[NO\PKXJS80KPYGV.EE[@XD"\5)_'CWSW!KG M9/^7"Y$[G%)N8_'OP;.)-A[2&>X/6_P`VD>X/8DZ=!;UAW9,>+?:`5+CLJB@1 M4CX!9G?]CE"ZO,C7>A+A;,?00A8*-,9Y[==&NK\+E(96IX$GEY*'D_R"ZJ M8G$_#-7BH`$-8(3\H>>I_,93).L7U)TWBDW^NW522$68ES<-PGWTK(=P?K`Y+ MJN1ZGN16&Y7RWFYN"GAV?-'G-RIQ'NEGJDZ&/QL1X:X1'=V03,(1]2T&=P/@L M@EQTINTJQFFAJ:`855-MRKEK%=JC:&A8.\FOT%\,8*5)LQRU+V*ZM[)Z%\!?,4) MNU`^PCSNYFC%]YQQ,QICXB8UV;!TWF=[>FGMX11Z.R1Y8_ZO2`, M\LJ?,.>SBET6KTU-YP3<&+0,1\>,E94\$'9C<;;#CI&/I"KW7SIH`("\W[8)6 M*?GPX8!E#N.^+C&ZHC)RO4YR9:'W+-^XE@@0N2LSI[@'+RSS+4R^G[KAY"TL(\C-WIR;V;FF5':/`WRF^U[[*V-P,J66``P-)@G1M M[S^'T\+*1>U-\PX-N%S%;7P^VG8`B-O!^@,Y@VXJ/RH?@3IDD0O'[#?%[X&S4 MO6BQKVBGN9_U)\K/$Z#P>X^'+9RW;6TUG,B(5,ZKZVQ#<&CX&QT#:%.=+4@!K M1L)%#EZ!79HRGUIRZ3,G0_+R_X`Z8"<1VL_4:7]\I>K5%`[V:2$EU%.7IO<1&7#1,2 M/4EYJO1+:/,-8F4O*KY,'/L2I(>9[K3=!`CF_]$;WO/%CQEQL)WYU%:Z-E^I: M7<=5F*MW\L%BM\FH<.BMO!ZOMT:^.+.MBJZM32N402?4_5H71VA)".+Q;R>]% MMFUB\@_1DW5B4P0^G+?%C,9MK`,..N2VCA9!F\26#7A'K2X9[/U^\8N`3=T3\ M=1_(`K-*#FJ,JZ.B_`H>9!D^:EEV`?[)\P+=MWIX>CS448!.,J>TG9#YHN)WGA MZ']P<]&[&;"9WV,W<74/$LXR$KQV`%&"K/5]9:J9)@7(-7!0'YHM\K("D_D=P MIS87?^)=?T3^3-;:NJSY&,U[S&&U5*UM$]8"%>5W&J#>AF84XO+I/]3]\(V+, M=.44U";PM;R=)'PW7CC=AR+H](1X'"1^81V4A$(#AM#@\](``HH#JR&PKNP?K M-YE*.?Y@BPC1J9&7T69%[<='_`GM%+4]8B%V2+UW6ID.,7VTB,@X0G"8H<"!2 M5<]85OL.Q[-Z%Z]7TZ<-%W:-\#CUJ;UX`WXPJVQ]E7\F&:;&Q^@[7"FL.QGB6 M=31O))M_Y="+45\"'9G\H67:M]<&>!+@>OEEZ19ZA5?MT:)5;/S MGTL`RH[I)'7%+6D:U=[T&[[\JJEA*LANOD'\9^"@E)N0_%RN#\5B0.T&`;B3*QCGO@$'^PX_:R' M6[FDWYT#26W^R.'`E^=$I+_B/G0KJ99)Y!SZ*A/2!5GT:Y=<[Y`;V#?9)OFN1 MM]K+!\4S5W<.6&-<22)DXR''I&EZH_D#@B16UCCS MR&X;/8<-3Y)^MCV5+/NR/[M@J(KTNN==%R#QB"4O(.Z[2G0[G^$[GHJ37-/CH M[P(K-YYJ/M/^O25A-!5T%6;"),$K[OJ@^;H<(F$W$(H?OQ-*[H'5/.X:@[M]1 MWF-7R7]5-=+$#_^!!,N2P]1LV(?/Q[NFZL=:07MLR>]YN<&0NCP[)4US=.?+C^BP>*T$N6`1)QP/;H&D MSCH.Y,2687M\3;+&DZ+_+M3D@$CQJ-KA4^&];M$^XA".MXH6S5P65GN(KHQ?P M.8OT?WN;T1S(C-C?%V>9U)%%OJ[;[?T3J/M:ANX%#XW=KP>]\_Y<7E9;AFN7CXC&_V]OGPV%J@5)?3I^SF\5`W,S8TF"#^*T[&M9_4L[ MK\--"3H:7:X!"F"VC)%E,H%NGXF;T?X(T\$;-]3X>(*,#[4Y0'[^$'IG06UR6A"2*^J+-;USD/L-S'&3P[8&PEOK2,3BNU)@\;X382:*:"CS[_ M?NU0/*$>]Q++@L?[M$%6GP:Y,V3<&\U&IWRI^U\*^?3$,4'`?BSGLBG([#68N M(GXY'B!Q>0\S27!6SN+6`QOG+\-A/IP9TV,F1,K$XCDK%/4/V:)AP5!0=^;B( MWJ5$PI/!ZC`U*MI3%7A/`B8E)>5I@@ONC>)=+,5[1?DBSAB%!X&I7U.RE86;X)?M;P32A_4?B/2H.O*D],6,80^"R?@RQ M33-#1I.[KIXNRR6.*`6.%2(&$TDHQ1!X6/*#*LZ.5L6]FI-G^>TN*9>E7_D'Y MER:*^!8ANS"TVK0F)G4O=[K)3 ML__A]#5DX)R2,?^XRR%9EM!/\>PPS05-]2XBRO26D80,"FG!2OCCD;+HN+T`M M\?PU-$]91Z67,DR1R5]FI4@J;6<9/PVS+B8D>JIAS>26\H]][.7WFL^RIF?%O MU$TCBZ@HJU+Q3B:GK#*[C/CC[%C(C5-LI.!;AS86Z8$[6>$L`9VNL)IZ;!@\C MZ#'<%+O06>3&5V..H,G4$'U_<' MRZ)#\-33,O(MRL&@'O"`6O)^]2T?B$D7I?_1NL*'WP$P6FI/#-I$9N#!3OZPH M3(]L06;`G38C/Q15@1$'VH(`_UF$Y1A$B7,()KP[`H5`U@F`G9H[J.*KN)0FP M__/V]L`,@">K;L^_C8MNK.7*O`VY>2H%)OD;7'S=_LPF9=SY_)]',O_\D93>XP8!_B]PSH M@&TF]_.="FQ(Z\1@_1E;)Y:7\.3A5BK-(Z$49'J M26S6N>86P6-M4(A#KCAD(5A$>]=?"6@&P9P;SBSZ2FOTF?%THT^Y/#83GL,SF M)G/6LBZ-+R7YT*3AM#;(&,@_?=CR3)WQ$9$AG?*`_B0L']OWBYQJ@=P&^.CVI MUYTFS?[:E(@-T>R?''S5IYR7?R88.;3P".O-6V-'>\17OZG# M!-`\Y=.(J%'BV7R!Z#USLVAKVR%6]W1A/9>UW>J_C=?X3.-2M1A(5V=G'0!?8 MF>Y$Y[-'.>%8789>SY3V<%@3F#0"A4EWR#$_BTJ:119=//E2\:J%'-^3WT&Q8 MJO8.+*LDXC['G9;\.RQD+"Q+M:#Y\0E>Q.C3WI!>]%2R&Z6G8[O,8_^[ MJ]L*)V[@E)4A,1ZL@BT.-DVP*`)T]'A,2[NU<<_J"#A!M!,P:#(5I]G9N:OZC M4N=SBM(Z1$;.Z&.WU).>6%&OB-I:(5YM+69K8Z$18[O6H-KU42G+[&R!.%T+L M7TLX^2#G_IA)C(DZ,'G3WR95@[]L^81H]S-Y->#-!@KA\BVJ=9=LJ2CWDC"_T M"Q*2(O8-AJY@93>S&VP/OP0>N73*31BAY=-11G3G9]W>DVO(RPSFI:-\=EPLD MJW;3TY%H>?Y0A+:`!?BY(YMX&+`*?ILUI_=M@=J"I7JP8M4JSK]A M-O:U#=Y_H=A:376B0==7YYX>SV*"H*;=.MIEO]HJK)RA"+ZFB+^]5'S*O=K## MA*\WFH'+6.)@GB5[J-CZNMK4FW]Y8Q&%NO%4T]O;R/E33S`#;D<*,D-"4HNH=6MRQUNLXL- MSI3/V_TF<.CXM@T(0E)!^R,U*7%:EY]N8V,.Y%TH>?>]BSFEH`*#* MDFB=?R1FY%$WM_U?!RA>![.7='[ZLLLBOEL622B@>2T?7XN1'9P!9K*G'4\*SNTJ4+6YW!%H MJ&90(/>722=Y9'3I!R7ZGK-Y&I9SORB`;-KUP-.6:[X\MPYP@7)PV]8@\)423 MA!U,`@;H;]_3+. MF?KVF8;Z$`'%8KZEY8T-FQB#J#-T%)BD3L;<4UKX*KM'2G=U/QTJG&\*"HVFH M+>Q;R_5"O$V![Y_;_:?_XW,.GB-]%Y3(^Z59OOBIA7_0>_,)3(H,I@T0NVZM0 M.D*#M*#:HM\NDSQ?FL)QPKU^BFT0KP::W-BM4_M^_^KG!>8ZXM<7_2]]_>+V\G\$ MVS]'H<4'97[M"LC?5Q?H\,G4.P>^'&9FA9EOL8370D6HMJ2Y4'EQ9.TWPCC1D MSZ2-P(S[KB&^2P9U1./$60.\P?.NSB("'GX''Q2UUA3=;YFI(E_\X_HD`+'#T MV952LF`W`GA]YG;)R_-RL8(R'`Z8AMO1?+D-:N4+H:5(!3JD^[\_0O(\IBWL% MP@/O9*RC&N7`NKTIF:HYCFPG,+TPU+7G^M?FUD&@%V+>T^OX"2MFF2+-%43HX M_IV9Y-)?I?K4HW((-;ET&QLG&# MT",8@B3Q.FF"\19:G\OP4A_T.)?OLQV?!U(,'+IZ$THS!?`"3M3%XRU+>ODQ5 MVZ5ZS&_:@:\OR451-)R0`BAI#I_#::LIZK&U#:#=61O'[9NKV#2"Q1%M# MW+#5^BW,]PC])$5O\?V]+LT>.]J-]-E/R:_Z$HV>ECXS$V\`I8:#@KA=D*=L^ M:]`&TEO!;E#'>]A@P4M'09."+)2LZ`8U;",TJKQTFI/-,SH]+(U`8J4KS$+QX MJW6,DG1`NC9Y2-Z>,BD2@.#_XMT`LB[L^**NM;>N`!6%*FJ1'38O>G&-TL_(6 MEW])L!=[N+SG^P@B:+8T?NAJ`'T?S.JNN`5S5'2K[ M4W+UGH"^6(G')\\.;*A]#MZ4D2ZBH,>(*5P!`B0X=PXASJ4Y\8:Q,BLI;TMY# MGC&^!0"YAQ389#;[%N!8FT`!*\!TZ((('0Z9>6B9>*(4@Y7`.\_WP7ULFS]19 M_ZKL+%2:NB^Y.-H-1#3[+L!K+O=>FJJ67*)?Y=Z;59#+_A-PN4SJQS)Y@J&$D MYG4EWI/3K8XVK!NK,6O>E0K^IJ2.[[(#8VP#?,7EP@U=DP\K M//DON*`;"[S.&$]=X%E^&?3(%@EJ]#GEUU+U>6@QYU;0LT*BPOQZ#?##A^U6V MLRW?@SA#2`^FS/$;L795_ORVKWJ]69NB1&1705&#@*_JC=I''[,\DMT,>F)M6 M9N3*7\^WR!WK]6*P\MO%']!::E\J",KP&6]*G=&/K?SBF;@ MHNQL>*3DU&>1_:/?S1F)&4`!:.:2F1_)3]/?=#H^H(*&RN6\#O# M$'%B,75X`3CCT/SFYNJT@[&02"^C+BE[,L?D5)G5.Z MH,.UGI0Y64%WV0[W@-VY+BN:'NU@6XK!^\RDW5;7CO@ M`1?U5^!/.BD^\XGNK]]`>>,5:^9@&\.FNOJ#AO)]\Z8PWK`MOFDT/8: M4JD\3L!+<[.]YL/Y@_C[V(K>P_*0Z(=129@KO7L1JA4'>:Z]]KU<.;$NCGCW[ M=ACH15)E]D,/ITH7)PGO^L/(E9+-FUK3A9I7-(AFUT_$"!`P_N<^Z.6*X/JKT M7S^3+$G_[&RGC6H-+PG-K?_S*E&L_N"0"BJ>N$W1VH5YOG.J%LP+ MS_9`HOK<(M4?OD\/::DV^4,!<4I!E@2L^/:49(N[<'KNM'SQ-41J`4C+7_W/, MK2#B7O''U5C[2-2$QA484-P6+K5$?Q!J9X1R>:\Z=D/#IMV;+.A;Z%GNQ8K;/J-A; M[:$7=;EA:D6OUG=8FJ&5E"'F,[>^W M\NJ4@/WQ`)Z@"(2CWQY]W\[EGJU(HJ_?.3R0`DD_^K'2>W_?JTZ$/*';0OV]X M_B*6DX?@OXG?'GJQ@'3J=/\#JG20?\YVZRNRJ?7.%>^<\+`\L\\7>FU[T#[(! M!G$MI"BEQ-VP2%^QQ[Y8`_6A^1-`DBDM8N>$))G2F>MK'($CAYW`O-(2+8\+Q MNH2W;:E/`\);3IF>$[N7=>VD@//SP4"HMT;8G9'(`5/DRYI.`?V)OC,)3 MN7F9\<#5L!26B?O-=>O> MWNT)AK)O0TB,E?,Z'N)G3PAO1SNV=D16@)GJH[W&\B5/JN+:\$"?_V3KXTJ(U M%__%?,NW&<;ZX#S>CD>Y&/GJ\8JON3!)(G>LM0^UDXI63T/L=,:6'1Z]A^PJ^ M6E9A*ULDUGQ=34WL^5:`B+^7%I878Z)#+H03VH.MU,E?--MN7[IR)C**3'/0Q M,5)!1QLY;"0XP;0`+A1)B4MA`6?KPR]]XY)G\ M]"U"+[1Y>X1T2$6:WW$Y.]:SI/>XR_@0E@JXBW_`AT&]X"*(/?TBT+<`CR8"* MRNZ$C6>FDW[HE=N'G`:<0 MD,NYR>F]C:([B9N"44>UL5;MP1[:B*SCB^.V,:39+^+/->YF4RZ8F1WWZLQZ" M=:T"/FGOZFWC?K):H?9(Z6PDWWW2?ES^!THHP=B[\V*6G0?FA/._#9?"3KT33 M.*YU+-K'TBD^J6O#_?)]G^C35]RSO?O'SZS#A.]<&F/:1(5#8:XDY+]2U9I74 M*#];8T5-C$;_J].H4$B[6#W/["-QSM5K1N:OGP:$^KAZ.+A@L^V4IR( MPL/"VF'UV]1U7XKB98I'*$DC0%_JC:/M*BG]J.K3#).P?;NIJ[NOYX/*)@$K, MCE3A_/D7._G='M2\L' M+\@^54V8!PI(C@'$.L`0Q#4^MP].8(PH2@V1QH2+T'P$(INPR('6A04[,1B.- M'\U$"?ZAH596?:*(+E9&FZX6[J&EEVKB)C_X.IV^[&-<+QY]\?QD6N7B$VJE$ M?IM.5D@7[O6YB'!E(C646K4BLM9TF.AFFI^(C5;B;S[5:M$8`_"$2K_!F@<&$41/9="XP*2&5F@H?_G%0::/%:>(P..GMKBMJ*'6&IS29#Z?TCW]K(HELSC+[BYXS)D?GB_P4YX#;&5!N#3 M];SX);9MZ-MQ\N^VYPS62VP,HO*O%[='7JL%L>IXIJ"8Z#C#6@CK,<_7DS'!H M;:4(NGG#1.!Z+;54/=[&4WB0CX7>C*LR7=K`$$/>-LC&V%]98^PQVOS=JSFOC M_Z:XR&L"`NC=U%:H?0I\9(&Z+,N!6XPLI"[?![`\>68\(#D"S&1,J`\V@@#L7 M1P!DR]U:,,N89PJ.$R!#(%".!BN$AX=RE$PA9"D(W%0@1I*,K,6PQ'C0+T$<; MF5HT"_W7DN7@_V+P,'KW7[*1!=JR+&N;^[^T]\CP1C"`X\SQ^XN)X=-K80GR5 M\!".R5^642ZRA<+_M[>^OP89!H'_I5.HA7@TH0#473@99VDYM,!:Y');2:NL@ M*BZ(R8'^I;O/]6-T9ZWG3L)D-RKS)QGK[`$NJYD;`Y&5A?=Y>WO5_+]W:9(3W MGG[_!U!+`P04``(`"`"(D7DB?/C`M-$#``#C!```"0```%1%4U0T+D-/3:53& M?4P39QA_>^WU6F:1`F,9(?A6/H30=`+3,03YJ"UNDN)&76)"XHYRUP];6NZN1 M8W53,?C'"(/XAXF$J,.QCP2S#2W&ML8;I(2I2X<.$T?Y8QG[R,5.A6&$B2E[< M^\'P?Y_\OO_?Y_9[GGKN+@-0M@1T2X1800B`P@PD3(#")^4!*2$5?`RAH: M_)^338TX)%I)@OIP#QN8CKS>S=@_7_$B>V6("/\-\F>!$HG)(0Q M>OW\2O!]:8S4#(5QX0S0?![&>25>LN2O`X6?2/1ZH1O,/^&]N+\&"`X@N`%_7 M"9VB(\$&^%)I`AX"_#L)R#=+8YE:(.P#_)TDMQ3G7@/"&X!?3$K4@.\@$E`%J M>*5LO:+!("A118);V6ME:0/#\+MAT6AKD6A:E M7KHI6ZZENFNN7Q2E(3OE4D;95M.NL8Q4`+ZP569&;WWSTJG1$6WTN+Q/WZP7: MOU>AD^FWZ60-A5KLHYX\0I[=>FI@4'6Q_/P13'GH]_K*@O1X6_>VCDUD=!S]) M>T7][73JL2-7QS*OS-1]:'FTZ.!O;G87/WA6]/2.O..H?UD]=B.UK7@UR5\-@ M./J#BH^+'R\Z+M_,VK[3=[XVFOO95%12L[>_-_+;Z;^*"G#R0>ID0TF]3;QP` M8-#[\NFUVRUK;YT<;:TKG_OJ\LA/[[;4UA]8>3)@ZB]YU3]XXN&FP_;%Z+_U2 M_QPXR\XC]D4Q7/CS6]V,HP':C3HK MZ4@NUH.AR9B8C-5LX3:ZBV6@1-),HLFID'#C?_@/4$L#!!0``@`(`'I?R"(Y$ MYKI5_38``&,W```+````5$535$-22RY%6$5M>W<\V]_W_RL[(B*(C23VJEVU9 MQ:A5-&C-UIZE:B14:R2U!455\>Y`=>E":=%6[=EAM5:'49I(AU6KFOSZ>7S_: M_?UWQN.<\[A_W'ON>9YSG+R#0%(``(`!*64N]ZP:&00`T'_\_V0>'F0"!$:2' M:(F&Y`]!1O('Z9V&:BZM,,`%#F_@NN2/I[,EW1KL7/;SW[?K`[IPAF'8 M!N3&+;NDGX6?,`A=KNYL.S\PS`>T?5'5R!7)`#=IO2$RR@V!@-3@X0+Q&_^V-\:X7?2G` M1S]OG:V^JGD]J"B-7EY41' M[`2_@JX@1$DWW9JS2NSEB:C#L]IU-@SB9XDR%OV`'[TA'=5!0;>0H)[/(0,Q9 MBGT(D.X/C0\^\!Y:>R7LU6T(C-D&@C=BJ&+M6FRD""9EO[+!Z7/^?SP.NEZ4 M$:H*]UL4"]#&POK)02&%XJKPL$6QB$8M!:WVH7*IMD`0OMMY50:J6;,0FMTKN M8E*3Z0H]1O!SO0L+DH9E9-E5A?FQANN!21W:9^,O%'%%FCGWOT9,WM&J`IT?- M`_%0QFY7YWBD"9R]6"HQ29&-FM-6W7*^H7B MB,X^$@:*@\^'7PCH)"]EB?0G\'1$04F&B%:9VRNF#L'"538FSML*:\7#>!'V]AX&Z0[W-$L-[ML1_M*Z65(, M[3[^NN7)8[/JLD1[?)YK`27ZV#1)*9KX'G4FO/UTKW^.,LLJ!* M$DL;Z$5$(Y*Z^TBK-"@!R;M%/]V272;'(NW@M^ M\NOSS&37XIZ]T+=D9720I9:%KV$>TVGU9/UE%WNCOP3WLI),_]?@[<4";5CQ1 M,J33^>JR[0>M*A^,&VT7&R^0Q9@:GUO8FKYSKS-7F\T[7%'!*FG]`)%&8."G^ M_`=3T-N[7:.,)5`//BU+$U+02.^Z"L+FL1K&RG67P+^9XW1'R$BO`C\PPE.T' MHZ9R=<7><#>N^YO.[+@9CJL;]1*Z"R0+IW,\4R'M'J_G].=HVGD9"^6,53;?5 M-GWILU8:JQ]>/\A%V#UGZ;^=T]'9KM8YQNHH$F?>X_;E![R:U1NV?O130K-$* M@78H"#F<+NM>DN[!E(+WI**0Z>GH/_*))VC@.(_M7YA3'[!/FP3??0`>\T/Z\ M8`=LMZ?+EVB_"Q(^+V*+@Z/4QC;2Y_1S<#:+9!1[]405B\;;0=TLQ_W\A0'??GJ>"=1Y'1Y]9&T9,=-B_^@AFUE6F^?*$XU&^9\\= MTU.5WK.QF/#T)*^L$_0P2TMW<,'0UWK][]OA")_7-Q MD[^SCJSL$5K20A",6^FMH=Q<=U2VZ&E'D0+.O9AUO7=NI'U$"Z65X6]H`^!U# M2$]O`A=ENUW,6@M_7@TU-PYS]?(('?[8?"@=O6@\2@4+1'4'EH;S;VYC9MZ%X9#WS1%!03_?='[,6;JC-G,(K[0)?`GCF5KQ&[-09P. M"10>Q8EPTW1;,>A.]RY\GX%_7%@6KOC`12':1,$H_W3Y%>Y)"O:;._1;IU>"V M5;(JX'36B/82/N4*HNI>0LTV/95ZA>451EZ20Z8ML!HA]AIN<$TV\,!YCUUE< M_(#03[GZJ(KLB&950ZX;^CJE;2VY].T[G;4NSYU[>.575;)XWC7N:YU#K<(VC ME`"R)KQ9XPZ;]TK4[:!0ITB:XW=,0@C5C/TK`8=*YGA3H,[#%_`Y96GR/<6])(>UXA?OJCHPZ\PLD,!A7)):Z, M`T@?7*!6G]MO>'&#DS:0V.;RHK:?GQOD=YB>E'!=$-3UT4 M*SV)G]0/=C4QHHCNGT'2+\1XLTTML+?`/M:V.%>W##Q)UL>[,$>8273(=`+K+ MFJ"DSC(OOQ,[)=(L1!"=J1$,OF:65UY[[AY(\Y4*< M<_1OI0SCS-_SYLYW@_@R79'Y04!M!QGNP?RE=4^$]7QTY.]JU^7FBL:5Y.*[D M`P.@XOQ!;P/>$7).%;%))O]D$>7`HZXZ6Q]XG`;BUV/!GH&S/)=FXWVNP*K?* M;:6-PRW%/&$(49L+ER&D)I;U7^LF)%,A`NERYR^:S7\@I;U(DR*#_A-HG2Q2# M<\-9JGM@@N4=`_R-@?.WC]4P:6OR'5ISJ7Y1"H:A`3S$A\ MO!$>OT`.%KE:%F]=T#NZ4`0"OV>S=QK7W'8MOL+5E%@\>]]QX)SNH[SJZ$^(U MKRL=Q%4>#61CO8%8HRX'55\/57GR)/M0O8Z4;GU].7:@7J36P>WD61I;UJ#H7 M#T^"8+93(JQ+"H&=ARCQ6?,:3&[,W'P[R7W1('#O+M_7 M+;U2+*M@Y0K02UO=-"K?QIU7PBEBG]9G_%;%PFP] M,%+;8G!.+R_6(-)WY1-UO3K`<1HF6M2SXOA:;*P#T5@;:7*6XOVMP=-3EI5FW MFIMMD,AJT(4XAY5Z[NEISRNY%$M03I^FJTQ+Z9S)7MH: M`3*?+]0I^('JLL"C/"]T?8(2G#=F1F!,EM%2MT#!]MLS08&!;S[U,W<405(+D MTC@KJ[W[9MI^GP3;^M`D@?4Q=4CGQ0]L"HT!6J156_-%Z>N9._XV^_ M`C:QN[,-M[U2<@D^,E78I=B7S2,+YMX;A6 M8V:K8$S1V3@C*QY)P0P#@E3WUF(&,MO@F'Z`X=\.1YTE'8N`#9(B4WF3EYPS`J"*O&!(=5E^V`N4Z* M'>N/MD?M_;KU`2`'9LMQ_D[5=7-QA1=DG>)J$=1V1#3MR1X;EQX&8KQ1,'DK2 M$&8I]6=!NWHRPMO+QRY''YBLR.0L MW(35D*;E+'O=P68KY_7$+`X!R/F]AMDIBMJKK+H_E*WSE3&BSD47E#Z0.*C0+U=ZBT$C`7R!Q)]V9`V*_LZS^450)[DE57J!(_%;3A M@.2XGQ]I2@_E?"E09.83FF&W,49.VS: M6'LD1R9>T,X\";Z6E>NQV.R<&.'FG^TT!V/E:AK/ ME6;N6!!1[]M#(53F@MB%)XKO>KLF$,DUX@L[7.C];O@UGW]K-QDR2H" M*UG$(X^S2S0^:.+&+-JX,%WZ<^OH9LK.!YF:[''I@#:&K_\^]Y!5]W30S>U4B MQ+\<21*=OML-KC>J"\_VS@Y/N]VXX@GJ^E/@W*:VF_T.Y&P\F@86^X]U9>@VW M4!#7B"@V>H[9'/^0VPIB=K8UF/M"J:$*49=P^CVFYK3\#MY^/B$9Q*L),Q*3, M_-?8>2MAWL$5RG[]42^`DPW^RV4:4]CM[(<:3*K#61#I"2(]>[[0`IP`S=,A].>`KF@VOJ M)S`3]X_8X8RGT[9(S%6@7LO:A!FZOSKTQS]?,_]4NI:2VM",8A[4Q+$?R1])1 MN-Q'G2FN`S$M]NV/9`\MSES2Q^4M[)XU%%2;GMV]*P5AJJSRTE&SJ3R,8>0]+ M(9;7H(=>X:$;.Y?Z(F^VD%43U+XOROU4_+:38H^XM]@_5.;K/Z=CJ-LTL,QW5Q]8MNPN/)5\/BC6A`5EL_:I'?;UH4 M9GU]R4A]_>3'_'H23/.I;8W-(5#Y2L/D](.LH1'-\J&.0I#/PM-;;)KD)3 MEIWA#G4`*@J[R(K5]K`LKG?ZZ*L8A\[?]8<51;J\CL`,[*$Y#NX>]$`A-[O<< M_]ZZU"?+ M[:8(["%1WT<&XOYT#<3?LL(NK+'Q%V\\C"9,&7WKOM\.FM^_I0520%URUGH\$ M6=,@GR"X2E*("/G")V(OF=YS-NXA&I(+`1LX/)4PI^WU`5VRS#/\8=_"0J(:D MQOWI^ZPCW@=!8@^Y]>UX(T3.&\4#?8R%J'1XHGF>)906(=*$J4

R+CK M[-7$T^'L9<(T0#(X8]FD1J4QZQ0).*IYL-H$Y#EGIVN18"]T(46O'DZ&ZD!G1 MS*$+I-Q%B[6/(/D*.AKMT2>1X/+*3*"3H[Q<+U[Y3``?<%=3V#`F("P01G$U* MRK+O7\(=D/EL8W.CVAA5MI.@++;_I3RE94$6I5)U7.%B!N>D&5M,I^%A8,_S> M?`/DM)>1^1CE<"SZR-*#$>J7TK?X'&(1N4GP"3T6R\SKAJ[F'Q.NE2'#G#R/T MN[1Z/L#CI[UH^S8&//SO'-\<>R84_M%^KL8;I9NMQ+1X;P5%]%%S5A-S=_V05GDBGR]"48EL@"4)TU M$"D>G0%"'+DT>K'F.<%ML5[<(XXW]>"Y@HQRO"+Q,"S2EZ`IL]JV?K@]V^U38DW[3OW^"U?HO"])Z M:N2PK*>%;U]WFWOQ%1_WDBB+P?N^7CI-2I%G_`T6,9=8+T#EWSLUC$4:QHL/R M%6I.&2Y<_9:)O*EZ6*;@:LWZ,:]OS^0:2AEV1 MQ?T.TH3T)RUZS:1PQ5+77%`"-+VG>_MS8B`^;U[^)=PHO#6S&0D/Q`D87/2((>3/=,8HL9]D`$^L$S9N6:76NWOV=AY$!6II?'IF#F`54H[QB%GS5?S'7II M939PY+:X:EB_&A2Y$=K0_*#E)23B>$I_\%0;UL!0;612K^I=[6B'I_>+V;R/" MKQ/96LIS>6UN#`C:QY0;`J'L-V73&DSI99.'ZIE"UD>F6=WSGA72H2X&O(R[V M!M2IJTQ%+AO_Z_Y'A(3#"^'=J M6[?AV,1-.==1A@SRXMUJ[9DU-U4^_5;W>=3SAY889ASW6$**,MBG&R_\$2[CA MQI`.VG=XI6.[W30HK_H/POMSB+3?6\@CVIBCRZ4=&Z+O`EA+@P1(Z^C\-$/2Q=MD M=S1Q'R[_.N\2D\`[M:!\^D+HNKN^][FZH`9!]`^XU[1E]/+MK+['IC<%(>R*& M2D-Y)J2;]]*2OO96/[Q@\-M`I+:][Z4>1,7&9C;YS&9BIK/54>;O$[R)S6(76 M+<0*4A@?+S?R16H693=.=,9D.)_L-BUA:5W_46V$&6NHMONY]!S&[M;KRBUM& MM<%Z0X5XK/;XD]-@,[YV!@G(-ITPAYZ)50'[7#VUT26',G>.:Y,(D>.5R73,7 M^-I%=.TB6*[KWFN5%['-91S>,VG:F9/@++>2$3ZAU3F,,Y]+/^)S=O&F] MPE>#+T?*WT##U)B1$,"^U5+3_JM:/TE.1RJF')OEC'ENQH3_CKIS97$+S!`1K M'YT#8>QOH%,%Y=U*JIN&P>MF.(R;]:>&QYN(F@:#GL0*DIFRQ8AEKWL#%-5DF MG6>#O$7"S"'1C5'IJ4_?M;[J4BCUO+#\]>4=]=CRWH2'46C!I;.+3'KT`W!EC MCEQL+O:U/Y#D/C(VY-J?L-!73&;Z@O=P&:ENA@=R4SG"W`@CXQ34\]9)C%Z$U MF"1/QOO*TU95_=G0D9]ECW7NQOYE5K#]RA7SODZB\,A!B3.%[!C2!F?.D3 M`UNYTJTC,Z%QQ)F^1F!)J^:KPFV#4^@TQN?$?^C*P\@&N* MHCB5#!9]='3=JS9SU$G0X/>.ZVB;.Y2L*-^)QP_=MQ?D<%PM/-?96*+8+`?_H MGD]2W-@D5?I;+;P`']Y_&"(V8CR=>$!2E3^Q+FL+9U^M$0[F+4M_7RRI%! MGY\3DI3D\LM(;EEK]N[KY+V_UAQX/!_?#F;F:5C"&@ALWD;]VYO\W]S!QG+1Q MJ:L^,71UWBI'E7!_')-@)D6/(N[PD=^T%O.M^^,2?)IL!?ZX#44`D(]SRSZAO.5]F+ M!%/JP-WF^DQT\+=J5GZXN:/B.3N43XY,1Z=?1F6@9_V>MF*1%P?6C,+VZ;$BK M;U6;(:\5>85B\@VB49HVSNBUAY[F[BRYX?6&:YM-34"C0Y+N9YGB-D.7_[[7F M_IWS/-T1.M\$@<:4KC.ZMBMXSB]S_Y5W#\S`;]1(^.%1OB'N9Z4T;"K97+,V6 M,N5R39/590=F$N194;%U9MF7"CG&O*$(S(_1T>3HV=`G)DCR M9JN+1CUH:8+3'62,:I"B7,G@^J$IU>XY;Z\X<=D[E@:.QID?>1(5+NS'G'&2R M?79*X=YG>?LO^/;7O"G`UU1INVK@WB5;09JM5$Y)<%EZVA=!S:&1\2,I_`$*= MMQ+3$I<0]/AOM&U;,+1WFI^;B'*!(*^-#VP0TVEI&J^3"P1L/2J//+C*2;7); MY.VW32F-LW#I0$A;])%A7,=(66WB=5(E/+^9Z?VE?G5+*\5C9^N:P+$^_*+\X M88O`:*C&2X#59.X9S_>UK';)T[QTP87A:B0I=O\B)I&N5]OE'Y(3EF9O8>B!G MIB9I"NS[(WBH@3CA$TDQ*,SW;R<&$"[E;`>[Z[Q):`B"I/Q-Y9!=!EGWJ'3?[ M7->&H*6!<1]%Z)K.9O(LDVI9<13+\N3^L$^5S]'2;=OZ\UE_$KS0F_"]XJCLC M^9.2FGHG\=?L3F5PKG2NSTZN7$W');D,.E(_]_^6"K=[^OS\;[EXAJAM.7^G$ M2=R-K+;[Y]HAU_&TW40/-]AX=.ZSV(@`WD)%GE='0DT^N(>SLC-]RF0G#=6JX MRJHCS!>KJ$0.M2M663=0U+H=/B";OD#MV1^"]B^"VNFE^L-T7!B)+0PO.UXT? M\.6W;7&^XQ?W?;476+5_+ZNCI9SJ:2.T4*&7$?V#S%-3L]`[7CPH0?K1QIG=,7[(4LY4G7)2A&S>\3]/V MNI@._-ER!?NW!MA5_>JN\>XM@\31.,W/O0;P2,V@"[53,C<7&25I?Q\$_.TX) M0/3T-AZ)FQ+`PZ-.WJKBV"N_#CEKPBQGEG`M@WF[J+6.8EY/)TIU'BF""CZ4? M*^7B$7$9A-]ZY"3S@AH_)I*PA!=`LF:`AHAW?:_5WJOMYR?`H$0V0E!M1QCZ' ML#0X\4P7O9@_;Q4Q8YHFY?''J/WR\JUSNJ_3'YO0I_LC#F_ M:FB"@1(4X:*A\//Y+Y&DIFO[@8]M*T MM1%7+2?/;:0HVW"HS$8D2XA.SK%B7IW*[>FM,7<&W\?=$O4HY3WH0N.,#5JJ9 M]4%T(_;I"A6^E1BC3?31C$Z=4'Z+-7:,S;05HD*WR[-UX*'+:G4,U:K`I5'>& M`QW;,'-66%3!/3=`%$4%5AF=%O7V"JCO;%S++X1:&[%%_E)2RC2F5\WZ; MU-Z1.E>Q+*A_.@=$%2U:297(T*E0R5$2=T>#U>EA8#_.":N3`P)$=VQO" M;`AG*NKPTS@JZEK^T_?BHH^,'>%#US)3+%]T24[O290OFP78Y=S=*`UFY/=D" MC'92$:20EJ`MTKS#ZK5.7R/E.:]I M];Y[#3QWG'B3XB[!5*J8?2%0.\#&WA80'LR[:BQ.RW?1'-;Z0/U*B9^/EOYT! MUT?F_8J8CS0%B4.LG#L<:K&5<,W&-OZ0>N=V`LJA%'IS_J^V+98MM1:X]9XAB M'6&`]8HS6B"TM;?:X8#DYT7QP?L,!5D#`&)*Y7U_>,I6:4=#Q_;:K,JA;K=#3 MXB50Y"D(LX9;RTD<+(;7VGJ[600&NI1OC/)\SMYW^)(DKR+PAHJU(J9Q^`@:L M)\=WQ$R+"Z4KM%NACG>NKL+AQA<0/O(8%M0K6-D^W).L)6S=:%LW#7BG2)0*Q M\UM>*,2QFGHRSMB>Q`[\#CN!65'S2S$16J-E'G-1Y:_[MBU%4D4WLJL?B9DB1 M;U1RTG_!>YI@W^P4W_DA3!7N$*BZYIGTWUZF&K*\0H.6Q&-3'6JRKIM:E[R9Q.2ZA__JS[+*=8XZQH3VJ6"+PW`05='67M* M;]R*!]4>B_,8L$%J_'G;5FA2'6K[(5ZN^"__&W2[/P"`+@K4VJNMYB7N'$F$93&,F_>MCZB0,8DBRU/#C5ZTJ^M>Y>I@:)-)O M11>0%]A5,$[\B(-#U0;'INHS7,"N.?6"9D`J>KL/L(=CM/"`VFI&,J_;A8U;[ MZ3\?4VM!+/I%P;*H6CFSSTX81O\]&N+;@38%P?$I:^[=2^J[ZG,0U=]\)H1($ M.^;O,=;Y'.RY^OHV(^K`E09IA<]+D9R4F$9<%`=V M`SSZD#X;7FSAB:<<1.\>]7BJBJS[N$%#^3&<1G(HJGNC^M0/>K.+_;UBNAS]% M+8'/Q5Y*@=M:YJ"E.^8J;W9+SO)'!(6->FB[?-_C\T([Y^%T?AD^1)%E+>YEQ M*30IQK:+6O?:2#YXQ`Y2*)!MC44X,C[0%[C(G!%7.3\_N%>@=X3]EQF]D-[=J*A[LMT'XPVB) MF:'/4\3A?/!6^X)[7;I[Z[5..DD'0?(6@3IZ=P+5?0:BI8L:($C&T^PQ@#U39 M`A7S,"X"63B<"3'X+^^NTX/2T\UQMS&/;#^DF[E4T)XKE9P>J3-S.=KCT_.@8 M#-A>\[V7;[.,>]]<+#F8F@#W"!_M)A[>HRH]^)R1+V664>28#\LL1B(\Y>W,O MJ'B-0P7BT>G[+/C[,4HS^L">I=,W3E7!C`6T/V;?2`/^_MFS8L]!<7?D[5-U] M`T.G!`]JL&6;7$&OU7W+=Q6BYM5*#OJ4E@Z!%)8F;]]Z662/_>)V4X_GS837X MJ(-4?-;!@E,"_I)K[Z^TVZC0W,6N05'&O]Z-=89XIUFT*B_`C/N_D?4UI\,$) M\K6'G`G9YU M]K*2"_\#W$!I:-;$@SP@!V[86W>_1KWU(FWPH=3Q\Y\+F\I<;5T<$"F$B]+W` MUJ1_B"Z7IWEUW93H]$^]3_:7VT_T\),[PH["@-;TF M4MI=F5H**JO6X@VK2SYR\P')5#DI3JC[C]3DZR?5P<+:$B'^*IF==^Q(8Y^(& MZ*AK4>X/>T2Y'9F?]Q4?-,AJQ3SGJUN`;VS,'OKUU278O\#FKXA*=I&58)&45 M#V(_K\Y8&?V'"F;G*UM9;4]+=@C(NM3*/W]38K_I>[&#[*/V9^_RE;$`E+<@% MHD3\\0O#ZYT"FL8EBV^=5;$7]`VYF-* MP;7X.-O6>-YF7>'OAJ%*TA.\0N/T1RM4J51S,]B($L:[E1#TF%S=)*;N)S)8) M:V`R6D-T=W9>?_C:Q8+$,4 M"ZLX46*-]'#VV>]9`$_J=!04K#_R@1=04^6K8=NC:KMA37A$=GU''U\U M89"%'2S)[XKK?^1X?EO'M/?(23O4_DVKXNT1.R_[8L?'OYPS<+M=U)BA$S+'!#)5"D3)ZX>G66T?J//YKW1R`GA,?8EF`3,^]D8L_9 M@38Y]07JC<39483LME"%?,-3W].M?W"$)V6RBL;T-Z^(L[XYWBR]=QPWK;C[! MS"5S,\RGQ9]-Y7(BM6\.=^%J-G=-4'=M`C7VPW[SD>D?KUV[0::6-11DQ8V\) MTX7KSJJ-I`.\$0+)UI7)>S0=NSB3XM:$,;75^M@2>7>1IJ@8,8>[!T:4!1]== MVE.*<+G\S1)W^%).?DA4*KE-,N5L2349I2]XS%B>*&S52HQ,^'X[(J_!7!+2= MI79)."'8+$1(#K2FTA2J)$-*'BHA"9/#0?:66$^H_(4!?.=_#G#=K='2:->2Y M3P]8'Z,+%VZ!]05BIO$X)::5M15@"Y5=L0IWCK=75I@/]B_OG^>-$IVM<0M23 M%)C;'U7CJ:N7*32Z?R5521Q3DD?XC?YOW9EGQ#NPA.+[6C8.AK8+YQ>I/"X&0 M?+P#A7D'PM:?R&^)3O`>_\I[^ROO]@*OG=@*K&(;=N_QQ2])A+U#%X,7UD#)G MGT`0=-J'J@M='7.0&EA1T=/+M^I+JY:AF7UH?G4YW+KV^74ID+ISC,@'L9KHV MX1JK!A4=W5P1U,VB!?4S+QC=KES]7-/0\,F.4!NM_4IM2UZUMA]R8D9P*.QQ$ MV4GKZ9SD'SH^C.RT)LM0[VHZT>>KHL\]6R]UMN664\7PE9;T*B^?RDE(^:7X" M_+\)Q4=\<4(S]+Z>LO&U$ZWH6+-N,80".KEW#@S9T<^##1)RH*NE7(,USI66. M9YP"Y/"YBMW'T!!L=R`Y9\U`Z$?0&ZH5`)%U_-9J)V[K]O# M(7WL@#,I)#T@8IUV<).VDD2*U">%?0?1*:HY=;34QMFKL0)@&MO2A!=C`IG2ST/(=AXV?T\M.`?L]C/X/B$A'\(M3>=K4Z1L)+W>#O1'%PI2[%O^+4=X\7GQT?7 M&$[2*ZY]7>E#A]I=HXG/H,_<7MD2;`[4W?*=:`JK(C+Y!H6PHT4CT'N5/3=K@ M_I*?_(#"'[6;+LV,A!,X_&L[E5,3KF=L>//U,L\ZW\9?1$8F`K3\9Y[^%GJ(#KE3 M7R-;/U!M)5^N-F8_XXN`N%!1D=@MWF,Y>B!BD1WZVH%36]*TA$PS<5N.3G./DA\Y^GBB3;P$/`(A"`C(5R:91(U-- M9-IERZ/4=7Y$/)"B(97R)-;\0JE2T7 MM`8AS#L$*1N%B*+7D9NT\B22.%]Z6"5I71)#VKU*."?-_^3%]=T.O0-XK.:TU MZZ/4-V[*_?O-BO=.NI<@Y9V`(CESLJ\\3MS_X#>L_EE#M<'Y(0S`F.K+_G2^&/ MKY3OV.1ILURWB2LN4^`2?ZJ[F"W%UF`I"J[--M2O-A=L4[M=>=VG[ M2I+KX;TV&G&SN5UXHS5"7^=*/7&\L,5L6ZI,(@=6;&;6'F2/'!)EYOEE,OII^);R M96@=6\B\3./MT]J8Q[9T[HG-Y!<*OR.NVD0'O.!Y]CSLZ>B]2P]9\7GI*@_NI M#M9:A&(0"!BM*F0'`>@.LDF,Z;SL,_#[;T;.\NW279+Z?YG^`RZX\A.Z`K]'; MZ)S+Y.\N_;`R9&CT"YZ7#9W*2^4BHTR)TMQJ>6IKHC4RB+^V"RO`T!YQT*F8N M%7\H7]+C+/[1(<8:)Y]2\E,84M1G\Y?&3LFSNB`;DV.D;4^5551P-).;MK7.? M91\DJ=7%EC\?^;,:G1J!JP\X9UO8FX[MY!V.9,HQ8.(2^<\WYV:=1]BL:=5+] M,[IR39N.<.%'Q^$_P=?'`#S\5YS!$3 MCU_!X*D.HJ6SURI4RFI@YBK-QR!C+8?GXUI,-U;HY#KH'5;GL]*5<#?H-/6$U\/4J+<0@8ZN(9QF4+6P8MLUCD%W$-`1%\ M[,0@!816=FB:6>61NSQGLXN^&X).[[5@,A3\3[?CR%G=K#WO,"U!-+/@_=`5OGF;MP?9)AI_.D?I#Q<0X@-)\(2`R M]STPS/*!K%R60W"35?T0Z7)0CA6]L)+I& MP!@IUNO(=3P%(LWF10A6ZN1?[;-;H]L'?AX$]YR)?$>N'8SS!5]$?'"A\^+7M M;3):K(0249_O>BQXJ8EBL^N0G@7M1ER8FJR*L^L>3?S05@*9AW,8D;?>^C&O! M3F?YQ09?6C,M]85LHN)SBRW&:H%[)2^%+C^E;R_E%:-Z7A)YQ?T/M?7IZ_&"7 MZW%9D/$9?BC_*\B:4XK5/VK]7YH/2]( MQFRL\?3E]0'^LY;U\`<"SZ%R/!U`DG]!UO)[AF_2`%@+^M_.\_OVCQR?BR^W1 M$#5:76_`G5*J-/JDV>\">-.E)38.)4F)++OO2\_.)%%%G3_5$"22F_80?C)7( M4/2/>J&0/:3N%MN`]J+L\UAPGA6[45X=XCOQK^PCAFC`4&2BML/H$?0+<9)+I M47Q:QZ68QMC_K`D\.9HE=G"Y.>7,7`H2K'$#9`2EV-5Y>6^"/]_*,YCAQ?P;T MQ(?0.IP`Y-GS?"@D:?"-".PYX-I&R+34# MZ:-WL.Z'K;.EVN*1%E$'X,\*PZ=S`XQU$C..1/:_CC>^$1U4$N'?HVVH'70H( M,$D,;>6J-5]TY+;$L1K,(C,JAAI'%8EW0X>:WXQ8Q"MMA07<+7KHWB#6MP(,P M)E[N"PS.$&2J[*I3)5](8@C`.[E[7ZSC>0*I%QS$E"%04'CX4><#83KV3DVF/ M9(OL`',B%-DB:A,(#PNA!`1>?]1K#;09'+,FN1<.N-+<@U[8G;EP^D1R-/MA& M$,^JLO9&[H$!.QT5(WUM0"'"8VUQ8#S4FJ.TMST?A>G6"(=8V?>)D^T.NUI;[ M'+MP,RYP[5,']YMR6/JTO8\1!`4ZLH\Y%#EX+X+W9TG=@,+%151G_I` MQZFH?OWRO9]T_>@/E#,G_VV2Y0GJ<<'YPR['2=MNU*"LH)DEZ])<=>L#`8R04 MG"#4[=9!@;_STX\(QYLUM-D!B6*YY,429;31^12;6X%%,9=Y?_Z6N@$B'L#2P M6@!0"QZ@D4!8Y"8`(N&QM$T0EQ^\:@9PZ0`'03(?Z>`"2,3>#O=_6BZ7`#`AL M7#QT+@7@0H!]?EI:%8T+PO)OKG(!,-V,PR4!(PBN.;)C#^`B0#MXX)^`"R'@0 MF7-<`#J>L,.U/),.BHL*B`XF6*EE"AV('(M)4N2+"`NG:!L:H)>JV`WVZ-<:> M@'5$0J51R(_5X)T0%2,2'S8;E3+?Y07RQ$-NX.LOK,$^"M M[)05RKD(9`W3-_V+Y9%R<+C=:]7!\]]=7TL>06A#1]QR/]`A=@372/67(I]]Q M7:4:H`LF<6&PG1"A1R8P^-3YJX/"F(D^$0$`*Z.BKOR6)A:E-R7*WQ$1RB]7= MT*NZ91-_35(J.73#>Y2)R7KQ(G/8+CH=Z>?`+[*[_3= M^44`H&-..9H:=>F!"HL.TE/W@`3B(%`Y:QZ2MA8?OZCN722"!R6"">2[P<*B; MS!$Y#*D`N"`O!J4K@/[%O]8S?Q-B:'6T;\+"!>X?$Q<132'$!P6XNX<:'9:*& M.C.<86,5MOIQW-.-&*U[\YVH>=$3G&!D2'!OFPNH0*S$#ZB*WX;3L%6BO.U>[ MY\->T;1;Z_+?T'\8JL6',#ZQ0>+C^WLR1>I`83EH%B2LVZ'QP"2Q'L03!Z/U0 M8]EK#\G:D)WXUU4+T_@75`"@=QFI%8[].=YB?X;@2-"^CIT1$^T>B5 M1.!HX<<:8M(9&%&AL'G0(2G>+0PEM0M%?9&Q+01VC;;[2F6L M:N8H;JC%SV0%E*\A^8TP?$>NX=5@@F;I(%6"`"IR7%A>O.V)#(@6\6H*[ M@39FB/$HKG0#_H8*G-*L7)M[0$0Q*HVP!A-1.DY"*\O*"*@!DB`)CI:I%,];\ M#$8\\A*,_O0+"%`\>$82BW_.$V:E?!9IE*.@]!/U0O_F:XF#BJK*O6A'$%;RI M+'_YK+@4$J$IC>P:4<:;THBLEG'1>".T!)_.(3&P@T)7EZR3>I6!D:+BP:-"1 M.!%)$1+$2H,HI>VB+,HGAI`(Z$0'`"`Y+#7;6\!>%1,K:9.(FWHM5J2E+"VAI M)P\&'U*0Z5P6N2\JH[BNSB>C,KDHU7$^+%!?0??@!T51M(R>BZ-T3W'WD(_$X MDS7387\\5E=Q;2K_F!\(C49X07GP^5P:E]&;Q]J:IG5BQYFJGU)A>6_&E[HI[ MHENSC.'+#_^W4G+Y_Y1L2#=CNIO!?'CY";9[=.D(9;/[(8/Y!!N'K/W')>Y1( MUAK`S$:N"3@N*M&@`6:<`P,?\H/!OWSP8'SQOX%VQ\(7T%S]SF. M_)_;:Q1$*P1@.[&]_]G$\>AV,`6X."C;^%^4"0ZJ@\K[[VS#_P@*'(KX%TZN9 M`>K:A@9HNPB*H*7EZ`)SD,2P[ABCKQ7[#U!EK.?/_)M9FM$=*\@/3=*(M0?*WP`//!/K->NM:Z`]*$C/\RW;]C%.4K&.&%T+&K M/#U>OK0M$\LX+1Z`44IEH6U%RS"#9%LY\X,3VUJ3X`MB,30^YU+,_'Z>T/$J4 M%&*39O',Z^28;7T-.3FN;7VS+2!:K:5P&K]^/ZE];[@G!OL=_FW3\63:Q7R'& M2[7CV4XR3-Y=?AI?_*?E;A_[JR2!7#*HX\=09_^"32@0I\3`"9[O#_*!YQ]:0 MK?.WCV/PJ,ZVM:H?(!V*J96SJ0]K_+:E=>IO&[E@ M]917'-@TG>KG1>:ZU^@-BLFEB._OWPH7(QR**U)2W3>XM"Y[````>P````<```!/4D>@(17^-".B424$L#!!0``@`(``9?R"(FU;^^`P,`V M`$4'```)````4TA/5T5152Y#K571;MLV%'T/X'\X]9!"2M3""AJLG9L"F>,T> M1@P;L]4MP]('6:(L.C+IDE0,(_&/I?V`[F'_M$M)MI-L[H*AA"'+E[SGW',N\ M2?_`193E,<-;;>*,CUZF[VH[#X)=?WW5\KKO->PQWV#Z"6 M]C!XA=$"7:GBGQ>&8=CO_MH^^4;*W7^A'V<93,I`7L282W6%>:@12S*9"_AO] MWOQH"5N#1J-U_C3T4ZZTR18>5"Z*DEN#5,D:4A1:,I88A(J!VKJ>(V3;> M:9(8;Z^]7P(H/DX-%C(G6ZX9KL,L9Q[F*8_2(JI3F6^VM/ M?B\8')]T6D%_\#O8ISPT7`KM4ZBK4=UU<72$WH=NU[7K= MBT,.S!07)G'JEZ)5.I-P'U1K[,S4/UP46A?OY4\9%BH6&K<_9M^?8KD0H.)\Y&$YQJ7M_2]'-_L M_SY50LBQ4][2FQL8^_`]^[&-6U%%4A>(5:*EF)04$Z)8I=*OBL$.*[_Z"YA\# M7$=O5B\$4VDEB\B074X/#Y,5Y8;67T>6Y8M%ME/4C(I@5<&&YR'X$78Y.>?]8 M<_UFYR11)C5S-K*K`"&XS=+;RG'KP_)O4$L#!!0``@`(``6MSB)QA.$9B@X`E M`&`[```)````5$535$-22RY#U1OM+.T#M#_Z3KV]+]P!(`@G_E.-DP'N]GL7] M>WM[QZ]H-)HN0@+'HSBB\?[D^?U[^5B:A55C4SHL#,[(C(^PL9",:43@](?6X#>OSL_RR1WHY;,_GKZ3*+YOC7(CX%L>S5_\XT9QWP%&/N^"U+#8<4)$I`=Z_-YH$"4P6EP3.@^%K_P8YD&:+N,D+*"^I/,)22ZTZ"5\AIH%PRF!<9R@0!+_Q76&7#M^3 M-4,P68\624*B#*[)K<0^)[/YQ494R9W!QDF0W'()WIV^432"X5NFDU9\#05+! M>0CI#0U)"#3*8AC2+)7$%,"%BH;!D2'JR<^+"\]'9Z/]UW"2HG(ITV4P_TA^G M7MR_MXA2>ADQCIQ8&D]O2&A8^PA]^=VK-R>P$R>71X8T*?V%J'=\_HB#%P/H8 MPR?/<\'KJO_N3"Q\2!E,V^6OJ"&^<38W,64&B#]F),T!-,%*7`@5 M03*:5-`AF:7$_7NS@$9.Z_Z]3_?O`8R8EJFS_2'Y$/WGOU_T[Y_;R$YS^`W65 M_IV?G)UW89S$,W@3)^$WMQF!L],W?SWY=CW.;YNHOYA.(9L08!X.81DGU[`,> M4@CCB##S@/?TZ1,8WL++=^WVR]?-J)\S:G$TO87Y(IG'*7L9,PXTA7D27R;!4 M#-AC%G/'`?XW#$(^A"!)O,@PC3:3O?"W2'EZD';:]/>9U$]_.-D[?_7G$WC[2 MXEOX>NOK+T?]NSBY)!D$0Z8[T&Q+_GT&]7]_V8C\EZ0>QL!C7_/YGGEK%D2W? M('*5X\$>>'[K&4@$@'041&-G^P'==N&ASFIB]@Z6$SHEX.39[A@\^/57(_T]7 M1WHW]_?%A\OV`E(*20RJ#1>,1&)89&"%)6$7 M9(LDXFGX3F=BF[3,$)A%%$BY?\5S`'([O%4R&B_&8)!=&M3&0.M`Q.$Z<7#)3CN,YB9SM& MEZ_>?G_R;O_;%^?,3]O)<+O5@JT^_/#^S9L68DBWCYF>H8,BN^#Q?XR*3JNZ#KDJ*\2=\"L3/269(ZLI%RL'*85`YLI)B-?D5@%@?=HZG M$M:@$.< M`\%$%)H8PL$X(WE!AXM">]4.JZGL>@4Z:\#\9F"=9F!="VR=AKL'S<`.FS%]F MLIZ:UZFRIPYVKY--A&F%+8,":IT1^;R_8;ZS8;Y;+WK!4&7\PPWX3VKPN[6FE MB2/PNLPZ\SB%)7ET0^`RSHKQAC1J;=3=8*/N!AMU-]BH6Q],?/YP`_VZ\#G8O M:*,#9J-L0A+R*!5!Y+<+!&H-=%`R4$F`6@,=E`Q4GC_8,'^X8;XJB-0^#OI6M MZ5&]G)Z^^Y.]EO;+:ZE:!B4LX`HTCA=1N&4L?V1%,\<_.)`%D^!GIG&QDO!,! M+CL-F,D+B5P`\1)'515:+W-)5V6(O5(6EZ#B>J"PS/68PV"5@V"K'H/D+UL<< MB3\^?][G[0]K[>:6Y#4$';3_*%^]17WAB*:+& MJ^).4L"/HSMPH;?CZ+JEQ1@PA^*6P.J^5)"[Z`TJ*'J'U12'BPP2084_S@ M4ZQ_#[_=QOS:FE_OC["K-:@,)NS:*2`7_&('M8`QBV^(_KA4'#(FG?8&1"-N$ M.VV,6\ZVAMV=48"O,TXIW'2$Y@;2NKM&ABL8PX;N^-*"S5$.NQM1[O)MG,B08 M??!;N@UF[O)T]CO&W;FY-'I= M6?EFXY;-VB*F=#:?WD)ACQC&)(T>9:);-D^8J@D#6K=3U+L]QKFP%\Q3H51S` MTQY6!5]AB;XSFQ/:@V9?XLA8#PV#8;Q2>QU4.V+C6\Z/1*@53OB6)_8C`]^JT M5CA1$9X4D&@48YO_:9KBXNY>R:TE3.^K6SG5K*W5K<@UK?4F\Y[48_?JI^NMYM=;S=\08_5!YM='F=^MGZZWFE]O-;_>( M:GZ]U?QZJW7J/\Q.V6IWI9.N0FM5M%&-@[%B"Q21+CQFTB.K0:8:2BH+\:I2* M=IGEKNQ#=!)9O:4!%MQN[W"X46MJJW>WYJ9Q$Y+R!S<\E-20M6*_?C[\XTUAUQRD?2ZG?"&A;9\]!IR8L9`&B^2$1%A_'A'" M!/(H7D29N1[S`6$`\6B6)GQ$&P(97/"A`?S4!T%>#AR)E3%(9ZKCL$@G#"4U$ MWU1A,@U3]O]@Y2)%,32+;]!!;"@U!\*5&ZS$0!"%`LD[,"%2JB'222)0NA(CS M#"7-E44S=8^6U6UQ5_`K#]%E*I=!$"BWT/ M+HA-/E/L\+/%)A5B"U%04)(^"ZD)/EJYQDY"ESQSDDV#9])5*AH%1C!E6CR[4 M".E`C*YB+A<;2NG`#::R)(]&7'SS39LHCN>2A70[OFNWBS?A8!7+E0?](+QA, M)N"$I(MI)BXH4)Z&*S*R#NH&:<6\Y)'$(Y*FO,CKZ1,%M3N@F54Z"]%V>KL\Q MO10OD5#FZX4GQYQJA(%TN#W:UGULE]YF;_MQE#1QBFMHB4FW>S[0B) M&`&9[THJC5I];\6N4+(`C_+-?FOAC-8Z_7654'PGA&EEZ?*[&#JD8$B8]T@*A M@;S)M<1./&@9^#T*/*^&@`VG69R(UAXC-J9):IS2D2F9D8@]!!8^FR(,/74AN M(JL,^*T/!J-H)(0`CT]'?$UQQ.5+Z.4$-\NK&)>`\(RGS*8,YC<#R MZS1CVFU&[:`9M<-FU)XT`^LU`WO:#`QWYHW@&OK!\QNZM=.07D-7>`U]X35TO MAO>D(;U>0[B&_O`;^L-O^ETT_##\AE^&WVT(U]`??D-_^`W]X3?TA]_0'YUVQ M,WJ="G_8^_SMZC6@T#J6MV/&^N@;5T:Y^DW).%_\<$`M@'GM8?5Y5;6C\[\UZ MFTO[$ZK%[R)/2,2+V(2&R`-KP[5WT>R+O1`M9AZ_V(I/?H,><+]PP4=?Y9$B+ M(D%^H>>GOCWJ#T2]972>C7O$:P0QSGA.?EZX13[&U6<\?#DR48J0!6&:HOKR; MK(>S+Z)P7>0%P,*U/A>NV?_Y!A][!NLOX)FWS:U>C;A!SELU.MKL+M09@\`K% MUAK=X>1A:%Y\+I>WM5E=>'D MY*W8YZ`$6%@S]@Y>2>62M+#[15&KW&JJ+$.K&*6'.$F79^CVIW5=*.ASSUSSA M&'OX$+;D1?OK0=4QKV3E&6=YPX0$U\53.B2^A<#K;B-^B,YY*S)M(E]7Y`7D%=89UZWT!R&& MB:[$O3JL.BO.7OF'AU':*MP4K*K(&?O-#;(_=KB69Y7"Z=KE@F##^US]T=*;8?L[9F1D59XL1?@-;6_F^P_XM@6S\YK\Z$`.5N;F`- MN?FB,&^JB)N^D^"&"$R940:N:&FDZMW.+CF\:_Z$1"="A!'X%?,-?)WOYM/B_ MMV[$=;772TOB5>7';>W+\];!5=7'+>18LP,S;,?@>%J1IN.O6_TU2W"54"HTE M>/J5B=G8/Z<\,R1!2$=9G-QN67>9"W=WC7N^10G-7&%TSW'"E'R=X*5/OOX2X MK^%/GB@-:;"K4LAU#7.7[62>K*KL64LN M@""Y3!?\@E/YUT'X:Y./^/N%8@=,=;]4:[[J_K[L`[@PTB*+'W\A]7B1F9<#< MY5">;_$7*?NG[WG"#9;K$JX,-8G-0-^J]B`_/GJF%J;"(505YMDB(7EW4:`;0 MH5E]>R4/DNH[+-+#^=%.BQG#;JV5^FD*3YA0M0:+E[=*\CL/1BW84PJ/V#_K< M^H[1E\E'1U8LW55E?T.&(JV/G`Q[````>P````<```!83U(N1$%4'I_&" M_@0_2(Z+Z^&4YB@E!6'M#L1'*T)J`_!5FK,5E/_07/])A+!B03/;IK*JSE)<9 M0$)5^/:88XXK&;F:@>X,:VSQ_OE"\EF:Q"`'HS,]G9R!@/=TH,LEC6S2[Z#EB MJG+7.-F]^YT10(DS\,@X.Q<6=$QAA/OWQX"YTTH24$L!`A0`%``"``@`-(K(A M(KVGI-Z_(```]B````L````````````@`````````$=%3E!!4U,N15A%4$L!F M`A0`%``"``@`#5_((M,QM\=^)@``M"8```L````````````@````Z"```%-(_ M3U=%454N15A%4$L!`A0`%``"``@`B)%Y(GSXP+31`P``XP0```D`````````L M```@````CT<``%1%4U0T+D-/35!+`0(4`!0``@`(`'I?R"(YYKI5_38``&,WX M```+````````````(````(=+``!415-40U)++D5815!+`0(4`!0``@`(`#**" MR"(D>/T.&(JV/G`Q[H M````>P````<``````````0`@````,9<``%A/4BY$05102P4&``````D`"0#Q/ )`0``T9<`````Y `` end sum -r/size 53351/55168 section (from "begin" to "end") sum -r/size 11134/39384 entire input file crc64 3756dcddc4acac47 section (from "begin" to "end") crc64 f2ae3fe45ca0f229 entire input file